]> git.ipfire.org Git - thirdparty/binutils-gdb.git/blame - bfd/elf64-alpha.c
Fix Common symbol override test fails
[thirdparty/binutils-gdb.git] / bfd / elf64-alpha.c
CommitLineData
252b5132 1/* Alpha specific support for 64-bit ELF
2571583a 2 Copyright (C) 1996-2017 Free Software Foundation, Inc.
252b5132
RH
3 Contributed by Richard Henderson <rth@tamu.edu>.
4
571fe01f 5 This file is part of BFD, the Binary File Descriptor library.
252b5132 6
571fe01f
NC
7 This program is free software; you can redistribute it and/or modify
8 it under the terms of the GNU General Public License as published by
cd123cb7 9 the Free Software Foundation; either version 3 of the License, or
571fe01f 10 (at your option) any later version.
252b5132 11
571fe01f
NC
12 This program is distributed in the hope that it will be useful,
13 but WITHOUT ANY WARRANTY; without even the implied warranty of
14 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 GNU General Public License for more details.
252b5132 16
571fe01f
NC
17 You should have received a copy of the GNU General Public License
18 along with this program; if not, write to the Free Software
cd123cb7
NC
19 Foundation, Inc., 51 Franklin Street - Fifth Floor, Boston,
20 MA 02110-1301, USA. */
21
252b5132
RH
22
23/* We need a published ABI spec for this. Until one comes out, don't
24 assume this'll remain unchanged forever. */
25
252b5132 26#include "sysdep.h"
3db64b00 27#include "bfd.h"
252b5132
RH
28#include "libbfd.h"
29#include "elf-bfd.h"
30
31#include "elf/alpha.h"
32
33#define ALPHAECOFF
34
35#define NO_COFF_RELOCS
36#define NO_COFF_SYMBOLS
37#define NO_COFF_LINENOS
38
fe8bc63d 39/* Get the ECOFF swapping routines. Needed for the debug information. */
252b5132
RH
40#include "coff/internal.h"
41#include "coff/sym.h"
42#include "coff/symconst.h"
43#include "coff/ecoff.h"
44#include "coff/alpha.h"
45#include "aout/ar.h"
46#include "libcoff.h"
47#include "libecoff.h"
48#define ECOFF_64
49#include "ecoffswap.h"
50
6ec7057a
RH
51\f
52/* Instruction data for plt generation and relaxation. */
53
54#define OP_LDA 0x08
55#define OP_LDAH 0x09
56#define OP_LDQ 0x29
57#define OP_BR 0x30
58#define OP_BSR 0x34
59
60#define INSN_LDA (OP_LDA << 26)
61#define INSN_LDAH (OP_LDAH << 26)
62#define INSN_LDQ (OP_LDQ << 26)
63#define INSN_BR (OP_BR << 26)
64
65#define INSN_ADDQ 0x40000400
66#define INSN_RDUNIQ 0x0000009e
67#define INSN_SUBQ 0x40000520
68#define INSN_S4SUBQ 0x40000560
69#define INSN_UNOP 0x2ffe0000
70
71#define INSN_JSR 0x68004000
72#define INSN_JMP 0x68000000
73#define INSN_JSR_MASK 0xfc00c000
74
75#define INSN_A(I,A) (I | (A << 21))
76#define INSN_AB(I,A,B) (I | (A << 21) | (B << 16))
77#define INSN_ABC(I,A,B,C) (I | (A << 21) | (B << 16) | C)
78#define INSN_ABO(I,A,B,O) (I | (A << 21) | (B << 16) | ((O) & 0xffff))
79#define INSN_AD(I,A,D) (I | (A << 21) | (((D) >> 2) & 0x1fffff))
80
81/* PLT/GOT Stuff */
82
83/* Set by ld emulation. Putting this into the link_info or hash structure
84 is simply working too hard. */
85#ifdef USE_SECUREPLT
86bfd_boolean elf64_alpha_use_secureplt = TRUE;
87#else
88bfd_boolean elf64_alpha_use_secureplt = FALSE;
89#endif
90
91#define OLD_PLT_HEADER_SIZE 32
92#define OLD_PLT_ENTRY_SIZE 12
93#define NEW_PLT_HEADER_SIZE 36
94#define NEW_PLT_ENTRY_SIZE 4
95
96#define PLT_HEADER_SIZE \
97 (elf64_alpha_use_secureplt ? NEW_PLT_HEADER_SIZE : OLD_PLT_HEADER_SIZE)
98#define PLT_ENTRY_SIZE \
99 (elf64_alpha_use_secureplt ? NEW_PLT_ENTRY_SIZE : OLD_PLT_ENTRY_SIZE)
100
101#define MAX_GOT_SIZE (64*1024)
102
103#define ELF_DYNAMIC_INTERPRETER "/usr/lib/ld.so"
252b5132 104\f
21d799b5
NC
105
106/* Used to implement multiple .got subsections. */
107struct alpha_elf_got_entry
108{
109 struct alpha_elf_got_entry *next;
110
111 /* Which .got subsection? */
112 bfd *gotobj;
113
114 /* The addend in effect for this entry. */
115 bfd_vma addend;
116
117 /* The .got offset for this entry. */
118 int got_offset;
119
120 /* The .plt offset for this entry. */
121 int plt_offset;
122
123 /* How many references to this entry? */
124 int use_count;
125
126 /* The relocation type of this entry. */
127 unsigned char reloc_type;
128
129 /* How a LITERAL is used. */
130 unsigned char flags;
131
132 /* Have we initialized the dynamic relocation for this entry? */
133 unsigned char reloc_done;
134
135 /* Have we adjusted this entry for SEC_MERGE? */
136 unsigned char reloc_xlated;
137};
138
139struct alpha_elf_reloc_entry
140{
141 struct alpha_elf_reloc_entry *next;
142
143 /* Which .reloc section? */
144 asection *srel;
145
146 /* What kind of relocation? */
147 unsigned int rtype;
148
149 /* Is this against read-only section? */
150 unsigned int reltext : 1;
151
152 /* How many did we find? */
153 unsigned long count;
154};
155
252b5132
RH
156struct alpha_elf_link_hash_entry
157{
158 struct elf_link_hash_entry root;
159
160 /* External symbol information. */
161 EXTR esym;
162
163 /* Cumulative flags for all the .got entries. */
164 int flags;
165
9e756d64 166 /* Contexts in which a literal was referenced. */
8288a39e
RH
167#define ALPHA_ELF_LINK_HASH_LU_ADDR 0x01
168#define ALPHA_ELF_LINK_HASH_LU_MEM 0x02
169#define ALPHA_ELF_LINK_HASH_LU_BYTE 0x04
170#define ALPHA_ELF_LINK_HASH_LU_JSR 0x08
171#define ALPHA_ELF_LINK_HASH_LU_TLSGD 0x10
172#define ALPHA_ELF_LINK_HASH_LU_TLSLDM 0x20
173#define ALPHA_ELF_LINK_HASH_LU_JSRDIRECT 0x40
174#define ALPHA_ELF_LINK_HASH_LU_PLT 0x38
175#define ALPHA_ELF_LINK_HASH_TLS_IE 0x80
cc03ec80 176
252b5132 177 /* Used to implement multiple .got subsections. */
21d799b5 178 struct alpha_elf_got_entry *got_entries;
252b5132 179
571fe01f 180 /* Used to count non-got, non-plt relocations for delayed sizing
252b5132 181 of relocation sections. */
21d799b5 182 struct alpha_elf_reloc_entry *reloc_entries;
252b5132
RH
183};
184
185/* Alpha ELF linker hash table. */
186
187struct alpha_elf_link_hash_table
188{
189 struct elf_link_hash_table root;
190
191 /* The head of a list of .got subsections linked through
192 alpha_elf_tdata(abfd)->got_link_next. */
193 bfd *got_list;
4a828aab
RH
194
195 /* The most recent relax pass that we've seen. The GOTs
196 should be regenerated if this doesn't match. */
197 int relax_trip;
252b5132
RH
198};
199
200/* Look up an entry in a Alpha ELF linker hash table. */
201
202#define alpha_elf_link_hash_lookup(table, string, create, copy, follow) \
203 ((struct alpha_elf_link_hash_entry *) \
204 elf_link_hash_lookup (&(table)->root, (string), (create), \
205 (copy), (follow)))
206
207/* Traverse a Alpha ELF linker hash table. */
208
209#define alpha_elf_link_hash_traverse(table, func, info) \
210 (elf_link_hash_traverse \
211 (&(table)->root, \
2c3fc389 212 (bfd_boolean (*) (struct elf_link_hash_entry *, void *)) (func), \
252b5132
RH
213 (info)))
214
215/* Get the Alpha ELF linker hash table from a link_info structure. */
216
217#define alpha_elf_hash_table(p) \
4dfe6ac6
NC
218 (elf_hash_table_id ((struct elf_link_hash_table *) ((p)->hash)) \
219 == ALPHA_ELF_DATA ? ((struct alpha_elf_link_hash_table *) ((p)->hash)) : NULL)
252b5132
RH
220
221/* Get the object's symbols as our own entry type. */
222
223#define alpha_elf_sym_hashes(abfd) \
224 ((struct alpha_elf_link_hash_entry **)elf_sym_hashes(abfd))
225
68ffbac6 226/* Should we do dynamic things to this symbol? This differs from the
986a241f
RH
227 generic version in that we never need to consider function pointer
228 equality wrt PLT entries -- we don't create a PLT entry if a symbol's
229 address is ever taken. */
252b5132 230
986a241f 231static inline bfd_boolean
a7519a3c
RH
232alpha_elf_dynamic_symbol_p (struct elf_link_hash_entry *h,
233 struct bfd_link_info *info)
8fb35fed 234{
986a241f 235 return _bfd_elf_dynamic_symbol_p (h, info, 0);
8fb35fed 236}
252b5132
RH
237
238/* Create an entry in a Alpha ELF linker hash table. */
239
240static struct bfd_hash_entry *
a7519a3c
RH
241elf64_alpha_link_hash_newfunc (struct bfd_hash_entry *entry,
242 struct bfd_hash_table *table,
243 const char *string)
252b5132
RH
244{
245 struct alpha_elf_link_hash_entry *ret =
246 (struct alpha_elf_link_hash_entry *) entry;
247
248 /* Allocate the structure if it has not already been allocated by a
249 subclass. */
250 if (ret == (struct alpha_elf_link_hash_entry *) NULL)
251 ret = ((struct alpha_elf_link_hash_entry *)
252 bfd_hash_allocate (table,
253 sizeof (struct alpha_elf_link_hash_entry)));
254 if (ret == (struct alpha_elf_link_hash_entry *) NULL)
255 return (struct bfd_hash_entry *) ret;
256
257 /* Call the allocation method of the superclass. */
258 ret = ((struct alpha_elf_link_hash_entry *)
259 _bfd_elf_link_hash_newfunc ((struct bfd_hash_entry *) ret,
260 table, string));
261 if (ret != (struct alpha_elf_link_hash_entry *) NULL)
262 {
263 /* Set local fields. */
264 memset (&ret->esym, 0, sizeof (EXTR));
265 /* We use -2 as a marker to indicate that the information has
266 not been set. -1 means there is no associated ifd. */
267 ret->esym.ifd = -2;
268 ret->flags = 0;
269 ret->got_entries = NULL;
270 ret->reloc_entries = NULL;
271 }
272
273 return (struct bfd_hash_entry *) ret;
274}
275
276/* Create a Alpha ELF linker hash table. */
277
278static struct bfd_link_hash_table *
a7519a3c 279elf64_alpha_bfd_link_hash_table_create (bfd *abfd)
252b5132
RH
280{
281 struct alpha_elf_link_hash_table *ret;
dc810e39 282 bfd_size_type amt = sizeof (struct alpha_elf_link_hash_table);
252b5132 283
e2d34d7d 284 ret = (struct alpha_elf_link_hash_table *) bfd_zmalloc (amt);
252b5132
RH
285 if (ret == (struct alpha_elf_link_hash_table *) NULL)
286 return NULL;
287
66eb6687
AM
288 if (!_bfd_elf_link_hash_table_init (&ret->root, abfd,
289 elf64_alpha_link_hash_newfunc,
4dfe6ac6
NC
290 sizeof (struct alpha_elf_link_hash_entry),
291 ALPHA_ELF_DATA))
252b5132 292 {
e2d34d7d 293 free (ret);
252b5132
RH
294 return NULL;
295 }
296
297 return &ret->root.root;
298}
299\f
698600e4
AM
300/* Alpha ELF follows MIPS ELF in using a special find_nearest_line
301 routine in order to handle the ECOFF debugging information. */
302
303struct alpha_elf_find_line
304{
305 struct ecoff_debug_info d;
306 struct ecoff_find_line i;
307};
308
252b5132
RH
309/* We have some private fields hanging off of the elf_tdata structure. */
310
311struct alpha_elf_obj_tdata
312{
313 struct elf_obj_tdata root;
314
315 /* For every input file, these are the got entries for that object's
316 local symbols. */
317 struct alpha_elf_got_entry ** local_got_entries;
318
319 /* For every input file, this is the object that owns the got that
320 this input file uses. */
321 bfd *gotobj;
322
323 /* For every got, this is a linked list through the objects using this got */
324 bfd *in_got_link_next;
325
326 /* For every got, this is a link to the next got subsegment. */
327 bfd *got_link_next;
328
329 /* For every got, this is the section. */
330 asection *got;
331
3765b1be
RH
332 /* For every got, this is it's total number of words. */
333 int total_got_size;
252b5132 334
3765b1be 335 /* For every got, this is the sum of the number of words required
252b5132 336 to hold all of the member object's local got. */
3765b1be 337 int local_got_size;
698600e4
AM
338
339 /* Used by elf64_alpha_find_nearest_line entry point. */
340 struct alpha_elf_find_line *find_line_info;
341
252b5132
RH
342};
343
344#define alpha_elf_tdata(abfd) \
345 ((struct alpha_elf_obj_tdata *) (abfd)->tdata.any)
346
0ffa91dd
NC
347#define is_alpha_elf(bfd) \
348 (bfd_get_flavour (bfd) == bfd_target_elf_flavour \
349 && elf_tdata (bfd) != NULL \
4dfe6ac6 350 && elf_object_id (bfd) == ALPHA_ELF_DATA)
0ffa91dd 351
b34976b6 352static bfd_boolean
a7519a3c 353elf64_alpha_mkobject (bfd *abfd)
252b5132 354{
0ffa91dd 355 return bfd_elf_allocate_object (abfd, sizeof (struct alpha_elf_obj_tdata),
4dfe6ac6 356 ALPHA_ELF_DATA);
252b5132
RH
357}
358
b34976b6 359static bfd_boolean
a7519a3c 360elf64_alpha_object_p (bfd *abfd)
252b5132 361{
252b5132
RH
362 /* Set the right machine number for an Alpha ELF file. */
363 return bfd_default_set_arch_mach (abfd, bfd_arch_alpha, 0);
364}
365\f
a7519a3c
RH
366/* A relocation function which doesn't do anything. */
367
368static bfd_reloc_status_type
369elf64_alpha_reloc_nil (bfd *abfd ATTRIBUTE_UNUSED, arelent *reloc,
370 asymbol *sym ATTRIBUTE_UNUSED,
2c3fc389 371 void * data ATTRIBUTE_UNUSED, asection *sec,
a7519a3c
RH
372 bfd *output_bfd, char **error_message ATTRIBUTE_UNUSED)
373{
374 if (output_bfd)
375 reloc->address += sec->output_offset;
376 return bfd_reloc_ok;
377}
378
379/* A relocation function used for an unsupported reloc. */
380
381static bfd_reloc_status_type
382elf64_alpha_reloc_bad (bfd *abfd ATTRIBUTE_UNUSED, arelent *reloc,
383 asymbol *sym ATTRIBUTE_UNUSED,
2c3fc389 384 void * data ATTRIBUTE_UNUSED, asection *sec,
a7519a3c
RH
385 bfd *output_bfd, char **error_message ATTRIBUTE_UNUSED)
386{
387 if (output_bfd)
388 reloc->address += sec->output_offset;
389 return bfd_reloc_notsupported;
390}
391
392/* Do the work of the GPDISP relocation. */
393
394static bfd_reloc_status_type
395elf64_alpha_do_reloc_gpdisp (bfd *abfd, bfd_vma gpdisp, bfd_byte *p_ldah,
396 bfd_byte *p_lda)
397{
398 bfd_reloc_status_type ret = bfd_reloc_ok;
399 bfd_vma addend;
400 unsigned long i_ldah, i_lda;
401
402 i_ldah = bfd_get_32 (abfd, p_ldah);
403 i_lda = bfd_get_32 (abfd, p_lda);
404
405 /* Complain if the instructions are not correct. */
406 if (((i_ldah >> 26) & 0x3f) != 0x09
407 || ((i_lda >> 26) & 0x3f) != 0x08)
408 ret = bfd_reloc_dangerous;
409
410 /* Extract the user-supplied offset, mirroring the sign extensions
411 that the instructions perform. */
412 addend = ((i_ldah & 0xffff) << 16) | (i_lda & 0xffff);
413 addend = (addend ^ 0x80008000) - 0x80008000;
414
415 gpdisp += addend;
416
417 if ((bfd_signed_vma) gpdisp < -(bfd_signed_vma) 0x80000000
418 || (bfd_signed_vma) gpdisp >= (bfd_signed_vma) 0x7fff8000)
419 ret = bfd_reloc_overflow;
420
421 /* compensate for the sign extension again. */
422 i_ldah = ((i_ldah & 0xffff0000)
423 | (((gpdisp >> 16) + ((gpdisp >> 15) & 1)) & 0xffff));
424 i_lda = (i_lda & 0xffff0000) | (gpdisp & 0xffff);
425
426 bfd_put_32 (abfd, (bfd_vma) i_ldah, p_ldah);
427 bfd_put_32 (abfd, (bfd_vma) i_lda, p_lda);
428
429 return ret;
430}
431
432/* The special function for the GPDISP reloc. */
433
434static bfd_reloc_status_type
435elf64_alpha_reloc_gpdisp (bfd *abfd, arelent *reloc_entry,
2c3fc389 436 asymbol *sym ATTRIBUTE_UNUSED, void * data,
a7519a3c
RH
437 asection *input_section, bfd *output_bfd,
438 char **err_msg)
439{
440 bfd_reloc_status_type ret;
441 bfd_vma gp, relocation;
442 bfd_vma high_address;
443 bfd_byte *p_ldah, *p_lda;
444
445 /* Don't do anything if we're not doing a final link. */
446 if (output_bfd)
447 {
448 reloc_entry->address += input_section->output_offset;
449 return bfd_reloc_ok;
450 }
451
452 high_address = bfd_get_section_limit (abfd, input_section);
453 if (reloc_entry->address > high_address
454 || reloc_entry->address + reloc_entry->addend > high_address)
455 return bfd_reloc_outofrange;
456
457 /* The gp used in the portion of the output object to which this
458 input object belongs is cached on the input bfd. */
459 gp = _bfd_get_gp_value (abfd);
460
461 relocation = (input_section->output_section->vma
462 + input_section->output_offset
463 + reloc_entry->address);
464
465 p_ldah = (bfd_byte *) data + reloc_entry->address;
466 p_lda = p_ldah + reloc_entry->addend;
467
468 ret = elf64_alpha_do_reloc_gpdisp (abfd, gp - relocation, p_ldah, p_lda);
469
470 /* Complain if the instructions are not correct. */
471 if (ret == bfd_reloc_dangerous)
472 *err_msg = _("GPDISP relocation did not find ldah and lda instructions");
473
474 return ret;
475}
476
252b5132
RH
477/* In case we're on a 32-bit machine, construct a 64-bit "-1" value
478 from smaller values. Start with zero, widen, *then* decrement. */
479#define MINUS_ONE (((bfd_vma)0) - 1)
480
21d799b5 481
dfe57ca0 482#define SKIP_HOWTO(N) \
21d799b5 483 HOWTO(N, 0, 0, 0, 0, 0, complain_overflow_dont, elf64_alpha_reloc_bad, 0, 0, 0, 0, 0)
dfe57ca0 484
252b5132
RH
485static reloc_howto_type elf64_alpha_howto_table[] =
486{
487 HOWTO (R_ALPHA_NONE, /* type */
488 0, /* rightshift */
6346d5ca
AM
489 3, /* size (0 = byte, 1 = short, 2 = long) */
490 0, /* bitsize */
b34976b6 491 TRUE, /* pc_relative */
252b5132
RH
492 0, /* bitpos */
493 complain_overflow_dont, /* complain_on_overflow */
494 elf64_alpha_reloc_nil, /* special_function */
495 "NONE", /* name */
b34976b6 496 FALSE, /* partial_inplace */
252b5132
RH
497 0, /* src_mask */
498 0, /* dst_mask */
b34976b6 499 TRUE), /* pcrel_offset */
252b5132
RH
500
501 /* A 32 bit reference to a symbol. */
502 HOWTO (R_ALPHA_REFLONG, /* type */
503 0, /* rightshift */
504 2, /* size (0 = byte, 1 = short, 2 = long) */
505 32, /* bitsize */
b34976b6 506 FALSE, /* pc_relative */
252b5132
RH
507 0, /* bitpos */
508 complain_overflow_bitfield, /* complain_on_overflow */
bc1bc43f 509 bfd_elf_generic_reloc, /* special_function */
252b5132 510 "REFLONG", /* name */
b34976b6 511 FALSE, /* partial_inplace */
252b5132
RH
512 0xffffffff, /* src_mask */
513 0xffffffff, /* dst_mask */
b34976b6 514 FALSE), /* pcrel_offset */
252b5132
RH
515
516 /* A 64 bit reference to a symbol. */
517 HOWTO (R_ALPHA_REFQUAD, /* type */
518 0, /* rightshift */
519 4, /* size (0 = byte, 1 = short, 2 = long) */
520 64, /* bitsize */
b34976b6 521 FALSE, /* pc_relative */
252b5132
RH
522 0, /* bitpos */
523 complain_overflow_bitfield, /* complain_on_overflow */
bc1bc43f 524 bfd_elf_generic_reloc, /* special_function */
252b5132 525 "REFQUAD", /* name */
b34976b6 526 FALSE, /* partial_inplace */
252b5132
RH
527 MINUS_ONE, /* src_mask */
528 MINUS_ONE, /* dst_mask */
b34976b6 529 FALSE), /* pcrel_offset */
252b5132
RH
530
531 /* A 32 bit GP relative offset. This is just like REFLONG except
532 that when the value is used the value of the gp register will be
533 added in. */
534 HOWTO (R_ALPHA_GPREL32, /* type */
535 0, /* rightshift */
536 2, /* size (0 = byte, 1 = short, 2 = long) */
537 32, /* bitsize */
b34976b6 538 FALSE, /* pc_relative */
252b5132
RH
539 0, /* bitpos */
540 complain_overflow_bitfield, /* complain_on_overflow */
bc1bc43f 541 bfd_elf_generic_reloc, /* special_function */
252b5132 542 "GPREL32", /* name */
b34976b6 543 FALSE, /* partial_inplace */
252b5132
RH
544 0xffffffff, /* src_mask */
545 0xffffffff, /* dst_mask */
b34976b6 546 FALSE), /* pcrel_offset */
252b5132
RH
547
548 /* Used for an instruction that refers to memory off the GP register. */
549 HOWTO (R_ALPHA_LITERAL, /* type */
550 0, /* rightshift */
dfe57ca0 551 1, /* size (0 = byte, 1 = short, 2 = long) */
252b5132 552 16, /* bitsize */
b34976b6 553 FALSE, /* pc_relative */
252b5132
RH
554 0, /* bitpos */
555 complain_overflow_signed, /* complain_on_overflow */
bc1bc43f 556 bfd_elf_generic_reloc, /* special_function */
252b5132 557 "ELF_LITERAL", /* name */
b34976b6 558 FALSE, /* partial_inplace */
252b5132
RH
559 0xffff, /* src_mask */
560 0xffff, /* dst_mask */
b34976b6 561 FALSE), /* pcrel_offset */
252b5132
RH
562
563 /* This reloc only appears immediately following an ELF_LITERAL reloc.
564 It identifies a use of the literal. The symbol index is special:
565 1 means the literal address is in the base register of a memory
566 format instruction; 2 means the literal address is in the byte
567 offset register of a byte-manipulation instruction; 3 means the
568 literal address is in the target register of a jsr instruction.
569 This does not actually do any relocation. */
570 HOWTO (R_ALPHA_LITUSE, /* type */
571 0, /* rightshift */
dfe57ca0 572 1, /* size (0 = byte, 1 = short, 2 = long) */
252b5132 573 32, /* bitsize */
b34976b6 574 FALSE, /* pc_relative */
252b5132
RH
575 0, /* bitpos */
576 complain_overflow_dont, /* complain_on_overflow */
577 elf64_alpha_reloc_nil, /* special_function */
578 "LITUSE", /* name */
b34976b6 579 FALSE, /* partial_inplace */
252b5132
RH
580 0, /* src_mask */
581 0, /* dst_mask */
b34976b6 582 FALSE), /* pcrel_offset */
252b5132
RH
583
584 /* Load the gp register. This is always used for a ldah instruction
585 which loads the upper 16 bits of the gp register. The symbol
586 index of the GPDISP instruction is an offset in bytes to the lda
587 instruction that loads the lower 16 bits. The value to use for
588 the relocation is the difference between the GP value and the
589 current location; the load will always be done against a register
590 holding the current address.
591
592 NOTE: Unlike ECOFF, partial in-place relocation is not done. If
593 any offset is present in the instructions, it is an offset from
594 the register to the ldah instruction. This lets us avoid any
595 stupid hackery like inventing a gp value to do partial relocation
596 against. Also unlike ECOFF, we do the whole relocation off of
597 the GPDISP rather than a GPDISP_HI16/GPDISP_LO16 pair. An odd,
598 space consuming bit, that, since all the information was present
599 in the GPDISP_HI16 reloc. */
600 HOWTO (R_ALPHA_GPDISP, /* type */
601 16, /* rightshift */
602 2, /* size (0 = byte, 1 = short, 2 = long) */
603 16, /* bitsize */
b34976b6 604 FALSE, /* pc_relative */
252b5132
RH
605 0, /* bitpos */
606 complain_overflow_dont, /* complain_on_overflow */
607 elf64_alpha_reloc_gpdisp, /* special_function */
608 "GPDISP", /* name */
b34976b6 609 FALSE, /* partial_inplace */
252b5132
RH
610 0xffff, /* src_mask */
611 0xffff, /* dst_mask */
b34976b6 612 TRUE), /* pcrel_offset */
252b5132
RH
613
614 /* A 21 bit branch. */
615 HOWTO (R_ALPHA_BRADDR, /* type */
616 2, /* rightshift */
617 2, /* size (0 = byte, 1 = short, 2 = long) */
618 21, /* bitsize */
b34976b6 619 TRUE, /* pc_relative */
252b5132
RH
620 0, /* bitpos */
621 complain_overflow_signed, /* complain_on_overflow */
bc1bc43f 622 bfd_elf_generic_reloc, /* special_function */
252b5132 623 "BRADDR", /* name */
b34976b6 624 FALSE, /* partial_inplace */
252b5132
RH
625 0x1fffff, /* src_mask */
626 0x1fffff, /* dst_mask */
b34976b6 627 TRUE), /* pcrel_offset */
252b5132
RH
628
629 /* A hint for a jump to a register. */
630 HOWTO (R_ALPHA_HINT, /* type */
631 2, /* rightshift */
dfe57ca0 632 1, /* size (0 = byte, 1 = short, 2 = long) */
252b5132 633 14, /* bitsize */
b34976b6 634 TRUE, /* pc_relative */
252b5132
RH
635 0, /* bitpos */
636 complain_overflow_dont, /* complain_on_overflow */
bc1bc43f 637 bfd_elf_generic_reloc, /* special_function */
252b5132 638 "HINT", /* name */
b34976b6 639 FALSE, /* partial_inplace */
252b5132
RH
640 0x3fff, /* src_mask */
641 0x3fff, /* dst_mask */
b34976b6 642 TRUE), /* pcrel_offset */
252b5132
RH
643
644 /* 16 bit PC relative offset. */
645 HOWTO (R_ALPHA_SREL16, /* type */
646 0, /* rightshift */
647 1, /* size (0 = byte, 1 = short, 2 = long) */
648 16, /* bitsize */
b34976b6 649 TRUE, /* pc_relative */
252b5132
RH
650 0, /* bitpos */
651 complain_overflow_signed, /* complain_on_overflow */
bc1bc43f 652 bfd_elf_generic_reloc, /* special_function */
252b5132 653 "SREL16", /* name */
b34976b6 654 FALSE, /* partial_inplace */
252b5132
RH
655 0xffff, /* src_mask */
656 0xffff, /* dst_mask */
b34976b6 657 TRUE), /* pcrel_offset */
252b5132
RH
658
659 /* 32 bit PC relative offset. */
660 HOWTO (R_ALPHA_SREL32, /* type */
661 0, /* rightshift */
662 2, /* size (0 = byte, 1 = short, 2 = long) */
663 32, /* bitsize */
b34976b6 664 TRUE, /* pc_relative */
252b5132
RH
665 0, /* bitpos */
666 complain_overflow_signed, /* complain_on_overflow */
bc1bc43f 667 bfd_elf_generic_reloc, /* special_function */
252b5132 668 "SREL32", /* name */
b34976b6 669 FALSE, /* partial_inplace */
252b5132
RH
670 0xffffffff, /* src_mask */
671 0xffffffff, /* dst_mask */
b34976b6 672 TRUE), /* pcrel_offset */
252b5132
RH
673
674 /* A 64 bit PC relative offset. */
675 HOWTO (R_ALPHA_SREL64, /* type */
676 0, /* rightshift */
677 4, /* size (0 = byte, 1 = short, 2 = long) */
678 64, /* bitsize */
b34976b6 679 TRUE, /* pc_relative */
252b5132
RH
680 0, /* bitpos */
681 complain_overflow_signed, /* complain_on_overflow */
bc1bc43f 682 bfd_elf_generic_reloc, /* special_function */
252b5132 683 "SREL64", /* name */
b34976b6 684 FALSE, /* partial_inplace */
252b5132
RH
685 MINUS_ONE, /* src_mask */
686 MINUS_ONE, /* dst_mask */
b34976b6 687 TRUE), /* pcrel_offset */
252b5132 688
dfe57ca0
RH
689 /* Skip 12 - 16; deprecated ECOFF relocs. */
690 SKIP_HOWTO (12),
691 SKIP_HOWTO (13),
692 SKIP_HOWTO (14),
693 SKIP_HOWTO (15),
694 SKIP_HOWTO (16),
252b5132
RH
695
696 /* The high 16 bits of the displacement from GP to the target. */
697 HOWTO (R_ALPHA_GPRELHIGH,
698 0, /* rightshift */
dfe57ca0 699 1, /* size (0 = byte, 1 = short, 2 = long) */
252b5132 700 16, /* bitsize */
b34976b6 701 FALSE, /* pc_relative */
252b5132
RH
702 0, /* bitpos */
703 complain_overflow_signed, /* complain_on_overflow */
bc1bc43f 704 bfd_elf_generic_reloc, /* special_function */
252b5132 705 "GPRELHIGH", /* name */
b34976b6 706 FALSE, /* partial_inplace */
252b5132
RH
707 0xffff, /* src_mask */
708 0xffff, /* dst_mask */
b34976b6 709 FALSE), /* pcrel_offset */
252b5132
RH
710
711 /* The low 16 bits of the displacement from GP to the target. */
712 HOWTO (R_ALPHA_GPRELLOW,
713 0, /* rightshift */
dfe57ca0 714 1, /* size (0 = byte, 1 = short, 2 = long) */
252b5132 715 16, /* bitsize */
b34976b6 716 FALSE, /* pc_relative */
252b5132
RH
717 0, /* bitpos */
718 complain_overflow_dont, /* complain_on_overflow */
bc1bc43f 719 bfd_elf_generic_reloc, /* special_function */
252b5132 720 "GPRELLOW", /* name */
b34976b6 721 FALSE, /* partial_inplace */
252b5132
RH
722 0xffff, /* src_mask */
723 0xffff, /* dst_mask */
b34976b6 724 FALSE), /* pcrel_offset */
252b5132
RH
725
726 /* A 16-bit displacement from the GP to the target. */
dfe57ca0 727 HOWTO (R_ALPHA_GPREL16,
252b5132 728 0, /* rightshift */
dfe57ca0 729 1, /* size (0 = byte, 1 = short, 2 = long) */
252b5132 730 16, /* bitsize */
b34976b6 731 FALSE, /* pc_relative */
252b5132
RH
732 0, /* bitpos */
733 complain_overflow_signed, /* complain_on_overflow */
bc1bc43f 734 bfd_elf_generic_reloc, /* special_function */
dfe57ca0 735 "GPREL16", /* name */
b34976b6 736 FALSE, /* partial_inplace */
252b5132
RH
737 0xffff, /* src_mask */
738 0xffff, /* dst_mask */
b34976b6 739 FALSE), /* pcrel_offset */
252b5132 740
dfe57ca0
RH
741 /* Skip 20 - 23; deprecated ECOFF relocs. */
742 SKIP_HOWTO (20),
743 SKIP_HOWTO (21),
744 SKIP_HOWTO (22),
745 SKIP_HOWTO (23),
252b5132 746
fe8bc63d 747 /* Misc ELF relocations. */
252b5132
RH
748
749 /* A dynamic relocation to copy the target into our .dynbss section. */
750 /* Not generated, as all Alpha objects use PIC, so it is not needed. It
751 is present because every other ELF has one, but should not be used
752 because .dynbss is an ugly thing. */
753 HOWTO (R_ALPHA_COPY,
754 0,
755 0,
756 0,
b34976b6 757 FALSE,
252b5132
RH
758 0,
759 complain_overflow_dont,
760 bfd_elf_generic_reloc,
761 "COPY",
b34976b6 762 FALSE,
252b5132
RH
763 0,
764 0,
b34976b6 765 TRUE),
252b5132
RH
766
767 /* A dynamic relocation for a .got entry. */
768 HOWTO (R_ALPHA_GLOB_DAT,
769 0,
770 0,
771 0,
b34976b6 772 FALSE,
252b5132
RH
773 0,
774 complain_overflow_dont,
775 bfd_elf_generic_reloc,
776 "GLOB_DAT",
b34976b6 777 FALSE,
252b5132
RH
778 0,
779 0,
b34976b6 780 TRUE),
252b5132
RH
781
782 /* A dynamic relocation for a .plt entry. */
783 HOWTO (R_ALPHA_JMP_SLOT,
784 0,
785 0,
786 0,
b34976b6 787 FALSE,
252b5132
RH
788 0,
789 complain_overflow_dont,
790 bfd_elf_generic_reloc,
791 "JMP_SLOT",
b34976b6 792 FALSE,
252b5132
RH
793 0,
794 0,
b34976b6 795 TRUE),
252b5132
RH
796
797 /* A dynamic relocation to add the base of the DSO to a 64-bit field. */
798 HOWTO (R_ALPHA_RELATIVE,
799 0,
800 0,
801 0,
b34976b6 802 FALSE,
252b5132
RH
803 0,
804 complain_overflow_dont,
805 bfd_elf_generic_reloc,
806 "RELATIVE",
b34976b6 807 FALSE,
252b5132
RH
808 0,
809 0,
b34976b6 810 TRUE),
7793f4d0
RH
811
812 /* A 21 bit branch that adjusts for gp loads. */
813 HOWTO (R_ALPHA_BRSGP, /* type */
814 2, /* rightshift */
815 2, /* size (0 = byte, 1 = short, 2 = long) */
816 21, /* bitsize */
b34976b6 817 TRUE, /* pc_relative */
7793f4d0
RH
818 0, /* bitpos */
819 complain_overflow_signed, /* complain_on_overflow */
bc1bc43f 820 bfd_elf_generic_reloc, /* special_function */
7793f4d0 821 "BRSGP", /* name */
b34976b6 822 FALSE, /* partial_inplace */
7793f4d0
RH
823 0x1fffff, /* src_mask */
824 0x1fffff, /* dst_mask */
b34976b6 825 TRUE), /* pcrel_offset */
3765b1be
RH
826
827 /* Creates a tls_index for the symbol in the got. */
828 HOWTO (R_ALPHA_TLSGD, /* type */
829 0, /* rightshift */
830 1, /* size (0 = byte, 1 = short, 2 = long) */
831 16, /* bitsize */
b34976b6 832 FALSE, /* pc_relative */
3765b1be
RH
833 0, /* bitpos */
834 complain_overflow_signed, /* complain_on_overflow */
bc1bc43f 835 bfd_elf_generic_reloc, /* special_function */
3765b1be 836 "TLSGD", /* name */
b34976b6 837 FALSE, /* partial_inplace */
3765b1be
RH
838 0xffff, /* src_mask */
839 0xffff, /* dst_mask */
b34976b6 840 FALSE), /* pcrel_offset */
3765b1be
RH
841
842 /* Creates a tls_index for the (current) module in the got. */
843 HOWTO (R_ALPHA_TLSLDM, /* type */
844 0, /* rightshift */
845 1, /* size (0 = byte, 1 = short, 2 = long) */
846 16, /* bitsize */
b34976b6 847 FALSE, /* pc_relative */
3765b1be
RH
848 0, /* bitpos */
849 complain_overflow_signed, /* complain_on_overflow */
bc1bc43f 850 bfd_elf_generic_reloc, /* special_function */
3765b1be 851 "TLSLDM", /* name */
b34976b6 852 FALSE, /* partial_inplace */
3765b1be
RH
853 0xffff, /* src_mask */
854 0xffff, /* dst_mask */
b34976b6 855 FALSE), /* pcrel_offset */
3765b1be
RH
856
857 /* A dynamic relocation for a DTP module entry. */
858 HOWTO (R_ALPHA_DTPMOD64, /* type */
859 0, /* rightshift */
860 4, /* size (0 = byte, 1 = short, 2 = long) */
861 64, /* bitsize */
b34976b6 862 FALSE, /* pc_relative */
3765b1be
RH
863 0, /* bitpos */
864 complain_overflow_bitfield, /* complain_on_overflow */
bc1bc43f 865 bfd_elf_generic_reloc, /* special_function */
3765b1be 866 "DTPMOD64", /* name */
b34976b6 867 FALSE, /* partial_inplace */
3765b1be
RH
868 MINUS_ONE, /* src_mask */
869 MINUS_ONE, /* dst_mask */
b34976b6 870 FALSE), /* pcrel_offset */
3765b1be
RH
871
872 /* Creates a 64-bit offset in the got for the displacement
873 from DTP to the target. */
874 HOWTO (R_ALPHA_GOTDTPREL, /* type */
875 0, /* rightshift */
876 1, /* size (0 = byte, 1 = short, 2 = long) */
877 16, /* bitsize */
b34976b6 878 FALSE, /* pc_relative */
3765b1be
RH
879 0, /* bitpos */
880 complain_overflow_signed, /* complain_on_overflow */
bc1bc43f 881 bfd_elf_generic_reloc, /* special_function */
3765b1be 882 "GOTDTPREL", /* name */
b34976b6 883 FALSE, /* partial_inplace */
3765b1be
RH
884 0xffff, /* src_mask */
885 0xffff, /* dst_mask */
b34976b6 886 FALSE), /* pcrel_offset */
3765b1be
RH
887
888 /* A dynamic relocation for a displacement from DTP to the target. */
889 HOWTO (R_ALPHA_DTPREL64, /* type */
890 0, /* rightshift */
891 4, /* size (0 = byte, 1 = short, 2 = long) */
892 64, /* bitsize */
b34976b6 893 FALSE, /* pc_relative */
3765b1be
RH
894 0, /* bitpos */
895 complain_overflow_bitfield, /* complain_on_overflow */
bc1bc43f 896 bfd_elf_generic_reloc, /* special_function */
3765b1be 897 "DTPREL64", /* name */
b34976b6 898 FALSE, /* partial_inplace */
3765b1be
RH
899 MINUS_ONE, /* src_mask */
900 MINUS_ONE, /* dst_mask */
b34976b6 901 FALSE), /* pcrel_offset */
3765b1be
RH
902
903 /* The high 16 bits of the displacement from DTP to the target. */
904 HOWTO (R_ALPHA_DTPRELHI, /* type */
905 0, /* rightshift */
906 1, /* size (0 = byte, 1 = short, 2 = long) */
907 16, /* bitsize */
b34976b6 908 FALSE, /* pc_relative */
3765b1be
RH
909 0, /* bitpos */
910 complain_overflow_signed, /* complain_on_overflow */
bc1bc43f 911 bfd_elf_generic_reloc, /* special_function */
3765b1be 912 "DTPRELHI", /* name */
b34976b6 913 FALSE, /* partial_inplace */
3765b1be
RH
914 0xffff, /* src_mask */
915 0xffff, /* dst_mask */
b34976b6 916 FALSE), /* pcrel_offset */
3765b1be
RH
917
918 /* The low 16 bits of the displacement from DTP to the target. */
919 HOWTO (R_ALPHA_DTPRELLO, /* type */
920 0, /* rightshift */
921 1, /* size (0 = byte, 1 = short, 2 = long) */
922 16, /* bitsize */
b34976b6 923 FALSE, /* pc_relative */
3765b1be
RH
924 0, /* bitpos */
925 complain_overflow_dont, /* complain_on_overflow */
bc1bc43f 926 bfd_elf_generic_reloc, /* special_function */
3765b1be 927 "DTPRELLO", /* name */
b34976b6 928 FALSE, /* partial_inplace */
3765b1be
RH
929 0xffff, /* src_mask */
930 0xffff, /* dst_mask */
b34976b6 931 FALSE), /* pcrel_offset */
3765b1be
RH
932
933 /* A 16-bit displacement from DTP to the target. */
934 HOWTO (R_ALPHA_DTPREL16, /* type */
935 0, /* rightshift */
936 1, /* size (0 = byte, 1 = short, 2 = long) */
937 16, /* bitsize */
b34976b6 938 FALSE, /* pc_relative */
3765b1be
RH
939 0, /* bitpos */
940 complain_overflow_signed, /* complain_on_overflow */
bc1bc43f 941 bfd_elf_generic_reloc, /* special_function */
3765b1be 942 "DTPREL16", /* name */
b34976b6 943 FALSE, /* partial_inplace */
3765b1be
RH
944 0xffff, /* src_mask */
945 0xffff, /* dst_mask */
b34976b6 946 FALSE), /* pcrel_offset */
3765b1be
RH
947
948 /* Creates a 64-bit offset in the got for the displacement
949 from TP to the target. */
950 HOWTO (R_ALPHA_GOTTPREL, /* type */
951 0, /* rightshift */
952 1, /* size (0 = byte, 1 = short, 2 = long) */
953 16, /* bitsize */
b34976b6 954 FALSE, /* pc_relative */
3765b1be
RH
955 0, /* bitpos */
956 complain_overflow_signed, /* complain_on_overflow */
bc1bc43f 957 bfd_elf_generic_reloc, /* special_function */
3765b1be 958 "GOTTPREL", /* name */
b34976b6 959 FALSE, /* partial_inplace */
3765b1be
RH
960 0xffff, /* src_mask */
961 0xffff, /* dst_mask */
b34976b6 962 FALSE), /* pcrel_offset */
3765b1be
RH
963
964 /* A dynamic relocation for a displacement from TP to the target. */
965 HOWTO (R_ALPHA_TPREL64, /* type */
966 0, /* rightshift */
967 4, /* size (0 = byte, 1 = short, 2 = long) */
968 64, /* bitsize */
b34976b6 969 FALSE, /* pc_relative */
3765b1be
RH
970 0, /* bitpos */
971 complain_overflow_bitfield, /* complain_on_overflow */
bc1bc43f 972 bfd_elf_generic_reloc, /* special_function */
3765b1be 973 "TPREL64", /* name */
b34976b6 974 FALSE, /* partial_inplace */
3765b1be
RH
975 MINUS_ONE, /* src_mask */
976 MINUS_ONE, /* dst_mask */
b34976b6 977 FALSE), /* pcrel_offset */
3765b1be
RH
978
979 /* The high 16 bits of the displacement from TP to the target. */
980 HOWTO (R_ALPHA_TPRELHI, /* type */
981 0, /* rightshift */
982 1, /* size (0 = byte, 1 = short, 2 = long) */
983 16, /* bitsize */
b34976b6 984 FALSE, /* pc_relative */
3765b1be
RH
985 0, /* bitpos */
986 complain_overflow_signed, /* complain_on_overflow */
bc1bc43f 987 bfd_elf_generic_reloc, /* special_function */
3765b1be 988 "TPRELHI", /* name */
b34976b6 989 FALSE, /* partial_inplace */
3765b1be
RH
990 0xffff, /* src_mask */
991 0xffff, /* dst_mask */
b34976b6 992 FALSE), /* pcrel_offset */
3765b1be
RH
993
994 /* The low 16 bits of the displacement from TP to the target. */
995 HOWTO (R_ALPHA_TPRELLO, /* type */
996 0, /* rightshift */
997 1, /* size (0 = byte, 1 = short, 2 = long) */
998 16, /* bitsize */
b34976b6 999 FALSE, /* pc_relative */
3765b1be
RH
1000 0, /* bitpos */
1001 complain_overflow_dont, /* complain_on_overflow */
bc1bc43f 1002 bfd_elf_generic_reloc, /* special_function */
3765b1be 1003 "TPRELLO", /* name */
b34976b6 1004 FALSE, /* partial_inplace */
3765b1be
RH
1005 0xffff, /* src_mask */
1006 0xffff, /* dst_mask */
b34976b6 1007 FALSE), /* pcrel_offset */
3765b1be
RH
1008
1009 /* A 16-bit displacement from TP to the target. */
1010 HOWTO (R_ALPHA_TPREL16, /* type */
1011 0, /* rightshift */
1012 1, /* size (0 = byte, 1 = short, 2 = long) */
1013 16, /* bitsize */
b34976b6 1014 FALSE, /* pc_relative */
3765b1be
RH
1015 0, /* bitpos */
1016 complain_overflow_signed, /* complain_on_overflow */
bc1bc43f 1017 bfd_elf_generic_reloc, /* special_function */
3765b1be 1018 "TPREL16", /* name */
b34976b6 1019 FALSE, /* partial_inplace */
3765b1be
RH
1020 0xffff, /* src_mask */
1021 0xffff, /* dst_mask */
b34976b6 1022 FALSE), /* pcrel_offset */
252b5132
RH
1023};
1024
252b5132
RH
1025/* A mapping from BFD reloc types to Alpha ELF reloc types. */
1026
1027struct elf_reloc_map
1028{
1029 bfd_reloc_code_real_type bfd_reloc_val;
1030 int elf_reloc_val;
1031};
1032
1033static const struct elf_reloc_map elf64_alpha_reloc_map[] =
1034{
dfe57ca0
RH
1035 {BFD_RELOC_NONE, R_ALPHA_NONE},
1036 {BFD_RELOC_32, R_ALPHA_REFLONG},
1037 {BFD_RELOC_64, R_ALPHA_REFQUAD},
1038 {BFD_RELOC_CTOR, R_ALPHA_REFQUAD},
1039 {BFD_RELOC_GPREL32, R_ALPHA_GPREL32},
1040 {BFD_RELOC_ALPHA_ELF_LITERAL, R_ALPHA_LITERAL},
1041 {BFD_RELOC_ALPHA_LITUSE, R_ALPHA_LITUSE},
1042 {BFD_RELOC_ALPHA_GPDISP, R_ALPHA_GPDISP},
1043 {BFD_RELOC_23_PCREL_S2, R_ALPHA_BRADDR},
1044 {BFD_RELOC_ALPHA_HINT, R_ALPHA_HINT},
1045 {BFD_RELOC_16_PCREL, R_ALPHA_SREL16},
1046 {BFD_RELOC_32_PCREL, R_ALPHA_SREL32},
1047 {BFD_RELOC_64_PCREL, R_ALPHA_SREL64},
1048 {BFD_RELOC_ALPHA_GPREL_HI16, R_ALPHA_GPRELHIGH},
1049 {BFD_RELOC_ALPHA_GPREL_LO16, R_ALPHA_GPRELLOW},
1050 {BFD_RELOC_GPREL16, R_ALPHA_GPREL16},
7793f4d0 1051 {BFD_RELOC_ALPHA_BRSGP, R_ALPHA_BRSGP},
3765b1be
RH
1052 {BFD_RELOC_ALPHA_TLSGD, R_ALPHA_TLSGD},
1053 {BFD_RELOC_ALPHA_TLSLDM, R_ALPHA_TLSLDM},
1054 {BFD_RELOC_ALPHA_DTPMOD64, R_ALPHA_DTPMOD64},
1055 {BFD_RELOC_ALPHA_GOTDTPREL16, R_ALPHA_GOTDTPREL},
1056 {BFD_RELOC_ALPHA_DTPREL64, R_ALPHA_DTPREL64},
1057 {BFD_RELOC_ALPHA_DTPREL_HI16, R_ALPHA_DTPRELHI},
1058 {BFD_RELOC_ALPHA_DTPREL_LO16, R_ALPHA_DTPRELLO},
1059 {BFD_RELOC_ALPHA_DTPREL16, R_ALPHA_DTPREL16},
1060 {BFD_RELOC_ALPHA_GOTTPREL16, R_ALPHA_GOTTPREL},
1061 {BFD_RELOC_ALPHA_TPREL64, R_ALPHA_TPREL64},
1062 {BFD_RELOC_ALPHA_TPREL_HI16, R_ALPHA_TPRELHI},
1063 {BFD_RELOC_ALPHA_TPREL_LO16, R_ALPHA_TPRELLO},
1064 {BFD_RELOC_ALPHA_TPREL16, R_ALPHA_TPREL16},
252b5132
RH
1065};
1066
1067/* Given a BFD reloc type, return a HOWTO structure. */
1068
1069static reloc_howto_type *
a7519a3c
RH
1070elf64_alpha_bfd_reloc_type_lookup (bfd *abfd ATTRIBUTE_UNUSED,
1071 bfd_reloc_code_real_type code)
252b5132
RH
1072{
1073 const struct elf_reloc_map *i, *e;
1074 i = e = elf64_alpha_reloc_map;
1075 e += sizeof (elf64_alpha_reloc_map) / sizeof (struct elf_reloc_map);
1076 for (; i != e; ++i)
1077 {
1078 if (i->bfd_reloc_val == code)
1079 return &elf64_alpha_howto_table[i->elf_reloc_val];
1080 }
1081 return 0;
1082}
1083
157090f7
AM
1084static reloc_howto_type *
1085elf64_alpha_bfd_reloc_name_lookup (bfd *abfd ATTRIBUTE_UNUSED,
1086 const char *r_name)
1087{
1088 unsigned int i;
1089
1090 for (i = 0;
1091 i < (sizeof (elf64_alpha_howto_table)
1092 / sizeof (elf64_alpha_howto_table[0]));
1093 i++)
1094 if (elf64_alpha_howto_table[i].name != NULL
1095 && strcasecmp (elf64_alpha_howto_table[i].name, r_name) == 0)
1096 return &elf64_alpha_howto_table[i];
1097
1098 return NULL;
1099}
1100
252b5132
RH
1101/* Given an Alpha ELF reloc type, fill in an arelent structure. */
1102
1103static void
a7519a3c
RH
1104elf64_alpha_info_to_howto (bfd *abfd ATTRIBUTE_UNUSED, arelent *cache_ptr,
1105 Elf_Internal_Rela *dst)
252b5132 1106{
a7519a3c 1107 unsigned r_type = ELF64_R_TYPE(dst->r_info);
cd21f5da
NC
1108
1109 if (r_type >= R_ALPHA_max)
1110 {
695344c0 1111 /* xgettext:c-format */
4eca0228
AM
1112 _bfd_error_handler (_("%B: unrecognised Alpha reloc number: %d"),
1113 abfd, r_type);
cd21f5da
NC
1114 bfd_set_error (bfd_error_bad_value);
1115 r_type = R_ALPHA_NONE;
1116 }
252b5132
RH
1117 cache_ptr->howto = &elf64_alpha_howto_table[r_type];
1118}
3765b1be
RH
1119
1120/* These two relocations create a two-word entry in the got. */
1121#define alpha_got_entry_size(r_type) \
1122 (r_type == R_ALPHA_TLSGD || r_type == R_ALPHA_TLSLDM ? 16 : 8)
9e756d64
RH
1123
1124/* This is PT_TLS segment p_vaddr. */
e1918d23
AM
1125#define alpha_get_dtprel_base(info) \
1126 (elf_hash_table (info)->tls_sec->vma)
9e756d64
RH
1127
1128/* Main program TLS (whose template starts at PT_TLS p_vaddr)
1129 is assigned offset round(16, PT_TLS p_align). */
e1918d23
AM
1130#define alpha_get_tprel_base(info) \
1131 (elf_hash_table (info)->tls_sec->vma \
1132 - align_power ((bfd_vma) 16, \
1133 elf_hash_table (info)->tls_sec->alignment_power))
252b5132 1134\f
a7519a3c
RH
1135/* Handle an Alpha specific section when reading an object file. This
1136 is called when bfd_section_from_shdr finds a section with an unknown
1137 type.
1138 FIXME: We need to handle the SHF_ALPHA_GPREL flag, but I'm not sure
1139 how to. */
252b5132 1140
a7519a3c
RH
1141static bfd_boolean
1142elf64_alpha_section_from_shdr (bfd *abfd,
1143 Elf_Internal_Shdr *hdr,
1144 const char *name,
1145 int shindex)
252b5132 1146{
a7519a3c
RH
1147 asection *newsect;
1148
1149 /* There ought to be a place to keep ELF backend specific flags, but
1150 at the moment there isn't one. We just keep track of the
1151 sections by their name, instead. Fortunately, the ABI gives
1152 suggested names for all the MIPS specific sections, so we will
1153 probably get away with this. */
1154 switch (hdr->sh_type)
1155 {
1156 case SHT_ALPHA_DEBUG:
1157 if (strcmp (name, ".mdebug") != 0)
1158 return FALSE;
1159 break;
1160 default:
1161 return FALSE;
1162 }
252b5132 1163
a7519a3c
RH
1164 if (! _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex))
1165 return FALSE;
1166 newsect = hdr->bfd_section;
252b5132 1167
a7519a3c 1168 if (hdr->sh_type == SHT_ALPHA_DEBUG)
252b5132 1169 {
a7519a3c
RH
1170 if (! bfd_set_section_flags (abfd, newsect,
1171 (bfd_get_section_flags (abfd, newsect)
1172 | SEC_DEBUGGING)))
1173 return FALSE;
252b5132 1174 }
a7519a3c
RH
1175
1176 return TRUE;
252b5132
RH
1177}
1178
a7519a3c
RH
1179/* Convert Alpha specific section flags to bfd internal section flags. */
1180
b34976b6 1181static bfd_boolean
a7519a3c 1182elf64_alpha_section_flags (flagword *flags, const Elf_Internal_Shdr *hdr)
252b5132 1183{
a7519a3c
RH
1184 if (hdr->sh_flags & SHF_ALPHA_GPREL)
1185 *flags |= SEC_SMALL_DATA;
252b5132 1186
a7519a3c
RH
1187 return TRUE;
1188}
252b5132 1189
a7519a3c
RH
1190/* Set the correct type for an Alpha ELF section. We do this by the
1191 section name, which is a hack, but ought to work. */
9e756d64 1192
a7519a3c
RH
1193static bfd_boolean
1194elf64_alpha_fake_sections (bfd *abfd, Elf_Internal_Shdr *hdr, asection *sec)
1195{
1196 register const char *name;
1197
1198 name = bfd_get_section_name (abfd, sec);
1199
1200 if (strcmp (name, ".mdebug") == 0)
252b5132 1201 {
a7519a3c
RH
1202 hdr->sh_type = SHT_ALPHA_DEBUG;
1203 /* In a shared object on Irix 5.3, the .mdebug section has an
1204 entsize of 0. FIXME: Does this matter? */
1205 if ((abfd->flags & DYNAMIC) != 0 )
1206 hdr->sh_entsize = 0;
1207 else
1208 hdr->sh_entsize = 1;
252b5132 1209 }
a7519a3c
RH
1210 else if ((sec->flags & SEC_SMALL_DATA)
1211 || strcmp (name, ".sdata") == 0
1212 || strcmp (name, ".sbss") == 0
1213 || strcmp (name, ".lit4") == 0
1214 || strcmp (name, ".lit8") == 0)
1215 hdr->sh_flags |= SHF_ALPHA_GPREL;
252b5132 1216
a7519a3c
RH
1217 return TRUE;
1218}
252b5132 1219
a7519a3c
RH
1220/* Hook called by the linker routine which adds symbols from an object
1221 file. We use it to put .comm items in .sbss, and not .bss. */
1222
1223static bfd_boolean
1224elf64_alpha_add_symbol_hook (bfd *abfd, struct bfd_link_info *info,
1225 Elf_Internal_Sym *sym,
1226 const char **namep ATTRIBUTE_UNUSED,
1227 flagword *flagsp ATTRIBUTE_UNUSED,
1228 asection **secp, bfd_vma *valp)
1229{
1230 if (sym->st_shndx == SHN_COMMON
0e1862bb 1231 && !bfd_link_relocatable (info)
a7519a3c 1232 && sym->st_size <= elf_gp_size (abfd))
252b5132 1233 {
a7519a3c
RH
1234 /* Common symbols less than or equal to -G nn bytes are
1235 automatically put into .sbss. */
ffcb7aff 1236
a7519a3c 1237 asection *scomm = bfd_get_section_by_name (abfd, ".scommon");
252b5132 1238
a7519a3c 1239 if (scomm == NULL)
252b5132 1240 {
a7519a3c
RH
1241 scomm = bfd_make_section_with_flags (abfd, ".scommon",
1242 (SEC_ALLOC
1243 | SEC_IS_COMMON
1244 | SEC_LINKER_CREATED));
1245 if (scomm == NULL)
1246 return FALSE;
1247 }
ffcb7aff 1248
a7519a3c
RH
1249 *secp = scomm;
1250 *valp = sym->st_size;
1251 }
ffcb7aff 1252
a7519a3c
RH
1253 return TRUE;
1254}
252b5132 1255
a7519a3c 1256/* Create the .got section. */
252b5132 1257
a7519a3c
RH
1258static bfd_boolean
1259elf64_alpha_create_got_section (bfd *abfd,
1260 struct bfd_link_info *info ATTRIBUTE_UNUSED)
1261{
85d162e6 1262 flagword flags;
a7519a3c 1263 asection *s;
252b5132 1264
0ffa91dd
NC
1265 if (! is_alpha_elf (abfd))
1266 return FALSE;
1267
85d162e6
AM
1268 flags = (SEC_ALLOC | SEC_LOAD | SEC_HAS_CONTENTS | SEC_IN_MEMORY
1269 | SEC_LINKER_CREATED);
1270 s = bfd_make_section_anyway_with_flags (abfd, ".got", flags);
a7519a3c
RH
1271 if (s == NULL
1272 || !bfd_set_section_alignment (abfd, s, 3))
1273 return FALSE;
252b5132 1274
a7519a3c 1275 alpha_elf_tdata (abfd)->got = s;
252b5132 1276
85d162e6
AM
1277 /* Make sure the object's gotobj is set to itself so that we default
1278 to every object with its own .got. We'll merge .gots later once
1279 we've collected each object's info. */
1280 alpha_elf_tdata (abfd)->gotobj = abfd;
1281
a7519a3c
RH
1282 return TRUE;
1283}
252b5132 1284
a7519a3c 1285/* Create all the dynamic sections. */
252b5132 1286
a7519a3c
RH
1287static bfd_boolean
1288elf64_alpha_create_dynamic_sections (bfd *abfd, struct bfd_link_info *info)
1289{
1290 asection *s;
85d162e6 1291 flagword flags;
a7519a3c 1292 struct elf_link_hash_entry *h;
252b5132 1293
0ffa91dd
NC
1294 if (! is_alpha_elf (abfd))
1295 return FALSE;
1296
a7519a3c 1297 /* We need to create .plt, .rela.plt, .got, and .rela.got sections. */
252b5132 1298
85d162e6
AM
1299 flags = (SEC_ALLOC | SEC_LOAD | SEC_CODE | SEC_HAS_CONTENTS | SEC_IN_MEMORY
1300 | SEC_LINKER_CREATED
1301 | (elf64_alpha_use_secureplt ? SEC_READONLY : 0));
1302 s = bfd_make_section_anyway_with_flags (abfd, ".plt", flags);
ce558b89 1303 elf_hash_table (info)->splt = s;
6ec7057a 1304 if (s == NULL || ! bfd_set_section_alignment (abfd, s, 4))
a7519a3c 1305 return FALSE;
252b5132 1306
a7519a3c
RH
1307 /* Define the symbol _PROCEDURE_LINKAGE_TABLE_ at the start of the
1308 .plt section. */
7325306f
RS
1309 h = _bfd_elf_define_linkage_sym (abfd, info, s,
1310 "_PROCEDURE_LINKAGE_TABLE_");
1311 elf_hash_table (info)->hplt = h;
1312 if (h == NULL)
a7519a3c 1313 return FALSE;
d6ad34f6 1314
85d162e6
AM
1315 flags = (SEC_ALLOC | SEC_LOAD | SEC_HAS_CONTENTS | SEC_IN_MEMORY
1316 | SEC_LINKER_CREATED | SEC_READONLY);
1317 s = bfd_make_section_anyway_with_flags (abfd, ".rela.plt", flags);
ce558b89 1318 elf_hash_table (info)->srelplt = s;
6ec7057a 1319 if (s == NULL || ! bfd_set_section_alignment (abfd, s, 3))
a7519a3c 1320 return FALSE;
252b5132 1321
6ec7057a
RH
1322 if (elf64_alpha_use_secureplt)
1323 {
85d162e6
AM
1324 flags = SEC_ALLOC | SEC_LINKER_CREATED;
1325 s = bfd_make_section_anyway_with_flags (abfd, ".got.plt", flags);
ce558b89 1326 elf_hash_table (info)->sgotplt = s;
6ec7057a
RH
1327 if (s == NULL || ! bfd_set_section_alignment (abfd, s, 3))
1328 return FALSE;
1329 }
1330
a7519a3c
RH
1331 /* We may or may not have created a .got section for this object, but
1332 we definitely havn't done the rest of the work. */
1cd6895c 1333
85d162e6
AM
1334 if (alpha_elf_tdata(abfd)->gotobj == NULL)
1335 {
1336 if (!elf64_alpha_create_got_section (abfd, info))
1337 return FALSE;
1338 }
1cd6895c 1339
85d162e6
AM
1340 flags = (SEC_ALLOC | SEC_LOAD | SEC_HAS_CONTENTS | SEC_IN_MEMORY
1341 | SEC_LINKER_CREATED | SEC_READONLY);
1342 s = bfd_make_section_anyway_with_flags (abfd, ".rela.got", flags);
ce558b89 1343 elf_hash_table (info)->srelgot = s;
a7519a3c
RH
1344 if (s == NULL
1345 || !bfd_set_section_alignment (abfd, s, 3))
1346 return FALSE;
252b5132 1347
a7519a3c
RH
1348 /* Define the symbol _GLOBAL_OFFSET_TABLE_ at the start of the
1349 dynobj's .got section. We don't do this in the linker script
1350 because we don't want to define the symbol if we are not creating
1351 a global offset table. */
d98685ac
AM
1352 h = _bfd_elf_define_linkage_sym (abfd, info, alpha_elf_tdata(abfd)->got,
1353 "_GLOBAL_OFFSET_TABLE_");
a7519a3c 1354 elf_hash_table (info)->hgot = h;
d98685ac
AM
1355 if (h == NULL)
1356 return FALSE;
252b5132 1357
a7519a3c 1358 return TRUE;
252b5132 1359}
a7519a3c
RH
1360\f
1361/* Read ECOFF debugging information from a .mdebug section into a
1362 ecoff_debug_info structure. */
252b5132 1363
a7519a3c
RH
1364static bfd_boolean
1365elf64_alpha_read_ecoff_info (bfd *abfd, asection *section,
1366 struct ecoff_debug_info *debug)
252b5132 1367{
a7519a3c
RH
1368 HDRR *symhdr;
1369 const struct ecoff_debug_swap *swap;
1370 char *ext_hdr = NULL;
252b5132 1371
a7519a3c
RH
1372 swap = get_elf_backend_data (abfd)->elf_backend_ecoff_debug_swap;
1373 memset (debug, 0, sizeof (*debug));
252b5132 1374
a7519a3c
RH
1375 ext_hdr = (char *) bfd_malloc (swap->external_hdr_size);
1376 if (ext_hdr == NULL && swap->external_hdr_size != 0)
1377 goto error_return;
252b5132 1378
a7519a3c
RH
1379 if (! bfd_get_section_contents (abfd, section, ext_hdr, (file_ptr) 0,
1380 swap->external_hdr_size))
1381 goto error_return;
252b5132 1382
a7519a3c
RH
1383 symhdr = &debug->symbolic_header;
1384 (*swap->swap_hdr_in) (abfd, ext_hdr, symhdr);
252b5132 1385
a7519a3c
RH
1386 /* The symbolic header contains absolute file offsets and sizes to
1387 read. */
1388#define READ(ptr, offset, count, size, type) \
1389 if (symhdr->count == 0) \
1390 debug->ptr = NULL; \
1391 else \
1392 { \
1393 bfd_size_type amt = (bfd_size_type) size * symhdr->count; \
1394 debug->ptr = (type) bfd_malloc (amt); \
1395 if (debug->ptr == NULL) \
1396 goto error_return; \
1397 if (bfd_seek (abfd, (file_ptr) symhdr->offset, SEEK_SET) != 0 \
1398 || bfd_bread (debug->ptr, amt, abfd) != amt) \
1399 goto error_return; \
1400 }
fe8bc63d 1401
a7519a3c 1402 READ (line, cbLineOffset, cbLine, sizeof (unsigned char), unsigned char *);
2c3fc389
NC
1403 READ (external_dnr, cbDnOffset, idnMax, swap->external_dnr_size, void *);
1404 READ (external_pdr, cbPdOffset, ipdMax, swap->external_pdr_size, void *);
1405 READ (external_sym, cbSymOffset, isymMax, swap->external_sym_size, void *);
1406 READ (external_opt, cbOptOffset, ioptMax, swap->external_opt_size, void *);
a7519a3c
RH
1407 READ (external_aux, cbAuxOffset, iauxMax, sizeof (union aux_ext),
1408 union aux_ext *);
1409 READ (ss, cbSsOffset, issMax, sizeof (char), char *);
1410 READ (ssext, cbSsExtOffset, issExtMax, sizeof (char), char *);
2c3fc389
NC
1411 READ (external_fdr, cbFdOffset, ifdMax, swap->external_fdr_size, void *);
1412 READ (external_rfd, cbRfdOffset, crfd, swap->external_rfd_size, void *);
1413 READ (external_ext, cbExtOffset, iextMax, swap->external_ext_size, void *);
a7519a3c 1414#undef READ
252b5132 1415
a7519a3c 1416 debug->fdr = NULL;
252b5132 1417
a7519a3c 1418 return TRUE;
252b5132 1419
a7519a3c
RH
1420 error_return:
1421 if (ext_hdr != NULL)
1422 free (ext_hdr);
1423 if (debug->line != NULL)
1424 free (debug->line);
1425 if (debug->external_dnr != NULL)
1426 free (debug->external_dnr);
1427 if (debug->external_pdr != NULL)
1428 free (debug->external_pdr);
1429 if (debug->external_sym != NULL)
1430 free (debug->external_sym);
1431 if (debug->external_opt != NULL)
1432 free (debug->external_opt);
1433 if (debug->external_aux != NULL)
1434 free (debug->external_aux);
1435 if (debug->ss != NULL)
1436 free (debug->ss);
1437 if (debug->ssext != NULL)
1438 free (debug->ssext);
1439 if (debug->external_fdr != NULL)
1440 free (debug->external_fdr);
1441 if (debug->external_rfd != NULL)
1442 free (debug->external_rfd);
1443 if (debug->external_ext != NULL)
1444 free (debug->external_ext);
1445 return FALSE;
252b5132
RH
1446}
1447
a7519a3c
RH
1448/* Alpha ELF local labels start with '$'. */
1449
b34976b6 1450static bfd_boolean
a7519a3c 1451elf64_alpha_is_local_label_name (bfd *abfd ATTRIBUTE_UNUSED, const char *name)
252b5132 1452{
a7519a3c
RH
1453 return name[0] == '$';
1454}
9e756d64 1455
a7519a3c 1456static bfd_boolean
fb167eb2
AM
1457elf64_alpha_find_nearest_line (bfd *abfd, asymbol **symbols,
1458 asection *section, bfd_vma offset,
1459 const char **filename_ptr,
a7519a3c 1460 const char **functionname_ptr,
fb167eb2
AM
1461 unsigned int *line_ptr,
1462 unsigned int *discriminator_ptr)
a7519a3c
RH
1463{
1464 asection *msec;
252b5132 1465
fb167eb2 1466 if (_bfd_dwarf2_find_nearest_line (abfd, symbols, NULL, section, offset,
a7519a3c 1467 filename_ptr, functionname_ptr,
fb167eb2
AM
1468 line_ptr, discriminator_ptr,
1469 dwarf_debug_sections, 0,
a7519a3c 1470 &elf_tdata (abfd)->dwarf2_find_line_info))
b34976b6 1471 return TRUE;
9e756d64 1472
a7519a3c
RH
1473 msec = bfd_get_section_by_name (abfd, ".mdebug");
1474 if (msec != NULL)
1bbc9cec 1475 {
a7519a3c 1476 flagword origflags;
698600e4 1477 struct alpha_elf_find_line *fi;
a7519a3c
RH
1478 const struct ecoff_debug_swap * const swap =
1479 get_elf_backend_data (abfd)->elf_backend_ecoff_debug_swap;
252b5132 1480
a7519a3c
RH
1481 /* If we are called during a link, alpha_elf_final_link may have
1482 cleared the SEC_HAS_CONTENTS field. We force it back on here
1483 if appropriate (which it normally will be). */
1484 origflags = msec->flags;
1485 if (elf_section_data (msec)->this_hdr.sh_type != SHT_NOBITS)
1486 msec->flags |= SEC_HAS_CONTENTS;
9e756d64 1487
698600e4 1488 fi = alpha_elf_tdata (abfd)->find_line_info;
a7519a3c
RH
1489 if (fi == NULL)
1490 {
1491 bfd_size_type external_fdr_size;
1492 char *fraw_src;
1493 char *fraw_end;
1494 struct fdr *fdr_ptr;
698600e4 1495 bfd_size_type amt = sizeof (struct alpha_elf_find_line);
9e756d64 1496
698600e4 1497 fi = (struct alpha_elf_find_line *) bfd_zalloc (abfd, amt);
a7519a3c
RH
1498 if (fi == NULL)
1499 {
1500 msec->flags = origflags;
1501 return FALSE;
1502 }
9e756d64 1503
a7519a3c
RH
1504 if (!elf64_alpha_read_ecoff_info (abfd, msec, &fi->d))
1505 {
1506 msec->flags = origflags;
1507 return FALSE;
1508 }
9e756d64 1509
a7519a3c
RH
1510 /* Swap in the FDR information. */
1511 amt = fi->d.symbolic_header.ifdMax * sizeof (struct fdr);
1512 fi->d.fdr = (struct fdr *) bfd_alloc (abfd, amt);
1513 if (fi->d.fdr == NULL)
1514 {
1515 msec->flags = origflags;
1516 return FALSE;
1517 }
1518 external_fdr_size = swap->external_fdr_size;
1519 fdr_ptr = fi->d.fdr;
1520 fraw_src = (char *) fi->d.external_fdr;
1521 fraw_end = (fraw_src
1522 + fi->d.symbolic_header.ifdMax * external_fdr_size);
1523 for (; fraw_src < fraw_end; fraw_src += external_fdr_size, fdr_ptr++)
2c3fc389 1524 (*swap->swap_fdr_in) (abfd, fraw_src, fdr_ptr);
9e756d64 1525
698600e4 1526 alpha_elf_tdata (abfd)->find_line_info = fi;
9e756d64 1527
a7519a3c
RH
1528 /* Note that we don't bother to ever free this information.
1529 find_nearest_line is either called all the time, as in
1530 objdump -l, so the information should be saved, or it is
1531 rarely called, as in ld error messages, so the memory
1532 wasted is unimportant. Still, it would probably be a
1533 good idea for free_cached_info to throw it away. */
1534 }
9e756d64 1535
a7519a3c
RH
1536 if (_bfd_ecoff_locate_line (abfd, section, offset, &fi->d, swap,
1537 &fi->i, filename_ptr, functionname_ptr,
1538 line_ptr))
1539 {
1540 msec->flags = origflags;
1541 return TRUE;
1542 }
9e756d64 1543
a7519a3c 1544 msec->flags = origflags;
9e756d64 1545 }
9e756d64 1546
a7519a3c 1547 /* Fall back on the generic ELF find_nearest_line routine. */
9e756d64 1548
fb167eb2 1549 return _bfd_elf_find_nearest_line (abfd, symbols, section, offset,
a7519a3c 1550 filename_ptr, functionname_ptr,
fb167eb2 1551 line_ptr, discriminator_ptr);
9e756d64 1552}
a7519a3c
RH
1553\f
1554/* Structure used to pass information to alpha_elf_output_extsym. */
9e756d64 1555
a7519a3c 1556struct extsym_info
9e756d64 1557{
a7519a3c
RH
1558 bfd *abfd;
1559 struct bfd_link_info *info;
1560 struct ecoff_debug_info *debug;
1561 const struct ecoff_debug_swap *swap;
1562 bfd_boolean failed;
1563};
9e756d64 1564
a7519a3c 1565static bfd_boolean
2c3fc389 1566elf64_alpha_output_extsym (struct alpha_elf_link_hash_entry *h, void * data)
a7519a3c
RH
1567{
1568 struct extsym_info *einfo = (struct extsym_info *) data;
1569 bfd_boolean strip;
1570 asection *sec, *output_section;
9e756d64 1571
a7519a3c
RH
1572 if (h->root.indx == -2)
1573 strip = FALSE;
1574 else if ((h->root.def_dynamic
1575 || h->root.ref_dynamic
1576 || h->root.root.type == bfd_link_hash_new)
1577 && !h->root.def_regular
1578 && !h->root.ref_regular)
1579 strip = TRUE;
1580 else if (einfo->info->strip == strip_all
1581 || (einfo->info->strip == strip_some
1582 && bfd_hash_lookup (einfo->info->keep_hash,
1583 h->root.root.root.string,
1584 FALSE, FALSE) == NULL))
1585 strip = TRUE;
1586 else
1587 strip = FALSE;
9e756d64 1588
a7519a3c 1589 if (strip)
b34976b6 1590 return TRUE;
9e756d64 1591
a7519a3c 1592 if (h->esym.ifd == -2)
9e756d64 1593 {
a7519a3c
RH
1594 h->esym.jmptbl = 0;
1595 h->esym.cobol_main = 0;
1596 h->esym.weakext = 0;
1597 h->esym.reserved = 0;
1598 h->esym.ifd = ifdNil;
1599 h->esym.asym.value = 0;
1600 h->esym.asym.st = stGlobal;
9e756d64 1601
a7519a3c
RH
1602 if (h->root.root.type != bfd_link_hash_defined
1603 && h->root.root.type != bfd_link_hash_defweak)
1604 h->esym.asym.sc = scAbs;
1605 else
1606 {
1607 const char *name;
9e756d64 1608
a7519a3c
RH
1609 sec = h->root.root.u.def.section;
1610 output_section = sec->output_section;
9e756d64 1611
a7519a3c
RH
1612 /* When making a shared library and symbol h is the one from
1613 the another shared library, OUTPUT_SECTION may be null. */
1614 if (output_section == NULL)
1615 h->esym.asym.sc = scUndefined;
1616 else
1617 {
1618 name = bfd_section_name (output_section->owner, output_section);
9e756d64 1619
a7519a3c
RH
1620 if (strcmp (name, ".text") == 0)
1621 h->esym.asym.sc = scText;
1622 else if (strcmp (name, ".data") == 0)
1623 h->esym.asym.sc = scData;
1624 else if (strcmp (name, ".sdata") == 0)
1625 h->esym.asym.sc = scSData;
1626 else if (strcmp (name, ".rodata") == 0
1627 || strcmp (name, ".rdata") == 0)
1628 h->esym.asym.sc = scRData;
1629 else if (strcmp (name, ".bss") == 0)
1630 h->esym.asym.sc = scBss;
1631 else if (strcmp (name, ".sbss") == 0)
1632 h->esym.asym.sc = scSBss;
1633 else if (strcmp (name, ".init") == 0)
1634 h->esym.asym.sc = scInit;
1635 else if (strcmp (name, ".fini") == 0)
1636 h->esym.asym.sc = scFini;
1637 else
1638 h->esym.asym.sc = scAbs;
1639 }
1640 }
9e756d64 1641
a7519a3c
RH
1642 h->esym.asym.reserved = 0;
1643 h->esym.asym.index = indexNil;
1644 }
9e756d64 1645
a7519a3c
RH
1646 if (h->root.root.type == bfd_link_hash_common)
1647 h->esym.asym.value = h->root.root.u.c.size;
1648 else if (h->root.root.type == bfd_link_hash_defined
1649 || h->root.root.type == bfd_link_hash_defweak)
1650 {
1651 if (h->esym.asym.sc == scCommon)
1652 h->esym.asym.sc = scBss;
1653 else if (h->esym.asym.sc == scSCommon)
1654 h->esym.asym.sc = scSBss;
9e756d64 1655
a7519a3c
RH
1656 sec = h->root.root.u.def.section;
1657 output_section = sec->output_section;
1658 if (output_section != NULL)
1659 h->esym.asym.value = (h->root.root.u.def.value
1660 + sec->output_offset
1661 + output_section->vma);
1662 else
1663 h->esym.asym.value = 0;
1664 }
9e756d64 1665
a7519a3c
RH
1666 if (! bfd_ecoff_debug_one_external (einfo->abfd, einfo->debug, einfo->swap,
1667 h->root.root.root.string,
1668 &h->esym))
1669 {
1670 einfo->failed = TRUE;
1671 return FALSE;
9e756d64
RH
1672 }
1673
a7519a3c
RH
1674 return TRUE;
1675}
1676\f
1677/* Search for and possibly create a got entry. */
9e756d64 1678
a7519a3c
RH
1679static struct alpha_elf_got_entry *
1680get_got_entry (bfd *abfd, struct alpha_elf_link_hash_entry *h,
1681 unsigned long r_type, unsigned long r_symndx,
1682 bfd_vma r_addend)
1683{
1684 struct alpha_elf_got_entry *gotent;
1685 struct alpha_elf_got_entry **slot;
9e756d64 1686
a7519a3c
RH
1687 if (h)
1688 slot = &h->got_entries;
1689 else
1690 {
1691 /* This is a local .got entry -- record for merge. */
9e756d64 1692
a7519a3c 1693 struct alpha_elf_got_entry **local_got_entries;
9e756d64 1694
a7519a3c
RH
1695 local_got_entries = alpha_elf_tdata(abfd)->local_got_entries;
1696 if (!local_got_entries)
1697 {
1698 bfd_size_type size;
1699 Elf_Internal_Shdr *symtab_hdr;
9e756d64 1700
a7519a3c
RH
1701 symtab_hdr = &elf_tdata(abfd)->symtab_hdr;
1702 size = symtab_hdr->sh_info;
1703 size *= sizeof (struct alpha_elf_got_entry *);
9e756d64 1704
a7519a3c
RH
1705 local_got_entries
1706 = (struct alpha_elf_got_entry **) bfd_zalloc (abfd, size);
1707 if (!local_got_entries)
1708 return NULL;
1709
1710 alpha_elf_tdata (abfd)->local_got_entries = local_got_entries;
1711 }
1712
1713 slot = &local_got_entries[r_symndx];
9e756d64
RH
1714 }
1715
a7519a3c
RH
1716 for (gotent = *slot; gotent ; gotent = gotent->next)
1717 if (gotent->gotobj == abfd
1718 && gotent->reloc_type == r_type
1719 && gotent->addend == r_addend)
1720 break;
1721
1722 if (!gotent)
9e756d64 1723 {
a7519a3c
RH
1724 int entry_size;
1725 bfd_size_type amt;
9e756d64 1726
a7519a3c
RH
1727 amt = sizeof (struct alpha_elf_got_entry);
1728 gotent = (struct alpha_elf_got_entry *) bfd_alloc (abfd, amt);
1729 if (!gotent)
1730 return NULL;
9e756d64 1731
a7519a3c
RH
1732 gotent->gotobj = abfd;
1733 gotent->addend = r_addend;
1734 gotent->got_offset = -1;
6ec7057a 1735 gotent->plt_offset = -1;
a7519a3c
RH
1736 gotent->use_count = 1;
1737 gotent->reloc_type = r_type;
1738 gotent->reloc_done = 0;
1739 gotent->reloc_xlated = 0;
9e756d64 1740
a7519a3c
RH
1741 gotent->next = *slot;
1742 *slot = gotent;
9e756d64 1743
a7519a3c
RH
1744 entry_size = alpha_got_entry_size (r_type);
1745 alpha_elf_tdata (abfd)->total_got_size += entry_size;
1746 if (!h)
1747 alpha_elf_tdata(abfd)->local_got_size += entry_size;
9e756d64 1748 }
a7519a3c
RH
1749 else
1750 gotent->use_count += 1;
9e756d64 1751
a7519a3c 1752 return gotent;
9e756d64
RH
1753}
1754
6ec7057a
RH
1755static bfd_boolean
1756elf64_alpha_want_plt (struct alpha_elf_link_hash_entry *ah)
1757{
1758 return ((ah->root.type == STT_FUNC
1759 || ah->root.root.type == bfd_link_hash_undefweak
1760 || ah->root.root.type == bfd_link_hash_undefined)
8288a39e
RH
1761 && (ah->flags & ALPHA_ELF_LINK_HASH_LU_PLT) != 0
1762 && (ah->flags & ~ALPHA_ELF_LINK_HASH_LU_PLT) == 0);
6ec7057a
RH
1763}
1764
6fc5bb57
AM
1765/* Whether to sort relocs output by ld -r or ld --emit-relocs, by r_offset.
1766 Don't do so for code sections. We want to keep ordering of LITERAL/LITUSE
1767 as is. On the other hand, elf-eh-frame.c processing requires .eh_frame
1768 relocs to be sorted. */
1769
1770static bfd_boolean
1771elf64_alpha_sort_relocs_p (asection *sec)
1772{
1773 return (sec->flags & SEC_CODE) == 0;
1774}
1775
1776
a7519a3c
RH
1777/* Handle dynamic relocations when doing an Alpha ELF link. */
1778
b34976b6 1779static bfd_boolean
a7519a3c
RH
1780elf64_alpha_check_relocs (bfd *abfd, struct bfd_link_info *info,
1781 asection *sec, const Elf_Internal_Rela *relocs)
252b5132 1782{
a7519a3c
RH
1783 bfd *dynobj;
1784 asection *sreloc;
252b5132 1785 Elf_Internal_Shdr *symtab_hdr;
a7519a3c
RH
1786 struct alpha_elf_link_hash_entry **sym_hashes;
1787 const Elf_Internal_Rela *rel, *relend;
a7519a3c 1788 bfd_size_type amt;
252b5132 1789
0e1862bb 1790 if (bfd_link_relocatable (info))
a7519a3c 1791 return TRUE;
252b5132 1792
a7519a3c
RH
1793 /* Don't do anything special with non-loaded, non-alloced sections.
1794 In particular, any relocs in such sections should not affect GOT
1795 and PLT reference counting (ie. we don't allow them to create GOT
1796 or PLT entries), there's no possibility or desire to optimize TLS
1797 relocs, and there's not much point in propagating relocs to shared
1798 libs that the dynamic linker won't relocate. */
1799 if ((sec->flags & SEC_ALLOC) == 0)
b34976b6 1800 return TRUE;
252b5132 1801
0ffa91dd
NC
1802 BFD_ASSERT (is_alpha_elf (abfd));
1803
1804 dynobj = elf_hash_table (info)->dynobj;
a7519a3c 1805 if (dynobj == NULL)
0ffa91dd 1806 elf_hash_table (info)->dynobj = dynobj = abfd;
252b5132 1807
a7519a3c 1808 sreloc = NULL;
0ffa91dd
NC
1809 symtab_hdr = &elf_symtab_hdr (abfd);
1810 sym_hashes = alpha_elf_sym_hashes (abfd);
a7519a3c
RH
1811
1812 relend = relocs + sec->reloc_count;
1813 for (rel = relocs; rel < relend; ++rel)
1814 {
1815 enum {
1816 NEED_GOT = 1,
1817 NEED_GOT_ENTRY = 2,
1818 NEED_DYNREL = 4
1819 };
1820
1821 unsigned long r_symndx, r_type;
1822 struct alpha_elf_link_hash_entry *h;
1823 unsigned int gotent_flags;
1824 bfd_boolean maybe_dynamic;
1825 unsigned int need;
1826 bfd_vma addend;
1827
1828 r_symndx = ELF64_R_SYM (rel->r_info);
1829 if (r_symndx < symtab_hdr->sh_info)
1830 h = NULL;
1831 else
1832 {
1833 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
252b5132 1834
a7519a3c
RH
1835 while (h->root.root.type == bfd_link_hash_indirect
1836 || h->root.root.type == bfd_link_hash_warning)
1837 h = (struct alpha_elf_link_hash_entry *)h->root.root.u.i.link;
252b5132 1838
81fbe831
AM
1839 /* PR15323, ref flags aren't set for references in the same
1840 object. */
a7519a3c
RH
1841 h->root.ref_regular = 1;
1842 }
252b5132 1843
a7519a3c
RH
1844 /* We can only get preliminary data on whether a symbol is
1845 locally or externally defined, as not all of the input files
1846 have yet been processed. Do something with what we know, as
1847 this may help reduce memory usage and processing time later. */
1848 maybe_dynamic = FALSE;
0e1862bb 1849 if (h && ((bfd_link_pic (info)
a7519a3c
RH
1850 && (!info->symbolic
1851 || info->unresolved_syms_in_shared_libs == RM_IGNORE))
1852 || !h->root.def_regular
1853 || h->root.root.type == bfd_link_hash_defweak))
1854 maybe_dynamic = TRUE;
252b5132 1855
a7519a3c
RH
1856 need = 0;
1857 gotent_flags = 0;
1858 r_type = ELF64_R_TYPE (rel->r_info);
1859 addend = rel->r_addend;
9e756d64 1860
9e756d64
RH
1861 switch (r_type)
1862 {
1863 case R_ALPHA_LITERAL:
a7519a3c
RH
1864 need = NEED_GOT | NEED_GOT_ENTRY;
1865
1866 /* Remember how this literal is used from its LITUSEs.
1867 This will be important when it comes to decide if we can
1868 create a .plt entry for a function symbol. */
1869 while (++rel < relend && ELF64_R_TYPE (rel->r_info) == R_ALPHA_LITUSE)
8288a39e 1870 if (rel->r_addend >= 1 && rel->r_addend <= 6)
a7519a3c
RH
1871 gotent_flags |= 1 << rel->r_addend;
1872 --rel;
1873
1874 /* No LITUSEs -- presumably the address is used somehow. */
1875 if (gotent_flags == 0)
1876 gotent_flags = ALPHA_ELF_LINK_HASH_LU_ADDR;
1877 break;
1878
1879 case R_ALPHA_GPDISP:
1880 case R_ALPHA_GPREL16:
1881 case R_ALPHA_GPREL32:
9e756d64
RH
1882 case R_ALPHA_GPRELHIGH:
1883 case R_ALPHA_GPRELLOW:
a7519a3c
RH
1884 case R_ALPHA_BRSGP:
1885 need = NEED_GOT;
1886 break;
1887
1888 case R_ALPHA_REFLONG:
1889 case R_ALPHA_REFQUAD:
0e1862bb 1890 if (bfd_link_pic (info) || maybe_dynamic)
a7519a3c 1891 need = NEED_DYNREL;
cc03ec80
RH
1892 break;
1893
9e756d64 1894 case R_ALPHA_TLSLDM:
cc03ec80 1895 /* The symbol for a TLSLDM reloc is ignored. Collapse the
cf35638d
TS
1896 reloc to the STN_UNDEF (0) symbol so that they all match. */
1897 r_symndx = STN_UNDEF;
a7519a3c
RH
1898 h = 0;
1899 maybe_dynamic = FALSE;
1900 /* FALLTHRU */
1901
1902 case R_ALPHA_TLSGD:
1903 case R_ALPHA_GOTDTPREL:
1904 need = NEED_GOT | NEED_GOT_ENTRY;
9e756d64 1905 break;
cc03ec80 1906
a7519a3c
RH
1907 case R_ALPHA_GOTTPREL:
1908 need = NEED_GOT | NEED_GOT_ENTRY;
1909 gotent_flags = ALPHA_ELF_LINK_HASH_TLS_IE;
0e1862bb 1910 if (bfd_link_pic (info))
a7519a3c
RH
1911 info->flags |= DF_STATIC_TLS;
1912 break;
1913
1914 case R_ALPHA_TPREL64:
3cbc1e5e 1915 if (bfd_link_dll (info))
e366eeae
RH
1916 {
1917 info->flags |= DF_STATIC_TLS;
1918 need = NEED_DYNREL;
1919 }
1920 else if (maybe_dynamic)
a7519a3c 1921 need = NEED_DYNREL;
a7519a3c 1922 break;
252b5132
RH
1923 }
1924
a7519a3c 1925 if (need & NEED_GOT)
252b5132 1926 {
85d162e6 1927 if (alpha_elf_tdata(abfd)->gotobj == NULL)
6cdc0ccc 1928 {
a7519a3c
RH
1929 if (!elf64_alpha_create_got_section (abfd, info))
1930 return FALSE;
c328dc3f 1931 }
252b5132 1932 }
252b5132 1933
a7519a3c
RH
1934 if (need & NEED_GOT_ENTRY)
1935 {
1936 struct alpha_elf_got_entry *gotent;
252b5132 1937
a7519a3c
RH
1938 gotent = get_got_entry (abfd, h, r_type, r_symndx, addend);
1939 if (!gotent)
1940 return FALSE;
4a67a098 1941
a7519a3c 1942 if (gotent_flags)
cc03ec80 1943 {
a7519a3c
RH
1944 gotent->flags |= gotent_flags;
1945 if (h)
1946 {
1947 gotent_flags |= h->flags;
1948 h->flags = gotent_flags;
4a67a098 1949
a7519a3c 1950 /* Make a guess as to whether a .plt entry is needed. */
6ec7057a
RH
1951 /* ??? It appears that we won't make it into
1952 adjust_dynamic_symbol for symbols that remain
1953 totally undefined. Copying this check here means
1954 we can create a plt entry for them too. */
1955 h->root.needs_plt
1956 = (maybe_dynamic && elf64_alpha_want_plt (h));
1957 }
a7519a3c 1958 }
252b5132
RH
1959 }
1960
a7519a3c 1961 if (need & NEED_DYNREL)
9e756d64 1962 {
a7519a3c
RH
1963 /* We need to create the section here now whether we eventually
1964 use it or not so that it gets mapped to an output section by
83bac4b0 1965 the linker. If not used, we'll kill it in size_dynamic_sections. */
a7519a3c 1966 if (sreloc == NULL)
9e756d64 1967 {
83bac4b0
NC
1968 sreloc = _bfd_elf_make_dynamic_reloc_section
1969 (sec, dynobj, 3, abfd, /*rela?*/ TRUE);
1970
a7519a3c 1971 if (sreloc == NULL)
83bac4b0 1972 return FALSE;
9e756d64 1973 }
252b5132 1974
a7519a3c
RH
1975 if (h)
1976 {
1977 /* Since we havn't seen all of the input symbols yet, we
1978 don't know whether we'll actually need a dynamic relocation
1979 entry for this reloc. So make a record of it. Once we
1980 find out if this thing needs dynamic relocation we'll
1981 expand the relocation sections by the appropriate amount. */
9e756d64 1982
a7519a3c 1983 struct alpha_elf_reloc_entry *rent;
9e756d64 1984
a7519a3c
RH
1985 for (rent = h->reloc_entries; rent; rent = rent->next)
1986 if (rent->rtype == r_type && rent->srel == sreloc)
1987 break;
252b5132 1988
a7519a3c
RH
1989 if (!rent)
1990 {
1991 amt = sizeof (struct alpha_elf_reloc_entry);
1992 rent = (struct alpha_elf_reloc_entry *) bfd_alloc (abfd, amt);
1993 if (!rent)
1994 return FALSE;
252b5132 1995
a7519a3c
RH
1996 rent->srel = sreloc;
1997 rent->rtype = r_type;
1998 rent->count = 1;
1999 rent->reltext = (sec->flags & SEC_READONLY) != 0;
252b5132 2000
a7519a3c
RH
2001 rent->next = h->reloc_entries;
2002 h->reloc_entries = rent;
2003 }
2004 else
2005 rent->count++;
2006 }
0e1862bb 2007 else if (bfd_link_pic (info))
a7519a3c
RH
2008 {
2009 /* If this is a shared library, and the section is to be
2010 loaded into memory, we need a RELATIVE reloc. */
2011 sreloc->size += sizeof (Elf64_External_Rela);
2012 if (sec->flags & SEC_READONLY)
2013 info->flags |= DF_TEXTREL;
2014 }
252b5132
RH
2015 }
2016 }
2017
b34976b6 2018 return TRUE;
252b5132 2019}
252b5132 2020
e117360e
RH
2021/* Return the section that should be marked against GC for a given
2022 relocation. */
2023
2024static asection *
2025elf64_alpha_gc_mark_hook (asection *sec, struct bfd_link_info *info,
2026 Elf_Internal_Rela *rel,
2027 struct elf_link_hash_entry *h, Elf_Internal_Sym *sym)
2028{
2029 /* These relocations don't really reference a symbol. Instead we store
2030 extra data in their addend slot. Ignore the symbol. */
2031 switch (ELF64_R_TYPE (rel->r_info))
2032 {
2033 case R_ALPHA_LITUSE:
2034 case R_ALPHA_GPDISP:
2035 case R_ALPHA_HINT:
2036 return NULL;
2037 }
2038
2039 return _bfd_elf_gc_mark_hook (sec, info, rel, h, sym);
2040}
2041
a7519a3c
RH
2042/* Adjust a symbol defined by a dynamic object and referenced by a
2043 regular object. The current definition is in some section of the
2044 dynamic object, but we're not including those sections. We have to
2045 change the definition to something the rest of the link can
2046 understand. */
252b5132 2047
b34976b6 2048static bfd_boolean
a7519a3c
RH
2049elf64_alpha_adjust_dynamic_symbol (struct bfd_link_info *info,
2050 struct elf_link_hash_entry *h)
252b5132 2051{
a7519a3c
RH
2052 bfd *dynobj;
2053 asection *s;
2054 struct alpha_elf_link_hash_entry *ah;
252b5132 2055
a7519a3c
RH
2056 dynobj = elf_hash_table(info)->dynobj;
2057 ah = (struct alpha_elf_link_hash_entry *)h;
252b5132 2058
a7519a3c 2059 /* Now that we've seen all of the input symbols, finalize our decision
6ec7057a
RH
2060 about whether this symbol should get a .plt entry. Irritatingly, it
2061 is common for folk to leave undefined symbols in shared libraries,
2062 and they still expect lazy binding; accept undefined symbols in lieu
2063 of STT_FUNC. */
2064 if (alpha_elf_dynamic_symbol_p (h, info) && elf64_alpha_want_plt (ah))
252b5132 2065 {
6ec7057a 2066 h->needs_plt = TRUE;
252b5132 2067
ce558b89 2068 s = elf_hash_table(info)->splt;
a7519a3c
RH
2069 if (!s && !elf64_alpha_create_dynamic_sections (dynobj, info))
2070 return FALSE;
204692d7 2071
6ec7057a
RH
2072 /* We need one plt entry per got subsection. Delay allocation of
2073 the actual plt entries until size_plt_section, called from
2074 size_dynamic_sections or during relaxation. */
252b5132 2075
a7519a3c
RH
2076 return TRUE;
2077 }
2078 else
6ec7057a 2079 h->needs_plt = FALSE;
252b5132 2080
a7519a3c
RH
2081 /* If this is a weak symbol, and there is a real definition, the
2082 processor independent code will have arranged for us to see the
2083 real definition first, and we can just use the same value. */
60d67dc8 2084 if (h->is_weakalias)
252b5132 2085 {
60d67dc8
AM
2086 struct elf_link_hash_entry *def = weakdef (h);
2087 BFD_ASSERT (def->root.type == bfd_link_hash_defined);
2088 h->root.u.def.section = def->root.u.def.section;
2089 h->root.u.def.value = def->root.u.def.value;
a7519a3c 2090 return TRUE;
252b5132 2091 }
a7519a3c
RH
2092
2093 /* This is a reference to a symbol defined by a dynamic object which
2094 is not a function. The Alpha, since it uses .got entries for all
2095 symbols even in regular objects, does not need the hackery of a
2096 .dynbss section and COPY dynamic relocations. */
252b5132 2097
b34976b6 2098 return TRUE;
252b5132
RH
2099}
2100
747ffa7b
AM
2101/* Record STO_ALPHA_NOPV and STO_ALPHA_STD_GPLOAD. */
2102
2103static void
2104elf64_alpha_merge_symbol_attribute (struct elf_link_hash_entry *h,
2105 const Elf_Internal_Sym *isym,
2106 bfd_boolean definition,
2107 bfd_boolean dynamic)
2108{
2109 if (!dynamic && definition)
2110 h->other = ((h->other & ELF_ST_VISIBILITY (-1))
2111 | (isym->st_other & ~ELF_ST_VISIBILITY (-1)));
2112}
2113
a7519a3c
RH
2114/* Symbol versioning can create new symbols, and make our old symbols
2115 indirect to the new ones. Consolidate the got and reloc information
2116 in these situations. */
252b5132 2117
48f4b4f5
RH
2118static void
2119elf64_alpha_copy_indirect_symbol (struct bfd_link_info *info,
2120 struct elf_link_hash_entry *dir,
2121 struct elf_link_hash_entry *ind)
252b5132 2122{
48f4b4f5
RH
2123 struct alpha_elf_link_hash_entry *hi
2124 = (struct alpha_elf_link_hash_entry *) ind;
2125 struct alpha_elf_link_hash_entry *hs
2126 = (struct alpha_elf_link_hash_entry *) dir;
252b5132 2127
48f4b4f5
RH
2128 /* Do the merging in the superclass. */
2129 _bfd_elf_link_hash_copy_indirect(info, dir, ind);
252b5132 2130
a7519a3c 2131 /* Merge the flags. Whee. */
a7519a3c
RH
2132 hs->flags |= hi->flags;
2133
48f4b4f5
RH
2134 /* ??? It's unclear to me what's really supposed to happen when
2135 "merging" defweak and defined symbols, given that we don't
2136 actually throw away the defweak. This more-or-less copies
2137 the logic related to got and plt entries in the superclass. */
2138 if (ind->root.type != bfd_link_hash_indirect)
2139 return;
2140
a7519a3c
RH
2141 /* Merge the .got entries. Cannibalize the old symbol's list in
2142 doing so, since we don't need it anymore. */
2143
2144 if (hs->got_entries == NULL)
2145 hs->got_entries = hi->got_entries;
2146 else
2147 {
2148 struct alpha_elf_got_entry *gi, *gs, *gin, *gsh;
2149
2150 gsh = hs->got_entries;
2151 for (gi = hi->got_entries; gi ; gi = gin)
252b5132 2152 {
a7519a3c
RH
2153 gin = gi->next;
2154 for (gs = gsh; gs ; gs = gs->next)
2155 if (gi->gotobj == gs->gotobj
2156 && gi->reloc_type == gs->reloc_type
2157 && gi->addend == gs->addend)
2158 {
68994ca2 2159 gs->use_count += gi->use_count;
a7519a3c
RH
2160 goto got_found;
2161 }
2162 gi->next = hs->got_entries;
2163 hs->got_entries = gi;
2164 got_found:;
252b5132 2165 }
a7519a3c
RH
2166 }
2167 hi->got_entries = NULL;
252b5132 2168
a7519a3c
RH
2169 /* And similar for the reloc entries. */
2170
2171 if (hs->reloc_entries == NULL)
2172 hs->reloc_entries = hi->reloc_entries;
2173 else
2174 {
2175 struct alpha_elf_reloc_entry *ri, *rs, *rin, *rsh;
2176
2177 rsh = hs->reloc_entries;
2178 for (ri = hi->reloc_entries; ri ; ri = rin)
2179 {
2180 rin = ri->next;
2181 for (rs = rsh; rs ; rs = rs->next)
2182 if (ri->rtype == rs->rtype && ri->srel == rs->srel)
2183 {
2184 rs->count += ri->count;
2185 goto found_reloc;
2186 }
2187 ri->next = hs->reloc_entries;
2188 hs->reloc_entries = ri;
2189 found_reloc:;
2190 }
252b5132 2191 }
a7519a3c 2192 hi->reloc_entries = NULL;
252b5132
RH
2193}
2194
a7519a3c 2195/* Is it possible to merge two object file's .got tables? */
252b5132 2196
b34976b6 2197static bfd_boolean
a7519a3c 2198elf64_alpha_can_merge_gots (bfd *a, bfd *b)
252b5132 2199{
a7519a3c
RH
2200 int total = alpha_elf_tdata (a)->total_got_size;
2201 bfd *bsub;
252b5132 2202
a7519a3c
RH
2203 /* Trivial quick fallout test. */
2204 if (total + alpha_elf_tdata (b)->total_got_size <= MAX_GOT_SIZE)
2205 return TRUE;
252b5132 2206
a7519a3c
RH
2207 /* By their nature, local .got entries cannot be merged. */
2208 if ((total += alpha_elf_tdata (b)->local_got_size) > MAX_GOT_SIZE)
b34976b6 2209 return FALSE;
252b5132 2210
a7519a3c
RH
2211 /* Failing the common trivial comparison, we must effectively
2212 perform the merge. Not actually performing the merge means that
2213 we don't have to store undo information in case we fail. */
2214 for (bsub = b; bsub ; bsub = alpha_elf_tdata (bsub)->in_got_link_next)
2215 {
2216 struct alpha_elf_link_hash_entry **hashes = alpha_elf_sym_hashes (bsub);
2217 Elf_Internal_Shdr *symtab_hdr = &elf_tdata (bsub)->symtab_hdr;
2218 int i, n;
2219
2220 n = NUM_SHDR_ENTRIES (symtab_hdr) - symtab_hdr->sh_info;
2221 for (i = 0; i < n; ++i)
2222 {
2223 struct alpha_elf_got_entry *ae, *be;
2224 struct alpha_elf_link_hash_entry *h;
2225
2226 h = hashes[i];
2227 while (h->root.root.type == bfd_link_hash_indirect
2228 || h->root.root.type == bfd_link_hash_warning)
2229 h = (struct alpha_elf_link_hash_entry *)h->root.root.u.i.link;
2230
2231 for (be = h->got_entries; be ; be = be->next)
2232 {
2233 if (be->use_count == 0)
2234 continue;
2235 if (be->gotobj != b)
2236 continue;
2237
2238 for (ae = h->got_entries; ae ; ae = ae->next)
2239 if (ae->gotobj == a
2240 && ae->reloc_type == be->reloc_type
2241 && ae->addend == be->addend)
2242 goto global_found;
2243
2244 total += alpha_got_entry_size (be->reloc_type);
2245 if (total > MAX_GOT_SIZE)
2246 return FALSE;
2247 global_found:;
2248 }
2249 }
2250 }
252b5132 2251
b34976b6 2252 return TRUE;
252b5132
RH
2253}
2254
a7519a3c 2255/* Actually merge two .got tables. */
252b5132 2256
a7519a3c
RH
2257static void
2258elf64_alpha_merge_gots (bfd *a, bfd *b)
252b5132 2259{
a7519a3c
RH
2260 int total = alpha_elf_tdata (a)->total_got_size;
2261 bfd *bsub;
252b5132 2262
a7519a3c
RH
2263 /* Remember local expansion. */
2264 {
2265 int e = alpha_elf_tdata (b)->local_got_size;
2266 total += e;
2267 alpha_elf_tdata (a)->local_got_size += e;
2268 }
252b5132 2269
a7519a3c
RH
2270 for (bsub = b; bsub ; bsub = alpha_elf_tdata (bsub)->in_got_link_next)
2271 {
2272 struct alpha_elf_got_entry **local_got_entries;
2273 struct alpha_elf_link_hash_entry **hashes;
2274 Elf_Internal_Shdr *symtab_hdr;
2275 int i, n;
252b5132 2276
a7519a3c
RH
2277 /* Let the local .got entries know they are part of a new subsegment. */
2278 local_got_entries = alpha_elf_tdata (bsub)->local_got_entries;
2279 if (local_got_entries)
2280 {
2281 n = elf_tdata (bsub)->symtab_hdr.sh_info;
2282 for (i = 0; i < n; ++i)
2283 {
2284 struct alpha_elf_got_entry *ent;
2285 for (ent = local_got_entries[i]; ent; ent = ent->next)
2286 ent->gotobj = a;
2287 }
2288 }
252b5132 2289
a7519a3c
RH
2290 /* Merge the global .got entries. */
2291 hashes = alpha_elf_sym_hashes (bsub);
2292 symtab_hdr = &elf_tdata (bsub)->symtab_hdr;
252b5132 2293
a7519a3c
RH
2294 n = NUM_SHDR_ENTRIES (symtab_hdr) - symtab_hdr->sh_info;
2295 for (i = 0; i < n; ++i)
2296 {
2297 struct alpha_elf_got_entry *ae, *be, **pbe, **start;
2298 struct alpha_elf_link_hash_entry *h;
252b5132 2299
a7519a3c
RH
2300 h = hashes[i];
2301 while (h->root.root.type == bfd_link_hash_indirect
2302 || h->root.root.type == bfd_link_hash_warning)
2303 h = (struct alpha_elf_link_hash_entry *)h->root.root.u.i.link;
252b5132 2304
a7519a3c
RH
2305 pbe = start = &h->got_entries;
2306 while ((be = *pbe) != NULL)
2307 {
2308 if (be->use_count == 0)
2309 {
2310 *pbe = be->next;
2311 memset (be, 0xa5, sizeof (*be));
2312 goto kill;
2313 }
2314 if (be->gotobj != b)
2315 goto next;
2316
2317 for (ae = *start; ae ; ae = ae->next)
2318 if (ae->gotobj == a
2319 && ae->reloc_type == be->reloc_type
2320 && ae->addend == be->addend)
2321 {
2322 ae->flags |= be->flags;
2323 ae->use_count += be->use_count;
2324 *pbe = be->next;
2325 memset (be, 0xa5, sizeof (*be));
2326 goto kill;
2327 }
2328 be->gotobj = a;
2329 total += alpha_got_entry_size (be->reloc_type);
252b5132 2330
a7519a3c
RH
2331 next:;
2332 pbe = &be->next;
2333 kill:;
2334 }
2335 }
252b5132 2336
a7519a3c
RH
2337 alpha_elf_tdata (bsub)->gotobj = a;
2338 }
2339 alpha_elf_tdata (a)->total_got_size = total;
252b5132 2340
a7519a3c
RH
2341 /* Merge the two in_got chains. */
2342 {
2343 bfd *next;
252b5132 2344
a7519a3c
RH
2345 bsub = a;
2346 while ((next = alpha_elf_tdata (bsub)->in_got_link_next) != NULL)
2347 bsub = next;
252b5132 2348
a7519a3c
RH
2349 alpha_elf_tdata (bsub)->in_got_link_next = b;
2350 }
252b5132 2351}
a7519a3c
RH
2352
2353/* Calculate the offsets for the got entries. */
252b5132 2354
b34976b6 2355static bfd_boolean
a7519a3c 2356elf64_alpha_calc_got_offsets_for_symbol (struct alpha_elf_link_hash_entry *h,
2c3fc389 2357 void * arg ATTRIBUTE_UNUSED)
252b5132 2358{
a7519a3c 2359 struct alpha_elf_got_entry *gotent;
252b5132 2360
a7519a3c
RH
2361 for (gotent = h->got_entries; gotent; gotent = gotent->next)
2362 if (gotent->use_count > 0)
2363 {
2364 struct alpha_elf_obj_tdata *td;
2365 bfd_size_type *plge;
252b5132 2366
a7519a3c 2367 td = alpha_elf_tdata (gotent->gotobj);
a7519a3c
RH
2368 plge = &td->got->size;
2369 gotent->got_offset = *plge;
2370 *plge += alpha_got_entry_size (gotent->reloc_type);
2371 }
252b5132 2372
6ec7057a 2373 return TRUE;
a7519a3c 2374}
252b5132 2375
a7519a3c
RH
2376static void
2377elf64_alpha_calc_got_offsets (struct bfd_link_info *info)
2378{
4dfe6ac6
NC
2379 bfd *i, *got_list;
2380 struct alpha_elf_link_hash_table * htab;
2381
2382 htab = alpha_elf_hash_table (info);
2383 if (htab == NULL)
2384 return;
2385 got_list = htab->got_list;
252b5132 2386
a7519a3c
RH
2387 /* First, zero out the .got sizes, as we may be recalculating the
2388 .got after optimizing it. */
2389 for (i = got_list; i ; i = alpha_elf_tdata(i)->got_link_next)
2390 alpha_elf_tdata(i)->got->size = 0;
252b5132 2391
a7519a3c 2392 /* Next, fill in the offsets for all the global entries. */
4dfe6ac6 2393 alpha_elf_link_hash_traverse (htab,
a7519a3c
RH
2394 elf64_alpha_calc_got_offsets_for_symbol,
2395 NULL);
252b5132 2396
a7519a3c
RH
2397 /* Finally, fill in the offsets for the local entries. */
2398 for (i = got_list; i ; i = alpha_elf_tdata(i)->got_link_next)
2399 {
2400 bfd_size_type got_offset = alpha_elf_tdata(i)->got->size;
2401 bfd *j;
252b5132 2402
a7519a3c
RH
2403 for (j = i; j ; j = alpha_elf_tdata(j)->in_got_link_next)
2404 {
2405 struct alpha_elf_got_entry **local_got_entries, *gotent;
2406 int k, n;
252b5132 2407
a7519a3c
RH
2408 local_got_entries = alpha_elf_tdata(j)->local_got_entries;
2409 if (!local_got_entries)
2410 continue;
252b5132 2411
a7519a3c
RH
2412 for (k = 0, n = elf_tdata(j)->symtab_hdr.sh_info; k < n; ++k)
2413 for (gotent = local_got_entries[k]; gotent; gotent = gotent->next)
2414 if (gotent->use_count > 0)
2415 {
2416 gotent->got_offset = got_offset;
2417 got_offset += alpha_got_entry_size (gotent->reloc_type);
2418 }
2419 }
252b5132 2420
a7519a3c
RH
2421 alpha_elf_tdata(i)->got->size = got_offset;
2422 }
2423}
252b5132 2424
a7519a3c 2425/* Constructs the gots. */
252b5132 2426
b34976b6 2427static bfd_boolean
d1c109de
RH
2428elf64_alpha_size_got_sections (struct bfd_link_info *info,
2429 bfd_boolean may_merge)
252b5132 2430{
a7519a3c 2431 bfd *i, *got_list, *cur_got_obj = NULL;
4dfe6ac6 2432 struct alpha_elf_link_hash_table * htab;
252b5132 2433
4dfe6ac6
NC
2434 htab = alpha_elf_hash_table (info);
2435 if (htab == NULL)
2436 return FALSE;
2437 got_list = htab->got_list;
95404643 2438
a7519a3c
RH
2439 /* On the first time through, pretend we have an existing got list
2440 consisting of all of the input files. */
2441 if (got_list == NULL)
252b5132 2442 {
c72f2fb2 2443 for (i = info->input_bfds; i ; i = i->link.next)
252b5132 2444 {
0ffa91dd
NC
2445 bfd *this_got;
2446
2447 if (! is_alpha_elf (i))
2448 continue;
2449
2450 this_got = alpha_elf_tdata (i)->gotobj;
a7519a3c
RH
2451 if (this_got == NULL)
2452 continue;
252b5132 2453
a7519a3c
RH
2454 /* We are assuming no merging has yet occurred. */
2455 BFD_ASSERT (this_got == i);
252b5132 2456
a7519a3c 2457 if (alpha_elf_tdata (this_got)->total_got_size > MAX_GOT_SIZE)
252b5132 2458 {
a7519a3c 2459 /* Yikes! A single object file has too many entries. */
4eca0228 2460 _bfd_error_handler
695344c0 2461 /* xgettext:c-format */
a7519a3c
RH
2462 (_("%B: .got subsegment exceeds 64K (size %d)"),
2463 i, alpha_elf_tdata (this_got)->total_got_size);
b34976b6 2464 return FALSE;
252b5132 2465 }
252b5132 2466
a7519a3c
RH
2467 if (got_list == NULL)
2468 got_list = this_got;
2469 else
2470 alpha_elf_tdata(cur_got_obj)->got_link_next = this_got;
2471 cur_got_obj = this_got;
252b5132
RH
2472 }
2473
a7519a3c
RH
2474 /* Strange degenerate case of no got references. */
2475 if (got_list == NULL)
2476 return TRUE;
2477
4dfe6ac6 2478 htab->got_list = got_list;
a7519a3c
RH
2479 }
2480
2481 cur_got_obj = got_list;
0ffa91dd
NC
2482 if (cur_got_obj == NULL)
2483 return FALSE;
2484
d1c109de 2485 if (may_merge)
a7519a3c 2486 {
d1c109de
RH
2487 i = alpha_elf_tdata(cur_got_obj)->got_link_next;
2488 while (i != NULL)
252b5132 2489 {
d1c109de
RH
2490 if (elf64_alpha_can_merge_gots (cur_got_obj, i))
2491 {
2492 elf64_alpha_merge_gots (cur_got_obj, i);
252b5132 2493
d1c109de
RH
2494 alpha_elf_tdata(i)->got->size = 0;
2495 i = alpha_elf_tdata(i)->got_link_next;
2496 alpha_elf_tdata(cur_got_obj)->got_link_next = i;
2497 }
2498 else
2499 {
2500 cur_got_obj = i;
2501 i = alpha_elf_tdata(i)->got_link_next;
2502 }
a7519a3c 2503 }
252b5132
RH
2504 }
2505
a7519a3c
RH
2506 /* Once the gots have been merged, fill in the got offsets for
2507 everything therein. */
4a828aab 2508 elf64_alpha_calc_got_offsets (info);
252b5132 2509
a7519a3c 2510 return TRUE;
252b5132 2511}
252b5132 2512
b34976b6 2513static bfd_boolean
2c3fc389
NC
2514elf64_alpha_size_plt_section_1 (struct alpha_elf_link_hash_entry *h,
2515 void * data)
252b5132 2516{
a7519a3c
RH
2517 asection *splt = (asection *) data;
2518 struct alpha_elf_got_entry *gotent;
6ec7057a 2519 bfd_boolean saw_one = FALSE;
252b5132 2520
a7519a3c
RH
2521 /* If we didn't need an entry before, we still don't. */
2522 if (!h->root.needs_plt)
2523 return TRUE;
e92d460e 2524
6ec7057a 2525 /* For each LITERAL got entry still in use, allocate a plt entry. */
a7519a3c
RH
2526 for (gotent = h->got_entries; gotent ; gotent = gotent->next)
2527 if (gotent->reloc_type == R_ALPHA_LITERAL
2528 && gotent->use_count > 0)
6ec7057a
RH
2529 {
2530 if (splt->size == 0)
2531 splt->size = PLT_HEADER_SIZE;
2532 gotent->plt_offset = splt->size;
2533 splt->size += PLT_ENTRY_SIZE;
2534 saw_one = TRUE;
2535 }
a7519a3c 2536
6ec7057a
RH
2537 /* If there weren't any, there's no longer a need for the PLT entry. */
2538 if (!saw_one)
2539 h->root.needs_plt = FALSE;
a7519a3c
RH
2540
2541 return TRUE;
2542}
2543
4a828aab
RH
2544/* Called from relax_section to rebuild the PLT in light of potential changes
2545 in the function's status. */
a7519a3c 2546
4a828aab 2547static void
a7519a3c
RH
2548elf64_alpha_size_plt_section (struct bfd_link_info *info)
2549{
6ec7057a 2550 asection *splt, *spltrel, *sgotplt;
a7519a3c 2551 unsigned long entries;
4dfe6ac6
NC
2552 struct alpha_elf_link_hash_table * htab;
2553
2554 htab = alpha_elf_hash_table (info);
2555 if (htab == NULL)
2556 return;
a7519a3c 2557
ce558b89 2558 splt = elf_hash_table(info)->splt;
a7519a3c 2559 if (splt == NULL)
4a828aab 2560 return;
252b5132 2561
a7519a3c 2562 splt->size = 0;
252b5132 2563
4dfe6ac6 2564 alpha_elf_link_hash_traverse (htab,
a7519a3c 2565 elf64_alpha_size_plt_section_1, splt);
e92d460e 2566
a7519a3c 2567 /* Every plt entry requires a JMP_SLOT relocation. */
ce558b89 2568 spltrel = elf_hash_table(info)->srelplt;
4a828aab 2569 entries = 0;
a7519a3c 2570 if (splt->size)
6ec7057a
RH
2571 {
2572 if (elf64_alpha_use_secureplt)
2573 entries = (splt->size - NEW_PLT_HEADER_SIZE) / NEW_PLT_ENTRY_SIZE;
2574 else
2575 entries = (splt->size - OLD_PLT_HEADER_SIZE) / OLD_PLT_ENTRY_SIZE;
2576 }
a7519a3c 2577 spltrel->size = entries * sizeof (Elf64_External_Rela);
e92d460e 2578
6ec7057a
RH
2579 /* When using the secureplt, we need two words somewhere in the data
2580 segment for the dynamic linker to tell us where to go. This is the
2581 entire contents of the .got.plt section. */
2582 if (elf64_alpha_use_secureplt)
2583 {
ce558b89 2584 sgotplt = elf_hash_table(info)->sgotplt;
6ec7057a
RH
2585 sgotplt->size = entries ? 16 : 0;
2586 }
a7519a3c 2587}
e92d460e 2588
a7519a3c
RH
2589static bfd_boolean
2590elf64_alpha_always_size_sections (bfd *output_bfd ATTRIBUTE_UNUSED,
2591 struct bfd_link_info *info)
2592{
2593 bfd *i;
4dfe6ac6 2594 struct alpha_elf_link_hash_table * htab;
252b5132 2595
0e1862bb 2596 if (bfd_link_relocatable (info))
a7519a3c 2597 return TRUE;
252b5132 2598
4dfe6ac6
NC
2599 htab = alpha_elf_hash_table (info);
2600 if (htab == NULL)
2601 return FALSE;
2602
d1c109de 2603 if (!elf64_alpha_size_got_sections (info, TRUE))
a7519a3c 2604 return FALSE;
252b5132 2605
a7519a3c 2606 /* Allocate space for all of the .got subsections. */
4dfe6ac6 2607 i = htab->got_list;
a7519a3c 2608 for ( ; i ; i = alpha_elf_tdata(i)->got_link_next)
252b5132 2609 {
a7519a3c
RH
2610 asection *s = alpha_elf_tdata(i)->got;
2611 if (s->size > 0)
2612 {
2613 s->contents = (bfd_byte *) bfd_zalloc (i, s->size);
2614 if (s->contents == NULL)
2615 return FALSE;
2616 }
252b5132
RH
2617 }
2618
b34976b6 2619 return TRUE;
252b5132 2620}
3765b1be 2621
a7519a3c 2622/* The number of dynamic relocations required by a static relocation. */
3765b1be 2623
a7519a3c 2624static int
e366eeae 2625alpha_dynamic_entries_for_reloc (int r_type, int dynamic, int shared, int pie)
a7519a3c
RH
2626{
2627 switch (r_type)
3765b1be 2628 {
a7519a3c
RH
2629 /* May appear in GOT entries. */
2630 case R_ALPHA_TLSGD:
2631 return (dynamic ? 2 : shared ? 1 : 0);
2632 case R_ALPHA_TLSLDM:
2633 return shared;
2634 case R_ALPHA_LITERAL:
a7519a3c 2635 return dynamic || shared;
e366eeae
RH
2636 case R_ALPHA_GOTTPREL:
2637 return dynamic || (shared && !pie);
a7519a3c
RH
2638 case R_ALPHA_GOTDTPREL:
2639 return dynamic;
3765b1be 2640
a7519a3c
RH
2641 /* May appear in data sections. */
2642 case R_ALPHA_REFLONG:
2643 case R_ALPHA_REFQUAD:
a7519a3c 2644 return dynamic || shared;
e366eeae
RH
2645 case R_ALPHA_TPREL64:
2646 return dynamic || (shared && !pie);
3765b1be 2647
a7519a3c
RH
2648 /* Everything else is illegal. We'll issue an error during
2649 relocate_section. */
2650 default:
2651 return 0;
2652 }
2653}
3765b1be 2654
a7519a3c 2655/* Work out the sizes of the dynamic relocation entries. */
3765b1be 2656
a7519a3c
RH
2657static bfd_boolean
2658elf64_alpha_calc_dynrel_sizes (struct alpha_elf_link_hash_entry *h,
2659 struct bfd_link_info *info)
2660{
2661 bfd_boolean dynamic;
2662 struct alpha_elf_reloc_entry *relent;
2663 unsigned long entries;
3765b1be 2664
a7519a3c
RH
2665 /* If the symbol was defined as a common symbol in a regular object
2666 file, and there was no definition in any dynamic object, then the
2667 linker will have allocated space for the symbol in a common
2668 section but the ELF_LINK_HASH_DEF_REGULAR flag will not have been
2669 set. This is done for dynamic symbols in
2670 elf_adjust_dynamic_symbol but this is not done for non-dynamic
2671 symbols, somehow. */
2672 if (!h->root.def_regular
2673 && h->root.ref_regular
2674 && !h->root.def_dynamic
2675 && (h->root.root.type == bfd_link_hash_defined
2676 || h->root.root.type == bfd_link_hash_defweak)
2677 && !(h->root.root.u.def.section->owner->flags & DYNAMIC))
2678 h->root.def_regular = 1;
3765b1be 2679
a7519a3c
RH
2680 /* If the symbol is dynamic, we'll need all the relocations in their
2681 natural form. If this is a shared object, and it has been forced
2682 local, we'll need the same number of RELATIVE relocations. */
2683 dynamic = alpha_elf_dynamic_symbol_p (&h->root, info);
3765b1be 2684
a7519a3c
RH
2685 /* If the symbol is a hidden undefined weak, then we never have any
2686 relocations. Avoid the loop which may want to add RELATIVE relocs
0e1862bb 2687 based on bfd_link_pic (info). */
a7519a3c
RH
2688 if (h->root.root.type == bfd_link_hash_undefweak && !dynamic)
2689 return TRUE;
2690
2691 for (relent = h->reloc_entries; relent; relent = relent->next)
3765b1be 2692 {
a7519a3c 2693 entries = alpha_dynamic_entries_for_reloc (relent->rtype, dynamic,
3cbc1e5e
AM
2694 bfd_link_pic (info),
2695 bfd_link_pie (info));
a7519a3c
RH
2696 if (entries)
2697 {
2698 relent->srel->size +=
2699 entries * sizeof (Elf64_External_Rela) * relent->count;
2700 if (relent->reltext)
2701 info->flags |= DT_TEXTREL;
2702 }
2703 }
3765b1be 2704
a7519a3c
RH
2705 return TRUE;
2706}
3765b1be 2707
a7519a3c
RH
2708/* Subroutine of elf64_alpha_size_rela_got_section for doing the
2709 global symbols. */
3765b1be 2710
a7519a3c
RH
2711static bfd_boolean
2712elf64_alpha_size_rela_got_1 (struct alpha_elf_link_hash_entry *h,
2713 struct bfd_link_info *info)
2714{
2715 bfd_boolean dynamic;
2716 struct alpha_elf_got_entry *gotent;
2717 unsigned long entries;
3765b1be 2718
6ec7057a
RH
2719 /* If we're using a plt for this symbol, then all of its relocations
2720 for its got entries go into .rela.plt. */
2721 if (h->root.needs_plt)
2722 return TRUE;
2723
a7519a3c
RH
2724 /* If the symbol is dynamic, we'll need all the relocations in their
2725 natural form. If this is a shared object, and it has been forced
2726 local, we'll need the same number of RELATIVE relocations. */
2727 dynamic = alpha_elf_dynamic_symbol_p (&h->root, info);
2728
2729 /* If the symbol is a hidden undefined weak, then we never have any
2730 relocations. Avoid the loop which may want to add RELATIVE relocs
0e1862bb 2731 based on bfd_link_pic (info). */
a7519a3c
RH
2732 if (h->root.root.type == bfd_link_hash_undefweak && !dynamic)
2733 return TRUE;
2734
2735 entries = 0;
2736 for (gotent = h->got_entries; gotent ; gotent = gotent->next)
2737 if (gotent->use_count > 0)
e366eeae 2738 entries += alpha_dynamic_entries_for_reloc (gotent->reloc_type, dynamic,
0e1862bb
L
2739 bfd_link_pic (info),
2740 bfd_link_pie (info));
a7519a3c 2741
a7519a3c
RH
2742 if (entries > 0)
2743 {
ce558b89 2744 asection *srel = elf_hash_table(info)->srelgot;
a7519a3c
RH
2745 BFD_ASSERT (srel != NULL);
2746 srel->size += sizeof (Elf64_External_Rela) * entries;
3765b1be 2747 }
3765b1be 2748
a7519a3c 2749 return TRUE;
3765b1be
RH
2750}
2751
a7519a3c 2752/* Set the sizes of the dynamic relocation sections. */
252b5132 2753
4a828aab 2754static void
a7519a3c 2755elf64_alpha_size_rela_got_section (struct bfd_link_info *info)
252b5132 2756{
a7519a3c 2757 unsigned long entries;
ce558b89 2758 bfd *i;
a7519a3c 2759 asection *srel;
4dfe6ac6
NC
2760 struct alpha_elf_link_hash_table * htab;
2761
2762 htab = alpha_elf_hash_table (info);
2763 if (htab == NULL)
2764 return;
252b5132 2765
a7519a3c
RH
2766 /* Shared libraries often require RELATIVE relocs, and some relocs
2767 require attention for the main application as well. */
252b5132 2768
a7519a3c 2769 entries = 0;
4dfe6ac6 2770 for (i = htab->got_list;
a7519a3c
RH
2771 i ; i = alpha_elf_tdata(i)->got_link_next)
2772 {
2773 bfd *j;
3241278a 2774
a7519a3c
RH
2775 for (j = i; j ; j = alpha_elf_tdata(j)->in_got_link_next)
2776 {
2777 struct alpha_elf_got_entry **local_got_entries, *gotent;
2778 int k, n;
252b5132 2779
a7519a3c
RH
2780 local_got_entries = alpha_elf_tdata(j)->local_got_entries;
2781 if (!local_got_entries)
2782 continue;
252b5132 2783
a7519a3c
RH
2784 for (k = 0, n = elf_tdata(j)->symtab_hdr.sh_info; k < n; ++k)
2785 for (gotent = local_got_entries[k];
2786 gotent ; gotent = gotent->next)
2787 if (gotent->use_count > 0)
2788 entries += (alpha_dynamic_entries_for_reloc
0e1862bb
L
2789 (gotent->reloc_type, 0, bfd_link_pic (info),
2790 bfd_link_pie (info)));
a7519a3c
RH
2791 }
2792 }
3765b1be 2793
ce558b89 2794 srel = elf_hash_table(info)->srelgot;
a7519a3c
RH
2795 if (!srel)
2796 {
2797 BFD_ASSERT (entries == 0);
4a828aab 2798 return;
a7519a3c
RH
2799 }
2800 srel->size = sizeof (Elf64_External_Rela) * entries;
252b5132 2801
a7519a3c 2802 /* Now do the non-local symbols. */
4dfe6ac6 2803 alpha_elf_link_hash_traverse (htab,
a7519a3c 2804 elf64_alpha_size_rela_got_1, info);
a7519a3c 2805}
252b5132 2806
a7519a3c 2807/* Set the sizes of the dynamic sections. */
3765b1be 2808
a7519a3c
RH
2809static bfd_boolean
2810elf64_alpha_size_dynamic_sections (bfd *output_bfd ATTRIBUTE_UNUSED,
2811 struct bfd_link_info *info)
2812{
2813 bfd *dynobj;
2814 asection *s;
24f1a751 2815 bfd_boolean relplt, relocs;
4dfe6ac6
NC
2816 struct alpha_elf_link_hash_table * htab;
2817
2818 htab = alpha_elf_hash_table (info);
2819 if (htab == NULL)
2820 return FALSE;
3765b1be 2821
a7519a3c
RH
2822 dynobj = elf_hash_table(info)->dynobj;
2823 BFD_ASSERT(dynobj != NULL);
252b5132 2824
a7519a3c
RH
2825 if (elf_hash_table (info)->dynamic_sections_created)
2826 {
2827 /* Set the contents of the .interp section to the interpreter. */
9b8b325a 2828 if (bfd_link_executable (info) && !info->nointerp)
252b5132 2829 {
3d4d4302 2830 s = bfd_get_linker_section (dynobj, ".interp");
a7519a3c
RH
2831 BFD_ASSERT (s != NULL);
2832 s->size = sizeof ELF_DYNAMIC_INTERPRETER;
2833 s->contents = (unsigned char *) ELF_DYNAMIC_INTERPRETER;
2834 }
3765b1be 2835
a7519a3c
RH
2836 /* Now that we've seen all of the input files, we can decide which
2837 symbols need dynamic relocation entries and which don't. We've
2838 collected information in check_relocs that we can now apply to
2839 size the dynamic relocation sections. */
4dfe6ac6 2840 alpha_elf_link_hash_traverse (htab,
a7519a3c 2841 elf64_alpha_calc_dynrel_sizes, info);
252b5132 2842
a7519a3c 2843 elf64_alpha_size_rela_got_section (info);
6ec7057a 2844 elf64_alpha_size_plt_section (info);
a7519a3c
RH
2845 }
2846 /* else we're not dynamic and by definition we don't need such things. */
3765b1be 2847
a7519a3c
RH
2848 /* The check_relocs and adjust_dynamic_symbol entry points have
2849 determined the sizes of the various dynamic sections. Allocate
2850 memory for them. */
2851 relplt = FALSE;
24f1a751 2852 relocs = FALSE;
a7519a3c
RH
2853 for (s = dynobj->sections; s != NULL; s = s->next)
2854 {
2855 const char *name;
3765b1be 2856
a7519a3c
RH
2857 if (!(s->flags & SEC_LINKER_CREATED))
2858 continue;
cc03ec80 2859
a7519a3c
RH
2860 /* It's OK to base decisions on the section name, because none
2861 of the dynobj section names depend upon the input files. */
2862 name = bfd_get_section_name (dynobj, s);
3765b1be 2863
0112cd26 2864 if (CONST_STRNEQ (name, ".rela"))
3765b1be 2865 {
c456f082 2866 if (s->size != 0)
a7519a3c 2867 {
c456f082 2868 if (strcmp (name, ".rela.plt") == 0)
a7519a3c 2869 relplt = TRUE;
24f1a751
AM
2870 else
2871 relocs = TRUE;
252b5132 2872
a7519a3c
RH
2873 /* We use the reloc_count field as a counter if we need
2874 to copy relocs into the output file. */
2875 s->reloc_count = 0;
252b5132 2876 }
3765b1be 2877 }
0112cd26 2878 else if (! CONST_STRNEQ (name, ".got")
c456f082
AM
2879 && strcmp (name, ".plt") != 0
2880 && strcmp (name, ".dynbss") != 0)
3765b1be 2881 {
a7519a3c
RH
2882 /* It's not one of our dynamic sections, so don't allocate space. */
2883 continue;
2884 }
252b5132 2885
c456f082
AM
2886 if (s->size == 0)
2887 {
2888 /* If we don't need this section, strip it from the output file.
2889 This is to handle .rela.bss and .rela.plt. We must create it
2890 in create_dynamic_sections, because it must be created before
2891 the linker maps input sections to output sections. The
2892 linker does that before adjust_dynamic_symbol is called, and
2893 it is that function which decides whether anything needs to
2894 go into these sections. */
6452a567
RH
2895 if (!CONST_STRNEQ (name, ".got"))
2896 s->flags |= SEC_EXCLUDE;
c456f082
AM
2897 }
2898 else if ((s->flags & SEC_HAS_CONTENTS) != 0)
a7519a3c
RH
2899 {
2900 /* Allocate memory for the section contents. */
2901 s->contents = (bfd_byte *) bfd_zalloc (dynobj, s->size);
c456f082 2902 if (s->contents == NULL)
b34976b6 2903 return FALSE;
a7519a3c
RH
2904 }
2905 }
3765b1be 2906
a7519a3c
RH
2907 if (elf_hash_table (info)->dynamic_sections_created)
2908 {
2909 /* Add some entries to the .dynamic section. We fill in the
2910 values later, in elf64_alpha_finish_dynamic_sections, but we
2911 must add the entries now so that we get the correct size for
2912 the .dynamic section. The DT_DEBUG entry is filled in by the
2913 dynamic linker and used by the debugger. */
2914#define add_dynamic_entry(TAG, VAL) \
2915 _bfd_elf_add_dynamic_entry (info, TAG, VAL)
3765b1be 2916
0e1862bb 2917 if (bfd_link_executable (info))
a7519a3c
RH
2918 {
2919 if (!add_dynamic_entry (DT_DEBUG, 0))
2920 return FALSE;
3765b1be
RH
2921 }
2922
a7519a3c 2923 if (relplt)
3765b1be 2924 {
a7519a3c
RH
2925 if (!add_dynamic_entry (DT_PLTGOT, 0)
2926 || !add_dynamic_entry (DT_PLTRELSZ, 0)
2927 || !add_dynamic_entry (DT_PLTREL, DT_RELA)
2928 || !add_dynamic_entry (DT_JMPREL, 0))
2929 return FALSE;
6ec7057a
RH
2930
2931 if (elf64_alpha_use_secureplt
2932 && !add_dynamic_entry (DT_ALPHA_PLTRO, 1))
2933 return FALSE;
a7519a3c 2934 }
252b5132 2935
24f1a751 2936 if (relocs)
a7519a3c 2937 {
24f1a751
AM
2938 if (!add_dynamic_entry (DT_RELA, 0)
2939 || !add_dynamic_entry (DT_RELASZ, 0)
2940 || !add_dynamic_entry (DT_RELAENT, sizeof (Elf64_External_Rela)))
a7519a3c 2941 return FALSE;
24f1a751
AM
2942
2943 if (info->flags & DF_TEXTREL)
2944 {
2945 if (!add_dynamic_entry (DT_TEXTREL, 0))
2946 return FALSE;
2947 }
252b5132
RH
2948 }
2949 }
a7519a3c 2950#undef add_dynamic_entry
252b5132 2951
b34976b6 2952 return TRUE;
252b5132 2953}
a7519a3c
RH
2954\f
2955/* These functions do relaxation for Alpha ELF.
252b5132 2956
a7519a3c
RH
2957 Currently I'm only handling what I can do with existing compiler
2958 and assembler support, which means no instructions are removed,
2959 though some may be nopped. At this time GCC does not emit enough
2960 information to do all of the relaxing that is possible. It will
2961 take some not small amount of work for that to happen.
252b5132 2962
a7519a3c
RH
2963 There are a couple of interesting papers that I once read on this
2964 subject, that I cannot find references to at the moment, that
2965 related to Alpha in particular. They are by David Wall, then of
2966 DEC WRL. */
252b5132 2967
a7519a3c
RH
2968struct alpha_relax_info
2969{
2970 bfd *abfd;
2971 asection *sec;
2972 bfd_byte *contents;
2973 Elf_Internal_Shdr *symtab_hdr;
2974 Elf_Internal_Rela *relocs, *relend;
2975 struct bfd_link_info *link_info;
2976 bfd_vma gp;
2977 bfd *gotobj;
2978 asection *tsec;
2979 struct alpha_elf_link_hash_entry *h;
2980 struct alpha_elf_got_entry **first_gotent;
2981 struct alpha_elf_got_entry *gotent;
2982 bfd_boolean changed_contents;
2983 bfd_boolean changed_relocs;
2984 unsigned char other;
2985};
252b5132 2986
a7519a3c
RH
2987static Elf_Internal_Rela *
2988elf64_alpha_find_reloc_at_ofs (Elf_Internal_Rela *rel,
2989 Elf_Internal_Rela *relend,
2990 bfd_vma offset, int type)
2991{
2992 while (rel < relend)
252b5132 2993 {
a7519a3c
RH
2994 if (rel->r_offset == offset
2995 && ELF64_R_TYPE (rel->r_info) == (unsigned int) type)
2996 return rel;
2997 ++rel;
2998 }
2999 return NULL;
3000}
252b5132 3001
a7519a3c
RH
3002static bfd_boolean
3003elf64_alpha_relax_got_load (struct alpha_relax_info *info, bfd_vma symval,
3004 Elf_Internal_Rela *irel, unsigned long r_type)
3005{
3006 unsigned int insn;
3007 bfd_signed_vma disp;
252b5132 3008
a7519a3c
RH
3009 /* Get the instruction. */
3010 insn = bfd_get_32 (info->abfd, info->contents + irel->r_offset);
252b5132 3011
a7519a3c
RH
3012 if (insn >> 26 != OP_LDQ)
3013 {
3014 reloc_howto_type *howto = elf64_alpha_howto_table + r_type;
4eca0228 3015 _bfd_error_handler
695344c0 3016 /* xgettext:c-format */
d42c267e
AM
3017 (_("%B: %A+%#Lx: warning: %s relocation against unexpected insn"),
3018 info->abfd, info->sec, irel->r_offset, howto->name);
a7519a3c
RH
3019 return TRUE;
3020 }
252b5132 3021
a7519a3c
RH
3022 /* Can't relax dynamic symbols. */
3023 if (alpha_elf_dynamic_symbol_p (&info->h->root, info->link_info))
3024 return TRUE;
252b5132 3025
a7519a3c 3026 /* Can't use local-exec relocations in shared libraries. */
e366eeae 3027 if (r_type == R_ALPHA_GOTTPREL
3cbc1e5e 3028 && bfd_link_dll (info->link_info))
a7519a3c 3029 return TRUE;
252b5132 3030
a7519a3c
RH
3031 if (r_type == R_ALPHA_LITERAL)
3032 {
3033 /* Look for nice constant addresses. This includes the not-uncommon
3034 special case of 0 for undefweak symbols. */
3035 if ((info->h && info->h->root.root.type == bfd_link_hash_undefweak)
0e1862bb 3036 || (!bfd_link_pic (info->link_info)
a7519a3c
RH
3037 && (symval >= (bfd_vma)-0x8000 || symval < 0x8000)))
3038 {
3039 disp = 0;
3040 insn = (OP_LDA << 26) | (insn & (31 << 21)) | (31 << 16);
3041 insn |= (symval & 0xffff);
3042 r_type = R_ALPHA_NONE;
3043 }
3044 else
3045 {
d1c109de
RH
3046 /* We may only create GPREL relocs during the second pass. */
3047 if (info->link_info->relax_pass == 0)
3048 return TRUE;
3049
a7519a3c
RH
3050 disp = symval - info->gp;
3051 insn = (OP_LDA << 26) | (insn & 0x03ff0000);
3052 r_type = R_ALPHA_GPREL16;
3053 }
252b5132
RH
3054 }
3055 else
252b5132 3056 {
a7519a3c 3057 bfd_vma dtp_base, tp_base;
252b5132 3058
a7519a3c
RH
3059 BFD_ASSERT (elf_hash_table (info->link_info)->tls_sec != NULL);
3060 dtp_base = alpha_get_dtprel_base (info->link_info);
3061 tp_base = alpha_get_tprel_base (info->link_info);
3062 disp = symval - (r_type == R_ALPHA_GOTDTPREL ? dtp_base : tp_base);
252b5132 3063
a7519a3c 3064 insn = (OP_LDA << 26) | (insn & (31 << 21)) | (31 << 16);
252b5132 3065
a7519a3c
RH
3066 switch (r_type)
3067 {
3068 case R_ALPHA_GOTDTPREL:
3069 r_type = R_ALPHA_DTPREL16;
3070 break;
3071 case R_ALPHA_GOTTPREL:
3072 r_type = R_ALPHA_TPREL16;
3073 break;
3074 default:
3075 BFD_ASSERT (0);
3076 return FALSE;
3077 }
3078 }
252b5132 3079
a7519a3c 3080 if (disp < -0x8000 || disp >= 0x8000)
b34976b6 3081 return TRUE;
252b5132 3082
a7519a3c
RH
3083 bfd_put_32 (info->abfd, (bfd_vma) insn, info->contents + irel->r_offset);
3084 info->changed_contents = TRUE;
252b5132 3085
a7519a3c
RH
3086 /* Reduce the use count on this got entry by one, possibly
3087 eliminating it. */
3088 if (--info->gotent->use_count == 0)
252b5132 3089 {
a7519a3c
RH
3090 int sz = alpha_got_entry_size (r_type);
3091 alpha_elf_tdata (info->gotobj)->total_got_size -= sz;
3092 if (!info->h)
3093 alpha_elf_tdata (info->gotobj)->local_got_size -= sz;
252b5132 3094 }
252b5132 3095
a7519a3c
RH
3096 /* Smash the existing GOT relocation for its 16-bit immediate pair. */
3097 irel->r_info = ELF64_R_INFO (ELF64_R_SYM (irel->r_info), r_type);
3098 info->changed_relocs = TRUE;
3099
3100 /* ??? Search forward through this basic block looking for insns
3101 that use the target register. Stop after an insn modifying the
3102 register is seen, or after a branch or call.
252b5132 3103
a7519a3c
RH
3104 Any such memory load insn may be substituted by a load directly
3105 off the GP. This allows the memory load insn to be issued before
3106 the calculated GP register would otherwise be ready.
252b5132 3107
a7519a3c
RH
3108 Any such jsr insn can be replaced by a bsr if it is in range.
3109
3110 This would mean that we'd have to _add_ relocations, the pain of
3111 which gives one pause. */
252b5132 3112
b34976b6 3113 return TRUE;
252b5132
RH
3114}
3115
a7519a3c
RH
3116static bfd_vma
3117elf64_alpha_relax_opt_call (struct alpha_relax_info *info, bfd_vma symval)
252b5132 3118{
a7519a3c
RH
3119 /* If the function has the same gp, and we can identify that the
3120 function does not use its function pointer, we can eliminate the
3121 address load. */
252b5132 3122
a7519a3c
RH
3123 /* If the symbol is marked NOPV, we are being told the function never
3124 needs its procedure value. */
3125 if ((info->other & STO_ALPHA_STD_GPLOAD) == STO_ALPHA_NOPV)
3126 return symval;
252b5132 3127
a7519a3c
RH
3128 /* If the symbol is marked STD_GP, we are being told the function does
3129 a normal ldgp in the first two words. */
3130 else if ((info->other & STO_ALPHA_STD_GPLOAD) == STO_ALPHA_STD_GPLOAD)
3131 ;
252b5132 3132
a7519a3c
RH
3133 /* Otherwise, we may be able to identify a GP load in the first two
3134 words, which we can then skip. */
3135 else
252b5132 3136 {
a7519a3c
RH
3137 Elf_Internal_Rela *tsec_relocs, *tsec_relend, *tsec_free, *gpdisp;
3138 bfd_vma ofs;
252b5132 3139
a7519a3c
RH
3140 /* Load the relocations from the section that the target symbol is in. */
3141 if (info->sec == info->tsec)
252b5132 3142 {
a7519a3c
RH
3143 tsec_relocs = info->relocs;
3144 tsec_relend = info->relend;
3145 tsec_free = NULL;
3146 }
3147 else
3148 {
3149 tsec_relocs = (_bfd_elf_link_read_relocs
2c3fc389 3150 (info->abfd, info->tsec, NULL,
a7519a3c
RH
3151 (Elf_Internal_Rela *) NULL,
3152 info->link_info->keep_memory));
3153 if (tsec_relocs == NULL)
3154 return 0;
3155 tsec_relend = tsec_relocs + info->tsec->reloc_count;
ae4fda66
JC
3156 tsec_free = (elf_section_data (info->tsec)->relocs == tsec_relocs
3157 ? NULL
3158 : tsec_relocs);
a7519a3c 3159 }
252b5132 3160
a7519a3c
RH
3161 /* Recover the symbol's offset within the section. */
3162 ofs = (symval - info->tsec->output_section->vma
3163 - info->tsec->output_offset);
252b5132 3164
a7519a3c
RH
3165 /* Look for a GPDISP reloc. */
3166 gpdisp = (elf64_alpha_find_reloc_at_ofs
3167 (tsec_relocs, tsec_relend, ofs, R_ALPHA_GPDISP));
252b5132 3168
a7519a3c
RH
3169 if (!gpdisp || gpdisp->r_addend != 4)
3170 {
3171 if (tsec_free)
3172 free (tsec_free);
3173 return 0;
252b5132 3174 }
a7519a3c
RH
3175 if (tsec_free)
3176 free (tsec_free);
252b5132
RH
3177 }
3178
a7519a3c
RH
3179 /* We've now determined that we can skip an initial gp load. Verify
3180 that the call and the target use the same gp. */
f13a99db 3181 if (info->link_info->output_bfd->xvec != info->tsec->owner->xvec
a7519a3c
RH
3182 || info->gotobj != alpha_elf_tdata (info->tsec->owner)->gotobj)
3183 return 0;
252b5132 3184
a7519a3c
RH
3185 return symval + 8;
3186}
252b5132 3187
a7519a3c
RH
3188static bfd_boolean
3189elf64_alpha_relax_with_lituse (struct alpha_relax_info *info,
3190 bfd_vma symval, Elf_Internal_Rela *irel)
252b5132 3191{
d1c109de
RH
3192 Elf_Internal_Rela *urel, *erel, *irelend = info->relend;
3193 int flags;
a7519a3c
RH
3194 bfd_signed_vma disp;
3195 bfd_boolean fits16;
3196 bfd_boolean fits32;
3197 bfd_boolean lit_reused = FALSE;
3198 bfd_boolean all_optimized = TRUE;
d1c109de
RH
3199 bfd_boolean changed_contents;
3200 bfd_boolean changed_relocs;
3201 bfd_byte *contents = info->contents;
3202 bfd *abfd = info->abfd;
3203 bfd_vma sec_output_vma;
a7519a3c 3204 unsigned int lit_insn;
d1c109de 3205 int relax_pass;
252b5132 3206
d1c109de 3207 lit_insn = bfd_get_32 (abfd, contents + irel->r_offset);
a7519a3c
RH
3208 if (lit_insn >> 26 != OP_LDQ)
3209 {
4eca0228 3210 _bfd_error_handler
695344c0 3211 /* xgettext:c-format */
d42c267e
AM
3212 (_("%B: %A+%#Lx: warning: LITERAL relocation against unexpected insn"),
3213 abfd, info->sec, irel->r_offset);
a7519a3c
RH
3214 return TRUE;
3215 }
252b5132 3216
a7519a3c
RH
3217 /* Can't relax dynamic symbols. */
3218 if (alpha_elf_dynamic_symbol_p (&info->h->root, info->link_info))
3219 return TRUE;
3220
d1c109de
RH
3221 changed_contents = info->changed_contents;
3222 changed_relocs = info->changed_relocs;
3223 sec_output_vma = info->sec->output_section->vma + info->sec->output_offset;
3224 relax_pass = info->link_info->relax_pass;
3225
a7519a3c 3226 /* Summarize how this particular LITERAL is used. */
d1c109de 3227 for (erel = irel+1, flags = 0; erel < irelend; ++erel)
252b5132 3228 {
d1c109de 3229 if (ELF64_R_TYPE (erel->r_info) != R_ALPHA_LITUSE)
a7519a3c 3230 break;
d1c109de
RH
3231 if (erel->r_addend <= 6)
3232 flags |= 1 << erel->r_addend;
a7519a3c 3233 }
252b5132 3234
a7519a3c
RH
3235 /* A little preparation for the loop... */
3236 disp = symval - info->gp;
252b5132 3237
d1c109de 3238 for (urel = irel+1; urel < erel; ++urel)
a7519a3c 3239 {
d1c109de 3240 bfd_vma urel_r_offset = urel->r_offset;
a7519a3c
RH
3241 unsigned int insn;
3242 int insn_disp;
3243 bfd_signed_vma xdisp;
d1c109de 3244 Elf_Internal_Rela nrel;
252b5132 3245
d1c109de 3246 insn = bfd_get_32 (abfd, contents + urel_r_offset);
252b5132 3247
a7519a3c
RH
3248 switch (urel->r_addend)
3249 {
3250 case LITUSE_ALPHA_ADDR:
3251 default:
3252 /* This type is really just a placeholder to note that all
3253 uses cannot be optimized, but to still allow some. */
3254 all_optimized = FALSE;
3255 break;
252b5132 3256
a7519a3c 3257 case LITUSE_ALPHA_BASE:
d1c109de
RH
3258 /* We may only create GPREL relocs during the second pass. */
3259 if (relax_pass == 0)
3260 {
3261 all_optimized = FALSE;
3262 break;
3263 }
3264
a7519a3c 3265 /* We can always optimize 16-bit displacements. */
252b5132 3266
a7519a3c
RH
3267 /* Extract the displacement from the instruction, sign-extending
3268 it if necessary, then test whether it is within 16 or 32 bits
3269 displacement from GP. */
3270 insn_disp = ((insn & 0xffff) ^ 0x8000) - 0x8000;
3271
3272 xdisp = disp + insn_disp;
3273 fits16 = (xdisp >= - (bfd_signed_vma) 0x8000 && xdisp < 0x8000);
3274 fits32 = (xdisp >= - (bfd_signed_vma) 0x80000000
3275 && xdisp < 0x7fff8000);
3276
3277 if (fits16)
3278 {
3279 /* Take the op code and dest from this insn, take the base
3280 register from the literal insn. Leave the offset alone. */
3281 insn = (insn & 0xffe0ffff) | (lit_insn & 0x001f0000);
d1c109de
RH
3282 bfd_put_32 (abfd, (bfd_vma) insn, contents + urel_r_offset);
3283 changed_contents = TRUE;
3284
3285 nrel = *urel;
3286 nrel.r_info = ELF64_R_INFO (ELF64_R_SYM (irel->r_info),
3287 R_ALPHA_GPREL16);
3288 nrel.r_addend = irel->r_addend;
3289
3290 /* As we adjust, move the reloc to the end so that we don't
3291 break the LITERAL+LITUSE chain. */
3292 if (urel < --erel)
3293 *urel-- = *erel;
3294 *erel = nrel;
3295 changed_relocs = TRUE;
252b5132 3296 }
252b5132 3297
a7519a3c
RH
3298 /* If all mem+byte, we can optimize 32-bit mem displacements. */
3299 else if (fits32 && !(flags & ~6))
3300 {
3301 /* FIXME: sanity check that lit insn Ra is mem insn Rb. */
252b5132 3302
a7519a3c
RH
3303 irel->r_info = ELF64_R_INFO (ELF64_R_SYM (irel->r_info),
3304 R_ALPHA_GPRELHIGH);
3305 lit_insn = (OP_LDAH << 26) | (lit_insn & 0x03ff0000);
d1c109de 3306 bfd_put_32 (abfd, (bfd_vma) lit_insn, contents + irel->r_offset);
a7519a3c 3307 lit_reused = TRUE;
d1c109de 3308 changed_contents = TRUE;
252b5132 3309
d1c109de
RH
3310 /* Since all relocs must be optimized, don't bother swapping
3311 this relocation to the end. */
a7519a3c
RH
3312 urel->r_info = ELF64_R_INFO (ELF64_R_SYM (irel->r_info),
3313 R_ALPHA_GPRELLOW);
3314 urel->r_addend = irel->r_addend;
d1c109de 3315 changed_relocs = TRUE;
a7519a3c
RH
3316 }
3317 else
3318 all_optimized = FALSE;
3319 break;
252b5132 3320
a7519a3c
RH
3321 case LITUSE_ALPHA_BYTOFF:
3322 /* We can always optimize byte instructions. */
252b5132 3323
a7519a3c
RH
3324 /* FIXME: sanity check the insn for byte op. Check that the
3325 literal dest reg is indeed Rb in the byte insn. */
252b5132 3326
a7519a3c
RH
3327 insn &= ~ (unsigned) 0x001ff000;
3328 insn |= ((symval & 7) << 13) | 0x1000;
d1c109de
RH
3329 bfd_put_32 (abfd, (bfd_vma) insn, contents + urel_r_offset);
3330 changed_contents = TRUE;
3331
3332 nrel = *urel;
3333 nrel.r_info = ELF64_R_INFO (0, R_ALPHA_NONE);
3334 nrel.r_addend = 0;
3335
3336 /* As we adjust, move the reloc to the end so that we don't
3337 break the LITERAL+LITUSE chain. */
3338 if (urel < --erel)
3339 *urel-- = *erel;
3340 *erel = nrel;
3341 changed_relocs = TRUE;
a7519a3c 3342 break;
252b5132 3343
a7519a3c
RH
3344 case LITUSE_ALPHA_JSR:
3345 case LITUSE_ALPHA_TLSGD:
3346 case LITUSE_ALPHA_TLSLDM:
8288a39e 3347 case LITUSE_ALPHA_JSRDIRECT:
0d5f9994 3348 {
a7519a3c
RH
3349 bfd_vma optdest, org;
3350 bfd_signed_vma odisp;
252b5132 3351
a7519a3c
RH
3352 /* For undefined weak symbols, we're mostly interested in getting
3353 rid of the got entry whenever possible, so optimize this to a
3354 use of the zero register. */
3355 if (info->h && info->h->root.root.type == bfd_link_hash_undefweak)
3356 {
3357 insn |= 31 << 16;
d1c109de 3358 bfd_put_32 (abfd, (bfd_vma) insn, contents + urel_r_offset);
252b5132 3359
d1c109de 3360 changed_contents = TRUE;
a7519a3c
RH
3361 break;
3362 }
252b5132 3363
a7519a3c
RH
3364 /* If not zero, place to jump without needing pv. */
3365 optdest = elf64_alpha_relax_opt_call (info, symval);
d1c109de 3366 org = sec_output_vma + urel_r_offset + 4;
a7519a3c 3367 odisp = (optdest ? optdest : symval) - org;
252b5132 3368
a7519a3c
RH
3369 if (odisp >= -0x400000 && odisp < 0x400000)
3370 {
3371 Elf_Internal_Rela *xrel;
252b5132 3372
a7519a3c
RH
3373 /* Preserve branch prediction call stack when possible. */
3374 if ((insn & INSN_JSR_MASK) == INSN_JSR)
3375 insn = (OP_BSR << 26) | (insn & 0x03e00000);
3376 else
3377 insn = (OP_BR << 26) | (insn & 0x03e00000);
d1c109de
RH
3378 bfd_put_32 (abfd, (bfd_vma) insn, contents + urel_r_offset);
3379 changed_contents = TRUE;
252b5132 3380
d1c109de
RH
3381 nrel = *urel;
3382 nrel.r_info = ELF64_R_INFO (ELF64_R_SYM (irel->r_info),
3383 R_ALPHA_BRADDR);
3384 nrel.r_addend = irel->r_addend;
252b5132 3385
a7519a3c 3386 if (optdest)
d1c109de 3387 nrel.r_addend += optdest - symval;
a7519a3c
RH
3388 else
3389 all_optimized = FALSE;
252b5132 3390
a7519a3c
RH
3391 /* Kill any HINT reloc that might exist for this insn. */
3392 xrel = (elf64_alpha_find_reloc_at_ofs
d1c109de 3393 (info->relocs, info->relend, urel_r_offset,
a7519a3c
RH
3394 R_ALPHA_HINT));
3395 if (xrel)
3396 xrel->r_info = ELF64_R_INFO (0, R_ALPHA_NONE);
252b5132 3397
d1c109de
RH
3398 /* As we adjust, move the reloc to the end so that we don't
3399 break the LITERAL+LITUSE chain. */
3400 if (urel < --erel)
3401 *urel-- = *erel;
3402 *erel = nrel;
3403
a7519a3c
RH
3404 info->changed_relocs = TRUE;
3405 }
3406 else
3407 all_optimized = FALSE;
252b5132 3408
a7519a3c
RH
3409 /* Even if the target is not in range for a direct branch,
3410 if we share a GP, we can eliminate the gp reload. */
3411 if (optdest)
3412 {
3413 Elf_Internal_Rela *gpdisp
3414 = (elf64_alpha_find_reloc_at_ofs
d1c109de 3415 (info->relocs, irelend, urel_r_offset + 4,
a7519a3c
RH
3416 R_ALPHA_GPDISP));
3417 if (gpdisp)
3418 {
d1c109de 3419 bfd_byte *p_ldah = contents + gpdisp->r_offset;
a7519a3c 3420 bfd_byte *p_lda = p_ldah + gpdisp->r_addend;
d1c109de
RH
3421 unsigned int ldah = bfd_get_32 (abfd, p_ldah);
3422 unsigned int lda = bfd_get_32 (abfd, p_lda);
252b5132 3423
a7519a3c
RH
3424 /* Verify that the instruction is "ldah $29,0($26)".
3425 Consider a function that ends in a noreturn call,
3426 and that the next function begins with an ldgp,
3427 and that by accident there is no padding between.
3428 In that case the insn would use $27 as the base. */
3429 if (ldah == 0x27ba0000 && lda == 0x23bd0000)
3430 {
d1c109de
RH
3431 bfd_put_32 (abfd, (bfd_vma) INSN_UNOP, p_ldah);
3432 bfd_put_32 (abfd, (bfd_vma) INSN_UNOP, p_lda);
252b5132 3433
a7519a3c 3434 gpdisp->r_info = ELF64_R_INFO (0, R_ALPHA_NONE);
d1c109de
RH
3435 changed_contents = TRUE;
3436 changed_relocs = TRUE;
a7519a3c
RH
3437 }
3438 }
3439 }
3440 }
3441 break;
252b5132 3442 }
252b5132
RH
3443 }
3444
d1c109de
RH
3445 /* If we reused the literal instruction, we must have optimized all. */
3446 BFD_ASSERT(!lit_reused || all_optimized);
3447
a7519a3c
RH
3448 /* If all cases were optimized, we can reduce the use count on this
3449 got entry by one, possibly eliminating it. */
3450 if (all_optimized)
252b5132 3451 {
a7519a3c 3452 if (--info->gotent->use_count == 0)
252b5132 3453 {
a7519a3c
RH
3454 int sz = alpha_got_entry_size (R_ALPHA_LITERAL);
3455 alpha_elf_tdata (info->gotobj)->total_got_size -= sz;
3456 if (!info->h)
3457 alpha_elf_tdata (info->gotobj)->local_got_size -= sz;
252b5132 3458 }
a7519a3c
RH
3459
3460 /* If the literal instruction is no longer needed (it may have been
3461 reused. We can eliminate it. */
3462 /* ??? For now, I don't want to deal with compacting the section,
3463 so just nop it out. */
3464 if (!lit_reused)
252b5132 3465 {
a7519a3c 3466 irel->r_info = ELF64_R_INFO (0, R_ALPHA_NONE);
d1c109de 3467 changed_relocs = TRUE;
252b5132 3468
d1c109de
RH
3469 bfd_put_32 (abfd, (bfd_vma) INSN_UNOP, contents + irel->r_offset);
3470 changed_contents = TRUE;
a7519a3c 3471 }
a7519a3c 3472 }
d1c109de
RH
3473
3474 info->changed_contents = changed_contents;
3475 info->changed_relocs = changed_relocs;
3476
3477 if (all_optimized || relax_pass == 0)
3478 return TRUE;
3479 return elf64_alpha_relax_got_load (info, symval, irel, R_ALPHA_LITERAL);
252b5132
RH
3480}
3481
b34976b6 3482static bfd_boolean
a7519a3c
RH
3483elf64_alpha_relax_tls_get_addr (struct alpha_relax_info *info, bfd_vma symval,
3484 Elf_Internal_Rela *irel, bfd_boolean is_gd)
f44f99a5 3485{
a7519a3c 3486 bfd_byte *pos[5];
891caa9b 3487 unsigned int insn, tlsgd_reg;
a7519a3c 3488 Elf_Internal_Rela *gpdisp, *hint;
891caa9b 3489 bfd_boolean dynamic, use_gottprel;
a7519a3c 3490 unsigned long new_symndx;
f44f99a5 3491
a7519a3c 3492 dynamic = alpha_elf_dynamic_symbol_p (&info->h->root, info->link_info);
f44f99a5 3493
a7519a3c
RH
3494 /* If a TLS symbol is accessed using IE at least once, there is no point
3495 to use dynamic model for it. */
3496 if (is_gd && info->h && (info->h->flags & ALPHA_ELF_LINK_HASH_TLS_IE))
3497 ;
f44f99a5 3498
a7519a3c
RH
3499 /* If the symbol is local, and we've already committed to DF_STATIC_TLS,
3500 then we might as well relax to IE. */
0e1862bb 3501 else if (bfd_link_pic (info->link_info) && !dynamic
a7519a3c
RH
3502 && (info->link_info->flags & DF_STATIC_TLS))
3503 ;
f44f99a5 3504
a7519a3c 3505 /* Otherwise we must be building an executable to do anything. */
0e1862bb 3506 else if (bfd_link_pic (info->link_info))
a7519a3c 3507 return TRUE;
f44f99a5 3508
a7519a3c
RH
3509 /* The TLSGD/TLSLDM relocation must be followed by a LITERAL and
3510 the matching LITUSE_TLS relocations. */
3511 if (irel + 2 >= info->relend)
3512 return TRUE;
3513 if (ELF64_R_TYPE (irel[1].r_info) != R_ALPHA_LITERAL
3514 || ELF64_R_TYPE (irel[2].r_info) != R_ALPHA_LITUSE
3515 || irel[2].r_addend != (is_gd ? LITUSE_ALPHA_TLSGD : LITUSE_ALPHA_TLSLDM))
3516 return TRUE;
f44f99a5 3517
a7519a3c
RH
3518 /* There must be a GPDISP relocation positioned immediately after the
3519 LITUSE relocation. */
3520 gpdisp = elf64_alpha_find_reloc_at_ofs (info->relocs, info->relend,
3521 irel[2].r_offset + 4, R_ALPHA_GPDISP);
3522 if (!gpdisp)
b34976b6 3523 return TRUE;
f44f99a5 3524
a7519a3c
RH
3525 pos[0] = info->contents + irel[0].r_offset;
3526 pos[1] = info->contents + irel[1].r_offset;
3527 pos[2] = info->contents + irel[2].r_offset;
3528 pos[3] = info->contents + gpdisp->r_offset;
3529 pos[4] = pos[3] + gpdisp->r_addend;
f44f99a5 3530
7dbf3b76
RH
3531 /* Beware of the compiler hoisting part of the sequence out a loop
3532 and adjusting the destination register for the TLSGD insn. If this
3533 happens, there will be a move into $16 before the JSR insn, so only
3534 transformations of the first insn pair should use this register. */
3535 tlsgd_reg = bfd_get_32 (info->abfd, pos[0]);
3536 tlsgd_reg = (tlsgd_reg >> 21) & 31;
3537
a7519a3c
RH
3538 /* Generally, the positions are not allowed to be out of order, lest the
3539 modified insn sequence have different register lifetimes. We can make
3540 an exception when pos 1 is adjacent to pos 0. */
3541 if (pos[1] + 4 == pos[0])
f44f99a5 3542 {
a7519a3c
RH
3543 bfd_byte *tmp = pos[0];
3544 pos[0] = pos[1];
3545 pos[1] = tmp;
f44f99a5 3546 }
a7519a3c
RH
3547 if (pos[1] >= pos[2] || pos[2] >= pos[3])
3548 return TRUE;
cc03ec80 3549
a7519a3c
RH
3550 /* Reduce the use count on the LITERAL relocation. Do this before we
3551 smash the symndx when we adjust the relocations below. */
3552 {
3553 struct alpha_elf_got_entry *lit_gotent;
3554 struct alpha_elf_link_hash_entry *lit_h;
3555 unsigned long indx;
f44f99a5 3556
a7519a3c
RH
3557 BFD_ASSERT (ELF64_R_SYM (irel[1].r_info) >= info->symtab_hdr->sh_info);
3558 indx = ELF64_R_SYM (irel[1].r_info) - info->symtab_hdr->sh_info;
3559 lit_h = alpha_elf_sym_hashes (info->abfd)[indx];
f44f99a5 3560
a7519a3c
RH
3561 while (lit_h->root.root.type == bfd_link_hash_indirect
3562 || lit_h->root.root.type == bfd_link_hash_warning)
3563 lit_h = (struct alpha_elf_link_hash_entry *) lit_h->root.root.u.i.link;
252b5132 3564
a7519a3c
RH
3565 for (lit_gotent = lit_h->got_entries; lit_gotent ;
3566 lit_gotent = lit_gotent->next)
3567 if (lit_gotent->gotobj == info->gotobj
3568 && lit_gotent->reloc_type == R_ALPHA_LITERAL
3569 && lit_gotent->addend == irel[1].r_addend)
3570 break;
3571 BFD_ASSERT (lit_gotent);
252b5132 3572
a7519a3c
RH
3573 if (--lit_gotent->use_count == 0)
3574 {
3575 int sz = alpha_got_entry_size (R_ALPHA_LITERAL);
3576 alpha_elf_tdata (info->gotobj)->total_got_size -= sz;
3577 }
3578 }
252b5132 3579
a7519a3c 3580 /* Change
252b5132 3581
a7519a3c
RH
3582 lda $16,x($gp) !tlsgd!1
3583 ldq $27,__tls_get_addr($gp) !literal!1
3584 jsr $26,($27),__tls_get_addr !lituse_tlsgd!1
3585 ldah $29,0($26) !gpdisp!2
3586 lda $29,0($29) !gpdisp!2
3587 to
3588 ldq $16,x($gp) !gottprel
3589 unop
3590 call_pal rduniq
3591 addq $16,$0,$0
3592 unop
3593 or the first pair to
3594 lda $16,x($gp) !tprel
3595 unop
3596 or
3597 ldah $16,x($gp) !tprelhi
3598 lda $16,x($16) !tprello
3599
3600 as appropriate. */
3601
3602 use_gottprel = FALSE;
cf35638d 3603 new_symndx = is_gd ? ELF64_R_SYM (irel->r_info) : STN_UNDEF;
891caa9b 3604
9a757e4d
RM
3605 /* Some compilers warn about a Boolean-looking expression being
3606 used in a switch. The explicit cast silences them. */
0e1862bb 3607 switch ((int) (!dynamic && !bfd_link_pic (info->link_info)))
252b5132 3608 {
a7519a3c
RH
3609 case 1:
3610 {
3611 bfd_vma tp_base;
3612 bfd_signed_vma disp;
252b5132 3613
a7519a3c
RH
3614 BFD_ASSERT (elf_hash_table (info->link_info)->tls_sec != NULL);
3615 tp_base = alpha_get_tprel_base (info->link_info);
3616 disp = symval - tp_base;
252b5132 3617
a7519a3c
RH
3618 if (disp >= -0x8000 && disp < 0x8000)
3619 {
891caa9b 3620 insn = (OP_LDA << 26) | (tlsgd_reg << 21) | (31 << 16);
a7519a3c
RH
3621 bfd_put_32 (info->abfd, (bfd_vma) insn, pos[0]);
3622 bfd_put_32 (info->abfd, (bfd_vma) INSN_UNOP, pos[1]);
3765b1be 3623
a7519a3c
RH
3624 irel[0].r_offset = pos[0] - info->contents;
3625 irel[0].r_info = ELF64_R_INFO (new_symndx, R_ALPHA_TPREL16);
3626 irel[1].r_info = ELF64_R_INFO (0, R_ALPHA_NONE);
3627 break;
3628 }
3629 else if (disp >= -(bfd_signed_vma) 0x80000000
3630 && disp < (bfd_signed_vma) 0x7fff8000
891caa9b 3631 && pos[0] + 4 == pos[1])
a7519a3c 3632 {
891caa9b 3633 insn = (OP_LDAH << 26) | (tlsgd_reg << 21) | (31 << 16);
a7519a3c 3634 bfd_put_32 (info->abfd, (bfd_vma) insn, pos[0]);
891caa9b 3635 insn = (OP_LDA << 26) | (tlsgd_reg << 21) | (tlsgd_reg << 16);
a7519a3c 3636 bfd_put_32 (info->abfd, (bfd_vma) insn, pos[1]);
3765b1be 3637
a7519a3c
RH
3638 irel[0].r_offset = pos[0] - info->contents;
3639 irel[0].r_info = ELF64_R_INFO (new_symndx, R_ALPHA_TPRELHI);
3640 irel[1].r_offset = pos[1] - info->contents;
3641 irel[1].r_info = ELF64_R_INFO (new_symndx, R_ALPHA_TPRELLO);
3642 break;
3643 }
3644 }
3645 /* FALLTHRU */
3765b1be 3646
3765b1be 3647 default:
a7519a3c
RH
3648 use_gottprel = TRUE;
3649
891caa9b 3650 insn = (OP_LDQ << 26) | (tlsgd_reg << 21) | (29 << 16);
a7519a3c
RH
3651 bfd_put_32 (info->abfd, (bfd_vma) insn, pos[0]);
3652 bfd_put_32 (info->abfd, (bfd_vma) INSN_UNOP, pos[1]);
3653
3654 irel[0].r_offset = pos[0] - info->contents;
3655 irel[0].r_info = ELF64_R_INFO (new_symndx, R_ALPHA_GOTTPREL);
3656 irel[1].r_info = ELF64_R_INFO (0, R_ALPHA_NONE);
3657 break;
3765b1be 3658 }
3765b1be 3659
a7519a3c 3660 bfd_put_32 (info->abfd, (bfd_vma) INSN_RDUNIQ, pos[2]);
252b5132 3661
a7519a3c
RH
3662 insn = INSN_ADDQ | (16 << 21) | (0 << 16) | (0 << 0);
3663 bfd_put_32 (info->abfd, (bfd_vma) insn, pos[3]);
3765b1be 3664
a7519a3c 3665 bfd_put_32 (info->abfd, (bfd_vma) INSN_UNOP, pos[4]);
e92d460e 3666
a7519a3c
RH
3667 irel[2].r_info = ELF64_R_INFO (0, R_ALPHA_NONE);
3668 gpdisp->r_info = ELF64_R_INFO (0, R_ALPHA_NONE);
252b5132 3669
a7519a3c
RH
3670 hint = elf64_alpha_find_reloc_at_ofs (info->relocs, info->relend,
3671 irel[2].r_offset, R_ALPHA_HINT);
3672 if (hint)
3673 hint->r_info = ELF64_R_INFO (0, R_ALPHA_NONE);
252b5132 3674
a7519a3c
RH
3675 info->changed_contents = TRUE;
3676 info->changed_relocs = TRUE;
d6ad34f6 3677
a7519a3c
RH
3678 /* Reduce the use count on the TLSGD/TLSLDM relocation. */
3679 if (--info->gotent->use_count == 0)
3765b1be 3680 {
a7519a3c
RH
3681 int sz = alpha_got_entry_size (info->gotent->reloc_type);
3682 alpha_elf_tdata (info->gotobj)->total_got_size -= sz;
3683 if (!info->h)
3684 alpha_elf_tdata (info->gotobj)->local_got_size -= sz;
3765b1be 3685 }
252b5132 3686
a7519a3c
RH
3687 /* If we've switched to a GOTTPREL relocation, increment the reference
3688 count on that got entry. */
3689 if (use_gottprel)
f44f99a5 3690 {
a7519a3c 3691 struct alpha_elf_got_entry *tprel_gotent;
f44f99a5 3692
a7519a3c
RH
3693 for (tprel_gotent = *info->first_gotent; tprel_gotent ;
3694 tprel_gotent = tprel_gotent->next)
3695 if (tprel_gotent->gotobj == info->gotobj
3696 && tprel_gotent->reloc_type == R_ALPHA_GOTTPREL
3697 && tprel_gotent->addend == irel->r_addend)
3698 break;
3699 if (tprel_gotent)
3700 tprel_gotent->use_count++;
3701 else
f44f99a5 3702 {
a7519a3c
RH
3703 if (info->gotent->use_count == 0)
3704 tprel_gotent = info->gotent;
3705 else
3706 {
3707 tprel_gotent = (struct alpha_elf_got_entry *)
3708 bfd_alloc (info->abfd, sizeof (struct alpha_elf_got_entry));
3709 if (!tprel_gotent)
3710 return FALSE;
f44f99a5 3711
a7519a3c
RH
3712 tprel_gotent->next = *info->first_gotent;
3713 *info->first_gotent = tprel_gotent;
f44f99a5 3714
a7519a3c
RH
3715 tprel_gotent->gotobj = info->gotobj;
3716 tprel_gotent->addend = irel->r_addend;
3717 tprel_gotent->got_offset = -1;
3718 tprel_gotent->reloc_done = 0;
3719 tprel_gotent->reloc_xlated = 0;
3720 }
f44f99a5 3721
a7519a3c
RH
3722 tprel_gotent->use_count = 1;
3723 tprel_gotent->reloc_type = R_ALPHA_GOTTPREL;
3724 }
f44f99a5 3725 }
f44f99a5 3726
b34976b6 3727 return TRUE;
f44f99a5
RH
3728}
3729
b34976b6 3730static bfd_boolean
a7519a3c
RH
3731elf64_alpha_relax_section (bfd *abfd, asection *sec,
3732 struct bfd_link_info *link_info, bfd_boolean *again)
f44f99a5 3733{
a7519a3c
RH
3734 Elf_Internal_Shdr *symtab_hdr;
3735 Elf_Internal_Rela *internal_relocs;
3736 Elf_Internal_Rela *irel, *irelend;
3737 Elf_Internal_Sym *isymbuf = NULL;
3738 struct alpha_elf_got_entry **local_got_entries;
3739 struct alpha_relax_info info;
4dfe6ac6 3740 struct alpha_elf_link_hash_table * htab;
d1c109de 3741 int relax_pass;
4dfe6ac6
NC
3742
3743 htab = alpha_elf_hash_table (link_info);
3744 if (htab == NULL)
3745 return FALSE;
f44f99a5 3746
4a828aab 3747 /* There's nothing to change, yet. */
a7519a3c 3748 *again = FALSE;
f44f99a5 3749
0e1862bb 3750 if (bfd_link_relocatable (link_info)
a7519a3c
RH
3751 || ((sec->flags & (SEC_CODE | SEC_RELOC | SEC_ALLOC))
3752 != (SEC_CODE | SEC_RELOC | SEC_ALLOC))
3753 || sec->reloc_count == 0)
d6ad34f6
RH
3754 return TRUE;
3755
0ffa91dd 3756 BFD_ASSERT (is_alpha_elf (abfd));
d1c109de 3757 relax_pass = link_info->relax_pass;
0ffa91dd 3758
4a828aab 3759 /* Make sure our GOT and PLT tables are up-to-date. */
4dfe6ac6 3760 if (htab->relax_trip != link_info->relax_trip)
4a828aab 3761 {
4dfe6ac6 3762 htab->relax_trip = link_info->relax_trip;
4a828aab 3763
d1c109de
RH
3764 /* This should never fail after the initial round, since the only error
3765 is GOT overflow, and relaxation only shrinks the table. However, we
3766 may only merge got sections during the first pass. If we merge
3767 sections after we've created GPREL relocs, the GP for the merged
3768 section backs up which may put the relocs out of range. */
3769 if (!elf64_alpha_size_got_sections (link_info, relax_pass == 0))
4a828aab
RH
3770 abort ();
3771 if (elf_hash_table (link_info)->dynamic_sections_created)
3772 {
3773 elf64_alpha_size_plt_section (link_info);
3774 elf64_alpha_size_rela_got_section (link_info);
3775 }
3776 }
3777
0ffa91dd 3778 symtab_hdr = &elf_symtab_hdr (abfd);
a7519a3c 3779 local_got_entries = alpha_elf_tdata(abfd)->local_got_entries;
252b5132 3780
a7519a3c
RH
3781 /* Load the relocations for this section. */
3782 internal_relocs = (_bfd_elf_link_read_relocs
2c3fc389 3783 (abfd, sec, NULL, (Elf_Internal_Rela *) NULL,
a7519a3c
RH
3784 link_info->keep_memory));
3785 if (internal_relocs == NULL)
3786 return FALSE;
252b5132 3787
a7519a3c
RH
3788 memset(&info, 0, sizeof (info));
3789 info.abfd = abfd;
3790 info.sec = sec;
3791 info.link_info = link_info;
3792 info.symtab_hdr = symtab_hdr;
3793 info.relocs = internal_relocs;
3794 info.relend = irelend = internal_relocs + sec->reloc_count;
3795
3796 /* Find the GP for this object. Do not store the result back via
3797 _bfd_set_gp_value, since this could change again before final. */
3798 info.gotobj = alpha_elf_tdata (abfd)->gotobj;
3799 if (info.gotobj)
3765b1be 3800 {
a7519a3c
RH
3801 asection *sgot = alpha_elf_tdata (info.gotobj)->got;
3802 info.gp = (sgot->output_section->vma
3803 + sgot->output_offset
3804 + 0x8000);
252b5132
RH
3805 }
3806
a7519a3c
RH
3807 /* Get the section contents. */
3808 if (elf_section_data (sec)->this_hdr.contents != NULL)
3809 info.contents = elf_section_data (sec)->this_hdr.contents;
3810 else
3811 {
3812 if (!bfd_malloc_and_get_section (abfd, sec, &info.contents))
3813 goto error_return;
3814 }
252b5132 3815
a7519a3c
RH
3816 for (irel = internal_relocs; irel < irelend; irel++)
3817 {
3818 bfd_vma symval;
3819 struct alpha_elf_got_entry *gotent;
3820 unsigned long r_type = ELF64_R_TYPE (irel->r_info);
3821 unsigned long r_symndx = ELF64_R_SYM (irel->r_info);
3822
3823 /* Early exit for unhandled or unrelaxable relocations. */
d1c109de
RH
3824 if (r_type != R_ALPHA_LITERAL)
3825 {
3826 /* We complete everything except LITERAL in the first pass. */
3827 if (relax_pass != 0)
3828 continue;
3829 if (r_type == R_ALPHA_TLSLDM)
3830 {
3831 /* The symbol for a TLSLDM reloc is ignored. Collapse the
3832 reloc to the STN_UNDEF (0) symbol so that they all match. */
3833 r_symndx = STN_UNDEF;
3834 }
3835 else if (r_type != R_ALPHA_GOTDTPREL
3836 && r_type != R_ALPHA_GOTTPREL
3837 && r_type != R_ALPHA_TLSGD)
3838 continue;
a7519a3c
RH
3839 }
3840
3841 /* Get the value of the symbol referred to by the reloc. */
3842 if (r_symndx < symtab_hdr->sh_info)
3843 {
3844 /* A local symbol. */
3845 Elf_Internal_Sym *isym;
3846
3847 /* Read this BFD's local symbols. */
3848 if (isymbuf == NULL)
3849 {
3850 isymbuf = (Elf_Internal_Sym *) symtab_hdr->contents;
3851 if (isymbuf == NULL)
3852 isymbuf = bfd_elf_get_elf_syms (abfd, symtab_hdr,
3853 symtab_hdr->sh_info, 0,
3854 NULL, NULL, NULL);
3855 if (isymbuf == NULL)
3856 goto error_return;
3857 }
252b5132 3858
a7519a3c 3859 isym = isymbuf + r_symndx;
252b5132 3860
a7519a3c
RH
3861 /* Given the symbol for a TLSLDM reloc is ignored, this also
3862 means forcing the symbol value to the tp base. */
3863 if (r_type == R_ALPHA_TLSLDM)
3864 {
3865 info.tsec = bfd_abs_section_ptr;
3866 symval = alpha_get_tprel_base (info.link_info);
3867 }
3868 else
3869 {
3870 symval = isym->st_value;
3871 if (isym->st_shndx == SHN_UNDEF)
3872 continue;
3873 else if (isym->st_shndx == SHN_ABS)
3874 info.tsec = bfd_abs_section_ptr;
3875 else if (isym->st_shndx == SHN_COMMON)
3876 info.tsec = bfd_com_section_ptr;
3877 else
3878 info.tsec = bfd_section_from_elf_index (abfd, isym->st_shndx);
3879 }
252b5132 3880
a7519a3c
RH
3881 info.h = NULL;
3882 info.other = isym->st_other;
3883 if (local_got_entries)
3884 info.first_gotent = &local_got_entries[r_symndx];
3885 else
3886 {
3887 info.first_gotent = &info.gotent;
3888 info.gotent = NULL;
3889 }
252b5132 3890 }
a7519a3c
RH
3891 else
3892 {
3893 unsigned long indx;
3894 struct alpha_elf_link_hash_entry *h;
252b5132 3895
a7519a3c
RH
3896 indx = r_symndx - symtab_hdr->sh_info;
3897 h = alpha_elf_sym_hashes (abfd)[indx];
3898 BFD_ASSERT (h != NULL);
252b5132 3899
a7519a3c
RH
3900 while (h->root.root.type == bfd_link_hash_indirect
3901 || h->root.root.type == bfd_link_hash_warning)
3902 h = (struct alpha_elf_link_hash_entry *)h->root.root.u.i.link;
252b5132 3903
a7519a3c
RH
3904 /* If the symbol is undefined, we can't do anything with it. */
3905 if (h->root.root.type == bfd_link_hash_undefined)
3906 continue;
252b5132 3907
a7519a3c
RH
3908 /* If the symbol isn't defined in the current module,
3909 again we can't do anything. */
3910 if (h->root.root.type == bfd_link_hash_undefweak)
3911 {
3912 info.tsec = bfd_abs_section_ptr;
3913 symval = 0;
3914 }
3915 else if (!h->root.def_regular)
3916 {
3917 /* Except for TLSGD relocs, which can sometimes be
3918 relaxed to GOTTPREL relocs. */
3919 if (r_type != R_ALPHA_TLSGD)
3920 continue;
3921 info.tsec = bfd_abs_section_ptr;
3922 symval = 0;
3923 }
3924 else
3925 {
3926 info.tsec = h->root.root.u.def.section;
3927 symval = h->root.root.u.def.value;
3928 }
252b5132 3929
a7519a3c
RH
3930 info.h = h;
3931 info.other = h->root.other;
3932 info.first_gotent = &h->got_entries;
3933 }
252b5132 3934
a7519a3c
RH
3935 /* Search for the got entry to be used by this relocation. */
3936 for (gotent = *info.first_gotent; gotent ; gotent = gotent->next)
3937 if (gotent->gotobj == info.gotobj
3938 && gotent->reloc_type == r_type
3939 && gotent->addend == irel->r_addend)
3940 break;
3941 info.gotent = gotent;
252b5132 3942
a7519a3c
RH
3943 symval += info.tsec->output_section->vma + info.tsec->output_offset;
3944 symval += irel->r_addend;
252b5132 3945
a7519a3c 3946 switch (r_type)
252b5132 3947 {
a7519a3c
RH
3948 case R_ALPHA_LITERAL:
3949 BFD_ASSERT(info.gotent != NULL);
252b5132 3950
a7519a3c
RH
3951 /* If there exist LITUSE relocations immediately following, this
3952 opens up all sorts of interesting optimizations, because we
3953 now know every location that this address load is used. */
3954 if (irel+1 < irelend
3955 && ELF64_R_TYPE (irel[1].r_info) == R_ALPHA_LITUSE)
252b5132 3956 {
a7519a3c
RH
3957 if (!elf64_alpha_relax_with_lituse (&info, symval, irel))
3958 goto error_return;
252b5132 3959 }
a7519a3c
RH
3960 else
3961 {
3962 if (!elf64_alpha_relax_got_load (&info, symval, irel, r_type))
3963 goto error_return;
3964 }
3965 break;
252b5132 3966
a7519a3c
RH
3967 case R_ALPHA_GOTDTPREL:
3968 case R_ALPHA_GOTTPREL:
3969 BFD_ASSERT(info.gotent != NULL);
3970 if (!elf64_alpha_relax_got_load (&info, symval, irel, r_type))
3971 goto error_return;
3972 break;
3973
3974 case R_ALPHA_TLSGD:
3975 case R_ALPHA_TLSLDM:
3976 BFD_ASSERT(info.gotent != NULL);
3977 if (!elf64_alpha_relax_tls_get_addr (&info, symval, irel,
3978 r_type == R_ALPHA_TLSGD))
3979 goto error_return;
3980 break;
252b5132
RH
3981 }
3982 }
3983
a7519a3c
RH
3984 if (isymbuf != NULL
3985 && symtab_hdr->contents != (unsigned char *) isymbuf)
3986 {
3987 if (!link_info->keep_memory)
3988 free (isymbuf);
3989 else
252b5132 3990 {
a7519a3c
RH
3991 /* Cache the symbols for elf_link_input_bfd. */
3992 symtab_hdr->contents = (unsigned char *) isymbuf;
252b5132 3993 }
a7519a3c 3994 }
252b5132 3995
a7519a3c
RH
3996 if (info.contents != NULL
3997 && elf_section_data (sec)->this_hdr.contents != info.contents)
3998 {
3999 if (!info.changed_contents && !link_info->keep_memory)
4000 free (info.contents);
4001 else
252b5132 4002 {
a7519a3c
RH
4003 /* Cache the section contents for elf_link_input_bfd. */
4004 elf_section_data (sec)->this_hdr.contents = info.contents;
252b5132 4005 }
a7519a3c 4006 }
252b5132 4007
a7519a3c
RH
4008 if (elf_section_data (sec)->relocs != internal_relocs)
4009 {
4010 if (!info.changed_relocs)
4011 free (internal_relocs);
4012 else
4013 elf_section_data (sec)->relocs = internal_relocs;
252b5132 4014 }
a7519a3c
RH
4015
4016 *again = info.changed_contents || info.changed_relocs;
252b5132 4017
b34976b6 4018 return TRUE;
252b5132 4019
a7519a3c
RH
4020 error_return:
4021 if (isymbuf != NULL
4022 && symtab_hdr->contents != (unsigned char *) isymbuf)
4023 free (isymbuf);
4024 if (info.contents != NULL
4025 && elf_section_data (sec)->this_hdr.contents != info.contents)
4026 free (info.contents);
4027 if (internal_relocs != NULL
4028 && elf_section_data (sec)->relocs != internal_relocs)
4029 free (internal_relocs);
4030 return FALSE;
4031}
4032\f
1bbc9cec
RH
4033/* Emit a dynamic relocation for (DYNINDX, RTYPE, ADDEND) at (SEC, OFFSET)
4034 into the next available slot in SREL. */
4035
4036static void
a7519a3c
RH
4037elf64_alpha_emit_dynrel (bfd *abfd, struct bfd_link_info *info,
4038 asection *sec, asection *srel, bfd_vma offset,
4039 long dynindx, long rtype, bfd_vma addend)
1bbc9cec
RH
4040{
4041 Elf_Internal_Rela outrel;
4042 bfd_byte *loc;
4043
4044 BFD_ASSERT (srel != NULL);
4045
4046 outrel.r_info = ELF64_R_INFO (dynindx, rtype);
4047 outrel.r_addend = addend;
4048
4049 offset = _bfd_elf_section_offset (abfd, info, sec, offset);
4050 if ((offset | 1) != (bfd_vma) -1)
4051 outrel.r_offset = sec->output_section->vma + sec->output_offset + offset;
4052 else
4053 memset (&outrel, 0, sizeof (outrel));
4054
4055 loc = srel->contents;
4056 loc += srel->reloc_count++ * sizeof (Elf64_External_Rela);
4057 bfd_elf64_swap_reloca_out (abfd, &outrel, loc);
eea6121a 4058 BFD_ASSERT (sizeof (Elf64_External_Rela) * srel->reloc_count <= srel->size);
1bbc9cec
RH
4059}
4060
4a67a098
RH
4061/* Relocate an Alpha ELF section for a relocatable link.
4062
4063 We don't have to change anything unless the reloc is against a section
4064 symbol, in which case we have to adjust according to where the section
4065 symbol winds up in the output section. */
4066
b34976b6 4067static bfd_boolean
a7519a3c
RH
4068elf64_alpha_relocate_section_r (bfd *output_bfd ATTRIBUTE_UNUSED,
4069 struct bfd_link_info *info ATTRIBUTE_UNUSED,
4070 bfd *input_bfd, asection *input_section,
4071 bfd_byte *contents ATTRIBUTE_UNUSED,
4072 Elf_Internal_Rela *relocs,
4073 Elf_Internal_Sym *local_syms,
4074 asection **local_sections)
4a67a098
RH
4075{
4076 unsigned long symtab_hdr_sh_info;
4077 Elf_Internal_Rela *rel;
4078 Elf_Internal_Rela *relend;
ab96bf03 4079 struct elf_link_hash_entry **sym_hashes;
b34976b6 4080 bfd_boolean ret_val = TRUE;
4a67a098 4081
0ffa91dd 4082 symtab_hdr_sh_info = elf_symtab_hdr (input_bfd).sh_info;
ab96bf03 4083 sym_hashes = elf_sym_hashes (input_bfd);
4a67a098
RH
4084
4085 relend = relocs + input_section->reloc_count;
4086 for (rel = relocs; rel < relend; rel++)
4087 {
4088 unsigned long r_symndx;
4089 Elf_Internal_Sym *sym;
4090 asection *sec;
4091 unsigned long r_type;
4092
ab96bf03 4093 r_type = ELF64_R_TYPE (rel->r_info);
4a67a098
RH
4094 if (r_type >= R_ALPHA_max)
4095 {
4eca0228 4096 _bfd_error_handler
695344c0 4097 /* xgettext:c-format */
d003868e
AM
4098 (_("%B: unknown relocation type %d"),
4099 input_bfd, (int) r_type);
4a67a098 4100 bfd_set_error (bfd_error_bad_value);
b34976b6 4101 ret_val = FALSE;
4a67a098
RH
4102 continue;
4103 }
4104
4a67a098
RH
4105 /* The symbol associated with GPDISP and LITUSE is
4106 immaterial. Only the addend is significant. */
4107 if (r_type == R_ALPHA_GPDISP || r_type == R_ALPHA_LITUSE)
4108 continue;
4109
ab96bf03 4110 r_symndx = ELF64_R_SYM (rel->r_info);
4a67a098
RH
4111 if (r_symndx < symtab_hdr_sh_info)
4112 {
4113 sym = local_syms + r_symndx;
ab96bf03 4114 sec = local_sections[r_symndx];
4a67a098 4115 }
ab96bf03
AM
4116 else
4117 {
4118 struct elf_link_hash_entry *h;
4119
4120 h = sym_hashes[r_symndx - symtab_hdr_sh_info];
4121
4122 while (h->root.type == bfd_link_hash_indirect
4123 || h->root.type == bfd_link_hash_warning)
4124 h = (struct elf_link_hash_entry *) h->root.u.i.link;
4125
4126 if (h->root.type != bfd_link_hash_defined
4127 && h->root.type != bfd_link_hash_defweak)
4128 continue;
4129
4130 sym = NULL;
4131 sec = h->root.u.def.section;
4132 }
4133
dbaa2011 4134 if (sec != NULL && discarded_section (sec))
e4067dbb 4135 RELOC_AGAINST_DISCARDED_SECTION (info, input_bfd, input_section,
545fd46b
MR
4136 rel, 1, relend,
4137 elf64_alpha_howto_table + r_type, 0,
e4067dbb 4138 contents);
ab96bf03
AM
4139
4140 if (sym != NULL && ELF_ST_TYPE (sym->st_info) == STT_SECTION)
4141 rel->r_addend += sec->output_offset;
4a67a098
RH
4142 }
4143
4144 return ret_val;
4145}
4146
252b5132
RH
4147/* Relocate an Alpha ELF section. */
4148
b34976b6 4149static bfd_boolean
a7519a3c
RH
4150elf64_alpha_relocate_section (bfd *output_bfd, struct bfd_link_info *info,
4151 bfd *input_bfd, asection *input_section,
4152 bfd_byte *contents, Elf_Internal_Rela *relocs,
4153 Elf_Internal_Sym *local_syms,
4154 asection **local_sections)
252b5132 4155{
4a67a098 4156 Elf_Internal_Shdr *symtab_hdr;
252b5132
RH
4157 Elf_Internal_Rela *rel;
4158 Elf_Internal_Rela *relend;
4a67a098
RH
4159 asection *sgot, *srel, *srelgot;
4160 bfd *dynobj, *gotobj;
4161 bfd_vma gp, tp_base, dtp_base;
4162 struct alpha_elf_got_entry **local_got_entries;
b34976b6 4163 bfd_boolean ret_val;
252b5132 4164
0ffa91dd 4165 BFD_ASSERT (is_alpha_elf (input_bfd));
68ffbac6 4166
4a67a098 4167 /* Handle relocatable links with a smaller loop. */
0e1862bb 4168 if (bfd_link_relocatable (info))
4a67a098
RH
4169 return elf64_alpha_relocate_section_r (output_bfd, info, input_bfd,
4170 input_section, contents, relocs,
4171 local_syms, local_sections);
4172
4173 /* This is a final link. */
4174
b34976b6 4175 ret_val = TRUE;
252b5132 4176
0ffa91dd 4177 symtab_hdr = &elf_symtab_hdr (input_bfd);
3765b1be 4178
4a67a098 4179 dynobj = elf_hash_table (info)->dynobj;
ce558b89 4180 srelgot = elf_hash_table (info)->srelgot;
4a67a098 4181
3241278a
RH
4182 if (input_section->flags & SEC_ALLOC)
4183 {
4184 const char *section_name;
4185 section_name = (bfd_elf_string_from_elf_section
4186 (input_bfd, elf_elfheader(input_bfd)->e_shstrndx,
d4730f92 4187 _bfd_elf_single_rel_hdr (input_section)->sh_name));
3241278a 4188 BFD_ASSERT(section_name != NULL);
3d4d4302 4189 srel = bfd_get_linker_section (dynobj, section_name);
3241278a
RH
4190 }
4191 else
4192 srel = NULL;
3765b1be 4193
4a67a098
RH
4194 /* Find the gp value for this input bfd. */
4195 gotobj = alpha_elf_tdata (input_bfd)->gotobj;
4196 if (gotobj)
4197 {
4198 sgot = alpha_elf_tdata (gotobj)->got;
4199 gp = _bfd_get_gp_value (gotobj);
4200 if (gp == 0)
252b5132 4201 {
4a67a098
RH
4202 gp = (sgot->output_section->vma
4203 + sgot->output_offset
4204 + 0x8000);
4205 _bfd_set_gp_value (gotobj, gp);
4206 }
4207 }
4208 else
4209 {
4210 sgot = NULL;
4211 gp = 0;
4212 }
3765b1be 4213
4a67a098
RH
4214 local_got_entries = alpha_elf_tdata(input_bfd)->local_got_entries;
4215
e1918d23 4216 if (elf_hash_table (info)->tls_sec != NULL)
4a67a098 4217 {
e1918d23
AM
4218 dtp_base = alpha_get_dtprel_base (info);
4219 tp_base = alpha_get_tprel_base (info);
252b5132 4220 }
4a67a098
RH
4221 else
4222 dtp_base = tp_base = 0;
252b5132 4223
252b5132 4224 relend = relocs + input_section->reloc_count;
4a67a098 4225 for (rel = relocs; rel < relend; rel++)
252b5132 4226 {
4a67a098 4227 struct alpha_elf_link_hash_entry *h = NULL;
3765b1be
RH
4228 struct alpha_elf_got_entry *gotent;
4229 bfd_reloc_status_type r;
252b5132
RH
4230 reloc_howto_type *howto;
4231 unsigned long r_symndx;
4a67a098
RH
4232 Elf_Internal_Sym *sym = NULL;
4233 asection *sec = NULL;
3765b1be 4234 bfd_vma value;
dc810e39 4235 bfd_vma addend;
b34976b6 4236 bfd_boolean dynamic_symbol_p;
1d5316ab 4237 bfd_boolean unresolved_reloc = FALSE;
b34976b6 4238 bfd_boolean undef_weak_ref = FALSE;
3765b1be 4239 unsigned long r_type;
252b5132
RH
4240
4241 r_type = ELF64_R_TYPE(rel->r_info);
3765b1be 4242 if (r_type >= R_ALPHA_max)
252b5132 4243 {
4eca0228 4244 _bfd_error_handler
695344c0 4245 /* xgettext:c-format */
d003868e
AM
4246 (_("%B: unknown relocation type %d"),
4247 input_bfd, (int) r_type);
252b5132 4248 bfd_set_error (bfd_error_bad_value);
b34976b6 4249 ret_val = FALSE;
3765b1be 4250 continue;
252b5132 4251 }
252b5132 4252
3765b1be 4253 howto = elf64_alpha_howto_table + r_type;
252b5132
RH
4254 r_symndx = ELF64_R_SYM(rel->r_info);
4255
cc03ec80 4256 /* The symbol for a TLSLDM reloc is ignored. Collapse the
cf35638d 4257 reloc to the STN_UNDEF (0) symbol so that they all match. */
cc03ec80 4258 if (r_type == R_ALPHA_TLSLDM)
cf35638d 4259 r_symndx = STN_UNDEF;
cc03ec80 4260
252b5132
RH
4261 if (r_symndx < symtab_hdr->sh_info)
4262 {
8517fae7 4263 asection *msec;
252b5132
RH
4264 sym = local_syms + r_symndx;
4265 sec = local_sections[r_symndx];
8517fae7
AM
4266 msec = sec;
4267 value = _bfd_elf_rela_local_sym (output_bfd, sym, &msec, rel);
3765b1be 4268
cf35638d 4269 /* If this is a tp-relative relocation against sym STN_UNDEF (0),
cc03ec80 4270 this is hackery from relax_section. Force the value to
f915360b 4271 be the tls module base. */
cf35638d 4272 if (r_symndx == STN_UNDEF
cc03ec80
RH
4273 && (r_type == R_ALPHA_TLSLDM
4274 || r_type == R_ALPHA_GOTTPREL
4275 || r_type == R_ALPHA_TPREL64
4276 || r_type == R_ALPHA_TPRELHI
4277 || r_type == R_ALPHA_TPRELLO
4278 || r_type == R_ALPHA_TPREL16))
f915360b 4279 value = dtp_base;
cc03ec80 4280
4a67a098
RH
4281 if (local_got_entries)
4282 gotent = local_got_entries[r_symndx];
4283 else
4284 gotent = NULL;
3765b1be
RH
4285
4286 /* Need to adjust local GOT entries' addends for SEC_MERGE
4287 unless it has been done already. */
4288 if ((sec->flags & SEC_MERGE)
048d873d 4289 && ELF_ST_TYPE (sym->st_info) == STT_SECTION
dbaa2011 4290 && sec->sec_info_type == SEC_INFO_TYPE_MERGE
048d873d
RH
4291 && gotent
4292 && !gotent->reloc_xlated)
3765b1be
RH
4293 {
4294 struct alpha_elf_got_entry *ent;
3765b1be
RH
4295
4296 for (ent = gotent; ent; ent = ent->next)
4297 {
4298 ent->reloc_xlated = 1;
4299 if (ent->use_count == 0)
4300 continue;
4301 msec = sec;
4302 ent->addend =
4303 _bfd_merged_section_offset (output_bfd, &msec,
4304 elf_section_data (sec)->
4305 sec_info,
753731ee 4306 sym->st_value + ent->addend);
3765b1be
RH
4307 ent->addend -= sym->st_value;
4308 ent->addend += msec->output_section->vma
4309 + msec->output_offset
4310 - sec->output_section->vma
4311 - sec->output_offset;
4312 }
4313 }
4314
b34976b6 4315 dynamic_symbol_p = FALSE;
252b5132
RH
4316 }
4317 else
4318 {
62d887d4 4319 bfd_boolean warned, ignored;
560e09e9 4320 struct elf_link_hash_entry *hh;
b2a8e766
AM
4321 struct elf_link_hash_entry **sym_hashes = elf_sym_hashes (input_bfd);
4322
4323 RELOC_FOR_GLOBAL_SYMBOL (info, input_bfd, input_section, rel,
4324 r_symndx, symtab_hdr, sym_hashes,
4325 hh, sec, value,
62d887d4 4326 unresolved_reloc, warned, ignored);
560e09e9
NC
4327
4328 if (warned)
4329 continue;
252b5132 4330
560e09e9
NC
4331 if (value == 0
4332 && ! unresolved_reloc
4333 && hh->root.type == bfd_link_hash_undefweak)
b34976b6 4334 undef_weak_ref = TRUE;
3765b1be 4335
560e09e9 4336 h = (struct alpha_elf_link_hash_entry *) hh;
3765b1be
RH
4337 dynamic_symbol_p = alpha_elf_dynamic_symbol_p (&h->root, info);
4338 gotent = h->got_entries;
252b5132 4339 }
3765b1be 4340
dbaa2011 4341 if (sec != NULL && discarded_section (sec))
e4067dbb 4342 RELOC_AGAINST_DISCARDED_SECTION (info, input_bfd, input_section,
545fd46b 4343 rel, 1, relend, howto, 0, contents);
ab96bf03 4344
252b5132 4345 addend = rel->r_addend;
3765b1be
RH
4346 value += addend;
4347
4348 /* Search for the proper got entry. */
4349 for (; gotent ; gotent = gotent->next)
4350 if (gotent->gotobj == gotobj
4351 && gotent->reloc_type == r_type
4352 && gotent->addend == addend)
4353 break;
252b5132
RH
4354
4355 switch (r_type)
4356 {
4357 case R_ALPHA_GPDISP:
4358 {
4359 bfd_byte *p_ldah, *p_lda;
4360
4361 BFD_ASSERT(gp != 0);
4362
3765b1be
RH
4363 value = (input_section->output_section->vma
4364 + input_section->output_offset
4365 + rel->r_offset);
252b5132 4366
3765b1be 4367 p_ldah = contents + rel->r_offset;
252b5132
RH
4368 p_lda = p_ldah + rel->r_addend;
4369
3765b1be 4370 r = elf64_alpha_do_reloc_gpdisp (input_bfd, gp - value,
252b5132
RH
4371 p_ldah, p_lda);
4372 }
4373 break;
4374
252b5132 4375 case R_ALPHA_LITERAL:
3765b1be
RH
4376 BFD_ASSERT(sgot != NULL);
4377 BFD_ASSERT(gp != 0);
4378 BFD_ASSERT(gotent != NULL);
4379 BFD_ASSERT(gotent->use_count >= 1);
f7460f5f 4380
3765b1be
RH
4381 if (!gotent->reloc_done)
4382 {
4383 gotent->reloc_done = 1;
252b5132 4384
3765b1be
RH
4385 bfd_put_64 (output_bfd, value,
4386 sgot->contents + gotent->got_offset);
252b5132 4387
3765b1be
RH
4388 /* If the symbol has been forced local, output a
4389 RELATIVE reloc, otherwise it will be handled in
4390 finish_dynamic_symbol. */
0e1862bb
L
4391 if (bfd_link_pic (info)
4392 && !dynamic_symbol_p
4393 && !undef_weak_ref)
1bbc9cec
RH
4394 elf64_alpha_emit_dynrel (output_bfd, info, sgot, srelgot,
4395 gotent->got_offset, 0,
4396 R_ALPHA_RELATIVE, value);
3765b1be 4397 }
252b5132 4398
3765b1be
RH
4399 value = (sgot->output_section->vma
4400 + sgot->output_offset
4401 + gotent->got_offset);
4402 value -= gp;
252b5132
RH
4403 goto default_reloc;
4404
4405 case R_ALPHA_GPREL32:
ec1659c8 4406 case R_ALPHA_GPREL16:
252b5132 4407 case R_ALPHA_GPRELLOW:
3765b1be 4408 if (dynamic_symbol_p)
f16fbd61 4409 {
4eca0228 4410 _bfd_error_handler
695344c0 4411 /* xgettext:c-format */
d003868e
AM
4412 (_("%B: gp-relative relocation against dynamic symbol %s"),
4413 input_bfd, h->root.root.root.string);
b34976b6 4414 ret_val = FALSE;
f16fbd61 4415 }
252b5132 4416 BFD_ASSERT(gp != 0);
3765b1be 4417 value -= gp;
252b5132
RH
4418 goto default_reloc;
4419
4420 case R_ALPHA_GPRELHIGH:
3765b1be 4421 if (dynamic_symbol_p)
f16fbd61 4422 {
4eca0228 4423 _bfd_error_handler
695344c0 4424 /* xgettext:c-format */
d003868e
AM
4425 (_("%B: gp-relative relocation against dynamic symbol %s"),
4426 input_bfd, h->root.root.root.string);
b34976b6 4427 ret_val = FALSE;
f16fbd61 4428 }
252b5132 4429 BFD_ASSERT(gp != 0);
3765b1be
RH
4430 value -= gp;
4431 value = ((bfd_signed_vma) value >> 16) + ((value >> 15) & 1);
252b5132
RH
4432 goto default_reloc;
4433
252b5132 4434 case R_ALPHA_HINT:
f94952df
RH
4435 /* A call to a dynamic symbol is definitely out of range of
4436 the 16-bit displacement. Don't bother writing anything. */
3765b1be 4437 if (dynamic_symbol_p)
f94952df
RH
4438 {
4439 r = bfd_reloc_ok;
4440 break;
4441 }
3765b1be
RH
4442 /* The regular PC-relative stuff measures from the start of
4443 the instruction rather than the end. */
4444 value -= 4;
4445 goto default_reloc;
f94952df
RH
4446
4447 case R_ALPHA_BRADDR:
3765b1be
RH
4448 if (dynamic_symbol_p)
4449 {
4eca0228 4450 _bfd_error_handler
695344c0 4451 /* xgettext:c-format */
d003868e
AM
4452 (_("%B: pc-relative relocation against dynamic symbol %s"),
4453 input_bfd, h->root.root.root.string);
b34976b6 4454 ret_val = FALSE;
3765b1be 4455 }
252b5132
RH
4456 /* The regular PC-relative stuff measures from the start of
4457 the instruction rather than the end. */
3765b1be 4458 value -= 4;
252b5132
RH
4459 goto default_reloc;
4460
7793f4d0
RH
4461 case R_ALPHA_BRSGP:
4462 {
4463 int other;
4464 const char *name;
4465
4466 /* The regular PC-relative stuff measures from the start of
4467 the instruction rather than the end. */
3765b1be 4468 value -= 4;
7793f4d0 4469
ccf00ab6
RH
4470 /* The source and destination gp must be the same. Note that
4471 the source will always have an assigned gp, since we forced
4472 one in check_relocs, but that the destination may not, as
cedb70c5 4473 it might not have had any relocations at all. Also take
ccf00ab6
RH
4474 care not to crash if H is an undefined symbol. */
4475 if (h != NULL && sec != NULL
4476 && alpha_elf_tdata (sec->owner)->gotobj
7793f4d0
RH
4477 && gotobj != alpha_elf_tdata (sec->owner)->gotobj)
4478 {
4eca0228 4479 _bfd_error_handler
695344c0 4480 /* xgettext:c-format */
d003868e
AM
4481 (_("%B: change in gp: BRSGP %s"),
4482 input_bfd, h->root.root.root.string);
b34976b6 4483 ret_val = FALSE;
7793f4d0
RH
4484 }
4485
4486 /* The symbol should be marked either NOPV or STD_GPLOAD. */
4487 if (h != NULL)
4488 other = h->root.other;
4489 else
4490 other = sym->st_other;
4491 switch (other & STO_ALPHA_STD_GPLOAD)
4492 {
4493 case STO_ALPHA_NOPV:
4494 break;
4495 case STO_ALPHA_STD_GPLOAD:
64e04ecd 4496 value += 8;
7793f4d0
RH
4497 break;
4498 default:
4499 if (h != NULL)
4500 name = h->root.root.root.string;
4501 else
4502 {
4503 name = (bfd_elf_string_from_elf_section
4504 (input_bfd, symtab_hdr->sh_link, sym->st_name));
4505 if (name == NULL)
4506 name = _("<unknown>");
4507 else if (name[0] == 0)
4508 name = bfd_section_name (input_bfd, sec);
4509 }
4eca0228 4510 _bfd_error_handler
695344c0 4511 /* xgettext:c-format */
d003868e
AM
4512 (_("%B: !samegp reloc against symbol without .prologue: %s"),
4513 input_bfd, name);
b34976b6 4514 ret_val = FALSE;
7793f4d0
RH
4515 break;
4516 }
4517
4518 goto default_reloc;
4519 }
4520
252b5132
RH
4521 case R_ALPHA_REFLONG:
4522 case R_ALPHA_REFQUAD:
3765b1be
RH
4523 case R_ALPHA_DTPREL64:
4524 case R_ALPHA_TPREL64:
252b5132 4525 {
1bbc9cec
RH
4526 long dynindx, dyntype = r_type;
4527 bfd_vma dynaddend;
252b5132
RH
4528
4529 /* Careful here to remember RELATIVE relocations for global
4530 variables for symbolic shared objects. */
4531
3765b1be 4532 if (dynamic_symbol_p)
252b5132
RH
4533 {
4534 BFD_ASSERT(h->root.dynindx != -1);
1bbc9cec
RH
4535 dynindx = h->root.dynindx;
4536 dynaddend = addend;
3765b1be
RH
4537 addend = 0, value = 0;
4538 }
4539 else if (r_type == R_ALPHA_DTPREL64)
4540 {
e1918d23 4541 BFD_ASSERT (elf_hash_table (info)->tls_sec != NULL);
3765b1be
RH
4542 value -= dtp_base;
4543 goto default_reloc;
4544 }
4545 else if (r_type == R_ALPHA_TPREL64)
4546 {
e1918d23 4547 BFD_ASSERT (elf_hash_table (info)->tls_sec != NULL);
3cbc1e5e 4548 if (!bfd_link_dll (info))
1bbc9cec
RH
4549 {
4550 value -= tp_base;
4551 goto default_reloc;
4552 }
4553 dynindx = 0;
4554 dynaddend = value - dtp_base;
252b5132 4555 }
0e1862bb 4556 else if (bfd_link_pic (info)
cf35638d 4557 && r_symndx != STN_UNDEF
d6ad34f6 4558 && (input_section->flags & SEC_ALLOC)
1d5316ab
AM
4559 && !undef_weak_ref
4560 && !(unresolved_reloc
4561 && (_bfd_elf_section_offset (output_bfd, info,
4562 input_section,
4563 rel->r_offset)
4564 == (bfd_vma) -1)))
252b5132 4565 {
3765b1be
RH
4566 if (r_type == R_ALPHA_REFLONG)
4567 {
4eca0228 4568 _bfd_error_handler
695344c0 4569 /* xgettext:c-format */
d003868e
AM
4570 (_("%B: unhandled dynamic relocation against %s"),
4571 input_bfd,
3765b1be 4572 h->root.root.root.string);
b34976b6 4573 ret_val = FALSE;
3765b1be 4574 }
1bbc9cec
RH
4575 dynindx = 0;
4576 dyntype = R_ALPHA_RELATIVE;
4577 dynaddend = value;
252b5132
RH
4578 }
4579 else
4580 goto default_reloc;
4581
3241278a
RH
4582 if (input_section->flags & SEC_ALLOC)
4583 elf64_alpha_emit_dynrel (output_bfd, info, input_section,
4584 srel, rel->r_offset, dynindx,
4585 dyntype, dynaddend);
252b5132
RH
4586 }
4587 goto default_reloc;
4588
3765b1be 4589 case R_ALPHA_SREL16:
84de6048
RH
4590 case R_ALPHA_SREL32:
4591 case R_ALPHA_SREL64:
3765b1be
RH
4592 if (dynamic_symbol_p)
4593 {
4eca0228 4594 _bfd_error_handler
695344c0 4595 /* xgettext:c-format */
d003868e
AM
4596 (_("%B: pc-relative relocation against dynamic symbol %s"),
4597 input_bfd, h->root.root.root.string);
b34976b6 4598 ret_val = FALSE;
3765b1be 4599 }
3cbc1e5e 4600 else if (bfd_link_pic (info)
0e1862bb 4601 && undef_weak_ref)
d6ad34f6 4602 {
4eca0228 4603 _bfd_error_handler
695344c0 4604 /* xgettext:c-format */
d6ad34f6
RH
4605 (_("%B: pc-relative relocation against undefined weak symbol %s"),
4606 input_bfd, h->root.root.root.string);
4607 ret_val = FALSE;
4608 }
4609
3765b1be 4610
84de6048
RH
4611 /* ??? .eh_frame references to discarded sections will be smashed
4612 to relocations against SHN_UNDEF. The .eh_frame format allows
4613 NULL to be encoded as 0 in any format, so this works here. */
1d5316ab
AM
4614 if (r_symndx == STN_UNDEF
4615 || (unresolved_reloc
4616 && _bfd_elf_section_offset (output_bfd, info,
4617 input_section,
4618 rel->r_offset) == (bfd_vma) -1))
84de6048
RH
4619 howto = (elf64_alpha_howto_table
4620 + (r_type - R_ALPHA_SREL32 + R_ALPHA_REFLONG));
4621 goto default_reloc;
4622
3765b1be
RH
4623 case R_ALPHA_TLSLDM:
4624 /* Ignore the symbol for the relocation. The result is always
4625 the current module. */
4626 dynamic_symbol_p = 0;
4627 /* FALLTHRU */
4628
4629 case R_ALPHA_TLSGD:
4630 if (!gotent->reloc_done)
4631 {
4632 gotent->reloc_done = 1;
4633
4634 /* Note that the module index for the main program is 1. */
0e1862bb
L
4635 bfd_put_64 (output_bfd,
4636 !bfd_link_pic (info) && !dynamic_symbol_p,
3765b1be
RH
4637 sgot->contents + gotent->got_offset);
4638
4639 /* If the symbol has been forced local, output a
4640 DTPMOD64 reloc, otherwise it will be handled in
4641 finish_dynamic_symbol. */
0e1862bb 4642 if (bfd_link_pic (info) && !dynamic_symbol_p)
1bbc9cec
RH
4643 elf64_alpha_emit_dynrel (output_bfd, info, sgot, srelgot,
4644 gotent->got_offset, 0,
4645 R_ALPHA_DTPMOD64, 0);
3765b1be
RH
4646
4647 if (dynamic_symbol_p || r_type == R_ALPHA_TLSLDM)
4648 value = 0;
4649 else
4650 {
e1918d23 4651 BFD_ASSERT (elf_hash_table (info)->tls_sec != NULL);
3765b1be
RH
4652 value -= dtp_base;
4653 }
4654 bfd_put_64 (output_bfd, value,
4655 sgot->contents + gotent->got_offset + 8);
4656 }
4657
4658 value = (sgot->output_section->vma
4659 + sgot->output_offset
4660 + gotent->got_offset);
4661 value -= gp;
4662 goto default_reloc;
4663
4664 case R_ALPHA_DTPRELHI:
4665 case R_ALPHA_DTPRELLO:
4666 case R_ALPHA_DTPREL16:
4667 if (dynamic_symbol_p)
4668 {
4eca0228 4669 _bfd_error_handler
695344c0 4670 /* xgettext:c-format */
d003868e
AM
4671 (_("%B: dtp-relative relocation against dynamic symbol %s"),
4672 input_bfd, h->root.root.root.string);
b34976b6 4673 ret_val = FALSE;
3765b1be 4674 }
e1918d23 4675 BFD_ASSERT (elf_hash_table (info)->tls_sec != NULL);
3765b1be 4676 value -= dtp_base;
9e756d64
RH
4677 if (r_type == R_ALPHA_DTPRELHI)
4678 value = ((bfd_signed_vma) value >> 16) + ((value >> 15) & 1);
3765b1be
RH
4679 goto default_reloc;
4680
4681 case R_ALPHA_TPRELHI:
4682 case R_ALPHA_TPRELLO:
4683 case R_ALPHA_TPREL16:
3cbc1e5e 4684 if (bfd_link_dll (info))
9e756d64 4685 {
4eca0228 4686 _bfd_error_handler
695344c0 4687 /* xgettext:c-format */
d003868e
AM
4688 (_("%B: TLS local exec code cannot be linked into shared objects"),
4689 input_bfd);
b34976b6 4690 ret_val = FALSE;
9e756d64
RH
4691 }
4692 else if (dynamic_symbol_p)
3765b1be 4693 {
4eca0228 4694 _bfd_error_handler
695344c0 4695 /* xgettext:c-format */
d003868e
AM
4696 (_("%B: tp-relative relocation against dynamic symbol %s"),
4697 input_bfd, h->root.root.root.string);
b34976b6 4698 ret_val = FALSE;
3765b1be 4699 }
e1918d23 4700 BFD_ASSERT (elf_hash_table (info)->tls_sec != NULL);
3765b1be 4701 value -= tp_base;
9e756d64
RH
4702 if (r_type == R_ALPHA_TPRELHI)
4703 value = ((bfd_signed_vma) value >> 16) + ((value >> 15) & 1);
3765b1be
RH
4704 goto default_reloc;
4705
4706 case R_ALPHA_GOTDTPREL:
4707 case R_ALPHA_GOTTPREL:
4708 BFD_ASSERT(sgot != NULL);
4709 BFD_ASSERT(gp != 0);
4710 BFD_ASSERT(gotent != NULL);
4711 BFD_ASSERT(gotent->use_count >= 1);
4712
4713 if (!gotent->reloc_done)
4714 {
4715 gotent->reloc_done = 1;
4716
4717 if (dynamic_symbol_p)
4718 value = 0;
4719 else
4720 {
e1918d23 4721 BFD_ASSERT (elf_hash_table (info)->tls_sec != NULL);
1bbc9cec
RH
4722 if (r_type == R_ALPHA_GOTDTPREL)
4723 value -= dtp_base;
0e1862bb 4724 else if (!bfd_link_pic (info))
1bbc9cec
RH
4725 value -= tp_base;
4726 else
4727 {
4728 elf64_alpha_emit_dynrel (output_bfd, info, sgot, srelgot,
4729 gotent->got_offset, 0,
4730 R_ALPHA_TPREL64,
4731 value - dtp_base);
4732 value = 0;
4733 }
3765b1be
RH
4734 }
4735 bfd_put_64 (output_bfd, value,
4736 sgot->contents + gotent->got_offset);
4737 }
4738
4739 value = (sgot->output_section->vma
4740 + sgot->output_offset
4741 + gotent->got_offset);
4742 value -= gp;
4743 goto default_reloc;
4744
252b5132
RH
4745 default:
4746 default_reloc:
4747 r = _bfd_final_link_relocate (howto, input_bfd, input_section,
3765b1be 4748 contents, rel->r_offset, value, 0);
252b5132
RH
4749 break;
4750 }
4751
4752 switch (r)
4753 {
4754 case bfd_reloc_ok:
4755 break;
4756
4757 case bfd_reloc_overflow:
4758 {
4759 const char *name;
4760
ed4de5e2
JJ
4761 /* Don't warn if the overflow is due to pc relative reloc
4762 against discarded section. Section optimization code should
4763 handle it. */
4764
4765 if (r_symndx < symtab_hdr->sh_info
4766 && sec != NULL && howto->pc_relative
dbaa2011 4767 && discarded_section (sec))
ed4de5e2
JJ
4768 break;
4769
252b5132 4770 if (h != NULL)
dfeffb9f 4771 name = NULL;
252b5132
RH
4772 else
4773 {
4774 name = (bfd_elf_string_from_elf_section
4775 (input_bfd, symtab_hdr->sh_link, sym->st_name));
4776 if (name == NULL)
b34976b6 4777 return FALSE;
252b5132
RH
4778 if (*name == '\0')
4779 name = bfd_section_name (input_bfd, sec);
4780 }
1a72702b
AM
4781 (*info->callbacks->reloc_overflow)
4782 (info, (h ? &h->root.root : NULL), name, howto->name,
4783 (bfd_vma) 0, input_bfd, input_section, rel->r_offset);
252b5132
RH
4784 }
4785 break;
4786
4787 default:
4788 case bfd_reloc_outofrange:
4789 abort ();
4790 }
4791 }
4792
f16fbd61 4793 return ret_val;
252b5132
RH
4794}
4795
4796/* Finish up dynamic symbol handling. We set the contents of various
4797 dynamic sections here. */
4798
b34976b6 4799static bfd_boolean
a7519a3c
RH
4800elf64_alpha_finish_dynamic_symbol (bfd *output_bfd, struct bfd_link_info *info,
4801 struct elf_link_hash_entry *h,
4802 Elf_Internal_Sym *sym)
252b5132 4803{
6ec7057a 4804 struct alpha_elf_link_hash_entry *ah = (struct alpha_elf_link_hash_entry *)h;
252b5132 4805
6ec7057a 4806 if (h->needs_plt)
252b5132
RH
4807 {
4808 /* Fill in the .plt entry for this symbol. */
4809 asection *splt, *sgot, *srel;
4810 Elf_Internal_Rela outrel;
947216bf 4811 bfd_byte *loc;
252b5132
RH
4812 bfd_vma got_addr, plt_addr;
4813 bfd_vma plt_index;
4814 struct alpha_elf_got_entry *gotent;
4815
4816 BFD_ASSERT (h->dynindx != -1);
4817
ce558b89 4818 splt = elf_hash_table (info)->splt;
252b5132 4819 BFD_ASSERT (splt != NULL);
ce558b89 4820 srel = elf_hash_table (info)->srelplt;
252b5132 4821 BFD_ASSERT (srel != NULL);
252b5132 4822
6ec7057a
RH
4823 for (gotent = ah->got_entries; gotent ; gotent = gotent->next)
4824 if (gotent->reloc_type == R_ALPHA_LITERAL
4825 && gotent->use_count > 0)
4826 {
4827 unsigned int insn;
4828 int disp;
252b5132 4829
6ec7057a
RH
4830 sgot = alpha_elf_tdata (gotent->gotobj)->got;
4831 BFD_ASSERT (sgot != NULL);
252b5132 4832
6ec7057a
RH
4833 BFD_ASSERT (gotent->got_offset != -1);
4834 BFD_ASSERT (gotent->plt_offset != -1);
252b5132 4835
6ec7057a
RH
4836 got_addr = (sgot->output_section->vma
4837 + sgot->output_offset
4838 + gotent->got_offset);
4839 plt_addr = (splt->output_section->vma
4840 + splt->output_offset
4841 + gotent->plt_offset);
252b5132 4842
6ec7057a 4843 plt_index = (gotent->plt_offset-PLT_HEADER_SIZE) / PLT_ENTRY_SIZE;
252b5132 4844
6ec7057a
RH
4845 /* Fill in the entry in the procedure linkage table. */
4846 if (elf64_alpha_use_secureplt)
4847 {
4848 disp = (PLT_HEADER_SIZE - 4) - (gotent->plt_offset + 4);
4849 insn = INSN_AD (INSN_BR, 31, disp);
4850 bfd_put_32 (output_bfd, insn,
4851 splt->contents + gotent->plt_offset);
252b5132 4852
6ec7057a
RH
4853 plt_index = ((gotent->plt_offset - NEW_PLT_HEADER_SIZE)
4854 / NEW_PLT_ENTRY_SIZE);
4855 }
4856 else
4857 {
4858 disp = -(gotent->plt_offset + 4);
4859 insn = INSN_AD (INSN_BR, 28, disp);
4860 bfd_put_32 (output_bfd, insn,
4861 splt->contents + gotent->plt_offset);
4862 bfd_put_32 (output_bfd, INSN_UNOP,
4863 splt->contents + gotent->plt_offset + 4);
4864 bfd_put_32 (output_bfd, INSN_UNOP,
4865 splt->contents + gotent->plt_offset + 8);
4866
4867 plt_index = ((gotent->plt_offset - OLD_PLT_HEADER_SIZE)
4868 / OLD_PLT_ENTRY_SIZE);
4869 }
252b5132 4870
6ec7057a
RH
4871 /* Fill in the entry in the .rela.plt section. */
4872 outrel.r_offset = got_addr;
4873 outrel.r_info = ELF64_R_INFO(h->dynindx, R_ALPHA_JMP_SLOT);
4874 outrel.r_addend = 0;
252b5132 4875
6ec7057a
RH
4876 loc = srel->contents + plt_index * sizeof (Elf64_External_Rela);
4877 bfd_elf64_swap_reloca_out (output_bfd, &outrel, loc);
252b5132 4878
6ec7057a
RH
4879 /* Fill in the entry in the .got. */
4880 bfd_put_64 (output_bfd, plt_addr,
4881 sgot->contents + gotent->got_offset);
4882 }
252b5132
RH
4883 }
4884 else if (alpha_elf_dynamic_symbol_p (h, info))
4885 {
4886 /* Fill in the dynamic relocations for this symbol's .got entries. */
4887 asection *srel;
252b5132
RH
4888 struct alpha_elf_got_entry *gotent;
4889
ce558b89 4890 srel = elf_hash_table (info)->srelgot;
252b5132
RH
4891 BFD_ASSERT (srel != NULL);
4892
252b5132
RH
4893 for (gotent = ((struct alpha_elf_link_hash_entry *) h)->got_entries;
4894 gotent != NULL;
4895 gotent = gotent->next)
4896 {
f44f99a5 4897 asection *sgot;
1bbc9cec 4898 long r_type;
3765b1be 4899
f44f99a5
RH
4900 if (gotent->use_count == 0)
4901 continue;
4902
4903 sgot = alpha_elf_tdata (gotent->gotobj)->got;
3765b1be
RH
4904
4905 r_type = gotent->reloc_type;
4906 switch (r_type)
4907 {
4908 case R_ALPHA_LITERAL:
4909 r_type = R_ALPHA_GLOB_DAT;
4910 break;
4911 case R_ALPHA_TLSGD:
4912 r_type = R_ALPHA_DTPMOD64;
4913 break;
4914 case R_ALPHA_GOTDTPREL:
4915 r_type = R_ALPHA_DTPREL64;
4916 break;
4917 case R_ALPHA_GOTTPREL:
4918 r_type = R_ALPHA_TPREL64;
4919 break;
4920 case R_ALPHA_TLSLDM:
4921 default:
4922 abort ();
4923 }
4924
68ffbac6 4925 elf64_alpha_emit_dynrel (output_bfd, info, sgot, srel,
1bbc9cec
RH
4926 gotent->got_offset, h->dynindx,
4927 r_type, gotent->addend);
3765b1be
RH
4928
4929 if (gotent->reloc_type == R_ALPHA_TLSGD)
68ffbac6 4930 elf64_alpha_emit_dynrel (output_bfd, info, sgot, srel,
1bbc9cec
RH
4931 gotent->got_offset + 8, h->dynindx,
4932 R_ALPHA_DTPREL64, gotent->addend);
252b5132
RH
4933 }
4934 }
4935
4936 /* Mark some specially defined symbols as absolute. */
9637f6ef 4937 if (h == elf_hash_table (info)->hdynamic
22edb2f1
RS
4938 || h == elf_hash_table (info)->hgot
4939 || h == elf_hash_table (info)->hplt)
252b5132
RH
4940 sym->st_shndx = SHN_ABS;
4941
b34976b6 4942 return TRUE;
252b5132
RH
4943}
4944
4945/* Finish up the dynamic sections. */
4946
b34976b6 4947static bfd_boolean
a7519a3c
RH
4948elf64_alpha_finish_dynamic_sections (bfd *output_bfd,
4949 struct bfd_link_info *info)
252b5132
RH
4950{
4951 bfd *dynobj;
4952 asection *sdyn;
4953
4954 dynobj = elf_hash_table (info)->dynobj;
3d4d4302 4955 sdyn = bfd_get_linker_section (dynobj, ".dynamic");
252b5132
RH
4956
4957 if (elf_hash_table (info)->dynamic_sections_created)
4958 {
6ec7057a 4959 asection *splt, *sgotplt, *srelaplt;
252b5132 4960 Elf64_External_Dyn *dyncon, *dynconend;
6ec7057a 4961 bfd_vma plt_vma, gotplt_vma;
252b5132 4962
ce558b89
AM
4963 splt = elf_hash_table (info)->splt;
4964 srelaplt = elf_hash_table (info)->srelplt;
252b5132
RH
4965 BFD_ASSERT (splt != NULL && sdyn != NULL);
4966
6ec7057a
RH
4967 plt_vma = splt->output_section->vma + splt->output_offset;
4968
4969 gotplt_vma = 0;
4970 if (elf64_alpha_use_secureplt)
4971 {
ce558b89 4972 sgotplt = elf_hash_table (info)->sgotplt;
6ec7057a
RH
4973 BFD_ASSERT (sgotplt != NULL);
4974 if (sgotplt->size > 0)
4975 gotplt_vma = sgotplt->output_section->vma + sgotplt->output_offset;
4976 }
4977
252b5132 4978 dyncon = (Elf64_External_Dyn *) sdyn->contents;
eea6121a 4979 dynconend = (Elf64_External_Dyn *) (sdyn->contents + sdyn->size);
252b5132
RH
4980 for (; dyncon < dynconend; dyncon++)
4981 {
4982 Elf_Internal_Dyn dyn;
252b5132
RH
4983
4984 bfd_elf64_swap_dyn_in (dynobj, dyncon, &dyn);
4985
4986 switch (dyn.d_tag)
4987 {
4988 case DT_PLTGOT:
6ec7057a
RH
4989 dyn.d_un.d_ptr
4990 = elf64_alpha_use_secureplt ? gotplt_vma : plt_vma;
4991 break;
252b5132 4992 case DT_PLTRELSZ:
6ec7057a
RH
4993 dyn.d_un.d_val = srelaplt ? srelaplt->size : 0;
4994 break;
252b5132 4995 case DT_JMPREL:
4ade44b7
AM
4996 dyn.d_un.d_ptr = srelaplt ? (srelaplt->output_section->vma
4997 + srelaplt->output_offset) : 0;
6ec7057a 4998 break;
252b5132
RH
4999 }
5000
5001 bfd_elf64_swap_dyn_out (output_bfd, &dyn, dyncon);
5002 }
5003
6ec7057a 5004 /* Initialize the plt header. */
eea6121a 5005 if (splt->size > 0)
252b5132 5006 {
6ec7057a
RH
5007 unsigned int insn;
5008 int ofs;
5009
5010 if (elf64_alpha_use_secureplt)
5011 {
5012 ofs = gotplt_vma - (plt_vma + PLT_HEADER_SIZE);
5013
5014 insn = INSN_ABC (INSN_SUBQ, 27, 28, 25);
5015 bfd_put_32 (output_bfd, insn, splt->contents);
5016
5017 insn = INSN_ABO (INSN_LDAH, 28, 28, (ofs + 0x8000) >> 16);
5018 bfd_put_32 (output_bfd, insn, splt->contents + 4);
5019
5020 insn = INSN_ABC (INSN_S4SUBQ, 25, 25, 25);
5021 bfd_put_32 (output_bfd, insn, splt->contents + 8);
5022
5023 insn = INSN_ABO (INSN_LDA, 28, 28, ofs);
5024 bfd_put_32 (output_bfd, insn, splt->contents + 12);
5025
5026 insn = INSN_ABO (INSN_LDQ, 27, 28, 0);
5027 bfd_put_32 (output_bfd, insn, splt->contents + 16);
5028
5029 insn = INSN_ABC (INSN_ADDQ, 25, 25, 25);
5030 bfd_put_32 (output_bfd, insn, splt->contents + 20);
5031
5032 insn = INSN_ABO (INSN_LDQ, 28, 28, 8);
5033 bfd_put_32 (output_bfd, insn, splt->contents + 24);
5034
5035 insn = INSN_AB (INSN_JMP, 31, 27);
5036 bfd_put_32 (output_bfd, insn, splt->contents + 28);
5037
5038 insn = INSN_AD (INSN_BR, 28, -PLT_HEADER_SIZE);
5039 bfd_put_32 (output_bfd, insn, splt->contents + 32);
5040 }
5041 else
5042 {
5043 insn = INSN_AD (INSN_BR, 27, 0); /* br $27, .+4 */
5044 bfd_put_32 (output_bfd, insn, splt->contents);
5045
5046 insn = INSN_ABO (INSN_LDQ, 27, 27, 12);
5047 bfd_put_32 (output_bfd, insn, splt->contents + 4);
5048
5049 insn = INSN_UNOP;
5050 bfd_put_32 (output_bfd, insn, splt->contents + 8);
5051
5052 insn = INSN_AB (INSN_JMP, 27, 27);
5053 bfd_put_32 (output_bfd, insn, splt->contents + 12);
5054
5055 /* The next two words will be filled in by ld.so. */
5056 bfd_put_64 (output_bfd, 0, splt->contents + 16);
5057 bfd_put_64 (output_bfd, 0, splt->contents + 24);
5058 }
252b5132 5059
eecdbe52 5060 elf_section_data (splt->output_section)->this_hdr.sh_entsize = 0;
252b5132
RH
5061 }
5062 }
5063
b34976b6 5064 return TRUE;
252b5132
RH
5065}
5066
96e2734b
RH
5067/* We need to use a special link routine to handle the .mdebug section.
5068 We need to merge all instances of these sections together, not write
5069 them all out sequentially. */
252b5132 5070
b34976b6 5071static bfd_boolean
a7519a3c 5072elf64_alpha_final_link (bfd *abfd, struct bfd_link_info *info)
252b5132
RH
5073{
5074 asection *o;
5075 struct bfd_link_order *p;
96e2734b 5076 asection *mdebug_sec;
252b5132
RH
5077 struct ecoff_debug_info debug;
5078 const struct ecoff_debug_swap *swap
5079 = get_elf_backend_data (abfd)->elf_backend_ecoff_debug_swap;
5080 HDRR *symhdr = &debug.symbolic_header;
4dfe6ac6
NC
5081 void * mdebug_handle = NULL;
5082 struct alpha_elf_link_hash_table * htab;
5083
5084 htab = alpha_elf_hash_table (info);
5085 if (htab == NULL)
5086 return FALSE;
252b5132 5087
96e2734b 5088 /* Go through the sections and collect the mdebug information. */
252b5132 5089 mdebug_sec = NULL;
252b5132
RH
5090 for (o = abfd->sections; o != (asection *) NULL; o = o->next)
5091 {
252b5132
RH
5092 if (strcmp (o->name, ".mdebug") == 0)
5093 {
5094 struct extsym_info einfo;
5095
5096 /* We have found the .mdebug section in the output file.
5097 Look through all the link_orders comprising it and merge
5098 the information together. */
5099 symhdr->magic = swap->sym_magic;
5100 /* FIXME: What should the version stamp be? */
5101 symhdr->vstamp = 0;
5102 symhdr->ilineMax = 0;
5103 symhdr->cbLine = 0;
5104 symhdr->idnMax = 0;
5105 symhdr->ipdMax = 0;
5106 symhdr->isymMax = 0;
5107 symhdr->ioptMax = 0;
5108 symhdr->iauxMax = 0;
5109 symhdr->issMax = 0;
5110 symhdr->issExtMax = 0;
5111 symhdr->ifdMax = 0;
5112 symhdr->crfd = 0;
5113 symhdr->iextMax = 0;
5114
5115 /* We accumulate the debugging information itself in the
5116 debug_info structure. */
5117 debug.line = NULL;
5118 debug.external_dnr = NULL;
5119 debug.external_pdr = NULL;
5120 debug.external_sym = NULL;
5121 debug.external_opt = NULL;
5122 debug.external_aux = NULL;
5123 debug.ss = NULL;
5124 debug.ssext = debug.ssext_end = NULL;
5125 debug.external_fdr = NULL;
5126 debug.external_rfd = NULL;
5127 debug.external_ext = debug.external_ext_end = NULL;
5128
5129 mdebug_handle = bfd_ecoff_debug_init (abfd, &debug, swap, info);
2c3fc389 5130 if (mdebug_handle == NULL)
b34976b6 5131 return FALSE;
252b5132
RH
5132
5133 if (1)
5134 {
5135 asection *s;
5136 EXTR esym;
52b9d213 5137 bfd_vma last = 0;
252b5132
RH
5138 unsigned int i;
5139 static const char * const name[] =
5140 {
5141 ".text", ".init", ".fini", ".data",
5142 ".rodata", ".sdata", ".sbss", ".bss"
5143 };
5144 static const int sc[] = { scText, scInit, scFini, scData,
5145 scRData, scSData, scSBss, scBss };
5146
5147 esym.jmptbl = 0;
5148 esym.cobol_main = 0;
5149 esym.weakext = 0;
5150 esym.reserved = 0;
5151 esym.ifd = ifdNil;
5152 esym.asym.iss = issNil;
5153 esym.asym.st = stLocal;
5154 esym.asym.reserved = 0;
5155 esym.asym.index = indexNil;
5156 for (i = 0; i < 8; i++)
5157 {
5158 esym.asym.sc = sc[i];
5159 s = bfd_get_section_by_name (abfd, name[i]);
5160 if (s != NULL)
5161 {
5162 esym.asym.value = s->vma;
eea6121a 5163 last = s->vma + s->size;
252b5132
RH
5164 }
5165 else
5166 esym.asym.value = last;
5167
5168 if (! bfd_ecoff_debug_one_external (abfd, &debug, swap,
5169 name[i], &esym))
b34976b6 5170 return FALSE;
252b5132
RH
5171 }
5172 }
5173
8423293d 5174 for (p = o->map_head.link_order;
252b5132
RH
5175 p != (struct bfd_link_order *) NULL;
5176 p = p->next)
5177 {
5178 asection *input_section;
5179 bfd *input_bfd;
5180 const struct ecoff_debug_swap *input_swap;
5181 struct ecoff_debug_info input_debug;
5182 char *eraw_src;
5183 char *eraw_end;
5184
5185 if (p->type != bfd_indirect_link_order)
5186 {
fd96f80f 5187 if (p->type == bfd_data_link_order)
252b5132
RH
5188 continue;
5189 abort ();
5190 }
5191
5192 input_section = p->u.indirect.section;
5193 input_bfd = input_section->owner;
5194
0ffa91dd
NC
5195 if (! is_alpha_elf (input_bfd))
5196 /* I don't know what a non ALPHA ELF bfd would be
5197 doing with a .mdebug section, but I don't really
5198 want to deal with it. */
5199 continue;
252b5132
RH
5200
5201 input_swap = (get_elf_backend_data (input_bfd)
5202 ->elf_backend_ecoff_debug_swap);
5203
eea6121a 5204 BFD_ASSERT (p->size == input_section->size);
252b5132
RH
5205
5206 /* The ECOFF linking code expects that we have already
5207 read in the debugging information and set up an
5208 ecoff_debug_info structure, so we do that now. */
5209 if (!elf64_alpha_read_ecoff_info (input_bfd, input_section,
5210 &input_debug))
b34976b6 5211 return FALSE;
252b5132
RH
5212
5213 if (! (bfd_ecoff_debug_accumulate
5214 (mdebug_handle, abfd, &debug, swap, input_bfd,
5215 &input_debug, input_swap, info)))
b34976b6 5216 return FALSE;
252b5132
RH
5217
5218 /* Loop through the external symbols. For each one with
5219 interesting information, try to find the symbol in
5220 the linker global hash table and save the information
5221 for the output external symbols. */
21d799b5 5222 eraw_src = (char *) input_debug.external_ext;
252b5132
RH
5223 eraw_end = (eraw_src
5224 + (input_debug.symbolic_header.iextMax
5225 * input_swap->external_ext_size));
5226 for (;
5227 eraw_src < eraw_end;
5228 eraw_src += input_swap->external_ext_size)
5229 {
5230 EXTR ext;
5231 const char *name;
5232 struct alpha_elf_link_hash_entry *h;
5233
2c3fc389 5234 (*input_swap->swap_ext_in) (input_bfd, eraw_src, &ext);
252b5132
RH
5235 if (ext.asym.sc == scNil
5236 || ext.asym.sc == scUndefined
5237 || ext.asym.sc == scSUndefined)
5238 continue;
5239
5240 name = input_debug.ssext + ext.asym.iss;
4dfe6ac6 5241 h = alpha_elf_link_hash_lookup (htab, name, FALSE, FALSE, TRUE);
252b5132
RH
5242 if (h == NULL || h->esym.ifd != -2)
5243 continue;
5244
5245 if (ext.ifd != -1)
5246 {
5247 BFD_ASSERT (ext.ifd
5248 < input_debug.symbolic_header.ifdMax);
5249 ext.ifd = input_debug.ifdmap[ext.ifd];
5250 }
5251
5252 h->esym = ext;
5253 }
5254
5255 /* Free up the information we just read. */
5256 free (input_debug.line);
5257 free (input_debug.external_dnr);
5258 free (input_debug.external_pdr);
5259 free (input_debug.external_sym);
5260 free (input_debug.external_opt);
5261 free (input_debug.external_aux);
5262 free (input_debug.ss);
5263 free (input_debug.ssext);
5264 free (input_debug.external_fdr);
5265 free (input_debug.external_rfd);
5266 free (input_debug.external_ext);
5267
5268 /* Hack: reset the SEC_HAS_CONTENTS flag so that
5269 elf_link_input_bfd ignores this section. */
5270 input_section->flags &=~ SEC_HAS_CONTENTS;
5271 }
5272
252b5132
RH
5273 /* Build the external symbol information. */
5274 einfo.abfd = abfd;
5275 einfo.info = info;
5276 einfo.debug = &debug;
5277 einfo.swap = swap;
b34976b6 5278 einfo.failed = FALSE;
252b5132
RH
5279 elf_link_hash_traverse (elf_hash_table (info),
5280 elf64_alpha_output_extsym,
2c3fc389 5281 &einfo);
252b5132 5282 if (einfo.failed)
b34976b6 5283 return FALSE;
252b5132
RH
5284
5285 /* Set the size of the .mdebug section. */
eea6121a 5286 o->size = bfd_ecoff_debug_size (abfd, &debug, swap);
252b5132
RH
5287
5288 /* Skip this section later on (I don't think this currently
5289 matters, but someday it might). */
8423293d 5290 o->map_head.link_order = (struct bfd_link_order *) NULL;
252b5132
RH
5291
5292 mdebug_sec = o;
5293 }
252b5132
RH
5294 }
5295
5296 /* Invoke the regular ELF backend linker to do all the work. */
c152c796 5297 if (! bfd_elf_final_link (abfd, info))
b34976b6 5298 return FALSE;
252b5132
RH
5299
5300 /* Now write out the computed sections. */
5301
5302 /* The .got subsections... */
5303 {
5304 bfd *i, *dynobj = elf_hash_table(info)->dynobj;
4dfe6ac6 5305 for (i = htab->got_list;
252b5132
RH
5306 i != NULL;
5307 i = alpha_elf_tdata(i)->got_link_next)
5308 {
5309 asection *sgot;
5310
5311 /* elf_bfd_final_link already did everything in dynobj. */
5312 if (i == dynobj)
5313 continue;
5314
5315 sgot = alpha_elf_tdata(i)->got;
5316 if (! bfd_set_section_contents (abfd, sgot->output_section,
dc810e39
AM
5317 sgot->contents,
5318 (file_ptr) sgot->output_offset,
eea6121a 5319 sgot->size))
b34976b6 5320 return FALSE;
252b5132
RH
5321 }
5322 }
5323
252b5132
RH
5324 if (mdebug_sec != (asection *) NULL)
5325 {
5326 BFD_ASSERT (abfd->output_has_begun);
5327 if (! bfd_ecoff_write_accumulated_debug (mdebug_handle, abfd, &debug,
5328 swap, info,
5329 mdebug_sec->filepos))
b34976b6 5330 return FALSE;
252b5132
RH
5331
5332 bfd_ecoff_debug_free (mdebug_handle, abfd, &debug, swap, info);
5333 }
5334
b34976b6 5335 return TRUE;
252b5132 5336}
fcfbdf31
JJ
5337
5338static enum elf_reloc_type_class
7e612e98
AM
5339elf64_alpha_reloc_type_class (const struct bfd_link_info *info ATTRIBUTE_UNUSED,
5340 const asection *rel_sec ATTRIBUTE_UNUSED,
5341 const Elf_Internal_Rela *rela)
fcfbdf31 5342{
f51e552e 5343 switch ((int) ELF64_R_TYPE (rela->r_info))
fcfbdf31
JJ
5344 {
5345 case R_ALPHA_RELATIVE:
5346 return reloc_class_relative;
5347 case R_ALPHA_JMP_SLOT:
5348 return reloc_class_plt;
5349 case R_ALPHA_COPY:
5350 return reloc_class_copy;
5351 default:
5352 return reloc_class_normal;
5353 }
5354}
252b5132 5355\f
b35d266b 5356static const struct bfd_elf_special_section elf64_alpha_special_sections[] =
2f89ff8d 5357{
0112cd26
NC
5358 { STRING_COMMA_LEN (".sbss"), -2, SHT_NOBITS, SHF_ALLOC + SHF_WRITE + SHF_ALPHA_GPREL },
5359 { STRING_COMMA_LEN (".sdata"), -2, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE + SHF_ALPHA_GPREL },
5360 { NULL, 0, 0, 0, 0 }
2f89ff8d
L
5361};
5362
252b5132
RH
5363/* ECOFF swapping routines. These are used when dealing with the
5364 .mdebug section, which is in the ECOFF debugging format. Copied
fe8bc63d 5365 from elf32-mips.c. */
252b5132
RH
5366static const struct ecoff_debug_swap
5367elf64_alpha_ecoff_debug_swap =
5368{
5369 /* Symbol table magic number. */
5370 magicSym2,
5371 /* Alignment of debugging information. E.g., 4. */
5372 8,
5373 /* Sizes of external symbolic information. */
5374 sizeof (struct hdr_ext),
5375 sizeof (struct dnr_ext),
5376 sizeof (struct pdr_ext),
5377 sizeof (struct sym_ext),
5378 sizeof (struct opt_ext),
5379 sizeof (struct fdr_ext),
5380 sizeof (struct rfd_ext),
5381 sizeof (struct ext_ext),
5382 /* Functions to swap in external symbolic data. */
5383 ecoff_swap_hdr_in,
5384 ecoff_swap_dnr_in,
5385 ecoff_swap_pdr_in,
5386 ecoff_swap_sym_in,
5387 ecoff_swap_opt_in,
5388 ecoff_swap_fdr_in,
5389 ecoff_swap_rfd_in,
5390 ecoff_swap_ext_in,
5391 _bfd_ecoff_swap_tir_in,
5392 _bfd_ecoff_swap_rndx_in,
5393 /* Functions to swap out external symbolic data. */
5394 ecoff_swap_hdr_out,
5395 ecoff_swap_dnr_out,
5396 ecoff_swap_pdr_out,
5397 ecoff_swap_sym_out,
5398 ecoff_swap_opt_out,
5399 ecoff_swap_fdr_out,
5400 ecoff_swap_rfd_out,
5401 ecoff_swap_ext_out,
5402 _bfd_ecoff_swap_tir_out,
5403 _bfd_ecoff_swap_rndx_out,
5404 /* Function to read in symbolic data. */
5405 elf64_alpha_read_ecoff_info
5406};
5407\f
70bcb145
JW
5408/* Use a non-standard hash bucket size of 8. */
5409
562ace6b 5410static const struct elf_size_info alpha_elf_size_info =
70bcb145
JW
5411{
5412 sizeof (Elf64_External_Ehdr),
5413 sizeof (Elf64_External_Phdr),
5414 sizeof (Elf64_External_Shdr),
5415 sizeof (Elf64_External_Rel),
5416 sizeof (Elf64_External_Rela),
5417 sizeof (Elf64_External_Sym),
5418 sizeof (Elf64_External_Dyn),
5419 sizeof (Elf_External_Note),
5420 8,
5421 1,
45d6a902 5422 64, 3,
70bcb145
JW
5423 ELFCLASS64, EV_CURRENT,
5424 bfd_elf64_write_out_phdrs,
5425 bfd_elf64_write_shdrs_and_ehdr,
1489a3a0 5426 bfd_elf64_checksum_contents,
70bcb145 5427 bfd_elf64_write_relocs,
73ff0d56 5428 bfd_elf64_swap_symbol_in,
70bcb145
JW
5429 bfd_elf64_swap_symbol_out,
5430 bfd_elf64_slurp_reloc_table,
5431 bfd_elf64_slurp_symbol_table,
5432 bfd_elf64_swap_dyn_in,
5433 bfd_elf64_swap_dyn_out,
947216bf
AM
5434 bfd_elf64_swap_reloc_in,
5435 bfd_elf64_swap_reloc_out,
5436 bfd_elf64_swap_reloca_in,
5437 bfd_elf64_swap_reloca_out
70bcb145
JW
5438};
5439
6d00b590 5440#define TARGET_LITTLE_SYM alpha_elf64_vec
252b5132
RH
5441#define TARGET_LITTLE_NAME "elf64-alpha"
5442#define ELF_ARCH bfd_arch_alpha
ae95ffa6 5443#define ELF_TARGET_ID ALPHA_ELF_DATA
56fc028e
AJ
5444#define ELF_MACHINE_CODE EM_ALPHA
5445#define ELF_MAXPAGESIZE 0x10000
24718e3b 5446#define ELF_COMMONPAGESIZE 0x2000
252b5132
RH
5447
5448#define bfd_elf64_bfd_link_hash_table_create \
5449 elf64_alpha_bfd_link_hash_table_create
5450
5451#define bfd_elf64_bfd_reloc_type_lookup \
5452 elf64_alpha_bfd_reloc_type_lookup
157090f7
AM
5453#define bfd_elf64_bfd_reloc_name_lookup \
5454 elf64_alpha_bfd_reloc_name_lookup
252b5132
RH
5455#define elf_info_to_howto \
5456 elf64_alpha_info_to_howto
5457
5458#define bfd_elf64_mkobject \
5459 elf64_alpha_mkobject
5460#define elf_backend_object_p \
5461 elf64_alpha_object_p
5462
5463#define elf_backend_section_from_shdr \
5464 elf64_alpha_section_from_shdr
204692d7
RH
5465#define elf_backend_section_flags \
5466 elf64_alpha_section_flags
252b5132
RH
5467#define elf_backend_fake_sections \
5468 elf64_alpha_fake_sections
5469
5470#define bfd_elf64_bfd_is_local_label_name \
5471 elf64_alpha_is_local_label_name
5472#define bfd_elf64_find_nearest_line \
5473 elf64_alpha_find_nearest_line
5474#define bfd_elf64_bfd_relax_section \
5475 elf64_alpha_relax_section
5476
5477#define elf_backend_add_symbol_hook \
5478 elf64_alpha_add_symbol_hook
13285a1b
AM
5479#define elf_backend_relocs_compatible \
5480 _bfd_elf_relocs_compatible
6fc5bb57
AM
5481#define elf_backend_sort_relocs_p \
5482 elf64_alpha_sort_relocs_p
252b5132
RH
5483#define elf_backend_check_relocs \
5484 elf64_alpha_check_relocs
5485#define elf_backend_create_dynamic_sections \
5486 elf64_alpha_create_dynamic_sections
5487#define elf_backend_adjust_dynamic_symbol \
5488 elf64_alpha_adjust_dynamic_symbol
747ffa7b
AM
5489#define elf_backend_merge_symbol_attribute \
5490 elf64_alpha_merge_symbol_attribute
48f4b4f5
RH
5491#define elf_backend_copy_indirect_symbol \
5492 elf64_alpha_copy_indirect_symbol
252b5132
RH
5493#define elf_backend_always_size_sections \
5494 elf64_alpha_always_size_sections
5495#define elf_backend_size_dynamic_sections \
5496 elf64_alpha_size_dynamic_sections
74541ad4
AM
5497#define elf_backend_omit_section_dynsym \
5498 ((bfd_boolean (*) (bfd *, struct bfd_link_info *, asection *)) bfd_true)
252b5132
RH
5499#define elf_backend_relocate_section \
5500 elf64_alpha_relocate_section
5501#define elf_backend_finish_dynamic_symbol \
5502 elf64_alpha_finish_dynamic_symbol
5503#define elf_backend_finish_dynamic_sections \
5504 elf64_alpha_finish_dynamic_sections
5505#define bfd_elf64_bfd_final_link \
5506 elf64_alpha_final_link
fcfbdf31
JJ
5507#define elf_backend_reloc_type_class \
5508 elf64_alpha_reloc_type_class
252b5132 5509
e117360e
RH
5510#define elf_backend_can_gc_sections 1
5511#define elf_backend_gc_mark_hook elf64_alpha_gc_mark_hook
e117360e 5512
252b5132
RH
5513#define elf_backend_ecoff_debug_swap \
5514 &elf64_alpha_ecoff_debug_swap
5515
70bcb145
JW
5516#define elf_backend_size_info \
5517 alpha_elf_size_info
5518
29ef7005
L
5519#define elf_backend_special_sections \
5520 elf64_alpha_special_sections
2f89ff8d 5521
38b1a46c 5522/* A few constants that determine how the .plt section is set up. */
252b5132
RH
5523#define elf_backend_want_got_plt 0
5524#define elf_backend_plt_readonly 0
5525#define elf_backend_want_plt_sym 1
5526#define elf_backend_got_header_size 0
64f52338 5527#define elf_backend_dtrel_excludes_plt 1
252b5132
RH
5528
5529#include "elf64-target.h"
2238051f
RH
5530\f
5531/* FreeBSD support. */
5532
5533#undef TARGET_LITTLE_SYM
6d00b590 5534#define TARGET_LITTLE_SYM alpha_elf64_fbsd_vec
2238051f
RH
5535#undef TARGET_LITTLE_NAME
5536#define TARGET_LITTLE_NAME "elf64-alpha-freebsd"
d1036acb
L
5537#undef ELF_OSABI
5538#define ELF_OSABI ELFOSABI_FREEBSD
2238051f
RH
5539
5540/* The kernel recognizes executables as valid only if they carry a
5541 "FreeBSD" label in the ELF header. So we put this label on all
5542 executables and (for simplicity) also all other object files. */
5543
2238051f 5544static void
a7519a3c
RH
5545elf64_alpha_fbsd_post_process_headers (bfd * abfd,
5546 struct bfd_link_info * link_info ATTRIBUTE_UNUSED)
2238051f
RH
5547{
5548 Elf_Internal_Ehdr * i_ehdrp; /* ELF file header, internal form. */
5549
5550 i_ehdrp = elf_elfheader (abfd);
5551
5552 /* Put an ABI label supported by FreeBSD >= 4.1. */
d1036acb 5553 i_ehdrp->e_ident[EI_OSABI] = get_elf_backend_data (abfd)->elf_osabi;
2238051f
RH
5554#ifdef OLD_FREEBSD_ABI_LABEL
5555 /* The ABI label supported by FreeBSD <= 4.0 is quite nonstandard. */
5556 memcpy (&i_ehdrp->e_ident[EI_ABIVERSION], "FreeBSD", 8);
5557#endif
5558}
5559
5560#undef elf_backend_post_process_headers
5561#define elf_backend_post_process_headers \
5562 elf64_alpha_fbsd_post_process_headers
5563
571fe01f 5564#undef elf64_bed
2238051f
RH
5565#define elf64_bed elf64_alpha_fbsd_bed
5566
5567#include "elf64-target.h"