Automatic date update in version.in
[deliverable/binutils-gdb.git] / bfd / elf64-alpha.c
CommitLineData
252b5132 1/* Alpha specific support for 64-bit ELF
250d07de 2 Copyright (C) 1996-2021 Free Software Foundation, Inc.
252b5132
RH
3 Contributed by Richard Henderson <rth@tamu.edu>.
4
571fe01f 5 This file is part of BFD, the Binary File Descriptor library.
252b5132 6
571fe01f
NC
7 This program is free software; you can redistribute it and/or modify
8 it under the terms of the GNU General Public License as published by
cd123cb7 9 the Free Software Foundation; either version 3 of the License, or
571fe01f 10 (at your option) any later version.
252b5132 11
571fe01f
NC
12 This program is distributed in the hope that it will be useful,
13 but WITHOUT ANY WARRANTY; without even the implied warranty of
14 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 GNU General Public License for more details.
252b5132 16
571fe01f
NC
17 You should have received a copy of the GNU General Public License
18 along with this program; if not, write to the Free Software
cd123cb7
NC
19 Foundation, Inc., 51 Franklin Street - Fifth Floor, Boston,
20 MA 02110-1301, USA. */
21
252b5132
RH
22
23/* We need a published ABI spec for this. Until one comes out, don't
24 assume this'll remain unchanged forever. */
25
252b5132 26#include "sysdep.h"
3db64b00 27#include "bfd.h"
252b5132
RH
28#include "libbfd.h"
29#include "elf-bfd.h"
0ba9378a 30#include "ecoff-bfd.h"
252b5132
RH
31
32#include "elf/alpha.h"
33
34#define ALPHAECOFF
35
36#define NO_COFF_RELOCS
37#define NO_COFF_SYMBOLS
38#define NO_COFF_LINENOS
39
fe8bc63d 40/* Get the ECOFF swapping routines. Needed for the debug information. */
252b5132
RH
41#include "coff/internal.h"
42#include "coff/sym.h"
43#include "coff/symconst.h"
44#include "coff/ecoff.h"
45#include "coff/alpha.h"
46#include "aout/ar.h"
47#include "libcoff.h"
48#include "libecoff.h"
49#define ECOFF_64
50#include "ecoffswap.h"
51
6ec7057a
RH
52\f
53/* Instruction data for plt generation and relaxation. */
54
eae0b5c3
NC
55#define OP_LDA 0x08U
56#define OP_LDAH 0x09U
57#define OP_LDQ 0x29U
58#define OP_BR 0x30U
59#define OP_BSR 0x34U
6ec7057a
RH
60
61#define INSN_LDA (OP_LDA << 26)
62#define INSN_LDAH (OP_LDAH << 26)
63#define INSN_LDQ (OP_LDQ << 26)
64#define INSN_BR (OP_BR << 26)
65
66#define INSN_ADDQ 0x40000400
67#define INSN_RDUNIQ 0x0000009e
68#define INSN_SUBQ 0x40000520
69#define INSN_S4SUBQ 0x40000560
70#define INSN_UNOP 0x2ffe0000
71
72#define INSN_JSR 0x68004000
73#define INSN_JMP 0x68000000
74#define INSN_JSR_MASK 0xfc00c000
75
eae0b5c3
NC
76#define INSN_A(I,A) (I | ((unsigned) A << 21))
77#define INSN_AB(I,A,B) (INSN_A (I, A) | (B << 16))
78#define INSN_ABC(I,A,B,C) (INSN_A (I, A) | (B << 16) | C)
79#define INSN_ABO(I,A,B,O) (INSN_A (I, A) | (B << 16) | ((O) & 0xffff))
80#define INSN_AD(I,A,D) (INSN_A (I, A) | (((D) >> 2) & 0x1fffff))
6ec7057a
RH
81
82/* PLT/GOT Stuff */
83
84/* Set by ld emulation. Putting this into the link_info or hash structure
85 is simply working too hard. */
86#ifdef USE_SECUREPLT
0a1b45a2 87bool elf64_alpha_use_secureplt = true;
6ec7057a 88#else
0a1b45a2 89bool elf64_alpha_use_secureplt = false;
6ec7057a
RH
90#endif
91
92#define OLD_PLT_HEADER_SIZE 32
93#define OLD_PLT_ENTRY_SIZE 12
94#define NEW_PLT_HEADER_SIZE 36
95#define NEW_PLT_ENTRY_SIZE 4
96
97#define PLT_HEADER_SIZE \
98 (elf64_alpha_use_secureplt ? NEW_PLT_HEADER_SIZE : OLD_PLT_HEADER_SIZE)
99#define PLT_ENTRY_SIZE \
100 (elf64_alpha_use_secureplt ? NEW_PLT_ENTRY_SIZE : OLD_PLT_ENTRY_SIZE)
101
102#define MAX_GOT_SIZE (64*1024)
103
104#define ELF_DYNAMIC_INTERPRETER "/usr/lib/ld.so"
252b5132 105\f
21d799b5
NC
106
107/* Used to implement multiple .got subsections. */
108struct alpha_elf_got_entry
109{
110 struct alpha_elf_got_entry *next;
111
112 /* Which .got subsection? */
113 bfd *gotobj;
114
115 /* The addend in effect for this entry. */
116 bfd_vma addend;
117
118 /* The .got offset for this entry. */
119 int got_offset;
120
121 /* The .plt offset for this entry. */
122 int plt_offset;
123
124 /* How many references to this entry? */
125 int use_count;
126
127 /* The relocation type of this entry. */
128 unsigned char reloc_type;
129
130 /* How a LITERAL is used. */
131 unsigned char flags;
132
133 /* Have we initialized the dynamic relocation for this entry? */
134 unsigned char reloc_done;
135
136 /* Have we adjusted this entry for SEC_MERGE? */
137 unsigned char reloc_xlated;
138};
139
140struct alpha_elf_reloc_entry
141{
142 struct alpha_elf_reloc_entry *next;
143
144 /* Which .reloc section? */
145 asection *srel;
146
1f7f2abb
L
147 /* Which section this relocation is against? */
148 asection *sec;
21d799b5
NC
149
150 /* How many did we find? */
151 unsigned long count;
1f7f2abb
L
152
153 /* What kind of relocation? */
154 unsigned int rtype;
21d799b5
NC
155};
156
252b5132
RH
157struct alpha_elf_link_hash_entry
158{
159 struct elf_link_hash_entry root;
160
161 /* External symbol information. */
162 EXTR esym;
163
164 /* Cumulative flags for all the .got entries. */
165 int flags;
166
9e756d64 167 /* Contexts in which a literal was referenced. */
8288a39e
RH
168#define ALPHA_ELF_LINK_HASH_LU_ADDR 0x01
169#define ALPHA_ELF_LINK_HASH_LU_MEM 0x02
170#define ALPHA_ELF_LINK_HASH_LU_BYTE 0x04
171#define ALPHA_ELF_LINK_HASH_LU_JSR 0x08
172#define ALPHA_ELF_LINK_HASH_LU_TLSGD 0x10
173#define ALPHA_ELF_LINK_HASH_LU_TLSLDM 0x20
174#define ALPHA_ELF_LINK_HASH_LU_JSRDIRECT 0x40
175#define ALPHA_ELF_LINK_HASH_LU_PLT 0x38
176#define ALPHA_ELF_LINK_HASH_TLS_IE 0x80
cc03ec80 177
252b5132 178 /* Used to implement multiple .got subsections. */
21d799b5 179 struct alpha_elf_got_entry *got_entries;
252b5132 180
571fe01f 181 /* Used to count non-got, non-plt relocations for delayed sizing
252b5132 182 of relocation sections. */
21d799b5 183 struct alpha_elf_reloc_entry *reloc_entries;
252b5132
RH
184};
185
186/* Alpha ELF linker hash table. */
187
188struct alpha_elf_link_hash_table
189{
190 struct elf_link_hash_table root;
191
192 /* The head of a list of .got subsections linked through
193 alpha_elf_tdata(abfd)->got_link_next. */
194 bfd *got_list;
4a828aab
RH
195
196 /* The most recent relax pass that we've seen. The GOTs
197 should be regenerated if this doesn't match. */
198 int relax_trip;
252b5132
RH
199};
200
201/* Look up an entry in a Alpha ELF linker hash table. */
202
203#define alpha_elf_link_hash_lookup(table, string, create, copy, follow) \
204 ((struct alpha_elf_link_hash_entry *) \
205 elf_link_hash_lookup (&(table)->root, (string), (create), \
206 (copy), (follow)))
207
208/* Traverse a Alpha ELF linker hash table. */
209
210#define alpha_elf_link_hash_traverse(table, func, info) \
211 (elf_link_hash_traverse \
212 (&(table)->root, \
0a1b45a2 213 (bool (*) (struct elf_link_hash_entry *, void *)) (func), \
252b5132
RH
214 (info)))
215
216/* Get the Alpha ELF linker hash table from a link_info structure. */
217
218#define alpha_elf_hash_table(p) \
0f55320b
AM
219 ((is_elf_hash_table ((p)->hash) \
220 && elf_hash_table_id (elf_hash_table (p)) == ALPHA_ELF_DATA) \
221 ? (struct alpha_elf_link_hash_table *) (p)->hash : NULL)
252b5132
RH
222
223/* Get the object's symbols as our own entry type. */
224
225#define alpha_elf_sym_hashes(abfd) \
226 ((struct alpha_elf_link_hash_entry **)elf_sym_hashes(abfd))
227
68ffbac6 228/* Should we do dynamic things to this symbol? This differs from the
986a241f
RH
229 generic version in that we never need to consider function pointer
230 equality wrt PLT entries -- we don't create a PLT entry if a symbol's
231 address is ever taken. */
252b5132 232
0a1b45a2 233static inline bool
a7519a3c
RH
234alpha_elf_dynamic_symbol_p (struct elf_link_hash_entry *h,
235 struct bfd_link_info *info)
8fb35fed 236{
986a241f 237 return _bfd_elf_dynamic_symbol_p (h, info, 0);
8fb35fed 238}
252b5132
RH
239
240/* Create an entry in a Alpha ELF linker hash table. */
241
242static struct bfd_hash_entry *
a7519a3c
RH
243elf64_alpha_link_hash_newfunc (struct bfd_hash_entry *entry,
244 struct bfd_hash_table *table,
245 const char *string)
252b5132
RH
246{
247 struct alpha_elf_link_hash_entry *ret =
248 (struct alpha_elf_link_hash_entry *) entry;
249
250 /* Allocate the structure if it has not already been allocated by a
251 subclass. */
252 if (ret == (struct alpha_elf_link_hash_entry *) NULL)
253 ret = ((struct alpha_elf_link_hash_entry *)
254 bfd_hash_allocate (table,
255 sizeof (struct alpha_elf_link_hash_entry)));
256 if (ret == (struct alpha_elf_link_hash_entry *) NULL)
257 return (struct bfd_hash_entry *) ret;
258
259 /* Call the allocation method of the superclass. */
260 ret = ((struct alpha_elf_link_hash_entry *)
261 _bfd_elf_link_hash_newfunc ((struct bfd_hash_entry *) ret,
262 table, string));
263 if (ret != (struct alpha_elf_link_hash_entry *) NULL)
264 {
265 /* Set local fields. */
266 memset (&ret->esym, 0, sizeof (EXTR));
267 /* We use -2 as a marker to indicate that the information has
268 not been set. -1 means there is no associated ifd. */
269 ret->esym.ifd = -2;
270 ret->flags = 0;
271 ret->got_entries = NULL;
272 ret->reloc_entries = NULL;
273 }
274
275 return (struct bfd_hash_entry *) ret;
276}
277
278/* Create a Alpha ELF linker hash table. */
279
280static struct bfd_link_hash_table *
a7519a3c 281elf64_alpha_bfd_link_hash_table_create (bfd *abfd)
252b5132
RH
282{
283 struct alpha_elf_link_hash_table *ret;
986f0783 284 size_t amt = sizeof (struct alpha_elf_link_hash_table);
252b5132 285
e2d34d7d 286 ret = (struct alpha_elf_link_hash_table *) bfd_zmalloc (amt);
252b5132
RH
287 if (ret == (struct alpha_elf_link_hash_table *) NULL)
288 return NULL;
289
66eb6687
AM
290 if (!_bfd_elf_link_hash_table_init (&ret->root, abfd,
291 elf64_alpha_link_hash_newfunc,
4dfe6ac6
NC
292 sizeof (struct alpha_elf_link_hash_entry),
293 ALPHA_ELF_DATA))
252b5132 294 {
e2d34d7d 295 free (ret);
252b5132
RH
296 return NULL;
297 }
298
299 return &ret->root.root;
300}
301\f
698600e4
AM
302/* Alpha ELF follows MIPS ELF in using a special find_nearest_line
303 routine in order to handle the ECOFF debugging information. */
304
305struct alpha_elf_find_line
306{
307 struct ecoff_debug_info d;
308 struct ecoff_find_line i;
309};
310
252b5132
RH
311/* We have some private fields hanging off of the elf_tdata structure. */
312
313struct alpha_elf_obj_tdata
314{
315 struct elf_obj_tdata root;
316
317 /* For every input file, these are the got entries for that object's
318 local symbols. */
319 struct alpha_elf_got_entry ** local_got_entries;
320
321 /* For every input file, this is the object that owns the got that
322 this input file uses. */
323 bfd *gotobj;
324
325 /* For every got, this is a linked list through the objects using this got */
326 bfd *in_got_link_next;
327
328 /* For every got, this is a link to the next got subsegment. */
329 bfd *got_link_next;
330
331 /* For every got, this is the section. */
332 asection *got;
333
3765b1be
RH
334 /* For every got, this is it's total number of words. */
335 int total_got_size;
252b5132 336
3765b1be 337 /* For every got, this is the sum of the number of words required
252b5132 338 to hold all of the member object's local got. */
3765b1be 339 int local_got_size;
698600e4
AM
340
341 /* Used by elf64_alpha_find_nearest_line entry point. */
342 struct alpha_elf_find_line *find_line_info;
343
252b5132
RH
344};
345
346#define alpha_elf_tdata(abfd) \
347 ((struct alpha_elf_obj_tdata *) (abfd)->tdata.any)
348
0ffa91dd
NC
349#define is_alpha_elf(bfd) \
350 (bfd_get_flavour (bfd) == bfd_target_elf_flavour \
351 && elf_tdata (bfd) != NULL \
4dfe6ac6 352 && elf_object_id (bfd) == ALPHA_ELF_DATA)
0ffa91dd 353
0a1b45a2 354static bool
a7519a3c 355elf64_alpha_mkobject (bfd *abfd)
252b5132 356{
0ffa91dd 357 return bfd_elf_allocate_object (abfd, sizeof (struct alpha_elf_obj_tdata),
4dfe6ac6 358 ALPHA_ELF_DATA);
252b5132
RH
359}
360
0a1b45a2 361static bool
a7519a3c 362elf64_alpha_object_p (bfd *abfd)
252b5132 363{
252b5132
RH
364 /* Set the right machine number for an Alpha ELF file. */
365 return bfd_default_set_arch_mach (abfd, bfd_arch_alpha, 0);
366}
367\f
a7519a3c
RH
368/* A relocation function which doesn't do anything. */
369
370static bfd_reloc_status_type
371elf64_alpha_reloc_nil (bfd *abfd ATTRIBUTE_UNUSED, arelent *reloc,
372 asymbol *sym ATTRIBUTE_UNUSED,
2c3fc389 373 void * data ATTRIBUTE_UNUSED, asection *sec,
a7519a3c
RH
374 bfd *output_bfd, char **error_message ATTRIBUTE_UNUSED)
375{
376 if (output_bfd)
377 reloc->address += sec->output_offset;
378 return bfd_reloc_ok;
379}
380
381/* A relocation function used for an unsupported reloc. */
382
383static bfd_reloc_status_type
384elf64_alpha_reloc_bad (bfd *abfd ATTRIBUTE_UNUSED, arelent *reloc,
385 asymbol *sym ATTRIBUTE_UNUSED,
2c3fc389 386 void * data ATTRIBUTE_UNUSED, asection *sec,
a7519a3c
RH
387 bfd *output_bfd, char **error_message ATTRIBUTE_UNUSED)
388{
389 if (output_bfd)
390 reloc->address += sec->output_offset;
391 return bfd_reloc_notsupported;
392}
393
394/* Do the work of the GPDISP relocation. */
395
396static bfd_reloc_status_type
397elf64_alpha_do_reloc_gpdisp (bfd *abfd, bfd_vma gpdisp, bfd_byte *p_ldah,
398 bfd_byte *p_lda)
399{
400 bfd_reloc_status_type ret = bfd_reloc_ok;
401 bfd_vma addend;
402 unsigned long i_ldah, i_lda;
403
404 i_ldah = bfd_get_32 (abfd, p_ldah);
405 i_lda = bfd_get_32 (abfd, p_lda);
406
407 /* Complain if the instructions are not correct. */
408 if (((i_ldah >> 26) & 0x3f) != 0x09
409 || ((i_lda >> 26) & 0x3f) != 0x08)
410 ret = bfd_reloc_dangerous;
411
412 /* Extract the user-supplied offset, mirroring the sign extensions
413 that the instructions perform. */
414 addend = ((i_ldah & 0xffff) << 16) | (i_lda & 0xffff);
415 addend = (addend ^ 0x80008000) - 0x80008000;
416
417 gpdisp += addend;
418
419 if ((bfd_signed_vma) gpdisp < -(bfd_signed_vma) 0x80000000
420 || (bfd_signed_vma) gpdisp >= (bfd_signed_vma) 0x7fff8000)
421 ret = bfd_reloc_overflow;
422
423 /* compensate for the sign extension again. */
424 i_ldah = ((i_ldah & 0xffff0000)
425 | (((gpdisp >> 16) + ((gpdisp >> 15) & 1)) & 0xffff));
426 i_lda = (i_lda & 0xffff0000) | (gpdisp & 0xffff);
427
428 bfd_put_32 (abfd, (bfd_vma) i_ldah, p_ldah);
429 bfd_put_32 (abfd, (bfd_vma) i_lda, p_lda);
430
431 return ret;
432}
433
434/* The special function for the GPDISP reloc. */
435
436static bfd_reloc_status_type
437elf64_alpha_reloc_gpdisp (bfd *abfd, arelent *reloc_entry,
2c3fc389 438 asymbol *sym ATTRIBUTE_UNUSED, void * data,
a7519a3c
RH
439 asection *input_section, bfd *output_bfd,
440 char **err_msg)
441{
442 bfd_reloc_status_type ret;
443 bfd_vma gp, relocation;
444 bfd_vma high_address;
445 bfd_byte *p_ldah, *p_lda;
446
447 /* Don't do anything if we're not doing a final link. */
448 if (output_bfd)
449 {
450 reloc_entry->address += input_section->output_offset;
451 return bfd_reloc_ok;
452 }
453
454 high_address = bfd_get_section_limit (abfd, input_section);
455 if (reloc_entry->address > high_address
456 || reloc_entry->address + reloc_entry->addend > high_address)
457 return bfd_reloc_outofrange;
458
459 /* The gp used in the portion of the output object to which this
460 input object belongs is cached on the input bfd. */
461 gp = _bfd_get_gp_value (abfd);
462
463 relocation = (input_section->output_section->vma
464 + input_section->output_offset
465 + reloc_entry->address);
466
467 p_ldah = (bfd_byte *) data + reloc_entry->address;
468 p_lda = p_ldah + reloc_entry->addend;
469
470 ret = elf64_alpha_do_reloc_gpdisp (abfd, gp - relocation, p_ldah, p_lda);
471
472 /* Complain if the instructions are not correct. */
473 if (ret == bfd_reloc_dangerous)
474 *err_msg = _("GPDISP relocation did not find ldah and lda instructions");
475
476 return ret;
477}
478
252b5132
RH
479/* In case we're on a 32-bit machine, construct a 64-bit "-1" value
480 from smaller values. Start with zero, widen, *then* decrement. */
481#define MINUS_ONE (((bfd_vma)0) - 1)
482
21d799b5 483
dfe57ca0 484#define SKIP_HOWTO(N) \
21d799b5 485 HOWTO(N, 0, 0, 0, 0, 0, complain_overflow_dont, elf64_alpha_reloc_bad, 0, 0, 0, 0, 0)
dfe57ca0 486
252b5132
RH
487static reloc_howto_type elf64_alpha_howto_table[] =
488{
489 HOWTO (R_ALPHA_NONE, /* type */
490 0, /* rightshift */
6346d5ca
AM
491 3, /* size (0 = byte, 1 = short, 2 = long) */
492 0, /* bitsize */
0a1b45a2 493 true, /* pc_relative */
252b5132
RH
494 0, /* bitpos */
495 complain_overflow_dont, /* complain_on_overflow */
496 elf64_alpha_reloc_nil, /* special_function */
497 "NONE", /* name */
0a1b45a2 498 false, /* partial_inplace */
252b5132
RH
499 0, /* src_mask */
500 0, /* dst_mask */
0a1b45a2 501 true), /* pcrel_offset */
252b5132
RH
502
503 /* A 32 bit reference to a symbol. */
504 HOWTO (R_ALPHA_REFLONG, /* type */
505 0, /* rightshift */
506 2, /* size (0 = byte, 1 = short, 2 = long) */
507 32, /* bitsize */
0a1b45a2 508 false, /* pc_relative */
252b5132
RH
509 0, /* bitpos */
510 complain_overflow_bitfield, /* complain_on_overflow */
bc1bc43f 511 bfd_elf_generic_reloc, /* special_function */
252b5132 512 "REFLONG", /* name */
0a1b45a2 513 false, /* partial_inplace */
252b5132
RH
514 0xffffffff, /* src_mask */
515 0xffffffff, /* dst_mask */
0a1b45a2 516 false), /* pcrel_offset */
252b5132
RH
517
518 /* A 64 bit reference to a symbol. */
519 HOWTO (R_ALPHA_REFQUAD, /* type */
520 0, /* rightshift */
521 4, /* size (0 = byte, 1 = short, 2 = long) */
522 64, /* bitsize */
0a1b45a2 523 false, /* pc_relative */
252b5132
RH
524 0, /* bitpos */
525 complain_overflow_bitfield, /* complain_on_overflow */
bc1bc43f 526 bfd_elf_generic_reloc, /* special_function */
252b5132 527 "REFQUAD", /* name */
0a1b45a2 528 false, /* partial_inplace */
252b5132
RH
529 MINUS_ONE, /* src_mask */
530 MINUS_ONE, /* dst_mask */
0a1b45a2 531 false), /* pcrel_offset */
252b5132
RH
532
533 /* A 32 bit GP relative offset. This is just like REFLONG except
534 that when the value is used the value of the gp register will be
535 added in. */
536 HOWTO (R_ALPHA_GPREL32, /* type */
537 0, /* rightshift */
538 2, /* size (0 = byte, 1 = short, 2 = long) */
539 32, /* bitsize */
0a1b45a2 540 false, /* pc_relative */
252b5132
RH
541 0, /* bitpos */
542 complain_overflow_bitfield, /* complain_on_overflow */
bc1bc43f 543 bfd_elf_generic_reloc, /* special_function */
252b5132 544 "GPREL32", /* name */
0a1b45a2 545 false, /* partial_inplace */
252b5132
RH
546 0xffffffff, /* src_mask */
547 0xffffffff, /* dst_mask */
0a1b45a2 548 false), /* pcrel_offset */
252b5132
RH
549
550 /* Used for an instruction that refers to memory off the GP register. */
551 HOWTO (R_ALPHA_LITERAL, /* type */
552 0, /* rightshift */
dfe57ca0 553 1, /* size (0 = byte, 1 = short, 2 = long) */
252b5132 554 16, /* bitsize */
0a1b45a2 555 false, /* pc_relative */
252b5132
RH
556 0, /* bitpos */
557 complain_overflow_signed, /* complain_on_overflow */
bc1bc43f 558 bfd_elf_generic_reloc, /* special_function */
252b5132 559 "ELF_LITERAL", /* name */
0a1b45a2 560 false, /* partial_inplace */
252b5132
RH
561 0xffff, /* src_mask */
562 0xffff, /* dst_mask */
0a1b45a2 563 false), /* pcrel_offset */
252b5132
RH
564
565 /* This reloc only appears immediately following an ELF_LITERAL reloc.
566 It identifies a use of the literal. The symbol index is special:
567 1 means the literal address is in the base register of a memory
568 format instruction; 2 means the literal address is in the byte
569 offset register of a byte-manipulation instruction; 3 means the
570 literal address is in the target register of a jsr instruction.
571 This does not actually do any relocation. */
572 HOWTO (R_ALPHA_LITUSE, /* type */
573 0, /* rightshift */
dfe57ca0 574 1, /* size (0 = byte, 1 = short, 2 = long) */
252b5132 575 32, /* bitsize */
0a1b45a2 576 false, /* pc_relative */
252b5132
RH
577 0, /* bitpos */
578 complain_overflow_dont, /* complain_on_overflow */
579 elf64_alpha_reloc_nil, /* special_function */
580 "LITUSE", /* name */
0a1b45a2 581 false, /* partial_inplace */
252b5132
RH
582 0, /* src_mask */
583 0, /* dst_mask */
0a1b45a2 584 false), /* pcrel_offset */
252b5132
RH
585
586 /* Load the gp register. This is always used for a ldah instruction
587 which loads the upper 16 bits of the gp register. The symbol
588 index of the GPDISP instruction is an offset in bytes to the lda
589 instruction that loads the lower 16 bits. The value to use for
590 the relocation is the difference between the GP value and the
591 current location; the load will always be done against a register
592 holding the current address.
593
594 NOTE: Unlike ECOFF, partial in-place relocation is not done. If
595 any offset is present in the instructions, it is an offset from
596 the register to the ldah instruction. This lets us avoid any
597 stupid hackery like inventing a gp value to do partial relocation
598 against. Also unlike ECOFF, we do the whole relocation off of
599 the GPDISP rather than a GPDISP_HI16/GPDISP_LO16 pair. An odd,
600 space consuming bit, that, since all the information was present
601 in the GPDISP_HI16 reloc. */
602 HOWTO (R_ALPHA_GPDISP, /* type */
603 16, /* rightshift */
604 2, /* size (0 = byte, 1 = short, 2 = long) */
605 16, /* bitsize */
0a1b45a2 606 false, /* pc_relative */
252b5132
RH
607 0, /* bitpos */
608 complain_overflow_dont, /* complain_on_overflow */
609 elf64_alpha_reloc_gpdisp, /* special_function */
610 "GPDISP", /* name */
0a1b45a2 611 false, /* partial_inplace */
252b5132
RH
612 0xffff, /* src_mask */
613 0xffff, /* dst_mask */
0a1b45a2 614 true), /* pcrel_offset */
252b5132
RH
615
616 /* A 21 bit branch. */
617 HOWTO (R_ALPHA_BRADDR, /* type */
618 2, /* rightshift */
619 2, /* size (0 = byte, 1 = short, 2 = long) */
620 21, /* bitsize */
0a1b45a2 621 true, /* pc_relative */
252b5132
RH
622 0, /* bitpos */
623 complain_overflow_signed, /* complain_on_overflow */
bc1bc43f 624 bfd_elf_generic_reloc, /* special_function */
252b5132 625 "BRADDR", /* name */
0a1b45a2 626 false, /* partial_inplace */
252b5132
RH
627 0x1fffff, /* src_mask */
628 0x1fffff, /* dst_mask */
0a1b45a2 629 true), /* pcrel_offset */
252b5132
RH
630
631 /* A hint for a jump to a register. */
632 HOWTO (R_ALPHA_HINT, /* type */
633 2, /* rightshift */
dfe57ca0 634 1, /* size (0 = byte, 1 = short, 2 = long) */
252b5132 635 14, /* bitsize */
0a1b45a2 636 true, /* pc_relative */
252b5132
RH
637 0, /* bitpos */
638 complain_overflow_dont, /* complain_on_overflow */
bc1bc43f 639 bfd_elf_generic_reloc, /* special_function */
252b5132 640 "HINT", /* name */
0a1b45a2 641 false, /* partial_inplace */
252b5132
RH
642 0x3fff, /* src_mask */
643 0x3fff, /* dst_mask */
0a1b45a2 644 true), /* pcrel_offset */
252b5132
RH
645
646 /* 16 bit PC relative offset. */
647 HOWTO (R_ALPHA_SREL16, /* type */
648 0, /* rightshift */
649 1, /* size (0 = byte, 1 = short, 2 = long) */
650 16, /* bitsize */
0a1b45a2 651 true, /* pc_relative */
252b5132
RH
652 0, /* bitpos */
653 complain_overflow_signed, /* complain_on_overflow */
bc1bc43f 654 bfd_elf_generic_reloc, /* special_function */
252b5132 655 "SREL16", /* name */
0a1b45a2 656 false, /* partial_inplace */
252b5132
RH
657 0xffff, /* src_mask */
658 0xffff, /* dst_mask */
0a1b45a2 659 true), /* pcrel_offset */
252b5132
RH
660
661 /* 32 bit PC relative offset. */
662 HOWTO (R_ALPHA_SREL32, /* type */
663 0, /* rightshift */
664 2, /* size (0 = byte, 1 = short, 2 = long) */
665 32, /* bitsize */
0a1b45a2 666 true, /* pc_relative */
252b5132
RH
667 0, /* bitpos */
668 complain_overflow_signed, /* complain_on_overflow */
bc1bc43f 669 bfd_elf_generic_reloc, /* special_function */
252b5132 670 "SREL32", /* name */
0a1b45a2 671 false, /* partial_inplace */
252b5132
RH
672 0xffffffff, /* src_mask */
673 0xffffffff, /* dst_mask */
0a1b45a2 674 true), /* pcrel_offset */
252b5132
RH
675
676 /* A 64 bit PC relative offset. */
677 HOWTO (R_ALPHA_SREL64, /* type */
678 0, /* rightshift */
679 4, /* size (0 = byte, 1 = short, 2 = long) */
680 64, /* bitsize */
0a1b45a2 681 true, /* pc_relative */
252b5132
RH
682 0, /* bitpos */
683 complain_overflow_signed, /* complain_on_overflow */
bc1bc43f 684 bfd_elf_generic_reloc, /* special_function */
252b5132 685 "SREL64", /* name */
0a1b45a2 686 false, /* partial_inplace */
252b5132
RH
687 MINUS_ONE, /* src_mask */
688 MINUS_ONE, /* dst_mask */
0a1b45a2 689 true), /* pcrel_offset */
252b5132 690
dfe57ca0
RH
691 /* Skip 12 - 16; deprecated ECOFF relocs. */
692 SKIP_HOWTO (12),
693 SKIP_HOWTO (13),
694 SKIP_HOWTO (14),
695 SKIP_HOWTO (15),
696 SKIP_HOWTO (16),
252b5132
RH
697
698 /* The high 16 bits of the displacement from GP to the target. */
699 HOWTO (R_ALPHA_GPRELHIGH,
700 0, /* rightshift */
dfe57ca0 701 1, /* size (0 = byte, 1 = short, 2 = long) */
252b5132 702 16, /* bitsize */
0a1b45a2 703 false, /* pc_relative */
252b5132
RH
704 0, /* bitpos */
705 complain_overflow_signed, /* complain_on_overflow */
bc1bc43f 706 bfd_elf_generic_reloc, /* special_function */
252b5132 707 "GPRELHIGH", /* name */
0a1b45a2 708 false, /* partial_inplace */
252b5132
RH
709 0xffff, /* src_mask */
710 0xffff, /* dst_mask */
0a1b45a2 711 false), /* pcrel_offset */
252b5132
RH
712
713 /* The low 16 bits of the displacement from GP to the target. */
714 HOWTO (R_ALPHA_GPRELLOW,
715 0, /* rightshift */
dfe57ca0 716 1, /* size (0 = byte, 1 = short, 2 = long) */
252b5132 717 16, /* bitsize */
0a1b45a2 718 false, /* pc_relative */
252b5132
RH
719 0, /* bitpos */
720 complain_overflow_dont, /* complain_on_overflow */
bc1bc43f 721 bfd_elf_generic_reloc, /* special_function */
252b5132 722 "GPRELLOW", /* name */
0a1b45a2 723 false, /* partial_inplace */
252b5132
RH
724 0xffff, /* src_mask */
725 0xffff, /* dst_mask */
0a1b45a2 726 false), /* pcrel_offset */
252b5132
RH
727
728 /* A 16-bit displacement from the GP to the target. */
dfe57ca0 729 HOWTO (R_ALPHA_GPREL16,
252b5132 730 0, /* rightshift */
dfe57ca0 731 1, /* size (0 = byte, 1 = short, 2 = long) */
252b5132 732 16, /* bitsize */
0a1b45a2 733 false, /* pc_relative */
252b5132
RH
734 0, /* bitpos */
735 complain_overflow_signed, /* complain_on_overflow */
bc1bc43f 736 bfd_elf_generic_reloc, /* special_function */
dfe57ca0 737 "GPREL16", /* name */
0a1b45a2 738 false, /* partial_inplace */
252b5132
RH
739 0xffff, /* src_mask */
740 0xffff, /* dst_mask */
0a1b45a2 741 false), /* pcrel_offset */
252b5132 742
dfe57ca0
RH
743 /* Skip 20 - 23; deprecated ECOFF relocs. */
744 SKIP_HOWTO (20),
745 SKIP_HOWTO (21),
746 SKIP_HOWTO (22),
747 SKIP_HOWTO (23),
252b5132 748
fe8bc63d 749 /* Misc ELF relocations. */
252b5132
RH
750
751 /* A dynamic relocation to copy the target into our .dynbss section. */
752 /* Not generated, as all Alpha objects use PIC, so it is not needed. It
753 is present because every other ELF has one, but should not be used
754 because .dynbss is an ugly thing. */
755 HOWTO (R_ALPHA_COPY,
756 0,
757 0,
758 0,
0a1b45a2 759 false,
252b5132
RH
760 0,
761 complain_overflow_dont,
762 bfd_elf_generic_reloc,
763 "COPY",
0a1b45a2 764 false,
252b5132
RH
765 0,
766 0,
0a1b45a2 767 true),
252b5132
RH
768
769 /* A dynamic relocation for a .got entry. */
770 HOWTO (R_ALPHA_GLOB_DAT,
771 0,
772 0,
773 0,
0a1b45a2 774 false,
252b5132
RH
775 0,
776 complain_overflow_dont,
777 bfd_elf_generic_reloc,
778 "GLOB_DAT",
0a1b45a2 779 false,
252b5132
RH
780 0,
781 0,
0a1b45a2 782 true),
252b5132
RH
783
784 /* A dynamic relocation for a .plt entry. */
785 HOWTO (R_ALPHA_JMP_SLOT,
786 0,
787 0,
788 0,
0a1b45a2 789 false,
252b5132
RH
790 0,
791 complain_overflow_dont,
792 bfd_elf_generic_reloc,
793 "JMP_SLOT",
0a1b45a2 794 false,
252b5132
RH
795 0,
796 0,
0a1b45a2 797 true),
252b5132
RH
798
799 /* A dynamic relocation to add the base of the DSO to a 64-bit field. */
800 HOWTO (R_ALPHA_RELATIVE,
801 0,
802 0,
803 0,
0a1b45a2 804 false,
252b5132
RH
805 0,
806 complain_overflow_dont,
807 bfd_elf_generic_reloc,
808 "RELATIVE",
0a1b45a2 809 false,
252b5132
RH
810 0,
811 0,
0a1b45a2 812 true),
7793f4d0
RH
813
814 /* A 21 bit branch that adjusts for gp loads. */
815 HOWTO (R_ALPHA_BRSGP, /* type */
816 2, /* rightshift */
817 2, /* size (0 = byte, 1 = short, 2 = long) */
818 21, /* bitsize */
0a1b45a2 819 true, /* pc_relative */
7793f4d0
RH
820 0, /* bitpos */
821 complain_overflow_signed, /* complain_on_overflow */
bc1bc43f 822 bfd_elf_generic_reloc, /* special_function */
7793f4d0 823 "BRSGP", /* name */
0a1b45a2 824 false, /* partial_inplace */
7793f4d0
RH
825 0x1fffff, /* src_mask */
826 0x1fffff, /* dst_mask */
0a1b45a2 827 true), /* pcrel_offset */
3765b1be
RH
828
829 /* Creates a tls_index for the symbol in the got. */
830 HOWTO (R_ALPHA_TLSGD, /* type */
831 0, /* rightshift */
832 1, /* size (0 = byte, 1 = short, 2 = long) */
833 16, /* bitsize */
0a1b45a2 834 false, /* pc_relative */
3765b1be
RH
835 0, /* bitpos */
836 complain_overflow_signed, /* complain_on_overflow */
bc1bc43f 837 bfd_elf_generic_reloc, /* special_function */
3765b1be 838 "TLSGD", /* name */
0a1b45a2 839 false, /* partial_inplace */
3765b1be
RH
840 0xffff, /* src_mask */
841 0xffff, /* dst_mask */
0a1b45a2 842 false), /* pcrel_offset */
3765b1be
RH
843
844 /* Creates a tls_index for the (current) module in the got. */
845 HOWTO (R_ALPHA_TLSLDM, /* type */
846 0, /* rightshift */
847 1, /* size (0 = byte, 1 = short, 2 = long) */
848 16, /* bitsize */
0a1b45a2 849 false, /* pc_relative */
3765b1be
RH
850 0, /* bitpos */
851 complain_overflow_signed, /* complain_on_overflow */
bc1bc43f 852 bfd_elf_generic_reloc, /* special_function */
3765b1be 853 "TLSLDM", /* name */
0a1b45a2 854 false, /* partial_inplace */
3765b1be
RH
855 0xffff, /* src_mask */
856 0xffff, /* dst_mask */
0a1b45a2 857 false), /* pcrel_offset */
3765b1be
RH
858
859 /* A dynamic relocation for a DTP module entry. */
860 HOWTO (R_ALPHA_DTPMOD64, /* type */
861 0, /* rightshift */
862 4, /* size (0 = byte, 1 = short, 2 = long) */
863 64, /* bitsize */
0a1b45a2 864 false, /* pc_relative */
3765b1be
RH
865 0, /* bitpos */
866 complain_overflow_bitfield, /* complain_on_overflow */
bc1bc43f 867 bfd_elf_generic_reloc, /* special_function */
3765b1be 868 "DTPMOD64", /* name */
0a1b45a2 869 false, /* partial_inplace */
3765b1be
RH
870 MINUS_ONE, /* src_mask */
871 MINUS_ONE, /* dst_mask */
0a1b45a2 872 false), /* pcrel_offset */
3765b1be
RH
873
874 /* Creates a 64-bit offset in the got for the displacement
875 from DTP to the target. */
876 HOWTO (R_ALPHA_GOTDTPREL, /* type */
877 0, /* rightshift */
878 1, /* size (0 = byte, 1 = short, 2 = long) */
879 16, /* bitsize */
0a1b45a2 880 false, /* pc_relative */
3765b1be
RH
881 0, /* bitpos */
882 complain_overflow_signed, /* complain_on_overflow */
bc1bc43f 883 bfd_elf_generic_reloc, /* special_function */
3765b1be 884 "GOTDTPREL", /* name */
0a1b45a2 885 false, /* partial_inplace */
3765b1be
RH
886 0xffff, /* src_mask */
887 0xffff, /* dst_mask */
0a1b45a2 888 false), /* pcrel_offset */
3765b1be
RH
889
890 /* A dynamic relocation for a displacement from DTP to the target. */
891 HOWTO (R_ALPHA_DTPREL64, /* type */
892 0, /* rightshift */
893 4, /* size (0 = byte, 1 = short, 2 = long) */
894 64, /* bitsize */
0a1b45a2 895 false, /* pc_relative */
3765b1be
RH
896 0, /* bitpos */
897 complain_overflow_bitfield, /* complain_on_overflow */
bc1bc43f 898 bfd_elf_generic_reloc, /* special_function */
3765b1be 899 "DTPREL64", /* name */
0a1b45a2 900 false, /* partial_inplace */
3765b1be
RH
901 MINUS_ONE, /* src_mask */
902 MINUS_ONE, /* dst_mask */
0a1b45a2 903 false), /* pcrel_offset */
3765b1be
RH
904
905 /* The high 16 bits of the displacement from DTP to the target. */
906 HOWTO (R_ALPHA_DTPRELHI, /* type */
907 0, /* rightshift */
908 1, /* size (0 = byte, 1 = short, 2 = long) */
909 16, /* bitsize */
0a1b45a2 910 false, /* pc_relative */
3765b1be
RH
911 0, /* bitpos */
912 complain_overflow_signed, /* complain_on_overflow */
bc1bc43f 913 bfd_elf_generic_reloc, /* special_function */
3765b1be 914 "DTPRELHI", /* name */
0a1b45a2 915 false, /* partial_inplace */
3765b1be
RH
916 0xffff, /* src_mask */
917 0xffff, /* dst_mask */
0a1b45a2 918 false), /* pcrel_offset */
3765b1be
RH
919
920 /* The low 16 bits of the displacement from DTP to the target. */
921 HOWTO (R_ALPHA_DTPRELLO, /* type */
922 0, /* rightshift */
923 1, /* size (0 = byte, 1 = short, 2 = long) */
924 16, /* bitsize */
0a1b45a2 925 false, /* pc_relative */
3765b1be
RH
926 0, /* bitpos */
927 complain_overflow_dont, /* complain_on_overflow */
bc1bc43f 928 bfd_elf_generic_reloc, /* special_function */
3765b1be 929 "DTPRELLO", /* name */
0a1b45a2 930 false, /* partial_inplace */
3765b1be
RH
931 0xffff, /* src_mask */
932 0xffff, /* dst_mask */
0a1b45a2 933 false), /* pcrel_offset */
3765b1be
RH
934
935 /* A 16-bit displacement from DTP to the target. */
936 HOWTO (R_ALPHA_DTPREL16, /* type */
937 0, /* rightshift */
938 1, /* size (0 = byte, 1 = short, 2 = long) */
939 16, /* bitsize */
0a1b45a2 940 false, /* pc_relative */
3765b1be
RH
941 0, /* bitpos */
942 complain_overflow_signed, /* complain_on_overflow */
bc1bc43f 943 bfd_elf_generic_reloc, /* special_function */
3765b1be 944 "DTPREL16", /* name */
0a1b45a2 945 false, /* partial_inplace */
3765b1be
RH
946 0xffff, /* src_mask */
947 0xffff, /* dst_mask */
0a1b45a2 948 false), /* pcrel_offset */
3765b1be
RH
949
950 /* Creates a 64-bit offset in the got for the displacement
951 from TP to the target. */
952 HOWTO (R_ALPHA_GOTTPREL, /* type */
953 0, /* rightshift */
954 1, /* size (0 = byte, 1 = short, 2 = long) */
955 16, /* bitsize */
0a1b45a2 956 false, /* pc_relative */
3765b1be
RH
957 0, /* bitpos */
958 complain_overflow_signed, /* complain_on_overflow */
bc1bc43f 959 bfd_elf_generic_reloc, /* special_function */
3765b1be 960 "GOTTPREL", /* name */
0a1b45a2 961 false, /* partial_inplace */
3765b1be
RH
962 0xffff, /* src_mask */
963 0xffff, /* dst_mask */
0a1b45a2 964 false), /* pcrel_offset */
3765b1be
RH
965
966 /* A dynamic relocation for a displacement from TP to the target. */
967 HOWTO (R_ALPHA_TPREL64, /* type */
968 0, /* rightshift */
969 4, /* size (0 = byte, 1 = short, 2 = long) */
970 64, /* bitsize */
0a1b45a2 971 false, /* pc_relative */
3765b1be
RH
972 0, /* bitpos */
973 complain_overflow_bitfield, /* complain_on_overflow */
bc1bc43f 974 bfd_elf_generic_reloc, /* special_function */
3765b1be 975 "TPREL64", /* name */
0a1b45a2 976 false, /* partial_inplace */
3765b1be
RH
977 MINUS_ONE, /* src_mask */
978 MINUS_ONE, /* dst_mask */
0a1b45a2 979 false), /* pcrel_offset */
3765b1be
RH
980
981 /* The high 16 bits of the displacement from TP to the target. */
982 HOWTO (R_ALPHA_TPRELHI, /* type */
983 0, /* rightshift */
984 1, /* size (0 = byte, 1 = short, 2 = long) */
985 16, /* bitsize */
0a1b45a2 986 false, /* pc_relative */
3765b1be
RH
987 0, /* bitpos */
988 complain_overflow_signed, /* complain_on_overflow */
bc1bc43f 989 bfd_elf_generic_reloc, /* special_function */
3765b1be 990 "TPRELHI", /* name */
0a1b45a2 991 false, /* partial_inplace */
3765b1be
RH
992 0xffff, /* src_mask */
993 0xffff, /* dst_mask */
0a1b45a2 994 false), /* pcrel_offset */
3765b1be
RH
995
996 /* The low 16 bits of the displacement from TP to the target. */
997 HOWTO (R_ALPHA_TPRELLO, /* type */
998 0, /* rightshift */
999 1, /* size (0 = byte, 1 = short, 2 = long) */
1000 16, /* bitsize */
0a1b45a2 1001 false, /* pc_relative */
3765b1be
RH
1002 0, /* bitpos */
1003 complain_overflow_dont, /* complain_on_overflow */
bc1bc43f 1004 bfd_elf_generic_reloc, /* special_function */
3765b1be 1005 "TPRELLO", /* name */
0a1b45a2 1006 false, /* partial_inplace */
3765b1be
RH
1007 0xffff, /* src_mask */
1008 0xffff, /* dst_mask */
0a1b45a2 1009 false), /* pcrel_offset */
3765b1be
RH
1010
1011 /* A 16-bit displacement from TP to the target. */
1012 HOWTO (R_ALPHA_TPREL16, /* type */
1013 0, /* rightshift */
1014 1, /* size (0 = byte, 1 = short, 2 = long) */
1015 16, /* bitsize */
0a1b45a2 1016 false, /* pc_relative */
3765b1be
RH
1017 0, /* bitpos */
1018 complain_overflow_signed, /* complain_on_overflow */
bc1bc43f 1019 bfd_elf_generic_reloc, /* special_function */
3765b1be 1020 "TPREL16", /* name */
0a1b45a2 1021 false, /* partial_inplace */
3765b1be
RH
1022 0xffff, /* src_mask */
1023 0xffff, /* dst_mask */
0a1b45a2 1024 false), /* pcrel_offset */
252b5132
RH
1025};
1026
252b5132
RH
1027/* A mapping from BFD reloc types to Alpha ELF reloc types. */
1028
1029struct elf_reloc_map
1030{
1031 bfd_reloc_code_real_type bfd_reloc_val;
1032 int elf_reloc_val;
1033};
1034
1035static const struct elf_reloc_map elf64_alpha_reloc_map[] =
1036{
dfe57ca0
RH
1037 {BFD_RELOC_NONE, R_ALPHA_NONE},
1038 {BFD_RELOC_32, R_ALPHA_REFLONG},
1039 {BFD_RELOC_64, R_ALPHA_REFQUAD},
1040 {BFD_RELOC_CTOR, R_ALPHA_REFQUAD},
1041 {BFD_RELOC_GPREL32, R_ALPHA_GPREL32},
1042 {BFD_RELOC_ALPHA_ELF_LITERAL, R_ALPHA_LITERAL},
1043 {BFD_RELOC_ALPHA_LITUSE, R_ALPHA_LITUSE},
1044 {BFD_RELOC_ALPHA_GPDISP, R_ALPHA_GPDISP},
1045 {BFD_RELOC_23_PCREL_S2, R_ALPHA_BRADDR},
1046 {BFD_RELOC_ALPHA_HINT, R_ALPHA_HINT},
1047 {BFD_RELOC_16_PCREL, R_ALPHA_SREL16},
1048 {BFD_RELOC_32_PCREL, R_ALPHA_SREL32},
1049 {BFD_RELOC_64_PCREL, R_ALPHA_SREL64},
1050 {BFD_RELOC_ALPHA_GPREL_HI16, R_ALPHA_GPRELHIGH},
1051 {BFD_RELOC_ALPHA_GPREL_LO16, R_ALPHA_GPRELLOW},
1052 {BFD_RELOC_GPREL16, R_ALPHA_GPREL16},
7793f4d0 1053 {BFD_RELOC_ALPHA_BRSGP, R_ALPHA_BRSGP},
3765b1be
RH
1054 {BFD_RELOC_ALPHA_TLSGD, R_ALPHA_TLSGD},
1055 {BFD_RELOC_ALPHA_TLSLDM, R_ALPHA_TLSLDM},
1056 {BFD_RELOC_ALPHA_DTPMOD64, R_ALPHA_DTPMOD64},
1057 {BFD_RELOC_ALPHA_GOTDTPREL16, R_ALPHA_GOTDTPREL},
1058 {BFD_RELOC_ALPHA_DTPREL64, R_ALPHA_DTPREL64},
1059 {BFD_RELOC_ALPHA_DTPREL_HI16, R_ALPHA_DTPRELHI},
1060 {BFD_RELOC_ALPHA_DTPREL_LO16, R_ALPHA_DTPRELLO},
1061 {BFD_RELOC_ALPHA_DTPREL16, R_ALPHA_DTPREL16},
1062 {BFD_RELOC_ALPHA_GOTTPREL16, R_ALPHA_GOTTPREL},
1063 {BFD_RELOC_ALPHA_TPREL64, R_ALPHA_TPREL64},
1064 {BFD_RELOC_ALPHA_TPREL_HI16, R_ALPHA_TPRELHI},
1065 {BFD_RELOC_ALPHA_TPREL_LO16, R_ALPHA_TPRELLO},
1066 {BFD_RELOC_ALPHA_TPREL16, R_ALPHA_TPREL16},
252b5132
RH
1067};
1068
1069/* Given a BFD reloc type, return a HOWTO structure. */
1070
1071static reloc_howto_type *
a7519a3c
RH
1072elf64_alpha_bfd_reloc_type_lookup (bfd *abfd ATTRIBUTE_UNUSED,
1073 bfd_reloc_code_real_type code)
252b5132
RH
1074{
1075 const struct elf_reloc_map *i, *e;
1076 i = e = elf64_alpha_reloc_map;
1077 e += sizeof (elf64_alpha_reloc_map) / sizeof (struct elf_reloc_map);
1078 for (; i != e; ++i)
1079 {
1080 if (i->bfd_reloc_val == code)
1081 return &elf64_alpha_howto_table[i->elf_reloc_val];
1082 }
1083 return 0;
1084}
1085
157090f7
AM
1086static reloc_howto_type *
1087elf64_alpha_bfd_reloc_name_lookup (bfd *abfd ATTRIBUTE_UNUSED,
1088 const char *r_name)
1089{
1090 unsigned int i;
1091
1092 for (i = 0;
1093 i < (sizeof (elf64_alpha_howto_table)
1094 / sizeof (elf64_alpha_howto_table[0]));
1095 i++)
1096 if (elf64_alpha_howto_table[i].name != NULL
1097 && strcasecmp (elf64_alpha_howto_table[i].name, r_name) == 0)
1098 return &elf64_alpha_howto_table[i];
1099
1100 return NULL;
1101}
1102
252b5132
RH
1103/* Given an Alpha ELF reloc type, fill in an arelent structure. */
1104
0a1b45a2 1105static bool
0aa13fee 1106elf64_alpha_info_to_howto (bfd *abfd, arelent *cache_ptr,
a7519a3c 1107 Elf_Internal_Rela *dst)
252b5132 1108{
a7519a3c 1109 unsigned r_type = ELF64_R_TYPE(dst->r_info);
cd21f5da
NC
1110
1111 if (r_type >= R_ALPHA_max)
1112 {
695344c0 1113 /* xgettext:c-format */
0aa13fee 1114 _bfd_error_handler (_("%pB: unsupported relocation type %#x"),
4eca0228 1115 abfd, r_type);
cd21f5da 1116 bfd_set_error (bfd_error_bad_value);
0a1b45a2 1117 return false;
cd21f5da 1118 }
252b5132 1119 cache_ptr->howto = &elf64_alpha_howto_table[r_type];
0a1b45a2 1120 return true;
252b5132 1121}
3765b1be
RH
1122
1123/* These two relocations create a two-word entry in the got. */
1124#define alpha_got_entry_size(r_type) \
1125 (r_type == R_ALPHA_TLSGD || r_type == R_ALPHA_TLSLDM ? 16 : 8)
9e756d64
RH
1126
1127/* This is PT_TLS segment p_vaddr. */
e1918d23
AM
1128#define alpha_get_dtprel_base(info) \
1129 (elf_hash_table (info)->tls_sec->vma)
9e756d64
RH
1130
1131/* Main program TLS (whose template starts at PT_TLS p_vaddr)
1132 is assigned offset round(16, PT_TLS p_align). */
e1918d23
AM
1133#define alpha_get_tprel_base(info) \
1134 (elf_hash_table (info)->tls_sec->vma \
1135 - align_power ((bfd_vma) 16, \
1136 elf_hash_table (info)->tls_sec->alignment_power))
252b5132 1137\f
a7519a3c
RH
1138/* Handle an Alpha specific section when reading an object file. This
1139 is called when bfd_section_from_shdr finds a section with an unknown
bf577467 1140 type. */
252b5132 1141
0a1b45a2 1142static bool
a7519a3c
RH
1143elf64_alpha_section_from_shdr (bfd *abfd,
1144 Elf_Internal_Shdr *hdr,
1145 const char *name,
1146 int shindex)
252b5132 1147{
a7519a3c
RH
1148 asection *newsect;
1149
1150 /* There ought to be a place to keep ELF backend specific flags, but
1151 at the moment there isn't one. We just keep track of the
1152 sections by their name, instead. Fortunately, the ABI gives
1153 suggested names for all the MIPS specific sections, so we will
1154 probably get away with this. */
1155 switch (hdr->sh_type)
1156 {
1157 case SHT_ALPHA_DEBUG:
1158 if (strcmp (name, ".mdebug") != 0)
0a1b45a2 1159 return false;
a7519a3c
RH
1160 break;
1161 default:
0a1b45a2 1162 return false;
a7519a3c 1163 }
252b5132 1164
a7519a3c 1165 if (! _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex))
0a1b45a2 1166 return false;
a7519a3c 1167 newsect = hdr->bfd_section;
252b5132 1168
a7519a3c 1169 if (hdr->sh_type == SHT_ALPHA_DEBUG)
252b5132 1170 {
fd361982
AM
1171 if (!bfd_set_section_flags (newsect,
1172 bfd_section_flags (newsect) | SEC_DEBUGGING))
0a1b45a2 1173 return false;
252b5132 1174 }
a7519a3c 1175
0a1b45a2 1176 return true;
252b5132
RH
1177}
1178
a7519a3c
RH
1179/* Convert Alpha specific section flags to bfd internal section flags. */
1180
0a1b45a2 1181static bool
8c803a2d 1182elf64_alpha_section_flags (const Elf_Internal_Shdr *hdr)
252b5132 1183{
a7519a3c 1184 if (hdr->sh_flags & SHF_ALPHA_GPREL)
8c803a2d 1185 hdr->bfd_section->flags |= SEC_SMALL_DATA;
252b5132 1186
0a1b45a2 1187 return true;
a7519a3c 1188}
252b5132 1189
a7519a3c
RH
1190/* Set the correct type for an Alpha ELF section. We do this by the
1191 section name, which is a hack, but ought to work. */
9e756d64 1192
0a1b45a2 1193static bool
a7519a3c
RH
1194elf64_alpha_fake_sections (bfd *abfd, Elf_Internal_Shdr *hdr, asection *sec)
1195{
1196 register const char *name;
1197
fd361982 1198 name = bfd_section_name (sec);
a7519a3c
RH
1199
1200 if (strcmp (name, ".mdebug") == 0)
252b5132 1201 {
a7519a3c
RH
1202 hdr->sh_type = SHT_ALPHA_DEBUG;
1203 /* In a shared object on Irix 5.3, the .mdebug section has an
07d6d2b8 1204 entsize of 0. FIXME: Does this matter? */
a7519a3c
RH
1205 if ((abfd->flags & DYNAMIC) != 0 )
1206 hdr->sh_entsize = 0;
1207 else
1208 hdr->sh_entsize = 1;
252b5132 1209 }
a7519a3c
RH
1210 else if ((sec->flags & SEC_SMALL_DATA)
1211 || strcmp (name, ".sdata") == 0
1212 || strcmp (name, ".sbss") == 0
1213 || strcmp (name, ".lit4") == 0
1214 || strcmp (name, ".lit8") == 0)
1215 hdr->sh_flags |= SHF_ALPHA_GPREL;
252b5132 1216
0a1b45a2 1217 return true;
a7519a3c 1218}
252b5132 1219
a7519a3c
RH
1220/* Hook called by the linker routine which adds symbols from an object
1221 file. We use it to put .comm items in .sbss, and not .bss. */
1222
0a1b45a2 1223static bool
a7519a3c
RH
1224elf64_alpha_add_symbol_hook (bfd *abfd, struct bfd_link_info *info,
1225 Elf_Internal_Sym *sym,
1226 const char **namep ATTRIBUTE_UNUSED,
1227 flagword *flagsp ATTRIBUTE_UNUSED,
1228 asection **secp, bfd_vma *valp)
1229{
1230 if (sym->st_shndx == SHN_COMMON
0e1862bb 1231 && !bfd_link_relocatable (info)
a7519a3c 1232 && sym->st_size <= elf_gp_size (abfd))
252b5132 1233 {
a7519a3c
RH
1234 /* Common symbols less than or equal to -G nn bytes are
1235 automatically put into .sbss. */
ffcb7aff 1236
a7519a3c 1237 asection *scomm = bfd_get_section_by_name (abfd, ".scommon");
252b5132 1238
a7519a3c 1239 if (scomm == NULL)
252b5132 1240 {
a7519a3c
RH
1241 scomm = bfd_make_section_with_flags (abfd, ".scommon",
1242 (SEC_ALLOC
1243 | SEC_IS_COMMON
10885e24 1244 | SEC_SMALL_DATA
a7519a3c
RH
1245 | SEC_LINKER_CREATED));
1246 if (scomm == NULL)
0a1b45a2 1247 return false;
a7519a3c 1248 }
ffcb7aff 1249
a7519a3c
RH
1250 *secp = scomm;
1251 *valp = sym->st_size;
1252 }
ffcb7aff 1253
0a1b45a2 1254 return true;
a7519a3c 1255}
252b5132 1256
a7519a3c 1257/* Create the .got section. */
252b5132 1258
0a1b45a2 1259static bool
a7519a3c
RH
1260elf64_alpha_create_got_section (bfd *abfd,
1261 struct bfd_link_info *info ATTRIBUTE_UNUSED)
1262{
85d162e6 1263 flagword flags;
a7519a3c 1264 asection *s;
252b5132 1265
0ffa91dd 1266 if (! is_alpha_elf (abfd))
0a1b45a2 1267 return false;
0ffa91dd 1268
85d162e6
AM
1269 flags = (SEC_ALLOC | SEC_LOAD | SEC_HAS_CONTENTS | SEC_IN_MEMORY
1270 | SEC_LINKER_CREATED);
1271 s = bfd_make_section_anyway_with_flags (abfd, ".got", flags);
a7519a3c 1272 if (s == NULL
fd361982 1273 || !bfd_set_section_alignment (s, 3))
0a1b45a2 1274 return false;
252b5132 1275
a7519a3c 1276 alpha_elf_tdata (abfd)->got = s;
252b5132 1277
85d162e6
AM
1278 /* Make sure the object's gotobj is set to itself so that we default
1279 to every object with its own .got. We'll merge .gots later once
1280 we've collected each object's info. */
1281 alpha_elf_tdata (abfd)->gotobj = abfd;
1282
0a1b45a2 1283 return true;
a7519a3c 1284}
252b5132 1285
a7519a3c 1286/* Create all the dynamic sections. */
252b5132 1287
0a1b45a2 1288static bool
a7519a3c
RH
1289elf64_alpha_create_dynamic_sections (bfd *abfd, struct bfd_link_info *info)
1290{
1291 asection *s;
85d162e6 1292 flagword flags;
a7519a3c 1293 struct elf_link_hash_entry *h;
252b5132 1294
0ffa91dd 1295 if (! is_alpha_elf (abfd))
0a1b45a2 1296 return false;
0ffa91dd 1297
a7519a3c 1298 /* We need to create .plt, .rela.plt, .got, and .rela.got sections. */
252b5132 1299
85d162e6
AM
1300 flags = (SEC_ALLOC | SEC_LOAD | SEC_CODE | SEC_HAS_CONTENTS | SEC_IN_MEMORY
1301 | SEC_LINKER_CREATED
1302 | (elf64_alpha_use_secureplt ? SEC_READONLY : 0));
1303 s = bfd_make_section_anyway_with_flags (abfd, ".plt", flags);
ce558b89 1304 elf_hash_table (info)->splt = s;
fd361982 1305 if (s == NULL || ! bfd_set_section_alignment (s, 4))
0a1b45a2 1306 return false;
252b5132 1307
a7519a3c
RH
1308 /* Define the symbol _PROCEDURE_LINKAGE_TABLE_ at the start of the
1309 .plt section. */
7325306f
RS
1310 h = _bfd_elf_define_linkage_sym (abfd, info, s,
1311 "_PROCEDURE_LINKAGE_TABLE_");
1312 elf_hash_table (info)->hplt = h;
1313 if (h == NULL)
0a1b45a2 1314 return false;
d6ad34f6 1315
85d162e6
AM
1316 flags = (SEC_ALLOC | SEC_LOAD | SEC_HAS_CONTENTS | SEC_IN_MEMORY
1317 | SEC_LINKER_CREATED | SEC_READONLY);
1318 s = bfd_make_section_anyway_with_flags (abfd, ".rela.plt", flags);
ce558b89 1319 elf_hash_table (info)->srelplt = s;
fd361982 1320 if (s == NULL || ! bfd_set_section_alignment (s, 3))
0a1b45a2 1321 return false;
252b5132 1322
6ec7057a
RH
1323 if (elf64_alpha_use_secureplt)
1324 {
85d162e6
AM
1325 flags = SEC_ALLOC | SEC_LINKER_CREATED;
1326 s = bfd_make_section_anyway_with_flags (abfd, ".got.plt", flags);
ce558b89 1327 elf_hash_table (info)->sgotplt = s;
fd361982 1328 if (s == NULL || ! bfd_set_section_alignment (s, 3))
0a1b45a2 1329 return false;
6ec7057a
RH
1330 }
1331
a7519a3c
RH
1332 /* We may or may not have created a .got section for this object, but
1333 we definitely havn't done the rest of the work. */
1cd6895c 1334
85d162e6
AM
1335 if (alpha_elf_tdata(abfd)->gotobj == NULL)
1336 {
1337 if (!elf64_alpha_create_got_section (abfd, info))
0a1b45a2 1338 return false;
85d162e6 1339 }
1cd6895c 1340
85d162e6
AM
1341 flags = (SEC_ALLOC | SEC_LOAD | SEC_HAS_CONTENTS | SEC_IN_MEMORY
1342 | SEC_LINKER_CREATED | SEC_READONLY);
1343 s = bfd_make_section_anyway_with_flags (abfd, ".rela.got", flags);
ce558b89 1344 elf_hash_table (info)->srelgot = s;
a7519a3c 1345 if (s == NULL
fd361982 1346 || !bfd_set_section_alignment (s, 3))
0a1b45a2 1347 return false;
252b5132 1348
a7519a3c
RH
1349 /* Define the symbol _GLOBAL_OFFSET_TABLE_ at the start of the
1350 dynobj's .got section. We don't do this in the linker script
1351 because we don't want to define the symbol if we are not creating
1352 a global offset table. */
d98685ac
AM
1353 h = _bfd_elf_define_linkage_sym (abfd, info, alpha_elf_tdata(abfd)->got,
1354 "_GLOBAL_OFFSET_TABLE_");
a7519a3c 1355 elf_hash_table (info)->hgot = h;
d98685ac 1356 if (h == NULL)
0a1b45a2 1357 return false;
252b5132 1358
0a1b45a2 1359 return true;
252b5132 1360}
a7519a3c
RH
1361\f
1362/* Read ECOFF debugging information from a .mdebug section into a
1363 ecoff_debug_info structure. */
252b5132 1364
0a1b45a2 1365static bool
a7519a3c
RH
1366elf64_alpha_read_ecoff_info (bfd *abfd, asection *section,
1367 struct ecoff_debug_info *debug)
252b5132 1368{
a7519a3c
RH
1369 HDRR *symhdr;
1370 const struct ecoff_debug_swap *swap;
1371 char *ext_hdr = NULL;
252b5132 1372
a7519a3c
RH
1373 swap = get_elf_backend_data (abfd)->elf_backend_ecoff_debug_swap;
1374 memset (debug, 0, sizeof (*debug));
252b5132 1375
a7519a3c
RH
1376 ext_hdr = (char *) bfd_malloc (swap->external_hdr_size);
1377 if (ext_hdr == NULL && swap->external_hdr_size != 0)
1378 goto error_return;
252b5132 1379
a7519a3c
RH
1380 if (! bfd_get_section_contents (abfd, section, ext_hdr, (file_ptr) 0,
1381 swap->external_hdr_size))
1382 goto error_return;
252b5132 1383
a7519a3c
RH
1384 symhdr = &debug->symbolic_header;
1385 (*swap->swap_hdr_in) (abfd, ext_hdr, symhdr);
252b5132 1386
a7519a3c
RH
1387 /* The symbolic header contains absolute file offsets and sizes to
1388 read. */
1389#define READ(ptr, offset, count, size, type) \
1f4361a7 1390 do \
a7519a3c 1391 { \
1f4361a7
AM
1392 size_t amt; \
1393 debug->ptr = NULL; \
1394 if (symhdr->count == 0) \
1395 break; \
1396 if (_bfd_mul_overflow (size, symhdr->count, &amt)) \
1397 { \
1398 bfd_set_error (bfd_error_file_too_big); \
1399 goto error_return; \
1400 } \
2bb3687b 1401 if (bfd_seek (abfd, symhdr->offset, SEEK_SET) != 0) \
a7519a3c 1402 goto error_return; \
2bb3687b
AM
1403 debug->ptr = (type) _bfd_malloc_and_read (abfd, amt, amt); \
1404 if (debug->ptr == NULL) \
a7519a3c 1405 goto error_return; \
1f4361a7 1406 } while (0)
fe8bc63d 1407
a7519a3c 1408 READ (line, cbLineOffset, cbLine, sizeof (unsigned char), unsigned char *);
2c3fc389
NC
1409 READ (external_dnr, cbDnOffset, idnMax, swap->external_dnr_size, void *);
1410 READ (external_pdr, cbPdOffset, ipdMax, swap->external_pdr_size, void *);
1411 READ (external_sym, cbSymOffset, isymMax, swap->external_sym_size, void *);
1412 READ (external_opt, cbOptOffset, ioptMax, swap->external_opt_size, void *);
a7519a3c
RH
1413 READ (external_aux, cbAuxOffset, iauxMax, sizeof (union aux_ext),
1414 union aux_ext *);
1415 READ (ss, cbSsOffset, issMax, sizeof (char), char *);
1416 READ (ssext, cbSsExtOffset, issExtMax, sizeof (char), char *);
2c3fc389
NC
1417 READ (external_fdr, cbFdOffset, ifdMax, swap->external_fdr_size, void *);
1418 READ (external_rfd, cbRfdOffset, crfd, swap->external_rfd_size, void *);
1419 READ (external_ext, cbExtOffset, iextMax, swap->external_ext_size, void *);
a7519a3c 1420#undef READ
252b5132 1421
a7519a3c 1422 debug->fdr = NULL;
252b5132 1423
0a1b45a2 1424 return true;
252b5132 1425
a7519a3c 1426 error_return:
c9594989
AM
1427 free (ext_hdr);
1428 free (debug->line);
1429 free (debug->external_dnr);
1430 free (debug->external_pdr);
1431 free (debug->external_sym);
1432 free (debug->external_opt);
1433 free (debug->external_aux);
1434 free (debug->ss);
1435 free (debug->ssext);
1436 free (debug->external_fdr);
1437 free (debug->external_rfd);
1438 free (debug->external_ext);
0a1b45a2 1439 return false;
252b5132
RH
1440}
1441
a7519a3c
RH
1442/* Alpha ELF local labels start with '$'. */
1443
0a1b45a2 1444static bool
a7519a3c 1445elf64_alpha_is_local_label_name (bfd *abfd ATTRIBUTE_UNUSED, const char *name)
252b5132 1446{
a7519a3c
RH
1447 return name[0] == '$';
1448}
9e756d64 1449
0a1b45a2 1450static bool
fb167eb2
AM
1451elf64_alpha_find_nearest_line (bfd *abfd, asymbol **symbols,
1452 asection *section, bfd_vma offset,
1453 const char **filename_ptr,
a7519a3c 1454 const char **functionname_ptr,
fb167eb2
AM
1455 unsigned int *line_ptr,
1456 unsigned int *discriminator_ptr)
a7519a3c
RH
1457{
1458 asection *msec;
252b5132 1459
fb167eb2 1460 if (_bfd_dwarf2_find_nearest_line (abfd, symbols, NULL, section, offset,
a7519a3c 1461 filename_ptr, functionname_ptr,
fb167eb2 1462 line_ptr, discriminator_ptr,
9defd221 1463 dwarf_debug_sections,
7f3bf384
AM
1464 &elf_tdata (abfd)->dwarf2_find_line_info)
1465 == 1)
0a1b45a2 1466 return true;
9e756d64 1467
a7519a3c
RH
1468 msec = bfd_get_section_by_name (abfd, ".mdebug");
1469 if (msec != NULL)
1bbc9cec 1470 {
a7519a3c 1471 flagword origflags;
698600e4 1472 struct alpha_elf_find_line *fi;
a7519a3c
RH
1473 const struct ecoff_debug_swap * const swap =
1474 get_elf_backend_data (abfd)->elf_backend_ecoff_debug_swap;
252b5132 1475
a7519a3c
RH
1476 /* If we are called during a link, alpha_elf_final_link may have
1477 cleared the SEC_HAS_CONTENTS field. We force it back on here
1478 if appropriate (which it normally will be). */
1479 origflags = msec->flags;
1480 if (elf_section_data (msec)->this_hdr.sh_type != SHT_NOBITS)
1481 msec->flags |= SEC_HAS_CONTENTS;
9e756d64 1482
698600e4 1483 fi = alpha_elf_tdata (abfd)->find_line_info;
a7519a3c
RH
1484 if (fi == NULL)
1485 {
1486 bfd_size_type external_fdr_size;
1487 char *fraw_src;
1488 char *fraw_end;
1489 struct fdr *fdr_ptr;
698600e4 1490 bfd_size_type amt = sizeof (struct alpha_elf_find_line);
9e756d64 1491
698600e4 1492 fi = (struct alpha_elf_find_line *) bfd_zalloc (abfd, amt);
a7519a3c
RH
1493 if (fi == NULL)
1494 {
1495 msec->flags = origflags;
0a1b45a2 1496 return false;
a7519a3c 1497 }
9e756d64 1498
a7519a3c
RH
1499 if (!elf64_alpha_read_ecoff_info (abfd, msec, &fi->d))
1500 {
1501 msec->flags = origflags;
0a1b45a2 1502 return false;
a7519a3c 1503 }
9e756d64 1504
a7519a3c
RH
1505 /* Swap in the FDR information. */
1506 amt = fi->d.symbolic_header.ifdMax * sizeof (struct fdr);
1507 fi->d.fdr = (struct fdr *) bfd_alloc (abfd, amt);
1508 if (fi->d.fdr == NULL)
1509 {
1510 msec->flags = origflags;
0a1b45a2 1511 return false;
a7519a3c
RH
1512 }
1513 external_fdr_size = swap->external_fdr_size;
1514 fdr_ptr = fi->d.fdr;
1515 fraw_src = (char *) fi->d.external_fdr;
1516 fraw_end = (fraw_src
1517 + fi->d.symbolic_header.ifdMax * external_fdr_size);
1518 for (; fraw_src < fraw_end; fraw_src += external_fdr_size, fdr_ptr++)
2c3fc389 1519 (*swap->swap_fdr_in) (abfd, fraw_src, fdr_ptr);
9e756d64 1520
698600e4 1521 alpha_elf_tdata (abfd)->find_line_info = fi;
9e756d64 1522
a7519a3c 1523 /* Note that we don't bother to ever free this information.
07d6d2b8
AM
1524 find_nearest_line is either called all the time, as in
1525 objdump -l, so the information should be saved, or it is
1526 rarely called, as in ld error messages, so the memory
1527 wasted is unimportant. Still, it would probably be a
1528 good idea for free_cached_info to throw it away. */
a7519a3c 1529 }
9e756d64 1530
a7519a3c
RH
1531 if (_bfd_ecoff_locate_line (abfd, section, offset, &fi->d, swap,
1532 &fi->i, filename_ptr, functionname_ptr,
1533 line_ptr))
1534 {
1535 msec->flags = origflags;
0a1b45a2 1536 return true;
a7519a3c 1537 }
9e756d64 1538
a7519a3c 1539 msec->flags = origflags;
9e756d64 1540 }
9e756d64 1541
a7519a3c 1542 /* Fall back on the generic ELF find_nearest_line routine. */
9e756d64 1543
fb167eb2 1544 return _bfd_elf_find_nearest_line (abfd, symbols, section, offset,
a7519a3c 1545 filename_ptr, functionname_ptr,
fb167eb2 1546 line_ptr, discriminator_ptr);
9e756d64 1547}
a7519a3c
RH
1548\f
1549/* Structure used to pass information to alpha_elf_output_extsym. */
9e756d64 1550
a7519a3c 1551struct extsym_info
9e756d64 1552{
a7519a3c
RH
1553 bfd *abfd;
1554 struct bfd_link_info *info;
1555 struct ecoff_debug_info *debug;
1556 const struct ecoff_debug_swap *swap;
0a1b45a2 1557 bool failed;
a7519a3c 1558};
9e756d64 1559
0a1b45a2 1560static bool
2cc15b10 1561elf64_alpha_output_extsym (struct elf_link_hash_entry *x, void * data)
a7519a3c 1562{
2cc15b10 1563 struct alpha_elf_link_hash_entry *h = (struct alpha_elf_link_hash_entry *) x;
a7519a3c 1564 struct extsym_info *einfo = (struct extsym_info *) data;
0a1b45a2 1565 bool strip;
a7519a3c 1566 asection *sec, *output_section;
9e756d64 1567
a7519a3c 1568 if (h->root.indx == -2)
0a1b45a2 1569 strip = false;
a7519a3c
RH
1570 else if ((h->root.def_dynamic
1571 || h->root.ref_dynamic
1572 || h->root.root.type == bfd_link_hash_new)
1573 && !h->root.def_regular
1574 && !h->root.ref_regular)
0a1b45a2 1575 strip = true;
a7519a3c
RH
1576 else if (einfo->info->strip == strip_all
1577 || (einfo->info->strip == strip_some
1578 && bfd_hash_lookup (einfo->info->keep_hash,
1579 h->root.root.root.string,
0a1b45a2
AM
1580 false, false) == NULL))
1581 strip = true;
a7519a3c 1582 else
0a1b45a2 1583 strip = false;
9e756d64 1584
a7519a3c 1585 if (strip)
0a1b45a2 1586 return true;
9e756d64 1587
a7519a3c 1588 if (h->esym.ifd == -2)
9e756d64 1589 {
a7519a3c
RH
1590 h->esym.jmptbl = 0;
1591 h->esym.cobol_main = 0;
1592 h->esym.weakext = 0;
1593 h->esym.reserved = 0;
1594 h->esym.ifd = ifdNil;
1595 h->esym.asym.value = 0;
1596 h->esym.asym.st = stGlobal;
9e756d64 1597
a7519a3c
RH
1598 if (h->root.root.type != bfd_link_hash_defined
1599 && h->root.root.type != bfd_link_hash_defweak)
1600 h->esym.asym.sc = scAbs;
1601 else
1602 {
1603 const char *name;
9e756d64 1604
a7519a3c
RH
1605 sec = h->root.root.u.def.section;
1606 output_section = sec->output_section;
9e756d64 1607
a7519a3c
RH
1608 /* When making a shared library and symbol h is the one from
1609 the another shared library, OUTPUT_SECTION may be null. */
1610 if (output_section == NULL)
1611 h->esym.asym.sc = scUndefined;
1612 else
1613 {
fd361982 1614 name = bfd_section_name (output_section);
9e756d64 1615
a7519a3c
RH
1616 if (strcmp (name, ".text") == 0)
1617 h->esym.asym.sc = scText;
1618 else if (strcmp (name, ".data") == 0)
1619 h->esym.asym.sc = scData;
1620 else if (strcmp (name, ".sdata") == 0)
1621 h->esym.asym.sc = scSData;
1622 else if (strcmp (name, ".rodata") == 0
1623 || strcmp (name, ".rdata") == 0)
1624 h->esym.asym.sc = scRData;
1625 else if (strcmp (name, ".bss") == 0)
1626 h->esym.asym.sc = scBss;
1627 else if (strcmp (name, ".sbss") == 0)
1628 h->esym.asym.sc = scSBss;
1629 else if (strcmp (name, ".init") == 0)
1630 h->esym.asym.sc = scInit;
1631 else if (strcmp (name, ".fini") == 0)
1632 h->esym.asym.sc = scFini;
1633 else
1634 h->esym.asym.sc = scAbs;
1635 }
1636 }
9e756d64 1637
a7519a3c
RH
1638 h->esym.asym.reserved = 0;
1639 h->esym.asym.index = indexNil;
1640 }
9e756d64 1641
a7519a3c
RH
1642 if (h->root.root.type == bfd_link_hash_common)
1643 h->esym.asym.value = h->root.root.u.c.size;
1644 else if (h->root.root.type == bfd_link_hash_defined
1645 || h->root.root.type == bfd_link_hash_defweak)
1646 {
1647 if (h->esym.asym.sc == scCommon)
1648 h->esym.asym.sc = scBss;
1649 else if (h->esym.asym.sc == scSCommon)
1650 h->esym.asym.sc = scSBss;
9e756d64 1651
a7519a3c
RH
1652 sec = h->root.root.u.def.section;
1653 output_section = sec->output_section;
1654 if (output_section != NULL)
1655 h->esym.asym.value = (h->root.root.u.def.value
1656 + sec->output_offset
1657 + output_section->vma);
1658 else
1659 h->esym.asym.value = 0;
1660 }
9e756d64 1661
a7519a3c
RH
1662 if (! bfd_ecoff_debug_one_external (einfo->abfd, einfo->debug, einfo->swap,
1663 h->root.root.root.string,
1664 &h->esym))
1665 {
0a1b45a2
AM
1666 einfo->failed = true;
1667 return false;
9e756d64
RH
1668 }
1669
0a1b45a2 1670 return true;
a7519a3c
RH
1671}
1672\f
1673/* Search for and possibly create a got entry. */
9e756d64 1674
a7519a3c
RH
1675static struct alpha_elf_got_entry *
1676get_got_entry (bfd *abfd, struct alpha_elf_link_hash_entry *h,
1677 unsigned long r_type, unsigned long r_symndx,
1678 bfd_vma r_addend)
1679{
1680 struct alpha_elf_got_entry *gotent;
1681 struct alpha_elf_got_entry **slot;
9e756d64 1682
a7519a3c
RH
1683 if (h)
1684 slot = &h->got_entries;
1685 else
1686 {
1687 /* This is a local .got entry -- record for merge. */
9e756d64 1688
a7519a3c 1689 struct alpha_elf_got_entry **local_got_entries;
9e756d64 1690
a7519a3c
RH
1691 local_got_entries = alpha_elf_tdata(abfd)->local_got_entries;
1692 if (!local_got_entries)
1693 {
1694 bfd_size_type size;
1695 Elf_Internal_Shdr *symtab_hdr;
9e756d64 1696
a7519a3c
RH
1697 symtab_hdr = &elf_tdata(abfd)->symtab_hdr;
1698 size = symtab_hdr->sh_info;
1699 size *= sizeof (struct alpha_elf_got_entry *);
9e756d64 1700
a7519a3c
RH
1701 local_got_entries
1702 = (struct alpha_elf_got_entry **) bfd_zalloc (abfd, size);
1703 if (!local_got_entries)
1704 return NULL;
1705
1706 alpha_elf_tdata (abfd)->local_got_entries = local_got_entries;
1707 }
1708
1709 slot = &local_got_entries[r_symndx];
9e756d64
RH
1710 }
1711
a7519a3c
RH
1712 for (gotent = *slot; gotent ; gotent = gotent->next)
1713 if (gotent->gotobj == abfd
1714 && gotent->reloc_type == r_type
1715 && gotent->addend == r_addend)
1716 break;
1717
1718 if (!gotent)
9e756d64 1719 {
a7519a3c 1720 int entry_size;
986f0783 1721 size_t amt;
9e756d64 1722
a7519a3c
RH
1723 amt = sizeof (struct alpha_elf_got_entry);
1724 gotent = (struct alpha_elf_got_entry *) bfd_alloc (abfd, amt);
1725 if (!gotent)
1726 return NULL;
9e756d64 1727
a7519a3c
RH
1728 gotent->gotobj = abfd;
1729 gotent->addend = r_addend;
1730 gotent->got_offset = -1;
6ec7057a 1731 gotent->plt_offset = -1;
a7519a3c
RH
1732 gotent->use_count = 1;
1733 gotent->reloc_type = r_type;
1734 gotent->reloc_done = 0;
1735 gotent->reloc_xlated = 0;
9e756d64 1736
a7519a3c
RH
1737 gotent->next = *slot;
1738 *slot = gotent;
9e756d64 1739
a7519a3c
RH
1740 entry_size = alpha_got_entry_size (r_type);
1741 alpha_elf_tdata (abfd)->total_got_size += entry_size;
1742 if (!h)
1743 alpha_elf_tdata(abfd)->local_got_size += entry_size;
9e756d64 1744 }
a7519a3c
RH
1745 else
1746 gotent->use_count += 1;
9e756d64 1747
a7519a3c 1748 return gotent;
9e756d64
RH
1749}
1750
0a1b45a2 1751static bool
6ec7057a
RH
1752elf64_alpha_want_plt (struct alpha_elf_link_hash_entry *ah)
1753{
1754 return ((ah->root.type == STT_FUNC
1755 || ah->root.root.type == bfd_link_hash_undefweak
1756 || ah->root.root.type == bfd_link_hash_undefined)
8288a39e
RH
1757 && (ah->flags & ALPHA_ELF_LINK_HASH_LU_PLT) != 0
1758 && (ah->flags & ~ALPHA_ELF_LINK_HASH_LU_PLT) == 0);
6ec7057a
RH
1759}
1760
6fc5bb57
AM
1761/* Whether to sort relocs output by ld -r or ld --emit-relocs, by r_offset.
1762 Don't do so for code sections. We want to keep ordering of LITERAL/LITUSE
1763 as is. On the other hand, elf-eh-frame.c processing requires .eh_frame
1764 relocs to be sorted. */
1765
0a1b45a2 1766static bool
6fc5bb57
AM
1767elf64_alpha_sort_relocs_p (asection *sec)
1768{
1769 return (sec->flags & SEC_CODE) == 0;
1770}
1771
1772
a7519a3c
RH
1773/* Handle dynamic relocations when doing an Alpha ELF link. */
1774
0a1b45a2 1775static bool
a7519a3c
RH
1776elf64_alpha_check_relocs (bfd *abfd, struct bfd_link_info *info,
1777 asection *sec, const Elf_Internal_Rela *relocs)
252b5132 1778{
a7519a3c
RH
1779 bfd *dynobj;
1780 asection *sreloc;
252b5132 1781 Elf_Internal_Shdr *symtab_hdr;
a7519a3c
RH
1782 struct alpha_elf_link_hash_entry **sym_hashes;
1783 const Elf_Internal_Rela *rel, *relend;
252b5132 1784
0e1862bb 1785 if (bfd_link_relocatable (info))
0a1b45a2 1786 return true;
252b5132 1787
0ffa91dd
NC
1788 BFD_ASSERT (is_alpha_elf (abfd));
1789
1790 dynobj = elf_hash_table (info)->dynobj;
a7519a3c 1791 if (dynobj == NULL)
0ffa91dd 1792 elf_hash_table (info)->dynobj = dynobj = abfd;
252b5132 1793
a7519a3c 1794 sreloc = NULL;
0ffa91dd
NC
1795 symtab_hdr = &elf_symtab_hdr (abfd);
1796 sym_hashes = alpha_elf_sym_hashes (abfd);
a7519a3c
RH
1797
1798 relend = relocs + sec->reloc_count;
1799 for (rel = relocs; rel < relend; ++rel)
1800 {
1801 enum {
1802 NEED_GOT = 1,
1803 NEED_GOT_ENTRY = 2,
1804 NEED_DYNREL = 4
1805 };
1806
1807 unsigned long r_symndx, r_type;
1808 struct alpha_elf_link_hash_entry *h;
1809 unsigned int gotent_flags;
0a1b45a2 1810 bool maybe_dynamic;
a7519a3c
RH
1811 unsigned int need;
1812 bfd_vma addend;
1813
1814 r_symndx = ELF64_R_SYM (rel->r_info);
1815 if (r_symndx < symtab_hdr->sh_info)
1816 h = NULL;
1817 else
1818 {
1819 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
252b5132 1820
a7519a3c
RH
1821 while (h->root.root.type == bfd_link_hash_indirect
1822 || h->root.root.type == bfd_link_hash_warning)
1823 h = (struct alpha_elf_link_hash_entry *)h->root.root.u.i.link;
252b5132 1824
81fbe831
AM
1825 /* PR15323, ref flags aren't set for references in the same
1826 object. */
a7519a3c
RH
1827 h->root.ref_regular = 1;
1828 }
252b5132 1829
a7519a3c 1830 /* We can only get preliminary data on whether a symbol is
07d6d2b8
AM
1831 locally or externally defined, as not all of the input files
1832 have yet been processed. Do something with what we know, as
1833 this may help reduce memory usage and processing time later. */
0a1b45a2 1834 maybe_dynamic = false;
0e1862bb 1835 if (h && ((bfd_link_pic (info)
a7519a3c
RH
1836 && (!info->symbolic
1837 || info->unresolved_syms_in_shared_libs == RM_IGNORE))
1838 || !h->root.def_regular
1839 || h->root.root.type == bfd_link_hash_defweak))
0a1b45a2 1840 maybe_dynamic = true;
252b5132 1841
a7519a3c
RH
1842 need = 0;
1843 gotent_flags = 0;
1844 r_type = ELF64_R_TYPE (rel->r_info);
1845 addend = rel->r_addend;
9e756d64 1846
9e756d64
RH
1847 switch (r_type)
1848 {
1849 case R_ALPHA_LITERAL:
a7519a3c
RH
1850 need = NEED_GOT | NEED_GOT_ENTRY;
1851
1852 /* Remember how this literal is used from its LITUSEs.
1853 This will be important when it comes to decide if we can
1854 create a .plt entry for a function symbol. */
1855 while (++rel < relend && ELF64_R_TYPE (rel->r_info) == R_ALPHA_LITUSE)
8288a39e 1856 if (rel->r_addend >= 1 && rel->r_addend <= 6)
a7519a3c
RH
1857 gotent_flags |= 1 << rel->r_addend;
1858 --rel;
1859
1860 /* No LITUSEs -- presumably the address is used somehow. */
1861 if (gotent_flags == 0)
1862 gotent_flags = ALPHA_ELF_LINK_HASH_LU_ADDR;
1863 break;
1864
1865 case R_ALPHA_GPDISP:
1866 case R_ALPHA_GPREL16:
1867 case R_ALPHA_GPREL32:
9e756d64
RH
1868 case R_ALPHA_GPRELHIGH:
1869 case R_ALPHA_GPRELLOW:
a7519a3c
RH
1870 case R_ALPHA_BRSGP:
1871 need = NEED_GOT;
1872 break;
1873
1874 case R_ALPHA_REFLONG:
1875 case R_ALPHA_REFQUAD:
0e1862bb 1876 if (bfd_link_pic (info) || maybe_dynamic)
a7519a3c 1877 need = NEED_DYNREL;
cc03ec80
RH
1878 break;
1879
9e756d64 1880 case R_ALPHA_TLSLDM:
cc03ec80 1881 /* The symbol for a TLSLDM reloc is ignored. Collapse the
cf35638d
TS
1882 reloc to the STN_UNDEF (0) symbol so that they all match. */
1883 r_symndx = STN_UNDEF;
a7519a3c 1884 h = 0;
0a1b45a2 1885 maybe_dynamic = false;
a7519a3c
RH
1886 /* FALLTHRU */
1887
1888 case R_ALPHA_TLSGD:
1889 case R_ALPHA_GOTDTPREL:
1890 need = NEED_GOT | NEED_GOT_ENTRY;
9e756d64 1891 break;
cc03ec80 1892
a7519a3c
RH
1893 case R_ALPHA_GOTTPREL:
1894 need = NEED_GOT | NEED_GOT_ENTRY;
1895 gotent_flags = ALPHA_ELF_LINK_HASH_TLS_IE;
0e1862bb 1896 if (bfd_link_pic (info))
a7519a3c
RH
1897 info->flags |= DF_STATIC_TLS;
1898 break;
1899
1900 case R_ALPHA_TPREL64:
3cbc1e5e 1901 if (bfd_link_dll (info))
e366eeae
RH
1902 {
1903 info->flags |= DF_STATIC_TLS;
1904 need = NEED_DYNREL;
1905 }
1906 else if (maybe_dynamic)
a7519a3c 1907 need = NEED_DYNREL;
a7519a3c 1908 break;
252b5132
RH
1909 }
1910
a7519a3c 1911 if (need & NEED_GOT)
252b5132 1912 {
85d162e6 1913 if (alpha_elf_tdata(abfd)->gotobj == NULL)
6cdc0ccc 1914 {
a7519a3c 1915 if (!elf64_alpha_create_got_section (abfd, info))
0a1b45a2 1916 return false;
c328dc3f 1917 }
252b5132 1918 }
252b5132 1919
a7519a3c
RH
1920 if (need & NEED_GOT_ENTRY)
1921 {
1922 struct alpha_elf_got_entry *gotent;
252b5132 1923
a7519a3c
RH
1924 gotent = get_got_entry (abfd, h, r_type, r_symndx, addend);
1925 if (!gotent)
0a1b45a2 1926 return false;
4a67a098 1927
a7519a3c 1928 if (gotent_flags)
cc03ec80 1929 {
a7519a3c
RH
1930 gotent->flags |= gotent_flags;
1931 if (h)
1932 {
1933 gotent_flags |= h->flags;
1934 h->flags = gotent_flags;
4a67a098 1935
a7519a3c 1936 /* Make a guess as to whether a .plt entry is needed. */
6ec7057a
RH
1937 /* ??? It appears that we won't make it into
1938 adjust_dynamic_symbol for symbols that remain
1939 totally undefined. Copying this check here means
1940 we can create a plt entry for them too. */
1941 h->root.needs_plt
1942 = (maybe_dynamic && elf64_alpha_want_plt (h));
1943 }
a7519a3c 1944 }
252b5132
RH
1945 }
1946
a7519a3c 1947 if (need & NEED_DYNREL)
9e756d64 1948 {
a7519a3c
RH
1949 /* We need to create the section here now whether we eventually
1950 use it or not so that it gets mapped to an output section by
83bac4b0 1951 the linker. If not used, we'll kill it in size_dynamic_sections. */
a7519a3c 1952 if (sreloc == NULL)
9e756d64 1953 {
83bac4b0 1954 sreloc = _bfd_elf_make_dynamic_reloc_section
0a1b45a2 1955 (sec, dynobj, 3, abfd, /*rela?*/ true);
83bac4b0 1956
a7519a3c 1957 if (sreloc == NULL)
0a1b45a2 1958 return false;
9e756d64 1959 }
252b5132 1960
a7519a3c
RH
1961 if (h)
1962 {
1963 /* Since we havn't seen all of the input symbols yet, we
1964 don't know whether we'll actually need a dynamic relocation
1965 entry for this reloc. So make a record of it. Once we
1966 find out if this thing needs dynamic relocation we'll
1967 expand the relocation sections by the appropriate amount. */
9e756d64 1968
a7519a3c 1969 struct alpha_elf_reloc_entry *rent;
9e756d64 1970
a7519a3c
RH
1971 for (rent = h->reloc_entries; rent; rent = rent->next)
1972 if (rent->rtype == r_type && rent->srel == sreloc)
1973 break;
252b5132 1974
a7519a3c
RH
1975 if (!rent)
1976 {
986f0783 1977 size_t amt = sizeof (struct alpha_elf_reloc_entry);
a7519a3c
RH
1978 rent = (struct alpha_elf_reloc_entry *) bfd_alloc (abfd, amt);
1979 if (!rent)
0a1b45a2 1980 return false;
252b5132 1981
a7519a3c 1982 rent->srel = sreloc;
1f7f2abb 1983 rent->sec = sec;
a7519a3c
RH
1984 rent->rtype = r_type;
1985 rent->count = 1;
252b5132 1986
a7519a3c
RH
1987 rent->next = h->reloc_entries;
1988 h->reloc_entries = rent;
1989 }
1990 else
1991 rent->count++;
1992 }
0e1862bb 1993 else if (bfd_link_pic (info))
a7519a3c
RH
1994 {
1995 /* If this is a shared library, and the section is to be
1996 loaded into memory, we need a RELATIVE reloc. */
1997 sreloc->size += sizeof (Elf64_External_Rela);
1998 if (sec->flags & SEC_READONLY)
1f7f2abb
L
1999 {
2000 info->flags |= DF_TEXTREL;
2001 info->callbacks->minfo
2002 (_("%pB: dynamic relocation against `%pT' in "
2003 "read-only section `%pA'\n"),
2004 sec->owner, h->root.root.root.string, sec);
2005 }
a7519a3c 2006 }
252b5132
RH
2007 }
2008 }
2009
0a1b45a2 2010 return true;
252b5132 2011}
252b5132 2012
e117360e
RH
2013/* Return the section that should be marked against GC for a given
2014 relocation. */
2015
2016static asection *
2017elf64_alpha_gc_mark_hook (asection *sec, struct bfd_link_info *info,
2018 Elf_Internal_Rela *rel,
2019 struct elf_link_hash_entry *h, Elf_Internal_Sym *sym)
2020{
2021 /* These relocations don't really reference a symbol. Instead we store
2022 extra data in their addend slot. Ignore the symbol. */
2023 switch (ELF64_R_TYPE (rel->r_info))
2024 {
2025 case R_ALPHA_LITUSE:
2026 case R_ALPHA_GPDISP:
2027 case R_ALPHA_HINT:
2028 return NULL;
2029 }
2030
2031 return _bfd_elf_gc_mark_hook (sec, info, rel, h, sym);
2032}
2033
a7519a3c
RH
2034/* Adjust a symbol defined by a dynamic object and referenced by a
2035 regular object. The current definition is in some section of the
2036 dynamic object, but we're not including those sections. We have to
2037 change the definition to something the rest of the link can
2038 understand. */
252b5132 2039
0a1b45a2 2040static bool
a7519a3c
RH
2041elf64_alpha_adjust_dynamic_symbol (struct bfd_link_info *info,
2042 struct elf_link_hash_entry *h)
252b5132 2043{
a7519a3c
RH
2044 bfd *dynobj;
2045 asection *s;
2046 struct alpha_elf_link_hash_entry *ah;
252b5132 2047
a7519a3c
RH
2048 dynobj = elf_hash_table(info)->dynobj;
2049 ah = (struct alpha_elf_link_hash_entry *)h;
252b5132 2050
a7519a3c 2051 /* Now that we've seen all of the input symbols, finalize our decision
6ec7057a
RH
2052 about whether this symbol should get a .plt entry. Irritatingly, it
2053 is common for folk to leave undefined symbols in shared libraries,
2054 and they still expect lazy binding; accept undefined symbols in lieu
2055 of STT_FUNC. */
2056 if (alpha_elf_dynamic_symbol_p (h, info) && elf64_alpha_want_plt (ah))
252b5132 2057 {
0a1b45a2 2058 h->needs_plt = true;
252b5132 2059
ce558b89 2060 s = elf_hash_table(info)->splt;
a7519a3c 2061 if (!s && !elf64_alpha_create_dynamic_sections (dynobj, info))
0a1b45a2 2062 return false;
204692d7 2063
6ec7057a
RH
2064 /* We need one plt entry per got subsection. Delay allocation of
2065 the actual plt entries until size_plt_section, called from
2066 size_dynamic_sections or during relaxation. */
252b5132 2067
0a1b45a2 2068 return true;
a7519a3c
RH
2069 }
2070 else
0a1b45a2 2071 h->needs_plt = false;
252b5132 2072
a7519a3c
RH
2073 /* If this is a weak symbol, and there is a real definition, the
2074 processor independent code will have arranged for us to see the
2075 real definition first, and we can just use the same value. */
60d67dc8 2076 if (h->is_weakalias)
252b5132 2077 {
60d67dc8
AM
2078 struct elf_link_hash_entry *def = weakdef (h);
2079 BFD_ASSERT (def->root.type == bfd_link_hash_defined);
2080 h->root.u.def.section = def->root.u.def.section;
2081 h->root.u.def.value = def->root.u.def.value;
0a1b45a2 2082 return true;
252b5132 2083 }
a7519a3c
RH
2084
2085 /* This is a reference to a symbol defined by a dynamic object which
2086 is not a function. The Alpha, since it uses .got entries for all
2087 symbols even in regular objects, does not need the hackery of a
2088 .dynbss section and COPY dynamic relocations. */
252b5132 2089
0a1b45a2 2090 return true;
252b5132
RH
2091}
2092
747ffa7b
AM
2093/* Record STO_ALPHA_NOPV and STO_ALPHA_STD_GPLOAD. */
2094
2095static void
2096elf64_alpha_merge_symbol_attribute (struct elf_link_hash_entry *h,
5160d0f3 2097 unsigned int st_other,
0a1b45a2
AM
2098 bool definition,
2099 bool dynamic)
747ffa7b
AM
2100{
2101 if (!dynamic && definition)
2102 h->other = ((h->other & ELF_ST_VISIBILITY (-1))
5160d0f3 2103 | (st_other & ~ELF_ST_VISIBILITY (-1)));
747ffa7b
AM
2104}
2105
a7519a3c
RH
2106/* Symbol versioning can create new symbols, and make our old symbols
2107 indirect to the new ones. Consolidate the got and reloc information
2108 in these situations. */
252b5132 2109
48f4b4f5
RH
2110static void
2111elf64_alpha_copy_indirect_symbol (struct bfd_link_info *info,
2112 struct elf_link_hash_entry *dir,
2113 struct elf_link_hash_entry *ind)
252b5132 2114{
48f4b4f5
RH
2115 struct alpha_elf_link_hash_entry *hi
2116 = (struct alpha_elf_link_hash_entry *) ind;
2117 struct alpha_elf_link_hash_entry *hs
2118 = (struct alpha_elf_link_hash_entry *) dir;
252b5132 2119
48f4b4f5
RH
2120 /* Do the merging in the superclass. */
2121 _bfd_elf_link_hash_copy_indirect(info, dir, ind);
252b5132 2122
a7519a3c 2123 /* Merge the flags. Whee. */
a7519a3c
RH
2124 hs->flags |= hi->flags;
2125
48f4b4f5
RH
2126 /* ??? It's unclear to me what's really supposed to happen when
2127 "merging" defweak and defined symbols, given that we don't
2128 actually throw away the defweak. This more-or-less copies
2129 the logic related to got and plt entries in the superclass. */
2130 if (ind->root.type != bfd_link_hash_indirect)
2131 return;
2132
a7519a3c
RH
2133 /* Merge the .got entries. Cannibalize the old symbol's list in
2134 doing so, since we don't need it anymore. */
2135
2136 if (hs->got_entries == NULL)
2137 hs->got_entries = hi->got_entries;
2138 else
2139 {
2140 struct alpha_elf_got_entry *gi, *gs, *gin, *gsh;
2141
2142 gsh = hs->got_entries;
2143 for (gi = hi->got_entries; gi ; gi = gin)
252b5132 2144 {
a7519a3c
RH
2145 gin = gi->next;
2146 for (gs = gsh; gs ; gs = gs->next)
2147 if (gi->gotobj == gs->gotobj
2148 && gi->reloc_type == gs->reloc_type
2149 && gi->addend == gs->addend)
2150 {
68994ca2 2151 gs->use_count += gi->use_count;
07d6d2b8 2152 goto got_found;
a7519a3c
RH
2153 }
2154 gi->next = hs->got_entries;
2155 hs->got_entries = gi;
2156 got_found:;
252b5132 2157 }
a7519a3c
RH
2158 }
2159 hi->got_entries = NULL;
252b5132 2160
a7519a3c
RH
2161 /* And similar for the reloc entries. */
2162
2163 if (hs->reloc_entries == NULL)
2164 hs->reloc_entries = hi->reloc_entries;
2165 else
2166 {
2167 struct alpha_elf_reloc_entry *ri, *rs, *rin, *rsh;
2168
2169 rsh = hs->reloc_entries;
2170 for (ri = hi->reloc_entries; ri ; ri = rin)
2171 {
2172 rin = ri->next;
2173 for (rs = rsh; rs ; rs = rs->next)
2174 if (ri->rtype == rs->rtype && ri->srel == rs->srel)
2175 {
2176 rs->count += ri->count;
2177 goto found_reloc;
2178 }
2179 ri->next = hs->reloc_entries;
2180 hs->reloc_entries = ri;
2181 found_reloc:;
2182 }
252b5132 2183 }
a7519a3c 2184 hi->reloc_entries = NULL;
252b5132
RH
2185}
2186
a7519a3c 2187/* Is it possible to merge two object file's .got tables? */
252b5132 2188
0a1b45a2 2189static bool
a7519a3c 2190elf64_alpha_can_merge_gots (bfd *a, bfd *b)
252b5132 2191{
a7519a3c
RH
2192 int total = alpha_elf_tdata (a)->total_got_size;
2193 bfd *bsub;
252b5132 2194
a7519a3c
RH
2195 /* Trivial quick fallout test. */
2196 if (total + alpha_elf_tdata (b)->total_got_size <= MAX_GOT_SIZE)
0a1b45a2 2197 return true;
252b5132 2198
a7519a3c
RH
2199 /* By their nature, local .got entries cannot be merged. */
2200 if ((total += alpha_elf_tdata (b)->local_got_size) > MAX_GOT_SIZE)
0a1b45a2 2201 return false;
252b5132 2202
a7519a3c
RH
2203 /* Failing the common trivial comparison, we must effectively
2204 perform the merge. Not actually performing the merge means that
2205 we don't have to store undo information in case we fail. */
2206 for (bsub = b; bsub ; bsub = alpha_elf_tdata (bsub)->in_got_link_next)
2207 {
2208 struct alpha_elf_link_hash_entry **hashes = alpha_elf_sym_hashes (bsub);
2209 Elf_Internal_Shdr *symtab_hdr = &elf_tdata (bsub)->symtab_hdr;
2210 int i, n;
2211
2212 n = NUM_SHDR_ENTRIES (symtab_hdr) - symtab_hdr->sh_info;
2213 for (i = 0; i < n; ++i)
2214 {
2215 struct alpha_elf_got_entry *ae, *be;
2216 struct alpha_elf_link_hash_entry *h;
2217
2218 h = hashes[i];
2219 while (h->root.root.type == bfd_link_hash_indirect
07d6d2b8 2220 || h->root.root.type == bfd_link_hash_warning)
a7519a3c
RH
2221 h = (struct alpha_elf_link_hash_entry *)h->root.root.u.i.link;
2222
2223 for (be = h->got_entries; be ; be = be->next)
2224 {
2225 if (be->use_count == 0)
07d6d2b8 2226 continue;
a7519a3c 2227 if (be->gotobj != b)
07d6d2b8 2228 continue;
a7519a3c
RH
2229
2230 for (ae = h->got_entries; ae ; ae = ae->next)
07d6d2b8 2231 if (ae->gotobj == a
a7519a3c
RH
2232 && ae->reloc_type == be->reloc_type
2233 && ae->addend == be->addend)
2234 goto global_found;
2235
2236 total += alpha_got_entry_size (be->reloc_type);
2237 if (total > MAX_GOT_SIZE)
0a1b45a2 2238 return false;
a7519a3c
RH
2239 global_found:;
2240 }
2241 }
2242 }
252b5132 2243
0a1b45a2 2244 return true;
252b5132
RH
2245}
2246
a7519a3c 2247/* Actually merge two .got tables. */
252b5132 2248
a7519a3c
RH
2249static void
2250elf64_alpha_merge_gots (bfd *a, bfd *b)
252b5132 2251{
a7519a3c
RH
2252 int total = alpha_elf_tdata (a)->total_got_size;
2253 bfd *bsub;
252b5132 2254
a7519a3c
RH
2255 /* Remember local expansion. */
2256 {
2257 int e = alpha_elf_tdata (b)->local_got_size;
2258 total += e;
2259 alpha_elf_tdata (a)->local_got_size += e;
2260 }
252b5132 2261
a7519a3c
RH
2262 for (bsub = b; bsub ; bsub = alpha_elf_tdata (bsub)->in_got_link_next)
2263 {
2264 struct alpha_elf_got_entry **local_got_entries;
2265 struct alpha_elf_link_hash_entry **hashes;
2266 Elf_Internal_Shdr *symtab_hdr;
2267 int i, n;
252b5132 2268
a7519a3c
RH
2269 /* Let the local .got entries know they are part of a new subsegment. */
2270 local_got_entries = alpha_elf_tdata (bsub)->local_got_entries;
2271 if (local_got_entries)
07d6d2b8 2272 {
a7519a3c
RH
2273 n = elf_tdata (bsub)->symtab_hdr.sh_info;
2274 for (i = 0; i < n; ++i)
2275 {
2276 struct alpha_elf_got_entry *ent;
2277 for (ent = local_got_entries[i]; ent; ent = ent->next)
07d6d2b8 2278 ent->gotobj = a;
a7519a3c 2279 }
07d6d2b8 2280 }
252b5132 2281
a7519a3c
RH
2282 /* Merge the global .got entries. */
2283 hashes = alpha_elf_sym_hashes (bsub);
2284 symtab_hdr = &elf_tdata (bsub)->symtab_hdr;
252b5132 2285
a7519a3c
RH
2286 n = NUM_SHDR_ENTRIES (symtab_hdr) - symtab_hdr->sh_info;
2287 for (i = 0; i < n; ++i)
07d6d2b8 2288 {
a7519a3c
RH
2289 struct alpha_elf_got_entry *ae, *be, **pbe, **start;
2290 struct alpha_elf_link_hash_entry *h;
252b5132 2291
a7519a3c
RH
2292 h = hashes[i];
2293 while (h->root.root.type == bfd_link_hash_indirect
07d6d2b8 2294 || h->root.root.type == bfd_link_hash_warning)
a7519a3c 2295 h = (struct alpha_elf_link_hash_entry *)h->root.root.u.i.link;
252b5132 2296
a7519a3c
RH
2297 pbe = start = &h->got_entries;
2298 while ((be = *pbe) != NULL)
2299 {
2300 if (be->use_count == 0)
07d6d2b8 2301 {
a7519a3c
RH
2302 *pbe = be->next;
2303 memset (be, 0xa5, sizeof (*be));
2304 goto kill;
07d6d2b8 2305 }
a7519a3c 2306 if (be->gotobj != b)
07d6d2b8 2307 goto next;
a7519a3c
RH
2308
2309 for (ae = *start; ae ; ae = ae->next)
07d6d2b8 2310 if (ae->gotobj == a
a7519a3c
RH
2311 && ae->reloc_type == be->reloc_type
2312 && ae->addend == be->addend)
2313 {
2314 ae->flags |= be->flags;
2315 ae->use_count += be->use_count;
2316 *pbe = be->next;
2317 memset (be, 0xa5, sizeof (*be));
2318 goto kill;
2319 }
2320 be->gotobj = a;
2321 total += alpha_got_entry_size (be->reloc_type);
252b5132 2322
a7519a3c
RH
2323 next:;
2324 pbe = &be->next;
2325 kill:;
2326 }
07d6d2b8 2327 }
252b5132 2328
a7519a3c
RH
2329 alpha_elf_tdata (bsub)->gotobj = a;
2330 }
2331 alpha_elf_tdata (a)->total_got_size = total;
252b5132 2332
a7519a3c
RH
2333 /* Merge the two in_got chains. */
2334 {
2335 bfd *next;
252b5132 2336
a7519a3c
RH
2337 bsub = a;
2338 while ((next = alpha_elf_tdata (bsub)->in_got_link_next) != NULL)
2339 bsub = next;
252b5132 2340
a7519a3c
RH
2341 alpha_elf_tdata (bsub)->in_got_link_next = b;
2342 }
252b5132 2343}
a7519a3c
RH
2344
2345/* Calculate the offsets for the got entries. */
252b5132 2346
0a1b45a2 2347static bool
a7519a3c 2348elf64_alpha_calc_got_offsets_for_symbol (struct alpha_elf_link_hash_entry *h,
2c3fc389 2349 void * arg ATTRIBUTE_UNUSED)
252b5132 2350{
a7519a3c 2351 struct alpha_elf_got_entry *gotent;
252b5132 2352
a7519a3c
RH
2353 for (gotent = h->got_entries; gotent; gotent = gotent->next)
2354 if (gotent->use_count > 0)
2355 {
2356 struct alpha_elf_obj_tdata *td;
2357 bfd_size_type *plge;
252b5132 2358
a7519a3c 2359 td = alpha_elf_tdata (gotent->gotobj);
a7519a3c
RH
2360 plge = &td->got->size;
2361 gotent->got_offset = *plge;
2362 *plge += alpha_got_entry_size (gotent->reloc_type);
2363 }
252b5132 2364
0a1b45a2 2365 return true;
a7519a3c 2366}
252b5132 2367
a7519a3c
RH
2368static void
2369elf64_alpha_calc_got_offsets (struct bfd_link_info *info)
2370{
4dfe6ac6
NC
2371 bfd *i, *got_list;
2372 struct alpha_elf_link_hash_table * htab;
2373
2374 htab = alpha_elf_hash_table (info);
2375 if (htab == NULL)
2376 return;
2377 got_list = htab->got_list;
252b5132 2378
a7519a3c
RH
2379 /* First, zero out the .got sizes, as we may be recalculating the
2380 .got after optimizing it. */
2381 for (i = got_list; i ; i = alpha_elf_tdata(i)->got_link_next)
2382 alpha_elf_tdata(i)->got->size = 0;
252b5132 2383
a7519a3c 2384 /* Next, fill in the offsets for all the global entries. */
4dfe6ac6 2385 alpha_elf_link_hash_traverse (htab,
a7519a3c
RH
2386 elf64_alpha_calc_got_offsets_for_symbol,
2387 NULL);
252b5132 2388
a7519a3c
RH
2389 /* Finally, fill in the offsets for the local entries. */
2390 for (i = got_list; i ; i = alpha_elf_tdata(i)->got_link_next)
2391 {
2392 bfd_size_type got_offset = alpha_elf_tdata(i)->got->size;
2393 bfd *j;
252b5132 2394
a7519a3c
RH
2395 for (j = i; j ; j = alpha_elf_tdata(j)->in_got_link_next)
2396 {
2397 struct alpha_elf_got_entry **local_got_entries, *gotent;
2398 int k, n;
252b5132 2399
a7519a3c
RH
2400 local_got_entries = alpha_elf_tdata(j)->local_got_entries;
2401 if (!local_got_entries)
2402 continue;
252b5132 2403
a7519a3c
RH
2404 for (k = 0, n = elf_tdata(j)->symtab_hdr.sh_info; k < n; ++k)
2405 for (gotent = local_got_entries[k]; gotent; gotent = gotent->next)
2406 if (gotent->use_count > 0)
07d6d2b8 2407 {
a7519a3c
RH
2408 gotent->got_offset = got_offset;
2409 got_offset += alpha_got_entry_size (gotent->reloc_type);
07d6d2b8 2410 }
a7519a3c 2411 }
252b5132 2412
a7519a3c
RH
2413 alpha_elf_tdata(i)->got->size = got_offset;
2414 }
2415}
252b5132 2416
a7519a3c 2417/* Constructs the gots. */
252b5132 2418
0a1b45a2 2419static bool
d1c109de 2420elf64_alpha_size_got_sections (struct bfd_link_info *info,
0a1b45a2 2421 bool may_merge)
252b5132 2422{
a7519a3c 2423 bfd *i, *got_list, *cur_got_obj = NULL;
4dfe6ac6 2424 struct alpha_elf_link_hash_table * htab;
252b5132 2425
4dfe6ac6
NC
2426 htab = alpha_elf_hash_table (info);
2427 if (htab == NULL)
0a1b45a2 2428 return false;
4dfe6ac6 2429 got_list = htab->got_list;
95404643 2430
a7519a3c
RH
2431 /* On the first time through, pretend we have an existing got list
2432 consisting of all of the input files. */
2433 if (got_list == NULL)
252b5132 2434 {
c72f2fb2 2435 for (i = info->input_bfds; i ; i = i->link.next)
252b5132 2436 {
0ffa91dd
NC
2437 bfd *this_got;
2438
2439 if (! is_alpha_elf (i))
2440 continue;
2441
2442 this_got = alpha_elf_tdata (i)->gotobj;
a7519a3c
RH
2443 if (this_got == NULL)
2444 continue;
252b5132 2445
a7519a3c
RH
2446 /* We are assuming no merging has yet occurred. */
2447 BFD_ASSERT (this_got == i);
252b5132 2448
07d6d2b8 2449 if (alpha_elf_tdata (this_got)->total_got_size > MAX_GOT_SIZE)
252b5132 2450 {
a7519a3c 2451 /* Yikes! A single object file has too many entries. */
4eca0228 2452 _bfd_error_handler
695344c0 2453 /* xgettext:c-format */
871b3ab2 2454 (_("%pB: .got subsegment exceeds 64K (size %d)"),
07d6d2b8 2455 i, alpha_elf_tdata (this_got)->total_got_size);
0a1b45a2 2456 return false;
252b5132 2457 }
252b5132 2458
a7519a3c
RH
2459 if (got_list == NULL)
2460 got_list = this_got;
2461 else
2462 alpha_elf_tdata(cur_got_obj)->got_link_next = this_got;
2463 cur_got_obj = this_got;
252b5132
RH
2464 }
2465
a7519a3c
RH
2466 /* Strange degenerate case of no got references. */
2467 if (got_list == NULL)
0a1b45a2 2468 return true;
a7519a3c 2469
4dfe6ac6 2470 htab->got_list = got_list;
a7519a3c
RH
2471 }
2472
2473 cur_got_obj = got_list;
0ffa91dd 2474 if (cur_got_obj == NULL)
0a1b45a2 2475 return false;
0ffa91dd 2476
d1c109de 2477 if (may_merge)
a7519a3c 2478 {
d1c109de
RH
2479 i = alpha_elf_tdata(cur_got_obj)->got_link_next;
2480 while (i != NULL)
252b5132 2481 {
d1c109de
RH
2482 if (elf64_alpha_can_merge_gots (cur_got_obj, i))
2483 {
2484 elf64_alpha_merge_gots (cur_got_obj, i);
252b5132 2485
d1c109de
RH
2486 alpha_elf_tdata(i)->got->size = 0;
2487 i = alpha_elf_tdata(i)->got_link_next;
2488 alpha_elf_tdata(cur_got_obj)->got_link_next = i;
2489 }
2490 else
2491 {
2492 cur_got_obj = i;
2493 i = alpha_elf_tdata(i)->got_link_next;
2494 }
a7519a3c 2495 }
252b5132
RH
2496 }
2497
a7519a3c
RH
2498 /* Once the gots have been merged, fill in the got offsets for
2499 everything therein. */
4a828aab 2500 elf64_alpha_calc_got_offsets (info);
252b5132 2501
0a1b45a2 2502 return true;
252b5132 2503}
252b5132 2504
0a1b45a2 2505static bool
2c3fc389
NC
2506elf64_alpha_size_plt_section_1 (struct alpha_elf_link_hash_entry *h,
2507 void * data)
252b5132 2508{
a7519a3c
RH
2509 asection *splt = (asection *) data;
2510 struct alpha_elf_got_entry *gotent;
0a1b45a2 2511 bool saw_one = false;
252b5132 2512
a7519a3c
RH
2513 /* If we didn't need an entry before, we still don't. */
2514 if (!h->root.needs_plt)
0a1b45a2 2515 return true;
e92d460e 2516
6ec7057a 2517 /* For each LITERAL got entry still in use, allocate a plt entry. */
a7519a3c
RH
2518 for (gotent = h->got_entries; gotent ; gotent = gotent->next)
2519 if (gotent->reloc_type == R_ALPHA_LITERAL
2520 && gotent->use_count > 0)
6ec7057a
RH
2521 {
2522 if (splt->size == 0)
2523 splt->size = PLT_HEADER_SIZE;
2524 gotent->plt_offset = splt->size;
2525 splt->size += PLT_ENTRY_SIZE;
0a1b45a2 2526 saw_one = true;
6ec7057a 2527 }
a7519a3c 2528
6ec7057a
RH
2529 /* If there weren't any, there's no longer a need for the PLT entry. */
2530 if (!saw_one)
0a1b45a2 2531 h->root.needs_plt = false;
a7519a3c 2532
0a1b45a2 2533 return true;
a7519a3c
RH
2534}
2535
4a828aab
RH
2536/* Called from relax_section to rebuild the PLT in light of potential changes
2537 in the function's status. */
a7519a3c 2538
4a828aab 2539static void
a7519a3c
RH
2540elf64_alpha_size_plt_section (struct bfd_link_info *info)
2541{
6ec7057a 2542 asection *splt, *spltrel, *sgotplt;
a7519a3c 2543 unsigned long entries;
4dfe6ac6
NC
2544 struct alpha_elf_link_hash_table * htab;
2545
2546 htab = alpha_elf_hash_table (info);
2547 if (htab == NULL)
2548 return;
a7519a3c 2549
ce558b89 2550 splt = elf_hash_table(info)->splt;
a7519a3c 2551 if (splt == NULL)
4a828aab 2552 return;
252b5132 2553
a7519a3c 2554 splt->size = 0;
252b5132 2555
4dfe6ac6 2556 alpha_elf_link_hash_traverse (htab,
a7519a3c 2557 elf64_alpha_size_plt_section_1, splt);
e92d460e 2558
a7519a3c 2559 /* Every plt entry requires a JMP_SLOT relocation. */
ce558b89 2560 spltrel = elf_hash_table(info)->srelplt;
4a828aab 2561 entries = 0;
a7519a3c 2562 if (splt->size)
6ec7057a
RH
2563 {
2564 if (elf64_alpha_use_secureplt)
2565 entries = (splt->size - NEW_PLT_HEADER_SIZE) / NEW_PLT_ENTRY_SIZE;
2566 else
2567 entries = (splt->size - OLD_PLT_HEADER_SIZE) / OLD_PLT_ENTRY_SIZE;
2568 }
a7519a3c 2569 spltrel->size = entries * sizeof (Elf64_External_Rela);
e92d460e 2570
6ec7057a
RH
2571 /* When using the secureplt, we need two words somewhere in the data
2572 segment for the dynamic linker to tell us where to go. This is the
2573 entire contents of the .got.plt section. */
2574 if (elf64_alpha_use_secureplt)
2575 {
ce558b89 2576 sgotplt = elf_hash_table(info)->sgotplt;
6ec7057a
RH
2577 sgotplt->size = entries ? 16 : 0;
2578 }
a7519a3c 2579}
e92d460e 2580
0a1b45a2 2581static bool
a7519a3c
RH
2582elf64_alpha_always_size_sections (bfd *output_bfd ATTRIBUTE_UNUSED,
2583 struct bfd_link_info *info)
2584{
2585 bfd *i;
4dfe6ac6 2586 struct alpha_elf_link_hash_table * htab;
252b5132 2587
0e1862bb 2588 if (bfd_link_relocatable (info))
0a1b45a2 2589 return true;
252b5132 2590
4dfe6ac6
NC
2591 htab = alpha_elf_hash_table (info);
2592 if (htab == NULL)
0a1b45a2 2593 return false;
4dfe6ac6 2594
0a1b45a2
AM
2595 if (!elf64_alpha_size_got_sections (info, true))
2596 return false;
252b5132 2597
a7519a3c 2598 /* Allocate space for all of the .got subsections. */
4dfe6ac6 2599 i = htab->got_list;
a7519a3c 2600 for ( ; i ; i = alpha_elf_tdata(i)->got_link_next)
252b5132 2601 {
a7519a3c
RH
2602 asection *s = alpha_elf_tdata(i)->got;
2603 if (s->size > 0)
2604 {
2605 s->contents = (bfd_byte *) bfd_zalloc (i, s->size);
2606 if (s->contents == NULL)
0a1b45a2 2607 return false;
a7519a3c 2608 }
252b5132
RH
2609 }
2610
0a1b45a2 2611 return true;
252b5132 2612}
3765b1be 2613
a7519a3c 2614/* The number of dynamic relocations required by a static relocation. */
3765b1be 2615
a7519a3c 2616static int
e366eeae 2617alpha_dynamic_entries_for_reloc (int r_type, int dynamic, int shared, int pie)
a7519a3c
RH
2618{
2619 switch (r_type)
3765b1be 2620 {
a7519a3c
RH
2621 /* May appear in GOT entries. */
2622 case R_ALPHA_TLSGD:
2623 return (dynamic ? 2 : shared ? 1 : 0);
2624 case R_ALPHA_TLSLDM:
2625 return shared;
2626 case R_ALPHA_LITERAL:
a7519a3c 2627 return dynamic || shared;
e366eeae
RH
2628 case R_ALPHA_GOTTPREL:
2629 return dynamic || (shared && !pie);
a7519a3c
RH
2630 case R_ALPHA_GOTDTPREL:
2631 return dynamic;
3765b1be 2632
a7519a3c
RH
2633 /* May appear in data sections. */
2634 case R_ALPHA_REFLONG:
2635 case R_ALPHA_REFQUAD:
a7519a3c 2636 return dynamic || shared;
e366eeae
RH
2637 case R_ALPHA_TPREL64:
2638 return dynamic || (shared && !pie);
3765b1be 2639
a7519a3c
RH
2640 /* Everything else is illegal. We'll issue an error during
2641 relocate_section. */
2642 default:
2643 return 0;
2644 }
2645}
3765b1be 2646
a7519a3c 2647/* Work out the sizes of the dynamic relocation entries. */
3765b1be 2648
0a1b45a2 2649static bool
a7519a3c
RH
2650elf64_alpha_calc_dynrel_sizes (struct alpha_elf_link_hash_entry *h,
2651 struct bfd_link_info *info)
2652{
0a1b45a2 2653 bool dynamic;
a7519a3c
RH
2654 struct alpha_elf_reloc_entry *relent;
2655 unsigned long entries;
3765b1be 2656
a7519a3c
RH
2657 /* If the symbol was defined as a common symbol in a regular object
2658 file, and there was no definition in any dynamic object, then the
2659 linker will have allocated space for the symbol in a common
2660 section but the ELF_LINK_HASH_DEF_REGULAR flag will not have been
2661 set. This is done for dynamic symbols in
2662 elf_adjust_dynamic_symbol but this is not done for non-dynamic
2663 symbols, somehow. */
2664 if (!h->root.def_regular
2665 && h->root.ref_regular
2666 && !h->root.def_dynamic
2667 && (h->root.root.type == bfd_link_hash_defined
2668 || h->root.root.type == bfd_link_hash_defweak)
2669 && !(h->root.root.u.def.section->owner->flags & DYNAMIC))
2670 h->root.def_regular = 1;
3765b1be 2671
a7519a3c
RH
2672 /* If the symbol is dynamic, we'll need all the relocations in their
2673 natural form. If this is a shared object, and it has been forced
2674 local, we'll need the same number of RELATIVE relocations. */
2675 dynamic = alpha_elf_dynamic_symbol_p (&h->root, info);
3765b1be 2676
a7519a3c
RH
2677 /* If the symbol is a hidden undefined weak, then we never have any
2678 relocations. Avoid the loop which may want to add RELATIVE relocs
0e1862bb 2679 based on bfd_link_pic (info). */
a7519a3c 2680 if (h->root.root.type == bfd_link_hash_undefweak && !dynamic)
0a1b45a2 2681 return true;
a7519a3c
RH
2682
2683 for (relent = h->reloc_entries; relent; relent = relent->next)
3765b1be 2684 {
a7519a3c 2685 entries = alpha_dynamic_entries_for_reloc (relent->rtype, dynamic,
3cbc1e5e
AM
2686 bfd_link_pic (info),
2687 bfd_link_pie (info));
a7519a3c
RH
2688 if (entries)
2689 {
1f7f2abb 2690 asection *sec = relent->sec;
a7519a3c
RH
2691 relent->srel->size +=
2692 entries * sizeof (Elf64_External_Rela) * relent->count;
1f7f2abb
L
2693 if ((sec->flags & SEC_READONLY) != 0)
2694 {
2695 info->flags |= DT_TEXTREL;
2696 info->callbacks->minfo
2697 (_("%pB: dynamic relocation against `%pT' in "
2698 "read-only section `%pA'\n"),
2699 sec->owner, h->root.root.root.string, sec);
2700 }
a7519a3c
RH
2701 }
2702 }
3765b1be 2703
0a1b45a2 2704 return true;
a7519a3c 2705}
3765b1be 2706
a7519a3c
RH
2707/* Subroutine of elf64_alpha_size_rela_got_section for doing the
2708 global symbols. */
3765b1be 2709
0a1b45a2 2710static bool
a7519a3c
RH
2711elf64_alpha_size_rela_got_1 (struct alpha_elf_link_hash_entry *h,
2712 struct bfd_link_info *info)
2713{
0a1b45a2 2714 bool dynamic;
a7519a3c
RH
2715 struct alpha_elf_got_entry *gotent;
2716 unsigned long entries;
3765b1be 2717
6ec7057a
RH
2718 /* If we're using a plt for this symbol, then all of its relocations
2719 for its got entries go into .rela.plt. */
2720 if (h->root.needs_plt)
0a1b45a2 2721 return true;
6ec7057a 2722
a7519a3c
RH
2723 /* If the symbol is dynamic, we'll need all the relocations in their
2724 natural form. If this is a shared object, and it has been forced
2725 local, we'll need the same number of RELATIVE relocations. */
2726 dynamic = alpha_elf_dynamic_symbol_p (&h->root, info);
2727
2728 /* If the symbol is a hidden undefined weak, then we never have any
2729 relocations. Avoid the loop which may want to add RELATIVE relocs
0e1862bb 2730 based on bfd_link_pic (info). */
a7519a3c 2731 if (h->root.root.type == bfd_link_hash_undefweak && !dynamic)
0a1b45a2 2732 return true;
a7519a3c
RH
2733
2734 entries = 0;
2735 for (gotent = h->got_entries; gotent ; gotent = gotent->next)
2736 if (gotent->use_count > 0)
e366eeae 2737 entries += alpha_dynamic_entries_for_reloc (gotent->reloc_type, dynamic,
0e1862bb
L
2738 bfd_link_pic (info),
2739 bfd_link_pie (info));
a7519a3c 2740
a7519a3c
RH
2741 if (entries > 0)
2742 {
ce558b89 2743 asection *srel = elf_hash_table(info)->srelgot;
a7519a3c
RH
2744 BFD_ASSERT (srel != NULL);
2745 srel->size += sizeof (Elf64_External_Rela) * entries;
3765b1be 2746 }
3765b1be 2747
0a1b45a2 2748 return true;
3765b1be
RH
2749}
2750
a7519a3c 2751/* Set the sizes of the dynamic relocation sections. */
252b5132 2752
4a828aab 2753static void
a7519a3c 2754elf64_alpha_size_rela_got_section (struct bfd_link_info *info)
252b5132 2755{
a7519a3c 2756 unsigned long entries;
ce558b89 2757 bfd *i;
a7519a3c 2758 asection *srel;
4dfe6ac6
NC
2759 struct alpha_elf_link_hash_table * htab;
2760
2761 htab = alpha_elf_hash_table (info);
2762 if (htab == NULL)
2763 return;
252b5132 2764
a7519a3c
RH
2765 /* Shared libraries often require RELATIVE relocs, and some relocs
2766 require attention for the main application as well. */
252b5132 2767
a7519a3c 2768 entries = 0;
4dfe6ac6 2769 for (i = htab->got_list;
a7519a3c
RH
2770 i ; i = alpha_elf_tdata(i)->got_link_next)
2771 {
2772 bfd *j;
3241278a 2773
a7519a3c
RH
2774 for (j = i; j ; j = alpha_elf_tdata(j)->in_got_link_next)
2775 {
2776 struct alpha_elf_got_entry **local_got_entries, *gotent;
2777 int k, n;
252b5132 2778
a7519a3c
RH
2779 local_got_entries = alpha_elf_tdata(j)->local_got_entries;
2780 if (!local_got_entries)
2781 continue;
252b5132 2782
a7519a3c
RH
2783 for (k = 0, n = elf_tdata(j)->symtab_hdr.sh_info; k < n; ++k)
2784 for (gotent = local_got_entries[k];
2785 gotent ; gotent = gotent->next)
2786 if (gotent->use_count > 0)
2787 entries += (alpha_dynamic_entries_for_reloc
0e1862bb
L
2788 (gotent->reloc_type, 0, bfd_link_pic (info),
2789 bfd_link_pie (info)));
a7519a3c
RH
2790 }
2791 }
3765b1be 2792
ce558b89 2793 srel = elf_hash_table(info)->srelgot;
a7519a3c
RH
2794 if (!srel)
2795 {
2796 BFD_ASSERT (entries == 0);
4a828aab 2797 return;
a7519a3c
RH
2798 }
2799 srel->size = sizeof (Elf64_External_Rela) * entries;
252b5132 2800
a7519a3c 2801 /* Now do the non-local symbols. */
4dfe6ac6 2802 alpha_elf_link_hash_traverse (htab,
a7519a3c 2803 elf64_alpha_size_rela_got_1, info);
a7519a3c 2804}
252b5132 2805
a7519a3c 2806/* Set the sizes of the dynamic sections. */
3765b1be 2807
0a1b45a2 2808static bool
a7519a3c
RH
2809elf64_alpha_size_dynamic_sections (bfd *output_bfd ATTRIBUTE_UNUSED,
2810 struct bfd_link_info *info)
2811{
2812 bfd *dynobj;
2813 asection *s;
0a1b45a2 2814 bool relplt, relocs;
4dfe6ac6
NC
2815 struct alpha_elf_link_hash_table * htab;
2816
2817 htab = alpha_elf_hash_table (info);
2818 if (htab == NULL)
0a1b45a2 2819 return false;
3765b1be 2820
a7519a3c
RH
2821 dynobj = elf_hash_table(info)->dynobj;
2822 BFD_ASSERT(dynobj != NULL);
252b5132 2823
a7519a3c
RH
2824 if (elf_hash_table (info)->dynamic_sections_created)
2825 {
2826 /* Set the contents of the .interp section to the interpreter. */
9b8b325a 2827 if (bfd_link_executable (info) && !info->nointerp)
252b5132 2828 {
3d4d4302 2829 s = bfd_get_linker_section (dynobj, ".interp");
a7519a3c
RH
2830 BFD_ASSERT (s != NULL);
2831 s->size = sizeof ELF_DYNAMIC_INTERPRETER;
2832 s->contents = (unsigned char *) ELF_DYNAMIC_INTERPRETER;
2833 }
3765b1be 2834
a7519a3c
RH
2835 /* Now that we've seen all of the input files, we can decide which
2836 symbols need dynamic relocation entries and which don't. We've
2837 collected information in check_relocs that we can now apply to
2838 size the dynamic relocation sections. */
4dfe6ac6 2839 alpha_elf_link_hash_traverse (htab,
a7519a3c 2840 elf64_alpha_calc_dynrel_sizes, info);
252b5132 2841
a7519a3c 2842 elf64_alpha_size_rela_got_section (info);
6ec7057a 2843 elf64_alpha_size_plt_section (info);
a7519a3c
RH
2844 }
2845 /* else we're not dynamic and by definition we don't need such things. */
3765b1be 2846
a7519a3c
RH
2847 /* The check_relocs and adjust_dynamic_symbol entry points have
2848 determined the sizes of the various dynamic sections. Allocate
2849 memory for them. */
0a1b45a2
AM
2850 relplt = false;
2851 relocs = false;
a7519a3c
RH
2852 for (s = dynobj->sections; s != NULL; s = s->next)
2853 {
2854 const char *name;
3765b1be 2855
a7519a3c
RH
2856 if (!(s->flags & SEC_LINKER_CREATED))
2857 continue;
cc03ec80 2858
a7519a3c
RH
2859 /* It's OK to base decisions on the section name, because none
2860 of the dynobj section names depend upon the input files. */
fd361982 2861 name = bfd_section_name (s);
3765b1be 2862
08dedd66 2863 if (startswith (name, ".rela"))
3765b1be 2864 {
c456f082 2865 if (s->size != 0)
a7519a3c 2866 {
c456f082 2867 if (strcmp (name, ".rela.plt") == 0)
0a1b45a2 2868 relplt = true;
24f1a751 2869 else
0a1b45a2 2870 relocs = true;
252b5132 2871
a7519a3c
RH
2872 /* We use the reloc_count field as a counter if we need
2873 to copy relocs into the output file. */
2874 s->reloc_count = 0;
252b5132 2875 }
3765b1be 2876 }
08dedd66 2877 else if (! startswith (name, ".got")
c456f082
AM
2878 && strcmp (name, ".plt") != 0
2879 && strcmp (name, ".dynbss") != 0)
3765b1be 2880 {
a7519a3c
RH
2881 /* It's not one of our dynamic sections, so don't allocate space. */
2882 continue;
2883 }
252b5132 2884
c456f082
AM
2885 if (s->size == 0)
2886 {
2887 /* If we don't need this section, strip it from the output file.
2888 This is to handle .rela.bss and .rela.plt. We must create it
2889 in create_dynamic_sections, because it must be created before
2890 the linker maps input sections to output sections. The
2891 linker does that before adjust_dynamic_symbol is called, and
2892 it is that function which decides whether anything needs to
2893 go into these sections. */
08dedd66 2894 if (!startswith (name, ".got"))
6452a567 2895 s->flags |= SEC_EXCLUDE;
c456f082
AM
2896 }
2897 else if ((s->flags & SEC_HAS_CONTENTS) != 0)
a7519a3c
RH
2898 {
2899 /* Allocate memory for the section contents. */
2900 s->contents = (bfd_byte *) bfd_zalloc (dynobj, s->size);
c456f082 2901 if (s->contents == NULL)
0a1b45a2 2902 return false;
a7519a3c
RH
2903 }
2904 }
3765b1be 2905
a7519a3c
RH
2906 if (elf_hash_table (info)->dynamic_sections_created)
2907 {
2908 /* Add some entries to the .dynamic section. We fill in the
2909 values later, in elf64_alpha_finish_dynamic_sections, but we
2910 must add the entries now so that we get the correct size for
2911 the .dynamic section. The DT_DEBUG entry is filled in by the
2912 dynamic linker and used by the debugger. */
2913#define add_dynamic_entry(TAG, VAL) \
2914 _bfd_elf_add_dynamic_entry (info, TAG, VAL)
3765b1be 2915
3084d7a2
L
2916 if (!_bfd_elf_add_dynamic_tags (output_bfd, info,
2917 relocs || relplt))
0a1b45a2 2918 return false;
24f1a751 2919
3084d7a2
L
2920 if (relplt
2921 && elf64_alpha_use_secureplt
2922 && !add_dynamic_entry (DT_ALPHA_PLTRO, 1))
0a1b45a2 2923 return false;
252b5132 2924 }
a7519a3c 2925#undef add_dynamic_entry
252b5132 2926
0a1b45a2 2927 return true;
252b5132 2928}
a7519a3c
RH
2929\f
2930/* These functions do relaxation for Alpha ELF.
252b5132 2931
a7519a3c
RH
2932 Currently I'm only handling what I can do with existing compiler
2933 and assembler support, which means no instructions are removed,
2934 though some may be nopped. At this time GCC does not emit enough
2935 information to do all of the relaxing that is possible. It will
2936 take some not small amount of work for that to happen.
252b5132 2937
a7519a3c
RH
2938 There are a couple of interesting papers that I once read on this
2939 subject, that I cannot find references to at the moment, that
2940 related to Alpha in particular. They are by David Wall, then of
2941 DEC WRL. */
252b5132 2942
a7519a3c
RH
2943struct alpha_relax_info
2944{
2945 bfd *abfd;
2946 asection *sec;
2947 bfd_byte *contents;
2948 Elf_Internal_Shdr *symtab_hdr;
2949 Elf_Internal_Rela *relocs, *relend;
2950 struct bfd_link_info *link_info;
2951 bfd_vma gp;
2952 bfd *gotobj;
2953 asection *tsec;
2954 struct alpha_elf_link_hash_entry *h;
2955 struct alpha_elf_got_entry **first_gotent;
2956 struct alpha_elf_got_entry *gotent;
0a1b45a2
AM
2957 bool changed_contents;
2958 bool changed_relocs;
a7519a3c
RH
2959 unsigned char other;
2960};
252b5132 2961
a7519a3c
RH
2962static Elf_Internal_Rela *
2963elf64_alpha_find_reloc_at_ofs (Elf_Internal_Rela *rel,
2964 Elf_Internal_Rela *relend,
2965 bfd_vma offset, int type)
2966{
2967 while (rel < relend)
252b5132 2968 {
a7519a3c
RH
2969 if (rel->r_offset == offset
2970 && ELF64_R_TYPE (rel->r_info) == (unsigned int) type)
2971 return rel;
2972 ++rel;
2973 }
2974 return NULL;
2975}
252b5132 2976
0a1b45a2 2977static bool
a7519a3c
RH
2978elf64_alpha_relax_got_load (struct alpha_relax_info *info, bfd_vma symval,
2979 Elf_Internal_Rela *irel, unsigned long r_type)
2980{
2981 unsigned int insn;
2982 bfd_signed_vma disp;
252b5132 2983
a7519a3c
RH
2984 /* Get the instruction. */
2985 insn = bfd_get_32 (info->abfd, info->contents + irel->r_offset);
252b5132 2986
a7519a3c
RH
2987 if (insn >> 26 != OP_LDQ)
2988 {
2989 reloc_howto_type *howto = elf64_alpha_howto_table + r_type;
4eca0228 2990 _bfd_error_handler
695344c0 2991 /* xgettext:c-format */
2dcf00ce
AM
2992 (_("%pB: %pA+%#" PRIx64 ": warning: "
2993 "%s relocation against unexpected insn"),
2994 info->abfd, info->sec, (uint64_t) irel->r_offset, howto->name);
0a1b45a2 2995 return true;
a7519a3c 2996 }
252b5132 2997
a7519a3c 2998 /* Can't relax dynamic symbols. */
eae0b5c3
NC
2999 if (info->h != NULL
3000 && alpha_elf_dynamic_symbol_p (&info->h->root, info->link_info))
0a1b45a2 3001 return true;
252b5132 3002
a7519a3c 3003 /* Can't use local-exec relocations in shared libraries. */
e366eeae 3004 if (r_type == R_ALPHA_GOTTPREL
3cbc1e5e 3005 && bfd_link_dll (info->link_info))
0a1b45a2 3006 return true;
252b5132 3007
a7519a3c
RH
3008 if (r_type == R_ALPHA_LITERAL)
3009 {
3010 /* Look for nice constant addresses. This includes the not-uncommon
3011 special case of 0 for undefweak symbols. */
3012 if ((info->h && info->h->root.root.type == bfd_link_hash_undefweak)
0e1862bb 3013 || (!bfd_link_pic (info->link_info)
a7519a3c
RH
3014 && (symval >= (bfd_vma)-0x8000 || symval < 0x8000)))
3015 {
3016 disp = 0;
3017 insn = (OP_LDA << 26) | (insn & (31 << 21)) | (31 << 16);
3018 insn |= (symval & 0xffff);
3019 r_type = R_ALPHA_NONE;
3020 }
3021 else
3022 {
d1c109de
RH
3023 /* We may only create GPREL relocs during the second pass. */
3024 if (info->link_info->relax_pass == 0)
0a1b45a2 3025 return true;
d1c109de 3026
a7519a3c
RH
3027 disp = symval - info->gp;
3028 insn = (OP_LDA << 26) | (insn & 0x03ff0000);
3029 r_type = R_ALPHA_GPREL16;
3030 }
252b5132
RH
3031 }
3032 else
252b5132 3033 {
a7519a3c 3034 bfd_vma dtp_base, tp_base;
252b5132 3035
a7519a3c
RH
3036 BFD_ASSERT (elf_hash_table (info->link_info)->tls_sec != NULL);
3037 dtp_base = alpha_get_dtprel_base (info->link_info);
3038 tp_base = alpha_get_tprel_base (info->link_info);
3039 disp = symval - (r_type == R_ALPHA_GOTDTPREL ? dtp_base : tp_base);
252b5132 3040
a7519a3c 3041 insn = (OP_LDA << 26) | (insn & (31 << 21)) | (31 << 16);
252b5132 3042
a7519a3c
RH
3043 switch (r_type)
3044 {
3045 case R_ALPHA_GOTDTPREL:
3046 r_type = R_ALPHA_DTPREL16;
3047 break;
3048 case R_ALPHA_GOTTPREL:
3049 r_type = R_ALPHA_TPREL16;
3050 break;
3051 default:
3052 BFD_ASSERT (0);
0a1b45a2 3053 return false;
a7519a3c
RH
3054 }
3055 }
252b5132 3056
a7519a3c 3057 if (disp < -0x8000 || disp >= 0x8000)
0a1b45a2 3058 return true;
252b5132 3059
a7519a3c 3060 bfd_put_32 (info->abfd, (bfd_vma) insn, info->contents + irel->r_offset);
0a1b45a2 3061 info->changed_contents = true;
252b5132 3062
a7519a3c
RH
3063 /* Reduce the use count on this got entry by one, possibly
3064 eliminating it. */
3065 if (--info->gotent->use_count == 0)
252b5132 3066 {
a7519a3c
RH
3067 int sz = alpha_got_entry_size (r_type);
3068 alpha_elf_tdata (info->gotobj)->total_got_size -= sz;
3069 if (!info->h)
3070 alpha_elf_tdata (info->gotobj)->local_got_size -= sz;
252b5132 3071 }
252b5132 3072
a7519a3c
RH
3073 /* Smash the existing GOT relocation for its 16-bit immediate pair. */
3074 irel->r_info = ELF64_R_INFO (ELF64_R_SYM (irel->r_info), r_type);
0a1b45a2 3075 info->changed_relocs = true;
a7519a3c
RH
3076
3077 /* ??? Search forward through this basic block looking for insns
3078 that use the target register. Stop after an insn modifying the
3079 register is seen, or after a branch or call.
252b5132 3080
a7519a3c
RH
3081 Any such memory load insn may be substituted by a load directly
3082 off the GP. This allows the memory load insn to be issued before
3083 the calculated GP register would otherwise be ready.
252b5132 3084
a7519a3c
RH
3085 Any such jsr insn can be replaced by a bsr if it is in range.
3086
3087 This would mean that we'd have to _add_ relocations, the pain of
3088 which gives one pause. */
252b5132 3089
0a1b45a2 3090 return true;
252b5132
RH
3091}
3092
a7519a3c
RH
3093static bfd_vma
3094elf64_alpha_relax_opt_call (struct alpha_relax_info *info, bfd_vma symval)
252b5132 3095{
a7519a3c
RH
3096 /* If the function has the same gp, and we can identify that the
3097 function does not use its function pointer, we can eliminate the
3098 address load. */
252b5132 3099
a7519a3c
RH
3100 /* If the symbol is marked NOPV, we are being told the function never
3101 needs its procedure value. */
3102 if ((info->other & STO_ALPHA_STD_GPLOAD) == STO_ALPHA_NOPV)
3103 return symval;
252b5132 3104
a7519a3c
RH
3105 /* If the symbol is marked STD_GP, we are being told the function does
3106 a normal ldgp in the first two words. */
3107 else if ((info->other & STO_ALPHA_STD_GPLOAD) == STO_ALPHA_STD_GPLOAD)
3108 ;
252b5132 3109
a7519a3c
RH
3110 /* Otherwise, we may be able to identify a GP load in the first two
3111 words, which we can then skip. */
3112 else
252b5132 3113 {
a7519a3c
RH
3114 Elf_Internal_Rela *tsec_relocs, *tsec_relend, *tsec_free, *gpdisp;
3115 bfd_vma ofs;
252b5132 3116
a7519a3c
RH
3117 /* Load the relocations from the section that the target symbol is in. */
3118 if (info->sec == info->tsec)
252b5132 3119 {
a7519a3c
RH
3120 tsec_relocs = info->relocs;
3121 tsec_relend = info->relend;
3122 tsec_free = NULL;
3123 }
3124 else
3125 {
3126 tsec_relocs = (_bfd_elf_link_read_relocs
07d6d2b8 3127 (info->abfd, info->tsec, NULL,
a7519a3c
RH
3128 (Elf_Internal_Rela *) NULL,
3129 info->link_info->keep_memory));
3130 if (tsec_relocs == NULL)
3131 return 0;
3132 tsec_relend = tsec_relocs + info->tsec->reloc_count;
ae4fda66
JC
3133 tsec_free = (elf_section_data (info->tsec)->relocs == tsec_relocs
3134 ? NULL
3135 : tsec_relocs);
a7519a3c 3136 }
252b5132 3137
a7519a3c
RH
3138 /* Recover the symbol's offset within the section. */
3139 ofs = (symval - info->tsec->output_section->vma
3140 - info->tsec->output_offset);
252b5132 3141
a7519a3c
RH
3142 /* Look for a GPDISP reloc. */
3143 gpdisp = (elf64_alpha_find_reloc_at_ofs
3144 (tsec_relocs, tsec_relend, ofs, R_ALPHA_GPDISP));
252b5132 3145
a7519a3c
RH
3146 if (!gpdisp || gpdisp->r_addend != 4)
3147 {
c9594989 3148 free (tsec_free);
a7519a3c 3149 return 0;
252b5132 3150 }
c9594989 3151 free (tsec_free);
252b5132
RH
3152 }
3153
a7519a3c
RH
3154 /* We've now determined that we can skip an initial gp load. Verify
3155 that the call and the target use the same gp. */
f13a99db 3156 if (info->link_info->output_bfd->xvec != info->tsec->owner->xvec
a7519a3c
RH
3157 || info->gotobj != alpha_elf_tdata (info->tsec->owner)->gotobj)
3158 return 0;
252b5132 3159
a7519a3c
RH
3160 return symval + 8;
3161}
252b5132 3162
0a1b45a2 3163static bool
a7519a3c
RH
3164elf64_alpha_relax_with_lituse (struct alpha_relax_info *info,
3165 bfd_vma symval, Elf_Internal_Rela *irel)
252b5132 3166{
d1c109de
RH
3167 Elf_Internal_Rela *urel, *erel, *irelend = info->relend;
3168 int flags;
a7519a3c 3169 bfd_signed_vma disp;
0a1b45a2
AM
3170 bool fits16;
3171 bool fits32;
3172 bool lit_reused = false;
3173 bool all_optimized = true;
3174 bool changed_contents;
3175 bool changed_relocs;
d1c109de
RH
3176 bfd_byte *contents = info->contents;
3177 bfd *abfd = info->abfd;
3178 bfd_vma sec_output_vma;
a7519a3c 3179 unsigned int lit_insn;
d1c109de 3180 int relax_pass;
252b5132 3181
d1c109de 3182 lit_insn = bfd_get_32 (abfd, contents + irel->r_offset);
a7519a3c
RH
3183 if (lit_insn >> 26 != OP_LDQ)
3184 {
4eca0228 3185 _bfd_error_handler
695344c0 3186 /* xgettext:c-format */
2dcf00ce 3187 (_("%pB: %pA+%#" PRIx64 ": warning: "
38f14ab8
AM
3188 "%s relocation against unexpected insn"),
3189 abfd, info->sec, (uint64_t) irel->r_offset, "LITERAL");
0a1b45a2 3190 return true;
a7519a3c 3191 }
252b5132 3192
a7519a3c
RH
3193 /* Can't relax dynamic symbols. */
3194 if (alpha_elf_dynamic_symbol_p (&info->h->root, info->link_info))
0a1b45a2 3195 return true;
a7519a3c 3196
d1c109de
RH
3197 changed_contents = info->changed_contents;
3198 changed_relocs = info->changed_relocs;
3199 sec_output_vma = info->sec->output_section->vma + info->sec->output_offset;
3200 relax_pass = info->link_info->relax_pass;
3201
a7519a3c 3202 /* Summarize how this particular LITERAL is used. */
d1c109de 3203 for (erel = irel+1, flags = 0; erel < irelend; ++erel)
252b5132 3204 {
d1c109de 3205 if (ELF64_R_TYPE (erel->r_info) != R_ALPHA_LITUSE)
a7519a3c 3206 break;
d1c109de
RH
3207 if (erel->r_addend <= 6)
3208 flags |= 1 << erel->r_addend;
a7519a3c 3209 }
252b5132 3210
a7519a3c
RH
3211 /* A little preparation for the loop... */
3212 disp = symval - info->gp;
252b5132 3213
d1c109de 3214 for (urel = irel+1; urel < erel; ++urel)
a7519a3c 3215 {
d1c109de 3216 bfd_vma urel_r_offset = urel->r_offset;
a7519a3c
RH
3217 unsigned int insn;
3218 int insn_disp;
3219 bfd_signed_vma xdisp;
d1c109de 3220 Elf_Internal_Rela nrel;
252b5132 3221
d1c109de 3222 insn = bfd_get_32 (abfd, contents + urel_r_offset);
252b5132 3223
a7519a3c
RH
3224 switch (urel->r_addend)
3225 {
3226 case LITUSE_ALPHA_ADDR:
3227 default:
3228 /* This type is really just a placeholder to note that all
3229 uses cannot be optimized, but to still allow some. */
0a1b45a2 3230 all_optimized = false;
a7519a3c 3231 break;
252b5132 3232
a7519a3c 3233 case LITUSE_ALPHA_BASE:
d1c109de
RH
3234 /* We may only create GPREL relocs during the second pass. */
3235 if (relax_pass == 0)
3236 {
0a1b45a2 3237 all_optimized = false;
d1c109de
RH
3238 break;
3239 }
3240
a7519a3c 3241 /* We can always optimize 16-bit displacements. */
252b5132 3242
a7519a3c
RH
3243 /* Extract the displacement from the instruction, sign-extending
3244 it if necessary, then test whether it is within 16 or 32 bits
3245 displacement from GP. */
3246 insn_disp = ((insn & 0xffff) ^ 0x8000) - 0x8000;
3247
3248 xdisp = disp + insn_disp;
3249 fits16 = (xdisp >= - (bfd_signed_vma) 0x8000 && xdisp < 0x8000);
3250 fits32 = (xdisp >= - (bfd_signed_vma) 0x80000000
3251 && xdisp < 0x7fff8000);
3252
3253 if (fits16)
3254 {
3255 /* Take the op code and dest from this insn, take the base
3256 register from the literal insn. Leave the offset alone. */
3257 insn = (insn & 0xffe0ffff) | (lit_insn & 0x001f0000);
d1c109de 3258 bfd_put_32 (abfd, (bfd_vma) insn, contents + urel_r_offset);
0a1b45a2 3259 changed_contents = true;
d1c109de
RH
3260
3261 nrel = *urel;
3262 nrel.r_info = ELF64_R_INFO (ELF64_R_SYM (irel->r_info),
3263 R_ALPHA_GPREL16);
3264 nrel.r_addend = irel->r_addend;
3265
3266 /* As we adjust, move the reloc to the end so that we don't
07d6d2b8 3267 break the LITERAL+LITUSE chain. */
d1c109de 3268 if (urel < --erel)
07d6d2b8 3269 *urel-- = *erel;
d1c109de 3270 *erel = nrel;
0a1b45a2 3271 changed_relocs = true;
252b5132 3272 }
252b5132 3273
a7519a3c
RH
3274 /* If all mem+byte, we can optimize 32-bit mem displacements. */
3275 else if (fits32 && !(flags & ~6))
3276 {
3277 /* FIXME: sanity check that lit insn Ra is mem insn Rb. */
252b5132 3278
a7519a3c
RH
3279 irel->r_info = ELF64_R_INFO (ELF64_R_SYM (irel->r_info),
3280 R_ALPHA_GPRELHIGH);
3281 lit_insn = (OP_LDAH << 26) | (lit_insn & 0x03ff0000);
d1c109de 3282 bfd_put_32 (abfd, (bfd_vma) lit_insn, contents + irel->r_offset);
0a1b45a2
AM
3283 lit_reused = true;
3284 changed_contents = true;
252b5132 3285
07d6d2b8
AM
3286 /* Since all relocs must be optimized, don't bother swapping
3287 this relocation to the end. */
a7519a3c
RH
3288 urel->r_info = ELF64_R_INFO (ELF64_R_SYM (irel->r_info),
3289 R_ALPHA_GPRELLOW);
3290 urel->r_addend = irel->r_addend;
0a1b45a2 3291 changed_relocs = true;
a7519a3c
RH
3292 }
3293 else
0a1b45a2 3294 all_optimized = false;
a7519a3c 3295 break;
252b5132 3296
a7519a3c
RH
3297 case LITUSE_ALPHA_BYTOFF:
3298 /* We can always optimize byte instructions. */
252b5132 3299
a7519a3c
RH
3300 /* FIXME: sanity check the insn for byte op. Check that the
3301 literal dest reg is indeed Rb in the byte insn. */
252b5132 3302
a7519a3c
RH
3303 insn &= ~ (unsigned) 0x001ff000;
3304 insn |= ((symval & 7) << 13) | 0x1000;
d1c109de 3305 bfd_put_32 (abfd, (bfd_vma) insn, contents + urel_r_offset);
0a1b45a2 3306 changed_contents = true;
d1c109de
RH
3307
3308 nrel = *urel;
3309 nrel.r_info = ELF64_R_INFO (0, R_ALPHA_NONE);
3310 nrel.r_addend = 0;
3311
3312 /* As we adjust, move the reloc to the end so that we don't
3313 break the LITERAL+LITUSE chain. */
3314 if (urel < --erel)
3315 *urel-- = *erel;
3316 *erel = nrel;
0a1b45a2 3317 changed_relocs = true;
a7519a3c 3318 break;
252b5132 3319
a7519a3c
RH
3320 case LITUSE_ALPHA_JSR:
3321 case LITUSE_ALPHA_TLSGD:
3322 case LITUSE_ALPHA_TLSLDM:
8288a39e 3323 case LITUSE_ALPHA_JSRDIRECT:
0d5f9994 3324 {
a7519a3c
RH
3325 bfd_vma optdest, org;
3326 bfd_signed_vma odisp;
252b5132 3327
a7519a3c
RH
3328 /* For undefined weak symbols, we're mostly interested in getting
3329 rid of the got entry whenever possible, so optimize this to a
3330 use of the zero register. */
3331 if (info->h && info->h->root.root.type == bfd_link_hash_undefweak)
3332 {
3333 insn |= 31 << 16;
d1c109de 3334 bfd_put_32 (abfd, (bfd_vma) insn, contents + urel_r_offset);
252b5132 3335
0a1b45a2 3336 changed_contents = true;
a7519a3c
RH
3337 break;
3338 }
252b5132 3339
a7519a3c
RH
3340 /* If not zero, place to jump without needing pv. */
3341 optdest = elf64_alpha_relax_opt_call (info, symval);
d1c109de 3342 org = sec_output_vma + urel_r_offset + 4;
a7519a3c 3343 odisp = (optdest ? optdest : symval) - org;
252b5132 3344
a7519a3c
RH
3345 if (odisp >= -0x400000 && odisp < 0x400000)
3346 {
3347 Elf_Internal_Rela *xrel;
252b5132 3348
a7519a3c
RH
3349 /* Preserve branch prediction call stack when possible. */
3350 if ((insn & INSN_JSR_MASK) == INSN_JSR)
3351 insn = (OP_BSR << 26) | (insn & 0x03e00000);
3352 else
3353 insn = (OP_BR << 26) | (insn & 0x03e00000);
d1c109de 3354 bfd_put_32 (abfd, (bfd_vma) insn, contents + urel_r_offset);
0a1b45a2 3355 changed_contents = true;
252b5132 3356
d1c109de
RH
3357 nrel = *urel;
3358 nrel.r_info = ELF64_R_INFO (ELF64_R_SYM (irel->r_info),
3359 R_ALPHA_BRADDR);
3360 nrel.r_addend = irel->r_addend;
252b5132 3361
a7519a3c 3362 if (optdest)
d1c109de 3363 nrel.r_addend += optdest - symval;
a7519a3c 3364 else
0a1b45a2 3365 all_optimized = false;
252b5132 3366
a7519a3c
RH
3367 /* Kill any HINT reloc that might exist for this insn. */
3368 xrel = (elf64_alpha_find_reloc_at_ofs
d1c109de 3369 (info->relocs, info->relend, urel_r_offset,
a7519a3c
RH
3370 R_ALPHA_HINT));
3371 if (xrel)
3372 xrel->r_info = ELF64_R_INFO (0, R_ALPHA_NONE);
252b5132 3373
d1c109de
RH
3374 /* As we adjust, move the reloc to the end so that we don't
3375 break the LITERAL+LITUSE chain. */
3376 if (urel < --erel)
3377 *urel-- = *erel;
3378 *erel = nrel;
3379
0a1b45a2 3380 info->changed_relocs = true;
a7519a3c
RH
3381 }
3382 else
0a1b45a2 3383 all_optimized = false;
252b5132 3384
a7519a3c
RH
3385 /* Even if the target is not in range for a direct branch,
3386 if we share a GP, we can eliminate the gp reload. */
3387 if (optdest)
3388 {
3389 Elf_Internal_Rela *gpdisp
3390 = (elf64_alpha_find_reloc_at_ofs
d1c109de 3391 (info->relocs, irelend, urel_r_offset + 4,
a7519a3c
RH
3392 R_ALPHA_GPDISP));
3393 if (gpdisp)
3394 {
d1c109de 3395 bfd_byte *p_ldah = contents + gpdisp->r_offset;
a7519a3c 3396 bfd_byte *p_lda = p_ldah + gpdisp->r_addend;
d1c109de
RH
3397 unsigned int ldah = bfd_get_32 (abfd, p_ldah);
3398 unsigned int lda = bfd_get_32 (abfd, p_lda);
252b5132 3399
a7519a3c
RH
3400 /* Verify that the instruction is "ldah $29,0($26)".
3401 Consider a function that ends in a noreturn call,
3402 and that the next function begins with an ldgp,
3403 and that by accident there is no padding between.
3404 In that case the insn would use $27 as the base. */
3405 if (ldah == 0x27ba0000 && lda == 0x23bd0000)
3406 {
d1c109de
RH
3407 bfd_put_32 (abfd, (bfd_vma) INSN_UNOP, p_ldah);
3408 bfd_put_32 (abfd, (bfd_vma) INSN_UNOP, p_lda);
252b5132 3409
a7519a3c 3410 gpdisp->r_info = ELF64_R_INFO (0, R_ALPHA_NONE);
0a1b45a2
AM
3411 changed_contents = true;
3412 changed_relocs = true;
a7519a3c
RH
3413 }
3414 }
3415 }
3416 }
3417 break;
252b5132 3418 }
252b5132
RH
3419 }
3420
d1c109de
RH
3421 /* If we reused the literal instruction, we must have optimized all. */
3422 BFD_ASSERT(!lit_reused || all_optimized);
3423
a7519a3c
RH
3424 /* If all cases were optimized, we can reduce the use count on this
3425 got entry by one, possibly eliminating it. */
3426 if (all_optimized)
252b5132 3427 {
a7519a3c 3428 if (--info->gotent->use_count == 0)
252b5132 3429 {
a7519a3c
RH
3430 int sz = alpha_got_entry_size (R_ALPHA_LITERAL);
3431 alpha_elf_tdata (info->gotobj)->total_got_size -= sz;
3432 if (!info->h)
3433 alpha_elf_tdata (info->gotobj)->local_got_size -= sz;
252b5132 3434 }
a7519a3c
RH
3435
3436 /* If the literal instruction is no longer needed (it may have been
3437 reused. We can eliminate it. */
3438 /* ??? For now, I don't want to deal with compacting the section,
3439 so just nop it out. */
3440 if (!lit_reused)
252b5132 3441 {
a7519a3c 3442 irel->r_info = ELF64_R_INFO (0, R_ALPHA_NONE);
0a1b45a2 3443 changed_relocs = true;
252b5132 3444
d1c109de 3445 bfd_put_32 (abfd, (bfd_vma) INSN_UNOP, contents + irel->r_offset);
0a1b45a2 3446 changed_contents = true;
a7519a3c 3447 }
a7519a3c 3448 }
d1c109de
RH
3449
3450 info->changed_contents = changed_contents;
3451 info->changed_relocs = changed_relocs;
3452
3453 if (all_optimized || relax_pass == 0)
0a1b45a2 3454 return true;
d1c109de 3455 return elf64_alpha_relax_got_load (info, symval, irel, R_ALPHA_LITERAL);
252b5132
RH
3456}
3457
0a1b45a2 3458static bool
a7519a3c 3459elf64_alpha_relax_tls_get_addr (struct alpha_relax_info *info, bfd_vma symval,
0a1b45a2 3460 Elf_Internal_Rela *irel, bool is_gd)
f44f99a5 3461{
a7519a3c 3462 bfd_byte *pos[5];
891caa9b 3463 unsigned int insn, tlsgd_reg;
a7519a3c 3464 Elf_Internal_Rela *gpdisp, *hint;
0a1b45a2 3465 bool dynamic, use_gottprel;
a7519a3c 3466 unsigned long new_symndx;
f44f99a5 3467
c415c83b
AM
3468 dynamic = (info->h != NULL
3469 && alpha_elf_dynamic_symbol_p (&info->h->root, info->link_info));
f44f99a5 3470
a7519a3c
RH
3471 /* If a TLS symbol is accessed using IE at least once, there is no point
3472 to use dynamic model for it. */
3473 if (is_gd && info->h && (info->h->flags & ALPHA_ELF_LINK_HASH_TLS_IE))
3474 ;
f44f99a5 3475
a7519a3c
RH
3476 /* If the symbol is local, and we've already committed to DF_STATIC_TLS,
3477 then we might as well relax to IE. */
0e1862bb 3478 else if (bfd_link_pic (info->link_info) && !dynamic
a7519a3c
RH
3479 && (info->link_info->flags & DF_STATIC_TLS))
3480 ;
f44f99a5 3481
a7519a3c 3482 /* Otherwise we must be building an executable to do anything. */
0e1862bb 3483 else if (bfd_link_pic (info->link_info))
0a1b45a2 3484 return true;
f44f99a5 3485
a7519a3c
RH
3486 /* The TLSGD/TLSLDM relocation must be followed by a LITERAL and
3487 the matching LITUSE_TLS relocations. */
3488 if (irel + 2 >= info->relend)
0a1b45a2 3489 return true;
a7519a3c
RH
3490 if (ELF64_R_TYPE (irel[1].r_info) != R_ALPHA_LITERAL
3491 || ELF64_R_TYPE (irel[2].r_info) != R_ALPHA_LITUSE
3492 || irel[2].r_addend != (is_gd ? LITUSE_ALPHA_TLSGD : LITUSE_ALPHA_TLSLDM))
0a1b45a2 3493 return true;
f44f99a5 3494
a7519a3c
RH
3495 /* There must be a GPDISP relocation positioned immediately after the
3496 LITUSE relocation. */
3497 gpdisp = elf64_alpha_find_reloc_at_ofs (info->relocs, info->relend,
3498 irel[2].r_offset + 4, R_ALPHA_GPDISP);
3499 if (!gpdisp)
0a1b45a2 3500 return true;
f44f99a5 3501
a7519a3c
RH
3502 pos[0] = info->contents + irel[0].r_offset;
3503 pos[1] = info->contents + irel[1].r_offset;
3504 pos[2] = info->contents + irel[2].r_offset;
3505 pos[3] = info->contents + gpdisp->r_offset;
3506 pos[4] = pos[3] + gpdisp->r_addend;
f44f99a5 3507
7dbf3b76
RH
3508 /* Beware of the compiler hoisting part of the sequence out a loop
3509 and adjusting the destination register for the TLSGD insn. If this
3510 happens, there will be a move into $16 before the JSR insn, so only
3511 transformations of the first insn pair should use this register. */
3512 tlsgd_reg = bfd_get_32 (info->abfd, pos[0]);
3513 tlsgd_reg = (tlsgd_reg >> 21) & 31;
3514
a7519a3c
RH
3515 /* Generally, the positions are not allowed to be out of order, lest the
3516 modified insn sequence have different register lifetimes. We can make
3517 an exception when pos 1 is adjacent to pos 0. */
3518 if (pos[1] + 4 == pos[0])
f44f99a5 3519 {
a7519a3c
RH
3520 bfd_byte *tmp = pos[0];
3521 pos[0] = pos[1];
3522 pos[1] = tmp;
f44f99a5 3523 }
a7519a3c 3524 if (pos[1] >= pos[2] || pos[2] >= pos[3])
0a1b45a2 3525 return true;
cc03ec80 3526
a7519a3c
RH
3527 /* Reduce the use count on the LITERAL relocation. Do this before we
3528 smash the symndx when we adjust the relocations below. */
3529 {
3530 struct alpha_elf_got_entry *lit_gotent;
3531 struct alpha_elf_link_hash_entry *lit_h;
3532 unsigned long indx;
f44f99a5 3533
a7519a3c
RH
3534 BFD_ASSERT (ELF64_R_SYM (irel[1].r_info) >= info->symtab_hdr->sh_info);
3535 indx = ELF64_R_SYM (irel[1].r_info) - info->symtab_hdr->sh_info;
3536 lit_h = alpha_elf_sym_hashes (info->abfd)[indx];
f44f99a5 3537
a7519a3c
RH
3538 while (lit_h->root.root.type == bfd_link_hash_indirect
3539 || lit_h->root.root.type == bfd_link_hash_warning)
3540 lit_h = (struct alpha_elf_link_hash_entry *) lit_h->root.root.u.i.link;
252b5132 3541
a7519a3c
RH
3542 for (lit_gotent = lit_h->got_entries; lit_gotent ;
3543 lit_gotent = lit_gotent->next)
3544 if (lit_gotent->gotobj == info->gotobj
3545 && lit_gotent->reloc_type == R_ALPHA_LITERAL
3546 && lit_gotent->addend == irel[1].r_addend)
3547 break;
3548 BFD_ASSERT (lit_gotent);
252b5132 3549
a7519a3c
RH
3550 if (--lit_gotent->use_count == 0)
3551 {
3552 int sz = alpha_got_entry_size (R_ALPHA_LITERAL);
3553 alpha_elf_tdata (info->gotobj)->total_got_size -= sz;
3554 }
3555 }
252b5132 3556
a7519a3c 3557 /* Change
252b5132 3558
a7519a3c
RH
3559 lda $16,x($gp) !tlsgd!1
3560 ldq $27,__tls_get_addr($gp) !literal!1
3561 jsr $26,($27),__tls_get_addr !lituse_tlsgd!1
3562 ldah $29,0($26) !gpdisp!2
3563 lda $29,0($29) !gpdisp!2
3564 to
3565 ldq $16,x($gp) !gottprel
3566 unop
3567 call_pal rduniq
3568 addq $16,$0,$0
3569 unop
3570 or the first pair to
3571 lda $16,x($gp) !tprel
3572 unop
3573 or
3574 ldah $16,x($gp) !tprelhi
3575 lda $16,x($16) !tprello
3576
3577 as appropriate. */
3578
0a1b45a2 3579 use_gottprel = false;
cf35638d 3580 new_symndx = is_gd ? ELF64_R_SYM (irel->r_info) : STN_UNDEF;
891caa9b 3581
9a757e4d
RM
3582 /* Some compilers warn about a Boolean-looking expression being
3583 used in a switch. The explicit cast silences them. */
0e1862bb 3584 switch ((int) (!dynamic && !bfd_link_pic (info->link_info)))
252b5132 3585 {
a7519a3c
RH
3586 case 1:
3587 {
3588 bfd_vma tp_base;
3589 bfd_signed_vma disp;
252b5132 3590
a7519a3c
RH
3591 BFD_ASSERT (elf_hash_table (info->link_info)->tls_sec != NULL);
3592 tp_base = alpha_get_tprel_base (info->link_info);
3593 disp = symval - tp_base;
252b5132 3594
a7519a3c
RH
3595 if (disp >= -0x8000 && disp < 0x8000)
3596 {
891caa9b 3597 insn = (OP_LDA << 26) | (tlsgd_reg << 21) | (31 << 16);
a7519a3c
RH
3598 bfd_put_32 (info->abfd, (bfd_vma) insn, pos[0]);
3599 bfd_put_32 (info->abfd, (bfd_vma) INSN_UNOP, pos[1]);
3765b1be 3600
a7519a3c
RH
3601 irel[0].r_offset = pos[0] - info->contents;
3602 irel[0].r_info = ELF64_R_INFO (new_symndx, R_ALPHA_TPREL16);
3603 irel[1].r_info = ELF64_R_INFO (0, R_ALPHA_NONE);
3604 break;
3605 }
3606 else if (disp >= -(bfd_signed_vma) 0x80000000
3607 && disp < (bfd_signed_vma) 0x7fff8000
891caa9b 3608 && pos[0] + 4 == pos[1])
a7519a3c 3609 {
891caa9b 3610 insn = (OP_LDAH << 26) | (tlsgd_reg << 21) | (31 << 16);
a7519a3c 3611 bfd_put_32 (info->abfd, (bfd_vma) insn, pos[0]);
891caa9b 3612 insn = (OP_LDA << 26) | (tlsgd_reg << 21) | (tlsgd_reg << 16);
a7519a3c 3613 bfd_put_32 (info->abfd, (bfd_vma) insn, pos[1]);
3765b1be 3614
a7519a3c
RH
3615 irel[0].r_offset = pos[0] - info->contents;
3616 irel[0].r_info = ELF64_R_INFO (new_symndx, R_ALPHA_TPRELHI);
3617 irel[1].r_offset = pos[1] - info->contents;
3618 irel[1].r_info = ELF64_R_INFO (new_symndx, R_ALPHA_TPRELLO);
3619 break;
3620 }
3621 }
3622 /* FALLTHRU */
3765b1be 3623
3765b1be 3624 default:
0a1b45a2 3625 use_gottprel = true;
a7519a3c 3626
891caa9b 3627 insn = (OP_LDQ << 26) | (tlsgd_reg << 21) | (29 << 16);
a7519a3c
RH
3628 bfd_put_32 (info->abfd, (bfd_vma) insn, pos[0]);
3629 bfd_put_32 (info->abfd, (bfd_vma) INSN_UNOP, pos[1]);
3630
3631 irel[0].r_offset = pos[0] - info->contents;
3632 irel[0].r_info = ELF64_R_INFO (new_symndx, R_ALPHA_GOTTPREL);
3633 irel[1].r_info = ELF64_R_INFO (0, R_ALPHA_NONE);
3634 break;
3765b1be 3635 }
3765b1be 3636
a7519a3c 3637 bfd_put_32 (info->abfd, (bfd_vma) INSN_RDUNIQ, pos[2]);
252b5132 3638
a7519a3c
RH
3639 insn = INSN_ADDQ | (16 << 21) | (0 << 16) | (0 << 0);
3640 bfd_put_32 (info->abfd, (bfd_vma) insn, pos[3]);
3765b1be 3641
a7519a3c 3642 bfd_put_32 (info->abfd, (bfd_vma) INSN_UNOP, pos[4]);
e92d460e 3643
a7519a3c
RH
3644 irel[2].r_info = ELF64_R_INFO (0, R_ALPHA_NONE);
3645 gpdisp->r_info = ELF64_R_INFO (0, R_ALPHA_NONE);
252b5132 3646
a7519a3c
RH
3647 hint = elf64_alpha_find_reloc_at_ofs (info->relocs, info->relend,
3648 irel[2].r_offset, R_ALPHA_HINT);
3649 if (hint)
3650 hint->r_info = ELF64_R_INFO (0, R_ALPHA_NONE);
252b5132 3651
0a1b45a2
AM
3652 info->changed_contents = true;
3653 info->changed_relocs = true;
d6ad34f6 3654
a7519a3c
RH
3655 /* Reduce the use count on the TLSGD/TLSLDM relocation. */
3656 if (--info->gotent->use_count == 0)
3765b1be 3657 {
a7519a3c
RH
3658 int sz = alpha_got_entry_size (info->gotent->reloc_type);
3659 alpha_elf_tdata (info->gotobj)->total_got_size -= sz;
3660 if (!info->h)
3661 alpha_elf_tdata (info->gotobj)->local_got_size -= sz;
3765b1be 3662 }
252b5132 3663
a7519a3c
RH
3664 /* If we've switched to a GOTTPREL relocation, increment the reference
3665 count on that got entry. */
3666 if (use_gottprel)
f44f99a5 3667 {
a7519a3c 3668 struct alpha_elf_got_entry *tprel_gotent;
f44f99a5 3669
a7519a3c
RH
3670 for (tprel_gotent = *info->first_gotent; tprel_gotent ;
3671 tprel_gotent = tprel_gotent->next)
3672 if (tprel_gotent->gotobj == info->gotobj
3673 && tprel_gotent->reloc_type == R_ALPHA_GOTTPREL
3674 && tprel_gotent->addend == irel->r_addend)
3675 break;
3676 if (tprel_gotent)
3677 tprel_gotent->use_count++;
3678 else
f44f99a5 3679 {
a7519a3c
RH
3680 if (info->gotent->use_count == 0)
3681 tprel_gotent = info->gotent;
3682 else
3683 {
3684 tprel_gotent = (struct alpha_elf_got_entry *)
3685 bfd_alloc (info->abfd, sizeof (struct alpha_elf_got_entry));
3686 if (!tprel_gotent)
0a1b45a2 3687 return false;
f44f99a5 3688
a7519a3c
RH
3689 tprel_gotent->next = *info->first_gotent;
3690 *info->first_gotent = tprel_gotent;
f44f99a5 3691
a7519a3c
RH
3692 tprel_gotent->gotobj = info->gotobj;
3693 tprel_gotent->addend = irel->r_addend;
3694 tprel_gotent->got_offset = -1;
3695 tprel_gotent->reloc_done = 0;
3696 tprel_gotent->reloc_xlated = 0;
3697 }
f44f99a5 3698
a7519a3c
RH
3699 tprel_gotent->use_count = 1;
3700 tprel_gotent->reloc_type = R_ALPHA_GOTTPREL;
3701 }
f44f99a5 3702 }
f44f99a5 3703
0a1b45a2 3704 return true;
f44f99a5
RH
3705}
3706
0a1b45a2 3707static bool
a7519a3c 3708elf64_alpha_relax_section (bfd *abfd, asection *sec,
0a1b45a2 3709 struct bfd_link_info *link_info, bool *again)
f44f99a5 3710{
a7519a3c
RH
3711 Elf_Internal_Shdr *symtab_hdr;
3712 Elf_Internal_Rela *internal_relocs;
3713 Elf_Internal_Rela *irel, *irelend;
3714 Elf_Internal_Sym *isymbuf = NULL;
3715 struct alpha_elf_got_entry **local_got_entries;
3716 struct alpha_relax_info info;
4dfe6ac6 3717 struct alpha_elf_link_hash_table * htab;
d1c109de 3718 int relax_pass;
4dfe6ac6
NC
3719
3720 htab = alpha_elf_hash_table (link_info);
3721 if (htab == NULL)
0a1b45a2 3722 return false;
f44f99a5 3723
4a828aab 3724 /* There's nothing to change, yet. */
0a1b45a2 3725 *again = false;
f44f99a5 3726
0e1862bb 3727 if (bfd_link_relocatable (link_info)
a7519a3c
RH
3728 || ((sec->flags & (SEC_CODE | SEC_RELOC | SEC_ALLOC))
3729 != (SEC_CODE | SEC_RELOC | SEC_ALLOC))
3730 || sec->reloc_count == 0)
0a1b45a2 3731 return true;
d6ad34f6 3732
0ffa91dd 3733 BFD_ASSERT (is_alpha_elf (abfd));
d1c109de 3734 relax_pass = link_info->relax_pass;
0ffa91dd 3735
4a828aab 3736 /* Make sure our GOT and PLT tables are up-to-date. */
4dfe6ac6 3737 if (htab->relax_trip != link_info->relax_trip)
4a828aab 3738 {
4dfe6ac6 3739 htab->relax_trip = link_info->relax_trip;
4a828aab 3740
d1c109de 3741 /* This should never fail after the initial round, since the only error
07d6d2b8 3742 is GOT overflow, and relaxation only shrinks the table. However, we
d1c109de
RH
3743 may only merge got sections during the first pass. If we merge
3744 sections after we've created GPREL relocs, the GP for the merged
3745 section backs up which may put the relocs out of range. */
3746 if (!elf64_alpha_size_got_sections (link_info, relax_pass == 0))
4a828aab
RH
3747 abort ();
3748 if (elf_hash_table (link_info)->dynamic_sections_created)
3749 {
3750 elf64_alpha_size_plt_section (link_info);
3751 elf64_alpha_size_rela_got_section (link_info);
3752 }
3753 }
3754
0ffa91dd 3755 symtab_hdr = &elf_symtab_hdr (abfd);
a7519a3c 3756 local_got_entries = alpha_elf_tdata(abfd)->local_got_entries;
252b5132 3757
a7519a3c
RH
3758 /* Load the relocations for this section. */
3759 internal_relocs = (_bfd_elf_link_read_relocs
2c3fc389 3760 (abfd, sec, NULL, (Elf_Internal_Rela *) NULL,
a7519a3c
RH
3761 link_info->keep_memory));
3762 if (internal_relocs == NULL)
0a1b45a2 3763 return false;
252b5132 3764
a7519a3c
RH
3765 memset(&info, 0, sizeof (info));
3766 info.abfd = abfd;
3767 info.sec = sec;
3768 info.link_info = link_info;
3769 info.symtab_hdr = symtab_hdr;
3770 info.relocs = internal_relocs;
3771 info.relend = irelend = internal_relocs + sec->reloc_count;
3772
3773 /* Find the GP for this object. Do not store the result back via
3774 _bfd_set_gp_value, since this could change again before final. */
3775 info.gotobj = alpha_elf_tdata (abfd)->gotobj;
3776 if (info.gotobj)
3765b1be 3777 {
a7519a3c
RH
3778 asection *sgot = alpha_elf_tdata (info.gotobj)->got;
3779 info.gp = (sgot->output_section->vma
3780 + sgot->output_offset
3781 + 0x8000);
252b5132
RH
3782 }
3783
a7519a3c
RH
3784 /* Get the section contents. */
3785 if (elf_section_data (sec)->this_hdr.contents != NULL)
3786 info.contents = elf_section_data (sec)->this_hdr.contents;
3787 else
3788 {
3789 if (!bfd_malloc_and_get_section (abfd, sec, &info.contents))
3790 goto error_return;
3791 }
252b5132 3792
a7519a3c
RH
3793 for (irel = internal_relocs; irel < irelend; irel++)
3794 {
3795 bfd_vma symval;
3796 struct alpha_elf_got_entry *gotent;
3797 unsigned long r_type = ELF64_R_TYPE (irel->r_info);
3798 unsigned long r_symndx = ELF64_R_SYM (irel->r_info);
3799
3800 /* Early exit for unhandled or unrelaxable relocations. */
d1c109de 3801 if (r_type != R_ALPHA_LITERAL)
07d6d2b8
AM
3802 {
3803 /* We complete everything except LITERAL in the first pass. */
d1c109de
RH
3804 if (relax_pass != 0)
3805 continue;
3806 if (r_type == R_ALPHA_TLSLDM)
3807 {
3808 /* The symbol for a TLSLDM reloc is ignored. Collapse the
07d6d2b8 3809 reloc to the STN_UNDEF (0) symbol so that they all match. */
d1c109de
RH
3810 r_symndx = STN_UNDEF;
3811 }
3812 else if (r_type != R_ALPHA_GOTDTPREL
07d6d2b8 3813 && r_type != R_ALPHA_GOTTPREL
d1c109de
RH
3814 && r_type != R_ALPHA_TLSGD)
3815 continue;
a7519a3c
RH
3816 }
3817
3818 /* Get the value of the symbol referred to by the reloc. */
3819 if (r_symndx < symtab_hdr->sh_info)
3820 {
3821 /* A local symbol. */
3822 Elf_Internal_Sym *isym;
3823
3824 /* Read this BFD's local symbols. */
3825 if (isymbuf == NULL)
3826 {
3827 isymbuf = (Elf_Internal_Sym *) symtab_hdr->contents;
3828 if (isymbuf == NULL)
3829 isymbuf = bfd_elf_get_elf_syms (abfd, symtab_hdr,
3830 symtab_hdr->sh_info, 0,
3831 NULL, NULL, NULL);
3832 if (isymbuf == NULL)
3833 goto error_return;
3834 }
252b5132 3835
a7519a3c 3836 isym = isymbuf + r_symndx;
252b5132 3837
a7519a3c
RH
3838 /* Given the symbol for a TLSLDM reloc is ignored, this also
3839 means forcing the symbol value to the tp base. */
3840 if (r_type == R_ALPHA_TLSLDM)
3841 {
3842 info.tsec = bfd_abs_section_ptr;
3843 symval = alpha_get_tprel_base (info.link_info);
3844 }
3845 else
3846 {
3847 symval = isym->st_value;
3848 if (isym->st_shndx == SHN_UNDEF)
07d6d2b8 3849 continue;
a7519a3c 3850 else if (isym->st_shndx == SHN_ABS)
07d6d2b8 3851 info.tsec = bfd_abs_section_ptr;
a7519a3c 3852 else if (isym->st_shndx == SHN_COMMON)
07d6d2b8 3853 info.tsec = bfd_com_section_ptr;
a7519a3c 3854 else
07d6d2b8 3855 info.tsec = bfd_section_from_elf_index (abfd, isym->st_shndx);
a7519a3c 3856 }
252b5132 3857
a7519a3c
RH
3858 info.h = NULL;
3859 info.other = isym->st_other;
3860 if (local_got_entries)
3861 info.first_gotent = &local_got_entries[r_symndx];
3862 else
3863 {
3864 info.first_gotent = &info.gotent;
3865 info.gotent = NULL;
3866 }
252b5132 3867 }
a7519a3c
RH
3868 else
3869 {
3870 unsigned long indx;
3871 struct alpha_elf_link_hash_entry *h;
252b5132 3872
a7519a3c
RH
3873 indx = r_symndx - symtab_hdr->sh_info;
3874 h = alpha_elf_sym_hashes (abfd)[indx];
3875 BFD_ASSERT (h != NULL);
252b5132 3876
a7519a3c
RH
3877 while (h->root.root.type == bfd_link_hash_indirect
3878 || h->root.root.type == bfd_link_hash_warning)
3879 h = (struct alpha_elf_link_hash_entry *)h->root.root.u.i.link;
252b5132 3880
a7519a3c
RH
3881 /* If the symbol is undefined, we can't do anything with it. */
3882 if (h->root.root.type == bfd_link_hash_undefined)
3883 continue;
252b5132 3884
a7519a3c
RH
3885 /* If the symbol isn't defined in the current module,
3886 again we can't do anything. */
3887 if (h->root.root.type == bfd_link_hash_undefweak)
3888 {
3889 info.tsec = bfd_abs_section_ptr;
3890 symval = 0;
3891 }
3892 else if (!h->root.def_regular)
3893 {
3894 /* Except for TLSGD relocs, which can sometimes be
3895 relaxed to GOTTPREL relocs. */
3896 if (r_type != R_ALPHA_TLSGD)
3897 continue;
3898 info.tsec = bfd_abs_section_ptr;
3899 symval = 0;
3900 }
3901 else
3902 {
3903 info.tsec = h->root.root.u.def.section;
3904 symval = h->root.root.u.def.value;
3905 }
252b5132 3906
a7519a3c
RH
3907 info.h = h;
3908 info.other = h->root.other;
3909 info.first_gotent = &h->got_entries;
3910 }
252b5132 3911
a7519a3c
RH
3912 /* Search for the got entry to be used by this relocation. */
3913 for (gotent = *info.first_gotent; gotent ; gotent = gotent->next)
3914 if (gotent->gotobj == info.gotobj
3915 && gotent->reloc_type == r_type
3916 && gotent->addend == irel->r_addend)
3917 break;
3918 info.gotent = gotent;
252b5132 3919
a7519a3c
RH
3920 symval += info.tsec->output_section->vma + info.tsec->output_offset;
3921 symval += irel->r_addend;
252b5132 3922
a7519a3c 3923 switch (r_type)
252b5132 3924 {
a7519a3c
RH
3925 case R_ALPHA_LITERAL:
3926 BFD_ASSERT(info.gotent != NULL);
252b5132 3927
a7519a3c
RH
3928 /* If there exist LITUSE relocations immediately following, this
3929 opens up all sorts of interesting optimizations, because we
3930 now know every location that this address load is used. */
3931 if (irel+1 < irelend
3932 && ELF64_R_TYPE (irel[1].r_info) == R_ALPHA_LITUSE)
252b5132 3933 {
a7519a3c
RH
3934 if (!elf64_alpha_relax_with_lituse (&info, symval, irel))
3935 goto error_return;
252b5132 3936 }
a7519a3c
RH
3937 else
3938 {
3939 if (!elf64_alpha_relax_got_load (&info, symval, irel, r_type))
3940 goto error_return;
3941 }
3942 break;
252b5132 3943
a7519a3c
RH
3944 case R_ALPHA_GOTDTPREL:
3945 case R_ALPHA_GOTTPREL:
3946 BFD_ASSERT(info.gotent != NULL);
3947 if (!elf64_alpha_relax_got_load (&info, symval, irel, r_type))
3948 goto error_return;
3949 break;
3950
3951 case R_ALPHA_TLSGD:
3952 case R_ALPHA_TLSLDM:
3953 BFD_ASSERT(info.gotent != NULL);
3954 if (!elf64_alpha_relax_tls_get_addr (&info, symval, irel,
3955 r_type == R_ALPHA_TLSGD))
3956 goto error_return;
3957 break;
252b5132
RH
3958 }
3959 }
3960
a7519a3c
RH
3961 if (isymbuf != NULL
3962 && symtab_hdr->contents != (unsigned char *) isymbuf)
3963 {
3964 if (!link_info->keep_memory)
3965 free (isymbuf);
3966 else
252b5132 3967 {
a7519a3c
RH
3968 /* Cache the symbols for elf_link_input_bfd. */
3969 symtab_hdr->contents = (unsigned char *) isymbuf;
252b5132 3970 }
a7519a3c 3971 }
252b5132 3972
a7519a3c
RH
3973 if (info.contents != NULL
3974 && elf_section_data (sec)->this_hdr.contents != info.contents)
3975 {
3976 if (!info.changed_contents && !link_info->keep_memory)
3977 free (info.contents);
3978 else
252b5132 3979 {
a7519a3c
RH
3980 /* Cache the section contents for elf_link_input_bfd. */
3981 elf_section_data (sec)->this_hdr.contents = info.contents;
252b5132 3982 }
a7519a3c 3983 }
252b5132 3984
a7519a3c
RH
3985 if (elf_section_data (sec)->relocs != internal_relocs)
3986 {
3987 if (!info.changed_relocs)
3988 free (internal_relocs);
3989 else
3990 elf_section_data (sec)->relocs = internal_relocs;
252b5132 3991 }
a7519a3c
RH
3992
3993 *again = info.changed_contents || info.changed_relocs;
252b5132 3994
0a1b45a2 3995 return true;
252b5132 3996
a7519a3c 3997 error_return:
c9594989 3998 if (symtab_hdr->contents != (unsigned char *) isymbuf)
a7519a3c 3999 free (isymbuf);
c9594989 4000 if (elf_section_data (sec)->this_hdr.contents != info.contents)
a7519a3c 4001 free (info.contents);
c9594989 4002 if (elf_section_data (sec)->relocs != internal_relocs)
a7519a3c 4003 free (internal_relocs);
0a1b45a2 4004 return false;
a7519a3c
RH
4005}
4006\f
1bbc9cec
RH
4007/* Emit a dynamic relocation for (DYNINDX, RTYPE, ADDEND) at (SEC, OFFSET)
4008 into the next available slot in SREL. */
4009
4010static void
a7519a3c
RH
4011elf64_alpha_emit_dynrel (bfd *abfd, struct bfd_link_info *info,
4012 asection *sec, asection *srel, bfd_vma offset,
4013 long dynindx, long rtype, bfd_vma addend)
1bbc9cec
RH
4014{
4015 Elf_Internal_Rela outrel;
4016 bfd_byte *loc;
4017
4018 BFD_ASSERT (srel != NULL);
4019
4020 outrel.r_info = ELF64_R_INFO (dynindx, rtype);
4021 outrel.r_addend = addend;
4022
4023 offset = _bfd_elf_section_offset (abfd, info, sec, offset);
4024 if ((offset | 1) != (bfd_vma) -1)
4025 outrel.r_offset = sec->output_section->vma + sec->output_offset + offset;
4026 else
4027 memset (&outrel, 0, sizeof (outrel));
4028
4029 loc = srel->contents;
4030 loc += srel->reloc_count++ * sizeof (Elf64_External_Rela);
4031 bfd_elf64_swap_reloca_out (abfd, &outrel, loc);
eea6121a 4032 BFD_ASSERT (sizeof (Elf64_External_Rela) * srel->reloc_count <= srel->size);
1bbc9cec
RH
4033}
4034
4a67a098
RH
4035/* Relocate an Alpha ELF section for a relocatable link.
4036
4037 We don't have to change anything unless the reloc is against a section
4038 symbol, in which case we have to adjust according to where the section
4039 symbol winds up in the output section. */
4040
0f684201 4041static int
a7519a3c
RH
4042elf64_alpha_relocate_section_r (bfd *output_bfd ATTRIBUTE_UNUSED,
4043 struct bfd_link_info *info ATTRIBUTE_UNUSED,
4044 bfd *input_bfd, asection *input_section,
4045 bfd_byte *contents ATTRIBUTE_UNUSED,
4046 Elf_Internal_Rela *relocs,
4047 Elf_Internal_Sym *local_syms,
4048 asection **local_sections)
4a67a098
RH
4049{
4050 unsigned long symtab_hdr_sh_info;
4051 Elf_Internal_Rela *rel;
4052 Elf_Internal_Rela *relend;
ab96bf03 4053 struct elf_link_hash_entry **sym_hashes;
0a1b45a2 4054 bool ret_val = true;
4a67a098 4055
0ffa91dd 4056 symtab_hdr_sh_info = elf_symtab_hdr (input_bfd).sh_info;
ab96bf03 4057 sym_hashes = elf_sym_hashes (input_bfd);
4a67a098
RH
4058
4059 relend = relocs + input_section->reloc_count;
4060 for (rel = relocs; rel < relend; rel++)
4061 {
4062 unsigned long r_symndx;
4063 Elf_Internal_Sym *sym;
4064 asection *sec;
4065 unsigned long r_type;
4066
ab96bf03 4067 r_type = ELF64_R_TYPE (rel->r_info);
4a67a098
RH
4068 if (r_type >= R_ALPHA_max)
4069 {
4eca0228 4070 _bfd_error_handler
695344c0 4071 /* xgettext:c-format */
0aa13fee 4072 (_("%pB: unsupported relocation type %#x"),
d003868e 4073 input_bfd, (int) r_type);
4a67a098 4074 bfd_set_error (bfd_error_bad_value);
0a1b45a2 4075 ret_val = false;
4a67a098
RH
4076 continue;
4077 }
4078
4a67a098
RH
4079 /* The symbol associated with GPDISP and LITUSE is
4080 immaterial. Only the addend is significant. */
4081 if (r_type == R_ALPHA_GPDISP || r_type == R_ALPHA_LITUSE)
4082 continue;
4083
ab96bf03 4084 r_symndx = ELF64_R_SYM (rel->r_info);
4a67a098
RH
4085 if (r_symndx < symtab_hdr_sh_info)
4086 {
4087 sym = local_syms + r_symndx;
ab96bf03 4088 sec = local_sections[r_symndx];
4a67a098 4089 }
ab96bf03
AM
4090 else
4091 {
4092 struct elf_link_hash_entry *h;
4093
4094 h = sym_hashes[r_symndx - symtab_hdr_sh_info];
4095
4096 while (h->root.type == bfd_link_hash_indirect
4097 || h->root.type == bfd_link_hash_warning)
4098 h = (struct elf_link_hash_entry *) h->root.u.i.link;
4099
4100 if (h->root.type != bfd_link_hash_defined
4101 && h->root.type != bfd_link_hash_defweak)
4102 continue;
4103
4104 sym = NULL;
4105 sec = h->root.u.def.section;
4106 }
4107
dbaa2011 4108 if (sec != NULL && discarded_section (sec))
e4067dbb 4109 RELOC_AGAINST_DISCARDED_SECTION (info, input_bfd, input_section,
545fd46b
MR
4110 rel, 1, relend,
4111 elf64_alpha_howto_table + r_type, 0,
e4067dbb 4112 contents);
ab96bf03
AM
4113
4114 if (sym != NULL && ELF_ST_TYPE (sym->st_info) == STT_SECTION)
4115 rel->r_addend += sec->output_offset;
4a67a098
RH
4116 }
4117
4118 return ret_val;
4119}
4120
252b5132
RH
4121/* Relocate an Alpha ELF section. */
4122
0f684201 4123static int
a7519a3c
RH
4124elf64_alpha_relocate_section (bfd *output_bfd, struct bfd_link_info *info,
4125 bfd *input_bfd, asection *input_section,
4126 bfd_byte *contents, Elf_Internal_Rela *relocs,
4127 Elf_Internal_Sym *local_syms,
4128 asection **local_sections)
252b5132 4129{
4a67a098 4130 Elf_Internal_Shdr *symtab_hdr;
252b5132
RH
4131 Elf_Internal_Rela *rel;
4132 Elf_Internal_Rela *relend;
4a67a098
RH
4133 asection *sgot, *srel, *srelgot;
4134 bfd *dynobj, *gotobj;
4135 bfd_vma gp, tp_base, dtp_base;
4136 struct alpha_elf_got_entry **local_got_entries;
0a1b45a2 4137 bool ret_val;
252b5132 4138
0ffa91dd 4139 BFD_ASSERT (is_alpha_elf (input_bfd));
68ffbac6 4140
4a67a098 4141 /* Handle relocatable links with a smaller loop. */
0e1862bb 4142 if (bfd_link_relocatable (info))
4a67a098
RH
4143 return elf64_alpha_relocate_section_r (output_bfd, info, input_bfd,
4144 input_section, contents, relocs,
4145 local_syms, local_sections);
4146
4147 /* This is a final link. */
4148
0a1b45a2 4149 ret_val = true;
252b5132 4150
0ffa91dd 4151 symtab_hdr = &elf_symtab_hdr (input_bfd);
3765b1be 4152
4a67a098 4153 dynobj = elf_hash_table (info)->dynobj;
ce558b89 4154 srelgot = elf_hash_table (info)->srelgot;
4a67a098 4155
3241278a
RH
4156 if (input_section->flags & SEC_ALLOC)
4157 {
4158 const char *section_name;
4159 section_name = (bfd_elf_string_from_elf_section
4160 (input_bfd, elf_elfheader(input_bfd)->e_shstrndx,
d4730f92 4161 _bfd_elf_single_rel_hdr (input_section)->sh_name));
3241278a 4162 BFD_ASSERT(section_name != NULL);
3d4d4302 4163 srel = bfd_get_linker_section (dynobj, section_name);
3241278a
RH
4164 }
4165 else
4166 srel = NULL;
3765b1be 4167
4a67a098
RH
4168 /* Find the gp value for this input bfd. */
4169 gotobj = alpha_elf_tdata (input_bfd)->gotobj;
4170 if (gotobj)
4171 {
4172 sgot = alpha_elf_tdata (gotobj)->got;
4173 gp = _bfd_get_gp_value (gotobj);
4174 if (gp == 0)
252b5132 4175 {
4a67a098
RH
4176 gp = (sgot->output_section->vma
4177 + sgot->output_offset
4178 + 0x8000);
4179 _bfd_set_gp_value (gotobj, gp);
4180 }
4181 }
4182 else
4183 {
4184 sgot = NULL;
4185 gp = 0;
4186 }
3765b1be 4187
4a67a098
RH
4188 local_got_entries = alpha_elf_tdata(input_bfd)->local_got_entries;
4189
e1918d23 4190 if (elf_hash_table (info)->tls_sec != NULL)
4a67a098 4191 {
e1918d23
AM
4192 dtp_base = alpha_get_dtprel_base (info);
4193 tp_base = alpha_get_tprel_base (info);
252b5132 4194 }
4a67a098
RH
4195 else
4196 dtp_base = tp_base = 0;
252b5132 4197
252b5132 4198 relend = relocs + input_section->reloc_count;
4a67a098 4199 for (rel = relocs; rel < relend; rel++)
252b5132 4200 {
4a67a098 4201 struct alpha_elf_link_hash_entry *h = NULL;
3765b1be
RH
4202 struct alpha_elf_got_entry *gotent;
4203 bfd_reloc_status_type r;
252b5132
RH
4204 reloc_howto_type *howto;
4205 unsigned long r_symndx;
4a67a098
RH
4206 Elf_Internal_Sym *sym = NULL;
4207 asection *sec = NULL;
3765b1be 4208 bfd_vma value;
dc810e39 4209 bfd_vma addend;
0a1b45a2
AM
4210 bool dynamic_symbol_p;
4211 bool unresolved_reloc = false;
4212 bool undef_weak_ref = false;
3765b1be 4213 unsigned long r_type;
252b5132
RH
4214
4215 r_type = ELF64_R_TYPE(rel->r_info);
3765b1be 4216 if (r_type >= R_ALPHA_max)
252b5132 4217 {
4eca0228 4218 _bfd_error_handler
695344c0 4219 /* xgettext:c-format */
0aa13fee 4220 (_("%pB: unsupported relocation type %#x"),
d003868e 4221 input_bfd, (int) r_type);
252b5132 4222 bfd_set_error (bfd_error_bad_value);
0a1b45a2 4223 ret_val = false;
3765b1be 4224 continue;
252b5132 4225 }
252b5132 4226
3765b1be 4227 howto = elf64_alpha_howto_table + r_type;
252b5132
RH
4228 r_symndx = ELF64_R_SYM(rel->r_info);
4229
cc03ec80 4230 /* The symbol for a TLSLDM reloc is ignored. Collapse the
cf35638d 4231 reloc to the STN_UNDEF (0) symbol so that they all match. */
cc03ec80 4232 if (r_type == R_ALPHA_TLSLDM)
cf35638d 4233 r_symndx = STN_UNDEF;
cc03ec80 4234
252b5132
RH
4235 if (r_symndx < symtab_hdr->sh_info)
4236 {
8517fae7 4237 asection *msec;
252b5132
RH
4238 sym = local_syms + r_symndx;
4239 sec = local_sections[r_symndx];
8517fae7
AM
4240 msec = sec;
4241 value = _bfd_elf_rela_local_sym (output_bfd, sym, &msec, rel);
3765b1be 4242
cf35638d 4243 /* If this is a tp-relative relocation against sym STN_UNDEF (0),
cc03ec80 4244 this is hackery from relax_section. Force the value to
f915360b 4245 be the tls module base. */
cf35638d 4246 if (r_symndx == STN_UNDEF
cc03ec80
RH
4247 && (r_type == R_ALPHA_TLSLDM
4248 || r_type == R_ALPHA_GOTTPREL
4249 || r_type == R_ALPHA_TPREL64
4250 || r_type == R_ALPHA_TPRELHI
4251 || r_type == R_ALPHA_TPRELLO
4252 || r_type == R_ALPHA_TPREL16))
f915360b 4253 value = dtp_base;
cc03ec80 4254
4a67a098
RH
4255 if (local_got_entries)
4256 gotent = local_got_entries[r_symndx];
4257 else
4258 gotent = NULL;
3765b1be
RH
4259
4260 /* Need to adjust local GOT entries' addends for SEC_MERGE
4261 unless it has been done already. */
4262 if ((sec->flags & SEC_MERGE)
048d873d 4263 && ELF_ST_TYPE (sym->st_info) == STT_SECTION
dbaa2011 4264 && sec->sec_info_type == SEC_INFO_TYPE_MERGE
048d873d
RH
4265 && gotent
4266 && !gotent->reloc_xlated)
3765b1be
RH
4267 {
4268 struct alpha_elf_got_entry *ent;
3765b1be
RH
4269
4270 for (ent = gotent; ent; ent = ent->next)
4271 {
4272 ent->reloc_xlated = 1;
4273 if (ent->use_count == 0)
4274 continue;
4275 msec = sec;
4276 ent->addend =
4277 _bfd_merged_section_offset (output_bfd, &msec,
4278 elf_section_data (sec)->
4279 sec_info,
753731ee 4280 sym->st_value + ent->addend);
3765b1be
RH
4281 ent->addend -= sym->st_value;
4282 ent->addend += msec->output_section->vma
4283 + msec->output_offset
4284 - sec->output_section->vma
4285 - sec->output_offset;
4286 }
4287 }
4288
0a1b45a2 4289 dynamic_symbol_p = false;
252b5132
RH
4290 }
4291 else
4292 {
0a1b45a2 4293 bool warned, ignored;
560e09e9 4294 struct elf_link_hash_entry *hh;
b2a8e766
AM
4295 struct elf_link_hash_entry **sym_hashes = elf_sym_hashes (input_bfd);
4296
4297 RELOC_FOR_GLOBAL_SYMBOL (info, input_bfd, input_section, rel,
4298 r_symndx, symtab_hdr, sym_hashes,
4299 hh, sec, value,
62d887d4 4300 unresolved_reloc, warned, ignored);
560e09e9
NC
4301
4302 if (warned)
4303 continue;
252b5132 4304
560e09e9
NC
4305 if (value == 0
4306 && ! unresolved_reloc
4307 && hh->root.type == bfd_link_hash_undefweak)
0a1b45a2 4308 undef_weak_ref = true;
3765b1be 4309
560e09e9 4310 h = (struct alpha_elf_link_hash_entry *) hh;
07d6d2b8 4311 dynamic_symbol_p = alpha_elf_dynamic_symbol_p (&h->root, info);
3765b1be 4312 gotent = h->got_entries;
252b5132 4313 }
3765b1be 4314
dbaa2011 4315 if (sec != NULL && discarded_section (sec))
e4067dbb 4316 RELOC_AGAINST_DISCARDED_SECTION (info, input_bfd, input_section,
545fd46b 4317 rel, 1, relend, howto, 0, contents);
ab96bf03 4318
252b5132 4319 addend = rel->r_addend;
3765b1be
RH
4320 value += addend;
4321
4322 /* Search for the proper got entry. */
4323 for (; gotent ; gotent = gotent->next)
4324 if (gotent->gotobj == gotobj
4325 && gotent->reloc_type == r_type
4326 && gotent->addend == addend)
4327 break;
252b5132
RH
4328
4329 switch (r_type)
4330 {
4331 case R_ALPHA_GPDISP:
4332 {
4333 bfd_byte *p_ldah, *p_lda;
4334
4335 BFD_ASSERT(gp != 0);
4336
3765b1be
RH
4337 value = (input_section->output_section->vma
4338 + input_section->output_offset
4339 + rel->r_offset);
252b5132 4340
3765b1be 4341 p_ldah = contents + rel->r_offset;
252b5132
RH
4342 p_lda = p_ldah + rel->r_addend;
4343
3765b1be 4344 r = elf64_alpha_do_reloc_gpdisp (input_bfd, gp - value,
252b5132
RH
4345 p_ldah, p_lda);
4346 }
4347 break;
4348
252b5132 4349 case R_ALPHA_LITERAL:
3765b1be
RH
4350 BFD_ASSERT(sgot != NULL);
4351 BFD_ASSERT(gp != 0);
4352 BFD_ASSERT(gotent != NULL);
4353 BFD_ASSERT(gotent->use_count >= 1);
f7460f5f 4354
3765b1be
RH
4355 if (!gotent->reloc_done)
4356 {
4357 gotent->reloc_done = 1;
252b5132 4358
3765b1be
RH
4359 bfd_put_64 (output_bfd, value,
4360 sgot->contents + gotent->got_offset);
252b5132 4361
3765b1be
RH
4362 /* If the symbol has been forced local, output a
4363 RELATIVE reloc, otherwise it will be handled in
4364 finish_dynamic_symbol. */
0e1862bb
L
4365 if (bfd_link_pic (info)
4366 && !dynamic_symbol_p
4367 && !undef_weak_ref)
1bbc9cec
RH
4368 elf64_alpha_emit_dynrel (output_bfd, info, sgot, srelgot,
4369 gotent->got_offset, 0,
4370 R_ALPHA_RELATIVE, value);
3765b1be 4371 }
252b5132 4372
3765b1be
RH
4373 value = (sgot->output_section->vma
4374 + sgot->output_offset
4375 + gotent->got_offset);
4376 value -= gp;
252b5132
RH
4377 goto default_reloc;
4378
4379 case R_ALPHA_GPREL32:
ec1659c8 4380 case R_ALPHA_GPREL16:
252b5132 4381 case R_ALPHA_GPRELLOW:
3765b1be 4382 if (dynamic_symbol_p)
07d6d2b8 4383 {
4eca0228 4384 _bfd_error_handler
695344c0 4385 /* xgettext:c-format */
871b3ab2 4386 (_("%pB: gp-relative relocation against dynamic symbol %s"),
07d6d2b8 4387 input_bfd, h->root.root.root.string);
0a1b45a2 4388 ret_val = false;
07d6d2b8 4389 }
252b5132 4390 BFD_ASSERT(gp != 0);
3765b1be 4391 value -= gp;
252b5132
RH
4392 goto default_reloc;
4393
4394 case R_ALPHA_GPRELHIGH:
3765b1be 4395 if (dynamic_symbol_p)
07d6d2b8 4396 {
4eca0228 4397 _bfd_error_handler
695344c0 4398 /* xgettext:c-format */
871b3ab2 4399 (_("%pB: gp-relative relocation against dynamic symbol %s"),
07d6d2b8 4400 input_bfd, h->root.root.root.string);
0a1b45a2 4401 ret_val = false;
07d6d2b8 4402 }
252b5132 4403 BFD_ASSERT(gp != 0);
3765b1be
RH
4404 value -= gp;
4405 value = ((bfd_signed_vma) value >> 16) + ((value >> 15) & 1);
252b5132
RH
4406 goto default_reloc;
4407
252b5132 4408 case R_ALPHA_HINT:
f94952df
RH
4409 /* A call to a dynamic symbol is definitely out of range of
4410 the 16-bit displacement. Don't bother writing anything. */
3765b1be 4411 if (dynamic_symbol_p)
f94952df
RH
4412 {
4413 r = bfd_reloc_ok;
4414 break;
4415 }
3765b1be
RH
4416 /* The regular PC-relative stuff measures from the start of
4417 the instruction rather than the end. */
4418 value -= 4;
4419 goto default_reloc;
f94952df
RH
4420
4421 case R_ALPHA_BRADDR:
3765b1be 4422 if (dynamic_symbol_p)
07d6d2b8 4423 {
4eca0228 4424 _bfd_error_handler
695344c0 4425 /* xgettext:c-format */
871b3ab2 4426 (_("%pB: pc-relative relocation against dynamic symbol %s"),
07d6d2b8 4427 input_bfd, h->root.root.root.string);
0a1b45a2 4428 ret_val = false;
07d6d2b8 4429 }
252b5132
RH
4430 /* The regular PC-relative stuff measures from the start of
4431 the instruction rather than the end. */
3765b1be 4432 value -= 4;
252b5132
RH
4433 goto default_reloc;
4434
7793f4d0
RH
4435 case R_ALPHA_BRSGP:
4436 {
4437 int other;
4438 const char *name;
4439
4440 /* The regular PC-relative stuff measures from the start of
4441 the instruction rather than the end. */
3765b1be 4442 value -= 4;
7793f4d0 4443
ccf00ab6
RH
4444 /* The source and destination gp must be the same. Note that
4445 the source will always have an assigned gp, since we forced
4446 one in check_relocs, but that the destination may not, as
cedb70c5 4447 it might not have had any relocations at all. Also take
ccf00ab6
RH
4448 care not to crash if H is an undefined symbol. */
4449 if (h != NULL && sec != NULL
4450 && alpha_elf_tdata (sec->owner)->gotobj
7793f4d0
RH
4451 && gotobj != alpha_elf_tdata (sec->owner)->gotobj)
4452 {
4eca0228 4453 _bfd_error_handler
695344c0 4454 /* xgettext:c-format */
871b3ab2 4455 (_("%pB: change in gp: BRSGP %s"),
d003868e 4456 input_bfd, h->root.root.root.string);
0a1b45a2 4457 ret_val = false;
7793f4d0
RH
4458 }
4459
4460 /* The symbol should be marked either NOPV or STD_GPLOAD. */
4461 if (h != NULL)
4462 other = h->root.other;
4463 else
4464 other = sym->st_other;
4465 switch (other & STO_ALPHA_STD_GPLOAD)
4466 {
4467 case STO_ALPHA_NOPV:
07d6d2b8 4468 break;
7793f4d0 4469 case STO_ALPHA_STD_GPLOAD:
64e04ecd 4470 value += 8;
7793f4d0
RH
4471 break;
4472 default:
4473 if (h != NULL)
4474 name = h->root.root.root.string;
4475 else
4476 {
4477 name = (bfd_elf_string_from_elf_section
4478 (input_bfd, symtab_hdr->sh_link, sym->st_name));
4479 if (name == NULL)
4480 name = _("<unknown>");
4481 else if (name[0] == 0)
fd361982 4482 name = bfd_section_name (sec);
7793f4d0 4483 }
4eca0228 4484 _bfd_error_handler
695344c0 4485 /* xgettext:c-format */
871b3ab2 4486 (_("%pB: !samegp reloc against symbol without .prologue: %s"),
d003868e 4487 input_bfd, name);
0a1b45a2 4488 ret_val = false;
7793f4d0
RH
4489 break;
4490 }
4491
4492 goto default_reloc;
4493 }
4494
252b5132
RH
4495 case R_ALPHA_REFLONG:
4496 case R_ALPHA_REFQUAD:
3765b1be
RH
4497 case R_ALPHA_DTPREL64:
4498 case R_ALPHA_TPREL64:
252b5132 4499 {
1bbc9cec
RH
4500 long dynindx, dyntype = r_type;
4501 bfd_vma dynaddend;
252b5132
RH
4502
4503 /* Careful here to remember RELATIVE relocations for global
4504 variables for symbolic shared objects. */
4505
3765b1be 4506 if (dynamic_symbol_p)
252b5132
RH
4507 {
4508 BFD_ASSERT(h->root.dynindx != -1);
1bbc9cec
RH
4509 dynindx = h->root.dynindx;
4510 dynaddend = addend;
3765b1be
RH
4511 addend = 0, value = 0;
4512 }
4513 else if (r_type == R_ALPHA_DTPREL64)
4514 {
e1918d23 4515 BFD_ASSERT (elf_hash_table (info)->tls_sec != NULL);
3765b1be
RH
4516 value -= dtp_base;
4517 goto default_reloc;
4518 }
4519 else if (r_type == R_ALPHA_TPREL64)
4520 {
e1918d23 4521 BFD_ASSERT (elf_hash_table (info)->tls_sec != NULL);
3cbc1e5e 4522 if (!bfd_link_dll (info))
1bbc9cec
RH
4523 {
4524 value -= tp_base;
4525 goto default_reloc;
4526 }
4527 dynindx = 0;
4528 dynaddend = value - dtp_base;
252b5132 4529 }
0e1862bb 4530 else if (bfd_link_pic (info)
cf35638d 4531 && r_symndx != STN_UNDEF
d6ad34f6 4532 && (input_section->flags & SEC_ALLOC)
1d5316ab
AM
4533 && !undef_weak_ref
4534 && !(unresolved_reloc
4535 && (_bfd_elf_section_offset (output_bfd, info,
4536 input_section,
4537 rel->r_offset)
4538 == (bfd_vma) -1)))
252b5132 4539 {
3765b1be
RH
4540 if (r_type == R_ALPHA_REFLONG)
4541 {
4eca0228 4542 _bfd_error_handler
695344c0 4543 /* xgettext:c-format */
871b3ab2 4544 (_("%pB: unhandled dynamic relocation against %s"),
d003868e 4545 input_bfd,
3765b1be 4546 h->root.root.root.string);
0a1b45a2 4547 ret_val = false;
3765b1be 4548 }
1bbc9cec
RH
4549 dynindx = 0;
4550 dyntype = R_ALPHA_RELATIVE;
4551 dynaddend = value;
252b5132
RH
4552 }
4553 else
4554 goto default_reloc;
4555
3241278a
RH
4556 if (input_section->flags & SEC_ALLOC)
4557 elf64_alpha_emit_dynrel (output_bfd, info, input_section,
4558 srel, rel->r_offset, dynindx,
4559 dyntype, dynaddend);
252b5132
RH
4560 }
4561 goto default_reloc;
4562
3765b1be 4563 case R_ALPHA_SREL16:
84de6048
RH
4564 case R_ALPHA_SREL32:
4565 case R_ALPHA_SREL64:
3765b1be 4566 if (dynamic_symbol_p)
07d6d2b8 4567 {
4eca0228 4568 _bfd_error_handler
695344c0 4569 /* xgettext:c-format */
871b3ab2 4570 (_("%pB: pc-relative relocation against dynamic symbol %s"),
07d6d2b8 4571 input_bfd, h->root.root.root.string);
0a1b45a2 4572 ret_val = false;
07d6d2b8 4573 }
3cbc1e5e 4574 else if (bfd_link_pic (info)
0e1862bb 4575 && undef_weak_ref)
07d6d2b8 4576 {
4eca0228 4577 _bfd_error_handler
695344c0 4578 /* xgettext:c-format */
871b3ab2 4579 (_("%pB: pc-relative relocation against undefined weak symbol %s"),
07d6d2b8 4580 input_bfd, h->root.root.root.string);
0a1b45a2 4581 ret_val = false;
07d6d2b8 4582 }
d6ad34f6 4583
3765b1be 4584
84de6048
RH
4585 /* ??? .eh_frame references to discarded sections will be smashed
4586 to relocations against SHN_UNDEF. The .eh_frame format allows
4587 NULL to be encoded as 0 in any format, so this works here. */
1d5316ab
AM
4588 if (r_symndx == STN_UNDEF
4589 || (unresolved_reloc
4590 && _bfd_elf_section_offset (output_bfd, info,
4591 input_section,
4592 rel->r_offset) == (bfd_vma) -1))
84de6048
RH
4593 howto = (elf64_alpha_howto_table
4594 + (r_type - R_ALPHA_SREL32 + R_ALPHA_REFLONG));
4595 goto default_reloc;
4596
3765b1be
RH
4597 case R_ALPHA_TLSLDM:
4598 /* Ignore the symbol for the relocation. The result is always
4599 the current module. */
4600 dynamic_symbol_p = 0;
4601 /* FALLTHRU */
4602
4603 case R_ALPHA_TLSGD:
4604 if (!gotent->reloc_done)
4605 {
4606 gotent->reloc_done = 1;
4607
4608 /* Note that the module index for the main program is 1. */
0e1862bb
L
4609 bfd_put_64 (output_bfd,
4610 !bfd_link_pic (info) && !dynamic_symbol_p,
3765b1be
RH
4611 sgot->contents + gotent->got_offset);
4612
4613 /* If the symbol has been forced local, output a
4614 DTPMOD64 reloc, otherwise it will be handled in
4615 finish_dynamic_symbol. */
0e1862bb 4616 if (bfd_link_pic (info) && !dynamic_symbol_p)
1bbc9cec
RH
4617 elf64_alpha_emit_dynrel (output_bfd, info, sgot, srelgot,
4618 gotent->got_offset, 0,
4619 R_ALPHA_DTPMOD64, 0);
3765b1be
RH
4620
4621 if (dynamic_symbol_p || r_type == R_ALPHA_TLSLDM)
4622 value = 0;
4623 else
4624 {
e1918d23 4625 BFD_ASSERT (elf_hash_table (info)->tls_sec != NULL);
07d6d2b8 4626 value -= dtp_base;
3765b1be
RH
4627 }
4628 bfd_put_64 (output_bfd, value,
4629 sgot->contents + gotent->got_offset + 8);
4630 }
4631
4632 value = (sgot->output_section->vma
4633 + sgot->output_offset
4634 + gotent->got_offset);
4635 value -= gp;
4636 goto default_reloc;
4637
4638 case R_ALPHA_DTPRELHI:
4639 case R_ALPHA_DTPRELLO:
4640 case R_ALPHA_DTPREL16:
4641 if (dynamic_symbol_p)
07d6d2b8 4642 {
4eca0228 4643 _bfd_error_handler
695344c0 4644 /* xgettext:c-format */
871b3ab2 4645 (_("%pB: dtp-relative relocation against dynamic symbol %s"),
07d6d2b8 4646 input_bfd, h->root.root.root.string);
0a1b45a2 4647 ret_val = false;
07d6d2b8 4648 }
e1918d23 4649 BFD_ASSERT (elf_hash_table (info)->tls_sec != NULL);
3765b1be 4650 value -= dtp_base;
9e756d64
RH
4651 if (r_type == R_ALPHA_DTPRELHI)
4652 value = ((bfd_signed_vma) value >> 16) + ((value >> 15) & 1);
3765b1be
RH
4653 goto default_reloc;
4654
4655 case R_ALPHA_TPRELHI:
4656 case R_ALPHA_TPRELLO:
4657 case R_ALPHA_TPREL16:
3cbc1e5e 4658 if (bfd_link_dll (info))
9e756d64 4659 {
4eca0228 4660 _bfd_error_handler
695344c0 4661 /* xgettext:c-format */
871b3ab2 4662 (_("%pB: TLS local exec code cannot be linked into shared objects"),
d003868e 4663 input_bfd);
0a1b45a2 4664 ret_val = false;
9e756d64
RH
4665 }
4666 else if (dynamic_symbol_p)
07d6d2b8 4667 {
4eca0228 4668 _bfd_error_handler
695344c0 4669 /* xgettext:c-format */
871b3ab2 4670 (_("%pB: tp-relative relocation against dynamic symbol %s"),
07d6d2b8 4671 input_bfd, h->root.root.root.string);
0a1b45a2 4672 ret_val = false;
07d6d2b8 4673 }
e1918d23 4674 BFD_ASSERT (elf_hash_table (info)->tls_sec != NULL);
3765b1be 4675 value -= tp_base;
9e756d64
RH
4676 if (r_type == R_ALPHA_TPRELHI)
4677 value = ((bfd_signed_vma) value >> 16) + ((value >> 15) & 1);
3765b1be
RH
4678 goto default_reloc;
4679
4680 case R_ALPHA_GOTDTPREL:
4681 case R_ALPHA_GOTTPREL:
4682 BFD_ASSERT(sgot != NULL);
4683 BFD_ASSERT(gp != 0);
4684 BFD_ASSERT(gotent != NULL);
4685 BFD_ASSERT(gotent->use_count >= 1);
4686
4687 if (!gotent->reloc_done)
4688 {
4689 gotent->reloc_done = 1;
4690
4691 if (dynamic_symbol_p)
4692 value = 0;
4693 else
4694 {
e1918d23 4695 BFD_ASSERT (elf_hash_table (info)->tls_sec != NULL);
1bbc9cec
RH
4696 if (r_type == R_ALPHA_GOTDTPREL)
4697 value -= dtp_base;
28fbeab8 4698 else if (bfd_link_executable (info))
1bbc9cec
RH
4699 value -= tp_base;
4700 else
4701 {
4702 elf64_alpha_emit_dynrel (output_bfd, info, sgot, srelgot,
4703 gotent->got_offset, 0,
4704 R_ALPHA_TPREL64,
4705 value - dtp_base);
4706 value = 0;
4707 }
3765b1be
RH
4708 }
4709 bfd_put_64 (output_bfd, value,
4710 sgot->contents + gotent->got_offset);
4711 }
4712
4713 value = (sgot->output_section->vma
4714 + sgot->output_offset
4715 + gotent->got_offset);
4716 value -= gp;
4717 goto default_reloc;
4718
252b5132
RH
4719 default:
4720 default_reloc:
4721 r = _bfd_final_link_relocate (howto, input_bfd, input_section,
3765b1be 4722 contents, rel->r_offset, value, 0);
252b5132
RH
4723 break;
4724 }
4725
4726 switch (r)
4727 {
4728 case bfd_reloc_ok:
4729 break;
4730
4731 case bfd_reloc_overflow:
4732 {
4733 const char *name;
4734
ed4de5e2
JJ
4735 /* Don't warn if the overflow is due to pc relative reloc
4736 against discarded section. Section optimization code should
4737 handle it. */
4738
4739 if (r_symndx < symtab_hdr->sh_info
4740 && sec != NULL && howto->pc_relative
dbaa2011 4741 && discarded_section (sec))
ed4de5e2
JJ
4742 break;
4743
252b5132 4744 if (h != NULL)
dfeffb9f 4745 name = NULL;
252b5132
RH
4746 else
4747 {
4748 name = (bfd_elf_string_from_elf_section
4749 (input_bfd, symtab_hdr->sh_link, sym->st_name));
4750 if (name == NULL)
0a1b45a2 4751 return false;
252b5132 4752 if (*name == '\0')
fd361982 4753 name = bfd_section_name (sec);
252b5132 4754 }
1a72702b
AM
4755 (*info->callbacks->reloc_overflow)
4756 (info, (h ? &h->root.root : NULL), name, howto->name,
4757 (bfd_vma) 0, input_bfd, input_section, rel->r_offset);
252b5132
RH
4758 }
4759 break;
4760
4761 default:
4762 case bfd_reloc_outofrange:
4763 abort ();
4764 }
4765 }
4766
f16fbd61 4767 return ret_val;
252b5132
RH
4768}
4769
4770/* Finish up dynamic symbol handling. We set the contents of various
4771 dynamic sections here. */
4772
0a1b45a2 4773static bool
a7519a3c
RH
4774elf64_alpha_finish_dynamic_symbol (bfd *output_bfd, struct bfd_link_info *info,
4775 struct elf_link_hash_entry *h,
4776 Elf_Internal_Sym *sym)
252b5132 4777{
6ec7057a 4778 struct alpha_elf_link_hash_entry *ah = (struct alpha_elf_link_hash_entry *)h;
252b5132 4779
6ec7057a 4780 if (h->needs_plt)
252b5132
RH
4781 {
4782 /* Fill in the .plt entry for this symbol. */
4783 asection *splt, *sgot, *srel;
4784 Elf_Internal_Rela outrel;
947216bf 4785 bfd_byte *loc;
252b5132
RH
4786 bfd_vma got_addr, plt_addr;
4787 bfd_vma plt_index;
4788 struct alpha_elf_got_entry *gotent;
4789
4790 BFD_ASSERT (h->dynindx != -1);
4791
ce558b89 4792 splt = elf_hash_table (info)->splt;
252b5132 4793 BFD_ASSERT (splt != NULL);
ce558b89 4794 srel = elf_hash_table (info)->srelplt;
252b5132 4795 BFD_ASSERT (srel != NULL);
252b5132 4796
6ec7057a
RH
4797 for (gotent = ah->got_entries; gotent ; gotent = gotent->next)
4798 if (gotent->reloc_type == R_ALPHA_LITERAL
4799 && gotent->use_count > 0)
4800 {
4801 unsigned int insn;
4802 int disp;
252b5132 4803
6ec7057a
RH
4804 sgot = alpha_elf_tdata (gotent->gotobj)->got;
4805 BFD_ASSERT (sgot != NULL);
252b5132 4806
6ec7057a
RH
4807 BFD_ASSERT (gotent->got_offset != -1);
4808 BFD_ASSERT (gotent->plt_offset != -1);
252b5132 4809
6ec7057a
RH
4810 got_addr = (sgot->output_section->vma
4811 + sgot->output_offset
4812 + gotent->got_offset);
4813 plt_addr = (splt->output_section->vma
4814 + splt->output_offset
4815 + gotent->plt_offset);
252b5132 4816
6ec7057a 4817 plt_index = (gotent->plt_offset-PLT_HEADER_SIZE) / PLT_ENTRY_SIZE;
252b5132 4818
6ec7057a
RH
4819 /* Fill in the entry in the procedure linkage table. */
4820 if (elf64_alpha_use_secureplt)
4821 {
4822 disp = (PLT_HEADER_SIZE - 4) - (gotent->plt_offset + 4);
4823 insn = INSN_AD (INSN_BR, 31, disp);
4824 bfd_put_32 (output_bfd, insn,
4825 splt->contents + gotent->plt_offset);
252b5132 4826
6ec7057a
RH
4827 plt_index = ((gotent->plt_offset - NEW_PLT_HEADER_SIZE)
4828 / NEW_PLT_ENTRY_SIZE);
4829 }
4830 else
4831 {
4832 disp = -(gotent->plt_offset + 4);
4833 insn = INSN_AD (INSN_BR, 28, disp);
4834 bfd_put_32 (output_bfd, insn,
4835 splt->contents + gotent->plt_offset);
4836 bfd_put_32 (output_bfd, INSN_UNOP,
4837 splt->contents + gotent->plt_offset + 4);
4838 bfd_put_32 (output_bfd, INSN_UNOP,
4839 splt->contents + gotent->plt_offset + 8);
4840
4841 plt_index = ((gotent->plt_offset - OLD_PLT_HEADER_SIZE)
4842 / OLD_PLT_ENTRY_SIZE);
4843 }
252b5132 4844
6ec7057a
RH
4845 /* Fill in the entry in the .rela.plt section. */
4846 outrel.r_offset = got_addr;
4847 outrel.r_info = ELF64_R_INFO(h->dynindx, R_ALPHA_JMP_SLOT);
4848 outrel.r_addend = 0;
252b5132 4849
6ec7057a
RH
4850 loc = srel->contents + plt_index * sizeof (Elf64_External_Rela);
4851 bfd_elf64_swap_reloca_out (output_bfd, &outrel, loc);
252b5132 4852
6ec7057a
RH
4853 /* Fill in the entry in the .got. */
4854 bfd_put_64 (output_bfd, plt_addr,
4855 sgot->contents + gotent->got_offset);
4856 }
252b5132
RH
4857 }
4858 else if (alpha_elf_dynamic_symbol_p (h, info))
4859 {
4860 /* Fill in the dynamic relocations for this symbol's .got entries. */
4861 asection *srel;
252b5132
RH
4862 struct alpha_elf_got_entry *gotent;
4863
ce558b89 4864 srel = elf_hash_table (info)->srelgot;
252b5132
RH
4865 BFD_ASSERT (srel != NULL);
4866
252b5132
RH
4867 for (gotent = ((struct alpha_elf_link_hash_entry *) h)->got_entries;
4868 gotent != NULL;
4869 gotent = gotent->next)
4870 {
f44f99a5 4871 asection *sgot;
1bbc9cec 4872 long r_type;
3765b1be 4873
f44f99a5
RH
4874 if (gotent->use_count == 0)
4875 continue;
4876
4877 sgot = alpha_elf_tdata (gotent->gotobj)->got;
3765b1be
RH
4878
4879 r_type = gotent->reloc_type;
4880 switch (r_type)
4881 {
4882 case R_ALPHA_LITERAL:
4883 r_type = R_ALPHA_GLOB_DAT;
4884 break;
4885 case R_ALPHA_TLSGD:
4886 r_type = R_ALPHA_DTPMOD64;
4887 break;
4888 case R_ALPHA_GOTDTPREL:
4889 r_type = R_ALPHA_DTPREL64;
4890 break;
4891 case R_ALPHA_GOTTPREL:
4892 r_type = R_ALPHA_TPREL64;
4893 break;
4894 case R_ALPHA_TLSLDM:
4895 default:
4896 abort ();
4897 }
4898
68ffbac6 4899 elf64_alpha_emit_dynrel (output_bfd, info, sgot, srel,
1bbc9cec
RH
4900 gotent->got_offset, h->dynindx,
4901 r_type, gotent->addend);
3765b1be
RH
4902
4903 if (gotent->reloc_type == R_ALPHA_TLSGD)
68ffbac6 4904 elf64_alpha_emit_dynrel (output_bfd, info, sgot, srel,
1bbc9cec
RH
4905 gotent->got_offset + 8, h->dynindx,
4906 R_ALPHA_DTPREL64, gotent->addend);
252b5132
RH
4907 }
4908 }
4909
4910 /* Mark some specially defined symbols as absolute. */
9637f6ef 4911 if (h == elf_hash_table (info)->hdynamic
22edb2f1
RS
4912 || h == elf_hash_table (info)->hgot
4913 || h == elf_hash_table (info)->hplt)
252b5132
RH
4914 sym->st_shndx = SHN_ABS;
4915
0a1b45a2 4916 return true;
252b5132
RH
4917}
4918
4919/* Finish up the dynamic sections. */
4920
0a1b45a2 4921static bool
a7519a3c
RH
4922elf64_alpha_finish_dynamic_sections (bfd *output_bfd,
4923 struct bfd_link_info *info)
252b5132
RH
4924{
4925 bfd *dynobj;
4926 asection *sdyn;
4927
4928 dynobj = elf_hash_table (info)->dynobj;
3d4d4302 4929 sdyn = bfd_get_linker_section (dynobj, ".dynamic");
252b5132
RH
4930
4931 if (elf_hash_table (info)->dynamic_sections_created)
4932 {
6ec7057a 4933 asection *splt, *sgotplt, *srelaplt;
252b5132 4934 Elf64_External_Dyn *dyncon, *dynconend;
6ec7057a 4935 bfd_vma plt_vma, gotplt_vma;
252b5132 4936
ce558b89
AM
4937 splt = elf_hash_table (info)->splt;
4938 srelaplt = elf_hash_table (info)->srelplt;
252b5132
RH
4939 BFD_ASSERT (splt != NULL && sdyn != NULL);
4940
6ec7057a
RH
4941 plt_vma = splt->output_section->vma + splt->output_offset;
4942
4943 gotplt_vma = 0;
4944 if (elf64_alpha_use_secureplt)
4945 {
ce558b89 4946 sgotplt = elf_hash_table (info)->sgotplt;
6ec7057a
RH
4947 BFD_ASSERT (sgotplt != NULL);
4948 if (sgotplt->size > 0)
4949 gotplt_vma = sgotplt->output_section->vma + sgotplt->output_offset;
4950 }
4951
252b5132 4952 dyncon = (Elf64_External_Dyn *) sdyn->contents;
eea6121a 4953 dynconend = (Elf64_External_Dyn *) (sdyn->contents + sdyn->size);
252b5132
RH
4954 for (; dyncon < dynconend; dyncon++)
4955 {
4956 Elf_Internal_Dyn dyn;
252b5132
RH
4957
4958 bfd_elf64_swap_dyn_in (dynobj, dyncon, &dyn);
4959
4960 switch (dyn.d_tag)
4961 {
4962 case DT_PLTGOT:
6ec7057a
RH
4963 dyn.d_un.d_ptr
4964 = elf64_alpha_use_secureplt ? gotplt_vma : plt_vma;
4965 break;
252b5132 4966 case DT_PLTRELSZ:
6ec7057a
RH
4967 dyn.d_un.d_val = srelaplt ? srelaplt->size : 0;
4968 break;
252b5132 4969 case DT_JMPREL:
4ade44b7
AM
4970 dyn.d_un.d_ptr = srelaplt ? (srelaplt->output_section->vma
4971 + srelaplt->output_offset) : 0;
6ec7057a 4972 break;
252b5132
RH
4973 }
4974
4975 bfd_elf64_swap_dyn_out (output_bfd, &dyn, dyncon);
4976 }
4977
6ec7057a 4978 /* Initialize the plt header. */
eea6121a 4979 if (splt->size > 0)
252b5132 4980 {
6ec7057a
RH
4981 unsigned int insn;
4982 int ofs;
4983
4984 if (elf64_alpha_use_secureplt)
4985 {
4986 ofs = gotplt_vma - (plt_vma + PLT_HEADER_SIZE);
4987
4988 insn = INSN_ABC (INSN_SUBQ, 27, 28, 25);
4989 bfd_put_32 (output_bfd, insn, splt->contents);
4990
4991 insn = INSN_ABO (INSN_LDAH, 28, 28, (ofs + 0x8000) >> 16);
4992 bfd_put_32 (output_bfd, insn, splt->contents + 4);
4993
4994 insn = INSN_ABC (INSN_S4SUBQ, 25, 25, 25);
4995 bfd_put_32 (output_bfd, insn, splt->contents + 8);
4996
4997 insn = INSN_ABO (INSN_LDA, 28, 28, ofs);
4998 bfd_put_32 (output_bfd, insn, splt->contents + 12);
4999
5000 insn = INSN_ABO (INSN_LDQ, 27, 28, 0);
5001 bfd_put_32 (output_bfd, insn, splt->contents + 16);
5002
5003 insn = INSN_ABC (INSN_ADDQ, 25, 25, 25);
5004 bfd_put_32 (output_bfd, insn, splt->contents + 20);
5005
5006 insn = INSN_ABO (INSN_LDQ, 28, 28, 8);
5007 bfd_put_32 (output_bfd, insn, splt->contents + 24);
5008
5009 insn = INSN_AB (INSN_JMP, 31, 27);
5010 bfd_put_32 (output_bfd, insn, splt->contents + 28);
5011
5012 insn = INSN_AD (INSN_BR, 28, -PLT_HEADER_SIZE);
5013 bfd_put_32 (output_bfd, insn, splt->contents + 32);
5014 }
5015 else
5016 {
5017 insn = INSN_AD (INSN_BR, 27, 0); /* br $27, .+4 */
5018 bfd_put_32 (output_bfd, insn, splt->contents);
5019
5020 insn = INSN_ABO (INSN_LDQ, 27, 27, 12);
5021 bfd_put_32 (output_bfd, insn, splt->contents + 4);
5022
5023 insn = INSN_UNOP;
5024 bfd_put_32 (output_bfd, insn, splt->contents + 8);
5025
5026 insn = INSN_AB (INSN_JMP, 27, 27);
5027 bfd_put_32 (output_bfd, insn, splt->contents + 12);
5028
5029 /* The next two words will be filled in by ld.so. */
5030 bfd_put_64 (output_bfd, 0, splt->contents + 16);
5031 bfd_put_64 (output_bfd, 0, splt->contents + 24);
5032 }
252b5132 5033
eecdbe52 5034 elf_section_data (splt->output_section)->this_hdr.sh_entsize = 0;
252b5132
RH
5035 }
5036 }
5037
0a1b45a2 5038 return true;
252b5132
RH
5039}
5040
96e2734b
RH
5041/* We need to use a special link routine to handle the .mdebug section.
5042 We need to merge all instances of these sections together, not write
5043 them all out sequentially. */
252b5132 5044
0a1b45a2 5045static bool
a7519a3c 5046elf64_alpha_final_link (bfd *abfd, struct bfd_link_info *info)
252b5132
RH
5047{
5048 asection *o;
5049 struct bfd_link_order *p;
96e2734b 5050 asection *mdebug_sec;
252b5132
RH
5051 struct ecoff_debug_info debug;
5052 const struct ecoff_debug_swap *swap
5053 = get_elf_backend_data (abfd)->elf_backend_ecoff_debug_swap;
5054 HDRR *symhdr = &debug.symbolic_header;
4dfe6ac6
NC
5055 void * mdebug_handle = NULL;
5056 struct alpha_elf_link_hash_table * htab;
5057
5058 htab = alpha_elf_hash_table (info);
5059 if (htab == NULL)
0a1b45a2 5060 return false;
252b5132 5061
96e2734b 5062 /* Go through the sections and collect the mdebug information. */
252b5132 5063 mdebug_sec = NULL;
252b5132
RH
5064 for (o = abfd->sections; o != (asection *) NULL; o = o->next)
5065 {
252b5132
RH
5066 if (strcmp (o->name, ".mdebug") == 0)
5067 {
5068 struct extsym_info einfo;
5069
5070 /* We have found the .mdebug section in the output file.
5071 Look through all the link_orders comprising it and merge
5072 the information together. */
5073 symhdr->magic = swap->sym_magic;
5074 /* FIXME: What should the version stamp be? */
5075 symhdr->vstamp = 0;
5076 symhdr->ilineMax = 0;
5077 symhdr->cbLine = 0;
5078 symhdr->idnMax = 0;
5079 symhdr->ipdMax = 0;
5080 symhdr->isymMax = 0;
5081 symhdr->ioptMax = 0;
5082 symhdr->iauxMax = 0;
5083 symhdr->issMax = 0;
5084 symhdr->issExtMax = 0;
5085 symhdr->ifdMax = 0;
5086 symhdr->crfd = 0;
5087 symhdr->iextMax = 0;
5088
5089 /* We accumulate the debugging information itself in the
5090 debug_info structure. */
5091 debug.line = NULL;
5092 debug.external_dnr = NULL;
5093 debug.external_pdr = NULL;
5094 debug.external_sym = NULL;
5095 debug.external_opt = NULL;
5096 debug.external_aux = NULL;
5097 debug.ss = NULL;
5098 debug.ssext = debug.ssext_end = NULL;
5099 debug.external_fdr = NULL;
5100 debug.external_rfd = NULL;
5101 debug.external_ext = debug.external_ext_end = NULL;
5102
5103 mdebug_handle = bfd_ecoff_debug_init (abfd, &debug, swap, info);
2c3fc389 5104 if (mdebug_handle == NULL)
0a1b45a2 5105 return false;
252b5132
RH
5106
5107 if (1)
5108 {
5109 asection *s;
5110 EXTR esym;
52b9d213 5111 bfd_vma last = 0;
252b5132
RH
5112 unsigned int i;
5113 static const char * const name[] =
5114 {
5115 ".text", ".init", ".fini", ".data",
5116 ".rodata", ".sdata", ".sbss", ".bss"
5117 };
5118 static const int sc[] = { scText, scInit, scFini, scData,
5119 scRData, scSData, scSBss, scBss };
5120
5121 esym.jmptbl = 0;
5122 esym.cobol_main = 0;
5123 esym.weakext = 0;
5124 esym.reserved = 0;
5125 esym.ifd = ifdNil;
5126 esym.asym.iss = issNil;
5127 esym.asym.st = stLocal;
5128 esym.asym.reserved = 0;
5129 esym.asym.index = indexNil;
5130 for (i = 0; i < 8; i++)
5131 {
5132 esym.asym.sc = sc[i];
5133 s = bfd_get_section_by_name (abfd, name[i]);
5134 if (s != NULL)
5135 {
5136 esym.asym.value = s->vma;
eea6121a 5137 last = s->vma + s->size;
252b5132
RH
5138 }
5139 else
5140 esym.asym.value = last;
5141
5142 if (! bfd_ecoff_debug_one_external (abfd, &debug, swap,
5143 name[i], &esym))
0a1b45a2 5144 return false;
252b5132
RH
5145 }
5146 }
5147
8423293d 5148 for (p = o->map_head.link_order;
252b5132
RH
5149 p != (struct bfd_link_order *) NULL;
5150 p = p->next)
5151 {
5152 asection *input_section;
5153 bfd *input_bfd;
5154 const struct ecoff_debug_swap *input_swap;
5155 struct ecoff_debug_info input_debug;
5156 char *eraw_src;
5157 char *eraw_end;
5158
5159 if (p->type != bfd_indirect_link_order)
5160 {
fd96f80f 5161 if (p->type == bfd_data_link_order)
252b5132
RH
5162 continue;
5163 abort ();
5164 }
5165
5166 input_section = p->u.indirect.section;
5167 input_bfd = input_section->owner;
5168
0ffa91dd
NC
5169 if (! is_alpha_elf (input_bfd))
5170 /* I don't know what a non ALPHA ELF bfd would be
5171 doing with a .mdebug section, but I don't really
5172 want to deal with it. */
5173 continue;
252b5132
RH
5174
5175 input_swap = (get_elf_backend_data (input_bfd)
5176 ->elf_backend_ecoff_debug_swap);
5177
eea6121a 5178 BFD_ASSERT (p->size == input_section->size);
252b5132
RH
5179
5180 /* The ECOFF linking code expects that we have already
5181 read in the debugging information and set up an
5182 ecoff_debug_info structure, so we do that now. */
5183 if (!elf64_alpha_read_ecoff_info (input_bfd, input_section,
5184 &input_debug))
0a1b45a2 5185 return false;
252b5132
RH
5186
5187 if (! (bfd_ecoff_debug_accumulate
5188 (mdebug_handle, abfd, &debug, swap, input_bfd,
5189 &input_debug, input_swap, info)))
0a1b45a2 5190 return false;
252b5132
RH
5191
5192 /* Loop through the external symbols. For each one with
5193 interesting information, try to find the symbol in
5194 the linker global hash table and save the information
5195 for the output external symbols. */
21d799b5 5196 eraw_src = (char *) input_debug.external_ext;
252b5132
RH
5197 eraw_end = (eraw_src
5198 + (input_debug.symbolic_header.iextMax
5199 * input_swap->external_ext_size));
5200 for (;
5201 eraw_src < eraw_end;
5202 eraw_src += input_swap->external_ext_size)
5203 {
5204 EXTR ext;
5205 const char *name;
5206 struct alpha_elf_link_hash_entry *h;
5207
2c3fc389 5208 (*input_swap->swap_ext_in) (input_bfd, eraw_src, &ext);
252b5132
RH
5209 if (ext.asym.sc == scNil
5210 || ext.asym.sc == scUndefined
5211 || ext.asym.sc == scSUndefined)
5212 continue;
5213
5214 name = input_debug.ssext + ext.asym.iss;
0a1b45a2 5215 h = alpha_elf_link_hash_lookup (htab, name, false, false, true);
252b5132
RH
5216 if (h == NULL || h->esym.ifd != -2)
5217 continue;
5218
5219 if (ext.ifd != -1)
5220 {
5221 BFD_ASSERT (ext.ifd
5222 < input_debug.symbolic_header.ifdMax);
5223 ext.ifd = input_debug.ifdmap[ext.ifd];
5224 }
5225
5226 h->esym = ext;
5227 }
5228
5229 /* Free up the information we just read. */
5230 free (input_debug.line);
5231 free (input_debug.external_dnr);
5232 free (input_debug.external_pdr);
5233 free (input_debug.external_sym);
5234 free (input_debug.external_opt);
5235 free (input_debug.external_aux);
5236 free (input_debug.ss);
5237 free (input_debug.ssext);
5238 free (input_debug.external_fdr);
5239 free (input_debug.external_rfd);
5240 free (input_debug.external_ext);
5241
5242 /* Hack: reset the SEC_HAS_CONTENTS flag so that
5243 elf_link_input_bfd ignores this section. */
5244 input_section->flags &=~ SEC_HAS_CONTENTS;
5245 }
5246
252b5132
RH
5247 /* Build the external symbol information. */
5248 einfo.abfd = abfd;
5249 einfo.info = info;
5250 einfo.debug = &debug;
5251 einfo.swap = swap;
0a1b45a2 5252 einfo.failed = false;
252b5132
RH
5253 elf_link_hash_traverse (elf_hash_table (info),
5254 elf64_alpha_output_extsym,
2c3fc389 5255 &einfo);
252b5132 5256 if (einfo.failed)
0a1b45a2 5257 return false;
252b5132
RH
5258
5259 /* Set the size of the .mdebug section. */
eea6121a 5260 o->size = bfd_ecoff_debug_size (abfd, &debug, swap);
252b5132
RH
5261
5262 /* Skip this section later on (I don't think this currently
5263 matters, but someday it might). */
8423293d 5264 o->map_head.link_order = (struct bfd_link_order *) NULL;
252b5132
RH
5265
5266 mdebug_sec = o;
5267 }
252b5132
RH
5268 }
5269
5270 /* Invoke the regular ELF backend linker to do all the work. */
c152c796 5271 if (! bfd_elf_final_link (abfd, info))
0a1b45a2 5272 return false;
252b5132
RH
5273
5274 /* Now write out the computed sections. */
5275
5276 /* The .got subsections... */
5277 {
5278 bfd *i, *dynobj = elf_hash_table(info)->dynobj;
4dfe6ac6 5279 for (i = htab->got_list;
252b5132
RH
5280 i != NULL;
5281 i = alpha_elf_tdata(i)->got_link_next)
5282 {
5283 asection *sgot;
5284
5285 /* elf_bfd_final_link already did everything in dynobj. */
5286 if (i == dynobj)
5287 continue;
5288
5289 sgot = alpha_elf_tdata(i)->got;
5290 if (! bfd_set_section_contents (abfd, sgot->output_section,
dc810e39
AM
5291 sgot->contents,
5292 (file_ptr) sgot->output_offset,
eea6121a 5293 sgot->size))
0a1b45a2 5294 return false;
252b5132
RH
5295 }
5296 }
5297
252b5132
RH
5298 if (mdebug_sec != (asection *) NULL)
5299 {
5300 BFD_ASSERT (abfd->output_has_begun);
5301 if (! bfd_ecoff_write_accumulated_debug (mdebug_handle, abfd, &debug,
5302 swap, info,
5303 mdebug_sec->filepos))
0a1b45a2 5304 return false;
252b5132
RH
5305
5306 bfd_ecoff_debug_free (mdebug_handle, abfd, &debug, swap, info);
5307 }
5308
0a1b45a2 5309 return true;
252b5132 5310}
fcfbdf31
JJ
5311
5312static enum elf_reloc_type_class
7e612e98
AM
5313elf64_alpha_reloc_type_class (const struct bfd_link_info *info ATTRIBUTE_UNUSED,
5314 const asection *rel_sec ATTRIBUTE_UNUSED,
5315 const Elf_Internal_Rela *rela)
fcfbdf31 5316{
f51e552e 5317 switch ((int) ELF64_R_TYPE (rela->r_info))
fcfbdf31
JJ
5318 {
5319 case R_ALPHA_RELATIVE:
5320 return reloc_class_relative;
5321 case R_ALPHA_JMP_SLOT:
5322 return reloc_class_plt;
5323 case R_ALPHA_COPY:
5324 return reloc_class_copy;
5325 default:
5326 return reloc_class_normal;
5327 }
5328}
252b5132 5329\f
b35d266b 5330static const struct bfd_elf_special_section elf64_alpha_special_sections[] =
2f89ff8d 5331{
07d6d2b8 5332 { STRING_COMMA_LEN (".sbss"), -2, SHT_NOBITS, SHF_ALLOC + SHF_WRITE + SHF_ALPHA_GPREL },
0112cd26 5333 { STRING_COMMA_LEN (".sdata"), -2, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE + SHF_ALPHA_GPREL },
07d6d2b8 5334 { NULL, 0, 0, 0, 0 }
2f89ff8d
L
5335};
5336
252b5132
RH
5337/* ECOFF swapping routines. These are used when dealing with the
5338 .mdebug section, which is in the ECOFF debugging format. Copied
fe8bc63d 5339 from elf32-mips.c. */
252b5132
RH
5340static const struct ecoff_debug_swap
5341elf64_alpha_ecoff_debug_swap =
5342{
5343 /* Symbol table magic number. */
5344 magicSym2,
5345 /* Alignment of debugging information. E.g., 4. */
5346 8,
5347 /* Sizes of external symbolic information. */
5348 sizeof (struct hdr_ext),
5349 sizeof (struct dnr_ext),
5350 sizeof (struct pdr_ext),
5351 sizeof (struct sym_ext),
5352 sizeof (struct opt_ext),
5353 sizeof (struct fdr_ext),
5354 sizeof (struct rfd_ext),
5355 sizeof (struct ext_ext),
5356 /* Functions to swap in external symbolic data. */
5357 ecoff_swap_hdr_in,
5358 ecoff_swap_dnr_in,
5359 ecoff_swap_pdr_in,
5360 ecoff_swap_sym_in,
5361 ecoff_swap_opt_in,
5362 ecoff_swap_fdr_in,
5363 ecoff_swap_rfd_in,
5364 ecoff_swap_ext_in,
5365 _bfd_ecoff_swap_tir_in,
5366 _bfd_ecoff_swap_rndx_in,
5367 /* Functions to swap out external symbolic data. */
5368 ecoff_swap_hdr_out,
5369 ecoff_swap_dnr_out,
5370 ecoff_swap_pdr_out,
5371 ecoff_swap_sym_out,
5372 ecoff_swap_opt_out,
5373 ecoff_swap_fdr_out,
5374 ecoff_swap_rfd_out,
5375 ecoff_swap_ext_out,
5376 _bfd_ecoff_swap_tir_out,
5377 _bfd_ecoff_swap_rndx_out,
5378 /* Function to read in symbolic data. */
5379 elf64_alpha_read_ecoff_info
5380};
5381\f
70bcb145
JW
5382/* Use a non-standard hash bucket size of 8. */
5383
562ace6b 5384static const struct elf_size_info alpha_elf_size_info =
70bcb145
JW
5385{
5386 sizeof (Elf64_External_Ehdr),
5387 sizeof (Elf64_External_Phdr),
5388 sizeof (Elf64_External_Shdr),
5389 sizeof (Elf64_External_Rel),
5390 sizeof (Elf64_External_Rela),
5391 sizeof (Elf64_External_Sym),
5392 sizeof (Elf64_External_Dyn),
5393 sizeof (Elf_External_Note),
5394 8,
5395 1,
45d6a902 5396 64, 3,
70bcb145
JW
5397 ELFCLASS64, EV_CURRENT,
5398 bfd_elf64_write_out_phdrs,
5399 bfd_elf64_write_shdrs_and_ehdr,
1489a3a0 5400 bfd_elf64_checksum_contents,
70bcb145 5401 bfd_elf64_write_relocs,
73ff0d56 5402 bfd_elf64_swap_symbol_in,
70bcb145
JW
5403 bfd_elf64_swap_symbol_out,
5404 bfd_elf64_slurp_reloc_table,
5405 bfd_elf64_slurp_symbol_table,
5406 bfd_elf64_swap_dyn_in,
5407 bfd_elf64_swap_dyn_out,
947216bf
AM
5408 bfd_elf64_swap_reloc_in,
5409 bfd_elf64_swap_reloc_out,
5410 bfd_elf64_swap_reloca_in,
5411 bfd_elf64_swap_reloca_out
70bcb145
JW
5412};
5413
6d00b590 5414#define TARGET_LITTLE_SYM alpha_elf64_vec
252b5132
RH
5415#define TARGET_LITTLE_NAME "elf64-alpha"
5416#define ELF_ARCH bfd_arch_alpha
ae95ffa6 5417#define ELF_TARGET_ID ALPHA_ELF_DATA
56fc028e
AJ
5418#define ELF_MACHINE_CODE EM_ALPHA
5419#define ELF_MAXPAGESIZE 0x10000
24718e3b 5420#define ELF_COMMONPAGESIZE 0x2000
252b5132
RH
5421
5422#define bfd_elf64_bfd_link_hash_table_create \
5423 elf64_alpha_bfd_link_hash_table_create
5424
5425#define bfd_elf64_bfd_reloc_type_lookup \
5426 elf64_alpha_bfd_reloc_type_lookup
157090f7
AM
5427#define bfd_elf64_bfd_reloc_name_lookup \
5428 elf64_alpha_bfd_reloc_name_lookup
252b5132
RH
5429#define elf_info_to_howto \
5430 elf64_alpha_info_to_howto
5431
5432#define bfd_elf64_mkobject \
5433 elf64_alpha_mkobject
5434#define elf_backend_object_p \
5435 elf64_alpha_object_p
5436
5437#define elf_backend_section_from_shdr \
5438 elf64_alpha_section_from_shdr
204692d7
RH
5439#define elf_backend_section_flags \
5440 elf64_alpha_section_flags
252b5132
RH
5441#define elf_backend_fake_sections \
5442 elf64_alpha_fake_sections
5443
5444#define bfd_elf64_bfd_is_local_label_name \
5445 elf64_alpha_is_local_label_name
5446#define bfd_elf64_find_nearest_line \
5447 elf64_alpha_find_nearest_line
5448#define bfd_elf64_bfd_relax_section \
5449 elf64_alpha_relax_section
5450
5451#define elf_backend_add_symbol_hook \
5452 elf64_alpha_add_symbol_hook
13285a1b
AM
5453#define elf_backend_relocs_compatible \
5454 _bfd_elf_relocs_compatible
6fc5bb57
AM
5455#define elf_backend_sort_relocs_p \
5456 elf64_alpha_sort_relocs_p
252b5132
RH
5457#define elf_backend_check_relocs \
5458 elf64_alpha_check_relocs
5459#define elf_backend_create_dynamic_sections \
5460 elf64_alpha_create_dynamic_sections
5461#define elf_backend_adjust_dynamic_symbol \
5462 elf64_alpha_adjust_dynamic_symbol
747ffa7b
AM
5463#define elf_backend_merge_symbol_attribute \
5464 elf64_alpha_merge_symbol_attribute
48f4b4f5
RH
5465#define elf_backend_copy_indirect_symbol \
5466 elf64_alpha_copy_indirect_symbol
252b5132
RH
5467#define elf_backend_always_size_sections \
5468 elf64_alpha_always_size_sections
5469#define elf_backend_size_dynamic_sections \
5470 elf64_alpha_size_dynamic_sections
74541ad4 5471#define elf_backend_omit_section_dynsym \
d00dd7dc 5472 _bfd_elf_omit_section_dynsym_all
252b5132
RH
5473#define elf_backend_relocate_section \
5474 elf64_alpha_relocate_section
5475#define elf_backend_finish_dynamic_symbol \
5476 elf64_alpha_finish_dynamic_symbol
5477#define elf_backend_finish_dynamic_sections \
5478 elf64_alpha_finish_dynamic_sections
5479#define bfd_elf64_bfd_final_link \
5480 elf64_alpha_final_link
fcfbdf31
JJ
5481#define elf_backend_reloc_type_class \
5482 elf64_alpha_reloc_type_class
252b5132 5483
e117360e
RH
5484#define elf_backend_can_gc_sections 1
5485#define elf_backend_gc_mark_hook elf64_alpha_gc_mark_hook
e117360e 5486
252b5132
RH
5487#define elf_backend_ecoff_debug_swap \
5488 &elf64_alpha_ecoff_debug_swap
5489
70bcb145
JW
5490#define elf_backend_size_info \
5491 alpha_elf_size_info
5492
29ef7005
L
5493#define elf_backend_special_sections \
5494 elf64_alpha_special_sections
2f89ff8d 5495
6f6fd151
L
5496#define elf_backend_strip_zero_sized_dynamic_sections \
5497 _bfd_elf_strip_zero_sized_dynamic_sections
5498
38b1a46c 5499/* A few constants that determine how the .plt section is set up. */
252b5132
RH
5500#define elf_backend_want_got_plt 0
5501#define elf_backend_plt_readonly 0
5502#define elf_backend_want_plt_sym 1
5503#define elf_backend_got_header_size 0
64f52338 5504#define elf_backend_dtrel_excludes_plt 1
252b5132
RH
5505
5506#include "elf64-target.h"
2238051f
RH
5507\f
5508/* FreeBSD support. */
5509
5510#undef TARGET_LITTLE_SYM
6d00b590 5511#define TARGET_LITTLE_SYM alpha_elf64_fbsd_vec
2238051f
RH
5512#undef TARGET_LITTLE_NAME
5513#define TARGET_LITTLE_NAME "elf64-alpha-freebsd"
d1036acb
L
5514#undef ELF_OSABI
5515#define ELF_OSABI ELFOSABI_FREEBSD
2238051f
RH
5516
5517/* The kernel recognizes executables as valid only if they carry a
5518 "FreeBSD" label in the ELF header. So we put this label on all
5519 executables and (for simplicity) also all other object files. */
5520
0a1b45a2 5521static bool
ed7e9d0b 5522elf64_alpha_fbsd_init_file_header (bfd *abfd, struct bfd_link_info *info)
2238051f
RH
5523{
5524 Elf_Internal_Ehdr * i_ehdrp; /* ELF file header, internal form. */
5525
ed7e9d0b 5526 if (!_bfd_elf_init_file_header (abfd, info))
0a1b45a2 5527 return false;
ed7e9d0b 5528
2238051f
RH
5529 i_ehdrp = elf_elfheader (abfd);
5530
5531 /* Put an ABI label supported by FreeBSD >= 4.1. */
d1036acb 5532 i_ehdrp->e_ident[EI_OSABI] = get_elf_backend_data (abfd)->elf_osabi;
2238051f
RH
5533#ifdef OLD_FREEBSD_ABI_LABEL
5534 /* The ABI label supported by FreeBSD <= 4.0 is quite nonstandard. */
5535 memcpy (&i_ehdrp->e_ident[EI_ABIVERSION], "FreeBSD", 8);
5536#endif
0a1b45a2 5537 return true;
2238051f
RH
5538}
5539
ed7e9d0b
AM
5540#undef elf_backend_init_file_header
5541#define elf_backend_init_file_header \
5542 elf64_alpha_fbsd_init_file_header
2238051f 5543
571fe01f 5544#undef elf64_bed
2238051f
RH
5545#define elf64_bed elf64_alpha_fbsd_bed
5546
5547#include "elf64-target.h"
This page took 1.662337 seconds and 4 git commands to generate.