]> git.ipfire.org Git - thirdparty/binutils-gdb.git/blame - bfd/elf64-alpha.c
ecoff find_nearest_line and final link leaks
[thirdparty/binutils-gdb.git] / bfd / elf64-alpha.c
CommitLineData
252b5132 1/* Alpha specific support for 64-bit ELF
d87bef3a 2 Copyright (C) 1996-2023 Free Software Foundation, Inc.
252b5132
RH
3 Contributed by Richard Henderson <rth@tamu.edu>.
4
571fe01f 5 This file is part of BFD, the Binary File Descriptor library.
252b5132 6
571fe01f
NC
7 This program is free software; you can redistribute it and/or modify
8 it under the terms of the GNU General Public License as published by
cd123cb7 9 the Free Software Foundation; either version 3 of the License, or
571fe01f 10 (at your option) any later version.
252b5132 11
571fe01f
NC
12 This program is distributed in the hope that it will be useful,
13 but WITHOUT ANY WARRANTY; without even the implied warranty of
14 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 GNU General Public License for more details.
252b5132 16
571fe01f
NC
17 You should have received a copy of the GNU General Public License
18 along with this program; if not, write to the Free Software
cd123cb7
NC
19 Foundation, Inc., 51 Franklin Street - Fifth Floor, Boston,
20 MA 02110-1301, USA. */
21
252b5132
RH
22
23/* We need a published ABI spec for this. Until one comes out, don't
24 assume this'll remain unchanged forever. */
25
252b5132 26#include "sysdep.h"
3db64b00 27#include "bfd.h"
252b5132
RH
28#include "libbfd.h"
29#include "elf-bfd.h"
0ba9378a 30#include "ecoff-bfd.h"
252b5132
RH
31
32#include "elf/alpha.h"
33
34#define ALPHAECOFF
35
36#define NO_COFF_RELOCS
37#define NO_COFF_SYMBOLS
38#define NO_COFF_LINENOS
39
fe8bc63d 40/* Get the ECOFF swapping routines. Needed for the debug information. */
252b5132
RH
41#include "coff/internal.h"
42#include "coff/sym.h"
43#include "coff/symconst.h"
44#include "coff/ecoff.h"
45#include "coff/alpha.h"
46#include "aout/ar.h"
47#include "libcoff.h"
48#include "libecoff.h"
49#define ECOFF_64
50#include "ecoffswap.h"
51
6ec7057a
RH
52\f
53/* Instruction data for plt generation and relaxation. */
54
eae0b5c3
NC
55#define OP_LDA 0x08U
56#define OP_LDAH 0x09U
57#define OP_LDQ 0x29U
58#define OP_BR 0x30U
59#define OP_BSR 0x34U
6ec7057a
RH
60
61#define INSN_LDA (OP_LDA << 26)
62#define INSN_LDAH (OP_LDAH << 26)
63#define INSN_LDQ (OP_LDQ << 26)
64#define INSN_BR (OP_BR << 26)
65
66#define INSN_ADDQ 0x40000400
67#define INSN_RDUNIQ 0x0000009e
68#define INSN_SUBQ 0x40000520
69#define INSN_S4SUBQ 0x40000560
70#define INSN_UNOP 0x2ffe0000
71
72#define INSN_JSR 0x68004000
73#define INSN_JMP 0x68000000
74#define INSN_JSR_MASK 0xfc00c000
75
eae0b5c3
NC
76#define INSN_A(I,A) (I | ((unsigned) A << 21))
77#define INSN_AB(I,A,B) (INSN_A (I, A) | (B << 16))
78#define INSN_ABC(I,A,B,C) (INSN_A (I, A) | (B << 16) | C)
79#define INSN_ABO(I,A,B,O) (INSN_A (I, A) | (B << 16) | ((O) & 0xffff))
80#define INSN_AD(I,A,D) (INSN_A (I, A) | (((D) >> 2) & 0x1fffff))
6ec7057a
RH
81
82/* PLT/GOT Stuff */
83
84/* Set by ld emulation. Putting this into the link_info or hash structure
85 is simply working too hard. */
86#ifdef USE_SECUREPLT
0a1b45a2 87bool elf64_alpha_use_secureplt = true;
6ec7057a 88#else
0a1b45a2 89bool elf64_alpha_use_secureplt = false;
6ec7057a
RH
90#endif
91
92#define OLD_PLT_HEADER_SIZE 32
93#define OLD_PLT_ENTRY_SIZE 12
94#define NEW_PLT_HEADER_SIZE 36
95#define NEW_PLT_ENTRY_SIZE 4
96
97#define PLT_HEADER_SIZE \
98 (elf64_alpha_use_secureplt ? NEW_PLT_HEADER_SIZE : OLD_PLT_HEADER_SIZE)
99#define PLT_ENTRY_SIZE \
100 (elf64_alpha_use_secureplt ? NEW_PLT_ENTRY_SIZE : OLD_PLT_ENTRY_SIZE)
101
102#define MAX_GOT_SIZE (64*1024)
103
104#define ELF_DYNAMIC_INTERPRETER "/usr/lib/ld.so"
252b5132 105\f
21d799b5
NC
106
107/* Used to implement multiple .got subsections. */
108struct alpha_elf_got_entry
109{
110 struct alpha_elf_got_entry *next;
111
112 /* Which .got subsection? */
113 bfd *gotobj;
114
115 /* The addend in effect for this entry. */
116 bfd_vma addend;
117
118 /* The .got offset for this entry. */
119 int got_offset;
120
121 /* The .plt offset for this entry. */
122 int plt_offset;
123
124 /* How many references to this entry? */
125 int use_count;
126
127 /* The relocation type of this entry. */
128 unsigned char reloc_type;
129
130 /* How a LITERAL is used. */
131 unsigned char flags;
132
133 /* Have we initialized the dynamic relocation for this entry? */
134 unsigned char reloc_done;
135
136 /* Have we adjusted this entry for SEC_MERGE? */
137 unsigned char reloc_xlated;
138};
139
140struct alpha_elf_reloc_entry
141{
142 struct alpha_elf_reloc_entry *next;
143
144 /* Which .reloc section? */
145 asection *srel;
146
1f7f2abb
L
147 /* Which section this relocation is against? */
148 asection *sec;
21d799b5
NC
149
150 /* How many did we find? */
151 unsigned long count;
1f7f2abb
L
152
153 /* What kind of relocation? */
154 unsigned int rtype;
21d799b5
NC
155};
156
252b5132
RH
157struct alpha_elf_link_hash_entry
158{
159 struct elf_link_hash_entry root;
160
161 /* External symbol information. */
162 EXTR esym;
163
164 /* Cumulative flags for all the .got entries. */
165 int flags;
166
9e756d64 167 /* Contexts in which a literal was referenced. */
8288a39e
RH
168#define ALPHA_ELF_LINK_HASH_LU_ADDR 0x01
169#define ALPHA_ELF_LINK_HASH_LU_MEM 0x02
170#define ALPHA_ELF_LINK_HASH_LU_BYTE 0x04
171#define ALPHA_ELF_LINK_HASH_LU_JSR 0x08
172#define ALPHA_ELF_LINK_HASH_LU_TLSGD 0x10
173#define ALPHA_ELF_LINK_HASH_LU_TLSLDM 0x20
174#define ALPHA_ELF_LINK_HASH_LU_JSRDIRECT 0x40
175#define ALPHA_ELF_LINK_HASH_LU_PLT 0x38
176#define ALPHA_ELF_LINK_HASH_TLS_IE 0x80
cc03ec80 177
252b5132 178 /* Used to implement multiple .got subsections. */
21d799b5 179 struct alpha_elf_got_entry *got_entries;
252b5132 180
571fe01f 181 /* Used to count non-got, non-plt relocations for delayed sizing
252b5132 182 of relocation sections. */
21d799b5 183 struct alpha_elf_reloc_entry *reloc_entries;
252b5132
RH
184};
185
186/* Alpha ELF linker hash table. */
187
188struct alpha_elf_link_hash_table
189{
190 struct elf_link_hash_table root;
191
192 /* The head of a list of .got subsections linked through
193 alpha_elf_tdata(abfd)->got_link_next. */
194 bfd *got_list;
4a828aab
RH
195
196 /* The most recent relax pass that we've seen. The GOTs
197 should be regenerated if this doesn't match. */
198 int relax_trip;
252b5132
RH
199};
200
201/* Look up an entry in a Alpha ELF linker hash table. */
202
203#define alpha_elf_link_hash_lookup(table, string, create, copy, follow) \
204 ((struct alpha_elf_link_hash_entry *) \
205 elf_link_hash_lookup (&(table)->root, (string), (create), \
206 (copy), (follow)))
207
208/* Traverse a Alpha ELF linker hash table. */
209
210#define alpha_elf_link_hash_traverse(table, func, info) \
211 (elf_link_hash_traverse \
212 (&(table)->root, \
0a1b45a2 213 (bool (*) (struct elf_link_hash_entry *, void *)) (func), \
252b5132
RH
214 (info)))
215
216/* Get the Alpha ELF linker hash table from a link_info structure. */
217
218#define alpha_elf_hash_table(p) \
0f55320b
AM
219 ((is_elf_hash_table ((p)->hash) \
220 && elf_hash_table_id (elf_hash_table (p)) == ALPHA_ELF_DATA) \
221 ? (struct alpha_elf_link_hash_table *) (p)->hash : NULL)
252b5132
RH
222
223/* Get the object's symbols as our own entry type. */
224
225#define alpha_elf_sym_hashes(abfd) \
226 ((struct alpha_elf_link_hash_entry **)elf_sym_hashes(abfd))
227
68ffbac6 228/* Should we do dynamic things to this symbol? This differs from the
986a241f
RH
229 generic version in that we never need to consider function pointer
230 equality wrt PLT entries -- we don't create a PLT entry if a symbol's
231 address is ever taken. */
252b5132 232
0a1b45a2 233static inline bool
a7519a3c
RH
234alpha_elf_dynamic_symbol_p (struct elf_link_hash_entry *h,
235 struct bfd_link_info *info)
8fb35fed 236{
986a241f 237 return _bfd_elf_dynamic_symbol_p (h, info, 0);
8fb35fed 238}
252b5132
RH
239
240/* Create an entry in a Alpha ELF linker hash table. */
241
242static struct bfd_hash_entry *
a7519a3c
RH
243elf64_alpha_link_hash_newfunc (struct bfd_hash_entry *entry,
244 struct bfd_hash_table *table,
245 const char *string)
252b5132
RH
246{
247 struct alpha_elf_link_hash_entry *ret =
248 (struct alpha_elf_link_hash_entry *) entry;
249
250 /* Allocate the structure if it has not already been allocated by a
251 subclass. */
252 if (ret == (struct alpha_elf_link_hash_entry *) NULL)
253 ret = ((struct alpha_elf_link_hash_entry *)
254 bfd_hash_allocate (table,
255 sizeof (struct alpha_elf_link_hash_entry)));
256 if (ret == (struct alpha_elf_link_hash_entry *) NULL)
257 return (struct bfd_hash_entry *) ret;
258
259 /* Call the allocation method of the superclass. */
260 ret = ((struct alpha_elf_link_hash_entry *)
261 _bfd_elf_link_hash_newfunc ((struct bfd_hash_entry *) ret,
262 table, string));
263 if (ret != (struct alpha_elf_link_hash_entry *) NULL)
264 {
265 /* Set local fields. */
266 memset (&ret->esym, 0, sizeof (EXTR));
267 /* We use -2 as a marker to indicate that the information has
268 not been set. -1 means there is no associated ifd. */
269 ret->esym.ifd = -2;
270 ret->flags = 0;
271 ret->got_entries = NULL;
272 ret->reloc_entries = NULL;
273 }
274
275 return (struct bfd_hash_entry *) ret;
276}
277
278/* Create a Alpha ELF linker hash table. */
279
280static struct bfd_link_hash_table *
a7519a3c 281elf64_alpha_bfd_link_hash_table_create (bfd *abfd)
252b5132
RH
282{
283 struct alpha_elf_link_hash_table *ret;
986f0783 284 size_t amt = sizeof (struct alpha_elf_link_hash_table);
252b5132 285
e2d34d7d 286 ret = (struct alpha_elf_link_hash_table *) bfd_zmalloc (amt);
252b5132
RH
287 if (ret == (struct alpha_elf_link_hash_table *) NULL)
288 return NULL;
289
66eb6687
AM
290 if (!_bfd_elf_link_hash_table_init (&ret->root, abfd,
291 elf64_alpha_link_hash_newfunc,
4dfe6ac6
NC
292 sizeof (struct alpha_elf_link_hash_entry),
293 ALPHA_ELF_DATA))
252b5132 294 {
e2d34d7d 295 free (ret);
252b5132
RH
296 return NULL;
297 }
298
299 return &ret->root.root;
300}
301\f
698600e4
AM
302/* Alpha ELF follows MIPS ELF in using a special find_nearest_line
303 routine in order to handle the ECOFF debugging information. */
304
305struct alpha_elf_find_line
306{
307 struct ecoff_debug_info d;
308 struct ecoff_find_line i;
309};
310
252b5132
RH
311/* We have some private fields hanging off of the elf_tdata structure. */
312
313struct alpha_elf_obj_tdata
314{
315 struct elf_obj_tdata root;
316
317 /* For every input file, these are the got entries for that object's
318 local symbols. */
319 struct alpha_elf_got_entry ** local_got_entries;
320
321 /* For every input file, this is the object that owns the got that
322 this input file uses. */
323 bfd *gotobj;
324
325 /* For every got, this is a linked list through the objects using this got */
326 bfd *in_got_link_next;
327
328 /* For every got, this is a link to the next got subsegment. */
329 bfd *got_link_next;
330
331 /* For every got, this is the section. */
332 asection *got;
333
3765b1be
RH
334 /* For every got, this is it's total number of words. */
335 int total_got_size;
252b5132 336
3765b1be 337 /* For every got, this is the sum of the number of words required
252b5132 338 to hold all of the member object's local got. */
3765b1be 339 int local_got_size;
698600e4
AM
340
341 /* Used by elf64_alpha_find_nearest_line entry point. */
342 struct alpha_elf_find_line *find_line_info;
343
252b5132
RH
344};
345
346#define alpha_elf_tdata(abfd) \
347 ((struct alpha_elf_obj_tdata *) (abfd)->tdata.any)
348
0ffa91dd
NC
349#define is_alpha_elf(bfd) \
350 (bfd_get_flavour (bfd) == bfd_target_elf_flavour \
351 && elf_tdata (bfd) != NULL \
4dfe6ac6 352 && elf_object_id (bfd) == ALPHA_ELF_DATA)
0ffa91dd 353
0a1b45a2 354static bool
a7519a3c 355elf64_alpha_mkobject (bfd *abfd)
252b5132 356{
0ffa91dd 357 return bfd_elf_allocate_object (abfd, sizeof (struct alpha_elf_obj_tdata),
4dfe6ac6 358 ALPHA_ELF_DATA);
252b5132
RH
359}
360
0a1b45a2 361static bool
a7519a3c 362elf64_alpha_object_p (bfd *abfd)
252b5132 363{
252b5132
RH
364 /* Set the right machine number for an Alpha ELF file. */
365 return bfd_default_set_arch_mach (abfd, bfd_arch_alpha, 0);
366}
367\f
a7519a3c
RH
368/* A relocation function which doesn't do anything. */
369
370static bfd_reloc_status_type
371elf64_alpha_reloc_nil (bfd *abfd ATTRIBUTE_UNUSED, arelent *reloc,
372 asymbol *sym ATTRIBUTE_UNUSED,
2c3fc389 373 void * data ATTRIBUTE_UNUSED, asection *sec,
a7519a3c
RH
374 bfd *output_bfd, char **error_message ATTRIBUTE_UNUSED)
375{
376 if (output_bfd)
377 reloc->address += sec->output_offset;
378 return bfd_reloc_ok;
379}
380
381/* A relocation function used for an unsupported reloc. */
382
383static bfd_reloc_status_type
384elf64_alpha_reloc_bad (bfd *abfd ATTRIBUTE_UNUSED, arelent *reloc,
385 asymbol *sym ATTRIBUTE_UNUSED,
2c3fc389 386 void * data ATTRIBUTE_UNUSED, asection *sec,
a7519a3c
RH
387 bfd *output_bfd, char **error_message ATTRIBUTE_UNUSED)
388{
389 if (output_bfd)
390 reloc->address += sec->output_offset;
391 return bfd_reloc_notsupported;
392}
393
394/* Do the work of the GPDISP relocation. */
395
396static bfd_reloc_status_type
397elf64_alpha_do_reloc_gpdisp (bfd *abfd, bfd_vma gpdisp, bfd_byte *p_ldah,
398 bfd_byte *p_lda)
399{
400 bfd_reloc_status_type ret = bfd_reloc_ok;
401 bfd_vma addend;
402 unsigned long i_ldah, i_lda;
403
404 i_ldah = bfd_get_32 (abfd, p_ldah);
405 i_lda = bfd_get_32 (abfd, p_lda);
406
407 /* Complain if the instructions are not correct. */
408 if (((i_ldah >> 26) & 0x3f) != 0x09
409 || ((i_lda >> 26) & 0x3f) != 0x08)
410 ret = bfd_reloc_dangerous;
411
412 /* Extract the user-supplied offset, mirroring the sign extensions
413 that the instructions perform. */
414 addend = ((i_ldah & 0xffff) << 16) | (i_lda & 0xffff);
415 addend = (addend ^ 0x80008000) - 0x80008000;
416
417 gpdisp += addend;
418
419 if ((bfd_signed_vma) gpdisp < -(bfd_signed_vma) 0x80000000
420 || (bfd_signed_vma) gpdisp >= (bfd_signed_vma) 0x7fff8000)
421 ret = bfd_reloc_overflow;
422
423 /* compensate for the sign extension again. */
424 i_ldah = ((i_ldah & 0xffff0000)
425 | (((gpdisp >> 16) + ((gpdisp >> 15) & 1)) & 0xffff));
426 i_lda = (i_lda & 0xffff0000) | (gpdisp & 0xffff);
427
428 bfd_put_32 (abfd, (bfd_vma) i_ldah, p_ldah);
429 bfd_put_32 (abfd, (bfd_vma) i_lda, p_lda);
430
431 return ret;
432}
433
434/* The special function for the GPDISP reloc. */
435
436static bfd_reloc_status_type
437elf64_alpha_reloc_gpdisp (bfd *abfd, arelent *reloc_entry,
2c3fc389 438 asymbol *sym ATTRIBUTE_UNUSED, void * data,
a7519a3c
RH
439 asection *input_section, bfd *output_bfd,
440 char **err_msg)
441{
442 bfd_reloc_status_type ret;
443 bfd_vma gp, relocation;
444 bfd_vma high_address;
445 bfd_byte *p_ldah, *p_lda;
446
447 /* Don't do anything if we're not doing a final link. */
448 if (output_bfd)
449 {
450 reloc_entry->address += input_section->output_offset;
451 return bfd_reloc_ok;
452 }
453
454 high_address = bfd_get_section_limit (abfd, input_section);
455 if (reloc_entry->address > high_address
456 || reloc_entry->address + reloc_entry->addend > high_address)
457 return bfd_reloc_outofrange;
458
459 /* The gp used in the portion of the output object to which this
460 input object belongs is cached on the input bfd. */
461 gp = _bfd_get_gp_value (abfd);
462
463 relocation = (input_section->output_section->vma
464 + input_section->output_offset
465 + reloc_entry->address);
466
467 p_ldah = (bfd_byte *) data + reloc_entry->address;
468 p_lda = p_ldah + reloc_entry->addend;
469
470 ret = elf64_alpha_do_reloc_gpdisp (abfd, gp - relocation, p_ldah, p_lda);
471
472 /* Complain if the instructions are not correct. */
473 if (ret == bfd_reloc_dangerous)
474 *err_msg = _("GPDISP relocation did not find ldah and lda instructions");
475
476 return ret;
477}
478
252b5132
RH
479/* In case we're on a 32-bit machine, construct a 64-bit "-1" value
480 from smaller values. Start with zero, widen, *then* decrement. */
481#define MINUS_ONE (((bfd_vma)0) - 1)
482
21d799b5 483
dfe57ca0 484#define SKIP_HOWTO(N) \
5d0feb98 485 HOWTO(N, 0, 0, 0, 0, 0, complain_overflow_dont, elf64_alpha_reloc_bad, 0, 0, 0, 0, 0)
dfe57ca0 486
252b5132
RH
487static reloc_howto_type elf64_alpha_howto_table[] =
488{
489 HOWTO (R_ALPHA_NONE, /* type */
490 0, /* rightshift */
c94cb026 491 0, /* size */
6346d5ca 492 0, /* bitsize */
0a1b45a2 493 true, /* pc_relative */
252b5132
RH
494 0, /* bitpos */
495 complain_overflow_dont, /* complain_on_overflow */
496 elf64_alpha_reloc_nil, /* special_function */
497 "NONE", /* name */
0a1b45a2 498 false, /* partial_inplace */
252b5132
RH
499 0, /* src_mask */
500 0, /* dst_mask */
0a1b45a2 501 true), /* pcrel_offset */
252b5132
RH
502
503 /* A 32 bit reference to a symbol. */
504 HOWTO (R_ALPHA_REFLONG, /* type */
505 0, /* rightshift */
c94cb026 506 4, /* size */
252b5132 507 32, /* bitsize */
0a1b45a2 508 false, /* pc_relative */
252b5132
RH
509 0, /* bitpos */
510 complain_overflow_bitfield, /* complain_on_overflow */
bc1bc43f 511 bfd_elf_generic_reloc, /* special_function */
252b5132 512 "REFLONG", /* name */
0a1b45a2 513 false, /* partial_inplace */
252b5132
RH
514 0xffffffff, /* src_mask */
515 0xffffffff, /* dst_mask */
0a1b45a2 516 false), /* pcrel_offset */
252b5132
RH
517
518 /* A 64 bit reference to a symbol. */
519 HOWTO (R_ALPHA_REFQUAD, /* type */
520 0, /* rightshift */
c94cb026 521 8, /* size */
252b5132 522 64, /* bitsize */
0a1b45a2 523 false, /* pc_relative */
252b5132
RH
524 0, /* bitpos */
525 complain_overflow_bitfield, /* complain_on_overflow */
bc1bc43f 526 bfd_elf_generic_reloc, /* special_function */
252b5132 527 "REFQUAD", /* name */
0a1b45a2 528 false, /* partial_inplace */
252b5132
RH
529 MINUS_ONE, /* src_mask */
530 MINUS_ONE, /* dst_mask */
0a1b45a2 531 false), /* pcrel_offset */
252b5132
RH
532
533 /* A 32 bit GP relative offset. This is just like REFLONG except
534 that when the value is used the value of the gp register will be
535 added in. */
536 HOWTO (R_ALPHA_GPREL32, /* type */
537 0, /* rightshift */
c94cb026 538 4, /* size */
252b5132 539 32, /* bitsize */
0a1b45a2 540 false, /* pc_relative */
252b5132
RH
541 0, /* bitpos */
542 complain_overflow_bitfield, /* complain_on_overflow */
bc1bc43f 543 bfd_elf_generic_reloc, /* special_function */
252b5132 544 "GPREL32", /* name */
0a1b45a2 545 false, /* partial_inplace */
252b5132
RH
546 0xffffffff, /* src_mask */
547 0xffffffff, /* dst_mask */
0a1b45a2 548 false), /* pcrel_offset */
252b5132
RH
549
550 /* Used for an instruction that refers to memory off the GP register. */
551 HOWTO (R_ALPHA_LITERAL, /* type */
552 0, /* rightshift */
c94cb026 553 2, /* size */
252b5132 554 16, /* bitsize */
0a1b45a2 555 false, /* pc_relative */
252b5132
RH
556 0, /* bitpos */
557 complain_overflow_signed, /* complain_on_overflow */
bc1bc43f 558 bfd_elf_generic_reloc, /* special_function */
252b5132 559 "ELF_LITERAL", /* name */
0a1b45a2 560 false, /* partial_inplace */
252b5132
RH
561 0xffff, /* src_mask */
562 0xffff, /* dst_mask */
0a1b45a2 563 false), /* pcrel_offset */
252b5132
RH
564
565 /* This reloc only appears immediately following an ELF_LITERAL reloc.
566 It identifies a use of the literal. The symbol index is special:
567 1 means the literal address is in the base register of a memory
568 format instruction; 2 means the literal address is in the byte
569 offset register of a byte-manipulation instruction; 3 means the
570 literal address is in the target register of a jsr instruction.
571 This does not actually do any relocation. */
572 HOWTO (R_ALPHA_LITUSE, /* type */
573 0, /* rightshift */
c94cb026 574 2, /* size */
252b5132 575 32, /* bitsize */
0a1b45a2 576 false, /* pc_relative */
252b5132
RH
577 0, /* bitpos */
578 complain_overflow_dont, /* complain_on_overflow */
579 elf64_alpha_reloc_nil, /* special_function */
580 "LITUSE", /* name */
0a1b45a2 581 false, /* partial_inplace */
252b5132
RH
582 0, /* src_mask */
583 0, /* dst_mask */
0a1b45a2 584 false), /* pcrel_offset */
252b5132
RH
585
586 /* Load the gp register. This is always used for a ldah instruction
587 which loads the upper 16 bits of the gp register. The symbol
588 index of the GPDISP instruction is an offset in bytes to the lda
589 instruction that loads the lower 16 bits. The value to use for
590 the relocation is the difference between the GP value and the
591 current location; the load will always be done against a register
592 holding the current address.
593
594 NOTE: Unlike ECOFF, partial in-place relocation is not done. If
595 any offset is present in the instructions, it is an offset from
596 the register to the ldah instruction. This lets us avoid any
597 stupid hackery like inventing a gp value to do partial relocation
598 against. Also unlike ECOFF, we do the whole relocation off of
599 the GPDISP rather than a GPDISP_HI16/GPDISP_LO16 pair. An odd,
600 space consuming bit, that, since all the information was present
601 in the GPDISP_HI16 reloc. */
602 HOWTO (R_ALPHA_GPDISP, /* type */
603 16, /* rightshift */
c94cb026 604 4, /* size */
252b5132 605 16, /* bitsize */
0a1b45a2 606 false, /* pc_relative */
252b5132
RH
607 0, /* bitpos */
608 complain_overflow_dont, /* complain_on_overflow */
609 elf64_alpha_reloc_gpdisp, /* special_function */
610 "GPDISP", /* name */
0a1b45a2 611 false, /* partial_inplace */
252b5132
RH
612 0xffff, /* src_mask */
613 0xffff, /* dst_mask */
0a1b45a2 614 true), /* pcrel_offset */
252b5132
RH
615
616 /* A 21 bit branch. */
617 HOWTO (R_ALPHA_BRADDR, /* type */
618 2, /* rightshift */
c94cb026 619 4, /* size */
252b5132 620 21, /* bitsize */
0a1b45a2 621 true, /* pc_relative */
252b5132
RH
622 0, /* bitpos */
623 complain_overflow_signed, /* complain_on_overflow */
bc1bc43f 624 bfd_elf_generic_reloc, /* special_function */
252b5132 625 "BRADDR", /* name */
0a1b45a2 626 false, /* partial_inplace */
252b5132
RH
627 0x1fffff, /* src_mask */
628 0x1fffff, /* dst_mask */
0a1b45a2 629 true), /* pcrel_offset */
252b5132
RH
630
631 /* A hint for a jump to a register. */
632 HOWTO (R_ALPHA_HINT, /* type */
633 2, /* rightshift */
c94cb026 634 2, /* size */
252b5132 635 14, /* bitsize */
0a1b45a2 636 true, /* pc_relative */
252b5132
RH
637 0, /* bitpos */
638 complain_overflow_dont, /* complain_on_overflow */
bc1bc43f 639 bfd_elf_generic_reloc, /* special_function */
252b5132 640 "HINT", /* name */
0a1b45a2 641 false, /* partial_inplace */
252b5132
RH
642 0x3fff, /* src_mask */
643 0x3fff, /* dst_mask */
0a1b45a2 644 true), /* pcrel_offset */
252b5132
RH
645
646 /* 16 bit PC relative offset. */
647 HOWTO (R_ALPHA_SREL16, /* type */
648 0, /* rightshift */
c94cb026 649 2, /* size */
252b5132 650 16, /* bitsize */
0a1b45a2 651 true, /* pc_relative */
252b5132
RH
652 0, /* bitpos */
653 complain_overflow_signed, /* complain_on_overflow */
bc1bc43f 654 bfd_elf_generic_reloc, /* special_function */
252b5132 655 "SREL16", /* name */
0a1b45a2 656 false, /* partial_inplace */
252b5132
RH
657 0xffff, /* src_mask */
658 0xffff, /* dst_mask */
0a1b45a2 659 true), /* pcrel_offset */
252b5132
RH
660
661 /* 32 bit PC relative offset. */
662 HOWTO (R_ALPHA_SREL32, /* type */
663 0, /* rightshift */
c94cb026 664 4, /* size */
252b5132 665 32, /* bitsize */
0a1b45a2 666 true, /* pc_relative */
252b5132
RH
667 0, /* bitpos */
668 complain_overflow_signed, /* complain_on_overflow */
bc1bc43f 669 bfd_elf_generic_reloc, /* special_function */
252b5132 670 "SREL32", /* name */
0a1b45a2 671 false, /* partial_inplace */
252b5132
RH
672 0xffffffff, /* src_mask */
673 0xffffffff, /* dst_mask */
0a1b45a2 674 true), /* pcrel_offset */
252b5132
RH
675
676 /* A 64 bit PC relative offset. */
677 HOWTO (R_ALPHA_SREL64, /* type */
678 0, /* rightshift */
c94cb026 679 8, /* size */
252b5132 680 64, /* bitsize */
0a1b45a2 681 true, /* pc_relative */
252b5132
RH
682 0, /* bitpos */
683 complain_overflow_signed, /* complain_on_overflow */
bc1bc43f 684 bfd_elf_generic_reloc, /* special_function */
252b5132 685 "SREL64", /* name */
0a1b45a2 686 false, /* partial_inplace */
252b5132
RH
687 MINUS_ONE, /* src_mask */
688 MINUS_ONE, /* dst_mask */
0a1b45a2 689 true), /* pcrel_offset */
252b5132 690
dfe57ca0
RH
691 /* Skip 12 - 16; deprecated ECOFF relocs. */
692 SKIP_HOWTO (12),
693 SKIP_HOWTO (13),
694 SKIP_HOWTO (14),
695 SKIP_HOWTO (15),
696 SKIP_HOWTO (16),
252b5132
RH
697
698 /* The high 16 bits of the displacement from GP to the target. */
699 HOWTO (R_ALPHA_GPRELHIGH,
700 0, /* rightshift */
c94cb026 701 2, /* size */
252b5132 702 16, /* bitsize */
0a1b45a2 703 false, /* pc_relative */
252b5132
RH
704 0, /* bitpos */
705 complain_overflow_signed, /* complain_on_overflow */
bc1bc43f 706 bfd_elf_generic_reloc, /* special_function */
252b5132 707 "GPRELHIGH", /* name */
0a1b45a2 708 false, /* partial_inplace */
252b5132
RH
709 0xffff, /* src_mask */
710 0xffff, /* dst_mask */
0a1b45a2 711 false), /* pcrel_offset */
252b5132
RH
712
713 /* The low 16 bits of the displacement from GP to the target. */
714 HOWTO (R_ALPHA_GPRELLOW,
715 0, /* rightshift */
c94cb026 716 2, /* size */
252b5132 717 16, /* bitsize */
0a1b45a2 718 false, /* pc_relative */
252b5132
RH
719 0, /* bitpos */
720 complain_overflow_dont, /* complain_on_overflow */
bc1bc43f 721 bfd_elf_generic_reloc, /* special_function */
252b5132 722 "GPRELLOW", /* name */
0a1b45a2 723 false, /* partial_inplace */
252b5132
RH
724 0xffff, /* src_mask */
725 0xffff, /* dst_mask */
0a1b45a2 726 false), /* pcrel_offset */
252b5132
RH
727
728 /* A 16-bit displacement from the GP to the target. */
dfe57ca0 729 HOWTO (R_ALPHA_GPREL16,
252b5132 730 0, /* rightshift */
c94cb026 731 2, /* size */
252b5132 732 16, /* bitsize */
0a1b45a2 733 false, /* pc_relative */
252b5132
RH
734 0, /* bitpos */
735 complain_overflow_signed, /* complain_on_overflow */
bc1bc43f 736 bfd_elf_generic_reloc, /* special_function */
dfe57ca0 737 "GPREL16", /* name */
0a1b45a2 738 false, /* partial_inplace */
252b5132
RH
739 0xffff, /* src_mask */
740 0xffff, /* dst_mask */
0a1b45a2 741 false), /* pcrel_offset */
252b5132 742
dfe57ca0
RH
743 /* Skip 20 - 23; deprecated ECOFF relocs. */
744 SKIP_HOWTO (20),
745 SKIP_HOWTO (21),
746 SKIP_HOWTO (22),
747 SKIP_HOWTO (23),
252b5132 748
fe8bc63d 749 /* Misc ELF relocations. */
252b5132
RH
750
751 /* A dynamic relocation to copy the target into our .dynbss section. */
752 /* Not generated, as all Alpha objects use PIC, so it is not needed. It
753 is present because every other ELF has one, but should not be used
754 because .dynbss is an ugly thing. */
755 HOWTO (R_ALPHA_COPY,
756 0,
5d0feb98 757 0,
252b5132 758 0,
0a1b45a2 759 false,
252b5132
RH
760 0,
761 complain_overflow_dont,
762 bfd_elf_generic_reloc,
763 "COPY",
0a1b45a2 764 false,
252b5132
RH
765 0,
766 0,
0a1b45a2 767 true),
252b5132
RH
768
769 /* A dynamic relocation for a .got entry. */
770 HOWTO (R_ALPHA_GLOB_DAT,
771 0,
5d0feb98 772 0,
252b5132 773 0,
0a1b45a2 774 false,
252b5132
RH
775 0,
776 complain_overflow_dont,
777 bfd_elf_generic_reloc,
778 "GLOB_DAT",
0a1b45a2 779 false,
252b5132
RH
780 0,
781 0,
0a1b45a2 782 true),
252b5132
RH
783
784 /* A dynamic relocation for a .plt entry. */
785 HOWTO (R_ALPHA_JMP_SLOT,
786 0,
5d0feb98 787 0,
252b5132 788 0,
0a1b45a2 789 false,
252b5132
RH
790 0,
791 complain_overflow_dont,
792 bfd_elf_generic_reloc,
793 "JMP_SLOT",
0a1b45a2 794 false,
252b5132
RH
795 0,
796 0,
0a1b45a2 797 true),
252b5132
RH
798
799 /* A dynamic relocation to add the base of the DSO to a 64-bit field. */
800 HOWTO (R_ALPHA_RELATIVE,
801 0,
5d0feb98 802 0,
252b5132 803 0,
0a1b45a2 804 false,
252b5132
RH
805 0,
806 complain_overflow_dont,
807 bfd_elf_generic_reloc,
808 "RELATIVE",
0a1b45a2 809 false,
252b5132
RH
810 0,
811 0,
0a1b45a2 812 true),
7793f4d0
RH
813
814 /* A 21 bit branch that adjusts for gp loads. */
815 HOWTO (R_ALPHA_BRSGP, /* type */
816 2, /* rightshift */
c94cb026 817 4, /* size */
7793f4d0 818 21, /* bitsize */
0a1b45a2 819 true, /* pc_relative */
7793f4d0
RH
820 0, /* bitpos */
821 complain_overflow_signed, /* complain_on_overflow */
bc1bc43f 822 bfd_elf_generic_reloc, /* special_function */
7793f4d0 823 "BRSGP", /* name */
0a1b45a2 824 false, /* partial_inplace */
7793f4d0
RH
825 0x1fffff, /* src_mask */
826 0x1fffff, /* dst_mask */
0a1b45a2 827 true), /* pcrel_offset */
3765b1be
RH
828
829 /* Creates a tls_index for the symbol in the got. */
830 HOWTO (R_ALPHA_TLSGD, /* type */
831 0, /* rightshift */
c94cb026 832 2, /* size */
3765b1be 833 16, /* bitsize */
0a1b45a2 834 false, /* pc_relative */
3765b1be
RH
835 0, /* bitpos */
836 complain_overflow_signed, /* complain_on_overflow */
bc1bc43f 837 bfd_elf_generic_reloc, /* special_function */
3765b1be 838 "TLSGD", /* name */
0a1b45a2 839 false, /* partial_inplace */
3765b1be
RH
840 0xffff, /* src_mask */
841 0xffff, /* dst_mask */
0a1b45a2 842 false), /* pcrel_offset */
3765b1be
RH
843
844 /* Creates a tls_index for the (current) module in the got. */
845 HOWTO (R_ALPHA_TLSLDM, /* type */
846 0, /* rightshift */
c94cb026 847 2, /* size */
3765b1be 848 16, /* bitsize */
0a1b45a2 849 false, /* pc_relative */
3765b1be
RH
850 0, /* bitpos */
851 complain_overflow_signed, /* complain_on_overflow */
bc1bc43f 852 bfd_elf_generic_reloc, /* special_function */
3765b1be 853 "TLSLDM", /* name */
0a1b45a2 854 false, /* partial_inplace */
3765b1be
RH
855 0xffff, /* src_mask */
856 0xffff, /* dst_mask */
0a1b45a2 857 false), /* pcrel_offset */
3765b1be
RH
858
859 /* A dynamic relocation for a DTP module entry. */
860 HOWTO (R_ALPHA_DTPMOD64, /* type */
861 0, /* rightshift */
c94cb026 862 8, /* size */
3765b1be 863 64, /* bitsize */
0a1b45a2 864 false, /* pc_relative */
3765b1be
RH
865 0, /* bitpos */
866 complain_overflow_bitfield, /* complain_on_overflow */
bc1bc43f 867 bfd_elf_generic_reloc, /* special_function */
3765b1be 868 "DTPMOD64", /* name */
0a1b45a2 869 false, /* partial_inplace */
3765b1be
RH
870 MINUS_ONE, /* src_mask */
871 MINUS_ONE, /* dst_mask */
0a1b45a2 872 false), /* pcrel_offset */
3765b1be
RH
873
874 /* Creates a 64-bit offset in the got for the displacement
875 from DTP to the target. */
876 HOWTO (R_ALPHA_GOTDTPREL, /* type */
877 0, /* rightshift */
c94cb026 878 2, /* size */
3765b1be 879 16, /* bitsize */
0a1b45a2 880 false, /* pc_relative */
3765b1be
RH
881 0, /* bitpos */
882 complain_overflow_signed, /* complain_on_overflow */
bc1bc43f 883 bfd_elf_generic_reloc, /* special_function */
3765b1be 884 "GOTDTPREL", /* name */
0a1b45a2 885 false, /* partial_inplace */
3765b1be
RH
886 0xffff, /* src_mask */
887 0xffff, /* dst_mask */
0a1b45a2 888 false), /* pcrel_offset */
3765b1be
RH
889
890 /* A dynamic relocation for a displacement from DTP to the target. */
891 HOWTO (R_ALPHA_DTPREL64, /* type */
892 0, /* rightshift */
c94cb026 893 8, /* size */
3765b1be 894 64, /* bitsize */
0a1b45a2 895 false, /* pc_relative */
3765b1be
RH
896 0, /* bitpos */
897 complain_overflow_bitfield, /* complain_on_overflow */
bc1bc43f 898 bfd_elf_generic_reloc, /* special_function */
3765b1be 899 "DTPREL64", /* name */
0a1b45a2 900 false, /* partial_inplace */
3765b1be
RH
901 MINUS_ONE, /* src_mask */
902 MINUS_ONE, /* dst_mask */
0a1b45a2 903 false), /* pcrel_offset */
3765b1be
RH
904
905 /* The high 16 bits of the displacement from DTP to the target. */
906 HOWTO (R_ALPHA_DTPRELHI, /* type */
907 0, /* rightshift */
c94cb026 908 2, /* size */
3765b1be 909 16, /* bitsize */
0a1b45a2 910 false, /* pc_relative */
3765b1be
RH
911 0, /* bitpos */
912 complain_overflow_signed, /* complain_on_overflow */
bc1bc43f 913 bfd_elf_generic_reloc, /* special_function */
3765b1be 914 "DTPRELHI", /* name */
0a1b45a2 915 false, /* partial_inplace */
3765b1be
RH
916 0xffff, /* src_mask */
917 0xffff, /* dst_mask */
0a1b45a2 918 false), /* pcrel_offset */
3765b1be
RH
919
920 /* The low 16 bits of the displacement from DTP to the target. */
921 HOWTO (R_ALPHA_DTPRELLO, /* type */
922 0, /* rightshift */
c94cb026 923 2, /* size */
3765b1be 924 16, /* bitsize */
0a1b45a2 925 false, /* pc_relative */
3765b1be
RH
926 0, /* bitpos */
927 complain_overflow_dont, /* complain_on_overflow */
bc1bc43f 928 bfd_elf_generic_reloc, /* special_function */
3765b1be 929 "DTPRELLO", /* name */
0a1b45a2 930 false, /* partial_inplace */
3765b1be
RH
931 0xffff, /* src_mask */
932 0xffff, /* dst_mask */
0a1b45a2 933 false), /* pcrel_offset */
3765b1be
RH
934
935 /* A 16-bit displacement from DTP to the target. */
936 HOWTO (R_ALPHA_DTPREL16, /* type */
937 0, /* rightshift */
c94cb026 938 2, /* size */
3765b1be 939 16, /* bitsize */
0a1b45a2 940 false, /* pc_relative */
3765b1be
RH
941 0, /* bitpos */
942 complain_overflow_signed, /* complain_on_overflow */
bc1bc43f 943 bfd_elf_generic_reloc, /* special_function */
3765b1be 944 "DTPREL16", /* name */
0a1b45a2 945 false, /* partial_inplace */
3765b1be
RH
946 0xffff, /* src_mask */
947 0xffff, /* dst_mask */
0a1b45a2 948 false), /* pcrel_offset */
3765b1be
RH
949
950 /* Creates a 64-bit offset in the got for the displacement
951 from TP to the target. */
952 HOWTO (R_ALPHA_GOTTPREL, /* type */
953 0, /* rightshift */
c94cb026 954 2, /* size */
3765b1be 955 16, /* bitsize */
0a1b45a2 956 false, /* pc_relative */
3765b1be
RH
957 0, /* bitpos */
958 complain_overflow_signed, /* complain_on_overflow */
bc1bc43f 959 bfd_elf_generic_reloc, /* special_function */
3765b1be 960 "GOTTPREL", /* name */
0a1b45a2 961 false, /* partial_inplace */
3765b1be
RH
962 0xffff, /* src_mask */
963 0xffff, /* dst_mask */
0a1b45a2 964 false), /* pcrel_offset */
3765b1be
RH
965
966 /* A dynamic relocation for a displacement from TP to the target. */
967 HOWTO (R_ALPHA_TPREL64, /* type */
968 0, /* rightshift */
c94cb026 969 8, /* size */
3765b1be 970 64, /* bitsize */
0a1b45a2 971 false, /* pc_relative */
3765b1be
RH
972 0, /* bitpos */
973 complain_overflow_bitfield, /* complain_on_overflow */
bc1bc43f 974 bfd_elf_generic_reloc, /* special_function */
3765b1be 975 "TPREL64", /* name */
0a1b45a2 976 false, /* partial_inplace */
3765b1be
RH
977 MINUS_ONE, /* src_mask */
978 MINUS_ONE, /* dst_mask */
0a1b45a2 979 false), /* pcrel_offset */
3765b1be
RH
980
981 /* The high 16 bits of the displacement from TP to the target. */
982 HOWTO (R_ALPHA_TPRELHI, /* type */
983 0, /* rightshift */
c94cb026 984 2, /* size */
3765b1be 985 16, /* bitsize */
0a1b45a2 986 false, /* pc_relative */
3765b1be
RH
987 0, /* bitpos */
988 complain_overflow_signed, /* complain_on_overflow */
bc1bc43f 989 bfd_elf_generic_reloc, /* special_function */
3765b1be 990 "TPRELHI", /* name */
0a1b45a2 991 false, /* partial_inplace */
3765b1be
RH
992 0xffff, /* src_mask */
993 0xffff, /* dst_mask */
0a1b45a2 994 false), /* pcrel_offset */
3765b1be
RH
995
996 /* The low 16 bits of the displacement from TP to the target. */
997 HOWTO (R_ALPHA_TPRELLO, /* type */
998 0, /* rightshift */
c94cb026 999 2, /* size */
3765b1be 1000 16, /* bitsize */
0a1b45a2 1001 false, /* pc_relative */
3765b1be
RH
1002 0, /* bitpos */
1003 complain_overflow_dont, /* complain_on_overflow */
bc1bc43f 1004 bfd_elf_generic_reloc, /* special_function */
3765b1be 1005 "TPRELLO", /* name */
0a1b45a2 1006 false, /* partial_inplace */
3765b1be
RH
1007 0xffff, /* src_mask */
1008 0xffff, /* dst_mask */
0a1b45a2 1009 false), /* pcrel_offset */
3765b1be
RH
1010
1011 /* A 16-bit displacement from TP to the target. */
1012 HOWTO (R_ALPHA_TPREL16, /* type */
1013 0, /* rightshift */
c94cb026 1014 2, /* size */
3765b1be 1015 16, /* bitsize */
0a1b45a2 1016 false, /* pc_relative */
3765b1be
RH
1017 0, /* bitpos */
1018 complain_overflow_signed, /* complain_on_overflow */
bc1bc43f 1019 bfd_elf_generic_reloc, /* special_function */
3765b1be 1020 "TPREL16", /* name */
0a1b45a2 1021 false, /* partial_inplace */
3765b1be
RH
1022 0xffff, /* src_mask */
1023 0xffff, /* dst_mask */
0a1b45a2 1024 false), /* pcrel_offset */
252b5132
RH
1025};
1026
252b5132
RH
1027/* A mapping from BFD reloc types to Alpha ELF reloc types. */
1028
1029struct elf_reloc_map
1030{
1031 bfd_reloc_code_real_type bfd_reloc_val;
1032 int elf_reloc_val;
1033};
1034
1035static const struct elf_reloc_map elf64_alpha_reloc_map[] =
1036{
dfe57ca0
RH
1037 {BFD_RELOC_NONE, R_ALPHA_NONE},
1038 {BFD_RELOC_32, R_ALPHA_REFLONG},
1039 {BFD_RELOC_64, R_ALPHA_REFQUAD},
1040 {BFD_RELOC_CTOR, R_ALPHA_REFQUAD},
1041 {BFD_RELOC_GPREL32, R_ALPHA_GPREL32},
1042 {BFD_RELOC_ALPHA_ELF_LITERAL, R_ALPHA_LITERAL},
1043 {BFD_RELOC_ALPHA_LITUSE, R_ALPHA_LITUSE},
1044 {BFD_RELOC_ALPHA_GPDISP, R_ALPHA_GPDISP},
1045 {BFD_RELOC_23_PCREL_S2, R_ALPHA_BRADDR},
1046 {BFD_RELOC_ALPHA_HINT, R_ALPHA_HINT},
1047 {BFD_RELOC_16_PCREL, R_ALPHA_SREL16},
1048 {BFD_RELOC_32_PCREL, R_ALPHA_SREL32},
1049 {BFD_RELOC_64_PCREL, R_ALPHA_SREL64},
1050 {BFD_RELOC_ALPHA_GPREL_HI16, R_ALPHA_GPRELHIGH},
1051 {BFD_RELOC_ALPHA_GPREL_LO16, R_ALPHA_GPRELLOW},
1052 {BFD_RELOC_GPREL16, R_ALPHA_GPREL16},
7793f4d0 1053 {BFD_RELOC_ALPHA_BRSGP, R_ALPHA_BRSGP},
3765b1be
RH
1054 {BFD_RELOC_ALPHA_TLSGD, R_ALPHA_TLSGD},
1055 {BFD_RELOC_ALPHA_TLSLDM, R_ALPHA_TLSLDM},
1056 {BFD_RELOC_ALPHA_DTPMOD64, R_ALPHA_DTPMOD64},
1057 {BFD_RELOC_ALPHA_GOTDTPREL16, R_ALPHA_GOTDTPREL},
1058 {BFD_RELOC_ALPHA_DTPREL64, R_ALPHA_DTPREL64},
1059 {BFD_RELOC_ALPHA_DTPREL_HI16, R_ALPHA_DTPRELHI},
1060 {BFD_RELOC_ALPHA_DTPREL_LO16, R_ALPHA_DTPRELLO},
1061 {BFD_RELOC_ALPHA_DTPREL16, R_ALPHA_DTPREL16},
1062 {BFD_RELOC_ALPHA_GOTTPREL16, R_ALPHA_GOTTPREL},
1063 {BFD_RELOC_ALPHA_TPREL64, R_ALPHA_TPREL64},
1064 {BFD_RELOC_ALPHA_TPREL_HI16, R_ALPHA_TPRELHI},
1065 {BFD_RELOC_ALPHA_TPREL_LO16, R_ALPHA_TPRELLO},
1066 {BFD_RELOC_ALPHA_TPREL16, R_ALPHA_TPREL16},
252b5132
RH
1067};
1068
1069/* Given a BFD reloc type, return a HOWTO structure. */
1070
1071static reloc_howto_type *
a7519a3c
RH
1072elf64_alpha_bfd_reloc_type_lookup (bfd *abfd ATTRIBUTE_UNUSED,
1073 bfd_reloc_code_real_type code)
252b5132
RH
1074{
1075 const struct elf_reloc_map *i, *e;
1076 i = e = elf64_alpha_reloc_map;
1077 e += sizeof (elf64_alpha_reloc_map) / sizeof (struct elf_reloc_map);
1078 for (; i != e; ++i)
1079 {
1080 if (i->bfd_reloc_val == code)
1081 return &elf64_alpha_howto_table[i->elf_reloc_val];
1082 }
1083 return 0;
1084}
1085
157090f7
AM
1086static reloc_howto_type *
1087elf64_alpha_bfd_reloc_name_lookup (bfd *abfd ATTRIBUTE_UNUSED,
1088 const char *r_name)
1089{
1090 unsigned int i;
1091
1092 for (i = 0;
1093 i < (sizeof (elf64_alpha_howto_table)
1094 / sizeof (elf64_alpha_howto_table[0]));
1095 i++)
1096 if (elf64_alpha_howto_table[i].name != NULL
1097 && strcasecmp (elf64_alpha_howto_table[i].name, r_name) == 0)
1098 return &elf64_alpha_howto_table[i];
1099
1100 return NULL;
1101}
1102
252b5132
RH
1103/* Given an Alpha ELF reloc type, fill in an arelent structure. */
1104
0a1b45a2 1105static bool
0aa13fee 1106elf64_alpha_info_to_howto (bfd *abfd, arelent *cache_ptr,
a7519a3c 1107 Elf_Internal_Rela *dst)
252b5132 1108{
a7519a3c 1109 unsigned r_type = ELF64_R_TYPE(dst->r_info);
cd21f5da
NC
1110
1111 if (r_type >= R_ALPHA_max)
1112 {
695344c0 1113 /* xgettext:c-format */
0aa13fee 1114 _bfd_error_handler (_("%pB: unsupported relocation type %#x"),
4eca0228 1115 abfd, r_type);
cd21f5da 1116 bfd_set_error (bfd_error_bad_value);
0a1b45a2 1117 return false;
cd21f5da 1118 }
252b5132 1119 cache_ptr->howto = &elf64_alpha_howto_table[r_type];
0a1b45a2 1120 return true;
252b5132 1121}
3765b1be
RH
1122
1123/* These two relocations create a two-word entry in the got. */
1124#define alpha_got_entry_size(r_type) \
1125 (r_type == R_ALPHA_TLSGD || r_type == R_ALPHA_TLSLDM ? 16 : 8)
9e756d64
RH
1126
1127/* This is PT_TLS segment p_vaddr. */
e1918d23
AM
1128#define alpha_get_dtprel_base(info) \
1129 (elf_hash_table (info)->tls_sec->vma)
9e756d64
RH
1130
1131/* Main program TLS (whose template starts at PT_TLS p_vaddr)
1132 is assigned offset round(16, PT_TLS p_align). */
e1918d23
AM
1133#define alpha_get_tprel_base(info) \
1134 (elf_hash_table (info)->tls_sec->vma \
1135 - align_power ((bfd_vma) 16, \
1136 elf_hash_table (info)->tls_sec->alignment_power))
252b5132 1137\f
a7519a3c
RH
1138/* Handle an Alpha specific section when reading an object file. This
1139 is called when bfd_section_from_shdr finds a section with an unknown
bf577467 1140 type. */
252b5132 1141
0a1b45a2 1142static bool
a7519a3c
RH
1143elf64_alpha_section_from_shdr (bfd *abfd,
1144 Elf_Internal_Shdr *hdr,
1145 const char *name,
1146 int shindex)
252b5132 1147{
a7519a3c
RH
1148 asection *newsect;
1149
1150 /* There ought to be a place to keep ELF backend specific flags, but
1151 at the moment there isn't one. We just keep track of the
1152 sections by their name, instead. Fortunately, the ABI gives
1153 suggested names for all the MIPS specific sections, so we will
1154 probably get away with this. */
1155 switch (hdr->sh_type)
1156 {
1157 case SHT_ALPHA_DEBUG:
1158 if (strcmp (name, ".mdebug") != 0)
0a1b45a2 1159 return false;
a7519a3c
RH
1160 break;
1161 default:
0a1b45a2 1162 return false;
a7519a3c 1163 }
252b5132 1164
a7519a3c 1165 if (! _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex))
0a1b45a2 1166 return false;
a7519a3c 1167 newsect = hdr->bfd_section;
252b5132 1168
a7519a3c 1169 if (hdr->sh_type == SHT_ALPHA_DEBUG)
252b5132 1170 {
fd361982
AM
1171 if (!bfd_set_section_flags (newsect,
1172 bfd_section_flags (newsect) | SEC_DEBUGGING))
0a1b45a2 1173 return false;
252b5132 1174 }
a7519a3c 1175
0a1b45a2 1176 return true;
252b5132
RH
1177}
1178
a7519a3c
RH
1179/* Convert Alpha specific section flags to bfd internal section flags. */
1180
0a1b45a2 1181static bool
8c803a2d 1182elf64_alpha_section_flags (const Elf_Internal_Shdr *hdr)
252b5132 1183{
a7519a3c 1184 if (hdr->sh_flags & SHF_ALPHA_GPREL)
8c803a2d 1185 hdr->bfd_section->flags |= SEC_SMALL_DATA;
252b5132 1186
0a1b45a2 1187 return true;
a7519a3c 1188}
252b5132 1189
a7519a3c
RH
1190/* Set the correct type for an Alpha ELF section. We do this by the
1191 section name, which is a hack, but ought to work. */
9e756d64 1192
0a1b45a2 1193static bool
a7519a3c
RH
1194elf64_alpha_fake_sections (bfd *abfd, Elf_Internal_Shdr *hdr, asection *sec)
1195{
1196 register const char *name;
1197
fd361982 1198 name = bfd_section_name (sec);
a7519a3c
RH
1199
1200 if (strcmp (name, ".mdebug") == 0)
252b5132 1201 {
a7519a3c
RH
1202 hdr->sh_type = SHT_ALPHA_DEBUG;
1203 /* In a shared object on Irix 5.3, the .mdebug section has an
07d6d2b8 1204 entsize of 0. FIXME: Does this matter? */
a7519a3c
RH
1205 if ((abfd->flags & DYNAMIC) != 0 )
1206 hdr->sh_entsize = 0;
1207 else
1208 hdr->sh_entsize = 1;
252b5132 1209 }
a7519a3c
RH
1210 else if ((sec->flags & SEC_SMALL_DATA)
1211 || strcmp (name, ".sdata") == 0
1212 || strcmp (name, ".sbss") == 0
1213 || strcmp (name, ".lit4") == 0
1214 || strcmp (name, ".lit8") == 0)
1215 hdr->sh_flags |= SHF_ALPHA_GPREL;
252b5132 1216
0a1b45a2 1217 return true;
a7519a3c 1218}
252b5132 1219
a7519a3c
RH
1220/* Hook called by the linker routine which adds symbols from an object
1221 file. We use it to put .comm items in .sbss, and not .bss. */
1222
0a1b45a2 1223static bool
a7519a3c
RH
1224elf64_alpha_add_symbol_hook (bfd *abfd, struct bfd_link_info *info,
1225 Elf_Internal_Sym *sym,
1226 const char **namep ATTRIBUTE_UNUSED,
1227 flagword *flagsp ATTRIBUTE_UNUSED,
1228 asection **secp, bfd_vma *valp)
1229{
1230 if (sym->st_shndx == SHN_COMMON
0e1862bb 1231 && !bfd_link_relocatable (info)
a7519a3c 1232 && sym->st_size <= elf_gp_size (abfd))
252b5132 1233 {
a7519a3c
RH
1234 /* Common symbols less than or equal to -G nn bytes are
1235 automatically put into .sbss. */
ffcb7aff 1236
a7519a3c 1237 asection *scomm = bfd_get_section_by_name (abfd, ".scommon");
252b5132 1238
a7519a3c 1239 if (scomm == NULL)
252b5132 1240 {
a7519a3c
RH
1241 scomm = bfd_make_section_with_flags (abfd, ".scommon",
1242 (SEC_ALLOC
1243 | SEC_IS_COMMON
10885e24 1244 | SEC_SMALL_DATA
a7519a3c
RH
1245 | SEC_LINKER_CREATED));
1246 if (scomm == NULL)
0a1b45a2 1247 return false;
a7519a3c 1248 }
ffcb7aff 1249
a7519a3c
RH
1250 *secp = scomm;
1251 *valp = sym->st_size;
1252 }
ffcb7aff 1253
0a1b45a2 1254 return true;
a7519a3c 1255}
252b5132 1256
a7519a3c 1257/* Create the .got section. */
252b5132 1258
0a1b45a2 1259static bool
a7519a3c
RH
1260elf64_alpha_create_got_section (bfd *abfd,
1261 struct bfd_link_info *info ATTRIBUTE_UNUSED)
1262{
85d162e6 1263 flagword flags;
a7519a3c 1264 asection *s;
252b5132 1265
0ffa91dd 1266 if (! is_alpha_elf (abfd))
0a1b45a2 1267 return false;
0ffa91dd 1268
85d162e6
AM
1269 flags = (SEC_ALLOC | SEC_LOAD | SEC_HAS_CONTENTS | SEC_IN_MEMORY
1270 | SEC_LINKER_CREATED);
1271 s = bfd_make_section_anyway_with_flags (abfd, ".got", flags);
a7519a3c 1272 if (s == NULL
fd361982 1273 || !bfd_set_section_alignment (s, 3))
0a1b45a2 1274 return false;
252b5132 1275
a7519a3c 1276 alpha_elf_tdata (abfd)->got = s;
252b5132 1277
85d162e6
AM
1278 /* Make sure the object's gotobj is set to itself so that we default
1279 to every object with its own .got. We'll merge .gots later once
1280 we've collected each object's info. */
1281 alpha_elf_tdata (abfd)->gotobj = abfd;
1282
0a1b45a2 1283 return true;
a7519a3c 1284}
252b5132 1285
a7519a3c 1286/* Create all the dynamic sections. */
252b5132 1287
0a1b45a2 1288static bool
a7519a3c
RH
1289elf64_alpha_create_dynamic_sections (bfd *abfd, struct bfd_link_info *info)
1290{
1291 asection *s;
85d162e6 1292 flagword flags;
a7519a3c 1293 struct elf_link_hash_entry *h;
252b5132 1294
0ffa91dd 1295 if (! is_alpha_elf (abfd))
0a1b45a2 1296 return false;
0ffa91dd 1297
a7519a3c 1298 /* We need to create .plt, .rela.plt, .got, and .rela.got sections. */
252b5132 1299
85d162e6
AM
1300 flags = (SEC_ALLOC | SEC_LOAD | SEC_CODE | SEC_HAS_CONTENTS | SEC_IN_MEMORY
1301 | SEC_LINKER_CREATED
1302 | (elf64_alpha_use_secureplt ? SEC_READONLY : 0));
1303 s = bfd_make_section_anyway_with_flags (abfd, ".plt", flags);
ce558b89 1304 elf_hash_table (info)->splt = s;
fd361982 1305 if (s == NULL || ! bfd_set_section_alignment (s, 4))
0a1b45a2 1306 return false;
252b5132 1307
a7519a3c
RH
1308 /* Define the symbol _PROCEDURE_LINKAGE_TABLE_ at the start of the
1309 .plt section. */
7325306f
RS
1310 h = _bfd_elf_define_linkage_sym (abfd, info, s,
1311 "_PROCEDURE_LINKAGE_TABLE_");
1312 elf_hash_table (info)->hplt = h;
1313 if (h == NULL)
0a1b45a2 1314 return false;
d6ad34f6 1315
85d162e6
AM
1316 flags = (SEC_ALLOC | SEC_LOAD | SEC_HAS_CONTENTS | SEC_IN_MEMORY
1317 | SEC_LINKER_CREATED | SEC_READONLY);
1318 s = bfd_make_section_anyway_with_flags (abfd, ".rela.plt", flags);
ce558b89 1319 elf_hash_table (info)->srelplt = s;
fd361982 1320 if (s == NULL || ! bfd_set_section_alignment (s, 3))
0a1b45a2 1321 return false;
252b5132 1322
6ec7057a
RH
1323 if (elf64_alpha_use_secureplt)
1324 {
85d162e6
AM
1325 flags = SEC_ALLOC | SEC_LINKER_CREATED;
1326 s = bfd_make_section_anyway_with_flags (abfd, ".got.plt", flags);
ce558b89 1327 elf_hash_table (info)->sgotplt = s;
fd361982 1328 if (s == NULL || ! bfd_set_section_alignment (s, 3))
0a1b45a2 1329 return false;
6ec7057a
RH
1330 }
1331
a7519a3c
RH
1332 /* We may or may not have created a .got section for this object, but
1333 we definitely havn't done the rest of the work. */
1cd6895c 1334
85d162e6
AM
1335 if (alpha_elf_tdata(abfd)->gotobj == NULL)
1336 {
1337 if (!elf64_alpha_create_got_section (abfd, info))
0a1b45a2 1338 return false;
85d162e6 1339 }
1cd6895c 1340
85d162e6
AM
1341 flags = (SEC_ALLOC | SEC_LOAD | SEC_HAS_CONTENTS | SEC_IN_MEMORY
1342 | SEC_LINKER_CREATED | SEC_READONLY);
1343 s = bfd_make_section_anyway_with_flags (abfd, ".rela.got", flags);
ce558b89 1344 elf_hash_table (info)->srelgot = s;
a7519a3c 1345 if (s == NULL
fd361982 1346 || !bfd_set_section_alignment (s, 3))
0a1b45a2 1347 return false;
252b5132 1348
a7519a3c
RH
1349 /* Define the symbol _GLOBAL_OFFSET_TABLE_ at the start of the
1350 dynobj's .got section. We don't do this in the linker script
1351 because we don't want to define the symbol if we are not creating
1352 a global offset table. */
d98685ac
AM
1353 h = _bfd_elf_define_linkage_sym (abfd, info, alpha_elf_tdata(abfd)->got,
1354 "_GLOBAL_OFFSET_TABLE_");
a7519a3c 1355 elf_hash_table (info)->hgot = h;
d98685ac 1356 if (h == NULL)
0a1b45a2 1357 return false;
252b5132 1358
0a1b45a2 1359 return true;
252b5132 1360}
a7519a3c
RH
1361\f
1362/* Read ECOFF debugging information from a .mdebug section into a
1363 ecoff_debug_info structure. */
252b5132 1364
0a1b45a2 1365static bool
a7519a3c
RH
1366elf64_alpha_read_ecoff_info (bfd *abfd, asection *section,
1367 struct ecoff_debug_info *debug)
252b5132 1368{
a7519a3c
RH
1369 HDRR *symhdr;
1370 const struct ecoff_debug_swap *swap;
1371 char *ext_hdr = NULL;
252b5132 1372
a7519a3c
RH
1373 swap = get_elf_backend_data (abfd)->elf_backend_ecoff_debug_swap;
1374 memset (debug, 0, sizeof (*debug));
252b5132 1375
a7519a3c
RH
1376 ext_hdr = (char *) bfd_malloc (swap->external_hdr_size);
1377 if (ext_hdr == NULL && swap->external_hdr_size != 0)
1378 goto error_return;
252b5132 1379
a7519a3c
RH
1380 if (! bfd_get_section_contents (abfd, section, ext_hdr, (file_ptr) 0,
1381 swap->external_hdr_size))
1382 goto error_return;
252b5132 1383
a7519a3c
RH
1384 symhdr = &debug->symbolic_header;
1385 (*swap->swap_hdr_in) (abfd, ext_hdr, symhdr);
252b5132 1386
a7519a3c
RH
1387 /* The symbolic header contains absolute file offsets and sizes to
1388 read. */
1389#define READ(ptr, offset, count, size, type) \
1f4361a7 1390 do \
a7519a3c 1391 { \
1f4361a7
AM
1392 size_t amt; \
1393 debug->ptr = NULL; \
1394 if (symhdr->count == 0) \
1395 break; \
1396 if (_bfd_mul_overflow (size, symhdr->count, &amt)) \
1397 { \
1398 bfd_set_error (bfd_error_file_too_big); \
1399 goto error_return; \
1400 } \
2bb3687b 1401 if (bfd_seek (abfd, symhdr->offset, SEEK_SET) != 0) \
a7519a3c 1402 goto error_return; \
2bb3687b
AM
1403 debug->ptr = (type) _bfd_malloc_and_read (abfd, amt, amt); \
1404 if (debug->ptr == NULL) \
a7519a3c 1405 goto error_return; \
1f4361a7 1406 } while (0)
fe8bc63d 1407
a7519a3c 1408 READ (line, cbLineOffset, cbLine, sizeof (unsigned char), unsigned char *);
2c3fc389
NC
1409 READ (external_dnr, cbDnOffset, idnMax, swap->external_dnr_size, void *);
1410 READ (external_pdr, cbPdOffset, ipdMax, swap->external_pdr_size, void *);
1411 READ (external_sym, cbSymOffset, isymMax, swap->external_sym_size, void *);
1412 READ (external_opt, cbOptOffset, ioptMax, swap->external_opt_size, void *);
a7519a3c
RH
1413 READ (external_aux, cbAuxOffset, iauxMax, sizeof (union aux_ext),
1414 union aux_ext *);
1415 READ (ss, cbSsOffset, issMax, sizeof (char), char *);
1416 READ (ssext, cbSsExtOffset, issExtMax, sizeof (char), char *);
2c3fc389
NC
1417 READ (external_fdr, cbFdOffset, ifdMax, swap->external_fdr_size, void *);
1418 READ (external_rfd, cbRfdOffset, crfd, swap->external_rfd_size, void *);
1419 READ (external_ext, cbExtOffset, iextMax, swap->external_ext_size, void *);
a7519a3c 1420#undef READ
252b5132 1421
a7519a3c 1422 debug->fdr = NULL;
252b5132 1423
0a1b45a2 1424 return true;
252b5132 1425
a7519a3c 1426 error_return:
c9594989 1427 free (ext_hdr);
ce3ab55f 1428 _bfd_ecoff_free_ecoff_debug_info (debug);
0a1b45a2 1429 return false;
252b5132
RH
1430}
1431
a7519a3c
RH
1432/* Alpha ELF local labels start with '$'. */
1433
0a1b45a2 1434static bool
a7519a3c 1435elf64_alpha_is_local_label_name (bfd *abfd ATTRIBUTE_UNUSED, const char *name)
252b5132 1436{
a7519a3c
RH
1437 return name[0] == '$';
1438}
9e756d64 1439
0a1b45a2 1440static bool
fb167eb2
AM
1441elf64_alpha_find_nearest_line (bfd *abfd, asymbol **symbols,
1442 asection *section, bfd_vma offset,
1443 const char **filename_ptr,
a7519a3c 1444 const char **functionname_ptr,
fb167eb2
AM
1445 unsigned int *line_ptr,
1446 unsigned int *discriminator_ptr)
a7519a3c
RH
1447{
1448 asection *msec;
252b5132 1449
fb167eb2 1450 if (_bfd_dwarf2_find_nearest_line (abfd, symbols, NULL, section, offset,
a7519a3c 1451 filename_ptr, functionname_ptr,
fb167eb2 1452 line_ptr, discriminator_ptr,
9defd221 1453 dwarf_debug_sections,
7f3bf384
AM
1454 &elf_tdata (abfd)->dwarf2_find_line_info)
1455 == 1)
0a1b45a2 1456 return true;
9e756d64 1457
a7519a3c
RH
1458 msec = bfd_get_section_by_name (abfd, ".mdebug");
1459 if (msec != NULL)
1bbc9cec 1460 {
a7519a3c 1461 flagword origflags;
698600e4 1462 struct alpha_elf_find_line *fi;
a7519a3c
RH
1463 const struct ecoff_debug_swap * const swap =
1464 get_elf_backend_data (abfd)->elf_backend_ecoff_debug_swap;
252b5132 1465
a7519a3c
RH
1466 /* If we are called during a link, alpha_elf_final_link may have
1467 cleared the SEC_HAS_CONTENTS field. We force it back on here
1468 if appropriate (which it normally will be). */
1469 origflags = msec->flags;
1470 if (elf_section_data (msec)->this_hdr.sh_type != SHT_NOBITS)
1471 msec->flags |= SEC_HAS_CONTENTS;
9e756d64 1472
698600e4 1473 fi = alpha_elf_tdata (abfd)->find_line_info;
a7519a3c
RH
1474 if (fi == NULL)
1475 {
1476 bfd_size_type external_fdr_size;
1477 char *fraw_src;
1478 char *fraw_end;
1479 struct fdr *fdr_ptr;
698600e4 1480 bfd_size_type amt = sizeof (struct alpha_elf_find_line);
9e756d64 1481
698600e4 1482 fi = (struct alpha_elf_find_line *) bfd_zalloc (abfd, amt);
a7519a3c
RH
1483 if (fi == NULL)
1484 {
1485 msec->flags = origflags;
0a1b45a2 1486 return false;
a7519a3c 1487 }
9e756d64 1488
a7519a3c
RH
1489 if (!elf64_alpha_read_ecoff_info (abfd, msec, &fi->d))
1490 {
1491 msec->flags = origflags;
0a1b45a2 1492 return false;
a7519a3c 1493 }
9e756d64 1494
a7519a3c
RH
1495 /* Swap in the FDR information. */
1496 amt = fi->d.symbolic_header.ifdMax * sizeof (struct fdr);
1497 fi->d.fdr = (struct fdr *) bfd_alloc (abfd, amt);
1498 if (fi->d.fdr == NULL)
1499 {
1500 msec->flags = origflags;
0a1b45a2 1501 return false;
a7519a3c
RH
1502 }
1503 external_fdr_size = swap->external_fdr_size;
1504 fdr_ptr = fi->d.fdr;
1505 fraw_src = (char *) fi->d.external_fdr;
1506 fraw_end = (fraw_src
1507 + fi->d.symbolic_header.ifdMax * external_fdr_size);
1508 for (; fraw_src < fraw_end; fraw_src += external_fdr_size, fdr_ptr++)
2c3fc389 1509 (*swap->swap_fdr_in) (abfd, fraw_src, fdr_ptr);
9e756d64 1510
698600e4 1511 alpha_elf_tdata (abfd)->find_line_info = fi;
a7519a3c 1512 }
9e756d64 1513
a7519a3c
RH
1514 if (_bfd_ecoff_locate_line (abfd, section, offset, &fi->d, swap,
1515 &fi->i, filename_ptr, functionname_ptr,
1516 line_ptr))
1517 {
1518 msec->flags = origflags;
0a1b45a2 1519 return true;
a7519a3c 1520 }
9e756d64 1521
a7519a3c 1522 msec->flags = origflags;
9e756d64 1523 }
9e756d64 1524
a7519a3c 1525 /* Fall back on the generic ELF find_nearest_line routine. */
9e756d64 1526
fb167eb2 1527 return _bfd_elf_find_nearest_line (abfd, symbols, section, offset,
a7519a3c 1528 filename_ptr, functionname_ptr,
fb167eb2 1529 line_ptr, discriminator_ptr);
9e756d64 1530}
a7519a3c
RH
1531\f
1532/* Structure used to pass information to alpha_elf_output_extsym. */
9e756d64 1533
a7519a3c 1534struct extsym_info
9e756d64 1535{
a7519a3c
RH
1536 bfd *abfd;
1537 struct bfd_link_info *info;
1538 struct ecoff_debug_info *debug;
1539 const struct ecoff_debug_swap *swap;
0a1b45a2 1540 bool failed;
a7519a3c 1541};
9e756d64 1542
0a1b45a2 1543static bool
2cc15b10 1544elf64_alpha_output_extsym (struct elf_link_hash_entry *x, void * data)
a7519a3c 1545{
2cc15b10 1546 struct alpha_elf_link_hash_entry *h = (struct alpha_elf_link_hash_entry *) x;
a7519a3c 1547 struct extsym_info *einfo = (struct extsym_info *) data;
0a1b45a2 1548 bool strip;
a7519a3c 1549 asection *sec, *output_section;
9e756d64 1550
a7519a3c 1551 if (h->root.indx == -2)
0a1b45a2 1552 strip = false;
a7519a3c
RH
1553 else if ((h->root.def_dynamic
1554 || h->root.ref_dynamic
1555 || h->root.root.type == bfd_link_hash_new)
1556 && !h->root.def_regular
1557 && !h->root.ref_regular)
0a1b45a2 1558 strip = true;
a7519a3c
RH
1559 else if (einfo->info->strip == strip_all
1560 || (einfo->info->strip == strip_some
1561 && bfd_hash_lookup (einfo->info->keep_hash,
1562 h->root.root.root.string,
0a1b45a2
AM
1563 false, false) == NULL))
1564 strip = true;
a7519a3c 1565 else
0a1b45a2 1566 strip = false;
9e756d64 1567
a7519a3c 1568 if (strip)
0a1b45a2 1569 return true;
9e756d64 1570
a7519a3c 1571 if (h->esym.ifd == -2)
9e756d64 1572 {
a7519a3c
RH
1573 h->esym.jmptbl = 0;
1574 h->esym.cobol_main = 0;
1575 h->esym.weakext = 0;
1576 h->esym.reserved = 0;
1577 h->esym.ifd = ifdNil;
1578 h->esym.asym.value = 0;
1579 h->esym.asym.st = stGlobal;
9e756d64 1580
a7519a3c
RH
1581 if (h->root.root.type != bfd_link_hash_defined
1582 && h->root.root.type != bfd_link_hash_defweak)
1583 h->esym.asym.sc = scAbs;
1584 else
1585 {
1586 const char *name;
9e756d64 1587
a7519a3c
RH
1588 sec = h->root.root.u.def.section;
1589 output_section = sec->output_section;
9e756d64 1590
a7519a3c
RH
1591 /* When making a shared library and symbol h is the one from
1592 the another shared library, OUTPUT_SECTION may be null. */
1593 if (output_section == NULL)
1594 h->esym.asym.sc = scUndefined;
1595 else
1596 {
fd361982 1597 name = bfd_section_name (output_section);
9e756d64 1598
a7519a3c
RH
1599 if (strcmp (name, ".text") == 0)
1600 h->esym.asym.sc = scText;
1601 else if (strcmp (name, ".data") == 0)
1602 h->esym.asym.sc = scData;
1603 else if (strcmp (name, ".sdata") == 0)
1604 h->esym.asym.sc = scSData;
1605 else if (strcmp (name, ".rodata") == 0
1606 || strcmp (name, ".rdata") == 0)
1607 h->esym.asym.sc = scRData;
1608 else if (strcmp (name, ".bss") == 0)
1609 h->esym.asym.sc = scBss;
1610 else if (strcmp (name, ".sbss") == 0)
1611 h->esym.asym.sc = scSBss;
1612 else if (strcmp (name, ".init") == 0)
1613 h->esym.asym.sc = scInit;
1614 else if (strcmp (name, ".fini") == 0)
1615 h->esym.asym.sc = scFini;
1616 else
1617 h->esym.asym.sc = scAbs;
1618 }
1619 }
9e756d64 1620
a7519a3c
RH
1621 h->esym.asym.reserved = 0;
1622 h->esym.asym.index = indexNil;
1623 }
9e756d64 1624
a7519a3c
RH
1625 if (h->root.root.type == bfd_link_hash_common)
1626 h->esym.asym.value = h->root.root.u.c.size;
1627 else if (h->root.root.type == bfd_link_hash_defined
1628 || h->root.root.type == bfd_link_hash_defweak)
1629 {
1630 if (h->esym.asym.sc == scCommon)
1631 h->esym.asym.sc = scBss;
1632 else if (h->esym.asym.sc == scSCommon)
1633 h->esym.asym.sc = scSBss;
9e756d64 1634
a7519a3c
RH
1635 sec = h->root.root.u.def.section;
1636 output_section = sec->output_section;
1637 if (output_section != NULL)
1638 h->esym.asym.value = (h->root.root.u.def.value
1639 + sec->output_offset
1640 + output_section->vma);
1641 else
1642 h->esym.asym.value = 0;
1643 }
9e756d64 1644
a7519a3c
RH
1645 if (! bfd_ecoff_debug_one_external (einfo->abfd, einfo->debug, einfo->swap,
1646 h->root.root.root.string,
1647 &h->esym))
1648 {
0a1b45a2
AM
1649 einfo->failed = true;
1650 return false;
9e756d64
RH
1651 }
1652
0a1b45a2 1653 return true;
a7519a3c
RH
1654}
1655\f
1656/* Search for and possibly create a got entry. */
9e756d64 1657
a7519a3c
RH
1658static struct alpha_elf_got_entry *
1659get_got_entry (bfd *abfd, struct alpha_elf_link_hash_entry *h,
1660 unsigned long r_type, unsigned long r_symndx,
1661 bfd_vma r_addend)
1662{
1663 struct alpha_elf_got_entry *gotent;
1664 struct alpha_elf_got_entry **slot;
9e756d64 1665
a7519a3c
RH
1666 if (h)
1667 slot = &h->got_entries;
1668 else
1669 {
1670 /* This is a local .got entry -- record for merge. */
9e756d64 1671
a7519a3c 1672 struct alpha_elf_got_entry **local_got_entries;
9e756d64 1673
a7519a3c
RH
1674 local_got_entries = alpha_elf_tdata(abfd)->local_got_entries;
1675 if (!local_got_entries)
1676 {
1677 bfd_size_type size;
1678 Elf_Internal_Shdr *symtab_hdr;
9e756d64 1679
a7519a3c
RH
1680 symtab_hdr = &elf_tdata(abfd)->symtab_hdr;
1681 size = symtab_hdr->sh_info;
1682 size *= sizeof (struct alpha_elf_got_entry *);
9e756d64 1683
a7519a3c
RH
1684 local_got_entries
1685 = (struct alpha_elf_got_entry **) bfd_zalloc (abfd, size);
1686 if (!local_got_entries)
1687 return NULL;
1688
1689 alpha_elf_tdata (abfd)->local_got_entries = local_got_entries;
1690 }
1691
1692 slot = &local_got_entries[r_symndx];
9e756d64
RH
1693 }
1694
a7519a3c
RH
1695 for (gotent = *slot; gotent ; gotent = gotent->next)
1696 if (gotent->gotobj == abfd
1697 && gotent->reloc_type == r_type
1698 && gotent->addend == r_addend)
1699 break;
1700
1701 if (!gotent)
9e756d64 1702 {
a7519a3c 1703 int entry_size;
986f0783 1704 size_t amt;
9e756d64 1705
a7519a3c
RH
1706 amt = sizeof (struct alpha_elf_got_entry);
1707 gotent = (struct alpha_elf_got_entry *) bfd_alloc (abfd, amt);
1708 if (!gotent)
1709 return NULL;
9e756d64 1710
a7519a3c
RH
1711 gotent->gotobj = abfd;
1712 gotent->addend = r_addend;
1713 gotent->got_offset = -1;
6ec7057a 1714 gotent->plt_offset = -1;
a7519a3c
RH
1715 gotent->use_count = 1;
1716 gotent->reloc_type = r_type;
1717 gotent->reloc_done = 0;
1718 gotent->reloc_xlated = 0;
9e756d64 1719
a7519a3c
RH
1720 gotent->next = *slot;
1721 *slot = gotent;
9e756d64 1722
a7519a3c
RH
1723 entry_size = alpha_got_entry_size (r_type);
1724 alpha_elf_tdata (abfd)->total_got_size += entry_size;
1725 if (!h)
1726 alpha_elf_tdata(abfd)->local_got_size += entry_size;
9e756d64 1727 }
a7519a3c
RH
1728 else
1729 gotent->use_count += 1;
9e756d64 1730
a7519a3c 1731 return gotent;
9e756d64
RH
1732}
1733
0a1b45a2 1734static bool
6ec7057a
RH
1735elf64_alpha_want_plt (struct alpha_elf_link_hash_entry *ah)
1736{
1737 return ((ah->root.type == STT_FUNC
1738 || ah->root.root.type == bfd_link_hash_undefweak
1739 || ah->root.root.type == bfd_link_hash_undefined)
8288a39e
RH
1740 && (ah->flags & ALPHA_ELF_LINK_HASH_LU_PLT) != 0
1741 && (ah->flags & ~ALPHA_ELF_LINK_HASH_LU_PLT) == 0);
6ec7057a
RH
1742}
1743
6fc5bb57
AM
1744/* Whether to sort relocs output by ld -r or ld --emit-relocs, by r_offset.
1745 Don't do so for code sections. We want to keep ordering of LITERAL/LITUSE
1746 as is. On the other hand, elf-eh-frame.c processing requires .eh_frame
1747 relocs to be sorted. */
1748
0a1b45a2 1749static bool
6fc5bb57
AM
1750elf64_alpha_sort_relocs_p (asection *sec)
1751{
1752 return (sec->flags & SEC_CODE) == 0;
1753}
1754
1755
a7519a3c
RH
1756/* Handle dynamic relocations when doing an Alpha ELF link. */
1757
0a1b45a2 1758static bool
a7519a3c
RH
1759elf64_alpha_check_relocs (bfd *abfd, struct bfd_link_info *info,
1760 asection *sec, const Elf_Internal_Rela *relocs)
252b5132 1761{
a7519a3c
RH
1762 bfd *dynobj;
1763 asection *sreloc;
252b5132 1764 Elf_Internal_Shdr *symtab_hdr;
a7519a3c
RH
1765 struct alpha_elf_link_hash_entry **sym_hashes;
1766 const Elf_Internal_Rela *rel, *relend;
252b5132 1767
0e1862bb 1768 if (bfd_link_relocatable (info))
0a1b45a2 1769 return true;
252b5132 1770
0ffa91dd
NC
1771 BFD_ASSERT (is_alpha_elf (abfd));
1772
1773 dynobj = elf_hash_table (info)->dynobj;
a7519a3c 1774 if (dynobj == NULL)
0ffa91dd 1775 elf_hash_table (info)->dynobj = dynobj = abfd;
252b5132 1776
a7519a3c 1777 sreloc = NULL;
0ffa91dd
NC
1778 symtab_hdr = &elf_symtab_hdr (abfd);
1779 sym_hashes = alpha_elf_sym_hashes (abfd);
a7519a3c
RH
1780
1781 relend = relocs + sec->reloc_count;
1782 for (rel = relocs; rel < relend; ++rel)
1783 {
1784 enum {
1785 NEED_GOT = 1,
1786 NEED_GOT_ENTRY = 2,
1787 NEED_DYNREL = 4
1788 };
1789
1790 unsigned long r_symndx, r_type;
1791 struct alpha_elf_link_hash_entry *h;
1792 unsigned int gotent_flags;
0a1b45a2 1793 bool maybe_dynamic;
a7519a3c
RH
1794 unsigned int need;
1795 bfd_vma addend;
1796
1797 r_symndx = ELF64_R_SYM (rel->r_info);
1798 if (r_symndx < symtab_hdr->sh_info)
1799 h = NULL;
1800 else
1801 {
1802 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
252b5132 1803
a7519a3c
RH
1804 while (h->root.root.type == bfd_link_hash_indirect
1805 || h->root.root.type == bfd_link_hash_warning)
1806 h = (struct alpha_elf_link_hash_entry *)h->root.root.u.i.link;
252b5132 1807
81fbe831
AM
1808 /* PR15323, ref flags aren't set for references in the same
1809 object. */
a7519a3c
RH
1810 h->root.ref_regular = 1;
1811 }
252b5132 1812
a7519a3c 1813 /* We can only get preliminary data on whether a symbol is
07d6d2b8
AM
1814 locally or externally defined, as not all of the input files
1815 have yet been processed. Do something with what we know, as
1816 this may help reduce memory usage and processing time later. */
0a1b45a2 1817 maybe_dynamic = false;
0e1862bb 1818 if (h && ((bfd_link_pic (info)
a7519a3c
RH
1819 && (!info->symbolic
1820 || info->unresolved_syms_in_shared_libs == RM_IGNORE))
1821 || !h->root.def_regular
1822 || h->root.root.type == bfd_link_hash_defweak))
0a1b45a2 1823 maybe_dynamic = true;
252b5132 1824
a7519a3c
RH
1825 need = 0;
1826 gotent_flags = 0;
1827 r_type = ELF64_R_TYPE (rel->r_info);
1828 addend = rel->r_addend;
9e756d64 1829
9e756d64
RH
1830 switch (r_type)
1831 {
1832 case R_ALPHA_LITERAL:
a7519a3c
RH
1833 need = NEED_GOT | NEED_GOT_ENTRY;
1834
1835 /* Remember how this literal is used from its LITUSEs.
1836 This will be important when it comes to decide if we can
1837 create a .plt entry for a function symbol. */
1838 while (++rel < relend && ELF64_R_TYPE (rel->r_info) == R_ALPHA_LITUSE)
8288a39e 1839 if (rel->r_addend >= 1 && rel->r_addend <= 6)
a7519a3c
RH
1840 gotent_flags |= 1 << rel->r_addend;
1841 --rel;
1842
1843 /* No LITUSEs -- presumably the address is used somehow. */
1844 if (gotent_flags == 0)
1845 gotent_flags = ALPHA_ELF_LINK_HASH_LU_ADDR;
1846 break;
1847
1848 case R_ALPHA_GPDISP:
1849 case R_ALPHA_GPREL16:
1850 case R_ALPHA_GPREL32:
9e756d64
RH
1851 case R_ALPHA_GPRELHIGH:
1852 case R_ALPHA_GPRELLOW:
a7519a3c
RH
1853 case R_ALPHA_BRSGP:
1854 need = NEED_GOT;
1855 break;
1856
1857 case R_ALPHA_REFLONG:
1858 case R_ALPHA_REFQUAD:
0e1862bb 1859 if (bfd_link_pic (info) || maybe_dynamic)
a7519a3c 1860 need = NEED_DYNREL;
cc03ec80
RH
1861 break;
1862
9e756d64 1863 case R_ALPHA_TLSLDM:
cc03ec80 1864 /* The symbol for a TLSLDM reloc is ignored. Collapse the
cf35638d
TS
1865 reloc to the STN_UNDEF (0) symbol so that they all match. */
1866 r_symndx = STN_UNDEF;
a7519a3c 1867 h = 0;
0a1b45a2 1868 maybe_dynamic = false;
a7519a3c
RH
1869 /* FALLTHRU */
1870
1871 case R_ALPHA_TLSGD:
1872 case R_ALPHA_GOTDTPREL:
1873 need = NEED_GOT | NEED_GOT_ENTRY;
9e756d64 1874 break;
cc03ec80 1875
a7519a3c
RH
1876 case R_ALPHA_GOTTPREL:
1877 need = NEED_GOT | NEED_GOT_ENTRY;
1878 gotent_flags = ALPHA_ELF_LINK_HASH_TLS_IE;
0e1862bb 1879 if (bfd_link_pic (info))
a7519a3c
RH
1880 info->flags |= DF_STATIC_TLS;
1881 break;
1882
1883 case R_ALPHA_TPREL64:
3cbc1e5e 1884 if (bfd_link_dll (info))
e366eeae
RH
1885 {
1886 info->flags |= DF_STATIC_TLS;
1887 need = NEED_DYNREL;
1888 }
1889 else if (maybe_dynamic)
a7519a3c 1890 need = NEED_DYNREL;
a7519a3c 1891 break;
252b5132
RH
1892 }
1893
a7519a3c 1894 if (need & NEED_GOT)
252b5132 1895 {
85d162e6 1896 if (alpha_elf_tdata(abfd)->gotobj == NULL)
6cdc0ccc 1897 {
a7519a3c 1898 if (!elf64_alpha_create_got_section (abfd, info))
0a1b45a2 1899 return false;
c328dc3f 1900 }
252b5132 1901 }
252b5132 1902
a7519a3c
RH
1903 if (need & NEED_GOT_ENTRY)
1904 {
1905 struct alpha_elf_got_entry *gotent;
252b5132 1906
a7519a3c
RH
1907 gotent = get_got_entry (abfd, h, r_type, r_symndx, addend);
1908 if (!gotent)
0a1b45a2 1909 return false;
4a67a098 1910
a7519a3c 1911 if (gotent_flags)
cc03ec80 1912 {
a7519a3c
RH
1913 gotent->flags |= gotent_flags;
1914 if (h)
1915 {
1916 gotent_flags |= h->flags;
1917 h->flags = gotent_flags;
4a67a098 1918
a7519a3c 1919 /* Make a guess as to whether a .plt entry is needed. */
6ec7057a
RH
1920 /* ??? It appears that we won't make it into
1921 adjust_dynamic_symbol for symbols that remain
1922 totally undefined. Copying this check here means
1923 we can create a plt entry for them too. */
1924 h->root.needs_plt
1925 = (maybe_dynamic && elf64_alpha_want_plt (h));
1926 }
a7519a3c 1927 }
252b5132
RH
1928 }
1929
a7519a3c 1930 if (need & NEED_DYNREL)
9e756d64 1931 {
a7519a3c
RH
1932 /* We need to create the section here now whether we eventually
1933 use it or not so that it gets mapped to an output section by
83bac4b0 1934 the linker. If not used, we'll kill it in size_dynamic_sections. */
a7519a3c 1935 if (sreloc == NULL)
9e756d64 1936 {
83bac4b0 1937 sreloc = _bfd_elf_make_dynamic_reloc_section
0a1b45a2 1938 (sec, dynobj, 3, abfd, /*rela?*/ true);
83bac4b0 1939
a7519a3c 1940 if (sreloc == NULL)
0a1b45a2 1941 return false;
9e756d64 1942 }
252b5132 1943
a7519a3c
RH
1944 if (h)
1945 {
1946 /* Since we havn't seen all of the input symbols yet, we
1947 don't know whether we'll actually need a dynamic relocation
1948 entry for this reloc. So make a record of it. Once we
1949 find out if this thing needs dynamic relocation we'll
1950 expand the relocation sections by the appropriate amount. */
9e756d64 1951
a7519a3c 1952 struct alpha_elf_reloc_entry *rent;
9e756d64 1953
a7519a3c
RH
1954 for (rent = h->reloc_entries; rent; rent = rent->next)
1955 if (rent->rtype == r_type && rent->srel == sreloc)
1956 break;
252b5132 1957
a7519a3c
RH
1958 if (!rent)
1959 {
986f0783 1960 size_t amt = sizeof (struct alpha_elf_reloc_entry);
a7519a3c
RH
1961 rent = (struct alpha_elf_reloc_entry *) bfd_alloc (abfd, amt);
1962 if (!rent)
0a1b45a2 1963 return false;
252b5132 1964
a7519a3c 1965 rent->srel = sreloc;
1f7f2abb 1966 rent->sec = sec;
a7519a3c
RH
1967 rent->rtype = r_type;
1968 rent->count = 1;
252b5132 1969
a7519a3c
RH
1970 rent->next = h->reloc_entries;
1971 h->reloc_entries = rent;
1972 }
1973 else
1974 rent->count++;
1975 }
0e1862bb 1976 else if (bfd_link_pic (info))
a7519a3c
RH
1977 {
1978 /* If this is a shared library, and the section is to be
1979 loaded into memory, we need a RELATIVE reloc. */
1980 sreloc->size += sizeof (Elf64_External_Rela);
1981 if (sec->flags & SEC_READONLY)
1f7f2abb
L
1982 {
1983 info->flags |= DF_TEXTREL;
1984 info->callbacks->minfo
1985 (_("%pB: dynamic relocation against `%pT' in "
1986 "read-only section `%pA'\n"),
1987 sec->owner, h->root.root.root.string, sec);
1988 }
a7519a3c 1989 }
252b5132
RH
1990 }
1991 }
1992
0a1b45a2 1993 return true;
252b5132 1994}
252b5132 1995
e117360e
RH
1996/* Return the section that should be marked against GC for a given
1997 relocation. */
1998
1999static asection *
2000elf64_alpha_gc_mark_hook (asection *sec, struct bfd_link_info *info,
2001 Elf_Internal_Rela *rel,
2002 struct elf_link_hash_entry *h, Elf_Internal_Sym *sym)
2003{
2004 /* These relocations don't really reference a symbol. Instead we store
2005 extra data in their addend slot. Ignore the symbol. */
2006 switch (ELF64_R_TYPE (rel->r_info))
2007 {
2008 case R_ALPHA_LITUSE:
2009 case R_ALPHA_GPDISP:
2010 case R_ALPHA_HINT:
2011 return NULL;
2012 }
2013
2014 return _bfd_elf_gc_mark_hook (sec, info, rel, h, sym);
2015}
2016
a7519a3c
RH
2017/* Adjust a symbol defined by a dynamic object and referenced by a
2018 regular object. The current definition is in some section of the
2019 dynamic object, but we're not including those sections. We have to
2020 change the definition to something the rest of the link can
2021 understand. */
252b5132 2022
0a1b45a2 2023static bool
a7519a3c
RH
2024elf64_alpha_adjust_dynamic_symbol (struct bfd_link_info *info,
2025 struct elf_link_hash_entry *h)
252b5132 2026{
a7519a3c
RH
2027 bfd *dynobj;
2028 asection *s;
2029 struct alpha_elf_link_hash_entry *ah;
252b5132 2030
a7519a3c
RH
2031 dynobj = elf_hash_table(info)->dynobj;
2032 ah = (struct alpha_elf_link_hash_entry *)h;
252b5132 2033
a7519a3c 2034 /* Now that we've seen all of the input symbols, finalize our decision
6ec7057a
RH
2035 about whether this symbol should get a .plt entry. Irritatingly, it
2036 is common for folk to leave undefined symbols in shared libraries,
2037 and they still expect lazy binding; accept undefined symbols in lieu
2038 of STT_FUNC. */
2039 if (alpha_elf_dynamic_symbol_p (h, info) && elf64_alpha_want_plt (ah))
252b5132 2040 {
0a1b45a2 2041 h->needs_plt = true;
252b5132 2042
ce558b89 2043 s = elf_hash_table(info)->splt;
a7519a3c 2044 if (!s && !elf64_alpha_create_dynamic_sections (dynobj, info))
0a1b45a2 2045 return false;
204692d7 2046
6ec7057a
RH
2047 /* We need one plt entry per got subsection. Delay allocation of
2048 the actual plt entries until size_plt_section, called from
2049 size_dynamic_sections or during relaxation. */
252b5132 2050
0a1b45a2 2051 return true;
a7519a3c
RH
2052 }
2053 else
0a1b45a2 2054 h->needs_plt = false;
252b5132 2055
a7519a3c
RH
2056 /* If this is a weak symbol, and there is a real definition, the
2057 processor independent code will have arranged for us to see the
2058 real definition first, and we can just use the same value. */
60d67dc8 2059 if (h->is_weakalias)
252b5132 2060 {
60d67dc8
AM
2061 struct elf_link_hash_entry *def = weakdef (h);
2062 BFD_ASSERT (def->root.type == bfd_link_hash_defined);
2063 h->root.u.def.section = def->root.u.def.section;
2064 h->root.u.def.value = def->root.u.def.value;
0a1b45a2 2065 return true;
252b5132 2066 }
a7519a3c
RH
2067
2068 /* This is a reference to a symbol defined by a dynamic object which
2069 is not a function. The Alpha, since it uses .got entries for all
2070 symbols even in regular objects, does not need the hackery of a
2071 .dynbss section and COPY dynamic relocations. */
252b5132 2072
0a1b45a2 2073 return true;
252b5132
RH
2074}
2075
747ffa7b
AM
2076/* Record STO_ALPHA_NOPV and STO_ALPHA_STD_GPLOAD. */
2077
2078static void
2079elf64_alpha_merge_symbol_attribute (struct elf_link_hash_entry *h,
5160d0f3 2080 unsigned int st_other,
0a1b45a2
AM
2081 bool definition,
2082 bool dynamic)
747ffa7b
AM
2083{
2084 if (!dynamic && definition)
2085 h->other = ((h->other & ELF_ST_VISIBILITY (-1))
5160d0f3 2086 | (st_other & ~ELF_ST_VISIBILITY (-1)));
747ffa7b
AM
2087}
2088
a7519a3c
RH
2089/* Symbol versioning can create new symbols, and make our old symbols
2090 indirect to the new ones. Consolidate the got and reloc information
2091 in these situations. */
252b5132 2092
48f4b4f5
RH
2093static void
2094elf64_alpha_copy_indirect_symbol (struct bfd_link_info *info,
2095 struct elf_link_hash_entry *dir,
2096 struct elf_link_hash_entry *ind)
252b5132 2097{
48f4b4f5
RH
2098 struct alpha_elf_link_hash_entry *hi
2099 = (struct alpha_elf_link_hash_entry *) ind;
2100 struct alpha_elf_link_hash_entry *hs
2101 = (struct alpha_elf_link_hash_entry *) dir;
252b5132 2102
48f4b4f5
RH
2103 /* Do the merging in the superclass. */
2104 _bfd_elf_link_hash_copy_indirect(info, dir, ind);
252b5132 2105
a7519a3c 2106 /* Merge the flags. Whee. */
a7519a3c
RH
2107 hs->flags |= hi->flags;
2108
48f4b4f5
RH
2109 /* ??? It's unclear to me what's really supposed to happen when
2110 "merging" defweak and defined symbols, given that we don't
2111 actually throw away the defweak. This more-or-less copies
2112 the logic related to got and plt entries in the superclass. */
2113 if (ind->root.type != bfd_link_hash_indirect)
2114 return;
2115
a7519a3c
RH
2116 /* Merge the .got entries. Cannibalize the old symbol's list in
2117 doing so, since we don't need it anymore. */
2118
2119 if (hs->got_entries == NULL)
2120 hs->got_entries = hi->got_entries;
2121 else
2122 {
2123 struct alpha_elf_got_entry *gi, *gs, *gin, *gsh;
2124
2125 gsh = hs->got_entries;
2126 for (gi = hi->got_entries; gi ; gi = gin)
252b5132 2127 {
a7519a3c
RH
2128 gin = gi->next;
2129 for (gs = gsh; gs ; gs = gs->next)
2130 if (gi->gotobj == gs->gotobj
2131 && gi->reloc_type == gs->reloc_type
2132 && gi->addend == gs->addend)
2133 {
68994ca2 2134 gs->use_count += gi->use_count;
07d6d2b8 2135 goto got_found;
a7519a3c
RH
2136 }
2137 gi->next = hs->got_entries;
2138 hs->got_entries = gi;
2139 got_found:;
252b5132 2140 }
a7519a3c
RH
2141 }
2142 hi->got_entries = NULL;
252b5132 2143
a7519a3c
RH
2144 /* And similar for the reloc entries. */
2145
2146 if (hs->reloc_entries == NULL)
2147 hs->reloc_entries = hi->reloc_entries;
2148 else
2149 {
2150 struct alpha_elf_reloc_entry *ri, *rs, *rin, *rsh;
2151
2152 rsh = hs->reloc_entries;
2153 for (ri = hi->reloc_entries; ri ; ri = rin)
2154 {
2155 rin = ri->next;
2156 for (rs = rsh; rs ; rs = rs->next)
2157 if (ri->rtype == rs->rtype && ri->srel == rs->srel)
2158 {
2159 rs->count += ri->count;
2160 goto found_reloc;
2161 }
2162 ri->next = hs->reloc_entries;
2163 hs->reloc_entries = ri;
2164 found_reloc:;
2165 }
252b5132 2166 }
a7519a3c 2167 hi->reloc_entries = NULL;
252b5132
RH
2168}
2169
a7519a3c 2170/* Is it possible to merge two object file's .got tables? */
252b5132 2171
0a1b45a2 2172static bool
a7519a3c 2173elf64_alpha_can_merge_gots (bfd *a, bfd *b)
252b5132 2174{
a7519a3c
RH
2175 int total = alpha_elf_tdata (a)->total_got_size;
2176 bfd *bsub;
252b5132 2177
a7519a3c
RH
2178 /* Trivial quick fallout test. */
2179 if (total + alpha_elf_tdata (b)->total_got_size <= MAX_GOT_SIZE)
0a1b45a2 2180 return true;
252b5132 2181
a7519a3c
RH
2182 /* By their nature, local .got entries cannot be merged. */
2183 if ((total += alpha_elf_tdata (b)->local_got_size) > MAX_GOT_SIZE)
0a1b45a2 2184 return false;
252b5132 2185
a7519a3c
RH
2186 /* Failing the common trivial comparison, we must effectively
2187 perform the merge. Not actually performing the merge means that
2188 we don't have to store undo information in case we fail. */
2189 for (bsub = b; bsub ; bsub = alpha_elf_tdata (bsub)->in_got_link_next)
2190 {
2191 struct alpha_elf_link_hash_entry **hashes = alpha_elf_sym_hashes (bsub);
2192 Elf_Internal_Shdr *symtab_hdr = &elf_tdata (bsub)->symtab_hdr;
2193 int i, n;
2194
2195 n = NUM_SHDR_ENTRIES (symtab_hdr) - symtab_hdr->sh_info;
2196 for (i = 0; i < n; ++i)
2197 {
2198 struct alpha_elf_got_entry *ae, *be;
2199 struct alpha_elf_link_hash_entry *h;
2200
2201 h = hashes[i];
2202 while (h->root.root.type == bfd_link_hash_indirect
07d6d2b8 2203 || h->root.root.type == bfd_link_hash_warning)
a7519a3c
RH
2204 h = (struct alpha_elf_link_hash_entry *)h->root.root.u.i.link;
2205
2206 for (be = h->got_entries; be ; be = be->next)
2207 {
2208 if (be->use_count == 0)
07d6d2b8 2209 continue;
a7519a3c 2210 if (be->gotobj != b)
07d6d2b8 2211 continue;
a7519a3c
RH
2212
2213 for (ae = h->got_entries; ae ; ae = ae->next)
07d6d2b8 2214 if (ae->gotobj == a
a7519a3c
RH
2215 && ae->reloc_type == be->reloc_type
2216 && ae->addend == be->addend)
2217 goto global_found;
2218
2219 total += alpha_got_entry_size (be->reloc_type);
2220 if (total > MAX_GOT_SIZE)
0a1b45a2 2221 return false;
a7519a3c
RH
2222 global_found:;
2223 }
2224 }
2225 }
252b5132 2226
0a1b45a2 2227 return true;
252b5132
RH
2228}
2229
a7519a3c 2230/* Actually merge two .got tables. */
252b5132 2231
a7519a3c
RH
2232static void
2233elf64_alpha_merge_gots (bfd *a, bfd *b)
252b5132 2234{
a7519a3c
RH
2235 int total = alpha_elf_tdata (a)->total_got_size;
2236 bfd *bsub;
252b5132 2237
a7519a3c
RH
2238 /* Remember local expansion. */
2239 {
2240 int e = alpha_elf_tdata (b)->local_got_size;
2241 total += e;
2242 alpha_elf_tdata (a)->local_got_size += e;
2243 }
252b5132 2244
a7519a3c
RH
2245 for (bsub = b; bsub ; bsub = alpha_elf_tdata (bsub)->in_got_link_next)
2246 {
2247 struct alpha_elf_got_entry **local_got_entries;
2248 struct alpha_elf_link_hash_entry **hashes;
2249 Elf_Internal_Shdr *symtab_hdr;
2250 int i, n;
252b5132 2251
a7519a3c
RH
2252 /* Let the local .got entries know they are part of a new subsegment. */
2253 local_got_entries = alpha_elf_tdata (bsub)->local_got_entries;
2254 if (local_got_entries)
07d6d2b8 2255 {
a7519a3c
RH
2256 n = elf_tdata (bsub)->symtab_hdr.sh_info;
2257 for (i = 0; i < n; ++i)
2258 {
2259 struct alpha_elf_got_entry *ent;
2260 for (ent = local_got_entries[i]; ent; ent = ent->next)
07d6d2b8 2261 ent->gotobj = a;
a7519a3c 2262 }
07d6d2b8 2263 }
252b5132 2264
a7519a3c
RH
2265 /* Merge the global .got entries. */
2266 hashes = alpha_elf_sym_hashes (bsub);
2267 symtab_hdr = &elf_tdata (bsub)->symtab_hdr;
252b5132 2268
a7519a3c
RH
2269 n = NUM_SHDR_ENTRIES (symtab_hdr) - symtab_hdr->sh_info;
2270 for (i = 0; i < n; ++i)
07d6d2b8 2271 {
a7519a3c
RH
2272 struct alpha_elf_got_entry *ae, *be, **pbe, **start;
2273 struct alpha_elf_link_hash_entry *h;
252b5132 2274
a7519a3c
RH
2275 h = hashes[i];
2276 while (h->root.root.type == bfd_link_hash_indirect
07d6d2b8 2277 || h->root.root.type == bfd_link_hash_warning)
a7519a3c 2278 h = (struct alpha_elf_link_hash_entry *)h->root.root.u.i.link;
252b5132 2279
a7519a3c
RH
2280 pbe = start = &h->got_entries;
2281 while ((be = *pbe) != NULL)
2282 {
2283 if (be->use_count == 0)
07d6d2b8 2284 {
a7519a3c
RH
2285 *pbe = be->next;
2286 memset (be, 0xa5, sizeof (*be));
2287 goto kill;
07d6d2b8 2288 }
a7519a3c 2289 if (be->gotobj != b)
07d6d2b8 2290 goto next;
a7519a3c
RH
2291
2292 for (ae = *start; ae ; ae = ae->next)
07d6d2b8 2293 if (ae->gotobj == a
a7519a3c
RH
2294 && ae->reloc_type == be->reloc_type
2295 && ae->addend == be->addend)
2296 {
2297 ae->flags |= be->flags;
2298 ae->use_count += be->use_count;
2299 *pbe = be->next;
2300 memset (be, 0xa5, sizeof (*be));
2301 goto kill;
2302 }
2303 be->gotobj = a;
2304 total += alpha_got_entry_size (be->reloc_type);
252b5132 2305
a7519a3c
RH
2306 next:;
2307 pbe = &be->next;
2308 kill:;
2309 }
07d6d2b8 2310 }
252b5132 2311
a7519a3c
RH
2312 alpha_elf_tdata (bsub)->gotobj = a;
2313 }
2314 alpha_elf_tdata (a)->total_got_size = total;
252b5132 2315
a7519a3c
RH
2316 /* Merge the two in_got chains. */
2317 {
2318 bfd *next;
252b5132 2319
a7519a3c
RH
2320 bsub = a;
2321 while ((next = alpha_elf_tdata (bsub)->in_got_link_next) != NULL)
2322 bsub = next;
252b5132 2323
a7519a3c
RH
2324 alpha_elf_tdata (bsub)->in_got_link_next = b;
2325 }
252b5132 2326}
a7519a3c
RH
2327
2328/* Calculate the offsets for the got entries. */
252b5132 2329
0a1b45a2 2330static bool
a7519a3c 2331elf64_alpha_calc_got_offsets_for_symbol (struct alpha_elf_link_hash_entry *h,
2c3fc389 2332 void * arg ATTRIBUTE_UNUSED)
252b5132 2333{
a7519a3c 2334 struct alpha_elf_got_entry *gotent;
252b5132 2335
a7519a3c
RH
2336 for (gotent = h->got_entries; gotent; gotent = gotent->next)
2337 if (gotent->use_count > 0)
2338 {
2339 struct alpha_elf_obj_tdata *td;
2340 bfd_size_type *plge;
252b5132 2341
a7519a3c 2342 td = alpha_elf_tdata (gotent->gotobj);
a7519a3c
RH
2343 plge = &td->got->size;
2344 gotent->got_offset = *plge;
2345 *plge += alpha_got_entry_size (gotent->reloc_type);
2346 }
252b5132 2347
0a1b45a2 2348 return true;
a7519a3c 2349}
252b5132 2350
a7519a3c
RH
2351static void
2352elf64_alpha_calc_got_offsets (struct bfd_link_info *info)
2353{
4dfe6ac6
NC
2354 bfd *i, *got_list;
2355 struct alpha_elf_link_hash_table * htab;
2356
2357 htab = alpha_elf_hash_table (info);
2358 if (htab == NULL)
2359 return;
2360 got_list = htab->got_list;
252b5132 2361
a7519a3c
RH
2362 /* First, zero out the .got sizes, as we may be recalculating the
2363 .got after optimizing it. */
2364 for (i = got_list; i ; i = alpha_elf_tdata(i)->got_link_next)
2365 alpha_elf_tdata(i)->got->size = 0;
252b5132 2366
a7519a3c 2367 /* Next, fill in the offsets for all the global entries. */
4dfe6ac6 2368 alpha_elf_link_hash_traverse (htab,
a7519a3c
RH
2369 elf64_alpha_calc_got_offsets_for_symbol,
2370 NULL);
252b5132 2371
a7519a3c
RH
2372 /* Finally, fill in the offsets for the local entries. */
2373 for (i = got_list; i ; i = alpha_elf_tdata(i)->got_link_next)
2374 {
2375 bfd_size_type got_offset = alpha_elf_tdata(i)->got->size;
2376 bfd *j;
252b5132 2377
a7519a3c
RH
2378 for (j = i; j ; j = alpha_elf_tdata(j)->in_got_link_next)
2379 {
2380 struct alpha_elf_got_entry **local_got_entries, *gotent;
2381 int k, n;
252b5132 2382
a7519a3c
RH
2383 local_got_entries = alpha_elf_tdata(j)->local_got_entries;
2384 if (!local_got_entries)
2385 continue;
252b5132 2386
a7519a3c
RH
2387 for (k = 0, n = elf_tdata(j)->symtab_hdr.sh_info; k < n; ++k)
2388 for (gotent = local_got_entries[k]; gotent; gotent = gotent->next)
2389 if (gotent->use_count > 0)
07d6d2b8 2390 {
a7519a3c
RH
2391 gotent->got_offset = got_offset;
2392 got_offset += alpha_got_entry_size (gotent->reloc_type);
07d6d2b8 2393 }
a7519a3c 2394 }
252b5132 2395
a7519a3c
RH
2396 alpha_elf_tdata(i)->got->size = got_offset;
2397 }
2398}
252b5132 2399
a7519a3c 2400/* Constructs the gots. */
252b5132 2401
0a1b45a2 2402static bool
d1c109de 2403elf64_alpha_size_got_sections (struct bfd_link_info *info,
0a1b45a2 2404 bool may_merge)
252b5132 2405{
a7519a3c 2406 bfd *i, *got_list, *cur_got_obj = NULL;
4dfe6ac6 2407 struct alpha_elf_link_hash_table * htab;
252b5132 2408
4dfe6ac6
NC
2409 htab = alpha_elf_hash_table (info);
2410 if (htab == NULL)
0a1b45a2 2411 return false;
4dfe6ac6 2412 got_list = htab->got_list;
95404643 2413
a7519a3c
RH
2414 /* On the first time through, pretend we have an existing got list
2415 consisting of all of the input files. */
2416 if (got_list == NULL)
252b5132 2417 {
c72f2fb2 2418 for (i = info->input_bfds; i ; i = i->link.next)
252b5132 2419 {
0ffa91dd
NC
2420 bfd *this_got;
2421
2422 if (! is_alpha_elf (i))
2423 continue;
2424
2425 this_got = alpha_elf_tdata (i)->gotobj;
a7519a3c
RH
2426 if (this_got == NULL)
2427 continue;
252b5132 2428
a7519a3c
RH
2429 /* We are assuming no merging has yet occurred. */
2430 BFD_ASSERT (this_got == i);
252b5132 2431
07d6d2b8 2432 if (alpha_elf_tdata (this_got)->total_got_size > MAX_GOT_SIZE)
252b5132 2433 {
a7519a3c 2434 /* Yikes! A single object file has too many entries. */
4eca0228 2435 _bfd_error_handler
695344c0 2436 /* xgettext:c-format */
871b3ab2 2437 (_("%pB: .got subsegment exceeds 64K (size %d)"),
07d6d2b8 2438 i, alpha_elf_tdata (this_got)->total_got_size);
0a1b45a2 2439 return false;
252b5132 2440 }
252b5132 2441
a7519a3c
RH
2442 if (got_list == NULL)
2443 got_list = this_got;
2444 else
2445 alpha_elf_tdata(cur_got_obj)->got_link_next = this_got;
2446 cur_got_obj = this_got;
252b5132
RH
2447 }
2448
a7519a3c
RH
2449 /* Strange degenerate case of no got references. */
2450 if (got_list == NULL)
0a1b45a2 2451 return true;
a7519a3c 2452
4dfe6ac6 2453 htab->got_list = got_list;
a7519a3c
RH
2454 }
2455
2456 cur_got_obj = got_list;
0ffa91dd 2457 if (cur_got_obj == NULL)
0a1b45a2 2458 return false;
0ffa91dd 2459
d1c109de 2460 if (may_merge)
a7519a3c 2461 {
d1c109de
RH
2462 i = alpha_elf_tdata(cur_got_obj)->got_link_next;
2463 while (i != NULL)
252b5132 2464 {
d1c109de
RH
2465 if (elf64_alpha_can_merge_gots (cur_got_obj, i))
2466 {
2467 elf64_alpha_merge_gots (cur_got_obj, i);
252b5132 2468
d1c109de
RH
2469 alpha_elf_tdata(i)->got->size = 0;
2470 i = alpha_elf_tdata(i)->got_link_next;
2471 alpha_elf_tdata(cur_got_obj)->got_link_next = i;
2472 }
2473 else
2474 {
2475 cur_got_obj = i;
2476 i = alpha_elf_tdata(i)->got_link_next;
2477 }
a7519a3c 2478 }
252b5132
RH
2479 }
2480
a7519a3c
RH
2481 /* Once the gots have been merged, fill in the got offsets for
2482 everything therein. */
4a828aab 2483 elf64_alpha_calc_got_offsets (info);
252b5132 2484
0a1b45a2 2485 return true;
252b5132 2486}
252b5132 2487
0a1b45a2 2488static bool
2c3fc389
NC
2489elf64_alpha_size_plt_section_1 (struct alpha_elf_link_hash_entry *h,
2490 void * data)
252b5132 2491{
a7519a3c
RH
2492 asection *splt = (asection *) data;
2493 struct alpha_elf_got_entry *gotent;
0a1b45a2 2494 bool saw_one = false;
252b5132 2495
a7519a3c
RH
2496 /* If we didn't need an entry before, we still don't. */
2497 if (!h->root.needs_plt)
0a1b45a2 2498 return true;
e92d460e 2499
6ec7057a 2500 /* For each LITERAL got entry still in use, allocate a plt entry. */
a7519a3c
RH
2501 for (gotent = h->got_entries; gotent ; gotent = gotent->next)
2502 if (gotent->reloc_type == R_ALPHA_LITERAL
2503 && gotent->use_count > 0)
6ec7057a
RH
2504 {
2505 if (splt->size == 0)
2506 splt->size = PLT_HEADER_SIZE;
2507 gotent->plt_offset = splt->size;
2508 splt->size += PLT_ENTRY_SIZE;
0a1b45a2 2509 saw_one = true;
6ec7057a 2510 }
a7519a3c 2511
6ec7057a
RH
2512 /* If there weren't any, there's no longer a need for the PLT entry. */
2513 if (!saw_one)
0a1b45a2 2514 h->root.needs_plt = false;
a7519a3c 2515
0a1b45a2 2516 return true;
a7519a3c
RH
2517}
2518
4a828aab
RH
2519/* Called from relax_section to rebuild the PLT in light of potential changes
2520 in the function's status. */
a7519a3c 2521
4a828aab 2522static void
a7519a3c
RH
2523elf64_alpha_size_plt_section (struct bfd_link_info *info)
2524{
6ec7057a 2525 asection *splt, *spltrel, *sgotplt;
a7519a3c 2526 unsigned long entries;
4dfe6ac6
NC
2527 struct alpha_elf_link_hash_table * htab;
2528
2529 htab = alpha_elf_hash_table (info);
2530 if (htab == NULL)
2531 return;
a7519a3c 2532
ce558b89 2533 splt = elf_hash_table(info)->splt;
a7519a3c 2534 if (splt == NULL)
4a828aab 2535 return;
252b5132 2536
a7519a3c 2537 splt->size = 0;
252b5132 2538
4dfe6ac6 2539 alpha_elf_link_hash_traverse (htab,
a7519a3c 2540 elf64_alpha_size_plt_section_1, splt);
e92d460e 2541
a7519a3c 2542 /* Every plt entry requires a JMP_SLOT relocation. */
ce558b89 2543 spltrel = elf_hash_table(info)->srelplt;
4a828aab 2544 entries = 0;
a7519a3c 2545 if (splt->size)
6ec7057a
RH
2546 {
2547 if (elf64_alpha_use_secureplt)
2548 entries = (splt->size - NEW_PLT_HEADER_SIZE) / NEW_PLT_ENTRY_SIZE;
2549 else
2550 entries = (splt->size - OLD_PLT_HEADER_SIZE) / OLD_PLT_ENTRY_SIZE;
2551 }
a7519a3c 2552 spltrel->size = entries * sizeof (Elf64_External_Rela);
e92d460e 2553
6ec7057a
RH
2554 /* When using the secureplt, we need two words somewhere in the data
2555 segment for the dynamic linker to tell us where to go. This is the
2556 entire contents of the .got.plt section. */
2557 if (elf64_alpha_use_secureplt)
2558 {
ce558b89 2559 sgotplt = elf_hash_table(info)->sgotplt;
6ec7057a
RH
2560 sgotplt->size = entries ? 16 : 0;
2561 }
a7519a3c 2562}
e92d460e 2563
0a1b45a2 2564static bool
a7519a3c
RH
2565elf64_alpha_always_size_sections (bfd *output_bfd ATTRIBUTE_UNUSED,
2566 struct bfd_link_info *info)
2567{
2568 bfd *i;
4dfe6ac6 2569 struct alpha_elf_link_hash_table * htab;
252b5132 2570
0e1862bb 2571 if (bfd_link_relocatable (info))
0a1b45a2 2572 return true;
252b5132 2573
4dfe6ac6
NC
2574 htab = alpha_elf_hash_table (info);
2575 if (htab == NULL)
0a1b45a2 2576 return false;
4dfe6ac6 2577
0a1b45a2
AM
2578 if (!elf64_alpha_size_got_sections (info, true))
2579 return false;
252b5132 2580
a7519a3c 2581 /* Allocate space for all of the .got subsections. */
4dfe6ac6 2582 i = htab->got_list;
a7519a3c 2583 for ( ; i ; i = alpha_elf_tdata(i)->got_link_next)
252b5132 2584 {
a7519a3c
RH
2585 asection *s = alpha_elf_tdata(i)->got;
2586 if (s->size > 0)
2587 {
2588 s->contents = (bfd_byte *) bfd_zalloc (i, s->size);
2589 if (s->contents == NULL)
0a1b45a2 2590 return false;
a7519a3c 2591 }
252b5132
RH
2592 }
2593
0a1b45a2 2594 return true;
252b5132 2595}
3765b1be 2596
a7519a3c 2597/* The number of dynamic relocations required by a static relocation. */
3765b1be 2598
a7519a3c 2599static int
e366eeae 2600alpha_dynamic_entries_for_reloc (int r_type, int dynamic, int shared, int pie)
a7519a3c
RH
2601{
2602 switch (r_type)
3765b1be 2603 {
a7519a3c
RH
2604 /* May appear in GOT entries. */
2605 case R_ALPHA_TLSGD:
2606 return (dynamic ? 2 : shared ? 1 : 0);
2607 case R_ALPHA_TLSLDM:
2608 return shared;
2609 case R_ALPHA_LITERAL:
a7519a3c 2610 return dynamic || shared;
e366eeae
RH
2611 case R_ALPHA_GOTTPREL:
2612 return dynamic || (shared && !pie);
a7519a3c
RH
2613 case R_ALPHA_GOTDTPREL:
2614 return dynamic;
3765b1be 2615
a7519a3c
RH
2616 /* May appear in data sections. */
2617 case R_ALPHA_REFLONG:
2618 case R_ALPHA_REFQUAD:
a7519a3c 2619 return dynamic || shared;
e366eeae
RH
2620 case R_ALPHA_TPREL64:
2621 return dynamic || (shared && !pie);
3765b1be 2622
a7519a3c
RH
2623 /* Everything else is illegal. We'll issue an error during
2624 relocate_section. */
2625 default:
2626 return 0;
2627 }
2628}
3765b1be 2629
a7519a3c 2630/* Work out the sizes of the dynamic relocation entries. */
3765b1be 2631
0a1b45a2 2632static bool
a7519a3c
RH
2633elf64_alpha_calc_dynrel_sizes (struct alpha_elf_link_hash_entry *h,
2634 struct bfd_link_info *info)
2635{
0a1b45a2 2636 bool dynamic;
a7519a3c
RH
2637 struct alpha_elf_reloc_entry *relent;
2638 unsigned long entries;
3765b1be 2639
a7519a3c
RH
2640 /* If the symbol was defined as a common symbol in a regular object
2641 file, and there was no definition in any dynamic object, then the
2642 linker will have allocated space for the symbol in a common
2643 section but the ELF_LINK_HASH_DEF_REGULAR flag will not have been
2644 set. This is done for dynamic symbols in
2645 elf_adjust_dynamic_symbol but this is not done for non-dynamic
2646 symbols, somehow. */
2647 if (!h->root.def_regular
2648 && h->root.ref_regular
2649 && !h->root.def_dynamic
2650 && (h->root.root.type == bfd_link_hash_defined
2651 || h->root.root.type == bfd_link_hash_defweak)
2652 && !(h->root.root.u.def.section->owner->flags & DYNAMIC))
2653 h->root.def_regular = 1;
3765b1be 2654
a7519a3c
RH
2655 /* If the symbol is dynamic, we'll need all the relocations in their
2656 natural form. If this is a shared object, and it has been forced
2657 local, we'll need the same number of RELATIVE relocations. */
2658 dynamic = alpha_elf_dynamic_symbol_p (&h->root, info);
3765b1be 2659
a7519a3c
RH
2660 /* If the symbol is a hidden undefined weak, then we never have any
2661 relocations. Avoid the loop which may want to add RELATIVE relocs
0e1862bb 2662 based on bfd_link_pic (info). */
a7519a3c 2663 if (h->root.root.type == bfd_link_hash_undefweak && !dynamic)
0a1b45a2 2664 return true;
a7519a3c
RH
2665
2666 for (relent = h->reloc_entries; relent; relent = relent->next)
3765b1be 2667 {
a7519a3c 2668 entries = alpha_dynamic_entries_for_reloc (relent->rtype, dynamic,
3cbc1e5e
AM
2669 bfd_link_pic (info),
2670 bfd_link_pie (info));
a7519a3c
RH
2671 if (entries)
2672 {
1f7f2abb 2673 asection *sec = relent->sec;
a7519a3c
RH
2674 relent->srel->size +=
2675 entries * sizeof (Elf64_External_Rela) * relent->count;
1f7f2abb
L
2676 if ((sec->flags & SEC_READONLY) != 0)
2677 {
2678 info->flags |= DT_TEXTREL;
2679 info->callbacks->minfo
2680 (_("%pB: dynamic relocation against `%pT' in "
2681 "read-only section `%pA'\n"),
2682 sec->owner, h->root.root.root.string, sec);
2683 }
a7519a3c
RH
2684 }
2685 }
3765b1be 2686
0a1b45a2 2687 return true;
a7519a3c 2688}
3765b1be 2689
a7519a3c
RH
2690/* Subroutine of elf64_alpha_size_rela_got_section for doing the
2691 global symbols. */
3765b1be 2692
0a1b45a2 2693static bool
a7519a3c
RH
2694elf64_alpha_size_rela_got_1 (struct alpha_elf_link_hash_entry *h,
2695 struct bfd_link_info *info)
2696{
0a1b45a2 2697 bool dynamic;
a7519a3c
RH
2698 struct alpha_elf_got_entry *gotent;
2699 unsigned long entries;
3765b1be 2700
6ec7057a
RH
2701 /* If we're using a plt for this symbol, then all of its relocations
2702 for its got entries go into .rela.plt. */
2703 if (h->root.needs_plt)
0a1b45a2 2704 return true;
6ec7057a 2705
a7519a3c
RH
2706 /* If the symbol is dynamic, we'll need all the relocations in their
2707 natural form. If this is a shared object, and it has been forced
2708 local, we'll need the same number of RELATIVE relocations. */
2709 dynamic = alpha_elf_dynamic_symbol_p (&h->root, info);
2710
2711 /* If the symbol is a hidden undefined weak, then we never have any
2712 relocations. Avoid the loop which may want to add RELATIVE relocs
0e1862bb 2713 based on bfd_link_pic (info). */
a7519a3c 2714 if (h->root.root.type == bfd_link_hash_undefweak && !dynamic)
0a1b45a2 2715 return true;
a7519a3c
RH
2716
2717 entries = 0;
2718 for (gotent = h->got_entries; gotent ; gotent = gotent->next)
2719 if (gotent->use_count > 0)
e366eeae 2720 entries += alpha_dynamic_entries_for_reloc (gotent->reloc_type, dynamic,
0e1862bb
L
2721 bfd_link_pic (info),
2722 bfd_link_pie (info));
a7519a3c 2723
a7519a3c
RH
2724 if (entries > 0)
2725 {
ce558b89 2726 asection *srel = elf_hash_table(info)->srelgot;
a7519a3c
RH
2727 BFD_ASSERT (srel != NULL);
2728 srel->size += sizeof (Elf64_External_Rela) * entries;
3765b1be 2729 }
3765b1be 2730
0a1b45a2 2731 return true;
3765b1be
RH
2732}
2733
a7519a3c 2734/* Set the sizes of the dynamic relocation sections. */
252b5132 2735
4a828aab 2736static void
a7519a3c 2737elf64_alpha_size_rela_got_section (struct bfd_link_info *info)
252b5132 2738{
a7519a3c 2739 unsigned long entries;
ce558b89 2740 bfd *i;
a7519a3c 2741 asection *srel;
4dfe6ac6
NC
2742 struct alpha_elf_link_hash_table * htab;
2743
2744 htab = alpha_elf_hash_table (info);
2745 if (htab == NULL)
2746 return;
252b5132 2747
a7519a3c
RH
2748 /* Shared libraries often require RELATIVE relocs, and some relocs
2749 require attention for the main application as well. */
252b5132 2750
a7519a3c 2751 entries = 0;
4dfe6ac6 2752 for (i = htab->got_list;
a7519a3c
RH
2753 i ; i = alpha_elf_tdata(i)->got_link_next)
2754 {
2755 bfd *j;
3241278a 2756
a7519a3c
RH
2757 for (j = i; j ; j = alpha_elf_tdata(j)->in_got_link_next)
2758 {
2759 struct alpha_elf_got_entry **local_got_entries, *gotent;
2760 int k, n;
252b5132 2761
a7519a3c
RH
2762 local_got_entries = alpha_elf_tdata(j)->local_got_entries;
2763 if (!local_got_entries)
2764 continue;
252b5132 2765
a7519a3c
RH
2766 for (k = 0, n = elf_tdata(j)->symtab_hdr.sh_info; k < n; ++k)
2767 for (gotent = local_got_entries[k];
2768 gotent ; gotent = gotent->next)
2769 if (gotent->use_count > 0)
2770 entries += (alpha_dynamic_entries_for_reloc
0e1862bb
L
2771 (gotent->reloc_type, 0, bfd_link_pic (info),
2772 bfd_link_pie (info)));
a7519a3c
RH
2773 }
2774 }
3765b1be 2775
ce558b89 2776 srel = elf_hash_table(info)->srelgot;
a7519a3c
RH
2777 if (!srel)
2778 {
2779 BFD_ASSERT (entries == 0);
4a828aab 2780 return;
a7519a3c
RH
2781 }
2782 srel->size = sizeof (Elf64_External_Rela) * entries;
252b5132 2783
a7519a3c 2784 /* Now do the non-local symbols. */
4dfe6ac6 2785 alpha_elf_link_hash_traverse (htab,
a7519a3c 2786 elf64_alpha_size_rela_got_1, info);
a7519a3c 2787}
252b5132 2788
a7519a3c 2789/* Set the sizes of the dynamic sections. */
3765b1be 2790
0a1b45a2 2791static bool
a7519a3c
RH
2792elf64_alpha_size_dynamic_sections (bfd *output_bfd ATTRIBUTE_UNUSED,
2793 struct bfd_link_info *info)
2794{
2795 bfd *dynobj;
2796 asection *s;
0a1b45a2 2797 bool relplt, relocs;
4dfe6ac6
NC
2798 struct alpha_elf_link_hash_table * htab;
2799
2800 htab = alpha_elf_hash_table (info);
2801 if (htab == NULL)
0a1b45a2 2802 return false;
3765b1be 2803
a7519a3c
RH
2804 dynobj = elf_hash_table(info)->dynobj;
2805 BFD_ASSERT(dynobj != NULL);
252b5132 2806
a7519a3c
RH
2807 if (elf_hash_table (info)->dynamic_sections_created)
2808 {
2809 /* Set the contents of the .interp section to the interpreter. */
9b8b325a 2810 if (bfd_link_executable (info) && !info->nointerp)
252b5132 2811 {
3d4d4302 2812 s = bfd_get_linker_section (dynobj, ".interp");
a7519a3c
RH
2813 BFD_ASSERT (s != NULL);
2814 s->size = sizeof ELF_DYNAMIC_INTERPRETER;
2815 s->contents = (unsigned char *) ELF_DYNAMIC_INTERPRETER;
2816 }
3765b1be 2817
a7519a3c
RH
2818 /* Now that we've seen all of the input files, we can decide which
2819 symbols need dynamic relocation entries and which don't. We've
2820 collected information in check_relocs that we can now apply to
2821 size the dynamic relocation sections. */
4dfe6ac6 2822 alpha_elf_link_hash_traverse (htab,
a7519a3c 2823 elf64_alpha_calc_dynrel_sizes, info);
252b5132 2824
a7519a3c 2825 elf64_alpha_size_rela_got_section (info);
6ec7057a 2826 elf64_alpha_size_plt_section (info);
a7519a3c
RH
2827 }
2828 /* else we're not dynamic and by definition we don't need such things. */
3765b1be 2829
a7519a3c
RH
2830 /* The check_relocs and adjust_dynamic_symbol entry points have
2831 determined the sizes of the various dynamic sections. Allocate
2832 memory for them. */
0a1b45a2
AM
2833 relplt = false;
2834 relocs = false;
a7519a3c
RH
2835 for (s = dynobj->sections; s != NULL; s = s->next)
2836 {
2837 const char *name;
3765b1be 2838
a7519a3c
RH
2839 if (!(s->flags & SEC_LINKER_CREATED))
2840 continue;
cc03ec80 2841
a7519a3c
RH
2842 /* It's OK to base decisions on the section name, because none
2843 of the dynobj section names depend upon the input files. */
fd361982 2844 name = bfd_section_name (s);
3765b1be 2845
08dedd66 2846 if (startswith (name, ".rela"))
3765b1be 2847 {
c456f082 2848 if (s->size != 0)
a7519a3c 2849 {
c456f082 2850 if (strcmp (name, ".rela.plt") == 0)
0a1b45a2 2851 relplt = true;
24f1a751 2852 else
0a1b45a2 2853 relocs = true;
252b5132 2854
a7519a3c
RH
2855 /* We use the reloc_count field as a counter if we need
2856 to copy relocs into the output file. */
2857 s->reloc_count = 0;
252b5132 2858 }
3765b1be 2859 }
08dedd66 2860 else if (! startswith (name, ".got")
c456f082
AM
2861 && strcmp (name, ".plt") != 0
2862 && strcmp (name, ".dynbss") != 0)
3765b1be 2863 {
a7519a3c
RH
2864 /* It's not one of our dynamic sections, so don't allocate space. */
2865 continue;
2866 }
252b5132 2867
c456f082
AM
2868 if (s->size == 0)
2869 {
2870 /* If we don't need this section, strip it from the output file.
2871 This is to handle .rela.bss and .rela.plt. We must create it
2872 in create_dynamic_sections, because it must be created before
2873 the linker maps input sections to output sections. The
2874 linker does that before adjust_dynamic_symbol is called, and
2875 it is that function which decides whether anything needs to
2876 go into these sections. */
08dedd66 2877 if (!startswith (name, ".got"))
6452a567 2878 s->flags |= SEC_EXCLUDE;
c456f082
AM
2879 }
2880 else if ((s->flags & SEC_HAS_CONTENTS) != 0)
a7519a3c
RH
2881 {
2882 /* Allocate memory for the section contents. */
2883 s->contents = (bfd_byte *) bfd_zalloc (dynobj, s->size);
c456f082 2884 if (s->contents == NULL)
0a1b45a2 2885 return false;
a7519a3c
RH
2886 }
2887 }
3765b1be 2888
a7519a3c
RH
2889 if (elf_hash_table (info)->dynamic_sections_created)
2890 {
2891 /* Add some entries to the .dynamic section. We fill in the
2892 values later, in elf64_alpha_finish_dynamic_sections, but we
2893 must add the entries now so that we get the correct size for
2894 the .dynamic section. The DT_DEBUG entry is filled in by the
2895 dynamic linker and used by the debugger. */
2896#define add_dynamic_entry(TAG, VAL) \
2897 _bfd_elf_add_dynamic_entry (info, TAG, VAL)
3765b1be 2898
3084d7a2
L
2899 if (!_bfd_elf_add_dynamic_tags (output_bfd, info,
2900 relocs || relplt))
0a1b45a2 2901 return false;
24f1a751 2902
3084d7a2
L
2903 if (relplt
2904 && elf64_alpha_use_secureplt
2905 && !add_dynamic_entry (DT_ALPHA_PLTRO, 1))
0a1b45a2 2906 return false;
252b5132 2907 }
a7519a3c 2908#undef add_dynamic_entry
252b5132 2909
0a1b45a2 2910 return true;
252b5132 2911}
a7519a3c
RH
2912\f
2913/* These functions do relaxation for Alpha ELF.
252b5132 2914
a7519a3c
RH
2915 Currently I'm only handling what I can do with existing compiler
2916 and assembler support, which means no instructions are removed,
2917 though some may be nopped. At this time GCC does not emit enough
2918 information to do all of the relaxing that is possible. It will
2919 take some not small amount of work for that to happen.
252b5132 2920
a7519a3c
RH
2921 There are a couple of interesting papers that I once read on this
2922 subject, that I cannot find references to at the moment, that
2923 related to Alpha in particular. They are by David Wall, then of
2924 DEC WRL. */
252b5132 2925
a7519a3c
RH
2926struct alpha_relax_info
2927{
2928 bfd *abfd;
2929 asection *sec;
2930 bfd_byte *contents;
2931 Elf_Internal_Shdr *symtab_hdr;
2932 Elf_Internal_Rela *relocs, *relend;
2933 struct bfd_link_info *link_info;
2934 bfd_vma gp;
2935 bfd *gotobj;
2936 asection *tsec;
2937 struct alpha_elf_link_hash_entry *h;
2938 struct alpha_elf_got_entry **first_gotent;
2939 struct alpha_elf_got_entry *gotent;
0a1b45a2
AM
2940 bool changed_contents;
2941 bool changed_relocs;
a7519a3c
RH
2942 unsigned char other;
2943};
252b5132 2944
a7519a3c
RH
2945static Elf_Internal_Rela *
2946elf64_alpha_find_reloc_at_ofs (Elf_Internal_Rela *rel,
2947 Elf_Internal_Rela *relend,
2948 bfd_vma offset, int type)
2949{
2950 while (rel < relend)
252b5132 2951 {
a7519a3c
RH
2952 if (rel->r_offset == offset
2953 && ELF64_R_TYPE (rel->r_info) == (unsigned int) type)
2954 return rel;
2955 ++rel;
2956 }
2957 return NULL;
2958}
252b5132 2959
0a1b45a2 2960static bool
a7519a3c
RH
2961elf64_alpha_relax_got_load (struct alpha_relax_info *info, bfd_vma symval,
2962 Elf_Internal_Rela *irel, unsigned long r_type)
2963{
2964 unsigned int insn;
2965 bfd_signed_vma disp;
252b5132 2966
a7519a3c
RH
2967 /* Get the instruction. */
2968 insn = bfd_get_32 (info->abfd, info->contents + irel->r_offset);
252b5132 2969
a7519a3c
RH
2970 if (insn >> 26 != OP_LDQ)
2971 {
2972 reloc_howto_type *howto = elf64_alpha_howto_table + r_type;
4eca0228 2973 _bfd_error_handler
695344c0 2974 /* xgettext:c-format */
2dcf00ce
AM
2975 (_("%pB: %pA+%#" PRIx64 ": warning: "
2976 "%s relocation against unexpected insn"),
2977 info->abfd, info->sec, (uint64_t) irel->r_offset, howto->name);
0a1b45a2 2978 return true;
a7519a3c 2979 }
252b5132 2980
a7519a3c 2981 /* Can't relax dynamic symbols. */
eae0b5c3
NC
2982 if (info->h != NULL
2983 && alpha_elf_dynamic_symbol_p (&info->h->root, info->link_info))
0a1b45a2 2984 return true;
252b5132 2985
a7519a3c 2986 /* Can't use local-exec relocations in shared libraries. */
e366eeae 2987 if (r_type == R_ALPHA_GOTTPREL
3cbc1e5e 2988 && bfd_link_dll (info->link_info))
0a1b45a2 2989 return true;
252b5132 2990
a7519a3c
RH
2991 if (r_type == R_ALPHA_LITERAL)
2992 {
2993 /* Look for nice constant addresses. This includes the not-uncommon
2994 special case of 0 for undefweak symbols. */
2995 if ((info->h && info->h->root.root.type == bfd_link_hash_undefweak)
0e1862bb 2996 || (!bfd_link_pic (info->link_info)
a7519a3c
RH
2997 && (symval >= (bfd_vma)-0x8000 || symval < 0x8000)))
2998 {
2999 disp = 0;
3000 insn = (OP_LDA << 26) | (insn & (31 << 21)) | (31 << 16);
3001 insn |= (symval & 0xffff);
3002 r_type = R_ALPHA_NONE;
3003 }
3004 else
3005 {
d1c109de
RH
3006 /* We may only create GPREL relocs during the second pass. */
3007 if (info->link_info->relax_pass == 0)
0a1b45a2 3008 return true;
d1c109de 3009
a7519a3c
RH
3010 disp = symval - info->gp;
3011 insn = (OP_LDA << 26) | (insn & 0x03ff0000);
3012 r_type = R_ALPHA_GPREL16;
3013 }
252b5132
RH
3014 }
3015 else
252b5132 3016 {
a7519a3c 3017 bfd_vma dtp_base, tp_base;
252b5132 3018
a7519a3c
RH
3019 BFD_ASSERT (elf_hash_table (info->link_info)->tls_sec != NULL);
3020 dtp_base = alpha_get_dtprel_base (info->link_info);
3021 tp_base = alpha_get_tprel_base (info->link_info);
3022 disp = symval - (r_type == R_ALPHA_GOTDTPREL ? dtp_base : tp_base);
252b5132 3023
a7519a3c 3024 insn = (OP_LDA << 26) | (insn & (31 << 21)) | (31 << 16);
252b5132 3025
a7519a3c
RH
3026 switch (r_type)
3027 {
3028 case R_ALPHA_GOTDTPREL:
3029 r_type = R_ALPHA_DTPREL16;
3030 break;
3031 case R_ALPHA_GOTTPREL:
3032 r_type = R_ALPHA_TPREL16;
3033 break;
3034 default:
3035 BFD_ASSERT (0);
0a1b45a2 3036 return false;
a7519a3c
RH
3037 }
3038 }
252b5132 3039
a7519a3c 3040 if (disp < -0x8000 || disp >= 0x8000)
0a1b45a2 3041 return true;
252b5132 3042
a7519a3c 3043 bfd_put_32 (info->abfd, (bfd_vma) insn, info->contents + irel->r_offset);
0a1b45a2 3044 info->changed_contents = true;
252b5132 3045
a7519a3c
RH
3046 /* Reduce the use count on this got entry by one, possibly
3047 eliminating it. */
3048 if (--info->gotent->use_count == 0)
252b5132 3049 {
a7519a3c
RH
3050 int sz = alpha_got_entry_size (r_type);
3051 alpha_elf_tdata (info->gotobj)->total_got_size -= sz;
3052 if (!info->h)
3053 alpha_elf_tdata (info->gotobj)->local_got_size -= sz;
252b5132 3054 }
252b5132 3055
a7519a3c
RH
3056 /* Smash the existing GOT relocation for its 16-bit immediate pair. */
3057 irel->r_info = ELF64_R_INFO (ELF64_R_SYM (irel->r_info), r_type);
0a1b45a2 3058 info->changed_relocs = true;
a7519a3c
RH
3059
3060 /* ??? Search forward through this basic block looking for insns
3061 that use the target register. Stop after an insn modifying the
3062 register is seen, or after a branch or call.
252b5132 3063
a7519a3c
RH
3064 Any such memory load insn may be substituted by a load directly
3065 off the GP. This allows the memory load insn to be issued before
3066 the calculated GP register would otherwise be ready.
252b5132 3067
a7519a3c
RH
3068 Any such jsr insn can be replaced by a bsr if it is in range.
3069
3070 This would mean that we'd have to _add_ relocations, the pain of
3071 which gives one pause. */
252b5132 3072
0a1b45a2 3073 return true;
252b5132
RH
3074}
3075
a7519a3c
RH
3076static bfd_vma
3077elf64_alpha_relax_opt_call (struct alpha_relax_info *info, bfd_vma symval)
252b5132 3078{
a7519a3c
RH
3079 /* If the function has the same gp, and we can identify that the
3080 function does not use its function pointer, we can eliminate the
3081 address load. */
252b5132 3082
a7519a3c
RH
3083 /* If the symbol is marked NOPV, we are being told the function never
3084 needs its procedure value. */
3085 if ((info->other & STO_ALPHA_STD_GPLOAD) == STO_ALPHA_NOPV)
3086 return symval;
252b5132 3087
a7519a3c
RH
3088 /* If the symbol is marked STD_GP, we are being told the function does
3089 a normal ldgp in the first two words. */
3090 else if ((info->other & STO_ALPHA_STD_GPLOAD) == STO_ALPHA_STD_GPLOAD)
3091 ;
252b5132 3092
a7519a3c
RH
3093 /* Otherwise, we may be able to identify a GP load in the first two
3094 words, which we can then skip. */
3095 else
252b5132 3096 {
a7519a3c
RH
3097 Elf_Internal_Rela *tsec_relocs, *tsec_relend, *tsec_free, *gpdisp;
3098 bfd_vma ofs;
252b5132 3099
a7519a3c
RH
3100 /* Load the relocations from the section that the target symbol is in. */
3101 if (info->sec == info->tsec)
252b5132 3102 {
a7519a3c
RH
3103 tsec_relocs = info->relocs;
3104 tsec_relend = info->relend;
3105 tsec_free = NULL;
3106 }
3107 else
3108 {
3109 tsec_relocs = (_bfd_elf_link_read_relocs
07d6d2b8 3110 (info->abfd, info->tsec, NULL,
a7519a3c
RH
3111 (Elf_Internal_Rela *) NULL,
3112 info->link_info->keep_memory));
3113 if (tsec_relocs == NULL)
3114 return 0;
3115 tsec_relend = tsec_relocs + info->tsec->reloc_count;
ae4fda66
JC
3116 tsec_free = (elf_section_data (info->tsec)->relocs == tsec_relocs
3117 ? NULL
3118 : tsec_relocs);
a7519a3c 3119 }
252b5132 3120
a7519a3c
RH
3121 /* Recover the symbol's offset within the section. */
3122 ofs = (symval - info->tsec->output_section->vma
3123 - info->tsec->output_offset);
252b5132 3124
a7519a3c
RH
3125 /* Look for a GPDISP reloc. */
3126 gpdisp = (elf64_alpha_find_reloc_at_ofs
3127 (tsec_relocs, tsec_relend, ofs, R_ALPHA_GPDISP));
252b5132 3128
a7519a3c
RH
3129 if (!gpdisp || gpdisp->r_addend != 4)
3130 {
c9594989 3131 free (tsec_free);
a7519a3c 3132 return 0;
252b5132 3133 }
c9594989 3134 free (tsec_free);
252b5132
RH
3135 }
3136
a7519a3c
RH
3137 /* We've now determined that we can skip an initial gp load. Verify
3138 that the call and the target use the same gp. */
f13a99db 3139 if (info->link_info->output_bfd->xvec != info->tsec->owner->xvec
a7519a3c
RH
3140 || info->gotobj != alpha_elf_tdata (info->tsec->owner)->gotobj)
3141 return 0;
252b5132 3142
a7519a3c
RH
3143 return symval + 8;
3144}
252b5132 3145
0a1b45a2 3146static bool
a7519a3c
RH
3147elf64_alpha_relax_with_lituse (struct alpha_relax_info *info,
3148 bfd_vma symval, Elf_Internal_Rela *irel)
252b5132 3149{
d1c109de
RH
3150 Elf_Internal_Rela *urel, *erel, *irelend = info->relend;
3151 int flags;
a7519a3c 3152 bfd_signed_vma disp;
0a1b45a2
AM
3153 bool fits16;
3154 bool fits32;
3155 bool lit_reused = false;
3156 bool all_optimized = true;
3157 bool changed_contents;
3158 bool changed_relocs;
d1c109de
RH
3159 bfd_byte *contents = info->contents;
3160 bfd *abfd = info->abfd;
3161 bfd_vma sec_output_vma;
a7519a3c 3162 unsigned int lit_insn;
d1c109de 3163 int relax_pass;
252b5132 3164
d1c109de 3165 lit_insn = bfd_get_32 (abfd, contents + irel->r_offset);
a7519a3c
RH
3166 if (lit_insn >> 26 != OP_LDQ)
3167 {
4eca0228 3168 _bfd_error_handler
695344c0 3169 /* xgettext:c-format */
2dcf00ce 3170 (_("%pB: %pA+%#" PRIx64 ": warning: "
38f14ab8
AM
3171 "%s relocation against unexpected insn"),
3172 abfd, info->sec, (uint64_t) irel->r_offset, "LITERAL");
0a1b45a2 3173 return true;
a7519a3c 3174 }
252b5132 3175
a7519a3c 3176 /* Can't relax dynamic symbols. */
f2cfdb74
AM
3177 if (info->h != NULL
3178 && alpha_elf_dynamic_symbol_p (&info->h->root, info->link_info))
0a1b45a2 3179 return true;
a7519a3c 3180
d1c109de
RH
3181 changed_contents = info->changed_contents;
3182 changed_relocs = info->changed_relocs;
3183 sec_output_vma = info->sec->output_section->vma + info->sec->output_offset;
3184 relax_pass = info->link_info->relax_pass;
3185
a7519a3c 3186 /* Summarize how this particular LITERAL is used. */
d1c109de 3187 for (erel = irel+1, flags = 0; erel < irelend; ++erel)
252b5132 3188 {
d1c109de 3189 if (ELF64_R_TYPE (erel->r_info) != R_ALPHA_LITUSE)
a7519a3c 3190 break;
d1c109de
RH
3191 if (erel->r_addend <= 6)
3192 flags |= 1 << erel->r_addend;
a7519a3c 3193 }
252b5132 3194
a7519a3c
RH
3195 /* A little preparation for the loop... */
3196 disp = symval - info->gp;
252b5132 3197
d1c109de 3198 for (urel = irel+1; urel < erel; ++urel)
a7519a3c 3199 {
d1c109de 3200 bfd_vma urel_r_offset = urel->r_offset;
a7519a3c
RH
3201 unsigned int insn;
3202 int insn_disp;
3203 bfd_signed_vma xdisp;
d1c109de 3204 Elf_Internal_Rela nrel;
252b5132 3205
d1c109de 3206 insn = bfd_get_32 (abfd, contents + urel_r_offset);
252b5132 3207
a7519a3c
RH
3208 switch (urel->r_addend)
3209 {
3210 case LITUSE_ALPHA_ADDR:
3211 default:
3212 /* This type is really just a placeholder to note that all
3213 uses cannot be optimized, but to still allow some. */
0a1b45a2 3214 all_optimized = false;
a7519a3c 3215 break;
252b5132 3216
a7519a3c 3217 case LITUSE_ALPHA_BASE:
d1c109de
RH
3218 /* We may only create GPREL relocs during the second pass. */
3219 if (relax_pass == 0)
3220 {
0a1b45a2 3221 all_optimized = false;
d1c109de
RH
3222 break;
3223 }
3224
a7519a3c 3225 /* We can always optimize 16-bit displacements. */
252b5132 3226
a7519a3c
RH
3227 /* Extract the displacement from the instruction, sign-extending
3228 it if necessary, then test whether it is within 16 or 32 bits
3229 displacement from GP. */
3230 insn_disp = ((insn & 0xffff) ^ 0x8000) - 0x8000;
3231
3232 xdisp = disp + insn_disp;
3233 fits16 = (xdisp >= - (bfd_signed_vma) 0x8000 && xdisp < 0x8000);
3234 fits32 = (xdisp >= - (bfd_signed_vma) 0x80000000
3235 && xdisp < 0x7fff8000);
3236
3237 if (fits16)
3238 {
3239 /* Take the op code and dest from this insn, take the base
3240 register from the literal insn. Leave the offset alone. */
3241 insn = (insn & 0xffe0ffff) | (lit_insn & 0x001f0000);
d1c109de 3242 bfd_put_32 (abfd, (bfd_vma) insn, contents + urel_r_offset);
0a1b45a2 3243 changed_contents = true;
d1c109de
RH
3244
3245 nrel = *urel;
3246 nrel.r_info = ELF64_R_INFO (ELF64_R_SYM (irel->r_info),
3247 R_ALPHA_GPREL16);
3248 nrel.r_addend = irel->r_addend;
3249
3250 /* As we adjust, move the reloc to the end so that we don't
07d6d2b8 3251 break the LITERAL+LITUSE chain. */
d1c109de 3252 if (urel < --erel)
07d6d2b8 3253 *urel-- = *erel;
d1c109de 3254 *erel = nrel;
0a1b45a2 3255 changed_relocs = true;
252b5132 3256 }
252b5132 3257
a7519a3c
RH
3258 /* If all mem+byte, we can optimize 32-bit mem displacements. */
3259 else if (fits32 && !(flags & ~6))
3260 {
3261 /* FIXME: sanity check that lit insn Ra is mem insn Rb. */
252b5132 3262
a7519a3c
RH
3263 irel->r_info = ELF64_R_INFO (ELF64_R_SYM (irel->r_info),
3264 R_ALPHA_GPRELHIGH);
3265 lit_insn = (OP_LDAH << 26) | (lit_insn & 0x03ff0000);
d1c109de 3266 bfd_put_32 (abfd, (bfd_vma) lit_insn, contents + irel->r_offset);
0a1b45a2
AM
3267 lit_reused = true;
3268 changed_contents = true;
252b5132 3269
07d6d2b8
AM
3270 /* Since all relocs must be optimized, don't bother swapping
3271 this relocation to the end. */
a7519a3c
RH
3272 urel->r_info = ELF64_R_INFO (ELF64_R_SYM (irel->r_info),
3273 R_ALPHA_GPRELLOW);
3274 urel->r_addend = irel->r_addend;
0a1b45a2 3275 changed_relocs = true;
a7519a3c
RH
3276 }
3277 else
0a1b45a2 3278 all_optimized = false;
a7519a3c 3279 break;
252b5132 3280
a7519a3c
RH
3281 case LITUSE_ALPHA_BYTOFF:
3282 /* We can always optimize byte instructions. */
252b5132 3283
a7519a3c
RH
3284 /* FIXME: sanity check the insn for byte op. Check that the
3285 literal dest reg is indeed Rb in the byte insn. */
252b5132 3286
a7519a3c
RH
3287 insn &= ~ (unsigned) 0x001ff000;
3288 insn |= ((symval & 7) << 13) | 0x1000;
d1c109de 3289 bfd_put_32 (abfd, (bfd_vma) insn, contents + urel_r_offset);
0a1b45a2 3290 changed_contents = true;
d1c109de
RH
3291
3292 nrel = *urel;
3293 nrel.r_info = ELF64_R_INFO (0, R_ALPHA_NONE);
3294 nrel.r_addend = 0;
3295
3296 /* As we adjust, move the reloc to the end so that we don't
3297 break the LITERAL+LITUSE chain. */
3298 if (urel < --erel)
3299 *urel-- = *erel;
3300 *erel = nrel;
0a1b45a2 3301 changed_relocs = true;
a7519a3c 3302 break;
252b5132 3303
a7519a3c
RH
3304 case LITUSE_ALPHA_JSR:
3305 case LITUSE_ALPHA_TLSGD:
3306 case LITUSE_ALPHA_TLSLDM:
8288a39e 3307 case LITUSE_ALPHA_JSRDIRECT:
0d5f9994 3308 {
a7519a3c
RH
3309 bfd_vma optdest, org;
3310 bfd_signed_vma odisp;
252b5132 3311
a7519a3c
RH
3312 /* For undefined weak symbols, we're mostly interested in getting
3313 rid of the got entry whenever possible, so optimize this to a
3314 use of the zero register. */
3315 if (info->h && info->h->root.root.type == bfd_link_hash_undefweak)
3316 {
3317 insn |= 31 << 16;
d1c109de 3318 bfd_put_32 (abfd, (bfd_vma) insn, contents + urel_r_offset);
252b5132 3319
0a1b45a2 3320 changed_contents = true;
a7519a3c
RH
3321 break;
3322 }
252b5132 3323
a7519a3c
RH
3324 /* If not zero, place to jump without needing pv. */
3325 optdest = elf64_alpha_relax_opt_call (info, symval);
d1c109de 3326 org = sec_output_vma + urel_r_offset + 4;
a7519a3c 3327 odisp = (optdest ? optdest : symval) - org;
252b5132 3328
a7519a3c
RH
3329 if (odisp >= -0x400000 && odisp < 0x400000)
3330 {
3331 Elf_Internal_Rela *xrel;
252b5132 3332
a7519a3c
RH
3333 /* Preserve branch prediction call stack when possible. */
3334 if ((insn & INSN_JSR_MASK) == INSN_JSR)
3335 insn = (OP_BSR << 26) | (insn & 0x03e00000);
3336 else
3337 insn = (OP_BR << 26) | (insn & 0x03e00000);
d1c109de 3338 bfd_put_32 (abfd, (bfd_vma) insn, contents + urel_r_offset);
0a1b45a2 3339 changed_contents = true;
252b5132 3340
d1c109de
RH
3341 nrel = *urel;
3342 nrel.r_info = ELF64_R_INFO (ELF64_R_SYM (irel->r_info),
3343 R_ALPHA_BRADDR);
3344 nrel.r_addend = irel->r_addend;
252b5132 3345
a7519a3c 3346 if (optdest)
d1c109de 3347 nrel.r_addend += optdest - symval;
a7519a3c 3348 else
0a1b45a2 3349 all_optimized = false;
252b5132 3350
a7519a3c
RH
3351 /* Kill any HINT reloc that might exist for this insn. */
3352 xrel = (elf64_alpha_find_reloc_at_ofs
d1c109de 3353 (info->relocs, info->relend, urel_r_offset,
a7519a3c
RH
3354 R_ALPHA_HINT));
3355 if (xrel)
3356 xrel->r_info = ELF64_R_INFO (0, R_ALPHA_NONE);
252b5132 3357
d1c109de
RH
3358 /* As we adjust, move the reloc to the end so that we don't
3359 break the LITERAL+LITUSE chain. */
3360 if (urel < --erel)
3361 *urel-- = *erel;
3362 *erel = nrel;
3363
0a1b45a2 3364 info->changed_relocs = true;
a7519a3c
RH
3365 }
3366 else
0a1b45a2 3367 all_optimized = false;
252b5132 3368
a7519a3c
RH
3369 /* Even if the target is not in range for a direct branch,
3370 if we share a GP, we can eliminate the gp reload. */
3371 if (optdest)
3372 {
3373 Elf_Internal_Rela *gpdisp
3374 = (elf64_alpha_find_reloc_at_ofs
d1c109de 3375 (info->relocs, irelend, urel_r_offset + 4,
a7519a3c
RH
3376 R_ALPHA_GPDISP));
3377 if (gpdisp)
3378 {
d1c109de 3379 bfd_byte *p_ldah = contents + gpdisp->r_offset;
a7519a3c 3380 bfd_byte *p_lda = p_ldah + gpdisp->r_addend;
d1c109de
RH
3381 unsigned int ldah = bfd_get_32 (abfd, p_ldah);
3382 unsigned int lda = bfd_get_32 (abfd, p_lda);
252b5132 3383
a7519a3c
RH
3384 /* Verify that the instruction is "ldah $29,0($26)".
3385 Consider a function that ends in a noreturn call,
3386 and that the next function begins with an ldgp,
3387 and that by accident there is no padding between.
3388 In that case the insn would use $27 as the base. */
3389 if (ldah == 0x27ba0000 && lda == 0x23bd0000)
3390 {
d1c109de
RH
3391 bfd_put_32 (abfd, (bfd_vma) INSN_UNOP, p_ldah);
3392 bfd_put_32 (abfd, (bfd_vma) INSN_UNOP, p_lda);
252b5132 3393
a7519a3c 3394 gpdisp->r_info = ELF64_R_INFO (0, R_ALPHA_NONE);
0a1b45a2
AM
3395 changed_contents = true;
3396 changed_relocs = true;
a7519a3c
RH
3397 }
3398 }
3399 }
3400 }
3401 break;
252b5132 3402 }
252b5132
RH
3403 }
3404
d1c109de
RH
3405 /* If we reused the literal instruction, we must have optimized all. */
3406 BFD_ASSERT(!lit_reused || all_optimized);
3407
a7519a3c
RH
3408 /* If all cases were optimized, we can reduce the use count on this
3409 got entry by one, possibly eliminating it. */
3410 if (all_optimized)
252b5132 3411 {
a7519a3c 3412 if (--info->gotent->use_count == 0)
252b5132 3413 {
a7519a3c
RH
3414 int sz = alpha_got_entry_size (R_ALPHA_LITERAL);
3415 alpha_elf_tdata (info->gotobj)->total_got_size -= sz;
3416 if (!info->h)
3417 alpha_elf_tdata (info->gotobj)->local_got_size -= sz;
252b5132 3418 }
a7519a3c
RH
3419
3420 /* If the literal instruction is no longer needed (it may have been
3421 reused. We can eliminate it. */
3422 /* ??? For now, I don't want to deal with compacting the section,
3423 so just nop it out. */
3424 if (!lit_reused)
252b5132 3425 {
a7519a3c 3426 irel->r_info = ELF64_R_INFO (0, R_ALPHA_NONE);
0a1b45a2 3427 changed_relocs = true;
252b5132 3428
d1c109de 3429 bfd_put_32 (abfd, (bfd_vma) INSN_UNOP, contents + irel->r_offset);
0a1b45a2 3430 changed_contents = true;
a7519a3c 3431 }
a7519a3c 3432 }
d1c109de
RH
3433
3434 info->changed_contents = changed_contents;
3435 info->changed_relocs = changed_relocs;
3436
3437 if (all_optimized || relax_pass == 0)
0a1b45a2 3438 return true;
d1c109de 3439 return elf64_alpha_relax_got_load (info, symval, irel, R_ALPHA_LITERAL);
252b5132
RH
3440}
3441
0a1b45a2 3442static bool
a7519a3c 3443elf64_alpha_relax_tls_get_addr (struct alpha_relax_info *info, bfd_vma symval,
0a1b45a2 3444 Elf_Internal_Rela *irel, bool is_gd)
f44f99a5 3445{
a7519a3c 3446 bfd_byte *pos[5];
891caa9b 3447 unsigned int insn, tlsgd_reg;
a7519a3c 3448 Elf_Internal_Rela *gpdisp, *hint;
0a1b45a2 3449 bool dynamic, use_gottprel;
a7519a3c 3450 unsigned long new_symndx;
f44f99a5 3451
c415c83b
AM
3452 dynamic = (info->h != NULL
3453 && alpha_elf_dynamic_symbol_p (&info->h->root, info->link_info));
f44f99a5 3454
a7519a3c
RH
3455 /* If a TLS symbol is accessed using IE at least once, there is no point
3456 to use dynamic model for it. */
3457 if (is_gd && info->h && (info->h->flags & ALPHA_ELF_LINK_HASH_TLS_IE))
3458 ;
f44f99a5 3459
a7519a3c
RH
3460 /* If the symbol is local, and we've already committed to DF_STATIC_TLS,
3461 then we might as well relax to IE. */
0e1862bb 3462 else if (bfd_link_pic (info->link_info) && !dynamic
a7519a3c
RH
3463 && (info->link_info->flags & DF_STATIC_TLS))
3464 ;
f44f99a5 3465
a7519a3c 3466 /* Otherwise we must be building an executable to do anything. */
0e1862bb 3467 else if (bfd_link_pic (info->link_info))
0a1b45a2 3468 return true;
f44f99a5 3469
a7519a3c
RH
3470 /* The TLSGD/TLSLDM relocation must be followed by a LITERAL and
3471 the matching LITUSE_TLS relocations. */
3472 if (irel + 2 >= info->relend)
0a1b45a2 3473 return true;
a7519a3c
RH
3474 if (ELF64_R_TYPE (irel[1].r_info) != R_ALPHA_LITERAL
3475 || ELF64_R_TYPE (irel[2].r_info) != R_ALPHA_LITUSE
3476 || irel[2].r_addend != (is_gd ? LITUSE_ALPHA_TLSGD : LITUSE_ALPHA_TLSLDM))
0a1b45a2 3477 return true;
f44f99a5 3478
a7519a3c
RH
3479 /* There must be a GPDISP relocation positioned immediately after the
3480 LITUSE relocation. */
3481 gpdisp = elf64_alpha_find_reloc_at_ofs (info->relocs, info->relend,
3482 irel[2].r_offset + 4, R_ALPHA_GPDISP);
3483 if (!gpdisp)
0a1b45a2 3484 return true;
f44f99a5 3485
a7519a3c
RH
3486 pos[0] = info->contents + irel[0].r_offset;
3487 pos[1] = info->contents + irel[1].r_offset;
3488 pos[2] = info->contents + irel[2].r_offset;
3489 pos[3] = info->contents + gpdisp->r_offset;
3490 pos[4] = pos[3] + gpdisp->r_addend;
f44f99a5 3491
7dbf3b76
RH
3492 /* Beware of the compiler hoisting part of the sequence out a loop
3493 and adjusting the destination register for the TLSGD insn. If this
3494 happens, there will be a move into $16 before the JSR insn, so only
3495 transformations of the first insn pair should use this register. */
3496 tlsgd_reg = bfd_get_32 (info->abfd, pos[0]);
3497 tlsgd_reg = (tlsgd_reg >> 21) & 31;
3498
a7519a3c
RH
3499 /* Generally, the positions are not allowed to be out of order, lest the
3500 modified insn sequence have different register lifetimes. We can make
3501 an exception when pos 1 is adjacent to pos 0. */
3502 if (pos[1] + 4 == pos[0])
f44f99a5 3503 {
a7519a3c
RH
3504 bfd_byte *tmp = pos[0];
3505 pos[0] = pos[1];
3506 pos[1] = tmp;
f44f99a5 3507 }
a7519a3c 3508 if (pos[1] >= pos[2] || pos[2] >= pos[3])
0a1b45a2 3509 return true;
cc03ec80 3510
a7519a3c
RH
3511 /* Reduce the use count on the LITERAL relocation. Do this before we
3512 smash the symndx when we adjust the relocations below. */
3513 {
3514 struct alpha_elf_got_entry *lit_gotent;
3515 struct alpha_elf_link_hash_entry *lit_h;
3516 unsigned long indx;
f44f99a5 3517
a7519a3c
RH
3518 BFD_ASSERT (ELF64_R_SYM (irel[1].r_info) >= info->symtab_hdr->sh_info);
3519 indx = ELF64_R_SYM (irel[1].r_info) - info->symtab_hdr->sh_info;
3520 lit_h = alpha_elf_sym_hashes (info->abfd)[indx];
f44f99a5 3521
a7519a3c
RH
3522 while (lit_h->root.root.type == bfd_link_hash_indirect
3523 || lit_h->root.root.type == bfd_link_hash_warning)
3524 lit_h = (struct alpha_elf_link_hash_entry *) lit_h->root.root.u.i.link;
252b5132 3525
a7519a3c
RH
3526 for (lit_gotent = lit_h->got_entries; lit_gotent ;
3527 lit_gotent = lit_gotent->next)
3528 if (lit_gotent->gotobj == info->gotobj
3529 && lit_gotent->reloc_type == R_ALPHA_LITERAL
3530 && lit_gotent->addend == irel[1].r_addend)
3531 break;
3532 BFD_ASSERT (lit_gotent);
252b5132 3533
a7519a3c
RH
3534 if (--lit_gotent->use_count == 0)
3535 {
3536 int sz = alpha_got_entry_size (R_ALPHA_LITERAL);
3537 alpha_elf_tdata (info->gotobj)->total_got_size -= sz;
3538 }
3539 }
252b5132 3540
a7519a3c 3541 /* Change
252b5132 3542
a7519a3c
RH
3543 lda $16,x($gp) !tlsgd!1
3544 ldq $27,__tls_get_addr($gp) !literal!1
3545 jsr $26,($27),__tls_get_addr !lituse_tlsgd!1
3546 ldah $29,0($26) !gpdisp!2
3547 lda $29,0($29) !gpdisp!2
3548 to
3549 ldq $16,x($gp) !gottprel
3550 unop
3551 call_pal rduniq
3552 addq $16,$0,$0
3553 unop
3554 or the first pair to
3555 lda $16,x($gp) !tprel
3556 unop
3557 or
3558 ldah $16,x($gp) !tprelhi
3559 lda $16,x($16) !tprello
3560
3561 as appropriate. */
3562
0a1b45a2 3563 use_gottprel = false;
cf35638d 3564 new_symndx = is_gd ? ELF64_R_SYM (irel->r_info) : STN_UNDEF;
891caa9b 3565
9a757e4d
RM
3566 /* Some compilers warn about a Boolean-looking expression being
3567 used in a switch. The explicit cast silences them. */
0e1862bb 3568 switch ((int) (!dynamic && !bfd_link_pic (info->link_info)))
252b5132 3569 {
a7519a3c
RH
3570 case 1:
3571 {
3572 bfd_vma tp_base;
3573 bfd_signed_vma disp;
252b5132 3574
a7519a3c
RH
3575 BFD_ASSERT (elf_hash_table (info->link_info)->tls_sec != NULL);
3576 tp_base = alpha_get_tprel_base (info->link_info);
3577 disp = symval - tp_base;
252b5132 3578
a7519a3c
RH
3579 if (disp >= -0x8000 && disp < 0x8000)
3580 {
891caa9b 3581 insn = (OP_LDA << 26) | (tlsgd_reg << 21) | (31 << 16);
a7519a3c
RH
3582 bfd_put_32 (info->abfd, (bfd_vma) insn, pos[0]);
3583 bfd_put_32 (info->abfd, (bfd_vma) INSN_UNOP, pos[1]);
3765b1be 3584
a7519a3c
RH
3585 irel[0].r_offset = pos[0] - info->contents;
3586 irel[0].r_info = ELF64_R_INFO (new_symndx, R_ALPHA_TPREL16);
3587 irel[1].r_info = ELF64_R_INFO (0, R_ALPHA_NONE);
3588 break;
3589 }
3590 else if (disp >= -(bfd_signed_vma) 0x80000000
3591 && disp < (bfd_signed_vma) 0x7fff8000
891caa9b 3592 && pos[0] + 4 == pos[1])
a7519a3c 3593 {
891caa9b 3594 insn = (OP_LDAH << 26) | (tlsgd_reg << 21) | (31 << 16);
a7519a3c 3595 bfd_put_32 (info->abfd, (bfd_vma) insn, pos[0]);
891caa9b 3596 insn = (OP_LDA << 26) | (tlsgd_reg << 21) | (tlsgd_reg << 16);
a7519a3c 3597 bfd_put_32 (info->abfd, (bfd_vma) insn, pos[1]);
3765b1be 3598
a7519a3c
RH
3599 irel[0].r_offset = pos[0] - info->contents;
3600 irel[0].r_info = ELF64_R_INFO (new_symndx, R_ALPHA_TPRELHI);
3601 irel[1].r_offset = pos[1] - info->contents;
3602 irel[1].r_info = ELF64_R_INFO (new_symndx, R_ALPHA_TPRELLO);
3603 break;
3604 }
3605 }
3606 /* FALLTHRU */
3765b1be 3607
3765b1be 3608 default:
0a1b45a2 3609 use_gottprel = true;
a7519a3c 3610
891caa9b 3611 insn = (OP_LDQ << 26) | (tlsgd_reg << 21) | (29 << 16);
a7519a3c
RH
3612 bfd_put_32 (info->abfd, (bfd_vma) insn, pos[0]);
3613 bfd_put_32 (info->abfd, (bfd_vma) INSN_UNOP, pos[1]);
3614
3615 irel[0].r_offset = pos[0] - info->contents;
3616 irel[0].r_info = ELF64_R_INFO (new_symndx, R_ALPHA_GOTTPREL);
3617 irel[1].r_info = ELF64_R_INFO (0, R_ALPHA_NONE);
3618 break;
3765b1be 3619 }
3765b1be 3620
a7519a3c 3621 bfd_put_32 (info->abfd, (bfd_vma) INSN_RDUNIQ, pos[2]);
252b5132 3622
a7519a3c
RH
3623 insn = INSN_ADDQ | (16 << 21) | (0 << 16) | (0 << 0);
3624 bfd_put_32 (info->abfd, (bfd_vma) insn, pos[3]);
3765b1be 3625
a7519a3c 3626 bfd_put_32 (info->abfd, (bfd_vma) INSN_UNOP, pos[4]);
e92d460e 3627
a7519a3c
RH
3628 irel[2].r_info = ELF64_R_INFO (0, R_ALPHA_NONE);
3629 gpdisp->r_info = ELF64_R_INFO (0, R_ALPHA_NONE);
252b5132 3630
a7519a3c
RH
3631 hint = elf64_alpha_find_reloc_at_ofs (info->relocs, info->relend,
3632 irel[2].r_offset, R_ALPHA_HINT);
3633 if (hint)
3634 hint->r_info = ELF64_R_INFO (0, R_ALPHA_NONE);
252b5132 3635
0a1b45a2
AM
3636 info->changed_contents = true;
3637 info->changed_relocs = true;
d6ad34f6 3638
a7519a3c
RH
3639 /* Reduce the use count on the TLSGD/TLSLDM relocation. */
3640 if (--info->gotent->use_count == 0)
3765b1be 3641 {
a7519a3c
RH
3642 int sz = alpha_got_entry_size (info->gotent->reloc_type);
3643 alpha_elf_tdata (info->gotobj)->total_got_size -= sz;
3644 if (!info->h)
3645 alpha_elf_tdata (info->gotobj)->local_got_size -= sz;
3765b1be 3646 }
252b5132 3647
a7519a3c
RH
3648 /* If we've switched to a GOTTPREL relocation, increment the reference
3649 count on that got entry. */
3650 if (use_gottprel)
f44f99a5 3651 {
a7519a3c 3652 struct alpha_elf_got_entry *tprel_gotent;
f44f99a5 3653
a7519a3c
RH
3654 for (tprel_gotent = *info->first_gotent; tprel_gotent ;
3655 tprel_gotent = tprel_gotent->next)
3656 if (tprel_gotent->gotobj == info->gotobj
3657 && tprel_gotent->reloc_type == R_ALPHA_GOTTPREL
3658 && tprel_gotent->addend == irel->r_addend)
3659 break;
3660 if (tprel_gotent)
3661 tprel_gotent->use_count++;
3662 else
f44f99a5 3663 {
a7519a3c
RH
3664 if (info->gotent->use_count == 0)
3665 tprel_gotent = info->gotent;
3666 else
3667 {
3668 tprel_gotent = (struct alpha_elf_got_entry *)
3669 bfd_alloc (info->abfd, sizeof (struct alpha_elf_got_entry));
3670 if (!tprel_gotent)
0a1b45a2 3671 return false;
f44f99a5 3672
a7519a3c
RH
3673 tprel_gotent->next = *info->first_gotent;
3674 *info->first_gotent = tprel_gotent;
f44f99a5 3675
a7519a3c
RH
3676 tprel_gotent->gotobj = info->gotobj;
3677 tprel_gotent->addend = irel->r_addend;
3678 tprel_gotent->got_offset = -1;
3679 tprel_gotent->reloc_done = 0;
3680 tprel_gotent->reloc_xlated = 0;
3681 }
f44f99a5 3682
a7519a3c
RH
3683 tprel_gotent->use_count = 1;
3684 tprel_gotent->reloc_type = R_ALPHA_GOTTPREL;
3685 }
f44f99a5 3686 }
f44f99a5 3687
0a1b45a2 3688 return true;
f44f99a5
RH
3689}
3690
0a1b45a2 3691static bool
a7519a3c 3692elf64_alpha_relax_section (bfd *abfd, asection *sec,
0a1b45a2 3693 struct bfd_link_info *link_info, bool *again)
f44f99a5 3694{
a7519a3c
RH
3695 Elf_Internal_Shdr *symtab_hdr;
3696 Elf_Internal_Rela *internal_relocs;
3697 Elf_Internal_Rela *irel, *irelend;
3698 Elf_Internal_Sym *isymbuf = NULL;
3699 struct alpha_elf_got_entry **local_got_entries;
3700 struct alpha_relax_info info;
4dfe6ac6 3701 struct alpha_elf_link_hash_table * htab;
d1c109de 3702 int relax_pass;
4dfe6ac6
NC
3703
3704 htab = alpha_elf_hash_table (link_info);
3705 if (htab == NULL)
0a1b45a2 3706 return false;
f44f99a5 3707
4a828aab 3708 /* There's nothing to change, yet. */
0a1b45a2 3709 *again = false;
f44f99a5 3710
0e1862bb 3711 if (bfd_link_relocatable (link_info)
3a574cce
AM
3712 || ((sec->flags & (SEC_CODE | SEC_RELOC | SEC_ALLOC | SEC_HAS_CONTENTS))
3713 != (SEC_CODE | SEC_RELOC | SEC_ALLOC | SEC_HAS_CONTENTS))
a7519a3c 3714 || sec->reloc_count == 0)
0a1b45a2 3715 return true;
d6ad34f6 3716
0ffa91dd 3717 BFD_ASSERT (is_alpha_elf (abfd));
d1c109de 3718 relax_pass = link_info->relax_pass;
0ffa91dd 3719
4a828aab 3720 /* Make sure our GOT and PLT tables are up-to-date. */
4dfe6ac6 3721 if (htab->relax_trip != link_info->relax_trip)
4a828aab 3722 {
4dfe6ac6 3723 htab->relax_trip = link_info->relax_trip;
4a828aab 3724
d1c109de 3725 /* This should never fail after the initial round, since the only error
07d6d2b8 3726 is GOT overflow, and relaxation only shrinks the table. However, we
d1c109de
RH
3727 may only merge got sections during the first pass. If we merge
3728 sections after we've created GPREL relocs, the GP for the merged
3729 section backs up which may put the relocs out of range. */
3730 if (!elf64_alpha_size_got_sections (link_info, relax_pass == 0))
4a828aab
RH
3731 abort ();
3732 if (elf_hash_table (link_info)->dynamic_sections_created)
3733 {
3734 elf64_alpha_size_plt_section (link_info);
3735 elf64_alpha_size_rela_got_section (link_info);
3736 }
3737 }
3738
0ffa91dd 3739 symtab_hdr = &elf_symtab_hdr (abfd);
a7519a3c 3740 local_got_entries = alpha_elf_tdata(abfd)->local_got_entries;
252b5132 3741
a7519a3c
RH
3742 /* Load the relocations for this section. */
3743 internal_relocs = (_bfd_elf_link_read_relocs
2c3fc389 3744 (abfd, sec, NULL, (Elf_Internal_Rela *) NULL,
a7519a3c
RH
3745 link_info->keep_memory));
3746 if (internal_relocs == NULL)
0a1b45a2 3747 return false;
252b5132 3748
a7519a3c
RH
3749 memset(&info, 0, sizeof (info));
3750 info.abfd = abfd;
3751 info.sec = sec;
3752 info.link_info = link_info;
3753 info.symtab_hdr = symtab_hdr;
3754 info.relocs = internal_relocs;
3755 info.relend = irelend = internal_relocs + sec->reloc_count;
3756
3757 /* Find the GP for this object. Do not store the result back via
3758 _bfd_set_gp_value, since this could change again before final. */
3759 info.gotobj = alpha_elf_tdata (abfd)->gotobj;
3760 if (info.gotobj)
3765b1be 3761 {
a7519a3c
RH
3762 asection *sgot = alpha_elf_tdata (info.gotobj)->got;
3763 info.gp = (sgot->output_section->vma
3764 + sgot->output_offset
3765 + 0x8000);
252b5132
RH
3766 }
3767
a7519a3c
RH
3768 /* Get the section contents. */
3769 if (elf_section_data (sec)->this_hdr.contents != NULL)
3770 info.contents = elf_section_data (sec)->this_hdr.contents;
3771 else
3772 {
3773 if (!bfd_malloc_and_get_section (abfd, sec, &info.contents))
3774 goto error_return;
3775 }
252b5132 3776
a7519a3c
RH
3777 for (irel = internal_relocs; irel < irelend; irel++)
3778 {
3779 bfd_vma symval;
3780 struct alpha_elf_got_entry *gotent;
3781 unsigned long r_type = ELF64_R_TYPE (irel->r_info);
3782 unsigned long r_symndx = ELF64_R_SYM (irel->r_info);
3783
3784 /* Early exit for unhandled or unrelaxable relocations. */
d1c109de 3785 if (r_type != R_ALPHA_LITERAL)
07d6d2b8
AM
3786 {
3787 /* We complete everything except LITERAL in the first pass. */
d1c109de
RH
3788 if (relax_pass != 0)
3789 continue;
3790 if (r_type == R_ALPHA_TLSLDM)
3791 {
3792 /* The symbol for a TLSLDM reloc is ignored. Collapse the
07d6d2b8 3793 reloc to the STN_UNDEF (0) symbol so that they all match. */
d1c109de
RH
3794 r_symndx = STN_UNDEF;
3795 }
3796 else if (r_type != R_ALPHA_GOTDTPREL
07d6d2b8 3797 && r_type != R_ALPHA_GOTTPREL
d1c109de
RH
3798 && r_type != R_ALPHA_TLSGD)
3799 continue;
a7519a3c
RH
3800 }
3801
3802 /* Get the value of the symbol referred to by the reloc. */
3803 if (r_symndx < symtab_hdr->sh_info)
3804 {
3805 /* A local symbol. */
3806 Elf_Internal_Sym *isym;
3807
3808 /* Read this BFD's local symbols. */
3809 if (isymbuf == NULL)
3810 {
3811 isymbuf = (Elf_Internal_Sym *) symtab_hdr->contents;
3812 if (isymbuf == NULL)
3813 isymbuf = bfd_elf_get_elf_syms (abfd, symtab_hdr,
3814 symtab_hdr->sh_info, 0,
3815 NULL, NULL, NULL);
3816 if (isymbuf == NULL)
3817 goto error_return;
3818 }
252b5132 3819
a7519a3c 3820 isym = isymbuf + r_symndx;
252b5132 3821
a7519a3c
RH
3822 /* Given the symbol for a TLSLDM reloc is ignored, this also
3823 means forcing the symbol value to the tp base. */
3824 if (r_type == R_ALPHA_TLSLDM)
3825 {
3826 info.tsec = bfd_abs_section_ptr;
3827 symval = alpha_get_tprel_base (info.link_info);
3828 }
3829 else
3830 {
3831 symval = isym->st_value;
3832 if (isym->st_shndx == SHN_UNDEF)
07d6d2b8 3833 continue;
a7519a3c 3834 else if (isym->st_shndx == SHN_ABS)
07d6d2b8 3835 info.tsec = bfd_abs_section_ptr;
a7519a3c 3836 else if (isym->st_shndx == SHN_COMMON)
07d6d2b8 3837 info.tsec = bfd_com_section_ptr;
a7519a3c 3838 else
07d6d2b8 3839 info.tsec = bfd_section_from_elf_index (abfd, isym->st_shndx);
a7519a3c 3840 }
252b5132 3841
a7519a3c
RH
3842 info.h = NULL;
3843 info.other = isym->st_other;
3844 if (local_got_entries)
3845 info.first_gotent = &local_got_entries[r_symndx];
3846 else
3847 {
3848 info.first_gotent = &info.gotent;
3849 info.gotent = NULL;
3850 }
252b5132 3851 }
a7519a3c
RH
3852 else
3853 {
3854 unsigned long indx;
3855 struct alpha_elf_link_hash_entry *h;
252b5132 3856
a7519a3c
RH
3857 indx = r_symndx - symtab_hdr->sh_info;
3858 h = alpha_elf_sym_hashes (abfd)[indx];
3859 BFD_ASSERT (h != NULL);
252b5132 3860
a7519a3c
RH
3861 while (h->root.root.type == bfd_link_hash_indirect
3862 || h->root.root.type == bfd_link_hash_warning)
3863 h = (struct alpha_elf_link_hash_entry *)h->root.root.u.i.link;
252b5132 3864
a7519a3c
RH
3865 /* If the symbol is undefined, we can't do anything with it. */
3866 if (h->root.root.type == bfd_link_hash_undefined)
3867 continue;
252b5132 3868
a7519a3c
RH
3869 /* If the symbol isn't defined in the current module,
3870 again we can't do anything. */
3871 if (h->root.root.type == bfd_link_hash_undefweak)
3872 {
3873 info.tsec = bfd_abs_section_ptr;
3874 symval = 0;
3875 }
3876 else if (!h->root.def_regular)
3877 {
3878 /* Except for TLSGD relocs, which can sometimes be
3879 relaxed to GOTTPREL relocs. */
3880 if (r_type != R_ALPHA_TLSGD)
3881 continue;
3882 info.tsec = bfd_abs_section_ptr;
3883 symval = 0;
3884 }
3885 else
3886 {
3887 info.tsec = h->root.root.u.def.section;
3888 symval = h->root.root.u.def.value;
3889 }
252b5132 3890
a7519a3c
RH
3891 info.h = h;
3892 info.other = h->root.other;
3893 info.first_gotent = &h->got_entries;
3894 }
252b5132 3895
a7519a3c
RH
3896 /* Search for the got entry to be used by this relocation. */
3897 for (gotent = *info.first_gotent; gotent ; gotent = gotent->next)
3898 if (gotent->gotobj == info.gotobj
3899 && gotent->reloc_type == r_type
3900 && gotent->addend == irel->r_addend)
3901 break;
3902 info.gotent = gotent;
252b5132 3903
a7519a3c
RH
3904 symval += info.tsec->output_section->vma + info.tsec->output_offset;
3905 symval += irel->r_addend;
252b5132 3906
a7519a3c 3907 switch (r_type)
252b5132 3908 {
a7519a3c
RH
3909 case R_ALPHA_LITERAL:
3910 BFD_ASSERT(info.gotent != NULL);
252b5132 3911
a7519a3c
RH
3912 /* If there exist LITUSE relocations immediately following, this
3913 opens up all sorts of interesting optimizations, because we
3914 now know every location that this address load is used. */
3915 if (irel+1 < irelend
3916 && ELF64_R_TYPE (irel[1].r_info) == R_ALPHA_LITUSE)
252b5132 3917 {
a7519a3c
RH
3918 if (!elf64_alpha_relax_with_lituse (&info, symval, irel))
3919 goto error_return;
252b5132 3920 }
a7519a3c
RH
3921 else
3922 {
3923 if (!elf64_alpha_relax_got_load (&info, symval, irel, r_type))
3924 goto error_return;
3925 }
3926 break;
252b5132 3927
a7519a3c
RH
3928 case R_ALPHA_GOTDTPREL:
3929 case R_ALPHA_GOTTPREL:
3930 BFD_ASSERT(info.gotent != NULL);
3931 if (!elf64_alpha_relax_got_load (&info, symval, irel, r_type))
3932 goto error_return;
3933 break;
3934
3935 case R_ALPHA_TLSGD:
3936 case R_ALPHA_TLSLDM:
3937 BFD_ASSERT(info.gotent != NULL);
3938 if (!elf64_alpha_relax_tls_get_addr (&info, symval, irel,
3939 r_type == R_ALPHA_TLSGD))
3940 goto error_return;
3941 break;
252b5132
RH
3942 }
3943 }
3944
a7519a3c
RH
3945 if (isymbuf != NULL
3946 && symtab_hdr->contents != (unsigned char *) isymbuf)
3947 {
3948 if (!link_info->keep_memory)
3949 free (isymbuf);
3950 else
252b5132 3951 {
a7519a3c
RH
3952 /* Cache the symbols for elf_link_input_bfd. */
3953 symtab_hdr->contents = (unsigned char *) isymbuf;
252b5132 3954 }
a7519a3c 3955 }
252b5132 3956
a7519a3c
RH
3957 if (info.contents != NULL
3958 && elf_section_data (sec)->this_hdr.contents != info.contents)
3959 {
3960 if (!info.changed_contents && !link_info->keep_memory)
3961 free (info.contents);
3962 else
252b5132 3963 {
a7519a3c
RH
3964 /* Cache the section contents for elf_link_input_bfd. */
3965 elf_section_data (sec)->this_hdr.contents = info.contents;
252b5132 3966 }
a7519a3c 3967 }
252b5132 3968
a7519a3c
RH
3969 if (elf_section_data (sec)->relocs != internal_relocs)
3970 {
3971 if (!info.changed_relocs)
3972 free (internal_relocs);
3973 else
3974 elf_section_data (sec)->relocs = internal_relocs;
252b5132 3975 }
a7519a3c
RH
3976
3977 *again = info.changed_contents || info.changed_relocs;
252b5132 3978
0a1b45a2 3979 return true;
252b5132 3980
a7519a3c 3981 error_return:
c9594989 3982 if (symtab_hdr->contents != (unsigned char *) isymbuf)
a7519a3c 3983 free (isymbuf);
c9594989 3984 if (elf_section_data (sec)->this_hdr.contents != info.contents)
a7519a3c 3985 free (info.contents);
c9594989 3986 if (elf_section_data (sec)->relocs != internal_relocs)
a7519a3c 3987 free (internal_relocs);
0a1b45a2 3988 return false;
a7519a3c
RH
3989}
3990\f
1bbc9cec
RH
3991/* Emit a dynamic relocation for (DYNINDX, RTYPE, ADDEND) at (SEC, OFFSET)
3992 into the next available slot in SREL. */
3993
3994static void
a7519a3c
RH
3995elf64_alpha_emit_dynrel (bfd *abfd, struct bfd_link_info *info,
3996 asection *sec, asection *srel, bfd_vma offset,
3997 long dynindx, long rtype, bfd_vma addend)
1bbc9cec
RH
3998{
3999 Elf_Internal_Rela outrel;
4000 bfd_byte *loc;
4001
4002 BFD_ASSERT (srel != NULL);
4003
4004 outrel.r_info = ELF64_R_INFO (dynindx, rtype);
4005 outrel.r_addend = addend;
4006
4007 offset = _bfd_elf_section_offset (abfd, info, sec, offset);
4008 if ((offset | 1) != (bfd_vma) -1)
4009 outrel.r_offset = sec->output_section->vma + sec->output_offset + offset;
4010 else
4011 memset (&outrel, 0, sizeof (outrel));
4012
4013 loc = srel->contents;
4014 loc += srel->reloc_count++ * sizeof (Elf64_External_Rela);
4015 bfd_elf64_swap_reloca_out (abfd, &outrel, loc);
eea6121a 4016 BFD_ASSERT (sizeof (Elf64_External_Rela) * srel->reloc_count <= srel->size);
1bbc9cec
RH
4017}
4018
4a67a098
RH
4019/* Relocate an Alpha ELF section for a relocatable link.
4020
4021 We don't have to change anything unless the reloc is against a section
4022 symbol, in which case we have to adjust according to where the section
4023 symbol winds up in the output section. */
4024
0f684201 4025static int
a7519a3c
RH
4026elf64_alpha_relocate_section_r (bfd *output_bfd ATTRIBUTE_UNUSED,
4027 struct bfd_link_info *info ATTRIBUTE_UNUSED,
4028 bfd *input_bfd, asection *input_section,
4029 bfd_byte *contents ATTRIBUTE_UNUSED,
4030 Elf_Internal_Rela *relocs,
4031 Elf_Internal_Sym *local_syms,
4032 asection **local_sections)
4a67a098
RH
4033{
4034 unsigned long symtab_hdr_sh_info;
4035 Elf_Internal_Rela *rel;
4036 Elf_Internal_Rela *relend;
ab96bf03 4037 struct elf_link_hash_entry **sym_hashes;
0a1b45a2 4038 bool ret_val = true;
4a67a098 4039
0ffa91dd 4040 symtab_hdr_sh_info = elf_symtab_hdr (input_bfd).sh_info;
ab96bf03 4041 sym_hashes = elf_sym_hashes (input_bfd);
4a67a098
RH
4042
4043 relend = relocs + input_section->reloc_count;
4044 for (rel = relocs; rel < relend; rel++)
4045 {
4046 unsigned long r_symndx;
4047 Elf_Internal_Sym *sym;
4048 asection *sec;
4049 unsigned long r_type;
4050
ab96bf03 4051 r_type = ELF64_R_TYPE (rel->r_info);
4a67a098
RH
4052 if (r_type >= R_ALPHA_max)
4053 {
4eca0228 4054 _bfd_error_handler
695344c0 4055 /* xgettext:c-format */
0aa13fee 4056 (_("%pB: unsupported relocation type %#x"),
d003868e 4057 input_bfd, (int) r_type);
4a67a098 4058 bfd_set_error (bfd_error_bad_value);
0a1b45a2 4059 ret_val = false;
4a67a098
RH
4060 continue;
4061 }
4062
4a67a098
RH
4063 /* The symbol associated with GPDISP and LITUSE is
4064 immaterial. Only the addend is significant. */
4065 if (r_type == R_ALPHA_GPDISP || r_type == R_ALPHA_LITUSE)
4066 continue;
4067
ab96bf03 4068 r_symndx = ELF64_R_SYM (rel->r_info);
4a67a098
RH
4069 if (r_symndx < symtab_hdr_sh_info)
4070 {
4071 sym = local_syms + r_symndx;
ab96bf03 4072 sec = local_sections[r_symndx];
4a67a098 4073 }
ab96bf03
AM
4074 else
4075 {
4076 struct elf_link_hash_entry *h;
4077
4078 h = sym_hashes[r_symndx - symtab_hdr_sh_info];
4079
4080 while (h->root.type == bfd_link_hash_indirect
4081 || h->root.type == bfd_link_hash_warning)
4082 h = (struct elf_link_hash_entry *) h->root.u.i.link;
4083
4084 if (h->root.type != bfd_link_hash_defined
4085 && h->root.type != bfd_link_hash_defweak)
4086 continue;
4087
4088 sym = NULL;
4089 sec = h->root.u.def.section;
4090 }
4091
dbaa2011 4092 if (sec != NULL && discarded_section (sec))
e4067dbb 4093 RELOC_AGAINST_DISCARDED_SECTION (info, input_bfd, input_section,
545fd46b
MR
4094 rel, 1, relend,
4095 elf64_alpha_howto_table + r_type, 0,
e4067dbb 4096 contents);
ab96bf03
AM
4097
4098 if (sym != NULL && ELF_ST_TYPE (sym->st_info) == STT_SECTION)
4099 rel->r_addend += sec->output_offset;
4a67a098
RH
4100 }
4101
4102 return ret_val;
4103}
4104
252b5132
RH
4105/* Relocate an Alpha ELF section. */
4106
0f684201 4107static int
a7519a3c
RH
4108elf64_alpha_relocate_section (bfd *output_bfd, struct bfd_link_info *info,
4109 bfd *input_bfd, asection *input_section,
4110 bfd_byte *contents, Elf_Internal_Rela *relocs,
4111 Elf_Internal_Sym *local_syms,
4112 asection **local_sections)
252b5132 4113{
4a67a098 4114 Elf_Internal_Shdr *symtab_hdr;
252b5132
RH
4115 Elf_Internal_Rela *rel;
4116 Elf_Internal_Rela *relend;
4a67a098
RH
4117 asection *sgot, *srel, *srelgot;
4118 bfd *dynobj, *gotobj;
4119 bfd_vma gp, tp_base, dtp_base;
4120 struct alpha_elf_got_entry **local_got_entries;
0a1b45a2 4121 bool ret_val;
252b5132 4122
0ffa91dd 4123 BFD_ASSERT (is_alpha_elf (input_bfd));
68ffbac6 4124
4a67a098 4125 /* Handle relocatable links with a smaller loop. */
0e1862bb 4126 if (bfd_link_relocatable (info))
4a67a098
RH
4127 return elf64_alpha_relocate_section_r (output_bfd, info, input_bfd,
4128 input_section, contents, relocs,
4129 local_syms, local_sections);
4130
4131 /* This is a final link. */
4132
0a1b45a2 4133 ret_val = true;
252b5132 4134
0ffa91dd 4135 symtab_hdr = &elf_symtab_hdr (input_bfd);
3765b1be 4136
4a67a098 4137 dynobj = elf_hash_table (info)->dynobj;
ce558b89 4138 srelgot = elf_hash_table (info)->srelgot;
4a67a098 4139
3241278a
RH
4140 if (input_section->flags & SEC_ALLOC)
4141 {
4142 const char *section_name;
4143 section_name = (bfd_elf_string_from_elf_section
4144 (input_bfd, elf_elfheader(input_bfd)->e_shstrndx,
d4730f92 4145 _bfd_elf_single_rel_hdr (input_section)->sh_name));
3241278a 4146 BFD_ASSERT(section_name != NULL);
3d4d4302 4147 srel = bfd_get_linker_section (dynobj, section_name);
3241278a
RH
4148 }
4149 else
4150 srel = NULL;
3765b1be 4151
4a67a098
RH
4152 /* Find the gp value for this input bfd. */
4153 gotobj = alpha_elf_tdata (input_bfd)->gotobj;
4154 if (gotobj)
4155 {
4156 sgot = alpha_elf_tdata (gotobj)->got;
4157 gp = _bfd_get_gp_value (gotobj);
4158 if (gp == 0)
252b5132 4159 {
4a67a098
RH
4160 gp = (sgot->output_section->vma
4161 + sgot->output_offset
4162 + 0x8000);
4163 _bfd_set_gp_value (gotobj, gp);
4164 }
4165 }
4166 else
4167 {
4168 sgot = NULL;
4169 gp = 0;
4170 }
3765b1be 4171
4a67a098
RH
4172 local_got_entries = alpha_elf_tdata(input_bfd)->local_got_entries;
4173
e1918d23 4174 if (elf_hash_table (info)->tls_sec != NULL)
4a67a098 4175 {
e1918d23
AM
4176 dtp_base = alpha_get_dtprel_base (info);
4177 tp_base = alpha_get_tprel_base (info);
252b5132 4178 }
4a67a098
RH
4179 else
4180 dtp_base = tp_base = 0;
252b5132 4181
252b5132 4182 relend = relocs + input_section->reloc_count;
4a67a098 4183 for (rel = relocs; rel < relend; rel++)
252b5132 4184 {
4a67a098 4185 struct alpha_elf_link_hash_entry *h = NULL;
3765b1be
RH
4186 struct alpha_elf_got_entry *gotent;
4187 bfd_reloc_status_type r;
252b5132
RH
4188 reloc_howto_type *howto;
4189 unsigned long r_symndx;
4a67a098
RH
4190 Elf_Internal_Sym *sym = NULL;
4191 asection *sec = NULL;
3765b1be 4192 bfd_vma value;
dc810e39 4193 bfd_vma addend;
0a1b45a2
AM
4194 bool dynamic_symbol_p;
4195 bool unresolved_reloc = false;
4196 bool undef_weak_ref = false;
3765b1be 4197 unsigned long r_type;
252b5132
RH
4198
4199 r_type = ELF64_R_TYPE(rel->r_info);
3765b1be 4200 if (r_type >= R_ALPHA_max)
252b5132 4201 {
4eca0228 4202 _bfd_error_handler
695344c0 4203 /* xgettext:c-format */
0aa13fee 4204 (_("%pB: unsupported relocation type %#x"),
d003868e 4205 input_bfd, (int) r_type);
252b5132 4206 bfd_set_error (bfd_error_bad_value);
0a1b45a2 4207 ret_val = false;
3765b1be 4208 continue;
252b5132 4209 }
252b5132 4210
3765b1be 4211 howto = elf64_alpha_howto_table + r_type;
252b5132
RH
4212 r_symndx = ELF64_R_SYM(rel->r_info);
4213
cc03ec80 4214 /* The symbol for a TLSLDM reloc is ignored. Collapse the
cf35638d 4215 reloc to the STN_UNDEF (0) symbol so that they all match. */
cc03ec80 4216 if (r_type == R_ALPHA_TLSLDM)
cf35638d 4217 r_symndx = STN_UNDEF;
cc03ec80 4218
252b5132
RH
4219 if (r_symndx < symtab_hdr->sh_info)
4220 {
8517fae7 4221 asection *msec;
252b5132
RH
4222 sym = local_syms + r_symndx;
4223 sec = local_sections[r_symndx];
8517fae7
AM
4224 msec = sec;
4225 value = _bfd_elf_rela_local_sym (output_bfd, sym, &msec, rel);
3765b1be 4226
cf35638d 4227 /* If this is a tp-relative relocation against sym STN_UNDEF (0),
cc03ec80 4228 this is hackery from relax_section. Force the value to
f915360b 4229 be the tls module base. */
cf35638d 4230 if (r_symndx == STN_UNDEF
cc03ec80
RH
4231 && (r_type == R_ALPHA_TLSLDM
4232 || r_type == R_ALPHA_GOTTPREL
4233 || r_type == R_ALPHA_TPREL64
4234 || r_type == R_ALPHA_TPRELHI
4235 || r_type == R_ALPHA_TPRELLO
4236 || r_type == R_ALPHA_TPREL16))
f915360b 4237 value = dtp_base;
cc03ec80 4238
4a67a098
RH
4239 if (local_got_entries)
4240 gotent = local_got_entries[r_symndx];
4241 else
4242 gotent = NULL;
3765b1be
RH
4243
4244 /* Need to adjust local GOT entries' addends for SEC_MERGE
4245 unless it has been done already. */
4246 if ((sec->flags & SEC_MERGE)
048d873d 4247 && ELF_ST_TYPE (sym->st_info) == STT_SECTION
dbaa2011 4248 && sec->sec_info_type == SEC_INFO_TYPE_MERGE
048d873d
RH
4249 && gotent
4250 && !gotent->reloc_xlated)
3765b1be
RH
4251 {
4252 struct alpha_elf_got_entry *ent;
3765b1be
RH
4253
4254 for (ent = gotent; ent; ent = ent->next)
4255 {
4256 ent->reloc_xlated = 1;
4257 if (ent->use_count == 0)
4258 continue;
4259 msec = sec;
4260 ent->addend =
4261 _bfd_merged_section_offset (output_bfd, &msec,
4262 elf_section_data (sec)->
4263 sec_info,
753731ee 4264 sym->st_value + ent->addend);
3765b1be
RH
4265 ent->addend -= sym->st_value;
4266 ent->addend += msec->output_section->vma
4267 + msec->output_offset
4268 - sec->output_section->vma
4269 - sec->output_offset;
4270 }
4271 }
4272
0a1b45a2 4273 dynamic_symbol_p = false;
252b5132
RH
4274 }
4275 else
4276 {
0a1b45a2 4277 bool warned, ignored;
560e09e9 4278 struct elf_link_hash_entry *hh;
b2a8e766
AM
4279 struct elf_link_hash_entry **sym_hashes = elf_sym_hashes (input_bfd);
4280
4281 RELOC_FOR_GLOBAL_SYMBOL (info, input_bfd, input_section, rel,
4282 r_symndx, symtab_hdr, sym_hashes,
4283 hh, sec, value,
62d887d4 4284 unresolved_reloc, warned, ignored);
560e09e9
NC
4285
4286 if (warned)
4287 continue;
252b5132 4288
560e09e9
NC
4289 if (value == 0
4290 && ! unresolved_reloc
4291 && hh->root.type == bfd_link_hash_undefweak)
0a1b45a2 4292 undef_weak_ref = true;
3765b1be 4293
560e09e9 4294 h = (struct alpha_elf_link_hash_entry *) hh;
07d6d2b8 4295 dynamic_symbol_p = alpha_elf_dynamic_symbol_p (&h->root, info);
3765b1be 4296 gotent = h->got_entries;
252b5132 4297 }
3765b1be 4298
dbaa2011 4299 if (sec != NULL && discarded_section (sec))
e4067dbb 4300 RELOC_AGAINST_DISCARDED_SECTION (info, input_bfd, input_section,
545fd46b 4301 rel, 1, relend, howto, 0, contents);
ab96bf03 4302
252b5132 4303 addend = rel->r_addend;
3765b1be
RH
4304 value += addend;
4305
4306 /* Search for the proper got entry. */
4307 for (; gotent ; gotent = gotent->next)
4308 if (gotent->gotobj == gotobj
4309 && gotent->reloc_type == r_type
4310 && gotent->addend == addend)
4311 break;
252b5132
RH
4312
4313 switch (r_type)
4314 {
4315 case R_ALPHA_GPDISP:
4316 {
4317 bfd_byte *p_ldah, *p_lda;
4318
4319 BFD_ASSERT(gp != 0);
4320
3765b1be
RH
4321 value = (input_section->output_section->vma
4322 + input_section->output_offset
4323 + rel->r_offset);
252b5132 4324
3765b1be 4325 p_ldah = contents + rel->r_offset;
252b5132
RH
4326 p_lda = p_ldah + rel->r_addend;
4327
3765b1be 4328 r = elf64_alpha_do_reloc_gpdisp (input_bfd, gp - value,
252b5132
RH
4329 p_ldah, p_lda);
4330 }
4331 break;
4332
252b5132 4333 case R_ALPHA_LITERAL:
3765b1be
RH
4334 BFD_ASSERT(sgot != NULL);
4335 BFD_ASSERT(gp != 0);
4336 BFD_ASSERT(gotent != NULL);
4337 BFD_ASSERT(gotent->use_count >= 1);
f7460f5f 4338
3765b1be
RH
4339 if (!gotent->reloc_done)
4340 {
4341 gotent->reloc_done = 1;
252b5132 4342
3765b1be
RH
4343 bfd_put_64 (output_bfd, value,
4344 sgot->contents + gotent->got_offset);
252b5132 4345
3765b1be
RH
4346 /* If the symbol has been forced local, output a
4347 RELATIVE reloc, otherwise it will be handled in
4348 finish_dynamic_symbol. */
0e1862bb
L
4349 if (bfd_link_pic (info)
4350 && !dynamic_symbol_p
4351 && !undef_weak_ref)
1bbc9cec
RH
4352 elf64_alpha_emit_dynrel (output_bfd, info, sgot, srelgot,
4353 gotent->got_offset, 0,
4354 R_ALPHA_RELATIVE, value);
3765b1be 4355 }
252b5132 4356
3765b1be
RH
4357 value = (sgot->output_section->vma
4358 + sgot->output_offset
4359 + gotent->got_offset);
4360 value -= gp;
252b5132
RH
4361 goto default_reloc;
4362
4363 case R_ALPHA_GPREL32:
ec1659c8 4364 case R_ALPHA_GPREL16:
252b5132 4365 case R_ALPHA_GPRELLOW:
3765b1be 4366 if (dynamic_symbol_p)
07d6d2b8 4367 {
4eca0228 4368 _bfd_error_handler
695344c0 4369 /* xgettext:c-format */
871b3ab2 4370 (_("%pB: gp-relative relocation against dynamic symbol %s"),
07d6d2b8 4371 input_bfd, h->root.root.root.string);
0a1b45a2 4372 ret_val = false;
07d6d2b8 4373 }
252b5132 4374 BFD_ASSERT(gp != 0);
3765b1be 4375 value -= gp;
252b5132
RH
4376 goto default_reloc;
4377
4378 case R_ALPHA_GPRELHIGH:
3765b1be 4379 if (dynamic_symbol_p)
07d6d2b8 4380 {
4eca0228 4381 _bfd_error_handler
695344c0 4382 /* xgettext:c-format */
871b3ab2 4383 (_("%pB: gp-relative relocation against dynamic symbol %s"),
07d6d2b8 4384 input_bfd, h->root.root.root.string);
0a1b45a2 4385 ret_val = false;
07d6d2b8 4386 }
252b5132 4387 BFD_ASSERT(gp != 0);
3765b1be
RH
4388 value -= gp;
4389 value = ((bfd_signed_vma) value >> 16) + ((value >> 15) & 1);
252b5132
RH
4390 goto default_reloc;
4391
252b5132 4392 case R_ALPHA_HINT:
f94952df
RH
4393 /* A call to a dynamic symbol is definitely out of range of
4394 the 16-bit displacement. Don't bother writing anything. */
3765b1be 4395 if (dynamic_symbol_p)
f94952df
RH
4396 {
4397 r = bfd_reloc_ok;
4398 break;
4399 }
3765b1be
RH
4400 /* The regular PC-relative stuff measures from the start of
4401 the instruction rather than the end. */
4402 value -= 4;
4403 goto default_reloc;
f94952df
RH
4404
4405 case R_ALPHA_BRADDR:
3765b1be 4406 if (dynamic_symbol_p)
07d6d2b8 4407 {
4eca0228 4408 _bfd_error_handler
695344c0 4409 /* xgettext:c-format */
871b3ab2 4410 (_("%pB: pc-relative relocation against dynamic symbol %s"),
07d6d2b8 4411 input_bfd, h->root.root.root.string);
0a1b45a2 4412 ret_val = false;
07d6d2b8 4413 }
252b5132
RH
4414 /* The regular PC-relative stuff measures from the start of
4415 the instruction rather than the end. */
3765b1be 4416 value -= 4;
252b5132
RH
4417 goto default_reloc;
4418
7793f4d0
RH
4419 case R_ALPHA_BRSGP:
4420 {
4421 int other;
4422 const char *name;
4423
4424 /* The regular PC-relative stuff measures from the start of
4425 the instruction rather than the end. */
3765b1be 4426 value -= 4;
7793f4d0 4427
ccf00ab6
RH
4428 /* The source and destination gp must be the same. Note that
4429 the source will always have an assigned gp, since we forced
4430 one in check_relocs, but that the destination may not, as
cedb70c5 4431 it might not have had any relocations at all. Also take
ccf00ab6
RH
4432 care not to crash if H is an undefined symbol. */
4433 if (h != NULL && sec != NULL
4434 && alpha_elf_tdata (sec->owner)->gotobj
7793f4d0
RH
4435 && gotobj != alpha_elf_tdata (sec->owner)->gotobj)
4436 {
4eca0228 4437 _bfd_error_handler
695344c0 4438 /* xgettext:c-format */
871b3ab2 4439 (_("%pB: change in gp: BRSGP %s"),
d003868e 4440 input_bfd, h->root.root.root.string);
0a1b45a2 4441 ret_val = false;
7793f4d0
RH
4442 }
4443
4444 /* The symbol should be marked either NOPV or STD_GPLOAD. */
4445 if (h != NULL)
4446 other = h->root.other;
4447 else
4448 other = sym->st_other;
4449 switch (other & STO_ALPHA_STD_GPLOAD)
4450 {
4451 case STO_ALPHA_NOPV:
07d6d2b8 4452 break;
7793f4d0 4453 case STO_ALPHA_STD_GPLOAD:
64e04ecd 4454 value += 8;
7793f4d0
RH
4455 break;
4456 default:
4457 if (h != NULL)
4458 name = h->root.root.root.string;
4459 else
4460 {
4461 name = (bfd_elf_string_from_elf_section
4462 (input_bfd, symtab_hdr->sh_link, sym->st_name));
4463 if (name == NULL)
4464 name = _("<unknown>");
4465 else if (name[0] == 0)
fd361982 4466 name = bfd_section_name (sec);
7793f4d0 4467 }
4eca0228 4468 _bfd_error_handler
695344c0 4469 /* xgettext:c-format */
871b3ab2 4470 (_("%pB: !samegp reloc against symbol without .prologue: %s"),
d003868e 4471 input_bfd, name);
0a1b45a2 4472 ret_val = false;
7793f4d0
RH
4473 break;
4474 }
4475
4476 goto default_reloc;
4477 }
4478
252b5132
RH
4479 case R_ALPHA_REFLONG:
4480 case R_ALPHA_REFQUAD:
3765b1be
RH
4481 case R_ALPHA_DTPREL64:
4482 case R_ALPHA_TPREL64:
252b5132 4483 {
1bbc9cec
RH
4484 long dynindx, dyntype = r_type;
4485 bfd_vma dynaddend;
252b5132
RH
4486
4487 /* Careful here to remember RELATIVE relocations for global
4488 variables for symbolic shared objects. */
4489
3765b1be 4490 if (dynamic_symbol_p)
252b5132
RH
4491 {
4492 BFD_ASSERT(h->root.dynindx != -1);
1bbc9cec
RH
4493 dynindx = h->root.dynindx;
4494 dynaddend = addend;
3765b1be
RH
4495 addend = 0, value = 0;
4496 }
4497 else if (r_type == R_ALPHA_DTPREL64)
4498 {
e1918d23 4499 BFD_ASSERT (elf_hash_table (info)->tls_sec != NULL);
3765b1be
RH
4500 value -= dtp_base;
4501 goto default_reloc;
4502 }
4503 else if (r_type == R_ALPHA_TPREL64)
4504 {
e1918d23 4505 BFD_ASSERT (elf_hash_table (info)->tls_sec != NULL);
3cbc1e5e 4506 if (!bfd_link_dll (info))
1bbc9cec
RH
4507 {
4508 value -= tp_base;
4509 goto default_reloc;
4510 }
4511 dynindx = 0;
4512 dynaddend = value - dtp_base;
252b5132 4513 }
0e1862bb 4514 else if (bfd_link_pic (info)
cf35638d 4515 && r_symndx != STN_UNDEF
d6ad34f6 4516 && (input_section->flags & SEC_ALLOC)
1d5316ab
AM
4517 && !undef_weak_ref
4518 && !(unresolved_reloc
4519 && (_bfd_elf_section_offset (output_bfd, info,
4520 input_section,
4521 rel->r_offset)
4522 == (bfd_vma) -1)))
252b5132 4523 {
3765b1be
RH
4524 if (r_type == R_ALPHA_REFLONG)
4525 {
4eca0228 4526 _bfd_error_handler
695344c0 4527 /* xgettext:c-format */
871b3ab2 4528 (_("%pB: unhandled dynamic relocation against %s"),
d003868e 4529 input_bfd,
3765b1be 4530 h->root.root.root.string);
0a1b45a2 4531 ret_val = false;
3765b1be 4532 }
1bbc9cec
RH
4533 dynindx = 0;
4534 dyntype = R_ALPHA_RELATIVE;
4535 dynaddend = value;
252b5132
RH
4536 }
4537 else
4538 goto default_reloc;
4539
3241278a
RH
4540 if (input_section->flags & SEC_ALLOC)
4541 elf64_alpha_emit_dynrel (output_bfd, info, input_section,
4542 srel, rel->r_offset, dynindx,
4543 dyntype, dynaddend);
252b5132
RH
4544 }
4545 goto default_reloc;
4546
3765b1be 4547 case R_ALPHA_SREL16:
84de6048
RH
4548 case R_ALPHA_SREL32:
4549 case R_ALPHA_SREL64:
3765b1be 4550 if (dynamic_symbol_p)
07d6d2b8 4551 {
4eca0228 4552 _bfd_error_handler
695344c0 4553 /* xgettext:c-format */
871b3ab2 4554 (_("%pB: pc-relative relocation against dynamic symbol %s"),
07d6d2b8 4555 input_bfd, h->root.root.root.string);
0a1b45a2 4556 ret_val = false;
07d6d2b8 4557 }
3cbc1e5e 4558 else if (bfd_link_pic (info)
0e1862bb 4559 && undef_weak_ref)
07d6d2b8 4560 {
4eca0228 4561 _bfd_error_handler
695344c0 4562 /* xgettext:c-format */
871b3ab2 4563 (_("%pB: pc-relative relocation against undefined weak symbol %s"),
07d6d2b8 4564 input_bfd, h->root.root.root.string);
0a1b45a2 4565 ret_val = false;
07d6d2b8 4566 }
d6ad34f6 4567
3765b1be 4568
84de6048
RH
4569 /* ??? .eh_frame references to discarded sections will be smashed
4570 to relocations against SHN_UNDEF. The .eh_frame format allows
4571 NULL to be encoded as 0 in any format, so this works here. */
1d5316ab
AM
4572 if (r_symndx == STN_UNDEF
4573 || (unresolved_reloc
4574 && _bfd_elf_section_offset (output_bfd, info,
4575 input_section,
4576 rel->r_offset) == (bfd_vma) -1))
84de6048
RH
4577 howto = (elf64_alpha_howto_table
4578 + (r_type - R_ALPHA_SREL32 + R_ALPHA_REFLONG));
4579 goto default_reloc;
4580
3765b1be
RH
4581 case R_ALPHA_TLSLDM:
4582 /* Ignore the symbol for the relocation. The result is always
4583 the current module. */
4584 dynamic_symbol_p = 0;
4585 /* FALLTHRU */
4586
4587 case R_ALPHA_TLSGD:
4588 if (!gotent->reloc_done)
4589 {
4590 gotent->reloc_done = 1;
4591
4592 /* Note that the module index for the main program is 1. */
0e1862bb
L
4593 bfd_put_64 (output_bfd,
4594 !bfd_link_pic (info) && !dynamic_symbol_p,
3765b1be
RH
4595 sgot->contents + gotent->got_offset);
4596
4597 /* If the symbol has been forced local, output a
4598 DTPMOD64 reloc, otherwise it will be handled in
4599 finish_dynamic_symbol. */
0e1862bb 4600 if (bfd_link_pic (info) && !dynamic_symbol_p)
1bbc9cec
RH
4601 elf64_alpha_emit_dynrel (output_bfd, info, sgot, srelgot,
4602 gotent->got_offset, 0,
4603 R_ALPHA_DTPMOD64, 0);
3765b1be
RH
4604
4605 if (dynamic_symbol_p || r_type == R_ALPHA_TLSLDM)
4606 value = 0;
4607 else
4608 {
e1918d23 4609 BFD_ASSERT (elf_hash_table (info)->tls_sec != NULL);
07d6d2b8 4610 value -= dtp_base;
3765b1be
RH
4611 }
4612 bfd_put_64 (output_bfd, value,
4613 sgot->contents + gotent->got_offset + 8);
4614 }
4615
4616 value = (sgot->output_section->vma
4617 + sgot->output_offset
4618 + gotent->got_offset);
4619 value -= gp;
4620 goto default_reloc;
4621
4622 case R_ALPHA_DTPRELHI:
4623 case R_ALPHA_DTPRELLO:
4624 case R_ALPHA_DTPREL16:
4625 if (dynamic_symbol_p)
07d6d2b8 4626 {
4eca0228 4627 _bfd_error_handler
695344c0 4628 /* xgettext:c-format */
871b3ab2 4629 (_("%pB: dtp-relative relocation against dynamic symbol %s"),
07d6d2b8 4630 input_bfd, h->root.root.root.string);
0a1b45a2 4631 ret_val = false;
07d6d2b8 4632 }
e1918d23 4633 BFD_ASSERT (elf_hash_table (info)->tls_sec != NULL);
3765b1be 4634 value -= dtp_base;
9e756d64
RH
4635 if (r_type == R_ALPHA_DTPRELHI)
4636 value = ((bfd_signed_vma) value >> 16) + ((value >> 15) & 1);
3765b1be
RH
4637 goto default_reloc;
4638
4639 case R_ALPHA_TPRELHI:
4640 case R_ALPHA_TPRELLO:
4641 case R_ALPHA_TPREL16:
3cbc1e5e 4642 if (bfd_link_dll (info))
9e756d64 4643 {
4eca0228 4644 _bfd_error_handler
695344c0 4645 /* xgettext:c-format */
871b3ab2 4646 (_("%pB: TLS local exec code cannot be linked into shared objects"),
d003868e 4647 input_bfd);
0a1b45a2 4648 ret_val = false;
9e756d64
RH
4649 }
4650 else if (dynamic_symbol_p)
07d6d2b8 4651 {
4eca0228 4652 _bfd_error_handler
695344c0 4653 /* xgettext:c-format */
871b3ab2 4654 (_("%pB: tp-relative relocation against dynamic symbol %s"),
07d6d2b8 4655 input_bfd, h->root.root.root.string);
0a1b45a2 4656 ret_val = false;
07d6d2b8 4657 }
e1918d23 4658 BFD_ASSERT (elf_hash_table (info)->tls_sec != NULL);
3765b1be 4659 value -= tp_base;
9e756d64
RH
4660 if (r_type == R_ALPHA_TPRELHI)
4661 value = ((bfd_signed_vma) value >> 16) + ((value >> 15) & 1);
3765b1be
RH
4662 goto default_reloc;
4663
4664 case R_ALPHA_GOTDTPREL:
4665 case R_ALPHA_GOTTPREL:
4666 BFD_ASSERT(sgot != NULL);
4667 BFD_ASSERT(gp != 0);
4668 BFD_ASSERT(gotent != NULL);
4669 BFD_ASSERT(gotent->use_count >= 1);
4670
4671 if (!gotent->reloc_done)
4672 {
4673 gotent->reloc_done = 1;
4674
4675 if (dynamic_symbol_p)
4676 value = 0;
4677 else
4678 {
e1918d23 4679 BFD_ASSERT (elf_hash_table (info)->tls_sec != NULL);
1bbc9cec
RH
4680 if (r_type == R_ALPHA_GOTDTPREL)
4681 value -= dtp_base;
28fbeab8 4682 else if (bfd_link_executable (info))
1bbc9cec
RH
4683 value -= tp_base;
4684 else
4685 {
4686 elf64_alpha_emit_dynrel (output_bfd, info, sgot, srelgot,
4687 gotent->got_offset, 0,
4688 R_ALPHA_TPREL64,
4689 value - dtp_base);
4690 value = 0;
4691 }
3765b1be
RH
4692 }
4693 bfd_put_64 (output_bfd, value,
4694 sgot->contents + gotent->got_offset);
4695 }
4696
4697 value = (sgot->output_section->vma
4698 + sgot->output_offset
4699 + gotent->got_offset);
4700 value -= gp;
4701 goto default_reloc;
4702
252b5132
RH
4703 default:
4704 default_reloc:
4705 r = _bfd_final_link_relocate (howto, input_bfd, input_section,
3765b1be 4706 contents, rel->r_offset, value, 0);
252b5132
RH
4707 break;
4708 }
4709
4710 switch (r)
4711 {
4712 case bfd_reloc_ok:
4713 break;
4714
4715 case bfd_reloc_overflow:
4716 {
4717 const char *name;
4718
ed4de5e2
JJ
4719 /* Don't warn if the overflow is due to pc relative reloc
4720 against discarded section. Section optimization code should
4721 handle it. */
4722
4723 if (r_symndx < symtab_hdr->sh_info
4724 && sec != NULL && howto->pc_relative
dbaa2011 4725 && discarded_section (sec))
ed4de5e2
JJ
4726 break;
4727
252b5132 4728 if (h != NULL)
dfeffb9f 4729 name = NULL;
252b5132
RH
4730 else
4731 {
4732 name = (bfd_elf_string_from_elf_section
4733 (input_bfd, symtab_hdr->sh_link, sym->st_name));
4734 if (name == NULL)
0a1b45a2 4735 return false;
252b5132 4736 if (*name == '\0')
fd361982 4737 name = bfd_section_name (sec);
252b5132 4738 }
1a72702b
AM
4739 (*info->callbacks->reloc_overflow)
4740 (info, (h ? &h->root.root : NULL), name, howto->name,
4741 (bfd_vma) 0, input_bfd, input_section, rel->r_offset);
252b5132
RH
4742 }
4743 break;
4744
4745 default:
4746 case bfd_reloc_outofrange:
4747 abort ();
4748 }
4749 }
4750
f16fbd61 4751 return ret_val;
252b5132
RH
4752}
4753
4754/* Finish up dynamic symbol handling. We set the contents of various
4755 dynamic sections here. */
4756
0a1b45a2 4757static bool
a7519a3c
RH
4758elf64_alpha_finish_dynamic_symbol (bfd *output_bfd, struct bfd_link_info *info,
4759 struct elf_link_hash_entry *h,
4760 Elf_Internal_Sym *sym)
252b5132 4761{
6ec7057a 4762 struct alpha_elf_link_hash_entry *ah = (struct alpha_elf_link_hash_entry *)h;
252b5132 4763
6ec7057a 4764 if (h->needs_plt)
252b5132
RH
4765 {
4766 /* Fill in the .plt entry for this symbol. */
4767 asection *splt, *sgot, *srel;
4768 Elf_Internal_Rela outrel;
947216bf 4769 bfd_byte *loc;
252b5132
RH
4770 bfd_vma got_addr, plt_addr;
4771 bfd_vma plt_index;
4772 struct alpha_elf_got_entry *gotent;
4773
4774 BFD_ASSERT (h->dynindx != -1);
4775
ce558b89 4776 splt = elf_hash_table (info)->splt;
252b5132 4777 BFD_ASSERT (splt != NULL);
ce558b89 4778 srel = elf_hash_table (info)->srelplt;
252b5132 4779 BFD_ASSERT (srel != NULL);
252b5132 4780
6ec7057a
RH
4781 for (gotent = ah->got_entries; gotent ; gotent = gotent->next)
4782 if (gotent->reloc_type == R_ALPHA_LITERAL
4783 && gotent->use_count > 0)
4784 {
4785 unsigned int insn;
4786 int disp;
252b5132 4787
6ec7057a
RH
4788 sgot = alpha_elf_tdata (gotent->gotobj)->got;
4789 BFD_ASSERT (sgot != NULL);
252b5132 4790
6ec7057a
RH
4791 BFD_ASSERT (gotent->got_offset != -1);
4792 BFD_ASSERT (gotent->plt_offset != -1);
252b5132 4793
6ec7057a
RH
4794 got_addr = (sgot->output_section->vma
4795 + sgot->output_offset
4796 + gotent->got_offset);
4797 plt_addr = (splt->output_section->vma
4798 + splt->output_offset
4799 + gotent->plt_offset);
252b5132 4800
6ec7057a 4801 plt_index = (gotent->plt_offset-PLT_HEADER_SIZE) / PLT_ENTRY_SIZE;
252b5132 4802
6ec7057a
RH
4803 /* Fill in the entry in the procedure linkage table. */
4804 if (elf64_alpha_use_secureplt)
4805 {
4806 disp = (PLT_HEADER_SIZE - 4) - (gotent->plt_offset + 4);
4807 insn = INSN_AD (INSN_BR, 31, disp);
4808 bfd_put_32 (output_bfd, insn,
4809 splt->contents + gotent->plt_offset);
252b5132 4810
6ec7057a
RH
4811 plt_index = ((gotent->plt_offset - NEW_PLT_HEADER_SIZE)
4812 / NEW_PLT_ENTRY_SIZE);
4813 }
4814 else
4815 {
4816 disp = -(gotent->plt_offset + 4);
4817 insn = INSN_AD (INSN_BR, 28, disp);
4818 bfd_put_32 (output_bfd, insn,
4819 splt->contents + gotent->plt_offset);
4820 bfd_put_32 (output_bfd, INSN_UNOP,
4821 splt->contents + gotent->plt_offset + 4);
4822 bfd_put_32 (output_bfd, INSN_UNOP,
4823 splt->contents + gotent->plt_offset + 8);
4824
4825 plt_index = ((gotent->plt_offset - OLD_PLT_HEADER_SIZE)
4826 / OLD_PLT_ENTRY_SIZE);
4827 }
252b5132 4828
6ec7057a
RH
4829 /* Fill in the entry in the .rela.plt section. */
4830 outrel.r_offset = got_addr;
4831 outrel.r_info = ELF64_R_INFO(h->dynindx, R_ALPHA_JMP_SLOT);
4832 outrel.r_addend = 0;
252b5132 4833
6ec7057a
RH
4834 loc = srel->contents + plt_index * sizeof (Elf64_External_Rela);
4835 bfd_elf64_swap_reloca_out (output_bfd, &outrel, loc);
252b5132 4836
6ec7057a
RH
4837 /* Fill in the entry in the .got. */
4838 bfd_put_64 (output_bfd, plt_addr,
4839 sgot->contents + gotent->got_offset);
4840 }
252b5132
RH
4841 }
4842 else if (alpha_elf_dynamic_symbol_p (h, info))
4843 {
4844 /* Fill in the dynamic relocations for this symbol's .got entries. */
4845 asection *srel;
252b5132
RH
4846 struct alpha_elf_got_entry *gotent;
4847
ce558b89 4848 srel = elf_hash_table (info)->srelgot;
252b5132
RH
4849 BFD_ASSERT (srel != NULL);
4850
252b5132
RH
4851 for (gotent = ((struct alpha_elf_link_hash_entry *) h)->got_entries;
4852 gotent != NULL;
4853 gotent = gotent->next)
4854 {
f44f99a5 4855 asection *sgot;
1bbc9cec 4856 long r_type;
3765b1be 4857
f44f99a5
RH
4858 if (gotent->use_count == 0)
4859 continue;
4860
4861 sgot = alpha_elf_tdata (gotent->gotobj)->got;
3765b1be
RH
4862
4863 r_type = gotent->reloc_type;
4864 switch (r_type)
4865 {
4866 case R_ALPHA_LITERAL:
4867 r_type = R_ALPHA_GLOB_DAT;
4868 break;
4869 case R_ALPHA_TLSGD:
4870 r_type = R_ALPHA_DTPMOD64;
4871 break;
4872 case R_ALPHA_GOTDTPREL:
4873 r_type = R_ALPHA_DTPREL64;
4874 break;
4875 case R_ALPHA_GOTTPREL:
4876 r_type = R_ALPHA_TPREL64;
4877 break;
4878 case R_ALPHA_TLSLDM:
4879 default:
4880 abort ();
4881 }
4882
68ffbac6 4883 elf64_alpha_emit_dynrel (output_bfd, info, sgot, srel,
1bbc9cec
RH
4884 gotent->got_offset, h->dynindx,
4885 r_type, gotent->addend);
3765b1be
RH
4886
4887 if (gotent->reloc_type == R_ALPHA_TLSGD)
68ffbac6 4888 elf64_alpha_emit_dynrel (output_bfd, info, sgot, srel,
1bbc9cec
RH
4889 gotent->got_offset + 8, h->dynindx,
4890 R_ALPHA_DTPREL64, gotent->addend);
252b5132
RH
4891 }
4892 }
4893
4894 /* Mark some specially defined symbols as absolute. */
9637f6ef 4895 if (h == elf_hash_table (info)->hdynamic
22edb2f1
RS
4896 || h == elf_hash_table (info)->hgot
4897 || h == elf_hash_table (info)->hplt)
252b5132
RH
4898 sym->st_shndx = SHN_ABS;
4899
0a1b45a2 4900 return true;
252b5132
RH
4901}
4902
4903/* Finish up the dynamic sections. */
4904
0a1b45a2 4905static bool
a7519a3c
RH
4906elf64_alpha_finish_dynamic_sections (bfd *output_bfd,
4907 struct bfd_link_info *info)
252b5132
RH
4908{
4909 bfd *dynobj;
4910 asection *sdyn;
4911
4912 dynobj = elf_hash_table (info)->dynobj;
3d4d4302 4913 sdyn = bfd_get_linker_section (dynobj, ".dynamic");
252b5132
RH
4914
4915 if (elf_hash_table (info)->dynamic_sections_created)
4916 {
6ec7057a 4917 asection *splt, *sgotplt, *srelaplt;
252b5132 4918 Elf64_External_Dyn *dyncon, *dynconend;
6ec7057a 4919 bfd_vma plt_vma, gotplt_vma;
252b5132 4920
ce558b89
AM
4921 splt = elf_hash_table (info)->splt;
4922 srelaplt = elf_hash_table (info)->srelplt;
252b5132
RH
4923 BFD_ASSERT (splt != NULL && sdyn != NULL);
4924
6ec7057a
RH
4925 plt_vma = splt->output_section->vma + splt->output_offset;
4926
4927 gotplt_vma = 0;
4928 if (elf64_alpha_use_secureplt)
4929 {
ce558b89 4930 sgotplt = elf_hash_table (info)->sgotplt;
6ec7057a
RH
4931 BFD_ASSERT (sgotplt != NULL);
4932 if (sgotplt->size > 0)
4933 gotplt_vma = sgotplt->output_section->vma + sgotplt->output_offset;
4934 }
4935
252b5132 4936 dyncon = (Elf64_External_Dyn *) sdyn->contents;
eea6121a 4937 dynconend = (Elf64_External_Dyn *) (sdyn->contents + sdyn->size);
252b5132
RH
4938 for (; dyncon < dynconend; dyncon++)
4939 {
4940 Elf_Internal_Dyn dyn;
252b5132
RH
4941
4942 bfd_elf64_swap_dyn_in (dynobj, dyncon, &dyn);
4943
4944 switch (dyn.d_tag)
4945 {
4946 case DT_PLTGOT:
6ec7057a
RH
4947 dyn.d_un.d_ptr
4948 = elf64_alpha_use_secureplt ? gotplt_vma : plt_vma;
4949 break;
252b5132 4950 case DT_PLTRELSZ:
6ec7057a
RH
4951 dyn.d_un.d_val = srelaplt ? srelaplt->size : 0;
4952 break;
252b5132 4953 case DT_JMPREL:
4ade44b7
AM
4954 dyn.d_un.d_ptr = srelaplt ? (srelaplt->output_section->vma
4955 + srelaplt->output_offset) : 0;
6ec7057a 4956 break;
252b5132
RH
4957 }
4958
4959 bfd_elf64_swap_dyn_out (output_bfd, &dyn, dyncon);
4960 }
4961
6ec7057a 4962 /* Initialize the plt header. */
eea6121a 4963 if (splt->size > 0)
252b5132 4964 {
6ec7057a
RH
4965 unsigned int insn;
4966 int ofs;
4967
4968 if (elf64_alpha_use_secureplt)
4969 {
4970 ofs = gotplt_vma - (plt_vma + PLT_HEADER_SIZE);
4971
4972 insn = INSN_ABC (INSN_SUBQ, 27, 28, 25);
4973 bfd_put_32 (output_bfd, insn, splt->contents);
4974
4975 insn = INSN_ABO (INSN_LDAH, 28, 28, (ofs + 0x8000) >> 16);
4976 bfd_put_32 (output_bfd, insn, splt->contents + 4);
4977
4978 insn = INSN_ABC (INSN_S4SUBQ, 25, 25, 25);
4979 bfd_put_32 (output_bfd, insn, splt->contents + 8);
4980
4981 insn = INSN_ABO (INSN_LDA, 28, 28, ofs);
4982 bfd_put_32 (output_bfd, insn, splt->contents + 12);
4983
4984 insn = INSN_ABO (INSN_LDQ, 27, 28, 0);
4985 bfd_put_32 (output_bfd, insn, splt->contents + 16);
4986
4987 insn = INSN_ABC (INSN_ADDQ, 25, 25, 25);
4988 bfd_put_32 (output_bfd, insn, splt->contents + 20);
4989
4990 insn = INSN_ABO (INSN_LDQ, 28, 28, 8);
4991 bfd_put_32 (output_bfd, insn, splt->contents + 24);
4992
4993 insn = INSN_AB (INSN_JMP, 31, 27);
4994 bfd_put_32 (output_bfd, insn, splt->contents + 28);
4995
4996 insn = INSN_AD (INSN_BR, 28, -PLT_HEADER_SIZE);
4997 bfd_put_32 (output_bfd, insn, splt->contents + 32);
4998 }
4999 else
5000 {
5001 insn = INSN_AD (INSN_BR, 27, 0); /* br $27, .+4 */
5002 bfd_put_32 (output_bfd, insn, splt->contents);
5003
5004 insn = INSN_ABO (INSN_LDQ, 27, 27, 12);
5005 bfd_put_32 (output_bfd, insn, splt->contents + 4);
5006
5007 insn = INSN_UNOP;
5008 bfd_put_32 (output_bfd, insn, splt->contents + 8);
5009
5010 insn = INSN_AB (INSN_JMP, 27, 27);
5011 bfd_put_32 (output_bfd, insn, splt->contents + 12);
5012
5013 /* The next two words will be filled in by ld.so. */
5014 bfd_put_64 (output_bfd, 0, splt->contents + 16);
5015 bfd_put_64 (output_bfd, 0, splt->contents + 24);
5016 }
252b5132 5017
eecdbe52 5018 elf_section_data (splt->output_section)->this_hdr.sh_entsize = 0;
252b5132
RH
5019 }
5020 }
5021
0a1b45a2 5022 return true;
252b5132
RH
5023}
5024
96e2734b
RH
5025/* We need to use a special link routine to handle the .mdebug section.
5026 We need to merge all instances of these sections together, not write
5027 them all out sequentially. */
252b5132 5028
0a1b45a2 5029static bool
a7519a3c 5030elf64_alpha_final_link (bfd *abfd, struct bfd_link_info *info)
252b5132
RH
5031{
5032 asection *o;
5033 struct bfd_link_order *p;
96e2734b 5034 asection *mdebug_sec;
252b5132
RH
5035 struct ecoff_debug_info debug;
5036 const struct ecoff_debug_swap *swap
5037 = get_elf_backend_data (abfd)->elf_backend_ecoff_debug_swap;
5038 HDRR *symhdr = &debug.symbolic_header;
4dfe6ac6
NC
5039 void * mdebug_handle = NULL;
5040 struct alpha_elf_link_hash_table * htab;
5041
5042 htab = alpha_elf_hash_table (info);
5043 if (htab == NULL)
0a1b45a2 5044 return false;
252b5132 5045
96e2734b 5046 /* Go through the sections and collect the mdebug information. */
252b5132 5047 mdebug_sec = NULL;
252b5132
RH
5048 for (o = abfd->sections; o != (asection *) NULL; o = o->next)
5049 {
252b5132
RH
5050 if (strcmp (o->name, ".mdebug") == 0)
5051 {
5052 struct extsym_info einfo;
5053
5054 /* We have found the .mdebug section in the output file.
5055 Look through all the link_orders comprising it and merge
5056 the information together. */
5057 symhdr->magic = swap->sym_magic;
5058 /* FIXME: What should the version stamp be? */
5059 symhdr->vstamp = 0;
5060 symhdr->ilineMax = 0;
5061 symhdr->cbLine = 0;
5062 symhdr->idnMax = 0;
5063 symhdr->ipdMax = 0;
5064 symhdr->isymMax = 0;
5065 symhdr->ioptMax = 0;
5066 symhdr->iauxMax = 0;
5067 symhdr->issMax = 0;
5068 symhdr->issExtMax = 0;
5069 symhdr->ifdMax = 0;
5070 symhdr->crfd = 0;
5071 symhdr->iextMax = 0;
5072
5073 /* We accumulate the debugging information itself in the
5074 debug_info structure. */
5075 debug.line = NULL;
5076 debug.external_dnr = NULL;
5077 debug.external_pdr = NULL;
5078 debug.external_sym = NULL;
5079 debug.external_opt = NULL;
5080 debug.external_aux = NULL;
5081 debug.ss = NULL;
5082 debug.ssext = debug.ssext_end = NULL;
5083 debug.external_fdr = NULL;
5084 debug.external_rfd = NULL;
5085 debug.external_ext = debug.external_ext_end = NULL;
5086
5087 mdebug_handle = bfd_ecoff_debug_init (abfd, &debug, swap, info);
2c3fc389 5088 if (mdebug_handle == NULL)
0a1b45a2 5089 return false;
252b5132
RH
5090
5091 if (1)
5092 {
5093 asection *s;
5094 EXTR esym;
52b9d213 5095 bfd_vma last = 0;
252b5132
RH
5096 unsigned int i;
5097 static const char * const name[] =
5098 {
5099 ".text", ".init", ".fini", ".data",
5100 ".rodata", ".sdata", ".sbss", ".bss"
5101 };
5102 static const int sc[] = { scText, scInit, scFini, scData,
5103 scRData, scSData, scSBss, scBss };
5104
5105 esym.jmptbl = 0;
5106 esym.cobol_main = 0;
5107 esym.weakext = 0;
5108 esym.reserved = 0;
5109 esym.ifd = ifdNil;
5110 esym.asym.iss = issNil;
5111 esym.asym.st = stLocal;
5112 esym.asym.reserved = 0;
5113 esym.asym.index = indexNil;
5114 for (i = 0; i < 8; i++)
5115 {
5116 esym.asym.sc = sc[i];
5117 s = bfd_get_section_by_name (abfd, name[i]);
5118 if (s != NULL)
5119 {
5120 esym.asym.value = s->vma;
eea6121a 5121 last = s->vma + s->size;
252b5132
RH
5122 }
5123 else
5124 esym.asym.value = last;
5125
5126 if (! bfd_ecoff_debug_one_external (abfd, &debug, swap,
5127 name[i], &esym))
0a1b45a2 5128 return false;
252b5132
RH
5129 }
5130 }
5131
8423293d 5132 for (p = o->map_head.link_order;
252b5132
RH
5133 p != (struct bfd_link_order *) NULL;
5134 p = p->next)
5135 {
5136 asection *input_section;
5137 bfd *input_bfd;
5138 const struct ecoff_debug_swap *input_swap;
5139 struct ecoff_debug_info input_debug;
5140 char *eraw_src;
5141 char *eraw_end;
5142
5143 if (p->type != bfd_indirect_link_order)
5144 {
fd96f80f 5145 if (p->type == bfd_data_link_order)
252b5132
RH
5146 continue;
5147 abort ();
5148 }
5149
5150 input_section = p->u.indirect.section;
5151 input_bfd = input_section->owner;
5152
0ffa91dd
NC
5153 if (! is_alpha_elf (input_bfd))
5154 /* I don't know what a non ALPHA ELF bfd would be
5155 doing with a .mdebug section, but I don't really
5156 want to deal with it. */
5157 continue;
252b5132
RH
5158
5159 input_swap = (get_elf_backend_data (input_bfd)
5160 ->elf_backend_ecoff_debug_swap);
5161
eea6121a 5162 BFD_ASSERT (p->size == input_section->size);
252b5132
RH
5163
5164 /* The ECOFF linking code expects that we have already
5165 read in the debugging information and set up an
5166 ecoff_debug_info structure, so we do that now. */
5167 if (!elf64_alpha_read_ecoff_info (input_bfd, input_section,
5168 &input_debug))
0a1b45a2 5169 return false;
252b5132
RH
5170
5171 if (! (bfd_ecoff_debug_accumulate
5172 (mdebug_handle, abfd, &debug, swap, input_bfd,
5173 &input_debug, input_swap, info)))
0a1b45a2 5174 return false;
252b5132
RH
5175
5176 /* Loop through the external symbols. For each one with
5177 interesting information, try to find the symbol in
5178 the linker global hash table and save the information
5179 for the output external symbols. */
21d799b5 5180 eraw_src = (char *) input_debug.external_ext;
252b5132
RH
5181 eraw_end = (eraw_src
5182 + (input_debug.symbolic_header.iextMax
5183 * input_swap->external_ext_size));
5184 for (;
5185 eraw_src < eraw_end;
5186 eraw_src += input_swap->external_ext_size)
5187 {
5188 EXTR ext;
5189 const char *name;
5190 struct alpha_elf_link_hash_entry *h;
5191
2c3fc389 5192 (*input_swap->swap_ext_in) (input_bfd, eraw_src, &ext);
252b5132
RH
5193 if (ext.asym.sc == scNil
5194 || ext.asym.sc == scUndefined
5195 || ext.asym.sc == scSUndefined)
5196 continue;
5197
5198 name = input_debug.ssext + ext.asym.iss;
0a1b45a2 5199 h = alpha_elf_link_hash_lookup (htab, name, false, false, true);
252b5132
RH
5200 if (h == NULL || h->esym.ifd != -2)
5201 continue;
5202
5203 if (ext.ifd != -1)
5204 {
5205 BFD_ASSERT (ext.ifd
5206 < input_debug.symbolic_header.ifdMax);
5207 ext.ifd = input_debug.ifdmap[ext.ifd];
5208 }
5209
5210 h->esym = ext;
5211 }
5212
5213 /* Free up the information we just read. */
5214 free (input_debug.line);
5215 free (input_debug.external_dnr);
5216 free (input_debug.external_pdr);
5217 free (input_debug.external_sym);
5218 free (input_debug.external_opt);
5219 free (input_debug.external_aux);
5220 free (input_debug.ss);
5221 free (input_debug.ssext);
5222 free (input_debug.external_fdr);
5223 free (input_debug.external_rfd);
5224 free (input_debug.external_ext);
5225
5226 /* Hack: reset the SEC_HAS_CONTENTS flag so that
5227 elf_link_input_bfd ignores this section. */
5228 input_section->flags &=~ SEC_HAS_CONTENTS;
5229 }
5230
252b5132
RH
5231 /* Build the external symbol information. */
5232 einfo.abfd = abfd;
5233 einfo.info = info;
5234 einfo.debug = &debug;
5235 einfo.swap = swap;
0a1b45a2 5236 einfo.failed = false;
252b5132
RH
5237 elf_link_hash_traverse (elf_hash_table (info),
5238 elf64_alpha_output_extsym,
2c3fc389 5239 &einfo);
252b5132 5240 if (einfo.failed)
0a1b45a2 5241 return false;
252b5132
RH
5242
5243 /* Set the size of the .mdebug section. */
eea6121a 5244 o->size = bfd_ecoff_debug_size (abfd, &debug, swap);
252b5132
RH
5245
5246 /* Skip this section later on (I don't think this currently
5247 matters, but someday it might). */
8423293d 5248 o->map_head.link_order = (struct bfd_link_order *) NULL;
252b5132
RH
5249
5250 mdebug_sec = o;
5251 }
252b5132
RH
5252 }
5253
5254 /* Invoke the regular ELF backend linker to do all the work. */
c152c796 5255 if (! bfd_elf_final_link (abfd, info))
0a1b45a2 5256 return false;
252b5132
RH
5257
5258 /* Now write out the computed sections. */
5259
5260 /* The .got subsections... */
5261 {
5262 bfd *i, *dynobj = elf_hash_table(info)->dynobj;
4dfe6ac6 5263 for (i = htab->got_list;
252b5132
RH
5264 i != NULL;
5265 i = alpha_elf_tdata(i)->got_link_next)
5266 {
5267 asection *sgot;
5268
5269 /* elf_bfd_final_link already did everything in dynobj. */
5270 if (i == dynobj)
5271 continue;
5272
5273 sgot = alpha_elf_tdata(i)->got;
5274 if (! bfd_set_section_contents (abfd, sgot->output_section,
dc810e39
AM
5275 sgot->contents,
5276 (file_ptr) sgot->output_offset,
eea6121a 5277 sgot->size))
0a1b45a2 5278 return false;
252b5132
RH
5279 }
5280 }
5281
252b5132
RH
5282 if (mdebug_sec != (asection *) NULL)
5283 {
5284 BFD_ASSERT (abfd->output_has_begun);
5285 if (! bfd_ecoff_write_accumulated_debug (mdebug_handle, abfd, &debug,
5286 swap, info,
5287 mdebug_sec->filepos))
0a1b45a2 5288 return false;
252b5132
RH
5289
5290 bfd_ecoff_debug_free (mdebug_handle, abfd, &debug, swap, info);
5291 }
5292
0a1b45a2 5293 return true;
252b5132 5294}
fcfbdf31
JJ
5295
5296static enum elf_reloc_type_class
7e612e98
AM
5297elf64_alpha_reloc_type_class (const struct bfd_link_info *info ATTRIBUTE_UNUSED,
5298 const asection *rel_sec ATTRIBUTE_UNUSED,
5299 const Elf_Internal_Rela *rela)
fcfbdf31 5300{
f51e552e 5301 switch ((int) ELF64_R_TYPE (rela->r_info))
fcfbdf31
JJ
5302 {
5303 case R_ALPHA_RELATIVE:
5304 return reloc_class_relative;
5305 case R_ALPHA_JMP_SLOT:
5306 return reloc_class_plt;
5307 case R_ALPHA_COPY:
5308 return reloc_class_copy;
5309 default:
5310 return reloc_class_normal;
5311 }
5312}
252b5132 5313\f
b35d266b 5314static const struct bfd_elf_special_section elf64_alpha_special_sections[] =
2f89ff8d 5315{
07d6d2b8 5316 { STRING_COMMA_LEN (".sbss"), -2, SHT_NOBITS, SHF_ALLOC + SHF_WRITE + SHF_ALPHA_GPREL },
0112cd26 5317 { STRING_COMMA_LEN (".sdata"), -2, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE + SHF_ALPHA_GPREL },
07d6d2b8 5318 { NULL, 0, 0, 0, 0 }
2f89ff8d
L
5319};
5320
252b5132
RH
5321/* ECOFF swapping routines. These are used when dealing with the
5322 .mdebug section, which is in the ECOFF debugging format. Copied
fe8bc63d 5323 from elf32-mips.c. */
252b5132
RH
5324static const struct ecoff_debug_swap
5325elf64_alpha_ecoff_debug_swap =
5326{
5327 /* Symbol table magic number. */
5328 magicSym2,
5329 /* Alignment of debugging information. E.g., 4. */
5330 8,
5331 /* Sizes of external symbolic information. */
5332 sizeof (struct hdr_ext),
5333 sizeof (struct dnr_ext),
5334 sizeof (struct pdr_ext),
5335 sizeof (struct sym_ext),
5336 sizeof (struct opt_ext),
5337 sizeof (struct fdr_ext),
5338 sizeof (struct rfd_ext),
5339 sizeof (struct ext_ext),
5340 /* Functions to swap in external symbolic data. */
5341 ecoff_swap_hdr_in,
5342 ecoff_swap_dnr_in,
5343 ecoff_swap_pdr_in,
5344 ecoff_swap_sym_in,
5345 ecoff_swap_opt_in,
5346 ecoff_swap_fdr_in,
5347 ecoff_swap_rfd_in,
5348 ecoff_swap_ext_in,
5349 _bfd_ecoff_swap_tir_in,
5350 _bfd_ecoff_swap_rndx_in,
5351 /* Functions to swap out external symbolic data. */
5352 ecoff_swap_hdr_out,
5353 ecoff_swap_dnr_out,
5354 ecoff_swap_pdr_out,
5355 ecoff_swap_sym_out,
5356 ecoff_swap_opt_out,
5357 ecoff_swap_fdr_out,
5358 ecoff_swap_rfd_out,
5359 ecoff_swap_ext_out,
5360 _bfd_ecoff_swap_tir_out,
5361 _bfd_ecoff_swap_rndx_out,
5362 /* Function to read in symbolic data. */
5363 elf64_alpha_read_ecoff_info
5364};
5365\f
70bcb145
JW
5366/* Use a non-standard hash bucket size of 8. */
5367
562ace6b 5368static const struct elf_size_info alpha_elf_size_info =
70bcb145
JW
5369{
5370 sizeof (Elf64_External_Ehdr),
5371 sizeof (Elf64_External_Phdr),
5372 sizeof (Elf64_External_Shdr),
5373 sizeof (Elf64_External_Rel),
5374 sizeof (Elf64_External_Rela),
5375 sizeof (Elf64_External_Sym),
5376 sizeof (Elf64_External_Dyn),
5377 sizeof (Elf_External_Note),
5378 8,
5379 1,
45d6a902 5380 64, 3,
70bcb145
JW
5381 ELFCLASS64, EV_CURRENT,
5382 bfd_elf64_write_out_phdrs,
5383 bfd_elf64_write_shdrs_and_ehdr,
1489a3a0 5384 bfd_elf64_checksum_contents,
70bcb145 5385 bfd_elf64_write_relocs,
73ff0d56 5386 bfd_elf64_swap_symbol_in,
70bcb145
JW
5387 bfd_elf64_swap_symbol_out,
5388 bfd_elf64_slurp_reloc_table,
5389 bfd_elf64_slurp_symbol_table,
5390 bfd_elf64_swap_dyn_in,
5391 bfd_elf64_swap_dyn_out,
947216bf
AM
5392 bfd_elf64_swap_reloc_in,
5393 bfd_elf64_swap_reloc_out,
5394 bfd_elf64_swap_reloca_in,
5395 bfd_elf64_swap_reloca_out
70bcb145
JW
5396};
5397
6d00b590 5398#define TARGET_LITTLE_SYM alpha_elf64_vec
252b5132
RH
5399#define TARGET_LITTLE_NAME "elf64-alpha"
5400#define ELF_ARCH bfd_arch_alpha
ae95ffa6 5401#define ELF_TARGET_ID ALPHA_ELF_DATA
56fc028e
AJ
5402#define ELF_MACHINE_CODE EM_ALPHA
5403#define ELF_MAXPAGESIZE 0x10000
24718e3b 5404#define ELF_COMMONPAGESIZE 0x2000
252b5132
RH
5405
5406#define bfd_elf64_bfd_link_hash_table_create \
5407 elf64_alpha_bfd_link_hash_table_create
5408
5409#define bfd_elf64_bfd_reloc_type_lookup \
5410 elf64_alpha_bfd_reloc_type_lookup
157090f7
AM
5411#define bfd_elf64_bfd_reloc_name_lookup \
5412 elf64_alpha_bfd_reloc_name_lookup
252b5132
RH
5413#define elf_info_to_howto \
5414 elf64_alpha_info_to_howto
5415
5416#define bfd_elf64_mkobject \
5417 elf64_alpha_mkobject
5418#define elf_backend_object_p \
5419 elf64_alpha_object_p
5420
5421#define elf_backend_section_from_shdr \
5422 elf64_alpha_section_from_shdr
204692d7
RH
5423#define elf_backend_section_flags \
5424 elf64_alpha_section_flags
252b5132
RH
5425#define elf_backend_fake_sections \
5426 elf64_alpha_fake_sections
5427
5428#define bfd_elf64_bfd_is_local_label_name \
5429 elf64_alpha_is_local_label_name
5430#define bfd_elf64_find_nearest_line \
5431 elf64_alpha_find_nearest_line
5432#define bfd_elf64_bfd_relax_section \
5433 elf64_alpha_relax_section
5434
5435#define elf_backend_add_symbol_hook \
5436 elf64_alpha_add_symbol_hook
13285a1b
AM
5437#define elf_backend_relocs_compatible \
5438 _bfd_elf_relocs_compatible
6fc5bb57
AM
5439#define elf_backend_sort_relocs_p \
5440 elf64_alpha_sort_relocs_p
252b5132
RH
5441#define elf_backend_check_relocs \
5442 elf64_alpha_check_relocs
5443#define elf_backend_create_dynamic_sections \
5444 elf64_alpha_create_dynamic_sections
5445#define elf_backend_adjust_dynamic_symbol \
5446 elf64_alpha_adjust_dynamic_symbol
747ffa7b
AM
5447#define elf_backend_merge_symbol_attribute \
5448 elf64_alpha_merge_symbol_attribute
48f4b4f5
RH
5449#define elf_backend_copy_indirect_symbol \
5450 elf64_alpha_copy_indirect_symbol
252b5132
RH
5451#define elf_backend_always_size_sections \
5452 elf64_alpha_always_size_sections
5453#define elf_backend_size_dynamic_sections \
5454 elf64_alpha_size_dynamic_sections
74541ad4 5455#define elf_backend_omit_section_dynsym \
d00dd7dc 5456 _bfd_elf_omit_section_dynsym_all
252b5132
RH
5457#define elf_backend_relocate_section \
5458 elf64_alpha_relocate_section
5459#define elf_backend_finish_dynamic_symbol \
5460 elf64_alpha_finish_dynamic_symbol
5461#define elf_backend_finish_dynamic_sections \
5462 elf64_alpha_finish_dynamic_sections
5463#define bfd_elf64_bfd_final_link \
5464 elf64_alpha_final_link
fcfbdf31
JJ
5465#define elf_backend_reloc_type_class \
5466 elf64_alpha_reloc_type_class
252b5132 5467
e117360e
RH
5468#define elf_backend_can_gc_sections 1
5469#define elf_backend_gc_mark_hook elf64_alpha_gc_mark_hook
e117360e 5470
252b5132
RH
5471#define elf_backend_ecoff_debug_swap \
5472 &elf64_alpha_ecoff_debug_swap
5473
70bcb145
JW
5474#define elf_backend_size_info \
5475 alpha_elf_size_info
5476
29ef7005
L
5477#define elf_backend_special_sections \
5478 elf64_alpha_special_sections
2f89ff8d 5479
6f6fd151
L
5480#define elf_backend_strip_zero_sized_dynamic_sections \
5481 _bfd_elf_strip_zero_sized_dynamic_sections
5482
38b1a46c 5483/* A few constants that determine how the .plt section is set up. */
252b5132
RH
5484#define elf_backend_want_got_plt 0
5485#define elf_backend_plt_readonly 0
5486#define elf_backend_want_plt_sym 1
5487#define elf_backend_got_header_size 0
64f52338 5488#define elf_backend_dtrel_excludes_plt 1
252b5132
RH
5489
5490#include "elf64-target.h"
2238051f
RH
5491\f
5492/* FreeBSD support. */
5493
5494#undef TARGET_LITTLE_SYM
6d00b590 5495#define TARGET_LITTLE_SYM alpha_elf64_fbsd_vec
2238051f
RH
5496#undef TARGET_LITTLE_NAME
5497#define TARGET_LITTLE_NAME "elf64-alpha-freebsd"
d1036acb
L
5498#undef ELF_OSABI
5499#define ELF_OSABI ELFOSABI_FREEBSD
2238051f
RH
5500
5501/* The kernel recognizes executables as valid only if they carry a
5502 "FreeBSD" label in the ELF header. So we put this label on all
5503 executables and (for simplicity) also all other object files. */
5504
0a1b45a2 5505static bool
ed7e9d0b 5506elf64_alpha_fbsd_init_file_header (bfd *abfd, struct bfd_link_info *info)
2238051f
RH
5507{
5508 Elf_Internal_Ehdr * i_ehdrp; /* ELF file header, internal form. */
5509
ed7e9d0b 5510 if (!_bfd_elf_init_file_header (abfd, info))
0a1b45a2 5511 return false;
ed7e9d0b 5512
2238051f
RH
5513 i_ehdrp = elf_elfheader (abfd);
5514
5515 /* Put an ABI label supported by FreeBSD >= 4.1. */
d1036acb 5516 i_ehdrp->e_ident[EI_OSABI] = get_elf_backend_data (abfd)->elf_osabi;
2238051f
RH
5517#ifdef OLD_FREEBSD_ABI_LABEL
5518 /* The ABI label supported by FreeBSD <= 4.0 is quite nonstandard. */
5519 memcpy (&i_ehdrp->e_ident[EI_ABIVERSION], "FreeBSD", 8);
5520#endif
0a1b45a2 5521 return true;
2238051f
RH
5522}
5523
ed7e9d0b
AM
5524#undef elf_backend_init_file_header
5525#define elf_backend_init_file_header \
5526 elf64_alpha_fbsd_init_file_header
2238051f 5527
571fe01f 5528#undef elf64_bed
2238051f
RH
5529#define elf64_bed elf64_alpha_fbsd_bed
5530
5531#include "elf64-target.h"