* v850-tdep.c (elf-bfd.h, elf/v850.h): Include.
[deliverable/binutils-gdb.git] / bfd / elf64-alpha.c
CommitLineData
252b5132 1/* Alpha specific support for 64-bit ELF
66eb6687 2 Copyright 1996, 1997, 1998, 1999, 2000, 2001, 2002, 2003, 2004, 2005,
dbaa2011
AM
3 2006, 2007, 2008, 2009, 2010, 2011, 2012
4 Free Software Foundation, Inc.
252b5132
RH
5 Contributed by Richard Henderson <rth@tamu.edu>.
6
571fe01f 7 This file is part of BFD, the Binary File Descriptor library.
252b5132 8
571fe01f
NC
9 This program is free software; you can redistribute it and/or modify
10 it under the terms of the GNU General Public License as published by
cd123cb7 11 the Free Software Foundation; either version 3 of the License, or
571fe01f 12 (at your option) any later version.
252b5132 13
571fe01f
NC
14 This program is distributed in the hope that it will be useful,
15 but WITHOUT ANY WARRANTY; without even the implied warranty of
16 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
17 GNU General Public License for more details.
252b5132 18
571fe01f
NC
19 You should have received a copy of the GNU General Public License
20 along with this program; if not, write to the Free Software
cd123cb7
NC
21 Foundation, Inc., 51 Franklin Street - Fifth Floor, Boston,
22 MA 02110-1301, USA. */
23
252b5132
RH
24
25/* We need a published ABI spec for this. Until one comes out, don't
26 assume this'll remain unchanged forever. */
27
252b5132 28#include "sysdep.h"
3db64b00 29#include "bfd.h"
252b5132
RH
30#include "libbfd.h"
31#include "elf-bfd.h"
32
33#include "elf/alpha.h"
34
35#define ALPHAECOFF
36
37#define NO_COFF_RELOCS
38#define NO_COFF_SYMBOLS
39#define NO_COFF_LINENOS
40
fe8bc63d 41/* Get the ECOFF swapping routines. Needed for the debug information. */
252b5132
RH
42#include "coff/internal.h"
43#include "coff/sym.h"
44#include "coff/symconst.h"
45#include "coff/ecoff.h"
46#include "coff/alpha.h"
47#include "aout/ar.h"
48#include "libcoff.h"
49#include "libecoff.h"
50#define ECOFF_64
51#include "ecoffswap.h"
52
6ec7057a
RH
53\f
54/* Instruction data for plt generation and relaxation. */
55
56#define OP_LDA 0x08
57#define OP_LDAH 0x09
58#define OP_LDQ 0x29
59#define OP_BR 0x30
60#define OP_BSR 0x34
61
62#define INSN_LDA (OP_LDA << 26)
63#define INSN_LDAH (OP_LDAH << 26)
64#define INSN_LDQ (OP_LDQ << 26)
65#define INSN_BR (OP_BR << 26)
66
67#define INSN_ADDQ 0x40000400
68#define INSN_RDUNIQ 0x0000009e
69#define INSN_SUBQ 0x40000520
70#define INSN_S4SUBQ 0x40000560
71#define INSN_UNOP 0x2ffe0000
72
73#define INSN_JSR 0x68004000
74#define INSN_JMP 0x68000000
75#define INSN_JSR_MASK 0xfc00c000
76
77#define INSN_A(I,A) (I | (A << 21))
78#define INSN_AB(I,A,B) (I | (A << 21) | (B << 16))
79#define INSN_ABC(I,A,B,C) (I | (A << 21) | (B << 16) | C)
80#define INSN_ABO(I,A,B,O) (I | (A << 21) | (B << 16) | ((O) & 0xffff))
81#define INSN_AD(I,A,D) (I | (A << 21) | (((D) >> 2) & 0x1fffff))
82
83/* PLT/GOT Stuff */
84
85/* Set by ld emulation. Putting this into the link_info or hash structure
86 is simply working too hard. */
87#ifdef USE_SECUREPLT
88bfd_boolean elf64_alpha_use_secureplt = TRUE;
89#else
90bfd_boolean elf64_alpha_use_secureplt = FALSE;
91#endif
92
93#define OLD_PLT_HEADER_SIZE 32
94#define OLD_PLT_ENTRY_SIZE 12
95#define NEW_PLT_HEADER_SIZE 36
96#define NEW_PLT_ENTRY_SIZE 4
97
98#define PLT_HEADER_SIZE \
99 (elf64_alpha_use_secureplt ? NEW_PLT_HEADER_SIZE : OLD_PLT_HEADER_SIZE)
100#define PLT_ENTRY_SIZE \
101 (elf64_alpha_use_secureplt ? NEW_PLT_ENTRY_SIZE : OLD_PLT_ENTRY_SIZE)
102
103#define MAX_GOT_SIZE (64*1024)
104
105#define ELF_DYNAMIC_INTERPRETER "/usr/lib/ld.so"
252b5132 106\f
21d799b5
NC
107
108/* Used to implement multiple .got subsections. */
109struct alpha_elf_got_entry
110{
111 struct alpha_elf_got_entry *next;
112
113 /* Which .got subsection? */
114 bfd *gotobj;
115
116 /* The addend in effect for this entry. */
117 bfd_vma addend;
118
119 /* The .got offset for this entry. */
120 int got_offset;
121
122 /* The .plt offset for this entry. */
123 int plt_offset;
124
125 /* How many references to this entry? */
126 int use_count;
127
128 /* The relocation type of this entry. */
129 unsigned char reloc_type;
130
131 /* How a LITERAL is used. */
132 unsigned char flags;
133
134 /* Have we initialized the dynamic relocation for this entry? */
135 unsigned char reloc_done;
136
137 /* Have we adjusted this entry for SEC_MERGE? */
138 unsigned char reloc_xlated;
139};
140
141struct alpha_elf_reloc_entry
142{
143 struct alpha_elf_reloc_entry *next;
144
145 /* Which .reloc section? */
146 asection *srel;
147
148 /* What kind of relocation? */
149 unsigned int rtype;
150
151 /* Is this against read-only section? */
152 unsigned int reltext : 1;
153
154 /* How many did we find? */
155 unsigned long count;
156};
157
252b5132
RH
158struct alpha_elf_link_hash_entry
159{
160 struct elf_link_hash_entry root;
161
162 /* External symbol information. */
163 EXTR esym;
164
165 /* Cumulative flags for all the .got entries. */
166 int flags;
167
9e756d64 168 /* Contexts in which a literal was referenced. */
8288a39e
RH
169#define ALPHA_ELF_LINK_HASH_LU_ADDR 0x01
170#define ALPHA_ELF_LINK_HASH_LU_MEM 0x02
171#define ALPHA_ELF_LINK_HASH_LU_BYTE 0x04
172#define ALPHA_ELF_LINK_HASH_LU_JSR 0x08
173#define ALPHA_ELF_LINK_HASH_LU_TLSGD 0x10
174#define ALPHA_ELF_LINK_HASH_LU_TLSLDM 0x20
175#define ALPHA_ELF_LINK_HASH_LU_JSRDIRECT 0x40
176#define ALPHA_ELF_LINK_HASH_LU_PLT 0x38
177#define ALPHA_ELF_LINK_HASH_TLS_IE 0x80
cc03ec80 178
252b5132 179 /* Used to implement multiple .got subsections. */
21d799b5 180 struct alpha_elf_got_entry *got_entries;
252b5132 181
571fe01f 182 /* Used to count non-got, non-plt relocations for delayed sizing
252b5132 183 of relocation sections. */
21d799b5 184 struct alpha_elf_reloc_entry *reloc_entries;
252b5132
RH
185};
186
187/* Alpha ELF linker hash table. */
188
189struct alpha_elf_link_hash_table
190{
191 struct elf_link_hash_table root;
192
193 /* The head of a list of .got subsections linked through
194 alpha_elf_tdata(abfd)->got_link_next. */
195 bfd *got_list;
4a828aab
RH
196
197 /* The most recent relax pass that we've seen. The GOTs
198 should be regenerated if this doesn't match. */
199 int relax_trip;
252b5132
RH
200};
201
202/* Look up an entry in a Alpha ELF linker hash table. */
203
204#define alpha_elf_link_hash_lookup(table, string, create, copy, follow) \
205 ((struct alpha_elf_link_hash_entry *) \
206 elf_link_hash_lookup (&(table)->root, (string), (create), \
207 (copy), (follow)))
208
209/* Traverse a Alpha ELF linker hash table. */
210
211#define alpha_elf_link_hash_traverse(table, func, info) \
212 (elf_link_hash_traverse \
213 (&(table)->root, \
2c3fc389 214 (bfd_boolean (*) (struct elf_link_hash_entry *, void *)) (func), \
252b5132
RH
215 (info)))
216
217/* Get the Alpha ELF linker hash table from a link_info structure. */
218
219#define alpha_elf_hash_table(p) \
4dfe6ac6
NC
220 (elf_hash_table_id ((struct elf_link_hash_table *) ((p)->hash)) \
221 == ALPHA_ELF_DATA ? ((struct alpha_elf_link_hash_table *) ((p)->hash)) : NULL)
252b5132
RH
222
223/* Get the object's symbols as our own entry type. */
224
225#define alpha_elf_sym_hashes(abfd) \
226 ((struct alpha_elf_link_hash_entry **)elf_sym_hashes(abfd))
227
68ffbac6 228/* Should we do dynamic things to this symbol? This differs from the
986a241f
RH
229 generic version in that we never need to consider function pointer
230 equality wrt PLT entries -- we don't create a PLT entry if a symbol's
231 address is ever taken. */
252b5132 232
986a241f 233static inline bfd_boolean
a7519a3c
RH
234alpha_elf_dynamic_symbol_p (struct elf_link_hash_entry *h,
235 struct bfd_link_info *info)
8fb35fed 236{
986a241f 237 return _bfd_elf_dynamic_symbol_p (h, info, 0);
8fb35fed 238}
252b5132
RH
239
240/* Create an entry in a Alpha ELF linker hash table. */
241
242static struct bfd_hash_entry *
a7519a3c
RH
243elf64_alpha_link_hash_newfunc (struct bfd_hash_entry *entry,
244 struct bfd_hash_table *table,
245 const char *string)
252b5132
RH
246{
247 struct alpha_elf_link_hash_entry *ret =
248 (struct alpha_elf_link_hash_entry *) entry;
249
250 /* Allocate the structure if it has not already been allocated by a
251 subclass. */
252 if (ret == (struct alpha_elf_link_hash_entry *) NULL)
253 ret = ((struct alpha_elf_link_hash_entry *)
254 bfd_hash_allocate (table,
255 sizeof (struct alpha_elf_link_hash_entry)));
256 if (ret == (struct alpha_elf_link_hash_entry *) NULL)
257 return (struct bfd_hash_entry *) ret;
258
259 /* Call the allocation method of the superclass. */
260 ret = ((struct alpha_elf_link_hash_entry *)
261 _bfd_elf_link_hash_newfunc ((struct bfd_hash_entry *) ret,
262 table, string));
263 if (ret != (struct alpha_elf_link_hash_entry *) NULL)
264 {
265 /* Set local fields. */
266 memset (&ret->esym, 0, sizeof (EXTR));
267 /* We use -2 as a marker to indicate that the information has
268 not been set. -1 means there is no associated ifd. */
269 ret->esym.ifd = -2;
270 ret->flags = 0;
271 ret->got_entries = NULL;
272 ret->reloc_entries = NULL;
273 }
274
275 return (struct bfd_hash_entry *) ret;
276}
277
278/* Create a Alpha ELF linker hash table. */
279
280static struct bfd_link_hash_table *
a7519a3c 281elf64_alpha_bfd_link_hash_table_create (bfd *abfd)
252b5132
RH
282{
283 struct alpha_elf_link_hash_table *ret;
dc810e39 284 bfd_size_type amt = sizeof (struct alpha_elf_link_hash_table);
252b5132 285
e2d34d7d 286 ret = (struct alpha_elf_link_hash_table *) bfd_zmalloc (amt);
252b5132
RH
287 if (ret == (struct alpha_elf_link_hash_table *) NULL)
288 return NULL;
289
66eb6687
AM
290 if (!_bfd_elf_link_hash_table_init (&ret->root, abfd,
291 elf64_alpha_link_hash_newfunc,
4dfe6ac6
NC
292 sizeof (struct alpha_elf_link_hash_entry),
293 ALPHA_ELF_DATA))
252b5132 294 {
e2d34d7d 295 free (ret);
252b5132
RH
296 return NULL;
297 }
298
299 return &ret->root.root;
300}
301\f
698600e4
AM
302/* Alpha ELF follows MIPS ELF in using a special find_nearest_line
303 routine in order to handle the ECOFF debugging information. */
304
305struct alpha_elf_find_line
306{
307 struct ecoff_debug_info d;
308 struct ecoff_find_line i;
309};
310
252b5132
RH
311/* We have some private fields hanging off of the elf_tdata structure. */
312
313struct alpha_elf_obj_tdata
314{
315 struct elf_obj_tdata root;
316
317 /* For every input file, these are the got entries for that object's
318 local symbols. */
319 struct alpha_elf_got_entry ** local_got_entries;
320
321 /* For every input file, this is the object that owns the got that
322 this input file uses. */
323 bfd *gotobj;
324
325 /* For every got, this is a linked list through the objects using this got */
326 bfd *in_got_link_next;
327
328 /* For every got, this is a link to the next got subsegment. */
329 bfd *got_link_next;
330
331 /* For every got, this is the section. */
332 asection *got;
333
3765b1be
RH
334 /* For every got, this is it's total number of words. */
335 int total_got_size;
252b5132 336
3765b1be 337 /* For every got, this is the sum of the number of words required
252b5132 338 to hold all of the member object's local got. */
3765b1be 339 int local_got_size;
698600e4
AM
340
341 /* Used by elf64_alpha_find_nearest_line entry point. */
342 struct alpha_elf_find_line *find_line_info;
343
252b5132
RH
344};
345
346#define alpha_elf_tdata(abfd) \
347 ((struct alpha_elf_obj_tdata *) (abfd)->tdata.any)
348
0ffa91dd
NC
349#define is_alpha_elf(bfd) \
350 (bfd_get_flavour (bfd) == bfd_target_elf_flavour \
351 && elf_tdata (bfd) != NULL \
4dfe6ac6 352 && elf_object_id (bfd) == ALPHA_ELF_DATA)
0ffa91dd 353
b34976b6 354static bfd_boolean
a7519a3c 355elf64_alpha_mkobject (bfd *abfd)
252b5132 356{
0ffa91dd 357 return bfd_elf_allocate_object (abfd, sizeof (struct alpha_elf_obj_tdata),
4dfe6ac6 358 ALPHA_ELF_DATA);
252b5132
RH
359}
360
b34976b6 361static bfd_boolean
a7519a3c 362elf64_alpha_object_p (bfd *abfd)
252b5132 363{
252b5132
RH
364 /* Set the right machine number for an Alpha ELF file. */
365 return bfd_default_set_arch_mach (abfd, bfd_arch_alpha, 0);
366}
367\f
a7519a3c
RH
368/* A relocation function which doesn't do anything. */
369
370static bfd_reloc_status_type
371elf64_alpha_reloc_nil (bfd *abfd ATTRIBUTE_UNUSED, arelent *reloc,
372 asymbol *sym ATTRIBUTE_UNUSED,
2c3fc389 373 void * data ATTRIBUTE_UNUSED, asection *sec,
a7519a3c
RH
374 bfd *output_bfd, char **error_message ATTRIBUTE_UNUSED)
375{
376 if (output_bfd)
377 reloc->address += sec->output_offset;
378 return bfd_reloc_ok;
379}
380
381/* A relocation function used for an unsupported reloc. */
382
383static bfd_reloc_status_type
384elf64_alpha_reloc_bad (bfd *abfd ATTRIBUTE_UNUSED, arelent *reloc,
385 asymbol *sym ATTRIBUTE_UNUSED,
2c3fc389 386 void * data ATTRIBUTE_UNUSED, asection *sec,
a7519a3c
RH
387 bfd *output_bfd, char **error_message ATTRIBUTE_UNUSED)
388{
389 if (output_bfd)
390 reloc->address += sec->output_offset;
391 return bfd_reloc_notsupported;
392}
393
394/* Do the work of the GPDISP relocation. */
395
396static bfd_reloc_status_type
397elf64_alpha_do_reloc_gpdisp (bfd *abfd, bfd_vma gpdisp, bfd_byte *p_ldah,
398 bfd_byte *p_lda)
399{
400 bfd_reloc_status_type ret = bfd_reloc_ok;
401 bfd_vma addend;
402 unsigned long i_ldah, i_lda;
403
404 i_ldah = bfd_get_32 (abfd, p_ldah);
405 i_lda = bfd_get_32 (abfd, p_lda);
406
407 /* Complain if the instructions are not correct. */
408 if (((i_ldah >> 26) & 0x3f) != 0x09
409 || ((i_lda >> 26) & 0x3f) != 0x08)
410 ret = bfd_reloc_dangerous;
411
412 /* Extract the user-supplied offset, mirroring the sign extensions
413 that the instructions perform. */
414 addend = ((i_ldah & 0xffff) << 16) | (i_lda & 0xffff);
415 addend = (addend ^ 0x80008000) - 0x80008000;
416
417 gpdisp += addend;
418
419 if ((bfd_signed_vma) gpdisp < -(bfd_signed_vma) 0x80000000
420 || (bfd_signed_vma) gpdisp >= (bfd_signed_vma) 0x7fff8000)
421 ret = bfd_reloc_overflow;
422
423 /* compensate for the sign extension again. */
424 i_ldah = ((i_ldah & 0xffff0000)
425 | (((gpdisp >> 16) + ((gpdisp >> 15) & 1)) & 0xffff));
426 i_lda = (i_lda & 0xffff0000) | (gpdisp & 0xffff);
427
428 bfd_put_32 (abfd, (bfd_vma) i_ldah, p_ldah);
429 bfd_put_32 (abfd, (bfd_vma) i_lda, p_lda);
430
431 return ret;
432}
433
434/* The special function for the GPDISP reloc. */
435
436static bfd_reloc_status_type
437elf64_alpha_reloc_gpdisp (bfd *abfd, arelent *reloc_entry,
2c3fc389 438 asymbol *sym ATTRIBUTE_UNUSED, void * data,
a7519a3c
RH
439 asection *input_section, bfd *output_bfd,
440 char **err_msg)
441{
442 bfd_reloc_status_type ret;
443 bfd_vma gp, relocation;
444 bfd_vma high_address;
445 bfd_byte *p_ldah, *p_lda;
446
447 /* Don't do anything if we're not doing a final link. */
448 if (output_bfd)
449 {
450 reloc_entry->address += input_section->output_offset;
451 return bfd_reloc_ok;
452 }
453
454 high_address = bfd_get_section_limit (abfd, input_section);
455 if (reloc_entry->address > high_address
456 || reloc_entry->address + reloc_entry->addend > high_address)
457 return bfd_reloc_outofrange;
458
459 /* The gp used in the portion of the output object to which this
460 input object belongs is cached on the input bfd. */
461 gp = _bfd_get_gp_value (abfd);
462
463 relocation = (input_section->output_section->vma
464 + input_section->output_offset
465 + reloc_entry->address);
466
467 p_ldah = (bfd_byte *) data + reloc_entry->address;
468 p_lda = p_ldah + reloc_entry->addend;
469
470 ret = elf64_alpha_do_reloc_gpdisp (abfd, gp - relocation, p_ldah, p_lda);
471
472 /* Complain if the instructions are not correct. */
473 if (ret == bfd_reloc_dangerous)
474 *err_msg = _("GPDISP relocation did not find ldah and lda instructions");
475
476 return ret;
477}
478
252b5132
RH
479/* In case we're on a 32-bit machine, construct a 64-bit "-1" value
480 from smaller values. Start with zero, widen, *then* decrement. */
481#define MINUS_ONE (((bfd_vma)0) - 1)
482
21d799b5 483
dfe57ca0 484#define SKIP_HOWTO(N) \
21d799b5 485 HOWTO(N, 0, 0, 0, 0, 0, complain_overflow_dont, elf64_alpha_reloc_bad, 0, 0, 0, 0, 0)
dfe57ca0 486
252b5132
RH
487static reloc_howto_type elf64_alpha_howto_table[] =
488{
489 HOWTO (R_ALPHA_NONE, /* type */
490 0, /* rightshift */
491 0, /* size (0 = byte, 1 = short, 2 = long) */
492 8, /* bitsize */
b34976b6 493 TRUE, /* pc_relative */
252b5132
RH
494 0, /* bitpos */
495 complain_overflow_dont, /* complain_on_overflow */
496 elf64_alpha_reloc_nil, /* special_function */
497 "NONE", /* name */
b34976b6 498 FALSE, /* partial_inplace */
252b5132
RH
499 0, /* src_mask */
500 0, /* dst_mask */
b34976b6 501 TRUE), /* pcrel_offset */
252b5132
RH
502
503 /* A 32 bit reference to a symbol. */
504 HOWTO (R_ALPHA_REFLONG, /* type */
505 0, /* rightshift */
506 2, /* size (0 = byte, 1 = short, 2 = long) */
507 32, /* bitsize */
b34976b6 508 FALSE, /* pc_relative */
252b5132
RH
509 0, /* bitpos */
510 complain_overflow_bitfield, /* complain_on_overflow */
bc1bc43f 511 bfd_elf_generic_reloc, /* special_function */
252b5132 512 "REFLONG", /* name */
b34976b6 513 FALSE, /* partial_inplace */
252b5132
RH
514 0xffffffff, /* src_mask */
515 0xffffffff, /* dst_mask */
b34976b6 516 FALSE), /* pcrel_offset */
252b5132
RH
517
518 /* A 64 bit reference to a symbol. */
519 HOWTO (R_ALPHA_REFQUAD, /* type */
520 0, /* rightshift */
521 4, /* size (0 = byte, 1 = short, 2 = long) */
522 64, /* bitsize */
b34976b6 523 FALSE, /* pc_relative */
252b5132
RH
524 0, /* bitpos */
525 complain_overflow_bitfield, /* complain_on_overflow */
bc1bc43f 526 bfd_elf_generic_reloc, /* special_function */
252b5132 527 "REFQUAD", /* name */
b34976b6 528 FALSE, /* partial_inplace */
252b5132
RH
529 MINUS_ONE, /* src_mask */
530 MINUS_ONE, /* dst_mask */
b34976b6 531 FALSE), /* pcrel_offset */
252b5132
RH
532
533 /* A 32 bit GP relative offset. This is just like REFLONG except
534 that when the value is used the value of the gp register will be
535 added in. */
536 HOWTO (R_ALPHA_GPREL32, /* type */
537 0, /* rightshift */
538 2, /* size (0 = byte, 1 = short, 2 = long) */
539 32, /* bitsize */
b34976b6 540 FALSE, /* pc_relative */
252b5132
RH
541 0, /* bitpos */
542 complain_overflow_bitfield, /* complain_on_overflow */
bc1bc43f 543 bfd_elf_generic_reloc, /* special_function */
252b5132 544 "GPREL32", /* name */
b34976b6 545 FALSE, /* partial_inplace */
252b5132
RH
546 0xffffffff, /* src_mask */
547 0xffffffff, /* dst_mask */
b34976b6 548 FALSE), /* pcrel_offset */
252b5132
RH
549
550 /* Used for an instruction that refers to memory off the GP register. */
551 HOWTO (R_ALPHA_LITERAL, /* type */
552 0, /* rightshift */
dfe57ca0 553 1, /* size (0 = byte, 1 = short, 2 = long) */
252b5132 554 16, /* bitsize */
b34976b6 555 FALSE, /* pc_relative */
252b5132
RH
556 0, /* bitpos */
557 complain_overflow_signed, /* complain_on_overflow */
bc1bc43f 558 bfd_elf_generic_reloc, /* special_function */
252b5132 559 "ELF_LITERAL", /* name */
b34976b6 560 FALSE, /* partial_inplace */
252b5132
RH
561 0xffff, /* src_mask */
562 0xffff, /* dst_mask */
b34976b6 563 FALSE), /* pcrel_offset */
252b5132
RH
564
565 /* This reloc only appears immediately following an ELF_LITERAL reloc.
566 It identifies a use of the literal. The symbol index is special:
567 1 means the literal address is in the base register of a memory
568 format instruction; 2 means the literal address is in the byte
569 offset register of a byte-manipulation instruction; 3 means the
570 literal address is in the target register of a jsr instruction.
571 This does not actually do any relocation. */
572 HOWTO (R_ALPHA_LITUSE, /* type */
573 0, /* rightshift */
dfe57ca0 574 1, /* size (0 = byte, 1 = short, 2 = long) */
252b5132 575 32, /* bitsize */
b34976b6 576 FALSE, /* pc_relative */
252b5132
RH
577 0, /* bitpos */
578 complain_overflow_dont, /* complain_on_overflow */
579 elf64_alpha_reloc_nil, /* special_function */
580 "LITUSE", /* name */
b34976b6 581 FALSE, /* partial_inplace */
252b5132
RH
582 0, /* src_mask */
583 0, /* dst_mask */
b34976b6 584 FALSE), /* pcrel_offset */
252b5132
RH
585
586 /* Load the gp register. This is always used for a ldah instruction
587 which loads the upper 16 bits of the gp register. The symbol
588 index of the GPDISP instruction is an offset in bytes to the lda
589 instruction that loads the lower 16 bits. The value to use for
590 the relocation is the difference between the GP value and the
591 current location; the load will always be done against a register
592 holding the current address.
593
594 NOTE: Unlike ECOFF, partial in-place relocation is not done. If
595 any offset is present in the instructions, it is an offset from
596 the register to the ldah instruction. This lets us avoid any
597 stupid hackery like inventing a gp value to do partial relocation
598 against. Also unlike ECOFF, we do the whole relocation off of
599 the GPDISP rather than a GPDISP_HI16/GPDISP_LO16 pair. An odd,
600 space consuming bit, that, since all the information was present
601 in the GPDISP_HI16 reloc. */
602 HOWTO (R_ALPHA_GPDISP, /* type */
603 16, /* rightshift */
604 2, /* size (0 = byte, 1 = short, 2 = long) */
605 16, /* bitsize */
b34976b6 606 FALSE, /* pc_relative */
252b5132
RH
607 0, /* bitpos */
608 complain_overflow_dont, /* complain_on_overflow */
609 elf64_alpha_reloc_gpdisp, /* special_function */
610 "GPDISP", /* name */
b34976b6 611 FALSE, /* partial_inplace */
252b5132
RH
612 0xffff, /* src_mask */
613 0xffff, /* dst_mask */
b34976b6 614 TRUE), /* pcrel_offset */
252b5132
RH
615
616 /* A 21 bit branch. */
617 HOWTO (R_ALPHA_BRADDR, /* type */
618 2, /* rightshift */
619 2, /* size (0 = byte, 1 = short, 2 = long) */
620 21, /* bitsize */
b34976b6 621 TRUE, /* pc_relative */
252b5132
RH
622 0, /* bitpos */
623 complain_overflow_signed, /* complain_on_overflow */
bc1bc43f 624 bfd_elf_generic_reloc, /* special_function */
252b5132 625 "BRADDR", /* name */
b34976b6 626 FALSE, /* partial_inplace */
252b5132
RH
627 0x1fffff, /* src_mask */
628 0x1fffff, /* dst_mask */
b34976b6 629 TRUE), /* pcrel_offset */
252b5132
RH
630
631 /* A hint for a jump to a register. */
632 HOWTO (R_ALPHA_HINT, /* type */
633 2, /* rightshift */
dfe57ca0 634 1, /* size (0 = byte, 1 = short, 2 = long) */
252b5132 635 14, /* bitsize */
b34976b6 636 TRUE, /* pc_relative */
252b5132
RH
637 0, /* bitpos */
638 complain_overflow_dont, /* complain_on_overflow */
bc1bc43f 639 bfd_elf_generic_reloc, /* special_function */
252b5132 640 "HINT", /* name */
b34976b6 641 FALSE, /* partial_inplace */
252b5132
RH
642 0x3fff, /* src_mask */
643 0x3fff, /* dst_mask */
b34976b6 644 TRUE), /* pcrel_offset */
252b5132
RH
645
646 /* 16 bit PC relative offset. */
647 HOWTO (R_ALPHA_SREL16, /* type */
648 0, /* rightshift */
649 1, /* size (0 = byte, 1 = short, 2 = long) */
650 16, /* bitsize */
b34976b6 651 TRUE, /* pc_relative */
252b5132
RH
652 0, /* bitpos */
653 complain_overflow_signed, /* complain_on_overflow */
bc1bc43f 654 bfd_elf_generic_reloc, /* special_function */
252b5132 655 "SREL16", /* name */
b34976b6 656 FALSE, /* partial_inplace */
252b5132
RH
657 0xffff, /* src_mask */
658 0xffff, /* dst_mask */
b34976b6 659 TRUE), /* pcrel_offset */
252b5132
RH
660
661 /* 32 bit PC relative offset. */
662 HOWTO (R_ALPHA_SREL32, /* type */
663 0, /* rightshift */
664 2, /* size (0 = byte, 1 = short, 2 = long) */
665 32, /* bitsize */
b34976b6 666 TRUE, /* pc_relative */
252b5132
RH
667 0, /* bitpos */
668 complain_overflow_signed, /* complain_on_overflow */
bc1bc43f 669 bfd_elf_generic_reloc, /* special_function */
252b5132 670 "SREL32", /* name */
b34976b6 671 FALSE, /* partial_inplace */
252b5132
RH
672 0xffffffff, /* src_mask */
673 0xffffffff, /* dst_mask */
b34976b6 674 TRUE), /* pcrel_offset */
252b5132
RH
675
676 /* A 64 bit PC relative offset. */
677 HOWTO (R_ALPHA_SREL64, /* type */
678 0, /* rightshift */
679 4, /* size (0 = byte, 1 = short, 2 = long) */
680 64, /* bitsize */
b34976b6 681 TRUE, /* pc_relative */
252b5132
RH
682 0, /* bitpos */
683 complain_overflow_signed, /* complain_on_overflow */
bc1bc43f 684 bfd_elf_generic_reloc, /* special_function */
252b5132 685 "SREL64", /* name */
b34976b6 686 FALSE, /* partial_inplace */
252b5132
RH
687 MINUS_ONE, /* src_mask */
688 MINUS_ONE, /* dst_mask */
b34976b6 689 TRUE), /* pcrel_offset */
252b5132 690
dfe57ca0
RH
691 /* Skip 12 - 16; deprecated ECOFF relocs. */
692 SKIP_HOWTO (12),
693 SKIP_HOWTO (13),
694 SKIP_HOWTO (14),
695 SKIP_HOWTO (15),
696 SKIP_HOWTO (16),
252b5132
RH
697
698 /* The high 16 bits of the displacement from GP to the target. */
699 HOWTO (R_ALPHA_GPRELHIGH,
700 0, /* rightshift */
dfe57ca0 701 1, /* size (0 = byte, 1 = short, 2 = long) */
252b5132 702 16, /* bitsize */
b34976b6 703 FALSE, /* pc_relative */
252b5132
RH
704 0, /* bitpos */
705 complain_overflow_signed, /* complain_on_overflow */
bc1bc43f 706 bfd_elf_generic_reloc, /* special_function */
252b5132 707 "GPRELHIGH", /* name */
b34976b6 708 FALSE, /* partial_inplace */
252b5132
RH
709 0xffff, /* src_mask */
710 0xffff, /* dst_mask */
b34976b6 711 FALSE), /* pcrel_offset */
252b5132
RH
712
713 /* The low 16 bits of the displacement from GP to the target. */
714 HOWTO (R_ALPHA_GPRELLOW,
715 0, /* rightshift */
dfe57ca0 716 1, /* size (0 = byte, 1 = short, 2 = long) */
252b5132 717 16, /* bitsize */
b34976b6 718 FALSE, /* pc_relative */
252b5132
RH
719 0, /* bitpos */
720 complain_overflow_dont, /* complain_on_overflow */
bc1bc43f 721 bfd_elf_generic_reloc, /* special_function */
252b5132 722 "GPRELLOW", /* name */
b34976b6 723 FALSE, /* partial_inplace */
252b5132
RH
724 0xffff, /* src_mask */
725 0xffff, /* dst_mask */
b34976b6 726 FALSE), /* pcrel_offset */
252b5132
RH
727
728 /* A 16-bit displacement from the GP to the target. */
dfe57ca0 729 HOWTO (R_ALPHA_GPREL16,
252b5132 730 0, /* rightshift */
dfe57ca0 731 1, /* size (0 = byte, 1 = short, 2 = long) */
252b5132 732 16, /* bitsize */
b34976b6 733 FALSE, /* pc_relative */
252b5132
RH
734 0, /* bitpos */
735 complain_overflow_signed, /* complain_on_overflow */
bc1bc43f 736 bfd_elf_generic_reloc, /* special_function */
dfe57ca0 737 "GPREL16", /* name */
b34976b6 738 FALSE, /* partial_inplace */
252b5132
RH
739 0xffff, /* src_mask */
740 0xffff, /* dst_mask */
b34976b6 741 FALSE), /* pcrel_offset */
252b5132 742
dfe57ca0
RH
743 /* Skip 20 - 23; deprecated ECOFF relocs. */
744 SKIP_HOWTO (20),
745 SKIP_HOWTO (21),
746 SKIP_HOWTO (22),
747 SKIP_HOWTO (23),
252b5132 748
fe8bc63d 749 /* Misc ELF relocations. */
252b5132
RH
750
751 /* A dynamic relocation to copy the target into our .dynbss section. */
752 /* Not generated, as all Alpha objects use PIC, so it is not needed. It
753 is present because every other ELF has one, but should not be used
754 because .dynbss is an ugly thing. */
755 HOWTO (R_ALPHA_COPY,
756 0,
757 0,
758 0,
b34976b6 759 FALSE,
252b5132
RH
760 0,
761 complain_overflow_dont,
762 bfd_elf_generic_reloc,
763 "COPY",
b34976b6 764 FALSE,
252b5132
RH
765 0,
766 0,
b34976b6 767 TRUE),
252b5132
RH
768
769 /* A dynamic relocation for a .got entry. */
770 HOWTO (R_ALPHA_GLOB_DAT,
771 0,
772 0,
773 0,
b34976b6 774 FALSE,
252b5132
RH
775 0,
776 complain_overflow_dont,
777 bfd_elf_generic_reloc,
778 "GLOB_DAT",
b34976b6 779 FALSE,
252b5132
RH
780 0,
781 0,
b34976b6 782 TRUE),
252b5132
RH
783
784 /* A dynamic relocation for a .plt entry. */
785 HOWTO (R_ALPHA_JMP_SLOT,
786 0,
787 0,
788 0,
b34976b6 789 FALSE,
252b5132
RH
790 0,
791 complain_overflow_dont,
792 bfd_elf_generic_reloc,
793 "JMP_SLOT",
b34976b6 794 FALSE,
252b5132
RH
795 0,
796 0,
b34976b6 797 TRUE),
252b5132
RH
798
799 /* A dynamic relocation to add the base of the DSO to a 64-bit field. */
800 HOWTO (R_ALPHA_RELATIVE,
801 0,
802 0,
803 0,
b34976b6 804 FALSE,
252b5132
RH
805 0,
806 complain_overflow_dont,
807 bfd_elf_generic_reloc,
808 "RELATIVE",
b34976b6 809 FALSE,
252b5132
RH
810 0,
811 0,
b34976b6 812 TRUE),
7793f4d0
RH
813
814 /* A 21 bit branch that adjusts for gp loads. */
815 HOWTO (R_ALPHA_BRSGP, /* type */
816 2, /* rightshift */
817 2, /* size (0 = byte, 1 = short, 2 = long) */
818 21, /* bitsize */
b34976b6 819 TRUE, /* pc_relative */
7793f4d0
RH
820 0, /* bitpos */
821 complain_overflow_signed, /* complain_on_overflow */
bc1bc43f 822 bfd_elf_generic_reloc, /* special_function */
7793f4d0 823 "BRSGP", /* name */
b34976b6 824 FALSE, /* partial_inplace */
7793f4d0
RH
825 0x1fffff, /* src_mask */
826 0x1fffff, /* dst_mask */
b34976b6 827 TRUE), /* pcrel_offset */
3765b1be
RH
828
829 /* Creates a tls_index for the symbol in the got. */
830 HOWTO (R_ALPHA_TLSGD, /* type */
831 0, /* rightshift */
832 1, /* size (0 = byte, 1 = short, 2 = long) */
833 16, /* bitsize */
b34976b6 834 FALSE, /* pc_relative */
3765b1be
RH
835 0, /* bitpos */
836 complain_overflow_signed, /* complain_on_overflow */
bc1bc43f 837 bfd_elf_generic_reloc, /* special_function */
3765b1be 838 "TLSGD", /* name */
b34976b6 839 FALSE, /* partial_inplace */
3765b1be
RH
840 0xffff, /* src_mask */
841 0xffff, /* dst_mask */
b34976b6 842 FALSE), /* pcrel_offset */
3765b1be
RH
843
844 /* Creates a tls_index for the (current) module in the got. */
845 HOWTO (R_ALPHA_TLSLDM, /* type */
846 0, /* rightshift */
847 1, /* size (0 = byte, 1 = short, 2 = long) */
848 16, /* bitsize */
b34976b6 849 FALSE, /* pc_relative */
3765b1be
RH
850 0, /* bitpos */
851 complain_overflow_signed, /* complain_on_overflow */
bc1bc43f 852 bfd_elf_generic_reloc, /* special_function */
3765b1be 853 "TLSLDM", /* name */
b34976b6 854 FALSE, /* partial_inplace */
3765b1be
RH
855 0xffff, /* src_mask */
856 0xffff, /* dst_mask */
b34976b6 857 FALSE), /* pcrel_offset */
3765b1be
RH
858
859 /* A dynamic relocation for a DTP module entry. */
860 HOWTO (R_ALPHA_DTPMOD64, /* type */
861 0, /* rightshift */
862 4, /* size (0 = byte, 1 = short, 2 = long) */
863 64, /* bitsize */
b34976b6 864 FALSE, /* pc_relative */
3765b1be
RH
865 0, /* bitpos */
866 complain_overflow_bitfield, /* complain_on_overflow */
bc1bc43f 867 bfd_elf_generic_reloc, /* special_function */
3765b1be 868 "DTPMOD64", /* name */
b34976b6 869 FALSE, /* partial_inplace */
3765b1be
RH
870 MINUS_ONE, /* src_mask */
871 MINUS_ONE, /* dst_mask */
b34976b6 872 FALSE), /* pcrel_offset */
3765b1be
RH
873
874 /* Creates a 64-bit offset in the got for the displacement
875 from DTP to the target. */
876 HOWTO (R_ALPHA_GOTDTPREL, /* type */
877 0, /* rightshift */
878 1, /* size (0 = byte, 1 = short, 2 = long) */
879 16, /* bitsize */
b34976b6 880 FALSE, /* pc_relative */
3765b1be
RH
881 0, /* bitpos */
882 complain_overflow_signed, /* complain_on_overflow */
bc1bc43f 883 bfd_elf_generic_reloc, /* special_function */
3765b1be 884 "GOTDTPREL", /* name */
b34976b6 885 FALSE, /* partial_inplace */
3765b1be
RH
886 0xffff, /* src_mask */
887 0xffff, /* dst_mask */
b34976b6 888 FALSE), /* pcrel_offset */
3765b1be
RH
889
890 /* A dynamic relocation for a displacement from DTP to the target. */
891 HOWTO (R_ALPHA_DTPREL64, /* type */
892 0, /* rightshift */
893 4, /* size (0 = byte, 1 = short, 2 = long) */
894 64, /* bitsize */
b34976b6 895 FALSE, /* pc_relative */
3765b1be
RH
896 0, /* bitpos */
897 complain_overflow_bitfield, /* complain_on_overflow */
bc1bc43f 898 bfd_elf_generic_reloc, /* special_function */
3765b1be 899 "DTPREL64", /* name */
b34976b6 900 FALSE, /* partial_inplace */
3765b1be
RH
901 MINUS_ONE, /* src_mask */
902 MINUS_ONE, /* dst_mask */
b34976b6 903 FALSE), /* pcrel_offset */
3765b1be
RH
904
905 /* The high 16 bits of the displacement from DTP to the target. */
906 HOWTO (R_ALPHA_DTPRELHI, /* type */
907 0, /* rightshift */
908 1, /* size (0 = byte, 1 = short, 2 = long) */
909 16, /* bitsize */
b34976b6 910 FALSE, /* pc_relative */
3765b1be
RH
911 0, /* bitpos */
912 complain_overflow_signed, /* complain_on_overflow */
bc1bc43f 913 bfd_elf_generic_reloc, /* special_function */
3765b1be 914 "DTPRELHI", /* name */
b34976b6 915 FALSE, /* partial_inplace */
3765b1be
RH
916 0xffff, /* src_mask */
917 0xffff, /* dst_mask */
b34976b6 918 FALSE), /* pcrel_offset */
3765b1be
RH
919
920 /* The low 16 bits of the displacement from DTP to the target. */
921 HOWTO (R_ALPHA_DTPRELLO, /* type */
922 0, /* rightshift */
923 1, /* size (0 = byte, 1 = short, 2 = long) */
924 16, /* bitsize */
b34976b6 925 FALSE, /* pc_relative */
3765b1be
RH
926 0, /* bitpos */
927 complain_overflow_dont, /* complain_on_overflow */
bc1bc43f 928 bfd_elf_generic_reloc, /* special_function */
3765b1be 929 "DTPRELLO", /* name */
b34976b6 930 FALSE, /* partial_inplace */
3765b1be
RH
931 0xffff, /* src_mask */
932 0xffff, /* dst_mask */
b34976b6 933 FALSE), /* pcrel_offset */
3765b1be
RH
934
935 /* A 16-bit displacement from DTP to the target. */
936 HOWTO (R_ALPHA_DTPREL16, /* type */
937 0, /* rightshift */
938 1, /* size (0 = byte, 1 = short, 2 = long) */
939 16, /* bitsize */
b34976b6 940 FALSE, /* pc_relative */
3765b1be
RH
941 0, /* bitpos */
942 complain_overflow_signed, /* complain_on_overflow */
bc1bc43f 943 bfd_elf_generic_reloc, /* special_function */
3765b1be 944 "DTPREL16", /* name */
b34976b6 945 FALSE, /* partial_inplace */
3765b1be
RH
946 0xffff, /* src_mask */
947 0xffff, /* dst_mask */
b34976b6 948 FALSE), /* pcrel_offset */
3765b1be
RH
949
950 /* Creates a 64-bit offset in the got for the displacement
951 from TP to the target. */
952 HOWTO (R_ALPHA_GOTTPREL, /* type */
953 0, /* rightshift */
954 1, /* size (0 = byte, 1 = short, 2 = long) */
955 16, /* bitsize */
b34976b6 956 FALSE, /* pc_relative */
3765b1be
RH
957 0, /* bitpos */
958 complain_overflow_signed, /* complain_on_overflow */
bc1bc43f 959 bfd_elf_generic_reloc, /* special_function */
3765b1be 960 "GOTTPREL", /* name */
b34976b6 961 FALSE, /* partial_inplace */
3765b1be
RH
962 0xffff, /* src_mask */
963 0xffff, /* dst_mask */
b34976b6 964 FALSE), /* pcrel_offset */
3765b1be
RH
965
966 /* A dynamic relocation for a displacement from TP to the target. */
967 HOWTO (R_ALPHA_TPREL64, /* type */
968 0, /* rightshift */
969 4, /* size (0 = byte, 1 = short, 2 = long) */
970 64, /* bitsize */
b34976b6 971 FALSE, /* pc_relative */
3765b1be
RH
972 0, /* bitpos */
973 complain_overflow_bitfield, /* complain_on_overflow */
bc1bc43f 974 bfd_elf_generic_reloc, /* special_function */
3765b1be 975 "TPREL64", /* name */
b34976b6 976 FALSE, /* partial_inplace */
3765b1be
RH
977 MINUS_ONE, /* src_mask */
978 MINUS_ONE, /* dst_mask */
b34976b6 979 FALSE), /* pcrel_offset */
3765b1be
RH
980
981 /* The high 16 bits of the displacement from TP to the target. */
982 HOWTO (R_ALPHA_TPRELHI, /* type */
983 0, /* rightshift */
984 1, /* size (0 = byte, 1 = short, 2 = long) */
985 16, /* bitsize */
b34976b6 986 FALSE, /* pc_relative */
3765b1be
RH
987 0, /* bitpos */
988 complain_overflow_signed, /* complain_on_overflow */
bc1bc43f 989 bfd_elf_generic_reloc, /* special_function */
3765b1be 990 "TPRELHI", /* name */
b34976b6 991 FALSE, /* partial_inplace */
3765b1be
RH
992 0xffff, /* src_mask */
993 0xffff, /* dst_mask */
b34976b6 994 FALSE), /* pcrel_offset */
3765b1be
RH
995
996 /* The low 16 bits of the displacement from TP to the target. */
997 HOWTO (R_ALPHA_TPRELLO, /* type */
998 0, /* rightshift */
999 1, /* size (0 = byte, 1 = short, 2 = long) */
1000 16, /* bitsize */
b34976b6 1001 FALSE, /* pc_relative */
3765b1be
RH
1002 0, /* bitpos */
1003 complain_overflow_dont, /* complain_on_overflow */
bc1bc43f 1004 bfd_elf_generic_reloc, /* special_function */
3765b1be 1005 "TPRELLO", /* name */
b34976b6 1006 FALSE, /* partial_inplace */
3765b1be
RH
1007 0xffff, /* src_mask */
1008 0xffff, /* dst_mask */
b34976b6 1009 FALSE), /* pcrel_offset */
3765b1be
RH
1010
1011 /* A 16-bit displacement from TP to the target. */
1012 HOWTO (R_ALPHA_TPREL16, /* type */
1013 0, /* rightshift */
1014 1, /* size (0 = byte, 1 = short, 2 = long) */
1015 16, /* bitsize */
b34976b6 1016 FALSE, /* pc_relative */
3765b1be
RH
1017 0, /* bitpos */
1018 complain_overflow_signed, /* complain_on_overflow */
bc1bc43f 1019 bfd_elf_generic_reloc, /* special_function */
3765b1be 1020 "TPREL16", /* name */
b34976b6 1021 FALSE, /* partial_inplace */
3765b1be
RH
1022 0xffff, /* src_mask */
1023 0xffff, /* dst_mask */
b34976b6 1024 FALSE), /* pcrel_offset */
252b5132
RH
1025};
1026
252b5132
RH
1027/* A mapping from BFD reloc types to Alpha ELF reloc types. */
1028
1029struct elf_reloc_map
1030{
1031 bfd_reloc_code_real_type bfd_reloc_val;
1032 int elf_reloc_val;
1033};
1034
1035static const struct elf_reloc_map elf64_alpha_reloc_map[] =
1036{
dfe57ca0
RH
1037 {BFD_RELOC_NONE, R_ALPHA_NONE},
1038 {BFD_RELOC_32, R_ALPHA_REFLONG},
1039 {BFD_RELOC_64, R_ALPHA_REFQUAD},
1040 {BFD_RELOC_CTOR, R_ALPHA_REFQUAD},
1041 {BFD_RELOC_GPREL32, R_ALPHA_GPREL32},
1042 {BFD_RELOC_ALPHA_ELF_LITERAL, R_ALPHA_LITERAL},
1043 {BFD_RELOC_ALPHA_LITUSE, R_ALPHA_LITUSE},
1044 {BFD_RELOC_ALPHA_GPDISP, R_ALPHA_GPDISP},
1045 {BFD_RELOC_23_PCREL_S2, R_ALPHA_BRADDR},
1046 {BFD_RELOC_ALPHA_HINT, R_ALPHA_HINT},
1047 {BFD_RELOC_16_PCREL, R_ALPHA_SREL16},
1048 {BFD_RELOC_32_PCREL, R_ALPHA_SREL32},
1049 {BFD_RELOC_64_PCREL, R_ALPHA_SREL64},
1050 {BFD_RELOC_ALPHA_GPREL_HI16, R_ALPHA_GPRELHIGH},
1051 {BFD_RELOC_ALPHA_GPREL_LO16, R_ALPHA_GPRELLOW},
1052 {BFD_RELOC_GPREL16, R_ALPHA_GPREL16},
7793f4d0 1053 {BFD_RELOC_ALPHA_BRSGP, R_ALPHA_BRSGP},
3765b1be
RH
1054 {BFD_RELOC_ALPHA_TLSGD, R_ALPHA_TLSGD},
1055 {BFD_RELOC_ALPHA_TLSLDM, R_ALPHA_TLSLDM},
1056 {BFD_RELOC_ALPHA_DTPMOD64, R_ALPHA_DTPMOD64},
1057 {BFD_RELOC_ALPHA_GOTDTPREL16, R_ALPHA_GOTDTPREL},
1058 {BFD_RELOC_ALPHA_DTPREL64, R_ALPHA_DTPREL64},
1059 {BFD_RELOC_ALPHA_DTPREL_HI16, R_ALPHA_DTPRELHI},
1060 {BFD_RELOC_ALPHA_DTPREL_LO16, R_ALPHA_DTPRELLO},
1061 {BFD_RELOC_ALPHA_DTPREL16, R_ALPHA_DTPREL16},
1062 {BFD_RELOC_ALPHA_GOTTPREL16, R_ALPHA_GOTTPREL},
1063 {BFD_RELOC_ALPHA_TPREL64, R_ALPHA_TPREL64},
1064 {BFD_RELOC_ALPHA_TPREL_HI16, R_ALPHA_TPRELHI},
1065 {BFD_RELOC_ALPHA_TPREL_LO16, R_ALPHA_TPRELLO},
1066 {BFD_RELOC_ALPHA_TPREL16, R_ALPHA_TPREL16},
252b5132
RH
1067};
1068
1069/* Given a BFD reloc type, return a HOWTO structure. */
1070
1071static reloc_howto_type *
a7519a3c
RH
1072elf64_alpha_bfd_reloc_type_lookup (bfd *abfd ATTRIBUTE_UNUSED,
1073 bfd_reloc_code_real_type code)
252b5132
RH
1074{
1075 const struct elf_reloc_map *i, *e;
1076 i = e = elf64_alpha_reloc_map;
1077 e += sizeof (elf64_alpha_reloc_map) / sizeof (struct elf_reloc_map);
1078 for (; i != e; ++i)
1079 {
1080 if (i->bfd_reloc_val == code)
1081 return &elf64_alpha_howto_table[i->elf_reloc_val];
1082 }
1083 return 0;
1084}
1085
157090f7
AM
1086static reloc_howto_type *
1087elf64_alpha_bfd_reloc_name_lookup (bfd *abfd ATTRIBUTE_UNUSED,
1088 const char *r_name)
1089{
1090 unsigned int i;
1091
1092 for (i = 0;
1093 i < (sizeof (elf64_alpha_howto_table)
1094 / sizeof (elf64_alpha_howto_table[0]));
1095 i++)
1096 if (elf64_alpha_howto_table[i].name != NULL
1097 && strcasecmp (elf64_alpha_howto_table[i].name, r_name) == 0)
1098 return &elf64_alpha_howto_table[i];
1099
1100 return NULL;
1101}
1102
252b5132
RH
1103/* Given an Alpha ELF reloc type, fill in an arelent structure. */
1104
1105static void
a7519a3c
RH
1106elf64_alpha_info_to_howto (bfd *abfd ATTRIBUTE_UNUSED, arelent *cache_ptr,
1107 Elf_Internal_Rela *dst)
252b5132 1108{
a7519a3c 1109 unsigned r_type = ELF64_R_TYPE(dst->r_info);
252b5132
RH
1110 BFD_ASSERT (r_type < (unsigned int) R_ALPHA_max);
1111 cache_ptr->howto = &elf64_alpha_howto_table[r_type];
1112}
3765b1be
RH
1113
1114/* These two relocations create a two-word entry in the got. */
1115#define alpha_got_entry_size(r_type) \
1116 (r_type == R_ALPHA_TLSGD || r_type == R_ALPHA_TLSLDM ? 16 : 8)
9e756d64
RH
1117
1118/* This is PT_TLS segment p_vaddr. */
e1918d23
AM
1119#define alpha_get_dtprel_base(info) \
1120 (elf_hash_table (info)->tls_sec->vma)
9e756d64
RH
1121
1122/* Main program TLS (whose template starts at PT_TLS p_vaddr)
1123 is assigned offset round(16, PT_TLS p_align). */
e1918d23
AM
1124#define alpha_get_tprel_base(info) \
1125 (elf_hash_table (info)->tls_sec->vma \
1126 - align_power ((bfd_vma) 16, \
1127 elf_hash_table (info)->tls_sec->alignment_power))
252b5132 1128\f
a7519a3c
RH
1129/* Handle an Alpha specific section when reading an object file. This
1130 is called when bfd_section_from_shdr finds a section with an unknown
1131 type.
1132 FIXME: We need to handle the SHF_ALPHA_GPREL flag, but I'm not sure
1133 how to. */
252b5132 1134
a7519a3c
RH
1135static bfd_boolean
1136elf64_alpha_section_from_shdr (bfd *abfd,
1137 Elf_Internal_Shdr *hdr,
1138 const char *name,
1139 int shindex)
252b5132 1140{
a7519a3c
RH
1141 asection *newsect;
1142
1143 /* There ought to be a place to keep ELF backend specific flags, but
1144 at the moment there isn't one. We just keep track of the
1145 sections by their name, instead. Fortunately, the ABI gives
1146 suggested names for all the MIPS specific sections, so we will
1147 probably get away with this. */
1148 switch (hdr->sh_type)
1149 {
1150 case SHT_ALPHA_DEBUG:
1151 if (strcmp (name, ".mdebug") != 0)
1152 return FALSE;
1153 break;
1154 default:
1155 return FALSE;
1156 }
252b5132 1157
a7519a3c
RH
1158 if (! _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex))
1159 return FALSE;
1160 newsect = hdr->bfd_section;
252b5132 1161
a7519a3c 1162 if (hdr->sh_type == SHT_ALPHA_DEBUG)
252b5132 1163 {
a7519a3c
RH
1164 if (! bfd_set_section_flags (abfd, newsect,
1165 (bfd_get_section_flags (abfd, newsect)
1166 | SEC_DEBUGGING)))
1167 return FALSE;
252b5132 1168 }
a7519a3c
RH
1169
1170 return TRUE;
252b5132
RH
1171}
1172
a7519a3c
RH
1173/* Convert Alpha specific section flags to bfd internal section flags. */
1174
b34976b6 1175static bfd_boolean
a7519a3c 1176elf64_alpha_section_flags (flagword *flags, const Elf_Internal_Shdr *hdr)
252b5132 1177{
a7519a3c
RH
1178 if (hdr->sh_flags & SHF_ALPHA_GPREL)
1179 *flags |= SEC_SMALL_DATA;
252b5132 1180
a7519a3c
RH
1181 return TRUE;
1182}
252b5132 1183
a7519a3c
RH
1184/* Set the correct type for an Alpha ELF section. We do this by the
1185 section name, which is a hack, but ought to work. */
9e756d64 1186
a7519a3c
RH
1187static bfd_boolean
1188elf64_alpha_fake_sections (bfd *abfd, Elf_Internal_Shdr *hdr, asection *sec)
1189{
1190 register const char *name;
1191
1192 name = bfd_get_section_name (abfd, sec);
1193
1194 if (strcmp (name, ".mdebug") == 0)
252b5132 1195 {
a7519a3c
RH
1196 hdr->sh_type = SHT_ALPHA_DEBUG;
1197 /* In a shared object on Irix 5.3, the .mdebug section has an
1198 entsize of 0. FIXME: Does this matter? */
1199 if ((abfd->flags & DYNAMIC) != 0 )
1200 hdr->sh_entsize = 0;
1201 else
1202 hdr->sh_entsize = 1;
252b5132 1203 }
a7519a3c
RH
1204 else if ((sec->flags & SEC_SMALL_DATA)
1205 || strcmp (name, ".sdata") == 0
1206 || strcmp (name, ".sbss") == 0
1207 || strcmp (name, ".lit4") == 0
1208 || strcmp (name, ".lit8") == 0)
1209 hdr->sh_flags |= SHF_ALPHA_GPREL;
252b5132 1210
a7519a3c
RH
1211 return TRUE;
1212}
252b5132 1213
a7519a3c
RH
1214/* Hook called by the linker routine which adds symbols from an object
1215 file. We use it to put .comm items in .sbss, and not .bss. */
1216
1217static bfd_boolean
1218elf64_alpha_add_symbol_hook (bfd *abfd, struct bfd_link_info *info,
1219 Elf_Internal_Sym *sym,
1220 const char **namep ATTRIBUTE_UNUSED,
1221 flagword *flagsp ATTRIBUTE_UNUSED,
1222 asection **secp, bfd_vma *valp)
1223{
1224 if (sym->st_shndx == SHN_COMMON
1225 && !info->relocatable
1226 && sym->st_size <= elf_gp_size (abfd))
252b5132 1227 {
a7519a3c
RH
1228 /* Common symbols less than or equal to -G nn bytes are
1229 automatically put into .sbss. */
ffcb7aff 1230
a7519a3c 1231 asection *scomm = bfd_get_section_by_name (abfd, ".scommon");
252b5132 1232
a7519a3c 1233 if (scomm == NULL)
252b5132 1234 {
a7519a3c
RH
1235 scomm = bfd_make_section_with_flags (abfd, ".scommon",
1236 (SEC_ALLOC
1237 | SEC_IS_COMMON
1238 | SEC_LINKER_CREATED));
1239 if (scomm == NULL)
1240 return FALSE;
1241 }
ffcb7aff 1242
a7519a3c
RH
1243 *secp = scomm;
1244 *valp = sym->st_size;
1245 }
ffcb7aff 1246
a7519a3c
RH
1247 return TRUE;
1248}
252b5132 1249
a7519a3c 1250/* Create the .got section. */
252b5132 1251
a7519a3c
RH
1252static bfd_boolean
1253elf64_alpha_create_got_section (bfd *abfd,
1254 struct bfd_link_info *info ATTRIBUTE_UNUSED)
1255{
85d162e6 1256 flagword flags;
a7519a3c 1257 asection *s;
252b5132 1258
0ffa91dd
NC
1259 if (! is_alpha_elf (abfd))
1260 return FALSE;
1261
85d162e6
AM
1262 flags = (SEC_ALLOC | SEC_LOAD | SEC_HAS_CONTENTS | SEC_IN_MEMORY
1263 | SEC_LINKER_CREATED);
1264 s = bfd_make_section_anyway_with_flags (abfd, ".got", flags);
a7519a3c
RH
1265 if (s == NULL
1266 || !bfd_set_section_alignment (abfd, s, 3))
1267 return FALSE;
252b5132 1268
a7519a3c 1269 alpha_elf_tdata (abfd)->got = s;
252b5132 1270
85d162e6
AM
1271 /* Make sure the object's gotobj is set to itself so that we default
1272 to every object with its own .got. We'll merge .gots later once
1273 we've collected each object's info. */
1274 alpha_elf_tdata (abfd)->gotobj = abfd;
1275
a7519a3c
RH
1276 return TRUE;
1277}
252b5132 1278
a7519a3c 1279/* Create all the dynamic sections. */
252b5132 1280
a7519a3c
RH
1281static bfd_boolean
1282elf64_alpha_create_dynamic_sections (bfd *abfd, struct bfd_link_info *info)
1283{
1284 asection *s;
85d162e6 1285 flagword flags;
a7519a3c 1286 struct elf_link_hash_entry *h;
252b5132 1287
0ffa91dd
NC
1288 if (! is_alpha_elf (abfd))
1289 return FALSE;
1290
a7519a3c 1291 /* We need to create .plt, .rela.plt, .got, and .rela.got sections. */
252b5132 1292
85d162e6
AM
1293 flags = (SEC_ALLOC | SEC_LOAD | SEC_CODE | SEC_HAS_CONTENTS | SEC_IN_MEMORY
1294 | SEC_LINKER_CREATED
1295 | (elf64_alpha_use_secureplt ? SEC_READONLY : 0));
1296 s = bfd_make_section_anyway_with_flags (abfd, ".plt", flags);
6ec7057a 1297 if (s == NULL || ! bfd_set_section_alignment (abfd, s, 4))
a7519a3c 1298 return FALSE;
252b5132 1299
a7519a3c
RH
1300 /* Define the symbol _PROCEDURE_LINKAGE_TABLE_ at the start of the
1301 .plt section. */
7325306f
RS
1302 h = _bfd_elf_define_linkage_sym (abfd, info, s,
1303 "_PROCEDURE_LINKAGE_TABLE_");
1304 elf_hash_table (info)->hplt = h;
1305 if (h == NULL)
a7519a3c 1306 return FALSE;
d6ad34f6 1307
85d162e6
AM
1308 flags = (SEC_ALLOC | SEC_LOAD | SEC_HAS_CONTENTS | SEC_IN_MEMORY
1309 | SEC_LINKER_CREATED | SEC_READONLY);
1310 s = bfd_make_section_anyway_with_flags (abfd, ".rela.plt", flags);
6ec7057a 1311 if (s == NULL || ! bfd_set_section_alignment (abfd, s, 3))
a7519a3c 1312 return FALSE;
252b5132 1313
6ec7057a
RH
1314 if (elf64_alpha_use_secureplt)
1315 {
85d162e6
AM
1316 flags = SEC_ALLOC | SEC_LINKER_CREATED;
1317 s = bfd_make_section_anyway_with_flags (abfd, ".got.plt", flags);
6ec7057a
RH
1318 if (s == NULL || ! bfd_set_section_alignment (abfd, s, 3))
1319 return FALSE;
1320 }
1321
a7519a3c
RH
1322 /* We may or may not have created a .got section for this object, but
1323 we definitely havn't done the rest of the work. */
1cd6895c 1324
85d162e6
AM
1325 if (alpha_elf_tdata(abfd)->gotobj == NULL)
1326 {
1327 if (!elf64_alpha_create_got_section (abfd, info))
1328 return FALSE;
1329 }
1cd6895c 1330
85d162e6
AM
1331 flags = (SEC_ALLOC | SEC_LOAD | SEC_HAS_CONTENTS | SEC_IN_MEMORY
1332 | SEC_LINKER_CREATED | SEC_READONLY);
1333 s = bfd_make_section_anyway_with_flags (abfd, ".rela.got", flags);
a7519a3c
RH
1334 if (s == NULL
1335 || !bfd_set_section_alignment (abfd, s, 3))
1336 return FALSE;
252b5132 1337
a7519a3c
RH
1338 /* Define the symbol _GLOBAL_OFFSET_TABLE_ at the start of the
1339 dynobj's .got section. We don't do this in the linker script
1340 because we don't want to define the symbol if we are not creating
1341 a global offset table. */
d98685ac
AM
1342 h = _bfd_elf_define_linkage_sym (abfd, info, alpha_elf_tdata(abfd)->got,
1343 "_GLOBAL_OFFSET_TABLE_");
a7519a3c 1344 elf_hash_table (info)->hgot = h;
d98685ac
AM
1345 if (h == NULL)
1346 return FALSE;
252b5132 1347
a7519a3c 1348 return TRUE;
252b5132 1349}
a7519a3c
RH
1350\f
1351/* Read ECOFF debugging information from a .mdebug section into a
1352 ecoff_debug_info structure. */
252b5132 1353
a7519a3c
RH
1354static bfd_boolean
1355elf64_alpha_read_ecoff_info (bfd *abfd, asection *section,
1356 struct ecoff_debug_info *debug)
252b5132 1357{
a7519a3c
RH
1358 HDRR *symhdr;
1359 const struct ecoff_debug_swap *swap;
1360 char *ext_hdr = NULL;
252b5132 1361
a7519a3c
RH
1362 swap = get_elf_backend_data (abfd)->elf_backend_ecoff_debug_swap;
1363 memset (debug, 0, sizeof (*debug));
252b5132 1364
a7519a3c
RH
1365 ext_hdr = (char *) bfd_malloc (swap->external_hdr_size);
1366 if (ext_hdr == NULL && swap->external_hdr_size != 0)
1367 goto error_return;
252b5132 1368
a7519a3c
RH
1369 if (! bfd_get_section_contents (abfd, section, ext_hdr, (file_ptr) 0,
1370 swap->external_hdr_size))
1371 goto error_return;
252b5132 1372
a7519a3c
RH
1373 symhdr = &debug->symbolic_header;
1374 (*swap->swap_hdr_in) (abfd, ext_hdr, symhdr);
252b5132 1375
a7519a3c
RH
1376 /* The symbolic header contains absolute file offsets and sizes to
1377 read. */
1378#define READ(ptr, offset, count, size, type) \
1379 if (symhdr->count == 0) \
1380 debug->ptr = NULL; \
1381 else \
1382 { \
1383 bfd_size_type amt = (bfd_size_type) size * symhdr->count; \
1384 debug->ptr = (type) bfd_malloc (amt); \
1385 if (debug->ptr == NULL) \
1386 goto error_return; \
1387 if (bfd_seek (abfd, (file_ptr) symhdr->offset, SEEK_SET) != 0 \
1388 || bfd_bread (debug->ptr, amt, abfd) != amt) \
1389 goto error_return; \
1390 }
fe8bc63d 1391
a7519a3c 1392 READ (line, cbLineOffset, cbLine, sizeof (unsigned char), unsigned char *);
2c3fc389
NC
1393 READ (external_dnr, cbDnOffset, idnMax, swap->external_dnr_size, void *);
1394 READ (external_pdr, cbPdOffset, ipdMax, swap->external_pdr_size, void *);
1395 READ (external_sym, cbSymOffset, isymMax, swap->external_sym_size, void *);
1396 READ (external_opt, cbOptOffset, ioptMax, swap->external_opt_size, void *);
a7519a3c
RH
1397 READ (external_aux, cbAuxOffset, iauxMax, sizeof (union aux_ext),
1398 union aux_ext *);
1399 READ (ss, cbSsOffset, issMax, sizeof (char), char *);
1400 READ (ssext, cbSsExtOffset, issExtMax, sizeof (char), char *);
2c3fc389
NC
1401 READ (external_fdr, cbFdOffset, ifdMax, swap->external_fdr_size, void *);
1402 READ (external_rfd, cbRfdOffset, crfd, swap->external_rfd_size, void *);
1403 READ (external_ext, cbExtOffset, iextMax, swap->external_ext_size, void *);
a7519a3c 1404#undef READ
252b5132 1405
a7519a3c 1406 debug->fdr = NULL;
252b5132 1407
a7519a3c 1408 return TRUE;
252b5132 1409
a7519a3c
RH
1410 error_return:
1411 if (ext_hdr != NULL)
1412 free (ext_hdr);
1413 if (debug->line != NULL)
1414 free (debug->line);
1415 if (debug->external_dnr != NULL)
1416 free (debug->external_dnr);
1417 if (debug->external_pdr != NULL)
1418 free (debug->external_pdr);
1419 if (debug->external_sym != NULL)
1420 free (debug->external_sym);
1421 if (debug->external_opt != NULL)
1422 free (debug->external_opt);
1423 if (debug->external_aux != NULL)
1424 free (debug->external_aux);
1425 if (debug->ss != NULL)
1426 free (debug->ss);
1427 if (debug->ssext != NULL)
1428 free (debug->ssext);
1429 if (debug->external_fdr != NULL)
1430 free (debug->external_fdr);
1431 if (debug->external_rfd != NULL)
1432 free (debug->external_rfd);
1433 if (debug->external_ext != NULL)
1434 free (debug->external_ext);
1435 return FALSE;
252b5132
RH
1436}
1437
a7519a3c
RH
1438/* Alpha ELF local labels start with '$'. */
1439
b34976b6 1440static bfd_boolean
a7519a3c 1441elf64_alpha_is_local_label_name (bfd *abfd ATTRIBUTE_UNUSED, const char *name)
252b5132 1442{
a7519a3c
RH
1443 return name[0] == '$';
1444}
9e756d64 1445
a7519a3c
RH
1446static bfd_boolean
1447elf64_alpha_find_nearest_line (bfd *abfd, asection *section, asymbol **symbols,
1448 bfd_vma offset, const char **filename_ptr,
1449 const char **functionname_ptr,
1450 unsigned int *line_ptr)
1451{
1452 asection *msec;
252b5132 1453
fc28f9aa
TG
1454 if (_bfd_dwarf2_find_nearest_line (abfd, dwarf_debug_sections,
1455 section, symbols, offset,
a7519a3c 1456 filename_ptr, functionname_ptr,
9b8d1a36 1457 line_ptr, NULL, 0,
a7519a3c 1458 &elf_tdata (abfd)->dwarf2_find_line_info))
b34976b6 1459 return TRUE;
9e756d64 1460
a7519a3c
RH
1461 msec = bfd_get_section_by_name (abfd, ".mdebug");
1462 if (msec != NULL)
1bbc9cec 1463 {
a7519a3c 1464 flagword origflags;
698600e4 1465 struct alpha_elf_find_line *fi;
a7519a3c
RH
1466 const struct ecoff_debug_swap * const swap =
1467 get_elf_backend_data (abfd)->elf_backend_ecoff_debug_swap;
252b5132 1468
a7519a3c
RH
1469 /* If we are called during a link, alpha_elf_final_link may have
1470 cleared the SEC_HAS_CONTENTS field. We force it back on here
1471 if appropriate (which it normally will be). */
1472 origflags = msec->flags;
1473 if (elf_section_data (msec)->this_hdr.sh_type != SHT_NOBITS)
1474 msec->flags |= SEC_HAS_CONTENTS;
9e756d64 1475
698600e4 1476 fi = alpha_elf_tdata (abfd)->find_line_info;
a7519a3c
RH
1477 if (fi == NULL)
1478 {
1479 bfd_size_type external_fdr_size;
1480 char *fraw_src;
1481 char *fraw_end;
1482 struct fdr *fdr_ptr;
698600e4 1483 bfd_size_type amt = sizeof (struct alpha_elf_find_line);
9e756d64 1484
698600e4 1485 fi = (struct alpha_elf_find_line *) bfd_zalloc (abfd, amt);
a7519a3c
RH
1486 if (fi == NULL)
1487 {
1488 msec->flags = origflags;
1489 return FALSE;
1490 }
9e756d64 1491
a7519a3c
RH
1492 if (!elf64_alpha_read_ecoff_info (abfd, msec, &fi->d))
1493 {
1494 msec->flags = origflags;
1495 return FALSE;
1496 }
9e756d64 1497
a7519a3c
RH
1498 /* Swap in the FDR information. */
1499 amt = fi->d.symbolic_header.ifdMax * sizeof (struct fdr);
1500 fi->d.fdr = (struct fdr *) bfd_alloc (abfd, amt);
1501 if (fi->d.fdr == NULL)
1502 {
1503 msec->flags = origflags;
1504 return FALSE;
1505 }
1506 external_fdr_size = swap->external_fdr_size;
1507 fdr_ptr = fi->d.fdr;
1508 fraw_src = (char *) fi->d.external_fdr;
1509 fraw_end = (fraw_src
1510 + fi->d.symbolic_header.ifdMax * external_fdr_size);
1511 for (; fraw_src < fraw_end; fraw_src += external_fdr_size, fdr_ptr++)
2c3fc389 1512 (*swap->swap_fdr_in) (abfd, fraw_src, fdr_ptr);
9e756d64 1513
698600e4 1514 alpha_elf_tdata (abfd)->find_line_info = fi;
9e756d64 1515
a7519a3c
RH
1516 /* Note that we don't bother to ever free this information.
1517 find_nearest_line is either called all the time, as in
1518 objdump -l, so the information should be saved, or it is
1519 rarely called, as in ld error messages, so the memory
1520 wasted is unimportant. Still, it would probably be a
1521 good idea for free_cached_info to throw it away. */
1522 }
9e756d64 1523
a7519a3c
RH
1524 if (_bfd_ecoff_locate_line (abfd, section, offset, &fi->d, swap,
1525 &fi->i, filename_ptr, functionname_ptr,
1526 line_ptr))
1527 {
1528 msec->flags = origflags;
1529 return TRUE;
1530 }
9e756d64 1531
a7519a3c 1532 msec->flags = origflags;
9e756d64 1533 }
9e756d64 1534
a7519a3c 1535 /* Fall back on the generic ELF find_nearest_line routine. */
9e756d64 1536
a7519a3c
RH
1537 return _bfd_elf_find_nearest_line (abfd, section, symbols, offset,
1538 filename_ptr, functionname_ptr,
1539 line_ptr);
9e756d64 1540}
a7519a3c
RH
1541\f
1542/* Structure used to pass information to alpha_elf_output_extsym. */
9e756d64 1543
a7519a3c 1544struct extsym_info
9e756d64 1545{
a7519a3c
RH
1546 bfd *abfd;
1547 struct bfd_link_info *info;
1548 struct ecoff_debug_info *debug;
1549 const struct ecoff_debug_swap *swap;
1550 bfd_boolean failed;
1551};
9e756d64 1552
a7519a3c 1553static bfd_boolean
2c3fc389 1554elf64_alpha_output_extsym (struct alpha_elf_link_hash_entry *h, void * data)
a7519a3c
RH
1555{
1556 struct extsym_info *einfo = (struct extsym_info *) data;
1557 bfd_boolean strip;
1558 asection *sec, *output_section;
9e756d64 1559
a7519a3c
RH
1560 if (h->root.indx == -2)
1561 strip = FALSE;
1562 else if ((h->root.def_dynamic
1563 || h->root.ref_dynamic
1564 || h->root.root.type == bfd_link_hash_new)
1565 && !h->root.def_regular
1566 && !h->root.ref_regular)
1567 strip = TRUE;
1568 else if (einfo->info->strip == strip_all
1569 || (einfo->info->strip == strip_some
1570 && bfd_hash_lookup (einfo->info->keep_hash,
1571 h->root.root.root.string,
1572 FALSE, FALSE) == NULL))
1573 strip = TRUE;
1574 else
1575 strip = FALSE;
9e756d64 1576
a7519a3c 1577 if (strip)
b34976b6 1578 return TRUE;
9e756d64 1579
a7519a3c 1580 if (h->esym.ifd == -2)
9e756d64 1581 {
a7519a3c
RH
1582 h->esym.jmptbl = 0;
1583 h->esym.cobol_main = 0;
1584 h->esym.weakext = 0;
1585 h->esym.reserved = 0;
1586 h->esym.ifd = ifdNil;
1587 h->esym.asym.value = 0;
1588 h->esym.asym.st = stGlobal;
9e756d64 1589
a7519a3c
RH
1590 if (h->root.root.type != bfd_link_hash_defined
1591 && h->root.root.type != bfd_link_hash_defweak)
1592 h->esym.asym.sc = scAbs;
1593 else
1594 {
1595 const char *name;
9e756d64 1596
a7519a3c
RH
1597 sec = h->root.root.u.def.section;
1598 output_section = sec->output_section;
9e756d64 1599
a7519a3c
RH
1600 /* When making a shared library and symbol h is the one from
1601 the another shared library, OUTPUT_SECTION may be null. */
1602 if (output_section == NULL)
1603 h->esym.asym.sc = scUndefined;
1604 else
1605 {
1606 name = bfd_section_name (output_section->owner, output_section);
9e756d64 1607
a7519a3c
RH
1608 if (strcmp (name, ".text") == 0)
1609 h->esym.asym.sc = scText;
1610 else if (strcmp (name, ".data") == 0)
1611 h->esym.asym.sc = scData;
1612 else if (strcmp (name, ".sdata") == 0)
1613 h->esym.asym.sc = scSData;
1614 else if (strcmp (name, ".rodata") == 0
1615 || strcmp (name, ".rdata") == 0)
1616 h->esym.asym.sc = scRData;
1617 else if (strcmp (name, ".bss") == 0)
1618 h->esym.asym.sc = scBss;
1619 else if (strcmp (name, ".sbss") == 0)
1620 h->esym.asym.sc = scSBss;
1621 else if (strcmp (name, ".init") == 0)
1622 h->esym.asym.sc = scInit;
1623 else if (strcmp (name, ".fini") == 0)
1624 h->esym.asym.sc = scFini;
1625 else
1626 h->esym.asym.sc = scAbs;
1627 }
1628 }
9e756d64 1629
a7519a3c
RH
1630 h->esym.asym.reserved = 0;
1631 h->esym.asym.index = indexNil;
1632 }
9e756d64 1633
a7519a3c
RH
1634 if (h->root.root.type == bfd_link_hash_common)
1635 h->esym.asym.value = h->root.root.u.c.size;
1636 else if (h->root.root.type == bfd_link_hash_defined
1637 || h->root.root.type == bfd_link_hash_defweak)
1638 {
1639 if (h->esym.asym.sc == scCommon)
1640 h->esym.asym.sc = scBss;
1641 else if (h->esym.asym.sc == scSCommon)
1642 h->esym.asym.sc = scSBss;
9e756d64 1643
a7519a3c
RH
1644 sec = h->root.root.u.def.section;
1645 output_section = sec->output_section;
1646 if (output_section != NULL)
1647 h->esym.asym.value = (h->root.root.u.def.value
1648 + sec->output_offset
1649 + output_section->vma);
1650 else
1651 h->esym.asym.value = 0;
1652 }
9e756d64 1653
a7519a3c
RH
1654 if (! bfd_ecoff_debug_one_external (einfo->abfd, einfo->debug, einfo->swap,
1655 h->root.root.root.string,
1656 &h->esym))
1657 {
1658 einfo->failed = TRUE;
1659 return FALSE;
9e756d64
RH
1660 }
1661
a7519a3c
RH
1662 return TRUE;
1663}
1664\f
1665/* Search for and possibly create a got entry. */
9e756d64 1666
a7519a3c
RH
1667static struct alpha_elf_got_entry *
1668get_got_entry (bfd *abfd, struct alpha_elf_link_hash_entry *h,
1669 unsigned long r_type, unsigned long r_symndx,
1670 bfd_vma r_addend)
1671{
1672 struct alpha_elf_got_entry *gotent;
1673 struct alpha_elf_got_entry **slot;
9e756d64 1674
a7519a3c
RH
1675 if (h)
1676 slot = &h->got_entries;
1677 else
1678 {
1679 /* This is a local .got entry -- record for merge. */
9e756d64 1680
a7519a3c 1681 struct alpha_elf_got_entry **local_got_entries;
9e756d64 1682
a7519a3c
RH
1683 local_got_entries = alpha_elf_tdata(abfd)->local_got_entries;
1684 if (!local_got_entries)
1685 {
1686 bfd_size_type size;
1687 Elf_Internal_Shdr *symtab_hdr;
9e756d64 1688
a7519a3c
RH
1689 symtab_hdr = &elf_tdata(abfd)->symtab_hdr;
1690 size = symtab_hdr->sh_info;
1691 size *= sizeof (struct alpha_elf_got_entry *);
9e756d64 1692
a7519a3c
RH
1693 local_got_entries
1694 = (struct alpha_elf_got_entry **) bfd_zalloc (abfd, size);
1695 if (!local_got_entries)
1696 return NULL;
1697
1698 alpha_elf_tdata (abfd)->local_got_entries = local_got_entries;
1699 }
1700
1701 slot = &local_got_entries[r_symndx];
9e756d64
RH
1702 }
1703
a7519a3c
RH
1704 for (gotent = *slot; gotent ; gotent = gotent->next)
1705 if (gotent->gotobj == abfd
1706 && gotent->reloc_type == r_type
1707 && gotent->addend == r_addend)
1708 break;
1709
1710 if (!gotent)
9e756d64 1711 {
a7519a3c
RH
1712 int entry_size;
1713 bfd_size_type amt;
9e756d64 1714
a7519a3c
RH
1715 amt = sizeof (struct alpha_elf_got_entry);
1716 gotent = (struct alpha_elf_got_entry *) bfd_alloc (abfd, amt);
1717 if (!gotent)
1718 return NULL;
9e756d64 1719
a7519a3c
RH
1720 gotent->gotobj = abfd;
1721 gotent->addend = r_addend;
1722 gotent->got_offset = -1;
6ec7057a 1723 gotent->plt_offset = -1;
a7519a3c
RH
1724 gotent->use_count = 1;
1725 gotent->reloc_type = r_type;
1726 gotent->reloc_done = 0;
1727 gotent->reloc_xlated = 0;
9e756d64 1728
a7519a3c
RH
1729 gotent->next = *slot;
1730 *slot = gotent;
9e756d64 1731
a7519a3c
RH
1732 entry_size = alpha_got_entry_size (r_type);
1733 alpha_elf_tdata (abfd)->total_got_size += entry_size;
1734 if (!h)
1735 alpha_elf_tdata(abfd)->local_got_size += entry_size;
9e756d64 1736 }
a7519a3c
RH
1737 else
1738 gotent->use_count += 1;
9e756d64 1739
a7519a3c 1740 return gotent;
9e756d64
RH
1741}
1742
6ec7057a
RH
1743static bfd_boolean
1744elf64_alpha_want_plt (struct alpha_elf_link_hash_entry *ah)
1745{
1746 return ((ah->root.type == STT_FUNC
1747 || ah->root.root.type == bfd_link_hash_undefweak
1748 || ah->root.root.type == bfd_link_hash_undefined)
8288a39e
RH
1749 && (ah->flags & ALPHA_ELF_LINK_HASH_LU_PLT) != 0
1750 && (ah->flags & ~ALPHA_ELF_LINK_HASH_LU_PLT) == 0);
6ec7057a
RH
1751}
1752
a7519a3c
RH
1753/* Handle dynamic relocations when doing an Alpha ELF link. */
1754
b34976b6 1755static bfd_boolean
a7519a3c
RH
1756elf64_alpha_check_relocs (bfd *abfd, struct bfd_link_info *info,
1757 asection *sec, const Elf_Internal_Rela *relocs)
252b5132 1758{
a7519a3c
RH
1759 bfd *dynobj;
1760 asection *sreloc;
252b5132 1761 Elf_Internal_Shdr *symtab_hdr;
a7519a3c
RH
1762 struct alpha_elf_link_hash_entry **sym_hashes;
1763 const Elf_Internal_Rela *rel, *relend;
a7519a3c 1764 bfd_size_type amt;
252b5132 1765
a7519a3c
RH
1766 if (info->relocatable)
1767 return TRUE;
252b5132 1768
a7519a3c
RH
1769 /* Don't do anything special with non-loaded, non-alloced sections.
1770 In particular, any relocs in such sections should not affect GOT
1771 and PLT reference counting (ie. we don't allow them to create GOT
1772 or PLT entries), there's no possibility or desire to optimize TLS
1773 relocs, and there's not much point in propagating relocs to shared
1774 libs that the dynamic linker won't relocate. */
1775 if ((sec->flags & SEC_ALLOC) == 0)
b34976b6 1776 return TRUE;
252b5132 1777
0ffa91dd
NC
1778 BFD_ASSERT (is_alpha_elf (abfd));
1779
1780 dynobj = elf_hash_table (info)->dynobj;
a7519a3c 1781 if (dynobj == NULL)
0ffa91dd 1782 elf_hash_table (info)->dynobj = dynobj = abfd;
252b5132 1783
a7519a3c 1784 sreloc = NULL;
0ffa91dd
NC
1785 symtab_hdr = &elf_symtab_hdr (abfd);
1786 sym_hashes = alpha_elf_sym_hashes (abfd);
a7519a3c
RH
1787
1788 relend = relocs + sec->reloc_count;
1789 for (rel = relocs; rel < relend; ++rel)
1790 {
1791 enum {
1792 NEED_GOT = 1,
1793 NEED_GOT_ENTRY = 2,
1794 NEED_DYNREL = 4
1795 };
1796
1797 unsigned long r_symndx, r_type;
1798 struct alpha_elf_link_hash_entry *h;
1799 unsigned int gotent_flags;
1800 bfd_boolean maybe_dynamic;
1801 unsigned int need;
1802 bfd_vma addend;
1803
1804 r_symndx = ELF64_R_SYM (rel->r_info);
1805 if (r_symndx < symtab_hdr->sh_info)
1806 h = NULL;
1807 else
1808 {
1809 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
252b5132 1810
a7519a3c
RH
1811 while (h->root.root.type == bfd_link_hash_indirect
1812 || h->root.root.type == bfd_link_hash_warning)
1813 h = (struct alpha_elf_link_hash_entry *)h->root.root.u.i.link;
252b5132 1814
81fbe831
AM
1815 /* PR15323, ref flags aren't set for references in the same
1816 object. */
1817 h->root.root.non_ir_ref = 1;
a7519a3c
RH
1818 h->root.ref_regular = 1;
1819 }
252b5132 1820
a7519a3c
RH
1821 /* We can only get preliminary data on whether a symbol is
1822 locally or externally defined, as not all of the input files
1823 have yet been processed. Do something with what we know, as
1824 this may help reduce memory usage and processing time later. */
1825 maybe_dynamic = FALSE;
1826 if (h && ((info->shared
1827 && (!info->symbolic
1828 || info->unresolved_syms_in_shared_libs == RM_IGNORE))
1829 || !h->root.def_regular
1830 || h->root.root.type == bfd_link_hash_defweak))
1831 maybe_dynamic = TRUE;
252b5132 1832
a7519a3c
RH
1833 need = 0;
1834 gotent_flags = 0;
1835 r_type = ELF64_R_TYPE (rel->r_info);
1836 addend = rel->r_addend;
9e756d64 1837
9e756d64
RH
1838 switch (r_type)
1839 {
1840 case R_ALPHA_LITERAL:
a7519a3c
RH
1841 need = NEED_GOT | NEED_GOT_ENTRY;
1842
1843 /* Remember how this literal is used from its LITUSEs.
1844 This will be important when it comes to decide if we can
1845 create a .plt entry for a function symbol. */
1846 while (++rel < relend && ELF64_R_TYPE (rel->r_info) == R_ALPHA_LITUSE)
8288a39e 1847 if (rel->r_addend >= 1 && rel->r_addend <= 6)
a7519a3c
RH
1848 gotent_flags |= 1 << rel->r_addend;
1849 --rel;
1850
1851 /* No LITUSEs -- presumably the address is used somehow. */
1852 if (gotent_flags == 0)
1853 gotent_flags = ALPHA_ELF_LINK_HASH_LU_ADDR;
1854 break;
1855
1856 case R_ALPHA_GPDISP:
1857 case R_ALPHA_GPREL16:
1858 case R_ALPHA_GPREL32:
9e756d64
RH
1859 case R_ALPHA_GPRELHIGH:
1860 case R_ALPHA_GPRELLOW:
a7519a3c
RH
1861 case R_ALPHA_BRSGP:
1862 need = NEED_GOT;
1863 break;
1864
1865 case R_ALPHA_REFLONG:
1866 case R_ALPHA_REFQUAD:
1867 if (info->shared || maybe_dynamic)
1868 need = NEED_DYNREL;
cc03ec80
RH
1869 break;
1870
9e756d64 1871 case R_ALPHA_TLSLDM:
cc03ec80 1872 /* The symbol for a TLSLDM reloc is ignored. Collapse the
cf35638d
TS
1873 reloc to the STN_UNDEF (0) symbol so that they all match. */
1874 r_symndx = STN_UNDEF;
a7519a3c
RH
1875 h = 0;
1876 maybe_dynamic = FALSE;
1877 /* FALLTHRU */
1878
1879 case R_ALPHA_TLSGD:
1880 case R_ALPHA_GOTDTPREL:
1881 need = NEED_GOT | NEED_GOT_ENTRY;
9e756d64 1882 break;
cc03ec80 1883
a7519a3c
RH
1884 case R_ALPHA_GOTTPREL:
1885 need = NEED_GOT | NEED_GOT_ENTRY;
1886 gotent_flags = ALPHA_ELF_LINK_HASH_TLS_IE;
1887 if (info->shared)
1888 info->flags |= DF_STATIC_TLS;
1889 break;
1890
1891 case R_ALPHA_TPREL64:
e366eeae
RH
1892 if (info->shared && !info->pie)
1893 {
1894 info->flags |= DF_STATIC_TLS;
1895 need = NEED_DYNREL;
1896 }
1897 else if (maybe_dynamic)
a7519a3c 1898 need = NEED_DYNREL;
a7519a3c 1899 break;
252b5132
RH
1900 }
1901
a7519a3c 1902 if (need & NEED_GOT)
252b5132 1903 {
85d162e6 1904 if (alpha_elf_tdata(abfd)->gotobj == NULL)
6cdc0ccc 1905 {
a7519a3c
RH
1906 if (!elf64_alpha_create_got_section (abfd, info))
1907 return FALSE;
c328dc3f 1908 }
252b5132 1909 }
252b5132 1910
a7519a3c
RH
1911 if (need & NEED_GOT_ENTRY)
1912 {
1913 struct alpha_elf_got_entry *gotent;
252b5132 1914
a7519a3c
RH
1915 gotent = get_got_entry (abfd, h, r_type, r_symndx, addend);
1916 if (!gotent)
1917 return FALSE;
4a67a098 1918
a7519a3c 1919 if (gotent_flags)
cc03ec80 1920 {
a7519a3c
RH
1921 gotent->flags |= gotent_flags;
1922 if (h)
1923 {
1924 gotent_flags |= h->flags;
1925 h->flags = gotent_flags;
4a67a098 1926
a7519a3c 1927 /* Make a guess as to whether a .plt entry is needed. */
6ec7057a
RH
1928 /* ??? It appears that we won't make it into
1929 adjust_dynamic_symbol for symbols that remain
1930 totally undefined. Copying this check here means
1931 we can create a plt entry for them too. */
1932 h->root.needs_plt
1933 = (maybe_dynamic && elf64_alpha_want_plt (h));
1934 }
a7519a3c 1935 }
252b5132
RH
1936 }
1937
a7519a3c 1938 if (need & NEED_DYNREL)
9e756d64 1939 {
a7519a3c
RH
1940 /* We need to create the section here now whether we eventually
1941 use it or not so that it gets mapped to an output section by
83bac4b0 1942 the linker. If not used, we'll kill it in size_dynamic_sections. */
a7519a3c 1943 if (sreloc == NULL)
9e756d64 1944 {
83bac4b0
NC
1945 sreloc = _bfd_elf_make_dynamic_reloc_section
1946 (sec, dynobj, 3, abfd, /*rela?*/ TRUE);
1947
a7519a3c 1948 if (sreloc == NULL)
83bac4b0 1949 return FALSE;
9e756d64 1950 }
252b5132 1951
a7519a3c
RH
1952 if (h)
1953 {
1954 /* Since we havn't seen all of the input symbols yet, we
1955 don't know whether we'll actually need a dynamic relocation
1956 entry for this reloc. So make a record of it. Once we
1957 find out if this thing needs dynamic relocation we'll
1958 expand the relocation sections by the appropriate amount. */
9e756d64 1959
a7519a3c 1960 struct alpha_elf_reloc_entry *rent;
9e756d64 1961
a7519a3c
RH
1962 for (rent = h->reloc_entries; rent; rent = rent->next)
1963 if (rent->rtype == r_type && rent->srel == sreloc)
1964 break;
252b5132 1965
a7519a3c
RH
1966 if (!rent)
1967 {
1968 amt = sizeof (struct alpha_elf_reloc_entry);
1969 rent = (struct alpha_elf_reloc_entry *) bfd_alloc (abfd, amt);
1970 if (!rent)
1971 return FALSE;
252b5132 1972
a7519a3c
RH
1973 rent->srel = sreloc;
1974 rent->rtype = r_type;
1975 rent->count = 1;
1976 rent->reltext = (sec->flags & SEC_READONLY) != 0;
252b5132 1977
a7519a3c
RH
1978 rent->next = h->reloc_entries;
1979 h->reloc_entries = rent;
1980 }
1981 else
1982 rent->count++;
1983 }
1984 else if (info->shared)
1985 {
1986 /* If this is a shared library, and the section is to be
1987 loaded into memory, we need a RELATIVE reloc. */
1988 sreloc->size += sizeof (Elf64_External_Rela);
1989 if (sec->flags & SEC_READONLY)
1990 info->flags |= DF_TEXTREL;
1991 }
252b5132
RH
1992 }
1993 }
1994
b34976b6 1995 return TRUE;
252b5132 1996}
252b5132 1997
e117360e
RH
1998/* Return the section that should be marked against GC for a given
1999 relocation. */
2000
2001static asection *
2002elf64_alpha_gc_mark_hook (asection *sec, struct bfd_link_info *info,
2003 Elf_Internal_Rela *rel,
2004 struct elf_link_hash_entry *h, Elf_Internal_Sym *sym)
2005{
2006 /* These relocations don't really reference a symbol. Instead we store
2007 extra data in their addend slot. Ignore the symbol. */
2008 switch (ELF64_R_TYPE (rel->r_info))
2009 {
2010 case R_ALPHA_LITUSE:
2011 case R_ALPHA_GPDISP:
2012 case R_ALPHA_HINT:
2013 return NULL;
2014 }
2015
2016 return _bfd_elf_gc_mark_hook (sec, info, rel, h, sym);
2017}
2018
2019/* Update the got entry reference counts for the section being removed. */
2020
2021static bfd_boolean
2022elf64_alpha_gc_sweep_hook (bfd *abfd, struct bfd_link_info *info,
2023 asection *sec, const Elf_Internal_Rela *relocs)
2024{
2025 Elf_Internal_Shdr *symtab_hdr;
2026 struct alpha_elf_link_hash_entry **sym_hashes;
2027 const Elf_Internal_Rela *rel, *relend;
2028
2029 if (info->relocatable)
2030 return TRUE;
2031
2032 symtab_hdr = &elf_symtab_hdr (abfd);
2033 sym_hashes = alpha_elf_sym_hashes (abfd);
2034
2035 relend = relocs + sec->reloc_count;
2036 for (rel = relocs; rel < relend; rel++)
2037 {
2038 unsigned long r_symndx, r_type;
2039 struct alpha_elf_link_hash_entry *h = NULL;
2040 struct alpha_elf_got_entry *gotent;
2041
2042 r_symndx = ELF64_R_SYM (rel->r_info);
2043 if (r_symndx >= symtab_hdr->sh_info)
2044 {
2045 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
2046 while (h->root.root.type == bfd_link_hash_indirect
2047 || h->root.root.type == bfd_link_hash_warning)
2048 h = (struct alpha_elf_link_hash_entry *) h->root.root.u.i.link;
2049 }
2050
2051 r_type = ELF64_R_TYPE (rel->r_info);
2052 switch (r_type)
2053 {
2054 case R_ALPHA_LITERAL:
2055 /* ??? Ignore re-computation of gotent_flags. We're not
2056 carrying a use-count for each bit in that mask. */
2057
2058 case R_ALPHA_TLSGD:
2059 case R_ALPHA_GOTDTPREL:
2060 case R_ALPHA_GOTTPREL:
2061 /* Fetch the got entry from the tables. */
2062 gotent = get_got_entry (abfd, h, r_type, r_symndx, rel->r_addend);
2063
2064 /* The got entry *must* exist, since we should have created it
2065 before during check_relocs. Also note that get_got_entry
2066 assumed this was going to be another use, and so incremented
2067 the use count again. Thus the use count must be at least the
2068 one real use and the "use" we just added. */
2069 if (gotent == NULL || gotent->use_count < 2)
2070 {
2071 abort ();
2072 return FALSE;
2073 }
2074 gotent->use_count -= 2;
2075 break;
2076
2077 default:
2078 break;
2079 }
2080 }
2081
2082 return TRUE;
2083}
2084
a7519a3c
RH
2085/* Adjust a symbol defined by a dynamic object and referenced by a
2086 regular object. The current definition is in some section of the
2087 dynamic object, but we're not including those sections. We have to
2088 change the definition to something the rest of the link can
2089 understand. */
252b5132 2090
b34976b6 2091static bfd_boolean
a7519a3c
RH
2092elf64_alpha_adjust_dynamic_symbol (struct bfd_link_info *info,
2093 struct elf_link_hash_entry *h)
252b5132 2094{
a7519a3c
RH
2095 bfd *dynobj;
2096 asection *s;
2097 struct alpha_elf_link_hash_entry *ah;
252b5132 2098
a7519a3c
RH
2099 dynobj = elf_hash_table(info)->dynobj;
2100 ah = (struct alpha_elf_link_hash_entry *)h;
252b5132 2101
a7519a3c 2102 /* Now that we've seen all of the input symbols, finalize our decision
6ec7057a
RH
2103 about whether this symbol should get a .plt entry. Irritatingly, it
2104 is common for folk to leave undefined symbols in shared libraries,
2105 and they still expect lazy binding; accept undefined symbols in lieu
2106 of STT_FUNC. */
2107 if (alpha_elf_dynamic_symbol_p (h, info) && elf64_alpha_want_plt (ah))
252b5132 2108 {
6ec7057a 2109 h->needs_plt = TRUE;
252b5132 2110
3d4d4302 2111 s = bfd_get_linker_section (dynobj, ".plt");
a7519a3c
RH
2112 if (!s && !elf64_alpha_create_dynamic_sections (dynobj, info))
2113 return FALSE;
204692d7 2114
6ec7057a
RH
2115 /* We need one plt entry per got subsection. Delay allocation of
2116 the actual plt entries until size_plt_section, called from
2117 size_dynamic_sections or during relaxation. */
252b5132 2118
a7519a3c
RH
2119 return TRUE;
2120 }
2121 else
6ec7057a 2122 h->needs_plt = FALSE;
252b5132 2123
a7519a3c
RH
2124 /* If this is a weak symbol, and there is a real definition, the
2125 processor independent code will have arranged for us to see the
2126 real definition first, and we can just use the same value. */
2127 if (h->u.weakdef != NULL)
252b5132 2128 {
a7519a3c
RH
2129 BFD_ASSERT (h->u.weakdef->root.type == bfd_link_hash_defined
2130 || h->u.weakdef->root.type == bfd_link_hash_defweak);
2131 h->root.u.def.section = h->u.weakdef->root.u.def.section;
2132 h->root.u.def.value = h->u.weakdef->root.u.def.value;
2133 return TRUE;
252b5132 2134 }
a7519a3c
RH
2135
2136 /* This is a reference to a symbol defined by a dynamic object which
2137 is not a function. The Alpha, since it uses .got entries for all
2138 symbols even in regular objects, does not need the hackery of a
2139 .dynbss section and COPY dynamic relocations. */
252b5132 2140
b34976b6 2141 return TRUE;
252b5132
RH
2142}
2143
747ffa7b
AM
2144/* Record STO_ALPHA_NOPV and STO_ALPHA_STD_GPLOAD. */
2145
2146static void
2147elf64_alpha_merge_symbol_attribute (struct elf_link_hash_entry *h,
2148 const Elf_Internal_Sym *isym,
2149 bfd_boolean definition,
2150 bfd_boolean dynamic)
2151{
2152 if (!dynamic && definition)
2153 h->other = ((h->other & ELF_ST_VISIBILITY (-1))
2154 | (isym->st_other & ~ELF_ST_VISIBILITY (-1)));
2155}
2156
a7519a3c
RH
2157/* Symbol versioning can create new symbols, and make our old symbols
2158 indirect to the new ones. Consolidate the got and reloc information
2159 in these situations. */
252b5132 2160
48f4b4f5
RH
2161static void
2162elf64_alpha_copy_indirect_symbol (struct bfd_link_info *info,
2163 struct elf_link_hash_entry *dir,
2164 struct elf_link_hash_entry *ind)
252b5132 2165{
48f4b4f5
RH
2166 struct alpha_elf_link_hash_entry *hi
2167 = (struct alpha_elf_link_hash_entry *) ind;
2168 struct alpha_elf_link_hash_entry *hs
2169 = (struct alpha_elf_link_hash_entry *) dir;
252b5132 2170
48f4b4f5
RH
2171 /* Do the merging in the superclass. */
2172 _bfd_elf_link_hash_copy_indirect(info, dir, ind);
252b5132 2173
a7519a3c 2174 /* Merge the flags. Whee. */
a7519a3c
RH
2175 hs->flags |= hi->flags;
2176
48f4b4f5
RH
2177 /* ??? It's unclear to me what's really supposed to happen when
2178 "merging" defweak and defined symbols, given that we don't
2179 actually throw away the defweak. This more-or-less copies
2180 the logic related to got and plt entries in the superclass. */
2181 if (ind->root.type != bfd_link_hash_indirect)
2182 return;
2183
a7519a3c
RH
2184 /* Merge the .got entries. Cannibalize the old symbol's list in
2185 doing so, since we don't need it anymore. */
2186
2187 if (hs->got_entries == NULL)
2188 hs->got_entries = hi->got_entries;
2189 else
2190 {
2191 struct alpha_elf_got_entry *gi, *gs, *gin, *gsh;
2192
2193 gsh = hs->got_entries;
2194 for (gi = hi->got_entries; gi ; gi = gin)
252b5132 2195 {
a7519a3c
RH
2196 gin = gi->next;
2197 for (gs = gsh; gs ; gs = gs->next)
2198 if (gi->gotobj == gs->gotobj
2199 && gi->reloc_type == gs->reloc_type
2200 && gi->addend == gs->addend)
2201 {
2202 gi->use_count += gs->use_count;
2203 goto got_found;
2204 }
2205 gi->next = hs->got_entries;
2206 hs->got_entries = gi;
2207 got_found:;
252b5132 2208 }
a7519a3c
RH
2209 }
2210 hi->got_entries = NULL;
252b5132 2211
a7519a3c
RH
2212 /* And similar for the reloc entries. */
2213
2214 if (hs->reloc_entries == NULL)
2215 hs->reloc_entries = hi->reloc_entries;
2216 else
2217 {
2218 struct alpha_elf_reloc_entry *ri, *rs, *rin, *rsh;
2219
2220 rsh = hs->reloc_entries;
2221 for (ri = hi->reloc_entries; ri ; ri = rin)
2222 {
2223 rin = ri->next;
2224 for (rs = rsh; rs ; rs = rs->next)
2225 if (ri->rtype == rs->rtype && ri->srel == rs->srel)
2226 {
2227 rs->count += ri->count;
2228 goto found_reloc;
2229 }
2230 ri->next = hs->reloc_entries;
2231 hs->reloc_entries = ri;
2232 found_reloc:;
2233 }
252b5132 2234 }
a7519a3c 2235 hi->reloc_entries = NULL;
252b5132
RH
2236}
2237
a7519a3c 2238/* Is it possible to merge two object file's .got tables? */
252b5132 2239
b34976b6 2240static bfd_boolean
a7519a3c 2241elf64_alpha_can_merge_gots (bfd *a, bfd *b)
252b5132 2242{
a7519a3c
RH
2243 int total = alpha_elf_tdata (a)->total_got_size;
2244 bfd *bsub;
252b5132 2245
a7519a3c
RH
2246 /* Trivial quick fallout test. */
2247 if (total + alpha_elf_tdata (b)->total_got_size <= MAX_GOT_SIZE)
2248 return TRUE;
252b5132 2249
a7519a3c
RH
2250 /* By their nature, local .got entries cannot be merged. */
2251 if ((total += alpha_elf_tdata (b)->local_got_size) > MAX_GOT_SIZE)
b34976b6 2252 return FALSE;
252b5132 2253
a7519a3c
RH
2254 /* Failing the common trivial comparison, we must effectively
2255 perform the merge. Not actually performing the merge means that
2256 we don't have to store undo information in case we fail. */
2257 for (bsub = b; bsub ; bsub = alpha_elf_tdata (bsub)->in_got_link_next)
2258 {
2259 struct alpha_elf_link_hash_entry **hashes = alpha_elf_sym_hashes (bsub);
2260 Elf_Internal_Shdr *symtab_hdr = &elf_tdata (bsub)->symtab_hdr;
2261 int i, n;
2262
2263 n = NUM_SHDR_ENTRIES (symtab_hdr) - symtab_hdr->sh_info;
2264 for (i = 0; i < n; ++i)
2265 {
2266 struct alpha_elf_got_entry *ae, *be;
2267 struct alpha_elf_link_hash_entry *h;
2268
2269 h = hashes[i];
2270 while (h->root.root.type == bfd_link_hash_indirect
2271 || h->root.root.type == bfd_link_hash_warning)
2272 h = (struct alpha_elf_link_hash_entry *)h->root.root.u.i.link;
2273
2274 for (be = h->got_entries; be ; be = be->next)
2275 {
2276 if (be->use_count == 0)
2277 continue;
2278 if (be->gotobj != b)
2279 continue;
2280
2281 for (ae = h->got_entries; ae ; ae = ae->next)
2282 if (ae->gotobj == a
2283 && ae->reloc_type == be->reloc_type
2284 && ae->addend == be->addend)
2285 goto global_found;
2286
2287 total += alpha_got_entry_size (be->reloc_type);
2288 if (total > MAX_GOT_SIZE)
2289 return FALSE;
2290 global_found:;
2291 }
2292 }
2293 }
252b5132 2294
b34976b6 2295 return TRUE;
252b5132
RH
2296}
2297
a7519a3c 2298/* Actually merge two .got tables. */
252b5132 2299
a7519a3c
RH
2300static void
2301elf64_alpha_merge_gots (bfd *a, bfd *b)
252b5132 2302{
a7519a3c
RH
2303 int total = alpha_elf_tdata (a)->total_got_size;
2304 bfd *bsub;
252b5132 2305
a7519a3c
RH
2306 /* Remember local expansion. */
2307 {
2308 int e = alpha_elf_tdata (b)->local_got_size;
2309 total += e;
2310 alpha_elf_tdata (a)->local_got_size += e;
2311 }
252b5132 2312
a7519a3c
RH
2313 for (bsub = b; bsub ; bsub = alpha_elf_tdata (bsub)->in_got_link_next)
2314 {
2315 struct alpha_elf_got_entry **local_got_entries;
2316 struct alpha_elf_link_hash_entry **hashes;
2317 Elf_Internal_Shdr *symtab_hdr;
2318 int i, n;
252b5132 2319
a7519a3c
RH
2320 /* Let the local .got entries know they are part of a new subsegment. */
2321 local_got_entries = alpha_elf_tdata (bsub)->local_got_entries;
2322 if (local_got_entries)
2323 {
2324 n = elf_tdata (bsub)->symtab_hdr.sh_info;
2325 for (i = 0; i < n; ++i)
2326 {
2327 struct alpha_elf_got_entry *ent;
2328 for (ent = local_got_entries[i]; ent; ent = ent->next)
2329 ent->gotobj = a;
2330 }
2331 }
252b5132 2332
a7519a3c
RH
2333 /* Merge the global .got entries. */
2334 hashes = alpha_elf_sym_hashes (bsub);
2335 symtab_hdr = &elf_tdata (bsub)->symtab_hdr;
252b5132 2336
a7519a3c
RH
2337 n = NUM_SHDR_ENTRIES (symtab_hdr) - symtab_hdr->sh_info;
2338 for (i = 0; i < n; ++i)
2339 {
2340 struct alpha_elf_got_entry *ae, *be, **pbe, **start;
2341 struct alpha_elf_link_hash_entry *h;
252b5132 2342
a7519a3c
RH
2343 h = hashes[i];
2344 while (h->root.root.type == bfd_link_hash_indirect
2345 || h->root.root.type == bfd_link_hash_warning)
2346 h = (struct alpha_elf_link_hash_entry *)h->root.root.u.i.link;
252b5132 2347
a7519a3c
RH
2348 pbe = start = &h->got_entries;
2349 while ((be = *pbe) != NULL)
2350 {
2351 if (be->use_count == 0)
2352 {
2353 *pbe = be->next;
2354 memset (be, 0xa5, sizeof (*be));
2355 goto kill;
2356 }
2357 if (be->gotobj != b)
2358 goto next;
2359
2360 for (ae = *start; ae ; ae = ae->next)
2361 if (ae->gotobj == a
2362 && ae->reloc_type == be->reloc_type
2363 && ae->addend == be->addend)
2364 {
2365 ae->flags |= be->flags;
2366 ae->use_count += be->use_count;
2367 *pbe = be->next;
2368 memset (be, 0xa5, sizeof (*be));
2369 goto kill;
2370 }
2371 be->gotobj = a;
2372 total += alpha_got_entry_size (be->reloc_type);
252b5132 2373
a7519a3c
RH
2374 next:;
2375 pbe = &be->next;
2376 kill:;
2377 }
2378 }
252b5132 2379
a7519a3c
RH
2380 alpha_elf_tdata (bsub)->gotobj = a;
2381 }
2382 alpha_elf_tdata (a)->total_got_size = total;
252b5132 2383
a7519a3c
RH
2384 /* Merge the two in_got chains. */
2385 {
2386 bfd *next;
252b5132 2387
a7519a3c
RH
2388 bsub = a;
2389 while ((next = alpha_elf_tdata (bsub)->in_got_link_next) != NULL)
2390 bsub = next;
252b5132 2391
a7519a3c
RH
2392 alpha_elf_tdata (bsub)->in_got_link_next = b;
2393 }
252b5132 2394}
a7519a3c
RH
2395
2396/* Calculate the offsets for the got entries. */
252b5132 2397
b34976b6 2398static bfd_boolean
a7519a3c 2399elf64_alpha_calc_got_offsets_for_symbol (struct alpha_elf_link_hash_entry *h,
2c3fc389 2400 void * arg ATTRIBUTE_UNUSED)
252b5132 2401{
a7519a3c 2402 struct alpha_elf_got_entry *gotent;
252b5132 2403
a7519a3c
RH
2404 for (gotent = h->got_entries; gotent; gotent = gotent->next)
2405 if (gotent->use_count > 0)
2406 {
2407 struct alpha_elf_obj_tdata *td;
2408 bfd_size_type *plge;
252b5132 2409
a7519a3c 2410 td = alpha_elf_tdata (gotent->gotobj);
a7519a3c
RH
2411 plge = &td->got->size;
2412 gotent->got_offset = *plge;
2413 *plge += alpha_got_entry_size (gotent->reloc_type);
2414 }
252b5132 2415
6ec7057a 2416 return TRUE;
a7519a3c 2417}
252b5132 2418
a7519a3c
RH
2419static void
2420elf64_alpha_calc_got_offsets (struct bfd_link_info *info)
2421{
4dfe6ac6
NC
2422 bfd *i, *got_list;
2423 struct alpha_elf_link_hash_table * htab;
2424
2425 htab = alpha_elf_hash_table (info);
2426 if (htab == NULL)
2427 return;
2428 got_list = htab->got_list;
252b5132 2429
a7519a3c
RH
2430 /* First, zero out the .got sizes, as we may be recalculating the
2431 .got after optimizing it. */
2432 for (i = got_list; i ; i = alpha_elf_tdata(i)->got_link_next)
2433 alpha_elf_tdata(i)->got->size = 0;
252b5132 2434
a7519a3c 2435 /* Next, fill in the offsets for all the global entries. */
4dfe6ac6 2436 alpha_elf_link_hash_traverse (htab,
a7519a3c
RH
2437 elf64_alpha_calc_got_offsets_for_symbol,
2438 NULL);
252b5132 2439
a7519a3c
RH
2440 /* Finally, fill in the offsets for the local entries. */
2441 for (i = got_list; i ; i = alpha_elf_tdata(i)->got_link_next)
2442 {
2443 bfd_size_type got_offset = alpha_elf_tdata(i)->got->size;
2444 bfd *j;
252b5132 2445
a7519a3c
RH
2446 for (j = i; j ; j = alpha_elf_tdata(j)->in_got_link_next)
2447 {
2448 struct alpha_elf_got_entry **local_got_entries, *gotent;
2449 int k, n;
252b5132 2450
a7519a3c
RH
2451 local_got_entries = alpha_elf_tdata(j)->local_got_entries;
2452 if (!local_got_entries)
2453 continue;
252b5132 2454
a7519a3c
RH
2455 for (k = 0, n = elf_tdata(j)->symtab_hdr.sh_info; k < n; ++k)
2456 for (gotent = local_got_entries[k]; gotent; gotent = gotent->next)
2457 if (gotent->use_count > 0)
2458 {
2459 gotent->got_offset = got_offset;
2460 got_offset += alpha_got_entry_size (gotent->reloc_type);
2461 }
2462 }
252b5132 2463
a7519a3c
RH
2464 alpha_elf_tdata(i)->got->size = got_offset;
2465 }
2466}
252b5132 2467
a7519a3c 2468/* Constructs the gots. */
252b5132 2469
b34976b6 2470static bfd_boolean
a7519a3c 2471elf64_alpha_size_got_sections (struct bfd_link_info *info)
252b5132 2472{
a7519a3c 2473 bfd *i, *got_list, *cur_got_obj = NULL;
4dfe6ac6 2474 struct alpha_elf_link_hash_table * htab;
252b5132 2475
4dfe6ac6
NC
2476 htab = alpha_elf_hash_table (info);
2477 if (htab == NULL)
2478 return FALSE;
2479 got_list = htab->got_list;
95404643 2480
a7519a3c
RH
2481 /* On the first time through, pretend we have an existing got list
2482 consisting of all of the input files. */
2483 if (got_list == NULL)
252b5132 2484 {
a7519a3c 2485 for (i = info->input_bfds; i ; i = i->link_next)
252b5132 2486 {
0ffa91dd
NC
2487 bfd *this_got;
2488
2489 if (! is_alpha_elf (i))
2490 continue;
2491
2492 this_got = alpha_elf_tdata (i)->gotobj;
a7519a3c
RH
2493 if (this_got == NULL)
2494 continue;
252b5132 2495
a7519a3c
RH
2496 /* We are assuming no merging has yet occurred. */
2497 BFD_ASSERT (this_got == i);
252b5132 2498
a7519a3c 2499 if (alpha_elf_tdata (this_got)->total_got_size > MAX_GOT_SIZE)
252b5132 2500 {
a7519a3c
RH
2501 /* Yikes! A single object file has too many entries. */
2502 (*_bfd_error_handler)
2503 (_("%B: .got subsegment exceeds 64K (size %d)"),
2504 i, alpha_elf_tdata (this_got)->total_got_size);
b34976b6 2505 return FALSE;
252b5132 2506 }
252b5132 2507
a7519a3c
RH
2508 if (got_list == NULL)
2509 got_list = this_got;
2510 else
2511 alpha_elf_tdata(cur_got_obj)->got_link_next = this_got;
2512 cur_got_obj = this_got;
252b5132
RH
2513 }
2514
a7519a3c
RH
2515 /* Strange degenerate case of no got references. */
2516 if (got_list == NULL)
2517 return TRUE;
2518
4dfe6ac6 2519 htab->got_list = got_list;
a7519a3c
RH
2520 }
2521
2522 cur_got_obj = got_list;
0ffa91dd
NC
2523 if (cur_got_obj == NULL)
2524 return FALSE;
2525
a7519a3c
RH
2526 i = alpha_elf_tdata(cur_got_obj)->got_link_next;
2527 while (i != NULL)
2528 {
2529 if (elf64_alpha_can_merge_gots (cur_got_obj, i))
252b5132 2530 {
a7519a3c 2531 elf64_alpha_merge_gots (cur_got_obj, i);
252b5132 2532
a7519a3c
RH
2533 alpha_elf_tdata(i)->got->size = 0;
2534 i = alpha_elf_tdata(i)->got_link_next;
2535 alpha_elf_tdata(cur_got_obj)->got_link_next = i;
a7519a3c
RH
2536 }
2537 else
2538 {
2539 cur_got_obj = i;
2540 i = alpha_elf_tdata(i)->got_link_next;
2541 }
252b5132
RH
2542 }
2543
a7519a3c
RH
2544 /* Once the gots have been merged, fill in the got offsets for
2545 everything therein. */
4a828aab 2546 elf64_alpha_calc_got_offsets (info);
252b5132 2547
a7519a3c 2548 return TRUE;
252b5132 2549}
252b5132 2550
b34976b6 2551static bfd_boolean
2c3fc389
NC
2552elf64_alpha_size_plt_section_1 (struct alpha_elf_link_hash_entry *h,
2553 void * data)
252b5132 2554{
a7519a3c
RH
2555 asection *splt = (asection *) data;
2556 struct alpha_elf_got_entry *gotent;
6ec7057a 2557 bfd_boolean saw_one = FALSE;
252b5132 2558
a7519a3c
RH
2559 /* If we didn't need an entry before, we still don't. */
2560 if (!h->root.needs_plt)
2561 return TRUE;
e92d460e 2562
6ec7057a 2563 /* For each LITERAL got entry still in use, allocate a plt entry. */
a7519a3c
RH
2564 for (gotent = h->got_entries; gotent ; gotent = gotent->next)
2565 if (gotent->reloc_type == R_ALPHA_LITERAL
2566 && gotent->use_count > 0)
6ec7057a
RH
2567 {
2568 if (splt->size == 0)
2569 splt->size = PLT_HEADER_SIZE;
2570 gotent->plt_offset = splt->size;
2571 splt->size += PLT_ENTRY_SIZE;
2572 saw_one = TRUE;
2573 }
a7519a3c 2574
6ec7057a
RH
2575 /* If there weren't any, there's no longer a need for the PLT entry. */
2576 if (!saw_one)
2577 h->root.needs_plt = FALSE;
a7519a3c
RH
2578
2579 return TRUE;
2580}
2581
4a828aab
RH
2582/* Called from relax_section to rebuild the PLT in light of potential changes
2583 in the function's status. */
a7519a3c 2584
4a828aab 2585static void
a7519a3c
RH
2586elf64_alpha_size_plt_section (struct bfd_link_info *info)
2587{
6ec7057a 2588 asection *splt, *spltrel, *sgotplt;
a7519a3c
RH
2589 unsigned long entries;
2590 bfd *dynobj;
4dfe6ac6
NC
2591 struct alpha_elf_link_hash_table * htab;
2592
2593 htab = alpha_elf_hash_table (info);
2594 if (htab == NULL)
2595 return;
a7519a3c
RH
2596
2597 dynobj = elf_hash_table(info)->dynobj;
3d4d4302 2598 splt = bfd_get_linker_section (dynobj, ".plt");
a7519a3c 2599 if (splt == NULL)
4a828aab 2600 return;
252b5132 2601
a7519a3c 2602 splt->size = 0;
252b5132 2603
4dfe6ac6 2604 alpha_elf_link_hash_traverse (htab,
a7519a3c 2605 elf64_alpha_size_plt_section_1, splt);
e92d460e 2606
a7519a3c 2607 /* Every plt entry requires a JMP_SLOT relocation. */
3d4d4302 2608 spltrel = bfd_get_linker_section (dynobj, ".rela.plt");
4a828aab 2609 entries = 0;
a7519a3c 2610 if (splt->size)
6ec7057a
RH
2611 {
2612 if (elf64_alpha_use_secureplt)
2613 entries = (splt->size - NEW_PLT_HEADER_SIZE) / NEW_PLT_ENTRY_SIZE;
2614 else
2615 entries = (splt->size - OLD_PLT_HEADER_SIZE) / OLD_PLT_ENTRY_SIZE;
2616 }
a7519a3c 2617 spltrel->size = entries * sizeof (Elf64_External_Rela);
e92d460e 2618
6ec7057a
RH
2619 /* When using the secureplt, we need two words somewhere in the data
2620 segment for the dynamic linker to tell us where to go. This is the
2621 entire contents of the .got.plt section. */
2622 if (elf64_alpha_use_secureplt)
2623 {
3d4d4302 2624 sgotplt = bfd_get_linker_section (dynobj, ".got.plt");
6ec7057a
RH
2625 sgotplt->size = entries ? 16 : 0;
2626 }
a7519a3c 2627}
e92d460e 2628
a7519a3c
RH
2629static bfd_boolean
2630elf64_alpha_always_size_sections (bfd *output_bfd ATTRIBUTE_UNUSED,
2631 struct bfd_link_info *info)
2632{
2633 bfd *i;
4dfe6ac6 2634 struct alpha_elf_link_hash_table * htab;
252b5132 2635
a7519a3c
RH
2636 if (info->relocatable)
2637 return TRUE;
252b5132 2638
4dfe6ac6
NC
2639 htab = alpha_elf_hash_table (info);
2640 if (htab == NULL)
2641 return FALSE;
2642
a7519a3c
RH
2643 if (!elf64_alpha_size_got_sections (info))
2644 return FALSE;
252b5132 2645
a7519a3c 2646 /* Allocate space for all of the .got subsections. */
4dfe6ac6 2647 i = htab->got_list;
a7519a3c 2648 for ( ; i ; i = alpha_elf_tdata(i)->got_link_next)
252b5132 2649 {
a7519a3c
RH
2650 asection *s = alpha_elf_tdata(i)->got;
2651 if (s->size > 0)
2652 {
2653 s->contents = (bfd_byte *) bfd_zalloc (i, s->size);
2654 if (s->contents == NULL)
2655 return FALSE;
2656 }
252b5132
RH
2657 }
2658
b34976b6 2659 return TRUE;
252b5132 2660}
3765b1be 2661
a7519a3c 2662/* The number of dynamic relocations required by a static relocation. */
3765b1be 2663
a7519a3c 2664static int
e366eeae 2665alpha_dynamic_entries_for_reloc (int r_type, int dynamic, int shared, int pie)
a7519a3c
RH
2666{
2667 switch (r_type)
3765b1be 2668 {
a7519a3c
RH
2669 /* May appear in GOT entries. */
2670 case R_ALPHA_TLSGD:
2671 return (dynamic ? 2 : shared ? 1 : 0);
2672 case R_ALPHA_TLSLDM:
2673 return shared;
2674 case R_ALPHA_LITERAL:
a7519a3c 2675 return dynamic || shared;
e366eeae
RH
2676 case R_ALPHA_GOTTPREL:
2677 return dynamic || (shared && !pie);
a7519a3c
RH
2678 case R_ALPHA_GOTDTPREL:
2679 return dynamic;
3765b1be 2680
a7519a3c
RH
2681 /* May appear in data sections. */
2682 case R_ALPHA_REFLONG:
2683 case R_ALPHA_REFQUAD:
a7519a3c 2684 return dynamic || shared;
e366eeae
RH
2685 case R_ALPHA_TPREL64:
2686 return dynamic || (shared && !pie);
3765b1be 2687
a7519a3c
RH
2688 /* Everything else is illegal. We'll issue an error during
2689 relocate_section. */
2690 default:
2691 return 0;
2692 }
2693}
3765b1be 2694
a7519a3c 2695/* Work out the sizes of the dynamic relocation entries. */
3765b1be 2696
a7519a3c
RH
2697static bfd_boolean
2698elf64_alpha_calc_dynrel_sizes (struct alpha_elf_link_hash_entry *h,
2699 struct bfd_link_info *info)
2700{
2701 bfd_boolean dynamic;
2702 struct alpha_elf_reloc_entry *relent;
2703 unsigned long entries;
3765b1be 2704
a7519a3c
RH
2705 /* If the symbol was defined as a common symbol in a regular object
2706 file, and there was no definition in any dynamic object, then the
2707 linker will have allocated space for the symbol in a common
2708 section but the ELF_LINK_HASH_DEF_REGULAR flag will not have been
2709 set. This is done for dynamic symbols in
2710 elf_adjust_dynamic_symbol but this is not done for non-dynamic
2711 symbols, somehow. */
2712 if (!h->root.def_regular
2713 && h->root.ref_regular
2714 && !h->root.def_dynamic
2715 && (h->root.root.type == bfd_link_hash_defined
2716 || h->root.root.type == bfd_link_hash_defweak)
2717 && !(h->root.root.u.def.section->owner->flags & DYNAMIC))
2718 h->root.def_regular = 1;
3765b1be 2719
a7519a3c
RH
2720 /* If the symbol is dynamic, we'll need all the relocations in their
2721 natural form. If this is a shared object, and it has been forced
2722 local, we'll need the same number of RELATIVE relocations. */
2723 dynamic = alpha_elf_dynamic_symbol_p (&h->root, info);
3765b1be 2724
a7519a3c
RH
2725 /* If the symbol is a hidden undefined weak, then we never have any
2726 relocations. Avoid the loop which may want to add RELATIVE relocs
2727 based on info->shared. */
2728 if (h->root.root.type == bfd_link_hash_undefweak && !dynamic)
2729 return TRUE;
2730
2731 for (relent = h->reloc_entries; relent; relent = relent->next)
3765b1be 2732 {
a7519a3c 2733 entries = alpha_dynamic_entries_for_reloc (relent->rtype, dynamic,
e366eeae 2734 info->shared, info->pie);
a7519a3c
RH
2735 if (entries)
2736 {
2737 relent->srel->size +=
2738 entries * sizeof (Elf64_External_Rela) * relent->count;
2739 if (relent->reltext)
2740 info->flags |= DT_TEXTREL;
2741 }
2742 }
3765b1be 2743
a7519a3c
RH
2744 return TRUE;
2745}
3765b1be 2746
a7519a3c
RH
2747/* Subroutine of elf64_alpha_size_rela_got_section for doing the
2748 global symbols. */
3765b1be 2749
a7519a3c
RH
2750static bfd_boolean
2751elf64_alpha_size_rela_got_1 (struct alpha_elf_link_hash_entry *h,
2752 struct bfd_link_info *info)
2753{
2754 bfd_boolean dynamic;
2755 struct alpha_elf_got_entry *gotent;
2756 unsigned long entries;
3765b1be 2757
6ec7057a
RH
2758 /* If we're using a plt for this symbol, then all of its relocations
2759 for its got entries go into .rela.plt. */
2760 if (h->root.needs_plt)
2761 return TRUE;
2762
a7519a3c
RH
2763 /* If the symbol is dynamic, we'll need all the relocations in their
2764 natural form. If this is a shared object, and it has been forced
2765 local, we'll need the same number of RELATIVE relocations. */
2766 dynamic = alpha_elf_dynamic_symbol_p (&h->root, info);
2767
2768 /* If the symbol is a hidden undefined weak, then we never have any
2769 relocations. Avoid the loop which may want to add RELATIVE relocs
2770 based on info->shared. */
2771 if (h->root.root.type == bfd_link_hash_undefweak && !dynamic)
2772 return TRUE;
2773
2774 entries = 0;
2775 for (gotent = h->got_entries; gotent ; gotent = gotent->next)
2776 if (gotent->use_count > 0)
e366eeae
RH
2777 entries += alpha_dynamic_entries_for_reloc (gotent->reloc_type, dynamic,
2778 info->shared, info->pie);
a7519a3c 2779
a7519a3c
RH
2780 if (entries > 0)
2781 {
2782 bfd *dynobj = elf_hash_table(info)->dynobj;
3d4d4302 2783 asection *srel = bfd_get_linker_section (dynobj, ".rela.got");
a7519a3c
RH
2784 BFD_ASSERT (srel != NULL);
2785 srel->size += sizeof (Elf64_External_Rela) * entries;
3765b1be 2786 }
3765b1be 2787
a7519a3c 2788 return TRUE;
3765b1be
RH
2789}
2790
a7519a3c 2791/* Set the sizes of the dynamic relocation sections. */
252b5132 2792
4a828aab 2793static void
a7519a3c 2794elf64_alpha_size_rela_got_section (struct bfd_link_info *info)
252b5132 2795{
a7519a3c
RH
2796 unsigned long entries;
2797 bfd *i, *dynobj;
2798 asection *srel;
4dfe6ac6
NC
2799 struct alpha_elf_link_hash_table * htab;
2800
2801 htab = alpha_elf_hash_table (info);
2802 if (htab == NULL)
2803 return;
252b5132 2804
a7519a3c
RH
2805 /* Shared libraries often require RELATIVE relocs, and some relocs
2806 require attention for the main application as well. */
252b5132 2807
a7519a3c 2808 entries = 0;
4dfe6ac6 2809 for (i = htab->got_list;
a7519a3c
RH
2810 i ; i = alpha_elf_tdata(i)->got_link_next)
2811 {
2812 bfd *j;
3241278a 2813
a7519a3c
RH
2814 for (j = i; j ; j = alpha_elf_tdata(j)->in_got_link_next)
2815 {
2816 struct alpha_elf_got_entry **local_got_entries, *gotent;
2817 int k, n;
252b5132 2818
a7519a3c
RH
2819 local_got_entries = alpha_elf_tdata(j)->local_got_entries;
2820 if (!local_got_entries)
2821 continue;
252b5132 2822
a7519a3c
RH
2823 for (k = 0, n = elf_tdata(j)->symtab_hdr.sh_info; k < n; ++k)
2824 for (gotent = local_got_entries[k];
2825 gotent ; gotent = gotent->next)
2826 if (gotent->use_count > 0)
2827 entries += (alpha_dynamic_entries_for_reloc
e366eeae 2828 (gotent->reloc_type, 0, info->shared, info->pie));
a7519a3c
RH
2829 }
2830 }
3765b1be 2831
a7519a3c 2832 dynobj = elf_hash_table(info)->dynobj;
3d4d4302 2833 srel = bfd_get_linker_section (dynobj, ".rela.got");
a7519a3c
RH
2834 if (!srel)
2835 {
2836 BFD_ASSERT (entries == 0);
4a828aab 2837 return;
a7519a3c
RH
2838 }
2839 srel->size = sizeof (Elf64_External_Rela) * entries;
252b5132 2840
a7519a3c 2841 /* Now do the non-local symbols. */
4dfe6ac6 2842 alpha_elf_link_hash_traverse (htab,
a7519a3c 2843 elf64_alpha_size_rela_got_1, info);
a7519a3c 2844}
252b5132 2845
a7519a3c 2846/* Set the sizes of the dynamic sections. */
3765b1be 2847
a7519a3c
RH
2848static bfd_boolean
2849elf64_alpha_size_dynamic_sections (bfd *output_bfd ATTRIBUTE_UNUSED,
2850 struct bfd_link_info *info)
2851{
2852 bfd *dynobj;
2853 asection *s;
2854 bfd_boolean relplt;
4dfe6ac6
NC
2855 struct alpha_elf_link_hash_table * htab;
2856
2857 htab = alpha_elf_hash_table (info);
2858 if (htab == NULL)
2859 return FALSE;
3765b1be 2860
a7519a3c
RH
2861 dynobj = elf_hash_table(info)->dynobj;
2862 BFD_ASSERT(dynobj != NULL);
252b5132 2863
a7519a3c
RH
2864 if (elf_hash_table (info)->dynamic_sections_created)
2865 {
2866 /* Set the contents of the .interp section to the interpreter. */
2867 if (info->executable)
252b5132 2868 {
3d4d4302 2869 s = bfd_get_linker_section (dynobj, ".interp");
a7519a3c
RH
2870 BFD_ASSERT (s != NULL);
2871 s->size = sizeof ELF_DYNAMIC_INTERPRETER;
2872 s->contents = (unsigned char *) ELF_DYNAMIC_INTERPRETER;
2873 }
3765b1be 2874
a7519a3c
RH
2875 /* Now that we've seen all of the input files, we can decide which
2876 symbols need dynamic relocation entries and which don't. We've
2877 collected information in check_relocs that we can now apply to
2878 size the dynamic relocation sections. */
4dfe6ac6 2879 alpha_elf_link_hash_traverse (htab,
a7519a3c 2880 elf64_alpha_calc_dynrel_sizes, info);
252b5132 2881
a7519a3c 2882 elf64_alpha_size_rela_got_section (info);
6ec7057a 2883 elf64_alpha_size_plt_section (info);
a7519a3c
RH
2884 }
2885 /* else we're not dynamic and by definition we don't need such things. */
3765b1be 2886
a7519a3c
RH
2887 /* The check_relocs and adjust_dynamic_symbol entry points have
2888 determined the sizes of the various dynamic sections. Allocate
2889 memory for them. */
2890 relplt = FALSE;
2891 for (s = dynobj->sections; s != NULL; s = s->next)
2892 {
2893 const char *name;
3765b1be 2894
a7519a3c
RH
2895 if (!(s->flags & SEC_LINKER_CREATED))
2896 continue;
cc03ec80 2897
a7519a3c
RH
2898 /* It's OK to base decisions on the section name, because none
2899 of the dynobj section names depend upon the input files. */
2900 name = bfd_get_section_name (dynobj, s);
3765b1be 2901
0112cd26 2902 if (CONST_STRNEQ (name, ".rela"))
3765b1be 2903 {
c456f082 2904 if (s->size != 0)
a7519a3c 2905 {
c456f082 2906 if (strcmp (name, ".rela.plt") == 0)
a7519a3c 2907 relplt = TRUE;
252b5132 2908
a7519a3c
RH
2909 /* We use the reloc_count field as a counter if we need
2910 to copy relocs into the output file. */
2911 s->reloc_count = 0;
252b5132 2912 }
3765b1be 2913 }
0112cd26 2914 else if (! CONST_STRNEQ (name, ".got")
c456f082
AM
2915 && strcmp (name, ".plt") != 0
2916 && strcmp (name, ".dynbss") != 0)
3765b1be 2917 {
a7519a3c
RH
2918 /* It's not one of our dynamic sections, so don't allocate space. */
2919 continue;
2920 }
252b5132 2921
c456f082
AM
2922 if (s->size == 0)
2923 {
2924 /* If we don't need this section, strip it from the output file.
2925 This is to handle .rela.bss and .rela.plt. We must create it
2926 in create_dynamic_sections, because it must be created before
2927 the linker maps input sections to output sections. The
2928 linker does that before adjust_dynamic_symbol is called, and
2929 it is that function which decides whether anything needs to
2930 go into these sections. */
6452a567
RH
2931 if (!CONST_STRNEQ (name, ".got"))
2932 s->flags |= SEC_EXCLUDE;
c456f082
AM
2933 }
2934 else if ((s->flags & SEC_HAS_CONTENTS) != 0)
a7519a3c
RH
2935 {
2936 /* Allocate memory for the section contents. */
2937 s->contents = (bfd_byte *) bfd_zalloc (dynobj, s->size);
c456f082 2938 if (s->contents == NULL)
b34976b6 2939 return FALSE;
a7519a3c
RH
2940 }
2941 }
3765b1be 2942
a7519a3c
RH
2943 if (elf_hash_table (info)->dynamic_sections_created)
2944 {
2945 /* Add some entries to the .dynamic section. We fill in the
2946 values later, in elf64_alpha_finish_dynamic_sections, but we
2947 must add the entries now so that we get the correct size for
2948 the .dynamic section. The DT_DEBUG entry is filled in by the
2949 dynamic linker and used by the debugger. */
2950#define add_dynamic_entry(TAG, VAL) \
2951 _bfd_elf_add_dynamic_entry (info, TAG, VAL)
3765b1be 2952
a7519a3c
RH
2953 if (info->executable)
2954 {
2955 if (!add_dynamic_entry (DT_DEBUG, 0))
2956 return FALSE;
3765b1be
RH
2957 }
2958
a7519a3c 2959 if (relplt)
3765b1be 2960 {
a7519a3c
RH
2961 if (!add_dynamic_entry (DT_PLTGOT, 0)
2962 || !add_dynamic_entry (DT_PLTRELSZ, 0)
2963 || !add_dynamic_entry (DT_PLTREL, DT_RELA)
2964 || !add_dynamic_entry (DT_JMPREL, 0))
2965 return FALSE;
6ec7057a
RH
2966
2967 if (elf64_alpha_use_secureplt
2968 && !add_dynamic_entry (DT_ALPHA_PLTRO, 1))
2969 return FALSE;
a7519a3c 2970 }
252b5132 2971
a7519a3c
RH
2972 if (!add_dynamic_entry (DT_RELA, 0)
2973 || !add_dynamic_entry (DT_RELASZ, 0)
2974 || !add_dynamic_entry (DT_RELAENT, sizeof (Elf64_External_Rela)))
2975 return FALSE;
2976
2977 if (info->flags & DF_TEXTREL)
2978 {
2979 if (!add_dynamic_entry (DT_TEXTREL, 0))
2980 return FALSE;
252b5132
RH
2981 }
2982 }
a7519a3c 2983#undef add_dynamic_entry
252b5132 2984
b34976b6 2985 return TRUE;
252b5132 2986}
a7519a3c
RH
2987\f
2988/* These functions do relaxation for Alpha ELF.
252b5132 2989
a7519a3c
RH
2990 Currently I'm only handling what I can do with existing compiler
2991 and assembler support, which means no instructions are removed,
2992 though some may be nopped. At this time GCC does not emit enough
2993 information to do all of the relaxing that is possible. It will
2994 take some not small amount of work for that to happen.
252b5132 2995
a7519a3c
RH
2996 There are a couple of interesting papers that I once read on this
2997 subject, that I cannot find references to at the moment, that
2998 related to Alpha in particular. They are by David Wall, then of
2999 DEC WRL. */
252b5132 3000
a7519a3c
RH
3001struct alpha_relax_info
3002{
3003 bfd *abfd;
3004 asection *sec;
3005 bfd_byte *contents;
3006 Elf_Internal_Shdr *symtab_hdr;
3007 Elf_Internal_Rela *relocs, *relend;
3008 struct bfd_link_info *link_info;
3009 bfd_vma gp;
3010 bfd *gotobj;
3011 asection *tsec;
3012 struct alpha_elf_link_hash_entry *h;
3013 struct alpha_elf_got_entry **first_gotent;
3014 struct alpha_elf_got_entry *gotent;
3015 bfd_boolean changed_contents;
3016 bfd_boolean changed_relocs;
3017 unsigned char other;
3018};
252b5132 3019
a7519a3c
RH
3020static Elf_Internal_Rela *
3021elf64_alpha_find_reloc_at_ofs (Elf_Internal_Rela *rel,
3022 Elf_Internal_Rela *relend,
3023 bfd_vma offset, int type)
3024{
3025 while (rel < relend)
252b5132 3026 {
a7519a3c
RH
3027 if (rel->r_offset == offset
3028 && ELF64_R_TYPE (rel->r_info) == (unsigned int) type)
3029 return rel;
3030 ++rel;
3031 }
3032 return NULL;
3033}
252b5132 3034
a7519a3c
RH
3035static bfd_boolean
3036elf64_alpha_relax_got_load (struct alpha_relax_info *info, bfd_vma symval,
3037 Elf_Internal_Rela *irel, unsigned long r_type)
3038{
3039 unsigned int insn;
3040 bfd_signed_vma disp;
252b5132 3041
a7519a3c
RH
3042 /* Get the instruction. */
3043 insn = bfd_get_32 (info->abfd, info->contents + irel->r_offset);
252b5132 3044
a7519a3c
RH
3045 if (insn >> 26 != OP_LDQ)
3046 {
3047 reloc_howto_type *howto = elf64_alpha_howto_table + r_type;
3048 ((*_bfd_error_handler)
3049 ("%B: %A+0x%lx: warning: %s relocation against unexpected insn",
3050 info->abfd, info->sec,
3051 (unsigned long) irel->r_offset, howto->name));
3052 return TRUE;
3053 }
252b5132 3054
a7519a3c
RH
3055 /* Can't relax dynamic symbols. */
3056 if (alpha_elf_dynamic_symbol_p (&info->h->root, info->link_info))
3057 return TRUE;
252b5132 3058
a7519a3c 3059 /* Can't use local-exec relocations in shared libraries. */
e366eeae
RH
3060 if (r_type == R_ALPHA_GOTTPREL
3061 && (info->link_info->shared && !info->link_info->pie))
a7519a3c 3062 return TRUE;
252b5132 3063
a7519a3c
RH
3064 if (r_type == R_ALPHA_LITERAL)
3065 {
3066 /* Look for nice constant addresses. This includes the not-uncommon
3067 special case of 0 for undefweak symbols. */
3068 if ((info->h && info->h->root.root.type == bfd_link_hash_undefweak)
3069 || (!info->link_info->shared
3070 && (symval >= (bfd_vma)-0x8000 || symval < 0x8000)))
3071 {
3072 disp = 0;
3073 insn = (OP_LDA << 26) | (insn & (31 << 21)) | (31 << 16);
3074 insn |= (symval & 0xffff);
3075 r_type = R_ALPHA_NONE;
3076 }
3077 else
3078 {
3079 disp = symval - info->gp;
3080 insn = (OP_LDA << 26) | (insn & 0x03ff0000);
3081 r_type = R_ALPHA_GPREL16;
3082 }
252b5132
RH
3083 }
3084 else
252b5132 3085 {
a7519a3c 3086 bfd_vma dtp_base, tp_base;
252b5132 3087
a7519a3c
RH
3088 BFD_ASSERT (elf_hash_table (info->link_info)->tls_sec != NULL);
3089 dtp_base = alpha_get_dtprel_base (info->link_info);
3090 tp_base = alpha_get_tprel_base (info->link_info);
3091 disp = symval - (r_type == R_ALPHA_GOTDTPREL ? dtp_base : tp_base);
252b5132 3092
a7519a3c 3093 insn = (OP_LDA << 26) | (insn & (31 << 21)) | (31 << 16);
252b5132 3094
a7519a3c
RH
3095 switch (r_type)
3096 {
3097 case R_ALPHA_GOTDTPREL:
3098 r_type = R_ALPHA_DTPREL16;
3099 break;
3100 case R_ALPHA_GOTTPREL:
3101 r_type = R_ALPHA_TPREL16;
3102 break;
3103 default:
3104 BFD_ASSERT (0);
3105 return FALSE;
3106 }
3107 }
252b5132 3108
a7519a3c 3109 if (disp < -0x8000 || disp >= 0x8000)
b34976b6 3110 return TRUE;
252b5132 3111
a7519a3c
RH
3112 bfd_put_32 (info->abfd, (bfd_vma) insn, info->contents + irel->r_offset);
3113 info->changed_contents = TRUE;
252b5132 3114
a7519a3c
RH
3115 /* Reduce the use count on this got entry by one, possibly
3116 eliminating it. */
3117 if (--info->gotent->use_count == 0)
252b5132 3118 {
a7519a3c
RH
3119 int sz = alpha_got_entry_size (r_type);
3120 alpha_elf_tdata (info->gotobj)->total_got_size -= sz;
3121 if (!info->h)
3122 alpha_elf_tdata (info->gotobj)->local_got_size -= sz;
252b5132 3123 }
252b5132 3124
a7519a3c
RH
3125 /* Smash the existing GOT relocation for its 16-bit immediate pair. */
3126 irel->r_info = ELF64_R_INFO (ELF64_R_SYM (irel->r_info), r_type);
3127 info->changed_relocs = TRUE;
3128
3129 /* ??? Search forward through this basic block looking for insns
3130 that use the target register. Stop after an insn modifying the
3131 register is seen, or after a branch or call.
252b5132 3132
a7519a3c
RH
3133 Any such memory load insn may be substituted by a load directly
3134 off the GP. This allows the memory load insn to be issued before
3135 the calculated GP register would otherwise be ready.
252b5132 3136
a7519a3c
RH
3137 Any such jsr insn can be replaced by a bsr if it is in range.
3138
3139 This would mean that we'd have to _add_ relocations, the pain of
3140 which gives one pause. */
252b5132 3141
b34976b6 3142 return TRUE;
252b5132
RH
3143}
3144
a7519a3c
RH
3145static bfd_vma
3146elf64_alpha_relax_opt_call (struct alpha_relax_info *info, bfd_vma symval)
252b5132 3147{
a7519a3c
RH
3148 /* If the function has the same gp, and we can identify that the
3149 function does not use its function pointer, we can eliminate the
3150 address load. */
252b5132 3151
a7519a3c
RH
3152 /* If the symbol is marked NOPV, we are being told the function never
3153 needs its procedure value. */
3154 if ((info->other & STO_ALPHA_STD_GPLOAD) == STO_ALPHA_NOPV)
3155 return symval;
252b5132 3156
a7519a3c
RH
3157 /* If the symbol is marked STD_GP, we are being told the function does
3158 a normal ldgp in the first two words. */
3159 else if ((info->other & STO_ALPHA_STD_GPLOAD) == STO_ALPHA_STD_GPLOAD)
3160 ;
252b5132 3161
a7519a3c
RH
3162 /* Otherwise, we may be able to identify a GP load in the first two
3163 words, which we can then skip. */
3164 else
252b5132 3165 {
a7519a3c
RH
3166 Elf_Internal_Rela *tsec_relocs, *tsec_relend, *tsec_free, *gpdisp;
3167 bfd_vma ofs;
252b5132 3168
a7519a3c
RH
3169 /* Load the relocations from the section that the target symbol is in. */
3170 if (info->sec == info->tsec)
252b5132 3171 {
a7519a3c
RH
3172 tsec_relocs = info->relocs;
3173 tsec_relend = info->relend;
3174 tsec_free = NULL;
3175 }
3176 else
3177 {
3178 tsec_relocs = (_bfd_elf_link_read_relocs
2c3fc389 3179 (info->abfd, info->tsec, NULL,
a7519a3c
RH
3180 (Elf_Internal_Rela *) NULL,
3181 info->link_info->keep_memory));
3182 if (tsec_relocs == NULL)
3183 return 0;
3184 tsec_relend = tsec_relocs + info->tsec->reloc_count;
3185 tsec_free = (info->link_info->keep_memory ? NULL : tsec_relocs);
3186 }
252b5132 3187
a7519a3c
RH
3188 /* Recover the symbol's offset within the section. */
3189 ofs = (symval - info->tsec->output_section->vma
3190 - info->tsec->output_offset);
252b5132 3191
a7519a3c
RH
3192 /* Look for a GPDISP reloc. */
3193 gpdisp = (elf64_alpha_find_reloc_at_ofs
3194 (tsec_relocs, tsec_relend, ofs, R_ALPHA_GPDISP));
252b5132 3195
a7519a3c
RH
3196 if (!gpdisp || gpdisp->r_addend != 4)
3197 {
3198 if (tsec_free)
3199 free (tsec_free);
3200 return 0;
252b5132 3201 }
a7519a3c
RH
3202 if (tsec_free)
3203 free (tsec_free);
252b5132
RH
3204 }
3205
a7519a3c
RH
3206 /* We've now determined that we can skip an initial gp load. Verify
3207 that the call and the target use the same gp. */
f13a99db 3208 if (info->link_info->output_bfd->xvec != info->tsec->owner->xvec
a7519a3c
RH
3209 || info->gotobj != alpha_elf_tdata (info->tsec->owner)->gotobj)
3210 return 0;
252b5132 3211
a7519a3c
RH
3212 return symval + 8;
3213}
252b5132 3214
a7519a3c
RH
3215static bfd_boolean
3216elf64_alpha_relax_with_lituse (struct alpha_relax_info *info,
3217 bfd_vma symval, Elf_Internal_Rela *irel)
252b5132 3218{
a7519a3c
RH
3219 Elf_Internal_Rela *urel, *irelend = info->relend;
3220 int flags, count, i;
3221 bfd_signed_vma disp;
3222 bfd_boolean fits16;
3223 bfd_boolean fits32;
3224 bfd_boolean lit_reused = FALSE;
3225 bfd_boolean all_optimized = TRUE;
3226 unsigned int lit_insn;
252b5132 3227
a7519a3c
RH
3228 lit_insn = bfd_get_32 (info->abfd, info->contents + irel->r_offset);
3229 if (lit_insn >> 26 != OP_LDQ)
3230 {
3231 ((*_bfd_error_handler)
3232 ("%B: %A+0x%lx: warning: LITERAL relocation against unexpected insn",
3233 info->abfd, info->sec,
3234 (unsigned long) irel->r_offset));
3235 return TRUE;
3236 }
252b5132 3237
a7519a3c
RH
3238 /* Can't relax dynamic symbols. */
3239 if (alpha_elf_dynamic_symbol_p (&info->h->root, info->link_info))
3240 return TRUE;
3241
3242 /* Summarize how this particular LITERAL is used. */
3243 for (urel = irel+1, flags = count = 0; urel < irelend; ++urel, ++count)
252b5132 3244 {
a7519a3c
RH
3245 if (ELF64_R_TYPE (urel->r_info) != R_ALPHA_LITUSE)
3246 break;
8288a39e 3247 if (urel->r_addend <= 6)
a7519a3c
RH
3248 flags |= 1 << urel->r_addend;
3249 }
252b5132 3250
a7519a3c
RH
3251 /* A little preparation for the loop... */
3252 disp = symval - info->gp;
252b5132 3253
a7519a3c
RH
3254 for (urel = irel+1, i = 0; i < count; ++i, ++urel)
3255 {
3256 unsigned int insn;
3257 int insn_disp;
3258 bfd_signed_vma xdisp;
252b5132 3259
a7519a3c 3260 insn = bfd_get_32 (info->abfd, info->contents + urel->r_offset);
252b5132 3261
a7519a3c
RH
3262 switch (urel->r_addend)
3263 {
3264 case LITUSE_ALPHA_ADDR:
3265 default:
3266 /* This type is really just a placeholder to note that all
3267 uses cannot be optimized, but to still allow some. */
3268 all_optimized = FALSE;
3269 break;
252b5132 3270
a7519a3c
RH
3271 case LITUSE_ALPHA_BASE:
3272 /* We can always optimize 16-bit displacements. */
252b5132 3273
a7519a3c
RH
3274 /* Extract the displacement from the instruction, sign-extending
3275 it if necessary, then test whether it is within 16 or 32 bits
3276 displacement from GP. */
3277 insn_disp = ((insn & 0xffff) ^ 0x8000) - 0x8000;
3278
3279 xdisp = disp + insn_disp;
3280 fits16 = (xdisp >= - (bfd_signed_vma) 0x8000 && xdisp < 0x8000);
3281 fits32 = (xdisp >= - (bfd_signed_vma) 0x80000000
3282 && xdisp < 0x7fff8000);
3283
3284 if (fits16)
3285 {
3286 /* Take the op code and dest from this insn, take the base
3287 register from the literal insn. Leave the offset alone. */
3288 insn = (insn & 0xffe0ffff) | (lit_insn & 0x001f0000);
3289 urel->r_info = ELF64_R_INFO (ELF64_R_SYM (irel->r_info),
3290 R_ALPHA_GPREL16);
3291 urel->r_addend = irel->r_addend;
3292 info->changed_relocs = TRUE;
252b5132 3293
a7519a3c
RH
3294 bfd_put_32 (info->abfd, (bfd_vma) insn,
3295 info->contents + urel->r_offset);
3296 info->changed_contents = TRUE;
252b5132 3297 }
252b5132 3298
a7519a3c
RH
3299 /* If all mem+byte, we can optimize 32-bit mem displacements. */
3300 else if (fits32 && !(flags & ~6))
3301 {
3302 /* FIXME: sanity check that lit insn Ra is mem insn Rb. */
252b5132 3303
a7519a3c
RH
3304 irel->r_info = ELF64_R_INFO (ELF64_R_SYM (irel->r_info),
3305 R_ALPHA_GPRELHIGH);
3306 lit_insn = (OP_LDAH << 26) | (lit_insn & 0x03ff0000);
3307 bfd_put_32 (info->abfd, (bfd_vma) lit_insn,
3308 info->contents + irel->r_offset);
3309 lit_reused = TRUE;
3310 info->changed_contents = TRUE;
252b5132 3311
a7519a3c
RH
3312 urel->r_info = ELF64_R_INFO (ELF64_R_SYM (irel->r_info),
3313 R_ALPHA_GPRELLOW);
3314 urel->r_addend = irel->r_addend;
3315 info->changed_relocs = TRUE;
3316 }
3317 else
3318 all_optimized = FALSE;
3319 break;
252b5132 3320
a7519a3c
RH
3321 case LITUSE_ALPHA_BYTOFF:
3322 /* We can always optimize byte instructions. */
252b5132 3323
a7519a3c
RH
3324 /* FIXME: sanity check the insn for byte op. Check that the
3325 literal dest reg is indeed Rb in the byte insn. */
252b5132 3326
a7519a3c
RH
3327 insn &= ~ (unsigned) 0x001ff000;
3328 insn |= ((symval & 7) << 13) | 0x1000;
252b5132 3329
a7519a3c
RH
3330 urel->r_info = ELF64_R_INFO (0, R_ALPHA_NONE);
3331 urel->r_addend = 0;
3332 info->changed_relocs = TRUE;
e92d460e 3333
a7519a3c
RH
3334 bfd_put_32 (info->abfd, (bfd_vma) insn,
3335 info->contents + urel->r_offset);
3336 info->changed_contents = TRUE;
3337 break;
252b5132 3338
a7519a3c
RH
3339 case LITUSE_ALPHA_JSR:
3340 case LITUSE_ALPHA_TLSGD:
3341 case LITUSE_ALPHA_TLSLDM:
8288a39e 3342 case LITUSE_ALPHA_JSRDIRECT:
0d5f9994 3343 {
a7519a3c
RH
3344 bfd_vma optdest, org;
3345 bfd_signed_vma odisp;
252b5132 3346
a7519a3c
RH
3347 /* For undefined weak symbols, we're mostly interested in getting
3348 rid of the got entry whenever possible, so optimize this to a
3349 use of the zero register. */
3350 if (info->h && info->h->root.root.type == bfd_link_hash_undefweak)
3351 {
3352 insn |= 31 << 16;
3353 bfd_put_32 (info->abfd, (bfd_vma) insn,
3354 info->contents + urel->r_offset);
252b5132 3355
a7519a3c
RH
3356 info->changed_contents = TRUE;
3357 break;
3358 }
252b5132 3359
a7519a3c
RH
3360 /* If not zero, place to jump without needing pv. */
3361 optdest = elf64_alpha_relax_opt_call (info, symval);
3362 org = (info->sec->output_section->vma
3363 + info->sec->output_offset
3364 + urel->r_offset + 4);
3365 odisp = (optdest ? optdest : symval) - org;
252b5132 3366
a7519a3c
RH
3367 if (odisp >= -0x400000 && odisp < 0x400000)
3368 {
3369 Elf_Internal_Rela *xrel;
252b5132 3370
a7519a3c
RH
3371 /* Preserve branch prediction call stack when possible. */
3372 if ((insn & INSN_JSR_MASK) == INSN_JSR)
3373 insn = (OP_BSR << 26) | (insn & 0x03e00000);
3374 else
3375 insn = (OP_BR << 26) | (insn & 0x03e00000);
252b5132 3376
a7519a3c
RH
3377 urel->r_info = ELF64_R_INFO (ELF64_R_SYM (irel->r_info),
3378 R_ALPHA_BRADDR);
3379 urel->r_addend = irel->r_addend;
252b5132 3380
a7519a3c
RH
3381 if (optdest)
3382 urel->r_addend += optdest - symval;
3383 else
3384 all_optimized = FALSE;
252b5132 3385
a7519a3c
RH
3386 bfd_put_32 (info->abfd, (bfd_vma) insn,
3387 info->contents + urel->r_offset);
252b5132 3388
a7519a3c
RH
3389 /* Kill any HINT reloc that might exist for this insn. */
3390 xrel = (elf64_alpha_find_reloc_at_ofs
3391 (info->relocs, info->relend, urel->r_offset,
3392 R_ALPHA_HINT));
3393 if (xrel)
3394 xrel->r_info = ELF64_R_INFO (0, R_ALPHA_NONE);
252b5132 3395
a7519a3c
RH
3396 info->changed_contents = TRUE;
3397 info->changed_relocs = TRUE;
3398 }
3399 else
3400 all_optimized = FALSE;
252b5132 3401
a7519a3c
RH
3402 /* Even if the target is not in range for a direct branch,
3403 if we share a GP, we can eliminate the gp reload. */
3404 if (optdest)
3405 {
3406 Elf_Internal_Rela *gpdisp
3407 = (elf64_alpha_find_reloc_at_ofs
3408 (info->relocs, irelend, urel->r_offset + 4,
3409 R_ALPHA_GPDISP));
3410 if (gpdisp)
3411 {
3412 bfd_byte *p_ldah = info->contents + gpdisp->r_offset;
3413 bfd_byte *p_lda = p_ldah + gpdisp->r_addend;
3414 unsigned int ldah = bfd_get_32 (info->abfd, p_ldah);
3415 unsigned int lda = bfd_get_32 (info->abfd, p_lda);
252b5132 3416
a7519a3c
RH
3417 /* Verify that the instruction is "ldah $29,0($26)".
3418 Consider a function that ends in a noreturn call,
3419 and that the next function begins with an ldgp,
3420 and that by accident there is no padding between.
3421 In that case the insn would use $27 as the base. */
3422 if (ldah == 0x27ba0000 && lda == 0x23bd0000)
3423 {
3424 bfd_put_32 (info->abfd, (bfd_vma) INSN_UNOP, p_ldah);
3425 bfd_put_32 (info->abfd, (bfd_vma) INSN_UNOP, p_lda);
252b5132 3426
a7519a3c
RH
3427 gpdisp->r_info = ELF64_R_INFO (0, R_ALPHA_NONE);
3428 info->changed_contents = TRUE;
3429 info->changed_relocs = TRUE;
3430 }
3431 }
3432 }
3433 }
3434 break;
252b5132 3435 }
252b5132
RH
3436 }
3437
a7519a3c
RH
3438 /* If all cases were optimized, we can reduce the use count on this
3439 got entry by one, possibly eliminating it. */
3440 if (all_optimized)
252b5132 3441 {
a7519a3c 3442 if (--info->gotent->use_count == 0)
252b5132 3443 {
a7519a3c
RH
3444 int sz = alpha_got_entry_size (R_ALPHA_LITERAL);
3445 alpha_elf_tdata (info->gotobj)->total_got_size -= sz;
3446 if (!info->h)
3447 alpha_elf_tdata (info->gotobj)->local_got_size -= sz;
252b5132 3448 }
a7519a3c
RH
3449
3450 /* If the literal instruction is no longer needed (it may have been
3451 reused. We can eliminate it. */
3452 /* ??? For now, I don't want to deal with compacting the section,
3453 so just nop it out. */
3454 if (!lit_reused)
252b5132 3455 {
a7519a3c
RH
3456 irel->r_info = ELF64_R_INFO (0, R_ALPHA_NONE);
3457 info->changed_relocs = TRUE;
252b5132 3458
a7519a3c
RH
3459 bfd_put_32 (info->abfd, (bfd_vma) INSN_UNOP,
3460 info->contents + irel->r_offset);
3461 info->changed_contents = TRUE;
3462 }
252b5132 3463
a7519a3c
RH
3464 return TRUE;
3465 }
3466 else
3467 return elf64_alpha_relax_got_load (info, symval, irel, R_ALPHA_LITERAL);
252b5132
RH
3468}
3469
b34976b6 3470static bfd_boolean
a7519a3c
RH
3471elf64_alpha_relax_tls_get_addr (struct alpha_relax_info *info, bfd_vma symval,
3472 Elf_Internal_Rela *irel, bfd_boolean is_gd)
f44f99a5 3473{
a7519a3c 3474 bfd_byte *pos[5];
891caa9b 3475 unsigned int insn, tlsgd_reg;
a7519a3c 3476 Elf_Internal_Rela *gpdisp, *hint;
891caa9b 3477 bfd_boolean dynamic, use_gottprel;
a7519a3c 3478 unsigned long new_symndx;
f44f99a5 3479
a7519a3c 3480 dynamic = alpha_elf_dynamic_symbol_p (&info->h->root, info->link_info);
f44f99a5 3481
a7519a3c
RH
3482 /* If a TLS symbol is accessed using IE at least once, there is no point
3483 to use dynamic model for it. */
3484 if (is_gd && info->h && (info->h->flags & ALPHA_ELF_LINK_HASH_TLS_IE))
3485 ;
f44f99a5 3486
a7519a3c
RH
3487 /* If the symbol is local, and we've already committed to DF_STATIC_TLS,
3488 then we might as well relax to IE. */
3489 else if (info->link_info->shared && !dynamic
3490 && (info->link_info->flags & DF_STATIC_TLS))
3491 ;
f44f99a5 3492
a7519a3c
RH
3493 /* Otherwise we must be building an executable to do anything. */
3494 else if (info->link_info->shared)
3495 return TRUE;
f44f99a5 3496
a7519a3c
RH
3497 /* The TLSGD/TLSLDM relocation must be followed by a LITERAL and
3498 the matching LITUSE_TLS relocations. */
3499 if (irel + 2 >= info->relend)
3500 return TRUE;
3501 if (ELF64_R_TYPE (irel[1].r_info) != R_ALPHA_LITERAL
3502 || ELF64_R_TYPE (irel[2].r_info) != R_ALPHA_LITUSE
3503 || irel[2].r_addend != (is_gd ? LITUSE_ALPHA_TLSGD : LITUSE_ALPHA_TLSLDM))
3504 return TRUE;
f44f99a5 3505
a7519a3c
RH
3506 /* There must be a GPDISP relocation positioned immediately after the
3507 LITUSE relocation. */
3508 gpdisp = elf64_alpha_find_reloc_at_ofs (info->relocs, info->relend,
3509 irel[2].r_offset + 4, R_ALPHA_GPDISP);
3510 if (!gpdisp)
b34976b6 3511 return TRUE;
f44f99a5 3512
a7519a3c
RH
3513 pos[0] = info->contents + irel[0].r_offset;
3514 pos[1] = info->contents + irel[1].r_offset;
3515 pos[2] = info->contents + irel[2].r_offset;
3516 pos[3] = info->contents + gpdisp->r_offset;
3517 pos[4] = pos[3] + gpdisp->r_addend;
f44f99a5 3518
7dbf3b76
RH
3519 /* Beware of the compiler hoisting part of the sequence out a loop
3520 and adjusting the destination register for the TLSGD insn. If this
3521 happens, there will be a move into $16 before the JSR insn, so only
3522 transformations of the first insn pair should use this register. */
3523 tlsgd_reg = bfd_get_32 (info->abfd, pos[0]);
3524 tlsgd_reg = (tlsgd_reg >> 21) & 31;
3525
a7519a3c
RH
3526 /* Generally, the positions are not allowed to be out of order, lest the
3527 modified insn sequence have different register lifetimes. We can make
3528 an exception when pos 1 is adjacent to pos 0. */
3529 if (pos[1] + 4 == pos[0])
f44f99a5 3530 {
a7519a3c
RH
3531 bfd_byte *tmp = pos[0];
3532 pos[0] = pos[1];
3533 pos[1] = tmp;
f44f99a5 3534 }
a7519a3c
RH
3535 if (pos[1] >= pos[2] || pos[2] >= pos[3])
3536 return TRUE;
cc03ec80 3537
a7519a3c
RH
3538 /* Reduce the use count on the LITERAL relocation. Do this before we
3539 smash the symndx when we adjust the relocations below. */
3540 {
3541 struct alpha_elf_got_entry *lit_gotent;
3542 struct alpha_elf_link_hash_entry *lit_h;
3543 unsigned long indx;
f44f99a5 3544
a7519a3c
RH
3545 BFD_ASSERT (ELF64_R_SYM (irel[1].r_info) >= info->symtab_hdr->sh_info);
3546 indx = ELF64_R_SYM (irel[1].r_info) - info->symtab_hdr->sh_info;
3547 lit_h = alpha_elf_sym_hashes (info->abfd)[indx];
f44f99a5 3548
a7519a3c
RH
3549 while (lit_h->root.root.type == bfd_link_hash_indirect
3550 || lit_h->root.root.type == bfd_link_hash_warning)
3551 lit_h = (struct alpha_elf_link_hash_entry *) lit_h->root.root.u.i.link;
252b5132 3552
a7519a3c
RH
3553 for (lit_gotent = lit_h->got_entries; lit_gotent ;
3554 lit_gotent = lit_gotent->next)
3555 if (lit_gotent->gotobj == info->gotobj
3556 && lit_gotent->reloc_type == R_ALPHA_LITERAL
3557 && lit_gotent->addend == irel[1].r_addend)
3558 break;
3559 BFD_ASSERT (lit_gotent);
252b5132 3560
a7519a3c
RH
3561 if (--lit_gotent->use_count == 0)
3562 {
3563 int sz = alpha_got_entry_size (R_ALPHA_LITERAL);
3564 alpha_elf_tdata (info->gotobj)->total_got_size -= sz;
3565 }
3566 }
252b5132 3567
a7519a3c 3568 /* Change
252b5132 3569
a7519a3c
RH
3570 lda $16,x($gp) !tlsgd!1
3571 ldq $27,__tls_get_addr($gp) !literal!1
3572 jsr $26,($27),__tls_get_addr !lituse_tlsgd!1
3573 ldah $29,0($26) !gpdisp!2
3574 lda $29,0($29) !gpdisp!2
3575 to
3576 ldq $16,x($gp) !gottprel
3577 unop
3578 call_pal rduniq
3579 addq $16,$0,$0
3580 unop
3581 or the first pair to
3582 lda $16,x($gp) !tprel
3583 unop
3584 or
3585 ldah $16,x($gp) !tprelhi
3586 lda $16,x($16) !tprello
3587
3588 as appropriate. */
3589
3590 use_gottprel = FALSE;
cf35638d 3591 new_symndx = is_gd ? ELF64_R_SYM (irel->r_info) : STN_UNDEF;
891caa9b 3592
a7519a3c 3593 switch (!dynamic && !info->link_info->shared)
252b5132 3594 {
a7519a3c
RH
3595 case 1:
3596 {
3597 bfd_vma tp_base;
3598 bfd_signed_vma disp;
252b5132 3599
a7519a3c
RH
3600 BFD_ASSERT (elf_hash_table (info->link_info)->tls_sec != NULL);
3601 tp_base = alpha_get_tprel_base (info->link_info);
3602 disp = symval - tp_base;
252b5132 3603
a7519a3c
RH
3604 if (disp >= -0x8000 && disp < 0x8000)
3605 {
891caa9b 3606 insn = (OP_LDA << 26) | (tlsgd_reg << 21) | (31 << 16);
a7519a3c
RH
3607 bfd_put_32 (info->abfd, (bfd_vma) insn, pos[0]);
3608 bfd_put_32 (info->abfd, (bfd_vma) INSN_UNOP, pos[1]);
3765b1be 3609
a7519a3c
RH
3610 irel[0].r_offset = pos[0] - info->contents;
3611 irel[0].r_info = ELF64_R_INFO (new_symndx, R_ALPHA_TPREL16);
3612 irel[1].r_info = ELF64_R_INFO (0, R_ALPHA_NONE);
3613 break;
3614 }
3615 else if (disp >= -(bfd_signed_vma) 0x80000000
3616 && disp < (bfd_signed_vma) 0x7fff8000
891caa9b 3617 && pos[0] + 4 == pos[1])
a7519a3c 3618 {
891caa9b 3619 insn = (OP_LDAH << 26) | (tlsgd_reg << 21) | (31 << 16);
a7519a3c 3620 bfd_put_32 (info->abfd, (bfd_vma) insn, pos[0]);
891caa9b 3621 insn = (OP_LDA << 26) | (tlsgd_reg << 21) | (tlsgd_reg << 16);
a7519a3c 3622 bfd_put_32 (info->abfd, (bfd_vma) insn, pos[1]);
3765b1be 3623
a7519a3c
RH
3624 irel[0].r_offset = pos[0] - info->contents;
3625 irel[0].r_info = ELF64_R_INFO (new_symndx, R_ALPHA_TPRELHI);
3626 irel[1].r_offset = pos[1] - info->contents;
3627 irel[1].r_info = ELF64_R_INFO (new_symndx, R_ALPHA_TPRELLO);
3628 break;
3629 }
3630 }
3631 /* FALLTHRU */
3765b1be 3632
3765b1be 3633 default:
a7519a3c
RH
3634 use_gottprel = TRUE;
3635
891caa9b 3636 insn = (OP_LDQ << 26) | (tlsgd_reg << 21) | (29 << 16);
a7519a3c
RH
3637 bfd_put_32 (info->abfd, (bfd_vma) insn, pos[0]);
3638 bfd_put_32 (info->abfd, (bfd_vma) INSN_UNOP, pos[1]);
3639
3640 irel[0].r_offset = pos[0] - info->contents;
3641 irel[0].r_info = ELF64_R_INFO (new_symndx, R_ALPHA_GOTTPREL);
3642 irel[1].r_info = ELF64_R_INFO (0, R_ALPHA_NONE);
3643 break;
3765b1be 3644 }
3765b1be 3645
a7519a3c 3646 bfd_put_32 (info->abfd, (bfd_vma) INSN_RDUNIQ, pos[2]);
252b5132 3647
a7519a3c
RH
3648 insn = INSN_ADDQ | (16 << 21) | (0 << 16) | (0 << 0);
3649 bfd_put_32 (info->abfd, (bfd_vma) insn, pos[3]);
3765b1be 3650
a7519a3c 3651 bfd_put_32 (info->abfd, (bfd_vma) INSN_UNOP, pos[4]);
e92d460e 3652
a7519a3c
RH
3653 irel[2].r_info = ELF64_R_INFO (0, R_ALPHA_NONE);
3654 gpdisp->r_info = ELF64_R_INFO (0, R_ALPHA_NONE);
252b5132 3655
a7519a3c
RH
3656 hint = elf64_alpha_find_reloc_at_ofs (info->relocs, info->relend,
3657 irel[2].r_offset, R_ALPHA_HINT);
3658 if (hint)
3659 hint->r_info = ELF64_R_INFO (0, R_ALPHA_NONE);
252b5132 3660
a7519a3c
RH
3661 info->changed_contents = TRUE;
3662 info->changed_relocs = TRUE;
d6ad34f6 3663
a7519a3c
RH
3664 /* Reduce the use count on the TLSGD/TLSLDM relocation. */
3665 if (--info->gotent->use_count == 0)
3765b1be 3666 {
a7519a3c
RH
3667 int sz = alpha_got_entry_size (info->gotent->reloc_type);
3668 alpha_elf_tdata (info->gotobj)->total_got_size -= sz;
3669 if (!info->h)
3670 alpha_elf_tdata (info->gotobj)->local_got_size -= sz;
3765b1be 3671 }
252b5132 3672
a7519a3c
RH
3673 /* If we've switched to a GOTTPREL relocation, increment the reference
3674 count on that got entry. */
3675 if (use_gottprel)
f44f99a5 3676 {
a7519a3c 3677 struct alpha_elf_got_entry *tprel_gotent;
f44f99a5 3678
a7519a3c
RH
3679 for (tprel_gotent = *info->first_gotent; tprel_gotent ;
3680 tprel_gotent = tprel_gotent->next)
3681 if (tprel_gotent->gotobj == info->gotobj
3682 && tprel_gotent->reloc_type == R_ALPHA_GOTTPREL
3683 && tprel_gotent->addend == irel->r_addend)
3684 break;
3685 if (tprel_gotent)
3686 tprel_gotent->use_count++;
3687 else
f44f99a5 3688 {
a7519a3c
RH
3689 if (info->gotent->use_count == 0)
3690 tprel_gotent = info->gotent;
3691 else
3692 {
3693 tprel_gotent = (struct alpha_elf_got_entry *)
3694 bfd_alloc (info->abfd, sizeof (struct alpha_elf_got_entry));
3695 if (!tprel_gotent)
3696 return FALSE;
f44f99a5 3697
a7519a3c
RH
3698 tprel_gotent->next = *info->first_gotent;
3699 *info->first_gotent = tprel_gotent;
f44f99a5 3700
a7519a3c
RH
3701 tprel_gotent->gotobj = info->gotobj;
3702 tprel_gotent->addend = irel->r_addend;
3703 tprel_gotent->got_offset = -1;
3704 tprel_gotent->reloc_done = 0;
3705 tprel_gotent->reloc_xlated = 0;
3706 }
f44f99a5 3707
a7519a3c
RH
3708 tprel_gotent->use_count = 1;
3709 tprel_gotent->reloc_type = R_ALPHA_GOTTPREL;
3710 }
f44f99a5 3711 }
f44f99a5 3712
b34976b6 3713 return TRUE;
f44f99a5
RH
3714}
3715
b34976b6 3716static bfd_boolean
a7519a3c
RH
3717elf64_alpha_relax_section (bfd *abfd, asection *sec,
3718 struct bfd_link_info *link_info, bfd_boolean *again)
f44f99a5 3719{
a7519a3c
RH
3720 Elf_Internal_Shdr *symtab_hdr;
3721 Elf_Internal_Rela *internal_relocs;
3722 Elf_Internal_Rela *irel, *irelend;
3723 Elf_Internal_Sym *isymbuf = NULL;
3724 struct alpha_elf_got_entry **local_got_entries;
3725 struct alpha_relax_info info;
4dfe6ac6
NC
3726 struct alpha_elf_link_hash_table * htab;
3727
3728 htab = alpha_elf_hash_table (link_info);
3729 if (htab == NULL)
3730 return FALSE;
f44f99a5 3731
4a828aab 3732 /* There's nothing to change, yet. */
a7519a3c 3733 *again = FALSE;
f44f99a5 3734
a7519a3c
RH
3735 if (link_info->relocatable
3736 || ((sec->flags & (SEC_CODE | SEC_RELOC | SEC_ALLOC))
3737 != (SEC_CODE | SEC_RELOC | SEC_ALLOC))
3738 || sec->reloc_count == 0)
d6ad34f6
RH
3739 return TRUE;
3740
0ffa91dd
NC
3741 BFD_ASSERT (is_alpha_elf (abfd));
3742
4a828aab 3743 /* Make sure our GOT and PLT tables are up-to-date. */
4dfe6ac6 3744 if (htab->relax_trip != link_info->relax_trip)
4a828aab 3745 {
4dfe6ac6 3746 htab->relax_trip = link_info->relax_trip;
4a828aab
RH
3747
3748 /* This should never fail after the initial round, since the only
3749 error is GOT overflow, and relaxation only shrinks the table. */
3750 if (!elf64_alpha_size_got_sections (link_info))
3751 abort ();
3752 if (elf_hash_table (link_info)->dynamic_sections_created)
3753 {
3754 elf64_alpha_size_plt_section (link_info);
3755 elf64_alpha_size_rela_got_section (link_info);
3756 }
3757 }
3758
0ffa91dd 3759 symtab_hdr = &elf_symtab_hdr (abfd);
a7519a3c 3760 local_got_entries = alpha_elf_tdata(abfd)->local_got_entries;
252b5132 3761
a7519a3c
RH
3762 /* Load the relocations for this section. */
3763 internal_relocs = (_bfd_elf_link_read_relocs
2c3fc389 3764 (abfd, sec, NULL, (Elf_Internal_Rela *) NULL,
a7519a3c
RH
3765 link_info->keep_memory));
3766 if (internal_relocs == NULL)
3767 return FALSE;
252b5132 3768
a7519a3c
RH
3769 memset(&info, 0, sizeof (info));
3770 info.abfd = abfd;
3771 info.sec = sec;
3772 info.link_info = link_info;
3773 info.symtab_hdr = symtab_hdr;
3774 info.relocs = internal_relocs;
3775 info.relend = irelend = internal_relocs + sec->reloc_count;
3776
3777 /* Find the GP for this object. Do not store the result back via
3778 _bfd_set_gp_value, since this could change again before final. */
3779 info.gotobj = alpha_elf_tdata (abfd)->gotobj;
3780 if (info.gotobj)
3765b1be 3781 {
a7519a3c
RH
3782 asection *sgot = alpha_elf_tdata (info.gotobj)->got;
3783 info.gp = (sgot->output_section->vma
3784 + sgot->output_offset
3785 + 0x8000);
252b5132
RH
3786 }
3787
a7519a3c
RH
3788 /* Get the section contents. */
3789 if (elf_section_data (sec)->this_hdr.contents != NULL)
3790 info.contents = elf_section_data (sec)->this_hdr.contents;
3791 else
3792 {
3793 if (!bfd_malloc_and_get_section (abfd, sec, &info.contents))
3794 goto error_return;
3795 }
252b5132 3796
a7519a3c
RH
3797 for (irel = internal_relocs; irel < irelend; irel++)
3798 {
3799 bfd_vma symval;
3800 struct alpha_elf_got_entry *gotent;
3801 unsigned long r_type = ELF64_R_TYPE (irel->r_info);
3802 unsigned long r_symndx = ELF64_R_SYM (irel->r_info);
3803
3804 /* Early exit for unhandled or unrelaxable relocations. */
3805 switch (r_type)
3806 {
3807 case R_ALPHA_LITERAL:
3808 case R_ALPHA_GPRELHIGH:
3809 case R_ALPHA_GPRELLOW:
3810 case R_ALPHA_GOTDTPREL:
3811 case R_ALPHA_GOTTPREL:
3812 case R_ALPHA_TLSGD:
3813 break;
3814
3815 case R_ALPHA_TLSLDM:
3816 /* The symbol for a TLSLDM reloc is ignored. Collapse the
cf35638d
TS
3817 reloc to the STN_UNDEF (0) symbol so that they all match. */
3818 r_symndx = STN_UNDEF;
a7519a3c
RH
3819 break;
3820
3821 default:
3822 continue;
3823 }
3824
3825 /* Get the value of the symbol referred to by the reloc. */
3826 if (r_symndx < symtab_hdr->sh_info)
3827 {
3828 /* A local symbol. */
3829 Elf_Internal_Sym *isym;
3830
3831 /* Read this BFD's local symbols. */
3832 if (isymbuf == NULL)
3833 {
3834 isymbuf = (Elf_Internal_Sym *) symtab_hdr->contents;
3835 if (isymbuf == NULL)
3836 isymbuf = bfd_elf_get_elf_syms (abfd, symtab_hdr,
3837 symtab_hdr->sh_info, 0,
3838 NULL, NULL, NULL);
3839 if (isymbuf == NULL)
3840 goto error_return;
3841 }
252b5132 3842
a7519a3c 3843 isym = isymbuf + r_symndx;
252b5132 3844
a7519a3c
RH
3845 /* Given the symbol for a TLSLDM reloc is ignored, this also
3846 means forcing the symbol value to the tp base. */
3847 if (r_type == R_ALPHA_TLSLDM)
3848 {
3849 info.tsec = bfd_abs_section_ptr;
3850 symval = alpha_get_tprel_base (info.link_info);
3851 }
3852 else
3853 {
3854 symval = isym->st_value;
3855 if (isym->st_shndx == SHN_UNDEF)
3856 continue;
3857 else if (isym->st_shndx == SHN_ABS)
3858 info.tsec = bfd_abs_section_ptr;
3859 else if (isym->st_shndx == SHN_COMMON)
3860 info.tsec = bfd_com_section_ptr;
3861 else
3862 info.tsec = bfd_section_from_elf_index (abfd, isym->st_shndx);
3863 }
252b5132 3864
a7519a3c
RH
3865 info.h = NULL;
3866 info.other = isym->st_other;
3867 if (local_got_entries)
3868 info.first_gotent = &local_got_entries[r_symndx];
3869 else
3870 {
3871 info.first_gotent = &info.gotent;
3872 info.gotent = NULL;
3873 }
252b5132 3874 }
a7519a3c
RH
3875 else
3876 {
3877 unsigned long indx;
3878 struct alpha_elf_link_hash_entry *h;
252b5132 3879
a7519a3c
RH
3880 indx = r_symndx - symtab_hdr->sh_info;
3881 h = alpha_elf_sym_hashes (abfd)[indx];
3882 BFD_ASSERT (h != NULL);
252b5132 3883
a7519a3c
RH
3884 while (h->root.root.type == bfd_link_hash_indirect
3885 || h->root.root.type == bfd_link_hash_warning)
3886 h = (struct alpha_elf_link_hash_entry *)h->root.root.u.i.link;
252b5132 3887
a7519a3c
RH
3888 /* If the symbol is undefined, we can't do anything with it. */
3889 if (h->root.root.type == bfd_link_hash_undefined)
3890 continue;
252b5132 3891
a7519a3c
RH
3892 /* If the symbol isn't defined in the current module,
3893 again we can't do anything. */
3894 if (h->root.root.type == bfd_link_hash_undefweak)
3895 {
3896 info.tsec = bfd_abs_section_ptr;
3897 symval = 0;
3898 }
3899 else if (!h->root.def_regular)
3900 {
3901 /* Except for TLSGD relocs, which can sometimes be
3902 relaxed to GOTTPREL relocs. */
3903 if (r_type != R_ALPHA_TLSGD)
3904 continue;
3905 info.tsec = bfd_abs_section_ptr;
3906 symval = 0;
3907 }
3908 else
3909 {
3910 info.tsec = h->root.root.u.def.section;
3911 symval = h->root.root.u.def.value;
3912 }
252b5132 3913
a7519a3c
RH
3914 info.h = h;
3915 info.other = h->root.other;
3916 info.first_gotent = &h->got_entries;
3917 }
252b5132 3918
a7519a3c
RH
3919 /* Search for the got entry to be used by this relocation. */
3920 for (gotent = *info.first_gotent; gotent ; gotent = gotent->next)
3921 if (gotent->gotobj == info.gotobj
3922 && gotent->reloc_type == r_type
3923 && gotent->addend == irel->r_addend)
3924 break;
3925 info.gotent = gotent;
252b5132 3926
a7519a3c
RH
3927 symval += info.tsec->output_section->vma + info.tsec->output_offset;
3928 symval += irel->r_addend;
252b5132 3929
a7519a3c 3930 switch (r_type)
252b5132 3931 {
a7519a3c
RH
3932 case R_ALPHA_LITERAL:
3933 BFD_ASSERT(info.gotent != NULL);
252b5132 3934
a7519a3c
RH
3935 /* If there exist LITUSE relocations immediately following, this
3936 opens up all sorts of interesting optimizations, because we
3937 now know every location that this address load is used. */
3938 if (irel+1 < irelend
3939 && ELF64_R_TYPE (irel[1].r_info) == R_ALPHA_LITUSE)
252b5132 3940 {
a7519a3c
RH
3941 if (!elf64_alpha_relax_with_lituse (&info, symval, irel))
3942 goto error_return;
252b5132 3943 }
a7519a3c
RH
3944 else
3945 {
3946 if (!elf64_alpha_relax_got_load (&info, symval, irel, r_type))
3947 goto error_return;
3948 }
3949 break;
252b5132 3950
a7519a3c
RH
3951 case R_ALPHA_GOTDTPREL:
3952 case R_ALPHA_GOTTPREL:
3953 BFD_ASSERT(info.gotent != NULL);
3954 if (!elf64_alpha_relax_got_load (&info, symval, irel, r_type))
3955 goto error_return;
3956 break;
3957
3958 case R_ALPHA_TLSGD:
3959 case R_ALPHA_TLSLDM:
3960 BFD_ASSERT(info.gotent != NULL);
3961 if (!elf64_alpha_relax_tls_get_addr (&info, symval, irel,
3962 r_type == R_ALPHA_TLSGD))
3963 goto error_return;
3964 break;
252b5132
RH
3965 }
3966 }
3967
a7519a3c
RH
3968 if (isymbuf != NULL
3969 && symtab_hdr->contents != (unsigned char *) isymbuf)
3970 {
3971 if (!link_info->keep_memory)
3972 free (isymbuf);
3973 else
252b5132 3974 {
a7519a3c
RH
3975 /* Cache the symbols for elf_link_input_bfd. */
3976 symtab_hdr->contents = (unsigned char *) isymbuf;
252b5132 3977 }
a7519a3c 3978 }
252b5132 3979
a7519a3c
RH
3980 if (info.contents != NULL
3981 && elf_section_data (sec)->this_hdr.contents != info.contents)
3982 {
3983 if (!info.changed_contents && !link_info->keep_memory)
3984 free (info.contents);
3985 else
252b5132 3986 {
a7519a3c
RH
3987 /* Cache the section contents for elf_link_input_bfd. */
3988 elf_section_data (sec)->this_hdr.contents = info.contents;
252b5132 3989 }
a7519a3c 3990 }
252b5132 3991
a7519a3c
RH
3992 if (elf_section_data (sec)->relocs != internal_relocs)
3993 {
3994 if (!info.changed_relocs)
3995 free (internal_relocs);
3996 else
3997 elf_section_data (sec)->relocs = internal_relocs;
252b5132 3998 }
a7519a3c
RH
3999
4000 *again = info.changed_contents || info.changed_relocs;
252b5132 4001
b34976b6 4002 return TRUE;
252b5132 4003
a7519a3c
RH
4004 error_return:
4005 if (isymbuf != NULL
4006 && symtab_hdr->contents != (unsigned char *) isymbuf)
4007 free (isymbuf);
4008 if (info.contents != NULL
4009 && elf_section_data (sec)->this_hdr.contents != info.contents)
4010 free (info.contents);
4011 if (internal_relocs != NULL
4012 && elf_section_data (sec)->relocs != internal_relocs)
4013 free (internal_relocs);
4014 return FALSE;
4015}
4016\f
1bbc9cec
RH
4017/* Emit a dynamic relocation for (DYNINDX, RTYPE, ADDEND) at (SEC, OFFSET)
4018 into the next available slot in SREL. */
4019
4020static void
a7519a3c
RH
4021elf64_alpha_emit_dynrel (bfd *abfd, struct bfd_link_info *info,
4022 asection *sec, asection *srel, bfd_vma offset,
4023 long dynindx, long rtype, bfd_vma addend)
1bbc9cec
RH
4024{
4025 Elf_Internal_Rela outrel;
4026 bfd_byte *loc;
4027
4028 BFD_ASSERT (srel != NULL);
4029
4030 outrel.r_info = ELF64_R_INFO (dynindx, rtype);
4031 outrel.r_addend = addend;
4032
4033 offset = _bfd_elf_section_offset (abfd, info, sec, offset);
4034 if ((offset | 1) != (bfd_vma) -1)
4035 outrel.r_offset = sec->output_section->vma + sec->output_offset + offset;
4036 else
4037 memset (&outrel, 0, sizeof (outrel));
4038
4039 loc = srel->contents;
4040 loc += srel->reloc_count++ * sizeof (Elf64_External_Rela);
4041 bfd_elf64_swap_reloca_out (abfd, &outrel, loc);
eea6121a 4042 BFD_ASSERT (sizeof (Elf64_External_Rela) * srel->reloc_count <= srel->size);
1bbc9cec
RH
4043}
4044
4a67a098
RH
4045/* Relocate an Alpha ELF section for a relocatable link.
4046
4047 We don't have to change anything unless the reloc is against a section
4048 symbol, in which case we have to adjust according to where the section
4049 symbol winds up in the output section. */
4050
b34976b6 4051static bfd_boolean
a7519a3c
RH
4052elf64_alpha_relocate_section_r (bfd *output_bfd ATTRIBUTE_UNUSED,
4053 struct bfd_link_info *info ATTRIBUTE_UNUSED,
4054 bfd *input_bfd, asection *input_section,
4055 bfd_byte *contents ATTRIBUTE_UNUSED,
4056 Elf_Internal_Rela *relocs,
4057 Elf_Internal_Sym *local_syms,
4058 asection **local_sections)
4a67a098
RH
4059{
4060 unsigned long symtab_hdr_sh_info;
4061 Elf_Internal_Rela *rel;
4062 Elf_Internal_Rela *relend;
ab96bf03 4063 struct elf_link_hash_entry **sym_hashes;
b34976b6 4064 bfd_boolean ret_val = TRUE;
4a67a098 4065
0ffa91dd 4066 symtab_hdr_sh_info = elf_symtab_hdr (input_bfd).sh_info;
ab96bf03 4067 sym_hashes = elf_sym_hashes (input_bfd);
4a67a098
RH
4068
4069 relend = relocs + input_section->reloc_count;
4070 for (rel = relocs; rel < relend; rel++)
4071 {
4072 unsigned long r_symndx;
4073 Elf_Internal_Sym *sym;
4074 asection *sec;
4075 unsigned long r_type;
4076
ab96bf03 4077 r_type = ELF64_R_TYPE (rel->r_info);
4a67a098
RH
4078 if (r_type >= R_ALPHA_max)
4079 {
4080 (*_bfd_error_handler)
d003868e
AM
4081 (_("%B: unknown relocation type %d"),
4082 input_bfd, (int) r_type);
4a67a098 4083 bfd_set_error (bfd_error_bad_value);
b34976b6 4084 ret_val = FALSE;
4a67a098
RH
4085 continue;
4086 }
4087
4a67a098
RH
4088 /* The symbol associated with GPDISP and LITUSE is
4089 immaterial. Only the addend is significant. */
4090 if (r_type == R_ALPHA_GPDISP || r_type == R_ALPHA_LITUSE)
4091 continue;
4092
ab96bf03 4093 r_symndx = ELF64_R_SYM (rel->r_info);
4a67a098
RH
4094 if (r_symndx < symtab_hdr_sh_info)
4095 {
4096 sym = local_syms + r_symndx;
ab96bf03 4097 sec = local_sections[r_symndx];
4a67a098 4098 }
ab96bf03
AM
4099 else
4100 {
4101 struct elf_link_hash_entry *h;
4102
4103 h = sym_hashes[r_symndx - symtab_hdr_sh_info];
4104
4105 while (h->root.type == bfd_link_hash_indirect
4106 || h->root.type == bfd_link_hash_warning)
4107 h = (struct elf_link_hash_entry *) h->root.u.i.link;
4108
4109 if (h->root.type != bfd_link_hash_defined
4110 && h->root.type != bfd_link_hash_defweak)
4111 continue;
4112
4113 sym = NULL;
4114 sec = h->root.u.def.section;
4115 }
4116
dbaa2011 4117 if (sec != NULL && discarded_section (sec))
e4067dbb 4118 RELOC_AGAINST_DISCARDED_SECTION (info, input_bfd, input_section,
545fd46b
MR
4119 rel, 1, relend,
4120 elf64_alpha_howto_table + r_type, 0,
e4067dbb 4121 contents);
ab96bf03
AM
4122
4123 if (sym != NULL && ELF_ST_TYPE (sym->st_info) == STT_SECTION)
4124 rel->r_addend += sec->output_offset;
4a67a098
RH
4125 }
4126
4127 return ret_val;
4128}
4129
252b5132
RH
4130/* Relocate an Alpha ELF section. */
4131
b34976b6 4132static bfd_boolean
a7519a3c
RH
4133elf64_alpha_relocate_section (bfd *output_bfd, struct bfd_link_info *info,
4134 bfd *input_bfd, asection *input_section,
4135 bfd_byte *contents, Elf_Internal_Rela *relocs,
4136 Elf_Internal_Sym *local_syms,
4137 asection **local_sections)
252b5132 4138{
4a67a098 4139 Elf_Internal_Shdr *symtab_hdr;
252b5132
RH
4140 Elf_Internal_Rela *rel;
4141 Elf_Internal_Rela *relend;
4a67a098
RH
4142 asection *sgot, *srel, *srelgot;
4143 bfd *dynobj, *gotobj;
4144 bfd_vma gp, tp_base, dtp_base;
4145 struct alpha_elf_got_entry **local_got_entries;
b34976b6 4146 bfd_boolean ret_val;
252b5132 4147
0ffa91dd 4148 BFD_ASSERT (is_alpha_elf (input_bfd));
68ffbac6 4149
4a67a098 4150 /* Handle relocatable links with a smaller loop. */
1049f94e 4151 if (info->relocatable)
4a67a098
RH
4152 return elf64_alpha_relocate_section_r (output_bfd, info, input_bfd,
4153 input_section, contents, relocs,
4154 local_syms, local_sections);
4155
4156 /* This is a final link. */
4157
b34976b6 4158 ret_val = TRUE;
252b5132 4159
0ffa91dd 4160 symtab_hdr = &elf_symtab_hdr (input_bfd);
3765b1be 4161
4a67a098
RH
4162 dynobj = elf_hash_table (info)->dynobj;
4163 if (dynobj)
3d4d4302 4164 srelgot = bfd_get_linker_section (dynobj, ".rela.got");
4a67a098
RH
4165 else
4166 srelgot = NULL;
4167
3241278a
RH
4168 if (input_section->flags & SEC_ALLOC)
4169 {
4170 const char *section_name;
4171 section_name = (bfd_elf_string_from_elf_section
4172 (input_bfd, elf_elfheader(input_bfd)->e_shstrndx,
d4730f92 4173 _bfd_elf_single_rel_hdr (input_section)->sh_name));
3241278a 4174 BFD_ASSERT(section_name != NULL);
3d4d4302 4175 srel = bfd_get_linker_section (dynobj, section_name);
3241278a
RH
4176 }
4177 else
4178 srel = NULL;
3765b1be 4179
4a67a098
RH
4180 /* Find the gp value for this input bfd. */
4181 gotobj = alpha_elf_tdata (input_bfd)->gotobj;
4182 if (gotobj)
4183 {
4184 sgot = alpha_elf_tdata (gotobj)->got;
4185 gp = _bfd_get_gp_value (gotobj);
4186 if (gp == 0)
252b5132 4187 {
4a67a098
RH
4188 gp = (sgot->output_section->vma
4189 + sgot->output_offset
4190 + 0x8000);
4191 _bfd_set_gp_value (gotobj, gp);
4192 }
4193 }
4194 else
4195 {
4196 sgot = NULL;
4197 gp = 0;
4198 }
3765b1be 4199
4a67a098
RH
4200 local_got_entries = alpha_elf_tdata(input_bfd)->local_got_entries;
4201
e1918d23 4202 if (elf_hash_table (info)->tls_sec != NULL)
4a67a098 4203 {
e1918d23
AM
4204 dtp_base = alpha_get_dtprel_base (info);
4205 tp_base = alpha_get_tprel_base (info);
252b5132 4206 }
4a67a098
RH
4207 else
4208 dtp_base = tp_base = 0;
252b5132 4209
252b5132 4210 relend = relocs + input_section->reloc_count;
4a67a098 4211 for (rel = relocs; rel < relend; rel++)
252b5132 4212 {
4a67a098 4213 struct alpha_elf_link_hash_entry *h = NULL;
3765b1be
RH
4214 struct alpha_elf_got_entry *gotent;
4215 bfd_reloc_status_type r;
252b5132
RH
4216 reloc_howto_type *howto;
4217 unsigned long r_symndx;
4a67a098
RH
4218 Elf_Internal_Sym *sym = NULL;
4219 asection *sec = NULL;
3765b1be 4220 bfd_vma value;
dc810e39 4221 bfd_vma addend;
b34976b6 4222 bfd_boolean dynamic_symbol_p;
1d5316ab 4223 bfd_boolean unresolved_reloc = FALSE;
b34976b6 4224 bfd_boolean undef_weak_ref = FALSE;
3765b1be 4225 unsigned long r_type;
252b5132
RH
4226
4227 r_type = ELF64_R_TYPE(rel->r_info);
3765b1be 4228 if (r_type >= R_ALPHA_max)
252b5132 4229 {
3765b1be 4230 (*_bfd_error_handler)
d003868e
AM
4231 (_("%B: unknown relocation type %d"),
4232 input_bfd, (int) r_type);
252b5132 4233 bfd_set_error (bfd_error_bad_value);
b34976b6 4234 ret_val = FALSE;
3765b1be 4235 continue;
252b5132 4236 }
252b5132 4237
3765b1be 4238 howto = elf64_alpha_howto_table + r_type;
252b5132
RH
4239 r_symndx = ELF64_R_SYM(rel->r_info);
4240
cc03ec80 4241 /* The symbol for a TLSLDM reloc is ignored. Collapse the
cf35638d 4242 reloc to the STN_UNDEF (0) symbol so that they all match. */
cc03ec80 4243 if (r_type == R_ALPHA_TLSLDM)
cf35638d 4244 r_symndx = STN_UNDEF;
cc03ec80 4245
252b5132
RH
4246 if (r_symndx < symtab_hdr->sh_info)
4247 {
8517fae7 4248 asection *msec;
252b5132
RH
4249 sym = local_syms + r_symndx;
4250 sec = local_sections[r_symndx];
8517fae7
AM
4251 msec = sec;
4252 value = _bfd_elf_rela_local_sym (output_bfd, sym, &msec, rel);
3765b1be 4253
cf35638d 4254 /* If this is a tp-relative relocation against sym STN_UNDEF (0),
cc03ec80 4255 this is hackery from relax_section. Force the value to
f915360b 4256 be the tls module base. */
cf35638d 4257 if (r_symndx == STN_UNDEF
cc03ec80
RH
4258 && (r_type == R_ALPHA_TLSLDM
4259 || r_type == R_ALPHA_GOTTPREL
4260 || r_type == R_ALPHA_TPREL64
4261 || r_type == R_ALPHA_TPRELHI
4262 || r_type == R_ALPHA_TPRELLO
4263 || r_type == R_ALPHA_TPREL16))
f915360b 4264 value = dtp_base;
cc03ec80 4265
4a67a098
RH
4266 if (local_got_entries)
4267 gotent = local_got_entries[r_symndx];
4268 else
4269 gotent = NULL;
3765b1be
RH
4270
4271 /* Need to adjust local GOT entries' addends for SEC_MERGE
4272 unless it has been done already. */
4273 if ((sec->flags & SEC_MERGE)
048d873d 4274 && ELF_ST_TYPE (sym->st_info) == STT_SECTION
dbaa2011 4275 && sec->sec_info_type == SEC_INFO_TYPE_MERGE
048d873d
RH
4276 && gotent
4277 && !gotent->reloc_xlated)
3765b1be
RH
4278 {
4279 struct alpha_elf_got_entry *ent;
3765b1be
RH
4280
4281 for (ent = gotent; ent; ent = ent->next)
4282 {
4283 ent->reloc_xlated = 1;
4284 if (ent->use_count == 0)
4285 continue;
4286 msec = sec;
4287 ent->addend =
4288 _bfd_merged_section_offset (output_bfd, &msec,
4289 elf_section_data (sec)->
4290 sec_info,
753731ee 4291 sym->st_value + ent->addend);
3765b1be
RH
4292 ent->addend -= sym->st_value;
4293 ent->addend += msec->output_section->vma
4294 + msec->output_offset
4295 - sec->output_section->vma
4296 - sec->output_offset;
4297 }
4298 }
4299
b34976b6 4300 dynamic_symbol_p = FALSE;
252b5132
RH
4301 }
4302 else
4303 {
560e09e9 4304 bfd_boolean warned;
560e09e9 4305 struct elf_link_hash_entry *hh;
b2a8e766
AM
4306 struct elf_link_hash_entry **sym_hashes = elf_sym_hashes (input_bfd);
4307
4308 RELOC_FOR_GLOBAL_SYMBOL (info, input_bfd, input_section, rel,
4309 r_symndx, symtab_hdr, sym_hashes,
4310 hh, sec, value,
4311 unresolved_reloc, warned);
560e09e9
NC
4312
4313 if (warned)
4314 continue;
252b5132 4315
560e09e9
NC
4316 if (value == 0
4317 && ! unresolved_reloc
4318 && hh->root.type == bfd_link_hash_undefweak)
b34976b6 4319 undef_weak_ref = TRUE;
3765b1be 4320
560e09e9 4321 h = (struct alpha_elf_link_hash_entry *) hh;
3765b1be
RH
4322 dynamic_symbol_p = alpha_elf_dynamic_symbol_p (&h->root, info);
4323 gotent = h->got_entries;
252b5132 4324 }
3765b1be 4325
dbaa2011 4326 if (sec != NULL && discarded_section (sec))
e4067dbb 4327 RELOC_AGAINST_DISCARDED_SECTION (info, input_bfd, input_section,
545fd46b 4328 rel, 1, relend, howto, 0, contents);
ab96bf03 4329
252b5132 4330 addend = rel->r_addend;
3765b1be
RH
4331 value += addend;
4332
4333 /* Search for the proper got entry. */
4334 for (; gotent ; gotent = gotent->next)
4335 if (gotent->gotobj == gotobj
4336 && gotent->reloc_type == r_type
4337 && gotent->addend == addend)
4338 break;
252b5132
RH
4339
4340 switch (r_type)
4341 {
4342 case R_ALPHA_GPDISP:
4343 {
4344 bfd_byte *p_ldah, *p_lda;
4345
4346 BFD_ASSERT(gp != 0);
4347
3765b1be
RH
4348 value = (input_section->output_section->vma
4349 + input_section->output_offset
4350 + rel->r_offset);
252b5132 4351
3765b1be 4352 p_ldah = contents + rel->r_offset;
252b5132
RH
4353 p_lda = p_ldah + rel->r_addend;
4354
3765b1be 4355 r = elf64_alpha_do_reloc_gpdisp (input_bfd, gp - value,
252b5132
RH
4356 p_ldah, p_lda);
4357 }
4358 break;
4359
252b5132 4360 case R_ALPHA_LITERAL:
3765b1be
RH
4361 BFD_ASSERT(sgot != NULL);
4362 BFD_ASSERT(gp != 0);
4363 BFD_ASSERT(gotent != NULL);
4364 BFD_ASSERT(gotent->use_count >= 1);
f7460f5f 4365
3765b1be
RH
4366 if (!gotent->reloc_done)
4367 {
4368 gotent->reloc_done = 1;
252b5132 4369
3765b1be
RH
4370 bfd_put_64 (output_bfd, value,
4371 sgot->contents + gotent->got_offset);
252b5132 4372
3765b1be
RH
4373 /* If the symbol has been forced local, output a
4374 RELATIVE reloc, otherwise it will be handled in
4375 finish_dynamic_symbol. */
d6ad34f6 4376 if (info->shared && !dynamic_symbol_p && !undef_weak_ref)
1bbc9cec
RH
4377 elf64_alpha_emit_dynrel (output_bfd, info, sgot, srelgot,
4378 gotent->got_offset, 0,
4379 R_ALPHA_RELATIVE, value);
3765b1be 4380 }
252b5132 4381
3765b1be
RH
4382 value = (sgot->output_section->vma
4383 + sgot->output_offset
4384 + gotent->got_offset);
4385 value -= gp;
252b5132
RH
4386 goto default_reloc;
4387
4388 case R_ALPHA_GPREL32:
ec1659c8 4389 case R_ALPHA_GPREL16:
252b5132 4390 case R_ALPHA_GPRELLOW:
3765b1be 4391 if (dynamic_symbol_p)
f16fbd61
RH
4392 {
4393 (*_bfd_error_handler)
d003868e
AM
4394 (_("%B: gp-relative relocation against dynamic symbol %s"),
4395 input_bfd, h->root.root.root.string);
b34976b6 4396 ret_val = FALSE;
f16fbd61 4397 }
252b5132 4398 BFD_ASSERT(gp != 0);
3765b1be 4399 value -= gp;
252b5132
RH
4400 goto default_reloc;
4401
4402 case R_ALPHA_GPRELHIGH:
3765b1be 4403 if (dynamic_symbol_p)
f16fbd61
RH
4404 {
4405 (*_bfd_error_handler)
d003868e
AM
4406 (_("%B: gp-relative relocation against dynamic symbol %s"),
4407 input_bfd, h->root.root.root.string);
b34976b6 4408 ret_val = FALSE;
f16fbd61 4409 }
252b5132 4410 BFD_ASSERT(gp != 0);
3765b1be
RH
4411 value -= gp;
4412 value = ((bfd_signed_vma) value >> 16) + ((value >> 15) & 1);
252b5132
RH
4413 goto default_reloc;
4414
252b5132 4415 case R_ALPHA_HINT:
f94952df
RH
4416 /* A call to a dynamic symbol is definitely out of range of
4417 the 16-bit displacement. Don't bother writing anything. */
3765b1be 4418 if (dynamic_symbol_p)
f94952df
RH
4419 {
4420 r = bfd_reloc_ok;
4421 break;
4422 }
3765b1be
RH
4423 /* The regular PC-relative stuff measures from the start of
4424 the instruction rather than the end. */
4425 value -= 4;
4426 goto default_reloc;
f94952df
RH
4427
4428 case R_ALPHA_BRADDR:
3765b1be
RH
4429 if (dynamic_symbol_p)
4430 {
4431 (*_bfd_error_handler)
d003868e
AM
4432 (_("%B: pc-relative relocation against dynamic symbol %s"),
4433 input_bfd, h->root.root.root.string);
b34976b6 4434 ret_val = FALSE;
3765b1be 4435 }
252b5132
RH
4436 /* The regular PC-relative stuff measures from the start of
4437 the instruction rather than the end. */
3765b1be 4438 value -= 4;
252b5132
RH
4439 goto default_reloc;
4440
7793f4d0
RH
4441 case R_ALPHA_BRSGP:
4442 {
4443 int other;
4444 const char *name;
4445
4446 /* The regular PC-relative stuff measures from the start of
4447 the instruction rather than the end. */
3765b1be 4448 value -= 4;
7793f4d0 4449
ccf00ab6
RH
4450 /* The source and destination gp must be the same. Note that
4451 the source will always have an assigned gp, since we forced
4452 one in check_relocs, but that the destination may not, as
cedb70c5 4453 it might not have had any relocations at all. Also take
ccf00ab6
RH
4454 care not to crash if H is an undefined symbol. */
4455 if (h != NULL && sec != NULL
4456 && alpha_elf_tdata (sec->owner)->gotobj
7793f4d0
RH
4457 && gotobj != alpha_elf_tdata (sec->owner)->gotobj)
4458 {
7793f4d0 4459 (*_bfd_error_handler)
d003868e
AM
4460 (_("%B: change in gp: BRSGP %s"),
4461 input_bfd, h->root.root.root.string);
b34976b6 4462 ret_val = FALSE;
7793f4d0
RH
4463 }
4464
4465 /* The symbol should be marked either NOPV or STD_GPLOAD. */
4466 if (h != NULL)
4467 other = h->root.other;
4468 else
4469 other = sym->st_other;
4470 switch (other & STO_ALPHA_STD_GPLOAD)
4471 {
4472 case STO_ALPHA_NOPV:
4473 break;
4474 case STO_ALPHA_STD_GPLOAD:
64e04ecd 4475 value += 8;
7793f4d0
RH
4476 break;
4477 default:
4478 if (h != NULL)
4479 name = h->root.root.root.string;
4480 else
4481 {
4482 name = (bfd_elf_string_from_elf_section
4483 (input_bfd, symtab_hdr->sh_link, sym->st_name));
4484 if (name == NULL)
4485 name = _("<unknown>");
4486 else if (name[0] == 0)
4487 name = bfd_section_name (input_bfd, sec);
4488 }
4489 (*_bfd_error_handler)
d003868e
AM
4490 (_("%B: !samegp reloc against symbol without .prologue: %s"),
4491 input_bfd, name);
b34976b6 4492 ret_val = FALSE;
7793f4d0
RH
4493 break;
4494 }
4495
4496 goto default_reloc;
4497 }
4498
252b5132
RH
4499 case R_ALPHA_REFLONG:
4500 case R_ALPHA_REFQUAD:
3765b1be
RH
4501 case R_ALPHA_DTPREL64:
4502 case R_ALPHA_TPREL64:
252b5132 4503 {
1bbc9cec
RH
4504 long dynindx, dyntype = r_type;
4505 bfd_vma dynaddend;
252b5132
RH
4506
4507 /* Careful here to remember RELATIVE relocations for global
4508 variables for symbolic shared objects. */
4509
3765b1be 4510 if (dynamic_symbol_p)
252b5132
RH
4511 {
4512 BFD_ASSERT(h->root.dynindx != -1);
1bbc9cec
RH
4513 dynindx = h->root.dynindx;
4514 dynaddend = addend;
3765b1be
RH
4515 addend = 0, value = 0;
4516 }
4517 else if (r_type == R_ALPHA_DTPREL64)
4518 {
e1918d23 4519 BFD_ASSERT (elf_hash_table (info)->tls_sec != NULL);
3765b1be
RH
4520 value -= dtp_base;
4521 goto default_reloc;
4522 }
4523 else if (r_type == R_ALPHA_TPREL64)
4524 {
e1918d23 4525 BFD_ASSERT (elf_hash_table (info)->tls_sec != NULL);
e366eeae 4526 if (!info->shared || info->pie)
1bbc9cec
RH
4527 {
4528 value -= tp_base;
4529 goto default_reloc;
4530 }
4531 dynindx = 0;
4532 dynaddend = value - dtp_base;
252b5132 4533 }
ec338859 4534 else if (info->shared
cf35638d 4535 && r_symndx != STN_UNDEF
d6ad34f6 4536 && (input_section->flags & SEC_ALLOC)
1d5316ab
AM
4537 && !undef_weak_ref
4538 && !(unresolved_reloc
4539 && (_bfd_elf_section_offset (output_bfd, info,
4540 input_section,
4541 rel->r_offset)
4542 == (bfd_vma) -1)))
252b5132 4543 {
3765b1be
RH
4544 if (r_type == R_ALPHA_REFLONG)
4545 {
4546 (*_bfd_error_handler)
d003868e
AM
4547 (_("%B: unhandled dynamic relocation against %s"),
4548 input_bfd,
3765b1be 4549 h->root.root.root.string);
b34976b6 4550 ret_val = FALSE;
3765b1be 4551 }
1bbc9cec
RH
4552 dynindx = 0;
4553 dyntype = R_ALPHA_RELATIVE;
4554 dynaddend = value;
252b5132
RH
4555 }
4556 else
4557 goto default_reloc;
4558
3241278a
RH
4559 if (input_section->flags & SEC_ALLOC)
4560 elf64_alpha_emit_dynrel (output_bfd, info, input_section,
4561 srel, rel->r_offset, dynindx,
4562 dyntype, dynaddend);
252b5132
RH
4563 }
4564 goto default_reloc;
4565
3765b1be 4566 case R_ALPHA_SREL16:
84de6048
RH
4567 case R_ALPHA_SREL32:
4568 case R_ALPHA_SREL64:
3765b1be
RH
4569 if (dynamic_symbol_p)
4570 {
4571 (*_bfd_error_handler)
d003868e
AM
4572 (_("%B: pc-relative relocation against dynamic symbol %s"),
4573 input_bfd, h->root.root.root.string);
b34976b6 4574 ret_val = FALSE;
3765b1be 4575 }
d6ad34f6
RH
4576 else if ((info->shared || info->pie) && undef_weak_ref)
4577 {
4578 (*_bfd_error_handler)
4579 (_("%B: pc-relative relocation against undefined weak symbol %s"),
4580 input_bfd, h->root.root.root.string);
4581 ret_val = FALSE;
4582 }
4583
3765b1be 4584
84de6048
RH
4585 /* ??? .eh_frame references to discarded sections will be smashed
4586 to relocations against SHN_UNDEF. The .eh_frame format allows
4587 NULL to be encoded as 0 in any format, so this works here. */
1d5316ab
AM
4588 if (r_symndx == STN_UNDEF
4589 || (unresolved_reloc
4590 && _bfd_elf_section_offset (output_bfd, info,
4591 input_section,
4592 rel->r_offset) == (bfd_vma) -1))
84de6048
RH
4593 howto = (elf64_alpha_howto_table
4594 + (r_type - R_ALPHA_SREL32 + R_ALPHA_REFLONG));
4595 goto default_reloc;
4596
3765b1be
RH
4597 case R_ALPHA_TLSLDM:
4598 /* Ignore the symbol for the relocation. The result is always
4599 the current module. */
4600 dynamic_symbol_p = 0;
4601 /* FALLTHRU */
4602
4603 case R_ALPHA_TLSGD:
4604 if (!gotent->reloc_done)
4605 {
4606 gotent->reloc_done = 1;
4607
4608 /* Note that the module index for the main program is 1. */
4609 bfd_put_64 (output_bfd, !info->shared && !dynamic_symbol_p,
4610 sgot->contents + gotent->got_offset);
4611
4612 /* If the symbol has been forced local, output a
4613 DTPMOD64 reloc, otherwise it will be handled in
4614 finish_dynamic_symbol. */
4615 if (info->shared && !dynamic_symbol_p)
1bbc9cec
RH
4616 elf64_alpha_emit_dynrel (output_bfd, info, sgot, srelgot,
4617 gotent->got_offset, 0,
4618 R_ALPHA_DTPMOD64, 0);
3765b1be
RH
4619
4620 if (dynamic_symbol_p || r_type == R_ALPHA_TLSLDM)
4621 value = 0;
4622 else
4623 {
e1918d23 4624 BFD_ASSERT (elf_hash_table (info)->tls_sec != NULL);
3765b1be
RH
4625 value -= dtp_base;
4626 }
4627 bfd_put_64 (output_bfd, value,
4628 sgot->contents + gotent->got_offset + 8);
4629 }
4630
4631 value = (sgot->output_section->vma
4632 + sgot->output_offset
4633 + gotent->got_offset);
4634 value -= gp;
4635 goto default_reloc;
4636
4637 case R_ALPHA_DTPRELHI:
4638 case R_ALPHA_DTPRELLO:
4639 case R_ALPHA_DTPREL16:
4640 if (dynamic_symbol_p)
4641 {
4642 (*_bfd_error_handler)
d003868e
AM
4643 (_("%B: dtp-relative relocation against dynamic symbol %s"),
4644 input_bfd, h->root.root.root.string);
b34976b6 4645 ret_val = FALSE;
3765b1be 4646 }
e1918d23 4647 BFD_ASSERT (elf_hash_table (info)->tls_sec != NULL);
3765b1be 4648 value -= dtp_base;
9e756d64
RH
4649 if (r_type == R_ALPHA_DTPRELHI)
4650 value = ((bfd_signed_vma) value >> 16) + ((value >> 15) & 1);
3765b1be
RH
4651 goto default_reloc;
4652
4653 case R_ALPHA_TPRELHI:
4654 case R_ALPHA_TPRELLO:
4655 case R_ALPHA_TPREL16:
e366eeae 4656 if (info->shared && !info->pie)
9e756d64
RH
4657 {
4658 (*_bfd_error_handler)
d003868e
AM
4659 (_("%B: TLS local exec code cannot be linked into shared objects"),
4660 input_bfd);
b34976b6 4661 ret_val = FALSE;
9e756d64
RH
4662 }
4663 else if (dynamic_symbol_p)
3765b1be
RH
4664 {
4665 (*_bfd_error_handler)
d003868e
AM
4666 (_("%B: tp-relative relocation against dynamic symbol %s"),
4667 input_bfd, h->root.root.root.string);
b34976b6 4668 ret_val = FALSE;
3765b1be 4669 }
e1918d23 4670 BFD_ASSERT (elf_hash_table (info)->tls_sec != NULL);
3765b1be 4671 value -= tp_base;
9e756d64
RH
4672 if (r_type == R_ALPHA_TPRELHI)
4673 value = ((bfd_signed_vma) value >> 16) + ((value >> 15) & 1);
3765b1be
RH
4674 goto default_reloc;
4675
4676 case R_ALPHA_GOTDTPREL:
4677 case R_ALPHA_GOTTPREL:
4678 BFD_ASSERT(sgot != NULL);
4679 BFD_ASSERT(gp != 0);
4680 BFD_ASSERT(gotent != NULL);
4681 BFD_ASSERT(gotent->use_count >= 1);
4682
4683 if (!gotent->reloc_done)
4684 {
4685 gotent->reloc_done = 1;
4686
4687 if (dynamic_symbol_p)
4688 value = 0;
4689 else
4690 {
e1918d23 4691 BFD_ASSERT (elf_hash_table (info)->tls_sec != NULL);
1bbc9cec
RH
4692 if (r_type == R_ALPHA_GOTDTPREL)
4693 value -= dtp_base;
4694 else if (!info->shared)
4695 value -= tp_base;
4696 else
4697 {
4698 elf64_alpha_emit_dynrel (output_bfd, info, sgot, srelgot,
4699 gotent->got_offset, 0,
4700 R_ALPHA_TPREL64,
4701 value - dtp_base);
4702 value = 0;
4703 }
3765b1be
RH
4704 }
4705 bfd_put_64 (output_bfd, value,
4706 sgot->contents + gotent->got_offset);
4707 }
4708
4709 value = (sgot->output_section->vma
4710 + sgot->output_offset
4711 + gotent->got_offset);
4712 value -= gp;
4713 goto default_reloc;
4714
252b5132
RH
4715 default:
4716 default_reloc:
4717 r = _bfd_final_link_relocate (howto, input_bfd, input_section,
3765b1be 4718 contents, rel->r_offset, value, 0);
252b5132
RH
4719 break;
4720 }
4721
4722 switch (r)
4723 {
4724 case bfd_reloc_ok:
4725 break;
4726
4727 case bfd_reloc_overflow:
4728 {
4729 const char *name;
4730
ed4de5e2
JJ
4731 /* Don't warn if the overflow is due to pc relative reloc
4732 against discarded section. Section optimization code should
4733 handle it. */
4734
4735 if (r_symndx < symtab_hdr->sh_info
4736 && sec != NULL && howto->pc_relative
dbaa2011 4737 && discarded_section (sec))
ed4de5e2
JJ
4738 break;
4739
252b5132 4740 if (h != NULL)
dfeffb9f 4741 name = NULL;
252b5132
RH
4742 else
4743 {
4744 name = (bfd_elf_string_from_elf_section
4745 (input_bfd, symtab_hdr->sh_link, sym->st_name));
4746 if (name == NULL)
b34976b6 4747 return FALSE;
252b5132
RH
4748 if (*name == '\0')
4749 name = bfd_section_name (input_bfd, sec);
4750 }
4751 if (! ((*info->callbacks->reloc_overflow)
dfeffb9f
L
4752 (info, (h ? &h->root.root : NULL), name, howto->name,
4753 (bfd_vma) 0, input_bfd, input_section,
4754 rel->r_offset)))
b34976b6 4755 ret_val = FALSE;
252b5132
RH
4756 }
4757 break;
4758
4759 default:
4760 case bfd_reloc_outofrange:
4761 abort ();
4762 }
4763 }
4764
f16fbd61 4765 return ret_val;
252b5132
RH
4766}
4767
4768/* Finish up dynamic symbol handling. We set the contents of various
4769 dynamic sections here. */
4770
b34976b6 4771static bfd_boolean
a7519a3c
RH
4772elf64_alpha_finish_dynamic_symbol (bfd *output_bfd, struct bfd_link_info *info,
4773 struct elf_link_hash_entry *h,
4774 Elf_Internal_Sym *sym)
252b5132 4775{
6ec7057a 4776 struct alpha_elf_link_hash_entry *ah = (struct alpha_elf_link_hash_entry *)h;
252b5132
RH
4777 bfd *dynobj = elf_hash_table(info)->dynobj;
4778
6ec7057a 4779 if (h->needs_plt)
252b5132
RH
4780 {
4781 /* Fill in the .plt entry for this symbol. */
4782 asection *splt, *sgot, *srel;
4783 Elf_Internal_Rela outrel;
947216bf 4784 bfd_byte *loc;
252b5132
RH
4785 bfd_vma got_addr, plt_addr;
4786 bfd_vma plt_index;
4787 struct alpha_elf_got_entry *gotent;
4788
4789 BFD_ASSERT (h->dynindx != -1);
4790
3d4d4302 4791 splt = bfd_get_linker_section (dynobj, ".plt");
252b5132 4792 BFD_ASSERT (splt != NULL);
3d4d4302 4793 srel = bfd_get_linker_section (dynobj, ".rela.plt");
252b5132 4794 BFD_ASSERT (srel != NULL);
252b5132 4795
6ec7057a
RH
4796 for (gotent = ah->got_entries; gotent ; gotent = gotent->next)
4797 if (gotent->reloc_type == R_ALPHA_LITERAL
4798 && gotent->use_count > 0)
4799 {
4800 unsigned int insn;
4801 int disp;
252b5132 4802
6ec7057a
RH
4803 sgot = alpha_elf_tdata (gotent->gotobj)->got;
4804 BFD_ASSERT (sgot != NULL);
252b5132 4805
6ec7057a
RH
4806 BFD_ASSERT (gotent->got_offset != -1);
4807 BFD_ASSERT (gotent->plt_offset != -1);
252b5132 4808
6ec7057a
RH
4809 got_addr = (sgot->output_section->vma
4810 + sgot->output_offset
4811 + gotent->got_offset);
4812 plt_addr = (splt->output_section->vma
4813 + splt->output_offset
4814 + gotent->plt_offset);
252b5132 4815
6ec7057a 4816 plt_index = (gotent->plt_offset-PLT_HEADER_SIZE) / PLT_ENTRY_SIZE;
252b5132 4817
6ec7057a
RH
4818 /* Fill in the entry in the procedure linkage table. */
4819 if (elf64_alpha_use_secureplt)
4820 {
4821 disp = (PLT_HEADER_SIZE - 4) - (gotent->plt_offset + 4);
4822 insn = INSN_AD (INSN_BR, 31, disp);
4823 bfd_put_32 (output_bfd, insn,
4824 splt->contents + gotent->plt_offset);
252b5132 4825
6ec7057a
RH
4826 plt_index = ((gotent->plt_offset - NEW_PLT_HEADER_SIZE)
4827 / NEW_PLT_ENTRY_SIZE);
4828 }
4829 else
4830 {
4831 disp = -(gotent->plt_offset + 4);
4832 insn = INSN_AD (INSN_BR, 28, disp);
4833 bfd_put_32 (output_bfd, insn,
4834 splt->contents + gotent->plt_offset);
4835 bfd_put_32 (output_bfd, INSN_UNOP,
4836 splt->contents + gotent->plt_offset + 4);
4837 bfd_put_32 (output_bfd, INSN_UNOP,
4838 splt->contents + gotent->plt_offset + 8);
4839
4840 plt_index = ((gotent->plt_offset - OLD_PLT_HEADER_SIZE)
4841 / OLD_PLT_ENTRY_SIZE);
4842 }
252b5132 4843
6ec7057a
RH
4844 /* Fill in the entry in the .rela.plt section. */
4845 outrel.r_offset = got_addr;
4846 outrel.r_info = ELF64_R_INFO(h->dynindx, R_ALPHA_JMP_SLOT);
4847 outrel.r_addend = 0;
252b5132 4848
6ec7057a
RH
4849 loc = srel->contents + plt_index * sizeof (Elf64_External_Rela);
4850 bfd_elf64_swap_reloca_out (output_bfd, &outrel, loc);
252b5132 4851
6ec7057a
RH
4852 /* Fill in the entry in the .got. */
4853 bfd_put_64 (output_bfd, plt_addr,
4854 sgot->contents + gotent->got_offset);
4855 }
252b5132
RH
4856 }
4857 else if (alpha_elf_dynamic_symbol_p (h, info))
4858 {
4859 /* Fill in the dynamic relocations for this symbol's .got entries. */
4860 asection *srel;
252b5132
RH
4861 struct alpha_elf_got_entry *gotent;
4862
3d4d4302 4863 srel = bfd_get_linker_section (dynobj, ".rela.got");
252b5132
RH
4864 BFD_ASSERT (srel != NULL);
4865
252b5132
RH
4866 for (gotent = ((struct alpha_elf_link_hash_entry *) h)->got_entries;
4867 gotent != NULL;
4868 gotent = gotent->next)
4869 {
f44f99a5 4870 asection *sgot;
1bbc9cec 4871 long r_type;
3765b1be 4872
f44f99a5
RH
4873 if (gotent->use_count == 0)
4874 continue;
4875
4876 sgot = alpha_elf_tdata (gotent->gotobj)->got;
3765b1be
RH
4877
4878 r_type = gotent->reloc_type;
4879 switch (r_type)
4880 {
4881 case R_ALPHA_LITERAL:
4882 r_type = R_ALPHA_GLOB_DAT;
4883 break;
4884 case R_ALPHA_TLSGD:
4885 r_type = R_ALPHA_DTPMOD64;
4886 break;
4887 case R_ALPHA_GOTDTPREL:
4888 r_type = R_ALPHA_DTPREL64;
4889 break;
4890 case R_ALPHA_GOTTPREL:
4891 r_type = R_ALPHA_TPREL64;
4892 break;
4893 case R_ALPHA_TLSLDM:
4894 default:
4895 abort ();
4896 }
4897
68ffbac6 4898 elf64_alpha_emit_dynrel (output_bfd, info, sgot, srel,
1bbc9cec
RH
4899 gotent->got_offset, h->dynindx,
4900 r_type, gotent->addend);
3765b1be
RH
4901
4902 if (gotent->reloc_type == R_ALPHA_TLSGD)
68ffbac6 4903 elf64_alpha_emit_dynrel (output_bfd, info, sgot, srel,
1bbc9cec
RH
4904 gotent->got_offset + 8, h->dynindx,
4905 R_ALPHA_DTPREL64, gotent->addend);
252b5132
RH
4906 }
4907 }
4908
4909 /* Mark some specially defined symbols as absolute. */
9637f6ef 4910 if (h == elf_hash_table (info)->hdynamic
22edb2f1
RS
4911 || h == elf_hash_table (info)->hgot
4912 || h == elf_hash_table (info)->hplt)
252b5132
RH
4913 sym->st_shndx = SHN_ABS;
4914
b34976b6 4915 return TRUE;
252b5132
RH
4916}
4917
4918/* Finish up the dynamic sections. */
4919
b34976b6 4920static bfd_boolean
a7519a3c
RH
4921elf64_alpha_finish_dynamic_sections (bfd *output_bfd,
4922 struct bfd_link_info *info)
252b5132
RH
4923{
4924 bfd *dynobj;
4925 asection *sdyn;
4926
4927 dynobj = elf_hash_table (info)->dynobj;
3d4d4302 4928 sdyn = bfd_get_linker_section (dynobj, ".dynamic");
252b5132
RH
4929
4930 if (elf_hash_table (info)->dynamic_sections_created)
4931 {
6ec7057a 4932 asection *splt, *sgotplt, *srelaplt;
252b5132 4933 Elf64_External_Dyn *dyncon, *dynconend;
6ec7057a 4934 bfd_vma plt_vma, gotplt_vma;
252b5132 4935
3d4d4302
AM
4936 splt = bfd_get_linker_section (dynobj, ".plt");
4937 srelaplt = bfd_get_linker_section (output_bfd, ".rela.plt");
252b5132
RH
4938 BFD_ASSERT (splt != NULL && sdyn != NULL);
4939
6ec7057a
RH
4940 plt_vma = splt->output_section->vma + splt->output_offset;
4941
4942 gotplt_vma = 0;
4943 if (elf64_alpha_use_secureplt)
4944 {
3d4d4302 4945 sgotplt = bfd_get_linker_section (dynobj, ".got.plt");
6ec7057a
RH
4946 BFD_ASSERT (sgotplt != NULL);
4947 if (sgotplt->size > 0)
4948 gotplt_vma = sgotplt->output_section->vma + sgotplt->output_offset;
4949 }
4950
252b5132 4951 dyncon = (Elf64_External_Dyn *) sdyn->contents;
eea6121a 4952 dynconend = (Elf64_External_Dyn *) (sdyn->contents + sdyn->size);
252b5132
RH
4953 for (; dyncon < dynconend; dyncon++)
4954 {
4955 Elf_Internal_Dyn dyn;
252b5132
RH
4956
4957 bfd_elf64_swap_dyn_in (dynobj, dyncon, &dyn);
4958
4959 switch (dyn.d_tag)
4960 {
4961 case DT_PLTGOT:
6ec7057a
RH
4962 dyn.d_un.d_ptr
4963 = elf64_alpha_use_secureplt ? gotplt_vma : plt_vma;
4964 break;
252b5132 4965 case DT_PLTRELSZ:
6ec7057a
RH
4966 dyn.d_un.d_val = srelaplt ? srelaplt->size : 0;
4967 break;
252b5132 4968 case DT_JMPREL:
6ec7057a
RH
4969 dyn.d_un.d_ptr = srelaplt ? srelaplt->vma : 0;
4970 break;
252b5132
RH
4971
4972 case DT_RELASZ:
4973 /* My interpretation of the TIS v1.1 ELF document indicates
4974 that RELASZ should not include JMPREL. This is not what
4975 the rest of the BFD does. It is, however, what the
4976 glibc ld.so wants. Do this fixup here until we found
4977 out who is right. */
6ec7057a
RH
4978 if (srelaplt)
4979 dyn.d_un.d_val -= srelaplt->size;
252b5132
RH
4980 break;
4981 }
4982
4983 bfd_elf64_swap_dyn_out (output_bfd, &dyn, dyncon);
4984 }
4985
6ec7057a 4986 /* Initialize the plt header. */
eea6121a 4987 if (splt->size > 0)
252b5132 4988 {
6ec7057a
RH
4989 unsigned int insn;
4990 int ofs;
4991
4992 if (elf64_alpha_use_secureplt)
4993 {
4994 ofs = gotplt_vma - (plt_vma + PLT_HEADER_SIZE);
4995
4996 insn = INSN_ABC (INSN_SUBQ, 27, 28, 25);
4997 bfd_put_32 (output_bfd, insn, splt->contents);
4998
4999 insn = INSN_ABO (INSN_LDAH, 28, 28, (ofs + 0x8000) >> 16);
5000 bfd_put_32 (output_bfd, insn, splt->contents + 4);
5001
5002 insn = INSN_ABC (INSN_S4SUBQ, 25, 25, 25);
5003 bfd_put_32 (output_bfd, insn, splt->contents + 8);
5004
5005 insn = INSN_ABO (INSN_LDA, 28, 28, ofs);
5006 bfd_put_32 (output_bfd, insn, splt->contents + 12);
5007
5008 insn = INSN_ABO (INSN_LDQ, 27, 28, 0);
5009 bfd_put_32 (output_bfd, insn, splt->contents + 16);
5010
5011 insn = INSN_ABC (INSN_ADDQ, 25, 25, 25);
5012 bfd_put_32 (output_bfd, insn, splt->contents + 20);
5013
5014 insn = INSN_ABO (INSN_LDQ, 28, 28, 8);
5015 bfd_put_32 (output_bfd, insn, splt->contents + 24);
5016
5017 insn = INSN_AB (INSN_JMP, 31, 27);
5018 bfd_put_32 (output_bfd, insn, splt->contents + 28);
5019
5020 insn = INSN_AD (INSN_BR, 28, -PLT_HEADER_SIZE);
5021 bfd_put_32 (output_bfd, insn, splt->contents + 32);
5022 }
5023 else
5024 {
5025 insn = INSN_AD (INSN_BR, 27, 0); /* br $27, .+4 */
5026 bfd_put_32 (output_bfd, insn, splt->contents);
5027
5028 insn = INSN_ABO (INSN_LDQ, 27, 27, 12);
5029 bfd_put_32 (output_bfd, insn, splt->contents + 4);
5030
5031 insn = INSN_UNOP;
5032 bfd_put_32 (output_bfd, insn, splt->contents + 8);
5033
5034 insn = INSN_AB (INSN_JMP, 27, 27);
5035 bfd_put_32 (output_bfd, insn, splt->contents + 12);
5036
5037 /* The next two words will be filled in by ld.so. */
5038 bfd_put_64 (output_bfd, 0, splt->contents + 16);
5039 bfd_put_64 (output_bfd, 0, splt->contents + 24);
5040 }
252b5132 5041
eecdbe52 5042 elf_section_data (splt->output_section)->this_hdr.sh_entsize = 0;
252b5132
RH
5043 }
5044 }
5045
b34976b6 5046 return TRUE;
252b5132
RH
5047}
5048
96e2734b
RH
5049/* We need to use a special link routine to handle the .mdebug section.
5050 We need to merge all instances of these sections together, not write
5051 them all out sequentially. */
252b5132 5052
b34976b6 5053static bfd_boolean
a7519a3c 5054elf64_alpha_final_link (bfd *abfd, struct bfd_link_info *info)
252b5132
RH
5055{
5056 asection *o;
5057 struct bfd_link_order *p;
96e2734b 5058 asection *mdebug_sec;
252b5132
RH
5059 struct ecoff_debug_info debug;
5060 const struct ecoff_debug_swap *swap
5061 = get_elf_backend_data (abfd)->elf_backend_ecoff_debug_swap;
5062 HDRR *symhdr = &debug.symbolic_header;
4dfe6ac6
NC
5063 void * mdebug_handle = NULL;
5064 struct alpha_elf_link_hash_table * htab;
5065
5066 htab = alpha_elf_hash_table (info);
5067 if (htab == NULL)
5068 return FALSE;
252b5132 5069
96e2734b 5070 /* Go through the sections and collect the mdebug information. */
252b5132 5071 mdebug_sec = NULL;
252b5132
RH
5072 for (o = abfd->sections; o != (asection *) NULL; o = o->next)
5073 {
252b5132
RH
5074 if (strcmp (o->name, ".mdebug") == 0)
5075 {
5076 struct extsym_info einfo;
5077
5078 /* We have found the .mdebug section in the output file.
5079 Look through all the link_orders comprising it and merge
5080 the information together. */
5081 symhdr->magic = swap->sym_magic;
5082 /* FIXME: What should the version stamp be? */
5083 symhdr->vstamp = 0;
5084 symhdr->ilineMax = 0;
5085 symhdr->cbLine = 0;
5086 symhdr->idnMax = 0;
5087 symhdr->ipdMax = 0;
5088 symhdr->isymMax = 0;
5089 symhdr->ioptMax = 0;
5090 symhdr->iauxMax = 0;
5091 symhdr->issMax = 0;
5092 symhdr->issExtMax = 0;
5093 symhdr->ifdMax = 0;
5094 symhdr->crfd = 0;
5095 symhdr->iextMax = 0;
5096
5097 /* We accumulate the debugging information itself in the
5098 debug_info structure. */
5099 debug.line = NULL;
5100 debug.external_dnr = NULL;
5101 debug.external_pdr = NULL;
5102 debug.external_sym = NULL;
5103 debug.external_opt = NULL;
5104 debug.external_aux = NULL;
5105 debug.ss = NULL;
5106 debug.ssext = debug.ssext_end = NULL;
5107 debug.external_fdr = NULL;
5108 debug.external_rfd = NULL;
5109 debug.external_ext = debug.external_ext_end = NULL;
5110
5111 mdebug_handle = bfd_ecoff_debug_init (abfd, &debug, swap, info);
2c3fc389 5112 if (mdebug_handle == NULL)
b34976b6 5113 return FALSE;
252b5132
RH
5114
5115 if (1)
5116 {
5117 asection *s;
5118 EXTR esym;
52b9d213 5119 bfd_vma last = 0;
252b5132
RH
5120 unsigned int i;
5121 static const char * const name[] =
5122 {
5123 ".text", ".init", ".fini", ".data",
5124 ".rodata", ".sdata", ".sbss", ".bss"
5125 };
5126 static const int sc[] = { scText, scInit, scFini, scData,
5127 scRData, scSData, scSBss, scBss };
5128
5129 esym.jmptbl = 0;
5130 esym.cobol_main = 0;
5131 esym.weakext = 0;
5132 esym.reserved = 0;
5133 esym.ifd = ifdNil;
5134 esym.asym.iss = issNil;
5135 esym.asym.st = stLocal;
5136 esym.asym.reserved = 0;
5137 esym.asym.index = indexNil;
5138 for (i = 0; i < 8; i++)
5139 {
5140 esym.asym.sc = sc[i];
5141 s = bfd_get_section_by_name (abfd, name[i]);
5142 if (s != NULL)
5143 {
5144 esym.asym.value = s->vma;
eea6121a 5145 last = s->vma + s->size;
252b5132
RH
5146 }
5147 else
5148 esym.asym.value = last;
5149
5150 if (! bfd_ecoff_debug_one_external (abfd, &debug, swap,
5151 name[i], &esym))
b34976b6 5152 return FALSE;
252b5132
RH
5153 }
5154 }
5155
8423293d 5156 for (p = o->map_head.link_order;
252b5132
RH
5157 p != (struct bfd_link_order *) NULL;
5158 p = p->next)
5159 {
5160 asection *input_section;
5161 bfd *input_bfd;
5162 const struct ecoff_debug_swap *input_swap;
5163 struct ecoff_debug_info input_debug;
5164 char *eraw_src;
5165 char *eraw_end;
5166
5167 if (p->type != bfd_indirect_link_order)
5168 {
fd96f80f 5169 if (p->type == bfd_data_link_order)
252b5132
RH
5170 continue;
5171 abort ();
5172 }
5173
5174 input_section = p->u.indirect.section;
5175 input_bfd = input_section->owner;
5176
0ffa91dd
NC
5177 if (! is_alpha_elf (input_bfd))
5178 /* I don't know what a non ALPHA ELF bfd would be
5179 doing with a .mdebug section, but I don't really
5180 want to deal with it. */
5181 continue;
252b5132
RH
5182
5183 input_swap = (get_elf_backend_data (input_bfd)
5184 ->elf_backend_ecoff_debug_swap);
5185
eea6121a 5186 BFD_ASSERT (p->size == input_section->size);
252b5132
RH
5187
5188 /* The ECOFF linking code expects that we have already
5189 read in the debugging information and set up an
5190 ecoff_debug_info structure, so we do that now. */
5191 if (!elf64_alpha_read_ecoff_info (input_bfd, input_section,
5192 &input_debug))
b34976b6 5193 return FALSE;
252b5132
RH
5194
5195 if (! (bfd_ecoff_debug_accumulate
5196 (mdebug_handle, abfd, &debug, swap, input_bfd,
5197 &input_debug, input_swap, info)))
b34976b6 5198 return FALSE;
252b5132
RH
5199
5200 /* Loop through the external symbols. For each one with
5201 interesting information, try to find the symbol in
5202 the linker global hash table and save the information
5203 for the output external symbols. */
21d799b5 5204 eraw_src = (char *) input_debug.external_ext;
252b5132
RH
5205 eraw_end = (eraw_src
5206 + (input_debug.symbolic_header.iextMax
5207 * input_swap->external_ext_size));
5208 for (;
5209 eraw_src < eraw_end;
5210 eraw_src += input_swap->external_ext_size)
5211 {
5212 EXTR ext;
5213 const char *name;
5214 struct alpha_elf_link_hash_entry *h;
5215
2c3fc389 5216 (*input_swap->swap_ext_in) (input_bfd, eraw_src, &ext);
252b5132
RH
5217 if (ext.asym.sc == scNil
5218 || ext.asym.sc == scUndefined
5219 || ext.asym.sc == scSUndefined)
5220 continue;
5221
5222 name = input_debug.ssext + ext.asym.iss;
4dfe6ac6 5223 h = alpha_elf_link_hash_lookup (htab, name, FALSE, FALSE, TRUE);
252b5132
RH
5224 if (h == NULL || h->esym.ifd != -2)
5225 continue;
5226
5227 if (ext.ifd != -1)
5228 {
5229 BFD_ASSERT (ext.ifd
5230 < input_debug.symbolic_header.ifdMax);
5231 ext.ifd = input_debug.ifdmap[ext.ifd];
5232 }
5233
5234 h->esym = ext;
5235 }
5236
5237 /* Free up the information we just read. */
5238 free (input_debug.line);
5239 free (input_debug.external_dnr);
5240 free (input_debug.external_pdr);
5241 free (input_debug.external_sym);
5242 free (input_debug.external_opt);
5243 free (input_debug.external_aux);
5244 free (input_debug.ss);
5245 free (input_debug.ssext);
5246 free (input_debug.external_fdr);
5247 free (input_debug.external_rfd);
5248 free (input_debug.external_ext);
5249
5250 /* Hack: reset the SEC_HAS_CONTENTS flag so that
5251 elf_link_input_bfd ignores this section. */
5252 input_section->flags &=~ SEC_HAS_CONTENTS;
5253 }
5254
252b5132
RH
5255 /* Build the external symbol information. */
5256 einfo.abfd = abfd;
5257 einfo.info = info;
5258 einfo.debug = &debug;
5259 einfo.swap = swap;
b34976b6 5260 einfo.failed = FALSE;
252b5132
RH
5261 elf_link_hash_traverse (elf_hash_table (info),
5262 elf64_alpha_output_extsym,
2c3fc389 5263 &einfo);
252b5132 5264 if (einfo.failed)
b34976b6 5265 return FALSE;
252b5132
RH
5266
5267 /* Set the size of the .mdebug section. */
eea6121a 5268 o->size = bfd_ecoff_debug_size (abfd, &debug, swap);
252b5132
RH
5269
5270 /* Skip this section later on (I don't think this currently
5271 matters, but someday it might). */
8423293d 5272 o->map_head.link_order = (struct bfd_link_order *) NULL;
252b5132
RH
5273
5274 mdebug_sec = o;
5275 }
252b5132
RH
5276 }
5277
5278 /* Invoke the regular ELF backend linker to do all the work. */
c152c796 5279 if (! bfd_elf_final_link (abfd, info))
b34976b6 5280 return FALSE;
252b5132
RH
5281
5282 /* Now write out the computed sections. */
5283
5284 /* The .got subsections... */
5285 {
5286 bfd *i, *dynobj = elf_hash_table(info)->dynobj;
4dfe6ac6 5287 for (i = htab->got_list;
252b5132
RH
5288 i != NULL;
5289 i = alpha_elf_tdata(i)->got_link_next)
5290 {
5291 asection *sgot;
5292
5293 /* elf_bfd_final_link already did everything in dynobj. */
5294 if (i == dynobj)
5295 continue;
5296
5297 sgot = alpha_elf_tdata(i)->got;
5298 if (! bfd_set_section_contents (abfd, sgot->output_section,
dc810e39
AM
5299 sgot->contents,
5300 (file_ptr) sgot->output_offset,
eea6121a 5301 sgot->size))
b34976b6 5302 return FALSE;
252b5132
RH
5303 }
5304 }
5305
252b5132
RH
5306 if (mdebug_sec != (asection *) NULL)
5307 {
5308 BFD_ASSERT (abfd->output_has_begun);
5309 if (! bfd_ecoff_write_accumulated_debug (mdebug_handle, abfd, &debug,
5310 swap, info,
5311 mdebug_sec->filepos))
b34976b6 5312 return FALSE;
252b5132
RH
5313
5314 bfd_ecoff_debug_free (mdebug_handle, abfd, &debug, swap, info);
5315 }
5316
b34976b6 5317 return TRUE;
252b5132 5318}
fcfbdf31
JJ
5319
5320static enum elf_reloc_type_class
7e612e98
AM
5321elf64_alpha_reloc_type_class (const struct bfd_link_info *info ATTRIBUTE_UNUSED,
5322 const asection *rel_sec ATTRIBUTE_UNUSED,
5323 const Elf_Internal_Rela *rela)
fcfbdf31 5324{
f51e552e 5325 switch ((int) ELF64_R_TYPE (rela->r_info))
fcfbdf31
JJ
5326 {
5327 case R_ALPHA_RELATIVE:
5328 return reloc_class_relative;
5329 case R_ALPHA_JMP_SLOT:
5330 return reloc_class_plt;
5331 case R_ALPHA_COPY:
5332 return reloc_class_copy;
5333 default:
5334 return reloc_class_normal;
5335 }
5336}
252b5132 5337\f
b35d266b 5338static const struct bfd_elf_special_section elf64_alpha_special_sections[] =
2f89ff8d 5339{
0112cd26
NC
5340 { STRING_COMMA_LEN (".sbss"), -2, SHT_NOBITS, SHF_ALLOC + SHF_WRITE + SHF_ALPHA_GPREL },
5341 { STRING_COMMA_LEN (".sdata"), -2, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE + SHF_ALPHA_GPREL },
5342 { NULL, 0, 0, 0, 0 }
2f89ff8d
L
5343};
5344
252b5132
RH
5345/* ECOFF swapping routines. These are used when dealing with the
5346 .mdebug section, which is in the ECOFF debugging format. Copied
fe8bc63d 5347 from elf32-mips.c. */
252b5132
RH
5348static const struct ecoff_debug_swap
5349elf64_alpha_ecoff_debug_swap =
5350{
5351 /* Symbol table magic number. */
5352 magicSym2,
5353 /* Alignment of debugging information. E.g., 4. */
5354 8,
5355 /* Sizes of external symbolic information. */
5356 sizeof (struct hdr_ext),
5357 sizeof (struct dnr_ext),
5358 sizeof (struct pdr_ext),
5359 sizeof (struct sym_ext),
5360 sizeof (struct opt_ext),
5361 sizeof (struct fdr_ext),
5362 sizeof (struct rfd_ext),
5363 sizeof (struct ext_ext),
5364 /* Functions to swap in external symbolic data. */
5365 ecoff_swap_hdr_in,
5366 ecoff_swap_dnr_in,
5367 ecoff_swap_pdr_in,
5368 ecoff_swap_sym_in,
5369 ecoff_swap_opt_in,
5370 ecoff_swap_fdr_in,
5371 ecoff_swap_rfd_in,
5372 ecoff_swap_ext_in,
5373 _bfd_ecoff_swap_tir_in,
5374 _bfd_ecoff_swap_rndx_in,
5375 /* Functions to swap out external symbolic data. */
5376 ecoff_swap_hdr_out,
5377 ecoff_swap_dnr_out,
5378 ecoff_swap_pdr_out,
5379 ecoff_swap_sym_out,
5380 ecoff_swap_opt_out,
5381 ecoff_swap_fdr_out,
5382 ecoff_swap_rfd_out,
5383 ecoff_swap_ext_out,
5384 _bfd_ecoff_swap_tir_out,
5385 _bfd_ecoff_swap_rndx_out,
5386 /* Function to read in symbolic data. */
5387 elf64_alpha_read_ecoff_info
5388};
5389\f
70bcb145
JW
5390/* Use a non-standard hash bucket size of 8. */
5391
562ace6b 5392static const struct elf_size_info alpha_elf_size_info =
70bcb145
JW
5393{
5394 sizeof (Elf64_External_Ehdr),
5395 sizeof (Elf64_External_Phdr),
5396 sizeof (Elf64_External_Shdr),
5397 sizeof (Elf64_External_Rel),
5398 sizeof (Elf64_External_Rela),
5399 sizeof (Elf64_External_Sym),
5400 sizeof (Elf64_External_Dyn),
5401 sizeof (Elf_External_Note),
5402 8,
5403 1,
45d6a902 5404 64, 3,
70bcb145
JW
5405 ELFCLASS64, EV_CURRENT,
5406 bfd_elf64_write_out_phdrs,
5407 bfd_elf64_write_shdrs_and_ehdr,
1489a3a0 5408 bfd_elf64_checksum_contents,
70bcb145 5409 bfd_elf64_write_relocs,
73ff0d56 5410 bfd_elf64_swap_symbol_in,
70bcb145
JW
5411 bfd_elf64_swap_symbol_out,
5412 bfd_elf64_slurp_reloc_table,
5413 bfd_elf64_slurp_symbol_table,
5414 bfd_elf64_swap_dyn_in,
5415 bfd_elf64_swap_dyn_out,
947216bf
AM
5416 bfd_elf64_swap_reloc_in,
5417 bfd_elf64_swap_reloc_out,
5418 bfd_elf64_swap_reloca_in,
5419 bfd_elf64_swap_reloca_out
70bcb145
JW
5420};
5421
252b5132
RH
5422#define TARGET_LITTLE_SYM bfd_elf64_alpha_vec
5423#define TARGET_LITTLE_NAME "elf64-alpha"
5424#define ELF_ARCH bfd_arch_alpha
ae95ffa6 5425#define ELF_TARGET_ID ALPHA_ELF_DATA
56fc028e
AJ
5426#define ELF_MACHINE_CODE EM_ALPHA
5427#define ELF_MAXPAGESIZE 0x10000
24718e3b 5428#define ELF_COMMONPAGESIZE 0x2000
252b5132
RH
5429
5430#define bfd_elf64_bfd_link_hash_table_create \
5431 elf64_alpha_bfd_link_hash_table_create
5432
5433#define bfd_elf64_bfd_reloc_type_lookup \
5434 elf64_alpha_bfd_reloc_type_lookup
157090f7
AM
5435#define bfd_elf64_bfd_reloc_name_lookup \
5436 elf64_alpha_bfd_reloc_name_lookup
252b5132
RH
5437#define elf_info_to_howto \
5438 elf64_alpha_info_to_howto
5439
5440#define bfd_elf64_mkobject \
5441 elf64_alpha_mkobject
5442#define elf_backend_object_p \
5443 elf64_alpha_object_p
5444
5445#define elf_backend_section_from_shdr \
5446 elf64_alpha_section_from_shdr
204692d7
RH
5447#define elf_backend_section_flags \
5448 elf64_alpha_section_flags
252b5132
RH
5449#define elf_backend_fake_sections \
5450 elf64_alpha_fake_sections
5451
5452#define bfd_elf64_bfd_is_local_label_name \
5453 elf64_alpha_is_local_label_name
5454#define bfd_elf64_find_nearest_line \
5455 elf64_alpha_find_nearest_line
5456#define bfd_elf64_bfd_relax_section \
5457 elf64_alpha_relax_section
5458
5459#define elf_backend_add_symbol_hook \
5460 elf64_alpha_add_symbol_hook
13285a1b
AM
5461#define elf_backend_relocs_compatible \
5462 _bfd_elf_relocs_compatible
252b5132
RH
5463#define elf_backend_check_relocs \
5464 elf64_alpha_check_relocs
5465#define elf_backend_create_dynamic_sections \
5466 elf64_alpha_create_dynamic_sections
5467#define elf_backend_adjust_dynamic_symbol \
5468 elf64_alpha_adjust_dynamic_symbol
747ffa7b
AM
5469#define elf_backend_merge_symbol_attribute \
5470 elf64_alpha_merge_symbol_attribute
48f4b4f5
RH
5471#define elf_backend_copy_indirect_symbol \
5472 elf64_alpha_copy_indirect_symbol
252b5132
RH
5473#define elf_backend_always_size_sections \
5474 elf64_alpha_always_size_sections
5475#define elf_backend_size_dynamic_sections \
5476 elf64_alpha_size_dynamic_sections
74541ad4
AM
5477#define elf_backend_omit_section_dynsym \
5478 ((bfd_boolean (*) (bfd *, struct bfd_link_info *, asection *)) bfd_true)
252b5132
RH
5479#define elf_backend_relocate_section \
5480 elf64_alpha_relocate_section
5481#define elf_backend_finish_dynamic_symbol \
5482 elf64_alpha_finish_dynamic_symbol
5483#define elf_backend_finish_dynamic_sections \
5484 elf64_alpha_finish_dynamic_sections
5485#define bfd_elf64_bfd_final_link \
5486 elf64_alpha_final_link
fcfbdf31
JJ
5487#define elf_backend_reloc_type_class \
5488 elf64_alpha_reloc_type_class
252b5132 5489
e117360e
RH
5490#define elf_backend_can_gc_sections 1
5491#define elf_backend_gc_mark_hook elf64_alpha_gc_mark_hook
5492#define elf_backend_gc_sweep_hook elf64_alpha_gc_sweep_hook
5493
252b5132
RH
5494#define elf_backend_ecoff_debug_swap \
5495 &elf64_alpha_ecoff_debug_swap
5496
70bcb145
JW
5497#define elf_backend_size_info \
5498 alpha_elf_size_info
5499
29ef7005
L
5500#define elf_backend_special_sections \
5501 elf64_alpha_special_sections
2f89ff8d 5502
38b1a46c 5503/* A few constants that determine how the .plt section is set up. */
252b5132
RH
5504#define elf_backend_want_got_plt 0
5505#define elf_backend_plt_readonly 0
5506#define elf_backend_want_plt_sym 1
5507#define elf_backend_got_header_size 0
252b5132
RH
5508
5509#include "elf64-target.h"
2238051f
RH
5510\f
5511/* FreeBSD support. */
5512
5513#undef TARGET_LITTLE_SYM
5514#define TARGET_LITTLE_SYM bfd_elf64_alpha_freebsd_vec
5515#undef TARGET_LITTLE_NAME
5516#define TARGET_LITTLE_NAME "elf64-alpha-freebsd"
d1036acb
L
5517#undef ELF_OSABI
5518#define ELF_OSABI ELFOSABI_FREEBSD
2238051f
RH
5519
5520/* The kernel recognizes executables as valid only if they carry a
5521 "FreeBSD" label in the ELF header. So we put this label on all
5522 executables and (for simplicity) also all other object files. */
5523
2238051f 5524static void
a7519a3c
RH
5525elf64_alpha_fbsd_post_process_headers (bfd * abfd,
5526 struct bfd_link_info * link_info ATTRIBUTE_UNUSED)
2238051f
RH
5527{
5528 Elf_Internal_Ehdr * i_ehdrp; /* ELF file header, internal form. */
5529
5530 i_ehdrp = elf_elfheader (abfd);
5531
5532 /* Put an ABI label supported by FreeBSD >= 4.1. */
d1036acb 5533 i_ehdrp->e_ident[EI_OSABI] = get_elf_backend_data (abfd)->elf_osabi;
2238051f
RH
5534#ifdef OLD_FREEBSD_ABI_LABEL
5535 /* The ABI label supported by FreeBSD <= 4.0 is quite nonstandard. */
5536 memcpy (&i_ehdrp->e_ident[EI_ABIVERSION], "FreeBSD", 8);
5537#endif
5538}
5539
5540#undef elf_backend_post_process_headers
5541#define elf_backend_post_process_headers \
5542 elf64_alpha_fbsd_post_process_headers
5543
571fe01f 5544#undef elf64_bed
2238051f
RH
5545#define elf64_bed elf64_alpha_fbsd_bed
5546
5547#include "elf64-target.h"
This page took 1.078826 seconds and 4 git commands to generate.