RISC-V: Don't assume the priv attributes are in order when handling them.
[deliverable/binutils-gdb.git] / bfd / elf64-alpha.c
CommitLineData
252b5132 1/* Alpha specific support for 64-bit ELF
b3adc24a 2 Copyright (C) 1996-2020 Free Software Foundation, Inc.
252b5132
RH
3 Contributed by Richard Henderson <rth@tamu.edu>.
4
571fe01f 5 This file is part of BFD, the Binary File Descriptor library.
252b5132 6
571fe01f
NC
7 This program is free software; you can redistribute it and/or modify
8 it under the terms of the GNU General Public License as published by
cd123cb7 9 the Free Software Foundation; either version 3 of the License, or
571fe01f 10 (at your option) any later version.
252b5132 11
571fe01f
NC
12 This program is distributed in the hope that it will be useful,
13 but WITHOUT ANY WARRANTY; without even the implied warranty of
14 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 GNU General Public License for more details.
252b5132 16
571fe01f
NC
17 You should have received a copy of the GNU General Public License
18 along with this program; if not, write to the Free Software
cd123cb7
NC
19 Foundation, Inc., 51 Franklin Street - Fifth Floor, Boston,
20 MA 02110-1301, USA. */
21
252b5132
RH
22
23/* We need a published ABI spec for this. Until one comes out, don't
24 assume this'll remain unchanged forever. */
25
252b5132 26#include "sysdep.h"
3db64b00 27#include "bfd.h"
252b5132
RH
28#include "libbfd.h"
29#include "elf-bfd.h"
0ba9378a 30#include "ecoff-bfd.h"
252b5132
RH
31
32#include "elf/alpha.h"
33
34#define ALPHAECOFF
35
36#define NO_COFF_RELOCS
37#define NO_COFF_SYMBOLS
38#define NO_COFF_LINENOS
39
fe8bc63d 40/* Get the ECOFF swapping routines. Needed for the debug information. */
252b5132
RH
41#include "coff/internal.h"
42#include "coff/sym.h"
43#include "coff/symconst.h"
44#include "coff/ecoff.h"
45#include "coff/alpha.h"
46#include "aout/ar.h"
47#include "libcoff.h"
48#include "libecoff.h"
49#define ECOFF_64
50#include "ecoffswap.h"
51
6ec7057a
RH
52\f
53/* Instruction data for plt generation and relaxation. */
54
55#define OP_LDA 0x08
56#define OP_LDAH 0x09
57#define OP_LDQ 0x29
58#define OP_BR 0x30
59#define OP_BSR 0x34
60
61#define INSN_LDA (OP_LDA << 26)
62#define INSN_LDAH (OP_LDAH << 26)
63#define INSN_LDQ (OP_LDQ << 26)
64#define INSN_BR (OP_BR << 26)
65
66#define INSN_ADDQ 0x40000400
67#define INSN_RDUNIQ 0x0000009e
68#define INSN_SUBQ 0x40000520
69#define INSN_S4SUBQ 0x40000560
70#define INSN_UNOP 0x2ffe0000
71
72#define INSN_JSR 0x68004000
73#define INSN_JMP 0x68000000
74#define INSN_JSR_MASK 0xfc00c000
75
76#define INSN_A(I,A) (I | (A << 21))
77#define INSN_AB(I,A,B) (I | (A << 21) | (B << 16))
78#define INSN_ABC(I,A,B,C) (I | (A << 21) | (B << 16) | C)
79#define INSN_ABO(I,A,B,O) (I | (A << 21) | (B << 16) | ((O) & 0xffff))
80#define INSN_AD(I,A,D) (I | (A << 21) | (((D) >> 2) & 0x1fffff))
81
82/* PLT/GOT Stuff */
83
84/* Set by ld emulation. Putting this into the link_info or hash structure
85 is simply working too hard. */
86#ifdef USE_SECUREPLT
87bfd_boolean elf64_alpha_use_secureplt = TRUE;
88#else
89bfd_boolean elf64_alpha_use_secureplt = FALSE;
90#endif
91
92#define OLD_PLT_HEADER_SIZE 32
93#define OLD_PLT_ENTRY_SIZE 12
94#define NEW_PLT_HEADER_SIZE 36
95#define NEW_PLT_ENTRY_SIZE 4
96
97#define PLT_HEADER_SIZE \
98 (elf64_alpha_use_secureplt ? NEW_PLT_HEADER_SIZE : OLD_PLT_HEADER_SIZE)
99#define PLT_ENTRY_SIZE \
100 (elf64_alpha_use_secureplt ? NEW_PLT_ENTRY_SIZE : OLD_PLT_ENTRY_SIZE)
101
102#define MAX_GOT_SIZE (64*1024)
103
104#define ELF_DYNAMIC_INTERPRETER "/usr/lib/ld.so"
252b5132 105\f
21d799b5
NC
106
107/* Used to implement multiple .got subsections. */
108struct alpha_elf_got_entry
109{
110 struct alpha_elf_got_entry *next;
111
112 /* Which .got subsection? */
113 bfd *gotobj;
114
115 /* The addend in effect for this entry. */
116 bfd_vma addend;
117
118 /* The .got offset for this entry. */
119 int got_offset;
120
121 /* The .plt offset for this entry. */
122 int plt_offset;
123
124 /* How many references to this entry? */
125 int use_count;
126
127 /* The relocation type of this entry. */
128 unsigned char reloc_type;
129
130 /* How a LITERAL is used. */
131 unsigned char flags;
132
133 /* Have we initialized the dynamic relocation for this entry? */
134 unsigned char reloc_done;
135
136 /* Have we adjusted this entry for SEC_MERGE? */
137 unsigned char reloc_xlated;
138};
139
140struct alpha_elf_reloc_entry
141{
142 struct alpha_elf_reloc_entry *next;
143
144 /* Which .reloc section? */
145 asection *srel;
146
1f7f2abb
L
147 /* Which section this relocation is against? */
148 asection *sec;
21d799b5
NC
149
150 /* How many did we find? */
151 unsigned long count;
1f7f2abb
L
152
153 /* What kind of relocation? */
154 unsigned int rtype;
21d799b5
NC
155};
156
252b5132
RH
157struct alpha_elf_link_hash_entry
158{
159 struct elf_link_hash_entry root;
160
161 /* External symbol information. */
162 EXTR esym;
163
164 /* Cumulative flags for all the .got entries. */
165 int flags;
166
9e756d64 167 /* Contexts in which a literal was referenced. */
8288a39e
RH
168#define ALPHA_ELF_LINK_HASH_LU_ADDR 0x01
169#define ALPHA_ELF_LINK_HASH_LU_MEM 0x02
170#define ALPHA_ELF_LINK_HASH_LU_BYTE 0x04
171#define ALPHA_ELF_LINK_HASH_LU_JSR 0x08
172#define ALPHA_ELF_LINK_HASH_LU_TLSGD 0x10
173#define ALPHA_ELF_LINK_HASH_LU_TLSLDM 0x20
174#define ALPHA_ELF_LINK_HASH_LU_JSRDIRECT 0x40
175#define ALPHA_ELF_LINK_HASH_LU_PLT 0x38
176#define ALPHA_ELF_LINK_HASH_TLS_IE 0x80
cc03ec80 177
252b5132 178 /* Used to implement multiple .got subsections. */
21d799b5 179 struct alpha_elf_got_entry *got_entries;
252b5132 180
571fe01f 181 /* Used to count non-got, non-plt relocations for delayed sizing
252b5132 182 of relocation sections. */
21d799b5 183 struct alpha_elf_reloc_entry *reloc_entries;
252b5132
RH
184};
185
186/* Alpha ELF linker hash table. */
187
188struct alpha_elf_link_hash_table
189{
190 struct elf_link_hash_table root;
191
192 /* The head of a list of .got subsections linked through
193 alpha_elf_tdata(abfd)->got_link_next. */
194 bfd *got_list;
4a828aab
RH
195
196 /* The most recent relax pass that we've seen. The GOTs
197 should be regenerated if this doesn't match. */
198 int relax_trip;
252b5132
RH
199};
200
201/* Look up an entry in a Alpha ELF linker hash table. */
202
203#define alpha_elf_link_hash_lookup(table, string, create, copy, follow) \
204 ((struct alpha_elf_link_hash_entry *) \
205 elf_link_hash_lookup (&(table)->root, (string), (create), \
206 (copy), (follow)))
207
208/* Traverse a Alpha ELF linker hash table. */
209
210#define alpha_elf_link_hash_traverse(table, func, info) \
211 (elf_link_hash_traverse \
212 (&(table)->root, \
2c3fc389 213 (bfd_boolean (*) (struct elf_link_hash_entry *, void *)) (func), \
252b5132
RH
214 (info)))
215
216/* Get the Alpha ELF linker hash table from a link_info structure. */
217
218#define alpha_elf_hash_table(p) \
4dfe6ac6
NC
219 (elf_hash_table_id ((struct elf_link_hash_table *) ((p)->hash)) \
220 == ALPHA_ELF_DATA ? ((struct alpha_elf_link_hash_table *) ((p)->hash)) : NULL)
252b5132
RH
221
222/* Get the object's symbols as our own entry type. */
223
224#define alpha_elf_sym_hashes(abfd) \
225 ((struct alpha_elf_link_hash_entry **)elf_sym_hashes(abfd))
226
68ffbac6 227/* Should we do dynamic things to this symbol? This differs from the
986a241f
RH
228 generic version in that we never need to consider function pointer
229 equality wrt PLT entries -- we don't create a PLT entry if a symbol's
230 address is ever taken. */
252b5132 231
986a241f 232static inline bfd_boolean
a7519a3c
RH
233alpha_elf_dynamic_symbol_p (struct elf_link_hash_entry *h,
234 struct bfd_link_info *info)
8fb35fed 235{
986a241f 236 return _bfd_elf_dynamic_symbol_p (h, info, 0);
8fb35fed 237}
252b5132
RH
238
239/* Create an entry in a Alpha ELF linker hash table. */
240
241static struct bfd_hash_entry *
a7519a3c
RH
242elf64_alpha_link_hash_newfunc (struct bfd_hash_entry *entry,
243 struct bfd_hash_table *table,
244 const char *string)
252b5132
RH
245{
246 struct alpha_elf_link_hash_entry *ret =
247 (struct alpha_elf_link_hash_entry *) entry;
248
249 /* Allocate the structure if it has not already been allocated by a
250 subclass. */
251 if (ret == (struct alpha_elf_link_hash_entry *) NULL)
252 ret = ((struct alpha_elf_link_hash_entry *)
253 bfd_hash_allocate (table,
254 sizeof (struct alpha_elf_link_hash_entry)));
255 if (ret == (struct alpha_elf_link_hash_entry *) NULL)
256 return (struct bfd_hash_entry *) ret;
257
258 /* Call the allocation method of the superclass. */
259 ret = ((struct alpha_elf_link_hash_entry *)
260 _bfd_elf_link_hash_newfunc ((struct bfd_hash_entry *) ret,
261 table, string));
262 if (ret != (struct alpha_elf_link_hash_entry *) NULL)
263 {
264 /* Set local fields. */
265 memset (&ret->esym, 0, sizeof (EXTR));
266 /* We use -2 as a marker to indicate that the information has
267 not been set. -1 means there is no associated ifd. */
268 ret->esym.ifd = -2;
269 ret->flags = 0;
270 ret->got_entries = NULL;
271 ret->reloc_entries = NULL;
272 }
273
274 return (struct bfd_hash_entry *) ret;
275}
276
277/* Create a Alpha ELF linker hash table. */
278
279static struct bfd_link_hash_table *
a7519a3c 280elf64_alpha_bfd_link_hash_table_create (bfd *abfd)
252b5132
RH
281{
282 struct alpha_elf_link_hash_table *ret;
986f0783 283 size_t amt = sizeof (struct alpha_elf_link_hash_table);
252b5132 284
e2d34d7d 285 ret = (struct alpha_elf_link_hash_table *) bfd_zmalloc (amt);
252b5132
RH
286 if (ret == (struct alpha_elf_link_hash_table *) NULL)
287 return NULL;
288
66eb6687
AM
289 if (!_bfd_elf_link_hash_table_init (&ret->root, abfd,
290 elf64_alpha_link_hash_newfunc,
4dfe6ac6
NC
291 sizeof (struct alpha_elf_link_hash_entry),
292 ALPHA_ELF_DATA))
252b5132 293 {
e2d34d7d 294 free (ret);
252b5132
RH
295 return NULL;
296 }
297
298 return &ret->root.root;
299}
300\f
698600e4
AM
301/* Alpha ELF follows MIPS ELF in using a special find_nearest_line
302 routine in order to handle the ECOFF debugging information. */
303
304struct alpha_elf_find_line
305{
306 struct ecoff_debug_info d;
307 struct ecoff_find_line i;
308};
309
252b5132
RH
310/* We have some private fields hanging off of the elf_tdata structure. */
311
312struct alpha_elf_obj_tdata
313{
314 struct elf_obj_tdata root;
315
316 /* For every input file, these are the got entries for that object's
317 local symbols. */
318 struct alpha_elf_got_entry ** local_got_entries;
319
320 /* For every input file, this is the object that owns the got that
321 this input file uses. */
322 bfd *gotobj;
323
324 /* For every got, this is a linked list through the objects using this got */
325 bfd *in_got_link_next;
326
327 /* For every got, this is a link to the next got subsegment. */
328 bfd *got_link_next;
329
330 /* For every got, this is the section. */
331 asection *got;
332
3765b1be
RH
333 /* For every got, this is it's total number of words. */
334 int total_got_size;
252b5132 335
3765b1be 336 /* For every got, this is the sum of the number of words required
252b5132 337 to hold all of the member object's local got. */
3765b1be 338 int local_got_size;
698600e4
AM
339
340 /* Used by elf64_alpha_find_nearest_line entry point. */
341 struct alpha_elf_find_line *find_line_info;
342
252b5132
RH
343};
344
345#define alpha_elf_tdata(abfd) \
346 ((struct alpha_elf_obj_tdata *) (abfd)->tdata.any)
347
0ffa91dd
NC
348#define is_alpha_elf(bfd) \
349 (bfd_get_flavour (bfd) == bfd_target_elf_flavour \
350 && elf_tdata (bfd) != NULL \
4dfe6ac6 351 && elf_object_id (bfd) == ALPHA_ELF_DATA)
0ffa91dd 352
b34976b6 353static bfd_boolean
a7519a3c 354elf64_alpha_mkobject (bfd *abfd)
252b5132 355{
0ffa91dd 356 return bfd_elf_allocate_object (abfd, sizeof (struct alpha_elf_obj_tdata),
4dfe6ac6 357 ALPHA_ELF_DATA);
252b5132
RH
358}
359
b34976b6 360static bfd_boolean
a7519a3c 361elf64_alpha_object_p (bfd *abfd)
252b5132 362{
252b5132
RH
363 /* Set the right machine number for an Alpha ELF file. */
364 return bfd_default_set_arch_mach (abfd, bfd_arch_alpha, 0);
365}
366\f
a7519a3c
RH
367/* A relocation function which doesn't do anything. */
368
369static bfd_reloc_status_type
370elf64_alpha_reloc_nil (bfd *abfd ATTRIBUTE_UNUSED, arelent *reloc,
371 asymbol *sym ATTRIBUTE_UNUSED,
2c3fc389 372 void * data ATTRIBUTE_UNUSED, asection *sec,
a7519a3c
RH
373 bfd *output_bfd, char **error_message ATTRIBUTE_UNUSED)
374{
375 if (output_bfd)
376 reloc->address += sec->output_offset;
377 return bfd_reloc_ok;
378}
379
380/* A relocation function used for an unsupported reloc. */
381
382static bfd_reloc_status_type
383elf64_alpha_reloc_bad (bfd *abfd ATTRIBUTE_UNUSED, arelent *reloc,
384 asymbol *sym ATTRIBUTE_UNUSED,
2c3fc389 385 void * data ATTRIBUTE_UNUSED, asection *sec,
a7519a3c
RH
386 bfd *output_bfd, char **error_message ATTRIBUTE_UNUSED)
387{
388 if (output_bfd)
389 reloc->address += sec->output_offset;
390 return bfd_reloc_notsupported;
391}
392
393/* Do the work of the GPDISP relocation. */
394
395static bfd_reloc_status_type
396elf64_alpha_do_reloc_gpdisp (bfd *abfd, bfd_vma gpdisp, bfd_byte *p_ldah,
397 bfd_byte *p_lda)
398{
399 bfd_reloc_status_type ret = bfd_reloc_ok;
400 bfd_vma addend;
401 unsigned long i_ldah, i_lda;
402
403 i_ldah = bfd_get_32 (abfd, p_ldah);
404 i_lda = bfd_get_32 (abfd, p_lda);
405
406 /* Complain if the instructions are not correct. */
407 if (((i_ldah >> 26) & 0x3f) != 0x09
408 || ((i_lda >> 26) & 0x3f) != 0x08)
409 ret = bfd_reloc_dangerous;
410
411 /* Extract the user-supplied offset, mirroring the sign extensions
412 that the instructions perform. */
413 addend = ((i_ldah & 0xffff) << 16) | (i_lda & 0xffff);
414 addend = (addend ^ 0x80008000) - 0x80008000;
415
416 gpdisp += addend;
417
418 if ((bfd_signed_vma) gpdisp < -(bfd_signed_vma) 0x80000000
419 || (bfd_signed_vma) gpdisp >= (bfd_signed_vma) 0x7fff8000)
420 ret = bfd_reloc_overflow;
421
422 /* compensate for the sign extension again. */
423 i_ldah = ((i_ldah & 0xffff0000)
424 | (((gpdisp >> 16) + ((gpdisp >> 15) & 1)) & 0xffff));
425 i_lda = (i_lda & 0xffff0000) | (gpdisp & 0xffff);
426
427 bfd_put_32 (abfd, (bfd_vma) i_ldah, p_ldah);
428 bfd_put_32 (abfd, (bfd_vma) i_lda, p_lda);
429
430 return ret;
431}
432
433/* The special function for the GPDISP reloc. */
434
435static bfd_reloc_status_type
436elf64_alpha_reloc_gpdisp (bfd *abfd, arelent *reloc_entry,
2c3fc389 437 asymbol *sym ATTRIBUTE_UNUSED, void * data,
a7519a3c
RH
438 asection *input_section, bfd *output_bfd,
439 char **err_msg)
440{
441 bfd_reloc_status_type ret;
442 bfd_vma gp, relocation;
443 bfd_vma high_address;
444 bfd_byte *p_ldah, *p_lda;
445
446 /* Don't do anything if we're not doing a final link. */
447 if (output_bfd)
448 {
449 reloc_entry->address += input_section->output_offset;
450 return bfd_reloc_ok;
451 }
452
453 high_address = bfd_get_section_limit (abfd, input_section);
454 if (reloc_entry->address > high_address
455 || reloc_entry->address + reloc_entry->addend > high_address)
456 return bfd_reloc_outofrange;
457
458 /* The gp used in the portion of the output object to which this
459 input object belongs is cached on the input bfd. */
460 gp = _bfd_get_gp_value (abfd);
461
462 relocation = (input_section->output_section->vma
463 + input_section->output_offset
464 + reloc_entry->address);
465
466 p_ldah = (bfd_byte *) data + reloc_entry->address;
467 p_lda = p_ldah + reloc_entry->addend;
468
469 ret = elf64_alpha_do_reloc_gpdisp (abfd, gp - relocation, p_ldah, p_lda);
470
471 /* Complain if the instructions are not correct. */
472 if (ret == bfd_reloc_dangerous)
473 *err_msg = _("GPDISP relocation did not find ldah and lda instructions");
474
475 return ret;
476}
477
252b5132
RH
478/* In case we're on a 32-bit machine, construct a 64-bit "-1" value
479 from smaller values. Start with zero, widen, *then* decrement. */
480#define MINUS_ONE (((bfd_vma)0) - 1)
481
21d799b5 482
dfe57ca0 483#define SKIP_HOWTO(N) \
21d799b5 484 HOWTO(N, 0, 0, 0, 0, 0, complain_overflow_dont, elf64_alpha_reloc_bad, 0, 0, 0, 0, 0)
dfe57ca0 485
252b5132
RH
486static reloc_howto_type elf64_alpha_howto_table[] =
487{
488 HOWTO (R_ALPHA_NONE, /* type */
489 0, /* rightshift */
6346d5ca
AM
490 3, /* size (0 = byte, 1 = short, 2 = long) */
491 0, /* bitsize */
b34976b6 492 TRUE, /* pc_relative */
252b5132
RH
493 0, /* bitpos */
494 complain_overflow_dont, /* complain_on_overflow */
495 elf64_alpha_reloc_nil, /* special_function */
496 "NONE", /* name */
b34976b6 497 FALSE, /* partial_inplace */
252b5132
RH
498 0, /* src_mask */
499 0, /* dst_mask */
b34976b6 500 TRUE), /* pcrel_offset */
252b5132
RH
501
502 /* A 32 bit reference to a symbol. */
503 HOWTO (R_ALPHA_REFLONG, /* type */
504 0, /* rightshift */
505 2, /* size (0 = byte, 1 = short, 2 = long) */
506 32, /* bitsize */
b34976b6 507 FALSE, /* pc_relative */
252b5132
RH
508 0, /* bitpos */
509 complain_overflow_bitfield, /* complain_on_overflow */
bc1bc43f 510 bfd_elf_generic_reloc, /* special_function */
252b5132 511 "REFLONG", /* name */
b34976b6 512 FALSE, /* partial_inplace */
252b5132
RH
513 0xffffffff, /* src_mask */
514 0xffffffff, /* dst_mask */
b34976b6 515 FALSE), /* pcrel_offset */
252b5132
RH
516
517 /* A 64 bit reference to a symbol. */
518 HOWTO (R_ALPHA_REFQUAD, /* type */
519 0, /* rightshift */
520 4, /* size (0 = byte, 1 = short, 2 = long) */
521 64, /* bitsize */
b34976b6 522 FALSE, /* pc_relative */
252b5132
RH
523 0, /* bitpos */
524 complain_overflow_bitfield, /* complain_on_overflow */
bc1bc43f 525 bfd_elf_generic_reloc, /* special_function */
252b5132 526 "REFQUAD", /* name */
b34976b6 527 FALSE, /* partial_inplace */
252b5132
RH
528 MINUS_ONE, /* src_mask */
529 MINUS_ONE, /* dst_mask */
b34976b6 530 FALSE), /* pcrel_offset */
252b5132
RH
531
532 /* A 32 bit GP relative offset. This is just like REFLONG except
533 that when the value is used the value of the gp register will be
534 added in. */
535 HOWTO (R_ALPHA_GPREL32, /* type */
536 0, /* rightshift */
537 2, /* size (0 = byte, 1 = short, 2 = long) */
538 32, /* bitsize */
b34976b6 539 FALSE, /* pc_relative */
252b5132
RH
540 0, /* bitpos */
541 complain_overflow_bitfield, /* complain_on_overflow */
bc1bc43f 542 bfd_elf_generic_reloc, /* special_function */
252b5132 543 "GPREL32", /* name */
b34976b6 544 FALSE, /* partial_inplace */
252b5132
RH
545 0xffffffff, /* src_mask */
546 0xffffffff, /* dst_mask */
b34976b6 547 FALSE), /* pcrel_offset */
252b5132
RH
548
549 /* Used for an instruction that refers to memory off the GP register. */
550 HOWTO (R_ALPHA_LITERAL, /* type */
551 0, /* rightshift */
dfe57ca0 552 1, /* size (0 = byte, 1 = short, 2 = long) */
252b5132 553 16, /* bitsize */
b34976b6 554 FALSE, /* pc_relative */
252b5132
RH
555 0, /* bitpos */
556 complain_overflow_signed, /* complain_on_overflow */
bc1bc43f 557 bfd_elf_generic_reloc, /* special_function */
252b5132 558 "ELF_LITERAL", /* name */
b34976b6 559 FALSE, /* partial_inplace */
252b5132
RH
560 0xffff, /* src_mask */
561 0xffff, /* dst_mask */
b34976b6 562 FALSE), /* pcrel_offset */
252b5132
RH
563
564 /* This reloc only appears immediately following an ELF_LITERAL reloc.
565 It identifies a use of the literal. The symbol index is special:
566 1 means the literal address is in the base register of a memory
567 format instruction; 2 means the literal address is in the byte
568 offset register of a byte-manipulation instruction; 3 means the
569 literal address is in the target register of a jsr instruction.
570 This does not actually do any relocation. */
571 HOWTO (R_ALPHA_LITUSE, /* type */
572 0, /* rightshift */
dfe57ca0 573 1, /* size (0 = byte, 1 = short, 2 = long) */
252b5132 574 32, /* bitsize */
b34976b6 575 FALSE, /* pc_relative */
252b5132
RH
576 0, /* bitpos */
577 complain_overflow_dont, /* complain_on_overflow */
578 elf64_alpha_reloc_nil, /* special_function */
579 "LITUSE", /* name */
b34976b6 580 FALSE, /* partial_inplace */
252b5132
RH
581 0, /* src_mask */
582 0, /* dst_mask */
b34976b6 583 FALSE), /* pcrel_offset */
252b5132
RH
584
585 /* Load the gp register. This is always used for a ldah instruction
586 which loads the upper 16 bits of the gp register. The symbol
587 index of the GPDISP instruction is an offset in bytes to the lda
588 instruction that loads the lower 16 bits. The value to use for
589 the relocation is the difference between the GP value and the
590 current location; the load will always be done against a register
591 holding the current address.
592
593 NOTE: Unlike ECOFF, partial in-place relocation is not done. If
594 any offset is present in the instructions, it is an offset from
595 the register to the ldah instruction. This lets us avoid any
596 stupid hackery like inventing a gp value to do partial relocation
597 against. Also unlike ECOFF, we do the whole relocation off of
598 the GPDISP rather than a GPDISP_HI16/GPDISP_LO16 pair. An odd,
599 space consuming bit, that, since all the information was present
600 in the GPDISP_HI16 reloc. */
601 HOWTO (R_ALPHA_GPDISP, /* type */
602 16, /* rightshift */
603 2, /* size (0 = byte, 1 = short, 2 = long) */
604 16, /* bitsize */
b34976b6 605 FALSE, /* pc_relative */
252b5132
RH
606 0, /* bitpos */
607 complain_overflow_dont, /* complain_on_overflow */
608 elf64_alpha_reloc_gpdisp, /* special_function */
609 "GPDISP", /* name */
b34976b6 610 FALSE, /* partial_inplace */
252b5132
RH
611 0xffff, /* src_mask */
612 0xffff, /* dst_mask */
b34976b6 613 TRUE), /* pcrel_offset */
252b5132
RH
614
615 /* A 21 bit branch. */
616 HOWTO (R_ALPHA_BRADDR, /* type */
617 2, /* rightshift */
618 2, /* size (0 = byte, 1 = short, 2 = long) */
619 21, /* bitsize */
b34976b6 620 TRUE, /* pc_relative */
252b5132
RH
621 0, /* bitpos */
622 complain_overflow_signed, /* complain_on_overflow */
bc1bc43f 623 bfd_elf_generic_reloc, /* special_function */
252b5132 624 "BRADDR", /* name */
b34976b6 625 FALSE, /* partial_inplace */
252b5132
RH
626 0x1fffff, /* src_mask */
627 0x1fffff, /* dst_mask */
b34976b6 628 TRUE), /* pcrel_offset */
252b5132
RH
629
630 /* A hint for a jump to a register. */
631 HOWTO (R_ALPHA_HINT, /* type */
632 2, /* rightshift */
dfe57ca0 633 1, /* size (0 = byte, 1 = short, 2 = long) */
252b5132 634 14, /* bitsize */
b34976b6 635 TRUE, /* pc_relative */
252b5132
RH
636 0, /* bitpos */
637 complain_overflow_dont, /* complain_on_overflow */
bc1bc43f 638 bfd_elf_generic_reloc, /* special_function */
252b5132 639 "HINT", /* name */
b34976b6 640 FALSE, /* partial_inplace */
252b5132
RH
641 0x3fff, /* src_mask */
642 0x3fff, /* dst_mask */
b34976b6 643 TRUE), /* pcrel_offset */
252b5132
RH
644
645 /* 16 bit PC relative offset. */
646 HOWTO (R_ALPHA_SREL16, /* type */
647 0, /* rightshift */
648 1, /* size (0 = byte, 1 = short, 2 = long) */
649 16, /* bitsize */
b34976b6 650 TRUE, /* pc_relative */
252b5132
RH
651 0, /* bitpos */
652 complain_overflow_signed, /* complain_on_overflow */
bc1bc43f 653 bfd_elf_generic_reloc, /* special_function */
252b5132 654 "SREL16", /* name */
b34976b6 655 FALSE, /* partial_inplace */
252b5132
RH
656 0xffff, /* src_mask */
657 0xffff, /* dst_mask */
b34976b6 658 TRUE), /* pcrel_offset */
252b5132
RH
659
660 /* 32 bit PC relative offset. */
661 HOWTO (R_ALPHA_SREL32, /* type */
662 0, /* rightshift */
663 2, /* size (0 = byte, 1 = short, 2 = long) */
664 32, /* bitsize */
b34976b6 665 TRUE, /* pc_relative */
252b5132
RH
666 0, /* bitpos */
667 complain_overflow_signed, /* complain_on_overflow */
bc1bc43f 668 bfd_elf_generic_reloc, /* special_function */
252b5132 669 "SREL32", /* name */
b34976b6 670 FALSE, /* partial_inplace */
252b5132
RH
671 0xffffffff, /* src_mask */
672 0xffffffff, /* dst_mask */
b34976b6 673 TRUE), /* pcrel_offset */
252b5132
RH
674
675 /* A 64 bit PC relative offset. */
676 HOWTO (R_ALPHA_SREL64, /* type */
677 0, /* rightshift */
678 4, /* size (0 = byte, 1 = short, 2 = long) */
679 64, /* bitsize */
b34976b6 680 TRUE, /* pc_relative */
252b5132
RH
681 0, /* bitpos */
682 complain_overflow_signed, /* complain_on_overflow */
bc1bc43f 683 bfd_elf_generic_reloc, /* special_function */
252b5132 684 "SREL64", /* name */
b34976b6 685 FALSE, /* partial_inplace */
252b5132
RH
686 MINUS_ONE, /* src_mask */
687 MINUS_ONE, /* dst_mask */
b34976b6 688 TRUE), /* pcrel_offset */
252b5132 689
dfe57ca0
RH
690 /* Skip 12 - 16; deprecated ECOFF relocs. */
691 SKIP_HOWTO (12),
692 SKIP_HOWTO (13),
693 SKIP_HOWTO (14),
694 SKIP_HOWTO (15),
695 SKIP_HOWTO (16),
252b5132
RH
696
697 /* The high 16 bits of the displacement from GP to the target. */
698 HOWTO (R_ALPHA_GPRELHIGH,
699 0, /* rightshift */
dfe57ca0 700 1, /* size (0 = byte, 1 = short, 2 = long) */
252b5132 701 16, /* bitsize */
b34976b6 702 FALSE, /* pc_relative */
252b5132
RH
703 0, /* bitpos */
704 complain_overflow_signed, /* complain_on_overflow */
bc1bc43f 705 bfd_elf_generic_reloc, /* special_function */
252b5132 706 "GPRELHIGH", /* name */
b34976b6 707 FALSE, /* partial_inplace */
252b5132
RH
708 0xffff, /* src_mask */
709 0xffff, /* dst_mask */
b34976b6 710 FALSE), /* pcrel_offset */
252b5132
RH
711
712 /* The low 16 bits of the displacement from GP to the target. */
713 HOWTO (R_ALPHA_GPRELLOW,
714 0, /* rightshift */
dfe57ca0 715 1, /* size (0 = byte, 1 = short, 2 = long) */
252b5132 716 16, /* bitsize */
b34976b6 717 FALSE, /* pc_relative */
252b5132
RH
718 0, /* bitpos */
719 complain_overflow_dont, /* complain_on_overflow */
bc1bc43f 720 bfd_elf_generic_reloc, /* special_function */
252b5132 721 "GPRELLOW", /* name */
b34976b6 722 FALSE, /* partial_inplace */
252b5132
RH
723 0xffff, /* src_mask */
724 0xffff, /* dst_mask */
b34976b6 725 FALSE), /* pcrel_offset */
252b5132
RH
726
727 /* A 16-bit displacement from the GP to the target. */
dfe57ca0 728 HOWTO (R_ALPHA_GPREL16,
252b5132 729 0, /* rightshift */
dfe57ca0 730 1, /* size (0 = byte, 1 = short, 2 = long) */
252b5132 731 16, /* bitsize */
b34976b6 732 FALSE, /* pc_relative */
252b5132
RH
733 0, /* bitpos */
734 complain_overflow_signed, /* complain_on_overflow */
bc1bc43f 735 bfd_elf_generic_reloc, /* special_function */
dfe57ca0 736 "GPREL16", /* name */
b34976b6 737 FALSE, /* partial_inplace */
252b5132
RH
738 0xffff, /* src_mask */
739 0xffff, /* dst_mask */
b34976b6 740 FALSE), /* pcrel_offset */
252b5132 741
dfe57ca0
RH
742 /* Skip 20 - 23; deprecated ECOFF relocs. */
743 SKIP_HOWTO (20),
744 SKIP_HOWTO (21),
745 SKIP_HOWTO (22),
746 SKIP_HOWTO (23),
252b5132 747
fe8bc63d 748 /* Misc ELF relocations. */
252b5132
RH
749
750 /* A dynamic relocation to copy the target into our .dynbss section. */
751 /* Not generated, as all Alpha objects use PIC, so it is not needed. It
752 is present because every other ELF has one, but should not be used
753 because .dynbss is an ugly thing. */
754 HOWTO (R_ALPHA_COPY,
755 0,
756 0,
757 0,
b34976b6 758 FALSE,
252b5132
RH
759 0,
760 complain_overflow_dont,
761 bfd_elf_generic_reloc,
762 "COPY",
b34976b6 763 FALSE,
252b5132
RH
764 0,
765 0,
b34976b6 766 TRUE),
252b5132
RH
767
768 /* A dynamic relocation for a .got entry. */
769 HOWTO (R_ALPHA_GLOB_DAT,
770 0,
771 0,
772 0,
b34976b6 773 FALSE,
252b5132
RH
774 0,
775 complain_overflow_dont,
776 bfd_elf_generic_reloc,
777 "GLOB_DAT",
b34976b6 778 FALSE,
252b5132
RH
779 0,
780 0,
b34976b6 781 TRUE),
252b5132
RH
782
783 /* A dynamic relocation for a .plt entry. */
784 HOWTO (R_ALPHA_JMP_SLOT,
785 0,
786 0,
787 0,
b34976b6 788 FALSE,
252b5132
RH
789 0,
790 complain_overflow_dont,
791 bfd_elf_generic_reloc,
792 "JMP_SLOT",
b34976b6 793 FALSE,
252b5132
RH
794 0,
795 0,
b34976b6 796 TRUE),
252b5132
RH
797
798 /* A dynamic relocation to add the base of the DSO to a 64-bit field. */
799 HOWTO (R_ALPHA_RELATIVE,
800 0,
801 0,
802 0,
b34976b6 803 FALSE,
252b5132
RH
804 0,
805 complain_overflow_dont,
806 bfd_elf_generic_reloc,
807 "RELATIVE",
b34976b6 808 FALSE,
252b5132
RH
809 0,
810 0,
b34976b6 811 TRUE),
7793f4d0
RH
812
813 /* A 21 bit branch that adjusts for gp loads. */
814 HOWTO (R_ALPHA_BRSGP, /* type */
815 2, /* rightshift */
816 2, /* size (0 = byte, 1 = short, 2 = long) */
817 21, /* bitsize */
b34976b6 818 TRUE, /* pc_relative */
7793f4d0
RH
819 0, /* bitpos */
820 complain_overflow_signed, /* complain_on_overflow */
bc1bc43f 821 bfd_elf_generic_reloc, /* special_function */
7793f4d0 822 "BRSGP", /* name */
b34976b6 823 FALSE, /* partial_inplace */
7793f4d0
RH
824 0x1fffff, /* src_mask */
825 0x1fffff, /* dst_mask */
b34976b6 826 TRUE), /* pcrel_offset */
3765b1be
RH
827
828 /* Creates a tls_index for the symbol in the got. */
829 HOWTO (R_ALPHA_TLSGD, /* type */
830 0, /* rightshift */
831 1, /* size (0 = byte, 1 = short, 2 = long) */
832 16, /* bitsize */
b34976b6 833 FALSE, /* pc_relative */
3765b1be
RH
834 0, /* bitpos */
835 complain_overflow_signed, /* complain_on_overflow */
bc1bc43f 836 bfd_elf_generic_reloc, /* special_function */
3765b1be 837 "TLSGD", /* name */
b34976b6 838 FALSE, /* partial_inplace */
3765b1be
RH
839 0xffff, /* src_mask */
840 0xffff, /* dst_mask */
b34976b6 841 FALSE), /* pcrel_offset */
3765b1be
RH
842
843 /* Creates a tls_index for the (current) module in the got. */
844 HOWTO (R_ALPHA_TLSLDM, /* type */
845 0, /* rightshift */
846 1, /* size (0 = byte, 1 = short, 2 = long) */
847 16, /* bitsize */
b34976b6 848 FALSE, /* pc_relative */
3765b1be
RH
849 0, /* bitpos */
850 complain_overflow_signed, /* complain_on_overflow */
bc1bc43f 851 bfd_elf_generic_reloc, /* special_function */
3765b1be 852 "TLSLDM", /* name */
b34976b6 853 FALSE, /* partial_inplace */
3765b1be
RH
854 0xffff, /* src_mask */
855 0xffff, /* dst_mask */
b34976b6 856 FALSE), /* pcrel_offset */
3765b1be
RH
857
858 /* A dynamic relocation for a DTP module entry. */
859 HOWTO (R_ALPHA_DTPMOD64, /* type */
860 0, /* rightshift */
861 4, /* size (0 = byte, 1 = short, 2 = long) */
862 64, /* bitsize */
b34976b6 863 FALSE, /* pc_relative */
3765b1be
RH
864 0, /* bitpos */
865 complain_overflow_bitfield, /* complain_on_overflow */
bc1bc43f 866 bfd_elf_generic_reloc, /* special_function */
3765b1be 867 "DTPMOD64", /* name */
b34976b6 868 FALSE, /* partial_inplace */
3765b1be
RH
869 MINUS_ONE, /* src_mask */
870 MINUS_ONE, /* dst_mask */
b34976b6 871 FALSE), /* pcrel_offset */
3765b1be
RH
872
873 /* Creates a 64-bit offset in the got for the displacement
874 from DTP to the target. */
875 HOWTO (R_ALPHA_GOTDTPREL, /* type */
876 0, /* rightshift */
877 1, /* size (0 = byte, 1 = short, 2 = long) */
878 16, /* bitsize */
b34976b6 879 FALSE, /* pc_relative */
3765b1be
RH
880 0, /* bitpos */
881 complain_overflow_signed, /* complain_on_overflow */
bc1bc43f 882 bfd_elf_generic_reloc, /* special_function */
3765b1be 883 "GOTDTPREL", /* name */
b34976b6 884 FALSE, /* partial_inplace */
3765b1be
RH
885 0xffff, /* src_mask */
886 0xffff, /* dst_mask */
b34976b6 887 FALSE), /* pcrel_offset */
3765b1be
RH
888
889 /* A dynamic relocation for a displacement from DTP to the target. */
890 HOWTO (R_ALPHA_DTPREL64, /* type */
891 0, /* rightshift */
892 4, /* size (0 = byte, 1 = short, 2 = long) */
893 64, /* bitsize */
b34976b6 894 FALSE, /* pc_relative */
3765b1be
RH
895 0, /* bitpos */
896 complain_overflow_bitfield, /* complain_on_overflow */
bc1bc43f 897 bfd_elf_generic_reloc, /* special_function */
3765b1be 898 "DTPREL64", /* name */
b34976b6 899 FALSE, /* partial_inplace */
3765b1be
RH
900 MINUS_ONE, /* src_mask */
901 MINUS_ONE, /* dst_mask */
b34976b6 902 FALSE), /* pcrel_offset */
3765b1be
RH
903
904 /* The high 16 bits of the displacement from DTP to the target. */
905 HOWTO (R_ALPHA_DTPRELHI, /* type */
906 0, /* rightshift */
907 1, /* size (0 = byte, 1 = short, 2 = long) */
908 16, /* bitsize */
b34976b6 909 FALSE, /* pc_relative */
3765b1be
RH
910 0, /* bitpos */
911 complain_overflow_signed, /* complain_on_overflow */
bc1bc43f 912 bfd_elf_generic_reloc, /* special_function */
3765b1be 913 "DTPRELHI", /* name */
b34976b6 914 FALSE, /* partial_inplace */
3765b1be
RH
915 0xffff, /* src_mask */
916 0xffff, /* dst_mask */
b34976b6 917 FALSE), /* pcrel_offset */
3765b1be
RH
918
919 /* The low 16 bits of the displacement from DTP to the target. */
920 HOWTO (R_ALPHA_DTPRELLO, /* type */
921 0, /* rightshift */
922 1, /* size (0 = byte, 1 = short, 2 = long) */
923 16, /* bitsize */
b34976b6 924 FALSE, /* pc_relative */
3765b1be
RH
925 0, /* bitpos */
926 complain_overflow_dont, /* complain_on_overflow */
bc1bc43f 927 bfd_elf_generic_reloc, /* special_function */
3765b1be 928 "DTPRELLO", /* name */
b34976b6 929 FALSE, /* partial_inplace */
3765b1be
RH
930 0xffff, /* src_mask */
931 0xffff, /* dst_mask */
b34976b6 932 FALSE), /* pcrel_offset */
3765b1be
RH
933
934 /* A 16-bit displacement from DTP to the target. */
935 HOWTO (R_ALPHA_DTPREL16, /* type */
936 0, /* rightshift */
937 1, /* size (0 = byte, 1 = short, 2 = long) */
938 16, /* bitsize */
b34976b6 939 FALSE, /* pc_relative */
3765b1be
RH
940 0, /* bitpos */
941 complain_overflow_signed, /* complain_on_overflow */
bc1bc43f 942 bfd_elf_generic_reloc, /* special_function */
3765b1be 943 "DTPREL16", /* name */
b34976b6 944 FALSE, /* partial_inplace */
3765b1be
RH
945 0xffff, /* src_mask */
946 0xffff, /* dst_mask */
b34976b6 947 FALSE), /* pcrel_offset */
3765b1be
RH
948
949 /* Creates a 64-bit offset in the got for the displacement
950 from TP to the target. */
951 HOWTO (R_ALPHA_GOTTPREL, /* type */
952 0, /* rightshift */
953 1, /* size (0 = byte, 1 = short, 2 = long) */
954 16, /* bitsize */
b34976b6 955 FALSE, /* pc_relative */
3765b1be
RH
956 0, /* bitpos */
957 complain_overflow_signed, /* complain_on_overflow */
bc1bc43f 958 bfd_elf_generic_reloc, /* special_function */
3765b1be 959 "GOTTPREL", /* name */
b34976b6 960 FALSE, /* partial_inplace */
3765b1be
RH
961 0xffff, /* src_mask */
962 0xffff, /* dst_mask */
b34976b6 963 FALSE), /* pcrel_offset */
3765b1be
RH
964
965 /* A dynamic relocation for a displacement from TP to the target. */
966 HOWTO (R_ALPHA_TPREL64, /* type */
967 0, /* rightshift */
968 4, /* size (0 = byte, 1 = short, 2 = long) */
969 64, /* bitsize */
b34976b6 970 FALSE, /* pc_relative */
3765b1be
RH
971 0, /* bitpos */
972 complain_overflow_bitfield, /* complain_on_overflow */
bc1bc43f 973 bfd_elf_generic_reloc, /* special_function */
3765b1be 974 "TPREL64", /* name */
b34976b6 975 FALSE, /* partial_inplace */
3765b1be
RH
976 MINUS_ONE, /* src_mask */
977 MINUS_ONE, /* dst_mask */
b34976b6 978 FALSE), /* pcrel_offset */
3765b1be
RH
979
980 /* The high 16 bits of the displacement from TP to the target. */
981 HOWTO (R_ALPHA_TPRELHI, /* type */
982 0, /* rightshift */
983 1, /* size (0 = byte, 1 = short, 2 = long) */
984 16, /* bitsize */
b34976b6 985 FALSE, /* pc_relative */
3765b1be
RH
986 0, /* bitpos */
987 complain_overflow_signed, /* complain_on_overflow */
bc1bc43f 988 bfd_elf_generic_reloc, /* special_function */
3765b1be 989 "TPRELHI", /* name */
b34976b6 990 FALSE, /* partial_inplace */
3765b1be
RH
991 0xffff, /* src_mask */
992 0xffff, /* dst_mask */
b34976b6 993 FALSE), /* pcrel_offset */
3765b1be
RH
994
995 /* The low 16 bits of the displacement from TP to the target. */
996 HOWTO (R_ALPHA_TPRELLO, /* type */
997 0, /* rightshift */
998 1, /* size (0 = byte, 1 = short, 2 = long) */
999 16, /* bitsize */
b34976b6 1000 FALSE, /* pc_relative */
3765b1be
RH
1001 0, /* bitpos */
1002 complain_overflow_dont, /* complain_on_overflow */
bc1bc43f 1003 bfd_elf_generic_reloc, /* special_function */
3765b1be 1004 "TPRELLO", /* name */
b34976b6 1005 FALSE, /* partial_inplace */
3765b1be
RH
1006 0xffff, /* src_mask */
1007 0xffff, /* dst_mask */
b34976b6 1008 FALSE), /* pcrel_offset */
3765b1be
RH
1009
1010 /* A 16-bit displacement from TP to the target. */
1011 HOWTO (R_ALPHA_TPREL16, /* type */
1012 0, /* rightshift */
1013 1, /* size (0 = byte, 1 = short, 2 = long) */
1014 16, /* bitsize */
b34976b6 1015 FALSE, /* pc_relative */
3765b1be
RH
1016 0, /* bitpos */
1017 complain_overflow_signed, /* complain_on_overflow */
bc1bc43f 1018 bfd_elf_generic_reloc, /* special_function */
3765b1be 1019 "TPREL16", /* name */
b34976b6 1020 FALSE, /* partial_inplace */
3765b1be
RH
1021 0xffff, /* src_mask */
1022 0xffff, /* dst_mask */
b34976b6 1023 FALSE), /* pcrel_offset */
252b5132
RH
1024};
1025
252b5132
RH
1026/* A mapping from BFD reloc types to Alpha ELF reloc types. */
1027
1028struct elf_reloc_map
1029{
1030 bfd_reloc_code_real_type bfd_reloc_val;
1031 int elf_reloc_val;
1032};
1033
1034static const struct elf_reloc_map elf64_alpha_reloc_map[] =
1035{
dfe57ca0
RH
1036 {BFD_RELOC_NONE, R_ALPHA_NONE},
1037 {BFD_RELOC_32, R_ALPHA_REFLONG},
1038 {BFD_RELOC_64, R_ALPHA_REFQUAD},
1039 {BFD_RELOC_CTOR, R_ALPHA_REFQUAD},
1040 {BFD_RELOC_GPREL32, R_ALPHA_GPREL32},
1041 {BFD_RELOC_ALPHA_ELF_LITERAL, R_ALPHA_LITERAL},
1042 {BFD_RELOC_ALPHA_LITUSE, R_ALPHA_LITUSE},
1043 {BFD_RELOC_ALPHA_GPDISP, R_ALPHA_GPDISP},
1044 {BFD_RELOC_23_PCREL_S2, R_ALPHA_BRADDR},
1045 {BFD_RELOC_ALPHA_HINT, R_ALPHA_HINT},
1046 {BFD_RELOC_16_PCREL, R_ALPHA_SREL16},
1047 {BFD_RELOC_32_PCREL, R_ALPHA_SREL32},
1048 {BFD_RELOC_64_PCREL, R_ALPHA_SREL64},
1049 {BFD_RELOC_ALPHA_GPREL_HI16, R_ALPHA_GPRELHIGH},
1050 {BFD_RELOC_ALPHA_GPREL_LO16, R_ALPHA_GPRELLOW},
1051 {BFD_RELOC_GPREL16, R_ALPHA_GPREL16},
7793f4d0 1052 {BFD_RELOC_ALPHA_BRSGP, R_ALPHA_BRSGP},
3765b1be
RH
1053 {BFD_RELOC_ALPHA_TLSGD, R_ALPHA_TLSGD},
1054 {BFD_RELOC_ALPHA_TLSLDM, R_ALPHA_TLSLDM},
1055 {BFD_RELOC_ALPHA_DTPMOD64, R_ALPHA_DTPMOD64},
1056 {BFD_RELOC_ALPHA_GOTDTPREL16, R_ALPHA_GOTDTPREL},
1057 {BFD_RELOC_ALPHA_DTPREL64, R_ALPHA_DTPREL64},
1058 {BFD_RELOC_ALPHA_DTPREL_HI16, R_ALPHA_DTPRELHI},
1059 {BFD_RELOC_ALPHA_DTPREL_LO16, R_ALPHA_DTPRELLO},
1060 {BFD_RELOC_ALPHA_DTPREL16, R_ALPHA_DTPREL16},
1061 {BFD_RELOC_ALPHA_GOTTPREL16, R_ALPHA_GOTTPREL},
1062 {BFD_RELOC_ALPHA_TPREL64, R_ALPHA_TPREL64},
1063 {BFD_RELOC_ALPHA_TPREL_HI16, R_ALPHA_TPRELHI},
1064 {BFD_RELOC_ALPHA_TPREL_LO16, R_ALPHA_TPRELLO},
1065 {BFD_RELOC_ALPHA_TPREL16, R_ALPHA_TPREL16},
252b5132
RH
1066};
1067
1068/* Given a BFD reloc type, return a HOWTO structure. */
1069
1070static reloc_howto_type *
a7519a3c
RH
1071elf64_alpha_bfd_reloc_type_lookup (bfd *abfd ATTRIBUTE_UNUSED,
1072 bfd_reloc_code_real_type code)
252b5132
RH
1073{
1074 const struct elf_reloc_map *i, *e;
1075 i = e = elf64_alpha_reloc_map;
1076 e += sizeof (elf64_alpha_reloc_map) / sizeof (struct elf_reloc_map);
1077 for (; i != e; ++i)
1078 {
1079 if (i->bfd_reloc_val == code)
1080 return &elf64_alpha_howto_table[i->elf_reloc_val];
1081 }
1082 return 0;
1083}
1084
157090f7
AM
1085static reloc_howto_type *
1086elf64_alpha_bfd_reloc_name_lookup (bfd *abfd ATTRIBUTE_UNUSED,
1087 const char *r_name)
1088{
1089 unsigned int i;
1090
1091 for (i = 0;
1092 i < (sizeof (elf64_alpha_howto_table)
1093 / sizeof (elf64_alpha_howto_table[0]));
1094 i++)
1095 if (elf64_alpha_howto_table[i].name != NULL
1096 && strcasecmp (elf64_alpha_howto_table[i].name, r_name) == 0)
1097 return &elf64_alpha_howto_table[i];
1098
1099 return NULL;
1100}
1101
252b5132
RH
1102/* Given an Alpha ELF reloc type, fill in an arelent structure. */
1103
f3185997 1104static bfd_boolean
0aa13fee 1105elf64_alpha_info_to_howto (bfd *abfd, arelent *cache_ptr,
a7519a3c 1106 Elf_Internal_Rela *dst)
252b5132 1107{
a7519a3c 1108 unsigned r_type = ELF64_R_TYPE(dst->r_info);
cd21f5da
NC
1109
1110 if (r_type >= R_ALPHA_max)
1111 {
695344c0 1112 /* xgettext:c-format */
0aa13fee 1113 _bfd_error_handler (_("%pB: unsupported relocation type %#x"),
4eca0228 1114 abfd, r_type);
cd21f5da 1115 bfd_set_error (bfd_error_bad_value);
f3185997 1116 return FALSE;
cd21f5da 1117 }
252b5132 1118 cache_ptr->howto = &elf64_alpha_howto_table[r_type];
f3185997 1119 return TRUE;
252b5132 1120}
3765b1be
RH
1121
1122/* These two relocations create a two-word entry in the got. */
1123#define alpha_got_entry_size(r_type) \
1124 (r_type == R_ALPHA_TLSGD || r_type == R_ALPHA_TLSLDM ? 16 : 8)
9e756d64
RH
1125
1126/* This is PT_TLS segment p_vaddr. */
e1918d23
AM
1127#define alpha_get_dtprel_base(info) \
1128 (elf_hash_table (info)->tls_sec->vma)
9e756d64
RH
1129
1130/* Main program TLS (whose template starts at PT_TLS p_vaddr)
1131 is assigned offset round(16, PT_TLS p_align). */
e1918d23
AM
1132#define alpha_get_tprel_base(info) \
1133 (elf_hash_table (info)->tls_sec->vma \
1134 - align_power ((bfd_vma) 16, \
1135 elf_hash_table (info)->tls_sec->alignment_power))
252b5132 1136\f
a7519a3c
RH
1137/* Handle an Alpha specific section when reading an object file. This
1138 is called when bfd_section_from_shdr finds a section with an unknown
bf577467 1139 type. */
252b5132 1140
a7519a3c
RH
1141static bfd_boolean
1142elf64_alpha_section_from_shdr (bfd *abfd,
1143 Elf_Internal_Shdr *hdr,
1144 const char *name,
1145 int shindex)
252b5132 1146{
a7519a3c
RH
1147 asection *newsect;
1148
1149 /* There ought to be a place to keep ELF backend specific flags, but
1150 at the moment there isn't one. We just keep track of the
1151 sections by their name, instead. Fortunately, the ABI gives
1152 suggested names for all the MIPS specific sections, so we will
1153 probably get away with this. */
1154 switch (hdr->sh_type)
1155 {
1156 case SHT_ALPHA_DEBUG:
1157 if (strcmp (name, ".mdebug") != 0)
1158 return FALSE;
1159 break;
1160 default:
1161 return FALSE;
1162 }
252b5132 1163
a7519a3c
RH
1164 if (! _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex))
1165 return FALSE;
1166 newsect = hdr->bfd_section;
252b5132 1167
a7519a3c 1168 if (hdr->sh_type == SHT_ALPHA_DEBUG)
252b5132 1169 {
fd361982
AM
1170 if (!bfd_set_section_flags (newsect,
1171 bfd_section_flags (newsect) | SEC_DEBUGGING))
a7519a3c 1172 return FALSE;
252b5132 1173 }
a7519a3c
RH
1174
1175 return TRUE;
252b5132
RH
1176}
1177
a7519a3c
RH
1178/* Convert Alpha specific section flags to bfd internal section flags. */
1179
b34976b6 1180static bfd_boolean
8c803a2d 1181elf64_alpha_section_flags (const Elf_Internal_Shdr *hdr)
252b5132 1182{
a7519a3c 1183 if (hdr->sh_flags & SHF_ALPHA_GPREL)
8c803a2d 1184 hdr->bfd_section->flags |= SEC_SMALL_DATA;
252b5132 1185
a7519a3c
RH
1186 return TRUE;
1187}
252b5132 1188
a7519a3c
RH
1189/* Set the correct type for an Alpha ELF section. We do this by the
1190 section name, which is a hack, but ought to work. */
9e756d64 1191
a7519a3c
RH
1192static bfd_boolean
1193elf64_alpha_fake_sections (bfd *abfd, Elf_Internal_Shdr *hdr, asection *sec)
1194{
1195 register const char *name;
1196
fd361982 1197 name = bfd_section_name (sec);
a7519a3c
RH
1198
1199 if (strcmp (name, ".mdebug") == 0)
252b5132 1200 {
a7519a3c
RH
1201 hdr->sh_type = SHT_ALPHA_DEBUG;
1202 /* In a shared object on Irix 5.3, the .mdebug section has an
07d6d2b8 1203 entsize of 0. FIXME: Does this matter? */
a7519a3c
RH
1204 if ((abfd->flags & DYNAMIC) != 0 )
1205 hdr->sh_entsize = 0;
1206 else
1207 hdr->sh_entsize = 1;
252b5132 1208 }
a7519a3c
RH
1209 else if ((sec->flags & SEC_SMALL_DATA)
1210 || strcmp (name, ".sdata") == 0
1211 || strcmp (name, ".sbss") == 0
1212 || strcmp (name, ".lit4") == 0
1213 || strcmp (name, ".lit8") == 0)
1214 hdr->sh_flags |= SHF_ALPHA_GPREL;
252b5132 1215
a7519a3c
RH
1216 return TRUE;
1217}
252b5132 1218
a7519a3c
RH
1219/* Hook called by the linker routine which adds symbols from an object
1220 file. We use it to put .comm items in .sbss, and not .bss. */
1221
1222static bfd_boolean
1223elf64_alpha_add_symbol_hook (bfd *abfd, struct bfd_link_info *info,
1224 Elf_Internal_Sym *sym,
1225 const char **namep ATTRIBUTE_UNUSED,
1226 flagword *flagsp ATTRIBUTE_UNUSED,
1227 asection **secp, bfd_vma *valp)
1228{
1229 if (sym->st_shndx == SHN_COMMON
0e1862bb 1230 && !bfd_link_relocatable (info)
a7519a3c 1231 && sym->st_size <= elf_gp_size (abfd))
252b5132 1232 {
a7519a3c
RH
1233 /* Common symbols less than or equal to -G nn bytes are
1234 automatically put into .sbss. */
ffcb7aff 1235
a7519a3c 1236 asection *scomm = bfd_get_section_by_name (abfd, ".scommon");
252b5132 1237
a7519a3c 1238 if (scomm == NULL)
252b5132 1239 {
a7519a3c
RH
1240 scomm = bfd_make_section_with_flags (abfd, ".scommon",
1241 (SEC_ALLOC
1242 | SEC_IS_COMMON
1243 | SEC_LINKER_CREATED));
1244 if (scomm == NULL)
1245 return FALSE;
1246 }
ffcb7aff 1247
a7519a3c
RH
1248 *secp = scomm;
1249 *valp = sym->st_size;
1250 }
ffcb7aff 1251
a7519a3c
RH
1252 return TRUE;
1253}
252b5132 1254
a7519a3c 1255/* Create the .got section. */
252b5132 1256
a7519a3c
RH
1257static bfd_boolean
1258elf64_alpha_create_got_section (bfd *abfd,
1259 struct bfd_link_info *info ATTRIBUTE_UNUSED)
1260{
85d162e6 1261 flagword flags;
a7519a3c 1262 asection *s;
252b5132 1263
0ffa91dd
NC
1264 if (! is_alpha_elf (abfd))
1265 return FALSE;
1266
85d162e6
AM
1267 flags = (SEC_ALLOC | SEC_LOAD | SEC_HAS_CONTENTS | SEC_IN_MEMORY
1268 | SEC_LINKER_CREATED);
1269 s = bfd_make_section_anyway_with_flags (abfd, ".got", flags);
a7519a3c 1270 if (s == NULL
fd361982 1271 || !bfd_set_section_alignment (s, 3))
a7519a3c 1272 return FALSE;
252b5132 1273
a7519a3c 1274 alpha_elf_tdata (abfd)->got = s;
252b5132 1275
85d162e6
AM
1276 /* Make sure the object's gotobj is set to itself so that we default
1277 to every object with its own .got. We'll merge .gots later once
1278 we've collected each object's info. */
1279 alpha_elf_tdata (abfd)->gotobj = abfd;
1280
a7519a3c
RH
1281 return TRUE;
1282}
252b5132 1283
a7519a3c 1284/* Create all the dynamic sections. */
252b5132 1285
a7519a3c
RH
1286static bfd_boolean
1287elf64_alpha_create_dynamic_sections (bfd *abfd, struct bfd_link_info *info)
1288{
1289 asection *s;
85d162e6 1290 flagword flags;
a7519a3c 1291 struct elf_link_hash_entry *h;
252b5132 1292
0ffa91dd
NC
1293 if (! is_alpha_elf (abfd))
1294 return FALSE;
1295
a7519a3c 1296 /* We need to create .plt, .rela.plt, .got, and .rela.got sections. */
252b5132 1297
85d162e6
AM
1298 flags = (SEC_ALLOC | SEC_LOAD | SEC_CODE | SEC_HAS_CONTENTS | SEC_IN_MEMORY
1299 | SEC_LINKER_CREATED
1300 | (elf64_alpha_use_secureplt ? SEC_READONLY : 0));
1301 s = bfd_make_section_anyway_with_flags (abfd, ".plt", flags);
ce558b89 1302 elf_hash_table (info)->splt = s;
fd361982 1303 if (s == NULL || ! bfd_set_section_alignment (s, 4))
a7519a3c 1304 return FALSE;
252b5132 1305
a7519a3c
RH
1306 /* Define the symbol _PROCEDURE_LINKAGE_TABLE_ at the start of the
1307 .plt section. */
7325306f
RS
1308 h = _bfd_elf_define_linkage_sym (abfd, info, s,
1309 "_PROCEDURE_LINKAGE_TABLE_");
1310 elf_hash_table (info)->hplt = h;
1311 if (h == NULL)
a7519a3c 1312 return FALSE;
d6ad34f6 1313
85d162e6
AM
1314 flags = (SEC_ALLOC | SEC_LOAD | SEC_HAS_CONTENTS | SEC_IN_MEMORY
1315 | SEC_LINKER_CREATED | SEC_READONLY);
1316 s = bfd_make_section_anyway_with_flags (abfd, ".rela.plt", flags);
ce558b89 1317 elf_hash_table (info)->srelplt = s;
fd361982 1318 if (s == NULL || ! bfd_set_section_alignment (s, 3))
a7519a3c 1319 return FALSE;
252b5132 1320
6ec7057a
RH
1321 if (elf64_alpha_use_secureplt)
1322 {
85d162e6
AM
1323 flags = SEC_ALLOC | SEC_LINKER_CREATED;
1324 s = bfd_make_section_anyway_with_flags (abfd, ".got.plt", flags);
ce558b89 1325 elf_hash_table (info)->sgotplt = s;
fd361982 1326 if (s == NULL || ! bfd_set_section_alignment (s, 3))
6ec7057a
RH
1327 return FALSE;
1328 }
1329
a7519a3c
RH
1330 /* We may or may not have created a .got section for this object, but
1331 we definitely havn't done the rest of the work. */
1cd6895c 1332
85d162e6
AM
1333 if (alpha_elf_tdata(abfd)->gotobj == NULL)
1334 {
1335 if (!elf64_alpha_create_got_section (abfd, info))
1336 return FALSE;
1337 }
1cd6895c 1338
85d162e6
AM
1339 flags = (SEC_ALLOC | SEC_LOAD | SEC_HAS_CONTENTS | SEC_IN_MEMORY
1340 | SEC_LINKER_CREATED | SEC_READONLY);
1341 s = bfd_make_section_anyway_with_flags (abfd, ".rela.got", flags);
ce558b89 1342 elf_hash_table (info)->srelgot = s;
a7519a3c 1343 if (s == NULL
fd361982 1344 || !bfd_set_section_alignment (s, 3))
a7519a3c 1345 return FALSE;
252b5132 1346
a7519a3c
RH
1347 /* Define the symbol _GLOBAL_OFFSET_TABLE_ at the start of the
1348 dynobj's .got section. We don't do this in the linker script
1349 because we don't want to define the symbol if we are not creating
1350 a global offset table. */
d98685ac
AM
1351 h = _bfd_elf_define_linkage_sym (abfd, info, alpha_elf_tdata(abfd)->got,
1352 "_GLOBAL_OFFSET_TABLE_");
a7519a3c 1353 elf_hash_table (info)->hgot = h;
d98685ac
AM
1354 if (h == NULL)
1355 return FALSE;
252b5132 1356
a7519a3c 1357 return TRUE;
252b5132 1358}
a7519a3c
RH
1359\f
1360/* Read ECOFF debugging information from a .mdebug section into a
1361 ecoff_debug_info structure. */
252b5132 1362
a7519a3c
RH
1363static bfd_boolean
1364elf64_alpha_read_ecoff_info (bfd *abfd, asection *section,
1365 struct ecoff_debug_info *debug)
252b5132 1366{
a7519a3c
RH
1367 HDRR *symhdr;
1368 const struct ecoff_debug_swap *swap;
1369 char *ext_hdr = NULL;
252b5132 1370
a7519a3c
RH
1371 swap = get_elf_backend_data (abfd)->elf_backend_ecoff_debug_swap;
1372 memset (debug, 0, sizeof (*debug));
252b5132 1373
a7519a3c
RH
1374 ext_hdr = (char *) bfd_malloc (swap->external_hdr_size);
1375 if (ext_hdr == NULL && swap->external_hdr_size != 0)
1376 goto error_return;
252b5132 1377
a7519a3c
RH
1378 if (! bfd_get_section_contents (abfd, section, ext_hdr, (file_ptr) 0,
1379 swap->external_hdr_size))
1380 goto error_return;
252b5132 1381
a7519a3c
RH
1382 symhdr = &debug->symbolic_header;
1383 (*swap->swap_hdr_in) (abfd, ext_hdr, symhdr);
252b5132 1384
a7519a3c
RH
1385 /* The symbolic header contains absolute file offsets and sizes to
1386 read. */
1387#define READ(ptr, offset, count, size, type) \
1f4361a7 1388 do \
a7519a3c 1389 { \
1f4361a7
AM
1390 size_t amt; \
1391 debug->ptr = NULL; \
1392 if (symhdr->count == 0) \
1393 break; \
1394 if (_bfd_mul_overflow (size, symhdr->count, &amt)) \
1395 { \
1396 bfd_set_error (bfd_error_file_too_big); \
1397 goto error_return; \
1398 } \
2bb3687b 1399 if (bfd_seek (abfd, symhdr->offset, SEEK_SET) != 0) \
a7519a3c 1400 goto error_return; \
2bb3687b
AM
1401 debug->ptr = (type) _bfd_malloc_and_read (abfd, amt, amt); \
1402 if (debug->ptr == NULL) \
a7519a3c 1403 goto error_return; \
1f4361a7 1404 } while (0)
fe8bc63d 1405
a7519a3c 1406 READ (line, cbLineOffset, cbLine, sizeof (unsigned char), unsigned char *);
2c3fc389
NC
1407 READ (external_dnr, cbDnOffset, idnMax, swap->external_dnr_size, void *);
1408 READ (external_pdr, cbPdOffset, ipdMax, swap->external_pdr_size, void *);
1409 READ (external_sym, cbSymOffset, isymMax, swap->external_sym_size, void *);
1410 READ (external_opt, cbOptOffset, ioptMax, swap->external_opt_size, void *);
a7519a3c
RH
1411 READ (external_aux, cbAuxOffset, iauxMax, sizeof (union aux_ext),
1412 union aux_ext *);
1413 READ (ss, cbSsOffset, issMax, sizeof (char), char *);
1414 READ (ssext, cbSsExtOffset, issExtMax, sizeof (char), char *);
2c3fc389
NC
1415 READ (external_fdr, cbFdOffset, ifdMax, swap->external_fdr_size, void *);
1416 READ (external_rfd, cbRfdOffset, crfd, swap->external_rfd_size, void *);
1417 READ (external_ext, cbExtOffset, iextMax, swap->external_ext_size, void *);
a7519a3c 1418#undef READ
252b5132 1419
a7519a3c 1420 debug->fdr = NULL;
252b5132 1421
a7519a3c 1422 return TRUE;
252b5132 1423
a7519a3c 1424 error_return:
c9594989
AM
1425 free (ext_hdr);
1426 free (debug->line);
1427 free (debug->external_dnr);
1428 free (debug->external_pdr);
1429 free (debug->external_sym);
1430 free (debug->external_opt);
1431 free (debug->external_aux);
1432 free (debug->ss);
1433 free (debug->ssext);
1434 free (debug->external_fdr);
1435 free (debug->external_rfd);
1436 free (debug->external_ext);
a7519a3c 1437 return FALSE;
252b5132
RH
1438}
1439
a7519a3c
RH
1440/* Alpha ELF local labels start with '$'. */
1441
b34976b6 1442static bfd_boolean
a7519a3c 1443elf64_alpha_is_local_label_name (bfd *abfd ATTRIBUTE_UNUSED, const char *name)
252b5132 1444{
a7519a3c
RH
1445 return name[0] == '$';
1446}
9e756d64 1447
a7519a3c 1448static bfd_boolean
fb167eb2
AM
1449elf64_alpha_find_nearest_line (bfd *abfd, asymbol **symbols,
1450 asection *section, bfd_vma offset,
1451 const char **filename_ptr,
a7519a3c 1452 const char **functionname_ptr,
fb167eb2
AM
1453 unsigned int *line_ptr,
1454 unsigned int *discriminator_ptr)
a7519a3c
RH
1455{
1456 asection *msec;
252b5132 1457
fb167eb2 1458 if (_bfd_dwarf2_find_nearest_line (abfd, symbols, NULL, section, offset,
a7519a3c 1459 filename_ptr, functionname_ptr,
fb167eb2 1460 line_ptr, discriminator_ptr,
9defd221 1461 dwarf_debug_sections,
7f3bf384
AM
1462 &elf_tdata (abfd)->dwarf2_find_line_info)
1463 == 1)
b34976b6 1464 return TRUE;
9e756d64 1465
a7519a3c
RH
1466 msec = bfd_get_section_by_name (abfd, ".mdebug");
1467 if (msec != NULL)
1bbc9cec 1468 {
a7519a3c 1469 flagword origflags;
698600e4 1470 struct alpha_elf_find_line *fi;
a7519a3c
RH
1471 const struct ecoff_debug_swap * const swap =
1472 get_elf_backend_data (abfd)->elf_backend_ecoff_debug_swap;
252b5132 1473
a7519a3c
RH
1474 /* If we are called during a link, alpha_elf_final_link may have
1475 cleared the SEC_HAS_CONTENTS field. We force it back on here
1476 if appropriate (which it normally will be). */
1477 origflags = msec->flags;
1478 if (elf_section_data (msec)->this_hdr.sh_type != SHT_NOBITS)
1479 msec->flags |= SEC_HAS_CONTENTS;
9e756d64 1480
698600e4 1481 fi = alpha_elf_tdata (abfd)->find_line_info;
a7519a3c
RH
1482 if (fi == NULL)
1483 {
1484 bfd_size_type external_fdr_size;
1485 char *fraw_src;
1486 char *fraw_end;
1487 struct fdr *fdr_ptr;
698600e4 1488 bfd_size_type amt = sizeof (struct alpha_elf_find_line);
9e756d64 1489
698600e4 1490 fi = (struct alpha_elf_find_line *) bfd_zalloc (abfd, amt);
a7519a3c
RH
1491 if (fi == NULL)
1492 {
1493 msec->flags = origflags;
1494 return FALSE;
1495 }
9e756d64 1496
a7519a3c
RH
1497 if (!elf64_alpha_read_ecoff_info (abfd, msec, &fi->d))
1498 {
1499 msec->flags = origflags;
1500 return FALSE;
1501 }
9e756d64 1502
a7519a3c
RH
1503 /* Swap in the FDR information. */
1504 amt = fi->d.symbolic_header.ifdMax * sizeof (struct fdr);
1505 fi->d.fdr = (struct fdr *) bfd_alloc (abfd, amt);
1506 if (fi->d.fdr == NULL)
1507 {
1508 msec->flags = origflags;
1509 return FALSE;
1510 }
1511 external_fdr_size = swap->external_fdr_size;
1512 fdr_ptr = fi->d.fdr;
1513 fraw_src = (char *) fi->d.external_fdr;
1514 fraw_end = (fraw_src
1515 + fi->d.symbolic_header.ifdMax * external_fdr_size);
1516 for (; fraw_src < fraw_end; fraw_src += external_fdr_size, fdr_ptr++)
2c3fc389 1517 (*swap->swap_fdr_in) (abfd, fraw_src, fdr_ptr);
9e756d64 1518
698600e4 1519 alpha_elf_tdata (abfd)->find_line_info = fi;
9e756d64 1520
a7519a3c 1521 /* Note that we don't bother to ever free this information.
07d6d2b8
AM
1522 find_nearest_line is either called all the time, as in
1523 objdump -l, so the information should be saved, or it is
1524 rarely called, as in ld error messages, so the memory
1525 wasted is unimportant. Still, it would probably be a
1526 good idea for free_cached_info to throw it away. */
a7519a3c 1527 }
9e756d64 1528
a7519a3c
RH
1529 if (_bfd_ecoff_locate_line (abfd, section, offset, &fi->d, swap,
1530 &fi->i, filename_ptr, functionname_ptr,
1531 line_ptr))
1532 {
1533 msec->flags = origflags;
1534 return TRUE;
1535 }
9e756d64 1536
a7519a3c 1537 msec->flags = origflags;
9e756d64 1538 }
9e756d64 1539
a7519a3c 1540 /* Fall back on the generic ELF find_nearest_line routine. */
9e756d64 1541
fb167eb2 1542 return _bfd_elf_find_nearest_line (abfd, symbols, section, offset,
a7519a3c 1543 filename_ptr, functionname_ptr,
fb167eb2 1544 line_ptr, discriminator_ptr);
9e756d64 1545}
a7519a3c
RH
1546\f
1547/* Structure used to pass information to alpha_elf_output_extsym. */
9e756d64 1548
a7519a3c 1549struct extsym_info
9e756d64 1550{
a7519a3c
RH
1551 bfd *abfd;
1552 struct bfd_link_info *info;
1553 struct ecoff_debug_info *debug;
1554 const struct ecoff_debug_swap *swap;
1555 bfd_boolean failed;
1556};
9e756d64 1557
a7519a3c 1558static bfd_boolean
2c3fc389 1559elf64_alpha_output_extsym (struct alpha_elf_link_hash_entry *h, void * data)
a7519a3c
RH
1560{
1561 struct extsym_info *einfo = (struct extsym_info *) data;
1562 bfd_boolean strip;
1563 asection *sec, *output_section;
9e756d64 1564
a7519a3c
RH
1565 if (h->root.indx == -2)
1566 strip = FALSE;
1567 else if ((h->root.def_dynamic
1568 || h->root.ref_dynamic
1569 || h->root.root.type == bfd_link_hash_new)
1570 && !h->root.def_regular
1571 && !h->root.ref_regular)
1572 strip = TRUE;
1573 else if (einfo->info->strip == strip_all
1574 || (einfo->info->strip == strip_some
1575 && bfd_hash_lookup (einfo->info->keep_hash,
1576 h->root.root.root.string,
1577 FALSE, FALSE) == NULL))
1578 strip = TRUE;
1579 else
1580 strip = FALSE;
9e756d64 1581
a7519a3c 1582 if (strip)
b34976b6 1583 return TRUE;
9e756d64 1584
a7519a3c 1585 if (h->esym.ifd == -2)
9e756d64 1586 {
a7519a3c
RH
1587 h->esym.jmptbl = 0;
1588 h->esym.cobol_main = 0;
1589 h->esym.weakext = 0;
1590 h->esym.reserved = 0;
1591 h->esym.ifd = ifdNil;
1592 h->esym.asym.value = 0;
1593 h->esym.asym.st = stGlobal;
9e756d64 1594
a7519a3c
RH
1595 if (h->root.root.type != bfd_link_hash_defined
1596 && h->root.root.type != bfd_link_hash_defweak)
1597 h->esym.asym.sc = scAbs;
1598 else
1599 {
1600 const char *name;
9e756d64 1601
a7519a3c
RH
1602 sec = h->root.root.u.def.section;
1603 output_section = sec->output_section;
9e756d64 1604
a7519a3c
RH
1605 /* When making a shared library and symbol h is the one from
1606 the another shared library, OUTPUT_SECTION may be null. */
1607 if (output_section == NULL)
1608 h->esym.asym.sc = scUndefined;
1609 else
1610 {
fd361982 1611 name = bfd_section_name (output_section);
9e756d64 1612
a7519a3c
RH
1613 if (strcmp (name, ".text") == 0)
1614 h->esym.asym.sc = scText;
1615 else if (strcmp (name, ".data") == 0)
1616 h->esym.asym.sc = scData;
1617 else if (strcmp (name, ".sdata") == 0)
1618 h->esym.asym.sc = scSData;
1619 else if (strcmp (name, ".rodata") == 0
1620 || strcmp (name, ".rdata") == 0)
1621 h->esym.asym.sc = scRData;
1622 else if (strcmp (name, ".bss") == 0)
1623 h->esym.asym.sc = scBss;
1624 else if (strcmp (name, ".sbss") == 0)
1625 h->esym.asym.sc = scSBss;
1626 else if (strcmp (name, ".init") == 0)
1627 h->esym.asym.sc = scInit;
1628 else if (strcmp (name, ".fini") == 0)
1629 h->esym.asym.sc = scFini;
1630 else
1631 h->esym.asym.sc = scAbs;
1632 }
1633 }
9e756d64 1634
a7519a3c
RH
1635 h->esym.asym.reserved = 0;
1636 h->esym.asym.index = indexNil;
1637 }
9e756d64 1638
a7519a3c
RH
1639 if (h->root.root.type == bfd_link_hash_common)
1640 h->esym.asym.value = h->root.root.u.c.size;
1641 else if (h->root.root.type == bfd_link_hash_defined
1642 || h->root.root.type == bfd_link_hash_defweak)
1643 {
1644 if (h->esym.asym.sc == scCommon)
1645 h->esym.asym.sc = scBss;
1646 else if (h->esym.asym.sc == scSCommon)
1647 h->esym.asym.sc = scSBss;
9e756d64 1648
a7519a3c
RH
1649 sec = h->root.root.u.def.section;
1650 output_section = sec->output_section;
1651 if (output_section != NULL)
1652 h->esym.asym.value = (h->root.root.u.def.value
1653 + sec->output_offset
1654 + output_section->vma);
1655 else
1656 h->esym.asym.value = 0;
1657 }
9e756d64 1658
a7519a3c
RH
1659 if (! bfd_ecoff_debug_one_external (einfo->abfd, einfo->debug, einfo->swap,
1660 h->root.root.root.string,
1661 &h->esym))
1662 {
1663 einfo->failed = TRUE;
1664 return FALSE;
9e756d64
RH
1665 }
1666
a7519a3c
RH
1667 return TRUE;
1668}
1669\f
1670/* Search for and possibly create a got entry. */
9e756d64 1671
a7519a3c
RH
1672static struct alpha_elf_got_entry *
1673get_got_entry (bfd *abfd, struct alpha_elf_link_hash_entry *h,
1674 unsigned long r_type, unsigned long r_symndx,
1675 bfd_vma r_addend)
1676{
1677 struct alpha_elf_got_entry *gotent;
1678 struct alpha_elf_got_entry **slot;
9e756d64 1679
a7519a3c
RH
1680 if (h)
1681 slot = &h->got_entries;
1682 else
1683 {
1684 /* This is a local .got entry -- record for merge. */
9e756d64 1685
a7519a3c 1686 struct alpha_elf_got_entry **local_got_entries;
9e756d64 1687
a7519a3c
RH
1688 local_got_entries = alpha_elf_tdata(abfd)->local_got_entries;
1689 if (!local_got_entries)
1690 {
1691 bfd_size_type size;
1692 Elf_Internal_Shdr *symtab_hdr;
9e756d64 1693
a7519a3c
RH
1694 symtab_hdr = &elf_tdata(abfd)->symtab_hdr;
1695 size = symtab_hdr->sh_info;
1696 size *= sizeof (struct alpha_elf_got_entry *);
9e756d64 1697
a7519a3c
RH
1698 local_got_entries
1699 = (struct alpha_elf_got_entry **) bfd_zalloc (abfd, size);
1700 if (!local_got_entries)
1701 return NULL;
1702
1703 alpha_elf_tdata (abfd)->local_got_entries = local_got_entries;
1704 }
1705
1706 slot = &local_got_entries[r_symndx];
9e756d64
RH
1707 }
1708
a7519a3c
RH
1709 for (gotent = *slot; gotent ; gotent = gotent->next)
1710 if (gotent->gotobj == abfd
1711 && gotent->reloc_type == r_type
1712 && gotent->addend == r_addend)
1713 break;
1714
1715 if (!gotent)
9e756d64 1716 {
a7519a3c 1717 int entry_size;
986f0783 1718 size_t amt;
9e756d64 1719
a7519a3c
RH
1720 amt = sizeof (struct alpha_elf_got_entry);
1721 gotent = (struct alpha_elf_got_entry *) bfd_alloc (abfd, amt);
1722 if (!gotent)
1723 return NULL;
9e756d64 1724
a7519a3c
RH
1725 gotent->gotobj = abfd;
1726 gotent->addend = r_addend;
1727 gotent->got_offset = -1;
6ec7057a 1728 gotent->plt_offset = -1;
a7519a3c
RH
1729 gotent->use_count = 1;
1730 gotent->reloc_type = r_type;
1731 gotent->reloc_done = 0;
1732 gotent->reloc_xlated = 0;
9e756d64 1733
a7519a3c
RH
1734 gotent->next = *slot;
1735 *slot = gotent;
9e756d64 1736
a7519a3c
RH
1737 entry_size = alpha_got_entry_size (r_type);
1738 alpha_elf_tdata (abfd)->total_got_size += entry_size;
1739 if (!h)
1740 alpha_elf_tdata(abfd)->local_got_size += entry_size;
9e756d64 1741 }
a7519a3c
RH
1742 else
1743 gotent->use_count += 1;
9e756d64 1744
a7519a3c 1745 return gotent;
9e756d64
RH
1746}
1747
6ec7057a
RH
1748static bfd_boolean
1749elf64_alpha_want_plt (struct alpha_elf_link_hash_entry *ah)
1750{
1751 return ((ah->root.type == STT_FUNC
1752 || ah->root.root.type == bfd_link_hash_undefweak
1753 || ah->root.root.type == bfd_link_hash_undefined)
8288a39e
RH
1754 && (ah->flags & ALPHA_ELF_LINK_HASH_LU_PLT) != 0
1755 && (ah->flags & ~ALPHA_ELF_LINK_HASH_LU_PLT) == 0);
6ec7057a
RH
1756}
1757
6fc5bb57
AM
1758/* Whether to sort relocs output by ld -r or ld --emit-relocs, by r_offset.
1759 Don't do so for code sections. We want to keep ordering of LITERAL/LITUSE
1760 as is. On the other hand, elf-eh-frame.c processing requires .eh_frame
1761 relocs to be sorted. */
1762
1763static bfd_boolean
1764elf64_alpha_sort_relocs_p (asection *sec)
1765{
1766 return (sec->flags & SEC_CODE) == 0;
1767}
1768
1769
a7519a3c
RH
1770/* Handle dynamic relocations when doing an Alpha ELF link. */
1771
b34976b6 1772static bfd_boolean
a7519a3c
RH
1773elf64_alpha_check_relocs (bfd *abfd, struct bfd_link_info *info,
1774 asection *sec, const Elf_Internal_Rela *relocs)
252b5132 1775{
a7519a3c
RH
1776 bfd *dynobj;
1777 asection *sreloc;
252b5132 1778 Elf_Internal_Shdr *symtab_hdr;
a7519a3c
RH
1779 struct alpha_elf_link_hash_entry **sym_hashes;
1780 const Elf_Internal_Rela *rel, *relend;
252b5132 1781
0e1862bb 1782 if (bfd_link_relocatable (info))
a7519a3c 1783 return TRUE;
252b5132 1784
0ffa91dd
NC
1785 BFD_ASSERT (is_alpha_elf (abfd));
1786
1787 dynobj = elf_hash_table (info)->dynobj;
a7519a3c 1788 if (dynobj == NULL)
0ffa91dd 1789 elf_hash_table (info)->dynobj = dynobj = abfd;
252b5132 1790
a7519a3c 1791 sreloc = NULL;
0ffa91dd
NC
1792 symtab_hdr = &elf_symtab_hdr (abfd);
1793 sym_hashes = alpha_elf_sym_hashes (abfd);
a7519a3c
RH
1794
1795 relend = relocs + sec->reloc_count;
1796 for (rel = relocs; rel < relend; ++rel)
1797 {
1798 enum {
1799 NEED_GOT = 1,
1800 NEED_GOT_ENTRY = 2,
1801 NEED_DYNREL = 4
1802 };
1803
1804 unsigned long r_symndx, r_type;
1805 struct alpha_elf_link_hash_entry *h;
1806 unsigned int gotent_flags;
1807 bfd_boolean maybe_dynamic;
1808 unsigned int need;
1809 bfd_vma addend;
1810
1811 r_symndx = ELF64_R_SYM (rel->r_info);
1812 if (r_symndx < symtab_hdr->sh_info)
1813 h = NULL;
1814 else
1815 {
1816 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
252b5132 1817
a7519a3c
RH
1818 while (h->root.root.type == bfd_link_hash_indirect
1819 || h->root.root.type == bfd_link_hash_warning)
1820 h = (struct alpha_elf_link_hash_entry *)h->root.root.u.i.link;
252b5132 1821
81fbe831
AM
1822 /* PR15323, ref flags aren't set for references in the same
1823 object. */
a7519a3c
RH
1824 h->root.ref_regular = 1;
1825 }
252b5132 1826
a7519a3c 1827 /* We can only get preliminary data on whether a symbol is
07d6d2b8
AM
1828 locally or externally defined, as not all of the input files
1829 have yet been processed. Do something with what we know, as
1830 this may help reduce memory usage and processing time later. */
a7519a3c 1831 maybe_dynamic = FALSE;
0e1862bb 1832 if (h && ((bfd_link_pic (info)
a7519a3c
RH
1833 && (!info->symbolic
1834 || info->unresolved_syms_in_shared_libs == RM_IGNORE))
1835 || !h->root.def_regular
1836 || h->root.root.type == bfd_link_hash_defweak))
07d6d2b8 1837 maybe_dynamic = TRUE;
252b5132 1838
a7519a3c
RH
1839 need = 0;
1840 gotent_flags = 0;
1841 r_type = ELF64_R_TYPE (rel->r_info);
1842 addend = rel->r_addend;
9e756d64 1843
9e756d64
RH
1844 switch (r_type)
1845 {
1846 case R_ALPHA_LITERAL:
a7519a3c
RH
1847 need = NEED_GOT | NEED_GOT_ENTRY;
1848
1849 /* Remember how this literal is used from its LITUSEs.
1850 This will be important when it comes to decide if we can
1851 create a .plt entry for a function symbol. */
1852 while (++rel < relend && ELF64_R_TYPE (rel->r_info) == R_ALPHA_LITUSE)
8288a39e 1853 if (rel->r_addend >= 1 && rel->r_addend <= 6)
a7519a3c
RH
1854 gotent_flags |= 1 << rel->r_addend;
1855 --rel;
1856
1857 /* No LITUSEs -- presumably the address is used somehow. */
1858 if (gotent_flags == 0)
1859 gotent_flags = ALPHA_ELF_LINK_HASH_LU_ADDR;
1860 break;
1861
1862 case R_ALPHA_GPDISP:
1863 case R_ALPHA_GPREL16:
1864 case R_ALPHA_GPREL32:
9e756d64
RH
1865 case R_ALPHA_GPRELHIGH:
1866 case R_ALPHA_GPRELLOW:
a7519a3c
RH
1867 case R_ALPHA_BRSGP:
1868 need = NEED_GOT;
1869 break;
1870
1871 case R_ALPHA_REFLONG:
1872 case R_ALPHA_REFQUAD:
0e1862bb 1873 if (bfd_link_pic (info) || maybe_dynamic)
a7519a3c 1874 need = NEED_DYNREL;
cc03ec80
RH
1875 break;
1876
9e756d64 1877 case R_ALPHA_TLSLDM:
cc03ec80 1878 /* The symbol for a TLSLDM reloc is ignored. Collapse the
cf35638d
TS
1879 reloc to the STN_UNDEF (0) symbol so that they all match. */
1880 r_symndx = STN_UNDEF;
a7519a3c
RH
1881 h = 0;
1882 maybe_dynamic = FALSE;
1883 /* FALLTHRU */
1884
1885 case R_ALPHA_TLSGD:
1886 case R_ALPHA_GOTDTPREL:
1887 need = NEED_GOT | NEED_GOT_ENTRY;
9e756d64 1888 break;
cc03ec80 1889
a7519a3c
RH
1890 case R_ALPHA_GOTTPREL:
1891 need = NEED_GOT | NEED_GOT_ENTRY;
1892 gotent_flags = ALPHA_ELF_LINK_HASH_TLS_IE;
0e1862bb 1893 if (bfd_link_pic (info))
a7519a3c
RH
1894 info->flags |= DF_STATIC_TLS;
1895 break;
1896
1897 case R_ALPHA_TPREL64:
3cbc1e5e 1898 if (bfd_link_dll (info))
e366eeae
RH
1899 {
1900 info->flags |= DF_STATIC_TLS;
1901 need = NEED_DYNREL;
1902 }
1903 else if (maybe_dynamic)
a7519a3c 1904 need = NEED_DYNREL;
a7519a3c 1905 break;
252b5132
RH
1906 }
1907
a7519a3c 1908 if (need & NEED_GOT)
252b5132 1909 {
85d162e6 1910 if (alpha_elf_tdata(abfd)->gotobj == NULL)
6cdc0ccc 1911 {
a7519a3c
RH
1912 if (!elf64_alpha_create_got_section (abfd, info))
1913 return FALSE;
c328dc3f 1914 }
252b5132 1915 }
252b5132 1916
a7519a3c
RH
1917 if (need & NEED_GOT_ENTRY)
1918 {
1919 struct alpha_elf_got_entry *gotent;
252b5132 1920
a7519a3c
RH
1921 gotent = get_got_entry (abfd, h, r_type, r_symndx, addend);
1922 if (!gotent)
1923 return FALSE;
4a67a098 1924
a7519a3c 1925 if (gotent_flags)
cc03ec80 1926 {
a7519a3c
RH
1927 gotent->flags |= gotent_flags;
1928 if (h)
1929 {
1930 gotent_flags |= h->flags;
1931 h->flags = gotent_flags;
4a67a098 1932
a7519a3c 1933 /* Make a guess as to whether a .plt entry is needed. */
6ec7057a
RH
1934 /* ??? It appears that we won't make it into
1935 adjust_dynamic_symbol for symbols that remain
1936 totally undefined. Copying this check here means
1937 we can create a plt entry for them too. */
1938 h->root.needs_plt
1939 = (maybe_dynamic && elf64_alpha_want_plt (h));
1940 }
a7519a3c 1941 }
252b5132
RH
1942 }
1943
a7519a3c 1944 if (need & NEED_DYNREL)
9e756d64 1945 {
a7519a3c
RH
1946 /* We need to create the section here now whether we eventually
1947 use it or not so that it gets mapped to an output section by
83bac4b0 1948 the linker. If not used, we'll kill it in size_dynamic_sections. */
a7519a3c 1949 if (sreloc == NULL)
9e756d64 1950 {
83bac4b0
NC
1951 sreloc = _bfd_elf_make_dynamic_reloc_section
1952 (sec, dynobj, 3, abfd, /*rela?*/ TRUE);
1953
a7519a3c 1954 if (sreloc == NULL)
83bac4b0 1955 return FALSE;
9e756d64 1956 }
252b5132 1957
a7519a3c
RH
1958 if (h)
1959 {
1960 /* Since we havn't seen all of the input symbols yet, we
1961 don't know whether we'll actually need a dynamic relocation
1962 entry for this reloc. So make a record of it. Once we
1963 find out if this thing needs dynamic relocation we'll
1964 expand the relocation sections by the appropriate amount. */
9e756d64 1965
a7519a3c 1966 struct alpha_elf_reloc_entry *rent;
9e756d64 1967
a7519a3c
RH
1968 for (rent = h->reloc_entries; rent; rent = rent->next)
1969 if (rent->rtype == r_type && rent->srel == sreloc)
1970 break;
252b5132 1971
a7519a3c
RH
1972 if (!rent)
1973 {
986f0783 1974 size_t amt = sizeof (struct alpha_elf_reloc_entry);
a7519a3c
RH
1975 rent = (struct alpha_elf_reloc_entry *) bfd_alloc (abfd, amt);
1976 if (!rent)
1977 return FALSE;
252b5132 1978
a7519a3c 1979 rent->srel = sreloc;
1f7f2abb 1980 rent->sec = sec;
a7519a3c
RH
1981 rent->rtype = r_type;
1982 rent->count = 1;
252b5132 1983
a7519a3c
RH
1984 rent->next = h->reloc_entries;
1985 h->reloc_entries = rent;
1986 }
1987 else
1988 rent->count++;
1989 }
0e1862bb 1990 else if (bfd_link_pic (info))
a7519a3c
RH
1991 {
1992 /* If this is a shared library, and the section is to be
1993 loaded into memory, we need a RELATIVE reloc. */
1994 sreloc->size += sizeof (Elf64_External_Rela);
1995 if (sec->flags & SEC_READONLY)
1f7f2abb
L
1996 {
1997 info->flags |= DF_TEXTREL;
1998 info->callbacks->minfo
1999 (_("%pB: dynamic relocation against `%pT' in "
2000 "read-only section `%pA'\n"),
2001 sec->owner, h->root.root.root.string, sec);
2002 }
a7519a3c 2003 }
252b5132
RH
2004 }
2005 }
2006
b34976b6 2007 return TRUE;
252b5132 2008}
252b5132 2009
e117360e
RH
2010/* Return the section that should be marked against GC for a given
2011 relocation. */
2012
2013static asection *
2014elf64_alpha_gc_mark_hook (asection *sec, struct bfd_link_info *info,
2015 Elf_Internal_Rela *rel,
2016 struct elf_link_hash_entry *h, Elf_Internal_Sym *sym)
2017{
2018 /* These relocations don't really reference a symbol. Instead we store
2019 extra data in their addend slot. Ignore the symbol. */
2020 switch (ELF64_R_TYPE (rel->r_info))
2021 {
2022 case R_ALPHA_LITUSE:
2023 case R_ALPHA_GPDISP:
2024 case R_ALPHA_HINT:
2025 return NULL;
2026 }
2027
2028 return _bfd_elf_gc_mark_hook (sec, info, rel, h, sym);
2029}
2030
a7519a3c
RH
2031/* Adjust a symbol defined by a dynamic object and referenced by a
2032 regular object. The current definition is in some section of the
2033 dynamic object, but we're not including those sections. We have to
2034 change the definition to something the rest of the link can
2035 understand. */
252b5132 2036
b34976b6 2037static bfd_boolean
a7519a3c
RH
2038elf64_alpha_adjust_dynamic_symbol (struct bfd_link_info *info,
2039 struct elf_link_hash_entry *h)
252b5132 2040{
a7519a3c
RH
2041 bfd *dynobj;
2042 asection *s;
2043 struct alpha_elf_link_hash_entry *ah;
252b5132 2044
a7519a3c
RH
2045 dynobj = elf_hash_table(info)->dynobj;
2046 ah = (struct alpha_elf_link_hash_entry *)h;
252b5132 2047
a7519a3c 2048 /* Now that we've seen all of the input symbols, finalize our decision
6ec7057a
RH
2049 about whether this symbol should get a .plt entry. Irritatingly, it
2050 is common for folk to leave undefined symbols in shared libraries,
2051 and they still expect lazy binding; accept undefined symbols in lieu
2052 of STT_FUNC. */
2053 if (alpha_elf_dynamic_symbol_p (h, info) && elf64_alpha_want_plt (ah))
252b5132 2054 {
6ec7057a 2055 h->needs_plt = TRUE;
252b5132 2056
ce558b89 2057 s = elf_hash_table(info)->splt;
a7519a3c
RH
2058 if (!s && !elf64_alpha_create_dynamic_sections (dynobj, info))
2059 return FALSE;
204692d7 2060
6ec7057a
RH
2061 /* We need one plt entry per got subsection. Delay allocation of
2062 the actual plt entries until size_plt_section, called from
2063 size_dynamic_sections or during relaxation. */
252b5132 2064
a7519a3c
RH
2065 return TRUE;
2066 }
2067 else
6ec7057a 2068 h->needs_plt = FALSE;
252b5132 2069
a7519a3c
RH
2070 /* If this is a weak symbol, and there is a real definition, the
2071 processor independent code will have arranged for us to see the
2072 real definition first, and we can just use the same value. */
60d67dc8 2073 if (h->is_weakalias)
252b5132 2074 {
60d67dc8
AM
2075 struct elf_link_hash_entry *def = weakdef (h);
2076 BFD_ASSERT (def->root.type == bfd_link_hash_defined);
2077 h->root.u.def.section = def->root.u.def.section;
2078 h->root.u.def.value = def->root.u.def.value;
a7519a3c 2079 return TRUE;
252b5132 2080 }
a7519a3c
RH
2081
2082 /* This is a reference to a symbol defined by a dynamic object which
2083 is not a function. The Alpha, since it uses .got entries for all
2084 symbols even in regular objects, does not need the hackery of a
2085 .dynbss section and COPY dynamic relocations. */
252b5132 2086
b34976b6 2087 return TRUE;
252b5132
RH
2088}
2089
747ffa7b
AM
2090/* Record STO_ALPHA_NOPV and STO_ALPHA_STD_GPLOAD. */
2091
2092static void
2093elf64_alpha_merge_symbol_attribute (struct elf_link_hash_entry *h,
2094 const Elf_Internal_Sym *isym,
2095 bfd_boolean definition,
2096 bfd_boolean dynamic)
2097{
2098 if (!dynamic && definition)
2099 h->other = ((h->other & ELF_ST_VISIBILITY (-1))
2100 | (isym->st_other & ~ELF_ST_VISIBILITY (-1)));
2101}
2102
a7519a3c
RH
2103/* Symbol versioning can create new symbols, and make our old symbols
2104 indirect to the new ones. Consolidate the got and reloc information
2105 in these situations. */
252b5132 2106
48f4b4f5
RH
2107static void
2108elf64_alpha_copy_indirect_symbol (struct bfd_link_info *info,
2109 struct elf_link_hash_entry *dir,
2110 struct elf_link_hash_entry *ind)
252b5132 2111{
48f4b4f5
RH
2112 struct alpha_elf_link_hash_entry *hi
2113 = (struct alpha_elf_link_hash_entry *) ind;
2114 struct alpha_elf_link_hash_entry *hs
2115 = (struct alpha_elf_link_hash_entry *) dir;
252b5132 2116
48f4b4f5
RH
2117 /* Do the merging in the superclass. */
2118 _bfd_elf_link_hash_copy_indirect(info, dir, ind);
252b5132 2119
a7519a3c 2120 /* Merge the flags. Whee. */
a7519a3c
RH
2121 hs->flags |= hi->flags;
2122
48f4b4f5
RH
2123 /* ??? It's unclear to me what's really supposed to happen when
2124 "merging" defweak and defined symbols, given that we don't
2125 actually throw away the defweak. This more-or-less copies
2126 the logic related to got and plt entries in the superclass. */
2127 if (ind->root.type != bfd_link_hash_indirect)
2128 return;
2129
a7519a3c
RH
2130 /* Merge the .got entries. Cannibalize the old symbol's list in
2131 doing so, since we don't need it anymore. */
2132
2133 if (hs->got_entries == NULL)
2134 hs->got_entries = hi->got_entries;
2135 else
2136 {
2137 struct alpha_elf_got_entry *gi, *gs, *gin, *gsh;
2138
2139 gsh = hs->got_entries;
2140 for (gi = hi->got_entries; gi ; gi = gin)
252b5132 2141 {
a7519a3c
RH
2142 gin = gi->next;
2143 for (gs = gsh; gs ; gs = gs->next)
2144 if (gi->gotobj == gs->gotobj
2145 && gi->reloc_type == gs->reloc_type
2146 && gi->addend == gs->addend)
2147 {
68994ca2 2148 gs->use_count += gi->use_count;
07d6d2b8 2149 goto got_found;
a7519a3c
RH
2150 }
2151 gi->next = hs->got_entries;
2152 hs->got_entries = gi;
2153 got_found:;
252b5132 2154 }
a7519a3c
RH
2155 }
2156 hi->got_entries = NULL;
252b5132 2157
a7519a3c
RH
2158 /* And similar for the reloc entries. */
2159
2160 if (hs->reloc_entries == NULL)
2161 hs->reloc_entries = hi->reloc_entries;
2162 else
2163 {
2164 struct alpha_elf_reloc_entry *ri, *rs, *rin, *rsh;
2165
2166 rsh = hs->reloc_entries;
2167 for (ri = hi->reloc_entries; ri ; ri = rin)
2168 {
2169 rin = ri->next;
2170 for (rs = rsh; rs ; rs = rs->next)
2171 if (ri->rtype == rs->rtype && ri->srel == rs->srel)
2172 {
2173 rs->count += ri->count;
2174 goto found_reloc;
2175 }
2176 ri->next = hs->reloc_entries;
2177 hs->reloc_entries = ri;
2178 found_reloc:;
2179 }
252b5132 2180 }
a7519a3c 2181 hi->reloc_entries = NULL;
252b5132
RH
2182}
2183
a7519a3c 2184/* Is it possible to merge two object file's .got tables? */
252b5132 2185
b34976b6 2186static bfd_boolean
a7519a3c 2187elf64_alpha_can_merge_gots (bfd *a, bfd *b)
252b5132 2188{
a7519a3c
RH
2189 int total = alpha_elf_tdata (a)->total_got_size;
2190 bfd *bsub;
252b5132 2191
a7519a3c
RH
2192 /* Trivial quick fallout test. */
2193 if (total + alpha_elf_tdata (b)->total_got_size <= MAX_GOT_SIZE)
2194 return TRUE;
252b5132 2195
a7519a3c
RH
2196 /* By their nature, local .got entries cannot be merged. */
2197 if ((total += alpha_elf_tdata (b)->local_got_size) > MAX_GOT_SIZE)
b34976b6 2198 return FALSE;
252b5132 2199
a7519a3c
RH
2200 /* Failing the common trivial comparison, we must effectively
2201 perform the merge. Not actually performing the merge means that
2202 we don't have to store undo information in case we fail. */
2203 for (bsub = b; bsub ; bsub = alpha_elf_tdata (bsub)->in_got_link_next)
2204 {
2205 struct alpha_elf_link_hash_entry **hashes = alpha_elf_sym_hashes (bsub);
2206 Elf_Internal_Shdr *symtab_hdr = &elf_tdata (bsub)->symtab_hdr;
2207 int i, n;
2208
2209 n = NUM_SHDR_ENTRIES (symtab_hdr) - symtab_hdr->sh_info;
2210 for (i = 0; i < n; ++i)
2211 {
2212 struct alpha_elf_got_entry *ae, *be;
2213 struct alpha_elf_link_hash_entry *h;
2214
2215 h = hashes[i];
2216 while (h->root.root.type == bfd_link_hash_indirect
07d6d2b8 2217 || h->root.root.type == bfd_link_hash_warning)
a7519a3c
RH
2218 h = (struct alpha_elf_link_hash_entry *)h->root.root.u.i.link;
2219
2220 for (be = h->got_entries; be ; be = be->next)
2221 {
2222 if (be->use_count == 0)
07d6d2b8 2223 continue;
a7519a3c 2224 if (be->gotobj != b)
07d6d2b8 2225 continue;
a7519a3c
RH
2226
2227 for (ae = h->got_entries; ae ; ae = ae->next)
07d6d2b8 2228 if (ae->gotobj == a
a7519a3c
RH
2229 && ae->reloc_type == be->reloc_type
2230 && ae->addend == be->addend)
2231 goto global_found;
2232
2233 total += alpha_got_entry_size (be->reloc_type);
2234 if (total > MAX_GOT_SIZE)
07d6d2b8 2235 return FALSE;
a7519a3c
RH
2236 global_found:;
2237 }
2238 }
2239 }
252b5132 2240
b34976b6 2241 return TRUE;
252b5132
RH
2242}
2243
a7519a3c 2244/* Actually merge two .got tables. */
252b5132 2245
a7519a3c
RH
2246static void
2247elf64_alpha_merge_gots (bfd *a, bfd *b)
252b5132 2248{
a7519a3c
RH
2249 int total = alpha_elf_tdata (a)->total_got_size;
2250 bfd *bsub;
252b5132 2251
a7519a3c
RH
2252 /* Remember local expansion. */
2253 {
2254 int e = alpha_elf_tdata (b)->local_got_size;
2255 total += e;
2256 alpha_elf_tdata (a)->local_got_size += e;
2257 }
252b5132 2258
a7519a3c
RH
2259 for (bsub = b; bsub ; bsub = alpha_elf_tdata (bsub)->in_got_link_next)
2260 {
2261 struct alpha_elf_got_entry **local_got_entries;
2262 struct alpha_elf_link_hash_entry **hashes;
2263 Elf_Internal_Shdr *symtab_hdr;
2264 int i, n;
252b5132 2265
a7519a3c
RH
2266 /* Let the local .got entries know they are part of a new subsegment. */
2267 local_got_entries = alpha_elf_tdata (bsub)->local_got_entries;
2268 if (local_got_entries)
07d6d2b8 2269 {
a7519a3c
RH
2270 n = elf_tdata (bsub)->symtab_hdr.sh_info;
2271 for (i = 0; i < n; ++i)
2272 {
2273 struct alpha_elf_got_entry *ent;
2274 for (ent = local_got_entries[i]; ent; ent = ent->next)
07d6d2b8 2275 ent->gotobj = a;
a7519a3c 2276 }
07d6d2b8 2277 }
252b5132 2278
a7519a3c
RH
2279 /* Merge the global .got entries. */
2280 hashes = alpha_elf_sym_hashes (bsub);
2281 symtab_hdr = &elf_tdata (bsub)->symtab_hdr;
252b5132 2282
a7519a3c
RH
2283 n = NUM_SHDR_ENTRIES (symtab_hdr) - symtab_hdr->sh_info;
2284 for (i = 0; i < n; ++i)
07d6d2b8 2285 {
a7519a3c
RH
2286 struct alpha_elf_got_entry *ae, *be, **pbe, **start;
2287 struct alpha_elf_link_hash_entry *h;
252b5132 2288
a7519a3c
RH
2289 h = hashes[i];
2290 while (h->root.root.type == bfd_link_hash_indirect
07d6d2b8 2291 || h->root.root.type == bfd_link_hash_warning)
a7519a3c 2292 h = (struct alpha_elf_link_hash_entry *)h->root.root.u.i.link;
252b5132 2293
a7519a3c
RH
2294 pbe = start = &h->got_entries;
2295 while ((be = *pbe) != NULL)
2296 {
2297 if (be->use_count == 0)
07d6d2b8 2298 {
a7519a3c
RH
2299 *pbe = be->next;
2300 memset (be, 0xa5, sizeof (*be));
2301 goto kill;
07d6d2b8 2302 }
a7519a3c 2303 if (be->gotobj != b)
07d6d2b8 2304 goto next;
a7519a3c
RH
2305
2306 for (ae = *start; ae ; ae = ae->next)
07d6d2b8 2307 if (ae->gotobj == a
a7519a3c
RH
2308 && ae->reloc_type == be->reloc_type
2309 && ae->addend == be->addend)
2310 {
2311 ae->flags |= be->flags;
2312 ae->use_count += be->use_count;
2313 *pbe = be->next;
2314 memset (be, 0xa5, sizeof (*be));
2315 goto kill;
2316 }
2317 be->gotobj = a;
2318 total += alpha_got_entry_size (be->reloc_type);
252b5132 2319
a7519a3c
RH
2320 next:;
2321 pbe = &be->next;
2322 kill:;
2323 }
07d6d2b8 2324 }
252b5132 2325
a7519a3c
RH
2326 alpha_elf_tdata (bsub)->gotobj = a;
2327 }
2328 alpha_elf_tdata (a)->total_got_size = total;
252b5132 2329
a7519a3c
RH
2330 /* Merge the two in_got chains. */
2331 {
2332 bfd *next;
252b5132 2333
a7519a3c
RH
2334 bsub = a;
2335 while ((next = alpha_elf_tdata (bsub)->in_got_link_next) != NULL)
2336 bsub = next;
252b5132 2337
a7519a3c
RH
2338 alpha_elf_tdata (bsub)->in_got_link_next = b;
2339 }
252b5132 2340}
a7519a3c
RH
2341
2342/* Calculate the offsets for the got entries. */
252b5132 2343
b34976b6 2344static bfd_boolean
a7519a3c 2345elf64_alpha_calc_got_offsets_for_symbol (struct alpha_elf_link_hash_entry *h,
2c3fc389 2346 void * arg ATTRIBUTE_UNUSED)
252b5132 2347{
a7519a3c 2348 struct alpha_elf_got_entry *gotent;
252b5132 2349
a7519a3c
RH
2350 for (gotent = h->got_entries; gotent; gotent = gotent->next)
2351 if (gotent->use_count > 0)
2352 {
2353 struct alpha_elf_obj_tdata *td;
2354 bfd_size_type *plge;
252b5132 2355
a7519a3c 2356 td = alpha_elf_tdata (gotent->gotobj);
a7519a3c
RH
2357 plge = &td->got->size;
2358 gotent->got_offset = *plge;
2359 *plge += alpha_got_entry_size (gotent->reloc_type);
2360 }
252b5132 2361
6ec7057a 2362 return TRUE;
a7519a3c 2363}
252b5132 2364
a7519a3c
RH
2365static void
2366elf64_alpha_calc_got_offsets (struct bfd_link_info *info)
2367{
4dfe6ac6
NC
2368 bfd *i, *got_list;
2369 struct alpha_elf_link_hash_table * htab;
2370
2371 htab = alpha_elf_hash_table (info);
2372 if (htab == NULL)
2373 return;
2374 got_list = htab->got_list;
252b5132 2375
a7519a3c
RH
2376 /* First, zero out the .got sizes, as we may be recalculating the
2377 .got after optimizing it. */
2378 for (i = got_list; i ; i = alpha_elf_tdata(i)->got_link_next)
2379 alpha_elf_tdata(i)->got->size = 0;
252b5132 2380
a7519a3c 2381 /* Next, fill in the offsets for all the global entries. */
4dfe6ac6 2382 alpha_elf_link_hash_traverse (htab,
a7519a3c
RH
2383 elf64_alpha_calc_got_offsets_for_symbol,
2384 NULL);
252b5132 2385
a7519a3c
RH
2386 /* Finally, fill in the offsets for the local entries. */
2387 for (i = got_list; i ; i = alpha_elf_tdata(i)->got_link_next)
2388 {
2389 bfd_size_type got_offset = alpha_elf_tdata(i)->got->size;
2390 bfd *j;
252b5132 2391
a7519a3c
RH
2392 for (j = i; j ; j = alpha_elf_tdata(j)->in_got_link_next)
2393 {
2394 struct alpha_elf_got_entry **local_got_entries, *gotent;
2395 int k, n;
252b5132 2396
a7519a3c
RH
2397 local_got_entries = alpha_elf_tdata(j)->local_got_entries;
2398 if (!local_got_entries)
2399 continue;
252b5132 2400
a7519a3c
RH
2401 for (k = 0, n = elf_tdata(j)->symtab_hdr.sh_info; k < n; ++k)
2402 for (gotent = local_got_entries[k]; gotent; gotent = gotent->next)
2403 if (gotent->use_count > 0)
07d6d2b8 2404 {
a7519a3c
RH
2405 gotent->got_offset = got_offset;
2406 got_offset += alpha_got_entry_size (gotent->reloc_type);
07d6d2b8 2407 }
a7519a3c 2408 }
252b5132 2409
a7519a3c
RH
2410 alpha_elf_tdata(i)->got->size = got_offset;
2411 }
2412}
252b5132 2413
a7519a3c 2414/* Constructs the gots. */
252b5132 2415
b34976b6 2416static bfd_boolean
d1c109de 2417elf64_alpha_size_got_sections (struct bfd_link_info *info,
07d6d2b8 2418 bfd_boolean may_merge)
252b5132 2419{
a7519a3c 2420 bfd *i, *got_list, *cur_got_obj = NULL;
4dfe6ac6 2421 struct alpha_elf_link_hash_table * htab;
252b5132 2422
4dfe6ac6
NC
2423 htab = alpha_elf_hash_table (info);
2424 if (htab == NULL)
2425 return FALSE;
2426 got_list = htab->got_list;
95404643 2427
a7519a3c
RH
2428 /* On the first time through, pretend we have an existing got list
2429 consisting of all of the input files. */
2430 if (got_list == NULL)
252b5132 2431 {
c72f2fb2 2432 for (i = info->input_bfds; i ; i = i->link.next)
252b5132 2433 {
0ffa91dd
NC
2434 bfd *this_got;
2435
2436 if (! is_alpha_elf (i))
2437 continue;
2438
2439 this_got = alpha_elf_tdata (i)->gotobj;
a7519a3c
RH
2440 if (this_got == NULL)
2441 continue;
252b5132 2442
a7519a3c
RH
2443 /* We are assuming no merging has yet occurred. */
2444 BFD_ASSERT (this_got == i);
252b5132 2445
07d6d2b8 2446 if (alpha_elf_tdata (this_got)->total_got_size > MAX_GOT_SIZE)
252b5132 2447 {
a7519a3c 2448 /* Yikes! A single object file has too many entries. */
4eca0228 2449 _bfd_error_handler
695344c0 2450 /* xgettext:c-format */
871b3ab2 2451 (_("%pB: .got subsegment exceeds 64K (size %d)"),
07d6d2b8 2452 i, alpha_elf_tdata (this_got)->total_got_size);
b34976b6 2453 return FALSE;
252b5132 2454 }
252b5132 2455
a7519a3c
RH
2456 if (got_list == NULL)
2457 got_list = this_got;
2458 else
2459 alpha_elf_tdata(cur_got_obj)->got_link_next = this_got;
2460 cur_got_obj = this_got;
252b5132
RH
2461 }
2462
a7519a3c
RH
2463 /* Strange degenerate case of no got references. */
2464 if (got_list == NULL)
2465 return TRUE;
2466
4dfe6ac6 2467 htab->got_list = got_list;
a7519a3c
RH
2468 }
2469
2470 cur_got_obj = got_list;
0ffa91dd
NC
2471 if (cur_got_obj == NULL)
2472 return FALSE;
2473
d1c109de 2474 if (may_merge)
a7519a3c 2475 {
d1c109de
RH
2476 i = alpha_elf_tdata(cur_got_obj)->got_link_next;
2477 while (i != NULL)
252b5132 2478 {
d1c109de
RH
2479 if (elf64_alpha_can_merge_gots (cur_got_obj, i))
2480 {
2481 elf64_alpha_merge_gots (cur_got_obj, i);
252b5132 2482
d1c109de
RH
2483 alpha_elf_tdata(i)->got->size = 0;
2484 i = alpha_elf_tdata(i)->got_link_next;
2485 alpha_elf_tdata(cur_got_obj)->got_link_next = i;
2486 }
2487 else
2488 {
2489 cur_got_obj = i;
2490 i = alpha_elf_tdata(i)->got_link_next;
2491 }
a7519a3c 2492 }
252b5132
RH
2493 }
2494
a7519a3c
RH
2495 /* Once the gots have been merged, fill in the got offsets for
2496 everything therein. */
4a828aab 2497 elf64_alpha_calc_got_offsets (info);
252b5132 2498
a7519a3c 2499 return TRUE;
252b5132 2500}
252b5132 2501
b34976b6 2502static bfd_boolean
2c3fc389
NC
2503elf64_alpha_size_plt_section_1 (struct alpha_elf_link_hash_entry *h,
2504 void * data)
252b5132 2505{
a7519a3c
RH
2506 asection *splt = (asection *) data;
2507 struct alpha_elf_got_entry *gotent;
6ec7057a 2508 bfd_boolean saw_one = FALSE;
252b5132 2509
a7519a3c
RH
2510 /* If we didn't need an entry before, we still don't. */
2511 if (!h->root.needs_plt)
2512 return TRUE;
e92d460e 2513
6ec7057a 2514 /* For each LITERAL got entry still in use, allocate a plt entry. */
a7519a3c
RH
2515 for (gotent = h->got_entries; gotent ; gotent = gotent->next)
2516 if (gotent->reloc_type == R_ALPHA_LITERAL
2517 && gotent->use_count > 0)
6ec7057a
RH
2518 {
2519 if (splt->size == 0)
2520 splt->size = PLT_HEADER_SIZE;
2521 gotent->plt_offset = splt->size;
2522 splt->size += PLT_ENTRY_SIZE;
2523 saw_one = TRUE;
2524 }
a7519a3c 2525
6ec7057a
RH
2526 /* If there weren't any, there's no longer a need for the PLT entry. */
2527 if (!saw_one)
2528 h->root.needs_plt = FALSE;
a7519a3c
RH
2529
2530 return TRUE;
2531}
2532
4a828aab
RH
2533/* Called from relax_section to rebuild the PLT in light of potential changes
2534 in the function's status. */
a7519a3c 2535
4a828aab 2536static void
a7519a3c
RH
2537elf64_alpha_size_plt_section (struct bfd_link_info *info)
2538{
6ec7057a 2539 asection *splt, *spltrel, *sgotplt;
a7519a3c 2540 unsigned long entries;
4dfe6ac6
NC
2541 struct alpha_elf_link_hash_table * htab;
2542
2543 htab = alpha_elf_hash_table (info);
2544 if (htab == NULL)
2545 return;
a7519a3c 2546
ce558b89 2547 splt = elf_hash_table(info)->splt;
a7519a3c 2548 if (splt == NULL)
4a828aab 2549 return;
252b5132 2550
a7519a3c 2551 splt->size = 0;
252b5132 2552
4dfe6ac6 2553 alpha_elf_link_hash_traverse (htab,
a7519a3c 2554 elf64_alpha_size_plt_section_1, splt);
e92d460e 2555
a7519a3c 2556 /* Every plt entry requires a JMP_SLOT relocation. */
ce558b89 2557 spltrel = elf_hash_table(info)->srelplt;
4a828aab 2558 entries = 0;
a7519a3c 2559 if (splt->size)
6ec7057a
RH
2560 {
2561 if (elf64_alpha_use_secureplt)
2562 entries = (splt->size - NEW_PLT_HEADER_SIZE) / NEW_PLT_ENTRY_SIZE;
2563 else
2564 entries = (splt->size - OLD_PLT_HEADER_SIZE) / OLD_PLT_ENTRY_SIZE;
2565 }
a7519a3c 2566 spltrel->size = entries * sizeof (Elf64_External_Rela);
e92d460e 2567
6ec7057a
RH
2568 /* When using the secureplt, we need two words somewhere in the data
2569 segment for the dynamic linker to tell us where to go. This is the
2570 entire contents of the .got.plt section. */
2571 if (elf64_alpha_use_secureplt)
2572 {
ce558b89 2573 sgotplt = elf_hash_table(info)->sgotplt;
6ec7057a
RH
2574 sgotplt->size = entries ? 16 : 0;
2575 }
a7519a3c 2576}
e92d460e 2577
a7519a3c
RH
2578static bfd_boolean
2579elf64_alpha_always_size_sections (bfd *output_bfd ATTRIBUTE_UNUSED,
2580 struct bfd_link_info *info)
2581{
2582 bfd *i;
4dfe6ac6 2583 struct alpha_elf_link_hash_table * htab;
252b5132 2584
0e1862bb 2585 if (bfd_link_relocatable (info))
a7519a3c 2586 return TRUE;
252b5132 2587
4dfe6ac6
NC
2588 htab = alpha_elf_hash_table (info);
2589 if (htab == NULL)
2590 return FALSE;
2591
d1c109de 2592 if (!elf64_alpha_size_got_sections (info, TRUE))
a7519a3c 2593 return FALSE;
252b5132 2594
a7519a3c 2595 /* Allocate space for all of the .got subsections. */
4dfe6ac6 2596 i = htab->got_list;
a7519a3c 2597 for ( ; i ; i = alpha_elf_tdata(i)->got_link_next)
252b5132 2598 {
a7519a3c
RH
2599 asection *s = alpha_elf_tdata(i)->got;
2600 if (s->size > 0)
2601 {
2602 s->contents = (bfd_byte *) bfd_zalloc (i, s->size);
2603 if (s->contents == NULL)
2604 return FALSE;
2605 }
252b5132
RH
2606 }
2607
b34976b6 2608 return TRUE;
252b5132 2609}
3765b1be 2610
a7519a3c 2611/* The number of dynamic relocations required by a static relocation. */
3765b1be 2612
a7519a3c 2613static int
e366eeae 2614alpha_dynamic_entries_for_reloc (int r_type, int dynamic, int shared, int pie)
a7519a3c
RH
2615{
2616 switch (r_type)
3765b1be 2617 {
a7519a3c
RH
2618 /* May appear in GOT entries. */
2619 case R_ALPHA_TLSGD:
2620 return (dynamic ? 2 : shared ? 1 : 0);
2621 case R_ALPHA_TLSLDM:
2622 return shared;
2623 case R_ALPHA_LITERAL:
a7519a3c 2624 return dynamic || shared;
e366eeae
RH
2625 case R_ALPHA_GOTTPREL:
2626 return dynamic || (shared && !pie);
a7519a3c
RH
2627 case R_ALPHA_GOTDTPREL:
2628 return dynamic;
3765b1be 2629
a7519a3c
RH
2630 /* May appear in data sections. */
2631 case R_ALPHA_REFLONG:
2632 case R_ALPHA_REFQUAD:
a7519a3c 2633 return dynamic || shared;
e366eeae
RH
2634 case R_ALPHA_TPREL64:
2635 return dynamic || (shared && !pie);
3765b1be 2636
a7519a3c
RH
2637 /* Everything else is illegal. We'll issue an error during
2638 relocate_section. */
2639 default:
2640 return 0;
2641 }
2642}
3765b1be 2643
a7519a3c 2644/* Work out the sizes of the dynamic relocation entries. */
3765b1be 2645
a7519a3c
RH
2646static bfd_boolean
2647elf64_alpha_calc_dynrel_sizes (struct alpha_elf_link_hash_entry *h,
2648 struct bfd_link_info *info)
2649{
2650 bfd_boolean dynamic;
2651 struct alpha_elf_reloc_entry *relent;
2652 unsigned long entries;
3765b1be 2653
a7519a3c
RH
2654 /* If the symbol was defined as a common symbol in a regular object
2655 file, and there was no definition in any dynamic object, then the
2656 linker will have allocated space for the symbol in a common
2657 section but the ELF_LINK_HASH_DEF_REGULAR flag will not have been
2658 set. This is done for dynamic symbols in
2659 elf_adjust_dynamic_symbol but this is not done for non-dynamic
2660 symbols, somehow. */
2661 if (!h->root.def_regular
2662 && h->root.ref_regular
2663 && !h->root.def_dynamic
2664 && (h->root.root.type == bfd_link_hash_defined
2665 || h->root.root.type == bfd_link_hash_defweak)
2666 && !(h->root.root.u.def.section->owner->flags & DYNAMIC))
2667 h->root.def_regular = 1;
3765b1be 2668
a7519a3c
RH
2669 /* If the symbol is dynamic, we'll need all the relocations in their
2670 natural form. If this is a shared object, and it has been forced
2671 local, we'll need the same number of RELATIVE relocations. */
2672 dynamic = alpha_elf_dynamic_symbol_p (&h->root, info);
3765b1be 2673
a7519a3c
RH
2674 /* If the symbol is a hidden undefined weak, then we never have any
2675 relocations. Avoid the loop which may want to add RELATIVE relocs
0e1862bb 2676 based on bfd_link_pic (info). */
a7519a3c
RH
2677 if (h->root.root.type == bfd_link_hash_undefweak && !dynamic)
2678 return TRUE;
2679
2680 for (relent = h->reloc_entries; relent; relent = relent->next)
3765b1be 2681 {
a7519a3c 2682 entries = alpha_dynamic_entries_for_reloc (relent->rtype, dynamic,
3cbc1e5e
AM
2683 bfd_link_pic (info),
2684 bfd_link_pie (info));
a7519a3c
RH
2685 if (entries)
2686 {
1f7f2abb 2687 asection *sec = relent->sec;
a7519a3c
RH
2688 relent->srel->size +=
2689 entries * sizeof (Elf64_External_Rela) * relent->count;
1f7f2abb
L
2690 if ((sec->flags & SEC_READONLY) != 0)
2691 {
2692 info->flags |= DT_TEXTREL;
2693 info->callbacks->minfo
2694 (_("%pB: dynamic relocation against `%pT' in "
2695 "read-only section `%pA'\n"),
2696 sec->owner, h->root.root.root.string, sec);
2697 }
a7519a3c
RH
2698 }
2699 }
3765b1be 2700
a7519a3c
RH
2701 return TRUE;
2702}
3765b1be 2703
a7519a3c
RH
2704/* Subroutine of elf64_alpha_size_rela_got_section for doing the
2705 global symbols. */
3765b1be 2706
a7519a3c
RH
2707static bfd_boolean
2708elf64_alpha_size_rela_got_1 (struct alpha_elf_link_hash_entry *h,
2709 struct bfd_link_info *info)
2710{
2711 bfd_boolean dynamic;
2712 struct alpha_elf_got_entry *gotent;
2713 unsigned long entries;
3765b1be 2714
6ec7057a
RH
2715 /* If we're using a plt for this symbol, then all of its relocations
2716 for its got entries go into .rela.plt. */
2717 if (h->root.needs_plt)
2718 return TRUE;
2719
a7519a3c
RH
2720 /* If the symbol is dynamic, we'll need all the relocations in their
2721 natural form. If this is a shared object, and it has been forced
2722 local, we'll need the same number of RELATIVE relocations. */
2723 dynamic = alpha_elf_dynamic_symbol_p (&h->root, info);
2724
2725 /* If the symbol is a hidden undefined weak, then we never have any
2726 relocations. Avoid the loop which may want to add RELATIVE relocs
0e1862bb 2727 based on bfd_link_pic (info). */
a7519a3c
RH
2728 if (h->root.root.type == bfd_link_hash_undefweak && !dynamic)
2729 return TRUE;
2730
2731 entries = 0;
2732 for (gotent = h->got_entries; gotent ; gotent = gotent->next)
2733 if (gotent->use_count > 0)
e366eeae 2734 entries += alpha_dynamic_entries_for_reloc (gotent->reloc_type, dynamic,
0e1862bb
L
2735 bfd_link_pic (info),
2736 bfd_link_pie (info));
a7519a3c 2737
a7519a3c
RH
2738 if (entries > 0)
2739 {
ce558b89 2740 asection *srel = elf_hash_table(info)->srelgot;
a7519a3c
RH
2741 BFD_ASSERT (srel != NULL);
2742 srel->size += sizeof (Elf64_External_Rela) * entries;
3765b1be 2743 }
3765b1be 2744
a7519a3c 2745 return TRUE;
3765b1be
RH
2746}
2747
a7519a3c 2748/* Set the sizes of the dynamic relocation sections. */
252b5132 2749
4a828aab 2750static void
a7519a3c 2751elf64_alpha_size_rela_got_section (struct bfd_link_info *info)
252b5132 2752{
a7519a3c 2753 unsigned long entries;
ce558b89 2754 bfd *i;
a7519a3c 2755 asection *srel;
4dfe6ac6
NC
2756 struct alpha_elf_link_hash_table * htab;
2757
2758 htab = alpha_elf_hash_table (info);
2759 if (htab == NULL)
2760 return;
252b5132 2761
a7519a3c
RH
2762 /* Shared libraries often require RELATIVE relocs, and some relocs
2763 require attention for the main application as well. */
252b5132 2764
a7519a3c 2765 entries = 0;
4dfe6ac6 2766 for (i = htab->got_list;
a7519a3c
RH
2767 i ; i = alpha_elf_tdata(i)->got_link_next)
2768 {
2769 bfd *j;
3241278a 2770
a7519a3c
RH
2771 for (j = i; j ; j = alpha_elf_tdata(j)->in_got_link_next)
2772 {
2773 struct alpha_elf_got_entry **local_got_entries, *gotent;
2774 int k, n;
252b5132 2775
a7519a3c
RH
2776 local_got_entries = alpha_elf_tdata(j)->local_got_entries;
2777 if (!local_got_entries)
2778 continue;
252b5132 2779
a7519a3c
RH
2780 for (k = 0, n = elf_tdata(j)->symtab_hdr.sh_info; k < n; ++k)
2781 for (gotent = local_got_entries[k];
2782 gotent ; gotent = gotent->next)
2783 if (gotent->use_count > 0)
2784 entries += (alpha_dynamic_entries_for_reloc
0e1862bb
L
2785 (gotent->reloc_type, 0, bfd_link_pic (info),
2786 bfd_link_pie (info)));
a7519a3c
RH
2787 }
2788 }
3765b1be 2789
ce558b89 2790 srel = elf_hash_table(info)->srelgot;
a7519a3c
RH
2791 if (!srel)
2792 {
2793 BFD_ASSERT (entries == 0);
4a828aab 2794 return;
a7519a3c
RH
2795 }
2796 srel->size = sizeof (Elf64_External_Rela) * entries;
252b5132 2797
a7519a3c 2798 /* Now do the non-local symbols. */
4dfe6ac6 2799 alpha_elf_link_hash_traverse (htab,
a7519a3c 2800 elf64_alpha_size_rela_got_1, info);
a7519a3c 2801}
252b5132 2802
a7519a3c 2803/* Set the sizes of the dynamic sections. */
3765b1be 2804
a7519a3c
RH
2805static bfd_boolean
2806elf64_alpha_size_dynamic_sections (bfd *output_bfd ATTRIBUTE_UNUSED,
2807 struct bfd_link_info *info)
2808{
2809 bfd *dynobj;
2810 asection *s;
24f1a751 2811 bfd_boolean relplt, relocs;
4dfe6ac6
NC
2812 struct alpha_elf_link_hash_table * htab;
2813
2814 htab = alpha_elf_hash_table (info);
2815 if (htab == NULL)
2816 return FALSE;
3765b1be 2817
a7519a3c
RH
2818 dynobj = elf_hash_table(info)->dynobj;
2819 BFD_ASSERT(dynobj != NULL);
252b5132 2820
a7519a3c
RH
2821 if (elf_hash_table (info)->dynamic_sections_created)
2822 {
2823 /* Set the contents of the .interp section to the interpreter. */
9b8b325a 2824 if (bfd_link_executable (info) && !info->nointerp)
252b5132 2825 {
3d4d4302 2826 s = bfd_get_linker_section (dynobj, ".interp");
a7519a3c
RH
2827 BFD_ASSERT (s != NULL);
2828 s->size = sizeof ELF_DYNAMIC_INTERPRETER;
2829 s->contents = (unsigned char *) ELF_DYNAMIC_INTERPRETER;
2830 }
3765b1be 2831
a7519a3c
RH
2832 /* Now that we've seen all of the input files, we can decide which
2833 symbols need dynamic relocation entries and which don't. We've
2834 collected information in check_relocs that we can now apply to
2835 size the dynamic relocation sections. */
4dfe6ac6 2836 alpha_elf_link_hash_traverse (htab,
a7519a3c 2837 elf64_alpha_calc_dynrel_sizes, info);
252b5132 2838
a7519a3c 2839 elf64_alpha_size_rela_got_section (info);
6ec7057a 2840 elf64_alpha_size_plt_section (info);
a7519a3c
RH
2841 }
2842 /* else we're not dynamic and by definition we don't need such things. */
3765b1be 2843
a7519a3c
RH
2844 /* The check_relocs and adjust_dynamic_symbol entry points have
2845 determined the sizes of the various dynamic sections. Allocate
2846 memory for them. */
2847 relplt = FALSE;
24f1a751 2848 relocs = FALSE;
a7519a3c
RH
2849 for (s = dynobj->sections; s != NULL; s = s->next)
2850 {
2851 const char *name;
3765b1be 2852
a7519a3c
RH
2853 if (!(s->flags & SEC_LINKER_CREATED))
2854 continue;
cc03ec80 2855
a7519a3c
RH
2856 /* It's OK to base decisions on the section name, because none
2857 of the dynobj section names depend upon the input files. */
fd361982 2858 name = bfd_section_name (s);
3765b1be 2859
0112cd26 2860 if (CONST_STRNEQ (name, ".rela"))
3765b1be 2861 {
c456f082 2862 if (s->size != 0)
a7519a3c 2863 {
c456f082 2864 if (strcmp (name, ".rela.plt") == 0)
a7519a3c 2865 relplt = TRUE;
24f1a751
AM
2866 else
2867 relocs = TRUE;
252b5132 2868
a7519a3c
RH
2869 /* We use the reloc_count field as a counter if we need
2870 to copy relocs into the output file. */
2871 s->reloc_count = 0;
252b5132 2872 }
3765b1be 2873 }
0112cd26 2874 else if (! CONST_STRNEQ (name, ".got")
c456f082
AM
2875 && strcmp (name, ".plt") != 0
2876 && strcmp (name, ".dynbss") != 0)
3765b1be 2877 {
a7519a3c
RH
2878 /* It's not one of our dynamic sections, so don't allocate space. */
2879 continue;
2880 }
252b5132 2881
c456f082
AM
2882 if (s->size == 0)
2883 {
2884 /* If we don't need this section, strip it from the output file.
2885 This is to handle .rela.bss and .rela.plt. We must create it
2886 in create_dynamic_sections, because it must be created before
2887 the linker maps input sections to output sections. The
2888 linker does that before adjust_dynamic_symbol is called, and
2889 it is that function which decides whether anything needs to
2890 go into these sections. */
6452a567
RH
2891 if (!CONST_STRNEQ (name, ".got"))
2892 s->flags |= SEC_EXCLUDE;
c456f082
AM
2893 }
2894 else if ((s->flags & SEC_HAS_CONTENTS) != 0)
a7519a3c
RH
2895 {
2896 /* Allocate memory for the section contents. */
2897 s->contents = (bfd_byte *) bfd_zalloc (dynobj, s->size);
c456f082 2898 if (s->contents == NULL)
b34976b6 2899 return FALSE;
a7519a3c
RH
2900 }
2901 }
3765b1be 2902
a7519a3c
RH
2903 if (elf_hash_table (info)->dynamic_sections_created)
2904 {
2905 /* Add some entries to the .dynamic section. We fill in the
2906 values later, in elf64_alpha_finish_dynamic_sections, but we
2907 must add the entries now so that we get the correct size for
2908 the .dynamic section. The DT_DEBUG entry is filled in by the
2909 dynamic linker and used by the debugger. */
2910#define add_dynamic_entry(TAG, VAL) \
2911 _bfd_elf_add_dynamic_entry (info, TAG, VAL)
3765b1be 2912
0e1862bb 2913 if (bfd_link_executable (info))
a7519a3c
RH
2914 {
2915 if (!add_dynamic_entry (DT_DEBUG, 0))
2916 return FALSE;
3765b1be
RH
2917 }
2918
a7519a3c 2919 if (relplt)
3765b1be 2920 {
a7519a3c
RH
2921 if (!add_dynamic_entry (DT_PLTGOT, 0)
2922 || !add_dynamic_entry (DT_PLTRELSZ, 0)
2923 || !add_dynamic_entry (DT_PLTREL, DT_RELA)
2924 || !add_dynamic_entry (DT_JMPREL, 0))
2925 return FALSE;
6ec7057a
RH
2926
2927 if (elf64_alpha_use_secureplt
2928 && !add_dynamic_entry (DT_ALPHA_PLTRO, 1))
2929 return FALSE;
a7519a3c 2930 }
252b5132 2931
24f1a751 2932 if (relocs)
a7519a3c 2933 {
24f1a751
AM
2934 if (!add_dynamic_entry (DT_RELA, 0)
2935 || !add_dynamic_entry (DT_RELASZ, 0)
2936 || !add_dynamic_entry (DT_RELAENT, sizeof (Elf64_External_Rela)))
a7519a3c 2937 return FALSE;
24f1a751
AM
2938
2939 if (info->flags & DF_TEXTREL)
2940 {
2941 if (!add_dynamic_entry (DT_TEXTREL, 0))
2942 return FALSE;
2943 }
252b5132
RH
2944 }
2945 }
a7519a3c 2946#undef add_dynamic_entry
252b5132 2947
b34976b6 2948 return TRUE;
252b5132 2949}
a7519a3c
RH
2950\f
2951/* These functions do relaxation for Alpha ELF.
252b5132 2952
a7519a3c
RH
2953 Currently I'm only handling what I can do with existing compiler
2954 and assembler support, which means no instructions are removed,
2955 though some may be nopped. At this time GCC does not emit enough
2956 information to do all of the relaxing that is possible. It will
2957 take some not small amount of work for that to happen.
252b5132 2958
a7519a3c
RH
2959 There are a couple of interesting papers that I once read on this
2960 subject, that I cannot find references to at the moment, that
2961 related to Alpha in particular. They are by David Wall, then of
2962 DEC WRL. */
252b5132 2963
a7519a3c
RH
2964struct alpha_relax_info
2965{
2966 bfd *abfd;
2967 asection *sec;
2968 bfd_byte *contents;
2969 Elf_Internal_Shdr *symtab_hdr;
2970 Elf_Internal_Rela *relocs, *relend;
2971 struct bfd_link_info *link_info;
2972 bfd_vma gp;
2973 bfd *gotobj;
2974 asection *tsec;
2975 struct alpha_elf_link_hash_entry *h;
2976 struct alpha_elf_got_entry **first_gotent;
2977 struct alpha_elf_got_entry *gotent;
2978 bfd_boolean changed_contents;
2979 bfd_boolean changed_relocs;
2980 unsigned char other;
2981};
252b5132 2982
a7519a3c
RH
2983static Elf_Internal_Rela *
2984elf64_alpha_find_reloc_at_ofs (Elf_Internal_Rela *rel,
2985 Elf_Internal_Rela *relend,
2986 bfd_vma offset, int type)
2987{
2988 while (rel < relend)
252b5132 2989 {
a7519a3c
RH
2990 if (rel->r_offset == offset
2991 && ELF64_R_TYPE (rel->r_info) == (unsigned int) type)
2992 return rel;
2993 ++rel;
2994 }
2995 return NULL;
2996}
252b5132 2997
a7519a3c
RH
2998static bfd_boolean
2999elf64_alpha_relax_got_load (struct alpha_relax_info *info, bfd_vma symval,
3000 Elf_Internal_Rela *irel, unsigned long r_type)
3001{
3002 unsigned int insn;
3003 bfd_signed_vma disp;
252b5132 3004
a7519a3c
RH
3005 /* Get the instruction. */
3006 insn = bfd_get_32 (info->abfd, info->contents + irel->r_offset);
252b5132 3007
a7519a3c
RH
3008 if (insn >> 26 != OP_LDQ)
3009 {
3010 reloc_howto_type *howto = elf64_alpha_howto_table + r_type;
4eca0228 3011 _bfd_error_handler
695344c0 3012 /* xgettext:c-format */
2dcf00ce
AM
3013 (_("%pB: %pA+%#" PRIx64 ": warning: "
3014 "%s relocation against unexpected insn"),
3015 info->abfd, info->sec, (uint64_t) irel->r_offset, howto->name);
a7519a3c
RH
3016 return TRUE;
3017 }
252b5132 3018
a7519a3c
RH
3019 /* Can't relax dynamic symbols. */
3020 if (alpha_elf_dynamic_symbol_p (&info->h->root, info->link_info))
3021 return TRUE;
252b5132 3022
a7519a3c 3023 /* Can't use local-exec relocations in shared libraries. */
e366eeae 3024 if (r_type == R_ALPHA_GOTTPREL
3cbc1e5e 3025 && bfd_link_dll (info->link_info))
a7519a3c 3026 return TRUE;
252b5132 3027
a7519a3c
RH
3028 if (r_type == R_ALPHA_LITERAL)
3029 {
3030 /* Look for nice constant addresses. This includes the not-uncommon
3031 special case of 0 for undefweak symbols. */
3032 if ((info->h && info->h->root.root.type == bfd_link_hash_undefweak)
0e1862bb 3033 || (!bfd_link_pic (info->link_info)
a7519a3c
RH
3034 && (symval >= (bfd_vma)-0x8000 || symval < 0x8000)))
3035 {
3036 disp = 0;
3037 insn = (OP_LDA << 26) | (insn & (31 << 21)) | (31 << 16);
3038 insn |= (symval & 0xffff);
3039 r_type = R_ALPHA_NONE;
3040 }
3041 else
3042 {
d1c109de
RH
3043 /* We may only create GPREL relocs during the second pass. */
3044 if (info->link_info->relax_pass == 0)
3045 return TRUE;
3046
a7519a3c
RH
3047 disp = symval - info->gp;
3048 insn = (OP_LDA << 26) | (insn & 0x03ff0000);
3049 r_type = R_ALPHA_GPREL16;
3050 }
252b5132
RH
3051 }
3052 else
252b5132 3053 {
a7519a3c 3054 bfd_vma dtp_base, tp_base;
252b5132 3055
a7519a3c
RH
3056 BFD_ASSERT (elf_hash_table (info->link_info)->tls_sec != NULL);
3057 dtp_base = alpha_get_dtprel_base (info->link_info);
3058 tp_base = alpha_get_tprel_base (info->link_info);
3059 disp = symval - (r_type == R_ALPHA_GOTDTPREL ? dtp_base : tp_base);
252b5132 3060
a7519a3c 3061 insn = (OP_LDA << 26) | (insn & (31 << 21)) | (31 << 16);
252b5132 3062
a7519a3c
RH
3063 switch (r_type)
3064 {
3065 case R_ALPHA_GOTDTPREL:
3066 r_type = R_ALPHA_DTPREL16;
3067 break;
3068 case R_ALPHA_GOTTPREL:
3069 r_type = R_ALPHA_TPREL16;
3070 break;
3071 default:
3072 BFD_ASSERT (0);
3073 return FALSE;
3074 }
3075 }
252b5132 3076
a7519a3c 3077 if (disp < -0x8000 || disp >= 0x8000)
b34976b6 3078 return TRUE;
252b5132 3079
a7519a3c
RH
3080 bfd_put_32 (info->abfd, (bfd_vma) insn, info->contents + irel->r_offset);
3081 info->changed_contents = TRUE;
252b5132 3082
a7519a3c
RH
3083 /* Reduce the use count on this got entry by one, possibly
3084 eliminating it. */
3085 if (--info->gotent->use_count == 0)
252b5132 3086 {
a7519a3c
RH
3087 int sz = alpha_got_entry_size (r_type);
3088 alpha_elf_tdata (info->gotobj)->total_got_size -= sz;
3089 if (!info->h)
3090 alpha_elf_tdata (info->gotobj)->local_got_size -= sz;
252b5132 3091 }
252b5132 3092
a7519a3c
RH
3093 /* Smash the existing GOT relocation for its 16-bit immediate pair. */
3094 irel->r_info = ELF64_R_INFO (ELF64_R_SYM (irel->r_info), r_type);
3095 info->changed_relocs = TRUE;
3096
3097 /* ??? Search forward through this basic block looking for insns
3098 that use the target register. Stop after an insn modifying the
3099 register is seen, or after a branch or call.
252b5132 3100
a7519a3c
RH
3101 Any such memory load insn may be substituted by a load directly
3102 off the GP. This allows the memory load insn to be issued before
3103 the calculated GP register would otherwise be ready.
252b5132 3104
a7519a3c
RH
3105 Any such jsr insn can be replaced by a bsr if it is in range.
3106
3107 This would mean that we'd have to _add_ relocations, the pain of
3108 which gives one pause. */
252b5132 3109
b34976b6 3110 return TRUE;
252b5132
RH
3111}
3112
a7519a3c
RH
3113static bfd_vma
3114elf64_alpha_relax_opt_call (struct alpha_relax_info *info, bfd_vma symval)
252b5132 3115{
a7519a3c
RH
3116 /* If the function has the same gp, and we can identify that the
3117 function does not use its function pointer, we can eliminate the
3118 address load. */
252b5132 3119
a7519a3c
RH
3120 /* If the symbol is marked NOPV, we are being told the function never
3121 needs its procedure value. */
3122 if ((info->other & STO_ALPHA_STD_GPLOAD) == STO_ALPHA_NOPV)
3123 return symval;
252b5132 3124
a7519a3c
RH
3125 /* If the symbol is marked STD_GP, we are being told the function does
3126 a normal ldgp in the first two words. */
3127 else if ((info->other & STO_ALPHA_STD_GPLOAD) == STO_ALPHA_STD_GPLOAD)
3128 ;
252b5132 3129
a7519a3c
RH
3130 /* Otherwise, we may be able to identify a GP load in the first two
3131 words, which we can then skip. */
3132 else
252b5132 3133 {
a7519a3c
RH
3134 Elf_Internal_Rela *tsec_relocs, *tsec_relend, *tsec_free, *gpdisp;
3135 bfd_vma ofs;
252b5132 3136
a7519a3c
RH
3137 /* Load the relocations from the section that the target symbol is in. */
3138 if (info->sec == info->tsec)
252b5132 3139 {
a7519a3c
RH
3140 tsec_relocs = info->relocs;
3141 tsec_relend = info->relend;
3142 tsec_free = NULL;
3143 }
3144 else
3145 {
3146 tsec_relocs = (_bfd_elf_link_read_relocs
07d6d2b8 3147 (info->abfd, info->tsec, NULL,
a7519a3c
RH
3148 (Elf_Internal_Rela *) NULL,
3149 info->link_info->keep_memory));
3150 if (tsec_relocs == NULL)
3151 return 0;
3152 tsec_relend = tsec_relocs + info->tsec->reloc_count;
ae4fda66
JC
3153 tsec_free = (elf_section_data (info->tsec)->relocs == tsec_relocs
3154 ? NULL
3155 : tsec_relocs);
a7519a3c 3156 }
252b5132 3157
a7519a3c
RH
3158 /* Recover the symbol's offset within the section. */
3159 ofs = (symval - info->tsec->output_section->vma
3160 - info->tsec->output_offset);
252b5132 3161
a7519a3c
RH
3162 /* Look for a GPDISP reloc. */
3163 gpdisp = (elf64_alpha_find_reloc_at_ofs
3164 (tsec_relocs, tsec_relend, ofs, R_ALPHA_GPDISP));
252b5132 3165
a7519a3c
RH
3166 if (!gpdisp || gpdisp->r_addend != 4)
3167 {
c9594989 3168 free (tsec_free);
a7519a3c 3169 return 0;
252b5132 3170 }
c9594989 3171 free (tsec_free);
252b5132
RH
3172 }
3173
a7519a3c
RH
3174 /* We've now determined that we can skip an initial gp load. Verify
3175 that the call and the target use the same gp. */
f13a99db 3176 if (info->link_info->output_bfd->xvec != info->tsec->owner->xvec
a7519a3c
RH
3177 || info->gotobj != alpha_elf_tdata (info->tsec->owner)->gotobj)
3178 return 0;
252b5132 3179
a7519a3c
RH
3180 return symval + 8;
3181}
252b5132 3182
a7519a3c
RH
3183static bfd_boolean
3184elf64_alpha_relax_with_lituse (struct alpha_relax_info *info,
3185 bfd_vma symval, Elf_Internal_Rela *irel)
252b5132 3186{
d1c109de
RH
3187 Elf_Internal_Rela *urel, *erel, *irelend = info->relend;
3188 int flags;
a7519a3c
RH
3189 bfd_signed_vma disp;
3190 bfd_boolean fits16;
3191 bfd_boolean fits32;
3192 bfd_boolean lit_reused = FALSE;
3193 bfd_boolean all_optimized = TRUE;
d1c109de
RH
3194 bfd_boolean changed_contents;
3195 bfd_boolean changed_relocs;
3196 bfd_byte *contents = info->contents;
3197 bfd *abfd = info->abfd;
3198 bfd_vma sec_output_vma;
a7519a3c 3199 unsigned int lit_insn;
d1c109de 3200 int relax_pass;
252b5132 3201
d1c109de 3202 lit_insn = bfd_get_32 (abfd, contents + irel->r_offset);
a7519a3c
RH
3203 if (lit_insn >> 26 != OP_LDQ)
3204 {
4eca0228 3205 _bfd_error_handler
695344c0 3206 /* xgettext:c-format */
2dcf00ce 3207 (_("%pB: %pA+%#" PRIx64 ": warning: "
38f14ab8
AM
3208 "%s relocation against unexpected insn"),
3209 abfd, info->sec, (uint64_t) irel->r_offset, "LITERAL");
a7519a3c
RH
3210 return TRUE;
3211 }
252b5132 3212
a7519a3c
RH
3213 /* Can't relax dynamic symbols. */
3214 if (alpha_elf_dynamic_symbol_p (&info->h->root, info->link_info))
3215 return TRUE;
3216
d1c109de
RH
3217 changed_contents = info->changed_contents;
3218 changed_relocs = info->changed_relocs;
3219 sec_output_vma = info->sec->output_section->vma + info->sec->output_offset;
3220 relax_pass = info->link_info->relax_pass;
3221
a7519a3c 3222 /* Summarize how this particular LITERAL is used. */
d1c109de 3223 for (erel = irel+1, flags = 0; erel < irelend; ++erel)
252b5132 3224 {
d1c109de 3225 if (ELF64_R_TYPE (erel->r_info) != R_ALPHA_LITUSE)
a7519a3c 3226 break;
d1c109de
RH
3227 if (erel->r_addend <= 6)
3228 flags |= 1 << erel->r_addend;
a7519a3c 3229 }
252b5132 3230
a7519a3c
RH
3231 /* A little preparation for the loop... */
3232 disp = symval - info->gp;
252b5132 3233
d1c109de 3234 for (urel = irel+1; urel < erel; ++urel)
a7519a3c 3235 {
d1c109de 3236 bfd_vma urel_r_offset = urel->r_offset;
a7519a3c
RH
3237 unsigned int insn;
3238 int insn_disp;
3239 bfd_signed_vma xdisp;
d1c109de 3240 Elf_Internal_Rela nrel;
252b5132 3241
d1c109de 3242 insn = bfd_get_32 (abfd, contents + urel_r_offset);
252b5132 3243
a7519a3c
RH
3244 switch (urel->r_addend)
3245 {
3246 case LITUSE_ALPHA_ADDR:
3247 default:
3248 /* This type is really just a placeholder to note that all
3249 uses cannot be optimized, but to still allow some. */
3250 all_optimized = FALSE;
3251 break;
252b5132 3252
a7519a3c 3253 case LITUSE_ALPHA_BASE:
d1c109de
RH
3254 /* We may only create GPREL relocs during the second pass. */
3255 if (relax_pass == 0)
3256 {
3257 all_optimized = FALSE;
3258 break;
3259 }
3260
a7519a3c 3261 /* We can always optimize 16-bit displacements. */
252b5132 3262
a7519a3c
RH
3263 /* Extract the displacement from the instruction, sign-extending
3264 it if necessary, then test whether it is within 16 or 32 bits
3265 displacement from GP. */
3266 insn_disp = ((insn & 0xffff) ^ 0x8000) - 0x8000;
3267
3268 xdisp = disp + insn_disp;
3269 fits16 = (xdisp >= - (bfd_signed_vma) 0x8000 && xdisp < 0x8000);
3270 fits32 = (xdisp >= - (bfd_signed_vma) 0x80000000
3271 && xdisp < 0x7fff8000);
3272
3273 if (fits16)
3274 {
3275 /* Take the op code and dest from this insn, take the base
3276 register from the literal insn. Leave the offset alone. */
3277 insn = (insn & 0xffe0ffff) | (lit_insn & 0x001f0000);
d1c109de
RH
3278 bfd_put_32 (abfd, (bfd_vma) insn, contents + urel_r_offset);
3279 changed_contents = TRUE;
3280
3281 nrel = *urel;
3282 nrel.r_info = ELF64_R_INFO (ELF64_R_SYM (irel->r_info),
3283 R_ALPHA_GPREL16);
3284 nrel.r_addend = irel->r_addend;
3285
3286 /* As we adjust, move the reloc to the end so that we don't
07d6d2b8 3287 break the LITERAL+LITUSE chain. */
d1c109de 3288 if (urel < --erel)
07d6d2b8 3289 *urel-- = *erel;
d1c109de
RH
3290 *erel = nrel;
3291 changed_relocs = TRUE;
252b5132 3292 }
252b5132 3293
a7519a3c
RH
3294 /* If all mem+byte, we can optimize 32-bit mem displacements. */
3295 else if (fits32 && !(flags & ~6))
3296 {
3297 /* FIXME: sanity check that lit insn Ra is mem insn Rb. */
252b5132 3298
a7519a3c
RH
3299 irel->r_info = ELF64_R_INFO (ELF64_R_SYM (irel->r_info),
3300 R_ALPHA_GPRELHIGH);
3301 lit_insn = (OP_LDAH << 26) | (lit_insn & 0x03ff0000);
d1c109de 3302 bfd_put_32 (abfd, (bfd_vma) lit_insn, contents + irel->r_offset);
a7519a3c 3303 lit_reused = TRUE;
d1c109de 3304 changed_contents = TRUE;
252b5132 3305
07d6d2b8
AM
3306 /* Since all relocs must be optimized, don't bother swapping
3307 this relocation to the end. */
a7519a3c
RH
3308 urel->r_info = ELF64_R_INFO (ELF64_R_SYM (irel->r_info),
3309 R_ALPHA_GPRELLOW);
3310 urel->r_addend = irel->r_addend;
d1c109de 3311 changed_relocs = TRUE;
a7519a3c
RH
3312 }
3313 else
3314 all_optimized = FALSE;
3315 break;
252b5132 3316
a7519a3c
RH
3317 case LITUSE_ALPHA_BYTOFF:
3318 /* We can always optimize byte instructions. */
252b5132 3319
a7519a3c
RH
3320 /* FIXME: sanity check the insn for byte op. Check that the
3321 literal dest reg is indeed Rb in the byte insn. */
252b5132 3322
a7519a3c
RH
3323 insn &= ~ (unsigned) 0x001ff000;
3324 insn |= ((symval & 7) << 13) | 0x1000;
d1c109de
RH
3325 bfd_put_32 (abfd, (bfd_vma) insn, contents + urel_r_offset);
3326 changed_contents = TRUE;
3327
3328 nrel = *urel;
3329 nrel.r_info = ELF64_R_INFO (0, R_ALPHA_NONE);
3330 nrel.r_addend = 0;
3331
3332 /* As we adjust, move the reloc to the end so that we don't
3333 break the LITERAL+LITUSE chain. */
3334 if (urel < --erel)
3335 *urel-- = *erel;
3336 *erel = nrel;
3337 changed_relocs = TRUE;
a7519a3c 3338 break;
252b5132 3339
a7519a3c
RH
3340 case LITUSE_ALPHA_JSR:
3341 case LITUSE_ALPHA_TLSGD:
3342 case LITUSE_ALPHA_TLSLDM:
8288a39e 3343 case LITUSE_ALPHA_JSRDIRECT:
0d5f9994 3344 {
a7519a3c
RH
3345 bfd_vma optdest, org;
3346 bfd_signed_vma odisp;
252b5132 3347
a7519a3c
RH
3348 /* For undefined weak symbols, we're mostly interested in getting
3349 rid of the got entry whenever possible, so optimize this to a
3350 use of the zero register. */
3351 if (info->h && info->h->root.root.type == bfd_link_hash_undefweak)
3352 {
3353 insn |= 31 << 16;
d1c109de 3354 bfd_put_32 (abfd, (bfd_vma) insn, contents + urel_r_offset);
252b5132 3355
d1c109de 3356 changed_contents = TRUE;
a7519a3c
RH
3357 break;
3358 }
252b5132 3359
a7519a3c
RH
3360 /* If not zero, place to jump without needing pv. */
3361 optdest = elf64_alpha_relax_opt_call (info, symval);
d1c109de 3362 org = sec_output_vma + urel_r_offset + 4;
a7519a3c 3363 odisp = (optdest ? optdest : symval) - org;
252b5132 3364
a7519a3c
RH
3365 if (odisp >= -0x400000 && odisp < 0x400000)
3366 {
3367 Elf_Internal_Rela *xrel;
252b5132 3368
a7519a3c
RH
3369 /* Preserve branch prediction call stack when possible. */
3370 if ((insn & INSN_JSR_MASK) == INSN_JSR)
3371 insn = (OP_BSR << 26) | (insn & 0x03e00000);
3372 else
3373 insn = (OP_BR << 26) | (insn & 0x03e00000);
d1c109de
RH
3374 bfd_put_32 (abfd, (bfd_vma) insn, contents + urel_r_offset);
3375 changed_contents = TRUE;
252b5132 3376
d1c109de
RH
3377 nrel = *urel;
3378 nrel.r_info = ELF64_R_INFO (ELF64_R_SYM (irel->r_info),
3379 R_ALPHA_BRADDR);
3380 nrel.r_addend = irel->r_addend;
252b5132 3381
a7519a3c 3382 if (optdest)
d1c109de 3383 nrel.r_addend += optdest - symval;
a7519a3c
RH
3384 else
3385 all_optimized = FALSE;
252b5132 3386
a7519a3c
RH
3387 /* Kill any HINT reloc that might exist for this insn. */
3388 xrel = (elf64_alpha_find_reloc_at_ofs
d1c109de 3389 (info->relocs, info->relend, urel_r_offset,
a7519a3c
RH
3390 R_ALPHA_HINT));
3391 if (xrel)
3392 xrel->r_info = ELF64_R_INFO (0, R_ALPHA_NONE);
252b5132 3393
d1c109de
RH
3394 /* As we adjust, move the reloc to the end so that we don't
3395 break the LITERAL+LITUSE chain. */
3396 if (urel < --erel)
3397 *urel-- = *erel;
3398 *erel = nrel;
3399
a7519a3c
RH
3400 info->changed_relocs = TRUE;
3401 }
3402 else
3403 all_optimized = FALSE;
252b5132 3404
a7519a3c
RH
3405 /* Even if the target is not in range for a direct branch,
3406 if we share a GP, we can eliminate the gp reload. */
3407 if (optdest)
3408 {
3409 Elf_Internal_Rela *gpdisp
3410 = (elf64_alpha_find_reloc_at_ofs
d1c109de 3411 (info->relocs, irelend, urel_r_offset + 4,
a7519a3c
RH
3412 R_ALPHA_GPDISP));
3413 if (gpdisp)
3414 {
d1c109de 3415 bfd_byte *p_ldah = contents + gpdisp->r_offset;
a7519a3c 3416 bfd_byte *p_lda = p_ldah + gpdisp->r_addend;
d1c109de
RH
3417 unsigned int ldah = bfd_get_32 (abfd, p_ldah);
3418 unsigned int lda = bfd_get_32 (abfd, p_lda);
252b5132 3419
a7519a3c
RH
3420 /* Verify that the instruction is "ldah $29,0($26)".
3421 Consider a function that ends in a noreturn call,
3422 and that the next function begins with an ldgp,
3423 and that by accident there is no padding between.
3424 In that case the insn would use $27 as the base. */
3425 if (ldah == 0x27ba0000 && lda == 0x23bd0000)
3426 {
d1c109de
RH
3427 bfd_put_32 (abfd, (bfd_vma) INSN_UNOP, p_ldah);
3428 bfd_put_32 (abfd, (bfd_vma) INSN_UNOP, p_lda);
252b5132 3429
a7519a3c 3430 gpdisp->r_info = ELF64_R_INFO (0, R_ALPHA_NONE);
d1c109de
RH
3431 changed_contents = TRUE;
3432 changed_relocs = TRUE;
a7519a3c
RH
3433 }
3434 }
3435 }
3436 }
3437 break;
252b5132 3438 }
252b5132
RH
3439 }
3440
d1c109de
RH
3441 /* If we reused the literal instruction, we must have optimized all. */
3442 BFD_ASSERT(!lit_reused || all_optimized);
3443
a7519a3c
RH
3444 /* If all cases were optimized, we can reduce the use count on this
3445 got entry by one, possibly eliminating it. */
3446 if (all_optimized)
252b5132 3447 {
a7519a3c 3448 if (--info->gotent->use_count == 0)
252b5132 3449 {
a7519a3c
RH
3450 int sz = alpha_got_entry_size (R_ALPHA_LITERAL);
3451 alpha_elf_tdata (info->gotobj)->total_got_size -= sz;
3452 if (!info->h)
3453 alpha_elf_tdata (info->gotobj)->local_got_size -= sz;
252b5132 3454 }
a7519a3c
RH
3455
3456 /* If the literal instruction is no longer needed (it may have been
3457 reused. We can eliminate it. */
3458 /* ??? For now, I don't want to deal with compacting the section,
3459 so just nop it out. */
3460 if (!lit_reused)
252b5132 3461 {
a7519a3c 3462 irel->r_info = ELF64_R_INFO (0, R_ALPHA_NONE);
d1c109de 3463 changed_relocs = TRUE;
252b5132 3464
d1c109de
RH
3465 bfd_put_32 (abfd, (bfd_vma) INSN_UNOP, contents + irel->r_offset);
3466 changed_contents = TRUE;
a7519a3c 3467 }
a7519a3c 3468 }
d1c109de
RH
3469
3470 info->changed_contents = changed_contents;
3471 info->changed_relocs = changed_relocs;
3472
3473 if (all_optimized || relax_pass == 0)
3474 return TRUE;
3475 return elf64_alpha_relax_got_load (info, symval, irel, R_ALPHA_LITERAL);
252b5132
RH
3476}
3477
b34976b6 3478static bfd_boolean
a7519a3c
RH
3479elf64_alpha_relax_tls_get_addr (struct alpha_relax_info *info, bfd_vma symval,
3480 Elf_Internal_Rela *irel, bfd_boolean is_gd)
f44f99a5 3481{
a7519a3c 3482 bfd_byte *pos[5];
891caa9b 3483 unsigned int insn, tlsgd_reg;
a7519a3c 3484 Elf_Internal_Rela *gpdisp, *hint;
891caa9b 3485 bfd_boolean dynamic, use_gottprel;
a7519a3c 3486 unsigned long new_symndx;
f44f99a5 3487
a7519a3c 3488 dynamic = alpha_elf_dynamic_symbol_p (&info->h->root, info->link_info);
f44f99a5 3489
a7519a3c
RH
3490 /* If a TLS symbol is accessed using IE at least once, there is no point
3491 to use dynamic model for it. */
3492 if (is_gd && info->h && (info->h->flags & ALPHA_ELF_LINK_HASH_TLS_IE))
3493 ;
f44f99a5 3494
a7519a3c
RH
3495 /* If the symbol is local, and we've already committed to DF_STATIC_TLS,
3496 then we might as well relax to IE. */
0e1862bb 3497 else if (bfd_link_pic (info->link_info) && !dynamic
a7519a3c
RH
3498 && (info->link_info->flags & DF_STATIC_TLS))
3499 ;
f44f99a5 3500
a7519a3c 3501 /* Otherwise we must be building an executable to do anything. */
0e1862bb 3502 else if (bfd_link_pic (info->link_info))
a7519a3c 3503 return TRUE;
f44f99a5 3504
a7519a3c
RH
3505 /* The TLSGD/TLSLDM relocation must be followed by a LITERAL and
3506 the matching LITUSE_TLS relocations. */
3507 if (irel + 2 >= info->relend)
3508 return TRUE;
3509 if (ELF64_R_TYPE (irel[1].r_info) != R_ALPHA_LITERAL
3510 || ELF64_R_TYPE (irel[2].r_info) != R_ALPHA_LITUSE
3511 || irel[2].r_addend != (is_gd ? LITUSE_ALPHA_TLSGD : LITUSE_ALPHA_TLSLDM))
3512 return TRUE;
f44f99a5 3513
a7519a3c
RH
3514 /* There must be a GPDISP relocation positioned immediately after the
3515 LITUSE relocation. */
3516 gpdisp = elf64_alpha_find_reloc_at_ofs (info->relocs, info->relend,
3517 irel[2].r_offset + 4, R_ALPHA_GPDISP);
3518 if (!gpdisp)
b34976b6 3519 return TRUE;
f44f99a5 3520
a7519a3c
RH
3521 pos[0] = info->contents + irel[0].r_offset;
3522 pos[1] = info->contents + irel[1].r_offset;
3523 pos[2] = info->contents + irel[2].r_offset;
3524 pos[3] = info->contents + gpdisp->r_offset;
3525 pos[4] = pos[3] + gpdisp->r_addend;
f44f99a5 3526
7dbf3b76
RH
3527 /* Beware of the compiler hoisting part of the sequence out a loop
3528 and adjusting the destination register for the TLSGD insn. If this
3529 happens, there will be a move into $16 before the JSR insn, so only
3530 transformations of the first insn pair should use this register. */
3531 tlsgd_reg = bfd_get_32 (info->abfd, pos[0]);
3532 tlsgd_reg = (tlsgd_reg >> 21) & 31;
3533
a7519a3c
RH
3534 /* Generally, the positions are not allowed to be out of order, lest the
3535 modified insn sequence have different register lifetimes. We can make
3536 an exception when pos 1 is adjacent to pos 0. */
3537 if (pos[1] + 4 == pos[0])
f44f99a5 3538 {
a7519a3c
RH
3539 bfd_byte *tmp = pos[0];
3540 pos[0] = pos[1];
3541 pos[1] = tmp;
f44f99a5 3542 }
a7519a3c
RH
3543 if (pos[1] >= pos[2] || pos[2] >= pos[3])
3544 return TRUE;
cc03ec80 3545
a7519a3c
RH
3546 /* Reduce the use count on the LITERAL relocation. Do this before we
3547 smash the symndx when we adjust the relocations below. */
3548 {
3549 struct alpha_elf_got_entry *lit_gotent;
3550 struct alpha_elf_link_hash_entry *lit_h;
3551 unsigned long indx;
f44f99a5 3552
a7519a3c
RH
3553 BFD_ASSERT (ELF64_R_SYM (irel[1].r_info) >= info->symtab_hdr->sh_info);
3554 indx = ELF64_R_SYM (irel[1].r_info) - info->symtab_hdr->sh_info;
3555 lit_h = alpha_elf_sym_hashes (info->abfd)[indx];
f44f99a5 3556
a7519a3c
RH
3557 while (lit_h->root.root.type == bfd_link_hash_indirect
3558 || lit_h->root.root.type == bfd_link_hash_warning)
3559 lit_h = (struct alpha_elf_link_hash_entry *) lit_h->root.root.u.i.link;
252b5132 3560
a7519a3c
RH
3561 for (lit_gotent = lit_h->got_entries; lit_gotent ;
3562 lit_gotent = lit_gotent->next)
3563 if (lit_gotent->gotobj == info->gotobj
3564 && lit_gotent->reloc_type == R_ALPHA_LITERAL
3565 && lit_gotent->addend == irel[1].r_addend)
3566 break;
3567 BFD_ASSERT (lit_gotent);
252b5132 3568
a7519a3c
RH
3569 if (--lit_gotent->use_count == 0)
3570 {
3571 int sz = alpha_got_entry_size (R_ALPHA_LITERAL);
3572 alpha_elf_tdata (info->gotobj)->total_got_size -= sz;
3573 }
3574 }
252b5132 3575
a7519a3c 3576 /* Change
252b5132 3577
a7519a3c
RH
3578 lda $16,x($gp) !tlsgd!1
3579 ldq $27,__tls_get_addr($gp) !literal!1
3580 jsr $26,($27),__tls_get_addr !lituse_tlsgd!1
3581 ldah $29,0($26) !gpdisp!2
3582 lda $29,0($29) !gpdisp!2
3583 to
3584 ldq $16,x($gp) !gottprel
3585 unop
3586 call_pal rduniq
3587 addq $16,$0,$0
3588 unop
3589 or the first pair to
3590 lda $16,x($gp) !tprel
3591 unop
3592 or
3593 ldah $16,x($gp) !tprelhi
3594 lda $16,x($16) !tprello
3595
3596 as appropriate. */
3597
3598 use_gottprel = FALSE;
cf35638d 3599 new_symndx = is_gd ? ELF64_R_SYM (irel->r_info) : STN_UNDEF;
891caa9b 3600
9a757e4d
RM
3601 /* Some compilers warn about a Boolean-looking expression being
3602 used in a switch. The explicit cast silences them. */
0e1862bb 3603 switch ((int) (!dynamic && !bfd_link_pic (info->link_info)))
252b5132 3604 {
a7519a3c
RH
3605 case 1:
3606 {
3607 bfd_vma tp_base;
3608 bfd_signed_vma disp;
252b5132 3609
a7519a3c
RH
3610 BFD_ASSERT (elf_hash_table (info->link_info)->tls_sec != NULL);
3611 tp_base = alpha_get_tprel_base (info->link_info);
3612 disp = symval - tp_base;
252b5132 3613
a7519a3c
RH
3614 if (disp >= -0x8000 && disp < 0x8000)
3615 {
891caa9b 3616 insn = (OP_LDA << 26) | (tlsgd_reg << 21) | (31 << 16);
a7519a3c
RH
3617 bfd_put_32 (info->abfd, (bfd_vma) insn, pos[0]);
3618 bfd_put_32 (info->abfd, (bfd_vma) INSN_UNOP, pos[1]);
3765b1be 3619
a7519a3c
RH
3620 irel[0].r_offset = pos[0] - info->contents;
3621 irel[0].r_info = ELF64_R_INFO (new_symndx, R_ALPHA_TPREL16);
3622 irel[1].r_info = ELF64_R_INFO (0, R_ALPHA_NONE);
3623 break;
3624 }
3625 else if (disp >= -(bfd_signed_vma) 0x80000000
3626 && disp < (bfd_signed_vma) 0x7fff8000
891caa9b 3627 && pos[0] + 4 == pos[1])
a7519a3c 3628 {
891caa9b 3629 insn = (OP_LDAH << 26) | (tlsgd_reg << 21) | (31 << 16);
a7519a3c 3630 bfd_put_32 (info->abfd, (bfd_vma) insn, pos[0]);
891caa9b 3631 insn = (OP_LDA << 26) | (tlsgd_reg << 21) | (tlsgd_reg << 16);
a7519a3c 3632 bfd_put_32 (info->abfd, (bfd_vma) insn, pos[1]);
3765b1be 3633
a7519a3c
RH
3634 irel[0].r_offset = pos[0] - info->contents;
3635 irel[0].r_info = ELF64_R_INFO (new_symndx, R_ALPHA_TPRELHI);
3636 irel[1].r_offset = pos[1] - info->contents;
3637 irel[1].r_info = ELF64_R_INFO (new_symndx, R_ALPHA_TPRELLO);
3638 break;
3639 }
3640 }
3641 /* FALLTHRU */
3765b1be 3642
3765b1be 3643 default:
a7519a3c
RH
3644 use_gottprel = TRUE;
3645
891caa9b 3646 insn = (OP_LDQ << 26) | (tlsgd_reg << 21) | (29 << 16);
a7519a3c
RH
3647 bfd_put_32 (info->abfd, (bfd_vma) insn, pos[0]);
3648 bfd_put_32 (info->abfd, (bfd_vma) INSN_UNOP, pos[1]);
3649
3650 irel[0].r_offset = pos[0] - info->contents;
3651 irel[0].r_info = ELF64_R_INFO (new_symndx, R_ALPHA_GOTTPREL);
3652 irel[1].r_info = ELF64_R_INFO (0, R_ALPHA_NONE);
3653 break;
3765b1be 3654 }
3765b1be 3655
a7519a3c 3656 bfd_put_32 (info->abfd, (bfd_vma) INSN_RDUNIQ, pos[2]);
252b5132 3657
a7519a3c
RH
3658 insn = INSN_ADDQ | (16 << 21) | (0 << 16) | (0 << 0);
3659 bfd_put_32 (info->abfd, (bfd_vma) insn, pos[3]);
3765b1be 3660
a7519a3c 3661 bfd_put_32 (info->abfd, (bfd_vma) INSN_UNOP, pos[4]);
e92d460e 3662
a7519a3c
RH
3663 irel[2].r_info = ELF64_R_INFO (0, R_ALPHA_NONE);
3664 gpdisp->r_info = ELF64_R_INFO (0, R_ALPHA_NONE);
252b5132 3665
a7519a3c
RH
3666 hint = elf64_alpha_find_reloc_at_ofs (info->relocs, info->relend,
3667 irel[2].r_offset, R_ALPHA_HINT);
3668 if (hint)
3669 hint->r_info = ELF64_R_INFO (0, R_ALPHA_NONE);
252b5132 3670
a7519a3c
RH
3671 info->changed_contents = TRUE;
3672 info->changed_relocs = TRUE;
d6ad34f6 3673
a7519a3c
RH
3674 /* Reduce the use count on the TLSGD/TLSLDM relocation. */
3675 if (--info->gotent->use_count == 0)
3765b1be 3676 {
a7519a3c
RH
3677 int sz = alpha_got_entry_size (info->gotent->reloc_type);
3678 alpha_elf_tdata (info->gotobj)->total_got_size -= sz;
3679 if (!info->h)
3680 alpha_elf_tdata (info->gotobj)->local_got_size -= sz;
3765b1be 3681 }
252b5132 3682
a7519a3c
RH
3683 /* If we've switched to a GOTTPREL relocation, increment the reference
3684 count on that got entry. */
3685 if (use_gottprel)
f44f99a5 3686 {
a7519a3c 3687 struct alpha_elf_got_entry *tprel_gotent;
f44f99a5 3688
a7519a3c
RH
3689 for (tprel_gotent = *info->first_gotent; tprel_gotent ;
3690 tprel_gotent = tprel_gotent->next)
3691 if (tprel_gotent->gotobj == info->gotobj
3692 && tprel_gotent->reloc_type == R_ALPHA_GOTTPREL
3693 && tprel_gotent->addend == irel->r_addend)
3694 break;
3695 if (tprel_gotent)
3696 tprel_gotent->use_count++;
3697 else
f44f99a5 3698 {
a7519a3c
RH
3699 if (info->gotent->use_count == 0)
3700 tprel_gotent = info->gotent;
3701 else
3702 {
3703 tprel_gotent = (struct alpha_elf_got_entry *)
3704 bfd_alloc (info->abfd, sizeof (struct alpha_elf_got_entry));
3705 if (!tprel_gotent)
3706 return FALSE;
f44f99a5 3707
a7519a3c
RH
3708 tprel_gotent->next = *info->first_gotent;
3709 *info->first_gotent = tprel_gotent;
f44f99a5 3710
a7519a3c
RH
3711 tprel_gotent->gotobj = info->gotobj;
3712 tprel_gotent->addend = irel->r_addend;
3713 tprel_gotent->got_offset = -1;
3714 tprel_gotent->reloc_done = 0;
3715 tprel_gotent->reloc_xlated = 0;
3716 }
f44f99a5 3717
a7519a3c
RH
3718 tprel_gotent->use_count = 1;
3719 tprel_gotent->reloc_type = R_ALPHA_GOTTPREL;
3720 }
f44f99a5 3721 }
f44f99a5 3722
b34976b6 3723 return TRUE;
f44f99a5
RH
3724}
3725
b34976b6 3726static bfd_boolean
a7519a3c
RH
3727elf64_alpha_relax_section (bfd *abfd, asection *sec,
3728 struct bfd_link_info *link_info, bfd_boolean *again)
f44f99a5 3729{
a7519a3c
RH
3730 Elf_Internal_Shdr *symtab_hdr;
3731 Elf_Internal_Rela *internal_relocs;
3732 Elf_Internal_Rela *irel, *irelend;
3733 Elf_Internal_Sym *isymbuf = NULL;
3734 struct alpha_elf_got_entry **local_got_entries;
3735 struct alpha_relax_info info;
4dfe6ac6 3736 struct alpha_elf_link_hash_table * htab;
d1c109de 3737 int relax_pass;
4dfe6ac6
NC
3738
3739 htab = alpha_elf_hash_table (link_info);
3740 if (htab == NULL)
3741 return FALSE;
f44f99a5 3742
4a828aab 3743 /* There's nothing to change, yet. */
a7519a3c 3744 *again = FALSE;
f44f99a5 3745
0e1862bb 3746 if (bfd_link_relocatable (link_info)
a7519a3c
RH
3747 || ((sec->flags & (SEC_CODE | SEC_RELOC | SEC_ALLOC))
3748 != (SEC_CODE | SEC_RELOC | SEC_ALLOC))
3749 || sec->reloc_count == 0)
d6ad34f6
RH
3750 return TRUE;
3751
0ffa91dd 3752 BFD_ASSERT (is_alpha_elf (abfd));
d1c109de 3753 relax_pass = link_info->relax_pass;
0ffa91dd 3754
4a828aab 3755 /* Make sure our GOT and PLT tables are up-to-date. */
4dfe6ac6 3756 if (htab->relax_trip != link_info->relax_trip)
4a828aab 3757 {
4dfe6ac6 3758 htab->relax_trip = link_info->relax_trip;
4a828aab 3759
d1c109de 3760 /* This should never fail after the initial round, since the only error
07d6d2b8 3761 is GOT overflow, and relaxation only shrinks the table. However, we
d1c109de
RH
3762 may only merge got sections during the first pass. If we merge
3763 sections after we've created GPREL relocs, the GP for the merged
3764 section backs up which may put the relocs out of range. */
3765 if (!elf64_alpha_size_got_sections (link_info, relax_pass == 0))
4a828aab
RH
3766 abort ();
3767 if (elf_hash_table (link_info)->dynamic_sections_created)
3768 {
3769 elf64_alpha_size_plt_section (link_info);
3770 elf64_alpha_size_rela_got_section (link_info);
3771 }
3772 }
3773
0ffa91dd 3774 symtab_hdr = &elf_symtab_hdr (abfd);
a7519a3c 3775 local_got_entries = alpha_elf_tdata(abfd)->local_got_entries;
252b5132 3776
a7519a3c
RH
3777 /* Load the relocations for this section. */
3778 internal_relocs = (_bfd_elf_link_read_relocs
2c3fc389 3779 (abfd, sec, NULL, (Elf_Internal_Rela *) NULL,
a7519a3c
RH
3780 link_info->keep_memory));
3781 if (internal_relocs == NULL)
3782 return FALSE;
252b5132 3783
a7519a3c
RH
3784 memset(&info, 0, sizeof (info));
3785 info.abfd = abfd;
3786 info.sec = sec;
3787 info.link_info = link_info;
3788 info.symtab_hdr = symtab_hdr;
3789 info.relocs = internal_relocs;
3790 info.relend = irelend = internal_relocs + sec->reloc_count;
3791
3792 /* Find the GP for this object. Do not store the result back via
3793 _bfd_set_gp_value, since this could change again before final. */
3794 info.gotobj = alpha_elf_tdata (abfd)->gotobj;
3795 if (info.gotobj)
3765b1be 3796 {
a7519a3c
RH
3797 asection *sgot = alpha_elf_tdata (info.gotobj)->got;
3798 info.gp = (sgot->output_section->vma
3799 + sgot->output_offset
3800 + 0x8000);
252b5132
RH
3801 }
3802
a7519a3c
RH
3803 /* Get the section contents. */
3804 if (elf_section_data (sec)->this_hdr.contents != NULL)
3805 info.contents = elf_section_data (sec)->this_hdr.contents;
3806 else
3807 {
3808 if (!bfd_malloc_and_get_section (abfd, sec, &info.contents))
3809 goto error_return;
3810 }
252b5132 3811
a7519a3c
RH
3812 for (irel = internal_relocs; irel < irelend; irel++)
3813 {
3814 bfd_vma symval;
3815 struct alpha_elf_got_entry *gotent;
3816 unsigned long r_type = ELF64_R_TYPE (irel->r_info);
3817 unsigned long r_symndx = ELF64_R_SYM (irel->r_info);
3818
3819 /* Early exit for unhandled or unrelaxable relocations. */
d1c109de 3820 if (r_type != R_ALPHA_LITERAL)
07d6d2b8
AM
3821 {
3822 /* We complete everything except LITERAL in the first pass. */
d1c109de
RH
3823 if (relax_pass != 0)
3824 continue;
3825 if (r_type == R_ALPHA_TLSLDM)
3826 {
3827 /* The symbol for a TLSLDM reloc is ignored. Collapse the
07d6d2b8 3828 reloc to the STN_UNDEF (0) symbol so that they all match. */
d1c109de
RH
3829 r_symndx = STN_UNDEF;
3830 }
3831 else if (r_type != R_ALPHA_GOTDTPREL
07d6d2b8 3832 && r_type != R_ALPHA_GOTTPREL
d1c109de
RH
3833 && r_type != R_ALPHA_TLSGD)
3834 continue;
a7519a3c
RH
3835 }
3836
3837 /* Get the value of the symbol referred to by the reloc. */
3838 if (r_symndx < symtab_hdr->sh_info)
3839 {
3840 /* A local symbol. */
3841 Elf_Internal_Sym *isym;
3842
3843 /* Read this BFD's local symbols. */
3844 if (isymbuf == NULL)
3845 {
3846 isymbuf = (Elf_Internal_Sym *) symtab_hdr->contents;
3847 if (isymbuf == NULL)
3848 isymbuf = bfd_elf_get_elf_syms (abfd, symtab_hdr,
3849 symtab_hdr->sh_info, 0,
3850 NULL, NULL, NULL);
3851 if (isymbuf == NULL)
3852 goto error_return;
3853 }
252b5132 3854
a7519a3c 3855 isym = isymbuf + r_symndx;
252b5132 3856
a7519a3c
RH
3857 /* Given the symbol for a TLSLDM reloc is ignored, this also
3858 means forcing the symbol value to the tp base. */
3859 if (r_type == R_ALPHA_TLSLDM)
3860 {
3861 info.tsec = bfd_abs_section_ptr;
3862 symval = alpha_get_tprel_base (info.link_info);
3863 }
3864 else
3865 {
3866 symval = isym->st_value;
3867 if (isym->st_shndx == SHN_UNDEF)
07d6d2b8 3868 continue;
a7519a3c 3869 else if (isym->st_shndx == SHN_ABS)
07d6d2b8 3870 info.tsec = bfd_abs_section_ptr;
a7519a3c 3871 else if (isym->st_shndx == SHN_COMMON)
07d6d2b8 3872 info.tsec = bfd_com_section_ptr;
a7519a3c 3873 else
07d6d2b8 3874 info.tsec = bfd_section_from_elf_index (abfd, isym->st_shndx);
a7519a3c 3875 }
252b5132 3876
a7519a3c
RH
3877 info.h = NULL;
3878 info.other = isym->st_other;
3879 if (local_got_entries)
3880 info.first_gotent = &local_got_entries[r_symndx];
3881 else
3882 {
3883 info.first_gotent = &info.gotent;
3884 info.gotent = NULL;
3885 }
252b5132 3886 }
a7519a3c
RH
3887 else
3888 {
3889 unsigned long indx;
3890 struct alpha_elf_link_hash_entry *h;
252b5132 3891
a7519a3c
RH
3892 indx = r_symndx - symtab_hdr->sh_info;
3893 h = alpha_elf_sym_hashes (abfd)[indx];
3894 BFD_ASSERT (h != NULL);
252b5132 3895
a7519a3c
RH
3896 while (h->root.root.type == bfd_link_hash_indirect
3897 || h->root.root.type == bfd_link_hash_warning)
3898 h = (struct alpha_elf_link_hash_entry *)h->root.root.u.i.link;
252b5132 3899
a7519a3c
RH
3900 /* If the symbol is undefined, we can't do anything with it. */
3901 if (h->root.root.type == bfd_link_hash_undefined)
3902 continue;
252b5132 3903
a7519a3c
RH
3904 /* If the symbol isn't defined in the current module,
3905 again we can't do anything. */
3906 if (h->root.root.type == bfd_link_hash_undefweak)
3907 {
3908 info.tsec = bfd_abs_section_ptr;
3909 symval = 0;
3910 }
3911 else if (!h->root.def_regular)
3912 {
3913 /* Except for TLSGD relocs, which can sometimes be
3914 relaxed to GOTTPREL relocs. */
3915 if (r_type != R_ALPHA_TLSGD)
3916 continue;
3917 info.tsec = bfd_abs_section_ptr;
3918 symval = 0;
3919 }
3920 else
3921 {
3922 info.tsec = h->root.root.u.def.section;
3923 symval = h->root.root.u.def.value;
3924 }
252b5132 3925
a7519a3c
RH
3926 info.h = h;
3927 info.other = h->root.other;
3928 info.first_gotent = &h->got_entries;
3929 }
252b5132 3930
a7519a3c
RH
3931 /* Search for the got entry to be used by this relocation. */
3932 for (gotent = *info.first_gotent; gotent ; gotent = gotent->next)
3933 if (gotent->gotobj == info.gotobj
3934 && gotent->reloc_type == r_type
3935 && gotent->addend == irel->r_addend)
3936 break;
3937 info.gotent = gotent;
252b5132 3938
a7519a3c
RH
3939 symval += info.tsec->output_section->vma + info.tsec->output_offset;
3940 symval += irel->r_addend;
252b5132 3941
a7519a3c 3942 switch (r_type)
252b5132 3943 {
a7519a3c
RH
3944 case R_ALPHA_LITERAL:
3945 BFD_ASSERT(info.gotent != NULL);
252b5132 3946
a7519a3c
RH
3947 /* If there exist LITUSE relocations immediately following, this
3948 opens up all sorts of interesting optimizations, because we
3949 now know every location that this address load is used. */
3950 if (irel+1 < irelend
3951 && ELF64_R_TYPE (irel[1].r_info) == R_ALPHA_LITUSE)
252b5132 3952 {
a7519a3c
RH
3953 if (!elf64_alpha_relax_with_lituse (&info, symval, irel))
3954 goto error_return;
252b5132 3955 }
a7519a3c
RH
3956 else
3957 {
3958 if (!elf64_alpha_relax_got_load (&info, symval, irel, r_type))
3959 goto error_return;
3960 }
3961 break;
252b5132 3962
a7519a3c
RH
3963 case R_ALPHA_GOTDTPREL:
3964 case R_ALPHA_GOTTPREL:
3965 BFD_ASSERT(info.gotent != NULL);
3966 if (!elf64_alpha_relax_got_load (&info, symval, irel, r_type))
3967 goto error_return;
3968 break;
3969
3970 case R_ALPHA_TLSGD:
3971 case R_ALPHA_TLSLDM:
3972 BFD_ASSERT(info.gotent != NULL);
3973 if (!elf64_alpha_relax_tls_get_addr (&info, symval, irel,
3974 r_type == R_ALPHA_TLSGD))
3975 goto error_return;
3976 break;
252b5132
RH
3977 }
3978 }
3979
a7519a3c
RH
3980 if (isymbuf != NULL
3981 && symtab_hdr->contents != (unsigned char *) isymbuf)
3982 {
3983 if (!link_info->keep_memory)
3984 free (isymbuf);
3985 else
252b5132 3986 {
a7519a3c
RH
3987 /* Cache the symbols for elf_link_input_bfd. */
3988 symtab_hdr->contents = (unsigned char *) isymbuf;
252b5132 3989 }
a7519a3c 3990 }
252b5132 3991
a7519a3c
RH
3992 if (info.contents != NULL
3993 && elf_section_data (sec)->this_hdr.contents != info.contents)
3994 {
3995 if (!info.changed_contents && !link_info->keep_memory)
3996 free (info.contents);
3997 else
252b5132 3998 {
a7519a3c
RH
3999 /* Cache the section contents for elf_link_input_bfd. */
4000 elf_section_data (sec)->this_hdr.contents = info.contents;
252b5132 4001 }
a7519a3c 4002 }
252b5132 4003
a7519a3c
RH
4004 if (elf_section_data (sec)->relocs != internal_relocs)
4005 {
4006 if (!info.changed_relocs)
4007 free (internal_relocs);
4008 else
4009 elf_section_data (sec)->relocs = internal_relocs;
252b5132 4010 }
a7519a3c
RH
4011
4012 *again = info.changed_contents || info.changed_relocs;
252b5132 4013
b34976b6 4014 return TRUE;
252b5132 4015
a7519a3c 4016 error_return:
c9594989 4017 if (symtab_hdr->contents != (unsigned char *) isymbuf)
a7519a3c 4018 free (isymbuf);
c9594989 4019 if (elf_section_data (sec)->this_hdr.contents != info.contents)
a7519a3c 4020 free (info.contents);
c9594989 4021 if (elf_section_data (sec)->relocs != internal_relocs)
a7519a3c
RH
4022 free (internal_relocs);
4023 return FALSE;
4024}
4025\f
1bbc9cec
RH
4026/* Emit a dynamic relocation for (DYNINDX, RTYPE, ADDEND) at (SEC, OFFSET)
4027 into the next available slot in SREL. */
4028
4029static void
a7519a3c
RH
4030elf64_alpha_emit_dynrel (bfd *abfd, struct bfd_link_info *info,
4031 asection *sec, asection *srel, bfd_vma offset,
4032 long dynindx, long rtype, bfd_vma addend)
1bbc9cec
RH
4033{
4034 Elf_Internal_Rela outrel;
4035 bfd_byte *loc;
4036
4037 BFD_ASSERT (srel != NULL);
4038
4039 outrel.r_info = ELF64_R_INFO (dynindx, rtype);
4040 outrel.r_addend = addend;
4041
4042 offset = _bfd_elf_section_offset (abfd, info, sec, offset);
4043 if ((offset | 1) != (bfd_vma) -1)
4044 outrel.r_offset = sec->output_section->vma + sec->output_offset + offset;
4045 else
4046 memset (&outrel, 0, sizeof (outrel));
4047
4048 loc = srel->contents;
4049 loc += srel->reloc_count++ * sizeof (Elf64_External_Rela);
4050 bfd_elf64_swap_reloca_out (abfd, &outrel, loc);
eea6121a 4051 BFD_ASSERT (sizeof (Elf64_External_Rela) * srel->reloc_count <= srel->size);
1bbc9cec
RH
4052}
4053
4a67a098
RH
4054/* Relocate an Alpha ELF section for a relocatable link.
4055
4056 We don't have to change anything unless the reloc is against a section
4057 symbol, in which case we have to adjust according to where the section
4058 symbol winds up in the output section. */
4059
b34976b6 4060static bfd_boolean
a7519a3c
RH
4061elf64_alpha_relocate_section_r (bfd *output_bfd ATTRIBUTE_UNUSED,
4062 struct bfd_link_info *info ATTRIBUTE_UNUSED,
4063 bfd *input_bfd, asection *input_section,
4064 bfd_byte *contents ATTRIBUTE_UNUSED,
4065 Elf_Internal_Rela *relocs,
4066 Elf_Internal_Sym *local_syms,
4067 asection **local_sections)
4a67a098
RH
4068{
4069 unsigned long symtab_hdr_sh_info;
4070 Elf_Internal_Rela *rel;
4071 Elf_Internal_Rela *relend;
ab96bf03 4072 struct elf_link_hash_entry **sym_hashes;
b34976b6 4073 bfd_boolean ret_val = TRUE;
4a67a098 4074
0ffa91dd 4075 symtab_hdr_sh_info = elf_symtab_hdr (input_bfd).sh_info;
ab96bf03 4076 sym_hashes = elf_sym_hashes (input_bfd);
4a67a098
RH
4077
4078 relend = relocs + input_section->reloc_count;
4079 for (rel = relocs; rel < relend; rel++)
4080 {
4081 unsigned long r_symndx;
4082 Elf_Internal_Sym *sym;
4083 asection *sec;
4084 unsigned long r_type;
4085
ab96bf03 4086 r_type = ELF64_R_TYPE (rel->r_info);
4a67a098
RH
4087 if (r_type >= R_ALPHA_max)
4088 {
4eca0228 4089 _bfd_error_handler
695344c0 4090 /* xgettext:c-format */
0aa13fee 4091 (_("%pB: unsupported relocation type %#x"),
d003868e 4092 input_bfd, (int) r_type);
4a67a098 4093 bfd_set_error (bfd_error_bad_value);
b34976b6 4094 ret_val = FALSE;
4a67a098
RH
4095 continue;
4096 }
4097
4a67a098
RH
4098 /* The symbol associated with GPDISP and LITUSE is
4099 immaterial. Only the addend is significant. */
4100 if (r_type == R_ALPHA_GPDISP || r_type == R_ALPHA_LITUSE)
4101 continue;
4102
ab96bf03 4103 r_symndx = ELF64_R_SYM (rel->r_info);
4a67a098
RH
4104 if (r_symndx < symtab_hdr_sh_info)
4105 {
4106 sym = local_syms + r_symndx;
ab96bf03 4107 sec = local_sections[r_symndx];
4a67a098 4108 }
ab96bf03
AM
4109 else
4110 {
4111 struct elf_link_hash_entry *h;
4112
4113 h = sym_hashes[r_symndx - symtab_hdr_sh_info];
4114
4115 while (h->root.type == bfd_link_hash_indirect
4116 || h->root.type == bfd_link_hash_warning)
4117 h = (struct elf_link_hash_entry *) h->root.u.i.link;
4118
4119 if (h->root.type != bfd_link_hash_defined
4120 && h->root.type != bfd_link_hash_defweak)
4121 continue;
4122
4123 sym = NULL;
4124 sec = h->root.u.def.section;
4125 }
4126
dbaa2011 4127 if (sec != NULL && discarded_section (sec))
e4067dbb 4128 RELOC_AGAINST_DISCARDED_SECTION (info, input_bfd, input_section,
545fd46b
MR
4129 rel, 1, relend,
4130 elf64_alpha_howto_table + r_type, 0,
e4067dbb 4131 contents);
ab96bf03
AM
4132
4133 if (sym != NULL && ELF_ST_TYPE (sym->st_info) == STT_SECTION)
4134 rel->r_addend += sec->output_offset;
4a67a098
RH
4135 }
4136
4137 return ret_val;
4138}
4139
252b5132
RH
4140/* Relocate an Alpha ELF section. */
4141
b34976b6 4142static bfd_boolean
a7519a3c
RH
4143elf64_alpha_relocate_section (bfd *output_bfd, struct bfd_link_info *info,
4144 bfd *input_bfd, asection *input_section,
4145 bfd_byte *contents, Elf_Internal_Rela *relocs,
4146 Elf_Internal_Sym *local_syms,
4147 asection **local_sections)
252b5132 4148{
4a67a098 4149 Elf_Internal_Shdr *symtab_hdr;
252b5132
RH
4150 Elf_Internal_Rela *rel;
4151 Elf_Internal_Rela *relend;
4a67a098
RH
4152 asection *sgot, *srel, *srelgot;
4153 bfd *dynobj, *gotobj;
4154 bfd_vma gp, tp_base, dtp_base;
4155 struct alpha_elf_got_entry **local_got_entries;
b34976b6 4156 bfd_boolean ret_val;
252b5132 4157
0ffa91dd 4158 BFD_ASSERT (is_alpha_elf (input_bfd));
68ffbac6 4159
4a67a098 4160 /* Handle relocatable links with a smaller loop. */
0e1862bb 4161 if (bfd_link_relocatable (info))
4a67a098
RH
4162 return elf64_alpha_relocate_section_r (output_bfd, info, input_bfd,
4163 input_section, contents, relocs,
4164 local_syms, local_sections);
4165
4166 /* This is a final link. */
4167
b34976b6 4168 ret_val = TRUE;
252b5132 4169
0ffa91dd 4170 symtab_hdr = &elf_symtab_hdr (input_bfd);
3765b1be 4171
4a67a098 4172 dynobj = elf_hash_table (info)->dynobj;
ce558b89 4173 srelgot = elf_hash_table (info)->srelgot;
4a67a098 4174
3241278a
RH
4175 if (input_section->flags & SEC_ALLOC)
4176 {
4177 const char *section_name;
4178 section_name = (bfd_elf_string_from_elf_section
4179 (input_bfd, elf_elfheader(input_bfd)->e_shstrndx,
d4730f92 4180 _bfd_elf_single_rel_hdr (input_section)->sh_name));
3241278a 4181 BFD_ASSERT(section_name != NULL);
3d4d4302 4182 srel = bfd_get_linker_section (dynobj, section_name);
3241278a
RH
4183 }
4184 else
4185 srel = NULL;
3765b1be 4186
4a67a098
RH
4187 /* Find the gp value for this input bfd. */
4188 gotobj = alpha_elf_tdata (input_bfd)->gotobj;
4189 if (gotobj)
4190 {
4191 sgot = alpha_elf_tdata (gotobj)->got;
4192 gp = _bfd_get_gp_value (gotobj);
4193 if (gp == 0)
252b5132 4194 {
4a67a098
RH
4195 gp = (sgot->output_section->vma
4196 + sgot->output_offset
4197 + 0x8000);
4198 _bfd_set_gp_value (gotobj, gp);
4199 }
4200 }
4201 else
4202 {
4203 sgot = NULL;
4204 gp = 0;
4205 }
3765b1be 4206
4a67a098
RH
4207 local_got_entries = alpha_elf_tdata(input_bfd)->local_got_entries;
4208
e1918d23 4209 if (elf_hash_table (info)->tls_sec != NULL)
4a67a098 4210 {
e1918d23
AM
4211 dtp_base = alpha_get_dtprel_base (info);
4212 tp_base = alpha_get_tprel_base (info);
252b5132 4213 }
4a67a098
RH
4214 else
4215 dtp_base = tp_base = 0;
252b5132 4216
252b5132 4217 relend = relocs + input_section->reloc_count;
4a67a098 4218 for (rel = relocs; rel < relend; rel++)
252b5132 4219 {
4a67a098 4220 struct alpha_elf_link_hash_entry *h = NULL;
3765b1be
RH
4221 struct alpha_elf_got_entry *gotent;
4222 bfd_reloc_status_type r;
252b5132
RH
4223 reloc_howto_type *howto;
4224 unsigned long r_symndx;
4a67a098
RH
4225 Elf_Internal_Sym *sym = NULL;
4226 asection *sec = NULL;
3765b1be 4227 bfd_vma value;
dc810e39 4228 bfd_vma addend;
b34976b6 4229 bfd_boolean dynamic_symbol_p;
1d5316ab 4230 bfd_boolean unresolved_reloc = FALSE;
b34976b6 4231 bfd_boolean undef_weak_ref = FALSE;
3765b1be 4232 unsigned long r_type;
252b5132
RH
4233
4234 r_type = ELF64_R_TYPE(rel->r_info);
3765b1be 4235 if (r_type >= R_ALPHA_max)
252b5132 4236 {
4eca0228 4237 _bfd_error_handler
695344c0 4238 /* xgettext:c-format */
0aa13fee 4239 (_("%pB: unsupported relocation type %#x"),
d003868e 4240 input_bfd, (int) r_type);
252b5132 4241 bfd_set_error (bfd_error_bad_value);
b34976b6 4242 ret_val = FALSE;
3765b1be 4243 continue;
252b5132 4244 }
252b5132 4245
3765b1be 4246 howto = elf64_alpha_howto_table + r_type;
252b5132
RH
4247 r_symndx = ELF64_R_SYM(rel->r_info);
4248
cc03ec80 4249 /* The symbol for a TLSLDM reloc is ignored. Collapse the
cf35638d 4250 reloc to the STN_UNDEF (0) symbol so that they all match. */
cc03ec80 4251 if (r_type == R_ALPHA_TLSLDM)
cf35638d 4252 r_symndx = STN_UNDEF;
cc03ec80 4253
252b5132
RH
4254 if (r_symndx < symtab_hdr->sh_info)
4255 {
8517fae7 4256 asection *msec;
252b5132
RH
4257 sym = local_syms + r_symndx;
4258 sec = local_sections[r_symndx];
8517fae7
AM
4259 msec = sec;
4260 value = _bfd_elf_rela_local_sym (output_bfd, sym, &msec, rel);
3765b1be 4261
cf35638d 4262 /* If this is a tp-relative relocation against sym STN_UNDEF (0),
cc03ec80 4263 this is hackery from relax_section. Force the value to
f915360b 4264 be the tls module base. */
cf35638d 4265 if (r_symndx == STN_UNDEF
cc03ec80
RH
4266 && (r_type == R_ALPHA_TLSLDM
4267 || r_type == R_ALPHA_GOTTPREL
4268 || r_type == R_ALPHA_TPREL64
4269 || r_type == R_ALPHA_TPRELHI
4270 || r_type == R_ALPHA_TPRELLO
4271 || r_type == R_ALPHA_TPREL16))
f915360b 4272 value = dtp_base;
cc03ec80 4273
4a67a098
RH
4274 if (local_got_entries)
4275 gotent = local_got_entries[r_symndx];
4276 else
4277 gotent = NULL;
3765b1be
RH
4278
4279 /* Need to adjust local GOT entries' addends for SEC_MERGE
4280 unless it has been done already. */
4281 if ((sec->flags & SEC_MERGE)
048d873d 4282 && ELF_ST_TYPE (sym->st_info) == STT_SECTION
dbaa2011 4283 && sec->sec_info_type == SEC_INFO_TYPE_MERGE
048d873d
RH
4284 && gotent
4285 && !gotent->reloc_xlated)
3765b1be
RH
4286 {
4287 struct alpha_elf_got_entry *ent;
3765b1be
RH
4288
4289 for (ent = gotent; ent; ent = ent->next)
4290 {
4291 ent->reloc_xlated = 1;
4292 if (ent->use_count == 0)
4293 continue;
4294 msec = sec;
4295 ent->addend =
4296 _bfd_merged_section_offset (output_bfd, &msec,
4297 elf_section_data (sec)->
4298 sec_info,
753731ee 4299 sym->st_value + ent->addend);
3765b1be
RH
4300 ent->addend -= sym->st_value;
4301 ent->addend += msec->output_section->vma
4302 + msec->output_offset
4303 - sec->output_section->vma
4304 - sec->output_offset;
4305 }
4306 }
4307
b34976b6 4308 dynamic_symbol_p = FALSE;
252b5132
RH
4309 }
4310 else
4311 {
62d887d4 4312 bfd_boolean warned, ignored;
560e09e9 4313 struct elf_link_hash_entry *hh;
b2a8e766
AM
4314 struct elf_link_hash_entry **sym_hashes = elf_sym_hashes (input_bfd);
4315
4316 RELOC_FOR_GLOBAL_SYMBOL (info, input_bfd, input_section, rel,
4317 r_symndx, symtab_hdr, sym_hashes,
4318 hh, sec, value,
62d887d4 4319 unresolved_reloc, warned, ignored);
560e09e9
NC
4320
4321 if (warned)
4322 continue;
252b5132 4323
560e09e9
NC
4324 if (value == 0
4325 && ! unresolved_reloc
4326 && hh->root.type == bfd_link_hash_undefweak)
b34976b6 4327 undef_weak_ref = TRUE;
3765b1be 4328
560e09e9 4329 h = (struct alpha_elf_link_hash_entry *) hh;
07d6d2b8 4330 dynamic_symbol_p = alpha_elf_dynamic_symbol_p (&h->root, info);
3765b1be 4331 gotent = h->got_entries;
252b5132 4332 }
3765b1be 4333
dbaa2011 4334 if (sec != NULL && discarded_section (sec))
e4067dbb 4335 RELOC_AGAINST_DISCARDED_SECTION (info, input_bfd, input_section,
545fd46b 4336 rel, 1, relend, howto, 0, contents);
ab96bf03 4337
252b5132 4338 addend = rel->r_addend;
3765b1be
RH
4339 value += addend;
4340
4341 /* Search for the proper got entry. */
4342 for (; gotent ; gotent = gotent->next)
4343 if (gotent->gotobj == gotobj
4344 && gotent->reloc_type == r_type
4345 && gotent->addend == addend)
4346 break;
252b5132
RH
4347
4348 switch (r_type)
4349 {
4350 case R_ALPHA_GPDISP:
4351 {
4352 bfd_byte *p_ldah, *p_lda;
4353
4354 BFD_ASSERT(gp != 0);
4355
3765b1be
RH
4356 value = (input_section->output_section->vma
4357 + input_section->output_offset
4358 + rel->r_offset);
252b5132 4359
3765b1be 4360 p_ldah = contents + rel->r_offset;
252b5132
RH
4361 p_lda = p_ldah + rel->r_addend;
4362
3765b1be 4363 r = elf64_alpha_do_reloc_gpdisp (input_bfd, gp - value,
252b5132
RH
4364 p_ldah, p_lda);
4365 }
4366 break;
4367
252b5132 4368 case R_ALPHA_LITERAL:
3765b1be
RH
4369 BFD_ASSERT(sgot != NULL);
4370 BFD_ASSERT(gp != 0);
4371 BFD_ASSERT(gotent != NULL);
4372 BFD_ASSERT(gotent->use_count >= 1);
f7460f5f 4373
3765b1be
RH
4374 if (!gotent->reloc_done)
4375 {
4376 gotent->reloc_done = 1;
252b5132 4377
3765b1be
RH
4378 bfd_put_64 (output_bfd, value,
4379 sgot->contents + gotent->got_offset);
252b5132 4380
3765b1be
RH
4381 /* If the symbol has been forced local, output a
4382 RELATIVE reloc, otherwise it will be handled in
4383 finish_dynamic_symbol. */
0e1862bb
L
4384 if (bfd_link_pic (info)
4385 && !dynamic_symbol_p
4386 && !undef_weak_ref)
1bbc9cec
RH
4387 elf64_alpha_emit_dynrel (output_bfd, info, sgot, srelgot,
4388 gotent->got_offset, 0,
4389 R_ALPHA_RELATIVE, value);
3765b1be 4390 }
252b5132 4391
3765b1be
RH
4392 value = (sgot->output_section->vma
4393 + sgot->output_offset
4394 + gotent->got_offset);
4395 value -= gp;
252b5132
RH
4396 goto default_reloc;
4397
4398 case R_ALPHA_GPREL32:
ec1659c8 4399 case R_ALPHA_GPREL16:
252b5132 4400 case R_ALPHA_GPRELLOW:
3765b1be 4401 if (dynamic_symbol_p)
07d6d2b8 4402 {
4eca0228 4403 _bfd_error_handler
695344c0 4404 /* xgettext:c-format */
871b3ab2 4405 (_("%pB: gp-relative relocation against dynamic symbol %s"),
07d6d2b8
AM
4406 input_bfd, h->root.root.root.string);
4407 ret_val = FALSE;
4408 }
252b5132 4409 BFD_ASSERT(gp != 0);
3765b1be 4410 value -= gp;
252b5132
RH
4411 goto default_reloc;
4412
4413 case R_ALPHA_GPRELHIGH:
3765b1be 4414 if (dynamic_symbol_p)
07d6d2b8 4415 {
4eca0228 4416 _bfd_error_handler
695344c0 4417 /* xgettext:c-format */
871b3ab2 4418 (_("%pB: gp-relative relocation against dynamic symbol %s"),
07d6d2b8
AM
4419 input_bfd, h->root.root.root.string);
4420 ret_val = FALSE;
4421 }
252b5132 4422 BFD_ASSERT(gp != 0);
3765b1be
RH
4423 value -= gp;
4424 value = ((bfd_signed_vma) value >> 16) + ((value >> 15) & 1);
252b5132
RH
4425 goto default_reloc;
4426
252b5132 4427 case R_ALPHA_HINT:
f94952df
RH
4428 /* A call to a dynamic symbol is definitely out of range of
4429 the 16-bit displacement. Don't bother writing anything. */
3765b1be 4430 if (dynamic_symbol_p)
f94952df
RH
4431 {
4432 r = bfd_reloc_ok;
4433 break;
4434 }
3765b1be
RH
4435 /* The regular PC-relative stuff measures from the start of
4436 the instruction rather than the end. */
4437 value -= 4;
4438 goto default_reloc;
f94952df
RH
4439
4440 case R_ALPHA_BRADDR:
3765b1be 4441 if (dynamic_symbol_p)
07d6d2b8 4442 {
4eca0228 4443 _bfd_error_handler
695344c0 4444 /* xgettext:c-format */
871b3ab2 4445 (_("%pB: pc-relative relocation against dynamic symbol %s"),
07d6d2b8
AM
4446 input_bfd, h->root.root.root.string);
4447 ret_val = FALSE;
4448 }
252b5132
RH
4449 /* The regular PC-relative stuff measures from the start of
4450 the instruction rather than the end. */
3765b1be 4451 value -= 4;
252b5132
RH
4452 goto default_reloc;
4453
7793f4d0
RH
4454 case R_ALPHA_BRSGP:
4455 {
4456 int other;
4457 const char *name;
4458
4459 /* The regular PC-relative stuff measures from the start of
4460 the instruction rather than the end. */
3765b1be 4461 value -= 4;
7793f4d0 4462
ccf00ab6
RH
4463 /* The source and destination gp must be the same. Note that
4464 the source will always have an assigned gp, since we forced
4465 one in check_relocs, but that the destination may not, as
cedb70c5 4466 it might not have had any relocations at all. Also take
ccf00ab6
RH
4467 care not to crash if H is an undefined symbol. */
4468 if (h != NULL && sec != NULL
4469 && alpha_elf_tdata (sec->owner)->gotobj
7793f4d0
RH
4470 && gotobj != alpha_elf_tdata (sec->owner)->gotobj)
4471 {
4eca0228 4472 _bfd_error_handler
695344c0 4473 /* xgettext:c-format */
871b3ab2 4474 (_("%pB: change in gp: BRSGP %s"),
d003868e 4475 input_bfd, h->root.root.root.string);
b34976b6 4476 ret_val = FALSE;
7793f4d0
RH
4477 }
4478
4479 /* The symbol should be marked either NOPV or STD_GPLOAD. */
4480 if (h != NULL)
4481 other = h->root.other;
4482 else
4483 other = sym->st_other;
4484 switch (other & STO_ALPHA_STD_GPLOAD)
4485 {
4486 case STO_ALPHA_NOPV:
07d6d2b8 4487 break;
7793f4d0 4488 case STO_ALPHA_STD_GPLOAD:
64e04ecd 4489 value += 8;
7793f4d0
RH
4490 break;
4491 default:
4492 if (h != NULL)
4493 name = h->root.root.root.string;
4494 else
4495 {
4496 name = (bfd_elf_string_from_elf_section
4497 (input_bfd, symtab_hdr->sh_link, sym->st_name));
4498 if (name == NULL)
4499 name = _("<unknown>");
4500 else if (name[0] == 0)
fd361982 4501 name = bfd_section_name (sec);
7793f4d0 4502 }
4eca0228 4503 _bfd_error_handler
695344c0 4504 /* xgettext:c-format */
871b3ab2 4505 (_("%pB: !samegp reloc against symbol without .prologue: %s"),
d003868e 4506 input_bfd, name);
b34976b6 4507 ret_val = FALSE;
7793f4d0
RH
4508 break;
4509 }
4510
4511 goto default_reloc;
4512 }
4513
252b5132
RH
4514 case R_ALPHA_REFLONG:
4515 case R_ALPHA_REFQUAD:
3765b1be
RH
4516 case R_ALPHA_DTPREL64:
4517 case R_ALPHA_TPREL64:
252b5132 4518 {
1bbc9cec
RH
4519 long dynindx, dyntype = r_type;
4520 bfd_vma dynaddend;
252b5132
RH
4521
4522 /* Careful here to remember RELATIVE relocations for global
4523 variables for symbolic shared objects. */
4524
3765b1be 4525 if (dynamic_symbol_p)
252b5132
RH
4526 {
4527 BFD_ASSERT(h->root.dynindx != -1);
1bbc9cec
RH
4528 dynindx = h->root.dynindx;
4529 dynaddend = addend;
3765b1be
RH
4530 addend = 0, value = 0;
4531 }
4532 else if (r_type == R_ALPHA_DTPREL64)
4533 {
e1918d23 4534 BFD_ASSERT (elf_hash_table (info)->tls_sec != NULL);
3765b1be
RH
4535 value -= dtp_base;
4536 goto default_reloc;
4537 }
4538 else if (r_type == R_ALPHA_TPREL64)
4539 {
e1918d23 4540 BFD_ASSERT (elf_hash_table (info)->tls_sec != NULL);
3cbc1e5e 4541 if (!bfd_link_dll (info))
1bbc9cec
RH
4542 {
4543 value -= tp_base;
4544 goto default_reloc;
4545 }
4546 dynindx = 0;
4547 dynaddend = value - dtp_base;
252b5132 4548 }
0e1862bb 4549 else if (bfd_link_pic (info)
cf35638d 4550 && r_symndx != STN_UNDEF
d6ad34f6 4551 && (input_section->flags & SEC_ALLOC)
1d5316ab
AM
4552 && !undef_weak_ref
4553 && !(unresolved_reloc
4554 && (_bfd_elf_section_offset (output_bfd, info,
4555 input_section,
4556 rel->r_offset)
4557 == (bfd_vma) -1)))
252b5132 4558 {
3765b1be
RH
4559 if (r_type == R_ALPHA_REFLONG)
4560 {
4eca0228 4561 _bfd_error_handler
695344c0 4562 /* xgettext:c-format */
871b3ab2 4563 (_("%pB: unhandled dynamic relocation against %s"),
d003868e 4564 input_bfd,
3765b1be 4565 h->root.root.root.string);
b34976b6 4566 ret_val = FALSE;
3765b1be 4567 }
1bbc9cec
RH
4568 dynindx = 0;
4569 dyntype = R_ALPHA_RELATIVE;
4570 dynaddend = value;
252b5132
RH
4571 }
4572 else
4573 goto default_reloc;
4574
3241278a
RH
4575 if (input_section->flags & SEC_ALLOC)
4576 elf64_alpha_emit_dynrel (output_bfd, info, input_section,
4577 srel, rel->r_offset, dynindx,
4578 dyntype, dynaddend);
252b5132
RH
4579 }
4580 goto default_reloc;
4581
3765b1be 4582 case R_ALPHA_SREL16:
84de6048
RH
4583 case R_ALPHA_SREL32:
4584 case R_ALPHA_SREL64:
3765b1be 4585 if (dynamic_symbol_p)
07d6d2b8 4586 {
4eca0228 4587 _bfd_error_handler
695344c0 4588 /* xgettext:c-format */
871b3ab2 4589 (_("%pB: pc-relative relocation against dynamic symbol %s"),
07d6d2b8
AM
4590 input_bfd, h->root.root.root.string);
4591 ret_val = FALSE;
4592 }
3cbc1e5e 4593 else if (bfd_link_pic (info)
0e1862bb 4594 && undef_weak_ref)
07d6d2b8 4595 {
4eca0228 4596 _bfd_error_handler
695344c0 4597 /* xgettext:c-format */
871b3ab2 4598 (_("%pB: pc-relative relocation against undefined weak symbol %s"),
07d6d2b8
AM
4599 input_bfd, h->root.root.root.string);
4600 ret_val = FALSE;
4601 }
d6ad34f6 4602
3765b1be 4603
84de6048
RH
4604 /* ??? .eh_frame references to discarded sections will be smashed
4605 to relocations against SHN_UNDEF. The .eh_frame format allows
4606 NULL to be encoded as 0 in any format, so this works here. */
1d5316ab
AM
4607 if (r_symndx == STN_UNDEF
4608 || (unresolved_reloc
4609 && _bfd_elf_section_offset (output_bfd, info,
4610 input_section,
4611 rel->r_offset) == (bfd_vma) -1))
84de6048
RH
4612 howto = (elf64_alpha_howto_table
4613 + (r_type - R_ALPHA_SREL32 + R_ALPHA_REFLONG));
4614 goto default_reloc;
4615
3765b1be
RH
4616 case R_ALPHA_TLSLDM:
4617 /* Ignore the symbol for the relocation. The result is always
4618 the current module. */
4619 dynamic_symbol_p = 0;
4620 /* FALLTHRU */
4621
4622 case R_ALPHA_TLSGD:
4623 if (!gotent->reloc_done)
4624 {
4625 gotent->reloc_done = 1;
4626
4627 /* Note that the module index for the main program is 1. */
0e1862bb
L
4628 bfd_put_64 (output_bfd,
4629 !bfd_link_pic (info) && !dynamic_symbol_p,
3765b1be
RH
4630 sgot->contents + gotent->got_offset);
4631
4632 /* If the symbol has been forced local, output a
4633 DTPMOD64 reloc, otherwise it will be handled in
4634 finish_dynamic_symbol. */
0e1862bb 4635 if (bfd_link_pic (info) && !dynamic_symbol_p)
1bbc9cec
RH
4636 elf64_alpha_emit_dynrel (output_bfd, info, sgot, srelgot,
4637 gotent->got_offset, 0,
4638 R_ALPHA_DTPMOD64, 0);
3765b1be
RH
4639
4640 if (dynamic_symbol_p || r_type == R_ALPHA_TLSLDM)
4641 value = 0;
4642 else
4643 {
e1918d23 4644 BFD_ASSERT (elf_hash_table (info)->tls_sec != NULL);
07d6d2b8 4645 value -= dtp_base;
3765b1be
RH
4646 }
4647 bfd_put_64 (output_bfd, value,
4648 sgot->contents + gotent->got_offset + 8);
4649 }
4650
4651 value = (sgot->output_section->vma
4652 + sgot->output_offset
4653 + gotent->got_offset);
4654 value -= gp;
4655 goto default_reloc;
4656
4657 case R_ALPHA_DTPRELHI:
4658 case R_ALPHA_DTPRELLO:
4659 case R_ALPHA_DTPREL16:
4660 if (dynamic_symbol_p)
07d6d2b8 4661 {
4eca0228 4662 _bfd_error_handler
695344c0 4663 /* xgettext:c-format */
871b3ab2 4664 (_("%pB: dtp-relative relocation against dynamic symbol %s"),
07d6d2b8
AM
4665 input_bfd, h->root.root.root.string);
4666 ret_val = FALSE;
4667 }
e1918d23 4668 BFD_ASSERT (elf_hash_table (info)->tls_sec != NULL);
3765b1be 4669 value -= dtp_base;
9e756d64
RH
4670 if (r_type == R_ALPHA_DTPRELHI)
4671 value = ((bfd_signed_vma) value >> 16) + ((value >> 15) & 1);
3765b1be
RH
4672 goto default_reloc;
4673
4674 case R_ALPHA_TPRELHI:
4675 case R_ALPHA_TPRELLO:
4676 case R_ALPHA_TPREL16:
3cbc1e5e 4677 if (bfd_link_dll (info))
9e756d64 4678 {
4eca0228 4679 _bfd_error_handler
695344c0 4680 /* xgettext:c-format */
871b3ab2 4681 (_("%pB: TLS local exec code cannot be linked into shared objects"),
d003868e 4682 input_bfd);
07d6d2b8 4683 ret_val = FALSE;
9e756d64
RH
4684 }
4685 else if (dynamic_symbol_p)
07d6d2b8 4686 {
4eca0228 4687 _bfd_error_handler
695344c0 4688 /* xgettext:c-format */
871b3ab2 4689 (_("%pB: tp-relative relocation against dynamic symbol %s"),
07d6d2b8
AM
4690 input_bfd, h->root.root.root.string);
4691 ret_val = FALSE;
4692 }
e1918d23 4693 BFD_ASSERT (elf_hash_table (info)->tls_sec != NULL);
3765b1be 4694 value -= tp_base;
9e756d64
RH
4695 if (r_type == R_ALPHA_TPRELHI)
4696 value = ((bfd_signed_vma) value >> 16) + ((value >> 15) & 1);
3765b1be
RH
4697 goto default_reloc;
4698
4699 case R_ALPHA_GOTDTPREL:
4700 case R_ALPHA_GOTTPREL:
4701 BFD_ASSERT(sgot != NULL);
4702 BFD_ASSERT(gp != 0);
4703 BFD_ASSERT(gotent != NULL);
4704 BFD_ASSERT(gotent->use_count >= 1);
4705
4706 if (!gotent->reloc_done)
4707 {
4708 gotent->reloc_done = 1;
4709
4710 if (dynamic_symbol_p)
4711 value = 0;
4712 else
4713 {
e1918d23 4714 BFD_ASSERT (elf_hash_table (info)->tls_sec != NULL);
1bbc9cec
RH
4715 if (r_type == R_ALPHA_GOTDTPREL)
4716 value -= dtp_base;
28fbeab8 4717 else if (bfd_link_executable (info))
1bbc9cec
RH
4718 value -= tp_base;
4719 else
4720 {
4721 elf64_alpha_emit_dynrel (output_bfd, info, sgot, srelgot,
4722 gotent->got_offset, 0,
4723 R_ALPHA_TPREL64,
4724 value - dtp_base);
4725 value = 0;
4726 }
3765b1be
RH
4727 }
4728 bfd_put_64 (output_bfd, value,
4729 sgot->contents + gotent->got_offset);
4730 }
4731
4732 value = (sgot->output_section->vma
4733 + sgot->output_offset
4734 + gotent->got_offset);
4735 value -= gp;
4736 goto default_reloc;
4737
252b5132
RH
4738 default:
4739 default_reloc:
4740 r = _bfd_final_link_relocate (howto, input_bfd, input_section,
3765b1be 4741 contents, rel->r_offset, value, 0);
252b5132
RH
4742 break;
4743 }
4744
4745 switch (r)
4746 {
4747 case bfd_reloc_ok:
4748 break;
4749
4750 case bfd_reloc_overflow:
4751 {
4752 const char *name;
4753
ed4de5e2
JJ
4754 /* Don't warn if the overflow is due to pc relative reloc
4755 against discarded section. Section optimization code should
4756 handle it. */
4757
4758 if (r_symndx < symtab_hdr->sh_info
4759 && sec != NULL && howto->pc_relative
dbaa2011 4760 && discarded_section (sec))
ed4de5e2
JJ
4761 break;
4762
252b5132 4763 if (h != NULL)
dfeffb9f 4764 name = NULL;
252b5132
RH
4765 else
4766 {
4767 name = (bfd_elf_string_from_elf_section
4768 (input_bfd, symtab_hdr->sh_link, sym->st_name));
4769 if (name == NULL)
b34976b6 4770 return FALSE;
252b5132 4771 if (*name == '\0')
fd361982 4772 name = bfd_section_name (sec);
252b5132 4773 }
1a72702b
AM
4774 (*info->callbacks->reloc_overflow)
4775 (info, (h ? &h->root.root : NULL), name, howto->name,
4776 (bfd_vma) 0, input_bfd, input_section, rel->r_offset);
252b5132
RH
4777 }
4778 break;
4779
4780 default:
4781 case bfd_reloc_outofrange:
4782 abort ();
4783 }
4784 }
4785
f16fbd61 4786 return ret_val;
252b5132
RH
4787}
4788
4789/* Finish up dynamic symbol handling. We set the contents of various
4790 dynamic sections here. */
4791
b34976b6 4792static bfd_boolean
a7519a3c
RH
4793elf64_alpha_finish_dynamic_symbol (bfd *output_bfd, struct bfd_link_info *info,
4794 struct elf_link_hash_entry *h,
4795 Elf_Internal_Sym *sym)
252b5132 4796{
6ec7057a 4797 struct alpha_elf_link_hash_entry *ah = (struct alpha_elf_link_hash_entry *)h;
252b5132 4798
6ec7057a 4799 if (h->needs_plt)
252b5132
RH
4800 {
4801 /* Fill in the .plt entry for this symbol. */
4802 asection *splt, *sgot, *srel;
4803 Elf_Internal_Rela outrel;
947216bf 4804 bfd_byte *loc;
252b5132
RH
4805 bfd_vma got_addr, plt_addr;
4806 bfd_vma plt_index;
4807 struct alpha_elf_got_entry *gotent;
4808
4809 BFD_ASSERT (h->dynindx != -1);
4810
ce558b89 4811 splt = elf_hash_table (info)->splt;
252b5132 4812 BFD_ASSERT (splt != NULL);
ce558b89 4813 srel = elf_hash_table (info)->srelplt;
252b5132 4814 BFD_ASSERT (srel != NULL);
252b5132 4815
6ec7057a
RH
4816 for (gotent = ah->got_entries; gotent ; gotent = gotent->next)
4817 if (gotent->reloc_type == R_ALPHA_LITERAL
4818 && gotent->use_count > 0)
4819 {
4820 unsigned int insn;
4821 int disp;
252b5132 4822
6ec7057a
RH
4823 sgot = alpha_elf_tdata (gotent->gotobj)->got;
4824 BFD_ASSERT (sgot != NULL);
252b5132 4825
6ec7057a
RH
4826 BFD_ASSERT (gotent->got_offset != -1);
4827 BFD_ASSERT (gotent->plt_offset != -1);
252b5132 4828
6ec7057a
RH
4829 got_addr = (sgot->output_section->vma
4830 + sgot->output_offset
4831 + gotent->got_offset);
4832 plt_addr = (splt->output_section->vma
4833 + splt->output_offset
4834 + gotent->plt_offset);
252b5132 4835
6ec7057a 4836 plt_index = (gotent->plt_offset-PLT_HEADER_SIZE) / PLT_ENTRY_SIZE;
252b5132 4837
6ec7057a
RH
4838 /* Fill in the entry in the procedure linkage table. */
4839 if (elf64_alpha_use_secureplt)
4840 {
4841 disp = (PLT_HEADER_SIZE - 4) - (gotent->plt_offset + 4);
4842 insn = INSN_AD (INSN_BR, 31, disp);
4843 bfd_put_32 (output_bfd, insn,
4844 splt->contents + gotent->plt_offset);
252b5132 4845
6ec7057a
RH
4846 plt_index = ((gotent->plt_offset - NEW_PLT_HEADER_SIZE)
4847 / NEW_PLT_ENTRY_SIZE);
4848 }
4849 else
4850 {
4851 disp = -(gotent->plt_offset + 4);
4852 insn = INSN_AD (INSN_BR, 28, disp);
4853 bfd_put_32 (output_bfd, insn,
4854 splt->contents + gotent->plt_offset);
4855 bfd_put_32 (output_bfd, INSN_UNOP,
4856 splt->contents + gotent->plt_offset + 4);
4857 bfd_put_32 (output_bfd, INSN_UNOP,
4858 splt->contents + gotent->plt_offset + 8);
4859
4860 plt_index = ((gotent->plt_offset - OLD_PLT_HEADER_SIZE)
4861 / OLD_PLT_ENTRY_SIZE);
4862 }
252b5132 4863
6ec7057a
RH
4864 /* Fill in the entry in the .rela.plt section. */
4865 outrel.r_offset = got_addr;
4866 outrel.r_info = ELF64_R_INFO(h->dynindx, R_ALPHA_JMP_SLOT);
4867 outrel.r_addend = 0;
252b5132 4868
6ec7057a
RH
4869 loc = srel->contents + plt_index * sizeof (Elf64_External_Rela);
4870 bfd_elf64_swap_reloca_out (output_bfd, &outrel, loc);
252b5132 4871
6ec7057a
RH
4872 /* Fill in the entry in the .got. */
4873 bfd_put_64 (output_bfd, plt_addr,
4874 sgot->contents + gotent->got_offset);
4875 }
252b5132
RH
4876 }
4877 else if (alpha_elf_dynamic_symbol_p (h, info))
4878 {
4879 /* Fill in the dynamic relocations for this symbol's .got entries. */
4880 asection *srel;
252b5132
RH
4881 struct alpha_elf_got_entry *gotent;
4882
ce558b89 4883 srel = elf_hash_table (info)->srelgot;
252b5132
RH
4884 BFD_ASSERT (srel != NULL);
4885
252b5132
RH
4886 for (gotent = ((struct alpha_elf_link_hash_entry *) h)->got_entries;
4887 gotent != NULL;
4888 gotent = gotent->next)
4889 {
f44f99a5 4890 asection *sgot;
1bbc9cec 4891 long r_type;
3765b1be 4892
f44f99a5
RH
4893 if (gotent->use_count == 0)
4894 continue;
4895
4896 sgot = alpha_elf_tdata (gotent->gotobj)->got;
3765b1be
RH
4897
4898 r_type = gotent->reloc_type;
4899 switch (r_type)
4900 {
4901 case R_ALPHA_LITERAL:
4902 r_type = R_ALPHA_GLOB_DAT;
4903 break;
4904 case R_ALPHA_TLSGD:
4905 r_type = R_ALPHA_DTPMOD64;
4906 break;
4907 case R_ALPHA_GOTDTPREL:
4908 r_type = R_ALPHA_DTPREL64;
4909 break;
4910 case R_ALPHA_GOTTPREL:
4911 r_type = R_ALPHA_TPREL64;
4912 break;
4913 case R_ALPHA_TLSLDM:
4914 default:
4915 abort ();
4916 }
4917
68ffbac6 4918 elf64_alpha_emit_dynrel (output_bfd, info, sgot, srel,
1bbc9cec
RH
4919 gotent->got_offset, h->dynindx,
4920 r_type, gotent->addend);
3765b1be
RH
4921
4922 if (gotent->reloc_type == R_ALPHA_TLSGD)
68ffbac6 4923 elf64_alpha_emit_dynrel (output_bfd, info, sgot, srel,
1bbc9cec
RH
4924 gotent->got_offset + 8, h->dynindx,
4925 R_ALPHA_DTPREL64, gotent->addend);
252b5132
RH
4926 }
4927 }
4928
4929 /* Mark some specially defined symbols as absolute. */
9637f6ef 4930 if (h == elf_hash_table (info)->hdynamic
22edb2f1
RS
4931 || h == elf_hash_table (info)->hgot
4932 || h == elf_hash_table (info)->hplt)
252b5132
RH
4933 sym->st_shndx = SHN_ABS;
4934
b34976b6 4935 return TRUE;
252b5132
RH
4936}
4937
4938/* Finish up the dynamic sections. */
4939
b34976b6 4940static bfd_boolean
a7519a3c
RH
4941elf64_alpha_finish_dynamic_sections (bfd *output_bfd,
4942 struct bfd_link_info *info)
252b5132
RH
4943{
4944 bfd *dynobj;
4945 asection *sdyn;
4946
4947 dynobj = elf_hash_table (info)->dynobj;
3d4d4302 4948 sdyn = bfd_get_linker_section (dynobj, ".dynamic");
252b5132
RH
4949
4950 if (elf_hash_table (info)->dynamic_sections_created)
4951 {
6ec7057a 4952 asection *splt, *sgotplt, *srelaplt;
252b5132 4953 Elf64_External_Dyn *dyncon, *dynconend;
6ec7057a 4954 bfd_vma plt_vma, gotplt_vma;
252b5132 4955
ce558b89
AM
4956 splt = elf_hash_table (info)->splt;
4957 srelaplt = elf_hash_table (info)->srelplt;
252b5132
RH
4958 BFD_ASSERT (splt != NULL && sdyn != NULL);
4959
6ec7057a
RH
4960 plt_vma = splt->output_section->vma + splt->output_offset;
4961
4962 gotplt_vma = 0;
4963 if (elf64_alpha_use_secureplt)
4964 {
ce558b89 4965 sgotplt = elf_hash_table (info)->sgotplt;
6ec7057a
RH
4966 BFD_ASSERT (sgotplt != NULL);
4967 if (sgotplt->size > 0)
4968 gotplt_vma = sgotplt->output_section->vma + sgotplt->output_offset;
4969 }
4970
252b5132 4971 dyncon = (Elf64_External_Dyn *) sdyn->contents;
eea6121a 4972 dynconend = (Elf64_External_Dyn *) (sdyn->contents + sdyn->size);
252b5132
RH
4973 for (; dyncon < dynconend; dyncon++)
4974 {
4975 Elf_Internal_Dyn dyn;
252b5132
RH
4976
4977 bfd_elf64_swap_dyn_in (dynobj, dyncon, &dyn);
4978
4979 switch (dyn.d_tag)
4980 {
4981 case DT_PLTGOT:
6ec7057a
RH
4982 dyn.d_un.d_ptr
4983 = elf64_alpha_use_secureplt ? gotplt_vma : plt_vma;
4984 break;
252b5132 4985 case DT_PLTRELSZ:
6ec7057a
RH
4986 dyn.d_un.d_val = srelaplt ? srelaplt->size : 0;
4987 break;
252b5132 4988 case DT_JMPREL:
4ade44b7
AM
4989 dyn.d_un.d_ptr = srelaplt ? (srelaplt->output_section->vma
4990 + srelaplt->output_offset) : 0;
6ec7057a 4991 break;
252b5132
RH
4992 }
4993
4994 bfd_elf64_swap_dyn_out (output_bfd, &dyn, dyncon);
4995 }
4996
6ec7057a 4997 /* Initialize the plt header. */
eea6121a 4998 if (splt->size > 0)
252b5132 4999 {
6ec7057a
RH
5000 unsigned int insn;
5001 int ofs;
5002
5003 if (elf64_alpha_use_secureplt)
5004 {
5005 ofs = gotplt_vma - (plt_vma + PLT_HEADER_SIZE);
5006
5007 insn = INSN_ABC (INSN_SUBQ, 27, 28, 25);
5008 bfd_put_32 (output_bfd, insn, splt->contents);
5009
5010 insn = INSN_ABO (INSN_LDAH, 28, 28, (ofs + 0x8000) >> 16);
5011 bfd_put_32 (output_bfd, insn, splt->contents + 4);
5012
5013 insn = INSN_ABC (INSN_S4SUBQ, 25, 25, 25);
5014 bfd_put_32 (output_bfd, insn, splt->contents + 8);
5015
5016 insn = INSN_ABO (INSN_LDA, 28, 28, ofs);
5017 bfd_put_32 (output_bfd, insn, splt->contents + 12);
5018
5019 insn = INSN_ABO (INSN_LDQ, 27, 28, 0);
5020 bfd_put_32 (output_bfd, insn, splt->contents + 16);
5021
5022 insn = INSN_ABC (INSN_ADDQ, 25, 25, 25);
5023 bfd_put_32 (output_bfd, insn, splt->contents + 20);
5024
5025 insn = INSN_ABO (INSN_LDQ, 28, 28, 8);
5026 bfd_put_32 (output_bfd, insn, splt->contents + 24);
5027
5028 insn = INSN_AB (INSN_JMP, 31, 27);
5029 bfd_put_32 (output_bfd, insn, splt->contents + 28);
5030
5031 insn = INSN_AD (INSN_BR, 28, -PLT_HEADER_SIZE);
5032 bfd_put_32 (output_bfd, insn, splt->contents + 32);
5033 }
5034 else
5035 {
5036 insn = INSN_AD (INSN_BR, 27, 0); /* br $27, .+4 */
5037 bfd_put_32 (output_bfd, insn, splt->contents);
5038
5039 insn = INSN_ABO (INSN_LDQ, 27, 27, 12);
5040 bfd_put_32 (output_bfd, insn, splt->contents + 4);
5041
5042 insn = INSN_UNOP;
5043 bfd_put_32 (output_bfd, insn, splt->contents + 8);
5044
5045 insn = INSN_AB (INSN_JMP, 27, 27);
5046 bfd_put_32 (output_bfd, insn, splt->contents + 12);
5047
5048 /* The next two words will be filled in by ld.so. */
5049 bfd_put_64 (output_bfd, 0, splt->contents + 16);
5050 bfd_put_64 (output_bfd, 0, splt->contents + 24);
5051 }
252b5132 5052
eecdbe52 5053 elf_section_data (splt->output_section)->this_hdr.sh_entsize = 0;
252b5132
RH
5054 }
5055 }
5056
b34976b6 5057 return TRUE;
252b5132
RH
5058}
5059
96e2734b
RH
5060/* We need to use a special link routine to handle the .mdebug section.
5061 We need to merge all instances of these sections together, not write
5062 them all out sequentially. */
252b5132 5063
b34976b6 5064static bfd_boolean
a7519a3c 5065elf64_alpha_final_link (bfd *abfd, struct bfd_link_info *info)
252b5132
RH
5066{
5067 asection *o;
5068 struct bfd_link_order *p;
96e2734b 5069 asection *mdebug_sec;
252b5132
RH
5070 struct ecoff_debug_info debug;
5071 const struct ecoff_debug_swap *swap
5072 = get_elf_backend_data (abfd)->elf_backend_ecoff_debug_swap;
5073 HDRR *symhdr = &debug.symbolic_header;
4dfe6ac6
NC
5074 void * mdebug_handle = NULL;
5075 struct alpha_elf_link_hash_table * htab;
5076
5077 htab = alpha_elf_hash_table (info);
5078 if (htab == NULL)
5079 return FALSE;
252b5132 5080
96e2734b 5081 /* Go through the sections and collect the mdebug information. */
252b5132 5082 mdebug_sec = NULL;
252b5132
RH
5083 for (o = abfd->sections; o != (asection *) NULL; o = o->next)
5084 {
252b5132
RH
5085 if (strcmp (o->name, ".mdebug") == 0)
5086 {
5087 struct extsym_info einfo;
5088
5089 /* We have found the .mdebug section in the output file.
5090 Look through all the link_orders comprising it and merge
5091 the information together. */
5092 symhdr->magic = swap->sym_magic;
5093 /* FIXME: What should the version stamp be? */
5094 symhdr->vstamp = 0;
5095 symhdr->ilineMax = 0;
5096 symhdr->cbLine = 0;
5097 symhdr->idnMax = 0;
5098 symhdr->ipdMax = 0;
5099 symhdr->isymMax = 0;
5100 symhdr->ioptMax = 0;
5101 symhdr->iauxMax = 0;
5102 symhdr->issMax = 0;
5103 symhdr->issExtMax = 0;
5104 symhdr->ifdMax = 0;
5105 symhdr->crfd = 0;
5106 symhdr->iextMax = 0;
5107
5108 /* We accumulate the debugging information itself in the
5109 debug_info structure. */
5110 debug.line = NULL;
5111 debug.external_dnr = NULL;
5112 debug.external_pdr = NULL;
5113 debug.external_sym = NULL;
5114 debug.external_opt = NULL;
5115 debug.external_aux = NULL;
5116 debug.ss = NULL;
5117 debug.ssext = debug.ssext_end = NULL;
5118 debug.external_fdr = NULL;
5119 debug.external_rfd = NULL;
5120 debug.external_ext = debug.external_ext_end = NULL;
5121
5122 mdebug_handle = bfd_ecoff_debug_init (abfd, &debug, swap, info);
2c3fc389 5123 if (mdebug_handle == NULL)
b34976b6 5124 return FALSE;
252b5132
RH
5125
5126 if (1)
5127 {
5128 asection *s;
5129 EXTR esym;
52b9d213 5130 bfd_vma last = 0;
252b5132
RH
5131 unsigned int i;
5132 static const char * const name[] =
5133 {
5134 ".text", ".init", ".fini", ".data",
5135 ".rodata", ".sdata", ".sbss", ".bss"
5136 };
5137 static const int sc[] = { scText, scInit, scFini, scData,
5138 scRData, scSData, scSBss, scBss };
5139
5140 esym.jmptbl = 0;
5141 esym.cobol_main = 0;
5142 esym.weakext = 0;
5143 esym.reserved = 0;
5144 esym.ifd = ifdNil;
5145 esym.asym.iss = issNil;
5146 esym.asym.st = stLocal;
5147 esym.asym.reserved = 0;
5148 esym.asym.index = indexNil;
5149 for (i = 0; i < 8; i++)
5150 {
5151 esym.asym.sc = sc[i];
5152 s = bfd_get_section_by_name (abfd, name[i]);
5153 if (s != NULL)
5154 {
5155 esym.asym.value = s->vma;
eea6121a 5156 last = s->vma + s->size;
252b5132
RH
5157 }
5158 else
5159 esym.asym.value = last;
5160
5161 if (! bfd_ecoff_debug_one_external (abfd, &debug, swap,
5162 name[i], &esym))
b34976b6 5163 return FALSE;
252b5132
RH
5164 }
5165 }
5166
8423293d 5167 for (p = o->map_head.link_order;
252b5132
RH
5168 p != (struct bfd_link_order *) NULL;
5169 p = p->next)
5170 {
5171 asection *input_section;
5172 bfd *input_bfd;
5173 const struct ecoff_debug_swap *input_swap;
5174 struct ecoff_debug_info input_debug;
5175 char *eraw_src;
5176 char *eraw_end;
5177
5178 if (p->type != bfd_indirect_link_order)
5179 {
fd96f80f 5180 if (p->type == bfd_data_link_order)
252b5132
RH
5181 continue;
5182 abort ();
5183 }
5184
5185 input_section = p->u.indirect.section;
5186 input_bfd = input_section->owner;
5187
0ffa91dd
NC
5188 if (! is_alpha_elf (input_bfd))
5189 /* I don't know what a non ALPHA ELF bfd would be
5190 doing with a .mdebug section, but I don't really
5191 want to deal with it. */
5192 continue;
252b5132
RH
5193
5194 input_swap = (get_elf_backend_data (input_bfd)
5195 ->elf_backend_ecoff_debug_swap);
5196
eea6121a 5197 BFD_ASSERT (p->size == input_section->size);
252b5132
RH
5198
5199 /* The ECOFF linking code expects that we have already
5200 read in the debugging information and set up an
5201 ecoff_debug_info structure, so we do that now. */
5202 if (!elf64_alpha_read_ecoff_info (input_bfd, input_section,
5203 &input_debug))
b34976b6 5204 return FALSE;
252b5132
RH
5205
5206 if (! (bfd_ecoff_debug_accumulate
5207 (mdebug_handle, abfd, &debug, swap, input_bfd,
5208 &input_debug, input_swap, info)))
b34976b6 5209 return FALSE;
252b5132
RH
5210
5211 /* Loop through the external symbols. For each one with
5212 interesting information, try to find the symbol in
5213 the linker global hash table and save the information
5214 for the output external symbols. */
21d799b5 5215 eraw_src = (char *) input_debug.external_ext;
252b5132
RH
5216 eraw_end = (eraw_src
5217 + (input_debug.symbolic_header.iextMax
5218 * input_swap->external_ext_size));
5219 for (;
5220 eraw_src < eraw_end;
5221 eraw_src += input_swap->external_ext_size)
5222 {
5223 EXTR ext;
5224 const char *name;
5225 struct alpha_elf_link_hash_entry *h;
5226
2c3fc389 5227 (*input_swap->swap_ext_in) (input_bfd, eraw_src, &ext);
252b5132
RH
5228 if (ext.asym.sc == scNil
5229 || ext.asym.sc == scUndefined
5230 || ext.asym.sc == scSUndefined)
5231 continue;
5232
5233 name = input_debug.ssext + ext.asym.iss;
4dfe6ac6 5234 h = alpha_elf_link_hash_lookup (htab, name, FALSE, FALSE, TRUE);
252b5132
RH
5235 if (h == NULL || h->esym.ifd != -2)
5236 continue;
5237
5238 if (ext.ifd != -1)
5239 {
5240 BFD_ASSERT (ext.ifd
5241 < input_debug.symbolic_header.ifdMax);
5242 ext.ifd = input_debug.ifdmap[ext.ifd];
5243 }
5244
5245 h->esym = ext;
5246 }
5247
5248 /* Free up the information we just read. */
5249 free (input_debug.line);
5250 free (input_debug.external_dnr);
5251 free (input_debug.external_pdr);
5252 free (input_debug.external_sym);
5253 free (input_debug.external_opt);
5254 free (input_debug.external_aux);
5255 free (input_debug.ss);
5256 free (input_debug.ssext);
5257 free (input_debug.external_fdr);
5258 free (input_debug.external_rfd);
5259 free (input_debug.external_ext);
5260
5261 /* Hack: reset the SEC_HAS_CONTENTS flag so that
5262 elf_link_input_bfd ignores this section. */
5263 input_section->flags &=~ SEC_HAS_CONTENTS;
5264 }
5265
252b5132
RH
5266 /* Build the external symbol information. */
5267 einfo.abfd = abfd;
5268 einfo.info = info;
5269 einfo.debug = &debug;
5270 einfo.swap = swap;
b34976b6 5271 einfo.failed = FALSE;
252b5132
RH
5272 elf_link_hash_traverse (elf_hash_table (info),
5273 elf64_alpha_output_extsym,
2c3fc389 5274 &einfo);
252b5132 5275 if (einfo.failed)
b34976b6 5276 return FALSE;
252b5132
RH
5277
5278 /* Set the size of the .mdebug section. */
eea6121a 5279 o->size = bfd_ecoff_debug_size (abfd, &debug, swap);
252b5132
RH
5280
5281 /* Skip this section later on (I don't think this currently
5282 matters, but someday it might). */
8423293d 5283 o->map_head.link_order = (struct bfd_link_order *) NULL;
252b5132
RH
5284
5285 mdebug_sec = o;
5286 }
252b5132
RH
5287 }
5288
5289 /* Invoke the regular ELF backend linker to do all the work. */
c152c796 5290 if (! bfd_elf_final_link (abfd, info))
b34976b6 5291 return FALSE;
252b5132
RH
5292
5293 /* Now write out the computed sections. */
5294
5295 /* The .got subsections... */
5296 {
5297 bfd *i, *dynobj = elf_hash_table(info)->dynobj;
4dfe6ac6 5298 for (i = htab->got_list;
252b5132
RH
5299 i != NULL;
5300 i = alpha_elf_tdata(i)->got_link_next)
5301 {
5302 asection *sgot;
5303
5304 /* elf_bfd_final_link already did everything in dynobj. */
5305 if (i == dynobj)
5306 continue;
5307
5308 sgot = alpha_elf_tdata(i)->got;
5309 if (! bfd_set_section_contents (abfd, sgot->output_section,
dc810e39
AM
5310 sgot->contents,
5311 (file_ptr) sgot->output_offset,
eea6121a 5312 sgot->size))
b34976b6 5313 return FALSE;
252b5132
RH
5314 }
5315 }
5316
252b5132
RH
5317 if (mdebug_sec != (asection *) NULL)
5318 {
5319 BFD_ASSERT (abfd->output_has_begun);
5320 if (! bfd_ecoff_write_accumulated_debug (mdebug_handle, abfd, &debug,
5321 swap, info,
5322 mdebug_sec->filepos))
b34976b6 5323 return FALSE;
252b5132
RH
5324
5325 bfd_ecoff_debug_free (mdebug_handle, abfd, &debug, swap, info);
5326 }
5327
b34976b6 5328 return TRUE;
252b5132 5329}
fcfbdf31
JJ
5330
5331static enum elf_reloc_type_class
7e612e98
AM
5332elf64_alpha_reloc_type_class (const struct bfd_link_info *info ATTRIBUTE_UNUSED,
5333 const asection *rel_sec ATTRIBUTE_UNUSED,
5334 const Elf_Internal_Rela *rela)
fcfbdf31 5335{
f51e552e 5336 switch ((int) ELF64_R_TYPE (rela->r_info))
fcfbdf31
JJ
5337 {
5338 case R_ALPHA_RELATIVE:
5339 return reloc_class_relative;
5340 case R_ALPHA_JMP_SLOT:
5341 return reloc_class_plt;
5342 case R_ALPHA_COPY:
5343 return reloc_class_copy;
5344 default:
5345 return reloc_class_normal;
5346 }
5347}
252b5132 5348\f
b35d266b 5349static const struct bfd_elf_special_section elf64_alpha_special_sections[] =
2f89ff8d 5350{
07d6d2b8 5351 { STRING_COMMA_LEN (".sbss"), -2, SHT_NOBITS, SHF_ALLOC + SHF_WRITE + SHF_ALPHA_GPREL },
0112cd26 5352 { STRING_COMMA_LEN (".sdata"), -2, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE + SHF_ALPHA_GPREL },
07d6d2b8 5353 { NULL, 0, 0, 0, 0 }
2f89ff8d
L
5354};
5355
252b5132
RH
5356/* ECOFF swapping routines. These are used when dealing with the
5357 .mdebug section, which is in the ECOFF debugging format. Copied
fe8bc63d 5358 from elf32-mips.c. */
252b5132
RH
5359static const struct ecoff_debug_swap
5360elf64_alpha_ecoff_debug_swap =
5361{
5362 /* Symbol table magic number. */
5363 magicSym2,
5364 /* Alignment of debugging information. E.g., 4. */
5365 8,
5366 /* Sizes of external symbolic information. */
5367 sizeof (struct hdr_ext),
5368 sizeof (struct dnr_ext),
5369 sizeof (struct pdr_ext),
5370 sizeof (struct sym_ext),
5371 sizeof (struct opt_ext),
5372 sizeof (struct fdr_ext),
5373 sizeof (struct rfd_ext),
5374 sizeof (struct ext_ext),
5375 /* Functions to swap in external symbolic data. */
5376 ecoff_swap_hdr_in,
5377 ecoff_swap_dnr_in,
5378 ecoff_swap_pdr_in,
5379 ecoff_swap_sym_in,
5380 ecoff_swap_opt_in,
5381 ecoff_swap_fdr_in,
5382 ecoff_swap_rfd_in,
5383 ecoff_swap_ext_in,
5384 _bfd_ecoff_swap_tir_in,
5385 _bfd_ecoff_swap_rndx_in,
5386 /* Functions to swap out external symbolic data. */
5387 ecoff_swap_hdr_out,
5388 ecoff_swap_dnr_out,
5389 ecoff_swap_pdr_out,
5390 ecoff_swap_sym_out,
5391 ecoff_swap_opt_out,
5392 ecoff_swap_fdr_out,
5393 ecoff_swap_rfd_out,
5394 ecoff_swap_ext_out,
5395 _bfd_ecoff_swap_tir_out,
5396 _bfd_ecoff_swap_rndx_out,
5397 /* Function to read in symbolic data. */
5398 elf64_alpha_read_ecoff_info
5399};
5400\f
70bcb145
JW
5401/* Use a non-standard hash bucket size of 8. */
5402
562ace6b 5403static const struct elf_size_info alpha_elf_size_info =
70bcb145
JW
5404{
5405 sizeof (Elf64_External_Ehdr),
5406 sizeof (Elf64_External_Phdr),
5407 sizeof (Elf64_External_Shdr),
5408 sizeof (Elf64_External_Rel),
5409 sizeof (Elf64_External_Rela),
5410 sizeof (Elf64_External_Sym),
5411 sizeof (Elf64_External_Dyn),
5412 sizeof (Elf_External_Note),
5413 8,
5414 1,
45d6a902 5415 64, 3,
70bcb145
JW
5416 ELFCLASS64, EV_CURRENT,
5417 bfd_elf64_write_out_phdrs,
5418 bfd_elf64_write_shdrs_and_ehdr,
1489a3a0 5419 bfd_elf64_checksum_contents,
70bcb145 5420 bfd_elf64_write_relocs,
73ff0d56 5421 bfd_elf64_swap_symbol_in,
70bcb145
JW
5422 bfd_elf64_swap_symbol_out,
5423 bfd_elf64_slurp_reloc_table,
5424 bfd_elf64_slurp_symbol_table,
5425 bfd_elf64_swap_dyn_in,
5426 bfd_elf64_swap_dyn_out,
947216bf
AM
5427 bfd_elf64_swap_reloc_in,
5428 bfd_elf64_swap_reloc_out,
5429 bfd_elf64_swap_reloca_in,
5430 bfd_elf64_swap_reloca_out
70bcb145
JW
5431};
5432
6d00b590 5433#define TARGET_LITTLE_SYM alpha_elf64_vec
252b5132
RH
5434#define TARGET_LITTLE_NAME "elf64-alpha"
5435#define ELF_ARCH bfd_arch_alpha
ae95ffa6 5436#define ELF_TARGET_ID ALPHA_ELF_DATA
56fc028e
AJ
5437#define ELF_MACHINE_CODE EM_ALPHA
5438#define ELF_MAXPAGESIZE 0x10000
24718e3b 5439#define ELF_COMMONPAGESIZE 0x2000
252b5132
RH
5440
5441#define bfd_elf64_bfd_link_hash_table_create \
5442 elf64_alpha_bfd_link_hash_table_create
5443
5444#define bfd_elf64_bfd_reloc_type_lookup \
5445 elf64_alpha_bfd_reloc_type_lookup
157090f7
AM
5446#define bfd_elf64_bfd_reloc_name_lookup \
5447 elf64_alpha_bfd_reloc_name_lookup
252b5132
RH
5448#define elf_info_to_howto \
5449 elf64_alpha_info_to_howto
5450
5451#define bfd_elf64_mkobject \
5452 elf64_alpha_mkobject
5453#define elf_backend_object_p \
5454 elf64_alpha_object_p
5455
5456#define elf_backend_section_from_shdr \
5457 elf64_alpha_section_from_shdr
204692d7
RH
5458#define elf_backend_section_flags \
5459 elf64_alpha_section_flags
252b5132
RH
5460#define elf_backend_fake_sections \
5461 elf64_alpha_fake_sections
5462
5463#define bfd_elf64_bfd_is_local_label_name \
5464 elf64_alpha_is_local_label_name
5465#define bfd_elf64_find_nearest_line \
5466 elf64_alpha_find_nearest_line
5467#define bfd_elf64_bfd_relax_section \
5468 elf64_alpha_relax_section
5469
5470#define elf_backend_add_symbol_hook \
5471 elf64_alpha_add_symbol_hook
13285a1b
AM
5472#define elf_backend_relocs_compatible \
5473 _bfd_elf_relocs_compatible
6fc5bb57
AM
5474#define elf_backend_sort_relocs_p \
5475 elf64_alpha_sort_relocs_p
252b5132
RH
5476#define elf_backend_check_relocs \
5477 elf64_alpha_check_relocs
5478#define elf_backend_create_dynamic_sections \
5479 elf64_alpha_create_dynamic_sections
5480#define elf_backend_adjust_dynamic_symbol \
5481 elf64_alpha_adjust_dynamic_symbol
747ffa7b
AM
5482#define elf_backend_merge_symbol_attribute \
5483 elf64_alpha_merge_symbol_attribute
48f4b4f5
RH
5484#define elf_backend_copy_indirect_symbol \
5485 elf64_alpha_copy_indirect_symbol
252b5132
RH
5486#define elf_backend_always_size_sections \
5487 elf64_alpha_always_size_sections
5488#define elf_backend_size_dynamic_sections \
5489 elf64_alpha_size_dynamic_sections
74541ad4 5490#define elf_backend_omit_section_dynsym \
d00dd7dc 5491 _bfd_elf_omit_section_dynsym_all
252b5132
RH
5492#define elf_backend_relocate_section \
5493 elf64_alpha_relocate_section
5494#define elf_backend_finish_dynamic_symbol \
5495 elf64_alpha_finish_dynamic_symbol
5496#define elf_backend_finish_dynamic_sections \
5497 elf64_alpha_finish_dynamic_sections
5498#define bfd_elf64_bfd_final_link \
5499 elf64_alpha_final_link
fcfbdf31
JJ
5500#define elf_backend_reloc_type_class \
5501 elf64_alpha_reloc_type_class
252b5132 5502
e117360e
RH
5503#define elf_backend_can_gc_sections 1
5504#define elf_backend_gc_mark_hook elf64_alpha_gc_mark_hook
e117360e 5505
252b5132
RH
5506#define elf_backend_ecoff_debug_swap \
5507 &elf64_alpha_ecoff_debug_swap
5508
70bcb145
JW
5509#define elf_backend_size_info \
5510 alpha_elf_size_info
5511
29ef7005
L
5512#define elf_backend_special_sections \
5513 elf64_alpha_special_sections
2f89ff8d 5514
6f6fd151
L
5515#define elf_backend_strip_zero_sized_dynamic_sections \
5516 _bfd_elf_strip_zero_sized_dynamic_sections
5517
38b1a46c 5518/* A few constants that determine how the .plt section is set up. */
252b5132
RH
5519#define elf_backend_want_got_plt 0
5520#define elf_backend_plt_readonly 0
5521#define elf_backend_want_plt_sym 1
5522#define elf_backend_got_header_size 0
64f52338 5523#define elf_backend_dtrel_excludes_plt 1
252b5132
RH
5524
5525#include "elf64-target.h"
2238051f
RH
5526\f
5527/* FreeBSD support. */
5528
5529#undef TARGET_LITTLE_SYM
6d00b590 5530#define TARGET_LITTLE_SYM alpha_elf64_fbsd_vec
2238051f
RH
5531#undef TARGET_LITTLE_NAME
5532#define TARGET_LITTLE_NAME "elf64-alpha-freebsd"
d1036acb
L
5533#undef ELF_OSABI
5534#define ELF_OSABI ELFOSABI_FREEBSD
2238051f
RH
5535
5536/* The kernel recognizes executables as valid only if they carry a
5537 "FreeBSD" label in the ELF header. So we put this label on all
5538 executables and (for simplicity) also all other object files. */
5539
ed7e9d0b
AM
5540static bfd_boolean
5541elf64_alpha_fbsd_init_file_header (bfd *abfd, struct bfd_link_info *info)
2238051f
RH
5542{
5543 Elf_Internal_Ehdr * i_ehdrp; /* ELF file header, internal form. */
5544
ed7e9d0b
AM
5545 if (!_bfd_elf_init_file_header (abfd, info))
5546 return FALSE;
5547
2238051f
RH
5548 i_ehdrp = elf_elfheader (abfd);
5549
5550 /* Put an ABI label supported by FreeBSD >= 4.1. */
d1036acb 5551 i_ehdrp->e_ident[EI_OSABI] = get_elf_backend_data (abfd)->elf_osabi;
2238051f
RH
5552#ifdef OLD_FREEBSD_ABI_LABEL
5553 /* The ABI label supported by FreeBSD <= 4.0 is quite nonstandard. */
5554 memcpy (&i_ehdrp->e_ident[EI_ABIVERSION], "FreeBSD", 8);
5555#endif
ed7e9d0b 5556 return TRUE;
2238051f
RH
5557}
5558
ed7e9d0b
AM
5559#undef elf_backend_init_file_header
5560#define elf_backend_init_file_header \
5561 elf64_alpha_fbsd_init_file_header
2238051f 5562
571fe01f 5563#undef elf64_bed
2238051f
RH
5564#define elf64_bed elf64_alpha_fbsd_bed
5565
5566#include "elf64-target.h"
This page took 1.775469 seconds and 4 git commands to generate.