]> git.ipfire.org Git - thirdparty/binutils-gdb.git/blame - bfd/elf64-alpha.c
[PATCH] fix windmc typedef bug
[thirdparty/binutils-gdb.git] / bfd / elf64-alpha.c
CommitLineData
252b5132 1/* Alpha specific support for 64-bit ELF
b3adc24a 2 Copyright (C) 1996-2020 Free Software Foundation, Inc.
252b5132
RH
3 Contributed by Richard Henderson <rth@tamu.edu>.
4
571fe01f 5 This file is part of BFD, the Binary File Descriptor library.
252b5132 6
571fe01f
NC
7 This program is free software; you can redistribute it and/or modify
8 it under the terms of the GNU General Public License as published by
cd123cb7 9 the Free Software Foundation; either version 3 of the License, or
571fe01f 10 (at your option) any later version.
252b5132 11
571fe01f
NC
12 This program is distributed in the hope that it will be useful,
13 but WITHOUT ANY WARRANTY; without even the implied warranty of
14 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 GNU General Public License for more details.
252b5132 16
571fe01f
NC
17 You should have received a copy of the GNU General Public License
18 along with this program; if not, write to the Free Software
cd123cb7
NC
19 Foundation, Inc., 51 Franklin Street - Fifth Floor, Boston,
20 MA 02110-1301, USA. */
21
252b5132
RH
22
23/* We need a published ABI spec for this. Until one comes out, don't
24 assume this'll remain unchanged forever. */
25
252b5132 26#include "sysdep.h"
3db64b00 27#include "bfd.h"
252b5132
RH
28#include "libbfd.h"
29#include "elf-bfd.h"
0ba9378a 30#include "ecoff-bfd.h"
252b5132
RH
31
32#include "elf/alpha.h"
33
34#define ALPHAECOFF
35
36#define NO_COFF_RELOCS
37#define NO_COFF_SYMBOLS
38#define NO_COFF_LINENOS
39
fe8bc63d 40/* Get the ECOFF swapping routines. Needed for the debug information. */
252b5132
RH
41#include "coff/internal.h"
42#include "coff/sym.h"
43#include "coff/symconst.h"
44#include "coff/ecoff.h"
45#include "coff/alpha.h"
46#include "aout/ar.h"
47#include "libcoff.h"
48#include "libecoff.h"
49#define ECOFF_64
50#include "ecoffswap.h"
51
6ec7057a
RH
52\f
53/* Instruction data for plt generation and relaxation. */
54
55#define OP_LDA 0x08
56#define OP_LDAH 0x09
57#define OP_LDQ 0x29
58#define OP_BR 0x30
59#define OP_BSR 0x34
60
61#define INSN_LDA (OP_LDA << 26)
62#define INSN_LDAH (OP_LDAH << 26)
63#define INSN_LDQ (OP_LDQ << 26)
64#define INSN_BR (OP_BR << 26)
65
66#define INSN_ADDQ 0x40000400
67#define INSN_RDUNIQ 0x0000009e
68#define INSN_SUBQ 0x40000520
69#define INSN_S4SUBQ 0x40000560
70#define INSN_UNOP 0x2ffe0000
71
72#define INSN_JSR 0x68004000
73#define INSN_JMP 0x68000000
74#define INSN_JSR_MASK 0xfc00c000
75
76#define INSN_A(I,A) (I | (A << 21))
77#define INSN_AB(I,A,B) (I | (A << 21) | (B << 16))
78#define INSN_ABC(I,A,B,C) (I | (A << 21) | (B << 16) | C)
79#define INSN_ABO(I,A,B,O) (I | (A << 21) | (B << 16) | ((O) & 0xffff))
80#define INSN_AD(I,A,D) (I | (A << 21) | (((D) >> 2) & 0x1fffff))
81
82/* PLT/GOT Stuff */
83
84/* Set by ld emulation. Putting this into the link_info or hash structure
85 is simply working too hard. */
86#ifdef USE_SECUREPLT
87bfd_boolean elf64_alpha_use_secureplt = TRUE;
88#else
89bfd_boolean elf64_alpha_use_secureplt = FALSE;
90#endif
91
92#define OLD_PLT_HEADER_SIZE 32
93#define OLD_PLT_ENTRY_SIZE 12
94#define NEW_PLT_HEADER_SIZE 36
95#define NEW_PLT_ENTRY_SIZE 4
96
97#define PLT_HEADER_SIZE \
98 (elf64_alpha_use_secureplt ? NEW_PLT_HEADER_SIZE : OLD_PLT_HEADER_SIZE)
99#define PLT_ENTRY_SIZE \
100 (elf64_alpha_use_secureplt ? NEW_PLT_ENTRY_SIZE : OLD_PLT_ENTRY_SIZE)
101
102#define MAX_GOT_SIZE (64*1024)
103
104#define ELF_DYNAMIC_INTERPRETER "/usr/lib/ld.so"
252b5132 105\f
21d799b5
NC
106
107/* Used to implement multiple .got subsections. */
108struct alpha_elf_got_entry
109{
110 struct alpha_elf_got_entry *next;
111
112 /* Which .got subsection? */
113 bfd *gotobj;
114
115 /* The addend in effect for this entry. */
116 bfd_vma addend;
117
118 /* The .got offset for this entry. */
119 int got_offset;
120
121 /* The .plt offset for this entry. */
122 int plt_offset;
123
124 /* How many references to this entry? */
125 int use_count;
126
127 /* The relocation type of this entry. */
128 unsigned char reloc_type;
129
130 /* How a LITERAL is used. */
131 unsigned char flags;
132
133 /* Have we initialized the dynamic relocation for this entry? */
134 unsigned char reloc_done;
135
136 /* Have we adjusted this entry for SEC_MERGE? */
137 unsigned char reloc_xlated;
138};
139
140struct alpha_elf_reloc_entry
141{
142 struct alpha_elf_reloc_entry *next;
143
144 /* Which .reloc section? */
145 asection *srel;
146
1f7f2abb
L
147 /* Which section this relocation is against? */
148 asection *sec;
21d799b5
NC
149
150 /* How many did we find? */
151 unsigned long count;
1f7f2abb
L
152
153 /* What kind of relocation? */
154 unsigned int rtype;
21d799b5
NC
155};
156
252b5132
RH
157struct alpha_elf_link_hash_entry
158{
159 struct elf_link_hash_entry root;
160
161 /* External symbol information. */
162 EXTR esym;
163
164 /* Cumulative flags for all the .got entries. */
165 int flags;
166
9e756d64 167 /* Contexts in which a literal was referenced. */
8288a39e
RH
168#define ALPHA_ELF_LINK_HASH_LU_ADDR 0x01
169#define ALPHA_ELF_LINK_HASH_LU_MEM 0x02
170#define ALPHA_ELF_LINK_HASH_LU_BYTE 0x04
171#define ALPHA_ELF_LINK_HASH_LU_JSR 0x08
172#define ALPHA_ELF_LINK_HASH_LU_TLSGD 0x10
173#define ALPHA_ELF_LINK_HASH_LU_TLSLDM 0x20
174#define ALPHA_ELF_LINK_HASH_LU_JSRDIRECT 0x40
175#define ALPHA_ELF_LINK_HASH_LU_PLT 0x38
176#define ALPHA_ELF_LINK_HASH_TLS_IE 0x80
cc03ec80 177
252b5132 178 /* Used to implement multiple .got subsections. */
21d799b5 179 struct alpha_elf_got_entry *got_entries;
252b5132 180
571fe01f 181 /* Used to count non-got, non-plt relocations for delayed sizing
252b5132 182 of relocation sections. */
21d799b5 183 struct alpha_elf_reloc_entry *reloc_entries;
252b5132
RH
184};
185
186/* Alpha ELF linker hash table. */
187
188struct alpha_elf_link_hash_table
189{
190 struct elf_link_hash_table root;
191
192 /* The head of a list of .got subsections linked through
193 alpha_elf_tdata(abfd)->got_link_next. */
194 bfd *got_list;
4a828aab
RH
195
196 /* The most recent relax pass that we've seen. The GOTs
197 should be regenerated if this doesn't match. */
198 int relax_trip;
252b5132
RH
199};
200
201/* Look up an entry in a Alpha ELF linker hash table. */
202
203#define alpha_elf_link_hash_lookup(table, string, create, copy, follow) \
204 ((struct alpha_elf_link_hash_entry *) \
205 elf_link_hash_lookup (&(table)->root, (string), (create), \
206 (copy), (follow)))
207
208/* Traverse a Alpha ELF linker hash table. */
209
210#define alpha_elf_link_hash_traverse(table, func, info) \
211 (elf_link_hash_traverse \
212 (&(table)->root, \
2c3fc389 213 (bfd_boolean (*) (struct elf_link_hash_entry *, void *)) (func), \
252b5132
RH
214 (info)))
215
216/* Get the Alpha ELF linker hash table from a link_info structure. */
217
218#define alpha_elf_hash_table(p) \
4dfe6ac6
NC
219 (elf_hash_table_id ((struct elf_link_hash_table *) ((p)->hash)) \
220 == ALPHA_ELF_DATA ? ((struct alpha_elf_link_hash_table *) ((p)->hash)) : NULL)
252b5132
RH
221
222/* Get the object's symbols as our own entry type. */
223
224#define alpha_elf_sym_hashes(abfd) \
225 ((struct alpha_elf_link_hash_entry **)elf_sym_hashes(abfd))
226
68ffbac6 227/* Should we do dynamic things to this symbol? This differs from the
986a241f
RH
228 generic version in that we never need to consider function pointer
229 equality wrt PLT entries -- we don't create a PLT entry if a symbol's
230 address is ever taken. */
252b5132 231
986a241f 232static inline bfd_boolean
a7519a3c
RH
233alpha_elf_dynamic_symbol_p (struct elf_link_hash_entry *h,
234 struct bfd_link_info *info)
8fb35fed 235{
986a241f 236 return _bfd_elf_dynamic_symbol_p (h, info, 0);
8fb35fed 237}
252b5132
RH
238
239/* Create an entry in a Alpha ELF linker hash table. */
240
241static struct bfd_hash_entry *
a7519a3c
RH
242elf64_alpha_link_hash_newfunc (struct bfd_hash_entry *entry,
243 struct bfd_hash_table *table,
244 const char *string)
252b5132
RH
245{
246 struct alpha_elf_link_hash_entry *ret =
247 (struct alpha_elf_link_hash_entry *) entry;
248
249 /* Allocate the structure if it has not already been allocated by a
250 subclass. */
251 if (ret == (struct alpha_elf_link_hash_entry *) NULL)
252 ret = ((struct alpha_elf_link_hash_entry *)
253 bfd_hash_allocate (table,
254 sizeof (struct alpha_elf_link_hash_entry)));
255 if (ret == (struct alpha_elf_link_hash_entry *) NULL)
256 return (struct bfd_hash_entry *) ret;
257
258 /* Call the allocation method of the superclass. */
259 ret = ((struct alpha_elf_link_hash_entry *)
260 _bfd_elf_link_hash_newfunc ((struct bfd_hash_entry *) ret,
261 table, string));
262 if (ret != (struct alpha_elf_link_hash_entry *) NULL)
263 {
264 /* Set local fields. */
265 memset (&ret->esym, 0, sizeof (EXTR));
266 /* We use -2 as a marker to indicate that the information has
267 not been set. -1 means there is no associated ifd. */
268 ret->esym.ifd = -2;
269 ret->flags = 0;
270 ret->got_entries = NULL;
271 ret->reloc_entries = NULL;
272 }
273
274 return (struct bfd_hash_entry *) ret;
275}
276
277/* Create a Alpha ELF linker hash table. */
278
279static struct bfd_link_hash_table *
a7519a3c 280elf64_alpha_bfd_link_hash_table_create (bfd *abfd)
252b5132
RH
281{
282 struct alpha_elf_link_hash_table *ret;
986f0783 283 size_t amt = sizeof (struct alpha_elf_link_hash_table);
252b5132 284
e2d34d7d 285 ret = (struct alpha_elf_link_hash_table *) bfd_zmalloc (amt);
252b5132
RH
286 if (ret == (struct alpha_elf_link_hash_table *) NULL)
287 return NULL;
288
66eb6687
AM
289 if (!_bfd_elf_link_hash_table_init (&ret->root, abfd,
290 elf64_alpha_link_hash_newfunc,
4dfe6ac6
NC
291 sizeof (struct alpha_elf_link_hash_entry),
292 ALPHA_ELF_DATA))
252b5132 293 {
e2d34d7d 294 free (ret);
252b5132
RH
295 return NULL;
296 }
297
298 return &ret->root.root;
299}
300\f
698600e4
AM
301/* Alpha ELF follows MIPS ELF in using a special find_nearest_line
302 routine in order to handle the ECOFF debugging information. */
303
304struct alpha_elf_find_line
305{
306 struct ecoff_debug_info d;
307 struct ecoff_find_line i;
308};
309
252b5132
RH
310/* We have some private fields hanging off of the elf_tdata structure. */
311
312struct alpha_elf_obj_tdata
313{
314 struct elf_obj_tdata root;
315
316 /* For every input file, these are the got entries for that object's
317 local symbols. */
318 struct alpha_elf_got_entry ** local_got_entries;
319
320 /* For every input file, this is the object that owns the got that
321 this input file uses. */
322 bfd *gotobj;
323
324 /* For every got, this is a linked list through the objects using this got */
325 bfd *in_got_link_next;
326
327 /* For every got, this is a link to the next got subsegment. */
328 bfd *got_link_next;
329
330 /* For every got, this is the section. */
331 asection *got;
332
3765b1be
RH
333 /* For every got, this is it's total number of words. */
334 int total_got_size;
252b5132 335
3765b1be 336 /* For every got, this is the sum of the number of words required
252b5132 337 to hold all of the member object's local got. */
3765b1be 338 int local_got_size;
698600e4
AM
339
340 /* Used by elf64_alpha_find_nearest_line entry point. */
341 struct alpha_elf_find_line *find_line_info;
342
252b5132
RH
343};
344
345#define alpha_elf_tdata(abfd) \
346 ((struct alpha_elf_obj_tdata *) (abfd)->tdata.any)
347
0ffa91dd
NC
348#define is_alpha_elf(bfd) \
349 (bfd_get_flavour (bfd) == bfd_target_elf_flavour \
350 && elf_tdata (bfd) != NULL \
4dfe6ac6 351 && elf_object_id (bfd) == ALPHA_ELF_DATA)
0ffa91dd 352
b34976b6 353static bfd_boolean
a7519a3c 354elf64_alpha_mkobject (bfd *abfd)
252b5132 355{
0ffa91dd 356 return bfd_elf_allocate_object (abfd, sizeof (struct alpha_elf_obj_tdata),
4dfe6ac6 357 ALPHA_ELF_DATA);
252b5132
RH
358}
359
b34976b6 360static bfd_boolean
a7519a3c 361elf64_alpha_object_p (bfd *abfd)
252b5132 362{
252b5132
RH
363 /* Set the right machine number for an Alpha ELF file. */
364 return bfd_default_set_arch_mach (abfd, bfd_arch_alpha, 0);
365}
366\f
a7519a3c
RH
367/* A relocation function which doesn't do anything. */
368
369static bfd_reloc_status_type
370elf64_alpha_reloc_nil (bfd *abfd ATTRIBUTE_UNUSED, arelent *reloc,
371 asymbol *sym ATTRIBUTE_UNUSED,
2c3fc389 372 void * data ATTRIBUTE_UNUSED, asection *sec,
a7519a3c
RH
373 bfd *output_bfd, char **error_message ATTRIBUTE_UNUSED)
374{
375 if (output_bfd)
376 reloc->address += sec->output_offset;
377 return bfd_reloc_ok;
378}
379
380/* A relocation function used for an unsupported reloc. */
381
382static bfd_reloc_status_type
383elf64_alpha_reloc_bad (bfd *abfd ATTRIBUTE_UNUSED, arelent *reloc,
384 asymbol *sym ATTRIBUTE_UNUSED,
2c3fc389 385 void * data ATTRIBUTE_UNUSED, asection *sec,
a7519a3c
RH
386 bfd *output_bfd, char **error_message ATTRIBUTE_UNUSED)
387{
388 if (output_bfd)
389 reloc->address += sec->output_offset;
390 return bfd_reloc_notsupported;
391}
392
393/* Do the work of the GPDISP relocation. */
394
395static bfd_reloc_status_type
396elf64_alpha_do_reloc_gpdisp (bfd *abfd, bfd_vma gpdisp, bfd_byte *p_ldah,
397 bfd_byte *p_lda)
398{
399 bfd_reloc_status_type ret = bfd_reloc_ok;
400 bfd_vma addend;
401 unsigned long i_ldah, i_lda;
402
403 i_ldah = bfd_get_32 (abfd, p_ldah);
404 i_lda = bfd_get_32 (abfd, p_lda);
405
406 /* Complain if the instructions are not correct. */
407 if (((i_ldah >> 26) & 0x3f) != 0x09
408 || ((i_lda >> 26) & 0x3f) != 0x08)
409 ret = bfd_reloc_dangerous;
410
411 /* Extract the user-supplied offset, mirroring the sign extensions
412 that the instructions perform. */
413 addend = ((i_ldah & 0xffff) << 16) | (i_lda & 0xffff);
414 addend = (addend ^ 0x80008000) - 0x80008000;
415
416 gpdisp += addend;
417
418 if ((bfd_signed_vma) gpdisp < -(bfd_signed_vma) 0x80000000
419 || (bfd_signed_vma) gpdisp >= (bfd_signed_vma) 0x7fff8000)
420 ret = bfd_reloc_overflow;
421
422 /* compensate for the sign extension again. */
423 i_ldah = ((i_ldah & 0xffff0000)
424 | (((gpdisp >> 16) + ((gpdisp >> 15) & 1)) & 0xffff));
425 i_lda = (i_lda & 0xffff0000) | (gpdisp & 0xffff);
426
427 bfd_put_32 (abfd, (bfd_vma) i_ldah, p_ldah);
428 bfd_put_32 (abfd, (bfd_vma) i_lda, p_lda);
429
430 return ret;
431}
432
433/* The special function for the GPDISP reloc. */
434
435static bfd_reloc_status_type
436elf64_alpha_reloc_gpdisp (bfd *abfd, arelent *reloc_entry,
2c3fc389 437 asymbol *sym ATTRIBUTE_UNUSED, void * data,
a7519a3c
RH
438 asection *input_section, bfd *output_bfd,
439 char **err_msg)
440{
441 bfd_reloc_status_type ret;
442 bfd_vma gp, relocation;
443 bfd_vma high_address;
444 bfd_byte *p_ldah, *p_lda;
445
446 /* Don't do anything if we're not doing a final link. */
447 if (output_bfd)
448 {
449 reloc_entry->address += input_section->output_offset;
450 return bfd_reloc_ok;
451 }
452
453 high_address = bfd_get_section_limit (abfd, input_section);
454 if (reloc_entry->address > high_address
455 || reloc_entry->address + reloc_entry->addend > high_address)
456 return bfd_reloc_outofrange;
457
458 /* The gp used in the portion of the output object to which this
459 input object belongs is cached on the input bfd. */
460 gp = _bfd_get_gp_value (abfd);
461
462 relocation = (input_section->output_section->vma
463 + input_section->output_offset
464 + reloc_entry->address);
465
466 p_ldah = (bfd_byte *) data + reloc_entry->address;
467 p_lda = p_ldah + reloc_entry->addend;
468
469 ret = elf64_alpha_do_reloc_gpdisp (abfd, gp - relocation, p_ldah, p_lda);
470
471 /* Complain if the instructions are not correct. */
472 if (ret == bfd_reloc_dangerous)
473 *err_msg = _("GPDISP relocation did not find ldah and lda instructions");
474
475 return ret;
476}
477
252b5132
RH
478/* In case we're on a 32-bit machine, construct a 64-bit "-1" value
479 from smaller values. Start with zero, widen, *then* decrement. */
480#define MINUS_ONE (((bfd_vma)0) - 1)
481
21d799b5 482
dfe57ca0 483#define SKIP_HOWTO(N) \
21d799b5 484 HOWTO(N, 0, 0, 0, 0, 0, complain_overflow_dont, elf64_alpha_reloc_bad, 0, 0, 0, 0, 0)
dfe57ca0 485
252b5132
RH
486static reloc_howto_type elf64_alpha_howto_table[] =
487{
488 HOWTO (R_ALPHA_NONE, /* type */
489 0, /* rightshift */
6346d5ca
AM
490 3, /* size (0 = byte, 1 = short, 2 = long) */
491 0, /* bitsize */
b34976b6 492 TRUE, /* pc_relative */
252b5132
RH
493 0, /* bitpos */
494 complain_overflow_dont, /* complain_on_overflow */
495 elf64_alpha_reloc_nil, /* special_function */
496 "NONE", /* name */
b34976b6 497 FALSE, /* partial_inplace */
252b5132
RH
498 0, /* src_mask */
499 0, /* dst_mask */
b34976b6 500 TRUE), /* pcrel_offset */
252b5132
RH
501
502 /* A 32 bit reference to a symbol. */
503 HOWTO (R_ALPHA_REFLONG, /* type */
504 0, /* rightshift */
505 2, /* size (0 = byte, 1 = short, 2 = long) */
506 32, /* bitsize */
b34976b6 507 FALSE, /* pc_relative */
252b5132
RH
508 0, /* bitpos */
509 complain_overflow_bitfield, /* complain_on_overflow */
bc1bc43f 510 bfd_elf_generic_reloc, /* special_function */
252b5132 511 "REFLONG", /* name */
b34976b6 512 FALSE, /* partial_inplace */
252b5132
RH
513 0xffffffff, /* src_mask */
514 0xffffffff, /* dst_mask */
b34976b6 515 FALSE), /* pcrel_offset */
252b5132
RH
516
517 /* A 64 bit reference to a symbol. */
518 HOWTO (R_ALPHA_REFQUAD, /* type */
519 0, /* rightshift */
520 4, /* size (0 = byte, 1 = short, 2 = long) */
521 64, /* bitsize */
b34976b6 522 FALSE, /* pc_relative */
252b5132
RH
523 0, /* bitpos */
524 complain_overflow_bitfield, /* complain_on_overflow */
bc1bc43f 525 bfd_elf_generic_reloc, /* special_function */
252b5132 526 "REFQUAD", /* name */
b34976b6 527 FALSE, /* partial_inplace */
252b5132
RH
528 MINUS_ONE, /* src_mask */
529 MINUS_ONE, /* dst_mask */
b34976b6 530 FALSE), /* pcrel_offset */
252b5132
RH
531
532 /* A 32 bit GP relative offset. This is just like REFLONG except
533 that when the value is used the value of the gp register will be
534 added in. */
535 HOWTO (R_ALPHA_GPREL32, /* type */
536 0, /* rightshift */
537 2, /* size (0 = byte, 1 = short, 2 = long) */
538 32, /* bitsize */
b34976b6 539 FALSE, /* pc_relative */
252b5132
RH
540 0, /* bitpos */
541 complain_overflow_bitfield, /* complain_on_overflow */
bc1bc43f 542 bfd_elf_generic_reloc, /* special_function */
252b5132 543 "GPREL32", /* name */
b34976b6 544 FALSE, /* partial_inplace */
252b5132
RH
545 0xffffffff, /* src_mask */
546 0xffffffff, /* dst_mask */
b34976b6 547 FALSE), /* pcrel_offset */
252b5132
RH
548
549 /* Used for an instruction that refers to memory off the GP register. */
550 HOWTO (R_ALPHA_LITERAL, /* type */
551 0, /* rightshift */
dfe57ca0 552 1, /* size (0 = byte, 1 = short, 2 = long) */
252b5132 553 16, /* bitsize */
b34976b6 554 FALSE, /* pc_relative */
252b5132
RH
555 0, /* bitpos */
556 complain_overflow_signed, /* complain_on_overflow */
bc1bc43f 557 bfd_elf_generic_reloc, /* special_function */
252b5132 558 "ELF_LITERAL", /* name */
b34976b6 559 FALSE, /* partial_inplace */
252b5132
RH
560 0xffff, /* src_mask */
561 0xffff, /* dst_mask */
b34976b6 562 FALSE), /* pcrel_offset */
252b5132
RH
563
564 /* This reloc only appears immediately following an ELF_LITERAL reloc.
565 It identifies a use of the literal. The symbol index is special:
566 1 means the literal address is in the base register of a memory
567 format instruction; 2 means the literal address is in the byte
568 offset register of a byte-manipulation instruction; 3 means the
569 literal address is in the target register of a jsr instruction.
570 This does not actually do any relocation. */
571 HOWTO (R_ALPHA_LITUSE, /* type */
572 0, /* rightshift */
dfe57ca0 573 1, /* size (0 = byte, 1 = short, 2 = long) */
252b5132 574 32, /* bitsize */
b34976b6 575 FALSE, /* pc_relative */
252b5132
RH
576 0, /* bitpos */
577 complain_overflow_dont, /* complain_on_overflow */
578 elf64_alpha_reloc_nil, /* special_function */
579 "LITUSE", /* name */
b34976b6 580 FALSE, /* partial_inplace */
252b5132
RH
581 0, /* src_mask */
582 0, /* dst_mask */
b34976b6 583 FALSE), /* pcrel_offset */
252b5132
RH
584
585 /* Load the gp register. This is always used for a ldah instruction
586 which loads the upper 16 bits of the gp register. The symbol
587 index of the GPDISP instruction is an offset in bytes to the lda
588 instruction that loads the lower 16 bits. The value to use for
589 the relocation is the difference between the GP value and the
590 current location; the load will always be done against a register
591 holding the current address.
592
593 NOTE: Unlike ECOFF, partial in-place relocation is not done. If
594 any offset is present in the instructions, it is an offset from
595 the register to the ldah instruction. This lets us avoid any
596 stupid hackery like inventing a gp value to do partial relocation
597 against. Also unlike ECOFF, we do the whole relocation off of
598 the GPDISP rather than a GPDISP_HI16/GPDISP_LO16 pair. An odd,
599 space consuming bit, that, since all the information was present
600 in the GPDISP_HI16 reloc. */
601 HOWTO (R_ALPHA_GPDISP, /* type */
602 16, /* rightshift */
603 2, /* size (0 = byte, 1 = short, 2 = long) */
604 16, /* bitsize */
b34976b6 605 FALSE, /* pc_relative */
252b5132
RH
606 0, /* bitpos */
607 complain_overflow_dont, /* complain_on_overflow */
608 elf64_alpha_reloc_gpdisp, /* special_function */
609 "GPDISP", /* name */
b34976b6 610 FALSE, /* partial_inplace */
252b5132
RH
611 0xffff, /* src_mask */
612 0xffff, /* dst_mask */
b34976b6 613 TRUE), /* pcrel_offset */
252b5132
RH
614
615 /* A 21 bit branch. */
616 HOWTO (R_ALPHA_BRADDR, /* type */
617 2, /* rightshift */
618 2, /* size (0 = byte, 1 = short, 2 = long) */
619 21, /* bitsize */
b34976b6 620 TRUE, /* pc_relative */
252b5132
RH
621 0, /* bitpos */
622 complain_overflow_signed, /* complain_on_overflow */
bc1bc43f 623 bfd_elf_generic_reloc, /* special_function */
252b5132 624 "BRADDR", /* name */
b34976b6 625 FALSE, /* partial_inplace */
252b5132
RH
626 0x1fffff, /* src_mask */
627 0x1fffff, /* dst_mask */
b34976b6 628 TRUE), /* pcrel_offset */
252b5132
RH
629
630 /* A hint for a jump to a register. */
631 HOWTO (R_ALPHA_HINT, /* type */
632 2, /* rightshift */
dfe57ca0 633 1, /* size (0 = byte, 1 = short, 2 = long) */
252b5132 634 14, /* bitsize */
b34976b6 635 TRUE, /* pc_relative */
252b5132
RH
636 0, /* bitpos */
637 complain_overflow_dont, /* complain_on_overflow */
bc1bc43f 638 bfd_elf_generic_reloc, /* special_function */
252b5132 639 "HINT", /* name */
b34976b6 640 FALSE, /* partial_inplace */
252b5132
RH
641 0x3fff, /* src_mask */
642 0x3fff, /* dst_mask */
b34976b6 643 TRUE), /* pcrel_offset */
252b5132
RH
644
645 /* 16 bit PC relative offset. */
646 HOWTO (R_ALPHA_SREL16, /* type */
647 0, /* rightshift */
648 1, /* size (0 = byte, 1 = short, 2 = long) */
649 16, /* bitsize */
b34976b6 650 TRUE, /* pc_relative */
252b5132
RH
651 0, /* bitpos */
652 complain_overflow_signed, /* complain_on_overflow */
bc1bc43f 653 bfd_elf_generic_reloc, /* special_function */
252b5132 654 "SREL16", /* name */
b34976b6 655 FALSE, /* partial_inplace */
252b5132
RH
656 0xffff, /* src_mask */
657 0xffff, /* dst_mask */
b34976b6 658 TRUE), /* pcrel_offset */
252b5132
RH
659
660 /* 32 bit PC relative offset. */
661 HOWTO (R_ALPHA_SREL32, /* type */
662 0, /* rightshift */
663 2, /* size (0 = byte, 1 = short, 2 = long) */
664 32, /* bitsize */
b34976b6 665 TRUE, /* pc_relative */
252b5132
RH
666 0, /* bitpos */
667 complain_overflow_signed, /* complain_on_overflow */
bc1bc43f 668 bfd_elf_generic_reloc, /* special_function */
252b5132 669 "SREL32", /* name */
b34976b6 670 FALSE, /* partial_inplace */
252b5132
RH
671 0xffffffff, /* src_mask */
672 0xffffffff, /* dst_mask */
b34976b6 673 TRUE), /* pcrel_offset */
252b5132
RH
674
675 /* A 64 bit PC relative offset. */
676 HOWTO (R_ALPHA_SREL64, /* type */
677 0, /* rightshift */
678 4, /* size (0 = byte, 1 = short, 2 = long) */
679 64, /* bitsize */
b34976b6 680 TRUE, /* pc_relative */
252b5132
RH
681 0, /* bitpos */
682 complain_overflow_signed, /* complain_on_overflow */
bc1bc43f 683 bfd_elf_generic_reloc, /* special_function */
252b5132 684 "SREL64", /* name */
b34976b6 685 FALSE, /* partial_inplace */
252b5132
RH
686 MINUS_ONE, /* src_mask */
687 MINUS_ONE, /* dst_mask */
b34976b6 688 TRUE), /* pcrel_offset */
252b5132 689
dfe57ca0
RH
690 /* Skip 12 - 16; deprecated ECOFF relocs. */
691 SKIP_HOWTO (12),
692 SKIP_HOWTO (13),
693 SKIP_HOWTO (14),
694 SKIP_HOWTO (15),
695 SKIP_HOWTO (16),
252b5132
RH
696
697 /* The high 16 bits of the displacement from GP to the target. */
698 HOWTO (R_ALPHA_GPRELHIGH,
699 0, /* rightshift */
dfe57ca0 700 1, /* size (0 = byte, 1 = short, 2 = long) */
252b5132 701 16, /* bitsize */
b34976b6 702 FALSE, /* pc_relative */
252b5132
RH
703 0, /* bitpos */
704 complain_overflow_signed, /* complain_on_overflow */
bc1bc43f 705 bfd_elf_generic_reloc, /* special_function */
252b5132 706 "GPRELHIGH", /* name */
b34976b6 707 FALSE, /* partial_inplace */
252b5132
RH
708 0xffff, /* src_mask */
709 0xffff, /* dst_mask */
b34976b6 710 FALSE), /* pcrel_offset */
252b5132
RH
711
712 /* The low 16 bits of the displacement from GP to the target. */
713 HOWTO (R_ALPHA_GPRELLOW,
714 0, /* rightshift */
dfe57ca0 715 1, /* size (0 = byte, 1 = short, 2 = long) */
252b5132 716 16, /* bitsize */
b34976b6 717 FALSE, /* pc_relative */
252b5132
RH
718 0, /* bitpos */
719 complain_overflow_dont, /* complain_on_overflow */
bc1bc43f 720 bfd_elf_generic_reloc, /* special_function */
252b5132 721 "GPRELLOW", /* name */
b34976b6 722 FALSE, /* partial_inplace */
252b5132
RH
723 0xffff, /* src_mask */
724 0xffff, /* dst_mask */
b34976b6 725 FALSE), /* pcrel_offset */
252b5132
RH
726
727 /* A 16-bit displacement from the GP to the target. */
dfe57ca0 728 HOWTO (R_ALPHA_GPREL16,
252b5132 729 0, /* rightshift */
dfe57ca0 730 1, /* size (0 = byte, 1 = short, 2 = long) */
252b5132 731 16, /* bitsize */
b34976b6 732 FALSE, /* pc_relative */
252b5132
RH
733 0, /* bitpos */
734 complain_overflow_signed, /* complain_on_overflow */
bc1bc43f 735 bfd_elf_generic_reloc, /* special_function */
dfe57ca0 736 "GPREL16", /* name */
b34976b6 737 FALSE, /* partial_inplace */
252b5132
RH
738 0xffff, /* src_mask */
739 0xffff, /* dst_mask */
b34976b6 740 FALSE), /* pcrel_offset */
252b5132 741
dfe57ca0
RH
742 /* Skip 20 - 23; deprecated ECOFF relocs. */
743 SKIP_HOWTO (20),
744 SKIP_HOWTO (21),
745 SKIP_HOWTO (22),
746 SKIP_HOWTO (23),
252b5132 747
fe8bc63d 748 /* Misc ELF relocations. */
252b5132
RH
749
750 /* A dynamic relocation to copy the target into our .dynbss section. */
751 /* Not generated, as all Alpha objects use PIC, so it is not needed. It
752 is present because every other ELF has one, but should not be used
753 because .dynbss is an ugly thing. */
754 HOWTO (R_ALPHA_COPY,
755 0,
756 0,
757 0,
b34976b6 758 FALSE,
252b5132
RH
759 0,
760 complain_overflow_dont,
761 bfd_elf_generic_reloc,
762 "COPY",
b34976b6 763 FALSE,
252b5132
RH
764 0,
765 0,
b34976b6 766 TRUE),
252b5132
RH
767
768 /* A dynamic relocation for a .got entry. */
769 HOWTO (R_ALPHA_GLOB_DAT,
770 0,
771 0,
772 0,
b34976b6 773 FALSE,
252b5132
RH
774 0,
775 complain_overflow_dont,
776 bfd_elf_generic_reloc,
777 "GLOB_DAT",
b34976b6 778 FALSE,
252b5132
RH
779 0,
780 0,
b34976b6 781 TRUE),
252b5132
RH
782
783 /* A dynamic relocation for a .plt entry. */
784 HOWTO (R_ALPHA_JMP_SLOT,
785 0,
786 0,
787 0,
b34976b6 788 FALSE,
252b5132
RH
789 0,
790 complain_overflow_dont,
791 bfd_elf_generic_reloc,
792 "JMP_SLOT",
b34976b6 793 FALSE,
252b5132
RH
794 0,
795 0,
b34976b6 796 TRUE),
252b5132
RH
797
798 /* A dynamic relocation to add the base of the DSO to a 64-bit field. */
799 HOWTO (R_ALPHA_RELATIVE,
800 0,
801 0,
802 0,
b34976b6 803 FALSE,
252b5132
RH
804 0,
805 complain_overflow_dont,
806 bfd_elf_generic_reloc,
807 "RELATIVE",
b34976b6 808 FALSE,
252b5132
RH
809 0,
810 0,
b34976b6 811 TRUE),
7793f4d0
RH
812
813 /* A 21 bit branch that adjusts for gp loads. */
814 HOWTO (R_ALPHA_BRSGP, /* type */
815 2, /* rightshift */
816 2, /* size (0 = byte, 1 = short, 2 = long) */
817 21, /* bitsize */
b34976b6 818 TRUE, /* pc_relative */
7793f4d0
RH
819 0, /* bitpos */
820 complain_overflow_signed, /* complain_on_overflow */
bc1bc43f 821 bfd_elf_generic_reloc, /* special_function */
7793f4d0 822 "BRSGP", /* name */
b34976b6 823 FALSE, /* partial_inplace */
7793f4d0
RH
824 0x1fffff, /* src_mask */
825 0x1fffff, /* dst_mask */
b34976b6 826 TRUE), /* pcrel_offset */
3765b1be
RH
827
828 /* Creates a tls_index for the symbol in the got. */
829 HOWTO (R_ALPHA_TLSGD, /* type */
830 0, /* rightshift */
831 1, /* size (0 = byte, 1 = short, 2 = long) */
832 16, /* bitsize */
b34976b6 833 FALSE, /* pc_relative */
3765b1be
RH
834 0, /* bitpos */
835 complain_overflow_signed, /* complain_on_overflow */
bc1bc43f 836 bfd_elf_generic_reloc, /* special_function */
3765b1be 837 "TLSGD", /* name */
b34976b6 838 FALSE, /* partial_inplace */
3765b1be
RH
839 0xffff, /* src_mask */
840 0xffff, /* dst_mask */
b34976b6 841 FALSE), /* pcrel_offset */
3765b1be
RH
842
843 /* Creates a tls_index for the (current) module in the got. */
844 HOWTO (R_ALPHA_TLSLDM, /* type */
845 0, /* rightshift */
846 1, /* size (0 = byte, 1 = short, 2 = long) */
847 16, /* bitsize */
b34976b6 848 FALSE, /* pc_relative */
3765b1be
RH
849 0, /* bitpos */
850 complain_overflow_signed, /* complain_on_overflow */
bc1bc43f 851 bfd_elf_generic_reloc, /* special_function */
3765b1be 852 "TLSLDM", /* name */
b34976b6 853 FALSE, /* partial_inplace */
3765b1be
RH
854 0xffff, /* src_mask */
855 0xffff, /* dst_mask */
b34976b6 856 FALSE), /* pcrel_offset */
3765b1be
RH
857
858 /* A dynamic relocation for a DTP module entry. */
859 HOWTO (R_ALPHA_DTPMOD64, /* type */
860 0, /* rightshift */
861 4, /* size (0 = byte, 1 = short, 2 = long) */
862 64, /* bitsize */
b34976b6 863 FALSE, /* pc_relative */
3765b1be
RH
864 0, /* bitpos */
865 complain_overflow_bitfield, /* complain_on_overflow */
bc1bc43f 866 bfd_elf_generic_reloc, /* special_function */
3765b1be 867 "DTPMOD64", /* name */
b34976b6 868 FALSE, /* partial_inplace */
3765b1be
RH
869 MINUS_ONE, /* src_mask */
870 MINUS_ONE, /* dst_mask */
b34976b6 871 FALSE), /* pcrel_offset */
3765b1be
RH
872
873 /* Creates a 64-bit offset in the got for the displacement
874 from DTP to the target. */
875 HOWTO (R_ALPHA_GOTDTPREL, /* type */
876 0, /* rightshift */
877 1, /* size (0 = byte, 1 = short, 2 = long) */
878 16, /* bitsize */
b34976b6 879 FALSE, /* pc_relative */
3765b1be
RH
880 0, /* bitpos */
881 complain_overflow_signed, /* complain_on_overflow */
bc1bc43f 882 bfd_elf_generic_reloc, /* special_function */
3765b1be 883 "GOTDTPREL", /* name */
b34976b6 884 FALSE, /* partial_inplace */
3765b1be
RH
885 0xffff, /* src_mask */
886 0xffff, /* dst_mask */
b34976b6 887 FALSE), /* pcrel_offset */
3765b1be
RH
888
889 /* A dynamic relocation for a displacement from DTP to the target. */
890 HOWTO (R_ALPHA_DTPREL64, /* type */
891 0, /* rightshift */
892 4, /* size (0 = byte, 1 = short, 2 = long) */
893 64, /* bitsize */
b34976b6 894 FALSE, /* pc_relative */
3765b1be
RH
895 0, /* bitpos */
896 complain_overflow_bitfield, /* complain_on_overflow */
bc1bc43f 897 bfd_elf_generic_reloc, /* special_function */
3765b1be 898 "DTPREL64", /* name */
b34976b6 899 FALSE, /* partial_inplace */
3765b1be
RH
900 MINUS_ONE, /* src_mask */
901 MINUS_ONE, /* dst_mask */
b34976b6 902 FALSE), /* pcrel_offset */
3765b1be
RH
903
904 /* The high 16 bits of the displacement from DTP to the target. */
905 HOWTO (R_ALPHA_DTPRELHI, /* type */
906 0, /* rightshift */
907 1, /* size (0 = byte, 1 = short, 2 = long) */
908 16, /* bitsize */
b34976b6 909 FALSE, /* pc_relative */
3765b1be
RH
910 0, /* bitpos */
911 complain_overflow_signed, /* complain_on_overflow */
bc1bc43f 912 bfd_elf_generic_reloc, /* special_function */
3765b1be 913 "DTPRELHI", /* name */
b34976b6 914 FALSE, /* partial_inplace */
3765b1be
RH
915 0xffff, /* src_mask */
916 0xffff, /* dst_mask */
b34976b6 917 FALSE), /* pcrel_offset */
3765b1be
RH
918
919 /* The low 16 bits of the displacement from DTP to the target. */
920 HOWTO (R_ALPHA_DTPRELLO, /* type */
921 0, /* rightshift */
922 1, /* size (0 = byte, 1 = short, 2 = long) */
923 16, /* bitsize */
b34976b6 924 FALSE, /* pc_relative */
3765b1be
RH
925 0, /* bitpos */
926 complain_overflow_dont, /* complain_on_overflow */
bc1bc43f 927 bfd_elf_generic_reloc, /* special_function */
3765b1be 928 "DTPRELLO", /* name */
b34976b6 929 FALSE, /* partial_inplace */
3765b1be
RH
930 0xffff, /* src_mask */
931 0xffff, /* dst_mask */
b34976b6 932 FALSE), /* pcrel_offset */
3765b1be
RH
933
934 /* A 16-bit displacement from DTP to the target. */
935 HOWTO (R_ALPHA_DTPREL16, /* type */
936 0, /* rightshift */
937 1, /* size (0 = byte, 1 = short, 2 = long) */
938 16, /* bitsize */
b34976b6 939 FALSE, /* pc_relative */
3765b1be
RH
940 0, /* bitpos */
941 complain_overflow_signed, /* complain_on_overflow */
bc1bc43f 942 bfd_elf_generic_reloc, /* special_function */
3765b1be 943 "DTPREL16", /* name */
b34976b6 944 FALSE, /* partial_inplace */
3765b1be
RH
945 0xffff, /* src_mask */
946 0xffff, /* dst_mask */
b34976b6 947 FALSE), /* pcrel_offset */
3765b1be
RH
948
949 /* Creates a 64-bit offset in the got for the displacement
950 from TP to the target. */
951 HOWTO (R_ALPHA_GOTTPREL, /* type */
952 0, /* rightshift */
953 1, /* size (0 = byte, 1 = short, 2 = long) */
954 16, /* bitsize */
b34976b6 955 FALSE, /* pc_relative */
3765b1be
RH
956 0, /* bitpos */
957 complain_overflow_signed, /* complain_on_overflow */
bc1bc43f 958 bfd_elf_generic_reloc, /* special_function */
3765b1be 959 "GOTTPREL", /* name */
b34976b6 960 FALSE, /* partial_inplace */
3765b1be
RH
961 0xffff, /* src_mask */
962 0xffff, /* dst_mask */
b34976b6 963 FALSE), /* pcrel_offset */
3765b1be
RH
964
965 /* A dynamic relocation for a displacement from TP to the target. */
966 HOWTO (R_ALPHA_TPREL64, /* type */
967 0, /* rightshift */
968 4, /* size (0 = byte, 1 = short, 2 = long) */
969 64, /* bitsize */
b34976b6 970 FALSE, /* pc_relative */
3765b1be
RH
971 0, /* bitpos */
972 complain_overflow_bitfield, /* complain_on_overflow */
bc1bc43f 973 bfd_elf_generic_reloc, /* special_function */
3765b1be 974 "TPREL64", /* name */
b34976b6 975 FALSE, /* partial_inplace */
3765b1be
RH
976 MINUS_ONE, /* src_mask */
977 MINUS_ONE, /* dst_mask */
b34976b6 978 FALSE), /* pcrel_offset */
3765b1be
RH
979
980 /* The high 16 bits of the displacement from TP to the target. */
981 HOWTO (R_ALPHA_TPRELHI, /* type */
982 0, /* rightshift */
983 1, /* size (0 = byte, 1 = short, 2 = long) */
984 16, /* bitsize */
b34976b6 985 FALSE, /* pc_relative */
3765b1be
RH
986 0, /* bitpos */
987 complain_overflow_signed, /* complain_on_overflow */
bc1bc43f 988 bfd_elf_generic_reloc, /* special_function */
3765b1be 989 "TPRELHI", /* name */
b34976b6 990 FALSE, /* partial_inplace */
3765b1be
RH
991 0xffff, /* src_mask */
992 0xffff, /* dst_mask */
b34976b6 993 FALSE), /* pcrel_offset */
3765b1be
RH
994
995 /* The low 16 bits of the displacement from TP to the target. */
996 HOWTO (R_ALPHA_TPRELLO, /* type */
997 0, /* rightshift */
998 1, /* size (0 = byte, 1 = short, 2 = long) */
999 16, /* bitsize */
b34976b6 1000 FALSE, /* pc_relative */
3765b1be
RH
1001 0, /* bitpos */
1002 complain_overflow_dont, /* complain_on_overflow */
bc1bc43f 1003 bfd_elf_generic_reloc, /* special_function */
3765b1be 1004 "TPRELLO", /* name */
b34976b6 1005 FALSE, /* partial_inplace */
3765b1be
RH
1006 0xffff, /* src_mask */
1007 0xffff, /* dst_mask */
b34976b6 1008 FALSE), /* pcrel_offset */
3765b1be
RH
1009
1010 /* A 16-bit displacement from TP to the target. */
1011 HOWTO (R_ALPHA_TPREL16, /* type */
1012 0, /* rightshift */
1013 1, /* size (0 = byte, 1 = short, 2 = long) */
1014 16, /* bitsize */
b34976b6 1015 FALSE, /* pc_relative */
3765b1be
RH
1016 0, /* bitpos */
1017 complain_overflow_signed, /* complain_on_overflow */
bc1bc43f 1018 bfd_elf_generic_reloc, /* special_function */
3765b1be 1019 "TPREL16", /* name */
b34976b6 1020 FALSE, /* partial_inplace */
3765b1be
RH
1021 0xffff, /* src_mask */
1022 0xffff, /* dst_mask */
b34976b6 1023 FALSE), /* pcrel_offset */
252b5132
RH
1024};
1025
252b5132
RH
1026/* A mapping from BFD reloc types to Alpha ELF reloc types. */
1027
1028struct elf_reloc_map
1029{
1030 bfd_reloc_code_real_type bfd_reloc_val;
1031 int elf_reloc_val;
1032};
1033
1034static const struct elf_reloc_map elf64_alpha_reloc_map[] =
1035{
dfe57ca0
RH
1036 {BFD_RELOC_NONE, R_ALPHA_NONE},
1037 {BFD_RELOC_32, R_ALPHA_REFLONG},
1038 {BFD_RELOC_64, R_ALPHA_REFQUAD},
1039 {BFD_RELOC_CTOR, R_ALPHA_REFQUAD},
1040 {BFD_RELOC_GPREL32, R_ALPHA_GPREL32},
1041 {BFD_RELOC_ALPHA_ELF_LITERAL, R_ALPHA_LITERAL},
1042 {BFD_RELOC_ALPHA_LITUSE, R_ALPHA_LITUSE},
1043 {BFD_RELOC_ALPHA_GPDISP, R_ALPHA_GPDISP},
1044 {BFD_RELOC_23_PCREL_S2, R_ALPHA_BRADDR},
1045 {BFD_RELOC_ALPHA_HINT, R_ALPHA_HINT},
1046 {BFD_RELOC_16_PCREL, R_ALPHA_SREL16},
1047 {BFD_RELOC_32_PCREL, R_ALPHA_SREL32},
1048 {BFD_RELOC_64_PCREL, R_ALPHA_SREL64},
1049 {BFD_RELOC_ALPHA_GPREL_HI16, R_ALPHA_GPRELHIGH},
1050 {BFD_RELOC_ALPHA_GPREL_LO16, R_ALPHA_GPRELLOW},
1051 {BFD_RELOC_GPREL16, R_ALPHA_GPREL16},
7793f4d0 1052 {BFD_RELOC_ALPHA_BRSGP, R_ALPHA_BRSGP},
3765b1be
RH
1053 {BFD_RELOC_ALPHA_TLSGD, R_ALPHA_TLSGD},
1054 {BFD_RELOC_ALPHA_TLSLDM, R_ALPHA_TLSLDM},
1055 {BFD_RELOC_ALPHA_DTPMOD64, R_ALPHA_DTPMOD64},
1056 {BFD_RELOC_ALPHA_GOTDTPREL16, R_ALPHA_GOTDTPREL},
1057 {BFD_RELOC_ALPHA_DTPREL64, R_ALPHA_DTPREL64},
1058 {BFD_RELOC_ALPHA_DTPREL_HI16, R_ALPHA_DTPRELHI},
1059 {BFD_RELOC_ALPHA_DTPREL_LO16, R_ALPHA_DTPRELLO},
1060 {BFD_RELOC_ALPHA_DTPREL16, R_ALPHA_DTPREL16},
1061 {BFD_RELOC_ALPHA_GOTTPREL16, R_ALPHA_GOTTPREL},
1062 {BFD_RELOC_ALPHA_TPREL64, R_ALPHA_TPREL64},
1063 {BFD_RELOC_ALPHA_TPREL_HI16, R_ALPHA_TPRELHI},
1064 {BFD_RELOC_ALPHA_TPREL_LO16, R_ALPHA_TPRELLO},
1065 {BFD_RELOC_ALPHA_TPREL16, R_ALPHA_TPREL16},
252b5132
RH
1066};
1067
1068/* Given a BFD reloc type, return a HOWTO structure. */
1069
1070static reloc_howto_type *
a7519a3c
RH
1071elf64_alpha_bfd_reloc_type_lookup (bfd *abfd ATTRIBUTE_UNUSED,
1072 bfd_reloc_code_real_type code)
252b5132
RH
1073{
1074 const struct elf_reloc_map *i, *e;
1075 i = e = elf64_alpha_reloc_map;
1076 e += sizeof (elf64_alpha_reloc_map) / sizeof (struct elf_reloc_map);
1077 for (; i != e; ++i)
1078 {
1079 if (i->bfd_reloc_val == code)
1080 return &elf64_alpha_howto_table[i->elf_reloc_val];
1081 }
1082 return 0;
1083}
1084
157090f7
AM
1085static reloc_howto_type *
1086elf64_alpha_bfd_reloc_name_lookup (bfd *abfd ATTRIBUTE_UNUSED,
1087 const char *r_name)
1088{
1089 unsigned int i;
1090
1091 for (i = 0;
1092 i < (sizeof (elf64_alpha_howto_table)
1093 / sizeof (elf64_alpha_howto_table[0]));
1094 i++)
1095 if (elf64_alpha_howto_table[i].name != NULL
1096 && strcasecmp (elf64_alpha_howto_table[i].name, r_name) == 0)
1097 return &elf64_alpha_howto_table[i];
1098
1099 return NULL;
1100}
1101
252b5132
RH
1102/* Given an Alpha ELF reloc type, fill in an arelent structure. */
1103
f3185997 1104static bfd_boolean
0aa13fee 1105elf64_alpha_info_to_howto (bfd *abfd, arelent *cache_ptr,
a7519a3c 1106 Elf_Internal_Rela *dst)
252b5132 1107{
a7519a3c 1108 unsigned r_type = ELF64_R_TYPE(dst->r_info);
cd21f5da
NC
1109
1110 if (r_type >= R_ALPHA_max)
1111 {
695344c0 1112 /* xgettext:c-format */
0aa13fee 1113 _bfd_error_handler (_("%pB: unsupported relocation type %#x"),
4eca0228 1114 abfd, r_type);
cd21f5da 1115 bfd_set_error (bfd_error_bad_value);
f3185997 1116 return FALSE;
cd21f5da 1117 }
252b5132 1118 cache_ptr->howto = &elf64_alpha_howto_table[r_type];
f3185997 1119 return TRUE;
252b5132 1120}
3765b1be
RH
1121
1122/* These two relocations create a two-word entry in the got. */
1123#define alpha_got_entry_size(r_type) \
1124 (r_type == R_ALPHA_TLSGD || r_type == R_ALPHA_TLSLDM ? 16 : 8)
9e756d64
RH
1125
1126/* This is PT_TLS segment p_vaddr. */
e1918d23
AM
1127#define alpha_get_dtprel_base(info) \
1128 (elf_hash_table (info)->tls_sec->vma)
9e756d64
RH
1129
1130/* Main program TLS (whose template starts at PT_TLS p_vaddr)
1131 is assigned offset round(16, PT_TLS p_align). */
e1918d23
AM
1132#define alpha_get_tprel_base(info) \
1133 (elf_hash_table (info)->tls_sec->vma \
1134 - align_power ((bfd_vma) 16, \
1135 elf_hash_table (info)->tls_sec->alignment_power))
252b5132 1136\f
a7519a3c
RH
1137/* Handle an Alpha specific section when reading an object file. This
1138 is called when bfd_section_from_shdr finds a section with an unknown
bf577467 1139 type. */
252b5132 1140
a7519a3c
RH
1141static bfd_boolean
1142elf64_alpha_section_from_shdr (bfd *abfd,
1143 Elf_Internal_Shdr *hdr,
1144 const char *name,
1145 int shindex)
252b5132 1146{
a7519a3c
RH
1147 asection *newsect;
1148
1149 /* There ought to be a place to keep ELF backend specific flags, but
1150 at the moment there isn't one. We just keep track of the
1151 sections by their name, instead. Fortunately, the ABI gives
1152 suggested names for all the MIPS specific sections, so we will
1153 probably get away with this. */
1154 switch (hdr->sh_type)
1155 {
1156 case SHT_ALPHA_DEBUG:
1157 if (strcmp (name, ".mdebug") != 0)
1158 return FALSE;
1159 break;
1160 default:
1161 return FALSE;
1162 }
252b5132 1163
a7519a3c
RH
1164 if (! _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex))
1165 return FALSE;
1166 newsect = hdr->bfd_section;
252b5132 1167
a7519a3c 1168 if (hdr->sh_type == SHT_ALPHA_DEBUG)
252b5132 1169 {
fd361982
AM
1170 if (!bfd_set_section_flags (newsect,
1171 bfd_section_flags (newsect) | SEC_DEBUGGING))
a7519a3c 1172 return FALSE;
252b5132 1173 }
a7519a3c
RH
1174
1175 return TRUE;
252b5132
RH
1176}
1177
a7519a3c
RH
1178/* Convert Alpha specific section flags to bfd internal section flags. */
1179
b34976b6 1180static bfd_boolean
8c803a2d 1181elf64_alpha_section_flags (const Elf_Internal_Shdr *hdr)
252b5132 1182{
a7519a3c 1183 if (hdr->sh_flags & SHF_ALPHA_GPREL)
8c803a2d 1184 hdr->bfd_section->flags |= SEC_SMALL_DATA;
252b5132 1185
a7519a3c
RH
1186 return TRUE;
1187}
252b5132 1188
a7519a3c
RH
1189/* Set the correct type for an Alpha ELF section. We do this by the
1190 section name, which is a hack, but ought to work. */
9e756d64 1191
a7519a3c
RH
1192static bfd_boolean
1193elf64_alpha_fake_sections (bfd *abfd, Elf_Internal_Shdr *hdr, asection *sec)
1194{
1195 register const char *name;
1196
fd361982 1197 name = bfd_section_name (sec);
a7519a3c
RH
1198
1199 if (strcmp (name, ".mdebug") == 0)
252b5132 1200 {
a7519a3c
RH
1201 hdr->sh_type = SHT_ALPHA_DEBUG;
1202 /* In a shared object on Irix 5.3, the .mdebug section has an
07d6d2b8 1203 entsize of 0. FIXME: Does this matter? */
a7519a3c
RH
1204 if ((abfd->flags & DYNAMIC) != 0 )
1205 hdr->sh_entsize = 0;
1206 else
1207 hdr->sh_entsize = 1;
252b5132 1208 }
a7519a3c
RH
1209 else if ((sec->flags & SEC_SMALL_DATA)
1210 || strcmp (name, ".sdata") == 0
1211 || strcmp (name, ".sbss") == 0
1212 || strcmp (name, ".lit4") == 0
1213 || strcmp (name, ".lit8") == 0)
1214 hdr->sh_flags |= SHF_ALPHA_GPREL;
252b5132 1215
a7519a3c
RH
1216 return TRUE;
1217}
252b5132 1218
a7519a3c
RH
1219/* Hook called by the linker routine which adds symbols from an object
1220 file. We use it to put .comm items in .sbss, and not .bss. */
1221
1222static bfd_boolean
1223elf64_alpha_add_symbol_hook (bfd *abfd, struct bfd_link_info *info,
1224 Elf_Internal_Sym *sym,
1225 const char **namep ATTRIBUTE_UNUSED,
1226 flagword *flagsp ATTRIBUTE_UNUSED,
1227 asection **secp, bfd_vma *valp)
1228{
1229 if (sym->st_shndx == SHN_COMMON
0e1862bb 1230 && !bfd_link_relocatable (info)
a7519a3c 1231 && sym->st_size <= elf_gp_size (abfd))
252b5132 1232 {
a7519a3c
RH
1233 /* Common symbols less than or equal to -G nn bytes are
1234 automatically put into .sbss. */
ffcb7aff 1235
a7519a3c 1236 asection *scomm = bfd_get_section_by_name (abfd, ".scommon");
252b5132 1237
a7519a3c 1238 if (scomm == NULL)
252b5132 1239 {
a7519a3c
RH
1240 scomm = bfd_make_section_with_flags (abfd, ".scommon",
1241 (SEC_ALLOC
1242 | SEC_IS_COMMON
1243 | SEC_LINKER_CREATED));
1244 if (scomm == NULL)
1245 return FALSE;
1246 }
ffcb7aff 1247
a7519a3c
RH
1248 *secp = scomm;
1249 *valp = sym->st_size;
1250 }
ffcb7aff 1251
a7519a3c
RH
1252 return TRUE;
1253}
252b5132 1254
a7519a3c 1255/* Create the .got section. */
252b5132 1256
a7519a3c
RH
1257static bfd_boolean
1258elf64_alpha_create_got_section (bfd *abfd,
1259 struct bfd_link_info *info ATTRIBUTE_UNUSED)
1260{
85d162e6 1261 flagword flags;
a7519a3c 1262 asection *s;
252b5132 1263
0ffa91dd
NC
1264 if (! is_alpha_elf (abfd))
1265 return FALSE;
1266
85d162e6
AM
1267 flags = (SEC_ALLOC | SEC_LOAD | SEC_HAS_CONTENTS | SEC_IN_MEMORY
1268 | SEC_LINKER_CREATED);
1269 s = bfd_make_section_anyway_with_flags (abfd, ".got", flags);
a7519a3c 1270 if (s == NULL
fd361982 1271 || !bfd_set_section_alignment (s, 3))
a7519a3c 1272 return FALSE;
252b5132 1273
a7519a3c 1274 alpha_elf_tdata (abfd)->got = s;
252b5132 1275
85d162e6
AM
1276 /* Make sure the object's gotobj is set to itself so that we default
1277 to every object with its own .got. We'll merge .gots later once
1278 we've collected each object's info. */
1279 alpha_elf_tdata (abfd)->gotobj = abfd;
1280
a7519a3c
RH
1281 return TRUE;
1282}
252b5132 1283
a7519a3c 1284/* Create all the dynamic sections. */
252b5132 1285
a7519a3c
RH
1286static bfd_boolean
1287elf64_alpha_create_dynamic_sections (bfd *abfd, struct bfd_link_info *info)
1288{
1289 asection *s;
85d162e6 1290 flagword flags;
a7519a3c 1291 struct elf_link_hash_entry *h;
252b5132 1292
0ffa91dd
NC
1293 if (! is_alpha_elf (abfd))
1294 return FALSE;
1295
a7519a3c 1296 /* We need to create .plt, .rela.plt, .got, and .rela.got sections. */
252b5132 1297
85d162e6
AM
1298 flags = (SEC_ALLOC | SEC_LOAD | SEC_CODE | SEC_HAS_CONTENTS | SEC_IN_MEMORY
1299 | SEC_LINKER_CREATED
1300 | (elf64_alpha_use_secureplt ? SEC_READONLY : 0));
1301 s = bfd_make_section_anyway_with_flags (abfd, ".plt", flags);
ce558b89 1302 elf_hash_table (info)->splt = s;
fd361982 1303 if (s == NULL || ! bfd_set_section_alignment (s, 4))
a7519a3c 1304 return FALSE;
252b5132 1305
a7519a3c
RH
1306 /* Define the symbol _PROCEDURE_LINKAGE_TABLE_ at the start of the
1307 .plt section. */
7325306f
RS
1308 h = _bfd_elf_define_linkage_sym (abfd, info, s,
1309 "_PROCEDURE_LINKAGE_TABLE_");
1310 elf_hash_table (info)->hplt = h;
1311 if (h == NULL)
a7519a3c 1312 return FALSE;
d6ad34f6 1313
85d162e6
AM
1314 flags = (SEC_ALLOC | SEC_LOAD | SEC_HAS_CONTENTS | SEC_IN_MEMORY
1315 | SEC_LINKER_CREATED | SEC_READONLY);
1316 s = bfd_make_section_anyway_with_flags (abfd, ".rela.plt", flags);
ce558b89 1317 elf_hash_table (info)->srelplt = s;
fd361982 1318 if (s == NULL || ! bfd_set_section_alignment (s, 3))
a7519a3c 1319 return FALSE;
252b5132 1320
6ec7057a
RH
1321 if (elf64_alpha_use_secureplt)
1322 {
85d162e6
AM
1323 flags = SEC_ALLOC | SEC_LINKER_CREATED;
1324 s = bfd_make_section_anyway_with_flags (abfd, ".got.plt", flags);
ce558b89 1325 elf_hash_table (info)->sgotplt = s;
fd361982 1326 if (s == NULL || ! bfd_set_section_alignment (s, 3))
6ec7057a
RH
1327 return FALSE;
1328 }
1329
a7519a3c
RH
1330 /* We may or may not have created a .got section for this object, but
1331 we definitely havn't done the rest of the work. */
1cd6895c 1332
85d162e6
AM
1333 if (alpha_elf_tdata(abfd)->gotobj == NULL)
1334 {
1335 if (!elf64_alpha_create_got_section (abfd, info))
1336 return FALSE;
1337 }
1cd6895c 1338
85d162e6
AM
1339 flags = (SEC_ALLOC | SEC_LOAD | SEC_HAS_CONTENTS | SEC_IN_MEMORY
1340 | SEC_LINKER_CREATED | SEC_READONLY);
1341 s = bfd_make_section_anyway_with_flags (abfd, ".rela.got", flags);
ce558b89 1342 elf_hash_table (info)->srelgot = s;
a7519a3c 1343 if (s == NULL
fd361982 1344 || !bfd_set_section_alignment (s, 3))
a7519a3c 1345 return FALSE;
252b5132 1346
a7519a3c
RH
1347 /* Define the symbol _GLOBAL_OFFSET_TABLE_ at the start of the
1348 dynobj's .got section. We don't do this in the linker script
1349 because we don't want to define the symbol if we are not creating
1350 a global offset table. */
d98685ac
AM
1351 h = _bfd_elf_define_linkage_sym (abfd, info, alpha_elf_tdata(abfd)->got,
1352 "_GLOBAL_OFFSET_TABLE_");
a7519a3c 1353 elf_hash_table (info)->hgot = h;
d98685ac
AM
1354 if (h == NULL)
1355 return FALSE;
252b5132 1356
a7519a3c 1357 return TRUE;
252b5132 1358}
a7519a3c
RH
1359\f
1360/* Read ECOFF debugging information from a .mdebug section into a
1361 ecoff_debug_info structure. */
252b5132 1362
a7519a3c
RH
1363static bfd_boolean
1364elf64_alpha_read_ecoff_info (bfd *abfd, asection *section,
1365 struct ecoff_debug_info *debug)
252b5132 1366{
a7519a3c
RH
1367 HDRR *symhdr;
1368 const struct ecoff_debug_swap *swap;
1369 char *ext_hdr = NULL;
252b5132 1370
a7519a3c
RH
1371 swap = get_elf_backend_data (abfd)->elf_backend_ecoff_debug_swap;
1372 memset (debug, 0, sizeof (*debug));
252b5132 1373
a7519a3c
RH
1374 ext_hdr = (char *) bfd_malloc (swap->external_hdr_size);
1375 if (ext_hdr == NULL && swap->external_hdr_size != 0)
1376 goto error_return;
252b5132 1377
a7519a3c
RH
1378 if (! bfd_get_section_contents (abfd, section, ext_hdr, (file_ptr) 0,
1379 swap->external_hdr_size))
1380 goto error_return;
252b5132 1381
a7519a3c
RH
1382 symhdr = &debug->symbolic_header;
1383 (*swap->swap_hdr_in) (abfd, ext_hdr, symhdr);
252b5132 1384
a7519a3c
RH
1385 /* The symbolic header contains absolute file offsets and sizes to
1386 read. */
1387#define READ(ptr, offset, count, size, type) \
1f4361a7 1388 do \
a7519a3c 1389 { \
1f4361a7
AM
1390 size_t amt; \
1391 debug->ptr = NULL; \
1392 if (symhdr->count == 0) \
1393 break; \
1394 if (_bfd_mul_overflow (size, symhdr->count, &amt)) \
1395 { \
1396 bfd_set_error (bfd_error_file_too_big); \
1397 goto error_return; \
1398 } \
2bb3687b 1399 if (bfd_seek (abfd, symhdr->offset, SEEK_SET) != 0) \
a7519a3c 1400 goto error_return; \
2bb3687b
AM
1401 debug->ptr = (type) _bfd_malloc_and_read (abfd, amt, amt); \
1402 if (debug->ptr == NULL) \
a7519a3c 1403 goto error_return; \
1f4361a7 1404 } while (0)
fe8bc63d 1405
a7519a3c 1406 READ (line, cbLineOffset, cbLine, sizeof (unsigned char), unsigned char *);
2c3fc389
NC
1407 READ (external_dnr, cbDnOffset, idnMax, swap->external_dnr_size, void *);
1408 READ (external_pdr, cbPdOffset, ipdMax, swap->external_pdr_size, void *);
1409 READ (external_sym, cbSymOffset, isymMax, swap->external_sym_size, void *);
1410 READ (external_opt, cbOptOffset, ioptMax, swap->external_opt_size, void *);
a7519a3c
RH
1411 READ (external_aux, cbAuxOffset, iauxMax, sizeof (union aux_ext),
1412 union aux_ext *);
1413 READ (ss, cbSsOffset, issMax, sizeof (char), char *);
1414 READ (ssext, cbSsExtOffset, issExtMax, sizeof (char), char *);
2c3fc389
NC
1415 READ (external_fdr, cbFdOffset, ifdMax, swap->external_fdr_size, void *);
1416 READ (external_rfd, cbRfdOffset, crfd, swap->external_rfd_size, void *);
1417 READ (external_ext, cbExtOffset, iextMax, swap->external_ext_size, void *);
a7519a3c 1418#undef READ
252b5132 1419
a7519a3c 1420 debug->fdr = NULL;
252b5132 1421
a7519a3c 1422 return TRUE;
252b5132 1423
a7519a3c 1424 error_return:
c9594989
AM
1425 free (ext_hdr);
1426 free (debug->line);
1427 free (debug->external_dnr);
1428 free (debug->external_pdr);
1429 free (debug->external_sym);
1430 free (debug->external_opt);
1431 free (debug->external_aux);
1432 free (debug->ss);
1433 free (debug->ssext);
1434 free (debug->external_fdr);
1435 free (debug->external_rfd);
1436 free (debug->external_ext);
a7519a3c 1437 return FALSE;
252b5132
RH
1438}
1439
a7519a3c
RH
1440/* Alpha ELF local labels start with '$'. */
1441
b34976b6 1442static bfd_boolean
a7519a3c 1443elf64_alpha_is_local_label_name (bfd *abfd ATTRIBUTE_UNUSED, const char *name)
252b5132 1444{
a7519a3c
RH
1445 return name[0] == '$';
1446}
9e756d64 1447
a7519a3c 1448static bfd_boolean
fb167eb2
AM
1449elf64_alpha_find_nearest_line (bfd *abfd, asymbol **symbols,
1450 asection *section, bfd_vma offset,
1451 const char **filename_ptr,
a7519a3c 1452 const char **functionname_ptr,
fb167eb2
AM
1453 unsigned int *line_ptr,
1454 unsigned int *discriminator_ptr)
a7519a3c
RH
1455{
1456 asection *msec;
252b5132 1457
fb167eb2 1458 if (_bfd_dwarf2_find_nearest_line (abfd, symbols, NULL, section, offset,
a7519a3c 1459 filename_ptr, functionname_ptr,
fb167eb2 1460 line_ptr, discriminator_ptr,
9defd221 1461 dwarf_debug_sections,
7f3bf384
AM
1462 &elf_tdata (abfd)->dwarf2_find_line_info)
1463 == 1)
b34976b6 1464 return TRUE;
9e756d64 1465
a7519a3c
RH
1466 msec = bfd_get_section_by_name (abfd, ".mdebug");
1467 if (msec != NULL)
1bbc9cec 1468 {
a7519a3c 1469 flagword origflags;
698600e4 1470 struct alpha_elf_find_line *fi;
a7519a3c
RH
1471 const struct ecoff_debug_swap * const swap =
1472 get_elf_backend_data (abfd)->elf_backend_ecoff_debug_swap;
252b5132 1473
a7519a3c
RH
1474 /* If we are called during a link, alpha_elf_final_link may have
1475 cleared the SEC_HAS_CONTENTS field. We force it back on here
1476 if appropriate (which it normally will be). */
1477 origflags = msec->flags;
1478 if (elf_section_data (msec)->this_hdr.sh_type != SHT_NOBITS)
1479 msec->flags |= SEC_HAS_CONTENTS;
9e756d64 1480
698600e4 1481 fi = alpha_elf_tdata (abfd)->find_line_info;
a7519a3c
RH
1482 if (fi == NULL)
1483 {
1484 bfd_size_type external_fdr_size;
1485 char *fraw_src;
1486 char *fraw_end;
1487 struct fdr *fdr_ptr;
698600e4 1488 bfd_size_type amt = sizeof (struct alpha_elf_find_line);
9e756d64 1489
698600e4 1490 fi = (struct alpha_elf_find_line *) bfd_zalloc (abfd, amt);
a7519a3c
RH
1491 if (fi == NULL)
1492 {
1493 msec->flags = origflags;
1494 return FALSE;
1495 }
9e756d64 1496
a7519a3c
RH
1497 if (!elf64_alpha_read_ecoff_info (abfd, msec, &fi->d))
1498 {
1499 msec->flags = origflags;
1500 return FALSE;
1501 }
9e756d64 1502
a7519a3c
RH
1503 /* Swap in the FDR information. */
1504 amt = fi->d.symbolic_header.ifdMax * sizeof (struct fdr);
1505 fi->d.fdr = (struct fdr *) bfd_alloc (abfd, amt);
1506 if (fi->d.fdr == NULL)
1507 {
1508 msec->flags = origflags;
1509 return FALSE;
1510 }
1511 external_fdr_size = swap->external_fdr_size;
1512 fdr_ptr = fi->d.fdr;
1513 fraw_src = (char *) fi->d.external_fdr;
1514 fraw_end = (fraw_src
1515 + fi->d.symbolic_header.ifdMax * external_fdr_size);
1516 for (; fraw_src < fraw_end; fraw_src += external_fdr_size, fdr_ptr++)
2c3fc389 1517 (*swap->swap_fdr_in) (abfd, fraw_src, fdr_ptr);
9e756d64 1518
698600e4 1519 alpha_elf_tdata (abfd)->find_line_info = fi;
9e756d64 1520
a7519a3c 1521 /* Note that we don't bother to ever free this information.
07d6d2b8
AM
1522 find_nearest_line is either called all the time, as in
1523 objdump -l, so the information should be saved, or it is
1524 rarely called, as in ld error messages, so the memory
1525 wasted is unimportant. Still, it would probably be a
1526 good idea for free_cached_info to throw it away. */
a7519a3c 1527 }
9e756d64 1528
a7519a3c
RH
1529 if (_bfd_ecoff_locate_line (abfd, section, offset, &fi->d, swap,
1530 &fi->i, filename_ptr, functionname_ptr,
1531 line_ptr))
1532 {
1533 msec->flags = origflags;
1534 return TRUE;
1535 }
9e756d64 1536
a7519a3c 1537 msec->flags = origflags;
9e756d64 1538 }
9e756d64 1539
a7519a3c 1540 /* Fall back on the generic ELF find_nearest_line routine. */
9e756d64 1541
fb167eb2 1542 return _bfd_elf_find_nearest_line (abfd, symbols, section, offset,
a7519a3c 1543 filename_ptr, functionname_ptr,
fb167eb2 1544 line_ptr, discriminator_ptr);
9e756d64 1545}
a7519a3c
RH
1546\f
1547/* Structure used to pass information to alpha_elf_output_extsym. */
9e756d64 1548
a7519a3c 1549struct extsym_info
9e756d64 1550{
a7519a3c
RH
1551 bfd *abfd;
1552 struct bfd_link_info *info;
1553 struct ecoff_debug_info *debug;
1554 const struct ecoff_debug_swap *swap;
1555 bfd_boolean failed;
1556};
9e756d64 1557
a7519a3c 1558static bfd_boolean
2c3fc389 1559elf64_alpha_output_extsym (struct alpha_elf_link_hash_entry *h, void * data)
a7519a3c
RH
1560{
1561 struct extsym_info *einfo = (struct extsym_info *) data;
1562 bfd_boolean strip;
1563 asection *sec, *output_section;
9e756d64 1564
a7519a3c
RH
1565 if (h->root.indx == -2)
1566 strip = FALSE;
1567 else if ((h->root.def_dynamic
1568 || h->root.ref_dynamic
1569 || h->root.root.type == bfd_link_hash_new)
1570 && !h->root.def_regular
1571 && !h->root.ref_regular)
1572 strip = TRUE;
1573 else if (einfo->info->strip == strip_all
1574 || (einfo->info->strip == strip_some
1575 && bfd_hash_lookup (einfo->info->keep_hash,
1576 h->root.root.root.string,
1577 FALSE, FALSE) == NULL))
1578 strip = TRUE;
1579 else
1580 strip = FALSE;
9e756d64 1581
a7519a3c 1582 if (strip)
b34976b6 1583 return TRUE;
9e756d64 1584
a7519a3c 1585 if (h->esym.ifd == -2)
9e756d64 1586 {
a7519a3c
RH
1587 h->esym.jmptbl = 0;
1588 h->esym.cobol_main = 0;
1589 h->esym.weakext = 0;
1590 h->esym.reserved = 0;
1591 h->esym.ifd = ifdNil;
1592 h->esym.asym.value = 0;
1593 h->esym.asym.st = stGlobal;
9e756d64 1594
a7519a3c
RH
1595 if (h->root.root.type != bfd_link_hash_defined
1596 && h->root.root.type != bfd_link_hash_defweak)
1597 h->esym.asym.sc = scAbs;
1598 else
1599 {
1600 const char *name;
9e756d64 1601
a7519a3c
RH
1602 sec = h->root.root.u.def.section;
1603 output_section = sec->output_section;
9e756d64 1604
a7519a3c
RH
1605 /* When making a shared library and symbol h is the one from
1606 the another shared library, OUTPUT_SECTION may be null. */
1607 if (output_section == NULL)
1608 h->esym.asym.sc = scUndefined;
1609 else
1610 {
fd361982 1611 name = bfd_section_name (output_section);
9e756d64 1612
a7519a3c
RH
1613 if (strcmp (name, ".text") == 0)
1614 h->esym.asym.sc = scText;
1615 else if (strcmp (name, ".data") == 0)
1616 h->esym.asym.sc = scData;
1617 else if (strcmp (name, ".sdata") == 0)
1618 h->esym.asym.sc = scSData;
1619 else if (strcmp (name, ".rodata") == 0
1620 || strcmp (name, ".rdata") == 0)
1621 h->esym.asym.sc = scRData;
1622 else if (strcmp (name, ".bss") == 0)
1623 h->esym.asym.sc = scBss;
1624 else if (strcmp (name, ".sbss") == 0)
1625 h->esym.asym.sc = scSBss;
1626 else if (strcmp (name, ".init") == 0)
1627 h->esym.asym.sc = scInit;
1628 else if (strcmp (name, ".fini") == 0)
1629 h->esym.asym.sc = scFini;
1630 else
1631 h->esym.asym.sc = scAbs;
1632 }
1633 }
9e756d64 1634
a7519a3c
RH
1635 h->esym.asym.reserved = 0;
1636 h->esym.asym.index = indexNil;
1637 }
9e756d64 1638
a7519a3c
RH
1639 if (h->root.root.type == bfd_link_hash_common)
1640 h->esym.asym.value = h->root.root.u.c.size;
1641 else if (h->root.root.type == bfd_link_hash_defined
1642 || h->root.root.type == bfd_link_hash_defweak)
1643 {
1644 if (h->esym.asym.sc == scCommon)
1645 h->esym.asym.sc = scBss;
1646 else if (h->esym.asym.sc == scSCommon)
1647 h->esym.asym.sc = scSBss;
9e756d64 1648
a7519a3c
RH
1649 sec = h->root.root.u.def.section;
1650 output_section = sec->output_section;
1651 if (output_section != NULL)
1652 h->esym.asym.value = (h->root.root.u.def.value
1653 + sec->output_offset
1654 + output_section->vma);
1655 else
1656 h->esym.asym.value = 0;
1657 }
9e756d64 1658
a7519a3c
RH
1659 if (! bfd_ecoff_debug_one_external (einfo->abfd, einfo->debug, einfo->swap,
1660 h->root.root.root.string,
1661 &h->esym))
1662 {
1663 einfo->failed = TRUE;
1664 return FALSE;
9e756d64
RH
1665 }
1666
a7519a3c
RH
1667 return TRUE;
1668}
1669\f
1670/* Search for and possibly create a got entry. */
9e756d64 1671
a7519a3c
RH
1672static struct alpha_elf_got_entry *
1673get_got_entry (bfd *abfd, struct alpha_elf_link_hash_entry *h,
1674 unsigned long r_type, unsigned long r_symndx,
1675 bfd_vma r_addend)
1676{
1677 struct alpha_elf_got_entry *gotent;
1678 struct alpha_elf_got_entry **slot;
9e756d64 1679
a7519a3c
RH
1680 if (h)
1681 slot = &h->got_entries;
1682 else
1683 {
1684 /* This is a local .got entry -- record for merge. */
9e756d64 1685
a7519a3c 1686 struct alpha_elf_got_entry **local_got_entries;
9e756d64 1687
a7519a3c
RH
1688 local_got_entries = alpha_elf_tdata(abfd)->local_got_entries;
1689 if (!local_got_entries)
1690 {
1691 bfd_size_type size;
1692 Elf_Internal_Shdr *symtab_hdr;
9e756d64 1693
a7519a3c
RH
1694 symtab_hdr = &elf_tdata(abfd)->symtab_hdr;
1695 size = symtab_hdr->sh_info;
1696 size *= sizeof (struct alpha_elf_got_entry *);
9e756d64 1697
a7519a3c
RH
1698 local_got_entries
1699 = (struct alpha_elf_got_entry **) bfd_zalloc (abfd, size);
1700 if (!local_got_entries)
1701 return NULL;
1702
1703 alpha_elf_tdata (abfd)->local_got_entries = local_got_entries;
1704 }
1705
1706 slot = &local_got_entries[r_symndx];
9e756d64
RH
1707 }
1708
a7519a3c
RH
1709 for (gotent = *slot; gotent ; gotent = gotent->next)
1710 if (gotent->gotobj == abfd
1711 && gotent->reloc_type == r_type
1712 && gotent->addend == r_addend)
1713 break;
1714
1715 if (!gotent)
9e756d64 1716 {
a7519a3c 1717 int entry_size;
986f0783 1718 size_t amt;
9e756d64 1719
a7519a3c
RH
1720 amt = sizeof (struct alpha_elf_got_entry);
1721 gotent = (struct alpha_elf_got_entry *) bfd_alloc (abfd, amt);
1722 if (!gotent)
1723 return NULL;
9e756d64 1724
a7519a3c
RH
1725 gotent->gotobj = abfd;
1726 gotent->addend = r_addend;
1727 gotent->got_offset = -1;
6ec7057a 1728 gotent->plt_offset = -1;
a7519a3c
RH
1729 gotent->use_count = 1;
1730 gotent->reloc_type = r_type;
1731 gotent->reloc_done = 0;
1732 gotent->reloc_xlated = 0;
9e756d64 1733
a7519a3c
RH
1734 gotent->next = *slot;
1735 *slot = gotent;
9e756d64 1736
a7519a3c
RH
1737 entry_size = alpha_got_entry_size (r_type);
1738 alpha_elf_tdata (abfd)->total_got_size += entry_size;
1739 if (!h)
1740 alpha_elf_tdata(abfd)->local_got_size += entry_size;
9e756d64 1741 }
a7519a3c
RH
1742 else
1743 gotent->use_count += 1;
9e756d64 1744
a7519a3c 1745 return gotent;
9e756d64
RH
1746}
1747
6ec7057a
RH
1748static bfd_boolean
1749elf64_alpha_want_plt (struct alpha_elf_link_hash_entry *ah)
1750{
1751 return ((ah->root.type == STT_FUNC
1752 || ah->root.root.type == bfd_link_hash_undefweak
1753 || ah->root.root.type == bfd_link_hash_undefined)
8288a39e
RH
1754 && (ah->flags & ALPHA_ELF_LINK_HASH_LU_PLT) != 0
1755 && (ah->flags & ~ALPHA_ELF_LINK_HASH_LU_PLT) == 0);
6ec7057a
RH
1756}
1757
6fc5bb57
AM
1758/* Whether to sort relocs output by ld -r or ld --emit-relocs, by r_offset.
1759 Don't do so for code sections. We want to keep ordering of LITERAL/LITUSE
1760 as is. On the other hand, elf-eh-frame.c processing requires .eh_frame
1761 relocs to be sorted. */
1762
1763static bfd_boolean
1764elf64_alpha_sort_relocs_p (asection *sec)
1765{
1766 return (sec->flags & SEC_CODE) == 0;
1767}
1768
1769
a7519a3c
RH
1770/* Handle dynamic relocations when doing an Alpha ELF link. */
1771
b34976b6 1772static bfd_boolean
a7519a3c
RH
1773elf64_alpha_check_relocs (bfd *abfd, struct bfd_link_info *info,
1774 asection *sec, const Elf_Internal_Rela *relocs)
252b5132 1775{
a7519a3c
RH
1776 bfd *dynobj;
1777 asection *sreloc;
252b5132 1778 Elf_Internal_Shdr *symtab_hdr;
a7519a3c
RH
1779 struct alpha_elf_link_hash_entry **sym_hashes;
1780 const Elf_Internal_Rela *rel, *relend;
252b5132 1781
0e1862bb 1782 if (bfd_link_relocatable (info))
a7519a3c 1783 return TRUE;
252b5132 1784
a7519a3c
RH
1785 /* Don't do anything special with non-loaded, non-alloced sections.
1786 In particular, any relocs in such sections should not affect GOT
1787 and PLT reference counting (ie. we don't allow them to create GOT
1788 or PLT entries), there's no possibility or desire to optimize TLS
1789 relocs, and there's not much point in propagating relocs to shared
1790 libs that the dynamic linker won't relocate. */
1791 if ((sec->flags & SEC_ALLOC) == 0)
b34976b6 1792 return TRUE;
252b5132 1793
0ffa91dd
NC
1794 BFD_ASSERT (is_alpha_elf (abfd));
1795
1796 dynobj = elf_hash_table (info)->dynobj;
a7519a3c 1797 if (dynobj == NULL)
0ffa91dd 1798 elf_hash_table (info)->dynobj = dynobj = abfd;
252b5132 1799
a7519a3c 1800 sreloc = NULL;
0ffa91dd
NC
1801 symtab_hdr = &elf_symtab_hdr (abfd);
1802 sym_hashes = alpha_elf_sym_hashes (abfd);
a7519a3c
RH
1803
1804 relend = relocs + sec->reloc_count;
1805 for (rel = relocs; rel < relend; ++rel)
1806 {
1807 enum {
1808 NEED_GOT = 1,
1809 NEED_GOT_ENTRY = 2,
1810 NEED_DYNREL = 4
1811 };
1812
1813 unsigned long r_symndx, r_type;
1814 struct alpha_elf_link_hash_entry *h;
1815 unsigned int gotent_flags;
1816 bfd_boolean maybe_dynamic;
1817 unsigned int need;
1818 bfd_vma addend;
1819
1820 r_symndx = ELF64_R_SYM (rel->r_info);
1821 if (r_symndx < symtab_hdr->sh_info)
1822 h = NULL;
1823 else
1824 {
1825 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
252b5132 1826
a7519a3c
RH
1827 while (h->root.root.type == bfd_link_hash_indirect
1828 || h->root.root.type == bfd_link_hash_warning)
1829 h = (struct alpha_elf_link_hash_entry *)h->root.root.u.i.link;
252b5132 1830
81fbe831
AM
1831 /* PR15323, ref flags aren't set for references in the same
1832 object. */
a7519a3c
RH
1833 h->root.ref_regular = 1;
1834 }
252b5132 1835
a7519a3c 1836 /* We can only get preliminary data on whether a symbol is
07d6d2b8
AM
1837 locally or externally defined, as not all of the input files
1838 have yet been processed. Do something with what we know, as
1839 this may help reduce memory usage and processing time later. */
a7519a3c 1840 maybe_dynamic = FALSE;
0e1862bb 1841 if (h && ((bfd_link_pic (info)
a7519a3c
RH
1842 && (!info->symbolic
1843 || info->unresolved_syms_in_shared_libs == RM_IGNORE))
1844 || !h->root.def_regular
1845 || h->root.root.type == bfd_link_hash_defweak))
07d6d2b8 1846 maybe_dynamic = TRUE;
252b5132 1847
a7519a3c
RH
1848 need = 0;
1849 gotent_flags = 0;
1850 r_type = ELF64_R_TYPE (rel->r_info);
1851 addend = rel->r_addend;
9e756d64 1852
9e756d64
RH
1853 switch (r_type)
1854 {
1855 case R_ALPHA_LITERAL:
a7519a3c
RH
1856 need = NEED_GOT | NEED_GOT_ENTRY;
1857
1858 /* Remember how this literal is used from its LITUSEs.
1859 This will be important when it comes to decide if we can
1860 create a .plt entry for a function symbol. */
1861 while (++rel < relend && ELF64_R_TYPE (rel->r_info) == R_ALPHA_LITUSE)
8288a39e 1862 if (rel->r_addend >= 1 && rel->r_addend <= 6)
a7519a3c
RH
1863 gotent_flags |= 1 << rel->r_addend;
1864 --rel;
1865
1866 /* No LITUSEs -- presumably the address is used somehow. */
1867 if (gotent_flags == 0)
1868 gotent_flags = ALPHA_ELF_LINK_HASH_LU_ADDR;
1869 break;
1870
1871 case R_ALPHA_GPDISP:
1872 case R_ALPHA_GPREL16:
1873 case R_ALPHA_GPREL32:
9e756d64
RH
1874 case R_ALPHA_GPRELHIGH:
1875 case R_ALPHA_GPRELLOW:
a7519a3c
RH
1876 case R_ALPHA_BRSGP:
1877 need = NEED_GOT;
1878 break;
1879
1880 case R_ALPHA_REFLONG:
1881 case R_ALPHA_REFQUAD:
0e1862bb 1882 if (bfd_link_pic (info) || maybe_dynamic)
a7519a3c 1883 need = NEED_DYNREL;
cc03ec80
RH
1884 break;
1885
9e756d64 1886 case R_ALPHA_TLSLDM:
cc03ec80 1887 /* The symbol for a TLSLDM reloc is ignored. Collapse the
cf35638d
TS
1888 reloc to the STN_UNDEF (0) symbol so that they all match. */
1889 r_symndx = STN_UNDEF;
a7519a3c
RH
1890 h = 0;
1891 maybe_dynamic = FALSE;
1892 /* FALLTHRU */
1893
1894 case R_ALPHA_TLSGD:
1895 case R_ALPHA_GOTDTPREL:
1896 need = NEED_GOT | NEED_GOT_ENTRY;
9e756d64 1897 break;
cc03ec80 1898
a7519a3c
RH
1899 case R_ALPHA_GOTTPREL:
1900 need = NEED_GOT | NEED_GOT_ENTRY;
1901 gotent_flags = ALPHA_ELF_LINK_HASH_TLS_IE;
0e1862bb 1902 if (bfd_link_pic (info))
a7519a3c
RH
1903 info->flags |= DF_STATIC_TLS;
1904 break;
1905
1906 case R_ALPHA_TPREL64:
3cbc1e5e 1907 if (bfd_link_dll (info))
e366eeae
RH
1908 {
1909 info->flags |= DF_STATIC_TLS;
1910 need = NEED_DYNREL;
1911 }
1912 else if (maybe_dynamic)
a7519a3c 1913 need = NEED_DYNREL;
a7519a3c 1914 break;
252b5132
RH
1915 }
1916
a7519a3c 1917 if (need & NEED_GOT)
252b5132 1918 {
85d162e6 1919 if (alpha_elf_tdata(abfd)->gotobj == NULL)
6cdc0ccc 1920 {
a7519a3c
RH
1921 if (!elf64_alpha_create_got_section (abfd, info))
1922 return FALSE;
c328dc3f 1923 }
252b5132 1924 }
252b5132 1925
a7519a3c
RH
1926 if (need & NEED_GOT_ENTRY)
1927 {
1928 struct alpha_elf_got_entry *gotent;
252b5132 1929
a7519a3c
RH
1930 gotent = get_got_entry (abfd, h, r_type, r_symndx, addend);
1931 if (!gotent)
1932 return FALSE;
4a67a098 1933
a7519a3c 1934 if (gotent_flags)
cc03ec80 1935 {
a7519a3c
RH
1936 gotent->flags |= gotent_flags;
1937 if (h)
1938 {
1939 gotent_flags |= h->flags;
1940 h->flags = gotent_flags;
4a67a098 1941
a7519a3c 1942 /* Make a guess as to whether a .plt entry is needed. */
6ec7057a
RH
1943 /* ??? It appears that we won't make it into
1944 adjust_dynamic_symbol for symbols that remain
1945 totally undefined. Copying this check here means
1946 we can create a plt entry for them too. */
1947 h->root.needs_plt
1948 = (maybe_dynamic && elf64_alpha_want_plt (h));
1949 }
a7519a3c 1950 }
252b5132
RH
1951 }
1952
a7519a3c 1953 if (need & NEED_DYNREL)
9e756d64 1954 {
a7519a3c
RH
1955 /* We need to create the section here now whether we eventually
1956 use it or not so that it gets mapped to an output section by
83bac4b0 1957 the linker. If not used, we'll kill it in size_dynamic_sections. */
a7519a3c 1958 if (sreloc == NULL)
9e756d64 1959 {
83bac4b0
NC
1960 sreloc = _bfd_elf_make_dynamic_reloc_section
1961 (sec, dynobj, 3, abfd, /*rela?*/ TRUE);
1962
a7519a3c 1963 if (sreloc == NULL)
83bac4b0 1964 return FALSE;
9e756d64 1965 }
252b5132 1966
a7519a3c
RH
1967 if (h)
1968 {
1969 /* Since we havn't seen all of the input symbols yet, we
1970 don't know whether we'll actually need a dynamic relocation
1971 entry for this reloc. So make a record of it. Once we
1972 find out if this thing needs dynamic relocation we'll
1973 expand the relocation sections by the appropriate amount. */
9e756d64 1974
a7519a3c 1975 struct alpha_elf_reloc_entry *rent;
9e756d64 1976
a7519a3c
RH
1977 for (rent = h->reloc_entries; rent; rent = rent->next)
1978 if (rent->rtype == r_type && rent->srel == sreloc)
1979 break;
252b5132 1980
a7519a3c
RH
1981 if (!rent)
1982 {
986f0783 1983 size_t amt = sizeof (struct alpha_elf_reloc_entry);
a7519a3c
RH
1984 rent = (struct alpha_elf_reloc_entry *) bfd_alloc (abfd, amt);
1985 if (!rent)
1986 return FALSE;
252b5132 1987
a7519a3c 1988 rent->srel = sreloc;
1f7f2abb 1989 rent->sec = sec;
a7519a3c
RH
1990 rent->rtype = r_type;
1991 rent->count = 1;
252b5132 1992
a7519a3c
RH
1993 rent->next = h->reloc_entries;
1994 h->reloc_entries = rent;
1995 }
1996 else
1997 rent->count++;
1998 }
0e1862bb 1999 else if (bfd_link_pic (info))
a7519a3c
RH
2000 {
2001 /* If this is a shared library, and the section is to be
2002 loaded into memory, we need a RELATIVE reloc. */
2003 sreloc->size += sizeof (Elf64_External_Rela);
2004 if (sec->flags & SEC_READONLY)
1f7f2abb
L
2005 {
2006 info->flags |= DF_TEXTREL;
2007 info->callbacks->minfo
2008 (_("%pB: dynamic relocation against `%pT' in "
2009 "read-only section `%pA'\n"),
2010 sec->owner, h->root.root.root.string, sec);
2011 }
a7519a3c 2012 }
252b5132
RH
2013 }
2014 }
2015
b34976b6 2016 return TRUE;
252b5132 2017}
252b5132 2018
e117360e
RH
2019/* Return the section that should be marked against GC for a given
2020 relocation. */
2021
2022static asection *
2023elf64_alpha_gc_mark_hook (asection *sec, struct bfd_link_info *info,
2024 Elf_Internal_Rela *rel,
2025 struct elf_link_hash_entry *h, Elf_Internal_Sym *sym)
2026{
2027 /* These relocations don't really reference a symbol. Instead we store
2028 extra data in their addend slot. Ignore the symbol. */
2029 switch (ELF64_R_TYPE (rel->r_info))
2030 {
2031 case R_ALPHA_LITUSE:
2032 case R_ALPHA_GPDISP:
2033 case R_ALPHA_HINT:
2034 return NULL;
2035 }
2036
2037 return _bfd_elf_gc_mark_hook (sec, info, rel, h, sym);
2038}
2039
a7519a3c
RH
2040/* Adjust a symbol defined by a dynamic object and referenced by a
2041 regular object. The current definition is in some section of the
2042 dynamic object, but we're not including those sections. We have to
2043 change the definition to something the rest of the link can
2044 understand. */
252b5132 2045
b34976b6 2046static bfd_boolean
a7519a3c
RH
2047elf64_alpha_adjust_dynamic_symbol (struct bfd_link_info *info,
2048 struct elf_link_hash_entry *h)
252b5132 2049{
a7519a3c
RH
2050 bfd *dynobj;
2051 asection *s;
2052 struct alpha_elf_link_hash_entry *ah;
252b5132 2053
a7519a3c
RH
2054 dynobj = elf_hash_table(info)->dynobj;
2055 ah = (struct alpha_elf_link_hash_entry *)h;
252b5132 2056
a7519a3c 2057 /* Now that we've seen all of the input symbols, finalize our decision
6ec7057a
RH
2058 about whether this symbol should get a .plt entry. Irritatingly, it
2059 is common for folk to leave undefined symbols in shared libraries,
2060 and they still expect lazy binding; accept undefined symbols in lieu
2061 of STT_FUNC. */
2062 if (alpha_elf_dynamic_symbol_p (h, info) && elf64_alpha_want_plt (ah))
252b5132 2063 {
6ec7057a 2064 h->needs_plt = TRUE;
252b5132 2065
ce558b89 2066 s = elf_hash_table(info)->splt;
a7519a3c
RH
2067 if (!s && !elf64_alpha_create_dynamic_sections (dynobj, info))
2068 return FALSE;
204692d7 2069
6ec7057a
RH
2070 /* We need one plt entry per got subsection. Delay allocation of
2071 the actual plt entries until size_plt_section, called from
2072 size_dynamic_sections or during relaxation. */
252b5132 2073
a7519a3c
RH
2074 return TRUE;
2075 }
2076 else
6ec7057a 2077 h->needs_plt = FALSE;
252b5132 2078
a7519a3c
RH
2079 /* If this is a weak symbol, and there is a real definition, the
2080 processor independent code will have arranged for us to see the
2081 real definition first, and we can just use the same value. */
60d67dc8 2082 if (h->is_weakalias)
252b5132 2083 {
60d67dc8
AM
2084 struct elf_link_hash_entry *def = weakdef (h);
2085 BFD_ASSERT (def->root.type == bfd_link_hash_defined);
2086 h->root.u.def.section = def->root.u.def.section;
2087 h->root.u.def.value = def->root.u.def.value;
a7519a3c 2088 return TRUE;
252b5132 2089 }
a7519a3c
RH
2090
2091 /* This is a reference to a symbol defined by a dynamic object which
2092 is not a function. The Alpha, since it uses .got entries for all
2093 symbols even in regular objects, does not need the hackery of a
2094 .dynbss section and COPY dynamic relocations. */
252b5132 2095
b34976b6 2096 return TRUE;
252b5132
RH
2097}
2098
747ffa7b
AM
2099/* Record STO_ALPHA_NOPV and STO_ALPHA_STD_GPLOAD. */
2100
2101static void
2102elf64_alpha_merge_symbol_attribute (struct elf_link_hash_entry *h,
2103 const Elf_Internal_Sym *isym,
2104 bfd_boolean definition,
2105 bfd_boolean dynamic)
2106{
2107 if (!dynamic && definition)
2108 h->other = ((h->other & ELF_ST_VISIBILITY (-1))
2109 | (isym->st_other & ~ELF_ST_VISIBILITY (-1)));
2110}
2111
a7519a3c
RH
2112/* Symbol versioning can create new symbols, and make our old symbols
2113 indirect to the new ones. Consolidate the got and reloc information
2114 in these situations. */
252b5132 2115
48f4b4f5
RH
2116static void
2117elf64_alpha_copy_indirect_symbol (struct bfd_link_info *info,
2118 struct elf_link_hash_entry *dir,
2119 struct elf_link_hash_entry *ind)
252b5132 2120{
48f4b4f5
RH
2121 struct alpha_elf_link_hash_entry *hi
2122 = (struct alpha_elf_link_hash_entry *) ind;
2123 struct alpha_elf_link_hash_entry *hs
2124 = (struct alpha_elf_link_hash_entry *) dir;
252b5132 2125
48f4b4f5
RH
2126 /* Do the merging in the superclass. */
2127 _bfd_elf_link_hash_copy_indirect(info, dir, ind);
252b5132 2128
a7519a3c 2129 /* Merge the flags. Whee. */
a7519a3c
RH
2130 hs->flags |= hi->flags;
2131
48f4b4f5
RH
2132 /* ??? It's unclear to me what's really supposed to happen when
2133 "merging" defweak and defined symbols, given that we don't
2134 actually throw away the defweak. This more-or-less copies
2135 the logic related to got and plt entries in the superclass. */
2136 if (ind->root.type != bfd_link_hash_indirect)
2137 return;
2138
a7519a3c
RH
2139 /* Merge the .got entries. Cannibalize the old symbol's list in
2140 doing so, since we don't need it anymore. */
2141
2142 if (hs->got_entries == NULL)
2143 hs->got_entries = hi->got_entries;
2144 else
2145 {
2146 struct alpha_elf_got_entry *gi, *gs, *gin, *gsh;
2147
2148 gsh = hs->got_entries;
2149 for (gi = hi->got_entries; gi ; gi = gin)
252b5132 2150 {
a7519a3c
RH
2151 gin = gi->next;
2152 for (gs = gsh; gs ; gs = gs->next)
2153 if (gi->gotobj == gs->gotobj
2154 && gi->reloc_type == gs->reloc_type
2155 && gi->addend == gs->addend)
2156 {
68994ca2 2157 gs->use_count += gi->use_count;
07d6d2b8 2158 goto got_found;
a7519a3c
RH
2159 }
2160 gi->next = hs->got_entries;
2161 hs->got_entries = gi;
2162 got_found:;
252b5132 2163 }
a7519a3c
RH
2164 }
2165 hi->got_entries = NULL;
252b5132 2166
a7519a3c
RH
2167 /* And similar for the reloc entries. */
2168
2169 if (hs->reloc_entries == NULL)
2170 hs->reloc_entries = hi->reloc_entries;
2171 else
2172 {
2173 struct alpha_elf_reloc_entry *ri, *rs, *rin, *rsh;
2174
2175 rsh = hs->reloc_entries;
2176 for (ri = hi->reloc_entries; ri ; ri = rin)
2177 {
2178 rin = ri->next;
2179 for (rs = rsh; rs ; rs = rs->next)
2180 if (ri->rtype == rs->rtype && ri->srel == rs->srel)
2181 {
2182 rs->count += ri->count;
2183 goto found_reloc;
2184 }
2185 ri->next = hs->reloc_entries;
2186 hs->reloc_entries = ri;
2187 found_reloc:;
2188 }
252b5132 2189 }
a7519a3c 2190 hi->reloc_entries = NULL;
252b5132
RH
2191}
2192
a7519a3c 2193/* Is it possible to merge two object file's .got tables? */
252b5132 2194
b34976b6 2195static bfd_boolean
a7519a3c 2196elf64_alpha_can_merge_gots (bfd *a, bfd *b)
252b5132 2197{
a7519a3c
RH
2198 int total = alpha_elf_tdata (a)->total_got_size;
2199 bfd *bsub;
252b5132 2200
a7519a3c
RH
2201 /* Trivial quick fallout test. */
2202 if (total + alpha_elf_tdata (b)->total_got_size <= MAX_GOT_SIZE)
2203 return TRUE;
252b5132 2204
a7519a3c
RH
2205 /* By their nature, local .got entries cannot be merged. */
2206 if ((total += alpha_elf_tdata (b)->local_got_size) > MAX_GOT_SIZE)
b34976b6 2207 return FALSE;
252b5132 2208
a7519a3c
RH
2209 /* Failing the common trivial comparison, we must effectively
2210 perform the merge. Not actually performing the merge means that
2211 we don't have to store undo information in case we fail. */
2212 for (bsub = b; bsub ; bsub = alpha_elf_tdata (bsub)->in_got_link_next)
2213 {
2214 struct alpha_elf_link_hash_entry **hashes = alpha_elf_sym_hashes (bsub);
2215 Elf_Internal_Shdr *symtab_hdr = &elf_tdata (bsub)->symtab_hdr;
2216 int i, n;
2217
2218 n = NUM_SHDR_ENTRIES (symtab_hdr) - symtab_hdr->sh_info;
2219 for (i = 0; i < n; ++i)
2220 {
2221 struct alpha_elf_got_entry *ae, *be;
2222 struct alpha_elf_link_hash_entry *h;
2223
2224 h = hashes[i];
2225 while (h->root.root.type == bfd_link_hash_indirect
07d6d2b8 2226 || h->root.root.type == bfd_link_hash_warning)
a7519a3c
RH
2227 h = (struct alpha_elf_link_hash_entry *)h->root.root.u.i.link;
2228
2229 for (be = h->got_entries; be ; be = be->next)
2230 {
2231 if (be->use_count == 0)
07d6d2b8 2232 continue;
a7519a3c 2233 if (be->gotobj != b)
07d6d2b8 2234 continue;
a7519a3c
RH
2235
2236 for (ae = h->got_entries; ae ; ae = ae->next)
07d6d2b8 2237 if (ae->gotobj == a
a7519a3c
RH
2238 && ae->reloc_type == be->reloc_type
2239 && ae->addend == be->addend)
2240 goto global_found;
2241
2242 total += alpha_got_entry_size (be->reloc_type);
2243 if (total > MAX_GOT_SIZE)
07d6d2b8 2244 return FALSE;
a7519a3c
RH
2245 global_found:;
2246 }
2247 }
2248 }
252b5132 2249
b34976b6 2250 return TRUE;
252b5132
RH
2251}
2252
a7519a3c 2253/* Actually merge two .got tables. */
252b5132 2254
a7519a3c
RH
2255static void
2256elf64_alpha_merge_gots (bfd *a, bfd *b)
252b5132 2257{
a7519a3c
RH
2258 int total = alpha_elf_tdata (a)->total_got_size;
2259 bfd *bsub;
252b5132 2260
a7519a3c
RH
2261 /* Remember local expansion. */
2262 {
2263 int e = alpha_elf_tdata (b)->local_got_size;
2264 total += e;
2265 alpha_elf_tdata (a)->local_got_size += e;
2266 }
252b5132 2267
a7519a3c
RH
2268 for (bsub = b; bsub ; bsub = alpha_elf_tdata (bsub)->in_got_link_next)
2269 {
2270 struct alpha_elf_got_entry **local_got_entries;
2271 struct alpha_elf_link_hash_entry **hashes;
2272 Elf_Internal_Shdr *symtab_hdr;
2273 int i, n;
252b5132 2274
a7519a3c
RH
2275 /* Let the local .got entries know they are part of a new subsegment. */
2276 local_got_entries = alpha_elf_tdata (bsub)->local_got_entries;
2277 if (local_got_entries)
07d6d2b8 2278 {
a7519a3c
RH
2279 n = elf_tdata (bsub)->symtab_hdr.sh_info;
2280 for (i = 0; i < n; ++i)
2281 {
2282 struct alpha_elf_got_entry *ent;
2283 for (ent = local_got_entries[i]; ent; ent = ent->next)
07d6d2b8 2284 ent->gotobj = a;
a7519a3c 2285 }
07d6d2b8 2286 }
252b5132 2287
a7519a3c
RH
2288 /* Merge the global .got entries. */
2289 hashes = alpha_elf_sym_hashes (bsub);
2290 symtab_hdr = &elf_tdata (bsub)->symtab_hdr;
252b5132 2291
a7519a3c
RH
2292 n = NUM_SHDR_ENTRIES (symtab_hdr) - symtab_hdr->sh_info;
2293 for (i = 0; i < n; ++i)
07d6d2b8 2294 {
a7519a3c
RH
2295 struct alpha_elf_got_entry *ae, *be, **pbe, **start;
2296 struct alpha_elf_link_hash_entry *h;
252b5132 2297
a7519a3c
RH
2298 h = hashes[i];
2299 while (h->root.root.type == bfd_link_hash_indirect
07d6d2b8 2300 || h->root.root.type == bfd_link_hash_warning)
a7519a3c 2301 h = (struct alpha_elf_link_hash_entry *)h->root.root.u.i.link;
252b5132 2302
a7519a3c
RH
2303 pbe = start = &h->got_entries;
2304 while ((be = *pbe) != NULL)
2305 {
2306 if (be->use_count == 0)
07d6d2b8 2307 {
a7519a3c
RH
2308 *pbe = be->next;
2309 memset (be, 0xa5, sizeof (*be));
2310 goto kill;
07d6d2b8 2311 }
a7519a3c 2312 if (be->gotobj != b)
07d6d2b8 2313 goto next;
a7519a3c
RH
2314
2315 for (ae = *start; ae ; ae = ae->next)
07d6d2b8 2316 if (ae->gotobj == a
a7519a3c
RH
2317 && ae->reloc_type == be->reloc_type
2318 && ae->addend == be->addend)
2319 {
2320 ae->flags |= be->flags;
2321 ae->use_count += be->use_count;
2322 *pbe = be->next;
2323 memset (be, 0xa5, sizeof (*be));
2324 goto kill;
2325 }
2326 be->gotobj = a;
2327 total += alpha_got_entry_size (be->reloc_type);
252b5132 2328
a7519a3c
RH
2329 next:;
2330 pbe = &be->next;
2331 kill:;
2332 }
07d6d2b8 2333 }
252b5132 2334
a7519a3c
RH
2335 alpha_elf_tdata (bsub)->gotobj = a;
2336 }
2337 alpha_elf_tdata (a)->total_got_size = total;
252b5132 2338
a7519a3c
RH
2339 /* Merge the two in_got chains. */
2340 {
2341 bfd *next;
252b5132 2342
a7519a3c
RH
2343 bsub = a;
2344 while ((next = alpha_elf_tdata (bsub)->in_got_link_next) != NULL)
2345 bsub = next;
252b5132 2346
a7519a3c
RH
2347 alpha_elf_tdata (bsub)->in_got_link_next = b;
2348 }
252b5132 2349}
a7519a3c
RH
2350
2351/* Calculate the offsets for the got entries. */
252b5132 2352
b34976b6 2353static bfd_boolean
a7519a3c 2354elf64_alpha_calc_got_offsets_for_symbol (struct alpha_elf_link_hash_entry *h,
2c3fc389 2355 void * arg ATTRIBUTE_UNUSED)
252b5132 2356{
a7519a3c 2357 struct alpha_elf_got_entry *gotent;
252b5132 2358
a7519a3c
RH
2359 for (gotent = h->got_entries; gotent; gotent = gotent->next)
2360 if (gotent->use_count > 0)
2361 {
2362 struct alpha_elf_obj_tdata *td;
2363 bfd_size_type *plge;
252b5132 2364
a7519a3c 2365 td = alpha_elf_tdata (gotent->gotobj);
a7519a3c
RH
2366 plge = &td->got->size;
2367 gotent->got_offset = *plge;
2368 *plge += alpha_got_entry_size (gotent->reloc_type);
2369 }
252b5132 2370
6ec7057a 2371 return TRUE;
a7519a3c 2372}
252b5132 2373
a7519a3c
RH
2374static void
2375elf64_alpha_calc_got_offsets (struct bfd_link_info *info)
2376{
4dfe6ac6
NC
2377 bfd *i, *got_list;
2378 struct alpha_elf_link_hash_table * htab;
2379
2380 htab = alpha_elf_hash_table (info);
2381 if (htab == NULL)
2382 return;
2383 got_list = htab->got_list;
252b5132 2384
a7519a3c
RH
2385 /* First, zero out the .got sizes, as we may be recalculating the
2386 .got after optimizing it. */
2387 for (i = got_list; i ; i = alpha_elf_tdata(i)->got_link_next)
2388 alpha_elf_tdata(i)->got->size = 0;
252b5132 2389
a7519a3c 2390 /* Next, fill in the offsets for all the global entries. */
4dfe6ac6 2391 alpha_elf_link_hash_traverse (htab,
a7519a3c
RH
2392 elf64_alpha_calc_got_offsets_for_symbol,
2393 NULL);
252b5132 2394
a7519a3c
RH
2395 /* Finally, fill in the offsets for the local entries. */
2396 for (i = got_list; i ; i = alpha_elf_tdata(i)->got_link_next)
2397 {
2398 bfd_size_type got_offset = alpha_elf_tdata(i)->got->size;
2399 bfd *j;
252b5132 2400
a7519a3c
RH
2401 for (j = i; j ; j = alpha_elf_tdata(j)->in_got_link_next)
2402 {
2403 struct alpha_elf_got_entry **local_got_entries, *gotent;
2404 int k, n;
252b5132 2405
a7519a3c
RH
2406 local_got_entries = alpha_elf_tdata(j)->local_got_entries;
2407 if (!local_got_entries)
2408 continue;
252b5132 2409
a7519a3c
RH
2410 for (k = 0, n = elf_tdata(j)->symtab_hdr.sh_info; k < n; ++k)
2411 for (gotent = local_got_entries[k]; gotent; gotent = gotent->next)
2412 if (gotent->use_count > 0)
07d6d2b8 2413 {
a7519a3c
RH
2414 gotent->got_offset = got_offset;
2415 got_offset += alpha_got_entry_size (gotent->reloc_type);
07d6d2b8 2416 }
a7519a3c 2417 }
252b5132 2418
a7519a3c
RH
2419 alpha_elf_tdata(i)->got->size = got_offset;
2420 }
2421}
252b5132 2422
a7519a3c 2423/* Constructs the gots. */
252b5132 2424
b34976b6 2425static bfd_boolean
d1c109de 2426elf64_alpha_size_got_sections (struct bfd_link_info *info,
07d6d2b8 2427 bfd_boolean may_merge)
252b5132 2428{
a7519a3c 2429 bfd *i, *got_list, *cur_got_obj = NULL;
4dfe6ac6 2430 struct alpha_elf_link_hash_table * htab;
252b5132 2431
4dfe6ac6
NC
2432 htab = alpha_elf_hash_table (info);
2433 if (htab == NULL)
2434 return FALSE;
2435 got_list = htab->got_list;
95404643 2436
a7519a3c
RH
2437 /* On the first time through, pretend we have an existing got list
2438 consisting of all of the input files. */
2439 if (got_list == NULL)
252b5132 2440 {
c72f2fb2 2441 for (i = info->input_bfds; i ; i = i->link.next)
252b5132 2442 {
0ffa91dd
NC
2443 bfd *this_got;
2444
2445 if (! is_alpha_elf (i))
2446 continue;
2447
2448 this_got = alpha_elf_tdata (i)->gotobj;
a7519a3c
RH
2449 if (this_got == NULL)
2450 continue;
252b5132 2451
a7519a3c
RH
2452 /* We are assuming no merging has yet occurred. */
2453 BFD_ASSERT (this_got == i);
252b5132 2454
07d6d2b8 2455 if (alpha_elf_tdata (this_got)->total_got_size > MAX_GOT_SIZE)
252b5132 2456 {
a7519a3c 2457 /* Yikes! A single object file has too many entries. */
4eca0228 2458 _bfd_error_handler
695344c0 2459 /* xgettext:c-format */
871b3ab2 2460 (_("%pB: .got subsegment exceeds 64K (size %d)"),
07d6d2b8 2461 i, alpha_elf_tdata (this_got)->total_got_size);
b34976b6 2462 return FALSE;
252b5132 2463 }
252b5132 2464
a7519a3c
RH
2465 if (got_list == NULL)
2466 got_list = this_got;
2467 else
2468 alpha_elf_tdata(cur_got_obj)->got_link_next = this_got;
2469 cur_got_obj = this_got;
252b5132
RH
2470 }
2471
a7519a3c
RH
2472 /* Strange degenerate case of no got references. */
2473 if (got_list == NULL)
2474 return TRUE;
2475
4dfe6ac6 2476 htab->got_list = got_list;
a7519a3c
RH
2477 }
2478
2479 cur_got_obj = got_list;
0ffa91dd
NC
2480 if (cur_got_obj == NULL)
2481 return FALSE;
2482
d1c109de 2483 if (may_merge)
a7519a3c 2484 {
d1c109de
RH
2485 i = alpha_elf_tdata(cur_got_obj)->got_link_next;
2486 while (i != NULL)
252b5132 2487 {
d1c109de
RH
2488 if (elf64_alpha_can_merge_gots (cur_got_obj, i))
2489 {
2490 elf64_alpha_merge_gots (cur_got_obj, i);
252b5132 2491
d1c109de
RH
2492 alpha_elf_tdata(i)->got->size = 0;
2493 i = alpha_elf_tdata(i)->got_link_next;
2494 alpha_elf_tdata(cur_got_obj)->got_link_next = i;
2495 }
2496 else
2497 {
2498 cur_got_obj = i;
2499 i = alpha_elf_tdata(i)->got_link_next;
2500 }
a7519a3c 2501 }
252b5132
RH
2502 }
2503
a7519a3c
RH
2504 /* Once the gots have been merged, fill in the got offsets for
2505 everything therein. */
4a828aab 2506 elf64_alpha_calc_got_offsets (info);
252b5132 2507
a7519a3c 2508 return TRUE;
252b5132 2509}
252b5132 2510
b34976b6 2511static bfd_boolean
2c3fc389
NC
2512elf64_alpha_size_plt_section_1 (struct alpha_elf_link_hash_entry *h,
2513 void * data)
252b5132 2514{
a7519a3c
RH
2515 asection *splt = (asection *) data;
2516 struct alpha_elf_got_entry *gotent;
6ec7057a 2517 bfd_boolean saw_one = FALSE;
252b5132 2518
a7519a3c
RH
2519 /* If we didn't need an entry before, we still don't. */
2520 if (!h->root.needs_plt)
2521 return TRUE;
e92d460e 2522
6ec7057a 2523 /* For each LITERAL got entry still in use, allocate a plt entry. */
a7519a3c
RH
2524 for (gotent = h->got_entries; gotent ; gotent = gotent->next)
2525 if (gotent->reloc_type == R_ALPHA_LITERAL
2526 && gotent->use_count > 0)
6ec7057a
RH
2527 {
2528 if (splt->size == 0)
2529 splt->size = PLT_HEADER_SIZE;
2530 gotent->plt_offset = splt->size;
2531 splt->size += PLT_ENTRY_SIZE;
2532 saw_one = TRUE;
2533 }
a7519a3c 2534
6ec7057a
RH
2535 /* If there weren't any, there's no longer a need for the PLT entry. */
2536 if (!saw_one)
2537 h->root.needs_plt = FALSE;
a7519a3c
RH
2538
2539 return TRUE;
2540}
2541
4a828aab
RH
2542/* Called from relax_section to rebuild the PLT in light of potential changes
2543 in the function's status. */
a7519a3c 2544
4a828aab 2545static void
a7519a3c
RH
2546elf64_alpha_size_plt_section (struct bfd_link_info *info)
2547{
6ec7057a 2548 asection *splt, *spltrel, *sgotplt;
a7519a3c 2549 unsigned long entries;
4dfe6ac6
NC
2550 struct alpha_elf_link_hash_table * htab;
2551
2552 htab = alpha_elf_hash_table (info);
2553 if (htab == NULL)
2554 return;
a7519a3c 2555
ce558b89 2556 splt = elf_hash_table(info)->splt;
a7519a3c 2557 if (splt == NULL)
4a828aab 2558 return;
252b5132 2559
a7519a3c 2560 splt->size = 0;
252b5132 2561
4dfe6ac6 2562 alpha_elf_link_hash_traverse (htab,
a7519a3c 2563 elf64_alpha_size_plt_section_1, splt);
e92d460e 2564
a7519a3c 2565 /* Every plt entry requires a JMP_SLOT relocation. */
ce558b89 2566 spltrel = elf_hash_table(info)->srelplt;
4a828aab 2567 entries = 0;
a7519a3c 2568 if (splt->size)
6ec7057a
RH
2569 {
2570 if (elf64_alpha_use_secureplt)
2571 entries = (splt->size - NEW_PLT_HEADER_SIZE) / NEW_PLT_ENTRY_SIZE;
2572 else
2573 entries = (splt->size - OLD_PLT_HEADER_SIZE) / OLD_PLT_ENTRY_SIZE;
2574 }
a7519a3c 2575 spltrel->size = entries * sizeof (Elf64_External_Rela);
e92d460e 2576
6ec7057a
RH
2577 /* When using the secureplt, we need two words somewhere in the data
2578 segment for the dynamic linker to tell us where to go. This is the
2579 entire contents of the .got.plt section. */
2580 if (elf64_alpha_use_secureplt)
2581 {
ce558b89 2582 sgotplt = elf_hash_table(info)->sgotplt;
6ec7057a
RH
2583 sgotplt->size = entries ? 16 : 0;
2584 }
a7519a3c 2585}
e92d460e 2586
a7519a3c
RH
2587static bfd_boolean
2588elf64_alpha_always_size_sections (bfd *output_bfd ATTRIBUTE_UNUSED,
2589 struct bfd_link_info *info)
2590{
2591 bfd *i;
4dfe6ac6 2592 struct alpha_elf_link_hash_table * htab;
252b5132 2593
0e1862bb 2594 if (bfd_link_relocatable (info))
a7519a3c 2595 return TRUE;
252b5132 2596
4dfe6ac6
NC
2597 htab = alpha_elf_hash_table (info);
2598 if (htab == NULL)
2599 return FALSE;
2600
d1c109de 2601 if (!elf64_alpha_size_got_sections (info, TRUE))
a7519a3c 2602 return FALSE;
252b5132 2603
a7519a3c 2604 /* Allocate space for all of the .got subsections. */
4dfe6ac6 2605 i = htab->got_list;
a7519a3c 2606 for ( ; i ; i = alpha_elf_tdata(i)->got_link_next)
252b5132 2607 {
a7519a3c
RH
2608 asection *s = alpha_elf_tdata(i)->got;
2609 if (s->size > 0)
2610 {
2611 s->contents = (bfd_byte *) bfd_zalloc (i, s->size);
2612 if (s->contents == NULL)
2613 return FALSE;
2614 }
252b5132
RH
2615 }
2616
b34976b6 2617 return TRUE;
252b5132 2618}
3765b1be 2619
a7519a3c 2620/* The number of dynamic relocations required by a static relocation. */
3765b1be 2621
a7519a3c 2622static int
e366eeae 2623alpha_dynamic_entries_for_reloc (int r_type, int dynamic, int shared, int pie)
a7519a3c
RH
2624{
2625 switch (r_type)
3765b1be 2626 {
a7519a3c
RH
2627 /* May appear in GOT entries. */
2628 case R_ALPHA_TLSGD:
2629 return (dynamic ? 2 : shared ? 1 : 0);
2630 case R_ALPHA_TLSLDM:
2631 return shared;
2632 case R_ALPHA_LITERAL:
a7519a3c 2633 return dynamic || shared;
e366eeae
RH
2634 case R_ALPHA_GOTTPREL:
2635 return dynamic || (shared && !pie);
a7519a3c
RH
2636 case R_ALPHA_GOTDTPREL:
2637 return dynamic;
3765b1be 2638
a7519a3c
RH
2639 /* May appear in data sections. */
2640 case R_ALPHA_REFLONG:
2641 case R_ALPHA_REFQUAD:
a7519a3c 2642 return dynamic || shared;
e366eeae
RH
2643 case R_ALPHA_TPREL64:
2644 return dynamic || (shared && !pie);
3765b1be 2645
a7519a3c
RH
2646 /* Everything else is illegal. We'll issue an error during
2647 relocate_section. */
2648 default:
2649 return 0;
2650 }
2651}
3765b1be 2652
a7519a3c 2653/* Work out the sizes of the dynamic relocation entries. */
3765b1be 2654
a7519a3c
RH
2655static bfd_boolean
2656elf64_alpha_calc_dynrel_sizes (struct alpha_elf_link_hash_entry *h,
2657 struct bfd_link_info *info)
2658{
2659 bfd_boolean dynamic;
2660 struct alpha_elf_reloc_entry *relent;
2661 unsigned long entries;
3765b1be 2662
a7519a3c
RH
2663 /* If the symbol was defined as a common symbol in a regular object
2664 file, and there was no definition in any dynamic object, then the
2665 linker will have allocated space for the symbol in a common
2666 section but the ELF_LINK_HASH_DEF_REGULAR flag will not have been
2667 set. This is done for dynamic symbols in
2668 elf_adjust_dynamic_symbol but this is not done for non-dynamic
2669 symbols, somehow. */
2670 if (!h->root.def_regular
2671 && h->root.ref_regular
2672 && !h->root.def_dynamic
2673 && (h->root.root.type == bfd_link_hash_defined
2674 || h->root.root.type == bfd_link_hash_defweak)
2675 && !(h->root.root.u.def.section->owner->flags & DYNAMIC))
2676 h->root.def_regular = 1;
3765b1be 2677
a7519a3c
RH
2678 /* If the symbol is dynamic, we'll need all the relocations in their
2679 natural form. If this is a shared object, and it has been forced
2680 local, we'll need the same number of RELATIVE relocations. */
2681 dynamic = alpha_elf_dynamic_symbol_p (&h->root, info);
3765b1be 2682
a7519a3c
RH
2683 /* If the symbol is a hidden undefined weak, then we never have any
2684 relocations. Avoid the loop which may want to add RELATIVE relocs
0e1862bb 2685 based on bfd_link_pic (info). */
a7519a3c
RH
2686 if (h->root.root.type == bfd_link_hash_undefweak && !dynamic)
2687 return TRUE;
2688
2689 for (relent = h->reloc_entries; relent; relent = relent->next)
3765b1be 2690 {
a7519a3c 2691 entries = alpha_dynamic_entries_for_reloc (relent->rtype, dynamic,
3cbc1e5e
AM
2692 bfd_link_pic (info),
2693 bfd_link_pie (info));
a7519a3c
RH
2694 if (entries)
2695 {
1f7f2abb 2696 asection *sec = relent->sec;
a7519a3c
RH
2697 relent->srel->size +=
2698 entries * sizeof (Elf64_External_Rela) * relent->count;
1f7f2abb
L
2699 if ((sec->flags & SEC_READONLY) != 0)
2700 {
2701 info->flags |= DT_TEXTREL;
2702 info->callbacks->minfo
2703 (_("%pB: dynamic relocation against `%pT' in "
2704 "read-only section `%pA'\n"),
2705 sec->owner, h->root.root.root.string, sec);
2706 }
a7519a3c
RH
2707 }
2708 }
3765b1be 2709
a7519a3c
RH
2710 return TRUE;
2711}
3765b1be 2712
a7519a3c
RH
2713/* Subroutine of elf64_alpha_size_rela_got_section for doing the
2714 global symbols. */
3765b1be 2715
a7519a3c
RH
2716static bfd_boolean
2717elf64_alpha_size_rela_got_1 (struct alpha_elf_link_hash_entry *h,
2718 struct bfd_link_info *info)
2719{
2720 bfd_boolean dynamic;
2721 struct alpha_elf_got_entry *gotent;
2722 unsigned long entries;
3765b1be 2723
6ec7057a
RH
2724 /* If we're using a plt for this symbol, then all of its relocations
2725 for its got entries go into .rela.plt. */
2726 if (h->root.needs_plt)
2727 return TRUE;
2728
a7519a3c
RH
2729 /* If the symbol is dynamic, we'll need all the relocations in their
2730 natural form. If this is a shared object, and it has been forced
2731 local, we'll need the same number of RELATIVE relocations. */
2732 dynamic = alpha_elf_dynamic_symbol_p (&h->root, info);
2733
2734 /* If the symbol is a hidden undefined weak, then we never have any
2735 relocations. Avoid the loop which may want to add RELATIVE relocs
0e1862bb 2736 based on bfd_link_pic (info). */
a7519a3c
RH
2737 if (h->root.root.type == bfd_link_hash_undefweak && !dynamic)
2738 return TRUE;
2739
2740 entries = 0;
2741 for (gotent = h->got_entries; gotent ; gotent = gotent->next)
2742 if (gotent->use_count > 0)
e366eeae 2743 entries += alpha_dynamic_entries_for_reloc (gotent->reloc_type, dynamic,
0e1862bb
L
2744 bfd_link_pic (info),
2745 bfd_link_pie (info));
a7519a3c 2746
a7519a3c
RH
2747 if (entries > 0)
2748 {
ce558b89 2749 asection *srel = elf_hash_table(info)->srelgot;
a7519a3c
RH
2750 BFD_ASSERT (srel != NULL);
2751 srel->size += sizeof (Elf64_External_Rela) * entries;
3765b1be 2752 }
3765b1be 2753
a7519a3c 2754 return TRUE;
3765b1be
RH
2755}
2756
a7519a3c 2757/* Set the sizes of the dynamic relocation sections. */
252b5132 2758
4a828aab 2759static void
a7519a3c 2760elf64_alpha_size_rela_got_section (struct bfd_link_info *info)
252b5132 2761{
a7519a3c 2762 unsigned long entries;
ce558b89 2763 bfd *i;
a7519a3c 2764 asection *srel;
4dfe6ac6
NC
2765 struct alpha_elf_link_hash_table * htab;
2766
2767 htab = alpha_elf_hash_table (info);
2768 if (htab == NULL)
2769 return;
252b5132 2770
a7519a3c
RH
2771 /* Shared libraries often require RELATIVE relocs, and some relocs
2772 require attention for the main application as well. */
252b5132 2773
a7519a3c 2774 entries = 0;
4dfe6ac6 2775 for (i = htab->got_list;
a7519a3c
RH
2776 i ; i = alpha_elf_tdata(i)->got_link_next)
2777 {
2778 bfd *j;
3241278a 2779
a7519a3c
RH
2780 for (j = i; j ; j = alpha_elf_tdata(j)->in_got_link_next)
2781 {
2782 struct alpha_elf_got_entry **local_got_entries, *gotent;
2783 int k, n;
252b5132 2784
a7519a3c
RH
2785 local_got_entries = alpha_elf_tdata(j)->local_got_entries;
2786 if (!local_got_entries)
2787 continue;
252b5132 2788
a7519a3c
RH
2789 for (k = 0, n = elf_tdata(j)->symtab_hdr.sh_info; k < n; ++k)
2790 for (gotent = local_got_entries[k];
2791 gotent ; gotent = gotent->next)
2792 if (gotent->use_count > 0)
2793 entries += (alpha_dynamic_entries_for_reloc
0e1862bb
L
2794 (gotent->reloc_type, 0, bfd_link_pic (info),
2795 bfd_link_pie (info)));
a7519a3c
RH
2796 }
2797 }
3765b1be 2798
ce558b89 2799 srel = elf_hash_table(info)->srelgot;
a7519a3c
RH
2800 if (!srel)
2801 {
2802 BFD_ASSERT (entries == 0);
4a828aab 2803 return;
a7519a3c
RH
2804 }
2805 srel->size = sizeof (Elf64_External_Rela) * entries;
252b5132 2806
a7519a3c 2807 /* Now do the non-local symbols. */
4dfe6ac6 2808 alpha_elf_link_hash_traverse (htab,
a7519a3c 2809 elf64_alpha_size_rela_got_1, info);
a7519a3c 2810}
252b5132 2811
a7519a3c 2812/* Set the sizes of the dynamic sections. */
3765b1be 2813
a7519a3c
RH
2814static bfd_boolean
2815elf64_alpha_size_dynamic_sections (bfd *output_bfd ATTRIBUTE_UNUSED,
2816 struct bfd_link_info *info)
2817{
2818 bfd *dynobj;
2819 asection *s;
24f1a751 2820 bfd_boolean relplt, relocs;
4dfe6ac6
NC
2821 struct alpha_elf_link_hash_table * htab;
2822
2823 htab = alpha_elf_hash_table (info);
2824 if (htab == NULL)
2825 return FALSE;
3765b1be 2826
a7519a3c
RH
2827 dynobj = elf_hash_table(info)->dynobj;
2828 BFD_ASSERT(dynobj != NULL);
252b5132 2829
a7519a3c
RH
2830 if (elf_hash_table (info)->dynamic_sections_created)
2831 {
2832 /* Set the contents of the .interp section to the interpreter. */
9b8b325a 2833 if (bfd_link_executable (info) && !info->nointerp)
252b5132 2834 {
3d4d4302 2835 s = bfd_get_linker_section (dynobj, ".interp");
a7519a3c
RH
2836 BFD_ASSERT (s != NULL);
2837 s->size = sizeof ELF_DYNAMIC_INTERPRETER;
2838 s->contents = (unsigned char *) ELF_DYNAMIC_INTERPRETER;
2839 }
3765b1be 2840
a7519a3c
RH
2841 /* Now that we've seen all of the input files, we can decide which
2842 symbols need dynamic relocation entries and which don't. We've
2843 collected information in check_relocs that we can now apply to
2844 size the dynamic relocation sections. */
4dfe6ac6 2845 alpha_elf_link_hash_traverse (htab,
a7519a3c 2846 elf64_alpha_calc_dynrel_sizes, info);
252b5132 2847
a7519a3c 2848 elf64_alpha_size_rela_got_section (info);
6ec7057a 2849 elf64_alpha_size_plt_section (info);
a7519a3c
RH
2850 }
2851 /* else we're not dynamic and by definition we don't need such things. */
3765b1be 2852
a7519a3c
RH
2853 /* The check_relocs and adjust_dynamic_symbol entry points have
2854 determined the sizes of the various dynamic sections. Allocate
2855 memory for them. */
2856 relplt = FALSE;
24f1a751 2857 relocs = FALSE;
a7519a3c
RH
2858 for (s = dynobj->sections; s != NULL; s = s->next)
2859 {
2860 const char *name;
3765b1be 2861
a7519a3c
RH
2862 if (!(s->flags & SEC_LINKER_CREATED))
2863 continue;
cc03ec80 2864
a7519a3c
RH
2865 /* It's OK to base decisions on the section name, because none
2866 of the dynobj section names depend upon the input files. */
fd361982 2867 name = bfd_section_name (s);
3765b1be 2868
0112cd26 2869 if (CONST_STRNEQ (name, ".rela"))
3765b1be 2870 {
c456f082 2871 if (s->size != 0)
a7519a3c 2872 {
c456f082 2873 if (strcmp (name, ".rela.plt") == 0)
a7519a3c 2874 relplt = TRUE;
24f1a751
AM
2875 else
2876 relocs = TRUE;
252b5132 2877
a7519a3c
RH
2878 /* We use the reloc_count field as a counter if we need
2879 to copy relocs into the output file. */
2880 s->reloc_count = 0;
252b5132 2881 }
3765b1be 2882 }
0112cd26 2883 else if (! CONST_STRNEQ (name, ".got")
c456f082
AM
2884 && strcmp (name, ".plt") != 0
2885 && strcmp (name, ".dynbss") != 0)
3765b1be 2886 {
a7519a3c
RH
2887 /* It's not one of our dynamic sections, so don't allocate space. */
2888 continue;
2889 }
252b5132 2890
c456f082
AM
2891 if (s->size == 0)
2892 {
2893 /* If we don't need this section, strip it from the output file.
2894 This is to handle .rela.bss and .rela.plt. We must create it
2895 in create_dynamic_sections, because it must be created before
2896 the linker maps input sections to output sections. The
2897 linker does that before adjust_dynamic_symbol is called, and
2898 it is that function which decides whether anything needs to
2899 go into these sections. */
6452a567
RH
2900 if (!CONST_STRNEQ (name, ".got"))
2901 s->flags |= SEC_EXCLUDE;
c456f082
AM
2902 }
2903 else if ((s->flags & SEC_HAS_CONTENTS) != 0)
a7519a3c
RH
2904 {
2905 /* Allocate memory for the section contents. */
2906 s->contents = (bfd_byte *) bfd_zalloc (dynobj, s->size);
c456f082 2907 if (s->contents == NULL)
b34976b6 2908 return FALSE;
a7519a3c
RH
2909 }
2910 }
3765b1be 2911
a7519a3c
RH
2912 if (elf_hash_table (info)->dynamic_sections_created)
2913 {
2914 /* Add some entries to the .dynamic section. We fill in the
2915 values later, in elf64_alpha_finish_dynamic_sections, but we
2916 must add the entries now so that we get the correct size for
2917 the .dynamic section. The DT_DEBUG entry is filled in by the
2918 dynamic linker and used by the debugger. */
2919#define add_dynamic_entry(TAG, VAL) \
2920 _bfd_elf_add_dynamic_entry (info, TAG, VAL)
3765b1be 2921
0e1862bb 2922 if (bfd_link_executable (info))
a7519a3c
RH
2923 {
2924 if (!add_dynamic_entry (DT_DEBUG, 0))
2925 return FALSE;
3765b1be
RH
2926 }
2927
a7519a3c 2928 if (relplt)
3765b1be 2929 {
a7519a3c
RH
2930 if (!add_dynamic_entry (DT_PLTGOT, 0)
2931 || !add_dynamic_entry (DT_PLTRELSZ, 0)
2932 || !add_dynamic_entry (DT_PLTREL, DT_RELA)
2933 || !add_dynamic_entry (DT_JMPREL, 0))
2934 return FALSE;
6ec7057a
RH
2935
2936 if (elf64_alpha_use_secureplt
2937 && !add_dynamic_entry (DT_ALPHA_PLTRO, 1))
2938 return FALSE;
a7519a3c 2939 }
252b5132 2940
24f1a751 2941 if (relocs)
a7519a3c 2942 {
24f1a751
AM
2943 if (!add_dynamic_entry (DT_RELA, 0)
2944 || !add_dynamic_entry (DT_RELASZ, 0)
2945 || !add_dynamic_entry (DT_RELAENT, sizeof (Elf64_External_Rela)))
a7519a3c 2946 return FALSE;
24f1a751
AM
2947
2948 if (info->flags & DF_TEXTREL)
2949 {
2950 if (!add_dynamic_entry (DT_TEXTREL, 0))
2951 return FALSE;
2952 }
252b5132
RH
2953 }
2954 }
a7519a3c 2955#undef add_dynamic_entry
252b5132 2956
b34976b6 2957 return TRUE;
252b5132 2958}
a7519a3c
RH
2959\f
2960/* These functions do relaxation for Alpha ELF.
252b5132 2961
a7519a3c
RH
2962 Currently I'm only handling what I can do with existing compiler
2963 and assembler support, which means no instructions are removed,
2964 though some may be nopped. At this time GCC does not emit enough
2965 information to do all of the relaxing that is possible. It will
2966 take some not small amount of work for that to happen.
252b5132 2967
a7519a3c
RH
2968 There are a couple of interesting papers that I once read on this
2969 subject, that I cannot find references to at the moment, that
2970 related to Alpha in particular. They are by David Wall, then of
2971 DEC WRL. */
252b5132 2972
a7519a3c
RH
2973struct alpha_relax_info
2974{
2975 bfd *abfd;
2976 asection *sec;
2977 bfd_byte *contents;
2978 Elf_Internal_Shdr *symtab_hdr;
2979 Elf_Internal_Rela *relocs, *relend;
2980 struct bfd_link_info *link_info;
2981 bfd_vma gp;
2982 bfd *gotobj;
2983 asection *tsec;
2984 struct alpha_elf_link_hash_entry *h;
2985 struct alpha_elf_got_entry **first_gotent;
2986 struct alpha_elf_got_entry *gotent;
2987 bfd_boolean changed_contents;
2988 bfd_boolean changed_relocs;
2989 unsigned char other;
2990};
252b5132 2991
a7519a3c
RH
2992static Elf_Internal_Rela *
2993elf64_alpha_find_reloc_at_ofs (Elf_Internal_Rela *rel,
2994 Elf_Internal_Rela *relend,
2995 bfd_vma offset, int type)
2996{
2997 while (rel < relend)
252b5132 2998 {
a7519a3c
RH
2999 if (rel->r_offset == offset
3000 && ELF64_R_TYPE (rel->r_info) == (unsigned int) type)
3001 return rel;
3002 ++rel;
3003 }
3004 return NULL;
3005}
252b5132 3006
a7519a3c
RH
3007static bfd_boolean
3008elf64_alpha_relax_got_load (struct alpha_relax_info *info, bfd_vma symval,
3009 Elf_Internal_Rela *irel, unsigned long r_type)
3010{
3011 unsigned int insn;
3012 bfd_signed_vma disp;
252b5132 3013
a7519a3c
RH
3014 /* Get the instruction. */
3015 insn = bfd_get_32 (info->abfd, info->contents + irel->r_offset);
252b5132 3016
a7519a3c
RH
3017 if (insn >> 26 != OP_LDQ)
3018 {
3019 reloc_howto_type *howto = elf64_alpha_howto_table + r_type;
4eca0228 3020 _bfd_error_handler
695344c0 3021 /* xgettext:c-format */
2dcf00ce
AM
3022 (_("%pB: %pA+%#" PRIx64 ": warning: "
3023 "%s relocation against unexpected insn"),
3024 info->abfd, info->sec, (uint64_t) irel->r_offset, howto->name);
a7519a3c
RH
3025 return TRUE;
3026 }
252b5132 3027
a7519a3c
RH
3028 /* Can't relax dynamic symbols. */
3029 if (alpha_elf_dynamic_symbol_p (&info->h->root, info->link_info))
3030 return TRUE;
252b5132 3031
a7519a3c 3032 /* Can't use local-exec relocations in shared libraries. */
e366eeae 3033 if (r_type == R_ALPHA_GOTTPREL
3cbc1e5e 3034 && bfd_link_dll (info->link_info))
a7519a3c 3035 return TRUE;
252b5132 3036
a7519a3c
RH
3037 if (r_type == R_ALPHA_LITERAL)
3038 {
3039 /* Look for nice constant addresses. This includes the not-uncommon
3040 special case of 0 for undefweak symbols. */
3041 if ((info->h && info->h->root.root.type == bfd_link_hash_undefweak)
0e1862bb 3042 || (!bfd_link_pic (info->link_info)
a7519a3c
RH
3043 && (symval >= (bfd_vma)-0x8000 || symval < 0x8000)))
3044 {
3045 disp = 0;
3046 insn = (OP_LDA << 26) | (insn & (31 << 21)) | (31 << 16);
3047 insn |= (symval & 0xffff);
3048 r_type = R_ALPHA_NONE;
3049 }
3050 else
3051 {
d1c109de
RH
3052 /* We may only create GPREL relocs during the second pass. */
3053 if (info->link_info->relax_pass == 0)
3054 return TRUE;
3055
a7519a3c
RH
3056 disp = symval - info->gp;
3057 insn = (OP_LDA << 26) | (insn & 0x03ff0000);
3058 r_type = R_ALPHA_GPREL16;
3059 }
252b5132
RH
3060 }
3061 else
252b5132 3062 {
a7519a3c 3063 bfd_vma dtp_base, tp_base;
252b5132 3064
a7519a3c
RH
3065 BFD_ASSERT (elf_hash_table (info->link_info)->tls_sec != NULL);
3066 dtp_base = alpha_get_dtprel_base (info->link_info);
3067 tp_base = alpha_get_tprel_base (info->link_info);
3068 disp = symval - (r_type == R_ALPHA_GOTDTPREL ? dtp_base : tp_base);
252b5132 3069
a7519a3c 3070 insn = (OP_LDA << 26) | (insn & (31 << 21)) | (31 << 16);
252b5132 3071
a7519a3c
RH
3072 switch (r_type)
3073 {
3074 case R_ALPHA_GOTDTPREL:
3075 r_type = R_ALPHA_DTPREL16;
3076 break;
3077 case R_ALPHA_GOTTPREL:
3078 r_type = R_ALPHA_TPREL16;
3079 break;
3080 default:
3081 BFD_ASSERT (0);
3082 return FALSE;
3083 }
3084 }
252b5132 3085
a7519a3c 3086 if (disp < -0x8000 || disp >= 0x8000)
b34976b6 3087 return TRUE;
252b5132 3088
a7519a3c
RH
3089 bfd_put_32 (info->abfd, (bfd_vma) insn, info->contents + irel->r_offset);
3090 info->changed_contents = TRUE;
252b5132 3091
a7519a3c
RH
3092 /* Reduce the use count on this got entry by one, possibly
3093 eliminating it. */
3094 if (--info->gotent->use_count == 0)
252b5132 3095 {
a7519a3c
RH
3096 int sz = alpha_got_entry_size (r_type);
3097 alpha_elf_tdata (info->gotobj)->total_got_size -= sz;
3098 if (!info->h)
3099 alpha_elf_tdata (info->gotobj)->local_got_size -= sz;
252b5132 3100 }
252b5132 3101
a7519a3c
RH
3102 /* Smash the existing GOT relocation for its 16-bit immediate pair. */
3103 irel->r_info = ELF64_R_INFO (ELF64_R_SYM (irel->r_info), r_type);
3104 info->changed_relocs = TRUE;
3105
3106 /* ??? Search forward through this basic block looking for insns
3107 that use the target register. Stop after an insn modifying the
3108 register is seen, or after a branch or call.
252b5132 3109
a7519a3c
RH
3110 Any such memory load insn may be substituted by a load directly
3111 off the GP. This allows the memory load insn to be issued before
3112 the calculated GP register would otherwise be ready.
252b5132 3113
a7519a3c
RH
3114 Any such jsr insn can be replaced by a bsr if it is in range.
3115
3116 This would mean that we'd have to _add_ relocations, the pain of
3117 which gives one pause. */
252b5132 3118
b34976b6 3119 return TRUE;
252b5132
RH
3120}
3121
a7519a3c
RH
3122static bfd_vma
3123elf64_alpha_relax_opt_call (struct alpha_relax_info *info, bfd_vma symval)
252b5132 3124{
a7519a3c
RH
3125 /* If the function has the same gp, and we can identify that the
3126 function does not use its function pointer, we can eliminate the
3127 address load. */
252b5132 3128
a7519a3c
RH
3129 /* If the symbol is marked NOPV, we are being told the function never
3130 needs its procedure value. */
3131 if ((info->other & STO_ALPHA_STD_GPLOAD) == STO_ALPHA_NOPV)
3132 return symval;
252b5132 3133
a7519a3c
RH
3134 /* If the symbol is marked STD_GP, we are being told the function does
3135 a normal ldgp in the first two words. */
3136 else if ((info->other & STO_ALPHA_STD_GPLOAD) == STO_ALPHA_STD_GPLOAD)
3137 ;
252b5132 3138
a7519a3c
RH
3139 /* Otherwise, we may be able to identify a GP load in the first two
3140 words, which we can then skip. */
3141 else
252b5132 3142 {
a7519a3c
RH
3143 Elf_Internal_Rela *tsec_relocs, *tsec_relend, *tsec_free, *gpdisp;
3144 bfd_vma ofs;
252b5132 3145
a7519a3c
RH
3146 /* Load the relocations from the section that the target symbol is in. */
3147 if (info->sec == info->tsec)
252b5132 3148 {
a7519a3c
RH
3149 tsec_relocs = info->relocs;
3150 tsec_relend = info->relend;
3151 tsec_free = NULL;
3152 }
3153 else
3154 {
3155 tsec_relocs = (_bfd_elf_link_read_relocs
07d6d2b8 3156 (info->abfd, info->tsec, NULL,
a7519a3c
RH
3157 (Elf_Internal_Rela *) NULL,
3158 info->link_info->keep_memory));
3159 if (tsec_relocs == NULL)
3160 return 0;
3161 tsec_relend = tsec_relocs + info->tsec->reloc_count;
ae4fda66
JC
3162 tsec_free = (elf_section_data (info->tsec)->relocs == tsec_relocs
3163 ? NULL
3164 : tsec_relocs);
a7519a3c 3165 }
252b5132 3166
a7519a3c
RH
3167 /* Recover the symbol's offset within the section. */
3168 ofs = (symval - info->tsec->output_section->vma
3169 - info->tsec->output_offset);
252b5132 3170
a7519a3c
RH
3171 /* Look for a GPDISP reloc. */
3172 gpdisp = (elf64_alpha_find_reloc_at_ofs
3173 (tsec_relocs, tsec_relend, ofs, R_ALPHA_GPDISP));
252b5132 3174
a7519a3c
RH
3175 if (!gpdisp || gpdisp->r_addend != 4)
3176 {
c9594989 3177 free (tsec_free);
a7519a3c 3178 return 0;
252b5132 3179 }
c9594989 3180 free (tsec_free);
252b5132
RH
3181 }
3182
a7519a3c
RH
3183 /* We've now determined that we can skip an initial gp load. Verify
3184 that the call and the target use the same gp. */
f13a99db 3185 if (info->link_info->output_bfd->xvec != info->tsec->owner->xvec
a7519a3c
RH
3186 || info->gotobj != alpha_elf_tdata (info->tsec->owner)->gotobj)
3187 return 0;
252b5132 3188
a7519a3c
RH
3189 return symval + 8;
3190}
252b5132 3191
a7519a3c
RH
3192static bfd_boolean
3193elf64_alpha_relax_with_lituse (struct alpha_relax_info *info,
3194 bfd_vma symval, Elf_Internal_Rela *irel)
252b5132 3195{
d1c109de
RH
3196 Elf_Internal_Rela *urel, *erel, *irelend = info->relend;
3197 int flags;
a7519a3c
RH
3198 bfd_signed_vma disp;
3199 bfd_boolean fits16;
3200 bfd_boolean fits32;
3201 bfd_boolean lit_reused = FALSE;
3202 bfd_boolean all_optimized = TRUE;
d1c109de
RH
3203 bfd_boolean changed_contents;
3204 bfd_boolean changed_relocs;
3205 bfd_byte *contents = info->contents;
3206 bfd *abfd = info->abfd;
3207 bfd_vma sec_output_vma;
a7519a3c 3208 unsigned int lit_insn;
d1c109de 3209 int relax_pass;
252b5132 3210
d1c109de 3211 lit_insn = bfd_get_32 (abfd, contents + irel->r_offset);
a7519a3c
RH
3212 if (lit_insn >> 26 != OP_LDQ)
3213 {
4eca0228 3214 _bfd_error_handler
695344c0 3215 /* xgettext:c-format */
2dcf00ce 3216 (_("%pB: %pA+%#" PRIx64 ": warning: "
38f14ab8
AM
3217 "%s relocation against unexpected insn"),
3218 abfd, info->sec, (uint64_t) irel->r_offset, "LITERAL");
a7519a3c
RH
3219 return TRUE;
3220 }
252b5132 3221
a7519a3c
RH
3222 /* Can't relax dynamic symbols. */
3223 if (alpha_elf_dynamic_symbol_p (&info->h->root, info->link_info))
3224 return TRUE;
3225
d1c109de
RH
3226 changed_contents = info->changed_contents;
3227 changed_relocs = info->changed_relocs;
3228 sec_output_vma = info->sec->output_section->vma + info->sec->output_offset;
3229 relax_pass = info->link_info->relax_pass;
3230
a7519a3c 3231 /* Summarize how this particular LITERAL is used. */
d1c109de 3232 for (erel = irel+1, flags = 0; erel < irelend; ++erel)
252b5132 3233 {
d1c109de 3234 if (ELF64_R_TYPE (erel->r_info) != R_ALPHA_LITUSE)
a7519a3c 3235 break;
d1c109de
RH
3236 if (erel->r_addend <= 6)
3237 flags |= 1 << erel->r_addend;
a7519a3c 3238 }
252b5132 3239
a7519a3c
RH
3240 /* A little preparation for the loop... */
3241 disp = symval - info->gp;
252b5132 3242
d1c109de 3243 for (urel = irel+1; urel < erel; ++urel)
a7519a3c 3244 {
d1c109de 3245 bfd_vma urel_r_offset = urel->r_offset;
a7519a3c
RH
3246 unsigned int insn;
3247 int insn_disp;
3248 bfd_signed_vma xdisp;
d1c109de 3249 Elf_Internal_Rela nrel;
252b5132 3250
d1c109de 3251 insn = bfd_get_32 (abfd, contents + urel_r_offset);
252b5132 3252
a7519a3c
RH
3253 switch (urel->r_addend)
3254 {
3255 case LITUSE_ALPHA_ADDR:
3256 default:
3257 /* This type is really just a placeholder to note that all
3258 uses cannot be optimized, but to still allow some. */
3259 all_optimized = FALSE;
3260 break;
252b5132 3261
a7519a3c 3262 case LITUSE_ALPHA_BASE:
d1c109de
RH
3263 /* We may only create GPREL relocs during the second pass. */
3264 if (relax_pass == 0)
3265 {
3266 all_optimized = FALSE;
3267 break;
3268 }
3269
a7519a3c 3270 /* We can always optimize 16-bit displacements. */
252b5132 3271
a7519a3c
RH
3272 /* Extract the displacement from the instruction, sign-extending
3273 it if necessary, then test whether it is within 16 or 32 bits
3274 displacement from GP. */
3275 insn_disp = ((insn & 0xffff) ^ 0x8000) - 0x8000;
3276
3277 xdisp = disp + insn_disp;
3278 fits16 = (xdisp >= - (bfd_signed_vma) 0x8000 && xdisp < 0x8000);
3279 fits32 = (xdisp >= - (bfd_signed_vma) 0x80000000
3280 && xdisp < 0x7fff8000);
3281
3282 if (fits16)
3283 {
3284 /* Take the op code and dest from this insn, take the base
3285 register from the literal insn. Leave the offset alone. */
3286 insn = (insn & 0xffe0ffff) | (lit_insn & 0x001f0000);
d1c109de
RH
3287 bfd_put_32 (abfd, (bfd_vma) insn, contents + urel_r_offset);
3288 changed_contents = TRUE;
3289
3290 nrel = *urel;
3291 nrel.r_info = ELF64_R_INFO (ELF64_R_SYM (irel->r_info),
3292 R_ALPHA_GPREL16);
3293 nrel.r_addend = irel->r_addend;
3294
3295 /* As we adjust, move the reloc to the end so that we don't
07d6d2b8 3296 break the LITERAL+LITUSE chain. */
d1c109de 3297 if (urel < --erel)
07d6d2b8 3298 *urel-- = *erel;
d1c109de
RH
3299 *erel = nrel;
3300 changed_relocs = TRUE;
252b5132 3301 }
252b5132 3302
a7519a3c
RH
3303 /* If all mem+byte, we can optimize 32-bit mem displacements. */
3304 else if (fits32 && !(flags & ~6))
3305 {
3306 /* FIXME: sanity check that lit insn Ra is mem insn Rb. */
252b5132 3307
a7519a3c
RH
3308 irel->r_info = ELF64_R_INFO (ELF64_R_SYM (irel->r_info),
3309 R_ALPHA_GPRELHIGH);
3310 lit_insn = (OP_LDAH << 26) | (lit_insn & 0x03ff0000);
d1c109de 3311 bfd_put_32 (abfd, (bfd_vma) lit_insn, contents + irel->r_offset);
a7519a3c 3312 lit_reused = TRUE;
d1c109de 3313 changed_contents = TRUE;
252b5132 3314
07d6d2b8
AM
3315 /* Since all relocs must be optimized, don't bother swapping
3316 this relocation to the end. */
a7519a3c
RH
3317 urel->r_info = ELF64_R_INFO (ELF64_R_SYM (irel->r_info),
3318 R_ALPHA_GPRELLOW);
3319 urel->r_addend = irel->r_addend;
d1c109de 3320 changed_relocs = TRUE;
a7519a3c
RH
3321 }
3322 else
3323 all_optimized = FALSE;
3324 break;
252b5132 3325
a7519a3c
RH
3326 case LITUSE_ALPHA_BYTOFF:
3327 /* We can always optimize byte instructions. */
252b5132 3328
a7519a3c
RH
3329 /* FIXME: sanity check the insn for byte op. Check that the
3330 literal dest reg is indeed Rb in the byte insn. */
252b5132 3331
a7519a3c
RH
3332 insn &= ~ (unsigned) 0x001ff000;
3333 insn |= ((symval & 7) << 13) | 0x1000;
d1c109de
RH
3334 bfd_put_32 (abfd, (bfd_vma) insn, contents + urel_r_offset);
3335 changed_contents = TRUE;
3336
3337 nrel = *urel;
3338 nrel.r_info = ELF64_R_INFO (0, R_ALPHA_NONE);
3339 nrel.r_addend = 0;
3340
3341 /* As we adjust, move the reloc to the end so that we don't
3342 break the LITERAL+LITUSE chain. */
3343 if (urel < --erel)
3344 *urel-- = *erel;
3345 *erel = nrel;
3346 changed_relocs = TRUE;
a7519a3c 3347 break;
252b5132 3348
a7519a3c
RH
3349 case LITUSE_ALPHA_JSR:
3350 case LITUSE_ALPHA_TLSGD:
3351 case LITUSE_ALPHA_TLSLDM:
8288a39e 3352 case LITUSE_ALPHA_JSRDIRECT:
0d5f9994 3353 {
a7519a3c
RH
3354 bfd_vma optdest, org;
3355 bfd_signed_vma odisp;
252b5132 3356
a7519a3c
RH
3357 /* For undefined weak symbols, we're mostly interested in getting
3358 rid of the got entry whenever possible, so optimize this to a
3359 use of the zero register. */
3360 if (info->h && info->h->root.root.type == bfd_link_hash_undefweak)
3361 {
3362 insn |= 31 << 16;
d1c109de 3363 bfd_put_32 (abfd, (bfd_vma) insn, contents + urel_r_offset);
252b5132 3364
d1c109de 3365 changed_contents = TRUE;
a7519a3c
RH
3366 break;
3367 }
252b5132 3368
a7519a3c
RH
3369 /* If not zero, place to jump without needing pv. */
3370 optdest = elf64_alpha_relax_opt_call (info, symval);
d1c109de 3371 org = sec_output_vma + urel_r_offset + 4;
a7519a3c 3372 odisp = (optdest ? optdest : symval) - org;
252b5132 3373
a7519a3c
RH
3374 if (odisp >= -0x400000 && odisp < 0x400000)
3375 {
3376 Elf_Internal_Rela *xrel;
252b5132 3377
a7519a3c
RH
3378 /* Preserve branch prediction call stack when possible. */
3379 if ((insn & INSN_JSR_MASK) == INSN_JSR)
3380 insn = (OP_BSR << 26) | (insn & 0x03e00000);
3381 else
3382 insn = (OP_BR << 26) | (insn & 0x03e00000);
d1c109de
RH
3383 bfd_put_32 (abfd, (bfd_vma) insn, contents + urel_r_offset);
3384 changed_contents = TRUE;
252b5132 3385
d1c109de
RH
3386 nrel = *urel;
3387 nrel.r_info = ELF64_R_INFO (ELF64_R_SYM (irel->r_info),
3388 R_ALPHA_BRADDR);
3389 nrel.r_addend = irel->r_addend;
252b5132 3390
a7519a3c 3391 if (optdest)
d1c109de 3392 nrel.r_addend += optdest - symval;
a7519a3c
RH
3393 else
3394 all_optimized = FALSE;
252b5132 3395
a7519a3c
RH
3396 /* Kill any HINT reloc that might exist for this insn. */
3397 xrel = (elf64_alpha_find_reloc_at_ofs
d1c109de 3398 (info->relocs, info->relend, urel_r_offset,
a7519a3c
RH
3399 R_ALPHA_HINT));
3400 if (xrel)
3401 xrel->r_info = ELF64_R_INFO (0, R_ALPHA_NONE);
252b5132 3402
d1c109de
RH
3403 /* As we adjust, move the reloc to the end so that we don't
3404 break the LITERAL+LITUSE chain. */
3405 if (urel < --erel)
3406 *urel-- = *erel;
3407 *erel = nrel;
3408
a7519a3c
RH
3409 info->changed_relocs = TRUE;
3410 }
3411 else
3412 all_optimized = FALSE;
252b5132 3413
a7519a3c
RH
3414 /* Even if the target is not in range for a direct branch,
3415 if we share a GP, we can eliminate the gp reload. */
3416 if (optdest)
3417 {
3418 Elf_Internal_Rela *gpdisp
3419 = (elf64_alpha_find_reloc_at_ofs
d1c109de 3420 (info->relocs, irelend, urel_r_offset + 4,
a7519a3c
RH
3421 R_ALPHA_GPDISP));
3422 if (gpdisp)
3423 {
d1c109de 3424 bfd_byte *p_ldah = contents + gpdisp->r_offset;
a7519a3c 3425 bfd_byte *p_lda = p_ldah + gpdisp->r_addend;
d1c109de
RH
3426 unsigned int ldah = bfd_get_32 (abfd, p_ldah);
3427 unsigned int lda = bfd_get_32 (abfd, p_lda);
252b5132 3428
a7519a3c
RH
3429 /* Verify that the instruction is "ldah $29,0($26)".
3430 Consider a function that ends in a noreturn call,
3431 and that the next function begins with an ldgp,
3432 and that by accident there is no padding between.
3433 In that case the insn would use $27 as the base. */
3434 if (ldah == 0x27ba0000 && lda == 0x23bd0000)
3435 {
d1c109de
RH
3436 bfd_put_32 (abfd, (bfd_vma) INSN_UNOP, p_ldah);
3437 bfd_put_32 (abfd, (bfd_vma) INSN_UNOP, p_lda);
252b5132 3438
a7519a3c 3439 gpdisp->r_info = ELF64_R_INFO (0, R_ALPHA_NONE);
d1c109de
RH
3440 changed_contents = TRUE;
3441 changed_relocs = TRUE;
a7519a3c
RH
3442 }
3443 }
3444 }
3445 }
3446 break;
252b5132 3447 }
252b5132
RH
3448 }
3449
d1c109de
RH
3450 /* If we reused the literal instruction, we must have optimized all. */
3451 BFD_ASSERT(!lit_reused || all_optimized);
3452
a7519a3c
RH
3453 /* If all cases were optimized, we can reduce the use count on this
3454 got entry by one, possibly eliminating it. */
3455 if (all_optimized)
252b5132 3456 {
a7519a3c 3457 if (--info->gotent->use_count == 0)
252b5132 3458 {
a7519a3c
RH
3459 int sz = alpha_got_entry_size (R_ALPHA_LITERAL);
3460 alpha_elf_tdata (info->gotobj)->total_got_size -= sz;
3461 if (!info->h)
3462 alpha_elf_tdata (info->gotobj)->local_got_size -= sz;
252b5132 3463 }
a7519a3c
RH
3464
3465 /* If the literal instruction is no longer needed (it may have been
3466 reused. We can eliminate it. */
3467 /* ??? For now, I don't want to deal with compacting the section,
3468 so just nop it out. */
3469 if (!lit_reused)
252b5132 3470 {
a7519a3c 3471 irel->r_info = ELF64_R_INFO (0, R_ALPHA_NONE);
d1c109de 3472 changed_relocs = TRUE;
252b5132 3473
d1c109de
RH
3474 bfd_put_32 (abfd, (bfd_vma) INSN_UNOP, contents + irel->r_offset);
3475 changed_contents = TRUE;
a7519a3c 3476 }
a7519a3c 3477 }
d1c109de
RH
3478
3479 info->changed_contents = changed_contents;
3480 info->changed_relocs = changed_relocs;
3481
3482 if (all_optimized || relax_pass == 0)
3483 return TRUE;
3484 return elf64_alpha_relax_got_load (info, symval, irel, R_ALPHA_LITERAL);
252b5132
RH
3485}
3486
b34976b6 3487static bfd_boolean
a7519a3c
RH
3488elf64_alpha_relax_tls_get_addr (struct alpha_relax_info *info, bfd_vma symval,
3489 Elf_Internal_Rela *irel, bfd_boolean is_gd)
f44f99a5 3490{
a7519a3c 3491 bfd_byte *pos[5];
891caa9b 3492 unsigned int insn, tlsgd_reg;
a7519a3c 3493 Elf_Internal_Rela *gpdisp, *hint;
891caa9b 3494 bfd_boolean dynamic, use_gottprel;
a7519a3c 3495 unsigned long new_symndx;
f44f99a5 3496
a7519a3c 3497 dynamic = alpha_elf_dynamic_symbol_p (&info->h->root, info->link_info);
f44f99a5 3498
a7519a3c
RH
3499 /* If a TLS symbol is accessed using IE at least once, there is no point
3500 to use dynamic model for it. */
3501 if (is_gd && info->h && (info->h->flags & ALPHA_ELF_LINK_HASH_TLS_IE))
3502 ;
f44f99a5 3503
a7519a3c
RH
3504 /* If the symbol is local, and we've already committed to DF_STATIC_TLS,
3505 then we might as well relax to IE. */
0e1862bb 3506 else if (bfd_link_pic (info->link_info) && !dynamic
a7519a3c
RH
3507 && (info->link_info->flags & DF_STATIC_TLS))
3508 ;
f44f99a5 3509
a7519a3c 3510 /* Otherwise we must be building an executable to do anything. */
0e1862bb 3511 else if (bfd_link_pic (info->link_info))
a7519a3c 3512 return TRUE;
f44f99a5 3513
a7519a3c
RH
3514 /* The TLSGD/TLSLDM relocation must be followed by a LITERAL and
3515 the matching LITUSE_TLS relocations. */
3516 if (irel + 2 >= info->relend)
3517 return TRUE;
3518 if (ELF64_R_TYPE (irel[1].r_info) != R_ALPHA_LITERAL
3519 || ELF64_R_TYPE (irel[2].r_info) != R_ALPHA_LITUSE
3520 || irel[2].r_addend != (is_gd ? LITUSE_ALPHA_TLSGD : LITUSE_ALPHA_TLSLDM))
3521 return TRUE;
f44f99a5 3522
a7519a3c
RH
3523 /* There must be a GPDISP relocation positioned immediately after the
3524 LITUSE relocation. */
3525 gpdisp = elf64_alpha_find_reloc_at_ofs (info->relocs, info->relend,
3526 irel[2].r_offset + 4, R_ALPHA_GPDISP);
3527 if (!gpdisp)
b34976b6 3528 return TRUE;
f44f99a5 3529
a7519a3c
RH
3530 pos[0] = info->contents + irel[0].r_offset;
3531 pos[1] = info->contents + irel[1].r_offset;
3532 pos[2] = info->contents + irel[2].r_offset;
3533 pos[3] = info->contents + gpdisp->r_offset;
3534 pos[4] = pos[3] + gpdisp->r_addend;
f44f99a5 3535
7dbf3b76
RH
3536 /* Beware of the compiler hoisting part of the sequence out a loop
3537 and adjusting the destination register for the TLSGD insn. If this
3538 happens, there will be a move into $16 before the JSR insn, so only
3539 transformations of the first insn pair should use this register. */
3540 tlsgd_reg = bfd_get_32 (info->abfd, pos[0]);
3541 tlsgd_reg = (tlsgd_reg >> 21) & 31;
3542
a7519a3c
RH
3543 /* Generally, the positions are not allowed to be out of order, lest the
3544 modified insn sequence have different register lifetimes. We can make
3545 an exception when pos 1 is adjacent to pos 0. */
3546 if (pos[1] + 4 == pos[0])
f44f99a5 3547 {
a7519a3c
RH
3548 bfd_byte *tmp = pos[0];
3549 pos[0] = pos[1];
3550 pos[1] = tmp;
f44f99a5 3551 }
a7519a3c
RH
3552 if (pos[1] >= pos[2] || pos[2] >= pos[3])
3553 return TRUE;
cc03ec80 3554
a7519a3c
RH
3555 /* Reduce the use count on the LITERAL relocation. Do this before we
3556 smash the symndx when we adjust the relocations below. */
3557 {
3558 struct alpha_elf_got_entry *lit_gotent;
3559 struct alpha_elf_link_hash_entry *lit_h;
3560 unsigned long indx;
f44f99a5 3561
a7519a3c
RH
3562 BFD_ASSERT (ELF64_R_SYM (irel[1].r_info) >= info->symtab_hdr->sh_info);
3563 indx = ELF64_R_SYM (irel[1].r_info) - info->symtab_hdr->sh_info;
3564 lit_h = alpha_elf_sym_hashes (info->abfd)[indx];
f44f99a5 3565
a7519a3c
RH
3566 while (lit_h->root.root.type == bfd_link_hash_indirect
3567 || lit_h->root.root.type == bfd_link_hash_warning)
3568 lit_h = (struct alpha_elf_link_hash_entry *) lit_h->root.root.u.i.link;
252b5132 3569
a7519a3c
RH
3570 for (lit_gotent = lit_h->got_entries; lit_gotent ;
3571 lit_gotent = lit_gotent->next)
3572 if (lit_gotent->gotobj == info->gotobj
3573 && lit_gotent->reloc_type == R_ALPHA_LITERAL
3574 && lit_gotent->addend == irel[1].r_addend)
3575 break;
3576 BFD_ASSERT (lit_gotent);
252b5132 3577
a7519a3c
RH
3578 if (--lit_gotent->use_count == 0)
3579 {
3580 int sz = alpha_got_entry_size (R_ALPHA_LITERAL);
3581 alpha_elf_tdata (info->gotobj)->total_got_size -= sz;
3582 }
3583 }
252b5132 3584
a7519a3c 3585 /* Change
252b5132 3586
a7519a3c
RH
3587 lda $16,x($gp) !tlsgd!1
3588 ldq $27,__tls_get_addr($gp) !literal!1
3589 jsr $26,($27),__tls_get_addr !lituse_tlsgd!1
3590 ldah $29,0($26) !gpdisp!2
3591 lda $29,0($29) !gpdisp!2
3592 to
3593 ldq $16,x($gp) !gottprel
3594 unop
3595 call_pal rduniq
3596 addq $16,$0,$0
3597 unop
3598 or the first pair to
3599 lda $16,x($gp) !tprel
3600 unop
3601 or
3602 ldah $16,x($gp) !tprelhi
3603 lda $16,x($16) !tprello
3604
3605 as appropriate. */
3606
3607 use_gottprel = FALSE;
cf35638d 3608 new_symndx = is_gd ? ELF64_R_SYM (irel->r_info) : STN_UNDEF;
891caa9b 3609
9a757e4d
RM
3610 /* Some compilers warn about a Boolean-looking expression being
3611 used in a switch. The explicit cast silences them. */
0e1862bb 3612 switch ((int) (!dynamic && !bfd_link_pic (info->link_info)))
252b5132 3613 {
a7519a3c
RH
3614 case 1:
3615 {
3616 bfd_vma tp_base;
3617 bfd_signed_vma disp;
252b5132 3618
a7519a3c
RH
3619 BFD_ASSERT (elf_hash_table (info->link_info)->tls_sec != NULL);
3620 tp_base = alpha_get_tprel_base (info->link_info);
3621 disp = symval - tp_base;
252b5132 3622
a7519a3c
RH
3623 if (disp >= -0x8000 && disp < 0x8000)
3624 {
891caa9b 3625 insn = (OP_LDA << 26) | (tlsgd_reg << 21) | (31 << 16);
a7519a3c
RH
3626 bfd_put_32 (info->abfd, (bfd_vma) insn, pos[0]);
3627 bfd_put_32 (info->abfd, (bfd_vma) INSN_UNOP, pos[1]);
3765b1be 3628
a7519a3c
RH
3629 irel[0].r_offset = pos[0] - info->contents;
3630 irel[0].r_info = ELF64_R_INFO (new_symndx, R_ALPHA_TPREL16);
3631 irel[1].r_info = ELF64_R_INFO (0, R_ALPHA_NONE);
3632 break;
3633 }
3634 else if (disp >= -(bfd_signed_vma) 0x80000000
3635 && disp < (bfd_signed_vma) 0x7fff8000
891caa9b 3636 && pos[0] + 4 == pos[1])
a7519a3c 3637 {
891caa9b 3638 insn = (OP_LDAH << 26) | (tlsgd_reg << 21) | (31 << 16);
a7519a3c 3639 bfd_put_32 (info->abfd, (bfd_vma) insn, pos[0]);
891caa9b 3640 insn = (OP_LDA << 26) | (tlsgd_reg << 21) | (tlsgd_reg << 16);
a7519a3c 3641 bfd_put_32 (info->abfd, (bfd_vma) insn, pos[1]);
3765b1be 3642
a7519a3c
RH
3643 irel[0].r_offset = pos[0] - info->contents;
3644 irel[0].r_info = ELF64_R_INFO (new_symndx, R_ALPHA_TPRELHI);
3645 irel[1].r_offset = pos[1] - info->contents;
3646 irel[1].r_info = ELF64_R_INFO (new_symndx, R_ALPHA_TPRELLO);
3647 break;
3648 }
3649 }
3650 /* FALLTHRU */
3765b1be 3651
3765b1be 3652 default:
a7519a3c
RH
3653 use_gottprel = TRUE;
3654
891caa9b 3655 insn = (OP_LDQ << 26) | (tlsgd_reg << 21) | (29 << 16);
a7519a3c
RH
3656 bfd_put_32 (info->abfd, (bfd_vma) insn, pos[0]);
3657 bfd_put_32 (info->abfd, (bfd_vma) INSN_UNOP, pos[1]);
3658
3659 irel[0].r_offset = pos[0] - info->contents;
3660 irel[0].r_info = ELF64_R_INFO (new_symndx, R_ALPHA_GOTTPREL);
3661 irel[1].r_info = ELF64_R_INFO (0, R_ALPHA_NONE);
3662 break;
3765b1be 3663 }
3765b1be 3664
a7519a3c 3665 bfd_put_32 (info->abfd, (bfd_vma) INSN_RDUNIQ, pos[2]);
252b5132 3666
a7519a3c
RH
3667 insn = INSN_ADDQ | (16 << 21) | (0 << 16) | (0 << 0);
3668 bfd_put_32 (info->abfd, (bfd_vma) insn, pos[3]);
3765b1be 3669
a7519a3c 3670 bfd_put_32 (info->abfd, (bfd_vma) INSN_UNOP, pos[4]);
e92d460e 3671
a7519a3c
RH
3672 irel[2].r_info = ELF64_R_INFO (0, R_ALPHA_NONE);
3673 gpdisp->r_info = ELF64_R_INFO (0, R_ALPHA_NONE);
252b5132 3674
a7519a3c
RH
3675 hint = elf64_alpha_find_reloc_at_ofs (info->relocs, info->relend,
3676 irel[2].r_offset, R_ALPHA_HINT);
3677 if (hint)
3678 hint->r_info = ELF64_R_INFO (0, R_ALPHA_NONE);
252b5132 3679
a7519a3c
RH
3680 info->changed_contents = TRUE;
3681 info->changed_relocs = TRUE;
d6ad34f6 3682
a7519a3c
RH
3683 /* Reduce the use count on the TLSGD/TLSLDM relocation. */
3684 if (--info->gotent->use_count == 0)
3765b1be 3685 {
a7519a3c
RH
3686 int sz = alpha_got_entry_size (info->gotent->reloc_type);
3687 alpha_elf_tdata (info->gotobj)->total_got_size -= sz;
3688 if (!info->h)
3689 alpha_elf_tdata (info->gotobj)->local_got_size -= sz;
3765b1be 3690 }
252b5132 3691
a7519a3c
RH
3692 /* If we've switched to a GOTTPREL relocation, increment the reference
3693 count on that got entry. */
3694 if (use_gottprel)
f44f99a5 3695 {
a7519a3c 3696 struct alpha_elf_got_entry *tprel_gotent;
f44f99a5 3697
a7519a3c
RH
3698 for (tprel_gotent = *info->first_gotent; tprel_gotent ;
3699 tprel_gotent = tprel_gotent->next)
3700 if (tprel_gotent->gotobj == info->gotobj
3701 && tprel_gotent->reloc_type == R_ALPHA_GOTTPREL
3702 && tprel_gotent->addend == irel->r_addend)
3703 break;
3704 if (tprel_gotent)
3705 tprel_gotent->use_count++;
3706 else
f44f99a5 3707 {
a7519a3c
RH
3708 if (info->gotent->use_count == 0)
3709 tprel_gotent = info->gotent;
3710 else
3711 {
3712 tprel_gotent = (struct alpha_elf_got_entry *)
3713 bfd_alloc (info->abfd, sizeof (struct alpha_elf_got_entry));
3714 if (!tprel_gotent)
3715 return FALSE;
f44f99a5 3716
a7519a3c
RH
3717 tprel_gotent->next = *info->first_gotent;
3718 *info->first_gotent = tprel_gotent;
f44f99a5 3719
a7519a3c
RH
3720 tprel_gotent->gotobj = info->gotobj;
3721 tprel_gotent->addend = irel->r_addend;
3722 tprel_gotent->got_offset = -1;
3723 tprel_gotent->reloc_done = 0;
3724 tprel_gotent->reloc_xlated = 0;
3725 }
f44f99a5 3726
a7519a3c
RH
3727 tprel_gotent->use_count = 1;
3728 tprel_gotent->reloc_type = R_ALPHA_GOTTPREL;
3729 }
f44f99a5 3730 }
f44f99a5 3731
b34976b6 3732 return TRUE;
f44f99a5
RH
3733}
3734
b34976b6 3735static bfd_boolean
a7519a3c
RH
3736elf64_alpha_relax_section (bfd *abfd, asection *sec,
3737 struct bfd_link_info *link_info, bfd_boolean *again)
f44f99a5 3738{
a7519a3c
RH
3739 Elf_Internal_Shdr *symtab_hdr;
3740 Elf_Internal_Rela *internal_relocs;
3741 Elf_Internal_Rela *irel, *irelend;
3742 Elf_Internal_Sym *isymbuf = NULL;
3743 struct alpha_elf_got_entry **local_got_entries;
3744 struct alpha_relax_info info;
4dfe6ac6 3745 struct alpha_elf_link_hash_table * htab;
d1c109de 3746 int relax_pass;
4dfe6ac6
NC
3747
3748 htab = alpha_elf_hash_table (link_info);
3749 if (htab == NULL)
3750 return FALSE;
f44f99a5 3751
4a828aab 3752 /* There's nothing to change, yet. */
a7519a3c 3753 *again = FALSE;
f44f99a5 3754
0e1862bb 3755 if (bfd_link_relocatable (link_info)
a7519a3c
RH
3756 || ((sec->flags & (SEC_CODE | SEC_RELOC | SEC_ALLOC))
3757 != (SEC_CODE | SEC_RELOC | SEC_ALLOC))
3758 || sec->reloc_count == 0)
d6ad34f6
RH
3759 return TRUE;
3760
0ffa91dd 3761 BFD_ASSERT (is_alpha_elf (abfd));
d1c109de 3762 relax_pass = link_info->relax_pass;
0ffa91dd 3763
4a828aab 3764 /* Make sure our GOT and PLT tables are up-to-date. */
4dfe6ac6 3765 if (htab->relax_trip != link_info->relax_trip)
4a828aab 3766 {
4dfe6ac6 3767 htab->relax_trip = link_info->relax_trip;
4a828aab 3768
d1c109de 3769 /* This should never fail after the initial round, since the only error
07d6d2b8 3770 is GOT overflow, and relaxation only shrinks the table. However, we
d1c109de
RH
3771 may only merge got sections during the first pass. If we merge
3772 sections after we've created GPREL relocs, the GP for the merged
3773 section backs up which may put the relocs out of range. */
3774 if (!elf64_alpha_size_got_sections (link_info, relax_pass == 0))
4a828aab
RH
3775 abort ();
3776 if (elf_hash_table (link_info)->dynamic_sections_created)
3777 {
3778 elf64_alpha_size_plt_section (link_info);
3779 elf64_alpha_size_rela_got_section (link_info);
3780 }
3781 }
3782
0ffa91dd 3783 symtab_hdr = &elf_symtab_hdr (abfd);
a7519a3c 3784 local_got_entries = alpha_elf_tdata(abfd)->local_got_entries;
252b5132 3785
a7519a3c
RH
3786 /* Load the relocations for this section. */
3787 internal_relocs = (_bfd_elf_link_read_relocs
2c3fc389 3788 (abfd, sec, NULL, (Elf_Internal_Rela *) NULL,
a7519a3c
RH
3789 link_info->keep_memory));
3790 if (internal_relocs == NULL)
3791 return FALSE;
252b5132 3792
a7519a3c
RH
3793 memset(&info, 0, sizeof (info));
3794 info.abfd = abfd;
3795 info.sec = sec;
3796 info.link_info = link_info;
3797 info.symtab_hdr = symtab_hdr;
3798 info.relocs = internal_relocs;
3799 info.relend = irelend = internal_relocs + sec->reloc_count;
3800
3801 /* Find the GP for this object. Do not store the result back via
3802 _bfd_set_gp_value, since this could change again before final. */
3803 info.gotobj = alpha_elf_tdata (abfd)->gotobj;
3804 if (info.gotobj)
3765b1be 3805 {
a7519a3c
RH
3806 asection *sgot = alpha_elf_tdata (info.gotobj)->got;
3807 info.gp = (sgot->output_section->vma
3808 + sgot->output_offset
3809 + 0x8000);
252b5132
RH
3810 }
3811
a7519a3c
RH
3812 /* Get the section contents. */
3813 if (elf_section_data (sec)->this_hdr.contents != NULL)
3814 info.contents = elf_section_data (sec)->this_hdr.contents;
3815 else
3816 {
3817 if (!bfd_malloc_and_get_section (abfd, sec, &info.contents))
3818 goto error_return;
3819 }
252b5132 3820
a7519a3c
RH
3821 for (irel = internal_relocs; irel < irelend; irel++)
3822 {
3823 bfd_vma symval;
3824 struct alpha_elf_got_entry *gotent;
3825 unsigned long r_type = ELF64_R_TYPE (irel->r_info);
3826 unsigned long r_symndx = ELF64_R_SYM (irel->r_info);
3827
3828 /* Early exit for unhandled or unrelaxable relocations. */
d1c109de 3829 if (r_type != R_ALPHA_LITERAL)
07d6d2b8
AM
3830 {
3831 /* We complete everything except LITERAL in the first pass. */
d1c109de
RH
3832 if (relax_pass != 0)
3833 continue;
3834 if (r_type == R_ALPHA_TLSLDM)
3835 {
3836 /* The symbol for a TLSLDM reloc is ignored. Collapse the
07d6d2b8 3837 reloc to the STN_UNDEF (0) symbol so that they all match. */
d1c109de
RH
3838 r_symndx = STN_UNDEF;
3839 }
3840 else if (r_type != R_ALPHA_GOTDTPREL
07d6d2b8 3841 && r_type != R_ALPHA_GOTTPREL
d1c109de
RH
3842 && r_type != R_ALPHA_TLSGD)
3843 continue;
a7519a3c
RH
3844 }
3845
3846 /* Get the value of the symbol referred to by the reloc. */
3847 if (r_symndx < symtab_hdr->sh_info)
3848 {
3849 /* A local symbol. */
3850 Elf_Internal_Sym *isym;
3851
3852 /* Read this BFD's local symbols. */
3853 if (isymbuf == NULL)
3854 {
3855 isymbuf = (Elf_Internal_Sym *) symtab_hdr->contents;
3856 if (isymbuf == NULL)
3857 isymbuf = bfd_elf_get_elf_syms (abfd, symtab_hdr,
3858 symtab_hdr->sh_info, 0,
3859 NULL, NULL, NULL);
3860 if (isymbuf == NULL)
3861 goto error_return;
3862 }
252b5132 3863
a7519a3c 3864 isym = isymbuf + r_symndx;
252b5132 3865
a7519a3c
RH
3866 /* Given the symbol for a TLSLDM reloc is ignored, this also
3867 means forcing the symbol value to the tp base. */
3868 if (r_type == R_ALPHA_TLSLDM)
3869 {
3870 info.tsec = bfd_abs_section_ptr;
3871 symval = alpha_get_tprel_base (info.link_info);
3872 }
3873 else
3874 {
3875 symval = isym->st_value;
3876 if (isym->st_shndx == SHN_UNDEF)
07d6d2b8 3877 continue;
a7519a3c 3878 else if (isym->st_shndx == SHN_ABS)
07d6d2b8 3879 info.tsec = bfd_abs_section_ptr;
a7519a3c 3880 else if (isym->st_shndx == SHN_COMMON)
07d6d2b8 3881 info.tsec = bfd_com_section_ptr;
a7519a3c 3882 else
07d6d2b8 3883 info.tsec = bfd_section_from_elf_index (abfd, isym->st_shndx);
a7519a3c 3884 }
252b5132 3885
a7519a3c
RH
3886 info.h = NULL;
3887 info.other = isym->st_other;
3888 if (local_got_entries)
3889 info.first_gotent = &local_got_entries[r_symndx];
3890 else
3891 {
3892 info.first_gotent = &info.gotent;
3893 info.gotent = NULL;
3894 }
252b5132 3895 }
a7519a3c
RH
3896 else
3897 {
3898 unsigned long indx;
3899 struct alpha_elf_link_hash_entry *h;
252b5132 3900
a7519a3c
RH
3901 indx = r_symndx - symtab_hdr->sh_info;
3902 h = alpha_elf_sym_hashes (abfd)[indx];
3903 BFD_ASSERT (h != NULL);
252b5132 3904
a7519a3c
RH
3905 while (h->root.root.type == bfd_link_hash_indirect
3906 || h->root.root.type == bfd_link_hash_warning)
3907 h = (struct alpha_elf_link_hash_entry *)h->root.root.u.i.link;
252b5132 3908
a7519a3c
RH
3909 /* If the symbol is undefined, we can't do anything with it. */
3910 if (h->root.root.type == bfd_link_hash_undefined)
3911 continue;
252b5132 3912
a7519a3c
RH
3913 /* If the symbol isn't defined in the current module,
3914 again we can't do anything. */
3915 if (h->root.root.type == bfd_link_hash_undefweak)
3916 {
3917 info.tsec = bfd_abs_section_ptr;
3918 symval = 0;
3919 }
3920 else if (!h->root.def_regular)
3921 {
3922 /* Except for TLSGD relocs, which can sometimes be
3923 relaxed to GOTTPREL relocs. */
3924 if (r_type != R_ALPHA_TLSGD)
3925 continue;
3926 info.tsec = bfd_abs_section_ptr;
3927 symval = 0;
3928 }
3929 else
3930 {
3931 info.tsec = h->root.root.u.def.section;
3932 symval = h->root.root.u.def.value;
3933 }
252b5132 3934
a7519a3c
RH
3935 info.h = h;
3936 info.other = h->root.other;
3937 info.first_gotent = &h->got_entries;
3938 }
252b5132 3939
a7519a3c
RH
3940 /* Search for the got entry to be used by this relocation. */
3941 for (gotent = *info.first_gotent; gotent ; gotent = gotent->next)
3942 if (gotent->gotobj == info.gotobj
3943 && gotent->reloc_type == r_type
3944 && gotent->addend == irel->r_addend)
3945 break;
3946 info.gotent = gotent;
252b5132 3947
a7519a3c
RH
3948 symval += info.tsec->output_section->vma + info.tsec->output_offset;
3949 symval += irel->r_addend;
252b5132 3950
a7519a3c 3951 switch (r_type)
252b5132 3952 {
a7519a3c
RH
3953 case R_ALPHA_LITERAL:
3954 BFD_ASSERT(info.gotent != NULL);
252b5132 3955
a7519a3c
RH
3956 /* If there exist LITUSE relocations immediately following, this
3957 opens up all sorts of interesting optimizations, because we
3958 now know every location that this address load is used. */
3959 if (irel+1 < irelend
3960 && ELF64_R_TYPE (irel[1].r_info) == R_ALPHA_LITUSE)
252b5132 3961 {
a7519a3c
RH
3962 if (!elf64_alpha_relax_with_lituse (&info, symval, irel))
3963 goto error_return;
252b5132 3964 }
a7519a3c
RH
3965 else
3966 {
3967 if (!elf64_alpha_relax_got_load (&info, symval, irel, r_type))
3968 goto error_return;
3969 }
3970 break;
252b5132 3971
a7519a3c
RH
3972 case R_ALPHA_GOTDTPREL:
3973 case R_ALPHA_GOTTPREL:
3974 BFD_ASSERT(info.gotent != NULL);
3975 if (!elf64_alpha_relax_got_load (&info, symval, irel, r_type))
3976 goto error_return;
3977 break;
3978
3979 case R_ALPHA_TLSGD:
3980 case R_ALPHA_TLSLDM:
3981 BFD_ASSERT(info.gotent != NULL);
3982 if (!elf64_alpha_relax_tls_get_addr (&info, symval, irel,
3983 r_type == R_ALPHA_TLSGD))
3984 goto error_return;
3985 break;
252b5132
RH
3986 }
3987 }
3988
a7519a3c
RH
3989 if (isymbuf != NULL
3990 && symtab_hdr->contents != (unsigned char *) isymbuf)
3991 {
3992 if (!link_info->keep_memory)
3993 free (isymbuf);
3994 else
252b5132 3995 {
a7519a3c
RH
3996 /* Cache the symbols for elf_link_input_bfd. */
3997 symtab_hdr->contents = (unsigned char *) isymbuf;
252b5132 3998 }
a7519a3c 3999 }
252b5132 4000
a7519a3c
RH
4001 if (info.contents != NULL
4002 && elf_section_data (sec)->this_hdr.contents != info.contents)
4003 {
4004 if (!info.changed_contents && !link_info->keep_memory)
4005 free (info.contents);
4006 else
252b5132 4007 {
a7519a3c
RH
4008 /* Cache the section contents for elf_link_input_bfd. */
4009 elf_section_data (sec)->this_hdr.contents = info.contents;
252b5132 4010 }
a7519a3c 4011 }
252b5132 4012
a7519a3c
RH
4013 if (elf_section_data (sec)->relocs != internal_relocs)
4014 {
4015 if (!info.changed_relocs)
4016 free (internal_relocs);
4017 else
4018 elf_section_data (sec)->relocs = internal_relocs;
252b5132 4019 }
a7519a3c
RH
4020
4021 *again = info.changed_contents || info.changed_relocs;
252b5132 4022
b34976b6 4023 return TRUE;
252b5132 4024
a7519a3c 4025 error_return:
c9594989 4026 if (symtab_hdr->contents != (unsigned char *) isymbuf)
a7519a3c 4027 free (isymbuf);
c9594989 4028 if (elf_section_data (sec)->this_hdr.contents != info.contents)
a7519a3c 4029 free (info.contents);
c9594989 4030 if (elf_section_data (sec)->relocs != internal_relocs)
a7519a3c
RH
4031 free (internal_relocs);
4032 return FALSE;
4033}
4034\f
1bbc9cec
RH
4035/* Emit a dynamic relocation for (DYNINDX, RTYPE, ADDEND) at (SEC, OFFSET)
4036 into the next available slot in SREL. */
4037
4038static void
a7519a3c
RH
4039elf64_alpha_emit_dynrel (bfd *abfd, struct bfd_link_info *info,
4040 asection *sec, asection *srel, bfd_vma offset,
4041 long dynindx, long rtype, bfd_vma addend)
1bbc9cec
RH
4042{
4043 Elf_Internal_Rela outrel;
4044 bfd_byte *loc;
4045
4046 BFD_ASSERT (srel != NULL);
4047
4048 outrel.r_info = ELF64_R_INFO (dynindx, rtype);
4049 outrel.r_addend = addend;
4050
4051 offset = _bfd_elf_section_offset (abfd, info, sec, offset);
4052 if ((offset | 1) != (bfd_vma) -1)
4053 outrel.r_offset = sec->output_section->vma + sec->output_offset + offset;
4054 else
4055 memset (&outrel, 0, sizeof (outrel));
4056
4057 loc = srel->contents;
4058 loc += srel->reloc_count++ * sizeof (Elf64_External_Rela);
4059 bfd_elf64_swap_reloca_out (abfd, &outrel, loc);
eea6121a 4060 BFD_ASSERT (sizeof (Elf64_External_Rela) * srel->reloc_count <= srel->size);
1bbc9cec
RH
4061}
4062
4a67a098
RH
4063/* Relocate an Alpha ELF section for a relocatable link.
4064
4065 We don't have to change anything unless the reloc is against a section
4066 symbol, in which case we have to adjust according to where the section
4067 symbol winds up in the output section. */
4068
b34976b6 4069static bfd_boolean
a7519a3c
RH
4070elf64_alpha_relocate_section_r (bfd *output_bfd ATTRIBUTE_UNUSED,
4071 struct bfd_link_info *info ATTRIBUTE_UNUSED,
4072 bfd *input_bfd, asection *input_section,
4073 bfd_byte *contents ATTRIBUTE_UNUSED,
4074 Elf_Internal_Rela *relocs,
4075 Elf_Internal_Sym *local_syms,
4076 asection **local_sections)
4a67a098
RH
4077{
4078 unsigned long symtab_hdr_sh_info;
4079 Elf_Internal_Rela *rel;
4080 Elf_Internal_Rela *relend;
ab96bf03 4081 struct elf_link_hash_entry **sym_hashes;
b34976b6 4082 bfd_boolean ret_val = TRUE;
4a67a098 4083
0ffa91dd 4084 symtab_hdr_sh_info = elf_symtab_hdr (input_bfd).sh_info;
ab96bf03 4085 sym_hashes = elf_sym_hashes (input_bfd);
4a67a098
RH
4086
4087 relend = relocs + input_section->reloc_count;
4088 for (rel = relocs; rel < relend; rel++)
4089 {
4090 unsigned long r_symndx;
4091 Elf_Internal_Sym *sym;
4092 asection *sec;
4093 unsigned long r_type;
4094
ab96bf03 4095 r_type = ELF64_R_TYPE (rel->r_info);
4a67a098
RH
4096 if (r_type >= R_ALPHA_max)
4097 {
4eca0228 4098 _bfd_error_handler
695344c0 4099 /* xgettext:c-format */
0aa13fee 4100 (_("%pB: unsupported relocation type %#x"),
d003868e 4101 input_bfd, (int) r_type);
4a67a098 4102 bfd_set_error (bfd_error_bad_value);
b34976b6 4103 ret_val = FALSE;
4a67a098
RH
4104 continue;
4105 }
4106
4a67a098
RH
4107 /* The symbol associated with GPDISP and LITUSE is
4108 immaterial. Only the addend is significant. */
4109 if (r_type == R_ALPHA_GPDISP || r_type == R_ALPHA_LITUSE)
4110 continue;
4111
ab96bf03 4112 r_symndx = ELF64_R_SYM (rel->r_info);
4a67a098
RH
4113 if (r_symndx < symtab_hdr_sh_info)
4114 {
4115 sym = local_syms + r_symndx;
ab96bf03 4116 sec = local_sections[r_symndx];
4a67a098 4117 }
ab96bf03
AM
4118 else
4119 {
4120 struct elf_link_hash_entry *h;
4121
4122 h = sym_hashes[r_symndx - symtab_hdr_sh_info];
4123
4124 while (h->root.type == bfd_link_hash_indirect
4125 || h->root.type == bfd_link_hash_warning)
4126 h = (struct elf_link_hash_entry *) h->root.u.i.link;
4127
4128 if (h->root.type != bfd_link_hash_defined
4129 && h->root.type != bfd_link_hash_defweak)
4130 continue;
4131
4132 sym = NULL;
4133 sec = h->root.u.def.section;
4134 }
4135
dbaa2011 4136 if (sec != NULL && discarded_section (sec))
e4067dbb 4137 RELOC_AGAINST_DISCARDED_SECTION (info, input_bfd, input_section,
545fd46b
MR
4138 rel, 1, relend,
4139 elf64_alpha_howto_table + r_type, 0,
e4067dbb 4140 contents);
ab96bf03
AM
4141
4142 if (sym != NULL && ELF_ST_TYPE (sym->st_info) == STT_SECTION)
4143 rel->r_addend += sec->output_offset;
4a67a098
RH
4144 }
4145
4146 return ret_val;
4147}
4148
252b5132
RH
4149/* Relocate an Alpha ELF section. */
4150
b34976b6 4151static bfd_boolean
a7519a3c
RH
4152elf64_alpha_relocate_section (bfd *output_bfd, struct bfd_link_info *info,
4153 bfd *input_bfd, asection *input_section,
4154 bfd_byte *contents, Elf_Internal_Rela *relocs,
4155 Elf_Internal_Sym *local_syms,
4156 asection **local_sections)
252b5132 4157{
4a67a098 4158 Elf_Internal_Shdr *symtab_hdr;
252b5132
RH
4159 Elf_Internal_Rela *rel;
4160 Elf_Internal_Rela *relend;
4a67a098
RH
4161 asection *sgot, *srel, *srelgot;
4162 bfd *dynobj, *gotobj;
4163 bfd_vma gp, tp_base, dtp_base;
4164 struct alpha_elf_got_entry **local_got_entries;
b34976b6 4165 bfd_boolean ret_val;
252b5132 4166
0ffa91dd 4167 BFD_ASSERT (is_alpha_elf (input_bfd));
68ffbac6 4168
4a67a098 4169 /* Handle relocatable links with a smaller loop. */
0e1862bb 4170 if (bfd_link_relocatable (info))
4a67a098
RH
4171 return elf64_alpha_relocate_section_r (output_bfd, info, input_bfd,
4172 input_section, contents, relocs,
4173 local_syms, local_sections);
4174
4175 /* This is a final link. */
4176
b34976b6 4177 ret_val = TRUE;
252b5132 4178
0ffa91dd 4179 symtab_hdr = &elf_symtab_hdr (input_bfd);
3765b1be 4180
4a67a098 4181 dynobj = elf_hash_table (info)->dynobj;
ce558b89 4182 srelgot = elf_hash_table (info)->srelgot;
4a67a098 4183
3241278a
RH
4184 if (input_section->flags & SEC_ALLOC)
4185 {
4186 const char *section_name;
4187 section_name = (bfd_elf_string_from_elf_section
4188 (input_bfd, elf_elfheader(input_bfd)->e_shstrndx,
d4730f92 4189 _bfd_elf_single_rel_hdr (input_section)->sh_name));
3241278a 4190 BFD_ASSERT(section_name != NULL);
3d4d4302 4191 srel = bfd_get_linker_section (dynobj, section_name);
3241278a
RH
4192 }
4193 else
4194 srel = NULL;
3765b1be 4195
4a67a098
RH
4196 /* Find the gp value for this input bfd. */
4197 gotobj = alpha_elf_tdata (input_bfd)->gotobj;
4198 if (gotobj)
4199 {
4200 sgot = alpha_elf_tdata (gotobj)->got;
4201 gp = _bfd_get_gp_value (gotobj);
4202 if (gp == 0)
252b5132 4203 {
4a67a098
RH
4204 gp = (sgot->output_section->vma
4205 + sgot->output_offset
4206 + 0x8000);
4207 _bfd_set_gp_value (gotobj, gp);
4208 }
4209 }
4210 else
4211 {
4212 sgot = NULL;
4213 gp = 0;
4214 }
3765b1be 4215
4a67a098
RH
4216 local_got_entries = alpha_elf_tdata(input_bfd)->local_got_entries;
4217
e1918d23 4218 if (elf_hash_table (info)->tls_sec != NULL)
4a67a098 4219 {
e1918d23
AM
4220 dtp_base = alpha_get_dtprel_base (info);
4221 tp_base = alpha_get_tprel_base (info);
252b5132 4222 }
4a67a098
RH
4223 else
4224 dtp_base = tp_base = 0;
252b5132 4225
252b5132 4226 relend = relocs + input_section->reloc_count;
4a67a098 4227 for (rel = relocs; rel < relend; rel++)
252b5132 4228 {
4a67a098 4229 struct alpha_elf_link_hash_entry *h = NULL;
3765b1be
RH
4230 struct alpha_elf_got_entry *gotent;
4231 bfd_reloc_status_type r;
252b5132
RH
4232 reloc_howto_type *howto;
4233 unsigned long r_symndx;
4a67a098
RH
4234 Elf_Internal_Sym *sym = NULL;
4235 asection *sec = NULL;
3765b1be 4236 bfd_vma value;
dc810e39 4237 bfd_vma addend;
b34976b6 4238 bfd_boolean dynamic_symbol_p;
1d5316ab 4239 bfd_boolean unresolved_reloc = FALSE;
b34976b6 4240 bfd_boolean undef_weak_ref = FALSE;
3765b1be 4241 unsigned long r_type;
252b5132
RH
4242
4243 r_type = ELF64_R_TYPE(rel->r_info);
3765b1be 4244 if (r_type >= R_ALPHA_max)
252b5132 4245 {
4eca0228 4246 _bfd_error_handler
695344c0 4247 /* xgettext:c-format */
0aa13fee 4248 (_("%pB: unsupported relocation type %#x"),
d003868e 4249 input_bfd, (int) r_type);
252b5132 4250 bfd_set_error (bfd_error_bad_value);
b34976b6 4251 ret_val = FALSE;
3765b1be 4252 continue;
252b5132 4253 }
252b5132 4254
3765b1be 4255 howto = elf64_alpha_howto_table + r_type;
252b5132
RH
4256 r_symndx = ELF64_R_SYM(rel->r_info);
4257
cc03ec80 4258 /* The symbol for a TLSLDM reloc is ignored. Collapse the
cf35638d 4259 reloc to the STN_UNDEF (0) symbol so that they all match. */
cc03ec80 4260 if (r_type == R_ALPHA_TLSLDM)
cf35638d 4261 r_symndx = STN_UNDEF;
cc03ec80 4262
252b5132
RH
4263 if (r_symndx < symtab_hdr->sh_info)
4264 {
8517fae7 4265 asection *msec;
252b5132
RH
4266 sym = local_syms + r_symndx;
4267 sec = local_sections[r_symndx];
8517fae7
AM
4268 msec = sec;
4269 value = _bfd_elf_rela_local_sym (output_bfd, sym, &msec, rel);
3765b1be 4270
cf35638d 4271 /* If this is a tp-relative relocation against sym STN_UNDEF (0),
cc03ec80 4272 this is hackery from relax_section. Force the value to
f915360b 4273 be the tls module base. */
cf35638d 4274 if (r_symndx == STN_UNDEF
cc03ec80
RH
4275 && (r_type == R_ALPHA_TLSLDM
4276 || r_type == R_ALPHA_GOTTPREL
4277 || r_type == R_ALPHA_TPREL64
4278 || r_type == R_ALPHA_TPRELHI
4279 || r_type == R_ALPHA_TPRELLO
4280 || r_type == R_ALPHA_TPREL16))
f915360b 4281 value = dtp_base;
cc03ec80 4282
4a67a098
RH
4283 if (local_got_entries)
4284 gotent = local_got_entries[r_symndx];
4285 else
4286 gotent = NULL;
3765b1be
RH
4287
4288 /* Need to adjust local GOT entries' addends for SEC_MERGE
4289 unless it has been done already. */
4290 if ((sec->flags & SEC_MERGE)
048d873d 4291 && ELF_ST_TYPE (sym->st_info) == STT_SECTION
dbaa2011 4292 && sec->sec_info_type == SEC_INFO_TYPE_MERGE
048d873d
RH
4293 && gotent
4294 && !gotent->reloc_xlated)
3765b1be
RH
4295 {
4296 struct alpha_elf_got_entry *ent;
3765b1be
RH
4297
4298 for (ent = gotent; ent; ent = ent->next)
4299 {
4300 ent->reloc_xlated = 1;
4301 if (ent->use_count == 0)
4302 continue;
4303 msec = sec;
4304 ent->addend =
4305 _bfd_merged_section_offset (output_bfd, &msec,
4306 elf_section_data (sec)->
4307 sec_info,
753731ee 4308 sym->st_value + ent->addend);
3765b1be
RH
4309 ent->addend -= sym->st_value;
4310 ent->addend += msec->output_section->vma
4311 + msec->output_offset
4312 - sec->output_section->vma
4313 - sec->output_offset;
4314 }
4315 }
4316
b34976b6 4317 dynamic_symbol_p = FALSE;
252b5132
RH
4318 }
4319 else
4320 {
62d887d4 4321 bfd_boolean warned, ignored;
560e09e9 4322 struct elf_link_hash_entry *hh;
b2a8e766
AM
4323 struct elf_link_hash_entry **sym_hashes = elf_sym_hashes (input_bfd);
4324
4325 RELOC_FOR_GLOBAL_SYMBOL (info, input_bfd, input_section, rel,
4326 r_symndx, symtab_hdr, sym_hashes,
4327 hh, sec, value,
62d887d4 4328 unresolved_reloc, warned, ignored);
560e09e9
NC
4329
4330 if (warned)
4331 continue;
252b5132 4332
560e09e9
NC
4333 if (value == 0
4334 && ! unresolved_reloc
4335 && hh->root.type == bfd_link_hash_undefweak)
b34976b6 4336 undef_weak_ref = TRUE;
3765b1be 4337
560e09e9 4338 h = (struct alpha_elf_link_hash_entry *) hh;
07d6d2b8 4339 dynamic_symbol_p = alpha_elf_dynamic_symbol_p (&h->root, info);
3765b1be 4340 gotent = h->got_entries;
252b5132 4341 }
3765b1be 4342
dbaa2011 4343 if (sec != NULL && discarded_section (sec))
e4067dbb 4344 RELOC_AGAINST_DISCARDED_SECTION (info, input_bfd, input_section,
545fd46b 4345 rel, 1, relend, howto, 0, contents);
ab96bf03 4346
252b5132 4347 addend = rel->r_addend;
3765b1be
RH
4348 value += addend;
4349
4350 /* Search for the proper got entry. */
4351 for (; gotent ; gotent = gotent->next)
4352 if (gotent->gotobj == gotobj
4353 && gotent->reloc_type == r_type
4354 && gotent->addend == addend)
4355 break;
252b5132
RH
4356
4357 switch (r_type)
4358 {
4359 case R_ALPHA_GPDISP:
4360 {
4361 bfd_byte *p_ldah, *p_lda;
4362
4363 BFD_ASSERT(gp != 0);
4364
3765b1be
RH
4365 value = (input_section->output_section->vma
4366 + input_section->output_offset
4367 + rel->r_offset);
252b5132 4368
3765b1be 4369 p_ldah = contents + rel->r_offset;
252b5132
RH
4370 p_lda = p_ldah + rel->r_addend;
4371
3765b1be 4372 r = elf64_alpha_do_reloc_gpdisp (input_bfd, gp - value,
252b5132
RH
4373 p_ldah, p_lda);
4374 }
4375 break;
4376
252b5132 4377 case R_ALPHA_LITERAL:
3765b1be
RH
4378 BFD_ASSERT(sgot != NULL);
4379 BFD_ASSERT(gp != 0);
4380 BFD_ASSERT(gotent != NULL);
4381 BFD_ASSERT(gotent->use_count >= 1);
f7460f5f 4382
3765b1be
RH
4383 if (!gotent->reloc_done)
4384 {
4385 gotent->reloc_done = 1;
252b5132 4386
3765b1be
RH
4387 bfd_put_64 (output_bfd, value,
4388 sgot->contents + gotent->got_offset);
252b5132 4389
3765b1be
RH
4390 /* If the symbol has been forced local, output a
4391 RELATIVE reloc, otherwise it will be handled in
4392 finish_dynamic_symbol. */
0e1862bb
L
4393 if (bfd_link_pic (info)
4394 && !dynamic_symbol_p
4395 && !undef_weak_ref)
1bbc9cec
RH
4396 elf64_alpha_emit_dynrel (output_bfd, info, sgot, srelgot,
4397 gotent->got_offset, 0,
4398 R_ALPHA_RELATIVE, value);
3765b1be 4399 }
252b5132 4400
3765b1be
RH
4401 value = (sgot->output_section->vma
4402 + sgot->output_offset
4403 + gotent->got_offset);
4404 value -= gp;
252b5132
RH
4405 goto default_reloc;
4406
4407 case R_ALPHA_GPREL32:
ec1659c8 4408 case R_ALPHA_GPREL16:
252b5132 4409 case R_ALPHA_GPRELLOW:
3765b1be 4410 if (dynamic_symbol_p)
07d6d2b8 4411 {
4eca0228 4412 _bfd_error_handler
695344c0 4413 /* xgettext:c-format */
871b3ab2 4414 (_("%pB: gp-relative relocation against dynamic symbol %s"),
07d6d2b8
AM
4415 input_bfd, h->root.root.root.string);
4416 ret_val = FALSE;
4417 }
252b5132 4418 BFD_ASSERT(gp != 0);
3765b1be 4419 value -= gp;
252b5132
RH
4420 goto default_reloc;
4421
4422 case R_ALPHA_GPRELHIGH:
3765b1be 4423 if (dynamic_symbol_p)
07d6d2b8 4424 {
4eca0228 4425 _bfd_error_handler
695344c0 4426 /* xgettext:c-format */
871b3ab2 4427 (_("%pB: gp-relative relocation against dynamic symbol %s"),
07d6d2b8
AM
4428 input_bfd, h->root.root.root.string);
4429 ret_val = FALSE;
4430 }
252b5132 4431 BFD_ASSERT(gp != 0);
3765b1be
RH
4432 value -= gp;
4433 value = ((bfd_signed_vma) value >> 16) + ((value >> 15) & 1);
252b5132
RH
4434 goto default_reloc;
4435
252b5132 4436 case R_ALPHA_HINT:
f94952df
RH
4437 /* A call to a dynamic symbol is definitely out of range of
4438 the 16-bit displacement. Don't bother writing anything. */
3765b1be 4439 if (dynamic_symbol_p)
f94952df
RH
4440 {
4441 r = bfd_reloc_ok;
4442 break;
4443 }
3765b1be
RH
4444 /* The regular PC-relative stuff measures from the start of
4445 the instruction rather than the end. */
4446 value -= 4;
4447 goto default_reloc;
f94952df
RH
4448
4449 case R_ALPHA_BRADDR:
3765b1be 4450 if (dynamic_symbol_p)
07d6d2b8 4451 {
4eca0228 4452 _bfd_error_handler
695344c0 4453 /* xgettext:c-format */
871b3ab2 4454 (_("%pB: pc-relative relocation against dynamic symbol %s"),
07d6d2b8
AM
4455 input_bfd, h->root.root.root.string);
4456 ret_val = FALSE;
4457 }
252b5132
RH
4458 /* The regular PC-relative stuff measures from the start of
4459 the instruction rather than the end. */
3765b1be 4460 value -= 4;
252b5132
RH
4461 goto default_reloc;
4462
7793f4d0
RH
4463 case R_ALPHA_BRSGP:
4464 {
4465 int other;
4466 const char *name;
4467
4468 /* The regular PC-relative stuff measures from the start of
4469 the instruction rather than the end. */
3765b1be 4470 value -= 4;
7793f4d0 4471
ccf00ab6
RH
4472 /* The source and destination gp must be the same. Note that
4473 the source will always have an assigned gp, since we forced
4474 one in check_relocs, but that the destination may not, as
cedb70c5 4475 it might not have had any relocations at all. Also take
ccf00ab6
RH
4476 care not to crash if H is an undefined symbol. */
4477 if (h != NULL && sec != NULL
4478 && alpha_elf_tdata (sec->owner)->gotobj
7793f4d0
RH
4479 && gotobj != alpha_elf_tdata (sec->owner)->gotobj)
4480 {
4eca0228 4481 _bfd_error_handler
695344c0 4482 /* xgettext:c-format */
871b3ab2 4483 (_("%pB: change in gp: BRSGP %s"),
d003868e 4484 input_bfd, h->root.root.root.string);
b34976b6 4485 ret_val = FALSE;
7793f4d0
RH
4486 }
4487
4488 /* The symbol should be marked either NOPV or STD_GPLOAD. */
4489 if (h != NULL)
4490 other = h->root.other;
4491 else
4492 other = sym->st_other;
4493 switch (other & STO_ALPHA_STD_GPLOAD)
4494 {
4495 case STO_ALPHA_NOPV:
07d6d2b8 4496 break;
7793f4d0 4497 case STO_ALPHA_STD_GPLOAD:
64e04ecd 4498 value += 8;
7793f4d0
RH
4499 break;
4500 default:
4501 if (h != NULL)
4502 name = h->root.root.root.string;
4503 else
4504 {
4505 name = (bfd_elf_string_from_elf_section
4506 (input_bfd, symtab_hdr->sh_link, sym->st_name));
4507 if (name == NULL)
4508 name = _("<unknown>");
4509 else if (name[0] == 0)
fd361982 4510 name = bfd_section_name (sec);
7793f4d0 4511 }
4eca0228 4512 _bfd_error_handler
695344c0 4513 /* xgettext:c-format */
871b3ab2 4514 (_("%pB: !samegp reloc against symbol without .prologue: %s"),
d003868e 4515 input_bfd, name);
b34976b6 4516 ret_val = FALSE;
7793f4d0
RH
4517 break;
4518 }
4519
4520 goto default_reloc;
4521 }
4522
252b5132
RH
4523 case R_ALPHA_REFLONG:
4524 case R_ALPHA_REFQUAD:
3765b1be
RH
4525 case R_ALPHA_DTPREL64:
4526 case R_ALPHA_TPREL64:
252b5132 4527 {
1bbc9cec
RH
4528 long dynindx, dyntype = r_type;
4529 bfd_vma dynaddend;
252b5132
RH
4530
4531 /* Careful here to remember RELATIVE relocations for global
4532 variables for symbolic shared objects. */
4533
3765b1be 4534 if (dynamic_symbol_p)
252b5132
RH
4535 {
4536 BFD_ASSERT(h->root.dynindx != -1);
1bbc9cec
RH
4537 dynindx = h->root.dynindx;
4538 dynaddend = addend;
3765b1be
RH
4539 addend = 0, value = 0;
4540 }
4541 else if (r_type == R_ALPHA_DTPREL64)
4542 {
e1918d23 4543 BFD_ASSERT (elf_hash_table (info)->tls_sec != NULL);
3765b1be
RH
4544 value -= dtp_base;
4545 goto default_reloc;
4546 }
4547 else if (r_type == R_ALPHA_TPREL64)
4548 {
e1918d23 4549 BFD_ASSERT (elf_hash_table (info)->tls_sec != NULL);
3cbc1e5e 4550 if (!bfd_link_dll (info))
1bbc9cec
RH
4551 {
4552 value -= tp_base;
4553 goto default_reloc;
4554 }
4555 dynindx = 0;
4556 dynaddend = value - dtp_base;
252b5132 4557 }
0e1862bb 4558 else if (bfd_link_pic (info)
cf35638d 4559 && r_symndx != STN_UNDEF
d6ad34f6 4560 && (input_section->flags & SEC_ALLOC)
1d5316ab
AM
4561 && !undef_weak_ref
4562 && !(unresolved_reloc
4563 && (_bfd_elf_section_offset (output_bfd, info,
4564 input_section,
4565 rel->r_offset)
4566 == (bfd_vma) -1)))
252b5132 4567 {
3765b1be
RH
4568 if (r_type == R_ALPHA_REFLONG)
4569 {
4eca0228 4570 _bfd_error_handler
695344c0 4571 /* xgettext:c-format */
871b3ab2 4572 (_("%pB: unhandled dynamic relocation against %s"),
d003868e 4573 input_bfd,
3765b1be 4574 h->root.root.root.string);
b34976b6 4575 ret_val = FALSE;
3765b1be 4576 }
1bbc9cec
RH
4577 dynindx = 0;
4578 dyntype = R_ALPHA_RELATIVE;
4579 dynaddend = value;
252b5132
RH
4580 }
4581 else
4582 goto default_reloc;
4583
3241278a
RH
4584 if (input_section->flags & SEC_ALLOC)
4585 elf64_alpha_emit_dynrel (output_bfd, info, input_section,
4586 srel, rel->r_offset, dynindx,
4587 dyntype, dynaddend);
252b5132
RH
4588 }
4589 goto default_reloc;
4590
3765b1be 4591 case R_ALPHA_SREL16:
84de6048
RH
4592 case R_ALPHA_SREL32:
4593 case R_ALPHA_SREL64:
3765b1be 4594 if (dynamic_symbol_p)
07d6d2b8 4595 {
4eca0228 4596 _bfd_error_handler
695344c0 4597 /* xgettext:c-format */
871b3ab2 4598 (_("%pB: pc-relative relocation against dynamic symbol %s"),
07d6d2b8
AM
4599 input_bfd, h->root.root.root.string);
4600 ret_val = FALSE;
4601 }
3cbc1e5e 4602 else if (bfd_link_pic (info)
0e1862bb 4603 && undef_weak_ref)
07d6d2b8 4604 {
4eca0228 4605 _bfd_error_handler
695344c0 4606 /* xgettext:c-format */
871b3ab2 4607 (_("%pB: pc-relative relocation against undefined weak symbol %s"),
07d6d2b8
AM
4608 input_bfd, h->root.root.root.string);
4609 ret_val = FALSE;
4610 }
d6ad34f6 4611
3765b1be 4612
84de6048
RH
4613 /* ??? .eh_frame references to discarded sections will be smashed
4614 to relocations against SHN_UNDEF. The .eh_frame format allows
4615 NULL to be encoded as 0 in any format, so this works here. */
1d5316ab
AM
4616 if (r_symndx == STN_UNDEF
4617 || (unresolved_reloc
4618 && _bfd_elf_section_offset (output_bfd, info,
4619 input_section,
4620 rel->r_offset) == (bfd_vma) -1))
84de6048
RH
4621 howto = (elf64_alpha_howto_table
4622 + (r_type - R_ALPHA_SREL32 + R_ALPHA_REFLONG));
4623 goto default_reloc;
4624
3765b1be
RH
4625 case R_ALPHA_TLSLDM:
4626 /* Ignore the symbol for the relocation. The result is always
4627 the current module. */
4628 dynamic_symbol_p = 0;
4629 /* FALLTHRU */
4630
4631 case R_ALPHA_TLSGD:
4632 if (!gotent->reloc_done)
4633 {
4634 gotent->reloc_done = 1;
4635
4636 /* Note that the module index for the main program is 1. */
0e1862bb
L
4637 bfd_put_64 (output_bfd,
4638 !bfd_link_pic (info) && !dynamic_symbol_p,
3765b1be
RH
4639 sgot->contents + gotent->got_offset);
4640
4641 /* If the symbol has been forced local, output a
4642 DTPMOD64 reloc, otherwise it will be handled in
4643 finish_dynamic_symbol. */
0e1862bb 4644 if (bfd_link_pic (info) && !dynamic_symbol_p)
1bbc9cec
RH
4645 elf64_alpha_emit_dynrel (output_bfd, info, sgot, srelgot,
4646 gotent->got_offset, 0,
4647 R_ALPHA_DTPMOD64, 0);
3765b1be
RH
4648
4649 if (dynamic_symbol_p || r_type == R_ALPHA_TLSLDM)
4650 value = 0;
4651 else
4652 {
e1918d23 4653 BFD_ASSERT (elf_hash_table (info)->tls_sec != NULL);
07d6d2b8 4654 value -= dtp_base;
3765b1be
RH
4655 }
4656 bfd_put_64 (output_bfd, value,
4657 sgot->contents + gotent->got_offset + 8);
4658 }
4659
4660 value = (sgot->output_section->vma
4661 + sgot->output_offset
4662 + gotent->got_offset);
4663 value -= gp;
4664 goto default_reloc;
4665
4666 case R_ALPHA_DTPRELHI:
4667 case R_ALPHA_DTPRELLO:
4668 case R_ALPHA_DTPREL16:
4669 if (dynamic_symbol_p)
07d6d2b8 4670 {
4eca0228 4671 _bfd_error_handler
695344c0 4672 /* xgettext:c-format */
871b3ab2 4673 (_("%pB: dtp-relative relocation against dynamic symbol %s"),
07d6d2b8
AM
4674 input_bfd, h->root.root.root.string);
4675 ret_val = FALSE;
4676 }
e1918d23 4677 BFD_ASSERT (elf_hash_table (info)->tls_sec != NULL);
3765b1be 4678 value -= dtp_base;
9e756d64
RH
4679 if (r_type == R_ALPHA_DTPRELHI)
4680 value = ((bfd_signed_vma) value >> 16) + ((value >> 15) & 1);
3765b1be
RH
4681 goto default_reloc;
4682
4683 case R_ALPHA_TPRELHI:
4684 case R_ALPHA_TPRELLO:
4685 case R_ALPHA_TPREL16:
3cbc1e5e 4686 if (bfd_link_dll (info))
9e756d64 4687 {
4eca0228 4688 _bfd_error_handler
695344c0 4689 /* xgettext:c-format */
871b3ab2 4690 (_("%pB: TLS local exec code cannot be linked into shared objects"),
d003868e 4691 input_bfd);
07d6d2b8 4692 ret_val = FALSE;
9e756d64
RH
4693 }
4694 else if (dynamic_symbol_p)
07d6d2b8 4695 {
4eca0228 4696 _bfd_error_handler
695344c0 4697 /* xgettext:c-format */
871b3ab2 4698 (_("%pB: tp-relative relocation against dynamic symbol %s"),
07d6d2b8
AM
4699 input_bfd, h->root.root.root.string);
4700 ret_val = FALSE;
4701 }
e1918d23 4702 BFD_ASSERT (elf_hash_table (info)->tls_sec != NULL);
3765b1be 4703 value -= tp_base;
9e756d64
RH
4704 if (r_type == R_ALPHA_TPRELHI)
4705 value = ((bfd_signed_vma) value >> 16) + ((value >> 15) & 1);
3765b1be
RH
4706 goto default_reloc;
4707
4708 case R_ALPHA_GOTDTPREL:
4709 case R_ALPHA_GOTTPREL:
4710 BFD_ASSERT(sgot != NULL);
4711 BFD_ASSERT(gp != 0);
4712 BFD_ASSERT(gotent != NULL);
4713 BFD_ASSERT(gotent->use_count >= 1);
4714
4715 if (!gotent->reloc_done)
4716 {
4717 gotent->reloc_done = 1;
4718
4719 if (dynamic_symbol_p)
4720 value = 0;
4721 else
4722 {
e1918d23 4723 BFD_ASSERT (elf_hash_table (info)->tls_sec != NULL);
1bbc9cec
RH
4724 if (r_type == R_ALPHA_GOTDTPREL)
4725 value -= dtp_base;
28fbeab8 4726 else if (bfd_link_executable (info))
1bbc9cec
RH
4727 value -= tp_base;
4728 else
4729 {
4730 elf64_alpha_emit_dynrel (output_bfd, info, sgot, srelgot,
4731 gotent->got_offset, 0,
4732 R_ALPHA_TPREL64,
4733 value - dtp_base);
4734 value = 0;
4735 }
3765b1be
RH
4736 }
4737 bfd_put_64 (output_bfd, value,
4738 sgot->contents + gotent->got_offset);
4739 }
4740
4741 value = (sgot->output_section->vma
4742 + sgot->output_offset
4743 + gotent->got_offset);
4744 value -= gp;
4745 goto default_reloc;
4746
252b5132
RH
4747 default:
4748 default_reloc:
4749 r = _bfd_final_link_relocate (howto, input_bfd, input_section,
3765b1be 4750 contents, rel->r_offset, value, 0);
252b5132
RH
4751 break;
4752 }
4753
4754 switch (r)
4755 {
4756 case bfd_reloc_ok:
4757 break;
4758
4759 case bfd_reloc_overflow:
4760 {
4761 const char *name;
4762
ed4de5e2
JJ
4763 /* Don't warn if the overflow is due to pc relative reloc
4764 against discarded section. Section optimization code should
4765 handle it. */
4766
4767 if (r_symndx < symtab_hdr->sh_info
4768 && sec != NULL && howto->pc_relative
dbaa2011 4769 && discarded_section (sec))
ed4de5e2
JJ
4770 break;
4771
252b5132 4772 if (h != NULL)
dfeffb9f 4773 name = NULL;
252b5132
RH
4774 else
4775 {
4776 name = (bfd_elf_string_from_elf_section
4777 (input_bfd, symtab_hdr->sh_link, sym->st_name));
4778 if (name == NULL)
b34976b6 4779 return FALSE;
252b5132 4780 if (*name == '\0')
fd361982 4781 name = bfd_section_name (sec);
252b5132 4782 }
1a72702b
AM
4783 (*info->callbacks->reloc_overflow)
4784 (info, (h ? &h->root.root : NULL), name, howto->name,
4785 (bfd_vma) 0, input_bfd, input_section, rel->r_offset);
252b5132
RH
4786 }
4787 break;
4788
4789 default:
4790 case bfd_reloc_outofrange:
4791 abort ();
4792 }
4793 }
4794
f16fbd61 4795 return ret_val;
252b5132
RH
4796}
4797
4798/* Finish up dynamic symbol handling. We set the contents of various
4799 dynamic sections here. */
4800
b34976b6 4801static bfd_boolean
a7519a3c
RH
4802elf64_alpha_finish_dynamic_symbol (bfd *output_bfd, struct bfd_link_info *info,
4803 struct elf_link_hash_entry *h,
4804 Elf_Internal_Sym *sym)
252b5132 4805{
6ec7057a 4806 struct alpha_elf_link_hash_entry *ah = (struct alpha_elf_link_hash_entry *)h;
252b5132 4807
6ec7057a 4808 if (h->needs_plt)
252b5132
RH
4809 {
4810 /* Fill in the .plt entry for this symbol. */
4811 asection *splt, *sgot, *srel;
4812 Elf_Internal_Rela outrel;
947216bf 4813 bfd_byte *loc;
252b5132
RH
4814 bfd_vma got_addr, plt_addr;
4815 bfd_vma plt_index;
4816 struct alpha_elf_got_entry *gotent;
4817
4818 BFD_ASSERT (h->dynindx != -1);
4819
ce558b89 4820 splt = elf_hash_table (info)->splt;
252b5132 4821 BFD_ASSERT (splt != NULL);
ce558b89 4822 srel = elf_hash_table (info)->srelplt;
252b5132 4823 BFD_ASSERT (srel != NULL);
252b5132 4824
6ec7057a
RH
4825 for (gotent = ah->got_entries; gotent ; gotent = gotent->next)
4826 if (gotent->reloc_type == R_ALPHA_LITERAL
4827 && gotent->use_count > 0)
4828 {
4829 unsigned int insn;
4830 int disp;
252b5132 4831
6ec7057a
RH
4832 sgot = alpha_elf_tdata (gotent->gotobj)->got;
4833 BFD_ASSERT (sgot != NULL);
252b5132 4834
6ec7057a
RH
4835 BFD_ASSERT (gotent->got_offset != -1);
4836 BFD_ASSERT (gotent->plt_offset != -1);
252b5132 4837
6ec7057a
RH
4838 got_addr = (sgot->output_section->vma
4839 + sgot->output_offset
4840 + gotent->got_offset);
4841 plt_addr = (splt->output_section->vma
4842 + splt->output_offset
4843 + gotent->plt_offset);
252b5132 4844
6ec7057a 4845 plt_index = (gotent->plt_offset-PLT_HEADER_SIZE) / PLT_ENTRY_SIZE;
252b5132 4846
6ec7057a
RH
4847 /* Fill in the entry in the procedure linkage table. */
4848 if (elf64_alpha_use_secureplt)
4849 {
4850 disp = (PLT_HEADER_SIZE - 4) - (gotent->plt_offset + 4);
4851 insn = INSN_AD (INSN_BR, 31, disp);
4852 bfd_put_32 (output_bfd, insn,
4853 splt->contents + gotent->plt_offset);
252b5132 4854
6ec7057a
RH
4855 plt_index = ((gotent->plt_offset - NEW_PLT_HEADER_SIZE)
4856 / NEW_PLT_ENTRY_SIZE);
4857 }
4858 else
4859 {
4860 disp = -(gotent->plt_offset + 4);
4861 insn = INSN_AD (INSN_BR, 28, disp);
4862 bfd_put_32 (output_bfd, insn,
4863 splt->contents + gotent->plt_offset);
4864 bfd_put_32 (output_bfd, INSN_UNOP,
4865 splt->contents + gotent->plt_offset + 4);
4866 bfd_put_32 (output_bfd, INSN_UNOP,
4867 splt->contents + gotent->plt_offset + 8);
4868
4869 plt_index = ((gotent->plt_offset - OLD_PLT_HEADER_SIZE)
4870 / OLD_PLT_ENTRY_SIZE);
4871 }
252b5132 4872
6ec7057a
RH
4873 /* Fill in the entry in the .rela.plt section. */
4874 outrel.r_offset = got_addr;
4875 outrel.r_info = ELF64_R_INFO(h->dynindx, R_ALPHA_JMP_SLOT);
4876 outrel.r_addend = 0;
252b5132 4877
6ec7057a
RH
4878 loc = srel->contents + plt_index * sizeof (Elf64_External_Rela);
4879 bfd_elf64_swap_reloca_out (output_bfd, &outrel, loc);
252b5132 4880
6ec7057a
RH
4881 /* Fill in the entry in the .got. */
4882 bfd_put_64 (output_bfd, plt_addr,
4883 sgot->contents + gotent->got_offset);
4884 }
252b5132
RH
4885 }
4886 else if (alpha_elf_dynamic_symbol_p (h, info))
4887 {
4888 /* Fill in the dynamic relocations for this symbol's .got entries. */
4889 asection *srel;
252b5132
RH
4890 struct alpha_elf_got_entry *gotent;
4891
ce558b89 4892 srel = elf_hash_table (info)->srelgot;
252b5132
RH
4893 BFD_ASSERT (srel != NULL);
4894
252b5132
RH
4895 for (gotent = ((struct alpha_elf_link_hash_entry *) h)->got_entries;
4896 gotent != NULL;
4897 gotent = gotent->next)
4898 {
f44f99a5 4899 asection *sgot;
1bbc9cec 4900 long r_type;
3765b1be 4901
f44f99a5
RH
4902 if (gotent->use_count == 0)
4903 continue;
4904
4905 sgot = alpha_elf_tdata (gotent->gotobj)->got;
3765b1be
RH
4906
4907 r_type = gotent->reloc_type;
4908 switch (r_type)
4909 {
4910 case R_ALPHA_LITERAL:
4911 r_type = R_ALPHA_GLOB_DAT;
4912 break;
4913 case R_ALPHA_TLSGD:
4914 r_type = R_ALPHA_DTPMOD64;
4915 break;
4916 case R_ALPHA_GOTDTPREL:
4917 r_type = R_ALPHA_DTPREL64;
4918 break;
4919 case R_ALPHA_GOTTPREL:
4920 r_type = R_ALPHA_TPREL64;
4921 break;
4922 case R_ALPHA_TLSLDM:
4923 default:
4924 abort ();
4925 }
4926
68ffbac6 4927 elf64_alpha_emit_dynrel (output_bfd, info, sgot, srel,
1bbc9cec
RH
4928 gotent->got_offset, h->dynindx,
4929 r_type, gotent->addend);
3765b1be
RH
4930
4931 if (gotent->reloc_type == R_ALPHA_TLSGD)
68ffbac6 4932 elf64_alpha_emit_dynrel (output_bfd, info, sgot, srel,
1bbc9cec
RH
4933 gotent->got_offset + 8, h->dynindx,
4934 R_ALPHA_DTPREL64, gotent->addend);
252b5132
RH
4935 }
4936 }
4937
4938 /* Mark some specially defined symbols as absolute. */
9637f6ef 4939 if (h == elf_hash_table (info)->hdynamic
22edb2f1
RS
4940 || h == elf_hash_table (info)->hgot
4941 || h == elf_hash_table (info)->hplt)
252b5132
RH
4942 sym->st_shndx = SHN_ABS;
4943
b34976b6 4944 return TRUE;
252b5132
RH
4945}
4946
4947/* Finish up the dynamic sections. */
4948
b34976b6 4949static bfd_boolean
a7519a3c
RH
4950elf64_alpha_finish_dynamic_sections (bfd *output_bfd,
4951 struct bfd_link_info *info)
252b5132
RH
4952{
4953 bfd *dynobj;
4954 asection *sdyn;
4955
4956 dynobj = elf_hash_table (info)->dynobj;
3d4d4302 4957 sdyn = bfd_get_linker_section (dynobj, ".dynamic");
252b5132
RH
4958
4959 if (elf_hash_table (info)->dynamic_sections_created)
4960 {
6ec7057a 4961 asection *splt, *sgotplt, *srelaplt;
252b5132 4962 Elf64_External_Dyn *dyncon, *dynconend;
6ec7057a 4963 bfd_vma plt_vma, gotplt_vma;
252b5132 4964
ce558b89
AM
4965 splt = elf_hash_table (info)->splt;
4966 srelaplt = elf_hash_table (info)->srelplt;
252b5132
RH
4967 BFD_ASSERT (splt != NULL && sdyn != NULL);
4968
6ec7057a
RH
4969 plt_vma = splt->output_section->vma + splt->output_offset;
4970
4971 gotplt_vma = 0;
4972 if (elf64_alpha_use_secureplt)
4973 {
ce558b89 4974 sgotplt = elf_hash_table (info)->sgotplt;
6ec7057a
RH
4975 BFD_ASSERT (sgotplt != NULL);
4976 if (sgotplt->size > 0)
4977 gotplt_vma = sgotplt->output_section->vma + sgotplt->output_offset;
4978 }
4979
252b5132 4980 dyncon = (Elf64_External_Dyn *) sdyn->contents;
eea6121a 4981 dynconend = (Elf64_External_Dyn *) (sdyn->contents + sdyn->size);
252b5132
RH
4982 for (; dyncon < dynconend; dyncon++)
4983 {
4984 Elf_Internal_Dyn dyn;
252b5132
RH
4985
4986 bfd_elf64_swap_dyn_in (dynobj, dyncon, &dyn);
4987
4988 switch (dyn.d_tag)
4989 {
4990 case DT_PLTGOT:
6ec7057a
RH
4991 dyn.d_un.d_ptr
4992 = elf64_alpha_use_secureplt ? gotplt_vma : plt_vma;
4993 break;
252b5132 4994 case DT_PLTRELSZ:
6ec7057a
RH
4995 dyn.d_un.d_val = srelaplt ? srelaplt->size : 0;
4996 break;
252b5132 4997 case DT_JMPREL:
4ade44b7
AM
4998 dyn.d_un.d_ptr = srelaplt ? (srelaplt->output_section->vma
4999 + srelaplt->output_offset) : 0;
6ec7057a 5000 break;
252b5132
RH
5001 }
5002
5003 bfd_elf64_swap_dyn_out (output_bfd, &dyn, dyncon);
5004 }
5005
6ec7057a 5006 /* Initialize the plt header. */
eea6121a 5007 if (splt->size > 0)
252b5132 5008 {
6ec7057a
RH
5009 unsigned int insn;
5010 int ofs;
5011
5012 if (elf64_alpha_use_secureplt)
5013 {
5014 ofs = gotplt_vma - (plt_vma + PLT_HEADER_SIZE);
5015
5016 insn = INSN_ABC (INSN_SUBQ, 27, 28, 25);
5017 bfd_put_32 (output_bfd, insn, splt->contents);
5018
5019 insn = INSN_ABO (INSN_LDAH, 28, 28, (ofs + 0x8000) >> 16);
5020 bfd_put_32 (output_bfd, insn, splt->contents + 4);
5021
5022 insn = INSN_ABC (INSN_S4SUBQ, 25, 25, 25);
5023 bfd_put_32 (output_bfd, insn, splt->contents + 8);
5024
5025 insn = INSN_ABO (INSN_LDA, 28, 28, ofs);
5026 bfd_put_32 (output_bfd, insn, splt->contents + 12);
5027
5028 insn = INSN_ABO (INSN_LDQ, 27, 28, 0);
5029 bfd_put_32 (output_bfd, insn, splt->contents + 16);
5030
5031 insn = INSN_ABC (INSN_ADDQ, 25, 25, 25);
5032 bfd_put_32 (output_bfd, insn, splt->contents + 20);
5033
5034 insn = INSN_ABO (INSN_LDQ, 28, 28, 8);
5035 bfd_put_32 (output_bfd, insn, splt->contents + 24);
5036
5037 insn = INSN_AB (INSN_JMP, 31, 27);
5038 bfd_put_32 (output_bfd, insn, splt->contents + 28);
5039
5040 insn = INSN_AD (INSN_BR, 28, -PLT_HEADER_SIZE);
5041 bfd_put_32 (output_bfd, insn, splt->contents + 32);
5042 }
5043 else
5044 {
5045 insn = INSN_AD (INSN_BR, 27, 0); /* br $27, .+4 */
5046 bfd_put_32 (output_bfd, insn, splt->contents);
5047
5048 insn = INSN_ABO (INSN_LDQ, 27, 27, 12);
5049 bfd_put_32 (output_bfd, insn, splt->contents + 4);
5050
5051 insn = INSN_UNOP;
5052 bfd_put_32 (output_bfd, insn, splt->contents + 8);
5053
5054 insn = INSN_AB (INSN_JMP, 27, 27);
5055 bfd_put_32 (output_bfd, insn, splt->contents + 12);
5056
5057 /* The next two words will be filled in by ld.so. */
5058 bfd_put_64 (output_bfd, 0, splt->contents + 16);
5059 bfd_put_64 (output_bfd, 0, splt->contents + 24);
5060 }
252b5132 5061
eecdbe52 5062 elf_section_data (splt->output_section)->this_hdr.sh_entsize = 0;
252b5132
RH
5063 }
5064 }
5065
b34976b6 5066 return TRUE;
252b5132
RH
5067}
5068
96e2734b
RH
5069/* We need to use a special link routine to handle the .mdebug section.
5070 We need to merge all instances of these sections together, not write
5071 them all out sequentially. */
252b5132 5072
b34976b6 5073static bfd_boolean
a7519a3c 5074elf64_alpha_final_link (bfd *abfd, struct bfd_link_info *info)
252b5132
RH
5075{
5076 asection *o;
5077 struct bfd_link_order *p;
96e2734b 5078 asection *mdebug_sec;
252b5132
RH
5079 struct ecoff_debug_info debug;
5080 const struct ecoff_debug_swap *swap
5081 = get_elf_backend_data (abfd)->elf_backend_ecoff_debug_swap;
5082 HDRR *symhdr = &debug.symbolic_header;
4dfe6ac6
NC
5083 void * mdebug_handle = NULL;
5084 struct alpha_elf_link_hash_table * htab;
5085
5086 htab = alpha_elf_hash_table (info);
5087 if (htab == NULL)
5088 return FALSE;
252b5132 5089
96e2734b 5090 /* Go through the sections and collect the mdebug information. */
252b5132 5091 mdebug_sec = NULL;
252b5132
RH
5092 for (o = abfd->sections; o != (asection *) NULL; o = o->next)
5093 {
252b5132
RH
5094 if (strcmp (o->name, ".mdebug") == 0)
5095 {
5096 struct extsym_info einfo;
5097
5098 /* We have found the .mdebug section in the output file.
5099 Look through all the link_orders comprising it and merge
5100 the information together. */
5101 symhdr->magic = swap->sym_magic;
5102 /* FIXME: What should the version stamp be? */
5103 symhdr->vstamp = 0;
5104 symhdr->ilineMax = 0;
5105 symhdr->cbLine = 0;
5106 symhdr->idnMax = 0;
5107 symhdr->ipdMax = 0;
5108 symhdr->isymMax = 0;
5109 symhdr->ioptMax = 0;
5110 symhdr->iauxMax = 0;
5111 symhdr->issMax = 0;
5112 symhdr->issExtMax = 0;
5113 symhdr->ifdMax = 0;
5114 symhdr->crfd = 0;
5115 symhdr->iextMax = 0;
5116
5117 /* We accumulate the debugging information itself in the
5118 debug_info structure. */
5119 debug.line = NULL;
5120 debug.external_dnr = NULL;
5121 debug.external_pdr = NULL;
5122 debug.external_sym = NULL;
5123 debug.external_opt = NULL;
5124 debug.external_aux = NULL;
5125 debug.ss = NULL;
5126 debug.ssext = debug.ssext_end = NULL;
5127 debug.external_fdr = NULL;
5128 debug.external_rfd = NULL;
5129 debug.external_ext = debug.external_ext_end = NULL;
5130
5131 mdebug_handle = bfd_ecoff_debug_init (abfd, &debug, swap, info);
2c3fc389 5132 if (mdebug_handle == NULL)
b34976b6 5133 return FALSE;
252b5132
RH
5134
5135 if (1)
5136 {
5137 asection *s;
5138 EXTR esym;
52b9d213 5139 bfd_vma last = 0;
252b5132
RH
5140 unsigned int i;
5141 static const char * const name[] =
5142 {
5143 ".text", ".init", ".fini", ".data",
5144 ".rodata", ".sdata", ".sbss", ".bss"
5145 };
5146 static const int sc[] = { scText, scInit, scFini, scData,
5147 scRData, scSData, scSBss, scBss };
5148
5149 esym.jmptbl = 0;
5150 esym.cobol_main = 0;
5151 esym.weakext = 0;
5152 esym.reserved = 0;
5153 esym.ifd = ifdNil;
5154 esym.asym.iss = issNil;
5155 esym.asym.st = stLocal;
5156 esym.asym.reserved = 0;
5157 esym.asym.index = indexNil;
5158 for (i = 0; i < 8; i++)
5159 {
5160 esym.asym.sc = sc[i];
5161 s = bfd_get_section_by_name (abfd, name[i]);
5162 if (s != NULL)
5163 {
5164 esym.asym.value = s->vma;
eea6121a 5165 last = s->vma + s->size;
252b5132
RH
5166 }
5167 else
5168 esym.asym.value = last;
5169
5170 if (! bfd_ecoff_debug_one_external (abfd, &debug, swap,
5171 name[i], &esym))
b34976b6 5172 return FALSE;
252b5132
RH
5173 }
5174 }
5175
8423293d 5176 for (p = o->map_head.link_order;
252b5132
RH
5177 p != (struct bfd_link_order *) NULL;
5178 p = p->next)
5179 {
5180 asection *input_section;
5181 bfd *input_bfd;
5182 const struct ecoff_debug_swap *input_swap;
5183 struct ecoff_debug_info input_debug;
5184 char *eraw_src;
5185 char *eraw_end;
5186
5187 if (p->type != bfd_indirect_link_order)
5188 {
fd96f80f 5189 if (p->type == bfd_data_link_order)
252b5132
RH
5190 continue;
5191 abort ();
5192 }
5193
5194 input_section = p->u.indirect.section;
5195 input_bfd = input_section->owner;
5196
0ffa91dd
NC
5197 if (! is_alpha_elf (input_bfd))
5198 /* I don't know what a non ALPHA ELF bfd would be
5199 doing with a .mdebug section, but I don't really
5200 want to deal with it. */
5201 continue;
252b5132
RH
5202
5203 input_swap = (get_elf_backend_data (input_bfd)
5204 ->elf_backend_ecoff_debug_swap);
5205
eea6121a 5206 BFD_ASSERT (p->size == input_section->size);
252b5132
RH
5207
5208 /* The ECOFF linking code expects that we have already
5209 read in the debugging information and set up an
5210 ecoff_debug_info structure, so we do that now. */
5211 if (!elf64_alpha_read_ecoff_info (input_bfd, input_section,
5212 &input_debug))
b34976b6 5213 return FALSE;
252b5132
RH
5214
5215 if (! (bfd_ecoff_debug_accumulate
5216 (mdebug_handle, abfd, &debug, swap, input_bfd,
5217 &input_debug, input_swap, info)))
b34976b6 5218 return FALSE;
252b5132
RH
5219
5220 /* Loop through the external symbols. For each one with
5221 interesting information, try to find the symbol in
5222 the linker global hash table and save the information
5223 for the output external symbols. */
21d799b5 5224 eraw_src = (char *) input_debug.external_ext;
252b5132
RH
5225 eraw_end = (eraw_src
5226 + (input_debug.symbolic_header.iextMax
5227 * input_swap->external_ext_size));
5228 for (;
5229 eraw_src < eraw_end;
5230 eraw_src += input_swap->external_ext_size)
5231 {
5232 EXTR ext;
5233 const char *name;
5234 struct alpha_elf_link_hash_entry *h;
5235
2c3fc389 5236 (*input_swap->swap_ext_in) (input_bfd, eraw_src, &ext);
252b5132
RH
5237 if (ext.asym.sc == scNil
5238 || ext.asym.sc == scUndefined
5239 || ext.asym.sc == scSUndefined)
5240 continue;
5241
5242 name = input_debug.ssext + ext.asym.iss;
4dfe6ac6 5243 h = alpha_elf_link_hash_lookup (htab, name, FALSE, FALSE, TRUE);
252b5132
RH
5244 if (h == NULL || h->esym.ifd != -2)
5245 continue;
5246
5247 if (ext.ifd != -1)
5248 {
5249 BFD_ASSERT (ext.ifd
5250 < input_debug.symbolic_header.ifdMax);
5251 ext.ifd = input_debug.ifdmap[ext.ifd];
5252 }
5253
5254 h->esym = ext;
5255 }
5256
5257 /* Free up the information we just read. */
5258 free (input_debug.line);
5259 free (input_debug.external_dnr);
5260 free (input_debug.external_pdr);
5261 free (input_debug.external_sym);
5262 free (input_debug.external_opt);
5263 free (input_debug.external_aux);
5264 free (input_debug.ss);
5265 free (input_debug.ssext);
5266 free (input_debug.external_fdr);
5267 free (input_debug.external_rfd);
5268 free (input_debug.external_ext);
5269
5270 /* Hack: reset the SEC_HAS_CONTENTS flag so that
5271 elf_link_input_bfd ignores this section. */
5272 input_section->flags &=~ SEC_HAS_CONTENTS;
5273 }
5274
252b5132
RH
5275 /* Build the external symbol information. */
5276 einfo.abfd = abfd;
5277 einfo.info = info;
5278 einfo.debug = &debug;
5279 einfo.swap = swap;
b34976b6 5280 einfo.failed = FALSE;
252b5132
RH
5281 elf_link_hash_traverse (elf_hash_table (info),
5282 elf64_alpha_output_extsym,
2c3fc389 5283 &einfo);
252b5132 5284 if (einfo.failed)
b34976b6 5285 return FALSE;
252b5132
RH
5286
5287 /* Set the size of the .mdebug section. */
eea6121a 5288 o->size = bfd_ecoff_debug_size (abfd, &debug, swap);
252b5132
RH
5289
5290 /* Skip this section later on (I don't think this currently
5291 matters, but someday it might). */
8423293d 5292 o->map_head.link_order = (struct bfd_link_order *) NULL;
252b5132
RH
5293
5294 mdebug_sec = o;
5295 }
252b5132
RH
5296 }
5297
5298 /* Invoke the regular ELF backend linker to do all the work. */
c152c796 5299 if (! bfd_elf_final_link (abfd, info))
b34976b6 5300 return FALSE;
252b5132
RH
5301
5302 /* Now write out the computed sections. */
5303
5304 /* The .got subsections... */
5305 {
5306 bfd *i, *dynobj = elf_hash_table(info)->dynobj;
4dfe6ac6 5307 for (i = htab->got_list;
252b5132
RH
5308 i != NULL;
5309 i = alpha_elf_tdata(i)->got_link_next)
5310 {
5311 asection *sgot;
5312
5313 /* elf_bfd_final_link already did everything in dynobj. */
5314 if (i == dynobj)
5315 continue;
5316
5317 sgot = alpha_elf_tdata(i)->got;
5318 if (! bfd_set_section_contents (abfd, sgot->output_section,
dc810e39
AM
5319 sgot->contents,
5320 (file_ptr) sgot->output_offset,
eea6121a 5321 sgot->size))
b34976b6 5322 return FALSE;
252b5132
RH
5323 }
5324 }
5325
252b5132
RH
5326 if (mdebug_sec != (asection *) NULL)
5327 {
5328 BFD_ASSERT (abfd->output_has_begun);
5329 if (! bfd_ecoff_write_accumulated_debug (mdebug_handle, abfd, &debug,
5330 swap, info,
5331 mdebug_sec->filepos))
b34976b6 5332 return FALSE;
252b5132
RH
5333
5334 bfd_ecoff_debug_free (mdebug_handle, abfd, &debug, swap, info);
5335 }
5336
b34976b6 5337 return TRUE;
252b5132 5338}
fcfbdf31
JJ
5339
5340static enum elf_reloc_type_class
7e612e98
AM
5341elf64_alpha_reloc_type_class (const struct bfd_link_info *info ATTRIBUTE_UNUSED,
5342 const asection *rel_sec ATTRIBUTE_UNUSED,
5343 const Elf_Internal_Rela *rela)
fcfbdf31 5344{
f51e552e 5345 switch ((int) ELF64_R_TYPE (rela->r_info))
fcfbdf31
JJ
5346 {
5347 case R_ALPHA_RELATIVE:
5348 return reloc_class_relative;
5349 case R_ALPHA_JMP_SLOT:
5350 return reloc_class_plt;
5351 case R_ALPHA_COPY:
5352 return reloc_class_copy;
5353 default:
5354 return reloc_class_normal;
5355 }
5356}
252b5132 5357\f
b35d266b 5358static const struct bfd_elf_special_section elf64_alpha_special_sections[] =
2f89ff8d 5359{
07d6d2b8 5360 { STRING_COMMA_LEN (".sbss"), -2, SHT_NOBITS, SHF_ALLOC + SHF_WRITE + SHF_ALPHA_GPREL },
0112cd26 5361 { STRING_COMMA_LEN (".sdata"), -2, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE + SHF_ALPHA_GPREL },
07d6d2b8 5362 { NULL, 0, 0, 0, 0 }
2f89ff8d
L
5363};
5364
252b5132
RH
5365/* ECOFF swapping routines. These are used when dealing with the
5366 .mdebug section, which is in the ECOFF debugging format. Copied
fe8bc63d 5367 from elf32-mips.c. */
252b5132
RH
5368static const struct ecoff_debug_swap
5369elf64_alpha_ecoff_debug_swap =
5370{
5371 /* Symbol table magic number. */
5372 magicSym2,
5373 /* Alignment of debugging information. E.g., 4. */
5374 8,
5375 /* Sizes of external symbolic information. */
5376 sizeof (struct hdr_ext),
5377 sizeof (struct dnr_ext),
5378 sizeof (struct pdr_ext),
5379 sizeof (struct sym_ext),
5380 sizeof (struct opt_ext),
5381 sizeof (struct fdr_ext),
5382 sizeof (struct rfd_ext),
5383 sizeof (struct ext_ext),
5384 /* Functions to swap in external symbolic data. */
5385 ecoff_swap_hdr_in,
5386 ecoff_swap_dnr_in,
5387 ecoff_swap_pdr_in,
5388 ecoff_swap_sym_in,
5389 ecoff_swap_opt_in,
5390 ecoff_swap_fdr_in,
5391 ecoff_swap_rfd_in,
5392 ecoff_swap_ext_in,
5393 _bfd_ecoff_swap_tir_in,
5394 _bfd_ecoff_swap_rndx_in,
5395 /* Functions to swap out external symbolic data. */
5396 ecoff_swap_hdr_out,
5397 ecoff_swap_dnr_out,
5398 ecoff_swap_pdr_out,
5399 ecoff_swap_sym_out,
5400 ecoff_swap_opt_out,
5401 ecoff_swap_fdr_out,
5402 ecoff_swap_rfd_out,
5403 ecoff_swap_ext_out,
5404 _bfd_ecoff_swap_tir_out,
5405 _bfd_ecoff_swap_rndx_out,
5406 /* Function to read in symbolic data. */
5407 elf64_alpha_read_ecoff_info
5408};
5409\f
70bcb145
JW
5410/* Use a non-standard hash bucket size of 8. */
5411
562ace6b 5412static const struct elf_size_info alpha_elf_size_info =
70bcb145
JW
5413{
5414 sizeof (Elf64_External_Ehdr),
5415 sizeof (Elf64_External_Phdr),
5416 sizeof (Elf64_External_Shdr),
5417 sizeof (Elf64_External_Rel),
5418 sizeof (Elf64_External_Rela),
5419 sizeof (Elf64_External_Sym),
5420 sizeof (Elf64_External_Dyn),
5421 sizeof (Elf_External_Note),
5422 8,
5423 1,
45d6a902 5424 64, 3,
70bcb145
JW
5425 ELFCLASS64, EV_CURRENT,
5426 bfd_elf64_write_out_phdrs,
5427 bfd_elf64_write_shdrs_and_ehdr,
1489a3a0 5428 bfd_elf64_checksum_contents,
70bcb145 5429 bfd_elf64_write_relocs,
73ff0d56 5430 bfd_elf64_swap_symbol_in,
70bcb145
JW
5431 bfd_elf64_swap_symbol_out,
5432 bfd_elf64_slurp_reloc_table,
5433 bfd_elf64_slurp_symbol_table,
5434 bfd_elf64_swap_dyn_in,
5435 bfd_elf64_swap_dyn_out,
947216bf
AM
5436 bfd_elf64_swap_reloc_in,
5437 bfd_elf64_swap_reloc_out,
5438 bfd_elf64_swap_reloca_in,
5439 bfd_elf64_swap_reloca_out
70bcb145
JW
5440};
5441
6d00b590 5442#define TARGET_LITTLE_SYM alpha_elf64_vec
252b5132
RH
5443#define TARGET_LITTLE_NAME "elf64-alpha"
5444#define ELF_ARCH bfd_arch_alpha
ae95ffa6 5445#define ELF_TARGET_ID ALPHA_ELF_DATA
56fc028e
AJ
5446#define ELF_MACHINE_CODE EM_ALPHA
5447#define ELF_MAXPAGESIZE 0x10000
24718e3b 5448#define ELF_COMMONPAGESIZE 0x2000
252b5132
RH
5449
5450#define bfd_elf64_bfd_link_hash_table_create \
5451 elf64_alpha_bfd_link_hash_table_create
5452
5453#define bfd_elf64_bfd_reloc_type_lookup \
5454 elf64_alpha_bfd_reloc_type_lookup
157090f7
AM
5455#define bfd_elf64_bfd_reloc_name_lookup \
5456 elf64_alpha_bfd_reloc_name_lookup
252b5132
RH
5457#define elf_info_to_howto \
5458 elf64_alpha_info_to_howto
5459
5460#define bfd_elf64_mkobject \
5461 elf64_alpha_mkobject
5462#define elf_backend_object_p \
5463 elf64_alpha_object_p
5464
5465#define elf_backend_section_from_shdr \
5466 elf64_alpha_section_from_shdr
204692d7
RH
5467#define elf_backend_section_flags \
5468 elf64_alpha_section_flags
252b5132
RH
5469#define elf_backend_fake_sections \
5470 elf64_alpha_fake_sections
5471
5472#define bfd_elf64_bfd_is_local_label_name \
5473 elf64_alpha_is_local_label_name
5474#define bfd_elf64_find_nearest_line \
5475 elf64_alpha_find_nearest_line
5476#define bfd_elf64_bfd_relax_section \
5477 elf64_alpha_relax_section
5478
5479#define elf_backend_add_symbol_hook \
5480 elf64_alpha_add_symbol_hook
13285a1b
AM
5481#define elf_backend_relocs_compatible \
5482 _bfd_elf_relocs_compatible
6fc5bb57
AM
5483#define elf_backend_sort_relocs_p \
5484 elf64_alpha_sort_relocs_p
252b5132
RH
5485#define elf_backend_check_relocs \
5486 elf64_alpha_check_relocs
5487#define elf_backend_create_dynamic_sections \
5488 elf64_alpha_create_dynamic_sections
5489#define elf_backend_adjust_dynamic_symbol \
5490 elf64_alpha_adjust_dynamic_symbol
747ffa7b
AM
5491#define elf_backend_merge_symbol_attribute \
5492 elf64_alpha_merge_symbol_attribute
48f4b4f5
RH
5493#define elf_backend_copy_indirect_symbol \
5494 elf64_alpha_copy_indirect_symbol
252b5132
RH
5495#define elf_backend_always_size_sections \
5496 elf64_alpha_always_size_sections
5497#define elf_backend_size_dynamic_sections \
5498 elf64_alpha_size_dynamic_sections
74541ad4 5499#define elf_backend_omit_section_dynsym \
d00dd7dc 5500 _bfd_elf_omit_section_dynsym_all
252b5132
RH
5501#define elf_backend_relocate_section \
5502 elf64_alpha_relocate_section
5503#define elf_backend_finish_dynamic_symbol \
5504 elf64_alpha_finish_dynamic_symbol
5505#define elf_backend_finish_dynamic_sections \
5506 elf64_alpha_finish_dynamic_sections
5507#define bfd_elf64_bfd_final_link \
5508 elf64_alpha_final_link
fcfbdf31
JJ
5509#define elf_backend_reloc_type_class \
5510 elf64_alpha_reloc_type_class
252b5132 5511
e117360e
RH
5512#define elf_backend_can_gc_sections 1
5513#define elf_backend_gc_mark_hook elf64_alpha_gc_mark_hook
e117360e 5514
252b5132
RH
5515#define elf_backend_ecoff_debug_swap \
5516 &elf64_alpha_ecoff_debug_swap
5517
70bcb145
JW
5518#define elf_backend_size_info \
5519 alpha_elf_size_info
5520
29ef7005
L
5521#define elf_backend_special_sections \
5522 elf64_alpha_special_sections
2f89ff8d 5523
6f6fd151
L
5524#define elf_backend_strip_zero_sized_dynamic_sections \
5525 _bfd_elf_strip_zero_sized_dynamic_sections
5526
38b1a46c 5527/* A few constants that determine how the .plt section is set up. */
252b5132
RH
5528#define elf_backend_want_got_plt 0
5529#define elf_backend_plt_readonly 0
5530#define elf_backend_want_plt_sym 1
5531#define elf_backend_got_header_size 0
64f52338 5532#define elf_backend_dtrel_excludes_plt 1
252b5132
RH
5533
5534#include "elf64-target.h"
2238051f
RH
5535\f
5536/* FreeBSD support. */
5537
5538#undef TARGET_LITTLE_SYM
6d00b590 5539#define TARGET_LITTLE_SYM alpha_elf64_fbsd_vec
2238051f
RH
5540#undef TARGET_LITTLE_NAME
5541#define TARGET_LITTLE_NAME "elf64-alpha-freebsd"
d1036acb
L
5542#undef ELF_OSABI
5543#define ELF_OSABI ELFOSABI_FREEBSD
2238051f
RH
5544
5545/* The kernel recognizes executables as valid only if they carry a
5546 "FreeBSD" label in the ELF header. So we put this label on all
5547 executables and (for simplicity) also all other object files. */
5548
ed7e9d0b
AM
5549static bfd_boolean
5550elf64_alpha_fbsd_init_file_header (bfd *abfd, struct bfd_link_info *info)
2238051f
RH
5551{
5552 Elf_Internal_Ehdr * i_ehdrp; /* ELF file header, internal form. */
5553
ed7e9d0b
AM
5554 if (!_bfd_elf_init_file_header (abfd, info))
5555 return FALSE;
5556
2238051f
RH
5557 i_ehdrp = elf_elfheader (abfd);
5558
5559 /* Put an ABI label supported by FreeBSD >= 4.1. */
d1036acb 5560 i_ehdrp->e_ident[EI_OSABI] = get_elf_backend_data (abfd)->elf_osabi;
2238051f
RH
5561#ifdef OLD_FREEBSD_ABI_LABEL
5562 /* The ABI label supported by FreeBSD <= 4.0 is quite nonstandard. */
5563 memcpy (&i_ehdrp->e_ident[EI_ABIVERSION], "FreeBSD", 8);
5564#endif
ed7e9d0b 5565 return TRUE;
2238051f
RH
5566}
5567
ed7e9d0b
AM
5568#undef elf_backend_init_file_header
5569#define elf_backend_init_file_header \
5570 elf64_alpha_fbsd_init_file_header
2238051f 5571
571fe01f 5572#undef elf64_bed
2238051f
RH
5573#define elf64_bed elf64_alpha_fbsd_bed
5574
5575#include "elf64-target.h"