]> git.ipfire.org Git - thirdparty/binutils-gdb.git/blame - bfd/elf64-alpha.c
elf bfd.h tidy
[thirdparty/binutils-gdb.git] / bfd / elf64-alpha.c
CommitLineData
252b5132 1/* Alpha specific support for 64-bit ELF
82704155 2 Copyright (C) 1996-2019 Free Software Foundation, Inc.
252b5132
RH
3 Contributed by Richard Henderson <rth@tamu.edu>.
4
571fe01f 5 This file is part of BFD, the Binary File Descriptor library.
252b5132 6
571fe01f
NC
7 This program is free software; you can redistribute it and/or modify
8 it under the terms of the GNU General Public License as published by
cd123cb7 9 the Free Software Foundation; either version 3 of the License, or
571fe01f 10 (at your option) any later version.
252b5132 11
571fe01f
NC
12 This program is distributed in the hope that it will be useful,
13 but WITHOUT ANY WARRANTY; without even the implied warranty of
14 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 GNU General Public License for more details.
252b5132 16
571fe01f
NC
17 You should have received a copy of the GNU General Public License
18 along with this program; if not, write to the Free Software
cd123cb7
NC
19 Foundation, Inc., 51 Franklin Street - Fifth Floor, Boston,
20 MA 02110-1301, USA. */
21
252b5132
RH
22
23/* We need a published ABI spec for this. Until one comes out, don't
24 assume this'll remain unchanged forever. */
25
252b5132 26#include "sysdep.h"
3db64b00 27#include "bfd.h"
252b5132
RH
28#include "libbfd.h"
29#include "elf-bfd.h"
30
31#include "elf/alpha.h"
32
33#define ALPHAECOFF
34
35#define NO_COFF_RELOCS
36#define NO_COFF_SYMBOLS
37#define NO_COFF_LINENOS
38
fe8bc63d 39/* Get the ECOFF swapping routines. Needed for the debug information. */
252b5132
RH
40#include "coff/internal.h"
41#include "coff/sym.h"
42#include "coff/symconst.h"
43#include "coff/ecoff.h"
44#include "coff/alpha.h"
45#include "aout/ar.h"
46#include "libcoff.h"
47#include "libecoff.h"
48#define ECOFF_64
49#include "ecoffswap.h"
50
6ec7057a
RH
51\f
52/* Instruction data for plt generation and relaxation. */
53
54#define OP_LDA 0x08
55#define OP_LDAH 0x09
56#define OP_LDQ 0x29
57#define OP_BR 0x30
58#define OP_BSR 0x34
59
60#define INSN_LDA (OP_LDA << 26)
61#define INSN_LDAH (OP_LDAH << 26)
62#define INSN_LDQ (OP_LDQ << 26)
63#define INSN_BR (OP_BR << 26)
64
65#define INSN_ADDQ 0x40000400
66#define INSN_RDUNIQ 0x0000009e
67#define INSN_SUBQ 0x40000520
68#define INSN_S4SUBQ 0x40000560
69#define INSN_UNOP 0x2ffe0000
70
71#define INSN_JSR 0x68004000
72#define INSN_JMP 0x68000000
73#define INSN_JSR_MASK 0xfc00c000
74
75#define INSN_A(I,A) (I | (A << 21))
76#define INSN_AB(I,A,B) (I | (A << 21) | (B << 16))
77#define INSN_ABC(I,A,B,C) (I | (A << 21) | (B << 16) | C)
78#define INSN_ABO(I,A,B,O) (I | (A << 21) | (B << 16) | ((O) & 0xffff))
79#define INSN_AD(I,A,D) (I | (A << 21) | (((D) >> 2) & 0x1fffff))
80
81/* PLT/GOT Stuff */
82
83/* Set by ld emulation. Putting this into the link_info or hash structure
84 is simply working too hard. */
85#ifdef USE_SECUREPLT
86bfd_boolean elf64_alpha_use_secureplt = TRUE;
87#else
88bfd_boolean elf64_alpha_use_secureplt = FALSE;
89#endif
90
91#define OLD_PLT_HEADER_SIZE 32
92#define OLD_PLT_ENTRY_SIZE 12
93#define NEW_PLT_HEADER_SIZE 36
94#define NEW_PLT_ENTRY_SIZE 4
95
96#define PLT_HEADER_SIZE \
97 (elf64_alpha_use_secureplt ? NEW_PLT_HEADER_SIZE : OLD_PLT_HEADER_SIZE)
98#define PLT_ENTRY_SIZE \
99 (elf64_alpha_use_secureplt ? NEW_PLT_ENTRY_SIZE : OLD_PLT_ENTRY_SIZE)
100
101#define MAX_GOT_SIZE (64*1024)
102
103#define ELF_DYNAMIC_INTERPRETER "/usr/lib/ld.so"
252b5132 104\f
21d799b5
NC
105
106/* Used to implement multiple .got subsections. */
107struct alpha_elf_got_entry
108{
109 struct alpha_elf_got_entry *next;
110
111 /* Which .got subsection? */
112 bfd *gotobj;
113
114 /* The addend in effect for this entry. */
115 bfd_vma addend;
116
117 /* The .got offset for this entry. */
118 int got_offset;
119
120 /* The .plt offset for this entry. */
121 int plt_offset;
122
123 /* How many references to this entry? */
124 int use_count;
125
126 /* The relocation type of this entry. */
127 unsigned char reloc_type;
128
129 /* How a LITERAL is used. */
130 unsigned char flags;
131
132 /* Have we initialized the dynamic relocation for this entry? */
133 unsigned char reloc_done;
134
135 /* Have we adjusted this entry for SEC_MERGE? */
136 unsigned char reloc_xlated;
137};
138
139struct alpha_elf_reloc_entry
140{
141 struct alpha_elf_reloc_entry *next;
142
143 /* Which .reloc section? */
144 asection *srel;
145
146 /* What kind of relocation? */
147 unsigned int rtype;
148
149 /* Is this against read-only section? */
150 unsigned int reltext : 1;
151
152 /* How many did we find? */
153 unsigned long count;
154};
155
252b5132
RH
156struct alpha_elf_link_hash_entry
157{
158 struct elf_link_hash_entry root;
159
160 /* External symbol information. */
161 EXTR esym;
162
163 /* Cumulative flags for all the .got entries. */
164 int flags;
165
9e756d64 166 /* Contexts in which a literal was referenced. */
8288a39e
RH
167#define ALPHA_ELF_LINK_HASH_LU_ADDR 0x01
168#define ALPHA_ELF_LINK_HASH_LU_MEM 0x02
169#define ALPHA_ELF_LINK_HASH_LU_BYTE 0x04
170#define ALPHA_ELF_LINK_HASH_LU_JSR 0x08
171#define ALPHA_ELF_LINK_HASH_LU_TLSGD 0x10
172#define ALPHA_ELF_LINK_HASH_LU_TLSLDM 0x20
173#define ALPHA_ELF_LINK_HASH_LU_JSRDIRECT 0x40
174#define ALPHA_ELF_LINK_HASH_LU_PLT 0x38
175#define ALPHA_ELF_LINK_HASH_TLS_IE 0x80
cc03ec80 176
252b5132 177 /* Used to implement multiple .got subsections. */
21d799b5 178 struct alpha_elf_got_entry *got_entries;
252b5132 179
571fe01f 180 /* Used to count non-got, non-plt relocations for delayed sizing
252b5132 181 of relocation sections. */
21d799b5 182 struct alpha_elf_reloc_entry *reloc_entries;
252b5132
RH
183};
184
185/* Alpha ELF linker hash table. */
186
187struct alpha_elf_link_hash_table
188{
189 struct elf_link_hash_table root;
190
191 /* The head of a list of .got subsections linked through
192 alpha_elf_tdata(abfd)->got_link_next. */
193 bfd *got_list;
4a828aab
RH
194
195 /* The most recent relax pass that we've seen. The GOTs
196 should be regenerated if this doesn't match. */
197 int relax_trip;
252b5132
RH
198};
199
200/* Look up an entry in a Alpha ELF linker hash table. */
201
202#define alpha_elf_link_hash_lookup(table, string, create, copy, follow) \
203 ((struct alpha_elf_link_hash_entry *) \
204 elf_link_hash_lookup (&(table)->root, (string), (create), \
205 (copy), (follow)))
206
207/* Traverse a Alpha ELF linker hash table. */
208
209#define alpha_elf_link_hash_traverse(table, func, info) \
210 (elf_link_hash_traverse \
211 (&(table)->root, \
2c3fc389 212 (bfd_boolean (*) (struct elf_link_hash_entry *, void *)) (func), \
252b5132
RH
213 (info)))
214
215/* Get the Alpha ELF linker hash table from a link_info structure. */
216
217#define alpha_elf_hash_table(p) \
4dfe6ac6
NC
218 (elf_hash_table_id ((struct elf_link_hash_table *) ((p)->hash)) \
219 == ALPHA_ELF_DATA ? ((struct alpha_elf_link_hash_table *) ((p)->hash)) : NULL)
252b5132
RH
220
221/* Get the object's symbols as our own entry type. */
222
223#define alpha_elf_sym_hashes(abfd) \
224 ((struct alpha_elf_link_hash_entry **)elf_sym_hashes(abfd))
225
68ffbac6 226/* Should we do dynamic things to this symbol? This differs from the
986a241f
RH
227 generic version in that we never need to consider function pointer
228 equality wrt PLT entries -- we don't create a PLT entry if a symbol's
229 address is ever taken. */
252b5132 230
986a241f 231static inline bfd_boolean
a7519a3c
RH
232alpha_elf_dynamic_symbol_p (struct elf_link_hash_entry *h,
233 struct bfd_link_info *info)
8fb35fed 234{
986a241f 235 return _bfd_elf_dynamic_symbol_p (h, info, 0);
8fb35fed 236}
252b5132
RH
237
238/* Create an entry in a Alpha ELF linker hash table. */
239
240static struct bfd_hash_entry *
a7519a3c
RH
241elf64_alpha_link_hash_newfunc (struct bfd_hash_entry *entry,
242 struct bfd_hash_table *table,
243 const char *string)
252b5132
RH
244{
245 struct alpha_elf_link_hash_entry *ret =
246 (struct alpha_elf_link_hash_entry *) entry;
247
248 /* Allocate the structure if it has not already been allocated by a
249 subclass. */
250 if (ret == (struct alpha_elf_link_hash_entry *) NULL)
251 ret = ((struct alpha_elf_link_hash_entry *)
252 bfd_hash_allocate (table,
253 sizeof (struct alpha_elf_link_hash_entry)));
254 if (ret == (struct alpha_elf_link_hash_entry *) NULL)
255 return (struct bfd_hash_entry *) ret;
256
257 /* Call the allocation method of the superclass. */
258 ret = ((struct alpha_elf_link_hash_entry *)
259 _bfd_elf_link_hash_newfunc ((struct bfd_hash_entry *) ret,
260 table, string));
261 if (ret != (struct alpha_elf_link_hash_entry *) NULL)
262 {
263 /* Set local fields. */
264 memset (&ret->esym, 0, sizeof (EXTR));
265 /* We use -2 as a marker to indicate that the information has
266 not been set. -1 means there is no associated ifd. */
267 ret->esym.ifd = -2;
268 ret->flags = 0;
269 ret->got_entries = NULL;
270 ret->reloc_entries = NULL;
271 }
272
273 return (struct bfd_hash_entry *) ret;
274}
275
276/* Create a Alpha ELF linker hash table. */
277
278static struct bfd_link_hash_table *
a7519a3c 279elf64_alpha_bfd_link_hash_table_create (bfd *abfd)
252b5132
RH
280{
281 struct alpha_elf_link_hash_table *ret;
dc810e39 282 bfd_size_type amt = sizeof (struct alpha_elf_link_hash_table);
252b5132 283
e2d34d7d 284 ret = (struct alpha_elf_link_hash_table *) bfd_zmalloc (amt);
252b5132
RH
285 if (ret == (struct alpha_elf_link_hash_table *) NULL)
286 return NULL;
287
66eb6687
AM
288 if (!_bfd_elf_link_hash_table_init (&ret->root, abfd,
289 elf64_alpha_link_hash_newfunc,
4dfe6ac6
NC
290 sizeof (struct alpha_elf_link_hash_entry),
291 ALPHA_ELF_DATA))
252b5132 292 {
e2d34d7d 293 free (ret);
252b5132
RH
294 return NULL;
295 }
296
297 return &ret->root.root;
298}
299\f
698600e4
AM
300/* Alpha ELF follows MIPS ELF in using a special find_nearest_line
301 routine in order to handle the ECOFF debugging information. */
302
303struct alpha_elf_find_line
304{
305 struct ecoff_debug_info d;
306 struct ecoff_find_line i;
307};
308
252b5132
RH
309/* We have some private fields hanging off of the elf_tdata structure. */
310
311struct alpha_elf_obj_tdata
312{
313 struct elf_obj_tdata root;
314
315 /* For every input file, these are the got entries for that object's
316 local symbols. */
317 struct alpha_elf_got_entry ** local_got_entries;
318
319 /* For every input file, this is the object that owns the got that
320 this input file uses. */
321 bfd *gotobj;
322
323 /* For every got, this is a linked list through the objects using this got */
324 bfd *in_got_link_next;
325
326 /* For every got, this is a link to the next got subsegment. */
327 bfd *got_link_next;
328
329 /* For every got, this is the section. */
330 asection *got;
331
3765b1be
RH
332 /* For every got, this is it's total number of words. */
333 int total_got_size;
252b5132 334
3765b1be 335 /* For every got, this is the sum of the number of words required
252b5132 336 to hold all of the member object's local got. */
3765b1be 337 int local_got_size;
698600e4
AM
338
339 /* Used by elf64_alpha_find_nearest_line entry point. */
340 struct alpha_elf_find_line *find_line_info;
341
252b5132
RH
342};
343
344#define alpha_elf_tdata(abfd) \
345 ((struct alpha_elf_obj_tdata *) (abfd)->tdata.any)
346
0ffa91dd
NC
347#define is_alpha_elf(bfd) \
348 (bfd_get_flavour (bfd) == bfd_target_elf_flavour \
349 && elf_tdata (bfd) != NULL \
4dfe6ac6 350 && elf_object_id (bfd) == ALPHA_ELF_DATA)
0ffa91dd 351
b34976b6 352static bfd_boolean
a7519a3c 353elf64_alpha_mkobject (bfd *abfd)
252b5132 354{
0ffa91dd 355 return bfd_elf_allocate_object (abfd, sizeof (struct alpha_elf_obj_tdata),
4dfe6ac6 356 ALPHA_ELF_DATA);
252b5132
RH
357}
358
b34976b6 359static bfd_boolean
a7519a3c 360elf64_alpha_object_p (bfd *abfd)
252b5132 361{
252b5132
RH
362 /* Set the right machine number for an Alpha ELF file. */
363 return bfd_default_set_arch_mach (abfd, bfd_arch_alpha, 0);
364}
365\f
a7519a3c
RH
366/* A relocation function which doesn't do anything. */
367
368static bfd_reloc_status_type
369elf64_alpha_reloc_nil (bfd *abfd ATTRIBUTE_UNUSED, arelent *reloc,
370 asymbol *sym ATTRIBUTE_UNUSED,
2c3fc389 371 void * data ATTRIBUTE_UNUSED, asection *sec,
a7519a3c
RH
372 bfd *output_bfd, char **error_message ATTRIBUTE_UNUSED)
373{
374 if (output_bfd)
375 reloc->address += sec->output_offset;
376 return bfd_reloc_ok;
377}
378
379/* A relocation function used for an unsupported reloc. */
380
381static bfd_reloc_status_type
382elf64_alpha_reloc_bad (bfd *abfd ATTRIBUTE_UNUSED, arelent *reloc,
383 asymbol *sym ATTRIBUTE_UNUSED,
2c3fc389 384 void * data ATTRIBUTE_UNUSED, asection *sec,
a7519a3c
RH
385 bfd *output_bfd, char **error_message ATTRIBUTE_UNUSED)
386{
387 if (output_bfd)
388 reloc->address += sec->output_offset;
389 return bfd_reloc_notsupported;
390}
391
392/* Do the work of the GPDISP relocation. */
393
394static bfd_reloc_status_type
395elf64_alpha_do_reloc_gpdisp (bfd *abfd, bfd_vma gpdisp, bfd_byte *p_ldah,
396 bfd_byte *p_lda)
397{
398 bfd_reloc_status_type ret = bfd_reloc_ok;
399 bfd_vma addend;
400 unsigned long i_ldah, i_lda;
401
402 i_ldah = bfd_get_32 (abfd, p_ldah);
403 i_lda = bfd_get_32 (abfd, p_lda);
404
405 /* Complain if the instructions are not correct. */
406 if (((i_ldah >> 26) & 0x3f) != 0x09
407 || ((i_lda >> 26) & 0x3f) != 0x08)
408 ret = bfd_reloc_dangerous;
409
410 /* Extract the user-supplied offset, mirroring the sign extensions
411 that the instructions perform. */
412 addend = ((i_ldah & 0xffff) << 16) | (i_lda & 0xffff);
413 addend = (addend ^ 0x80008000) - 0x80008000;
414
415 gpdisp += addend;
416
417 if ((bfd_signed_vma) gpdisp < -(bfd_signed_vma) 0x80000000
418 || (bfd_signed_vma) gpdisp >= (bfd_signed_vma) 0x7fff8000)
419 ret = bfd_reloc_overflow;
420
421 /* compensate for the sign extension again. */
422 i_ldah = ((i_ldah & 0xffff0000)
423 | (((gpdisp >> 16) + ((gpdisp >> 15) & 1)) & 0xffff));
424 i_lda = (i_lda & 0xffff0000) | (gpdisp & 0xffff);
425
426 bfd_put_32 (abfd, (bfd_vma) i_ldah, p_ldah);
427 bfd_put_32 (abfd, (bfd_vma) i_lda, p_lda);
428
429 return ret;
430}
431
432/* The special function for the GPDISP reloc. */
433
434static bfd_reloc_status_type
435elf64_alpha_reloc_gpdisp (bfd *abfd, arelent *reloc_entry,
2c3fc389 436 asymbol *sym ATTRIBUTE_UNUSED, void * data,
a7519a3c
RH
437 asection *input_section, bfd *output_bfd,
438 char **err_msg)
439{
440 bfd_reloc_status_type ret;
441 bfd_vma gp, relocation;
442 bfd_vma high_address;
443 bfd_byte *p_ldah, *p_lda;
444
445 /* Don't do anything if we're not doing a final link. */
446 if (output_bfd)
447 {
448 reloc_entry->address += input_section->output_offset;
449 return bfd_reloc_ok;
450 }
451
452 high_address = bfd_get_section_limit (abfd, input_section);
453 if (reloc_entry->address > high_address
454 || reloc_entry->address + reloc_entry->addend > high_address)
455 return bfd_reloc_outofrange;
456
457 /* The gp used in the portion of the output object to which this
458 input object belongs is cached on the input bfd. */
459 gp = _bfd_get_gp_value (abfd);
460
461 relocation = (input_section->output_section->vma
462 + input_section->output_offset
463 + reloc_entry->address);
464
465 p_ldah = (bfd_byte *) data + reloc_entry->address;
466 p_lda = p_ldah + reloc_entry->addend;
467
468 ret = elf64_alpha_do_reloc_gpdisp (abfd, gp - relocation, p_ldah, p_lda);
469
470 /* Complain if the instructions are not correct. */
471 if (ret == bfd_reloc_dangerous)
472 *err_msg = _("GPDISP relocation did not find ldah and lda instructions");
473
474 return ret;
475}
476
252b5132
RH
477/* In case we're on a 32-bit machine, construct a 64-bit "-1" value
478 from smaller values. Start with zero, widen, *then* decrement. */
479#define MINUS_ONE (((bfd_vma)0) - 1)
480
21d799b5 481
dfe57ca0 482#define SKIP_HOWTO(N) \
21d799b5 483 HOWTO(N, 0, 0, 0, 0, 0, complain_overflow_dont, elf64_alpha_reloc_bad, 0, 0, 0, 0, 0)
dfe57ca0 484
252b5132
RH
485static reloc_howto_type elf64_alpha_howto_table[] =
486{
487 HOWTO (R_ALPHA_NONE, /* type */
488 0, /* rightshift */
6346d5ca
AM
489 3, /* size (0 = byte, 1 = short, 2 = long) */
490 0, /* bitsize */
b34976b6 491 TRUE, /* pc_relative */
252b5132
RH
492 0, /* bitpos */
493 complain_overflow_dont, /* complain_on_overflow */
494 elf64_alpha_reloc_nil, /* special_function */
495 "NONE", /* name */
b34976b6 496 FALSE, /* partial_inplace */
252b5132
RH
497 0, /* src_mask */
498 0, /* dst_mask */
b34976b6 499 TRUE), /* pcrel_offset */
252b5132
RH
500
501 /* A 32 bit reference to a symbol. */
502 HOWTO (R_ALPHA_REFLONG, /* type */
503 0, /* rightshift */
504 2, /* size (0 = byte, 1 = short, 2 = long) */
505 32, /* bitsize */
b34976b6 506 FALSE, /* pc_relative */
252b5132
RH
507 0, /* bitpos */
508 complain_overflow_bitfield, /* complain_on_overflow */
bc1bc43f 509 bfd_elf_generic_reloc, /* special_function */
252b5132 510 "REFLONG", /* name */
b34976b6 511 FALSE, /* partial_inplace */
252b5132
RH
512 0xffffffff, /* src_mask */
513 0xffffffff, /* dst_mask */
b34976b6 514 FALSE), /* pcrel_offset */
252b5132
RH
515
516 /* A 64 bit reference to a symbol. */
517 HOWTO (R_ALPHA_REFQUAD, /* type */
518 0, /* rightshift */
519 4, /* size (0 = byte, 1 = short, 2 = long) */
520 64, /* bitsize */
b34976b6 521 FALSE, /* pc_relative */
252b5132
RH
522 0, /* bitpos */
523 complain_overflow_bitfield, /* complain_on_overflow */
bc1bc43f 524 bfd_elf_generic_reloc, /* special_function */
252b5132 525 "REFQUAD", /* name */
b34976b6 526 FALSE, /* partial_inplace */
252b5132
RH
527 MINUS_ONE, /* src_mask */
528 MINUS_ONE, /* dst_mask */
b34976b6 529 FALSE), /* pcrel_offset */
252b5132
RH
530
531 /* A 32 bit GP relative offset. This is just like REFLONG except
532 that when the value is used the value of the gp register will be
533 added in. */
534 HOWTO (R_ALPHA_GPREL32, /* type */
535 0, /* rightshift */
536 2, /* size (0 = byte, 1 = short, 2 = long) */
537 32, /* bitsize */
b34976b6 538 FALSE, /* pc_relative */
252b5132
RH
539 0, /* bitpos */
540 complain_overflow_bitfield, /* complain_on_overflow */
bc1bc43f 541 bfd_elf_generic_reloc, /* special_function */
252b5132 542 "GPREL32", /* name */
b34976b6 543 FALSE, /* partial_inplace */
252b5132
RH
544 0xffffffff, /* src_mask */
545 0xffffffff, /* dst_mask */
b34976b6 546 FALSE), /* pcrel_offset */
252b5132
RH
547
548 /* Used for an instruction that refers to memory off the GP register. */
549 HOWTO (R_ALPHA_LITERAL, /* type */
550 0, /* rightshift */
dfe57ca0 551 1, /* size (0 = byte, 1 = short, 2 = long) */
252b5132 552 16, /* bitsize */
b34976b6 553 FALSE, /* pc_relative */
252b5132
RH
554 0, /* bitpos */
555 complain_overflow_signed, /* complain_on_overflow */
bc1bc43f 556 bfd_elf_generic_reloc, /* special_function */
252b5132 557 "ELF_LITERAL", /* name */
b34976b6 558 FALSE, /* partial_inplace */
252b5132
RH
559 0xffff, /* src_mask */
560 0xffff, /* dst_mask */
b34976b6 561 FALSE), /* pcrel_offset */
252b5132
RH
562
563 /* This reloc only appears immediately following an ELF_LITERAL reloc.
564 It identifies a use of the literal. The symbol index is special:
565 1 means the literal address is in the base register of a memory
566 format instruction; 2 means the literal address is in the byte
567 offset register of a byte-manipulation instruction; 3 means the
568 literal address is in the target register of a jsr instruction.
569 This does not actually do any relocation. */
570 HOWTO (R_ALPHA_LITUSE, /* type */
571 0, /* rightshift */
dfe57ca0 572 1, /* size (0 = byte, 1 = short, 2 = long) */
252b5132 573 32, /* bitsize */
b34976b6 574 FALSE, /* pc_relative */
252b5132
RH
575 0, /* bitpos */
576 complain_overflow_dont, /* complain_on_overflow */
577 elf64_alpha_reloc_nil, /* special_function */
578 "LITUSE", /* name */
b34976b6 579 FALSE, /* partial_inplace */
252b5132
RH
580 0, /* src_mask */
581 0, /* dst_mask */
b34976b6 582 FALSE), /* pcrel_offset */
252b5132
RH
583
584 /* Load the gp register. This is always used for a ldah instruction
585 which loads the upper 16 bits of the gp register. The symbol
586 index of the GPDISP instruction is an offset in bytes to the lda
587 instruction that loads the lower 16 bits. The value to use for
588 the relocation is the difference between the GP value and the
589 current location; the load will always be done against a register
590 holding the current address.
591
592 NOTE: Unlike ECOFF, partial in-place relocation is not done. If
593 any offset is present in the instructions, it is an offset from
594 the register to the ldah instruction. This lets us avoid any
595 stupid hackery like inventing a gp value to do partial relocation
596 against. Also unlike ECOFF, we do the whole relocation off of
597 the GPDISP rather than a GPDISP_HI16/GPDISP_LO16 pair. An odd,
598 space consuming bit, that, since all the information was present
599 in the GPDISP_HI16 reloc. */
600 HOWTO (R_ALPHA_GPDISP, /* type */
601 16, /* rightshift */
602 2, /* size (0 = byte, 1 = short, 2 = long) */
603 16, /* bitsize */
b34976b6 604 FALSE, /* pc_relative */
252b5132
RH
605 0, /* bitpos */
606 complain_overflow_dont, /* complain_on_overflow */
607 elf64_alpha_reloc_gpdisp, /* special_function */
608 "GPDISP", /* name */
b34976b6 609 FALSE, /* partial_inplace */
252b5132
RH
610 0xffff, /* src_mask */
611 0xffff, /* dst_mask */
b34976b6 612 TRUE), /* pcrel_offset */
252b5132
RH
613
614 /* A 21 bit branch. */
615 HOWTO (R_ALPHA_BRADDR, /* type */
616 2, /* rightshift */
617 2, /* size (0 = byte, 1 = short, 2 = long) */
618 21, /* bitsize */
b34976b6 619 TRUE, /* pc_relative */
252b5132
RH
620 0, /* bitpos */
621 complain_overflow_signed, /* complain_on_overflow */
bc1bc43f 622 bfd_elf_generic_reloc, /* special_function */
252b5132 623 "BRADDR", /* name */
b34976b6 624 FALSE, /* partial_inplace */
252b5132
RH
625 0x1fffff, /* src_mask */
626 0x1fffff, /* dst_mask */
b34976b6 627 TRUE), /* pcrel_offset */
252b5132
RH
628
629 /* A hint for a jump to a register. */
630 HOWTO (R_ALPHA_HINT, /* type */
631 2, /* rightshift */
dfe57ca0 632 1, /* size (0 = byte, 1 = short, 2 = long) */
252b5132 633 14, /* bitsize */
b34976b6 634 TRUE, /* pc_relative */
252b5132
RH
635 0, /* bitpos */
636 complain_overflow_dont, /* complain_on_overflow */
bc1bc43f 637 bfd_elf_generic_reloc, /* special_function */
252b5132 638 "HINT", /* name */
b34976b6 639 FALSE, /* partial_inplace */
252b5132
RH
640 0x3fff, /* src_mask */
641 0x3fff, /* dst_mask */
b34976b6 642 TRUE), /* pcrel_offset */
252b5132
RH
643
644 /* 16 bit PC relative offset. */
645 HOWTO (R_ALPHA_SREL16, /* type */
646 0, /* rightshift */
647 1, /* size (0 = byte, 1 = short, 2 = long) */
648 16, /* bitsize */
b34976b6 649 TRUE, /* pc_relative */
252b5132
RH
650 0, /* bitpos */
651 complain_overflow_signed, /* complain_on_overflow */
bc1bc43f 652 bfd_elf_generic_reloc, /* special_function */
252b5132 653 "SREL16", /* name */
b34976b6 654 FALSE, /* partial_inplace */
252b5132
RH
655 0xffff, /* src_mask */
656 0xffff, /* dst_mask */
b34976b6 657 TRUE), /* pcrel_offset */
252b5132
RH
658
659 /* 32 bit PC relative offset. */
660 HOWTO (R_ALPHA_SREL32, /* type */
661 0, /* rightshift */
662 2, /* size (0 = byte, 1 = short, 2 = long) */
663 32, /* bitsize */
b34976b6 664 TRUE, /* pc_relative */
252b5132
RH
665 0, /* bitpos */
666 complain_overflow_signed, /* complain_on_overflow */
bc1bc43f 667 bfd_elf_generic_reloc, /* special_function */
252b5132 668 "SREL32", /* name */
b34976b6 669 FALSE, /* partial_inplace */
252b5132
RH
670 0xffffffff, /* src_mask */
671 0xffffffff, /* dst_mask */
b34976b6 672 TRUE), /* pcrel_offset */
252b5132
RH
673
674 /* A 64 bit PC relative offset. */
675 HOWTO (R_ALPHA_SREL64, /* type */
676 0, /* rightshift */
677 4, /* size (0 = byte, 1 = short, 2 = long) */
678 64, /* bitsize */
b34976b6 679 TRUE, /* pc_relative */
252b5132
RH
680 0, /* bitpos */
681 complain_overflow_signed, /* complain_on_overflow */
bc1bc43f 682 bfd_elf_generic_reloc, /* special_function */
252b5132 683 "SREL64", /* name */
b34976b6 684 FALSE, /* partial_inplace */
252b5132
RH
685 MINUS_ONE, /* src_mask */
686 MINUS_ONE, /* dst_mask */
b34976b6 687 TRUE), /* pcrel_offset */
252b5132 688
dfe57ca0
RH
689 /* Skip 12 - 16; deprecated ECOFF relocs. */
690 SKIP_HOWTO (12),
691 SKIP_HOWTO (13),
692 SKIP_HOWTO (14),
693 SKIP_HOWTO (15),
694 SKIP_HOWTO (16),
252b5132
RH
695
696 /* The high 16 bits of the displacement from GP to the target. */
697 HOWTO (R_ALPHA_GPRELHIGH,
698 0, /* rightshift */
dfe57ca0 699 1, /* size (0 = byte, 1 = short, 2 = long) */
252b5132 700 16, /* bitsize */
b34976b6 701 FALSE, /* pc_relative */
252b5132
RH
702 0, /* bitpos */
703 complain_overflow_signed, /* complain_on_overflow */
bc1bc43f 704 bfd_elf_generic_reloc, /* special_function */
252b5132 705 "GPRELHIGH", /* name */
b34976b6 706 FALSE, /* partial_inplace */
252b5132
RH
707 0xffff, /* src_mask */
708 0xffff, /* dst_mask */
b34976b6 709 FALSE), /* pcrel_offset */
252b5132
RH
710
711 /* The low 16 bits of the displacement from GP to the target. */
712 HOWTO (R_ALPHA_GPRELLOW,
713 0, /* rightshift */
dfe57ca0 714 1, /* size (0 = byte, 1 = short, 2 = long) */
252b5132 715 16, /* bitsize */
b34976b6 716 FALSE, /* pc_relative */
252b5132
RH
717 0, /* bitpos */
718 complain_overflow_dont, /* complain_on_overflow */
bc1bc43f 719 bfd_elf_generic_reloc, /* special_function */
252b5132 720 "GPRELLOW", /* name */
b34976b6 721 FALSE, /* partial_inplace */
252b5132
RH
722 0xffff, /* src_mask */
723 0xffff, /* dst_mask */
b34976b6 724 FALSE), /* pcrel_offset */
252b5132
RH
725
726 /* A 16-bit displacement from the GP to the target. */
dfe57ca0 727 HOWTO (R_ALPHA_GPREL16,
252b5132 728 0, /* rightshift */
dfe57ca0 729 1, /* size (0 = byte, 1 = short, 2 = long) */
252b5132 730 16, /* bitsize */
b34976b6 731 FALSE, /* pc_relative */
252b5132
RH
732 0, /* bitpos */
733 complain_overflow_signed, /* complain_on_overflow */
bc1bc43f 734 bfd_elf_generic_reloc, /* special_function */
dfe57ca0 735 "GPREL16", /* name */
b34976b6 736 FALSE, /* partial_inplace */
252b5132
RH
737 0xffff, /* src_mask */
738 0xffff, /* dst_mask */
b34976b6 739 FALSE), /* pcrel_offset */
252b5132 740
dfe57ca0
RH
741 /* Skip 20 - 23; deprecated ECOFF relocs. */
742 SKIP_HOWTO (20),
743 SKIP_HOWTO (21),
744 SKIP_HOWTO (22),
745 SKIP_HOWTO (23),
252b5132 746
fe8bc63d 747 /* Misc ELF relocations. */
252b5132
RH
748
749 /* A dynamic relocation to copy the target into our .dynbss section. */
750 /* Not generated, as all Alpha objects use PIC, so it is not needed. It
751 is present because every other ELF has one, but should not be used
752 because .dynbss is an ugly thing. */
753 HOWTO (R_ALPHA_COPY,
754 0,
755 0,
756 0,
b34976b6 757 FALSE,
252b5132
RH
758 0,
759 complain_overflow_dont,
760 bfd_elf_generic_reloc,
761 "COPY",
b34976b6 762 FALSE,
252b5132
RH
763 0,
764 0,
b34976b6 765 TRUE),
252b5132
RH
766
767 /* A dynamic relocation for a .got entry. */
768 HOWTO (R_ALPHA_GLOB_DAT,
769 0,
770 0,
771 0,
b34976b6 772 FALSE,
252b5132
RH
773 0,
774 complain_overflow_dont,
775 bfd_elf_generic_reloc,
776 "GLOB_DAT",
b34976b6 777 FALSE,
252b5132
RH
778 0,
779 0,
b34976b6 780 TRUE),
252b5132
RH
781
782 /* A dynamic relocation for a .plt entry. */
783 HOWTO (R_ALPHA_JMP_SLOT,
784 0,
785 0,
786 0,
b34976b6 787 FALSE,
252b5132
RH
788 0,
789 complain_overflow_dont,
790 bfd_elf_generic_reloc,
791 "JMP_SLOT",
b34976b6 792 FALSE,
252b5132
RH
793 0,
794 0,
b34976b6 795 TRUE),
252b5132
RH
796
797 /* A dynamic relocation to add the base of the DSO to a 64-bit field. */
798 HOWTO (R_ALPHA_RELATIVE,
799 0,
800 0,
801 0,
b34976b6 802 FALSE,
252b5132
RH
803 0,
804 complain_overflow_dont,
805 bfd_elf_generic_reloc,
806 "RELATIVE",
b34976b6 807 FALSE,
252b5132
RH
808 0,
809 0,
b34976b6 810 TRUE),
7793f4d0
RH
811
812 /* A 21 bit branch that adjusts for gp loads. */
813 HOWTO (R_ALPHA_BRSGP, /* type */
814 2, /* rightshift */
815 2, /* size (0 = byte, 1 = short, 2 = long) */
816 21, /* bitsize */
b34976b6 817 TRUE, /* pc_relative */
7793f4d0
RH
818 0, /* bitpos */
819 complain_overflow_signed, /* complain_on_overflow */
bc1bc43f 820 bfd_elf_generic_reloc, /* special_function */
7793f4d0 821 "BRSGP", /* name */
b34976b6 822 FALSE, /* partial_inplace */
7793f4d0
RH
823 0x1fffff, /* src_mask */
824 0x1fffff, /* dst_mask */
b34976b6 825 TRUE), /* pcrel_offset */
3765b1be
RH
826
827 /* Creates a tls_index for the symbol in the got. */
828 HOWTO (R_ALPHA_TLSGD, /* type */
829 0, /* rightshift */
830 1, /* size (0 = byte, 1 = short, 2 = long) */
831 16, /* bitsize */
b34976b6 832 FALSE, /* pc_relative */
3765b1be
RH
833 0, /* bitpos */
834 complain_overflow_signed, /* complain_on_overflow */
bc1bc43f 835 bfd_elf_generic_reloc, /* special_function */
3765b1be 836 "TLSGD", /* name */
b34976b6 837 FALSE, /* partial_inplace */
3765b1be
RH
838 0xffff, /* src_mask */
839 0xffff, /* dst_mask */
b34976b6 840 FALSE), /* pcrel_offset */
3765b1be
RH
841
842 /* Creates a tls_index for the (current) module in the got. */
843 HOWTO (R_ALPHA_TLSLDM, /* type */
844 0, /* rightshift */
845 1, /* size (0 = byte, 1 = short, 2 = long) */
846 16, /* bitsize */
b34976b6 847 FALSE, /* pc_relative */
3765b1be
RH
848 0, /* bitpos */
849 complain_overflow_signed, /* complain_on_overflow */
bc1bc43f 850 bfd_elf_generic_reloc, /* special_function */
3765b1be 851 "TLSLDM", /* name */
b34976b6 852 FALSE, /* partial_inplace */
3765b1be
RH
853 0xffff, /* src_mask */
854 0xffff, /* dst_mask */
b34976b6 855 FALSE), /* pcrel_offset */
3765b1be
RH
856
857 /* A dynamic relocation for a DTP module entry. */
858 HOWTO (R_ALPHA_DTPMOD64, /* type */
859 0, /* rightshift */
860 4, /* size (0 = byte, 1 = short, 2 = long) */
861 64, /* bitsize */
b34976b6 862 FALSE, /* pc_relative */
3765b1be
RH
863 0, /* bitpos */
864 complain_overflow_bitfield, /* complain_on_overflow */
bc1bc43f 865 bfd_elf_generic_reloc, /* special_function */
3765b1be 866 "DTPMOD64", /* name */
b34976b6 867 FALSE, /* partial_inplace */
3765b1be
RH
868 MINUS_ONE, /* src_mask */
869 MINUS_ONE, /* dst_mask */
b34976b6 870 FALSE), /* pcrel_offset */
3765b1be
RH
871
872 /* Creates a 64-bit offset in the got for the displacement
873 from DTP to the target. */
874 HOWTO (R_ALPHA_GOTDTPREL, /* type */
875 0, /* rightshift */
876 1, /* size (0 = byte, 1 = short, 2 = long) */
877 16, /* bitsize */
b34976b6 878 FALSE, /* pc_relative */
3765b1be
RH
879 0, /* bitpos */
880 complain_overflow_signed, /* complain_on_overflow */
bc1bc43f 881 bfd_elf_generic_reloc, /* special_function */
3765b1be 882 "GOTDTPREL", /* name */
b34976b6 883 FALSE, /* partial_inplace */
3765b1be
RH
884 0xffff, /* src_mask */
885 0xffff, /* dst_mask */
b34976b6 886 FALSE), /* pcrel_offset */
3765b1be
RH
887
888 /* A dynamic relocation for a displacement from DTP to the target. */
889 HOWTO (R_ALPHA_DTPREL64, /* type */
890 0, /* rightshift */
891 4, /* size (0 = byte, 1 = short, 2 = long) */
892 64, /* bitsize */
b34976b6 893 FALSE, /* pc_relative */
3765b1be
RH
894 0, /* bitpos */
895 complain_overflow_bitfield, /* complain_on_overflow */
bc1bc43f 896 bfd_elf_generic_reloc, /* special_function */
3765b1be 897 "DTPREL64", /* name */
b34976b6 898 FALSE, /* partial_inplace */
3765b1be
RH
899 MINUS_ONE, /* src_mask */
900 MINUS_ONE, /* dst_mask */
b34976b6 901 FALSE), /* pcrel_offset */
3765b1be
RH
902
903 /* The high 16 bits of the displacement from DTP to the target. */
904 HOWTO (R_ALPHA_DTPRELHI, /* type */
905 0, /* rightshift */
906 1, /* size (0 = byte, 1 = short, 2 = long) */
907 16, /* bitsize */
b34976b6 908 FALSE, /* pc_relative */
3765b1be
RH
909 0, /* bitpos */
910 complain_overflow_signed, /* complain_on_overflow */
bc1bc43f 911 bfd_elf_generic_reloc, /* special_function */
3765b1be 912 "DTPRELHI", /* name */
b34976b6 913 FALSE, /* partial_inplace */
3765b1be
RH
914 0xffff, /* src_mask */
915 0xffff, /* dst_mask */
b34976b6 916 FALSE), /* pcrel_offset */
3765b1be
RH
917
918 /* The low 16 bits of the displacement from DTP to the target. */
919 HOWTO (R_ALPHA_DTPRELLO, /* type */
920 0, /* rightshift */
921 1, /* size (0 = byte, 1 = short, 2 = long) */
922 16, /* bitsize */
b34976b6 923 FALSE, /* pc_relative */
3765b1be
RH
924 0, /* bitpos */
925 complain_overflow_dont, /* complain_on_overflow */
bc1bc43f 926 bfd_elf_generic_reloc, /* special_function */
3765b1be 927 "DTPRELLO", /* name */
b34976b6 928 FALSE, /* partial_inplace */
3765b1be
RH
929 0xffff, /* src_mask */
930 0xffff, /* dst_mask */
b34976b6 931 FALSE), /* pcrel_offset */
3765b1be
RH
932
933 /* A 16-bit displacement from DTP to the target. */
934 HOWTO (R_ALPHA_DTPREL16, /* type */
935 0, /* rightshift */
936 1, /* size (0 = byte, 1 = short, 2 = long) */
937 16, /* bitsize */
b34976b6 938 FALSE, /* pc_relative */
3765b1be
RH
939 0, /* bitpos */
940 complain_overflow_signed, /* complain_on_overflow */
bc1bc43f 941 bfd_elf_generic_reloc, /* special_function */
3765b1be 942 "DTPREL16", /* name */
b34976b6 943 FALSE, /* partial_inplace */
3765b1be
RH
944 0xffff, /* src_mask */
945 0xffff, /* dst_mask */
b34976b6 946 FALSE), /* pcrel_offset */
3765b1be
RH
947
948 /* Creates a 64-bit offset in the got for the displacement
949 from TP to the target. */
950 HOWTO (R_ALPHA_GOTTPREL, /* type */
951 0, /* rightshift */
952 1, /* size (0 = byte, 1 = short, 2 = long) */
953 16, /* bitsize */
b34976b6 954 FALSE, /* pc_relative */
3765b1be
RH
955 0, /* bitpos */
956 complain_overflow_signed, /* complain_on_overflow */
bc1bc43f 957 bfd_elf_generic_reloc, /* special_function */
3765b1be 958 "GOTTPREL", /* name */
b34976b6 959 FALSE, /* partial_inplace */
3765b1be
RH
960 0xffff, /* src_mask */
961 0xffff, /* dst_mask */
b34976b6 962 FALSE), /* pcrel_offset */
3765b1be
RH
963
964 /* A dynamic relocation for a displacement from TP to the target. */
965 HOWTO (R_ALPHA_TPREL64, /* type */
966 0, /* rightshift */
967 4, /* size (0 = byte, 1 = short, 2 = long) */
968 64, /* bitsize */
b34976b6 969 FALSE, /* pc_relative */
3765b1be
RH
970 0, /* bitpos */
971 complain_overflow_bitfield, /* complain_on_overflow */
bc1bc43f 972 bfd_elf_generic_reloc, /* special_function */
3765b1be 973 "TPREL64", /* name */
b34976b6 974 FALSE, /* partial_inplace */
3765b1be
RH
975 MINUS_ONE, /* src_mask */
976 MINUS_ONE, /* dst_mask */
b34976b6 977 FALSE), /* pcrel_offset */
3765b1be
RH
978
979 /* The high 16 bits of the displacement from TP to the target. */
980 HOWTO (R_ALPHA_TPRELHI, /* type */
981 0, /* rightshift */
982 1, /* size (0 = byte, 1 = short, 2 = long) */
983 16, /* bitsize */
b34976b6 984 FALSE, /* pc_relative */
3765b1be
RH
985 0, /* bitpos */
986 complain_overflow_signed, /* complain_on_overflow */
bc1bc43f 987 bfd_elf_generic_reloc, /* special_function */
3765b1be 988 "TPRELHI", /* name */
b34976b6 989 FALSE, /* partial_inplace */
3765b1be
RH
990 0xffff, /* src_mask */
991 0xffff, /* dst_mask */
b34976b6 992 FALSE), /* pcrel_offset */
3765b1be
RH
993
994 /* The low 16 bits of the displacement from TP to the target. */
995 HOWTO (R_ALPHA_TPRELLO, /* type */
996 0, /* rightshift */
997 1, /* size (0 = byte, 1 = short, 2 = long) */
998 16, /* bitsize */
b34976b6 999 FALSE, /* pc_relative */
3765b1be
RH
1000 0, /* bitpos */
1001 complain_overflow_dont, /* complain_on_overflow */
bc1bc43f 1002 bfd_elf_generic_reloc, /* special_function */
3765b1be 1003 "TPRELLO", /* name */
b34976b6 1004 FALSE, /* partial_inplace */
3765b1be
RH
1005 0xffff, /* src_mask */
1006 0xffff, /* dst_mask */
b34976b6 1007 FALSE), /* pcrel_offset */
3765b1be
RH
1008
1009 /* A 16-bit displacement from TP to the target. */
1010 HOWTO (R_ALPHA_TPREL16, /* type */
1011 0, /* rightshift */
1012 1, /* size (0 = byte, 1 = short, 2 = long) */
1013 16, /* bitsize */
b34976b6 1014 FALSE, /* pc_relative */
3765b1be
RH
1015 0, /* bitpos */
1016 complain_overflow_signed, /* complain_on_overflow */
bc1bc43f 1017 bfd_elf_generic_reloc, /* special_function */
3765b1be 1018 "TPREL16", /* name */
b34976b6 1019 FALSE, /* partial_inplace */
3765b1be
RH
1020 0xffff, /* src_mask */
1021 0xffff, /* dst_mask */
b34976b6 1022 FALSE), /* pcrel_offset */
252b5132
RH
1023};
1024
252b5132
RH
1025/* A mapping from BFD reloc types to Alpha ELF reloc types. */
1026
1027struct elf_reloc_map
1028{
1029 bfd_reloc_code_real_type bfd_reloc_val;
1030 int elf_reloc_val;
1031};
1032
1033static const struct elf_reloc_map elf64_alpha_reloc_map[] =
1034{
dfe57ca0
RH
1035 {BFD_RELOC_NONE, R_ALPHA_NONE},
1036 {BFD_RELOC_32, R_ALPHA_REFLONG},
1037 {BFD_RELOC_64, R_ALPHA_REFQUAD},
1038 {BFD_RELOC_CTOR, R_ALPHA_REFQUAD},
1039 {BFD_RELOC_GPREL32, R_ALPHA_GPREL32},
1040 {BFD_RELOC_ALPHA_ELF_LITERAL, R_ALPHA_LITERAL},
1041 {BFD_RELOC_ALPHA_LITUSE, R_ALPHA_LITUSE},
1042 {BFD_RELOC_ALPHA_GPDISP, R_ALPHA_GPDISP},
1043 {BFD_RELOC_23_PCREL_S2, R_ALPHA_BRADDR},
1044 {BFD_RELOC_ALPHA_HINT, R_ALPHA_HINT},
1045 {BFD_RELOC_16_PCREL, R_ALPHA_SREL16},
1046 {BFD_RELOC_32_PCREL, R_ALPHA_SREL32},
1047 {BFD_RELOC_64_PCREL, R_ALPHA_SREL64},
1048 {BFD_RELOC_ALPHA_GPREL_HI16, R_ALPHA_GPRELHIGH},
1049 {BFD_RELOC_ALPHA_GPREL_LO16, R_ALPHA_GPRELLOW},
1050 {BFD_RELOC_GPREL16, R_ALPHA_GPREL16},
7793f4d0 1051 {BFD_RELOC_ALPHA_BRSGP, R_ALPHA_BRSGP},
3765b1be
RH
1052 {BFD_RELOC_ALPHA_TLSGD, R_ALPHA_TLSGD},
1053 {BFD_RELOC_ALPHA_TLSLDM, R_ALPHA_TLSLDM},
1054 {BFD_RELOC_ALPHA_DTPMOD64, R_ALPHA_DTPMOD64},
1055 {BFD_RELOC_ALPHA_GOTDTPREL16, R_ALPHA_GOTDTPREL},
1056 {BFD_RELOC_ALPHA_DTPREL64, R_ALPHA_DTPREL64},
1057 {BFD_RELOC_ALPHA_DTPREL_HI16, R_ALPHA_DTPRELHI},
1058 {BFD_RELOC_ALPHA_DTPREL_LO16, R_ALPHA_DTPRELLO},
1059 {BFD_RELOC_ALPHA_DTPREL16, R_ALPHA_DTPREL16},
1060 {BFD_RELOC_ALPHA_GOTTPREL16, R_ALPHA_GOTTPREL},
1061 {BFD_RELOC_ALPHA_TPREL64, R_ALPHA_TPREL64},
1062 {BFD_RELOC_ALPHA_TPREL_HI16, R_ALPHA_TPRELHI},
1063 {BFD_RELOC_ALPHA_TPREL_LO16, R_ALPHA_TPRELLO},
1064 {BFD_RELOC_ALPHA_TPREL16, R_ALPHA_TPREL16},
252b5132
RH
1065};
1066
1067/* Given a BFD reloc type, return a HOWTO structure. */
1068
1069static reloc_howto_type *
a7519a3c
RH
1070elf64_alpha_bfd_reloc_type_lookup (bfd *abfd ATTRIBUTE_UNUSED,
1071 bfd_reloc_code_real_type code)
252b5132
RH
1072{
1073 const struct elf_reloc_map *i, *e;
1074 i = e = elf64_alpha_reloc_map;
1075 e += sizeof (elf64_alpha_reloc_map) / sizeof (struct elf_reloc_map);
1076 for (; i != e; ++i)
1077 {
1078 if (i->bfd_reloc_val == code)
1079 return &elf64_alpha_howto_table[i->elf_reloc_val];
1080 }
1081 return 0;
1082}
1083
157090f7
AM
1084static reloc_howto_type *
1085elf64_alpha_bfd_reloc_name_lookup (bfd *abfd ATTRIBUTE_UNUSED,
1086 const char *r_name)
1087{
1088 unsigned int i;
1089
1090 for (i = 0;
1091 i < (sizeof (elf64_alpha_howto_table)
1092 / sizeof (elf64_alpha_howto_table[0]));
1093 i++)
1094 if (elf64_alpha_howto_table[i].name != NULL
1095 && strcasecmp (elf64_alpha_howto_table[i].name, r_name) == 0)
1096 return &elf64_alpha_howto_table[i];
1097
1098 return NULL;
1099}
1100
252b5132
RH
1101/* Given an Alpha ELF reloc type, fill in an arelent structure. */
1102
f3185997 1103static bfd_boolean
0aa13fee 1104elf64_alpha_info_to_howto (bfd *abfd, arelent *cache_ptr,
a7519a3c 1105 Elf_Internal_Rela *dst)
252b5132 1106{
a7519a3c 1107 unsigned r_type = ELF64_R_TYPE(dst->r_info);
cd21f5da
NC
1108
1109 if (r_type >= R_ALPHA_max)
1110 {
695344c0 1111 /* xgettext:c-format */
0aa13fee 1112 _bfd_error_handler (_("%pB: unsupported relocation type %#x"),
4eca0228 1113 abfd, r_type);
cd21f5da 1114 bfd_set_error (bfd_error_bad_value);
f3185997 1115 return FALSE;
cd21f5da 1116 }
252b5132 1117 cache_ptr->howto = &elf64_alpha_howto_table[r_type];
f3185997 1118 return TRUE;
252b5132 1119}
3765b1be
RH
1120
1121/* These two relocations create a two-word entry in the got. */
1122#define alpha_got_entry_size(r_type) \
1123 (r_type == R_ALPHA_TLSGD || r_type == R_ALPHA_TLSLDM ? 16 : 8)
9e756d64
RH
1124
1125/* This is PT_TLS segment p_vaddr. */
e1918d23
AM
1126#define alpha_get_dtprel_base(info) \
1127 (elf_hash_table (info)->tls_sec->vma)
9e756d64
RH
1128
1129/* Main program TLS (whose template starts at PT_TLS p_vaddr)
1130 is assigned offset round(16, PT_TLS p_align). */
e1918d23
AM
1131#define alpha_get_tprel_base(info) \
1132 (elf_hash_table (info)->tls_sec->vma \
1133 - align_power ((bfd_vma) 16, \
1134 elf_hash_table (info)->tls_sec->alignment_power))
252b5132 1135\f
a7519a3c
RH
1136/* Handle an Alpha specific section when reading an object file. This
1137 is called when bfd_section_from_shdr finds a section with an unknown
1138 type.
1139 FIXME: We need to handle the SHF_ALPHA_GPREL flag, but I'm not sure
1140 how to. */
252b5132 1141
a7519a3c
RH
1142static bfd_boolean
1143elf64_alpha_section_from_shdr (bfd *abfd,
1144 Elf_Internal_Shdr *hdr,
1145 const char *name,
1146 int shindex)
252b5132 1147{
a7519a3c
RH
1148 asection *newsect;
1149
1150 /* There ought to be a place to keep ELF backend specific flags, but
1151 at the moment there isn't one. We just keep track of the
1152 sections by their name, instead. Fortunately, the ABI gives
1153 suggested names for all the MIPS specific sections, so we will
1154 probably get away with this. */
1155 switch (hdr->sh_type)
1156 {
1157 case SHT_ALPHA_DEBUG:
1158 if (strcmp (name, ".mdebug") != 0)
1159 return FALSE;
1160 break;
1161 default:
1162 return FALSE;
1163 }
252b5132 1164
a7519a3c
RH
1165 if (! _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex))
1166 return FALSE;
1167 newsect = hdr->bfd_section;
252b5132 1168
a7519a3c 1169 if (hdr->sh_type == SHT_ALPHA_DEBUG)
252b5132 1170 {
fd361982
AM
1171 if (!bfd_set_section_flags (newsect,
1172 bfd_section_flags (newsect) | SEC_DEBUGGING))
a7519a3c 1173 return FALSE;
252b5132 1174 }
a7519a3c
RH
1175
1176 return TRUE;
252b5132
RH
1177}
1178
a7519a3c
RH
1179/* Convert Alpha specific section flags to bfd internal section flags. */
1180
b34976b6 1181static bfd_boolean
a7519a3c 1182elf64_alpha_section_flags (flagword *flags, const Elf_Internal_Shdr *hdr)
252b5132 1183{
a7519a3c
RH
1184 if (hdr->sh_flags & SHF_ALPHA_GPREL)
1185 *flags |= SEC_SMALL_DATA;
252b5132 1186
a7519a3c
RH
1187 return TRUE;
1188}
252b5132 1189
a7519a3c
RH
1190/* Set the correct type for an Alpha ELF section. We do this by the
1191 section name, which is a hack, but ought to work. */
9e756d64 1192
a7519a3c
RH
1193static bfd_boolean
1194elf64_alpha_fake_sections (bfd *abfd, Elf_Internal_Shdr *hdr, asection *sec)
1195{
1196 register const char *name;
1197
fd361982 1198 name = bfd_section_name (sec);
a7519a3c
RH
1199
1200 if (strcmp (name, ".mdebug") == 0)
252b5132 1201 {
a7519a3c
RH
1202 hdr->sh_type = SHT_ALPHA_DEBUG;
1203 /* In a shared object on Irix 5.3, the .mdebug section has an
07d6d2b8 1204 entsize of 0. FIXME: Does this matter? */
a7519a3c
RH
1205 if ((abfd->flags & DYNAMIC) != 0 )
1206 hdr->sh_entsize = 0;
1207 else
1208 hdr->sh_entsize = 1;
252b5132 1209 }
a7519a3c
RH
1210 else if ((sec->flags & SEC_SMALL_DATA)
1211 || strcmp (name, ".sdata") == 0
1212 || strcmp (name, ".sbss") == 0
1213 || strcmp (name, ".lit4") == 0
1214 || strcmp (name, ".lit8") == 0)
1215 hdr->sh_flags |= SHF_ALPHA_GPREL;
252b5132 1216
a7519a3c
RH
1217 return TRUE;
1218}
252b5132 1219
a7519a3c
RH
1220/* Hook called by the linker routine which adds symbols from an object
1221 file. We use it to put .comm items in .sbss, and not .bss. */
1222
1223static bfd_boolean
1224elf64_alpha_add_symbol_hook (bfd *abfd, struct bfd_link_info *info,
1225 Elf_Internal_Sym *sym,
1226 const char **namep ATTRIBUTE_UNUSED,
1227 flagword *flagsp ATTRIBUTE_UNUSED,
1228 asection **secp, bfd_vma *valp)
1229{
1230 if (sym->st_shndx == SHN_COMMON
0e1862bb 1231 && !bfd_link_relocatable (info)
a7519a3c 1232 && sym->st_size <= elf_gp_size (abfd))
252b5132 1233 {
a7519a3c
RH
1234 /* Common symbols less than or equal to -G nn bytes are
1235 automatically put into .sbss. */
ffcb7aff 1236
a7519a3c 1237 asection *scomm = bfd_get_section_by_name (abfd, ".scommon");
252b5132 1238
a7519a3c 1239 if (scomm == NULL)
252b5132 1240 {
a7519a3c
RH
1241 scomm = bfd_make_section_with_flags (abfd, ".scommon",
1242 (SEC_ALLOC
1243 | SEC_IS_COMMON
1244 | SEC_LINKER_CREATED));
1245 if (scomm == NULL)
1246 return FALSE;
1247 }
ffcb7aff 1248
a7519a3c
RH
1249 *secp = scomm;
1250 *valp = sym->st_size;
1251 }
ffcb7aff 1252
a7519a3c
RH
1253 return TRUE;
1254}
252b5132 1255
a7519a3c 1256/* Create the .got section. */
252b5132 1257
a7519a3c
RH
1258static bfd_boolean
1259elf64_alpha_create_got_section (bfd *abfd,
1260 struct bfd_link_info *info ATTRIBUTE_UNUSED)
1261{
85d162e6 1262 flagword flags;
a7519a3c 1263 asection *s;
252b5132 1264
0ffa91dd
NC
1265 if (! is_alpha_elf (abfd))
1266 return FALSE;
1267
85d162e6
AM
1268 flags = (SEC_ALLOC | SEC_LOAD | SEC_HAS_CONTENTS | SEC_IN_MEMORY
1269 | SEC_LINKER_CREATED);
1270 s = bfd_make_section_anyway_with_flags (abfd, ".got", flags);
a7519a3c 1271 if (s == NULL
fd361982 1272 || !bfd_set_section_alignment (s, 3))
a7519a3c 1273 return FALSE;
252b5132 1274
a7519a3c 1275 alpha_elf_tdata (abfd)->got = s;
252b5132 1276
85d162e6
AM
1277 /* Make sure the object's gotobj is set to itself so that we default
1278 to every object with its own .got. We'll merge .gots later once
1279 we've collected each object's info. */
1280 alpha_elf_tdata (abfd)->gotobj = abfd;
1281
a7519a3c
RH
1282 return TRUE;
1283}
252b5132 1284
a7519a3c 1285/* Create all the dynamic sections. */
252b5132 1286
a7519a3c
RH
1287static bfd_boolean
1288elf64_alpha_create_dynamic_sections (bfd *abfd, struct bfd_link_info *info)
1289{
1290 asection *s;
85d162e6 1291 flagword flags;
a7519a3c 1292 struct elf_link_hash_entry *h;
252b5132 1293
0ffa91dd
NC
1294 if (! is_alpha_elf (abfd))
1295 return FALSE;
1296
a7519a3c 1297 /* We need to create .plt, .rela.plt, .got, and .rela.got sections. */
252b5132 1298
85d162e6
AM
1299 flags = (SEC_ALLOC | SEC_LOAD | SEC_CODE | SEC_HAS_CONTENTS | SEC_IN_MEMORY
1300 | SEC_LINKER_CREATED
1301 | (elf64_alpha_use_secureplt ? SEC_READONLY : 0));
1302 s = bfd_make_section_anyway_with_flags (abfd, ".plt", flags);
ce558b89 1303 elf_hash_table (info)->splt = s;
fd361982 1304 if (s == NULL || ! bfd_set_section_alignment (s, 4))
a7519a3c 1305 return FALSE;
252b5132 1306
a7519a3c
RH
1307 /* Define the symbol _PROCEDURE_LINKAGE_TABLE_ at the start of the
1308 .plt section. */
7325306f
RS
1309 h = _bfd_elf_define_linkage_sym (abfd, info, s,
1310 "_PROCEDURE_LINKAGE_TABLE_");
1311 elf_hash_table (info)->hplt = h;
1312 if (h == NULL)
a7519a3c 1313 return FALSE;
d6ad34f6 1314
85d162e6
AM
1315 flags = (SEC_ALLOC | SEC_LOAD | SEC_HAS_CONTENTS | SEC_IN_MEMORY
1316 | SEC_LINKER_CREATED | SEC_READONLY);
1317 s = bfd_make_section_anyway_with_flags (abfd, ".rela.plt", flags);
ce558b89 1318 elf_hash_table (info)->srelplt = s;
fd361982 1319 if (s == NULL || ! bfd_set_section_alignment (s, 3))
a7519a3c 1320 return FALSE;
252b5132 1321
6ec7057a
RH
1322 if (elf64_alpha_use_secureplt)
1323 {
85d162e6
AM
1324 flags = SEC_ALLOC | SEC_LINKER_CREATED;
1325 s = bfd_make_section_anyway_with_flags (abfd, ".got.plt", flags);
ce558b89 1326 elf_hash_table (info)->sgotplt = s;
fd361982 1327 if (s == NULL || ! bfd_set_section_alignment (s, 3))
6ec7057a
RH
1328 return FALSE;
1329 }
1330
a7519a3c
RH
1331 /* We may or may not have created a .got section for this object, but
1332 we definitely havn't done the rest of the work. */
1cd6895c 1333
85d162e6
AM
1334 if (alpha_elf_tdata(abfd)->gotobj == NULL)
1335 {
1336 if (!elf64_alpha_create_got_section (abfd, info))
1337 return FALSE;
1338 }
1cd6895c 1339
85d162e6
AM
1340 flags = (SEC_ALLOC | SEC_LOAD | SEC_HAS_CONTENTS | SEC_IN_MEMORY
1341 | SEC_LINKER_CREATED | SEC_READONLY);
1342 s = bfd_make_section_anyway_with_flags (abfd, ".rela.got", flags);
ce558b89 1343 elf_hash_table (info)->srelgot = s;
a7519a3c 1344 if (s == NULL
fd361982 1345 || !bfd_set_section_alignment (s, 3))
a7519a3c 1346 return FALSE;
252b5132 1347
a7519a3c
RH
1348 /* Define the symbol _GLOBAL_OFFSET_TABLE_ at the start of the
1349 dynobj's .got section. We don't do this in the linker script
1350 because we don't want to define the symbol if we are not creating
1351 a global offset table. */
d98685ac
AM
1352 h = _bfd_elf_define_linkage_sym (abfd, info, alpha_elf_tdata(abfd)->got,
1353 "_GLOBAL_OFFSET_TABLE_");
a7519a3c 1354 elf_hash_table (info)->hgot = h;
d98685ac
AM
1355 if (h == NULL)
1356 return FALSE;
252b5132 1357
a7519a3c 1358 return TRUE;
252b5132 1359}
a7519a3c
RH
1360\f
1361/* Read ECOFF debugging information from a .mdebug section into a
1362 ecoff_debug_info structure. */
252b5132 1363
a7519a3c
RH
1364static bfd_boolean
1365elf64_alpha_read_ecoff_info (bfd *abfd, asection *section,
1366 struct ecoff_debug_info *debug)
252b5132 1367{
a7519a3c
RH
1368 HDRR *symhdr;
1369 const struct ecoff_debug_swap *swap;
1370 char *ext_hdr = NULL;
252b5132 1371
a7519a3c
RH
1372 swap = get_elf_backend_data (abfd)->elf_backend_ecoff_debug_swap;
1373 memset (debug, 0, sizeof (*debug));
252b5132 1374
a7519a3c
RH
1375 ext_hdr = (char *) bfd_malloc (swap->external_hdr_size);
1376 if (ext_hdr == NULL && swap->external_hdr_size != 0)
1377 goto error_return;
252b5132 1378
a7519a3c
RH
1379 if (! bfd_get_section_contents (abfd, section, ext_hdr, (file_ptr) 0,
1380 swap->external_hdr_size))
1381 goto error_return;
252b5132 1382
a7519a3c
RH
1383 symhdr = &debug->symbolic_header;
1384 (*swap->swap_hdr_in) (abfd, ext_hdr, symhdr);
252b5132 1385
a7519a3c
RH
1386 /* The symbolic header contains absolute file offsets and sizes to
1387 read. */
1388#define READ(ptr, offset, count, size, type) \
1389 if (symhdr->count == 0) \
1390 debug->ptr = NULL; \
1391 else \
1392 { \
1393 bfd_size_type amt = (bfd_size_type) size * symhdr->count; \
1394 debug->ptr = (type) bfd_malloc (amt); \
1395 if (debug->ptr == NULL) \
1396 goto error_return; \
1397 if (bfd_seek (abfd, (file_ptr) symhdr->offset, SEEK_SET) != 0 \
1398 || bfd_bread (debug->ptr, amt, abfd) != amt) \
1399 goto error_return; \
1400 }
fe8bc63d 1401
a7519a3c 1402 READ (line, cbLineOffset, cbLine, sizeof (unsigned char), unsigned char *);
2c3fc389
NC
1403 READ (external_dnr, cbDnOffset, idnMax, swap->external_dnr_size, void *);
1404 READ (external_pdr, cbPdOffset, ipdMax, swap->external_pdr_size, void *);
1405 READ (external_sym, cbSymOffset, isymMax, swap->external_sym_size, void *);
1406 READ (external_opt, cbOptOffset, ioptMax, swap->external_opt_size, void *);
a7519a3c
RH
1407 READ (external_aux, cbAuxOffset, iauxMax, sizeof (union aux_ext),
1408 union aux_ext *);
1409 READ (ss, cbSsOffset, issMax, sizeof (char), char *);
1410 READ (ssext, cbSsExtOffset, issExtMax, sizeof (char), char *);
2c3fc389
NC
1411 READ (external_fdr, cbFdOffset, ifdMax, swap->external_fdr_size, void *);
1412 READ (external_rfd, cbRfdOffset, crfd, swap->external_rfd_size, void *);
1413 READ (external_ext, cbExtOffset, iextMax, swap->external_ext_size, void *);
a7519a3c 1414#undef READ
252b5132 1415
a7519a3c 1416 debug->fdr = NULL;
252b5132 1417
a7519a3c 1418 return TRUE;
252b5132 1419
a7519a3c
RH
1420 error_return:
1421 if (ext_hdr != NULL)
1422 free (ext_hdr);
1423 if (debug->line != NULL)
1424 free (debug->line);
1425 if (debug->external_dnr != NULL)
1426 free (debug->external_dnr);
1427 if (debug->external_pdr != NULL)
1428 free (debug->external_pdr);
1429 if (debug->external_sym != NULL)
1430 free (debug->external_sym);
1431 if (debug->external_opt != NULL)
1432 free (debug->external_opt);
1433 if (debug->external_aux != NULL)
1434 free (debug->external_aux);
1435 if (debug->ss != NULL)
1436 free (debug->ss);
1437 if (debug->ssext != NULL)
1438 free (debug->ssext);
1439 if (debug->external_fdr != NULL)
1440 free (debug->external_fdr);
1441 if (debug->external_rfd != NULL)
1442 free (debug->external_rfd);
1443 if (debug->external_ext != NULL)
1444 free (debug->external_ext);
1445 return FALSE;
252b5132
RH
1446}
1447
a7519a3c
RH
1448/* Alpha ELF local labels start with '$'. */
1449
b34976b6 1450static bfd_boolean
a7519a3c 1451elf64_alpha_is_local_label_name (bfd *abfd ATTRIBUTE_UNUSED, const char *name)
252b5132 1452{
a7519a3c
RH
1453 return name[0] == '$';
1454}
9e756d64 1455
a7519a3c 1456static bfd_boolean
fb167eb2
AM
1457elf64_alpha_find_nearest_line (bfd *abfd, asymbol **symbols,
1458 asection *section, bfd_vma offset,
1459 const char **filename_ptr,
a7519a3c 1460 const char **functionname_ptr,
fb167eb2
AM
1461 unsigned int *line_ptr,
1462 unsigned int *discriminator_ptr)
a7519a3c
RH
1463{
1464 asection *msec;
252b5132 1465
fb167eb2 1466 if (_bfd_dwarf2_find_nearest_line (abfd, symbols, NULL, section, offset,
a7519a3c 1467 filename_ptr, functionname_ptr,
fb167eb2 1468 line_ptr, discriminator_ptr,
9defd221 1469 dwarf_debug_sections,
a7519a3c 1470 &elf_tdata (abfd)->dwarf2_find_line_info))
b34976b6 1471 return TRUE;
9e756d64 1472
a7519a3c
RH
1473 msec = bfd_get_section_by_name (abfd, ".mdebug");
1474 if (msec != NULL)
1bbc9cec 1475 {
a7519a3c 1476 flagword origflags;
698600e4 1477 struct alpha_elf_find_line *fi;
a7519a3c
RH
1478 const struct ecoff_debug_swap * const swap =
1479 get_elf_backend_data (abfd)->elf_backend_ecoff_debug_swap;
252b5132 1480
a7519a3c
RH
1481 /* If we are called during a link, alpha_elf_final_link may have
1482 cleared the SEC_HAS_CONTENTS field. We force it back on here
1483 if appropriate (which it normally will be). */
1484 origflags = msec->flags;
1485 if (elf_section_data (msec)->this_hdr.sh_type != SHT_NOBITS)
1486 msec->flags |= SEC_HAS_CONTENTS;
9e756d64 1487
698600e4 1488 fi = alpha_elf_tdata (abfd)->find_line_info;
a7519a3c
RH
1489 if (fi == NULL)
1490 {
1491 bfd_size_type external_fdr_size;
1492 char *fraw_src;
1493 char *fraw_end;
1494 struct fdr *fdr_ptr;
698600e4 1495 bfd_size_type amt = sizeof (struct alpha_elf_find_line);
9e756d64 1496
698600e4 1497 fi = (struct alpha_elf_find_line *) bfd_zalloc (abfd, amt);
a7519a3c
RH
1498 if (fi == NULL)
1499 {
1500 msec->flags = origflags;
1501 return FALSE;
1502 }
9e756d64 1503
a7519a3c
RH
1504 if (!elf64_alpha_read_ecoff_info (abfd, msec, &fi->d))
1505 {
1506 msec->flags = origflags;
1507 return FALSE;
1508 }
9e756d64 1509
a7519a3c
RH
1510 /* Swap in the FDR information. */
1511 amt = fi->d.symbolic_header.ifdMax * sizeof (struct fdr);
1512 fi->d.fdr = (struct fdr *) bfd_alloc (abfd, amt);
1513 if (fi->d.fdr == NULL)
1514 {
1515 msec->flags = origflags;
1516 return FALSE;
1517 }
1518 external_fdr_size = swap->external_fdr_size;
1519 fdr_ptr = fi->d.fdr;
1520 fraw_src = (char *) fi->d.external_fdr;
1521 fraw_end = (fraw_src
1522 + fi->d.symbolic_header.ifdMax * external_fdr_size);
1523 for (; fraw_src < fraw_end; fraw_src += external_fdr_size, fdr_ptr++)
2c3fc389 1524 (*swap->swap_fdr_in) (abfd, fraw_src, fdr_ptr);
9e756d64 1525
698600e4 1526 alpha_elf_tdata (abfd)->find_line_info = fi;
9e756d64 1527
a7519a3c 1528 /* Note that we don't bother to ever free this information.
07d6d2b8
AM
1529 find_nearest_line is either called all the time, as in
1530 objdump -l, so the information should be saved, or it is
1531 rarely called, as in ld error messages, so the memory
1532 wasted is unimportant. Still, it would probably be a
1533 good idea for free_cached_info to throw it away. */
a7519a3c 1534 }
9e756d64 1535
a7519a3c
RH
1536 if (_bfd_ecoff_locate_line (abfd, section, offset, &fi->d, swap,
1537 &fi->i, filename_ptr, functionname_ptr,
1538 line_ptr))
1539 {
1540 msec->flags = origflags;
1541 return TRUE;
1542 }
9e756d64 1543
a7519a3c 1544 msec->flags = origflags;
9e756d64 1545 }
9e756d64 1546
a7519a3c 1547 /* Fall back on the generic ELF find_nearest_line routine. */
9e756d64 1548
fb167eb2 1549 return _bfd_elf_find_nearest_line (abfd, symbols, section, offset,
a7519a3c 1550 filename_ptr, functionname_ptr,
fb167eb2 1551 line_ptr, discriminator_ptr);
9e756d64 1552}
a7519a3c
RH
1553\f
1554/* Structure used to pass information to alpha_elf_output_extsym. */
9e756d64 1555
a7519a3c 1556struct extsym_info
9e756d64 1557{
a7519a3c
RH
1558 bfd *abfd;
1559 struct bfd_link_info *info;
1560 struct ecoff_debug_info *debug;
1561 const struct ecoff_debug_swap *swap;
1562 bfd_boolean failed;
1563};
9e756d64 1564
a7519a3c 1565static bfd_boolean
2c3fc389 1566elf64_alpha_output_extsym (struct alpha_elf_link_hash_entry *h, void * data)
a7519a3c
RH
1567{
1568 struct extsym_info *einfo = (struct extsym_info *) data;
1569 bfd_boolean strip;
1570 asection *sec, *output_section;
9e756d64 1571
a7519a3c
RH
1572 if (h->root.indx == -2)
1573 strip = FALSE;
1574 else if ((h->root.def_dynamic
1575 || h->root.ref_dynamic
1576 || h->root.root.type == bfd_link_hash_new)
1577 && !h->root.def_regular
1578 && !h->root.ref_regular)
1579 strip = TRUE;
1580 else if (einfo->info->strip == strip_all
1581 || (einfo->info->strip == strip_some
1582 && bfd_hash_lookup (einfo->info->keep_hash,
1583 h->root.root.root.string,
1584 FALSE, FALSE) == NULL))
1585 strip = TRUE;
1586 else
1587 strip = FALSE;
9e756d64 1588
a7519a3c 1589 if (strip)
b34976b6 1590 return TRUE;
9e756d64 1591
a7519a3c 1592 if (h->esym.ifd == -2)
9e756d64 1593 {
a7519a3c
RH
1594 h->esym.jmptbl = 0;
1595 h->esym.cobol_main = 0;
1596 h->esym.weakext = 0;
1597 h->esym.reserved = 0;
1598 h->esym.ifd = ifdNil;
1599 h->esym.asym.value = 0;
1600 h->esym.asym.st = stGlobal;
9e756d64 1601
a7519a3c
RH
1602 if (h->root.root.type != bfd_link_hash_defined
1603 && h->root.root.type != bfd_link_hash_defweak)
1604 h->esym.asym.sc = scAbs;
1605 else
1606 {
1607 const char *name;
9e756d64 1608
a7519a3c
RH
1609 sec = h->root.root.u.def.section;
1610 output_section = sec->output_section;
9e756d64 1611
a7519a3c
RH
1612 /* When making a shared library and symbol h is the one from
1613 the another shared library, OUTPUT_SECTION may be null. */
1614 if (output_section == NULL)
1615 h->esym.asym.sc = scUndefined;
1616 else
1617 {
fd361982 1618 name = bfd_section_name (output_section);
9e756d64 1619
a7519a3c
RH
1620 if (strcmp (name, ".text") == 0)
1621 h->esym.asym.sc = scText;
1622 else if (strcmp (name, ".data") == 0)
1623 h->esym.asym.sc = scData;
1624 else if (strcmp (name, ".sdata") == 0)
1625 h->esym.asym.sc = scSData;
1626 else if (strcmp (name, ".rodata") == 0
1627 || strcmp (name, ".rdata") == 0)
1628 h->esym.asym.sc = scRData;
1629 else if (strcmp (name, ".bss") == 0)
1630 h->esym.asym.sc = scBss;
1631 else if (strcmp (name, ".sbss") == 0)
1632 h->esym.asym.sc = scSBss;
1633 else if (strcmp (name, ".init") == 0)
1634 h->esym.asym.sc = scInit;
1635 else if (strcmp (name, ".fini") == 0)
1636 h->esym.asym.sc = scFini;
1637 else
1638 h->esym.asym.sc = scAbs;
1639 }
1640 }
9e756d64 1641
a7519a3c
RH
1642 h->esym.asym.reserved = 0;
1643 h->esym.asym.index = indexNil;
1644 }
9e756d64 1645
a7519a3c
RH
1646 if (h->root.root.type == bfd_link_hash_common)
1647 h->esym.asym.value = h->root.root.u.c.size;
1648 else if (h->root.root.type == bfd_link_hash_defined
1649 || h->root.root.type == bfd_link_hash_defweak)
1650 {
1651 if (h->esym.asym.sc == scCommon)
1652 h->esym.asym.sc = scBss;
1653 else if (h->esym.asym.sc == scSCommon)
1654 h->esym.asym.sc = scSBss;
9e756d64 1655
a7519a3c
RH
1656 sec = h->root.root.u.def.section;
1657 output_section = sec->output_section;
1658 if (output_section != NULL)
1659 h->esym.asym.value = (h->root.root.u.def.value
1660 + sec->output_offset
1661 + output_section->vma);
1662 else
1663 h->esym.asym.value = 0;
1664 }
9e756d64 1665
a7519a3c
RH
1666 if (! bfd_ecoff_debug_one_external (einfo->abfd, einfo->debug, einfo->swap,
1667 h->root.root.root.string,
1668 &h->esym))
1669 {
1670 einfo->failed = TRUE;
1671 return FALSE;
9e756d64
RH
1672 }
1673
a7519a3c
RH
1674 return TRUE;
1675}
1676\f
1677/* Search for and possibly create a got entry. */
9e756d64 1678
a7519a3c
RH
1679static struct alpha_elf_got_entry *
1680get_got_entry (bfd *abfd, struct alpha_elf_link_hash_entry *h,
1681 unsigned long r_type, unsigned long r_symndx,
1682 bfd_vma r_addend)
1683{
1684 struct alpha_elf_got_entry *gotent;
1685 struct alpha_elf_got_entry **slot;
9e756d64 1686
a7519a3c
RH
1687 if (h)
1688 slot = &h->got_entries;
1689 else
1690 {
1691 /* This is a local .got entry -- record for merge. */
9e756d64 1692
a7519a3c 1693 struct alpha_elf_got_entry **local_got_entries;
9e756d64 1694
a7519a3c
RH
1695 local_got_entries = alpha_elf_tdata(abfd)->local_got_entries;
1696 if (!local_got_entries)
1697 {
1698 bfd_size_type size;
1699 Elf_Internal_Shdr *symtab_hdr;
9e756d64 1700
a7519a3c
RH
1701 symtab_hdr = &elf_tdata(abfd)->symtab_hdr;
1702 size = symtab_hdr->sh_info;
1703 size *= sizeof (struct alpha_elf_got_entry *);
9e756d64 1704
a7519a3c
RH
1705 local_got_entries
1706 = (struct alpha_elf_got_entry **) bfd_zalloc (abfd, size);
1707 if (!local_got_entries)
1708 return NULL;
1709
1710 alpha_elf_tdata (abfd)->local_got_entries = local_got_entries;
1711 }
1712
1713 slot = &local_got_entries[r_symndx];
9e756d64
RH
1714 }
1715
a7519a3c
RH
1716 for (gotent = *slot; gotent ; gotent = gotent->next)
1717 if (gotent->gotobj == abfd
1718 && gotent->reloc_type == r_type
1719 && gotent->addend == r_addend)
1720 break;
1721
1722 if (!gotent)
9e756d64 1723 {
a7519a3c
RH
1724 int entry_size;
1725 bfd_size_type amt;
9e756d64 1726
a7519a3c
RH
1727 amt = sizeof (struct alpha_elf_got_entry);
1728 gotent = (struct alpha_elf_got_entry *) bfd_alloc (abfd, amt);
1729 if (!gotent)
1730 return NULL;
9e756d64 1731
a7519a3c
RH
1732 gotent->gotobj = abfd;
1733 gotent->addend = r_addend;
1734 gotent->got_offset = -1;
6ec7057a 1735 gotent->plt_offset = -1;
a7519a3c
RH
1736 gotent->use_count = 1;
1737 gotent->reloc_type = r_type;
1738 gotent->reloc_done = 0;
1739 gotent->reloc_xlated = 0;
9e756d64 1740
a7519a3c
RH
1741 gotent->next = *slot;
1742 *slot = gotent;
9e756d64 1743
a7519a3c
RH
1744 entry_size = alpha_got_entry_size (r_type);
1745 alpha_elf_tdata (abfd)->total_got_size += entry_size;
1746 if (!h)
1747 alpha_elf_tdata(abfd)->local_got_size += entry_size;
9e756d64 1748 }
a7519a3c
RH
1749 else
1750 gotent->use_count += 1;
9e756d64 1751
a7519a3c 1752 return gotent;
9e756d64
RH
1753}
1754
6ec7057a
RH
1755static bfd_boolean
1756elf64_alpha_want_plt (struct alpha_elf_link_hash_entry *ah)
1757{
1758 return ((ah->root.type == STT_FUNC
1759 || ah->root.root.type == bfd_link_hash_undefweak
1760 || ah->root.root.type == bfd_link_hash_undefined)
8288a39e
RH
1761 && (ah->flags & ALPHA_ELF_LINK_HASH_LU_PLT) != 0
1762 && (ah->flags & ~ALPHA_ELF_LINK_HASH_LU_PLT) == 0);
6ec7057a
RH
1763}
1764
6fc5bb57
AM
1765/* Whether to sort relocs output by ld -r or ld --emit-relocs, by r_offset.
1766 Don't do so for code sections. We want to keep ordering of LITERAL/LITUSE
1767 as is. On the other hand, elf-eh-frame.c processing requires .eh_frame
1768 relocs to be sorted. */
1769
1770static bfd_boolean
1771elf64_alpha_sort_relocs_p (asection *sec)
1772{
1773 return (sec->flags & SEC_CODE) == 0;
1774}
1775
1776
a7519a3c
RH
1777/* Handle dynamic relocations when doing an Alpha ELF link. */
1778
b34976b6 1779static bfd_boolean
a7519a3c
RH
1780elf64_alpha_check_relocs (bfd *abfd, struct bfd_link_info *info,
1781 asection *sec, const Elf_Internal_Rela *relocs)
252b5132 1782{
a7519a3c
RH
1783 bfd *dynobj;
1784 asection *sreloc;
252b5132 1785 Elf_Internal_Shdr *symtab_hdr;
a7519a3c
RH
1786 struct alpha_elf_link_hash_entry **sym_hashes;
1787 const Elf_Internal_Rela *rel, *relend;
a7519a3c 1788 bfd_size_type amt;
252b5132 1789
0e1862bb 1790 if (bfd_link_relocatable (info))
a7519a3c 1791 return TRUE;
252b5132 1792
a7519a3c
RH
1793 /* Don't do anything special with non-loaded, non-alloced sections.
1794 In particular, any relocs in such sections should not affect GOT
1795 and PLT reference counting (ie. we don't allow them to create GOT
1796 or PLT entries), there's no possibility or desire to optimize TLS
1797 relocs, and there's not much point in propagating relocs to shared
1798 libs that the dynamic linker won't relocate. */
1799 if ((sec->flags & SEC_ALLOC) == 0)
b34976b6 1800 return TRUE;
252b5132 1801
0ffa91dd
NC
1802 BFD_ASSERT (is_alpha_elf (abfd));
1803
1804 dynobj = elf_hash_table (info)->dynobj;
a7519a3c 1805 if (dynobj == NULL)
0ffa91dd 1806 elf_hash_table (info)->dynobj = dynobj = abfd;
252b5132 1807
a7519a3c 1808 sreloc = NULL;
0ffa91dd
NC
1809 symtab_hdr = &elf_symtab_hdr (abfd);
1810 sym_hashes = alpha_elf_sym_hashes (abfd);
a7519a3c
RH
1811
1812 relend = relocs + sec->reloc_count;
1813 for (rel = relocs; rel < relend; ++rel)
1814 {
1815 enum {
1816 NEED_GOT = 1,
1817 NEED_GOT_ENTRY = 2,
1818 NEED_DYNREL = 4
1819 };
1820
1821 unsigned long r_symndx, r_type;
1822 struct alpha_elf_link_hash_entry *h;
1823 unsigned int gotent_flags;
1824 bfd_boolean maybe_dynamic;
1825 unsigned int need;
1826 bfd_vma addend;
1827
1828 r_symndx = ELF64_R_SYM (rel->r_info);
1829 if (r_symndx < symtab_hdr->sh_info)
1830 h = NULL;
1831 else
1832 {
1833 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
252b5132 1834
a7519a3c
RH
1835 while (h->root.root.type == bfd_link_hash_indirect
1836 || h->root.root.type == bfd_link_hash_warning)
1837 h = (struct alpha_elf_link_hash_entry *)h->root.root.u.i.link;
252b5132 1838
81fbe831
AM
1839 /* PR15323, ref flags aren't set for references in the same
1840 object. */
a7519a3c
RH
1841 h->root.ref_regular = 1;
1842 }
252b5132 1843
a7519a3c 1844 /* We can only get preliminary data on whether a symbol is
07d6d2b8
AM
1845 locally or externally defined, as not all of the input files
1846 have yet been processed. Do something with what we know, as
1847 this may help reduce memory usage and processing time later. */
a7519a3c 1848 maybe_dynamic = FALSE;
0e1862bb 1849 if (h && ((bfd_link_pic (info)
a7519a3c
RH
1850 && (!info->symbolic
1851 || info->unresolved_syms_in_shared_libs == RM_IGNORE))
1852 || !h->root.def_regular
1853 || h->root.root.type == bfd_link_hash_defweak))
07d6d2b8 1854 maybe_dynamic = TRUE;
252b5132 1855
a7519a3c
RH
1856 need = 0;
1857 gotent_flags = 0;
1858 r_type = ELF64_R_TYPE (rel->r_info);
1859 addend = rel->r_addend;
9e756d64 1860
9e756d64
RH
1861 switch (r_type)
1862 {
1863 case R_ALPHA_LITERAL:
a7519a3c
RH
1864 need = NEED_GOT | NEED_GOT_ENTRY;
1865
1866 /* Remember how this literal is used from its LITUSEs.
1867 This will be important when it comes to decide if we can
1868 create a .plt entry for a function symbol. */
1869 while (++rel < relend && ELF64_R_TYPE (rel->r_info) == R_ALPHA_LITUSE)
8288a39e 1870 if (rel->r_addend >= 1 && rel->r_addend <= 6)
a7519a3c
RH
1871 gotent_flags |= 1 << rel->r_addend;
1872 --rel;
1873
1874 /* No LITUSEs -- presumably the address is used somehow. */
1875 if (gotent_flags == 0)
1876 gotent_flags = ALPHA_ELF_LINK_HASH_LU_ADDR;
1877 break;
1878
1879 case R_ALPHA_GPDISP:
1880 case R_ALPHA_GPREL16:
1881 case R_ALPHA_GPREL32:
9e756d64
RH
1882 case R_ALPHA_GPRELHIGH:
1883 case R_ALPHA_GPRELLOW:
a7519a3c
RH
1884 case R_ALPHA_BRSGP:
1885 need = NEED_GOT;
1886 break;
1887
1888 case R_ALPHA_REFLONG:
1889 case R_ALPHA_REFQUAD:
0e1862bb 1890 if (bfd_link_pic (info) || maybe_dynamic)
a7519a3c 1891 need = NEED_DYNREL;
cc03ec80
RH
1892 break;
1893
9e756d64 1894 case R_ALPHA_TLSLDM:
cc03ec80 1895 /* The symbol for a TLSLDM reloc is ignored. Collapse the
cf35638d
TS
1896 reloc to the STN_UNDEF (0) symbol so that they all match. */
1897 r_symndx = STN_UNDEF;
a7519a3c
RH
1898 h = 0;
1899 maybe_dynamic = FALSE;
1900 /* FALLTHRU */
1901
1902 case R_ALPHA_TLSGD:
1903 case R_ALPHA_GOTDTPREL:
1904 need = NEED_GOT | NEED_GOT_ENTRY;
9e756d64 1905 break;
cc03ec80 1906
a7519a3c
RH
1907 case R_ALPHA_GOTTPREL:
1908 need = NEED_GOT | NEED_GOT_ENTRY;
1909 gotent_flags = ALPHA_ELF_LINK_HASH_TLS_IE;
0e1862bb 1910 if (bfd_link_pic (info))
a7519a3c
RH
1911 info->flags |= DF_STATIC_TLS;
1912 break;
1913
1914 case R_ALPHA_TPREL64:
3cbc1e5e 1915 if (bfd_link_dll (info))
e366eeae
RH
1916 {
1917 info->flags |= DF_STATIC_TLS;
1918 need = NEED_DYNREL;
1919 }
1920 else if (maybe_dynamic)
a7519a3c 1921 need = NEED_DYNREL;
a7519a3c 1922 break;
252b5132
RH
1923 }
1924
a7519a3c 1925 if (need & NEED_GOT)
252b5132 1926 {
85d162e6 1927 if (alpha_elf_tdata(abfd)->gotobj == NULL)
6cdc0ccc 1928 {
a7519a3c
RH
1929 if (!elf64_alpha_create_got_section (abfd, info))
1930 return FALSE;
c328dc3f 1931 }
252b5132 1932 }
252b5132 1933
a7519a3c
RH
1934 if (need & NEED_GOT_ENTRY)
1935 {
1936 struct alpha_elf_got_entry *gotent;
252b5132 1937
a7519a3c
RH
1938 gotent = get_got_entry (abfd, h, r_type, r_symndx, addend);
1939 if (!gotent)
1940 return FALSE;
4a67a098 1941
a7519a3c 1942 if (gotent_flags)
cc03ec80 1943 {
a7519a3c
RH
1944 gotent->flags |= gotent_flags;
1945 if (h)
1946 {
1947 gotent_flags |= h->flags;
1948 h->flags = gotent_flags;
4a67a098 1949
a7519a3c 1950 /* Make a guess as to whether a .plt entry is needed. */
6ec7057a
RH
1951 /* ??? It appears that we won't make it into
1952 adjust_dynamic_symbol for symbols that remain
1953 totally undefined. Copying this check here means
1954 we can create a plt entry for them too. */
1955 h->root.needs_plt
1956 = (maybe_dynamic && elf64_alpha_want_plt (h));
1957 }
a7519a3c 1958 }
252b5132
RH
1959 }
1960
a7519a3c 1961 if (need & NEED_DYNREL)
9e756d64 1962 {
a7519a3c
RH
1963 /* We need to create the section here now whether we eventually
1964 use it or not so that it gets mapped to an output section by
83bac4b0 1965 the linker. If not used, we'll kill it in size_dynamic_sections. */
a7519a3c 1966 if (sreloc == NULL)
9e756d64 1967 {
83bac4b0
NC
1968 sreloc = _bfd_elf_make_dynamic_reloc_section
1969 (sec, dynobj, 3, abfd, /*rela?*/ TRUE);
1970
a7519a3c 1971 if (sreloc == NULL)
83bac4b0 1972 return FALSE;
9e756d64 1973 }
252b5132 1974
a7519a3c
RH
1975 if (h)
1976 {
1977 /* Since we havn't seen all of the input symbols yet, we
1978 don't know whether we'll actually need a dynamic relocation
1979 entry for this reloc. So make a record of it. Once we
1980 find out if this thing needs dynamic relocation we'll
1981 expand the relocation sections by the appropriate amount. */
9e756d64 1982
a7519a3c 1983 struct alpha_elf_reloc_entry *rent;
9e756d64 1984
a7519a3c
RH
1985 for (rent = h->reloc_entries; rent; rent = rent->next)
1986 if (rent->rtype == r_type && rent->srel == sreloc)
1987 break;
252b5132 1988
a7519a3c
RH
1989 if (!rent)
1990 {
1991 amt = sizeof (struct alpha_elf_reloc_entry);
1992 rent = (struct alpha_elf_reloc_entry *) bfd_alloc (abfd, amt);
1993 if (!rent)
1994 return FALSE;
252b5132 1995
a7519a3c
RH
1996 rent->srel = sreloc;
1997 rent->rtype = r_type;
1998 rent->count = 1;
1999 rent->reltext = (sec->flags & SEC_READONLY) != 0;
252b5132 2000
a7519a3c
RH
2001 rent->next = h->reloc_entries;
2002 h->reloc_entries = rent;
2003 }
2004 else
2005 rent->count++;
2006 }
0e1862bb 2007 else if (bfd_link_pic (info))
a7519a3c
RH
2008 {
2009 /* If this is a shared library, and the section is to be
2010 loaded into memory, we need a RELATIVE reloc. */
2011 sreloc->size += sizeof (Elf64_External_Rela);
2012 if (sec->flags & SEC_READONLY)
2013 info->flags |= DF_TEXTREL;
2014 }
252b5132
RH
2015 }
2016 }
2017
b34976b6 2018 return TRUE;
252b5132 2019}
252b5132 2020
e117360e
RH
2021/* Return the section that should be marked against GC for a given
2022 relocation. */
2023
2024static asection *
2025elf64_alpha_gc_mark_hook (asection *sec, struct bfd_link_info *info,
2026 Elf_Internal_Rela *rel,
2027 struct elf_link_hash_entry *h, Elf_Internal_Sym *sym)
2028{
2029 /* These relocations don't really reference a symbol. Instead we store
2030 extra data in their addend slot. Ignore the symbol. */
2031 switch (ELF64_R_TYPE (rel->r_info))
2032 {
2033 case R_ALPHA_LITUSE:
2034 case R_ALPHA_GPDISP:
2035 case R_ALPHA_HINT:
2036 return NULL;
2037 }
2038
2039 return _bfd_elf_gc_mark_hook (sec, info, rel, h, sym);
2040}
2041
a7519a3c
RH
2042/* Adjust a symbol defined by a dynamic object and referenced by a
2043 regular object. The current definition is in some section of the
2044 dynamic object, but we're not including those sections. We have to
2045 change the definition to something the rest of the link can
2046 understand. */
252b5132 2047
b34976b6 2048static bfd_boolean
a7519a3c
RH
2049elf64_alpha_adjust_dynamic_symbol (struct bfd_link_info *info,
2050 struct elf_link_hash_entry *h)
252b5132 2051{
a7519a3c
RH
2052 bfd *dynobj;
2053 asection *s;
2054 struct alpha_elf_link_hash_entry *ah;
252b5132 2055
a7519a3c
RH
2056 dynobj = elf_hash_table(info)->dynobj;
2057 ah = (struct alpha_elf_link_hash_entry *)h;
252b5132 2058
a7519a3c 2059 /* Now that we've seen all of the input symbols, finalize our decision
6ec7057a
RH
2060 about whether this symbol should get a .plt entry. Irritatingly, it
2061 is common for folk to leave undefined symbols in shared libraries,
2062 and they still expect lazy binding; accept undefined symbols in lieu
2063 of STT_FUNC. */
2064 if (alpha_elf_dynamic_symbol_p (h, info) && elf64_alpha_want_plt (ah))
252b5132 2065 {
6ec7057a 2066 h->needs_plt = TRUE;
252b5132 2067
ce558b89 2068 s = elf_hash_table(info)->splt;
a7519a3c
RH
2069 if (!s && !elf64_alpha_create_dynamic_sections (dynobj, info))
2070 return FALSE;
204692d7 2071
6ec7057a
RH
2072 /* We need one plt entry per got subsection. Delay allocation of
2073 the actual plt entries until size_plt_section, called from
2074 size_dynamic_sections or during relaxation. */
252b5132 2075
a7519a3c
RH
2076 return TRUE;
2077 }
2078 else
6ec7057a 2079 h->needs_plt = FALSE;
252b5132 2080
a7519a3c
RH
2081 /* If this is a weak symbol, and there is a real definition, the
2082 processor independent code will have arranged for us to see the
2083 real definition first, and we can just use the same value. */
60d67dc8 2084 if (h->is_weakalias)
252b5132 2085 {
60d67dc8
AM
2086 struct elf_link_hash_entry *def = weakdef (h);
2087 BFD_ASSERT (def->root.type == bfd_link_hash_defined);
2088 h->root.u.def.section = def->root.u.def.section;
2089 h->root.u.def.value = def->root.u.def.value;
a7519a3c 2090 return TRUE;
252b5132 2091 }
a7519a3c
RH
2092
2093 /* This is a reference to a symbol defined by a dynamic object which
2094 is not a function. The Alpha, since it uses .got entries for all
2095 symbols even in regular objects, does not need the hackery of a
2096 .dynbss section and COPY dynamic relocations. */
252b5132 2097
b34976b6 2098 return TRUE;
252b5132
RH
2099}
2100
747ffa7b
AM
2101/* Record STO_ALPHA_NOPV and STO_ALPHA_STD_GPLOAD. */
2102
2103static void
2104elf64_alpha_merge_symbol_attribute (struct elf_link_hash_entry *h,
2105 const Elf_Internal_Sym *isym,
2106 bfd_boolean definition,
2107 bfd_boolean dynamic)
2108{
2109 if (!dynamic && definition)
2110 h->other = ((h->other & ELF_ST_VISIBILITY (-1))
2111 | (isym->st_other & ~ELF_ST_VISIBILITY (-1)));
2112}
2113
a7519a3c
RH
2114/* Symbol versioning can create new symbols, and make our old symbols
2115 indirect to the new ones. Consolidate the got and reloc information
2116 in these situations. */
252b5132 2117
48f4b4f5
RH
2118static void
2119elf64_alpha_copy_indirect_symbol (struct bfd_link_info *info,
2120 struct elf_link_hash_entry *dir,
2121 struct elf_link_hash_entry *ind)
252b5132 2122{
48f4b4f5
RH
2123 struct alpha_elf_link_hash_entry *hi
2124 = (struct alpha_elf_link_hash_entry *) ind;
2125 struct alpha_elf_link_hash_entry *hs
2126 = (struct alpha_elf_link_hash_entry *) dir;
252b5132 2127
48f4b4f5
RH
2128 /* Do the merging in the superclass. */
2129 _bfd_elf_link_hash_copy_indirect(info, dir, ind);
252b5132 2130
a7519a3c 2131 /* Merge the flags. Whee. */
a7519a3c
RH
2132 hs->flags |= hi->flags;
2133
48f4b4f5
RH
2134 /* ??? It's unclear to me what's really supposed to happen when
2135 "merging" defweak and defined symbols, given that we don't
2136 actually throw away the defweak. This more-or-less copies
2137 the logic related to got and plt entries in the superclass. */
2138 if (ind->root.type != bfd_link_hash_indirect)
2139 return;
2140
a7519a3c
RH
2141 /* Merge the .got entries. Cannibalize the old symbol's list in
2142 doing so, since we don't need it anymore. */
2143
2144 if (hs->got_entries == NULL)
2145 hs->got_entries = hi->got_entries;
2146 else
2147 {
2148 struct alpha_elf_got_entry *gi, *gs, *gin, *gsh;
2149
2150 gsh = hs->got_entries;
2151 for (gi = hi->got_entries; gi ; gi = gin)
252b5132 2152 {
a7519a3c
RH
2153 gin = gi->next;
2154 for (gs = gsh; gs ; gs = gs->next)
2155 if (gi->gotobj == gs->gotobj
2156 && gi->reloc_type == gs->reloc_type
2157 && gi->addend == gs->addend)
2158 {
68994ca2 2159 gs->use_count += gi->use_count;
07d6d2b8 2160 goto got_found;
a7519a3c
RH
2161 }
2162 gi->next = hs->got_entries;
2163 hs->got_entries = gi;
2164 got_found:;
252b5132 2165 }
a7519a3c
RH
2166 }
2167 hi->got_entries = NULL;
252b5132 2168
a7519a3c
RH
2169 /* And similar for the reloc entries. */
2170
2171 if (hs->reloc_entries == NULL)
2172 hs->reloc_entries = hi->reloc_entries;
2173 else
2174 {
2175 struct alpha_elf_reloc_entry *ri, *rs, *rin, *rsh;
2176
2177 rsh = hs->reloc_entries;
2178 for (ri = hi->reloc_entries; ri ; ri = rin)
2179 {
2180 rin = ri->next;
2181 for (rs = rsh; rs ; rs = rs->next)
2182 if (ri->rtype == rs->rtype && ri->srel == rs->srel)
2183 {
2184 rs->count += ri->count;
2185 goto found_reloc;
2186 }
2187 ri->next = hs->reloc_entries;
2188 hs->reloc_entries = ri;
2189 found_reloc:;
2190 }
252b5132 2191 }
a7519a3c 2192 hi->reloc_entries = NULL;
252b5132
RH
2193}
2194
a7519a3c 2195/* Is it possible to merge two object file's .got tables? */
252b5132 2196
b34976b6 2197static bfd_boolean
a7519a3c 2198elf64_alpha_can_merge_gots (bfd *a, bfd *b)
252b5132 2199{
a7519a3c
RH
2200 int total = alpha_elf_tdata (a)->total_got_size;
2201 bfd *bsub;
252b5132 2202
a7519a3c
RH
2203 /* Trivial quick fallout test. */
2204 if (total + alpha_elf_tdata (b)->total_got_size <= MAX_GOT_SIZE)
2205 return TRUE;
252b5132 2206
a7519a3c
RH
2207 /* By their nature, local .got entries cannot be merged. */
2208 if ((total += alpha_elf_tdata (b)->local_got_size) > MAX_GOT_SIZE)
b34976b6 2209 return FALSE;
252b5132 2210
a7519a3c
RH
2211 /* Failing the common trivial comparison, we must effectively
2212 perform the merge. Not actually performing the merge means that
2213 we don't have to store undo information in case we fail. */
2214 for (bsub = b; bsub ; bsub = alpha_elf_tdata (bsub)->in_got_link_next)
2215 {
2216 struct alpha_elf_link_hash_entry **hashes = alpha_elf_sym_hashes (bsub);
2217 Elf_Internal_Shdr *symtab_hdr = &elf_tdata (bsub)->symtab_hdr;
2218 int i, n;
2219
2220 n = NUM_SHDR_ENTRIES (symtab_hdr) - symtab_hdr->sh_info;
2221 for (i = 0; i < n; ++i)
2222 {
2223 struct alpha_elf_got_entry *ae, *be;
2224 struct alpha_elf_link_hash_entry *h;
2225
2226 h = hashes[i];
2227 while (h->root.root.type == bfd_link_hash_indirect
07d6d2b8 2228 || h->root.root.type == bfd_link_hash_warning)
a7519a3c
RH
2229 h = (struct alpha_elf_link_hash_entry *)h->root.root.u.i.link;
2230
2231 for (be = h->got_entries; be ; be = be->next)
2232 {
2233 if (be->use_count == 0)
07d6d2b8 2234 continue;
a7519a3c 2235 if (be->gotobj != b)
07d6d2b8 2236 continue;
a7519a3c
RH
2237
2238 for (ae = h->got_entries; ae ; ae = ae->next)
07d6d2b8 2239 if (ae->gotobj == a
a7519a3c
RH
2240 && ae->reloc_type == be->reloc_type
2241 && ae->addend == be->addend)
2242 goto global_found;
2243
2244 total += alpha_got_entry_size (be->reloc_type);
2245 if (total > MAX_GOT_SIZE)
07d6d2b8 2246 return FALSE;
a7519a3c
RH
2247 global_found:;
2248 }
2249 }
2250 }
252b5132 2251
b34976b6 2252 return TRUE;
252b5132
RH
2253}
2254
a7519a3c 2255/* Actually merge two .got tables. */
252b5132 2256
a7519a3c
RH
2257static void
2258elf64_alpha_merge_gots (bfd *a, bfd *b)
252b5132 2259{
a7519a3c
RH
2260 int total = alpha_elf_tdata (a)->total_got_size;
2261 bfd *bsub;
252b5132 2262
a7519a3c
RH
2263 /* Remember local expansion. */
2264 {
2265 int e = alpha_elf_tdata (b)->local_got_size;
2266 total += e;
2267 alpha_elf_tdata (a)->local_got_size += e;
2268 }
252b5132 2269
a7519a3c
RH
2270 for (bsub = b; bsub ; bsub = alpha_elf_tdata (bsub)->in_got_link_next)
2271 {
2272 struct alpha_elf_got_entry **local_got_entries;
2273 struct alpha_elf_link_hash_entry **hashes;
2274 Elf_Internal_Shdr *symtab_hdr;
2275 int i, n;
252b5132 2276
a7519a3c
RH
2277 /* Let the local .got entries know they are part of a new subsegment. */
2278 local_got_entries = alpha_elf_tdata (bsub)->local_got_entries;
2279 if (local_got_entries)
07d6d2b8 2280 {
a7519a3c
RH
2281 n = elf_tdata (bsub)->symtab_hdr.sh_info;
2282 for (i = 0; i < n; ++i)
2283 {
2284 struct alpha_elf_got_entry *ent;
2285 for (ent = local_got_entries[i]; ent; ent = ent->next)
07d6d2b8 2286 ent->gotobj = a;
a7519a3c 2287 }
07d6d2b8 2288 }
252b5132 2289
a7519a3c
RH
2290 /* Merge the global .got entries. */
2291 hashes = alpha_elf_sym_hashes (bsub);
2292 symtab_hdr = &elf_tdata (bsub)->symtab_hdr;
252b5132 2293
a7519a3c
RH
2294 n = NUM_SHDR_ENTRIES (symtab_hdr) - symtab_hdr->sh_info;
2295 for (i = 0; i < n; ++i)
07d6d2b8 2296 {
a7519a3c
RH
2297 struct alpha_elf_got_entry *ae, *be, **pbe, **start;
2298 struct alpha_elf_link_hash_entry *h;
252b5132 2299
a7519a3c
RH
2300 h = hashes[i];
2301 while (h->root.root.type == bfd_link_hash_indirect
07d6d2b8 2302 || h->root.root.type == bfd_link_hash_warning)
a7519a3c 2303 h = (struct alpha_elf_link_hash_entry *)h->root.root.u.i.link;
252b5132 2304
a7519a3c
RH
2305 pbe = start = &h->got_entries;
2306 while ((be = *pbe) != NULL)
2307 {
2308 if (be->use_count == 0)
07d6d2b8 2309 {
a7519a3c
RH
2310 *pbe = be->next;
2311 memset (be, 0xa5, sizeof (*be));
2312 goto kill;
07d6d2b8 2313 }
a7519a3c 2314 if (be->gotobj != b)
07d6d2b8 2315 goto next;
a7519a3c
RH
2316
2317 for (ae = *start; ae ; ae = ae->next)
07d6d2b8 2318 if (ae->gotobj == a
a7519a3c
RH
2319 && ae->reloc_type == be->reloc_type
2320 && ae->addend == be->addend)
2321 {
2322 ae->flags |= be->flags;
2323 ae->use_count += be->use_count;
2324 *pbe = be->next;
2325 memset (be, 0xa5, sizeof (*be));
2326 goto kill;
2327 }
2328 be->gotobj = a;
2329 total += alpha_got_entry_size (be->reloc_type);
252b5132 2330
a7519a3c
RH
2331 next:;
2332 pbe = &be->next;
2333 kill:;
2334 }
07d6d2b8 2335 }
252b5132 2336
a7519a3c
RH
2337 alpha_elf_tdata (bsub)->gotobj = a;
2338 }
2339 alpha_elf_tdata (a)->total_got_size = total;
252b5132 2340
a7519a3c
RH
2341 /* Merge the two in_got chains. */
2342 {
2343 bfd *next;
252b5132 2344
a7519a3c
RH
2345 bsub = a;
2346 while ((next = alpha_elf_tdata (bsub)->in_got_link_next) != NULL)
2347 bsub = next;
252b5132 2348
a7519a3c
RH
2349 alpha_elf_tdata (bsub)->in_got_link_next = b;
2350 }
252b5132 2351}
a7519a3c
RH
2352
2353/* Calculate the offsets for the got entries. */
252b5132 2354
b34976b6 2355static bfd_boolean
a7519a3c 2356elf64_alpha_calc_got_offsets_for_symbol (struct alpha_elf_link_hash_entry *h,
2c3fc389 2357 void * arg ATTRIBUTE_UNUSED)
252b5132 2358{
a7519a3c 2359 struct alpha_elf_got_entry *gotent;
252b5132 2360
a7519a3c
RH
2361 for (gotent = h->got_entries; gotent; gotent = gotent->next)
2362 if (gotent->use_count > 0)
2363 {
2364 struct alpha_elf_obj_tdata *td;
2365 bfd_size_type *plge;
252b5132 2366
a7519a3c 2367 td = alpha_elf_tdata (gotent->gotobj);
a7519a3c
RH
2368 plge = &td->got->size;
2369 gotent->got_offset = *plge;
2370 *plge += alpha_got_entry_size (gotent->reloc_type);
2371 }
252b5132 2372
6ec7057a 2373 return TRUE;
a7519a3c 2374}
252b5132 2375
a7519a3c
RH
2376static void
2377elf64_alpha_calc_got_offsets (struct bfd_link_info *info)
2378{
4dfe6ac6
NC
2379 bfd *i, *got_list;
2380 struct alpha_elf_link_hash_table * htab;
2381
2382 htab = alpha_elf_hash_table (info);
2383 if (htab == NULL)
2384 return;
2385 got_list = htab->got_list;
252b5132 2386
a7519a3c
RH
2387 /* First, zero out the .got sizes, as we may be recalculating the
2388 .got after optimizing it. */
2389 for (i = got_list; i ; i = alpha_elf_tdata(i)->got_link_next)
2390 alpha_elf_tdata(i)->got->size = 0;
252b5132 2391
a7519a3c 2392 /* Next, fill in the offsets for all the global entries. */
4dfe6ac6 2393 alpha_elf_link_hash_traverse (htab,
a7519a3c
RH
2394 elf64_alpha_calc_got_offsets_for_symbol,
2395 NULL);
252b5132 2396
a7519a3c
RH
2397 /* Finally, fill in the offsets for the local entries. */
2398 for (i = got_list; i ; i = alpha_elf_tdata(i)->got_link_next)
2399 {
2400 bfd_size_type got_offset = alpha_elf_tdata(i)->got->size;
2401 bfd *j;
252b5132 2402
a7519a3c
RH
2403 for (j = i; j ; j = alpha_elf_tdata(j)->in_got_link_next)
2404 {
2405 struct alpha_elf_got_entry **local_got_entries, *gotent;
2406 int k, n;
252b5132 2407
a7519a3c
RH
2408 local_got_entries = alpha_elf_tdata(j)->local_got_entries;
2409 if (!local_got_entries)
2410 continue;
252b5132 2411
a7519a3c
RH
2412 for (k = 0, n = elf_tdata(j)->symtab_hdr.sh_info; k < n; ++k)
2413 for (gotent = local_got_entries[k]; gotent; gotent = gotent->next)
2414 if (gotent->use_count > 0)
07d6d2b8 2415 {
a7519a3c
RH
2416 gotent->got_offset = got_offset;
2417 got_offset += alpha_got_entry_size (gotent->reloc_type);
07d6d2b8 2418 }
a7519a3c 2419 }
252b5132 2420
a7519a3c
RH
2421 alpha_elf_tdata(i)->got->size = got_offset;
2422 }
2423}
252b5132 2424
a7519a3c 2425/* Constructs the gots. */
252b5132 2426
b34976b6 2427static bfd_boolean
d1c109de 2428elf64_alpha_size_got_sections (struct bfd_link_info *info,
07d6d2b8 2429 bfd_boolean may_merge)
252b5132 2430{
a7519a3c 2431 bfd *i, *got_list, *cur_got_obj = NULL;
4dfe6ac6 2432 struct alpha_elf_link_hash_table * htab;
252b5132 2433
4dfe6ac6
NC
2434 htab = alpha_elf_hash_table (info);
2435 if (htab == NULL)
2436 return FALSE;
2437 got_list = htab->got_list;
95404643 2438
a7519a3c
RH
2439 /* On the first time through, pretend we have an existing got list
2440 consisting of all of the input files. */
2441 if (got_list == NULL)
252b5132 2442 {
c72f2fb2 2443 for (i = info->input_bfds; i ; i = i->link.next)
252b5132 2444 {
0ffa91dd
NC
2445 bfd *this_got;
2446
2447 if (! is_alpha_elf (i))
2448 continue;
2449
2450 this_got = alpha_elf_tdata (i)->gotobj;
a7519a3c
RH
2451 if (this_got == NULL)
2452 continue;
252b5132 2453
a7519a3c
RH
2454 /* We are assuming no merging has yet occurred. */
2455 BFD_ASSERT (this_got == i);
252b5132 2456
07d6d2b8 2457 if (alpha_elf_tdata (this_got)->total_got_size > MAX_GOT_SIZE)
252b5132 2458 {
a7519a3c 2459 /* Yikes! A single object file has too many entries. */
4eca0228 2460 _bfd_error_handler
695344c0 2461 /* xgettext:c-format */
871b3ab2 2462 (_("%pB: .got subsegment exceeds 64K (size %d)"),
07d6d2b8 2463 i, alpha_elf_tdata (this_got)->total_got_size);
b34976b6 2464 return FALSE;
252b5132 2465 }
252b5132 2466
a7519a3c
RH
2467 if (got_list == NULL)
2468 got_list = this_got;
2469 else
2470 alpha_elf_tdata(cur_got_obj)->got_link_next = this_got;
2471 cur_got_obj = this_got;
252b5132
RH
2472 }
2473
a7519a3c
RH
2474 /* Strange degenerate case of no got references. */
2475 if (got_list == NULL)
2476 return TRUE;
2477
4dfe6ac6 2478 htab->got_list = got_list;
a7519a3c
RH
2479 }
2480
2481 cur_got_obj = got_list;
0ffa91dd
NC
2482 if (cur_got_obj == NULL)
2483 return FALSE;
2484
d1c109de 2485 if (may_merge)
a7519a3c 2486 {
d1c109de
RH
2487 i = alpha_elf_tdata(cur_got_obj)->got_link_next;
2488 while (i != NULL)
252b5132 2489 {
d1c109de
RH
2490 if (elf64_alpha_can_merge_gots (cur_got_obj, i))
2491 {
2492 elf64_alpha_merge_gots (cur_got_obj, i);
252b5132 2493
d1c109de
RH
2494 alpha_elf_tdata(i)->got->size = 0;
2495 i = alpha_elf_tdata(i)->got_link_next;
2496 alpha_elf_tdata(cur_got_obj)->got_link_next = i;
2497 }
2498 else
2499 {
2500 cur_got_obj = i;
2501 i = alpha_elf_tdata(i)->got_link_next;
2502 }
a7519a3c 2503 }
252b5132
RH
2504 }
2505
a7519a3c
RH
2506 /* Once the gots have been merged, fill in the got offsets for
2507 everything therein. */
4a828aab 2508 elf64_alpha_calc_got_offsets (info);
252b5132 2509
a7519a3c 2510 return TRUE;
252b5132 2511}
252b5132 2512
b34976b6 2513static bfd_boolean
2c3fc389
NC
2514elf64_alpha_size_plt_section_1 (struct alpha_elf_link_hash_entry *h,
2515 void * data)
252b5132 2516{
a7519a3c
RH
2517 asection *splt = (asection *) data;
2518 struct alpha_elf_got_entry *gotent;
6ec7057a 2519 bfd_boolean saw_one = FALSE;
252b5132 2520
a7519a3c
RH
2521 /* If we didn't need an entry before, we still don't. */
2522 if (!h->root.needs_plt)
2523 return TRUE;
e92d460e 2524
6ec7057a 2525 /* For each LITERAL got entry still in use, allocate a plt entry. */
a7519a3c
RH
2526 for (gotent = h->got_entries; gotent ; gotent = gotent->next)
2527 if (gotent->reloc_type == R_ALPHA_LITERAL
2528 && gotent->use_count > 0)
6ec7057a
RH
2529 {
2530 if (splt->size == 0)
2531 splt->size = PLT_HEADER_SIZE;
2532 gotent->plt_offset = splt->size;
2533 splt->size += PLT_ENTRY_SIZE;
2534 saw_one = TRUE;
2535 }
a7519a3c 2536
6ec7057a
RH
2537 /* If there weren't any, there's no longer a need for the PLT entry. */
2538 if (!saw_one)
2539 h->root.needs_plt = FALSE;
a7519a3c
RH
2540
2541 return TRUE;
2542}
2543
4a828aab
RH
2544/* Called from relax_section to rebuild the PLT in light of potential changes
2545 in the function's status. */
a7519a3c 2546
4a828aab 2547static void
a7519a3c
RH
2548elf64_alpha_size_plt_section (struct bfd_link_info *info)
2549{
6ec7057a 2550 asection *splt, *spltrel, *sgotplt;
a7519a3c 2551 unsigned long entries;
4dfe6ac6
NC
2552 struct alpha_elf_link_hash_table * htab;
2553
2554 htab = alpha_elf_hash_table (info);
2555 if (htab == NULL)
2556 return;
a7519a3c 2557
ce558b89 2558 splt = elf_hash_table(info)->splt;
a7519a3c 2559 if (splt == NULL)
4a828aab 2560 return;
252b5132 2561
a7519a3c 2562 splt->size = 0;
252b5132 2563
4dfe6ac6 2564 alpha_elf_link_hash_traverse (htab,
a7519a3c 2565 elf64_alpha_size_plt_section_1, splt);
e92d460e 2566
a7519a3c 2567 /* Every plt entry requires a JMP_SLOT relocation. */
ce558b89 2568 spltrel = elf_hash_table(info)->srelplt;
4a828aab 2569 entries = 0;
a7519a3c 2570 if (splt->size)
6ec7057a
RH
2571 {
2572 if (elf64_alpha_use_secureplt)
2573 entries = (splt->size - NEW_PLT_HEADER_SIZE) / NEW_PLT_ENTRY_SIZE;
2574 else
2575 entries = (splt->size - OLD_PLT_HEADER_SIZE) / OLD_PLT_ENTRY_SIZE;
2576 }
a7519a3c 2577 spltrel->size = entries * sizeof (Elf64_External_Rela);
e92d460e 2578
6ec7057a
RH
2579 /* When using the secureplt, we need two words somewhere in the data
2580 segment for the dynamic linker to tell us where to go. This is the
2581 entire contents of the .got.plt section. */
2582 if (elf64_alpha_use_secureplt)
2583 {
ce558b89 2584 sgotplt = elf_hash_table(info)->sgotplt;
6ec7057a
RH
2585 sgotplt->size = entries ? 16 : 0;
2586 }
a7519a3c 2587}
e92d460e 2588
a7519a3c
RH
2589static bfd_boolean
2590elf64_alpha_always_size_sections (bfd *output_bfd ATTRIBUTE_UNUSED,
2591 struct bfd_link_info *info)
2592{
2593 bfd *i;
4dfe6ac6 2594 struct alpha_elf_link_hash_table * htab;
252b5132 2595
0e1862bb 2596 if (bfd_link_relocatable (info))
a7519a3c 2597 return TRUE;
252b5132 2598
4dfe6ac6
NC
2599 htab = alpha_elf_hash_table (info);
2600 if (htab == NULL)
2601 return FALSE;
2602
d1c109de 2603 if (!elf64_alpha_size_got_sections (info, TRUE))
a7519a3c 2604 return FALSE;
252b5132 2605
a7519a3c 2606 /* Allocate space for all of the .got subsections. */
4dfe6ac6 2607 i = htab->got_list;
a7519a3c 2608 for ( ; i ; i = alpha_elf_tdata(i)->got_link_next)
252b5132 2609 {
a7519a3c
RH
2610 asection *s = alpha_elf_tdata(i)->got;
2611 if (s->size > 0)
2612 {
2613 s->contents = (bfd_byte *) bfd_zalloc (i, s->size);
2614 if (s->contents == NULL)
2615 return FALSE;
2616 }
252b5132
RH
2617 }
2618
b34976b6 2619 return TRUE;
252b5132 2620}
3765b1be 2621
a7519a3c 2622/* The number of dynamic relocations required by a static relocation. */
3765b1be 2623
a7519a3c 2624static int
e366eeae 2625alpha_dynamic_entries_for_reloc (int r_type, int dynamic, int shared, int pie)
a7519a3c
RH
2626{
2627 switch (r_type)
3765b1be 2628 {
a7519a3c
RH
2629 /* May appear in GOT entries. */
2630 case R_ALPHA_TLSGD:
2631 return (dynamic ? 2 : shared ? 1 : 0);
2632 case R_ALPHA_TLSLDM:
2633 return shared;
2634 case R_ALPHA_LITERAL:
a7519a3c 2635 return dynamic || shared;
e366eeae
RH
2636 case R_ALPHA_GOTTPREL:
2637 return dynamic || (shared && !pie);
a7519a3c
RH
2638 case R_ALPHA_GOTDTPREL:
2639 return dynamic;
3765b1be 2640
a7519a3c
RH
2641 /* May appear in data sections. */
2642 case R_ALPHA_REFLONG:
2643 case R_ALPHA_REFQUAD:
a7519a3c 2644 return dynamic || shared;
e366eeae
RH
2645 case R_ALPHA_TPREL64:
2646 return dynamic || (shared && !pie);
3765b1be 2647
a7519a3c
RH
2648 /* Everything else is illegal. We'll issue an error during
2649 relocate_section. */
2650 default:
2651 return 0;
2652 }
2653}
3765b1be 2654
a7519a3c 2655/* Work out the sizes of the dynamic relocation entries. */
3765b1be 2656
a7519a3c
RH
2657static bfd_boolean
2658elf64_alpha_calc_dynrel_sizes (struct alpha_elf_link_hash_entry *h,
2659 struct bfd_link_info *info)
2660{
2661 bfd_boolean dynamic;
2662 struct alpha_elf_reloc_entry *relent;
2663 unsigned long entries;
3765b1be 2664
a7519a3c
RH
2665 /* If the symbol was defined as a common symbol in a regular object
2666 file, and there was no definition in any dynamic object, then the
2667 linker will have allocated space for the symbol in a common
2668 section but the ELF_LINK_HASH_DEF_REGULAR flag will not have been
2669 set. This is done for dynamic symbols in
2670 elf_adjust_dynamic_symbol but this is not done for non-dynamic
2671 symbols, somehow. */
2672 if (!h->root.def_regular
2673 && h->root.ref_regular
2674 && !h->root.def_dynamic
2675 && (h->root.root.type == bfd_link_hash_defined
2676 || h->root.root.type == bfd_link_hash_defweak)
2677 && !(h->root.root.u.def.section->owner->flags & DYNAMIC))
2678 h->root.def_regular = 1;
3765b1be 2679
a7519a3c
RH
2680 /* If the symbol is dynamic, we'll need all the relocations in their
2681 natural form. If this is a shared object, and it has been forced
2682 local, we'll need the same number of RELATIVE relocations. */
2683 dynamic = alpha_elf_dynamic_symbol_p (&h->root, info);
3765b1be 2684
a7519a3c
RH
2685 /* If the symbol is a hidden undefined weak, then we never have any
2686 relocations. Avoid the loop which may want to add RELATIVE relocs
0e1862bb 2687 based on bfd_link_pic (info). */
a7519a3c
RH
2688 if (h->root.root.type == bfd_link_hash_undefweak && !dynamic)
2689 return TRUE;
2690
2691 for (relent = h->reloc_entries; relent; relent = relent->next)
3765b1be 2692 {
a7519a3c 2693 entries = alpha_dynamic_entries_for_reloc (relent->rtype, dynamic,
3cbc1e5e
AM
2694 bfd_link_pic (info),
2695 bfd_link_pie (info));
a7519a3c
RH
2696 if (entries)
2697 {
2698 relent->srel->size +=
2699 entries * sizeof (Elf64_External_Rela) * relent->count;
2700 if (relent->reltext)
2701 info->flags |= DT_TEXTREL;
2702 }
2703 }
3765b1be 2704
a7519a3c
RH
2705 return TRUE;
2706}
3765b1be 2707
a7519a3c
RH
2708/* Subroutine of elf64_alpha_size_rela_got_section for doing the
2709 global symbols. */
3765b1be 2710
a7519a3c
RH
2711static bfd_boolean
2712elf64_alpha_size_rela_got_1 (struct alpha_elf_link_hash_entry *h,
2713 struct bfd_link_info *info)
2714{
2715 bfd_boolean dynamic;
2716 struct alpha_elf_got_entry *gotent;
2717 unsigned long entries;
3765b1be 2718
6ec7057a
RH
2719 /* If we're using a plt for this symbol, then all of its relocations
2720 for its got entries go into .rela.plt. */
2721 if (h->root.needs_plt)
2722 return TRUE;
2723
a7519a3c
RH
2724 /* If the symbol is dynamic, we'll need all the relocations in their
2725 natural form. If this is a shared object, and it has been forced
2726 local, we'll need the same number of RELATIVE relocations. */
2727 dynamic = alpha_elf_dynamic_symbol_p (&h->root, info);
2728
2729 /* If the symbol is a hidden undefined weak, then we never have any
2730 relocations. Avoid the loop which may want to add RELATIVE relocs
0e1862bb 2731 based on bfd_link_pic (info). */
a7519a3c
RH
2732 if (h->root.root.type == bfd_link_hash_undefweak && !dynamic)
2733 return TRUE;
2734
2735 entries = 0;
2736 for (gotent = h->got_entries; gotent ; gotent = gotent->next)
2737 if (gotent->use_count > 0)
e366eeae 2738 entries += alpha_dynamic_entries_for_reloc (gotent->reloc_type, dynamic,
0e1862bb
L
2739 bfd_link_pic (info),
2740 bfd_link_pie (info));
a7519a3c 2741
a7519a3c
RH
2742 if (entries > 0)
2743 {
ce558b89 2744 asection *srel = elf_hash_table(info)->srelgot;
a7519a3c
RH
2745 BFD_ASSERT (srel != NULL);
2746 srel->size += sizeof (Elf64_External_Rela) * entries;
3765b1be 2747 }
3765b1be 2748
a7519a3c 2749 return TRUE;
3765b1be
RH
2750}
2751
a7519a3c 2752/* Set the sizes of the dynamic relocation sections. */
252b5132 2753
4a828aab 2754static void
a7519a3c 2755elf64_alpha_size_rela_got_section (struct bfd_link_info *info)
252b5132 2756{
a7519a3c 2757 unsigned long entries;
ce558b89 2758 bfd *i;
a7519a3c 2759 asection *srel;
4dfe6ac6
NC
2760 struct alpha_elf_link_hash_table * htab;
2761
2762 htab = alpha_elf_hash_table (info);
2763 if (htab == NULL)
2764 return;
252b5132 2765
a7519a3c
RH
2766 /* Shared libraries often require RELATIVE relocs, and some relocs
2767 require attention for the main application as well. */
252b5132 2768
a7519a3c 2769 entries = 0;
4dfe6ac6 2770 for (i = htab->got_list;
a7519a3c
RH
2771 i ; i = alpha_elf_tdata(i)->got_link_next)
2772 {
2773 bfd *j;
3241278a 2774
a7519a3c
RH
2775 for (j = i; j ; j = alpha_elf_tdata(j)->in_got_link_next)
2776 {
2777 struct alpha_elf_got_entry **local_got_entries, *gotent;
2778 int k, n;
252b5132 2779
a7519a3c
RH
2780 local_got_entries = alpha_elf_tdata(j)->local_got_entries;
2781 if (!local_got_entries)
2782 continue;
252b5132 2783
a7519a3c
RH
2784 for (k = 0, n = elf_tdata(j)->symtab_hdr.sh_info; k < n; ++k)
2785 for (gotent = local_got_entries[k];
2786 gotent ; gotent = gotent->next)
2787 if (gotent->use_count > 0)
2788 entries += (alpha_dynamic_entries_for_reloc
0e1862bb
L
2789 (gotent->reloc_type, 0, bfd_link_pic (info),
2790 bfd_link_pie (info)));
a7519a3c
RH
2791 }
2792 }
3765b1be 2793
ce558b89 2794 srel = elf_hash_table(info)->srelgot;
a7519a3c
RH
2795 if (!srel)
2796 {
2797 BFD_ASSERT (entries == 0);
4a828aab 2798 return;
a7519a3c
RH
2799 }
2800 srel->size = sizeof (Elf64_External_Rela) * entries;
252b5132 2801
a7519a3c 2802 /* Now do the non-local symbols. */
4dfe6ac6 2803 alpha_elf_link_hash_traverse (htab,
a7519a3c 2804 elf64_alpha_size_rela_got_1, info);
a7519a3c 2805}
252b5132 2806
a7519a3c 2807/* Set the sizes of the dynamic sections. */
3765b1be 2808
a7519a3c
RH
2809static bfd_boolean
2810elf64_alpha_size_dynamic_sections (bfd *output_bfd ATTRIBUTE_UNUSED,
2811 struct bfd_link_info *info)
2812{
2813 bfd *dynobj;
2814 asection *s;
24f1a751 2815 bfd_boolean relplt, relocs;
4dfe6ac6
NC
2816 struct alpha_elf_link_hash_table * htab;
2817
2818 htab = alpha_elf_hash_table (info);
2819 if (htab == NULL)
2820 return FALSE;
3765b1be 2821
a7519a3c
RH
2822 dynobj = elf_hash_table(info)->dynobj;
2823 BFD_ASSERT(dynobj != NULL);
252b5132 2824
a7519a3c
RH
2825 if (elf_hash_table (info)->dynamic_sections_created)
2826 {
2827 /* Set the contents of the .interp section to the interpreter. */
9b8b325a 2828 if (bfd_link_executable (info) && !info->nointerp)
252b5132 2829 {
3d4d4302 2830 s = bfd_get_linker_section (dynobj, ".interp");
a7519a3c
RH
2831 BFD_ASSERT (s != NULL);
2832 s->size = sizeof ELF_DYNAMIC_INTERPRETER;
2833 s->contents = (unsigned char *) ELF_DYNAMIC_INTERPRETER;
2834 }
3765b1be 2835
a7519a3c
RH
2836 /* Now that we've seen all of the input files, we can decide which
2837 symbols need dynamic relocation entries and which don't. We've
2838 collected information in check_relocs that we can now apply to
2839 size the dynamic relocation sections. */
4dfe6ac6 2840 alpha_elf_link_hash_traverse (htab,
a7519a3c 2841 elf64_alpha_calc_dynrel_sizes, info);
252b5132 2842
a7519a3c 2843 elf64_alpha_size_rela_got_section (info);
6ec7057a 2844 elf64_alpha_size_plt_section (info);
a7519a3c
RH
2845 }
2846 /* else we're not dynamic and by definition we don't need such things. */
3765b1be 2847
a7519a3c
RH
2848 /* The check_relocs and adjust_dynamic_symbol entry points have
2849 determined the sizes of the various dynamic sections. Allocate
2850 memory for them. */
2851 relplt = FALSE;
24f1a751 2852 relocs = FALSE;
a7519a3c
RH
2853 for (s = dynobj->sections; s != NULL; s = s->next)
2854 {
2855 const char *name;
3765b1be 2856
a7519a3c
RH
2857 if (!(s->flags & SEC_LINKER_CREATED))
2858 continue;
cc03ec80 2859
a7519a3c
RH
2860 /* It's OK to base decisions on the section name, because none
2861 of the dynobj section names depend upon the input files. */
fd361982 2862 name = bfd_section_name (s);
3765b1be 2863
0112cd26 2864 if (CONST_STRNEQ (name, ".rela"))
3765b1be 2865 {
c456f082 2866 if (s->size != 0)
a7519a3c 2867 {
c456f082 2868 if (strcmp (name, ".rela.plt") == 0)
a7519a3c 2869 relplt = TRUE;
24f1a751
AM
2870 else
2871 relocs = TRUE;
252b5132 2872
a7519a3c
RH
2873 /* We use the reloc_count field as a counter if we need
2874 to copy relocs into the output file. */
2875 s->reloc_count = 0;
252b5132 2876 }
3765b1be 2877 }
0112cd26 2878 else if (! CONST_STRNEQ (name, ".got")
c456f082
AM
2879 && strcmp (name, ".plt") != 0
2880 && strcmp (name, ".dynbss") != 0)
3765b1be 2881 {
a7519a3c
RH
2882 /* It's not one of our dynamic sections, so don't allocate space. */
2883 continue;
2884 }
252b5132 2885
c456f082
AM
2886 if (s->size == 0)
2887 {
2888 /* If we don't need this section, strip it from the output file.
2889 This is to handle .rela.bss and .rela.plt. We must create it
2890 in create_dynamic_sections, because it must be created before
2891 the linker maps input sections to output sections. The
2892 linker does that before adjust_dynamic_symbol is called, and
2893 it is that function which decides whether anything needs to
2894 go into these sections. */
6452a567
RH
2895 if (!CONST_STRNEQ (name, ".got"))
2896 s->flags |= SEC_EXCLUDE;
c456f082
AM
2897 }
2898 else if ((s->flags & SEC_HAS_CONTENTS) != 0)
a7519a3c
RH
2899 {
2900 /* Allocate memory for the section contents. */
2901 s->contents = (bfd_byte *) bfd_zalloc (dynobj, s->size);
c456f082 2902 if (s->contents == NULL)
b34976b6 2903 return FALSE;
a7519a3c
RH
2904 }
2905 }
3765b1be 2906
a7519a3c
RH
2907 if (elf_hash_table (info)->dynamic_sections_created)
2908 {
2909 /* Add some entries to the .dynamic section. We fill in the
2910 values later, in elf64_alpha_finish_dynamic_sections, but we
2911 must add the entries now so that we get the correct size for
2912 the .dynamic section. The DT_DEBUG entry is filled in by the
2913 dynamic linker and used by the debugger. */
2914#define add_dynamic_entry(TAG, VAL) \
2915 _bfd_elf_add_dynamic_entry (info, TAG, VAL)
3765b1be 2916
0e1862bb 2917 if (bfd_link_executable (info))
a7519a3c
RH
2918 {
2919 if (!add_dynamic_entry (DT_DEBUG, 0))
2920 return FALSE;
3765b1be
RH
2921 }
2922
a7519a3c 2923 if (relplt)
3765b1be 2924 {
a7519a3c
RH
2925 if (!add_dynamic_entry (DT_PLTGOT, 0)
2926 || !add_dynamic_entry (DT_PLTRELSZ, 0)
2927 || !add_dynamic_entry (DT_PLTREL, DT_RELA)
2928 || !add_dynamic_entry (DT_JMPREL, 0))
2929 return FALSE;
6ec7057a
RH
2930
2931 if (elf64_alpha_use_secureplt
2932 && !add_dynamic_entry (DT_ALPHA_PLTRO, 1))
2933 return FALSE;
a7519a3c 2934 }
252b5132 2935
24f1a751 2936 if (relocs)
a7519a3c 2937 {
24f1a751
AM
2938 if (!add_dynamic_entry (DT_RELA, 0)
2939 || !add_dynamic_entry (DT_RELASZ, 0)
2940 || !add_dynamic_entry (DT_RELAENT, sizeof (Elf64_External_Rela)))
a7519a3c 2941 return FALSE;
24f1a751
AM
2942
2943 if (info->flags & DF_TEXTREL)
2944 {
2945 if (!add_dynamic_entry (DT_TEXTREL, 0))
2946 return FALSE;
2947 }
252b5132
RH
2948 }
2949 }
a7519a3c 2950#undef add_dynamic_entry
252b5132 2951
b34976b6 2952 return TRUE;
252b5132 2953}
a7519a3c
RH
2954\f
2955/* These functions do relaxation for Alpha ELF.
252b5132 2956
a7519a3c
RH
2957 Currently I'm only handling what I can do with existing compiler
2958 and assembler support, which means no instructions are removed,
2959 though some may be nopped. At this time GCC does not emit enough
2960 information to do all of the relaxing that is possible. It will
2961 take some not small amount of work for that to happen.
252b5132 2962
a7519a3c
RH
2963 There are a couple of interesting papers that I once read on this
2964 subject, that I cannot find references to at the moment, that
2965 related to Alpha in particular. They are by David Wall, then of
2966 DEC WRL. */
252b5132 2967
a7519a3c
RH
2968struct alpha_relax_info
2969{
2970 bfd *abfd;
2971 asection *sec;
2972 bfd_byte *contents;
2973 Elf_Internal_Shdr *symtab_hdr;
2974 Elf_Internal_Rela *relocs, *relend;
2975 struct bfd_link_info *link_info;
2976 bfd_vma gp;
2977 bfd *gotobj;
2978 asection *tsec;
2979 struct alpha_elf_link_hash_entry *h;
2980 struct alpha_elf_got_entry **first_gotent;
2981 struct alpha_elf_got_entry *gotent;
2982 bfd_boolean changed_contents;
2983 bfd_boolean changed_relocs;
2984 unsigned char other;
2985};
252b5132 2986
a7519a3c
RH
2987static Elf_Internal_Rela *
2988elf64_alpha_find_reloc_at_ofs (Elf_Internal_Rela *rel,
2989 Elf_Internal_Rela *relend,
2990 bfd_vma offset, int type)
2991{
2992 while (rel < relend)
252b5132 2993 {
a7519a3c
RH
2994 if (rel->r_offset == offset
2995 && ELF64_R_TYPE (rel->r_info) == (unsigned int) type)
2996 return rel;
2997 ++rel;
2998 }
2999 return NULL;
3000}
252b5132 3001
a7519a3c
RH
3002static bfd_boolean
3003elf64_alpha_relax_got_load (struct alpha_relax_info *info, bfd_vma symval,
3004 Elf_Internal_Rela *irel, unsigned long r_type)
3005{
3006 unsigned int insn;
3007 bfd_signed_vma disp;
252b5132 3008
a7519a3c
RH
3009 /* Get the instruction. */
3010 insn = bfd_get_32 (info->abfd, info->contents + irel->r_offset);
252b5132 3011
a7519a3c
RH
3012 if (insn >> 26 != OP_LDQ)
3013 {
3014 reloc_howto_type *howto = elf64_alpha_howto_table + r_type;
4eca0228 3015 _bfd_error_handler
695344c0 3016 /* xgettext:c-format */
2dcf00ce
AM
3017 (_("%pB: %pA+%#" PRIx64 ": warning: "
3018 "%s relocation against unexpected insn"),
3019 info->abfd, info->sec, (uint64_t) irel->r_offset, howto->name);
a7519a3c
RH
3020 return TRUE;
3021 }
252b5132 3022
a7519a3c
RH
3023 /* Can't relax dynamic symbols. */
3024 if (alpha_elf_dynamic_symbol_p (&info->h->root, info->link_info))
3025 return TRUE;
252b5132 3026
a7519a3c 3027 /* Can't use local-exec relocations in shared libraries. */
e366eeae 3028 if (r_type == R_ALPHA_GOTTPREL
3cbc1e5e 3029 && bfd_link_dll (info->link_info))
a7519a3c 3030 return TRUE;
252b5132 3031
a7519a3c
RH
3032 if (r_type == R_ALPHA_LITERAL)
3033 {
3034 /* Look for nice constant addresses. This includes the not-uncommon
3035 special case of 0 for undefweak symbols. */
3036 if ((info->h && info->h->root.root.type == bfd_link_hash_undefweak)
0e1862bb 3037 || (!bfd_link_pic (info->link_info)
a7519a3c
RH
3038 && (symval >= (bfd_vma)-0x8000 || symval < 0x8000)))
3039 {
3040 disp = 0;
3041 insn = (OP_LDA << 26) | (insn & (31 << 21)) | (31 << 16);
3042 insn |= (symval & 0xffff);
3043 r_type = R_ALPHA_NONE;
3044 }
3045 else
3046 {
d1c109de
RH
3047 /* We may only create GPREL relocs during the second pass. */
3048 if (info->link_info->relax_pass == 0)
3049 return TRUE;
3050
a7519a3c
RH
3051 disp = symval - info->gp;
3052 insn = (OP_LDA << 26) | (insn & 0x03ff0000);
3053 r_type = R_ALPHA_GPREL16;
3054 }
252b5132
RH
3055 }
3056 else
252b5132 3057 {
a7519a3c 3058 bfd_vma dtp_base, tp_base;
252b5132 3059
a7519a3c
RH
3060 BFD_ASSERT (elf_hash_table (info->link_info)->tls_sec != NULL);
3061 dtp_base = alpha_get_dtprel_base (info->link_info);
3062 tp_base = alpha_get_tprel_base (info->link_info);
3063 disp = symval - (r_type == R_ALPHA_GOTDTPREL ? dtp_base : tp_base);
252b5132 3064
a7519a3c 3065 insn = (OP_LDA << 26) | (insn & (31 << 21)) | (31 << 16);
252b5132 3066
a7519a3c
RH
3067 switch (r_type)
3068 {
3069 case R_ALPHA_GOTDTPREL:
3070 r_type = R_ALPHA_DTPREL16;
3071 break;
3072 case R_ALPHA_GOTTPREL:
3073 r_type = R_ALPHA_TPREL16;
3074 break;
3075 default:
3076 BFD_ASSERT (0);
3077 return FALSE;
3078 }
3079 }
252b5132 3080
a7519a3c 3081 if (disp < -0x8000 || disp >= 0x8000)
b34976b6 3082 return TRUE;
252b5132 3083
a7519a3c
RH
3084 bfd_put_32 (info->abfd, (bfd_vma) insn, info->contents + irel->r_offset);
3085 info->changed_contents = TRUE;
252b5132 3086
a7519a3c
RH
3087 /* Reduce the use count on this got entry by one, possibly
3088 eliminating it. */
3089 if (--info->gotent->use_count == 0)
252b5132 3090 {
a7519a3c
RH
3091 int sz = alpha_got_entry_size (r_type);
3092 alpha_elf_tdata (info->gotobj)->total_got_size -= sz;
3093 if (!info->h)
3094 alpha_elf_tdata (info->gotobj)->local_got_size -= sz;
252b5132 3095 }
252b5132 3096
a7519a3c
RH
3097 /* Smash the existing GOT relocation for its 16-bit immediate pair. */
3098 irel->r_info = ELF64_R_INFO (ELF64_R_SYM (irel->r_info), r_type);
3099 info->changed_relocs = TRUE;
3100
3101 /* ??? Search forward through this basic block looking for insns
3102 that use the target register. Stop after an insn modifying the
3103 register is seen, or after a branch or call.
252b5132 3104
a7519a3c
RH
3105 Any such memory load insn may be substituted by a load directly
3106 off the GP. This allows the memory load insn to be issued before
3107 the calculated GP register would otherwise be ready.
252b5132 3108
a7519a3c
RH
3109 Any such jsr insn can be replaced by a bsr if it is in range.
3110
3111 This would mean that we'd have to _add_ relocations, the pain of
3112 which gives one pause. */
252b5132 3113
b34976b6 3114 return TRUE;
252b5132
RH
3115}
3116
a7519a3c
RH
3117static bfd_vma
3118elf64_alpha_relax_opt_call (struct alpha_relax_info *info, bfd_vma symval)
252b5132 3119{
a7519a3c
RH
3120 /* If the function has the same gp, and we can identify that the
3121 function does not use its function pointer, we can eliminate the
3122 address load. */
252b5132 3123
a7519a3c
RH
3124 /* If the symbol is marked NOPV, we are being told the function never
3125 needs its procedure value. */
3126 if ((info->other & STO_ALPHA_STD_GPLOAD) == STO_ALPHA_NOPV)
3127 return symval;
252b5132 3128
a7519a3c
RH
3129 /* If the symbol is marked STD_GP, we are being told the function does
3130 a normal ldgp in the first two words. */
3131 else if ((info->other & STO_ALPHA_STD_GPLOAD) == STO_ALPHA_STD_GPLOAD)
3132 ;
252b5132 3133
a7519a3c
RH
3134 /* Otherwise, we may be able to identify a GP load in the first two
3135 words, which we can then skip. */
3136 else
252b5132 3137 {
a7519a3c
RH
3138 Elf_Internal_Rela *tsec_relocs, *tsec_relend, *tsec_free, *gpdisp;
3139 bfd_vma ofs;
252b5132 3140
a7519a3c
RH
3141 /* Load the relocations from the section that the target symbol is in. */
3142 if (info->sec == info->tsec)
252b5132 3143 {
a7519a3c
RH
3144 tsec_relocs = info->relocs;
3145 tsec_relend = info->relend;
3146 tsec_free = NULL;
3147 }
3148 else
3149 {
3150 tsec_relocs = (_bfd_elf_link_read_relocs
07d6d2b8 3151 (info->abfd, info->tsec, NULL,
a7519a3c
RH
3152 (Elf_Internal_Rela *) NULL,
3153 info->link_info->keep_memory));
3154 if (tsec_relocs == NULL)
3155 return 0;
3156 tsec_relend = tsec_relocs + info->tsec->reloc_count;
ae4fda66
JC
3157 tsec_free = (elf_section_data (info->tsec)->relocs == tsec_relocs
3158 ? NULL
3159 : tsec_relocs);
a7519a3c 3160 }
252b5132 3161
a7519a3c
RH
3162 /* Recover the symbol's offset within the section. */
3163 ofs = (symval - info->tsec->output_section->vma
3164 - info->tsec->output_offset);
252b5132 3165
a7519a3c
RH
3166 /* Look for a GPDISP reloc. */
3167 gpdisp = (elf64_alpha_find_reloc_at_ofs
3168 (tsec_relocs, tsec_relend, ofs, R_ALPHA_GPDISP));
252b5132 3169
a7519a3c
RH
3170 if (!gpdisp || gpdisp->r_addend != 4)
3171 {
3172 if (tsec_free)
3173 free (tsec_free);
3174 return 0;
252b5132 3175 }
a7519a3c 3176 if (tsec_free)
07d6d2b8 3177 free (tsec_free);
252b5132
RH
3178 }
3179
a7519a3c
RH
3180 /* We've now determined that we can skip an initial gp load. Verify
3181 that the call and the target use the same gp. */
f13a99db 3182 if (info->link_info->output_bfd->xvec != info->tsec->owner->xvec
a7519a3c
RH
3183 || info->gotobj != alpha_elf_tdata (info->tsec->owner)->gotobj)
3184 return 0;
252b5132 3185
a7519a3c
RH
3186 return symval + 8;
3187}
252b5132 3188
a7519a3c
RH
3189static bfd_boolean
3190elf64_alpha_relax_with_lituse (struct alpha_relax_info *info,
3191 bfd_vma symval, Elf_Internal_Rela *irel)
252b5132 3192{
d1c109de
RH
3193 Elf_Internal_Rela *urel, *erel, *irelend = info->relend;
3194 int flags;
a7519a3c
RH
3195 bfd_signed_vma disp;
3196 bfd_boolean fits16;
3197 bfd_boolean fits32;
3198 bfd_boolean lit_reused = FALSE;
3199 bfd_boolean all_optimized = TRUE;
d1c109de
RH
3200 bfd_boolean changed_contents;
3201 bfd_boolean changed_relocs;
3202 bfd_byte *contents = info->contents;
3203 bfd *abfd = info->abfd;
3204 bfd_vma sec_output_vma;
a7519a3c 3205 unsigned int lit_insn;
d1c109de 3206 int relax_pass;
252b5132 3207
d1c109de 3208 lit_insn = bfd_get_32 (abfd, contents + irel->r_offset);
a7519a3c
RH
3209 if (lit_insn >> 26 != OP_LDQ)
3210 {
4eca0228 3211 _bfd_error_handler
695344c0 3212 /* xgettext:c-format */
2dcf00ce 3213 (_("%pB: %pA+%#" PRIx64 ": warning: "
38f14ab8
AM
3214 "%s relocation against unexpected insn"),
3215 abfd, info->sec, (uint64_t) irel->r_offset, "LITERAL");
a7519a3c
RH
3216 return TRUE;
3217 }
252b5132 3218
a7519a3c
RH
3219 /* Can't relax dynamic symbols. */
3220 if (alpha_elf_dynamic_symbol_p (&info->h->root, info->link_info))
3221 return TRUE;
3222
d1c109de
RH
3223 changed_contents = info->changed_contents;
3224 changed_relocs = info->changed_relocs;
3225 sec_output_vma = info->sec->output_section->vma + info->sec->output_offset;
3226 relax_pass = info->link_info->relax_pass;
3227
a7519a3c 3228 /* Summarize how this particular LITERAL is used. */
d1c109de 3229 for (erel = irel+1, flags = 0; erel < irelend; ++erel)
252b5132 3230 {
d1c109de 3231 if (ELF64_R_TYPE (erel->r_info) != R_ALPHA_LITUSE)
a7519a3c 3232 break;
d1c109de
RH
3233 if (erel->r_addend <= 6)
3234 flags |= 1 << erel->r_addend;
a7519a3c 3235 }
252b5132 3236
a7519a3c
RH
3237 /* A little preparation for the loop... */
3238 disp = symval - info->gp;
252b5132 3239
d1c109de 3240 for (urel = irel+1; urel < erel; ++urel)
a7519a3c 3241 {
d1c109de 3242 bfd_vma urel_r_offset = urel->r_offset;
a7519a3c
RH
3243 unsigned int insn;
3244 int insn_disp;
3245 bfd_signed_vma xdisp;
d1c109de 3246 Elf_Internal_Rela nrel;
252b5132 3247
d1c109de 3248 insn = bfd_get_32 (abfd, contents + urel_r_offset);
252b5132 3249
a7519a3c
RH
3250 switch (urel->r_addend)
3251 {
3252 case LITUSE_ALPHA_ADDR:
3253 default:
3254 /* This type is really just a placeholder to note that all
3255 uses cannot be optimized, but to still allow some. */
3256 all_optimized = FALSE;
3257 break;
252b5132 3258
a7519a3c 3259 case LITUSE_ALPHA_BASE:
d1c109de
RH
3260 /* We may only create GPREL relocs during the second pass. */
3261 if (relax_pass == 0)
3262 {
3263 all_optimized = FALSE;
3264 break;
3265 }
3266
a7519a3c 3267 /* We can always optimize 16-bit displacements. */
252b5132 3268
a7519a3c
RH
3269 /* Extract the displacement from the instruction, sign-extending
3270 it if necessary, then test whether it is within 16 or 32 bits
3271 displacement from GP. */
3272 insn_disp = ((insn & 0xffff) ^ 0x8000) - 0x8000;
3273
3274 xdisp = disp + insn_disp;
3275 fits16 = (xdisp >= - (bfd_signed_vma) 0x8000 && xdisp < 0x8000);
3276 fits32 = (xdisp >= - (bfd_signed_vma) 0x80000000
3277 && xdisp < 0x7fff8000);
3278
3279 if (fits16)
3280 {
3281 /* Take the op code and dest from this insn, take the base
3282 register from the literal insn. Leave the offset alone. */
3283 insn = (insn & 0xffe0ffff) | (lit_insn & 0x001f0000);
d1c109de
RH
3284 bfd_put_32 (abfd, (bfd_vma) insn, contents + urel_r_offset);
3285 changed_contents = TRUE;
3286
3287 nrel = *urel;
3288 nrel.r_info = ELF64_R_INFO (ELF64_R_SYM (irel->r_info),
3289 R_ALPHA_GPREL16);
3290 nrel.r_addend = irel->r_addend;
3291
3292 /* As we adjust, move the reloc to the end so that we don't
07d6d2b8 3293 break the LITERAL+LITUSE chain. */
d1c109de 3294 if (urel < --erel)
07d6d2b8 3295 *urel-- = *erel;
d1c109de
RH
3296 *erel = nrel;
3297 changed_relocs = TRUE;
252b5132 3298 }
252b5132 3299
a7519a3c
RH
3300 /* If all mem+byte, we can optimize 32-bit mem displacements. */
3301 else if (fits32 && !(flags & ~6))
3302 {
3303 /* FIXME: sanity check that lit insn Ra is mem insn Rb. */
252b5132 3304
a7519a3c
RH
3305 irel->r_info = ELF64_R_INFO (ELF64_R_SYM (irel->r_info),
3306 R_ALPHA_GPRELHIGH);
3307 lit_insn = (OP_LDAH << 26) | (lit_insn & 0x03ff0000);
d1c109de 3308 bfd_put_32 (abfd, (bfd_vma) lit_insn, contents + irel->r_offset);
a7519a3c 3309 lit_reused = TRUE;
d1c109de 3310 changed_contents = TRUE;
252b5132 3311
07d6d2b8
AM
3312 /* Since all relocs must be optimized, don't bother swapping
3313 this relocation to the end. */
a7519a3c
RH
3314 urel->r_info = ELF64_R_INFO (ELF64_R_SYM (irel->r_info),
3315 R_ALPHA_GPRELLOW);
3316 urel->r_addend = irel->r_addend;
d1c109de 3317 changed_relocs = TRUE;
a7519a3c
RH
3318 }
3319 else
3320 all_optimized = FALSE;
3321 break;
252b5132 3322
a7519a3c
RH
3323 case LITUSE_ALPHA_BYTOFF:
3324 /* We can always optimize byte instructions. */
252b5132 3325
a7519a3c
RH
3326 /* FIXME: sanity check the insn for byte op. Check that the
3327 literal dest reg is indeed Rb in the byte insn. */
252b5132 3328
a7519a3c
RH
3329 insn &= ~ (unsigned) 0x001ff000;
3330 insn |= ((symval & 7) << 13) | 0x1000;
d1c109de
RH
3331 bfd_put_32 (abfd, (bfd_vma) insn, contents + urel_r_offset);
3332 changed_contents = TRUE;
3333
3334 nrel = *urel;
3335 nrel.r_info = ELF64_R_INFO (0, R_ALPHA_NONE);
3336 nrel.r_addend = 0;
3337
3338 /* As we adjust, move the reloc to the end so that we don't
3339 break the LITERAL+LITUSE chain. */
3340 if (urel < --erel)
3341 *urel-- = *erel;
3342 *erel = nrel;
3343 changed_relocs = TRUE;
a7519a3c 3344 break;
252b5132 3345
a7519a3c
RH
3346 case LITUSE_ALPHA_JSR:
3347 case LITUSE_ALPHA_TLSGD:
3348 case LITUSE_ALPHA_TLSLDM:
8288a39e 3349 case LITUSE_ALPHA_JSRDIRECT:
0d5f9994 3350 {
a7519a3c
RH
3351 bfd_vma optdest, org;
3352 bfd_signed_vma odisp;
252b5132 3353
a7519a3c
RH
3354 /* For undefined weak symbols, we're mostly interested in getting
3355 rid of the got entry whenever possible, so optimize this to a
3356 use of the zero register. */
3357 if (info->h && info->h->root.root.type == bfd_link_hash_undefweak)
3358 {
3359 insn |= 31 << 16;
d1c109de 3360 bfd_put_32 (abfd, (bfd_vma) insn, contents + urel_r_offset);
252b5132 3361
d1c109de 3362 changed_contents = TRUE;
a7519a3c
RH
3363 break;
3364 }
252b5132 3365
a7519a3c
RH
3366 /* If not zero, place to jump without needing pv. */
3367 optdest = elf64_alpha_relax_opt_call (info, symval);
d1c109de 3368 org = sec_output_vma + urel_r_offset + 4;
a7519a3c 3369 odisp = (optdest ? optdest : symval) - org;
252b5132 3370
a7519a3c
RH
3371 if (odisp >= -0x400000 && odisp < 0x400000)
3372 {
3373 Elf_Internal_Rela *xrel;
252b5132 3374
a7519a3c
RH
3375 /* Preserve branch prediction call stack when possible. */
3376 if ((insn & INSN_JSR_MASK) == INSN_JSR)
3377 insn = (OP_BSR << 26) | (insn & 0x03e00000);
3378 else
3379 insn = (OP_BR << 26) | (insn & 0x03e00000);
d1c109de
RH
3380 bfd_put_32 (abfd, (bfd_vma) insn, contents + urel_r_offset);
3381 changed_contents = TRUE;
252b5132 3382
d1c109de
RH
3383 nrel = *urel;
3384 nrel.r_info = ELF64_R_INFO (ELF64_R_SYM (irel->r_info),
3385 R_ALPHA_BRADDR);
3386 nrel.r_addend = irel->r_addend;
252b5132 3387
a7519a3c 3388 if (optdest)
d1c109de 3389 nrel.r_addend += optdest - symval;
a7519a3c
RH
3390 else
3391 all_optimized = FALSE;
252b5132 3392
a7519a3c
RH
3393 /* Kill any HINT reloc that might exist for this insn. */
3394 xrel = (elf64_alpha_find_reloc_at_ofs
d1c109de 3395 (info->relocs, info->relend, urel_r_offset,
a7519a3c
RH
3396 R_ALPHA_HINT));
3397 if (xrel)
3398 xrel->r_info = ELF64_R_INFO (0, R_ALPHA_NONE);
252b5132 3399
d1c109de
RH
3400 /* As we adjust, move the reloc to the end so that we don't
3401 break the LITERAL+LITUSE chain. */
3402 if (urel < --erel)
3403 *urel-- = *erel;
3404 *erel = nrel;
3405
a7519a3c
RH
3406 info->changed_relocs = TRUE;
3407 }
3408 else
3409 all_optimized = FALSE;
252b5132 3410
a7519a3c
RH
3411 /* Even if the target is not in range for a direct branch,
3412 if we share a GP, we can eliminate the gp reload. */
3413 if (optdest)
3414 {
3415 Elf_Internal_Rela *gpdisp
3416 = (elf64_alpha_find_reloc_at_ofs
d1c109de 3417 (info->relocs, irelend, urel_r_offset + 4,
a7519a3c
RH
3418 R_ALPHA_GPDISP));
3419 if (gpdisp)
3420 {
d1c109de 3421 bfd_byte *p_ldah = contents + gpdisp->r_offset;
a7519a3c 3422 bfd_byte *p_lda = p_ldah + gpdisp->r_addend;
d1c109de
RH
3423 unsigned int ldah = bfd_get_32 (abfd, p_ldah);
3424 unsigned int lda = bfd_get_32 (abfd, p_lda);
252b5132 3425
a7519a3c
RH
3426 /* Verify that the instruction is "ldah $29,0($26)".
3427 Consider a function that ends in a noreturn call,
3428 and that the next function begins with an ldgp,
3429 and that by accident there is no padding between.
3430 In that case the insn would use $27 as the base. */
3431 if (ldah == 0x27ba0000 && lda == 0x23bd0000)
3432 {
d1c109de
RH
3433 bfd_put_32 (abfd, (bfd_vma) INSN_UNOP, p_ldah);
3434 bfd_put_32 (abfd, (bfd_vma) INSN_UNOP, p_lda);
252b5132 3435
a7519a3c 3436 gpdisp->r_info = ELF64_R_INFO (0, R_ALPHA_NONE);
d1c109de
RH
3437 changed_contents = TRUE;
3438 changed_relocs = TRUE;
a7519a3c
RH
3439 }
3440 }
3441 }
3442 }
3443 break;
252b5132 3444 }
252b5132
RH
3445 }
3446
d1c109de
RH
3447 /* If we reused the literal instruction, we must have optimized all. */
3448 BFD_ASSERT(!lit_reused || all_optimized);
3449
a7519a3c
RH
3450 /* If all cases were optimized, we can reduce the use count on this
3451 got entry by one, possibly eliminating it. */
3452 if (all_optimized)
252b5132 3453 {
a7519a3c 3454 if (--info->gotent->use_count == 0)
252b5132 3455 {
a7519a3c
RH
3456 int sz = alpha_got_entry_size (R_ALPHA_LITERAL);
3457 alpha_elf_tdata (info->gotobj)->total_got_size -= sz;
3458 if (!info->h)
3459 alpha_elf_tdata (info->gotobj)->local_got_size -= sz;
252b5132 3460 }
a7519a3c
RH
3461
3462 /* If the literal instruction is no longer needed (it may have been
3463 reused. We can eliminate it. */
3464 /* ??? For now, I don't want to deal with compacting the section,
3465 so just nop it out. */
3466 if (!lit_reused)
252b5132 3467 {
a7519a3c 3468 irel->r_info = ELF64_R_INFO (0, R_ALPHA_NONE);
d1c109de 3469 changed_relocs = TRUE;
252b5132 3470
d1c109de
RH
3471 bfd_put_32 (abfd, (bfd_vma) INSN_UNOP, contents + irel->r_offset);
3472 changed_contents = TRUE;
a7519a3c 3473 }
a7519a3c 3474 }
d1c109de
RH
3475
3476 info->changed_contents = changed_contents;
3477 info->changed_relocs = changed_relocs;
3478
3479 if (all_optimized || relax_pass == 0)
3480 return TRUE;
3481 return elf64_alpha_relax_got_load (info, symval, irel, R_ALPHA_LITERAL);
252b5132
RH
3482}
3483
b34976b6 3484static bfd_boolean
a7519a3c
RH
3485elf64_alpha_relax_tls_get_addr (struct alpha_relax_info *info, bfd_vma symval,
3486 Elf_Internal_Rela *irel, bfd_boolean is_gd)
f44f99a5 3487{
a7519a3c 3488 bfd_byte *pos[5];
891caa9b 3489 unsigned int insn, tlsgd_reg;
a7519a3c 3490 Elf_Internal_Rela *gpdisp, *hint;
891caa9b 3491 bfd_boolean dynamic, use_gottprel;
a7519a3c 3492 unsigned long new_symndx;
f44f99a5 3493
a7519a3c 3494 dynamic = alpha_elf_dynamic_symbol_p (&info->h->root, info->link_info);
f44f99a5 3495
a7519a3c
RH
3496 /* If a TLS symbol is accessed using IE at least once, there is no point
3497 to use dynamic model for it. */
3498 if (is_gd && info->h && (info->h->flags & ALPHA_ELF_LINK_HASH_TLS_IE))
3499 ;
f44f99a5 3500
a7519a3c
RH
3501 /* If the symbol is local, and we've already committed to DF_STATIC_TLS,
3502 then we might as well relax to IE. */
0e1862bb 3503 else if (bfd_link_pic (info->link_info) && !dynamic
a7519a3c
RH
3504 && (info->link_info->flags & DF_STATIC_TLS))
3505 ;
f44f99a5 3506
a7519a3c 3507 /* Otherwise we must be building an executable to do anything. */
0e1862bb 3508 else if (bfd_link_pic (info->link_info))
a7519a3c 3509 return TRUE;
f44f99a5 3510
a7519a3c
RH
3511 /* The TLSGD/TLSLDM relocation must be followed by a LITERAL and
3512 the matching LITUSE_TLS relocations. */
3513 if (irel + 2 >= info->relend)
3514 return TRUE;
3515 if (ELF64_R_TYPE (irel[1].r_info) != R_ALPHA_LITERAL
3516 || ELF64_R_TYPE (irel[2].r_info) != R_ALPHA_LITUSE
3517 || irel[2].r_addend != (is_gd ? LITUSE_ALPHA_TLSGD : LITUSE_ALPHA_TLSLDM))
3518 return TRUE;
f44f99a5 3519
a7519a3c
RH
3520 /* There must be a GPDISP relocation positioned immediately after the
3521 LITUSE relocation. */
3522 gpdisp = elf64_alpha_find_reloc_at_ofs (info->relocs, info->relend,
3523 irel[2].r_offset + 4, R_ALPHA_GPDISP);
3524 if (!gpdisp)
b34976b6 3525 return TRUE;
f44f99a5 3526
a7519a3c
RH
3527 pos[0] = info->contents + irel[0].r_offset;
3528 pos[1] = info->contents + irel[1].r_offset;
3529 pos[2] = info->contents + irel[2].r_offset;
3530 pos[3] = info->contents + gpdisp->r_offset;
3531 pos[4] = pos[3] + gpdisp->r_addend;
f44f99a5 3532
7dbf3b76
RH
3533 /* Beware of the compiler hoisting part of the sequence out a loop
3534 and adjusting the destination register for the TLSGD insn. If this
3535 happens, there will be a move into $16 before the JSR insn, so only
3536 transformations of the first insn pair should use this register. */
3537 tlsgd_reg = bfd_get_32 (info->abfd, pos[0]);
3538 tlsgd_reg = (tlsgd_reg >> 21) & 31;
3539
a7519a3c
RH
3540 /* Generally, the positions are not allowed to be out of order, lest the
3541 modified insn sequence have different register lifetimes. We can make
3542 an exception when pos 1 is adjacent to pos 0. */
3543 if (pos[1] + 4 == pos[0])
f44f99a5 3544 {
a7519a3c
RH
3545 bfd_byte *tmp = pos[0];
3546 pos[0] = pos[1];
3547 pos[1] = tmp;
f44f99a5 3548 }
a7519a3c
RH
3549 if (pos[1] >= pos[2] || pos[2] >= pos[3])
3550 return TRUE;
cc03ec80 3551
a7519a3c
RH
3552 /* Reduce the use count on the LITERAL relocation. Do this before we
3553 smash the symndx when we adjust the relocations below. */
3554 {
3555 struct alpha_elf_got_entry *lit_gotent;
3556 struct alpha_elf_link_hash_entry *lit_h;
3557 unsigned long indx;
f44f99a5 3558
a7519a3c
RH
3559 BFD_ASSERT (ELF64_R_SYM (irel[1].r_info) >= info->symtab_hdr->sh_info);
3560 indx = ELF64_R_SYM (irel[1].r_info) - info->symtab_hdr->sh_info;
3561 lit_h = alpha_elf_sym_hashes (info->abfd)[indx];
f44f99a5 3562
a7519a3c
RH
3563 while (lit_h->root.root.type == bfd_link_hash_indirect
3564 || lit_h->root.root.type == bfd_link_hash_warning)
3565 lit_h = (struct alpha_elf_link_hash_entry *) lit_h->root.root.u.i.link;
252b5132 3566
a7519a3c
RH
3567 for (lit_gotent = lit_h->got_entries; lit_gotent ;
3568 lit_gotent = lit_gotent->next)
3569 if (lit_gotent->gotobj == info->gotobj
3570 && lit_gotent->reloc_type == R_ALPHA_LITERAL
3571 && lit_gotent->addend == irel[1].r_addend)
3572 break;
3573 BFD_ASSERT (lit_gotent);
252b5132 3574
a7519a3c
RH
3575 if (--lit_gotent->use_count == 0)
3576 {
3577 int sz = alpha_got_entry_size (R_ALPHA_LITERAL);
3578 alpha_elf_tdata (info->gotobj)->total_got_size -= sz;
3579 }
3580 }
252b5132 3581
a7519a3c 3582 /* Change
252b5132 3583
a7519a3c
RH
3584 lda $16,x($gp) !tlsgd!1
3585 ldq $27,__tls_get_addr($gp) !literal!1
3586 jsr $26,($27),__tls_get_addr !lituse_tlsgd!1
3587 ldah $29,0($26) !gpdisp!2
3588 lda $29,0($29) !gpdisp!2
3589 to
3590 ldq $16,x($gp) !gottprel
3591 unop
3592 call_pal rduniq
3593 addq $16,$0,$0
3594 unop
3595 or the first pair to
3596 lda $16,x($gp) !tprel
3597 unop
3598 or
3599 ldah $16,x($gp) !tprelhi
3600 lda $16,x($16) !tprello
3601
3602 as appropriate. */
3603
3604 use_gottprel = FALSE;
cf35638d 3605 new_symndx = is_gd ? ELF64_R_SYM (irel->r_info) : STN_UNDEF;
891caa9b 3606
9a757e4d
RM
3607 /* Some compilers warn about a Boolean-looking expression being
3608 used in a switch. The explicit cast silences them. */
0e1862bb 3609 switch ((int) (!dynamic && !bfd_link_pic (info->link_info)))
252b5132 3610 {
a7519a3c
RH
3611 case 1:
3612 {
3613 bfd_vma tp_base;
3614 bfd_signed_vma disp;
252b5132 3615
a7519a3c
RH
3616 BFD_ASSERT (elf_hash_table (info->link_info)->tls_sec != NULL);
3617 tp_base = alpha_get_tprel_base (info->link_info);
3618 disp = symval - tp_base;
252b5132 3619
a7519a3c
RH
3620 if (disp >= -0x8000 && disp < 0x8000)
3621 {
891caa9b 3622 insn = (OP_LDA << 26) | (tlsgd_reg << 21) | (31 << 16);
a7519a3c
RH
3623 bfd_put_32 (info->abfd, (bfd_vma) insn, pos[0]);
3624 bfd_put_32 (info->abfd, (bfd_vma) INSN_UNOP, pos[1]);
3765b1be 3625
a7519a3c
RH
3626 irel[0].r_offset = pos[0] - info->contents;
3627 irel[0].r_info = ELF64_R_INFO (new_symndx, R_ALPHA_TPREL16);
3628 irel[1].r_info = ELF64_R_INFO (0, R_ALPHA_NONE);
3629 break;
3630 }
3631 else if (disp >= -(bfd_signed_vma) 0x80000000
3632 && disp < (bfd_signed_vma) 0x7fff8000
891caa9b 3633 && pos[0] + 4 == pos[1])
a7519a3c 3634 {
891caa9b 3635 insn = (OP_LDAH << 26) | (tlsgd_reg << 21) | (31 << 16);
a7519a3c 3636 bfd_put_32 (info->abfd, (bfd_vma) insn, pos[0]);
891caa9b 3637 insn = (OP_LDA << 26) | (tlsgd_reg << 21) | (tlsgd_reg << 16);
a7519a3c 3638 bfd_put_32 (info->abfd, (bfd_vma) insn, pos[1]);
3765b1be 3639
a7519a3c
RH
3640 irel[0].r_offset = pos[0] - info->contents;
3641 irel[0].r_info = ELF64_R_INFO (new_symndx, R_ALPHA_TPRELHI);
3642 irel[1].r_offset = pos[1] - info->contents;
3643 irel[1].r_info = ELF64_R_INFO (new_symndx, R_ALPHA_TPRELLO);
3644 break;
3645 }
3646 }
3647 /* FALLTHRU */
3765b1be 3648
3765b1be 3649 default:
a7519a3c
RH
3650 use_gottprel = TRUE;
3651
891caa9b 3652 insn = (OP_LDQ << 26) | (tlsgd_reg << 21) | (29 << 16);
a7519a3c
RH
3653 bfd_put_32 (info->abfd, (bfd_vma) insn, pos[0]);
3654 bfd_put_32 (info->abfd, (bfd_vma) INSN_UNOP, pos[1]);
3655
3656 irel[0].r_offset = pos[0] - info->contents;
3657 irel[0].r_info = ELF64_R_INFO (new_symndx, R_ALPHA_GOTTPREL);
3658 irel[1].r_info = ELF64_R_INFO (0, R_ALPHA_NONE);
3659 break;
3765b1be 3660 }
3765b1be 3661
a7519a3c 3662 bfd_put_32 (info->abfd, (bfd_vma) INSN_RDUNIQ, pos[2]);
252b5132 3663
a7519a3c
RH
3664 insn = INSN_ADDQ | (16 << 21) | (0 << 16) | (0 << 0);
3665 bfd_put_32 (info->abfd, (bfd_vma) insn, pos[3]);
3765b1be 3666
a7519a3c 3667 bfd_put_32 (info->abfd, (bfd_vma) INSN_UNOP, pos[4]);
e92d460e 3668
a7519a3c
RH
3669 irel[2].r_info = ELF64_R_INFO (0, R_ALPHA_NONE);
3670 gpdisp->r_info = ELF64_R_INFO (0, R_ALPHA_NONE);
252b5132 3671
a7519a3c
RH
3672 hint = elf64_alpha_find_reloc_at_ofs (info->relocs, info->relend,
3673 irel[2].r_offset, R_ALPHA_HINT);
3674 if (hint)
3675 hint->r_info = ELF64_R_INFO (0, R_ALPHA_NONE);
252b5132 3676
a7519a3c
RH
3677 info->changed_contents = TRUE;
3678 info->changed_relocs = TRUE;
d6ad34f6 3679
a7519a3c
RH
3680 /* Reduce the use count on the TLSGD/TLSLDM relocation. */
3681 if (--info->gotent->use_count == 0)
3765b1be 3682 {
a7519a3c
RH
3683 int sz = alpha_got_entry_size (info->gotent->reloc_type);
3684 alpha_elf_tdata (info->gotobj)->total_got_size -= sz;
3685 if (!info->h)
3686 alpha_elf_tdata (info->gotobj)->local_got_size -= sz;
3765b1be 3687 }
252b5132 3688
a7519a3c
RH
3689 /* If we've switched to a GOTTPREL relocation, increment the reference
3690 count on that got entry. */
3691 if (use_gottprel)
f44f99a5 3692 {
a7519a3c 3693 struct alpha_elf_got_entry *tprel_gotent;
f44f99a5 3694
a7519a3c
RH
3695 for (tprel_gotent = *info->first_gotent; tprel_gotent ;
3696 tprel_gotent = tprel_gotent->next)
3697 if (tprel_gotent->gotobj == info->gotobj
3698 && tprel_gotent->reloc_type == R_ALPHA_GOTTPREL
3699 && tprel_gotent->addend == irel->r_addend)
3700 break;
3701 if (tprel_gotent)
3702 tprel_gotent->use_count++;
3703 else
f44f99a5 3704 {
a7519a3c
RH
3705 if (info->gotent->use_count == 0)
3706 tprel_gotent = info->gotent;
3707 else
3708 {
3709 tprel_gotent = (struct alpha_elf_got_entry *)
3710 bfd_alloc (info->abfd, sizeof (struct alpha_elf_got_entry));
3711 if (!tprel_gotent)
3712 return FALSE;
f44f99a5 3713
a7519a3c
RH
3714 tprel_gotent->next = *info->first_gotent;
3715 *info->first_gotent = tprel_gotent;
f44f99a5 3716
a7519a3c
RH
3717 tprel_gotent->gotobj = info->gotobj;
3718 tprel_gotent->addend = irel->r_addend;
3719 tprel_gotent->got_offset = -1;
3720 tprel_gotent->reloc_done = 0;
3721 tprel_gotent->reloc_xlated = 0;
3722 }
f44f99a5 3723
a7519a3c
RH
3724 tprel_gotent->use_count = 1;
3725 tprel_gotent->reloc_type = R_ALPHA_GOTTPREL;
3726 }
f44f99a5 3727 }
f44f99a5 3728
b34976b6 3729 return TRUE;
f44f99a5
RH
3730}
3731
b34976b6 3732static bfd_boolean
a7519a3c
RH
3733elf64_alpha_relax_section (bfd *abfd, asection *sec,
3734 struct bfd_link_info *link_info, bfd_boolean *again)
f44f99a5 3735{
a7519a3c
RH
3736 Elf_Internal_Shdr *symtab_hdr;
3737 Elf_Internal_Rela *internal_relocs;
3738 Elf_Internal_Rela *irel, *irelend;
3739 Elf_Internal_Sym *isymbuf = NULL;
3740 struct alpha_elf_got_entry **local_got_entries;
3741 struct alpha_relax_info info;
4dfe6ac6 3742 struct alpha_elf_link_hash_table * htab;
d1c109de 3743 int relax_pass;
4dfe6ac6
NC
3744
3745 htab = alpha_elf_hash_table (link_info);
3746 if (htab == NULL)
3747 return FALSE;
f44f99a5 3748
4a828aab 3749 /* There's nothing to change, yet. */
a7519a3c 3750 *again = FALSE;
f44f99a5 3751
0e1862bb 3752 if (bfd_link_relocatable (link_info)
a7519a3c
RH
3753 || ((sec->flags & (SEC_CODE | SEC_RELOC | SEC_ALLOC))
3754 != (SEC_CODE | SEC_RELOC | SEC_ALLOC))
3755 || sec->reloc_count == 0)
d6ad34f6
RH
3756 return TRUE;
3757
0ffa91dd 3758 BFD_ASSERT (is_alpha_elf (abfd));
d1c109de 3759 relax_pass = link_info->relax_pass;
0ffa91dd 3760
4a828aab 3761 /* Make sure our GOT and PLT tables are up-to-date. */
4dfe6ac6 3762 if (htab->relax_trip != link_info->relax_trip)
4a828aab 3763 {
4dfe6ac6 3764 htab->relax_trip = link_info->relax_trip;
4a828aab 3765
d1c109de 3766 /* This should never fail after the initial round, since the only error
07d6d2b8 3767 is GOT overflow, and relaxation only shrinks the table. However, we
d1c109de
RH
3768 may only merge got sections during the first pass. If we merge
3769 sections after we've created GPREL relocs, the GP for the merged
3770 section backs up which may put the relocs out of range. */
3771 if (!elf64_alpha_size_got_sections (link_info, relax_pass == 0))
4a828aab
RH
3772 abort ();
3773 if (elf_hash_table (link_info)->dynamic_sections_created)
3774 {
3775 elf64_alpha_size_plt_section (link_info);
3776 elf64_alpha_size_rela_got_section (link_info);
3777 }
3778 }
3779
0ffa91dd 3780 symtab_hdr = &elf_symtab_hdr (abfd);
a7519a3c 3781 local_got_entries = alpha_elf_tdata(abfd)->local_got_entries;
252b5132 3782
a7519a3c
RH
3783 /* Load the relocations for this section. */
3784 internal_relocs = (_bfd_elf_link_read_relocs
2c3fc389 3785 (abfd, sec, NULL, (Elf_Internal_Rela *) NULL,
a7519a3c
RH
3786 link_info->keep_memory));
3787 if (internal_relocs == NULL)
3788 return FALSE;
252b5132 3789
a7519a3c
RH
3790 memset(&info, 0, sizeof (info));
3791 info.abfd = abfd;
3792 info.sec = sec;
3793 info.link_info = link_info;
3794 info.symtab_hdr = symtab_hdr;
3795 info.relocs = internal_relocs;
3796 info.relend = irelend = internal_relocs + sec->reloc_count;
3797
3798 /* Find the GP for this object. Do not store the result back via
3799 _bfd_set_gp_value, since this could change again before final. */
3800 info.gotobj = alpha_elf_tdata (abfd)->gotobj;
3801 if (info.gotobj)
3765b1be 3802 {
a7519a3c
RH
3803 asection *sgot = alpha_elf_tdata (info.gotobj)->got;
3804 info.gp = (sgot->output_section->vma
3805 + sgot->output_offset
3806 + 0x8000);
252b5132
RH
3807 }
3808
a7519a3c
RH
3809 /* Get the section contents. */
3810 if (elf_section_data (sec)->this_hdr.contents != NULL)
3811 info.contents = elf_section_data (sec)->this_hdr.contents;
3812 else
3813 {
3814 if (!bfd_malloc_and_get_section (abfd, sec, &info.contents))
3815 goto error_return;
3816 }
252b5132 3817
a7519a3c
RH
3818 for (irel = internal_relocs; irel < irelend; irel++)
3819 {
3820 bfd_vma symval;
3821 struct alpha_elf_got_entry *gotent;
3822 unsigned long r_type = ELF64_R_TYPE (irel->r_info);
3823 unsigned long r_symndx = ELF64_R_SYM (irel->r_info);
3824
3825 /* Early exit for unhandled or unrelaxable relocations. */
d1c109de 3826 if (r_type != R_ALPHA_LITERAL)
07d6d2b8
AM
3827 {
3828 /* We complete everything except LITERAL in the first pass. */
d1c109de
RH
3829 if (relax_pass != 0)
3830 continue;
3831 if (r_type == R_ALPHA_TLSLDM)
3832 {
3833 /* The symbol for a TLSLDM reloc is ignored. Collapse the
07d6d2b8 3834 reloc to the STN_UNDEF (0) symbol so that they all match. */
d1c109de
RH
3835 r_symndx = STN_UNDEF;
3836 }
3837 else if (r_type != R_ALPHA_GOTDTPREL
07d6d2b8 3838 && r_type != R_ALPHA_GOTTPREL
d1c109de
RH
3839 && r_type != R_ALPHA_TLSGD)
3840 continue;
a7519a3c
RH
3841 }
3842
3843 /* Get the value of the symbol referred to by the reloc. */
3844 if (r_symndx < symtab_hdr->sh_info)
3845 {
3846 /* A local symbol. */
3847 Elf_Internal_Sym *isym;
3848
3849 /* Read this BFD's local symbols. */
3850 if (isymbuf == NULL)
3851 {
3852 isymbuf = (Elf_Internal_Sym *) symtab_hdr->contents;
3853 if (isymbuf == NULL)
3854 isymbuf = bfd_elf_get_elf_syms (abfd, symtab_hdr,
3855 symtab_hdr->sh_info, 0,
3856 NULL, NULL, NULL);
3857 if (isymbuf == NULL)
3858 goto error_return;
3859 }
252b5132 3860
a7519a3c 3861 isym = isymbuf + r_symndx;
252b5132 3862
a7519a3c
RH
3863 /* Given the symbol for a TLSLDM reloc is ignored, this also
3864 means forcing the symbol value to the tp base. */
3865 if (r_type == R_ALPHA_TLSLDM)
3866 {
3867 info.tsec = bfd_abs_section_ptr;
3868 symval = alpha_get_tprel_base (info.link_info);
3869 }
3870 else
3871 {
3872 symval = isym->st_value;
3873 if (isym->st_shndx == SHN_UNDEF)
07d6d2b8 3874 continue;
a7519a3c 3875 else if (isym->st_shndx == SHN_ABS)
07d6d2b8 3876 info.tsec = bfd_abs_section_ptr;
a7519a3c 3877 else if (isym->st_shndx == SHN_COMMON)
07d6d2b8 3878 info.tsec = bfd_com_section_ptr;
a7519a3c 3879 else
07d6d2b8 3880 info.tsec = bfd_section_from_elf_index (abfd, isym->st_shndx);
a7519a3c 3881 }
252b5132 3882
a7519a3c
RH
3883 info.h = NULL;
3884 info.other = isym->st_other;
3885 if (local_got_entries)
3886 info.first_gotent = &local_got_entries[r_symndx];
3887 else
3888 {
3889 info.first_gotent = &info.gotent;
3890 info.gotent = NULL;
3891 }
252b5132 3892 }
a7519a3c
RH
3893 else
3894 {
3895 unsigned long indx;
3896 struct alpha_elf_link_hash_entry *h;
252b5132 3897
a7519a3c
RH
3898 indx = r_symndx - symtab_hdr->sh_info;
3899 h = alpha_elf_sym_hashes (abfd)[indx];
3900 BFD_ASSERT (h != NULL);
252b5132 3901
a7519a3c
RH
3902 while (h->root.root.type == bfd_link_hash_indirect
3903 || h->root.root.type == bfd_link_hash_warning)
3904 h = (struct alpha_elf_link_hash_entry *)h->root.root.u.i.link;
252b5132 3905
a7519a3c
RH
3906 /* If the symbol is undefined, we can't do anything with it. */
3907 if (h->root.root.type == bfd_link_hash_undefined)
3908 continue;
252b5132 3909
a7519a3c
RH
3910 /* If the symbol isn't defined in the current module,
3911 again we can't do anything. */
3912 if (h->root.root.type == bfd_link_hash_undefweak)
3913 {
3914 info.tsec = bfd_abs_section_ptr;
3915 symval = 0;
3916 }
3917 else if (!h->root.def_regular)
3918 {
3919 /* Except for TLSGD relocs, which can sometimes be
3920 relaxed to GOTTPREL relocs. */
3921 if (r_type != R_ALPHA_TLSGD)
3922 continue;
3923 info.tsec = bfd_abs_section_ptr;
3924 symval = 0;
3925 }
3926 else
3927 {
3928 info.tsec = h->root.root.u.def.section;
3929 symval = h->root.root.u.def.value;
3930 }
252b5132 3931
a7519a3c
RH
3932 info.h = h;
3933 info.other = h->root.other;
3934 info.first_gotent = &h->got_entries;
3935 }
252b5132 3936
a7519a3c
RH
3937 /* Search for the got entry to be used by this relocation. */
3938 for (gotent = *info.first_gotent; gotent ; gotent = gotent->next)
3939 if (gotent->gotobj == info.gotobj
3940 && gotent->reloc_type == r_type
3941 && gotent->addend == irel->r_addend)
3942 break;
3943 info.gotent = gotent;
252b5132 3944
a7519a3c
RH
3945 symval += info.tsec->output_section->vma + info.tsec->output_offset;
3946 symval += irel->r_addend;
252b5132 3947
a7519a3c 3948 switch (r_type)
252b5132 3949 {
a7519a3c
RH
3950 case R_ALPHA_LITERAL:
3951 BFD_ASSERT(info.gotent != NULL);
252b5132 3952
a7519a3c
RH
3953 /* If there exist LITUSE relocations immediately following, this
3954 opens up all sorts of interesting optimizations, because we
3955 now know every location that this address load is used. */
3956 if (irel+1 < irelend
3957 && ELF64_R_TYPE (irel[1].r_info) == R_ALPHA_LITUSE)
252b5132 3958 {
a7519a3c
RH
3959 if (!elf64_alpha_relax_with_lituse (&info, symval, irel))
3960 goto error_return;
252b5132 3961 }
a7519a3c
RH
3962 else
3963 {
3964 if (!elf64_alpha_relax_got_load (&info, symval, irel, r_type))
3965 goto error_return;
3966 }
3967 break;
252b5132 3968
a7519a3c
RH
3969 case R_ALPHA_GOTDTPREL:
3970 case R_ALPHA_GOTTPREL:
3971 BFD_ASSERT(info.gotent != NULL);
3972 if (!elf64_alpha_relax_got_load (&info, symval, irel, r_type))
3973 goto error_return;
3974 break;
3975
3976 case R_ALPHA_TLSGD:
3977 case R_ALPHA_TLSLDM:
3978 BFD_ASSERT(info.gotent != NULL);
3979 if (!elf64_alpha_relax_tls_get_addr (&info, symval, irel,
3980 r_type == R_ALPHA_TLSGD))
3981 goto error_return;
3982 break;
252b5132
RH
3983 }
3984 }
3985
a7519a3c
RH
3986 if (isymbuf != NULL
3987 && symtab_hdr->contents != (unsigned char *) isymbuf)
3988 {
3989 if (!link_info->keep_memory)
3990 free (isymbuf);
3991 else
252b5132 3992 {
a7519a3c
RH
3993 /* Cache the symbols for elf_link_input_bfd. */
3994 symtab_hdr->contents = (unsigned char *) isymbuf;
252b5132 3995 }
a7519a3c 3996 }
252b5132 3997
a7519a3c
RH
3998 if (info.contents != NULL
3999 && elf_section_data (sec)->this_hdr.contents != info.contents)
4000 {
4001 if (!info.changed_contents && !link_info->keep_memory)
4002 free (info.contents);
4003 else
252b5132 4004 {
a7519a3c
RH
4005 /* Cache the section contents for elf_link_input_bfd. */
4006 elf_section_data (sec)->this_hdr.contents = info.contents;
252b5132 4007 }
a7519a3c 4008 }
252b5132 4009
a7519a3c
RH
4010 if (elf_section_data (sec)->relocs != internal_relocs)
4011 {
4012 if (!info.changed_relocs)
4013 free (internal_relocs);
4014 else
4015 elf_section_data (sec)->relocs = internal_relocs;
252b5132 4016 }
a7519a3c
RH
4017
4018 *again = info.changed_contents || info.changed_relocs;
252b5132 4019
b34976b6 4020 return TRUE;
252b5132 4021
a7519a3c
RH
4022 error_return:
4023 if (isymbuf != NULL
4024 && symtab_hdr->contents != (unsigned char *) isymbuf)
4025 free (isymbuf);
4026 if (info.contents != NULL
4027 && elf_section_data (sec)->this_hdr.contents != info.contents)
4028 free (info.contents);
4029 if (internal_relocs != NULL
4030 && elf_section_data (sec)->relocs != internal_relocs)
4031 free (internal_relocs);
4032 return FALSE;
4033}
4034\f
1bbc9cec
RH
4035/* Emit a dynamic relocation for (DYNINDX, RTYPE, ADDEND) at (SEC, OFFSET)
4036 into the next available slot in SREL. */
4037
4038static void
a7519a3c
RH
4039elf64_alpha_emit_dynrel (bfd *abfd, struct bfd_link_info *info,
4040 asection *sec, asection *srel, bfd_vma offset,
4041 long dynindx, long rtype, bfd_vma addend)
1bbc9cec
RH
4042{
4043 Elf_Internal_Rela outrel;
4044 bfd_byte *loc;
4045
4046 BFD_ASSERT (srel != NULL);
4047
4048 outrel.r_info = ELF64_R_INFO (dynindx, rtype);
4049 outrel.r_addend = addend;
4050
4051 offset = _bfd_elf_section_offset (abfd, info, sec, offset);
4052 if ((offset | 1) != (bfd_vma) -1)
4053 outrel.r_offset = sec->output_section->vma + sec->output_offset + offset;
4054 else
4055 memset (&outrel, 0, sizeof (outrel));
4056
4057 loc = srel->contents;
4058 loc += srel->reloc_count++ * sizeof (Elf64_External_Rela);
4059 bfd_elf64_swap_reloca_out (abfd, &outrel, loc);
eea6121a 4060 BFD_ASSERT (sizeof (Elf64_External_Rela) * srel->reloc_count <= srel->size);
1bbc9cec
RH
4061}
4062
4a67a098
RH
4063/* Relocate an Alpha ELF section for a relocatable link.
4064
4065 We don't have to change anything unless the reloc is against a section
4066 symbol, in which case we have to adjust according to where the section
4067 symbol winds up in the output section. */
4068
b34976b6 4069static bfd_boolean
a7519a3c
RH
4070elf64_alpha_relocate_section_r (bfd *output_bfd ATTRIBUTE_UNUSED,
4071 struct bfd_link_info *info ATTRIBUTE_UNUSED,
4072 bfd *input_bfd, asection *input_section,
4073 bfd_byte *contents ATTRIBUTE_UNUSED,
4074 Elf_Internal_Rela *relocs,
4075 Elf_Internal_Sym *local_syms,
4076 asection **local_sections)
4a67a098
RH
4077{
4078 unsigned long symtab_hdr_sh_info;
4079 Elf_Internal_Rela *rel;
4080 Elf_Internal_Rela *relend;
ab96bf03 4081 struct elf_link_hash_entry **sym_hashes;
b34976b6 4082 bfd_boolean ret_val = TRUE;
4a67a098 4083
0ffa91dd 4084 symtab_hdr_sh_info = elf_symtab_hdr (input_bfd).sh_info;
ab96bf03 4085 sym_hashes = elf_sym_hashes (input_bfd);
4a67a098
RH
4086
4087 relend = relocs + input_section->reloc_count;
4088 for (rel = relocs; rel < relend; rel++)
4089 {
4090 unsigned long r_symndx;
4091 Elf_Internal_Sym *sym;
4092 asection *sec;
4093 unsigned long r_type;
4094
ab96bf03 4095 r_type = ELF64_R_TYPE (rel->r_info);
4a67a098
RH
4096 if (r_type >= R_ALPHA_max)
4097 {
4eca0228 4098 _bfd_error_handler
695344c0 4099 /* xgettext:c-format */
0aa13fee 4100 (_("%pB: unsupported relocation type %#x"),
d003868e 4101 input_bfd, (int) r_type);
4a67a098 4102 bfd_set_error (bfd_error_bad_value);
b34976b6 4103 ret_val = FALSE;
4a67a098
RH
4104 continue;
4105 }
4106
4a67a098
RH
4107 /* The symbol associated with GPDISP and LITUSE is
4108 immaterial. Only the addend is significant. */
4109 if (r_type == R_ALPHA_GPDISP || r_type == R_ALPHA_LITUSE)
4110 continue;
4111
ab96bf03 4112 r_symndx = ELF64_R_SYM (rel->r_info);
4a67a098
RH
4113 if (r_symndx < symtab_hdr_sh_info)
4114 {
4115 sym = local_syms + r_symndx;
ab96bf03 4116 sec = local_sections[r_symndx];
4a67a098 4117 }
ab96bf03
AM
4118 else
4119 {
4120 struct elf_link_hash_entry *h;
4121
4122 h = sym_hashes[r_symndx - symtab_hdr_sh_info];
4123
4124 while (h->root.type == bfd_link_hash_indirect
4125 || h->root.type == bfd_link_hash_warning)
4126 h = (struct elf_link_hash_entry *) h->root.u.i.link;
4127
4128 if (h->root.type != bfd_link_hash_defined
4129 && h->root.type != bfd_link_hash_defweak)
4130 continue;
4131
4132 sym = NULL;
4133 sec = h->root.u.def.section;
4134 }
4135
dbaa2011 4136 if (sec != NULL && discarded_section (sec))
e4067dbb 4137 RELOC_AGAINST_DISCARDED_SECTION (info, input_bfd, input_section,
545fd46b
MR
4138 rel, 1, relend,
4139 elf64_alpha_howto_table + r_type, 0,
e4067dbb 4140 contents);
ab96bf03
AM
4141
4142 if (sym != NULL && ELF_ST_TYPE (sym->st_info) == STT_SECTION)
4143 rel->r_addend += sec->output_offset;
4a67a098
RH
4144 }
4145
4146 return ret_val;
4147}
4148
252b5132
RH
4149/* Relocate an Alpha ELF section. */
4150
b34976b6 4151static bfd_boolean
a7519a3c
RH
4152elf64_alpha_relocate_section (bfd *output_bfd, struct bfd_link_info *info,
4153 bfd *input_bfd, asection *input_section,
4154 bfd_byte *contents, Elf_Internal_Rela *relocs,
4155 Elf_Internal_Sym *local_syms,
4156 asection **local_sections)
252b5132 4157{
4a67a098 4158 Elf_Internal_Shdr *symtab_hdr;
252b5132
RH
4159 Elf_Internal_Rela *rel;
4160 Elf_Internal_Rela *relend;
4a67a098
RH
4161 asection *sgot, *srel, *srelgot;
4162 bfd *dynobj, *gotobj;
4163 bfd_vma gp, tp_base, dtp_base;
4164 struct alpha_elf_got_entry **local_got_entries;
b34976b6 4165 bfd_boolean ret_val;
252b5132 4166
0ffa91dd 4167 BFD_ASSERT (is_alpha_elf (input_bfd));
68ffbac6 4168
4a67a098 4169 /* Handle relocatable links with a smaller loop. */
0e1862bb 4170 if (bfd_link_relocatable (info))
4a67a098
RH
4171 return elf64_alpha_relocate_section_r (output_bfd, info, input_bfd,
4172 input_section, contents, relocs,
4173 local_syms, local_sections);
4174
4175 /* This is a final link. */
4176
b34976b6 4177 ret_val = TRUE;
252b5132 4178
0ffa91dd 4179 symtab_hdr = &elf_symtab_hdr (input_bfd);
3765b1be 4180
4a67a098 4181 dynobj = elf_hash_table (info)->dynobj;
ce558b89 4182 srelgot = elf_hash_table (info)->srelgot;
4a67a098 4183
3241278a
RH
4184 if (input_section->flags & SEC_ALLOC)
4185 {
4186 const char *section_name;
4187 section_name = (bfd_elf_string_from_elf_section
4188 (input_bfd, elf_elfheader(input_bfd)->e_shstrndx,
d4730f92 4189 _bfd_elf_single_rel_hdr (input_section)->sh_name));
3241278a 4190 BFD_ASSERT(section_name != NULL);
3d4d4302 4191 srel = bfd_get_linker_section (dynobj, section_name);
3241278a
RH
4192 }
4193 else
4194 srel = NULL;
3765b1be 4195
4a67a098
RH
4196 /* Find the gp value for this input bfd. */
4197 gotobj = alpha_elf_tdata (input_bfd)->gotobj;
4198 if (gotobj)
4199 {
4200 sgot = alpha_elf_tdata (gotobj)->got;
4201 gp = _bfd_get_gp_value (gotobj);
4202 if (gp == 0)
252b5132 4203 {
4a67a098
RH
4204 gp = (sgot->output_section->vma
4205 + sgot->output_offset
4206 + 0x8000);
4207 _bfd_set_gp_value (gotobj, gp);
4208 }
4209 }
4210 else
4211 {
4212 sgot = NULL;
4213 gp = 0;
4214 }
3765b1be 4215
4a67a098
RH
4216 local_got_entries = alpha_elf_tdata(input_bfd)->local_got_entries;
4217
e1918d23 4218 if (elf_hash_table (info)->tls_sec != NULL)
4a67a098 4219 {
e1918d23
AM
4220 dtp_base = alpha_get_dtprel_base (info);
4221 tp_base = alpha_get_tprel_base (info);
252b5132 4222 }
4a67a098
RH
4223 else
4224 dtp_base = tp_base = 0;
252b5132 4225
252b5132 4226 relend = relocs + input_section->reloc_count;
4a67a098 4227 for (rel = relocs; rel < relend; rel++)
252b5132 4228 {
4a67a098 4229 struct alpha_elf_link_hash_entry *h = NULL;
3765b1be
RH
4230 struct alpha_elf_got_entry *gotent;
4231 bfd_reloc_status_type r;
252b5132
RH
4232 reloc_howto_type *howto;
4233 unsigned long r_symndx;
4a67a098
RH
4234 Elf_Internal_Sym *sym = NULL;
4235 asection *sec = NULL;
3765b1be 4236 bfd_vma value;
dc810e39 4237 bfd_vma addend;
b34976b6 4238 bfd_boolean dynamic_symbol_p;
1d5316ab 4239 bfd_boolean unresolved_reloc = FALSE;
b34976b6 4240 bfd_boolean undef_weak_ref = FALSE;
3765b1be 4241 unsigned long r_type;
252b5132
RH
4242
4243 r_type = ELF64_R_TYPE(rel->r_info);
3765b1be 4244 if (r_type >= R_ALPHA_max)
252b5132 4245 {
4eca0228 4246 _bfd_error_handler
695344c0 4247 /* xgettext:c-format */
0aa13fee 4248 (_("%pB: unsupported relocation type %#x"),
d003868e 4249 input_bfd, (int) r_type);
252b5132 4250 bfd_set_error (bfd_error_bad_value);
b34976b6 4251 ret_val = FALSE;
3765b1be 4252 continue;
252b5132 4253 }
252b5132 4254
3765b1be 4255 howto = elf64_alpha_howto_table + r_type;
252b5132
RH
4256 r_symndx = ELF64_R_SYM(rel->r_info);
4257
cc03ec80 4258 /* The symbol for a TLSLDM reloc is ignored. Collapse the
cf35638d 4259 reloc to the STN_UNDEF (0) symbol so that they all match. */
cc03ec80 4260 if (r_type == R_ALPHA_TLSLDM)
cf35638d 4261 r_symndx = STN_UNDEF;
cc03ec80 4262
252b5132
RH
4263 if (r_symndx < symtab_hdr->sh_info)
4264 {
8517fae7 4265 asection *msec;
252b5132
RH
4266 sym = local_syms + r_symndx;
4267 sec = local_sections[r_symndx];
8517fae7
AM
4268 msec = sec;
4269 value = _bfd_elf_rela_local_sym (output_bfd, sym, &msec, rel);
3765b1be 4270
cf35638d 4271 /* If this is a tp-relative relocation against sym STN_UNDEF (0),
cc03ec80 4272 this is hackery from relax_section. Force the value to
f915360b 4273 be the tls module base. */
cf35638d 4274 if (r_symndx == STN_UNDEF
cc03ec80
RH
4275 && (r_type == R_ALPHA_TLSLDM
4276 || r_type == R_ALPHA_GOTTPREL
4277 || r_type == R_ALPHA_TPREL64
4278 || r_type == R_ALPHA_TPRELHI
4279 || r_type == R_ALPHA_TPRELLO
4280 || r_type == R_ALPHA_TPREL16))
f915360b 4281 value = dtp_base;
cc03ec80 4282
4a67a098
RH
4283 if (local_got_entries)
4284 gotent = local_got_entries[r_symndx];
4285 else
4286 gotent = NULL;
3765b1be
RH
4287
4288 /* Need to adjust local GOT entries' addends for SEC_MERGE
4289 unless it has been done already. */
4290 if ((sec->flags & SEC_MERGE)
048d873d 4291 && ELF_ST_TYPE (sym->st_info) == STT_SECTION
dbaa2011 4292 && sec->sec_info_type == SEC_INFO_TYPE_MERGE
048d873d
RH
4293 && gotent
4294 && !gotent->reloc_xlated)
3765b1be
RH
4295 {
4296 struct alpha_elf_got_entry *ent;
3765b1be
RH
4297
4298 for (ent = gotent; ent; ent = ent->next)
4299 {
4300 ent->reloc_xlated = 1;
4301 if (ent->use_count == 0)
4302 continue;
4303 msec = sec;
4304 ent->addend =
4305 _bfd_merged_section_offset (output_bfd, &msec,
4306 elf_section_data (sec)->
4307 sec_info,
753731ee 4308 sym->st_value + ent->addend);
3765b1be
RH
4309 ent->addend -= sym->st_value;
4310 ent->addend += msec->output_section->vma
4311 + msec->output_offset
4312 - sec->output_section->vma
4313 - sec->output_offset;
4314 }
4315 }
4316
b34976b6 4317 dynamic_symbol_p = FALSE;
252b5132
RH
4318 }
4319 else
4320 {
62d887d4 4321 bfd_boolean warned, ignored;
560e09e9 4322 struct elf_link_hash_entry *hh;
b2a8e766
AM
4323 struct elf_link_hash_entry **sym_hashes = elf_sym_hashes (input_bfd);
4324
4325 RELOC_FOR_GLOBAL_SYMBOL (info, input_bfd, input_section, rel,
4326 r_symndx, symtab_hdr, sym_hashes,
4327 hh, sec, value,
62d887d4 4328 unresolved_reloc, warned, ignored);
560e09e9
NC
4329
4330 if (warned)
4331 continue;
252b5132 4332
560e09e9
NC
4333 if (value == 0
4334 && ! unresolved_reloc
4335 && hh->root.type == bfd_link_hash_undefweak)
b34976b6 4336 undef_weak_ref = TRUE;
3765b1be 4337
560e09e9 4338 h = (struct alpha_elf_link_hash_entry *) hh;
07d6d2b8 4339 dynamic_symbol_p = alpha_elf_dynamic_symbol_p (&h->root, info);
3765b1be 4340 gotent = h->got_entries;
252b5132 4341 }
3765b1be 4342
dbaa2011 4343 if (sec != NULL && discarded_section (sec))
e4067dbb 4344 RELOC_AGAINST_DISCARDED_SECTION (info, input_bfd, input_section,
545fd46b 4345 rel, 1, relend, howto, 0, contents);
ab96bf03 4346
252b5132 4347 addend = rel->r_addend;
3765b1be
RH
4348 value += addend;
4349
4350 /* Search for the proper got entry. */
4351 for (; gotent ; gotent = gotent->next)
4352 if (gotent->gotobj == gotobj
4353 && gotent->reloc_type == r_type
4354 && gotent->addend == addend)
4355 break;
252b5132
RH
4356
4357 switch (r_type)
4358 {
4359 case R_ALPHA_GPDISP:
4360 {
4361 bfd_byte *p_ldah, *p_lda;
4362
4363 BFD_ASSERT(gp != 0);
4364
3765b1be
RH
4365 value = (input_section->output_section->vma
4366 + input_section->output_offset
4367 + rel->r_offset);
252b5132 4368
3765b1be 4369 p_ldah = contents + rel->r_offset;
252b5132
RH
4370 p_lda = p_ldah + rel->r_addend;
4371
3765b1be 4372 r = elf64_alpha_do_reloc_gpdisp (input_bfd, gp - value,
252b5132
RH
4373 p_ldah, p_lda);
4374 }
4375 break;
4376
252b5132 4377 case R_ALPHA_LITERAL:
3765b1be
RH
4378 BFD_ASSERT(sgot != NULL);
4379 BFD_ASSERT(gp != 0);
4380 BFD_ASSERT(gotent != NULL);
4381 BFD_ASSERT(gotent->use_count >= 1);
f7460f5f 4382
3765b1be
RH
4383 if (!gotent->reloc_done)
4384 {
4385 gotent->reloc_done = 1;
252b5132 4386
3765b1be
RH
4387 bfd_put_64 (output_bfd, value,
4388 sgot->contents + gotent->got_offset);
252b5132 4389
3765b1be
RH
4390 /* If the symbol has been forced local, output a
4391 RELATIVE reloc, otherwise it will be handled in
4392 finish_dynamic_symbol. */
0e1862bb
L
4393 if (bfd_link_pic (info)
4394 && !dynamic_symbol_p
4395 && !undef_weak_ref)
1bbc9cec
RH
4396 elf64_alpha_emit_dynrel (output_bfd, info, sgot, srelgot,
4397 gotent->got_offset, 0,
4398 R_ALPHA_RELATIVE, value);
3765b1be 4399 }
252b5132 4400
3765b1be
RH
4401 value = (sgot->output_section->vma
4402 + sgot->output_offset
4403 + gotent->got_offset);
4404 value -= gp;
252b5132
RH
4405 goto default_reloc;
4406
4407 case R_ALPHA_GPREL32:
ec1659c8 4408 case R_ALPHA_GPREL16:
252b5132 4409 case R_ALPHA_GPRELLOW:
3765b1be 4410 if (dynamic_symbol_p)
07d6d2b8 4411 {
4eca0228 4412 _bfd_error_handler
695344c0 4413 /* xgettext:c-format */
871b3ab2 4414 (_("%pB: gp-relative relocation against dynamic symbol %s"),
07d6d2b8
AM
4415 input_bfd, h->root.root.root.string);
4416 ret_val = FALSE;
4417 }
252b5132 4418 BFD_ASSERT(gp != 0);
3765b1be 4419 value -= gp;
252b5132
RH
4420 goto default_reloc;
4421
4422 case R_ALPHA_GPRELHIGH:
3765b1be 4423 if (dynamic_symbol_p)
07d6d2b8 4424 {
4eca0228 4425 _bfd_error_handler
695344c0 4426 /* xgettext:c-format */
871b3ab2 4427 (_("%pB: gp-relative relocation against dynamic symbol %s"),
07d6d2b8
AM
4428 input_bfd, h->root.root.root.string);
4429 ret_val = FALSE;
4430 }
252b5132 4431 BFD_ASSERT(gp != 0);
3765b1be
RH
4432 value -= gp;
4433 value = ((bfd_signed_vma) value >> 16) + ((value >> 15) & 1);
252b5132
RH
4434 goto default_reloc;
4435
252b5132 4436 case R_ALPHA_HINT:
f94952df
RH
4437 /* A call to a dynamic symbol is definitely out of range of
4438 the 16-bit displacement. Don't bother writing anything. */
3765b1be 4439 if (dynamic_symbol_p)
f94952df
RH
4440 {
4441 r = bfd_reloc_ok;
4442 break;
4443 }
3765b1be
RH
4444 /* The regular PC-relative stuff measures from the start of
4445 the instruction rather than the end. */
4446 value -= 4;
4447 goto default_reloc;
f94952df
RH
4448
4449 case R_ALPHA_BRADDR:
3765b1be 4450 if (dynamic_symbol_p)
07d6d2b8 4451 {
4eca0228 4452 _bfd_error_handler
695344c0 4453 /* xgettext:c-format */
871b3ab2 4454 (_("%pB: pc-relative relocation against dynamic symbol %s"),
07d6d2b8
AM
4455 input_bfd, h->root.root.root.string);
4456 ret_val = FALSE;
4457 }
252b5132
RH
4458 /* The regular PC-relative stuff measures from the start of
4459 the instruction rather than the end. */
3765b1be 4460 value -= 4;
252b5132
RH
4461 goto default_reloc;
4462
7793f4d0
RH
4463 case R_ALPHA_BRSGP:
4464 {
4465 int other;
4466 const char *name;
4467
4468 /* The regular PC-relative stuff measures from the start of
4469 the instruction rather than the end. */
3765b1be 4470 value -= 4;
7793f4d0 4471
ccf00ab6
RH
4472 /* The source and destination gp must be the same. Note that
4473 the source will always have an assigned gp, since we forced
4474 one in check_relocs, but that the destination may not, as
cedb70c5 4475 it might not have had any relocations at all. Also take
ccf00ab6
RH
4476 care not to crash if H is an undefined symbol. */
4477 if (h != NULL && sec != NULL
4478 && alpha_elf_tdata (sec->owner)->gotobj
7793f4d0
RH
4479 && gotobj != alpha_elf_tdata (sec->owner)->gotobj)
4480 {
4eca0228 4481 _bfd_error_handler
695344c0 4482 /* xgettext:c-format */
871b3ab2 4483 (_("%pB: change in gp: BRSGP %s"),
d003868e 4484 input_bfd, h->root.root.root.string);
b34976b6 4485 ret_val = FALSE;
7793f4d0
RH
4486 }
4487
4488 /* The symbol should be marked either NOPV or STD_GPLOAD. */
4489 if (h != NULL)
4490 other = h->root.other;
4491 else
4492 other = sym->st_other;
4493 switch (other & STO_ALPHA_STD_GPLOAD)
4494 {
4495 case STO_ALPHA_NOPV:
07d6d2b8 4496 break;
7793f4d0 4497 case STO_ALPHA_STD_GPLOAD:
64e04ecd 4498 value += 8;
7793f4d0
RH
4499 break;
4500 default:
4501 if (h != NULL)
4502 name = h->root.root.root.string;
4503 else
4504 {
4505 name = (bfd_elf_string_from_elf_section
4506 (input_bfd, symtab_hdr->sh_link, sym->st_name));
4507 if (name == NULL)
4508 name = _("<unknown>");
4509 else if (name[0] == 0)
fd361982 4510 name = bfd_section_name (sec);
7793f4d0 4511 }
4eca0228 4512 _bfd_error_handler
695344c0 4513 /* xgettext:c-format */
871b3ab2 4514 (_("%pB: !samegp reloc against symbol without .prologue: %s"),
d003868e 4515 input_bfd, name);
b34976b6 4516 ret_val = FALSE;
7793f4d0
RH
4517 break;
4518 }
4519
4520 goto default_reloc;
4521 }
4522
252b5132
RH
4523 case R_ALPHA_REFLONG:
4524 case R_ALPHA_REFQUAD:
3765b1be
RH
4525 case R_ALPHA_DTPREL64:
4526 case R_ALPHA_TPREL64:
252b5132 4527 {
1bbc9cec
RH
4528 long dynindx, dyntype = r_type;
4529 bfd_vma dynaddend;
252b5132
RH
4530
4531 /* Careful here to remember RELATIVE relocations for global
4532 variables for symbolic shared objects. */
4533
3765b1be 4534 if (dynamic_symbol_p)
252b5132
RH
4535 {
4536 BFD_ASSERT(h->root.dynindx != -1);
1bbc9cec
RH
4537 dynindx = h->root.dynindx;
4538 dynaddend = addend;
3765b1be
RH
4539 addend = 0, value = 0;
4540 }
4541 else if (r_type == R_ALPHA_DTPREL64)
4542 {
e1918d23 4543 BFD_ASSERT (elf_hash_table (info)->tls_sec != NULL);
3765b1be
RH
4544 value -= dtp_base;
4545 goto default_reloc;
4546 }
4547 else if (r_type == R_ALPHA_TPREL64)
4548 {
e1918d23 4549 BFD_ASSERT (elf_hash_table (info)->tls_sec != NULL);
3cbc1e5e 4550 if (!bfd_link_dll (info))
1bbc9cec
RH
4551 {
4552 value -= tp_base;
4553 goto default_reloc;
4554 }
4555 dynindx = 0;
4556 dynaddend = value - dtp_base;
252b5132 4557 }
0e1862bb 4558 else if (bfd_link_pic (info)
cf35638d 4559 && r_symndx != STN_UNDEF
d6ad34f6 4560 && (input_section->flags & SEC_ALLOC)
1d5316ab
AM
4561 && !undef_weak_ref
4562 && !(unresolved_reloc
4563 && (_bfd_elf_section_offset (output_bfd, info,
4564 input_section,
4565 rel->r_offset)
4566 == (bfd_vma) -1)))
252b5132 4567 {
3765b1be
RH
4568 if (r_type == R_ALPHA_REFLONG)
4569 {
4eca0228 4570 _bfd_error_handler
695344c0 4571 /* xgettext:c-format */
871b3ab2 4572 (_("%pB: unhandled dynamic relocation against %s"),
d003868e 4573 input_bfd,
3765b1be 4574 h->root.root.root.string);
b34976b6 4575 ret_val = FALSE;
3765b1be 4576 }
1bbc9cec
RH
4577 dynindx = 0;
4578 dyntype = R_ALPHA_RELATIVE;
4579 dynaddend = value;
252b5132
RH
4580 }
4581 else
4582 goto default_reloc;
4583
3241278a
RH
4584 if (input_section->flags & SEC_ALLOC)
4585 elf64_alpha_emit_dynrel (output_bfd, info, input_section,
4586 srel, rel->r_offset, dynindx,
4587 dyntype, dynaddend);
252b5132
RH
4588 }
4589 goto default_reloc;
4590
3765b1be 4591 case R_ALPHA_SREL16:
84de6048
RH
4592 case R_ALPHA_SREL32:
4593 case R_ALPHA_SREL64:
3765b1be 4594 if (dynamic_symbol_p)
07d6d2b8 4595 {
4eca0228 4596 _bfd_error_handler
695344c0 4597 /* xgettext:c-format */
871b3ab2 4598 (_("%pB: pc-relative relocation against dynamic symbol %s"),
07d6d2b8
AM
4599 input_bfd, h->root.root.root.string);
4600 ret_val = FALSE;
4601 }
3cbc1e5e 4602 else if (bfd_link_pic (info)
0e1862bb 4603 && undef_weak_ref)
07d6d2b8 4604 {
4eca0228 4605 _bfd_error_handler
695344c0 4606 /* xgettext:c-format */
871b3ab2 4607 (_("%pB: pc-relative relocation against undefined weak symbol %s"),
07d6d2b8
AM
4608 input_bfd, h->root.root.root.string);
4609 ret_val = FALSE;
4610 }
d6ad34f6 4611
3765b1be 4612
84de6048
RH
4613 /* ??? .eh_frame references to discarded sections will be smashed
4614 to relocations against SHN_UNDEF. The .eh_frame format allows
4615 NULL to be encoded as 0 in any format, so this works here. */
1d5316ab
AM
4616 if (r_symndx == STN_UNDEF
4617 || (unresolved_reloc
4618 && _bfd_elf_section_offset (output_bfd, info,
4619 input_section,
4620 rel->r_offset) == (bfd_vma) -1))
84de6048
RH
4621 howto = (elf64_alpha_howto_table
4622 + (r_type - R_ALPHA_SREL32 + R_ALPHA_REFLONG));
4623 goto default_reloc;
4624
3765b1be
RH
4625 case R_ALPHA_TLSLDM:
4626 /* Ignore the symbol for the relocation. The result is always
4627 the current module. */
4628 dynamic_symbol_p = 0;
4629 /* FALLTHRU */
4630
4631 case R_ALPHA_TLSGD:
4632 if (!gotent->reloc_done)
4633 {
4634 gotent->reloc_done = 1;
4635
4636 /* Note that the module index for the main program is 1. */
0e1862bb
L
4637 bfd_put_64 (output_bfd,
4638 !bfd_link_pic (info) && !dynamic_symbol_p,
3765b1be
RH
4639 sgot->contents + gotent->got_offset);
4640
4641 /* If the symbol has been forced local, output a
4642 DTPMOD64 reloc, otherwise it will be handled in
4643 finish_dynamic_symbol. */
0e1862bb 4644 if (bfd_link_pic (info) && !dynamic_symbol_p)
1bbc9cec
RH
4645 elf64_alpha_emit_dynrel (output_bfd, info, sgot, srelgot,
4646 gotent->got_offset, 0,
4647 R_ALPHA_DTPMOD64, 0);
3765b1be
RH
4648
4649 if (dynamic_symbol_p || r_type == R_ALPHA_TLSLDM)
4650 value = 0;
4651 else
4652 {
e1918d23 4653 BFD_ASSERT (elf_hash_table (info)->tls_sec != NULL);
07d6d2b8 4654 value -= dtp_base;
3765b1be
RH
4655 }
4656 bfd_put_64 (output_bfd, value,
4657 sgot->contents + gotent->got_offset + 8);
4658 }
4659
4660 value = (sgot->output_section->vma
4661 + sgot->output_offset
4662 + gotent->got_offset);
4663 value -= gp;
4664 goto default_reloc;
4665
4666 case R_ALPHA_DTPRELHI:
4667 case R_ALPHA_DTPRELLO:
4668 case R_ALPHA_DTPREL16:
4669 if (dynamic_symbol_p)
07d6d2b8 4670 {
4eca0228 4671 _bfd_error_handler
695344c0 4672 /* xgettext:c-format */
871b3ab2 4673 (_("%pB: dtp-relative relocation against dynamic symbol %s"),
07d6d2b8
AM
4674 input_bfd, h->root.root.root.string);
4675 ret_val = FALSE;
4676 }
e1918d23 4677 BFD_ASSERT (elf_hash_table (info)->tls_sec != NULL);
3765b1be 4678 value -= dtp_base;
9e756d64
RH
4679 if (r_type == R_ALPHA_DTPRELHI)
4680 value = ((bfd_signed_vma) value >> 16) + ((value >> 15) & 1);
3765b1be
RH
4681 goto default_reloc;
4682
4683 case R_ALPHA_TPRELHI:
4684 case R_ALPHA_TPRELLO:
4685 case R_ALPHA_TPREL16:
3cbc1e5e 4686 if (bfd_link_dll (info))
9e756d64 4687 {
4eca0228 4688 _bfd_error_handler
695344c0 4689 /* xgettext:c-format */
871b3ab2 4690 (_("%pB: TLS local exec code cannot be linked into shared objects"),
d003868e 4691 input_bfd);
07d6d2b8 4692 ret_val = FALSE;
9e756d64
RH
4693 }
4694 else if (dynamic_symbol_p)
07d6d2b8 4695 {
4eca0228 4696 _bfd_error_handler
695344c0 4697 /* xgettext:c-format */
871b3ab2 4698 (_("%pB: tp-relative relocation against dynamic symbol %s"),
07d6d2b8
AM
4699 input_bfd, h->root.root.root.string);
4700 ret_val = FALSE;
4701 }
e1918d23 4702 BFD_ASSERT (elf_hash_table (info)->tls_sec != NULL);
3765b1be 4703 value -= tp_base;
9e756d64
RH
4704 if (r_type == R_ALPHA_TPRELHI)
4705 value = ((bfd_signed_vma) value >> 16) + ((value >> 15) & 1);
3765b1be
RH
4706 goto default_reloc;
4707
4708 case R_ALPHA_GOTDTPREL:
4709 case R_ALPHA_GOTTPREL:
4710 BFD_ASSERT(sgot != NULL);
4711 BFD_ASSERT(gp != 0);
4712 BFD_ASSERT(gotent != NULL);
4713 BFD_ASSERT(gotent->use_count >= 1);
4714
4715 if (!gotent->reloc_done)
4716 {
4717 gotent->reloc_done = 1;
4718
4719 if (dynamic_symbol_p)
4720 value = 0;
4721 else
4722 {
e1918d23 4723 BFD_ASSERT (elf_hash_table (info)->tls_sec != NULL);
1bbc9cec
RH
4724 if (r_type == R_ALPHA_GOTDTPREL)
4725 value -= dtp_base;
28fbeab8 4726 else if (bfd_link_executable (info))
1bbc9cec
RH
4727 value -= tp_base;
4728 else
4729 {
4730 elf64_alpha_emit_dynrel (output_bfd, info, sgot, srelgot,
4731 gotent->got_offset, 0,
4732 R_ALPHA_TPREL64,
4733 value - dtp_base);
4734 value = 0;
4735 }
3765b1be
RH
4736 }
4737 bfd_put_64 (output_bfd, value,
4738 sgot->contents + gotent->got_offset);
4739 }
4740
4741 value = (sgot->output_section->vma
4742 + sgot->output_offset
4743 + gotent->got_offset);
4744 value -= gp;
4745 goto default_reloc;
4746
252b5132
RH
4747 default:
4748 default_reloc:
4749 r = _bfd_final_link_relocate (howto, input_bfd, input_section,
3765b1be 4750 contents, rel->r_offset, value, 0);
252b5132
RH
4751 break;
4752 }
4753
4754 switch (r)
4755 {
4756 case bfd_reloc_ok:
4757 break;
4758
4759 case bfd_reloc_overflow:
4760 {
4761 const char *name;
4762
ed4de5e2
JJ
4763 /* Don't warn if the overflow is due to pc relative reloc
4764 against discarded section. Section optimization code should
4765 handle it. */
4766
4767 if (r_symndx < symtab_hdr->sh_info
4768 && sec != NULL && howto->pc_relative
dbaa2011 4769 && discarded_section (sec))
ed4de5e2
JJ
4770 break;
4771
252b5132 4772 if (h != NULL)
dfeffb9f 4773 name = NULL;
252b5132
RH
4774 else
4775 {
4776 name = (bfd_elf_string_from_elf_section
4777 (input_bfd, symtab_hdr->sh_link, sym->st_name));
4778 if (name == NULL)
b34976b6 4779 return FALSE;
252b5132 4780 if (*name == '\0')
fd361982 4781 name = bfd_section_name (sec);
252b5132 4782 }
1a72702b
AM
4783 (*info->callbacks->reloc_overflow)
4784 (info, (h ? &h->root.root : NULL), name, howto->name,
4785 (bfd_vma) 0, input_bfd, input_section, rel->r_offset);
252b5132
RH
4786 }
4787 break;
4788
4789 default:
4790 case bfd_reloc_outofrange:
4791 abort ();
4792 }
4793 }
4794
f16fbd61 4795 return ret_val;
252b5132
RH
4796}
4797
4798/* Finish up dynamic symbol handling. We set the contents of various
4799 dynamic sections here. */
4800
b34976b6 4801static bfd_boolean
a7519a3c
RH
4802elf64_alpha_finish_dynamic_symbol (bfd *output_bfd, struct bfd_link_info *info,
4803 struct elf_link_hash_entry *h,
4804 Elf_Internal_Sym *sym)
252b5132 4805{
6ec7057a 4806 struct alpha_elf_link_hash_entry *ah = (struct alpha_elf_link_hash_entry *)h;
252b5132 4807
6ec7057a 4808 if (h->needs_plt)
252b5132
RH
4809 {
4810 /* Fill in the .plt entry for this symbol. */
4811 asection *splt, *sgot, *srel;
4812 Elf_Internal_Rela outrel;
947216bf 4813 bfd_byte *loc;
252b5132
RH
4814 bfd_vma got_addr, plt_addr;
4815 bfd_vma plt_index;
4816 struct alpha_elf_got_entry *gotent;
4817
4818 BFD_ASSERT (h->dynindx != -1);
4819
ce558b89 4820 splt = elf_hash_table (info)->splt;
252b5132 4821 BFD_ASSERT (splt != NULL);
ce558b89 4822 srel = elf_hash_table (info)->srelplt;
252b5132 4823 BFD_ASSERT (srel != NULL);
252b5132 4824
6ec7057a
RH
4825 for (gotent = ah->got_entries; gotent ; gotent = gotent->next)
4826 if (gotent->reloc_type == R_ALPHA_LITERAL
4827 && gotent->use_count > 0)
4828 {
4829 unsigned int insn;
4830 int disp;
252b5132 4831
6ec7057a
RH
4832 sgot = alpha_elf_tdata (gotent->gotobj)->got;
4833 BFD_ASSERT (sgot != NULL);
252b5132 4834
6ec7057a
RH
4835 BFD_ASSERT (gotent->got_offset != -1);
4836 BFD_ASSERT (gotent->plt_offset != -1);
252b5132 4837
6ec7057a
RH
4838 got_addr = (sgot->output_section->vma
4839 + sgot->output_offset
4840 + gotent->got_offset);
4841 plt_addr = (splt->output_section->vma
4842 + splt->output_offset
4843 + gotent->plt_offset);
252b5132 4844
6ec7057a 4845 plt_index = (gotent->plt_offset-PLT_HEADER_SIZE) / PLT_ENTRY_SIZE;
252b5132 4846
6ec7057a
RH
4847 /* Fill in the entry in the procedure linkage table. */
4848 if (elf64_alpha_use_secureplt)
4849 {
4850 disp = (PLT_HEADER_SIZE - 4) - (gotent->plt_offset + 4);
4851 insn = INSN_AD (INSN_BR, 31, disp);
4852 bfd_put_32 (output_bfd, insn,
4853 splt->contents + gotent->plt_offset);
252b5132 4854
6ec7057a
RH
4855 plt_index = ((gotent->plt_offset - NEW_PLT_HEADER_SIZE)
4856 / NEW_PLT_ENTRY_SIZE);
4857 }
4858 else
4859 {
4860 disp = -(gotent->plt_offset + 4);
4861 insn = INSN_AD (INSN_BR, 28, disp);
4862 bfd_put_32 (output_bfd, insn,
4863 splt->contents + gotent->plt_offset);
4864 bfd_put_32 (output_bfd, INSN_UNOP,
4865 splt->contents + gotent->plt_offset + 4);
4866 bfd_put_32 (output_bfd, INSN_UNOP,
4867 splt->contents + gotent->plt_offset + 8);
4868
4869 plt_index = ((gotent->plt_offset - OLD_PLT_HEADER_SIZE)
4870 / OLD_PLT_ENTRY_SIZE);
4871 }
252b5132 4872
6ec7057a
RH
4873 /* Fill in the entry in the .rela.plt section. */
4874 outrel.r_offset = got_addr;
4875 outrel.r_info = ELF64_R_INFO(h->dynindx, R_ALPHA_JMP_SLOT);
4876 outrel.r_addend = 0;
252b5132 4877
6ec7057a
RH
4878 loc = srel->contents + plt_index * sizeof (Elf64_External_Rela);
4879 bfd_elf64_swap_reloca_out (output_bfd, &outrel, loc);
252b5132 4880
6ec7057a
RH
4881 /* Fill in the entry in the .got. */
4882 bfd_put_64 (output_bfd, plt_addr,
4883 sgot->contents + gotent->got_offset);
4884 }
252b5132
RH
4885 }
4886 else if (alpha_elf_dynamic_symbol_p (h, info))
4887 {
4888 /* Fill in the dynamic relocations for this symbol's .got entries. */
4889 asection *srel;
252b5132
RH
4890 struct alpha_elf_got_entry *gotent;
4891
ce558b89 4892 srel = elf_hash_table (info)->srelgot;
252b5132
RH
4893 BFD_ASSERT (srel != NULL);
4894
252b5132
RH
4895 for (gotent = ((struct alpha_elf_link_hash_entry *) h)->got_entries;
4896 gotent != NULL;
4897 gotent = gotent->next)
4898 {
f44f99a5 4899 asection *sgot;
1bbc9cec 4900 long r_type;
3765b1be 4901
f44f99a5
RH
4902 if (gotent->use_count == 0)
4903 continue;
4904
4905 sgot = alpha_elf_tdata (gotent->gotobj)->got;
3765b1be
RH
4906
4907 r_type = gotent->reloc_type;
4908 switch (r_type)
4909 {
4910 case R_ALPHA_LITERAL:
4911 r_type = R_ALPHA_GLOB_DAT;
4912 break;
4913 case R_ALPHA_TLSGD:
4914 r_type = R_ALPHA_DTPMOD64;
4915 break;
4916 case R_ALPHA_GOTDTPREL:
4917 r_type = R_ALPHA_DTPREL64;
4918 break;
4919 case R_ALPHA_GOTTPREL:
4920 r_type = R_ALPHA_TPREL64;
4921 break;
4922 case R_ALPHA_TLSLDM:
4923 default:
4924 abort ();
4925 }
4926
68ffbac6 4927 elf64_alpha_emit_dynrel (output_bfd, info, sgot, srel,
1bbc9cec
RH
4928 gotent->got_offset, h->dynindx,
4929 r_type, gotent->addend);
3765b1be
RH
4930
4931 if (gotent->reloc_type == R_ALPHA_TLSGD)
68ffbac6 4932 elf64_alpha_emit_dynrel (output_bfd, info, sgot, srel,
1bbc9cec
RH
4933 gotent->got_offset + 8, h->dynindx,
4934 R_ALPHA_DTPREL64, gotent->addend);
252b5132
RH
4935 }
4936 }
4937
4938 /* Mark some specially defined symbols as absolute. */
9637f6ef 4939 if (h == elf_hash_table (info)->hdynamic
22edb2f1
RS
4940 || h == elf_hash_table (info)->hgot
4941 || h == elf_hash_table (info)->hplt)
252b5132
RH
4942 sym->st_shndx = SHN_ABS;
4943
b34976b6 4944 return TRUE;
252b5132
RH
4945}
4946
4947/* Finish up the dynamic sections. */
4948
b34976b6 4949static bfd_boolean
a7519a3c
RH
4950elf64_alpha_finish_dynamic_sections (bfd *output_bfd,
4951 struct bfd_link_info *info)
252b5132
RH
4952{
4953 bfd *dynobj;
4954 asection *sdyn;
4955
4956 dynobj = elf_hash_table (info)->dynobj;
3d4d4302 4957 sdyn = bfd_get_linker_section (dynobj, ".dynamic");
252b5132
RH
4958
4959 if (elf_hash_table (info)->dynamic_sections_created)
4960 {
6ec7057a 4961 asection *splt, *sgotplt, *srelaplt;
252b5132 4962 Elf64_External_Dyn *dyncon, *dynconend;
6ec7057a 4963 bfd_vma plt_vma, gotplt_vma;
252b5132 4964
ce558b89
AM
4965 splt = elf_hash_table (info)->splt;
4966 srelaplt = elf_hash_table (info)->srelplt;
252b5132
RH
4967 BFD_ASSERT (splt != NULL && sdyn != NULL);
4968
6ec7057a
RH
4969 plt_vma = splt->output_section->vma + splt->output_offset;
4970
4971 gotplt_vma = 0;
4972 if (elf64_alpha_use_secureplt)
4973 {
ce558b89 4974 sgotplt = elf_hash_table (info)->sgotplt;
6ec7057a
RH
4975 BFD_ASSERT (sgotplt != NULL);
4976 if (sgotplt->size > 0)
4977 gotplt_vma = sgotplt->output_section->vma + sgotplt->output_offset;
4978 }
4979
252b5132 4980 dyncon = (Elf64_External_Dyn *) sdyn->contents;
eea6121a 4981 dynconend = (Elf64_External_Dyn *) (sdyn->contents + sdyn->size);
252b5132
RH
4982 for (; dyncon < dynconend; dyncon++)
4983 {
4984 Elf_Internal_Dyn dyn;
252b5132
RH
4985
4986 bfd_elf64_swap_dyn_in (dynobj, dyncon, &dyn);
4987
4988 switch (dyn.d_tag)
4989 {
4990 case DT_PLTGOT:
6ec7057a
RH
4991 dyn.d_un.d_ptr
4992 = elf64_alpha_use_secureplt ? gotplt_vma : plt_vma;
4993 break;
252b5132 4994 case DT_PLTRELSZ:
6ec7057a
RH
4995 dyn.d_un.d_val = srelaplt ? srelaplt->size : 0;
4996 break;
252b5132 4997 case DT_JMPREL:
4ade44b7
AM
4998 dyn.d_un.d_ptr = srelaplt ? (srelaplt->output_section->vma
4999 + srelaplt->output_offset) : 0;
6ec7057a 5000 break;
252b5132
RH
5001 }
5002
5003 bfd_elf64_swap_dyn_out (output_bfd, &dyn, dyncon);
5004 }
5005
6ec7057a 5006 /* Initialize the plt header. */
eea6121a 5007 if (splt->size > 0)
252b5132 5008 {
6ec7057a
RH
5009 unsigned int insn;
5010 int ofs;
5011
5012 if (elf64_alpha_use_secureplt)
5013 {
5014 ofs = gotplt_vma - (plt_vma + PLT_HEADER_SIZE);
5015
5016 insn = INSN_ABC (INSN_SUBQ, 27, 28, 25);
5017 bfd_put_32 (output_bfd, insn, splt->contents);
5018
5019 insn = INSN_ABO (INSN_LDAH, 28, 28, (ofs + 0x8000) >> 16);
5020 bfd_put_32 (output_bfd, insn, splt->contents + 4);
5021
5022 insn = INSN_ABC (INSN_S4SUBQ, 25, 25, 25);
5023 bfd_put_32 (output_bfd, insn, splt->contents + 8);
5024
5025 insn = INSN_ABO (INSN_LDA, 28, 28, ofs);
5026 bfd_put_32 (output_bfd, insn, splt->contents + 12);
5027
5028 insn = INSN_ABO (INSN_LDQ, 27, 28, 0);
5029 bfd_put_32 (output_bfd, insn, splt->contents + 16);
5030
5031 insn = INSN_ABC (INSN_ADDQ, 25, 25, 25);
5032 bfd_put_32 (output_bfd, insn, splt->contents + 20);
5033
5034 insn = INSN_ABO (INSN_LDQ, 28, 28, 8);
5035 bfd_put_32 (output_bfd, insn, splt->contents + 24);
5036
5037 insn = INSN_AB (INSN_JMP, 31, 27);
5038 bfd_put_32 (output_bfd, insn, splt->contents + 28);
5039
5040 insn = INSN_AD (INSN_BR, 28, -PLT_HEADER_SIZE);
5041 bfd_put_32 (output_bfd, insn, splt->contents + 32);
5042 }
5043 else
5044 {
5045 insn = INSN_AD (INSN_BR, 27, 0); /* br $27, .+4 */
5046 bfd_put_32 (output_bfd, insn, splt->contents);
5047
5048 insn = INSN_ABO (INSN_LDQ, 27, 27, 12);
5049 bfd_put_32 (output_bfd, insn, splt->contents + 4);
5050
5051 insn = INSN_UNOP;
5052 bfd_put_32 (output_bfd, insn, splt->contents + 8);
5053
5054 insn = INSN_AB (INSN_JMP, 27, 27);
5055 bfd_put_32 (output_bfd, insn, splt->contents + 12);
5056
5057 /* The next two words will be filled in by ld.so. */
5058 bfd_put_64 (output_bfd, 0, splt->contents + 16);
5059 bfd_put_64 (output_bfd, 0, splt->contents + 24);
5060 }
252b5132 5061
eecdbe52 5062 elf_section_data (splt->output_section)->this_hdr.sh_entsize = 0;
252b5132
RH
5063 }
5064 }
5065
b34976b6 5066 return TRUE;
252b5132
RH
5067}
5068
96e2734b
RH
5069/* We need to use a special link routine to handle the .mdebug section.
5070 We need to merge all instances of these sections together, not write
5071 them all out sequentially. */
252b5132 5072
b34976b6 5073static bfd_boolean
a7519a3c 5074elf64_alpha_final_link (bfd *abfd, struct bfd_link_info *info)
252b5132
RH
5075{
5076 asection *o;
5077 struct bfd_link_order *p;
96e2734b 5078 asection *mdebug_sec;
252b5132
RH
5079 struct ecoff_debug_info debug;
5080 const struct ecoff_debug_swap *swap
5081 = get_elf_backend_data (abfd)->elf_backend_ecoff_debug_swap;
5082 HDRR *symhdr = &debug.symbolic_header;
4dfe6ac6
NC
5083 void * mdebug_handle = NULL;
5084 struct alpha_elf_link_hash_table * htab;
5085
5086 htab = alpha_elf_hash_table (info);
5087 if (htab == NULL)
5088 return FALSE;
252b5132 5089
96e2734b 5090 /* Go through the sections and collect the mdebug information. */
252b5132 5091 mdebug_sec = NULL;
252b5132
RH
5092 for (o = abfd->sections; o != (asection *) NULL; o = o->next)
5093 {
252b5132
RH
5094 if (strcmp (o->name, ".mdebug") == 0)
5095 {
5096 struct extsym_info einfo;
5097
5098 /* We have found the .mdebug section in the output file.
5099 Look through all the link_orders comprising it and merge
5100 the information together. */
5101 symhdr->magic = swap->sym_magic;
5102 /* FIXME: What should the version stamp be? */
5103 symhdr->vstamp = 0;
5104 symhdr->ilineMax = 0;
5105 symhdr->cbLine = 0;
5106 symhdr->idnMax = 0;
5107 symhdr->ipdMax = 0;
5108 symhdr->isymMax = 0;
5109 symhdr->ioptMax = 0;
5110 symhdr->iauxMax = 0;
5111 symhdr->issMax = 0;
5112 symhdr->issExtMax = 0;
5113 symhdr->ifdMax = 0;
5114 symhdr->crfd = 0;
5115 symhdr->iextMax = 0;
5116
5117 /* We accumulate the debugging information itself in the
5118 debug_info structure. */
5119 debug.line = NULL;
5120 debug.external_dnr = NULL;
5121 debug.external_pdr = NULL;
5122 debug.external_sym = NULL;
5123 debug.external_opt = NULL;
5124 debug.external_aux = NULL;
5125 debug.ss = NULL;
5126 debug.ssext = debug.ssext_end = NULL;
5127 debug.external_fdr = NULL;
5128 debug.external_rfd = NULL;
5129 debug.external_ext = debug.external_ext_end = NULL;
5130
5131 mdebug_handle = bfd_ecoff_debug_init (abfd, &debug, swap, info);
2c3fc389 5132 if (mdebug_handle == NULL)
b34976b6 5133 return FALSE;
252b5132
RH
5134
5135 if (1)
5136 {
5137 asection *s;
5138 EXTR esym;
52b9d213 5139 bfd_vma last = 0;
252b5132
RH
5140 unsigned int i;
5141 static const char * const name[] =
5142 {
5143 ".text", ".init", ".fini", ".data",
5144 ".rodata", ".sdata", ".sbss", ".bss"
5145 };
5146 static const int sc[] = { scText, scInit, scFini, scData,
5147 scRData, scSData, scSBss, scBss };
5148
5149 esym.jmptbl = 0;
5150 esym.cobol_main = 0;
5151 esym.weakext = 0;
5152 esym.reserved = 0;
5153 esym.ifd = ifdNil;
5154 esym.asym.iss = issNil;
5155 esym.asym.st = stLocal;
5156 esym.asym.reserved = 0;
5157 esym.asym.index = indexNil;
5158 for (i = 0; i < 8; i++)
5159 {
5160 esym.asym.sc = sc[i];
5161 s = bfd_get_section_by_name (abfd, name[i]);
5162 if (s != NULL)
5163 {
5164 esym.asym.value = s->vma;
eea6121a 5165 last = s->vma + s->size;
252b5132
RH
5166 }
5167 else
5168 esym.asym.value = last;
5169
5170 if (! bfd_ecoff_debug_one_external (abfd, &debug, swap,
5171 name[i], &esym))
b34976b6 5172 return FALSE;
252b5132
RH
5173 }
5174 }
5175
8423293d 5176 for (p = o->map_head.link_order;
252b5132
RH
5177 p != (struct bfd_link_order *) NULL;
5178 p = p->next)
5179 {
5180 asection *input_section;
5181 bfd *input_bfd;
5182 const struct ecoff_debug_swap *input_swap;
5183 struct ecoff_debug_info input_debug;
5184 char *eraw_src;
5185 char *eraw_end;
5186
5187 if (p->type != bfd_indirect_link_order)
5188 {
fd96f80f 5189 if (p->type == bfd_data_link_order)
252b5132
RH
5190 continue;
5191 abort ();
5192 }
5193
5194 input_section = p->u.indirect.section;
5195 input_bfd = input_section->owner;
5196
0ffa91dd
NC
5197 if (! is_alpha_elf (input_bfd))
5198 /* I don't know what a non ALPHA ELF bfd would be
5199 doing with a .mdebug section, but I don't really
5200 want to deal with it. */
5201 continue;
252b5132
RH
5202
5203 input_swap = (get_elf_backend_data (input_bfd)
5204 ->elf_backend_ecoff_debug_swap);
5205
eea6121a 5206 BFD_ASSERT (p->size == input_section->size);
252b5132
RH
5207
5208 /* The ECOFF linking code expects that we have already
5209 read in the debugging information and set up an
5210 ecoff_debug_info structure, so we do that now. */
5211 if (!elf64_alpha_read_ecoff_info (input_bfd, input_section,
5212 &input_debug))
b34976b6 5213 return FALSE;
252b5132
RH
5214
5215 if (! (bfd_ecoff_debug_accumulate
5216 (mdebug_handle, abfd, &debug, swap, input_bfd,
5217 &input_debug, input_swap, info)))
b34976b6 5218 return FALSE;
252b5132
RH
5219
5220 /* Loop through the external symbols. For each one with
5221 interesting information, try to find the symbol in
5222 the linker global hash table and save the information
5223 for the output external symbols. */
21d799b5 5224 eraw_src = (char *) input_debug.external_ext;
252b5132
RH
5225 eraw_end = (eraw_src
5226 + (input_debug.symbolic_header.iextMax
5227 * input_swap->external_ext_size));
5228 for (;
5229 eraw_src < eraw_end;
5230 eraw_src += input_swap->external_ext_size)
5231 {
5232 EXTR ext;
5233 const char *name;
5234 struct alpha_elf_link_hash_entry *h;
5235
2c3fc389 5236 (*input_swap->swap_ext_in) (input_bfd, eraw_src, &ext);
252b5132
RH
5237 if (ext.asym.sc == scNil
5238 || ext.asym.sc == scUndefined
5239 || ext.asym.sc == scSUndefined)
5240 continue;
5241
5242 name = input_debug.ssext + ext.asym.iss;
4dfe6ac6 5243 h = alpha_elf_link_hash_lookup (htab, name, FALSE, FALSE, TRUE);
252b5132
RH
5244 if (h == NULL || h->esym.ifd != -2)
5245 continue;
5246
5247 if (ext.ifd != -1)
5248 {
5249 BFD_ASSERT (ext.ifd
5250 < input_debug.symbolic_header.ifdMax);
5251 ext.ifd = input_debug.ifdmap[ext.ifd];
5252 }
5253
5254 h->esym = ext;
5255 }
5256
5257 /* Free up the information we just read. */
5258 free (input_debug.line);
5259 free (input_debug.external_dnr);
5260 free (input_debug.external_pdr);
5261 free (input_debug.external_sym);
5262 free (input_debug.external_opt);
5263 free (input_debug.external_aux);
5264 free (input_debug.ss);
5265 free (input_debug.ssext);
5266 free (input_debug.external_fdr);
5267 free (input_debug.external_rfd);
5268 free (input_debug.external_ext);
5269
5270 /* Hack: reset the SEC_HAS_CONTENTS flag so that
5271 elf_link_input_bfd ignores this section. */
5272 input_section->flags &=~ SEC_HAS_CONTENTS;
5273 }
5274
252b5132
RH
5275 /* Build the external symbol information. */
5276 einfo.abfd = abfd;
5277 einfo.info = info;
5278 einfo.debug = &debug;
5279 einfo.swap = swap;
b34976b6 5280 einfo.failed = FALSE;
252b5132
RH
5281 elf_link_hash_traverse (elf_hash_table (info),
5282 elf64_alpha_output_extsym,
2c3fc389 5283 &einfo);
252b5132 5284 if (einfo.failed)
b34976b6 5285 return FALSE;
252b5132
RH
5286
5287 /* Set the size of the .mdebug section. */
eea6121a 5288 o->size = bfd_ecoff_debug_size (abfd, &debug, swap);
252b5132
RH
5289
5290 /* Skip this section later on (I don't think this currently
5291 matters, but someday it might). */
8423293d 5292 o->map_head.link_order = (struct bfd_link_order *) NULL;
252b5132
RH
5293
5294 mdebug_sec = o;
5295 }
252b5132
RH
5296 }
5297
5298 /* Invoke the regular ELF backend linker to do all the work. */
c152c796 5299 if (! bfd_elf_final_link (abfd, info))
b34976b6 5300 return FALSE;
252b5132
RH
5301
5302 /* Now write out the computed sections. */
5303
5304 /* The .got subsections... */
5305 {
5306 bfd *i, *dynobj = elf_hash_table(info)->dynobj;
4dfe6ac6 5307 for (i = htab->got_list;
252b5132
RH
5308 i != NULL;
5309 i = alpha_elf_tdata(i)->got_link_next)
5310 {
5311 asection *sgot;
5312
5313 /* elf_bfd_final_link already did everything in dynobj. */
5314 if (i == dynobj)
5315 continue;
5316
5317 sgot = alpha_elf_tdata(i)->got;
5318 if (! bfd_set_section_contents (abfd, sgot->output_section,
dc810e39
AM
5319 sgot->contents,
5320 (file_ptr) sgot->output_offset,
eea6121a 5321 sgot->size))
b34976b6 5322 return FALSE;
252b5132
RH
5323 }
5324 }
5325
252b5132
RH
5326 if (mdebug_sec != (asection *) NULL)
5327 {
5328 BFD_ASSERT (abfd->output_has_begun);
5329 if (! bfd_ecoff_write_accumulated_debug (mdebug_handle, abfd, &debug,
5330 swap, info,
5331 mdebug_sec->filepos))
b34976b6 5332 return FALSE;
252b5132
RH
5333
5334 bfd_ecoff_debug_free (mdebug_handle, abfd, &debug, swap, info);
5335 }
5336
b34976b6 5337 return TRUE;
252b5132 5338}
fcfbdf31
JJ
5339
5340static enum elf_reloc_type_class
7e612e98
AM
5341elf64_alpha_reloc_type_class (const struct bfd_link_info *info ATTRIBUTE_UNUSED,
5342 const asection *rel_sec ATTRIBUTE_UNUSED,
5343 const Elf_Internal_Rela *rela)
fcfbdf31 5344{
f51e552e 5345 switch ((int) ELF64_R_TYPE (rela->r_info))
fcfbdf31
JJ
5346 {
5347 case R_ALPHA_RELATIVE:
5348 return reloc_class_relative;
5349 case R_ALPHA_JMP_SLOT:
5350 return reloc_class_plt;
5351 case R_ALPHA_COPY:
5352 return reloc_class_copy;
5353 default:
5354 return reloc_class_normal;
5355 }
5356}
252b5132 5357\f
b35d266b 5358static const struct bfd_elf_special_section elf64_alpha_special_sections[] =
2f89ff8d 5359{
07d6d2b8 5360 { STRING_COMMA_LEN (".sbss"), -2, SHT_NOBITS, SHF_ALLOC + SHF_WRITE + SHF_ALPHA_GPREL },
0112cd26 5361 { STRING_COMMA_LEN (".sdata"), -2, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE + SHF_ALPHA_GPREL },
07d6d2b8 5362 { NULL, 0, 0, 0, 0 }
2f89ff8d
L
5363};
5364
252b5132
RH
5365/* ECOFF swapping routines. These are used when dealing with the
5366 .mdebug section, which is in the ECOFF debugging format. Copied
fe8bc63d 5367 from elf32-mips.c. */
252b5132
RH
5368static const struct ecoff_debug_swap
5369elf64_alpha_ecoff_debug_swap =
5370{
5371 /* Symbol table magic number. */
5372 magicSym2,
5373 /* Alignment of debugging information. E.g., 4. */
5374 8,
5375 /* Sizes of external symbolic information. */
5376 sizeof (struct hdr_ext),
5377 sizeof (struct dnr_ext),
5378 sizeof (struct pdr_ext),
5379 sizeof (struct sym_ext),
5380 sizeof (struct opt_ext),
5381 sizeof (struct fdr_ext),
5382 sizeof (struct rfd_ext),
5383 sizeof (struct ext_ext),
5384 /* Functions to swap in external symbolic data. */
5385 ecoff_swap_hdr_in,
5386 ecoff_swap_dnr_in,
5387 ecoff_swap_pdr_in,
5388 ecoff_swap_sym_in,
5389 ecoff_swap_opt_in,
5390 ecoff_swap_fdr_in,
5391 ecoff_swap_rfd_in,
5392 ecoff_swap_ext_in,
5393 _bfd_ecoff_swap_tir_in,
5394 _bfd_ecoff_swap_rndx_in,
5395 /* Functions to swap out external symbolic data. */
5396 ecoff_swap_hdr_out,
5397 ecoff_swap_dnr_out,
5398 ecoff_swap_pdr_out,
5399 ecoff_swap_sym_out,
5400 ecoff_swap_opt_out,
5401 ecoff_swap_fdr_out,
5402 ecoff_swap_rfd_out,
5403 ecoff_swap_ext_out,
5404 _bfd_ecoff_swap_tir_out,
5405 _bfd_ecoff_swap_rndx_out,
5406 /* Function to read in symbolic data. */
5407 elf64_alpha_read_ecoff_info
5408};
5409\f
70bcb145
JW
5410/* Use a non-standard hash bucket size of 8. */
5411
562ace6b 5412static const struct elf_size_info alpha_elf_size_info =
70bcb145
JW
5413{
5414 sizeof (Elf64_External_Ehdr),
5415 sizeof (Elf64_External_Phdr),
5416 sizeof (Elf64_External_Shdr),
5417 sizeof (Elf64_External_Rel),
5418 sizeof (Elf64_External_Rela),
5419 sizeof (Elf64_External_Sym),
5420 sizeof (Elf64_External_Dyn),
5421 sizeof (Elf_External_Note),
5422 8,
5423 1,
45d6a902 5424 64, 3,
70bcb145
JW
5425 ELFCLASS64, EV_CURRENT,
5426 bfd_elf64_write_out_phdrs,
5427 bfd_elf64_write_shdrs_and_ehdr,
1489a3a0 5428 bfd_elf64_checksum_contents,
70bcb145 5429 bfd_elf64_write_relocs,
73ff0d56 5430 bfd_elf64_swap_symbol_in,
70bcb145
JW
5431 bfd_elf64_swap_symbol_out,
5432 bfd_elf64_slurp_reloc_table,
5433 bfd_elf64_slurp_symbol_table,
5434 bfd_elf64_swap_dyn_in,
5435 bfd_elf64_swap_dyn_out,
947216bf
AM
5436 bfd_elf64_swap_reloc_in,
5437 bfd_elf64_swap_reloc_out,
5438 bfd_elf64_swap_reloca_in,
5439 bfd_elf64_swap_reloca_out
70bcb145
JW
5440};
5441
6d00b590 5442#define TARGET_LITTLE_SYM alpha_elf64_vec
252b5132
RH
5443#define TARGET_LITTLE_NAME "elf64-alpha"
5444#define ELF_ARCH bfd_arch_alpha
ae95ffa6 5445#define ELF_TARGET_ID ALPHA_ELF_DATA
56fc028e
AJ
5446#define ELF_MACHINE_CODE EM_ALPHA
5447#define ELF_MAXPAGESIZE 0x10000
24718e3b 5448#define ELF_COMMONPAGESIZE 0x2000
252b5132
RH
5449
5450#define bfd_elf64_bfd_link_hash_table_create \
5451 elf64_alpha_bfd_link_hash_table_create
5452
5453#define bfd_elf64_bfd_reloc_type_lookup \
5454 elf64_alpha_bfd_reloc_type_lookup
157090f7
AM
5455#define bfd_elf64_bfd_reloc_name_lookup \
5456 elf64_alpha_bfd_reloc_name_lookup
252b5132
RH
5457#define elf_info_to_howto \
5458 elf64_alpha_info_to_howto
5459
5460#define bfd_elf64_mkobject \
5461 elf64_alpha_mkobject
5462#define elf_backend_object_p \
5463 elf64_alpha_object_p
5464
5465#define elf_backend_section_from_shdr \
5466 elf64_alpha_section_from_shdr
204692d7
RH
5467#define elf_backend_section_flags \
5468 elf64_alpha_section_flags
252b5132
RH
5469#define elf_backend_fake_sections \
5470 elf64_alpha_fake_sections
5471
5472#define bfd_elf64_bfd_is_local_label_name \
5473 elf64_alpha_is_local_label_name
5474#define bfd_elf64_find_nearest_line \
5475 elf64_alpha_find_nearest_line
5476#define bfd_elf64_bfd_relax_section \
5477 elf64_alpha_relax_section
5478
5479#define elf_backend_add_symbol_hook \
5480 elf64_alpha_add_symbol_hook
13285a1b
AM
5481#define elf_backend_relocs_compatible \
5482 _bfd_elf_relocs_compatible
6fc5bb57
AM
5483#define elf_backend_sort_relocs_p \
5484 elf64_alpha_sort_relocs_p
252b5132
RH
5485#define elf_backend_check_relocs \
5486 elf64_alpha_check_relocs
5487#define elf_backend_create_dynamic_sections \
5488 elf64_alpha_create_dynamic_sections
5489#define elf_backend_adjust_dynamic_symbol \
5490 elf64_alpha_adjust_dynamic_symbol
747ffa7b
AM
5491#define elf_backend_merge_symbol_attribute \
5492 elf64_alpha_merge_symbol_attribute
48f4b4f5
RH
5493#define elf_backend_copy_indirect_symbol \
5494 elf64_alpha_copy_indirect_symbol
252b5132
RH
5495#define elf_backend_always_size_sections \
5496 elf64_alpha_always_size_sections
5497#define elf_backend_size_dynamic_sections \
5498 elf64_alpha_size_dynamic_sections
74541ad4 5499#define elf_backend_omit_section_dynsym \
d00dd7dc 5500 _bfd_elf_omit_section_dynsym_all
252b5132
RH
5501#define elf_backend_relocate_section \
5502 elf64_alpha_relocate_section
5503#define elf_backend_finish_dynamic_symbol \
5504 elf64_alpha_finish_dynamic_symbol
5505#define elf_backend_finish_dynamic_sections \
5506 elf64_alpha_finish_dynamic_sections
5507#define bfd_elf64_bfd_final_link \
5508 elf64_alpha_final_link
fcfbdf31
JJ
5509#define elf_backend_reloc_type_class \
5510 elf64_alpha_reloc_type_class
252b5132 5511
e117360e
RH
5512#define elf_backend_can_gc_sections 1
5513#define elf_backend_gc_mark_hook elf64_alpha_gc_mark_hook
e117360e 5514
252b5132
RH
5515#define elf_backend_ecoff_debug_swap \
5516 &elf64_alpha_ecoff_debug_swap
5517
70bcb145
JW
5518#define elf_backend_size_info \
5519 alpha_elf_size_info
5520
29ef7005
L
5521#define elf_backend_special_sections \
5522 elf64_alpha_special_sections
2f89ff8d 5523
38b1a46c 5524/* A few constants that determine how the .plt section is set up. */
252b5132
RH
5525#define elf_backend_want_got_plt 0
5526#define elf_backend_plt_readonly 0
5527#define elf_backend_want_plt_sym 1
5528#define elf_backend_got_header_size 0
64f52338 5529#define elf_backend_dtrel_excludes_plt 1
252b5132
RH
5530
5531#include "elf64-target.h"
2238051f
RH
5532\f
5533/* FreeBSD support. */
5534
5535#undef TARGET_LITTLE_SYM
6d00b590 5536#define TARGET_LITTLE_SYM alpha_elf64_fbsd_vec
2238051f
RH
5537#undef TARGET_LITTLE_NAME
5538#define TARGET_LITTLE_NAME "elf64-alpha-freebsd"
d1036acb
L
5539#undef ELF_OSABI
5540#define ELF_OSABI ELFOSABI_FREEBSD
2238051f
RH
5541
5542/* The kernel recognizes executables as valid only if they carry a
5543 "FreeBSD" label in the ELF header. So we put this label on all
5544 executables and (for simplicity) also all other object files. */
5545
2238051f 5546static void
a7519a3c
RH
5547elf64_alpha_fbsd_post_process_headers (bfd * abfd,
5548 struct bfd_link_info * link_info ATTRIBUTE_UNUSED)
2238051f
RH
5549{
5550 Elf_Internal_Ehdr * i_ehdrp; /* ELF file header, internal form. */
5551
5552 i_ehdrp = elf_elfheader (abfd);
5553
5554 /* Put an ABI label supported by FreeBSD >= 4.1. */
d1036acb 5555 i_ehdrp->e_ident[EI_OSABI] = get_elf_backend_data (abfd)->elf_osabi;
2238051f
RH
5556#ifdef OLD_FREEBSD_ABI_LABEL
5557 /* The ABI label supported by FreeBSD <= 4.0 is quite nonstandard. */
5558 memcpy (&i_ehdrp->e_ident[EI_ABIVERSION], "FreeBSD", 8);
5559#endif
5560}
5561
5562#undef elf_backend_post_process_headers
5563#define elf_backend_post_process_headers \
5564 elf64_alpha_fbsd_post_process_headers
5565
571fe01f 5566#undef elf64_bed
2238051f
RH
5567#define elf64_bed elf64_alpha_fbsd_bed
5568
5569#include "elf64-target.h"