XCOFF64 uninitialised read
[deliverable/binutils-gdb.git] / bfd / elf64-alpha.c
CommitLineData
252b5132 1/* Alpha specific support for 64-bit ELF
b3adc24a 2 Copyright (C) 1996-2020 Free Software Foundation, Inc.
252b5132
RH
3 Contributed by Richard Henderson <rth@tamu.edu>.
4
571fe01f 5 This file is part of BFD, the Binary File Descriptor library.
252b5132 6
571fe01f
NC
7 This program is free software; you can redistribute it and/or modify
8 it under the terms of the GNU General Public License as published by
cd123cb7 9 the Free Software Foundation; either version 3 of the License, or
571fe01f 10 (at your option) any later version.
252b5132 11
571fe01f
NC
12 This program is distributed in the hope that it will be useful,
13 but WITHOUT ANY WARRANTY; without even the implied warranty of
14 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 GNU General Public License for more details.
252b5132 16
571fe01f
NC
17 You should have received a copy of the GNU General Public License
18 along with this program; if not, write to the Free Software
cd123cb7
NC
19 Foundation, Inc., 51 Franklin Street - Fifth Floor, Boston,
20 MA 02110-1301, USA. */
21
252b5132
RH
22
23/* We need a published ABI spec for this. Until one comes out, don't
24 assume this'll remain unchanged forever. */
25
252b5132 26#include "sysdep.h"
3db64b00 27#include "bfd.h"
252b5132
RH
28#include "libbfd.h"
29#include "elf-bfd.h"
0ba9378a 30#include "ecoff-bfd.h"
252b5132
RH
31
32#include "elf/alpha.h"
33
34#define ALPHAECOFF
35
36#define NO_COFF_RELOCS
37#define NO_COFF_SYMBOLS
38#define NO_COFF_LINENOS
39
fe8bc63d 40/* Get the ECOFF swapping routines. Needed for the debug information. */
252b5132
RH
41#include "coff/internal.h"
42#include "coff/sym.h"
43#include "coff/symconst.h"
44#include "coff/ecoff.h"
45#include "coff/alpha.h"
46#include "aout/ar.h"
47#include "libcoff.h"
48#include "libecoff.h"
49#define ECOFF_64
50#include "ecoffswap.h"
51
6ec7057a
RH
52\f
53/* Instruction data for plt generation and relaxation. */
54
55#define OP_LDA 0x08
56#define OP_LDAH 0x09
57#define OP_LDQ 0x29
58#define OP_BR 0x30
59#define OP_BSR 0x34
60
61#define INSN_LDA (OP_LDA << 26)
62#define INSN_LDAH (OP_LDAH << 26)
63#define INSN_LDQ (OP_LDQ << 26)
64#define INSN_BR (OP_BR << 26)
65
66#define INSN_ADDQ 0x40000400
67#define INSN_RDUNIQ 0x0000009e
68#define INSN_SUBQ 0x40000520
69#define INSN_S4SUBQ 0x40000560
70#define INSN_UNOP 0x2ffe0000
71
72#define INSN_JSR 0x68004000
73#define INSN_JMP 0x68000000
74#define INSN_JSR_MASK 0xfc00c000
75
76#define INSN_A(I,A) (I | (A << 21))
77#define INSN_AB(I,A,B) (I | (A << 21) | (B << 16))
78#define INSN_ABC(I,A,B,C) (I | (A << 21) | (B << 16) | C)
79#define INSN_ABO(I,A,B,O) (I | (A << 21) | (B << 16) | ((O) & 0xffff))
80#define INSN_AD(I,A,D) (I | (A << 21) | (((D) >> 2) & 0x1fffff))
81
82/* PLT/GOT Stuff */
83
84/* Set by ld emulation. Putting this into the link_info or hash structure
85 is simply working too hard. */
86#ifdef USE_SECUREPLT
87bfd_boolean elf64_alpha_use_secureplt = TRUE;
88#else
89bfd_boolean elf64_alpha_use_secureplt = FALSE;
90#endif
91
92#define OLD_PLT_HEADER_SIZE 32
93#define OLD_PLT_ENTRY_SIZE 12
94#define NEW_PLT_HEADER_SIZE 36
95#define NEW_PLT_ENTRY_SIZE 4
96
97#define PLT_HEADER_SIZE \
98 (elf64_alpha_use_secureplt ? NEW_PLT_HEADER_SIZE : OLD_PLT_HEADER_SIZE)
99#define PLT_ENTRY_SIZE \
100 (elf64_alpha_use_secureplt ? NEW_PLT_ENTRY_SIZE : OLD_PLT_ENTRY_SIZE)
101
102#define MAX_GOT_SIZE (64*1024)
103
104#define ELF_DYNAMIC_INTERPRETER "/usr/lib/ld.so"
252b5132 105\f
21d799b5
NC
106
107/* Used to implement multiple .got subsections. */
108struct alpha_elf_got_entry
109{
110 struct alpha_elf_got_entry *next;
111
112 /* Which .got subsection? */
113 bfd *gotobj;
114
115 /* The addend in effect for this entry. */
116 bfd_vma addend;
117
118 /* The .got offset for this entry. */
119 int got_offset;
120
121 /* The .plt offset for this entry. */
122 int plt_offset;
123
124 /* How many references to this entry? */
125 int use_count;
126
127 /* The relocation type of this entry. */
128 unsigned char reloc_type;
129
130 /* How a LITERAL is used. */
131 unsigned char flags;
132
133 /* Have we initialized the dynamic relocation for this entry? */
134 unsigned char reloc_done;
135
136 /* Have we adjusted this entry for SEC_MERGE? */
137 unsigned char reloc_xlated;
138};
139
140struct alpha_elf_reloc_entry
141{
142 struct alpha_elf_reloc_entry *next;
143
144 /* Which .reloc section? */
145 asection *srel;
146
147 /* What kind of relocation? */
148 unsigned int rtype;
149
150 /* Is this against read-only section? */
151 unsigned int reltext : 1;
152
153 /* How many did we find? */
154 unsigned long count;
155};
156
252b5132
RH
157struct alpha_elf_link_hash_entry
158{
159 struct elf_link_hash_entry root;
160
161 /* External symbol information. */
162 EXTR esym;
163
164 /* Cumulative flags for all the .got entries. */
165 int flags;
166
9e756d64 167 /* Contexts in which a literal was referenced. */
8288a39e
RH
168#define ALPHA_ELF_LINK_HASH_LU_ADDR 0x01
169#define ALPHA_ELF_LINK_HASH_LU_MEM 0x02
170#define ALPHA_ELF_LINK_HASH_LU_BYTE 0x04
171#define ALPHA_ELF_LINK_HASH_LU_JSR 0x08
172#define ALPHA_ELF_LINK_HASH_LU_TLSGD 0x10
173#define ALPHA_ELF_LINK_HASH_LU_TLSLDM 0x20
174#define ALPHA_ELF_LINK_HASH_LU_JSRDIRECT 0x40
175#define ALPHA_ELF_LINK_HASH_LU_PLT 0x38
176#define ALPHA_ELF_LINK_HASH_TLS_IE 0x80
cc03ec80 177
252b5132 178 /* Used to implement multiple .got subsections. */
21d799b5 179 struct alpha_elf_got_entry *got_entries;
252b5132 180
571fe01f 181 /* Used to count non-got, non-plt relocations for delayed sizing
252b5132 182 of relocation sections. */
21d799b5 183 struct alpha_elf_reloc_entry *reloc_entries;
252b5132
RH
184};
185
186/* Alpha ELF linker hash table. */
187
188struct alpha_elf_link_hash_table
189{
190 struct elf_link_hash_table root;
191
192 /* The head of a list of .got subsections linked through
193 alpha_elf_tdata(abfd)->got_link_next. */
194 bfd *got_list;
4a828aab
RH
195
196 /* The most recent relax pass that we've seen. The GOTs
197 should be regenerated if this doesn't match. */
198 int relax_trip;
252b5132
RH
199};
200
201/* Look up an entry in a Alpha ELF linker hash table. */
202
203#define alpha_elf_link_hash_lookup(table, string, create, copy, follow) \
204 ((struct alpha_elf_link_hash_entry *) \
205 elf_link_hash_lookup (&(table)->root, (string), (create), \
206 (copy), (follow)))
207
208/* Traverse a Alpha ELF linker hash table. */
209
210#define alpha_elf_link_hash_traverse(table, func, info) \
211 (elf_link_hash_traverse \
212 (&(table)->root, \
2c3fc389 213 (bfd_boolean (*) (struct elf_link_hash_entry *, void *)) (func), \
252b5132
RH
214 (info)))
215
216/* Get the Alpha ELF linker hash table from a link_info structure. */
217
218#define alpha_elf_hash_table(p) \
4dfe6ac6
NC
219 (elf_hash_table_id ((struct elf_link_hash_table *) ((p)->hash)) \
220 == ALPHA_ELF_DATA ? ((struct alpha_elf_link_hash_table *) ((p)->hash)) : NULL)
252b5132
RH
221
222/* Get the object's symbols as our own entry type. */
223
224#define alpha_elf_sym_hashes(abfd) \
225 ((struct alpha_elf_link_hash_entry **)elf_sym_hashes(abfd))
226
68ffbac6 227/* Should we do dynamic things to this symbol? This differs from the
986a241f
RH
228 generic version in that we never need to consider function pointer
229 equality wrt PLT entries -- we don't create a PLT entry if a symbol's
230 address is ever taken. */
252b5132 231
986a241f 232static inline bfd_boolean
a7519a3c
RH
233alpha_elf_dynamic_symbol_p (struct elf_link_hash_entry *h,
234 struct bfd_link_info *info)
8fb35fed 235{
986a241f 236 return _bfd_elf_dynamic_symbol_p (h, info, 0);
8fb35fed 237}
252b5132
RH
238
239/* Create an entry in a Alpha ELF linker hash table. */
240
241static struct bfd_hash_entry *
a7519a3c
RH
242elf64_alpha_link_hash_newfunc (struct bfd_hash_entry *entry,
243 struct bfd_hash_table *table,
244 const char *string)
252b5132
RH
245{
246 struct alpha_elf_link_hash_entry *ret =
247 (struct alpha_elf_link_hash_entry *) entry;
248
249 /* Allocate the structure if it has not already been allocated by a
250 subclass. */
251 if (ret == (struct alpha_elf_link_hash_entry *) NULL)
252 ret = ((struct alpha_elf_link_hash_entry *)
253 bfd_hash_allocate (table,
254 sizeof (struct alpha_elf_link_hash_entry)));
255 if (ret == (struct alpha_elf_link_hash_entry *) NULL)
256 return (struct bfd_hash_entry *) ret;
257
258 /* Call the allocation method of the superclass. */
259 ret = ((struct alpha_elf_link_hash_entry *)
260 _bfd_elf_link_hash_newfunc ((struct bfd_hash_entry *) ret,
261 table, string));
262 if (ret != (struct alpha_elf_link_hash_entry *) NULL)
263 {
264 /* Set local fields. */
265 memset (&ret->esym, 0, sizeof (EXTR));
266 /* We use -2 as a marker to indicate that the information has
267 not been set. -1 means there is no associated ifd. */
268 ret->esym.ifd = -2;
269 ret->flags = 0;
270 ret->got_entries = NULL;
271 ret->reloc_entries = NULL;
272 }
273
274 return (struct bfd_hash_entry *) ret;
275}
276
277/* Create a Alpha ELF linker hash table. */
278
279static struct bfd_link_hash_table *
a7519a3c 280elf64_alpha_bfd_link_hash_table_create (bfd *abfd)
252b5132
RH
281{
282 struct alpha_elf_link_hash_table *ret;
986f0783 283 size_t amt = sizeof (struct alpha_elf_link_hash_table);
252b5132 284
e2d34d7d 285 ret = (struct alpha_elf_link_hash_table *) bfd_zmalloc (amt);
252b5132
RH
286 if (ret == (struct alpha_elf_link_hash_table *) NULL)
287 return NULL;
288
66eb6687
AM
289 if (!_bfd_elf_link_hash_table_init (&ret->root, abfd,
290 elf64_alpha_link_hash_newfunc,
4dfe6ac6
NC
291 sizeof (struct alpha_elf_link_hash_entry),
292 ALPHA_ELF_DATA))
252b5132 293 {
e2d34d7d 294 free (ret);
252b5132
RH
295 return NULL;
296 }
297
298 return &ret->root.root;
299}
300\f
698600e4
AM
301/* Alpha ELF follows MIPS ELF in using a special find_nearest_line
302 routine in order to handle the ECOFF debugging information. */
303
304struct alpha_elf_find_line
305{
306 struct ecoff_debug_info d;
307 struct ecoff_find_line i;
308};
309
252b5132
RH
310/* We have some private fields hanging off of the elf_tdata structure. */
311
312struct alpha_elf_obj_tdata
313{
314 struct elf_obj_tdata root;
315
316 /* For every input file, these are the got entries for that object's
317 local symbols. */
318 struct alpha_elf_got_entry ** local_got_entries;
319
320 /* For every input file, this is the object that owns the got that
321 this input file uses. */
322 bfd *gotobj;
323
324 /* For every got, this is a linked list through the objects using this got */
325 bfd *in_got_link_next;
326
327 /* For every got, this is a link to the next got subsegment. */
328 bfd *got_link_next;
329
330 /* For every got, this is the section. */
331 asection *got;
332
3765b1be
RH
333 /* For every got, this is it's total number of words. */
334 int total_got_size;
252b5132 335
3765b1be 336 /* For every got, this is the sum of the number of words required
252b5132 337 to hold all of the member object's local got. */
3765b1be 338 int local_got_size;
698600e4
AM
339
340 /* Used by elf64_alpha_find_nearest_line entry point. */
341 struct alpha_elf_find_line *find_line_info;
342
252b5132
RH
343};
344
345#define alpha_elf_tdata(abfd) \
346 ((struct alpha_elf_obj_tdata *) (abfd)->tdata.any)
347
0ffa91dd
NC
348#define is_alpha_elf(bfd) \
349 (bfd_get_flavour (bfd) == bfd_target_elf_flavour \
350 && elf_tdata (bfd) != NULL \
4dfe6ac6 351 && elf_object_id (bfd) == ALPHA_ELF_DATA)
0ffa91dd 352
b34976b6 353static bfd_boolean
a7519a3c 354elf64_alpha_mkobject (bfd *abfd)
252b5132 355{
0ffa91dd 356 return bfd_elf_allocate_object (abfd, sizeof (struct alpha_elf_obj_tdata),
4dfe6ac6 357 ALPHA_ELF_DATA);
252b5132
RH
358}
359
b34976b6 360static bfd_boolean
a7519a3c 361elf64_alpha_object_p (bfd *abfd)
252b5132 362{
252b5132
RH
363 /* Set the right machine number for an Alpha ELF file. */
364 return bfd_default_set_arch_mach (abfd, bfd_arch_alpha, 0);
365}
366\f
a7519a3c
RH
367/* A relocation function which doesn't do anything. */
368
369static bfd_reloc_status_type
370elf64_alpha_reloc_nil (bfd *abfd ATTRIBUTE_UNUSED, arelent *reloc,
371 asymbol *sym ATTRIBUTE_UNUSED,
2c3fc389 372 void * data ATTRIBUTE_UNUSED, asection *sec,
a7519a3c
RH
373 bfd *output_bfd, char **error_message ATTRIBUTE_UNUSED)
374{
375 if (output_bfd)
376 reloc->address += sec->output_offset;
377 return bfd_reloc_ok;
378}
379
380/* A relocation function used for an unsupported reloc. */
381
382static bfd_reloc_status_type
383elf64_alpha_reloc_bad (bfd *abfd ATTRIBUTE_UNUSED, arelent *reloc,
384 asymbol *sym ATTRIBUTE_UNUSED,
2c3fc389 385 void * data ATTRIBUTE_UNUSED, asection *sec,
a7519a3c
RH
386 bfd *output_bfd, char **error_message ATTRIBUTE_UNUSED)
387{
388 if (output_bfd)
389 reloc->address += sec->output_offset;
390 return bfd_reloc_notsupported;
391}
392
393/* Do the work of the GPDISP relocation. */
394
395static bfd_reloc_status_type
396elf64_alpha_do_reloc_gpdisp (bfd *abfd, bfd_vma gpdisp, bfd_byte *p_ldah,
397 bfd_byte *p_lda)
398{
399 bfd_reloc_status_type ret = bfd_reloc_ok;
400 bfd_vma addend;
401 unsigned long i_ldah, i_lda;
402
403 i_ldah = bfd_get_32 (abfd, p_ldah);
404 i_lda = bfd_get_32 (abfd, p_lda);
405
406 /* Complain if the instructions are not correct. */
407 if (((i_ldah >> 26) & 0x3f) != 0x09
408 || ((i_lda >> 26) & 0x3f) != 0x08)
409 ret = bfd_reloc_dangerous;
410
411 /* Extract the user-supplied offset, mirroring the sign extensions
412 that the instructions perform. */
413 addend = ((i_ldah & 0xffff) << 16) | (i_lda & 0xffff);
414 addend = (addend ^ 0x80008000) - 0x80008000;
415
416 gpdisp += addend;
417
418 if ((bfd_signed_vma) gpdisp < -(bfd_signed_vma) 0x80000000
419 || (bfd_signed_vma) gpdisp >= (bfd_signed_vma) 0x7fff8000)
420 ret = bfd_reloc_overflow;
421
422 /* compensate for the sign extension again. */
423 i_ldah = ((i_ldah & 0xffff0000)
424 | (((gpdisp >> 16) + ((gpdisp >> 15) & 1)) & 0xffff));
425 i_lda = (i_lda & 0xffff0000) | (gpdisp & 0xffff);
426
427 bfd_put_32 (abfd, (bfd_vma) i_ldah, p_ldah);
428 bfd_put_32 (abfd, (bfd_vma) i_lda, p_lda);
429
430 return ret;
431}
432
433/* The special function for the GPDISP reloc. */
434
435static bfd_reloc_status_type
436elf64_alpha_reloc_gpdisp (bfd *abfd, arelent *reloc_entry,
2c3fc389 437 asymbol *sym ATTRIBUTE_UNUSED, void * data,
a7519a3c
RH
438 asection *input_section, bfd *output_bfd,
439 char **err_msg)
440{
441 bfd_reloc_status_type ret;
442 bfd_vma gp, relocation;
443 bfd_vma high_address;
444 bfd_byte *p_ldah, *p_lda;
445
446 /* Don't do anything if we're not doing a final link. */
447 if (output_bfd)
448 {
449 reloc_entry->address += input_section->output_offset;
450 return bfd_reloc_ok;
451 }
452
453 high_address = bfd_get_section_limit (abfd, input_section);
454 if (reloc_entry->address > high_address
455 || reloc_entry->address + reloc_entry->addend > high_address)
456 return bfd_reloc_outofrange;
457
458 /* The gp used in the portion of the output object to which this
459 input object belongs is cached on the input bfd. */
460 gp = _bfd_get_gp_value (abfd);
461
462 relocation = (input_section->output_section->vma
463 + input_section->output_offset
464 + reloc_entry->address);
465
466 p_ldah = (bfd_byte *) data + reloc_entry->address;
467 p_lda = p_ldah + reloc_entry->addend;
468
469 ret = elf64_alpha_do_reloc_gpdisp (abfd, gp - relocation, p_ldah, p_lda);
470
471 /* Complain if the instructions are not correct. */
472 if (ret == bfd_reloc_dangerous)
473 *err_msg = _("GPDISP relocation did not find ldah and lda instructions");
474
475 return ret;
476}
477
252b5132
RH
478/* In case we're on a 32-bit machine, construct a 64-bit "-1" value
479 from smaller values. Start with zero, widen, *then* decrement. */
480#define MINUS_ONE (((bfd_vma)0) - 1)
481
21d799b5 482
dfe57ca0 483#define SKIP_HOWTO(N) \
21d799b5 484 HOWTO(N, 0, 0, 0, 0, 0, complain_overflow_dont, elf64_alpha_reloc_bad, 0, 0, 0, 0, 0)
dfe57ca0 485
252b5132
RH
486static reloc_howto_type elf64_alpha_howto_table[] =
487{
488 HOWTO (R_ALPHA_NONE, /* type */
489 0, /* rightshift */
6346d5ca
AM
490 3, /* size (0 = byte, 1 = short, 2 = long) */
491 0, /* bitsize */
b34976b6 492 TRUE, /* pc_relative */
252b5132
RH
493 0, /* bitpos */
494 complain_overflow_dont, /* complain_on_overflow */
495 elf64_alpha_reloc_nil, /* special_function */
496 "NONE", /* name */
b34976b6 497 FALSE, /* partial_inplace */
252b5132
RH
498 0, /* src_mask */
499 0, /* dst_mask */
b34976b6 500 TRUE), /* pcrel_offset */
252b5132
RH
501
502 /* A 32 bit reference to a symbol. */
503 HOWTO (R_ALPHA_REFLONG, /* type */
504 0, /* rightshift */
505 2, /* size (0 = byte, 1 = short, 2 = long) */
506 32, /* bitsize */
b34976b6 507 FALSE, /* pc_relative */
252b5132
RH
508 0, /* bitpos */
509 complain_overflow_bitfield, /* complain_on_overflow */
bc1bc43f 510 bfd_elf_generic_reloc, /* special_function */
252b5132 511 "REFLONG", /* name */
b34976b6 512 FALSE, /* partial_inplace */
252b5132
RH
513 0xffffffff, /* src_mask */
514 0xffffffff, /* dst_mask */
b34976b6 515 FALSE), /* pcrel_offset */
252b5132
RH
516
517 /* A 64 bit reference to a symbol. */
518 HOWTO (R_ALPHA_REFQUAD, /* type */
519 0, /* rightshift */
520 4, /* size (0 = byte, 1 = short, 2 = long) */
521 64, /* bitsize */
b34976b6 522 FALSE, /* pc_relative */
252b5132
RH
523 0, /* bitpos */
524 complain_overflow_bitfield, /* complain_on_overflow */
bc1bc43f 525 bfd_elf_generic_reloc, /* special_function */
252b5132 526 "REFQUAD", /* name */
b34976b6 527 FALSE, /* partial_inplace */
252b5132
RH
528 MINUS_ONE, /* src_mask */
529 MINUS_ONE, /* dst_mask */
b34976b6 530 FALSE), /* pcrel_offset */
252b5132
RH
531
532 /* A 32 bit GP relative offset. This is just like REFLONG except
533 that when the value is used the value of the gp register will be
534 added in. */
535 HOWTO (R_ALPHA_GPREL32, /* type */
536 0, /* rightshift */
537 2, /* size (0 = byte, 1 = short, 2 = long) */
538 32, /* bitsize */
b34976b6 539 FALSE, /* pc_relative */
252b5132
RH
540 0, /* bitpos */
541 complain_overflow_bitfield, /* complain_on_overflow */
bc1bc43f 542 bfd_elf_generic_reloc, /* special_function */
252b5132 543 "GPREL32", /* name */
b34976b6 544 FALSE, /* partial_inplace */
252b5132
RH
545 0xffffffff, /* src_mask */
546 0xffffffff, /* dst_mask */
b34976b6 547 FALSE), /* pcrel_offset */
252b5132
RH
548
549 /* Used for an instruction that refers to memory off the GP register. */
550 HOWTO (R_ALPHA_LITERAL, /* type */
551 0, /* rightshift */
dfe57ca0 552 1, /* size (0 = byte, 1 = short, 2 = long) */
252b5132 553 16, /* bitsize */
b34976b6 554 FALSE, /* pc_relative */
252b5132
RH
555 0, /* bitpos */
556 complain_overflow_signed, /* complain_on_overflow */
bc1bc43f 557 bfd_elf_generic_reloc, /* special_function */
252b5132 558 "ELF_LITERAL", /* name */
b34976b6 559 FALSE, /* partial_inplace */
252b5132
RH
560 0xffff, /* src_mask */
561 0xffff, /* dst_mask */
b34976b6 562 FALSE), /* pcrel_offset */
252b5132
RH
563
564 /* This reloc only appears immediately following an ELF_LITERAL reloc.
565 It identifies a use of the literal. The symbol index is special:
566 1 means the literal address is in the base register of a memory
567 format instruction; 2 means the literal address is in the byte
568 offset register of a byte-manipulation instruction; 3 means the
569 literal address is in the target register of a jsr instruction.
570 This does not actually do any relocation. */
571 HOWTO (R_ALPHA_LITUSE, /* type */
572 0, /* rightshift */
dfe57ca0 573 1, /* size (0 = byte, 1 = short, 2 = long) */
252b5132 574 32, /* bitsize */
b34976b6 575 FALSE, /* pc_relative */
252b5132
RH
576 0, /* bitpos */
577 complain_overflow_dont, /* complain_on_overflow */
578 elf64_alpha_reloc_nil, /* special_function */
579 "LITUSE", /* name */
b34976b6 580 FALSE, /* partial_inplace */
252b5132
RH
581 0, /* src_mask */
582 0, /* dst_mask */
b34976b6 583 FALSE), /* pcrel_offset */
252b5132
RH
584
585 /* Load the gp register. This is always used for a ldah instruction
586 which loads the upper 16 bits of the gp register. The symbol
587 index of the GPDISP instruction is an offset in bytes to the lda
588 instruction that loads the lower 16 bits. The value to use for
589 the relocation is the difference between the GP value and the
590 current location; the load will always be done against a register
591 holding the current address.
592
593 NOTE: Unlike ECOFF, partial in-place relocation is not done. If
594 any offset is present in the instructions, it is an offset from
595 the register to the ldah instruction. This lets us avoid any
596 stupid hackery like inventing a gp value to do partial relocation
597 against. Also unlike ECOFF, we do the whole relocation off of
598 the GPDISP rather than a GPDISP_HI16/GPDISP_LO16 pair. An odd,
599 space consuming bit, that, since all the information was present
600 in the GPDISP_HI16 reloc. */
601 HOWTO (R_ALPHA_GPDISP, /* type */
602 16, /* rightshift */
603 2, /* size (0 = byte, 1 = short, 2 = long) */
604 16, /* bitsize */
b34976b6 605 FALSE, /* pc_relative */
252b5132
RH
606 0, /* bitpos */
607 complain_overflow_dont, /* complain_on_overflow */
608 elf64_alpha_reloc_gpdisp, /* special_function */
609 "GPDISP", /* name */
b34976b6 610 FALSE, /* partial_inplace */
252b5132
RH
611 0xffff, /* src_mask */
612 0xffff, /* dst_mask */
b34976b6 613 TRUE), /* pcrel_offset */
252b5132
RH
614
615 /* A 21 bit branch. */
616 HOWTO (R_ALPHA_BRADDR, /* type */
617 2, /* rightshift */
618 2, /* size (0 = byte, 1 = short, 2 = long) */
619 21, /* bitsize */
b34976b6 620 TRUE, /* pc_relative */
252b5132
RH
621 0, /* bitpos */
622 complain_overflow_signed, /* complain_on_overflow */
bc1bc43f 623 bfd_elf_generic_reloc, /* special_function */
252b5132 624 "BRADDR", /* name */
b34976b6 625 FALSE, /* partial_inplace */
252b5132
RH
626 0x1fffff, /* src_mask */
627 0x1fffff, /* dst_mask */
b34976b6 628 TRUE), /* pcrel_offset */
252b5132
RH
629
630 /* A hint for a jump to a register. */
631 HOWTO (R_ALPHA_HINT, /* type */
632 2, /* rightshift */
dfe57ca0 633 1, /* size (0 = byte, 1 = short, 2 = long) */
252b5132 634 14, /* bitsize */
b34976b6 635 TRUE, /* pc_relative */
252b5132
RH
636 0, /* bitpos */
637 complain_overflow_dont, /* complain_on_overflow */
bc1bc43f 638 bfd_elf_generic_reloc, /* special_function */
252b5132 639 "HINT", /* name */
b34976b6 640 FALSE, /* partial_inplace */
252b5132
RH
641 0x3fff, /* src_mask */
642 0x3fff, /* dst_mask */
b34976b6 643 TRUE), /* pcrel_offset */
252b5132
RH
644
645 /* 16 bit PC relative offset. */
646 HOWTO (R_ALPHA_SREL16, /* type */
647 0, /* rightshift */
648 1, /* size (0 = byte, 1 = short, 2 = long) */
649 16, /* bitsize */
b34976b6 650 TRUE, /* pc_relative */
252b5132
RH
651 0, /* bitpos */
652 complain_overflow_signed, /* complain_on_overflow */
bc1bc43f 653 bfd_elf_generic_reloc, /* special_function */
252b5132 654 "SREL16", /* name */
b34976b6 655 FALSE, /* partial_inplace */
252b5132
RH
656 0xffff, /* src_mask */
657 0xffff, /* dst_mask */
b34976b6 658 TRUE), /* pcrel_offset */
252b5132
RH
659
660 /* 32 bit PC relative offset. */
661 HOWTO (R_ALPHA_SREL32, /* type */
662 0, /* rightshift */
663 2, /* size (0 = byte, 1 = short, 2 = long) */
664 32, /* bitsize */
b34976b6 665 TRUE, /* pc_relative */
252b5132
RH
666 0, /* bitpos */
667 complain_overflow_signed, /* complain_on_overflow */
bc1bc43f 668 bfd_elf_generic_reloc, /* special_function */
252b5132 669 "SREL32", /* name */
b34976b6 670 FALSE, /* partial_inplace */
252b5132
RH
671 0xffffffff, /* src_mask */
672 0xffffffff, /* dst_mask */
b34976b6 673 TRUE), /* pcrel_offset */
252b5132
RH
674
675 /* A 64 bit PC relative offset. */
676 HOWTO (R_ALPHA_SREL64, /* type */
677 0, /* rightshift */
678 4, /* size (0 = byte, 1 = short, 2 = long) */
679 64, /* bitsize */
b34976b6 680 TRUE, /* pc_relative */
252b5132
RH
681 0, /* bitpos */
682 complain_overflow_signed, /* complain_on_overflow */
bc1bc43f 683 bfd_elf_generic_reloc, /* special_function */
252b5132 684 "SREL64", /* name */
b34976b6 685 FALSE, /* partial_inplace */
252b5132
RH
686 MINUS_ONE, /* src_mask */
687 MINUS_ONE, /* dst_mask */
b34976b6 688 TRUE), /* pcrel_offset */
252b5132 689
dfe57ca0
RH
690 /* Skip 12 - 16; deprecated ECOFF relocs. */
691 SKIP_HOWTO (12),
692 SKIP_HOWTO (13),
693 SKIP_HOWTO (14),
694 SKIP_HOWTO (15),
695 SKIP_HOWTO (16),
252b5132
RH
696
697 /* The high 16 bits of the displacement from GP to the target. */
698 HOWTO (R_ALPHA_GPRELHIGH,
699 0, /* rightshift */
dfe57ca0 700 1, /* size (0 = byte, 1 = short, 2 = long) */
252b5132 701 16, /* bitsize */
b34976b6 702 FALSE, /* pc_relative */
252b5132
RH
703 0, /* bitpos */
704 complain_overflow_signed, /* complain_on_overflow */
bc1bc43f 705 bfd_elf_generic_reloc, /* special_function */
252b5132 706 "GPRELHIGH", /* name */
b34976b6 707 FALSE, /* partial_inplace */
252b5132
RH
708 0xffff, /* src_mask */
709 0xffff, /* dst_mask */
b34976b6 710 FALSE), /* pcrel_offset */
252b5132
RH
711
712 /* The low 16 bits of the displacement from GP to the target. */
713 HOWTO (R_ALPHA_GPRELLOW,
714 0, /* rightshift */
dfe57ca0 715 1, /* size (0 = byte, 1 = short, 2 = long) */
252b5132 716 16, /* bitsize */
b34976b6 717 FALSE, /* pc_relative */
252b5132
RH
718 0, /* bitpos */
719 complain_overflow_dont, /* complain_on_overflow */
bc1bc43f 720 bfd_elf_generic_reloc, /* special_function */
252b5132 721 "GPRELLOW", /* name */
b34976b6 722 FALSE, /* partial_inplace */
252b5132
RH
723 0xffff, /* src_mask */
724 0xffff, /* dst_mask */
b34976b6 725 FALSE), /* pcrel_offset */
252b5132
RH
726
727 /* A 16-bit displacement from the GP to the target. */
dfe57ca0 728 HOWTO (R_ALPHA_GPREL16,
252b5132 729 0, /* rightshift */
dfe57ca0 730 1, /* size (0 = byte, 1 = short, 2 = long) */
252b5132 731 16, /* bitsize */
b34976b6 732 FALSE, /* pc_relative */
252b5132
RH
733 0, /* bitpos */
734 complain_overflow_signed, /* complain_on_overflow */
bc1bc43f 735 bfd_elf_generic_reloc, /* special_function */
dfe57ca0 736 "GPREL16", /* name */
b34976b6 737 FALSE, /* partial_inplace */
252b5132
RH
738 0xffff, /* src_mask */
739 0xffff, /* dst_mask */
b34976b6 740 FALSE), /* pcrel_offset */
252b5132 741
dfe57ca0
RH
742 /* Skip 20 - 23; deprecated ECOFF relocs. */
743 SKIP_HOWTO (20),
744 SKIP_HOWTO (21),
745 SKIP_HOWTO (22),
746 SKIP_HOWTO (23),
252b5132 747
fe8bc63d 748 /* Misc ELF relocations. */
252b5132
RH
749
750 /* A dynamic relocation to copy the target into our .dynbss section. */
751 /* Not generated, as all Alpha objects use PIC, so it is not needed. It
752 is present because every other ELF has one, but should not be used
753 because .dynbss is an ugly thing. */
754 HOWTO (R_ALPHA_COPY,
755 0,
756 0,
757 0,
b34976b6 758 FALSE,
252b5132
RH
759 0,
760 complain_overflow_dont,
761 bfd_elf_generic_reloc,
762 "COPY",
b34976b6 763 FALSE,
252b5132
RH
764 0,
765 0,
b34976b6 766 TRUE),
252b5132
RH
767
768 /* A dynamic relocation for a .got entry. */
769 HOWTO (R_ALPHA_GLOB_DAT,
770 0,
771 0,
772 0,
b34976b6 773 FALSE,
252b5132
RH
774 0,
775 complain_overflow_dont,
776 bfd_elf_generic_reloc,
777 "GLOB_DAT",
b34976b6 778 FALSE,
252b5132
RH
779 0,
780 0,
b34976b6 781 TRUE),
252b5132
RH
782
783 /* A dynamic relocation for a .plt entry. */
784 HOWTO (R_ALPHA_JMP_SLOT,
785 0,
786 0,
787 0,
b34976b6 788 FALSE,
252b5132
RH
789 0,
790 complain_overflow_dont,
791 bfd_elf_generic_reloc,
792 "JMP_SLOT",
b34976b6 793 FALSE,
252b5132
RH
794 0,
795 0,
b34976b6 796 TRUE),
252b5132
RH
797
798 /* A dynamic relocation to add the base of the DSO to a 64-bit field. */
799 HOWTO (R_ALPHA_RELATIVE,
800 0,
801 0,
802 0,
b34976b6 803 FALSE,
252b5132
RH
804 0,
805 complain_overflow_dont,
806 bfd_elf_generic_reloc,
807 "RELATIVE",
b34976b6 808 FALSE,
252b5132
RH
809 0,
810 0,
b34976b6 811 TRUE),
7793f4d0
RH
812
813 /* A 21 bit branch that adjusts for gp loads. */
814 HOWTO (R_ALPHA_BRSGP, /* type */
815 2, /* rightshift */
816 2, /* size (0 = byte, 1 = short, 2 = long) */
817 21, /* bitsize */
b34976b6 818 TRUE, /* pc_relative */
7793f4d0
RH
819 0, /* bitpos */
820 complain_overflow_signed, /* complain_on_overflow */
bc1bc43f 821 bfd_elf_generic_reloc, /* special_function */
7793f4d0 822 "BRSGP", /* name */
b34976b6 823 FALSE, /* partial_inplace */
7793f4d0
RH
824 0x1fffff, /* src_mask */
825 0x1fffff, /* dst_mask */
b34976b6 826 TRUE), /* pcrel_offset */
3765b1be
RH
827
828 /* Creates a tls_index for the symbol in the got. */
829 HOWTO (R_ALPHA_TLSGD, /* type */
830 0, /* rightshift */
831 1, /* size (0 = byte, 1 = short, 2 = long) */
832 16, /* bitsize */
b34976b6 833 FALSE, /* pc_relative */
3765b1be
RH
834 0, /* bitpos */
835 complain_overflow_signed, /* complain_on_overflow */
bc1bc43f 836 bfd_elf_generic_reloc, /* special_function */
3765b1be 837 "TLSGD", /* name */
b34976b6 838 FALSE, /* partial_inplace */
3765b1be
RH
839 0xffff, /* src_mask */
840 0xffff, /* dst_mask */
b34976b6 841 FALSE), /* pcrel_offset */
3765b1be
RH
842
843 /* Creates a tls_index for the (current) module in the got. */
844 HOWTO (R_ALPHA_TLSLDM, /* type */
845 0, /* rightshift */
846 1, /* size (0 = byte, 1 = short, 2 = long) */
847 16, /* bitsize */
b34976b6 848 FALSE, /* pc_relative */
3765b1be
RH
849 0, /* bitpos */
850 complain_overflow_signed, /* complain_on_overflow */
bc1bc43f 851 bfd_elf_generic_reloc, /* special_function */
3765b1be 852 "TLSLDM", /* name */
b34976b6 853 FALSE, /* partial_inplace */
3765b1be
RH
854 0xffff, /* src_mask */
855 0xffff, /* dst_mask */
b34976b6 856 FALSE), /* pcrel_offset */
3765b1be
RH
857
858 /* A dynamic relocation for a DTP module entry. */
859 HOWTO (R_ALPHA_DTPMOD64, /* type */
860 0, /* rightshift */
861 4, /* size (0 = byte, 1 = short, 2 = long) */
862 64, /* bitsize */
b34976b6 863 FALSE, /* pc_relative */
3765b1be
RH
864 0, /* bitpos */
865 complain_overflow_bitfield, /* complain_on_overflow */
bc1bc43f 866 bfd_elf_generic_reloc, /* special_function */
3765b1be 867 "DTPMOD64", /* name */
b34976b6 868 FALSE, /* partial_inplace */
3765b1be
RH
869 MINUS_ONE, /* src_mask */
870 MINUS_ONE, /* dst_mask */
b34976b6 871 FALSE), /* pcrel_offset */
3765b1be
RH
872
873 /* Creates a 64-bit offset in the got for the displacement
874 from DTP to the target. */
875 HOWTO (R_ALPHA_GOTDTPREL, /* type */
876 0, /* rightshift */
877 1, /* size (0 = byte, 1 = short, 2 = long) */
878 16, /* bitsize */
b34976b6 879 FALSE, /* pc_relative */
3765b1be
RH
880 0, /* bitpos */
881 complain_overflow_signed, /* complain_on_overflow */
bc1bc43f 882 bfd_elf_generic_reloc, /* special_function */
3765b1be 883 "GOTDTPREL", /* name */
b34976b6 884 FALSE, /* partial_inplace */
3765b1be
RH
885 0xffff, /* src_mask */
886 0xffff, /* dst_mask */
b34976b6 887 FALSE), /* pcrel_offset */
3765b1be
RH
888
889 /* A dynamic relocation for a displacement from DTP to the target. */
890 HOWTO (R_ALPHA_DTPREL64, /* type */
891 0, /* rightshift */
892 4, /* size (0 = byte, 1 = short, 2 = long) */
893 64, /* bitsize */
b34976b6 894 FALSE, /* pc_relative */
3765b1be
RH
895 0, /* bitpos */
896 complain_overflow_bitfield, /* complain_on_overflow */
bc1bc43f 897 bfd_elf_generic_reloc, /* special_function */
3765b1be 898 "DTPREL64", /* name */
b34976b6 899 FALSE, /* partial_inplace */
3765b1be
RH
900 MINUS_ONE, /* src_mask */
901 MINUS_ONE, /* dst_mask */
b34976b6 902 FALSE), /* pcrel_offset */
3765b1be
RH
903
904 /* The high 16 bits of the displacement from DTP to the target. */
905 HOWTO (R_ALPHA_DTPRELHI, /* type */
906 0, /* rightshift */
907 1, /* size (0 = byte, 1 = short, 2 = long) */
908 16, /* bitsize */
b34976b6 909 FALSE, /* pc_relative */
3765b1be
RH
910 0, /* bitpos */
911 complain_overflow_signed, /* complain_on_overflow */
bc1bc43f 912 bfd_elf_generic_reloc, /* special_function */
3765b1be 913 "DTPRELHI", /* name */
b34976b6 914 FALSE, /* partial_inplace */
3765b1be
RH
915 0xffff, /* src_mask */
916 0xffff, /* dst_mask */
b34976b6 917 FALSE), /* pcrel_offset */
3765b1be
RH
918
919 /* The low 16 bits of the displacement from DTP to the target. */
920 HOWTO (R_ALPHA_DTPRELLO, /* type */
921 0, /* rightshift */
922 1, /* size (0 = byte, 1 = short, 2 = long) */
923 16, /* bitsize */
b34976b6 924 FALSE, /* pc_relative */
3765b1be
RH
925 0, /* bitpos */
926 complain_overflow_dont, /* complain_on_overflow */
bc1bc43f 927 bfd_elf_generic_reloc, /* special_function */
3765b1be 928 "DTPRELLO", /* name */
b34976b6 929 FALSE, /* partial_inplace */
3765b1be
RH
930 0xffff, /* src_mask */
931 0xffff, /* dst_mask */
b34976b6 932 FALSE), /* pcrel_offset */
3765b1be
RH
933
934 /* A 16-bit displacement from DTP to the target. */
935 HOWTO (R_ALPHA_DTPREL16, /* type */
936 0, /* rightshift */
937 1, /* size (0 = byte, 1 = short, 2 = long) */
938 16, /* bitsize */
b34976b6 939 FALSE, /* pc_relative */
3765b1be
RH
940 0, /* bitpos */
941 complain_overflow_signed, /* complain_on_overflow */
bc1bc43f 942 bfd_elf_generic_reloc, /* special_function */
3765b1be 943 "DTPREL16", /* name */
b34976b6 944 FALSE, /* partial_inplace */
3765b1be
RH
945 0xffff, /* src_mask */
946 0xffff, /* dst_mask */
b34976b6 947 FALSE), /* pcrel_offset */
3765b1be
RH
948
949 /* Creates a 64-bit offset in the got for the displacement
950 from TP to the target. */
951 HOWTO (R_ALPHA_GOTTPREL, /* type */
952 0, /* rightshift */
953 1, /* size (0 = byte, 1 = short, 2 = long) */
954 16, /* bitsize */
b34976b6 955 FALSE, /* pc_relative */
3765b1be
RH
956 0, /* bitpos */
957 complain_overflow_signed, /* complain_on_overflow */
bc1bc43f 958 bfd_elf_generic_reloc, /* special_function */
3765b1be 959 "GOTTPREL", /* name */
b34976b6 960 FALSE, /* partial_inplace */
3765b1be
RH
961 0xffff, /* src_mask */
962 0xffff, /* dst_mask */
b34976b6 963 FALSE), /* pcrel_offset */
3765b1be
RH
964
965 /* A dynamic relocation for a displacement from TP to the target. */
966 HOWTO (R_ALPHA_TPREL64, /* type */
967 0, /* rightshift */
968 4, /* size (0 = byte, 1 = short, 2 = long) */
969 64, /* bitsize */
b34976b6 970 FALSE, /* pc_relative */
3765b1be
RH
971 0, /* bitpos */
972 complain_overflow_bitfield, /* complain_on_overflow */
bc1bc43f 973 bfd_elf_generic_reloc, /* special_function */
3765b1be 974 "TPREL64", /* name */
b34976b6 975 FALSE, /* partial_inplace */
3765b1be
RH
976 MINUS_ONE, /* src_mask */
977 MINUS_ONE, /* dst_mask */
b34976b6 978 FALSE), /* pcrel_offset */
3765b1be
RH
979
980 /* The high 16 bits of the displacement from TP to the target. */
981 HOWTO (R_ALPHA_TPRELHI, /* type */
982 0, /* rightshift */
983 1, /* size (0 = byte, 1 = short, 2 = long) */
984 16, /* bitsize */
b34976b6 985 FALSE, /* pc_relative */
3765b1be
RH
986 0, /* bitpos */
987 complain_overflow_signed, /* complain_on_overflow */
bc1bc43f 988 bfd_elf_generic_reloc, /* special_function */
3765b1be 989 "TPRELHI", /* name */
b34976b6 990 FALSE, /* partial_inplace */
3765b1be
RH
991 0xffff, /* src_mask */
992 0xffff, /* dst_mask */
b34976b6 993 FALSE), /* pcrel_offset */
3765b1be
RH
994
995 /* The low 16 bits of the displacement from TP to the target. */
996 HOWTO (R_ALPHA_TPRELLO, /* type */
997 0, /* rightshift */
998 1, /* size (0 = byte, 1 = short, 2 = long) */
999 16, /* bitsize */
b34976b6 1000 FALSE, /* pc_relative */
3765b1be
RH
1001 0, /* bitpos */
1002 complain_overflow_dont, /* complain_on_overflow */
bc1bc43f 1003 bfd_elf_generic_reloc, /* special_function */
3765b1be 1004 "TPRELLO", /* name */
b34976b6 1005 FALSE, /* partial_inplace */
3765b1be
RH
1006 0xffff, /* src_mask */
1007 0xffff, /* dst_mask */
b34976b6 1008 FALSE), /* pcrel_offset */
3765b1be
RH
1009
1010 /* A 16-bit displacement from TP to the target. */
1011 HOWTO (R_ALPHA_TPREL16, /* type */
1012 0, /* rightshift */
1013 1, /* size (0 = byte, 1 = short, 2 = long) */
1014 16, /* bitsize */
b34976b6 1015 FALSE, /* pc_relative */
3765b1be
RH
1016 0, /* bitpos */
1017 complain_overflow_signed, /* complain_on_overflow */
bc1bc43f 1018 bfd_elf_generic_reloc, /* special_function */
3765b1be 1019 "TPREL16", /* name */
b34976b6 1020 FALSE, /* partial_inplace */
3765b1be
RH
1021 0xffff, /* src_mask */
1022 0xffff, /* dst_mask */
b34976b6 1023 FALSE), /* pcrel_offset */
252b5132
RH
1024};
1025
252b5132
RH
1026/* A mapping from BFD reloc types to Alpha ELF reloc types. */
1027
1028struct elf_reloc_map
1029{
1030 bfd_reloc_code_real_type bfd_reloc_val;
1031 int elf_reloc_val;
1032};
1033
1034static const struct elf_reloc_map elf64_alpha_reloc_map[] =
1035{
dfe57ca0
RH
1036 {BFD_RELOC_NONE, R_ALPHA_NONE},
1037 {BFD_RELOC_32, R_ALPHA_REFLONG},
1038 {BFD_RELOC_64, R_ALPHA_REFQUAD},
1039 {BFD_RELOC_CTOR, R_ALPHA_REFQUAD},
1040 {BFD_RELOC_GPREL32, R_ALPHA_GPREL32},
1041 {BFD_RELOC_ALPHA_ELF_LITERAL, R_ALPHA_LITERAL},
1042 {BFD_RELOC_ALPHA_LITUSE, R_ALPHA_LITUSE},
1043 {BFD_RELOC_ALPHA_GPDISP, R_ALPHA_GPDISP},
1044 {BFD_RELOC_23_PCREL_S2, R_ALPHA_BRADDR},
1045 {BFD_RELOC_ALPHA_HINT, R_ALPHA_HINT},
1046 {BFD_RELOC_16_PCREL, R_ALPHA_SREL16},
1047 {BFD_RELOC_32_PCREL, R_ALPHA_SREL32},
1048 {BFD_RELOC_64_PCREL, R_ALPHA_SREL64},
1049 {BFD_RELOC_ALPHA_GPREL_HI16, R_ALPHA_GPRELHIGH},
1050 {BFD_RELOC_ALPHA_GPREL_LO16, R_ALPHA_GPRELLOW},
1051 {BFD_RELOC_GPREL16, R_ALPHA_GPREL16},
7793f4d0 1052 {BFD_RELOC_ALPHA_BRSGP, R_ALPHA_BRSGP},
3765b1be
RH
1053 {BFD_RELOC_ALPHA_TLSGD, R_ALPHA_TLSGD},
1054 {BFD_RELOC_ALPHA_TLSLDM, R_ALPHA_TLSLDM},
1055 {BFD_RELOC_ALPHA_DTPMOD64, R_ALPHA_DTPMOD64},
1056 {BFD_RELOC_ALPHA_GOTDTPREL16, R_ALPHA_GOTDTPREL},
1057 {BFD_RELOC_ALPHA_DTPREL64, R_ALPHA_DTPREL64},
1058 {BFD_RELOC_ALPHA_DTPREL_HI16, R_ALPHA_DTPRELHI},
1059 {BFD_RELOC_ALPHA_DTPREL_LO16, R_ALPHA_DTPRELLO},
1060 {BFD_RELOC_ALPHA_DTPREL16, R_ALPHA_DTPREL16},
1061 {BFD_RELOC_ALPHA_GOTTPREL16, R_ALPHA_GOTTPREL},
1062 {BFD_RELOC_ALPHA_TPREL64, R_ALPHA_TPREL64},
1063 {BFD_RELOC_ALPHA_TPREL_HI16, R_ALPHA_TPRELHI},
1064 {BFD_RELOC_ALPHA_TPREL_LO16, R_ALPHA_TPRELLO},
1065 {BFD_RELOC_ALPHA_TPREL16, R_ALPHA_TPREL16},
252b5132
RH
1066};
1067
1068/* Given a BFD reloc type, return a HOWTO structure. */
1069
1070static reloc_howto_type *
a7519a3c
RH
1071elf64_alpha_bfd_reloc_type_lookup (bfd *abfd ATTRIBUTE_UNUSED,
1072 bfd_reloc_code_real_type code)
252b5132
RH
1073{
1074 const struct elf_reloc_map *i, *e;
1075 i = e = elf64_alpha_reloc_map;
1076 e += sizeof (elf64_alpha_reloc_map) / sizeof (struct elf_reloc_map);
1077 for (; i != e; ++i)
1078 {
1079 if (i->bfd_reloc_val == code)
1080 return &elf64_alpha_howto_table[i->elf_reloc_val];
1081 }
1082 return 0;
1083}
1084
157090f7
AM
1085static reloc_howto_type *
1086elf64_alpha_bfd_reloc_name_lookup (bfd *abfd ATTRIBUTE_UNUSED,
1087 const char *r_name)
1088{
1089 unsigned int i;
1090
1091 for (i = 0;
1092 i < (sizeof (elf64_alpha_howto_table)
1093 / sizeof (elf64_alpha_howto_table[0]));
1094 i++)
1095 if (elf64_alpha_howto_table[i].name != NULL
1096 && strcasecmp (elf64_alpha_howto_table[i].name, r_name) == 0)
1097 return &elf64_alpha_howto_table[i];
1098
1099 return NULL;
1100}
1101
252b5132
RH
1102/* Given an Alpha ELF reloc type, fill in an arelent structure. */
1103
f3185997 1104static bfd_boolean
0aa13fee 1105elf64_alpha_info_to_howto (bfd *abfd, arelent *cache_ptr,
a7519a3c 1106 Elf_Internal_Rela *dst)
252b5132 1107{
a7519a3c 1108 unsigned r_type = ELF64_R_TYPE(dst->r_info);
cd21f5da
NC
1109
1110 if (r_type >= R_ALPHA_max)
1111 {
695344c0 1112 /* xgettext:c-format */
0aa13fee 1113 _bfd_error_handler (_("%pB: unsupported relocation type %#x"),
4eca0228 1114 abfd, r_type);
cd21f5da 1115 bfd_set_error (bfd_error_bad_value);
f3185997 1116 return FALSE;
cd21f5da 1117 }
252b5132 1118 cache_ptr->howto = &elf64_alpha_howto_table[r_type];
f3185997 1119 return TRUE;
252b5132 1120}
3765b1be
RH
1121
1122/* These two relocations create a two-word entry in the got. */
1123#define alpha_got_entry_size(r_type) \
1124 (r_type == R_ALPHA_TLSGD || r_type == R_ALPHA_TLSLDM ? 16 : 8)
9e756d64
RH
1125
1126/* This is PT_TLS segment p_vaddr. */
e1918d23
AM
1127#define alpha_get_dtprel_base(info) \
1128 (elf_hash_table (info)->tls_sec->vma)
9e756d64
RH
1129
1130/* Main program TLS (whose template starts at PT_TLS p_vaddr)
1131 is assigned offset round(16, PT_TLS p_align). */
e1918d23
AM
1132#define alpha_get_tprel_base(info) \
1133 (elf_hash_table (info)->tls_sec->vma \
1134 - align_power ((bfd_vma) 16, \
1135 elf_hash_table (info)->tls_sec->alignment_power))
252b5132 1136\f
a7519a3c
RH
1137/* Handle an Alpha specific section when reading an object file. This
1138 is called when bfd_section_from_shdr finds a section with an unknown
bf577467 1139 type. */
252b5132 1140
a7519a3c
RH
1141static bfd_boolean
1142elf64_alpha_section_from_shdr (bfd *abfd,
1143 Elf_Internal_Shdr *hdr,
1144 const char *name,
1145 int shindex)
252b5132 1146{
a7519a3c
RH
1147 asection *newsect;
1148
1149 /* There ought to be a place to keep ELF backend specific flags, but
1150 at the moment there isn't one. We just keep track of the
1151 sections by their name, instead. Fortunately, the ABI gives
1152 suggested names for all the MIPS specific sections, so we will
1153 probably get away with this. */
1154 switch (hdr->sh_type)
1155 {
1156 case SHT_ALPHA_DEBUG:
1157 if (strcmp (name, ".mdebug") != 0)
1158 return FALSE;
1159 break;
1160 default:
1161 return FALSE;
1162 }
252b5132 1163
a7519a3c
RH
1164 if (! _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex))
1165 return FALSE;
1166 newsect = hdr->bfd_section;
252b5132 1167
a7519a3c 1168 if (hdr->sh_type == SHT_ALPHA_DEBUG)
252b5132 1169 {
fd361982
AM
1170 if (!bfd_set_section_flags (newsect,
1171 bfd_section_flags (newsect) | SEC_DEBUGGING))
a7519a3c 1172 return FALSE;
252b5132 1173 }
a7519a3c
RH
1174
1175 return TRUE;
252b5132
RH
1176}
1177
a7519a3c
RH
1178/* Convert Alpha specific section flags to bfd internal section flags. */
1179
b34976b6 1180static bfd_boolean
8c803a2d 1181elf64_alpha_section_flags (const Elf_Internal_Shdr *hdr)
252b5132 1182{
a7519a3c 1183 if (hdr->sh_flags & SHF_ALPHA_GPREL)
8c803a2d 1184 hdr->bfd_section->flags |= SEC_SMALL_DATA;
252b5132 1185
a7519a3c
RH
1186 return TRUE;
1187}
252b5132 1188
a7519a3c
RH
1189/* Set the correct type for an Alpha ELF section. We do this by the
1190 section name, which is a hack, but ought to work. */
9e756d64 1191
a7519a3c
RH
1192static bfd_boolean
1193elf64_alpha_fake_sections (bfd *abfd, Elf_Internal_Shdr *hdr, asection *sec)
1194{
1195 register const char *name;
1196
fd361982 1197 name = bfd_section_name (sec);
a7519a3c
RH
1198
1199 if (strcmp (name, ".mdebug") == 0)
252b5132 1200 {
a7519a3c
RH
1201 hdr->sh_type = SHT_ALPHA_DEBUG;
1202 /* In a shared object on Irix 5.3, the .mdebug section has an
07d6d2b8 1203 entsize of 0. FIXME: Does this matter? */
a7519a3c
RH
1204 if ((abfd->flags & DYNAMIC) != 0 )
1205 hdr->sh_entsize = 0;
1206 else
1207 hdr->sh_entsize = 1;
252b5132 1208 }
a7519a3c
RH
1209 else if ((sec->flags & SEC_SMALL_DATA)
1210 || strcmp (name, ".sdata") == 0
1211 || strcmp (name, ".sbss") == 0
1212 || strcmp (name, ".lit4") == 0
1213 || strcmp (name, ".lit8") == 0)
1214 hdr->sh_flags |= SHF_ALPHA_GPREL;
252b5132 1215
a7519a3c
RH
1216 return TRUE;
1217}
252b5132 1218
a7519a3c
RH
1219/* Hook called by the linker routine which adds symbols from an object
1220 file. We use it to put .comm items in .sbss, and not .bss. */
1221
1222static bfd_boolean
1223elf64_alpha_add_symbol_hook (bfd *abfd, struct bfd_link_info *info,
1224 Elf_Internal_Sym *sym,
1225 const char **namep ATTRIBUTE_UNUSED,
1226 flagword *flagsp ATTRIBUTE_UNUSED,
1227 asection **secp, bfd_vma *valp)
1228{
1229 if (sym->st_shndx == SHN_COMMON
0e1862bb 1230 && !bfd_link_relocatable (info)
a7519a3c 1231 && sym->st_size <= elf_gp_size (abfd))
252b5132 1232 {
a7519a3c
RH
1233 /* Common symbols less than or equal to -G nn bytes are
1234 automatically put into .sbss. */
ffcb7aff 1235
a7519a3c 1236 asection *scomm = bfd_get_section_by_name (abfd, ".scommon");
252b5132 1237
a7519a3c 1238 if (scomm == NULL)
252b5132 1239 {
a7519a3c
RH
1240 scomm = bfd_make_section_with_flags (abfd, ".scommon",
1241 (SEC_ALLOC
1242 | SEC_IS_COMMON
1243 | SEC_LINKER_CREATED));
1244 if (scomm == NULL)
1245 return FALSE;
1246 }
ffcb7aff 1247
a7519a3c
RH
1248 *secp = scomm;
1249 *valp = sym->st_size;
1250 }
ffcb7aff 1251
a7519a3c
RH
1252 return TRUE;
1253}
252b5132 1254
a7519a3c 1255/* Create the .got section. */
252b5132 1256
a7519a3c
RH
1257static bfd_boolean
1258elf64_alpha_create_got_section (bfd *abfd,
1259 struct bfd_link_info *info ATTRIBUTE_UNUSED)
1260{
85d162e6 1261 flagword flags;
a7519a3c 1262 asection *s;
252b5132 1263
0ffa91dd
NC
1264 if (! is_alpha_elf (abfd))
1265 return FALSE;
1266
85d162e6
AM
1267 flags = (SEC_ALLOC | SEC_LOAD | SEC_HAS_CONTENTS | SEC_IN_MEMORY
1268 | SEC_LINKER_CREATED);
1269 s = bfd_make_section_anyway_with_flags (abfd, ".got", flags);
a7519a3c 1270 if (s == NULL
fd361982 1271 || !bfd_set_section_alignment (s, 3))
a7519a3c 1272 return FALSE;
252b5132 1273
a7519a3c 1274 alpha_elf_tdata (abfd)->got = s;
252b5132 1275
85d162e6
AM
1276 /* Make sure the object's gotobj is set to itself so that we default
1277 to every object with its own .got. We'll merge .gots later once
1278 we've collected each object's info. */
1279 alpha_elf_tdata (abfd)->gotobj = abfd;
1280
a7519a3c
RH
1281 return TRUE;
1282}
252b5132 1283
a7519a3c 1284/* Create all the dynamic sections. */
252b5132 1285
a7519a3c
RH
1286static bfd_boolean
1287elf64_alpha_create_dynamic_sections (bfd *abfd, struct bfd_link_info *info)
1288{
1289 asection *s;
85d162e6 1290 flagword flags;
a7519a3c 1291 struct elf_link_hash_entry *h;
252b5132 1292
0ffa91dd
NC
1293 if (! is_alpha_elf (abfd))
1294 return FALSE;
1295
a7519a3c 1296 /* We need to create .plt, .rela.plt, .got, and .rela.got sections. */
252b5132 1297
85d162e6
AM
1298 flags = (SEC_ALLOC | SEC_LOAD | SEC_CODE | SEC_HAS_CONTENTS | SEC_IN_MEMORY
1299 | SEC_LINKER_CREATED
1300 | (elf64_alpha_use_secureplt ? SEC_READONLY : 0));
1301 s = bfd_make_section_anyway_with_flags (abfd, ".plt", flags);
ce558b89 1302 elf_hash_table (info)->splt = s;
fd361982 1303 if (s == NULL || ! bfd_set_section_alignment (s, 4))
a7519a3c 1304 return FALSE;
252b5132 1305
a7519a3c
RH
1306 /* Define the symbol _PROCEDURE_LINKAGE_TABLE_ at the start of the
1307 .plt section. */
7325306f
RS
1308 h = _bfd_elf_define_linkage_sym (abfd, info, s,
1309 "_PROCEDURE_LINKAGE_TABLE_");
1310 elf_hash_table (info)->hplt = h;
1311 if (h == NULL)
a7519a3c 1312 return FALSE;
d6ad34f6 1313
85d162e6
AM
1314 flags = (SEC_ALLOC | SEC_LOAD | SEC_HAS_CONTENTS | SEC_IN_MEMORY
1315 | SEC_LINKER_CREATED | SEC_READONLY);
1316 s = bfd_make_section_anyway_with_flags (abfd, ".rela.plt", flags);
ce558b89 1317 elf_hash_table (info)->srelplt = s;
fd361982 1318 if (s == NULL || ! bfd_set_section_alignment (s, 3))
a7519a3c 1319 return FALSE;
252b5132 1320
6ec7057a
RH
1321 if (elf64_alpha_use_secureplt)
1322 {
85d162e6
AM
1323 flags = SEC_ALLOC | SEC_LINKER_CREATED;
1324 s = bfd_make_section_anyway_with_flags (abfd, ".got.plt", flags);
ce558b89 1325 elf_hash_table (info)->sgotplt = s;
fd361982 1326 if (s == NULL || ! bfd_set_section_alignment (s, 3))
6ec7057a
RH
1327 return FALSE;
1328 }
1329
a7519a3c
RH
1330 /* We may or may not have created a .got section for this object, but
1331 we definitely havn't done the rest of the work. */
1cd6895c 1332
85d162e6
AM
1333 if (alpha_elf_tdata(abfd)->gotobj == NULL)
1334 {
1335 if (!elf64_alpha_create_got_section (abfd, info))
1336 return FALSE;
1337 }
1cd6895c 1338
85d162e6
AM
1339 flags = (SEC_ALLOC | SEC_LOAD | SEC_HAS_CONTENTS | SEC_IN_MEMORY
1340 | SEC_LINKER_CREATED | SEC_READONLY);
1341 s = bfd_make_section_anyway_with_flags (abfd, ".rela.got", flags);
ce558b89 1342 elf_hash_table (info)->srelgot = s;
a7519a3c 1343 if (s == NULL
fd361982 1344 || !bfd_set_section_alignment (s, 3))
a7519a3c 1345 return FALSE;
252b5132 1346
a7519a3c
RH
1347 /* Define the symbol _GLOBAL_OFFSET_TABLE_ at the start of the
1348 dynobj's .got section. We don't do this in the linker script
1349 because we don't want to define the symbol if we are not creating
1350 a global offset table. */
d98685ac
AM
1351 h = _bfd_elf_define_linkage_sym (abfd, info, alpha_elf_tdata(abfd)->got,
1352 "_GLOBAL_OFFSET_TABLE_");
a7519a3c 1353 elf_hash_table (info)->hgot = h;
d98685ac
AM
1354 if (h == NULL)
1355 return FALSE;
252b5132 1356
a7519a3c 1357 return TRUE;
252b5132 1358}
a7519a3c
RH
1359\f
1360/* Read ECOFF debugging information from a .mdebug section into a
1361 ecoff_debug_info structure. */
252b5132 1362
a7519a3c
RH
1363static bfd_boolean
1364elf64_alpha_read_ecoff_info (bfd *abfd, asection *section,
1365 struct ecoff_debug_info *debug)
252b5132 1366{
a7519a3c
RH
1367 HDRR *symhdr;
1368 const struct ecoff_debug_swap *swap;
1369 char *ext_hdr = NULL;
252b5132 1370
a7519a3c
RH
1371 swap = get_elf_backend_data (abfd)->elf_backend_ecoff_debug_swap;
1372 memset (debug, 0, sizeof (*debug));
252b5132 1373
a7519a3c
RH
1374 ext_hdr = (char *) bfd_malloc (swap->external_hdr_size);
1375 if (ext_hdr == NULL && swap->external_hdr_size != 0)
1376 goto error_return;
252b5132 1377
a7519a3c
RH
1378 if (! bfd_get_section_contents (abfd, section, ext_hdr, (file_ptr) 0,
1379 swap->external_hdr_size))
1380 goto error_return;
252b5132 1381
a7519a3c
RH
1382 symhdr = &debug->symbolic_header;
1383 (*swap->swap_hdr_in) (abfd, ext_hdr, symhdr);
252b5132 1384
a7519a3c
RH
1385 /* The symbolic header contains absolute file offsets and sizes to
1386 read. */
1387#define READ(ptr, offset, count, size, type) \
1f4361a7 1388 do \
a7519a3c 1389 { \
1f4361a7
AM
1390 size_t amt; \
1391 debug->ptr = NULL; \
1392 if (symhdr->count == 0) \
1393 break; \
1394 if (_bfd_mul_overflow (size, symhdr->count, &amt)) \
1395 { \
1396 bfd_set_error (bfd_error_file_too_big); \
1397 goto error_return; \
1398 } \
2bb3687b 1399 if (bfd_seek (abfd, symhdr->offset, SEEK_SET) != 0) \
a7519a3c 1400 goto error_return; \
2bb3687b
AM
1401 debug->ptr = (type) _bfd_malloc_and_read (abfd, amt, amt); \
1402 if (debug->ptr == NULL) \
a7519a3c 1403 goto error_return; \
1f4361a7 1404 } while (0)
fe8bc63d 1405
a7519a3c 1406 READ (line, cbLineOffset, cbLine, sizeof (unsigned char), unsigned char *);
2c3fc389
NC
1407 READ (external_dnr, cbDnOffset, idnMax, swap->external_dnr_size, void *);
1408 READ (external_pdr, cbPdOffset, ipdMax, swap->external_pdr_size, void *);
1409 READ (external_sym, cbSymOffset, isymMax, swap->external_sym_size, void *);
1410 READ (external_opt, cbOptOffset, ioptMax, swap->external_opt_size, void *);
a7519a3c
RH
1411 READ (external_aux, cbAuxOffset, iauxMax, sizeof (union aux_ext),
1412 union aux_ext *);
1413 READ (ss, cbSsOffset, issMax, sizeof (char), char *);
1414 READ (ssext, cbSsExtOffset, issExtMax, sizeof (char), char *);
2c3fc389
NC
1415 READ (external_fdr, cbFdOffset, ifdMax, swap->external_fdr_size, void *);
1416 READ (external_rfd, cbRfdOffset, crfd, swap->external_rfd_size, void *);
1417 READ (external_ext, cbExtOffset, iextMax, swap->external_ext_size, void *);
a7519a3c 1418#undef READ
252b5132 1419
a7519a3c 1420 debug->fdr = NULL;
252b5132 1421
a7519a3c 1422 return TRUE;
252b5132 1423
a7519a3c
RH
1424 error_return:
1425 if (ext_hdr != NULL)
1426 free (ext_hdr);
1427 if (debug->line != NULL)
1428 free (debug->line);
1429 if (debug->external_dnr != NULL)
1430 free (debug->external_dnr);
1431 if (debug->external_pdr != NULL)
1432 free (debug->external_pdr);
1433 if (debug->external_sym != NULL)
1434 free (debug->external_sym);
1435 if (debug->external_opt != NULL)
1436 free (debug->external_opt);
1437 if (debug->external_aux != NULL)
1438 free (debug->external_aux);
1439 if (debug->ss != NULL)
1440 free (debug->ss);
1441 if (debug->ssext != NULL)
1442 free (debug->ssext);
1443 if (debug->external_fdr != NULL)
1444 free (debug->external_fdr);
1445 if (debug->external_rfd != NULL)
1446 free (debug->external_rfd);
1447 if (debug->external_ext != NULL)
1448 free (debug->external_ext);
1449 return FALSE;
252b5132
RH
1450}
1451
a7519a3c
RH
1452/* Alpha ELF local labels start with '$'. */
1453
b34976b6 1454static bfd_boolean
a7519a3c 1455elf64_alpha_is_local_label_name (bfd *abfd ATTRIBUTE_UNUSED, const char *name)
252b5132 1456{
a7519a3c
RH
1457 return name[0] == '$';
1458}
9e756d64 1459
a7519a3c 1460static bfd_boolean
fb167eb2
AM
1461elf64_alpha_find_nearest_line (bfd *abfd, asymbol **symbols,
1462 asection *section, bfd_vma offset,
1463 const char **filename_ptr,
a7519a3c 1464 const char **functionname_ptr,
fb167eb2
AM
1465 unsigned int *line_ptr,
1466 unsigned int *discriminator_ptr)
a7519a3c
RH
1467{
1468 asection *msec;
252b5132 1469
fb167eb2 1470 if (_bfd_dwarf2_find_nearest_line (abfd, symbols, NULL, section, offset,
a7519a3c 1471 filename_ptr, functionname_ptr,
fb167eb2 1472 line_ptr, discriminator_ptr,
9defd221 1473 dwarf_debug_sections,
7f3bf384
AM
1474 &elf_tdata (abfd)->dwarf2_find_line_info)
1475 == 1)
b34976b6 1476 return TRUE;
9e756d64 1477
a7519a3c
RH
1478 msec = bfd_get_section_by_name (abfd, ".mdebug");
1479 if (msec != NULL)
1bbc9cec 1480 {
a7519a3c 1481 flagword origflags;
698600e4 1482 struct alpha_elf_find_line *fi;
a7519a3c
RH
1483 const struct ecoff_debug_swap * const swap =
1484 get_elf_backend_data (abfd)->elf_backend_ecoff_debug_swap;
252b5132 1485
a7519a3c
RH
1486 /* If we are called during a link, alpha_elf_final_link may have
1487 cleared the SEC_HAS_CONTENTS field. We force it back on here
1488 if appropriate (which it normally will be). */
1489 origflags = msec->flags;
1490 if (elf_section_data (msec)->this_hdr.sh_type != SHT_NOBITS)
1491 msec->flags |= SEC_HAS_CONTENTS;
9e756d64 1492
698600e4 1493 fi = alpha_elf_tdata (abfd)->find_line_info;
a7519a3c
RH
1494 if (fi == NULL)
1495 {
1496 bfd_size_type external_fdr_size;
1497 char *fraw_src;
1498 char *fraw_end;
1499 struct fdr *fdr_ptr;
698600e4 1500 bfd_size_type amt = sizeof (struct alpha_elf_find_line);
9e756d64 1501
698600e4 1502 fi = (struct alpha_elf_find_line *) bfd_zalloc (abfd, amt);
a7519a3c
RH
1503 if (fi == NULL)
1504 {
1505 msec->flags = origflags;
1506 return FALSE;
1507 }
9e756d64 1508
a7519a3c
RH
1509 if (!elf64_alpha_read_ecoff_info (abfd, msec, &fi->d))
1510 {
1511 msec->flags = origflags;
1512 return FALSE;
1513 }
9e756d64 1514
a7519a3c
RH
1515 /* Swap in the FDR information. */
1516 amt = fi->d.symbolic_header.ifdMax * sizeof (struct fdr);
1517 fi->d.fdr = (struct fdr *) bfd_alloc (abfd, amt);
1518 if (fi->d.fdr == NULL)
1519 {
1520 msec->flags = origflags;
1521 return FALSE;
1522 }
1523 external_fdr_size = swap->external_fdr_size;
1524 fdr_ptr = fi->d.fdr;
1525 fraw_src = (char *) fi->d.external_fdr;
1526 fraw_end = (fraw_src
1527 + fi->d.symbolic_header.ifdMax * external_fdr_size);
1528 for (; fraw_src < fraw_end; fraw_src += external_fdr_size, fdr_ptr++)
2c3fc389 1529 (*swap->swap_fdr_in) (abfd, fraw_src, fdr_ptr);
9e756d64 1530
698600e4 1531 alpha_elf_tdata (abfd)->find_line_info = fi;
9e756d64 1532
a7519a3c 1533 /* Note that we don't bother to ever free this information.
07d6d2b8
AM
1534 find_nearest_line is either called all the time, as in
1535 objdump -l, so the information should be saved, or it is
1536 rarely called, as in ld error messages, so the memory
1537 wasted is unimportant. Still, it would probably be a
1538 good idea for free_cached_info to throw it away. */
a7519a3c 1539 }
9e756d64 1540
a7519a3c
RH
1541 if (_bfd_ecoff_locate_line (abfd, section, offset, &fi->d, swap,
1542 &fi->i, filename_ptr, functionname_ptr,
1543 line_ptr))
1544 {
1545 msec->flags = origflags;
1546 return TRUE;
1547 }
9e756d64 1548
a7519a3c 1549 msec->flags = origflags;
9e756d64 1550 }
9e756d64 1551
a7519a3c 1552 /* Fall back on the generic ELF find_nearest_line routine. */
9e756d64 1553
fb167eb2 1554 return _bfd_elf_find_nearest_line (abfd, symbols, section, offset,
a7519a3c 1555 filename_ptr, functionname_ptr,
fb167eb2 1556 line_ptr, discriminator_ptr);
9e756d64 1557}
a7519a3c
RH
1558\f
1559/* Structure used to pass information to alpha_elf_output_extsym. */
9e756d64 1560
a7519a3c 1561struct extsym_info
9e756d64 1562{
a7519a3c
RH
1563 bfd *abfd;
1564 struct bfd_link_info *info;
1565 struct ecoff_debug_info *debug;
1566 const struct ecoff_debug_swap *swap;
1567 bfd_boolean failed;
1568};
9e756d64 1569
a7519a3c 1570static bfd_boolean
2c3fc389 1571elf64_alpha_output_extsym (struct alpha_elf_link_hash_entry *h, void * data)
a7519a3c
RH
1572{
1573 struct extsym_info *einfo = (struct extsym_info *) data;
1574 bfd_boolean strip;
1575 asection *sec, *output_section;
9e756d64 1576
a7519a3c
RH
1577 if (h->root.indx == -2)
1578 strip = FALSE;
1579 else if ((h->root.def_dynamic
1580 || h->root.ref_dynamic
1581 || h->root.root.type == bfd_link_hash_new)
1582 && !h->root.def_regular
1583 && !h->root.ref_regular)
1584 strip = TRUE;
1585 else if (einfo->info->strip == strip_all
1586 || (einfo->info->strip == strip_some
1587 && bfd_hash_lookup (einfo->info->keep_hash,
1588 h->root.root.root.string,
1589 FALSE, FALSE) == NULL))
1590 strip = TRUE;
1591 else
1592 strip = FALSE;
9e756d64 1593
a7519a3c 1594 if (strip)
b34976b6 1595 return TRUE;
9e756d64 1596
a7519a3c 1597 if (h->esym.ifd == -2)
9e756d64 1598 {
a7519a3c
RH
1599 h->esym.jmptbl = 0;
1600 h->esym.cobol_main = 0;
1601 h->esym.weakext = 0;
1602 h->esym.reserved = 0;
1603 h->esym.ifd = ifdNil;
1604 h->esym.asym.value = 0;
1605 h->esym.asym.st = stGlobal;
9e756d64 1606
a7519a3c
RH
1607 if (h->root.root.type != bfd_link_hash_defined
1608 && h->root.root.type != bfd_link_hash_defweak)
1609 h->esym.asym.sc = scAbs;
1610 else
1611 {
1612 const char *name;
9e756d64 1613
a7519a3c
RH
1614 sec = h->root.root.u.def.section;
1615 output_section = sec->output_section;
9e756d64 1616
a7519a3c
RH
1617 /* When making a shared library and symbol h is the one from
1618 the another shared library, OUTPUT_SECTION may be null. */
1619 if (output_section == NULL)
1620 h->esym.asym.sc = scUndefined;
1621 else
1622 {
fd361982 1623 name = bfd_section_name (output_section);
9e756d64 1624
a7519a3c
RH
1625 if (strcmp (name, ".text") == 0)
1626 h->esym.asym.sc = scText;
1627 else if (strcmp (name, ".data") == 0)
1628 h->esym.asym.sc = scData;
1629 else if (strcmp (name, ".sdata") == 0)
1630 h->esym.asym.sc = scSData;
1631 else if (strcmp (name, ".rodata") == 0
1632 || strcmp (name, ".rdata") == 0)
1633 h->esym.asym.sc = scRData;
1634 else if (strcmp (name, ".bss") == 0)
1635 h->esym.asym.sc = scBss;
1636 else if (strcmp (name, ".sbss") == 0)
1637 h->esym.asym.sc = scSBss;
1638 else if (strcmp (name, ".init") == 0)
1639 h->esym.asym.sc = scInit;
1640 else if (strcmp (name, ".fini") == 0)
1641 h->esym.asym.sc = scFini;
1642 else
1643 h->esym.asym.sc = scAbs;
1644 }
1645 }
9e756d64 1646
a7519a3c
RH
1647 h->esym.asym.reserved = 0;
1648 h->esym.asym.index = indexNil;
1649 }
9e756d64 1650
a7519a3c
RH
1651 if (h->root.root.type == bfd_link_hash_common)
1652 h->esym.asym.value = h->root.root.u.c.size;
1653 else if (h->root.root.type == bfd_link_hash_defined
1654 || h->root.root.type == bfd_link_hash_defweak)
1655 {
1656 if (h->esym.asym.sc == scCommon)
1657 h->esym.asym.sc = scBss;
1658 else if (h->esym.asym.sc == scSCommon)
1659 h->esym.asym.sc = scSBss;
9e756d64 1660
a7519a3c
RH
1661 sec = h->root.root.u.def.section;
1662 output_section = sec->output_section;
1663 if (output_section != NULL)
1664 h->esym.asym.value = (h->root.root.u.def.value
1665 + sec->output_offset
1666 + output_section->vma);
1667 else
1668 h->esym.asym.value = 0;
1669 }
9e756d64 1670
a7519a3c
RH
1671 if (! bfd_ecoff_debug_one_external (einfo->abfd, einfo->debug, einfo->swap,
1672 h->root.root.root.string,
1673 &h->esym))
1674 {
1675 einfo->failed = TRUE;
1676 return FALSE;
9e756d64
RH
1677 }
1678
a7519a3c
RH
1679 return TRUE;
1680}
1681\f
1682/* Search for and possibly create a got entry. */
9e756d64 1683
a7519a3c
RH
1684static struct alpha_elf_got_entry *
1685get_got_entry (bfd *abfd, struct alpha_elf_link_hash_entry *h,
1686 unsigned long r_type, unsigned long r_symndx,
1687 bfd_vma r_addend)
1688{
1689 struct alpha_elf_got_entry *gotent;
1690 struct alpha_elf_got_entry **slot;
9e756d64 1691
a7519a3c
RH
1692 if (h)
1693 slot = &h->got_entries;
1694 else
1695 {
1696 /* This is a local .got entry -- record for merge. */
9e756d64 1697
a7519a3c 1698 struct alpha_elf_got_entry **local_got_entries;
9e756d64 1699
a7519a3c
RH
1700 local_got_entries = alpha_elf_tdata(abfd)->local_got_entries;
1701 if (!local_got_entries)
1702 {
1703 bfd_size_type size;
1704 Elf_Internal_Shdr *symtab_hdr;
9e756d64 1705
a7519a3c
RH
1706 symtab_hdr = &elf_tdata(abfd)->symtab_hdr;
1707 size = symtab_hdr->sh_info;
1708 size *= sizeof (struct alpha_elf_got_entry *);
9e756d64 1709
a7519a3c
RH
1710 local_got_entries
1711 = (struct alpha_elf_got_entry **) bfd_zalloc (abfd, size);
1712 if (!local_got_entries)
1713 return NULL;
1714
1715 alpha_elf_tdata (abfd)->local_got_entries = local_got_entries;
1716 }
1717
1718 slot = &local_got_entries[r_symndx];
9e756d64
RH
1719 }
1720
a7519a3c
RH
1721 for (gotent = *slot; gotent ; gotent = gotent->next)
1722 if (gotent->gotobj == abfd
1723 && gotent->reloc_type == r_type
1724 && gotent->addend == r_addend)
1725 break;
1726
1727 if (!gotent)
9e756d64 1728 {
a7519a3c 1729 int entry_size;
986f0783 1730 size_t amt;
9e756d64 1731
a7519a3c
RH
1732 amt = sizeof (struct alpha_elf_got_entry);
1733 gotent = (struct alpha_elf_got_entry *) bfd_alloc (abfd, amt);
1734 if (!gotent)
1735 return NULL;
9e756d64 1736
a7519a3c
RH
1737 gotent->gotobj = abfd;
1738 gotent->addend = r_addend;
1739 gotent->got_offset = -1;
6ec7057a 1740 gotent->plt_offset = -1;
a7519a3c
RH
1741 gotent->use_count = 1;
1742 gotent->reloc_type = r_type;
1743 gotent->reloc_done = 0;
1744 gotent->reloc_xlated = 0;
9e756d64 1745
a7519a3c
RH
1746 gotent->next = *slot;
1747 *slot = gotent;
9e756d64 1748
a7519a3c
RH
1749 entry_size = alpha_got_entry_size (r_type);
1750 alpha_elf_tdata (abfd)->total_got_size += entry_size;
1751 if (!h)
1752 alpha_elf_tdata(abfd)->local_got_size += entry_size;
9e756d64 1753 }
a7519a3c
RH
1754 else
1755 gotent->use_count += 1;
9e756d64 1756
a7519a3c 1757 return gotent;
9e756d64
RH
1758}
1759
6ec7057a
RH
1760static bfd_boolean
1761elf64_alpha_want_plt (struct alpha_elf_link_hash_entry *ah)
1762{
1763 return ((ah->root.type == STT_FUNC
1764 || ah->root.root.type == bfd_link_hash_undefweak
1765 || ah->root.root.type == bfd_link_hash_undefined)
8288a39e
RH
1766 && (ah->flags & ALPHA_ELF_LINK_HASH_LU_PLT) != 0
1767 && (ah->flags & ~ALPHA_ELF_LINK_HASH_LU_PLT) == 0);
6ec7057a
RH
1768}
1769
6fc5bb57
AM
1770/* Whether to sort relocs output by ld -r or ld --emit-relocs, by r_offset.
1771 Don't do so for code sections. We want to keep ordering of LITERAL/LITUSE
1772 as is. On the other hand, elf-eh-frame.c processing requires .eh_frame
1773 relocs to be sorted. */
1774
1775static bfd_boolean
1776elf64_alpha_sort_relocs_p (asection *sec)
1777{
1778 return (sec->flags & SEC_CODE) == 0;
1779}
1780
1781
a7519a3c
RH
1782/* Handle dynamic relocations when doing an Alpha ELF link. */
1783
b34976b6 1784static bfd_boolean
a7519a3c
RH
1785elf64_alpha_check_relocs (bfd *abfd, struct bfd_link_info *info,
1786 asection *sec, const Elf_Internal_Rela *relocs)
252b5132 1787{
a7519a3c
RH
1788 bfd *dynobj;
1789 asection *sreloc;
252b5132 1790 Elf_Internal_Shdr *symtab_hdr;
a7519a3c
RH
1791 struct alpha_elf_link_hash_entry **sym_hashes;
1792 const Elf_Internal_Rela *rel, *relend;
252b5132 1793
0e1862bb 1794 if (bfd_link_relocatable (info))
a7519a3c 1795 return TRUE;
252b5132 1796
a7519a3c
RH
1797 /* Don't do anything special with non-loaded, non-alloced sections.
1798 In particular, any relocs in such sections should not affect GOT
1799 and PLT reference counting (ie. we don't allow them to create GOT
1800 or PLT entries), there's no possibility or desire to optimize TLS
1801 relocs, and there's not much point in propagating relocs to shared
1802 libs that the dynamic linker won't relocate. */
1803 if ((sec->flags & SEC_ALLOC) == 0)
b34976b6 1804 return TRUE;
252b5132 1805
0ffa91dd
NC
1806 BFD_ASSERT (is_alpha_elf (abfd));
1807
1808 dynobj = elf_hash_table (info)->dynobj;
a7519a3c 1809 if (dynobj == NULL)
0ffa91dd 1810 elf_hash_table (info)->dynobj = dynobj = abfd;
252b5132 1811
a7519a3c 1812 sreloc = NULL;
0ffa91dd
NC
1813 symtab_hdr = &elf_symtab_hdr (abfd);
1814 sym_hashes = alpha_elf_sym_hashes (abfd);
a7519a3c
RH
1815
1816 relend = relocs + sec->reloc_count;
1817 for (rel = relocs; rel < relend; ++rel)
1818 {
1819 enum {
1820 NEED_GOT = 1,
1821 NEED_GOT_ENTRY = 2,
1822 NEED_DYNREL = 4
1823 };
1824
1825 unsigned long r_symndx, r_type;
1826 struct alpha_elf_link_hash_entry *h;
1827 unsigned int gotent_flags;
1828 bfd_boolean maybe_dynamic;
1829 unsigned int need;
1830 bfd_vma addend;
1831
1832 r_symndx = ELF64_R_SYM (rel->r_info);
1833 if (r_symndx < symtab_hdr->sh_info)
1834 h = NULL;
1835 else
1836 {
1837 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
252b5132 1838
a7519a3c
RH
1839 while (h->root.root.type == bfd_link_hash_indirect
1840 || h->root.root.type == bfd_link_hash_warning)
1841 h = (struct alpha_elf_link_hash_entry *)h->root.root.u.i.link;
252b5132 1842
81fbe831
AM
1843 /* PR15323, ref flags aren't set for references in the same
1844 object. */
a7519a3c
RH
1845 h->root.ref_regular = 1;
1846 }
252b5132 1847
a7519a3c 1848 /* We can only get preliminary data on whether a symbol is
07d6d2b8
AM
1849 locally or externally defined, as not all of the input files
1850 have yet been processed. Do something with what we know, as
1851 this may help reduce memory usage and processing time later. */
a7519a3c 1852 maybe_dynamic = FALSE;
0e1862bb 1853 if (h && ((bfd_link_pic (info)
a7519a3c
RH
1854 && (!info->symbolic
1855 || info->unresolved_syms_in_shared_libs == RM_IGNORE))
1856 || !h->root.def_regular
1857 || h->root.root.type == bfd_link_hash_defweak))
07d6d2b8 1858 maybe_dynamic = TRUE;
252b5132 1859
a7519a3c
RH
1860 need = 0;
1861 gotent_flags = 0;
1862 r_type = ELF64_R_TYPE (rel->r_info);
1863 addend = rel->r_addend;
9e756d64 1864
9e756d64
RH
1865 switch (r_type)
1866 {
1867 case R_ALPHA_LITERAL:
a7519a3c
RH
1868 need = NEED_GOT | NEED_GOT_ENTRY;
1869
1870 /* Remember how this literal is used from its LITUSEs.
1871 This will be important when it comes to decide if we can
1872 create a .plt entry for a function symbol. */
1873 while (++rel < relend && ELF64_R_TYPE (rel->r_info) == R_ALPHA_LITUSE)
8288a39e 1874 if (rel->r_addend >= 1 && rel->r_addend <= 6)
a7519a3c
RH
1875 gotent_flags |= 1 << rel->r_addend;
1876 --rel;
1877
1878 /* No LITUSEs -- presumably the address is used somehow. */
1879 if (gotent_flags == 0)
1880 gotent_flags = ALPHA_ELF_LINK_HASH_LU_ADDR;
1881 break;
1882
1883 case R_ALPHA_GPDISP:
1884 case R_ALPHA_GPREL16:
1885 case R_ALPHA_GPREL32:
9e756d64
RH
1886 case R_ALPHA_GPRELHIGH:
1887 case R_ALPHA_GPRELLOW:
a7519a3c
RH
1888 case R_ALPHA_BRSGP:
1889 need = NEED_GOT;
1890 break;
1891
1892 case R_ALPHA_REFLONG:
1893 case R_ALPHA_REFQUAD:
0e1862bb 1894 if (bfd_link_pic (info) || maybe_dynamic)
a7519a3c 1895 need = NEED_DYNREL;
cc03ec80
RH
1896 break;
1897
9e756d64 1898 case R_ALPHA_TLSLDM:
cc03ec80 1899 /* The symbol for a TLSLDM reloc is ignored. Collapse the
cf35638d
TS
1900 reloc to the STN_UNDEF (0) symbol so that they all match. */
1901 r_symndx = STN_UNDEF;
a7519a3c
RH
1902 h = 0;
1903 maybe_dynamic = FALSE;
1904 /* FALLTHRU */
1905
1906 case R_ALPHA_TLSGD:
1907 case R_ALPHA_GOTDTPREL:
1908 need = NEED_GOT | NEED_GOT_ENTRY;
9e756d64 1909 break;
cc03ec80 1910
a7519a3c
RH
1911 case R_ALPHA_GOTTPREL:
1912 need = NEED_GOT | NEED_GOT_ENTRY;
1913 gotent_flags = ALPHA_ELF_LINK_HASH_TLS_IE;
0e1862bb 1914 if (bfd_link_pic (info))
a7519a3c
RH
1915 info->flags |= DF_STATIC_TLS;
1916 break;
1917
1918 case R_ALPHA_TPREL64:
3cbc1e5e 1919 if (bfd_link_dll (info))
e366eeae
RH
1920 {
1921 info->flags |= DF_STATIC_TLS;
1922 need = NEED_DYNREL;
1923 }
1924 else if (maybe_dynamic)
a7519a3c 1925 need = NEED_DYNREL;
a7519a3c 1926 break;
252b5132
RH
1927 }
1928
a7519a3c 1929 if (need & NEED_GOT)
252b5132 1930 {
85d162e6 1931 if (alpha_elf_tdata(abfd)->gotobj == NULL)
6cdc0ccc 1932 {
a7519a3c
RH
1933 if (!elf64_alpha_create_got_section (abfd, info))
1934 return FALSE;
c328dc3f 1935 }
252b5132 1936 }
252b5132 1937
a7519a3c
RH
1938 if (need & NEED_GOT_ENTRY)
1939 {
1940 struct alpha_elf_got_entry *gotent;
252b5132 1941
a7519a3c
RH
1942 gotent = get_got_entry (abfd, h, r_type, r_symndx, addend);
1943 if (!gotent)
1944 return FALSE;
4a67a098 1945
a7519a3c 1946 if (gotent_flags)
cc03ec80 1947 {
a7519a3c
RH
1948 gotent->flags |= gotent_flags;
1949 if (h)
1950 {
1951 gotent_flags |= h->flags;
1952 h->flags = gotent_flags;
4a67a098 1953
a7519a3c 1954 /* Make a guess as to whether a .plt entry is needed. */
6ec7057a
RH
1955 /* ??? It appears that we won't make it into
1956 adjust_dynamic_symbol for symbols that remain
1957 totally undefined. Copying this check here means
1958 we can create a plt entry for them too. */
1959 h->root.needs_plt
1960 = (maybe_dynamic && elf64_alpha_want_plt (h));
1961 }
a7519a3c 1962 }
252b5132
RH
1963 }
1964
a7519a3c 1965 if (need & NEED_DYNREL)
9e756d64 1966 {
a7519a3c
RH
1967 /* We need to create the section here now whether we eventually
1968 use it or not so that it gets mapped to an output section by
83bac4b0 1969 the linker. If not used, we'll kill it in size_dynamic_sections. */
a7519a3c 1970 if (sreloc == NULL)
9e756d64 1971 {
83bac4b0
NC
1972 sreloc = _bfd_elf_make_dynamic_reloc_section
1973 (sec, dynobj, 3, abfd, /*rela?*/ TRUE);
1974
a7519a3c 1975 if (sreloc == NULL)
83bac4b0 1976 return FALSE;
9e756d64 1977 }
252b5132 1978
a7519a3c
RH
1979 if (h)
1980 {
1981 /* Since we havn't seen all of the input symbols yet, we
1982 don't know whether we'll actually need a dynamic relocation
1983 entry for this reloc. So make a record of it. Once we
1984 find out if this thing needs dynamic relocation we'll
1985 expand the relocation sections by the appropriate amount. */
9e756d64 1986
a7519a3c 1987 struct alpha_elf_reloc_entry *rent;
9e756d64 1988
a7519a3c
RH
1989 for (rent = h->reloc_entries; rent; rent = rent->next)
1990 if (rent->rtype == r_type && rent->srel == sreloc)
1991 break;
252b5132 1992
a7519a3c
RH
1993 if (!rent)
1994 {
986f0783 1995 size_t amt = sizeof (struct alpha_elf_reloc_entry);
a7519a3c
RH
1996 rent = (struct alpha_elf_reloc_entry *) bfd_alloc (abfd, amt);
1997 if (!rent)
1998 return FALSE;
252b5132 1999
a7519a3c
RH
2000 rent->srel = sreloc;
2001 rent->rtype = r_type;
2002 rent->count = 1;
2003 rent->reltext = (sec->flags & SEC_READONLY) != 0;
252b5132 2004
a7519a3c
RH
2005 rent->next = h->reloc_entries;
2006 h->reloc_entries = rent;
2007 }
2008 else
2009 rent->count++;
2010 }
0e1862bb 2011 else if (bfd_link_pic (info))
a7519a3c
RH
2012 {
2013 /* If this is a shared library, and the section is to be
2014 loaded into memory, we need a RELATIVE reloc. */
2015 sreloc->size += sizeof (Elf64_External_Rela);
2016 if (sec->flags & SEC_READONLY)
2017 info->flags |= DF_TEXTREL;
2018 }
252b5132
RH
2019 }
2020 }
2021
b34976b6 2022 return TRUE;
252b5132 2023}
252b5132 2024
e117360e
RH
2025/* Return the section that should be marked against GC for a given
2026 relocation. */
2027
2028static asection *
2029elf64_alpha_gc_mark_hook (asection *sec, struct bfd_link_info *info,
2030 Elf_Internal_Rela *rel,
2031 struct elf_link_hash_entry *h, Elf_Internal_Sym *sym)
2032{
2033 /* These relocations don't really reference a symbol. Instead we store
2034 extra data in their addend slot. Ignore the symbol. */
2035 switch (ELF64_R_TYPE (rel->r_info))
2036 {
2037 case R_ALPHA_LITUSE:
2038 case R_ALPHA_GPDISP:
2039 case R_ALPHA_HINT:
2040 return NULL;
2041 }
2042
2043 return _bfd_elf_gc_mark_hook (sec, info, rel, h, sym);
2044}
2045
a7519a3c
RH
2046/* Adjust a symbol defined by a dynamic object and referenced by a
2047 regular object. The current definition is in some section of the
2048 dynamic object, but we're not including those sections. We have to
2049 change the definition to something the rest of the link can
2050 understand. */
252b5132 2051
b34976b6 2052static bfd_boolean
a7519a3c
RH
2053elf64_alpha_adjust_dynamic_symbol (struct bfd_link_info *info,
2054 struct elf_link_hash_entry *h)
252b5132 2055{
a7519a3c
RH
2056 bfd *dynobj;
2057 asection *s;
2058 struct alpha_elf_link_hash_entry *ah;
252b5132 2059
a7519a3c
RH
2060 dynobj = elf_hash_table(info)->dynobj;
2061 ah = (struct alpha_elf_link_hash_entry *)h;
252b5132 2062
a7519a3c 2063 /* Now that we've seen all of the input symbols, finalize our decision
6ec7057a
RH
2064 about whether this symbol should get a .plt entry. Irritatingly, it
2065 is common for folk to leave undefined symbols in shared libraries,
2066 and they still expect lazy binding; accept undefined symbols in lieu
2067 of STT_FUNC. */
2068 if (alpha_elf_dynamic_symbol_p (h, info) && elf64_alpha_want_plt (ah))
252b5132 2069 {
6ec7057a 2070 h->needs_plt = TRUE;
252b5132 2071
ce558b89 2072 s = elf_hash_table(info)->splt;
a7519a3c
RH
2073 if (!s && !elf64_alpha_create_dynamic_sections (dynobj, info))
2074 return FALSE;
204692d7 2075
6ec7057a
RH
2076 /* We need one plt entry per got subsection. Delay allocation of
2077 the actual plt entries until size_plt_section, called from
2078 size_dynamic_sections or during relaxation. */
252b5132 2079
a7519a3c
RH
2080 return TRUE;
2081 }
2082 else
6ec7057a 2083 h->needs_plt = FALSE;
252b5132 2084
a7519a3c
RH
2085 /* If this is a weak symbol, and there is a real definition, the
2086 processor independent code will have arranged for us to see the
2087 real definition first, and we can just use the same value. */
60d67dc8 2088 if (h->is_weakalias)
252b5132 2089 {
60d67dc8
AM
2090 struct elf_link_hash_entry *def = weakdef (h);
2091 BFD_ASSERT (def->root.type == bfd_link_hash_defined);
2092 h->root.u.def.section = def->root.u.def.section;
2093 h->root.u.def.value = def->root.u.def.value;
a7519a3c 2094 return TRUE;
252b5132 2095 }
a7519a3c
RH
2096
2097 /* This is a reference to a symbol defined by a dynamic object which
2098 is not a function. The Alpha, since it uses .got entries for all
2099 symbols even in regular objects, does not need the hackery of a
2100 .dynbss section and COPY dynamic relocations. */
252b5132 2101
b34976b6 2102 return TRUE;
252b5132
RH
2103}
2104
747ffa7b
AM
2105/* Record STO_ALPHA_NOPV and STO_ALPHA_STD_GPLOAD. */
2106
2107static void
2108elf64_alpha_merge_symbol_attribute (struct elf_link_hash_entry *h,
2109 const Elf_Internal_Sym *isym,
2110 bfd_boolean definition,
2111 bfd_boolean dynamic)
2112{
2113 if (!dynamic && definition)
2114 h->other = ((h->other & ELF_ST_VISIBILITY (-1))
2115 | (isym->st_other & ~ELF_ST_VISIBILITY (-1)));
2116}
2117
a7519a3c
RH
2118/* Symbol versioning can create new symbols, and make our old symbols
2119 indirect to the new ones. Consolidate the got and reloc information
2120 in these situations. */
252b5132 2121
48f4b4f5
RH
2122static void
2123elf64_alpha_copy_indirect_symbol (struct bfd_link_info *info,
2124 struct elf_link_hash_entry *dir,
2125 struct elf_link_hash_entry *ind)
252b5132 2126{
48f4b4f5
RH
2127 struct alpha_elf_link_hash_entry *hi
2128 = (struct alpha_elf_link_hash_entry *) ind;
2129 struct alpha_elf_link_hash_entry *hs
2130 = (struct alpha_elf_link_hash_entry *) dir;
252b5132 2131
48f4b4f5
RH
2132 /* Do the merging in the superclass. */
2133 _bfd_elf_link_hash_copy_indirect(info, dir, ind);
252b5132 2134
a7519a3c 2135 /* Merge the flags. Whee. */
a7519a3c
RH
2136 hs->flags |= hi->flags;
2137
48f4b4f5
RH
2138 /* ??? It's unclear to me what's really supposed to happen when
2139 "merging" defweak and defined symbols, given that we don't
2140 actually throw away the defweak. This more-or-less copies
2141 the logic related to got and plt entries in the superclass. */
2142 if (ind->root.type != bfd_link_hash_indirect)
2143 return;
2144
a7519a3c
RH
2145 /* Merge the .got entries. Cannibalize the old symbol's list in
2146 doing so, since we don't need it anymore. */
2147
2148 if (hs->got_entries == NULL)
2149 hs->got_entries = hi->got_entries;
2150 else
2151 {
2152 struct alpha_elf_got_entry *gi, *gs, *gin, *gsh;
2153
2154 gsh = hs->got_entries;
2155 for (gi = hi->got_entries; gi ; gi = gin)
252b5132 2156 {
a7519a3c
RH
2157 gin = gi->next;
2158 for (gs = gsh; gs ; gs = gs->next)
2159 if (gi->gotobj == gs->gotobj
2160 && gi->reloc_type == gs->reloc_type
2161 && gi->addend == gs->addend)
2162 {
68994ca2 2163 gs->use_count += gi->use_count;
07d6d2b8 2164 goto got_found;
a7519a3c
RH
2165 }
2166 gi->next = hs->got_entries;
2167 hs->got_entries = gi;
2168 got_found:;
252b5132 2169 }
a7519a3c
RH
2170 }
2171 hi->got_entries = NULL;
252b5132 2172
a7519a3c
RH
2173 /* And similar for the reloc entries. */
2174
2175 if (hs->reloc_entries == NULL)
2176 hs->reloc_entries = hi->reloc_entries;
2177 else
2178 {
2179 struct alpha_elf_reloc_entry *ri, *rs, *rin, *rsh;
2180
2181 rsh = hs->reloc_entries;
2182 for (ri = hi->reloc_entries; ri ; ri = rin)
2183 {
2184 rin = ri->next;
2185 for (rs = rsh; rs ; rs = rs->next)
2186 if (ri->rtype == rs->rtype && ri->srel == rs->srel)
2187 {
2188 rs->count += ri->count;
2189 goto found_reloc;
2190 }
2191 ri->next = hs->reloc_entries;
2192 hs->reloc_entries = ri;
2193 found_reloc:;
2194 }
252b5132 2195 }
a7519a3c 2196 hi->reloc_entries = NULL;
252b5132
RH
2197}
2198
a7519a3c 2199/* Is it possible to merge two object file's .got tables? */
252b5132 2200
b34976b6 2201static bfd_boolean
a7519a3c 2202elf64_alpha_can_merge_gots (bfd *a, bfd *b)
252b5132 2203{
a7519a3c
RH
2204 int total = alpha_elf_tdata (a)->total_got_size;
2205 bfd *bsub;
252b5132 2206
a7519a3c
RH
2207 /* Trivial quick fallout test. */
2208 if (total + alpha_elf_tdata (b)->total_got_size <= MAX_GOT_SIZE)
2209 return TRUE;
252b5132 2210
a7519a3c
RH
2211 /* By their nature, local .got entries cannot be merged. */
2212 if ((total += alpha_elf_tdata (b)->local_got_size) > MAX_GOT_SIZE)
b34976b6 2213 return FALSE;
252b5132 2214
a7519a3c
RH
2215 /* Failing the common trivial comparison, we must effectively
2216 perform the merge. Not actually performing the merge means that
2217 we don't have to store undo information in case we fail. */
2218 for (bsub = b; bsub ; bsub = alpha_elf_tdata (bsub)->in_got_link_next)
2219 {
2220 struct alpha_elf_link_hash_entry **hashes = alpha_elf_sym_hashes (bsub);
2221 Elf_Internal_Shdr *symtab_hdr = &elf_tdata (bsub)->symtab_hdr;
2222 int i, n;
2223
2224 n = NUM_SHDR_ENTRIES (symtab_hdr) - symtab_hdr->sh_info;
2225 for (i = 0; i < n; ++i)
2226 {
2227 struct alpha_elf_got_entry *ae, *be;
2228 struct alpha_elf_link_hash_entry *h;
2229
2230 h = hashes[i];
2231 while (h->root.root.type == bfd_link_hash_indirect
07d6d2b8 2232 || h->root.root.type == bfd_link_hash_warning)
a7519a3c
RH
2233 h = (struct alpha_elf_link_hash_entry *)h->root.root.u.i.link;
2234
2235 for (be = h->got_entries; be ; be = be->next)
2236 {
2237 if (be->use_count == 0)
07d6d2b8 2238 continue;
a7519a3c 2239 if (be->gotobj != b)
07d6d2b8 2240 continue;
a7519a3c
RH
2241
2242 for (ae = h->got_entries; ae ; ae = ae->next)
07d6d2b8 2243 if (ae->gotobj == a
a7519a3c
RH
2244 && ae->reloc_type == be->reloc_type
2245 && ae->addend == be->addend)
2246 goto global_found;
2247
2248 total += alpha_got_entry_size (be->reloc_type);
2249 if (total > MAX_GOT_SIZE)
07d6d2b8 2250 return FALSE;
a7519a3c
RH
2251 global_found:;
2252 }
2253 }
2254 }
252b5132 2255
b34976b6 2256 return TRUE;
252b5132
RH
2257}
2258
a7519a3c 2259/* Actually merge two .got tables. */
252b5132 2260
a7519a3c
RH
2261static void
2262elf64_alpha_merge_gots (bfd *a, bfd *b)
252b5132 2263{
a7519a3c
RH
2264 int total = alpha_elf_tdata (a)->total_got_size;
2265 bfd *bsub;
252b5132 2266
a7519a3c
RH
2267 /* Remember local expansion. */
2268 {
2269 int e = alpha_elf_tdata (b)->local_got_size;
2270 total += e;
2271 alpha_elf_tdata (a)->local_got_size += e;
2272 }
252b5132 2273
a7519a3c
RH
2274 for (bsub = b; bsub ; bsub = alpha_elf_tdata (bsub)->in_got_link_next)
2275 {
2276 struct alpha_elf_got_entry **local_got_entries;
2277 struct alpha_elf_link_hash_entry **hashes;
2278 Elf_Internal_Shdr *symtab_hdr;
2279 int i, n;
252b5132 2280
a7519a3c
RH
2281 /* Let the local .got entries know they are part of a new subsegment. */
2282 local_got_entries = alpha_elf_tdata (bsub)->local_got_entries;
2283 if (local_got_entries)
07d6d2b8 2284 {
a7519a3c
RH
2285 n = elf_tdata (bsub)->symtab_hdr.sh_info;
2286 for (i = 0; i < n; ++i)
2287 {
2288 struct alpha_elf_got_entry *ent;
2289 for (ent = local_got_entries[i]; ent; ent = ent->next)
07d6d2b8 2290 ent->gotobj = a;
a7519a3c 2291 }
07d6d2b8 2292 }
252b5132 2293
a7519a3c
RH
2294 /* Merge the global .got entries. */
2295 hashes = alpha_elf_sym_hashes (bsub);
2296 symtab_hdr = &elf_tdata (bsub)->symtab_hdr;
252b5132 2297
a7519a3c
RH
2298 n = NUM_SHDR_ENTRIES (symtab_hdr) - symtab_hdr->sh_info;
2299 for (i = 0; i < n; ++i)
07d6d2b8 2300 {
a7519a3c
RH
2301 struct alpha_elf_got_entry *ae, *be, **pbe, **start;
2302 struct alpha_elf_link_hash_entry *h;
252b5132 2303
a7519a3c
RH
2304 h = hashes[i];
2305 while (h->root.root.type == bfd_link_hash_indirect
07d6d2b8 2306 || h->root.root.type == bfd_link_hash_warning)
a7519a3c 2307 h = (struct alpha_elf_link_hash_entry *)h->root.root.u.i.link;
252b5132 2308
a7519a3c
RH
2309 pbe = start = &h->got_entries;
2310 while ((be = *pbe) != NULL)
2311 {
2312 if (be->use_count == 0)
07d6d2b8 2313 {
a7519a3c
RH
2314 *pbe = be->next;
2315 memset (be, 0xa5, sizeof (*be));
2316 goto kill;
07d6d2b8 2317 }
a7519a3c 2318 if (be->gotobj != b)
07d6d2b8 2319 goto next;
a7519a3c
RH
2320
2321 for (ae = *start; ae ; ae = ae->next)
07d6d2b8 2322 if (ae->gotobj == a
a7519a3c
RH
2323 && ae->reloc_type == be->reloc_type
2324 && ae->addend == be->addend)
2325 {
2326 ae->flags |= be->flags;
2327 ae->use_count += be->use_count;
2328 *pbe = be->next;
2329 memset (be, 0xa5, sizeof (*be));
2330 goto kill;
2331 }
2332 be->gotobj = a;
2333 total += alpha_got_entry_size (be->reloc_type);
252b5132 2334
a7519a3c
RH
2335 next:;
2336 pbe = &be->next;
2337 kill:;
2338 }
07d6d2b8 2339 }
252b5132 2340
a7519a3c
RH
2341 alpha_elf_tdata (bsub)->gotobj = a;
2342 }
2343 alpha_elf_tdata (a)->total_got_size = total;
252b5132 2344
a7519a3c
RH
2345 /* Merge the two in_got chains. */
2346 {
2347 bfd *next;
252b5132 2348
a7519a3c
RH
2349 bsub = a;
2350 while ((next = alpha_elf_tdata (bsub)->in_got_link_next) != NULL)
2351 bsub = next;
252b5132 2352
a7519a3c
RH
2353 alpha_elf_tdata (bsub)->in_got_link_next = b;
2354 }
252b5132 2355}
a7519a3c
RH
2356
2357/* Calculate the offsets for the got entries. */
252b5132 2358
b34976b6 2359static bfd_boolean
a7519a3c 2360elf64_alpha_calc_got_offsets_for_symbol (struct alpha_elf_link_hash_entry *h,
2c3fc389 2361 void * arg ATTRIBUTE_UNUSED)
252b5132 2362{
a7519a3c 2363 struct alpha_elf_got_entry *gotent;
252b5132 2364
a7519a3c
RH
2365 for (gotent = h->got_entries; gotent; gotent = gotent->next)
2366 if (gotent->use_count > 0)
2367 {
2368 struct alpha_elf_obj_tdata *td;
2369 bfd_size_type *plge;
252b5132 2370
a7519a3c 2371 td = alpha_elf_tdata (gotent->gotobj);
a7519a3c
RH
2372 plge = &td->got->size;
2373 gotent->got_offset = *plge;
2374 *plge += alpha_got_entry_size (gotent->reloc_type);
2375 }
252b5132 2376
6ec7057a 2377 return TRUE;
a7519a3c 2378}
252b5132 2379
a7519a3c
RH
2380static void
2381elf64_alpha_calc_got_offsets (struct bfd_link_info *info)
2382{
4dfe6ac6
NC
2383 bfd *i, *got_list;
2384 struct alpha_elf_link_hash_table * htab;
2385
2386 htab = alpha_elf_hash_table (info);
2387 if (htab == NULL)
2388 return;
2389 got_list = htab->got_list;
252b5132 2390
a7519a3c
RH
2391 /* First, zero out the .got sizes, as we may be recalculating the
2392 .got after optimizing it. */
2393 for (i = got_list; i ; i = alpha_elf_tdata(i)->got_link_next)
2394 alpha_elf_tdata(i)->got->size = 0;
252b5132 2395
a7519a3c 2396 /* Next, fill in the offsets for all the global entries. */
4dfe6ac6 2397 alpha_elf_link_hash_traverse (htab,
a7519a3c
RH
2398 elf64_alpha_calc_got_offsets_for_symbol,
2399 NULL);
252b5132 2400
a7519a3c
RH
2401 /* Finally, fill in the offsets for the local entries. */
2402 for (i = got_list; i ; i = alpha_elf_tdata(i)->got_link_next)
2403 {
2404 bfd_size_type got_offset = alpha_elf_tdata(i)->got->size;
2405 bfd *j;
252b5132 2406
a7519a3c
RH
2407 for (j = i; j ; j = alpha_elf_tdata(j)->in_got_link_next)
2408 {
2409 struct alpha_elf_got_entry **local_got_entries, *gotent;
2410 int k, n;
252b5132 2411
a7519a3c
RH
2412 local_got_entries = alpha_elf_tdata(j)->local_got_entries;
2413 if (!local_got_entries)
2414 continue;
252b5132 2415
a7519a3c
RH
2416 for (k = 0, n = elf_tdata(j)->symtab_hdr.sh_info; k < n; ++k)
2417 for (gotent = local_got_entries[k]; gotent; gotent = gotent->next)
2418 if (gotent->use_count > 0)
07d6d2b8 2419 {
a7519a3c
RH
2420 gotent->got_offset = got_offset;
2421 got_offset += alpha_got_entry_size (gotent->reloc_type);
07d6d2b8 2422 }
a7519a3c 2423 }
252b5132 2424
a7519a3c
RH
2425 alpha_elf_tdata(i)->got->size = got_offset;
2426 }
2427}
252b5132 2428
a7519a3c 2429/* Constructs the gots. */
252b5132 2430
b34976b6 2431static bfd_boolean
d1c109de 2432elf64_alpha_size_got_sections (struct bfd_link_info *info,
07d6d2b8 2433 bfd_boolean may_merge)
252b5132 2434{
a7519a3c 2435 bfd *i, *got_list, *cur_got_obj = NULL;
4dfe6ac6 2436 struct alpha_elf_link_hash_table * htab;
252b5132 2437
4dfe6ac6
NC
2438 htab = alpha_elf_hash_table (info);
2439 if (htab == NULL)
2440 return FALSE;
2441 got_list = htab->got_list;
95404643 2442
a7519a3c
RH
2443 /* On the first time through, pretend we have an existing got list
2444 consisting of all of the input files. */
2445 if (got_list == NULL)
252b5132 2446 {
c72f2fb2 2447 for (i = info->input_bfds; i ; i = i->link.next)
252b5132 2448 {
0ffa91dd
NC
2449 bfd *this_got;
2450
2451 if (! is_alpha_elf (i))
2452 continue;
2453
2454 this_got = alpha_elf_tdata (i)->gotobj;
a7519a3c
RH
2455 if (this_got == NULL)
2456 continue;
252b5132 2457
a7519a3c
RH
2458 /* We are assuming no merging has yet occurred. */
2459 BFD_ASSERT (this_got == i);
252b5132 2460
07d6d2b8 2461 if (alpha_elf_tdata (this_got)->total_got_size > MAX_GOT_SIZE)
252b5132 2462 {
a7519a3c 2463 /* Yikes! A single object file has too many entries. */
4eca0228 2464 _bfd_error_handler
695344c0 2465 /* xgettext:c-format */
871b3ab2 2466 (_("%pB: .got subsegment exceeds 64K (size %d)"),
07d6d2b8 2467 i, alpha_elf_tdata (this_got)->total_got_size);
b34976b6 2468 return FALSE;
252b5132 2469 }
252b5132 2470
a7519a3c
RH
2471 if (got_list == NULL)
2472 got_list = this_got;
2473 else
2474 alpha_elf_tdata(cur_got_obj)->got_link_next = this_got;
2475 cur_got_obj = this_got;
252b5132
RH
2476 }
2477
a7519a3c
RH
2478 /* Strange degenerate case of no got references. */
2479 if (got_list == NULL)
2480 return TRUE;
2481
4dfe6ac6 2482 htab->got_list = got_list;
a7519a3c
RH
2483 }
2484
2485 cur_got_obj = got_list;
0ffa91dd
NC
2486 if (cur_got_obj == NULL)
2487 return FALSE;
2488
d1c109de 2489 if (may_merge)
a7519a3c 2490 {
d1c109de
RH
2491 i = alpha_elf_tdata(cur_got_obj)->got_link_next;
2492 while (i != NULL)
252b5132 2493 {
d1c109de
RH
2494 if (elf64_alpha_can_merge_gots (cur_got_obj, i))
2495 {
2496 elf64_alpha_merge_gots (cur_got_obj, i);
252b5132 2497
d1c109de
RH
2498 alpha_elf_tdata(i)->got->size = 0;
2499 i = alpha_elf_tdata(i)->got_link_next;
2500 alpha_elf_tdata(cur_got_obj)->got_link_next = i;
2501 }
2502 else
2503 {
2504 cur_got_obj = i;
2505 i = alpha_elf_tdata(i)->got_link_next;
2506 }
a7519a3c 2507 }
252b5132
RH
2508 }
2509
a7519a3c
RH
2510 /* Once the gots have been merged, fill in the got offsets for
2511 everything therein. */
4a828aab 2512 elf64_alpha_calc_got_offsets (info);
252b5132 2513
a7519a3c 2514 return TRUE;
252b5132 2515}
252b5132 2516
b34976b6 2517static bfd_boolean
2c3fc389
NC
2518elf64_alpha_size_plt_section_1 (struct alpha_elf_link_hash_entry *h,
2519 void * data)
252b5132 2520{
a7519a3c
RH
2521 asection *splt = (asection *) data;
2522 struct alpha_elf_got_entry *gotent;
6ec7057a 2523 bfd_boolean saw_one = FALSE;
252b5132 2524
a7519a3c
RH
2525 /* If we didn't need an entry before, we still don't. */
2526 if (!h->root.needs_plt)
2527 return TRUE;
e92d460e 2528
6ec7057a 2529 /* For each LITERAL got entry still in use, allocate a plt entry. */
a7519a3c
RH
2530 for (gotent = h->got_entries; gotent ; gotent = gotent->next)
2531 if (gotent->reloc_type == R_ALPHA_LITERAL
2532 && gotent->use_count > 0)
6ec7057a
RH
2533 {
2534 if (splt->size == 0)
2535 splt->size = PLT_HEADER_SIZE;
2536 gotent->plt_offset = splt->size;
2537 splt->size += PLT_ENTRY_SIZE;
2538 saw_one = TRUE;
2539 }
a7519a3c 2540
6ec7057a
RH
2541 /* If there weren't any, there's no longer a need for the PLT entry. */
2542 if (!saw_one)
2543 h->root.needs_plt = FALSE;
a7519a3c
RH
2544
2545 return TRUE;
2546}
2547
4a828aab
RH
2548/* Called from relax_section to rebuild the PLT in light of potential changes
2549 in the function's status. */
a7519a3c 2550
4a828aab 2551static void
a7519a3c
RH
2552elf64_alpha_size_plt_section (struct bfd_link_info *info)
2553{
6ec7057a 2554 asection *splt, *spltrel, *sgotplt;
a7519a3c 2555 unsigned long entries;
4dfe6ac6
NC
2556 struct alpha_elf_link_hash_table * htab;
2557
2558 htab = alpha_elf_hash_table (info);
2559 if (htab == NULL)
2560 return;
a7519a3c 2561
ce558b89 2562 splt = elf_hash_table(info)->splt;
a7519a3c 2563 if (splt == NULL)
4a828aab 2564 return;
252b5132 2565
a7519a3c 2566 splt->size = 0;
252b5132 2567
4dfe6ac6 2568 alpha_elf_link_hash_traverse (htab,
a7519a3c 2569 elf64_alpha_size_plt_section_1, splt);
e92d460e 2570
a7519a3c 2571 /* Every plt entry requires a JMP_SLOT relocation. */
ce558b89 2572 spltrel = elf_hash_table(info)->srelplt;
4a828aab 2573 entries = 0;
a7519a3c 2574 if (splt->size)
6ec7057a
RH
2575 {
2576 if (elf64_alpha_use_secureplt)
2577 entries = (splt->size - NEW_PLT_HEADER_SIZE) / NEW_PLT_ENTRY_SIZE;
2578 else
2579 entries = (splt->size - OLD_PLT_HEADER_SIZE) / OLD_PLT_ENTRY_SIZE;
2580 }
a7519a3c 2581 spltrel->size = entries * sizeof (Elf64_External_Rela);
e92d460e 2582
6ec7057a
RH
2583 /* When using the secureplt, we need two words somewhere in the data
2584 segment for the dynamic linker to tell us where to go. This is the
2585 entire contents of the .got.plt section. */
2586 if (elf64_alpha_use_secureplt)
2587 {
ce558b89 2588 sgotplt = elf_hash_table(info)->sgotplt;
6ec7057a
RH
2589 sgotplt->size = entries ? 16 : 0;
2590 }
a7519a3c 2591}
e92d460e 2592
a7519a3c
RH
2593static bfd_boolean
2594elf64_alpha_always_size_sections (bfd *output_bfd ATTRIBUTE_UNUSED,
2595 struct bfd_link_info *info)
2596{
2597 bfd *i;
4dfe6ac6 2598 struct alpha_elf_link_hash_table * htab;
252b5132 2599
0e1862bb 2600 if (bfd_link_relocatable (info))
a7519a3c 2601 return TRUE;
252b5132 2602
4dfe6ac6
NC
2603 htab = alpha_elf_hash_table (info);
2604 if (htab == NULL)
2605 return FALSE;
2606
d1c109de 2607 if (!elf64_alpha_size_got_sections (info, TRUE))
a7519a3c 2608 return FALSE;
252b5132 2609
a7519a3c 2610 /* Allocate space for all of the .got subsections. */
4dfe6ac6 2611 i = htab->got_list;
a7519a3c 2612 for ( ; i ; i = alpha_elf_tdata(i)->got_link_next)
252b5132 2613 {
a7519a3c
RH
2614 asection *s = alpha_elf_tdata(i)->got;
2615 if (s->size > 0)
2616 {
2617 s->contents = (bfd_byte *) bfd_zalloc (i, s->size);
2618 if (s->contents == NULL)
2619 return FALSE;
2620 }
252b5132
RH
2621 }
2622
b34976b6 2623 return TRUE;
252b5132 2624}
3765b1be 2625
a7519a3c 2626/* The number of dynamic relocations required by a static relocation. */
3765b1be 2627
a7519a3c 2628static int
e366eeae 2629alpha_dynamic_entries_for_reloc (int r_type, int dynamic, int shared, int pie)
a7519a3c
RH
2630{
2631 switch (r_type)
3765b1be 2632 {
a7519a3c
RH
2633 /* May appear in GOT entries. */
2634 case R_ALPHA_TLSGD:
2635 return (dynamic ? 2 : shared ? 1 : 0);
2636 case R_ALPHA_TLSLDM:
2637 return shared;
2638 case R_ALPHA_LITERAL:
a7519a3c 2639 return dynamic || shared;
e366eeae
RH
2640 case R_ALPHA_GOTTPREL:
2641 return dynamic || (shared && !pie);
a7519a3c
RH
2642 case R_ALPHA_GOTDTPREL:
2643 return dynamic;
3765b1be 2644
a7519a3c
RH
2645 /* May appear in data sections. */
2646 case R_ALPHA_REFLONG:
2647 case R_ALPHA_REFQUAD:
a7519a3c 2648 return dynamic || shared;
e366eeae
RH
2649 case R_ALPHA_TPREL64:
2650 return dynamic || (shared && !pie);
3765b1be 2651
a7519a3c
RH
2652 /* Everything else is illegal. We'll issue an error during
2653 relocate_section. */
2654 default:
2655 return 0;
2656 }
2657}
3765b1be 2658
a7519a3c 2659/* Work out the sizes of the dynamic relocation entries. */
3765b1be 2660
a7519a3c
RH
2661static bfd_boolean
2662elf64_alpha_calc_dynrel_sizes (struct alpha_elf_link_hash_entry *h,
2663 struct bfd_link_info *info)
2664{
2665 bfd_boolean dynamic;
2666 struct alpha_elf_reloc_entry *relent;
2667 unsigned long entries;
3765b1be 2668
a7519a3c
RH
2669 /* If the symbol was defined as a common symbol in a regular object
2670 file, and there was no definition in any dynamic object, then the
2671 linker will have allocated space for the symbol in a common
2672 section but the ELF_LINK_HASH_DEF_REGULAR flag will not have been
2673 set. This is done for dynamic symbols in
2674 elf_adjust_dynamic_symbol but this is not done for non-dynamic
2675 symbols, somehow. */
2676 if (!h->root.def_regular
2677 && h->root.ref_regular
2678 && !h->root.def_dynamic
2679 && (h->root.root.type == bfd_link_hash_defined
2680 || h->root.root.type == bfd_link_hash_defweak)
2681 && !(h->root.root.u.def.section->owner->flags & DYNAMIC))
2682 h->root.def_regular = 1;
3765b1be 2683
a7519a3c
RH
2684 /* If the symbol is dynamic, we'll need all the relocations in their
2685 natural form. If this is a shared object, and it has been forced
2686 local, we'll need the same number of RELATIVE relocations. */
2687 dynamic = alpha_elf_dynamic_symbol_p (&h->root, info);
3765b1be 2688
a7519a3c
RH
2689 /* If the symbol is a hidden undefined weak, then we never have any
2690 relocations. Avoid the loop which may want to add RELATIVE relocs
0e1862bb 2691 based on bfd_link_pic (info). */
a7519a3c
RH
2692 if (h->root.root.type == bfd_link_hash_undefweak && !dynamic)
2693 return TRUE;
2694
2695 for (relent = h->reloc_entries; relent; relent = relent->next)
3765b1be 2696 {
a7519a3c 2697 entries = alpha_dynamic_entries_for_reloc (relent->rtype, dynamic,
3cbc1e5e
AM
2698 bfd_link_pic (info),
2699 bfd_link_pie (info));
a7519a3c
RH
2700 if (entries)
2701 {
2702 relent->srel->size +=
2703 entries * sizeof (Elf64_External_Rela) * relent->count;
2704 if (relent->reltext)
2705 info->flags |= DT_TEXTREL;
2706 }
2707 }
3765b1be 2708
a7519a3c
RH
2709 return TRUE;
2710}
3765b1be 2711
a7519a3c
RH
2712/* Subroutine of elf64_alpha_size_rela_got_section for doing the
2713 global symbols. */
3765b1be 2714
a7519a3c
RH
2715static bfd_boolean
2716elf64_alpha_size_rela_got_1 (struct alpha_elf_link_hash_entry *h,
2717 struct bfd_link_info *info)
2718{
2719 bfd_boolean dynamic;
2720 struct alpha_elf_got_entry *gotent;
2721 unsigned long entries;
3765b1be 2722
6ec7057a
RH
2723 /* If we're using a plt for this symbol, then all of its relocations
2724 for its got entries go into .rela.plt. */
2725 if (h->root.needs_plt)
2726 return TRUE;
2727
a7519a3c
RH
2728 /* If the symbol is dynamic, we'll need all the relocations in their
2729 natural form. If this is a shared object, and it has been forced
2730 local, we'll need the same number of RELATIVE relocations. */
2731 dynamic = alpha_elf_dynamic_symbol_p (&h->root, info);
2732
2733 /* If the symbol is a hidden undefined weak, then we never have any
2734 relocations. Avoid the loop which may want to add RELATIVE relocs
0e1862bb 2735 based on bfd_link_pic (info). */
a7519a3c
RH
2736 if (h->root.root.type == bfd_link_hash_undefweak && !dynamic)
2737 return TRUE;
2738
2739 entries = 0;
2740 for (gotent = h->got_entries; gotent ; gotent = gotent->next)
2741 if (gotent->use_count > 0)
e366eeae 2742 entries += alpha_dynamic_entries_for_reloc (gotent->reloc_type, dynamic,
0e1862bb
L
2743 bfd_link_pic (info),
2744 bfd_link_pie (info));
a7519a3c 2745
a7519a3c
RH
2746 if (entries > 0)
2747 {
ce558b89 2748 asection *srel = elf_hash_table(info)->srelgot;
a7519a3c
RH
2749 BFD_ASSERT (srel != NULL);
2750 srel->size += sizeof (Elf64_External_Rela) * entries;
3765b1be 2751 }
3765b1be 2752
a7519a3c 2753 return TRUE;
3765b1be
RH
2754}
2755
a7519a3c 2756/* Set the sizes of the dynamic relocation sections. */
252b5132 2757
4a828aab 2758static void
a7519a3c 2759elf64_alpha_size_rela_got_section (struct bfd_link_info *info)
252b5132 2760{
a7519a3c 2761 unsigned long entries;
ce558b89 2762 bfd *i;
a7519a3c 2763 asection *srel;
4dfe6ac6
NC
2764 struct alpha_elf_link_hash_table * htab;
2765
2766 htab = alpha_elf_hash_table (info);
2767 if (htab == NULL)
2768 return;
252b5132 2769
a7519a3c
RH
2770 /* Shared libraries often require RELATIVE relocs, and some relocs
2771 require attention for the main application as well. */
252b5132 2772
a7519a3c 2773 entries = 0;
4dfe6ac6 2774 for (i = htab->got_list;
a7519a3c
RH
2775 i ; i = alpha_elf_tdata(i)->got_link_next)
2776 {
2777 bfd *j;
3241278a 2778
a7519a3c
RH
2779 for (j = i; j ; j = alpha_elf_tdata(j)->in_got_link_next)
2780 {
2781 struct alpha_elf_got_entry **local_got_entries, *gotent;
2782 int k, n;
252b5132 2783
a7519a3c
RH
2784 local_got_entries = alpha_elf_tdata(j)->local_got_entries;
2785 if (!local_got_entries)
2786 continue;
252b5132 2787
a7519a3c
RH
2788 for (k = 0, n = elf_tdata(j)->symtab_hdr.sh_info; k < n; ++k)
2789 for (gotent = local_got_entries[k];
2790 gotent ; gotent = gotent->next)
2791 if (gotent->use_count > 0)
2792 entries += (alpha_dynamic_entries_for_reloc
0e1862bb
L
2793 (gotent->reloc_type, 0, bfd_link_pic (info),
2794 bfd_link_pie (info)));
a7519a3c
RH
2795 }
2796 }
3765b1be 2797
ce558b89 2798 srel = elf_hash_table(info)->srelgot;
a7519a3c
RH
2799 if (!srel)
2800 {
2801 BFD_ASSERT (entries == 0);
4a828aab 2802 return;
a7519a3c
RH
2803 }
2804 srel->size = sizeof (Elf64_External_Rela) * entries;
252b5132 2805
a7519a3c 2806 /* Now do the non-local symbols. */
4dfe6ac6 2807 alpha_elf_link_hash_traverse (htab,
a7519a3c 2808 elf64_alpha_size_rela_got_1, info);
a7519a3c 2809}
252b5132 2810
a7519a3c 2811/* Set the sizes of the dynamic sections. */
3765b1be 2812
a7519a3c
RH
2813static bfd_boolean
2814elf64_alpha_size_dynamic_sections (bfd *output_bfd ATTRIBUTE_UNUSED,
2815 struct bfd_link_info *info)
2816{
2817 bfd *dynobj;
2818 asection *s;
24f1a751 2819 bfd_boolean relplt, relocs;
4dfe6ac6
NC
2820 struct alpha_elf_link_hash_table * htab;
2821
2822 htab = alpha_elf_hash_table (info);
2823 if (htab == NULL)
2824 return FALSE;
3765b1be 2825
a7519a3c
RH
2826 dynobj = elf_hash_table(info)->dynobj;
2827 BFD_ASSERT(dynobj != NULL);
252b5132 2828
a7519a3c
RH
2829 if (elf_hash_table (info)->dynamic_sections_created)
2830 {
2831 /* Set the contents of the .interp section to the interpreter. */
9b8b325a 2832 if (bfd_link_executable (info) && !info->nointerp)
252b5132 2833 {
3d4d4302 2834 s = bfd_get_linker_section (dynobj, ".interp");
a7519a3c
RH
2835 BFD_ASSERT (s != NULL);
2836 s->size = sizeof ELF_DYNAMIC_INTERPRETER;
2837 s->contents = (unsigned char *) ELF_DYNAMIC_INTERPRETER;
2838 }
3765b1be 2839
a7519a3c
RH
2840 /* Now that we've seen all of the input files, we can decide which
2841 symbols need dynamic relocation entries and which don't. We've
2842 collected information in check_relocs that we can now apply to
2843 size the dynamic relocation sections. */
4dfe6ac6 2844 alpha_elf_link_hash_traverse (htab,
a7519a3c 2845 elf64_alpha_calc_dynrel_sizes, info);
252b5132 2846
a7519a3c 2847 elf64_alpha_size_rela_got_section (info);
6ec7057a 2848 elf64_alpha_size_plt_section (info);
a7519a3c
RH
2849 }
2850 /* else we're not dynamic and by definition we don't need such things. */
3765b1be 2851
a7519a3c
RH
2852 /* The check_relocs and adjust_dynamic_symbol entry points have
2853 determined the sizes of the various dynamic sections. Allocate
2854 memory for them. */
2855 relplt = FALSE;
24f1a751 2856 relocs = FALSE;
a7519a3c
RH
2857 for (s = dynobj->sections; s != NULL; s = s->next)
2858 {
2859 const char *name;
3765b1be 2860
a7519a3c
RH
2861 if (!(s->flags & SEC_LINKER_CREATED))
2862 continue;
cc03ec80 2863
a7519a3c
RH
2864 /* It's OK to base decisions on the section name, because none
2865 of the dynobj section names depend upon the input files. */
fd361982 2866 name = bfd_section_name (s);
3765b1be 2867
0112cd26 2868 if (CONST_STRNEQ (name, ".rela"))
3765b1be 2869 {
c456f082 2870 if (s->size != 0)
a7519a3c 2871 {
c456f082 2872 if (strcmp (name, ".rela.plt") == 0)
a7519a3c 2873 relplt = TRUE;
24f1a751
AM
2874 else
2875 relocs = TRUE;
252b5132 2876
a7519a3c
RH
2877 /* We use the reloc_count field as a counter if we need
2878 to copy relocs into the output file. */
2879 s->reloc_count = 0;
252b5132 2880 }
3765b1be 2881 }
0112cd26 2882 else if (! CONST_STRNEQ (name, ".got")
c456f082
AM
2883 && strcmp (name, ".plt") != 0
2884 && strcmp (name, ".dynbss") != 0)
3765b1be 2885 {
a7519a3c
RH
2886 /* It's not one of our dynamic sections, so don't allocate space. */
2887 continue;
2888 }
252b5132 2889
c456f082
AM
2890 if (s->size == 0)
2891 {
2892 /* If we don't need this section, strip it from the output file.
2893 This is to handle .rela.bss and .rela.plt. We must create it
2894 in create_dynamic_sections, because it must be created before
2895 the linker maps input sections to output sections. The
2896 linker does that before adjust_dynamic_symbol is called, and
2897 it is that function which decides whether anything needs to
2898 go into these sections. */
6452a567
RH
2899 if (!CONST_STRNEQ (name, ".got"))
2900 s->flags |= SEC_EXCLUDE;
c456f082
AM
2901 }
2902 else if ((s->flags & SEC_HAS_CONTENTS) != 0)
a7519a3c
RH
2903 {
2904 /* Allocate memory for the section contents. */
2905 s->contents = (bfd_byte *) bfd_zalloc (dynobj, s->size);
c456f082 2906 if (s->contents == NULL)
b34976b6 2907 return FALSE;
a7519a3c
RH
2908 }
2909 }
3765b1be 2910
a7519a3c
RH
2911 if (elf_hash_table (info)->dynamic_sections_created)
2912 {
2913 /* Add some entries to the .dynamic section. We fill in the
2914 values later, in elf64_alpha_finish_dynamic_sections, but we
2915 must add the entries now so that we get the correct size for
2916 the .dynamic section. The DT_DEBUG entry is filled in by the
2917 dynamic linker and used by the debugger. */
2918#define add_dynamic_entry(TAG, VAL) \
2919 _bfd_elf_add_dynamic_entry (info, TAG, VAL)
3765b1be 2920
0e1862bb 2921 if (bfd_link_executable (info))
a7519a3c
RH
2922 {
2923 if (!add_dynamic_entry (DT_DEBUG, 0))
2924 return FALSE;
3765b1be
RH
2925 }
2926
a7519a3c 2927 if (relplt)
3765b1be 2928 {
a7519a3c
RH
2929 if (!add_dynamic_entry (DT_PLTGOT, 0)
2930 || !add_dynamic_entry (DT_PLTRELSZ, 0)
2931 || !add_dynamic_entry (DT_PLTREL, DT_RELA)
2932 || !add_dynamic_entry (DT_JMPREL, 0))
2933 return FALSE;
6ec7057a
RH
2934
2935 if (elf64_alpha_use_secureplt
2936 && !add_dynamic_entry (DT_ALPHA_PLTRO, 1))
2937 return FALSE;
a7519a3c 2938 }
252b5132 2939
24f1a751 2940 if (relocs)
a7519a3c 2941 {
24f1a751
AM
2942 if (!add_dynamic_entry (DT_RELA, 0)
2943 || !add_dynamic_entry (DT_RELASZ, 0)
2944 || !add_dynamic_entry (DT_RELAENT, sizeof (Elf64_External_Rela)))
a7519a3c 2945 return FALSE;
24f1a751
AM
2946
2947 if (info->flags & DF_TEXTREL)
2948 {
2949 if (!add_dynamic_entry (DT_TEXTREL, 0))
2950 return FALSE;
2951 }
252b5132
RH
2952 }
2953 }
a7519a3c 2954#undef add_dynamic_entry
252b5132 2955
b34976b6 2956 return TRUE;
252b5132 2957}
a7519a3c
RH
2958\f
2959/* These functions do relaxation for Alpha ELF.
252b5132 2960
a7519a3c
RH
2961 Currently I'm only handling what I can do with existing compiler
2962 and assembler support, which means no instructions are removed,
2963 though some may be nopped. At this time GCC does not emit enough
2964 information to do all of the relaxing that is possible. It will
2965 take some not small amount of work for that to happen.
252b5132 2966
a7519a3c
RH
2967 There are a couple of interesting papers that I once read on this
2968 subject, that I cannot find references to at the moment, that
2969 related to Alpha in particular. They are by David Wall, then of
2970 DEC WRL. */
252b5132 2971
a7519a3c
RH
2972struct alpha_relax_info
2973{
2974 bfd *abfd;
2975 asection *sec;
2976 bfd_byte *contents;
2977 Elf_Internal_Shdr *symtab_hdr;
2978 Elf_Internal_Rela *relocs, *relend;
2979 struct bfd_link_info *link_info;
2980 bfd_vma gp;
2981 bfd *gotobj;
2982 asection *tsec;
2983 struct alpha_elf_link_hash_entry *h;
2984 struct alpha_elf_got_entry **first_gotent;
2985 struct alpha_elf_got_entry *gotent;
2986 bfd_boolean changed_contents;
2987 bfd_boolean changed_relocs;
2988 unsigned char other;
2989};
252b5132 2990
a7519a3c
RH
2991static Elf_Internal_Rela *
2992elf64_alpha_find_reloc_at_ofs (Elf_Internal_Rela *rel,
2993 Elf_Internal_Rela *relend,
2994 bfd_vma offset, int type)
2995{
2996 while (rel < relend)
252b5132 2997 {
a7519a3c
RH
2998 if (rel->r_offset == offset
2999 && ELF64_R_TYPE (rel->r_info) == (unsigned int) type)
3000 return rel;
3001 ++rel;
3002 }
3003 return NULL;
3004}
252b5132 3005
a7519a3c
RH
3006static bfd_boolean
3007elf64_alpha_relax_got_load (struct alpha_relax_info *info, bfd_vma symval,
3008 Elf_Internal_Rela *irel, unsigned long r_type)
3009{
3010 unsigned int insn;
3011 bfd_signed_vma disp;
252b5132 3012
a7519a3c
RH
3013 /* Get the instruction. */
3014 insn = bfd_get_32 (info->abfd, info->contents + irel->r_offset);
252b5132 3015
a7519a3c
RH
3016 if (insn >> 26 != OP_LDQ)
3017 {
3018 reloc_howto_type *howto = elf64_alpha_howto_table + r_type;
4eca0228 3019 _bfd_error_handler
695344c0 3020 /* xgettext:c-format */
2dcf00ce
AM
3021 (_("%pB: %pA+%#" PRIx64 ": warning: "
3022 "%s relocation against unexpected insn"),
3023 info->abfd, info->sec, (uint64_t) irel->r_offset, howto->name);
a7519a3c
RH
3024 return TRUE;
3025 }
252b5132 3026
a7519a3c
RH
3027 /* Can't relax dynamic symbols. */
3028 if (alpha_elf_dynamic_symbol_p (&info->h->root, info->link_info))
3029 return TRUE;
252b5132 3030
a7519a3c 3031 /* Can't use local-exec relocations in shared libraries. */
e366eeae 3032 if (r_type == R_ALPHA_GOTTPREL
3cbc1e5e 3033 && bfd_link_dll (info->link_info))
a7519a3c 3034 return TRUE;
252b5132 3035
a7519a3c
RH
3036 if (r_type == R_ALPHA_LITERAL)
3037 {
3038 /* Look for nice constant addresses. This includes the not-uncommon
3039 special case of 0 for undefweak symbols. */
3040 if ((info->h && info->h->root.root.type == bfd_link_hash_undefweak)
0e1862bb 3041 || (!bfd_link_pic (info->link_info)
a7519a3c
RH
3042 && (symval >= (bfd_vma)-0x8000 || symval < 0x8000)))
3043 {
3044 disp = 0;
3045 insn = (OP_LDA << 26) | (insn & (31 << 21)) | (31 << 16);
3046 insn |= (symval & 0xffff);
3047 r_type = R_ALPHA_NONE;
3048 }
3049 else
3050 {
d1c109de
RH
3051 /* We may only create GPREL relocs during the second pass. */
3052 if (info->link_info->relax_pass == 0)
3053 return TRUE;
3054
a7519a3c
RH
3055 disp = symval - info->gp;
3056 insn = (OP_LDA << 26) | (insn & 0x03ff0000);
3057 r_type = R_ALPHA_GPREL16;
3058 }
252b5132
RH
3059 }
3060 else
252b5132 3061 {
a7519a3c 3062 bfd_vma dtp_base, tp_base;
252b5132 3063
a7519a3c
RH
3064 BFD_ASSERT (elf_hash_table (info->link_info)->tls_sec != NULL);
3065 dtp_base = alpha_get_dtprel_base (info->link_info);
3066 tp_base = alpha_get_tprel_base (info->link_info);
3067 disp = symval - (r_type == R_ALPHA_GOTDTPREL ? dtp_base : tp_base);
252b5132 3068
a7519a3c 3069 insn = (OP_LDA << 26) | (insn & (31 << 21)) | (31 << 16);
252b5132 3070
a7519a3c
RH
3071 switch (r_type)
3072 {
3073 case R_ALPHA_GOTDTPREL:
3074 r_type = R_ALPHA_DTPREL16;
3075 break;
3076 case R_ALPHA_GOTTPREL:
3077 r_type = R_ALPHA_TPREL16;
3078 break;
3079 default:
3080 BFD_ASSERT (0);
3081 return FALSE;
3082 }
3083 }
252b5132 3084
a7519a3c 3085 if (disp < -0x8000 || disp >= 0x8000)
b34976b6 3086 return TRUE;
252b5132 3087
a7519a3c
RH
3088 bfd_put_32 (info->abfd, (bfd_vma) insn, info->contents + irel->r_offset);
3089 info->changed_contents = TRUE;
252b5132 3090
a7519a3c
RH
3091 /* Reduce the use count on this got entry by one, possibly
3092 eliminating it. */
3093 if (--info->gotent->use_count == 0)
252b5132 3094 {
a7519a3c
RH
3095 int sz = alpha_got_entry_size (r_type);
3096 alpha_elf_tdata (info->gotobj)->total_got_size -= sz;
3097 if (!info->h)
3098 alpha_elf_tdata (info->gotobj)->local_got_size -= sz;
252b5132 3099 }
252b5132 3100
a7519a3c
RH
3101 /* Smash the existing GOT relocation for its 16-bit immediate pair. */
3102 irel->r_info = ELF64_R_INFO (ELF64_R_SYM (irel->r_info), r_type);
3103 info->changed_relocs = TRUE;
3104
3105 /* ??? Search forward through this basic block looking for insns
3106 that use the target register. Stop after an insn modifying the
3107 register is seen, or after a branch or call.
252b5132 3108
a7519a3c
RH
3109 Any such memory load insn may be substituted by a load directly
3110 off the GP. This allows the memory load insn to be issued before
3111 the calculated GP register would otherwise be ready.
252b5132 3112
a7519a3c
RH
3113 Any such jsr insn can be replaced by a bsr if it is in range.
3114
3115 This would mean that we'd have to _add_ relocations, the pain of
3116 which gives one pause. */
252b5132 3117
b34976b6 3118 return TRUE;
252b5132
RH
3119}
3120
a7519a3c
RH
3121static bfd_vma
3122elf64_alpha_relax_opt_call (struct alpha_relax_info *info, bfd_vma symval)
252b5132 3123{
a7519a3c
RH
3124 /* If the function has the same gp, and we can identify that the
3125 function does not use its function pointer, we can eliminate the
3126 address load. */
252b5132 3127
a7519a3c
RH
3128 /* If the symbol is marked NOPV, we are being told the function never
3129 needs its procedure value. */
3130 if ((info->other & STO_ALPHA_STD_GPLOAD) == STO_ALPHA_NOPV)
3131 return symval;
252b5132 3132
a7519a3c
RH
3133 /* If the symbol is marked STD_GP, we are being told the function does
3134 a normal ldgp in the first two words. */
3135 else if ((info->other & STO_ALPHA_STD_GPLOAD) == STO_ALPHA_STD_GPLOAD)
3136 ;
252b5132 3137
a7519a3c
RH
3138 /* Otherwise, we may be able to identify a GP load in the first two
3139 words, which we can then skip. */
3140 else
252b5132 3141 {
a7519a3c
RH
3142 Elf_Internal_Rela *tsec_relocs, *tsec_relend, *tsec_free, *gpdisp;
3143 bfd_vma ofs;
252b5132 3144
a7519a3c
RH
3145 /* Load the relocations from the section that the target symbol is in. */
3146 if (info->sec == info->tsec)
252b5132 3147 {
a7519a3c
RH
3148 tsec_relocs = info->relocs;
3149 tsec_relend = info->relend;
3150 tsec_free = NULL;
3151 }
3152 else
3153 {
3154 tsec_relocs = (_bfd_elf_link_read_relocs
07d6d2b8 3155 (info->abfd, info->tsec, NULL,
a7519a3c
RH
3156 (Elf_Internal_Rela *) NULL,
3157 info->link_info->keep_memory));
3158 if (tsec_relocs == NULL)
3159 return 0;
3160 tsec_relend = tsec_relocs + info->tsec->reloc_count;
ae4fda66
JC
3161 tsec_free = (elf_section_data (info->tsec)->relocs == tsec_relocs
3162 ? NULL
3163 : tsec_relocs);
a7519a3c 3164 }
252b5132 3165
a7519a3c
RH
3166 /* Recover the symbol's offset within the section. */
3167 ofs = (symval - info->tsec->output_section->vma
3168 - info->tsec->output_offset);
252b5132 3169
a7519a3c
RH
3170 /* Look for a GPDISP reloc. */
3171 gpdisp = (elf64_alpha_find_reloc_at_ofs
3172 (tsec_relocs, tsec_relend, ofs, R_ALPHA_GPDISP));
252b5132 3173
a7519a3c
RH
3174 if (!gpdisp || gpdisp->r_addend != 4)
3175 {
3176 if (tsec_free)
3177 free (tsec_free);
3178 return 0;
252b5132 3179 }
a7519a3c 3180 if (tsec_free)
07d6d2b8 3181 free (tsec_free);
252b5132
RH
3182 }
3183
a7519a3c
RH
3184 /* We've now determined that we can skip an initial gp load. Verify
3185 that the call and the target use the same gp. */
f13a99db 3186 if (info->link_info->output_bfd->xvec != info->tsec->owner->xvec
a7519a3c
RH
3187 || info->gotobj != alpha_elf_tdata (info->tsec->owner)->gotobj)
3188 return 0;
252b5132 3189
a7519a3c
RH
3190 return symval + 8;
3191}
252b5132 3192
a7519a3c
RH
3193static bfd_boolean
3194elf64_alpha_relax_with_lituse (struct alpha_relax_info *info,
3195 bfd_vma symval, Elf_Internal_Rela *irel)
252b5132 3196{
d1c109de
RH
3197 Elf_Internal_Rela *urel, *erel, *irelend = info->relend;
3198 int flags;
a7519a3c
RH
3199 bfd_signed_vma disp;
3200 bfd_boolean fits16;
3201 bfd_boolean fits32;
3202 bfd_boolean lit_reused = FALSE;
3203 bfd_boolean all_optimized = TRUE;
d1c109de
RH
3204 bfd_boolean changed_contents;
3205 bfd_boolean changed_relocs;
3206 bfd_byte *contents = info->contents;
3207 bfd *abfd = info->abfd;
3208 bfd_vma sec_output_vma;
a7519a3c 3209 unsigned int lit_insn;
d1c109de 3210 int relax_pass;
252b5132 3211
d1c109de 3212 lit_insn = bfd_get_32 (abfd, contents + irel->r_offset);
a7519a3c
RH
3213 if (lit_insn >> 26 != OP_LDQ)
3214 {
4eca0228 3215 _bfd_error_handler
695344c0 3216 /* xgettext:c-format */
2dcf00ce 3217 (_("%pB: %pA+%#" PRIx64 ": warning: "
38f14ab8
AM
3218 "%s relocation against unexpected insn"),
3219 abfd, info->sec, (uint64_t) irel->r_offset, "LITERAL");
a7519a3c
RH
3220 return TRUE;
3221 }
252b5132 3222
a7519a3c
RH
3223 /* Can't relax dynamic symbols. */
3224 if (alpha_elf_dynamic_symbol_p (&info->h->root, info->link_info))
3225 return TRUE;
3226
d1c109de
RH
3227 changed_contents = info->changed_contents;
3228 changed_relocs = info->changed_relocs;
3229 sec_output_vma = info->sec->output_section->vma + info->sec->output_offset;
3230 relax_pass = info->link_info->relax_pass;
3231
a7519a3c 3232 /* Summarize how this particular LITERAL is used. */
d1c109de 3233 for (erel = irel+1, flags = 0; erel < irelend; ++erel)
252b5132 3234 {
d1c109de 3235 if (ELF64_R_TYPE (erel->r_info) != R_ALPHA_LITUSE)
a7519a3c 3236 break;
d1c109de
RH
3237 if (erel->r_addend <= 6)
3238 flags |= 1 << erel->r_addend;
a7519a3c 3239 }
252b5132 3240
a7519a3c
RH
3241 /* A little preparation for the loop... */
3242 disp = symval - info->gp;
252b5132 3243
d1c109de 3244 for (urel = irel+1; urel < erel; ++urel)
a7519a3c 3245 {
d1c109de 3246 bfd_vma urel_r_offset = urel->r_offset;
a7519a3c
RH
3247 unsigned int insn;
3248 int insn_disp;
3249 bfd_signed_vma xdisp;
d1c109de 3250 Elf_Internal_Rela nrel;
252b5132 3251
d1c109de 3252 insn = bfd_get_32 (abfd, contents + urel_r_offset);
252b5132 3253
a7519a3c
RH
3254 switch (urel->r_addend)
3255 {
3256 case LITUSE_ALPHA_ADDR:
3257 default:
3258 /* This type is really just a placeholder to note that all
3259 uses cannot be optimized, but to still allow some. */
3260 all_optimized = FALSE;
3261 break;
252b5132 3262
a7519a3c 3263 case LITUSE_ALPHA_BASE:
d1c109de
RH
3264 /* We may only create GPREL relocs during the second pass. */
3265 if (relax_pass == 0)
3266 {
3267 all_optimized = FALSE;
3268 break;
3269 }
3270
a7519a3c 3271 /* We can always optimize 16-bit displacements. */
252b5132 3272
a7519a3c
RH
3273 /* Extract the displacement from the instruction, sign-extending
3274 it if necessary, then test whether it is within 16 or 32 bits
3275 displacement from GP. */
3276 insn_disp = ((insn & 0xffff) ^ 0x8000) - 0x8000;
3277
3278 xdisp = disp + insn_disp;
3279 fits16 = (xdisp >= - (bfd_signed_vma) 0x8000 && xdisp < 0x8000);
3280 fits32 = (xdisp >= - (bfd_signed_vma) 0x80000000
3281 && xdisp < 0x7fff8000);
3282
3283 if (fits16)
3284 {
3285 /* Take the op code and dest from this insn, take the base
3286 register from the literal insn. Leave the offset alone. */
3287 insn = (insn & 0xffe0ffff) | (lit_insn & 0x001f0000);
d1c109de
RH
3288 bfd_put_32 (abfd, (bfd_vma) insn, contents + urel_r_offset);
3289 changed_contents = TRUE;
3290
3291 nrel = *urel;
3292 nrel.r_info = ELF64_R_INFO (ELF64_R_SYM (irel->r_info),
3293 R_ALPHA_GPREL16);
3294 nrel.r_addend = irel->r_addend;
3295
3296 /* As we adjust, move the reloc to the end so that we don't
07d6d2b8 3297 break the LITERAL+LITUSE chain. */
d1c109de 3298 if (urel < --erel)
07d6d2b8 3299 *urel-- = *erel;
d1c109de
RH
3300 *erel = nrel;
3301 changed_relocs = TRUE;
252b5132 3302 }
252b5132 3303
a7519a3c
RH
3304 /* If all mem+byte, we can optimize 32-bit mem displacements. */
3305 else if (fits32 && !(flags & ~6))
3306 {
3307 /* FIXME: sanity check that lit insn Ra is mem insn Rb. */
252b5132 3308
a7519a3c
RH
3309 irel->r_info = ELF64_R_INFO (ELF64_R_SYM (irel->r_info),
3310 R_ALPHA_GPRELHIGH);
3311 lit_insn = (OP_LDAH << 26) | (lit_insn & 0x03ff0000);
d1c109de 3312 bfd_put_32 (abfd, (bfd_vma) lit_insn, contents + irel->r_offset);
a7519a3c 3313 lit_reused = TRUE;
d1c109de 3314 changed_contents = TRUE;
252b5132 3315
07d6d2b8
AM
3316 /* Since all relocs must be optimized, don't bother swapping
3317 this relocation to the end. */
a7519a3c
RH
3318 urel->r_info = ELF64_R_INFO (ELF64_R_SYM (irel->r_info),
3319 R_ALPHA_GPRELLOW);
3320 urel->r_addend = irel->r_addend;
d1c109de 3321 changed_relocs = TRUE;
a7519a3c
RH
3322 }
3323 else
3324 all_optimized = FALSE;
3325 break;
252b5132 3326
a7519a3c
RH
3327 case LITUSE_ALPHA_BYTOFF:
3328 /* We can always optimize byte instructions. */
252b5132 3329
a7519a3c
RH
3330 /* FIXME: sanity check the insn for byte op. Check that the
3331 literal dest reg is indeed Rb in the byte insn. */
252b5132 3332
a7519a3c
RH
3333 insn &= ~ (unsigned) 0x001ff000;
3334 insn |= ((symval & 7) << 13) | 0x1000;
d1c109de
RH
3335 bfd_put_32 (abfd, (bfd_vma) insn, contents + urel_r_offset);
3336 changed_contents = TRUE;
3337
3338 nrel = *urel;
3339 nrel.r_info = ELF64_R_INFO (0, R_ALPHA_NONE);
3340 nrel.r_addend = 0;
3341
3342 /* As we adjust, move the reloc to the end so that we don't
3343 break the LITERAL+LITUSE chain. */
3344 if (urel < --erel)
3345 *urel-- = *erel;
3346 *erel = nrel;
3347 changed_relocs = TRUE;
a7519a3c 3348 break;
252b5132 3349
a7519a3c
RH
3350 case LITUSE_ALPHA_JSR:
3351 case LITUSE_ALPHA_TLSGD:
3352 case LITUSE_ALPHA_TLSLDM:
8288a39e 3353 case LITUSE_ALPHA_JSRDIRECT:
0d5f9994 3354 {
a7519a3c
RH
3355 bfd_vma optdest, org;
3356 bfd_signed_vma odisp;
252b5132 3357
a7519a3c
RH
3358 /* For undefined weak symbols, we're mostly interested in getting
3359 rid of the got entry whenever possible, so optimize this to a
3360 use of the zero register. */
3361 if (info->h && info->h->root.root.type == bfd_link_hash_undefweak)
3362 {
3363 insn |= 31 << 16;
d1c109de 3364 bfd_put_32 (abfd, (bfd_vma) insn, contents + urel_r_offset);
252b5132 3365
d1c109de 3366 changed_contents = TRUE;
a7519a3c
RH
3367 break;
3368 }
252b5132 3369
a7519a3c
RH
3370 /* If not zero, place to jump without needing pv. */
3371 optdest = elf64_alpha_relax_opt_call (info, symval);
d1c109de 3372 org = sec_output_vma + urel_r_offset + 4;
a7519a3c 3373 odisp = (optdest ? optdest : symval) - org;
252b5132 3374
a7519a3c
RH
3375 if (odisp >= -0x400000 && odisp < 0x400000)
3376 {
3377 Elf_Internal_Rela *xrel;
252b5132 3378
a7519a3c
RH
3379 /* Preserve branch prediction call stack when possible. */
3380 if ((insn & INSN_JSR_MASK) == INSN_JSR)
3381 insn = (OP_BSR << 26) | (insn & 0x03e00000);
3382 else
3383 insn = (OP_BR << 26) | (insn & 0x03e00000);
d1c109de
RH
3384 bfd_put_32 (abfd, (bfd_vma) insn, contents + urel_r_offset);
3385 changed_contents = TRUE;
252b5132 3386
d1c109de
RH
3387 nrel = *urel;
3388 nrel.r_info = ELF64_R_INFO (ELF64_R_SYM (irel->r_info),
3389 R_ALPHA_BRADDR);
3390 nrel.r_addend = irel->r_addend;
252b5132 3391
a7519a3c 3392 if (optdest)
d1c109de 3393 nrel.r_addend += optdest - symval;
a7519a3c
RH
3394 else
3395 all_optimized = FALSE;
252b5132 3396
a7519a3c
RH
3397 /* Kill any HINT reloc that might exist for this insn. */
3398 xrel = (elf64_alpha_find_reloc_at_ofs
d1c109de 3399 (info->relocs, info->relend, urel_r_offset,
a7519a3c
RH
3400 R_ALPHA_HINT));
3401 if (xrel)
3402 xrel->r_info = ELF64_R_INFO (0, R_ALPHA_NONE);
252b5132 3403
d1c109de
RH
3404 /* As we adjust, move the reloc to the end so that we don't
3405 break the LITERAL+LITUSE chain. */
3406 if (urel < --erel)
3407 *urel-- = *erel;
3408 *erel = nrel;
3409
a7519a3c
RH
3410 info->changed_relocs = TRUE;
3411 }
3412 else
3413 all_optimized = FALSE;
252b5132 3414
a7519a3c
RH
3415 /* Even if the target is not in range for a direct branch,
3416 if we share a GP, we can eliminate the gp reload. */
3417 if (optdest)
3418 {
3419 Elf_Internal_Rela *gpdisp
3420 = (elf64_alpha_find_reloc_at_ofs
d1c109de 3421 (info->relocs, irelend, urel_r_offset + 4,
a7519a3c
RH
3422 R_ALPHA_GPDISP));
3423 if (gpdisp)
3424 {
d1c109de 3425 bfd_byte *p_ldah = contents + gpdisp->r_offset;
a7519a3c 3426 bfd_byte *p_lda = p_ldah + gpdisp->r_addend;
d1c109de
RH
3427 unsigned int ldah = bfd_get_32 (abfd, p_ldah);
3428 unsigned int lda = bfd_get_32 (abfd, p_lda);
252b5132 3429
a7519a3c
RH
3430 /* Verify that the instruction is "ldah $29,0($26)".
3431 Consider a function that ends in a noreturn call,
3432 and that the next function begins with an ldgp,
3433 and that by accident there is no padding between.
3434 In that case the insn would use $27 as the base. */
3435 if (ldah == 0x27ba0000 && lda == 0x23bd0000)
3436 {
d1c109de
RH
3437 bfd_put_32 (abfd, (bfd_vma) INSN_UNOP, p_ldah);
3438 bfd_put_32 (abfd, (bfd_vma) INSN_UNOP, p_lda);
252b5132 3439
a7519a3c 3440 gpdisp->r_info = ELF64_R_INFO (0, R_ALPHA_NONE);
d1c109de
RH
3441 changed_contents = TRUE;
3442 changed_relocs = TRUE;
a7519a3c
RH
3443 }
3444 }
3445 }
3446 }
3447 break;
252b5132 3448 }
252b5132
RH
3449 }
3450
d1c109de
RH
3451 /* If we reused the literal instruction, we must have optimized all. */
3452 BFD_ASSERT(!lit_reused || all_optimized);
3453
a7519a3c
RH
3454 /* If all cases were optimized, we can reduce the use count on this
3455 got entry by one, possibly eliminating it. */
3456 if (all_optimized)
252b5132 3457 {
a7519a3c 3458 if (--info->gotent->use_count == 0)
252b5132 3459 {
a7519a3c
RH
3460 int sz = alpha_got_entry_size (R_ALPHA_LITERAL);
3461 alpha_elf_tdata (info->gotobj)->total_got_size -= sz;
3462 if (!info->h)
3463 alpha_elf_tdata (info->gotobj)->local_got_size -= sz;
252b5132 3464 }
a7519a3c
RH
3465
3466 /* If the literal instruction is no longer needed (it may have been
3467 reused. We can eliminate it. */
3468 /* ??? For now, I don't want to deal with compacting the section,
3469 so just nop it out. */
3470 if (!lit_reused)
252b5132 3471 {
a7519a3c 3472 irel->r_info = ELF64_R_INFO (0, R_ALPHA_NONE);
d1c109de 3473 changed_relocs = TRUE;
252b5132 3474
d1c109de
RH
3475 bfd_put_32 (abfd, (bfd_vma) INSN_UNOP, contents + irel->r_offset);
3476 changed_contents = TRUE;
a7519a3c 3477 }
a7519a3c 3478 }
d1c109de
RH
3479
3480 info->changed_contents = changed_contents;
3481 info->changed_relocs = changed_relocs;
3482
3483 if (all_optimized || relax_pass == 0)
3484 return TRUE;
3485 return elf64_alpha_relax_got_load (info, symval, irel, R_ALPHA_LITERAL);
252b5132
RH
3486}
3487
b34976b6 3488static bfd_boolean
a7519a3c
RH
3489elf64_alpha_relax_tls_get_addr (struct alpha_relax_info *info, bfd_vma symval,
3490 Elf_Internal_Rela *irel, bfd_boolean is_gd)
f44f99a5 3491{
a7519a3c 3492 bfd_byte *pos[5];
891caa9b 3493 unsigned int insn, tlsgd_reg;
a7519a3c 3494 Elf_Internal_Rela *gpdisp, *hint;
891caa9b 3495 bfd_boolean dynamic, use_gottprel;
a7519a3c 3496 unsigned long new_symndx;
f44f99a5 3497
a7519a3c 3498 dynamic = alpha_elf_dynamic_symbol_p (&info->h->root, info->link_info);
f44f99a5 3499
a7519a3c
RH
3500 /* If a TLS symbol is accessed using IE at least once, there is no point
3501 to use dynamic model for it. */
3502 if (is_gd && info->h && (info->h->flags & ALPHA_ELF_LINK_HASH_TLS_IE))
3503 ;
f44f99a5 3504
a7519a3c
RH
3505 /* If the symbol is local, and we've already committed to DF_STATIC_TLS,
3506 then we might as well relax to IE. */
0e1862bb 3507 else if (bfd_link_pic (info->link_info) && !dynamic
a7519a3c
RH
3508 && (info->link_info->flags & DF_STATIC_TLS))
3509 ;
f44f99a5 3510
a7519a3c 3511 /* Otherwise we must be building an executable to do anything. */
0e1862bb 3512 else if (bfd_link_pic (info->link_info))
a7519a3c 3513 return TRUE;
f44f99a5 3514
a7519a3c
RH
3515 /* The TLSGD/TLSLDM relocation must be followed by a LITERAL and
3516 the matching LITUSE_TLS relocations. */
3517 if (irel + 2 >= info->relend)
3518 return TRUE;
3519 if (ELF64_R_TYPE (irel[1].r_info) != R_ALPHA_LITERAL
3520 || ELF64_R_TYPE (irel[2].r_info) != R_ALPHA_LITUSE
3521 || irel[2].r_addend != (is_gd ? LITUSE_ALPHA_TLSGD : LITUSE_ALPHA_TLSLDM))
3522 return TRUE;
f44f99a5 3523
a7519a3c
RH
3524 /* There must be a GPDISP relocation positioned immediately after the
3525 LITUSE relocation. */
3526 gpdisp = elf64_alpha_find_reloc_at_ofs (info->relocs, info->relend,
3527 irel[2].r_offset + 4, R_ALPHA_GPDISP);
3528 if (!gpdisp)
b34976b6 3529 return TRUE;
f44f99a5 3530
a7519a3c
RH
3531 pos[0] = info->contents + irel[0].r_offset;
3532 pos[1] = info->contents + irel[1].r_offset;
3533 pos[2] = info->contents + irel[2].r_offset;
3534 pos[3] = info->contents + gpdisp->r_offset;
3535 pos[4] = pos[3] + gpdisp->r_addend;
f44f99a5 3536
7dbf3b76
RH
3537 /* Beware of the compiler hoisting part of the sequence out a loop
3538 and adjusting the destination register for the TLSGD insn. If this
3539 happens, there will be a move into $16 before the JSR insn, so only
3540 transformations of the first insn pair should use this register. */
3541 tlsgd_reg = bfd_get_32 (info->abfd, pos[0]);
3542 tlsgd_reg = (tlsgd_reg >> 21) & 31;
3543
a7519a3c
RH
3544 /* Generally, the positions are not allowed to be out of order, lest the
3545 modified insn sequence have different register lifetimes. We can make
3546 an exception when pos 1 is adjacent to pos 0. */
3547 if (pos[1] + 4 == pos[0])
f44f99a5 3548 {
a7519a3c
RH
3549 bfd_byte *tmp = pos[0];
3550 pos[0] = pos[1];
3551 pos[1] = tmp;
f44f99a5 3552 }
a7519a3c
RH
3553 if (pos[1] >= pos[2] || pos[2] >= pos[3])
3554 return TRUE;
cc03ec80 3555
a7519a3c
RH
3556 /* Reduce the use count on the LITERAL relocation. Do this before we
3557 smash the symndx when we adjust the relocations below. */
3558 {
3559 struct alpha_elf_got_entry *lit_gotent;
3560 struct alpha_elf_link_hash_entry *lit_h;
3561 unsigned long indx;
f44f99a5 3562
a7519a3c
RH
3563 BFD_ASSERT (ELF64_R_SYM (irel[1].r_info) >= info->symtab_hdr->sh_info);
3564 indx = ELF64_R_SYM (irel[1].r_info) - info->symtab_hdr->sh_info;
3565 lit_h = alpha_elf_sym_hashes (info->abfd)[indx];
f44f99a5 3566
a7519a3c
RH
3567 while (lit_h->root.root.type == bfd_link_hash_indirect
3568 || lit_h->root.root.type == bfd_link_hash_warning)
3569 lit_h = (struct alpha_elf_link_hash_entry *) lit_h->root.root.u.i.link;
252b5132 3570
a7519a3c
RH
3571 for (lit_gotent = lit_h->got_entries; lit_gotent ;
3572 lit_gotent = lit_gotent->next)
3573 if (lit_gotent->gotobj == info->gotobj
3574 && lit_gotent->reloc_type == R_ALPHA_LITERAL
3575 && lit_gotent->addend == irel[1].r_addend)
3576 break;
3577 BFD_ASSERT (lit_gotent);
252b5132 3578
a7519a3c
RH
3579 if (--lit_gotent->use_count == 0)
3580 {
3581 int sz = alpha_got_entry_size (R_ALPHA_LITERAL);
3582 alpha_elf_tdata (info->gotobj)->total_got_size -= sz;
3583 }
3584 }
252b5132 3585
a7519a3c 3586 /* Change
252b5132 3587
a7519a3c
RH
3588 lda $16,x($gp) !tlsgd!1
3589 ldq $27,__tls_get_addr($gp) !literal!1
3590 jsr $26,($27),__tls_get_addr !lituse_tlsgd!1
3591 ldah $29,0($26) !gpdisp!2
3592 lda $29,0($29) !gpdisp!2
3593 to
3594 ldq $16,x($gp) !gottprel
3595 unop
3596 call_pal rduniq
3597 addq $16,$0,$0
3598 unop
3599 or the first pair to
3600 lda $16,x($gp) !tprel
3601 unop
3602 or
3603 ldah $16,x($gp) !tprelhi
3604 lda $16,x($16) !tprello
3605
3606 as appropriate. */
3607
3608 use_gottprel = FALSE;
cf35638d 3609 new_symndx = is_gd ? ELF64_R_SYM (irel->r_info) : STN_UNDEF;
891caa9b 3610
9a757e4d
RM
3611 /* Some compilers warn about a Boolean-looking expression being
3612 used in a switch. The explicit cast silences them. */
0e1862bb 3613 switch ((int) (!dynamic && !bfd_link_pic (info->link_info)))
252b5132 3614 {
a7519a3c
RH
3615 case 1:
3616 {
3617 bfd_vma tp_base;
3618 bfd_signed_vma disp;
252b5132 3619
a7519a3c
RH
3620 BFD_ASSERT (elf_hash_table (info->link_info)->tls_sec != NULL);
3621 tp_base = alpha_get_tprel_base (info->link_info);
3622 disp = symval - tp_base;
252b5132 3623
a7519a3c
RH
3624 if (disp >= -0x8000 && disp < 0x8000)
3625 {
891caa9b 3626 insn = (OP_LDA << 26) | (tlsgd_reg << 21) | (31 << 16);
a7519a3c
RH
3627 bfd_put_32 (info->abfd, (bfd_vma) insn, pos[0]);
3628 bfd_put_32 (info->abfd, (bfd_vma) INSN_UNOP, pos[1]);
3765b1be 3629
a7519a3c
RH
3630 irel[0].r_offset = pos[0] - info->contents;
3631 irel[0].r_info = ELF64_R_INFO (new_symndx, R_ALPHA_TPREL16);
3632 irel[1].r_info = ELF64_R_INFO (0, R_ALPHA_NONE);
3633 break;
3634 }
3635 else if (disp >= -(bfd_signed_vma) 0x80000000
3636 && disp < (bfd_signed_vma) 0x7fff8000
891caa9b 3637 && pos[0] + 4 == pos[1])
a7519a3c 3638 {
891caa9b 3639 insn = (OP_LDAH << 26) | (tlsgd_reg << 21) | (31 << 16);
a7519a3c 3640 bfd_put_32 (info->abfd, (bfd_vma) insn, pos[0]);
891caa9b 3641 insn = (OP_LDA << 26) | (tlsgd_reg << 21) | (tlsgd_reg << 16);
a7519a3c 3642 bfd_put_32 (info->abfd, (bfd_vma) insn, pos[1]);
3765b1be 3643
a7519a3c
RH
3644 irel[0].r_offset = pos[0] - info->contents;
3645 irel[0].r_info = ELF64_R_INFO (new_symndx, R_ALPHA_TPRELHI);
3646 irel[1].r_offset = pos[1] - info->contents;
3647 irel[1].r_info = ELF64_R_INFO (new_symndx, R_ALPHA_TPRELLO);
3648 break;
3649 }
3650 }
3651 /* FALLTHRU */
3765b1be 3652
3765b1be 3653 default:
a7519a3c
RH
3654 use_gottprel = TRUE;
3655
891caa9b 3656 insn = (OP_LDQ << 26) | (tlsgd_reg << 21) | (29 << 16);
a7519a3c
RH
3657 bfd_put_32 (info->abfd, (bfd_vma) insn, pos[0]);
3658 bfd_put_32 (info->abfd, (bfd_vma) INSN_UNOP, pos[1]);
3659
3660 irel[0].r_offset = pos[0] - info->contents;
3661 irel[0].r_info = ELF64_R_INFO (new_symndx, R_ALPHA_GOTTPREL);
3662 irel[1].r_info = ELF64_R_INFO (0, R_ALPHA_NONE);
3663 break;
3765b1be 3664 }
3765b1be 3665
a7519a3c 3666 bfd_put_32 (info->abfd, (bfd_vma) INSN_RDUNIQ, pos[2]);
252b5132 3667
a7519a3c
RH
3668 insn = INSN_ADDQ | (16 << 21) | (0 << 16) | (0 << 0);
3669 bfd_put_32 (info->abfd, (bfd_vma) insn, pos[3]);
3765b1be 3670
a7519a3c 3671 bfd_put_32 (info->abfd, (bfd_vma) INSN_UNOP, pos[4]);
e92d460e 3672
a7519a3c
RH
3673 irel[2].r_info = ELF64_R_INFO (0, R_ALPHA_NONE);
3674 gpdisp->r_info = ELF64_R_INFO (0, R_ALPHA_NONE);
252b5132 3675
a7519a3c
RH
3676 hint = elf64_alpha_find_reloc_at_ofs (info->relocs, info->relend,
3677 irel[2].r_offset, R_ALPHA_HINT);
3678 if (hint)
3679 hint->r_info = ELF64_R_INFO (0, R_ALPHA_NONE);
252b5132 3680
a7519a3c
RH
3681 info->changed_contents = TRUE;
3682 info->changed_relocs = TRUE;
d6ad34f6 3683
a7519a3c
RH
3684 /* Reduce the use count on the TLSGD/TLSLDM relocation. */
3685 if (--info->gotent->use_count == 0)
3765b1be 3686 {
a7519a3c
RH
3687 int sz = alpha_got_entry_size (info->gotent->reloc_type);
3688 alpha_elf_tdata (info->gotobj)->total_got_size -= sz;
3689 if (!info->h)
3690 alpha_elf_tdata (info->gotobj)->local_got_size -= sz;
3765b1be 3691 }
252b5132 3692
a7519a3c
RH
3693 /* If we've switched to a GOTTPREL relocation, increment the reference
3694 count on that got entry. */
3695 if (use_gottprel)
f44f99a5 3696 {
a7519a3c 3697 struct alpha_elf_got_entry *tprel_gotent;
f44f99a5 3698
a7519a3c
RH
3699 for (tprel_gotent = *info->first_gotent; tprel_gotent ;
3700 tprel_gotent = tprel_gotent->next)
3701 if (tprel_gotent->gotobj == info->gotobj
3702 && tprel_gotent->reloc_type == R_ALPHA_GOTTPREL
3703 && tprel_gotent->addend == irel->r_addend)
3704 break;
3705 if (tprel_gotent)
3706 tprel_gotent->use_count++;
3707 else
f44f99a5 3708 {
a7519a3c
RH
3709 if (info->gotent->use_count == 0)
3710 tprel_gotent = info->gotent;
3711 else
3712 {
3713 tprel_gotent = (struct alpha_elf_got_entry *)
3714 bfd_alloc (info->abfd, sizeof (struct alpha_elf_got_entry));
3715 if (!tprel_gotent)
3716 return FALSE;
f44f99a5 3717
a7519a3c
RH
3718 tprel_gotent->next = *info->first_gotent;
3719 *info->first_gotent = tprel_gotent;
f44f99a5 3720
a7519a3c
RH
3721 tprel_gotent->gotobj = info->gotobj;
3722 tprel_gotent->addend = irel->r_addend;
3723 tprel_gotent->got_offset = -1;
3724 tprel_gotent->reloc_done = 0;
3725 tprel_gotent->reloc_xlated = 0;
3726 }
f44f99a5 3727
a7519a3c
RH
3728 tprel_gotent->use_count = 1;
3729 tprel_gotent->reloc_type = R_ALPHA_GOTTPREL;
3730 }
f44f99a5 3731 }
f44f99a5 3732
b34976b6 3733 return TRUE;
f44f99a5
RH
3734}
3735
b34976b6 3736static bfd_boolean
a7519a3c
RH
3737elf64_alpha_relax_section (bfd *abfd, asection *sec,
3738 struct bfd_link_info *link_info, bfd_boolean *again)
f44f99a5 3739{
a7519a3c
RH
3740 Elf_Internal_Shdr *symtab_hdr;
3741 Elf_Internal_Rela *internal_relocs;
3742 Elf_Internal_Rela *irel, *irelend;
3743 Elf_Internal_Sym *isymbuf = NULL;
3744 struct alpha_elf_got_entry **local_got_entries;
3745 struct alpha_relax_info info;
4dfe6ac6 3746 struct alpha_elf_link_hash_table * htab;
d1c109de 3747 int relax_pass;
4dfe6ac6
NC
3748
3749 htab = alpha_elf_hash_table (link_info);
3750 if (htab == NULL)
3751 return FALSE;
f44f99a5 3752
4a828aab 3753 /* There's nothing to change, yet. */
a7519a3c 3754 *again = FALSE;
f44f99a5 3755
0e1862bb 3756 if (bfd_link_relocatable (link_info)
a7519a3c
RH
3757 || ((sec->flags & (SEC_CODE | SEC_RELOC | SEC_ALLOC))
3758 != (SEC_CODE | SEC_RELOC | SEC_ALLOC))
3759 || sec->reloc_count == 0)
d6ad34f6
RH
3760 return TRUE;
3761
0ffa91dd 3762 BFD_ASSERT (is_alpha_elf (abfd));
d1c109de 3763 relax_pass = link_info->relax_pass;
0ffa91dd 3764
4a828aab 3765 /* Make sure our GOT and PLT tables are up-to-date. */
4dfe6ac6 3766 if (htab->relax_trip != link_info->relax_trip)
4a828aab 3767 {
4dfe6ac6 3768 htab->relax_trip = link_info->relax_trip;
4a828aab 3769
d1c109de 3770 /* This should never fail after the initial round, since the only error
07d6d2b8 3771 is GOT overflow, and relaxation only shrinks the table. However, we
d1c109de
RH
3772 may only merge got sections during the first pass. If we merge
3773 sections after we've created GPREL relocs, the GP for the merged
3774 section backs up which may put the relocs out of range. */
3775 if (!elf64_alpha_size_got_sections (link_info, relax_pass == 0))
4a828aab
RH
3776 abort ();
3777 if (elf_hash_table (link_info)->dynamic_sections_created)
3778 {
3779 elf64_alpha_size_plt_section (link_info);
3780 elf64_alpha_size_rela_got_section (link_info);
3781 }
3782 }
3783
0ffa91dd 3784 symtab_hdr = &elf_symtab_hdr (abfd);
a7519a3c 3785 local_got_entries = alpha_elf_tdata(abfd)->local_got_entries;
252b5132 3786
a7519a3c
RH
3787 /* Load the relocations for this section. */
3788 internal_relocs = (_bfd_elf_link_read_relocs
2c3fc389 3789 (abfd, sec, NULL, (Elf_Internal_Rela *) NULL,
a7519a3c
RH
3790 link_info->keep_memory));
3791 if (internal_relocs == NULL)
3792 return FALSE;
252b5132 3793
a7519a3c
RH
3794 memset(&info, 0, sizeof (info));
3795 info.abfd = abfd;
3796 info.sec = sec;
3797 info.link_info = link_info;
3798 info.symtab_hdr = symtab_hdr;
3799 info.relocs = internal_relocs;
3800 info.relend = irelend = internal_relocs + sec->reloc_count;
3801
3802 /* Find the GP for this object. Do not store the result back via
3803 _bfd_set_gp_value, since this could change again before final. */
3804 info.gotobj = alpha_elf_tdata (abfd)->gotobj;
3805 if (info.gotobj)
3765b1be 3806 {
a7519a3c
RH
3807 asection *sgot = alpha_elf_tdata (info.gotobj)->got;
3808 info.gp = (sgot->output_section->vma
3809 + sgot->output_offset
3810 + 0x8000);
252b5132
RH
3811 }
3812
a7519a3c
RH
3813 /* Get the section contents. */
3814 if (elf_section_data (sec)->this_hdr.contents != NULL)
3815 info.contents = elf_section_data (sec)->this_hdr.contents;
3816 else
3817 {
3818 if (!bfd_malloc_and_get_section (abfd, sec, &info.contents))
3819 goto error_return;
3820 }
252b5132 3821
a7519a3c
RH
3822 for (irel = internal_relocs; irel < irelend; irel++)
3823 {
3824 bfd_vma symval;
3825 struct alpha_elf_got_entry *gotent;
3826 unsigned long r_type = ELF64_R_TYPE (irel->r_info);
3827 unsigned long r_symndx = ELF64_R_SYM (irel->r_info);
3828
3829 /* Early exit for unhandled or unrelaxable relocations. */
d1c109de 3830 if (r_type != R_ALPHA_LITERAL)
07d6d2b8
AM
3831 {
3832 /* We complete everything except LITERAL in the first pass. */
d1c109de
RH
3833 if (relax_pass != 0)
3834 continue;
3835 if (r_type == R_ALPHA_TLSLDM)
3836 {
3837 /* The symbol for a TLSLDM reloc is ignored. Collapse the
07d6d2b8 3838 reloc to the STN_UNDEF (0) symbol so that they all match. */
d1c109de
RH
3839 r_symndx = STN_UNDEF;
3840 }
3841 else if (r_type != R_ALPHA_GOTDTPREL
07d6d2b8 3842 && r_type != R_ALPHA_GOTTPREL
d1c109de
RH
3843 && r_type != R_ALPHA_TLSGD)
3844 continue;
a7519a3c
RH
3845 }
3846
3847 /* Get the value of the symbol referred to by the reloc. */
3848 if (r_symndx < symtab_hdr->sh_info)
3849 {
3850 /* A local symbol. */
3851 Elf_Internal_Sym *isym;
3852
3853 /* Read this BFD's local symbols. */
3854 if (isymbuf == NULL)
3855 {
3856 isymbuf = (Elf_Internal_Sym *) symtab_hdr->contents;
3857 if (isymbuf == NULL)
3858 isymbuf = bfd_elf_get_elf_syms (abfd, symtab_hdr,
3859 symtab_hdr->sh_info, 0,
3860 NULL, NULL, NULL);
3861 if (isymbuf == NULL)
3862 goto error_return;
3863 }
252b5132 3864
a7519a3c 3865 isym = isymbuf + r_symndx;
252b5132 3866
a7519a3c
RH
3867 /* Given the symbol for a TLSLDM reloc is ignored, this also
3868 means forcing the symbol value to the tp base. */
3869 if (r_type == R_ALPHA_TLSLDM)
3870 {
3871 info.tsec = bfd_abs_section_ptr;
3872 symval = alpha_get_tprel_base (info.link_info);
3873 }
3874 else
3875 {
3876 symval = isym->st_value;
3877 if (isym->st_shndx == SHN_UNDEF)
07d6d2b8 3878 continue;
a7519a3c 3879 else if (isym->st_shndx == SHN_ABS)
07d6d2b8 3880 info.tsec = bfd_abs_section_ptr;
a7519a3c 3881 else if (isym->st_shndx == SHN_COMMON)
07d6d2b8 3882 info.tsec = bfd_com_section_ptr;
a7519a3c 3883 else
07d6d2b8 3884 info.tsec = bfd_section_from_elf_index (abfd, isym->st_shndx);
a7519a3c 3885 }
252b5132 3886
a7519a3c
RH
3887 info.h = NULL;
3888 info.other = isym->st_other;
3889 if (local_got_entries)
3890 info.first_gotent = &local_got_entries[r_symndx];
3891 else
3892 {
3893 info.first_gotent = &info.gotent;
3894 info.gotent = NULL;
3895 }
252b5132 3896 }
a7519a3c
RH
3897 else
3898 {
3899 unsigned long indx;
3900 struct alpha_elf_link_hash_entry *h;
252b5132 3901
a7519a3c
RH
3902 indx = r_symndx - symtab_hdr->sh_info;
3903 h = alpha_elf_sym_hashes (abfd)[indx];
3904 BFD_ASSERT (h != NULL);
252b5132 3905
a7519a3c
RH
3906 while (h->root.root.type == bfd_link_hash_indirect
3907 || h->root.root.type == bfd_link_hash_warning)
3908 h = (struct alpha_elf_link_hash_entry *)h->root.root.u.i.link;
252b5132 3909
a7519a3c
RH
3910 /* If the symbol is undefined, we can't do anything with it. */
3911 if (h->root.root.type == bfd_link_hash_undefined)
3912 continue;
252b5132 3913
a7519a3c
RH
3914 /* If the symbol isn't defined in the current module,
3915 again we can't do anything. */
3916 if (h->root.root.type == bfd_link_hash_undefweak)
3917 {
3918 info.tsec = bfd_abs_section_ptr;
3919 symval = 0;
3920 }
3921 else if (!h->root.def_regular)
3922 {
3923 /* Except for TLSGD relocs, which can sometimes be
3924 relaxed to GOTTPREL relocs. */
3925 if (r_type != R_ALPHA_TLSGD)
3926 continue;
3927 info.tsec = bfd_abs_section_ptr;
3928 symval = 0;
3929 }
3930 else
3931 {
3932 info.tsec = h->root.root.u.def.section;
3933 symval = h->root.root.u.def.value;
3934 }
252b5132 3935
a7519a3c
RH
3936 info.h = h;
3937 info.other = h->root.other;
3938 info.first_gotent = &h->got_entries;
3939 }
252b5132 3940
a7519a3c
RH
3941 /* Search for the got entry to be used by this relocation. */
3942 for (gotent = *info.first_gotent; gotent ; gotent = gotent->next)
3943 if (gotent->gotobj == info.gotobj
3944 && gotent->reloc_type == r_type
3945 && gotent->addend == irel->r_addend)
3946 break;
3947 info.gotent = gotent;
252b5132 3948
a7519a3c
RH
3949 symval += info.tsec->output_section->vma + info.tsec->output_offset;
3950 symval += irel->r_addend;
252b5132 3951
a7519a3c 3952 switch (r_type)
252b5132 3953 {
a7519a3c
RH
3954 case R_ALPHA_LITERAL:
3955 BFD_ASSERT(info.gotent != NULL);
252b5132 3956
a7519a3c
RH
3957 /* If there exist LITUSE relocations immediately following, this
3958 opens up all sorts of interesting optimizations, because we
3959 now know every location that this address load is used. */
3960 if (irel+1 < irelend
3961 && ELF64_R_TYPE (irel[1].r_info) == R_ALPHA_LITUSE)
252b5132 3962 {
a7519a3c
RH
3963 if (!elf64_alpha_relax_with_lituse (&info, symval, irel))
3964 goto error_return;
252b5132 3965 }
a7519a3c
RH
3966 else
3967 {
3968 if (!elf64_alpha_relax_got_load (&info, symval, irel, r_type))
3969 goto error_return;
3970 }
3971 break;
252b5132 3972
a7519a3c
RH
3973 case R_ALPHA_GOTDTPREL:
3974 case R_ALPHA_GOTTPREL:
3975 BFD_ASSERT(info.gotent != NULL);
3976 if (!elf64_alpha_relax_got_load (&info, symval, irel, r_type))
3977 goto error_return;
3978 break;
3979
3980 case R_ALPHA_TLSGD:
3981 case R_ALPHA_TLSLDM:
3982 BFD_ASSERT(info.gotent != NULL);
3983 if (!elf64_alpha_relax_tls_get_addr (&info, symval, irel,
3984 r_type == R_ALPHA_TLSGD))
3985 goto error_return;
3986 break;
252b5132
RH
3987 }
3988 }
3989
a7519a3c
RH
3990 if (isymbuf != NULL
3991 && symtab_hdr->contents != (unsigned char *) isymbuf)
3992 {
3993 if (!link_info->keep_memory)
3994 free (isymbuf);
3995 else
252b5132 3996 {
a7519a3c
RH
3997 /* Cache the symbols for elf_link_input_bfd. */
3998 symtab_hdr->contents = (unsigned char *) isymbuf;
252b5132 3999 }
a7519a3c 4000 }
252b5132 4001
a7519a3c
RH
4002 if (info.contents != NULL
4003 && elf_section_data (sec)->this_hdr.contents != info.contents)
4004 {
4005 if (!info.changed_contents && !link_info->keep_memory)
4006 free (info.contents);
4007 else
252b5132 4008 {
a7519a3c
RH
4009 /* Cache the section contents for elf_link_input_bfd. */
4010 elf_section_data (sec)->this_hdr.contents = info.contents;
252b5132 4011 }
a7519a3c 4012 }
252b5132 4013
a7519a3c
RH
4014 if (elf_section_data (sec)->relocs != internal_relocs)
4015 {
4016 if (!info.changed_relocs)
4017 free (internal_relocs);
4018 else
4019 elf_section_data (sec)->relocs = internal_relocs;
252b5132 4020 }
a7519a3c
RH
4021
4022 *again = info.changed_contents || info.changed_relocs;
252b5132 4023
b34976b6 4024 return TRUE;
252b5132 4025
a7519a3c
RH
4026 error_return:
4027 if (isymbuf != NULL
4028 && symtab_hdr->contents != (unsigned char *) isymbuf)
4029 free (isymbuf);
4030 if (info.contents != NULL
4031 && elf_section_data (sec)->this_hdr.contents != info.contents)
4032 free (info.contents);
4033 if (internal_relocs != NULL
4034 && elf_section_data (sec)->relocs != internal_relocs)
4035 free (internal_relocs);
4036 return FALSE;
4037}
4038\f
1bbc9cec
RH
4039/* Emit a dynamic relocation for (DYNINDX, RTYPE, ADDEND) at (SEC, OFFSET)
4040 into the next available slot in SREL. */
4041
4042static void
a7519a3c
RH
4043elf64_alpha_emit_dynrel (bfd *abfd, struct bfd_link_info *info,
4044 asection *sec, asection *srel, bfd_vma offset,
4045 long dynindx, long rtype, bfd_vma addend)
1bbc9cec
RH
4046{
4047 Elf_Internal_Rela outrel;
4048 bfd_byte *loc;
4049
4050 BFD_ASSERT (srel != NULL);
4051
4052 outrel.r_info = ELF64_R_INFO (dynindx, rtype);
4053 outrel.r_addend = addend;
4054
4055 offset = _bfd_elf_section_offset (abfd, info, sec, offset);
4056 if ((offset | 1) != (bfd_vma) -1)
4057 outrel.r_offset = sec->output_section->vma + sec->output_offset + offset;
4058 else
4059 memset (&outrel, 0, sizeof (outrel));
4060
4061 loc = srel->contents;
4062 loc += srel->reloc_count++ * sizeof (Elf64_External_Rela);
4063 bfd_elf64_swap_reloca_out (abfd, &outrel, loc);
eea6121a 4064 BFD_ASSERT (sizeof (Elf64_External_Rela) * srel->reloc_count <= srel->size);
1bbc9cec
RH
4065}
4066
4a67a098
RH
4067/* Relocate an Alpha ELF section for a relocatable link.
4068
4069 We don't have to change anything unless the reloc is against a section
4070 symbol, in which case we have to adjust according to where the section
4071 symbol winds up in the output section. */
4072
b34976b6 4073static bfd_boolean
a7519a3c
RH
4074elf64_alpha_relocate_section_r (bfd *output_bfd ATTRIBUTE_UNUSED,
4075 struct bfd_link_info *info ATTRIBUTE_UNUSED,
4076 bfd *input_bfd, asection *input_section,
4077 bfd_byte *contents ATTRIBUTE_UNUSED,
4078 Elf_Internal_Rela *relocs,
4079 Elf_Internal_Sym *local_syms,
4080 asection **local_sections)
4a67a098
RH
4081{
4082 unsigned long symtab_hdr_sh_info;
4083 Elf_Internal_Rela *rel;
4084 Elf_Internal_Rela *relend;
ab96bf03 4085 struct elf_link_hash_entry **sym_hashes;
b34976b6 4086 bfd_boolean ret_val = TRUE;
4a67a098 4087
0ffa91dd 4088 symtab_hdr_sh_info = elf_symtab_hdr (input_bfd).sh_info;
ab96bf03 4089 sym_hashes = elf_sym_hashes (input_bfd);
4a67a098
RH
4090
4091 relend = relocs + input_section->reloc_count;
4092 for (rel = relocs; rel < relend; rel++)
4093 {
4094 unsigned long r_symndx;
4095 Elf_Internal_Sym *sym;
4096 asection *sec;
4097 unsigned long r_type;
4098
ab96bf03 4099 r_type = ELF64_R_TYPE (rel->r_info);
4a67a098
RH
4100 if (r_type >= R_ALPHA_max)
4101 {
4eca0228 4102 _bfd_error_handler
695344c0 4103 /* xgettext:c-format */
0aa13fee 4104 (_("%pB: unsupported relocation type %#x"),
d003868e 4105 input_bfd, (int) r_type);
4a67a098 4106 bfd_set_error (bfd_error_bad_value);
b34976b6 4107 ret_val = FALSE;
4a67a098
RH
4108 continue;
4109 }
4110
4a67a098
RH
4111 /* The symbol associated with GPDISP and LITUSE is
4112 immaterial. Only the addend is significant. */
4113 if (r_type == R_ALPHA_GPDISP || r_type == R_ALPHA_LITUSE)
4114 continue;
4115
ab96bf03 4116 r_symndx = ELF64_R_SYM (rel->r_info);
4a67a098
RH
4117 if (r_symndx < symtab_hdr_sh_info)
4118 {
4119 sym = local_syms + r_symndx;
ab96bf03 4120 sec = local_sections[r_symndx];
4a67a098 4121 }
ab96bf03
AM
4122 else
4123 {
4124 struct elf_link_hash_entry *h;
4125
4126 h = sym_hashes[r_symndx - symtab_hdr_sh_info];
4127
4128 while (h->root.type == bfd_link_hash_indirect
4129 || h->root.type == bfd_link_hash_warning)
4130 h = (struct elf_link_hash_entry *) h->root.u.i.link;
4131
4132 if (h->root.type != bfd_link_hash_defined
4133 && h->root.type != bfd_link_hash_defweak)
4134 continue;
4135
4136 sym = NULL;
4137 sec = h->root.u.def.section;
4138 }
4139
dbaa2011 4140 if (sec != NULL && discarded_section (sec))
e4067dbb 4141 RELOC_AGAINST_DISCARDED_SECTION (info, input_bfd, input_section,
545fd46b
MR
4142 rel, 1, relend,
4143 elf64_alpha_howto_table + r_type, 0,
e4067dbb 4144 contents);
ab96bf03
AM
4145
4146 if (sym != NULL && ELF_ST_TYPE (sym->st_info) == STT_SECTION)
4147 rel->r_addend += sec->output_offset;
4a67a098
RH
4148 }
4149
4150 return ret_val;
4151}
4152
252b5132
RH
4153/* Relocate an Alpha ELF section. */
4154
b34976b6 4155static bfd_boolean
a7519a3c
RH
4156elf64_alpha_relocate_section (bfd *output_bfd, struct bfd_link_info *info,
4157 bfd *input_bfd, asection *input_section,
4158 bfd_byte *contents, Elf_Internal_Rela *relocs,
4159 Elf_Internal_Sym *local_syms,
4160 asection **local_sections)
252b5132 4161{
4a67a098 4162 Elf_Internal_Shdr *symtab_hdr;
252b5132
RH
4163 Elf_Internal_Rela *rel;
4164 Elf_Internal_Rela *relend;
4a67a098
RH
4165 asection *sgot, *srel, *srelgot;
4166 bfd *dynobj, *gotobj;
4167 bfd_vma gp, tp_base, dtp_base;
4168 struct alpha_elf_got_entry **local_got_entries;
b34976b6 4169 bfd_boolean ret_val;
252b5132 4170
0ffa91dd 4171 BFD_ASSERT (is_alpha_elf (input_bfd));
68ffbac6 4172
4a67a098 4173 /* Handle relocatable links with a smaller loop. */
0e1862bb 4174 if (bfd_link_relocatable (info))
4a67a098
RH
4175 return elf64_alpha_relocate_section_r (output_bfd, info, input_bfd,
4176 input_section, contents, relocs,
4177 local_syms, local_sections);
4178
4179 /* This is a final link. */
4180
b34976b6 4181 ret_val = TRUE;
252b5132 4182
0ffa91dd 4183 symtab_hdr = &elf_symtab_hdr (input_bfd);
3765b1be 4184
4a67a098 4185 dynobj = elf_hash_table (info)->dynobj;
ce558b89 4186 srelgot = elf_hash_table (info)->srelgot;
4a67a098 4187
3241278a
RH
4188 if (input_section->flags & SEC_ALLOC)
4189 {
4190 const char *section_name;
4191 section_name = (bfd_elf_string_from_elf_section
4192 (input_bfd, elf_elfheader(input_bfd)->e_shstrndx,
d4730f92 4193 _bfd_elf_single_rel_hdr (input_section)->sh_name));
3241278a 4194 BFD_ASSERT(section_name != NULL);
3d4d4302 4195 srel = bfd_get_linker_section (dynobj, section_name);
3241278a
RH
4196 }
4197 else
4198 srel = NULL;
3765b1be 4199
4a67a098
RH
4200 /* Find the gp value for this input bfd. */
4201 gotobj = alpha_elf_tdata (input_bfd)->gotobj;
4202 if (gotobj)
4203 {
4204 sgot = alpha_elf_tdata (gotobj)->got;
4205 gp = _bfd_get_gp_value (gotobj);
4206 if (gp == 0)
252b5132 4207 {
4a67a098
RH
4208 gp = (sgot->output_section->vma
4209 + sgot->output_offset
4210 + 0x8000);
4211 _bfd_set_gp_value (gotobj, gp);
4212 }
4213 }
4214 else
4215 {
4216 sgot = NULL;
4217 gp = 0;
4218 }
3765b1be 4219
4a67a098
RH
4220 local_got_entries = alpha_elf_tdata(input_bfd)->local_got_entries;
4221
e1918d23 4222 if (elf_hash_table (info)->tls_sec != NULL)
4a67a098 4223 {
e1918d23
AM
4224 dtp_base = alpha_get_dtprel_base (info);
4225 tp_base = alpha_get_tprel_base (info);
252b5132 4226 }
4a67a098
RH
4227 else
4228 dtp_base = tp_base = 0;
252b5132 4229
252b5132 4230 relend = relocs + input_section->reloc_count;
4a67a098 4231 for (rel = relocs; rel < relend; rel++)
252b5132 4232 {
4a67a098 4233 struct alpha_elf_link_hash_entry *h = NULL;
3765b1be
RH
4234 struct alpha_elf_got_entry *gotent;
4235 bfd_reloc_status_type r;
252b5132
RH
4236 reloc_howto_type *howto;
4237 unsigned long r_symndx;
4a67a098
RH
4238 Elf_Internal_Sym *sym = NULL;
4239 asection *sec = NULL;
3765b1be 4240 bfd_vma value;
dc810e39 4241 bfd_vma addend;
b34976b6 4242 bfd_boolean dynamic_symbol_p;
1d5316ab 4243 bfd_boolean unresolved_reloc = FALSE;
b34976b6 4244 bfd_boolean undef_weak_ref = FALSE;
3765b1be 4245 unsigned long r_type;
252b5132
RH
4246
4247 r_type = ELF64_R_TYPE(rel->r_info);
3765b1be 4248 if (r_type >= R_ALPHA_max)
252b5132 4249 {
4eca0228 4250 _bfd_error_handler
695344c0 4251 /* xgettext:c-format */
0aa13fee 4252 (_("%pB: unsupported relocation type %#x"),
d003868e 4253 input_bfd, (int) r_type);
252b5132 4254 bfd_set_error (bfd_error_bad_value);
b34976b6 4255 ret_val = FALSE;
3765b1be 4256 continue;
252b5132 4257 }
252b5132 4258
3765b1be 4259 howto = elf64_alpha_howto_table + r_type;
252b5132
RH
4260 r_symndx = ELF64_R_SYM(rel->r_info);
4261
cc03ec80 4262 /* The symbol for a TLSLDM reloc is ignored. Collapse the
cf35638d 4263 reloc to the STN_UNDEF (0) symbol so that they all match. */
cc03ec80 4264 if (r_type == R_ALPHA_TLSLDM)
cf35638d 4265 r_symndx = STN_UNDEF;
cc03ec80 4266
252b5132
RH
4267 if (r_symndx < symtab_hdr->sh_info)
4268 {
8517fae7 4269 asection *msec;
252b5132
RH
4270 sym = local_syms + r_symndx;
4271 sec = local_sections[r_symndx];
8517fae7
AM
4272 msec = sec;
4273 value = _bfd_elf_rela_local_sym (output_bfd, sym, &msec, rel);
3765b1be 4274
cf35638d 4275 /* If this is a tp-relative relocation against sym STN_UNDEF (0),
cc03ec80 4276 this is hackery from relax_section. Force the value to
f915360b 4277 be the tls module base. */
cf35638d 4278 if (r_symndx == STN_UNDEF
cc03ec80
RH
4279 && (r_type == R_ALPHA_TLSLDM
4280 || r_type == R_ALPHA_GOTTPREL
4281 || r_type == R_ALPHA_TPREL64
4282 || r_type == R_ALPHA_TPRELHI
4283 || r_type == R_ALPHA_TPRELLO
4284 || r_type == R_ALPHA_TPREL16))
f915360b 4285 value = dtp_base;
cc03ec80 4286
4a67a098
RH
4287 if (local_got_entries)
4288 gotent = local_got_entries[r_symndx];
4289 else
4290 gotent = NULL;
3765b1be
RH
4291
4292 /* Need to adjust local GOT entries' addends for SEC_MERGE
4293 unless it has been done already. */
4294 if ((sec->flags & SEC_MERGE)
048d873d 4295 && ELF_ST_TYPE (sym->st_info) == STT_SECTION
dbaa2011 4296 && sec->sec_info_type == SEC_INFO_TYPE_MERGE
048d873d
RH
4297 && gotent
4298 && !gotent->reloc_xlated)
3765b1be
RH
4299 {
4300 struct alpha_elf_got_entry *ent;
3765b1be
RH
4301
4302 for (ent = gotent; ent; ent = ent->next)
4303 {
4304 ent->reloc_xlated = 1;
4305 if (ent->use_count == 0)
4306 continue;
4307 msec = sec;
4308 ent->addend =
4309 _bfd_merged_section_offset (output_bfd, &msec,
4310 elf_section_data (sec)->
4311 sec_info,
753731ee 4312 sym->st_value + ent->addend);
3765b1be
RH
4313 ent->addend -= sym->st_value;
4314 ent->addend += msec->output_section->vma
4315 + msec->output_offset
4316 - sec->output_section->vma
4317 - sec->output_offset;
4318 }
4319 }
4320
b34976b6 4321 dynamic_symbol_p = FALSE;
252b5132
RH
4322 }
4323 else
4324 {
62d887d4 4325 bfd_boolean warned, ignored;
560e09e9 4326 struct elf_link_hash_entry *hh;
b2a8e766
AM
4327 struct elf_link_hash_entry **sym_hashes = elf_sym_hashes (input_bfd);
4328
4329 RELOC_FOR_GLOBAL_SYMBOL (info, input_bfd, input_section, rel,
4330 r_symndx, symtab_hdr, sym_hashes,
4331 hh, sec, value,
62d887d4 4332 unresolved_reloc, warned, ignored);
560e09e9
NC
4333
4334 if (warned)
4335 continue;
252b5132 4336
560e09e9
NC
4337 if (value == 0
4338 && ! unresolved_reloc
4339 && hh->root.type == bfd_link_hash_undefweak)
b34976b6 4340 undef_weak_ref = TRUE;
3765b1be 4341
560e09e9 4342 h = (struct alpha_elf_link_hash_entry *) hh;
07d6d2b8 4343 dynamic_symbol_p = alpha_elf_dynamic_symbol_p (&h->root, info);
3765b1be 4344 gotent = h->got_entries;
252b5132 4345 }
3765b1be 4346
dbaa2011 4347 if (sec != NULL && discarded_section (sec))
e4067dbb 4348 RELOC_AGAINST_DISCARDED_SECTION (info, input_bfd, input_section,
545fd46b 4349 rel, 1, relend, howto, 0, contents);
ab96bf03 4350
252b5132 4351 addend = rel->r_addend;
3765b1be
RH
4352 value += addend;
4353
4354 /* Search for the proper got entry. */
4355 for (; gotent ; gotent = gotent->next)
4356 if (gotent->gotobj == gotobj
4357 && gotent->reloc_type == r_type
4358 && gotent->addend == addend)
4359 break;
252b5132
RH
4360
4361 switch (r_type)
4362 {
4363 case R_ALPHA_GPDISP:
4364 {
4365 bfd_byte *p_ldah, *p_lda;
4366
4367 BFD_ASSERT(gp != 0);
4368
3765b1be
RH
4369 value = (input_section->output_section->vma
4370 + input_section->output_offset
4371 + rel->r_offset);
252b5132 4372
3765b1be 4373 p_ldah = contents + rel->r_offset;
252b5132
RH
4374 p_lda = p_ldah + rel->r_addend;
4375
3765b1be 4376 r = elf64_alpha_do_reloc_gpdisp (input_bfd, gp - value,
252b5132
RH
4377 p_ldah, p_lda);
4378 }
4379 break;
4380
252b5132 4381 case R_ALPHA_LITERAL:
3765b1be
RH
4382 BFD_ASSERT(sgot != NULL);
4383 BFD_ASSERT(gp != 0);
4384 BFD_ASSERT(gotent != NULL);
4385 BFD_ASSERT(gotent->use_count >= 1);
f7460f5f 4386
3765b1be
RH
4387 if (!gotent->reloc_done)
4388 {
4389 gotent->reloc_done = 1;
252b5132 4390
3765b1be
RH
4391 bfd_put_64 (output_bfd, value,
4392 sgot->contents + gotent->got_offset);
252b5132 4393
3765b1be
RH
4394 /* If the symbol has been forced local, output a
4395 RELATIVE reloc, otherwise it will be handled in
4396 finish_dynamic_symbol. */
0e1862bb
L
4397 if (bfd_link_pic (info)
4398 && !dynamic_symbol_p
4399 && !undef_weak_ref)
1bbc9cec
RH
4400 elf64_alpha_emit_dynrel (output_bfd, info, sgot, srelgot,
4401 gotent->got_offset, 0,
4402 R_ALPHA_RELATIVE, value);
3765b1be 4403 }
252b5132 4404
3765b1be
RH
4405 value = (sgot->output_section->vma
4406 + sgot->output_offset
4407 + gotent->got_offset);
4408 value -= gp;
252b5132
RH
4409 goto default_reloc;
4410
4411 case R_ALPHA_GPREL32:
ec1659c8 4412 case R_ALPHA_GPREL16:
252b5132 4413 case R_ALPHA_GPRELLOW:
3765b1be 4414 if (dynamic_symbol_p)
07d6d2b8 4415 {
4eca0228 4416 _bfd_error_handler
695344c0 4417 /* xgettext:c-format */
871b3ab2 4418 (_("%pB: gp-relative relocation against dynamic symbol %s"),
07d6d2b8
AM
4419 input_bfd, h->root.root.root.string);
4420 ret_val = FALSE;
4421 }
252b5132 4422 BFD_ASSERT(gp != 0);
3765b1be 4423 value -= gp;
252b5132
RH
4424 goto default_reloc;
4425
4426 case R_ALPHA_GPRELHIGH:
3765b1be 4427 if (dynamic_symbol_p)
07d6d2b8 4428 {
4eca0228 4429 _bfd_error_handler
695344c0 4430 /* xgettext:c-format */
871b3ab2 4431 (_("%pB: gp-relative relocation against dynamic symbol %s"),
07d6d2b8
AM
4432 input_bfd, h->root.root.root.string);
4433 ret_val = FALSE;
4434 }
252b5132 4435 BFD_ASSERT(gp != 0);
3765b1be
RH
4436 value -= gp;
4437 value = ((bfd_signed_vma) value >> 16) + ((value >> 15) & 1);
252b5132
RH
4438 goto default_reloc;
4439
252b5132 4440 case R_ALPHA_HINT:
f94952df
RH
4441 /* A call to a dynamic symbol is definitely out of range of
4442 the 16-bit displacement. Don't bother writing anything. */
3765b1be 4443 if (dynamic_symbol_p)
f94952df
RH
4444 {
4445 r = bfd_reloc_ok;
4446 break;
4447 }
3765b1be
RH
4448 /* The regular PC-relative stuff measures from the start of
4449 the instruction rather than the end. */
4450 value -= 4;
4451 goto default_reloc;
f94952df
RH
4452
4453 case R_ALPHA_BRADDR:
3765b1be 4454 if (dynamic_symbol_p)
07d6d2b8 4455 {
4eca0228 4456 _bfd_error_handler
695344c0 4457 /* xgettext:c-format */
871b3ab2 4458 (_("%pB: pc-relative relocation against dynamic symbol %s"),
07d6d2b8
AM
4459 input_bfd, h->root.root.root.string);
4460 ret_val = FALSE;
4461 }
252b5132
RH
4462 /* The regular PC-relative stuff measures from the start of
4463 the instruction rather than the end. */
3765b1be 4464 value -= 4;
252b5132
RH
4465 goto default_reloc;
4466
7793f4d0
RH
4467 case R_ALPHA_BRSGP:
4468 {
4469 int other;
4470 const char *name;
4471
4472 /* The regular PC-relative stuff measures from the start of
4473 the instruction rather than the end. */
3765b1be 4474 value -= 4;
7793f4d0 4475
ccf00ab6
RH
4476 /* The source and destination gp must be the same. Note that
4477 the source will always have an assigned gp, since we forced
4478 one in check_relocs, but that the destination may not, as
cedb70c5 4479 it might not have had any relocations at all. Also take
ccf00ab6
RH
4480 care not to crash if H is an undefined symbol. */
4481 if (h != NULL && sec != NULL
4482 && alpha_elf_tdata (sec->owner)->gotobj
7793f4d0
RH
4483 && gotobj != alpha_elf_tdata (sec->owner)->gotobj)
4484 {
4eca0228 4485 _bfd_error_handler
695344c0 4486 /* xgettext:c-format */
871b3ab2 4487 (_("%pB: change in gp: BRSGP %s"),
d003868e 4488 input_bfd, h->root.root.root.string);
b34976b6 4489 ret_val = FALSE;
7793f4d0
RH
4490 }
4491
4492 /* The symbol should be marked either NOPV or STD_GPLOAD. */
4493 if (h != NULL)
4494 other = h->root.other;
4495 else
4496 other = sym->st_other;
4497 switch (other & STO_ALPHA_STD_GPLOAD)
4498 {
4499 case STO_ALPHA_NOPV:
07d6d2b8 4500 break;
7793f4d0 4501 case STO_ALPHA_STD_GPLOAD:
64e04ecd 4502 value += 8;
7793f4d0
RH
4503 break;
4504 default:
4505 if (h != NULL)
4506 name = h->root.root.root.string;
4507 else
4508 {
4509 name = (bfd_elf_string_from_elf_section
4510 (input_bfd, symtab_hdr->sh_link, sym->st_name));
4511 if (name == NULL)
4512 name = _("<unknown>");
4513 else if (name[0] == 0)
fd361982 4514 name = bfd_section_name (sec);
7793f4d0 4515 }
4eca0228 4516 _bfd_error_handler
695344c0 4517 /* xgettext:c-format */
871b3ab2 4518 (_("%pB: !samegp reloc against symbol without .prologue: %s"),
d003868e 4519 input_bfd, name);
b34976b6 4520 ret_val = FALSE;
7793f4d0
RH
4521 break;
4522 }
4523
4524 goto default_reloc;
4525 }
4526
252b5132
RH
4527 case R_ALPHA_REFLONG:
4528 case R_ALPHA_REFQUAD:
3765b1be
RH
4529 case R_ALPHA_DTPREL64:
4530 case R_ALPHA_TPREL64:
252b5132 4531 {
1bbc9cec
RH
4532 long dynindx, dyntype = r_type;
4533 bfd_vma dynaddend;
252b5132
RH
4534
4535 /* Careful here to remember RELATIVE relocations for global
4536 variables for symbolic shared objects. */
4537
3765b1be 4538 if (dynamic_symbol_p)
252b5132
RH
4539 {
4540 BFD_ASSERT(h->root.dynindx != -1);
1bbc9cec
RH
4541 dynindx = h->root.dynindx;
4542 dynaddend = addend;
3765b1be
RH
4543 addend = 0, value = 0;
4544 }
4545 else if (r_type == R_ALPHA_DTPREL64)
4546 {
e1918d23 4547 BFD_ASSERT (elf_hash_table (info)->tls_sec != NULL);
3765b1be
RH
4548 value -= dtp_base;
4549 goto default_reloc;
4550 }
4551 else if (r_type == R_ALPHA_TPREL64)
4552 {
e1918d23 4553 BFD_ASSERT (elf_hash_table (info)->tls_sec != NULL);
3cbc1e5e 4554 if (!bfd_link_dll (info))
1bbc9cec
RH
4555 {
4556 value -= tp_base;
4557 goto default_reloc;
4558 }
4559 dynindx = 0;
4560 dynaddend = value - dtp_base;
252b5132 4561 }
0e1862bb 4562 else if (bfd_link_pic (info)
cf35638d 4563 && r_symndx != STN_UNDEF
d6ad34f6 4564 && (input_section->flags & SEC_ALLOC)
1d5316ab
AM
4565 && !undef_weak_ref
4566 && !(unresolved_reloc
4567 && (_bfd_elf_section_offset (output_bfd, info,
4568 input_section,
4569 rel->r_offset)
4570 == (bfd_vma) -1)))
252b5132 4571 {
3765b1be
RH
4572 if (r_type == R_ALPHA_REFLONG)
4573 {
4eca0228 4574 _bfd_error_handler
695344c0 4575 /* xgettext:c-format */
871b3ab2 4576 (_("%pB: unhandled dynamic relocation against %s"),
d003868e 4577 input_bfd,
3765b1be 4578 h->root.root.root.string);
b34976b6 4579 ret_val = FALSE;
3765b1be 4580 }
1bbc9cec
RH
4581 dynindx = 0;
4582 dyntype = R_ALPHA_RELATIVE;
4583 dynaddend = value;
252b5132
RH
4584 }
4585 else
4586 goto default_reloc;
4587
3241278a
RH
4588 if (input_section->flags & SEC_ALLOC)
4589 elf64_alpha_emit_dynrel (output_bfd, info, input_section,
4590 srel, rel->r_offset, dynindx,
4591 dyntype, dynaddend);
252b5132
RH
4592 }
4593 goto default_reloc;
4594
3765b1be 4595 case R_ALPHA_SREL16:
84de6048
RH
4596 case R_ALPHA_SREL32:
4597 case R_ALPHA_SREL64:
3765b1be 4598 if (dynamic_symbol_p)
07d6d2b8 4599 {
4eca0228 4600 _bfd_error_handler
695344c0 4601 /* xgettext:c-format */
871b3ab2 4602 (_("%pB: pc-relative relocation against dynamic symbol %s"),
07d6d2b8
AM
4603 input_bfd, h->root.root.root.string);
4604 ret_val = FALSE;
4605 }
3cbc1e5e 4606 else if (bfd_link_pic (info)
0e1862bb 4607 && undef_weak_ref)
07d6d2b8 4608 {
4eca0228 4609 _bfd_error_handler
695344c0 4610 /* xgettext:c-format */
871b3ab2 4611 (_("%pB: pc-relative relocation against undefined weak symbol %s"),
07d6d2b8
AM
4612 input_bfd, h->root.root.root.string);
4613 ret_val = FALSE;
4614 }
d6ad34f6 4615
3765b1be 4616
84de6048
RH
4617 /* ??? .eh_frame references to discarded sections will be smashed
4618 to relocations against SHN_UNDEF. The .eh_frame format allows
4619 NULL to be encoded as 0 in any format, so this works here. */
1d5316ab
AM
4620 if (r_symndx == STN_UNDEF
4621 || (unresolved_reloc
4622 && _bfd_elf_section_offset (output_bfd, info,
4623 input_section,
4624 rel->r_offset) == (bfd_vma) -1))
84de6048
RH
4625 howto = (elf64_alpha_howto_table
4626 + (r_type - R_ALPHA_SREL32 + R_ALPHA_REFLONG));
4627 goto default_reloc;
4628
3765b1be
RH
4629 case R_ALPHA_TLSLDM:
4630 /* Ignore the symbol for the relocation. The result is always
4631 the current module. */
4632 dynamic_symbol_p = 0;
4633 /* FALLTHRU */
4634
4635 case R_ALPHA_TLSGD:
4636 if (!gotent->reloc_done)
4637 {
4638 gotent->reloc_done = 1;
4639
4640 /* Note that the module index for the main program is 1. */
0e1862bb
L
4641 bfd_put_64 (output_bfd,
4642 !bfd_link_pic (info) && !dynamic_symbol_p,
3765b1be
RH
4643 sgot->contents + gotent->got_offset);
4644
4645 /* If the symbol has been forced local, output a
4646 DTPMOD64 reloc, otherwise it will be handled in
4647 finish_dynamic_symbol. */
0e1862bb 4648 if (bfd_link_pic (info) && !dynamic_symbol_p)
1bbc9cec
RH
4649 elf64_alpha_emit_dynrel (output_bfd, info, sgot, srelgot,
4650 gotent->got_offset, 0,
4651 R_ALPHA_DTPMOD64, 0);
3765b1be
RH
4652
4653 if (dynamic_symbol_p || r_type == R_ALPHA_TLSLDM)
4654 value = 0;
4655 else
4656 {
e1918d23 4657 BFD_ASSERT (elf_hash_table (info)->tls_sec != NULL);
07d6d2b8 4658 value -= dtp_base;
3765b1be
RH
4659 }
4660 bfd_put_64 (output_bfd, value,
4661 sgot->contents + gotent->got_offset + 8);
4662 }
4663
4664 value = (sgot->output_section->vma
4665 + sgot->output_offset
4666 + gotent->got_offset);
4667 value -= gp;
4668 goto default_reloc;
4669
4670 case R_ALPHA_DTPRELHI:
4671 case R_ALPHA_DTPRELLO:
4672 case R_ALPHA_DTPREL16:
4673 if (dynamic_symbol_p)
07d6d2b8 4674 {
4eca0228 4675 _bfd_error_handler
695344c0 4676 /* xgettext:c-format */
871b3ab2 4677 (_("%pB: dtp-relative relocation against dynamic symbol %s"),
07d6d2b8
AM
4678 input_bfd, h->root.root.root.string);
4679 ret_val = FALSE;
4680 }
e1918d23 4681 BFD_ASSERT (elf_hash_table (info)->tls_sec != NULL);
3765b1be 4682 value -= dtp_base;
9e756d64
RH
4683 if (r_type == R_ALPHA_DTPRELHI)
4684 value = ((bfd_signed_vma) value >> 16) + ((value >> 15) & 1);
3765b1be
RH
4685 goto default_reloc;
4686
4687 case R_ALPHA_TPRELHI:
4688 case R_ALPHA_TPRELLO:
4689 case R_ALPHA_TPREL16:
3cbc1e5e 4690 if (bfd_link_dll (info))
9e756d64 4691 {
4eca0228 4692 _bfd_error_handler
695344c0 4693 /* xgettext:c-format */
871b3ab2 4694 (_("%pB: TLS local exec code cannot be linked into shared objects"),
d003868e 4695 input_bfd);
07d6d2b8 4696 ret_val = FALSE;
9e756d64
RH
4697 }
4698 else if (dynamic_symbol_p)
07d6d2b8 4699 {
4eca0228 4700 _bfd_error_handler
695344c0 4701 /* xgettext:c-format */
871b3ab2 4702 (_("%pB: tp-relative relocation against dynamic symbol %s"),
07d6d2b8
AM
4703 input_bfd, h->root.root.root.string);
4704 ret_val = FALSE;
4705 }
e1918d23 4706 BFD_ASSERT (elf_hash_table (info)->tls_sec != NULL);
3765b1be 4707 value -= tp_base;
9e756d64
RH
4708 if (r_type == R_ALPHA_TPRELHI)
4709 value = ((bfd_signed_vma) value >> 16) + ((value >> 15) & 1);
3765b1be
RH
4710 goto default_reloc;
4711
4712 case R_ALPHA_GOTDTPREL:
4713 case R_ALPHA_GOTTPREL:
4714 BFD_ASSERT(sgot != NULL);
4715 BFD_ASSERT(gp != 0);
4716 BFD_ASSERT(gotent != NULL);
4717 BFD_ASSERT(gotent->use_count >= 1);
4718
4719 if (!gotent->reloc_done)
4720 {
4721 gotent->reloc_done = 1;
4722
4723 if (dynamic_symbol_p)
4724 value = 0;
4725 else
4726 {
e1918d23 4727 BFD_ASSERT (elf_hash_table (info)->tls_sec != NULL);
1bbc9cec
RH
4728 if (r_type == R_ALPHA_GOTDTPREL)
4729 value -= dtp_base;
28fbeab8 4730 else if (bfd_link_executable (info))
1bbc9cec
RH
4731 value -= tp_base;
4732 else
4733 {
4734 elf64_alpha_emit_dynrel (output_bfd, info, sgot, srelgot,
4735 gotent->got_offset, 0,
4736 R_ALPHA_TPREL64,
4737 value - dtp_base);
4738 value = 0;
4739 }
3765b1be
RH
4740 }
4741 bfd_put_64 (output_bfd, value,
4742 sgot->contents + gotent->got_offset);
4743 }
4744
4745 value = (sgot->output_section->vma
4746 + sgot->output_offset
4747 + gotent->got_offset);
4748 value -= gp;
4749 goto default_reloc;
4750
252b5132
RH
4751 default:
4752 default_reloc:
4753 r = _bfd_final_link_relocate (howto, input_bfd, input_section,
3765b1be 4754 contents, rel->r_offset, value, 0);
252b5132
RH
4755 break;
4756 }
4757
4758 switch (r)
4759 {
4760 case bfd_reloc_ok:
4761 break;
4762
4763 case bfd_reloc_overflow:
4764 {
4765 const char *name;
4766
ed4de5e2
JJ
4767 /* Don't warn if the overflow is due to pc relative reloc
4768 against discarded section. Section optimization code should
4769 handle it. */
4770
4771 if (r_symndx < symtab_hdr->sh_info
4772 && sec != NULL && howto->pc_relative
dbaa2011 4773 && discarded_section (sec))
ed4de5e2
JJ
4774 break;
4775
252b5132 4776 if (h != NULL)
dfeffb9f 4777 name = NULL;
252b5132
RH
4778 else
4779 {
4780 name = (bfd_elf_string_from_elf_section
4781 (input_bfd, symtab_hdr->sh_link, sym->st_name));
4782 if (name == NULL)
b34976b6 4783 return FALSE;
252b5132 4784 if (*name == '\0')
fd361982 4785 name = bfd_section_name (sec);
252b5132 4786 }
1a72702b
AM
4787 (*info->callbacks->reloc_overflow)
4788 (info, (h ? &h->root.root : NULL), name, howto->name,
4789 (bfd_vma) 0, input_bfd, input_section, rel->r_offset);
252b5132
RH
4790 }
4791 break;
4792
4793 default:
4794 case bfd_reloc_outofrange:
4795 abort ();
4796 }
4797 }
4798
f16fbd61 4799 return ret_val;
252b5132
RH
4800}
4801
4802/* Finish up dynamic symbol handling. We set the contents of various
4803 dynamic sections here. */
4804
b34976b6 4805static bfd_boolean
a7519a3c
RH
4806elf64_alpha_finish_dynamic_symbol (bfd *output_bfd, struct bfd_link_info *info,
4807 struct elf_link_hash_entry *h,
4808 Elf_Internal_Sym *sym)
252b5132 4809{
6ec7057a 4810 struct alpha_elf_link_hash_entry *ah = (struct alpha_elf_link_hash_entry *)h;
252b5132 4811
6ec7057a 4812 if (h->needs_plt)
252b5132
RH
4813 {
4814 /* Fill in the .plt entry for this symbol. */
4815 asection *splt, *sgot, *srel;
4816 Elf_Internal_Rela outrel;
947216bf 4817 bfd_byte *loc;
252b5132
RH
4818 bfd_vma got_addr, plt_addr;
4819 bfd_vma plt_index;
4820 struct alpha_elf_got_entry *gotent;
4821
4822 BFD_ASSERT (h->dynindx != -1);
4823
ce558b89 4824 splt = elf_hash_table (info)->splt;
252b5132 4825 BFD_ASSERT (splt != NULL);
ce558b89 4826 srel = elf_hash_table (info)->srelplt;
252b5132 4827 BFD_ASSERT (srel != NULL);
252b5132 4828
6ec7057a
RH
4829 for (gotent = ah->got_entries; gotent ; gotent = gotent->next)
4830 if (gotent->reloc_type == R_ALPHA_LITERAL
4831 && gotent->use_count > 0)
4832 {
4833 unsigned int insn;
4834 int disp;
252b5132 4835
6ec7057a
RH
4836 sgot = alpha_elf_tdata (gotent->gotobj)->got;
4837 BFD_ASSERT (sgot != NULL);
252b5132 4838
6ec7057a
RH
4839 BFD_ASSERT (gotent->got_offset != -1);
4840 BFD_ASSERT (gotent->plt_offset != -1);
252b5132 4841
6ec7057a
RH
4842 got_addr = (sgot->output_section->vma
4843 + sgot->output_offset
4844 + gotent->got_offset);
4845 plt_addr = (splt->output_section->vma
4846 + splt->output_offset
4847 + gotent->plt_offset);
252b5132 4848
6ec7057a 4849 plt_index = (gotent->plt_offset-PLT_HEADER_SIZE) / PLT_ENTRY_SIZE;
252b5132 4850
6ec7057a
RH
4851 /* Fill in the entry in the procedure linkage table. */
4852 if (elf64_alpha_use_secureplt)
4853 {
4854 disp = (PLT_HEADER_SIZE - 4) - (gotent->plt_offset + 4);
4855 insn = INSN_AD (INSN_BR, 31, disp);
4856 bfd_put_32 (output_bfd, insn,
4857 splt->contents + gotent->plt_offset);
252b5132 4858
6ec7057a
RH
4859 plt_index = ((gotent->plt_offset - NEW_PLT_HEADER_SIZE)
4860 / NEW_PLT_ENTRY_SIZE);
4861 }
4862 else
4863 {
4864 disp = -(gotent->plt_offset + 4);
4865 insn = INSN_AD (INSN_BR, 28, disp);
4866 bfd_put_32 (output_bfd, insn,
4867 splt->contents + gotent->plt_offset);
4868 bfd_put_32 (output_bfd, INSN_UNOP,
4869 splt->contents + gotent->plt_offset + 4);
4870 bfd_put_32 (output_bfd, INSN_UNOP,
4871 splt->contents + gotent->plt_offset + 8);
4872
4873 plt_index = ((gotent->plt_offset - OLD_PLT_HEADER_SIZE)
4874 / OLD_PLT_ENTRY_SIZE);
4875 }
252b5132 4876
6ec7057a
RH
4877 /* Fill in the entry in the .rela.plt section. */
4878 outrel.r_offset = got_addr;
4879 outrel.r_info = ELF64_R_INFO(h->dynindx, R_ALPHA_JMP_SLOT);
4880 outrel.r_addend = 0;
252b5132 4881
6ec7057a
RH
4882 loc = srel->contents + plt_index * sizeof (Elf64_External_Rela);
4883 bfd_elf64_swap_reloca_out (output_bfd, &outrel, loc);
252b5132 4884
6ec7057a
RH
4885 /* Fill in the entry in the .got. */
4886 bfd_put_64 (output_bfd, plt_addr,
4887 sgot->contents + gotent->got_offset);
4888 }
252b5132
RH
4889 }
4890 else if (alpha_elf_dynamic_symbol_p (h, info))
4891 {
4892 /* Fill in the dynamic relocations for this symbol's .got entries. */
4893 asection *srel;
252b5132
RH
4894 struct alpha_elf_got_entry *gotent;
4895
ce558b89 4896 srel = elf_hash_table (info)->srelgot;
252b5132
RH
4897 BFD_ASSERT (srel != NULL);
4898
252b5132
RH
4899 for (gotent = ((struct alpha_elf_link_hash_entry *) h)->got_entries;
4900 gotent != NULL;
4901 gotent = gotent->next)
4902 {
f44f99a5 4903 asection *sgot;
1bbc9cec 4904 long r_type;
3765b1be 4905
f44f99a5
RH
4906 if (gotent->use_count == 0)
4907 continue;
4908
4909 sgot = alpha_elf_tdata (gotent->gotobj)->got;
3765b1be
RH
4910
4911 r_type = gotent->reloc_type;
4912 switch (r_type)
4913 {
4914 case R_ALPHA_LITERAL:
4915 r_type = R_ALPHA_GLOB_DAT;
4916 break;
4917 case R_ALPHA_TLSGD:
4918 r_type = R_ALPHA_DTPMOD64;
4919 break;
4920 case R_ALPHA_GOTDTPREL:
4921 r_type = R_ALPHA_DTPREL64;
4922 break;
4923 case R_ALPHA_GOTTPREL:
4924 r_type = R_ALPHA_TPREL64;
4925 break;
4926 case R_ALPHA_TLSLDM:
4927 default:
4928 abort ();
4929 }
4930
68ffbac6 4931 elf64_alpha_emit_dynrel (output_bfd, info, sgot, srel,
1bbc9cec
RH
4932 gotent->got_offset, h->dynindx,
4933 r_type, gotent->addend);
3765b1be
RH
4934
4935 if (gotent->reloc_type == R_ALPHA_TLSGD)
68ffbac6 4936 elf64_alpha_emit_dynrel (output_bfd, info, sgot, srel,
1bbc9cec
RH
4937 gotent->got_offset + 8, h->dynindx,
4938 R_ALPHA_DTPREL64, gotent->addend);
252b5132
RH
4939 }
4940 }
4941
4942 /* Mark some specially defined symbols as absolute. */
9637f6ef 4943 if (h == elf_hash_table (info)->hdynamic
22edb2f1
RS
4944 || h == elf_hash_table (info)->hgot
4945 || h == elf_hash_table (info)->hplt)
252b5132
RH
4946 sym->st_shndx = SHN_ABS;
4947
b34976b6 4948 return TRUE;
252b5132
RH
4949}
4950
4951/* Finish up the dynamic sections. */
4952
b34976b6 4953static bfd_boolean
a7519a3c
RH
4954elf64_alpha_finish_dynamic_sections (bfd *output_bfd,
4955 struct bfd_link_info *info)
252b5132
RH
4956{
4957 bfd *dynobj;
4958 asection *sdyn;
4959
4960 dynobj = elf_hash_table (info)->dynobj;
3d4d4302 4961 sdyn = bfd_get_linker_section (dynobj, ".dynamic");
252b5132
RH
4962
4963 if (elf_hash_table (info)->dynamic_sections_created)
4964 {
6ec7057a 4965 asection *splt, *sgotplt, *srelaplt;
252b5132 4966 Elf64_External_Dyn *dyncon, *dynconend;
6ec7057a 4967 bfd_vma plt_vma, gotplt_vma;
252b5132 4968
ce558b89
AM
4969 splt = elf_hash_table (info)->splt;
4970 srelaplt = elf_hash_table (info)->srelplt;
252b5132
RH
4971 BFD_ASSERT (splt != NULL && sdyn != NULL);
4972
6ec7057a
RH
4973 plt_vma = splt->output_section->vma + splt->output_offset;
4974
4975 gotplt_vma = 0;
4976 if (elf64_alpha_use_secureplt)
4977 {
ce558b89 4978 sgotplt = elf_hash_table (info)->sgotplt;
6ec7057a
RH
4979 BFD_ASSERT (sgotplt != NULL);
4980 if (sgotplt->size > 0)
4981 gotplt_vma = sgotplt->output_section->vma + sgotplt->output_offset;
4982 }
4983
252b5132 4984 dyncon = (Elf64_External_Dyn *) sdyn->contents;
eea6121a 4985 dynconend = (Elf64_External_Dyn *) (sdyn->contents + sdyn->size);
252b5132
RH
4986 for (; dyncon < dynconend; dyncon++)
4987 {
4988 Elf_Internal_Dyn dyn;
252b5132
RH
4989
4990 bfd_elf64_swap_dyn_in (dynobj, dyncon, &dyn);
4991
4992 switch (dyn.d_tag)
4993 {
4994 case DT_PLTGOT:
6ec7057a
RH
4995 dyn.d_un.d_ptr
4996 = elf64_alpha_use_secureplt ? gotplt_vma : plt_vma;
4997 break;
252b5132 4998 case DT_PLTRELSZ:
6ec7057a
RH
4999 dyn.d_un.d_val = srelaplt ? srelaplt->size : 0;
5000 break;
252b5132 5001 case DT_JMPREL:
4ade44b7
AM
5002 dyn.d_un.d_ptr = srelaplt ? (srelaplt->output_section->vma
5003 + srelaplt->output_offset) : 0;
6ec7057a 5004 break;
252b5132
RH
5005 }
5006
5007 bfd_elf64_swap_dyn_out (output_bfd, &dyn, dyncon);
5008 }
5009
6ec7057a 5010 /* Initialize the plt header. */
eea6121a 5011 if (splt->size > 0)
252b5132 5012 {
6ec7057a
RH
5013 unsigned int insn;
5014 int ofs;
5015
5016 if (elf64_alpha_use_secureplt)
5017 {
5018 ofs = gotplt_vma - (plt_vma + PLT_HEADER_SIZE);
5019
5020 insn = INSN_ABC (INSN_SUBQ, 27, 28, 25);
5021 bfd_put_32 (output_bfd, insn, splt->contents);
5022
5023 insn = INSN_ABO (INSN_LDAH, 28, 28, (ofs + 0x8000) >> 16);
5024 bfd_put_32 (output_bfd, insn, splt->contents + 4);
5025
5026 insn = INSN_ABC (INSN_S4SUBQ, 25, 25, 25);
5027 bfd_put_32 (output_bfd, insn, splt->contents + 8);
5028
5029 insn = INSN_ABO (INSN_LDA, 28, 28, ofs);
5030 bfd_put_32 (output_bfd, insn, splt->contents + 12);
5031
5032 insn = INSN_ABO (INSN_LDQ, 27, 28, 0);
5033 bfd_put_32 (output_bfd, insn, splt->contents + 16);
5034
5035 insn = INSN_ABC (INSN_ADDQ, 25, 25, 25);
5036 bfd_put_32 (output_bfd, insn, splt->contents + 20);
5037
5038 insn = INSN_ABO (INSN_LDQ, 28, 28, 8);
5039 bfd_put_32 (output_bfd, insn, splt->contents + 24);
5040
5041 insn = INSN_AB (INSN_JMP, 31, 27);
5042 bfd_put_32 (output_bfd, insn, splt->contents + 28);
5043
5044 insn = INSN_AD (INSN_BR, 28, -PLT_HEADER_SIZE);
5045 bfd_put_32 (output_bfd, insn, splt->contents + 32);
5046 }
5047 else
5048 {
5049 insn = INSN_AD (INSN_BR, 27, 0); /* br $27, .+4 */
5050 bfd_put_32 (output_bfd, insn, splt->contents);
5051
5052 insn = INSN_ABO (INSN_LDQ, 27, 27, 12);
5053 bfd_put_32 (output_bfd, insn, splt->contents + 4);
5054
5055 insn = INSN_UNOP;
5056 bfd_put_32 (output_bfd, insn, splt->contents + 8);
5057
5058 insn = INSN_AB (INSN_JMP, 27, 27);
5059 bfd_put_32 (output_bfd, insn, splt->contents + 12);
5060
5061 /* The next two words will be filled in by ld.so. */
5062 bfd_put_64 (output_bfd, 0, splt->contents + 16);
5063 bfd_put_64 (output_bfd, 0, splt->contents + 24);
5064 }
252b5132 5065
eecdbe52 5066 elf_section_data (splt->output_section)->this_hdr.sh_entsize = 0;
252b5132
RH
5067 }
5068 }
5069
b34976b6 5070 return TRUE;
252b5132
RH
5071}
5072
96e2734b
RH
5073/* We need to use a special link routine to handle the .mdebug section.
5074 We need to merge all instances of these sections together, not write
5075 them all out sequentially. */
252b5132 5076
b34976b6 5077static bfd_boolean
a7519a3c 5078elf64_alpha_final_link (bfd *abfd, struct bfd_link_info *info)
252b5132
RH
5079{
5080 asection *o;
5081 struct bfd_link_order *p;
96e2734b 5082 asection *mdebug_sec;
252b5132
RH
5083 struct ecoff_debug_info debug;
5084 const struct ecoff_debug_swap *swap
5085 = get_elf_backend_data (abfd)->elf_backend_ecoff_debug_swap;
5086 HDRR *symhdr = &debug.symbolic_header;
4dfe6ac6
NC
5087 void * mdebug_handle = NULL;
5088 struct alpha_elf_link_hash_table * htab;
5089
5090 htab = alpha_elf_hash_table (info);
5091 if (htab == NULL)
5092 return FALSE;
252b5132 5093
96e2734b 5094 /* Go through the sections and collect the mdebug information. */
252b5132 5095 mdebug_sec = NULL;
252b5132
RH
5096 for (o = abfd->sections; o != (asection *) NULL; o = o->next)
5097 {
252b5132
RH
5098 if (strcmp (o->name, ".mdebug") == 0)
5099 {
5100 struct extsym_info einfo;
5101
5102 /* We have found the .mdebug section in the output file.
5103 Look through all the link_orders comprising it and merge
5104 the information together. */
5105 symhdr->magic = swap->sym_magic;
5106 /* FIXME: What should the version stamp be? */
5107 symhdr->vstamp = 0;
5108 symhdr->ilineMax = 0;
5109 symhdr->cbLine = 0;
5110 symhdr->idnMax = 0;
5111 symhdr->ipdMax = 0;
5112 symhdr->isymMax = 0;
5113 symhdr->ioptMax = 0;
5114 symhdr->iauxMax = 0;
5115 symhdr->issMax = 0;
5116 symhdr->issExtMax = 0;
5117 symhdr->ifdMax = 0;
5118 symhdr->crfd = 0;
5119 symhdr->iextMax = 0;
5120
5121 /* We accumulate the debugging information itself in the
5122 debug_info structure. */
5123 debug.line = NULL;
5124 debug.external_dnr = NULL;
5125 debug.external_pdr = NULL;
5126 debug.external_sym = NULL;
5127 debug.external_opt = NULL;
5128 debug.external_aux = NULL;
5129 debug.ss = NULL;
5130 debug.ssext = debug.ssext_end = NULL;
5131 debug.external_fdr = NULL;
5132 debug.external_rfd = NULL;
5133 debug.external_ext = debug.external_ext_end = NULL;
5134
5135 mdebug_handle = bfd_ecoff_debug_init (abfd, &debug, swap, info);
2c3fc389 5136 if (mdebug_handle == NULL)
b34976b6 5137 return FALSE;
252b5132
RH
5138
5139 if (1)
5140 {
5141 asection *s;
5142 EXTR esym;
52b9d213 5143 bfd_vma last = 0;
252b5132
RH
5144 unsigned int i;
5145 static const char * const name[] =
5146 {
5147 ".text", ".init", ".fini", ".data",
5148 ".rodata", ".sdata", ".sbss", ".bss"
5149 };
5150 static const int sc[] = { scText, scInit, scFini, scData,
5151 scRData, scSData, scSBss, scBss };
5152
5153 esym.jmptbl = 0;
5154 esym.cobol_main = 0;
5155 esym.weakext = 0;
5156 esym.reserved = 0;
5157 esym.ifd = ifdNil;
5158 esym.asym.iss = issNil;
5159 esym.asym.st = stLocal;
5160 esym.asym.reserved = 0;
5161 esym.asym.index = indexNil;
5162 for (i = 0; i < 8; i++)
5163 {
5164 esym.asym.sc = sc[i];
5165 s = bfd_get_section_by_name (abfd, name[i]);
5166 if (s != NULL)
5167 {
5168 esym.asym.value = s->vma;
eea6121a 5169 last = s->vma + s->size;
252b5132
RH
5170 }
5171 else
5172 esym.asym.value = last;
5173
5174 if (! bfd_ecoff_debug_one_external (abfd, &debug, swap,
5175 name[i], &esym))
b34976b6 5176 return FALSE;
252b5132
RH
5177 }
5178 }
5179
8423293d 5180 for (p = o->map_head.link_order;
252b5132
RH
5181 p != (struct bfd_link_order *) NULL;
5182 p = p->next)
5183 {
5184 asection *input_section;
5185 bfd *input_bfd;
5186 const struct ecoff_debug_swap *input_swap;
5187 struct ecoff_debug_info input_debug;
5188 char *eraw_src;
5189 char *eraw_end;
5190
5191 if (p->type != bfd_indirect_link_order)
5192 {
fd96f80f 5193 if (p->type == bfd_data_link_order)
252b5132
RH
5194 continue;
5195 abort ();
5196 }
5197
5198 input_section = p->u.indirect.section;
5199 input_bfd = input_section->owner;
5200
0ffa91dd
NC
5201 if (! is_alpha_elf (input_bfd))
5202 /* I don't know what a non ALPHA ELF bfd would be
5203 doing with a .mdebug section, but I don't really
5204 want to deal with it. */
5205 continue;
252b5132
RH
5206
5207 input_swap = (get_elf_backend_data (input_bfd)
5208 ->elf_backend_ecoff_debug_swap);
5209
eea6121a 5210 BFD_ASSERT (p->size == input_section->size);
252b5132
RH
5211
5212 /* The ECOFF linking code expects that we have already
5213 read in the debugging information and set up an
5214 ecoff_debug_info structure, so we do that now. */
5215 if (!elf64_alpha_read_ecoff_info (input_bfd, input_section,
5216 &input_debug))
b34976b6 5217 return FALSE;
252b5132
RH
5218
5219 if (! (bfd_ecoff_debug_accumulate
5220 (mdebug_handle, abfd, &debug, swap, input_bfd,
5221 &input_debug, input_swap, info)))
b34976b6 5222 return FALSE;
252b5132
RH
5223
5224 /* Loop through the external symbols. For each one with
5225 interesting information, try to find the symbol in
5226 the linker global hash table and save the information
5227 for the output external symbols. */
21d799b5 5228 eraw_src = (char *) input_debug.external_ext;
252b5132
RH
5229 eraw_end = (eraw_src
5230 + (input_debug.symbolic_header.iextMax
5231 * input_swap->external_ext_size));
5232 for (;
5233 eraw_src < eraw_end;
5234 eraw_src += input_swap->external_ext_size)
5235 {
5236 EXTR ext;
5237 const char *name;
5238 struct alpha_elf_link_hash_entry *h;
5239
2c3fc389 5240 (*input_swap->swap_ext_in) (input_bfd, eraw_src, &ext);
252b5132
RH
5241 if (ext.asym.sc == scNil
5242 || ext.asym.sc == scUndefined
5243 || ext.asym.sc == scSUndefined)
5244 continue;
5245
5246 name = input_debug.ssext + ext.asym.iss;
4dfe6ac6 5247 h = alpha_elf_link_hash_lookup (htab, name, FALSE, FALSE, TRUE);
252b5132
RH
5248 if (h == NULL || h->esym.ifd != -2)
5249 continue;
5250
5251 if (ext.ifd != -1)
5252 {
5253 BFD_ASSERT (ext.ifd
5254 < input_debug.symbolic_header.ifdMax);
5255 ext.ifd = input_debug.ifdmap[ext.ifd];
5256 }
5257
5258 h->esym = ext;
5259 }
5260
5261 /* Free up the information we just read. */
5262 free (input_debug.line);
5263 free (input_debug.external_dnr);
5264 free (input_debug.external_pdr);
5265 free (input_debug.external_sym);
5266 free (input_debug.external_opt);
5267 free (input_debug.external_aux);
5268 free (input_debug.ss);
5269 free (input_debug.ssext);
5270 free (input_debug.external_fdr);
5271 free (input_debug.external_rfd);
5272 free (input_debug.external_ext);
5273
5274 /* Hack: reset the SEC_HAS_CONTENTS flag so that
5275 elf_link_input_bfd ignores this section. */
5276 input_section->flags &=~ SEC_HAS_CONTENTS;
5277 }
5278
252b5132
RH
5279 /* Build the external symbol information. */
5280 einfo.abfd = abfd;
5281 einfo.info = info;
5282 einfo.debug = &debug;
5283 einfo.swap = swap;
b34976b6 5284 einfo.failed = FALSE;
252b5132
RH
5285 elf_link_hash_traverse (elf_hash_table (info),
5286 elf64_alpha_output_extsym,
2c3fc389 5287 &einfo);
252b5132 5288 if (einfo.failed)
b34976b6 5289 return FALSE;
252b5132
RH
5290
5291 /* Set the size of the .mdebug section. */
eea6121a 5292 o->size = bfd_ecoff_debug_size (abfd, &debug, swap);
252b5132
RH
5293
5294 /* Skip this section later on (I don't think this currently
5295 matters, but someday it might). */
8423293d 5296 o->map_head.link_order = (struct bfd_link_order *) NULL;
252b5132
RH
5297
5298 mdebug_sec = o;
5299 }
252b5132
RH
5300 }
5301
5302 /* Invoke the regular ELF backend linker to do all the work. */
c152c796 5303 if (! bfd_elf_final_link (abfd, info))
b34976b6 5304 return FALSE;
252b5132
RH
5305
5306 /* Now write out the computed sections. */
5307
5308 /* The .got subsections... */
5309 {
5310 bfd *i, *dynobj = elf_hash_table(info)->dynobj;
4dfe6ac6 5311 for (i = htab->got_list;
252b5132
RH
5312 i != NULL;
5313 i = alpha_elf_tdata(i)->got_link_next)
5314 {
5315 asection *sgot;
5316
5317 /* elf_bfd_final_link already did everything in dynobj. */
5318 if (i == dynobj)
5319 continue;
5320
5321 sgot = alpha_elf_tdata(i)->got;
5322 if (! bfd_set_section_contents (abfd, sgot->output_section,
dc810e39
AM
5323 sgot->contents,
5324 (file_ptr) sgot->output_offset,
eea6121a 5325 sgot->size))
b34976b6 5326 return FALSE;
252b5132
RH
5327 }
5328 }
5329
252b5132
RH
5330 if (mdebug_sec != (asection *) NULL)
5331 {
5332 BFD_ASSERT (abfd->output_has_begun);
5333 if (! bfd_ecoff_write_accumulated_debug (mdebug_handle, abfd, &debug,
5334 swap, info,
5335 mdebug_sec->filepos))
b34976b6 5336 return FALSE;
252b5132
RH
5337
5338 bfd_ecoff_debug_free (mdebug_handle, abfd, &debug, swap, info);
5339 }
5340
b34976b6 5341 return TRUE;
252b5132 5342}
fcfbdf31
JJ
5343
5344static enum elf_reloc_type_class
7e612e98
AM
5345elf64_alpha_reloc_type_class (const struct bfd_link_info *info ATTRIBUTE_UNUSED,
5346 const asection *rel_sec ATTRIBUTE_UNUSED,
5347 const Elf_Internal_Rela *rela)
fcfbdf31 5348{
f51e552e 5349 switch ((int) ELF64_R_TYPE (rela->r_info))
fcfbdf31
JJ
5350 {
5351 case R_ALPHA_RELATIVE:
5352 return reloc_class_relative;
5353 case R_ALPHA_JMP_SLOT:
5354 return reloc_class_plt;
5355 case R_ALPHA_COPY:
5356 return reloc_class_copy;
5357 default:
5358 return reloc_class_normal;
5359 }
5360}
252b5132 5361\f
b35d266b 5362static const struct bfd_elf_special_section elf64_alpha_special_sections[] =
2f89ff8d 5363{
07d6d2b8 5364 { STRING_COMMA_LEN (".sbss"), -2, SHT_NOBITS, SHF_ALLOC + SHF_WRITE + SHF_ALPHA_GPREL },
0112cd26 5365 { STRING_COMMA_LEN (".sdata"), -2, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE + SHF_ALPHA_GPREL },
07d6d2b8 5366 { NULL, 0, 0, 0, 0 }
2f89ff8d
L
5367};
5368
252b5132
RH
5369/* ECOFF swapping routines. These are used when dealing with the
5370 .mdebug section, which is in the ECOFF debugging format. Copied
fe8bc63d 5371 from elf32-mips.c. */
252b5132
RH
5372static const struct ecoff_debug_swap
5373elf64_alpha_ecoff_debug_swap =
5374{
5375 /* Symbol table magic number. */
5376 magicSym2,
5377 /* Alignment of debugging information. E.g., 4. */
5378 8,
5379 /* Sizes of external symbolic information. */
5380 sizeof (struct hdr_ext),
5381 sizeof (struct dnr_ext),
5382 sizeof (struct pdr_ext),
5383 sizeof (struct sym_ext),
5384 sizeof (struct opt_ext),
5385 sizeof (struct fdr_ext),
5386 sizeof (struct rfd_ext),
5387 sizeof (struct ext_ext),
5388 /* Functions to swap in external symbolic data. */
5389 ecoff_swap_hdr_in,
5390 ecoff_swap_dnr_in,
5391 ecoff_swap_pdr_in,
5392 ecoff_swap_sym_in,
5393 ecoff_swap_opt_in,
5394 ecoff_swap_fdr_in,
5395 ecoff_swap_rfd_in,
5396 ecoff_swap_ext_in,
5397 _bfd_ecoff_swap_tir_in,
5398 _bfd_ecoff_swap_rndx_in,
5399 /* Functions to swap out external symbolic data. */
5400 ecoff_swap_hdr_out,
5401 ecoff_swap_dnr_out,
5402 ecoff_swap_pdr_out,
5403 ecoff_swap_sym_out,
5404 ecoff_swap_opt_out,
5405 ecoff_swap_fdr_out,
5406 ecoff_swap_rfd_out,
5407 ecoff_swap_ext_out,
5408 _bfd_ecoff_swap_tir_out,
5409 _bfd_ecoff_swap_rndx_out,
5410 /* Function to read in symbolic data. */
5411 elf64_alpha_read_ecoff_info
5412};
5413\f
70bcb145
JW
5414/* Use a non-standard hash bucket size of 8. */
5415
562ace6b 5416static const struct elf_size_info alpha_elf_size_info =
70bcb145
JW
5417{
5418 sizeof (Elf64_External_Ehdr),
5419 sizeof (Elf64_External_Phdr),
5420 sizeof (Elf64_External_Shdr),
5421 sizeof (Elf64_External_Rel),
5422 sizeof (Elf64_External_Rela),
5423 sizeof (Elf64_External_Sym),
5424 sizeof (Elf64_External_Dyn),
5425 sizeof (Elf_External_Note),
5426 8,
5427 1,
45d6a902 5428 64, 3,
70bcb145
JW
5429 ELFCLASS64, EV_CURRENT,
5430 bfd_elf64_write_out_phdrs,
5431 bfd_elf64_write_shdrs_and_ehdr,
1489a3a0 5432 bfd_elf64_checksum_contents,
70bcb145 5433 bfd_elf64_write_relocs,
73ff0d56 5434 bfd_elf64_swap_symbol_in,
70bcb145
JW
5435 bfd_elf64_swap_symbol_out,
5436 bfd_elf64_slurp_reloc_table,
5437 bfd_elf64_slurp_symbol_table,
5438 bfd_elf64_swap_dyn_in,
5439 bfd_elf64_swap_dyn_out,
947216bf
AM
5440 bfd_elf64_swap_reloc_in,
5441 bfd_elf64_swap_reloc_out,
5442 bfd_elf64_swap_reloca_in,
5443 bfd_elf64_swap_reloca_out
70bcb145
JW
5444};
5445
6d00b590 5446#define TARGET_LITTLE_SYM alpha_elf64_vec
252b5132
RH
5447#define TARGET_LITTLE_NAME "elf64-alpha"
5448#define ELF_ARCH bfd_arch_alpha
ae95ffa6 5449#define ELF_TARGET_ID ALPHA_ELF_DATA
56fc028e
AJ
5450#define ELF_MACHINE_CODE EM_ALPHA
5451#define ELF_MAXPAGESIZE 0x10000
24718e3b 5452#define ELF_COMMONPAGESIZE 0x2000
252b5132
RH
5453
5454#define bfd_elf64_bfd_link_hash_table_create \
5455 elf64_alpha_bfd_link_hash_table_create
5456
5457#define bfd_elf64_bfd_reloc_type_lookup \
5458 elf64_alpha_bfd_reloc_type_lookup
157090f7
AM
5459#define bfd_elf64_bfd_reloc_name_lookup \
5460 elf64_alpha_bfd_reloc_name_lookup
252b5132
RH
5461#define elf_info_to_howto \
5462 elf64_alpha_info_to_howto
5463
5464#define bfd_elf64_mkobject \
5465 elf64_alpha_mkobject
5466#define elf_backend_object_p \
5467 elf64_alpha_object_p
5468
5469#define elf_backend_section_from_shdr \
5470 elf64_alpha_section_from_shdr
204692d7
RH
5471#define elf_backend_section_flags \
5472 elf64_alpha_section_flags
252b5132
RH
5473#define elf_backend_fake_sections \
5474 elf64_alpha_fake_sections
5475
5476#define bfd_elf64_bfd_is_local_label_name \
5477 elf64_alpha_is_local_label_name
5478#define bfd_elf64_find_nearest_line \
5479 elf64_alpha_find_nearest_line
5480#define bfd_elf64_bfd_relax_section \
5481 elf64_alpha_relax_section
5482
5483#define elf_backend_add_symbol_hook \
5484 elf64_alpha_add_symbol_hook
13285a1b
AM
5485#define elf_backend_relocs_compatible \
5486 _bfd_elf_relocs_compatible
6fc5bb57
AM
5487#define elf_backend_sort_relocs_p \
5488 elf64_alpha_sort_relocs_p
252b5132
RH
5489#define elf_backend_check_relocs \
5490 elf64_alpha_check_relocs
5491#define elf_backend_create_dynamic_sections \
5492 elf64_alpha_create_dynamic_sections
5493#define elf_backend_adjust_dynamic_symbol \
5494 elf64_alpha_adjust_dynamic_symbol
747ffa7b
AM
5495#define elf_backend_merge_symbol_attribute \
5496 elf64_alpha_merge_symbol_attribute
48f4b4f5
RH
5497#define elf_backend_copy_indirect_symbol \
5498 elf64_alpha_copy_indirect_symbol
252b5132
RH
5499#define elf_backend_always_size_sections \
5500 elf64_alpha_always_size_sections
5501#define elf_backend_size_dynamic_sections \
5502 elf64_alpha_size_dynamic_sections
74541ad4 5503#define elf_backend_omit_section_dynsym \
d00dd7dc 5504 _bfd_elf_omit_section_dynsym_all
252b5132
RH
5505#define elf_backend_relocate_section \
5506 elf64_alpha_relocate_section
5507#define elf_backend_finish_dynamic_symbol \
5508 elf64_alpha_finish_dynamic_symbol
5509#define elf_backend_finish_dynamic_sections \
5510 elf64_alpha_finish_dynamic_sections
5511#define bfd_elf64_bfd_final_link \
5512 elf64_alpha_final_link
fcfbdf31
JJ
5513#define elf_backend_reloc_type_class \
5514 elf64_alpha_reloc_type_class
252b5132 5515
e117360e
RH
5516#define elf_backend_can_gc_sections 1
5517#define elf_backend_gc_mark_hook elf64_alpha_gc_mark_hook
e117360e 5518
252b5132
RH
5519#define elf_backend_ecoff_debug_swap \
5520 &elf64_alpha_ecoff_debug_swap
5521
70bcb145
JW
5522#define elf_backend_size_info \
5523 alpha_elf_size_info
5524
29ef7005
L
5525#define elf_backend_special_sections \
5526 elf64_alpha_special_sections
2f89ff8d 5527
38b1a46c 5528/* A few constants that determine how the .plt section is set up. */
252b5132
RH
5529#define elf_backend_want_got_plt 0
5530#define elf_backend_plt_readonly 0
5531#define elf_backend_want_plt_sym 1
5532#define elf_backend_got_header_size 0
64f52338 5533#define elf_backend_dtrel_excludes_plt 1
252b5132
RH
5534
5535#include "elf64-target.h"
2238051f
RH
5536\f
5537/* FreeBSD support. */
5538
5539#undef TARGET_LITTLE_SYM
6d00b590 5540#define TARGET_LITTLE_SYM alpha_elf64_fbsd_vec
2238051f
RH
5541#undef TARGET_LITTLE_NAME
5542#define TARGET_LITTLE_NAME "elf64-alpha-freebsd"
d1036acb
L
5543#undef ELF_OSABI
5544#define ELF_OSABI ELFOSABI_FREEBSD
2238051f
RH
5545
5546/* The kernel recognizes executables as valid only if they carry a
5547 "FreeBSD" label in the ELF header. So we put this label on all
5548 executables and (for simplicity) also all other object files. */
5549
ed7e9d0b
AM
5550static bfd_boolean
5551elf64_alpha_fbsd_init_file_header (bfd *abfd, struct bfd_link_info *info)
2238051f
RH
5552{
5553 Elf_Internal_Ehdr * i_ehdrp; /* ELF file header, internal form. */
5554
ed7e9d0b
AM
5555 if (!_bfd_elf_init_file_header (abfd, info))
5556 return FALSE;
5557
2238051f
RH
5558 i_ehdrp = elf_elfheader (abfd);
5559
5560 /* Put an ABI label supported by FreeBSD >= 4.1. */
d1036acb 5561 i_ehdrp->e_ident[EI_OSABI] = get_elf_backend_data (abfd)->elf_osabi;
2238051f
RH
5562#ifdef OLD_FREEBSD_ABI_LABEL
5563 /* The ABI label supported by FreeBSD <= 4.0 is quite nonstandard. */
5564 memcpy (&i_ehdrp->e_ident[EI_ABIVERSION], "FreeBSD", 8);
5565#endif
ed7e9d0b 5566 return TRUE;
2238051f
RH
5567}
5568
ed7e9d0b
AM
5569#undef elf_backend_init_file_header
5570#define elf_backend_init_file_header \
5571 elf64_alpha_fbsd_init_file_header
2238051f 5572
571fe01f 5573#undef elf64_bed
2238051f
RH
5574#define elf64_bed elf64_alpha_fbsd_bed
5575
5576#include "elf64-target.h"
This page took 1.470929 seconds and 4 git commands to generate.