Automatic date update in version.in
[deliverable/binutils-gdb.git] / bfd / elf64-alpha.c
CommitLineData
252b5132 1/* Alpha specific support for 64-bit ELF
82704155 2 Copyright (C) 1996-2019 Free Software Foundation, Inc.
252b5132
RH
3 Contributed by Richard Henderson <rth@tamu.edu>.
4
571fe01f 5 This file is part of BFD, the Binary File Descriptor library.
252b5132 6
571fe01f
NC
7 This program is free software; you can redistribute it and/or modify
8 it under the terms of the GNU General Public License as published by
cd123cb7 9 the Free Software Foundation; either version 3 of the License, or
571fe01f 10 (at your option) any later version.
252b5132 11
571fe01f
NC
12 This program is distributed in the hope that it will be useful,
13 but WITHOUT ANY WARRANTY; without even the implied warranty of
14 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 GNU General Public License for more details.
252b5132 16
571fe01f
NC
17 You should have received a copy of the GNU General Public License
18 along with this program; if not, write to the Free Software
cd123cb7
NC
19 Foundation, Inc., 51 Franklin Street - Fifth Floor, Boston,
20 MA 02110-1301, USA. */
21
252b5132
RH
22
23/* We need a published ABI spec for this. Until one comes out, don't
24 assume this'll remain unchanged forever. */
25
252b5132 26#include "sysdep.h"
3db64b00 27#include "bfd.h"
252b5132
RH
28#include "libbfd.h"
29#include "elf-bfd.h"
0ba9378a 30#include "ecoff-bfd.h"
252b5132
RH
31
32#include "elf/alpha.h"
33
34#define ALPHAECOFF
35
36#define NO_COFF_RELOCS
37#define NO_COFF_SYMBOLS
38#define NO_COFF_LINENOS
39
fe8bc63d 40/* Get the ECOFF swapping routines. Needed for the debug information. */
252b5132
RH
41#include "coff/internal.h"
42#include "coff/sym.h"
43#include "coff/symconst.h"
44#include "coff/ecoff.h"
45#include "coff/alpha.h"
46#include "aout/ar.h"
47#include "libcoff.h"
48#include "libecoff.h"
49#define ECOFF_64
50#include "ecoffswap.h"
51
6ec7057a
RH
52\f
53/* Instruction data for plt generation and relaxation. */
54
55#define OP_LDA 0x08
56#define OP_LDAH 0x09
57#define OP_LDQ 0x29
58#define OP_BR 0x30
59#define OP_BSR 0x34
60
61#define INSN_LDA (OP_LDA << 26)
62#define INSN_LDAH (OP_LDAH << 26)
63#define INSN_LDQ (OP_LDQ << 26)
64#define INSN_BR (OP_BR << 26)
65
66#define INSN_ADDQ 0x40000400
67#define INSN_RDUNIQ 0x0000009e
68#define INSN_SUBQ 0x40000520
69#define INSN_S4SUBQ 0x40000560
70#define INSN_UNOP 0x2ffe0000
71
72#define INSN_JSR 0x68004000
73#define INSN_JMP 0x68000000
74#define INSN_JSR_MASK 0xfc00c000
75
76#define INSN_A(I,A) (I | (A << 21))
77#define INSN_AB(I,A,B) (I | (A << 21) | (B << 16))
78#define INSN_ABC(I,A,B,C) (I | (A << 21) | (B << 16) | C)
79#define INSN_ABO(I,A,B,O) (I | (A << 21) | (B << 16) | ((O) & 0xffff))
80#define INSN_AD(I,A,D) (I | (A << 21) | (((D) >> 2) & 0x1fffff))
81
82/* PLT/GOT Stuff */
83
84/* Set by ld emulation. Putting this into the link_info or hash structure
85 is simply working too hard. */
86#ifdef USE_SECUREPLT
87bfd_boolean elf64_alpha_use_secureplt = TRUE;
88#else
89bfd_boolean elf64_alpha_use_secureplt = FALSE;
90#endif
91
92#define OLD_PLT_HEADER_SIZE 32
93#define OLD_PLT_ENTRY_SIZE 12
94#define NEW_PLT_HEADER_SIZE 36
95#define NEW_PLT_ENTRY_SIZE 4
96
97#define PLT_HEADER_SIZE \
98 (elf64_alpha_use_secureplt ? NEW_PLT_HEADER_SIZE : OLD_PLT_HEADER_SIZE)
99#define PLT_ENTRY_SIZE \
100 (elf64_alpha_use_secureplt ? NEW_PLT_ENTRY_SIZE : OLD_PLT_ENTRY_SIZE)
101
102#define MAX_GOT_SIZE (64*1024)
103
104#define ELF_DYNAMIC_INTERPRETER "/usr/lib/ld.so"
252b5132 105\f
21d799b5
NC
106
107/* Used to implement multiple .got subsections. */
108struct alpha_elf_got_entry
109{
110 struct alpha_elf_got_entry *next;
111
112 /* Which .got subsection? */
113 bfd *gotobj;
114
115 /* The addend in effect for this entry. */
116 bfd_vma addend;
117
118 /* The .got offset for this entry. */
119 int got_offset;
120
121 /* The .plt offset for this entry. */
122 int plt_offset;
123
124 /* How many references to this entry? */
125 int use_count;
126
127 /* The relocation type of this entry. */
128 unsigned char reloc_type;
129
130 /* How a LITERAL is used. */
131 unsigned char flags;
132
133 /* Have we initialized the dynamic relocation for this entry? */
134 unsigned char reloc_done;
135
136 /* Have we adjusted this entry for SEC_MERGE? */
137 unsigned char reloc_xlated;
138};
139
140struct alpha_elf_reloc_entry
141{
142 struct alpha_elf_reloc_entry *next;
143
144 /* Which .reloc section? */
145 asection *srel;
146
147 /* What kind of relocation? */
148 unsigned int rtype;
149
150 /* Is this against read-only section? */
151 unsigned int reltext : 1;
152
153 /* How many did we find? */
154 unsigned long count;
155};
156
252b5132
RH
157struct alpha_elf_link_hash_entry
158{
159 struct elf_link_hash_entry root;
160
161 /* External symbol information. */
162 EXTR esym;
163
164 /* Cumulative flags for all the .got entries. */
165 int flags;
166
9e756d64 167 /* Contexts in which a literal was referenced. */
8288a39e
RH
168#define ALPHA_ELF_LINK_HASH_LU_ADDR 0x01
169#define ALPHA_ELF_LINK_HASH_LU_MEM 0x02
170#define ALPHA_ELF_LINK_HASH_LU_BYTE 0x04
171#define ALPHA_ELF_LINK_HASH_LU_JSR 0x08
172#define ALPHA_ELF_LINK_HASH_LU_TLSGD 0x10
173#define ALPHA_ELF_LINK_HASH_LU_TLSLDM 0x20
174#define ALPHA_ELF_LINK_HASH_LU_JSRDIRECT 0x40
175#define ALPHA_ELF_LINK_HASH_LU_PLT 0x38
176#define ALPHA_ELF_LINK_HASH_TLS_IE 0x80
cc03ec80 177
252b5132 178 /* Used to implement multiple .got subsections. */
21d799b5 179 struct alpha_elf_got_entry *got_entries;
252b5132 180
571fe01f 181 /* Used to count non-got, non-plt relocations for delayed sizing
252b5132 182 of relocation sections. */
21d799b5 183 struct alpha_elf_reloc_entry *reloc_entries;
252b5132
RH
184};
185
186/* Alpha ELF linker hash table. */
187
188struct alpha_elf_link_hash_table
189{
190 struct elf_link_hash_table root;
191
192 /* The head of a list of .got subsections linked through
193 alpha_elf_tdata(abfd)->got_link_next. */
194 bfd *got_list;
4a828aab
RH
195
196 /* The most recent relax pass that we've seen. The GOTs
197 should be regenerated if this doesn't match. */
198 int relax_trip;
252b5132
RH
199};
200
201/* Look up an entry in a Alpha ELF linker hash table. */
202
203#define alpha_elf_link_hash_lookup(table, string, create, copy, follow) \
204 ((struct alpha_elf_link_hash_entry *) \
205 elf_link_hash_lookup (&(table)->root, (string), (create), \
206 (copy), (follow)))
207
208/* Traverse a Alpha ELF linker hash table. */
209
210#define alpha_elf_link_hash_traverse(table, func, info) \
211 (elf_link_hash_traverse \
212 (&(table)->root, \
2c3fc389 213 (bfd_boolean (*) (struct elf_link_hash_entry *, void *)) (func), \
252b5132
RH
214 (info)))
215
216/* Get the Alpha ELF linker hash table from a link_info structure. */
217
218#define alpha_elf_hash_table(p) \
4dfe6ac6
NC
219 (elf_hash_table_id ((struct elf_link_hash_table *) ((p)->hash)) \
220 == ALPHA_ELF_DATA ? ((struct alpha_elf_link_hash_table *) ((p)->hash)) : NULL)
252b5132
RH
221
222/* Get the object's symbols as our own entry type. */
223
224#define alpha_elf_sym_hashes(abfd) \
225 ((struct alpha_elf_link_hash_entry **)elf_sym_hashes(abfd))
226
68ffbac6 227/* Should we do dynamic things to this symbol? This differs from the
986a241f
RH
228 generic version in that we never need to consider function pointer
229 equality wrt PLT entries -- we don't create a PLT entry if a symbol's
230 address is ever taken. */
252b5132 231
986a241f 232static inline bfd_boolean
a7519a3c
RH
233alpha_elf_dynamic_symbol_p (struct elf_link_hash_entry *h,
234 struct bfd_link_info *info)
8fb35fed 235{
986a241f 236 return _bfd_elf_dynamic_symbol_p (h, info, 0);
8fb35fed 237}
252b5132
RH
238
239/* Create an entry in a Alpha ELF linker hash table. */
240
241static struct bfd_hash_entry *
a7519a3c
RH
242elf64_alpha_link_hash_newfunc (struct bfd_hash_entry *entry,
243 struct bfd_hash_table *table,
244 const char *string)
252b5132
RH
245{
246 struct alpha_elf_link_hash_entry *ret =
247 (struct alpha_elf_link_hash_entry *) entry;
248
249 /* Allocate the structure if it has not already been allocated by a
250 subclass. */
251 if (ret == (struct alpha_elf_link_hash_entry *) NULL)
252 ret = ((struct alpha_elf_link_hash_entry *)
253 bfd_hash_allocate (table,
254 sizeof (struct alpha_elf_link_hash_entry)));
255 if (ret == (struct alpha_elf_link_hash_entry *) NULL)
256 return (struct bfd_hash_entry *) ret;
257
258 /* Call the allocation method of the superclass. */
259 ret = ((struct alpha_elf_link_hash_entry *)
260 _bfd_elf_link_hash_newfunc ((struct bfd_hash_entry *) ret,
261 table, string));
262 if (ret != (struct alpha_elf_link_hash_entry *) NULL)
263 {
264 /* Set local fields. */
265 memset (&ret->esym, 0, sizeof (EXTR));
266 /* We use -2 as a marker to indicate that the information has
267 not been set. -1 means there is no associated ifd. */
268 ret->esym.ifd = -2;
269 ret->flags = 0;
270 ret->got_entries = NULL;
271 ret->reloc_entries = NULL;
272 }
273
274 return (struct bfd_hash_entry *) ret;
275}
276
277/* Create a Alpha ELF linker hash table. */
278
279static struct bfd_link_hash_table *
a7519a3c 280elf64_alpha_bfd_link_hash_table_create (bfd *abfd)
252b5132
RH
281{
282 struct alpha_elf_link_hash_table *ret;
dc810e39 283 bfd_size_type amt = sizeof (struct alpha_elf_link_hash_table);
252b5132 284
e2d34d7d 285 ret = (struct alpha_elf_link_hash_table *) bfd_zmalloc (amt);
252b5132
RH
286 if (ret == (struct alpha_elf_link_hash_table *) NULL)
287 return NULL;
288
66eb6687
AM
289 if (!_bfd_elf_link_hash_table_init (&ret->root, abfd,
290 elf64_alpha_link_hash_newfunc,
4dfe6ac6
NC
291 sizeof (struct alpha_elf_link_hash_entry),
292 ALPHA_ELF_DATA))
252b5132 293 {
e2d34d7d 294 free (ret);
252b5132
RH
295 return NULL;
296 }
297
298 return &ret->root.root;
299}
300\f
698600e4
AM
301/* Alpha ELF follows MIPS ELF in using a special find_nearest_line
302 routine in order to handle the ECOFF debugging information. */
303
304struct alpha_elf_find_line
305{
306 struct ecoff_debug_info d;
307 struct ecoff_find_line i;
308};
309
252b5132
RH
310/* We have some private fields hanging off of the elf_tdata structure. */
311
312struct alpha_elf_obj_tdata
313{
314 struct elf_obj_tdata root;
315
316 /* For every input file, these are the got entries for that object's
317 local symbols. */
318 struct alpha_elf_got_entry ** local_got_entries;
319
320 /* For every input file, this is the object that owns the got that
321 this input file uses. */
322 bfd *gotobj;
323
324 /* For every got, this is a linked list through the objects using this got */
325 bfd *in_got_link_next;
326
327 /* For every got, this is a link to the next got subsegment. */
328 bfd *got_link_next;
329
330 /* For every got, this is the section. */
331 asection *got;
332
3765b1be
RH
333 /* For every got, this is it's total number of words. */
334 int total_got_size;
252b5132 335
3765b1be 336 /* For every got, this is the sum of the number of words required
252b5132 337 to hold all of the member object's local got. */
3765b1be 338 int local_got_size;
698600e4
AM
339
340 /* Used by elf64_alpha_find_nearest_line entry point. */
341 struct alpha_elf_find_line *find_line_info;
342
252b5132
RH
343};
344
345#define alpha_elf_tdata(abfd) \
346 ((struct alpha_elf_obj_tdata *) (abfd)->tdata.any)
347
0ffa91dd
NC
348#define is_alpha_elf(bfd) \
349 (bfd_get_flavour (bfd) == bfd_target_elf_flavour \
350 && elf_tdata (bfd) != NULL \
4dfe6ac6 351 && elf_object_id (bfd) == ALPHA_ELF_DATA)
0ffa91dd 352
b34976b6 353static bfd_boolean
a7519a3c 354elf64_alpha_mkobject (bfd *abfd)
252b5132 355{
0ffa91dd 356 return bfd_elf_allocate_object (abfd, sizeof (struct alpha_elf_obj_tdata),
4dfe6ac6 357 ALPHA_ELF_DATA);
252b5132
RH
358}
359
b34976b6 360static bfd_boolean
a7519a3c 361elf64_alpha_object_p (bfd *abfd)
252b5132 362{
252b5132
RH
363 /* Set the right machine number for an Alpha ELF file. */
364 return bfd_default_set_arch_mach (abfd, bfd_arch_alpha, 0);
365}
366\f
a7519a3c
RH
367/* A relocation function which doesn't do anything. */
368
369static bfd_reloc_status_type
370elf64_alpha_reloc_nil (bfd *abfd ATTRIBUTE_UNUSED, arelent *reloc,
371 asymbol *sym ATTRIBUTE_UNUSED,
2c3fc389 372 void * data ATTRIBUTE_UNUSED, asection *sec,
a7519a3c
RH
373 bfd *output_bfd, char **error_message ATTRIBUTE_UNUSED)
374{
375 if (output_bfd)
376 reloc->address += sec->output_offset;
377 return bfd_reloc_ok;
378}
379
380/* A relocation function used for an unsupported reloc. */
381
382static bfd_reloc_status_type
383elf64_alpha_reloc_bad (bfd *abfd ATTRIBUTE_UNUSED, arelent *reloc,
384 asymbol *sym ATTRIBUTE_UNUSED,
2c3fc389 385 void * data ATTRIBUTE_UNUSED, asection *sec,
a7519a3c
RH
386 bfd *output_bfd, char **error_message ATTRIBUTE_UNUSED)
387{
388 if (output_bfd)
389 reloc->address += sec->output_offset;
390 return bfd_reloc_notsupported;
391}
392
393/* Do the work of the GPDISP relocation. */
394
395static bfd_reloc_status_type
396elf64_alpha_do_reloc_gpdisp (bfd *abfd, bfd_vma gpdisp, bfd_byte *p_ldah,
397 bfd_byte *p_lda)
398{
399 bfd_reloc_status_type ret = bfd_reloc_ok;
400 bfd_vma addend;
401 unsigned long i_ldah, i_lda;
402
403 i_ldah = bfd_get_32 (abfd, p_ldah);
404 i_lda = bfd_get_32 (abfd, p_lda);
405
406 /* Complain if the instructions are not correct. */
407 if (((i_ldah >> 26) & 0x3f) != 0x09
408 || ((i_lda >> 26) & 0x3f) != 0x08)
409 ret = bfd_reloc_dangerous;
410
411 /* Extract the user-supplied offset, mirroring the sign extensions
412 that the instructions perform. */
413 addend = ((i_ldah & 0xffff) << 16) | (i_lda & 0xffff);
414 addend = (addend ^ 0x80008000) - 0x80008000;
415
416 gpdisp += addend;
417
418 if ((bfd_signed_vma) gpdisp < -(bfd_signed_vma) 0x80000000
419 || (bfd_signed_vma) gpdisp >= (bfd_signed_vma) 0x7fff8000)
420 ret = bfd_reloc_overflow;
421
422 /* compensate for the sign extension again. */
423 i_ldah = ((i_ldah & 0xffff0000)
424 | (((gpdisp >> 16) + ((gpdisp >> 15) & 1)) & 0xffff));
425 i_lda = (i_lda & 0xffff0000) | (gpdisp & 0xffff);
426
427 bfd_put_32 (abfd, (bfd_vma) i_ldah, p_ldah);
428 bfd_put_32 (abfd, (bfd_vma) i_lda, p_lda);
429
430 return ret;
431}
432
433/* The special function for the GPDISP reloc. */
434
435static bfd_reloc_status_type
436elf64_alpha_reloc_gpdisp (bfd *abfd, arelent *reloc_entry,
2c3fc389 437 asymbol *sym ATTRIBUTE_UNUSED, void * data,
a7519a3c
RH
438 asection *input_section, bfd *output_bfd,
439 char **err_msg)
440{
441 bfd_reloc_status_type ret;
442 bfd_vma gp, relocation;
443 bfd_vma high_address;
444 bfd_byte *p_ldah, *p_lda;
445
446 /* Don't do anything if we're not doing a final link. */
447 if (output_bfd)
448 {
449 reloc_entry->address += input_section->output_offset;
450 return bfd_reloc_ok;
451 }
452
453 high_address = bfd_get_section_limit (abfd, input_section);
454 if (reloc_entry->address > high_address
455 || reloc_entry->address + reloc_entry->addend > high_address)
456 return bfd_reloc_outofrange;
457
458 /* The gp used in the portion of the output object to which this
459 input object belongs is cached on the input bfd. */
460 gp = _bfd_get_gp_value (abfd);
461
462 relocation = (input_section->output_section->vma
463 + input_section->output_offset
464 + reloc_entry->address);
465
466 p_ldah = (bfd_byte *) data + reloc_entry->address;
467 p_lda = p_ldah + reloc_entry->addend;
468
469 ret = elf64_alpha_do_reloc_gpdisp (abfd, gp - relocation, p_ldah, p_lda);
470
471 /* Complain if the instructions are not correct. */
472 if (ret == bfd_reloc_dangerous)
473 *err_msg = _("GPDISP relocation did not find ldah and lda instructions");
474
475 return ret;
476}
477
252b5132
RH
478/* In case we're on a 32-bit machine, construct a 64-bit "-1" value
479 from smaller values. Start with zero, widen, *then* decrement. */
480#define MINUS_ONE (((bfd_vma)0) - 1)
481
21d799b5 482
dfe57ca0 483#define SKIP_HOWTO(N) \
21d799b5 484 HOWTO(N, 0, 0, 0, 0, 0, complain_overflow_dont, elf64_alpha_reloc_bad, 0, 0, 0, 0, 0)
dfe57ca0 485
252b5132
RH
486static reloc_howto_type elf64_alpha_howto_table[] =
487{
488 HOWTO (R_ALPHA_NONE, /* type */
489 0, /* rightshift */
6346d5ca
AM
490 3, /* size (0 = byte, 1 = short, 2 = long) */
491 0, /* bitsize */
b34976b6 492 TRUE, /* pc_relative */
252b5132
RH
493 0, /* bitpos */
494 complain_overflow_dont, /* complain_on_overflow */
495 elf64_alpha_reloc_nil, /* special_function */
496 "NONE", /* name */
b34976b6 497 FALSE, /* partial_inplace */
252b5132
RH
498 0, /* src_mask */
499 0, /* dst_mask */
b34976b6 500 TRUE), /* pcrel_offset */
252b5132
RH
501
502 /* A 32 bit reference to a symbol. */
503 HOWTO (R_ALPHA_REFLONG, /* type */
504 0, /* rightshift */
505 2, /* size (0 = byte, 1 = short, 2 = long) */
506 32, /* bitsize */
b34976b6 507 FALSE, /* pc_relative */
252b5132
RH
508 0, /* bitpos */
509 complain_overflow_bitfield, /* complain_on_overflow */
bc1bc43f 510 bfd_elf_generic_reloc, /* special_function */
252b5132 511 "REFLONG", /* name */
b34976b6 512 FALSE, /* partial_inplace */
252b5132
RH
513 0xffffffff, /* src_mask */
514 0xffffffff, /* dst_mask */
b34976b6 515 FALSE), /* pcrel_offset */
252b5132
RH
516
517 /* A 64 bit reference to a symbol. */
518 HOWTO (R_ALPHA_REFQUAD, /* type */
519 0, /* rightshift */
520 4, /* size (0 = byte, 1 = short, 2 = long) */
521 64, /* bitsize */
b34976b6 522 FALSE, /* pc_relative */
252b5132
RH
523 0, /* bitpos */
524 complain_overflow_bitfield, /* complain_on_overflow */
bc1bc43f 525 bfd_elf_generic_reloc, /* special_function */
252b5132 526 "REFQUAD", /* name */
b34976b6 527 FALSE, /* partial_inplace */
252b5132
RH
528 MINUS_ONE, /* src_mask */
529 MINUS_ONE, /* dst_mask */
b34976b6 530 FALSE), /* pcrel_offset */
252b5132
RH
531
532 /* A 32 bit GP relative offset. This is just like REFLONG except
533 that when the value is used the value of the gp register will be
534 added in. */
535 HOWTO (R_ALPHA_GPREL32, /* type */
536 0, /* rightshift */
537 2, /* size (0 = byte, 1 = short, 2 = long) */
538 32, /* bitsize */
b34976b6 539 FALSE, /* pc_relative */
252b5132
RH
540 0, /* bitpos */
541 complain_overflow_bitfield, /* complain_on_overflow */
bc1bc43f 542 bfd_elf_generic_reloc, /* special_function */
252b5132 543 "GPREL32", /* name */
b34976b6 544 FALSE, /* partial_inplace */
252b5132
RH
545 0xffffffff, /* src_mask */
546 0xffffffff, /* dst_mask */
b34976b6 547 FALSE), /* pcrel_offset */
252b5132
RH
548
549 /* Used for an instruction that refers to memory off the GP register. */
550 HOWTO (R_ALPHA_LITERAL, /* type */
551 0, /* rightshift */
dfe57ca0 552 1, /* size (0 = byte, 1 = short, 2 = long) */
252b5132 553 16, /* bitsize */
b34976b6 554 FALSE, /* pc_relative */
252b5132
RH
555 0, /* bitpos */
556 complain_overflow_signed, /* complain_on_overflow */
bc1bc43f 557 bfd_elf_generic_reloc, /* special_function */
252b5132 558 "ELF_LITERAL", /* name */
b34976b6 559 FALSE, /* partial_inplace */
252b5132
RH
560 0xffff, /* src_mask */
561 0xffff, /* dst_mask */
b34976b6 562 FALSE), /* pcrel_offset */
252b5132
RH
563
564 /* This reloc only appears immediately following an ELF_LITERAL reloc.
565 It identifies a use of the literal. The symbol index is special:
566 1 means the literal address is in the base register of a memory
567 format instruction; 2 means the literal address is in the byte
568 offset register of a byte-manipulation instruction; 3 means the
569 literal address is in the target register of a jsr instruction.
570 This does not actually do any relocation. */
571 HOWTO (R_ALPHA_LITUSE, /* type */
572 0, /* rightshift */
dfe57ca0 573 1, /* size (0 = byte, 1 = short, 2 = long) */
252b5132 574 32, /* bitsize */
b34976b6 575 FALSE, /* pc_relative */
252b5132
RH
576 0, /* bitpos */
577 complain_overflow_dont, /* complain_on_overflow */
578 elf64_alpha_reloc_nil, /* special_function */
579 "LITUSE", /* name */
b34976b6 580 FALSE, /* partial_inplace */
252b5132
RH
581 0, /* src_mask */
582 0, /* dst_mask */
b34976b6 583 FALSE), /* pcrel_offset */
252b5132
RH
584
585 /* Load the gp register. This is always used for a ldah instruction
586 which loads the upper 16 bits of the gp register. The symbol
587 index of the GPDISP instruction is an offset in bytes to the lda
588 instruction that loads the lower 16 bits. The value to use for
589 the relocation is the difference between the GP value and the
590 current location; the load will always be done against a register
591 holding the current address.
592
593 NOTE: Unlike ECOFF, partial in-place relocation is not done. If
594 any offset is present in the instructions, it is an offset from
595 the register to the ldah instruction. This lets us avoid any
596 stupid hackery like inventing a gp value to do partial relocation
597 against. Also unlike ECOFF, we do the whole relocation off of
598 the GPDISP rather than a GPDISP_HI16/GPDISP_LO16 pair. An odd,
599 space consuming bit, that, since all the information was present
600 in the GPDISP_HI16 reloc. */
601 HOWTO (R_ALPHA_GPDISP, /* type */
602 16, /* rightshift */
603 2, /* size (0 = byte, 1 = short, 2 = long) */
604 16, /* bitsize */
b34976b6 605 FALSE, /* pc_relative */
252b5132
RH
606 0, /* bitpos */
607 complain_overflow_dont, /* complain_on_overflow */
608 elf64_alpha_reloc_gpdisp, /* special_function */
609 "GPDISP", /* name */
b34976b6 610 FALSE, /* partial_inplace */
252b5132
RH
611 0xffff, /* src_mask */
612 0xffff, /* dst_mask */
b34976b6 613 TRUE), /* pcrel_offset */
252b5132
RH
614
615 /* A 21 bit branch. */
616 HOWTO (R_ALPHA_BRADDR, /* type */
617 2, /* rightshift */
618 2, /* size (0 = byte, 1 = short, 2 = long) */
619 21, /* bitsize */
b34976b6 620 TRUE, /* pc_relative */
252b5132
RH
621 0, /* bitpos */
622 complain_overflow_signed, /* complain_on_overflow */
bc1bc43f 623 bfd_elf_generic_reloc, /* special_function */
252b5132 624 "BRADDR", /* name */
b34976b6 625 FALSE, /* partial_inplace */
252b5132
RH
626 0x1fffff, /* src_mask */
627 0x1fffff, /* dst_mask */
b34976b6 628 TRUE), /* pcrel_offset */
252b5132
RH
629
630 /* A hint for a jump to a register. */
631 HOWTO (R_ALPHA_HINT, /* type */
632 2, /* rightshift */
dfe57ca0 633 1, /* size (0 = byte, 1 = short, 2 = long) */
252b5132 634 14, /* bitsize */
b34976b6 635 TRUE, /* pc_relative */
252b5132
RH
636 0, /* bitpos */
637 complain_overflow_dont, /* complain_on_overflow */
bc1bc43f 638 bfd_elf_generic_reloc, /* special_function */
252b5132 639 "HINT", /* name */
b34976b6 640 FALSE, /* partial_inplace */
252b5132
RH
641 0x3fff, /* src_mask */
642 0x3fff, /* dst_mask */
b34976b6 643 TRUE), /* pcrel_offset */
252b5132
RH
644
645 /* 16 bit PC relative offset. */
646 HOWTO (R_ALPHA_SREL16, /* type */
647 0, /* rightshift */
648 1, /* size (0 = byte, 1 = short, 2 = long) */
649 16, /* bitsize */
b34976b6 650 TRUE, /* pc_relative */
252b5132
RH
651 0, /* bitpos */
652 complain_overflow_signed, /* complain_on_overflow */
bc1bc43f 653 bfd_elf_generic_reloc, /* special_function */
252b5132 654 "SREL16", /* name */
b34976b6 655 FALSE, /* partial_inplace */
252b5132
RH
656 0xffff, /* src_mask */
657 0xffff, /* dst_mask */
b34976b6 658 TRUE), /* pcrel_offset */
252b5132
RH
659
660 /* 32 bit PC relative offset. */
661 HOWTO (R_ALPHA_SREL32, /* type */
662 0, /* rightshift */
663 2, /* size (0 = byte, 1 = short, 2 = long) */
664 32, /* bitsize */
b34976b6 665 TRUE, /* pc_relative */
252b5132
RH
666 0, /* bitpos */
667 complain_overflow_signed, /* complain_on_overflow */
bc1bc43f 668 bfd_elf_generic_reloc, /* special_function */
252b5132 669 "SREL32", /* name */
b34976b6 670 FALSE, /* partial_inplace */
252b5132
RH
671 0xffffffff, /* src_mask */
672 0xffffffff, /* dst_mask */
b34976b6 673 TRUE), /* pcrel_offset */
252b5132
RH
674
675 /* A 64 bit PC relative offset. */
676 HOWTO (R_ALPHA_SREL64, /* type */
677 0, /* rightshift */
678 4, /* size (0 = byte, 1 = short, 2 = long) */
679 64, /* bitsize */
b34976b6 680 TRUE, /* pc_relative */
252b5132
RH
681 0, /* bitpos */
682 complain_overflow_signed, /* complain_on_overflow */
bc1bc43f 683 bfd_elf_generic_reloc, /* special_function */
252b5132 684 "SREL64", /* name */
b34976b6 685 FALSE, /* partial_inplace */
252b5132
RH
686 MINUS_ONE, /* src_mask */
687 MINUS_ONE, /* dst_mask */
b34976b6 688 TRUE), /* pcrel_offset */
252b5132 689
dfe57ca0
RH
690 /* Skip 12 - 16; deprecated ECOFF relocs. */
691 SKIP_HOWTO (12),
692 SKIP_HOWTO (13),
693 SKIP_HOWTO (14),
694 SKIP_HOWTO (15),
695 SKIP_HOWTO (16),
252b5132
RH
696
697 /* The high 16 bits of the displacement from GP to the target. */
698 HOWTO (R_ALPHA_GPRELHIGH,
699 0, /* rightshift */
dfe57ca0 700 1, /* size (0 = byte, 1 = short, 2 = long) */
252b5132 701 16, /* bitsize */
b34976b6 702 FALSE, /* pc_relative */
252b5132
RH
703 0, /* bitpos */
704 complain_overflow_signed, /* complain_on_overflow */
bc1bc43f 705 bfd_elf_generic_reloc, /* special_function */
252b5132 706 "GPRELHIGH", /* name */
b34976b6 707 FALSE, /* partial_inplace */
252b5132
RH
708 0xffff, /* src_mask */
709 0xffff, /* dst_mask */
b34976b6 710 FALSE), /* pcrel_offset */
252b5132
RH
711
712 /* The low 16 bits of the displacement from GP to the target. */
713 HOWTO (R_ALPHA_GPRELLOW,
714 0, /* rightshift */
dfe57ca0 715 1, /* size (0 = byte, 1 = short, 2 = long) */
252b5132 716 16, /* bitsize */
b34976b6 717 FALSE, /* pc_relative */
252b5132
RH
718 0, /* bitpos */
719 complain_overflow_dont, /* complain_on_overflow */
bc1bc43f 720 bfd_elf_generic_reloc, /* special_function */
252b5132 721 "GPRELLOW", /* name */
b34976b6 722 FALSE, /* partial_inplace */
252b5132
RH
723 0xffff, /* src_mask */
724 0xffff, /* dst_mask */
b34976b6 725 FALSE), /* pcrel_offset */
252b5132
RH
726
727 /* A 16-bit displacement from the GP to the target. */
dfe57ca0 728 HOWTO (R_ALPHA_GPREL16,
252b5132 729 0, /* rightshift */
dfe57ca0 730 1, /* size (0 = byte, 1 = short, 2 = long) */
252b5132 731 16, /* bitsize */
b34976b6 732 FALSE, /* pc_relative */
252b5132
RH
733 0, /* bitpos */
734 complain_overflow_signed, /* complain_on_overflow */
bc1bc43f 735 bfd_elf_generic_reloc, /* special_function */
dfe57ca0 736 "GPREL16", /* name */
b34976b6 737 FALSE, /* partial_inplace */
252b5132
RH
738 0xffff, /* src_mask */
739 0xffff, /* dst_mask */
b34976b6 740 FALSE), /* pcrel_offset */
252b5132 741
dfe57ca0
RH
742 /* Skip 20 - 23; deprecated ECOFF relocs. */
743 SKIP_HOWTO (20),
744 SKIP_HOWTO (21),
745 SKIP_HOWTO (22),
746 SKIP_HOWTO (23),
252b5132 747
fe8bc63d 748 /* Misc ELF relocations. */
252b5132
RH
749
750 /* A dynamic relocation to copy the target into our .dynbss section. */
751 /* Not generated, as all Alpha objects use PIC, so it is not needed. It
752 is present because every other ELF has one, but should not be used
753 because .dynbss is an ugly thing. */
754 HOWTO (R_ALPHA_COPY,
755 0,
756 0,
757 0,
b34976b6 758 FALSE,
252b5132
RH
759 0,
760 complain_overflow_dont,
761 bfd_elf_generic_reloc,
762 "COPY",
b34976b6 763 FALSE,
252b5132
RH
764 0,
765 0,
b34976b6 766 TRUE),
252b5132
RH
767
768 /* A dynamic relocation for a .got entry. */
769 HOWTO (R_ALPHA_GLOB_DAT,
770 0,
771 0,
772 0,
b34976b6 773 FALSE,
252b5132
RH
774 0,
775 complain_overflow_dont,
776 bfd_elf_generic_reloc,
777 "GLOB_DAT",
b34976b6 778 FALSE,
252b5132
RH
779 0,
780 0,
b34976b6 781 TRUE),
252b5132
RH
782
783 /* A dynamic relocation for a .plt entry. */
784 HOWTO (R_ALPHA_JMP_SLOT,
785 0,
786 0,
787 0,
b34976b6 788 FALSE,
252b5132
RH
789 0,
790 complain_overflow_dont,
791 bfd_elf_generic_reloc,
792 "JMP_SLOT",
b34976b6 793 FALSE,
252b5132
RH
794 0,
795 0,
b34976b6 796 TRUE),
252b5132
RH
797
798 /* A dynamic relocation to add the base of the DSO to a 64-bit field. */
799 HOWTO (R_ALPHA_RELATIVE,
800 0,
801 0,
802 0,
b34976b6 803 FALSE,
252b5132
RH
804 0,
805 complain_overflow_dont,
806 bfd_elf_generic_reloc,
807 "RELATIVE",
b34976b6 808 FALSE,
252b5132
RH
809 0,
810 0,
b34976b6 811 TRUE),
7793f4d0
RH
812
813 /* A 21 bit branch that adjusts for gp loads. */
814 HOWTO (R_ALPHA_BRSGP, /* type */
815 2, /* rightshift */
816 2, /* size (0 = byte, 1 = short, 2 = long) */
817 21, /* bitsize */
b34976b6 818 TRUE, /* pc_relative */
7793f4d0
RH
819 0, /* bitpos */
820 complain_overflow_signed, /* complain_on_overflow */
bc1bc43f 821 bfd_elf_generic_reloc, /* special_function */
7793f4d0 822 "BRSGP", /* name */
b34976b6 823 FALSE, /* partial_inplace */
7793f4d0
RH
824 0x1fffff, /* src_mask */
825 0x1fffff, /* dst_mask */
b34976b6 826 TRUE), /* pcrel_offset */
3765b1be
RH
827
828 /* Creates a tls_index for the symbol in the got. */
829 HOWTO (R_ALPHA_TLSGD, /* type */
830 0, /* rightshift */
831 1, /* size (0 = byte, 1 = short, 2 = long) */
832 16, /* bitsize */
b34976b6 833 FALSE, /* pc_relative */
3765b1be
RH
834 0, /* bitpos */
835 complain_overflow_signed, /* complain_on_overflow */
bc1bc43f 836 bfd_elf_generic_reloc, /* special_function */
3765b1be 837 "TLSGD", /* name */
b34976b6 838 FALSE, /* partial_inplace */
3765b1be
RH
839 0xffff, /* src_mask */
840 0xffff, /* dst_mask */
b34976b6 841 FALSE), /* pcrel_offset */
3765b1be
RH
842
843 /* Creates a tls_index for the (current) module in the got. */
844 HOWTO (R_ALPHA_TLSLDM, /* type */
845 0, /* rightshift */
846 1, /* size (0 = byte, 1 = short, 2 = long) */
847 16, /* bitsize */
b34976b6 848 FALSE, /* pc_relative */
3765b1be
RH
849 0, /* bitpos */
850 complain_overflow_signed, /* complain_on_overflow */
bc1bc43f 851 bfd_elf_generic_reloc, /* special_function */
3765b1be 852 "TLSLDM", /* name */
b34976b6 853 FALSE, /* partial_inplace */
3765b1be
RH
854 0xffff, /* src_mask */
855 0xffff, /* dst_mask */
b34976b6 856 FALSE), /* pcrel_offset */
3765b1be
RH
857
858 /* A dynamic relocation for a DTP module entry. */
859 HOWTO (R_ALPHA_DTPMOD64, /* type */
860 0, /* rightshift */
861 4, /* size (0 = byte, 1 = short, 2 = long) */
862 64, /* bitsize */
b34976b6 863 FALSE, /* pc_relative */
3765b1be
RH
864 0, /* bitpos */
865 complain_overflow_bitfield, /* complain_on_overflow */
bc1bc43f 866 bfd_elf_generic_reloc, /* special_function */
3765b1be 867 "DTPMOD64", /* name */
b34976b6 868 FALSE, /* partial_inplace */
3765b1be
RH
869 MINUS_ONE, /* src_mask */
870 MINUS_ONE, /* dst_mask */
b34976b6 871 FALSE), /* pcrel_offset */
3765b1be
RH
872
873 /* Creates a 64-bit offset in the got for the displacement
874 from DTP to the target. */
875 HOWTO (R_ALPHA_GOTDTPREL, /* type */
876 0, /* rightshift */
877 1, /* size (0 = byte, 1 = short, 2 = long) */
878 16, /* bitsize */
b34976b6 879 FALSE, /* pc_relative */
3765b1be
RH
880 0, /* bitpos */
881 complain_overflow_signed, /* complain_on_overflow */
bc1bc43f 882 bfd_elf_generic_reloc, /* special_function */
3765b1be 883 "GOTDTPREL", /* name */
b34976b6 884 FALSE, /* partial_inplace */
3765b1be
RH
885 0xffff, /* src_mask */
886 0xffff, /* dst_mask */
b34976b6 887 FALSE), /* pcrel_offset */
3765b1be
RH
888
889 /* A dynamic relocation for a displacement from DTP to the target. */
890 HOWTO (R_ALPHA_DTPREL64, /* type */
891 0, /* rightshift */
892 4, /* size (0 = byte, 1 = short, 2 = long) */
893 64, /* bitsize */
b34976b6 894 FALSE, /* pc_relative */
3765b1be
RH
895 0, /* bitpos */
896 complain_overflow_bitfield, /* complain_on_overflow */
bc1bc43f 897 bfd_elf_generic_reloc, /* special_function */
3765b1be 898 "DTPREL64", /* name */
b34976b6 899 FALSE, /* partial_inplace */
3765b1be
RH
900 MINUS_ONE, /* src_mask */
901 MINUS_ONE, /* dst_mask */
b34976b6 902 FALSE), /* pcrel_offset */
3765b1be
RH
903
904 /* The high 16 bits of the displacement from DTP to the target. */
905 HOWTO (R_ALPHA_DTPRELHI, /* type */
906 0, /* rightshift */
907 1, /* size (0 = byte, 1 = short, 2 = long) */
908 16, /* bitsize */
b34976b6 909 FALSE, /* pc_relative */
3765b1be
RH
910 0, /* bitpos */
911 complain_overflow_signed, /* complain_on_overflow */
bc1bc43f 912 bfd_elf_generic_reloc, /* special_function */
3765b1be 913 "DTPRELHI", /* name */
b34976b6 914 FALSE, /* partial_inplace */
3765b1be
RH
915 0xffff, /* src_mask */
916 0xffff, /* dst_mask */
b34976b6 917 FALSE), /* pcrel_offset */
3765b1be
RH
918
919 /* The low 16 bits of the displacement from DTP to the target. */
920 HOWTO (R_ALPHA_DTPRELLO, /* type */
921 0, /* rightshift */
922 1, /* size (0 = byte, 1 = short, 2 = long) */
923 16, /* bitsize */
b34976b6 924 FALSE, /* pc_relative */
3765b1be
RH
925 0, /* bitpos */
926 complain_overflow_dont, /* complain_on_overflow */
bc1bc43f 927 bfd_elf_generic_reloc, /* special_function */
3765b1be 928 "DTPRELLO", /* name */
b34976b6 929 FALSE, /* partial_inplace */
3765b1be
RH
930 0xffff, /* src_mask */
931 0xffff, /* dst_mask */
b34976b6 932 FALSE), /* pcrel_offset */
3765b1be
RH
933
934 /* A 16-bit displacement from DTP to the target. */
935 HOWTO (R_ALPHA_DTPREL16, /* type */
936 0, /* rightshift */
937 1, /* size (0 = byte, 1 = short, 2 = long) */
938 16, /* bitsize */
b34976b6 939 FALSE, /* pc_relative */
3765b1be
RH
940 0, /* bitpos */
941 complain_overflow_signed, /* complain_on_overflow */
bc1bc43f 942 bfd_elf_generic_reloc, /* special_function */
3765b1be 943 "DTPREL16", /* name */
b34976b6 944 FALSE, /* partial_inplace */
3765b1be
RH
945 0xffff, /* src_mask */
946 0xffff, /* dst_mask */
b34976b6 947 FALSE), /* pcrel_offset */
3765b1be
RH
948
949 /* Creates a 64-bit offset in the got for the displacement
950 from TP to the target. */
951 HOWTO (R_ALPHA_GOTTPREL, /* type */
952 0, /* rightshift */
953 1, /* size (0 = byte, 1 = short, 2 = long) */
954 16, /* bitsize */
b34976b6 955 FALSE, /* pc_relative */
3765b1be
RH
956 0, /* bitpos */
957 complain_overflow_signed, /* complain_on_overflow */
bc1bc43f 958 bfd_elf_generic_reloc, /* special_function */
3765b1be 959 "GOTTPREL", /* name */
b34976b6 960 FALSE, /* partial_inplace */
3765b1be
RH
961 0xffff, /* src_mask */
962 0xffff, /* dst_mask */
b34976b6 963 FALSE), /* pcrel_offset */
3765b1be
RH
964
965 /* A dynamic relocation for a displacement from TP to the target. */
966 HOWTO (R_ALPHA_TPREL64, /* type */
967 0, /* rightshift */
968 4, /* size (0 = byte, 1 = short, 2 = long) */
969 64, /* bitsize */
b34976b6 970 FALSE, /* pc_relative */
3765b1be
RH
971 0, /* bitpos */
972 complain_overflow_bitfield, /* complain_on_overflow */
bc1bc43f 973 bfd_elf_generic_reloc, /* special_function */
3765b1be 974 "TPREL64", /* name */
b34976b6 975 FALSE, /* partial_inplace */
3765b1be
RH
976 MINUS_ONE, /* src_mask */
977 MINUS_ONE, /* dst_mask */
b34976b6 978 FALSE), /* pcrel_offset */
3765b1be
RH
979
980 /* The high 16 bits of the displacement from TP to the target. */
981 HOWTO (R_ALPHA_TPRELHI, /* type */
982 0, /* rightshift */
983 1, /* size (0 = byte, 1 = short, 2 = long) */
984 16, /* bitsize */
b34976b6 985 FALSE, /* pc_relative */
3765b1be
RH
986 0, /* bitpos */
987 complain_overflow_signed, /* complain_on_overflow */
bc1bc43f 988 bfd_elf_generic_reloc, /* special_function */
3765b1be 989 "TPRELHI", /* name */
b34976b6 990 FALSE, /* partial_inplace */
3765b1be
RH
991 0xffff, /* src_mask */
992 0xffff, /* dst_mask */
b34976b6 993 FALSE), /* pcrel_offset */
3765b1be
RH
994
995 /* The low 16 bits of the displacement from TP to the target. */
996 HOWTO (R_ALPHA_TPRELLO, /* type */
997 0, /* rightshift */
998 1, /* size (0 = byte, 1 = short, 2 = long) */
999 16, /* bitsize */
b34976b6 1000 FALSE, /* pc_relative */
3765b1be
RH
1001 0, /* bitpos */
1002 complain_overflow_dont, /* complain_on_overflow */
bc1bc43f 1003 bfd_elf_generic_reloc, /* special_function */
3765b1be 1004 "TPRELLO", /* name */
b34976b6 1005 FALSE, /* partial_inplace */
3765b1be
RH
1006 0xffff, /* src_mask */
1007 0xffff, /* dst_mask */
b34976b6 1008 FALSE), /* pcrel_offset */
3765b1be
RH
1009
1010 /* A 16-bit displacement from TP to the target. */
1011 HOWTO (R_ALPHA_TPREL16, /* type */
1012 0, /* rightshift */
1013 1, /* size (0 = byte, 1 = short, 2 = long) */
1014 16, /* bitsize */
b34976b6 1015 FALSE, /* pc_relative */
3765b1be
RH
1016 0, /* bitpos */
1017 complain_overflow_signed, /* complain_on_overflow */
bc1bc43f 1018 bfd_elf_generic_reloc, /* special_function */
3765b1be 1019 "TPREL16", /* name */
b34976b6 1020 FALSE, /* partial_inplace */
3765b1be
RH
1021 0xffff, /* src_mask */
1022 0xffff, /* dst_mask */
b34976b6 1023 FALSE), /* pcrel_offset */
252b5132
RH
1024};
1025
252b5132
RH
1026/* A mapping from BFD reloc types to Alpha ELF reloc types. */
1027
1028struct elf_reloc_map
1029{
1030 bfd_reloc_code_real_type bfd_reloc_val;
1031 int elf_reloc_val;
1032};
1033
1034static const struct elf_reloc_map elf64_alpha_reloc_map[] =
1035{
dfe57ca0
RH
1036 {BFD_RELOC_NONE, R_ALPHA_NONE},
1037 {BFD_RELOC_32, R_ALPHA_REFLONG},
1038 {BFD_RELOC_64, R_ALPHA_REFQUAD},
1039 {BFD_RELOC_CTOR, R_ALPHA_REFQUAD},
1040 {BFD_RELOC_GPREL32, R_ALPHA_GPREL32},
1041 {BFD_RELOC_ALPHA_ELF_LITERAL, R_ALPHA_LITERAL},
1042 {BFD_RELOC_ALPHA_LITUSE, R_ALPHA_LITUSE},
1043 {BFD_RELOC_ALPHA_GPDISP, R_ALPHA_GPDISP},
1044 {BFD_RELOC_23_PCREL_S2, R_ALPHA_BRADDR},
1045 {BFD_RELOC_ALPHA_HINT, R_ALPHA_HINT},
1046 {BFD_RELOC_16_PCREL, R_ALPHA_SREL16},
1047 {BFD_RELOC_32_PCREL, R_ALPHA_SREL32},
1048 {BFD_RELOC_64_PCREL, R_ALPHA_SREL64},
1049 {BFD_RELOC_ALPHA_GPREL_HI16, R_ALPHA_GPRELHIGH},
1050 {BFD_RELOC_ALPHA_GPREL_LO16, R_ALPHA_GPRELLOW},
1051 {BFD_RELOC_GPREL16, R_ALPHA_GPREL16},
7793f4d0 1052 {BFD_RELOC_ALPHA_BRSGP, R_ALPHA_BRSGP},
3765b1be
RH
1053 {BFD_RELOC_ALPHA_TLSGD, R_ALPHA_TLSGD},
1054 {BFD_RELOC_ALPHA_TLSLDM, R_ALPHA_TLSLDM},
1055 {BFD_RELOC_ALPHA_DTPMOD64, R_ALPHA_DTPMOD64},
1056 {BFD_RELOC_ALPHA_GOTDTPREL16, R_ALPHA_GOTDTPREL},
1057 {BFD_RELOC_ALPHA_DTPREL64, R_ALPHA_DTPREL64},
1058 {BFD_RELOC_ALPHA_DTPREL_HI16, R_ALPHA_DTPRELHI},
1059 {BFD_RELOC_ALPHA_DTPREL_LO16, R_ALPHA_DTPRELLO},
1060 {BFD_RELOC_ALPHA_DTPREL16, R_ALPHA_DTPREL16},
1061 {BFD_RELOC_ALPHA_GOTTPREL16, R_ALPHA_GOTTPREL},
1062 {BFD_RELOC_ALPHA_TPREL64, R_ALPHA_TPREL64},
1063 {BFD_RELOC_ALPHA_TPREL_HI16, R_ALPHA_TPRELHI},
1064 {BFD_RELOC_ALPHA_TPREL_LO16, R_ALPHA_TPRELLO},
1065 {BFD_RELOC_ALPHA_TPREL16, R_ALPHA_TPREL16},
252b5132
RH
1066};
1067
1068/* Given a BFD reloc type, return a HOWTO structure. */
1069
1070static reloc_howto_type *
a7519a3c
RH
1071elf64_alpha_bfd_reloc_type_lookup (bfd *abfd ATTRIBUTE_UNUSED,
1072 bfd_reloc_code_real_type code)
252b5132
RH
1073{
1074 const struct elf_reloc_map *i, *e;
1075 i = e = elf64_alpha_reloc_map;
1076 e += sizeof (elf64_alpha_reloc_map) / sizeof (struct elf_reloc_map);
1077 for (; i != e; ++i)
1078 {
1079 if (i->bfd_reloc_val == code)
1080 return &elf64_alpha_howto_table[i->elf_reloc_val];
1081 }
1082 return 0;
1083}
1084
157090f7
AM
1085static reloc_howto_type *
1086elf64_alpha_bfd_reloc_name_lookup (bfd *abfd ATTRIBUTE_UNUSED,
1087 const char *r_name)
1088{
1089 unsigned int i;
1090
1091 for (i = 0;
1092 i < (sizeof (elf64_alpha_howto_table)
1093 / sizeof (elf64_alpha_howto_table[0]));
1094 i++)
1095 if (elf64_alpha_howto_table[i].name != NULL
1096 && strcasecmp (elf64_alpha_howto_table[i].name, r_name) == 0)
1097 return &elf64_alpha_howto_table[i];
1098
1099 return NULL;
1100}
1101
252b5132
RH
1102/* Given an Alpha ELF reloc type, fill in an arelent structure. */
1103
f3185997 1104static bfd_boolean
0aa13fee 1105elf64_alpha_info_to_howto (bfd *abfd, arelent *cache_ptr,
a7519a3c 1106 Elf_Internal_Rela *dst)
252b5132 1107{
a7519a3c 1108 unsigned r_type = ELF64_R_TYPE(dst->r_info);
cd21f5da
NC
1109
1110 if (r_type >= R_ALPHA_max)
1111 {
695344c0 1112 /* xgettext:c-format */
0aa13fee 1113 _bfd_error_handler (_("%pB: unsupported relocation type %#x"),
4eca0228 1114 abfd, r_type);
cd21f5da 1115 bfd_set_error (bfd_error_bad_value);
f3185997 1116 return FALSE;
cd21f5da 1117 }
252b5132 1118 cache_ptr->howto = &elf64_alpha_howto_table[r_type];
f3185997 1119 return TRUE;
252b5132 1120}
3765b1be
RH
1121
1122/* These two relocations create a two-word entry in the got. */
1123#define alpha_got_entry_size(r_type) \
1124 (r_type == R_ALPHA_TLSGD || r_type == R_ALPHA_TLSLDM ? 16 : 8)
9e756d64
RH
1125
1126/* This is PT_TLS segment p_vaddr. */
e1918d23
AM
1127#define alpha_get_dtprel_base(info) \
1128 (elf_hash_table (info)->tls_sec->vma)
9e756d64
RH
1129
1130/* Main program TLS (whose template starts at PT_TLS p_vaddr)
1131 is assigned offset round(16, PT_TLS p_align). */
e1918d23
AM
1132#define alpha_get_tprel_base(info) \
1133 (elf_hash_table (info)->tls_sec->vma \
1134 - align_power ((bfd_vma) 16, \
1135 elf_hash_table (info)->tls_sec->alignment_power))
252b5132 1136\f
a7519a3c
RH
1137/* Handle an Alpha specific section when reading an object file. This
1138 is called when bfd_section_from_shdr finds a section with an unknown
1139 type.
1140 FIXME: We need to handle the SHF_ALPHA_GPREL flag, but I'm not sure
1141 how to. */
252b5132 1142
a7519a3c
RH
1143static bfd_boolean
1144elf64_alpha_section_from_shdr (bfd *abfd,
1145 Elf_Internal_Shdr *hdr,
1146 const char *name,
1147 int shindex)
252b5132 1148{
a7519a3c
RH
1149 asection *newsect;
1150
1151 /* There ought to be a place to keep ELF backend specific flags, but
1152 at the moment there isn't one. We just keep track of the
1153 sections by their name, instead. Fortunately, the ABI gives
1154 suggested names for all the MIPS specific sections, so we will
1155 probably get away with this. */
1156 switch (hdr->sh_type)
1157 {
1158 case SHT_ALPHA_DEBUG:
1159 if (strcmp (name, ".mdebug") != 0)
1160 return FALSE;
1161 break;
1162 default:
1163 return FALSE;
1164 }
252b5132 1165
a7519a3c
RH
1166 if (! _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex))
1167 return FALSE;
1168 newsect = hdr->bfd_section;
252b5132 1169
a7519a3c 1170 if (hdr->sh_type == SHT_ALPHA_DEBUG)
252b5132 1171 {
fd361982
AM
1172 if (!bfd_set_section_flags (newsect,
1173 bfd_section_flags (newsect) | SEC_DEBUGGING))
a7519a3c 1174 return FALSE;
252b5132 1175 }
a7519a3c
RH
1176
1177 return TRUE;
252b5132
RH
1178}
1179
a7519a3c
RH
1180/* Convert Alpha specific section flags to bfd internal section flags. */
1181
b34976b6 1182static bfd_boolean
a7519a3c 1183elf64_alpha_section_flags (flagword *flags, const Elf_Internal_Shdr *hdr)
252b5132 1184{
a7519a3c
RH
1185 if (hdr->sh_flags & SHF_ALPHA_GPREL)
1186 *flags |= SEC_SMALL_DATA;
252b5132 1187
a7519a3c
RH
1188 return TRUE;
1189}
252b5132 1190
a7519a3c
RH
1191/* Set the correct type for an Alpha ELF section. We do this by the
1192 section name, which is a hack, but ought to work. */
9e756d64 1193
a7519a3c
RH
1194static bfd_boolean
1195elf64_alpha_fake_sections (bfd *abfd, Elf_Internal_Shdr *hdr, asection *sec)
1196{
1197 register const char *name;
1198
fd361982 1199 name = bfd_section_name (sec);
a7519a3c
RH
1200
1201 if (strcmp (name, ".mdebug") == 0)
252b5132 1202 {
a7519a3c
RH
1203 hdr->sh_type = SHT_ALPHA_DEBUG;
1204 /* In a shared object on Irix 5.3, the .mdebug section has an
07d6d2b8 1205 entsize of 0. FIXME: Does this matter? */
a7519a3c
RH
1206 if ((abfd->flags & DYNAMIC) != 0 )
1207 hdr->sh_entsize = 0;
1208 else
1209 hdr->sh_entsize = 1;
252b5132 1210 }
a7519a3c
RH
1211 else if ((sec->flags & SEC_SMALL_DATA)
1212 || strcmp (name, ".sdata") == 0
1213 || strcmp (name, ".sbss") == 0
1214 || strcmp (name, ".lit4") == 0
1215 || strcmp (name, ".lit8") == 0)
1216 hdr->sh_flags |= SHF_ALPHA_GPREL;
252b5132 1217
a7519a3c
RH
1218 return TRUE;
1219}
252b5132 1220
a7519a3c
RH
1221/* Hook called by the linker routine which adds symbols from an object
1222 file. We use it to put .comm items in .sbss, and not .bss. */
1223
1224static bfd_boolean
1225elf64_alpha_add_symbol_hook (bfd *abfd, struct bfd_link_info *info,
1226 Elf_Internal_Sym *sym,
1227 const char **namep ATTRIBUTE_UNUSED,
1228 flagword *flagsp ATTRIBUTE_UNUSED,
1229 asection **secp, bfd_vma *valp)
1230{
1231 if (sym->st_shndx == SHN_COMMON
0e1862bb 1232 && !bfd_link_relocatable (info)
a7519a3c 1233 && sym->st_size <= elf_gp_size (abfd))
252b5132 1234 {
a7519a3c
RH
1235 /* Common symbols less than or equal to -G nn bytes are
1236 automatically put into .sbss. */
ffcb7aff 1237
a7519a3c 1238 asection *scomm = bfd_get_section_by_name (abfd, ".scommon");
252b5132 1239
a7519a3c 1240 if (scomm == NULL)
252b5132 1241 {
a7519a3c
RH
1242 scomm = bfd_make_section_with_flags (abfd, ".scommon",
1243 (SEC_ALLOC
1244 | SEC_IS_COMMON
1245 | SEC_LINKER_CREATED));
1246 if (scomm == NULL)
1247 return FALSE;
1248 }
ffcb7aff 1249
a7519a3c
RH
1250 *secp = scomm;
1251 *valp = sym->st_size;
1252 }
ffcb7aff 1253
a7519a3c
RH
1254 return TRUE;
1255}
252b5132 1256
a7519a3c 1257/* Create the .got section. */
252b5132 1258
a7519a3c
RH
1259static bfd_boolean
1260elf64_alpha_create_got_section (bfd *abfd,
1261 struct bfd_link_info *info ATTRIBUTE_UNUSED)
1262{
85d162e6 1263 flagword flags;
a7519a3c 1264 asection *s;
252b5132 1265
0ffa91dd
NC
1266 if (! is_alpha_elf (abfd))
1267 return FALSE;
1268
85d162e6
AM
1269 flags = (SEC_ALLOC | SEC_LOAD | SEC_HAS_CONTENTS | SEC_IN_MEMORY
1270 | SEC_LINKER_CREATED);
1271 s = bfd_make_section_anyway_with_flags (abfd, ".got", flags);
a7519a3c 1272 if (s == NULL
fd361982 1273 || !bfd_set_section_alignment (s, 3))
a7519a3c 1274 return FALSE;
252b5132 1275
a7519a3c 1276 alpha_elf_tdata (abfd)->got = s;
252b5132 1277
85d162e6
AM
1278 /* Make sure the object's gotobj is set to itself so that we default
1279 to every object with its own .got. We'll merge .gots later once
1280 we've collected each object's info. */
1281 alpha_elf_tdata (abfd)->gotobj = abfd;
1282
a7519a3c
RH
1283 return TRUE;
1284}
252b5132 1285
a7519a3c 1286/* Create all the dynamic sections. */
252b5132 1287
a7519a3c
RH
1288static bfd_boolean
1289elf64_alpha_create_dynamic_sections (bfd *abfd, struct bfd_link_info *info)
1290{
1291 asection *s;
85d162e6 1292 flagword flags;
a7519a3c 1293 struct elf_link_hash_entry *h;
252b5132 1294
0ffa91dd
NC
1295 if (! is_alpha_elf (abfd))
1296 return FALSE;
1297
a7519a3c 1298 /* We need to create .plt, .rela.plt, .got, and .rela.got sections. */
252b5132 1299
85d162e6
AM
1300 flags = (SEC_ALLOC | SEC_LOAD | SEC_CODE | SEC_HAS_CONTENTS | SEC_IN_MEMORY
1301 | SEC_LINKER_CREATED
1302 | (elf64_alpha_use_secureplt ? SEC_READONLY : 0));
1303 s = bfd_make_section_anyway_with_flags (abfd, ".plt", flags);
ce558b89 1304 elf_hash_table (info)->splt = s;
fd361982 1305 if (s == NULL || ! bfd_set_section_alignment (s, 4))
a7519a3c 1306 return FALSE;
252b5132 1307
a7519a3c
RH
1308 /* Define the symbol _PROCEDURE_LINKAGE_TABLE_ at the start of the
1309 .plt section. */
7325306f
RS
1310 h = _bfd_elf_define_linkage_sym (abfd, info, s,
1311 "_PROCEDURE_LINKAGE_TABLE_");
1312 elf_hash_table (info)->hplt = h;
1313 if (h == NULL)
a7519a3c 1314 return FALSE;
d6ad34f6 1315
85d162e6
AM
1316 flags = (SEC_ALLOC | SEC_LOAD | SEC_HAS_CONTENTS | SEC_IN_MEMORY
1317 | SEC_LINKER_CREATED | SEC_READONLY);
1318 s = bfd_make_section_anyway_with_flags (abfd, ".rela.plt", flags);
ce558b89 1319 elf_hash_table (info)->srelplt = s;
fd361982 1320 if (s == NULL || ! bfd_set_section_alignment (s, 3))
a7519a3c 1321 return FALSE;
252b5132 1322
6ec7057a
RH
1323 if (elf64_alpha_use_secureplt)
1324 {
85d162e6
AM
1325 flags = SEC_ALLOC | SEC_LINKER_CREATED;
1326 s = bfd_make_section_anyway_with_flags (abfd, ".got.plt", flags);
ce558b89 1327 elf_hash_table (info)->sgotplt = s;
fd361982 1328 if (s == NULL || ! bfd_set_section_alignment (s, 3))
6ec7057a
RH
1329 return FALSE;
1330 }
1331
a7519a3c
RH
1332 /* We may or may not have created a .got section for this object, but
1333 we definitely havn't done the rest of the work. */
1cd6895c 1334
85d162e6
AM
1335 if (alpha_elf_tdata(abfd)->gotobj == NULL)
1336 {
1337 if (!elf64_alpha_create_got_section (abfd, info))
1338 return FALSE;
1339 }
1cd6895c 1340
85d162e6
AM
1341 flags = (SEC_ALLOC | SEC_LOAD | SEC_HAS_CONTENTS | SEC_IN_MEMORY
1342 | SEC_LINKER_CREATED | SEC_READONLY);
1343 s = bfd_make_section_anyway_with_flags (abfd, ".rela.got", flags);
ce558b89 1344 elf_hash_table (info)->srelgot = s;
a7519a3c 1345 if (s == NULL
fd361982 1346 || !bfd_set_section_alignment (s, 3))
a7519a3c 1347 return FALSE;
252b5132 1348
a7519a3c
RH
1349 /* Define the symbol _GLOBAL_OFFSET_TABLE_ at the start of the
1350 dynobj's .got section. We don't do this in the linker script
1351 because we don't want to define the symbol if we are not creating
1352 a global offset table. */
d98685ac
AM
1353 h = _bfd_elf_define_linkage_sym (abfd, info, alpha_elf_tdata(abfd)->got,
1354 "_GLOBAL_OFFSET_TABLE_");
a7519a3c 1355 elf_hash_table (info)->hgot = h;
d98685ac
AM
1356 if (h == NULL)
1357 return FALSE;
252b5132 1358
a7519a3c 1359 return TRUE;
252b5132 1360}
a7519a3c
RH
1361\f
1362/* Read ECOFF debugging information from a .mdebug section into a
1363 ecoff_debug_info structure. */
252b5132 1364
a7519a3c
RH
1365static bfd_boolean
1366elf64_alpha_read_ecoff_info (bfd *abfd, asection *section,
1367 struct ecoff_debug_info *debug)
252b5132 1368{
a7519a3c
RH
1369 HDRR *symhdr;
1370 const struct ecoff_debug_swap *swap;
1371 char *ext_hdr = NULL;
252b5132 1372
a7519a3c
RH
1373 swap = get_elf_backend_data (abfd)->elf_backend_ecoff_debug_swap;
1374 memset (debug, 0, sizeof (*debug));
252b5132 1375
a7519a3c
RH
1376 ext_hdr = (char *) bfd_malloc (swap->external_hdr_size);
1377 if (ext_hdr == NULL && swap->external_hdr_size != 0)
1378 goto error_return;
252b5132 1379
a7519a3c
RH
1380 if (! bfd_get_section_contents (abfd, section, ext_hdr, (file_ptr) 0,
1381 swap->external_hdr_size))
1382 goto error_return;
252b5132 1383
a7519a3c
RH
1384 symhdr = &debug->symbolic_header;
1385 (*swap->swap_hdr_in) (abfd, ext_hdr, symhdr);
252b5132 1386
a7519a3c
RH
1387 /* The symbolic header contains absolute file offsets and sizes to
1388 read. */
1389#define READ(ptr, offset, count, size, type) \
1390 if (symhdr->count == 0) \
1391 debug->ptr = NULL; \
1392 else \
1393 { \
1394 bfd_size_type amt = (bfd_size_type) size * symhdr->count; \
1395 debug->ptr = (type) bfd_malloc (amt); \
1396 if (debug->ptr == NULL) \
1397 goto error_return; \
1398 if (bfd_seek (abfd, (file_ptr) symhdr->offset, SEEK_SET) != 0 \
1399 || bfd_bread (debug->ptr, amt, abfd) != amt) \
1400 goto error_return; \
1401 }
fe8bc63d 1402
a7519a3c 1403 READ (line, cbLineOffset, cbLine, sizeof (unsigned char), unsigned char *);
2c3fc389
NC
1404 READ (external_dnr, cbDnOffset, idnMax, swap->external_dnr_size, void *);
1405 READ (external_pdr, cbPdOffset, ipdMax, swap->external_pdr_size, void *);
1406 READ (external_sym, cbSymOffset, isymMax, swap->external_sym_size, void *);
1407 READ (external_opt, cbOptOffset, ioptMax, swap->external_opt_size, void *);
a7519a3c
RH
1408 READ (external_aux, cbAuxOffset, iauxMax, sizeof (union aux_ext),
1409 union aux_ext *);
1410 READ (ss, cbSsOffset, issMax, sizeof (char), char *);
1411 READ (ssext, cbSsExtOffset, issExtMax, sizeof (char), char *);
2c3fc389
NC
1412 READ (external_fdr, cbFdOffset, ifdMax, swap->external_fdr_size, void *);
1413 READ (external_rfd, cbRfdOffset, crfd, swap->external_rfd_size, void *);
1414 READ (external_ext, cbExtOffset, iextMax, swap->external_ext_size, void *);
a7519a3c 1415#undef READ
252b5132 1416
a7519a3c 1417 debug->fdr = NULL;
252b5132 1418
a7519a3c 1419 return TRUE;
252b5132 1420
a7519a3c
RH
1421 error_return:
1422 if (ext_hdr != NULL)
1423 free (ext_hdr);
1424 if (debug->line != NULL)
1425 free (debug->line);
1426 if (debug->external_dnr != NULL)
1427 free (debug->external_dnr);
1428 if (debug->external_pdr != NULL)
1429 free (debug->external_pdr);
1430 if (debug->external_sym != NULL)
1431 free (debug->external_sym);
1432 if (debug->external_opt != NULL)
1433 free (debug->external_opt);
1434 if (debug->external_aux != NULL)
1435 free (debug->external_aux);
1436 if (debug->ss != NULL)
1437 free (debug->ss);
1438 if (debug->ssext != NULL)
1439 free (debug->ssext);
1440 if (debug->external_fdr != NULL)
1441 free (debug->external_fdr);
1442 if (debug->external_rfd != NULL)
1443 free (debug->external_rfd);
1444 if (debug->external_ext != NULL)
1445 free (debug->external_ext);
1446 return FALSE;
252b5132
RH
1447}
1448
a7519a3c
RH
1449/* Alpha ELF local labels start with '$'. */
1450
b34976b6 1451static bfd_boolean
a7519a3c 1452elf64_alpha_is_local_label_name (bfd *abfd ATTRIBUTE_UNUSED, const char *name)
252b5132 1453{
a7519a3c
RH
1454 return name[0] == '$';
1455}
9e756d64 1456
a7519a3c 1457static bfd_boolean
fb167eb2
AM
1458elf64_alpha_find_nearest_line (bfd *abfd, asymbol **symbols,
1459 asection *section, bfd_vma offset,
1460 const char **filename_ptr,
a7519a3c 1461 const char **functionname_ptr,
fb167eb2
AM
1462 unsigned int *line_ptr,
1463 unsigned int *discriminator_ptr)
a7519a3c
RH
1464{
1465 asection *msec;
252b5132 1466
fb167eb2 1467 if (_bfd_dwarf2_find_nearest_line (abfd, symbols, NULL, section, offset,
a7519a3c 1468 filename_ptr, functionname_ptr,
fb167eb2 1469 line_ptr, discriminator_ptr,
9defd221 1470 dwarf_debug_sections,
a7519a3c 1471 &elf_tdata (abfd)->dwarf2_find_line_info))
b34976b6 1472 return TRUE;
9e756d64 1473
a7519a3c
RH
1474 msec = bfd_get_section_by_name (abfd, ".mdebug");
1475 if (msec != NULL)
1bbc9cec 1476 {
a7519a3c 1477 flagword origflags;
698600e4 1478 struct alpha_elf_find_line *fi;
a7519a3c
RH
1479 const struct ecoff_debug_swap * const swap =
1480 get_elf_backend_data (abfd)->elf_backend_ecoff_debug_swap;
252b5132 1481
a7519a3c
RH
1482 /* If we are called during a link, alpha_elf_final_link may have
1483 cleared the SEC_HAS_CONTENTS field. We force it back on here
1484 if appropriate (which it normally will be). */
1485 origflags = msec->flags;
1486 if (elf_section_data (msec)->this_hdr.sh_type != SHT_NOBITS)
1487 msec->flags |= SEC_HAS_CONTENTS;
9e756d64 1488
698600e4 1489 fi = alpha_elf_tdata (abfd)->find_line_info;
a7519a3c
RH
1490 if (fi == NULL)
1491 {
1492 bfd_size_type external_fdr_size;
1493 char *fraw_src;
1494 char *fraw_end;
1495 struct fdr *fdr_ptr;
698600e4 1496 bfd_size_type amt = sizeof (struct alpha_elf_find_line);
9e756d64 1497
698600e4 1498 fi = (struct alpha_elf_find_line *) bfd_zalloc (abfd, amt);
a7519a3c
RH
1499 if (fi == NULL)
1500 {
1501 msec->flags = origflags;
1502 return FALSE;
1503 }
9e756d64 1504
a7519a3c
RH
1505 if (!elf64_alpha_read_ecoff_info (abfd, msec, &fi->d))
1506 {
1507 msec->flags = origflags;
1508 return FALSE;
1509 }
9e756d64 1510
a7519a3c
RH
1511 /* Swap in the FDR information. */
1512 amt = fi->d.symbolic_header.ifdMax * sizeof (struct fdr);
1513 fi->d.fdr = (struct fdr *) bfd_alloc (abfd, amt);
1514 if (fi->d.fdr == NULL)
1515 {
1516 msec->flags = origflags;
1517 return FALSE;
1518 }
1519 external_fdr_size = swap->external_fdr_size;
1520 fdr_ptr = fi->d.fdr;
1521 fraw_src = (char *) fi->d.external_fdr;
1522 fraw_end = (fraw_src
1523 + fi->d.symbolic_header.ifdMax * external_fdr_size);
1524 for (; fraw_src < fraw_end; fraw_src += external_fdr_size, fdr_ptr++)
2c3fc389 1525 (*swap->swap_fdr_in) (abfd, fraw_src, fdr_ptr);
9e756d64 1526
698600e4 1527 alpha_elf_tdata (abfd)->find_line_info = fi;
9e756d64 1528
a7519a3c 1529 /* Note that we don't bother to ever free this information.
07d6d2b8
AM
1530 find_nearest_line is either called all the time, as in
1531 objdump -l, so the information should be saved, or it is
1532 rarely called, as in ld error messages, so the memory
1533 wasted is unimportant. Still, it would probably be a
1534 good idea for free_cached_info to throw it away. */
a7519a3c 1535 }
9e756d64 1536
a7519a3c
RH
1537 if (_bfd_ecoff_locate_line (abfd, section, offset, &fi->d, swap,
1538 &fi->i, filename_ptr, functionname_ptr,
1539 line_ptr))
1540 {
1541 msec->flags = origflags;
1542 return TRUE;
1543 }
9e756d64 1544
a7519a3c 1545 msec->flags = origflags;
9e756d64 1546 }
9e756d64 1547
a7519a3c 1548 /* Fall back on the generic ELF find_nearest_line routine. */
9e756d64 1549
fb167eb2 1550 return _bfd_elf_find_nearest_line (abfd, symbols, section, offset,
a7519a3c 1551 filename_ptr, functionname_ptr,
fb167eb2 1552 line_ptr, discriminator_ptr);
9e756d64 1553}
a7519a3c
RH
1554\f
1555/* Structure used to pass information to alpha_elf_output_extsym. */
9e756d64 1556
a7519a3c 1557struct extsym_info
9e756d64 1558{
a7519a3c
RH
1559 bfd *abfd;
1560 struct bfd_link_info *info;
1561 struct ecoff_debug_info *debug;
1562 const struct ecoff_debug_swap *swap;
1563 bfd_boolean failed;
1564};
9e756d64 1565
a7519a3c 1566static bfd_boolean
2c3fc389 1567elf64_alpha_output_extsym (struct alpha_elf_link_hash_entry *h, void * data)
a7519a3c
RH
1568{
1569 struct extsym_info *einfo = (struct extsym_info *) data;
1570 bfd_boolean strip;
1571 asection *sec, *output_section;
9e756d64 1572
a7519a3c
RH
1573 if (h->root.indx == -2)
1574 strip = FALSE;
1575 else if ((h->root.def_dynamic
1576 || h->root.ref_dynamic
1577 || h->root.root.type == bfd_link_hash_new)
1578 && !h->root.def_regular
1579 && !h->root.ref_regular)
1580 strip = TRUE;
1581 else if (einfo->info->strip == strip_all
1582 || (einfo->info->strip == strip_some
1583 && bfd_hash_lookup (einfo->info->keep_hash,
1584 h->root.root.root.string,
1585 FALSE, FALSE) == NULL))
1586 strip = TRUE;
1587 else
1588 strip = FALSE;
9e756d64 1589
a7519a3c 1590 if (strip)
b34976b6 1591 return TRUE;
9e756d64 1592
a7519a3c 1593 if (h->esym.ifd == -2)
9e756d64 1594 {
a7519a3c
RH
1595 h->esym.jmptbl = 0;
1596 h->esym.cobol_main = 0;
1597 h->esym.weakext = 0;
1598 h->esym.reserved = 0;
1599 h->esym.ifd = ifdNil;
1600 h->esym.asym.value = 0;
1601 h->esym.asym.st = stGlobal;
9e756d64 1602
a7519a3c
RH
1603 if (h->root.root.type != bfd_link_hash_defined
1604 && h->root.root.type != bfd_link_hash_defweak)
1605 h->esym.asym.sc = scAbs;
1606 else
1607 {
1608 const char *name;
9e756d64 1609
a7519a3c
RH
1610 sec = h->root.root.u.def.section;
1611 output_section = sec->output_section;
9e756d64 1612
a7519a3c
RH
1613 /* When making a shared library and symbol h is the one from
1614 the another shared library, OUTPUT_SECTION may be null. */
1615 if (output_section == NULL)
1616 h->esym.asym.sc = scUndefined;
1617 else
1618 {
fd361982 1619 name = bfd_section_name (output_section);
9e756d64 1620
a7519a3c
RH
1621 if (strcmp (name, ".text") == 0)
1622 h->esym.asym.sc = scText;
1623 else if (strcmp (name, ".data") == 0)
1624 h->esym.asym.sc = scData;
1625 else if (strcmp (name, ".sdata") == 0)
1626 h->esym.asym.sc = scSData;
1627 else if (strcmp (name, ".rodata") == 0
1628 || strcmp (name, ".rdata") == 0)
1629 h->esym.asym.sc = scRData;
1630 else if (strcmp (name, ".bss") == 0)
1631 h->esym.asym.sc = scBss;
1632 else if (strcmp (name, ".sbss") == 0)
1633 h->esym.asym.sc = scSBss;
1634 else if (strcmp (name, ".init") == 0)
1635 h->esym.asym.sc = scInit;
1636 else if (strcmp (name, ".fini") == 0)
1637 h->esym.asym.sc = scFini;
1638 else
1639 h->esym.asym.sc = scAbs;
1640 }
1641 }
9e756d64 1642
a7519a3c
RH
1643 h->esym.asym.reserved = 0;
1644 h->esym.asym.index = indexNil;
1645 }
9e756d64 1646
a7519a3c
RH
1647 if (h->root.root.type == bfd_link_hash_common)
1648 h->esym.asym.value = h->root.root.u.c.size;
1649 else if (h->root.root.type == bfd_link_hash_defined
1650 || h->root.root.type == bfd_link_hash_defweak)
1651 {
1652 if (h->esym.asym.sc == scCommon)
1653 h->esym.asym.sc = scBss;
1654 else if (h->esym.asym.sc == scSCommon)
1655 h->esym.asym.sc = scSBss;
9e756d64 1656
a7519a3c
RH
1657 sec = h->root.root.u.def.section;
1658 output_section = sec->output_section;
1659 if (output_section != NULL)
1660 h->esym.asym.value = (h->root.root.u.def.value
1661 + sec->output_offset
1662 + output_section->vma);
1663 else
1664 h->esym.asym.value = 0;
1665 }
9e756d64 1666
a7519a3c
RH
1667 if (! bfd_ecoff_debug_one_external (einfo->abfd, einfo->debug, einfo->swap,
1668 h->root.root.root.string,
1669 &h->esym))
1670 {
1671 einfo->failed = TRUE;
1672 return FALSE;
9e756d64
RH
1673 }
1674
a7519a3c
RH
1675 return TRUE;
1676}
1677\f
1678/* Search for and possibly create a got entry. */
9e756d64 1679
a7519a3c
RH
1680static struct alpha_elf_got_entry *
1681get_got_entry (bfd *abfd, struct alpha_elf_link_hash_entry *h,
1682 unsigned long r_type, unsigned long r_symndx,
1683 bfd_vma r_addend)
1684{
1685 struct alpha_elf_got_entry *gotent;
1686 struct alpha_elf_got_entry **slot;
9e756d64 1687
a7519a3c
RH
1688 if (h)
1689 slot = &h->got_entries;
1690 else
1691 {
1692 /* This is a local .got entry -- record for merge. */
9e756d64 1693
a7519a3c 1694 struct alpha_elf_got_entry **local_got_entries;
9e756d64 1695
a7519a3c
RH
1696 local_got_entries = alpha_elf_tdata(abfd)->local_got_entries;
1697 if (!local_got_entries)
1698 {
1699 bfd_size_type size;
1700 Elf_Internal_Shdr *symtab_hdr;
9e756d64 1701
a7519a3c
RH
1702 symtab_hdr = &elf_tdata(abfd)->symtab_hdr;
1703 size = symtab_hdr->sh_info;
1704 size *= sizeof (struct alpha_elf_got_entry *);
9e756d64 1705
a7519a3c
RH
1706 local_got_entries
1707 = (struct alpha_elf_got_entry **) bfd_zalloc (abfd, size);
1708 if (!local_got_entries)
1709 return NULL;
1710
1711 alpha_elf_tdata (abfd)->local_got_entries = local_got_entries;
1712 }
1713
1714 slot = &local_got_entries[r_symndx];
9e756d64
RH
1715 }
1716
a7519a3c
RH
1717 for (gotent = *slot; gotent ; gotent = gotent->next)
1718 if (gotent->gotobj == abfd
1719 && gotent->reloc_type == r_type
1720 && gotent->addend == r_addend)
1721 break;
1722
1723 if (!gotent)
9e756d64 1724 {
a7519a3c
RH
1725 int entry_size;
1726 bfd_size_type amt;
9e756d64 1727
a7519a3c
RH
1728 amt = sizeof (struct alpha_elf_got_entry);
1729 gotent = (struct alpha_elf_got_entry *) bfd_alloc (abfd, amt);
1730 if (!gotent)
1731 return NULL;
9e756d64 1732
a7519a3c
RH
1733 gotent->gotobj = abfd;
1734 gotent->addend = r_addend;
1735 gotent->got_offset = -1;
6ec7057a 1736 gotent->plt_offset = -1;
a7519a3c
RH
1737 gotent->use_count = 1;
1738 gotent->reloc_type = r_type;
1739 gotent->reloc_done = 0;
1740 gotent->reloc_xlated = 0;
9e756d64 1741
a7519a3c
RH
1742 gotent->next = *slot;
1743 *slot = gotent;
9e756d64 1744
a7519a3c
RH
1745 entry_size = alpha_got_entry_size (r_type);
1746 alpha_elf_tdata (abfd)->total_got_size += entry_size;
1747 if (!h)
1748 alpha_elf_tdata(abfd)->local_got_size += entry_size;
9e756d64 1749 }
a7519a3c
RH
1750 else
1751 gotent->use_count += 1;
9e756d64 1752
a7519a3c 1753 return gotent;
9e756d64
RH
1754}
1755
6ec7057a
RH
1756static bfd_boolean
1757elf64_alpha_want_plt (struct alpha_elf_link_hash_entry *ah)
1758{
1759 return ((ah->root.type == STT_FUNC
1760 || ah->root.root.type == bfd_link_hash_undefweak
1761 || ah->root.root.type == bfd_link_hash_undefined)
8288a39e
RH
1762 && (ah->flags & ALPHA_ELF_LINK_HASH_LU_PLT) != 0
1763 && (ah->flags & ~ALPHA_ELF_LINK_HASH_LU_PLT) == 0);
6ec7057a
RH
1764}
1765
6fc5bb57
AM
1766/* Whether to sort relocs output by ld -r or ld --emit-relocs, by r_offset.
1767 Don't do so for code sections. We want to keep ordering of LITERAL/LITUSE
1768 as is. On the other hand, elf-eh-frame.c processing requires .eh_frame
1769 relocs to be sorted. */
1770
1771static bfd_boolean
1772elf64_alpha_sort_relocs_p (asection *sec)
1773{
1774 return (sec->flags & SEC_CODE) == 0;
1775}
1776
1777
a7519a3c
RH
1778/* Handle dynamic relocations when doing an Alpha ELF link. */
1779
b34976b6 1780static bfd_boolean
a7519a3c
RH
1781elf64_alpha_check_relocs (bfd *abfd, struct bfd_link_info *info,
1782 asection *sec, const Elf_Internal_Rela *relocs)
252b5132 1783{
a7519a3c
RH
1784 bfd *dynobj;
1785 asection *sreloc;
252b5132 1786 Elf_Internal_Shdr *symtab_hdr;
a7519a3c
RH
1787 struct alpha_elf_link_hash_entry **sym_hashes;
1788 const Elf_Internal_Rela *rel, *relend;
a7519a3c 1789 bfd_size_type amt;
252b5132 1790
0e1862bb 1791 if (bfd_link_relocatable (info))
a7519a3c 1792 return TRUE;
252b5132 1793
a7519a3c
RH
1794 /* Don't do anything special with non-loaded, non-alloced sections.
1795 In particular, any relocs in such sections should not affect GOT
1796 and PLT reference counting (ie. we don't allow them to create GOT
1797 or PLT entries), there's no possibility or desire to optimize TLS
1798 relocs, and there's not much point in propagating relocs to shared
1799 libs that the dynamic linker won't relocate. */
1800 if ((sec->flags & SEC_ALLOC) == 0)
b34976b6 1801 return TRUE;
252b5132 1802
0ffa91dd
NC
1803 BFD_ASSERT (is_alpha_elf (abfd));
1804
1805 dynobj = elf_hash_table (info)->dynobj;
a7519a3c 1806 if (dynobj == NULL)
0ffa91dd 1807 elf_hash_table (info)->dynobj = dynobj = abfd;
252b5132 1808
a7519a3c 1809 sreloc = NULL;
0ffa91dd
NC
1810 symtab_hdr = &elf_symtab_hdr (abfd);
1811 sym_hashes = alpha_elf_sym_hashes (abfd);
a7519a3c
RH
1812
1813 relend = relocs + sec->reloc_count;
1814 for (rel = relocs; rel < relend; ++rel)
1815 {
1816 enum {
1817 NEED_GOT = 1,
1818 NEED_GOT_ENTRY = 2,
1819 NEED_DYNREL = 4
1820 };
1821
1822 unsigned long r_symndx, r_type;
1823 struct alpha_elf_link_hash_entry *h;
1824 unsigned int gotent_flags;
1825 bfd_boolean maybe_dynamic;
1826 unsigned int need;
1827 bfd_vma addend;
1828
1829 r_symndx = ELF64_R_SYM (rel->r_info);
1830 if (r_symndx < symtab_hdr->sh_info)
1831 h = NULL;
1832 else
1833 {
1834 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
252b5132 1835
a7519a3c
RH
1836 while (h->root.root.type == bfd_link_hash_indirect
1837 || h->root.root.type == bfd_link_hash_warning)
1838 h = (struct alpha_elf_link_hash_entry *)h->root.root.u.i.link;
252b5132 1839
81fbe831
AM
1840 /* PR15323, ref flags aren't set for references in the same
1841 object. */
a7519a3c
RH
1842 h->root.ref_regular = 1;
1843 }
252b5132 1844
a7519a3c 1845 /* We can only get preliminary data on whether a symbol is
07d6d2b8
AM
1846 locally or externally defined, as not all of the input files
1847 have yet been processed. Do something with what we know, as
1848 this may help reduce memory usage and processing time later. */
a7519a3c 1849 maybe_dynamic = FALSE;
0e1862bb 1850 if (h && ((bfd_link_pic (info)
a7519a3c
RH
1851 && (!info->symbolic
1852 || info->unresolved_syms_in_shared_libs == RM_IGNORE))
1853 || !h->root.def_regular
1854 || h->root.root.type == bfd_link_hash_defweak))
07d6d2b8 1855 maybe_dynamic = TRUE;
252b5132 1856
a7519a3c
RH
1857 need = 0;
1858 gotent_flags = 0;
1859 r_type = ELF64_R_TYPE (rel->r_info);
1860 addend = rel->r_addend;
9e756d64 1861
9e756d64
RH
1862 switch (r_type)
1863 {
1864 case R_ALPHA_LITERAL:
a7519a3c
RH
1865 need = NEED_GOT | NEED_GOT_ENTRY;
1866
1867 /* Remember how this literal is used from its LITUSEs.
1868 This will be important when it comes to decide if we can
1869 create a .plt entry for a function symbol. */
1870 while (++rel < relend && ELF64_R_TYPE (rel->r_info) == R_ALPHA_LITUSE)
8288a39e 1871 if (rel->r_addend >= 1 && rel->r_addend <= 6)
a7519a3c
RH
1872 gotent_flags |= 1 << rel->r_addend;
1873 --rel;
1874
1875 /* No LITUSEs -- presumably the address is used somehow. */
1876 if (gotent_flags == 0)
1877 gotent_flags = ALPHA_ELF_LINK_HASH_LU_ADDR;
1878 break;
1879
1880 case R_ALPHA_GPDISP:
1881 case R_ALPHA_GPREL16:
1882 case R_ALPHA_GPREL32:
9e756d64
RH
1883 case R_ALPHA_GPRELHIGH:
1884 case R_ALPHA_GPRELLOW:
a7519a3c
RH
1885 case R_ALPHA_BRSGP:
1886 need = NEED_GOT;
1887 break;
1888
1889 case R_ALPHA_REFLONG:
1890 case R_ALPHA_REFQUAD:
0e1862bb 1891 if (bfd_link_pic (info) || maybe_dynamic)
a7519a3c 1892 need = NEED_DYNREL;
cc03ec80
RH
1893 break;
1894
9e756d64 1895 case R_ALPHA_TLSLDM:
cc03ec80 1896 /* The symbol for a TLSLDM reloc is ignored. Collapse the
cf35638d
TS
1897 reloc to the STN_UNDEF (0) symbol so that they all match. */
1898 r_symndx = STN_UNDEF;
a7519a3c
RH
1899 h = 0;
1900 maybe_dynamic = FALSE;
1901 /* FALLTHRU */
1902
1903 case R_ALPHA_TLSGD:
1904 case R_ALPHA_GOTDTPREL:
1905 need = NEED_GOT | NEED_GOT_ENTRY;
9e756d64 1906 break;
cc03ec80 1907
a7519a3c
RH
1908 case R_ALPHA_GOTTPREL:
1909 need = NEED_GOT | NEED_GOT_ENTRY;
1910 gotent_flags = ALPHA_ELF_LINK_HASH_TLS_IE;
0e1862bb 1911 if (bfd_link_pic (info))
a7519a3c
RH
1912 info->flags |= DF_STATIC_TLS;
1913 break;
1914
1915 case R_ALPHA_TPREL64:
3cbc1e5e 1916 if (bfd_link_dll (info))
e366eeae
RH
1917 {
1918 info->flags |= DF_STATIC_TLS;
1919 need = NEED_DYNREL;
1920 }
1921 else if (maybe_dynamic)
a7519a3c 1922 need = NEED_DYNREL;
a7519a3c 1923 break;
252b5132
RH
1924 }
1925
a7519a3c 1926 if (need & NEED_GOT)
252b5132 1927 {
85d162e6 1928 if (alpha_elf_tdata(abfd)->gotobj == NULL)
6cdc0ccc 1929 {
a7519a3c
RH
1930 if (!elf64_alpha_create_got_section (abfd, info))
1931 return FALSE;
c328dc3f 1932 }
252b5132 1933 }
252b5132 1934
a7519a3c
RH
1935 if (need & NEED_GOT_ENTRY)
1936 {
1937 struct alpha_elf_got_entry *gotent;
252b5132 1938
a7519a3c
RH
1939 gotent = get_got_entry (abfd, h, r_type, r_symndx, addend);
1940 if (!gotent)
1941 return FALSE;
4a67a098 1942
a7519a3c 1943 if (gotent_flags)
cc03ec80 1944 {
a7519a3c
RH
1945 gotent->flags |= gotent_flags;
1946 if (h)
1947 {
1948 gotent_flags |= h->flags;
1949 h->flags = gotent_flags;
4a67a098 1950
a7519a3c 1951 /* Make a guess as to whether a .plt entry is needed. */
6ec7057a
RH
1952 /* ??? It appears that we won't make it into
1953 adjust_dynamic_symbol for symbols that remain
1954 totally undefined. Copying this check here means
1955 we can create a plt entry for them too. */
1956 h->root.needs_plt
1957 = (maybe_dynamic && elf64_alpha_want_plt (h));
1958 }
a7519a3c 1959 }
252b5132
RH
1960 }
1961
a7519a3c 1962 if (need & NEED_DYNREL)
9e756d64 1963 {
a7519a3c
RH
1964 /* We need to create the section here now whether we eventually
1965 use it or not so that it gets mapped to an output section by
83bac4b0 1966 the linker. If not used, we'll kill it in size_dynamic_sections. */
a7519a3c 1967 if (sreloc == NULL)
9e756d64 1968 {
83bac4b0
NC
1969 sreloc = _bfd_elf_make_dynamic_reloc_section
1970 (sec, dynobj, 3, abfd, /*rela?*/ TRUE);
1971
a7519a3c 1972 if (sreloc == NULL)
83bac4b0 1973 return FALSE;
9e756d64 1974 }
252b5132 1975
a7519a3c
RH
1976 if (h)
1977 {
1978 /* Since we havn't seen all of the input symbols yet, we
1979 don't know whether we'll actually need a dynamic relocation
1980 entry for this reloc. So make a record of it. Once we
1981 find out if this thing needs dynamic relocation we'll
1982 expand the relocation sections by the appropriate amount. */
9e756d64 1983
a7519a3c 1984 struct alpha_elf_reloc_entry *rent;
9e756d64 1985
a7519a3c
RH
1986 for (rent = h->reloc_entries; rent; rent = rent->next)
1987 if (rent->rtype == r_type && rent->srel == sreloc)
1988 break;
252b5132 1989
a7519a3c
RH
1990 if (!rent)
1991 {
1992 amt = sizeof (struct alpha_elf_reloc_entry);
1993 rent = (struct alpha_elf_reloc_entry *) bfd_alloc (abfd, amt);
1994 if (!rent)
1995 return FALSE;
252b5132 1996
a7519a3c
RH
1997 rent->srel = sreloc;
1998 rent->rtype = r_type;
1999 rent->count = 1;
2000 rent->reltext = (sec->flags & SEC_READONLY) != 0;
252b5132 2001
a7519a3c
RH
2002 rent->next = h->reloc_entries;
2003 h->reloc_entries = rent;
2004 }
2005 else
2006 rent->count++;
2007 }
0e1862bb 2008 else if (bfd_link_pic (info))
a7519a3c
RH
2009 {
2010 /* If this is a shared library, and the section is to be
2011 loaded into memory, we need a RELATIVE reloc. */
2012 sreloc->size += sizeof (Elf64_External_Rela);
2013 if (sec->flags & SEC_READONLY)
2014 info->flags |= DF_TEXTREL;
2015 }
252b5132
RH
2016 }
2017 }
2018
b34976b6 2019 return TRUE;
252b5132 2020}
252b5132 2021
e117360e
RH
2022/* Return the section that should be marked against GC for a given
2023 relocation. */
2024
2025static asection *
2026elf64_alpha_gc_mark_hook (asection *sec, struct bfd_link_info *info,
2027 Elf_Internal_Rela *rel,
2028 struct elf_link_hash_entry *h, Elf_Internal_Sym *sym)
2029{
2030 /* These relocations don't really reference a symbol. Instead we store
2031 extra data in their addend slot. Ignore the symbol. */
2032 switch (ELF64_R_TYPE (rel->r_info))
2033 {
2034 case R_ALPHA_LITUSE:
2035 case R_ALPHA_GPDISP:
2036 case R_ALPHA_HINT:
2037 return NULL;
2038 }
2039
2040 return _bfd_elf_gc_mark_hook (sec, info, rel, h, sym);
2041}
2042
a7519a3c
RH
2043/* Adjust a symbol defined by a dynamic object and referenced by a
2044 regular object. The current definition is in some section of the
2045 dynamic object, but we're not including those sections. We have to
2046 change the definition to something the rest of the link can
2047 understand. */
252b5132 2048
b34976b6 2049static bfd_boolean
a7519a3c
RH
2050elf64_alpha_adjust_dynamic_symbol (struct bfd_link_info *info,
2051 struct elf_link_hash_entry *h)
252b5132 2052{
a7519a3c
RH
2053 bfd *dynobj;
2054 asection *s;
2055 struct alpha_elf_link_hash_entry *ah;
252b5132 2056
a7519a3c
RH
2057 dynobj = elf_hash_table(info)->dynobj;
2058 ah = (struct alpha_elf_link_hash_entry *)h;
252b5132 2059
a7519a3c 2060 /* Now that we've seen all of the input symbols, finalize our decision
6ec7057a
RH
2061 about whether this symbol should get a .plt entry. Irritatingly, it
2062 is common for folk to leave undefined symbols in shared libraries,
2063 and they still expect lazy binding; accept undefined symbols in lieu
2064 of STT_FUNC. */
2065 if (alpha_elf_dynamic_symbol_p (h, info) && elf64_alpha_want_plt (ah))
252b5132 2066 {
6ec7057a 2067 h->needs_plt = TRUE;
252b5132 2068
ce558b89 2069 s = elf_hash_table(info)->splt;
a7519a3c
RH
2070 if (!s && !elf64_alpha_create_dynamic_sections (dynobj, info))
2071 return FALSE;
204692d7 2072
6ec7057a
RH
2073 /* We need one plt entry per got subsection. Delay allocation of
2074 the actual plt entries until size_plt_section, called from
2075 size_dynamic_sections or during relaxation. */
252b5132 2076
a7519a3c
RH
2077 return TRUE;
2078 }
2079 else
6ec7057a 2080 h->needs_plt = FALSE;
252b5132 2081
a7519a3c
RH
2082 /* If this is a weak symbol, and there is a real definition, the
2083 processor independent code will have arranged for us to see the
2084 real definition first, and we can just use the same value. */
60d67dc8 2085 if (h->is_weakalias)
252b5132 2086 {
60d67dc8
AM
2087 struct elf_link_hash_entry *def = weakdef (h);
2088 BFD_ASSERT (def->root.type == bfd_link_hash_defined);
2089 h->root.u.def.section = def->root.u.def.section;
2090 h->root.u.def.value = def->root.u.def.value;
a7519a3c 2091 return TRUE;
252b5132 2092 }
a7519a3c
RH
2093
2094 /* This is a reference to a symbol defined by a dynamic object which
2095 is not a function. The Alpha, since it uses .got entries for all
2096 symbols even in regular objects, does not need the hackery of a
2097 .dynbss section and COPY dynamic relocations. */
252b5132 2098
b34976b6 2099 return TRUE;
252b5132
RH
2100}
2101
747ffa7b
AM
2102/* Record STO_ALPHA_NOPV and STO_ALPHA_STD_GPLOAD. */
2103
2104static void
2105elf64_alpha_merge_symbol_attribute (struct elf_link_hash_entry *h,
2106 const Elf_Internal_Sym *isym,
2107 bfd_boolean definition,
2108 bfd_boolean dynamic)
2109{
2110 if (!dynamic && definition)
2111 h->other = ((h->other & ELF_ST_VISIBILITY (-1))
2112 | (isym->st_other & ~ELF_ST_VISIBILITY (-1)));
2113}
2114
a7519a3c
RH
2115/* Symbol versioning can create new symbols, and make our old symbols
2116 indirect to the new ones. Consolidate the got and reloc information
2117 in these situations. */
252b5132 2118
48f4b4f5
RH
2119static void
2120elf64_alpha_copy_indirect_symbol (struct bfd_link_info *info,
2121 struct elf_link_hash_entry *dir,
2122 struct elf_link_hash_entry *ind)
252b5132 2123{
48f4b4f5
RH
2124 struct alpha_elf_link_hash_entry *hi
2125 = (struct alpha_elf_link_hash_entry *) ind;
2126 struct alpha_elf_link_hash_entry *hs
2127 = (struct alpha_elf_link_hash_entry *) dir;
252b5132 2128
48f4b4f5
RH
2129 /* Do the merging in the superclass. */
2130 _bfd_elf_link_hash_copy_indirect(info, dir, ind);
252b5132 2131
a7519a3c 2132 /* Merge the flags. Whee. */
a7519a3c
RH
2133 hs->flags |= hi->flags;
2134
48f4b4f5
RH
2135 /* ??? It's unclear to me what's really supposed to happen when
2136 "merging" defweak and defined symbols, given that we don't
2137 actually throw away the defweak. This more-or-less copies
2138 the logic related to got and plt entries in the superclass. */
2139 if (ind->root.type != bfd_link_hash_indirect)
2140 return;
2141
a7519a3c
RH
2142 /* Merge the .got entries. Cannibalize the old symbol's list in
2143 doing so, since we don't need it anymore. */
2144
2145 if (hs->got_entries == NULL)
2146 hs->got_entries = hi->got_entries;
2147 else
2148 {
2149 struct alpha_elf_got_entry *gi, *gs, *gin, *gsh;
2150
2151 gsh = hs->got_entries;
2152 for (gi = hi->got_entries; gi ; gi = gin)
252b5132 2153 {
a7519a3c
RH
2154 gin = gi->next;
2155 for (gs = gsh; gs ; gs = gs->next)
2156 if (gi->gotobj == gs->gotobj
2157 && gi->reloc_type == gs->reloc_type
2158 && gi->addend == gs->addend)
2159 {
68994ca2 2160 gs->use_count += gi->use_count;
07d6d2b8 2161 goto got_found;
a7519a3c
RH
2162 }
2163 gi->next = hs->got_entries;
2164 hs->got_entries = gi;
2165 got_found:;
252b5132 2166 }
a7519a3c
RH
2167 }
2168 hi->got_entries = NULL;
252b5132 2169
a7519a3c
RH
2170 /* And similar for the reloc entries. */
2171
2172 if (hs->reloc_entries == NULL)
2173 hs->reloc_entries = hi->reloc_entries;
2174 else
2175 {
2176 struct alpha_elf_reloc_entry *ri, *rs, *rin, *rsh;
2177
2178 rsh = hs->reloc_entries;
2179 for (ri = hi->reloc_entries; ri ; ri = rin)
2180 {
2181 rin = ri->next;
2182 for (rs = rsh; rs ; rs = rs->next)
2183 if (ri->rtype == rs->rtype && ri->srel == rs->srel)
2184 {
2185 rs->count += ri->count;
2186 goto found_reloc;
2187 }
2188 ri->next = hs->reloc_entries;
2189 hs->reloc_entries = ri;
2190 found_reloc:;
2191 }
252b5132 2192 }
a7519a3c 2193 hi->reloc_entries = NULL;
252b5132
RH
2194}
2195
a7519a3c 2196/* Is it possible to merge two object file's .got tables? */
252b5132 2197
b34976b6 2198static bfd_boolean
a7519a3c 2199elf64_alpha_can_merge_gots (bfd *a, bfd *b)
252b5132 2200{
a7519a3c
RH
2201 int total = alpha_elf_tdata (a)->total_got_size;
2202 bfd *bsub;
252b5132 2203
a7519a3c
RH
2204 /* Trivial quick fallout test. */
2205 if (total + alpha_elf_tdata (b)->total_got_size <= MAX_GOT_SIZE)
2206 return TRUE;
252b5132 2207
a7519a3c
RH
2208 /* By their nature, local .got entries cannot be merged. */
2209 if ((total += alpha_elf_tdata (b)->local_got_size) > MAX_GOT_SIZE)
b34976b6 2210 return FALSE;
252b5132 2211
a7519a3c
RH
2212 /* Failing the common trivial comparison, we must effectively
2213 perform the merge. Not actually performing the merge means that
2214 we don't have to store undo information in case we fail. */
2215 for (bsub = b; bsub ; bsub = alpha_elf_tdata (bsub)->in_got_link_next)
2216 {
2217 struct alpha_elf_link_hash_entry **hashes = alpha_elf_sym_hashes (bsub);
2218 Elf_Internal_Shdr *symtab_hdr = &elf_tdata (bsub)->symtab_hdr;
2219 int i, n;
2220
2221 n = NUM_SHDR_ENTRIES (symtab_hdr) - symtab_hdr->sh_info;
2222 for (i = 0; i < n; ++i)
2223 {
2224 struct alpha_elf_got_entry *ae, *be;
2225 struct alpha_elf_link_hash_entry *h;
2226
2227 h = hashes[i];
2228 while (h->root.root.type == bfd_link_hash_indirect
07d6d2b8 2229 || h->root.root.type == bfd_link_hash_warning)
a7519a3c
RH
2230 h = (struct alpha_elf_link_hash_entry *)h->root.root.u.i.link;
2231
2232 for (be = h->got_entries; be ; be = be->next)
2233 {
2234 if (be->use_count == 0)
07d6d2b8 2235 continue;
a7519a3c 2236 if (be->gotobj != b)
07d6d2b8 2237 continue;
a7519a3c
RH
2238
2239 for (ae = h->got_entries; ae ; ae = ae->next)
07d6d2b8 2240 if (ae->gotobj == a
a7519a3c
RH
2241 && ae->reloc_type == be->reloc_type
2242 && ae->addend == be->addend)
2243 goto global_found;
2244
2245 total += alpha_got_entry_size (be->reloc_type);
2246 if (total > MAX_GOT_SIZE)
07d6d2b8 2247 return FALSE;
a7519a3c
RH
2248 global_found:;
2249 }
2250 }
2251 }
252b5132 2252
b34976b6 2253 return TRUE;
252b5132
RH
2254}
2255
a7519a3c 2256/* Actually merge two .got tables. */
252b5132 2257
a7519a3c
RH
2258static void
2259elf64_alpha_merge_gots (bfd *a, bfd *b)
252b5132 2260{
a7519a3c
RH
2261 int total = alpha_elf_tdata (a)->total_got_size;
2262 bfd *bsub;
252b5132 2263
a7519a3c
RH
2264 /* Remember local expansion. */
2265 {
2266 int e = alpha_elf_tdata (b)->local_got_size;
2267 total += e;
2268 alpha_elf_tdata (a)->local_got_size += e;
2269 }
252b5132 2270
a7519a3c
RH
2271 for (bsub = b; bsub ; bsub = alpha_elf_tdata (bsub)->in_got_link_next)
2272 {
2273 struct alpha_elf_got_entry **local_got_entries;
2274 struct alpha_elf_link_hash_entry **hashes;
2275 Elf_Internal_Shdr *symtab_hdr;
2276 int i, n;
252b5132 2277
a7519a3c
RH
2278 /* Let the local .got entries know they are part of a new subsegment. */
2279 local_got_entries = alpha_elf_tdata (bsub)->local_got_entries;
2280 if (local_got_entries)
07d6d2b8 2281 {
a7519a3c
RH
2282 n = elf_tdata (bsub)->symtab_hdr.sh_info;
2283 for (i = 0; i < n; ++i)
2284 {
2285 struct alpha_elf_got_entry *ent;
2286 for (ent = local_got_entries[i]; ent; ent = ent->next)
07d6d2b8 2287 ent->gotobj = a;
a7519a3c 2288 }
07d6d2b8 2289 }
252b5132 2290
a7519a3c
RH
2291 /* Merge the global .got entries. */
2292 hashes = alpha_elf_sym_hashes (bsub);
2293 symtab_hdr = &elf_tdata (bsub)->symtab_hdr;
252b5132 2294
a7519a3c
RH
2295 n = NUM_SHDR_ENTRIES (symtab_hdr) - symtab_hdr->sh_info;
2296 for (i = 0; i < n; ++i)
07d6d2b8 2297 {
a7519a3c
RH
2298 struct alpha_elf_got_entry *ae, *be, **pbe, **start;
2299 struct alpha_elf_link_hash_entry *h;
252b5132 2300
a7519a3c
RH
2301 h = hashes[i];
2302 while (h->root.root.type == bfd_link_hash_indirect
07d6d2b8 2303 || h->root.root.type == bfd_link_hash_warning)
a7519a3c 2304 h = (struct alpha_elf_link_hash_entry *)h->root.root.u.i.link;
252b5132 2305
a7519a3c
RH
2306 pbe = start = &h->got_entries;
2307 while ((be = *pbe) != NULL)
2308 {
2309 if (be->use_count == 0)
07d6d2b8 2310 {
a7519a3c
RH
2311 *pbe = be->next;
2312 memset (be, 0xa5, sizeof (*be));
2313 goto kill;
07d6d2b8 2314 }
a7519a3c 2315 if (be->gotobj != b)
07d6d2b8 2316 goto next;
a7519a3c
RH
2317
2318 for (ae = *start; ae ; ae = ae->next)
07d6d2b8 2319 if (ae->gotobj == a
a7519a3c
RH
2320 && ae->reloc_type == be->reloc_type
2321 && ae->addend == be->addend)
2322 {
2323 ae->flags |= be->flags;
2324 ae->use_count += be->use_count;
2325 *pbe = be->next;
2326 memset (be, 0xa5, sizeof (*be));
2327 goto kill;
2328 }
2329 be->gotobj = a;
2330 total += alpha_got_entry_size (be->reloc_type);
252b5132 2331
a7519a3c
RH
2332 next:;
2333 pbe = &be->next;
2334 kill:;
2335 }
07d6d2b8 2336 }
252b5132 2337
a7519a3c
RH
2338 alpha_elf_tdata (bsub)->gotobj = a;
2339 }
2340 alpha_elf_tdata (a)->total_got_size = total;
252b5132 2341
a7519a3c
RH
2342 /* Merge the two in_got chains. */
2343 {
2344 bfd *next;
252b5132 2345
a7519a3c
RH
2346 bsub = a;
2347 while ((next = alpha_elf_tdata (bsub)->in_got_link_next) != NULL)
2348 bsub = next;
252b5132 2349
a7519a3c
RH
2350 alpha_elf_tdata (bsub)->in_got_link_next = b;
2351 }
252b5132 2352}
a7519a3c
RH
2353
2354/* Calculate the offsets for the got entries. */
252b5132 2355
b34976b6 2356static bfd_boolean
a7519a3c 2357elf64_alpha_calc_got_offsets_for_symbol (struct alpha_elf_link_hash_entry *h,
2c3fc389 2358 void * arg ATTRIBUTE_UNUSED)
252b5132 2359{
a7519a3c 2360 struct alpha_elf_got_entry *gotent;
252b5132 2361
a7519a3c
RH
2362 for (gotent = h->got_entries; gotent; gotent = gotent->next)
2363 if (gotent->use_count > 0)
2364 {
2365 struct alpha_elf_obj_tdata *td;
2366 bfd_size_type *plge;
252b5132 2367
a7519a3c 2368 td = alpha_elf_tdata (gotent->gotobj);
a7519a3c
RH
2369 plge = &td->got->size;
2370 gotent->got_offset = *plge;
2371 *plge += alpha_got_entry_size (gotent->reloc_type);
2372 }
252b5132 2373
6ec7057a 2374 return TRUE;
a7519a3c 2375}
252b5132 2376
a7519a3c
RH
2377static void
2378elf64_alpha_calc_got_offsets (struct bfd_link_info *info)
2379{
4dfe6ac6
NC
2380 bfd *i, *got_list;
2381 struct alpha_elf_link_hash_table * htab;
2382
2383 htab = alpha_elf_hash_table (info);
2384 if (htab == NULL)
2385 return;
2386 got_list = htab->got_list;
252b5132 2387
a7519a3c
RH
2388 /* First, zero out the .got sizes, as we may be recalculating the
2389 .got after optimizing it. */
2390 for (i = got_list; i ; i = alpha_elf_tdata(i)->got_link_next)
2391 alpha_elf_tdata(i)->got->size = 0;
252b5132 2392
a7519a3c 2393 /* Next, fill in the offsets for all the global entries. */
4dfe6ac6 2394 alpha_elf_link_hash_traverse (htab,
a7519a3c
RH
2395 elf64_alpha_calc_got_offsets_for_symbol,
2396 NULL);
252b5132 2397
a7519a3c
RH
2398 /* Finally, fill in the offsets for the local entries. */
2399 for (i = got_list; i ; i = alpha_elf_tdata(i)->got_link_next)
2400 {
2401 bfd_size_type got_offset = alpha_elf_tdata(i)->got->size;
2402 bfd *j;
252b5132 2403
a7519a3c
RH
2404 for (j = i; j ; j = alpha_elf_tdata(j)->in_got_link_next)
2405 {
2406 struct alpha_elf_got_entry **local_got_entries, *gotent;
2407 int k, n;
252b5132 2408
a7519a3c
RH
2409 local_got_entries = alpha_elf_tdata(j)->local_got_entries;
2410 if (!local_got_entries)
2411 continue;
252b5132 2412
a7519a3c
RH
2413 for (k = 0, n = elf_tdata(j)->symtab_hdr.sh_info; k < n; ++k)
2414 for (gotent = local_got_entries[k]; gotent; gotent = gotent->next)
2415 if (gotent->use_count > 0)
07d6d2b8 2416 {
a7519a3c
RH
2417 gotent->got_offset = got_offset;
2418 got_offset += alpha_got_entry_size (gotent->reloc_type);
07d6d2b8 2419 }
a7519a3c 2420 }
252b5132 2421
a7519a3c
RH
2422 alpha_elf_tdata(i)->got->size = got_offset;
2423 }
2424}
252b5132 2425
a7519a3c 2426/* Constructs the gots. */
252b5132 2427
b34976b6 2428static bfd_boolean
d1c109de 2429elf64_alpha_size_got_sections (struct bfd_link_info *info,
07d6d2b8 2430 bfd_boolean may_merge)
252b5132 2431{
a7519a3c 2432 bfd *i, *got_list, *cur_got_obj = NULL;
4dfe6ac6 2433 struct alpha_elf_link_hash_table * htab;
252b5132 2434
4dfe6ac6
NC
2435 htab = alpha_elf_hash_table (info);
2436 if (htab == NULL)
2437 return FALSE;
2438 got_list = htab->got_list;
95404643 2439
a7519a3c
RH
2440 /* On the first time through, pretend we have an existing got list
2441 consisting of all of the input files. */
2442 if (got_list == NULL)
252b5132 2443 {
c72f2fb2 2444 for (i = info->input_bfds; i ; i = i->link.next)
252b5132 2445 {
0ffa91dd
NC
2446 bfd *this_got;
2447
2448 if (! is_alpha_elf (i))
2449 continue;
2450
2451 this_got = alpha_elf_tdata (i)->gotobj;
a7519a3c
RH
2452 if (this_got == NULL)
2453 continue;
252b5132 2454
a7519a3c
RH
2455 /* We are assuming no merging has yet occurred. */
2456 BFD_ASSERT (this_got == i);
252b5132 2457
07d6d2b8 2458 if (alpha_elf_tdata (this_got)->total_got_size > MAX_GOT_SIZE)
252b5132 2459 {
a7519a3c 2460 /* Yikes! A single object file has too many entries. */
4eca0228 2461 _bfd_error_handler
695344c0 2462 /* xgettext:c-format */
871b3ab2 2463 (_("%pB: .got subsegment exceeds 64K (size %d)"),
07d6d2b8 2464 i, alpha_elf_tdata (this_got)->total_got_size);
b34976b6 2465 return FALSE;
252b5132 2466 }
252b5132 2467
a7519a3c
RH
2468 if (got_list == NULL)
2469 got_list = this_got;
2470 else
2471 alpha_elf_tdata(cur_got_obj)->got_link_next = this_got;
2472 cur_got_obj = this_got;
252b5132
RH
2473 }
2474
a7519a3c
RH
2475 /* Strange degenerate case of no got references. */
2476 if (got_list == NULL)
2477 return TRUE;
2478
4dfe6ac6 2479 htab->got_list = got_list;
a7519a3c
RH
2480 }
2481
2482 cur_got_obj = got_list;
0ffa91dd
NC
2483 if (cur_got_obj == NULL)
2484 return FALSE;
2485
d1c109de 2486 if (may_merge)
a7519a3c 2487 {
d1c109de
RH
2488 i = alpha_elf_tdata(cur_got_obj)->got_link_next;
2489 while (i != NULL)
252b5132 2490 {
d1c109de
RH
2491 if (elf64_alpha_can_merge_gots (cur_got_obj, i))
2492 {
2493 elf64_alpha_merge_gots (cur_got_obj, i);
252b5132 2494
d1c109de
RH
2495 alpha_elf_tdata(i)->got->size = 0;
2496 i = alpha_elf_tdata(i)->got_link_next;
2497 alpha_elf_tdata(cur_got_obj)->got_link_next = i;
2498 }
2499 else
2500 {
2501 cur_got_obj = i;
2502 i = alpha_elf_tdata(i)->got_link_next;
2503 }
a7519a3c 2504 }
252b5132
RH
2505 }
2506
a7519a3c
RH
2507 /* Once the gots have been merged, fill in the got offsets for
2508 everything therein. */
4a828aab 2509 elf64_alpha_calc_got_offsets (info);
252b5132 2510
a7519a3c 2511 return TRUE;
252b5132 2512}
252b5132 2513
b34976b6 2514static bfd_boolean
2c3fc389
NC
2515elf64_alpha_size_plt_section_1 (struct alpha_elf_link_hash_entry *h,
2516 void * data)
252b5132 2517{
a7519a3c
RH
2518 asection *splt = (asection *) data;
2519 struct alpha_elf_got_entry *gotent;
6ec7057a 2520 bfd_boolean saw_one = FALSE;
252b5132 2521
a7519a3c
RH
2522 /* If we didn't need an entry before, we still don't. */
2523 if (!h->root.needs_plt)
2524 return TRUE;
e92d460e 2525
6ec7057a 2526 /* For each LITERAL got entry still in use, allocate a plt entry. */
a7519a3c
RH
2527 for (gotent = h->got_entries; gotent ; gotent = gotent->next)
2528 if (gotent->reloc_type == R_ALPHA_LITERAL
2529 && gotent->use_count > 0)
6ec7057a
RH
2530 {
2531 if (splt->size == 0)
2532 splt->size = PLT_HEADER_SIZE;
2533 gotent->plt_offset = splt->size;
2534 splt->size += PLT_ENTRY_SIZE;
2535 saw_one = TRUE;
2536 }
a7519a3c 2537
6ec7057a
RH
2538 /* If there weren't any, there's no longer a need for the PLT entry. */
2539 if (!saw_one)
2540 h->root.needs_plt = FALSE;
a7519a3c
RH
2541
2542 return TRUE;
2543}
2544
4a828aab
RH
2545/* Called from relax_section to rebuild the PLT in light of potential changes
2546 in the function's status. */
a7519a3c 2547
4a828aab 2548static void
a7519a3c
RH
2549elf64_alpha_size_plt_section (struct bfd_link_info *info)
2550{
6ec7057a 2551 asection *splt, *spltrel, *sgotplt;
a7519a3c 2552 unsigned long entries;
4dfe6ac6
NC
2553 struct alpha_elf_link_hash_table * htab;
2554
2555 htab = alpha_elf_hash_table (info);
2556 if (htab == NULL)
2557 return;
a7519a3c 2558
ce558b89 2559 splt = elf_hash_table(info)->splt;
a7519a3c 2560 if (splt == NULL)
4a828aab 2561 return;
252b5132 2562
a7519a3c 2563 splt->size = 0;
252b5132 2564
4dfe6ac6 2565 alpha_elf_link_hash_traverse (htab,
a7519a3c 2566 elf64_alpha_size_plt_section_1, splt);
e92d460e 2567
a7519a3c 2568 /* Every plt entry requires a JMP_SLOT relocation. */
ce558b89 2569 spltrel = elf_hash_table(info)->srelplt;
4a828aab 2570 entries = 0;
a7519a3c 2571 if (splt->size)
6ec7057a
RH
2572 {
2573 if (elf64_alpha_use_secureplt)
2574 entries = (splt->size - NEW_PLT_HEADER_SIZE) / NEW_PLT_ENTRY_SIZE;
2575 else
2576 entries = (splt->size - OLD_PLT_HEADER_SIZE) / OLD_PLT_ENTRY_SIZE;
2577 }
a7519a3c 2578 spltrel->size = entries * sizeof (Elf64_External_Rela);
e92d460e 2579
6ec7057a
RH
2580 /* When using the secureplt, we need two words somewhere in the data
2581 segment for the dynamic linker to tell us where to go. This is the
2582 entire contents of the .got.plt section. */
2583 if (elf64_alpha_use_secureplt)
2584 {
ce558b89 2585 sgotplt = elf_hash_table(info)->sgotplt;
6ec7057a
RH
2586 sgotplt->size = entries ? 16 : 0;
2587 }
a7519a3c 2588}
e92d460e 2589
a7519a3c
RH
2590static bfd_boolean
2591elf64_alpha_always_size_sections (bfd *output_bfd ATTRIBUTE_UNUSED,
2592 struct bfd_link_info *info)
2593{
2594 bfd *i;
4dfe6ac6 2595 struct alpha_elf_link_hash_table * htab;
252b5132 2596
0e1862bb 2597 if (bfd_link_relocatable (info))
a7519a3c 2598 return TRUE;
252b5132 2599
4dfe6ac6
NC
2600 htab = alpha_elf_hash_table (info);
2601 if (htab == NULL)
2602 return FALSE;
2603
d1c109de 2604 if (!elf64_alpha_size_got_sections (info, TRUE))
a7519a3c 2605 return FALSE;
252b5132 2606
a7519a3c 2607 /* Allocate space for all of the .got subsections. */
4dfe6ac6 2608 i = htab->got_list;
a7519a3c 2609 for ( ; i ; i = alpha_elf_tdata(i)->got_link_next)
252b5132 2610 {
a7519a3c
RH
2611 asection *s = alpha_elf_tdata(i)->got;
2612 if (s->size > 0)
2613 {
2614 s->contents = (bfd_byte *) bfd_zalloc (i, s->size);
2615 if (s->contents == NULL)
2616 return FALSE;
2617 }
252b5132
RH
2618 }
2619
b34976b6 2620 return TRUE;
252b5132 2621}
3765b1be 2622
a7519a3c 2623/* The number of dynamic relocations required by a static relocation. */
3765b1be 2624
a7519a3c 2625static int
e366eeae 2626alpha_dynamic_entries_for_reloc (int r_type, int dynamic, int shared, int pie)
a7519a3c
RH
2627{
2628 switch (r_type)
3765b1be 2629 {
a7519a3c
RH
2630 /* May appear in GOT entries. */
2631 case R_ALPHA_TLSGD:
2632 return (dynamic ? 2 : shared ? 1 : 0);
2633 case R_ALPHA_TLSLDM:
2634 return shared;
2635 case R_ALPHA_LITERAL:
a7519a3c 2636 return dynamic || shared;
e366eeae
RH
2637 case R_ALPHA_GOTTPREL:
2638 return dynamic || (shared && !pie);
a7519a3c
RH
2639 case R_ALPHA_GOTDTPREL:
2640 return dynamic;
3765b1be 2641
a7519a3c
RH
2642 /* May appear in data sections. */
2643 case R_ALPHA_REFLONG:
2644 case R_ALPHA_REFQUAD:
a7519a3c 2645 return dynamic || shared;
e366eeae
RH
2646 case R_ALPHA_TPREL64:
2647 return dynamic || (shared && !pie);
3765b1be 2648
a7519a3c
RH
2649 /* Everything else is illegal. We'll issue an error during
2650 relocate_section. */
2651 default:
2652 return 0;
2653 }
2654}
3765b1be 2655
a7519a3c 2656/* Work out the sizes of the dynamic relocation entries. */
3765b1be 2657
a7519a3c
RH
2658static bfd_boolean
2659elf64_alpha_calc_dynrel_sizes (struct alpha_elf_link_hash_entry *h,
2660 struct bfd_link_info *info)
2661{
2662 bfd_boolean dynamic;
2663 struct alpha_elf_reloc_entry *relent;
2664 unsigned long entries;
3765b1be 2665
a7519a3c
RH
2666 /* If the symbol was defined as a common symbol in a regular object
2667 file, and there was no definition in any dynamic object, then the
2668 linker will have allocated space for the symbol in a common
2669 section but the ELF_LINK_HASH_DEF_REGULAR flag will not have been
2670 set. This is done for dynamic symbols in
2671 elf_adjust_dynamic_symbol but this is not done for non-dynamic
2672 symbols, somehow. */
2673 if (!h->root.def_regular
2674 && h->root.ref_regular
2675 && !h->root.def_dynamic
2676 && (h->root.root.type == bfd_link_hash_defined
2677 || h->root.root.type == bfd_link_hash_defweak)
2678 && !(h->root.root.u.def.section->owner->flags & DYNAMIC))
2679 h->root.def_regular = 1;
3765b1be 2680
a7519a3c
RH
2681 /* If the symbol is dynamic, we'll need all the relocations in their
2682 natural form. If this is a shared object, and it has been forced
2683 local, we'll need the same number of RELATIVE relocations. */
2684 dynamic = alpha_elf_dynamic_symbol_p (&h->root, info);
3765b1be 2685
a7519a3c
RH
2686 /* If the symbol is a hidden undefined weak, then we never have any
2687 relocations. Avoid the loop which may want to add RELATIVE relocs
0e1862bb 2688 based on bfd_link_pic (info). */
a7519a3c
RH
2689 if (h->root.root.type == bfd_link_hash_undefweak && !dynamic)
2690 return TRUE;
2691
2692 for (relent = h->reloc_entries; relent; relent = relent->next)
3765b1be 2693 {
a7519a3c 2694 entries = alpha_dynamic_entries_for_reloc (relent->rtype, dynamic,
3cbc1e5e
AM
2695 bfd_link_pic (info),
2696 bfd_link_pie (info));
a7519a3c
RH
2697 if (entries)
2698 {
2699 relent->srel->size +=
2700 entries * sizeof (Elf64_External_Rela) * relent->count;
2701 if (relent->reltext)
2702 info->flags |= DT_TEXTREL;
2703 }
2704 }
3765b1be 2705
a7519a3c
RH
2706 return TRUE;
2707}
3765b1be 2708
a7519a3c
RH
2709/* Subroutine of elf64_alpha_size_rela_got_section for doing the
2710 global symbols. */
3765b1be 2711
a7519a3c
RH
2712static bfd_boolean
2713elf64_alpha_size_rela_got_1 (struct alpha_elf_link_hash_entry *h,
2714 struct bfd_link_info *info)
2715{
2716 bfd_boolean dynamic;
2717 struct alpha_elf_got_entry *gotent;
2718 unsigned long entries;
3765b1be 2719
6ec7057a
RH
2720 /* If we're using a plt for this symbol, then all of its relocations
2721 for its got entries go into .rela.plt. */
2722 if (h->root.needs_plt)
2723 return TRUE;
2724
a7519a3c
RH
2725 /* If the symbol is dynamic, we'll need all the relocations in their
2726 natural form. If this is a shared object, and it has been forced
2727 local, we'll need the same number of RELATIVE relocations. */
2728 dynamic = alpha_elf_dynamic_symbol_p (&h->root, info);
2729
2730 /* If the symbol is a hidden undefined weak, then we never have any
2731 relocations. Avoid the loop which may want to add RELATIVE relocs
0e1862bb 2732 based on bfd_link_pic (info). */
a7519a3c
RH
2733 if (h->root.root.type == bfd_link_hash_undefweak && !dynamic)
2734 return TRUE;
2735
2736 entries = 0;
2737 for (gotent = h->got_entries; gotent ; gotent = gotent->next)
2738 if (gotent->use_count > 0)
e366eeae 2739 entries += alpha_dynamic_entries_for_reloc (gotent->reloc_type, dynamic,
0e1862bb
L
2740 bfd_link_pic (info),
2741 bfd_link_pie (info));
a7519a3c 2742
a7519a3c
RH
2743 if (entries > 0)
2744 {
ce558b89 2745 asection *srel = elf_hash_table(info)->srelgot;
a7519a3c
RH
2746 BFD_ASSERT (srel != NULL);
2747 srel->size += sizeof (Elf64_External_Rela) * entries;
3765b1be 2748 }
3765b1be 2749
a7519a3c 2750 return TRUE;
3765b1be
RH
2751}
2752
a7519a3c 2753/* Set the sizes of the dynamic relocation sections. */
252b5132 2754
4a828aab 2755static void
a7519a3c 2756elf64_alpha_size_rela_got_section (struct bfd_link_info *info)
252b5132 2757{
a7519a3c 2758 unsigned long entries;
ce558b89 2759 bfd *i;
a7519a3c 2760 asection *srel;
4dfe6ac6
NC
2761 struct alpha_elf_link_hash_table * htab;
2762
2763 htab = alpha_elf_hash_table (info);
2764 if (htab == NULL)
2765 return;
252b5132 2766
a7519a3c
RH
2767 /* Shared libraries often require RELATIVE relocs, and some relocs
2768 require attention for the main application as well. */
252b5132 2769
a7519a3c 2770 entries = 0;
4dfe6ac6 2771 for (i = htab->got_list;
a7519a3c
RH
2772 i ; i = alpha_elf_tdata(i)->got_link_next)
2773 {
2774 bfd *j;
3241278a 2775
a7519a3c
RH
2776 for (j = i; j ; j = alpha_elf_tdata(j)->in_got_link_next)
2777 {
2778 struct alpha_elf_got_entry **local_got_entries, *gotent;
2779 int k, n;
252b5132 2780
a7519a3c
RH
2781 local_got_entries = alpha_elf_tdata(j)->local_got_entries;
2782 if (!local_got_entries)
2783 continue;
252b5132 2784
a7519a3c
RH
2785 for (k = 0, n = elf_tdata(j)->symtab_hdr.sh_info; k < n; ++k)
2786 for (gotent = local_got_entries[k];
2787 gotent ; gotent = gotent->next)
2788 if (gotent->use_count > 0)
2789 entries += (alpha_dynamic_entries_for_reloc
0e1862bb
L
2790 (gotent->reloc_type, 0, bfd_link_pic (info),
2791 bfd_link_pie (info)));
a7519a3c
RH
2792 }
2793 }
3765b1be 2794
ce558b89 2795 srel = elf_hash_table(info)->srelgot;
a7519a3c
RH
2796 if (!srel)
2797 {
2798 BFD_ASSERT (entries == 0);
4a828aab 2799 return;
a7519a3c
RH
2800 }
2801 srel->size = sizeof (Elf64_External_Rela) * entries;
252b5132 2802
a7519a3c 2803 /* Now do the non-local symbols. */
4dfe6ac6 2804 alpha_elf_link_hash_traverse (htab,
a7519a3c 2805 elf64_alpha_size_rela_got_1, info);
a7519a3c 2806}
252b5132 2807
a7519a3c 2808/* Set the sizes of the dynamic sections. */
3765b1be 2809
a7519a3c
RH
2810static bfd_boolean
2811elf64_alpha_size_dynamic_sections (bfd *output_bfd ATTRIBUTE_UNUSED,
2812 struct bfd_link_info *info)
2813{
2814 bfd *dynobj;
2815 asection *s;
24f1a751 2816 bfd_boolean relplt, relocs;
4dfe6ac6
NC
2817 struct alpha_elf_link_hash_table * htab;
2818
2819 htab = alpha_elf_hash_table (info);
2820 if (htab == NULL)
2821 return FALSE;
3765b1be 2822
a7519a3c
RH
2823 dynobj = elf_hash_table(info)->dynobj;
2824 BFD_ASSERT(dynobj != NULL);
252b5132 2825
a7519a3c
RH
2826 if (elf_hash_table (info)->dynamic_sections_created)
2827 {
2828 /* Set the contents of the .interp section to the interpreter. */
9b8b325a 2829 if (bfd_link_executable (info) && !info->nointerp)
252b5132 2830 {
3d4d4302 2831 s = bfd_get_linker_section (dynobj, ".interp");
a7519a3c
RH
2832 BFD_ASSERT (s != NULL);
2833 s->size = sizeof ELF_DYNAMIC_INTERPRETER;
2834 s->contents = (unsigned char *) ELF_DYNAMIC_INTERPRETER;
2835 }
3765b1be 2836
a7519a3c
RH
2837 /* Now that we've seen all of the input files, we can decide which
2838 symbols need dynamic relocation entries and which don't. We've
2839 collected information in check_relocs that we can now apply to
2840 size the dynamic relocation sections. */
4dfe6ac6 2841 alpha_elf_link_hash_traverse (htab,
a7519a3c 2842 elf64_alpha_calc_dynrel_sizes, info);
252b5132 2843
a7519a3c 2844 elf64_alpha_size_rela_got_section (info);
6ec7057a 2845 elf64_alpha_size_plt_section (info);
a7519a3c
RH
2846 }
2847 /* else we're not dynamic and by definition we don't need such things. */
3765b1be 2848
a7519a3c
RH
2849 /* The check_relocs and adjust_dynamic_symbol entry points have
2850 determined the sizes of the various dynamic sections. Allocate
2851 memory for them. */
2852 relplt = FALSE;
24f1a751 2853 relocs = FALSE;
a7519a3c
RH
2854 for (s = dynobj->sections; s != NULL; s = s->next)
2855 {
2856 const char *name;
3765b1be 2857
a7519a3c
RH
2858 if (!(s->flags & SEC_LINKER_CREATED))
2859 continue;
cc03ec80 2860
a7519a3c
RH
2861 /* It's OK to base decisions on the section name, because none
2862 of the dynobj section names depend upon the input files. */
fd361982 2863 name = bfd_section_name (s);
3765b1be 2864
0112cd26 2865 if (CONST_STRNEQ (name, ".rela"))
3765b1be 2866 {
c456f082 2867 if (s->size != 0)
a7519a3c 2868 {
c456f082 2869 if (strcmp (name, ".rela.plt") == 0)
a7519a3c 2870 relplt = TRUE;
24f1a751
AM
2871 else
2872 relocs = TRUE;
252b5132 2873
a7519a3c
RH
2874 /* We use the reloc_count field as a counter if we need
2875 to copy relocs into the output file. */
2876 s->reloc_count = 0;
252b5132 2877 }
3765b1be 2878 }
0112cd26 2879 else if (! CONST_STRNEQ (name, ".got")
c456f082
AM
2880 && strcmp (name, ".plt") != 0
2881 && strcmp (name, ".dynbss") != 0)
3765b1be 2882 {
a7519a3c
RH
2883 /* It's not one of our dynamic sections, so don't allocate space. */
2884 continue;
2885 }
252b5132 2886
c456f082
AM
2887 if (s->size == 0)
2888 {
2889 /* If we don't need this section, strip it from the output file.
2890 This is to handle .rela.bss and .rela.plt. We must create it
2891 in create_dynamic_sections, because it must be created before
2892 the linker maps input sections to output sections. The
2893 linker does that before adjust_dynamic_symbol is called, and
2894 it is that function which decides whether anything needs to
2895 go into these sections. */
6452a567
RH
2896 if (!CONST_STRNEQ (name, ".got"))
2897 s->flags |= SEC_EXCLUDE;
c456f082
AM
2898 }
2899 else if ((s->flags & SEC_HAS_CONTENTS) != 0)
a7519a3c
RH
2900 {
2901 /* Allocate memory for the section contents. */
2902 s->contents = (bfd_byte *) bfd_zalloc (dynobj, s->size);
c456f082 2903 if (s->contents == NULL)
b34976b6 2904 return FALSE;
a7519a3c
RH
2905 }
2906 }
3765b1be 2907
a7519a3c
RH
2908 if (elf_hash_table (info)->dynamic_sections_created)
2909 {
2910 /* Add some entries to the .dynamic section. We fill in the
2911 values later, in elf64_alpha_finish_dynamic_sections, but we
2912 must add the entries now so that we get the correct size for
2913 the .dynamic section. The DT_DEBUG entry is filled in by the
2914 dynamic linker and used by the debugger. */
2915#define add_dynamic_entry(TAG, VAL) \
2916 _bfd_elf_add_dynamic_entry (info, TAG, VAL)
3765b1be 2917
0e1862bb 2918 if (bfd_link_executable (info))
a7519a3c
RH
2919 {
2920 if (!add_dynamic_entry (DT_DEBUG, 0))
2921 return FALSE;
3765b1be
RH
2922 }
2923
a7519a3c 2924 if (relplt)
3765b1be 2925 {
a7519a3c
RH
2926 if (!add_dynamic_entry (DT_PLTGOT, 0)
2927 || !add_dynamic_entry (DT_PLTRELSZ, 0)
2928 || !add_dynamic_entry (DT_PLTREL, DT_RELA)
2929 || !add_dynamic_entry (DT_JMPREL, 0))
2930 return FALSE;
6ec7057a
RH
2931
2932 if (elf64_alpha_use_secureplt
2933 && !add_dynamic_entry (DT_ALPHA_PLTRO, 1))
2934 return FALSE;
a7519a3c 2935 }
252b5132 2936
24f1a751 2937 if (relocs)
a7519a3c 2938 {
24f1a751
AM
2939 if (!add_dynamic_entry (DT_RELA, 0)
2940 || !add_dynamic_entry (DT_RELASZ, 0)
2941 || !add_dynamic_entry (DT_RELAENT, sizeof (Elf64_External_Rela)))
a7519a3c 2942 return FALSE;
24f1a751
AM
2943
2944 if (info->flags & DF_TEXTREL)
2945 {
2946 if (!add_dynamic_entry (DT_TEXTREL, 0))
2947 return FALSE;
2948 }
252b5132
RH
2949 }
2950 }
a7519a3c 2951#undef add_dynamic_entry
252b5132 2952
b34976b6 2953 return TRUE;
252b5132 2954}
a7519a3c
RH
2955\f
2956/* These functions do relaxation for Alpha ELF.
252b5132 2957
a7519a3c
RH
2958 Currently I'm only handling what I can do with existing compiler
2959 and assembler support, which means no instructions are removed,
2960 though some may be nopped. At this time GCC does not emit enough
2961 information to do all of the relaxing that is possible. It will
2962 take some not small amount of work for that to happen.
252b5132 2963
a7519a3c
RH
2964 There are a couple of interesting papers that I once read on this
2965 subject, that I cannot find references to at the moment, that
2966 related to Alpha in particular. They are by David Wall, then of
2967 DEC WRL. */
252b5132 2968
a7519a3c
RH
2969struct alpha_relax_info
2970{
2971 bfd *abfd;
2972 asection *sec;
2973 bfd_byte *contents;
2974 Elf_Internal_Shdr *symtab_hdr;
2975 Elf_Internal_Rela *relocs, *relend;
2976 struct bfd_link_info *link_info;
2977 bfd_vma gp;
2978 bfd *gotobj;
2979 asection *tsec;
2980 struct alpha_elf_link_hash_entry *h;
2981 struct alpha_elf_got_entry **first_gotent;
2982 struct alpha_elf_got_entry *gotent;
2983 bfd_boolean changed_contents;
2984 bfd_boolean changed_relocs;
2985 unsigned char other;
2986};
252b5132 2987
a7519a3c
RH
2988static Elf_Internal_Rela *
2989elf64_alpha_find_reloc_at_ofs (Elf_Internal_Rela *rel,
2990 Elf_Internal_Rela *relend,
2991 bfd_vma offset, int type)
2992{
2993 while (rel < relend)
252b5132 2994 {
a7519a3c
RH
2995 if (rel->r_offset == offset
2996 && ELF64_R_TYPE (rel->r_info) == (unsigned int) type)
2997 return rel;
2998 ++rel;
2999 }
3000 return NULL;
3001}
252b5132 3002
a7519a3c
RH
3003static bfd_boolean
3004elf64_alpha_relax_got_load (struct alpha_relax_info *info, bfd_vma symval,
3005 Elf_Internal_Rela *irel, unsigned long r_type)
3006{
3007 unsigned int insn;
3008 bfd_signed_vma disp;
252b5132 3009
a7519a3c
RH
3010 /* Get the instruction. */
3011 insn = bfd_get_32 (info->abfd, info->contents + irel->r_offset);
252b5132 3012
a7519a3c
RH
3013 if (insn >> 26 != OP_LDQ)
3014 {
3015 reloc_howto_type *howto = elf64_alpha_howto_table + r_type;
4eca0228 3016 _bfd_error_handler
695344c0 3017 /* xgettext:c-format */
2dcf00ce
AM
3018 (_("%pB: %pA+%#" PRIx64 ": warning: "
3019 "%s relocation against unexpected insn"),
3020 info->abfd, info->sec, (uint64_t) irel->r_offset, howto->name);
a7519a3c
RH
3021 return TRUE;
3022 }
252b5132 3023
a7519a3c
RH
3024 /* Can't relax dynamic symbols. */
3025 if (alpha_elf_dynamic_symbol_p (&info->h->root, info->link_info))
3026 return TRUE;
252b5132 3027
a7519a3c 3028 /* Can't use local-exec relocations in shared libraries. */
e366eeae 3029 if (r_type == R_ALPHA_GOTTPREL
3cbc1e5e 3030 && bfd_link_dll (info->link_info))
a7519a3c 3031 return TRUE;
252b5132 3032
a7519a3c
RH
3033 if (r_type == R_ALPHA_LITERAL)
3034 {
3035 /* Look for nice constant addresses. This includes the not-uncommon
3036 special case of 0 for undefweak symbols. */
3037 if ((info->h && info->h->root.root.type == bfd_link_hash_undefweak)
0e1862bb 3038 || (!bfd_link_pic (info->link_info)
a7519a3c
RH
3039 && (symval >= (bfd_vma)-0x8000 || symval < 0x8000)))
3040 {
3041 disp = 0;
3042 insn = (OP_LDA << 26) | (insn & (31 << 21)) | (31 << 16);
3043 insn |= (symval & 0xffff);
3044 r_type = R_ALPHA_NONE;
3045 }
3046 else
3047 {
d1c109de
RH
3048 /* We may only create GPREL relocs during the second pass. */
3049 if (info->link_info->relax_pass == 0)
3050 return TRUE;
3051
a7519a3c
RH
3052 disp = symval - info->gp;
3053 insn = (OP_LDA << 26) | (insn & 0x03ff0000);
3054 r_type = R_ALPHA_GPREL16;
3055 }
252b5132
RH
3056 }
3057 else
252b5132 3058 {
a7519a3c 3059 bfd_vma dtp_base, tp_base;
252b5132 3060
a7519a3c
RH
3061 BFD_ASSERT (elf_hash_table (info->link_info)->tls_sec != NULL);
3062 dtp_base = alpha_get_dtprel_base (info->link_info);
3063 tp_base = alpha_get_tprel_base (info->link_info);
3064 disp = symval - (r_type == R_ALPHA_GOTDTPREL ? dtp_base : tp_base);
252b5132 3065
a7519a3c 3066 insn = (OP_LDA << 26) | (insn & (31 << 21)) | (31 << 16);
252b5132 3067
a7519a3c
RH
3068 switch (r_type)
3069 {
3070 case R_ALPHA_GOTDTPREL:
3071 r_type = R_ALPHA_DTPREL16;
3072 break;
3073 case R_ALPHA_GOTTPREL:
3074 r_type = R_ALPHA_TPREL16;
3075 break;
3076 default:
3077 BFD_ASSERT (0);
3078 return FALSE;
3079 }
3080 }
252b5132 3081
a7519a3c 3082 if (disp < -0x8000 || disp >= 0x8000)
b34976b6 3083 return TRUE;
252b5132 3084
a7519a3c
RH
3085 bfd_put_32 (info->abfd, (bfd_vma) insn, info->contents + irel->r_offset);
3086 info->changed_contents = TRUE;
252b5132 3087
a7519a3c
RH
3088 /* Reduce the use count on this got entry by one, possibly
3089 eliminating it. */
3090 if (--info->gotent->use_count == 0)
252b5132 3091 {
a7519a3c
RH
3092 int sz = alpha_got_entry_size (r_type);
3093 alpha_elf_tdata (info->gotobj)->total_got_size -= sz;
3094 if (!info->h)
3095 alpha_elf_tdata (info->gotobj)->local_got_size -= sz;
252b5132 3096 }
252b5132 3097
a7519a3c
RH
3098 /* Smash the existing GOT relocation for its 16-bit immediate pair. */
3099 irel->r_info = ELF64_R_INFO (ELF64_R_SYM (irel->r_info), r_type);
3100 info->changed_relocs = TRUE;
3101
3102 /* ??? Search forward through this basic block looking for insns
3103 that use the target register. Stop after an insn modifying the
3104 register is seen, or after a branch or call.
252b5132 3105
a7519a3c
RH
3106 Any such memory load insn may be substituted by a load directly
3107 off the GP. This allows the memory load insn to be issued before
3108 the calculated GP register would otherwise be ready.
252b5132 3109
a7519a3c
RH
3110 Any such jsr insn can be replaced by a bsr if it is in range.
3111
3112 This would mean that we'd have to _add_ relocations, the pain of
3113 which gives one pause. */
252b5132 3114
b34976b6 3115 return TRUE;
252b5132
RH
3116}
3117
a7519a3c
RH
3118static bfd_vma
3119elf64_alpha_relax_opt_call (struct alpha_relax_info *info, bfd_vma symval)
252b5132 3120{
a7519a3c
RH
3121 /* If the function has the same gp, and we can identify that the
3122 function does not use its function pointer, we can eliminate the
3123 address load. */
252b5132 3124
a7519a3c
RH
3125 /* If the symbol is marked NOPV, we are being told the function never
3126 needs its procedure value. */
3127 if ((info->other & STO_ALPHA_STD_GPLOAD) == STO_ALPHA_NOPV)
3128 return symval;
252b5132 3129
a7519a3c
RH
3130 /* If the symbol is marked STD_GP, we are being told the function does
3131 a normal ldgp in the first two words. */
3132 else if ((info->other & STO_ALPHA_STD_GPLOAD) == STO_ALPHA_STD_GPLOAD)
3133 ;
252b5132 3134
a7519a3c
RH
3135 /* Otherwise, we may be able to identify a GP load in the first two
3136 words, which we can then skip. */
3137 else
252b5132 3138 {
a7519a3c
RH
3139 Elf_Internal_Rela *tsec_relocs, *tsec_relend, *tsec_free, *gpdisp;
3140 bfd_vma ofs;
252b5132 3141
a7519a3c
RH
3142 /* Load the relocations from the section that the target symbol is in. */
3143 if (info->sec == info->tsec)
252b5132 3144 {
a7519a3c
RH
3145 tsec_relocs = info->relocs;
3146 tsec_relend = info->relend;
3147 tsec_free = NULL;
3148 }
3149 else
3150 {
3151 tsec_relocs = (_bfd_elf_link_read_relocs
07d6d2b8 3152 (info->abfd, info->tsec, NULL,
a7519a3c
RH
3153 (Elf_Internal_Rela *) NULL,
3154 info->link_info->keep_memory));
3155 if (tsec_relocs == NULL)
3156 return 0;
3157 tsec_relend = tsec_relocs + info->tsec->reloc_count;
ae4fda66
JC
3158 tsec_free = (elf_section_data (info->tsec)->relocs == tsec_relocs
3159 ? NULL
3160 : tsec_relocs);
a7519a3c 3161 }
252b5132 3162
a7519a3c
RH
3163 /* Recover the symbol's offset within the section. */
3164 ofs = (symval - info->tsec->output_section->vma
3165 - info->tsec->output_offset);
252b5132 3166
a7519a3c
RH
3167 /* Look for a GPDISP reloc. */
3168 gpdisp = (elf64_alpha_find_reloc_at_ofs
3169 (tsec_relocs, tsec_relend, ofs, R_ALPHA_GPDISP));
252b5132 3170
a7519a3c
RH
3171 if (!gpdisp || gpdisp->r_addend != 4)
3172 {
3173 if (tsec_free)
3174 free (tsec_free);
3175 return 0;
252b5132 3176 }
a7519a3c 3177 if (tsec_free)
07d6d2b8 3178 free (tsec_free);
252b5132
RH
3179 }
3180
a7519a3c
RH
3181 /* We've now determined that we can skip an initial gp load. Verify
3182 that the call and the target use the same gp. */
f13a99db 3183 if (info->link_info->output_bfd->xvec != info->tsec->owner->xvec
a7519a3c
RH
3184 || info->gotobj != alpha_elf_tdata (info->tsec->owner)->gotobj)
3185 return 0;
252b5132 3186
a7519a3c
RH
3187 return symval + 8;
3188}
252b5132 3189
a7519a3c
RH
3190static bfd_boolean
3191elf64_alpha_relax_with_lituse (struct alpha_relax_info *info,
3192 bfd_vma symval, Elf_Internal_Rela *irel)
252b5132 3193{
d1c109de
RH
3194 Elf_Internal_Rela *urel, *erel, *irelend = info->relend;
3195 int flags;
a7519a3c
RH
3196 bfd_signed_vma disp;
3197 bfd_boolean fits16;
3198 bfd_boolean fits32;
3199 bfd_boolean lit_reused = FALSE;
3200 bfd_boolean all_optimized = TRUE;
d1c109de
RH
3201 bfd_boolean changed_contents;
3202 bfd_boolean changed_relocs;
3203 bfd_byte *contents = info->contents;
3204 bfd *abfd = info->abfd;
3205 bfd_vma sec_output_vma;
a7519a3c 3206 unsigned int lit_insn;
d1c109de 3207 int relax_pass;
252b5132 3208
d1c109de 3209 lit_insn = bfd_get_32 (abfd, contents + irel->r_offset);
a7519a3c
RH
3210 if (lit_insn >> 26 != OP_LDQ)
3211 {
4eca0228 3212 _bfd_error_handler
695344c0 3213 /* xgettext:c-format */
2dcf00ce 3214 (_("%pB: %pA+%#" PRIx64 ": warning: "
38f14ab8
AM
3215 "%s relocation against unexpected insn"),
3216 abfd, info->sec, (uint64_t) irel->r_offset, "LITERAL");
a7519a3c
RH
3217 return TRUE;
3218 }
252b5132 3219
a7519a3c
RH
3220 /* Can't relax dynamic symbols. */
3221 if (alpha_elf_dynamic_symbol_p (&info->h->root, info->link_info))
3222 return TRUE;
3223
d1c109de
RH
3224 changed_contents = info->changed_contents;
3225 changed_relocs = info->changed_relocs;
3226 sec_output_vma = info->sec->output_section->vma + info->sec->output_offset;
3227 relax_pass = info->link_info->relax_pass;
3228
a7519a3c 3229 /* Summarize how this particular LITERAL is used. */
d1c109de 3230 for (erel = irel+1, flags = 0; erel < irelend; ++erel)
252b5132 3231 {
d1c109de 3232 if (ELF64_R_TYPE (erel->r_info) != R_ALPHA_LITUSE)
a7519a3c 3233 break;
d1c109de
RH
3234 if (erel->r_addend <= 6)
3235 flags |= 1 << erel->r_addend;
a7519a3c 3236 }
252b5132 3237
a7519a3c
RH
3238 /* A little preparation for the loop... */
3239 disp = symval - info->gp;
252b5132 3240
d1c109de 3241 for (urel = irel+1; urel < erel; ++urel)
a7519a3c 3242 {
d1c109de 3243 bfd_vma urel_r_offset = urel->r_offset;
a7519a3c
RH
3244 unsigned int insn;
3245 int insn_disp;
3246 bfd_signed_vma xdisp;
d1c109de 3247 Elf_Internal_Rela nrel;
252b5132 3248
d1c109de 3249 insn = bfd_get_32 (abfd, contents + urel_r_offset);
252b5132 3250
a7519a3c
RH
3251 switch (urel->r_addend)
3252 {
3253 case LITUSE_ALPHA_ADDR:
3254 default:
3255 /* This type is really just a placeholder to note that all
3256 uses cannot be optimized, but to still allow some. */
3257 all_optimized = FALSE;
3258 break;
252b5132 3259
a7519a3c 3260 case LITUSE_ALPHA_BASE:
d1c109de
RH
3261 /* We may only create GPREL relocs during the second pass. */
3262 if (relax_pass == 0)
3263 {
3264 all_optimized = FALSE;
3265 break;
3266 }
3267
a7519a3c 3268 /* We can always optimize 16-bit displacements. */
252b5132 3269
a7519a3c
RH
3270 /* Extract the displacement from the instruction, sign-extending
3271 it if necessary, then test whether it is within 16 or 32 bits
3272 displacement from GP. */
3273 insn_disp = ((insn & 0xffff) ^ 0x8000) - 0x8000;
3274
3275 xdisp = disp + insn_disp;
3276 fits16 = (xdisp >= - (bfd_signed_vma) 0x8000 && xdisp < 0x8000);
3277 fits32 = (xdisp >= - (bfd_signed_vma) 0x80000000
3278 && xdisp < 0x7fff8000);
3279
3280 if (fits16)
3281 {
3282 /* Take the op code and dest from this insn, take the base
3283 register from the literal insn. Leave the offset alone. */
3284 insn = (insn & 0xffe0ffff) | (lit_insn & 0x001f0000);
d1c109de
RH
3285 bfd_put_32 (abfd, (bfd_vma) insn, contents + urel_r_offset);
3286 changed_contents = TRUE;
3287
3288 nrel = *urel;
3289 nrel.r_info = ELF64_R_INFO (ELF64_R_SYM (irel->r_info),
3290 R_ALPHA_GPREL16);
3291 nrel.r_addend = irel->r_addend;
3292
3293 /* As we adjust, move the reloc to the end so that we don't
07d6d2b8 3294 break the LITERAL+LITUSE chain. */
d1c109de 3295 if (urel < --erel)
07d6d2b8 3296 *urel-- = *erel;
d1c109de
RH
3297 *erel = nrel;
3298 changed_relocs = TRUE;
252b5132 3299 }
252b5132 3300
a7519a3c
RH
3301 /* If all mem+byte, we can optimize 32-bit mem displacements. */
3302 else if (fits32 && !(flags & ~6))
3303 {
3304 /* FIXME: sanity check that lit insn Ra is mem insn Rb. */
252b5132 3305
a7519a3c
RH
3306 irel->r_info = ELF64_R_INFO (ELF64_R_SYM (irel->r_info),
3307 R_ALPHA_GPRELHIGH);
3308 lit_insn = (OP_LDAH << 26) | (lit_insn & 0x03ff0000);
d1c109de 3309 bfd_put_32 (abfd, (bfd_vma) lit_insn, contents + irel->r_offset);
a7519a3c 3310 lit_reused = TRUE;
d1c109de 3311 changed_contents = TRUE;
252b5132 3312
07d6d2b8
AM
3313 /* Since all relocs must be optimized, don't bother swapping
3314 this relocation to the end. */
a7519a3c
RH
3315 urel->r_info = ELF64_R_INFO (ELF64_R_SYM (irel->r_info),
3316 R_ALPHA_GPRELLOW);
3317 urel->r_addend = irel->r_addend;
d1c109de 3318 changed_relocs = TRUE;
a7519a3c
RH
3319 }
3320 else
3321 all_optimized = FALSE;
3322 break;
252b5132 3323
a7519a3c
RH
3324 case LITUSE_ALPHA_BYTOFF:
3325 /* We can always optimize byte instructions. */
252b5132 3326
a7519a3c
RH
3327 /* FIXME: sanity check the insn for byte op. Check that the
3328 literal dest reg is indeed Rb in the byte insn. */
252b5132 3329
a7519a3c
RH
3330 insn &= ~ (unsigned) 0x001ff000;
3331 insn |= ((symval & 7) << 13) | 0x1000;
d1c109de
RH
3332 bfd_put_32 (abfd, (bfd_vma) insn, contents + urel_r_offset);
3333 changed_contents = TRUE;
3334
3335 nrel = *urel;
3336 nrel.r_info = ELF64_R_INFO (0, R_ALPHA_NONE);
3337 nrel.r_addend = 0;
3338
3339 /* As we adjust, move the reloc to the end so that we don't
3340 break the LITERAL+LITUSE chain. */
3341 if (urel < --erel)
3342 *urel-- = *erel;
3343 *erel = nrel;
3344 changed_relocs = TRUE;
a7519a3c 3345 break;
252b5132 3346
a7519a3c
RH
3347 case LITUSE_ALPHA_JSR:
3348 case LITUSE_ALPHA_TLSGD:
3349 case LITUSE_ALPHA_TLSLDM:
8288a39e 3350 case LITUSE_ALPHA_JSRDIRECT:
0d5f9994 3351 {
a7519a3c
RH
3352 bfd_vma optdest, org;
3353 bfd_signed_vma odisp;
252b5132 3354
a7519a3c
RH
3355 /* For undefined weak symbols, we're mostly interested in getting
3356 rid of the got entry whenever possible, so optimize this to a
3357 use of the zero register. */
3358 if (info->h && info->h->root.root.type == bfd_link_hash_undefweak)
3359 {
3360 insn |= 31 << 16;
d1c109de 3361 bfd_put_32 (abfd, (bfd_vma) insn, contents + urel_r_offset);
252b5132 3362
d1c109de 3363 changed_contents = TRUE;
a7519a3c
RH
3364 break;
3365 }
252b5132 3366
a7519a3c
RH
3367 /* If not zero, place to jump without needing pv. */
3368 optdest = elf64_alpha_relax_opt_call (info, symval);
d1c109de 3369 org = sec_output_vma + urel_r_offset + 4;
a7519a3c 3370 odisp = (optdest ? optdest : symval) - org;
252b5132 3371
a7519a3c
RH
3372 if (odisp >= -0x400000 && odisp < 0x400000)
3373 {
3374 Elf_Internal_Rela *xrel;
252b5132 3375
a7519a3c
RH
3376 /* Preserve branch prediction call stack when possible. */
3377 if ((insn & INSN_JSR_MASK) == INSN_JSR)
3378 insn = (OP_BSR << 26) | (insn & 0x03e00000);
3379 else
3380 insn = (OP_BR << 26) | (insn & 0x03e00000);
d1c109de
RH
3381 bfd_put_32 (abfd, (bfd_vma) insn, contents + urel_r_offset);
3382 changed_contents = TRUE;
252b5132 3383
d1c109de
RH
3384 nrel = *urel;
3385 nrel.r_info = ELF64_R_INFO (ELF64_R_SYM (irel->r_info),
3386 R_ALPHA_BRADDR);
3387 nrel.r_addend = irel->r_addend;
252b5132 3388
a7519a3c 3389 if (optdest)
d1c109de 3390 nrel.r_addend += optdest - symval;
a7519a3c
RH
3391 else
3392 all_optimized = FALSE;
252b5132 3393
a7519a3c
RH
3394 /* Kill any HINT reloc that might exist for this insn. */
3395 xrel = (elf64_alpha_find_reloc_at_ofs
d1c109de 3396 (info->relocs, info->relend, urel_r_offset,
a7519a3c
RH
3397 R_ALPHA_HINT));
3398 if (xrel)
3399 xrel->r_info = ELF64_R_INFO (0, R_ALPHA_NONE);
252b5132 3400
d1c109de
RH
3401 /* As we adjust, move the reloc to the end so that we don't
3402 break the LITERAL+LITUSE chain. */
3403 if (urel < --erel)
3404 *urel-- = *erel;
3405 *erel = nrel;
3406
a7519a3c
RH
3407 info->changed_relocs = TRUE;
3408 }
3409 else
3410 all_optimized = FALSE;
252b5132 3411
a7519a3c
RH
3412 /* Even if the target is not in range for a direct branch,
3413 if we share a GP, we can eliminate the gp reload. */
3414 if (optdest)
3415 {
3416 Elf_Internal_Rela *gpdisp
3417 = (elf64_alpha_find_reloc_at_ofs
d1c109de 3418 (info->relocs, irelend, urel_r_offset + 4,
a7519a3c
RH
3419 R_ALPHA_GPDISP));
3420 if (gpdisp)
3421 {
d1c109de 3422 bfd_byte *p_ldah = contents + gpdisp->r_offset;
a7519a3c 3423 bfd_byte *p_lda = p_ldah + gpdisp->r_addend;
d1c109de
RH
3424 unsigned int ldah = bfd_get_32 (abfd, p_ldah);
3425 unsigned int lda = bfd_get_32 (abfd, p_lda);
252b5132 3426
a7519a3c
RH
3427 /* Verify that the instruction is "ldah $29,0($26)".
3428 Consider a function that ends in a noreturn call,
3429 and that the next function begins with an ldgp,
3430 and that by accident there is no padding between.
3431 In that case the insn would use $27 as the base. */
3432 if (ldah == 0x27ba0000 && lda == 0x23bd0000)
3433 {
d1c109de
RH
3434 bfd_put_32 (abfd, (bfd_vma) INSN_UNOP, p_ldah);
3435 bfd_put_32 (abfd, (bfd_vma) INSN_UNOP, p_lda);
252b5132 3436
a7519a3c 3437 gpdisp->r_info = ELF64_R_INFO (0, R_ALPHA_NONE);
d1c109de
RH
3438 changed_contents = TRUE;
3439 changed_relocs = TRUE;
a7519a3c
RH
3440 }
3441 }
3442 }
3443 }
3444 break;
252b5132 3445 }
252b5132
RH
3446 }
3447
d1c109de
RH
3448 /* If we reused the literal instruction, we must have optimized all. */
3449 BFD_ASSERT(!lit_reused || all_optimized);
3450
a7519a3c
RH
3451 /* If all cases were optimized, we can reduce the use count on this
3452 got entry by one, possibly eliminating it. */
3453 if (all_optimized)
252b5132 3454 {
a7519a3c 3455 if (--info->gotent->use_count == 0)
252b5132 3456 {
a7519a3c
RH
3457 int sz = alpha_got_entry_size (R_ALPHA_LITERAL);
3458 alpha_elf_tdata (info->gotobj)->total_got_size -= sz;
3459 if (!info->h)
3460 alpha_elf_tdata (info->gotobj)->local_got_size -= sz;
252b5132 3461 }
a7519a3c
RH
3462
3463 /* If the literal instruction is no longer needed (it may have been
3464 reused. We can eliminate it. */
3465 /* ??? For now, I don't want to deal with compacting the section,
3466 so just nop it out. */
3467 if (!lit_reused)
252b5132 3468 {
a7519a3c 3469 irel->r_info = ELF64_R_INFO (0, R_ALPHA_NONE);
d1c109de 3470 changed_relocs = TRUE;
252b5132 3471
d1c109de
RH
3472 bfd_put_32 (abfd, (bfd_vma) INSN_UNOP, contents + irel->r_offset);
3473 changed_contents = TRUE;
a7519a3c 3474 }
a7519a3c 3475 }
d1c109de
RH
3476
3477 info->changed_contents = changed_contents;
3478 info->changed_relocs = changed_relocs;
3479
3480 if (all_optimized || relax_pass == 0)
3481 return TRUE;
3482 return elf64_alpha_relax_got_load (info, symval, irel, R_ALPHA_LITERAL);
252b5132
RH
3483}
3484
b34976b6 3485static bfd_boolean
a7519a3c
RH
3486elf64_alpha_relax_tls_get_addr (struct alpha_relax_info *info, bfd_vma symval,
3487 Elf_Internal_Rela *irel, bfd_boolean is_gd)
f44f99a5 3488{
a7519a3c 3489 bfd_byte *pos[5];
891caa9b 3490 unsigned int insn, tlsgd_reg;
a7519a3c 3491 Elf_Internal_Rela *gpdisp, *hint;
891caa9b 3492 bfd_boolean dynamic, use_gottprel;
a7519a3c 3493 unsigned long new_symndx;
f44f99a5 3494
a7519a3c 3495 dynamic = alpha_elf_dynamic_symbol_p (&info->h->root, info->link_info);
f44f99a5 3496
a7519a3c
RH
3497 /* If a TLS symbol is accessed using IE at least once, there is no point
3498 to use dynamic model for it. */
3499 if (is_gd && info->h && (info->h->flags & ALPHA_ELF_LINK_HASH_TLS_IE))
3500 ;
f44f99a5 3501
a7519a3c
RH
3502 /* If the symbol is local, and we've already committed to DF_STATIC_TLS,
3503 then we might as well relax to IE. */
0e1862bb 3504 else if (bfd_link_pic (info->link_info) && !dynamic
a7519a3c
RH
3505 && (info->link_info->flags & DF_STATIC_TLS))
3506 ;
f44f99a5 3507
a7519a3c 3508 /* Otherwise we must be building an executable to do anything. */
0e1862bb 3509 else if (bfd_link_pic (info->link_info))
a7519a3c 3510 return TRUE;
f44f99a5 3511
a7519a3c
RH
3512 /* The TLSGD/TLSLDM relocation must be followed by a LITERAL and
3513 the matching LITUSE_TLS relocations. */
3514 if (irel + 2 >= info->relend)
3515 return TRUE;
3516 if (ELF64_R_TYPE (irel[1].r_info) != R_ALPHA_LITERAL
3517 || ELF64_R_TYPE (irel[2].r_info) != R_ALPHA_LITUSE
3518 || irel[2].r_addend != (is_gd ? LITUSE_ALPHA_TLSGD : LITUSE_ALPHA_TLSLDM))
3519 return TRUE;
f44f99a5 3520
a7519a3c
RH
3521 /* There must be a GPDISP relocation positioned immediately after the
3522 LITUSE relocation. */
3523 gpdisp = elf64_alpha_find_reloc_at_ofs (info->relocs, info->relend,
3524 irel[2].r_offset + 4, R_ALPHA_GPDISP);
3525 if (!gpdisp)
b34976b6 3526 return TRUE;
f44f99a5 3527
a7519a3c
RH
3528 pos[0] = info->contents + irel[0].r_offset;
3529 pos[1] = info->contents + irel[1].r_offset;
3530 pos[2] = info->contents + irel[2].r_offset;
3531 pos[3] = info->contents + gpdisp->r_offset;
3532 pos[4] = pos[3] + gpdisp->r_addend;
f44f99a5 3533
7dbf3b76
RH
3534 /* Beware of the compiler hoisting part of the sequence out a loop
3535 and adjusting the destination register for the TLSGD insn. If this
3536 happens, there will be a move into $16 before the JSR insn, so only
3537 transformations of the first insn pair should use this register. */
3538 tlsgd_reg = bfd_get_32 (info->abfd, pos[0]);
3539 tlsgd_reg = (tlsgd_reg >> 21) & 31;
3540
a7519a3c
RH
3541 /* Generally, the positions are not allowed to be out of order, lest the
3542 modified insn sequence have different register lifetimes. We can make
3543 an exception when pos 1 is adjacent to pos 0. */
3544 if (pos[1] + 4 == pos[0])
f44f99a5 3545 {
a7519a3c
RH
3546 bfd_byte *tmp = pos[0];
3547 pos[0] = pos[1];
3548 pos[1] = tmp;
f44f99a5 3549 }
a7519a3c
RH
3550 if (pos[1] >= pos[2] || pos[2] >= pos[3])
3551 return TRUE;
cc03ec80 3552
a7519a3c
RH
3553 /* Reduce the use count on the LITERAL relocation. Do this before we
3554 smash the symndx when we adjust the relocations below. */
3555 {
3556 struct alpha_elf_got_entry *lit_gotent;
3557 struct alpha_elf_link_hash_entry *lit_h;
3558 unsigned long indx;
f44f99a5 3559
a7519a3c
RH
3560 BFD_ASSERT (ELF64_R_SYM (irel[1].r_info) >= info->symtab_hdr->sh_info);
3561 indx = ELF64_R_SYM (irel[1].r_info) - info->symtab_hdr->sh_info;
3562 lit_h = alpha_elf_sym_hashes (info->abfd)[indx];
f44f99a5 3563
a7519a3c
RH
3564 while (lit_h->root.root.type == bfd_link_hash_indirect
3565 || lit_h->root.root.type == bfd_link_hash_warning)
3566 lit_h = (struct alpha_elf_link_hash_entry *) lit_h->root.root.u.i.link;
252b5132 3567
a7519a3c
RH
3568 for (lit_gotent = lit_h->got_entries; lit_gotent ;
3569 lit_gotent = lit_gotent->next)
3570 if (lit_gotent->gotobj == info->gotobj
3571 && lit_gotent->reloc_type == R_ALPHA_LITERAL
3572 && lit_gotent->addend == irel[1].r_addend)
3573 break;
3574 BFD_ASSERT (lit_gotent);
252b5132 3575
a7519a3c
RH
3576 if (--lit_gotent->use_count == 0)
3577 {
3578 int sz = alpha_got_entry_size (R_ALPHA_LITERAL);
3579 alpha_elf_tdata (info->gotobj)->total_got_size -= sz;
3580 }
3581 }
252b5132 3582
a7519a3c 3583 /* Change
252b5132 3584
a7519a3c
RH
3585 lda $16,x($gp) !tlsgd!1
3586 ldq $27,__tls_get_addr($gp) !literal!1
3587 jsr $26,($27),__tls_get_addr !lituse_tlsgd!1
3588 ldah $29,0($26) !gpdisp!2
3589 lda $29,0($29) !gpdisp!2
3590 to
3591 ldq $16,x($gp) !gottprel
3592 unop
3593 call_pal rduniq
3594 addq $16,$0,$0
3595 unop
3596 or the first pair to
3597 lda $16,x($gp) !tprel
3598 unop
3599 or
3600 ldah $16,x($gp) !tprelhi
3601 lda $16,x($16) !tprello
3602
3603 as appropriate. */
3604
3605 use_gottprel = FALSE;
cf35638d 3606 new_symndx = is_gd ? ELF64_R_SYM (irel->r_info) : STN_UNDEF;
891caa9b 3607
9a757e4d
RM
3608 /* Some compilers warn about a Boolean-looking expression being
3609 used in a switch. The explicit cast silences them. */
0e1862bb 3610 switch ((int) (!dynamic && !bfd_link_pic (info->link_info)))
252b5132 3611 {
a7519a3c
RH
3612 case 1:
3613 {
3614 bfd_vma tp_base;
3615 bfd_signed_vma disp;
252b5132 3616
a7519a3c
RH
3617 BFD_ASSERT (elf_hash_table (info->link_info)->tls_sec != NULL);
3618 tp_base = alpha_get_tprel_base (info->link_info);
3619 disp = symval - tp_base;
252b5132 3620
a7519a3c
RH
3621 if (disp >= -0x8000 && disp < 0x8000)
3622 {
891caa9b 3623 insn = (OP_LDA << 26) | (tlsgd_reg << 21) | (31 << 16);
a7519a3c
RH
3624 bfd_put_32 (info->abfd, (bfd_vma) insn, pos[0]);
3625 bfd_put_32 (info->abfd, (bfd_vma) INSN_UNOP, pos[1]);
3765b1be 3626
a7519a3c
RH
3627 irel[0].r_offset = pos[0] - info->contents;
3628 irel[0].r_info = ELF64_R_INFO (new_symndx, R_ALPHA_TPREL16);
3629 irel[1].r_info = ELF64_R_INFO (0, R_ALPHA_NONE);
3630 break;
3631 }
3632 else if (disp >= -(bfd_signed_vma) 0x80000000
3633 && disp < (bfd_signed_vma) 0x7fff8000
891caa9b 3634 && pos[0] + 4 == pos[1])
a7519a3c 3635 {
891caa9b 3636 insn = (OP_LDAH << 26) | (tlsgd_reg << 21) | (31 << 16);
a7519a3c 3637 bfd_put_32 (info->abfd, (bfd_vma) insn, pos[0]);
891caa9b 3638 insn = (OP_LDA << 26) | (tlsgd_reg << 21) | (tlsgd_reg << 16);
a7519a3c 3639 bfd_put_32 (info->abfd, (bfd_vma) insn, pos[1]);
3765b1be 3640
a7519a3c
RH
3641 irel[0].r_offset = pos[0] - info->contents;
3642 irel[0].r_info = ELF64_R_INFO (new_symndx, R_ALPHA_TPRELHI);
3643 irel[1].r_offset = pos[1] - info->contents;
3644 irel[1].r_info = ELF64_R_INFO (new_symndx, R_ALPHA_TPRELLO);
3645 break;
3646 }
3647 }
3648 /* FALLTHRU */
3765b1be 3649
3765b1be 3650 default:
a7519a3c
RH
3651 use_gottprel = TRUE;
3652
891caa9b 3653 insn = (OP_LDQ << 26) | (tlsgd_reg << 21) | (29 << 16);
a7519a3c
RH
3654 bfd_put_32 (info->abfd, (bfd_vma) insn, pos[0]);
3655 bfd_put_32 (info->abfd, (bfd_vma) INSN_UNOP, pos[1]);
3656
3657 irel[0].r_offset = pos[0] - info->contents;
3658 irel[0].r_info = ELF64_R_INFO (new_symndx, R_ALPHA_GOTTPREL);
3659 irel[1].r_info = ELF64_R_INFO (0, R_ALPHA_NONE);
3660 break;
3765b1be 3661 }
3765b1be 3662
a7519a3c 3663 bfd_put_32 (info->abfd, (bfd_vma) INSN_RDUNIQ, pos[2]);
252b5132 3664
a7519a3c
RH
3665 insn = INSN_ADDQ | (16 << 21) | (0 << 16) | (0 << 0);
3666 bfd_put_32 (info->abfd, (bfd_vma) insn, pos[3]);
3765b1be 3667
a7519a3c 3668 bfd_put_32 (info->abfd, (bfd_vma) INSN_UNOP, pos[4]);
e92d460e 3669
a7519a3c
RH
3670 irel[2].r_info = ELF64_R_INFO (0, R_ALPHA_NONE);
3671 gpdisp->r_info = ELF64_R_INFO (0, R_ALPHA_NONE);
252b5132 3672
a7519a3c
RH
3673 hint = elf64_alpha_find_reloc_at_ofs (info->relocs, info->relend,
3674 irel[2].r_offset, R_ALPHA_HINT);
3675 if (hint)
3676 hint->r_info = ELF64_R_INFO (0, R_ALPHA_NONE);
252b5132 3677
a7519a3c
RH
3678 info->changed_contents = TRUE;
3679 info->changed_relocs = TRUE;
d6ad34f6 3680
a7519a3c
RH
3681 /* Reduce the use count on the TLSGD/TLSLDM relocation. */
3682 if (--info->gotent->use_count == 0)
3765b1be 3683 {
a7519a3c
RH
3684 int sz = alpha_got_entry_size (info->gotent->reloc_type);
3685 alpha_elf_tdata (info->gotobj)->total_got_size -= sz;
3686 if (!info->h)
3687 alpha_elf_tdata (info->gotobj)->local_got_size -= sz;
3765b1be 3688 }
252b5132 3689
a7519a3c
RH
3690 /* If we've switched to a GOTTPREL relocation, increment the reference
3691 count on that got entry. */
3692 if (use_gottprel)
f44f99a5 3693 {
a7519a3c 3694 struct alpha_elf_got_entry *tprel_gotent;
f44f99a5 3695
a7519a3c
RH
3696 for (tprel_gotent = *info->first_gotent; tprel_gotent ;
3697 tprel_gotent = tprel_gotent->next)
3698 if (tprel_gotent->gotobj == info->gotobj
3699 && tprel_gotent->reloc_type == R_ALPHA_GOTTPREL
3700 && tprel_gotent->addend == irel->r_addend)
3701 break;
3702 if (tprel_gotent)
3703 tprel_gotent->use_count++;
3704 else
f44f99a5 3705 {
a7519a3c
RH
3706 if (info->gotent->use_count == 0)
3707 tprel_gotent = info->gotent;
3708 else
3709 {
3710 tprel_gotent = (struct alpha_elf_got_entry *)
3711 bfd_alloc (info->abfd, sizeof (struct alpha_elf_got_entry));
3712 if (!tprel_gotent)
3713 return FALSE;
f44f99a5 3714
a7519a3c
RH
3715 tprel_gotent->next = *info->first_gotent;
3716 *info->first_gotent = tprel_gotent;
f44f99a5 3717
a7519a3c
RH
3718 tprel_gotent->gotobj = info->gotobj;
3719 tprel_gotent->addend = irel->r_addend;
3720 tprel_gotent->got_offset = -1;
3721 tprel_gotent->reloc_done = 0;
3722 tprel_gotent->reloc_xlated = 0;
3723 }
f44f99a5 3724
a7519a3c
RH
3725 tprel_gotent->use_count = 1;
3726 tprel_gotent->reloc_type = R_ALPHA_GOTTPREL;
3727 }
f44f99a5 3728 }
f44f99a5 3729
b34976b6 3730 return TRUE;
f44f99a5
RH
3731}
3732
b34976b6 3733static bfd_boolean
a7519a3c
RH
3734elf64_alpha_relax_section (bfd *abfd, asection *sec,
3735 struct bfd_link_info *link_info, bfd_boolean *again)
f44f99a5 3736{
a7519a3c
RH
3737 Elf_Internal_Shdr *symtab_hdr;
3738 Elf_Internal_Rela *internal_relocs;
3739 Elf_Internal_Rela *irel, *irelend;
3740 Elf_Internal_Sym *isymbuf = NULL;
3741 struct alpha_elf_got_entry **local_got_entries;
3742 struct alpha_relax_info info;
4dfe6ac6 3743 struct alpha_elf_link_hash_table * htab;
d1c109de 3744 int relax_pass;
4dfe6ac6
NC
3745
3746 htab = alpha_elf_hash_table (link_info);
3747 if (htab == NULL)
3748 return FALSE;
f44f99a5 3749
4a828aab 3750 /* There's nothing to change, yet. */
a7519a3c 3751 *again = FALSE;
f44f99a5 3752
0e1862bb 3753 if (bfd_link_relocatable (link_info)
a7519a3c
RH
3754 || ((sec->flags & (SEC_CODE | SEC_RELOC | SEC_ALLOC))
3755 != (SEC_CODE | SEC_RELOC | SEC_ALLOC))
3756 || sec->reloc_count == 0)
d6ad34f6
RH
3757 return TRUE;
3758
0ffa91dd 3759 BFD_ASSERT (is_alpha_elf (abfd));
d1c109de 3760 relax_pass = link_info->relax_pass;
0ffa91dd 3761
4a828aab 3762 /* Make sure our GOT and PLT tables are up-to-date. */
4dfe6ac6 3763 if (htab->relax_trip != link_info->relax_trip)
4a828aab 3764 {
4dfe6ac6 3765 htab->relax_trip = link_info->relax_trip;
4a828aab 3766
d1c109de 3767 /* This should never fail after the initial round, since the only error
07d6d2b8 3768 is GOT overflow, and relaxation only shrinks the table. However, we
d1c109de
RH
3769 may only merge got sections during the first pass. If we merge
3770 sections after we've created GPREL relocs, the GP for the merged
3771 section backs up which may put the relocs out of range. */
3772 if (!elf64_alpha_size_got_sections (link_info, relax_pass == 0))
4a828aab
RH
3773 abort ();
3774 if (elf_hash_table (link_info)->dynamic_sections_created)
3775 {
3776 elf64_alpha_size_plt_section (link_info);
3777 elf64_alpha_size_rela_got_section (link_info);
3778 }
3779 }
3780
0ffa91dd 3781 symtab_hdr = &elf_symtab_hdr (abfd);
a7519a3c 3782 local_got_entries = alpha_elf_tdata(abfd)->local_got_entries;
252b5132 3783
a7519a3c
RH
3784 /* Load the relocations for this section. */
3785 internal_relocs = (_bfd_elf_link_read_relocs
2c3fc389 3786 (abfd, sec, NULL, (Elf_Internal_Rela *) NULL,
a7519a3c
RH
3787 link_info->keep_memory));
3788 if (internal_relocs == NULL)
3789 return FALSE;
252b5132 3790
a7519a3c
RH
3791 memset(&info, 0, sizeof (info));
3792 info.abfd = abfd;
3793 info.sec = sec;
3794 info.link_info = link_info;
3795 info.symtab_hdr = symtab_hdr;
3796 info.relocs = internal_relocs;
3797 info.relend = irelend = internal_relocs + sec->reloc_count;
3798
3799 /* Find the GP for this object. Do not store the result back via
3800 _bfd_set_gp_value, since this could change again before final. */
3801 info.gotobj = alpha_elf_tdata (abfd)->gotobj;
3802 if (info.gotobj)
3765b1be 3803 {
a7519a3c
RH
3804 asection *sgot = alpha_elf_tdata (info.gotobj)->got;
3805 info.gp = (sgot->output_section->vma
3806 + sgot->output_offset
3807 + 0x8000);
252b5132
RH
3808 }
3809
a7519a3c
RH
3810 /* Get the section contents. */
3811 if (elf_section_data (sec)->this_hdr.contents != NULL)
3812 info.contents = elf_section_data (sec)->this_hdr.contents;
3813 else
3814 {
3815 if (!bfd_malloc_and_get_section (abfd, sec, &info.contents))
3816 goto error_return;
3817 }
252b5132 3818
a7519a3c
RH
3819 for (irel = internal_relocs; irel < irelend; irel++)
3820 {
3821 bfd_vma symval;
3822 struct alpha_elf_got_entry *gotent;
3823 unsigned long r_type = ELF64_R_TYPE (irel->r_info);
3824 unsigned long r_symndx = ELF64_R_SYM (irel->r_info);
3825
3826 /* Early exit for unhandled or unrelaxable relocations. */
d1c109de 3827 if (r_type != R_ALPHA_LITERAL)
07d6d2b8
AM
3828 {
3829 /* We complete everything except LITERAL in the first pass. */
d1c109de
RH
3830 if (relax_pass != 0)
3831 continue;
3832 if (r_type == R_ALPHA_TLSLDM)
3833 {
3834 /* The symbol for a TLSLDM reloc is ignored. Collapse the
07d6d2b8 3835 reloc to the STN_UNDEF (0) symbol so that they all match. */
d1c109de
RH
3836 r_symndx = STN_UNDEF;
3837 }
3838 else if (r_type != R_ALPHA_GOTDTPREL
07d6d2b8 3839 && r_type != R_ALPHA_GOTTPREL
d1c109de
RH
3840 && r_type != R_ALPHA_TLSGD)
3841 continue;
a7519a3c
RH
3842 }
3843
3844 /* Get the value of the symbol referred to by the reloc. */
3845 if (r_symndx < symtab_hdr->sh_info)
3846 {
3847 /* A local symbol. */
3848 Elf_Internal_Sym *isym;
3849
3850 /* Read this BFD's local symbols. */
3851 if (isymbuf == NULL)
3852 {
3853 isymbuf = (Elf_Internal_Sym *) symtab_hdr->contents;
3854 if (isymbuf == NULL)
3855 isymbuf = bfd_elf_get_elf_syms (abfd, symtab_hdr,
3856 symtab_hdr->sh_info, 0,
3857 NULL, NULL, NULL);
3858 if (isymbuf == NULL)
3859 goto error_return;
3860 }
252b5132 3861
a7519a3c 3862 isym = isymbuf + r_symndx;
252b5132 3863
a7519a3c
RH
3864 /* Given the symbol for a TLSLDM reloc is ignored, this also
3865 means forcing the symbol value to the tp base. */
3866 if (r_type == R_ALPHA_TLSLDM)
3867 {
3868 info.tsec = bfd_abs_section_ptr;
3869 symval = alpha_get_tprel_base (info.link_info);
3870 }
3871 else
3872 {
3873 symval = isym->st_value;
3874 if (isym->st_shndx == SHN_UNDEF)
07d6d2b8 3875 continue;
a7519a3c 3876 else if (isym->st_shndx == SHN_ABS)
07d6d2b8 3877 info.tsec = bfd_abs_section_ptr;
a7519a3c 3878 else if (isym->st_shndx == SHN_COMMON)
07d6d2b8 3879 info.tsec = bfd_com_section_ptr;
a7519a3c 3880 else
07d6d2b8 3881 info.tsec = bfd_section_from_elf_index (abfd, isym->st_shndx);
a7519a3c 3882 }
252b5132 3883
a7519a3c
RH
3884 info.h = NULL;
3885 info.other = isym->st_other;
3886 if (local_got_entries)
3887 info.first_gotent = &local_got_entries[r_symndx];
3888 else
3889 {
3890 info.first_gotent = &info.gotent;
3891 info.gotent = NULL;
3892 }
252b5132 3893 }
a7519a3c
RH
3894 else
3895 {
3896 unsigned long indx;
3897 struct alpha_elf_link_hash_entry *h;
252b5132 3898
a7519a3c
RH
3899 indx = r_symndx - symtab_hdr->sh_info;
3900 h = alpha_elf_sym_hashes (abfd)[indx];
3901 BFD_ASSERT (h != NULL);
252b5132 3902
a7519a3c
RH
3903 while (h->root.root.type == bfd_link_hash_indirect
3904 || h->root.root.type == bfd_link_hash_warning)
3905 h = (struct alpha_elf_link_hash_entry *)h->root.root.u.i.link;
252b5132 3906
a7519a3c
RH
3907 /* If the symbol is undefined, we can't do anything with it. */
3908 if (h->root.root.type == bfd_link_hash_undefined)
3909 continue;
252b5132 3910
a7519a3c
RH
3911 /* If the symbol isn't defined in the current module,
3912 again we can't do anything. */
3913 if (h->root.root.type == bfd_link_hash_undefweak)
3914 {
3915 info.tsec = bfd_abs_section_ptr;
3916 symval = 0;
3917 }
3918 else if (!h->root.def_regular)
3919 {
3920 /* Except for TLSGD relocs, which can sometimes be
3921 relaxed to GOTTPREL relocs. */
3922 if (r_type != R_ALPHA_TLSGD)
3923 continue;
3924 info.tsec = bfd_abs_section_ptr;
3925 symval = 0;
3926 }
3927 else
3928 {
3929 info.tsec = h->root.root.u.def.section;
3930 symval = h->root.root.u.def.value;
3931 }
252b5132 3932
a7519a3c
RH
3933 info.h = h;
3934 info.other = h->root.other;
3935 info.first_gotent = &h->got_entries;
3936 }
252b5132 3937
a7519a3c
RH
3938 /* Search for the got entry to be used by this relocation. */
3939 for (gotent = *info.first_gotent; gotent ; gotent = gotent->next)
3940 if (gotent->gotobj == info.gotobj
3941 && gotent->reloc_type == r_type
3942 && gotent->addend == irel->r_addend)
3943 break;
3944 info.gotent = gotent;
252b5132 3945
a7519a3c
RH
3946 symval += info.tsec->output_section->vma + info.tsec->output_offset;
3947 symval += irel->r_addend;
252b5132 3948
a7519a3c 3949 switch (r_type)
252b5132 3950 {
a7519a3c
RH
3951 case R_ALPHA_LITERAL:
3952 BFD_ASSERT(info.gotent != NULL);
252b5132 3953
a7519a3c
RH
3954 /* If there exist LITUSE relocations immediately following, this
3955 opens up all sorts of interesting optimizations, because we
3956 now know every location that this address load is used. */
3957 if (irel+1 < irelend
3958 && ELF64_R_TYPE (irel[1].r_info) == R_ALPHA_LITUSE)
252b5132 3959 {
a7519a3c
RH
3960 if (!elf64_alpha_relax_with_lituse (&info, symval, irel))
3961 goto error_return;
252b5132 3962 }
a7519a3c
RH
3963 else
3964 {
3965 if (!elf64_alpha_relax_got_load (&info, symval, irel, r_type))
3966 goto error_return;
3967 }
3968 break;
252b5132 3969
a7519a3c
RH
3970 case R_ALPHA_GOTDTPREL:
3971 case R_ALPHA_GOTTPREL:
3972 BFD_ASSERT(info.gotent != NULL);
3973 if (!elf64_alpha_relax_got_load (&info, symval, irel, r_type))
3974 goto error_return;
3975 break;
3976
3977 case R_ALPHA_TLSGD:
3978 case R_ALPHA_TLSLDM:
3979 BFD_ASSERT(info.gotent != NULL);
3980 if (!elf64_alpha_relax_tls_get_addr (&info, symval, irel,
3981 r_type == R_ALPHA_TLSGD))
3982 goto error_return;
3983 break;
252b5132
RH
3984 }
3985 }
3986
a7519a3c
RH
3987 if (isymbuf != NULL
3988 && symtab_hdr->contents != (unsigned char *) isymbuf)
3989 {
3990 if (!link_info->keep_memory)
3991 free (isymbuf);
3992 else
252b5132 3993 {
a7519a3c
RH
3994 /* Cache the symbols for elf_link_input_bfd. */
3995 symtab_hdr->contents = (unsigned char *) isymbuf;
252b5132 3996 }
a7519a3c 3997 }
252b5132 3998
a7519a3c
RH
3999 if (info.contents != NULL
4000 && elf_section_data (sec)->this_hdr.contents != info.contents)
4001 {
4002 if (!info.changed_contents && !link_info->keep_memory)
4003 free (info.contents);
4004 else
252b5132 4005 {
a7519a3c
RH
4006 /* Cache the section contents for elf_link_input_bfd. */
4007 elf_section_data (sec)->this_hdr.contents = info.contents;
252b5132 4008 }
a7519a3c 4009 }
252b5132 4010
a7519a3c
RH
4011 if (elf_section_data (sec)->relocs != internal_relocs)
4012 {
4013 if (!info.changed_relocs)
4014 free (internal_relocs);
4015 else
4016 elf_section_data (sec)->relocs = internal_relocs;
252b5132 4017 }
a7519a3c
RH
4018
4019 *again = info.changed_contents || info.changed_relocs;
252b5132 4020
b34976b6 4021 return TRUE;
252b5132 4022
a7519a3c
RH
4023 error_return:
4024 if (isymbuf != NULL
4025 && symtab_hdr->contents != (unsigned char *) isymbuf)
4026 free (isymbuf);
4027 if (info.contents != NULL
4028 && elf_section_data (sec)->this_hdr.contents != info.contents)
4029 free (info.contents);
4030 if (internal_relocs != NULL
4031 && elf_section_data (sec)->relocs != internal_relocs)
4032 free (internal_relocs);
4033 return FALSE;
4034}
4035\f
1bbc9cec
RH
4036/* Emit a dynamic relocation for (DYNINDX, RTYPE, ADDEND) at (SEC, OFFSET)
4037 into the next available slot in SREL. */
4038
4039static void
a7519a3c
RH
4040elf64_alpha_emit_dynrel (bfd *abfd, struct bfd_link_info *info,
4041 asection *sec, asection *srel, bfd_vma offset,
4042 long dynindx, long rtype, bfd_vma addend)
1bbc9cec
RH
4043{
4044 Elf_Internal_Rela outrel;
4045 bfd_byte *loc;
4046
4047 BFD_ASSERT (srel != NULL);
4048
4049 outrel.r_info = ELF64_R_INFO (dynindx, rtype);
4050 outrel.r_addend = addend;
4051
4052 offset = _bfd_elf_section_offset (abfd, info, sec, offset);
4053 if ((offset | 1) != (bfd_vma) -1)
4054 outrel.r_offset = sec->output_section->vma + sec->output_offset + offset;
4055 else
4056 memset (&outrel, 0, sizeof (outrel));
4057
4058 loc = srel->contents;
4059 loc += srel->reloc_count++ * sizeof (Elf64_External_Rela);
4060 bfd_elf64_swap_reloca_out (abfd, &outrel, loc);
eea6121a 4061 BFD_ASSERT (sizeof (Elf64_External_Rela) * srel->reloc_count <= srel->size);
1bbc9cec
RH
4062}
4063
4a67a098
RH
4064/* Relocate an Alpha ELF section for a relocatable link.
4065
4066 We don't have to change anything unless the reloc is against a section
4067 symbol, in which case we have to adjust according to where the section
4068 symbol winds up in the output section. */
4069
b34976b6 4070static bfd_boolean
a7519a3c
RH
4071elf64_alpha_relocate_section_r (bfd *output_bfd ATTRIBUTE_UNUSED,
4072 struct bfd_link_info *info ATTRIBUTE_UNUSED,
4073 bfd *input_bfd, asection *input_section,
4074 bfd_byte *contents ATTRIBUTE_UNUSED,
4075 Elf_Internal_Rela *relocs,
4076 Elf_Internal_Sym *local_syms,
4077 asection **local_sections)
4a67a098
RH
4078{
4079 unsigned long symtab_hdr_sh_info;
4080 Elf_Internal_Rela *rel;
4081 Elf_Internal_Rela *relend;
ab96bf03 4082 struct elf_link_hash_entry **sym_hashes;
b34976b6 4083 bfd_boolean ret_val = TRUE;
4a67a098 4084
0ffa91dd 4085 symtab_hdr_sh_info = elf_symtab_hdr (input_bfd).sh_info;
ab96bf03 4086 sym_hashes = elf_sym_hashes (input_bfd);
4a67a098
RH
4087
4088 relend = relocs + input_section->reloc_count;
4089 for (rel = relocs; rel < relend; rel++)
4090 {
4091 unsigned long r_symndx;
4092 Elf_Internal_Sym *sym;
4093 asection *sec;
4094 unsigned long r_type;
4095
ab96bf03 4096 r_type = ELF64_R_TYPE (rel->r_info);
4a67a098
RH
4097 if (r_type >= R_ALPHA_max)
4098 {
4eca0228 4099 _bfd_error_handler
695344c0 4100 /* xgettext:c-format */
0aa13fee 4101 (_("%pB: unsupported relocation type %#x"),
d003868e 4102 input_bfd, (int) r_type);
4a67a098 4103 bfd_set_error (bfd_error_bad_value);
b34976b6 4104 ret_val = FALSE;
4a67a098
RH
4105 continue;
4106 }
4107
4a67a098
RH
4108 /* The symbol associated with GPDISP and LITUSE is
4109 immaterial. Only the addend is significant. */
4110 if (r_type == R_ALPHA_GPDISP || r_type == R_ALPHA_LITUSE)
4111 continue;
4112
ab96bf03 4113 r_symndx = ELF64_R_SYM (rel->r_info);
4a67a098
RH
4114 if (r_symndx < symtab_hdr_sh_info)
4115 {
4116 sym = local_syms + r_symndx;
ab96bf03 4117 sec = local_sections[r_symndx];
4a67a098 4118 }
ab96bf03
AM
4119 else
4120 {
4121 struct elf_link_hash_entry *h;
4122
4123 h = sym_hashes[r_symndx - symtab_hdr_sh_info];
4124
4125 while (h->root.type == bfd_link_hash_indirect
4126 || h->root.type == bfd_link_hash_warning)
4127 h = (struct elf_link_hash_entry *) h->root.u.i.link;
4128
4129 if (h->root.type != bfd_link_hash_defined
4130 && h->root.type != bfd_link_hash_defweak)
4131 continue;
4132
4133 sym = NULL;
4134 sec = h->root.u.def.section;
4135 }
4136
dbaa2011 4137 if (sec != NULL && discarded_section (sec))
e4067dbb 4138 RELOC_AGAINST_DISCARDED_SECTION (info, input_bfd, input_section,
545fd46b
MR
4139 rel, 1, relend,
4140 elf64_alpha_howto_table + r_type, 0,
e4067dbb 4141 contents);
ab96bf03
AM
4142
4143 if (sym != NULL && ELF_ST_TYPE (sym->st_info) == STT_SECTION)
4144 rel->r_addend += sec->output_offset;
4a67a098
RH
4145 }
4146
4147 return ret_val;
4148}
4149
252b5132
RH
4150/* Relocate an Alpha ELF section. */
4151
b34976b6 4152static bfd_boolean
a7519a3c
RH
4153elf64_alpha_relocate_section (bfd *output_bfd, struct bfd_link_info *info,
4154 bfd *input_bfd, asection *input_section,
4155 bfd_byte *contents, Elf_Internal_Rela *relocs,
4156 Elf_Internal_Sym *local_syms,
4157 asection **local_sections)
252b5132 4158{
4a67a098 4159 Elf_Internal_Shdr *symtab_hdr;
252b5132
RH
4160 Elf_Internal_Rela *rel;
4161 Elf_Internal_Rela *relend;
4a67a098
RH
4162 asection *sgot, *srel, *srelgot;
4163 bfd *dynobj, *gotobj;
4164 bfd_vma gp, tp_base, dtp_base;
4165 struct alpha_elf_got_entry **local_got_entries;
b34976b6 4166 bfd_boolean ret_val;
252b5132 4167
0ffa91dd 4168 BFD_ASSERT (is_alpha_elf (input_bfd));
68ffbac6 4169
4a67a098 4170 /* Handle relocatable links with a smaller loop. */
0e1862bb 4171 if (bfd_link_relocatable (info))
4a67a098
RH
4172 return elf64_alpha_relocate_section_r (output_bfd, info, input_bfd,
4173 input_section, contents, relocs,
4174 local_syms, local_sections);
4175
4176 /* This is a final link. */
4177
b34976b6 4178 ret_val = TRUE;
252b5132 4179
0ffa91dd 4180 symtab_hdr = &elf_symtab_hdr (input_bfd);
3765b1be 4181
4a67a098 4182 dynobj = elf_hash_table (info)->dynobj;
ce558b89 4183 srelgot = elf_hash_table (info)->srelgot;
4a67a098 4184
3241278a
RH
4185 if (input_section->flags & SEC_ALLOC)
4186 {
4187 const char *section_name;
4188 section_name = (bfd_elf_string_from_elf_section
4189 (input_bfd, elf_elfheader(input_bfd)->e_shstrndx,
d4730f92 4190 _bfd_elf_single_rel_hdr (input_section)->sh_name));
3241278a 4191 BFD_ASSERT(section_name != NULL);
3d4d4302 4192 srel = bfd_get_linker_section (dynobj, section_name);
3241278a
RH
4193 }
4194 else
4195 srel = NULL;
3765b1be 4196
4a67a098
RH
4197 /* Find the gp value for this input bfd. */
4198 gotobj = alpha_elf_tdata (input_bfd)->gotobj;
4199 if (gotobj)
4200 {
4201 sgot = alpha_elf_tdata (gotobj)->got;
4202 gp = _bfd_get_gp_value (gotobj);
4203 if (gp == 0)
252b5132 4204 {
4a67a098
RH
4205 gp = (sgot->output_section->vma
4206 + sgot->output_offset
4207 + 0x8000);
4208 _bfd_set_gp_value (gotobj, gp);
4209 }
4210 }
4211 else
4212 {
4213 sgot = NULL;
4214 gp = 0;
4215 }
3765b1be 4216
4a67a098
RH
4217 local_got_entries = alpha_elf_tdata(input_bfd)->local_got_entries;
4218
e1918d23 4219 if (elf_hash_table (info)->tls_sec != NULL)
4a67a098 4220 {
e1918d23
AM
4221 dtp_base = alpha_get_dtprel_base (info);
4222 tp_base = alpha_get_tprel_base (info);
252b5132 4223 }
4a67a098
RH
4224 else
4225 dtp_base = tp_base = 0;
252b5132 4226
252b5132 4227 relend = relocs + input_section->reloc_count;
4a67a098 4228 for (rel = relocs; rel < relend; rel++)
252b5132 4229 {
4a67a098 4230 struct alpha_elf_link_hash_entry *h = NULL;
3765b1be
RH
4231 struct alpha_elf_got_entry *gotent;
4232 bfd_reloc_status_type r;
252b5132
RH
4233 reloc_howto_type *howto;
4234 unsigned long r_symndx;
4a67a098
RH
4235 Elf_Internal_Sym *sym = NULL;
4236 asection *sec = NULL;
3765b1be 4237 bfd_vma value;
dc810e39 4238 bfd_vma addend;
b34976b6 4239 bfd_boolean dynamic_symbol_p;
1d5316ab 4240 bfd_boolean unresolved_reloc = FALSE;
b34976b6 4241 bfd_boolean undef_weak_ref = FALSE;
3765b1be 4242 unsigned long r_type;
252b5132
RH
4243
4244 r_type = ELF64_R_TYPE(rel->r_info);
3765b1be 4245 if (r_type >= R_ALPHA_max)
252b5132 4246 {
4eca0228 4247 _bfd_error_handler
695344c0 4248 /* xgettext:c-format */
0aa13fee 4249 (_("%pB: unsupported relocation type %#x"),
d003868e 4250 input_bfd, (int) r_type);
252b5132 4251 bfd_set_error (bfd_error_bad_value);
b34976b6 4252 ret_val = FALSE;
3765b1be 4253 continue;
252b5132 4254 }
252b5132 4255
3765b1be 4256 howto = elf64_alpha_howto_table + r_type;
252b5132
RH
4257 r_symndx = ELF64_R_SYM(rel->r_info);
4258
cc03ec80 4259 /* The symbol for a TLSLDM reloc is ignored. Collapse the
cf35638d 4260 reloc to the STN_UNDEF (0) symbol so that they all match. */
cc03ec80 4261 if (r_type == R_ALPHA_TLSLDM)
cf35638d 4262 r_symndx = STN_UNDEF;
cc03ec80 4263
252b5132
RH
4264 if (r_symndx < symtab_hdr->sh_info)
4265 {
8517fae7 4266 asection *msec;
252b5132
RH
4267 sym = local_syms + r_symndx;
4268 sec = local_sections[r_symndx];
8517fae7
AM
4269 msec = sec;
4270 value = _bfd_elf_rela_local_sym (output_bfd, sym, &msec, rel);
3765b1be 4271
cf35638d 4272 /* If this is a tp-relative relocation against sym STN_UNDEF (0),
cc03ec80 4273 this is hackery from relax_section. Force the value to
f915360b 4274 be the tls module base. */
cf35638d 4275 if (r_symndx == STN_UNDEF
cc03ec80
RH
4276 && (r_type == R_ALPHA_TLSLDM
4277 || r_type == R_ALPHA_GOTTPREL
4278 || r_type == R_ALPHA_TPREL64
4279 || r_type == R_ALPHA_TPRELHI
4280 || r_type == R_ALPHA_TPRELLO
4281 || r_type == R_ALPHA_TPREL16))
f915360b 4282 value = dtp_base;
cc03ec80 4283
4a67a098
RH
4284 if (local_got_entries)
4285 gotent = local_got_entries[r_symndx];
4286 else
4287 gotent = NULL;
3765b1be
RH
4288
4289 /* Need to adjust local GOT entries' addends for SEC_MERGE
4290 unless it has been done already. */
4291 if ((sec->flags & SEC_MERGE)
048d873d 4292 && ELF_ST_TYPE (sym->st_info) == STT_SECTION
dbaa2011 4293 && sec->sec_info_type == SEC_INFO_TYPE_MERGE
048d873d
RH
4294 && gotent
4295 && !gotent->reloc_xlated)
3765b1be
RH
4296 {
4297 struct alpha_elf_got_entry *ent;
3765b1be
RH
4298
4299 for (ent = gotent; ent; ent = ent->next)
4300 {
4301 ent->reloc_xlated = 1;
4302 if (ent->use_count == 0)
4303 continue;
4304 msec = sec;
4305 ent->addend =
4306 _bfd_merged_section_offset (output_bfd, &msec,
4307 elf_section_data (sec)->
4308 sec_info,
753731ee 4309 sym->st_value + ent->addend);
3765b1be
RH
4310 ent->addend -= sym->st_value;
4311 ent->addend += msec->output_section->vma
4312 + msec->output_offset
4313 - sec->output_section->vma
4314 - sec->output_offset;
4315 }
4316 }
4317
b34976b6 4318 dynamic_symbol_p = FALSE;
252b5132
RH
4319 }
4320 else
4321 {
62d887d4 4322 bfd_boolean warned, ignored;
560e09e9 4323 struct elf_link_hash_entry *hh;
b2a8e766
AM
4324 struct elf_link_hash_entry **sym_hashes = elf_sym_hashes (input_bfd);
4325
4326 RELOC_FOR_GLOBAL_SYMBOL (info, input_bfd, input_section, rel,
4327 r_symndx, symtab_hdr, sym_hashes,
4328 hh, sec, value,
62d887d4 4329 unresolved_reloc, warned, ignored);
560e09e9
NC
4330
4331 if (warned)
4332 continue;
252b5132 4333
560e09e9
NC
4334 if (value == 0
4335 && ! unresolved_reloc
4336 && hh->root.type == bfd_link_hash_undefweak)
b34976b6 4337 undef_weak_ref = TRUE;
3765b1be 4338
560e09e9 4339 h = (struct alpha_elf_link_hash_entry *) hh;
07d6d2b8 4340 dynamic_symbol_p = alpha_elf_dynamic_symbol_p (&h->root, info);
3765b1be 4341 gotent = h->got_entries;
252b5132 4342 }
3765b1be 4343
dbaa2011 4344 if (sec != NULL && discarded_section (sec))
e4067dbb 4345 RELOC_AGAINST_DISCARDED_SECTION (info, input_bfd, input_section,
545fd46b 4346 rel, 1, relend, howto, 0, contents);
ab96bf03 4347
252b5132 4348 addend = rel->r_addend;
3765b1be
RH
4349 value += addend;
4350
4351 /* Search for the proper got entry. */
4352 for (; gotent ; gotent = gotent->next)
4353 if (gotent->gotobj == gotobj
4354 && gotent->reloc_type == r_type
4355 && gotent->addend == addend)
4356 break;
252b5132
RH
4357
4358 switch (r_type)
4359 {
4360 case R_ALPHA_GPDISP:
4361 {
4362 bfd_byte *p_ldah, *p_lda;
4363
4364 BFD_ASSERT(gp != 0);
4365
3765b1be
RH
4366 value = (input_section->output_section->vma
4367 + input_section->output_offset
4368 + rel->r_offset);
252b5132 4369
3765b1be 4370 p_ldah = contents + rel->r_offset;
252b5132
RH
4371 p_lda = p_ldah + rel->r_addend;
4372
3765b1be 4373 r = elf64_alpha_do_reloc_gpdisp (input_bfd, gp - value,
252b5132
RH
4374 p_ldah, p_lda);
4375 }
4376 break;
4377
252b5132 4378 case R_ALPHA_LITERAL:
3765b1be
RH
4379 BFD_ASSERT(sgot != NULL);
4380 BFD_ASSERT(gp != 0);
4381 BFD_ASSERT(gotent != NULL);
4382 BFD_ASSERT(gotent->use_count >= 1);
f7460f5f 4383
3765b1be
RH
4384 if (!gotent->reloc_done)
4385 {
4386 gotent->reloc_done = 1;
252b5132 4387
3765b1be
RH
4388 bfd_put_64 (output_bfd, value,
4389 sgot->contents + gotent->got_offset);
252b5132 4390
3765b1be
RH
4391 /* If the symbol has been forced local, output a
4392 RELATIVE reloc, otherwise it will be handled in
4393 finish_dynamic_symbol. */
0e1862bb
L
4394 if (bfd_link_pic (info)
4395 && !dynamic_symbol_p
4396 && !undef_weak_ref)
1bbc9cec
RH
4397 elf64_alpha_emit_dynrel (output_bfd, info, sgot, srelgot,
4398 gotent->got_offset, 0,
4399 R_ALPHA_RELATIVE, value);
3765b1be 4400 }
252b5132 4401
3765b1be
RH
4402 value = (sgot->output_section->vma
4403 + sgot->output_offset
4404 + gotent->got_offset);
4405 value -= gp;
252b5132
RH
4406 goto default_reloc;
4407
4408 case R_ALPHA_GPREL32:
ec1659c8 4409 case R_ALPHA_GPREL16:
252b5132 4410 case R_ALPHA_GPRELLOW:
3765b1be 4411 if (dynamic_symbol_p)
07d6d2b8 4412 {
4eca0228 4413 _bfd_error_handler
695344c0 4414 /* xgettext:c-format */
871b3ab2 4415 (_("%pB: gp-relative relocation against dynamic symbol %s"),
07d6d2b8
AM
4416 input_bfd, h->root.root.root.string);
4417 ret_val = FALSE;
4418 }
252b5132 4419 BFD_ASSERT(gp != 0);
3765b1be 4420 value -= gp;
252b5132
RH
4421 goto default_reloc;
4422
4423 case R_ALPHA_GPRELHIGH:
3765b1be 4424 if (dynamic_symbol_p)
07d6d2b8 4425 {
4eca0228 4426 _bfd_error_handler
695344c0 4427 /* xgettext:c-format */
871b3ab2 4428 (_("%pB: gp-relative relocation against dynamic symbol %s"),
07d6d2b8
AM
4429 input_bfd, h->root.root.root.string);
4430 ret_val = FALSE;
4431 }
252b5132 4432 BFD_ASSERT(gp != 0);
3765b1be
RH
4433 value -= gp;
4434 value = ((bfd_signed_vma) value >> 16) + ((value >> 15) & 1);
252b5132
RH
4435 goto default_reloc;
4436
252b5132 4437 case R_ALPHA_HINT:
f94952df
RH
4438 /* A call to a dynamic symbol is definitely out of range of
4439 the 16-bit displacement. Don't bother writing anything. */
3765b1be 4440 if (dynamic_symbol_p)
f94952df
RH
4441 {
4442 r = bfd_reloc_ok;
4443 break;
4444 }
3765b1be
RH
4445 /* The regular PC-relative stuff measures from the start of
4446 the instruction rather than the end. */
4447 value -= 4;
4448 goto default_reloc;
f94952df
RH
4449
4450 case R_ALPHA_BRADDR:
3765b1be 4451 if (dynamic_symbol_p)
07d6d2b8 4452 {
4eca0228 4453 _bfd_error_handler
695344c0 4454 /* xgettext:c-format */
871b3ab2 4455 (_("%pB: pc-relative relocation against dynamic symbol %s"),
07d6d2b8
AM
4456 input_bfd, h->root.root.root.string);
4457 ret_val = FALSE;
4458 }
252b5132
RH
4459 /* The regular PC-relative stuff measures from the start of
4460 the instruction rather than the end. */
3765b1be 4461 value -= 4;
252b5132
RH
4462 goto default_reloc;
4463
7793f4d0
RH
4464 case R_ALPHA_BRSGP:
4465 {
4466 int other;
4467 const char *name;
4468
4469 /* The regular PC-relative stuff measures from the start of
4470 the instruction rather than the end. */
3765b1be 4471 value -= 4;
7793f4d0 4472
ccf00ab6
RH
4473 /* The source and destination gp must be the same. Note that
4474 the source will always have an assigned gp, since we forced
4475 one in check_relocs, but that the destination may not, as
cedb70c5 4476 it might not have had any relocations at all. Also take
ccf00ab6
RH
4477 care not to crash if H is an undefined symbol. */
4478 if (h != NULL && sec != NULL
4479 && alpha_elf_tdata (sec->owner)->gotobj
7793f4d0
RH
4480 && gotobj != alpha_elf_tdata (sec->owner)->gotobj)
4481 {
4eca0228 4482 _bfd_error_handler
695344c0 4483 /* xgettext:c-format */
871b3ab2 4484 (_("%pB: change in gp: BRSGP %s"),
d003868e 4485 input_bfd, h->root.root.root.string);
b34976b6 4486 ret_val = FALSE;
7793f4d0
RH
4487 }
4488
4489 /* The symbol should be marked either NOPV or STD_GPLOAD. */
4490 if (h != NULL)
4491 other = h->root.other;
4492 else
4493 other = sym->st_other;
4494 switch (other & STO_ALPHA_STD_GPLOAD)
4495 {
4496 case STO_ALPHA_NOPV:
07d6d2b8 4497 break;
7793f4d0 4498 case STO_ALPHA_STD_GPLOAD:
64e04ecd 4499 value += 8;
7793f4d0
RH
4500 break;
4501 default:
4502 if (h != NULL)
4503 name = h->root.root.root.string;
4504 else
4505 {
4506 name = (bfd_elf_string_from_elf_section
4507 (input_bfd, symtab_hdr->sh_link, sym->st_name));
4508 if (name == NULL)
4509 name = _("<unknown>");
4510 else if (name[0] == 0)
fd361982 4511 name = bfd_section_name (sec);
7793f4d0 4512 }
4eca0228 4513 _bfd_error_handler
695344c0 4514 /* xgettext:c-format */
871b3ab2 4515 (_("%pB: !samegp reloc against symbol without .prologue: %s"),
d003868e 4516 input_bfd, name);
b34976b6 4517 ret_val = FALSE;
7793f4d0
RH
4518 break;
4519 }
4520
4521 goto default_reloc;
4522 }
4523
252b5132
RH
4524 case R_ALPHA_REFLONG:
4525 case R_ALPHA_REFQUAD:
3765b1be
RH
4526 case R_ALPHA_DTPREL64:
4527 case R_ALPHA_TPREL64:
252b5132 4528 {
1bbc9cec
RH
4529 long dynindx, dyntype = r_type;
4530 bfd_vma dynaddend;
252b5132
RH
4531
4532 /* Careful here to remember RELATIVE relocations for global
4533 variables for symbolic shared objects. */
4534
3765b1be 4535 if (dynamic_symbol_p)
252b5132
RH
4536 {
4537 BFD_ASSERT(h->root.dynindx != -1);
1bbc9cec
RH
4538 dynindx = h->root.dynindx;
4539 dynaddend = addend;
3765b1be
RH
4540 addend = 0, value = 0;
4541 }
4542 else if (r_type == R_ALPHA_DTPREL64)
4543 {
e1918d23 4544 BFD_ASSERT (elf_hash_table (info)->tls_sec != NULL);
3765b1be
RH
4545 value -= dtp_base;
4546 goto default_reloc;
4547 }
4548 else if (r_type == R_ALPHA_TPREL64)
4549 {
e1918d23 4550 BFD_ASSERT (elf_hash_table (info)->tls_sec != NULL);
3cbc1e5e 4551 if (!bfd_link_dll (info))
1bbc9cec
RH
4552 {
4553 value -= tp_base;
4554 goto default_reloc;
4555 }
4556 dynindx = 0;
4557 dynaddend = value - dtp_base;
252b5132 4558 }
0e1862bb 4559 else if (bfd_link_pic (info)
cf35638d 4560 && r_symndx != STN_UNDEF
d6ad34f6 4561 && (input_section->flags & SEC_ALLOC)
1d5316ab
AM
4562 && !undef_weak_ref
4563 && !(unresolved_reloc
4564 && (_bfd_elf_section_offset (output_bfd, info,
4565 input_section,
4566 rel->r_offset)
4567 == (bfd_vma) -1)))
252b5132 4568 {
3765b1be
RH
4569 if (r_type == R_ALPHA_REFLONG)
4570 {
4eca0228 4571 _bfd_error_handler
695344c0 4572 /* xgettext:c-format */
871b3ab2 4573 (_("%pB: unhandled dynamic relocation against %s"),
d003868e 4574 input_bfd,
3765b1be 4575 h->root.root.root.string);
b34976b6 4576 ret_val = FALSE;
3765b1be 4577 }
1bbc9cec
RH
4578 dynindx = 0;
4579 dyntype = R_ALPHA_RELATIVE;
4580 dynaddend = value;
252b5132
RH
4581 }
4582 else
4583 goto default_reloc;
4584
3241278a
RH
4585 if (input_section->flags & SEC_ALLOC)
4586 elf64_alpha_emit_dynrel (output_bfd, info, input_section,
4587 srel, rel->r_offset, dynindx,
4588 dyntype, dynaddend);
252b5132
RH
4589 }
4590 goto default_reloc;
4591
3765b1be 4592 case R_ALPHA_SREL16:
84de6048
RH
4593 case R_ALPHA_SREL32:
4594 case R_ALPHA_SREL64:
3765b1be 4595 if (dynamic_symbol_p)
07d6d2b8 4596 {
4eca0228 4597 _bfd_error_handler
695344c0 4598 /* xgettext:c-format */
871b3ab2 4599 (_("%pB: pc-relative relocation against dynamic symbol %s"),
07d6d2b8
AM
4600 input_bfd, h->root.root.root.string);
4601 ret_val = FALSE;
4602 }
3cbc1e5e 4603 else if (bfd_link_pic (info)
0e1862bb 4604 && undef_weak_ref)
07d6d2b8 4605 {
4eca0228 4606 _bfd_error_handler
695344c0 4607 /* xgettext:c-format */
871b3ab2 4608 (_("%pB: pc-relative relocation against undefined weak symbol %s"),
07d6d2b8
AM
4609 input_bfd, h->root.root.root.string);
4610 ret_val = FALSE;
4611 }
d6ad34f6 4612
3765b1be 4613
84de6048
RH
4614 /* ??? .eh_frame references to discarded sections will be smashed
4615 to relocations against SHN_UNDEF. The .eh_frame format allows
4616 NULL to be encoded as 0 in any format, so this works here. */
1d5316ab
AM
4617 if (r_symndx == STN_UNDEF
4618 || (unresolved_reloc
4619 && _bfd_elf_section_offset (output_bfd, info,
4620 input_section,
4621 rel->r_offset) == (bfd_vma) -1))
84de6048
RH
4622 howto = (elf64_alpha_howto_table
4623 + (r_type - R_ALPHA_SREL32 + R_ALPHA_REFLONG));
4624 goto default_reloc;
4625
3765b1be
RH
4626 case R_ALPHA_TLSLDM:
4627 /* Ignore the symbol for the relocation. The result is always
4628 the current module. */
4629 dynamic_symbol_p = 0;
4630 /* FALLTHRU */
4631
4632 case R_ALPHA_TLSGD:
4633 if (!gotent->reloc_done)
4634 {
4635 gotent->reloc_done = 1;
4636
4637 /* Note that the module index for the main program is 1. */
0e1862bb
L
4638 bfd_put_64 (output_bfd,
4639 !bfd_link_pic (info) && !dynamic_symbol_p,
3765b1be
RH
4640 sgot->contents + gotent->got_offset);
4641
4642 /* If the symbol has been forced local, output a
4643 DTPMOD64 reloc, otherwise it will be handled in
4644 finish_dynamic_symbol. */
0e1862bb 4645 if (bfd_link_pic (info) && !dynamic_symbol_p)
1bbc9cec
RH
4646 elf64_alpha_emit_dynrel (output_bfd, info, sgot, srelgot,
4647 gotent->got_offset, 0,
4648 R_ALPHA_DTPMOD64, 0);
3765b1be
RH
4649
4650 if (dynamic_symbol_p || r_type == R_ALPHA_TLSLDM)
4651 value = 0;
4652 else
4653 {
e1918d23 4654 BFD_ASSERT (elf_hash_table (info)->tls_sec != NULL);
07d6d2b8 4655 value -= dtp_base;
3765b1be
RH
4656 }
4657 bfd_put_64 (output_bfd, value,
4658 sgot->contents + gotent->got_offset + 8);
4659 }
4660
4661 value = (sgot->output_section->vma
4662 + sgot->output_offset
4663 + gotent->got_offset);
4664 value -= gp;
4665 goto default_reloc;
4666
4667 case R_ALPHA_DTPRELHI:
4668 case R_ALPHA_DTPRELLO:
4669 case R_ALPHA_DTPREL16:
4670 if (dynamic_symbol_p)
07d6d2b8 4671 {
4eca0228 4672 _bfd_error_handler
695344c0 4673 /* xgettext:c-format */
871b3ab2 4674 (_("%pB: dtp-relative relocation against dynamic symbol %s"),
07d6d2b8
AM
4675 input_bfd, h->root.root.root.string);
4676 ret_val = FALSE;
4677 }
e1918d23 4678 BFD_ASSERT (elf_hash_table (info)->tls_sec != NULL);
3765b1be 4679 value -= dtp_base;
9e756d64
RH
4680 if (r_type == R_ALPHA_DTPRELHI)
4681 value = ((bfd_signed_vma) value >> 16) + ((value >> 15) & 1);
3765b1be
RH
4682 goto default_reloc;
4683
4684 case R_ALPHA_TPRELHI:
4685 case R_ALPHA_TPRELLO:
4686 case R_ALPHA_TPREL16:
3cbc1e5e 4687 if (bfd_link_dll (info))
9e756d64 4688 {
4eca0228 4689 _bfd_error_handler
695344c0 4690 /* xgettext:c-format */
871b3ab2 4691 (_("%pB: TLS local exec code cannot be linked into shared objects"),
d003868e 4692 input_bfd);
07d6d2b8 4693 ret_val = FALSE;
9e756d64
RH
4694 }
4695 else if (dynamic_symbol_p)
07d6d2b8 4696 {
4eca0228 4697 _bfd_error_handler
695344c0 4698 /* xgettext:c-format */
871b3ab2 4699 (_("%pB: tp-relative relocation against dynamic symbol %s"),
07d6d2b8
AM
4700 input_bfd, h->root.root.root.string);
4701 ret_val = FALSE;
4702 }
e1918d23 4703 BFD_ASSERT (elf_hash_table (info)->tls_sec != NULL);
3765b1be 4704 value -= tp_base;
9e756d64
RH
4705 if (r_type == R_ALPHA_TPRELHI)
4706 value = ((bfd_signed_vma) value >> 16) + ((value >> 15) & 1);
3765b1be
RH
4707 goto default_reloc;
4708
4709 case R_ALPHA_GOTDTPREL:
4710 case R_ALPHA_GOTTPREL:
4711 BFD_ASSERT(sgot != NULL);
4712 BFD_ASSERT(gp != 0);
4713 BFD_ASSERT(gotent != NULL);
4714 BFD_ASSERT(gotent->use_count >= 1);
4715
4716 if (!gotent->reloc_done)
4717 {
4718 gotent->reloc_done = 1;
4719
4720 if (dynamic_symbol_p)
4721 value = 0;
4722 else
4723 {
e1918d23 4724 BFD_ASSERT (elf_hash_table (info)->tls_sec != NULL);
1bbc9cec
RH
4725 if (r_type == R_ALPHA_GOTDTPREL)
4726 value -= dtp_base;
28fbeab8 4727 else if (bfd_link_executable (info))
1bbc9cec
RH
4728 value -= tp_base;
4729 else
4730 {
4731 elf64_alpha_emit_dynrel (output_bfd, info, sgot, srelgot,
4732 gotent->got_offset, 0,
4733 R_ALPHA_TPREL64,
4734 value - dtp_base);
4735 value = 0;
4736 }
3765b1be
RH
4737 }
4738 bfd_put_64 (output_bfd, value,
4739 sgot->contents + gotent->got_offset);
4740 }
4741
4742 value = (sgot->output_section->vma
4743 + sgot->output_offset
4744 + gotent->got_offset);
4745 value -= gp;
4746 goto default_reloc;
4747
252b5132
RH
4748 default:
4749 default_reloc:
4750 r = _bfd_final_link_relocate (howto, input_bfd, input_section,
3765b1be 4751 contents, rel->r_offset, value, 0);
252b5132
RH
4752 break;
4753 }
4754
4755 switch (r)
4756 {
4757 case bfd_reloc_ok:
4758 break;
4759
4760 case bfd_reloc_overflow:
4761 {
4762 const char *name;
4763
ed4de5e2
JJ
4764 /* Don't warn if the overflow is due to pc relative reloc
4765 against discarded section. Section optimization code should
4766 handle it. */
4767
4768 if (r_symndx < symtab_hdr->sh_info
4769 && sec != NULL && howto->pc_relative
dbaa2011 4770 && discarded_section (sec))
ed4de5e2
JJ
4771 break;
4772
252b5132 4773 if (h != NULL)
dfeffb9f 4774 name = NULL;
252b5132
RH
4775 else
4776 {
4777 name = (bfd_elf_string_from_elf_section
4778 (input_bfd, symtab_hdr->sh_link, sym->st_name));
4779 if (name == NULL)
b34976b6 4780 return FALSE;
252b5132 4781 if (*name == '\0')
fd361982 4782 name = bfd_section_name (sec);
252b5132 4783 }
1a72702b
AM
4784 (*info->callbacks->reloc_overflow)
4785 (info, (h ? &h->root.root : NULL), name, howto->name,
4786 (bfd_vma) 0, input_bfd, input_section, rel->r_offset);
252b5132
RH
4787 }
4788 break;
4789
4790 default:
4791 case bfd_reloc_outofrange:
4792 abort ();
4793 }
4794 }
4795
f16fbd61 4796 return ret_val;
252b5132
RH
4797}
4798
4799/* Finish up dynamic symbol handling. We set the contents of various
4800 dynamic sections here. */
4801
b34976b6 4802static bfd_boolean
a7519a3c
RH
4803elf64_alpha_finish_dynamic_symbol (bfd *output_bfd, struct bfd_link_info *info,
4804 struct elf_link_hash_entry *h,
4805 Elf_Internal_Sym *sym)
252b5132 4806{
6ec7057a 4807 struct alpha_elf_link_hash_entry *ah = (struct alpha_elf_link_hash_entry *)h;
252b5132 4808
6ec7057a 4809 if (h->needs_plt)
252b5132
RH
4810 {
4811 /* Fill in the .plt entry for this symbol. */
4812 asection *splt, *sgot, *srel;
4813 Elf_Internal_Rela outrel;
947216bf 4814 bfd_byte *loc;
252b5132
RH
4815 bfd_vma got_addr, plt_addr;
4816 bfd_vma plt_index;
4817 struct alpha_elf_got_entry *gotent;
4818
4819 BFD_ASSERT (h->dynindx != -1);
4820
ce558b89 4821 splt = elf_hash_table (info)->splt;
252b5132 4822 BFD_ASSERT (splt != NULL);
ce558b89 4823 srel = elf_hash_table (info)->srelplt;
252b5132 4824 BFD_ASSERT (srel != NULL);
252b5132 4825
6ec7057a
RH
4826 for (gotent = ah->got_entries; gotent ; gotent = gotent->next)
4827 if (gotent->reloc_type == R_ALPHA_LITERAL
4828 && gotent->use_count > 0)
4829 {
4830 unsigned int insn;
4831 int disp;
252b5132 4832
6ec7057a
RH
4833 sgot = alpha_elf_tdata (gotent->gotobj)->got;
4834 BFD_ASSERT (sgot != NULL);
252b5132 4835
6ec7057a
RH
4836 BFD_ASSERT (gotent->got_offset != -1);
4837 BFD_ASSERT (gotent->plt_offset != -1);
252b5132 4838
6ec7057a
RH
4839 got_addr = (sgot->output_section->vma
4840 + sgot->output_offset
4841 + gotent->got_offset);
4842 plt_addr = (splt->output_section->vma
4843 + splt->output_offset
4844 + gotent->plt_offset);
252b5132 4845
6ec7057a 4846 plt_index = (gotent->plt_offset-PLT_HEADER_SIZE) / PLT_ENTRY_SIZE;
252b5132 4847
6ec7057a
RH
4848 /* Fill in the entry in the procedure linkage table. */
4849 if (elf64_alpha_use_secureplt)
4850 {
4851 disp = (PLT_HEADER_SIZE - 4) - (gotent->plt_offset + 4);
4852 insn = INSN_AD (INSN_BR, 31, disp);
4853 bfd_put_32 (output_bfd, insn,
4854 splt->contents + gotent->plt_offset);
252b5132 4855
6ec7057a
RH
4856 plt_index = ((gotent->plt_offset - NEW_PLT_HEADER_SIZE)
4857 / NEW_PLT_ENTRY_SIZE);
4858 }
4859 else
4860 {
4861 disp = -(gotent->plt_offset + 4);
4862 insn = INSN_AD (INSN_BR, 28, disp);
4863 bfd_put_32 (output_bfd, insn,
4864 splt->contents + gotent->plt_offset);
4865 bfd_put_32 (output_bfd, INSN_UNOP,
4866 splt->contents + gotent->plt_offset + 4);
4867 bfd_put_32 (output_bfd, INSN_UNOP,
4868 splt->contents + gotent->plt_offset + 8);
4869
4870 plt_index = ((gotent->plt_offset - OLD_PLT_HEADER_SIZE)
4871 / OLD_PLT_ENTRY_SIZE);
4872 }
252b5132 4873
6ec7057a
RH
4874 /* Fill in the entry in the .rela.plt section. */
4875 outrel.r_offset = got_addr;
4876 outrel.r_info = ELF64_R_INFO(h->dynindx, R_ALPHA_JMP_SLOT);
4877 outrel.r_addend = 0;
252b5132 4878
6ec7057a
RH
4879 loc = srel->contents + plt_index * sizeof (Elf64_External_Rela);
4880 bfd_elf64_swap_reloca_out (output_bfd, &outrel, loc);
252b5132 4881
6ec7057a
RH
4882 /* Fill in the entry in the .got. */
4883 bfd_put_64 (output_bfd, plt_addr,
4884 sgot->contents + gotent->got_offset);
4885 }
252b5132
RH
4886 }
4887 else if (alpha_elf_dynamic_symbol_p (h, info))
4888 {
4889 /* Fill in the dynamic relocations for this symbol's .got entries. */
4890 asection *srel;
252b5132
RH
4891 struct alpha_elf_got_entry *gotent;
4892
ce558b89 4893 srel = elf_hash_table (info)->srelgot;
252b5132
RH
4894 BFD_ASSERT (srel != NULL);
4895
252b5132
RH
4896 for (gotent = ((struct alpha_elf_link_hash_entry *) h)->got_entries;
4897 gotent != NULL;
4898 gotent = gotent->next)
4899 {
f44f99a5 4900 asection *sgot;
1bbc9cec 4901 long r_type;
3765b1be 4902
f44f99a5
RH
4903 if (gotent->use_count == 0)
4904 continue;
4905
4906 sgot = alpha_elf_tdata (gotent->gotobj)->got;
3765b1be
RH
4907
4908 r_type = gotent->reloc_type;
4909 switch (r_type)
4910 {
4911 case R_ALPHA_LITERAL:
4912 r_type = R_ALPHA_GLOB_DAT;
4913 break;
4914 case R_ALPHA_TLSGD:
4915 r_type = R_ALPHA_DTPMOD64;
4916 break;
4917 case R_ALPHA_GOTDTPREL:
4918 r_type = R_ALPHA_DTPREL64;
4919 break;
4920 case R_ALPHA_GOTTPREL:
4921 r_type = R_ALPHA_TPREL64;
4922 break;
4923 case R_ALPHA_TLSLDM:
4924 default:
4925 abort ();
4926 }
4927
68ffbac6 4928 elf64_alpha_emit_dynrel (output_bfd, info, sgot, srel,
1bbc9cec
RH
4929 gotent->got_offset, h->dynindx,
4930 r_type, gotent->addend);
3765b1be
RH
4931
4932 if (gotent->reloc_type == R_ALPHA_TLSGD)
68ffbac6 4933 elf64_alpha_emit_dynrel (output_bfd, info, sgot, srel,
1bbc9cec
RH
4934 gotent->got_offset + 8, h->dynindx,
4935 R_ALPHA_DTPREL64, gotent->addend);
252b5132
RH
4936 }
4937 }
4938
4939 /* Mark some specially defined symbols as absolute. */
9637f6ef 4940 if (h == elf_hash_table (info)->hdynamic
22edb2f1
RS
4941 || h == elf_hash_table (info)->hgot
4942 || h == elf_hash_table (info)->hplt)
252b5132
RH
4943 sym->st_shndx = SHN_ABS;
4944
b34976b6 4945 return TRUE;
252b5132
RH
4946}
4947
4948/* Finish up the dynamic sections. */
4949
b34976b6 4950static bfd_boolean
a7519a3c
RH
4951elf64_alpha_finish_dynamic_sections (bfd *output_bfd,
4952 struct bfd_link_info *info)
252b5132
RH
4953{
4954 bfd *dynobj;
4955 asection *sdyn;
4956
4957 dynobj = elf_hash_table (info)->dynobj;
3d4d4302 4958 sdyn = bfd_get_linker_section (dynobj, ".dynamic");
252b5132
RH
4959
4960 if (elf_hash_table (info)->dynamic_sections_created)
4961 {
6ec7057a 4962 asection *splt, *sgotplt, *srelaplt;
252b5132 4963 Elf64_External_Dyn *dyncon, *dynconend;
6ec7057a 4964 bfd_vma plt_vma, gotplt_vma;
252b5132 4965
ce558b89
AM
4966 splt = elf_hash_table (info)->splt;
4967 srelaplt = elf_hash_table (info)->srelplt;
252b5132
RH
4968 BFD_ASSERT (splt != NULL && sdyn != NULL);
4969
6ec7057a
RH
4970 plt_vma = splt->output_section->vma + splt->output_offset;
4971
4972 gotplt_vma = 0;
4973 if (elf64_alpha_use_secureplt)
4974 {
ce558b89 4975 sgotplt = elf_hash_table (info)->sgotplt;
6ec7057a
RH
4976 BFD_ASSERT (sgotplt != NULL);
4977 if (sgotplt->size > 0)
4978 gotplt_vma = sgotplt->output_section->vma + sgotplt->output_offset;
4979 }
4980
252b5132 4981 dyncon = (Elf64_External_Dyn *) sdyn->contents;
eea6121a 4982 dynconend = (Elf64_External_Dyn *) (sdyn->contents + sdyn->size);
252b5132
RH
4983 for (; dyncon < dynconend; dyncon++)
4984 {
4985 Elf_Internal_Dyn dyn;
252b5132
RH
4986
4987 bfd_elf64_swap_dyn_in (dynobj, dyncon, &dyn);
4988
4989 switch (dyn.d_tag)
4990 {
4991 case DT_PLTGOT:
6ec7057a
RH
4992 dyn.d_un.d_ptr
4993 = elf64_alpha_use_secureplt ? gotplt_vma : plt_vma;
4994 break;
252b5132 4995 case DT_PLTRELSZ:
6ec7057a
RH
4996 dyn.d_un.d_val = srelaplt ? srelaplt->size : 0;
4997 break;
252b5132 4998 case DT_JMPREL:
4ade44b7
AM
4999 dyn.d_un.d_ptr = srelaplt ? (srelaplt->output_section->vma
5000 + srelaplt->output_offset) : 0;
6ec7057a 5001 break;
252b5132
RH
5002 }
5003
5004 bfd_elf64_swap_dyn_out (output_bfd, &dyn, dyncon);
5005 }
5006
6ec7057a 5007 /* Initialize the plt header. */
eea6121a 5008 if (splt->size > 0)
252b5132 5009 {
6ec7057a
RH
5010 unsigned int insn;
5011 int ofs;
5012
5013 if (elf64_alpha_use_secureplt)
5014 {
5015 ofs = gotplt_vma - (plt_vma + PLT_HEADER_SIZE);
5016
5017 insn = INSN_ABC (INSN_SUBQ, 27, 28, 25);
5018 bfd_put_32 (output_bfd, insn, splt->contents);
5019
5020 insn = INSN_ABO (INSN_LDAH, 28, 28, (ofs + 0x8000) >> 16);
5021 bfd_put_32 (output_bfd, insn, splt->contents + 4);
5022
5023 insn = INSN_ABC (INSN_S4SUBQ, 25, 25, 25);
5024 bfd_put_32 (output_bfd, insn, splt->contents + 8);
5025
5026 insn = INSN_ABO (INSN_LDA, 28, 28, ofs);
5027 bfd_put_32 (output_bfd, insn, splt->contents + 12);
5028
5029 insn = INSN_ABO (INSN_LDQ, 27, 28, 0);
5030 bfd_put_32 (output_bfd, insn, splt->contents + 16);
5031
5032 insn = INSN_ABC (INSN_ADDQ, 25, 25, 25);
5033 bfd_put_32 (output_bfd, insn, splt->contents + 20);
5034
5035 insn = INSN_ABO (INSN_LDQ, 28, 28, 8);
5036 bfd_put_32 (output_bfd, insn, splt->contents + 24);
5037
5038 insn = INSN_AB (INSN_JMP, 31, 27);
5039 bfd_put_32 (output_bfd, insn, splt->contents + 28);
5040
5041 insn = INSN_AD (INSN_BR, 28, -PLT_HEADER_SIZE);
5042 bfd_put_32 (output_bfd, insn, splt->contents + 32);
5043 }
5044 else
5045 {
5046 insn = INSN_AD (INSN_BR, 27, 0); /* br $27, .+4 */
5047 bfd_put_32 (output_bfd, insn, splt->contents);
5048
5049 insn = INSN_ABO (INSN_LDQ, 27, 27, 12);
5050 bfd_put_32 (output_bfd, insn, splt->contents + 4);
5051
5052 insn = INSN_UNOP;
5053 bfd_put_32 (output_bfd, insn, splt->contents + 8);
5054
5055 insn = INSN_AB (INSN_JMP, 27, 27);
5056 bfd_put_32 (output_bfd, insn, splt->contents + 12);
5057
5058 /* The next two words will be filled in by ld.so. */
5059 bfd_put_64 (output_bfd, 0, splt->contents + 16);
5060 bfd_put_64 (output_bfd, 0, splt->contents + 24);
5061 }
252b5132 5062
eecdbe52 5063 elf_section_data (splt->output_section)->this_hdr.sh_entsize = 0;
252b5132
RH
5064 }
5065 }
5066
b34976b6 5067 return TRUE;
252b5132
RH
5068}
5069
96e2734b
RH
5070/* We need to use a special link routine to handle the .mdebug section.
5071 We need to merge all instances of these sections together, not write
5072 them all out sequentially. */
252b5132 5073
b34976b6 5074static bfd_boolean
a7519a3c 5075elf64_alpha_final_link (bfd *abfd, struct bfd_link_info *info)
252b5132
RH
5076{
5077 asection *o;
5078 struct bfd_link_order *p;
96e2734b 5079 asection *mdebug_sec;
252b5132
RH
5080 struct ecoff_debug_info debug;
5081 const struct ecoff_debug_swap *swap
5082 = get_elf_backend_data (abfd)->elf_backend_ecoff_debug_swap;
5083 HDRR *symhdr = &debug.symbolic_header;
4dfe6ac6
NC
5084 void * mdebug_handle = NULL;
5085 struct alpha_elf_link_hash_table * htab;
5086
5087 htab = alpha_elf_hash_table (info);
5088 if (htab == NULL)
5089 return FALSE;
252b5132 5090
96e2734b 5091 /* Go through the sections and collect the mdebug information. */
252b5132 5092 mdebug_sec = NULL;
252b5132
RH
5093 for (o = abfd->sections; o != (asection *) NULL; o = o->next)
5094 {
252b5132
RH
5095 if (strcmp (o->name, ".mdebug") == 0)
5096 {
5097 struct extsym_info einfo;
5098
5099 /* We have found the .mdebug section in the output file.
5100 Look through all the link_orders comprising it and merge
5101 the information together. */
5102 symhdr->magic = swap->sym_magic;
5103 /* FIXME: What should the version stamp be? */
5104 symhdr->vstamp = 0;
5105 symhdr->ilineMax = 0;
5106 symhdr->cbLine = 0;
5107 symhdr->idnMax = 0;
5108 symhdr->ipdMax = 0;
5109 symhdr->isymMax = 0;
5110 symhdr->ioptMax = 0;
5111 symhdr->iauxMax = 0;
5112 symhdr->issMax = 0;
5113 symhdr->issExtMax = 0;
5114 symhdr->ifdMax = 0;
5115 symhdr->crfd = 0;
5116 symhdr->iextMax = 0;
5117
5118 /* We accumulate the debugging information itself in the
5119 debug_info structure. */
5120 debug.line = NULL;
5121 debug.external_dnr = NULL;
5122 debug.external_pdr = NULL;
5123 debug.external_sym = NULL;
5124 debug.external_opt = NULL;
5125 debug.external_aux = NULL;
5126 debug.ss = NULL;
5127 debug.ssext = debug.ssext_end = NULL;
5128 debug.external_fdr = NULL;
5129 debug.external_rfd = NULL;
5130 debug.external_ext = debug.external_ext_end = NULL;
5131
5132 mdebug_handle = bfd_ecoff_debug_init (abfd, &debug, swap, info);
2c3fc389 5133 if (mdebug_handle == NULL)
b34976b6 5134 return FALSE;
252b5132
RH
5135
5136 if (1)
5137 {
5138 asection *s;
5139 EXTR esym;
52b9d213 5140 bfd_vma last = 0;
252b5132
RH
5141 unsigned int i;
5142 static const char * const name[] =
5143 {
5144 ".text", ".init", ".fini", ".data",
5145 ".rodata", ".sdata", ".sbss", ".bss"
5146 };
5147 static const int sc[] = { scText, scInit, scFini, scData,
5148 scRData, scSData, scSBss, scBss };
5149
5150 esym.jmptbl = 0;
5151 esym.cobol_main = 0;
5152 esym.weakext = 0;
5153 esym.reserved = 0;
5154 esym.ifd = ifdNil;
5155 esym.asym.iss = issNil;
5156 esym.asym.st = stLocal;
5157 esym.asym.reserved = 0;
5158 esym.asym.index = indexNil;
5159 for (i = 0; i < 8; i++)
5160 {
5161 esym.asym.sc = sc[i];
5162 s = bfd_get_section_by_name (abfd, name[i]);
5163 if (s != NULL)
5164 {
5165 esym.asym.value = s->vma;
eea6121a 5166 last = s->vma + s->size;
252b5132
RH
5167 }
5168 else
5169 esym.asym.value = last;
5170
5171 if (! bfd_ecoff_debug_one_external (abfd, &debug, swap,
5172 name[i], &esym))
b34976b6 5173 return FALSE;
252b5132
RH
5174 }
5175 }
5176
8423293d 5177 for (p = o->map_head.link_order;
252b5132
RH
5178 p != (struct bfd_link_order *) NULL;
5179 p = p->next)
5180 {
5181 asection *input_section;
5182 bfd *input_bfd;
5183 const struct ecoff_debug_swap *input_swap;
5184 struct ecoff_debug_info input_debug;
5185 char *eraw_src;
5186 char *eraw_end;
5187
5188 if (p->type != bfd_indirect_link_order)
5189 {
fd96f80f 5190 if (p->type == bfd_data_link_order)
252b5132
RH
5191 continue;
5192 abort ();
5193 }
5194
5195 input_section = p->u.indirect.section;
5196 input_bfd = input_section->owner;
5197
0ffa91dd
NC
5198 if (! is_alpha_elf (input_bfd))
5199 /* I don't know what a non ALPHA ELF bfd would be
5200 doing with a .mdebug section, but I don't really
5201 want to deal with it. */
5202 continue;
252b5132
RH
5203
5204 input_swap = (get_elf_backend_data (input_bfd)
5205 ->elf_backend_ecoff_debug_swap);
5206
eea6121a 5207 BFD_ASSERT (p->size == input_section->size);
252b5132
RH
5208
5209 /* The ECOFF linking code expects that we have already
5210 read in the debugging information and set up an
5211 ecoff_debug_info structure, so we do that now. */
5212 if (!elf64_alpha_read_ecoff_info (input_bfd, input_section,
5213 &input_debug))
b34976b6 5214 return FALSE;
252b5132
RH
5215
5216 if (! (bfd_ecoff_debug_accumulate
5217 (mdebug_handle, abfd, &debug, swap, input_bfd,
5218 &input_debug, input_swap, info)))
b34976b6 5219 return FALSE;
252b5132
RH
5220
5221 /* Loop through the external symbols. For each one with
5222 interesting information, try to find the symbol in
5223 the linker global hash table and save the information
5224 for the output external symbols. */
21d799b5 5225 eraw_src = (char *) input_debug.external_ext;
252b5132
RH
5226 eraw_end = (eraw_src
5227 + (input_debug.symbolic_header.iextMax
5228 * input_swap->external_ext_size));
5229 for (;
5230 eraw_src < eraw_end;
5231 eraw_src += input_swap->external_ext_size)
5232 {
5233 EXTR ext;
5234 const char *name;
5235 struct alpha_elf_link_hash_entry *h;
5236
2c3fc389 5237 (*input_swap->swap_ext_in) (input_bfd, eraw_src, &ext);
252b5132
RH
5238 if (ext.asym.sc == scNil
5239 || ext.asym.sc == scUndefined
5240 || ext.asym.sc == scSUndefined)
5241 continue;
5242
5243 name = input_debug.ssext + ext.asym.iss;
4dfe6ac6 5244 h = alpha_elf_link_hash_lookup (htab, name, FALSE, FALSE, TRUE);
252b5132
RH
5245 if (h == NULL || h->esym.ifd != -2)
5246 continue;
5247
5248 if (ext.ifd != -1)
5249 {
5250 BFD_ASSERT (ext.ifd
5251 < input_debug.symbolic_header.ifdMax);
5252 ext.ifd = input_debug.ifdmap[ext.ifd];
5253 }
5254
5255 h->esym = ext;
5256 }
5257
5258 /* Free up the information we just read. */
5259 free (input_debug.line);
5260 free (input_debug.external_dnr);
5261 free (input_debug.external_pdr);
5262 free (input_debug.external_sym);
5263 free (input_debug.external_opt);
5264 free (input_debug.external_aux);
5265 free (input_debug.ss);
5266 free (input_debug.ssext);
5267 free (input_debug.external_fdr);
5268 free (input_debug.external_rfd);
5269 free (input_debug.external_ext);
5270
5271 /* Hack: reset the SEC_HAS_CONTENTS flag so that
5272 elf_link_input_bfd ignores this section. */
5273 input_section->flags &=~ SEC_HAS_CONTENTS;
5274 }
5275
252b5132
RH
5276 /* Build the external symbol information. */
5277 einfo.abfd = abfd;
5278 einfo.info = info;
5279 einfo.debug = &debug;
5280 einfo.swap = swap;
b34976b6 5281 einfo.failed = FALSE;
252b5132
RH
5282 elf_link_hash_traverse (elf_hash_table (info),
5283 elf64_alpha_output_extsym,
2c3fc389 5284 &einfo);
252b5132 5285 if (einfo.failed)
b34976b6 5286 return FALSE;
252b5132
RH
5287
5288 /* Set the size of the .mdebug section. */
eea6121a 5289 o->size = bfd_ecoff_debug_size (abfd, &debug, swap);
252b5132
RH
5290
5291 /* Skip this section later on (I don't think this currently
5292 matters, but someday it might). */
8423293d 5293 o->map_head.link_order = (struct bfd_link_order *) NULL;
252b5132
RH
5294
5295 mdebug_sec = o;
5296 }
252b5132
RH
5297 }
5298
5299 /* Invoke the regular ELF backend linker to do all the work. */
c152c796 5300 if (! bfd_elf_final_link (abfd, info))
b34976b6 5301 return FALSE;
252b5132
RH
5302
5303 /* Now write out the computed sections. */
5304
5305 /* The .got subsections... */
5306 {
5307 bfd *i, *dynobj = elf_hash_table(info)->dynobj;
4dfe6ac6 5308 for (i = htab->got_list;
252b5132
RH
5309 i != NULL;
5310 i = alpha_elf_tdata(i)->got_link_next)
5311 {
5312 asection *sgot;
5313
5314 /* elf_bfd_final_link already did everything in dynobj. */
5315 if (i == dynobj)
5316 continue;
5317
5318 sgot = alpha_elf_tdata(i)->got;
5319 if (! bfd_set_section_contents (abfd, sgot->output_section,
dc810e39
AM
5320 sgot->contents,
5321 (file_ptr) sgot->output_offset,
eea6121a 5322 sgot->size))
b34976b6 5323 return FALSE;
252b5132
RH
5324 }
5325 }
5326
252b5132
RH
5327 if (mdebug_sec != (asection *) NULL)
5328 {
5329 BFD_ASSERT (abfd->output_has_begun);
5330 if (! bfd_ecoff_write_accumulated_debug (mdebug_handle, abfd, &debug,
5331 swap, info,
5332 mdebug_sec->filepos))
b34976b6 5333 return FALSE;
252b5132
RH
5334
5335 bfd_ecoff_debug_free (mdebug_handle, abfd, &debug, swap, info);
5336 }
5337
b34976b6 5338 return TRUE;
252b5132 5339}
fcfbdf31
JJ
5340
5341static enum elf_reloc_type_class
7e612e98
AM
5342elf64_alpha_reloc_type_class (const struct bfd_link_info *info ATTRIBUTE_UNUSED,
5343 const asection *rel_sec ATTRIBUTE_UNUSED,
5344 const Elf_Internal_Rela *rela)
fcfbdf31 5345{
f51e552e 5346 switch ((int) ELF64_R_TYPE (rela->r_info))
fcfbdf31
JJ
5347 {
5348 case R_ALPHA_RELATIVE:
5349 return reloc_class_relative;
5350 case R_ALPHA_JMP_SLOT:
5351 return reloc_class_plt;
5352 case R_ALPHA_COPY:
5353 return reloc_class_copy;
5354 default:
5355 return reloc_class_normal;
5356 }
5357}
252b5132 5358\f
b35d266b 5359static const struct bfd_elf_special_section elf64_alpha_special_sections[] =
2f89ff8d 5360{
07d6d2b8 5361 { STRING_COMMA_LEN (".sbss"), -2, SHT_NOBITS, SHF_ALLOC + SHF_WRITE + SHF_ALPHA_GPREL },
0112cd26 5362 { STRING_COMMA_LEN (".sdata"), -2, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE + SHF_ALPHA_GPREL },
07d6d2b8 5363 { NULL, 0, 0, 0, 0 }
2f89ff8d
L
5364};
5365
252b5132
RH
5366/* ECOFF swapping routines. These are used when dealing with the
5367 .mdebug section, which is in the ECOFF debugging format. Copied
fe8bc63d 5368 from elf32-mips.c. */
252b5132
RH
5369static const struct ecoff_debug_swap
5370elf64_alpha_ecoff_debug_swap =
5371{
5372 /* Symbol table magic number. */
5373 magicSym2,
5374 /* Alignment of debugging information. E.g., 4. */
5375 8,
5376 /* Sizes of external symbolic information. */
5377 sizeof (struct hdr_ext),
5378 sizeof (struct dnr_ext),
5379 sizeof (struct pdr_ext),
5380 sizeof (struct sym_ext),
5381 sizeof (struct opt_ext),
5382 sizeof (struct fdr_ext),
5383 sizeof (struct rfd_ext),
5384 sizeof (struct ext_ext),
5385 /* Functions to swap in external symbolic data. */
5386 ecoff_swap_hdr_in,
5387 ecoff_swap_dnr_in,
5388 ecoff_swap_pdr_in,
5389 ecoff_swap_sym_in,
5390 ecoff_swap_opt_in,
5391 ecoff_swap_fdr_in,
5392 ecoff_swap_rfd_in,
5393 ecoff_swap_ext_in,
5394 _bfd_ecoff_swap_tir_in,
5395 _bfd_ecoff_swap_rndx_in,
5396 /* Functions to swap out external symbolic data. */
5397 ecoff_swap_hdr_out,
5398 ecoff_swap_dnr_out,
5399 ecoff_swap_pdr_out,
5400 ecoff_swap_sym_out,
5401 ecoff_swap_opt_out,
5402 ecoff_swap_fdr_out,
5403 ecoff_swap_rfd_out,
5404 ecoff_swap_ext_out,
5405 _bfd_ecoff_swap_tir_out,
5406 _bfd_ecoff_swap_rndx_out,
5407 /* Function to read in symbolic data. */
5408 elf64_alpha_read_ecoff_info
5409};
5410\f
70bcb145
JW
5411/* Use a non-standard hash bucket size of 8. */
5412
562ace6b 5413static const struct elf_size_info alpha_elf_size_info =
70bcb145
JW
5414{
5415 sizeof (Elf64_External_Ehdr),
5416 sizeof (Elf64_External_Phdr),
5417 sizeof (Elf64_External_Shdr),
5418 sizeof (Elf64_External_Rel),
5419 sizeof (Elf64_External_Rela),
5420 sizeof (Elf64_External_Sym),
5421 sizeof (Elf64_External_Dyn),
5422 sizeof (Elf_External_Note),
5423 8,
5424 1,
45d6a902 5425 64, 3,
70bcb145
JW
5426 ELFCLASS64, EV_CURRENT,
5427 bfd_elf64_write_out_phdrs,
5428 bfd_elf64_write_shdrs_and_ehdr,
1489a3a0 5429 bfd_elf64_checksum_contents,
70bcb145 5430 bfd_elf64_write_relocs,
73ff0d56 5431 bfd_elf64_swap_symbol_in,
70bcb145
JW
5432 bfd_elf64_swap_symbol_out,
5433 bfd_elf64_slurp_reloc_table,
5434 bfd_elf64_slurp_symbol_table,
5435 bfd_elf64_swap_dyn_in,
5436 bfd_elf64_swap_dyn_out,
947216bf
AM
5437 bfd_elf64_swap_reloc_in,
5438 bfd_elf64_swap_reloc_out,
5439 bfd_elf64_swap_reloca_in,
5440 bfd_elf64_swap_reloca_out
70bcb145
JW
5441};
5442
6d00b590 5443#define TARGET_LITTLE_SYM alpha_elf64_vec
252b5132
RH
5444#define TARGET_LITTLE_NAME "elf64-alpha"
5445#define ELF_ARCH bfd_arch_alpha
ae95ffa6 5446#define ELF_TARGET_ID ALPHA_ELF_DATA
56fc028e
AJ
5447#define ELF_MACHINE_CODE EM_ALPHA
5448#define ELF_MAXPAGESIZE 0x10000
24718e3b 5449#define ELF_COMMONPAGESIZE 0x2000
252b5132
RH
5450
5451#define bfd_elf64_bfd_link_hash_table_create \
5452 elf64_alpha_bfd_link_hash_table_create
5453
5454#define bfd_elf64_bfd_reloc_type_lookup \
5455 elf64_alpha_bfd_reloc_type_lookup
157090f7
AM
5456#define bfd_elf64_bfd_reloc_name_lookup \
5457 elf64_alpha_bfd_reloc_name_lookup
252b5132
RH
5458#define elf_info_to_howto \
5459 elf64_alpha_info_to_howto
5460
5461#define bfd_elf64_mkobject \
5462 elf64_alpha_mkobject
5463#define elf_backend_object_p \
5464 elf64_alpha_object_p
5465
5466#define elf_backend_section_from_shdr \
5467 elf64_alpha_section_from_shdr
204692d7
RH
5468#define elf_backend_section_flags \
5469 elf64_alpha_section_flags
252b5132
RH
5470#define elf_backend_fake_sections \
5471 elf64_alpha_fake_sections
5472
5473#define bfd_elf64_bfd_is_local_label_name \
5474 elf64_alpha_is_local_label_name
5475#define bfd_elf64_find_nearest_line \
5476 elf64_alpha_find_nearest_line
5477#define bfd_elf64_bfd_relax_section \
5478 elf64_alpha_relax_section
5479
5480#define elf_backend_add_symbol_hook \
5481 elf64_alpha_add_symbol_hook
13285a1b
AM
5482#define elf_backend_relocs_compatible \
5483 _bfd_elf_relocs_compatible
6fc5bb57
AM
5484#define elf_backend_sort_relocs_p \
5485 elf64_alpha_sort_relocs_p
252b5132
RH
5486#define elf_backend_check_relocs \
5487 elf64_alpha_check_relocs
5488#define elf_backend_create_dynamic_sections \
5489 elf64_alpha_create_dynamic_sections
5490#define elf_backend_adjust_dynamic_symbol \
5491 elf64_alpha_adjust_dynamic_symbol
747ffa7b
AM
5492#define elf_backend_merge_symbol_attribute \
5493 elf64_alpha_merge_symbol_attribute
48f4b4f5
RH
5494#define elf_backend_copy_indirect_symbol \
5495 elf64_alpha_copy_indirect_symbol
252b5132
RH
5496#define elf_backend_always_size_sections \
5497 elf64_alpha_always_size_sections
5498#define elf_backend_size_dynamic_sections \
5499 elf64_alpha_size_dynamic_sections
74541ad4 5500#define elf_backend_omit_section_dynsym \
d00dd7dc 5501 _bfd_elf_omit_section_dynsym_all
252b5132
RH
5502#define elf_backend_relocate_section \
5503 elf64_alpha_relocate_section
5504#define elf_backend_finish_dynamic_symbol \
5505 elf64_alpha_finish_dynamic_symbol
5506#define elf_backend_finish_dynamic_sections \
5507 elf64_alpha_finish_dynamic_sections
5508#define bfd_elf64_bfd_final_link \
5509 elf64_alpha_final_link
fcfbdf31
JJ
5510#define elf_backend_reloc_type_class \
5511 elf64_alpha_reloc_type_class
252b5132 5512
e117360e
RH
5513#define elf_backend_can_gc_sections 1
5514#define elf_backend_gc_mark_hook elf64_alpha_gc_mark_hook
e117360e 5515
252b5132
RH
5516#define elf_backend_ecoff_debug_swap \
5517 &elf64_alpha_ecoff_debug_swap
5518
70bcb145
JW
5519#define elf_backend_size_info \
5520 alpha_elf_size_info
5521
29ef7005
L
5522#define elf_backend_special_sections \
5523 elf64_alpha_special_sections
2f89ff8d 5524
38b1a46c 5525/* A few constants that determine how the .plt section is set up. */
252b5132
RH
5526#define elf_backend_want_got_plt 0
5527#define elf_backend_plt_readonly 0
5528#define elf_backend_want_plt_sym 1
5529#define elf_backend_got_header_size 0
64f52338 5530#define elf_backend_dtrel_excludes_plt 1
252b5132
RH
5531
5532#include "elf64-target.h"
2238051f
RH
5533\f
5534/* FreeBSD support. */
5535
5536#undef TARGET_LITTLE_SYM
6d00b590 5537#define TARGET_LITTLE_SYM alpha_elf64_fbsd_vec
2238051f
RH
5538#undef TARGET_LITTLE_NAME
5539#define TARGET_LITTLE_NAME "elf64-alpha-freebsd"
d1036acb
L
5540#undef ELF_OSABI
5541#define ELF_OSABI ELFOSABI_FREEBSD
2238051f
RH
5542
5543/* The kernel recognizes executables as valid only if they carry a
5544 "FreeBSD" label in the ELF header. So we put this label on all
5545 executables and (for simplicity) also all other object files. */
5546
2238051f 5547static void
a7519a3c
RH
5548elf64_alpha_fbsd_post_process_headers (bfd * abfd,
5549 struct bfd_link_info * link_info ATTRIBUTE_UNUSED)
2238051f
RH
5550{
5551 Elf_Internal_Ehdr * i_ehdrp; /* ELF file header, internal form. */
5552
5553 i_ehdrp = elf_elfheader (abfd);
5554
5555 /* Put an ABI label supported by FreeBSD >= 4.1. */
d1036acb 5556 i_ehdrp->e_ident[EI_OSABI] = get_elf_backend_data (abfd)->elf_osabi;
2238051f
RH
5557#ifdef OLD_FREEBSD_ABI_LABEL
5558 /* The ABI label supported by FreeBSD <= 4.0 is quite nonstandard. */
5559 memcpy (&i_ehdrp->e_ident[EI_ABIVERSION], "FreeBSD", 8);
5560#endif
5561}
5562
5563#undef elf_backend_post_process_headers
5564#define elf_backend_post_process_headers \
5565 elf64_alpha_fbsd_post_process_headers
5566
571fe01f 5567#undef elf64_bed
2238051f
RH
5568#define elf64_bed elf64_alpha_fbsd_bed
5569
5570#include "elf64-target.h"
This page took 1.499648 seconds and 4 git commands to generate.