]> git.ipfire.org Git - thirdparty/binutils-gdb.git/blame - bfd/elf64-alpha.c
ld -z combreloc elf_link_sort_relocs
[thirdparty/binutils-gdb.git] / bfd / elf64-alpha.c
CommitLineData
252b5132 1/* Alpha specific support for 64-bit ELF
6f2750fe 2 Copyright (C) 1996-2016 Free Software Foundation, Inc.
252b5132
RH
3 Contributed by Richard Henderson <rth@tamu.edu>.
4
571fe01f 5 This file is part of BFD, the Binary File Descriptor library.
252b5132 6
571fe01f
NC
7 This program is free software; you can redistribute it and/or modify
8 it under the terms of the GNU General Public License as published by
cd123cb7 9 the Free Software Foundation; either version 3 of the License, or
571fe01f 10 (at your option) any later version.
252b5132 11
571fe01f
NC
12 This program is distributed in the hope that it will be useful,
13 but WITHOUT ANY WARRANTY; without even the implied warranty of
14 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 GNU General Public License for more details.
252b5132 16
571fe01f
NC
17 You should have received a copy of the GNU General Public License
18 along with this program; if not, write to the Free Software
cd123cb7
NC
19 Foundation, Inc., 51 Franklin Street - Fifth Floor, Boston,
20 MA 02110-1301, USA. */
21
252b5132
RH
22
23/* We need a published ABI spec for this. Until one comes out, don't
24 assume this'll remain unchanged forever. */
25
252b5132 26#include "sysdep.h"
3db64b00 27#include "bfd.h"
252b5132
RH
28#include "libbfd.h"
29#include "elf-bfd.h"
30
31#include "elf/alpha.h"
32
33#define ALPHAECOFF
34
35#define NO_COFF_RELOCS
36#define NO_COFF_SYMBOLS
37#define NO_COFF_LINENOS
38
fe8bc63d 39/* Get the ECOFF swapping routines. Needed for the debug information. */
252b5132
RH
40#include "coff/internal.h"
41#include "coff/sym.h"
42#include "coff/symconst.h"
43#include "coff/ecoff.h"
44#include "coff/alpha.h"
45#include "aout/ar.h"
46#include "libcoff.h"
47#include "libecoff.h"
48#define ECOFF_64
49#include "ecoffswap.h"
50
6ec7057a
RH
51\f
52/* Instruction data for plt generation and relaxation. */
53
54#define OP_LDA 0x08
55#define OP_LDAH 0x09
56#define OP_LDQ 0x29
57#define OP_BR 0x30
58#define OP_BSR 0x34
59
60#define INSN_LDA (OP_LDA << 26)
61#define INSN_LDAH (OP_LDAH << 26)
62#define INSN_LDQ (OP_LDQ << 26)
63#define INSN_BR (OP_BR << 26)
64
65#define INSN_ADDQ 0x40000400
66#define INSN_RDUNIQ 0x0000009e
67#define INSN_SUBQ 0x40000520
68#define INSN_S4SUBQ 0x40000560
69#define INSN_UNOP 0x2ffe0000
70
71#define INSN_JSR 0x68004000
72#define INSN_JMP 0x68000000
73#define INSN_JSR_MASK 0xfc00c000
74
75#define INSN_A(I,A) (I | (A << 21))
76#define INSN_AB(I,A,B) (I | (A << 21) | (B << 16))
77#define INSN_ABC(I,A,B,C) (I | (A << 21) | (B << 16) | C)
78#define INSN_ABO(I,A,B,O) (I | (A << 21) | (B << 16) | ((O) & 0xffff))
79#define INSN_AD(I,A,D) (I | (A << 21) | (((D) >> 2) & 0x1fffff))
80
81/* PLT/GOT Stuff */
82
83/* Set by ld emulation. Putting this into the link_info or hash structure
84 is simply working too hard. */
85#ifdef USE_SECUREPLT
86bfd_boolean elf64_alpha_use_secureplt = TRUE;
87#else
88bfd_boolean elf64_alpha_use_secureplt = FALSE;
89#endif
90
91#define OLD_PLT_HEADER_SIZE 32
92#define OLD_PLT_ENTRY_SIZE 12
93#define NEW_PLT_HEADER_SIZE 36
94#define NEW_PLT_ENTRY_SIZE 4
95
96#define PLT_HEADER_SIZE \
97 (elf64_alpha_use_secureplt ? NEW_PLT_HEADER_SIZE : OLD_PLT_HEADER_SIZE)
98#define PLT_ENTRY_SIZE \
99 (elf64_alpha_use_secureplt ? NEW_PLT_ENTRY_SIZE : OLD_PLT_ENTRY_SIZE)
100
101#define MAX_GOT_SIZE (64*1024)
102
103#define ELF_DYNAMIC_INTERPRETER "/usr/lib/ld.so"
252b5132 104\f
21d799b5
NC
105
106/* Used to implement multiple .got subsections. */
107struct alpha_elf_got_entry
108{
109 struct alpha_elf_got_entry *next;
110
111 /* Which .got subsection? */
112 bfd *gotobj;
113
114 /* The addend in effect for this entry. */
115 bfd_vma addend;
116
117 /* The .got offset for this entry. */
118 int got_offset;
119
120 /* The .plt offset for this entry. */
121 int plt_offset;
122
123 /* How many references to this entry? */
124 int use_count;
125
126 /* The relocation type of this entry. */
127 unsigned char reloc_type;
128
129 /* How a LITERAL is used. */
130 unsigned char flags;
131
132 /* Have we initialized the dynamic relocation for this entry? */
133 unsigned char reloc_done;
134
135 /* Have we adjusted this entry for SEC_MERGE? */
136 unsigned char reloc_xlated;
137};
138
139struct alpha_elf_reloc_entry
140{
141 struct alpha_elf_reloc_entry *next;
142
143 /* Which .reloc section? */
144 asection *srel;
145
146 /* What kind of relocation? */
147 unsigned int rtype;
148
149 /* Is this against read-only section? */
150 unsigned int reltext : 1;
151
152 /* How many did we find? */
153 unsigned long count;
154};
155
252b5132
RH
156struct alpha_elf_link_hash_entry
157{
158 struct elf_link_hash_entry root;
159
160 /* External symbol information. */
161 EXTR esym;
162
163 /* Cumulative flags for all the .got entries. */
164 int flags;
165
9e756d64 166 /* Contexts in which a literal was referenced. */
8288a39e
RH
167#define ALPHA_ELF_LINK_HASH_LU_ADDR 0x01
168#define ALPHA_ELF_LINK_HASH_LU_MEM 0x02
169#define ALPHA_ELF_LINK_HASH_LU_BYTE 0x04
170#define ALPHA_ELF_LINK_HASH_LU_JSR 0x08
171#define ALPHA_ELF_LINK_HASH_LU_TLSGD 0x10
172#define ALPHA_ELF_LINK_HASH_LU_TLSLDM 0x20
173#define ALPHA_ELF_LINK_HASH_LU_JSRDIRECT 0x40
174#define ALPHA_ELF_LINK_HASH_LU_PLT 0x38
175#define ALPHA_ELF_LINK_HASH_TLS_IE 0x80
cc03ec80 176
252b5132 177 /* Used to implement multiple .got subsections. */
21d799b5 178 struct alpha_elf_got_entry *got_entries;
252b5132 179
571fe01f 180 /* Used to count non-got, non-plt relocations for delayed sizing
252b5132 181 of relocation sections. */
21d799b5 182 struct alpha_elf_reloc_entry *reloc_entries;
252b5132
RH
183};
184
185/* Alpha ELF linker hash table. */
186
187struct alpha_elf_link_hash_table
188{
189 struct elf_link_hash_table root;
190
191 /* The head of a list of .got subsections linked through
192 alpha_elf_tdata(abfd)->got_link_next. */
193 bfd *got_list;
4a828aab
RH
194
195 /* The most recent relax pass that we've seen. The GOTs
196 should be regenerated if this doesn't match. */
197 int relax_trip;
252b5132
RH
198};
199
200/* Look up an entry in a Alpha ELF linker hash table. */
201
202#define alpha_elf_link_hash_lookup(table, string, create, copy, follow) \
203 ((struct alpha_elf_link_hash_entry *) \
204 elf_link_hash_lookup (&(table)->root, (string), (create), \
205 (copy), (follow)))
206
207/* Traverse a Alpha ELF linker hash table. */
208
209#define alpha_elf_link_hash_traverse(table, func, info) \
210 (elf_link_hash_traverse \
211 (&(table)->root, \
2c3fc389 212 (bfd_boolean (*) (struct elf_link_hash_entry *, void *)) (func), \
252b5132
RH
213 (info)))
214
215/* Get the Alpha ELF linker hash table from a link_info structure. */
216
217#define alpha_elf_hash_table(p) \
4dfe6ac6
NC
218 (elf_hash_table_id ((struct elf_link_hash_table *) ((p)->hash)) \
219 == ALPHA_ELF_DATA ? ((struct alpha_elf_link_hash_table *) ((p)->hash)) : NULL)
252b5132
RH
220
221/* Get the object's symbols as our own entry type. */
222
223#define alpha_elf_sym_hashes(abfd) \
224 ((struct alpha_elf_link_hash_entry **)elf_sym_hashes(abfd))
225
68ffbac6 226/* Should we do dynamic things to this symbol? This differs from the
986a241f
RH
227 generic version in that we never need to consider function pointer
228 equality wrt PLT entries -- we don't create a PLT entry if a symbol's
229 address is ever taken. */
252b5132 230
986a241f 231static inline bfd_boolean
a7519a3c
RH
232alpha_elf_dynamic_symbol_p (struct elf_link_hash_entry *h,
233 struct bfd_link_info *info)
8fb35fed 234{
986a241f 235 return _bfd_elf_dynamic_symbol_p (h, info, 0);
8fb35fed 236}
252b5132
RH
237
238/* Create an entry in a Alpha ELF linker hash table. */
239
240static struct bfd_hash_entry *
a7519a3c
RH
241elf64_alpha_link_hash_newfunc (struct bfd_hash_entry *entry,
242 struct bfd_hash_table *table,
243 const char *string)
252b5132
RH
244{
245 struct alpha_elf_link_hash_entry *ret =
246 (struct alpha_elf_link_hash_entry *) entry;
247
248 /* Allocate the structure if it has not already been allocated by a
249 subclass. */
250 if (ret == (struct alpha_elf_link_hash_entry *) NULL)
251 ret = ((struct alpha_elf_link_hash_entry *)
252 bfd_hash_allocate (table,
253 sizeof (struct alpha_elf_link_hash_entry)));
254 if (ret == (struct alpha_elf_link_hash_entry *) NULL)
255 return (struct bfd_hash_entry *) ret;
256
257 /* Call the allocation method of the superclass. */
258 ret = ((struct alpha_elf_link_hash_entry *)
259 _bfd_elf_link_hash_newfunc ((struct bfd_hash_entry *) ret,
260 table, string));
261 if (ret != (struct alpha_elf_link_hash_entry *) NULL)
262 {
263 /* Set local fields. */
264 memset (&ret->esym, 0, sizeof (EXTR));
265 /* We use -2 as a marker to indicate that the information has
266 not been set. -1 means there is no associated ifd. */
267 ret->esym.ifd = -2;
268 ret->flags = 0;
269 ret->got_entries = NULL;
270 ret->reloc_entries = NULL;
271 }
272
273 return (struct bfd_hash_entry *) ret;
274}
275
276/* Create a Alpha ELF linker hash table. */
277
278static struct bfd_link_hash_table *
a7519a3c 279elf64_alpha_bfd_link_hash_table_create (bfd *abfd)
252b5132
RH
280{
281 struct alpha_elf_link_hash_table *ret;
dc810e39 282 bfd_size_type amt = sizeof (struct alpha_elf_link_hash_table);
252b5132 283
e2d34d7d 284 ret = (struct alpha_elf_link_hash_table *) bfd_zmalloc (amt);
252b5132
RH
285 if (ret == (struct alpha_elf_link_hash_table *) NULL)
286 return NULL;
287
66eb6687
AM
288 if (!_bfd_elf_link_hash_table_init (&ret->root, abfd,
289 elf64_alpha_link_hash_newfunc,
4dfe6ac6
NC
290 sizeof (struct alpha_elf_link_hash_entry),
291 ALPHA_ELF_DATA))
252b5132 292 {
e2d34d7d 293 free (ret);
252b5132
RH
294 return NULL;
295 }
296
297 return &ret->root.root;
298}
299\f
698600e4
AM
300/* Alpha ELF follows MIPS ELF in using a special find_nearest_line
301 routine in order to handle the ECOFF debugging information. */
302
303struct alpha_elf_find_line
304{
305 struct ecoff_debug_info d;
306 struct ecoff_find_line i;
307};
308
252b5132
RH
309/* We have some private fields hanging off of the elf_tdata structure. */
310
311struct alpha_elf_obj_tdata
312{
313 struct elf_obj_tdata root;
314
315 /* For every input file, these are the got entries for that object's
316 local symbols. */
317 struct alpha_elf_got_entry ** local_got_entries;
318
319 /* For every input file, this is the object that owns the got that
320 this input file uses. */
321 bfd *gotobj;
322
323 /* For every got, this is a linked list through the objects using this got */
324 bfd *in_got_link_next;
325
326 /* For every got, this is a link to the next got subsegment. */
327 bfd *got_link_next;
328
329 /* For every got, this is the section. */
330 asection *got;
331
3765b1be
RH
332 /* For every got, this is it's total number of words. */
333 int total_got_size;
252b5132 334
3765b1be 335 /* For every got, this is the sum of the number of words required
252b5132 336 to hold all of the member object's local got. */
3765b1be 337 int local_got_size;
698600e4
AM
338
339 /* Used by elf64_alpha_find_nearest_line entry point. */
340 struct alpha_elf_find_line *find_line_info;
341
252b5132
RH
342};
343
344#define alpha_elf_tdata(abfd) \
345 ((struct alpha_elf_obj_tdata *) (abfd)->tdata.any)
346
0ffa91dd
NC
347#define is_alpha_elf(bfd) \
348 (bfd_get_flavour (bfd) == bfd_target_elf_flavour \
349 && elf_tdata (bfd) != NULL \
4dfe6ac6 350 && elf_object_id (bfd) == ALPHA_ELF_DATA)
0ffa91dd 351
b34976b6 352static bfd_boolean
a7519a3c 353elf64_alpha_mkobject (bfd *abfd)
252b5132 354{
0ffa91dd 355 return bfd_elf_allocate_object (abfd, sizeof (struct alpha_elf_obj_tdata),
4dfe6ac6 356 ALPHA_ELF_DATA);
252b5132
RH
357}
358
b34976b6 359static bfd_boolean
a7519a3c 360elf64_alpha_object_p (bfd *abfd)
252b5132 361{
252b5132
RH
362 /* Set the right machine number for an Alpha ELF file. */
363 return bfd_default_set_arch_mach (abfd, bfd_arch_alpha, 0);
364}
365\f
a7519a3c
RH
366/* A relocation function which doesn't do anything. */
367
368static bfd_reloc_status_type
369elf64_alpha_reloc_nil (bfd *abfd ATTRIBUTE_UNUSED, arelent *reloc,
370 asymbol *sym ATTRIBUTE_UNUSED,
2c3fc389 371 void * data ATTRIBUTE_UNUSED, asection *sec,
a7519a3c
RH
372 bfd *output_bfd, char **error_message ATTRIBUTE_UNUSED)
373{
374 if (output_bfd)
375 reloc->address += sec->output_offset;
376 return bfd_reloc_ok;
377}
378
379/* A relocation function used for an unsupported reloc. */
380
381static bfd_reloc_status_type
382elf64_alpha_reloc_bad (bfd *abfd ATTRIBUTE_UNUSED, arelent *reloc,
383 asymbol *sym ATTRIBUTE_UNUSED,
2c3fc389 384 void * data ATTRIBUTE_UNUSED, asection *sec,
a7519a3c
RH
385 bfd *output_bfd, char **error_message ATTRIBUTE_UNUSED)
386{
387 if (output_bfd)
388 reloc->address += sec->output_offset;
389 return bfd_reloc_notsupported;
390}
391
392/* Do the work of the GPDISP relocation. */
393
394static bfd_reloc_status_type
395elf64_alpha_do_reloc_gpdisp (bfd *abfd, bfd_vma gpdisp, bfd_byte *p_ldah,
396 bfd_byte *p_lda)
397{
398 bfd_reloc_status_type ret = bfd_reloc_ok;
399 bfd_vma addend;
400 unsigned long i_ldah, i_lda;
401
402 i_ldah = bfd_get_32 (abfd, p_ldah);
403 i_lda = bfd_get_32 (abfd, p_lda);
404
405 /* Complain if the instructions are not correct. */
406 if (((i_ldah >> 26) & 0x3f) != 0x09
407 || ((i_lda >> 26) & 0x3f) != 0x08)
408 ret = bfd_reloc_dangerous;
409
410 /* Extract the user-supplied offset, mirroring the sign extensions
411 that the instructions perform. */
412 addend = ((i_ldah & 0xffff) << 16) | (i_lda & 0xffff);
413 addend = (addend ^ 0x80008000) - 0x80008000;
414
415 gpdisp += addend;
416
417 if ((bfd_signed_vma) gpdisp < -(bfd_signed_vma) 0x80000000
418 || (bfd_signed_vma) gpdisp >= (bfd_signed_vma) 0x7fff8000)
419 ret = bfd_reloc_overflow;
420
421 /* compensate for the sign extension again. */
422 i_ldah = ((i_ldah & 0xffff0000)
423 | (((gpdisp >> 16) + ((gpdisp >> 15) & 1)) & 0xffff));
424 i_lda = (i_lda & 0xffff0000) | (gpdisp & 0xffff);
425
426 bfd_put_32 (abfd, (bfd_vma) i_ldah, p_ldah);
427 bfd_put_32 (abfd, (bfd_vma) i_lda, p_lda);
428
429 return ret;
430}
431
432/* The special function for the GPDISP reloc. */
433
434static bfd_reloc_status_type
435elf64_alpha_reloc_gpdisp (bfd *abfd, arelent *reloc_entry,
2c3fc389 436 asymbol *sym ATTRIBUTE_UNUSED, void * data,
a7519a3c
RH
437 asection *input_section, bfd *output_bfd,
438 char **err_msg)
439{
440 bfd_reloc_status_type ret;
441 bfd_vma gp, relocation;
442 bfd_vma high_address;
443 bfd_byte *p_ldah, *p_lda;
444
445 /* Don't do anything if we're not doing a final link. */
446 if (output_bfd)
447 {
448 reloc_entry->address += input_section->output_offset;
449 return bfd_reloc_ok;
450 }
451
452 high_address = bfd_get_section_limit (abfd, input_section);
453 if (reloc_entry->address > high_address
454 || reloc_entry->address + reloc_entry->addend > high_address)
455 return bfd_reloc_outofrange;
456
457 /* The gp used in the portion of the output object to which this
458 input object belongs is cached on the input bfd. */
459 gp = _bfd_get_gp_value (abfd);
460
461 relocation = (input_section->output_section->vma
462 + input_section->output_offset
463 + reloc_entry->address);
464
465 p_ldah = (bfd_byte *) data + reloc_entry->address;
466 p_lda = p_ldah + reloc_entry->addend;
467
468 ret = elf64_alpha_do_reloc_gpdisp (abfd, gp - relocation, p_ldah, p_lda);
469
470 /* Complain if the instructions are not correct. */
471 if (ret == bfd_reloc_dangerous)
472 *err_msg = _("GPDISP relocation did not find ldah and lda instructions");
473
474 return ret;
475}
476
252b5132
RH
477/* In case we're on a 32-bit machine, construct a 64-bit "-1" value
478 from smaller values. Start with zero, widen, *then* decrement. */
479#define MINUS_ONE (((bfd_vma)0) - 1)
480
21d799b5 481
dfe57ca0 482#define SKIP_HOWTO(N) \
21d799b5 483 HOWTO(N, 0, 0, 0, 0, 0, complain_overflow_dont, elf64_alpha_reloc_bad, 0, 0, 0, 0, 0)
dfe57ca0 484
252b5132
RH
485static reloc_howto_type elf64_alpha_howto_table[] =
486{
487 HOWTO (R_ALPHA_NONE, /* type */
488 0, /* rightshift */
6346d5ca
AM
489 3, /* size (0 = byte, 1 = short, 2 = long) */
490 0, /* bitsize */
b34976b6 491 TRUE, /* pc_relative */
252b5132
RH
492 0, /* bitpos */
493 complain_overflow_dont, /* complain_on_overflow */
494 elf64_alpha_reloc_nil, /* special_function */
495 "NONE", /* name */
b34976b6 496 FALSE, /* partial_inplace */
252b5132
RH
497 0, /* src_mask */
498 0, /* dst_mask */
b34976b6 499 TRUE), /* pcrel_offset */
252b5132
RH
500
501 /* A 32 bit reference to a symbol. */
502 HOWTO (R_ALPHA_REFLONG, /* type */
503 0, /* rightshift */
504 2, /* size (0 = byte, 1 = short, 2 = long) */
505 32, /* bitsize */
b34976b6 506 FALSE, /* pc_relative */
252b5132
RH
507 0, /* bitpos */
508 complain_overflow_bitfield, /* complain_on_overflow */
bc1bc43f 509 bfd_elf_generic_reloc, /* special_function */
252b5132 510 "REFLONG", /* name */
b34976b6 511 FALSE, /* partial_inplace */
252b5132
RH
512 0xffffffff, /* src_mask */
513 0xffffffff, /* dst_mask */
b34976b6 514 FALSE), /* pcrel_offset */
252b5132
RH
515
516 /* A 64 bit reference to a symbol. */
517 HOWTO (R_ALPHA_REFQUAD, /* type */
518 0, /* rightshift */
519 4, /* size (0 = byte, 1 = short, 2 = long) */
520 64, /* bitsize */
b34976b6 521 FALSE, /* pc_relative */
252b5132
RH
522 0, /* bitpos */
523 complain_overflow_bitfield, /* complain_on_overflow */
bc1bc43f 524 bfd_elf_generic_reloc, /* special_function */
252b5132 525 "REFQUAD", /* name */
b34976b6 526 FALSE, /* partial_inplace */
252b5132
RH
527 MINUS_ONE, /* src_mask */
528 MINUS_ONE, /* dst_mask */
b34976b6 529 FALSE), /* pcrel_offset */
252b5132
RH
530
531 /* A 32 bit GP relative offset. This is just like REFLONG except
532 that when the value is used the value of the gp register will be
533 added in. */
534 HOWTO (R_ALPHA_GPREL32, /* type */
535 0, /* rightshift */
536 2, /* size (0 = byte, 1 = short, 2 = long) */
537 32, /* bitsize */
b34976b6 538 FALSE, /* pc_relative */
252b5132
RH
539 0, /* bitpos */
540 complain_overflow_bitfield, /* complain_on_overflow */
bc1bc43f 541 bfd_elf_generic_reloc, /* special_function */
252b5132 542 "GPREL32", /* name */
b34976b6 543 FALSE, /* partial_inplace */
252b5132
RH
544 0xffffffff, /* src_mask */
545 0xffffffff, /* dst_mask */
b34976b6 546 FALSE), /* pcrel_offset */
252b5132
RH
547
548 /* Used for an instruction that refers to memory off the GP register. */
549 HOWTO (R_ALPHA_LITERAL, /* type */
550 0, /* rightshift */
dfe57ca0 551 1, /* size (0 = byte, 1 = short, 2 = long) */
252b5132 552 16, /* bitsize */
b34976b6 553 FALSE, /* pc_relative */
252b5132
RH
554 0, /* bitpos */
555 complain_overflow_signed, /* complain_on_overflow */
bc1bc43f 556 bfd_elf_generic_reloc, /* special_function */
252b5132 557 "ELF_LITERAL", /* name */
b34976b6 558 FALSE, /* partial_inplace */
252b5132
RH
559 0xffff, /* src_mask */
560 0xffff, /* dst_mask */
b34976b6 561 FALSE), /* pcrel_offset */
252b5132
RH
562
563 /* This reloc only appears immediately following an ELF_LITERAL reloc.
564 It identifies a use of the literal. The symbol index is special:
565 1 means the literal address is in the base register of a memory
566 format instruction; 2 means the literal address is in the byte
567 offset register of a byte-manipulation instruction; 3 means the
568 literal address is in the target register of a jsr instruction.
569 This does not actually do any relocation. */
570 HOWTO (R_ALPHA_LITUSE, /* type */
571 0, /* rightshift */
dfe57ca0 572 1, /* size (0 = byte, 1 = short, 2 = long) */
252b5132 573 32, /* bitsize */
b34976b6 574 FALSE, /* pc_relative */
252b5132
RH
575 0, /* bitpos */
576 complain_overflow_dont, /* complain_on_overflow */
577 elf64_alpha_reloc_nil, /* special_function */
578 "LITUSE", /* name */
b34976b6 579 FALSE, /* partial_inplace */
252b5132
RH
580 0, /* src_mask */
581 0, /* dst_mask */
b34976b6 582 FALSE), /* pcrel_offset */
252b5132
RH
583
584 /* Load the gp register. This is always used for a ldah instruction
585 which loads the upper 16 bits of the gp register. The symbol
586 index of the GPDISP instruction is an offset in bytes to the lda
587 instruction that loads the lower 16 bits. The value to use for
588 the relocation is the difference between the GP value and the
589 current location; the load will always be done against a register
590 holding the current address.
591
592 NOTE: Unlike ECOFF, partial in-place relocation is not done. If
593 any offset is present in the instructions, it is an offset from
594 the register to the ldah instruction. This lets us avoid any
595 stupid hackery like inventing a gp value to do partial relocation
596 against. Also unlike ECOFF, we do the whole relocation off of
597 the GPDISP rather than a GPDISP_HI16/GPDISP_LO16 pair. An odd,
598 space consuming bit, that, since all the information was present
599 in the GPDISP_HI16 reloc. */
600 HOWTO (R_ALPHA_GPDISP, /* type */
601 16, /* rightshift */
602 2, /* size (0 = byte, 1 = short, 2 = long) */
603 16, /* bitsize */
b34976b6 604 FALSE, /* pc_relative */
252b5132
RH
605 0, /* bitpos */
606 complain_overflow_dont, /* complain_on_overflow */
607 elf64_alpha_reloc_gpdisp, /* special_function */
608 "GPDISP", /* name */
b34976b6 609 FALSE, /* partial_inplace */
252b5132
RH
610 0xffff, /* src_mask */
611 0xffff, /* dst_mask */
b34976b6 612 TRUE), /* pcrel_offset */
252b5132
RH
613
614 /* A 21 bit branch. */
615 HOWTO (R_ALPHA_BRADDR, /* type */
616 2, /* rightshift */
617 2, /* size (0 = byte, 1 = short, 2 = long) */
618 21, /* bitsize */
b34976b6 619 TRUE, /* pc_relative */
252b5132
RH
620 0, /* bitpos */
621 complain_overflow_signed, /* complain_on_overflow */
bc1bc43f 622 bfd_elf_generic_reloc, /* special_function */
252b5132 623 "BRADDR", /* name */
b34976b6 624 FALSE, /* partial_inplace */
252b5132
RH
625 0x1fffff, /* src_mask */
626 0x1fffff, /* dst_mask */
b34976b6 627 TRUE), /* pcrel_offset */
252b5132
RH
628
629 /* A hint for a jump to a register. */
630 HOWTO (R_ALPHA_HINT, /* type */
631 2, /* rightshift */
dfe57ca0 632 1, /* size (0 = byte, 1 = short, 2 = long) */
252b5132 633 14, /* bitsize */
b34976b6 634 TRUE, /* pc_relative */
252b5132
RH
635 0, /* bitpos */
636 complain_overflow_dont, /* complain_on_overflow */
bc1bc43f 637 bfd_elf_generic_reloc, /* special_function */
252b5132 638 "HINT", /* name */
b34976b6 639 FALSE, /* partial_inplace */
252b5132
RH
640 0x3fff, /* src_mask */
641 0x3fff, /* dst_mask */
b34976b6 642 TRUE), /* pcrel_offset */
252b5132
RH
643
644 /* 16 bit PC relative offset. */
645 HOWTO (R_ALPHA_SREL16, /* type */
646 0, /* rightshift */
647 1, /* size (0 = byte, 1 = short, 2 = long) */
648 16, /* bitsize */
b34976b6 649 TRUE, /* pc_relative */
252b5132
RH
650 0, /* bitpos */
651 complain_overflow_signed, /* complain_on_overflow */
bc1bc43f 652 bfd_elf_generic_reloc, /* special_function */
252b5132 653 "SREL16", /* name */
b34976b6 654 FALSE, /* partial_inplace */
252b5132
RH
655 0xffff, /* src_mask */
656 0xffff, /* dst_mask */
b34976b6 657 TRUE), /* pcrel_offset */
252b5132
RH
658
659 /* 32 bit PC relative offset. */
660 HOWTO (R_ALPHA_SREL32, /* type */
661 0, /* rightshift */
662 2, /* size (0 = byte, 1 = short, 2 = long) */
663 32, /* bitsize */
b34976b6 664 TRUE, /* pc_relative */
252b5132
RH
665 0, /* bitpos */
666 complain_overflow_signed, /* complain_on_overflow */
bc1bc43f 667 bfd_elf_generic_reloc, /* special_function */
252b5132 668 "SREL32", /* name */
b34976b6 669 FALSE, /* partial_inplace */
252b5132
RH
670 0xffffffff, /* src_mask */
671 0xffffffff, /* dst_mask */
b34976b6 672 TRUE), /* pcrel_offset */
252b5132
RH
673
674 /* A 64 bit PC relative offset. */
675 HOWTO (R_ALPHA_SREL64, /* type */
676 0, /* rightshift */
677 4, /* size (0 = byte, 1 = short, 2 = long) */
678 64, /* bitsize */
b34976b6 679 TRUE, /* pc_relative */
252b5132
RH
680 0, /* bitpos */
681 complain_overflow_signed, /* complain_on_overflow */
bc1bc43f 682 bfd_elf_generic_reloc, /* special_function */
252b5132 683 "SREL64", /* name */
b34976b6 684 FALSE, /* partial_inplace */
252b5132
RH
685 MINUS_ONE, /* src_mask */
686 MINUS_ONE, /* dst_mask */
b34976b6 687 TRUE), /* pcrel_offset */
252b5132 688
dfe57ca0
RH
689 /* Skip 12 - 16; deprecated ECOFF relocs. */
690 SKIP_HOWTO (12),
691 SKIP_HOWTO (13),
692 SKIP_HOWTO (14),
693 SKIP_HOWTO (15),
694 SKIP_HOWTO (16),
252b5132
RH
695
696 /* The high 16 bits of the displacement from GP to the target. */
697 HOWTO (R_ALPHA_GPRELHIGH,
698 0, /* rightshift */
dfe57ca0 699 1, /* size (0 = byte, 1 = short, 2 = long) */
252b5132 700 16, /* bitsize */
b34976b6 701 FALSE, /* pc_relative */
252b5132
RH
702 0, /* bitpos */
703 complain_overflow_signed, /* complain_on_overflow */
bc1bc43f 704 bfd_elf_generic_reloc, /* special_function */
252b5132 705 "GPRELHIGH", /* name */
b34976b6 706 FALSE, /* partial_inplace */
252b5132
RH
707 0xffff, /* src_mask */
708 0xffff, /* dst_mask */
b34976b6 709 FALSE), /* pcrel_offset */
252b5132
RH
710
711 /* The low 16 bits of the displacement from GP to the target. */
712 HOWTO (R_ALPHA_GPRELLOW,
713 0, /* rightshift */
dfe57ca0 714 1, /* size (0 = byte, 1 = short, 2 = long) */
252b5132 715 16, /* bitsize */
b34976b6 716 FALSE, /* pc_relative */
252b5132
RH
717 0, /* bitpos */
718 complain_overflow_dont, /* complain_on_overflow */
bc1bc43f 719 bfd_elf_generic_reloc, /* special_function */
252b5132 720 "GPRELLOW", /* name */
b34976b6 721 FALSE, /* partial_inplace */
252b5132
RH
722 0xffff, /* src_mask */
723 0xffff, /* dst_mask */
b34976b6 724 FALSE), /* pcrel_offset */
252b5132
RH
725
726 /* A 16-bit displacement from the GP to the target. */
dfe57ca0 727 HOWTO (R_ALPHA_GPREL16,
252b5132 728 0, /* rightshift */
dfe57ca0 729 1, /* size (0 = byte, 1 = short, 2 = long) */
252b5132 730 16, /* bitsize */
b34976b6 731 FALSE, /* pc_relative */
252b5132
RH
732 0, /* bitpos */
733 complain_overflow_signed, /* complain_on_overflow */
bc1bc43f 734 bfd_elf_generic_reloc, /* special_function */
dfe57ca0 735 "GPREL16", /* name */
b34976b6 736 FALSE, /* partial_inplace */
252b5132
RH
737 0xffff, /* src_mask */
738 0xffff, /* dst_mask */
b34976b6 739 FALSE), /* pcrel_offset */
252b5132 740
dfe57ca0
RH
741 /* Skip 20 - 23; deprecated ECOFF relocs. */
742 SKIP_HOWTO (20),
743 SKIP_HOWTO (21),
744 SKIP_HOWTO (22),
745 SKIP_HOWTO (23),
252b5132 746
fe8bc63d 747 /* Misc ELF relocations. */
252b5132
RH
748
749 /* A dynamic relocation to copy the target into our .dynbss section. */
750 /* Not generated, as all Alpha objects use PIC, so it is not needed. It
751 is present because every other ELF has one, but should not be used
752 because .dynbss is an ugly thing. */
753 HOWTO (R_ALPHA_COPY,
754 0,
755 0,
756 0,
b34976b6 757 FALSE,
252b5132
RH
758 0,
759 complain_overflow_dont,
760 bfd_elf_generic_reloc,
761 "COPY",
b34976b6 762 FALSE,
252b5132
RH
763 0,
764 0,
b34976b6 765 TRUE),
252b5132
RH
766
767 /* A dynamic relocation for a .got entry. */
768 HOWTO (R_ALPHA_GLOB_DAT,
769 0,
770 0,
771 0,
b34976b6 772 FALSE,
252b5132
RH
773 0,
774 complain_overflow_dont,
775 bfd_elf_generic_reloc,
776 "GLOB_DAT",
b34976b6 777 FALSE,
252b5132
RH
778 0,
779 0,
b34976b6 780 TRUE),
252b5132
RH
781
782 /* A dynamic relocation for a .plt entry. */
783 HOWTO (R_ALPHA_JMP_SLOT,
784 0,
785 0,
786 0,
b34976b6 787 FALSE,
252b5132
RH
788 0,
789 complain_overflow_dont,
790 bfd_elf_generic_reloc,
791 "JMP_SLOT",
b34976b6 792 FALSE,
252b5132
RH
793 0,
794 0,
b34976b6 795 TRUE),
252b5132
RH
796
797 /* A dynamic relocation to add the base of the DSO to a 64-bit field. */
798 HOWTO (R_ALPHA_RELATIVE,
799 0,
800 0,
801 0,
b34976b6 802 FALSE,
252b5132
RH
803 0,
804 complain_overflow_dont,
805 bfd_elf_generic_reloc,
806 "RELATIVE",
b34976b6 807 FALSE,
252b5132
RH
808 0,
809 0,
b34976b6 810 TRUE),
7793f4d0
RH
811
812 /* A 21 bit branch that adjusts for gp loads. */
813 HOWTO (R_ALPHA_BRSGP, /* type */
814 2, /* rightshift */
815 2, /* size (0 = byte, 1 = short, 2 = long) */
816 21, /* bitsize */
b34976b6 817 TRUE, /* pc_relative */
7793f4d0
RH
818 0, /* bitpos */
819 complain_overflow_signed, /* complain_on_overflow */
bc1bc43f 820 bfd_elf_generic_reloc, /* special_function */
7793f4d0 821 "BRSGP", /* name */
b34976b6 822 FALSE, /* partial_inplace */
7793f4d0
RH
823 0x1fffff, /* src_mask */
824 0x1fffff, /* dst_mask */
b34976b6 825 TRUE), /* pcrel_offset */
3765b1be
RH
826
827 /* Creates a tls_index for the symbol in the got. */
828 HOWTO (R_ALPHA_TLSGD, /* type */
829 0, /* rightshift */
830 1, /* size (0 = byte, 1 = short, 2 = long) */
831 16, /* bitsize */
b34976b6 832 FALSE, /* pc_relative */
3765b1be
RH
833 0, /* bitpos */
834 complain_overflow_signed, /* complain_on_overflow */
bc1bc43f 835 bfd_elf_generic_reloc, /* special_function */
3765b1be 836 "TLSGD", /* name */
b34976b6 837 FALSE, /* partial_inplace */
3765b1be
RH
838 0xffff, /* src_mask */
839 0xffff, /* dst_mask */
b34976b6 840 FALSE), /* pcrel_offset */
3765b1be
RH
841
842 /* Creates a tls_index for the (current) module in the got. */
843 HOWTO (R_ALPHA_TLSLDM, /* type */
844 0, /* rightshift */
845 1, /* size (0 = byte, 1 = short, 2 = long) */
846 16, /* bitsize */
b34976b6 847 FALSE, /* pc_relative */
3765b1be
RH
848 0, /* bitpos */
849 complain_overflow_signed, /* complain_on_overflow */
bc1bc43f 850 bfd_elf_generic_reloc, /* special_function */
3765b1be 851 "TLSLDM", /* name */
b34976b6 852 FALSE, /* partial_inplace */
3765b1be
RH
853 0xffff, /* src_mask */
854 0xffff, /* dst_mask */
b34976b6 855 FALSE), /* pcrel_offset */
3765b1be
RH
856
857 /* A dynamic relocation for a DTP module entry. */
858 HOWTO (R_ALPHA_DTPMOD64, /* type */
859 0, /* rightshift */
860 4, /* size (0 = byte, 1 = short, 2 = long) */
861 64, /* bitsize */
b34976b6 862 FALSE, /* pc_relative */
3765b1be
RH
863 0, /* bitpos */
864 complain_overflow_bitfield, /* complain_on_overflow */
bc1bc43f 865 bfd_elf_generic_reloc, /* special_function */
3765b1be 866 "DTPMOD64", /* name */
b34976b6 867 FALSE, /* partial_inplace */
3765b1be
RH
868 MINUS_ONE, /* src_mask */
869 MINUS_ONE, /* dst_mask */
b34976b6 870 FALSE), /* pcrel_offset */
3765b1be
RH
871
872 /* Creates a 64-bit offset in the got for the displacement
873 from DTP to the target. */
874 HOWTO (R_ALPHA_GOTDTPREL, /* type */
875 0, /* rightshift */
876 1, /* size (0 = byte, 1 = short, 2 = long) */
877 16, /* bitsize */
b34976b6 878 FALSE, /* pc_relative */
3765b1be
RH
879 0, /* bitpos */
880 complain_overflow_signed, /* complain_on_overflow */
bc1bc43f 881 bfd_elf_generic_reloc, /* special_function */
3765b1be 882 "GOTDTPREL", /* name */
b34976b6 883 FALSE, /* partial_inplace */
3765b1be
RH
884 0xffff, /* src_mask */
885 0xffff, /* dst_mask */
b34976b6 886 FALSE), /* pcrel_offset */
3765b1be
RH
887
888 /* A dynamic relocation for a displacement from DTP to the target. */
889 HOWTO (R_ALPHA_DTPREL64, /* type */
890 0, /* rightshift */
891 4, /* size (0 = byte, 1 = short, 2 = long) */
892 64, /* bitsize */
b34976b6 893 FALSE, /* pc_relative */
3765b1be
RH
894 0, /* bitpos */
895 complain_overflow_bitfield, /* complain_on_overflow */
bc1bc43f 896 bfd_elf_generic_reloc, /* special_function */
3765b1be 897 "DTPREL64", /* name */
b34976b6 898 FALSE, /* partial_inplace */
3765b1be
RH
899 MINUS_ONE, /* src_mask */
900 MINUS_ONE, /* dst_mask */
b34976b6 901 FALSE), /* pcrel_offset */
3765b1be
RH
902
903 /* The high 16 bits of the displacement from DTP to the target. */
904 HOWTO (R_ALPHA_DTPRELHI, /* type */
905 0, /* rightshift */
906 1, /* size (0 = byte, 1 = short, 2 = long) */
907 16, /* bitsize */
b34976b6 908 FALSE, /* pc_relative */
3765b1be
RH
909 0, /* bitpos */
910 complain_overflow_signed, /* complain_on_overflow */
bc1bc43f 911 bfd_elf_generic_reloc, /* special_function */
3765b1be 912 "DTPRELHI", /* name */
b34976b6 913 FALSE, /* partial_inplace */
3765b1be
RH
914 0xffff, /* src_mask */
915 0xffff, /* dst_mask */
b34976b6 916 FALSE), /* pcrel_offset */
3765b1be
RH
917
918 /* The low 16 bits of the displacement from DTP to the target. */
919 HOWTO (R_ALPHA_DTPRELLO, /* type */
920 0, /* rightshift */
921 1, /* size (0 = byte, 1 = short, 2 = long) */
922 16, /* bitsize */
b34976b6 923 FALSE, /* pc_relative */
3765b1be
RH
924 0, /* bitpos */
925 complain_overflow_dont, /* complain_on_overflow */
bc1bc43f 926 bfd_elf_generic_reloc, /* special_function */
3765b1be 927 "DTPRELLO", /* name */
b34976b6 928 FALSE, /* partial_inplace */
3765b1be
RH
929 0xffff, /* src_mask */
930 0xffff, /* dst_mask */
b34976b6 931 FALSE), /* pcrel_offset */
3765b1be
RH
932
933 /* A 16-bit displacement from DTP to the target. */
934 HOWTO (R_ALPHA_DTPREL16, /* type */
935 0, /* rightshift */
936 1, /* size (0 = byte, 1 = short, 2 = long) */
937 16, /* bitsize */
b34976b6 938 FALSE, /* pc_relative */
3765b1be
RH
939 0, /* bitpos */
940 complain_overflow_signed, /* complain_on_overflow */
bc1bc43f 941 bfd_elf_generic_reloc, /* special_function */
3765b1be 942 "DTPREL16", /* name */
b34976b6 943 FALSE, /* partial_inplace */
3765b1be
RH
944 0xffff, /* src_mask */
945 0xffff, /* dst_mask */
b34976b6 946 FALSE), /* pcrel_offset */
3765b1be
RH
947
948 /* Creates a 64-bit offset in the got for the displacement
949 from TP to the target. */
950 HOWTO (R_ALPHA_GOTTPREL, /* type */
951 0, /* rightshift */
952 1, /* size (0 = byte, 1 = short, 2 = long) */
953 16, /* bitsize */
b34976b6 954 FALSE, /* pc_relative */
3765b1be
RH
955 0, /* bitpos */
956 complain_overflow_signed, /* complain_on_overflow */
bc1bc43f 957 bfd_elf_generic_reloc, /* special_function */
3765b1be 958 "GOTTPREL", /* name */
b34976b6 959 FALSE, /* partial_inplace */
3765b1be
RH
960 0xffff, /* src_mask */
961 0xffff, /* dst_mask */
b34976b6 962 FALSE), /* pcrel_offset */
3765b1be
RH
963
964 /* A dynamic relocation for a displacement from TP to the target. */
965 HOWTO (R_ALPHA_TPREL64, /* type */
966 0, /* rightshift */
967 4, /* size (0 = byte, 1 = short, 2 = long) */
968 64, /* bitsize */
b34976b6 969 FALSE, /* pc_relative */
3765b1be
RH
970 0, /* bitpos */
971 complain_overflow_bitfield, /* complain_on_overflow */
bc1bc43f 972 bfd_elf_generic_reloc, /* special_function */
3765b1be 973 "TPREL64", /* name */
b34976b6 974 FALSE, /* partial_inplace */
3765b1be
RH
975 MINUS_ONE, /* src_mask */
976 MINUS_ONE, /* dst_mask */
b34976b6 977 FALSE), /* pcrel_offset */
3765b1be
RH
978
979 /* The high 16 bits of the displacement from TP to the target. */
980 HOWTO (R_ALPHA_TPRELHI, /* type */
981 0, /* rightshift */
982 1, /* size (0 = byte, 1 = short, 2 = long) */
983 16, /* bitsize */
b34976b6 984 FALSE, /* pc_relative */
3765b1be
RH
985 0, /* bitpos */
986 complain_overflow_signed, /* complain_on_overflow */
bc1bc43f 987 bfd_elf_generic_reloc, /* special_function */
3765b1be 988 "TPRELHI", /* name */
b34976b6 989 FALSE, /* partial_inplace */
3765b1be
RH
990 0xffff, /* src_mask */
991 0xffff, /* dst_mask */
b34976b6 992 FALSE), /* pcrel_offset */
3765b1be
RH
993
994 /* The low 16 bits of the displacement from TP to the target. */
995 HOWTO (R_ALPHA_TPRELLO, /* type */
996 0, /* rightshift */
997 1, /* size (0 = byte, 1 = short, 2 = long) */
998 16, /* bitsize */
b34976b6 999 FALSE, /* pc_relative */
3765b1be
RH
1000 0, /* bitpos */
1001 complain_overflow_dont, /* complain_on_overflow */
bc1bc43f 1002 bfd_elf_generic_reloc, /* special_function */
3765b1be 1003 "TPRELLO", /* name */
b34976b6 1004 FALSE, /* partial_inplace */
3765b1be
RH
1005 0xffff, /* src_mask */
1006 0xffff, /* dst_mask */
b34976b6 1007 FALSE), /* pcrel_offset */
3765b1be
RH
1008
1009 /* A 16-bit displacement from TP to the target. */
1010 HOWTO (R_ALPHA_TPREL16, /* type */
1011 0, /* rightshift */
1012 1, /* size (0 = byte, 1 = short, 2 = long) */
1013 16, /* bitsize */
b34976b6 1014 FALSE, /* pc_relative */
3765b1be
RH
1015 0, /* bitpos */
1016 complain_overflow_signed, /* complain_on_overflow */
bc1bc43f 1017 bfd_elf_generic_reloc, /* special_function */
3765b1be 1018 "TPREL16", /* name */
b34976b6 1019 FALSE, /* partial_inplace */
3765b1be
RH
1020 0xffff, /* src_mask */
1021 0xffff, /* dst_mask */
b34976b6 1022 FALSE), /* pcrel_offset */
252b5132
RH
1023};
1024
252b5132
RH
1025/* A mapping from BFD reloc types to Alpha ELF reloc types. */
1026
1027struct elf_reloc_map
1028{
1029 bfd_reloc_code_real_type bfd_reloc_val;
1030 int elf_reloc_val;
1031};
1032
1033static const struct elf_reloc_map elf64_alpha_reloc_map[] =
1034{
dfe57ca0
RH
1035 {BFD_RELOC_NONE, R_ALPHA_NONE},
1036 {BFD_RELOC_32, R_ALPHA_REFLONG},
1037 {BFD_RELOC_64, R_ALPHA_REFQUAD},
1038 {BFD_RELOC_CTOR, R_ALPHA_REFQUAD},
1039 {BFD_RELOC_GPREL32, R_ALPHA_GPREL32},
1040 {BFD_RELOC_ALPHA_ELF_LITERAL, R_ALPHA_LITERAL},
1041 {BFD_RELOC_ALPHA_LITUSE, R_ALPHA_LITUSE},
1042 {BFD_RELOC_ALPHA_GPDISP, R_ALPHA_GPDISP},
1043 {BFD_RELOC_23_PCREL_S2, R_ALPHA_BRADDR},
1044 {BFD_RELOC_ALPHA_HINT, R_ALPHA_HINT},
1045 {BFD_RELOC_16_PCREL, R_ALPHA_SREL16},
1046 {BFD_RELOC_32_PCREL, R_ALPHA_SREL32},
1047 {BFD_RELOC_64_PCREL, R_ALPHA_SREL64},
1048 {BFD_RELOC_ALPHA_GPREL_HI16, R_ALPHA_GPRELHIGH},
1049 {BFD_RELOC_ALPHA_GPREL_LO16, R_ALPHA_GPRELLOW},
1050 {BFD_RELOC_GPREL16, R_ALPHA_GPREL16},
7793f4d0 1051 {BFD_RELOC_ALPHA_BRSGP, R_ALPHA_BRSGP},
3765b1be
RH
1052 {BFD_RELOC_ALPHA_TLSGD, R_ALPHA_TLSGD},
1053 {BFD_RELOC_ALPHA_TLSLDM, R_ALPHA_TLSLDM},
1054 {BFD_RELOC_ALPHA_DTPMOD64, R_ALPHA_DTPMOD64},
1055 {BFD_RELOC_ALPHA_GOTDTPREL16, R_ALPHA_GOTDTPREL},
1056 {BFD_RELOC_ALPHA_DTPREL64, R_ALPHA_DTPREL64},
1057 {BFD_RELOC_ALPHA_DTPREL_HI16, R_ALPHA_DTPRELHI},
1058 {BFD_RELOC_ALPHA_DTPREL_LO16, R_ALPHA_DTPRELLO},
1059 {BFD_RELOC_ALPHA_DTPREL16, R_ALPHA_DTPREL16},
1060 {BFD_RELOC_ALPHA_GOTTPREL16, R_ALPHA_GOTTPREL},
1061 {BFD_RELOC_ALPHA_TPREL64, R_ALPHA_TPREL64},
1062 {BFD_RELOC_ALPHA_TPREL_HI16, R_ALPHA_TPRELHI},
1063 {BFD_RELOC_ALPHA_TPREL_LO16, R_ALPHA_TPRELLO},
1064 {BFD_RELOC_ALPHA_TPREL16, R_ALPHA_TPREL16},
252b5132
RH
1065};
1066
1067/* Given a BFD reloc type, return a HOWTO structure. */
1068
1069static reloc_howto_type *
a7519a3c
RH
1070elf64_alpha_bfd_reloc_type_lookup (bfd *abfd ATTRIBUTE_UNUSED,
1071 bfd_reloc_code_real_type code)
252b5132
RH
1072{
1073 const struct elf_reloc_map *i, *e;
1074 i = e = elf64_alpha_reloc_map;
1075 e += sizeof (elf64_alpha_reloc_map) / sizeof (struct elf_reloc_map);
1076 for (; i != e; ++i)
1077 {
1078 if (i->bfd_reloc_val == code)
1079 return &elf64_alpha_howto_table[i->elf_reloc_val];
1080 }
1081 return 0;
1082}
1083
157090f7
AM
1084static reloc_howto_type *
1085elf64_alpha_bfd_reloc_name_lookup (bfd *abfd ATTRIBUTE_UNUSED,
1086 const char *r_name)
1087{
1088 unsigned int i;
1089
1090 for (i = 0;
1091 i < (sizeof (elf64_alpha_howto_table)
1092 / sizeof (elf64_alpha_howto_table[0]));
1093 i++)
1094 if (elf64_alpha_howto_table[i].name != NULL
1095 && strcasecmp (elf64_alpha_howto_table[i].name, r_name) == 0)
1096 return &elf64_alpha_howto_table[i];
1097
1098 return NULL;
1099}
1100
252b5132
RH
1101/* Given an Alpha ELF reloc type, fill in an arelent structure. */
1102
1103static void
a7519a3c
RH
1104elf64_alpha_info_to_howto (bfd *abfd ATTRIBUTE_UNUSED, arelent *cache_ptr,
1105 Elf_Internal_Rela *dst)
252b5132 1106{
a7519a3c 1107 unsigned r_type = ELF64_R_TYPE(dst->r_info);
cd21f5da
NC
1108
1109 if (r_type >= R_ALPHA_max)
1110 {
64d29018 1111 (*_bfd_error_handler) (_("%B: unrecognised Alpha reloc number: %d"),
cd21f5da
NC
1112 abfd, r_type);
1113 bfd_set_error (bfd_error_bad_value);
1114 r_type = R_ALPHA_NONE;
1115 }
252b5132
RH
1116 cache_ptr->howto = &elf64_alpha_howto_table[r_type];
1117}
3765b1be
RH
1118
1119/* These two relocations create a two-word entry in the got. */
1120#define alpha_got_entry_size(r_type) \
1121 (r_type == R_ALPHA_TLSGD || r_type == R_ALPHA_TLSLDM ? 16 : 8)
9e756d64
RH
1122
1123/* This is PT_TLS segment p_vaddr. */
e1918d23
AM
1124#define alpha_get_dtprel_base(info) \
1125 (elf_hash_table (info)->tls_sec->vma)
9e756d64
RH
1126
1127/* Main program TLS (whose template starts at PT_TLS p_vaddr)
1128 is assigned offset round(16, PT_TLS p_align). */
e1918d23
AM
1129#define alpha_get_tprel_base(info) \
1130 (elf_hash_table (info)->tls_sec->vma \
1131 - align_power ((bfd_vma) 16, \
1132 elf_hash_table (info)->tls_sec->alignment_power))
252b5132 1133\f
a7519a3c
RH
1134/* Handle an Alpha specific section when reading an object file. This
1135 is called when bfd_section_from_shdr finds a section with an unknown
1136 type.
1137 FIXME: We need to handle the SHF_ALPHA_GPREL flag, but I'm not sure
1138 how to. */
252b5132 1139
a7519a3c
RH
1140static bfd_boolean
1141elf64_alpha_section_from_shdr (bfd *abfd,
1142 Elf_Internal_Shdr *hdr,
1143 const char *name,
1144 int shindex)
252b5132 1145{
a7519a3c
RH
1146 asection *newsect;
1147
1148 /* There ought to be a place to keep ELF backend specific flags, but
1149 at the moment there isn't one. We just keep track of the
1150 sections by their name, instead. Fortunately, the ABI gives
1151 suggested names for all the MIPS specific sections, so we will
1152 probably get away with this. */
1153 switch (hdr->sh_type)
1154 {
1155 case SHT_ALPHA_DEBUG:
1156 if (strcmp (name, ".mdebug") != 0)
1157 return FALSE;
1158 break;
1159 default:
1160 return FALSE;
1161 }
252b5132 1162
a7519a3c
RH
1163 if (! _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex))
1164 return FALSE;
1165 newsect = hdr->bfd_section;
252b5132 1166
a7519a3c 1167 if (hdr->sh_type == SHT_ALPHA_DEBUG)
252b5132 1168 {
a7519a3c
RH
1169 if (! bfd_set_section_flags (abfd, newsect,
1170 (bfd_get_section_flags (abfd, newsect)
1171 | SEC_DEBUGGING)))
1172 return FALSE;
252b5132 1173 }
a7519a3c
RH
1174
1175 return TRUE;
252b5132
RH
1176}
1177
a7519a3c
RH
1178/* Convert Alpha specific section flags to bfd internal section flags. */
1179
b34976b6 1180static bfd_boolean
a7519a3c 1181elf64_alpha_section_flags (flagword *flags, const Elf_Internal_Shdr *hdr)
252b5132 1182{
a7519a3c
RH
1183 if (hdr->sh_flags & SHF_ALPHA_GPREL)
1184 *flags |= SEC_SMALL_DATA;
252b5132 1185
a7519a3c
RH
1186 return TRUE;
1187}
252b5132 1188
a7519a3c
RH
1189/* Set the correct type for an Alpha ELF section. We do this by the
1190 section name, which is a hack, but ought to work. */
9e756d64 1191
a7519a3c
RH
1192static bfd_boolean
1193elf64_alpha_fake_sections (bfd *abfd, Elf_Internal_Shdr *hdr, asection *sec)
1194{
1195 register const char *name;
1196
1197 name = bfd_get_section_name (abfd, sec);
1198
1199 if (strcmp (name, ".mdebug") == 0)
252b5132 1200 {
a7519a3c
RH
1201 hdr->sh_type = SHT_ALPHA_DEBUG;
1202 /* In a shared object on Irix 5.3, the .mdebug section has an
1203 entsize of 0. FIXME: Does this matter? */
1204 if ((abfd->flags & DYNAMIC) != 0 )
1205 hdr->sh_entsize = 0;
1206 else
1207 hdr->sh_entsize = 1;
252b5132 1208 }
a7519a3c
RH
1209 else if ((sec->flags & SEC_SMALL_DATA)
1210 || strcmp (name, ".sdata") == 0
1211 || strcmp (name, ".sbss") == 0
1212 || strcmp (name, ".lit4") == 0
1213 || strcmp (name, ".lit8") == 0)
1214 hdr->sh_flags |= SHF_ALPHA_GPREL;
252b5132 1215
a7519a3c
RH
1216 return TRUE;
1217}
252b5132 1218
a7519a3c
RH
1219/* Hook called by the linker routine which adds symbols from an object
1220 file. We use it to put .comm items in .sbss, and not .bss. */
1221
1222static bfd_boolean
1223elf64_alpha_add_symbol_hook (bfd *abfd, struct bfd_link_info *info,
1224 Elf_Internal_Sym *sym,
1225 const char **namep ATTRIBUTE_UNUSED,
1226 flagword *flagsp ATTRIBUTE_UNUSED,
1227 asection **secp, bfd_vma *valp)
1228{
1229 if (sym->st_shndx == SHN_COMMON
0e1862bb 1230 && !bfd_link_relocatable (info)
a7519a3c 1231 && sym->st_size <= elf_gp_size (abfd))
252b5132 1232 {
a7519a3c
RH
1233 /* Common symbols less than or equal to -G nn bytes are
1234 automatically put into .sbss. */
ffcb7aff 1235
a7519a3c 1236 asection *scomm = bfd_get_section_by_name (abfd, ".scommon");
252b5132 1237
a7519a3c 1238 if (scomm == NULL)
252b5132 1239 {
a7519a3c
RH
1240 scomm = bfd_make_section_with_flags (abfd, ".scommon",
1241 (SEC_ALLOC
1242 | SEC_IS_COMMON
1243 | SEC_LINKER_CREATED));
1244 if (scomm == NULL)
1245 return FALSE;
1246 }
ffcb7aff 1247
a7519a3c
RH
1248 *secp = scomm;
1249 *valp = sym->st_size;
1250 }
ffcb7aff 1251
a7519a3c
RH
1252 return TRUE;
1253}
252b5132 1254
a7519a3c 1255/* Create the .got section. */
252b5132 1256
a7519a3c
RH
1257static bfd_boolean
1258elf64_alpha_create_got_section (bfd *abfd,
1259 struct bfd_link_info *info ATTRIBUTE_UNUSED)
1260{
85d162e6 1261 flagword flags;
a7519a3c 1262 asection *s;
252b5132 1263
0ffa91dd
NC
1264 if (! is_alpha_elf (abfd))
1265 return FALSE;
1266
85d162e6
AM
1267 flags = (SEC_ALLOC | SEC_LOAD | SEC_HAS_CONTENTS | SEC_IN_MEMORY
1268 | SEC_LINKER_CREATED);
1269 s = bfd_make_section_anyway_with_flags (abfd, ".got", flags);
a7519a3c
RH
1270 if (s == NULL
1271 || !bfd_set_section_alignment (abfd, s, 3))
1272 return FALSE;
252b5132 1273
a7519a3c 1274 alpha_elf_tdata (abfd)->got = s;
252b5132 1275
85d162e6
AM
1276 /* Make sure the object's gotobj is set to itself so that we default
1277 to every object with its own .got. We'll merge .gots later once
1278 we've collected each object's info. */
1279 alpha_elf_tdata (abfd)->gotobj = abfd;
1280
a7519a3c
RH
1281 return TRUE;
1282}
252b5132 1283
a7519a3c 1284/* Create all the dynamic sections. */
252b5132 1285
a7519a3c
RH
1286static bfd_boolean
1287elf64_alpha_create_dynamic_sections (bfd *abfd, struct bfd_link_info *info)
1288{
1289 asection *s;
85d162e6 1290 flagword flags;
a7519a3c 1291 struct elf_link_hash_entry *h;
252b5132 1292
0ffa91dd
NC
1293 if (! is_alpha_elf (abfd))
1294 return FALSE;
1295
a7519a3c 1296 /* We need to create .plt, .rela.plt, .got, and .rela.got sections. */
252b5132 1297
85d162e6
AM
1298 flags = (SEC_ALLOC | SEC_LOAD | SEC_CODE | SEC_HAS_CONTENTS | SEC_IN_MEMORY
1299 | SEC_LINKER_CREATED
1300 | (elf64_alpha_use_secureplt ? SEC_READONLY : 0));
1301 s = bfd_make_section_anyway_with_flags (abfd, ".plt", flags);
6ec7057a 1302 if (s == NULL || ! bfd_set_section_alignment (abfd, s, 4))
a7519a3c 1303 return FALSE;
252b5132 1304
a7519a3c
RH
1305 /* Define the symbol _PROCEDURE_LINKAGE_TABLE_ at the start of the
1306 .plt section. */
7325306f
RS
1307 h = _bfd_elf_define_linkage_sym (abfd, info, s,
1308 "_PROCEDURE_LINKAGE_TABLE_");
1309 elf_hash_table (info)->hplt = h;
1310 if (h == NULL)
a7519a3c 1311 return FALSE;
d6ad34f6 1312
85d162e6
AM
1313 flags = (SEC_ALLOC | SEC_LOAD | SEC_HAS_CONTENTS | SEC_IN_MEMORY
1314 | SEC_LINKER_CREATED | SEC_READONLY);
1315 s = bfd_make_section_anyway_with_flags (abfd, ".rela.plt", flags);
6ec7057a 1316 if (s == NULL || ! bfd_set_section_alignment (abfd, s, 3))
a7519a3c 1317 return FALSE;
252b5132 1318
6ec7057a
RH
1319 if (elf64_alpha_use_secureplt)
1320 {
85d162e6
AM
1321 flags = SEC_ALLOC | SEC_LINKER_CREATED;
1322 s = bfd_make_section_anyway_with_flags (abfd, ".got.plt", flags);
6ec7057a
RH
1323 if (s == NULL || ! bfd_set_section_alignment (abfd, s, 3))
1324 return FALSE;
1325 }
1326
a7519a3c
RH
1327 /* We may or may not have created a .got section for this object, but
1328 we definitely havn't done the rest of the work. */
1cd6895c 1329
85d162e6
AM
1330 if (alpha_elf_tdata(abfd)->gotobj == NULL)
1331 {
1332 if (!elf64_alpha_create_got_section (abfd, info))
1333 return FALSE;
1334 }
1cd6895c 1335
85d162e6
AM
1336 flags = (SEC_ALLOC | SEC_LOAD | SEC_HAS_CONTENTS | SEC_IN_MEMORY
1337 | SEC_LINKER_CREATED | SEC_READONLY);
1338 s = bfd_make_section_anyway_with_flags (abfd, ".rela.got", flags);
a7519a3c
RH
1339 if (s == NULL
1340 || !bfd_set_section_alignment (abfd, s, 3))
1341 return FALSE;
252b5132 1342
a7519a3c
RH
1343 /* Define the symbol _GLOBAL_OFFSET_TABLE_ at the start of the
1344 dynobj's .got section. We don't do this in the linker script
1345 because we don't want to define the symbol if we are not creating
1346 a global offset table. */
d98685ac
AM
1347 h = _bfd_elf_define_linkage_sym (abfd, info, alpha_elf_tdata(abfd)->got,
1348 "_GLOBAL_OFFSET_TABLE_");
a7519a3c 1349 elf_hash_table (info)->hgot = h;
d98685ac
AM
1350 if (h == NULL)
1351 return FALSE;
252b5132 1352
a7519a3c 1353 return TRUE;
252b5132 1354}
a7519a3c
RH
1355\f
1356/* Read ECOFF debugging information from a .mdebug section into a
1357 ecoff_debug_info structure. */
252b5132 1358
a7519a3c
RH
1359static bfd_boolean
1360elf64_alpha_read_ecoff_info (bfd *abfd, asection *section,
1361 struct ecoff_debug_info *debug)
252b5132 1362{
a7519a3c
RH
1363 HDRR *symhdr;
1364 const struct ecoff_debug_swap *swap;
1365 char *ext_hdr = NULL;
252b5132 1366
a7519a3c
RH
1367 swap = get_elf_backend_data (abfd)->elf_backend_ecoff_debug_swap;
1368 memset (debug, 0, sizeof (*debug));
252b5132 1369
a7519a3c
RH
1370 ext_hdr = (char *) bfd_malloc (swap->external_hdr_size);
1371 if (ext_hdr == NULL && swap->external_hdr_size != 0)
1372 goto error_return;
252b5132 1373
a7519a3c
RH
1374 if (! bfd_get_section_contents (abfd, section, ext_hdr, (file_ptr) 0,
1375 swap->external_hdr_size))
1376 goto error_return;
252b5132 1377
a7519a3c
RH
1378 symhdr = &debug->symbolic_header;
1379 (*swap->swap_hdr_in) (abfd, ext_hdr, symhdr);
252b5132 1380
a7519a3c
RH
1381 /* The symbolic header contains absolute file offsets and sizes to
1382 read. */
1383#define READ(ptr, offset, count, size, type) \
1384 if (symhdr->count == 0) \
1385 debug->ptr = NULL; \
1386 else \
1387 { \
1388 bfd_size_type amt = (bfd_size_type) size * symhdr->count; \
1389 debug->ptr = (type) bfd_malloc (amt); \
1390 if (debug->ptr == NULL) \
1391 goto error_return; \
1392 if (bfd_seek (abfd, (file_ptr) symhdr->offset, SEEK_SET) != 0 \
1393 || bfd_bread (debug->ptr, amt, abfd) != amt) \
1394 goto error_return; \
1395 }
fe8bc63d 1396
a7519a3c 1397 READ (line, cbLineOffset, cbLine, sizeof (unsigned char), unsigned char *);
2c3fc389
NC
1398 READ (external_dnr, cbDnOffset, idnMax, swap->external_dnr_size, void *);
1399 READ (external_pdr, cbPdOffset, ipdMax, swap->external_pdr_size, void *);
1400 READ (external_sym, cbSymOffset, isymMax, swap->external_sym_size, void *);
1401 READ (external_opt, cbOptOffset, ioptMax, swap->external_opt_size, void *);
a7519a3c
RH
1402 READ (external_aux, cbAuxOffset, iauxMax, sizeof (union aux_ext),
1403 union aux_ext *);
1404 READ (ss, cbSsOffset, issMax, sizeof (char), char *);
1405 READ (ssext, cbSsExtOffset, issExtMax, sizeof (char), char *);
2c3fc389
NC
1406 READ (external_fdr, cbFdOffset, ifdMax, swap->external_fdr_size, void *);
1407 READ (external_rfd, cbRfdOffset, crfd, swap->external_rfd_size, void *);
1408 READ (external_ext, cbExtOffset, iextMax, swap->external_ext_size, void *);
a7519a3c 1409#undef READ
252b5132 1410
a7519a3c 1411 debug->fdr = NULL;
252b5132 1412
a7519a3c 1413 return TRUE;
252b5132 1414
a7519a3c
RH
1415 error_return:
1416 if (ext_hdr != NULL)
1417 free (ext_hdr);
1418 if (debug->line != NULL)
1419 free (debug->line);
1420 if (debug->external_dnr != NULL)
1421 free (debug->external_dnr);
1422 if (debug->external_pdr != NULL)
1423 free (debug->external_pdr);
1424 if (debug->external_sym != NULL)
1425 free (debug->external_sym);
1426 if (debug->external_opt != NULL)
1427 free (debug->external_opt);
1428 if (debug->external_aux != NULL)
1429 free (debug->external_aux);
1430 if (debug->ss != NULL)
1431 free (debug->ss);
1432 if (debug->ssext != NULL)
1433 free (debug->ssext);
1434 if (debug->external_fdr != NULL)
1435 free (debug->external_fdr);
1436 if (debug->external_rfd != NULL)
1437 free (debug->external_rfd);
1438 if (debug->external_ext != NULL)
1439 free (debug->external_ext);
1440 return FALSE;
252b5132
RH
1441}
1442
a7519a3c
RH
1443/* Alpha ELF local labels start with '$'. */
1444
b34976b6 1445static bfd_boolean
a7519a3c 1446elf64_alpha_is_local_label_name (bfd *abfd ATTRIBUTE_UNUSED, const char *name)
252b5132 1447{
a7519a3c
RH
1448 return name[0] == '$';
1449}
9e756d64 1450
a7519a3c 1451static bfd_boolean
fb167eb2
AM
1452elf64_alpha_find_nearest_line (bfd *abfd, asymbol **symbols,
1453 asection *section, bfd_vma offset,
1454 const char **filename_ptr,
a7519a3c 1455 const char **functionname_ptr,
fb167eb2
AM
1456 unsigned int *line_ptr,
1457 unsigned int *discriminator_ptr)
a7519a3c
RH
1458{
1459 asection *msec;
252b5132 1460
fb167eb2 1461 if (_bfd_dwarf2_find_nearest_line (abfd, symbols, NULL, section, offset,
a7519a3c 1462 filename_ptr, functionname_ptr,
fb167eb2
AM
1463 line_ptr, discriminator_ptr,
1464 dwarf_debug_sections, 0,
a7519a3c 1465 &elf_tdata (abfd)->dwarf2_find_line_info))
b34976b6 1466 return TRUE;
9e756d64 1467
a7519a3c
RH
1468 msec = bfd_get_section_by_name (abfd, ".mdebug");
1469 if (msec != NULL)
1bbc9cec 1470 {
a7519a3c 1471 flagword origflags;
698600e4 1472 struct alpha_elf_find_line *fi;
a7519a3c
RH
1473 const struct ecoff_debug_swap * const swap =
1474 get_elf_backend_data (abfd)->elf_backend_ecoff_debug_swap;
252b5132 1475
a7519a3c
RH
1476 /* If we are called during a link, alpha_elf_final_link may have
1477 cleared the SEC_HAS_CONTENTS field. We force it back on here
1478 if appropriate (which it normally will be). */
1479 origflags = msec->flags;
1480 if (elf_section_data (msec)->this_hdr.sh_type != SHT_NOBITS)
1481 msec->flags |= SEC_HAS_CONTENTS;
9e756d64 1482
698600e4 1483 fi = alpha_elf_tdata (abfd)->find_line_info;
a7519a3c
RH
1484 if (fi == NULL)
1485 {
1486 bfd_size_type external_fdr_size;
1487 char *fraw_src;
1488 char *fraw_end;
1489 struct fdr *fdr_ptr;
698600e4 1490 bfd_size_type amt = sizeof (struct alpha_elf_find_line);
9e756d64 1491
698600e4 1492 fi = (struct alpha_elf_find_line *) bfd_zalloc (abfd, amt);
a7519a3c
RH
1493 if (fi == NULL)
1494 {
1495 msec->flags = origflags;
1496 return FALSE;
1497 }
9e756d64 1498
a7519a3c
RH
1499 if (!elf64_alpha_read_ecoff_info (abfd, msec, &fi->d))
1500 {
1501 msec->flags = origflags;
1502 return FALSE;
1503 }
9e756d64 1504
a7519a3c
RH
1505 /* Swap in the FDR information. */
1506 amt = fi->d.symbolic_header.ifdMax * sizeof (struct fdr);
1507 fi->d.fdr = (struct fdr *) bfd_alloc (abfd, amt);
1508 if (fi->d.fdr == NULL)
1509 {
1510 msec->flags = origflags;
1511 return FALSE;
1512 }
1513 external_fdr_size = swap->external_fdr_size;
1514 fdr_ptr = fi->d.fdr;
1515 fraw_src = (char *) fi->d.external_fdr;
1516 fraw_end = (fraw_src
1517 + fi->d.symbolic_header.ifdMax * external_fdr_size);
1518 for (; fraw_src < fraw_end; fraw_src += external_fdr_size, fdr_ptr++)
2c3fc389 1519 (*swap->swap_fdr_in) (abfd, fraw_src, fdr_ptr);
9e756d64 1520
698600e4 1521 alpha_elf_tdata (abfd)->find_line_info = fi;
9e756d64 1522
a7519a3c
RH
1523 /* Note that we don't bother to ever free this information.
1524 find_nearest_line is either called all the time, as in
1525 objdump -l, so the information should be saved, or it is
1526 rarely called, as in ld error messages, so the memory
1527 wasted is unimportant. Still, it would probably be a
1528 good idea for free_cached_info to throw it away. */
1529 }
9e756d64 1530
a7519a3c
RH
1531 if (_bfd_ecoff_locate_line (abfd, section, offset, &fi->d, swap,
1532 &fi->i, filename_ptr, functionname_ptr,
1533 line_ptr))
1534 {
1535 msec->flags = origflags;
1536 return TRUE;
1537 }
9e756d64 1538
a7519a3c 1539 msec->flags = origflags;
9e756d64 1540 }
9e756d64 1541
a7519a3c 1542 /* Fall back on the generic ELF find_nearest_line routine. */
9e756d64 1543
fb167eb2 1544 return _bfd_elf_find_nearest_line (abfd, symbols, section, offset,
a7519a3c 1545 filename_ptr, functionname_ptr,
fb167eb2 1546 line_ptr, discriminator_ptr);
9e756d64 1547}
a7519a3c
RH
1548\f
1549/* Structure used to pass information to alpha_elf_output_extsym. */
9e756d64 1550
a7519a3c 1551struct extsym_info
9e756d64 1552{
a7519a3c
RH
1553 bfd *abfd;
1554 struct bfd_link_info *info;
1555 struct ecoff_debug_info *debug;
1556 const struct ecoff_debug_swap *swap;
1557 bfd_boolean failed;
1558};
9e756d64 1559
a7519a3c 1560static bfd_boolean
2c3fc389 1561elf64_alpha_output_extsym (struct alpha_elf_link_hash_entry *h, void * data)
a7519a3c
RH
1562{
1563 struct extsym_info *einfo = (struct extsym_info *) data;
1564 bfd_boolean strip;
1565 asection *sec, *output_section;
9e756d64 1566
a7519a3c
RH
1567 if (h->root.indx == -2)
1568 strip = FALSE;
1569 else if ((h->root.def_dynamic
1570 || h->root.ref_dynamic
1571 || h->root.root.type == bfd_link_hash_new)
1572 && !h->root.def_regular
1573 && !h->root.ref_regular)
1574 strip = TRUE;
1575 else if (einfo->info->strip == strip_all
1576 || (einfo->info->strip == strip_some
1577 && bfd_hash_lookup (einfo->info->keep_hash,
1578 h->root.root.root.string,
1579 FALSE, FALSE) == NULL))
1580 strip = TRUE;
1581 else
1582 strip = FALSE;
9e756d64 1583
a7519a3c 1584 if (strip)
b34976b6 1585 return TRUE;
9e756d64 1586
a7519a3c 1587 if (h->esym.ifd == -2)
9e756d64 1588 {
a7519a3c
RH
1589 h->esym.jmptbl = 0;
1590 h->esym.cobol_main = 0;
1591 h->esym.weakext = 0;
1592 h->esym.reserved = 0;
1593 h->esym.ifd = ifdNil;
1594 h->esym.asym.value = 0;
1595 h->esym.asym.st = stGlobal;
9e756d64 1596
a7519a3c
RH
1597 if (h->root.root.type != bfd_link_hash_defined
1598 && h->root.root.type != bfd_link_hash_defweak)
1599 h->esym.asym.sc = scAbs;
1600 else
1601 {
1602 const char *name;
9e756d64 1603
a7519a3c
RH
1604 sec = h->root.root.u.def.section;
1605 output_section = sec->output_section;
9e756d64 1606
a7519a3c
RH
1607 /* When making a shared library and symbol h is the one from
1608 the another shared library, OUTPUT_SECTION may be null. */
1609 if (output_section == NULL)
1610 h->esym.asym.sc = scUndefined;
1611 else
1612 {
1613 name = bfd_section_name (output_section->owner, output_section);
9e756d64 1614
a7519a3c
RH
1615 if (strcmp (name, ".text") == 0)
1616 h->esym.asym.sc = scText;
1617 else if (strcmp (name, ".data") == 0)
1618 h->esym.asym.sc = scData;
1619 else if (strcmp (name, ".sdata") == 0)
1620 h->esym.asym.sc = scSData;
1621 else if (strcmp (name, ".rodata") == 0
1622 || strcmp (name, ".rdata") == 0)
1623 h->esym.asym.sc = scRData;
1624 else if (strcmp (name, ".bss") == 0)
1625 h->esym.asym.sc = scBss;
1626 else if (strcmp (name, ".sbss") == 0)
1627 h->esym.asym.sc = scSBss;
1628 else if (strcmp (name, ".init") == 0)
1629 h->esym.asym.sc = scInit;
1630 else if (strcmp (name, ".fini") == 0)
1631 h->esym.asym.sc = scFini;
1632 else
1633 h->esym.asym.sc = scAbs;
1634 }
1635 }
9e756d64 1636
a7519a3c
RH
1637 h->esym.asym.reserved = 0;
1638 h->esym.asym.index = indexNil;
1639 }
9e756d64 1640
a7519a3c
RH
1641 if (h->root.root.type == bfd_link_hash_common)
1642 h->esym.asym.value = h->root.root.u.c.size;
1643 else if (h->root.root.type == bfd_link_hash_defined
1644 || h->root.root.type == bfd_link_hash_defweak)
1645 {
1646 if (h->esym.asym.sc == scCommon)
1647 h->esym.asym.sc = scBss;
1648 else if (h->esym.asym.sc == scSCommon)
1649 h->esym.asym.sc = scSBss;
9e756d64 1650
a7519a3c
RH
1651 sec = h->root.root.u.def.section;
1652 output_section = sec->output_section;
1653 if (output_section != NULL)
1654 h->esym.asym.value = (h->root.root.u.def.value
1655 + sec->output_offset
1656 + output_section->vma);
1657 else
1658 h->esym.asym.value = 0;
1659 }
9e756d64 1660
a7519a3c
RH
1661 if (! bfd_ecoff_debug_one_external (einfo->abfd, einfo->debug, einfo->swap,
1662 h->root.root.root.string,
1663 &h->esym))
1664 {
1665 einfo->failed = TRUE;
1666 return FALSE;
9e756d64
RH
1667 }
1668
a7519a3c
RH
1669 return TRUE;
1670}
1671\f
1672/* Search for and possibly create a got entry. */
9e756d64 1673
a7519a3c
RH
1674static struct alpha_elf_got_entry *
1675get_got_entry (bfd *abfd, struct alpha_elf_link_hash_entry *h,
1676 unsigned long r_type, unsigned long r_symndx,
1677 bfd_vma r_addend)
1678{
1679 struct alpha_elf_got_entry *gotent;
1680 struct alpha_elf_got_entry **slot;
9e756d64 1681
a7519a3c
RH
1682 if (h)
1683 slot = &h->got_entries;
1684 else
1685 {
1686 /* This is a local .got entry -- record for merge. */
9e756d64 1687
a7519a3c 1688 struct alpha_elf_got_entry **local_got_entries;
9e756d64 1689
a7519a3c
RH
1690 local_got_entries = alpha_elf_tdata(abfd)->local_got_entries;
1691 if (!local_got_entries)
1692 {
1693 bfd_size_type size;
1694 Elf_Internal_Shdr *symtab_hdr;
9e756d64 1695
a7519a3c
RH
1696 symtab_hdr = &elf_tdata(abfd)->symtab_hdr;
1697 size = symtab_hdr->sh_info;
1698 size *= sizeof (struct alpha_elf_got_entry *);
9e756d64 1699
a7519a3c
RH
1700 local_got_entries
1701 = (struct alpha_elf_got_entry **) bfd_zalloc (abfd, size);
1702 if (!local_got_entries)
1703 return NULL;
1704
1705 alpha_elf_tdata (abfd)->local_got_entries = local_got_entries;
1706 }
1707
1708 slot = &local_got_entries[r_symndx];
9e756d64
RH
1709 }
1710
a7519a3c
RH
1711 for (gotent = *slot; gotent ; gotent = gotent->next)
1712 if (gotent->gotobj == abfd
1713 && gotent->reloc_type == r_type
1714 && gotent->addend == r_addend)
1715 break;
1716
1717 if (!gotent)
9e756d64 1718 {
a7519a3c
RH
1719 int entry_size;
1720 bfd_size_type amt;
9e756d64 1721
a7519a3c
RH
1722 amt = sizeof (struct alpha_elf_got_entry);
1723 gotent = (struct alpha_elf_got_entry *) bfd_alloc (abfd, amt);
1724 if (!gotent)
1725 return NULL;
9e756d64 1726
a7519a3c
RH
1727 gotent->gotobj = abfd;
1728 gotent->addend = r_addend;
1729 gotent->got_offset = -1;
6ec7057a 1730 gotent->plt_offset = -1;
a7519a3c
RH
1731 gotent->use_count = 1;
1732 gotent->reloc_type = r_type;
1733 gotent->reloc_done = 0;
1734 gotent->reloc_xlated = 0;
9e756d64 1735
a7519a3c
RH
1736 gotent->next = *slot;
1737 *slot = gotent;
9e756d64 1738
a7519a3c
RH
1739 entry_size = alpha_got_entry_size (r_type);
1740 alpha_elf_tdata (abfd)->total_got_size += entry_size;
1741 if (!h)
1742 alpha_elf_tdata(abfd)->local_got_size += entry_size;
9e756d64 1743 }
a7519a3c
RH
1744 else
1745 gotent->use_count += 1;
9e756d64 1746
a7519a3c 1747 return gotent;
9e756d64
RH
1748}
1749
6ec7057a
RH
1750static bfd_boolean
1751elf64_alpha_want_plt (struct alpha_elf_link_hash_entry *ah)
1752{
1753 return ((ah->root.type == STT_FUNC
1754 || ah->root.root.type == bfd_link_hash_undefweak
1755 || ah->root.root.type == bfd_link_hash_undefined)
8288a39e
RH
1756 && (ah->flags & ALPHA_ELF_LINK_HASH_LU_PLT) != 0
1757 && (ah->flags & ~ALPHA_ELF_LINK_HASH_LU_PLT) == 0);
6ec7057a
RH
1758}
1759
6fc5bb57
AM
1760/* Whether to sort relocs output by ld -r or ld --emit-relocs, by r_offset.
1761 Don't do so for code sections. We want to keep ordering of LITERAL/LITUSE
1762 as is. On the other hand, elf-eh-frame.c processing requires .eh_frame
1763 relocs to be sorted. */
1764
1765static bfd_boolean
1766elf64_alpha_sort_relocs_p (asection *sec)
1767{
1768 return (sec->flags & SEC_CODE) == 0;
1769}
1770
1771
a7519a3c
RH
1772/* Handle dynamic relocations when doing an Alpha ELF link. */
1773
b34976b6 1774static bfd_boolean
a7519a3c
RH
1775elf64_alpha_check_relocs (bfd *abfd, struct bfd_link_info *info,
1776 asection *sec, const Elf_Internal_Rela *relocs)
252b5132 1777{
a7519a3c
RH
1778 bfd *dynobj;
1779 asection *sreloc;
252b5132 1780 Elf_Internal_Shdr *symtab_hdr;
a7519a3c
RH
1781 struct alpha_elf_link_hash_entry **sym_hashes;
1782 const Elf_Internal_Rela *rel, *relend;
a7519a3c 1783 bfd_size_type amt;
252b5132 1784
0e1862bb 1785 if (bfd_link_relocatable (info))
a7519a3c 1786 return TRUE;
252b5132 1787
a7519a3c
RH
1788 /* Don't do anything special with non-loaded, non-alloced sections.
1789 In particular, any relocs in such sections should not affect GOT
1790 and PLT reference counting (ie. we don't allow them to create GOT
1791 or PLT entries), there's no possibility or desire to optimize TLS
1792 relocs, and there's not much point in propagating relocs to shared
1793 libs that the dynamic linker won't relocate. */
1794 if ((sec->flags & SEC_ALLOC) == 0)
b34976b6 1795 return TRUE;
252b5132 1796
0ffa91dd
NC
1797 BFD_ASSERT (is_alpha_elf (abfd));
1798
1799 dynobj = elf_hash_table (info)->dynobj;
a7519a3c 1800 if (dynobj == NULL)
0ffa91dd 1801 elf_hash_table (info)->dynobj = dynobj = abfd;
252b5132 1802
a7519a3c 1803 sreloc = NULL;
0ffa91dd
NC
1804 symtab_hdr = &elf_symtab_hdr (abfd);
1805 sym_hashes = alpha_elf_sym_hashes (abfd);
a7519a3c
RH
1806
1807 relend = relocs + sec->reloc_count;
1808 for (rel = relocs; rel < relend; ++rel)
1809 {
1810 enum {
1811 NEED_GOT = 1,
1812 NEED_GOT_ENTRY = 2,
1813 NEED_DYNREL = 4
1814 };
1815
1816 unsigned long r_symndx, r_type;
1817 struct alpha_elf_link_hash_entry *h;
1818 unsigned int gotent_flags;
1819 bfd_boolean maybe_dynamic;
1820 unsigned int need;
1821 bfd_vma addend;
1822
1823 r_symndx = ELF64_R_SYM (rel->r_info);
1824 if (r_symndx < symtab_hdr->sh_info)
1825 h = NULL;
1826 else
1827 {
1828 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
252b5132 1829
a7519a3c
RH
1830 while (h->root.root.type == bfd_link_hash_indirect
1831 || h->root.root.type == bfd_link_hash_warning)
1832 h = (struct alpha_elf_link_hash_entry *)h->root.root.u.i.link;
252b5132 1833
81fbe831
AM
1834 /* PR15323, ref flags aren't set for references in the same
1835 object. */
1836 h->root.root.non_ir_ref = 1;
a7519a3c
RH
1837 h->root.ref_regular = 1;
1838 }
252b5132 1839
a7519a3c
RH
1840 /* We can only get preliminary data on whether a symbol is
1841 locally or externally defined, as not all of the input files
1842 have yet been processed. Do something with what we know, as
1843 this may help reduce memory usage and processing time later. */
1844 maybe_dynamic = FALSE;
0e1862bb 1845 if (h && ((bfd_link_pic (info)
a7519a3c
RH
1846 && (!info->symbolic
1847 || info->unresolved_syms_in_shared_libs == RM_IGNORE))
1848 || !h->root.def_regular
1849 || h->root.root.type == bfd_link_hash_defweak))
1850 maybe_dynamic = TRUE;
252b5132 1851
a7519a3c
RH
1852 need = 0;
1853 gotent_flags = 0;
1854 r_type = ELF64_R_TYPE (rel->r_info);
1855 addend = rel->r_addend;
9e756d64 1856
9e756d64
RH
1857 switch (r_type)
1858 {
1859 case R_ALPHA_LITERAL:
a7519a3c
RH
1860 need = NEED_GOT | NEED_GOT_ENTRY;
1861
1862 /* Remember how this literal is used from its LITUSEs.
1863 This will be important when it comes to decide if we can
1864 create a .plt entry for a function symbol. */
1865 while (++rel < relend && ELF64_R_TYPE (rel->r_info) == R_ALPHA_LITUSE)
8288a39e 1866 if (rel->r_addend >= 1 && rel->r_addend <= 6)
a7519a3c
RH
1867 gotent_flags |= 1 << rel->r_addend;
1868 --rel;
1869
1870 /* No LITUSEs -- presumably the address is used somehow. */
1871 if (gotent_flags == 0)
1872 gotent_flags = ALPHA_ELF_LINK_HASH_LU_ADDR;
1873 break;
1874
1875 case R_ALPHA_GPDISP:
1876 case R_ALPHA_GPREL16:
1877 case R_ALPHA_GPREL32:
9e756d64
RH
1878 case R_ALPHA_GPRELHIGH:
1879 case R_ALPHA_GPRELLOW:
a7519a3c
RH
1880 case R_ALPHA_BRSGP:
1881 need = NEED_GOT;
1882 break;
1883
1884 case R_ALPHA_REFLONG:
1885 case R_ALPHA_REFQUAD:
0e1862bb 1886 if (bfd_link_pic (info) || maybe_dynamic)
a7519a3c 1887 need = NEED_DYNREL;
cc03ec80
RH
1888 break;
1889
9e756d64 1890 case R_ALPHA_TLSLDM:
cc03ec80 1891 /* The symbol for a TLSLDM reloc is ignored. Collapse the
cf35638d
TS
1892 reloc to the STN_UNDEF (0) symbol so that they all match. */
1893 r_symndx = STN_UNDEF;
a7519a3c
RH
1894 h = 0;
1895 maybe_dynamic = FALSE;
1896 /* FALLTHRU */
1897
1898 case R_ALPHA_TLSGD:
1899 case R_ALPHA_GOTDTPREL:
1900 need = NEED_GOT | NEED_GOT_ENTRY;
9e756d64 1901 break;
cc03ec80 1902
a7519a3c
RH
1903 case R_ALPHA_GOTTPREL:
1904 need = NEED_GOT | NEED_GOT_ENTRY;
1905 gotent_flags = ALPHA_ELF_LINK_HASH_TLS_IE;
0e1862bb 1906 if (bfd_link_pic (info))
a7519a3c
RH
1907 info->flags |= DF_STATIC_TLS;
1908 break;
1909
1910 case R_ALPHA_TPREL64:
3cbc1e5e 1911 if (bfd_link_dll (info))
e366eeae
RH
1912 {
1913 info->flags |= DF_STATIC_TLS;
1914 need = NEED_DYNREL;
1915 }
1916 else if (maybe_dynamic)
a7519a3c 1917 need = NEED_DYNREL;
a7519a3c 1918 break;
252b5132
RH
1919 }
1920
a7519a3c 1921 if (need & NEED_GOT)
252b5132 1922 {
85d162e6 1923 if (alpha_elf_tdata(abfd)->gotobj == NULL)
6cdc0ccc 1924 {
a7519a3c
RH
1925 if (!elf64_alpha_create_got_section (abfd, info))
1926 return FALSE;
c328dc3f 1927 }
252b5132 1928 }
252b5132 1929
a7519a3c
RH
1930 if (need & NEED_GOT_ENTRY)
1931 {
1932 struct alpha_elf_got_entry *gotent;
252b5132 1933
a7519a3c
RH
1934 gotent = get_got_entry (abfd, h, r_type, r_symndx, addend);
1935 if (!gotent)
1936 return FALSE;
4a67a098 1937
a7519a3c 1938 if (gotent_flags)
cc03ec80 1939 {
a7519a3c
RH
1940 gotent->flags |= gotent_flags;
1941 if (h)
1942 {
1943 gotent_flags |= h->flags;
1944 h->flags = gotent_flags;
4a67a098 1945
a7519a3c 1946 /* Make a guess as to whether a .plt entry is needed. */
6ec7057a
RH
1947 /* ??? It appears that we won't make it into
1948 adjust_dynamic_symbol for symbols that remain
1949 totally undefined. Copying this check here means
1950 we can create a plt entry for them too. */
1951 h->root.needs_plt
1952 = (maybe_dynamic && elf64_alpha_want_plt (h));
1953 }
a7519a3c 1954 }
252b5132
RH
1955 }
1956
a7519a3c 1957 if (need & NEED_DYNREL)
9e756d64 1958 {
a7519a3c
RH
1959 /* We need to create the section here now whether we eventually
1960 use it or not so that it gets mapped to an output section by
83bac4b0 1961 the linker. If not used, we'll kill it in size_dynamic_sections. */
a7519a3c 1962 if (sreloc == NULL)
9e756d64 1963 {
83bac4b0
NC
1964 sreloc = _bfd_elf_make_dynamic_reloc_section
1965 (sec, dynobj, 3, abfd, /*rela?*/ TRUE);
1966
a7519a3c 1967 if (sreloc == NULL)
83bac4b0 1968 return FALSE;
9e756d64 1969 }
252b5132 1970
a7519a3c
RH
1971 if (h)
1972 {
1973 /* Since we havn't seen all of the input symbols yet, we
1974 don't know whether we'll actually need a dynamic relocation
1975 entry for this reloc. So make a record of it. Once we
1976 find out if this thing needs dynamic relocation we'll
1977 expand the relocation sections by the appropriate amount. */
9e756d64 1978
a7519a3c 1979 struct alpha_elf_reloc_entry *rent;
9e756d64 1980
a7519a3c
RH
1981 for (rent = h->reloc_entries; rent; rent = rent->next)
1982 if (rent->rtype == r_type && rent->srel == sreloc)
1983 break;
252b5132 1984
a7519a3c
RH
1985 if (!rent)
1986 {
1987 amt = sizeof (struct alpha_elf_reloc_entry);
1988 rent = (struct alpha_elf_reloc_entry *) bfd_alloc (abfd, amt);
1989 if (!rent)
1990 return FALSE;
252b5132 1991
a7519a3c
RH
1992 rent->srel = sreloc;
1993 rent->rtype = r_type;
1994 rent->count = 1;
1995 rent->reltext = (sec->flags & SEC_READONLY) != 0;
252b5132 1996
a7519a3c
RH
1997 rent->next = h->reloc_entries;
1998 h->reloc_entries = rent;
1999 }
2000 else
2001 rent->count++;
2002 }
0e1862bb 2003 else if (bfd_link_pic (info))
a7519a3c
RH
2004 {
2005 /* If this is a shared library, and the section is to be
2006 loaded into memory, we need a RELATIVE reloc. */
2007 sreloc->size += sizeof (Elf64_External_Rela);
2008 if (sec->flags & SEC_READONLY)
2009 info->flags |= DF_TEXTREL;
2010 }
252b5132
RH
2011 }
2012 }
2013
b34976b6 2014 return TRUE;
252b5132 2015}
252b5132 2016
e117360e
RH
2017/* Return the section that should be marked against GC for a given
2018 relocation. */
2019
2020static asection *
2021elf64_alpha_gc_mark_hook (asection *sec, struct bfd_link_info *info,
2022 Elf_Internal_Rela *rel,
2023 struct elf_link_hash_entry *h, Elf_Internal_Sym *sym)
2024{
2025 /* These relocations don't really reference a symbol. Instead we store
2026 extra data in their addend slot. Ignore the symbol. */
2027 switch (ELF64_R_TYPE (rel->r_info))
2028 {
2029 case R_ALPHA_LITUSE:
2030 case R_ALPHA_GPDISP:
2031 case R_ALPHA_HINT:
2032 return NULL;
2033 }
2034
2035 return _bfd_elf_gc_mark_hook (sec, info, rel, h, sym);
2036}
2037
2038/* Update the got entry reference counts for the section being removed. */
2039
2040static bfd_boolean
2041elf64_alpha_gc_sweep_hook (bfd *abfd, struct bfd_link_info *info,
2042 asection *sec, const Elf_Internal_Rela *relocs)
2043{
2044 Elf_Internal_Shdr *symtab_hdr;
2045 struct alpha_elf_link_hash_entry **sym_hashes;
2046 const Elf_Internal_Rela *rel, *relend;
2047
0e1862bb 2048 if (bfd_link_relocatable (info))
e117360e
RH
2049 return TRUE;
2050
2051 symtab_hdr = &elf_symtab_hdr (abfd);
2052 sym_hashes = alpha_elf_sym_hashes (abfd);
2053
2054 relend = relocs + sec->reloc_count;
2055 for (rel = relocs; rel < relend; rel++)
2056 {
2057 unsigned long r_symndx, r_type;
2058 struct alpha_elf_link_hash_entry *h = NULL;
2059 struct alpha_elf_got_entry *gotent;
2060
2061 r_symndx = ELF64_R_SYM (rel->r_info);
2062 if (r_symndx >= symtab_hdr->sh_info)
2063 {
2064 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
2065 while (h->root.root.type == bfd_link_hash_indirect
2066 || h->root.root.type == bfd_link_hash_warning)
2067 h = (struct alpha_elf_link_hash_entry *) h->root.root.u.i.link;
2068 }
2069
2070 r_type = ELF64_R_TYPE (rel->r_info);
2071 switch (r_type)
2072 {
2073 case R_ALPHA_LITERAL:
2074 /* ??? Ignore re-computation of gotent_flags. We're not
2075 carrying a use-count for each bit in that mask. */
2076
2077 case R_ALPHA_TLSGD:
2078 case R_ALPHA_GOTDTPREL:
2079 case R_ALPHA_GOTTPREL:
2080 /* Fetch the got entry from the tables. */
2081 gotent = get_got_entry (abfd, h, r_type, r_symndx, rel->r_addend);
2082
2083 /* The got entry *must* exist, since we should have created it
2084 before during check_relocs. Also note that get_got_entry
2085 assumed this was going to be another use, and so incremented
2086 the use count again. Thus the use count must be at least the
2087 one real use and the "use" we just added. */
2088 if (gotent == NULL || gotent->use_count < 2)
2089 {
2090 abort ();
2091 return FALSE;
2092 }
2093 gotent->use_count -= 2;
2094 break;
2095
2096 default:
2097 break;
2098 }
2099 }
2100
2101 return TRUE;
2102}
2103
a7519a3c
RH
2104/* Adjust a symbol defined by a dynamic object and referenced by a
2105 regular object. The current definition is in some section of the
2106 dynamic object, but we're not including those sections. We have to
2107 change the definition to something the rest of the link can
2108 understand. */
252b5132 2109
b34976b6 2110static bfd_boolean
a7519a3c
RH
2111elf64_alpha_adjust_dynamic_symbol (struct bfd_link_info *info,
2112 struct elf_link_hash_entry *h)
252b5132 2113{
a7519a3c
RH
2114 bfd *dynobj;
2115 asection *s;
2116 struct alpha_elf_link_hash_entry *ah;
252b5132 2117
a7519a3c
RH
2118 dynobj = elf_hash_table(info)->dynobj;
2119 ah = (struct alpha_elf_link_hash_entry *)h;
252b5132 2120
a7519a3c 2121 /* Now that we've seen all of the input symbols, finalize our decision
6ec7057a
RH
2122 about whether this symbol should get a .plt entry. Irritatingly, it
2123 is common for folk to leave undefined symbols in shared libraries,
2124 and they still expect lazy binding; accept undefined symbols in lieu
2125 of STT_FUNC. */
2126 if (alpha_elf_dynamic_symbol_p (h, info) && elf64_alpha_want_plt (ah))
252b5132 2127 {
6ec7057a 2128 h->needs_plt = TRUE;
252b5132 2129
3d4d4302 2130 s = bfd_get_linker_section (dynobj, ".plt");
a7519a3c
RH
2131 if (!s && !elf64_alpha_create_dynamic_sections (dynobj, info))
2132 return FALSE;
204692d7 2133
6ec7057a
RH
2134 /* We need one plt entry per got subsection. Delay allocation of
2135 the actual plt entries until size_plt_section, called from
2136 size_dynamic_sections or during relaxation. */
252b5132 2137
a7519a3c
RH
2138 return TRUE;
2139 }
2140 else
6ec7057a 2141 h->needs_plt = FALSE;
252b5132 2142
a7519a3c
RH
2143 /* If this is a weak symbol, and there is a real definition, the
2144 processor independent code will have arranged for us to see the
2145 real definition first, and we can just use the same value. */
2146 if (h->u.weakdef != NULL)
252b5132 2147 {
a7519a3c
RH
2148 BFD_ASSERT (h->u.weakdef->root.type == bfd_link_hash_defined
2149 || h->u.weakdef->root.type == bfd_link_hash_defweak);
2150 h->root.u.def.section = h->u.weakdef->root.u.def.section;
2151 h->root.u.def.value = h->u.weakdef->root.u.def.value;
2152 return TRUE;
252b5132 2153 }
a7519a3c
RH
2154
2155 /* This is a reference to a symbol defined by a dynamic object which
2156 is not a function. The Alpha, since it uses .got entries for all
2157 symbols even in regular objects, does not need the hackery of a
2158 .dynbss section and COPY dynamic relocations. */
252b5132 2159
b34976b6 2160 return TRUE;
252b5132
RH
2161}
2162
747ffa7b
AM
2163/* Record STO_ALPHA_NOPV and STO_ALPHA_STD_GPLOAD. */
2164
2165static void
2166elf64_alpha_merge_symbol_attribute (struct elf_link_hash_entry *h,
2167 const Elf_Internal_Sym *isym,
2168 bfd_boolean definition,
2169 bfd_boolean dynamic)
2170{
2171 if (!dynamic && definition)
2172 h->other = ((h->other & ELF_ST_VISIBILITY (-1))
2173 | (isym->st_other & ~ELF_ST_VISIBILITY (-1)));
2174}
2175
a7519a3c
RH
2176/* Symbol versioning can create new symbols, and make our old symbols
2177 indirect to the new ones. Consolidate the got and reloc information
2178 in these situations. */
252b5132 2179
48f4b4f5
RH
2180static void
2181elf64_alpha_copy_indirect_symbol (struct bfd_link_info *info,
2182 struct elf_link_hash_entry *dir,
2183 struct elf_link_hash_entry *ind)
252b5132 2184{
48f4b4f5
RH
2185 struct alpha_elf_link_hash_entry *hi
2186 = (struct alpha_elf_link_hash_entry *) ind;
2187 struct alpha_elf_link_hash_entry *hs
2188 = (struct alpha_elf_link_hash_entry *) dir;
252b5132 2189
48f4b4f5
RH
2190 /* Do the merging in the superclass. */
2191 _bfd_elf_link_hash_copy_indirect(info, dir, ind);
252b5132 2192
a7519a3c 2193 /* Merge the flags. Whee. */
a7519a3c
RH
2194 hs->flags |= hi->flags;
2195
48f4b4f5
RH
2196 /* ??? It's unclear to me what's really supposed to happen when
2197 "merging" defweak and defined symbols, given that we don't
2198 actually throw away the defweak. This more-or-less copies
2199 the logic related to got and plt entries in the superclass. */
2200 if (ind->root.type != bfd_link_hash_indirect)
2201 return;
2202
a7519a3c
RH
2203 /* Merge the .got entries. Cannibalize the old symbol's list in
2204 doing so, since we don't need it anymore. */
2205
2206 if (hs->got_entries == NULL)
2207 hs->got_entries = hi->got_entries;
2208 else
2209 {
2210 struct alpha_elf_got_entry *gi, *gs, *gin, *gsh;
2211
2212 gsh = hs->got_entries;
2213 for (gi = hi->got_entries; gi ; gi = gin)
252b5132 2214 {
a7519a3c
RH
2215 gin = gi->next;
2216 for (gs = gsh; gs ; gs = gs->next)
2217 if (gi->gotobj == gs->gotobj
2218 && gi->reloc_type == gs->reloc_type
2219 && gi->addend == gs->addend)
2220 {
2221 gi->use_count += gs->use_count;
2222 goto got_found;
2223 }
2224 gi->next = hs->got_entries;
2225 hs->got_entries = gi;
2226 got_found:;
252b5132 2227 }
a7519a3c
RH
2228 }
2229 hi->got_entries = NULL;
252b5132 2230
a7519a3c
RH
2231 /* And similar for the reloc entries. */
2232
2233 if (hs->reloc_entries == NULL)
2234 hs->reloc_entries = hi->reloc_entries;
2235 else
2236 {
2237 struct alpha_elf_reloc_entry *ri, *rs, *rin, *rsh;
2238
2239 rsh = hs->reloc_entries;
2240 for (ri = hi->reloc_entries; ri ; ri = rin)
2241 {
2242 rin = ri->next;
2243 for (rs = rsh; rs ; rs = rs->next)
2244 if (ri->rtype == rs->rtype && ri->srel == rs->srel)
2245 {
2246 rs->count += ri->count;
2247 goto found_reloc;
2248 }
2249 ri->next = hs->reloc_entries;
2250 hs->reloc_entries = ri;
2251 found_reloc:;
2252 }
252b5132 2253 }
a7519a3c 2254 hi->reloc_entries = NULL;
252b5132
RH
2255}
2256
a7519a3c 2257/* Is it possible to merge two object file's .got tables? */
252b5132 2258
b34976b6 2259static bfd_boolean
a7519a3c 2260elf64_alpha_can_merge_gots (bfd *a, bfd *b)
252b5132 2261{
a7519a3c
RH
2262 int total = alpha_elf_tdata (a)->total_got_size;
2263 bfd *bsub;
252b5132 2264
a7519a3c
RH
2265 /* Trivial quick fallout test. */
2266 if (total + alpha_elf_tdata (b)->total_got_size <= MAX_GOT_SIZE)
2267 return TRUE;
252b5132 2268
a7519a3c
RH
2269 /* By their nature, local .got entries cannot be merged. */
2270 if ((total += alpha_elf_tdata (b)->local_got_size) > MAX_GOT_SIZE)
b34976b6 2271 return FALSE;
252b5132 2272
a7519a3c
RH
2273 /* Failing the common trivial comparison, we must effectively
2274 perform the merge. Not actually performing the merge means that
2275 we don't have to store undo information in case we fail. */
2276 for (bsub = b; bsub ; bsub = alpha_elf_tdata (bsub)->in_got_link_next)
2277 {
2278 struct alpha_elf_link_hash_entry **hashes = alpha_elf_sym_hashes (bsub);
2279 Elf_Internal_Shdr *symtab_hdr = &elf_tdata (bsub)->symtab_hdr;
2280 int i, n;
2281
2282 n = NUM_SHDR_ENTRIES (symtab_hdr) - symtab_hdr->sh_info;
2283 for (i = 0; i < n; ++i)
2284 {
2285 struct alpha_elf_got_entry *ae, *be;
2286 struct alpha_elf_link_hash_entry *h;
2287
2288 h = hashes[i];
2289 while (h->root.root.type == bfd_link_hash_indirect
2290 || h->root.root.type == bfd_link_hash_warning)
2291 h = (struct alpha_elf_link_hash_entry *)h->root.root.u.i.link;
2292
2293 for (be = h->got_entries; be ; be = be->next)
2294 {
2295 if (be->use_count == 0)
2296 continue;
2297 if (be->gotobj != b)
2298 continue;
2299
2300 for (ae = h->got_entries; ae ; ae = ae->next)
2301 if (ae->gotobj == a
2302 && ae->reloc_type == be->reloc_type
2303 && ae->addend == be->addend)
2304 goto global_found;
2305
2306 total += alpha_got_entry_size (be->reloc_type);
2307 if (total > MAX_GOT_SIZE)
2308 return FALSE;
2309 global_found:;
2310 }
2311 }
2312 }
252b5132 2313
b34976b6 2314 return TRUE;
252b5132
RH
2315}
2316
a7519a3c 2317/* Actually merge two .got tables. */
252b5132 2318
a7519a3c
RH
2319static void
2320elf64_alpha_merge_gots (bfd *a, bfd *b)
252b5132 2321{
a7519a3c
RH
2322 int total = alpha_elf_tdata (a)->total_got_size;
2323 bfd *bsub;
252b5132 2324
a7519a3c
RH
2325 /* Remember local expansion. */
2326 {
2327 int e = alpha_elf_tdata (b)->local_got_size;
2328 total += e;
2329 alpha_elf_tdata (a)->local_got_size += e;
2330 }
252b5132 2331
a7519a3c
RH
2332 for (bsub = b; bsub ; bsub = alpha_elf_tdata (bsub)->in_got_link_next)
2333 {
2334 struct alpha_elf_got_entry **local_got_entries;
2335 struct alpha_elf_link_hash_entry **hashes;
2336 Elf_Internal_Shdr *symtab_hdr;
2337 int i, n;
252b5132 2338
a7519a3c
RH
2339 /* Let the local .got entries know they are part of a new subsegment. */
2340 local_got_entries = alpha_elf_tdata (bsub)->local_got_entries;
2341 if (local_got_entries)
2342 {
2343 n = elf_tdata (bsub)->symtab_hdr.sh_info;
2344 for (i = 0; i < n; ++i)
2345 {
2346 struct alpha_elf_got_entry *ent;
2347 for (ent = local_got_entries[i]; ent; ent = ent->next)
2348 ent->gotobj = a;
2349 }
2350 }
252b5132 2351
a7519a3c
RH
2352 /* Merge the global .got entries. */
2353 hashes = alpha_elf_sym_hashes (bsub);
2354 symtab_hdr = &elf_tdata (bsub)->symtab_hdr;
252b5132 2355
a7519a3c
RH
2356 n = NUM_SHDR_ENTRIES (symtab_hdr) - symtab_hdr->sh_info;
2357 for (i = 0; i < n; ++i)
2358 {
2359 struct alpha_elf_got_entry *ae, *be, **pbe, **start;
2360 struct alpha_elf_link_hash_entry *h;
252b5132 2361
a7519a3c
RH
2362 h = hashes[i];
2363 while (h->root.root.type == bfd_link_hash_indirect
2364 || h->root.root.type == bfd_link_hash_warning)
2365 h = (struct alpha_elf_link_hash_entry *)h->root.root.u.i.link;
252b5132 2366
a7519a3c
RH
2367 pbe = start = &h->got_entries;
2368 while ((be = *pbe) != NULL)
2369 {
2370 if (be->use_count == 0)
2371 {
2372 *pbe = be->next;
2373 memset (be, 0xa5, sizeof (*be));
2374 goto kill;
2375 }
2376 if (be->gotobj != b)
2377 goto next;
2378
2379 for (ae = *start; ae ; ae = ae->next)
2380 if (ae->gotobj == a
2381 && ae->reloc_type == be->reloc_type
2382 && ae->addend == be->addend)
2383 {
2384 ae->flags |= be->flags;
2385 ae->use_count += be->use_count;
2386 *pbe = be->next;
2387 memset (be, 0xa5, sizeof (*be));
2388 goto kill;
2389 }
2390 be->gotobj = a;
2391 total += alpha_got_entry_size (be->reloc_type);
252b5132 2392
a7519a3c
RH
2393 next:;
2394 pbe = &be->next;
2395 kill:;
2396 }
2397 }
252b5132 2398
a7519a3c
RH
2399 alpha_elf_tdata (bsub)->gotobj = a;
2400 }
2401 alpha_elf_tdata (a)->total_got_size = total;
252b5132 2402
a7519a3c
RH
2403 /* Merge the two in_got chains. */
2404 {
2405 bfd *next;
252b5132 2406
a7519a3c
RH
2407 bsub = a;
2408 while ((next = alpha_elf_tdata (bsub)->in_got_link_next) != NULL)
2409 bsub = next;
252b5132 2410
a7519a3c
RH
2411 alpha_elf_tdata (bsub)->in_got_link_next = b;
2412 }
252b5132 2413}
a7519a3c
RH
2414
2415/* Calculate the offsets for the got entries. */
252b5132 2416
b34976b6 2417static bfd_boolean
a7519a3c 2418elf64_alpha_calc_got_offsets_for_symbol (struct alpha_elf_link_hash_entry *h,
2c3fc389 2419 void * arg ATTRIBUTE_UNUSED)
252b5132 2420{
a7519a3c 2421 struct alpha_elf_got_entry *gotent;
252b5132 2422
a7519a3c
RH
2423 for (gotent = h->got_entries; gotent; gotent = gotent->next)
2424 if (gotent->use_count > 0)
2425 {
2426 struct alpha_elf_obj_tdata *td;
2427 bfd_size_type *plge;
252b5132 2428
a7519a3c 2429 td = alpha_elf_tdata (gotent->gotobj);
a7519a3c
RH
2430 plge = &td->got->size;
2431 gotent->got_offset = *plge;
2432 *plge += alpha_got_entry_size (gotent->reloc_type);
2433 }
252b5132 2434
6ec7057a 2435 return TRUE;
a7519a3c 2436}
252b5132 2437
a7519a3c
RH
2438static void
2439elf64_alpha_calc_got_offsets (struct bfd_link_info *info)
2440{
4dfe6ac6
NC
2441 bfd *i, *got_list;
2442 struct alpha_elf_link_hash_table * htab;
2443
2444 htab = alpha_elf_hash_table (info);
2445 if (htab == NULL)
2446 return;
2447 got_list = htab->got_list;
252b5132 2448
a7519a3c
RH
2449 /* First, zero out the .got sizes, as we may be recalculating the
2450 .got after optimizing it. */
2451 for (i = got_list; i ; i = alpha_elf_tdata(i)->got_link_next)
2452 alpha_elf_tdata(i)->got->size = 0;
252b5132 2453
a7519a3c 2454 /* Next, fill in the offsets for all the global entries. */
4dfe6ac6 2455 alpha_elf_link_hash_traverse (htab,
a7519a3c
RH
2456 elf64_alpha_calc_got_offsets_for_symbol,
2457 NULL);
252b5132 2458
a7519a3c
RH
2459 /* Finally, fill in the offsets for the local entries. */
2460 for (i = got_list; i ; i = alpha_elf_tdata(i)->got_link_next)
2461 {
2462 bfd_size_type got_offset = alpha_elf_tdata(i)->got->size;
2463 bfd *j;
252b5132 2464
a7519a3c
RH
2465 for (j = i; j ; j = alpha_elf_tdata(j)->in_got_link_next)
2466 {
2467 struct alpha_elf_got_entry **local_got_entries, *gotent;
2468 int k, n;
252b5132 2469
a7519a3c
RH
2470 local_got_entries = alpha_elf_tdata(j)->local_got_entries;
2471 if (!local_got_entries)
2472 continue;
252b5132 2473
a7519a3c
RH
2474 for (k = 0, n = elf_tdata(j)->symtab_hdr.sh_info; k < n; ++k)
2475 for (gotent = local_got_entries[k]; gotent; gotent = gotent->next)
2476 if (gotent->use_count > 0)
2477 {
2478 gotent->got_offset = got_offset;
2479 got_offset += alpha_got_entry_size (gotent->reloc_type);
2480 }
2481 }
252b5132 2482
a7519a3c
RH
2483 alpha_elf_tdata(i)->got->size = got_offset;
2484 }
2485}
252b5132 2486
a7519a3c 2487/* Constructs the gots. */
252b5132 2488
b34976b6 2489static bfd_boolean
d1c109de
RH
2490elf64_alpha_size_got_sections (struct bfd_link_info *info,
2491 bfd_boolean may_merge)
252b5132 2492{
a7519a3c 2493 bfd *i, *got_list, *cur_got_obj = NULL;
4dfe6ac6 2494 struct alpha_elf_link_hash_table * htab;
252b5132 2495
4dfe6ac6
NC
2496 htab = alpha_elf_hash_table (info);
2497 if (htab == NULL)
2498 return FALSE;
2499 got_list = htab->got_list;
95404643 2500
a7519a3c
RH
2501 /* On the first time through, pretend we have an existing got list
2502 consisting of all of the input files. */
2503 if (got_list == NULL)
252b5132 2504 {
c72f2fb2 2505 for (i = info->input_bfds; i ; i = i->link.next)
252b5132 2506 {
0ffa91dd
NC
2507 bfd *this_got;
2508
2509 if (! is_alpha_elf (i))
2510 continue;
2511
2512 this_got = alpha_elf_tdata (i)->gotobj;
a7519a3c
RH
2513 if (this_got == NULL)
2514 continue;
252b5132 2515
a7519a3c
RH
2516 /* We are assuming no merging has yet occurred. */
2517 BFD_ASSERT (this_got == i);
252b5132 2518
a7519a3c 2519 if (alpha_elf_tdata (this_got)->total_got_size > MAX_GOT_SIZE)
252b5132 2520 {
a7519a3c
RH
2521 /* Yikes! A single object file has too many entries. */
2522 (*_bfd_error_handler)
2523 (_("%B: .got subsegment exceeds 64K (size %d)"),
2524 i, alpha_elf_tdata (this_got)->total_got_size);
b34976b6 2525 return FALSE;
252b5132 2526 }
252b5132 2527
a7519a3c
RH
2528 if (got_list == NULL)
2529 got_list = this_got;
2530 else
2531 alpha_elf_tdata(cur_got_obj)->got_link_next = this_got;
2532 cur_got_obj = this_got;
252b5132
RH
2533 }
2534
a7519a3c
RH
2535 /* Strange degenerate case of no got references. */
2536 if (got_list == NULL)
2537 return TRUE;
2538
4dfe6ac6 2539 htab->got_list = got_list;
a7519a3c
RH
2540 }
2541
2542 cur_got_obj = got_list;
0ffa91dd
NC
2543 if (cur_got_obj == NULL)
2544 return FALSE;
2545
d1c109de 2546 if (may_merge)
a7519a3c 2547 {
d1c109de
RH
2548 i = alpha_elf_tdata(cur_got_obj)->got_link_next;
2549 while (i != NULL)
252b5132 2550 {
d1c109de
RH
2551 if (elf64_alpha_can_merge_gots (cur_got_obj, i))
2552 {
2553 elf64_alpha_merge_gots (cur_got_obj, i);
252b5132 2554
d1c109de
RH
2555 alpha_elf_tdata(i)->got->size = 0;
2556 i = alpha_elf_tdata(i)->got_link_next;
2557 alpha_elf_tdata(cur_got_obj)->got_link_next = i;
2558 }
2559 else
2560 {
2561 cur_got_obj = i;
2562 i = alpha_elf_tdata(i)->got_link_next;
2563 }
a7519a3c 2564 }
252b5132
RH
2565 }
2566
a7519a3c
RH
2567 /* Once the gots have been merged, fill in the got offsets for
2568 everything therein. */
4a828aab 2569 elf64_alpha_calc_got_offsets (info);
252b5132 2570
a7519a3c 2571 return TRUE;
252b5132 2572}
252b5132 2573
b34976b6 2574static bfd_boolean
2c3fc389
NC
2575elf64_alpha_size_plt_section_1 (struct alpha_elf_link_hash_entry *h,
2576 void * data)
252b5132 2577{
a7519a3c
RH
2578 asection *splt = (asection *) data;
2579 struct alpha_elf_got_entry *gotent;
6ec7057a 2580 bfd_boolean saw_one = FALSE;
252b5132 2581
a7519a3c
RH
2582 /* If we didn't need an entry before, we still don't. */
2583 if (!h->root.needs_plt)
2584 return TRUE;
e92d460e 2585
6ec7057a 2586 /* For each LITERAL got entry still in use, allocate a plt entry. */
a7519a3c
RH
2587 for (gotent = h->got_entries; gotent ; gotent = gotent->next)
2588 if (gotent->reloc_type == R_ALPHA_LITERAL
2589 && gotent->use_count > 0)
6ec7057a
RH
2590 {
2591 if (splt->size == 0)
2592 splt->size = PLT_HEADER_SIZE;
2593 gotent->plt_offset = splt->size;
2594 splt->size += PLT_ENTRY_SIZE;
2595 saw_one = TRUE;
2596 }
a7519a3c 2597
6ec7057a
RH
2598 /* If there weren't any, there's no longer a need for the PLT entry. */
2599 if (!saw_one)
2600 h->root.needs_plt = FALSE;
a7519a3c
RH
2601
2602 return TRUE;
2603}
2604
4a828aab
RH
2605/* Called from relax_section to rebuild the PLT in light of potential changes
2606 in the function's status. */
a7519a3c 2607
4a828aab 2608static void
a7519a3c
RH
2609elf64_alpha_size_plt_section (struct bfd_link_info *info)
2610{
6ec7057a 2611 asection *splt, *spltrel, *sgotplt;
a7519a3c
RH
2612 unsigned long entries;
2613 bfd *dynobj;
4dfe6ac6
NC
2614 struct alpha_elf_link_hash_table * htab;
2615
2616 htab = alpha_elf_hash_table (info);
2617 if (htab == NULL)
2618 return;
a7519a3c
RH
2619
2620 dynobj = elf_hash_table(info)->dynobj;
3d4d4302 2621 splt = bfd_get_linker_section (dynobj, ".plt");
a7519a3c 2622 if (splt == NULL)
4a828aab 2623 return;
252b5132 2624
a7519a3c 2625 splt->size = 0;
252b5132 2626
4dfe6ac6 2627 alpha_elf_link_hash_traverse (htab,
a7519a3c 2628 elf64_alpha_size_plt_section_1, splt);
e92d460e 2629
a7519a3c 2630 /* Every plt entry requires a JMP_SLOT relocation. */
3d4d4302 2631 spltrel = bfd_get_linker_section (dynobj, ".rela.plt");
4a828aab 2632 entries = 0;
a7519a3c 2633 if (splt->size)
6ec7057a
RH
2634 {
2635 if (elf64_alpha_use_secureplt)
2636 entries = (splt->size - NEW_PLT_HEADER_SIZE) / NEW_PLT_ENTRY_SIZE;
2637 else
2638 entries = (splt->size - OLD_PLT_HEADER_SIZE) / OLD_PLT_ENTRY_SIZE;
2639 }
a7519a3c 2640 spltrel->size = entries * sizeof (Elf64_External_Rela);
e92d460e 2641
6ec7057a
RH
2642 /* When using the secureplt, we need two words somewhere in the data
2643 segment for the dynamic linker to tell us where to go. This is the
2644 entire contents of the .got.plt section. */
2645 if (elf64_alpha_use_secureplt)
2646 {
3d4d4302 2647 sgotplt = bfd_get_linker_section (dynobj, ".got.plt");
6ec7057a
RH
2648 sgotplt->size = entries ? 16 : 0;
2649 }
a7519a3c 2650}
e92d460e 2651
a7519a3c
RH
2652static bfd_boolean
2653elf64_alpha_always_size_sections (bfd *output_bfd ATTRIBUTE_UNUSED,
2654 struct bfd_link_info *info)
2655{
2656 bfd *i;
4dfe6ac6 2657 struct alpha_elf_link_hash_table * htab;
252b5132 2658
0e1862bb 2659 if (bfd_link_relocatable (info))
a7519a3c 2660 return TRUE;
252b5132 2661
4dfe6ac6
NC
2662 htab = alpha_elf_hash_table (info);
2663 if (htab == NULL)
2664 return FALSE;
2665
d1c109de 2666 if (!elf64_alpha_size_got_sections (info, TRUE))
a7519a3c 2667 return FALSE;
252b5132 2668
a7519a3c 2669 /* Allocate space for all of the .got subsections. */
4dfe6ac6 2670 i = htab->got_list;
a7519a3c 2671 for ( ; i ; i = alpha_elf_tdata(i)->got_link_next)
252b5132 2672 {
a7519a3c
RH
2673 asection *s = alpha_elf_tdata(i)->got;
2674 if (s->size > 0)
2675 {
2676 s->contents = (bfd_byte *) bfd_zalloc (i, s->size);
2677 if (s->contents == NULL)
2678 return FALSE;
2679 }
252b5132
RH
2680 }
2681
b34976b6 2682 return TRUE;
252b5132 2683}
3765b1be 2684
a7519a3c 2685/* The number of dynamic relocations required by a static relocation. */
3765b1be 2686
a7519a3c 2687static int
e366eeae 2688alpha_dynamic_entries_for_reloc (int r_type, int dynamic, int shared, int pie)
a7519a3c
RH
2689{
2690 switch (r_type)
3765b1be 2691 {
a7519a3c
RH
2692 /* May appear in GOT entries. */
2693 case R_ALPHA_TLSGD:
2694 return (dynamic ? 2 : shared ? 1 : 0);
2695 case R_ALPHA_TLSLDM:
2696 return shared;
2697 case R_ALPHA_LITERAL:
a7519a3c 2698 return dynamic || shared;
e366eeae
RH
2699 case R_ALPHA_GOTTPREL:
2700 return dynamic || (shared && !pie);
a7519a3c
RH
2701 case R_ALPHA_GOTDTPREL:
2702 return dynamic;
3765b1be 2703
a7519a3c
RH
2704 /* May appear in data sections. */
2705 case R_ALPHA_REFLONG:
2706 case R_ALPHA_REFQUAD:
a7519a3c 2707 return dynamic || shared;
e366eeae
RH
2708 case R_ALPHA_TPREL64:
2709 return dynamic || (shared && !pie);
3765b1be 2710
a7519a3c
RH
2711 /* Everything else is illegal. We'll issue an error during
2712 relocate_section. */
2713 default:
2714 return 0;
2715 }
2716}
3765b1be 2717
a7519a3c 2718/* Work out the sizes of the dynamic relocation entries. */
3765b1be 2719
a7519a3c
RH
2720static bfd_boolean
2721elf64_alpha_calc_dynrel_sizes (struct alpha_elf_link_hash_entry *h,
2722 struct bfd_link_info *info)
2723{
2724 bfd_boolean dynamic;
2725 struct alpha_elf_reloc_entry *relent;
2726 unsigned long entries;
3765b1be 2727
a7519a3c
RH
2728 /* If the symbol was defined as a common symbol in a regular object
2729 file, and there was no definition in any dynamic object, then the
2730 linker will have allocated space for the symbol in a common
2731 section but the ELF_LINK_HASH_DEF_REGULAR flag will not have been
2732 set. This is done for dynamic symbols in
2733 elf_adjust_dynamic_symbol but this is not done for non-dynamic
2734 symbols, somehow. */
2735 if (!h->root.def_regular
2736 && h->root.ref_regular
2737 && !h->root.def_dynamic
2738 && (h->root.root.type == bfd_link_hash_defined
2739 || h->root.root.type == bfd_link_hash_defweak)
2740 && !(h->root.root.u.def.section->owner->flags & DYNAMIC))
2741 h->root.def_regular = 1;
3765b1be 2742
a7519a3c
RH
2743 /* If the symbol is dynamic, we'll need all the relocations in their
2744 natural form. If this is a shared object, and it has been forced
2745 local, we'll need the same number of RELATIVE relocations. */
2746 dynamic = alpha_elf_dynamic_symbol_p (&h->root, info);
3765b1be 2747
a7519a3c
RH
2748 /* If the symbol is a hidden undefined weak, then we never have any
2749 relocations. Avoid the loop which may want to add RELATIVE relocs
0e1862bb 2750 based on bfd_link_pic (info). */
a7519a3c
RH
2751 if (h->root.root.type == bfd_link_hash_undefweak && !dynamic)
2752 return TRUE;
2753
2754 for (relent = h->reloc_entries; relent; relent = relent->next)
3765b1be 2755 {
a7519a3c 2756 entries = alpha_dynamic_entries_for_reloc (relent->rtype, dynamic,
3cbc1e5e
AM
2757 bfd_link_pic (info),
2758 bfd_link_pie (info));
a7519a3c
RH
2759 if (entries)
2760 {
2761 relent->srel->size +=
2762 entries * sizeof (Elf64_External_Rela) * relent->count;
2763 if (relent->reltext)
2764 info->flags |= DT_TEXTREL;
2765 }
2766 }
3765b1be 2767
a7519a3c
RH
2768 return TRUE;
2769}
3765b1be 2770
a7519a3c
RH
2771/* Subroutine of elf64_alpha_size_rela_got_section for doing the
2772 global symbols. */
3765b1be 2773
a7519a3c
RH
2774static bfd_boolean
2775elf64_alpha_size_rela_got_1 (struct alpha_elf_link_hash_entry *h,
2776 struct bfd_link_info *info)
2777{
2778 bfd_boolean dynamic;
2779 struct alpha_elf_got_entry *gotent;
2780 unsigned long entries;
3765b1be 2781
6ec7057a
RH
2782 /* If we're using a plt for this symbol, then all of its relocations
2783 for its got entries go into .rela.plt. */
2784 if (h->root.needs_plt)
2785 return TRUE;
2786
a7519a3c
RH
2787 /* If the symbol is dynamic, we'll need all the relocations in their
2788 natural form. If this is a shared object, and it has been forced
2789 local, we'll need the same number of RELATIVE relocations. */
2790 dynamic = alpha_elf_dynamic_symbol_p (&h->root, info);
2791
2792 /* If the symbol is a hidden undefined weak, then we never have any
2793 relocations. Avoid the loop which may want to add RELATIVE relocs
0e1862bb 2794 based on bfd_link_pic (info). */
a7519a3c
RH
2795 if (h->root.root.type == bfd_link_hash_undefweak && !dynamic)
2796 return TRUE;
2797
2798 entries = 0;
2799 for (gotent = h->got_entries; gotent ; gotent = gotent->next)
2800 if (gotent->use_count > 0)
e366eeae 2801 entries += alpha_dynamic_entries_for_reloc (gotent->reloc_type, dynamic,
0e1862bb
L
2802 bfd_link_pic (info),
2803 bfd_link_pie (info));
a7519a3c 2804
a7519a3c
RH
2805 if (entries > 0)
2806 {
2807 bfd *dynobj = elf_hash_table(info)->dynobj;
3d4d4302 2808 asection *srel = bfd_get_linker_section (dynobj, ".rela.got");
a7519a3c
RH
2809 BFD_ASSERT (srel != NULL);
2810 srel->size += sizeof (Elf64_External_Rela) * entries;
3765b1be 2811 }
3765b1be 2812
a7519a3c 2813 return TRUE;
3765b1be
RH
2814}
2815
a7519a3c 2816/* Set the sizes of the dynamic relocation sections. */
252b5132 2817
4a828aab 2818static void
a7519a3c 2819elf64_alpha_size_rela_got_section (struct bfd_link_info *info)
252b5132 2820{
a7519a3c
RH
2821 unsigned long entries;
2822 bfd *i, *dynobj;
2823 asection *srel;
4dfe6ac6
NC
2824 struct alpha_elf_link_hash_table * htab;
2825
2826 htab = alpha_elf_hash_table (info);
2827 if (htab == NULL)
2828 return;
252b5132 2829
a7519a3c
RH
2830 /* Shared libraries often require RELATIVE relocs, and some relocs
2831 require attention for the main application as well. */
252b5132 2832
a7519a3c 2833 entries = 0;
4dfe6ac6 2834 for (i = htab->got_list;
a7519a3c
RH
2835 i ; i = alpha_elf_tdata(i)->got_link_next)
2836 {
2837 bfd *j;
3241278a 2838
a7519a3c
RH
2839 for (j = i; j ; j = alpha_elf_tdata(j)->in_got_link_next)
2840 {
2841 struct alpha_elf_got_entry **local_got_entries, *gotent;
2842 int k, n;
252b5132 2843
a7519a3c
RH
2844 local_got_entries = alpha_elf_tdata(j)->local_got_entries;
2845 if (!local_got_entries)
2846 continue;
252b5132 2847
a7519a3c
RH
2848 for (k = 0, n = elf_tdata(j)->symtab_hdr.sh_info; k < n; ++k)
2849 for (gotent = local_got_entries[k];
2850 gotent ; gotent = gotent->next)
2851 if (gotent->use_count > 0)
2852 entries += (alpha_dynamic_entries_for_reloc
0e1862bb
L
2853 (gotent->reloc_type, 0, bfd_link_pic (info),
2854 bfd_link_pie (info)));
a7519a3c
RH
2855 }
2856 }
3765b1be 2857
a7519a3c 2858 dynobj = elf_hash_table(info)->dynobj;
3d4d4302 2859 srel = bfd_get_linker_section (dynobj, ".rela.got");
a7519a3c
RH
2860 if (!srel)
2861 {
2862 BFD_ASSERT (entries == 0);
4a828aab 2863 return;
a7519a3c
RH
2864 }
2865 srel->size = sizeof (Elf64_External_Rela) * entries;
252b5132 2866
a7519a3c 2867 /* Now do the non-local symbols. */
4dfe6ac6 2868 alpha_elf_link_hash_traverse (htab,
a7519a3c 2869 elf64_alpha_size_rela_got_1, info);
a7519a3c 2870}
252b5132 2871
a7519a3c 2872/* Set the sizes of the dynamic sections. */
3765b1be 2873
a7519a3c
RH
2874static bfd_boolean
2875elf64_alpha_size_dynamic_sections (bfd *output_bfd ATTRIBUTE_UNUSED,
2876 struct bfd_link_info *info)
2877{
2878 bfd *dynobj;
2879 asection *s;
2880 bfd_boolean relplt;
4dfe6ac6
NC
2881 struct alpha_elf_link_hash_table * htab;
2882
2883 htab = alpha_elf_hash_table (info);
2884 if (htab == NULL)
2885 return FALSE;
3765b1be 2886
a7519a3c
RH
2887 dynobj = elf_hash_table(info)->dynobj;
2888 BFD_ASSERT(dynobj != NULL);
252b5132 2889
a7519a3c
RH
2890 if (elf_hash_table (info)->dynamic_sections_created)
2891 {
2892 /* Set the contents of the .interp section to the interpreter. */
9b8b325a 2893 if (bfd_link_executable (info) && !info->nointerp)
252b5132 2894 {
3d4d4302 2895 s = bfd_get_linker_section (dynobj, ".interp");
a7519a3c
RH
2896 BFD_ASSERT (s != NULL);
2897 s->size = sizeof ELF_DYNAMIC_INTERPRETER;
2898 s->contents = (unsigned char *) ELF_DYNAMIC_INTERPRETER;
2899 }
3765b1be 2900
a7519a3c
RH
2901 /* Now that we've seen all of the input files, we can decide which
2902 symbols need dynamic relocation entries and which don't. We've
2903 collected information in check_relocs that we can now apply to
2904 size the dynamic relocation sections. */
4dfe6ac6 2905 alpha_elf_link_hash_traverse (htab,
a7519a3c 2906 elf64_alpha_calc_dynrel_sizes, info);
252b5132 2907
a7519a3c 2908 elf64_alpha_size_rela_got_section (info);
6ec7057a 2909 elf64_alpha_size_plt_section (info);
a7519a3c
RH
2910 }
2911 /* else we're not dynamic and by definition we don't need such things. */
3765b1be 2912
a7519a3c
RH
2913 /* The check_relocs and adjust_dynamic_symbol entry points have
2914 determined the sizes of the various dynamic sections. Allocate
2915 memory for them. */
2916 relplt = FALSE;
2917 for (s = dynobj->sections; s != NULL; s = s->next)
2918 {
2919 const char *name;
3765b1be 2920
a7519a3c
RH
2921 if (!(s->flags & SEC_LINKER_CREATED))
2922 continue;
cc03ec80 2923
a7519a3c
RH
2924 /* It's OK to base decisions on the section name, because none
2925 of the dynobj section names depend upon the input files. */
2926 name = bfd_get_section_name (dynobj, s);
3765b1be 2927
0112cd26 2928 if (CONST_STRNEQ (name, ".rela"))
3765b1be 2929 {
c456f082 2930 if (s->size != 0)
a7519a3c 2931 {
c456f082 2932 if (strcmp (name, ".rela.plt") == 0)
a7519a3c 2933 relplt = TRUE;
252b5132 2934
a7519a3c
RH
2935 /* We use the reloc_count field as a counter if we need
2936 to copy relocs into the output file. */
2937 s->reloc_count = 0;
252b5132 2938 }
3765b1be 2939 }
0112cd26 2940 else if (! CONST_STRNEQ (name, ".got")
c456f082
AM
2941 && strcmp (name, ".plt") != 0
2942 && strcmp (name, ".dynbss") != 0)
3765b1be 2943 {
a7519a3c
RH
2944 /* It's not one of our dynamic sections, so don't allocate space. */
2945 continue;
2946 }
252b5132 2947
c456f082
AM
2948 if (s->size == 0)
2949 {
2950 /* If we don't need this section, strip it from the output file.
2951 This is to handle .rela.bss and .rela.plt. We must create it
2952 in create_dynamic_sections, because it must be created before
2953 the linker maps input sections to output sections. The
2954 linker does that before adjust_dynamic_symbol is called, and
2955 it is that function which decides whether anything needs to
2956 go into these sections. */
6452a567
RH
2957 if (!CONST_STRNEQ (name, ".got"))
2958 s->flags |= SEC_EXCLUDE;
c456f082
AM
2959 }
2960 else if ((s->flags & SEC_HAS_CONTENTS) != 0)
a7519a3c
RH
2961 {
2962 /* Allocate memory for the section contents. */
2963 s->contents = (bfd_byte *) bfd_zalloc (dynobj, s->size);
c456f082 2964 if (s->contents == NULL)
b34976b6 2965 return FALSE;
a7519a3c
RH
2966 }
2967 }
3765b1be 2968
a7519a3c
RH
2969 if (elf_hash_table (info)->dynamic_sections_created)
2970 {
2971 /* Add some entries to the .dynamic section. We fill in the
2972 values later, in elf64_alpha_finish_dynamic_sections, but we
2973 must add the entries now so that we get the correct size for
2974 the .dynamic section. The DT_DEBUG entry is filled in by the
2975 dynamic linker and used by the debugger. */
2976#define add_dynamic_entry(TAG, VAL) \
2977 _bfd_elf_add_dynamic_entry (info, TAG, VAL)
3765b1be 2978
0e1862bb 2979 if (bfd_link_executable (info))
a7519a3c
RH
2980 {
2981 if (!add_dynamic_entry (DT_DEBUG, 0))
2982 return FALSE;
3765b1be
RH
2983 }
2984
a7519a3c 2985 if (relplt)
3765b1be 2986 {
a7519a3c
RH
2987 if (!add_dynamic_entry (DT_PLTGOT, 0)
2988 || !add_dynamic_entry (DT_PLTRELSZ, 0)
2989 || !add_dynamic_entry (DT_PLTREL, DT_RELA)
2990 || !add_dynamic_entry (DT_JMPREL, 0))
2991 return FALSE;
6ec7057a
RH
2992
2993 if (elf64_alpha_use_secureplt
2994 && !add_dynamic_entry (DT_ALPHA_PLTRO, 1))
2995 return FALSE;
a7519a3c 2996 }
252b5132 2997
a7519a3c
RH
2998 if (!add_dynamic_entry (DT_RELA, 0)
2999 || !add_dynamic_entry (DT_RELASZ, 0)
3000 || !add_dynamic_entry (DT_RELAENT, sizeof (Elf64_External_Rela)))
3001 return FALSE;
3002
3003 if (info->flags & DF_TEXTREL)
3004 {
3005 if (!add_dynamic_entry (DT_TEXTREL, 0))
3006 return FALSE;
252b5132
RH
3007 }
3008 }
a7519a3c 3009#undef add_dynamic_entry
252b5132 3010
b34976b6 3011 return TRUE;
252b5132 3012}
a7519a3c
RH
3013\f
3014/* These functions do relaxation for Alpha ELF.
252b5132 3015
a7519a3c
RH
3016 Currently I'm only handling what I can do with existing compiler
3017 and assembler support, which means no instructions are removed,
3018 though some may be nopped. At this time GCC does not emit enough
3019 information to do all of the relaxing that is possible. It will
3020 take some not small amount of work for that to happen.
252b5132 3021
a7519a3c
RH
3022 There are a couple of interesting papers that I once read on this
3023 subject, that I cannot find references to at the moment, that
3024 related to Alpha in particular. They are by David Wall, then of
3025 DEC WRL. */
252b5132 3026
a7519a3c
RH
3027struct alpha_relax_info
3028{
3029 bfd *abfd;
3030 asection *sec;
3031 bfd_byte *contents;
3032 Elf_Internal_Shdr *symtab_hdr;
3033 Elf_Internal_Rela *relocs, *relend;
3034 struct bfd_link_info *link_info;
3035 bfd_vma gp;
3036 bfd *gotobj;
3037 asection *tsec;
3038 struct alpha_elf_link_hash_entry *h;
3039 struct alpha_elf_got_entry **first_gotent;
3040 struct alpha_elf_got_entry *gotent;
3041 bfd_boolean changed_contents;
3042 bfd_boolean changed_relocs;
3043 unsigned char other;
3044};
252b5132 3045
a7519a3c
RH
3046static Elf_Internal_Rela *
3047elf64_alpha_find_reloc_at_ofs (Elf_Internal_Rela *rel,
3048 Elf_Internal_Rela *relend,
3049 bfd_vma offset, int type)
3050{
3051 while (rel < relend)
252b5132 3052 {
a7519a3c
RH
3053 if (rel->r_offset == offset
3054 && ELF64_R_TYPE (rel->r_info) == (unsigned int) type)
3055 return rel;
3056 ++rel;
3057 }
3058 return NULL;
3059}
252b5132 3060
a7519a3c
RH
3061static bfd_boolean
3062elf64_alpha_relax_got_load (struct alpha_relax_info *info, bfd_vma symval,
3063 Elf_Internal_Rela *irel, unsigned long r_type)
3064{
3065 unsigned int insn;
3066 bfd_signed_vma disp;
252b5132 3067
a7519a3c
RH
3068 /* Get the instruction. */
3069 insn = bfd_get_32 (info->abfd, info->contents + irel->r_offset);
252b5132 3070
a7519a3c
RH
3071 if (insn >> 26 != OP_LDQ)
3072 {
3073 reloc_howto_type *howto = elf64_alpha_howto_table + r_type;
3074 ((*_bfd_error_handler)
3075 ("%B: %A+0x%lx: warning: %s relocation against unexpected insn",
3076 info->abfd, info->sec,
3077 (unsigned long) irel->r_offset, howto->name));
3078 return TRUE;
3079 }
252b5132 3080
a7519a3c
RH
3081 /* Can't relax dynamic symbols. */
3082 if (alpha_elf_dynamic_symbol_p (&info->h->root, info->link_info))
3083 return TRUE;
252b5132 3084
a7519a3c 3085 /* Can't use local-exec relocations in shared libraries. */
e366eeae 3086 if (r_type == R_ALPHA_GOTTPREL
3cbc1e5e 3087 && bfd_link_dll (info->link_info))
a7519a3c 3088 return TRUE;
252b5132 3089
a7519a3c
RH
3090 if (r_type == R_ALPHA_LITERAL)
3091 {
3092 /* Look for nice constant addresses. This includes the not-uncommon
3093 special case of 0 for undefweak symbols. */
3094 if ((info->h && info->h->root.root.type == bfd_link_hash_undefweak)
0e1862bb 3095 || (!bfd_link_pic (info->link_info)
a7519a3c
RH
3096 && (symval >= (bfd_vma)-0x8000 || symval < 0x8000)))
3097 {
3098 disp = 0;
3099 insn = (OP_LDA << 26) | (insn & (31 << 21)) | (31 << 16);
3100 insn |= (symval & 0xffff);
3101 r_type = R_ALPHA_NONE;
3102 }
3103 else
3104 {
d1c109de
RH
3105 /* We may only create GPREL relocs during the second pass. */
3106 if (info->link_info->relax_pass == 0)
3107 return TRUE;
3108
a7519a3c
RH
3109 disp = symval - info->gp;
3110 insn = (OP_LDA << 26) | (insn & 0x03ff0000);
3111 r_type = R_ALPHA_GPREL16;
3112 }
252b5132
RH
3113 }
3114 else
252b5132 3115 {
a7519a3c 3116 bfd_vma dtp_base, tp_base;
252b5132 3117
a7519a3c
RH
3118 BFD_ASSERT (elf_hash_table (info->link_info)->tls_sec != NULL);
3119 dtp_base = alpha_get_dtprel_base (info->link_info);
3120 tp_base = alpha_get_tprel_base (info->link_info);
3121 disp = symval - (r_type == R_ALPHA_GOTDTPREL ? dtp_base : tp_base);
252b5132 3122
a7519a3c 3123 insn = (OP_LDA << 26) | (insn & (31 << 21)) | (31 << 16);
252b5132 3124
a7519a3c
RH
3125 switch (r_type)
3126 {
3127 case R_ALPHA_GOTDTPREL:
3128 r_type = R_ALPHA_DTPREL16;
3129 break;
3130 case R_ALPHA_GOTTPREL:
3131 r_type = R_ALPHA_TPREL16;
3132 break;
3133 default:
3134 BFD_ASSERT (0);
3135 return FALSE;
3136 }
3137 }
252b5132 3138
a7519a3c 3139 if (disp < -0x8000 || disp >= 0x8000)
b34976b6 3140 return TRUE;
252b5132 3141
a7519a3c
RH
3142 bfd_put_32 (info->abfd, (bfd_vma) insn, info->contents + irel->r_offset);
3143 info->changed_contents = TRUE;
252b5132 3144
a7519a3c
RH
3145 /* Reduce the use count on this got entry by one, possibly
3146 eliminating it. */
3147 if (--info->gotent->use_count == 0)
252b5132 3148 {
a7519a3c
RH
3149 int sz = alpha_got_entry_size (r_type);
3150 alpha_elf_tdata (info->gotobj)->total_got_size -= sz;
3151 if (!info->h)
3152 alpha_elf_tdata (info->gotobj)->local_got_size -= sz;
252b5132 3153 }
252b5132 3154
a7519a3c
RH
3155 /* Smash the existing GOT relocation for its 16-bit immediate pair. */
3156 irel->r_info = ELF64_R_INFO (ELF64_R_SYM (irel->r_info), r_type);
3157 info->changed_relocs = TRUE;
3158
3159 /* ??? Search forward through this basic block looking for insns
3160 that use the target register. Stop after an insn modifying the
3161 register is seen, or after a branch or call.
252b5132 3162
a7519a3c
RH
3163 Any such memory load insn may be substituted by a load directly
3164 off the GP. This allows the memory load insn to be issued before
3165 the calculated GP register would otherwise be ready.
252b5132 3166
a7519a3c
RH
3167 Any such jsr insn can be replaced by a bsr if it is in range.
3168
3169 This would mean that we'd have to _add_ relocations, the pain of
3170 which gives one pause. */
252b5132 3171
b34976b6 3172 return TRUE;
252b5132
RH
3173}
3174
a7519a3c
RH
3175static bfd_vma
3176elf64_alpha_relax_opt_call (struct alpha_relax_info *info, bfd_vma symval)
252b5132 3177{
a7519a3c
RH
3178 /* If the function has the same gp, and we can identify that the
3179 function does not use its function pointer, we can eliminate the
3180 address load. */
252b5132 3181
a7519a3c
RH
3182 /* If the symbol is marked NOPV, we are being told the function never
3183 needs its procedure value. */
3184 if ((info->other & STO_ALPHA_STD_GPLOAD) == STO_ALPHA_NOPV)
3185 return symval;
252b5132 3186
a7519a3c
RH
3187 /* If the symbol is marked STD_GP, we are being told the function does
3188 a normal ldgp in the first two words. */
3189 else if ((info->other & STO_ALPHA_STD_GPLOAD) == STO_ALPHA_STD_GPLOAD)
3190 ;
252b5132 3191
a7519a3c
RH
3192 /* Otherwise, we may be able to identify a GP load in the first two
3193 words, which we can then skip. */
3194 else
252b5132 3195 {
a7519a3c
RH
3196 Elf_Internal_Rela *tsec_relocs, *tsec_relend, *tsec_free, *gpdisp;
3197 bfd_vma ofs;
252b5132 3198
a7519a3c
RH
3199 /* Load the relocations from the section that the target symbol is in. */
3200 if (info->sec == info->tsec)
252b5132 3201 {
a7519a3c
RH
3202 tsec_relocs = info->relocs;
3203 tsec_relend = info->relend;
3204 tsec_free = NULL;
3205 }
3206 else
3207 {
3208 tsec_relocs = (_bfd_elf_link_read_relocs
2c3fc389 3209 (info->abfd, info->tsec, NULL,
a7519a3c
RH
3210 (Elf_Internal_Rela *) NULL,
3211 info->link_info->keep_memory));
3212 if (tsec_relocs == NULL)
3213 return 0;
3214 tsec_relend = tsec_relocs + info->tsec->reloc_count;
3215 tsec_free = (info->link_info->keep_memory ? NULL : tsec_relocs);
3216 }
252b5132 3217
a7519a3c
RH
3218 /* Recover the symbol's offset within the section. */
3219 ofs = (symval - info->tsec->output_section->vma
3220 - info->tsec->output_offset);
252b5132 3221
a7519a3c
RH
3222 /* Look for a GPDISP reloc. */
3223 gpdisp = (elf64_alpha_find_reloc_at_ofs
3224 (tsec_relocs, tsec_relend, ofs, R_ALPHA_GPDISP));
252b5132 3225
a7519a3c
RH
3226 if (!gpdisp || gpdisp->r_addend != 4)
3227 {
3228 if (tsec_free)
3229 free (tsec_free);
3230 return 0;
252b5132 3231 }
a7519a3c
RH
3232 if (tsec_free)
3233 free (tsec_free);
252b5132
RH
3234 }
3235
a7519a3c
RH
3236 /* We've now determined that we can skip an initial gp load. Verify
3237 that the call and the target use the same gp. */
f13a99db 3238 if (info->link_info->output_bfd->xvec != info->tsec->owner->xvec
a7519a3c
RH
3239 || info->gotobj != alpha_elf_tdata (info->tsec->owner)->gotobj)
3240 return 0;
252b5132 3241
a7519a3c
RH
3242 return symval + 8;
3243}
252b5132 3244
a7519a3c
RH
3245static bfd_boolean
3246elf64_alpha_relax_with_lituse (struct alpha_relax_info *info,
3247 bfd_vma symval, Elf_Internal_Rela *irel)
252b5132 3248{
d1c109de
RH
3249 Elf_Internal_Rela *urel, *erel, *irelend = info->relend;
3250 int flags;
a7519a3c
RH
3251 bfd_signed_vma disp;
3252 bfd_boolean fits16;
3253 bfd_boolean fits32;
3254 bfd_boolean lit_reused = FALSE;
3255 bfd_boolean all_optimized = TRUE;
d1c109de
RH
3256 bfd_boolean changed_contents;
3257 bfd_boolean changed_relocs;
3258 bfd_byte *contents = info->contents;
3259 bfd *abfd = info->abfd;
3260 bfd_vma sec_output_vma;
a7519a3c 3261 unsigned int lit_insn;
d1c109de 3262 int relax_pass;
252b5132 3263
d1c109de 3264 lit_insn = bfd_get_32 (abfd, contents + irel->r_offset);
a7519a3c
RH
3265 if (lit_insn >> 26 != OP_LDQ)
3266 {
3267 ((*_bfd_error_handler)
3268 ("%B: %A+0x%lx: warning: LITERAL relocation against unexpected insn",
d1c109de 3269 abfd, info->sec,
a7519a3c
RH
3270 (unsigned long) irel->r_offset));
3271 return TRUE;
3272 }
252b5132 3273
a7519a3c
RH
3274 /* Can't relax dynamic symbols. */
3275 if (alpha_elf_dynamic_symbol_p (&info->h->root, info->link_info))
3276 return TRUE;
3277
d1c109de
RH
3278 changed_contents = info->changed_contents;
3279 changed_relocs = info->changed_relocs;
3280 sec_output_vma = info->sec->output_section->vma + info->sec->output_offset;
3281 relax_pass = info->link_info->relax_pass;
3282
a7519a3c 3283 /* Summarize how this particular LITERAL is used. */
d1c109de 3284 for (erel = irel+1, flags = 0; erel < irelend; ++erel)
252b5132 3285 {
d1c109de 3286 if (ELF64_R_TYPE (erel->r_info) != R_ALPHA_LITUSE)
a7519a3c 3287 break;
d1c109de
RH
3288 if (erel->r_addend <= 6)
3289 flags |= 1 << erel->r_addend;
a7519a3c 3290 }
252b5132 3291
a7519a3c
RH
3292 /* A little preparation for the loop... */
3293 disp = symval - info->gp;
252b5132 3294
d1c109de 3295 for (urel = irel+1; urel < erel; ++urel)
a7519a3c 3296 {
d1c109de 3297 bfd_vma urel_r_offset = urel->r_offset;
a7519a3c
RH
3298 unsigned int insn;
3299 int insn_disp;
3300 bfd_signed_vma xdisp;
d1c109de 3301 Elf_Internal_Rela nrel;
252b5132 3302
d1c109de 3303 insn = bfd_get_32 (abfd, contents + urel_r_offset);
252b5132 3304
a7519a3c
RH
3305 switch (urel->r_addend)
3306 {
3307 case LITUSE_ALPHA_ADDR:
3308 default:
3309 /* This type is really just a placeholder to note that all
3310 uses cannot be optimized, but to still allow some. */
3311 all_optimized = FALSE;
3312 break;
252b5132 3313
a7519a3c 3314 case LITUSE_ALPHA_BASE:
d1c109de
RH
3315 /* We may only create GPREL relocs during the second pass. */
3316 if (relax_pass == 0)
3317 {
3318 all_optimized = FALSE;
3319 break;
3320 }
3321
a7519a3c 3322 /* We can always optimize 16-bit displacements. */
252b5132 3323
a7519a3c
RH
3324 /* Extract the displacement from the instruction, sign-extending
3325 it if necessary, then test whether it is within 16 or 32 bits
3326 displacement from GP. */
3327 insn_disp = ((insn & 0xffff) ^ 0x8000) - 0x8000;
3328
3329 xdisp = disp + insn_disp;
3330 fits16 = (xdisp >= - (bfd_signed_vma) 0x8000 && xdisp < 0x8000);
3331 fits32 = (xdisp >= - (bfd_signed_vma) 0x80000000
3332 && xdisp < 0x7fff8000);
3333
3334 if (fits16)
3335 {
3336 /* Take the op code and dest from this insn, take the base
3337 register from the literal insn. Leave the offset alone. */
3338 insn = (insn & 0xffe0ffff) | (lit_insn & 0x001f0000);
d1c109de
RH
3339 bfd_put_32 (abfd, (bfd_vma) insn, contents + urel_r_offset);
3340 changed_contents = TRUE;
3341
3342 nrel = *urel;
3343 nrel.r_info = ELF64_R_INFO (ELF64_R_SYM (irel->r_info),
3344 R_ALPHA_GPREL16);
3345 nrel.r_addend = irel->r_addend;
3346
3347 /* As we adjust, move the reloc to the end so that we don't
3348 break the LITERAL+LITUSE chain. */
3349 if (urel < --erel)
3350 *urel-- = *erel;
3351 *erel = nrel;
3352 changed_relocs = TRUE;
252b5132 3353 }
252b5132 3354
a7519a3c
RH
3355 /* If all mem+byte, we can optimize 32-bit mem displacements. */
3356 else if (fits32 && !(flags & ~6))
3357 {
3358 /* FIXME: sanity check that lit insn Ra is mem insn Rb. */
252b5132 3359
a7519a3c
RH
3360 irel->r_info = ELF64_R_INFO (ELF64_R_SYM (irel->r_info),
3361 R_ALPHA_GPRELHIGH);
3362 lit_insn = (OP_LDAH << 26) | (lit_insn & 0x03ff0000);
d1c109de 3363 bfd_put_32 (abfd, (bfd_vma) lit_insn, contents + irel->r_offset);
a7519a3c 3364 lit_reused = TRUE;
d1c109de 3365 changed_contents = TRUE;
252b5132 3366
d1c109de
RH
3367 /* Since all relocs must be optimized, don't bother swapping
3368 this relocation to the end. */
a7519a3c
RH
3369 urel->r_info = ELF64_R_INFO (ELF64_R_SYM (irel->r_info),
3370 R_ALPHA_GPRELLOW);
3371 urel->r_addend = irel->r_addend;
d1c109de 3372 changed_relocs = TRUE;
a7519a3c
RH
3373 }
3374 else
3375 all_optimized = FALSE;
3376 break;
252b5132 3377
a7519a3c
RH
3378 case LITUSE_ALPHA_BYTOFF:
3379 /* We can always optimize byte instructions. */
252b5132 3380
a7519a3c
RH
3381 /* FIXME: sanity check the insn for byte op. Check that the
3382 literal dest reg is indeed Rb in the byte insn. */
252b5132 3383
a7519a3c
RH
3384 insn &= ~ (unsigned) 0x001ff000;
3385 insn |= ((symval & 7) << 13) | 0x1000;
d1c109de
RH
3386 bfd_put_32 (abfd, (bfd_vma) insn, contents + urel_r_offset);
3387 changed_contents = TRUE;
3388
3389 nrel = *urel;
3390 nrel.r_info = ELF64_R_INFO (0, R_ALPHA_NONE);
3391 nrel.r_addend = 0;
3392
3393 /* As we adjust, move the reloc to the end so that we don't
3394 break the LITERAL+LITUSE chain. */
3395 if (urel < --erel)
3396 *urel-- = *erel;
3397 *erel = nrel;
3398 changed_relocs = TRUE;
a7519a3c 3399 break;
252b5132 3400
a7519a3c
RH
3401 case LITUSE_ALPHA_JSR:
3402 case LITUSE_ALPHA_TLSGD:
3403 case LITUSE_ALPHA_TLSLDM:
8288a39e 3404 case LITUSE_ALPHA_JSRDIRECT:
0d5f9994 3405 {
a7519a3c
RH
3406 bfd_vma optdest, org;
3407 bfd_signed_vma odisp;
252b5132 3408
a7519a3c
RH
3409 /* For undefined weak symbols, we're mostly interested in getting
3410 rid of the got entry whenever possible, so optimize this to a
3411 use of the zero register. */
3412 if (info->h && info->h->root.root.type == bfd_link_hash_undefweak)
3413 {
3414 insn |= 31 << 16;
d1c109de 3415 bfd_put_32 (abfd, (bfd_vma) insn, contents + urel_r_offset);
252b5132 3416
d1c109de 3417 changed_contents = TRUE;
a7519a3c
RH
3418 break;
3419 }
252b5132 3420
a7519a3c
RH
3421 /* If not zero, place to jump without needing pv. */
3422 optdest = elf64_alpha_relax_opt_call (info, symval);
d1c109de 3423 org = sec_output_vma + urel_r_offset + 4;
a7519a3c 3424 odisp = (optdest ? optdest : symval) - org;
252b5132 3425
a7519a3c
RH
3426 if (odisp >= -0x400000 && odisp < 0x400000)
3427 {
3428 Elf_Internal_Rela *xrel;
252b5132 3429
a7519a3c
RH
3430 /* Preserve branch prediction call stack when possible. */
3431 if ((insn & INSN_JSR_MASK) == INSN_JSR)
3432 insn = (OP_BSR << 26) | (insn & 0x03e00000);
3433 else
3434 insn = (OP_BR << 26) | (insn & 0x03e00000);
d1c109de
RH
3435 bfd_put_32 (abfd, (bfd_vma) insn, contents + urel_r_offset);
3436 changed_contents = TRUE;
252b5132 3437
d1c109de
RH
3438 nrel = *urel;
3439 nrel.r_info = ELF64_R_INFO (ELF64_R_SYM (irel->r_info),
3440 R_ALPHA_BRADDR);
3441 nrel.r_addend = irel->r_addend;
252b5132 3442
a7519a3c 3443 if (optdest)
d1c109de 3444 nrel.r_addend += optdest - symval;
a7519a3c
RH
3445 else
3446 all_optimized = FALSE;
252b5132 3447
a7519a3c
RH
3448 /* Kill any HINT reloc that might exist for this insn. */
3449 xrel = (elf64_alpha_find_reloc_at_ofs
d1c109de 3450 (info->relocs, info->relend, urel_r_offset,
a7519a3c
RH
3451 R_ALPHA_HINT));
3452 if (xrel)
3453 xrel->r_info = ELF64_R_INFO (0, R_ALPHA_NONE);
252b5132 3454
d1c109de
RH
3455 /* As we adjust, move the reloc to the end so that we don't
3456 break the LITERAL+LITUSE chain. */
3457 if (urel < --erel)
3458 *urel-- = *erel;
3459 *erel = nrel;
3460
a7519a3c
RH
3461 info->changed_relocs = TRUE;
3462 }
3463 else
3464 all_optimized = FALSE;
252b5132 3465
a7519a3c
RH
3466 /* Even if the target is not in range for a direct branch,
3467 if we share a GP, we can eliminate the gp reload. */
3468 if (optdest)
3469 {
3470 Elf_Internal_Rela *gpdisp
3471 = (elf64_alpha_find_reloc_at_ofs
d1c109de 3472 (info->relocs, irelend, urel_r_offset + 4,
a7519a3c
RH
3473 R_ALPHA_GPDISP));
3474 if (gpdisp)
3475 {
d1c109de 3476 bfd_byte *p_ldah = contents + gpdisp->r_offset;
a7519a3c 3477 bfd_byte *p_lda = p_ldah + gpdisp->r_addend;
d1c109de
RH
3478 unsigned int ldah = bfd_get_32 (abfd, p_ldah);
3479 unsigned int lda = bfd_get_32 (abfd, p_lda);
252b5132 3480
a7519a3c
RH
3481 /* Verify that the instruction is "ldah $29,0($26)".
3482 Consider a function that ends in a noreturn call,
3483 and that the next function begins with an ldgp,
3484 and that by accident there is no padding between.
3485 In that case the insn would use $27 as the base. */
3486 if (ldah == 0x27ba0000 && lda == 0x23bd0000)
3487 {
d1c109de
RH
3488 bfd_put_32 (abfd, (bfd_vma) INSN_UNOP, p_ldah);
3489 bfd_put_32 (abfd, (bfd_vma) INSN_UNOP, p_lda);
252b5132 3490
a7519a3c 3491 gpdisp->r_info = ELF64_R_INFO (0, R_ALPHA_NONE);
d1c109de
RH
3492 changed_contents = TRUE;
3493 changed_relocs = TRUE;
a7519a3c
RH
3494 }
3495 }
3496 }
3497 }
3498 break;
252b5132 3499 }
252b5132
RH
3500 }
3501
d1c109de
RH
3502 /* If we reused the literal instruction, we must have optimized all. */
3503 BFD_ASSERT(!lit_reused || all_optimized);
3504
a7519a3c
RH
3505 /* If all cases were optimized, we can reduce the use count on this
3506 got entry by one, possibly eliminating it. */
3507 if (all_optimized)
252b5132 3508 {
a7519a3c 3509 if (--info->gotent->use_count == 0)
252b5132 3510 {
a7519a3c
RH
3511 int sz = alpha_got_entry_size (R_ALPHA_LITERAL);
3512 alpha_elf_tdata (info->gotobj)->total_got_size -= sz;
3513 if (!info->h)
3514 alpha_elf_tdata (info->gotobj)->local_got_size -= sz;
252b5132 3515 }
a7519a3c
RH
3516
3517 /* If the literal instruction is no longer needed (it may have been
3518 reused. We can eliminate it. */
3519 /* ??? For now, I don't want to deal with compacting the section,
3520 so just nop it out. */
3521 if (!lit_reused)
252b5132 3522 {
a7519a3c 3523 irel->r_info = ELF64_R_INFO (0, R_ALPHA_NONE);
d1c109de 3524 changed_relocs = TRUE;
252b5132 3525
d1c109de
RH
3526 bfd_put_32 (abfd, (bfd_vma) INSN_UNOP, contents + irel->r_offset);
3527 changed_contents = TRUE;
a7519a3c 3528 }
a7519a3c 3529 }
d1c109de
RH
3530
3531 info->changed_contents = changed_contents;
3532 info->changed_relocs = changed_relocs;
3533
3534 if (all_optimized || relax_pass == 0)
3535 return TRUE;
3536 return elf64_alpha_relax_got_load (info, symval, irel, R_ALPHA_LITERAL);
252b5132
RH
3537}
3538
b34976b6 3539static bfd_boolean
a7519a3c
RH
3540elf64_alpha_relax_tls_get_addr (struct alpha_relax_info *info, bfd_vma symval,
3541 Elf_Internal_Rela *irel, bfd_boolean is_gd)
f44f99a5 3542{
a7519a3c 3543 bfd_byte *pos[5];
891caa9b 3544 unsigned int insn, tlsgd_reg;
a7519a3c 3545 Elf_Internal_Rela *gpdisp, *hint;
891caa9b 3546 bfd_boolean dynamic, use_gottprel;
a7519a3c 3547 unsigned long new_symndx;
f44f99a5 3548
a7519a3c 3549 dynamic = alpha_elf_dynamic_symbol_p (&info->h->root, info->link_info);
f44f99a5 3550
a7519a3c
RH
3551 /* If a TLS symbol is accessed using IE at least once, there is no point
3552 to use dynamic model for it. */
3553 if (is_gd && info->h && (info->h->flags & ALPHA_ELF_LINK_HASH_TLS_IE))
3554 ;
f44f99a5 3555
a7519a3c
RH
3556 /* If the symbol is local, and we've already committed to DF_STATIC_TLS,
3557 then we might as well relax to IE. */
0e1862bb 3558 else if (bfd_link_pic (info->link_info) && !dynamic
a7519a3c
RH
3559 && (info->link_info->flags & DF_STATIC_TLS))
3560 ;
f44f99a5 3561
a7519a3c 3562 /* Otherwise we must be building an executable to do anything. */
0e1862bb 3563 else if (bfd_link_pic (info->link_info))
a7519a3c 3564 return TRUE;
f44f99a5 3565
a7519a3c
RH
3566 /* The TLSGD/TLSLDM relocation must be followed by a LITERAL and
3567 the matching LITUSE_TLS relocations. */
3568 if (irel + 2 >= info->relend)
3569 return TRUE;
3570 if (ELF64_R_TYPE (irel[1].r_info) != R_ALPHA_LITERAL
3571 || ELF64_R_TYPE (irel[2].r_info) != R_ALPHA_LITUSE
3572 || irel[2].r_addend != (is_gd ? LITUSE_ALPHA_TLSGD : LITUSE_ALPHA_TLSLDM))
3573 return TRUE;
f44f99a5 3574
a7519a3c
RH
3575 /* There must be a GPDISP relocation positioned immediately after the
3576 LITUSE relocation. */
3577 gpdisp = elf64_alpha_find_reloc_at_ofs (info->relocs, info->relend,
3578 irel[2].r_offset + 4, R_ALPHA_GPDISP);
3579 if (!gpdisp)
b34976b6 3580 return TRUE;
f44f99a5 3581
a7519a3c
RH
3582 pos[0] = info->contents + irel[0].r_offset;
3583 pos[1] = info->contents + irel[1].r_offset;
3584 pos[2] = info->contents + irel[2].r_offset;
3585 pos[3] = info->contents + gpdisp->r_offset;
3586 pos[4] = pos[3] + gpdisp->r_addend;
f44f99a5 3587
7dbf3b76
RH
3588 /* Beware of the compiler hoisting part of the sequence out a loop
3589 and adjusting the destination register for the TLSGD insn. If this
3590 happens, there will be a move into $16 before the JSR insn, so only
3591 transformations of the first insn pair should use this register. */
3592 tlsgd_reg = bfd_get_32 (info->abfd, pos[0]);
3593 tlsgd_reg = (tlsgd_reg >> 21) & 31;
3594
a7519a3c
RH
3595 /* Generally, the positions are not allowed to be out of order, lest the
3596 modified insn sequence have different register lifetimes. We can make
3597 an exception when pos 1 is adjacent to pos 0. */
3598 if (pos[1] + 4 == pos[0])
f44f99a5 3599 {
a7519a3c
RH
3600 bfd_byte *tmp = pos[0];
3601 pos[0] = pos[1];
3602 pos[1] = tmp;
f44f99a5 3603 }
a7519a3c
RH
3604 if (pos[1] >= pos[2] || pos[2] >= pos[3])
3605 return TRUE;
cc03ec80 3606
a7519a3c
RH
3607 /* Reduce the use count on the LITERAL relocation. Do this before we
3608 smash the symndx when we adjust the relocations below. */
3609 {
3610 struct alpha_elf_got_entry *lit_gotent;
3611 struct alpha_elf_link_hash_entry *lit_h;
3612 unsigned long indx;
f44f99a5 3613
a7519a3c
RH
3614 BFD_ASSERT (ELF64_R_SYM (irel[1].r_info) >= info->symtab_hdr->sh_info);
3615 indx = ELF64_R_SYM (irel[1].r_info) - info->symtab_hdr->sh_info;
3616 lit_h = alpha_elf_sym_hashes (info->abfd)[indx];
f44f99a5 3617
a7519a3c
RH
3618 while (lit_h->root.root.type == bfd_link_hash_indirect
3619 || lit_h->root.root.type == bfd_link_hash_warning)
3620 lit_h = (struct alpha_elf_link_hash_entry *) lit_h->root.root.u.i.link;
252b5132 3621
a7519a3c
RH
3622 for (lit_gotent = lit_h->got_entries; lit_gotent ;
3623 lit_gotent = lit_gotent->next)
3624 if (lit_gotent->gotobj == info->gotobj
3625 && lit_gotent->reloc_type == R_ALPHA_LITERAL
3626 && lit_gotent->addend == irel[1].r_addend)
3627 break;
3628 BFD_ASSERT (lit_gotent);
252b5132 3629
a7519a3c
RH
3630 if (--lit_gotent->use_count == 0)
3631 {
3632 int sz = alpha_got_entry_size (R_ALPHA_LITERAL);
3633 alpha_elf_tdata (info->gotobj)->total_got_size -= sz;
3634 }
3635 }
252b5132 3636
a7519a3c 3637 /* Change
252b5132 3638
a7519a3c
RH
3639 lda $16,x($gp) !tlsgd!1
3640 ldq $27,__tls_get_addr($gp) !literal!1
3641 jsr $26,($27),__tls_get_addr !lituse_tlsgd!1
3642 ldah $29,0($26) !gpdisp!2
3643 lda $29,0($29) !gpdisp!2
3644 to
3645 ldq $16,x($gp) !gottprel
3646 unop
3647 call_pal rduniq
3648 addq $16,$0,$0
3649 unop
3650 or the first pair to
3651 lda $16,x($gp) !tprel
3652 unop
3653 or
3654 ldah $16,x($gp) !tprelhi
3655 lda $16,x($16) !tprello
3656
3657 as appropriate. */
3658
3659 use_gottprel = FALSE;
cf35638d 3660 new_symndx = is_gd ? ELF64_R_SYM (irel->r_info) : STN_UNDEF;
891caa9b 3661
9a757e4d
RM
3662 /* Some compilers warn about a Boolean-looking expression being
3663 used in a switch. The explicit cast silences them. */
0e1862bb 3664 switch ((int) (!dynamic && !bfd_link_pic (info->link_info)))
252b5132 3665 {
a7519a3c
RH
3666 case 1:
3667 {
3668 bfd_vma tp_base;
3669 bfd_signed_vma disp;
252b5132 3670
a7519a3c
RH
3671 BFD_ASSERT (elf_hash_table (info->link_info)->tls_sec != NULL);
3672 tp_base = alpha_get_tprel_base (info->link_info);
3673 disp = symval - tp_base;
252b5132 3674
a7519a3c
RH
3675 if (disp >= -0x8000 && disp < 0x8000)
3676 {
891caa9b 3677 insn = (OP_LDA << 26) | (tlsgd_reg << 21) | (31 << 16);
a7519a3c
RH
3678 bfd_put_32 (info->abfd, (bfd_vma) insn, pos[0]);
3679 bfd_put_32 (info->abfd, (bfd_vma) INSN_UNOP, pos[1]);
3765b1be 3680
a7519a3c
RH
3681 irel[0].r_offset = pos[0] - info->contents;
3682 irel[0].r_info = ELF64_R_INFO (new_symndx, R_ALPHA_TPREL16);
3683 irel[1].r_info = ELF64_R_INFO (0, R_ALPHA_NONE);
3684 break;
3685 }
3686 else if (disp >= -(bfd_signed_vma) 0x80000000
3687 && disp < (bfd_signed_vma) 0x7fff8000
891caa9b 3688 && pos[0] + 4 == pos[1])
a7519a3c 3689 {
891caa9b 3690 insn = (OP_LDAH << 26) | (tlsgd_reg << 21) | (31 << 16);
a7519a3c 3691 bfd_put_32 (info->abfd, (bfd_vma) insn, pos[0]);
891caa9b 3692 insn = (OP_LDA << 26) | (tlsgd_reg << 21) | (tlsgd_reg << 16);
a7519a3c 3693 bfd_put_32 (info->abfd, (bfd_vma) insn, pos[1]);
3765b1be 3694
a7519a3c
RH
3695 irel[0].r_offset = pos[0] - info->contents;
3696 irel[0].r_info = ELF64_R_INFO (new_symndx, R_ALPHA_TPRELHI);
3697 irel[1].r_offset = pos[1] - info->contents;
3698 irel[1].r_info = ELF64_R_INFO (new_symndx, R_ALPHA_TPRELLO);
3699 break;
3700 }
3701 }
3702 /* FALLTHRU */
3765b1be 3703
3765b1be 3704 default:
a7519a3c
RH
3705 use_gottprel = TRUE;
3706
891caa9b 3707 insn = (OP_LDQ << 26) | (tlsgd_reg << 21) | (29 << 16);
a7519a3c
RH
3708 bfd_put_32 (info->abfd, (bfd_vma) insn, pos[0]);
3709 bfd_put_32 (info->abfd, (bfd_vma) INSN_UNOP, pos[1]);
3710
3711 irel[0].r_offset = pos[0] - info->contents;
3712 irel[0].r_info = ELF64_R_INFO (new_symndx, R_ALPHA_GOTTPREL);
3713 irel[1].r_info = ELF64_R_INFO (0, R_ALPHA_NONE);
3714 break;
3765b1be 3715 }
3765b1be 3716
a7519a3c 3717 bfd_put_32 (info->abfd, (bfd_vma) INSN_RDUNIQ, pos[2]);
252b5132 3718
a7519a3c
RH
3719 insn = INSN_ADDQ | (16 << 21) | (0 << 16) | (0 << 0);
3720 bfd_put_32 (info->abfd, (bfd_vma) insn, pos[3]);
3765b1be 3721
a7519a3c 3722 bfd_put_32 (info->abfd, (bfd_vma) INSN_UNOP, pos[4]);
e92d460e 3723
a7519a3c
RH
3724 irel[2].r_info = ELF64_R_INFO (0, R_ALPHA_NONE);
3725 gpdisp->r_info = ELF64_R_INFO (0, R_ALPHA_NONE);
252b5132 3726
a7519a3c
RH
3727 hint = elf64_alpha_find_reloc_at_ofs (info->relocs, info->relend,
3728 irel[2].r_offset, R_ALPHA_HINT);
3729 if (hint)
3730 hint->r_info = ELF64_R_INFO (0, R_ALPHA_NONE);
252b5132 3731
a7519a3c
RH
3732 info->changed_contents = TRUE;
3733 info->changed_relocs = TRUE;
d6ad34f6 3734
a7519a3c
RH
3735 /* Reduce the use count on the TLSGD/TLSLDM relocation. */
3736 if (--info->gotent->use_count == 0)
3765b1be 3737 {
a7519a3c
RH
3738 int sz = alpha_got_entry_size (info->gotent->reloc_type);
3739 alpha_elf_tdata (info->gotobj)->total_got_size -= sz;
3740 if (!info->h)
3741 alpha_elf_tdata (info->gotobj)->local_got_size -= sz;
3765b1be 3742 }
252b5132 3743
a7519a3c
RH
3744 /* If we've switched to a GOTTPREL relocation, increment the reference
3745 count on that got entry. */
3746 if (use_gottprel)
f44f99a5 3747 {
a7519a3c 3748 struct alpha_elf_got_entry *tprel_gotent;
f44f99a5 3749
a7519a3c
RH
3750 for (tprel_gotent = *info->first_gotent; tprel_gotent ;
3751 tprel_gotent = tprel_gotent->next)
3752 if (tprel_gotent->gotobj == info->gotobj
3753 && tprel_gotent->reloc_type == R_ALPHA_GOTTPREL
3754 && tprel_gotent->addend == irel->r_addend)
3755 break;
3756 if (tprel_gotent)
3757 tprel_gotent->use_count++;
3758 else
f44f99a5 3759 {
a7519a3c
RH
3760 if (info->gotent->use_count == 0)
3761 tprel_gotent = info->gotent;
3762 else
3763 {
3764 tprel_gotent = (struct alpha_elf_got_entry *)
3765 bfd_alloc (info->abfd, sizeof (struct alpha_elf_got_entry));
3766 if (!tprel_gotent)
3767 return FALSE;
f44f99a5 3768
a7519a3c
RH
3769 tprel_gotent->next = *info->first_gotent;
3770 *info->first_gotent = tprel_gotent;
f44f99a5 3771
a7519a3c
RH
3772 tprel_gotent->gotobj = info->gotobj;
3773 tprel_gotent->addend = irel->r_addend;
3774 tprel_gotent->got_offset = -1;
3775 tprel_gotent->reloc_done = 0;
3776 tprel_gotent->reloc_xlated = 0;
3777 }
f44f99a5 3778
a7519a3c
RH
3779 tprel_gotent->use_count = 1;
3780 tprel_gotent->reloc_type = R_ALPHA_GOTTPREL;
3781 }
f44f99a5 3782 }
f44f99a5 3783
b34976b6 3784 return TRUE;
f44f99a5
RH
3785}
3786
b34976b6 3787static bfd_boolean
a7519a3c
RH
3788elf64_alpha_relax_section (bfd *abfd, asection *sec,
3789 struct bfd_link_info *link_info, bfd_boolean *again)
f44f99a5 3790{
a7519a3c
RH
3791 Elf_Internal_Shdr *symtab_hdr;
3792 Elf_Internal_Rela *internal_relocs;
3793 Elf_Internal_Rela *irel, *irelend;
3794 Elf_Internal_Sym *isymbuf = NULL;
3795 struct alpha_elf_got_entry **local_got_entries;
3796 struct alpha_relax_info info;
4dfe6ac6 3797 struct alpha_elf_link_hash_table * htab;
d1c109de 3798 int relax_pass;
4dfe6ac6
NC
3799
3800 htab = alpha_elf_hash_table (link_info);
3801 if (htab == NULL)
3802 return FALSE;
f44f99a5 3803
4a828aab 3804 /* There's nothing to change, yet. */
a7519a3c 3805 *again = FALSE;
f44f99a5 3806
0e1862bb 3807 if (bfd_link_relocatable (link_info)
a7519a3c
RH
3808 || ((sec->flags & (SEC_CODE | SEC_RELOC | SEC_ALLOC))
3809 != (SEC_CODE | SEC_RELOC | SEC_ALLOC))
3810 || sec->reloc_count == 0)
d6ad34f6
RH
3811 return TRUE;
3812
0ffa91dd 3813 BFD_ASSERT (is_alpha_elf (abfd));
d1c109de 3814 relax_pass = link_info->relax_pass;
0ffa91dd 3815
4a828aab 3816 /* Make sure our GOT and PLT tables are up-to-date. */
4dfe6ac6 3817 if (htab->relax_trip != link_info->relax_trip)
4a828aab 3818 {
4dfe6ac6 3819 htab->relax_trip = link_info->relax_trip;
4a828aab 3820
d1c109de
RH
3821 /* This should never fail after the initial round, since the only error
3822 is GOT overflow, and relaxation only shrinks the table. However, we
3823 may only merge got sections during the first pass. If we merge
3824 sections after we've created GPREL relocs, the GP for the merged
3825 section backs up which may put the relocs out of range. */
3826 if (!elf64_alpha_size_got_sections (link_info, relax_pass == 0))
4a828aab
RH
3827 abort ();
3828 if (elf_hash_table (link_info)->dynamic_sections_created)
3829 {
3830 elf64_alpha_size_plt_section (link_info);
3831 elf64_alpha_size_rela_got_section (link_info);
3832 }
3833 }
3834
0ffa91dd 3835 symtab_hdr = &elf_symtab_hdr (abfd);
a7519a3c 3836 local_got_entries = alpha_elf_tdata(abfd)->local_got_entries;
252b5132 3837
a7519a3c
RH
3838 /* Load the relocations for this section. */
3839 internal_relocs = (_bfd_elf_link_read_relocs
2c3fc389 3840 (abfd, sec, NULL, (Elf_Internal_Rela *) NULL,
a7519a3c
RH
3841 link_info->keep_memory));
3842 if (internal_relocs == NULL)
3843 return FALSE;
252b5132 3844
a7519a3c
RH
3845 memset(&info, 0, sizeof (info));
3846 info.abfd = abfd;
3847 info.sec = sec;
3848 info.link_info = link_info;
3849 info.symtab_hdr = symtab_hdr;
3850 info.relocs = internal_relocs;
3851 info.relend = irelend = internal_relocs + sec->reloc_count;
3852
3853 /* Find the GP for this object. Do not store the result back via
3854 _bfd_set_gp_value, since this could change again before final. */
3855 info.gotobj = alpha_elf_tdata (abfd)->gotobj;
3856 if (info.gotobj)
3765b1be 3857 {
a7519a3c
RH
3858 asection *sgot = alpha_elf_tdata (info.gotobj)->got;
3859 info.gp = (sgot->output_section->vma
3860 + sgot->output_offset
3861 + 0x8000);
252b5132
RH
3862 }
3863
a7519a3c
RH
3864 /* Get the section contents. */
3865 if (elf_section_data (sec)->this_hdr.contents != NULL)
3866 info.contents = elf_section_data (sec)->this_hdr.contents;
3867 else
3868 {
3869 if (!bfd_malloc_and_get_section (abfd, sec, &info.contents))
3870 goto error_return;
3871 }
252b5132 3872
a7519a3c
RH
3873 for (irel = internal_relocs; irel < irelend; irel++)
3874 {
3875 bfd_vma symval;
3876 struct alpha_elf_got_entry *gotent;
3877 unsigned long r_type = ELF64_R_TYPE (irel->r_info);
3878 unsigned long r_symndx = ELF64_R_SYM (irel->r_info);
3879
3880 /* Early exit for unhandled or unrelaxable relocations. */
d1c109de
RH
3881 if (r_type != R_ALPHA_LITERAL)
3882 {
3883 /* We complete everything except LITERAL in the first pass. */
3884 if (relax_pass != 0)
3885 continue;
3886 if (r_type == R_ALPHA_TLSLDM)
3887 {
3888 /* The symbol for a TLSLDM reloc is ignored. Collapse the
3889 reloc to the STN_UNDEF (0) symbol so that they all match. */
3890 r_symndx = STN_UNDEF;
3891 }
3892 else if (r_type != R_ALPHA_GOTDTPREL
3893 && r_type != R_ALPHA_GOTTPREL
3894 && r_type != R_ALPHA_TLSGD)
3895 continue;
a7519a3c
RH
3896 }
3897
3898 /* Get the value of the symbol referred to by the reloc. */
3899 if (r_symndx < symtab_hdr->sh_info)
3900 {
3901 /* A local symbol. */
3902 Elf_Internal_Sym *isym;
3903
3904 /* Read this BFD's local symbols. */
3905 if (isymbuf == NULL)
3906 {
3907 isymbuf = (Elf_Internal_Sym *) symtab_hdr->contents;
3908 if (isymbuf == NULL)
3909 isymbuf = bfd_elf_get_elf_syms (abfd, symtab_hdr,
3910 symtab_hdr->sh_info, 0,
3911 NULL, NULL, NULL);
3912 if (isymbuf == NULL)
3913 goto error_return;
3914 }
252b5132 3915
a7519a3c 3916 isym = isymbuf + r_symndx;
252b5132 3917
a7519a3c
RH
3918 /* Given the symbol for a TLSLDM reloc is ignored, this also
3919 means forcing the symbol value to the tp base. */
3920 if (r_type == R_ALPHA_TLSLDM)
3921 {
3922 info.tsec = bfd_abs_section_ptr;
3923 symval = alpha_get_tprel_base (info.link_info);
3924 }
3925 else
3926 {
3927 symval = isym->st_value;
3928 if (isym->st_shndx == SHN_UNDEF)
3929 continue;
3930 else if (isym->st_shndx == SHN_ABS)
3931 info.tsec = bfd_abs_section_ptr;
3932 else if (isym->st_shndx == SHN_COMMON)
3933 info.tsec = bfd_com_section_ptr;
3934 else
3935 info.tsec = bfd_section_from_elf_index (abfd, isym->st_shndx);
3936 }
252b5132 3937
a7519a3c
RH
3938 info.h = NULL;
3939 info.other = isym->st_other;
3940 if (local_got_entries)
3941 info.first_gotent = &local_got_entries[r_symndx];
3942 else
3943 {
3944 info.first_gotent = &info.gotent;
3945 info.gotent = NULL;
3946 }
252b5132 3947 }
a7519a3c
RH
3948 else
3949 {
3950 unsigned long indx;
3951 struct alpha_elf_link_hash_entry *h;
252b5132 3952
a7519a3c
RH
3953 indx = r_symndx - symtab_hdr->sh_info;
3954 h = alpha_elf_sym_hashes (abfd)[indx];
3955 BFD_ASSERT (h != NULL);
252b5132 3956
a7519a3c
RH
3957 while (h->root.root.type == bfd_link_hash_indirect
3958 || h->root.root.type == bfd_link_hash_warning)
3959 h = (struct alpha_elf_link_hash_entry *)h->root.root.u.i.link;
252b5132 3960
a7519a3c
RH
3961 /* If the symbol is undefined, we can't do anything with it. */
3962 if (h->root.root.type == bfd_link_hash_undefined)
3963 continue;
252b5132 3964
a7519a3c
RH
3965 /* If the symbol isn't defined in the current module,
3966 again we can't do anything. */
3967 if (h->root.root.type == bfd_link_hash_undefweak)
3968 {
3969 info.tsec = bfd_abs_section_ptr;
3970 symval = 0;
3971 }
3972 else if (!h->root.def_regular)
3973 {
3974 /* Except for TLSGD relocs, which can sometimes be
3975 relaxed to GOTTPREL relocs. */
3976 if (r_type != R_ALPHA_TLSGD)
3977 continue;
3978 info.tsec = bfd_abs_section_ptr;
3979 symval = 0;
3980 }
3981 else
3982 {
3983 info.tsec = h->root.root.u.def.section;
3984 symval = h->root.root.u.def.value;
3985 }
252b5132 3986
a7519a3c
RH
3987 info.h = h;
3988 info.other = h->root.other;
3989 info.first_gotent = &h->got_entries;
3990 }
252b5132 3991
a7519a3c
RH
3992 /* Search for the got entry to be used by this relocation. */
3993 for (gotent = *info.first_gotent; gotent ; gotent = gotent->next)
3994 if (gotent->gotobj == info.gotobj
3995 && gotent->reloc_type == r_type
3996 && gotent->addend == irel->r_addend)
3997 break;
3998 info.gotent = gotent;
252b5132 3999
a7519a3c
RH
4000 symval += info.tsec->output_section->vma + info.tsec->output_offset;
4001 symval += irel->r_addend;
252b5132 4002
a7519a3c 4003 switch (r_type)
252b5132 4004 {
a7519a3c
RH
4005 case R_ALPHA_LITERAL:
4006 BFD_ASSERT(info.gotent != NULL);
252b5132 4007
a7519a3c
RH
4008 /* If there exist LITUSE relocations immediately following, this
4009 opens up all sorts of interesting optimizations, because we
4010 now know every location that this address load is used. */
4011 if (irel+1 < irelend
4012 && ELF64_R_TYPE (irel[1].r_info) == R_ALPHA_LITUSE)
252b5132 4013 {
a7519a3c
RH
4014 if (!elf64_alpha_relax_with_lituse (&info, symval, irel))
4015 goto error_return;
252b5132 4016 }
a7519a3c
RH
4017 else
4018 {
4019 if (!elf64_alpha_relax_got_load (&info, symval, irel, r_type))
4020 goto error_return;
4021 }
4022 break;
252b5132 4023
a7519a3c
RH
4024 case R_ALPHA_GOTDTPREL:
4025 case R_ALPHA_GOTTPREL:
4026 BFD_ASSERT(info.gotent != NULL);
4027 if (!elf64_alpha_relax_got_load (&info, symval, irel, r_type))
4028 goto error_return;
4029 break;
4030
4031 case R_ALPHA_TLSGD:
4032 case R_ALPHA_TLSLDM:
4033 BFD_ASSERT(info.gotent != NULL);
4034 if (!elf64_alpha_relax_tls_get_addr (&info, symval, irel,
4035 r_type == R_ALPHA_TLSGD))
4036 goto error_return;
4037 break;
252b5132
RH
4038 }
4039 }
4040
a7519a3c
RH
4041 if (isymbuf != NULL
4042 && symtab_hdr->contents != (unsigned char *) isymbuf)
4043 {
4044 if (!link_info->keep_memory)
4045 free (isymbuf);
4046 else
252b5132 4047 {
a7519a3c
RH
4048 /* Cache the symbols for elf_link_input_bfd. */
4049 symtab_hdr->contents = (unsigned char *) isymbuf;
252b5132 4050 }
a7519a3c 4051 }
252b5132 4052
a7519a3c
RH
4053 if (info.contents != NULL
4054 && elf_section_data (sec)->this_hdr.contents != info.contents)
4055 {
4056 if (!info.changed_contents && !link_info->keep_memory)
4057 free (info.contents);
4058 else
252b5132 4059 {
a7519a3c
RH
4060 /* Cache the section contents for elf_link_input_bfd. */
4061 elf_section_data (sec)->this_hdr.contents = info.contents;
252b5132 4062 }
a7519a3c 4063 }
252b5132 4064
a7519a3c
RH
4065 if (elf_section_data (sec)->relocs != internal_relocs)
4066 {
4067 if (!info.changed_relocs)
4068 free (internal_relocs);
4069 else
4070 elf_section_data (sec)->relocs = internal_relocs;
252b5132 4071 }
a7519a3c
RH
4072
4073 *again = info.changed_contents || info.changed_relocs;
252b5132 4074
b34976b6 4075 return TRUE;
252b5132 4076
a7519a3c
RH
4077 error_return:
4078 if (isymbuf != NULL
4079 && symtab_hdr->contents != (unsigned char *) isymbuf)
4080 free (isymbuf);
4081 if (info.contents != NULL
4082 && elf_section_data (sec)->this_hdr.contents != info.contents)
4083 free (info.contents);
4084 if (internal_relocs != NULL
4085 && elf_section_data (sec)->relocs != internal_relocs)
4086 free (internal_relocs);
4087 return FALSE;
4088}
4089\f
1bbc9cec
RH
4090/* Emit a dynamic relocation for (DYNINDX, RTYPE, ADDEND) at (SEC, OFFSET)
4091 into the next available slot in SREL. */
4092
4093static void
a7519a3c
RH
4094elf64_alpha_emit_dynrel (bfd *abfd, struct bfd_link_info *info,
4095 asection *sec, asection *srel, bfd_vma offset,
4096 long dynindx, long rtype, bfd_vma addend)
1bbc9cec
RH
4097{
4098 Elf_Internal_Rela outrel;
4099 bfd_byte *loc;
4100
4101 BFD_ASSERT (srel != NULL);
4102
4103 outrel.r_info = ELF64_R_INFO (dynindx, rtype);
4104 outrel.r_addend = addend;
4105
4106 offset = _bfd_elf_section_offset (abfd, info, sec, offset);
4107 if ((offset | 1) != (bfd_vma) -1)
4108 outrel.r_offset = sec->output_section->vma + sec->output_offset + offset;
4109 else
4110 memset (&outrel, 0, sizeof (outrel));
4111
4112 loc = srel->contents;
4113 loc += srel->reloc_count++ * sizeof (Elf64_External_Rela);
4114 bfd_elf64_swap_reloca_out (abfd, &outrel, loc);
eea6121a 4115 BFD_ASSERT (sizeof (Elf64_External_Rela) * srel->reloc_count <= srel->size);
1bbc9cec
RH
4116}
4117
4a67a098
RH
4118/* Relocate an Alpha ELF section for a relocatable link.
4119
4120 We don't have to change anything unless the reloc is against a section
4121 symbol, in which case we have to adjust according to where the section
4122 symbol winds up in the output section. */
4123
b34976b6 4124static bfd_boolean
a7519a3c
RH
4125elf64_alpha_relocate_section_r (bfd *output_bfd ATTRIBUTE_UNUSED,
4126 struct bfd_link_info *info ATTRIBUTE_UNUSED,
4127 bfd *input_bfd, asection *input_section,
4128 bfd_byte *contents ATTRIBUTE_UNUSED,
4129 Elf_Internal_Rela *relocs,
4130 Elf_Internal_Sym *local_syms,
4131 asection **local_sections)
4a67a098
RH
4132{
4133 unsigned long symtab_hdr_sh_info;
4134 Elf_Internal_Rela *rel;
4135 Elf_Internal_Rela *relend;
ab96bf03 4136 struct elf_link_hash_entry **sym_hashes;
b34976b6 4137 bfd_boolean ret_val = TRUE;
4a67a098 4138
0ffa91dd 4139 symtab_hdr_sh_info = elf_symtab_hdr (input_bfd).sh_info;
ab96bf03 4140 sym_hashes = elf_sym_hashes (input_bfd);
4a67a098
RH
4141
4142 relend = relocs + input_section->reloc_count;
4143 for (rel = relocs; rel < relend; rel++)
4144 {
4145 unsigned long r_symndx;
4146 Elf_Internal_Sym *sym;
4147 asection *sec;
4148 unsigned long r_type;
4149
ab96bf03 4150 r_type = ELF64_R_TYPE (rel->r_info);
4a67a098
RH
4151 if (r_type >= R_ALPHA_max)
4152 {
4153 (*_bfd_error_handler)
d003868e
AM
4154 (_("%B: unknown relocation type %d"),
4155 input_bfd, (int) r_type);
4a67a098 4156 bfd_set_error (bfd_error_bad_value);
b34976b6 4157 ret_val = FALSE;
4a67a098
RH
4158 continue;
4159 }
4160
4a67a098
RH
4161 /* The symbol associated with GPDISP and LITUSE is
4162 immaterial. Only the addend is significant. */
4163 if (r_type == R_ALPHA_GPDISP || r_type == R_ALPHA_LITUSE)
4164 continue;
4165
ab96bf03 4166 r_symndx = ELF64_R_SYM (rel->r_info);
4a67a098
RH
4167 if (r_symndx < symtab_hdr_sh_info)
4168 {
4169 sym = local_syms + r_symndx;
ab96bf03 4170 sec = local_sections[r_symndx];
4a67a098 4171 }
ab96bf03
AM
4172 else
4173 {
4174 struct elf_link_hash_entry *h;
4175
4176 h = sym_hashes[r_symndx - symtab_hdr_sh_info];
4177
4178 while (h->root.type == bfd_link_hash_indirect
4179 || h->root.type == bfd_link_hash_warning)
4180 h = (struct elf_link_hash_entry *) h->root.u.i.link;
4181
4182 if (h->root.type != bfd_link_hash_defined
4183 && h->root.type != bfd_link_hash_defweak)
4184 continue;
4185
4186 sym = NULL;
4187 sec = h->root.u.def.section;
4188 }
4189
dbaa2011 4190 if (sec != NULL && discarded_section (sec))
e4067dbb 4191 RELOC_AGAINST_DISCARDED_SECTION (info, input_bfd, input_section,
545fd46b
MR
4192 rel, 1, relend,
4193 elf64_alpha_howto_table + r_type, 0,
e4067dbb 4194 contents);
ab96bf03
AM
4195
4196 if (sym != NULL && ELF_ST_TYPE (sym->st_info) == STT_SECTION)
4197 rel->r_addend += sec->output_offset;
4a67a098
RH
4198 }
4199
4200 return ret_val;
4201}
4202
252b5132
RH
4203/* Relocate an Alpha ELF section. */
4204
b34976b6 4205static bfd_boolean
a7519a3c
RH
4206elf64_alpha_relocate_section (bfd *output_bfd, struct bfd_link_info *info,
4207 bfd *input_bfd, asection *input_section,
4208 bfd_byte *contents, Elf_Internal_Rela *relocs,
4209 Elf_Internal_Sym *local_syms,
4210 asection **local_sections)
252b5132 4211{
4a67a098 4212 Elf_Internal_Shdr *symtab_hdr;
252b5132
RH
4213 Elf_Internal_Rela *rel;
4214 Elf_Internal_Rela *relend;
4a67a098
RH
4215 asection *sgot, *srel, *srelgot;
4216 bfd *dynobj, *gotobj;
4217 bfd_vma gp, tp_base, dtp_base;
4218 struct alpha_elf_got_entry **local_got_entries;
b34976b6 4219 bfd_boolean ret_val;
252b5132 4220
0ffa91dd 4221 BFD_ASSERT (is_alpha_elf (input_bfd));
68ffbac6 4222
4a67a098 4223 /* Handle relocatable links with a smaller loop. */
0e1862bb 4224 if (bfd_link_relocatable (info))
4a67a098
RH
4225 return elf64_alpha_relocate_section_r (output_bfd, info, input_bfd,
4226 input_section, contents, relocs,
4227 local_syms, local_sections);
4228
4229 /* This is a final link. */
4230
b34976b6 4231 ret_val = TRUE;
252b5132 4232
0ffa91dd 4233 symtab_hdr = &elf_symtab_hdr (input_bfd);
3765b1be 4234
4a67a098
RH
4235 dynobj = elf_hash_table (info)->dynobj;
4236 if (dynobj)
3d4d4302 4237 srelgot = bfd_get_linker_section (dynobj, ".rela.got");
4a67a098
RH
4238 else
4239 srelgot = NULL;
4240
3241278a
RH
4241 if (input_section->flags & SEC_ALLOC)
4242 {
4243 const char *section_name;
4244 section_name = (bfd_elf_string_from_elf_section
4245 (input_bfd, elf_elfheader(input_bfd)->e_shstrndx,
d4730f92 4246 _bfd_elf_single_rel_hdr (input_section)->sh_name));
3241278a 4247 BFD_ASSERT(section_name != NULL);
3d4d4302 4248 srel = bfd_get_linker_section (dynobj, section_name);
3241278a
RH
4249 }
4250 else
4251 srel = NULL;
3765b1be 4252
4a67a098
RH
4253 /* Find the gp value for this input bfd. */
4254 gotobj = alpha_elf_tdata (input_bfd)->gotobj;
4255 if (gotobj)
4256 {
4257 sgot = alpha_elf_tdata (gotobj)->got;
4258 gp = _bfd_get_gp_value (gotobj);
4259 if (gp == 0)
252b5132 4260 {
4a67a098
RH
4261 gp = (sgot->output_section->vma
4262 + sgot->output_offset
4263 + 0x8000);
4264 _bfd_set_gp_value (gotobj, gp);
4265 }
4266 }
4267 else
4268 {
4269 sgot = NULL;
4270 gp = 0;
4271 }
3765b1be 4272
4a67a098
RH
4273 local_got_entries = alpha_elf_tdata(input_bfd)->local_got_entries;
4274
e1918d23 4275 if (elf_hash_table (info)->tls_sec != NULL)
4a67a098 4276 {
e1918d23
AM
4277 dtp_base = alpha_get_dtprel_base (info);
4278 tp_base = alpha_get_tprel_base (info);
252b5132 4279 }
4a67a098
RH
4280 else
4281 dtp_base = tp_base = 0;
252b5132 4282
252b5132 4283 relend = relocs + input_section->reloc_count;
4a67a098 4284 for (rel = relocs; rel < relend; rel++)
252b5132 4285 {
4a67a098 4286 struct alpha_elf_link_hash_entry *h = NULL;
3765b1be
RH
4287 struct alpha_elf_got_entry *gotent;
4288 bfd_reloc_status_type r;
252b5132
RH
4289 reloc_howto_type *howto;
4290 unsigned long r_symndx;
4a67a098
RH
4291 Elf_Internal_Sym *sym = NULL;
4292 asection *sec = NULL;
3765b1be 4293 bfd_vma value;
dc810e39 4294 bfd_vma addend;
b34976b6 4295 bfd_boolean dynamic_symbol_p;
1d5316ab 4296 bfd_boolean unresolved_reloc = FALSE;
b34976b6 4297 bfd_boolean undef_weak_ref = FALSE;
3765b1be 4298 unsigned long r_type;
252b5132
RH
4299
4300 r_type = ELF64_R_TYPE(rel->r_info);
3765b1be 4301 if (r_type >= R_ALPHA_max)
252b5132 4302 {
3765b1be 4303 (*_bfd_error_handler)
d003868e
AM
4304 (_("%B: unknown relocation type %d"),
4305 input_bfd, (int) r_type);
252b5132 4306 bfd_set_error (bfd_error_bad_value);
b34976b6 4307 ret_val = FALSE;
3765b1be 4308 continue;
252b5132 4309 }
252b5132 4310
3765b1be 4311 howto = elf64_alpha_howto_table + r_type;
252b5132
RH
4312 r_symndx = ELF64_R_SYM(rel->r_info);
4313
cc03ec80 4314 /* The symbol for a TLSLDM reloc is ignored. Collapse the
cf35638d 4315 reloc to the STN_UNDEF (0) symbol so that they all match. */
cc03ec80 4316 if (r_type == R_ALPHA_TLSLDM)
cf35638d 4317 r_symndx = STN_UNDEF;
cc03ec80 4318
252b5132
RH
4319 if (r_symndx < symtab_hdr->sh_info)
4320 {
8517fae7 4321 asection *msec;
252b5132
RH
4322 sym = local_syms + r_symndx;
4323 sec = local_sections[r_symndx];
8517fae7
AM
4324 msec = sec;
4325 value = _bfd_elf_rela_local_sym (output_bfd, sym, &msec, rel);
3765b1be 4326
cf35638d 4327 /* If this is a tp-relative relocation against sym STN_UNDEF (0),
cc03ec80 4328 this is hackery from relax_section. Force the value to
f915360b 4329 be the tls module base. */
cf35638d 4330 if (r_symndx == STN_UNDEF
cc03ec80
RH
4331 && (r_type == R_ALPHA_TLSLDM
4332 || r_type == R_ALPHA_GOTTPREL
4333 || r_type == R_ALPHA_TPREL64
4334 || r_type == R_ALPHA_TPRELHI
4335 || r_type == R_ALPHA_TPRELLO
4336 || r_type == R_ALPHA_TPREL16))
f915360b 4337 value = dtp_base;
cc03ec80 4338
4a67a098
RH
4339 if (local_got_entries)
4340 gotent = local_got_entries[r_symndx];
4341 else
4342 gotent = NULL;
3765b1be
RH
4343
4344 /* Need to adjust local GOT entries' addends for SEC_MERGE
4345 unless it has been done already. */
4346 if ((sec->flags & SEC_MERGE)
048d873d 4347 && ELF_ST_TYPE (sym->st_info) == STT_SECTION
dbaa2011 4348 && sec->sec_info_type == SEC_INFO_TYPE_MERGE
048d873d
RH
4349 && gotent
4350 && !gotent->reloc_xlated)
3765b1be
RH
4351 {
4352 struct alpha_elf_got_entry *ent;
3765b1be
RH
4353
4354 for (ent = gotent; ent; ent = ent->next)
4355 {
4356 ent->reloc_xlated = 1;
4357 if (ent->use_count == 0)
4358 continue;
4359 msec = sec;
4360 ent->addend =
4361 _bfd_merged_section_offset (output_bfd, &msec,
4362 elf_section_data (sec)->
4363 sec_info,
753731ee 4364 sym->st_value + ent->addend);
3765b1be
RH
4365 ent->addend -= sym->st_value;
4366 ent->addend += msec->output_section->vma
4367 + msec->output_offset
4368 - sec->output_section->vma
4369 - sec->output_offset;
4370 }
4371 }
4372
b34976b6 4373 dynamic_symbol_p = FALSE;
252b5132
RH
4374 }
4375 else
4376 {
62d887d4 4377 bfd_boolean warned, ignored;
560e09e9 4378 struct elf_link_hash_entry *hh;
b2a8e766
AM
4379 struct elf_link_hash_entry **sym_hashes = elf_sym_hashes (input_bfd);
4380
4381 RELOC_FOR_GLOBAL_SYMBOL (info, input_bfd, input_section, rel,
4382 r_symndx, symtab_hdr, sym_hashes,
4383 hh, sec, value,
62d887d4 4384 unresolved_reloc, warned, ignored);
560e09e9
NC
4385
4386 if (warned)
4387 continue;
252b5132 4388
560e09e9
NC
4389 if (value == 0
4390 && ! unresolved_reloc
4391 && hh->root.type == bfd_link_hash_undefweak)
b34976b6 4392 undef_weak_ref = TRUE;
3765b1be 4393
560e09e9 4394 h = (struct alpha_elf_link_hash_entry *) hh;
3765b1be
RH
4395 dynamic_symbol_p = alpha_elf_dynamic_symbol_p (&h->root, info);
4396 gotent = h->got_entries;
252b5132 4397 }
3765b1be 4398
dbaa2011 4399 if (sec != NULL && discarded_section (sec))
e4067dbb 4400 RELOC_AGAINST_DISCARDED_SECTION (info, input_bfd, input_section,
545fd46b 4401 rel, 1, relend, howto, 0, contents);
ab96bf03 4402
252b5132 4403 addend = rel->r_addend;
3765b1be
RH
4404 value += addend;
4405
4406 /* Search for the proper got entry. */
4407 for (; gotent ; gotent = gotent->next)
4408 if (gotent->gotobj == gotobj
4409 && gotent->reloc_type == r_type
4410 && gotent->addend == addend)
4411 break;
252b5132
RH
4412
4413 switch (r_type)
4414 {
4415 case R_ALPHA_GPDISP:
4416 {
4417 bfd_byte *p_ldah, *p_lda;
4418
4419 BFD_ASSERT(gp != 0);
4420
3765b1be
RH
4421 value = (input_section->output_section->vma
4422 + input_section->output_offset
4423 + rel->r_offset);
252b5132 4424
3765b1be 4425 p_ldah = contents + rel->r_offset;
252b5132
RH
4426 p_lda = p_ldah + rel->r_addend;
4427
3765b1be 4428 r = elf64_alpha_do_reloc_gpdisp (input_bfd, gp - value,
252b5132
RH
4429 p_ldah, p_lda);
4430 }
4431 break;
4432
252b5132 4433 case R_ALPHA_LITERAL:
3765b1be
RH
4434 BFD_ASSERT(sgot != NULL);
4435 BFD_ASSERT(gp != 0);
4436 BFD_ASSERT(gotent != NULL);
4437 BFD_ASSERT(gotent->use_count >= 1);
f7460f5f 4438
3765b1be
RH
4439 if (!gotent->reloc_done)
4440 {
4441 gotent->reloc_done = 1;
252b5132 4442
3765b1be
RH
4443 bfd_put_64 (output_bfd, value,
4444 sgot->contents + gotent->got_offset);
252b5132 4445
3765b1be
RH
4446 /* If the symbol has been forced local, output a
4447 RELATIVE reloc, otherwise it will be handled in
4448 finish_dynamic_symbol. */
0e1862bb
L
4449 if (bfd_link_pic (info)
4450 && !dynamic_symbol_p
4451 && !undef_weak_ref)
1bbc9cec
RH
4452 elf64_alpha_emit_dynrel (output_bfd, info, sgot, srelgot,
4453 gotent->got_offset, 0,
4454 R_ALPHA_RELATIVE, value);
3765b1be 4455 }
252b5132 4456
3765b1be
RH
4457 value = (sgot->output_section->vma
4458 + sgot->output_offset
4459 + gotent->got_offset);
4460 value -= gp;
252b5132
RH
4461 goto default_reloc;
4462
4463 case R_ALPHA_GPREL32:
ec1659c8 4464 case R_ALPHA_GPREL16:
252b5132 4465 case R_ALPHA_GPRELLOW:
3765b1be 4466 if (dynamic_symbol_p)
f16fbd61
RH
4467 {
4468 (*_bfd_error_handler)
d003868e
AM
4469 (_("%B: gp-relative relocation against dynamic symbol %s"),
4470 input_bfd, h->root.root.root.string);
b34976b6 4471 ret_val = FALSE;
f16fbd61 4472 }
252b5132 4473 BFD_ASSERT(gp != 0);
3765b1be 4474 value -= gp;
252b5132
RH
4475 goto default_reloc;
4476
4477 case R_ALPHA_GPRELHIGH:
3765b1be 4478 if (dynamic_symbol_p)
f16fbd61
RH
4479 {
4480 (*_bfd_error_handler)
d003868e
AM
4481 (_("%B: gp-relative relocation against dynamic symbol %s"),
4482 input_bfd, h->root.root.root.string);
b34976b6 4483 ret_val = FALSE;
f16fbd61 4484 }
252b5132 4485 BFD_ASSERT(gp != 0);
3765b1be
RH
4486 value -= gp;
4487 value = ((bfd_signed_vma) value >> 16) + ((value >> 15) & 1);
252b5132
RH
4488 goto default_reloc;
4489
252b5132 4490 case R_ALPHA_HINT:
f94952df
RH
4491 /* A call to a dynamic symbol is definitely out of range of
4492 the 16-bit displacement. Don't bother writing anything. */
3765b1be 4493 if (dynamic_symbol_p)
f94952df
RH
4494 {
4495 r = bfd_reloc_ok;
4496 break;
4497 }
3765b1be
RH
4498 /* The regular PC-relative stuff measures from the start of
4499 the instruction rather than the end. */
4500 value -= 4;
4501 goto default_reloc;
f94952df
RH
4502
4503 case R_ALPHA_BRADDR:
3765b1be
RH
4504 if (dynamic_symbol_p)
4505 {
4506 (*_bfd_error_handler)
d003868e
AM
4507 (_("%B: pc-relative relocation against dynamic symbol %s"),
4508 input_bfd, h->root.root.root.string);
b34976b6 4509 ret_val = FALSE;
3765b1be 4510 }
252b5132
RH
4511 /* The regular PC-relative stuff measures from the start of
4512 the instruction rather than the end. */
3765b1be 4513 value -= 4;
252b5132
RH
4514 goto default_reloc;
4515
7793f4d0
RH
4516 case R_ALPHA_BRSGP:
4517 {
4518 int other;
4519 const char *name;
4520
4521 /* The regular PC-relative stuff measures from the start of
4522 the instruction rather than the end. */
3765b1be 4523 value -= 4;
7793f4d0 4524
ccf00ab6
RH
4525 /* The source and destination gp must be the same. Note that
4526 the source will always have an assigned gp, since we forced
4527 one in check_relocs, but that the destination may not, as
cedb70c5 4528 it might not have had any relocations at all. Also take
ccf00ab6
RH
4529 care not to crash if H is an undefined symbol. */
4530 if (h != NULL && sec != NULL
4531 && alpha_elf_tdata (sec->owner)->gotobj
7793f4d0
RH
4532 && gotobj != alpha_elf_tdata (sec->owner)->gotobj)
4533 {
7793f4d0 4534 (*_bfd_error_handler)
d003868e
AM
4535 (_("%B: change in gp: BRSGP %s"),
4536 input_bfd, h->root.root.root.string);
b34976b6 4537 ret_val = FALSE;
7793f4d0
RH
4538 }
4539
4540 /* The symbol should be marked either NOPV or STD_GPLOAD. */
4541 if (h != NULL)
4542 other = h->root.other;
4543 else
4544 other = sym->st_other;
4545 switch (other & STO_ALPHA_STD_GPLOAD)
4546 {
4547 case STO_ALPHA_NOPV:
4548 break;
4549 case STO_ALPHA_STD_GPLOAD:
64e04ecd 4550 value += 8;
7793f4d0
RH
4551 break;
4552 default:
4553 if (h != NULL)
4554 name = h->root.root.root.string;
4555 else
4556 {
4557 name = (bfd_elf_string_from_elf_section
4558 (input_bfd, symtab_hdr->sh_link, sym->st_name));
4559 if (name == NULL)
4560 name = _("<unknown>");
4561 else if (name[0] == 0)
4562 name = bfd_section_name (input_bfd, sec);
4563 }
4564 (*_bfd_error_handler)
d003868e
AM
4565 (_("%B: !samegp reloc against symbol without .prologue: %s"),
4566 input_bfd, name);
b34976b6 4567 ret_val = FALSE;
7793f4d0
RH
4568 break;
4569 }
4570
4571 goto default_reloc;
4572 }
4573
252b5132
RH
4574 case R_ALPHA_REFLONG:
4575 case R_ALPHA_REFQUAD:
3765b1be
RH
4576 case R_ALPHA_DTPREL64:
4577 case R_ALPHA_TPREL64:
252b5132 4578 {
1bbc9cec
RH
4579 long dynindx, dyntype = r_type;
4580 bfd_vma dynaddend;
252b5132
RH
4581
4582 /* Careful here to remember RELATIVE relocations for global
4583 variables for symbolic shared objects. */
4584
3765b1be 4585 if (dynamic_symbol_p)
252b5132
RH
4586 {
4587 BFD_ASSERT(h->root.dynindx != -1);
1bbc9cec
RH
4588 dynindx = h->root.dynindx;
4589 dynaddend = addend;
3765b1be
RH
4590 addend = 0, value = 0;
4591 }
4592 else if (r_type == R_ALPHA_DTPREL64)
4593 {
e1918d23 4594 BFD_ASSERT (elf_hash_table (info)->tls_sec != NULL);
3765b1be
RH
4595 value -= dtp_base;
4596 goto default_reloc;
4597 }
4598 else if (r_type == R_ALPHA_TPREL64)
4599 {
e1918d23 4600 BFD_ASSERT (elf_hash_table (info)->tls_sec != NULL);
3cbc1e5e 4601 if (!bfd_link_dll (info))
1bbc9cec
RH
4602 {
4603 value -= tp_base;
4604 goto default_reloc;
4605 }
4606 dynindx = 0;
4607 dynaddend = value - dtp_base;
252b5132 4608 }
0e1862bb 4609 else if (bfd_link_pic (info)
cf35638d 4610 && r_symndx != STN_UNDEF
d6ad34f6 4611 && (input_section->flags & SEC_ALLOC)
1d5316ab
AM
4612 && !undef_weak_ref
4613 && !(unresolved_reloc
4614 && (_bfd_elf_section_offset (output_bfd, info,
4615 input_section,
4616 rel->r_offset)
4617 == (bfd_vma) -1)))
252b5132 4618 {
3765b1be
RH
4619 if (r_type == R_ALPHA_REFLONG)
4620 {
4621 (*_bfd_error_handler)
d003868e
AM
4622 (_("%B: unhandled dynamic relocation against %s"),
4623 input_bfd,
3765b1be 4624 h->root.root.root.string);
b34976b6 4625 ret_val = FALSE;
3765b1be 4626 }
1bbc9cec
RH
4627 dynindx = 0;
4628 dyntype = R_ALPHA_RELATIVE;
4629 dynaddend = value;
252b5132
RH
4630 }
4631 else
4632 goto default_reloc;
4633
3241278a
RH
4634 if (input_section->flags & SEC_ALLOC)
4635 elf64_alpha_emit_dynrel (output_bfd, info, input_section,
4636 srel, rel->r_offset, dynindx,
4637 dyntype, dynaddend);
252b5132
RH
4638 }
4639 goto default_reloc;
4640
3765b1be 4641 case R_ALPHA_SREL16:
84de6048
RH
4642 case R_ALPHA_SREL32:
4643 case R_ALPHA_SREL64:
3765b1be
RH
4644 if (dynamic_symbol_p)
4645 {
4646 (*_bfd_error_handler)
d003868e
AM
4647 (_("%B: pc-relative relocation against dynamic symbol %s"),
4648 input_bfd, h->root.root.root.string);
b34976b6 4649 ret_val = FALSE;
3765b1be 4650 }
3cbc1e5e 4651 else if (bfd_link_pic (info)
0e1862bb 4652 && undef_weak_ref)
d6ad34f6
RH
4653 {
4654 (*_bfd_error_handler)
4655 (_("%B: pc-relative relocation against undefined weak symbol %s"),
4656 input_bfd, h->root.root.root.string);
4657 ret_val = FALSE;
4658 }
4659
3765b1be 4660
84de6048
RH
4661 /* ??? .eh_frame references to discarded sections will be smashed
4662 to relocations against SHN_UNDEF. The .eh_frame format allows
4663 NULL to be encoded as 0 in any format, so this works here. */
1d5316ab
AM
4664 if (r_symndx == STN_UNDEF
4665 || (unresolved_reloc
4666 && _bfd_elf_section_offset (output_bfd, info,
4667 input_section,
4668 rel->r_offset) == (bfd_vma) -1))
84de6048
RH
4669 howto = (elf64_alpha_howto_table
4670 + (r_type - R_ALPHA_SREL32 + R_ALPHA_REFLONG));
4671 goto default_reloc;
4672
3765b1be
RH
4673 case R_ALPHA_TLSLDM:
4674 /* Ignore the symbol for the relocation. The result is always
4675 the current module. */
4676 dynamic_symbol_p = 0;
4677 /* FALLTHRU */
4678
4679 case R_ALPHA_TLSGD:
4680 if (!gotent->reloc_done)
4681 {
4682 gotent->reloc_done = 1;
4683
4684 /* Note that the module index for the main program is 1. */
0e1862bb
L
4685 bfd_put_64 (output_bfd,
4686 !bfd_link_pic (info) && !dynamic_symbol_p,
3765b1be
RH
4687 sgot->contents + gotent->got_offset);
4688
4689 /* If the symbol has been forced local, output a
4690 DTPMOD64 reloc, otherwise it will be handled in
4691 finish_dynamic_symbol. */
0e1862bb 4692 if (bfd_link_pic (info) && !dynamic_symbol_p)
1bbc9cec
RH
4693 elf64_alpha_emit_dynrel (output_bfd, info, sgot, srelgot,
4694 gotent->got_offset, 0,
4695 R_ALPHA_DTPMOD64, 0);
3765b1be
RH
4696
4697 if (dynamic_symbol_p || r_type == R_ALPHA_TLSLDM)
4698 value = 0;
4699 else
4700 {
e1918d23 4701 BFD_ASSERT (elf_hash_table (info)->tls_sec != NULL);
3765b1be
RH
4702 value -= dtp_base;
4703 }
4704 bfd_put_64 (output_bfd, value,
4705 sgot->contents + gotent->got_offset + 8);
4706 }
4707
4708 value = (sgot->output_section->vma
4709 + sgot->output_offset
4710 + gotent->got_offset);
4711 value -= gp;
4712 goto default_reloc;
4713
4714 case R_ALPHA_DTPRELHI:
4715 case R_ALPHA_DTPRELLO:
4716 case R_ALPHA_DTPREL16:
4717 if (dynamic_symbol_p)
4718 {
4719 (*_bfd_error_handler)
d003868e
AM
4720 (_("%B: dtp-relative relocation against dynamic symbol %s"),
4721 input_bfd, h->root.root.root.string);
b34976b6 4722 ret_val = FALSE;
3765b1be 4723 }
e1918d23 4724 BFD_ASSERT (elf_hash_table (info)->tls_sec != NULL);
3765b1be 4725 value -= dtp_base;
9e756d64
RH
4726 if (r_type == R_ALPHA_DTPRELHI)
4727 value = ((bfd_signed_vma) value >> 16) + ((value >> 15) & 1);
3765b1be
RH
4728 goto default_reloc;
4729
4730 case R_ALPHA_TPRELHI:
4731 case R_ALPHA_TPRELLO:
4732 case R_ALPHA_TPREL16:
3cbc1e5e 4733 if (bfd_link_dll (info))
9e756d64
RH
4734 {
4735 (*_bfd_error_handler)
d003868e
AM
4736 (_("%B: TLS local exec code cannot be linked into shared objects"),
4737 input_bfd);
b34976b6 4738 ret_val = FALSE;
9e756d64
RH
4739 }
4740 else if (dynamic_symbol_p)
3765b1be
RH
4741 {
4742 (*_bfd_error_handler)
d003868e
AM
4743 (_("%B: tp-relative relocation against dynamic symbol %s"),
4744 input_bfd, h->root.root.root.string);
b34976b6 4745 ret_val = FALSE;
3765b1be 4746 }
e1918d23 4747 BFD_ASSERT (elf_hash_table (info)->tls_sec != NULL);
3765b1be 4748 value -= tp_base;
9e756d64
RH
4749 if (r_type == R_ALPHA_TPRELHI)
4750 value = ((bfd_signed_vma) value >> 16) + ((value >> 15) & 1);
3765b1be
RH
4751 goto default_reloc;
4752
4753 case R_ALPHA_GOTDTPREL:
4754 case R_ALPHA_GOTTPREL:
4755 BFD_ASSERT(sgot != NULL);
4756 BFD_ASSERT(gp != 0);
4757 BFD_ASSERT(gotent != NULL);
4758 BFD_ASSERT(gotent->use_count >= 1);
4759
4760 if (!gotent->reloc_done)
4761 {
4762 gotent->reloc_done = 1;
4763
4764 if (dynamic_symbol_p)
4765 value = 0;
4766 else
4767 {
e1918d23 4768 BFD_ASSERT (elf_hash_table (info)->tls_sec != NULL);
1bbc9cec
RH
4769 if (r_type == R_ALPHA_GOTDTPREL)
4770 value -= dtp_base;
0e1862bb 4771 else if (!bfd_link_pic (info))
1bbc9cec
RH
4772 value -= tp_base;
4773 else
4774 {
4775 elf64_alpha_emit_dynrel (output_bfd, info, sgot, srelgot,
4776 gotent->got_offset, 0,
4777 R_ALPHA_TPREL64,
4778 value - dtp_base);
4779 value = 0;
4780 }
3765b1be
RH
4781 }
4782 bfd_put_64 (output_bfd, value,
4783 sgot->contents + gotent->got_offset);
4784 }
4785
4786 value = (sgot->output_section->vma
4787 + sgot->output_offset
4788 + gotent->got_offset);
4789 value -= gp;
4790 goto default_reloc;
4791
252b5132
RH
4792 default:
4793 default_reloc:
4794 r = _bfd_final_link_relocate (howto, input_bfd, input_section,
3765b1be 4795 contents, rel->r_offset, value, 0);
252b5132
RH
4796 break;
4797 }
4798
4799 switch (r)
4800 {
4801 case bfd_reloc_ok:
4802 break;
4803
4804 case bfd_reloc_overflow:
4805 {
4806 const char *name;
4807
ed4de5e2
JJ
4808 /* Don't warn if the overflow is due to pc relative reloc
4809 against discarded section. Section optimization code should
4810 handle it. */
4811
4812 if (r_symndx < symtab_hdr->sh_info
4813 && sec != NULL && howto->pc_relative
dbaa2011 4814 && discarded_section (sec))
ed4de5e2
JJ
4815 break;
4816
252b5132 4817 if (h != NULL)
dfeffb9f 4818 name = NULL;
252b5132
RH
4819 else
4820 {
4821 name = (bfd_elf_string_from_elf_section
4822 (input_bfd, symtab_hdr->sh_link, sym->st_name));
4823 if (name == NULL)
b34976b6 4824 return FALSE;
252b5132
RH
4825 if (*name == '\0')
4826 name = bfd_section_name (input_bfd, sec);
4827 }
4828 if (! ((*info->callbacks->reloc_overflow)
dfeffb9f
L
4829 (info, (h ? &h->root.root : NULL), name, howto->name,
4830 (bfd_vma) 0, input_bfd, input_section,
4831 rel->r_offset)))
b34976b6 4832 ret_val = FALSE;
252b5132
RH
4833 }
4834 break;
4835
4836 default:
4837 case bfd_reloc_outofrange:
4838 abort ();
4839 }
4840 }
4841
f16fbd61 4842 return ret_val;
252b5132
RH
4843}
4844
4845/* Finish up dynamic symbol handling. We set the contents of various
4846 dynamic sections here. */
4847
b34976b6 4848static bfd_boolean
a7519a3c
RH
4849elf64_alpha_finish_dynamic_symbol (bfd *output_bfd, struct bfd_link_info *info,
4850 struct elf_link_hash_entry *h,
4851 Elf_Internal_Sym *sym)
252b5132 4852{
6ec7057a 4853 struct alpha_elf_link_hash_entry *ah = (struct alpha_elf_link_hash_entry *)h;
252b5132
RH
4854 bfd *dynobj = elf_hash_table(info)->dynobj;
4855
6ec7057a 4856 if (h->needs_plt)
252b5132
RH
4857 {
4858 /* Fill in the .plt entry for this symbol. */
4859 asection *splt, *sgot, *srel;
4860 Elf_Internal_Rela outrel;
947216bf 4861 bfd_byte *loc;
252b5132
RH
4862 bfd_vma got_addr, plt_addr;
4863 bfd_vma plt_index;
4864 struct alpha_elf_got_entry *gotent;
4865
4866 BFD_ASSERT (h->dynindx != -1);
4867
3d4d4302 4868 splt = bfd_get_linker_section (dynobj, ".plt");
252b5132 4869 BFD_ASSERT (splt != NULL);
3d4d4302 4870 srel = bfd_get_linker_section (dynobj, ".rela.plt");
252b5132 4871 BFD_ASSERT (srel != NULL);
252b5132 4872
6ec7057a
RH
4873 for (gotent = ah->got_entries; gotent ; gotent = gotent->next)
4874 if (gotent->reloc_type == R_ALPHA_LITERAL
4875 && gotent->use_count > 0)
4876 {
4877 unsigned int insn;
4878 int disp;
252b5132 4879
6ec7057a
RH
4880 sgot = alpha_elf_tdata (gotent->gotobj)->got;
4881 BFD_ASSERT (sgot != NULL);
252b5132 4882
6ec7057a
RH
4883 BFD_ASSERT (gotent->got_offset != -1);
4884 BFD_ASSERT (gotent->plt_offset != -1);
252b5132 4885
6ec7057a
RH
4886 got_addr = (sgot->output_section->vma
4887 + sgot->output_offset
4888 + gotent->got_offset);
4889 plt_addr = (splt->output_section->vma
4890 + splt->output_offset
4891 + gotent->plt_offset);
252b5132 4892
6ec7057a 4893 plt_index = (gotent->plt_offset-PLT_HEADER_SIZE) / PLT_ENTRY_SIZE;
252b5132 4894
6ec7057a
RH
4895 /* Fill in the entry in the procedure linkage table. */
4896 if (elf64_alpha_use_secureplt)
4897 {
4898 disp = (PLT_HEADER_SIZE - 4) - (gotent->plt_offset + 4);
4899 insn = INSN_AD (INSN_BR, 31, disp);
4900 bfd_put_32 (output_bfd, insn,
4901 splt->contents + gotent->plt_offset);
252b5132 4902
6ec7057a
RH
4903 plt_index = ((gotent->plt_offset - NEW_PLT_HEADER_SIZE)
4904 / NEW_PLT_ENTRY_SIZE);
4905 }
4906 else
4907 {
4908 disp = -(gotent->plt_offset + 4);
4909 insn = INSN_AD (INSN_BR, 28, disp);
4910 bfd_put_32 (output_bfd, insn,
4911 splt->contents + gotent->plt_offset);
4912 bfd_put_32 (output_bfd, INSN_UNOP,
4913 splt->contents + gotent->plt_offset + 4);
4914 bfd_put_32 (output_bfd, INSN_UNOP,
4915 splt->contents + gotent->plt_offset + 8);
4916
4917 plt_index = ((gotent->plt_offset - OLD_PLT_HEADER_SIZE)
4918 / OLD_PLT_ENTRY_SIZE);
4919 }
252b5132 4920
6ec7057a
RH
4921 /* Fill in the entry in the .rela.plt section. */
4922 outrel.r_offset = got_addr;
4923 outrel.r_info = ELF64_R_INFO(h->dynindx, R_ALPHA_JMP_SLOT);
4924 outrel.r_addend = 0;
252b5132 4925
6ec7057a
RH
4926 loc = srel->contents + plt_index * sizeof (Elf64_External_Rela);
4927 bfd_elf64_swap_reloca_out (output_bfd, &outrel, loc);
252b5132 4928
6ec7057a
RH
4929 /* Fill in the entry in the .got. */
4930 bfd_put_64 (output_bfd, plt_addr,
4931 sgot->contents + gotent->got_offset);
4932 }
252b5132
RH
4933 }
4934 else if (alpha_elf_dynamic_symbol_p (h, info))
4935 {
4936 /* Fill in the dynamic relocations for this symbol's .got entries. */
4937 asection *srel;
252b5132
RH
4938 struct alpha_elf_got_entry *gotent;
4939
3d4d4302 4940 srel = bfd_get_linker_section (dynobj, ".rela.got");
252b5132
RH
4941 BFD_ASSERT (srel != NULL);
4942
252b5132
RH
4943 for (gotent = ((struct alpha_elf_link_hash_entry *) h)->got_entries;
4944 gotent != NULL;
4945 gotent = gotent->next)
4946 {
f44f99a5 4947 asection *sgot;
1bbc9cec 4948 long r_type;
3765b1be 4949
f44f99a5
RH
4950 if (gotent->use_count == 0)
4951 continue;
4952
4953 sgot = alpha_elf_tdata (gotent->gotobj)->got;
3765b1be
RH
4954
4955 r_type = gotent->reloc_type;
4956 switch (r_type)
4957 {
4958 case R_ALPHA_LITERAL:
4959 r_type = R_ALPHA_GLOB_DAT;
4960 break;
4961 case R_ALPHA_TLSGD:
4962 r_type = R_ALPHA_DTPMOD64;
4963 break;
4964 case R_ALPHA_GOTDTPREL:
4965 r_type = R_ALPHA_DTPREL64;
4966 break;
4967 case R_ALPHA_GOTTPREL:
4968 r_type = R_ALPHA_TPREL64;
4969 break;
4970 case R_ALPHA_TLSLDM:
4971 default:
4972 abort ();
4973 }
4974
68ffbac6 4975 elf64_alpha_emit_dynrel (output_bfd, info, sgot, srel,
1bbc9cec
RH
4976 gotent->got_offset, h->dynindx,
4977 r_type, gotent->addend);
3765b1be
RH
4978
4979 if (gotent->reloc_type == R_ALPHA_TLSGD)
68ffbac6 4980 elf64_alpha_emit_dynrel (output_bfd, info, sgot, srel,
1bbc9cec
RH
4981 gotent->got_offset + 8, h->dynindx,
4982 R_ALPHA_DTPREL64, gotent->addend);
252b5132
RH
4983 }
4984 }
4985
4986 /* Mark some specially defined symbols as absolute. */
9637f6ef 4987 if (h == elf_hash_table (info)->hdynamic
22edb2f1
RS
4988 || h == elf_hash_table (info)->hgot
4989 || h == elf_hash_table (info)->hplt)
252b5132
RH
4990 sym->st_shndx = SHN_ABS;
4991
b34976b6 4992 return TRUE;
252b5132
RH
4993}
4994
4995/* Finish up the dynamic sections. */
4996
b34976b6 4997static bfd_boolean
a7519a3c
RH
4998elf64_alpha_finish_dynamic_sections (bfd *output_bfd,
4999 struct bfd_link_info *info)
252b5132
RH
5000{
5001 bfd *dynobj;
5002 asection *sdyn;
5003
5004 dynobj = elf_hash_table (info)->dynobj;
3d4d4302 5005 sdyn = bfd_get_linker_section (dynobj, ".dynamic");
252b5132
RH
5006
5007 if (elf_hash_table (info)->dynamic_sections_created)
5008 {
6ec7057a 5009 asection *splt, *sgotplt, *srelaplt;
252b5132 5010 Elf64_External_Dyn *dyncon, *dynconend;
6ec7057a 5011 bfd_vma plt_vma, gotplt_vma;
252b5132 5012
3d4d4302
AM
5013 splt = bfd_get_linker_section (dynobj, ".plt");
5014 srelaplt = bfd_get_linker_section (output_bfd, ".rela.plt");
252b5132
RH
5015 BFD_ASSERT (splt != NULL && sdyn != NULL);
5016
6ec7057a
RH
5017 plt_vma = splt->output_section->vma + splt->output_offset;
5018
5019 gotplt_vma = 0;
5020 if (elf64_alpha_use_secureplt)
5021 {
3d4d4302 5022 sgotplt = bfd_get_linker_section (dynobj, ".got.plt");
6ec7057a
RH
5023 BFD_ASSERT (sgotplt != NULL);
5024 if (sgotplt->size > 0)
5025 gotplt_vma = sgotplt->output_section->vma + sgotplt->output_offset;
5026 }
5027
252b5132 5028 dyncon = (Elf64_External_Dyn *) sdyn->contents;
eea6121a 5029 dynconend = (Elf64_External_Dyn *) (sdyn->contents + sdyn->size);
252b5132
RH
5030 for (; dyncon < dynconend; dyncon++)
5031 {
5032 Elf_Internal_Dyn dyn;
252b5132
RH
5033
5034 bfd_elf64_swap_dyn_in (dynobj, dyncon, &dyn);
5035
5036 switch (dyn.d_tag)
5037 {
5038 case DT_PLTGOT:
6ec7057a
RH
5039 dyn.d_un.d_ptr
5040 = elf64_alpha_use_secureplt ? gotplt_vma : plt_vma;
5041 break;
252b5132 5042 case DT_PLTRELSZ:
6ec7057a
RH
5043 dyn.d_un.d_val = srelaplt ? srelaplt->size : 0;
5044 break;
252b5132 5045 case DT_JMPREL:
6ec7057a
RH
5046 dyn.d_un.d_ptr = srelaplt ? srelaplt->vma : 0;
5047 break;
252b5132
RH
5048
5049 case DT_RELASZ:
5050 /* My interpretation of the TIS v1.1 ELF document indicates
5051 that RELASZ should not include JMPREL. This is not what
5052 the rest of the BFD does. It is, however, what the
5053 glibc ld.so wants. Do this fixup here until we found
5054 out who is right. */
6ec7057a
RH
5055 if (srelaplt)
5056 dyn.d_un.d_val -= srelaplt->size;
252b5132
RH
5057 break;
5058 }
5059
5060 bfd_elf64_swap_dyn_out (output_bfd, &dyn, dyncon);
5061 }
5062
6ec7057a 5063 /* Initialize the plt header. */
eea6121a 5064 if (splt->size > 0)
252b5132 5065 {
6ec7057a
RH
5066 unsigned int insn;
5067 int ofs;
5068
5069 if (elf64_alpha_use_secureplt)
5070 {
5071 ofs = gotplt_vma - (plt_vma + PLT_HEADER_SIZE);
5072
5073 insn = INSN_ABC (INSN_SUBQ, 27, 28, 25);
5074 bfd_put_32 (output_bfd, insn, splt->contents);
5075
5076 insn = INSN_ABO (INSN_LDAH, 28, 28, (ofs + 0x8000) >> 16);
5077 bfd_put_32 (output_bfd, insn, splt->contents + 4);
5078
5079 insn = INSN_ABC (INSN_S4SUBQ, 25, 25, 25);
5080 bfd_put_32 (output_bfd, insn, splt->contents + 8);
5081
5082 insn = INSN_ABO (INSN_LDA, 28, 28, ofs);
5083 bfd_put_32 (output_bfd, insn, splt->contents + 12);
5084
5085 insn = INSN_ABO (INSN_LDQ, 27, 28, 0);
5086 bfd_put_32 (output_bfd, insn, splt->contents + 16);
5087
5088 insn = INSN_ABC (INSN_ADDQ, 25, 25, 25);
5089 bfd_put_32 (output_bfd, insn, splt->contents + 20);
5090
5091 insn = INSN_ABO (INSN_LDQ, 28, 28, 8);
5092 bfd_put_32 (output_bfd, insn, splt->contents + 24);
5093
5094 insn = INSN_AB (INSN_JMP, 31, 27);
5095 bfd_put_32 (output_bfd, insn, splt->contents + 28);
5096
5097 insn = INSN_AD (INSN_BR, 28, -PLT_HEADER_SIZE);
5098 bfd_put_32 (output_bfd, insn, splt->contents + 32);
5099 }
5100 else
5101 {
5102 insn = INSN_AD (INSN_BR, 27, 0); /* br $27, .+4 */
5103 bfd_put_32 (output_bfd, insn, splt->contents);
5104
5105 insn = INSN_ABO (INSN_LDQ, 27, 27, 12);
5106 bfd_put_32 (output_bfd, insn, splt->contents + 4);
5107
5108 insn = INSN_UNOP;
5109 bfd_put_32 (output_bfd, insn, splt->contents + 8);
5110
5111 insn = INSN_AB (INSN_JMP, 27, 27);
5112 bfd_put_32 (output_bfd, insn, splt->contents + 12);
5113
5114 /* The next two words will be filled in by ld.so. */
5115 bfd_put_64 (output_bfd, 0, splt->contents + 16);
5116 bfd_put_64 (output_bfd, 0, splt->contents + 24);
5117 }
252b5132 5118
eecdbe52 5119 elf_section_data (splt->output_section)->this_hdr.sh_entsize = 0;
252b5132
RH
5120 }
5121 }
5122
b34976b6 5123 return TRUE;
252b5132
RH
5124}
5125
96e2734b
RH
5126/* We need to use a special link routine to handle the .mdebug section.
5127 We need to merge all instances of these sections together, not write
5128 them all out sequentially. */
252b5132 5129
b34976b6 5130static bfd_boolean
a7519a3c 5131elf64_alpha_final_link (bfd *abfd, struct bfd_link_info *info)
252b5132
RH
5132{
5133 asection *o;
5134 struct bfd_link_order *p;
96e2734b 5135 asection *mdebug_sec;
252b5132
RH
5136 struct ecoff_debug_info debug;
5137 const struct ecoff_debug_swap *swap
5138 = get_elf_backend_data (abfd)->elf_backend_ecoff_debug_swap;
5139 HDRR *symhdr = &debug.symbolic_header;
4dfe6ac6
NC
5140 void * mdebug_handle = NULL;
5141 struct alpha_elf_link_hash_table * htab;
5142
5143 htab = alpha_elf_hash_table (info);
5144 if (htab == NULL)
5145 return FALSE;
252b5132 5146
96e2734b 5147 /* Go through the sections and collect the mdebug information. */
252b5132 5148 mdebug_sec = NULL;
252b5132
RH
5149 for (o = abfd->sections; o != (asection *) NULL; o = o->next)
5150 {
252b5132
RH
5151 if (strcmp (o->name, ".mdebug") == 0)
5152 {
5153 struct extsym_info einfo;
5154
5155 /* We have found the .mdebug section in the output file.
5156 Look through all the link_orders comprising it and merge
5157 the information together. */
5158 symhdr->magic = swap->sym_magic;
5159 /* FIXME: What should the version stamp be? */
5160 symhdr->vstamp = 0;
5161 symhdr->ilineMax = 0;
5162 symhdr->cbLine = 0;
5163 symhdr->idnMax = 0;
5164 symhdr->ipdMax = 0;
5165 symhdr->isymMax = 0;
5166 symhdr->ioptMax = 0;
5167 symhdr->iauxMax = 0;
5168 symhdr->issMax = 0;
5169 symhdr->issExtMax = 0;
5170 symhdr->ifdMax = 0;
5171 symhdr->crfd = 0;
5172 symhdr->iextMax = 0;
5173
5174 /* We accumulate the debugging information itself in the
5175 debug_info structure. */
5176 debug.line = NULL;
5177 debug.external_dnr = NULL;
5178 debug.external_pdr = NULL;
5179 debug.external_sym = NULL;
5180 debug.external_opt = NULL;
5181 debug.external_aux = NULL;
5182 debug.ss = NULL;
5183 debug.ssext = debug.ssext_end = NULL;
5184 debug.external_fdr = NULL;
5185 debug.external_rfd = NULL;
5186 debug.external_ext = debug.external_ext_end = NULL;
5187
5188 mdebug_handle = bfd_ecoff_debug_init (abfd, &debug, swap, info);
2c3fc389 5189 if (mdebug_handle == NULL)
b34976b6 5190 return FALSE;
252b5132
RH
5191
5192 if (1)
5193 {
5194 asection *s;
5195 EXTR esym;
52b9d213 5196 bfd_vma last = 0;
252b5132
RH
5197 unsigned int i;
5198 static const char * const name[] =
5199 {
5200 ".text", ".init", ".fini", ".data",
5201 ".rodata", ".sdata", ".sbss", ".bss"
5202 };
5203 static const int sc[] = { scText, scInit, scFini, scData,
5204 scRData, scSData, scSBss, scBss };
5205
5206 esym.jmptbl = 0;
5207 esym.cobol_main = 0;
5208 esym.weakext = 0;
5209 esym.reserved = 0;
5210 esym.ifd = ifdNil;
5211 esym.asym.iss = issNil;
5212 esym.asym.st = stLocal;
5213 esym.asym.reserved = 0;
5214 esym.asym.index = indexNil;
5215 for (i = 0; i < 8; i++)
5216 {
5217 esym.asym.sc = sc[i];
5218 s = bfd_get_section_by_name (abfd, name[i]);
5219 if (s != NULL)
5220 {
5221 esym.asym.value = s->vma;
eea6121a 5222 last = s->vma + s->size;
252b5132
RH
5223 }
5224 else
5225 esym.asym.value = last;
5226
5227 if (! bfd_ecoff_debug_one_external (abfd, &debug, swap,
5228 name[i], &esym))
b34976b6 5229 return FALSE;
252b5132
RH
5230 }
5231 }
5232
8423293d 5233 for (p = o->map_head.link_order;
252b5132
RH
5234 p != (struct bfd_link_order *) NULL;
5235 p = p->next)
5236 {
5237 asection *input_section;
5238 bfd *input_bfd;
5239 const struct ecoff_debug_swap *input_swap;
5240 struct ecoff_debug_info input_debug;
5241 char *eraw_src;
5242 char *eraw_end;
5243
5244 if (p->type != bfd_indirect_link_order)
5245 {
fd96f80f 5246 if (p->type == bfd_data_link_order)
252b5132
RH
5247 continue;
5248 abort ();
5249 }
5250
5251 input_section = p->u.indirect.section;
5252 input_bfd = input_section->owner;
5253
0ffa91dd
NC
5254 if (! is_alpha_elf (input_bfd))
5255 /* I don't know what a non ALPHA ELF bfd would be
5256 doing with a .mdebug section, but I don't really
5257 want to deal with it. */
5258 continue;
252b5132
RH
5259
5260 input_swap = (get_elf_backend_data (input_bfd)
5261 ->elf_backend_ecoff_debug_swap);
5262
eea6121a 5263 BFD_ASSERT (p->size == input_section->size);
252b5132
RH
5264
5265 /* The ECOFF linking code expects that we have already
5266 read in the debugging information and set up an
5267 ecoff_debug_info structure, so we do that now. */
5268 if (!elf64_alpha_read_ecoff_info (input_bfd, input_section,
5269 &input_debug))
b34976b6 5270 return FALSE;
252b5132
RH
5271
5272 if (! (bfd_ecoff_debug_accumulate
5273 (mdebug_handle, abfd, &debug, swap, input_bfd,
5274 &input_debug, input_swap, info)))
b34976b6 5275 return FALSE;
252b5132
RH
5276
5277 /* Loop through the external symbols. For each one with
5278 interesting information, try to find the symbol in
5279 the linker global hash table and save the information
5280 for the output external symbols. */
21d799b5 5281 eraw_src = (char *) input_debug.external_ext;
252b5132
RH
5282 eraw_end = (eraw_src
5283 + (input_debug.symbolic_header.iextMax
5284 * input_swap->external_ext_size));
5285 for (;
5286 eraw_src < eraw_end;
5287 eraw_src += input_swap->external_ext_size)
5288 {
5289 EXTR ext;
5290 const char *name;
5291 struct alpha_elf_link_hash_entry *h;
5292
2c3fc389 5293 (*input_swap->swap_ext_in) (input_bfd, eraw_src, &ext);
252b5132
RH
5294 if (ext.asym.sc == scNil
5295 || ext.asym.sc == scUndefined
5296 || ext.asym.sc == scSUndefined)
5297 continue;
5298
5299 name = input_debug.ssext + ext.asym.iss;
4dfe6ac6 5300 h = alpha_elf_link_hash_lookup (htab, name, FALSE, FALSE, TRUE);
252b5132
RH
5301 if (h == NULL || h->esym.ifd != -2)
5302 continue;
5303
5304 if (ext.ifd != -1)
5305 {
5306 BFD_ASSERT (ext.ifd
5307 < input_debug.symbolic_header.ifdMax);
5308 ext.ifd = input_debug.ifdmap[ext.ifd];
5309 }
5310
5311 h->esym = ext;
5312 }
5313
5314 /* Free up the information we just read. */
5315 free (input_debug.line);
5316 free (input_debug.external_dnr);
5317 free (input_debug.external_pdr);
5318 free (input_debug.external_sym);
5319 free (input_debug.external_opt);
5320 free (input_debug.external_aux);
5321 free (input_debug.ss);
5322 free (input_debug.ssext);
5323 free (input_debug.external_fdr);
5324 free (input_debug.external_rfd);
5325 free (input_debug.external_ext);
5326
5327 /* Hack: reset the SEC_HAS_CONTENTS flag so that
5328 elf_link_input_bfd ignores this section. */
5329 input_section->flags &=~ SEC_HAS_CONTENTS;
5330 }
5331
252b5132
RH
5332 /* Build the external symbol information. */
5333 einfo.abfd = abfd;
5334 einfo.info = info;
5335 einfo.debug = &debug;
5336 einfo.swap = swap;
b34976b6 5337 einfo.failed = FALSE;
252b5132
RH
5338 elf_link_hash_traverse (elf_hash_table (info),
5339 elf64_alpha_output_extsym,
2c3fc389 5340 &einfo);
252b5132 5341 if (einfo.failed)
b34976b6 5342 return FALSE;
252b5132
RH
5343
5344 /* Set the size of the .mdebug section. */
eea6121a 5345 o->size = bfd_ecoff_debug_size (abfd, &debug, swap);
252b5132
RH
5346
5347 /* Skip this section later on (I don't think this currently
5348 matters, but someday it might). */
8423293d 5349 o->map_head.link_order = (struct bfd_link_order *) NULL;
252b5132
RH
5350
5351 mdebug_sec = o;
5352 }
252b5132
RH
5353 }
5354
5355 /* Invoke the regular ELF backend linker to do all the work. */
c152c796 5356 if (! bfd_elf_final_link (abfd, info))
b34976b6 5357 return FALSE;
252b5132
RH
5358
5359 /* Now write out the computed sections. */
5360
5361 /* The .got subsections... */
5362 {
5363 bfd *i, *dynobj = elf_hash_table(info)->dynobj;
4dfe6ac6 5364 for (i = htab->got_list;
252b5132
RH
5365 i != NULL;
5366 i = alpha_elf_tdata(i)->got_link_next)
5367 {
5368 asection *sgot;
5369
5370 /* elf_bfd_final_link already did everything in dynobj. */
5371 if (i == dynobj)
5372 continue;
5373
5374 sgot = alpha_elf_tdata(i)->got;
5375 if (! bfd_set_section_contents (abfd, sgot->output_section,
dc810e39
AM
5376 sgot->contents,
5377 (file_ptr) sgot->output_offset,
eea6121a 5378 sgot->size))
b34976b6 5379 return FALSE;
252b5132
RH
5380 }
5381 }
5382
252b5132
RH
5383 if (mdebug_sec != (asection *) NULL)
5384 {
5385 BFD_ASSERT (abfd->output_has_begun);
5386 if (! bfd_ecoff_write_accumulated_debug (mdebug_handle, abfd, &debug,
5387 swap, info,
5388 mdebug_sec->filepos))
b34976b6 5389 return FALSE;
252b5132
RH
5390
5391 bfd_ecoff_debug_free (mdebug_handle, abfd, &debug, swap, info);
5392 }
5393
b34976b6 5394 return TRUE;
252b5132 5395}
fcfbdf31
JJ
5396
5397static enum elf_reloc_type_class
7e612e98
AM
5398elf64_alpha_reloc_type_class (const struct bfd_link_info *info ATTRIBUTE_UNUSED,
5399 const asection *rel_sec ATTRIBUTE_UNUSED,
5400 const Elf_Internal_Rela *rela)
fcfbdf31 5401{
f51e552e 5402 switch ((int) ELF64_R_TYPE (rela->r_info))
fcfbdf31
JJ
5403 {
5404 case R_ALPHA_RELATIVE:
5405 return reloc_class_relative;
5406 case R_ALPHA_JMP_SLOT:
5407 return reloc_class_plt;
5408 case R_ALPHA_COPY:
5409 return reloc_class_copy;
5410 default:
5411 return reloc_class_normal;
5412 }
5413}
252b5132 5414\f
b35d266b 5415static const struct bfd_elf_special_section elf64_alpha_special_sections[] =
2f89ff8d 5416{
0112cd26
NC
5417 { STRING_COMMA_LEN (".sbss"), -2, SHT_NOBITS, SHF_ALLOC + SHF_WRITE + SHF_ALPHA_GPREL },
5418 { STRING_COMMA_LEN (".sdata"), -2, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE + SHF_ALPHA_GPREL },
5419 { NULL, 0, 0, 0, 0 }
2f89ff8d
L
5420};
5421
252b5132
RH
5422/* ECOFF swapping routines. These are used when dealing with the
5423 .mdebug section, which is in the ECOFF debugging format. Copied
fe8bc63d 5424 from elf32-mips.c. */
252b5132
RH
5425static const struct ecoff_debug_swap
5426elf64_alpha_ecoff_debug_swap =
5427{
5428 /* Symbol table magic number. */
5429 magicSym2,
5430 /* Alignment of debugging information. E.g., 4. */
5431 8,
5432 /* Sizes of external symbolic information. */
5433 sizeof (struct hdr_ext),
5434 sizeof (struct dnr_ext),
5435 sizeof (struct pdr_ext),
5436 sizeof (struct sym_ext),
5437 sizeof (struct opt_ext),
5438 sizeof (struct fdr_ext),
5439 sizeof (struct rfd_ext),
5440 sizeof (struct ext_ext),
5441 /* Functions to swap in external symbolic data. */
5442 ecoff_swap_hdr_in,
5443 ecoff_swap_dnr_in,
5444 ecoff_swap_pdr_in,
5445 ecoff_swap_sym_in,
5446 ecoff_swap_opt_in,
5447 ecoff_swap_fdr_in,
5448 ecoff_swap_rfd_in,
5449 ecoff_swap_ext_in,
5450 _bfd_ecoff_swap_tir_in,
5451 _bfd_ecoff_swap_rndx_in,
5452 /* Functions to swap out external symbolic data. */
5453 ecoff_swap_hdr_out,
5454 ecoff_swap_dnr_out,
5455 ecoff_swap_pdr_out,
5456 ecoff_swap_sym_out,
5457 ecoff_swap_opt_out,
5458 ecoff_swap_fdr_out,
5459 ecoff_swap_rfd_out,
5460 ecoff_swap_ext_out,
5461 _bfd_ecoff_swap_tir_out,
5462 _bfd_ecoff_swap_rndx_out,
5463 /* Function to read in symbolic data. */
5464 elf64_alpha_read_ecoff_info
5465};
5466\f
70bcb145
JW
5467/* Use a non-standard hash bucket size of 8. */
5468
562ace6b 5469static const struct elf_size_info alpha_elf_size_info =
70bcb145
JW
5470{
5471 sizeof (Elf64_External_Ehdr),
5472 sizeof (Elf64_External_Phdr),
5473 sizeof (Elf64_External_Shdr),
5474 sizeof (Elf64_External_Rel),
5475 sizeof (Elf64_External_Rela),
5476 sizeof (Elf64_External_Sym),
5477 sizeof (Elf64_External_Dyn),
5478 sizeof (Elf_External_Note),
5479 8,
5480 1,
45d6a902 5481 64, 3,
70bcb145
JW
5482 ELFCLASS64, EV_CURRENT,
5483 bfd_elf64_write_out_phdrs,
5484 bfd_elf64_write_shdrs_and_ehdr,
1489a3a0 5485 bfd_elf64_checksum_contents,
70bcb145 5486 bfd_elf64_write_relocs,
73ff0d56 5487 bfd_elf64_swap_symbol_in,
70bcb145
JW
5488 bfd_elf64_swap_symbol_out,
5489 bfd_elf64_slurp_reloc_table,
5490 bfd_elf64_slurp_symbol_table,
5491 bfd_elf64_swap_dyn_in,
5492 bfd_elf64_swap_dyn_out,
947216bf
AM
5493 bfd_elf64_swap_reloc_in,
5494 bfd_elf64_swap_reloc_out,
5495 bfd_elf64_swap_reloca_in,
5496 bfd_elf64_swap_reloca_out
70bcb145
JW
5497};
5498
6d00b590 5499#define TARGET_LITTLE_SYM alpha_elf64_vec
252b5132
RH
5500#define TARGET_LITTLE_NAME "elf64-alpha"
5501#define ELF_ARCH bfd_arch_alpha
ae95ffa6 5502#define ELF_TARGET_ID ALPHA_ELF_DATA
56fc028e
AJ
5503#define ELF_MACHINE_CODE EM_ALPHA
5504#define ELF_MAXPAGESIZE 0x10000
24718e3b 5505#define ELF_COMMONPAGESIZE 0x2000
252b5132
RH
5506
5507#define bfd_elf64_bfd_link_hash_table_create \
5508 elf64_alpha_bfd_link_hash_table_create
5509
5510#define bfd_elf64_bfd_reloc_type_lookup \
5511 elf64_alpha_bfd_reloc_type_lookup
157090f7
AM
5512#define bfd_elf64_bfd_reloc_name_lookup \
5513 elf64_alpha_bfd_reloc_name_lookup
252b5132
RH
5514#define elf_info_to_howto \
5515 elf64_alpha_info_to_howto
5516
5517#define bfd_elf64_mkobject \
5518 elf64_alpha_mkobject
5519#define elf_backend_object_p \
5520 elf64_alpha_object_p
5521
5522#define elf_backend_section_from_shdr \
5523 elf64_alpha_section_from_shdr
204692d7
RH
5524#define elf_backend_section_flags \
5525 elf64_alpha_section_flags
252b5132
RH
5526#define elf_backend_fake_sections \
5527 elf64_alpha_fake_sections
5528
5529#define bfd_elf64_bfd_is_local_label_name \
5530 elf64_alpha_is_local_label_name
5531#define bfd_elf64_find_nearest_line \
5532 elf64_alpha_find_nearest_line
5533#define bfd_elf64_bfd_relax_section \
5534 elf64_alpha_relax_section
5535
5536#define elf_backend_add_symbol_hook \
5537 elf64_alpha_add_symbol_hook
13285a1b
AM
5538#define elf_backend_relocs_compatible \
5539 _bfd_elf_relocs_compatible
6fc5bb57
AM
5540#define elf_backend_sort_relocs_p \
5541 elf64_alpha_sort_relocs_p
252b5132
RH
5542#define elf_backend_check_relocs \
5543 elf64_alpha_check_relocs
5544#define elf_backend_create_dynamic_sections \
5545 elf64_alpha_create_dynamic_sections
5546#define elf_backend_adjust_dynamic_symbol \
5547 elf64_alpha_adjust_dynamic_symbol
747ffa7b
AM
5548#define elf_backend_merge_symbol_attribute \
5549 elf64_alpha_merge_symbol_attribute
48f4b4f5
RH
5550#define elf_backend_copy_indirect_symbol \
5551 elf64_alpha_copy_indirect_symbol
252b5132
RH
5552#define elf_backend_always_size_sections \
5553 elf64_alpha_always_size_sections
5554#define elf_backend_size_dynamic_sections \
5555 elf64_alpha_size_dynamic_sections
74541ad4
AM
5556#define elf_backend_omit_section_dynsym \
5557 ((bfd_boolean (*) (bfd *, struct bfd_link_info *, asection *)) bfd_true)
252b5132
RH
5558#define elf_backend_relocate_section \
5559 elf64_alpha_relocate_section
5560#define elf_backend_finish_dynamic_symbol \
5561 elf64_alpha_finish_dynamic_symbol
5562#define elf_backend_finish_dynamic_sections \
5563 elf64_alpha_finish_dynamic_sections
5564#define bfd_elf64_bfd_final_link \
5565 elf64_alpha_final_link
fcfbdf31
JJ
5566#define elf_backend_reloc_type_class \
5567 elf64_alpha_reloc_type_class
252b5132 5568
e117360e
RH
5569#define elf_backend_can_gc_sections 1
5570#define elf_backend_gc_mark_hook elf64_alpha_gc_mark_hook
5571#define elf_backend_gc_sweep_hook elf64_alpha_gc_sweep_hook
5572
252b5132
RH
5573#define elf_backend_ecoff_debug_swap \
5574 &elf64_alpha_ecoff_debug_swap
5575
70bcb145
JW
5576#define elf_backend_size_info \
5577 alpha_elf_size_info
5578
29ef7005
L
5579#define elf_backend_special_sections \
5580 elf64_alpha_special_sections
2f89ff8d 5581
38b1a46c 5582/* A few constants that determine how the .plt section is set up. */
252b5132
RH
5583#define elf_backend_want_got_plt 0
5584#define elf_backend_plt_readonly 0
5585#define elf_backend_want_plt_sym 1
5586#define elf_backend_got_header_size 0
252b5132
RH
5587
5588#include "elf64-target.h"
2238051f
RH
5589\f
5590/* FreeBSD support. */
5591
5592#undef TARGET_LITTLE_SYM
6d00b590 5593#define TARGET_LITTLE_SYM alpha_elf64_fbsd_vec
2238051f
RH
5594#undef TARGET_LITTLE_NAME
5595#define TARGET_LITTLE_NAME "elf64-alpha-freebsd"
d1036acb
L
5596#undef ELF_OSABI
5597#define ELF_OSABI ELFOSABI_FREEBSD
2238051f
RH
5598
5599/* The kernel recognizes executables as valid only if they carry a
5600 "FreeBSD" label in the ELF header. So we put this label on all
5601 executables and (for simplicity) also all other object files. */
5602
2238051f 5603static void
a7519a3c
RH
5604elf64_alpha_fbsd_post_process_headers (bfd * abfd,
5605 struct bfd_link_info * link_info ATTRIBUTE_UNUSED)
2238051f
RH
5606{
5607 Elf_Internal_Ehdr * i_ehdrp; /* ELF file header, internal form. */
5608
5609 i_ehdrp = elf_elfheader (abfd);
5610
5611 /* Put an ABI label supported by FreeBSD >= 4.1. */
d1036acb 5612 i_ehdrp->e_ident[EI_OSABI] = get_elf_backend_data (abfd)->elf_osabi;
2238051f
RH
5613#ifdef OLD_FREEBSD_ABI_LABEL
5614 /* The ABI label supported by FreeBSD <= 4.0 is quite nonstandard. */
5615 memcpy (&i_ehdrp->e_ident[EI_ABIVERSION], "FreeBSD", 8);
5616#endif
5617}
5618
5619#undef elf_backend_post_process_headers
5620#define elf_backend_post_process_headers \
5621 elf64_alpha_fbsd_post_process_headers
5622
571fe01f 5623#undef elf64_bed
2238051f
RH
5624#define elf64_bed elf64_alpha_fbsd_bed
5625
5626#include "elf64-target.h"