]> git.ipfire.org Git - thirdparty/binutils-gdb.git/blame - bfd/elf64-alpha.c
Fix erroroneous use of '%zu' in elfcore_grok_win32pstatus
[thirdparty/binutils-gdb.git] / bfd / elf64-alpha.c
CommitLineData
252b5132 1/* Alpha specific support for 64-bit ELF
b3adc24a 2 Copyright (C) 1996-2020 Free Software Foundation, Inc.
252b5132
RH
3 Contributed by Richard Henderson <rth@tamu.edu>.
4
571fe01f 5 This file is part of BFD, the Binary File Descriptor library.
252b5132 6
571fe01f
NC
7 This program is free software; you can redistribute it and/or modify
8 it under the terms of the GNU General Public License as published by
cd123cb7 9 the Free Software Foundation; either version 3 of the License, or
571fe01f 10 (at your option) any later version.
252b5132 11
571fe01f
NC
12 This program is distributed in the hope that it will be useful,
13 but WITHOUT ANY WARRANTY; without even the implied warranty of
14 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 GNU General Public License for more details.
252b5132 16
571fe01f
NC
17 You should have received a copy of the GNU General Public License
18 along with this program; if not, write to the Free Software
cd123cb7
NC
19 Foundation, Inc., 51 Franklin Street - Fifth Floor, Boston,
20 MA 02110-1301, USA. */
21
252b5132
RH
22
23/* We need a published ABI spec for this. Until one comes out, don't
24 assume this'll remain unchanged forever. */
25
252b5132 26#include "sysdep.h"
3db64b00 27#include "bfd.h"
252b5132
RH
28#include "libbfd.h"
29#include "elf-bfd.h"
0ba9378a 30#include "ecoff-bfd.h"
252b5132
RH
31
32#include "elf/alpha.h"
33
34#define ALPHAECOFF
35
36#define NO_COFF_RELOCS
37#define NO_COFF_SYMBOLS
38#define NO_COFF_LINENOS
39
fe8bc63d 40/* Get the ECOFF swapping routines. Needed for the debug information. */
252b5132
RH
41#include "coff/internal.h"
42#include "coff/sym.h"
43#include "coff/symconst.h"
44#include "coff/ecoff.h"
45#include "coff/alpha.h"
46#include "aout/ar.h"
47#include "libcoff.h"
48#include "libecoff.h"
49#define ECOFF_64
50#include "ecoffswap.h"
51
6ec7057a
RH
52\f
53/* Instruction data for plt generation and relaxation. */
54
55#define OP_LDA 0x08
56#define OP_LDAH 0x09
57#define OP_LDQ 0x29
58#define OP_BR 0x30
59#define OP_BSR 0x34
60
61#define INSN_LDA (OP_LDA << 26)
62#define INSN_LDAH (OP_LDAH << 26)
63#define INSN_LDQ (OP_LDQ << 26)
64#define INSN_BR (OP_BR << 26)
65
66#define INSN_ADDQ 0x40000400
67#define INSN_RDUNIQ 0x0000009e
68#define INSN_SUBQ 0x40000520
69#define INSN_S4SUBQ 0x40000560
70#define INSN_UNOP 0x2ffe0000
71
72#define INSN_JSR 0x68004000
73#define INSN_JMP 0x68000000
74#define INSN_JSR_MASK 0xfc00c000
75
76#define INSN_A(I,A) (I | (A << 21))
77#define INSN_AB(I,A,B) (I | (A << 21) | (B << 16))
78#define INSN_ABC(I,A,B,C) (I | (A << 21) | (B << 16) | C)
79#define INSN_ABO(I,A,B,O) (I | (A << 21) | (B << 16) | ((O) & 0xffff))
80#define INSN_AD(I,A,D) (I | (A << 21) | (((D) >> 2) & 0x1fffff))
81
82/* PLT/GOT Stuff */
83
84/* Set by ld emulation. Putting this into the link_info or hash structure
85 is simply working too hard. */
86#ifdef USE_SECUREPLT
87bfd_boolean elf64_alpha_use_secureplt = TRUE;
88#else
89bfd_boolean elf64_alpha_use_secureplt = FALSE;
90#endif
91
92#define OLD_PLT_HEADER_SIZE 32
93#define OLD_PLT_ENTRY_SIZE 12
94#define NEW_PLT_HEADER_SIZE 36
95#define NEW_PLT_ENTRY_SIZE 4
96
97#define PLT_HEADER_SIZE \
98 (elf64_alpha_use_secureplt ? NEW_PLT_HEADER_SIZE : OLD_PLT_HEADER_SIZE)
99#define PLT_ENTRY_SIZE \
100 (elf64_alpha_use_secureplt ? NEW_PLT_ENTRY_SIZE : OLD_PLT_ENTRY_SIZE)
101
102#define MAX_GOT_SIZE (64*1024)
103
104#define ELF_DYNAMIC_INTERPRETER "/usr/lib/ld.so"
252b5132 105\f
21d799b5
NC
106
107/* Used to implement multiple .got subsections. */
108struct alpha_elf_got_entry
109{
110 struct alpha_elf_got_entry *next;
111
112 /* Which .got subsection? */
113 bfd *gotobj;
114
115 /* The addend in effect for this entry. */
116 bfd_vma addend;
117
118 /* The .got offset for this entry. */
119 int got_offset;
120
121 /* The .plt offset for this entry. */
122 int plt_offset;
123
124 /* How many references to this entry? */
125 int use_count;
126
127 /* The relocation type of this entry. */
128 unsigned char reloc_type;
129
130 /* How a LITERAL is used. */
131 unsigned char flags;
132
133 /* Have we initialized the dynamic relocation for this entry? */
134 unsigned char reloc_done;
135
136 /* Have we adjusted this entry for SEC_MERGE? */
137 unsigned char reloc_xlated;
138};
139
140struct alpha_elf_reloc_entry
141{
142 struct alpha_elf_reloc_entry *next;
143
144 /* Which .reloc section? */
145 asection *srel;
146
1f7f2abb
L
147 /* Which section this relocation is against? */
148 asection *sec;
21d799b5
NC
149
150 /* How many did we find? */
151 unsigned long count;
1f7f2abb
L
152
153 /* What kind of relocation? */
154 unsigned int rtype;
21d799b5
NC
155};
156
252b5132
RH
157struct alpha_elf_link_hash_entry
158{
159 struct elf_link_hash_entry root;
160
161 /* External symbol information. */
162 EXTR esym;
163
164 /* Cumulative flags for all the .got entries. */
165 int flags;
166
9e756d64 167 /* Contexts in which a literal was referenced. */
8288a39e
RH
168#define ALPHA_ELF_LINK_HASH_LU_ADDR 0x01
169#define ALPHA_ELF_LINK_HASH_LU_MEM 0x02
170#define ALPHA_ELF_LINK_HASH_LU_BYTE 0x04
171#define ALPHA_ELF_LINK_HASH_LU_JSR 0x08
172#define ALPHA_ELF_LINK_HASH_LU_TLSGD 0x10
173#define ALPHA_ELF_LINK_HASH_LU_TLSLDM 0x20
174#define ALPHA_ELF_LINK_HASH_LU_JSRDIRECT 0x40
175#define ALPHA_ELF_LINK_HASH_LU_PLT 0x38
176#define ALPHA_ELF_LINK_HASH_TLS_IE 0x80
cc03ec80 177
252b5132 178 /* Used to implement multiple .got subsections. */
21d799b5 179 struct alpha_elf_got_entry *got_entries;
252b5132 180
571fe01f 181 /* Used to count non-got, non-plt relocations for delayed sizing
252b5132 182 of relocation sections. */
21d799b5 183 struct alpha_elf_reloc_entry *reloc_entries;
252b5132
RH
184};
185
186/* Alpha ELF linker hash table. */
187
188struct alpha_elf_link_hash_table
189{
190 struct elf_link_hash_table root;
191
192 /* The head of a list of .got subsections linked through
193 alpha_elf_tdata(abfd)->got_link_next. */
194 bfd *got_list;
4a828aab
RH
195
196 /* The most recent relax pass that we've seen. The GOTs
197 should be regenerated if this doesn't match. */
198 int relax_trip;
252b5132
RH
199};
200
201/* Look up an entry in a Alpha ELF linker hash table. */
202
203#define alpha_elf_link_hash_lookup(table, string, create, copy, follow) \
204 ((struct alpha_elf_link_hash_entry *) \
205 elf_link_hash_lookup (&(table)->root, (string), (create), \
206 (copy), (follow)))
207
208/* Traverse a Alpha ELF linker hash table. */
209
210#define alpha_elf_link_hash_traverse(table, func, info) \
211 (elf_link_hash_traverse \
212 (&(table)->root, \
2c3fc389 213 (bfd_boolean (*) (struct elf_link_hash_entry *, void *)) (func), \
252b5132
RH
214 (info)))
215
216/* Get the Alpha ELF linker hash table from a link_info structure. */
217
218#define alpha_elf_hash_table(p) \
4dfe6ac6
NC
219 (elf_hash_table_id ((struct elf_link_hash_table *) ((p)->hash)) \
220 == ALPHA_ELF_DATA ? ((struct alpha_elf_link_hash_table *) ((p)->hash)) : NULL)
252b5132
RH
221
222/* Get the object's symbols as our own entry type. */
223
224#define alpha_elf_sym_hashes(abfd) \
225 ((struct alpha_elf_link_hash_entry **)elf_sym_hashes(abfd))
226
68ffbac6 227/* Should we do dynamic things to this symbol? This differs from the
986a241f
RH
228 generic version in that we never need to consider function pointer
229 equality wrt PLT entries -- we don't create a PLT entry if a symbol's
230 address is ever taken. */
252b5132 231
986a241f 232static inline bfd_boolean
a7519a3c
RH
233alpha_elf_dynamic_symbol_p (struct elf_link_hash_entry *h,
234 struct bfd_link_info *info)
8fb35fed 235{
986a241f 236 return _bfd_elf_dynamic_symbol_p (h, info, 0);
8fb35fed 237}
252b5132
RH
238
239/* Create an entry in a Alpha ELF linker hash table. */
240
241static struct bfd_hash_entry *
a7519a3c
RH
242elf64_alpha_link_hash_newfunc (struct bfd_hash_entry *entry,
243 struct bfd_hash_table *table,
244 const char *string)
252b5132
RH
245{
246 struct alpha_elf_link_hash_entry *ret =
247 (struct alpha_elf_link_hash_entry *) entry;
248
249 /* Allocate the structure if it has not already been allocated by a
250 subclass. */
251 if (ret == (struct alpha_elf_link_hash_entry *) NULL)
252 ret = ((struct alpha_elf_link_hash_entry *)
253 bfd_hash_allocate (table,
254 sizeof (struct alpha_elf_link_hash_entry)));
255 if (ret == (struct alpha_elf_link_hash_entry *) NULL)
256 return (struct bfd_hash_entry *) ret;
257
258 /* Call the allocation method of the superclass. */
259 ret = ((struct alpha_elf_link_hash_entry *)
260 _bfd_elf_link_hash_newfunc ((struct bfd_hash_entry *) ret,
261 table, string));
262 if (ret != (struct alpha_elf_link_hash_entry *) NULL)
263 {
264 /* Set local fields. */
265 memset (&ret->esym, 0, sizeof (EXTR));
266 /* We use -2 as a marker to indicate that the information has
267 not been set. -1 means there is no associated ifd. */
268 ret->esym.ifd = -2;
269 ret->flags = 0;
270 ret->got_entries = NULL;
271 ret->reloc_entries = NULL;
272 }
273
274 return (struct bfd_hash_entry *) ret;
275}
276
277/* Create a Alpha ELF linker hash table. */
278
279static struct bfd_link_hash_table *
a7519a3c 280elf64_alpha_bfd_link_hash_table_create (bfd *abfd)
252b5132
RH
281{
282 struct alpha_elf_link_hash_table *ret;
986f0783 283 size_t amt = sizeof (struct alpha_elf_link_hash_table);
252b5132 284
e2d34d7d 285 ret = (struct alpha_elf_link_hash_table *) bfd_zmalloc (amt);
252b5132
RH
286 if (ret == (struct alpha_elf_link_hash_table *) NULL)
287 return NULL;
288
66eb6687
AM
289 if (!_bfd_elf_link_hash_table_init (&ret->root, abfd,
290 elf64_alpha_link_hash_newfunc,
4dfe6ac6
NC
291 sizeof (struct alpha_elf_link_hash_entry),
292 ALPHA_ELF_DATA))
252b5132 293 {
e2d34d7d 294 free (ret);
252b5132
RH
295 return NULL;
296 }
297
298 return &ret->root.root;
299}
300\f
698600e4
AM
301/* Alpha ELF follows MIPS ELF in using a special find_nearest_line
302 routine in order to handle the ECOFF debugging information. */
303
304struct alpha_elf_find_line
305{
306 struct ecoff_debug_info d;
307 struct ecoff_find_line i;
308};
309
252b5132
RH
310/* We have some private fields hanging off of the elf_tdata structure. */
311
312struct alpha_elf_obj_tdata
313{
314 struct elf_obj_tdata root;
315
316 /* For every input file, these are the got entries for that object's
317 local symbols. */
318 struct alpha_elf_got_entry ** local_got_entries;
319
320 /* For every input file, this is the object that owns the got that
321 this input file uses. */
322 bfd *gotobj;
323
324 /* For every got, this is a linked list through the objects using this got */
325 bfd *in_got_link_next;
326
327 /* For every got, this is a link to the next got subsegment. */
328 bfd *got_link_next;
329
330 /* For every got, this is the section. */
331 asection *got;
332
3765b1be
RH
333 /* For every got, this is it's total number of words. */
334 int total_got_size;
252b5132 335
3765b1be 336 /* For every got, this is the sum of the number of words required
252b5132 337 to hold all of the member object's local got. */
3765b1be 338 int local_got_size;
698600e4
AM
339
340 /* Used by elf64_alpha_find_nearest_line entry point. */
341 struct alpha_elf_find_line *find_line_info;
342
252b5132
RH
343};
344
345#define alpha_elf_tdata(abfd) \
346 ((struct alpha_elf_obj_tdata *) (abfd)->tdata.any)
347
0ffa91dd
NC
348#define is_alpha_elf(bfd) \
349 (bfd_get_flavour (bfd) == bfd_target_elf_flavour \
350 && elf_tdata (bfd) != NULL \
4dfe6ac6 351 && elf_object_id (bfd) == ALPHA_ELF_DATA)
0ffa91dd 352
b34976b6 353static bfd_boolean
a7519a3c 354elf64_alpha_mkobject (bfd *abfd)
252b5132 355{
0ffa91dd 356 return bfd_elf_allocate_object (abfd, sizeof (struct alpha_elf_obj_tdata),
4dfe6ac6 357 ALPHA_ELF_DATA);
252b5132
RH
358}
359
b34976b6 360static bfd_boolean
a7519a3c 361elf64_alpha_object_p (bfd *abfd)
252b5132 362{
252b5132
RH
363 /* Set the right machine number for an Alpha ELF file. */
364 return bfd_default_set_arch_mach (abfd, bfd_arch_alpha, 0);
365}
366\f
a7519a3c
RH
367/* A relocation function which doesn't do anything. */
368
369static bfd_reloc_status_type
370elf64_alpha_reloc_nil (bfd *abfd ATTRIBUTE_UNUSED, arelent *reloc,
371 asymbol *sym ATTRIBUTE_UNUSED,
2c3fc389 372 void * data ATTRIBUTE_UNUSED, asection *sec,
a7519a3c
RH
373 bfd *output_bfd, char **error_message ATTRIBUTE_UNUSED)
374{
375 if (output_bfd)
376 reloc->address += sec->output_offset;
377 return bfd_reloc_ok;
378}
379
380/* A relocation function used for an unsupported reloc. */
381
382static bfd_reloc_status_type
383elf64_alpha_reloc_bad (bfd *abfd ATTRIBUTE_UNUSED, arelent *reloc,
384 asymbol *sym ATTRIBUTE_UNUSED,
2c3fc389 385 void * data ATTRIBUTE_UNUSED, asection *sec,
a7519a3c
RH
386 bfd *output_bfd, char **error_message ATTRIBUTE_UNUSED)
387{
388 if (output_bfd)
389 reloc->address += sec->output_offset;
390 return bfd_reloc_notsupported;
391}
392
393/* Do the work of the GPDISP relocation. */
394
395static bfd_reloc_status_type
396elf64_alpha_do_reloc_gpdisp (bfd *abfd, bfd_vma gpdisp, bfd_byte *p_ldah,
397 bfd_byte *p_lda)
398{
399 bfd_reloc_status_type ret = bfd_reloc_ok;
400 bfd_vma addend;
401 unsigned long i_ldah, i_lda;
402
403 i_ldah = bfd_get_32 (abfd, p_ldah);
404 i_lda = bfd_get_32 (abfd, p_lda);
405
406 /* Complain if the instructions are not correct. */
407 if (((i_ldah >> 26) & 0x3f) != 0x09
408 || ((i_lda >> 26) & 0x3f) != 0x08)
409 ret = bfd_reloc_dangerous;
410
411 /* Extract the user-supplied offset, mirroring the sign extensions
412 that the instructions perform. */
413 addend = ((i_ldah & 0xffff) << 16) | (i_lda & 0xffff);
414 addend = (addend ^ 0x80008000) - 0x80008000;
415
416 gpdisp += addend;
417
418 if ((bfd_signed_vma) gpdisp < -(bfd_signed_vma) 0x80000000
419 || (bfd_signed_vma) gpdisp >= (bfd_signed_vma) 0x7fff8000)
420 ret = bfd_reloc_overflow;
421
422 /* compensate for the sign extension again. */
423 i_ldah = ((i_ldah & 0xffff0000)
424 | (((gpdisp >> 16) + ((gpdisp >> 15) & 1)) & 0xffff));
425 i_lda = (i_lda & 0xffff0000) | (gpdisp & 0xffff);
426
427 bfd_put_32 (abfd, (bfd_vma) i_ldah, p_ldah);
428 bfd_put_32 (abfd, (bfd_vma) i_lda, p_lda);
429
430 return ret;
431}
432
433/* The special function for the GPDISP reloc. */
434
435static bfd_reloc_status_type
436elf64_alpha_reloc_gpdisp (bfd *abfd, arelent *reloc_entry,
2c3fc389 437 asymbol *sym ATTRIBUTE_UNUSED, void * data,
a7519a3c
RH
438 asection *input_section, bfd *output_bfd,
439 char **err_msg)
440{
441 bfd_reloc_status_type ret;
442 bfd_vma gp, relocation;
443 bfd_vma high_address;
444 bfd_byte *p_ldah, *p_lda;
445
446 /* Don't do anything if we're not doing a final link. */
447 if (output_bfd)
448 {
449 reloc_entry->address += input_section->output_offset;
450 return bfd_reloc_ok;
451 }
452
453 high_address = bfd_get_section_limit (abfd, input_section);
454 if (reloc_entry->address > high_address
455 || reloc_entry->address + reloc_entry->addend > high_address)
456 return bfd_reloc_outofrange;
457
458 /* The gp used in the portion of the output object to which this
459 input object belongs is cached on the input bfd. */
460 gp = _bfd_get_gp_value (abfd);
461
462 relocation = (input_section->output_section->vma
463 + input_section->output_offset
464 + reloc_entry->address);
465
466 p_ldah = (bfd_byte *) data + reloc_entry->address;
467 p_lda = p_ldah + reloc_entry->addend;
468
469 ret = elf64_alpha_do_reloc_gpdisp (abfd, gp - relocation, p_ldah, p_lda);
470
471 /* Complain if the instructions are not correct. */
472 if (ret == bfd_reloc_dangerous)
473 *err_msg = _("GPDISP relocation did not find ldah and lda instructions");
474
475 return ret;
476}
477
252b5132
RH
478/* In case we're on a 32-bit machine, construct a 64-bit "-1" value
479 from smaller values. Start with zero, widen, *then* decrement. */
480#define MINUS_ONE (((bfd_vma)0) - 1)
481
21d799b5 482
dfe57ca0 483#define SKIP_HOWTO(N) \
21d799b5 484 HOWTO(N, 0, 0, 0, 0, 0, complain_overflow_dont, elf64_alpha_reloc_bad, 0, 0, 0, 0, 0)
dfe57ca0 485
252b5132
RH
486static reloc_howto_type elf64_alpha_howto_table[] =
487{
488 HOWTO (R_ALPHA_NONE, /* type */
489 0, /* rightshift */
6346d5ca
AM
490 3, /* size (0 = byte, 1 = short, 2 = long) */
491 0, /* bitsize */
b34976b6 492 TRUE, /* pc_relative */
252b5132
RH
493 0, /* bitpos */
494 complain_overflow_dont, /* complain_on_overflow */
495 elf64_alpha_reloc_nil, /* special_function */
496 "NONE", /* name */
b34976b6 497 FALSE, /* partial_inplace */
252b5132
RH
498 0, /* src_mask */
499 0, /* dst_mask */
b34976b6 500 TRUE), /* pcrel_offset */
252b5132
RH
501
502 /* A 32 bit reference to a symbol. */
503 HOWTO (R_ALPHA_REFLONG, /* type */
504 0, /* rightshift */
505 2, /* size (0 = byte, 1 = short, 2 = long) */
506 32, /* bitsize */
b34976b6 507 FALSE, /* pc_relative */
252b5132
RH
508 0, /* bitpos */
509 complain_overflow_bitfield, /* complain_on_overflow */
bc1bc43f 510 bfd_elf_generic_reloc, /* special_function */
252b5132 511 "REFLONG", /* name */
b34976b6 512 FALSE, /* partial_inplace */
252b5132
RH
513 0xffffffff, /* src_mask */
514 0xffffffff, /* dst_mask */
b34976b6 515 FALSE), /* pcrel_offset */
252b5132
RH
516
517 /* A 64 bit reference to a symbol. */
518 HOWTO (R_ALPHA_REFQUAD, /* type */
519 0, /* rightshift */
520 4, /* size (0 = byte, 1 = short, 2 = long) */
521 64, /* bitsize */
b34976b6 522 FALSE, /* pc_relative */
252b5132
RH
523 0, /* bitpos */
524 complain_overflow_bitfield, /* complain_on_overflow */
bc1bc43f 525 bfd_elf_generic_reloc, /* special_function */
252b5132 526 "REFQUAD", /* name */
b34976b6 527 FALSE, /* partial_inplace */
252b5132
RH
528 MINUS_ONE, /* src_mask */
529 MINUS_ONE, /* dst_mask */
b34976b6 530 FALSE), /* pcrel_offset */
252b5132
RH
531
532 /* A 32 bit GP relative offset. This is just like REFLONG except
533 that when the value is used the value of the gp register will be
534 added in. */
535 HOWTO (R_ALPHA_GPREL32, /* type */
536 0, /* rightshift */
537 2, /* size (0 = byte, 1 = short, 2 = long) */
538 32, /* bitsize */
b34976b6 539 FALSE, /* pc_relative */
252b5132
RH
540 0, /* bitpos */
541 complain_overflow_bitfield, /* complain_on_overflow */
bc1bc43f 542 bfd_elf_generic_reloc, /* special_function */
252b5132 543 "GPREL32", /* name */
b34976b6 544 FALSE, /* partial_inplace */
252b5132
RH
545 0xffffffff, /* src_mask */
546 0xffffffff, /* dst_mask */
b34976b6 547 FALSE), /* pcrel_offset */
252b5132
RH
548
549 /* Used for an instruction that refers to memory off the GP register. */
550 HOWTO (R_ALPHA_LITERAL, /* type */
551 0, /* rightshift */
dfe57ca0 552 1, /* size (0 = byte, 1 = short, 2 = long) */
252b5132 553 16, /* bitsize */
b34976b6 554 FALSE, /* pc_relative */
252b5132
RH
555 0, /* bitpos */
556 complain_overflow_signed, /* complain_on_overflow */
bc1bc43f 557 bfd_elf_generic_reloc, /* special_function */
252b5132 558 "ELF_LITERAL", /* name */
b34976b6 559 FALSE, /* partial_inplace */
252b5132
RH
560 0xffff, /* src_mask */
561 0xffff, /* dst_mask */
b34976b6 562 FALSE), /* pcrel_offset */
252b5132
RH
563
564 /* This reloc only appears immediately following an ELF_LITERAL reloc.
565 It identifies a use of the literal. The symbol index is special:
566 1 means the literal address is in the base register of a memory
567 format instruction; 2 means the literal address is in the byte
568 offset register of a byte-manipulation instruction; 3 means the
569 literal address is in the target register of a jsr instruction.
570 This does not actually do any relocation. */
571 HOWTO (R_ALPHA_LITUSE, /* type */
572 0, /* rightshift */
dfe57ca0 573 1, /* size (0 = byte, 1 = short, 2 = long) */
252b5132 574 32, /* bitsize */
b34976b6 575 FALSE, /* pc_relative */
252b5132
RH
576 0, /* bitpos */
577 complain_overflow_dont, /* complain_on_overflow */
578 elf64_alpha_reloc_nil, /* special_function */
579 "LITUSE", /* name */
b34976b6 580 FALSE, /* partial_inplace */
252b5132
RH
581 0, /* src_mask */
582 0, /* dst_mask */
b34976b6 583 FALSE), /* pcrel_offset */
252b5132
RH
584
585 /* Load the gp register. This is always used for a ldah instruction
586 which loads the upper 16 bits of the gp register. The symbol
587 index of the GPDISP instruction is an offset in bytes to the lda
588 instruction that loads the lower 16 bits. The value to use for
589 the relocation is the difference between the GP value and the
590 current location; the load will always be done against a register
591 holding the current address.
592
593 NOTE: Unlike ECOFF, partial in-place relocation is not done. If
594 any offset is present in the instructions, it is an offset from
595 the register to the ldah instruction. This lets us avoid any
596 stupid hackery like inventing a gp value to do partial relocation
597 against. Also unlike ECOFF, we do the whole relocation off of
598 the GPDISP rather than a GPDISP_HI16/GPDISP_LO16 pair. An odd,
599 space consuming bit, that, since all the information was present
600 in the GPDISP_HI16 reloc. */
601 HOWTO (R_ALPHA_GPDISP, /* type */
602 16, /* rightshift */
603 2, /* size (0 = byte, 1 = short, 2 = long) */
604 16, /* bitsize */
b34976b6 605 FALSE, /* pc_relative */
252b5132
RH
606 0, /* bitpos */
607 complain_overflow_dont, /* complain_on_overflow */
608 elf64_alpha_reloc_gpdisp, /* special_function */
609 "GPDISP", /* name */
b34976b6 610 FALSE, /* partial_inplace */
252b5132
RH
611 0xffff, /* src_mask */
612 0xffff, /* dst_mask */
b34976b6 613 TRUE), /* pcrel_offset */
252b5132
RH
614
615 /* A 21 bit branch. */
616 HOWTO (R_ALPHA_BRADDR, /* type */
617 2, /* rightshift */
618 2, /* size (0 = byte, 1 = short, 2 = long) */
619 21, /* bitsize */
b34976b6 620 TRUE, /* pc_relative */
252b5132
RH
621 0, /* bitpos */
622 complain_overflow_signed, /* complain_on_overflow */
bc1bc43f 623 bfd_elf_generic_reloc, /* special_function */
252b5132 624 "BRADDR", /* name */
b34976b6 625 FALSE, /* partial_inplace */
252b5132
RH
626 0x1fffff, /* src_mask */
627 0x1fffff, /* dst_mask */
b34976b6 628 TRUE), /* pcrel_offset */
252b5132
RH
629
630 /* A hint for a jump to a register. */
631 HOWTO (R_ALPHA_HINT, /* type */
632 2, /* rightshift */
dfe57ca0 633 1, /* size (0 = byte, 1 = short, 2 = long) */
252b5132 634 14, /* bitsize */
b34976b6 635 TRUE, /* pc_relative */
252b5132
RH
636 0, /* bitpos */
637 complain_overflow_dont, /* complain_on_overflow */
bc1bc43f 638 bfd_elf_generic_reloc, /* special_function */
252b5132 639 "HINT", /* name */
b34976b6 640 FALSE, /* partial_inplace */
252b5132
RH
641 0x3fff, /* src_mask */
642 0x3fff, /* dst_mask */
b34976b6 643 TRUE), /* pcrel_offset */
252b5132
RH
644
645 /* 16 bit PC relative offset. */
646 HOWTO (R_ALPHA_SREL16, /* type */
647 0, /* rightshift */
648 1, /* size (0 = byte, 1 = short, 2 = long) */
649 16, /* bitsize */
b34976b6 650 TRUE, /* pc_relative */
252b5132
RH
651 0, /* bitpos */
652 complain_overflow_signed, /* complain_on_overflow */
bc1bc43f 653 bfd_elf_generic_reloc, /* special_function */
252b5132 654 "SREL16", /* name */
b34976b6 655 FALSE, /* partial_inplace */
252b5132
RH
656 0xffff, /* src_mask */
657 0xffff, /* dst_mask */
b34976b6 658 TRUE), /* pcrel_offset */
252b5132
RH
659
660 /* 32 bit PC relative offset. */
661 HOWTO (R_ALPHA_SREL32, /* type */
662 0, /* rightshift */
663 2, /* size (0 = byte, 1 = short, 2 = long) */
664 32, /* bitsize */
b34976b6 665 TRUE, /* pc_relative */
252b5132
RH
666 0, /* bitpos */
667 complain_overflow_signed, /* complain_on_overflow */
bc1bc43f 668 bfd_elf_generic_reloc, /* special_function */
252b5132 669 "SREL32", /* name */
b34976b6 670 FALSE, /* partial_inplace */
252b5132
RH
671 0xffffffff, /* src_mask */
672 0xffffffff, /* dst_mask */
b34976b6 673 TRUE), /* pcrel_offset */
252b5132
RH
674
675 /* A 64 bit PC relative offset. */
676 HOWTO (R_ALPHA_SREL64, /* type */
677 0, /* rightshift */
678 4, /* size (0 = byte, 1 = short, 2 = long) */
679 64, /* bitsize */
b34976b6 680 TRUE, /* pc_relative */
252b5132
RH
681 0, /* bitpos */
682 complain_overflow_signed, /* complain_on_overflow */
bc1bc43f 683 bfd_elf_generic_reloc, /* special_function */
252b5132 684 "SREL64", /* name */
b34976b6 685 FALSE, /* partial_inplace */
252b5132
RH
686 MINUS_ONE, /* src_mask */
687 MINUS_ONE, /* dst_mask */
b34976b6 688 TRUE), /* pcrel_offset */
252b5132 689
dfe57ca0
RH
690 /* Skip 12 - 16; deprecated ECOFF relocs. */
691 SKIP_HOWTO (12),
692 SKIP_HOWTO (13),
693 SKIP_HOWTO (14),
694 SKIP_HOWTO (15),
695 SKIP_HOWTO (16),
252b5132
RH
696
697 /* The high 16 bits of the displacement from GP to the target. */
698 HOWTO (R_ALPHA_GPRELHIGH,
699 0, /* rightshift */
dfe57ca0 700 1, /* size (0 = byte, 1 = short, 2 = long) */
252b5132 701 16, /* bitsize */
b34976b6 702 FALSE, /* pc_relative */
252b5132
RH
703 0, /* bitpos */
704 complain_overflow_signed, /* complain_on_overflow */
bc1bc43f 705 bfd_elf_generic_reloc, /* special_function */
252b5132 706 "GPRELHIGH", /* name */
b34976b6 707 FALSE, /* partial_inplace */
252b5132
RH
708 0xffff, /* src_mask */
709 0xffff, /* dst_mask */
b34976b6 710 FALSE), /* pcrel_offset */
252b5132
RH
711
712 /* The low 16 bits of the displacement from GP to the target. */
713 HOWTO (R_ALPHA_GPRELLOW,
714 0, /* rightshift */
dfe57ca0 715 1, /* size (0 = byte, 1 = short, 2 = long) */
252b5132 716 16, /* bitsize */
b34976b6 717 FALSE, /* pc_relative */
252b5132
RH
718 0, /* bitpos */
719 complain_overflow_dont, /* complain_on_overflow */
bc1bc43f 720 bfd_elf_generic_reloc, /* special_function */
252b5132 721 "GPRELLOW", /* name */
b34976b6 722 FALSE, /* partial_inplace */
252b5132
RH
723 0xffff, /* src_mask */
724 0xffff, /* dst_mask */
b34976b6 725 FALSE), /* pcrel_offset */
252b5132
RH
726
727 /* A 16-bit displacement from the GP to the target. */
dfe57ca0 728 HOWTO (R_ALPHA_GPREL16,
252b5132 729 0, /* rightshift */
dfe57ca0 730 1, /* size (0 = byte, 1 = short, 2 = long) */
252b5132 731 16, /* bitsize */
b34976b6 732 FALSE, /* pc_relative */
252b5132
RH
733 0, /* bitpos */
734 complain_overflow_signed, /* complain_on_overflow */
bc1bc43f 735 bfd_elf_generic_reloc, /* special_function */
dfe57ca0 736 "GPREL16", /* name */
b34976b6 737 FALSE, /* partial_inplace */
252b5132
RH
738 0xffff, /* src_mask */
739 0xffff, /* dst_mask */
b34976b6 740 FALSE), /* pcrel_offset */
252b5132 741
dfe57ca0
RH
742 /* Skip 20 - 23; deprecated ECOFF relocs. */
743 SKIP_HOWTO (20),
744 SKIP_HOWTO (21),
745 SKIP_HOWTO (22),
746 SKIP_HOWTO (23),
252b5132 747
fe8bc63d 748 /* Misc ELF relocations. */
252b5132
RH
749
750 /* A dynamic relocation to copy the target into our .dynbss section. */
751 /* Not generated, as all Alpha objects use PIC, so it is not needed. It
752 is present because every other ELF has one, but should not be used
753 because .dynbss is an ugly thing. */
754 HOWTO (R_ALPHA_COPY,
755 0,
756 0,
757 0,
b34976b6 758 FALSE,
252b5132
RH
759 0,
760 complain_overflow_dont,
761 bfd_elf_generic_reloc,
762 "COPY",
b34976b6 763 FALSE,
252b5132
RH
764 0,
765 0,
b34976b6 766 TRUE),
252b5132
RH
767
768 /* A dynamic relocation for a .got entry. */
769 HOWTO (R_ALPHA_GLOB_DAT,
770 0,
771 0,
772 0,
b34976b6 773 FALSE,
252b5132
RH
774 0,
775 complain_overflow_dont,
776 bfd_elf_generic_reloc,
777 "GLOB_DAT",
b34976b6 778 FALSE,
252b5132
RH
779 0,
780 0,
b34976b6 781 TRUE),
252b5132
RH
782
783 /* A dynamic relocation for a .plt entry. */
784 HOWTO (R_ALPHA_JMP_SLOT,
785 0,
786 0,
787 0,
b34976b6 788 FALSE,
252b5132
RH
789 0,
790 complain_overflow_dont,
791 bfd_elf_generic_reloc,
792 "JMP_SLOT",
b34976b6 793 FALSE,
252b5132
RH
794 0,
795 0,
b34976b6 796 TRUE),
252b5132
RH
797
798 /* A dynamic relocation to add the base of the DSO to a 64-bit field. */
799 HOWTO (R_ALPHA_RELATIVE,
800 0,
801 0,
802 0,
b34976b6 803 FALSE,
252b5132
RH
804 0,
805 complain_overflow_dont,
806 bfd_elf_generic_reloc,
807 "RELATIVE",
b34976b6 808 FALSE,
252b5132
RH
809 0,
810 0,
b34976b6 811 TRUE),
7793f4d0
RH
812
813 /* A 21 bit branch that adjusts for gp loads. */
814 HOWTO (R_ALPHA_BRSGP, /* type */
815 2, /* rightshift */
816 2, /* size (0 = byte, 1 = short, 2 = long) */
817 21, /* bitsize */
b34976b6 818 TRUE, /* pc_relative */
7793f4d0
RH
819 0, /* bitpos */
820 complain_overflow_signed, /* complain_on_overflow */
bc1bc43f 821 bfd_elf_generic_reloc, /* special_function */
7793f4d0 822 "BRSGP", /* name */
b34976b6 823 FALSE, /* partial_inplace */
7793f4d0
RH
824 0x1fffff, /* src_mask */
825 0x1fffff, /* dst_mask */
b34976b6 826 TRUE), /* pcrel_offset */
3765b1be
RH
827
828 /* Creates a tls_index for the symbol in the got. */
829 HOWTO (R_ALPHA_TLSGD, /* type */
830 0, /* rightshift */
831 1, /* size (0 = byte, 1 = short, 2 = long) */
832 16, /* bitsize */
b34976b6 833 FALSE, /* pc_relative */
3765b1be
RH
834 0, /* bitpos */
835 complain_overflow_signed, /* complain_on_overflow */
bc1bc43f 836 bfd_elf_generic_reloc, /* special_function */
3765b1be 837 "TLSGD", /* name */
b34976b6 838 FALSE, /* partial_inplace */
3765b1be
RH
839 0xffff, /* src_mask */
840 0xffff, /* dst_mask */
b34976b6 841 FALSE), /* pcrel_offset */
3765b1be
RH
842
843 /* Creates a tls_index for the (current) module in the got. */
844 HOWTO (R_ALPHA_TLSLDM, /* type */
845 0, /* rightshift */
846 1, /* size (0 = byte, 1 = short, 2 = long) */
847 16, /* bitsize */
b34976b6 848 FALSE, /* pc_relative */
3765b1be
RH
849 0, /* bitpos */
850 complain_overflow_signed, /* complain_on_overflow */
bc1bc43f 851 bfd_elf_generic_reloc, /* special_function */
3765b1be 852 "TLSLDM", /* name */
b34976b6 853 FALSE, /* partial_inplace */
3765b1be
RH
854 0xffff, /* src_mask */
855 0xffff, /* dst_mask */
b34976b6 856 FALSE), /* pcrel_offset */
3765b1be
RH
857
858 /* A dynamic relocation for a DTP module entry. */
859 HOWTO (R_ALPHA_DTPMOD64, /* type */
860 0, /* rightshift */
861 4, /* size (0 = byte, 1 = short, 2 = long) */
862 64, /* bitsize */
b34976b6 863 FALSE, /* pc_relative */
3765b1be
RH
864 0, /* bitpos */
865 complain_overflow_bitfield, /* complain_on_overflow */
bc1bc43f 866 bfd_elf_generic_reloc, /* special_function */
3765b1be 867 "DTPMOD64", /* name */
b34976b6 868 FALSE, /* partial_inplace */
3765b1be
RH
869 MINUS_ONE, /* src_mask */
870 MINUS_ONE, /* dst_mask */
b34976b6 871 FALSE), /* pcrel_offset */
3765b1be
RH
872
873 /* Creates a 64-bit offset in the got for the displacement
874 from DTP to the target. */
875 HOWTO (R_ALPHA_GOTDTPREL, /* type */
876 0, /* rightshift */
877 1, /* size (0 = byte, 1 = short, 2 = long) */
878 16, /* bitsize */
b34976b6 879 FALSE, /* pc_relative */
3765b1be
RH
880 0, /* bitpos */
881 complain_overflow_signed, /* complain_on_overflow */
bc1bc43f 882 bfd_elf_generic_reloc, /* special_function */
3765b1be 883 "GOTDTPREL", /* name */
b34976b6 884 FALSE, /* partial_inplace */
3765b1be
RH
885 0xffff, /* src_mask */
886 0xffff, /* dst_mask */
b34976b6 887 FALSE), /* pcrel_offset */
3765b1be
RH
888
889 /* A dynamic relocation for a displacement from DTP to the target. */
890 HOWTO (R_ALPHA_DTPREL64, /* type */
891 0, /* rightshift */
892 4, /* size (0 = byte, 1 = short, 2 = long) */
893 64, /* bitsize */
b34976b6 894 FALSE, /* pc_relative */
3765b1be
RH
895 0, /* bitpos */
896 complain_overflow_bitfield, /* complain_on_overflow */
bc1bc43f 897 bfd_elf_generic_reloc, /* special_function */
3765b1be 898 "DTPREL64", /* name */
b34976b6 899 FALSE, /* partial_inplace */
3765b1be
RH
900 MINUS_ONE, /* src_mask */
901 MINUS_ONE, /* dst_mask */
b34976b6 902 FALSE), /* pcrel_offset */
3765b1be
RH
903
904 /* The high 16 bits of the displacement from DTP to the target. */
905 HOWTO (R_ALPHA_DTPRELHI, /* type */
906 0, /* rightshift */
907 1, /* size (0 = byte, 1 = short, 2 = long) */
908 16, /* bitsize */
b34976b6 909 FALSE, /* pc_relative */
3765b1be
RH
910 0, /* bitpos */
911 complain_overflow_signed, /* complain_on_overflow */
bc1bc43f 912 bfd_elf_generic_reloc, /* special_function */
3765b1be 913 "DTPRELHI", /* name */
b34976b6 914 FALSE, /* partial_inplace */
3765b1be
RH
915 0xffff, /* src_mask */
916 0xffff, /* dst_mask */
b34976b6 917 FALSE), /* pcrel_offset */
3765b1be
RH
918
919 /* The low 16 bits of the displacement from DTP to the target. */
920 HOWTO (R_ALPHA_DTPRELLO, /* type */
921 0, /* rightshift */
922 1, /* size (0 = byte, 1 = short, 2 = long) */
923 16, /* bitsize */
b34976b6 924 FALSE, /* pc_relative */
3765b1be
RH
925 0, /* bitpos */
926 complain_overflow_dont, /* complain_on_overflow */
bc1bc43f 927 bfd_elf_generic_reloc, /* special_function */
3765b1be 928 "DTPRELLO", /* name */
b34976b6 929 FALSE, /* partial_inplace */
3765b1be
RH
930 0xffff, /* src_mask */
931 0xffff, /* dst_mask */
b34976b6 932 FALSE), /* pcrel_offset */
3765b1be
RH
933
934 /* A 16-bit displacement from DTP to the target. */
935 HOWTO (R_ALPHA_DTPREL16, /* type */
936 0, /* rightshift */
937 1, /* size (0 = byte, 1 = short, 2 = long) */
938 16, /* bitsize */
b34976b6 939 FALSE, /* pc_relative */
3765b1be
RH
940 0, /* bitpos */
941 complain_overflow_signed, /* complain_on_overflow */
bc1bc43f 942 bfd_elf_generic_reloc, /* special_function */
3765b1be 943 "DTPREL16", /* name */
b34976b6 944 FALSE, /* partial_inplace */
3765b1be
RH
945 0xffff, /* src_mask */
946 0xffff, /* dst_mask */
b34976b6 947 FALSE), /* pcrel_offset */
3765b1be
RH
948
949 /* Creates a 64-bit offset in the got for the displacement
950 from TP to the target. */
951 HOWTO (R_ALPHA_GOTTPREL, /* type */
952 0, /* rightshift */
953 1, /* size (0 = byte, 1 = short, 2 = long) */
954 16, /* bitsize */
b34976b6 955 FALSE, /* pc_relative */
3765b1be
RH
956 0, /* bitpos */
957 complain_overflow_signed, /* complain_on_overflow */
bc1bc43f 958 bfd_elf_generic_reloc, /* special_function */
3765b1be 959 "GOTTPREL", /* name */
b34976b6 960 FALSE, /* partial_inplace */
3765b1be
RH
961 0xffff, /* src_mask */
962 0xffff, /* dst_mask */
b34976b6 963 FALSE), /* pcrel_offset */
3765b1be
RH
964
965 /* A dynamic relocation for a displacement from TP to the target. */
966 HOWTO (R_ALPHA_TPREL64, /* type */
967 0, /* rightshift */
968 4, /* size (0 = byte, 1 = short, 2 = long) */
969 64, /* bitsize */
b34976b6 970 FALSE, /* pc_relative */
3765b1be
RH
971 0, /* bitpos */
972 complain_overflow_bitfield, /* complain_on_overflow */
bc1bc43f 973 bfd_elf_generic_reloc, /* special_function */
3765b1be 974 "TPREL64", /* name */
b34976b6 975 FALSE, /* partial_inplace */
3765b1be
RH
976 MINUS_ONE, /* src_mask */
977 MINUS_ONE, /* dst_mask */
b34976b6 978 FALSE), /* pcrel_offset */
3765b1be
RH
979
980 /* The high 16 bits of the displacement from TP to the target. */
981 HOWTO (R_ALPHA_TPRELHI, /* type */
982 0, /* rightshift */
983 1, /* size (0 = byte, 1 = short, 2 = long) */
984 16, /* bitsize */
b34976b6 985 FALSE, /* pc_relative */
3765b1be
RH
986 0, /* bitpos */
987 complain_overflow_signed, /* complain_on_overflow */
bc1bc43f 988 bfd_elf_generic_reloc, /* special_function */
3765b1be 989 "TPRELHI", /* name */
b34976b6 990 FALSE, /* partial_inplace */
3765b1be
RH
991 0xffff, /* src_mask */
992 0xffff, /* dst_mask */
b34976b6 993 FALSE), /* pcrel_offset */
3765b1be
RH
994
995 /* The low 16 bits of the displacement from TP to the target. */
996 HOWTO (R_ALPHA_TPRELLO, /* type */
997 0, /* rightshift */
998 1, /* size (0 = byte, 1 = short, 2 = long) */
999 16, /* bitsize */
b34976b6 1000 FALSE, /* pc_relative */
3765b1be
RH
1001 0, /* bitpos */
1002 complain_overflow_dont, /* complain_on_overflow */
bc1bc43f 1003 bfd_elf_generic_reloc, /* special_function */
3765b1be 1004 "TPRELLO", /* name */
b34976b6 1005 FALSE, /* partial_inplace */
3765b1be
RH
1006 0xffff, /* src_mask */
1007 0xffff, /* dst_mask */
b34976b6 1008 FALSE), /* pcrel_offset */
3765b1be
RH
1009
1010 /* A 16-bit displacement from TP to the target. */
1011 HOWTO (R_ALPHA_TPREL16, /* type */
1012 0, /* rightshift */
1013 1, /* size (0 = byte, 1 = short, 2 = long) */
1014 16, /* bitsize */
b34976b6 1015 FALSE, /* pc_relative */
3765b1be
RH
1016 0, /* bitpos */
1017 complain_overflow_signed, /* complain_on_overflow */
bc1bc43f 1018 bfd_elf_generic_reloc, /* special_function */
3765b1be 1019 "TPREL16", /* name */
b34976b6 1020 FALSE, /* partial_inplace */
3765b1be
RH
1021 0xffff, /* src_mask */
1022 0xffff, /* dst_mask */
b34976b6 1023 FALSE), /* pcrel_offset */
252b5132
RH
1024};
1025
252b5132
RH
1026/* A mapping from BFD reloc types to Alpha ELF reloc types. */
1027
1028struct elf_reloc_map
1029{
1030 bfd_reloc_code_real_type bfd_reloc_val;
1031 int elf_reloc_val;
1032};
1033
1034static const struct elf_reloc_map elf64_alpha_reloc_map[] =
1035{
dfe57ca0
RH
1036 {BFD_RELOC_NONE, R_ALPHA_NONE},
1037 {BFD_RELOC_32, R_ALPHA_REFLONG},
1038 {BFD_RELOC_64, R_ALPHA_REFQUAD},
1039 {BFD_RELOC_CTOR, R_ALPHA_REFQUAD},
1040 {BFD_RELOC_GPREL32, R_ALPHA_GPREL32},
1041 {BFD_RELOC_ALPHA_ELF_LITERAL, R_ALPHA_LITERAL},
1042 {BFD_RELOC_ALPHA_LITUSE, R_ALPHA_LITUSE},
1043 {BFD_RELOC_ALPHA_GPDISP, R_ALPHA_GPDISP},
1044 {BFD_RELOC_23_PCREL_S2, R_ALPHA_BRADDR},
1045 {BFD_RELOC_ALPHA_HINT, R_ALPHA_HINT},
1046 {BFD_RELOC_16_PCREL, R_ALPHA_SREL16},
1047 {BFD_RELOC_32_PCREL, R_ALPHA_SREL32},
1048 {BFD_RELOC_64_PCREL, R_ALPHA_SREL64},
1049 {BFD_RELOC_ALPHA_GPREL_HI16, R_ALPHA_GPRELHIGH},
1050 {BFD_RELOC_ALPHA_GPREL_LO16, R_ALPHA_GPRELLOW},
1051 {BFD_RELOC_GPREL16, R_ALPHA_GPREL16},
7793f4d0 1052 {BFD_RELOC_ALPHA_BRSGP, R_ALPHA_BRSGP},
3765b1be
RH
1053 {BFD_RELOC_ALPHA_TLSGD, R_ALPHA_TLSGD},
1054 {BFD_RELOC_ALPHA_TLSLDM, R_ALPHA_TLSLDM},
1055 {BFD_RELOC_ALPHA_DTPMOD64, R_ALPHA_DTPMOD64},
1056 {BFD_RELOC_ALPHA_GOTDTPREL16, R_ALPHA_GOTDTPREL},
1057 {BFD_RELOC_ALPHA_DTPREL64, R_ALPHA_DTPREL64},
1058 {BFD_RELOC_ALPHA_DTPREL_HI16, R_ALPHA_DTPRELHI},
1059 {BFD_RELOC_ALPHA_DTPREL_LO16, R_ALPHA_DTPRELLO},
1060 {BFD_RELOC_ALPHA_DTPREL16, R_ALPHA_DTPREL16},
1061 {BFD_RELOC_ALPHA_GOTTPREL16, R_ALPHA_GOTTPREL},
1062 {BFD_RELOC_ALPHA_TPREL64, R_ALPHA_TPREL64},
1063 {BFD_RELOC_ALPHA_TPREL_HI16, R_ALPHA_TPRELHI},
1064 {BFD_RELOC_ALPHA_TPREL_LO16, R_ALPHA_TPRELLO},
1065 {BFD_RELOC_ALPHA_TPREL16, R_ALPHA_TPREL16},
252b5132
RH
1066};
1067
1068/* Given a BFD reloc type, return a HOWTO structure. */
1069
1070static reloc_howto_type *
a7519a3c
RH
1071elf64_alpha_bfd_reloc_type_lookup (bfd *abfd ATTRIBUTE_UNUSED,
1072 bfd_reloc_code_real_type code)
252b5132
RH
1073{
1074 const struct elf_reloc_map *i, *e;
1075 i = e = elf64_alpha_reloc_map;
1076 e += sizeof (elf64_alpha_reloc_map) / sizeof (struct elf_reloc_map);
1077 for (; i != e; ++i)
1078 {
1079 if (i->bfd_reloc_val == code)
1080 return &elf64_alpha_howto_table[i->elf_reloc_val];
1081 }
1082 return 0;
1083}
1084
157090f7
AM
1085static reloc_howto_type *
1086elf64_alpha_bfd_reloc_name_lookup (bfd *abfd ATTRIBUTE_UNUSED,
1087 const char *r_name)
1088{
1089 unsigned int i;
1090
1091 for (i = 0;
1092 i < (sizeof (elf64_alpha_howto_table)
1093 / sizeof (elf64_alpha_howto_table[0]));
1094 i++)
1095 if (elf64_alpha_howto_table[i].name != NULL
1096 && strcasecmp (elf64_alpha_howto_table[i].name, r_name) == 0)
1097 return &elf64_alpha_howto_table[i];
1098
1099 return NULL;
1100}
1101
252b5132
RH
1102/* Given an Alpha ELF reloc type, fill in an arelent structure. */
1103
f3185997 1104static bfd_boolean
0aa13fee 1105elf64_alpha_info_to_howto (bfd *abfd, arelent *cache_ptr,
a7519a3c 1106 Elf_Internal_Rela *dst)
252b5132 1107{
a7519a3c 1108 unsigned r_type = ELF64_R_TYPE(dst->r_info);
cd21f5da
NC
1109
1110 if (r_type >= R_ALPHA_max)
1111 {
695344c0 1112 /* xgettext:c-format */
0aa13fee 1113 _bfd_error_handler (_("%pB: unsupported relocation type %#x"),
4eca0228 1114 abfd, r_type);
cd21f5da 1115 bfd_set_error (bfd_error_bad_value);
f3185997 1116 return FALSE;
cd21f5da 1117 }
252b5132 1118 cache_ptr->howto = &elf64_alpha_howto_table[r_type];
f3185997 1119 return TRUE;
252b5132 1120}
3765b1be
RH
1121
1122/* These two relocations create a two-word entry in the got. */
1123#define alpha_got_entry_size(r_type) \
1124 (r_type == R_ALPHA_TLSGD || r_type == R_ALPHA_TLSLDM ? 16 : 8)
9e756d64
RH
1125
1126/* This is PT_TLS segment p_vaddr. */
e1918d23
AM
1127#define alpha_get_dtprel_base(info) \
1128 (elf_hash_table (info)->tls_sec->vma)
9e756d64
RH
1129
1130/* Main program TLS (whose template starts at PT_TLS p_vaddr)
1131 is assigned offset round(16, PT_TLS p_align). */
e1918d23
AM
1132#define alpha_get_tprel_base(info) \
1133 (elf_hash_table (info)->tls_sec->vma \
1134 - align_power ((bfd_vma) 16, \
1135 elf_hash_table (info)->tls_sec->alignment_power))
252b5132 1136\f
a7519a3c
RH
1137/* Handle an Alpha specific section when reading an object file. This
1138 is called when bfd_section_from_shdr finds a section with an unknown
bf577467 1139 type. */
252b5132 1140
a7519a3c
RH
1141static bfd_boolean
1142elf64_alpha_section_from_shdr (bfd *abfd,
1143 Elf_Internal_Shdr *hdr,
1144 const char *name,
1145 int shindex)
252b5132 1146{
a7519a3c
RH
1147 asection *newsect;
1148
1149 /* There ought to be a place to keep ELF backend specific flags, but
1150 at the moment there isn't one. We just keep track of the
1151 sections by their name, instead. Fortunately, the ABI gives
1152 suggested names for all the MIPS specific sections, so we will
1153 probably get away with this. */
1154 switch (hdr->sh_type)
1155 {
1156 case SHT_ALPHA_DEBUG:
1157 if (strcmp (name, ".mdebug") != 0)
1158 return FALSE;
1159 break;
1160 default:
1161 return FALSE;
1162 }
252b5132 1163
a7519a3c
RH
1164 if (! _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex))
1165 return FALSE;
1166 newsect = hdr->bfd_section;
252b5132 1167
a7519a3c 1168 if (hdr->sh_type == SHT_ALPHA_DEBUG)
252b5132 1169 {
fd361982
AM
1170 if (!bfd_set_section_flags (newsect,
1171 bfd_section_flags (newsect) | SEC_DEBUGGING))
a7519a3c 1172 return FALSE;
252b5132 1173 }
a7519a3c
RH
1174
1175 return TRUE;
252b5132
RH
1176}
1177
a7519a3c
RH
1178/* Convert Alpha specific section flags to bfd internal section flags. */
1179
b34976b6 1180static bfd_boolean
8c803a2d 1181elf64_alpha_section_flags (const Elf_Internal_Shdr *hdr)
252b5132 1182{
a7519a3c 1183 if (hdr->sh_flags & SHF_ALPHA_GPREL)
8c803a2d 1184 hdr->bfd_section->flags |= SEC_SMALL_DATA;
252b5132 1185
a7519a3c
RH
1186 return TRUE;
1187}
252b5132 1188
a7519a3c
RH
1189/* Set the correct type for an Alpha ELF section. We do this by the
1190 section name, which is a hack, but ought to work. */
9e756d64 1191
a7519a3c
RH
1192static bfd_boolean
1193elf64_alpha_fake_sections (bfd *abfd, Elf_Internal_Shdr *hdr, asection *sec)
1194{
1195 register const char *name;
1196
fd361982 1197 name = bfd_section_name (sec);
a7519a3c
RH
1198
1199 if (strcmp (name, ".mdebug") == 0)
252b5132 1200 {
a7519a3c
RH
1201 hdr->sh_type = SHT_ALPHA_DEBUG;
1202 /* In a shared object on Irix 5.3, the .mdebug section has an
07d6d2b8 1203 entsize of 0. FIXME: Does this matter? */
a7519a3c
RH
1204 if ((abfd->flags & DYNAMIC) != 0 )
1205 hdr->sh_entsize = 0;
1206 else
1207 hdr->sh_entsize = 1;
252b5132 1208 }
a7519a3c
RH
1209 else if ((sec->flags & SEC_SMALL_DATA)
1210 || strcmp (name, ".sdata") == 0
1211 || strcmp (name, ".sbss") == 0
1212 || strcmp (name, ".lit4") == 0
1213 || strcmp (name, ".lit8") == 0)
1214 hdr->sh_flags |= SHF_ALPHA_GPREL;
252b5132 1215
a7519a3c
RH
1216 return TRUE;
1217}
252b5132 1218
a7519a3c
RH
1219/* Hook called by the linker routine which adds symbols from an object
1220 file. We use it to put .comm items in .sbss, and not .bss. */
1221
1222static bfd_boolean
1223elf64_alpha_add_symbol_hook (bfd *abfd, struct bfd_link_info *info,
1224 Elf_Internal_Sym *sym,
1225 const char **namep ATTRIBUTE_UNUSED,
1226 flagword *flagsp ATTRIBUTE_UNUSED,
1227 asection **secp, bfd_vma *valp)
1228{
1229 if (sym->st_shndx == SHN_COMMON
0e1862bb 1230 && !bfd_link_relocatable (info)
a7519a3c 1231 && sym->st_size <= elf_gp_size (abfd))
252b5132 1232 {
a7519a3c
RH
1233 /* Common symbols less than or equal to -G nn bytes are
1234 automatically put into .sbss. */
ffcb7aff 1235
a7519a3c 1236 asection *scomm = bfd_get_section_by_name (abfd, ".scommon");
252b5132 1237
a7519a3c 1238 if (scomm == NULL)
252b5132 1239 {
a7519a3c
RH
1240 scomm = bfd_make_section_with_flags (abfd, ".scommon",
1241 (SEC_ALLOC
1242 | SEC_IS_COMMON
10885e24 1243 | SEC_SMALL_DATA
a7519a3c
RH
1244 | SEC_LINKER_CREATED));
1245 if (scomm == NULL)
1246 return FALSE;
1247 }
ffcb7aff 1248
a7519a3c
RH
1249 *secp = scomm;
1250 *valp = sym->st_size;
1251 }
ffcb7aff 1252
a7519a3c
RH
1253 return TRUE;
1254}
252b5132 1255
a7519a3c 1256/* Create the .got section. */
252b5132 1257
a7519a3c
RH
1258static bfd_boolean
1259elf64_alpha_create_got_section (bfd *abfd,
1260 struct bfd_link_info *info ATTRIBUTE_UNUSED)
1261{
85d162e6 1262 flagword flags;
a7519a3c 1263 asection *s;
252b5132 1264
0ffa91dd
NC
1265 if (! is_alpha_elf (abfd))
1266 return FALSE;
1267
85d162e6
AM
1268 flags = (SEC_ALLOC | SEC_LOAD | SEC_HAS_CONTENTS | SEC_IN_MEMORY
1269 | SEC_LINKER_CREATED);
1270 s = bfd_make_section_anyway_with_flags (abfd, ".got", flags);
a7519a3c 1271 if (s == NULL
fd361982 1272 || !bfd_set_section_alignment (s, 3))
a7519a3c 1273 return FALSE;
252b5132 1274
a7519a3c 1275 alpha_elf_tdata (abfd)->got = s;
252b5132 1276
85d162e6
AM
1277 /* Make sure the object's gotobj is set to itself so that we default
1278 to every object with its own .got. We'll merge .gots later once
1279 we've collected each object's info. */
1280 alpha_elf_tdata (abfd)->gotobj = abfd;
1281
a7519a3c
RH
1282 return TRUE;
1283}
252b5132 1284
a7519a3c 1285/* Create all the dynamic sections. */
252b5132 1286
a7519a3c
RH
1287static bfd_boolean
1288elf64_alpha_create_dynamic_sections (bfd *abfd, struct bfd_link_info *info)
1289{
1290 asection *s;
85d162e6 1291 flagword flags;
a7519a3c 1292 struct elf_link_hash_entry *h;
252b5132 1293
0ffa91dd
NC
1294 if (! is_alpha_elf (abfd))
1295 return FALSE;
1296
a7519a3c 1297 /* We need to create .plt, .rela.plt, .got, and .rela.got sections. */
252b5132 1298
85d162e6
AM
1299 flags = (SEC_ALLOC | SEC_LOAD | SEC_CODE | SEC_HAS_CONTENTS | SEC_IN_MEMORY
1300 | SEC_LINKER_CREATED
1301 | (elf64_alpha_use_secureplt ? SEC_READONLY : 0));
1302 s = bfd_make_section_anyway_with_flags (abfd, ".plt", flags);
ce558b89 1303 elf_hash_table (info)->splt = s;
fd361982 1304 if (s == NULL || ! bfd_set_section_alignment (s, 4))
a7519a3c 1305 return FALSE;
252b5132 1306
a7519a3c
RH
1307 /* Define the symbol _PROCEDURE_LINKAGE_TABLE_ at the start of the
1308 .plt section. */
7325306f
RS
1309 h = _bfd_elf_define_linkage_sym (abfd, info, s,
1310 "_PROCEDURE_LINKAGE_TABLE_");
1311 elf_hash_table (info)->hplt = h;
1312 if (h == NULL)
a7519a3c 1313 return FALSE;
d6ad34f6 1314
85d162e6
AM
1315 flags = (SEC_ALLOC | SEC_LOAD | SEC_HAS_CONTENTS | SEC_IN_MEMORY
1316 | SEC_LINKER_CREATED | SEC_READONLY);
1317 s = bfd_make_section_anyway_with_flags (abfd, ".rela.plt", flags);
ce558b89 1318 elf_hash_table (info)->srelplt = s;
fd361982 1319 if (s == NULL || ! bfd_set_section_alignment (s, 3))
a7519a3c 1320 return FALSE;
252b5132 1321
6ec7057a
RH
1322 if (elf64_alpha_use_secureplt)
1323 {
85d162e6
AM
1324 flags = SEC_ALLOC | SEC_LINKER_CREATED;
1325 s = bfd_make_section_anyway_with_flags (abfd, ".got.plt", flags);
ce558b89 1326 elf_hash_table (info)->sgotplt = s;
fd361982 1327 if (s == NULL || ! bfd_set_section_alignment (s, 3))
6ec7057a
RH
1328 return FALSE;
1329 }
1330
a7519a3c
RH
1331 /* We may or may not have created a .got section for this object, but
1332 we definitely havn't done the rest of the work. */
1cd6895c 1333
85d162e6
AM
1334 if (alpha_elf_tdata(abfd)->gotobj == NULL)
1335 {
1336 if (!elf64_alpha_create_got_section (abfd, info))
1337 return FALSE;
1338 }
1cd6895c 1339
85d162e6
AM
1340 flags = (SEC_ALLOC | SEC_LOAD | SEC_HAS_CONTENTS | SEC_IN_MEMORY
1341 | SEC_LINKER_CREATED | SEC_READONLY);
1342 s = bfd_make_section_anyway_with_flags (abfd, ".rela.got", flags);
ce558b89 1343 elf_hash_table (info)->srelgot = s;
a7519a3c 1344 if (s == NULL
fd361982 1345 || !bfd_set_section_alignment (s, 3))
a7519a3c 1346 return FALSE;
252b5132 1347
a7519a3c
RH
1348 /* Define the symbol _GLOBAL_OFFSET_TABLE_ at the start of the
1349 dynobj's .got section. We don't do this in the linker script
1350 because we don't want to define the symbol if we are not creating
1351 a global offset table. */
d98685ac
AM
1352 h = _bfd_elf_define_linkage_sym (abfd, info, alpha_elf_tdata(abfd)->got,
1353 "_GLOBAL_OFFSET_TABLE_");
a7519a3c 1354 elf_hash_table (info)->hgot = h;
d98685ac
AM
1355 if (h == NULL)
1356 return FALSE;
252b5132 1357
a7519a3c 1358 return TRUE;
252b5132 1359}
a7519a3c
RH
1360\f
1361/* Read ECOFF debugging information from a .mdebug section into a
1362 ecoff_debug_info structure. */
252b5132 1363
a7519a3c
RH
1364static bfd_boolean
1365elf64_alpha_read_ecoff_info (bfd *abfd, asection *section,
1366 struct ecoff_debug_info *debug)
252b5132 1367{
a7519a3c
RH
1368 HDRR *symhdr;
1369 const struct ecoff_debug_swap *swap;
1370 char *ext_hdr = NULL;
252b5132 1371
a7519a3c
RH
1372 swap = get_elf_backend_data (abfd)->elf_backend_ecoff_debug_swap;
1373 memset (debug, 0, sizeof (*debug));
252b5132 1374
a7519a3c
RH
1375 ext_hdr = (char *) bfd_malloc (swap->external_hdr_size);
1376 if (ext_hdr == NULL && swap->external_hdr_size != 0)
1377 goto error_return;
252b5132 1378
a7519a3c
RH
1379 if (! bfd_get_section_contents (abfd, section, ext_hdr, (file_ptr) 0,
1380 swap->external_hdr_size))
1381 goto error_return;
252b5132 1382
a7519a3c
RH
1383 symhdr = &debug->symbolic_header;
1384 (*swap->swap_hdr_in) (abfd, ext_hdr, symhdr);
252b5132 1385
a7519a3c
RH
1386 /* The symbolic header contains absolute file offsets and sizes to
1387 read. */
1388#define READ(ptr, offset, count, size, type) \
1f4361a7 1389 do \
a7519a3c 1390 { \
1f4361a7
AM
1391 size_t amt; \
1392 debug->ptr = NULL; \
1393 if (symhdr->count == 0) \
1394 break; \
1395 if (_bfd_mul_overflow (size, symhdr->count, &amt)) \
1396 { \
1397 bfd_set_error (bfd_error_file_too_big); \
1398 goto error_return; \
1399 } \
2bb3687b 1400 if (bfd_seek (abfd, symhdr->offset, SEEK_SET) != 0) \
a7519a3c 1401 goto error_return; \
2bb3687b
AM
1402 debug->ptr = (type) _bfd_malloc_and_read (abfd, amt, amt); \
1403 if (debug->ptr == NULL) \
a7519a3c 1404 goto error_return; \
1f4361a7 1405 } while (0)
fe8bc63d 1406
a7519a3c 1407 READ (line, cbLineOffset, cbLine, sizeof (unsigned char), unsigned char *);
2c3fc389
NC
1408 READ (external_dnr, cbDnOffset, idnMax, swap->external_dnr_size, void *);
1409 READ (external_pdr, cbPdOffset, ipdMax, swap->external_pdr_size, void *);
1410 READ (external_sym, cbSymOffset, isymMax, swap->external_sym_size, void *);
1411 READ (external_opt, cbOptOffset, ioptMax, swap->external_opt_size, void *);
a7519a3c
RH
1412 READ (external_aux, cbAuxOffset, iauxMax, sizeof (union aux_ext),
1413 union aux_ext *);
1414 READ (ss, cbSsOffset, issMax, sizeof (char), char *);
1415 READ (ssext, cbSsExtOffset, issExtMax, sizeof (char), char *);
2c3fc389
NC
1416 READ (external_fdr, cbFdOffset, ifdMax, swap->external_fdr_size, void *);
1417 READ (external_rfd, cbRfdOffset, crfd, swap->external_rfd_size, void *);
1418 READ (external_ext, cbExtOffset, iextMax, swap->external_ext_size, void *);
a7519a3c 1419#undef READ
252b5132 1420
a7519a3c 1421 debug->fdr = NULL;
252b5132 1422
a7519a3c 1423 return TRUE;
252b5132 1424
a7519a3c 1425 error_return:
c9594989
AM
1426 free (ext_hdr);
1427 free (debug->line);
1428 free (debug->external_dnr);
1429 free (debug->external_pdr);
1430 free (debug->external_sym);
1431 free (debug->external_opt);
1432 free (debug->external_aux);
1433 free (debug->ss);
1434 free (debug->ssext);
1435 free (debug->external_fdr);
1436 free (debug->external_rfd);
1437 free (debug->external_ext);
a7519a3c 1438 return FALSE;
252b5132
RH
1439}
1440
a7519a3c
RH
1441/* Alpha ELF local labels start with '$'. */
1442
b34976b6 1443static bfd_boolean
a7519a3c 1444elf64_alpha_is_local_label_name (bfd *abfd ATTRIBUTE_UNUSED, const char *name)
252b5132 1445{
a7519a3c
RH
1446 return name[0] == '$';
1447}
9e756d64 1448
a7519a3c 1449static bfd_boolean
fb167eb2
AM
1450elf64_alpha_find_nearest_line (bfd *abfd, asymbol **symbols,
1451 asection *section, bfd_vma offset,
1452 const char **filename_ptr,
a7519a3c 1453 const char **functionname_ptr,
fb167eb2
AM
1454 unsigned int *line_ptr,
1455 unsigned int *discriminator_ptr)
a7519a3c
RH
1456{
1457 asection *msec;
252b5132 1458
fb167eb2 1459 if (_bfd_dwarf2_find_nearest_line (abfd, symbols, NULL, section, offset,
a7519a3c 1460 filename_ptr, functionname_ptr,
fb167eb2 1461 line_ptr, discriminator_ptr,
9defd221 1462 dwarf_debug_sections,
7f3bf384
AM
1463 &elf_tdata (abfd)->dwarf2_find_line_info)
1464 == 1)
b34976b6 1465 return TRUE;
9e756d64 1466
a7519a3c
RH
1467 msec = bfd_get_section_by_name (abfd, ".mdebug");
1468 if (msec != NULL)
1bbc9cec 1469 {
a7519a3c 1470 flagword origflags;
698600e4 1471 struct alpha_elf_find_line *fi;
a7519a3c
RH
1472 const struct ecoff_debug_swap * const swap =
1473 get_elf_backend_data (abfd)->elf_backend_ecoff_debug_swap;
252b5132 1474
a7519a3c
RH
1475 /* If we are called during a link, alpha_elf_final_link may have
1476 cleared the SEC_HAS_CONTENTS field. We force it back on here
1477 if appropriate (which it normally will be). */
1478 origflags = msec->flags;
1479 if (elf_section_data (msec)->this_hdr.sh_type != SHT_NOBITS)
1480 msec->flags |= SEC_HAS_CONTENTS;
9e756d64 1481
698600e4 1482 fi = alpha_elf_tdata (abfd)->find_line_info;
a7519a3c
RH
1483 if (fi == NULL)
1484 {
1485 bfd_size_type external_fdr_size;
1486 char *fraw_src;
1487 char *fraw_end;
1488 struct fdr *fdr_ptr;
698600e4 1489 bfd_size_type amt = sizeof (struct alpha_elf_find_line);
9e756d64 1490
698600e4 1491 fi = (struct alpha_elf_find_line *) bfd_zalloc (abfd, amt);
a7519a3c
RH
1492 if (fi == NULL)
1493 {
1494 msec->flags = origflags;
1495 return FALSE;
1496 }
9e756d64 1497
a7519a3c
RH
1498 if (!elf64_alpha_read_ecoff_info (abfd, msec, &fi->d))
1499 {
1500 msec->flags = origflags;
1501 return FALSE;
1502 }
9e756d64 1503
a7519a3c
RH
1504 /* Swap in the FDR information. */
1505 amt = fi->d.symbolic_header.ifdMax * sizeof (struct fdr);
1506 fi->d.fdr = (struct fdr *) bfd_alloc (abfd, amt);
1507 if (fi->d.fdr == NULL)
1508 {
1509 msec->flags = origflags;
1510 return FALSE;
1511 }
1512 external_fdr_size = swap->external_fdr_size;
1513 fdr_ptr = fi->d.fdr;
1514 fraw_src = (char *) fi->d.external_fdr;
1515 fraw_end = (fraw_src
1516 + fi->d.symbolic_header.ifdMax * external_fdr_size);
1517 for (; fraw_src < fraw_end; fraw_src += external_fdr_size, fdr_ptr++)
2c3fc389 1518 (*swap->swap_fdr_in) (abfd, fraw_src, fdr_ptr);
9e756d64 1519
698600e4 1520 alpha_elf_tdata (abfd)->find_line_info = fi;
9e756d64 1521
a7519a3c 1522 /* Note that we don't bother to ever free this information.
07d6d2b8
AM
1523 find_nearest_line is either called all the time, as in
1524 objdump -l, so the information should be saved, or it is
1525 rarely called, as in ld error messages, so the memory
1526 wasted is unimportant. Still, it would probably be a
1527 good idea for free_cached_info to throw it away. */
a7519a3c 1528 }
9e756d64 1529
a7519a3c
RH
1530 if (_bfd_ecoff_locate_line (abfd, section, offset, &fi->d, swap,
1531 &fi->i, filename_ptr, functionname_ptr,
1532 line_ptr))
1533 {
1534 msec->flags = origflags;
1535 return TRUE;
1536 }
9e756d64 1537
a7519a3c 1538 msec->flags = origflags;
9e756d64 1539 }
9e756d64 1540
a7519a3c 1541 /* Fall back on the generic ELF find_nearest_line routine. */
9e756d64 1542
fb167eb2 1543 return _bfd_elf_find_nearest_line (abfd, symbols, section, offset,
a7519a3c 1544 filename_ptr, functionname_ptr,
fb167eb2 1545 line_ptr, discriminator_ptr);
9e756d64 1546}
a7519a3c
RH
1547\f
1548/* Structure used to pass information to alpha_elf_output_extsym. */
9e756d64 1549
a7519a3c 1550struct extsym_info
9e756d64 1551{
a7519a3c
RH
1552 bfd *abfd;
1553 struct bfd_link_info *info;
1554 struct ecoff_debug_info *debug;
1555 const struct ecoff_debug_swap *swap;
1556 bfd_boolean failed;
1557};
9e756d64 1558
a7519a3c 1559static bfd_boolean
2c3fc389 1560elf64_alpha_output_extsym (struct alpha_elf_link_hash_entry *h, void * data)
a7519a3c
RH
1561{
1562 struct extsym_info *einfo = (struct extsym_info *) data;
1563 bfd_boolean strip;
1564 asection *sec, *output_section;
9e756d64 1565
a7519a3c
RH
1566 if (h->root.indx == -2)
1567 strip = FALSE;
1568 else if ((h->root.def_dynamic
1569 || h->root.ref_dynamic
1570 || h->root.root.type == bfd_link_hash_new)
1571 && !h->root.def_regular
1572 && !h->root.ref_regular)
1573 strip = TRUE;
1574 else if (einfo->info->strip == strip_all
1575 || (einfo->info->strip == strip_some
1576 && bfd_hash_lookup (einfo->info->keep_hash,
1577 h->root.root.root.string,
1578 FALSE, FALSE) == NULL))
1579 strip = TRUE;
1580 else
1581 strip = FALSE;
9e756d64 1582
a7519a3c 1583 if (strip)
b34976b6 1584 return TRUE;
9e756d64 1585
a7519a3c 1586 if (h->esym.ifd == -2)
9e756d64 1587 {
a7519a3c
RH
1588 h->esym.jmptbl = 0;
1589 h->esym.cobol_main = 0;
1590 h->esym.weakext = 0;
1591 h->esym.reserved = 0;
1592 h->esym.ifd = ifdNil;
1593 h->esym.asym.value = 0;
1594 h->esym.asym.st = stGlobal;
9e756d64 1595
a7519a3c
RH
1596 if (h->root.root.type != bfd_link_hash_defined
1597 && h->root.root.type != bfd_link_hash_defweak)
1598 h->esym.asym.sc = scAbs;
1599 else
1600 {
1601 const char *name;
9e756d64 1602
a7519a3c
RH
1603 sec = h->root.root.u.def.section;
1604 output_section = sec->output_section;
9e756d64 1605
a7519a3c
RH
1606 /* When making a shared library and symbol h is the one from
1607 the another shared library, OUTPUT_SECTION may be null. */
1608 if (output_section == NULL)
1609 h->esym.asym.sc = scUndefined;
1610 else
1611 {
fd361982 1612 name = bfd_section_name (output_section);
9e756d64 1613
a7519a3c
RH
1614 if (strcmp (name, ".text") == 0)
1615 h->esym.asym.sc = scText;
1616 else if (strcmp (name, ".data") == 0)
1617 h->esym.asym.sc = scData;
1618 else if (strcmp (name, ".sdata") == 0)
1619 h->esym.asym.sc = scSData;
1620 else if (strcmp (name, ".rodata") == 0
1621 || strcmp (name, ".rdata") == 0)
1622 h->esym.asym.sc = scRData;
1623 else if (strcmp (name, ".bss") == 0)
1624 h->esym.asym.sc = scBss;
1625 else if (strcmp (name, ".sbss") == 0)
1626 h->esym.asym.sc = scSBss;
1627 else if (strcmp (name, ".init") == 0)
1628 h->esym.asym.sc = scInit;
1629 else if (strcmp (name, ".fini") == 0)
1630 h->esym.asym.sc = scFini;
1631 else
1632 h->esym.asym.sc = scAbs;
1633 }
1634 }
9e756d64 1635
a7519a3c
RH
1636 h->esym.asym.reserved = 0;
1637 h->esym.asym.index = indexNil;
1638 }
9e756d64 1639
a7519a3c
RH
1640 if (h->root.root.type == bfd_link_hash_common)
1641 h->esym.asym.value = h->root.root.u.c.size;
1642 else if (h->root.root.type == bfd_link_hash_defined
1643 || h->root.root.type == bfd_link_hash_defweak)
1644 {
1645 if (h->esym.asym.sc == scCommon)
1646 h->esym.asym.sc = scBss;
1647 else if (h->esym.asym.sc == scSCommon)
1648 h->esym.asym.sc = scSBss;
9e756d64 1649
a7519a3c
RH
1650 sec = h->root.root.u.def.section;
1651 output_section = sec->output_section;
1652 if (output_section != NULL)
1653 h->esym.asym.value = (h->root.root.u.def.value
1654 + sec->output_offset
1655 + output_section->vma);
1656 else
1657 h->esym.asym.value = 0;
1658 }
9e756d64 1659
a7519a3c
RH
1660 if (! bfd_ecoff_debug_one_external (einfo->abfd, einfo->debug, einfo->swap,
1661 h->root.root.root.string,
1662 &h->esym))
1663 {
1664 einfo->failed = TRUE;
1665 return FALSE;
9e756d64
RH
1666 }
1667
a7519a3c
RH
1668 return TRUE;
1669}
1670\f
1671/* Search for and possibly create a got entry. */
9e756d64 1672
a7519a3c
RH
1673static struct alpha_elf_got_entry *
1674get_got_entry (bfd *abfd, struct alpha_elf_link_hash_entry *h,
1675 unsigned long r_type, unsigned long r_symndx,
1676 bfd_vma r_addend)
1677{
1678 struct alpha_elf_got_entry *gotent;
1679 struct alpha_elf_got_entry **slot;
9e756d64 1680
a7519a3c
RH
1681 if (h)
1682 slot = &h->got_entries;
1683 else
1684 {
1685 /* This is a local .got entry -- record for merge. */
9e756d64 1686
a7519a3c 1687 struct alpha_elf_got_entry **local_got_entries;
9e756d64 1688
a7519a3c
RH
1689 local_got_entries = alpha_elf_tdata(abfd)->local_got_entries;
1690 if (!local_got_entries)
1691 {
1692 bfd_size_type size;
1693 Elf_Internal_Shdr *symtab_hdr;
9e756d64 1694
a7519a3c
RH
1695 symtab_hdr = &elf_tdata(abfd)->symtab_hdr;
1696 size = symtab_hdr->sh_info;
1697 size *= sizeof (struct alpha_elf_got_entry *);
9e756d64 1698
a7519a3c
RH
1699 local_got_entries
1700 = (struct alpha_elf_got_entry **) bfd_zalloc (abfd, size);
1701 if (!local_got_entries)
1702 return NULL;
1703
1704 alpha_elf_tdata (abfd)->local_got_entries = local_got_entries;
1705 }
1706
1707 slot = &local_got_entries[r_symndx];
9e756d64
RH
1708 }
1709
a7519a3c
RH
1710 for (gotent = *slot; gotent ; gotent = gotent->next)
1711 if (gotent->gotobj == abfd
1712 && gotent->reloc_type == r_type
1713 && gotent->addend == r_addend)
1714 break;
1715
1716 if (!gotent)
9e756d64 1717 {
a7519a3c 1718 int entry_size;
986f0783 1719 size_t amt;
9e756d64 1720
a7519a3c
RH
1721 amt = sizeof (struct alpha_elf_got_entry);
1722 gotent = (struct alpha_elf_got_entry *) bfd_alloc (abfd, amt);
1723 if (!gotent)
1724 return NULL;
9e756d64 1725
a7519a3c
RH
1726 gotent->gotobj = abfd;
1727 gotent->addend = r_addend;
1728 gotent->got_offset = -1;
6ec7057a 1729 gotent->plt_offset = -1;
a7519a3c
RH
1730 gotent->use_count = 1;
1731 gotent->reloc_type = r_type;
1732 gotent->reloc_done = 0;
1733 gotent->reloc_xlated = 0;
9e756d64 1734
a7519a3c
RH
1735 gotent->next = *slot;
1736 *slot = gotent;
9e756d64 1737
a7519a3c
RH
1738 entry_size = alpha_got_entry_size (r_type);
1739 alpha_elf_tdata (abfd)->total_got_size += entry_size;
1740 if (!h)
1741 alpha_elf_tdata(abfd)->local_got_size += entry_size;
9e756d64 1742 }
a7519a3c
RH
1743 else
1744 gotent->use_count += 1;
9e756d64 1745
a7519a3c 1746 return gotent;
9e756d64
RH
1747}
1748
6ec7057a
RH
1749static bfd_boolean
1750elf64_alpha_want_plt (struct alpha_elf_link_hash_entry *ah)
1751{
1752 return ((ah->root.type == STT_FUNC
1753 || ah->root.root.type == bfd_link_hash_undefweak
1754 || ah->root.root.type == bfd_link_hash_undefined)
8288a39e
RH
1755 && (ah->flags & ALPHA_ELF_LINK_HASH_LU_PLT) != 0
1756 && (ah->flags & ~ALPHA_ELF_LINK_HASH_LU_PLT) == 0);
6ec7057a
RH
1757}
1758
6fc5bb57
AM
1759/* Whether to sort relocs output by ld -r or ld --emit-relocs, by r_offset.
1760 Don't do so for code sections. We want to keep ordering of LITERAL/LITUSE
1761 as is. On the other hand, elf-eh-frame.c processing requires .eh_frame
1762 relocs to be sorted. */
1763
1764static bfd_boolean
1765elf64_alpha_sort_relocs_p (asection *sec)
1766{
1767 return (sec->flags & SEC_CODE) == 0;
1768}
1769
1770
a7519a3c
RH
1771/* Handle dynamic relocations when doing an Alpha ELF link. */
1772
b34976b6 1773static bfd_boolean
a7519a3c
RH
1774elf64_alpha_check_relocs (bfd *abfd, struct bfd_link_info *info,
1775 asection *sec, const Elf_Internal_Rela *relocs)
252b5132 1776{
a7519a3c
RH
1777 bfd *dynobj;
1778 asection *sreloc;
252b5132 1779 Elf_Internal_Shdr *symtab_hdr;
a7519a3c
RH
1780 struct alpha_elf_link_hash_entry **sym_hashes;
1781 const Elf_Internal_Rela *rel, *relend;
252b5132 1782
0e1862bb 1783 if (bfd_link_relocatable (info))
a7519a3c 1784 return TRUE;
252b5132 1785
0ffa91dd
NC
1786 BFD_ASSERT (is_alpha_elf (abfd));
1787
1788 dynobj = elf_hash_table (info)->dynobj;
a7519a3c 1789 if (dynobj == NULL)
0ffa91dd 1790 elf_hash_table (info)->dynobj = dynobj = abfd;
252b5132 1791
a7519a3c 1792 sreloc = NULL;
0ffa91dd
NC
1793 symtab_hdr = &elf_symtab_hdr (abfd);
1794 sym_hashes = alpha_elf_sym_hashes (abfd);
a7519a3c
RH
1795
1796 relend = relocs + sec->reloc_count;
1797 for (rel = relocs; rel < relend; ++rel)
1798 {
1799 enum {
1800 NEED_GOT = 1,
1801 NEED_GOT_ENTRY = 2,
1802 NEED_DYNREL = 4
1803 };
1804
1805 unsigned long r_symndx, r_type;
1806 struct alpha_elf_link_hash_entry *h;
1807 unsigned int gotent_flags;
1808 bfd_boolean maybe_dynamic;
1809 unsigned int need;
1810 bfd_vma addend;
1811
1812 r_symndx = ELF64_R_SYM (rel->r_info);
1813 if (r_symndx < symtab_hdr->sh_info)
1814 h = NULL;
1815 else
1816 {
1817 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
252b5132 1818
a7519a3c
RH
1819 while (h->root.root.type == bfd_link_hash_indirect
1820 || h->root.root.type == bfd_link_hash_warning)
1821 h = (struct alpha_elf_link_hash_entry *)h->root.root.u.i.link;
252b5132 1822
81fbe831
AM
1823 /* PR15323, ref flags aren't set for references in the same
1824 object. */
a7519a3c
RH
1825 h->root.ref_regular = 1;
1826 }
252b5132 1827
a7519a3c 1828 /* We can only get preliminary data on whether a symbol is
07d6d2b8
AM
1829 locally or externally defined, as not all of the input files
1830 have yet been processed. Do something with what we know, as
1831 this may help reduce memory usage and processing time later. */
a7519a3c 1832 maybe_dynamic = FALSE;
0e1862bb 1833 if (h && ((bfd_link_pic (info)
a7519a3c
RH
1834 && (!info->symbolic
1835 || info->unresolved_syms_in_shared_libs == RM_IGNORE))
1836 || !h->root.def_regular
1837 || h->root.root.type == bfd_link_hash_defweak))
07d6d2b8 1838 maybe_dynamic = TRUE;
252b5132 1839
a7519a3c
RH
1840 need = 0;
1841 gotent_flags = 0;
1842 r_type = ELF64_R_TYPE (rel->r_info);
1843 addend = rel->r_addend;
9e756d64 1844
9e756d64
RH
1845 switch (r_type)
1846 {
1847 case R_ALPHA_LITERAL:
a7519a3c
RH
1848 need = NEED_GOT | NEED_GOT_ENTRY;
1849
1850 /* Remember how this literal is used from its LITUSEs.
1851 This will be important when it comes to decide if we can
1852 create a .plt entry for a function symbol. */
1853 while (++rel < relend && ELF64_R_TYPE (rel->r_info) == R_ALPHA_LITUSE)
8288a39e 1854 if (rel->r_addend >= 1 && rel->r_addend <= 6)
a7519a3c
RH
1855 gotent_flags |= 1 << rel->r_addend;
1856 --rel;
1857
1858 /* No LITUSEs -- presumably the address is used somehow. */
1859 if (gotent_flags == 0)
1860 gotent_flags = ALPHA_ELF_LINK_HASH_LU_ADDR;
1861 break;
1862
1863 case R_ALPHA_GPDISP:
1864 case R_ALPHA_GPREL16:
1865 case R_ALPHA_GPREL32:
9e756d64
RH
1866 case R_ALPHA_GPRELHIGH:
1867 case R_ALPHA_GPRELLOW:
a7519a3c
RH
1868 case R_ALPHA_BRSGP:
1869 need = NEED_GOT;
1870 break;
1871
1872 case R_ALPHA_REFLONG:
1873 case R_ALPHA_REFQUAD:
0e1862bb 1874 if (bfd_link_pic (info) || maybe_dynamic)
a7519a3c 1875 need = NEED_DYNREL;
cc03ec80
RH
1876 break;
1877
9e756d64 1878 case R_ALPHA_TLSLDM:
cc03ec80 1879 /* The symbol for a TLSLDM reloc is ignored. Collapse the
cf35638d
TS
1880 reloc to the STN_UNDEF (0) symbol so that they all match. */
1881 r_symndx = STN_UNDEF;
a7519a3c
RH
1882 h = 0;
1883 maybe_dynamic = FALSE;
1884 /* FALLTHRU */
1885
1886 case R_ALPHA_TLSGD:
1887 case R_ALPHA_GOTDTPREL:
1888 need = NEED_GOT | NEED_GOT_ENTRY;
9e756d64 1889 break;
cc03ec80 1890
a7519a3c
RH
1891 case R_ALPHA_GOTTPREL:
1892 need = NEED_GOT | NEED_GOT_ENTRY;
1893 gotent_flags = ALPHA_ELF_LINK_HASH_TLS_IE;
0e1862bb 1894 if (bfd_link_pic (info))
a7519a3c
RH
1895 info->flags |= DF_STATIC_TLS;
1896 break;
1897
1898 case R_ALPHA_TPREL64:
3cbc1e5e 1899 if (bfd_link_dll (info))
e366eeae
RH
1900 {
1901 info->flags |= DF_STATIC_TLS;
1902 need = NEED_DYNREL;
1903 }
1904 else if (maybe_dynamic)
a7519a3c 1905 need = NEED_DYNREL;
a7519a3c 1906 break;
252b5132
RH
1907 }
1908
a7519a3c 1909 if (need & NEED_GOT)
252b5132 1910 {
85d162e6 1911 if (alpha_elf_tdata(abfd)->gotobj == NULL)
6cdc0ccc 1912 {
a7519a3c
RH
1913 if (!elf64_alpha_create_got_section (abfd, info))
1914 return FALSE;
c328dc3f 1915 }
252b5132 1916 }
252b5132 1917
a7519a3c
RH
1918 if (need & NEED_GOT_ENTRY)
1919 {
1920 struct alpha_elf_got_entry *gotent;
252b5132 1921
a7519a3c
RH
1922 gotent = get_got_entry (abfd, h, r_type, r_symndx, addend);
1923 if (!gotent)
1924 return FALSE;
4a67a098 1925
a7519a3c 1926 if (gotent_flags)
cc03ec80 1927 {
a7519a3c
RH
1928 gotent->flags |= gotent_flags;
1929 if (h)
1930 {
1931 gotent_flags |= h->flags;
1932 h->flags = gotent_flags;
4a67a098 1933
a7519a3c 1934 /* Make a guess as to whether a .plt entry is needed. */
6ec7057a
RH
1935 /* ??? It appears that we won't make it into
1936 adjust_dynamic_symbol for symbols that remain
1937 totally undefined. Copying this check here means
1938 we can create a plt entry for them too. */
1939 h->root.needs_plt
1940 = (maybe_dynamic && elf64_alpha_want_plt (h));
1941 }
a7519a3c 1942 }
252b5132
RH
1943 }
1944
a7519a3c 1945 if (need & NEED_DYNREL)
9e756d64 1946 {
a7519a3c
RH
1947 /* We need to create the section here now whether we eventually
1948 use it or not so that it gets mapped to an output section by
83bac4b0 1949 the linker. If not used, we'll kill it in size_dynamic_sections. */
a7519a3c 1950 if (sreloc == NULL)
9e756d64 1951 {
83bac4b0
NC
1952 sreloc = _bfd_elf_make_dynamic_reloc_section
1953 (sec, dynobj, 3, abfd, /*rela?*/ TRUE);
1954
a7519a3c 1955 if (sreloc == NULL)
83bac4b0 1956 return FALSE;
9e756d64 1957 }
252b5132 1958
a7519a3c
RH
1959 if (h)
1960 {
1961 /* Since we havn't seen all of the input symbols yet, we
1962 don't know whether we'll actually need a dynamic relocation
1963 entry for this reloc. So make a record of it. Once we
1964 find out if this thing needs dynamic relocation we'll
1965 expand the relocation sections by the appropriate amount. */
9e756d64 1966
a7519a3c 1967 struct alpha_elf_reloc_entry *rent;
9e756d64 1968
a7519a3c
RH
1969 for (rent = h->reloc_entries; rent; rent = rent->next)
1970 if (rent->rtype == r_type && rent->srel == sreloc)
1971 break;
252b5132 1972
a7519a3c
RH
1973 if (!rent)
1974 {
986f0783 1975 size_t amt = sizeof (struct alpha_elf_reloc_entry);
a7519a3c
RH
1976 rent = (struct alpha_elf_reloc_entry *) bfd_alloc (abfd, amt);
1977 if (!rent)
1978 return FALSE;
252b5132 1979
a7519a3c 1980 rent->srel = sreloc;
1f7f2abb 1981 rent->sec = sec;
a7519a3c
RH
1982 rent->rtype = r_type;
1983 rent->count = 1;
252b5132 1984
a7519a3c
RH
1985 rent->next = h->reloc_entries;
1986 h->reloc_entries = rent;
1987 }
1988 else
1989 rent->count++;
1990 }
0e1862bb 1991 else if (bfd_link_pic (info))
a7519a3c
RH
1992 {
1993 /* If this is a shared library, and the section is to be
1994 loaded into memory, we need a RELATIVE reloc. */
1995 sreloc->size += sizeof (Elf64_External_Rela);
1996 if (sec->flags & SEC_READONLY)
1f7f2abb
L
1997 {
1998 info->flags |= DF_TEXTREL;
1999 info->callbacks->minfo
2000 (_("%pB: dynamic relocation against `%pT' in "
2001 "read-only section `%pA'\n"),
2002 sec->owner, h->root.root.root.string, sec);
2003 }
a7519a3c 2004 }
252b5132
RH
2005 }
2006 }
2007
b34976b6 2008 return TRUE;
252b5132 2009}
252b5132 2010
e117360e
RH
2011/* Return the section that should be marked against GC for a given
2012 relocation. */
2013
2014static asection *
2015elf64_alpha_gc_mark_hook (asection *sec, struct bfd_link_info *info,
2016 Elf_Internal_Rela *rel,
2017 struct elf_link_hash_entry *h, Elf_Internal_Sym *sym)
2018{
2019 /* These relocations don't really reference a symbol. Instead we store
2020 extra data in their addend slot. Ignore the symbol. */
2021 switch (ELF64_R_TYPE (rel->r_info))
2022 {
2023 case R_ALPHA_LITUSE:
2024 case R_ALPHA_GPDISP:
2025 case R_ALPHA_HINT:
2026 return NULL;
2027 }
2028
2029 return _bfd_elf_gc_mark_hook (sec, info, rel, h, sym);
2030}
2031
a7519a3c
RH
2032/* Adjust a symbol defined by a dynamic object and referenced by a
2033 regular object. The current definition is in some section of the
2034 dynamic object, but we're not including those sections. We have to
2035 change the definition to something the rest of the link can
2036 understand. */
252b5132 2037
b34976b6 2038static bfd_boolean
a7519a3c
RH
2039elf64_alpha_adjust_dynamic_symbol (struct bfd_link_info *info,
2040 struct elf_link_hash_entry *h)
252b5132 2041{
a7519a3c
RH
2042 bfd *dynobj;
2043 asection *s;
2044 struct alpha_elf_link_hash_entry *ah;
252b5132 2045
a7519a3c
RH
2046 dynobj = elf_hash_table(info)->dynobj;
2047 ah = (struct alpha_elf_link_hash_entry *)h;
252b5132 2048
a7519a3c 2049 /* Now that we've seen all of the input symbols, finalize our decision
6ec7057a
RH
2050 about whether this symbol should get a .plt entry. Irritatingly, it
2051 is common for folk to leave undefined symbols in shared libraries,
2052 and they still expect lazy binding; accept undefined symbols in lieu
2053 of STT_FUNC. */
2054 if (alpha_elf_dynamic_symbol_p (h, info) && elf64_alpha_want_plt (ah))
252b5132 2055 {
6ec7057a 2056 h->needs_plt = TRUE;
252b5132 2057
ce558b89 2058 s = elf_hash_table(info)->splt;
a7519a3c
RH
2059 if (!s && !elf64_alpha_create_dynamic_sections (dynobj, info))
2060 return FALSE;
204692d7 2061
6ec7057a
RH
2062 /* We need one plt entry per got subsection. Delay allocation of
2063 the actual plt entries until size_plt_section, called from
2064 size_dynamic_sections or during relaxation. */
252b5132 2065
a7519a3c
RH
2066 return TRUE;
2067 }
2068 else
6ec7057a 2069 h->needs_plt = FALSE;
252b5132 2070
a7519a3c
RH
2071 /* If this is a weak symbol, and there is a real definition, the
2072 processor independent code will have arranged for us to see the
2073 real definition first, and we can just use the same value. */
60d67dc8 2074 if (h->is_weakalias)
252b5132 2075 {
60d67dc8
AM
2076 struct elf_link_hash_entry *def = weakdef (h);
2077 BFD_ASSERT (def->root.type == bfd_link_hash_defined);
2078 h->root.u.def.section = def->root.u.def.section;
2079 h->root.u.def.value = def->root.u.def.value;
a7519a3c 2080 return TRUE;
252b5132 2081 }
a7519a3c
RH
2082
2083 /* This is a reference to a symbol defined by a dynamic object which
2084 is not a function. The Alpha, since it uses .got entries for all
2085 symbols even in regular objects, does not need the hackery of a
2086 .dynbss section and COPY dynamic relocations. */
252b5132 2087
b34976b6 2088 return TRUE;
252b5132
RH
2089}
2090
747ffa7b
AM
2091/* Record STO_ALPHA_NOPV and STO_ALPHA_STD_GPLOAD. */
2092
2093static void
2094elf64_alpha_merge_symbol_attribute (struct elf_link_hash_entry *h,
2095 const Elf_Internal_Sym *isym,
2096 bfd_boolean definition,
2097 bfd_boolean dynamic)
2098{
2099 if (!dynamic && definition)
2100 h->other = ((h->other & ELF_ST_VISIBILITY (-1))
2101 | (isym->st_other & ~ELF_ST_VISIBILITY (-1)));
2102}
2103
a7519a3c
RH
2104/* Symbol versioning can create new symbols, and make our old symbols
2105 indirect to the new ones. Consolidate the got and reloc information
2106 in these situations. */
252b5132 2107
48f4b4f5
RH
2108static void
2109elf64_alpha_copy_indirect_symbol (struct bfd_link_info *info,
2110 struct elf_link_hash_entry *dir,
2111 struct elf_link_hash_entry *ind)
252b5132 2112{
48f4b4f5
RH
2113 struct alpha_elf_link_hash_entry *hi
2114 = (struct alpha_elf_link_hash_entry *) ind;
2115 struct alpha_elf_link_hash_entry *hs
2116 = (struct alpha_elf_link_hash_entry *) dir;
252b5132 2117
48f4b4f5
RH
2118 /* Do the merging in the superclass. */
2119 _bfd_elf_link_hash_copy_indirect(info, dir, ind);
252b5132 2120
a7519a3c 2121 /* Merge the flags. Whee. */
a7519a3c
RH
2122 hs->flags |= hi->flags;
2123
48f4b4f5
RH
2124 /* ??? It's unclear to me what's really supposed to happen when
2125 "merging" defweak and defined symbols, given that we don't
2126 actually throw away the defweak. This more-or-less copies
2127 the logic related to got and plt entries in the superclass. */
2128 if (ind->root.type != bfd_link_hash_indirect)
2129 return;
2130
a7519a3c
RH
2131 /* Merge the .got entries. Cannibalize the old symbol's list in
2132 doing so, since we don't need it anymore. */
2133
2134 if (hs->got_entries == NULL)
2135 hs->got_entries = hi->got_entries;
2136 else
2137 {
2138 struct alpha_elf_got_entry *gi, *gs, *gin, *gsh;
2139
2140 gsh = hs->got_entries;
2141 for (gi = hi->got_entries; gi ; gi = gin)
252b5132 2142 {
a7519a3c
RH
2143 gin = gi->next;
2144 for (gs = gsh; gs ; gs = gs->next)
2145 if (gi->gotobj == gs->gotobj
2146 && gi->reloc_type == gs->reloc_type
2147 && gi->addend == gs->addend)
2148 {
68994ca2 2149 gs->use_count += gi->use_count;
07d6d2b8 2150 goto got_found;
a7519a3c
RH
2151 }
2152 gi->next = hs->got_entries;
2153 hs->got_entries = gi;
2154 got_found:;
252b5132 2155 }
a7519a3c
RH
2156 }
2157 hi->got_entries = NULL;
252b5132 2158
a7519a3c
RH
2159 /* And similar for the reloc entries. */
2160
2161 if (hs->reloc_entries == NULL)
2162 hs->reloc_entries = hi->reloc_entries;
2163 else
2164 {
2165 struct alpha_elf_reloc_entry *ri, *rs, *rin, *rsh;
2166
2167 rsh = hs->reloc_entries;
2168 for (ri = hi->reloc_entries; ri ; ri = rin)
2169 {
2170 rin = ri->next;
2171 for (rs = rsh; rs ; rs = rs->next)
2172 if (ri->rtype == rs->rtype && ri->srel == rs->srel)
2173 {
2174 rs->count += ri->count;
2175 goto found_reloc;
2176 }
2177 ri->next = hs->reloc_entries;
2178 hs->reloc_entries = ri;
2179 found_reloc:;
2180 }
252b5132 2181 }
a7519a3c 2182 hi->reloc_entries = NULL;
252b5132
RH
2183}
2184
a7519a3c 2185/* Is it possible to merge two object file's .got tables? */
252b5132 2186
b34976b6 2187static bfd_boolean
a7519a3c 2188elf64_alpha_can_merge_gots (bfd *a, bfd *b)
252b5132 2189{
a7519a3c
RH
2190 int total = alpha_elf_tdata (a)->total_got_size;
2191 bfd *bsub;
252b5132 2192
a7519a3c
RH
2193 /* Trivial quick fallout test. */
2194 if (total + alpha_elf_tdata (b)->total_got_size <= MAX_GOT_SIZE)
2195 return TRUE;
252b5132 2196
a7519a3c
RH
2197 /* By their nature, local .got entries cannot be merged. */
2198 if ((total += alpha_elf_tdata (b)->local_got_size) > MAX_GOT_SIZE)
b34976b6 2199 return FALSE;
252b5132 2200
a7519a3c
RH
2201 /* Failing the common trivial comparison, we must effectively
2202 perform the merge. Not actually performing the merge means that
2203 we don't have to store undo information in case we fail. */
2204 for (bsub = b; bsub ; bsub = alpha_elf_tdata (bsub)->in_got_link_next)
2205 {
2206 struct alpha_elf_link_hash_entry **hashes = alpha_elf_sym_hashes (bsub);
2207 Elf_Internal_Shdr *symtab_hdr = &elf_tdata (bsub)->symtab_hdr;
2208 int i, n;
2209
2210 n = NUM_SHDR_ENTRIES (symtab_hdr) - symtab_hdr->sh_info;
2211 for (i = 0; i < n; ++i)
2212 {
2213 struct alpha_elf_got_entry *ae, *be;
2214 struct alpha_elf_link_hash_entry *h;
2215
2216 h = hashes[i];
2217 while (h->root.root.type == bfd_link_hash_indirect
07d6d2b8 2218 || h->root.root.type == bfd_link_hash_warning)
a7519a3c
RH
2219 h = (struct alpha_elf_link_hash_entry *)h->root.root.u.i.link;
2220
2221 for (be = h->got_entries; be ; be = be->next)
2222 {
2223 if (be->use_count == 0)
07d6d2b8 2224 continue;
a7519a3c 2225 if (be->gotobj != b)
07d6d2b8 2226 continue;
a7519a3c
RH
2227
2228 for (ae = h->got_entries; ae ; ae = ae->next)
07d6d2b8 2229 if (ae->gotobj == a
a7519a3c
RH
2230 && ae->reloc_type == be->reloc_type
2231 && ae->addend == be->addend)
2232 goto global_found;
2233
2234 total += alpha_got_entry_size (be->reloc_type);
2235 if (total > MAX_GOT_SIZE)
07d6d2b8 2236 return FALSE;
a7519a3c
RH
2237 global_found:;
2238 }
2239 }
2240 }
252b5132 2241
b34976b6 2242 return TRUE;
252b5132
RH
2243}
2244
a7519a3c 2245/* Actually merge two .got tables. */
252b5132 2246
a7519a3c
RH
2247static void
2248elf64_alpha_merge_gots (bfd *a, bfd *b)
252b5132 2249{
a7519a3c
RH
2250 int total = alpha_elf_tdata (a)->total_got_size;
2251 bfd *bsub;
252b5132 2252
a7519a3c
RH
2253 /* Remember local expansion. */
2254 {
2255 int e = alpha_elf_tdata (b)->local_got_size;
2256 total += e;
2257 alpha_elf_tdata (a)->local_got_size += e;
2258 }
252b5132 2259
a7519a3c
RH
2260 for (bsub = b; bsub ; bsub = alpha_elf_tdata (bsub)->in_got_link_next)
2261 {
2262 struct alpha_elf_got_entry **local_got_entries;
2263 struct alpha_elf_link_hash_entry **hashes;
2264 Elf_Internal_Shdr *symtab_hdr;
2265 int i, n;
252b5132 2266
a7519a3c
RH
2267 /* Let the local .got entries know they are part of a new subsegment. */
2268 local_got_entries = alpha_elf_tdata (bsub)->local_got_entries;
2269 if (local_got_entries)
07d6d2b8 2270 {
a7519a3c
RH
2271 n = elf_tdata (bsub)->symtab_hdr.sh_info;
2272 for (i = 0; i < n; ++i)
2273 {
2274 struct alpha_elf_got_entry *ent;
2275 for (ent = local_got_entries[i]; ent; ent = ent->next)
07d6d2b8 2276 ent->gotobj = a;
a7519a3c 2277 }
07d6d2b8 2278 }
252b5132 2279
a7519a3c
RH
2280 /* Merge the global .got entries. */
2281 hashes = alpha_elf_sym_hashes (bsub);
2282 symtab_hdr = &elf_tdata (bsub)->symtab_hdr;
252b5132 2283
a7519a3c
RH
2284 n = NUM_SHDR_ENTRIES (symtab_hdr) - symtab_hdr->sh_info;
2285 for (i = 0; i < n; ++i)
07d6d2b8 2286 {
a7519a3c
RH
2287 struct alpha_elf_got_entry *ae, *be, **pbe, **start;
2288 struct alpha_elf_link_hash_entry *h;
252b5132 2289
a7519a3c
RH
2290 h = hashes[i];
2291 while (h->root.root.type == bfd_link_hash_indirect
07d6d2b8 2292 || h->root.root.type == bfd_link_hash_warning)
a7519a3c 2293 h = (struct alpha_elf_link_hash_entry *)h->root.root.u.i.link;
252b5132 2294
a7519a3c
RH
2295 pbe = start = &h->got_entries;
2296 while ((be = *pbe) != NULL)
2297 {
2298 if (be->use_count == 0)
07d6d2b8 2299 {
a7519a3c
RH
2300 *pbe = be->next;
2301 memset (be, 0xa5, sizeof (*be));
2302 goto kill;
07d6d2b8 2303 }
a7519a3c 2304 if (be->gotobj != b)
07d6d2b8 2305 goto next;
a7519a3c
RH
2306
2307 for (ae = *start; ae ; ae = ae->next)
07d6d2b8 2308 if (ae->gotobj == a
a7519a3c
RH
2309 && ae->reloc_type == be->reloc_type
2310 && ae->addend == be->addend)
2311 {
2312 ae->flags |= be->flags;
2313 ae->use_count += be->use_count;
2314 *pbe = be->next;
2315 memset (be, 0xa5, sizeof (*be));
2316 goto kill;
2317 }
2318 be->gotobj = a;
2319 total += alpha_got_entry_size (be->reloc_type);
252b5132 2320
a7519a3c
RH
2321 next:;
2322 pbe = &be->next;
2323 kill:;
2324 }
07d6d2b8 2325 }
252b5132 2326
a7519a3c
RH
2327 alpha_elf_tdata (bsub)->gotobj = a;
2328 }
2329 alpha_elf_tdata (a)->total_got_size = total;
252b5132 2330
a7519a3c
RH
2331 /* Merge the two in_got chains. */
2332 {
2333 bfd *next;
252b5132 2334
a7519a3c
RH
2335 bsub = a;
2336 while ((next = alpha_elf_tdata (bsub)->in_got_link_next) != NULL)
2337 bsub = next;
252b5132 2338
a7519a3c
RH
2339 alpha_elf_tdata (bsub)->in_got_link_next = b;
2340 }
252b5132 2341}
a7519a3c
RH
2342
2343/* Calculate the offsets for the got entries. */
252b5132 2344
b34976b6 2345static bfd_boolean
a7519a3c 2346elf64_alpha_calc_got_offsets_for_symbol (struct alpha_elf_link_hash_entry *h,
2c3fc389 2347 void * arg ATTRIBUTE_UNUSED)
252b5132 2348{
a7519a3c 2349 struct alpha_elf_got_entry *gotent;
252b5132 2350
a7519a3c
RH
2351 for (gotent = h->got_entries; gotent; gotent = gotent->next)
2352 if (gotent->use_count > 0)
2353 {
2354 struct alpha_elf_obj_tdata *td;
2355 bfd_size_type *plge;
252b5132 2356
a7519a3c 2357 td = alpha_elf_tdata (gotent->gotobj);
a7519a3c
RH
2358 plge = &td->got->size;
2359 gotent->got_offset = *plge;
2360 *plge += alpha_got_entry_size (gotent->reloc_type);
2361 }
252b5132 2362
6ec7057a 2363 return TRUE;
a7519a3c 2364}
252b5132 2365
a7519a3c
RH
2366static void
2367elf64_alpha_calc_got_offsets (struct bfd_link_info *info)
2368{
4dfe6ac6
NC
2369 bfd *i, *got_list;
2370 struct alpha_elf_link_hash_table * htab;
2371
2372 htab = alpha_elf_hash_table (info);
2373 if (htab == NULL)
2374 return;
2375 got_list = htab->got_list;
252b5132 2376
a7519a3c
RH
2377 /* First, zero out the .got sizes, as we may be recalculating the
2378 .got after optimizing it. */
2379 for (i = got_list; i ; i = alpha_elf_tdata(i)->got_link_next)
2380 alpha_elf_tdata(i)->got->size = 0;
252b5132 2381
a7519a3c 2382 /* Next, fill in the offsets for all the global entries. */
4dfe6ac6 2383 alpha_elf_link_hash_traverse (htab,
a7519a3c
RH
2384 elf64_alpha_calc_got_offsets_for_symbol,
2385 NULL);
252b5132 2386
a7519a3c
RH
2387 /* Finally, fill in the offsets for the local entries. */
2388 for (i = got_list; i ; i = alpha_elf_tdata(i)->got_link_next)
2389 {
2390 bfd_size_type got_offset = alpha_elf_tdata(i)->got->size;
2391 bfd *j;
252b5132 2392
a7519a3c
RH
2393 for (j = i; j ; j = alpha_elf_tdata(j)->in_got_link_next)
2394 {
2395 struct alpha_elf_got_entry **local_got_entries, *gotent;
2396 int k, n;
252b5132 2397
a7519a3c
RH
2398 local_got_entries = alpha_elf_tdata(j)->local_got_entries;
2399 if (!local_got_entries)
2400 continue;
252b5132 2401
a7519a3c
RH
2402 for (k = 0, n = elf_tdata(j)->symtab_hdr.sh_info; k < n; ++k)
2403 for (gotent = local_got_entries[k]; gotent; gotent = gotent->next)
2404 if (gotent->use_count > 0)
07d6d2b8 2405 {
a7519a3c
RH
2406 gotent->got_offset = got_offset;
2407 got_offset += alpha_got_entry_size (gotent->reloc_type);
07d6d2b8 2408 }
a7519a3c 2409 }
252b5132 2410
a7519a3c
RH
2411 alpha_elf_tdata(i)->got->size = got_offset;
2412 }
2413}
252b5132 2414
a7519a3c 2415/* Constructs the gots. */
252b5132 2416
b34976b6 2417static bfd_boolean
d1c109de 2418elf64_alpha_size_got_sections (struct bfd_link_info *info,
07d6d2b8 2419 bfd_boolean may_merge)
252b5132 2420{
a7519a3c 2421 bfd *i, *got_list, *cur_got_obj = NULL;
4dfe6ac6 2422 struct alpha_elf_link_hash_table * htab;
252b5132 2423
4dfe6ac6
NC
2424 htab = alpha_elf_hash_table (info);
2425 if (htab == NULL)
2426 return FALSE;
2427 got_list = htab->got_list;
95404643 2428
a7519a3c
RH
2429 /* On the first time through, pretend we have an existing got list
2430 consisting of all of the input files. */
2431 if (got_list == NULL)
252b5132 2432 {
c72f2fb2 2433 for (i = info->input_bfds; i ; i = i->link.next)
252b5132 2434 {
0ffa91dd
NC
2435 bfd *this_got;
2436
2437 if (! is_alpha_elf (i))
2438 continue;
2439
2440 this_got = alpha_elf_tdata (i)->gotobj;
a7519a3c
RH
2441 if (this_got == NULL)
2442 continue;
252b5132 2443
a7519a3c
RH
2444 /* We are assuming no merging has yet occurred. */
2445 BFD_ASSERT (this_got == i);
252b5132 2446
07d6d2b8 2447 if (alpha_elf_tdata (this_got)->total_got_size > MAX_GOT_SIZE)
252b5132 2448 {
a7519a3c 2449 /* Yikes! A single object file has too many entries. */
4eca0228 2450 _bfd_error_handler
695344c0 2451 /* xgettext:c-format */
871b3ab2 2452 (_("%pB: .got subsegment exceeds 64K (size %d)"),
07d6d2b8 2453 i, alpha_elf_tdata (this_got)->total_got_size);
b34976b6 2454 return FALSE;
252b5132 2455 }
252b5132 2456
a7519a3c
RH
2457 if (got_list == NULL)
2458 got_list = this_got;
2459 else
2460 alpha_elf_tdata(cur_got_obj)->got_link_next = this_got;
2461 cur_got_obj = this_got;
252b5132
RH
2462 }
2463
a7519a3c
RH
2464 /* Strange degenerate case of no got references. */
2465 if (got_list == NULL)
2466 return TRUE;
2467
4dfe6ac6 2468 htab->got_list = got_list;
a7519a3c
RH
2469 }
2470
2471 cur_got_obj = got_list;
0ffa91dd
NC
2472 if (cur_got_obj == NULL)
2473 return FALSE;
2474
d1c109de 2475 if (may_merge)
a7519a3c 2476 {
d1c109de
RH
2477 i = alpha_elf_tdata(cur_got_obj)->got_link_next;
2478 while (i != NULL)
252b5132 2479 {
d1c109de
RH
2480 if (elf64_alpha_can_merge_gots (cur_got_obj, i))
2481 {
2482 elf64_alpha_merge_gots (cur_got_obj, i);
252b5132 2483
d1c109de
RH
2484 alpha_elf_tdata(i)->got->size = 0;
2485 i = alpha_elf_tdata(i)->got_link_next;
2486 alpha_elf_tdata(cur_got_obj)->got_link_next = i;
2487 }
2488 else
2489 {
2490 cur_got_obj = i;
2491 i = alpha_elf_tdata(i)->got_link_next;
2492 }
a7519a3c 2493 }
252b5132
RH
2494 }
2495
a7519a3c
RH
2496 /* Once the gots have been merged, fill in the got offsets for
2497 everything therein. */
4a828aab 2498 elf64_alpha_calc_got_offsets (info);
252b5132 2499
a7519a3c 2500 return TRUE;
252b5132 2501}
252b5132 2502
b34976b6 2503static bfd_boolean
2c3fc389
NC
2504elf64_alpha_size_plt_section_1 (struct alpha_elf_link_hash_entry *h,
2505 void * data)
252b5132 2506{
a7519a3c
RH
2507 asection *splt = (asection *) data;
2508 struct alpha_elf_got_entry *gotent;
6ec7057a 2509 bfd_boolean saw_one = FALSE;
252b5132 2510
a7519a3c
RH
2511 /* If we didn't need an entry before, we still don't. */
2512 if (!h->root.needs_plt)
2513 return TRUE;
e92d460e 2514
6ec7057a 2515 /* For each LITERAL got entry still in use, allocate a plt entry. */
a7519a3c
RH
2516 for (gotent = h->got_entries; gotent ; gotent = gotent->next)
2517 if (gotent->reloc_type == R_ALPHA_LITERAL
2518 && gotent->use_count > 0)
6ec7057a
RH
2519 {
2520 if (splt->size == 0)
2521 splt->size = PLT_HEADER_SIZE;
2522 gotent->plt_offset = splt->size;
2523 splt->size += PLT_ENTRY_SIZE;
2524 saw_one = TRUE;
2525 }
a7519a3c 2526
6ec7057a
RH
2527 /* If there weren't any, there's no longer a need for the PLT entry. */
2528 if (!saw_one)
2529 h->root.needs_plt = FALSE;
a7519a3c
RH
2530
2531 return TRUE;
2532}
2533
4a828aab
RH
2534/* Called from relax_section to rebuild the PLT in light of potential changes
2535 in the function's status. */
a7519a3c 2536
4a828aab 2537static void
a7519a3c
RH
2538elf64_alpha_size_plt_section (struct bfd_link_info *info)
2539{
6ec7057a 2540 asection *splt, *spltrel, *sgotplt;
a7519a3c 2541 unsigned long entries;
4dfe6ac6
NC
2542 struct alpha_elf_link_hash_table * htab;
2543
2544 htab = alpha_elf_hash_table (info);
2545 if (htab == NULL)
2546 return;
a7519a3c 2547
ce558b89 2548 splt = elf_hash_table(info)->splt;
a7519a3c 2549 if (splt == NULL)
4a828aab 2550 return;
252b5132 2551
a7519a3c 2552 splt->size = 0;
252b5132 2553
4dfe6ac6 2554 alpha_elf_link_hash_traverse (htab,
a7519a3c 2555 elf64_alpha_size_plt_section_1, splt);
e92d460e 2556
a7519a3c 2557 /* Every plt entry requires a JMP_SLOT relocation. */
ce558b89 2558 spltrel = elf_hash_table(info)->srelplt;
4a828aab 2559 entries = 0;
a7519a3c 2560 if (splt->size)
6ec7057a
RH
2561 {
2562 if (elf64_alpha_use_secureplt)
2563 entries = (splt->size - NEW_PLT_HEADER_SIZE) / NEW_PLT_ENTRY_SIZE;
2564 else
2565 entries = (splt->size - OLD_PLT_HEADER_SIZE) / OLD_PLT_ENTRY_SIZE;
2566 }
a7519a3c 2567 spltrel->size = entries * sizeof (Elf64_External_Rela);
e92d460e 2568
6ec7057a
RH
2569 /* When using the secureplt, we need two words somewhere in the data
2570 segment for the dynamic linker to tell us where to go. This is the
2571 entire contents of the .got.plt section. */
2572 if (elf64_alpha_use_secureplt)
2573 {
ce558b89 2574 sgotplt = elf_hash_table(info)->sgotplt;
6ec7057a
RH
2575 sgotplt->size = entries ? 16 : 0;
2576 }
a7519a3c 2577}
e92d460e 2578
a7519a3c
RH
2579static bfd_boolean
2580elf64_alpha_always_size_sections (bfd *output_bfd ATTRIBUTE_UNUSED,
2581 struct bfd_link_info *info)
2582{
2583 bfd *i;
4dfe6ac6 2584 struct alpha_elf_link_hash_table * htab;
252b5132 2585
0e1862bb 2586 if (bfd_link_relocatable (info))
a7519a3c 2587 return TRUE;
252b5132 2588
4dfe6ac6
NC
2589 htab = alpha_elf_hash_table (info);
2590 if (htab == NULL)
2591 return FALSE;
2592
d1c109de 2593 if (!elf64_alpha_size_got_sections (info, TRUE))
a7519a3c 2594 return FALSE;
252b5132 2595
a7519a3c 2596 /* Allocate space for all of the .got subsections. */
4dfe6ac6 2597 i = htab->got_list;
a7519a3c 2598 for ( ; i ; i = alpha_elf_tdata(i)->got_link_next)
252b5132 2599 {
a7519a3c
RH
2600 asection *s = alpha_elf_tdata(i)->got;
2601 if (s->size > 0)
2602 {
2603 s->contents = (bfd_byte *) bfd_zalloc (i, s->size);
2604 if (s->contents == NULL)
2605 return FALSE;
2606 }
252b5132
RH
2607 }
2608
b34976b6 2609 return TRUE;
252b5132 2610}
3765b1be 2611
a7519a3c 2612/* The number of dynamic relocations required by a static relocation. */
3765b1be 2613
a7519a3c 2614static int
e366eeae 2615alpha_dynamic_entries_for_reloc (int r_type, int dynamic, int shared, int pie)
a7519a3c
RH
2616{
2617 switch (r_type)
3765b1be 2618 {
a7519a3c
RH
2619 /* May appear in GOT entries. */
2620 case R_ALPHA_TLSGD:
2621 return (dynamic ? 2 : shared ? 1 : 0);
2622 case R_ALPHA_TLSLDM:
2623 return shared;
2624 case R_ALPHA_LITERAL:
a7519a3c 2625 return dynamic || shared;
e366eeae
RH
2626 case R_ALPHA_GOTTPREL:
2627 return dynamic || (shared && !pie);
a7519a3c
RH
2628 case R_ALPHA_GOTDTPREL:
2629 return dynamic;
3765b1be 2630
a7519a3c
RH
2631 /* May appear in data sections. */
2632 case R_ALPHA_REFLONG:
2633 case R_ALPHA_REFQUAD:
a7519a3c 2634 return dynamic || shared;
e366eeae
RH
2635 case R_ALPHA_TPREL64:
2636 return dynamic || (shared && !pie);
3765b1be 2637
a7519a3c
RH
2638 /* Everything else is illegal. We'll issue an error during
2639 relocate_section. */
2640 default:
2641 return 0;
2642 }
2643}
3765b1be 2644
a7519a3c 2645/* Work out the sizes of the dynamic relocation entries. */
3765b1be 2646
a7519a3c
RH
2647static bfd_boolean
2648elf64_alpha_calc_dynrel_sizes (struct alpha_elf_link_hash_entry *h,
2649 struct bfd_link_info *info)
2650{
2651 bfd_boolean dynamic;
2652 struct alpha_elf_reloc_entry *relent;
2653 unsigned long entries;
3765b1be 2654
a7519a3c
RH
2655 /* If the symbol was defined as a common symbol in a regular object
2656 file, and there was no definition in any dynamic object, then the
2657 linker will have allocated space for the symbol in a common
2658 section but the ELF_LINK_HASH_DEF_REGULAR flag will not have been
2659 set. This is done for dynamic symbols in
2660 elf_adjust_dynamic_symbol but this is not done for non-dynamic
2661 symbols, somehow. */
2662 if (!h->root.def_regular
2663 && h->root.ref_regular
2664 && !h->root.def_dynamic
2665 && (h->root.root.type == bfd_link_hash_defined
2666 || h->root.root.type == bfd_link_hash_defweak)
2667 && !(h->root.root.u.def.section->owner->flags & DYNAMIC))
2668 h->root.def_regular = 1;
3765b1be 2669
a7519a3c
RH
2670 /* If the symbol is dynamic, we'll need all the relocations in their
2671 natural form. If this is a shared object, and it has been forced
2672 local, we'll need the same number of RELATIVE relocations. */
2673 dynamic = alpha_elf_dynamic_symbol_p (&h->root, info);
3765b1be 2674
a7519a3c
RH
2675 /* If the symbol is a hidden undefined weak, then we never have any
2676 relocations. Avoid the loop which may want to add RELATIVE relocs
0e1862bb 2677 based on bfd_link_pic (info). */
a7519a3c
RH
2678 if (h->root.root.type == bfd_link_hash_undefweak && !dynamic)
2679 return TRUE;
2680
2681 for (relent = h->reloc_entries; relent; relent = relent->next)
3765b1be 2682 {
a7519a3c 2683 entries = alpha_dynamic_entries_for_reloc (relent->rtype, dynamic,
3cbc1e5e
AM
2684 bfd_link_pic (info),
2685 bfd_link_pie (info));
a7519a3c
RH
2686 if (entries)
2687 {
1f7f2abb 2688 asection *sec = relent->sec;
a7519a3c
RH
2689 relent->srel->size +=
2690 entries * sizeof (Elf64_External_Rela) * relent->count;
1f7f2abb
L
2691 if ((sec->flags & SEC_READONLY) != 0)
2692 {
2693 info->flags |= DT_TEXTREL;
2694 info->callbacks->minfo
2695 (_("%pB: dynamic relocation against `%pT' in "
2696 "read-only section `%pA'\n"),
2697 sec->owner, h->root.root.root.string, sec);
2698 }
a7519a3c
RH
2699 }
2700 }
3765b1be 2701
a7519a3c
RH
2702 return TRUE;
2703}
3765b1be 2704
a7519a3c
RH
2705/* Subroutine of elf64_alpha_size_rela_got_section for doing the
2706 global symbols. */
3765b1be 2707
a7519a3c
RH
2708static bfd_boolean
2709elf64_alpha_size_rela_got_1 (struct alpha_elf_link_hash_entry *h,
2710 struct bfd_link_info *info)
2711{
2712 bfd_boolean dynamic;
2713 struct alpha_elf_got_entry *gotent;
2714 unsigned long entries;
3765b1be 2715
6ec7057a
RH
2716 /* If we're using a plt for this symbol, then all of its relocations
2717 for its got entries go into .rela.plt. */
2718 if (h->root.needs_plt)
2719 return TRUE;
2720
a7519a3c
RH
2721 /* If the symbol is dynamic, we'll need all the relocations in their
2722 natural form. If this is a shared object, and it has been forced
2723 local, we'll need the same number of RELATIVE relocations. */
2724 dynamic = alpha_elf_dynamic_symbol_p (&h->root, info);
2725
2726 /* If the symbol is a hidden undefined weak, then we never have any
2727 relocations. Avoid the loop which may want to add RELATIVE relocs
0e1862bb 2728 based on bfd_link_pic (info). */
a7519a3c
RH
2729 if (h->root.root.type == bfd_link_hash_undefweak && !dynamic)
2730 return TRUE;
2731
2732 entries = 0;
2733 for (gotent = h->got_entries; gotent ; gotent = gotent->next)
2734 if (gotent->use_count > 0)
e366eeae 2735 entries += alpha_dynamic_entries_for_reloc (gotent->reloc_type, dynamic,
0e1862bb
L
2736 bfd_link_pic (info),
2737 bfd_link_pie (info));
a7519a3c 2738
a7519a3c
RH
2739 if (entries > 0)
2740 {
ce558b89 2741 asection *srel = elf_hash_table(info)->srelgot;
a7519a3c
RH
2742 BFD_ASSERT (srel != NULL);
2743 srel->size += sizeof (Elf64_External_Rela) * entries;
3765b1be 2744 }
3765b1be 2745
a7519a3c 2746 return TRUE;
3765b1be
RH
2747}
2748
a7519a3c 2749/* Set the sizes of the dynamic relocation sections. */
252b5132 2750
4a828aab 2751static void
a7519a3c 2752elf64_alpha_size_rela_got_section (struct bfd_link_info *info)
252b5132 2753{
a7519a3c 2754 unsigned long entries;
ce558b89 2755 bfd *i;
a7519a3c 2756 asection *srel;
4dfe6ac6
NC
2757 struct alpha_elf_link_hash_table * htab;
2758
2759 htab = alpha_elf_hash_table (info);
2760 if (htab == NULL)
2761 return;
252b5132 2762
a7519a3c
RH
2763 /* Shared libraries often require RELATIVE relocs, and some relocs
2764 require attention for the main application as well. */
252b5132 2765
a7519a3c 2766 entries = 0;
4dfe6ac6 2767 for (i = htab->got_list;
a7519a3c
RH
2768 i ; i = alpha_elf_tdata(i)->got_link_next)
2769 {
2770 bfd *j;
3241278a 2771
a7519a3c
RH
2772 for (j = i; j ; j = alpha_elf_tdata(j)->in_got_link_next)
2773 {
2774 struct alpha_elf_got_entry **local_got_entries, *gotent;
2775 int k, n;
252b5132 2776
a7519a3c
RH
2777 local_got_entries = alpha_elf_tdata(j)->local_got_entries;
2778 if (!local_got_entries)
2779 continue;
252b5132 2780
a7519a3c
RH
2781 for (k = 0, n = elf_tdata(j)->symtab_hdr.sh_info; k < n; ++k)
2782 for (gotent = local_got_entries[k];
2783 gotent ; gotent = gotent->next)
2784 if (gotent->use_count > 0)
2785 entries += (alpha_dynamic_entries_for_reloc
0e1862bb
L
2786 (gotent->reloc_type, 0, bfd_link_pic (info),
2787 bfd_link_pie (info)));
a7519a3c
RH
2788 }
2789 }
3765b1be 2790
ce558b89 2791 srel = elf_hash_table(info)->srelgot;
a7519a3c
RH
2792 if (!srel)
2793 {
2794 BFD_ASSERT (entries == 0);
4a828aab 2795 return;
a7519a3c
RH
2796 }
2797 srel->size = sizeof (Elf64_External_Rela) * entries;
252b5132 2798
a7519a3c 2799 /* Now do the non-local symbols. */
4dfe6ac6 2800 alpha_elf_link_hash_traverse (htab,
a7519a3c 2801 elf64_alpha_size_rela_got_1, info);
a7519a3c 2802}
252b5132 2803
a7519a3c 2804/* Set the sizes of the dynamic sections. */
3765b1be 2805
a7519a3c
RH
2806static bfd_boolean
2807elf64_alpha_size_dynamic_sections (bfd *output_bfd ATTRIBUTE_UNUSED,
2808 struct bfd_link_info *info)
2809{
2810 bfd *dynobj;
2811 asection *s;
24f1a751 2812 bfd_boolean relplt, relocs;
4dfe6ac6
NC
2813 struct alpha_elf_link_hash_table * htab;
2814
2815 htab = alpha_elf_hash_table (info);
2816 if (htab == NULL)
2817 return FALSE;
3765b1be 2818
a7519a3c
RH
2819 dynobj = elf_hash_table(info)->dynobj;
2820 BFD_ASSERT(dynobj != NULL);
252b5132 2821
a7519a3c
RH
2822 if (elf_hash_table (info)->dynamic_sections_created)
2823 {
2824 /* Set the contents of the .interp section to the interpreter. */
9b8b325a 2825 if (bfd_link_executable (info) && !info->nointerp)
252b5132 2826 {
3d4d4302 2827 s = bfd_get_linker_section (dynobj, ".interp");
a7519a3c
RH
2828 BFD_ASSERT (s != NULL);
2829 s->size = sizeof ELF_DYNAMIC_INTERPRETER;
2830 s->contents = (unsigned char *) ELF_DYNAMIC_INTERPRETER;
2831 }
3765b1be 2832
a7519a3c
RH
2833 /* Now that we've seen all of the input files, we can decide which
2834 symbols need dynamic relocation entries and which don't. We've
2835 collected information in check_relocs that we can now apply to
2836 size the dynamic relocation sections. */
4dfe6ac6 2837 alpha_elf_link_hash_traverse (htab,
a7519a3c 2838 elf64_alpha_calc_dynrel_sizes, info);
252b5132 2839
a7519a3c 2840 elf64_alpha_size_rela_got_section (info);
6ec7057a 2841 elf64_alpha_size_plt_section (info);
a7519a3c
RH
2842 }
2843 /* else we're not dynamic and by definition we don't need such things. */
3765b1be 2844
a7519a3c
RH
2845 /* The check_relocs and adjust_dynamic_symbol entry points have
2846 determined the sizes of the various dynamic sections. Allocate
2847 memory for them. */
2848 relplt = FALSE;
24f1a751 2849 relocs = FALSE;
a7519a3c
RH
2850 for (s = dynobj->sections; s != NULL; s = s->next)
2851 {
2852 const char *name;
3765b1be 2853
a7519a3c
RH
2854 if (!(s->flags & SEC_LINKER_CREATED))
2855 continue;
cc03ec80 2856
a7519a3c
RH
2857 /* It's OK to base decisions on the section name, because none
2858 of the dynobj section names depend upon the input files. */
fd361982 2859 name = bfd_section_name (s);
3765b1be 2860
0112cd26 2861 if (CONST_STRNEQ (name, ".rela"))
3765b1be 2862 {
c456f082 2863 if (s->size != 0)
a7519a3c 2864 {
c456f082 2865 if (strcmp (name, ".rela.plt") == 0)
a7519a3c 2866 relplt = TRUE;
24f1a751
AM
2867 else
2868 relocs = TRUE;
252b5132 2869
a7519a3c
RH
2870 /* We use the reloc_count field as a counter if we need
2871 to copy relocs into the output file. */
2872 s->reloc_count = 0;
252b5132 2873 }
3765b1be 2874 }
0112cd26 2875 else if (! CONST_STRNEQ (name, ".got")
c456f082
AM
2876 && strcmp (name, ".plt") != 0
2877 && strcmp (name, ".dynbss") != 0)
3765b1be 2878 {
a7519a3c
RH
2879 /* It's not one of our dynamic sections, so don't allocate space. */
2880 continue;
2881 }
252b5132 2882
c456f082
AM
2883 if (s->size == 0)
2884 {
2885 /* If we don't need this section, strip it from the output file.
2886 This is to handle .rela.bss and .rela.plt. We must create it
2887 in create_dynamic_sections, because it must be created before
2888 the linker maps input sections to output sections. The
2889 linker does that before adjust_dynamic_symbol is called, and
2890 it is that function which decides whether anything needs to
2891 go into these sections. */
6452a567
RH
2892 if (!CONST_STRNEQ (name, ".got"))
2893 s->flags |= SEC_EXCLUDE;
c456f082
AM
2894 }
2895 else if ((s->flags & SEC_HAS_CONTENTS) != 0)
a7519a3c
RH
2896 {
2897 /* Allocate memory for the section contents. */
2898 s->contents = (bfd_byte *) bfd_zalloc (dynobj, s->size);
c456f082 2899 if (s->contents == NULL)
b34976b6 2900 return FALSE;
a7519a3c
RH
2901 }
2902 }
3765b1be 2903
a7519a3c
RH
2904 if (elf_hash_table (info)->dynamic_sections_created)
2905 {
2906 /* Add some entries to the .dynamic section. We fill in the
2907 values later, in elf64_alpha_finish_dynamic_sections, but we
2908 must add the entries now so that we get the correct size for
2909 the .dynamic section. The DT_DEBUG entry is filled in by the
2910 dynamic linker and used by the debugger. */
2911#define add_dynamic_entry(TAG, VAL) \
2912 _bfd_elf_add_dynamic_entry (info, TAG, VAL)
3765b1be 2913
3084d7a2
L
2914 if (!_bfd_elf_add_dynamic_tags (output_bfd, info,
2915 relocs || relplt))
2916 return FALSE;
24f1a751 2917
3084d7a2
L
2918 if (relplt
2919 && elf64_alpha_use_secureplt
2920 && !add_dynamic_entry (DT_ALPHA_PLTRO, 1))
2921 return FALSE;
252b5132 2922 }
a7519a3c 2923#undef add_dynamic_entry
252b5132 2924
b34976b6 2925 return TRUE;
252b5132 2926}
a7519a3c
RH
2927\f
2928/* These functions do relaxation for Alpha ELF.
252b5132 2929
a7519a3c
RH
2930 Currently I'm only handling what I can do with existing compiler
2931 and assembler support, which means no instructions are removed,
2932 though some may be nopped. At this time GCC does not emit enough
2933 information to do all of the relaxing that is possible. It will
2934 take some not small amount of work for that to happen.
252b5132 2935
a7519a3c
RH
2936 There are a couple of interesting papers that I once read on this
2937 subject, that I cannot find references to at the moment, that
2938 related to Alpha in particular. They are by David Wall, then of
2939 DEC WRL. */
252b5132 2940
a7519a3c
RH
2941struct alpha_relax_info
2942{
2943 bfd *abfd;
2944 asection *sec;
2945 bfd_byte *contents;
2946 Elf_Internal_Shdr *symtab_hdr;
2947 Elf_Internal_Rela *relocs, *relend;
2948 struct bfd_link_info *link_info;
2949 bfd_vma gp;
2950 bfd *gotobj;
2951 asection *tsec;
2952 struct alpha_elf_link_hash_entry *h;
2953 struct alpha_elf_got_entry **first_gotent;
2954 struct alpha_elf_got_entry *gotent;
2955 bfd_boolean changed_contents;
2956 bfd_boolean changed_relocs;
2957 unsigned char other;
2958};
252b5132 2959
a7519a3c
RH
2960static Elf_Internal_Rela *
2961elf64_alpha_find_reloc_at_ofs (Elf_Internal_Rela *rel,
2962 Elf_Internal_Rela *relend,
2963 bfd_vma offset, int type)
2964{
2965 while (rel < relend)
252b5132 2966 {
a7519a3c
RH
2967 if (rel->r_offset == offset
2968 && ELF64_R_TYPE (rel->r_info) == (unsigned int) type)
2969 return rel;
2970 ++rel;
2971 }
2972 return NULL;
2973}
252b5132 2974
a7519a3c
RH
2975static bfd_boolean
2976elf64_alpha_relax_got_load (struct alpha_relax_info *info, bfd_vma symval,
2977 Elf_Internal_Rela *irel, unsigned long r_type)
2978{
2979 unsigned int insn;
2980 bfd_signed_vma disp;
252b5132 2981
a7519a3c
RH
2982 /* Get the instruction. */
2983 insn = bfd_get_32 (info->abfd, info->contents + irel->r_offset);
252b5132 2984
a7519a3c
RH
2985 if (insn >> 26 != OP_LDQ)
2986 {
2987 reloc_howto_type *howto = elf64_alpha_howto_table + r_type;
4eca0228 2988 _bfd_error_handler
695344c0 2989 /* xgettext:c-format */
2dcf00ce
AM
2990 (_("%pB: %pA+%#" PRIx64 ": warning: "
2991 "%s relocation against unexpected insn"),
2992 info->abfd, info->sec, (uint64_t) irel->r_offset, howto->name);
a7519a3c
RH
2993 return TRUE;
2994 }
252b5132 2995
a7519a3c
RH
2996 /* Can't relax dynamic symbols. */
2997 if (alpha_elf_dynamic_symbol_p (&info->h->root, info->link_info))
2998 return TRUE;
252b5132 2999
a7519a3c 3000 /* Can't use local-exec relocations in shared libraries. */
e366eeae 3001 if (r_type == R_ALPHA_GOTTPREL
3cbc1e5e 3002 && bfd_link_dll (info->link_info))
a7519a3c 3003 return TRUE;
252b5132 3004
a7519a3c
RH
3005 if (r_type == R_ALPHA_LITERAL)
3006 {
3007 /* Look for nice constant addresses. This includes the not-uncommon
3008 special case of 0 for undefweak symbols. */
3009 if ((info->h && info->h->root.root.type == bfd_link_hash_undefweak)
0e1862bb 3010 || (!bfd_link_pic (info->link_info)
a7519a3c
RH
3011 && (symval >= (bfd_vma)-0x8000 || symval < 0x8000)))
3012 {
3013 disp = 0;
3014 insn = (OP_LDA << 26) | (insn & (31 << 21)) | (31 << 16);
3015 insn |= (symval & 0xffff);
3016 r_type = R_ALPHA_NONE;
3017 }
3018 else
3019 {
d1c109de
RH
3020 /* We may only create GPREL relocs during the second pass. */
3021 if (info->link_info->relax_pass == 0)
3022 return TRUE;
3023
a7519a3c
RH
3024 disp = symval - info->gp;
3025 insn = (OP_LDA << 26) | (insn & 0x03ff0000);
3026 r_type = R_ALPHA_GPREL16;
3027 }
252b5132
RH
3028 }
3029 else
252b5132 3030 {
a7519a3c 3031 bfd_vma dtp_base, tp_base;
252b5132 3032
a7519a3c
RH
3033 BFD_ASSERT (elf_hash_table (info->link_info)->tls_sec != NULL);
3034 dtp_base = alpha_get_dtprel_base (info->link_info);
3035 tp_base = alpha_get_tprel_base (info->link_info);
3036 disp = symval - (r_type == R_ALPHA_GOTDTPREL ? dtp_base : tp_base);
252b5132 3037
a7519a3c 3038 insn = (OP_LDA << 26) | (insn & (31 << 21)) | (31 << 16);
252b5132 3039
a7519a3c
RH
3040 switch (r_type)
3041 {
3042 case R_ALPHA_GOTDTPREL:
3043 r_type = R_ALPHA_DTPREL16;
3044 break;
3045 case R_ALPHA_GOTTPREL:
3046 r_type = R_ALPHA_TPREL16;
3047 break;
3048 default:
3049 BFD_ASSERT (0);
3050 return FALSE;
3051 }
3052 }
252b5132 3053
a7519a3c 3054 if (disp < -0x8000 || disp >= 0x8000)
b34976b6 3055 return TRUE;
252b5132 3056
a7519a3c
RH
3057 bfd_put_32 (info->abfd, (bfd_vma) insn, info->contents + irel->r_offset);
3058 info->changed_contents = TRUE;
252b5132 3059
a7519a3c
RH
3060 /* Reduce the use count on this got entry by one, possibly
3061 eliminating it. */
3062 if (--info->gotent->use_count == 0)
252b5132 3063 {
a7519a3c
RH
3064 int sz = alpha_got_entry_size (r_type);
3065 alpha_elf_tdata (info->gotobj)->total_got_size -= sz;
3066 if (!info->h)
3067 alpha_elf_tdata (info->gotobj)->local_got_size -= sz;
252b5132 3068 }
252b5132 3069
a7519a3c
RH
3070 /* Smash the existing GOT relocation for its 16-bit immediate pair. */
3071 irel->r_info = ELF64_R_INFO (ELF64_R_SYM (irel->r_info), r_type);
3072 info->changed_relocs = TRUE;
3073
3074 /* ??? Search forward through this basic block looking for insns
3075 that use the target register. Stop after an insn modifying the
3076 register is seen, or after a branch or call.
252b5132 3077
a7519a3c
RH
3078 Any such memory load insn may be substituted by a load directly
3079 off the GP. This allows the memory load insn to be issued before
3080 the calculated GP register would otherwise be ready.
252b5132 3081
a7519a3c
RH
3082 Any such jsr insn can be replaced by a bsr if it is in range.
3083
3084 This would mean that we'd have to _add_ relocations, the pain of
3085 which gives one pause. */
252b5132 3086
b34976b6 3087 return TRUE;
252b5132
RH
3088}
3089
a7519a3c
RH
3090static bfd_vma
3091elf64_alpha_relax_opt_call (struct alpha_relax_info *info, bfd_vma symval)
252b5132 3092{
a7519a3c
RH
3093 /* If the function has the same gp, and we can identify that the
3094 function does not use its function pointer, we can eliminate the
3095 address load. */
252b5132 3096
a7519a3c
RH
3097 /* If the symbol is marked NOPV, we are being told the function never
3098 needs its procedure value. */
3099 if ((info->other & STO_ALPHA_STD_GPLOAD) == STO_ALPHA_NOPV)
3100 return symval;
252b5132 3101
a7519a3c
RH
3102 /* If the symbol is marked STD_GP, we are being told the function does
3103 a normal ldgp in the first two words. */
3104 else if ((info->other & STO_ALPHA_STD_GPLOAD) == STO_ALPHA_STD_GPLOAD)
3105 ;
252b5132 3106
a7519a3c
RH
3107 /* Otherwise, we may be able to identify a GP load in the first two
3108 words, which we can then skip. */
3109 else
252b5132 3110 {
a7519a3c
RH
3111 Elf_Internal_Rela *tsec_relocs, *tsec_relend, *tsec_free, *gpdisp;
3112 bfd_vma ofs;
252b5132 3113
a7519a3c
RH
3114 /* Load the relocations from the section that the target symbol is in. */
3115 if (info->sec == info->tsec)
252b5132 3116 {
a7519a3c
RH
3117 tsec_relocs = info->relocs;
3118 tsec_relend = info->relend;
3119 tsec_free = NULL;
3120 }
3121 else
3122 {
3123 tsec_relocs = (_bfd_elf_link_read_relocs
07d6d2b8 3124 (info->abfd, info->tsec, NULL,
a7519a3c
RH
3125 (Elf_Internal_Rela *) NULL,
3126 info->link_info->keep_memory));
3127 if (tsec_relocs == NULL)
3128 return 0;
3129 tsec_relend = tsec_relocs + info->tsec->reloc_count;
ae4fda66
JC
3130 tsec_free = (elf_section_data (info->tsec)->relocs == tsec_relocs
3131 ? NULL
3132 : tsec_relocs);
a7519a3c 3133 }
252b5132 3134
a7519a3c
RH
3135 /* Recover the symbol's offset within the section. */
3136 ofs = (symval - info->tsec->output_section->vma
3137 - info->tsec->output_offset);
252b5132 3138
a7519a3c
RH
3139 /* Look for a GPDISP reloc. */
3140 gpdisp = (elf64_alpha_find_reloc_at_ofs
3141 (tsec_relocs, tsec_relend, ofs, R_ALPHA_GPDISP));
252b5132 3142
a7519a3c
RH
3143 if (!gpdisp || gpdisp->r_addend != 4)
3144 {
c9594989 3145 free (tsec_free);
a7519a3c 3146 return 0;
252b5132 3147 }
c9594989 3148 free (tsec_free);
252b5132
RH
3149 }
3150
a7519a3c
RH
3151 /* We've now determined that we can skip an initial gp load. Verify
3152 that the call and the target use the same gp. */
f13a99db 3153 if (info->link_info->output_bfd->xvec != info->tsec->owner->xvec
a7519a3c
RH
3154 || info->gotobj != alpha_elf_tdata (info->tsec->owner)->gotobj)
3155 return 0;
252b5132 3156
a7519a3c
RH
3157 return symval + 8;
3158}
252b5132 3159
a7519a3c
RH
3160static bfd_boolean
3161elf64_alpha_relax_with_lituse (struct alpha_relax_info *info,
3162 bfd_vma symval, Elf_Internal_Rela *irel)
252b5132 3163{
d1c109de
RH
3164 Elf_Internal_Rela *urel, *erel, *irelend = info->relend;
3165 int flags;
a7519a3c
RH
3166 bfd_signed_vma disp;
3167 bfd_boolean fits16;
3168 bfd_boolean fits32;
3169 bfd_boolean lit_reused = FALSE;
3170 bfd_boolean all_optimized = TRUE;
d1c109de
RH
3171 bfd_boolean changed_contents;
3172 bfd_boolean changed_relocs;
3173 bfd_byte *contents = info->contents;
3174 bfd *abfd = info->abfd;
3175 bfd_vma sec_output_vma;
a7519a3c 3176 unsigned int lit_insn;
d1c109de 3177 int relax_pass;
252b5132 3178
d1c109de 3179 lit_insn = bfd_get_32 (abfd, contents + irel->r_offset);
a7519a3c
RH
3180 if (lit_insn >> 26 != OP_LDQ)
3181 {
4eca0228 3182 _bfd_error_handler
695344c0 3183 /* xgettext:c-format */
2dcf00ce 3184 (_("%pB: %pA+%#" PRIx64 ": warning: "
38f14ab8
AM
3185 "%s relocation against unexpected insn"),
3186 abfd, info->sec, (uint64_t) irel->r_offset, "LITERAL");
a7519a3c
RH
3187 return TRUE;
3188 }
252b5132 3189
a7519a3c
RH
3190 /* Can't relax dynamic symbols. */
3191 if (alpha_elf_dynamic_symbol_p (&info->h->root, info->link_info))
3192 return TRUE;
3193
d1c109de
RH
3194 changed_contents = info->changed_contents;
3195 changed_relocs = info->changed_relocs;
3196 sec_output_vma = info->sec->output_section->vma + info->sec->output_offset;
3197 relax_pass = info->link_info->relax_pass;
3198
a7519a3c 3199 /* Summarize how this particular LITERAL is used. */
d1c109de 3200 for (erel = irel+1, flags = 0; erel < irelend; ++erel)
252b5132 3201 {
d1c109de 3202 if (ELF64_R_TYPE (erel->r_info) != R_ALPHA_LITUSE)
a7519a3c 3203 break;
d1c109de
RH
3204 if (erel->r_addend <= 6)
3205 flags |= 1 << erel->r_addend;
a7519a3c 3206 }
252b5132 3207
a7519a3c
RH
3208 /* A little preparation for the loop... */
3209 disp = symval - info->gp;
252b5132 3210
d1c109de 3211 for (urel = irel+1; urel < erel; ++urel)
a7519a3c 3212 {
d1c109de 3213 bfd_vma urel_r_offset = urel->r_offset;
a7519a3c
RH
3214 unsigned int insn;
3215 int insn_disp;
3216 bfd_signed_vma xdisp;
d1c109de 3217 Elf_Internal_Rela nrel;
252b5132 3218
d1c109de 3219 insn = bfd_get_32 (abfd, contents + urel_r_offset);
252b5132 3220
a7519a3c
RH
3221 switch (urel->r_addend)
3222 {
3223 case LITUSE_ALPHA_ADDR:
3224 default:
3225 /* This type is really just a placeholder to note that all
3226 uses cannot be optimized, but to still allow some. */
3227 all_optimized = FALSE;
3228 break;
252b5132 3229
a7519a3c 3230 case LITUSE_ALPHA_BASE:
d1c109de
RH
3231 /* We may only create GPREL relocs during the second pass. */
3232 if (relax_pass == 0)
3233 {
3234 all_optimized = FALSE;
3235 break;
3236 }
3237
a7519a3c 3238 /* We can always optimize 16-bit displacements. */
252b5132 3239
a7519a3c
RH
3240 /* Extract the displacement from the instruction, sign-extending
3241 it if necessary, then test whether it is within 16 or 32 bits
3242 displacement from GP. */
3243 insn_disp = ((insn & 0xffff) ^ 0x8000) - 0x8000;
3244
3245 xdisp = disp + insn_disp;
3246 fits16 = (xdisp >= - (bfd_signed_vma) 0x8000 && xdisp < 0x8000);
3247 fits32 = (xdisp >= - (bfd_signed_vma) 0x80000000
3248 && xdisp < 0x7fff8000);
3249
3250 if (fits16)
3251 {
3252 /* Take the op code and dest from this insn, take the base
3253 register from the literal insn. Leave the offset alone. */
3254 insn = (insn & 0xffe0ffff) | (lit_insn & 0x001f0000);
d1c109de
RH
3255 bfd_put_32 (abfd, (bfd_vma) insn, contents + urel_r_offset);
3256 changed_contents = TRUE;
3257
3258 nrel = *urel;
3259 nrel.r_info = ELF64_R_INFO (ELF64_R_SYM (irel->r_info),
3260 R_ALPHA_GPREL16);
3261 nrel.r_addend = irel->r_addend;
3262
3263 /* As we adjust, move the reloc to the end so that we don't
07d6d2b8 3264 break the LITERAL+LITUSE chain. */
d1c109de 3265 if (urel < --erel)
07d6d2b8 3266 *urel-- = *erel;
d1c109de
RH
3267 *erel = nrel;
3268 changed_relocs = TRUE;
252b5132 3269 }
252b5132 3270
a7519a3c
RH
3271 /* If all mem+byte, we can optimize 32-bit mem displacements. */
3272 else if (fits32 && !(flags & ~6))
3273 {
3274 /* FIXME: sanity check that lit insn Ra is mem insn Rb. */
252b5132 3275
a7519a3c
RH
3276 irel->r_info = ELF64_R_INFO (ELF64_R_SYM (irel->r_info),
3277 R_ALPHA_GPRELHIGH);
3278 lit_insn = (OP_LDAH << 26) | (lit_insn & 0x03ff0000);
d1c109de 3279 bfd_put_32 (abfd, (bfd_vma) lit_insn, contents + irel->r_offset);
a7519a3c 3280 lit_reused = TRUE;
d1c109de 3281 changed_contents = TRUE;
252b5132 3282
07d6d2b8
AM
3283 /* Since all relocs must be optimized, don't bother swapping
3284 this relocation to the end. */
a7519a3c
RH
3285 urel->r_info = ELF64_R_INFO (ELF64_R_SYM (irel->r_info),
3286 R_ALPHA_GPRELLOW);
3287 urel->r_addend = irel->r_addend;
d1c109de 3288 changed_relocs = TRUE;
a7519a3c
RH
3289 }
3290 else
3291 all_optimized = FALSE;
3292 break;
252b5132 3293
a7519a3c
RH
3294 case LITUSE_ALPHA_BYTOFF:
3295 /* We can always optimize byte instructions. */
252b5132 3296
a7519a3c
RH
3297 /* FIXME: sanity check the insn for byte op. Check that the
3298 literal dest reg is indeed Rb in the byte insn. */
252b5132 3299
a7519a3c
RH
3300 insn &= ~ (unsigned) 0x001ff000;
3301 insn |= ((symval & 7) << 13) | 0x1000;
d1c109de
RH
3302 bfd_put_32 (abfd, (bfd_vma) insn, contents + urel_r_offset);
3303 changed_contents = TRUE;
3304
3305 nrel = *urel;
3306 nrel.r_info = ELF64_R_INFO (0, R_ALPHA_NONE);
3307 nrel.r_addend = 0;
3308
3309 /* As we adjust, move the reloc to the end so that we don't
3310 break the LITERAL+LITUSE chain. */
3311 if (urel < --erel)
3312 *urel-- = *erel;
3313 *erel = nrel;
3314 changed_relocs = TRUE;
a7519a3c 3315 break;
252b5132 3316
a7519a3c
RH
3317 case LITUSE_ALPHA_JSR:
3318 case LITUSE_ALPHA_TLSGD:
3319 case LITUSE_ALPHA_TLSLDM:
8288a39e 3320 case LITUSE_ALPHA_JSRDIRECT:
0d5f9994 3321 {
a7519a3c
RH
3322 bfd_vma optdest, org;
3323 bfd_signed_vma odisp;
252b5132 3324
a7519a3c
RH
3325 /* For undefined weak symbols, we're mostly interested in getting
3326 rid of the got entry whenever possible, so optimize this to a
3327 use of the zero register. */
3328 if (info->h && info->h->root.root.type == bfd_link_hash_undefweak)
3329 {
3330 insn |= 31 << 16;
d1c109de 3331 bfd_put_32 (abfd, (bfd_vma) insn, contents + urel_r_offset);
252b5132 3332
d1c109de 3333 changed_contents = TRUE;
a7519a3c
RH
3334 break;
3335 }
252b5132 3336
a7519a3c
RH
3337 /* If not zero, place to jump without needing pv. */
3338 optdest = elf64_alpha_relax_opt_call (info, symval);
d1c109de 3339 org = sec_output_vma + urel_r_offset + 4;
a7519a3c 3340 odisp = (optdest ? optdest : symval) - org;
252b5132 3341
a7519a3c
RH
3342 if (odisp >= -0x400000 && odisp < 0x400000)
3343 {
3344 Elf_Internal_Rela *xrel;
252b5132 3345
a7519a3c
RH
3346 /* Preserve branch prediction call stack when possible. */
3347 if ((insn & INSN_JSR_MASK) == INSN_JSR)
3348 insn = (OP_BSR << 26) | (insn & 0x03e00000);
3349 else
3350 insn = (OP_BR << 26) | (insn & 0x03e00000);
d1c109de
RH
3351 bfd_put_32 (abfd, (bfd_vma) insn, contents + urel_r_offset);
3352 changed_contents = TRUE;
252b5132 3353
d1c109de
RH
3354 nrel = *urel;
3355 nrel.r_info = ELF64_R_INFO (ELF64_R_SYM (irel->r_info),
3356 R_ALPHA_BRADDR);
3357 nrel.r_addend = irel->r_addend;
252b5132 3358
a7519a3c 3359 if (optdest)
d1c109de 3360 nrel.r_addend += optdest - symval;
a7519a3c
RH
3361 else
3362 all_optimized = FALSE;
252b5132 3363
a7519a3c
RH
3364 /* Kill any HINT reloc that might exist for this insn. */
3365 xrel = (elf64_alpha_find_reloc_at_ofs
d1c109de 3366 (info->relocs, info->relend, urel_r_offset,
a7519a3c
RH
3367 R_ALPHA_HINT));
3368 if (xrel)
3369 xrel->r_info = ELF64_R_INFO (0, R_ALPHA_NONE);
252b5132 3370
d1c109de
RH
3371 /* As we adjust, move the reloc to the end so that we don't
3372 break the LITERAL+LITUSE chain. */
3373 if (urel < --erel)
3374 *urel-- = *erel;
3375 *erel = nrel;
3376
a7519a3c
RH
3377 info->changed_relocs = TRUE;
3378 }
3379 else
3380 all_optimized = FALSE;
252b5132 3381
a7519a3c
RH
3382 /* Even if the target is not in range for a direct branch,
3383 if we share a GP, we can eliminate the gp reload. */
3384 if (optdest)
3385 {
3386 Elf_Internal_Rela *gpdisp
3387 = (elf64_alpha_find_reloc_at_ofs
d1c109de 3388 (info->relocs, irelend, urel_r_offset + 4,
a7519a3c
RH
3389 R_ALPHA_GPDISP));
3390 if (gpdisp)
3391 {
d1c109de 3392 bfd_byte *p_ldah = contents + gpdisp->r_offset;
a7519a3c 3393 bfd_byte *p_lda = p_ldah + gpdisp->r_addend;
d1c109de
RH
3394 unsigned int ldah = bfd_get_32 (abfd, p_ldah);
3395 unsigned int lda = bfd_get_32 (abfd, p_lda);
252b5132 3396
a7519a3c
RH
3397 /* Verify that the instruction is "ldah $29,0($26)".
3398 Consider a function that ends in a noreturn call,
3399 and that the next function begins with an ldgp,
3400 and that by accident there is no padding between.
3401 In that case the insn would use $27 as the base. */
3402 if (ldah == 0x27ba0000 && lda == 0x23bd0000)
3403 {
d1c109de
RH
3404 bfd_put_32 (abfd, (bfd_vma) INSN_UNOP, p_ldah);
3405 bfd_put_32 (abfd, (bfd_vma) INSN_UNOP, p_lda);
252b5132 3406
a7519a3c 3407 gpdisp->r_info = ELF64_R_INFO (0, R_ALPHA_NONE);
d1c109de
RH
3408 changed_contents = TRUE;
3409 changed_relocs = TRUE;
a7519a3c
RH
3410 }
3411 }
3412 }
3413 }
3414 break;
252b5132 3415 }
252b5132
RH
3416 }
3417
d1c109de
RH
3418 /* If we reused the literal instruction, we must have optimized all. */
3419 BFD_ASSERT(!lit_reused || all_optimized);
3420
a7519a3c
RH
3421 /* If all cases were optimized, we can reduce the use count on this
3422 got entry by one, possibly eliminating it. */
3423 if (all_optimized)
252b5132 3424 {
a7519a3c 3425 if (--info->gotent->use_count == 0)
252b5132 3426 {
a7519a3c
RH
3427 int sz = alpha_got_entry_size (R_ALPHA_LITERAL);
3428 alpha_elf_tdata (info->gotobj)->total_got_size -= sz;
3429 if (!info->h)
3430 alpha_elf_tdata (info->gotobj)->local_got_size -= sz;
252b5132 3431 }
a7519a3c
RH
3432
3433 /* If the literal instruction is no longer needed (it may have been
3434 reused. We can eliminate it. */
3435 /* ??? For now, I don't want to deal with compacting the section,
3436 so just nop it out. */
3437 if (!lit_reused)
252b5132 3438 {
a7519a3c 3439 irel->r_info = ELF64_R_INFO (0, R_ALPHA_NONE);
d1c109de 3440 changed_relocs = TRUE;
252b5132 3441
d1c109de
RH
3442 bfd_put_32 (abfd, (bfd_vma) INSN_UNOP, contents + irel->r_offset);
3443 changed_contents = TRUE;
a7519a3c 3444 }
a7519a3c 3445 }
d1c109de
RH
3446
3447 info->changed_contents = changed_contents;
3448 info->changed_relocs = changed_relocs;
3449
3450 if (all_optimized || relax_pass == 0)
3451 return TRUE;
3452 return elf64_alpha_relax_got_load (info, symval, irel, R_ALPHA_LITERAL);
252b5132
RH
3453}
3454
b34976b6 3455static bfd_boolean
a7519a3c
RH
3456elf64_alpha_relax_tls_get_addr (struct alpha_relax_info *info, bfd_vma symval,
3457 Elf_Internal_Rela *irel, bfd_boolean is_gd)
f44f99a5 3458{
a7519a3c 3459 bfd_byte *pos[5];
891caa9b 3460 unsigned int insn, tlsgd_reg;
a7519a3c 3461 Elf_Internal_Rela *gpdisp, *hint;
891caa9b 3462 bfd_boolean dynamic, use_gottprel;
a7519a3c 3463 unsigned long new_symndx;
f44f99a5 3464
a7519a3c 3465 dynamic = alpha_elf_dynamic_symbol_p (&info->h->root, info->link_info);
f44f99a5 3466
a7519a3c
RH
3467 /* If a TLS symbol is accessed using IE at least once, there is no point
3468 to use dynamic model for it. */
3469 if (is_gd && info->h && (info->h->flags & ALPHA_ELF_LINK_HASH_TLS_IE))
3470 ;
f44f99a5 3471
a7519a3c
RH
3472 /* If the symbol is local, and we've already committed to DF_STATIC_TLS,
3473 then we might as well relax to IE. */
0e1862bb 3474 else if (bfd_link_pic (info->link_info) && !dynamic
a7519a3c
RH
3475 && (info->link_info->flags & DF_STATIC_TLS))
3476 ;
f44f99a5 3477
a7519a3c 3478 /* Otherwise we must be building an executable to do anything. */
0e1862bb 3479 else if (bfd_link_pic (info->link_info))
a7519a3c 3480 return TRUE;
f44f99a5 3481
a7519a3c
RH
3482 /* The TLSGD/TLSLDM relocation must be followed by a LITERAL and
3483 the matching LITUSE_TLS relocations. */
3484 if (irel + 2 >= info->relend)
3485 return TRUE;
3486 if (ELF64_R_TYPE (irel[1].r_info) != R_ALPHA_LITERAL
3487 || ELF64_R_TYPE (irel[2].r_info) != R_ALPHA_LITUSE
3488 || irel[2].r_addend != (is_gd ? LITUSE_ALPHA_TLSGD : LITUSE_ALPHA_TLSLDM))
3489 return TRUE;
f44f99a5 3490
a7519a3c
RH
3491 /* There must be a GPDISP relocation positioned immediately after the
3492 LITUSE relocation. */
3493 gpdisp = elf64_alpha_find_reloc_at_ofs (info->relocs, info->relend,
3494 irel[2].r_offset + 4, R_ALPHA_GPDISP);
3495 if (!gpdisp)
b34976b6 3496 return TRUE;
f44f99a5 3497
a7519a3c
RH
3498 pos[0] = info->contents + irel[0].r_offset;
3499 pos[1] = info->contents + irel[1].r_offset;
3500 pos[2] = info->contents + irel[2].r_offset;
3501 pos[3] = info->contents + gpdisp->r_offset;
3502 pos[4] = pos[3] + gpdisp->r_addend;
f44f99a5 3503
7dbf3b76
RH
3504 /* Beware of the compiler hoisting part of the sequence out a loop
3505 and adjusting the destination register for the TLSGD insn. If this
3506 happens, there will be a move into $16 before the JSR insn, so only
3507 transformations of the first insn pair should use this register. */
3508 tlsgd_reg = bfd_get_32 (info->abfd, pos[0]);
3509 tlsgd_reg = (tlsgd_reg >> 21) & 31;
3510
a7519a3c
RH
3511 /* Generally, the positions are not allowed to be out of order, lest the
3512 modified insn sequence have different register lifetimes. We can make
3513 an exception when pos 1 is adjacent to pos 0. */
3514 if (pos[1] + 4 == pos[0])
f44f99a5 3515 {
a7519a3c
RH
3516 bfd_byte *tmp = pos[0];
3517 pos[0] = pos[1];
3518 pos[1] = tmp;
f44f99a5 3519 }
a7519a3c
RH
3520 if (pos[1] >= pos[2] || pos[2] >= pos[3])
3521 return TRUE;
cc03ec80 3522
a7519a3c
RH
3523 /* Reduce the use count on the LITERAL relocation. Do this before we
3524 smash the symndx when we adjust the relocations below. */
3525 {
3526 struct alpha_elf_got_entry *lit_gotent;
3527 struct alpha_elf_link_hash_entry *lit_h;
3528 unsigned long indx;
f44f99a5 3529
a7519a3c
RH
3530 BFD_ASSERT (ELF64_R_SYM (irel[1].r_info) >= info->symtab_hdr->sh_info);
3531 indx = ELF64_R_SYM (irel[1].r_info) - info->symtab_hdr->sh_info;
3532 lit_h = alpha_elf_sym_hashes (info->abfd)[indx];
f44f99a5 3533
a7519a3c
RH
3534 while (lit_h->root.root.type == bfd_link_hash_indirect
3535 || lit_h->root.root.type == bfd_link_hash_warning)
3536 lit_h = (struct alpha_elf_link_hash_entry *) lit_h->root.root.u.i.link;
252b5132 3537
a7519a3c
RH
3538 for (lit_gotent = lit_h->got_entries; lit_gotent ;
3539 lit_gotent = lit_gotent->next)
3540 if (lit_gotent->gotobj == info->gotobj
3541 && lit_gotent->reloc_type == R_ALPHA_LITERAL
3542 && lit_gotent->addend == irel[1].r_addend)
3543 break;
3544 BFD_ASSERT (lit_gotent);
252b5132 3545
a7519a3c
RH
3546 if (--lit_gotent->use_count == 0)
3547 {
3548 int sz = alpha_got_entry_size (R_ALPHA_LITERAL);
3549 alpha_elf_tdata (info->gotobj)->total_got_size -= sz;
3550 }
3551 }
252b5132 3552
a7519a3c 3553 /* Change
252b5132 3554
a7519a3c
RH
3555 lda $16,x($gp) !tlsgd!1
3556 ldq $27,__tls_get_addr($gp) !literal!1
3557 jsr $26,($27),__tls_get_addr !lituse_tlsgd!1
3558 ldah $29,0($26) !gpdisp!2
3559 lda $29,0($29) !gpdisp!2
3560 to
3561 ldq $16,x($gp) !gottprel
3562 unop
3563 call_pal rduniq
3564 addq $16,$0,$0
3565 unop
3566 or the first pair to
3567 lda $16,x($gp) !tprel
3568 unop
3569 or
3570 ldah $16,x($gp) !tprelhi
3571 lda $16,x($16) !tprello
3572
3573 as appropriate. */
3574
3575 use_gottprel = FALSE;
cf35638d 3576 new_symndx = is_gd ? ELF64_R_SYM (irel->r_info) : STN_UNDEF;
891caa9b 3577
9a757e4d
RM
3578 /* Some compilers warn about a Boolean-looking expression being
3579 used in a switch. The explicit cast silences them. */
0e1862bb 3580 switch ((int) (!dynamic && !bfd_link_pic (info->link_info)))
252b5132 3581 {
a7519a3c
RH
3582 case 1:
3583 {
3584 bfd_vma tp_base;
3585 bfd_signed_vma disp;
252b5132 3586
a7519a3c
RH
3587 BFD_ASSERT (elf_hash_table (info->link_info)->tls_sec != NULL);
3588 tp_base = alpha_get_tprel_base (info->link_info);
3589 disp = symval - tp_base;
252b5132 3590
a7519a3c
RH
3591 if (disp >= -0x8000 && disp < 0x8000)
3592 {
891caa9b 3593 insn = (OP_LDA << 26) | (tlsgd_reg << 21) | (31 << 16);
a7519a3c
RH
3594 bfd_put_32 (info->abfd, (bfd_vma) insn, pos[0]);
3595 bfd_put_32 (info->abfd, (bfd_vma) INSN_UNOP, pos[1]);
3765b1be 3596
a7519a3c
RH
3597 irel[0].r_offset = pos[0] - info->contents;
3598 irel[0].r_info = ELF64_R_INFO (new_symndx, R_ALPHA_TPREL16);
3599 irel[1].r_info = ELF64_R_INFO (0, R_ALPHA_NONE);
3600 break;
3601 }
3602 else if (disp >= -(bfd_signed_vma) 0x80000000
3603 && disp < (bfd_signed_vma) 0x7fff8000
891caa9b 3604 && pos[0] + 4 == pos[1])
a7519a3c 3605 {
891caa9b 3606 insn = (OP_LDAH << 26) | (tlsgd_reg << 21) | (31 << 16);
a7519a3c 3607 bfd_put_32 (info->abfd, (bfd_vma) insn, pos[0]);
891caa9b 3608 insn = (OP_LDA << 26) | (tlsgd_reg << 21) | (tlsgd_reg << 16);
a7519a3c 3609 bfd_put_32 (info->abfd, (bfd_vma) insn, pos[1]);
3765b1be 3610
a7519a3c
RH
3611 irel[0].r_offset = pos[0] - info->contents;
3612 irel[0].r_info = ELF64_R_INFO (new_symndx, R_ALPHA_TPRELHI);
3613 irel[1].r_offset = pos[1] - info->contents;
3614 irel[1].r_info = ELF64_R_INFO (new_symndx, R_ALPHA_TPRELLO);
3615 break;
3616 }
3617 }
3618 /* FALLTHRU */
3765b1be 3619
3765b1be 3620 default:
a7519a3c
RH
3621 use_gottprel = TRUE;
3622
891caa9b 3623 insn = (OP_LDQ << 26) | (tlsgd_reg << 21) | (29 << 16);
a7519a3c
RH
3624 bfd_put_32 (info->abfd, (bfd_vma) insn, pos[0]);
3625 bfd_put_32 (info->abfd, (bfd_vma) INSN_UNOP, pos[1]);
3626
3627 irel[0].r_offset = pos[0] - info->contents;
3628 irel[0].r_info = ELF64_R_INFO (new_symndx, R_ALPHA_GOTTPREL);
3629 irel[1].r_info = ELF64_R_INFO (0, R_ALPHA_NONE);
3630 break;
3765b1be 3631 }
3765b1be 3632
a7519a3c 3633 bfd_put_32 (info->abfd, (bfd_vma) INSN_RDUNIQ, pos[2]);
252b5132 3634
a7519a3c
RH
3635 insn = INSN_ADDQ | (16 << 21) | (0 << 16) | (0 << 0);
3636 bfd_put_32 (info->abfd, (bfd_vma) insn, pos[3]);
3765b1be 3637
a7519a3c 3638 bfd_put_32 (info->abfd, (bfd_vma) INSN_UNOP, pos[4]);
e92d460e 3639
a7519a3c
RH
3640 irel[2].r_info = ELF64_R_INFO (0, R_ALPHA_NONE);
3641 gpdisp->r_info = ELF64_R_INFO (0, R_ALPHA_NONE);
252b5132 3642
a7519a3c
RH
3643 hint = elf64_alpha_find_reloc_at_ofs (info->relocs, info->relend,
3644 irel[2].r_offset, R_ALPHA_HINT);
3645 if (hint)
3646 hint->r_info = ELF64_R_INFO (0, R_ALPHA_NONE);
252b5132 3647
a7519a3c
RH
3648 info->changed_contents = TRUE;
3649 info->changed_relocs = TRUE;
d6ad34f6 3650
a7519a3c
RH
3651 /* Reduce the use count on the TLSGD/TLSLDM relocation. */
3652 if (--info->gotent->use_count == 0)
3765b1be 3653 {
a7519a3c
RH
3654 int sz = alpha_got_entry_size (info->gotent->reloc_type);
3655 alpha_elf_tdata (info->gotobj)->total_got_size -= sz;
3656 if (!info->h)
3657 alpha_elf_tdata (info->gotobj)->local_got_size -= sz;
3765b1be 3658 }
252b5132 3659
a7519a3c
RH
3660 /* If we've switched to a GOTTPREL relocation, increment the reference
3661 count on that got entry. */
3662 if (use_gottprel)
f44f99a5 3663 {
a7519a3c 3664 struct alpha_elf_got_entry *tprel_gotent;
f44f99a5 3665
a7519a3c
RH
3666 for (tprel_gotent = *info->first_gotent; tprel_gotent ;
3667 tprel_gotent = tprel_gotent->next)
3668 if (tprel_gotent->gotobj == info->gotobj
3669 && tprel_gotent->reloc_type == R_ALPHA_GOTTPREL
3670 && tprel_gotent->addend == irel->r_addend)
3671 break;
3672 if (tprel_gotent)
3673 tprel_gotent->use_count++;
3674 else
f44f99a5 3675 {
a7519a3c
RH
3676 if (info->gotent->use_count == 0)
3677 tprel_gotent = info->gotent;
3678 else
3679 {
3680 tprel_gotent = (struct alpha_elf_got_entry *)
3681 bfd_alloc (info->abfd, sizeof (struct alpha_elf_got_entry));
3682 if (!tprel_gotent)
3683 return FALSE;
f44f99a5 3684
a7519a3c
RH
3685 tprel_gotent->next = *info->first_gotent;
3686 *info->first_gotent = tprel_gotent;
f44f99a5 3687
a7519a3c
RH
3688 tprel_gotent->gotobj = info->gotobj;
3689 tprel_gotent->addend = irel->r_addend;
3690 tprel_gotent->got_offset = -1;
3691 tprel_gotent->reloc_done = 0;
3692 tprel_gotent->reloc_xlated = 0;
3693 }
f44f99a5 3694
a7519a3c
RH
3695 tprel_gotent->use_count = 1;
3696 tprel_gotent->reloc_type = R_ALPHA_GOTTPREL;
3697 }
f44f99a5 3698 }
f44f99a5 3699
b34976b6 3700 return TRUE;
f44f99a5
RH
3701}
3702
b34976b6 3703static bfd_boolean
a7519a3c
RH
3704elf64_alpha_relax_section (bfd *abfd, asection *sec,
3705 struct bfd_link_info *link_info, bfd_boolean *again)
f44f99a5 3706{
a7519a3c
RH
3707 Elf_Internal_Shdr *symtab_hdr;
3708 Elf_Internal_Rela *internal_relocs;
3709 Elf_Internal_Rela *irel, *irelend;
3710 Elf_Internal_Sym *isymbuf = NULL;
3711 struct alpha_elf_got_entry **local_got_entries;
3712 struct alpha_relax_info info;
4dfe6ac6 3713 struct alpha_elf_link_hash_table * htab;
d1c109de 3714 int relax_pass;
4dfe6ac6
NC
3715
3716 htab = alpha_elf_hash_table (link_info);
3717 if (htab == NULL)
3718 return FALSE;
f44f99a5 3719
4a828aab 3720 /* There's nothing to change, yet. */
a7519a3c 3721 *again = FALSE;
f44f99a5 3722
0e1862bb 3723 if (bfd_link_relocatable (link_info)
a7519a3c
RH
3724 || ((sec->flags & (SEC_CODE | SEC_RELOC | SEC_ALLOC))
3725 != (SEC_CODE | SEC_RELOC | SEC_ALLOC))
3726 || sec->reloc_count == 0)
d6ad34f6
RH
3727 return TRUE;
3728
0ffa91dd 3729 BFD_ASSERT (is_alpha_elf (abfd));
d1c109de 3730 relax_pass = link_info->relax_pass;
0ffa91dd 3731
4a828aab 3732 /* Make sure our GOT and PLT tables are up-to-date. */
4dfe6ac6 3733 if (htab->relax_trip != link_info->relax_trip)
4a828aab 3734 {
4dfe6ac6 3735 htab->relax_trip = link_info->relax_trip;
4a828aab 3736
d1c109de 3737 /* This should never fail after the initial round, since the only error
07d6d2b8 3738 is GOT overflow, and relaxation only shrinks the table. However, we
d1c109de
RH
3739 may only merge got sections during the first pass. If we merge
3740 sections after we've created GPREL relocs, the GP for the merged
3741 section backs up which may put the relocs out of range. */
3742 if (!elf64_alpha_size_got_sections (link_info, relax_pass == 0))
4a828aab
RH
3743 abort ();
3744 if (elf_hash_table (link_info)->dynamic_sections_created)
3745 {
3746 elf64_alpha_size_plt_section (link_info);
3747 elf64_alpha_size_rela_got_section (link_info);
3748 }
3749 }
3750
0ffa91dd 3751 symtab_hdr = &elf_symtab_hdr (abfd);
a7519a3c 3752 local_got_entries = alpha_elf_tdata(abfd)->local_got_entries;
252b5132 3753
a7519a3c
RH
3754 /* Load the relocations for this section. */
3755 internal_relocs = (_bfd_elf_link_read_relocs
2c3fc389 3756 (abfd, sec, NULL, (Elf_Internal_Rela *) NULL,
a7519a3c
RH
3757 link_info->keep_memory));
3758 if (internal_relocs == NULL)
3759 return FALSE;
252b5132 3760
a7519a3c
RH
3761 memset(&info, 0, sizeof (info));
3762 info.abfd = abfd;
3763 info.sec = sec;
3764 info.link_info = link_info;
3765 info.symtab_hdr = symtab_hdr;
3766 info.relocs = internal_relocs;
3767 info.relend = irelend = internal_relocs + sec->reloc_count;
3768
3769 /* Find the GP for this object. Do not store the result back via
3770 _bfd_set_gp_value, since this could change again before final. */
3771 info.gotobj = alpha_elf_tdata (abfd)->gotobj;
3772 if (info.gotobj)
3765b1be 3773 {
a7519a3c
RH
3774 asection *sgot = alpha_elf_tdata (info.gotobj)->got;
3775 info.gp = (sgot->output_section->vma
3776 + sgot->output_offset
3777 + 0x8000);
252b5132
RH
3778 }
3779
a7519a3c
RH
3780 /* Get the section contents. */
3781 if (elf_section_data (sec)->this_hdr.contents != NULL)
3782 info.contents = elf_section_data (sec)->this_hdr.contents;
3783 else
3784 {
3785 if (!bfd_malloc_and_get_section (abfd, sec, &info.contents))
3786 goto error_return;
3787 }
252b5132 3788
a7519a3c
RH
3789 for (irel = internal_relocs; irel < irelend; irel++)
3790 {
3791 bfd_vma symval;
3792 struct alpha_elf_got_entry *gotent;
3793 unsigned long r_type = ELF64_R_TYPE (irel->r_info);
3794 unsigned long r_symndx = ELF64_R_SYM (irel->r_info);
3795
3796 /* Early exit for unhandled or unrelaxable relocations. */
d1c109de 3797 if (r_type != R_ALPHA_LITERAL)
07d6d2b8
AM
3798 {
3799 /* We complete everything except LITERAL in the first pass. */
d1c109de
RH
3800 if (relax_pass != 0)
3801 continue;
3802 if (r_type == R_ALPHA_TLSLDM)
3803 {
3804 /* The symbol for a TLSLDM reloc is ignored. Collapse the
07d6d2b8 3805 reloc to the STN_UNDEF (0) symbol so that they all match. */
d1c109de
RH
3806 r_symndx = STN_UNDEF;
3807 }
3808 else if (r_type != R_ALPHA_GOTDTPREL
07d6d2b8 3809 && r_type != R_ALPHA_GOTTPREL
d1c109de
RH
3810 && r_type != R_ALPHA_TLSGD)
3811 continue;
a7519a3c
RH
3812 }
3813
3814 /* Get the value of the symbol referred to by the reloc. */
3815 if (r_symndx < symtab_hdr->sh_info)
3816 {
3817 /* A local symbol. */
3818 Elf_Internal_Sym *isym;
3819
3820 /* Read this BFD's local symbols. */
3821 if (isymbuf == NULL)
3822 {
3823 isymbuf = (Elf_Internal_Sym *) symtab_hdr->contents;
3824 if (isymbuf == NULL)
3825 isymbuf = bfd_elf_get_elf_syms (abfd, symtab_hdr,
3826 symtab_hdr->sh_info, 0,
3827 NULL, NULL, NULL);
3828 if (isymbuf == NULL)
3829 goto error_return;
3830 }
252b5132 3831
a7519a3c 3832 isym = isymbuf + r_symndx;
252b5132 3833
a7519a3c
RH
3834 /* Given the symbol for a TLSLDM reloc is ignored, this also
3835 means forcing the symbol value to the tp base. */
3836 if (r_type == R_ALPHA_TLSLDM)
3837 {
3838 info.tsec = bfd_abs_section_ptr;
3839 symval = alpha_get_tprel_base (info.link_info);
3840 }
3841 else
3842 {
3843 symval = isym->st_value;
3844 if (isym->st_shndx == SHN_UNDEF)
07d6d2b8 3845 continue;
a7519a3c 3846 else if (isym->st_shndx == SHN_ABS)
07d6d2b8 3847 info.tsec = bfd_abs_section_ptr;
a7519a3c 3848 else if (isym->st_shndx == SHN_COMMON)
07d6d2b8 3849 info.tsec = bfd_com_section_ptr;
a7519a3c 3850 else
07d6d2b8 3851 info.tsec = bfd_section_from_elf_index (abfd, isym->st_shndx);
a7519a3c 3852 }
252b5132 3853
a7519a3c
RH
3854 info.h = NULL;
3855 info.other = isym->st_other;
3856 if (local_got_entries)
3857 info.first_gotent = &local_got_entries[r_symndx];
3858 else
3859 {
3860 info.first_gotent = &info.gotent;
3861 info.gotent = NULL;
3862 }
252b5132 3863 }
a7519a3c
RH
3864 else
3865 {
3866 unsigned long indx;
3867 struct alpha_elf_link_hash_entry *h;
252b5132 3868
a7519a3c
RH
3869 indx = r_symndx - symtab_hdr->sh_info;
3870 h = alpha_elf_sym_hashes (abfd)[indx];
3871 BFD_ASSERT (h != NULL);
252b5132 3872
a7519a3c
RH
3873 while (h->root.root.type == bfd_link_hash_indirect
3874 || h->root.root.type == bfd_link_hash_warning)
3875 h = (struct alpha_elf_link_hash_entry *)h->root.root.u.i.link;
252b5132 3876
a7519a3c
RH
3877 /* If the symbol is undefined, we can't do anything with it. */
3878 if (h->root.root.type == bfd_link_hash_undefined)
3879 continue;
252b5132 3880
a7519a3c
RH
3881 /* If the symbol isn't defined in the current module,
3882 again we can't do anything. */
3883 if (h->root.root.type == bfd_link_hash_undefweak)
3884 {
3885 info.tsec = bfd_abs_section_ptr;
3886 symval = 0;
3887 }
3888 else if (!h->root.def_regular)
3889 {
3890 /* Except for TLSGD relocs, which can sometimes be
3891 relaxed to GOTTPREL relocs. */
3892 if (r_type != R_ALPHA_TLSGD)
3893 continue;
3894 info.tsec = bfd_abs_section_ptr;
3895 symval = 0;
3896 }
3897 else
3898 {
3899 info.tsec = h->root.root.u.def.section;
3900 symval = h->root.root.u.def.value;
3901 }
252b5132 3902
a7519a3c
RH
3903 info.h = h;
3904 info.other = h->root.other;
3905 info.first_gotent = &h->got_entries;
3906 }
252b5132 3907
a7519a3c
RH
3908 /* Search for the got entry to be used by this relocation. */
3909 for (gotent = *info.first_gotent; gotent ; gotent = gotent->next)
3910 if (gotent->gotobj == info.gotobj
3911 && gotent->reloc_type == r_type
3912 && gotent->addend == irel->r_addend)
3913 break;
3914 info.gotent = gotent;
252b5132 3915
a7519a3c
RH
3916 symval += info.tsec->output_section->vma + info.tsec->output_offset;
3917 symval += irel->r_addend;
252b5132 3918
a7519a3c 3919 switch (r_type)
252b5132 3920 {
a7519a3c
RH
3921 case R_ALPHA_LITERAL:
3922 BFD_ASSERT(info.gotent != NULL);
252b5132 3923
a7519a3c
RH
3924 /* If there exist LITUSE relocations immediately following, this
3925 opens up all sorts of interesting optimizations, because we
3926 now know every location that this address load is used. */
3927 if (irel+1 < irelend
3928 && ELF64_R_TYPE (irel[1].r_info) == R_ALPHA_LITUSE)
252b5132 3929 {
a7519a3c
RH
3930 if (!elf64_alpha_relax_with_lituse (&info, symval, irel))
3931 goto error_return;
252b5132 3932 }
a7519a3c
RH
3933 else
3934 {
3935 if (!elf64_alpha_relax_got_load (&info, symval, irel, r_type))
3936 goto error_return;
3937 }
3938 break;
252b5132 3939
a7519a3c
RH
3940 case R_ALPHA_GOTDTPREL:
3941 case R_ALPHA_GOTTPREL:
3942 BFD_ASSERT(info.gotent != NULL);
3943 if (!elf64_alpha_relax_got_load (&info, symval, irel, r_type))
3944 goto error_return;
3945 break;
3946
3947 case R_ALPHA_TLSGD:
3948 case R_ALPHA_TLSLDM:
3949 BFD_ASSERT(info.gotent != NULL);
3950 if (!elf64_alpha_relax_tls_get_addr (&info, symval, irel,
3951 r_type == R_ALPHA_TLSGD))
3952 goto error_return;
3953 break;
252b5132
RH
3954 }
3955 }
3956
a7519a3c
RH
3957 if (isymbuf != NULL
3958 && symtab_hdr->contents != (unsigned char *) isymbuf)
3959 {
3960 if (!link_info->keep_memory)
3961 free (isymbuf);
3962 else
252b5132 3963 {
a7519a3c
RH
3964 /* Cache the symbols for elf_link_input_bfd. */
3965 symtab_hdr->contents = (unsigned char *) isymbuf;
252b5132 3966 }
a7519a3c 3967 }
252b5132 3968
a7519a3c
RH
3969 if (info.contents != NULL
3970 && elf_section_data (sec)->this_hdr.contents != info.contents)
3971 {
3972 if (!info.changed_contents && !link_info->keep_memory)
3973 free (info.contents);
3974 else
252b5132 3975 {
a7519a3c
RH
3976 /* Cache the section contents for elf_link_input_bfd. */
3977 elf_section_data (sec)->this_hdr.contents = info.contents;
252b5132 3978 }
a7519a3c 3979 }
252b5132 3980
a7519a3c
RH
3981 if (elf_section_data (sec)->relocs != internal_relocs)
3982 {
3983 if (!info.changed_relocs)
3984 free (internal_relocs);
3985 else
3986 elf_section_data (sec)->relocs = internal_relocs;
252b5132 3987 }
a7519a3c
RH
3988
3989 *again = info.changed_contents || info.changed_relocs;
252b5132 3990
b34976b6 3991 return TRUE;
252b5132 3992
a7519a3c 3993 error_return:
c9594989 3994 if (symtab_hdr->contents != (unsigned char *) isymbuf)
a7519a3c 3995 free (isymbuf);
c9594989 3996 if (elf_section_data (sec)->this_hdr.contents != info.contents)
a7519a3c 3997 free (info.contents);
c9594989 3998 if (elf_section_data (sec)->relocs != internal_relocs)
a7519a3c
RH
3999 free (internal_relocs);
4000 return FALSE;
4001}
4002\f
1bbc9cec
RH
4003/* Emit a dynamic relocation for (DYNINDX, RTYPE, ADDEND) at (SEC, OFFSET)
4004 into the next available slot in SREL. */
4005
4006static void
a7519a3c
RH
4007elf64_alpha_emit_dynrel (bfd *abfd, struct bfd_link_info *info,
4008 asection *sec, asection *srel, bfd_vma offset,
4009 long dynindx, long rtype, bfd_vma addend)
1bbc9cec
RH
4010{
4011 Elf_Internal_Rela outrel;
4012 bfd_byte *loc;
4013
4014 BFD_ASSERT (srel != NULL);
4015
4016 outrel.r_info = ELF64_R_INFO (dynindx, rtype);
4017 outrel.r_addend = addend;
4018
4019 offset = _bfd_elf_section_offset (abfd, info, sec, offset);
4020 if ((offset | 1) != (bfd_vma) -1)
4021 outrel.r_offset = sec->output_section->vma + sec->output_offset + offset;
4022 else
4023 memset (&outrel, 0, sizeof (outrel));
4024
4025 loc = srel->contents;
4026 loc += srel->reloc_count++ * sizeof (Elf64_External_Rela);
4027 bfd_elf64_swap_reloca_out (abfd, &outrel, loc);
eea6121a 4028 BFD_ASSERT (sizeof (Elf64_External_Rela) * srel->reloc_count <= srel->size);
1bbc9cec
RH
4029}
4030
4a67a098
RH
4031/* Relocate an Alpha ELF section for a relocatable link.
4032
4033 We don't have to change anything unless the reloc is against a section
4034 symbol, in which case we have to adjust according to where the section
4035 symbol winds up in the output section. */
4036
b34976b6 4037static bfd_boolean
a7519a3c
RH
4038elf64_alpha_relocate_section_r (bfd *output_bfd ATTRIBUTE_UNUSED,
4039 struct bfd_link_info *info ATTRIBUTE_UNUSED,
4040 bfd *input_bfd, asection *input_section,
4041 bfd_byte *contents ATTRIBUTE_UNUSED,
4042 Elf_Internal_Rela *relocs,
4043 Elf_Internal_Sym *local_syms,
4044 asection **local_sections)
4a67a098
RH
4045{
4046 unsigned long symtab_hdr_sh_info;
4047 Elf_Internal_Rela *rel;
4048 Elf_Internal_Rela *relend;
ab96bf03 4049 struct elf_link_hash_entry **sym_hashes;
b34976b6 4050 bfd_boolean ret_val = TRUE;
4a67a098 4051
0ffa91dd 4052 symtab_hdr_sh_info = elf_symtab_hdr (input_bfd).sh_info;
ab96bf03 4053 sym_hashes = elf_sym_hashes (input_bfd);
4a67a098
RH
4054
4055 relend = relocs + input_section->reloc_count;
4056 for (rel = relocs; rel < relend; rel++)
4057 {
4058 unsigned long r_symndx;
4059 Elf_Internal_Sym *sym;
4060 asection *sec;
4061 unsigned long r_type;
4062
ab96bf03 4063 r_type = ELF64_R_TYPE (rel->r_info);
4a67a098
RH
4064 if (r_type >= R_ALPHA_max)
4065 {
4eca0228 4066 _bfd_error_handler
695344c0 4067 /* xgettext:c-format */
0aa13fee 4068 (_("%pB: unsupported relocation type %#x"),
d003868e 4069 input_bfd, (int) r_type);
4a67a098 4070 bfd_set_error (bfd_error_bad_value);
b34976b6 4071 ret_val = FALSE;
4a67a098
RH
4072 continue;
4073 }
4074
4a67a098
RH
4075 /* The symbol associated with GPDISP and LITUSE is
4076 immaterial. Only the addend is significant. */
4077 if (r_type == R_ALPHA_GPDISP || r_type == R_ALPHA_LITUSE)
4078 continue;
4079
ab96bf03 4080 r_symndx = ELF64_R_SYM (rel->r_info);
4a67a098
RH
4081 if (r_symndx < symtab_hdr_sh_info)
4082 {
4083 sym = local_syms + r_symndx;
ab96bf03 4084 sec = local_sections[r_symndx];
4a67a098 4085 }
ab96bf03
AM
4086 else
4087 {
4088 struct elf_link_hash_entry *h;
4089
4090 h = sym_hashes[r_symndx - symtab_hdr_sh_info];
4091
4092 while (h->root.type == bfd_link_hash_indirect
4093 || h->root.type == bfd_link_hash_warning)
4094 h = (struct elf_link_hash_entry *) h->root.u.i.link;
4095
4096 if (h->root.type != bfd_link_hash_defined
4097 && h->root.type != bfd_link_hash_defweak)
4098 continue;
4099
4100 sym = NULL;
4101 sec = h->root.u.def.section;
4102 }
4103
dbaa2011 4104 if (sec != NULL && discarded_section (sec))
e4067dbb 4105 RELOC_AGAINST_DISCARDED_SECTION (info, input_bfd, input_section,
545fd46b
MR
4106 rel, 1, relend,
4107 elf64_alpha_howto_table + r_type, 0,
e4067dbb 4108 contents);
ab96bf03
AM
4109
4110 if (sym != NULL && ELF_ST_TYPE (sym->st_info) == STT_SECTION)
4111 rel->r_addend += sec->output_offset;
4a67a098
RH
4112 }
4113
4114 return ret_val;
4115}
4116
252b5132
RH
4117/* Relocate an Alpha ELF section. */
4118
b34976b6 4119static bfd_boolean
a7519a3c
RH
4120elf64_alpha_relocate_section (bfd *output_bfd, struct bfd_link_info *info,
4121 bfd *input_bfd, asection *input_section,
4122 bfd_byte *contents, Elf_Internal_Rela *relocs,
4123 Elf_Internal_Sym *local_syms,
4124 asection **local_sections)
252b5132 4125{
4a67a098 4126 Elf_Internal_Shdr *symtab_hdr;
252b5132
RH
4127 Elf_Internal_Rela *rel;
4128 Elf_Internal_Rela *relend;
4a67a098
RH
4129 asection *sgot, *srel, *srelgot;
4130 bfd *dynobj, *gotobj;
4131 bfd_vma gp, tp_base, dtp_base;
4132 struct alpha_elf_got_entry **local_got_entries;
b34976b6 4133 bfd_boolean ret_val;
252b5132 4134
0ffa91dd 4135 BFD_ASSERT (is_alpha_elf (input_bfd));
68ffbac6 4136
4a67a098 4137 /* Handle relocatable links with a smaller loop. */
0e1862bb 4138 if (bfd_link_relocatable (info))
4a67a098
RH
4139 return elf64_alpha_relocate_section_r (output_bfd, info, input_bfd,
4140 input_section, contents, relocs,
4141 local_syms, local_sections);
4142
4143 /* This is a final link. */
4144
b34976b6 4145 ret_val = TRUE;
252b5132 4146
0ffa91dd 4147 symtab_hdr = &elf_symtab_hdr (input_bfd);
3765b1be 4148
4a67a098 4149 dynobj = elf_hash_table (info)->dynobj;
ce558b89 4150 srelgot = elf_hash_table (info)->srelgot;
4a67a098 4151
3241278a
RH
4152 if (input_section->flags & SEC_ALLOC)
4153 {
4154 const char *section_name;
4155 section_name = (bfd_elf_string_from_elf_section
4156 (input_bfd, elf_elfheader(input_bfd)->e_shstrndx,
d4730f92 4157 _bfd_elf_single_rel_hdr (input_section)->sh_name));
3241278a 4158 BFD_ASSERT(section_name != NULL);
3d4d4302 4159 srel = bfd_get_linker_section (dynobj, section_name);
3241278a
RH
4160 }
4161 else
4162 srel = NULL;
3765b1be 4163
4a67a098
RH
4164 /* Find the gp value for this input bfd. */
4165 gotobj = alpha_elf_tdata (input_bfd)->gotobj;
4166 if (gotobj)
4167 {
4168 sgot = alpha_elf_tdata (gotobj)->got;
4169 gp = _bfd_get_gp_value (gotobj);
4170 if (gp == 0)
252b5132 4171 {
4a67a098
RH
4172 gp = (sgot->output_section->vma
4173 + sgot->output_offset
4174 + 0x8000);
4175 _bfd_set_gp_value (gotobj, gp);
4176 }
4177 }
4178 else
4179 {
4180 sgot = NULL;
4181 gp = 0;
4182 }
3765b1be 4183
4a67a098
RH
4184 local_got_entries = alpha_elf_tdata(input_bfd)->local_got_entries;
4185
e1918d23 4186 if (elf_hash_table (info)->tls_sec != NULL)
4a67a098 4187 {
e1918d23
AM
4188 dtp_base = alpha_get_dtprel_base (info);
4189 tp_base = alpha_get_tprel_base (info);
252b5132 4190 }
4a67a098
RH
4191 else
4192 dtp_base = tp_base = 0;
252b5132 4193
252b5132 4194 relend = relocs + input_section->reloc_count;
4a67a098 4195 for (rel = relocs; rel < relend; rel++)
252b5132 4196 {
4a67a098 4197 struct alpha_elf_link_hash_entry *h = NULL;
3765b1be
RH
4198 struct alpha_elf_got_entry *gotent;
4199 bfd_reloc_status_type r;
252b5132
RH
4200 reloc_howto_type *howto;
4201 unsigned long r_symndx;
4a67a098
RH
4202 Elf_Internal_Sym *sym = NULL;
4203 asection *sec = NULL;
3765b1be 4204 bfd_vma value;
dc810e39 4205 bfd_vma addend;
b34976b6 4206 bfd_boolean dynamic_symbol_p;
1d5316ab 4207 bfd_boolean unresolved_reloc = FALSE;
b34976b6 4208 bfd_boolean undef_weak_ref = FALSE;
3765b1be 4209 unsigned long r_type;
252b5132
RH
4210
4211 r_type = ELF64_R_TYPE(rel->r_info);
3765b1be 4212 if (r_type >= R_ALPHA_max)
252b5132 4213 {
4eca0228 4214 _bfd_error_handler
695344c0 4215 /* xgettext:c-format */
0aa13fee 4216 (_("%pB: unsupported relocation type %#x"),
d003868e 4217 input_bfd, (int) r_type);
252b5132 4218 bfd_set_error (bfd_error_bad_value);
b34976b6 4219 ret_val = FALSE;
3765b1be 4220 continue;
252b5132 4221 }
252b5132 4222
3765b1be 4223 howto = elf64_alpha_howto_table + r_type;
252b5132
RH
4224 r_symndx = ELF64_R_SYM(rel->r_info);
4225
cc03ec80 4226 /* The symbol for a TLSLDM reloc is ignored. Collapse the
cf35638d 4227 reloc to the STN_UNDEF (0) symbol so that they all match. */
cc03ec80 4228 if (r_type == R_ALPHA_TLSLDM)
cf35638d 4229 r_symndx = STN_UNDEF;
cc03ec80 4230
252b5132
RH
4231 if (r_symndx < symtab_hdr->sh_info)
4232 {
8517fae7 4233 asection *msec;
252b5132
RH
4234 sym = local_syms + r_symndx;
4235 sec = local_sections[r_symndx];
8517fae7
AM
4236 msec = sec;
4237 value = _bfd_elf_rela_local_sym (output_bfd, sym, &msec, rel);
3765b1be 4238
cf35638d 4239 /* If this is a tp-relative relocation against sym STN_UNDEF (0),
cc03ec80 4240 this is hackery from relax_section. Force the value to
f915360b 4241 be the tls module base. */
cf35638d 4242 if (r_symndx == STN_UNDEF
cc03ec80
RH
4243 && (r_type == R_ALPHA_TLSLDM
4244 || r_type == R_ALPHA_GOTTPREL
4245 || r_type == R_ALPHA_TPREL64
4246 || r_type == R_ALPHA_TPRELHI
4247 || r_type == R_ALPHA_TPRELLO
4248 || r_type == R_ALPHA_TPREL16))
f915360b 4249 value = dtp_base;
cc03ec80 4250
4a67a098
RH
4251 if (local_got_entries)
4252 gotent = local_got_entries[r_symndx];
4253 else
4254 gotent = NULL;
3765b1be
RH
4255
4256 /* Need to adjust local GOT entries' addends for SEC_MERGE
4257 unless it has been done already. */
4258 if ((sec->flags & SEC_MERGE)
048d873d 4259 && ELF_ST_TYPE (sym->st_info) == STT_SECTION
dbaa2011 4260 && sec->sec_info_type == SEC_INFO_TYPE_MERGE
048d873d
RH
4261 && gotent
4262 && !gotent->reloc_xlated)
3765b1be
RH
4263 {
4264 struct alpha_elf_got_entry *ent;
3765b1be
RH
4265
4266 for (ent = gotent; ent; ent = ent->next)
4267 {
4268 ent->reloc_xlated = 1;
4269 if (ent->use_count == 0)
4270 continue;
4271 msec = sec;
4272 ent->addend =
4273 _bfd_merged_section_offset (output_bfd, &msec,
4274 elf_section_data (sec)->
4275 sec_info,
753731ee 4276 sym->st_value + ent->addend);
3765b1be
RH
4277 ent->addend -= sym->st_value;
4278 ent->addend += msec->output_section->vma
4279 + msec->output_offset
4280 - sec->output_section->vma
4281 - sec->output_offset;
4282 }
4283 }
4284
b34976b6 4285 dynamic_symbol_p = FALSE;
252b5132
RH
4286 }
4287 else
4288 {
62d887d4 4289 bfd_boolean warned, ignored;
560e09e9 4290 struct elf_link_hash_entry *hh;
b2a8e766
AM
4291 struct elf_link_hash_entry **sym_hashes = elf_sym_hashes (input_bfd);
4292
4293 RELOC_FOR_GLOBAL_SYMBOL (info, input_bfd, input_section, rel,
4294 r_symndx, symtab_hdr, sym_hashes,
4295 hh, sec, value,
62d887d4 4296 unresolved_reloc, warned, ignored);
560e09e9
NC
4297
4298 if (warned)
4299 continue;
252b5132 4300
560e09e9
NC
4301 if (value == 0
4302 && ! unresolved_reloc
4303 && hh->root.type == bfd_link_hash_undefweak)
b34976b6 4304 undef_weak_ref = TRUE;
3765b1be 4305
560e09e9 4306 h = (struct alpha_elf_link_hash_entry *) hh;
07d6d2b8 4307 dynamic_symbol_p = alpha_elf_dynamic_symbol_p (&h->root, info);
3765b1be 4308 gotent = h->got_entries;
252b5132 4309 }
3765b1be 4310
dbaa2011 4311 if (sec != NULL && discarded_section (sec))
e4067dbb 4312 RELOC_AGAINST_DISCARDED_SECTION (info, input_bfd, input_section,
545fd46b 4313 rel, 1, relend, howto, 0, contents);
ab96bf03 4314
252b5132 4315 addend = rel->r_addend;
3765b1be
RH
4316 value += addend;
4317
4318 /* Search for the proper got entry. */
4319 for (; gotent ; gotent = gotent->next)
4320 if (gotent->gotobj == gotobj
4321 && gotent->reloc_type == r_type
4322 && gotent->addend == addend)
4323 break;
252b5132
RH
4324
4325 switch (r_type)
4326 {
4327 case R_ALPHA_GPDISP:
4328 {
4329 bfd_byte *p_ldah, *p_lda;
4330
4331 BFD_ASSERT(gp != 0);
4332
3765b1be
RH
4333 value = (input_section->output_section->vma
4334 + input_section->output_offset
4335 + rel->r_offset);
252b5132 4336
3765b1be 4337 p_ldah = contents + rel->r_offset;
252b5132
RH
4338 p_lda = p_ldah + rel->r_addend;
4339
3765b1be 4340 r = elf64_alpha_do_reloc_gpdisp (input_bfd, gp - value,
252b5132
RH
4341 p_ldah, p_lda);
4342 }
4343 break;
4344
252b5132 4345 case R_ALPHA_LITERAL:
3765b1be
RH
4346 BFD_ASSERT(sgot != NULL);
4347 BFD_ASSERT(gp != 0);
4348 BFD_ASSERT(gotent != NULL);
4349 BFD_ASSERT(gotent->use_count >= 1);
f7460f5f 4350
3765b1be
RH
4351 if (!gotent->reloc_done)
4352 {
4353 gotent->reloc_done = 1;
252b5132 4354
3765b1be
RH
4355 bfd_put_64 (output_bfd, value,
4356 sgot->contents + gotent->got_offset);
252b5132 4357
3765b1be
RH
4358 /* If the symbol has been forced local, output a
4359 RELATIVE reloc, otherwise it will be handled in
4360 finish_dynamic_symbol. */
0e1862bb
L
4361 if (bfd_link_pic (info)
4362 && !dynamic_symbol_p
4363 && !undef_weak_ref)
1bbc9cec
RH
4364 elf64_alpha_emit_dynrel (output_bfd, info, sgot, srelgot,
4365 gotent->got_offset, 0,
4366 R_ALPHA_RELATIVE, value);
3765b1be 4367 }
252b5132 4368
3765b1be
RH
4369 value = (sgot->output_section->vma
4370 + sgot->output_offset
4371 + gotent->got_offset);
4372 value -= gp;
252b5132
RH
4373 goto default_reloc;
4374
4375 case R_ALPHA_GPREL32:
ec1659c8 4376 case R_ALPHA_GPREL16:
252b5132 4377 case R_ALPHA_GPRELLOW:
3765b1be 4378 if (dynamic_symbol_p)
07d6d2b8 4379 {
4eca0228 4380 _bfd_error_handler
695344c0 4381 /* xgettext:c-format */
871b3ab2 4382 (_("%pB: gp-relative relocation against dynamic symbol %s"),
07d6d2b8
AM
4383 input_bfd, h->root.root.root.string);
4384 ret_val = FALSE;
4385 }
252b5132 4386 BFD_ASSERT(gp != 0);
3765b1be 4387 value -= gp;
252b5132
RH
4388 goto default_reloc;
4389
4390 case R_ALPHA_GPRELHIGH:
3765b1be 4391 if (dynamic_symbol_p)
07d6d2b8 4392 {
4eca0228 4393 _bfd_error_handler
695344c0 4394 /* xgettext:c-format */
871b3ab2 4395 (_("%pB: gp-relative relocation against dynamic symbol %s"),
07d6d2b8
AM
4396 input_bfd, h->root.root.root.string);
4397 ret_val = FALSE;
4398 }
252b5132 4399 BFD_ASSERT(gp != 0);
3765b1be
RH
4400 value -= gp;
4401 value = ((bfd_signed_vma) value >> 16) + ((value >> 15) & 1);
252b5132
RH
4402 goto default_reloc;
4403
252b5132 4404 case R_ALPHA_HINT:
f94952df
RH
4405 /* A call to a dynamic symbol is definitely out of range of
4406 the 16-bit displacement. Don't bother writing anything. */
3765b1be 4407 if (dynamic_symbol_p)
f94952df
RH
4408 {
4409 r = bfd_reloc_ok;
4410 break;
4411 }
3765b1be
RH
4412 /* The regular PC-relative stuff measures from the start of
4413 the instruction rather than the end. */
4414 value -= 4;
4415 goto default_reloc;
f94952df
RH
4416
4417 case R_ALPHA_BRADDR:
3765b1be 4418 if (dynamic_symbol_p)
07d6d2b8 4419 {
4eca0228 4420 _bfd_error_handler
695344c0 4421 /* xgettext:c-format */
871b3ab2 4422 (_("%pB: pc-relative relocation against dynamic symbol %s"),
07d6d2b8
AM
4423 input_bfd, h->root.root.root.string);
4424 ret_val = FALSE;
4425 }
252b5132
RH
4426 /* The regular PC-relative stuff measures from the start of
4427 the instruction rather than the end. */
3765b1be 4428 value -= 4;
252b5132
RH
4429 goto default_reloc;
4430
7793f4d0
RH
4431 case R_ALPHA_BRSGP:
4432 {
4433 int other;
4434 const char *name;
4435
4436 /* The regular PC-relative stuff measures from the start of
4437 the instruction rather than the end. */
3765b1be 4438 value -= 4;
7793f4d0 4439
ccf00ab6
RH
4440 /* The source and destination gp must be the same. Note that
4441 the source will always have an assigned gp, since we forced
4442 one in check_relocs, but that the destination may not, as
cedb70c5 4443 it might not have had any relocations at all. Also take
ccf00ab6
RH
4444 care not to crash if H is an undefined symbol. */
4445 if (h != NULL && sec != NULL
4446 && alpha_elf_tdata (sec->owner)->gotobj
7793f4d0
RH
4447 && gotobj != alpha_elf_tdata (sec->owner)->gotobj)
4448 {
4eca0228 4449 _bfd_error_handler
695344c0 4450 /* xgettext:c-format */
871b3ab2 4451 (_("%pB: change in gp: BRSGP %s"),
d003868e 4452 input_bfd, h->root.root.root.string);
b34976b6 4453 ret_val = FALSE;
7793f4d0
RH
4454 }
4455
4456 /* The symbol should be marked either NOPV or STD_GPLOAD. */
4457 if (h != NULL)
4458 other = h->root.other;
4459 else
4460 other = sym->st_other;
4461 switch (other & STO_ALPHA_STD_GPLOAD)
4462 {
4463 case STO_ALPHA_NOPV:
07d6d2b8 4464 break;
7793f4d0 4465 case STO_ALPHA_STD_GPLOAD:
64e04ecd 4466 value += 8;
7793f4d0
RH
4467 break;
4468 default:
4469 if (h != NULL)
4470 name = h->root.root.root.string;
4471 else
4472 {
4473 name = (bfd_elf_string_from_elf_section
4474 (input_bfd, symtab_hdr->sh_link, sym->st_name));
4475 if (name == NULL)
4476 name = _("<unknown>");
4477 else if (name[0] == 0)
fd361982 4478 name = bfd_section_name (sec);
7793f4d0 4479 }
4eca0228 4480 _bfd_error_handler
695344c0 4481 /* xgettext:c-format */
871b3ab2 4482 (_("%pB: !samegp reloc against symbol without .prologue: %s"),
d003868e 4483 input_bfd, name);
b34976b6 4484 ret_val = FALSE;
7793f4d0
RH
4485 break;
4486 }
4487
4488 goto default_reloc;
4489 }
4490
252b5132
RH
4491 case R_ALPHA_REFLONG:
4492 case R_ALPHA_REFQUAD:
3765b1be
RH
4493 case R_ALPHA_DTPREL64:
4494 case R_ALPHA_TPREL64:
252b5132 4495 {
1bbc9cec
RH
4496 long dynindx, dyntype = r_type;
4497 bfd_vma dynaddend;
252b5132
RH
4498
4499 /* Careful here to remember RELATIVE relocations for global
4500 variables for symbolic shared objects. */
4501
3765b1be 4502 if (dynamic_symbol_p)
252b5132
RH
4503 {
4504 BFD_ASSERT(h->root.dynindx != -1);
1bbc9cec
RH
4505 dynindx = h->root.dynindx;
4506 dynaddend = addend;
3765b1be
RH
4507 addend = 0, value = 0;
4508 }
4509 else if (r_type == R_ALPHA_DTPREL64)
4510 {
e1918d23 4511 BFD_ASSERT (elf_hash_table (info)->tls_sec != NULL);
3765b1be
RH
4512 value -= dtp_base;
4513 goto default_reloc;
4514 }
4515 else if (r_type == R_ALPHA_TPREL64)
4516 {
e1918d23 4517 BFD_ASSERT (elf_hash_table (info)->tls_sec != NULL);
3cbc1e5e 4518 if (!bfd_link_dll (info))
1bbc9cec
RH
4519 {
4520 value -= tp_base;
4521 goto default_reloc;
4522 }
4523 dynindx = 0;
4524 dynaddend = value - dtp_base;
252b5132 4525 }
0e1862bb 4526 else if (bfd_link_pic (info)
cf35638d 4527 && r_symndx != STN_UNDEF
d6ad34f6 4528 && (input_section->flags & SEC_ALLOC)
1d5316ab
AM
4529 && !undef_weak_ref
4530 && !(unresolved_reloc
4531 && (_bfd_elf_section_offset (output_bfd, info,
4532 input_section,
4533 rel->r_offset)
4534 == (bfd_vma) -1)))
252b5132 4535 {
3765b1be
RH
4536 if (r_type == R_ALPHA_REFLONG)
4537 {
4eca0228 4538 _bfd_error_handler
695344c0 4539 /* xgettext:c-format */
871b3ab2 4540 (_("%pB: unhandled dynamic relocation against %s"),
d003868e 4541 input_bfd,
3765b1be 4542 h->root.root.root.string);
b34976b6 4543 ret_val = FALSE;
3765b1be 4544 }
1bbc9cec
RH
4545 dynindx = 0;
4546 dyntype = R_ALPHA_RELATIVE;
4547 dynaddend = value;
252b5132
RH
4548 }
4549 else
4550 goto default_reloc;
4551
3241278a
RH
4552 if (input_section->flags & SEC_ALLOC)
4553 elf64_alpha_emit_dynrel (output_bfd, info, input_section,
4554 srel, rel->r_offset, dynindx,
4555 dyntype, dynaddend);
252b5132
RH
4556 }
4557 goto default_reloc;
4558
3765b1be 4559 case R_ALPHA_SREL16:
84de6048
RH
4560 case R_ALPHA_SREL32:
4561 case R_ALPHA_SREL64:
3765b1be 4562 if (dynamic_symbol_p)
07d6d2b8 4563 {
4eca0228 4564 _bfd_error_handler
695344c0 4565 /* xgettext:c-format */
871b3ab2 4566 (_("%pB: pc-relative relocation against dynamic symbol %s"),
07d6d2b8
AM
4567 input_bfd, h->root.root.root.string);
4568 ret_val = FALSE;
4569 }
3cbc1e5e 4570 else if (bfd_link_pic (info)
0e1862bb 4571 && undef_weak_ref)
07d6d2b8 4572 {
4eca0228 4573 _bfd_error_handler
695344c0 4574 /* xgettext:c-format */
871b3ab2 4575 (_("%pB: pc-relative relocation against undefined weak symbol %s"),
07d6d2b8
AM
4576 input_bfd, h->root.root.root.string);
4577 ret_val = FALSE;
4578 }
d6ad34f6 4579
3765b1be 4580
84de6048
RH
4581 /* ??? .eh_frame references to discarded sections will be smashed
4582 to relocations against SHN_UNDEF. The .eh_frame format allows
4583 NULL to be encoded as 0 in any format, so this works here. */
1d5316ab
AM
4584 if (r_symndx == STN_UNDEF
4585 || (unresolved_reloc
4586 && _bfd_elf_section_offset (output_bfd, info,
4587 input_section,
4588 rel->r_offset) == (bfd_vma) -1))
84de6048
RH
4589 howto = (elf64_alpha_howto_table
4590 + (r_type - R_ALPHA_SREL32 + R_ALPHA_REFLONG));
4591 goto default_reloc;
4592
3765b1be
RH
4593 case R_ALPHA_TLSLDM:
4594 /* Ignore the symbol for the relocation. The result is always
4595 the current module. */
4596 dynamic_symbol_p = 0;
4597 /* FALLTHRU */
4598
4599 case R_ALPHA_TLSGD:
4600 if (!gotent->reloc_done)
4601 {
4602 gotent->reloc_done = 1;
4603
4604 /* Note that the module index for the main program is 1. */
0e1862bb
L
4605 bfd_put_64 (output_bfd,
4606 !bfd_link_pic (info) && !dynamic_symbol_p,
3765b1be
RH
4607 sgot->contents + gotent->got_offset);
4608
4609 /* If the symbol has been forced local, output a
4610 DTPMOD64 reloc, otherwise it will be handled in
4611 finish_dynamic_symbol. */
0e1862bb 4612 if (bfd_link_pic (info) && !dynamic_symbol_p)
1bbc9cec
RH
4613 elf64_alpha_emit_dynrel (output_bfd, info, sgot, srelgot,
4614 gotent->got_offset, 0,
4615 R_ALPHA_DTPMOD64, 0);
3765b1be
RH
4616
4617 if (dynamic_symbol_p || r_type == R_ALPHA_TLSLDM)
4618 value = 0;
4619 else
4620 {
e1918d23 4621 BFD_ASSERT (elf_hash_table (info)->tls_sec != NULL);
07d6d2b8 4622 value -= dtp_base;
3765b1be
RH
4623 }
4624 bfd_put_64 (output_bfd, value,
4625 sgot->contents + gotent->got_offset + 8);
4626 }
4627
4628 value = (sgot->output_section->vma
4629 + sgot->output_offset
4630 + gotent->got_offset);
4631 value -= gp;
4632 goto default_reloc;
4633
4634 case R_ALPHA_DTPRELHI:
4635 case R_ALPHA_DTPRELLO:
4636 case R_ALPHA_DTPREL16:
4637 if (dynamic_symbol_p)
07d6d2b8 4638 {
4eca0228 4639 _bfd_error_handler
695344c0 4640 /* xgettext:c-format */
871b3ab2 4641 (_("%pB: dtp-relative relocation against dynamic symbol %s"),
07d6d2b8
AM
4642 input_bfd, h->root.root.root.string);
4643 ret_val = FALSE;
4644 }
e1918d23 4645 BFD_ASSERT (elf_hash_table (info)->tls_sec != NULL);
3765b1be 4646 value -= dtp_base;
9e756d64
RH
4647 if (r_type == R_ALPHA_DTPRELHI)
4648 value = ((bfd_signed_vma) value >> 16) + ((value >> 15) & 1);
3765b1be
RH
4649 goto default_reloc;
4650
4651 case R_ALPHA_TPRELHI:
4652 case R_ALPHA_TPRELLO:
4653 case R_ALPHA_TPREL16:
3cbc1e5e 4654 if (bfd_link_dll (info))
9e756d64 4655 {
4eca0228 4656 _bfd_error_handler
695344c0 4657 /* xgettext:c-format */
871b3ab2 4658 (_("%pB: TLS local exec code cannot be linked into shared objects"),
d003868e 4659 input_bfd);
07d6d2b8 4660 ret_val = FALSE;
9e756d64
RH
4661 }
4662 else if (dynamic_symbol_p)
07d6d2b8 4663 {
4eca0228 4664 _bfd_error_handler
695344c0 4665 /* xgettext:c-format */
871b3ab2 4666 (_("%pB: tp-relative relocation against dynamic symbol %s"),
07d6d2b8
AM
4667 input_bfd, h->root.root.root.string);
4668 ret_val = FALSE;
4669 }
e1918d23 4670 BFD_ASSERT (elf_hash_table (info)->tls_sec != NULL);
3765b1be 4671 value -= tp_base;
9e756d64
RH
4672 if (r_type == R_ALPHA_TPRELHI)
4673 value = ((bfd_signed_vma) value >> 16) + ((value >> 15) & 1);
3765b1be
RH
4674 goto default_reloc;
4675
4676 case R_ALPHA_GOTDTPREL:
4677 case R_ALPHA_GOTTPREL:
4678 BFD_ASSERT(sgot != NULL);
4679 BFD_ASSERT(gp != 0);
4680 BFD_ASSERT(gotent != NULL);
4681 BFD_ASSERT(gotent->use_count >= 1);
4682
4683 if (!gotent->reloc_done)
4684 {
4685 gotent->reloc_done = 1;
4686
4687 if (dynamic_symbol_p)
4688 value = 0;
4689 else
4690 {
e1918d23 4691 BFD_ASSERT (elf_hash_table (info)->tls_sec != NULL);
1bbc9cec
RH
4692 if (r_type == R_ALPHA_GOTDTPREL)
4693 value -= dtp_base;
28fbeab8 4694 else if (bfd_link_executable (info))
1bbc9cec
RH
4695 value -= tp_base;
4696 else
4697 {
4698 elf64_alpha_emit_dynrel (output_bfd, info, sgot, srelgot,
4699 gotent->got_offset, 0,
4700 R_ALPHA_TPREL64,
4701 value - dtp_base);
4702 value = 0;
4703 }
3765b1be
RH
4704 }
4705 bfd_put_64 (output_bfd, value,
4706 sgot->contents + gotent->got_offset);
4707 }
4708
4709 value = (sgot->output_section->vma
4710 + sgot->output_offset
4711 + gotent->got_offset);
4712 value -= gp;
4713 goto default_reloc;
4714
252b5132
RH
4715 default:
4716 default_reloc:
4717 r = _bfd_final_link_relocate (howto, input_bfd, input_section,
3765b1be 4718 contents, rel->r_offset, value, 0);
252b5132
RH
4719 break;
4720 }
4721
4722 switch (r)
4723 {
4724 case bfd_reloc_ok:
4725 break;
4726
4727 case bfd_reloc_overflow:
4728 {
4729 const char *name;
4730
ed4de5e2
JJ
4731 /* Don't warn if the overflow is due to pc relative reloc
4732 against discarded section. Section optimization code should
4733 handle it. */
4734
4735 if (r_symndx < symtab_hdr->sh_info
4736 && sec != NULL && howto->pc_relative
dbaa2011 4737 && discarded_section (sec))
ed4de5e2
JJ
4738 break;
4739
252b5132 4740 if (h != NULL)
dfeffb9f 4741 name = NULL;
252b5132
RH
4742 else
4743 {
4744 name = (bfd_elf_string_from_elf_section
4745 (input_bfd, symtab_hdr->sh_link, sym->st_name));
4746 if (name == NULL)
b34976b6 4747 return FALSE;
252b5132 4748 if (*name == '\0')
fd361982 4749 name = bfd_section_name (sec);
252b5132 4750 }
1a72702b
AM
4751 (*info->callbacks->reloc_overflow)
4752 (info, (h ? &h->root.root : NULL), name, howto->name,
4753 (bfd_vma) 0, input_bfd, input_section, rel->r_offset);
252b5132
RH
4754 }
4755 break;
4756
4757 default:
4758 case bfd_reloc_outofrange:
4759 abort ();
4760 }
4761 }
4762
f16fbd61 4763 return ret_val;
252b5132
RH
4764}
4765
4766/* Finish up dynamic symbol handling. We set the contents of various
4767 dynamic sections here. */
4768
b34976b6 4769static bfd_boolean
a7519a3c
RH
4770elf64_alpha_finish_dynamic_symbol (bfd *output_bfd, struct bfd_link_info *info,
4771 struct elf_link_hash_entry *h,
4772 Elf_Internal_Sym *sym)
252b5132 4773{
6ec7057a 4774 struct alpha_elf_link_hash_entry *ah = (struct alpha_elf_link_hash_entry *)h;
252b5132 4775
6ec7057a 4776 if (h->needs_plt)
252b5132
RH
4777 {
4778 /* Fill in the .plt entry for this symbol. */
4779 asection *splt, *sgot, *srel;
4780 Elf_Internal_Rela outrel;
947216bf 4781 bfd_byte *loc;
252b5132
RH
4782 bfd_vma got_addr, plt_addr;
4783 bfd_vma plt_index;
4784 struct alpha_elf_got_entry *gotent;
4785
4786 BFD_ASSERT (h->dynindx != -1);
4787
ce558b89 4788 splt = elf_hash_table (info)->splt;
252b5132 4789 BFD_ASSERT (splt != NULL);
ce558b89 4790 srel = elf_hash_table (info)->srelplt;
252b5132 4791 BFD_ASSERT (srel != NULL);
252b5132 4792
6ec7057a
RH
4793 for (gotent = ah->got_entries; gotent ; gotent = gotent->next)
4794 if (gotent->reloc_type == R_ALPHA_LITERAL
4795 && gotent->use_count > 0)
4796 {
4797 unsigned int insn;
4798 int disp;
252b5132 4799
6ec7057a
RH
4800 sgot = alpha_elf_tdata (gotent->gotobj)->got;
4801 BFD_ASSERT (sgot != NULL);
252b5132 4802
6ec7057a
RH
4803 BFD_ASSERT (gotent->got_offset != -1);
4804 BFD_ASSERT (gotent->plt_offset != -1);
252b5132 4805
6ec7057a
RH
4806 got_addr = (sgot->output_section->vma
4807 + sgot->output_offset
4808 + gotent->got_offset);
4809 plt_addr = (splt->output_section->vma
4810 + splt->output_offset
4811 + gotent->plt_offset);
252b5132 4812
6ec7057a 4813 plt_index = (gotent->plt_offset-PLT_HEADER_SIZE) / PLT_ENTRY_SIZE;
252b5132 4814
6ec7057a
RH
4815 /* Fill in the entry in the procedure linkage table. */
4816 if (elf64_alpha_use_secureplt)
4817 {
4818 disp = (PLT_HEADER_SIZE - 4) - (gotent->plt_offset + 4);
4819 insn = INSN_AD (INSN_BR, 31, disp);
4820 bfd_put_32 (output_bfd, insn,
4821 splt->contents + gotent->plt_offset);
252b5132 4822
6ec7057a
RH
4823 plt_index = ((gotent->plt_offset - NEW_PLT_HEADER_SIZE)
4824 / NEW_PLT_ENTRY_SIZE);
4825 }
4826 else
4827 {
4828 disp = -(gotent->plt_offset + 4);
4829 insn = INSN_AD (INSN_BR, 28, disp);
4830 bfd_put_32 (output_bfd, insn,
4831 splt->contents + gotent->plt_offset);
4832 bfd_put_32 (output_bfd, INSN_UNOP,
4833 splt->contents + gotent->plt_offset + 4);
4834 bfd_put_32 (output_bfd, INSN_UNOP,
4835 splt->contents + gotent->plt_offset + 8);
4836
4837 plt_index = ((gotent->plt_offset - OLD_PLT_HEADER_SIZE)
4838 / OLD_PLT_ENTRY_SIZE);
4839 }
252b5132 4840
6ec7057a
RH
4841 /* Fill in the entry in the .rela.plt section. */
4842 outrel.r_offset = got_addr;
4843 outrel.r_info = ELF64_R_INFO(h->dynindx, R_ALPHA_JMP_SLOT);
4844 outrel.r_addend = 0;
252b5132 4845
6ec7057a
RH
4846 loc = srel->contents + plt_index * sizeof (Elf64_External_Rela);
4847 bfd_elf64_swap_reloca_out (output_bfd, &outrel, loc);
252b5132 4848
6ec7057a
RH
4849 /* Fill in the entry in the .got. */
4850 bfd_put_64 (output_bfd, plt_addr,
4851 sgot->contents + gotent->got_offset);
4852 }
252b5132
RH
4853 }
4854 else if (alpha_elf_dynamic_symbol_p (h, info))
4855 {
4856 /* Fill in the dynamic relocations for this symbol's .got entries. */
4857 asection *srel;
252b5132
RH
4858 struct alpha_elf_got_entry *gotent;
4859
ce558b89 4860 srel = elf_hash_table (info)->srelgot;
252b5132
RH
4861 BFD_ASSERT (srel != NULL);
4862
252b5132
RH
4863 for (gotent = ((struct alpha_elf_link_hash_entry *) h)->got_entries;
4864 gotent != NULL;
4865 gotent = gotent->next)
4866 {
f44f99a5 4867 asection *sgot;
1bbc9cec 4868 long r_type;
3765b1be 4869
f44f99a5
RH
4870 if (gotent->use_count == 0)
4871 continue;
4872
4873 sgot = alpha_elf_tdata (gotent->gotobj)->got;
3765b1be
RH
4874
4875 r_type = gotent->reloc_type;
4876 switch (r_type)
4877 {
4878 case R_ALPHA_LITERAL:
4879 r_type = R_ALPHA_GLOB_DAT;
4880 break;
4881 case R_ALPHA_TLSGD:
4882 r_type = R_ALPHA_DTPMOD64;
4883 break;
4884 case R_ALPHA_GOTDTPREL:
4885 r_type = R_ALPHA_DTPREL64;
4886 break;
4887 case R_ALPHA_GOTTPREL:
4888 r_type = R_ALPHA_TPREL64;
4889 break;
4890 case R_ALPHA_TLSLDM:
4891 default:
4892 abort ();
4893 }
4894
68ffbac6 4895 elf64_alpha_emit_dynrel (output_bfd, info, sgot, srel,
1bbc9cec
RH
4896 gotent->got_offset, h->dynindx,
4897 r_type, gotent->addend);
3765b1be
RH
4898
4899 if (gotent->reloc_type == R_ALPHA_TLSGD)
68ffbac6 4900 elf64_alpha_emit_dynrel (output_bfd, info, sgot, srel,
1bbc9cec
RH
4901 gotent->got_offset + 8, h->dynindx,
4902 R_ALPHA_DTPREL64, gotent->addend);
252b5132
RH
4903 }
4904 }
4905
4906 /* Mark some specially defined symbols as absolute. */
9637f6ef 4907 if (h == elf_hash_table (info)->hdynamic
22edb2f1
RS
4908 || h == elf_hash_table (info)->hgot
4909 || h == elf_hash_table (info)->hplt)
252b5132
RH
4910 sym->st_shndx = SHN_ABS;
4911
b34976b6 4912 return TRUE;
252b5132
RH
4913}
4914
4915/* Finish up the dynamic sections. */
4916
b34976b6 4917static bfd_boolean
a7519a3c
RH
4918elf64_alpha_finish_dynamic_sections (bfd *output_bfd,
4919 struct bfd_link_info *info)
252b5132
RH
4920{
4921 bfd *dynobj;
4922 asection *sdyn;
4923
4924 dynobj = elf_hash_table (info)->dynobj;
3d4d4302 4925 sdyn = bfd_get_linker_section (dynobj, ".dynamic");
252b5132
RH
4926
4927 if (elf_hash_table (info)->dynamic_sections_created)
4928 {
6ec7057a 4929 asection *splt, *sgotplt, *srelaplt;
252b5132 4930 Elf64_External_Dyn *dyncon, *dynconend;
6ec7057a 4931 bfd_vma plt_vma, gotplt_vma;
252b5132 4932
ce558b89
AM
4933 splt = elf_hash_table (info)->splt;
4934 srelaplt = elf_hash_table (info)->srelplt;
252b5132
RH
4935 BFD_ASSERT (splt != NULL && sdyn != NULL);
4936
6ec7057a
RH
4937 plt_vma = splt->output_section->vma + splt->output_offset;
4938
4939 gotplt_vma = 0;
4940 if (elf64_alpha_use_secureplt)
4941 {
ce558b89 4942 sgotplt = elf_hash_table (info)->sgotplt;
6ec7057a
RH
4943 BFD_ASSERT (sgotplt != NULL);
4944 if (sgotplt->size > 0)
4945 gotplt_vma = sgotplt->output_section->vma + sgotplt->output_offset;
4946 }
4947
252b5132 4948 dyncon = (Elf64_External_Dyn *) sdyn->contents;
eea6121a 4949 dynconend = (Elf64_External_Dyn *) (sdyn->contents + sdyn->size);
252b5132
RH
4950 for (; dyncon < dynconend; dyncon++)
4951 {
4952 Elf_Internal_Dyn dyn;
252b5132
RH
4953
4954 bfd_elf64_swap_dyn_in (dynobj, dyncon, &dyn);
4955
4956 switch (dyn.d_tag)
4957 {
4958 case DT_PLTGOT:
6ec7057a
RH
4959 dyn.d_un.d_ptr
4960 = elf64_alpha_use_secureplt ? gotplt_vma : plt_vma;
4961 break;
252b5132 4962 case DT_PLTRELSZ:
6ec7057a
RH
4963 dyn.d_un.d_val = srelaplt ? srelaplt->size : 0;
4964 break;
252b5132 4965 case DT_JMPREL:
4ade44b7
AM
4966 dyn.d_un.d_ptr = srelaplt ? (srelaplt->output_section->vma
4967 + srelaplt->output_offset) : 0;
6ec7057a 4968 break;
252b5132
RH
4969 }
4970
4971 bfd_elf64_swap_dyn_out (output_bfd, &dyn, dyncon);
4972 }
4973
6ec7057a 4974 /* Initialize the plt header. */
eea6121a 4975 if (splt->size > 0)
252b5132 4976 {
6ec7057a
RH
4977 unsigned int insn;
4978 int ofs;
4979
4980 if (elf64_alpha_use_secureplt)
4981 {
4982 ofs = gotplt_vma - (plt_vma + PLT_HEADER_SIZE);
4983
4984 insn = INSN_ABC (INSN_SUBQ, 27, 28, 25);
4985 bfd_put_32 (output_bfd, insn, splt->contents);
4986
4987 insn = INSN_ABO (INSN_LDAH, 28, 28, (ofs + 0x8000) >> 16);
4988 bfd_put_32 (output_bfd, insn, splt->contents + 4);
4989
4990 insn = INSN_ABC (INSN_S4SUBQ, 25, 25, 25);
4991 bfd_put_32 (output_bfd, insn, splt->contents + 8);
4992
4993 insn = INSN_ABO (INSN_LDA, 28, 28, ofs);
4994 bfd_put_32 (output_bfd, insn, splt->contents + 12);
4995
4996 insn = INSN_ABO (INSN_LDQ, 27, 28, 0);
4997 bfd_put_32 (output_bfd, insn, splt->contents + 16);
4998
4999 insn = INSN_ABC (INSN_ADDQ, 25, 25, 25);
5000 bfd_put_32 (output_bfd, insn, splt->contents + 20);
5001
5002 insn = INSN_ABO (INSN_LDQ, 28, 28, 8);
5003 bfd_put_32 (output_bfd, insn, splt->contents + 24);
5004
5005 insn = INSN_AB (INSN_JMP, 31, 27);
5006 bfd_put_32 (output_bfd, insn, splt->contents + 28);
5007
5008 insn = INSN_AD (INSN_BR, 28, -PLT_HEADER_SIZE);
5009 bfd_put_32 (output_bfd, insn, splt->contents + 32);
5010 }
5011 else
5012 {
5013 insn = INSN_AD (INSN_BR, 27, 0); /* br $27, .+4 */
5014 bfd_put_32 (output_bfd, insn, splt->contents);
5015
5016 insn = INSN_ABO (INSN_LDQ, 27, 27, 12);
5017 bfd_put_32 (output_bfd, insn, splt->contents + 4);
5018
5019 insn = INSN_UNOP;
5020 bfd_put_32 (output_bfd, insn, splt->contents + 8);
5021
5022 insn = INSN_AB (INSN_JMP, 27, 27);
5023 bfd_put_32 (output_bfd, insn, splt->contents + 12);
5024
5025 /* The next two words will be filled in by ld.so. */
5026 bfd_put_64 (output_bfd, 0, splt->contents + 16);
5027 bfd_put_64 (output_bfd, 0, splt->contents + 24);
5028 }
252b5132 5029
eecdbe52 5030 elf_section_data (splt->output_section)->this_hdr.sh_entsize = 0;
252b5132
RH
5031 }
5032 }
5033
b34976b6 5034 return TRUE;
252b5132
RH
5035}
5036
96e2734b
RH
5037/* We need to use a special link routine to handle the .mdebug section.
5038 We need to merge all instances of these sections together, not write
5039 them all out sequentially. */
252b5132 5040
b34976b6 5041static bfd_boolean
a7519a3c 5042elf64_alpha_final_link (bfd *abfd, struct bfd_link_info *info)
252b5132
RH
5043{
5044 asection *o;
5045 struct bfd_link_order *p;
96e2734b 5046 asection *mdebug_sec;
252b5132
RH
5047 struct ecoff_debug_info debug;
5048 const struct ecoff_debug_swap *swap
5049 = get_elf_backend_data (abfd)->elf_backend_ecoff_debug_swap;
5050 HDRR *symhdr = &debug.symbolic_header;
4dfe6ac6
NC
5051 void * mdebug_handle = NULL;
5052 struct alpha_elf_link_hash_table * htab;
5053
5054 htab = alpha_elf_hash_table (info);
5055 if (htab == NULL)
5056 return FALSE;
252b5132 5057
96e2734b 5058 /* Go through the sections and collect the mdebug information. */
252b5132 5059 mdebug_sec = NULL;
252b5132
RH
5060 for (o = abfd->sections; o != (asection *) NULL; o = o->next)
5061 {
252b5132
RH
5062 if (strcmp (o->name, ".mdebug") == 0)
5063 {
5064 struct extsym_info einfo;
5065
5066 /* We have found the .mdebug section in the output file.
5067 Look through all the link_orders comprising it and merge
5068 the information together. */
5069 symhdr->magic = swap->sym_magic;
5070 /* FIXME: What should the version stamp be? */
5071 symhdr->vstamp = 0;
5072 symhdr->ilineMax = 0;
5073 symhdr->cbLine = 0;
5074 symhdr->idnMax = 0;
5075 symhdr->ipdMax = 0;
5076 symhdr->isymMax = 0;
5077 symhdr->ioptMax = 0;
5078 symhdr->iauxMax = 0;
5079 symhdr->issMax = 0;
5080 symhdr->issExtMax = 0;
5081 symhdr->ifdMax = 0;
5082 symhdr->crfd = 0;
5083 symhdr->iextMax = 0;
5084
5085 /* We accumulate the debugging information itself in the
5086 debug_info structure. */
5087 debug.line = NULL;
5088 debug.external_dnr = NULL;
5089 debug.external_pdr = NULL;
5090 debug.external_sym = NULL;
5091 debug.external_opt = NULL;
5092 debug.external_aux = NULL;
5093 debug.ss = NULL;
5094 debug.ssext = debug.ssext_end = NULL;
5095 debug.external_fdr = NULL;
5096 debug.external_rfd = NULL;
5097 debug.external_ext = debug.external_ext_end = NULL;
5098
5099 mdebug_handle = bfd_ecoff_debug_init (abfd, &debug, swap, info);
2c3fc389 5100 if (mdebug_handle == NULL)
b34976b6 5101 return FALSE;
252b5132
RH
5102
5103 if (1)
5104 {
5105 asection *s;
5106 EXTR esym;
52b9d213 5107 bfd_vma last = 0;
252b5132
RH
5108 unsigned int i;
5109 static const char * const name[] =
5110 {
5111 ".text", ".init", ".fini", ".data",
5112 ".rodata", ".sdata", ".sbss", ".bss"
5113 };
5114 static const int sc[] = { scText, scInit, scFini, scData,
5115 scRData, scSData, scSBss, scBss };
5116
5117 esym.jmptbl = 0;
5118 esym.cobol_main = 0;
5119 esym.weakext = 0;
5120 esym.reserved = 0;
5121 esym.ifd = ifdNil;
5122 esym.asym.iss = issNil;
5123 esym.asym.st = stLocal;
5124 esym.asym.reserved = 0;
5125 esym.asym.index = indexNil;
5126 for (i = 0; i < 8; i++)
5127 {
5128 esym.asym.sc = sc[i];
5129 s = bfd_get_section_by_name (abfd, name[i]);
5130 if (s != NULL)
5131 {
5132 esym.asym.value = s->vma;
eea6121a 5133 last = s->vma + s->size;
252b5132
RH
5134 }
5135 else
5136 esym.asym.value = last;
5137
5138 if (! bfd_ecoff_debug_one_external (abfd, &debug, swap,
5139 name[i], &esym))
b34976b6 5140 return FALSE;
252b5132
RH
5141 }
5142 }
5143
8423293d 5144 for (p = o->map_head.link_order;
252b5132
RH
5145 p != (struct bfd_link_order *) NULL;
5146 p = p->next)
5147 {
5148 asection *input_section;
5149 bfd *input_bfd;
5150 const struct ecoff_debug_swap *input_swap;
5151 struct ecoff_debug_info input_debug;
5152 char *eraw_src;
5153 char *eraw_end;
5154
5155 if (p->type != bfd_indirect_link_order)
5156 {
fd96f80f 5157 if (p->type == bfd_data_link_order)
252b5132
RH
5158 continue;
5159 abort ();
5160 }
5161
5162 input_section = p->u.indirect.section;
5163 input_bfd = input_section->owner;
5164
0ffa91dd
NC
5165 if (! is_alpha_elf (input_bfd))
5166 /* I don't know what a non ALPHA ELF bfd would be
5167 doing with a .mdebug section, but I don't really
5168 want to deal with it. */
5169 continue;
252b5132
RH
5170
5171 input_swap = (get_elf_backend_data (input_bfd)
5172 ->elf_backend_ecoff_debug_swap);
5173
eea6121a 5174 BFD_ASSERT (p->size == input_section->size);
252b5132
RH
5175
5176 /* The ECOFF linking code expects that we have already
5177 read in the debugging information and set up an
5178 ecoff_debug_info structure, so we do that now. */
5179 if (!elf64_alpha_read_ecoff_info (input_bfd, input_section,
5180 &input_debug))
b34976b6 5181 return FALSE;
252b5132
RH
5182
5183 if (! (bfd_ecoff_debug_accumulate
5184 (mdebug_handle, abfd, &debug, swap, input_bfd,
5185 &input_debug, input_swap, info)))
b34976b6 5186 return FALSE;
252b5132
RH
5187
5188 /* Loop through the external symbols. For each one with
5189 interesting information, try to find the symbol in
5190 the linker global hash table and save the information
5191 for the output external symbols. */
21d799b5 5192 eraw_src = (char *) input_debug.external_ext;
252b5132
RH
5193 eraw_end = (eraw_src
5194 + (input_debug.symbolic_header.iextMax
5195 * input_swap->external_ext_size));
5196 for (;
5197 eraw_src < eraw_end;
5198 eraw_src += input_swap->external_ext_size)
5199 {
5200 EXTR ext;
5201 const char *name;
5202 struct alpha_elf_link_hash_entry *h;
5203
2c3fc389 5204 (*input_swap->swap_ext_in) (input_bfd, eraw_src, &ext);
252b5132
RH
5205 if (ext.asym.sc == scNil
5206 || ext.asym.sc == scUndefined
5207 || ext.asym.sc == scSUndefined)
5208 continue;
5209
5210 name = input_debug.ssext + ext.asym.iss;
4dfe6ac6 5211 h = alpha_elf_link_hash_lookup (htab, name, FALSE, FALSE, TRUE);
252b5132
RH
5212 if (h == NULL || h->esym.ifd != -2)
5213 continue;
5214
5215 if (ext.ifd != -1)
5216 {
5217 BFD_ASSERT (ext.ifd
5218 < input_debug.symbolic_header.ifdMax);
5219 ext.ifd = input_debug.ifdmap[ext.ifd];
5220 }
5221
5222 h->esym = ext;
5223 }
5224
5225 /* Free up the information we just read. */
5226 free (input_debug.line);
5227 free (input_debug.external_dnr);
5228 free (input_debug.external_pdr);
5229 free (input_debug.external_sym);
5230 free (input_debug.external_opt);
5231 free (input_debug.external_aux);
5232 free (input_debug.ss);
5233 free (input_debug.ssext);
5234 free (input_debug.external_fdr);
5235 free (input_debug.external_rfd);
5236 free (input_debug.external_ext);
5237
5238 /* Hack: reset the SEC_HAS_CONTENTS flag so that
5239 elf_link_input_bfd ignores this section. */
5240 input_section->flags &=~ SEC_HAS_CONTENTS;
5241 }
5242
252b5132
RH
5243 /* Build the external symbol information. */
5244 einfo.abfd = abfd;
5245 einfo.info = info;
5246 einfo.debug = &debug;
5247 einfo.swap = swap;
b34976b6 5248 einfo.failed = FALSE;
252b5132
RH
5249 elf_link_hash_traverse (elf_hash_table (info),
5250 elf64_alpha_output_extsym,
2c3fc389 5251 &einfo);
252b5132 5252 if (einfo.failed)
b34976b6 5253 return FALSE;
252b5132
RH
5254
5255 /* Set the size of the .mdebug section. */
eea6121a 5256 o->size = bfd_ecoff_debug_size (abfd, &debug, swap);
252b5132
RH
5257
5258 /* Skip this section later on (I don't think this currently
5259 matters, but someday it might). */
8423293d 5260 o->map_head.link_order = (struct bfd_link_order *) NULL;
252b5132
RH
5261
5262 mdebug_sec = o;
5263 }
252b5132
RH
5264 }
5265
5266 /* Invoke the regular ELF backend linker to do all the work. */
c152c796 5267 if (! bfd_elf_final_link (abfd, info))
b34976b6 5268 return FALSE;
252b5132
RH
5269
5270 /* Now write out the computed sections. */
5271
5272 /* The .got subsections... */
5273 {
5274 bfd *i, *dynobj = elf_hash_table(info)->dynobj;
4dfe6ac6 5275 for (i = htab->got_list;
252b5132
RH
5276 i != NULL;
5277 i = alpha_elf_tdata(i)->got_link_next)
5278 {
5279 asection *sgot;
5280
5281 /* elf_bfd_final_link already did everything in dynobj. */
5282 if (i == dynobj)
5283 continue;
5284
5285 sgot = alpha_elf_tdata(i)->got;
5286 if (! bfd_set_section_contents (abfd, sgot->output_section,
dc810e39
AM
5287 sgot->contents,
5288 (file_ptr) sgot->output_offset,
eea6121a 5289 sgot->size))
b34976b6 5290 return FALSE;
252b5132
RH
5291 }
5292 }
5293
252b5132
RH
5294 if (mdebug_sec != (asection *) NULL)
5295 {
5296 BFD_ASSERT (abfd->output_has_begun);
5297 if (! bfd_ecoff_write_accumulated_debug (mdebug_handle, abfd, &debug,
5298 swap, info,
5299 mdebug_sec->filepos))
b34976b6 5300 return FALSE;
252b5132
RH
5301
5302 bfd_ecoff_debug_free (mdebug_handle, abfd, &debug, swap, info);
5303 }
5304
b34976b6 5305 return TRUE;
252b5132 5306}
fcfbdf31
JJ
5307
5308static enum elf_reloc_type_class
7e612e98
AM
5309elf64_alpha_reloc_type_class (const struct bfd_link_info *info ATTRIBUTE_UNUSED,
5310 const asection *rel_sec ATTRIBUTE_UNUSED,
5311 const Elf_Internal_Rela *rela)
fcfbdf31 5312{
f51e552e 5313 switch ((int) ELF64_R_TYPE (rela->r_info))
fcfbdf31
JJ
5314 {
5315 case R_ALPHA_RELATIVE:
5316 return reloc_class_relative;
5317 case R_ALPHA_JMP_SLOT:
5318 return reloc_class_plt;
5319 case R_ALPHA_COPY:
5320 return reloc_class_copy;
5321 default:
5322 return reloc_class_normal;
5323 }
5324}
252b5132 5325\f
b35d266b 5326static const struct bfd_elf_special_section elf64_alpha_special_sections[] =
2f89ff8d 5327{
07d6d2b8 5328 { STRING_COMMA_LEN (".sbss"), -2, SHT_NOBITS, SHF_ALLOC + SHF_WRITE + SHF_ALPHA_GPREL },
0112cd26 5329 { STRING_COMMA_LEN (".sdata"), -2, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE + SHF_ALPHA_GPREL },
07d6d2b8 5330 { NULL, 0, 0, 0, 0 }
2f89ff8d
L
5331};
5332
252b5132
RH
5333/* ECOFF swapping routines. These are used when dealing with the
5334 .mdebug section, which is in the ECOFF debugging format. Copied
fe8bc63d 5335 from elf32-mips.c. */
252b5132
RH
5336static const struct ecoff_debug_swap
5337elf64_alpha_ecoff_debug_swap =
5338{
5339 /* Symbol table magic number. */
5340 magicSym2,
5341 /* Alignment of debugging information. E.g., 4. */
5342 8,
5343 /* Sizes of external symbolic information. */
5344 sizeof (struct hdr_ext),
5345 sizeof (struct dnr_ext),
5346 sizeof (struct pdr_ext),
5347 sizeof (struct sym_ext),
5348 sizeof (struct opt_ext),
5349 sizeof (struct fdr_ext),
5350 sizeof (struct rfd_ext),
5351 sizeof (struct ext_ext),
5352 /* Functions to swap in external symbolic data. */
5353 ecoff_swap_hdr_in,
5354 ecoff_swap_dnr_in,
5355 ecoff_swap_pdr_in,
5356 ecoff_swap_sym_in,
5357 ecoff_swap_opt_in,
5358 ecoff_swap_fdr_in,
5359 ecoff_swap_rfd_in,
5360 ecoff_swap_ext_in,
5361 _bfd_ecoff_swap_tir_in,
5362 _bfd_ecoff_swap_rndx_in,
5363 /* Functions to swap out external symbolic data. */
5364 ecoff_swap_hdr_out,
5365 ecoff_swap_dnr_out,
5366 ecoff_swap_pdr_out,
5367 ecoff_swap_sym_out,
5368 ecoff_swap_opt_out,
5369 ecoff_swap_fdr_out,
5370 ecoff_swap_rfd_out,
5371 ecoff_swap_ext_out,
5372 _bfd_ecoff_swap_tir_out,
5373 _bfd_ecoff_swap_rndx_out,
5374 /* Function to read in symbolic data. */
5375 elf64_alpha_read_ecoff_info
5376};
5377\f
70bcb145
JW
5378/* Use a non-standard hash bucket size of 8. */
5379
562ace6b 5380static const struct elf_size_info alpha_elf_size_info =
70bcb145
JW
5381{
5382 sizeof (Elf64_External_Ehdr),
5383 sizeof (Elf64_External_Phdr),
5384 sizeof (Elf64_External_Shdr),
5385 sizeof (Elf64_External_Rel),
5386 sizeof (Elf64_External_Rela),
5387 sizeof (Elf64_External_Sym),
5388 sizeof (Elf64_External_Dyn),
5389 sizeof (Elf_External_Note),
5390 8,
5391 1,
45d6a902 5392 64, 3,
70bcb145
JW
5393 ELFCLASS64, EV_CURRENT,
5394 bfd_elf64_write_out_phdrs,
5395 bfd_elf64_write_shdrs_and_ehdr,
1489a3a0 5396 bfd_elf64_checksum_contents,
70bcb145 5397 bfd_elf64_write_relocs,
73ff0d56 5398 bfd_elf64_swap_symbol_in,
70bcb145
JW
5399 bfd_elf64_swap_symbol_out,
5400 bfd_elf64_slurp_reloc_table,
5401 bfd_elf64_slurp_symbol_table,
5402 bfd_elf64_swap_dyn_in,
5403 bfd_elf64_swap_dyn_out,
947216bf
AM
5404 bfd_elf64_swap_reloc_in,
5405 bfd_elf64_swap_reloc_out,
5406 bfd_elf64_swap_reloca_in,
5407 bfd_elf64_swap_reloca_out
70bcb145
JW
5408};
5409
6d00b590 5410#define TARGET_LITTLE_SYM alpha_elf64_vec
252b5132
RH
5411#define TARGET_LITTLE_NAME "elf64-alpha"
5412#define ELF_ARCH bfd_arch_alpha
ae95ffa6 5413#define ELF_TARGET_ID ALPHA_ELF_DATA
56fc028e
AJ
5414#define ELF_MACHINE_CODE EM_ALPHA
5415#define ELF_MAXPAGESIZE 0x10000
24718e3b 5416#define ELF_COMMONPAGESIZE 0x2000
252b5132
RH
5417
5418#define bfd_elf64_bfd_link_hash_table_create \
5419 elf64_alpha_bfd_link_hash_table_create
5420
5421#define bfd_elf64_bfd_reloc_type_lookup \
5422 elf64_alpha_bfd_reloc_type_lookup
157090f7
AM
5423#define bfd_elf64_bfd_reloc_name_lookup \
5424 elf64_alpha_bfd_reloc_name_lookup
252b5132
RH
5425#define elf_info_to_howto \
5426 elf64_alpha_info_to_howto
5427
5428#define bfd_elf64_mkobject \
5429 elf64_alpha_mkobject
5430#define elf_backend_object_p \
5431 elf64_alpha_object_p
5432
5433#define elf_backend_section_from_shdr \
5434 elf64_alpha_section_from_shdr
204692d7
RH
5435#define elf_backend_section_flags \
5436 elf64_alpha_section_flags
252b5132
RH
5437#define elf_backend_fake_sections \
5438 elf64_alpha_fake_sections
5439
5440#define bfd_elf64_bfd_is_local_label_name \
5441 elf64_alpha_is_local_label_name
5442#define bfd_elf64_find_nearest_line \
5443 elf64_alpha_find_nearest_line
5444#define bfd_elf64_bfd_relax_section \
5445 elf64_alpha_relax_section
5446
5447#define elf_backend_add_symbol_hook \
5448 elf64_alpha_add_symbol_hook
13285a1b
AM
5449#define elf_backend_relocs_compatible \
5450 _bfd_elf_relocs_compatible
6fc5bb57
AM
5451#define elf_backend_sort_relocs_p \
5452 elf64_alpha_sort_relocs_p
252b5132
RH
5453#define elf_backend_check_relocs \
5454 elf64_alpha_check_relocs
5455#define elf_backend_create_dynamic_sections \
5456 elf64_alpha_create_dynamic_sections
5457#define elf_backend_adjust_dynamic_symbol \
5458 elf64_alpha_adjust_dynamic_symbol
747ffa7b
AM
5459#define elf_backend_merge_symbol_attribute \
5460 elf64_alpha_merge_symbol_attribute
48f4b4f5
RH
5461#define elf_backend_copy_indirect_symbol \
5462 elf64_alpha_copy_indirect_symbol
252b5132
RH
5463#define elf_backend_always_size_sections \
5464 elf64_alpha_always_size_sections
5465#define elf_backend_size_dynamic_sections \
5466 elf64_alpha_size_dynamic_sections
74541ad4 5467#define elf_backend_omit_section_dynsym \
d00dd7dc 5468 _bfd_elf_omit_section_dynsym_all
252b5132
RH
5469#define elf_backend_relocate_section \
5470 elf64_alpha_relocate_section
5471#define elf_backend_finish_dynamic_symbol \
5472 elf64_alpha_finish_dynamic_symbol
5473#define elf_backend_finish_dynamic_sections \
5474 elf64_alpha_finish_dynamic_sections
5475#define bfd_elf64_bfd_final_link \
5476 elf64_alpha_final_link
fcfbdf31
JJ
5477#define elf_backend_reloc_type_class \
5478 elf64_alpha_reloc_type_class
252b5132 5479
e117360e
RH
5480#define elf_backend_can_gc_sections 1
5481#define elf_backend_gc_mark_hook elf64_alpha_gc_mark_hook
e117360e 5482
252b5132
RH
5483#define elf_backend_ecoff_debug_swap \
5484 &elf64_alpha_ecoff_debug_swap
5485
70bcb145
JW
5486#define elf_backend_size_info \
5487 alpha_elf_size_info
5488
29ef7005
L
5489#define elf_backend_special_sections \
5490 elf64_alpha_special_sections
2f89ff8d 5491
6f6fd151
L
5492#define elf_backend_strip_zero_sized_dynamic_sections \
5493 _bfd_elf_strip_zero_sized_dynamic_sections
5494
38b1a46c 5495/* A few constants that determine how the .plt section is set up. */
252b5132
RH
5496#define elf_backend_want_got_plt 0
5497#define elf_backend_plt_readonly 0
5498#define elf_backend_want_plt_sym 1
5499#define elf_backend_got_header_size 0
64f52338 5500#define elf_backend_dtrel_excludes_plt 1
252b5132
RH
5501
5502#include "elf64-target.h"
2238051f
RH
5503\f
5504/* FreeBSD support. */
5505
5506#undef TARGET_LITTLE_SYM
6d00b590 5507#define TARGET_LITTLE_SYM alpha_elf64_fbsd_vec
2238051f
RH
5508#undef TARGET_LITTLE_NAME
5509#define TARGET_LITTLE_NAME "elf64-alpha-freebsd"
d1036acb
L
5510#undef ELF_OSABI
5511#define ELF_OSABI ELFOSABI_FREEBSD
2238051f
RH
5512
5513/* The kernel recognizes executables as valid only if they carry a
5514 "FreeBSD" label in the ELF header. So we put this label on all
5515 executables and (for simplicity) also all other object files. */
5516
ed7e9d0b
AM
5517static bfd_boolean
5518elf64_alpha_fbsd_init_file_header (bfd *abfd, struct bfd_link_info *info)
2238051f
RH
5519{
5520 Elf_Internal_Ehdr * i_ehdrp; /* ELF file header, internal form. */
5521
ed7e9d0b
AM
5522 if (!_bfd_elf_init_file_header (abfd, info))
5523 return FALSE;
5524
2238051f
RH
5525 i_ehdrp = elf_elfheader (abfd);
5526
5527 /* Put an ABI label supported by FreeBSD >= 4.1. */
d1036acb 5528 i_ehdrp->e_ident[EI_OSABI] = get_elf_backend_data (abfd)->elf_osabi;
2238051f
RH
5529#ifdef OLD_FREEBSD_ABI_LABEL
5530 /* The ABI label supported by FreeBSD <= 4.0 is quite nonstandard. */
5531 memcpy (&i_ehdrp->e_ident[EI_ABIVERSION], "FreeBSD", 8);
5532#endif
ed7e9d0b 5533 return TRUE;
2238051f
RH
5534}
5535
ed7e9d0b
AM
5536#undef elf_backend_init_file_header
5537#define elf_backend_init_file_header \
5538 elf64_alpha_fbsd_init_file_header
2238051f 5539
571fe01f 5540#undef elf64_bed
2238051f
RH
5541#define elf64_bed elf64_alpha_fbsd_bed
5542
5543#include "elf64-target.h"