]> git.ipfire.org Git - thirdparty/binutils-gdb.git/blame - bfd/elf64-alpha.c
daily update
[thirdparty/binutils-gdb.git] / bfd / elf64-alpha.c
CommitLineData
252b5132 1/* Alpha specific support for 64-bit ELF
4b95cf5c 2 Copyright (C) 1996-2014 Free Software Foundation, Inc.
252b5132
RH
3 Contributed by Richard Henderson <rth@tamu.edu>.
4
571fe01f 5 This file is part of BFD, the Binary File Descriptor library.
252b5132 6
571fe01f
NC
7 This program is free software; you can redistribute it and/or modify
8 it under the terms of the GNU General Public License as published by
cd123cb7 9 the Free Software Foundation; either version 3 of the License, or
571fe01f 10 (at your option) any later version.
252b5132 11
571fe01f
NC
12 This program is distributed in the hope that it will be useful,
13 but WITHOUT ANY WARRANTY; without even the implied warranty of
14 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 GNU General Public License for more details.
252b5132 16
571fe01f
NC
17 You should have received a copy of the GNU General Public License
18 along with this program; if not, write to the Free Software
cd123cb7
NC
19 Foundation, Inc., 51 Franklin Street - Fifth Floor, Boston,
20 MA 02110-1301, USA. */
21
252b5132
RH
22
23/* We need a published ABI spec for this. Until one comes out, don't
24 assume this'll remain unchanged forever. */
25
252b5132 26#include "sysdep.h"
3db64b00 27#include "bfd.h"
252b5132
RH
28#include "libbfd.h"
29#include "elf-bfd.h"
30
31#include "elf/alpha.h"
32
33#define ALPHAECOFF
34
35#define NO_COFF_RELOCS
36#define NO_COFF_SYMBOLS
37#define NO_COFF_LINENOS
38
fe8bc63d 39/* Get the ECOFF swapping routines. Needed for the debug information. */
252b5132
RH
40#include "coff/internal.h"
41#include "coff/sym.h"
42#include "coff/symconst.h"
43#include "coff/ecoff.h"
44#include "coff/alpha.h"
45#include "aout/ar.h"
46#include "libcoff.h"
47#include "libecoff.h"
48#define ECOFF_64
49#include "ecoffswap.h"
50
6ec7057a
RH
51\f
52/* Instruction data for plt generation and relaxation. */
53
54#define OP_LDA 0x08
55#define OP_LDAH 0x09
56#define OP_LDQ 0x29
57#define OP_BR 0x30
58#define OP_BSR 0x34
59
60#define INSN_LDA (OP_LDA << 26)
61#define INSN_LDAH (OP_LDAH << 26)
62#define INSN_LDQ (OP_LDQ << 26)
63#define INSN_BR (OP_BR << 26)
64
65#define INSN_ADDQ 0x40000400
66#define INSN_RDUNIQ 0x0000009e
67#define INSN_SUBQ 0x40000520
68#define INSN_S4SUBQ 0x40000560
69#define INSN_UNOP 0x2ffe0000
70
71#define INSN_JSR 0x68004000
72#define INSN_JMP 0x68000000
73#define INSN_JSR_MASK 0xfc00c000
74
75#define INSN_A(I,A) (I | (A << 21))
76#define INSN_AB(I,A,B) (I | (A << 21) | (B << 16))
77#define INSN_ABC(I,A,B,C) (I | (A << 21) | (B << 16) | C)
78#define INSN_ABO(I,A,B,O) (I | (A << 21) | (B << 16) | ((O) & 0xffff))
79#define INSN_AD(I,A,D) (I | (A << 21) | (((D) >> 2) & 0x1fffff))
80
81/* PLT/GOT Stuff */
82
83/* Set by ld emulation. Putting this into the link_info or hash structure
84 is simply working too hard. */
85#ifdef USE_SECUREPLT
86bfd_boolean elf64_alpha_use_secureplt = TRUE;
87#else
88bfd_boolean elf64_alpha_use_secureplt = FALSE;
89#endif
90
91#define OLD_PLT_HEADER_SIZE 32
92#define OLD_PLT_ENTRY_SIZE 12
93#define NEW_PLT_HEADER_SIZE 36
94#define NEW_PLT_ENTRY_SIZE 4
95
96#define PLT_HEADER_SIZE \
97 (elf64_alpha_use_secureplt ? NEW_PLT_HEADER_SIZE : OLD_PLT_HEADER_SIZE)
98#define PLT_ENTRY_SIZE \
99 (elf64_alpha_use_secureplt ? NEW_PLT_ENTRY_SIZE : OLD_PLT_ENTRY_SIZE)
100
101#define MAX_GOT_SIZE (64*1024)
102
103#define ELF_DYNAMIC_INTERPRETER "/usr/lib/ld.so"
252b5132 104\f
21d799b5
NC
105
106/* Used to implement multiple .got subsections. */
107struct alpha_elf_got_entry
108{
109 struct alpha_elf_got_entry *next;
110
111 /* Which .got subsection? */
112 bfd *gotobj;
113
114 /* The addend in effect for this entry. */
115 bfd_vma addend;
116
117 /* The .got offset for this entry. */
118 int got_offset;
119
120 /* The .plt offset for this entry. */
121 int plt_offset;
122
123 /* How many references to this entry? */
124 int use_count;
125
126 /* The relocation type of this entry. */
127 unsigned char reloc_type;
128
129 /* How a LITERAL is used. */
130 unsigned char flags;
131
132 /* Have we initialized the dynamic relocation for this entry? */
133 unsigned char reloc_done;
134
135 /* Have we adjusted this entry for SEC_MERGE? */
136 unsigned char reloc_xlated;
137};
138
139struct alpha_elf_reloc_entry
140{
141 struct alpha_elf_reloc_entry *next;
142
143 /* Which .reloc section? */
144 asection *srel;
145
146 /* What kind of relocation? */
147 unsigned int rtype;
148
149 /* Is this against read-only section? */
150 unsigned int reltext : 1;
151
152 /* How many did we find? */
153 unsigned long count;
154};
155
252b5132
RH
156struct alpha_elf_link_hash_entry
157{
158 struct elf_link_hash_entry root;
159
160 /* External symbol information. */
161 EXTR esym;
162
163 /* Cumulative flags for all the .got entries. */
164 int flags;
165
9e756d64 166 /* Contexts in which a literal was referenced. */
8288a39e
RH
167#define ALPHA_ELF_LINK_HASH_LU_ADDR 0x01
168#define ALPHA_ELF_LINK_HASH_LU_MEM 0x02
169#define ALPHA_ELF_LINK_HASH_LU_BYTE 0x04
170#define ALPHA_ELF_LINK_HASH_LU_JSR 0x08
171#define ALPHA_ELF_LINK_HASH_LU_TLSGD 0x10
172#define ALPHA_ELF_LINK_HASH_LU_TLSLDM 0x20
173#define ALPHA_ELF_LINK_HASH_LU_JSRDIRECT 0x40
174#define ALPHA_ELF_LINK_HASH_LU_PLT 0x38
175#define ALPHA_ELF_LINK_HASH_TLS_IE 0x80
cc03ec80 176
252b5132 177 /* Used to implement multiple .got subsections. */
21d799b5 178 struct alpha_elf_got_entry *got_entries;
252b5132 179
571fe01f 180 /* Used to count non-got, non-plt relocations for delayed sizing
252b5132 181 of relocation sections. */
21d799b5 182 struct alpha_elf_reloc_entry *reloc_entries;
252b5132
RH
183};
184
185/* Alpha ELF linker hash table. */
186
187struct alpha_elf_link_hash_table
188{
189 struct elf_link_hash_table root;
190
191 /* The head of a list of .got subsections linked through
192 alpha_elf_tdata(abfd)->got_link_next. */
193 bfd *got_list;
4a828aab
RH
194
195 /* The most recent relax pass that we've seen. The GOTs
196 should be regenerated if this doesn't match. */
197 int relax_trip;
252b5132
RH
198};
199
200/* Look up an entry in a Alpha ELF linker hash table. */
201
202#define alpha_elf_link_hash_lookup(table, string, create, copy, follow) \
203 ((struct alpha_elf_link_hash_entry *) \
204 elf_link_hash_lookup (&(table)->root, (string), (create), \
205 (copy), (follow)))
206
207/* Traverse a Alpha ELF linker hash table. */
208
209#define alpha_elf_link_hash_traverse(table, func, info) \
210 (elf_link_hash_traverse \
211 (&(table)->root, \
2c3fc389 212 (bfd_boolean (*) (struct elf_link_hash_entry *, void *)) (func), \
252b5132
RH
213 (info)))
214
215/* Get the Alpha ELF linker hash table from a link_info structure. */
216
217#define alpha_elf_hash_table(p) \
4dfe6ac6
NC
218 (elf_hash_table_id ((struct elf_link_hash_table *) ((p)->hash)) \
219 == ALPHA_ELF_DATA ? ((struct alpha_elf_link_hash_table *) ((p)->hash)) : NULL)
252b5132
RH
220
221/* Get the object's symbols as our own entry type. */
222
223#define alpha_elf_sym_hashes(abfd) \
224 ((struct alpha_elf_link_hash_entry **)elf_sym_hashes(abfd))
225
68ffbac6 226/* Should we do dynamic things to this symbol? This differs from the
986a241f
RH
227 generic version in that we never need to consider function pointer
228 equality wrt PLT entries -- we don't create a PLT entry if a symbol's
229 address is ever taken. */
252b5132 230
986a241f 231static inline bfd_boolean
a7519a3c
RH
232alpha_elf_dynamic_symbol_p (struct elf_link_hash_entry *h,
233 struct bfd_link_info *info)
8fb35fed 234{
986a241f 235 return _bfd_elf_dynamic_symbol_p (h, info, 0);
8fb35fed 236}
252b5132
RH
237
238/* Create an entry in a Alpha ELF linker hash table. */
239
240static struct bfd_hash_entry *
a7519a3c
RH
241elf64_alpha_link_hash_newfunc (struct bfd_hash_entry *entry,
242 struct bfd_hash_table *table,
243 const char *string)
252b5132
RH
244{
245 struct alpha_elf_link_hash_entry *ret =
246 (struct alpha_elf_link_hash_entry *) entry;
247
248 /* Allocate the structure if it has not already been allocated by a
249 subclass. */
250 if (ret == (struct alpha_elf_link_hash_entry *) NULL)
251 ret = ((struct alpha_elf_link_hash_entry *)
252 bfd_hash_allocate (table,
253 sizeof (struct alpha_elf_link_hash_entry)));
254 if (ret == (struct alpha_elf_link_hash_entry *) NULL)
255 return (struct bfd_hash_entry *) ret;
256
257 /* Call the allocation method of the superclass. */
258 ret = ((struct alpha_elf_link_hash_entry *)
259 _bfd_elf_link_hash_newfunc ((struct bfd_hash_entry *) ret,
260 table, string));
261 if (ret != (struct alpha_elf_link_hash_entry *) NULL)
262 {
263 /* Set local fields. */
264 memset (&ret->esym, 0, sizeof (EXTR));
265 /* We use -2 as a marker to indicate that the information has
266 not been set. -1 means there is no associated ifd. */
267 ret->esym.ifd = -2;
268 ret->flags = 0;
269 ret->got_entries = NULL;
270 ret->reloc_entries = NULL;
271 }
272
273 return (struct bfd_hash_entry *) ret;
274}
275
276/* Create a Alpha ELF linker hash table. */
277
278static struct bfd_link_hash_table *
a7519a3c 279elf64_alpha_bfd_link_hash_table_create (bfd *abfd)
252b5132
RH
280{
281 struct alpha_elf_link_hash_table *ret;
dc810e39 282 bfd_size_type amt = sizeof (struct alpha_elf_link_hash_table);
252b5132 283
e2d34d7d 284 ret = (struct alpha_elf_link_hash_table *) bfd_zmalloc (amt);
252b5132
RH
285 if (ret == (struct alpha_elf_link_hash_table *) NULL)
286 return NULL;
287
66eb6687
AM
288 if (!_bfd_elf_link_hash_table_init (&ret->root, abfd,
289 elf64_alpha_link_hash_newfunc,
4dfe6ac6
NC
290 sizeof (struct alpha_elf_link_hash_entry),
291 ALPHA_ELF_DATA))
252b5132 292 {
e2d34d7d 293 free (ret);
252b5132
RH
294 return NULL;
295 }
296
297 return &ret->root.root;
298}
299\f
698600e4
AM
300/* Alpha ELF follows MIPS ELF in using a special find_nearest_line
301 routine in order to handle the ECOFF debugging information. */
302
303struct alpha_elf_find_line
304{
305 struct ecoff_debug_info d;
306 struct ecoff_find_line i;
307};
308
252b5132
RH
309/* We have some private fields hanging off of the elf_tdata structure. */
310
311struct alpha_elf_obj_tdata
312{
313 struct elf_obj_tdata root;
314
315 /* For every input file, these are the got entries for that object's
316 local symbols. */
317 struct alpha_elf_got_entry ** local_got_entries;
318
319 /* For every input file, this is the object that owns the got that
320 this input file uses. */
321 bfd *gotobj;
322
323 /* For every got, this is a linked list through the objects using this got */
324 bfd *in_got_link_next;
325
326 /* For every got, this is a link to the next got subsegment. */
327 bfd *got_link_next;
328
329 /* For every got, this is the section. */
330 asection *got;
331
3765b1be
RH
332 /* For every got, this is it's total number of words. */
333 int total_got_size;
252b5132 334
3765b1be 335 /* For every got, this is the sum of the number of words required
252b5132 336 to hold all of the member object's local got. */
3765b1be 337 int local_got_size;
698600e4
AM
338
339 /* Used by elf64_alpha_find_nearest_line entry point. */
340 struct alpha_elf_find_line *find_line_info;
341
252b5132
RH
342};
343
344#define alpha_elf_tdata(abfd) \
345 ((struct alpha_elf_obj_tdata *) (abfd)->tdata.any)
346
0ffa91dd
NC
347#define is_alpha_elf(bfd) \
348 (bfd_get_flavour (bfd) == bfd_target_elf_flavour \
349 && elf_tdata (bfd) != NULL \
4dfe6ac6 350 && elf_object_id (bfd) == ALPHA_ELF_DATA)
0ffa91dd 351
b34976b6 352static bfd_boolean
a7519a3c 353elf64_alpha_mkobject (bfd *abfd)
252b5132 354{
0ffa91dd 355 return bfd_elf_allocate_object (abfd, sizeof (struct alpha_elf_obj_tdata),
4dfe6ac6 356 ALPHA_ELF_DATA);
252b5132
RH
357}
358
b34976b6 359static bfd_boolean
a7519a3c 360elf64_alpha_object_p (bfd *abfd)
252b5132 361{
252b5132
RH
362 /* Set the right machine number for an Alpha ELF file. */
363 return bfd_default_set_arch_mach (abfd, bfd_arch_alpha, 0);
364}
365\f
a7519a3c
RH
366/* A relocation function which doesn't do anything. */
367
368static bfd_reloc_status_type
369elf64_alpha_reloc_nil (bfd *abfd ATTRIBUTE_UNUSED, arelent *reloc,
370 asymbol *sym ATTRIBUTE_UNUSED,
2c3fc389 371 void * data ATTRIBUTE_UNUSED, asection *sec,
a7519a3c
RH
372 bfd *output_bfd, char **error_message ATTRIBUTE_UNUSED)
373{
374 if (output_bfd)
375 reloc->address += sec->output_offset;
376 return bfd_reloc_ok;
377}
378
379/* A relocation function used for an unsupported reloc. */
380
381static bfd_reloc_status_type
382elf64_alpha_reloc_bad (bfd *abfd ATTRIBUTE_UNUSED, arelent *reloc,
383 asymbol *sym ATTRIBUTE_UNUSED,
2c3fc389 384 void * data ATTRIBUTE_UNUSED, asection *sec,
a7519a3c
RH
385 bfd *output_bfd, char **error_message ATTRIBUTE_UNUSED)
386{
387 if (output_bfd)
388 reloc->address += sec->output_offset;
389 return bfd_reloc_notsupported;
390}
391
392/* Do the work of the GPDISP relocation. */
393
394static bfd_reloc_status_type
395elf64_alpha_do_reloc_gpdisp (bfd *abfd, bfd_vma gpdisp, bfd_byte *p_ldah,
396 bfd_byte *p_lda)
397{
398 bfd_reloc_status_type ret = bfd_reloc_ok;
399 bfd_vma addend;
400 unsigned long i_ldah, i_lda;
401
402 i_ldah = bfd_get_32 (abfd, p_ldah);
403 i_lda = bfd_get_32 (abfd, p_lda);
404
405 /* Complain if the instructions are not correct. */
406 if (((i_ldah >> 26) & 0x3f) != 0x09
407 || ((i_lda >> 26) & 0x3f) != 0x08)
408 ret = bfd_reloc_dangerous;
409
410 /* Extract the user-supplied offset, mirroring the sign extensions
411 that the instructions perform. */
412 addend = ((i_ldah & 0xffff) << 16) | (i_lda & 0xffff);
413 addend = (addend ^ 0x80008000) - 0x80008000;
414
415 gpdisp += addend;
416
417 if ((bfd_signed_vma) gpdisp < -(bfd_signed_vma) 0x80000000
418 || (bfd_signed_vma) gpdisp >= (bfd_signed_vma) 0x7fff8000)
419 ret = bfd_reloc_overflow;
420
421 /* compensate for the sign extension again. */
422 i_ldah = ((i_ldah & 0xffff0000)
423 | (((gpdisp >> 16) + ((gpdisp >> 15) & 1)) & 0xffff));
424 i_lda = (i_lda & 0xffff0000) | (gpdisp & 0xffff);
425
426 bfd_put_32 (abfd, (bfd_vma) i_ldah, p_ldah);
427 bfd_put_32 (abfd, (bfd_vma) i_lda, p_lda);
428
429 return ret;
430}
431
432/* The special function for the GPDISP reloc. */
433
434static bfd_reloc_status_type
435elf64_alpha_reloc_gpdisp (bfd *abfd, arelent *reloc_entry,
2c3fc389 436 asymbol *sym ATTRIBUTE_UNUSED, void * data,
a7519a3c
RH
437 asection *input_section, bfd *output_bfd,
438 char **err_msg)
439{
440 bfd_reloc_status_type ret;
441 bfd_vma gp, relocation;
442 bfd_vma high_address;
443 bfd_byte *p_ldah, *p_lda;
444
445 /* Don't do anything if we're not doing a final link. */
446 if (output_bfd)
447 {
448 reloc_entry->address += input_section->output_offset;
449 return bfd_reloc_ok;
450 }
451
452 high_address = bfd_get_section_limit (abfd, input_section);
453 if (reloc_entry->address > high_address
454 || reloc_entry->address + reloc_entry->addend > high_address)
455 return bfd_reloc_outofrange;
456
457 /* The gp used in the portion of the output object to which this
458 input object belongs is cached on the input bfd. */
459 gp = _bfd_get_gp_value (abfd);
460
461 relocation = (input_section->output_section->vma
462 + input_section->output_offset
463 + reloc_entry->address);
464
465 p_ldah = (bfd_byte *) data + reloc_entry->address;
466 p_lda = p_ldah + reloc_entry->addend;
467
468 ret = elf64_alpha_do_reloc_gpdisp (abfd, gp - relocation, p_ldah, p_lda);
469
470 /* Complain if the instructions are not correct. */
471 if (ret == bfd_reloc_dangerous)
472 *err_msg = _("GPDISP relocation did not find ldah and lda instructions");
473
474 return ret;
475}
476
252b5132
RH
477/* In case we're on a 32-bit machine, construct a 64-bit "-1" value
478 from smaller values. Start with zero, widen, *then* decrement. */
479#define MINUS_ONE (((bfd_vma)0) - 1)
480
21d799b5 481
dfe57ca0 482#define SKIP_HOWTO(N) \
21d799b5 483 HOWTO(N, 0, 0, 0, 0, 0, complain_overflow_dont, elf64_alpha_reloc_bad, 0, 0, 0, 0, 0)
dfe57ca0 484
252b5132
RH
485static reloc_howto_type elf64_alpha_howto_table[] =
486{
487 HOWTO (R_ALPHA_NONE, /* type */
488 0, /* rightshift */
489 0, /* size (0 = byte, 1 = short, 2 = long) */
490 8, /* bitsize */
b34976b6 491 TRUE, /* pc_relative */
252b5132
RH
492 0, /* bitpos */
493 complain_overflow_dont, /* complain_on_overflow */
494 elf64_alpha_reloc_nil, /* special_function */
495 "NONE", /* name */
b34976b6 496 FALSE, /* partial_inplace */
252b5132
RH
497 0, /* src_mask */
498 0, /* dst_mask */
b34976b6 499 TRUE), /* pcrel_offset */
252b5132
RH
500
501 /* A 32 bit reference to a symbol. */
502 HOWTO (R_ALPHA_REFLONG, /* type */
503 0, /* rightshift */
504 2, /* size (0 = byte, 1 = short, 2 = long) */
505 32, /* bitsize */
b34976b6 506 FALSE, /* pc_relative */
252b5132
RH
507 0, /* bitpos */
508 complain_overflow_bitfield, /* complain_on_overflow */
bc1bc43f 509 bfd_elf_generic_reloc, /* special_function */
252b5132 510 "REFLONG", /* name */
b34976b6 511 FALSE, /* partial_inplace */
252b5132
RH
512 0xffffffff, /* src_mask */
513 0xffffffff, /* dst_mask */
b34976b6 514 FALSE), /* pcrel_offset */
252b5132
RH
515
516 /* A 64 bit reference to a symbol. */
517 HOWTO (R_ALPHA_REFQUAD, /* type */
518 0, /* rightshift */
519 4, /* size (0 = byte, 1 = short, 2 = long) */
520 64, /* bitsize */
b34976b6 521 FALSE, /* pc_relative */
252b5132
RH
522 0, /* bitpos */
523 complain_overflow_bitfield, /* complain_on_overflow */
bc1bc43f 524 bfd_elf_generic_reloc, /* special_function */
252b5132 525 "REFQUAD", /* name */
b34976b6 526 FALSE, /* partial_inplace */
252b5132
RH
527 MINUS_ONE, /* src_mask */
528 MINUS_ONE, /* dst_mask */
b34976b6 529 FALSE), /* pcrel_offset */
252b5132
RH
530
531 /* A 32 bit GP relative offset. This is just like REFLONG except
532 that when the value is used the value of the gp register will be
533 added in. */
534 HOWTO (R_ALPHA_GPREL32, /* type */
535 0, /* rightshift */
536 2, /* size (0 = byte, 1 = short, 2 = long) */
537 32, /* bitsize */
b34976b6 538 FALSE, /* pc_relative */
252b5132
RH
539 0, /* bitpos */
540 complain_overflow_bitfield, /* complain_on_overflow */
bc1bc43f 541 bfd_elf_generic_reloc, /* special_function */
252b5132 542 "GPREL32", /* name */
b34976b6 543 FALSE, /* partial_inplace */
252b5132
RH
544 0xffffffff, /* src_mask */
545 0xffffffff, /* dst_mask */
b34976b6 546 FALSE), /* pcrel_offset */
252b5132
RH
547
548 /* Used for an instruction that refers to memory off the GP register. */
549 HOWTO (R_ALPHA_LITERAL, /* type */
550 0, /* rightshift */
dfe57ca0 551 1, /* size (0 = byte, 1 = short, 2 = long) */
252b5132 552 16, /* bitsize */
b34976b6 553 FALSE, /* pc_relative */
252b5132
RH
554 0, /* bitpos */
555 complain_overflow_signed, /* complain_on_overflow */
bc1bc43f 556 bfd_elf_generic_reloc, /* special_function */
252b5132 557 "ELF_LITERAL", /* name */
b34976b6 558 FALSE, /* partial_inplace */
252b5132
RH
559 0xffff, /* src_mask */
560 0xffff, /* dst_mask */
b34976b6 561 FALSE), /* pcrel_offset */
252b5132
RH
562
563 /* This reloc only appears immediately following an ELF_LITERAL reloc.
564 It identifies a use of the literal. The symbol index is special:
565 1 means the literal address is in the base register of a memory
566 format instruction; 2 means the literal address is in the byte
567 offset register of a byte-manipulation instruction; 3 means the
568 literal address is in the target register of a jsr instruction.
569 This does not actually do any relocation. */
570 HOWTO (R_ALPHA_LITUSE, /* type */
571 0, /* rightshift */
dfe57ca0 572 1, /* size (0 = byte, 1 = short, 2 = long) */
252b5132 573 32, /* bitsize */
b34976b6 574 FALSE, /* pc_relative */
252b5132
RH
575 0, /* bitpos */
576 complain_overflow_dont, /* complain_on_overflow */
577 elf64_alpha_reloc_nil, /* special_function */
578 "LITUSE", /* name */
b34976b6 579 FALSE, /* partial_inplace */
252b5132
RH
580 0, /* src_mask */
581 0, /* dst_mask */
b34976b6 582 FALSE), /* pcrel_offset */
252b5132
RH
583
584 /* Load the gp register. This is always used for a ldah instruction
585 which loads the upper 16 bits of the gp register. The symbol
586 index of the GPDISP instruction is an offset in bytes to the lda
587 instruction that loads the lower 16 bits. The value to use for
588 the relocation is the difference between the GP value and the
589 current location; the load will always be done against a register
590 holding the current address.
591
592 NOTE: Unlike ECOFF, partial in-place relocation is not done. If
593 any offset is present in the instructions, it is an offset from
594 the register to the ldah instruction. This lets us avoid any
595 stupid hackery like inventing a gp value to do partial relocation
596 against. Also unlike ECOFF, we do the whole relocation off of
597 the GPDISP rather than a GPDISP_HI16/GPDISP_LO16 pair. An odd,
598 space consuming bit, that, since all the information was present
599 in the GPDISP_HI16 reloc. */
600 HOWTO (R_ALPHA_GPDISP, /* type */
601 16, /* rightshift */
602 2, /* size (0 = byte, 1 = short, 2 = long) */
603 16, /* bitsize */
b34976b6 604 FALSE, /* pc_relative */
252b5132
RH
605 0, /* bitpos */
606 complain_overflow_dont, /* complain_on_overflow */
607 elf64_alpha_reloc_gpdisp, /* special_function */
608 "GPDISP", /* name */
b34976b6 609 FALSE, /* partial_inplace */
252b5132
RH
610 0xffff, /* src_mask */
611 0xffff, /* dst_mask */
b34976b6 612 TRUE), /* pcrel_offset */
252b5132
RH
613
614 /* A 21 bit branch. */
615 HOWTO (R_ALPHA_BRADDR, /* type */
616 2, /* rightshift */
617 2, /* size (0 = byte, 1 = short, 2 = long) */
618 21, /* bitsize */
b34976b6 619 TRUE, /* pc_relative */
252b5132
RH
620 0, /* bitpos */
621 complain_overflow_signed, /* complain_on_overflow */
bc1bc43f 622 bfd_elf_generic_reloc, /* special_function */
252b5132 623 "BRADDR", /* name */
b34976b6 624 FALSE, /* partial_inplace */
252b5132
RH
625 0x1fffff, /* src_mask */
626 0x1fffff, /* dst_mask */
b34976b6 627 TRUE), /* pcrel_offset */
252b5132
RH
628
629 /* A hint for a jump to a register. */
630 HOWTO (R_ALPHA_HINT, /* type */
631 2, /* rightshift */
dfe57ca0 632 1, /* size (0 = byte, 1 = short, 2 = long) */
252b5132 633 14, /* bitsize */
b34976b6 634 TRUE, /* pc_relative */
252b5132
RH
635 0, /* bitpos */
636 complain_overflow_dont, /* complain_on_overflow */
bc1bc43f 637 bfd_elf_generic_reloc, /* special_function */
252b5132 638 "HINT", /* name */
b34976b6 639 FALSE, /* partial_inplace */
252b5132
RH
640 0x3fff, /* src_mask */
641 0x3fff, /* dst_mask */
b34976b6 642 TRUE), /* pcrel_offset */
252b5132
RH
643
644 /* 16 bit PC relative offset. */
645 HOWTO (R_ALPHA_SREL16, /* type */
646 0, /* rightshift */
647 1, /* size (0 = byte, 1 = short, 2 = long) */
648 16, /* bitsize */
b34976b6 649 TRUE, /* pc_relative */
252b5132
RH
650 0, /* bitpos */
651 complain_overflow_signed, /* complain_on_overflow */
bc1bc43f 652 bfd_elf_generic_reloc, /* special_function */
252b5132 653 "SREL16", /* name */
b34976b6 654 FALSE, /* partial_inplace */
252b5132
RH
655 0xffff, /* src_mask */
656 0xffff, /* dst_mask */
b34976b6 657 TRUE), /* pcrel_offset */
252b5132
RH
658
659 /* 32 bit PC relative offset. */
660 HOWTO (R_ALPHA_SREL32, /* type */
661 0, /* rightshift */
662 2, /* size (0 = byte, 1 = short, 2 = long) */
663 32, /* bitsize */
b34976b6 664 TRUE, /* pc_relative */
252b5132
RH
665 0, /* bitpos */
666 complain_overflow_signed, /* complain_on_overflow */
bc1bc43f 667 bfd_elf_generic_reloc, /* special_function */
252b5132 668 "SREL32", /* name */
b34976b6 669 FALSE, /* partial_inplace */
252b5132
RH
670 0xffffffff, /* src_mask */
671 0xffffffff, /* dst_mask */
b34976b6 672 TRUE), /* pcrel_offset */
252b5132
RH
673
674 /* A 64 bit PC relative offset. */
675 HOWTO (R_ALPHA_SREL64, /* type */
676 0, /* rightshift */
677 4, /* size (0 = byte, 1 = short, 2 = long) */
678 64, /* bitsize */
b34976b6 679 TRUE, /* pc_relative */
252b5132
RH
680 0, /* bitpos */
681 complain_overflow_signed, /* complain_on_overflow */
bc1bc43f 682 bfd_elf_generic_reloc, /* special_function */
252b5132 683 "SREL64", /* name */
b34976b6 684 FALSE, /* partial_inplace */
252b5132
RH
685 MINUS_ONE, /* src_mask */
686 MINUS_ONE, /* dst_mask */
b34976b6 687 TRUE), /* pcrel_offset */
252b5132 688
dfe57ca0
RH
689 /* Skip 12 - 16; deprecated ECOFF relocs. */
690 SKIP_HOWTO (12),
691 SKIP_HOWTO (13),
692 SKIP_HOWTO (14),
693 SKIP_HOWTO (15),
694 SKIP_HOWTO (16),
252b5132
RH
695
696 /* The high 16 bits of the displacement from GP to the target. */
697 HOWTO (R_ALPHA_GPRELHIGH,
698 0, /* rightshift */
dfe57ca0 699 1, /* size (0 = byte, 1 = short, 2 = long) */
252b5132 700 16, /* bitsize */
b34976b6 701 FALSE, /* pc_relative */
252b5132
RH
702 0, /* bitpos */
703 complain_overflow_signed, /* complain_on_overflow */
bc1bc43f 704 bfd_elf_generic_reloc, /* special_function */
252b5132 705 "GPRELHIGH", /* name */
b34976b6 706 FALSE, /* partial_inplace */
252b5132
RH
707 0xffff, /* src_mask */
708 0xffff, /* dst_mask */
b34976b6 709 FALSE), /* pcrel_offset */
252b5132
RH
710
711 /* The low 16 bits of the displacement from GP to the target. */
712 HOWTO (R_ALPHA_GPRELLOW,
713 0, /* rightshift */
dfe57ca0 714 1, /* size (0 = byte, 1 = short, 2 = long) */
252b5132 715 16, /* bitsize */
b34976b6 716 FALSE, /* pc_relative */
252b5132
RH
717 0, /* bitpos */
718 complain_overflow_dont, /* complain_on_overflow */
bc1bc43f 719 bfd_elf_generic_reloc, /* special_function */
252b5132 720 "GPRELLOW", /* name */
b34976b6 721 FALSE, /* partial_inplace */
252b5132
RH
722 0xffff, /* src_mask */
723 0xffff, /* dst_mask */
b34976b6 724 FALSE), /* pcrel_offset */
252b5132
RH
725
726 /* A 16-bit displacement from the GP to the target. */
dfe57ca0 727 HOWTO (R_ALPHA_GPREL16,
252b5132 728 0, /* rightshift */
dfe57ca0 729 1, /* size (0 = byte, 1 = short, 2 = long) */
252b5132 730 16, /* bitsize */
b34976b6 731 FALSE, /* pc_relative */
252b5132
RH
732 0, /* bitpos */
733 complain_overflow_signed, /* complain_on_overflow */
bc1bc43f 734 bfd_elf_generic_reloc, /* special_function */
dfe57ca0 735 "GPREL16", /* name */
b34976b6 736 FALSE, /* partial_inplace */
252b5132
RH
737 0xffff, /* src_mask */
738 0xffff, /* dst_mask */
b34976b6 739 FALSE), /* pcrel_offset */
252b5132 740
dfe57ca0
RH
741 /* Skip 20 - 23; deprecated ECOFF relocs. */
742 SKIP_HOWTO (20),
743 SKIP_HOWTO (21),
744 SKIP_HOWTO (22),
745 SKIP_HOWTO (23),
252b5132 746
fe8bc63d 747 /* Misc ELF relocations. */
252b5132
RH
748
749 /* A dynamic relocation to copy the target into our .dynbss section. */
750 /* Not generated, as all Alpha objects use PIC, so it is not needed. It
751 is present because every other ELF has one, but should not be used
752 because .dynbss is an ugly thing. */
753 HOWTO (R_ALPHA_COPY,
754 0,
755 0,
756 0,
b34976b6 757 FALSE,
252b5132
RH
758 0,
759 complain_overflow_dont,
760 bfd_elf_generic_reloc,
761 "COPY",
b34976b6 762 FALSE,
252b5132
RH
763 0,
764 0,
b34976b6 765 TRUE),
252b5132
RH
766
767 /* A dynamic relocation for a .got entry. */
768 HOWTO (R_ALPHA_GLOB_DAT,
769 0,
770 0,
771 0,
b34976b6 772 FALSE,
252b5132
RH
773 0,
774 complain_overflow_dont,
775 bfd_elf_generic_reloc,
776 "GLOB_DAT",
b34976b6 777 FALSE,
252b5132
RH
778 0,
779 0,
b34976b6 780 TRUE),
252b5132
RH
781
782 /* A dynamic relocation for a .plt entry. */
783 HOWTO (R_ALPHA_JMP_SLOT,
784 0,
785 0,
786 0,
b34976b6 787 FALSE,
252b5132
RH
788 0,
789 complain_overflow_dont,
790 bfd_elf_generic_reloc,
791 "JMP_SLOT",
b34976b6 792 FALSE,
252b5132
RH
793 0,
794 0,
b34976b6 795 TRUE),
252b5132
RH
796
797 /* A dynamic relocation to add the base of the DSO to a 64-bit field. */
798 HOWTO (R_ALPHA_RELATIVE,
799 0,
800 0,
801 0,
b34976b6 802 FALSE,
252b5132
RH
803 0,
804 complain_overflow_dont,
805 bfd_elf_generic_reloc,
806 "RELATIVE",
b34976b6 807 FALSE,
252b5132
RH
808 0,
809 0,
b34976b6 810 TRUE),
7793f4d0
RH
811
812 /* A 21 bit branch that adjusts for gp loads. */
813 HOWTO (R_ALPHA_BRSGP, /* type */
814 2, /* rightshift */
815 2, /* size (0 = byte, 1 = short, 2 = long) */
816 21, /* bitsize */
b34976b6 817 TRUE, /* pc_relative */
7793f4d0
RH
818 0, /* bitpos */
819 complain_overflow_signed, /* complain_on_overflow */
bc1bc43f 820 bfd_elf_generic_reloc, /* special_function */
7793f4d0 821 "BRSGP", /* name */
b34976b6 822 FALSE, /* partial_inplace */
7793f4d0
RH
823 0x1fffff, /* src_mask */
824 0x1fffff, /* dst_mask */
b34976b6 825 TRUE), /* pcrel_offset */
3765b1be
RH
826
827 /* Creates a tls_index for the symbol in the got. */
828 HOWTO (R_ALPHA_TLSGD, /* type */
829 0, /* rightshift */
830 1, /* size (0 = byte, 1 = short, 2 = long) */
831 16, /* bitsize */
b34976b6 832 FALSE, /* pc_relative */
3765b1be
RH
833 0, /* bitpos */
834 complain_overflow_signed, /* complain_on_overflow */
bc1bc43f 835 bfd_elf_generic_reloc, /* special_function */
3765b1be 836 "TLSGD", /* name */
b34976b6 837 FALSE, /* partial_inplace */
3765b1be
RH
838 0xffff, /* src_mask */
839 0xffff, /* dst_mask */
b34976b6 840 FALSE), /* pcrel_offset */
3765b1be
RH
841
842 /* Creates a tls_index for the (current) module in the got. */
843 HOWTO (R_ALPHA_TLSLDM, /* type */
844 0, /* rightshift */
845 1, /* size (0 = byte, 1 = short, 2 = long) */
846 16, /* bitsize */
b34976b6 847 FALSE, /* pc_relative */
3765b1be
RH
848 0, /* bitpos */
849 complain_overflow_signed, /* complain_on_overflow */
bc1bc43f 850 bfd_elf_generic_reloc, /* special_function */
3765b1be 851 "TLSLDM", /* name */
b34976b6 852 FALSE, /* partial_inplace */
3765b1be
RH
853 0xffff, /* src_mask */
854 0xffff, /* dst_mask */
b34976b6 855 FALSE), /* pcrel_offset */
3765b1be
RH
856
857 /* A dynamic relocation for a DTP module entry. */
858 HOWTO (R_ALPHA_DTPMOD64, /* type */
859 0, /* rightshift */
860 4, /* size (0 = byte, 1 = short, 2 = long) */
861 64, /* bitsize */
b34976b6 862 FALSE, /* pc_relative */
3765b1be
RH
863 0, /* bitpos */
864 complain_overflow_bitfield, /* complain_on_overflow */
bc1bc43f 865 bfd_elf_generic_reloc, /* special_function */
3765b1be 866 "DTPMOD64", /* name */
b34976b6 867 FALSE, /* partial_inplace */
3765b1be
RH
868 MINUS_ONE, /* src_mask */
869 MINUS_ONE, /* dst_mask */
b34976b6 870 FALSE), /* pcrel_offset */
3765b1be
RH
871
872 /* Creates a 64-bit offset in the got for the displacement
873 from DTP to the target. */
874 HOWTO (R_ALPHA_GOTDTPREL, /* type */
875 0, /* rightshift */
876 1, /* size (0 = byte, 1 = short, 2 = long) */
877 16, /* bitsize */
b34976b6 878 FALSE, /* pc_relative */
3765b1be
RH
879 0, /* bitpos */
880 complain_overflow_signed, /* complain_on_overflow */
bc1bc43f 881 bfd_elf_generic_reloc, /* special_function */
3765b1be 882 "GOTDTPREL", /* name */
b34976b6 883 FALSE, /* partial_inplace */
3765b1be
RH
884 0xffff, /* src_mask */
885 0xffff, /* dst_mask */
b34976b6 886 FALSE), /* pcrel_offset */
3765b1be
RH
887
888 /* A dynamic relocation for a displacement from DTP to the target. */
889 HOWTO (R_ALPHA_DTPREL64, /* type */
890 0, /* rightshift */
891 4, /* size (0 = byte, 1 = short, 2 = long) */
892 64, /* bitsize */
b34976b6 893 FALSE, /* pc_relative */
3765b1be
RH
894 0, /* bitpos */
895 complain_overflow_bitfield, /* complain_on_overflow */
bc1bc43f 896 bfd_elf_generic_reloc, /* special_function */
3765b1be 897 "DTPREL64", /* name */
b34976b6 898 FALSE, /* partial_inplace */
3765b1be
RH
899 MINUS_ONE, /* src_mask */
900 MINUS_ONE, /* dst_mask */
b34976b6 901 FALSE), /* pcrel_offset */
3765b1be
RH
902
903 /* The high 16 bits of the displacement from DTP to the target. */
904 HOWTO (R_ALPHA_DTPRELHI, /* type */
905 0, /* rightshift */
906 1, /* size (0 = byte, 1 = short, 2 = long) */
907 16, /* bitsize */
b34976b6 908 FALSE, /* pc_relative */
3765b1be
RH
909 0, /* bitpos */
910 complain_overflow_signed, /* complain_on_overflow */
bc1bc43f 911 bfd_elf_generic_reloc, /* special_function */
3765b1be 912 "DTPRELHI", /* name */
b34976b6 913 FALSE, /* partial_inplace */
3765b1be
RH
914 0xffff, /* src_mask */
915 0xffff, /* dst_mask */
b34976b6 916 FALSE), /* pcrel_offset */
3765b1be
RH
917
918 /* The low 16 bits of the displacement from DTP to the target. */
919 HOWTO (R_ALPHA_DTPRELLO, /* type */
920 0, /* rightshift */
921 1, /* size (0 = byte, 1 = short, 2 = long) */
922 16, /* bitsize */
b34976b6 923 FALSE, /* pc_relative */
3765b1be
RH
924 0, /* bitpos */
925 complain_overflow_dont, /* complain_on_overflow */
bc1bc43f 926 bfd_elf_generic_reloc, /* special_function */
3765b1be 927 "DTPRELLO", /* name */
b34976b6 928 FALSE, /* partial_inplace */
3765b1be
RH
929 0xffff, /* src_mask */
930 0xffff, /* dst_mask */
b34976b6 931 FALSE), /* pcrel_offset */
3765b1be
RH
932
933 /* A 16-bit displacement from DTP to the target. */
934 HOWTO (R_ALPHA_DTPREL16, /* type */
935 0, /* rightshift */
936 1, /* size (0 = byte, 1 = short, 2 = long) */
937 16, /* bitsize */
b34976b6 938 FALSE, /* pc_relative */
3765b1be
RH
939 0, /* bitpos */
940 complain_overflow_signed, /* complain_on_overflow */
bc1bc43f 941 bfd_elf_generic_reloc, /* special_function */
3765b1be 942 "DTPREL16", /* name */
b34976b6 943 FALSE, /* partial_inplace */
3765b1be
RH
944 0xffff, /* src_mask */
945 0xffff, /* dst_mask */
b34976b6 946 FALSE), /* pcrel_offset */
3765b1be
RH
947
948 /* Creates a 64-bit offset in the got for the displacement
949 from TP to the target. */
950 HOWTO (R_ALPHA_GOTTPREL, /* type */
951 0, /* rightshift */
952 1, /* size (0 = byte, 1 = short, 2 = long) */
953 16, /* bitsize */
b34976b6 954 FALSE, /* pc_relative */
3765b1be
RH
955 0, /* bitpos */
956 complain_overflow_signed, /* complain_on_overflow */
bc1bc43f 957 bfd_elf_generic_reloc, /* special_function */
3765b1be 958 "GOTTPREL", /* name */
b34976b6 959 FALSE, /* partial_inplace */
3765b1be
RH
960 0xffff, /* src_mask */
961 0xffff, /* dst_mask */
b34976b6 962 FALSE), /* pcrel_offset */
3765b1be
RH
963
964 /* A dynamic relocation for a displacement from TP to the target. */
965 HOWTO (R_ALPHA_TPREL64, /* type */
966 0, /* rightshift */
967 4, /* size (0 = byte, 1 = short, 2 = long) */
968 64, /* bitsize */
b34976b6 969 FALSE, /* pc_relative */
3765b1be
RH
970 0, /* bitpos */
971 complain_overflow_bitfield, /* complain_on_overflow */
bc1bc43f 972 bfd_elf_generic_reloc, /* special_function */
3765b1be 973 "TPREL64", /* name */
b34976b6 974 FALSE, /* partial_inplace */
3765b1be
RH
975 MINUS_ONE, /* src_mask */
976 MINUS_ONE, /* dst_mask */
b34976b6 977 FALSE), /* pcrel_offset */
3765b1be
RH
978
979 /* The high 16 bits of the displacement from TP to the target. */
980 HOWTO (R_ALPHA_TPRELHI, /* type */
981 0, /* rightshift */
982 1, /* size (0 = byte, 1 = short, 2 = long) */
983 16, /* bitsize */
b34976b6 984 FALSE, /* pc_relative */
3765b1be
RH
985 0, /* bitpos */
986 complain_overflow_signed, /* complain_on_overflow */
bc1bc43f 987 bfd_elf_generic_reloc, /* special_function */
3765b1be 988 "TPRELHI", /* name */
b34976b6 989 FALSE, /* partial_inplace */
3765b1be
RH
990 0xffff, /* src_mask */
991 0xffff, /* dst_mask */
b34976b6 992 FALSE), /* pcrel_offset */
3765b1be
RH
993
994 /* The low 16 bits of the displacement from TP to the target. */
995 HOWTO (R_ALPHA_TPRELLO, /* type */
996 0, /* rightshift */
997 1, /* size (0 = byte, 1 = short, 2 = long) */
998 16, /* bitsize */
b34976b6 999 FALSE, /* pc_relative */
3765b1be
RH
1000 0, /* bitpos */
1001 complain_overflow_dont, /* complain_on_overflow */
bc1bc43f 1002 bfd_elf_generic_reloc, /* special_function */
3765b1be 1003 "TPRELLO", /* name */
b34976b6 1004 FALSE, /* partial_inplace */
3765b1be
RH
1005 0xffff, /* src_mask */
1006 0xffff, /* dst_mask */
b34976b6 1007 FALSE), /* pcrel_offset */
3765b1be
RH
1008
1009 /* A 16-bit displacement from TP to the target. */
1010 HOWTO (R_ALPHA_TPREL16, /* type */
1011 0, /* rightshift */
1012 1, /* size (0 = byte, 1 = short, 2 = long) */
1013 16, /* bitsize */
b34976b6 1014 FALSE, /* pc_relative */
3765b1be
RH
1015 0, /* bitpos */
1016 complain_overflow_signed, /* complain_on_overflow */
bc1bc43f 1017 bfd_elf_generic_reloc, /* special_function */
3765b1be 1018 "TPREL16", /* name */
b34976b6 1019 FALSE, /* partial_inplace */
3765b1be
RH
1020 0xffff, /* src_mask */
1021 0xffff, /* dst_mask */
b34976b6 1022 FALSE), /* pcrel_offset */
252b5132
RH
1023};
1024
252b5132
RH
1025/* A mapping from BFD reloc types to Alpha ELF reloc types. */
1026
1027struct elf_reloc_map
1028{
1029 bfd_reloc_code_real_type bfd_reloc_val;
1030 int elf_reloc_val;
1031};
1032
1033static const struct elf_reloc_map elf64_alpha_reloc_map[] =
1034{
dfe57ca0
RH
1035 {BFD_RELOC_NONE, R_ALPHA_NONE},
1036 {BFD_RELOC_32, R_ALPHA_REFLONG},
1037 {BFD_RELOC_64, R_ALPHA_REFQUAD},
1038 {BFD_RELOC_CTOR, R_ALPHA_REFQUAD},
1039 {BFD_RELOC_GPREL32, R_ALPHA_GPREL32},
1040 {BFD_RELOC_ALPHA_ELF_LITERAL, R_ALPHA_LITERAL},
1041 {BFD_RELOC_ALPHA_LITUSE, R_ALPHA_LITUSE},
1042 {BFD_RELOC_ALPHA_GPDISP, R_ALPHA_GPDISP},
1043 {BFD_RELOC_23_PCREL_S2, R_ALPHA_BRADDR},
1044 {BFD_RELOC_ALPHA_HINT, R_ALPHA_HINT},
1045 {BFD_RELOC_16_PCREL, R_ALPHA_SREL16},
1046 {BFD_RELOC_32_PCREL, R_ALPHA_SREL32},
1047 {BFD_RELOC_64_PCREL, R_ALPHA_SREL64},
1048 {BFD_RELOC_ALPHA_GPREL_HI16, R_ALPHA_GPRELHIGH},
1049 {BFD_RELOC_ALPHA_GPREL_LO16, R_ALPHA_GPRELLOW},
1050 {BFD_RELOC_GPREL16, R_ALPHA_GPREL16},
7793f4d0 1051 {BFD_RELOC_ALPHA_BRSGP, R_ALPHA_BRSGP},
3765b1be
RH
1052 {BFD_RELOC_ALPHA_TLSGD, R_ALPHA_TLSGD},
1053 {BFD_RELOC_ALPHA_TLSLDM, R_ALPHA_TLSLDM},
1054 {BFD_RELOC_ALPHA_DTPMOD64, R_ALPHA_DTPMOD64},
1055 {BFD_RELOC_ALPHA_GOTDTPREL16, R_ALPHA_GOTDTPREL},
1056 {BFD_RELOC_ALPHA_DTPREL64, R_ALPHA_DTPREL64},
1057 {BFD_RELOC_ALPHA_DTPREL_HI16, R_ALPHA_DTPRELHI},
1058 {BFD_RELOC_ALPHA_DTPREL_LO16, R_ALPHA_DTPRELLO},
1059 {BFD_RELOC_ALPHA_DTPREL16, R_ALPHA_DTPREL16},
1060 {BFD_RELOC_ALPHA_GOTTPREL16, R_ALPHA_GOTTPREL},
1061 {BFD_RELOC_ALPHA_TPREL64, R_ALPHA_TPREL64},
1062 {BFD_RELOC_ALPHA_TPREL_HI16, R_ALPHA_TPRELHI},
1063 {BFD_RELOC_ALPHA_TPREL_LO16, R_ALPHA_TPRELLO},
1064 {BFD_RELOC_ALPHA_TPREL16, R_ALPHA_TPREL16},
252b5132
RH
1065};
1066
1067/* Given a BFD reloc type, return a HOWTO structure. */
1068
1069static reloc_howto_type *
a7519a3c
RH
1070elf64_alpha_bfd_reloc_type_lookup (bfd *abfd ATTRIBUTE_UNUSED,
1071 bfd_reloc_code_real_type code)
252b5132
RH
1072{
1073 const struct elf_reloc_map *i, *e;
1074 i = e = elf64_alpha_reloc_map;
1075 e += sizeof (elf64_alpha_reloc_map) / sizeof (struct elf_reloc_map);
1076 for (; i != e; ++i)
1077 {
1078 if (i->bfd_reloc_val == code)
1079 return &elf64_alpha_howto_table[i->elf_reloc_val];
1080 }
1081 return 0;
1082}
1083
157090f7
AM
1084static reloc_howto_type *
1085elf64_alpha_bfd_reloc_name_lookup (bfd *abfd ATTRIBUTE_UNUSED,
1086 const char *r_name)
1087{
1088 unsigned int i;
1089
1090 for (i = 0;
1091 i < (sizeof (elf64_alpha_howto_table)
1092 / sizeof (elf64_alpha_howto_table[0]));
1093 i++)
1094 if (elf64_alpha_howto_table[i].name != NULL
1095 && strcasecmp (elf64_alpha_howto_table[i].name, r_name) == 0)
1096 return &elf64_alpha_howto_table[i];
1097
1098 return NULL;
1099}
1100
252b5132
RH
1101/* Given an Alpha ELF reloc type, fill in an arelent structure. */
1102
1103static void
a7519a3c
RH
1104elf64_alpha_info_to_howto (bfd *abfd ATTRIBUTE_UNUSED, arelent *cache_ptr,
1105 Elf_Internal_Rela *dst)
252b5132 1106{
a7519a3c 1107 unsigned r_type = ELF64_R_TYPE(dst->r_info);
252b5132
RH
1108 BFD_ASSERT (r_type < (unsigned int) R_ALPHA_max);
1109 cache_ptr->howto = &elf64_alpha_howto_table[r_type];
1110}
3765b1be
RH
1111
1112/* These two relocations create a two-word entry in the got. */
1113#define alpha_got_entry_size(r_type) \
1114 (r_type == R_ALPHA_TLSGD || r_type == R_ALPHA_TLSLDM ? 16 : 8)
9e756d64
RH
1115
1116/* This is PT_TLS segment p_vaddr. */
e1918d23
AM
1117#define alpha_get_dtprel_base(info) \
1118 (elf_hash_table (info)->tls_sec->vma)
9e756d64
RH
1119
1120/* Main program TLS (whose template starts at PT_TLS p_vaddr)
1121 is assigned offset round(16, PT_TLS p_align). */
e1918d23
AM
1122#define alpha_get_tprel_base(info) \
1123 (elf_hash_table (info)->tls_sec->vma \
1124 - align_power ((bfd_vma) 16, \
1125 elf_hash_table (info)->tls_sec->alignment_power))
252b5132 1126\f
a7519a3c
RH
1127/* Handle an Alpha specific section when reading an object file. This
1128 is called when bfd_section_from_shdr finds a section with an unknown
1129 type.
1130 FIXME: We need to handle the SHF_ALPHA_GPREL flag, but I'm not sure
1131 how to. */
252b5132 1132
a7519a3c
RH
1133static bfd_boolean
1134elf64_alpha_section_from_shdr (bfd *abfd,
1135 Elf_Internal_Shdr *hdr,
1136 const char *name,
1137 int shindex)
252b5132 1138{
a7519a3c
RH
1139 asection *newsect;
1140
1141 /* There ought to be a place to keep ELF backend specific flags, but
1142 at the moment there isn't one. We just keep track of the
1143 sections by their name, instead. Fortunately, the ABI gives
1144 suggested names for all the MIPS specific sections, so we will
1145 probably get away with this. */
1146 switch (hdr->sh_type)
1147 {
1148 case SHT_ALPHA_DEBUG:
1149 if (strcmp (name, ".mdebug") != 0)
1150 return FALSE;
1151 break;
1152 default:
1153 return FALSE;
1154 }
252b5132 1155
a7519a3c
RH
1156 if (! _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex))
1157 return FALSE;
1158 newsect = hdr->bfd_section;
252b5132 1159
a7519a3c 1160 if (hdr->sh_type == SHT_ALPHA_DEBUG)
252b5132 1161 {
a7519a3c
RH
1162 if (! bfd_set_section_flags (abfd, newsect,
1163 (bfd_get_section_flags (abfd, newsect)
1164 | SEC_DEBUGGING)))
1165 return FALSE;
252b5132 1166 }
a7519a3c
RH
1167
1168 return TRUE;
252b5132
RH
1169}
1170
a7519a3c
RH
1171/* Convert Alpha specific section flags to bfd internal section flags. */
1172
b34976b6 1173static bfd_boolean
a7519a3c 1174elf64_alpha_section_flags (flagword *flags, const Elf_Internal_Shdr *hdr)
252b5132 1175{
a7519a3c
RH
1176 if (hdr->sh_flags & SHF_ALPHA_GPREL)
1177 *flags |= SEC_SMALL_DATA;
252b5132 1178
a7519a3c
RH
1179 return TRUE;
1180}
252b5132 1181
a7519a3c
RH
1182/* Set the correct type for an Alpha ELF section. We do this by the
1183 section name, which is a hack, but ought to work. */
9e756d64 1184
a7519a3c
RH
1185static bfd_boolean
1186elf64_alpha_fake_sections (bfd *abfd, Elf_Internal_Shdr *hdr, asection *sec)
1187{
1188 register const char *name;
1189
1190 name = bfd_get_section_name (abfd, sec);
1191
1192 if (strcmp (name, ".mdebug") == 0)
252b5132 1193 {
a7519a3c
RH
1194 hdr->sh_type = SHT_ALPHA_DEBUG;
1195 /* In a shared object on Irix 5.3, the .mdebug section has an
1196 entsize of 0. FIXME: Does this matter? */
1197 if ((abfd->flags & DYNAMIC) != 0 )
1198 hdr->sh_entsize = 0;
1199 else
1200 hdr->sh_entsize = 1;
252b5132 1201 }
a7519a3c
RH
1202 else if ((sec->flags & SEC_SMALL_DATA)
1203 || strcmp (name, ".sdata") == 0
1204 || strcmp (name, ".sbss") == 0
1205 || strcmp (name, ".lit4") == 0
1206 || strcmp (name, ".lit8") == 0)
1207 hdr->sh_flags |= SHF_ALPHA_GPREL;
252b5132 1208
a7519a3c
RH
1209 return TRUE;
1210}
252b5132 1211
a7519a3c
RH
1212/* Hook called by the linker routine which adds symbols from an object
1213 file. We use it to put .comm items in .sbss, and not .bss. */
1214
1215static bfd_boolean
1216elf64_alpha_add_symbol_hook (bfd *abfd, struct bfd_link_info *info,
1217 Elf_Internal_Sym *sym,
1218 const char **namep ATTRIBUTE_UNUSED,
1219 flagword *flagsp ATTRIBUTE_UNUSED,
1220 asection **secp, bfd_vma *valp)
1221{
1222 if (sym->st_shndx == SHN_COMMON
1223 && !info->relocatable
1224 && sym->st_size <= elf_gp_size (abfd))
252b5132 1225 {
a7519a3c
RH
1226 /* Common symbols less than or equal to -G nn bytes are
1227 automatically put into .sbss. */
ffcb7aff 1228
a7519a3c 1229 asection *scomm = bfd_get_section_by_name (abfd, ".scommon");
252b5132 1230
a7519a3c 1231 if (scomm == NULL)
252b5132 1232 {
a7519a3c
RH
1233 scomm = bfd_make_section_with_flags (abfd, ".scommon",
1234 (SEC_ALLOC
1235 | SEC_IS_COMMON
1236 | SEC_LINKER_CREATED));
1237 if (scomm == NULL)
1238 return FALSE;
1239 }
ffcb7aff 1240
a7519a3c
RH
1241 *secp = scomm;
1242 *valp = sym->st_size;
1243 }
ffcb7aff 1244
a7519a3c
RH
1245 return TRUE;
1246}
252b5132 1247
a7519a3c 1248/* Create the .got section. */
252b5132 1249
a7519a3c
RH
1250static bfd_boolean
1251elf64_alpha_create_got_section (bfd *abfd,
1252 struct bfd_link_info *info ATTRIBUTE_UNUSED)
1253{
85d162e6 1254 flagword flags;
a7519a3c 1255 asection *s;
252b5132 1256
0ffa91dd
NC
1257 if (! is_alpha_elf (abfd))
1258 return FALSE;
1259
85d162e6
AM
1260 flags = (SEC_ALLOC | SEC_LOAD | SEC_HAS_CONTENTS | SEC_IN_MEMORY
1261 | SEC_LINKER_CREATED);
1262 s = bfd_make_section_anyway_with_flags (abfd, ".got", flags);
a7519a3c
RH
1263 if (s == NULL
1264 || !bfd_set_section_alignment (abfd, s, 3))
1265 return FALSE;
252b5132 1266
a7519a3c 1267 alpha_elf_tdata (abfd)->got = s;
252b5132 1268
85d162e6
AM
1269 /* Make sure the object's gotobj is set to itself so that we default
1270 to every object with its own .got. We'll merge .gots later once
1271 we've collected each object's info. */
1272 alpha_elf_tdata (abfd)->gotobj = abfd;
1273
a7519a3c
RH
1274 return TRUE;
1275}
252b5132 1276
a7519a3c 1277/* Create all the dynamic sections. */
252b5132 1278
a7519a3c
RH
1279static bfd_boolean
1280elf64_alpha_create_dynamic_sections (bfd *abfd, struct bfd_link_info *info)
1281{
1282 asection *s;
85d162e6 1283 flagword flags;
a7519a3c 1284 struct elf_link_hash_entry *h;
252b5132 1285
0ffa91dd
NC
1286 if (! is_alpha_elf (abfd))
1287 return FALSE;
1288
a7519a3c 1289 /* We need to create .plt, .rela.plt, .got, and .rela.got sections. */
252b5132 1290
85d162e6
AM
1291 flags = (SEC_ALLOC | SEC_LOAD | SEC_CODE | SEC_HAS_CONTENTS | SEC_IN_MEMORY
1292 | SEC_LINKER_CREATED
1293 | (elf64_alpha_use_secureplt ? SEC_READONLY : 0));
1294 s = bfd_make_section_anyway_with_flags (abfd, ".plt", flags);
6ec7057a 1295 if (s == NULL || ! bfd_set_section_alignment (abfd, s, 4))
a7519a3c 1296 return FALSE;
252b5132 1297
a7519a3c
RH
1298 /* Define the symbol _PROCEDURE_LINKAGE_TABLE_ at the start of the
1299 .plt section. */
7325306f
RS
1300 h = _bfd_elf_define_linkage_sym (abfd, info, s,
1301 "_PROCEDURE_LINKAGE_TABLE_");
1302 elf_hash_table (info)->hplt = h;
1303 if (h == NULL)
a7519a3c 1304 return FALSE;
d6ad34f6 1305
85d162e6
AM
1306 flags = (SEC_ALLOC | SEC_LOAD | SEC_HAS_CONTENTS | SEC_IN_MEMORY
1307 | SEC_LINKER_CREATED | SEC_READONLY);
1308 s = bfd_make_section_anyway_with_flags (abfd, ".rela.plt", flags);
6ec7057a 1309 if (s == NULL || ! bfd_set_section_alignment (abfd, s, 3))
a7519a3c 1310 return FALSE;
252b5132 1311
6ec7057a
RH
1312 if (elf64_alpha_use_secureplt)
1313 {
85d162e6
AM
1314 flags = SEC_ALLOC | SEC_LINKER_CREATED;
1315 s = bfd_make_section_anyway_with_flags (abfd, ".got.plt", flags);
6ec7057a
RH
1316 if (s == NULL || ! bfd_set_section_alignment (abfd, s, 3))
1317 return FALSE;
1318 }
1319
a7519a3c
RH
1320 /* We may or may not have created a .got section for this object, but
1321 we definitely havn't done the rest of the work. */
1cd6895c 1322
85d162e6
AM
1323 if (alpha_elf_tdata(abfd)->gotobj == NULL)
1324 {
1325 if (!elf64_alpha_create_got_section (abfd, info))
1326 return FALSE;
1327 }
1cd6895c 1328
85d162e6
AM
1329 flags = (SEC_ALLOC | SEC_LOAD | SEC_HAS_CONTENTS | SEC_IN_MEMORY
1330 | SEC_LINKER_CREATED | SEC_READONLY);
1331 s = bfd_make_section_anyway_with_flags (abfd, ".rela.got", flags);
a7519a3c
RH
1332 if (s == NULL
1333 || !bfd_set_section_alignment (abfd, s, 3))
1334 return FALSE;
252b5132 1335
a7519a3c
RH
1336 /* Define the symbol _GLOBAL_OFFSET_TABLE_ at the start of the
1337 dynobj's .got section. We don't do this in the linker script
1338 because we don't want to define the symbol if we are not creating
1339 a global offset table. */
d98685ac
AM
1340 h = _bfd_elf_define_linkage_sym (abfd, info, alpha_elf_tdata(abfd)->got,
1341 "_GLOBAL_OFFSET_TABLE_");
a7519a3c 1342 elf_hash_table (info)->hgot = h;
d98685ac
AM
1343 if (h == NULL)
1344 return FALSE;
252b5132 1345
a7519a3c 1346 return TRUE;
252b5132 1347}
a7519a3c
RH
1348\f
1349/* Read ECOFF debugging information from a .mdebug section into a
1350 ecoff_debug_info structure. */
252b5132 1351
a7519a3c
RH
1352static bfd_boolean
1353elf64_alpha_read_ecoff_info (bfd *abfd, asection *section,
1354 struct ecoff_debug_info *debug)
252b5132 1355{
a7519a3c
RH
1356 HDRR *symhdr;
1357 const struct ecoff_debug_swap *swap;
1358 char *ext_hdr = NULL;
252b5132 1359
a7519a3c
RH
1360 swap = get_elf_backend_data (abfd)->elf_backend_ecoff_debug_swap;
1361 memset (debug, 0, sizeof (*debug));
252b5132 1362
a7519a3c
RH
1363 ext_hdr = (char *) bfd_malloc (swap->external_hdr_size);
1364 if (ext_hdr == NULL && swap->external_hdr_size != 0)
1365 goto error_return;
252b5132 1366
a7519a3c
RH
1367 if (! bfd_get_section_contents (abfd, section, ext_hdr, (file_ptr) 0,
1368 swap->external_hdr_size))
1369 goto error_return;
252b5132 1370
a7519a3c
RH
1371 symhdr = &debug->symbolic_header;
1372 (*swap->swap_hdr_in) (abfd, ext_hdr, symhdr);
252b5132 1373
a7519a3c
RH
1374 /* The symbolic header contains absolute file offsets and sizes to
1375 read. */
1376#define READ(ptr, offset, count, size, type) \
1377 if (symhdr->count == 0) \
1378 debug->ptr = NULL; \
1379 else \
1380 { \
1381 bfd_size_type amt = (bfd_size_type) size * symhdr->count; \
1382 debug->ptr = (type) bfd_malloc (amt); \
1383 if (debug->ptr == NULL) \
1384 goto error_return; \
1385 if (bfd_seek (abfd, (file_ptr) symhdr->offset, SEEK_SET) != 0 \
1386 || bfd_bread (debug->ptr, amt, abfd) != amt) \
1387 goto error_return; \
1388 }
fe8bc63d 1389
a7519a3c 1390 READ (line, cbLineOffset, cbLine, sizeof (unsigned char), unsigned char *);
2c3fc389
NC
1391 READ (external_dnr, cbDnOffset, idnMax, swap->external_dnr_size, void *);
1392 READ (external_pdr, cbPdOffset, ipdMax, swap->external_pdr_size, void *);
1393 READ (external_sym, cbSymOffset, isymMax, swap->external_sym_size, void *);
1394 READ (external_opt, cbOptOffset, ioptMax, swap->external_opt_size, void *);
a7519a3c
RH
1395 READ (external_aux, cbAuxOffset, iauxMax, sizeof (union aux_ext),
1396 union aux_ext *);
1397 READ (ss, cbSsOffset, issMax, sizeof (char), char *);
1398 READ (ssext, cbSsExtOffset, issExtMax, sizeof (char), char *);
2c3fc389
NC
1399 READ (external_fdr, cbFdOffset, ifdMax, swap->external_fdr_size, void *);
1400 READ (external_rfd, cbRfdOffset, crfd, swap->external_rfd_size, void *);
1401 READ (external_ext, cbExtOffset, iextMax, swap->external_ext_size, void *);
a7519a3c 1402#undef READ
252b5132 1403
a7519a3c 1404 debug->fdr = NULL;
252b5132 1405
a7519a3c 1406 return TRUE;
252b5132 1407
a7519a3c
RH
1408 error_return:
1409 if (ext_hdr != NULL)
1410 free (ext_hdr);
1411 if (debug->line != NULL)
1412 free (debug->line);
1413 if (debug->external_dnr != NULL)
1414 free (debug->external_dnr);
1415 if (debug->external_pdr != NULL)
1416 free (debug->external_pdr);
1417 if (debug->external_sym != NULL)
1418 free (debug->external_sym);
1419 if (debug->external_opt != NULL)
1420 free (debug->external_opt);
1421 if (debug->external_aux != NULL)
1422 free (debug->external_aux);
1423 if (debug->ss != NULL)
1424 free (debug->ss);
1425 if (debug->ssext != NULL)
1426 free (debug->ssext);
1427 if (debug->external_fdr != NULL)
1428 free (debug->external_fdr);
1429 if (debug->external_rfd != NULL)
1430 free (debug->external_rfd);
1431 if (debug->external_ext != NULL)
1432 free (debug->external_ext);
1433 return FALSE;
252b5132
RH
1434}
1435
a7519a3c
RH
1436/* Alpha ELF local labels start with '$'. */
1437
b34976b6 1438static bfd_boolean
a7519a3c 1439elf64_alpha_is_local_label_name (bfd *abfd ATTRIBUTE_UNUSED, const char *name)
252b5132 1440{
a7519a3c
RH
1441 return name[0] == '$';
1442}
9e756d64 1443
a7519a3c
RH
1444static bfd_boolean
1445elf64_alpha_find_nearest_line (bfd *abfd, asection *section, asymbol **symbols,
1446 bfd_vma offset, const char **filename_ptr,
1447 const char **functionname_ptr,
1448 unsigned int *line_ptr)
1449{
1450 asection *msec;
252b5132 1451
fc28f9aa
TG
1452 if (_bfd_dwarf2_find_nearest_line (abfd, dwarf_debug_sections,
1453 section, symbols, offset,
a7519a3c 1454 filename_ptr, functionname_ptr,
9b8d1a36 1455 line_ptr, NULL, 0,
a7519a3c 1456 &elf_tdata (abfd)->dwarf2_find_line_info))
b34976b6 1457 return TRUE;
9e756d64 1458
a7519a3c
RH
1459 msec = bfd_get_section_by_name (abfd, ".mdebug");
1460 if (msec != NULL)
1bbc9cec 1461 {
a7519a3c 1462 flagword origflags;
698600e4 1463 struct alpha_elf_find_line *fi;
a7519a3c
RH
1464 const struct ecoff_debug_swap * const swap =
1465 get_elf_backend_data (abfd)->elf_backend_ecoff_debug_swap;
252b5132 1466
a7519a3c
RH
1467 /* If we are called during a link, alpha_elf_final_link may have
1468 cleared the SEC_HAS_CONTENTS field. We force it back on here
1469 if appropriate (which it normally will be). */
1470 origflags = msec->flags;
1471 if (elf_section_data (msec)->this_hdr.sh_type != SHT_NOBITS)
1472 msec->flags |= SEC_HAS_CONTENTS;
9e756d64 1473
698600e4 1474 fi = alpha_elf_tdata (abfd)->find_line_info;
a7519a3c
RH
1475 if (fi == NULL)
1476 {
1477 bfd_size_type external_fdr_size;
1478 char *fraw_src;
1479 char *fraw_end;
1480 struct fdr *fdr_ptr;
698600e4 1481 bfd_size_type amt = sizeof (struct alpha_elf_find_line);
9e756d64 1482
698600e4 1483 fi = (struct alpha_elf_find_line *) bfd_zalloc (abfd, amt);
a7519a3c
RH
1484 if (fi == NULL)
1485 {
1486 msec->flags = origflags;
1487 return FALSE;
1488 }
9e756d64 1489
a7519a3c
RH
1490 if (!elf64_alpha_read_ecoff_info (abfd, msec, &fi->d))
1491 {
1492 msec->flags = origflags;
1493 return FALSE;
1494 }
9e756d64 1495
a7519a3c
RH
1496 /* Swap in the FDR information. */
1497 amt = fi->d.symbolic_header.ifdMax * sizeof (struct fdr);
1498 fi->d.fdr = (struct fdr *) bfd_alloc (abfd, amt);
1499 if (fi->d.fdr == NULL)
1500 {
1501 msec->flags = origflags;
1502 return FALSE;
1503 }
1504 external_fdr_size = swap->external_fdr_size;
1505 fdr_ptr = fi->d.fdr;
1506 fraw_src = (char *) fi->d.external_fdr;
1507 fraw_end = (fraw_src
1508 + fi->d.symbolic_header.ifdMax * external_fdr_size);
1509 for (; fraw_src < fraw_end; fraw_src += external_fdr_size, fdr_ptr++)
2c3fc389 1510 (*swap->swap_fdr_in) (abfd, fraw_src, fdr_ptr);
9e756d64 1511
698600e4 1512 alpha_elf_tdata (abfd)->find_line_info = fi;
9e756d64 1513
a7519a3c
RH
1514 /* Note that we don't bother to ever free this information.
1515 find_nearest_line is either called all the time, as in
1516 objdump -l, so the information should be saved, or it is
1517 rarely called, as in ld error messages, so the memory
1518 wasted is unimportant. Still, it would probably be a
1519 good idea for free_cached_info to throw it away. */
1520 }
9e756d64 1521
a7519a3c
RH
1522 if (_bfd_ecoff_locate_line (abfd, section, offset, &fi->d, swap,
1523 &fi->i, filename_ptr, functionname_ptr,
1524 line_ptr))
1525 {
1526 msec->flags = origflags;
1527 return TRUE;
1528 }
9e756d64 1529
a7519a3c 1530 msec->flags = origflags;
9e756d64 1531 }
9e756d64 1532
a7519a3c 1533 /* Fall back on the generic ELF find_nearest_line routine. */
9e756d64 1534
a7519a3c
RH
1535 return _bfd_elf_find_nearest_line (abfd, section, symbols, offset,
1536 filename_ptr, functionname_ptr,
1537 line_ptr);
9e756d64 1538}
a7519a3c
RH
1539\f
1540/* Structure used to pass information to alpha_elf_output_extsym. */
9e756d64 1541
a7519a3c 1542struct extsym_info
9e756d64 1543{
a7519a3c
RH
1544 bfd *abfd;
1545 struct bfd_link_info *info;
1546 struct ecoff_debug_info *debug;
1547 const struct ecoff_debug_swap *swap;
1548 bfd_boolean failed;
1549};
9e756d64 1550
a7519a3c 1551static bfd_boolean
2c3fc389 1552elf64_alpha_output_extsym (struct alpha_elf_link_hash_entry *h, void * data)
a7519a3c
RH
1553{
1554 struct extsym_info *einfo = (struct extsym_info *) data;
1555 bfd_boolean strip;
1556 asection *sec, *output_section;
9e756d64 1557
a7519a3c
RH
1558 if (h->root.indx == -2)
1559 strip = FALSE;
1560 else if ((h->root.def_dynamic
1561 || h->root.ref_dynamic
1562 || h->root.root.type == bfd_link_hash_new)
1563 && !h->root.def_regular
1564 && !h->root.ref_regular)
1565 strip = TRUE;
1566 else if (einfo->info->strip == strip_all
1567 || (einfo->info->strip == strip_some
1568 && bfd_hash_lookup (einfo->info->keep_hash,
1569 h->root.root.root.string,
1570 FALSE, FALSE) == NULL))
1571 strip = TRUE;
1572 else
1573 strip = FALSE;
9e756d64 1574
a7519a3c 1575 if (strip)
b34976b6 1576 return TRUE;
9e756d64 1577
a7519a3c 1578 if (h->esym.ifd == -2)
9e756d64 1579 {
a7519a3c
RH
1580 h->esym.jmptbl = 0;
1581 h->esym.cobol_main = 0;
1582 h->esym.weakext = 0;
1583 h->esym.reserved = 0;
1584 h->esym.ifd = ifdNil;
1585 h->esym.asym.value = 0;
1586 h->esym.asym.st = stGlobal;
9e756d64 1587
a7519a3c
RH
1588 if (h->root.root.type != bfd_link_hash_defined
1589 && h->root.root.type != bfd_link_hash_defweak)
1590 h->esym.asym.sc = scAbs;
1591 else
1592 {
1593 const char *name;
9e756d64 1594
a7519a3c
RH
1595 sec = h->root.root.u.def.section;
1596 output_section = sec->output_section;
9e756d64 1597
a7519a3c
RH
1598 /* When making a shared library and symbol h is the one from
1599 the another shared library, OUTPUT_SECTION may be null. */
1600 if (output_section == NULL)
1601 h->esym.asym.sc = scUndefined;
1602 else
1603 {
1604 name = bfd_section_name (output_section->owner, output_section);
9e756d64 1605
a7519a3c
RH
1606 if (strcmp (name, ".text") == 0)
1607 h->esym.asym.sc = scText;
1608 else if (strcmp (name, ".data") == 0)
1609 h->esym.asym.sc = scData;
1610 else if (strcmp (name, ".sdata") == 0)
1611 h->esym.asym.sc = scSData;
1612 else if (strcmp (name, ".rodata") == 0
1613 || strcmp (name, ".rdata") == 0)
1614 h->esym.asym.sc = scRData;
1615 else if (strcmp (name, ".bss") == 0)
1616 h->esym.asym.sc = scBss;
1617 else if (strcmp (name, ".sbss") == 0)
1618 h->esym.asym.sc = scSBss;
1619 else if (strcmp (name, ".init") == 0)
1620 h->esym.asym.sc = scInit;
1621 else if (strcmp (name, ".fini") == 0)
1622 h->esym.asym.sc = scFini;
1623 else
1624 h->esym.asym.sc = scAbs;
1625 }
1626 }
9e756d64 1627
a7519a3c
RH
1628 h->esym.asym.reserved = 0;
1629 h->esym.asym.index = indexNil;
1630 }
9e756d64 1631
a7519a3c
RH
1632 if (h->root.root.type == bfd_link_hash_common)
1633 h->esym.asym.value = h->root.root.u.c.size;
1634 else if (h->root.root.type == bfd_link_hash_defined
1635 || h->root.root.type == bfd_link_hash_defweak)
1636 {
1637 if (h->esym.asym.sc == scCommon)
1638 h->esym.asym.sc = scBss;
1639 else if (h->esym.asym.sc == scSCommon)
1640 h->esym.asym.sc = scSBss;
9e756d64 1641
a7519a3c
RH
1642 sec = h->root.root.u.def.section;
1643 output_section = sec->output_section;
1644 if (output_section != NULL)
1645 h->esym.asym.value = (h->root.root.u.def.value
1646 + sec->output_offset
1647 + output_section->vma);
1648 else
1649 h->esym.asym.value = 0;
1650 }
9e756d64 1651
a7519a3c
RH
1652 if (! bfd_ecoff_debug_one_external (einfo->abfd, einfo->debug, einfo->swap,
1653 h->root.root.root.string,
1654 &h->esym))
1655 {
1656 einfo->failed = TRUE;
1657 return FALSE;
9e756d64
RH
1658 }
1659
a7519a3c
RH
1660 return TRUE;
1661}
1662\f
1663/* Search for and possibly create a got entry. */
9e756d64 1664
a7519a3c
RH
1665static struct alpha_elf_got_entry *
1666get_got_entry (bfd *abfd, struct alpha_elf_link_hash_entry *h,
1667 unsigned long r_type, unsigned long r_symndx,
1668 bfd_vma r_addend)
1669{
1670 struct alpha_elf_got_entry *gotent;
1671 struct alpha_elf_got_entry **slot;
9e756d64 1672
a7519a3c
RH
1673 if (h)
1674 slot = &h->got_entries;
1675 else
1676 {
1677 /* This is a local .got entry -- record for merge. */
9e756d64 1678
a7519a3c 1679 struct alpha_elf_got_entry **local_got_entries;
9e756d64 1680
a7519a3c
RH
1681 local_got_entries = alpha_elf_tdata(abfd)->local_got_entries;
1682 if (!local_got_entries)
1683 {
1684 bfd_size_type size;
1685 Elf_Internal_Shdr *symtab_hdr;
9e756d64 1686
a7519a3c
RH
1687 symtab_hdr = &elf_tdata(abfd)->symtab_hdr;
1688 size = symtab_hdr->sh_info;
1689 size *= sizeof (struct alpha_elf_got_entry *);
9e756d64 1690
a7519a3c
RH
1691 local_got_entries
1692 = (struct alpha_elf_got_entry **) bfd_zalloc (abfd, size);
1693 if (!local_got_entries)
1694 return NULL;
1695
1696 alpha_elf_tdata (abfd)->local_got_entries = local_got_entries;
1697 }
1698
1699 slot = &local_got_entries[r_symndx];
9e756d64
RH
1700 }
1701
a7519a3c
RH
1702 for (gotent = *slot; gotent ; gotent = gotent->next)
1703 if (gotent->gotobj == abfd
1704 && gotent->reloc_type == r_type
1705 && gotent->addend == r_addend)
1706 break;
1707
1708 if (!gotent)
9e756d64 1709 {
a7519a3c
RH
1710 int entry_size;
1711 bfd_size_type amt;
9e756d64 1712
a7519a3c
RH
1713 amt = sizeof (struct alpha_elf_got_entry);
1714 gotent = (struct alpha_elf_got_entry *) bfd_alloc (abfd, amt);
1715 if (!gotent)
1716 return NULL;
9e756d64 1717
a7519a3c
RH
1718 gotent->gotobj = abfd;
1719 gotent->addend = r_addend;
1720 gotent->got_offset = -1;
6ec7057a 1721 gotent->plt_offset = -1;
a7519a3c
RH
1722 gotent->use_count = 1;
1723 gotent->reloc_type = r_type;
1724 gotent->reloc_done = 0;
1725 gotent->reloc_xlated = 0;
9e756d64 1726
a7519a3c
RH
1727 gotent->next = *slot;
1728 *slot = gotent;
9e756d64 1729
a7519a3c
RH
1730 entry_size = alpha_got_entry_size (r_type);
1731 alpha_elf_tdata (abfd)->total_got_size += entry_size;
1732 if (!h)
1733 alpha_elf_tdata(abfd)->local_got_size += entry_size;
9e756d64 1734 }
a7519a3c
RH
1735 else
1736 gotent->use_count += 1;
9e756d64 1737
a7519a3c 1738 return gotent;
9e756d64
RH
1739}
1740
6ec7057a
RH
1741static bfd_boolean
1742elf64_alpha_want_plt (struct alpha_elf_link_hash_entry *ah)
1743{
1744 return ((ah->root.type == STT_FUNC
1745 || ah->root.root.type == bfd_link_hash_undefweak
1746 || ah->root.root.type == bfd_link_hash_undefined)
8288a39e
RH
1747 && (ah->flags & ALPHA_ELF_LINK_HASH_LU_PLT) != 0
1748 && (ah->flags & ~ALPHA_ELF_LINK_HASH_LU_PLT) == 0);
6ec7057a
RH
1749}
1750
a7519a3c
RH
1751/* Handle dynamic relocations when doing an Alpha ELF link. */
1752
b34976b6 1753static bfd_boolean
a7519a3c
RH
1754elf64_alpha_check_relocs (bfd *abfd, struct bfd_link_info *info,
1755 asection *sec, const Elf_Internal_Rela *relocs)
252b5132 1756{
a7519a3c
RH
1757 bfd *dynobj;
1758 asection *sreloc;
252b5132 1759 Elf_Internal_Shdr *symtab_hdr;
a7519a3c
RH
1760 struct alpha_elf_link_hash_entry **sym_hashes;
1761 const Elf_Internal_Rela *rel, *relend;
a7519a3c 1762 bfd_size_type amt;
252b5132 1763
a7519a3c
RH
1764 if (info->relocatable)
1765 return TRUE;
252b5132 1766
a7519a3c
RH
1767 /* Don't do anything special with non-loaded, non-alloced sections.
1768 In particular, any relocs in such sections should not affect GOT
1769 and PLT reference counting (ie. we don't allow them to create GOT
1770 or PLT entries), there's no possibility or desire to optimize TLS
1771 relocs, and there's not much point in propagating relocs to shared
1772 libs that the dynamic linker won't relocate. */
1773 if ((sec->flags & SEC_ALLOC) == 0)
b34976b6 1774 return TRUE;
252b5132 1775
0ffa91dd
NC
1776 BFD_ASSERT (is_alpha_elf (abfd));
1777
1778 dynobj = elf_hash_table (info)->dynobj;
a7519a3c 1779 if (dynobj == NULL)
0ffa91dd 1780 elf_hash_table (info)->dynobj = dynobj = abfd;
252b5132 1781
a7519a3c 1782 sreloc = NULL;
0ffa91dd
NC
1783 symtab_hdr = &elf_symtab_hdr (abfd);
1784 sym_hashes = alpha_elf_sym_hashes (abfd);
a7519a3c
RH
1785
1786 relend = relocs + sec->reloc_count;
1787 for (rel = relocs; rel < relend; ++rel)
1788 {
1789 enum {
1790 NEED_GOT = 1,
1791 NEED_GOT_ENTRY = 2,
1792 NEED_DYNREL = 4
1793 };
1794
1795 unsigned long r_symndx, r_type;
1796 struct alpha_elf_link_hash_entry *h;
1797 unsigned int gotent_flags;
1798 bfd_boolean maybe_dynamic;
1799 unsigned int need;
1800 bfd_vma addend;
1801
1802 r_symndx = ELF64_R_SYM (rel->r_info);
1803 if (r_symndx < symtab_hdr->sh_info)
1804 h = NULL;
1805 else
1806 {
1807 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
252b5132 1808
a7519a3c
RH
1809 while (h->root.root.type == bfd_link_hash_indirect
1810 || h->root.root.type == bfd_link_hash_warning)
1811 h = (struct alpha_elf_link_hash_entry *)h->root.root.u.i.link;
252b5132 1812
81fbe831
AM
1813 /* PR15323, ref flags aren't set for references in the same
1814 object. */
1815 h->root.root.non_ir_ref = 1;
a7519a3c
RH
1816 h->root.ref_regular = 1;
1817 }
252b5132 1818
a7519a3c
RH
1819 /* We can only get preliminary data on whether a symbol is
1820 locally or externally defined, as not all of the input files
1821 have yet been processed. Do something with what we know, as
1822 this may help reduce memory usage and processing time later. */
1823 maybe_dynamic = FALSE;
1824 if (h && ((info->shared
1825 && (!info->symbolic
1826 || info->unresolved_syms_in_shared_libs == RM_IGNORE))
1827 || !h->root.def_regular
1828 || h->root.root.type == bfd_link_hash_defweak))
1829 maybe_dynamic = TRUE;
252b5132 1830
a7519a3c
RH
1831 need = 0;
1832 gotent_flags = 0;
1833 r_type = ELF64_R_TYPE (rel->r_info);
1834 addend = rel->r_addend;
9e756d64 1835
9e756d64
RH
1836 switch (r_type)
1837 {
1838 case R_ALPHA_LITERAL:
a7519a3c
RH
1839 need = NEED_GOT | NEED_GOT_ENTRY;
1840
1841 /* Remember how this literal is used from its LITUSEs.
1842 This will be important when it comes to decide if we can
1843 create a .plt entry for a function symbol. */
1844 while (++rel < relend && ELF64_R_TYPE (rel->r_info) == R_ALPHA_LITUSE)
8288a39e 1845 if (rel->r_addend >= 1 && rel->r_addend <= 6)
a7519a3c
RH
1846 gotent_flags |= 1 << rel->r_addend;
1847 --rel;
1848
1849 /* No LITUSEs -- presumably the address is used somehow. */
1850 if (gotent_flags == 0)
1851 gotent_flags = ALPHA_ELF_LINK_HASH_LU_ADDR;
1852 break;
1853
1854 case R_ALPHA_GPDISP:
1855 case R_ALPHA_GPREL16:
1856 case R_ALPHA_GPREL32:
9e756d64
RH
1857 case R_ALPHA_GPRELHIGH:
1858 case R_ALPHA_GPRELLOW:
a7519a3c
RH
1859 case R_ALPHA_BRSGP:
1860 need = NEED_GOT;
1861 break;
1862
1863 case R_ALPHA_REFLONG:
1864 case R_ALPHA_REFQUAD:
1865 if (info->shared || maybe_dynamic)
1866 need = NEED_DYNREL;
cc03ec80
RH
1867 break;
1868
9e756d64 1869 case R_ALPHA_TLSLDM:
cc03ec80 1870 /* The symbol for a TLSLDM reloc is ignored. Collapse the
cf35638d
TS
1871 reloc to the STN_UNDEF (0) symbol so that they all match. */
1872 r_symndx = STN_UNDEF;
a7519a3c
RH
1873 h = 0;
1874 maybe_dynamic = FALSE;
1875 /* FALLTHRU */
1876
1877 case R_ALPHA_TLSGD:
1878 case R_ALPHA_GOTDTPREL:
1879 need = NEED_GOT | NEED_GOT_ENTRY;
9e756d64 1880 break;
cc03ec80 1881
a7519a3c
RH
1882 case R_ALPHA_GOTTPREL:
1883 need = NEED_GOT | NEED_GOT_ENTRY;
1884 gotent_flags = ALPHA_ELF_LINK_HASH_TLS_IE;
1885 if (info->shared)
1886 info->flags |= DF_STATIC_TLS;
1887 break;
1888
1889 case R_ALPHA_TPREL64:
e366eeae
RH
1890 if (info->shared && !info->pie)
1891 {
1892 info->flags |= DF_STATIC_TLS;
1893 need = NEED_DYNREL;
1894 }
1895 else if (maybe_dynamic)
a7519a3c 1896 need = NEED_DYNREL;
a7519a3c 1897 break;
252b5132
RH
1898 }
1899
a7519a3c 1900 if (need & NEED_GOT)
252b5132 1901 {
85d162e6 1902 if (alpha_elf_tdata(abfd)->gotobj == NULL)
6cdc0ccc 1903 {
a7519a3c
RH
1904 if (!elf64_alpha_create_got_section (abfd, info))
1905 return FALSE;
c328dc3f 1906 }
252b5132 1907 }
252b5132 1908
a7519a3c
RH
1909 if (need & NEED_GOT_ENTRY)
1910 {
1911 struct alpha_elf_got_entry *gotent;
252b5132 1912
a7519a3c
RH
1913 gotent = get_got_entry (abfd, h, r_type, r_symndx, addend);
1914 if (!gotent)
1915 return FALSE;
4a67a098 1916
a7519a3c 1917 if (gotent_flags)
cc03ec80 1918 {
a7519a3c
RH
1919 gotent->flags |= gotent_flags;
1920 if (h)
1921 {
1922 gotent_flags |= h->flags;
1923 h->flags = gotent_flags;
4a67a098 1924
a7519a3c 1925 /* Make a guess as to whether a .plt entry is needed. */
6ec7057a
RH
1926 /* ??? It appears that we won't make it into
1927 adjust_dynamic_symbol for symbols that remain
1928 totally undefined. Copying this check here means
1929 we can create a plt entry for them too. */
1930 h->root.needs_plt
1931 = (maybe_dynamic && elf64_alpha_want_plt (h));
1932 }
a7519a3c 1933 }
252b5132
RH
1934 }
1935
a7519a3c 1936 if (need & NEED_DYNREL)
9e756d64 1937 {
a7519a3c
RH
1938 /* We need to create the section here now whether we eventually
1939 use it or not so that it gets mapped to an output section by
83bac4b0 1940 the linker. If not used, we'll kill it in size_dynamic_sections. */
a7519a3c 1941 if (sreloc == NULL)
9e756d64 1942 {
83bac4b0
NC
1943 sreloc = _bfd_elf_make_dynamic_reloc_section
1944 (sec, dynobj, 3, abfd, /*rela?*/ TRUE);
1945
a7519a3c 1946 if (sreloc == NULL)
83bac4b0 1947 return FALSE;
9e756d64 1948 }
252b5132 1949
a7519a3c
RH
1950 if (h)
1951 {
1952 /* Since we havn't seen all of the input symbols yet, we
1953 don't know whether we'll actually need a dynamic relocation
1954 entry for this reloc. So make a record of it. Once we
1955 find out if this thing needs dynamic relocation we'll
1956 expand the relocation sections by the appropriate amount. */
9e756d64 1957
a7519a3c 1958 struct alpha_elf_reloc_entry *rent;
9e756d64 1959
a7519a3c
RH
1960 for (rent = h->reloc_entries; rent; rent = rent->next)
1961 if (rent->rtype == r_type && rent->srel == sreloc)
1962 break;
252b5132 1963
a7519a3c
RH
1964 if (!rent)
1965 {
1966 amt = sizeof (struct alpha_elf_reloc_entry);
1967 rent = (struct alpha_elf_reloc_entry *) bfd_alloc (abfd, amt);
1968 if (!rent)
1969 return FALSE;
252b5132 1970
a7519a3c
RH
1971 rent->srel = sreloc;
1972 rent->rtype = r_type;
1973 rent->count = 1;
1974 rent->reltext = (sec->flags & SEC_READONLY) != 0;
252b5132 1975
a7519a3c
RH
1976 rent->next = h->reloc_entries;
1977 h->reloc_entries = rent;
1978 }
1979 else
1980 rent->count++;
1981 }
1982 else if (info->shared)
1983 {
1984 /* If this is a shared library, and the section is to be
1985 loaded into memory, we need a RELATIVE reloc. */
1986 sreloc->size += sizeof (Elf64_External_Rela);
1987 if (sec->flags & SEC_READONLY)
1988 info->flags |= DF_TEXTREL;
1989 }
252b5132
RH
1990 }
1991 }
1992
b34976b6 1993 return TRUE;
252b5132 1994}
252b5132 1995
e117360e
RH
1996/* Return the section that should be marked against GC for a given
1997 relocation. */
1998
1999static asection *
2000elf64_alpha_gc_mark_hook (asection *sec, struct bfd_link_info *info,
2001 Elf_Internal_Rela *rel,
2002 struct elf_link_hash_entry *h, Elf_Internal_Sym *sym)
2003{
2004 /* These relocations don't really reference a symbol. Instead we store
2005 extra data in their addend slot. Ignore the symbol. */
2006 switch (ELF64_R_TYPE (rel->r_info))
2007 {
2008 case R_ALPHA_LITUSE:
2009 case R_ALPHA_GPDISP:
2010 case R_ALPHA_HINT:
2011 return NULL;
2012 }
2013
2014 return _bfd_elf_gc_mark_hook (sec, info, rel, h, sym);
2015}
2016
2017/* Update the got entry reference counts for the section being removed. */
2018
2019static bfd_boolean
2020elf64_alpha_gc_sweep_hook (bfd *abfd, struct bfd_link_info *info,
2021 asection *sec, const Elf_Internal_Rela *relocs)
2022{
2023 Elf_Internal_Shdr *symtab_hdr;
2024 struct alpha_elf_link_hash_entry **sym_hashes;
2025 const Elf_Internal_Rela *rel, *relend;
2026
2027 if (info->relocatable)
2028 return TRUE;
2029
2030 symtab_hdr = &elf_symtab_hdr (abfd);
2031 sym_hashes = alpha_elf_sym_hashes (abfd);
2032
2033 relend = relocs + sec->reloc_count;
2034 for (rel = relocs; rel < relend; rel++)
2035 {
2036 unsigned long r_symndx, r_type;
2037 struct alpha_elf_link_hash_entry *h = NULL;
2038 struct alpha_elf_got_entry *gotent;
2039
2040 r_symndx = ELF64_R_SYM (rel->r_info);
2041 if (r_symndx >= symtab_hdr->sh_info)
2042 {
2043 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
2044 while (h->root.root.type == bfd_link_hash_indirect
2045 || h->root.root.type == bfd_link_hash_warning)
2046 h = (struct alpha_elf_link_hash_entry *) h->root.root.u.i.link;
2047 }
2048
2049 r_type = ELF64_R_TYPE (rel->r_info);
2050 switch (r_type)
2051 {
2052 case R_ALPHA_LITERAL:
2053 /* ??? Ignore re-computation of gotent_flags. We're not
2054 carrying a use-count for each bit in that mask. */
2055
2056 case R_ALPHA_TLSGD:
2057 case R_ALPHA_GOTDTPREL:
2058 case R_ALPHA_GOTTPREL:
2059 /* Fetch the got entry from the tables. */
2060 gotent = get_got_entry (abfd, h, r_type, r_symndx, rel->r_addend);
2061
2062 /* The got entry *must* exist, since we should have created it
2063 before during check_relocs. Also note that get_got_entry
2064 assumed this was going to be another use, and so incremented
2065 the use count again. Thus the use count must be at least the
2066 one real use and the "use" we just added. */
2067 if (gotent == NULL || gotent->use_count < 2)
2068 {
2069 abort ();
2070 return FALSE;
2071 }
2072 gotent->use_count -= 2;
2073 break;
2074
2075 default:
2076 break;
2077 }
2078 }
2079
2080 return TRUE;
2081}
2082
a7519a3c
RH
2083/* Adjust a symbol defined by a dynamic object and referenced by a
2084 regular object. The current definition is in some section of the
2085 dynamic object, but we're not including those sections. We have to
2086 change the definition to something the rest of the link can
2087 understand. */
252b5132 2088
b34976b6 2089static bfd_boolean
a7519a3c
RH
2090elf64_alpha_adjust_dynamic_symbol (struct bfd_link_info *info,
2091 struct elf_link_hash_entry *h)
252b5132 2092{
a7519a3c
RH
2093 bfd *dynobj;
2094 asection *s;
2095 struct alpha_elf_link_hash_entry *ah;
252b5132 2096
a7519a3c
RH
2097 dynobj = elf_hash_table(info)->dynobj;
2098 ah = (struct alpha_elf_link_hash_entry *)h;
252b5132 2099
a7519a3c 2100 /* Now that we've seen all of the input symbols, finalize our decision
6ec7057a
RH
2101 about whether this symbol should get a .plt entry. Irritatingly, it
2102 is common for folk to leave undefined symbols in shared libraries,
2103 and they still expect lazy binding; accept undefined symbols in lieu
2104 of STT_FUNC. */
2105 if (alpha_elf_dynamic_symbol_p (h, info) && elf64_alpha_want_plt (ah))
252b5132 2106 {
6ec7057a 2107 h->needs_plt = TRUE;
252b5132 2108
3d4d4302 2109 s = bfd_get_linker_section (dynobj, ".plt");
a7519a3c
RH
2110 if (!s && !elf64_alpha_create_dynamic_sections (dynobj, info))
2111 return FALSE;
204692d7 2112
6ec7057a
RH
2113 /* We need one plt entry per got subsection. Delay allocation of
2114 the actual plt entries until size_plt_section, called from
2115 size_dynamic_sections or during relaxation. */
252b5132 2116
a7519a3c
RH
2117 return TRUE;
2118 }
2119 else
6ec7057a 2120 h->needs_plt = FALSE;
252b5132 2121
a7519a3c
RH
2122 /* If this is a weak symbol, and there is a real definition, the
2123 processor independent code will have arranged for us to see the
2124 real definition first, and we can just use the same value. */
2125 if (h->u.weakdef != NULL)
252b5132 2126 {
a7519a3c
RH
2127 BFD_ASSERT (h->u.weakdef->root.type == bfd_link_hash_defined
2128 || h->u.weakdef->root.type == bfd_link_hash_defweak);
2129 h->root.u.def.section = h->u.weakdef->root.u.def.section;
2130 h->root.u.def.value = h->u.weakdef->root.u.def.value;
2131 return TRUE;
252b5132 2132 }
a7519a3c
RH
2133
2134 /* This is a reference to a symbol defined by a dynamic object which
2135 is not a function. The Alpha, since it uses .got entries for all
2136 symbols even in regular objects, does not need the hackery of a
2137 .dynbss section and COPY dynamic relocations. */
252b5132 2138
b34976b6 2139 return TRUE;
252b5132
RH
2140}
2141
747ffa7b
AM
2142/* Record STO_ALPHA_NOPV and STO_ALPHA_STD_GPLOAD. */
2143
2144static void
2145elf64_alpha_merge_symbol_attribute (struct elf_link_hash_entry *h,
2146 const Elf_Internal_Sym *isym,
2147 bfd_boolean definition,
2148 bfd_boolean dynamic)
2149{
2150 if (!dynamic && definition)
2151 h->other = ((h->other & ELF_ST_VISIBILITY (-1))
2152 | (isym->st_other & ~ELF_ST_VISIBILITY (-1)));
2153}
2154
a7519a3c
RH
2155/* Symbol versioning can create new symbols, and make our old symbols
2156 indirect to the new ones. Consolidate the got and reloc information
2157 in these situations. */
252b5132 2158
48f4b4f5
RH
2159static void
2160elf64_alpha_copy_indirect_symbol (struct bfd_link_info *info,
2161 struct elf_link_hash_entry *dir,
2162 struct elf_link_hash_entry *ind)
252b5132 2163{
48f4b4f5
RH
2164 struct alpha_elf_link_hash_entry *hi
2165 = (struct alpha_elf_link_hash_entry *) ind;
2166 struct alpha_elf_link_hash_entry *hs
2167 = (struct alpha_elf_link_hash_entry *) dir;
252b5132 2168
48f4b4f5
RH
2169 /* Do the merging in the superclass. */
2170 _bfd_elf_link_hash_copy_indirect(info, dir, ind);
252b5132 2171
a7519a3c 2172 /* Merge the flags. Whee. */
a7519a3c
RH
2173 hs->flags |= hi->flags;
2174
48f4b4f5
RH
2175 /* ??? It's unclear to me what's really supposed to happen when
2176 "merging" defweak and defined symbols, given that we don't
2177 actually throw away the defweak. This more-or-less copies
2178 the logic related to got and plt entries in the superclass. */
2179 if (ind->root.type != bfd_link_hash_indirect)
2180 return;
2181
a7519a3c
RH
2182 /* Merge the .got entries. Cannibalize the old symbol's list in
2183 doing so, since we don't need it anymore. */
2184
2185 if (hs->got_entries == NULL)
2186 hs->got_entries = hi->got_entries;
2187 else
2188 {
2189 struct alpha_elf_got_entry *gi, *gs, *gin, *gsh;
2190
2191 gsh = hs->got_entries;
2192 for (gi = hi->got_entries; gi ; gi = gin)
252b5132 2193 {
a7519a3c
RH
2194 gin = gi->next;
2195 for (gs = gsh; gs ; gs = gs->next)
2196 if (gi->gotobj == gs->gotobj
2197 && gi->reloc_type == gs->reloc_type
2198 && gi->addend == gs->addend)
2199 {
2200 gi->use_count += gs->use_count;
2201 goto got_found;
2202 }
2203 gi->next = hs->got_entries;
2204 hs->got_entries = gi;
2205 got_found:;
252b5132 2206 }
a7519a3c
RH
2207 }
2208 hi->got_entries = NULL;
252b5132 2209
a7519a3c
RH
2210 /* And similar for the reloc entries. */
2211
2212 if (hs->reloc_entries == NULL)
2213 hs->reloc_entries = hi->reloc_entries;
2214 else
2215 {
2216 struct alpha_elf_reloc_entry *ri, *rs, *rin, *rsh;
2217
2218 rsh = hs->reloc_entries;
2219 for (ri = hi->reloc_entries; ri ; ri = rin)
2220 {
2221 rin = ri->next;
2222 for (rs = rsh; rs ; rs = rs->next)
2223 if (ri->rtype == rs->rtype && ri->srel == rs->srel)
2224 {
2225 rs->count += ri->count;
2226 goto found_reloc;
2227 }
2228 ri->next = hs->reloc_entries;
2229 hs->reloc_entries = ri;
2230 found_reloc:;
2231 }
252b5132 2232 }
a7519a3c 2233 hi->reloc_entries = NULL;
252b5132
RH
2234}
2235
a7519a3c 2236/* Is it possible to merge two object file's .got tables? */
252b5132 2237
b34976b6 2238static bfd_boolean
a7519a3c 2239elf64_alpha_can_merge_gots (bfd *a, bfd *b)
252b5132 2240{
a7519a3c
RH
2241 int total = alpha_elf_tdata (a)->total_got_size;
2242 bfd *bsub;
252b5132 2243
a7519a3c
RH
2244 /* Trivial quick fallout test. */
2245 if (total + alpha_elf_tdata (b)->total_got_size <= MAX_GOT_SIZE)
2246 return TRUE;
252b5132 2247
a7519a3c
RH
2248 /* By their nature, local .got entries cannot be merged. */
2249 if ((total += alpha_elf_tdata (b)->local_got_size) > MAX_GOT_SIZE)
b34976b6 2250 return FALSE;
252b5132 2251
a7519a3c
RH
2252 /* Failing the common trivial comparison, we must effectively
2253 perform the merge. Not actually performing the merge means that
2254 we don't have to store undo information in case we fail. */
2255 for (bsub = b; bsub ; bsub = alpha_elf_tdata (bsub)->in_got_link_next)
2256 {
2257 struct alpha_elf_link_hash_entry **hashes = alpha_elf_sym_hashes (bsub);
2258 Elf_Internal_Shdr *symtab_hdr = &elf_tdata (bsub)->symtab_hdr;
2259 int i, n;
2260
2261 n = NUM_SHDR_ENTRIES (symtab_hdr) - symtab_hdr->sh_info;
2262 for (i = 0; i < n; ++i)
2263 {
2264 struct alpha_elf_got_entry *ae, *be;
2265 struct alpha_elf_link_hash_entry *h;
2266
2267 h = hashes[i];
2268 while (h->root.root.type == bfd_link_hash_indirect
2269 || h->root.root.type == bfd_link_hash_warning)
2270 h = (struct alpha_elf_link_hash_entry *)h->root.root.u.i.link;
2271
2272 for (be = h->got_entries; be ; be = be->next)
2273 {
2274 if (be->use_count == 0)
2275 continue;
2276 if (be->gotobj != b)
2277 continue;
2278
2279 for (ae = h->got_entries; ae ; ae = ae->next)
2280 if (ae->gotobj == a
2281 && ae->reloc_type == be->reloc_type
2282 && ae->addend == be->addend)
2283 goto global_found;
2284
2285 total += alpha_got_entry_size (be->reloc_type);
2286 if (total > MAX_GOT_SIZE)
2287 return FALSE;
2288 global_found:;
2289 }
2290 }
2291 }
252b5132 2292
b34976b6 2293 return TRUE;
252b5132
RH
2294}
2295
a7519a3c 2296/* Actually merge two .got tables. */
252b5132 2297
a7519a3c
RH
2298static void
2299elf64_alpha_merge_gots (bfd *a, bfd *b)
252b5132 2300{
a7519a3c
RH
2301 int total = alpha_elf_tdata (a)->total_got_size;
2302 bfd *bsub;
252b5132 2303
a7519a3c
RH
2304 /* Remember local expansion. */
2305 {
2306 int e = alpha_elf_tdata (b)->local_got_size;
2307 total += e;
2308 alpha_elf_tdata (a)->local_got_size += e;
2309 }
252b5132 2310
a7519a3c
RH
2311 for (bsub = b; bsub ; bsub = alpha_elf_tdata (bsub)->in_got_link_next)
2312 {
2313 struct alpha_elf_got_entry **local_got_entries;
2314 struct alpha_elf_link_hash_entry **hashes;
2315 Elf_Internal_Shdr *symtab_hdr;
2316 int i, n;
252b5132 2317
a7519a3c
RH
2318 /* Let the local .got entries know they are part of a new subsegment. */
2319 local_got_entries = alpha_elf_tdata (bsub)->local_got_entries;
2320 if (local_got_entries)
2321 {
2322 n = elf_tdata (bsub)->symtab_hdr.sh_info;
2323 for (i = 0; i < n; ++i)
2324 {
2325 struct alpha_elf_got_entry *ent;
2326 for (ent = local_got_entries[i]; ent; ent = ent->next)
2327 ent->gotobj = a;
2328 }
2329 }
252b5132 2330
a7519a3c
RH
2331 /* Merge the global .got entries. */
2332 hashes = alpha_elf_sym_hashes (bsub);
2333 symtab_hdr = &elf_tdata (bsub)->symtab_hdr;
252b5132 2334
a7519a3c
RH
2335 n = NUM_SHDR_ENTRIES (symtab_hdr) - symtab_hdr->sh_info;
2336 for (i = 0; i < n; ++i)
2337 {
2338 struct alpha_elf_got_entry *ae, *be, **pbe, **start;
2339 struct alpha_elf_link_hash_entry *h;
252b5132 2340
a7519a3c
RH
2341 h = hashes[i];
2342 while (h->root.root.type == bfd_link_hash_indirect
2343 || h->root.root.type == bfd_link_hash_warning)
2344 h = (struct alpha_elf_link_hash_entry *)h->root.root.u.i.link;
252b5132 2345
a7519a3c
RH
2346 pbe = start = &h->got_entries;
2347 while ((be = *pbe) != NULL)
2348 {
2349 if (be->use_count == 0)
2350 {
2351 *pbe = be->next;
2352 memset (be, 0xa5, sizeof (*be));
2353 goto kill;
2354 }
2355 if (be->gotobj != b)
2356 goto next;
2357
2358 for (ae = *start; ae ; ae = ae->next)
2359 if (ae->gotobj == a
2360 && ae->reloc_type == be->reloc_type
2361 && ae->addend == be->addend)
2362 {
2363 ae->flags |= be->flags;
2364 ae->use_count += be->use_count;
2365 *pbe = be->next;
2366 memset (be, 0xa5, sizeof (*be));
2367 goto kill;
2368 }
2369 be->gotobj = a;
2370 total += alpha_got_entry_size (be->reloc_type);
252b5132 2371
a7519a3c
RH
2372 next:;
2373 pbe = &be->next;
2374 kill:;
2375 }
2376 }
252b5132 2377
a7519a3c
RH
2378 alpha_elf_tdata (bsub)->gotobj = a;
2379 }
2380 alpha_elf_tdata (a)->total_got_size = total;
252b5132 2381
a7519a3c
RH
2382 /* Merge the two in_got chains. */
2383 {
2384 bfd *next;
252b5132 2385
a7519a3c
RH
2386 bsub = a;
2387 while ((next = alpha_elf_tdata (bsub)->in_got_link_next) != NULL)
2388 bsub = next;
252b5132 2389
a7519a3c
RH
2390 alpha_elf_tdata (bsub)->in_got_link_next = b;
2391 }
252b5132 2392}
a7519a3c
RH
2393
2394/* Calculate the offsets for the got entries. */
252b5132 2395
b34976b6 2396static bfd_boolean
a7519a3c 2397elf64_alpha_calc_got_offsets_for_symbol (struct alpha_elf_link_hash_entry *h,
2c3fc389 2398 void * arg ATTRIBUTE_UNUSED)
252b5132 2399{
a7519a3c 2400 struct alpha_elf_got_entry *gotent;
252b5132 2401
a7519a3c
RH
2402 for (gotent = h->got_entries; gotent; gotent = gotent->next)
2403 if (gotent->use_count > 0)
2404 {
2405 struct alpha_elf_obj_tdata *td;
2406 bfd_size_type *plge;
252b5132 2407
a7519a3c 2408 td = alpha_elf_tdata (gotent->gotobj);
a7519a3c
RH
2409 plge = &td->got->size;
2410 gotent->got_offset = *plge;
2411 *plge += alpha_got_entry_size (gotent->reloc_type);
2412 }
252b5132 2413
6ec7057a 2414 return TRUE;
a7519a3c 2415}
252b5132 2416
a7519a3c
RH
2417static void
2418elf64_alpha_calc_got_offsets (struct bfd_link_info *info)
2419{
4dfe6ac6
NC
2420 bfd *i, *got_list;
2421 struct alpha_elf_link_hash_table * htab;
2422
2423 htab = alpha_elf_hash_table (info);
2424 if (htab == NULL)
2425 return;
2426 got_list = htab->got_list;
252b5132 2427
a7519a3c
RH
2428 /* First, zero out the .got sizes, as we may be recalculating the
2429 .got after optimizing it. */
2430 for (i = got_list; i ; i = alpha_elf_tdata(i)->got_link_next)
2431 alpha_elf_tdata(i)->got->size = 0;
252b5132 2432
a7519a3c 2433 /* Next, fill in the offsets for all the global entries. */
4dfe6ac6 2434 alpha_elf_link_hash_traverse (htab,
a7519a3c
RH
2435 elf64_alpha_calc_got_offsets_for_symbol,
2436 NULL);
252b5132 2437
a7519a3c
RH
2438 /* Finally, fill in the offsets for the local entries. */
2439 for (i = got_list; i ; i = alpha_elf_tdata(i)->got_link_next)
2440 {
2441 bfd_size_type got_offset = alpha_elf_tdata(i)->got->size;
2442 bfd *j;
252b5132 2443
a7519a3c
RH
2444 for (j = i; j ; j = alpha_elf_tdata(j)->in_got_link_next)
2445 {
2446 struct alpha_elf_got_entry **local_got_entries, *gotent;
2447 int k, n;
252b5132 2448
a7519a3c
RH
2449 local_got_entries = alpha_elf_tdata(j)->local_got_entries;
2450 if (!local_got_entries)
2451 continue;
252b5132 2452
a7519a3c
RH
2453 for (k = 0, n = elf_tdata(j)->symtab_hdr.sh_info; k < n; ++k)
2454 for (gotent = local_got_entries[k]; gotent; gotent = gotent->next)
2455 if (gotent->use_count > 0)
2456 {
2457 gotent->got_offset = got_offset;
2458 got_offset += alpha_got_entry_size (gotent->reloc_type);
2459 }
2460 }
252b5132 2461
a7519a3c
RH
2462 alpha_elf_tdata(i)->got->size = got_offset;
2463 }
2464}
252b5132 2465
a7519a3c 2466/* Constructs the gots. */
252b5132 2467
b34976b6 2468static bfd_boolean
d1c109de
RH
2469elf64_alpha_size_got_sections (struct bfd_link_info *info,
2470 bfd_boolean may_merge)
252b5132 2471{
a7519a3c 2472 bfd *i, *got_list, *cur_got_obj = NULL;
4dfe6ac6 2473 struct alpha_elf_link_hash_table * htab;
252b5132 2474
4dfe6ac6
NC
2475 htab = alpha_elf_hash_table (info);
2476 if (htab == NULL)
2477 return FALSE;
2478 got_list = htab->got_list;
95404643 2479
a7519a3c
RH
2480 /* On the first time through, pretend we have an existing got list
2481 consisting of all of the input files. */
2482 if (got_list == NULL)
252b5132 2483 {
a7519a3c 2484 for (i = info->input_bfds; i ; i = i->link_next)
252b5132 2485 {
0ffa91dd
NC
2486 bfd *this_got;
2487
2488 if (! is_alpha_elf (i))
2489 continue;
2490
2491 this_got = alpha_elf_tdata (i)->gotobj;
a7519a3c
RH
2492 if (this_got == NULL)
2493 continue;
252b5132 2494
a7519a3c
RH
2495 /* We are assuming no merging has yet occurred. */
2496 BFD_ASSERT (this_got == i);
252b5132 2497
a7519a3c 2498 if (alpha_elf_tdata (this_got)->total_got_size > MAX_GOT_SIZE)
252b5132 2499 {
a7519a3c
RH
2500 /* Yikes! A single object file has too many entries. */
2501 (*_bfd_error_handler)
2502 (_("%B: .got subsegment exceeds 64K (size %d)"),
2503 i, alpha_elf_tdata (this_got)->total_got_size);
b34976b6 2504 return FALSE;
252b5132 2505 }
252b5132 2506
a7519a3c
RH
2507 if (got_list == NULL)
2508 got_list = this_got;
2509 else
2510 alpha_elf_tdata(cur_got_obj)->got_link_next = this_got;
2511 cur_got_obj = this_got;
252b5132
RH
2512 }
2513
a7519a3c
RH
2514 /* Strange degenerate case of no got references. */
2515 if (got_list == NULL)
2516 return TRUE;
2517
4dfe6ac6 2518 htab->got_list = got_list;
a7519a3c
RH
2519 }
2520
2521 cur_got_obj = got_list;
0ffa91dd
NC
2522 if (cur_got_obj == NULL)
2523 return FALSE;
2524
d1c109de 2525 if (may_merge)
a7519a3c 2526 {
d1c109de
RH
2527 i = alpha_elf_tdata(cur_got_obj)->got_link_next;
2528 while (i != NULL)
252b5132 2529 {
d1c109de
RH
2530 if (elf64_alpha_can_merge_gots (cur_got_obj, i))
2531 {
2532 elf64_alpha_merge_gots (cur_got_obj, i);
252b5132 2533
d1c109de
RH
2534 alpha_elf_tdata(i)->got->size = 0;
2535 i = alpha_elf_tdata(i)->got_link_next;
2536 alpha_elf_tdata(cur_got_obj)->got_link_next = i;
2537 }
2538 else
2539 {
2540 cur_got_obj = i;
2541 i = alpha_elf_tdata(i)->got_link_next;
2542 }
a7519a3c 2543 }
252b5132
RH
2544 }
2545
a7519a3c
RH
2546 /* Once the gots have been merged, fill in the got offsets for
2547 everything therein. */
4a828aab 2548 elf64_alpha_calc_got_offsets (info);
252b5132 2549
a7519a3c 2550 return TRUE;
252b5132 2551}
252b5132 2552
b34976b6 2553static bfd_boolean
2c3fc389
NC
2554elf64_alpha_size_plt_section_1 (struct alpha_elf_link_hash_entry *h,
2555 void * data)
252b5132 2556{
a7519a3c
RH
2557 asection *splt = (asection *) data;
2558 struct alpha_elf_got_entry *gotent;
6ec7057a 2559 bfd_boolean saw_one = FALSE;
252b5132 2560
a7519a3c
RH
2561 /* If we didn't need an entry before, we still don't. */
2562 if (!h->root.needs_plt)
2563 return TRUE;
e92d460e 2564
6ec7057a 2565 /* For each LITERAL got entry still in use, allocate a plt entry. */
a7519a3c
RH
2566 for (gotent = h->got_entries; gotent ; gotent = gotent->next)
2567 if (gotent->reloc_type == R_ALPHA_LITERAL
2568 && gotent->use_count > 0)
6ec7057a
RH
2569 {
2570 if (splt->size == 0)
2571 splt->size = PLT_HEADER_SIZE;
2572 gotent->plt_offset = splt->size;
2573 splt->size += PLT_ENTRY_SIZE;
2574 saw_one = TRUE;
2575 }
a7519a3c 2576
6ec7057a
RH
2577 /* If there weren't any, there's no longer a need for the PLT entry. */
2578 if (!saw_one)
2579 h->root.needs_plt = FALSE;
a7519a3c
RH
2580
2581 return TRUE;
2582}
2583
4a828aab
RH
2584/* Called from relax_section to rebuild the PLT in light of potential changes
2585 in the function's status. */
a7519a3c 2586
4a828aab 2587static void
a7519a3c
RH
2588elf64_alpha_size_plt_section (struct bfd_link_info *info)
2589{
6ec7057a 2590 asection *splt, *spltrel, *sgotplt;
a7519a3c
RH
2591 unsigned long entries;
2592 bfd *dynobj;
4dfe6ac6
NC
2593 struct alpha_elf_link_hash_table * htab;
2594
2595 htab = alpha_elf_hash_table (info);
2596 if (htab == NULL)
2597 return;
a7519a3c
RH
2598
2599 dynobj = elf_hash_table(info)->dynobj;
3d4d4302 2600 splt = bfd_get_linker_section (dynobj, ".plt");
a7519a3c 2601 if (splt == NULL)
4a828aab 2602 return;
252b5132 2603
a7519a3c 2604 splt->size = 0;
252b5132 2605
4dfe6ac6 2606 alpha_elf_link_hash_traverse (htab,
a7519a3c 2607 elf64_alpha_size_plt_section_1, splt);
e92d460e 2608
a7519a3c 2609 /* Every plt entry requires a JMP_SLOT relocation. */
3d4d4302 2610 spltrel = bfd_get_linker_section (dynobj, ".rela.plt");
4a828aab 2611 entries = 0;
a7519a3c 2612 if (splt->size)
6ec7057a
RH
2613 {
2614 if (elf64_alpha_use_secureplt)
2615 entries = (splt->size - NEW_PLT_HEADER_SIZE) / NEW_PLT_ENTRY_SIZE;
2616 else
2617 entries = (splt->size - OLD_PLT_HEADER_SIZE) / OLD_PLT_ENTRY_SIZE;
2618 }
a7519a3c 2619 spltrel->size = entries * sizeof (Elf64_External_Rela);
e92d460e 2620
6ec7057a
RH
2621 /* When using the secureplt, we need two words somewhere in the data
2622 segment for the dynamic linker to tell us where to go. This is the
2623 entire contents of the .got.plt section. */
2624 if (elf64_alpha_use_secureplt)
2625 {
3d4d4302 2626 sgotplt = bfd_get_linker_section (dynobj, ".got.plt");
6ec7057a
RH
2627 sgotplt->size = entries ? 16 : 0;
2628 }
a7519a3c 2629}
e92d460e 2630
a7519a3c
RH
2631static bfd_boolean
2632elf64_alpha_always_size_sections (bfd *output_bfd ATTRIBUTE_UNUSED,
2633 struct bfd_link_info *info)
2634{
2635 bfd *i;
4dfe6ac6 2636 struct alpha_elf_link_hash_table * htab;
252b5132 2637
a7519a3c
RH
2638 if (info->relocatable)
2639 return TRUE;
252b5132 2640
4dfe6ac6
NC
2641 htab = alpha_elf_hash_table (info);
2642 if (htab == NULL)
2643 return FALSE;
2644
d1c109de 2645 if (!elf64_alpha_size_got_sections (info, TRUE))
a7519a3c 2646 return FALSE;
252b5132 2647
a7519a3c 2648 /* Allocate space for all of the .got subsections. */
4dfe6ac6 2649 i = htab->got_list;
a7519a3c 2650 for ( ; i ; i = alpha_elf_tdata(i)->got_link_next)
252b5132 2651 {
a7519a3c
RH
2652 asection *s = alpha_elf_tdata(i)->got;
2653 if (s->size > 0)
2654 {
2655 s->contents = (bfd_byte *) bfd_zalloc (i, s->size);
2656 if (s->contents == NULL)
2657 return FALSE;
2658 }
252b5132
RH
2659 }
2660
b34976b6 2661 return TRUE;
252b5132 2662}
3765b1be 2663
a7519a3c 2664/* The number of dynamic relocations required by a static relocation. */
3765b1be 2665
a7519a3c 2666static int
e366eeae 2667alpha_dynamic_entries_for_reloc (int r_type, int dynamic, int shared, int pie)
a7519a3c
RH
2668{
2669 switch (r_type)
3765b1be 2670 {
a7519a3c
RH
2671 /* May appear in GOT entries. */
2672 case R_ALPHA_TLSGD:
2673 return (dynamic ? 2 : shared ? 1 : 0);
2674 case R_ALPHA_TLSLDM:
2675 return shared;
2676 case R_ALPHA_LITERAL:
a7519a3c 2677 return dynamic || shared;
e366eeae
RH
2678 case R_ALPHA_GOTTPREL:
2679 return dynamic || (shared && !pie);
a7519a3c
RH
2680 case R_ALPHA_GOTDTPREL:
2681 return dynamic;
3765b1be 2682
a7519a3c
RH
2683 /* May appear in data sections. */
2684 case R_ALPHA_REFLONG:
2685 case R_ALPHA_REFQUAD:
a7519a3c 2686 return dynamic || shared;
e366eeae
RH
2687 case R_ALPHA_TPREL64:
2688 return dynamic || (shared && !pie);
3765b1be 2689
a7519a3c
RH
2690 /* Everything else is illegal. We'll issue an error during
2691 relocate_section. */
2692 default:
2693 return 0;
2694 }
2695}
3765b1be 2696
a7519a3c 2697/* Work out the sizes of the dynamic relocation entries. */
3765b1be 2698
a7519a3c
RH
2699static bfd_boolean
2700elf64_alpha_calc_dynrel_sizes (struct alpha_elf_link_hash_entry *h,
2701 struct bfd_link_info *info)
2702{
2703 bfd_boolean dynamic;
2704 struct alpha_elf_reloc_entry *relent;
2705 unsigned long entries;
3765b1be 2706
a7519a3c
RH
2707 /* If the symbol was defined as a common symbol in a regular object
2708 file, and there was no definition in any dynamic object, then the
2709 linker will have allocated space for the symbol in a common
2710 section but the ELF_LINK_HASH_DEF_REGULAR flag will not have been
2711 set. This is done for dynamic symbols in
2712 elf_adjust_dynamic_symbol but this is not done for non-dynamic
2713 symbols, somehow. */
2714 if (!h->root.def_regular
2715 && h->root.ref_regular
2716 && !h->root.def_dynamic
2717 && (h->root.root.type == bfd_link_hash_defined
2718 || h->root.root.type == bfd_link_hash_defweak)
2719 && !(h->root.root.u.def.section->owner->flags & DYNAMIC))
2720 h->root.def_regular = 1;
3765b1be 2721
a7519a3c
RH
2722 /* If the symbol is dynamic, we'll need all the relocations in their
2723 natural form. If this is a shared object, and it has been forced
2724 local, we'll need the same number of RELATIVE relocations. */
2725 dynamic = alpha_elf_dynamic_symbol_p (&h->root, info);
3765b1be 2726
a7519a3c
RH
2727 /* If the symbol is a hidden undefined weak, then we never have any
2728 relocations. Avoid the loop which may want to add RELATIVE relocs
2729 based on info->shared. */
2730 if (h->root.root.type == bfd_link_hash_undefweak && !dynamic)
2731 return TRUE;
2732
2733 for (relent = h->reloc_entries; relent; relent = relent->next)
3765b1be 2734 {
a7519a3c 2735 entries = alpha_dynamic_entries_for_reloc (relent->rtype, dynamic,
e366eeae 2736 info->shared, info->pie);
a7519a3c
RH
2737 if (entries)
2738 {
2739 relent->srel->size +=
2740 entries * sizeof (Elf64_External_Rela) * relent->count;
2741 if (relent->reltext)
2742 info->flags |= DT_TEXTREL;
2743 }
2744 }
3765b1be 2745
a7519a3c
RH
2746 return TRUE;
2747}
3765b1be 2748
a7519a3c
RH
2749/* Subroutine of elf64_alpha_size_rela_got_section for doing the
2750 global symbols. */
3765b1be 2751
a7519a3c
RH
2752static bfd_boolean
2753elf64_alpha_size_rela_got_1 (struct alpha_elf_link_hash_entry *h,
2754 struct bfd_link_info *info)
2755{
2756 bfd_boolean dynamic;
2757 struct alpha_elf_got_entry *gotent;
2758 unsigned long entries;
3765b1be 2759
6ec7057a
RH
2760 /* If we're using a plt for this symbol, then all of its relocations
2761 for its got entries go into .rela.plt. */
2762 if (h->root.needs_plt)
2763 return TRUE;
2764
a7519a3c
RH
2765 /* If the symbol is dynamic, we'll need all the relocations in their
2766 natural form. If this is a shared object, and it has been forced
2767 local, we'll need the same number of RELATIVE relocations. */
2768 dynamic = alpha_elf_dynamic_symbol_p (&h->root, info);
2769
2770 /* If the symbol is a hidden undefined weak, then we never have any
2771 relocations. Avoid the loop which may want to add RELATIVE relocs
2772 based on info->shared. */
2773 if (h->root.root.type == bfd_link_hash_undefweak && !dynamic)
2774 return TRUE;
2775
2776 entries = 0;
2777 for (gotent = h->got_entries; gotent ; gotent = gotent->next)
2778 if (gotent->use_count > 0)
e366eeae
RH
2779 entries += alpha_dynamic_entries_for_reloc (gotent->reloc_type, dynamic,
2780 info->shared, info->pie);
a7519a3c 2781
a7519a3c
RH
2782 if (entries > 0)
2783 {
2784 bfd *dynobj = elf_hash_table(info)->dynobj;
3d4d4302 2785 asection *srel = bfd_get_linker_section (dynobj, ".rela.got");
a7519a3c
RH
2786 BFD_ASSERT (srel != NULL);
2787 srel->size += sizeof (Elf64_External_Rela) * entries;
3765b1be 2788 }
3765b1be 2789
a7519a3c 2790 return TRUE;
3765b1be
RH
2791}
2792
a7519a3c 2793/* Set the sizes of the dynamic relocation sections. */
252b5132 2794
4a828aab 2795static void
a7519a3c 2796elf64_alpha_size_rela_got_section (struct bfd_link_info *info)
252b5132 2797{
a7519a3c
RH
2798 unsigned long entries;
2799 bfd *i, *dynobj;
2800 asection *srel;
4dfe6ac6
NC
2801 struct alpha_elf_link_hash_table * htab;
2802
2803 htab = alpha_elf_hash_table (info);
2804 if (htab == NULL)
2805 return;
252b5132 2806
a7519a3c
RH
2807 /* Shared libraries often require RELATIVE relocs, and some relocs
2808 require attention for the main application as well. */
252b5132 2809
a7519a3c 2810 entries = 0;
4dfe6ac6 2811 for (i = htab->got_list;
a7519a3c
RH
2812 i ; i = alpha_elf_tdata(i)->got_link_next)
2813 {
2814 bfd *j;
3241278a 2815
a7519a3c
RH
2816 for (j = i; j ; j = alpha_elf_tdata(j)->in_got_link_next)
2817 {
2818 struct alpha_elf_got_entry **local_got_entries, *gotent;
2819 int k, n;
252b5132 2820
a7519a3c
RH
2821 local_got_entries = alpha_elf_tdata(j)->local_got_entries;
2822 if (!local_got_entries)
2823 continue;
252b5132 2824
a7519a3c
RH
2825 for (k = 0, n = elf_tdata(j)->symtab_hdr.sh_info; k < n; ++k)
2826 for (gotent = local_got_entries[k];
2827 gotent ; gotent = gotent->next)
2828 if (gotent->use_count > 0)
2829 entries += (alpha_dynamic_entries_for_reloc
e366eeae 2830 (gotent->reloc_type, 0, info->shared, info->pie));
a7519a3c
RH
2831 }
2832 }
3765b1be 2833
a7519a3c 2834 dynobj = elf_hash_table(info)->dynobj;
3d4d4302 2835 srel = bfd_get_linker_section (dynobj, ".rela.got");
a7519a3c
RH
2836 if (!srel)
2837 {
2838 BFD_ASSERT (entries == 0);
4a828aab 2839 return;
a7519a3c
RH
2840 }
2841 srel->size = sizeof (Elf64_External_Rela) * entries;
252b5132 2842
a7519a3c 2843 /* Now do the non-local symbols. */
4dfe6ac6 2844 alpha_elf_link_hash_traverse (htab,
a7519a3c 2845 elf64_alpha_size_rela_got_1, info);
a7519a3c 2846}
252b5132 2847
a7519a3c 2848/* Set the sizes of the dynamic sections. */
3765b1be 2849
a7519a3c
RH
2850static bfd_boolean
2851elf64_alpha_size_dynamic_sections (bfd *output_bfd ATTRIBUTE_UNUSED,
2852 struct bfd_link_info *info)
2853{
2854 bfd *dynobj;
2855 asection *s;
2856 bfd_boolean relplt;
4dfe6ac6
NC
2857 struct alpha_elf_link_hash_table * htab;
2858
2859 htab = alpha_elf_hash_table (info);
2860 if (htab == NULL)
2861 return FALSE;
3765b1be 2862
a7519a3c
RH
2863 dynobj = elf_hash_table(info)->dynobj;
2864 BFD_ASSERT(dynobj != NULL);
252b5132 2865
a7519a3c
RH
2866 if (elf_hash_table (info)->dynamic_sections_created)
2867 {
2868 /* Set the contents of the .interp section to the interpreter. */
2869 if (info->executable)
252b5132 2870 {
3d4d4302 2871 s = bfd_get_linker_section (dynobj, ".interp");
a7519a3c
RH
2872 BFD_ASSERT (s != NULL);
2873 s->size = sizeof ELF_DYNAMIC_INTERPRETER;
2874 s->contents = (unsigned char *) ELF_DYNAMIC_INTERPRETER;
2875 }
3765b1be 2876
a7519a3c
RH
2877 /* Now that we've seen all of the input files, we can decide which
2878 symbols need dynamic relocation entries and which don't. We've
2879 collected information in check_relocs that we can now apply to
2880 size the dynamic relocation sections. */
4dfe6ac6 2881 alpha_elf_link_hash_traverse (htab,
a7519a3c 2882 elf64_alpha_calc_dynrel_sizes, info);
252b5132 2883
a7519a3c 2884 elf64_alpha_size_rela_got_section (info);
6ec7057a 2885 elf64_alpha_size_plt_section (info);
a7519a3c
RH
2886 }
2887 /* else we're not dynamic and by definition we don't need such things. */
3765b1be 2888
a7519a3c
RH
2889 /* The check_relocs and adjust_dynamic_symbol entry points have
2890 determined the sizes of the various dynamic sections. Allocate
2891 memory for them. */
2892 relplt = FALSE;
2893 for (s = dynobj->sections; s != NULL; s = s->next)
2894 {
2895 const char *name;
3765b1be 2896
a7519a3c
RH
2897 if (!(s->flags & SEC_LINKER_CREATED))
2898 continue;
cc03ec80 2899
a7519a3c
RH
2900 /* It's OK to base decisions on the section name, because none
2901 of the dynobj section names depend upon the input files. */
2902 name = bfd_get_section_name (dynobj, s);
3765b1be 2903
0112cd26 2904 if (CONST_STRNEQ (name, ".rela"))
3765b1be 2905 {
c456f082 2906 if (s->size != 0)
a7519a3c 2907 {
c456f082 2908 if (strcmp (name, ".rela.plt") == 0)
a7519a3c 2909 relplt = TRUE;
252b5132 2910
a7519a3c
RH
2911 /* We use the reloc_count field as a counter if we need
2912 to copy relocs into the output file. */
2913 s->reloc_count = 0;
252b5132 2914 }
3765b1be 2915 }
0112cd26 2916 else if (! CONST_STRNEQ (name, ".got")
c456f082
AM
2917 && strcmp (name, ".plt") != 0
2918 && strcmp (name, ".dynbss") != 0)
3765b1be 2919 {
a7519a3c
RH
2920 /* It's not one of our dynamic sections, so don't allocate space. */
2921 continue;
2922 }
252b5132 2923
c456f082
AM
2924 if (s->size == 0)
2925 {
2926 /* If we don't need this section, strip it from the output file.
2927 This is to handle .rela.bss and .rela.plt. We must create it
2928 in create_dynamic_sections, because it must be created before
2929 the linker maps input sections to output sections. The
2930 linker does that before adjust_dynamic_symbol is called, and
2931 it is that function which decides whether anything needs to
2932 go into these sections. */
6452a567
RH
2933 if (!CONST_STRNEQ (name, ".got"))
2934 s->flags |= SEC_EXCLUDE;
c456f082
AM
2935 }
2936 else if ((s->flags & SEC_HAS_CONTENTS) != 0)
a7519a3c
RH
2937 {
2938 /* Allocate memory for the section contents. */
2939 s->contents = (bfd_byte *) bfd_zalloc (dynobj, s->size);
c456f082 2940 if (s->contents == NULL)
b34976b6 2941 return FALSE;
a7519a3c
RH
2942 }
2943 }
3765b1be 2944
a7519a3c
RH
2945 if (elf_hash_table (info)->dynamic_sections_created)
2946 {
2947 /* Add some entries to the .dynamic section. We fill in the
2948 values later, in elf64_alpha_finish_dynamic_sections, but we
2949 must add the entries now so that we get the correct size for
2950 the .dynamic section. The DT_DEBUG entry is filled in by the
2951 dynamic linker and used by the debugger. */
2952#define add_dynamic_entry(TAG, VAL) \
2953 _bfd_elf_add_dynamic_entry (info, TAG, VAL)
3765b1be 2954
a7519a3c
RH
2955 if (info->executable)
2956 {
2957 if (!add_dynamic_entry (DT_DEBUG, 0))
2958 return FALSE;
3765b1be
RH
2959 }
2960
a7519a3c 2961 if (relplt)
3765b1be 2962 {
a7519a3c
RH
2963 if (!add_dynamic_entry (DT_PLTGOT, 0)
2964 || !add_dynamic_entry (DT_PLTRELSZ, 0)
2965 || !add_dynamic_entry (DT_PLTREL, DT_RELA)
2966 || !add_dynamic_entry (DT_JMPREL, 0))
2967 return FALSE;
6ec7057a
RH
2968
2969 if (elf64_alpha_use_secureplt
2970 && !add_dynamic_entry (DT_ALPHA_PLTRO, 1))
2971 return FALSE;
a7519a3c 2972 }
252b5132 2973
a7519a3c
RH
2974 if (!add_dynamic_entry (DT_RELA, 0)
2975 || !add_dynamic_entry (DT_RELASZ, 0)
2976 || !add_dynamic_entry (DT_RELAENT, sizeof (Elf64_External_Rela)))
2977 return FALSE;
2978
2979 if (info->flags & DF_TEXTREL)
2980 {
2981 if (!add_dynamic_entry (DT_TEXTREL, 0))
2982 return FALSE;
252b5132
RH
2983 }
2984 }
a7519a3c 2985#undef add_dynamic_entry
252b5132 2986
b34976b6 2987 return TRUE;
252b5132 2988}
a7519a3c
RH
2989\f
2990/* These functions do relaxation for Alpha ELF.
252b5132 2991
a7519a3c
RH
2992 Currently I'm only handling what I can do with existing compiler
2993 and assembler support, which means no instructions are removed,
2994 though some may be nopped. At this time GCC does not emit enough
2995 information to do all of the relaxing that is possible. It will
2996 take some not small amount of work for that to happen.
252b5132 2997
a7519a3c
RH
2998 There are a couple of interesting papers that I once read on this
2999 subject, that I cannot find references to at the moment, that
3000 related to Alpha in particular. They are by David Wall, then of
3001 DEC WRL. */
252b5132 3002
a7519a3c
RH
3003struct alpha_relax_info
3004{
3005 bfd *abfd;
3006 asection *sec;
3007 bfd_byte *contents;
3008 Elf_Internal_Shdr *symtab_hdr;
3009 Elf_Internal_Rela *relocs, *relend;
3010 struct bfd_link_info *link_info;
3011 bfd_vma gp;
3012 bfd *gotobj;
3013 asection *tsec;
3014 struct alpha_elf_link_hash_entry *h;
3015 struct alpha_elf_got_entry **first_gotent;
3016 struct alpha_elf_got_entry *gotent;
3017 bfd_boolean changed_contents;
3018 bfd_boolean changed_relocs;
3019 unsigned char other;
3020};
252b5132 3021
a7519a3c
RH
3022static Elf_Internal_Rela *
3023elf64_alpha_find_reloc_at_ofs (Elf_Internal_Rela *rel,
3024 Elf_Internal_Rela *relend,
3025 bfd_vma offset, int type)
3026{
3027 while (rel < relend)
252b5132 3028 {
a7519a3c
RH
3029 if (rel->r_offset == offset
3030 && ELF64_R_TYPE (rel->r_info) == (unsigned int) type)
3031 return rel;
3032 ++rel;
3033 }
3034 return NULL;
3035}
252b5132 3036
a7519a3c
RH
3037static bfd_boolean
3038elf64_alpha_relax_got_load (struct alpha_relax_info *info, bfd_vma symval,
3039 Elf_Internal_Rela *irel, unsigned long r_type)
3040{
3041 unsigned int insn;
3042 bfd_signed_vma disp;
252b5132 3043
a7519a3c
RH
3044 /* Get the instruction. */
3045 insn = bfd_get_32 (info->abfd, info->contents + irel->r_offset);
252b5132 3046
a7519a3c
RH
3047 if (insn >> 26 != OP_LDQ)
3048 {
3049 reloc_howto_type *howto = elf64_alpha_howto_table + r_type;
3050 ((*_bfd_error_handler)
3051 ("%B: %A+0x%lx: warning: %s relocation against unexpected insn",
3052 info->abfd, info->sec,
3053 (unsigned long) irel->r_offset, howto->name));
3054 return TRUE;
3055 }
252b5132 3056
a7519a3c
RH
3057 /* Can't relax dynamic symbols. */
3058 if (alpha_elf_dynamic_symbol_p (&info->h->root, info->link_info))
3059 return TRUE;
252b5132 3060
a7519a3c 3061 /* Can't use local-exec relocations in shared libraries. */
e366eeae
RH
3062 if (r_type == R_ALPHA_GOTTPREL
3063 && (info->link_info->shared && !info->link_info->pie))
a7519a3c 3064 return TRUE;
252b5132 3065
a7519a3c
RH
3066 if (r_type == R_ALPHA_LITERAL)
3067 {
3068 /* Look for nice constant addresses. This includes the not-uncommon
3069 special case of 0 for undefweak symbols. */
3070 if ((info->h && info->h->root.root.type == bfd_link_hash_undefweak)
3071 || (!info->link_info->shared
3072 && (symval >= (bfd_vma)-0x8000 || symval < 0x8000)))
3073 {
3074 disp = 0;
3075 insn = (OP_LDA << 26) | (insn & (31 << 21)) | (31 << 16);
3076 insn |= (symval & 0xffff);
3077 r_type = R_ALPHA_NONE;
3078 }
3079 else
3080 {
d1c109de
RH
3081 /* We may only create GPREL relocs during the second pass. */
3082 if (info->link_info->relax_pass == 0)
3083 return TRUE;
3084
a7519a3c
RH
3085 disp = symval - info->gp;
3086 insn = (OP_LDA << 26) | (insn & 0x03ff0000);
3087 r_type = R_ALPHA_GPREL16;
3088 }
252b5132
RH
3089 }
3090 else
252b5132 3091 {
a7519a3c 3092 bfd_vma dtp_base, tp_base;
252b5132 3093
a7519a3c
RH
3094 BFD_ASSERT (elf_hash_table (info->link_info)->tls_sec != NULL);
3095 dtp_base = alpha_get_dtprel_base (info->link_info);
3096 tp_base = alpha_get_tprel_base (info->link_info);
3097 disp = symval - (r_type == R_ALPHA_GOTDTPREL ? dtp_base : tp_base);
252b5132 3098
a7519a3c 3099 insn = (OP_LDA << 26) | (insn & (31 << 21)) | (31 << 16);
252b5132 3100
a7519a3c
RH
3101 switch (r_type)
3102 {
3103 case R_ALPHA_GOTDTPREL:
3104 r_type = R_ALPHA_DTPREL16;
3105 break;
3106 case R_ALPHA_GOTTPREL:
3107 r_type = R_ALPHA_TPREL16;
3108 break;
3109 default:
3110 BFD_ASSERT (0);
3111 return FALSE;
3112 }
3113 }
252b5132 3114
a7519a3c 3115 if (disp < -0x8000 || disp >= 0x8000)
b34976b6 3116 return TRUE;
252b5132 3117
a7519a3c
RH
3118 bfd_put_32 (info->abfd, (bfd_vma) insn, info->contents + irel->r_offset);
3119 info->changed_contents = TRUE;
252b5132 3120
a7519a3c
RH
3121 /* Reduce the use count on this got entry by one, possibly
3122 eliminating it. */
3123 if (--info->gotent->use_count == 0)
252b5132 3124 {
a7519a3c
RH
3125 int sz = alpha_got_entry_size (r_type);
3126 alpha_elf_tdata (info->gotobj)->total_got_size -= sz;
3127 if (!info->h)
3128 alpha_elf_tdata (info->gotobj)->local_got_size -= sz;
252b5132 3129 }
252b5132 3130
a7519a3c
RH
3131 /* Smash the existing GOT relocation for its 16-bit immediate pair. */
3132 irel->r_info = ELF64_R_INFO (ELF64_R_SYM (irel->r_info), r_type);
3133 info->changed_relocs = TRUE;
3134
3135 /* ??? Search forward through this basic block looking for insns
3136 that use the target register. Stop after an insn modifying the
3137 register is seen, or after a branch or call.
252b5132 3138
a7519a3c
RH
3139 Any such memory load insn may be substituted by a load directly
3140 off the GP. This allows the memory load insn to be issued before
3141 the calculated GP register would otherwise be ready.
252b5132 3142
a7519a3c
RH
3143 Any such jsr insn can be replaced by a bsr if it is in range.
3144
3145 This would mean that we'd have to _add_ relocations, the pain of
3146 which gives one pause. */
252b5132 3147
b34976b6 3148 return TRUE;
252b5132
RH
3149}
3150
a7519a3c
RH
3151static bfd_vma
3152elf64_alpha_relax_opt_call (struct alpha_relax_info *info, bfd_vma symval)
252b5132 3153{
a7519a3c
RH
3154 /* If the function has the same gp, and we can identify that the
3155 function does not use its function pointer, we can eliminate the
3156 address load. */
252b5132 3157
a7519a3c
RH
3158 /* If the symbol is marked NOPV, we are being told the function never
3159 needs its procedure value. */
3160 if ((info->other & STO_ALPHA_STD_GPLOAD) == STO_ALPHA_NOPV)
3161 return symval;
252b5132 3162
a7519a3c
RH
3163 /* If the symbol is marked STD_GP, we are being told the function does
3164 a normal ldgp in the first two words. */
3165 else if ((info->other & STO_ALPHA_STD_GPLOAD) == STO_ALPHA_STD_GPLOAD)
3166 ;
252b5132 3167
a7519a3c
RH
3168 /* Otherwise, we may be able to identify a GP load in the first two
3169 words, which we can then skip. */
3170 else
252b5132 3171 {
a7519a3c
RH
3172 Elf_Internal_Rela *tsec_relocs, *tsec_relend, *tsec_free, *gpdisp;
3173 bfd_vma ofs;
252b5132 3174
a7519a3c
RH
3175 /* Load the relocations from the section that the target symbol is in. */
3176 if (info->sec == info->tsec)
252b5132 3177 {
a7519a3c
RH
3178 tsec_relocs = info->relocs;
3179 tsec_relend = info->relend;
3180 tsec_free = NULL;
3181 }
3182 else
3183 {
3184 tsec_relocs = (_bfd_elf_link_read_relocs
2c3fc389 3185 (info->abfd, info->tsec, NULL,
a7519a3c
RH
3186 (Elf_Internal_Rela *) NULL,
3187 info->link_info->keep_memory));
3188 if (tsec_relocs == NULL)
3189 return 0;
3190 tsec_relend = tsec_relocs + info->tsec->reloc_count;
3191 tsec_free = (info->link_info->keep_memory ? NULL : tsec_relocs);
3192 }
252b5132 3193
a7519a3c
RH
3194 /* Recover the symbol's offset within the section. */
3195 ofs = (symval - info->tsec->output_section->vma
3196 - info->tsec->output_offset);
252b5132 3197
a7519a3c
RH
3198 /* Look for a GPDISP reloc. */
3199 gpdisp = (elf64_alpha_find_reloc_at_ofs
3200 (tsec_relocs, tsec_relend, ofs, R_ALPHA_GPDISP));
252b5132 3201
a7519a3c
RH
3202 if (!gpdisp || gpdisp->r_addend != 4)
3203 {
3204 if (tsec_free)
3205 free (tsec_free);
3206 return 0;
252b5132 3207 }
a7519a3c
RH
3208 if (tsec_free)
3209 free (tsec_free);
252b5132
RH
3210 }
3211
a7519a3c
RH
3212 /* We've now determined that we can skip an initial gp load. Verify
3213 that the call and the target use the same gp. */
f13a99db 3214 if (info->link_info->output_bfd->xvec != info->tsec->owner->xvec
a7519a3c
RH
3215 || info->gotobj != alpha_elf_tdata (info->tsec->owner)->gotobj)
3216 return 0;
252b5132 3217
a7519a3c
RH
3218 return symval + 8;
3219}
252b5132 3220
a7519a3c
RH
3221static bfd_boolean
3222elf64_alpha_relax_with_lituse (struct alpha_relax_info *info,
3223 bfd_vma symval, Elf_Internal_Rela *irel)
252b5132 3224{
d1c109de
RH
3225 Elf_Internal_Rela *urel, *erel, *irelend = info->relend;
3226 int flags;
a7519a3c
RH
3227 bfd_signed_vma disp;
3228 bfd_boolean fits16;
3229 bfd_boolean fits32;
3230 bfd_boolean lit_reused = FALSE;
3231 bfd_boolean all_optimized = TRUE;
d1c109de
RH
3232 bfd_boolean changed_contents;
3233 bfd_boolean changed_relocs;
3234 bfd_byte *contents = info->contents;
3235 bfd *abfd = info->abfd;
3236 bfd_vma sec_output_vma;
a7519a3c 3237 unsigned int lit_insn;
d1c109de 3238 int relax_pass;
252b5132 3239
d1c109de 3240 lit_insn = bfd_get_32 (abfd, contents + irel->r_offset);
a7519a3c
RH
3241 if (lit_insn >> 26 != OP_LDQ)
3242 {
3243 ((*_bfd_error_handler)
3244 ("%B: %A+0x%lx: warning: LITERAL relocation against unexpected insn",
d1c109de 3245 abfd, info->sec,
a7519a3c
RH
3246 (unsigned long) irel->r_offset));
3247 return TRUE;
3248 }
252b5132 3249
a7519a3c
RH
3250 /* Can't relax dynamic symbols. */
3251 if (alpha_elf_dynamic_symbol_p (&info->h->root, info->link_info))
3252 return TRUE;
3253
d1c109de
RH
3254 changed_contents = info->changed_contents;
3255 changed_relocs = info->changed_relocs;
3256 sec_output_vma = info->sec->output_section->vma + info->sec->output_offset;
3257 relax_pass = info->link_info->relax_pass;
3258
a7519a3c 3259 /* Summarize how this particular LITERAL is used. */
d1c109de 3260 for (erel = irel+1, flags = 0; erel < irelend; ++erel)
252b5132 3261 {
d1c109de 3262 if (ELF64_R_TYPE (erel->r_info) != R_ALPHA_LITUSE)
a7519a3c 3263 break;
d1c109de
RH
3264 if (erel->r_addend <= 6)
3265 flags |= 1 << erel->r_addend;
a7519a3c 3266 }
252b5132 3267
a7519a3c
RH
3268 /* A little preparation for the loop... */
3269 disp = symval - info->gp;
252b5132 3270
d1c109de 3271 for (urel = irel+1; urel < erel; ++urel)
a7519a3c 3272 {
d1c109de 3273 bfd_vma urel_r_offset = urel->r_offset;
a7519a3c
RH
3274 unsigned int insn;
3275 int insn_disp;
3276 bfd_signed_vma xdisp;
d1c109de 3277 Elf_Internal_Rela nrel;
252b5132 3278
d1c109de 3279 insn = bfd_get_32 (abfd, contents + urel_r_offset);
252b5132 3280
a7519a3c
RH
3281 switch (urel->r_addend)
3282 {
3283 case LITUSE_ALPHA_ADDR:
3284 default:
3285 /* This type is really just a placeholder to note that all
3286 uses cannot be optimized, but to still allow some. */
3287 all_optimized = FALSE;
3288 break;
252b5132 3289
a7519a3c 3290 case LITUSE_ALPHA_BASE:
d1c109de
RH
3291 /* We may only create GPREL relocs during the second pass. */
3292 if (relax_pass == 0)
3293 {
3294 all_optimized = FALSE;
3295 break;
3296 }
3297
a7519a3c 3298 /* We can always optimize 16-bit displacements. */
252b5132 3299
a7519a3c
RH
3300 /* Extract the displacement from the instruction, sign-extending
3301 it if necessary, then test whether it is within 16 or 32 bits
3302 displacement from GP. */
3303 insn_disp = ((insn & 0xffff) ^ 0x8000) - 0x8000;
3304
3305 xdisp = disp + insn_disp;
3306 fits16 = (xdisp >= - (bfd_signed_vma) 0x8000 && xdisp < 0x8000);
3307 fits32 = (xdisp >= - (bfd_signed_vma) 0x80000000
3308 && xdisp < 0x7fff8000);
3309
3310 if (fits16)
3311 {
3312 /* Take the op code and dest from this insn, take the base
3313 register from the literal insn. Leave the offset alone. */
3314 insn = (insn & 0xffe0ffff) | (lit_insn & 0x001f0000);
d1c109de
RH
3315 bfd_put_32 (abfd, (bfd_vma) insn, contents + urel_r_offset);
3316 changed_contents = TRUE;
3317
3318 nrel = *urel;
3319 nrel.r_info = ELF64_R_INFO (ELF64_R_SYM (irel->r_info),
3320 R_ALPHA_GPREL16);
3321 nrel.r_addend = irel->r_addend;
3322
3323 /* As we adjust, move the reloc to the end so that we don't
3324 break the LITERAL+LITUSE chain. */
3325 if (urel < --erel)
3326 *urel-- = *erel;
3327 *erel = nrel;
3328 changed_relocs = TRUE;
252b5132 3329 }
252b5132 3330
a7519a3c
RH
3331 /* If all mem+byte, we can optimize 32-bit mem displacements. */
3332 else if (fits32 && !(flags & ~6))
3333 {
3334 /* FIXME: sanity check that lit insn Ra is mem insn Rb. */
252b5132 3335
a7519a3c
RH
3336 irel->r_info = ELF64_R_INFO (ELF64_R_SYM (irel->r_info),
3337 R_ALPHA_GPRELHIGH);
3338 lit_insn = (OP_LDAH << 26) | (lit_insn & 0x03ff0000);
d1c109de 3339 bfd_put_32 (abfd, (bfd_vma) lit_insn, contents + irel->r_offset);
a7519a3c 3340 lit_reused = TRUE;
d1c109de 3341 changed_contents = TRUE;
252b5132 3342
d1c109de
RH
3343 /* Since all relocs must be optimized, don't bother swapping
3344 this relocation to the end. */
a7519a3c
RH
3345 urel->r_info = ELF64_R_INFO (ELF64_R_SYM (irel->r_info),
3346 R_ALPHA_GPRELLOW);
3347 urel->r_addend = irel->r_addend;
d1c109de 3348 changed_relocs = TRUE;
a7519a3c
RH
3349 }
3350 else
3351 all_optimized = FALSE;
3352 break;
252b5132 3353
a7519a3c
RH
3354 case LITUSE_ALPHA_BYTOFF:
3355 /* We can always optimize byte instructions. */
252b5132 3356
a7519a3c
RH
3357 /* FIXME: sanity check the insn for byte op. Check that the
3358 literal dest reg is indeed Rb in the byte insn. */
252b5132 3359
a7519a3c
RH
3360 insn &= ~ (unsigned) 0x001ff000;
3361 insn |= ((symval & 7) << 13) | 0x1000;
d1c109de
RH
3362 bfd_put_32 (abfd, (bfd_vma) insn, contents + urel_r_offset);
3363 changed_contents = TRUE;
3364
3365 nrel = *urel;
3366 nrel.r_info = ELF64_R_INFO (0, R_ALPHA_NONE);
3367 nrel.r_addend = 0;
3368
3369 /* As we adjust, move the reloc to the end so that we don't
3370 break the LITERAL+LITUSE chain. */
3371 if (urel < --erel)
3372 *urel-- = *erel;
3373 *erel = nrel;
3374 changed_relocs = TRUE;
a7519a3c 3375 break;
252b5132 3376
a7519a3c
RH
3377 case LITUSE_ALPHA_JSR:
3378 case LITUSE_ALPHA_TLSGD:
3379 case LITUSE_ALPHA_TLSLDM:
8288a39e 3380 case LITUSE_ALPHA_JSRDIRECT:
0d5f9994 3381 {
a7519a3c
RH
3382 bfd_vma optdest, org;
3383 bfd_signed_vma odisp;
252b5132 3384
a7519a3c
RH
3385 /* For undefined weak symbols, we're mostly interested in getting
3386 rid of the got entry whenever possible, so optimize this to a
3387 use of the zero register. */
3388 if (info->h && info->h->root.root.type == bfd_link_hash_undefweak)
3389 {
3390 insn |= 31 << 16;
d1c109de 3391 bfd_put_32 (abfd, (bfd_vma) insn, contents + urel_r_offset);
252b5132 3392
d1c109de 3393 changed_contents = TRUE;
a7519a3c
RH
3394 break;
3395 }
252b5132 3396
a7519a3c
RH
3397 /* If not zero, place to jump without needing pv. */
3398 optdest = elf64_alpha_relax_opt_call (info, symval);
d1c109de 3399 org = sec_output_vma + urel_r_offset + 4;
a7519a3c 3400 odisp = (optdest ? optdest : symval) - org;
252b5132 3401
a7519a3c
RH
3402 if (odisp >= -0x400000 && odisp < 0x400000)
3403 {
3404 Elf_Internal_Rela *xrel;
252b5132 3405
a7519a3c
RH
3406 /* Preserve branch prediction call stack when possible. */
3407 if ((insn & INSN_JSR_MASK) == INSN_JSR)
3408 insn = (OP_BSR << 26) | (insn & 0x03e00000);
3409 else
3410 insn = (OP_BR << 26) | (insn & 0x03e00000);
d1c109de
RH
3411 bfd_put_32 (abfd, (bfd_vma) insn, contents + urel_r_offset);
3412 changed_contents = TRUE;
252b5132 3413
d1c109de
RH
3414 nrel = *urel;
3415 nrel.r_info = ELF64_R_INFO (ELF64_R_SYM (irel->r_info),
3416 R_ALPHA_BRADDR);
3417 nrel.r_addend = irel->r_addend;
252b5132 3418
a7519a3c 3419 if (optdest)
d1c109de 3420 nrel.r_addend += optdest - symval;
a7519a3c
RH
3421 else
3422 all_optimized = FALSE;
252b5132 3423
a7519a3c
RH
3424 /* Kill any HINT reloc that might exist for this insn. */
3425 xrel = (elf64_alpha_find_reloc_at_ofs
d1c109de 3426 (info->relocs, info->relend, urel_r_offset,
a7519a3c
RH
3427 R_ALPHA_HINT));
3428 if (xrel)
3429 xrel->r_info = ELF64_R_INFO (0, R_ALPHA_NONE);
252b5132 3430
d1c109de
RH
3431 /* As we adjust, move the reloc to the end so that we don't
3432 break the LITERAL+LITUSE chain. */
3433 if (urel < --erel)
3434 *urel-- = *erel;
3435 *erel = nrel;
3436
a7519a3c
RH
3437 info->changed_relocs = TRUE;
3438 }
3439 else
3440 all_optimized = FALSE;
252b5132 3441
a7519a3c
RH
3442 /* Even if the target is not in range for a direct branch,
3443 if we share a GP, we can eliminate the gp reload. */
3444 if (optdest)
3445 {
3446 Elf_Internal_Rela *gpdisp
3447 = (elf64_alpha_find_reloc_at_ofs
d1c109de 3448 (info->relocs, irelend, urel_r_offset + 4,
a7519a3c
RH
3449 R_ALPHA_GPDISP));
3450 if (gpdisp)
3451 {
d1c109de 3452 bfd_byte *p_ldah = contents + gpdisp->r_offset;
a7519a3c 3453 bfd_byte *p_lda = p_ldah + gpdisp->r_addend;
d1c109de
RH
3454 unsigned int ldah = bfd_get_32 (abfd, p_ldah);
3455 unsigned int lda = bfd_get_32 (abfd, p_lda);
252b5132 3456
a7519a3c
RH
3457 /* Verify that the instruction is "ldah $29,0($26)".
3458 Consider a function that ends in a noreturn call,
3459 and that the next function begins with an ldgp,
3460 and that by accident there is no padding between.
3461 In that case the insn would use $27 as the base. */
3462 if (ldah == 0x27ba0000 && lda == 0x23bd0000)
3463 {
d1c109de
RH
3464 bfd_put_32 (abfd, (bfd_vma) INSN_UNOP, p_ldah);
3465 bfd_put_32 (abfd, (bfd_vma) INSN_UNOP, p_lda);
252b5132 3466
a7519a3c 3467 gpdisp->r_info = ELF64_R_INFO (0, R_ALPHA_NONE);
d1c109de
RH
3468 changed_contents = TRUE;
3469 changed_relocs = TRUE;
a7519a3c
RH
3470 }
3471 }
3472 }
3473 }
3474 break;
252b5132 3475 }
252b5132
RH
3476 }
3477
d1c109de
RH
3478 /* If we reused the literal instruction, we must have optimized all. */
3479 BFD_ASSERT(!lit_reused || all_optimized);
3480
a7519a3c
RH
3481 /* If all cases were optimized, we can reduce the use count on this
3482 got entry by one, possibly eliminating it. */
3483 if (all_optimized)
252b5132 3484 {
a7519a3c 3485 if (--info->gotent->use_count == 0)
252b5132 3486 {
a7519a3c
RH
3487 int sz = alpha_got_entry_size (R_ALPHA_LITERAL);
3488 alpha_elf_tdata (info->gotobj)->total_got_size -= sz;
3489 if (!info->h)
3490 alpha_elf_tdata (info->gotobj)->local_got_size -= sz;
252b5132 3491 }
a7519a3c
RH
3492
3493 /* If the literal instruction is no longer needed (it may have been
3494 reused. We can eliminate it. */
3495 /* ??? For now, I don't want to deal with compacting the section,
3496 so just nop it out. */
3497 if (!lit_reused)
252b5132 3498 {
a7519a3c 3499 irel->r_info = ELF64_R_INFO (0, R_ALPHA_NONE);
d1c109de 3500 changed_relocs = TRUE;
252b5132 3501
d1c109de
RH
3502 bfd_put_32 (abfd, (bfd_vma) INSN_UNOP, contents + irel->r_offset);
3503 changed_contents = TRUE;
a7519a3c 3504 }
a7519a3c 3505 }
d1c109de
RH
3506
3507 info->changed_contents = changed_contents;
3508 info->changed_relocs = changed_relocs;
3509
3510 if (all_optimized || relax_pass == 0)
3511 return TRUE;
3512 return elf64_alpha_relax_got_load (info, symval, irel, R_ALPHA_LITERAL);
252b5132
RH
3513}
3514
b34976b6 3515static bfd_boolean
a7519a3c
RH
3516elf64_alpha_relax_tls_get_addr (struct alpha_relax_info *info, bfd_vma symval,
3517 Elf_Internal_Rela *irel, bfd_boolean is_gd)
f44f99a5 3518{
a7519a3c 3519 bfd_byte *pos[5];
891caa9b 3520 unsigned int insn, tlsgd_reg;
a7519a3c 3521 Elf_Internal_Rela *gpdisp, *hint;
891caa9b 3522 bfd_boolean dynamic, use_gottprel;
a7519a3c 3523 unsigned long new_symndx;
f44f99a5 3524
a7519a3c 3525 dynamic = alpha_elf_dynamic_symbol_p (&info->h->root, info->link_info);
f44f99a5 3526
a7519a3c
RH
3527 /* If a TLS symbol is accessed using IE at least once, there is no point
3528 to use dynamic model for it. */
3529 if (is_gd && info->h && (info->h->flags & ALPHA_ELF_LINK_HASH_TLS_IE))
3530 ;
f44f99a5 3531
a7519a3c
RH
3532 /* If the symbol is local, and we've already committed to DF_STATIC_TLS,
3533 then we might as well relax to IE. */
3534 else if (info->link_info->shared && !dynamic
3535 && (info->link_info->flags & DF_STATIC_TLS))
3536 ;
f44f99a5 3537
a7519a3c
RH
3538 /* Otherwise we must be building an executable to do anything. */
3539 else if (info->link_info->shared)
3540 return TRUE;
f44f99a5 3541
a7519a3c
RH
3542 /* The TLSGD/TLSLDM relocation must be followed by a LITERAL and
3543 the matching LITUSE_TLS relocations. */
3544 if (irel + 2 >= info->relend)
3545 return TRUE;
3546 if (ELF64_R_TYPE (irel[1].r_info) != R_ALPHA_LITERAL
3547 || ELF64_R_TYPE (irel[2].r_info) != R_ALPHA_LITUSE
3548 || irel[2].r_addend != (is_gd ? LITUSE_ALPHA_TLSGD : LITUSE_ALPHA_TLSLDM))
3549 return TRUE;
f44f99a5 3550
a7519a3c
RH
3551 /* There must be a GPDISP relocation positioned immediately after the
3552 LITUSE relocation. */
3553 gpdisp = elf64_alpha_find_reloc_at_ofs (info->relocs, info->relend,
3554 irel[2].r_offset + 4, R_ALPHA_GPDISP);
3555 if (!gpdisp)
b34976b6 3556 return TRUE;
f44f99a5 3557
a7519a3c
RH
3558 pos[0] = info->contents + irel[0].r_offset;
3559 pos[1] = info->contents + irel[1].r_offset;
3560 pos[2] = info->contents + irel[2].r_offset;
3561 pos[3] = info->contents + gpdisp->r_offset;
3562 pos[4] = pos[3] + gpdisp->r_addend;
f44f99a5 3563
7dbf3b76
RH
3564 /* Beware of the compiler hoisting part of the sequence out a loop
3565 and adjusting the destination register for the TLSGD insn. If this
3566 happens, there will be a move into $16 before the JSR insn, so only
3567 transformations of the first insn pair should use this register. */
3568 tlsgd_reg = bfd_get_32 (info->abfd, pos[0]);
3569 tlsgd_reg = (tlsgd_reg >> 21) & 31;
3570
a7519a3c
RH
3571 /* Generally, the positions are not allowed to be out of order, lest the
3572 modified insn sequence have different register lifetimes. We can make
3573 an exception when pos 1 is adjacent to pos 0. */
3574 if (pos[1] + 4 == pos[0])
f44f99a5 3575 {
a7519a3c
RH
3576 bfd_byte *tmp = pos[0];
3577 pos[0] = pos[1];
3578 pos[1] = tmp;
f44f99a5 3579 }
a7519a3c
RH
3580 if (pos[1] >= pos[2] || pos[2] >= pos[3])
3581 return TRUE;
cc03ec80 3582
a7519a3c
RH
3583 /* Reduce the use count on the LITERAL relocation. Do this before we
3584 smash the symndx when we adjust the relocations below. */
3585 {
3586 struct alpha_elf_got_entry *lit_gotent;
3587 struct alpha_elf_link_hash_entry *lit_h;
3588 unsigned long indx;
f44f99a5 3589
a7519a3c
RH
3590 BFD_ASSERT (ELF64_R_SYM (irel[1].r_info) >= info->symtab_hdr->sh_info);
3591 indx = ELF64_R_SYM (irel[1].r_info) - info->symtab_hdr->sh_info;
3592 lit_h = alpha_elf_sym_hashes (info->abfd)[indx];
f44f99a5 3593
a7519a3c
RH
3594 while (lit_h->root.root.type == bfd_link_hash_indirect
3595 || lit_h->root.root.type == bfd_link_hash_warning)
3596 lit_h = (struct alpha_elf_link_hash_entry *) lit_h->root.root.u.i.link;
252b5132 3597
a7519a3c
RH
3598 for (lit_gotent = lit_h->got_entries; lit_gotent ;
3599 lit_gotent = lit_gotent->next)
3600 if (lit_gotent->gotobj == info->gotobj
3601 && lit_gotent->reloc_type == R_ALPHA_LITERAL
3602 && lit_gotent->addend == irel[1].r_addend)
3603 break;
3604 BFD_ASSERT (lit_gotent);
252b5132 3605
a7519a3c
RH
3606 if (--lit_gotent->use_count == 0)
3607 {
3608 int sz = alpha_got_entry_size (R_ALPHA_LITERAL);
3609 alpha_elf_tdata (info->gotobj)->total_got_size -= sz;
3610 }
3611 }
252b5132 3612
a7519a3c 3613 /* Change
252b5132 3614
a7519a3c
RH
3615 lda $16,x($gp) !tlsgd!1
3616 ldq $27,__tls_get_addr($gp) !literal!1
3617 jsr $26,($27),__tls_get_addr !lituse_tlsgd!1
3618 ldah $29,0($26) !gpdisp!2
3619 lda $29,0($29) !gpdisp!2
3620 to
3621 ldq $16,x($gp) !gottprel
3622 unop
3623 call_pal rduniq
3624 addq $16,$0,$0
3625 unop
3626 or the first pair to
3627 lda $16,x($gp) !tprel
3628 unop
3629 or
3630 ldah $16,x($gp) !tprelhi
3631 lda $16,x($16) !tprello
3632
3633 as appropriate. */
3634
3635 use_gottprel = FALSE;
cf35638d 3636 new_symndx = is_gd ? ELF64_R_SYM (irel->r_info) : STN_UNDEF;
891caa9b 3637
9a757e4d
RM
3638 /* Some compilers warn about a Boolean-looking expression being
3639 used in a switch. The explicit cast silences them. */
3640 switch ((int) (!dynamic && !info->link_info->shared))
252b5132 3641 {
a7519a3c
RH
3642 case 1:
3643 {
3644 bfd_vma tp_base;
3645 bfd_signed_vma disp;
252b5132 3646
a7519a3c
RH
3647 BFD_ASSERT (elf_hash_table (info->link_info)->tls_sec != NULL);
3648 tp_base = alpha_get_tprel_base (info->link_info);
3649 disp = symval - tp_base;
252b5132 3650
a7519a3c
RH
3651 if (disp >= -0x8000 && disp < 0x8000)
3652 {
891caa9b 3653 insn = (OP_LDA << 26) | (tlsgd_reg << 21) | (31 << 16);
a7519a3c
RH
3654 bfd_put_32 (info->abfd, (bfd_vma) insn, pos[0]);
3655 bfd_put_32 (info->abfd, (bfd_vma) INSN_UNOP, pos[1]);
3765b1be 3656
a7519a3c
RH
3657 irel[0].r_offset = pos[0] - info->contents;
3658 irel[0].r_info = ELF64_R_INFO (new_symndx, R_ALPHA_TPREL16);
3659 irel[1].r_info = ELF64_R_INFO (0, R_ALPHA_NONE);
3660 break;
3661 }
3662 else if (disp >= -(bfd_signed_vma) 0x80000000
3663 && disp < (bfd_signed_vma) 0x7fff8000
891caa9b 3664 && pos[0] + 4 == pos[1])
a7519a3c 3665 {
891caa9b 3666 insn = (OP_LDAH << 26) | (tlsgd_reg << 21) | (31 << 16);
a7519a3c 3667 bfd_put_32 (info->abfd, (bfd_vma) insn, pos[0]);
891caa9b 3668 insn = (OP_LDA << 26) | (tlsgd_reg << 21) | (tlsgd_reg << 16);
a7519a3c 3669 bfd_put_32 (info->abfd, (bfd_vma) insn, pos[1]);
3765b1be 3670
a7519a3c
RH
3671 irel[0].r_offset = pos[0] - info->contents;
3672 irel[0].r_info = ELF64_R_INFO (new_symndx, R_ALPHA_TPRELHI);
3673 irel[1].r_offset = pos[1] - info->contents;
3674 irel[1].r_info = ELF64_R_INFO (new_symndx, R_ALPHA_TPRELLO);
3675 break;
3676 }
3677 }
3678 /* FALLTHRU */
3765b1be 3679
3765b1be 3680 default:
a7519a3c
RH
3681 use_gottprel = TRUE;
3682
891caa9b 3683 insn = (OP_LDQ << 26) | (tlsgd_reg << 21) | (29 << 16);
a7519a3c
RH
3684 bfd_put_32 (info->abfd, (bfd_vma) insn, pos[0]);
3685 bfd_put_32 (info->abfd, (bfd_vma) INSN_UNOP, pos[1]);
3686
3687 irel[0].r_offset = pos[0] - info->contents;
3688 irel[0].r_info = ELF64_R_INFO (new_symndx, R_ALPHA_GOTTPREL);
3689 irel[1].r_info = ELF64_R_INFO (0, R_ALPHA_NONE);
3690 break;
3765b1be 3691 }
3765b1be 3692
a7519a3c 3693 bfd_put_32 (info->abfd, (bfd_vma) INSN_RDUNIQ, pos[2]);
252b5132 3694
a7519a3c
RH
3695 insn = INSN_ADDQ | (16 << 21) | (0 << 16) | (0 << 0);
3696 bfd_put_32 (info->abfd, (bfd_vma) insn, pos[3]);
3765b1be 3697
a7519a3c 3698 bfd_put_32 (info->abfd, (bfd_vma) INSN_UNOP, pos[4]);
e92d460e 3699
a7519a3c
RH
3700 irel[2].r_info = ELF64_R_INFO (0, R_ALPHA_NONE);
3701 gpdisp->r_info = ELF64_R_INFO (0, R_ALPHA_NONE);
252b5132 3702
a7519a3c
RH
3703 hint = elf64_alpha_find_reloc_at_ofs (info->relocs, info->relend,
3704 irel[2].r_offset, R_ALPHA_HINT);
3705 if (hint)
3706 hint->r_info = ELF64_R_INFO (0, R_ALPHA_NONE);
252b5132 3707
a7519a3c
RH
3708 info->changed_contents = TRUE;
3709 info->changed_relocs = TRUE;
d6ad34f6 3710
a7519a3c
RH
3711 /* Reduce the use count on the TLSGD/TLSLDM relocation. */
3712 if (--info->gotent->use_count == 0)
3765b1be 3713 {
a7519a3c
RH
3714 int sz = alpha_got_entry_size (info->gotent->reloc_type);
3715 alpha_elf_tdata (info->gotobj)->total_got_size -= sz;
3716 if (!info->h)
3717 alpha_elf_tdata (info->gotobj)->local_got_size -= sz;
3765b1be 3718 }
252b5132 3719
a7519a3c
RH
3720 /* If we've switched to a GOTTPREL relocation, increment the reference
3721 count on that got entry. */
3722 if (use_gottprel)
f44f99a5 3723 {
a7519a3c 3724 struct alpha_elf_got_entry *tprel_gotent;
f44f99a5 3725
a7519a3c
RH
3726 for (tprel_gotent = *info->first_gotent; tprel_gotent ;
3727 tprel_gotent = tprel_gotent->next)
3728 if (tprel_gotent->gotobj == info->gotobj
3729 && tprel_gotent->reloc_type == R_ALPHA_GOTTPREL
3730 && tprel_gotent->addend == irel->r_addend)
3731 break;
3732 if (tprel_gotent)
3733 tprel_gotent->use_count++;
3734 else
f44f99a5 3735 {
a7519a3c
RH
3736 if (info->gotent->use_count == 0)
3737 tprel_gotent = info->gotent;
3738 else
3739 {
3740 tprel_gotent = (struct alpha_elf_got_entry *)
3741 bfd_alloc (info->abfd, sizeof (struct alpha_elf_got_entry));
3742 if (!tprel_gotent)
3743 return FALSE;
f44f99a5 3744
a7519a3c
RH
3745 tprel_gotent->next = *info->first_gotent;
3746 *info->first_gotent = tprel_gotent;
f44f99a5 3747
a7519a3c
RH
3748 tprel_gotent->gotobj = info->gotobj;
3749 tprel_gotent->addend = irel->r_addend;
3750 tprel_gotent->got_offset = -1;
3751 tprel_gotent->reloc_done = 0;
3752 tprel_gotent->reloc_xlated = 0;
3753 }
f44f99a5 3754
a7519a3c
RH
3755 tprel_gotent->use_count = 1;
3756 tprel_gotent->reloc_type = R_ALPHA_GOTTPREL;
3757 }
f44f99a5 3758 }
f44f99a5 3759
b34976b6 3760 return TRUE;
f44f99a5
RH
3761}
3762
b34976b6 3763static bfd_boolean
a7519a3c
RH
3764elf64_alpha_relax_section (bfd *abfd, asection *sec,
3765 struct bfd_link_info *link_info, bfd_boolean *again)
f44f99a5 3766{
a7519a3c
RH
3767 Elf_Internal_Shdr *symtab_hdr;
3768 Elf_Internal_Rela *internal_relocs;
3769 Elf_Internal_Rela *irel, *irelend;
3770 Elf_Internal_Sym *isymbuf = NULL;
3771 struct alpha_elf_got_entry **local_got_entries;
3772 struct alpha_relax_info info;
4dfe6ac6 3773 struct alpha_elf_link_hash_table * htab;
d1c109de 3774 int relax_pass;
4dfe6ac6
NC
3775
3776 htab = alpha_elf_hash_table (link_info);
3777 if (htab == NULL)
3778 return FALSE;
f44f99a5 3779
4a828aab 3780 /* There's nothing to change, yet. */
a7519a3c 3781 *again = FALSE;
f44f99a5 3782
a7519a3c
RH
3783 if (link_info->relocatable
3784 || ((sec->flags & (SEC_CODE | SEC_RELOC | SEC_ALLOC))
3785 != (SEC_CODE | SEC_RELOC | SEC_ALLOC))
3786 || sec->reloc_count == 0)
d6ad34f6
RH
3787 return TRUE;
3788
0ffa91dd 3789 BFD_ASSERT (is_alpha_elf (abfd));
d1c109de 3790 relax_pass = link_info->relax_pass;
0ffa91dd 3791
4a828aab 3792 /* Make sure our GOT and PLT tables are up-to-date. */
4dfe6ac6 3793 if (htab->relax_trip != link_info->relax_trip)
4a828aab 3794 {
4dfe6ac6 3795 htab->relax_trip = link_info->relax_trip;
4a828aab 3796
d1c109de
RH
3797 /* This should never fail after the initial round, since the only error
3798 is GOT overflow, and relaxation only shrinks the table. However, we
3799 may only merge got sections during the first pass. If we merge
3800 sections after we've created GPREL relocs, the GP for the merged
3801 section backs up which may put the relocs out of range. */
3802 if (!elf64_alpha_size_got_sections (link_info, relax_pass == 0))
4a828aab
RH
3803 abort ();
3804 if (elf_hash_table (link_info)->dynamic_sections_created)
3805 {
3806 elf64_alpha_size_plt_section (link_info);
3807 elf64_alpha_size_rela_got_section (link_info);
3808 }
3809 }
3810
0ffa91dd 3811 symtab_hdr = &elf_symtab_hdr (abfd);
a7519a3c 3812 local_got_entries = alpha_elf_tdata(abfd)->local_got_entries;
252b5132 3813
a7519a3c
RH
3814 /* Load the relocations for this section. */
3815 internal_relocs = (_bfd_elf_link_read_relocs
2c3fc389 3816 (abfd, sec, NULL, (Elf_Internal_Rela *) NULL,
a7519a3c
RH
3817 link_info->keep_memory));
3818 if (internal_relocs == NULL)
3819 return FALSE;
252b5132 3820
a7519a3c
RH
3821 memset(&info, 0, sizeof (info));
3822 info.abfd = abfd;
3823 info.sec = sec;
3824 info.link_info = link_info;
3825 info.symtab_hdr = symtab_hdr;
3826 info.relocs = internal_relocs;
3827 info.relend = irelend = internal_relocs + sec->reloc_count;
3828
3829 /* Find the GP for this object. Do not store the result back via
3830 _bfd_set_gp_value, since this could change again before final. */
3831 info.gotobj = alpha_elf_tdata (abfd)->gotobj;
3832 if (info.gotobj)
3765b1be 3833 {
a7519a3c
RH
3834 asection *sgot = alpha_elf_tdata (info.gotobj)->got;
3835 info.gp = (sgot->output_section->vma
3836 + sgot->output_offset
3837 + 0x8000);
252b5132
RH
3838 }
3839
a7519a3c
RH
3840 /* Get the section contents. */
3841 if (elf_section_data (sec)->this_hdr.contents != NULL)
3842 info.contents = elf_section_data (sec)->this_hdr.contents;
3843 else
3844 {
3845 if (!bfd_malloc_and_get_section (abfd, sec, &info.contents))
3846 goto error_return;
3847 }
252b5132 3848
a7519a3c
RH
3849 for (irel = internal_relocs; irel < irelend; irel++)
3850 {
3851 bfd_vma symval;
3852 struct alpha_elf_got_entry *gotent;
3853 unsigned long r_type = ELF64_R_TYPE (irel->r_info);
3854 unsigned long r_symndx = ELF64_R_SYM (irel->r_info);
3855
3856 /* Early exit for unhandled or unrelaxable relocations. */
d1c109de
RH
3857 if (r_type != R_ALPHA_LITERAL)
3858 {
3859 /* We complete everything except LITERAL in the first pass. */
3860 if (relax_pass != 0)
3861 continue;
3862 if (r_type == R_ALPHA_TLSLDM)
3863 {
3864 /* The symbol for a TLSLDM reloc is ignored. Collapse the
3865 reloc to the STN_UNDEF (0) symbol so that they all match. */
3866 r_symndx = STN_UNDEF;
3867 }
3868 else if (r_type != R_ALPHA_GOTDTPREL
3869 && r_type != R_ALPHA_GOTTPREL
3870 && r_type != R_ALPHA_TLSGD)
3871 continue;
a7519a3c
RH
3872 }
3873
3874 /* Get the value of the symbol referred to by the reloc. */
3875 if (r_symndx < symtab_hdr->sh_info)
3876 {
3877 /* A local symbol. */
3878 Elf_Internal_Sym *isym;
3879
3880 /* Read this BFD's local symbols. */
3881 if (isymbuf == NULL)
3882 {
3883 isymbuf = (Elf_Internal_Sym *) symtab_hdr->contents;
3884 if (isymbuf == NULL)
3885 isymbuf = bfd_elf_get_elf_syms (abfd, symtab_hdr,
3886 symtab_hdr->sh_info, 0,
3887 NULL, NULL, NULL);
3888 if (isymbuf == NULL)
3889 goto error_return;
3890 }
252b5132 3891
a7519a3c 3892 isym = isymbuf + r_symndx;
252b5132 3893
a7519a3c
RH
3894 /* Given the symbol for a TLSLDM reloc is ignored, this also
3895 means forcing the symbol value to the tp base. */
3896 if (r_type == R_ALPHA_TLSLDM)
3897 {
3898 info.tsec = bfd_abs_section_ptr;
3899 symval = alpha_get_tprel_base (info.link_info);
3900 }
3901 else
3902 {
3903 symval = isym->st_value;
3904 if (isym->st_shndx == SHN_UNDEF)
3905 continue;
3906 else if (isym->st_shndx == SHN_ABS)
3907 info.tsec = bfd_abs_section_ptr;
3908 else if (isym->st_shndx == SHN_COMMON)
3909 info.tsec = bfd_com_section_ptr;
3910 else
3911 info.tsec = bfd_section_from_elf_index (abfd, isym->st_shndx);
3912 }
252b5132 3913
a7519a3c
RH
3914 info.h = NULL;
3915 info.other = isym->st_other;
3916 if (local_got_entries)
3917 info.first_gotent = &local_got_entries[r_symndx];
3918 else
3919 {
3920 info.first_gotent = &info.gotent;
3921 info.gotent = NULL;
3922 }
252b5132 3923 }
a7519a3c
RH
3924 else
3925 {
3926 unsigned long indx;
3927 struct alpha_elf_link_hash_entry *h;
252b5132 3928
a7519a3c
RH
3929 indx = r_symndx - symtab_hdr->sh_info;
3930 h = alpha_elf_sym_hashes (abfd)[indx];
3931 BFD_ASSERT (h != NULL);
252b5132 3932
a7519a3c
RH
3933 while (h->root.root.type == bfd_link_hash_indirect
3934 || h->root.root.type == bfd_link_hash_warning)
3935 h = (struct alpha_elf_link_hash_entry *)h->root.root.u.i.link;
252b5132 3936
a7519a3c
RH
3937 /* If the symbol is undefined, we can't do anything with it. */
3938 if (h->root.root.type == bfd_link_hash_undefined)
3939 continue;
252b5132 3940
a7519a3c
RH
3941 /* If the symbol isn't defined in the current module,
3942 again we can't do anything. */
3943 if (h->root.root.type == bfd_link_hash_undefweak)
3944 {
3945 info.tsec = bfd_abs_section_ptr;
3946 symval = 0;
3947 }
3948 else if (!h->root.def_regular)
3949 {
3950 /* Except for TLSGD relocs, which can sometimes be
3951 relaxed to GOTTPREL relocs. */
3952 if (r_type != R_ALPHA_TLSGD)
3953 continue;
3954 info.tsec = bfd_abs_section_ptr;
3955 symval = 0;
3956 }
3957 else
3958 {
3959 info.tsec = h->root.root.u.def.section;
3960 symval = h->root.root.u.def.value;
3961 }
252b5132 3962
a7519a3c
RH
3963 info.h = h;
3964 info.other = h->root.other;
3965 info.first_gotent = &h->got_entries;
3966 }
252b5132 3967
a7519a3c
RH
3968 /* Search for the got entry to be used by this relocation. */
3969 for (gotent = *info.first_gotent; gotent ; gotent = gotent->next)
3970 if (gotent->gotobj == info.gotobj
3971 && gotent->reloc_type == r_type
3972 && gotent->addend == irel->r_addend)
3973 break;
3974 info.gotent = gotent;
252b5132 3975
a7519a3c
RH
3976 symval += info.tsec->output_section->vma + info.tsec->output_offset;
3977 symval += irel->r_addend;
252b5132 3978
a7519a3c 3979 switch (r_type)
252b5132 3980 {
a7519a3c
RH
3981 case R_ALPHA_LITERAL:
3982 BFD_ASSERT(info.gotent != NULL);
252b5132 3983
a7519a3c
RH
3984 /* If there exist LITUSE relocations immediately following, this
3985 opens up all sorts of interesting optimizations, because we
3986 now know every location that this address load is used. */
3987 if (irel+1 < irelend
3988 && ELF64_R_TYPE (irel[1].r_info) == R_ALPHA_LITUSE)
252b5132 3989 {
a7519a3c
RH
3990 if (!elf64_alpha_relax_with_lituse (&info, symval, irel))
3991 goto error_return;
252b5132 3992 }
a7519a3c
RH
3993 else
3994 {
3995 if (!elf64_alpha_relax_got_load (&info, symval, irel, r_type))
3996 goto error_return;
3997 }
3998 break;
252b5132 3999
a7519a3c
RH
4000 case R_ALPHA_GOTDTPREL:
4001 case R_ALPHA_GOTTPREL:
4002 BFD_ASSERT(info.gotent != NULL);
4003 if (!elf64_alpha_relax_got_load (&info, symval, irel, r_type))
4004 goto error_return;
4005 break;
4006
4007 case R_ALPHA_TLSGD:
4008 case R_ALPHA_TLSLDM:
4009 BFD_ASSERT(info.gotent != NULL);
4010 if (!elf64_alpha_relax_tls_get_addr (&info, symval, irel,
4011 r_type == R_ALPHA_TLSGD))
4012 goto error_return;
4013 break;
252b5132
RH
4014 }
4015 }
4016
a7519a3c
RH
4017 if (isymbuf != NULL
4018 && symtab_hdr->contents != (unsigned char *) isymbuf)
4019 {
4020 if (!link_info->keep_memory)
4021 free (isymbuf);
4022 else
252b5132 4023 {
a7519a3c
RH
4024 /* Cache the symbols for elf_link_input_bfd. */
4025 symtab_hdr->contents = (unsigned char *) isymbuf;
252b5132 4026 }
a7519a3c 4027 }
252b5132 4028
a7519a3c
RH
4029 if (info.contents != NULL
4030 && elf_section_data (sec)->this_hdr.contents != info.contents)
4031 {
4032 if (!info.changed_contents && !link_info->keep_memory)
4033 free (info.contents);
4034 else
252b5132 4035 {
a7519a3c
RH
4036 /* Cache the section contents for elf_link_input_bfd. */
4037 elf_section_data (sec)->this_hdr.contents = info.contents;
252b5132 4038 }
a7519a3c 4039 }
252b5132 4040
a7519a3c
RH
4041 if (elf_section_data (sec)->relocs != internal_relocs)
4042 {
4043 if (!info.changed_relocs)
4044 free (internal_relocs);
4045 else
4046 elf_section_data (sec)->relocs = internal_relocs;
252b5132 4047 }
a7519a3c
RH
4048
4049 *again = info.changed_contents || info.changed_relocs;
252b5132 4050
b34976b6 4051 return TRUE;
252b5132 4052
a7519a3c
RH
4053 error_return:
4054 if (isymbuf != NULL
4055 && symtab_hdr->contents != (unsigned char *) isymbuf)
4056 free (isymbuf);
4057 if (info.contents != NULL
4058 && elf_section_data (sec)->this_hdr.contents != info.contents)
4059 free (info.contents);
4060 if (internal_relocs != NULL
4061 && elf_section_data (sec)->relocs != internal_relocs)
4062 free (internal_relocs);
4063 return FALSE;
4064}
4065\f
1bbc9cec
RH
4066/* Emit a dynamic relocation for (DYNINDX, RTYPE, ADDEND) at (SEC, OFFSET)
4067 into the next available slot in SREL. */
4068
4069static void
a7519a3c
RH
4070elf64_alpha_emit_dynrel (bfd *abfd, struct bfd_link_info *info,
4071 asection *sec, asection *srel, bfd_vma offset,
4072 long dynindx, long rtype, bfd_vma addend)
1bbc9cec
RH
4073{
4074 Elf_Internal_Rela outrel;
4075 bfd_byte *loc;
4076
4077 BFD_ASSERT (srel != NULL);
4078
4079 outrel.r_info = ELF64_R_INFO (dynindx, rtype);
4080 outrel.r_addend = addend;
4081
4082 offset = _bfd_elf_section_offset (abfd, info, sec, offset);
4083 if ((offset | 1) != (bfd_vma) -1)
4084 outrel.r_offset = sec->output_section->vma + sec->output_offset + offset;
4085 else
4086 memset (&outrel, 0, sizeof (outrel));
4087
4088 loc = srel->contents;
4089 loc += srel->reloc_count++ * sizeof (Elf64_External_Rela);
4090 bfd_elf64_swap_reloca_out (abfd, &outrel, loc);
eea6121a 4091 BFD_ASSERT (sizeof (Elf64_External_Rela) * srel->reloc_count <= srel->size);
1bbc9cec
RH
4092}
4093
4a67a098
RH
4094/* Relocate an Alpha ELF section for a relocatable link.
4095
4096 We don't have to change anything unless the reloc is against a section
4097 symbol, in which case we have to adjust according to where the section
4098 symbol winds up in the output section. */
4099
b34976b6 4100static bfd_boolean
a7519a3c
RH
4101elf64_alpha_relocate_section_r (bfd *output_bfd ATTRIBUTE_UNUSED,
4102 struct bfd_link_info *info ATTRIBUTE_UNUSED,
4103 bfd *input_bfd, asection *input_section,
4104 bfd_byte *contents ATTRIBUTE_UNUSED,
4105 Elf_Internal_Rela *relocs,
4106 Elf_Internal_Sym *local_syms,
4107 asection **local_sections)
4a67a098
RH
4108{
4109 unsigned long symtab_hdr_sh_info;
4110 Elf_Internal_Rela *rel;
4111 Elf_Internal_Rela *relend;
ab96bf03 4112 struct elf_link_hash_entry **sym_hashes;
b34976b6 4113 bfd_boolean ret_val = TRUE;
4a67a098 4114
0ffa91dd 4115 symtab_hdr_sh_info = elf_symtab_hdr (input_bfd).sh_info;
ab96bf03 4116 sym_hashes = elf_sym_hashes (input_bfd);
4a67a098
RH
4117
4118 relend = relocs + input_section->reloc_count;
4119 for (rel = relocs; rel < relend; rel++)
4120 {
4121 unsigned long r_symndx;
4122 Elf_Internal_Sym *sym;
4123 asection *sec;
4124 unsigned long r_type;
4125
ab96bf03 4126 r_type = ELF64_R_TYPE (rel->r_info);
4a67a098
RH
4127 if (r_type >= R_ALPHA_max)
4128 {
4129 (*_bfd_error_handler)
d003868e
AM
4130 (_("%B: unknown relocation type %d"),
4131 input_bfd, (int) r_type);
4a67a098 4132 bfd_set_error (bfd_error_bad_value);
b34976b6 4133 ret_val = FALSE;
4a67a098
RH
4134 continue;
4135 }
4136
4a67a098
RH
4137 /* The symbol associated with GPDISP and LITUSE is
4138 immaterial. Only the addend is significant. */
4139 if (r_type == R_ALPHA_GPDISP || r_type == R_ALPHA_LITUSE)
4140 continue;
4141
ab96bf03 4142 r_symndx = ELF64_R_SYM (rel->r_info);
4a67a098
RH
4143 if (r_symndx < symtab_hdr_sh_info)
4144 {
4145 sym = local_syms + r_symndx;
ab96bf03 4146 sec = local_sections[r_symndx];
4a67a098 4147 }
ab96bf03
AM
4148 else
4149 {
4150 struct elf_link_hash_entry *h;
4151
4152 h = sym_hashes[r_symndx - symtab_hdr_sh_info];
4153
4154 while (h->root.type == bfd_link_hash_indirect
4155 || h->root.type == bfd_link_hash_warning)
4156 h = (struct elf_link_hash_entry *) h->root.u.i.link;
4157
4158 if (h->root.type != bfd_link_hash_defined
4159 && h->root.type != bfd_link_hash_defweak)
4160 continue;
4161
4162 sym = NULL;
4163 sec = h->root.u.def.section;
4164 }
4165
dbaa2011 4166 if (sec != NULL && discarded_section (sec))
e4067dbb 4167 RELOC_AGAINST_DISCARDED_SECTION (info, input_bfd, input_section,
545fd46b
MR
4168 rel, 1, relend,
4169 elf64_alpha_howto_table + r_type, 0,
e4067dbb 4170 contents);
ab96bf03
AM
4171
4172 if (sym != NULL && ELF_ST_TYPE (sym->st_info) == STT_SECTION)
4173 rel->r_addend += sec->output_offset;
4a67a098
RH
4174 }
4175
4176 return ret_val;
4177}
4178
252b5132
RH
4179/* Relocate an Alpha ELF section. */
4180
b34976b6 4181static bfd_boolean
a7519a3c
RH
4182elf64_alpha_relocate_section (bfd *output_bfd, struct bfd_link_info *info,
4183 bfd *input_bfd, asection *input_section,
4184 bfd_byte *contents, Elf_Internal_Rela *relocs,
4185 Elf_Internal_Sym *local_syms,
4186 asection **local_sections)
252b5132 4187{
4a67a098 4188 Elf_Internal_Shdr *symtab_hdr;
252b5132
RH
4189 Elf_Internal_Rela *rel;
4190 Elf_Internal_Rela *relend;
4a67a098
RH
4191 asection *sgot, *srel, *srelgot;
4192 bfd *dynobj, *gotobj;
4193 bfd_vma gp, tp_base, dtp_base;
4194 struct alpha_elf_got_entry **local_got_entries;
b34976b6 4195 bfd_boolean ret_val;
252b5132 4196
0ffa91dd 4197 BFD_ASSERT (is_alpha_elf (input_bfd));
68ffbac6 4198
4a67a098 4199 /* Handle relocatable links with a smaller loop. */
1049f94e 4200 if (info->relocatable)
4a67a098
RH
4201 return elf64_alpha_relocate_section_r (output_bfd, info, input_bfd,
4202 input_section, contents, relocs,
4203 local_syms, local_sections);
4204
4205 /* This is a final link. */
4206
b34976b6 4207 ret_val = TRUE;
252b5132 4208
0ffa91dd 4209 symtab_hdr = &elf_symtab_hdr (input_bfd);
3765b1be 4210
4a67a098
RH
4211 dynobj = elf_hash_table (info)->dynobj;
4212 if (dynobj)
3d4d4302 4213 srelgot = bfd_get_linker_section (dynobj, ".rela.got");
4a67a098
RH
4214 else
4215 srelgot = NULL;
4216
3241278a
RH
4217 if (input_section->flags & SEC_ALLOC)
4218 {
4219 const char *section_name;
4220 section_name = (bfd_elf_string_from_elf_section
4221 (input_bfd, elf_elfheader(input_bfd)->e_shstrndx,
d4730f92 4222 _bfd_elf_single_rel_hdr (input_section)->sh_name));
3241278a 4223 BFD_ASSERT(section_name != NULL);
3d4d4302 4224 srel = bfd_get_linker_section (dynobj, section_name);
3241278a
RH
4225 }
4226 else
4227 srel = NULL;
3765b1be 4228
4a67a098
RH
4229 /* Find the gp value for this input bfd. */
4230 gotobj = alpha_elf_tdata (input_bfd)->gotobj;
4231 if (gotobj)
4232 {
4233 sgot = alpha_elf_tdata (gotobj)->got;
4234 gp = _bfd_get_gp_value (gotobj);
4235 if (gp == 0)
252b5132 4236 {
4a67a098
RH
4237 gp = (sgot->output_section->vma
4238 + sgot->output_offset
4239 + 0x8000);
4240 _bfd_set_gp_value (gotobj, gp);
4241 }
4242 }
4243 else
4244 {
4245 sgot = NULL;
4246 gp = 0;
4247 }
3765b1be 4248
4a67a098
RH
4249 local_got_entries = alpha_elf_tdata(input_bfd)->local_got_entries;
4250
e1918d23 4251 if (elf_hash_table (info)->tls_sec != NULL)
4a67a098 4252 {
e1918d23
AM
4253 dtp_base = alpha_get_dtprel_base (info);
4254 tp_base = alpha_get_tprel_base (info);
252b5132 4255 }
4a67a098
RH
4256 else
4257 dtp_base = tp_base = 0;
252b5132 4258
252b5132 4259 relend = relocs + input_section->reloc_count;
4a67a098 4260 for (rel = relocs; rel < relend; rel++)
252b5132 4261 {
4a67a098 4262 struct alpha_elf_link_hash_entry *h = NULL;
3765b1be
RH
4263 struct alpha_elf_got_entry *gotent;
4264 bfd_reloc_status_type r;
252b5132
RH
4265 reloc_howto_type *howto;
4266 unsigned long r_symndx;
4a67a098
RH
4267 Elf_Internal_Sym *sym = NULL;
4268 asection *sec = NULL;
3765b1be 4269 bfd_vma value;
dc810e39 4270 bfd_vma addend;
b34976b6 4271 bfd_boolean dynamic_symbol_p;
1d5316ab 4272 bfd_boolean unresolved_reloc = FALSE;
b34976b6 4273 bfd_boolean undef_weak_ref = FALSE;
3765b1be 4274 unsigned long r_type;
252b5132
RH
4275
4276 r_type = ELF64_R_TYPE(rel->r_info);
3765b1be 4277 if (r_type >= R_ALPHA_max)
252b5132 4278 {
3765b1be 4279 (*_bfd_error_handler)
d003868e
AM
4280 (_("%B: unknown relocation type %d"),
4281 input_bfd, (int) r_type);
252b5132 4282 bfd_set_error (bfd_error_bad_value);
b34976b6 4283 ret_val = FALSE;
3765b1be 4284 continue;
252b5132 4285 }
252b5132 4286
3765b1be 4287 howto = elf64_alpha_howto_table + r_type;
252b5132
RH
4288 r_symndx = ELF64_R_SYM(rel->r_info);
4289
cc03ec80 4290 /* The symbol for a TLSLDM reloc is ignored. Collapse the
cf35638d 4291 reloc to the STN_UNDEF (0) symbol so that they all match. */
cc03ec80 4292 if (r_type == R_ALPHA_TLSLDM)
cf35638d 4293 r_symndx = STN_UNDEF;
cc03ec80 4294
252b5132
RH
4295 if (r_symndx < symtab_hdr->sh_info)
4296 {
8517fae7 4297 asection *msec;
252b5132
RH
4298 sym = local_syms + r_symndx;
4299 sec = local_sections[r_symndx];
8517fae7
AM
4300 msec = sec;
4301 value = _bfd_elf_rela_local_sym (output_bfd, sym, &msec, rel);
3765b1be 4302
cf35638d 4303 /* If this is a tp-relative relocation against sym STN_UNDEF (0),
cc03ec80 4304 this is hackery from relax_section. Force the value to
f915360b 4305 be the tls module base. */
cf35638d 4306 if (r_symndx == STN_UNDEF
cc03ec80
RH
4307 && (r_type == R_ALPHA_TLSLDM
4308 || r_type == R_ALPHA_GOTTPREL
4309 || r_type == R_ALPHA_TPREL64
4310 || r_type == R_ALPHA_TPRELHI
4311 || r_type == R_ALPHA_TPRELLO
4312 || r_type == R_ALPHA_TPREL16))
f915360b 4313 value = dtp_base;
cc03ec80 4314
4a67a098
RH
4315 if (local_got_entries)
4316 gotent = local_got_entries[r_symndx];
4317 else
4318 gotent = NULL;
3765b1be
RH
4319
4320 /* Need to adjust local GOT entries' addends for SEC_MERGE
4321 unless it has been done already. */
4322 if ((sec->flags & SEC_MERGE)
048d873d 4323 && ELF_ST_TYPE (sym->st_info) == STT_SECTION
dbaa2011 4324 && sec->sec_info_type == SEC_INFO_TYPE_MERGE
048d873d
RH
4325 && gotent
4326 && !gotent->reloc_xlated)
3765b1be
RH
4327 {
4328 struct alpha_elf_got_entry *ent;
3765b1be
RH
4329
4330 for (ent = gotent; ent; ent = ent->next)
4331 {
4332 ent->reloc_xlated = 1;
4333 if (ent->use_count == 0)
4334 continue;
4335 msec = sec;
4336 ent->addend =
4337 _bfd_merged_section_offset (output_bfd, &msec,
4338 elf_section_data (sec)->
4339 sec_info,
753731ee 4340 sym->st_value + ent->addend);
3765b1be
RH
4341 ent->addend -= sym->st_value;
4342 ent->addend += msec->output_section->vma
4343 + msec->output_offset
4344 - sec->output_section->vma
4345 - sec->output_offset;
4346 }
4347 }
4348
b34976b6 4349 dynamic_symbol_p = FALSE;
252b5132
RH
4350 }
4351 else
4352 {
62d887d4 4353 bfd_boolean warned, ignored;
560e09e9 4354 struct elf_link_hash_entry *hh;
b2a8e766
AM
4355 struct elf_link_hash_entry **sym_hashes = elf_sym_hashes (input_bfd);
4356
4357 RELOC_FOR_GLOBAL_SYMBOL (info, input_bfd, input_section, rel,
4358 r_symndx, symtab_hdr, sym_hashes,
4359 hh, sec, value,
62d887d4 4360 unresolved_reloc, warned, ignored);
560e09e9
NC
4361
4362 if (warned)
4363 continue;
252b5132 4364
560e09e9
NC
4365 if (value == 0
4366 && ! unresolved_reloc
4367 && hh->root.type == bfd_link_hash_undefweak)
b34976b6 4368 undef_weak_ref = TRUE;
3765b1be 4369
560e09e9 4370 h = (struct alpha_elf_link_hash_entry *) hh;
3765b1be
RH
4371 dynamic_symbol_p = alpha_elf_dynamic_symbol_p (&h->root, info);
4372 gotent = h->got_entries;
252b5132 4373 }
3765b1be 4374
dbaa2011 4375 if (sec != NULL && discarded_section (sec))
e4067dbb 4376 RELOC_AGAINST_DISCARDED_SECTION (info, input_bfd, input_section,
545fd46b 4377 rel, 1, relend, howto, 0, contents);
ab96bf03 4378
252b5132 4379 addend = rel->r_addend;
3765b1be
RH
4380 value += addend;
4381
4382 /* Search for the proper got entry. */
4383 for (; gotent ; gotent = gotent->next)
4384 if (gotent->gotobj == gotobj
4385 && gotent->reloc_type == r_type
4386 && gotent->addend == addend)
4387 break;
252b5132
RH
4388
4389 switch (r_type)
4390 {
4391 case R_ALPHA_GPDISP:
4392 {
4393 bfd_byte *p_ldah, *p_lda;
4394
4395 BFD_ASSERT(gp != 0);
4396
3765b1be
RH
4397 value = (input_section->output_section->vma
4398 + input_section->output_offset
4399 + rel->r_offset);
252b5132 4400
3765b1be 4401 p_ldah = contents + rel->r_offset;
252b5132
RH
4402 p_lda = p_ldah + rel->r_addend;
4403
3765b1be 4404 r = elf64_alpha_do_reloc_gpdisp (input_bfd, gp - value,
252b5132
RH
4405 p_ldah, p_lda);
4406 }
4407 break;
4408
252b5132 4409 case R_ALPHA_LITERAL:
3765b1be
RH
4410 BFD_ASSERT(sgot != NULL);
4411 BFD_ASSERT(gp != 0);
4412 BFD_ASSERT(gotent != NULL);
4413 BFD_ASSERT(gotent->use_count >= 1);
f7460f5f 4414
3765b1be
RH
4415 if (!gotent->reloc_done)
4416 {
4417 gotent->reloc_done = 1;
252b5132 4418
3765b1be
RH
4419 bfd_put_64 (output_bfd, value,
4420 sgot->contents + gotent->got_offset);
252b5132 4421
3765b1be
RH
4422 /* If the symbol has been forced local, output a
4423 RELATIVE reloc, otherwise it will be handled in
4424 finish_dynamic_symbol. */
d6ad34f6 4425 if (info->shared && !dynamic_symbol_p && !undef_weak_ref)
1bbc9cec
RH
4426 elf64_alpha_emit_dynrel (output_bfd, info, sgot, srelgot,
4427 gotent->got_offset, 0,
4428 R_ALPHA_RELATIVE, value);
3765b1be 4429 }
252b5132 4430
3765b1be
RH
4431 value = (sgot->output_section->vma
4432 + sgot->output_offset
4433 + gotent->got_offset);
4434 value -= gp;
252b5132
RH
4435 goto default_reloc;
4436
4437 case R_ALPHA_GPREL32:
ec1659c8 4438 case R_ALPHA_GPREL16:
252b5132 4439 case R_ALPHA_GPRELLOW:
3765b1be 4440 if (dynamic_symbol_p)
f16fbd61
RH
4441 {
4442 (*_bfd_error_handler)
d003868e
AM
4443 (_("%B: gp-relative relocation against dynamic symbol %s"),
4444 input_bfd, h->root.root.root.string);
b34976b6 4445 ret_val = FALSE;
f16fbd61 4446 }
252b5132 4447 BFD_ASSERT(gp != 0);
3765b1be 4448 value -= gp;
252b5132
RH
4449 goto default_reloc;
4450
4451 case R_ALPHA_GPRELHIGH:
3765b1be 4452 if (dynamic_symbol_p)
f16fbd61
RH
4453 {
4454 (*_bfd_error_handler)
d003868e
AM
4455 (_("%B: gp-relative relocation against dynamic symbol %s"),
4456 input_bfd, h->root.root.root.string);
b34976b6 4457 ret_val = FALSE;
f16fbd61 4458 }
252b5132 4459 BFD_ASSERT(gp != 0);
3765b1be
RH
4460 value -= gp;
4461 value = ((bfd_signed_vma) value >> 16) + ((value >> 15) & 1);
252b5132
RH
4462 goto default_reloc;
4463
252b5132 4464 case R_ALPHA_HINT:
f94952df
RH
4465 /* A call to a dynamic symbol is definitely out of range of
4466 the 16-bit displacement. Don't bother writing anything. */
3765b1be 4467 if (dynamic_symbol_p)
f94952df
RH
4468 {
4469 r = bfd_reloc_ok;
4470 break;
4471 }
3765b1be
RH
4472 /* The regular PC-relative stuff measures from the start of
4473 the instruction rather than the end. */
4474 value -= 4;
4475 goto default_reloc;
f94952df
RH
4476
4477 case R_ALPHA_BRADDR:
3765b1be
RH
4478 if (dynamic_symbol_p)
4479 {
4480 (*_bfd_error_handler)
d003868e
AM
4481 (_("%B: pc-relative relocation against dynamic symbol %s"),
4482 input_bfd, h->root.root.root.string);
b34976b6 4483 ret_val = FALSE;
3765b1be 4484 }
252b5132
RH
4485 /* The regular PC-relative stuff measures from the start of
4486 the instruction rather than the end. */
3765b1be 4487 value -= 4;
252b5132
RH
4488 goto default_reloc;
4489
7793f4d0
RH
4490 case R_ALPHA_BRSGP:
4491 {
4492 int other;
4493 const char *name;
4494
4495 /* The regular PC-relative stuff measures from the start of
4496 the instruction rather than the end. */
3765b1be 4497 value -= 4;
7793f4d0 4498
ccf00ab6
RH
4499 /* The source and destination gp must be the same. Note that
4500 the source will always have an assigned gp, since we forced
4501 one in check_relocs, but that the destination may not, as
cedb70c5 4502 it might not have had any relocations at all. Also take
ccf00ab6
RH
4503 care not to crash if H is an undefined symbol. */
4504 if (h != NULL && sec != NULL
4505 && alpha_elf_tdata (sec->owner)->gotobj
7793f4d0
RH
4506 && gotobj != alpha_elf_tdata (sec->owner)->gotobj)
4507 {
7793f4d0 4508 (*_bfd_error_handler)
d003868e
AM
4509 (_("%B: change in gp: BRSGP %s"),
4510 input_bfd, h->root.root.root.string);
b34976b6 4511 ret_val = FALSE;
7793f4d0
RH
4512 }
4513
4514 /* The symbol should be marked either NOPV or STD_GPLOAD. */
4515 if (h != NULL)
4516 other = h->root.other;
4517 else
4518 other = sym->st_other;
4519 switch (other & STO_ALPHA_STD_GPLOAD)
4520 {
4521 case STO_ALPHA_NOPV:
4522 break;
4523 case STO_ALPHA_STD_GPLOAD:
64e04ecd 4524 value += 8;
7793f4d0
RH
4525 break;
4526 default:
4527 if (h != NULL)
4528 name = h->root.root.root.string;
4529 else
4530 {
4531 name = (bfd_elf_string_from_elf_section
4532 (input_bfd, symtab_hdr->sh_link, sym->st_name));
4533 if (name == NULL)
4534 name = _("<unknown>");
4535 else if (name[0] == 0)
4536 name = bfd_section_name (input_bfd, sec);
4537 }
4538 (*_bfd_error_handler)
d003868e
AM
4539 (_("%B: !samegp reloc against symbol without .prologue: %s"),
4540 input_bfd, name);
b34976b6 4541 ret_val = FALSE;
7793f4d0
RH
4542 break;
4543 }
4544
4545 goto default_reloc;
4546 }
4547
252b5132
RH
4548 case R_ALPHA_REFLONG:
4549 case R_ALPHA_REFQUAD:
3765b1be
RH
4550 case R_ALPHA_DTPREL64:
4551 case R_ALPHA_TPREL64:
252b5132 4552 {
1bbc9cec
RH
4553 long dynindx, dyntype = r_type;
4554 bfd_vma dynaddend;
252b5132
RH
4555
4556 /* Careful here to remember RELATIVE relocations for global
4557 variables for symbolic shared objects. */
4558
3765b1be 4559 if (dynamic_symbol_p)
252b5132
RH
4560 {
4561 BFD_ASSERT(h->root.dynindx != -1);
1bbc9cec
RH
4562 dynindx = h->root.dynindx;
4563 dynaddend = addend;
3765b1be
RH
4564 addend = 0, value = 0;
4565 }
4566 else if (r_type == R_ALPHA_DTPREL64)
4567 {
e1918d23 4568 BFD_ASSERT (elf_hash_table (info)->tls_sec != NULL);
3765b1be
RH
4569 value -= dtp_base;
4570 goto default_reloc;
4571 }
4572 else if (r_type == R_ALPHA_TPREL64)
4573 {
e1918d23 4574 BFD_ASSERT (elf_hash_table (info)->tls_sec != NULL);
e366eeae 4575 if (!info->shared || info->pie)
1bbc9cec
RH
4576 {
4577 value -= tp_base;
4578 goto default_reloc;
4579 }
4580 dynindx = 0;
4581 dynaddend = value - dtp_base;
252b5132 4582 }
ec338859 4583 else if (info->shared
cf35638d 4584 && r_symndx != STN_UNDEF
d6ad34f6 4585 && (input_section->flags & SEC_ALLOC)
1d5316ab
AM
4586 && !undef_weak_ref
4587 && !(unresolved_reloc
4588 && (_bfd_elf_section_offset (output_bfd, info,
4589 input_section,
4590 rel->r_offset)
4591 == (bfd_vma) -1)))
252b5132 4592 {
3765b1be
RH
4593 if (r_type == R_ALPHA_REFLONG)
4594 {
4595 (*_bfd_error_handler)
d003868e
AM
4596 (_("%B: unhandled dynamic relocation against %s"),
4597 input_bfd,
3765b1be 4598 h->root.root.root.string);
b34976b6 4599 ret_val = FALSE;
3765b1be 4600 }
1bbc9cec
RH
4601 dynindx = 0;
4602 dyntype = R_ALPHA_RELATIVE;
4603 dynaddend = value;
252b5132
RH
4604 }
4605 else
4606 goto default_reloc;
4607
3241278a
RH
4608 if (input_section->flags & SEC_ALLOC)
4609 elf64_alpha_emit_dynrel (output_bfd, info, input_section,
4610 srel, rel->r_offset, dynindx,
4611 dyntype, dynaddend);
252b5132
RH
4612 }
4613 goto default_reloc;
4614
3765b1be 4615 case R_ALPHA_SREL16:
84de6048
RH
4616 case R_ALPHA_SREL32:
4617 case R_ALPHA_SREL64:
3765b1be
RH
4618 if (dynamic_symbol_p)
4619 {
4620 (*_bfd_error_handler)
d003868e
AM
4621 (_("%B: pc-relative relocation against dynamic symbol %s"),
4622 input_bfd, h->root.root.root.string);
b34976b6 4623 ret_val = FALSE;
3765b1be 4624 }
d6ad34f6
RH
4625 else if ((info->shared || info->pie) && undef_weak_ref)
4626 {
4627 (*_bfd_error_handler)
4628 (_("%B: pc-relative relocation against undefined weak symbol %s"),
4629 input_bfd, h->root.root.root.string);
4630 ret_val = FALSE;
4631 }
4632
3765b1be 4633
84de6048
RH
4634 /* ??? .eh_frame references to discarded sections will be smashed
4635 to relocations against SHN_UNDEF. The .eh_frame format allows
4636 NULL to be encoded as 0 in any format, so this works here. */
1d5316ab
AM
4637 if (r_symndx == STN_UNDEF
4638 || (unresolved_reloc
4639 && _bfd_elf_section_offset (output_bfd, info,
4640 input_section,
4641 rel->r_offset) == (bfd_vma) -1))
84de6048
RH
4642 howto = (elf64_alpha_howto_table
4643 + (r_type - R_ALPHA_SREL32 + R_ALPHA_REFLONG));
4644 goto default_reloc;
4645
3765b1be
RH
4646 case R_ALPHA_TLSLDM:
4647 /* Ignore the symbol for the relocation. The result is always
4648 the current module. */
4649 dynamic_symbol_p = 0;
4650 /* FALLTHRU */
4651
4652 case R_ALPHA_TLSGD:
4653 if (!gotent->reloc_done)
4654 {
4655 gotent->reloc_done = 1;
4656
4657 /* Note that the module index for the main program is 1. */
4658 bfd_put_64 (output_bfd, !info->shared && !dynamic_symbol_p,
4659 sgot->contents + gotent->got_offset);
4660
4661 /* If the symbol has been forced local, output a
4662 DTPMOD64 reloc, otherwise it will be handled in
4663 finish_dynamic_symbol. */
4664 if (info->shared && !dynamic_symbol_p)
1bbc9cec
RH
4665 elf64_alpha_emit_dynrel (output_bfd, info, sgot, srelgot,
4666 gotent->got_offset, 0,
4667 R_ALPHA_DTPMOD64, 0);
3765b1be
RH
4668
4669 if (dynamic_symbol_p || r_type == R_ALPHA_TLSLDM)
4670 value = 0;
4671 else
4672 {
e1918d23 4673 BFD_ASSERT (elf_hash_table (info)->tls_sec != NULL);
3765b1be
RH
4674 value -= dtp_base;
4675 }
4676 bfd_put_64 (output_bfd, value,
4677 sgot->contents + gotent->got_offset + 8);
4678 }
4679
4680 value = (sgot->output_section->vma
4681 + sgot->output_offset
4682 + gotent->got_offset);
4683 value -= gp;
4684 goto default_reloc;
4685
4686 case R_ALPHA_DTPRELHI:
4687 case R_ALPHA_DTPRELLO:
4688 case R_ALPHA_DTPREL16:
4689 if (dynamic_symbol_p)
4690 {
4691 (*_bfd_error_handler)
d003868e
AM
4692 (_("%B: dtp-relative relocation against dynamic symbol %s"),
4693 input_bfd, h->root.root.root.string);
b34976b6 4694 ret_val = FALSE;
3765b1be 4695 }
e1918d23 4696 BFD_ASSERT (elf_hash_table (info)->tls_sec != NULL);
3765b1be 4697 value -= dtp_base;
9e756d64
RH
4698 if (r_type == R_ALPHA_DTPRELHI)
4699 value = ((bfd_signed_vma) value >> 16) + ((value >> 15) & 1);
3765b1be
RH
4700 goto default_reloc;
4701
4702 case R_ALPHA_TPRELHI:
4703 case R_ALPHA_TPRELLO:
4704 case R_ALPHA_TPREL16:
e366eeae 4705 if (info->shared && !info->pie)
9e756d64
RH
4706 {
4707 (*_bfd_error_handler)
d003868e
AM
4708 (_("%B: TLS local exec code cannot be linked into shared objects"),
4709 input_bfd);
b34976b6 4710 ret_val = FALSE;
9e756d64
RH
4711 }
4712 else if (dynamic_symbol_p)
3765b1be
RH
4713 {
4714 (*_bfd_error_handler)
d003868e
AM
4715 (_("%B: tp-relative relocation against dynamic symbol %s"),
4716 input_bfd, h->root.root.root.string);
b34976b6 4717 ret_val = FALSE;
3765b1be 4718 }
e1918d23 4719 BFD_ASSERT (elf_hash_table (info)->tls_sec != NULL);
3765b1be 4720 value -= tp_base;
9e756d64
RH
4721 if (r_type == R_ALPHA_TPRELHI)
4722 value = ((bfd_signed_vma) value >> 16) + ((value >> 15) & 1);
3765b1be
RH
4723 goto default_reloc;
4724
4725 case R_ALPHA_GOTDTPREL:
4726 case R_ALPHA_GOTTPREL:
4727 BFD_ASSERT(sgot != NULL);
4728 BFD_ASSERT(gp != 0);
4729 BFD_ASSERT(gotent != NULL);
4730 BFD_ASSERT(gotent->use_count >= 1);
4731
4732 if (!gotent->reloc_done)
4733 {
4734 gotent->reloc_done = 1;
4735
4736 if (dynamic_symbol_p)
4737 value = 0;
4738 else
4739 {
e1918d23 4740 BFD_ASSERT (elf_hash_table (info)->tls_sec != NULL);
1bbc9cec
RH
4741 if (r_type == R_ALPHA_GOTDTPREL)
4742 value -= dtp_base;
4743 else if (!info->shared)
4744 value -= tp_base;
4745 else
4746 {
4747 elf64_alpha_emit_dynrel (output_bfd, info, sgot, srelgot,
4748 gotent->got_offset, 0,
4749 R_ALPHA_TPREL64,
4750 value - dtp_base);
4751 value = 0;
4752 }
3765b1be
RH
4753 }
4754 bfd_put_64 (output_bfd, value,
4755 sgot->contents + gotent->got_offset);
4756 }
4757
4758 value = (sgot->output_section->vma
4759 + sgot->output_offset
4760 + gotent->got_offset);
4761 value -= gp;
4762 goto default_reloc;
4763
252b5132
RH
4764 default:
4765 default_reloc:
4766 r = _bfd_final_link_relocate (howto, input_bfd, input_section,
3765b1be 4767 contents, rel->r_offset, value, 0);
252b5132
RH
4768 break;
4769 }
4770
4771 switch (r)
4772 {
4773 case bfd_reloc_ok:
4774 break;
4775
4776 case bfd_reloc_overflow:
4777 {
4778 const char *name;
4779
ed4de5e2
JJ
4780 /* Don't warn if the overflow is due to pc relative reloc
4781 against discarded section. Section optimization code should
4782 handle it. */
4783
4784 if (r_symndx < symtab_hdr->sh_info
4785 && sec != NULL && howto->pc_relative
dbaa2011 4786 && discarded_section (sec))
ed4de5e2
JJ
4787 break;
4788
252b5132 4789 if (h != NULL)
dfeffb9f 4790 name = NULL;
252b5132
RH
4791 else
4792 {
4793 name = (bfd_elf_string_from_elf_section
4794 (input_bfd, symtab_hdr->sh_link, sym->st_name));
4795 if (name == NULL)
b34976b6 4796 return FALSE;
252b5132
RH
4797 if (*name == '\0')
4798 name = bfd_section_name (input_bfd, sec);
4799 }
4800 if (! ((*info->callbacks->reloc_overflow)
dfeffb9f
L
4801 (info, (h ? &h->root.root : NULL), name, howto->name,
4802 (bfd_vma) 0, input_bfd, input_section,
4803 rel->r_offset)))
b34976b6 4804 ret_val = FALSE;
252b5132
RH
4805 }
4806 break;
4807
4808 default:
4809 case bfd_reloc_outofrange:
4810 abort ();
4811 }
4812 }
4813
f16fbd61 4814 return ret_val;
252b5132
RH
4815}
4816
4817/* Finish up dynamic symbol handling. We set the contents of various
4818 dynamic sections here. */
4819
b34976b6 4820static bfd_boolean
a7519a3c
RH
4821elf64_alpha_finish_dynamic_symbol (bfd *output_bfd, struct bfd_link_info *info,
4822 struct elf_link_hash_entry *h,
4823 Elf_Internal_Sym *sym)
252b5132 4824{
6ec7057a 4825 struct alpha_elf_link_hash_entry *ah = (struct alpha_elf_link_hash_entry *)h;
252b5132
RH
4826 bfd *dynobj = elf_hash_table(info)->dynobj;
4827
6ec7057a 4828 if (h->needs_plt)
252b5132
RH
4829 {
4830 /* Fill in the .plt entry for this symbol. */
4831 asection *splt, *sgot, *srel;
4832 Elf_Internal_Rela outrel;
947216bf 4833 bfd_byte *loc;
252b5132
RH
4834 bfd_vma got_addr, plt_addr;
4835 bfd_vma plt_index;
4836 struct alpha_elf_got_entry *gotent;
4837
4838 BFD_ASSERT (h->dynindx != -1);
4839
3d4d4302 4840 splt = bfd_get_linker_section (dynobj, ".plt");
252b5132 4841 BFD_ASSERT (splt != NULL);
3d4d4302 4842 srel = bfd_get_linker_section (dynobj, ".rela.plt");
252b5132 4843 BFD_ASSERT (srel != NULL);
252b5132 4844
6ec7057a
RH
4845 for (gotent = ah->got_entries; gotent ; gotent = gotent->next)
4846 if (gotent->reloc_type == R_ALPHA_LITERAL
4847 && gotent->use_count > 0)
4848 {
4849 unsigned int insn;
4850 int disp;
252b5132 4851
6ec7057a
RH
4852 sgot = alpha_elf_tdata (gotent->gotobj)->got;
4853 BFD_ASSERT (sgot != NULL);
252b5132 4854
6ec7057a
RH
4855 BFD_ASSERT (gotent->got_offset != -1);
4856 BFD_ASSERT (gotent->plt_offset != -1);
252b5132 4857
6ec7057a
RH
4858 got_addr = (sgot->output_section->vma
4859 + sgot->output_offset
4860 + gotent->got_offset);
4861 plt_addr = (splt->output_section->vma
4862 + splt->output_offset
4863 + gotent->plt_offset);
252b5132 4864
6ec7057a 4865 plt_index = (gotent->plt_offset-PLT_HEADER_SIZE) / PLT_ENTRY_SIZE;
252b5132 4866
6ec7057a
RH
4867 /* Fill in the entry in the procedure linkage table. */
4868 if (elf64_alpha_use_secureplt)
4869 {
4870 disp = (PLT_HEADER_SIZE - 4) - (gotent->plt_offset + 4);
4871 insn = INSN_AD (INSN_BR, 31, disp);
4872 bfd_put_32 (output_bfd, insn,
4873 splt->contents + gotent->plt_offset);
252b5132 4874
6ec7057a
RH
4875 plt_index = ((gotent->plt_offset - NEW_PLT_HEADER_SIZE)
4876 / NEW_PLT_ENTRY_SIZE);
4877 }
4878 else
4879 {
4880 disp = -(gotent->plt_offset + 4);
4881 insn = INSN_AD (INSN_BR, 28, disp);
4882 bfd_put_32 (output_bfd, insn,
4883 splt->contents + gotent->plt_offset);
4884 bfd_put_32 (output_bfd, INSN_UNOP,
4885 splt->contents + gotent->plt_offset + 4);
4886 bfd_put_32 (output_bfd, INSN_UNOP,
4887 splt->contents + gotent->plt_offset + 8);
4888
4889 plt_index = ((gotent->plt_offset - OLD_PLT_HEADER_SIZE)
4890 / OLD_PLT_ENTRY_SIZE);
4891 }
252b5132 4892
6ec7057a
RH
4893 /* Fill in the entry in the .rela.plt section. */
4894 outrel.r_offset = got_addr;
4895 outrel.r_info = ELF64_R_INFO(h->dynindx, R_ALPHA_JMP_SLOT);
4896 outrel.r_addend = 0;
252b5132 4897
6ec7057a
RH
4898 loc = srel->contents + plt_index * sizeof (Elf64_External_Rela);
4899 bfd_elf64_swap_reloca_out (output_bfd, &outrel, loc);
252b5132 4900
6ec7057a
RH
4901 /* Fill in the entry in the .got. */
4902 bfd_put_64 (output_bfd, plt_addr,
4903 sgot->contents + gotent->got_offset);
4904 }
252b5132
RH
4905 }
4906 else if (alpha_elf_dynamic_symbol_p (h, info))
4907 {
4908 /* Fill in the dynamic relocations for this symbol's .got entries. */
4909 asection *srel;
252b5132
RH
4910 struct alpha_elf_got_entry *gotent;
4911
3d4d4302 4912 srel = bfd_get_linker_section (dynobj, ".rela.got");
252b5132
RH
4913 BFD_ASSERT (srel != NULL);
4914
252b5132
RH
4915 for (gotent = ((struct alpha_elf_link_hash_entry *) h)->got_entries;
4916 gotent != NULL;
4917 gotent = gotent->next)
4918 {
f44f99a5 4919 asection *sgot;
1bbc9cec 4920 long r_type;
3765b1be 4921
f44f99a5
RH
4922 if (gotent->use_count == 0)
4923 continue;
4924
4925 sgot = alpha_elf_tdata (gotent->gotobj)->got;
3765b1be
RH
4926
4927 r_type = gotent->reloc_type;
4928 switch (r_type)
4929 {
4930 case R_ALPHA_LITERAL:
4931 r_type = R_ALPHA_GLOB_DAT;
4932 break;
4933 case R_ALPHA_TLSGD:
4934 r_type = R_ALPHA_DTPMOD64;
4935 break;
4936 case R_ALPHA_GOTDTPREL:
4937 r_type = R_ALPHA_DTPREL64;
4938 break;
4939 case R_ALPHA_GOTTPREL:
4940 r_type = R_ALPHA_TPREL64;
4941 break;
4942 case R_ALPHA_TLSLDM:
4943 default:
4944 abort ();
4945 }
4946
68ffbac6 4947 elf64_alpha_emit_dynrel (output_bfd, info, sgot, srel,
1bbc9cec
RH
4948 gotent->got_offset, h->dynindx,
4949 r_type, gotent->addend);
3765b1be
RH
4950
4951 if (gotent->reloc_type == R_ALPHA_TLSGD)
68ffbac6 4952 elf64_alpha_emit_dynrel (output_bfd, info, sgot, srel,
1bbc9cec
RH
4953 gotent->got_offset + 8, h->dynindx,
4954 R_ALPHA_DTPREL64, gotent->addend);
252b5132
RH
4955 }
4956 }
4957
4958 /* Mark some specially defined symbols as absolute. */
9637f6ef 4959 if (h == elf_hash_table (info)->hdynamic
22edb2f1
RS
4960 || h == elf_hash_table (info)->hgot
4961 || h == elf_hash_table (info)->hplt)
252b5132
RH
4962 sym->st_shndx = SHN_ABS;
4963
b34976b6 4964 return TRUE;
252b5132
RH
4965}
4966
4967/* Finish up the dynamic sections. */
4968
b34976b6 4969static bfd_boolean
a7519a3c
RH
4970elf64_alpha_finish_dynamic_sections (bfd *output_bfd,
4971 struct bfd_link_info *info)
252b5132
RH
4972{
4973 bfd *dynobj;
4974 asection *sdyn;
4975
4976 dynobj = elf_hash_table (info)->dynobj;
3d4d4302 4977 sdyn = bfd_get_linker_section (dynobj, ".dynamic");
252b5132
RH
4978
4979 if (elf_hash_table (info)->dynamic_sections_created)
4980 {
6ec7057a 4981 asection *splt, *sgotplt, *srelaplt;
252b5132 4982 Elf64_External_Dyn *dyncon, *dynconend;
6ec7057a 4983 bfd_vma plt_vma, gotplt_vma;
252b5132 4984
3d4d4302
AM
4985 splt = bfd_get_linker_section (dynobj, ".plt");
4986 srelaplt = bfd_get_linker_section (output_bfd, ".rela.plt");
252b5132
RH
4987 BFD_ASSERT (splt != NULL && sdyn != NULL);
4988
6ec7057a
RH
4989 plt_vma = splt->output_section->vma + splt->output_offset;
4990
4991 gotplt_vma = 0;
4992 if (elf64_alpha_use_secureplt)
4993 {
3d4d4302 4994 sgotplt = bfd_get_linker_section (dynobj, ".got.plt");
6ec7057a
RH
4995 BFD_ASSERT (sgotplt != NULL);
4996 if (sgotplt->size > 0)
4997 gotplt_vma = sgotplt->output_section->vma + sgotplt->output_offset;
4998 }
4999
252b5132 5000 dyncon = (Elf64_External_Dyn *) sdyn->contents;
eea6121a 5001 dynconend = (Elf64_External_Dyn *) (sdyn->contents + sdyn->size);
252b5132
RH
5002 for (; dyncon < dynconend; dyncon++)
5003 {
5004 Elf_Internal_Dyn dyn;
252b5132
RH
5005
5006 bfd_elf64_swap_dyn_in (dynobj, dyncon, &dyn);
5007
5008 switch (dyn.d_tag)
5009 {
5010 case DT_PLTGOT:
6ec7057a
RH
5011 dyn.d_un.d_ptr
5012 = elf64_alpha_use_secureplt ? gotplt_vma : plt_vma;
5013 break;
252b5132 5014 case DT_PLTRELSZ:
6ec7057a
RH
5015 dyn.d_un.d_val = srelaplt ? srelaplt->size : 0;
5016 break;
252b5132 5017 case DT_JMPREL:
6ec7057a
RH
5018 dyn.d_un.d_ptr = srelaplt ? srelaplt->vma : 0;
5019 break;
252b5132
RH
5020
5021 case DT_RELASZ:
5022 /* My interpretation of the TIS v1.1 ELF document indicates
5023 that RELASZ should not include JMPREL. This is not what
5024 the rest of the BFD does. It is, however, what the
5025 glibc ld.so wants. Do this fixup here until we found
5026 out who is right. */
6ec7057a
RH
5027 if (srelaplt)
5028 dyn.d_un.d_val -= srelaplt->size;
252b5132
RH
5029 break;
5030 }
5031
5032 bfd_elf64_swap_dyn_out (output_bfd, &dyn, dyncon);
5033 }
5034
6ec7057a 5035 /* Initialize the plt header. */
eea6121a 5036 if (splt->size > 0)
252b5132 5037 {
6ec7057a
RH
5038 unsigned int insn;
5039 int ofs;
5040
5041 if (elf64_alpha_use_secureplt)
5042 {
5043 ofs = gotplt_vma - (plt_vma + PLT_HEADER_SIZE);
5044
5045 insn = INSN_ABC (INSN_SUBQ, 27, 28, 25);
5046 bfd_put_32 (output_bfd, insn, splt->contents);
5047
5048 insn = INSN_ABO (INSN_LDAH, 28, 28, (ofs + 0x8000) >> 16);
5049 bfd_put_32 (output_bfd, insn, splt->contents + 4);
5050
5051 insn = INSN_ABC (INSN_S4SUBQ, 25, 25, 25);
5052 bfd_put_32 (output_bfd, insn, splt->contents + 8);
5053
5054 insn = INSN_ABO (INSN_LDA, 28, 28, ofs);
5055 bfd_put_32 (output_bfd, insn, splt->contents + 12);
5056
5057 insn = INSN_ABO (INSN_LDQ, 27, 28, 0);
5058 bfd_put_32 (output_bfd, insn, splt->contents + 16);
5059
5060 insn = INSN_ABC (INSN_ADDQ, 25, 25, 25);
5061 bfd_put_32 (output_bfd, insn, splt->contents + 20);
5062
5063 insn = INSN_ABO (INSN_LDQ, 28, 28, 8);
5064 bfd_put_32 (output_bfd, insn, splt->contents + 24);
5065
5066 insn = INSN_AB (INSN_JMP, 31, 27);
5067 bfd_put_32 (output_bfd, insn, splt->contents + 28);
5068
5069 insn = INSN_AD (INSN_BR, 28, -PLT_HEADER_SIZE);
5070 bfd_put_32 (output_bfd, insn, splt->contents + 32);
5071 }
5072 else
5073 {
5074 insn = INSN_AD (INSN_BR, 27, 0); /* br $27, .+4 */
5075 bfd_put_32 (output_bfd, insn, splt->contents);
5076
5077 insn = INSN_ABO (INSN_LDQ, 27, 27, 12);
5078 bfd_put_32 (output_bfd, insn, splt->contents + 4);
5079
5080 insn = INSN_UNOP;
5081 bfd_put_32 (output_bfd, insn, splt->contents + 8);
5082
5083 insn = INSN_AB (INSN_JMP, 27, 27);
5084 bfd_put_32 (output_bfd, insn, splt->contents + 12);
5085
5086 /* The next two words will be filled in by ld.so. */
5087 bfd_put_64 (output_bfd, 0, splt->contents + 16);
5088 bfd_put_64 (output_bfd, 0, splt->contents + 24);
5089 }
252b5132 5090
eecdbe52 5091 elf_section_data (splt->output_section)->this_hdr.sh_entsize = 0;
252b5132
RH
5092 }
5093 }
5094
b34976b6 5095 return TRUE;
252b5132
RH
5096}
5097
96e2734b
RH
5098/* We need to use a special link routine to handle the .mdebug section.
5099 We need to merge all instances of these sections together, not write
5100 them all out sequentially. */
252b5132 5101
b34976b6 5102static bfd_boolean
a7519a3c 5103elf64_alpha_final_link (bfd *abfd, struct bfd_link_info *info)
252b5132
RH
5104{
5105 asection *o;
5106 struct bfd_link_order *p;
96e2734b 5107 asection *mdebug_sec;
252b5132
RH
5108 struct ecoff_debug_info debug;
5109 const struct ecoff_debug_swap *swap
5110 = get_elf_backend_data (abfd)->elf_backend_ecoff_debug_swap;
5111 HDRR *symhdr = &debug.symbolic_header;
4dfe6ac6
NC
5112 void * mdebug_handle = NULL;
5113 struct alpha_elf_link_hash_table * htab;
5114
5115 htab = alpha_elf_hash_table (info);
5116 if (htab == NULL)
5117 return FALSE;
252b5132 5118
96e2734b 5119 /* Go through the sections and collect the mdebug information. */
252b5132 5120 mdebug_sec = NULL;
252b5132
RH
5121 for (o = abfd->sections; o != (asection *) NULL; o = o->next)
5122 {
252b5132
RH
5123 if (strcmp (o->name, ".mdebug") == 0)
5124 {
5125 struct extsym_info einfo;
5126
5127 /* We have found the .mdebug section in the output file.
5128 Look through all the link_orders comprising it and merge
5129 the information together. */
5130 symhdr->magic = swap->sym_magic;
5131 /* FIXME: What should the version stamp be? */
5132 symhdr->vstamp = 0;
5133 symhdr->ilineMax = 0;
5134 symhdr->cbLine = 0;
5135 symhdr->idnMax = 0;
5136 symhdr->ipdMax = 0;
5137 symhdr->isymMax = 0;
5138 symhdr->ioptMax = 0;
5139 symhdr->iauxMax = 0;
5140 symhdr->issMax = 0;
5141 symhdr->issExtMax = 0;
5142 symhdr->ifdMax = 0;
5143 symhdr->crfd = 0;
5144 symhdr->iextMax = 0;
5145
5146 /* We accumulate the debugging information itself in the
5147 debug_info structure. */
5148 debug.line = NULL;
5149 debug.external_dnr = NULL;
5150 debug.external_pdr = NULL;
5151 debug.external_sym = NULL;
5152 debug.external_opt = NULL;
5153 debug.external_aux = NULL;
5154 debug.ss = NULL;
5155 debug.ssext = debug.ssext_end = NULL;
5156 debug.external_fdr = NULL;
5157 debug.external_rfd = NULL;
5158 debug.external_ext = debug.external_ext_end = NULL;
5159
5160 mdebug_handle = bfd_ecoff_debug_init (abfd, &debug, swap, info);
2c3fc389 5161 if (mdebug_handle == NULL)
b34976b6 5162 return FALSE;
252b5132
RH
5163
5164 if (1)
5165 {
5166 asection *s;
5167 EXTR esym;
52b9d213 5168 bfd_vma last = 0;
252b5132
RH
5169 unsigned int i;
5170 static const char * const name[] =
5171 {
5172 ".text", ".init", ".fini", ".data",
5173 ".rodata", ".sdata", ".sbss", ".bss"
5174 };
5175 static const int sc[] = { scText, scInit, scFini, scData,
5176 scRData, scSData, scSBss, scBss };
5177
5178 esym.jmptbl = 0;
5179 esym.cobol_main = 0;
5180 esym.weakext = 0;
5181 esym.reserved = 0;
5182 esym.ifd = ifdNil;
5183 esym.asym.iss = issNil;
5184 esym.asym.st = stLocal;
5185 esym.asym.reserved = 0;
5186 esym.asym.index = indexNil;
5187 for (i = 0; i < 8; i++)
5188 {
5189 esym.asym.sc = sc[i];
5190 s = bfd_get_section_by_name (abfd, name[i]);
5191 if (s != NULL)
5192 {
5193 esym.asym.value = s->vma;
eea6121a 5194 last = s->vma + s->size;
252b5132
RH
5195 }
5196 else
5197 esym.asym.value = last;
5198
5199 if (! bfd_ecoff_debug_one_external (abfd, &debug, swap,
5200 name[i], &esym))
b34976b6 5201 return FALSE;
252b5132
RH
5202 }
5203 }
5204
8423293d 5205 for (p = o->map_head.link_order;
252b5132
RH
5206 p != (struct bfd_link_order *) NULL;
5207 p = p->next)
5208 {
5209 asection *input_section;
5210 bfd *input_bfd;
5211 const struct ecoff_debug_swap *input_swap;
5212 struct ecoff_debug_info input_debug;
5213 char *eraw_src;
5214 char *eraw_end;
5215
5216 if (p->type != bfd_indirect_link_order)
5217 {
fd96f80f 5218 if (p->type == bfd_data_link_order)
252b5132
RH
5219 continue;
5220 abort ();
5221 }
5222
5223 input_section = p->u.indirect.section;
5224 input_bfd = input_section->owner;
5225
0ffa91dd
NC
5226 if (! is_alpha_elf (input_bfd))
5227 /* I don't know what a non ALPHA ELF bfd would be
5228 doing with a .mdebug section, but I don't really
5229 want to deal with it. */
5230 continue;
252b5132
RH
5231
5232 input_swap = (get_elf_backend_data (input_bfd)
5233 ->elf_backend_ecoff_debug_swap);
5234
eea6121a 5235 BFD_ASSERT (p->size == input_section->size);
252b5132
RH
5236
5237 /* The ECOFF linking code expects that we have already
5238 read in the debugging information and set up an
5239 ecoff_debug_info structure, so we do that now. */
5240 if (!elf64_alpha_read_ecoff_info (input_bfd, input_section,
5241 &input_debug))
b34976b6 5242 return FALSE;
252b5132
RH
5243
5244 if (! (bfd_ecoff_debug_accumulate
5245 (mdebug_handle, abfd, &debug, swap, input_bfd,
5246 &input_debug, input_swap, info)))
b34976b6 5247 return FALSE;
252b5132
RH
5248
5249 /* Loop through the external symbols. For each one with
5250 interesting information, try to find the symbol in
5251 the linker global hash table and save the information
5252 for the output external symbols. */
21d799b5 5253 eraw_src = (char *) input_debug.external_ext;
252b5132
RH
5254 eraw_end = (eraw_src
5255 + (input_debug.symbolic_header.iextMax
5256 * input_swap->external_ext_size));
5257 for (;
5258 eraw_src < eraw_end;
5259 eraw_src += input_swap->external_ext_size)
5260 {
5261 EXTR ext;
5262 const char *name;
5263 struct alpha_elf_link_hash_entry *h;
5264
2c3fc389 5265 (*input_swap->swap_ext_in) (input_bfd, eraw_src, &ext);
252b5132
RH
5266 if (ext.asym.sc == scNil
5267 || ext.asym.sc == scUndefined
5268 || ext.asym.sc == scSUndefined)
5269 continue;
5270
5271 name = input_debug.ssext + ext.asym.iss;
4dfe6ac6 5272 h = alpha_elf_link_hash_lookup (htab, name, FALSE, FALSE, TRUE);
252b5132
RH
5273 if (h == NULL || h->esym.ifd != -2)
5274 continue;
5275
5276 if (ext.ifd != -1)
5277 {
5278 BFD_ASSERT (ext.ifd
5279 < input_debug.symbolic_header.ifdMax);
5280 ext.ifd = input_debug.ifdmap[ext.ifd];
5281 }
5282
5283 h->esym = ext;
5284 }
5285
5286 /* Free up the information we just read. */
5287 free (input_debug.line);
5288 free (input_debug.external_dnr);
5289 free (input_debug.external_pdr);
5290 free (input_debug.external_sym);
5291 free (input_debug.external_opt);
5292 free (input_debug.external_aux);
5293 free (input_debug.ss);
5294 free (input_debug.ssext);
5295 free (input_debug.external_fdr);
5296 free (input_debug.external_rfd);
5297 free (input_debug.external_ext);
5298
5299 /* Hack: reset the SEC_HAS_CONTENTS flag so that
5300 elf_link_input_bfd ignores this section. */
5301 input_section->flags &=~ SEC_HAS_CONTENTS;
5302 }
5303
252b5132
RH
5304 /* Build the external symbol information. */
5305 einfo.abfd = abfd;
5306 einfo.info = info;
5307 einfo.debug = &debug;
5308 einfo.swap = swap;
b34976b6 5309 einfo.failed = FALSE;
252b5132
RH
5310 elf_link_hash_traverse (elf_hash_table (info),
5311 elf64_alpha_output_extsym,
2c3fc389 5312 &einfo);
252b5132 5313 if (einfo.failed)
b34976b6 5314 return FALSE;
252b5132
RH
5315
5316 /* Set the size of the .mdebug section. */
eea6121a 5317 o->size = bfd_ecoff_debug_size (abfd, &debug, swap);
252b5132
RH
5318
5319 /* Skip this section later on (I don't think this currently
5320 matters, but someday it might). */
8423293d 5321 o->map_head.link_order = (struct bfd_link_order *) NULL;
252b5132
RH
5322
5323 mdebug_sec = o;
5324 }
252b5132
RH
5325 }
5326
5327 /* Invoke the regular ELF backend linker to do all the work. */
c152c796 5328 if (! bfd_elf_final_link (abfd, info))
b34976b6 5329 return FALSE;
252b5132
RH
5330
5331 /* Now write out the computed sections. */
5332
5333 /* The .got subsections... */
5334 {
5335 bfd *i, *dynobj = elf_hash_table(info)->dynobj;
4dfe6ac6 5336 for (i = htab->got_list;
252b5132
RH
5337 i != NULL;
5338 i = alpha_elf_tdata(i)->got_link_next)
5339 {
5340 asection *sgot;
5341
5342 /* elf_bfd_final_link already did everything in dynobj. */
5343 if (i == dynobj)
5344 continue;
5345
5346 sgot = alpha_elf_tdata(i)->got;
5347 if (! bfd_set_section_contents (abfd, sgot->output_section,
dc810e39
AM
5348 sgot->contents,
5349 (file_ptr) sgot->output_offset,
eea6121a 5350 sgot->size))
b34976b6 5351 return FALSE;
252b5132
RH
5352 }
5353 }
5354
252b5132
RH
5355 if (mdebug_sec != (asection *) NULL)
5356 {
5357 BFD_ASSERT (abfd->output_has_begun);
5358 if (! bfd_ecoff_write_accumulated_debug (mdebug_handle, abfd, &debug,
5359 swap, info,
5360 mdebug_sec->filepos))
b34976b6 5361 return FALSE;
252b5132
RH
5362
5363 bfd_ecoff_debug_free (mdebug_handle, abfd, &debug, swap, info);
5364 }
5365
b34976b6 5366 return TRUE;
252b5132 5367}
fcfbdf31
JJ
5368
5369static enum elf_reloc_type_class
7e612e98
AM
5370elf64_alpha_reloc_type_class (const struct bfd_link_info *info ATTRIBUTE_UNUSED,
5371 const asection *rel_sec ATTRIBUTE_UNUSED,
5372 const Elf_Internal_Rela *rela)
fcfbdf31 5373{
f51e552e 5374 switch ((int) ELF64_R_TYPE (rela->r_info))
fcfbdf31
JJ
5375 {
5376 case R_ALPHA_RELATIVE:
5377 return reloc_class_relative;
5378 case R_ALPHA_JMP_SLOT:
5379 return reloc_class_plt;
5380 case R_ALPHA_COPY:
5381 return reloc_class_copy;
5382 default:
5383 return reloc_class_normal;
5384 }
5385}
252b5132 5386\f
b35d266b 5387static const struct bfd_elf_special_section elf64_alpha_special_sections[] =
2f89ff8d 5388{
0112cd26
NC
5389 { STRING_COMMA_LEN (".sbss"), -2, SHT_NOBITS, SHF_ALLOC + SHF_WRITE + SHF_ALPHA_GPREL },
5390 { STRING_COMMA_LEN (".sdata"), -2, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE + SHF_ALPHA_GPREL },
5391 { NULL, 0, 0, 0, 0 }
2f89ff8d
L
5392};
5393
252b5132
RH
5394/* ECOFF swapping routines. These are used when dealing with the
5395 .mdebug section, which is in the ECOFF debugging format. Copied
fe8bc63d 5396 from elf32-mips.c. */
252b5132
RH
5397static const struct ecoff_debug_swap
5398elf64_alpha_ecoff_debug_swap =
5399{
5400 /* Symbol table magic number. */
5401 magicSym2,
5402 /* Alignment of debugging information. E.g., 4. */
5403 8,
5404 /* Sizes of external symbolic information. */
5405 sizeof (struct hdr_ext),
5406 sizeof (struct dnr_ext),
5407 sizeof (struct pdr_ext),
5408 sizeof (struct sym_ext),
5409 sizeof (struct opt_ext),
5410 sizeof (struct fdr_ext),
5411 sizeof (struct rfd_ext),
5412 sizeof (struct ext_ext),
5413 /* Functions to swap in external symbolic data. */
5414 ecoff_swap_hdr_in,
5415 ecoff_swap_dnr_in,
5416 ecoff_swap_pdr_in,
5417 ecoff_swap_sym_in,
5418 ecoff_swap_opt_in,
5419 ecoff_swap_fdr_in,
5420 ecoff_swap_rfd_in,
5421 ecoff_swap_ext_in,
5422 _bfd_ecoff_swap_tir_in,
5423 _bfd_ecoff_swap_rndx_in,
5424 /* Functions to swap out external symbolic data. */
5425 ecoff_swap_hdr_out,
5426 ecoff_swap_dnr_out,
5427 ecoff_swap_pdr_out,
5428 ecoff_swap_sym_out,
5429 ecoff_swap_opt_out,
5430 ecoff_swap_fdr_out,
5431 ecoff_swap_rfd_out,
5432 ecoff_swap_ext_out,
5433 _bfd_ecoff_swap_tir_out,
5434 _bfd_ecoff_swap_rndx_out,
5435 /* Function to read in symbolic data. */
5436 elf64_alpha_read_ecoff_info
5437};
5438\f
70bcb145
JW
5439/* Use a non-standard hash bucket size of 8. */
5440
562ace6b 5441static const struct elf_size_info alpha_elf_size_info =
70bcb145
JW
5442{
5443 sizeof (Elf64_External_Ehdr),
5444 sizeof (Elf64_External_Phdr),
5445 sizeof (Elf64_External_Shdr),
5446 sizeof (Elf64_External_Rel),
5447 sizeof (Elf64_External_Rela),
5448 sizeof (Elf64_External_Sym),
5449 sizeof (Elf64_External_Dyn),
5450 sizeof (Elf_External_Note),
5451 8,
5452 1,
45d6a902 5453 64, 3,
70bcb145
JW
5454 ELFCLASS64, EV_CURRENT,
5455 bfd_elf64_write_out_phdrs,
5456 bfd_elf64_write_shdrs_and_ehdr,
1489a3a0 5457 bfd_elf64_checksum_contents,
70bcb145 5458 bfd_elf64_write_relocs,
73ff0d56 5459 bfd_elf64_swap_symbol_in,
70bcb145
JW
5460 bfd_elf64_swap_symbol_out,
5461 bfd_elf64_slurp_reloc_table,
5462 bfd_elf64_slurp_symbol_table,
5463 bfd_elf64_swap_dyn_in,
5464 bfd_elf64_swap_dyn_out,
947216bf
AM
5465 bfd_elf64_swap_reloc_in,
5466 bfd_elf64_swap_reloc_out,
5467 bfd_elf64_swap_reloca_in,
5468 bfd_elf64_swap_reloca_out
70bcb145
JW
5469};
5470
252b5132
RH
5471#define TARGET_LITTLE_SYM bfd_elf64_alpha_vec
5472#define TARGET_LITTLE_NAME "elf64-alpha"
5473#define ELF_ARCH bfd_arch_alpha
ae95ffa6 5474#define ELF_TARGET_ID ALPHA_ELF_DATA
56fc028e
AJ
5475#define ELF_MACHINE_CODE EM_ALPHA
5476#define ELF_MAXPAGESIZE 0x10000
24718e3b 5477#define ELF_COMMONPAGESIZE 0x2000
252b5132
RH
5478
5479#define bfd_elf64_bfd_link_hash_table_create \
5480 elf64_alpha_bfd_link_hash_table_create
5481
5482#define bfd_elf64_bfd_reloc_type_lookup \
5483 elf64_alpha_bfd_reloc_type_lookup
157090f7
AM
5484#define bfd_elf64_bfd_reloc_name_lookup \
5485 elf64_alpha_bfd_reloc_name_lookup
252b5132
RH
5486#define elf_info_to_howto \
5487 elf64_alpha_info_to_howto
5488
5489#define bfd_elf64_mkobject \
5490 elf64_alpha_mkobject
5491#define elf_backend_object_p \
5492 elf64_alpha_object_p
5493
5494#define elf_backend_section_from_shdr \
5495 elf64_alpha_section_from_shdr
204692d7
RH
5496#define elf_backend_section_flags \
5497 elf64_alpha_section_flags
252b5132
RH
5498#define elf_backend_fake_sections \
5499 elf64_alpha_fake_sections
5500
5501#define bfd_elf64_bfd_is_local_label_name \
5502 elf64_alpha_is_local_label_name
5503#define bfd_elf64_find_nearest_line \
5504 elf64_alpha_find_nearest_line
5505#define bfd_elf64_bfd_relax_section \
5506 elf64_alpha_relax_section
5507
5508#define elf_backend_add_symbol_hook \
5509 elf64_alpha_add_symbol_hook
13285a1b
AM
5510#define elf_backend_relocs_compatible \
5511 _bfd_elf_relocs_compatible
252b5132
RH
5512#define elf_backend_check_relocs \
5513 elf64_alpha_check_relocs
5514#define elf_backend_create_dynamic_sections \
5515 elf64_alpha_create_dynamic_sections
5516#define elf_backend_adjust_dynamic_symbol \
5517 elf64_alpha_adjust_dynamic_symbol
747ffa7b
AM
5518#define elf_backend_merge_symbol_attribute \
5519 elf64_alpha_merge_symbol_attribute
48f4b4f5
RH
5520#define elf_backend_copy_indirect_symbol \
5521 elf64_alpha_copy_indirect_symbol
252b5132
RH
5522#define elf_backend_always_size_sections \
5523 elf64_alpha_always_size_sections
5524#define elf_backend_size_dynamic_sections \
5525 elf64_alpha_size_dynamic_sections
74541ad4
AM
5526#define elf_backend_omit_section_dynsym \
5527 ((bfd_boolean (*) (bfd *, struct bfd_link_info *, asection *)) bfd_true)
252b5132
RH
5528#define elf_backend_relocate_section \
5529 elf64_alpha_relocate_section
5530#define elf_backend_finish_dynamic_symbol \
5531 elf64_alpha_finish_dynamic_symbol
5532#define elf_backend_finish_dynamic_sections \
5533 elf64_alpha_finish_dynamic_sections
5534#define bfd_elf64_bfd_final_link \
5535 elf64_alpha_final_link
fcfbdf31
JJ
5536#define elf_backend_reloc_type_class \
5537 elf64_alpha_reloc_type_class
252b5132 5538
e117360e
RH
5539#define elf_backend_can_gc_sections 1
5540#define elf_backend_gc_mark_hook elf64_alpha_gc_mark_hook
5541#define elf_backend_gc_sweep_hook elf64_alpha_gc_sweep_hook
5542
252b5132
RH
5543#define elf_backend_ecoff_debug_swap \
5544 &elf64_alpha_ecoff_debug_swap
5545
70bcb145
JW
5546#define elf_backend_size_info \
5547 alpha_elf_size_info
5548
29ef7005
L
5549#define elf_backend_special_sections \
5550 elf64_alpha_special_sections
2f89ff8d 5551
38b1a46c 5552/* A few constants that determine how the .plt section is set up. */
252b5132
RH
5553#define elf_backend_want_got_plt 0
5554#define elf_backend_plt_readonly 0
5555#define elf_backend_want_plt_sym 1
5556#define elf_backend_got_header_size 0
252b5132
RH
5557
5558#include "elf64-target.h"
2238051f
RH
5559\f
5560/* FreeBSD support. */
5561
5562#undef TARGET_LITTLE_SYM
5563#define TARGET_LITTLE_SYM bfd_elf64_alpha_freebsd_vec
5564#undef TARGET_LITTLE_NAME
5565#define TARGET_LITTLE_NAME "elf64-alpha-freebsd"
d1036acb
L
5566#undef ELF_OSABI
5567#define ELF_OSABI ELFOSABI_FREEBSD
2238051f
RH
5568
5569/* The kernel recognizes executables as valid only if they carry a
5570 "FreeBSD" label in the ELF header. So we put this label on all
5571 executables and (for simplicity) also all other object files. */
5572
2238051f 5573static void
a7519a3c
RH
5574elf64_alpha_fbsd_post_process_headers (bfd * abfd,
5575 struct bfd_link_info * link_info ATTRIBUTE_UNUSED)
2238051f
RH
5576{
5577 Elf_Internal_Ehdr * i_ehdrp; /* ELF file header, internal form. */
5578
5579 i_ehdrp = elf_elfheader (abfd);
5580
5581 /* Put an ABI label supported by FreeBSD >= 4.1. */
d1036acb 5582 i_ehdrp->e_ident[EI_OSABI] = get_elf_backend_data (abfd)->elf_osabi;
2238051f
RH
5583#ifdef OLD_FREEBSD_ABI_LABEL
5584 /* The ABI label supported by FreeBSD <= 4.0 is quite nonstandard. */
5585 memcpy (&i_ehdrp->e_ident[EI_ABIVERSION], "FreeBSD", 8);
5586#endif
5587}
5588
5589#undef elf_backend_post_process_headers
5590#define elf_backend_post_process_headers \
5591 elf64_alpha_fbsd_post_process_headers
5592
571fe01f 5593#undef elf64_bed
2238051f
RH
5594#define elf64_bed elf64_alpha_fbsd_bed
5595
5596#include "elf64-target.h"