]> git.ipfire.org Git - thirdparty/binutils-gdb.git/blame - bfd/elf64-alpha.c
Fix symbol versioning problems in PR 18703.
[thirdparty/binutils-gdb.git] / bfd / elf64-alpha.c
CommitLineData
252b5132 1/* Alpha specific support for 64-bit ELF
b90efa5b 2 Copyright (C) 1996-2015 Free Software Foundation, Inc.
252b5132
RH
3 Contributed by Richard Henderson <rth@tamu.edu>.
4
571fe01f 5 This file is part of BFD, the Binary File Descriptor library.
252b5132 6
571fe01f
NC
7 This program is free software; you can redistribute it and/or modify
8 it under the terms of the GNU General Public License as published by
cd123cb7 9 the Free Software Foundation; either version 3 of the License, or
571fe01f 10 (at your option) any later version.
252b5132 11
571fe01f
NC
12 This program is distributed in the hope that it will be useful,
13 but WITHOUT ANY WARRANTY; without even the implied warranty of
14 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 GNU General Public License for more details.
252b5132 16
571fe01f
NC
17 You should have received a copy of the GNU General Public License
18 along with this program; if not, write to the Free Software
cd123cb7
NC
19 Foundation, Inc., 51 Franklin Street - Fifth Floor, Boston,
20 MA 02110-1301, USA. */
21
252b5132
RH
22
23/* We need a published ABI spec for this. Until one comes out, don't
24 assume this'll remain unchanged forever. */
25
252b5132 26#include "sysdep.h"
3db64b00 27#include "bfd.h"
252b5132
RH
28#include "libbfd.h"
29#include "elf-bfd.h"
30
31#include "elf/alpha.h"
32
33#define ALPHAECOFF
34
35#define NO_COFF_RELOCS
36#define NO_COFF_SYMBOLS
37#define NO_COFF_LINENOS
38
fe8bc63d 39/* Get the ECOFF swapping routines. Needed for the debug information. */
252b5132
RH
40#include "coff/internal.h"
41#include "coff/sym.h"
42#include "coff/symconst.h"
43#include "coff/ecoff.h"
44#include "coff/alpha.h"
45#include "aout/ar.h"
46#include "libcoff.h"
47#include "libecoff.h"
48#define ECOFF_64
49#include "ecoffswap.h"
50
6ec7057a
RH
51\f
52/* Instruction data for plt generation and relaxation. */
53
54#define OP_LDA 0x08
55#define OP_LDAH 0x09
56#define OP_LDQ 0x29
57#define OP_BR 0x30
58#define OP_BSR 0x34
59
60#define INSN_LDA (OP_LDA << 26)
61#define INSN_LDAH (OP_LDAH << 26)
62#define INSN_LDQ (OP_LDQ << 26)
63#define INSN_BR (OP_BR << 26)
64
65#define INSN_ADDQ 0x40000400
66#define INSN_RDUNIQ 0x0000009e
67#define INSN_SUBQ 0x40000520
68#define INSN_S4SUBQ 0x40000560
69#define INSN_UNOP 0x2ffe0000
70
71#define INSN_JSR 0x68004000
72#define INSN_JMP 0x68000000
73#define INSN_JSR_MASK 0xfc00c000
74
75#define INSN_A(I,A) (I | (A << 21))
76#define INSN_AB(I,A,B) (I | (A << 21) | (B << 16))
77#define INSN_ABC(I,A,B,C) (I | (A << 21) | (B << 16) | C)
78#define INSN_ABO(I,A,B,O) (I | (A << 21) | (B << 16) | ((O) & 0xffff))
79#define INSN_AD(I,A,D) (I | (A << 21) | (((D) >> 2) & 0x1fffff))
80
81/* PLT/GOT Stuff */
82
83/* Set by ld emulation. Putting this into the link_info or hash structure
84 is simply working too hard. */
85#ifdef USE_SECUREPLT
86bfd_boolean elf64_alpha_use_secureplt = TRUE;
87#else
88bfd_boolean elf64_alpha_use_secureplt = FALSE;
89#endif
90
91#define OLD_PLT_HEADER_SIZE 32
92#define OLD_PLT_ENTRY_SIZE 12
93#define NEW_PLT_HEADER_SIZE 36
94#define NEW_PLT_ENTRY_SIZE 4
95
96#define PLT_HEADER_SIZE \
97 (elf64_alpha_use_secureplt ? NEW_PLT_HEADER_SIZE : OLD_PLT_HEADER_SIZE)
98#define PLT_ENTRY_SIZE \
99 (elf64_alpha_use_secureplt ? NEW_PLT_ENTRY_SIZE : OLD_PLT_ENTRY_SIZE)
100
101#define MAX_GOT_SIZE (64*1024)
102
103#define ELF_DYNAMIC_INTERPRETER "/usr/lib/ld.so"
252b5132 104\f
21d799b5
NC
105
106/* Used to implement multiple .got subsections. */
107struct alpha_elf_got_entry
108{
109 struct alpha_elf_got_entry *next;
110
111 /* Which .got subsection? */
112 bfd *gotobj;
113
114 /* The addend in effect for this entry. */
115 bfd_vma addend;
116
117 /* The .got offset for this entry. */
118 int got_offset;
119
120 /* The .plt offset for this entry. */
121 int plt_offset;
122
123 /* How many references to this entry? */
124 int use_count;
125
126 /* The relocation type of this entry. */
127 unsigned char reloc_type;
128
129 /* How a LITERAL is used. */
130 unsigned char flags;
131
132 /* Have we initialized the dynamic relocation for this entry? */
133 unsigned char reloc_done;
134
135 /* Have we adjusted this entry for SEC_MERGE? */
136 unsigned char reloc_xlated;
137};
138
139struct alpha_elf_reloc_entry
140{
141 struct alpha_elf_reloc_entry *next;
142
143 /* Which .reloc section? */
144 asection *srel;
145
146 /* What kind of relocation? */
147 unsigned int rtype;
148
149 /* Is this against read-only section? */
150 unsigned int reltext : 1;
151
152 /* How many did we find? */
153 unsigned long count;
154};
155
252b5132
RH
156struct alpha_elf_link_hash_entry
157{
158 struct elf_link_hash_entry root;
159
160 /* External symbol information. */
161 EXTR esym;
162
163 /* Cumulative flags for all the .got entries. */
164 int flags;
165
9e756d64 166 /* Contexts in which a literal was referenced. */
8288a39e
RH
167#define ALPHA_ELF_LINK_HASH_LU_ADDR 0x01
168#define ALPHA_ELF_LINK_HASH_LU_MEM 0x02
169#define ALPHA_ELF_LINK_HASH_LU_BYTE 0x04
170#define ALPHA_ELF_LINK_HASH_LU_JSR 0x08
171#define ALPHA_ELF_LINK_HASH_LU_TLSGD 0x10
172#define ALPHA_ELF_LINK_HASH_LU_TLSLDM 0x20
173#define ALPHA_ELF_LINK_HASH_LU_JSRDIRECT 0x40
174#define ALPHA_ELF_LINK_HASH_LU_PLT 0x38
175#define ALPHA_ELF_LINK_HASH_TLS_IE 0x80
cc03ec80 176
252b5132 177 /* Used to implement multiple .got subsections. */
21d799b5 178 struct alpha_elf_got_entry *got_entries;
252b5132 179
571fe01f 180 /* Used to count non-got, non-plt relocations for delayed sizing
252b5132 181 of relocation sections. */
21d799b5 182 struct alpha_elf_reloc_entry *reloc_entries;
252b5132
RH
183};
184
185/* Alpha ELF linker hash table. */
186
187struct alpha_elf_link_hash_table
188{
189 struct elf_link_hash_table root;
190
191 /* The head of a list of .got subsections linked through
192 alpha_elf_tdata(abfd)->got_link_next. */
193 bfd *got_list;
4a828aab
RH
194
195 /* The most recent relax pass that we've seen. The GOTs
196 should be regenerated if this doesn't match. */
197 int relax_trip;
252b5132
RH
198};
199
200/* Look up an entry in a Alpha ELF linker hash table. */
201
202#define alpha_elf_link_hash_lookup(table, string, create, copy, follow) \
203 ((struct alpha_elf_link_hash_entry *) \
204 elf_link_hash_lookup (&(table)->root, (string), (create), \
205 (copy), (follow)))
206
207/* Traverse a Alpha ELF linker hash table. */
208
209#define alpha_elf_link_hash_traverse(table, func, info) \
210 (elf_link_hash_traverse \
211 (&(table)->root, \
2c3fc389 212 (bfd_boolean (*) (struct elf_link_hash_entry *, void *)) (func), \
252b5132
RH
213 (info)))
214
215/* Get the Alpha ELF linker hash table from a link_info structure. */
216
217#define alpha_elf_hash_table(p) \
4dfe6ac6
NC
218 (elf_hash_table_id ((struct elf_link_hash_table *) ((p)->hash)) \
219 == ALPHA_ELF_DATA ? ((struct alpha_elf_link_hash_table *) ((p)->hash)) : NULL)
252b5132
RH
220
221/* Get the object's symbols as our own entry type. */
222
223#define alpha_elf_sym_hashes(abfd) \
224 ((struct alpha_elf_link_hash_entry **)elf_sym_hashes(abfd))
225
68ffbac6 226/* Should we do dynamic things to this symbol? This differs from the
986a241f
RH
227 generic version in that we never need to consider function pointer
228 equality wrt PLT entries -- we don't create a PLT entry if a symbol's
229 address is ever taken. */
252b5132 230
986a241f 231static inline bfd_boolean
a7519a3c
RH
232alpha_elf_dynamic_symbol_p (struct elf_link_hash_entry *h,
233 struct bfd_link_info *info)
8fb35fed 234{
986a241f 235 return _bfd_elf_dynamic_symbol_p (h, info, 0);
8fb35fed 236}
252b5132
RH
237
238/* Create an entry in a Alpha ELF linker hash table. */
239
240static struct bfd_hash_entry *
a7519a3c
RH
241elf64_alpha_link_hash_newfunc (struct bfd_hash_entry *entry,
242 struct bfd_hash_table *table,
243 const char *string)
252b5132
RH
244{
245 struct alpha_elf_link_hash_entry *ret =
246 (struct alpha_elf_link_hash_entry *) entry;
247
248 /* Allocate the structure if it has not already been allocated by a
249 subclass. */
250 if (ret == (struct alpha_elf_link_hash_entry *) NULL)
251 ret = ((struct alpha_elf_link_hash_entry *)
252 bfd_hash_allocate (table,
253 sizeof (struct alpha_elf_link_hash_entry)));
254 if (ret == (struct alpha_elf_link_hash_entry *) NULL)
255 return (struct bfd_hash_entry *) ret;
256
257 /* Call the allocation method of the superclass. */
258 ret = ((struct alpha_elf_link_hash_entry *)
259 _bfd_elf_link_hash_newfunc ((struct bfd_hash_entry *) ret,
260 table, string));
261 if (ret != (struct alpha_elf_link_hash_entry *) NULL)
262 {
263 /* Set local fields. */
264 memset (&ret->esym, 0, sizeof (EXTR));
265 /* We use -2 as a marker to indicate that the information has
266 not been set. -1 means there is no associated ifd. */
267 ret->esym.ifd = -2;
268 ret->flags = 0;
269 ret->got_entries = NULL;
270 ret->reloc_entries = NULL;
271 }
272
273 return (struct bfd_hash_entry *) ret;
274}
275
276/* Create a Alpha ELF linker hash table. */
277
278static struct bfd_link_hash_table *
a7519a3c 279elf64_alpha_bfd_link_hash_table_create (bfd *abfd)
252b5132
RH
280{
281 struct alpha_elf_link_hash_table *ret;
dc810e39 282 bfd_size_type amt = sizeof (struct alpha_elf_link_hash_table);
252b5132 283
e2d34d7d 284 ret = (struct alpha_elf_link_hash_table *) bfd_zmalloc (amt);
252b5132
RH
285 if (ret == (struct alpha_elf_link_hash_table *) NULL)
286 return NULL;
287
66eb6687
AM
288 if (!_bfd_elf_link_hash_table_init (&ret->root, abfd,
289 elf64_alpha_link_hash_newfunc,
4dfe6ac6
NC
290 sizeof (struct alpha_elf_link_hash_entry),
291 ALPHA_ELF_DATA))
252b5132 292 {
e2d34d7d 293 free (ret);
252b5132
RH
294 return NULL;
295 }
296
297 return &ret->root.root;
298}
299\f
698600e4
AM
300/* Alpha ELF follows MIPS ELF in using a special find_nearest_line
301 routine in order to handle the ECOFF debugging information. */
302
303struct alpha_elf_find_line
304{
305 struct ecoff_debug_info d;
306 struct ecoff_find_line i;
307};
308
252b5132
RH
309/* We have some private fields hanging off of the elf_tdata structure. */
310
311struct alpha_elf_obj_tdata
312{
313 struct elf_obj_tdata root;
314
315 /* For every input file, these are the got entries for that object's
316 local symbols. */
317 struct alpha_elf_got_entry ** local_got_entries;
318
319 /* For every input file, this is the object that owns the got that
320 this input file uses. */
321 bfd *gotobj;
322
323 /* For every got, this is a linked list through the objects using this got */
324 bfd *in_got_link_next;
325
326 /* For every got, this is a link to the next got subsegment. */
327 bfd *got_link_next;
328
329 /* For every got, this is the section. */
330 asection *got;
331
3765b1be
RH
332 /* For every got, this is it's total number of words. */
333 int total_got_size;
252b5132 334
3765b1be 335 /* For every got, this is the sum of the number of words required
252b5132 336 to hold all of the member object's local got. */
3765b1be 337 int local_got_size;
698600e4
AM
338
339 /* Used by elf64_alpha_find_nearest_line entry point. */
340 struct alpha_elf_find_line *find_line_info;
341
252b5132
RH
342};
343
344#define alpha_elf_tdata(abfd) \
345 ((struct alpha_elf_obj_tdata *) (abfd)->tdata.any)
346
0ffa91dd
NC
347#define is_alpha_elf(bfd) \
348 (bfd_get_flavour (bfd) == bfd_target_elf_flavour \
349 && elf_tdata (bfd) != NULL \
4dfe6ac6 350 && elf_object_id (bfd) == ALPHA_ELF_DATA)
0ffa91dd 351
b34976b6 352static bfd_boolean
a7519a3c 353elf64_alpha_mkobject (bfd *abfd)
252b5132 354{
0ffa91dd 355 return bfd_elf_allocate_object (abfd, sizeof (struct alpha_elf_obj_tdata),
4dfe6ac6 356 ALPHA_ELF_DATA);
252b5132
RH
357}
358
b34976b6 359static bfd_boolean
a7519a3c 360elf64_alpha_object_p (bfd *abfd)
252b5132 361{
252b5132
RH
362 /* Set the right machine number for an Alpha ELF file. */
363 return bfd_default_set_arch_mach (abfd, bfd_arch_alpha, 0);
364}
365\f
a7519a3c
RH
366/* A relocation function which doesn't do anything. */
367
368static bfd_reloc_status_type
369elf64_alpha_reloc_nil (bfd *abfd ATTRIBUTE_UNUSED, arelent *reloc,
370 asymbol *sym ATTRIBUTE_UNUSED,
2c3fc389 371 void * data ATTRIBUTE_UNUSED, asection *sec,
a7519a3c
RH
372 bfd *output_bfd, char **error_message ATTRIBUTE_UNUSED)
373{
374 if (output_bfd)
375 reloc->address += sec->output_offset;
376 return bfd_reloc_ok;
377}
378
379/* A relocation function used for an unsupported reloc. */
380
381static bfd_reloc_status_type
382elf64_alpha_reloc_bad (bfd *abfd ATTRIBUTE_UNUSED, arelent *reloc,
383 asymbol *sym ATTRIBUTE_UNUSED,
2c3fc389 384 void * data ATTRIBUTE_UNUSED, asection *sec,
a7519a3c
RH
385 bfd *output_bfd, char **error_message ATTRIBUTE_UNUSED)
386{
387 if (output_bfd)
388 reloc->address += sec->output_offset;
389 return bfd_reloc_notsupported;
390}
391
392/* Do the work of the GPDISP relocation. */
393
394static bfd_reloc_status_type
395elf64_alpha_do_reloc_gpdisp (bfd *abfd, bfd_vma gpdisp, bfd_byte *p_ldah,
396 bfd_byte *p_lda)
397{
398 bfd_reloc_status_type ret = bfd_reloc_ok;
399 bfd_vma addend;
400 unsigned long i_ldah, i_lda;
401
402 i_ldah = bfd_get_32 (abfd, p_ldah);
403 i_lda = bfd_get_32 (abfd, p_lda);
404
405 /* Complain if the instructions are not correct. */
406 if (((i_ldah >> 26) & 0x3f) != 0x09
407 || ((i_lda >> 26) & 0x3f) != 0x08)
408 ret = bfd_reloc_dangerous;
409
410 /* Extract the user-supplied offset, mirroring the sign extensions
411 that the instructions perform. */
412 addend = ((i_ldah & 0xffff) << 16) | (i_lda & 0xffff);
413 addend = (addend ^ 0x80008000) - 0x80008000;
414
415 gpdisp += addend;
416
417 if ((bfd_signed_vma) gpdisp < -(bfd_signed_vma) 0x80000000
418 || (bfd_signed_vma) gpdisp >= (bfd_signed_vma) 0x7fff8000)
419 ret = bfd_reloc_overflow;
420
421 /* compensate for the sign extension again. */
422 i_ldah = ((i_ldah & 0xffff0000)
423 | (((gpdisp >> 16) + ((gpdisp >> 15) & 1)) & 0xffff));
424 i_lda = (i_lda & 0xffff0000) | (gpdisp & 0xffff);
425
426 bfd_put_32 (abfd, (bfd_vma) i_ldah, p_ldah);
427 bfd_put_32 (abfd, (bfd_vma) i_lda, p_lda);
428
429 return ret;
430}
431
432/* The special function for the GPDISP reloc. */
433
434static bfd_reloc_status_type
435elf64_alpha_reloc_gpdisp (bfd *abfd, arelent *reloc_entry,
2c3fc389 436 asymbol *sym ATTRIBUTE_UNUSED, void * data,
a7519a3c
RH
437 asection *input_section, bfd *output_bfd,
438 char **err_msg)
439{
440 bfd_reloc_status_type ret;
441 bfd_vma gp, relocation;
442 bfd_vma high_address;
443 bfd_byte *p_ldah, *p_lda;
444
445 /* Don't do anything if we're not doing a final link. */
446 if (output_bfd)
447 {
448 reloc_entry->address += input_section->output_offset;
449 return bfd_reloc_ok;
450 }
451
452 high_address = bfd_get_section_limit (abfd, input_section);
453 if (reloc_entry->address > high_address
454 || reloc_entry->address + reloc_entry->addend > high_address)
455 return bfd_reloc_outofrange;
456
457 /* The gp used in the portion of the output object to which this
458 input object belongs is cached on the input bfd. */
459 gp = _bfd_get_gp_value (abfd);
460
461 relocation = (input_section->output_section->vma
462 + input_section->output_offset
463 + reloc_entry->address);
464
465 p_ldah = (bfd_byte *) data + reloc_entry->address;
466 p_lda = p_ldah + reloc_entry->addend;
467
468 ret = elf64_alpha_do_reloc_gpdisp (abfd, gp - relocation, p_ldah, p_lda);
469
470 /* Complain if the instructions are not correct. */
471 if (ret == bfd_reloc_dangerous)
472 *err_msg = _("GPDISP relocation did not find ldah and lda instructions");
473
474 return ret;
475}
476
252b5132
RH
477/* In case we're on a 32-bit machine, construct a 64-bit "-1" value
478 from smaller values. Start with zero, widen, *then* decrement. */
479#define MINUS_ONE (((bfd_vma)0) - 1)
480
21d799b5 481
dfe57ca0 482#define SKIP_HOWTO(N) \
21d799b5 483 HOWTO(N, 0, 0, 0, 0, 0, complain_overflow_dont, elf64_alpha_reloc_bad, 0, 0, 0, 0, 0)
dfe57ca0 484
252b5132
RH
485static reloc_howto_type elf64_alpha_howto_table[] =
486{
487 HOWTO (R_ALPHA_NONE, /* type */
488 0, /* rightshift */
6346d5ca
AM
489 3, /* size (0 = byte, 1 = short, 2 = long) */
490 0, /* bitsize */
b34976b6 491 TRUE, /* pc_relative */
252b5132
RH
492 0, /* bitpos */
493 complain_overflow_dont, /* complain_on_overflow */
494 elf64_alpha_reloc_nil, /* special_function */
495 "NONE", /* name */
b34976b6 496 FALSE, /* partial_inplace */
252b5132
RH
497 0, /* src_mask */
498 0, /* dst_mask */
b34976b6 499 TRUE), /* pcrel_offset */
252b5132
RH
500
501 /* A 32 bit reference to a symbol. */
502 HOWTO (R_ALPHA_REFLONG, /* type */
503 0, /* rightshift */
504 2, /* size (0 = byte, 1 = short, 2 = long) */
505 32, /* bitsize */
b34976b6 506 FALSE, /* pc_relative */
252b5132
RH
507 0, /* bitpos */
508 complain_overflow_bitfield, /* complain_on_overflow */
bc1bc43f 509 bfd_elf_generic_reloc, /* special_function */
252b5132 510 "REFLONG", /* name */
b34976b6 511 FALSE, /* partial_inplace */
252b5132
RH
512 0xffffffff, /* src_mask */
513 0xffffffff, /* dst_mask */
b34976b6 514 FALSE), /* pcrel_offset */
252b5132
RH
515
516 /* A 64 bit reference to a symbol. */
517 HOWTO (R_ALPHA_REFQUAD, /* type */
518 0, /* rightshift */
519 4, /* size (0 = byte, 1 = short, 2 = long) */
520 64, /* bitsize */
b34976b6 521 FALSE, /* pc_relative */
252b5132
RH
522 0, /* bitpos */
523 complain_overflow_bitfield, /* complain_on_overflow */
bc1bc43f 524 bfd_elf_generic_reloc, /* special_function */
252b5132 525 "REFQUAD", /* name */
b34976b6 526 FALSE, /* partial_inplace */
252b5132
RH
527 MINUS_ONE, /* src_mask */
528 MINUS_ONE, /* dst_mask */
b34976b6 529 FALSE), /* pcrel_offset */
252b5132
RH
530
531 /* A 32 bit GP relative offset. This is just like REFLONG except
532 that when the value is used the value of the gp register will be
533 added in. */
534 HOWTO (R_ALPHA_GPREL32, /* type */
535 0, /* rightshift */
536 2, /* size (0 = byte, 1 = short, 2 = long) */
537 32, /* bitsize */
b34976b6 538 FALSE, /* pc_relative */
252b5132
RH
539 0, /* bitpos */
540 complain_overflow_bitfield, /* complain_on_overflow */
bc1bc43f 541 bfd_elf_generic_reloc, /* special_function */
252b5132 542 "GPREL32", /* name */
b34976b6 543 FALSE, /* partial_inplace */
252b5132
RH
544 0xffffffff, /* src_mask */
545 0xffffffff, /* dst_mask */
b34976b6 546 FALSE), /* pcrel_offset */
252b5132
RH
547
548 /* Used for an instruction that refers to memory off the GP register. */
549 HOWTO (R_ALPHA_LITERAL, /* type */
550 0, /* rightshift */
dfe57ca0 551 1, /* size (0 = byte, 1 = short, 2 = long) */
252b5132 552 16, /* bitsize */
b34976b6 553 FALSE, /* pc_relative */
252b5132
RH
554 0, /* bitpos */
555 complain_overflow_signed, /* complain_on_overflow */
bc1bc43f 556 bfd_elf_generic_reloc, /* special_function */
252b5132 557 "ELF_LITERAL", /* name */
b34976b6 558 FALSE, /* partial_inplace */
252b5132
RH
559 0xffff, /* src_mask */
560 0xffff, /* dst_mask */
b34976b6 561 FALSE), /* pcrel_offset */
252b5132
RH
562
563 /* This reloc only appears immediately following an ELF_LITERAL reloc.
564 It identifies a use of the literal. The symbol index is special:
565 1 means the literal address is in the base register of a memory
566 format instruction; 2 means the literal address is in the byte
567 offset register of a byte-manipulation instruction; 3 means the
568 literal address is in the target register of a jsr instruction.
569 This does not actually do any relocation. */
570 HOWTO (R_ALPHA_LITUSE, /* type */
571 0, /* rightshift */
dfe57ca0 572 1, /* size (0 = byte, 1 = short, 2 = long) */
252b5132 573 32, /* bitsize */
b34976b6 574 FALSE, /* pc_relative */
252b5132
RH
575 0, /* bitpos */
576 complain_overflow_dont, /* complain_on_overflow */
577 elf64_alpha_reloc_nil, /* special_function */
578 "LITUSE", /* name */
b34976b6 579 FALSE, /* partial_inplace */
252b5132
RH
580 0, /* src_mask */
581 0, /* dst_mask */
b34976b6 582 FALSE), /* pcrel_offset */
252b5132
RH
583
584 /* Load the gp register. This is always used for a ldah instruction
585 which loads the upper 16 bits of the gp register. The symbol
586 index of the GPDISP instruction is an offset in bytes to the lda
587 instruction that loads the lower 16 bits. The value to use for
588 the relocation is the difference between the GP value and the
589 current location; the load will always be done against a register
590 holding the current address.
591
592 NOTE: Unlike ECOFF, partial in-place relocation is not done. If
593 any offset is present in the instructions, it is an offset from
594 the register to the ldah instruction. This lets us avoid any
595 stupid hackery like inventing a gp value to do partial relocation
596 against. Also unlike ECOFF, we do the whole relocation off of
597 the GPDISP rather than a GPDISP_HI16/GPDISP_LO16 pair. An odd,
598 space consuming bit, that, since all the information was present
599 in the GPDISP_HI16 reloc. */
600 HOWTO (R_ALPHA_GPDISP, /* type */
601 16, /* rightshift */
602 2, /* size (0 = byte, 1 = short, 2 = long) */
603 16, /* bitsize */
b34976b6 604 FALSE, /* pc_relative */
252b5132
RH
605 0, /* bitpos */
606 complain_overflow_dont, /* complain_on_overflow */
607 elf64_alpha_reloc_gpdisp, /* special_function */
608 "GPDISP", /* name */
b34976b6 609 FALSE, /* partial_inplace */
252b5132
RH
610 0xffff, /* src_mask */
611 0xffff, /* dst_mask */
b34976b6 612 TRUE), /* pcrel_offset */
252b5132
RH
613
614 /* A 21 bit branch. */
615 HOWTO (R_ALPHA_BRADDR, /* type */
616 2, /* rightshift */
617 2, /* size (0 = byte, 1 = short, 2 = long) */
618 21, /* bitsize */
b34976b6 619 TRUE, /* pc_relative */
252b5132
RH
620 0, /* bitpos */
621 complain_overflow_signed, /* complain_on_overflow */
bc1bc43f 622 bfd_elf_generic_reloc, /* special_function */
252b5132 623 "BRADDR", /* name */
b34976b6 624 FALSE, /* partial_inplace */
252b5132
RH
625 0x1fffff, /* src_mask */
626 0x1fffff, /* dst_mask */
b34976b6 627 TRUE), /* pcrel_offset */
252b5132
RH
628
629 /* A hint for a jump to a register. */
630 HOWTO (R_ALPHA_HINT, /* type */
631 2, /* rightshift */
dfe57ca0 632 1, /* size (0 = byte, 1 = short, 2 = long) */
252b5132 633 14, /* bitsize */
b34976b6 634 TRUE, /* pc_relative */
252b5132
RH
635 0, /* bitpos */
636 complain_overflow_dont, /* complain_on_overflow */
bc1bc43f 637 bfd_elf_generic_reloc, /* special_function */
252b5132 638 "HINT", /* name */
b34976b6 639 FALSE, /* partial_inplace */
252b5132
RH
640 0x3fff, /* src_mask */
641 0x3fff, /* dst_mask */
b34976b6 642 TRUE), /* pcrel_offset */
252b5132
RH
643
644 /* 16 bit PC relative offset. */
645 HOWTO (R_ALPHA_SREL16, /* type */
646 0, /* rightshift */
647 1, /* size (0 = byte, 1 = short, 2 = long) */
648 16, /* bitsize */
b34976b6 649 TRUE, /* pc_relative */
252b5132
RH
650 0, /* bitpos */
651 complain_overflow_signed, /* complain_on_overflow */
bc1bc43f 652 bfd_elf_generic_reloc, /* special_function */
252b5132 653 "SREL16", /* name */
b34976b6 654 FALSE, /* partial_inplace */
252b5132
RH
655 0xffff, /* src_mask */
656 0xffff, /* dst_mask */
b34976b6 657 TRUE), /* pcrel_offset */
252b5132
RH
658
659 /* 32 bit PC relative offset. */
660 HOWTO (R_ALPHA_SREL32, /* type */
661 0, /* rightshift */
662 2, /* size (0 = byte, 1 = short, 2 = long) */
663 32, /* bitsize */
b34976b6 664 TRUE, /* pc_relative */
252b5132
RH
665 0, /* bitpos */
666 complain_overflow_signed, /* complain_on_overflow */
bc1bc43f 667 bfd_elf_generic_reloc, /* special_function */
252b5132 668 "SREL32", /* name */
b34976b6 669 FALSE, /* partial_inplace */
252b5132
RH
670 0xffffffff, /* src_mask */
671 0xffffffff, /* dst_mask */
b34976b6 672 TRUE), /* pcrel_offset */
252b5132
RH
673
674 /* A 64 bit PC relative offset. */
675 HOWTO (R_ALPHA_SREL64, /* type */
676 0, /* rightshift */
677 4, /* size (0 = byte, 1 = short, 2 = long) */
678 64, /* bitsize */
b34976b6 679 TRUE, /* pc_relative */
252b5132
RH
680 0, /* bitpos */
681 complain_overflow_signed, /* complain_on_overflow */
bc1bc43f 682 bfd_elf_generic_reloc, /* special_function */
252b5132 683 "SREL64", /* name */
b34976b6 684 FALSE, /* partial_inplace */
252b5132
RH
685 MINUS_ONE, /* src_mask */
686 MINUS_ONE, /* dst_mask */
b34976b6 687 TRUE), /* pcrel_offset */
252b5132 688
dfe57ca0
RH
689 /* Skip 12 - 16; deprecated ECOFF relocs. */
690 SKIP_HOWTO (12),
691 SKIP_HOWTO (13),
692 SKIP_HOWTO (14),
693 SKIP_HOWTO (15),
694 SKIP_HOWTO (16),
252b5132
RH
695
696 /* The high 16 bits of the displacement from GP to the target. */
697 HOWTO (R_ALPHA_GPRELHIGH,
698 0, /* rightshift */
dfe57ca0 699 1, /* size (0 = byte, 1 = short, 2 = long) */
252b5132 700 16, /* bitsize */
b34976b6 701 FALSE, /* pc_relative */
252b5132
RH
702 0, /* bitpos */
703 complain_overflow_signed, /* complain_on_overflow */
bc1bc43f 704 bfd_elf_generic_reloc, /* special_function */
252b5132 705 "GPRELHIGH", /* name */
b34976b6 706 FALSE, /* partial_inplace */
252b5132
RH
707 0xffff, /* src_mask */
708 0xffff, /* dst_mask */
b34976b6 709 FALSE), /* pcrel_offset */
252b5132
RH
710
711 /* The low 16 bits of the displacement from GP to the target. */
712 HOWTO (R_ALPHA_GPRELLOW,
713 0, /* rightshift */
dfe57ca0 714 1, /* size (0 = byte, 1 = short, 2 = long) */
252b5132 715 16, /* bitsize */
b34976b6 716 FALSE, /* pc_relative */
252b5132
RH
717 0, /* bitpos */
718 complain_overflow_dont, /* complain_on_overflow */
bc1bc43f 719 bfd_elf_generic_reloc, /* special_function */
252b5132 720 "GPRELLOW", /* name */
b34976b6 721 FALSE, /* partial_inplace */
252b5132
RH
722 0xffff, /* src_mask */
723 0xffff, /* dst_mask */
b34976b6 724 FALSE), /* pcrel_offset */
252b5132
RH
725
726 /* A 16-bit displacement from the GP to the target. */
dfe57ca0 727 HOWTO (R_ALPHA_GPREL16,
252b5132 728 0, /* rightshift */
dfe57ca0 729 1, /* size (0 = byte, 1 = short, 2 = long) */
252b5132 730 16, /* bitsize */
b34976b6 731 FALSE, /* pc_relative */
252b5132
RH
732 0, /* bitpos */
733 complain_overflow_signed, /* complain_on_overflow */
bc1bc43f 734 bfd_elf_generic_reloc, /* special_function */
dfe57ca0 735 "GPREL16", /* name */
b34976b6 736 FALSE, /* partial_inplace */
252b5132
RH
737 0xffff, /* src_mask */
738 0xffff, /* dst_mask */
b34976b6 739 FALSE), /* pcrel_offset */
252b5132 740
dfe57ca0
RH
741 /* Skip 20 - 23; deprecated ECOFF relocs. */
742 SKIP_HOWTO (20),
743 SKIP_HOWTO (21),
744 SKIP_HOWTO (22),
745 SKIP_HOWTO (23),
252b5132 746
fe8bc63d 747 /* Misc ELF relocations. */
252b5132
RH
748
749 /* A dynamic relocation to copy the target into our .dynbss section. */
750 /* Not generated, as all Alpha objects use PIC, so it is not needed. It
751 is present because every other ELF has one, but should not be used
752 because .dynbss is an ugly thing. */
753 HOWTO (R_ALPHA_COPY,
754 0,
755 0,
756 0,
b34976b6 757 FALSE,
252b5132
RH
758 0,
759 complain_overflow_dont,
760 bfd_elf_generic_reloc,
761 "COPY",
b34976b6 762 FALSE,
252b5132
RH
763 0,
764 0,
b34976b6 765 TRUE),
252b5132
RH
766
767 /* A dynamic relocation for a .got entry. */
768 HOWTO (R_ALPHA_GLOB_DAT,
769 0,
770 0,
771 0,
b34976b6 772 FALSE,
252b5132
RH
773 0,
774 complain_overflow_dont,
775 bfd_elf_generic_reloc,
776 "GLOB_DAT",
b34976b6 777 FALSE,
252b5132
RH
778 0,
779 0,
b34976b6 780 TRUE),
252b5132
RH
781
782 /* A dynamic relocation for a .plt entry. */
783 HOWTO (R_ALPHA_JMP_SLOT,
784 0,
785 0,
786 0,
b34976b6 787 FALSE,
252b5132
RH
788 0,
789 complain_overflow_dont,
790 bfd_elf_generic_reloc,
791 "JMP_SLOT",
b34976b6 792 FALSE,
252b5132
RH
793 0,
794 0,
b34976b6 795 TRUE),
252b5132
RH
796
797 /* A dynamic relocation to add the base of the DSO to a 64-bit field. */
798 HOWTO (R_ALPHA_RELATIVE,
799 0,
800 0,
801 0,
b34976b6 802 FALSE,
252b5132
RH
803 0,
804 complain_overflow_dont,
805 bfd_elf_generic_reloc,
806 "RELATIVE",
b34976b6 807 FALSE,
252b5132
RH
808 0,
809 0,
b34976b6 810 TRUE),
7793f4d0
RH
811
812 /* A 21 bit branch that adjusts for gp loads. */
813 HOWTO (R_ALPHA_BRSGP, /* type */
814 2, /* rightshift */
815 2, /* size (0 = byte, 1 = short, 2 = long) */
816 21, /* bitsize */
b34976b6 817 TRUE, /* pc_relative */
7793f4d0
RH
818 0, /* bitpos */
819 complain_overflow_signed, /* complain_on_overflow */
bc1bc43f 820 bfd_elf_generic_reloc, /* special_function */
7793f4d0 821 "BRSGP", /* name */
b34976b6 822 FALSE, /* partial_inplace */
7793f4d0
RH
823 0x1fffff, /* src_mask */
824 0x1fffff, /* dst_mask */
b34976b6 825 TRUE), /* pcrel_offset */
3765b1be
RH
826
827 /* Creates a tls_index for the symbol in the got. */
828 HOWTO (R_ALPHA_TLSGD, /* type */
829 0, /* rightshift */
830 1, /* size (0 = byte, 1 = short, 2 = long) */
831 16, /* bitsize */
b34976b6 832 FALSE, /* pc_relative */
3765b1be
RH
833 0, /* bitpos */
834 complain_overflow_signed, /* complain_on_overflow */
bc1bc43f 835 bfd_elf_generic_reloc, /* special_function */
3765b1be 836 "TLSGD", /* name */
b34976b6 837 FALSE, /* partial_inplace */
3765b1be
RH
838 0xffff, /* src_mask */
839 0xffff, /* dst_mask */
b34976b6 840 FALSE), /* pcrel_offset */
3765b1be
RH
841
842 /* Creates a tls_index for the (current) module in the got. */
843 HOWTO (R_ALPHA_TLSLDM, /* type */
844 0, /* rightshift */
845 1, /* size (0 = byte, 1 = short, 2 = long) */
846 16, /* bitsize */
b34976b6 847 FALSE, /* pc_relative */
3765b1be
RH
848 0, /* bitpos */
849 complain_overflow_signed, /* complain_on_overflow */
bc1bc43f 850 bfd_elf_generic_reloc, /* special_function */
3765b1be 851 "TLSLDM", /* name */
b34976b6 852 FALSE, /* partial_inplace */
3765b1be
RH
853 0xffff, /* src_mask */
854 0xffff, /* dst_mask */
b34976b6 855 FALSE), /* pcrel_offset */
3765b1be
RH
856
857 /* A dynamic relocation for a DTP module entry. */
858 HOWTO (R_ALPHA_DTPMOD64, /* type */
859 0, /* rightshift */
860 4, /* size (0 = byte, 1 = short, 2 = long) */
861 64, /* bitsize */
b34976b6 862 FALSE, /* pc_relative */
3765b1be
RH
863 0, /* bitpos */
864 complain_overflow_bitfield, /* complain_on_overflow */
bc1bc43f 865 bfd_elf_generic_reloc, /* special_function */
3765b1be 866 "DTPMOD64", /* name */
b34976b6 867 FALSE, /* partial_inplace */
3765b1be
RH
868 MINUS_ONE, /* src_mask */
869 MINUS_ONE, /* dst_mask */
b34976b6 870 FALSE), /* pcrel_offset */
3765b1be
RH
871
872 /* Creates a 64-bit offset in the got for the displacement
873 from DTP to the target. */
874 HOWTO (R_ALPHA_GOTDTPREL, /* type */
875 0, /* rightshift */
876 1, /* size (0 = byte, 1 = short, 2 = long) */
877 16, /* bitsize */
b34976b6 878 FALSE, /* pc_relative */
3765b1be
RH
879 0, /* bitpos */
880 complain_overflow_signed, /* complain_on_overflow */
bc1bc43f 881 bfd_elf_generic_reloc, /* special_function */
3765b1be 882 "GOTDTPREL", /* name */
b34976b6 883 FALSE, /* partial_inplace */
3765b1be
RH
884 0xffff, /* src_mask */
885 0xffff, /* dst_mask */
b34976b6 886 FALSE), /* pcrel_offset */
3765b1be
RH
887
888 /* A dynamic relocation for a displacement from DTP to the target. */
889 HOWTO (R_ALPHA_DTPREL64, /* type */
890 0, /* rightshift */
891 4, /* size (0 = byte, 1 = short, 2 = long) */
892 64, /* bitsize */
b34976b6 893 FALSE, /* pc_relative */
3765b1be
RH
894 0, /* bitpos */
895 complain_overflow_bitfield, /* complain_on_overflow */
bc1bc43f 896 bfd_elf_generic_reloc, /* special_function */
3765b1be 897 "DTPREL64", /* name */
b34976b6 898 FALSE, /* partial_inplace */
3765b1be
RH
899 MINUS_ONE, /* src_mask */
900 MINUS_ONE, /* dst_mask */
b34976b6 901 FALSE), /* pcrel_offset */
3765b1be
RH
902
903 /* The high 16 bits of the displacement from DTP to the target. */
904 HOWTO (R_ALPHA_DTPRELHI, /* type */
905 0, /* rightshift */
906 1, /* size (0 = byte, 1 = short, 2 = long) */
907 16, /* bitsize */
b34976b6 908 FALSE, /* pc_relative */
3765b1be
RH
909 0, /* bitpos */
910 complain_overflow_signed, /* complain_on_overflow */
bc1bc43f 911 bfd_elf_generic_reloc, /* special_function */
3765b1be 912 "DTPRELHI", /* name */
b34976b6 913 FALSE, /* partial_inplace */
3765b1be
RH
914 0xffff, /* src_mask */
915 0xffff, /* dst_mask */
b34976b6 916 FALSE), /* pcrel_offset */
3765b1be
RH
917
918 /* The low 16 bits of the displacement from DTP to the target. */
919 HOWTO (R_ALPHA_DTPRELLO, /* type */
920 0, /* rightshift */
921 1, /* size (0 = byte, 1 = short, 2 = long) */
922 16, /* bitsize */
b34976b6 923 FALSE, /* pc_relative */
3765b1be
RH
924 0, /* bitpos */
925 complain_overflow_dont, /* complain_on_overflow */
bc1bc43f 926 bfd_elf_generic_reloc, /* special_function */
3765b1be 927 "DTPRELLO", /* name */
b34976b6 928 FALSE, /* partial_inplace */
3765b1be
RH
929 0xffff, /* src_mask */
930 0xffff, /* dst_mask */
b34976b6 931 FALSE), /* pcrel_offset */
3765b1be
RH
932
933 /* A 16-bit displacement from DTP to the target. */
934 HOWTO (R_ALPHA_DTPREL16, /* type */
935 0, /* rightshift */
936 1, /* size (0 = byte, 1 = short, 2 = long) */
937 16, /* bitsize */
b34976b6 938 FALSE, /* pc_relative */
3765b1be
RH
939 0, /* bitpos */
940 complain_overflow_signed, /* complain_on_overflow */
bc1bc43f 941 bfd_elf_generic_reloc, /* special_function */
3765b1be 942 "DTPREL16", /* name */
b34976b6 943 FALSE, /* partial_inplace */
3765b1be
RH
944 0xffff, /* src_mask */
945 0xffff, /* dst_mask */
b34976b6 946 FALSE), /* pcrel_offset */
3765b1be
RH
947
948 /* Creates a 64-bit offset in the got for the displacement
949 from TP to the target. */
950 HOWTO (R_ALPHA_GOTTPREL, /* type */
951 0, /* rightshift */
952 1, /* size (0 = byte, 1 = short, 2 = long) */
953 16, /* bitsize */
b34976b6 954 FALSE, /* pc_relative */
3765b1be
RH
955 0, /* bitpos */
956 complain_overflow_signed, /* complain_on_overflow */
bc1bc43f 957 bfd_elf_generic_reloc, /* special_function */
3765b1be 958 "GOTTPREL", /* name */
b34976b6 959 FALSE, /* partial_inplace */
3765b1be
RH
960 0xffff, /* src_mask */
961 0xffff, /* dst_mask */
b34976b6 962 FALSE), /* pcrel_offset */
3765b1be
RH
963
964 /* A dynamic relocation for a displacement from TP to the target. */
965 HOWTO (R_ALPHA_TPREL64, /* type */
966 0, /* rightshift */
967 4, /* size (0 = byte, 1 = short, 2 = long) */
968 64, /* bitsize */
b34976b6 969 FALSE, /* pc_relative */
3765b1be
RH
970 0, /* bitpos */
971 complain_overflow_bitfield, /* complain_on_overflow */
bc1bc43f 972 bfd_elf_generic_reloc, /* special_function */
3765b1be 973 "TPREL64", /* name */
b34976b6 974 FALSE, /* partial_inplace */
3765b1be
RH
975 MINUS_ONE, /* src_mask */
976 MINUS_ONE, /* dst_mask */
b34976b6 977 FALSE), /* pcrel_offset */
3765b1be
RH
978
979 /* The high 16 bits of the displacement from TP to the target. */
980 HOWTO (R_ALPHA_TPRELHI, /* type */
981 0, /* rightshift */
982 1, /* size (0 = byte, 1 = short, 2 = long) */
983 16, /* bitsize */
b34976b6 984 FALSE, /* pc_relative */
3765b1be
RH
985 0, /* bitpos */
986 complain_overflow_signed, /* complain_on_overflow */
bc1bc43f 987 bfd_elf_generic_reloc, /* special_function */
3765b1be 988 "TPRELHI", /* name */
b34976b6 989 FALSE, /* partial_inplace */
3765b1be
RH
990 0xffff, /* src_mask */
991 0xffff, /* dst_mask */
b34976b6 992 FALSE), /* pcrel_offset */
3765b1be
RH
993
994 /* The low 16 bits of the displacement from TP to the target. */
995 HOWTO (R_ALPHA_TPRELLO, /* type */
996 0, /* rightshift */
997 1, /* size (0 = byte, 1 = short, 2 = long) */
998 16, /* bitsize */
b34976b6 999 FALSE, /* pc_relative */
3765b1be
RH
1000 0, /* bitpos */
1001 complain_overflow_dont, /* complain_on_overflow */
bc1bc43f 1002 bfd_elf_generic_reloc, /* special_function */
3765b1be 1003 "TPRELLO", /* name */
b34976b6 1004 FALSE, /* partial_inplace */
3765b1be
RH
1005 0xffff, /* src_mask */
1006 0xffff, /* dst_mask */
b34976b6 1007 FALSE), /* pcrel_offset */
3765b1be
RH
1008
1009 /* A 16-bit displacement from TP to the target. */
1010 HOWTO (R_ALPHA_TPREL16, /* type */
1011 0, /* rightshift */
1012 1, /* size (0 = byte, 1 = short, 2 = long) */
1013 16, /* bitsize */
b34976b6 1014 FALSE, /* pc_relative */
3765b1be
RH
1015 0, /* bitpos */
1016 complain_overflow_signed, /* complain_on_overflow */
bc1bc43f 1017 bfd_elf_generic_reloc, /* special_function */
3765b1be 1018 "TPREL16", /* name */
b34976b6 1019 FALSE, /* partial_inplace */
3765b1be
RH
1020 0xffff, /* src_mask */
1021 0xffff, /* dst_mask */
b34976b6 1022 FALSE), /* pcrel_offset */
252b5132
RH
1023};
1024
252b5132
RH
1025/* A mapping from BFD reloc types to Alpha ELF reloc types. */
1026
1027struct elf_reloc_map
1028{
1029 bfd_reloc_code_real_type bfd_reloc_val;
1030 int elf_reloc_val;
1031};
1032
1033static const struct elf_reloc_map elf64_alpha_reloc_map[] =
1034{
dfe57ca0
RH
1035 {BFD_RELOC_NONE, R_ALPHA_NONE},
1036 {BFD_RELOC_32, R_ALPHA_REFLONG},
1037 {BFD_RELOC_64, R_ALPHA_REFQUAD},
1038 {BFD_RELOC_CTOR, R_ALPHA_REFQUAD},
1039 {BFD_RELOC_GPREL32, R_ALPHA_GPREL32},
1040 {BFD_RELOC_ALPHA_ELF_LITERAL, R_ALPHA_LITERAL},
1041 {BFD_RELOC_ALPHA_LITUSE, R_ALPHA_LITUSE},
1042 {BFD_RELOC_ALPHA_GPDISP, R_ALPHA_GPDISP},
1043 {BFD_RELOC_23_PCREL_S2, R_ALPHA_BRADDR},
1044 {BFD_RELOC_ALPHA_HINT, R_ALPHA_HINT},
1045 {BFD_RELOC_16_PCREL, R_ALPHA_SREL16},
1046 {BFD_RELOC_32_PCREL, R_ALPHA_SREL32},
1047 {BFD_RELOC_64_PCREL, R_ALPHA_SREL64},
1048 {BFD_RELOC_ALPHA_GPREL_HI16, R_ALPHA_GPRELHIGH},
1049 {BFD_RELOC_ALPHA_GPREL_LO16, R_ALPHA_GPRELLOW},
1050 {BFD_RELOC_GPREL16, R_ALPHA_GPREL16},
7793f4d0 1051 {BFD_RELOC_ALPHA_BRSGP, R_ALPHA_BRSGP},
3765b1be
RH
1052 {BFD_RELOC_ALPHA_TLSGD, R_ALPHA_TLSGD},
1053 {BFD_RELOC_ALPHA_TLSLDM, R_ALPHA_TLSLDM},
1054 {BFD_RELOC_ALPHA_DTPMOD64, R_ALPHA_DTPMOD64},
1055 {BFD_RELOC_ALPHA_GOTDTPREL16, R_ALPHA_GOTDTPREL},
1056 {BFD_RELOC_ALPHA_DTPREL64, R_ALPHA_DTPREL64},
1057 {BFD_RELOC_ALPHA_DTPREL_HI16, R_ALPHA_DTPRELHI},
1058 {BFD_RELOC_ALPHA_DTPREL_LO16, R_ALPHA_DTPRELLO},
1059 {BFD_RELOC_ALPHA_DTPREL16, R_ALPHA_DTPREL16},
1060 {BFD_RELOC_ALPHA_GOTTPREL16, R_ALPHA_GOTTPREL},
1061 {BFD_RELOC_ALPHA_TPREL64, R_ALPHA_TPREL64},
1062 {BFD_RELOC_ALPHA_TPREL_HI16, R_ALPHA_TPRELHI},
1063 {BFD_RELOC_ALPHA_TPREL_LO16, R_ALPHA_TPRELLO},
1064 {BFD_RELOC_ALPHA_TPREL16, R_ALPHA_TPREL16},
252b5132
RH
1065};
1066
1067/* Given a BFD reloc type, return a HOWTO structure. */
1068
1069static reloc_howto_type *
a7519a3c
RH
1070elf64_alpha_bfd_reloc_type_lookup (bfd *abfd ATTRIBUTE_UNUSED,
1071 bfd_reloc_code_real_type code)
252b5132
RH
1072{
1073 const struct elf_reloc_map *i, *e;
1074 i = e = elf64_alpha_reloc_map;
1075 e += sizeof (elf64_alpha_reloc_map) / sizeof (struct elf_reloc_map);
1076 for (; i != e; ++i)
1077 {
1078 if (i->bfd_reloc_val == code)
1079 return &elf64_alpha_howto_table[i->elf_reloc_val];
1080 }
1081 return 0;
1082}
1083
157090f7
AM
1084static reloc_howto_type *
1085elf64_alpha_bfd_reloc_name_lookup (bfd *abfd ATTRIBUTE_UNUSED,
1086 const char *r_name)
1087{
1088 unsigned int i;
1089
1090 for (i = 0;
1091 i < (sizeof (elf64_alpha_howto_table)
1092 / sizeof (elf64_alpha_howto_table[0]));
1093 i++)
1094 if (elf64_alpha_howto_table[i].name != NULL
1095 && strcasecmp (elf64_alpha_howto_table[i].name, r_name) == 0)
1096 return &elf64_alpha_howto_table[i];
1097
1098 return NULL;
1099}
1100
252b5132
RH
1101/* Given an Alpha ELF reloc type, fill in an arelent structure. */
1102
1103static void
a7519a3c
RH
1104elf64_alpha_info_to_howto (bfd *abfd ATTRIBUTE_UNUSED, arelent *cache_ptr,
1105 Elf_Internal_Rela *dst)
252b5132 1106{
a7519a3c 1107 unsigned r_type = ELF64_R_TYPE(dst->r_info);
cd21f5da
NC
1108
1109 if (r_type >= R_ALPHA_max)
1110 {
64d29018 1111 (*_bfd_error_handler) (_("%B: unrecognised Alpha reloc number: %d"),
cd21f5da
NC
1112 abfd, r_type);
1113 bfd_set_error (bfd_error_bad_value);
1114 r_type = R_ALPHA_NONE;
1115 }
252b5132
RH
1116 cache_ptr->howto = &elf64_alpha_howto_table[r_type];
1117}
3765b1be
RH
1118
1119/* These two relocations create a two-word entry in the got. */
1120#define alpha_got_entry_size(r_type) \
1121 (r_type == R_ALPHA_TLSGD || r_type == R_ALPHA_TLSLDM ? 16 : 8)
9e756d64
RH
1122
1123/* This is PT_TLS segment p_vaddr. */
e1918d23
AM
1124#define alpha_get_dtprel_base(info) \
1125 (elf_hash_table (info)->tls_sec->vma)
9e756d64
RH
1126
1127/* Main program TLS (whose template starts at PT_TLS p_vaddr)
1128 is assigned offset round(16, PT_TLS p_align). */
e1918d23
AM
1129#define alpha_get_tprel_base(info) \
1130 (elf_hash_table (info)->tls_sec->vma \
1131 - align_power ((bfd_vma) 16, \
1132 elf_hash_table (info)->tls_sec->alignment_power))
252b5132 1133\f
a7519a3c
RH
1134/* Handle an Alpha specific section when reading an object file. This
1135 is called when bfd_section_from_shdr finds a section with an unknown
1136 type.
1137 FIXME: We need to handle the SHF_ALPHA_GPREL flag, but I'm not sure
1138 how to. */
252b5132 1139
a7519a3c
RH
1140static bfd_boolean
1141elf64_alpha_section_from_shdr (bfd *abfd,
1142 Elf_Internal_Shdr *hdr,
1143 const char *name,
1144 int shindex)
252b5132 1145{
a7519a3c
RH
1146 asection *newsect;
1147
1148 /* There ought to be a place to keep ELF backend specific flags, but
1149 at the moment there isn't one. We just keep track of the
1150 sections by their name, instead. Fortunately, the ABI gives
1151 suggested names for all the MIPS specific sections, so we will
1152 probably get away with this. */
1153 switch (hdr->sh_type)
1154 {
1155 case SHT_ALPHA_DEBUG:
1156 if (strcmp (name, ".mdebug") != 0)
1157 return FALSE;
1158 break;
1159 default:
1160 return FALSE;
1161 }
252b5132 1162
a7519a3c
RH
1163 if (! _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex))
1164 return FALSE;
1165 newsect = hdr->bfd_section;
252b5132 1166
a7519a3c 1167 if (hdr->sh_type == SHT_ALPHA_DEBUG)
252b5132 1168 {
a7519a3c
RH
1169 if (! bfd_set_section_flags (abfd, newsect,
1170 (bfd_get_section_flags (abfd, newsect)
1171 | SEC_DEBUGGING)))
1172 return FALSE;
252b5132 1173 }
a7519a3c
RH
1174
1175 return TRUE;
252b5132
RH
1176}
1177
a7519a3c
RH
1178/* Convert Alpha specific section flags to bfd internal section flags. */
1179
b34976b6 1180static bfd_boolean
a7519a3c 1181elf64_alpha_section_flags (flagword *flags, const Elf_Internal_Shdr *hdr)
252b5132 1182{
a7519a3c
RH
1183 if (hdr->sh_flags & SHF_ALPHA_GPREL)
1184 *flags |= SEC_SMALL_DATA;
252b5132 1185
a7519a3c
RH
1186 return TRUE;
1187}
252b5132 1188
a7519a3c
RH
1189/* Set the correct type for an Alpha ELF section. We do this by the
1190 section name, which is a hack, but ought to work. */
9e756d64 1191
a7519a3c
RH
1192static bfd_boolean
1193elf64_alpha_fake_sections (bfd *abfd, Elf_Internal_Shdr *hdr, asection *sec)
1194{
1195 register const char *name;
1196
1197 name = bfd_get_section_name (abfd, sec);
1198
1199 if (strcmp (name, ".mdebug") == 0)
252b5132 1200 {
a7519a3c
RH
1201 hdr->sh_type = SHT_ALPHA_DEBUG;
1202 /* In a shared object on Irix 5.3, the .mdebug section has an
1203 entsize of 0. FIXME: Does this matter? */
1204 if ((abfd->flags & DYNAMIC) != 0 )
1205 hdr->sh_entsize = 0;
1206 else
1207 hdr->sh_entsize = 1;
252b5132 1208 }
a7519a3c
RH
1209 else if ((sec->flags & SEC_SMALL_DATA)
1210 || strcmp (name, ".sdata") == 0
1211 || strcmp (name, ".sbss") == 0
1212 || strcmp (name, ".lit4") == 0
1213 || strcmp (name, ".lit8") == 0)
1214 hdr->sh_flags |= SHF_ALPHA_GPREL;
252b5132 1215
a7519a3c
RH
1216 return TRUE;
1217}
252b5132 1218
a7519a3c
RH
1219/* Hook called by the linker routine which adds symbols from an object
1220 file. We use it to put .comm items in .sbss, and not .bss. */
1221
1222static bfd_boolean
1223elf64_alpha_add_symbol_hook (bfd *abfd, struct bfd_link_info *info,
1224 Elf_Internal_Sym *sym,
1225 const char **namep ATTRIBUTE_UNUSED,
1226 flagword *flagsp ATTRIBUTE_UNUSED,
1227 asection **secp, bfd_vma *valp)
1228{
1229 if (sym->st_shndx == SHN_COMMON
0e1862bb 1230 && !bfd_link_relocatable (info)
a7519a3c 1231 && sym->st_size <= elf_gp_size (abfd))
252b5132 1232 {
a7519a3c
RH
1233 /* Common symbols less than or equal to -G nn bytes are
1234 automatically put into .sbss. */
ffcb7aff 1235
a7519a3c 1236 asection *scomm = bfd_get_section_by_name (abfd, ".scommon");
252b5132 1237
a7519a3c 1238 if (scomm == NULL)
252b5132 1239 {
a7519a3c
RH
1240 scomm = bfd_make_section_with_flags (abfd, ".scommon",
1241 (SEC_ALLOC
1242 | SEC_IS_COMMON
1243 | SEC_LINKER_CREATED));
1244 if (scomm == NULL)
1245 return FALSE;
1246 }
ffcb7aff 1247
a7519a3c
RH
1248 *secp = scomm;
1249 *valp = sym->st_size;
1250 }
ffcb7aff 1251
a7519a3c
RH
1252 return TRUE;
1253}
252b5132 1254
a7519a3c 1255/* Create the .got section. */
252b5132 1256
a7519a3c
RH
1257static bfd_boolean
1258elf64_alpha_create_got_section (bfd *abfd,
1259 struct bfd_link_info *info ATTRIBUTE_UNUSED)
1260{
85d162e6 1261 flagword flags;
a7519a3c 1262 asection *s;
252b5132 1263
0ffa91dd
NC
1264 if (! is_alpha_elf (abfd))
1265 return FALSE;
1266
85d162e6
AM
1267 flags = (SEC_ALLOC | SEC_LOAD | SEC_HAS_CONTENTS | SEC_IN_MEMORY
1268 | SEC_LINKER_CREATED);
1269 s = bfd_make_section_anyway_with_flags (abfd, ".got", flags);
a7519a3c
RH
1270 if (s == NULL
1271 || !bfd_set_section_alignment (abfd, s, 3))
1272 return FALSE;
252b5132 1273
a7519a3c 1274 alpha_elf_tdata (abfd)->got = s;
252b5132 1275
85d162e6
AM
1276 /* Make sure the object's gotobj is set to itself so that we default
1277 to every object with its own .got. We'll merge .gots later once
1278 we've collected each object's info. */
1279 alpha_elf_tdata (abfd)->gotobj = abfd;
1280
a7519a3c
RH
1281 return TRUE;
1282}
252b5132 1283
a7519a3c 1284/* Create all the dynamic sections. */
252b5132 1285
a7519a3c
RH
1286static bfd_boolean
1287elf64_alpha_create_dynamic_sections (bfd *abfd, struct bfd_link_info *info)
1288{
1289 asection *s;
85d162e6 1290 flagword flags;
a7519a3c 1291 struct elf_link_hash_entry *h;
252b5132 1292
0ffa91dd
NC
1293 if (! is_alpha_elf (abfd))
1294 return FALSE;
1295
a7519a3c 1296 /* We need to create .plt, .rela.plt, .got, and .rela.got sections. */
252b5132 1297
85d162e6
AM
1298 flags = (SEC_ALLOC | SEC_LOAD | SEC_CODE | SEC_HAS_CONTENTS | SEC_IN_MEMORY
1299 | SEC_LINKER_CREATED
1300 | (elf64_alpha_use_secureplt ? SEC_READONLY : 0));
1301 s = bfd_make_section_anyway_with_flags (abfd, ".plt", flags);
6ec7057a 1302 if (s == NULL || ! bfd_set_section_alignment (abfd, s, 4))
a7519a3c 1303 return FALSE;
252b5132 1304
a7519a3c
RH
1305 /* Define the symbol _PROCEDURE_LINKAGE_TABLE_ at the start of the
1306 .plt section. */
7325306f
RS
1307 h = _bfd_elf_define_linkage_sym (abfd, info, s,
1308 "_PROCEDURE_LINKAGE_TABLE_");
1309 elf_hash_table (info)->hplt = h;
1310 if (h == NULL)
a7519a3c 1311 return FALSE;
d6ad34f6 1312
85d162e6
AM
1313 flags = (SEC_ALLOC | SEC_LOAD | SEC_HAS_CONTENTS | SEC_IN_MEMORY
1314 | SEC_LINKER_CREATED | SEC_READONLY);
1315 s = bfd_make_section_anyway_with_flags (abfd, ".rela.plt", flags);
6ec7057a 1316 if (s == NULL || ! bfd_set_section_alignment (abfd, s, 3))
a7519a3c 1317 return FALSE;
252b5132 1318
6ec7057a
RH
1319 if (elf64_alpha_use_secureplt)
1320 {
85d162e6
AM
1321 flags = SEC_ALLOC | SEC_LINKER_CREATED;
1322 s = bfd_make_section_anyway_with_flags (abfd, ".got.plt", flags);
6ec7057a
RH
1323 if (s == NULL || ! bfd_set_section_alignment (abfd, s, 3))
1324 return FALSE;
1325 }
1326
a7519a3c
RH
1327 /* We may or may not have created a .got section for this object, but
1328 we definitely havn't done the rest of the work. */
1cd6895c 1329
85d162e6
AM
1330 if (alpha_elf_tdata(abfd)->gotobj == NULL)
1331 {
1332 if (!elf64_alpha_create_got_section (abfd, info))
1333 return FALSE;
1334 }
1cd6895c 1335
85d162e6
AM
1336 flags = (SEC_ALLOC | SEC_LOAD | SEC_HAS_CONTENTS | SEC_IN_MEMORY
1337 | SEC_LINKER_CREATED | SEC_READONLY);
1338 s = bfd_make_section_anyway_with_flags (abfd, ".rela.got", flags);
a7519a3c
RH
1339 if (s == NULL
1340 || !bfd_set_section_alignment (abfd, s, 3))
1341 return FALSE;
252b5132 1342
a7519a3c
RH
1343 /* Define the symbol _GLOBAL_OFFSET_TABLE_ at the start of the
1344 dynobj's .got section. We don't do this in the linker script
1345 because we don't want to define the symbol if we are not creating
1346 a global offset table. */
d98685ac
AM
1347 h = _bfd_elf_define_linkage_sym (abfd, info, alpha_elf_tdata(abfd)->got,
1348 "_GLOBAL_OFFSET_TABLE_");
a7519a3c 1349 elf_hash_table (info)->hgot = h;
d98685ac
AM
1350 if (h == NULL)
1351 return FALSE;
252b5132 1352
a7519a3c 1353 return TRUE;
252b5132 1354}
a7519a3c
RH
1355\f
1356/* Read ECOFF debugging information from a .mdebug section into a
1357 ecoff_debug_info structure. */
252b5132 1358
a7519a3c
RH
1359static bfd_boolean
1360elf64_alpha_read_ecoff_info (bfd *abfd, asection *section,
1361 struct ecoff_debug_info *debug)
252b5132 1362{
a7519a3c
RH
1363 HDRR *symhdr;
1364 const struct ecoff_debug_swap *swap;
1365 char *ext_hdr = NULL;
252b5132 1366
a7519a3c
RH
1367 swap = get_elf_backend_data (abfd)->elf_backend_ecoff_debug_swap;
1368 memset (debug, 0, sizeof (*debug));
252b5132 1369
a7519a3c
RH
1370 ext_hdr = (char *) bfd_malloc (swap->external_hdr_size);
1371 if (ext_hdr == NULL && swap->external_hdr_size != 0)
1372 goto error_return;
252b5132 1373
a7519a3c
RH
1374 if (! bfd_get_section_contents (abfd, section, ext_hdr, (file_ptr) 0,
1375 swap->external_hdr_size))
1376 goto error_return;
252b5132 1377
a7519a3c
RH
1378 symhdr = &debug->symbolic_header;
1379 (*swap->swap_hdr_in) (abfd, ext_hdr, symhdr);
252b5132 1380
a7519a3c
RH
1381 /* The symbolic header contains absolute file offsets and sizes to
1382 read. */
1383#define READ(ptr, offset, count, size, type) \
1384 if (symhdr->count == 0) \
1385 debug->ptr = NULL; \
1386 else \
1387 { \
1388 bfd_size_type amt = (bfd_size_type) size * symhdr->count; \
1389 debug->ptr = (type) bfd_malloc (amt); \
1390 if (debug->ptr == NULL) \
1391 goto error_return; \
1392 if (bfd_seek (abfd, (file_ptr) symhdr->offset, SEEK_SET) != 0 \
1393 || bfd_bread (debug->ptr, amt, abfd) != amt) \
1394 goto error_return; \
1395 }
fe8bc63d 1396
a7519a3c 1397 READ (line, cbLineOffset, cbLine, sizeof (unsigned char), unsigned char *);
2c3fc389
NC
1398 READ (external_dnr, cbDnOffset, idnMax, swap->external_dnr_size, void *);
1399 READ (external_pdr, cbPdOffset, ipdMax, swap->external_pdr_size, void *);
1400 READ (external_sym, cbSymOffset, isymMax, swap->external_sym_size, void *);
1401 READ (external_opt, cbOptOffset, ioptMax, swap->external_opt_size, void *);
a7519a3c
RH
1402 READ (external_aux, cbAuxOffset, iauxMax, sizeof (union aux_ext),
1403 union aux_ext *);
1404 READ (ss, cbSsOffset, issMax, sizeof (char), char *);
1405 READ (ssext, cbSsExtOffset, issExtMax, sizeof (char), char *);
2c3fc389
NC
1406 READ (external_fdr, cbFdOffset, ifdMax, swap->external_fdr_size, void *);
1407 READ (external_rfd, cbRfdOffset, crfd, swap->external_rfd_size, void *);
1408 READ (external_ext, cbExtOffset, iextMax, swap->external_ext_size, void *);
a7519a3c 1409#undef READ
252b5132 1410
a7519a3c 1411 debug->fdr = NULL;
252b5132 1412
a7519a3c 1413 return TRUE;
252b5132 1414
a7519a3c
RH
1415 error_return:
1416 if (ext_hdr != NULL)
1417 free (ext_hdr);
1418 if (debug->line != NULL)
1419 free (debug->line);
1420 if (debug->external_dnr != NULL)
1421 free (debug->external_dnr);
1422 if (debug->external_pdr != NULL)
1423 free (debug->external_pdr);
1424 if (debug->external_sym != NULL)
1425 free (debug->external_sym);
1426 if (debug->external_opt != NULL)
1427 free (debug->external_opt);
1428 if (debug->external_aux != NULL)
1429 free (debug->external_aux);
1430 if (debug->ss != NULL)
1431 free (debug->ss);
1432 if (debug->ssext != NULL)
1433 free (debug->ssext);
1434 if (debug->external_fdr != NULL)
1435 free (debug->external_fdr);
1436 if (debug->external_rfd != NULL)
1437 free (debug->external_rfd);
1438 if (debug->external_ext != NULL)
1439 free (debug->external_ext);
1440 return FALSE;
252b5132
RH
1441}
1442
a7519a3c
RH
1443/* Alpha ELF local labels start with '$'. */
1444
b34976b6 1445static bfd_boolean
a7519a3c 1446elf64_alpha_is_local_label_name (bfd *abfd ATTRIBUTE_UNUSED, const char *name)
252b5132 1447{
a7519a3c
RH
1448 return name[0] == '$';
1449}
9e756d64 1450
a7519a3c 1451static bfd_boolean
fb167eb2
AM
1452elf64_alpha_find_nearest_line (bfd *abfd, asymbol **symbols,
1453 asection *section, bfd_vma offset,
1454 const char **filename_ptr,
a7519a3c 1455 const char **functionname_ptr,
fb167eb2
AM
1456 unsigned int *line_ptr,
1457 unsigned int *discriminator_ptr)
a7519a3c
RH
1458{
1459 asection *msec;
252b5132 1460
fb167eb2 1461 if (_bfd_dwarf2_find_nearest_line (abfd, symbols, NULL, section, offset,
a7519a3c 1462 filename_ptr, functionname_ptr,
fb167eb2
AM
1463 line_ptr, discriminator_ptr,
1464 dwarf_debug_sections, 0,
a7519a3c 1465 &elf_tdata (abfd)->dwarf2_find_line_info))
b34976b6 1466 return TRUE;
9e756d64 1467
a7519a3c
RH
1468 msec = bfd_get_section_by_name (abfd, ".mdebug");
1469 if (msec != NULL)
1bbc9cec 1470 {
a7519a3c 1471 flagword origflags;
698600e4 1472 struct alpha_elf_find_line *fi;
a7519a3c
RH
1473 const struct ecoff_debug_swap * const swap =
1474 get_elf_backend_data (abfd)->elf_backend_ecoff_debug_swap;
252b5132 1475
a7519a3c
RH
1476 /* If we are called during a link, alpha_elf_final_link may have
1477 cleared the SEC_HAS_CONTENTS field. We force it back on here
1478 if appropriate (which it normally will be). */
1479 origflags = msec->flags;
1480 if (elf_section_data (msec)->this_hdr.sh_type != SHT_NOBITS)
1481 msec->flags |= SEC_HAS_CONTENTS;
9e756d64 1482
698600e4 1483 fi = alpha_elf_tdata (abfd)->find_line_info;
a7519a3c
RH
1484 if (fi == NULL)
1485 {
1486 bfd_size_type external_fdr_size;
1487 char *fraw_src;
1488 char *fraw_end;
1489 struct fdr *fdr_ptr;
698600e4 1490 bfd_size_type amt = sizeof (struct alpha_elf_find_line);
9e756d64 1491
698600e4 1492 fi = (struct alpha_elf_find_line *) bfd_zalloc (abfd, amt);
a7519a3c
RH
1493 if (fi == NULL)
1494 {
1495 msec->flags = origflags;
1496 return FALSE;
1497 }
9e756d64 1498
a7519a3c
RH
1499 if (!elf64_alpha_read_ecoff_info (abfd, msec, &fi->d))
1500 {
1501 msec->flags = origflags;
1502 return FALSE;
1503 }
9e756d64 1504
a7519a3c
RH
1505 /* Swap in the FDR information. */
1506 amt = fi->d.symbolic_header.ifdMax * sizeof (struct fdr);
1507 fi->d.fdr = (struct fdr *) bfd_alloc (abfd, amt);
1508 if (fi->d.fdr == NULL)
1509 {
1510 msec->flags = origflags;
1511 return FALSE;
1512 }
1513 external_fdr_size = swap->external_fdr_size;
1514 fdr_ptr = fi->d.fdr;
1515 fraw_src = (char *) fi->d.external_fdr;
1516 fraw_end = (fraw_src
1517 + fi->d.symbolic_header.ifdMax * external_fdr_size);
1518 for (; fraw_src < fraw_end; fraw_src += external_fdr_size, fdr_ptr++)
2c3fc389 1519 (*swap->swap_fdr_in) (abfd, fraw_src, fdr_ptr);
9e756d64 1520
698600e4 1521 alpha_elf_tdata (abfd)->find_line_info = fi;
9e756d64 1522
a7519a3c
RH
1523 /* Note that we don't bother to ever free this information.
1524 find_nearest_line is either called all the time, as in
1525 objdump -l, so the information should be saved, or it is
1526 rarely called, as in ld error messages, so the memory
1527 wasted is unimportant. Still, it would probably be a
1528 good idea for free_cached_info to throw it away. */
1529 }
9e756d64 1530
a7519a3c
RH
1531 if (_bfd_ecoff_locate_line (abfd, section, offset, &fi->d, swap,
1532 &fi->i, filename_ptr, functionname_ptr,
1533 line_ptr))
1534 {
1535 msec->flags = origflags;
1536 return TRUE;
1537 }
9e756d64 1538
a7519a3c 1539 msec->flags = origflags;
9e756d64 1540 }
9e756d64 1541
a7519a3c 1542 /* Fall back on the generic ELF find_nearest_line routine. */
9e756d64 1543
fb167eb2 1544 return _bfd_elf_find_nearest_line (abfd, symbols, section, offset,
a7519a3c 1545 filename_ptr, functionname_ptr,
fb167eb2 1546 line_ptr, discriminator_ptr);
9e756d64 1547}
a7519a3c
RH
1548\f
1549/* Structure used to pass information to alpha_elf_output_extsym. */
9e756d64 1550
a7519a3c 1551struct extsym_info
9e756d64 1552{
a7519a3c
RH
1553 bfd *abfd;
1554 struct bfd_link_info *info;
1555 struct ecoff_debug_info *debug;
1556 const struct ecoff_debug_swap *swap;
1557 bfd_boolean failed;
1558};
9e756d64 1559
a7519a3c 1560static bfd_boolean
2c3fc389 1561elf64_alpha_output_extsym (struct alpha_elf_link_hash_entry *h, void * data)
a7519a3c
RH
1562{
1563 struct extsym_info *einfo = (struct extsym_info *) data;
1564 bfd_boolean strip;
1565 asection *sec, *output_section;
9e756d64 1566
a7519a3c
RH
1567 if (h->root.indx == -2)
1568 strip = FALSE;
1569 else if ((h->root.def_dynamic
1570 || h->root.ref_dynamic
1571 || h->root.root.type == bfd_link_hash_new)
1572 && !h->root.def_regular
1573 && !h->root.ref_regular)
1574 strip = TRUE;
1575 else if (einfo->info->strip == strip_all
1576 || (einfo->info->strip == strip_some
1577 && bfd_hash_lookup (einfo->info->keep_hash,
1578 h->root.root.root.string,
1579 FALSE, FALSE) == NULL))
1580 strip = TRUE;
1581 else
1582 strip = FALSE;
9e756d64 1583
a7519a3c 1584 if (strip)
b34976b6 1585 return TRUE;
9e756d64 1586
a7519a3c 1587 if (h->esym.ifd == -2)
9e756d64 1588 {
a7519a3c
RH
1589 h->esym.jmptbl = 0;
1590 h->esym.cobol_main = 0;
1591 h->esym.weakext = 0;
1592 h->esym.reserved = 0;
1593 h->esym.ifd = ifdNil;
1594 h->esym.asym.value = 0;
1595 h->esym.asym.st = stGlobal;
9e756d64 1596
a7519a3c
RH
1597 if (h->root.root.type != bfd_link_hash_defined
1598 && h->root.root.type != bfd_link_hash_defweak)
1599 h->esym.asym.sc = scAbs;
1600 else
1601 {
1602 const char *name;
9e756d64 1603
a7519a3c
RH
1604 sec = h->root.root.u.def.section;
1605 output_section = sec->output_section;
9e756d64 1606
a7519a3c
RH
1607 /* When making a shared library and symbol h is the one from
1608 the another shared library, OUTPUT_SECTION may be null. */
1609 if (output_section == NULL)
1610 h->esym.asym.sc = scUndefined;
1611 else
1612 {
1613 name = bfd_section_name (output_section->owner, output_section);
9e756d64 1614
a7519a3c
RH
1615 if (strcmp (name, ".text") == 0)
1616 h->esym.asym.sc = scText;
1617 else if (strcmp (name, ".data") == 0)
1618 h->esym.asym.sc = scData;
1619 else if (strcmp (name, ".sdata") == 0)
1620 h->esym.asym.sc = scSData;
1621 else if (strcmp (name, ".rodata") == 0
1622 || strcmp (name, ".rdata") == 0)
1623 h->esym.asym.sc = scRData;
1624 else if (strcmp (name, ".bss") == 0)
1625 h->esym.asym.sc = scBss;
1626 else if (strcmp (name, ".sbss") == 0)
1627 h->esym.asym.sc = scSBss;
1628 else if (strcmp (name, ".init") == 0)
1629 h->esym.asym.sc = scInit;
1630 else if (strcmp (name, ".fini") == 0)
1631 h->esym.asym.sc = scFini;
1632 else
1633 h->esym.asym.sc = scAbs;
1634 }
1635 }
9e756d64 1636
a7519a3c
RH
1637 h->esym.asym.reserved = 0;
1638 h->esym.asym.index = indexNil;
1639 }
9e756d64 1640
a7519a3c
RH
1641 if (h->root.root.type == bfd_link_hash_common)
1642 h->esym.asym.value = h->root.root.u.c.size;
1643 else if (h->root.root.type == bfd_link_hash_defined
1644 || h->root.root.type == bfd_link_hash_defweak)
1645 {
1646 if (h->esym.asym.sc == scCommon)
1647 h->esym.asym.sc = scBss;
1648 else if (h->esym.asym.sc == scSCommon)
1649 h->esym.asym.sc = scSBss;
9e756d64 1650
a7519a3c
RH
1651 sec = h->root.root.u.def.section;
1652 output_section = sec->output_section;
1653 if (output_section != NULL)
1654 h->esym.asym.value = (h->root.root.u.def.value
1655 + sec->output_offset
1656 + output_section->vma);
1657 else
1658 h->esym.asym.value = 0;
1659 }
9e756d64 1660
a7519a3c
RH
1661 if (! bfd_ecoff_debug_one_external (einfo->abfd, einfo->debug, einfo->swap,
1662 h->root.root.root.string,
1663 &h->esym))
1664 {
1665 einfo->failed = TRUE;
1666 return FALSE;
9e756d64
RH
1667 }
1668
a7519a3c
RH
1669 return TRUE;
1670}
1671\f
1672/* Search for and possibly create a got entry. */
9e756d64 1673
a7519a3c
RH
1674static struct alpha_elf_got_entry *
1675get_got_entry (bfd *abfd, struct alpha_elf_link_hash_entry *h,
1676 unsigned long r_type, unsigned long r_symndx,
1677 bfd_vma r_addend)
1678{
1679 struct alpha_elf_got_entry *gotent;
1680 struct alpha_elf_got_entry **slot;
9e756d64 1681
a7519a3c
RH
1682 if (h)
1683 slot = &h->got_entries;
1684 else
1685 {
1686 /* This is a local .got entry -- record for merge. */
9e756d64 1687
a7519a3c 1688 struct alpha_elf_got_entry **local_got_entries;
9e756d64 1689
a7519a3c
RH
1690 local_got_entries = alpha_elf_tdata(abfd)->local_got_entries;
1691 if (!local_got_entries)
1692 {
1693 bfd_size_type size;
1694 Elf_Internal_Shdr *symtab_hdr;
9e756d64 1695
a7519a3c
RH
1696 symtab_hdr = &elf_tdata(abfd)->symtab_hdr;
1697 size = symtab_hdr->sh_info;
1698 size *= sizeof (struct alpha_elf_got_entry *);
9e756d64 1699
a7519a3c
RH
1700 local_got_entries
1701 = (struct alpha_elf_got_entry **) bfd_zalloc (abfd, size);
1702 if (!local_got_entries)
1703 return NULL;
1704
1705 alpha_elf_tdata (abfd)->local_got_entries = local_got_entries;
1706 }
1707
1708 slot = &local_got_entries[r_symndx];
9e756d64
RH
1709 }
1710
a7519a3c
RH
1711 for (gotent = *slot; gotent ; gotent = gotent->next)
1712 if (gotent->gotobj == abfd
1713 && gotent->reloc_type == r_type
1714 && gotent->addend == r_addend)
1715 break;
1716
1717 if (!gotent)
9e756d64 1718 {
a7519a3c
RH
1719 int entry_size;
1720 bfd_size_type amt;
9e756d64 1721
a7519a3c
RH
1722 amt = sizeof (struct alpha_elf_got_entry);
1723 gotent = (struct alpha_elf_got_entry *) bfd_alloc (abfd, amt);
1724 if (!gotent)
1725 return NULL;
9e756d64 1726
a7519a3c
RH
1727 gotent->gotobj = abfd;
1728 gotent->addend = r_addend;
1729 gotent->got_offset = -1;
6ec7057a 1730 gotent->plt_offset = -1;
a7519a3c
RH
1731 gotent->use_count = 1;
1732 gotent->reloc_type = r_type;
1733 gotent->reloc_done = 0;
1734 gotent->reloc_xlated = 0;
9e756d64 1735
a7519a3c
RH
1736 gotent->next = *slot;
1737 *slot = gotent;
9e756d64 1738
a7519a3c
RH
1739 entry_size = alpha_got_entry_size (r_type);
1740 alpha_elf_tdata (abfd)->total_got_size += entry_size;
1741 if (!h)
1742 alpha_elf_tdata(abfd)->local_got_size += entry_size;
9e756d64 1743 }
a7519a3c
RH
1744 else
1745 gotent->use_count += 1;
9e756d64 1746
a7519a3c 1747 return gotent;
9e756d64
RH
1748}
1749
6ec7057a
RH
1750static bfd_boolean
1751elf64_alpha_want_plt (struct alpha_elf_link_hash_entry *ah)
1752{
1753 return ((ah->root.type == STT_FUNC
1754 || ah->root.root.type == bfd_link_hash_undefweak
1755 || ah->root.root.type == bfd_link_hash_undefined)
8288a39e
RH
1756 && (ah->flags & ALPHA_ELF_LINK_HASH_LU_PLT) != 0
1757 && (ah->flags & ~ALPHA_ELF_LINK_HASH_LU_PLT) == 0);
6ec7057a
RH
1758}
1759
a7519a3c
RH
1760/* Handle dynamic relocations when doing an Alpha ELF link. */
1761
b34976b6 1762static bfd_boolean
a7519a3c
RH
1763elf64_alpha_check_relocs (bfd *abfd, struct bfd_link_info *info,
1764 asection *sec, const Elf_Internal_Rela *relocs)
252b5132 1765{
a7519a3c
RH
1766 bfd *dynobj;
1767 asection *sreloc;
252b5132 1768 Elf_Internal_Shdr *symtab_hdr;
a7519a3c
RH
1769 struct alpha_elf_link_hash_entry **sym_hashes;
1770 const Elf_Internal_Rela *rel, *relend;
a7519a3c 1771 bfd_size_type amt;
252b5132 1772
0e1862bb 1773 if (bfd_link_relocatable (info))
a7519a3c 1774 return TRUE;
252b5132 1775
a7519a3c
RH
1776 /* Don't do anything special with non-loaded, non-alloced sections.
1777 In particular, any relocs in such sections should not affect GOT
1778 and PLT reference counting (ie. we don't allow them to create GOT
1779 or PLT entries), there's no possibility or desire to optimize TLS
1780 relocs, and there's not much point in propagating relocs to shared
1781 libs that the dynamic linker won't relocate. */
1782 if ((sec->flags & SEC_ALLOC) == 0)
b34976b6 1783 return TRUE;
252b5132 1784
0ffa91dd
NC
1785 BFD_ASSERT (is_alpha_elf (abfd));
1786
1787 dynobj = elf_hash_table (info)->dynobj;
a7519a3c 1788 if (dynobj == NULL)
0ffa91dd 1789 elf_hash_table (info)->dynobj = dynobj = abfd;
252b5132 1790
a7519a3c 1791 sreloc = NULL;
0ffa91dd
NC
1792 symtab_hdr = &elf_symtab_hdr (abfd);
1793 sym_hashes = alpha_elf_sym_hashes (abfd);
a7519a3c
RH
1794
1795 relend = relocs + sec->reloc_count;
1796 for (rel = relocs; rel < relend; ++rel)
1797 {
1798 enum {
1799 NEED_GOT = 1,
1800 NEED_GOT_ENTRY = 2,
1801 NEED_DYNREL = 4
1802 };
1803
1804 unsigned long r_symndx, r_type;
1805 struct alpha_elf_link_hash_entry *h;
1806 unsigned int gotent_flags;
1807 bfd_boolean maybe_dynamic;
1808 unsigned int need;
1809 bfd_vma addend;
1810
1811 r_symndx = ELF64_R_SYM (rel->r_info);
1812 if (r_symndx < symtab_hdr->sh_info)
1813 h = NULL;
1814 else
1815 {
1816 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
252b5132 1817
a7519a3c
RH
1818 while (h->root.root.type == bfd_link_hash_indirect
1819 || h->root.root.type == bfd_link_hash_warning)
1820 h = (struct alpha_elf_link_hash_entry *)h->root.root.u.i.link;
252b5132 1821
81fbe831
AM
1822 /* PR15323, ref flags aren't set for references in the same
1823 object. */
1824 h->root.root.non_ir_ref = 1;
a7519a3c
RH
1825 h->root.ref_regular = 1;
1826 }
252b5132 1827
a7519a3c
RH
1828 /* We can only get preliminary data on whether a symbol is
1829 locally or externally defined, as not all of the input files
1830 have yet been processed. Do something with what we know, as
1831 this may help reduce memory usage and processing time later. */
1832 maybe_dynamic = FALSE;
0e1862bb 1833 if (h && ((bfd_link_pic (info)
a7519a3c
RH
1834 && (!info->symbolic
1835 || info->unresolved_syms_in_shared_libs == RM_IGNORE))
1836 || !h->root.def_regular
1837 || h->root.root.type == bfd_link_hash_defweak))
1838 maybe_dynamic = TRUE;
252b5132 1839
a7519a3c
RH
1840 need = 0;
1841 gotent_flags = 0;
1842 r_type = ELF64_R_TYPE (rel->r_info);
1843 addend = rel->r_addend;
9e756d64 1844
9e756d64
RH
1845 switch (r_type)
1846 {
1847 case R_ALPHA_LITERAL:
a7519a3c
RH
1848 need = NEED_GOT | NEED_GOT_ENTRY;
1849
1850 /* Remember how this literal is used from its LITUSEs.
1851 This will be important when it comes to decide if we can
1852 create a .plt entry for a function symbol. */
1853 while (++rel < relend && ELF64_R_TYPE (rel->r_info) == R_ALPHA_LITUSE)
8288a39e 1854 if (rel->r_addend >= 1 && rel->r_addend <= 6)
a7519a3c
RH
1855 gotent_flags |= 1 << rel->r_addend;
1856 --rel;
1857
1858 /* No LITUSEs -- presumably the address is used somehow. */
1859 if (gotent_flags == 0)
1860 gotent_flags = ALPHA_ELF_LINK_HASH_LU_ADDR;
1861 break;
1862
1863 case R_ALPHA_GPDISP:
1864 case R_ALPHA_GPREL16:
1865 case R_ALPHA_GPREL32:
9e756d64
RH
1866 case R_ALPHA_GPRELHIGH:
1867 case R_ALPHA_GPRELLOW:
a7519a3c
RH
1868 case R_ALPHA_BRSGP:
1869 need = NEED_GOT;
1870 break;
1871
1872 case R_ALPHA_REFLONG:
1873 case R_ALPHA_REFQUAD:
0e1862bb 1874 if (bfd_link_pic (info) || maybe_dynamic)
a7519a3c 1875 need = NEED_DYNREL;
cc03ec80
RH
1876 break;
1877
9e756d64 1878 case R_ALPHA_TLSLDM:
cc03ec80 1879 /* The symbol for a TLSLDM reloc is ignored. Collapse the
cf35638d
TS
1880 reloc to the STN_UNDEF (0) symbol so that they all match. */
1881 r_symndx = STN_UNDEF;
a7519a3c
RH
1882 h = 0;
1883 maybe_dynamic = FALSE;
1884 /* FALLTHRU */
1885
1886 case R_ALPHA_TLSGD:
1887 case R_ALPHA_GOTDTPREL:
1888 need = NEED_GOT | NEED_GOT_ENTRY;
9e756d64 1889 break;
cc03ec80 1890
a7519a3c
RH
1891 case R_ALPHA_GOTTPREL:
1892 need = NEED_GOT | NEED_GOT_ENTRY;
1893 gotent_flags = ALPHA_ELF_LINK_HASH_TLS_IE;
0e1862bb 1894 if (bfd_link_pic (info))
a7519a3c
RH
1895 info->flags |= DF_STATIC_TLS;
1896 break;
1897
1898 case R_ALPHA_TPREL64:
0e1862bb 1899 if (bfd_link_pic (info) && !bfd_link_pie (info))
e366eeae
RH
1900 {
1901 info->flags |= DF_STATIC_TLS;
1902 need = NEED_DYNREL;
1903 }
1904 else if (maybe_dynamic)
a7519a3c 1905 need = NEED_DYNREL;
a7519a3c 1906 break;
252b5132
RH
1907 }
1908
a7519a3c 1909 if (need & NEED_GOT)
252b5132 1910 {
85d162e6 1911 if (alpha_elf_tdata(abfd)->gotobj == NULL)
6cdc0ccc 1912 {
a7519a3c
RH
1913 if (!elf64_alpha_create_got_section (abfd, info))
1914 return FALSE;
c328dc3f 1915 }
252b5132 1916 }
252b5132 1917
a7519a3c
RH
1918 if (need & NEED_GOT_ENTRY)
1919 {
1920 struct alpha_elf_got_entry *gotent;
252b5132 1921
a7519a3c
RH
1922 gotent = get_got_entry (abfd, h, r_type, r_symndx, addend);
1923 if (!gotent)
1924 return FALSE;
4a67a098 1925
a7519a3c 1926 if (gotent_flags)
cc03ec80 1927 {
a7519a3c
RH
1928 gotent->flags |= gotent_flags;
1929 if (h)
1930 {
1931 gotent_flags |= h->flags;
1932 h->flags = gotent_flags;
4a67a098 1933
a7519a3c 1934 /* Make a guess as to whether a .plt entry is needed. */
6ec7057a
RH
1935 /* ??? It appears that we won't make it into
1936 adjust_dynamic_symbol for symbols that remain
1937 totally undefined. Copying this check here means
1938 we can create a plt entry for them too. */
1939 h->root.needs_plt
1940 = (maybe_dynamic && elf64_alpha_want_plt (h));
1941 }
a7519a3c 1942 }
252b5132
RH
1943 }
1944
a7519a3c 1945 if (need & NEED_DYNREL)
9e756d64 1946 {
a7519a3c
RH
1947 /* We need to create the section here now whether we eventually
1948 use it or not so that it gets mapped to an output section by
83bac4b0 1949 the linker. If not used, we'll kill it in size_dynamic_sections. */
a7519a3c 1950 if (sreloc == NULL)
9e756d64 1951 {
83bac4b0
NC
1952 sreloc = _bfd_elf_make_dynamic_reloc_section
1953 (sec, dynobj, 3, abfd, /*rela?*/ TRUE);
1954
a7519a3c 1955 if (sreloc == NULL)
83bac4b0 1956 return FALSE;
9e756d64 1957 }
252b5132 1958
a7519a3c
RH
1959 if (h)
1960 {
1961 /* Since we havn't seen all of the input symbols yet, we
1962 don't know whether we'll actually need a dynamic relocation
1963 entry for this reloc. So make a record of it. Once we
1964 find out if this thing needs dynamic relocation we'll
1965 expand the relocation sections by the appropriate amount. */
9e756d64 1966
a7519a3c 1967 struct alpha_elf_reloc_entry *rent;
9e756d64 1968
a7519a3c
RH
1969 for (rent = h->reloc_entries; rent; rent = rent->next)
1970 if (rent->rtype == r_type && rent->srel == sreloc)
1971 break;
252b5132 1972
a7519a3c
RH
1973 if (!rent)
1974 {
1975 amt = sizeof (struct alpha_elf_reloc_entry);
1976 rent = (struct alpha_elf_reloc_entry *) bfd_alloc (abfd, amt);
1977 if (!rent)
1978 return FALSE;
252b5132 1979
a7519a3c
RH
1980 rent->srel = sreloc;
1981 rent->rtype = r_type;
1982 rent->count = 1;
1983 rent->reltext = (sec->flags & SEC_READONLY) != 0;
252b5132 1984
a7519a3c
RH
1985 rent->next = h->reloc_entries;
1986 h->reloc_entries = rent;
1987 }
1988 else
1989 rent->count++;
1990 }
0e1862bb 1991 else if (bfd_link_pic (info))
a7519a3c
RH
1992 {
1993 /* If this is a shared library, and the section is to be
1994 loaded into memory, we need a RELATIVE reloc. */
1995 sreloc->size += sizeof (Elf64_External_Rela);
1996 if (sec->flags & SEC_READONLY)
1997 info->flags |= DF_TEXTREL;
1998 }
252b5132
RH
1999 }
2000 }
2001
b34976b6 2002 return TRUE;
252b5132 2003}
252b5132 2004
e117360e
RH
2005/* Return the section that should be marked against GC for a given
2006 relocation. */
2007
2008static asection *
2009elf64_alpha_gc_mark_hook (asection *sec, struct bfd_link_info *info,
2010 Elf_Internal_Rela *rel,
2011 struct elf_link_hash_entry *h, Elf_Internal_Sym *sym)
2012{
2013 /* These relocations don't really reference a symbol. Instead we store
2014 extra data in their addend slot. Ignore the symbol. */
2015 switch (ELF64_R_TYPE (rel->r_info))
2016 {
2017 case R_ALPHA_LITUSE:
2018 case R_ALPHA_GPDISP:
2019 case R_ALPHA_HINT:
2020 return NULL;
2021 }
2022
2023 return _bfd_elf_gc_mark_hook (sec, info, rel, h, sym);
2024}
2025
2026/* Update the got entry reference counts for the section being removed. */
2027
2028static bfd_boolean
2029elf64_alpha_gc_sweep_hook (bfd *abfd, struct bfd_link_info *info,
2030 asection *sec, const Elf_Internal_Rela *relocs)
2031{
2032 Elf_Internal_Shdr *symtab_hdr;
2033 struct alpha_elf_link_hash_entry **sym_hashes;
2034 const Elf_Internal_Rela *rel, *relend;
2035
0e1862bb 2036 if (bfd_link_relocatable (info))
e117360e
RH
2037 return TRUE;
2038
2039 symtab_hdr = &elf_symtab_hdr (abfd);
2040 sym_hashes = alpha_elf_sym_hashes (abfd);
2041
2042 relend = relocs + sec->reloc_count;
2043 for (rel = relocs; rel < relend; rel++)
2044 {
2045 unsigned long r_symndx, r_type;
2046 struct alpha_elf_link_hash_entry *h = NULL;
2047 struct alpha_elf_got_entry *gotent;
2048
2049 r_symndx = ELF64_R_SYM (rel->r_info);
2050 if (r_symndx >= symtab_hdr->sh_info)
2051 {
2052 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
2053 while (h->root.root.type == bfd_link_hash_indirect
2054 || h->root.root.type == bfd_link_hash_warning)
2055 h = (struct alpha_elf_link_hash_entry *) h->root.root.u.i.link;
2056 }
2057
2058 r_type = ELF64_R_TYPE (rel->r_info);
2059 switch (r_type)
2060 {
2061 case R_ALPHA_LITERAL:
2062 /* ??? Ignore re-computation of gotent_flags. We're not
2063 carrying a use-count for each bit in that mask. */
2064
2065 case R_ALPHA_TLSGD:
2066 case R_ALPHA_GOTDTPREL:
2067 case R_ALPHA_GOTTPREL:
2068 /* Fetch the got entry from the tables. */
2069 gotent = get_got_entry (abfd, h, r_type, r_symndx, rel->r_addend);
2070
2071 /* The got entry *must* exist, since we should have created it
2072 before during check_relocs. Also note that get_got_entry
2073 assumed this was going to be another use, and so incremented
2074 the use count again. Thus the use count must be at least the
2075 one real use and the "use" we just added. */
2076 if (gotent == NULL || gotent->use_count < 2)
2077 {
2078 abort ();
2079 return FALSE;
2080 }
2081 gotent->use_count -= 2;
2082 break;
2083
2084 default:
2085 break;
2086 }
2087 }
2088
2089 return TRUE;
2090}
2091
a7519a3c
RH
2092/* Adjust a symbol defined by a dynamic object and referenced by a
2093 regular object. The current definition is in some section of the
2094 dynamic object, but we're not including those sections. We have to
2095 change the definition to something the rest of the link can
2096 understand. */
252b5132 2097
b34976b6 2098static bfd_boolean
a7519a3c
RH
2099elf64_alpha_adjust_dynamic_symbol (struct bfd_link_info *info,
2100 struct elf_link_hash_entry *h)
252b5132 2101{
a7519a3c
RH
2102 bfd *dynobj;
2103 asection *s;
2104 struct alpha_elf_link_hash_entry *ah;
252b5132 2105
a7519a3c
RH
2106 dynobj = elf_hash_table(info)->dynobj;
2107 ah = (struct alpha_elf_link_hash_entry *)h;
252b5132 2108
a7519a3c 2109 /* Now that we've seen all of the input symbols, finalize our decision
6ec7057a
RH
2110 about whether this symbol should get a .plt entry. Irritatingly, it
2111 is common for folk to leave undefined symbols in shared libraries,
2112 and they still expect lazy binding; accept undefined symbols in lieu
2113 of STT_FUNC. */
2114 if (alpha_elf_dynamic_symbol_p (h, info) && elf64_alpha_want_plt (ah))
252b5132 2115 {
6ec7057a 2116 h->needs_plt = TRUE;
252b5132 2117
3d4d4302 2118 s = bfd_get_linker_section (dynobj, ".plt");
a7519a3c
RH
2119 if (!s && !elf64_alpha_create_dynamic_sections (dynobj, info))
2120 return FALSE;
204692d7 2121
6ec7057a
RH
2122 /* We need one plt entry per got subsection. Delay allocation of
2123 the actual plt entries until size_plt_section, called from
2124 size_dynamic_sections or during relaxation. */
252b5132 2125
a7519a3c
RH
2126 return TRUE;
2127 }
2128 else
6ec7057a 2129 h->needs_plt = FALSE;
252b5132 2130
a7519a3c
RH
2131 /* If this is a weak symbol, and there is a real definition, the
2132 processor independent code will have arranged for us to see the
2133 real definition first, and we can just use the same value. */
2134 if (h->u.weakdef != NULL)
252b5132 2135 {
a7519a3c
RH
2136 BFD_ASSERT (h->u.weakdef->root.type == bfd_link_hash_defined
2137 || h->u.weakdef->root.type == bfd_link_hash_defweak);
2138 h->root.u.def.section = h->u.weakdef->root.u.def.section;
2139 h->root.u.def.value = h->u.weakdef->root.u.def.value;
2140 return TRUE;
252b5132 2141 }
a7519a3c
RH
2142
2143 /* This is a reference to a symbol defined by a dynamic object which
2144 is not a function. The Alpha, since it uses .got entries for all
2145 symbols even in regular objects, does not need the hackery of a
2146 .dynbss section and COPY dynamic relocations. */
252b5132 2147
b34976b6 2148 return TRUE;
252b5132
RH
2149}
2150
747ffa7b
AM
2151/* Record STO_ALPHA_NOPV and STO_ALPHA_STD_GPLOAD. */
2152
2153static void
2154elf64_alpha_merge_symbol_attribute (struct elf_link_hash_entry *h,
2155 const Elf_Internal_Sym *isym,
2156 bfd_boolean definition,
2157 bfd_boolean dynamic)
2158{
2159 if (!dynamic && definition)
2160 h->other = ((h->other & ELF_ST_VISIBILITY (-1))
2161 | (isym->st_other & ~ELF_ST_VISIBILITY (-1)));
2162}
2163
a7519a3c
RH
2164/* Symbol versioning can create new symbols, and make our old symbols
2165 indirect to the new ones. Consolidate the got and reloc information
2166 in these situations. */
252b5132 2167
48f4b4f5
RH
2168static void
2169elf64_alpha_copy_indirect_symbol (struct bfd_link_info *info,
2170 struct elf_link_hash_entry *dir,
2171 struct elf_link_hash_entry *ind)
252b5132 2172{
48f4b4f5
RH
2173 struct alpha_elf_link_hash_entry *hi
2174 = (struct alpha_elf_link_hash_entry *) ind;
2175 struct alpha_elf_link_hash_entry *hs
2176 = (struct alpha_elf_link_hash_entry *) dir;
252b5132 2177
48f4b4f5
RH
2178 /* Do the merging in the superclass. */
2179 _bfd_elf_link_hash_copy_indirect(info, dir, ind);
252b5132 2180
a7519a3c 2181 /* Merge the flags. Whee. */
a7519a3c
RH
2182 hs->flags |= hi->flags;
2183
48f4b4f5
RH
2184 /* ??? It's unclear to me what's really supposed to happen when
2185 "merging" defweak and defined symbols, given that we don't
2186 actually throw away the defweak. This more-or-less copies
2187 the logic related to got and plt entries in the superclass. */
2188 if (ind->root.type != bfd_link_hash_indirect)
2189 return;
2190
a7519a3c
RH
2191 /* Merge the .got entries. Cannibalize the old symbol's list in
2192 doing so, since we don't need it anymore. */
2193
2194 if (hs->got_entries == NULL)
2195 hs->got_entries = hi->got_entries;
2196 else
2197 {
2198 struct alpha_elf_got_entry *gi, *gs, *gin, *gsh;
2199
2200 gsh = hs->got_entries;
2201 for (gi = hi->got_entries; gi ; gi = gin)
252b5132 2202 {
a7519a3c
RH
2203 gin = gi->next;
2204 for (gs = gsh; gs ; gs = gs->next)
2205 if (gi->gotobj == gs->gotobj
2206 && gi->reloc_type == gs->reloc_type
2207 && gi->addend == gs->addend)
2208 {
2209 gi->use_count += gs->use_count;
2210 goto got_found;
2211 }
2212 gi->next = hs->got_entries;
2213 hs->got_entries = gi;
2214 got_found:;
252b5132 2215 }
a7519a3c
RH
2216 }
2217 hi->got_entries = NULL;
252b5132 2218
a7519a3c
RH
2219 /* And similar for the reloc entries. */
2220
2221 if (hs->reloc_entries == NULL)
2222 hs->reloc_entries = hi->reloc_entries;
2223 else
2224 {
2225 struct alpha_elf_reloc_entry *ri, *rs, *rin, *rsh;
2226
2227 rsh = hs->reloc_entries;
2228 for (ri = hi->reloc_entries; ri ; ri = rin)
2229 {
2230 rin = ri->next;
2231 for (rs = rsh; rs ; rs = rs->next)
2232 if (ri->rtype == rs->rtype && ri->srel == rs->srel)
2233 {
2234 rs->count += ri->count;
2235 goto found_reloc;
2236 }
2237 ri->next = hs->reloc_entries;
2238 hs->reloc_entries = ri;
2239 found_reloc:;
2240 }
252b5132 2241 }
a7519a3c 2242 hi->reloc_entries = NULL;
252b5132
RH
2243}
2244
a7519a3c 2245/* Is it possible to merge two object file's .got tables? */
252b5132 2246
b34976b6 2247static bfd_boolean
a7519a3c 2248elf64_alpha_can_merge_gots (bfd *a, bfd *b)
252b5132 2249{
a7519a3c
RH
2250 int total = alpha_elf_tdata (a)->total_got_size;
2251 bfd *bsub;
252b5132 2252
a7519a3c
RH
2253 /* Trivial quick fallout test. */
2254 if (total + alpha_elf_tdata (b)->total_got_size <= MAX_GOT_SIZE)
2255 return TRUE;
252b5132 2256
a7519a3c
RH
2257 /* By their nature, local .got entries cannot be merged. */
2258 if ((total += alpha_elf_tdata (b)->local_got_size) > MAX_GOT_SIZE)
b34976b6 2259 return FALSE;
252b5132 2260
a7519a3c
RH
2261 /* Failing the common trivial comparison, we must effectively
2262 perform the merge. Not actually performing the merge means that
2263 we don't have to store undo information in case we fail. */
2264 for (bsub = b; bsub ; bsub = alpha_elf_tdata (bsub)->in_got_link_next)
2265 {
2266 struct alpha_elf_link_hash_entry **hashes = alpha_elf_sym_hashes (bsub);
2267 Elf_Internal_Shdr *symtab_hdr = &elf_tdata (bsub)->symtab_hdr;
2268 int i, n;
2269
2270 n = NUM_SHDR_ENTRIES (symtab_hdr) - symtab_hdr->sh_info;
2271 for (i = 0; i < n; ++i)
2272 {
2273 struct alpha_elf_got_entry *ae, *be;
2274 struct alpha_elf_link_hash_entry *h;
2275
2276 h = hashes[i];
2277 while (h->root.root.type == bfd_link_hash_indirect
2278 || h->root.root.type == bfd_link_hash_warning)
2279 h = (struct alpha_elf_link_hash_entry *)h->root.root.u.i.link;
2280
2281 for (be = h->got_entries; be ; be = be->next)
2282 {
2283 if (be->use_count == 0)
2284 continue;
2285 if (be->gotobj != b)
2286 continue;
2287
2288 for (ae = h->got_entries; ae ; ae = ae->next)
2289 if (ae->gotobj == a
2290 && ae->reloc_type == be->reloc_type
2291 && ae->addend == be->addend)
2292 goto global_found;
2293
2294 total += alpha_got_entry_size (be->reloc_type);
2295 if (total > MAX_GOT_SIZE)
2296 return FALSE;
2297 global_found:;
2298 }
2299 }
2300 }
252b5132 2301
b34976b6 2302 return TRUE;
252b5132
RH
2303}
2304
a7519a3c 2305/* Actually merge two .got tables. */
252b5132 2306
a7519a3c
RH
2307static void
2308elf64_alpha_merge_gots (bfd *a, bfd *b)
252b5132 2309{
a7519a3c
RH
2310 int total = alpha_elf_tdata (a)->total_got_size;
2311 bfd *bsub;
252b5132 2312
a7519a3c
RH
2313 /* Remember local expansion. */
2314 {
2315 int e = alpha_elf_tdata (b)->local_got_size;
2316 total += e;
2317 alpha_elf_tdata (a)->local_got_size += e;
2318 }
252b5132 2319
a7519a3c
RH
2320 for (bsub = b; bsub ; bsub = alpha_elf_tdata (bsub)->in_got_link_next)
2321 {
2322 struct alpha_elf_got_entry **local_got_entries;
2323 struct alpha_elf_link_hash_entry **hashes;
2324 Elf_Internal_Shdr *symtab_hdr;
2325 int i, n;
252b5132 2326
a7519a3c
RH
2327 /* Let the local .got entries know they are part of a new subsegment. */
2328 local_got_entries = alpha_elf_tdata (bsub)->local_got_entries;
2329 if (local_got_entries)
2330 {
2331 n = elf_tdata (bsub)->symtab_hdr.sh_info;
2332 for (i = 0; i < n; ++i)
2333 {
2334 struct alpha_elf_got_entry *ent;
2335 for (ent = local_got_entries[i]; ent; ent = ent->next)
2336 ent->gotobj = a;
2337 }
2338 }
252b5132 2339
a7519a3c
RH
2340 /* Merge the global .got entries. */
2341 hashes = alpha_elf_sym_hashes (bsub);
2342 symtab_hdr = &elf_tdata (bsub)->symtab_hdr;
252b5132 2343
a7519a3c
RH
2344 n = NUM_SHDR_ENTRIES (symtab_hdr) - symtab_hdr->sh_info;
2345 for (i = 0; i < n; ++i)
2346 {
2347 struct alpha_elf_got_entry *ae, *be, **pbe, **start;
2348 struct alpha_elf_link_hash_entry *h;
252b5132 2349
a7519a3c
RH
2350 h = hashes[i];
2351 while (h->root.root.type == bfd_link_hash_indirect
2352 || h->root.root.type == bfd_link_hash_warning)
2353 h = (struct alpha_elf_link_hash_entry *)h->root.root.u.i.link;
252b5132 2354
a7519a3c
RH
2355 pbe = start = &h->got_entries;
2356 while ((be = *pbe) != NULL)
2357 {
2358 if (be->use_count == 0)
2359 {
2360 *pbe = be->next;
2361 memset (be, 0xa5, sizeof (*be));
2362 goto kill;
2363 }
2364 if (be->gotobj != b)
2365 goto next;
2366
2367 for (ae = *start; ae ; ae = ae->next)
2368 if (ae->gotobj == a
2369 && ae->reloc_type == be->reloc_type
2370 && ae->addend == be->addend)
2371 {
2372 ae->flags |= be->flags;
2373 ae->use_count += be->use_count;
2374 *pbe = be->next;
2375 memset (be, 0xa5, sizeof (*be));
2376 goto kill;
2377 }
2378 be->gotobj = a;
2379 total += alpha_got_entry_size (be->reloc_type);
252b5132 2380
a7519a3c
RH
2381 next:;
2382 pbe = &be->next;
2383 kill:;
2384 }
2385 }
252b5132 2386
a7519a3c
RH
2387 alpha_elf_tdata (bsub)->gotobj = a;
2388 }
2389 alpha_elf_tdata (a)->total_got_size = total;
252b5132 2390
a7519a3c
RH
2391 /* Merge the two in_got chains. */
2392 {
2393 bfd *next;
252b5132 2394
a7519a3c
RH
2395 bsub = a;
2396 while ((next = alpha_elf_tdata (bsub)->in_got_link_next) != NULL)
2397 bsub = next;
252b5132 2398
a7519a3c
RH
2399 alpha_elf_tdata (bsub)->in_got_link_next = b;
2400 }
252b5132 2401}
a7519a3c
RH
2402
2403/* Calculate the offsets for the got entries. */
252b5132 2404
b34976b6 2405static bfd_boolean
a7519a3c 2406elf64_alpha_calc_got_offsets_for_symbol (struct alpha_elf_link_hash_entry *h,
2c3fc389 2407 void * arg ATTRIBUTE_UNUSED)
252b5132 2408{
a7519a3c 2409 struct alpha_elf_got_entry *gotent;
252b5132 2410
a7519a3c
RH
2411 for (gotent = h->got_entries; gotent; gotent = gotent->next)
2412 if (gotent->use_count > 0)
2413 {
2414 struct alpha_elf_obj_tdata *td;
2415 bfd_size_type *plge;
252b5132 2416
a7519a3c 2417 td = alpha_elf_tdata (gotent->gotobj);
a7519a3c
RH
2418 plge = &td->got->size;
2419 gotent->got_offset = *plge;
2420 *plge += alpha_got_entry_size (gotent->reloc_type);
2421 }
252b5132 2422
6ec7057a 2423 return TRUE;
a7519a3c 2424}
252b5132 2425
a7519a3c
RH
2426static void
2427elf64_alpha_calc_got_offsets (struct bfd_link_info *info)
2428{
4dfe6ac6
NC
2429 bfd *i, *got_list;
2430 struct alpha_elf_link_hash_table * htab;
2431
2432 htab = alpha_elf_hash_table (info);
2433 if (htab == NULL)
2434 return;
2435 got_list = htab->got_list;
252b5132 2436
a7519a3c
RH
2437 /* First, zero out the .got sizes, as we may be recalculating the
2438 .got after optimizing it. */
2439 for (i = got_list; i ; i = alpha_elf_tdata(i)->got_link_next)
2440 alpha_elf_tdata(i)->got->size = 0;
252b5132 2441
a7519a3c 2442 /* Next, fill in the offsets for all the global entries. */
4dfe6ac6 2443 alpha_elf_link_hash_traverse (htab,
a7519a3c
RH
2444 elf64_alpha_calc_got_offsets_for_symbol,
2445 NULL);
252b5132 2446
a7519a3c
RH
2447 /* Finally, fill in the offsets for the local entries. */
2448 for (i = got_list; i ; i = alpha_elf_tdata(i)->got_link_next)
2449 {
2450 bfd_size_type got_offset = alpha_elf_tdata(i)->got->size;
2451 bfd *j;
252b5132 2452
a7519a3c
RH
2453 for (j = i; j ; j = alpha_elf_tdata(j)->in_got_link_next)
2454 {
2455 struct alpha_elf_got_entry **local_got_entries, *gotent;
2456 int k, n;
252b5132 2457
a7519a3c
RH
2458 local_got_entries = alpha_elf_tdata(j)->local_got_entries;
2459 if (!local_got_entries)
2460 continue;
252b5132 2461
a7519a3c
RH
2462 for (k = 0, n = elf_tdata(j)->symtab_hdr.sh_info; k < n; ++k)
2463 for (gotent = local_got_entries[k]; gotent; gotent = gotent->next)
2464 if (gotent->use_count > 0)
2465 {
2466 gotent->got_offset = got_offset;
2467 got_offset += alpha_got_entry_size (gotent->reloc_type);
2468 }
2469 }
252b5132 2470
a7519a3c
RH
2471 alpha_elf_tdata(i)->got->size = got_offset;
2472 }
2473}
252b5132 2474
a7519a3c 2475/* Constructs the gots. */
252b5132 2476
b34976b6 2477static bfd_boolean
d1c109de
RH
2478elf64_alpha_size_got_sections (struct bfd_link_info *info,
2479 bfd_boolean may_merge)
252b5132 2480{
a7519a3c 2481 bfd *i, *got_list, *cur_got_obj = NULL;
4dfe6ac6 2482 struct alpha_elf_link_hash_table * htab;
252b5132 2483
4dfe6ac6
NC
2484 htab = alpha_elf_hash_table (info);
2485 if (htab == NULL)
2486 return FALSE;
2487 got_list = htab->got_list;
95404643 2488
a7519a3c
RH
2489 /* On the first time through, pretend we have an existing got list
2490 consisting of all of the input files. */
2491 if (got_list == NULL)
252b5132 2492 {
c72f2fb2 2493 for (i = info->input_bfds; i ; i = i->link.next)
252b5132 2494 {
0ffa91dd
NC
2495 bfd *this_got;
2496
2497 if (! is_alpha_elf (i))
2498 continue;
2499
2500 this_got = alpha_elf_tdata (i)->gotobj;
a7519a3c
RH
2501 if (this_got == NULL)
2502 continue;
252b5132 2503
a7519a3c
RH
2504 /* We are assuming no merging has yet occurred. */
2505 BFD_ASSERT (this_got == i);
252b5132 2506
a7519a3c 2507 if (alpha_elf_tdata (this_got)->total_got_size > MAX_GOT_SIZE)
252b5132 2508 {
a7519a3c
RH
2509 /* Yikes! A single object file has too many entries. */
2510 (*_bfd_error_handler)
2511 (_("%B: .got subsegment exceeds 64K (size %d)"),
2512 i, alpha_elf_tdata (this_got)->total_got_size);
b34976b6 2513 return FALSE;
252b5132 2514 }
252b5132 2515
a7519a3c
RH
2516 if (got_list == NULL)
2517 got_list = this_got;
2518 else
2519 alpha_elf_tdata(cur_got_obj)->got_link_next = this_got;
2520 cur_got_obj = this_got;
252b5132
RH
2521 }
2522
a7519a3c
RH
2523 /* Strange degenerate case of no got references. */
2524 if (got_list == NULL)
2525 return TRUE;
2526
4dfe6ac6 2527 htab->got_list = got_list;
a7519a3c
RH
2528 }
2529
2530 cur_got_obj = got_list;
0ffa91dd
NC
2531 if (cur_got_obj == NULL)
2532 return FALSE;
2533
d1c109de 2534 if (may_merge)
a7519a3c 2535 {
d1c109de
RH
2536 i = alpha_elf_tdata(cur_got_obj)->got_link_next;
2537 while (i != NULL)
252b5132 2538 {
d1c109de
RH
2539 if (elf64_alpha_can_merge_gots (cur_got_obj, i))
2540 {
2541 elf64_alpha_merge_gots (cur_got_obj, i);
252b5132 2542
d1c109de
RH
2543 alpha_elf_tdata(i)->got->size = 0;
2544 i = alpha_elf_tdata(i)->got_link_next;
2545 alpha_elf_tdata(cur_got_obj)->got_link_next = i;
2546 }
2547 else
2548 {
2549 cur_got_obj = i;
2550 i = alpha_elf_tdata(i)->got_link_next;
2551 }
a7519a3c 2552 }
252b5132
RH
2553 }
2554
a7519a3c
RH
2555 /* Once the gots have been merged, fill in the got offsets for
2556 everything therein. */
4a828aab 2557 elf64_alpha_calc_got_offsets (info);
252b5132 2558
a7519a3c 2559 return TRUE;
252b5132 2560}
252b5132 2561
b34976b6 2562static bfd_boolean
2c3fc389
NC
2563elf64_alpha_size_plt_section_1 (struct alpha_elf_link_hash_entry *h,
2564 void * data)
252b5132 2565{
a7519a3c
RH
2566 asection *splt = (asection *) data;
2567 struct alpha_elf_got_entry *gotent;
6ec7057a 2568 bfd_boolean saw_one = FALSE;
252b5132 2569
a7519a3c
RH
2570 /* If we didn't need an entry before, we still don't. */
2571 if (!h->root.needs_plt)
2572 return TRUE;
e92d460e 2573
6ec7057a 2574 /* For each LITERAL got entry still in use, allocate a plt entry. */
a7519a3c
RH
2575 for (gotent = h->got_entries; gotent ; gotent = gotent->next)
2576 if (gotent->reloc_type == R_ALPHA_LITERAL
2577 && gotent->use_count > 0)
6ec7057a
RH
2578 {
2579 if (splt->size == 0)
2580 splt->size = PLT_HEADER_SIZE;
2581 gotent->plt_offset = splt->size;
2582 splt->size += PLT_ENTRY_SIZE;
2583 saw_one = TRUE;
2584 }
a7519a3c 2585
6ec7057a
RH
2586 /* If there weren't any, there's no longer a need for the PLT entry. */
2587 if (!saw_one)
2588 h->root.needs_plt = FALSE;
a7519a3c
RH
2589
2590 return TRUE;
2591}
2592
4a828aab
RH
2593/* Called from relax_section to rebuild the PLT in light of potential changes
2594 in the function's status. */
a7519a3c 2595
4a828aab 2596static void
a7519a3c
RH
2597elf64_alpha_size_plt_section (struct bfd_link_info *info)
2598{
6ec7057a 2599 asection *splt, *spltrel, *sgotplt;
a7519a3c
RH
2600 unsigned long entries;
2601 bfd *dynobj;
4dfe6ac6
NC
2602 struct alpha_elf_link_hash_table * htab;
2603
2604 htab = alpha_elf_hash_table (info);
2605 if (htab == NULL)
2606 return;
a7519a3c
RH
2607
2608 dynobj = elf_hash_table(info)->dynobj;
3d4d4302 2609 splt = bfd_get_linker_section (dynobj, ".plt");
a7519a3c 2610 if (splt == NULL)
4a828aab 2611 return;
252b5132 2612
a7519a3c 2613 splt->size = 0;
252b5132 2614
4dfe6ac6 2615 alpha_elf_link_hash_traverse (htab,
a7519a3c 2616 elf64_alpha_size_plt_section_1, splt);
e92d460e 2617
a7519a3c 2618 /* Every plt entry requires a JMP_SLOT relocation. */
3d4d4302 2619 spltrel = bfd_get_linker_section (dynobj, ".rela.plt");
4a828aab 2620 entries = 0;
a7519a3c 2621 if (splt->size)
6ec7057a
RH
2622 {
2623 if (elf64_alpha_use_secureplt)
2624 entries = (splt->size - NEW_PLT_HEADER_SIZE) / NEW_PLT_ENTRY_SIZE;
2625 else
2626 entries = (splt->size - OLD_PLT_HEADER_SIZE) / OLD_PLT_ENTRY_SIZE;
2627 }
a7519a3c 2628 spltrel->size = entries * sizeof (Elf64_External_Rela);
e92d460e 2629
6ec7057a
RH
2630 /* When using the secureplt, we need two words somewhere in the data
2631 segment for the dynamic linker to tell us where to go. This is the
2632 entire contents of the .got.plt section. */
2633 if (elf64_alpha_use_secureplt)
2634 {
3d4d4302 2635 sgotplt = bfd_get_linker_section (dynobj, ".got.plt");
6ec7057a
RH
2636 sgotplt->size = entries ? 16 : 0;
2637 }
a7519a3c 2638}
e92d460e 2639
a7519a3c
RH
2640static bfd_boolean
2641elf64_alpha_always_size_sections (bfd *output_bfd ATTRIBUTE_UNUSED,
2642 struct bfd_link_info *info)
2643{
2644 bfd *i;
4dfe6ac6 2645 struct alpha_elf_link_hash_table * htab;
252b5132 2646
0e1862bb 2647 if (bfd_link_relocatable (info))
a7519a3c 2648 return TRUE;
252b5132 2649
4dfe6ac6
NC
2650 htab = alpha_elf_hash_table (info);
2651 if (htab == NULL)
2652 return FALSE;
2653
d1c109de 2654 if (!elf64_alpha_size_got_sections (info, TRUE))
a7519a3c 2655 return FALSE;
252b5132 2656
a7519a3c 2657 /* Allocate space for all of the .got subsections. */
4dfe6ac6 2658 i = htab->got_list;
a7519a3c 2659 for ( ; i ; i = alpha_elf_tdata(i)->got_link_next)
252b5132 2660 {
a7519a3c
RH
2661 asection *s = alpha_elf_tdata(i)->got;
2662 if (s->size > 0)
2663 {
2664 s->contents = (bfd_byte *) bfd_zalloc (i, s->size);
2665 if (s->contents == NULL)
2666 return FALSE;
2667 }
252b5132
RH
2668 }
2669
b34976b6 2670 return TRUE;
252b5132 2671}
3765b1be 2672
a7519a3c 2673/* The number of dynamic relocations required by a static relocation. */
3765b1be 2674
a7519a3c 2675static int
e366eeae 2676alpha_dynamic_entries_for_reloc (int r_type, int dynamic, int shared, int pie)
a7519a3c
RH
2677{
2678 switch (r_type)
3765b1be 2679 {
a7519a3c
RH
2680 /* May appear in GOT entries. */
2681 case R_ALPHA_TLSGD:
2682 return (dynamic ? 2 : shared ? 1 : 0);
2683 case R_ALPHA_TLSLDM:
2684 return shared;
2685 case R_ALPHA_LITERAL:
a7519a3c 2686 return dynamic || shared;
e366eeae
RH
2687 case R_ALPHA_GOTTPREL:
2688 return dynamic || (shared && !pie);
a7519a3c
RH
2689 case R_ALPHA_GOTDTPREL:
2690 return dynamic;
3765b1be 2691
a7519a3c
RH
2692 /* May appear in data sections. */
2693 case R_ALPHA_REFLONG:
2694 case R_ALPHA_REFQUAD:
a7519a3c 2695 return dynamic || shared;
e366eeae
RH
2696 case R_ALPHA_TPREL64:
2697 return dynamic || (shared && !pie);
3765b1be 2698
a7519a3c
RH
2699 /* Everything else is illegal. We'll issue an error during
2700 relocate_section. */
2701 default:
2702 return 0;
2703 }
2704}
3765b1be 2705
a7519a3c 2706/* Work out the sizes of the dynamic relocation entries. */
3765b1be 2707
a7519a3c
RH
2708static bfd_boolean
2709elf64_alpha_calc_dynrel_sizes (struct alpha_elf_link_hash_entry *h,
2710 struct bfd_link_info *info)
2711{
2712 bfd_boolean dynamic;
2713 struct alpha_elf_reloc_entry *relent;
2714 unsigned long entries;
3765b1be 2715
a7519a3c
RH
2716 /* If the symbol was defined as a common symbol in a regular object
2717 file, and there was no definition in any dynamic object, then the
2718 linker will have allocated space for the symbol in a common
2719 section but the ELF_LINK_HASH_DEF_REGULAR flag will not have been
2720 set. This is done for dynamic symbols in
2721 elf_adjust_dynamic_symbol but this is not done for non-dynamic
2722 symbols, somehow. */
2723 if (!h->root.def_regular
2724 && h->root.ref_regular
2725 && !h->root.def_dynamic
2726 && (h->root.root.type == bfd_link_hash_defined
2727 || h->root.root.type == bfd_link_hash_defweak)
2728 && !(h->root.root.u.def.section->owner->flags & DYNAMIC))
2729 h->root.def_regular = 1;
3765b1be 2730
a7519a3c
RH
2731 /* If the symbol is dynamic, we'll need all the relocations in their
2732 natural form. If this is a shared object, and it has been forced
2733 local, we'll need the same number of RELATIVE relocations. */
2734 dynamic = alpha_elf_dynamic_symbol_p (&h->root, info);
3765b1be 2735
a7519a3c
RH
2736 /* If the symbol is a hidden undefined weak, then we never have any
2737 relocations. Avoid the loop which may want to add RELATIVE relocs
0e1862bb 2738 based on bfd_link_pic (info). */
a7519a3c
RH
2739 if (h->root.root.type == bfd_link_hash_undefweak && !dynamic)
2740 return TRUE;
2741
2742 for (relent = h->reloc_entries; relent; relent = relent->next)
3765b1be 2743 {
a7519a3c 2744 entries = alpha_dynamic_entries_for_reloc (relent->rtype, dynamic,
0e1862bb 2745 bfd_link_pic (info), bfd_link_pie (info));
a7519a3c
RH
2746 if (entries)
2747 {
2748 relent->srel->size +=
2749 entries * sizeof (Elf64_External_Rela) * relent->count;
2750 if (relent->reltext)
2751 info->flags |= DT_TEXTREL;
2752 }
2753 }
3765b1be 2754
a7519a3c
RH
2755 return TRUE;
2756}
3765b1be 2757
a7519a3c
RH
2758/* Subroutine of elf64_alpha_size_rela_got_section for doing the
2759 global symbols. */
3765b1be 2760
a7519a3c
RH
2761static bfd_boolean
2762elf64_alpha_size_rela_got_1 (struct alpha_elf_link_hash_entry *h,
2763 struct bfd_link_info *info)
2764{
2765 bfd_boolean dynamic;
2766 struct alpha_elf_got_entry *gotent;
2767 unsigned long entries;
3765b1be 2768
6ec7057a
RH
2769 /* If we're using a plt for this symbol, then all of its relocations
2770 for its got entries go into .rela.plt. */
2771 if (h->root.needs_plt)
2772 return TRUE;
2773
a7519a3c
RH
2774 /* If the symbol is dynamic, we'll need all the relocations in their
2775 natural form. If this is a shared object, and it has been forced
2776 local, we'll need the same number of RELATIVE relocations. */
2777 dynamic = alpha_elf_dynamic_symbol_p (&h->root, info);
2778
2779 /* If the symbol is a hidden undefined weak, then we never have any
2780 relocations. Avoid the loop which may want to add RELATIVE relocs
0e1862bb 2781 based on bfd_link_pic (info). */
a7519a3c
RH
2782 if (h->root.root.type == bfd_link_hash_undefweak && !dynamic)
2783 return TRUE;
2784
2785 entries = 0;
2786 for (gotent = h->got_entries; gotent ; gotent = gotent->next)
2787 if (gotent->use_count > 0)
e366eeae 2788 entries += alpha_dynamic_entries_for_reloc (gotent->reloc_type, dynamic,
0e1862bb
L
2789 bfd_link_pic (info),
2790 bfd_link_pie (info));
a7519a3c 2791
a7519a3c
RH
2792 if (entries > 0)
2793 {
2794 bfd *dynobj = elf_hash_table(info)->dynobj;
3d4d4302 2795 asection *srel = bfd_get_linker_section (dynobj, ".rela.got");
a7519a3c
RH
2796 BFD_ASSERT (srel != NULL);
2797 srel->size += sizeof (Elf64_External_Rela) * entries;
3765b1be 2798 }
3765b1be 2799
a7519a3c 2800 return TRUE;
3765b1be
RH
2801}
2802
a7519a3c 2803/* Set the sizes of the dynamic relocation sections. */
252b5132 2804
4a828aab 2805static void
a7519a3c 2806elf64_alpha_size_rela_got_section (struct bfd_link_info *info)
252b5132 2807{
a7519a3c
RH
2808 unsigned long entries;
2809 bfd *i, *dynobj;
2810 asection *srel;
4dfe6ac6
NC
2811 struct alpha_elf_link_hash_table * htab;
2812
2813 htab = alpha_elf_hash_table (info);
2814 if (htab == NULL)
2815 return;
252b5132 2816
a7519a3c
RH
2817 /* Shared libraries often require RELATIVE relocs, and some relocs
2818 require attention for the main application as well. */
252b5132 2819
a7519a3c 2820 entries = 0;
4dfe6ac6 2821 for (i = htab->got_list;
a7519a3c
RH
2822 i ; i = alpha_elf_tdata(i)->got_link_next)
2823 {
2824 bfd *j;
3241278a 2825
a7519a3c
RH
2826 for (j = i; j ; j = alpha_elf_tdata(j)->in_got_link_next)
2827 {
2828 struct alpha_elf_got_entry **local_got_entries, *gotent;
2829 int k, n;
252b5132 2830
a7519a3c
RH
2831 local_got_entries = alpha_elf_tdata(j)->local_got_entries;
2832 if (!local_got_entries)
2833 continue;
252b5132 2834
a7519a3c
RH
2835 for (k = 0, n = elf_tdata(j)->symtab_hdr.sh_info; k < n; ++k)
2836 for (gotent = local_got_entries[k];
2837 gotent ; gotent = gotent->next)
2838 if (gotent->use_count > 0)
2839 entries += (alpha_dynamic_entries_for_reloc
0e1862bb
L
2840 (gotent->reloc_type, 0, bfd_link_pic (info),
2841 bfd_link_pie (info)));
a7519a3c
RH
2842 }
2843 }
3765b1be 2844
a7519a3c 2845 dynobj = elf_hash_table(info)->dynobj;
3d4d4302 2846 srel = bfd_get_linker_section (dynobj, ".rela.got");
a7519a3c
RH
2847 if (!srel)
2848 {
2849 BFD_ASSERT (entries == 0);
4a828aab 2850 return;
a7519a3c
RH
2851 }
2852 srel->size = sizeof (Elf64_External_Rela) * entries;
252b5132 2853
a7519a3c 2854 /* Now do the non-local symbols. */
4dfe6ac6 2855 alpha_elf_link_hash_traverse (htab,
a7519a3c 2856 elf64_alpha_size_rela_got_1, info);
a7519a3c 2857}
252b5132 2858
a7519a3c 2859/* Set the sizes of the dynamic sections. */
3765b1be 2860
a7519a3c
RH
2861static bfd_boolean
2862elf64_alpha_size_dynamic_sections (bfd *output_bfd ATTRIBUTE_UNUSED,
2863 struct bfd_link_info *info)
2864{
2865 bfd *dynobj;
2866 asection *s;
2867 bfd_boolean relplt;
4dfe6ac6
NC
2868 struct alpha_elf_link_hash_table * htab;
2869
2870 htab = alpha_elf_hash_table (info);
2871 if (htab == NULL)
2872 return FALSE;
3765b1be 2873
a7519a3c
RH
2874 dynobj = elf_hash_table(info)->dynobj;
2875 BFD_ASSERT(dynobj != NULL);
252b5132 2876
a7519a3c
RH
2877 if (elf_hash_table (info)->dynamic_sections_created)
2878 {
2879 /* Set the contents of the .interp section to the interpreter. */
0e1862bb 2880 if (bfd_link_executable (info))
252b5132 2881 {
3d4d4302 2882 s = bfd_get_linker_section (dynobj, ".interp");
a7519a3c
RH
2883 BFD_ASSERT (s != NULL);
2884 s->size = sizeof ELF_DYNAMIC_INTERPRETER;
2885 s->contents = (unsigned char *) ELF_DYNAMIC_INTERPRETER;
2886 }
3765b1be 2887
a7519a3c
RH
2888 /* Now that we've seen all of the input files, we can decide which
2889 symbols need dynamic relocation entries and which don't. We've
2890 collected information in check_relocs that we can now apply to
2891 size the dynamic relocation sections. */
4dfe6ac6 2892 alpha_elf_link_hash_traverse (htab,
a7519a3c 2893 elf64_alpha_calc_dynrel_sizes, info);
252b5132 2894
a7519a3c 2895 elf64_alpha_size_rela_got_section (info);
6ec7057a 2896 elf64_alpha_size_plt_section (info);
a7519a3c
RH
2897 }
2898 /* else we're not dynamic and by definition we don't need such things. */
3765b1be 2899
a7519a3c
RH
2900 /* The check_relocs and adjust_dynamic_symbol entry points have
2901 determined the sizes of the various dynamic sections. Allocate
2902 memory for them. */
2903 relplt = FALSE;
2904 for (s = dynobj->sections; s != NULL; s = s->next)
2905 {
2906 const char *name;
3765b1be 2907
a7519a3c
RH
2908 if (!(s->flags & SEC_LINKER_CREATED))
2909 continue;
cc03ec80 2910
a7519a3c
RH
2911 /* It's OK to base decisions on the section name, because none
2912 of the dynobj section names depend upon the input files. */
2913 name = bfd_get_section_name (dynobj, s);
3765b1be 2914
0112cd26 2915 if (CONST_STRNEQ (name, ".rela"))
3765b1be 2916 {
c456f082 2917 if (s->size != 0)
a7519a3c 2918 {
c456f082 2919 if (strcmp (name, ".rela.plt") == 0)
a7519a3c 2920 relplt = TRUE;
252b5132 2921
a7519a3c
RH
2922 /* We use the reloc_count field as a counter if we need
2923 to copy relocs into the output file. */
2924 s->reloc_count = 0;
252b5132 2925 }
3765b1be 2926 }
0112cd26 2927 else if (! CONST_STRNEQ (name, ".got")
c456f082
AM
2928 && strcmp (name, ".plt") != 0
2929 && strcmp (name, ".dynbss") != 0)
3765b1be 2930 {
a7519a3c
RH
2931 /* It's not one of our dynamic sections, so don't allocate space. */
2932 continue;
2933 }
252b5132 2934
c456f082
AM
2935 if (s->size == 0)
2936 {
2937 /* If we don't need this section, strip it from the output file.
2938 This is to handle .rela.bss and .rela.plt. We must create it
2939 in create_dynamic_sections, because it must be created before
2940 the linker maps input sections to output sections. The
2941 linker does that before adjust_dynamic_symbol is called, and
2942 it is that function which decides whether anything needs to
2943 go into these sections. */
6452a567
RH
2944 if (!CONST_STRNEQ (name, ".got"))
2945 s->flags |= SEC_EXCLUDE;
c456f082
AM
2946 }
2947 else if ((s->flags & SEC_HAS_CONTENTS) != 0)
a7519a3c
RH
2948 {
2949 /* Allocate memory for the section contents. */
2950 s->contents = (bfd_byte *) bfd_zalloc (dynobj, s->size);
c456f082 2951 if (s->contents == NULL)
b34976b6 2952 return FALSE;
a7519a3c
RH
2953 }
2954 }
3765b1be 2955
a7519a3c
RH
2956 if (elf_hash_table (info)->dynamic_sections_created)
2957 {
2958 /* Add some entries to the .dynamic section. We fill in the
2959 values later, in elf64_alpha_finish_dynamic_sections, but we
2960 must add the entries now so that we get the correct size for
2961 the .dynamic section. The DT_DEBUG entry is filled in by the
2962 dynamic linker and used by the debugger. */
2963#define add_dynamic_entry(TAG, VAL) \
2964 _bfd_elf_add_dynamic_entry (info, TAG, VAL)
3765b1be 2965
0e1862bb 2966 if (bfd_link_executable (info))
a7519a3c
RH
2967 {
2968 if (!add_dynamic_entry (DT_DEBUG, 0))
2969 return FALSE;
3765b1be
RH
2970 }
2971
a7519a3c 2972 if (relplt)
3765b1be 2973 {
a7519a3c
RH
2974 if (!add_dynamic_entry (DT_PLTGOT, 0)
2975 || !add_dynamic_entry (DT_PLTRELSZ, 0)
2976 || !add_dynamic_entry (DT_PLTREL, DT_RELA)
2977 || !add_dynamic_entry (DT_JMPREL, 0))
2978 return FALSE;
6ec7057a
RH
2979
2980 if (elf64_alpha_use_secureplt
2981 && !add_dynamic_entry (DT_ALPHA_PLTRO, 1))
2982 return FALSE;
a7519a3c 2983 }
252b5132 2984
a7519a3c
RH
2985 if (!add_dynamic_entry (DT_RELA, 0)
2986 || !add_dynamic_entry (DT_RELASZ, 0)
2987 || !add_dynamic_entry (DT_RELAENT, sizeof (Elf64_External_Rela)))
2988 return FALSE;
2989
2990 if (info->flags & DF_TEXTREL)
2991 {
2992 if (!add_dynamic_entry (DT_TEXTREL, 0))
2993 return FALSE;
252b5132
RH
2994 }
2995 }
a7519a3c 2996#undef add_dynamic_entry
252b5132 2997
b34976b6 2998 return TRUE;
252b5132 2999}
a7519a3c
RH
3000\f
3001/* These functions do relaxation for Alpha ELF.
252b5132 3002
a7519a3c
RH
3003 Currently I'm only handling what I can do with existing compiler
3004 and assembler support, which means no instructions are removed,
3005 though some may be nopped. At this time GCC does not emit enough
3006 information to do all of the relaxing that is possible. It will
3007 take some not small amount of work for that to happen.
252b5132 3008
a7519a3c
RH
3009 There are a couple of interesting papers that I once read on this
3010 subject, that I cannot find references to at the moment, that
3011 related to Alpha in particular. They are by David Wall, then of
3012 DEC WRL. */
252b5132 3013
a7519a3c
RH
3014struct alpha_relax_info
3015{
3016 bfd *abfd;
3017 asection *sec;
3018 bfd_byte *contents;
3019 Elf_Internal_Shdr *symtab_hdr;
3020 Elf_Internal_Rela *relocs, *relend;
3021 struct bfd_link_info *link_info;
3022 bfd_vma gp;
3023 bfd *gotobj;
3024 asection *tsec;
3025 struct alpha_elf_link_hash_entry *h;
3026 struct alpha_elf_got_entry **first_gotent;
3027 struct alpha_elf_got_entry *gotent;
3028 bfd_boolean changed_contents;
3029 bfd_boolean changed_relocs;
3030 unsigned char other;
3031};
252b5132 3032
a7519a3c
RH
3033static Elf_Internal_Rela *
3034elf64_alpha_find_reloc_at_ofs (Elf_Internal_Rela *rel,
3035 Elf_Internal_Rela *relend,
3036 bfd_vma offset, int type)
3037{
3038 while (rel < relend)
252b5132 3039 {
a7519a3c
RH
3040 if (rel->r_offset == offset
3041 && ELF64_R_TYPE (rel->r_info) == (unsigned int) type)
3042 return rel;
3043 ++rel;
3044 }
3045 return NULL;
3046}
252b5132 3047
a7519a3c
RH
3048static bfd_boolean
3049elf64_alpha_relax_got_load (struct alpha_relax_info *info, bfd_vma symval,
3050 Elf_Internal_Rela *irel, unsigned long r_type)
3051{
3052 unsigned int insn;
3053 bfd_signed_vma disp;
252b5132 3054
a7519a3c
RH
3055 /* Get the instruction. */
3056 insn = bfd_get_32 (info->abfd, info->contents + irel->r_offset);
252b5132 3057
a7519a3c
RH
3058 if (insn >> 26 != OP_LDQ)
3059 {
3060 reloc_howto_type *howto = elf64_alpha_howto_table + r_type;
3061 ((*_bfd_error_handler)
3062 ("%B: %A+0x%lx: warning: %s relocation against unexpected insn",
3063 info->abfd, info->sec,
3064 (unsigned long) irel->r_offset, howto->name));
3065 return TRUE;
3066 }
252b5132 3067
a7519a3c
RH
3068 /* Can't relax dynamic symbols. */
3069 if (alpha_elf_dynamic_symbol_p (&info->h->root, info->link_info))
3070 return TRUE;
252b5132 3071
a7519a3c 3072 /* Can't use local-exec relocations in shared libraries. */
e366eeae 3073 if (r_type == R_ALPHA_GOTTPREL
0e1862bb
L
3074 && (bfd_link_pic (info->link_info)
3075 && !bfd_link_pie (info->link_info)))
a7519a3c 3076 return TRUE;
252b5132 3077
a7519a3c
RH
3078 if (r_type == R_ALPHA_LITERAL)
3079 {
3080 /* Look for nice constant addresses. This includes the not-uncommon
3081 special case of 0 for undefweak symbols. */
3082 if ((info->h && info->h->root.root.type == bfd_link_hash_undefweak)
0e1862bb 3083 || (!bfd_link_pic (info->link_info)
a7519a3c
RH
3084 && (symval >= (bfd_vma)-0x8000 || symval < 0x8000)))
3085 {
3086 disp = 0;
3087 insn = (OP_LDA << 26) | (insn & (31 << 21)) | (31 << 16);
3088 insn |= (symval & 0xffff);
3089 r_type = R_ALPHA_NONE;
3090 }
3091 else
3092 {
d1c109de
RH
3093 /* We may only create GPREL relocs during the second pass. */
3094 if (info->link_info->relax_pass == 0)
3095 return TRUE;
3096
a7519a3c
RH
3097 disp = symval - info->gp;
3098 insn = (OP_LDA << 26) | (insn & 0x03ff0000);
3099 r_type = R_ALPHA_GPREL16;
3100 }
252b5132
RH
3101 }
3102 else
252b5132 3103 {
a7519a3c 3104 bfd_vma dtp_base, tp_base;
252b5132 3105
a7519a3c
RH
3106 BFD_ASSERT (elf_hash_table (info->link_info)->tls_sec != NULL);
3107 dtp_base = alpha_get_dtprel_base (info->link_info);
3108 tp_base = alpha_get_tprel_base (info->link_info);
3109 disp = symval - (r_type == R_ALPHA_GOTDTPREL ? dtp_base : tp_base);
252b5132 3110
a7519a3c 3111 insn = (OP_LDA << 26) | (insn & (31 << 21)) | (31 << 16);
252b5132 3112
a7519a3c
RH
3113 switch (r_type)
3114 {
3115 case R_ALPHA_GOTDTPREL:
3116 r_type = R_ALPHA_DTPREL16;
3117 break;
3118 case R_ALPHA_GOTTPREL:
3119 r_type = R_ALPHA_TPREL16;
3120 break;
3121 default:
3122 BFD_ASSERT (0);
3123 return FALSE;
3124 }
3125 }
252b5132 3126
a7519a3c 3127 if (disp < -0x8000 || disp >= 0x8000)
b34976b6 3128 return TRUE;
252b5132 3129
a7519a3c
RH
3130 bfd_put_32 (info->abfd, (bfd_vma) insn, info->contents + irel->r_offset);
3131 info->changed_contents = TRUE;
252b5132 3132
a7519a3c
RH
3133 /* Reduce the use count on this got entry by one, possibly
3134 eliminating it. */
3135 if (--info->gotent->use_count == 0)
252b5132 3136 {
a7519a3c
RH
3137 int sz = alpha_got_entry_size (r_type);
3138 alpha_elf_tdata (info->gotobj)->total_got_size -= sz;
3139 if (!info->h)
3140 alpha_elf_tdata (info->gotobj)->local_got_size -= sz;
252b5132 3141 }
252b5132 3142
a7519a3c
RH
3143 /* Smash the existing GOT relocation for its 16-bit immediate pair. */
3144 irel->r_info = ELF64_R_INFO (ELF64_R_SYM (irel->r_info), r_type);
3145 info->changed_relocs = TRUE;
3146
3147 /* ??? Search forward through this basic block looking for insns
3148 that use the target register. Stop after an insn modifying the
3149 register is seen, or after a branch or call.
252b5132 3150
a7519a3c
RH
3151 Any such memory load insn may be substituted by a load directly
3152 off the GP. This allows the memory load insn to be issued before
3153 the calculated GP register would otherwise be ready.
252b5132 3154
a7519a3c
RH
3155 Any such jsr insn can be replaced by a bsr if it is in range.
3156
3157 This would mean that we'd have to _add_ relocations, the pain of
3158 which gives one pause. */
252b5132 3159
b34976b6 3160 return TRUE;
252b5132
RH
3161}
3162
a7519a3c
RH
3163static bfd_vma
3164elf64_alpha_relax_opt_call (struct alpha_relax_info *info, bfd_vma symval)
252b5132 3165{
a7519a3c
RH
3166 /* If the function has the same gp, and we can identify that the
3167 function does not use its function pointer, we can eliminate the
3168 address load. */
252b5132 3169
a7519a3c
RH
3170 /* If the symbol is marked NOPV, we are being told the function never
3171 needs its procedure value. */
3172 if ((info->other & STO_ALPHA_STD_GPLOAD) == STO_ALPHA_NOPV)
3173 return symval;
252b5132 3174
a7519a3c
RH
3175 /* If the symbol is marked STD_GP, we are being told the function does
3176 a normal ldgp in the first two words. */
3177 else if ((info->other & STO_ALPHA_STD_GPLOAD) == STO_ALPHA_STD_GPLOAD)
3178 ;
252b5132 3179
a7519a3c
RH
3180 /* Otherwise, we may be able to identify a GP load in the first two
3181 words, which we can then skip. */
3182 else
252b5132 3183 {
a7519a3c
RH
3184 Elf_Internal_Rela *tsec_relocs, *tsec_relend, *tsec_free, *gpdisp;
3185 bfd_vma ofs;
252b5132 3186
a7519a3c
RH
3187 /* Load the relocations from the section that the target symbol is in. */
3188 if (info->sec == info->tsec)
252b5132 3189 {
a7519a3c
RH
3190 tsec_relocs = info->relocs;
3191 tsec_relend = info->relend;
3192 tsec_free = NULL;
3193 }
3194 else
3195 {
3196 tsec_relocs = (_bfd_elf_link_read_relocs
2c3fc389 3197 (info->abfd, info->tsec, NULL,
a7519a3c
RH
3198 (Elf_Internal_Rela *) NULL,
3199 info->link_info->keep_memory));
3200 if (tsec_relocs == NULL)
3201 return 0;
3202 tsec_relend = tsec_relocs + info->tsec->reloc_count;
3203 tsec_free = (info->link_info->keep_memory ? NULL : tsec_relocs);
3204 }
252b5132 3205
a7519a3c
RH
3206 /* Recover the symbol's offset within the section. */
3207 ofs = (symval - info->tsec->output_section->vma
3208 - info->tsec->output_offset);
252b5132 3209
a7519a3c
RH
3210 /* Look for a GPDISP reloc. */
3211 gpdisp = (elf64_alpha_find_reloc_at_ofs
3212 (tsec_relocs, tsec_relend, ofs, R_ALPHA_GPDISP));
252b5132 3213
a7519a3c
RH
3214 if (!gpdisp || gpdisp->r_addend != 4)
3215 {
3216 if (tsec_free)
3217 free (tsec_free);
3218 return 0;
252b5132 3219 }
a7519a3c
RH
3220 if (tsec_free)
3221 free (tsec_free);
252b5132
RH
3222 }
3223
a7519a3c
RH
3224 /* We've now determined that we can skip an initial gp load. Verify
3225 that the call and the target use the same gp. */
f13a99db 3226 if (info->link_info->output_bfd->xvec != info->tsec->owner->xvec
a7519a3c
RH
3227 || info->gotobj != alpha_elf_tdata (info->tsec->owner)->gotobj)
3228 return 0;
252b5132 3229
a7519a3c
RH
3230 return symval + 8;
3231}
252b5132 3232
a7519a3c
RH
3233static bfd_boolean
3234elf64_alpha_relax_with_lituse (struct alpha_relax_info *info,
3235 bfd_vma symval, Elf_Internal_Rela *irel)
252b5132 3236{
d1c109de
RH
3237 Elf_Internal_Rela *urel, *erel, *irelend = info->relend;
3238 int flags;
a7519a3c
RH
3239 bfd_signed_vma disp;
3240 bfd_boolean fits16;
3241 bfd_boolean fits32;
3242 bfd_boolean lit_reused = FALSE;
3243 bfd_boolean all_optimized = TRUE;
d1c109de
RH
3244 bfd_boolean changed_contents;
3245 bfd_boolean changed_relocs;
3246 bfd_byte *contents = info->contents;
3247 bfd *abfd = info->abfd;
3248 bfd_vma sec_output_vma;
a7519a3c 3249 unsigned int lit_insn;
d1c109de 3250 int relax_pass;
252b5132 3251
d1c109de 3252 lit_insn = bfd_get_32 (abfd, contents + irel->r_offset);
a7519a3c
RH
3253 if (lit_insn >> 26 != OP_LDQ)
3254 {
3255 ((*_bfd_error_handler)
3256 ("%B: %A+0x%lx: warning: LITERAL relocation against unexpected insn",
d1c109de 3257 abfd, info->sec,
a7519a3c
RH
3258 (unsigned long) irel->r_offset));
3259 return TRUE;
3260 }
252b5132 3261
a7519a3c
RH
3262 /* Can't relax dynamic symbols. */
3263 if (alpha_elf_dynamic_symbol_p (&info->h->root, info->link_info))
3264 return TRUE;
3265
d1c109de
RH
3266 changed_contents = info->changed_contents;
3267 changed_relocs = info->changed_relocs;
3268 sec_output_vma = info->sec->output_section->vma + info->sec->output_offset;
3269 relax_pass = info->link_info->relax_pass;
3270
a7519a3c 3271 /* Summarize how this particular LITERAL is used. */
d1c109de 3272 for (erel = irel+1, flags = 0; erel < irelend; ++erel)
252b5132 3273 {
d1c109de 3274 if (ELF64_R_TYPE (erel->r_info) != R_ALPHA_LITUSE)
a7519a3c 3275 break;
d1c109de
RH
3276 if (erel->r_addend <= 6)
3277 flags |= 1 << erel->r_addend;
a7519a3c 3278 }
252b5132 3279
a7519a3c
RH
3280 /* A little preparation for the loop... */
3281 disp = symval - info->gp;
252b5132 3282
d1c109de 3283 for (urel = irel+1; urel < erel; ++urel)
a7519a3c 3284 {
d1c109de 3285 bfd_vma urel_r_offset = urel->r_offset;
a7519a3c
RH
3286 unsigned int insn;
3287 int insn_disp;
3288 bfd_signed_vma xdisp;
d1c109de 3289 Elf_Internal_Rela nrel;
252b5132 3290
d1c109de 3291 insn = bfd_get_32 (abfd, contents + urel_r_offset);
252b5132 3292
a7519a3c
RH
3293 switch (urel->r_addend)
3294 {
3295 case LITUSE_ALPHA_ADDR:
3296 default:
3297 /* This type is really just a placeholder to note that all
3298 uses cannot be optimized, but to still allow some. */
3299 all_optimized = FALSE;
3300 break;
252b5132 3301
a7519a3c 3302 case LITUSE_ALPHA_BASE:
d1c109de
RH
3303 /* We may only create GPREL relocs during the second pass. */
3304 if (relax_pass == 0)
3305 {
3306 all_optimized = FALSE;
3307 break;
3308 }
3309
a7519a3c 3310 /* We can always optimize 16-bit displacements. */
252b5132 3311
a7519a3c
RH
3312 /* Extract the displacement from the instruction, sign-extending
3313 it if necessary, then test whether it is within 16 or 32 bits
3314 displacement from GP. */
3315 insn_disp = ((insn & 0xffff) ^ 0x8000) - 0x8000;
3316
3317 xdisp = disp + insn_disp;
3318 fits16 = (xdisp >= - (bfd_signed_vma) 0x8000 && xdisp < 0x8000);
3319 fits32 = (xdisp >= - (bfd_signed_vma) 0x80000000
3320 && xdisp < 0x7fff8000);
3321
3322 if (fits16)
3323 {
3324 /* Take the op code and dest from this insn, take the base
3325 register from the literal insn. Leave the offset alone. */
3326 insn = (insn & 0xffe0ffff) | (lit_insn & 0x001f0000);
d1c109de
RH
3327 bfd_put_32 (abfd, (bfd_vma) insn, contents + urel_r_offset);
3328 changed_contents = TRUE;
3329
3330 nrel = *urel;
3331 nrel.r_info = ELF64_R_INFO (ELF64_R_SYM (irel->r_info),
3332 R_ALPHA_GPREL16);
3333 nrel.r_addend = irel->r_addend;
3334
3335 /* As we adjust, move the reloc to the end so that we don't
3336 break the LITERAL+LITUSE chain. */
3337 if (urel < --erel)
3338 *urel-- = *erel;
3339 *erel = nrel;
3340 changed_relocs = TRUE;
252b5132 3341 }
252b5132 3342
a7519a3c
RH
3343 /* If all mem+byte, we can optimize 32-bit mem displacements. */
3344 else if (fits32 && !(flags & ~6))
3345 {
3346 /* FIXME: sanity check that lit insn Ra is mem insn Rb. */
252b5132 3347
a7519a3c
RH
3348 irel->r_info = ELF64_R_INFO (ELF64_R_SYM (irel->r_info),
3349 R_ALPHA_GPRELHIGH);
3350 lit_insn = (OP_LDAH << 26) | (lit_insn & 0x03ff0000);
d1c109de 3351 bfd_put_32 (abfd, (bfd_vma) lit_insn, contents + irel->r_offset);
a7519a3c 3352 lit_reused = TRUE;
d1c109de 3353 changed_contents = TRUE;
252b5132 3354
d1c109de
RH
3355 /* Since all relocs must be optimized, don't bother swapping
3356 this relocation to the end. */
a7519a3c
RH
3357 urel->r_info = ELF64_R_INFO (ELF64_R_SYM (irel->r_info),
3358 R_ALPHA_GPRELLOW);
3359 urel->r_addend = irel->r_addend;
d1c109de 3360 changed_relocs = TRUE;
a7519a3c
RH
3361 }
3362 else
3363 all_optimized = FALSE;
3364 break;
252b5132 3365
a7519a3c
RH
3366 case LITUSE_ALPHA_BYTOFF:
3367 /* We can always optimize byte instructions. */
252b5132 3368
a7519a3c
RH
3369 /* FIXME: sanity check the insn for byte op. Check that the
3370 literal dest reg is indeed Rb in the byte insn. */
252b5132 3371
a7519a3c
RH
3372 insn &= ~ (unsigned) 0x001ff000;
3373 insn |= ((symval & 7) << 13) | 0x1000;
d1c109de
RH
3374 bfd_put_32 (abfd, (bfd_vma) insn, contents + urel_r_offset);
3375 changed_contents = TRUE;
3376
3377 nrel = *urel;
3378 nrel.r_info = ELF64_R_INFO (0, R_ALPHA_NONE);
3379 nrel.r_addend = 0;
3380
3381 /* As we adjust, move the reloc to the end so that we don't
3382 break the LITERAL+LITUSE chain. */
3383 if (urel < --erel)
3384 *urel-- = *erel;
3385 *erel = nrel;
3386 changed_relocs = TRUE;
a7519a3c 3387 break;
252b5132 3388
a7519a3c
RH
3389 case LITUSE_ALPHA_JSR:
3390 case LITUSE_ALPHA_TLSGD:
3391 case LITUSE_ALPHA_TLSLDM:
8288a39e 3392 case LITUSE_ALPHA_JSRDIRECT:
0d5f9994 3393 {
a7519a3c
RH
3394 bfd_vma optdest, org;
3395 bfd_signed_vma odisp;
252b5132 3396
a7519a3c
RH
3397 /* For undefined weak symbols, we're mostly interested in getting
3398 rid of the got entry whenever possible, so optimize this to a
3399 use of the zero register. */
3400 if (info->h && info->h->root.root.type == bfd_link_hash_undefweak)
3401 {
3402 insn |= 31 << 16;
d1c109de 3403 bfd_put_32 (abfd, (bfd_vma) insn, contents + urel_r_offset);
252b5132 3404
d1c109de 3405 changed_contents = TRUE;
a7519a3c
RH
3406 break;
3407 }
252b5132 3408
a7519a3c
RH
3409 /* If not zero, place to jump without needing pv. */
3410 optdest = elf64_alpha_relax_opt_call (info, symval);
d1c109de 3411 org = sec_output_vma + urel_r_offset + 4;
a7519a3c 3412 odisp = (optdest ? optdest : symval) - org;
252b5132 3413
a7519a3c
RH
3414 if (odisp >= -0x400000 && odisp < 0x400000)
3415 {
3416 Elf_Internal_Rela *xrel;
252b5132 3417
a7519a3c
RH
3418 /* Preserve branch prediction call stack when possible. */
3419 if ((insn & INSN_JSR_MASK) == INSN_JSR)
3420 insn = (OP_BSR << 26) | (insn & 0x03e00000);
3421 else
3422 insn = (OP_BR << 26) | (insn & 0x03e00000);
d1c109de
RH
3423 bfd_put_32 (abfd, (bfd_vma) insn, contents + urel_r_offset);
3424 changed_contents = TRUE;
252b5132 3425
d1c109de
RH
3426 nrel = *urel;
3427 nrel.r_info = ELF64_R_INFO (ELF64_R_SYM (irel->r_info),
3428 R_ALPHA_BRADDR);
3429 nrel.r_addend = irel->r_addend;
252b5132 3430
a7519a3c 3431 if (optdest)
d1c109de 3432 nrel.r_addend += optdest - symval;
a7519a3c
RH
3433 else
3434 all_optimized = FALSE;
252b5132 3435
a7519a3c
RH
3436 /* Kill any HINT reloc that might exist for this insn. */
3437 xrel = (elf64_alpha_find_reloc_at_ofs
d1c109de 3438 (info->relocs, info->relend, urel_r_offset,
a7519a3c
RH
3439 R_ALPHA_HINT));
3440 if (xrel)
3441 xrel->r_info = ELF64_R_INFO (0, R_ALPHA_NONE);
252b5132 3442
d1c109de
RH
3443 /* As we adjust, move the reloc to the end so that we don't
3444 break the LITERAL+LITUSE chain. */
3445 if (urel < --erel)
3446 *urel-- = *erel;
3447 *erel = nrel;
3448
a7519a3c
RH
3449 info->changed_relocs = TRUE;
3450 }
3451 else
3452 all_optimized = FALSE;
252b5132 3453
a7519a3c
RH
3454 /* Even if the target is not in range for a direct branch,
3455 if we share a GP, we can eliminate the gp reload. */
3456 if (optdest)
3457 {
3458 Elf_Internal_Rela *gpdisp
3459 = (elf64_alpha_find_reloc_at_ofs
d1c109de 3460 (info->relocs, irelend, urel_r_offset + 4,
a7519a3c
RH
3461 R_ALPHA_GPDISP));
3462 if (gpdisp)
3463 {
d1c109de 3464 bfd_byte *p_ldah = contents + gpdisp->r_offset;
a7519a3c 3465 bfd_byte *p_lda = p_ldah + gpdisp->r_addend;
d1c109de
RH
3466 unsigned int ldah = bfd_get_32 (abfd, p_ldah);
3467 unsigned int lda = bfd_get_32 (abfd, p_lda);
252b5132 3468
a7519a3c
RH
3469 /* Verify that the instruction is "ldah $29,0($26)".
3470 Consider a function that ends in a noreturn call,
3471 and that the next function begins with an ldgp,
3472 and that by accident there is no padding between.
3473 In that case the insn would use $27 as the base. */
3474 if (ldah == 0x27ba0000 && lda == 0x23bd0000)
3475 {
d1c109de
RH
3476 bfd_put_32 (abfd, (bfd_vma) INSN_UNOP, p_ldah);
3477 bfd_put_32 (abfd, (bfd_vma) INSN_UNOP, p_lda);
252b5132 3478
a7519a3c 3479 gpdisp->r_info = ELF64_R_INFO (0, R_ALPHA_NONE);
d1c109de
RH
3480 changed_contents = TRUE;
3481 changed_relocs = TRUE;
a7519a3c
RH
3482 }
3483 }
3484 }
3485 }
3486 break;
252b5132 3487 }
252b5132
RH
3488 }
3489
d1c109de
RH
3490 /* If we reused the literal instruction, we must have optimized all. */
3491 BFD_ASSERT(!lit_reused || all_optimized);
3492
a7519a3c
RH
3493 /* If all cases were optimized, we can reduce the use count on this
3494 got entry by one, possibly eliminating it. */
3495 if (all_optimized)
252b5132 3496 {
a7519a3c 3497 if (--info->gotent->use_count == 0)
252b5132 3498 {
a7519a3c
RH
3499 int sz = alpha_got_entry_size (R_ALPHA_LITERAL);
3500 alpha_elf_tdata (info->gotobj)->total_got_size -= sz;
3501 if (!info->h)
3502 alpha_elf_tdata (info->gotobj)->local_got_size -= sz;
252b5132 3503 }
a7519a3c
RH
3504
3505 /* If the literal instruction is no longer needed (it may have been
3506 reused. We can eliminate it. */
3507 /* ??? For now, I don't want to deal with compacting the section,
3508 so just nop it out. */
3509 if (!lit_reused)
252b5132 3510 {
a7519a3c 3511 irel->r_info = ELF64_R_INFO (0, R_ALPHA_NONE);
d1c109de 3512 changed_relocs = TRUE;
252b5132 3513
d1c109de
RH
3514 bfd_put_32 (abfd, (bfd_vma) INSN_UNOP, contents + irel->r_offset);
3515 changed_contents = TRUE;
a7519a3c 3516 }
a7519a3c 3517 }
d1c109de
RH
3518
3519 info->changed_contents = changed_contents;
3520 info->changed_relocs = changed_relocs;
3521
3522 if (all_optimized || relax_pass == 0)
3523 return TRUE;
3524 return elf64_alpha_relax_got_load (info, symval, irel, R_ALPHA_LITERAL);
252b5132
RH
3525}
3526
b34976b6 3527static bfd_boolean
a7519a3c
RH
3528elf64_alpha_relax_tls_get_addr (struct alpha_relax_info *info, bfd_vma symval,
3529 Elf_Internal_Rela *irel, bfd_boolean is_gd)
f44f99a5 3530{
a7519a3c 3531 bfd_byte *pos[5];
891caa9b 3532 unsigned int insn, tlsgd_reg;
a7519a3c 3533 Elf_Internal_Rela *gpdisp, *hint;
891caa9b 3534 bfd_boolean dynamic, use_gottprel;
a7519a3c 3535 unsigned long new_symndx;
f44f99a5 3536
a7519a3c 3537 dynamic = alpha_elf_dynamic_symbol_p (&info->h->root, info->link_info);
f44f99a5 3538
a7519a3c
RH
3539 /* If a TLS symbol is accessed using IE at least once, there is no point
3540 to use dynamic model for it. */
3541 if (is_gd && info->h && (info->h->flags & ALPHA_ELF_LINK_HASH_TLS_IE))
3542 ;
f44f99a5 3543
a7519a3c
RH
3544 /* If the symbol is local, and we've already committed to DF_STATIC_TLS,
3545 then we might as well relax to IE. */
0e1862bb 3546 else if (bfd_link_pic (info->link_info) && !dynamic
a7519a3c
RH
3547 && (info->link_info->flags & DF_STATIC_TLS))
3548 ;
f44f99a5 3549
a7519a3c 3550 /* Otherwise we must be building an executable to do anything. */
0e1862bb 3551 else if (bfd_link_pic (info->link_info))
a7519a3c 3552 return TRUE;
f44f99a5 3553
a7519a3c
RH
3554 /* The TLSGD/TLSLDM relocation must be followed by a LITERAL and
3555 the matching LITUSE_TLS relocations. */
3556 if (irel + 2 >= info->relend)
3557 return TRUE;
3558 if (ELF64_R_TYPE (irel[1].r_info) != R_ALPHA_LITERAL
3559 || ELF64_R_TYPE (irel[2].r_info) != R_ALPHA_LITUSE
3560 || irel[2].r_addend != (is_gd ? LITUSE_ALPHA_TLSGD : LITUSE_ALPHA_TLSLDM))
3561 return TRUE;
f44f99a5 3562
a7519a3c
RH
3563 /* There must be a GPDISP relocation positioned immediately after the
3564 LITUSE relocation. */
3565 gpdisp = elf64_alpha_find_reloc_at_ofs (info->relocs, info->relend,
3566 irel[2].r_offset + 4, R_ALPHA_GPDISP);
3567 if (!gpdisp)
b34976b6 3568 return TRUE;
f44f99a5 3569
a7519a3c
RH
3570 pos[0] = info->contents + irel[0].r_offset;
3571 pos[1] = info->contents + irel[1].r_offset;
3572 pos[2] = info->contents + irel[2].r_offset;
3573 pos[3] = info->contents + gpdisp->r_offset;
3574 pos[4] = pos[3] + gpdisp->r_addend;
f44f99a5 3575
7dbf3b76
RH
3576 /* Beware of the compiler hoisting part of the sequence out a loop
3577 and adjusting the destination register for the TLSGD insn. If this
3578 happens, there will be a move into $16 before the JSR insn, so only
3579 transformations of the first insn pair should use this register. */
3580 tlsgd_reg = bfd_get_32 (info->abfd, pos[0]);
3581 tlsgd_reg = (tlsgd_reg >> 21) & 31;
3582
a7519a3c
RH
3583 /* Generally, the positions are not allowed to be out of order, lest the
3584 modified insn sequence have different register lifetimes. We can make
3585 an exception when pos 1 is adjacent to pos 0. */
3586 if (pos[1] + 4 == pos[0])
f44f99a5 3587 {
a7519a3c
RH
3588 bfd_byte *tmp = pos[0];
3589 pos[0] = pos[1];
3590 pos[1] = tmp;
f44f99a5 3591 }
a7519a3c
RH
3592 if (pos[1] >= pos[2] || pos[2] >= pos[3])
3593 return TRUE;
cc03ec80 3594
a7519a3c
RH
3595 /* Reduce the use count on the LITERAL relocation. Do this before we
3596 smash the symndx when we adjust the relocations below. */
3597 {
3598 struct alpha_elf_got_entry *lit_gotent;
3599 struct alpha_elf_link_hash_entry *lit_h;
3600 unsigned long indx;
f44f99a5 3601
a7519a3c
RH
3602 BFD_ASSERT (ELF64_R_SYM (irel[1].r_info) >= info->symtab_hdr->sh_info);
3603 indx = ELF64_R_SYM (irel[1].r_info) - info->symtab_hdr->sh_info;
3604 lit_h = alpha_elf_sym_hashes (info->abfd)[indx];
f44f99a5 3605
a7519a3c
RH
3606 while (lit_h->root.root.type == bfd_link_hash_indirect
3607 || lit_h->root.root.type == bfd_link_hash_warning)
3608 lit_h = (struct alpha_elf_link_hash_entry *) lit_h->root.root.u.i.link;
252b5132 3609
a7519a3c
RH
3610 for (lit_gotent = lit_h->got_entries; lit_gotent ;
3611 lit_gotent = lit_gotent->next)
3612 if (lit_gotent->gotobj == info->gotobj
3613 && lit_gotent->reloc_type == R_ALPHA_LITERAL
3614 && lit_gotent->addend == irel[1].r_addend)
3615 break;
3616 BFD_ASSERT (lit_gotent);
252b5132 3617
a7519a3c
RH
3618 if (--lit_gotent->use_count == 0)
3619 {
3620 int sz = alpha_got_entry_size (R_ALPHA_LITERAL);
3621 alpha_elf_tdata (info->gotobj)->total_got_size -= sz;
3622 }
3623 }
252b5132 3624
a7519a3c 3625 /* Change
252b5132 3626
a7519a3c
RH
3627 lda $16,x($gp) !tlsgd!1
3628 ldq $27,__tls_get_addr($gp) !literal!1
3629 jsr $26,($27),__tls_get_addr !lituse_tlsgd!1
3630 ldah $29,0($26) !gpdisp!2
3631 lda $29,0($29) !gpdisp!2
3632 to
3633 ldq $16,x($gp) !gottprel
3634 unop
3635 call_pal rduniq
3636 addq $16,$0,$0
3637 unop
3638 or the first pair to
3639 lda $16,x($gp) !tprel
3640 unop
3641 or
3642 ldah $16,x($gp) !tprelhi
3643 lda $16,x($16) !tprello
3644
3645 as appropriate. */
3646
3647 use_gottprel = FALSE;
cf35638d 3648 new_symndx = is_gd ? ELF64_R_SYM (irel->r_info) : STN_UNDEF;
891caa9b 3649
9a757e4d
RM
3650 /* Some compilers warn about a Boolean-looking expression being
3651 used in a switch. The explicit cast silences them. */
0e1862bb 3652 switch ((int) (!dynamic && !bfd_link_pic (info->link_info)))
252b5132 3653 {
a7519a3c
RH
3654 case 1:
3655 {
3656 bfd_vma tp_base;
3657 bfd_signed_vma disp;
252b5132 3658
a7519a3c
RH
3659 BFD_ASSERT (elf_hash_table (info->link_info)->tls_sec != NULL);
3660 tp_base = alpha_get_tprel_base (info->link_info);
3661 disp = symval - tp_base;
252b5132 3662
a7519a3c
RH
3663 if (disp >= -0x8000 && disp < 0x8000)
3664 {
891caa9b 3665 insn = (OP_LDA << 26) | (tlsgd_reg << 21) | (31 << 16);
a7519a3c
RH
3666 bfd_put_32 (info->abfd, (bfd_vma) insn, pos[0]);
3667 bfd_put_32 (info->abfd, (bfd_vma) INSN_UNOP, pos[1]);
3765b1be 3668
a7519a3c
RH
3669 irel[0].r_offset = pos[0] - info->contents;
3670 irel[0].r_info = ELF64_R_INFO (new_symndx, R_ALPHA_TPREL16);
3671 irel[1].r_info = ELF64_R_INFO (0, R_ALPHA_NONE);
3672 break;
3673 }
3674 else if (disp >= -(bfd_signed_vma) 0x80000000
3675 && disp < (bfd_signed_vma) 0x7fff8000
891caa9b 3676 && pos[0] + 4 == pos[1])
a7519a3c 3677 {
891caa9b 3678 insn = (OP_LDAH << 26) | (tlsgd_reg << 21) | (31 << 16);
a7519a3c 3679 bfd_put_32 (info->abfd, (bfd_vma) insn, pos[0]);
891caa9b 3680 insn = (OP_LDA << 26) | (tlsgd_reg << 21) | (tlsgd_reg << 16);
a7519a3c 3681 bfd_put_32 (info->abfd, (bfd_vma) insn, pos[1]);
3765b1be 3682
a7519a3c
RH
3683 irel[0].r_offset = pos[0] - info->contents;
3684 irel[0].r_info = ELF64_R_INFO (new_symndx, R_ALPHA_TPRELHI);
3685 irel[1].r_offset = pos[1] - info->contents;
3686 irel[1].r_info = ELF64_R_INFO (new_symndx, R_ALPHA_TPRELLO);
3687 break;
3688 }
3689 }
3690 /* FALLTHRU */
3765b1be 3691
3765b1be 3692 default:
a7519a3c
RH
3693 use_gottprel = TRUE;
3694
891caa9b 3695 insn = (OP_LDQ << 26) | (tlsgd_reg << 21) | (29 << 16);
a7519a3c
RH
3696 bfd_put_32 (info->abfd, (bfd_vma) insn, pos[0]);
3697 bfd_put_32 (info->abfd, (bfd_vma) INSN_UNOP, pos[1]);
3698
3699 irel[0].r_offset = pos[0] - info->contents;
3700 irel[0].r_info = ELF64_R_INFO (new_symndx, R_ALPHA_GOTTPREL);
3701 irel[1].r_info = ELF64_R_INFO (0, R_ALPHA_NONE);
3702 break;
3765b1be 3703 }
3765b1be 3704
a7519a3c 3705 bfd_put_32 (info->abfd, (bfd_vma) INSN_RDUNIQ, pos[2]);
252b5132 3706
a7519a3c
RH
3707 insn = INSN_ADDQ | (16 << 21) | (0 << 16) | (0 << 0);
3708 bfd_put_32 (info->abfd, (bfd_vma) insn, pos[3]);
3765b1be 3709
a7519a3c 3710 bfd_put_32 (info->abfd, (bfd_vma) INSN_UNOP, pos[4]);
e92d460e 3711
a7519a3c
RH
3712 irel[2].r_info = ELF64_R_INFO (0, R_ALPHA_NONE);
3713 gpdisp->r_info = ELF64_R_INFO (0, R_ALPHA_NONE);
252b5132 3714
a7519a3c
RH
3715 hint = elf64_alpha_find_reloc_at_ofs (info->relocs, info->relend,
3716 irel[2].r_offset, R_ALPHA_HINT);
3717 if (hint)
3718 hint->r_info = ELF64_R_INFO (0, R_ALPHA_NONE);
252b5132 3719
a7519a3c
RH
3720 info->changed_contents = TRUE;
3721 info->changed_relocs = TRUE;
d6ad34f6 3722
a7519a3c
RH
3723 /* Reduce the use count on the TLSGD/TLSLDM relocation. */
3724 if (--info->gotent->use_count == 0)
3765b1be 3725 {
a7519a3c
RH
3726 int sz = alpha_got_entry_size (info->gotent->reloc_type);
3727 alpha_elf_tdata (info->gotobj)->total_got_size -= sz;
3728 if (!info->h)
3729 alpha_elf_tdata (info->gotobj)->local_got_size -= sz;
3765b1be 3730 }
252b5132 3731
a7519a3c
RH
3732 /* If we've switched to a GOTTPREL relocation, increment the reference
3733 count on that got entry. */
3734 if (use_gottprel)
f44f99a5 3735 {
a7519a3c 3736 struct alpha_elf_got_entry *tprel_gotent;
f44f99a5 3737
a7519a3c
RH
3738 for (tprel_gotent = *info->first_gotent; tprel_gotent ;
3739 tprel_gotent = tprel_gotent->next)
3740 if (tprel_gotent->gotobj == info->gotobj
3741 && tprel_gotent->reloc_type == R_ALPHA_GOTTPREL
3742 && tprel_gotent->addend == irel->r_addend)
3743 break;
3744 if (tprel_gotent)
3745 tprel_gotent->use_count++;
3746 else
f44f99a5 3747 {
a7519a3c
RH
3748 if (info->gotent->use_count == 0)
3749 tprel_gotent = info->gotent;
3750 else
3751 {
3752 tprel_gotent = (struct alpha_elf_got_entry *)
3753 bfd_alloc (info->abfd, sizeof (struct alpha_elf_got_entry));
3754 if (!tprel_gotent)
3755 return FALSE;
f44f99a5 3756
a7519a3c
RH
3757 tprel_gotent->next = *info->first_gotent;
3758 *info->first_gotent = tprel_gotent;
f44f99a5 3759
a7519a3c
RH
3760 tprel_gotent->gotobj = info->gotobj;
3761 tprel_gotent->addend = irel->r_addend;
3762 tprel_gotent->got_offset = -1;
3763 tprel_gotent->reloc_done = 0;
3764 tprel_gotent->reloc_xlated = 0;
3765 }
f44f99a5 3766
a7519a3c
RH
3767 tprel_gotent->use_count = 1;
3768 tprel_gotent->reloc_type = R_ALPHA_GOTTPREL;
3769 }
f44f99a5 3770 }
f44f99a5 3771
b34976b6 3772 return TRUE;
f44f99a5
RH
3773}
3774
b34976b6 3775static bfd_boolean
a7519a3c
RH
3776elf64_alpha_relax_section (bfd *abfd, asection *sec,
3777 struct bfd_link_info *link_info, bfd_boolean *again)
f44f99a5 3778{
a7519a3c
RH
3779 Elf_Internal_Shdr *symtab_hdr;
3780 Elf_Internal_Rela *internal_relocs;
3781 Elf_Internal_Rela *irel, *irelend;
3782 Elf_Internal_Sym *isymbuf = NULL;
3783 struct alpha_elf_got_entry **local_got_entries;
3784 struct alpha_relax_info info;
4dfe6ac6 3785 struct alpha_elf_link_hash_table * htab;
d1c109de 3786 int relax_pass;
4dfe6ac6
NC
3787
3788 htab = alpha_elf_hash_table (link_info);
3789 if (htab == NULL)
3790 return FALSE;
f44f99a5 3791
4a828aab 3792 /* There's nothing to change, yet. */
a7519a3c 3793 *again = FALSE;
f44f99a5 3794
0e1862bb 3795 if (bfd_link_relocatable (link_info)
a7519a3c
RH
3796 || ((sec->flags & (SEC_CODE | SEC_RELOC | SEC_ALLOC))
3797 != (SEC_CODE | SEC_RELOC | SEC_ALLOC))
3798 || sec->reloc_count == 0)
d6ad34f6
RH
3799 return TRUE;
3800
0ffa91dd 3801 BFD_ASSERT (is_alpha_elf (abfd));
d1c109de 3802 relax_pass = link_info->relax_pass;
0ffa91dd 3803
4a828aab 3804 /* Make sure our GOT and PLT tables are up-to-date. */
4dfe6ac6 3805 if (htab->relax_trip != link_info->relax_trip)
4a828aab 3806 {
4dfe6ac6 3807 htab->relax_trip = link_info->relax_trip;
4a828aab 3808
d1c109de
RH
3809 /* This should never fail after the initial round, since the only error
3810 is GOT overflow, and relaxation only shrinks the table. However, we
3811 may only merge got sections during the first pass. If we merge
3812 sections after we've created GPREL relocs, the GP for the merged
3813 section backs up which may put the relocs out of range. */
3814 if (!elf64_alpha_size_got_sections (link_info, relax_pass == 0))
4a828aab
RH
3815 abort ();
3816 if (elf_hash_table (link_info)->dynamic_sections_created)
3817 {
3818 elf64_alpha_size_plt_section (link_info);
3819 elf64_alpha_size_rela_got_section (link_info);
3820 }
3821 }
3822
0ffa91dd 3823 symtab_hdr = &elf_symtab_hdr (abfd);
a7519a3c 3824 local_got_entries = alpha_elf_tdata(abfd)->local_got_entries;
252b5132 3825
a7519a3c
RH
3826 /* Load the relocations for this section. */
3827 internal_relocs = (_bfd_elf_link_read_relocs
2c3fc389 3828 (abfd, sec, NULL, (Elf_Internal_Rela *) NULL,
a7519a3c
RH
3829 link_info->keep_memory));
3830 if (internal_relocs == NULL)
3831 return FALSE;
252b5132 3832
a7519a3c
RH
3833 memset(&info, 0, sizeof (info));
3834 info.abfd = abfd;
3835 info.sec = sec;
3836 info.link_info = link_info;
3837 info.symtab_hdr = symtab_hdr;
3838 info.relocs = internal_relocs;
3839 info.relend = irelend = internal_relocs + sec->reloc_count;
3840
3841 /* Find the GP for this object. Do not store the result back via
3842 _bfd_set_gp_value, since this could change again before final. */
3843 info.gotobj = alpha_elf_tdata (abfd)->gotobj;
3844 if (info.gotobj)
3765b1be 3845 {
a7519a3c
RH
3846 asection *sgot = alpha_elf_tdata (info.gotobj)->got;
3847 info.gp = (sgot->output_section->vma
3848 + sgot->output_offset
3849 + 0x8000);
252b5132
RH
3850 }
3851
a7519a3c
RH
3852 /* Get the section contents. */
3853 if (elf_section_data (sec)->this_hdr.contents != NULL)
3854 info.contents = elf_section_data (sec)->this_hdr.contents;
3855 else
3856 {
3857 if (!bfd_malloc_and_get_section (abfd, sec, &info.contents))
3858 goto error_return;
3859 }
252b5132 3860
a7519a3c
RH
3861 for (irel = internal_relocs; irel < irelend; irel++)
3862 {
3863 bfd_vma symval;
3864 struct alpha_elf_got_entry *gotent;
3865 unsigned long r_type = ELF64_R_TYPE (irel->r_info);
3866 unsigned long r_symndx = ELF64_R_SYM (irel->r_info);
3867
3868 /* Early exit for unhandled or unrelaxable relocations. */
d1c109de
RH
3869 if (r_type != R_ALPHA_LITERAL)
3870 {
3871 /* We complete everything except LITERAL in the first pass. */
3872 if (relax_pass != 0)
3873 continue;
3874 if (r_type == R_ALPHA_TLSLDM)
3875 {
3876 /* The symbol for a TLSLDM reloc is ignored. Collapse the
3877 reloc to the STN_UNDEF (0) symbol so that they all match. */
3878 r_symndx = STN_UNDEF;
3879 }
3880 else if (r_type != R_ALPHA_GOTDTPREL
3881 && r_type != R_ALPHA_GOTTPREL
3882 && r_type != R_ALPHA_TLSGD)
3883 continue;
a7519a3c
RH
3884 }
3885
3886 /* Get the value of the symbol referred to by the reloc. */
3887 if (r_symndx < symtab_hdr->sh_info)
3888 {
3889 /* A local symbol. */
3890 Elf_Internal_Sym *isym;
3891
3892 /* Read this BFD's local symbols. */
3893 if (isymbuf == NULL)
3894 {
3895 isymbuf = (Elf_Internal_Sym *) symtab_hdr->contents;
3896 if (isymbuf == NULL)
3897 isymbuf = bfd_elf_get_elf_syms (abfd, symtab_hdr,
3898 symtab_hdr->sh_info, 0,
3899 NULL, NULL, NULL);
3900 if (isymbuf == NULL)
3901 goto error_return;
3902 }
252b5132 3903
a7519a3c 3904 isym = isymbuf + r_symndx;
252b5132 3905
a7519a3c
RH
3906 /* Given the symbol for a TLSLDM reloc is ignored, this also
3907 means forcing the symbol value to the tp base. */
3908 if (r_type == R_ALPHA_TLSLDM)
3909 {
3910 info.tsec = bfd_abs_section_ptr;
3911 symval = alpha_get_tprel_base (info.link_info);
3912 }
3913 else
3914 {
3915 symval = isym->st_value;
3916 if (isym->st_shndx == SHN_UNDEF)
3917 continue;
3918 else if (isym->st_shndx == SHN_ABS)
3919 info.tsec = bfd_abs_section_ptr;
3920 else if (isym->st_shndx == SHN_COMMON)
3921 info.tsec = bfd_com_section_ptr;
3922 else
3923 info.tsec = bfd_section_from_elf_index (abfd, isym->st_shndx);
3924 }
252b5132 3925
a7519a3c
RH
3926 info.h = NULL;
3927 info.other = isym->st_other;
3928 if (local_got_entries)
3929 info.first_gotent = &local_got_entries[r_symndx];
3930 else
3931 {
3932 info.first_gotent = &info.gotent;
3933 info.gotent = NULL;
3934 }
252b5132 3935 }
a7519a3c
RH
3936 else
3937 {
3938 unsigned long indx;
3939 struct alpha_elf_link_hash_entry *h;
252b5132 3940
a7519a3c
RH
3941 indx = r_symndx - symtab_hdr->sh_info;
3942 h = alpha_elf_sym_hashes (abfd)[indx];
3943 BFD_ASSERT (h != NULL);
252b5132 3944
a7519a3c
RH
3945 while (h->root.root.type == bfd_link_hash_indirect
3946 || h->root.root.type == bfd_link_hash_warning)
3947 h = (struct alpha_elf_link_hash_entry *)h->root.root.u.i.link;
252b5132 3948
a7519a3c
RH
3949 /* If the symbol is undefined, we can't do anything with it. */
3950 if (h->root.root.type == bfd_link_hash_undefined)
3951 continue;
252b5132 3952
a7519a3c
RH
3953 /* If the symbol isn't defined in the current module,
3954 again we can't do anything. */
3955 if (h->root.root.type == bfd_link_hash_undefweak)
3956 {
3957 info.tsec = bfd_abs_section_ptr;
3958 symval = 0;
3959 }
3960 else if (!h->root.def_regular)
3961 {
3962 /* Except for TLSGD relocs, which can sometimes be
3963 relaxed to GOTTPREL relocs. */
3964 if (r_type != R_ALPHA_TLSGD)
3965 continue;
3966 info.tsec = bfd_abs_section_ptr;
3967 symval = 0;
3968 }
3969 else
3970 {
3971 info.tsec = h->root.root.u.def.section;
3972 symval = h->root.root.u.def.value;
3973 }
252b5132 3974
a7519a3c
RH
3975 info.h = h;
3976 info.other = h->root.other;
3977 info.first_gotent = &h->got_entries;
3978 }
252b5132 3979
a7519a3c
RH
3980 /* Search for the got entry to be used by this relocation. */
3981 for (gotent = *info.first_gotent; gotent ; gotent = gotent->next)
3982 if (gotent->gotobj == info.gotobj
3983 && gotent->reloc_type == r_type
3984 && gotent->addend == irel->r_addend)
3985 break;
3986 info.gotent = gotent;
252b5132 3987
a7519a3c
RH
3988 symval += info.tsec->output_section->vma + info.tsec->output_offset;
3989 symval += irel->r_addend;
252b5132 3990
a7519a3c 3991 switch (r_type)
252b5132 3992 {
a7519a3c
RH
3993 case R_ALPHA_LITERAL:
3994 BFD_ASSERT(info.gotent != NULL);
252b5132 3995
a7519a3c
RH
3996 /* If there exist LITUSE relocations immediately following, this
3997 opens up all sorts of interesting optimizations, because we
3998 now know every location that this address load is used. */
3999 if (irel+1 < irelend
4000 && ELF64_R_TYPE (irel[1].r_info) == R_ALPHA_LITUSE)
252b5132 4001 {
a7519a3c
RH
4002 if (!elf64_alpha_relax_with_lituse (&info, symval, irel))
4003 goto error_return;
252b5132 4004 }
a7519a3c
RH
4005 else
4006 {
4007 if (!elf64_alpha_relax_got_load (&info, symval, irel, r_type))
4008 goto error_return;
4009 }
4010 break;
252b5132 4011
a7519a3c
RH
4012 case R_ALPHA_GOTDTPREL:
4013 case R_ALPHA_GOTTPREL:
4014 BFD_ASSERT(info.gotent != NULL);
4015 if (!elf64_alpha_relax_got_load (&info, symval, irel, r_type))
4016 goto error_return;
4017 break;
4018
4019 case R_ALPHA_TLSGD:
4020 case R_ALPHA_TLSLDM:
4021 BFD_ASSERT(info.gotent != NULL);
4022 if (!elf64_alpha_relax_tls_get_addr (&info, symval, irel,
4023 r_type == R_ALPHA_TLSGD))
4024 goto error_return;
4025 break;
252b5132
RH
4026 }
4027 }
4028
a7519a3c
RH
4029 if (isymbuf != NULL
4030 && symtab_hdr->contents != (unsigned char *) isymbuf)
4031 {
4032 if (!link_info->keep_memory)
4033 free (isymbuf);
4034 else
252b5132 4035 {
a7519a3c
RH
4036 /* Cache the symbols for elf_link_input_bfd. */
4037 symtab_hdr->contents = (unsigned char *) isymbuf;
252b5132 4038 }
a7519a3c 4039 }
252b5132 4040
a7519a3c
RH
4041 if (info.contents != NULL
4042 && elf_section_data (sec)->this_hdr.contents != info.contents)
4043 {
4044 if (!info.changed_contents && !link_info->keep_memory)
4045 free (info.contents);
4046 else
252b5132 4047 {
a7519a3c
RH
4048 /* Cache the section contents for elf_link_input_bfd. */
4049 elf_section_data (sec)->this_hdr.contents = info.contents;
252b5132 4050 }
a7519a3c 4051 }
252b5132 4052
a7519a3c
RH
4053 if (elf_section_data (sec)->relocs != internal_relocs)
4054 {
4055 if (!info.changed_relocs)
4056 free (internal_relocs);
4057 else
4058 elf_section_data (sec)->relocs = internal_relocs;
252b5132 4059 }
a7519a3c
RH
4060
4061 *again = info.changed_contents || info.changed_relocs;
252b5132 4062
b34976b6 4063 return TRUE;
252b5132 4064
a7519a3c
RH
4065 error_return:
4066 if (isymbuf != NULL
4067 && symtab_hdr->contents != (unsigned char *) isymbuf)
4068 free (isymbuf);
4069 if (info.contents != NULL
4070 && elf_section_data (sec)->this_hdr.contents != info.contents)
4071 free (info.contents);
4072 if (internal_relocs != NULL
4073 && elf_section_data (sec)->relocs != internal_relocs)
4074 free (internal_relocs);
4075 return FALSE;
4076}
4077\f
1bbc9cec
RH
4078/* Emit a dynamic relocation for (DYNINDX, RTYPE, ADDEND) at (SEC, OFFSET)
4079 into the next available slot in SREL. */
4080
4081static void
a7519a3c
RH
4082elf64_alpha_emit_dynrel (bfd *abfd, struct bfd_link_info *info,
4083 asection *sec, asection *srel, bfd_vma offset,
4084 long dynindx, long rtype, bfd_vma addend)
1bbc9cec
RH
4085{
4086 Elf_Internal_Rela outrel;
4087 bfd_byte *loc;
4088
4089 BFD_ASSERT (srel != NULL);
4090
4091 outrel.r_info = ELF64_R_INFO (dynindx, rtype);
4092 outrel.r_addend = addend;
4093
4094 offset = _bfd_elf_section_offset (abfd, info, sec, offset);
4095 if ((offset | 1) != (bfd_vma) -1)
4096 outrel.r_offset = sec->output_section->vma + sec->output_offset + offset;
4097 else
4098 memset (&outrel, 0, sizeof (outrel));
4099
4100 loc = srel->contents;
4101 loc += srel->reloc_count++ * sizeof (Elf64_External_Rela);
4102 bfd_elf64_swap_reloca_out (abfd, &outrel, loc);
eea6121a 4103 BFD_ASSERT (sizeof (Elf64_External_Rela) * srel->reloc_count <= srel->size);
1bbc9cec
RH
4104}
4105
4a67a098
RH
4106/* Relocate an Alpha ELF section for a relocatable link.
4107
4108 We don't have to change anything unless the reloc is against a section
4109 symbol, in which case we have to adjust according to where the section
4110 symbol winds up in the output section. */
4111
b34976b6 4112static bfd_boolean
a7519a3c
RH
4113elf64_alpha_relocate_section_r (bfd *output_bfd ATTRIBUTE_UNUSED,
4114 struct bfd_link_info *info ATTRIBUTE_UNUSED,
4115 bfd *input_bfd, asection *input_section,
4116 bfd_byte *contents ATTRIBUTE_UNUSED,
4117 Elf_Internal_Rela *relocs,
4118 Elf_Internal_Sym *local_syms,
4119 asection **local_sections)
4a67a098
RH
4120{
4121 unsigned long symtab_hdr_sh_info;
4122 Elf_Internal_Rela *rel;
4123 Elf_Internal_Rela *relend;
ab96bf03 4124 struct elf_link_hash_entry **sym_hashes;
b34976b6 4125 bfd_boolean ret_val = TRUE;
4a67a098 4126
0ffa91dd 4127 symtab_hdr_sh_info = elf_symtab_hdr (input_bfd).sh_info;
ab96bf03 4128 sym_hashes = elf_sym_hashes (input_bfd);
4a67a098
RH
4129
4130 relend = relocs + input_section->reloc_count;
4131 for (rel = relocs; rel < relend; rel++)
4132 {
4133 unsigned long r_symndx;
4134 Elf_Internal_Sym *sym;
4135 asection *sec;
4136 unsigned long r_type;
4137
ab96bf03 4138 r_type = ELF64_R_TYPE (rel->r_info);
4a67a098
RH
4139 if (r_type >= R_ALPHA_max)
4140 {
4141 (*_bfd_error_handler)
d003868e
AM
4142 (_("%B: unknown relocation type %d"),
4143 input_bfd, (int) r_type);
4a67a098 4144 bfd_set_error (bfd_error_bad_value);
b34976b6 4145 ret_val = FALSE;
4a67a098
RH
4146 continue;
4147 }
4148
4a67a098
RH
4149 /* The symbol associated with GPDISP and LITUSE is
4150 immaterial. Only the addend is significant. */
4151 if (r_type == R_ALPHA_GPDISP || r_type == R_ALPHA_LITUSE)
4152 continue;
4153
ab96bf03 4154 r_symndx = ELF64_R_SYM (rel->r_info);
4a67a098
RH
4155 if (r_symndx < symtab_hdr_sh_info)
4156 {
4157 sym = local_syms + r_symndx;
ab96bf03 4158 sec = local_sections[r_symndx];
4a67a098 4159 }
ab96bf03
AM
4160 else
4161 {
4162 struct elf_link_hash_entry *h;
4163
4164 h = sym_hashes[r_symndx - symtab_hdr_sh_info];
4165
4166 while (h->root.type == bfd_link_hash_indirect
4167 || h->root.type == bfd_link_hash_warning)
4168 h = (struct elf_link_hash_entry *) h->root.u.i.link;
4169
4170 if (h->root.type != bfd_link_hash_defined
4171 && h->root.type != bfd_link_hash_defweak)
4172 continue;
4173
4174 sym = NULL;
4175 sec = h->root.u.def.section;
4176 }
4177
dbaa2011 4178 if (sec != NULL && discarded_section (sec))
e4067dbb 4179 RELOC_AGAINST_DISCARDED_SECTION (info, input_bfd, input_section,
545fd46b
MR
4180 rel, 1, relend,
4181 elf64_alpha_howto_table + r_type, 0,
e4067dbb 4182 contents);
ab96bf03
AM
4183
4184 if (sym != NULL && ELF_ST_TYPE (sym->st_info) == STT_SECTION)
4185 rel->r_addend += sec->output_offset;
4a67a098
RH
4186 }
4187
4188 return ret_val;
4189}
4190
252b5132
RH
4191/* Relocate an Alpha ELF section. */
4192
b34976b6 4193static bfd_boolean
a7519a3c
RH
4194elf64_alpha_relocate_section (bfd *output_bfd, struct bfd_link_info *info,
4195 bfd *input_bfd, asection *input_section,
4196 bfd_byte *contents, Elf_Internal_Rela *relocs,
4197 Elf_Internal_Sym *local_syms,
4198 asection **local_sections)
252b5132 4199{
4a67a098 4200 Elf_Internal_Shdr *symtab_hdr;
252b5132
RH
4201 Elf_Internal_Rela *rel;
4202 Elf_Internal_Rela *relend;
4a67a098
RH
4203 asection *sgot, *srel, *srelgot;
4204 bfd *dynobj, *gotobj;
4205 bfd_vma gp, tp_base, dtp_base;
4206 struct alpha_elf_got_entry **local_got_entries;
b34976b6 4207 bfd_boolean ret_val;
252b5132 4208
0ffa91dd 4209 BFD_ASSERT (is_alpha_elf (input_bfd));
68ffbac6 4210
4a67a098 4211 /* Handle relocatable links with a smaller loop. */
0e1862bb 4212 if (bfd_link_relocatable (info))
4a67a098
RH
4213 return elf64_alpha_relocate_section_r (output_bfd, info, input_bfd,
4214 input_section, contents, relocs,
4215 local_syms, local_sections);
4216
4217 /* This is a final link. */
4218
b34976b6 4219 ret_val = TRUE;
252b5132 4220
0ffa91dd 4221 symtab_hdr = &elf_symtab_hdr (input_bfd);
3765b1be 4222
4a67a098
RH
4223 dynobj = elf_hash_table (info)->dynobj;
4224 if (dynobj)
3d4d4302 4225 srelgot = bfd_get_linker_section (dynobj, ".rela.got");
4a67a098
RH
4226 else
4227 srelgot = NULL;
4228
3241278a
RH
4229 if (input_section->flags & SEC_ALLOC)
4230 {
4231 const char *section_name;
4232 section_name = (bfd_elf_string_from_elf_section
4233 (input_bfd, elf_elfheader(input_bfd)->e_shstrndx,
d4730f92 4234 _bfd_elf_single_rel_hdr (input_section)->sh_name));
3241278a 4235 BFD_ASSERT(section_name != NULL);
3d4d4302 4236 srel = bfd_get_linker_section (dynobj, section_name);
3241278a
RH
4237 }
4238 else
4239 srel = NULL;
3765b1be 4240
4a67a098
RH
4241 /* Find the gp value for this input bfd. */
4242 gotobj = alpha_elf_tdata (input_bfd)->gotobj;
4243 if (gotobj)
4244 {
4245 sgot = alpha_elf_tdata (gotobj)->got;
4246 gp = _bfd_get_gp_value (gotobj);
4247 if (gp == 0)
252b5132 4248 {
4a67a098
RH
4249 gp = (sgot->output_section->vma
4250 + sgot->output_offset
4251 + 0x8000);
4252 _bfd_set_gp_value (gotobj, gp);
4253 }
4254 }
4255 else
4256 {
4257 sgot = NULL;
4258 gp = 0;
4259 }
3765b1be 4260
4a67a098
RH
4261 local_got_entries = alpha_elf_tdata(input_bfd)->local_got_entries;
4262
e1918d23 4263 if (elf_hash_table (info)->tls_sec != NULL)
4a67a098 4264 {
e1918d23
AM
4265 dtp_base = alpha_get_dtprel_base (info);
4266 tp_base = alpha_get_tprel_base (info);
252b5132 4267 }
4a67a098
RH
4268 else
4269 dtp_base = tp_base = 0;
252b5132 4270
252b5132 4271 relend = relocs + input_section->reloc_count;
4a67a098 4272 for (rel = relocs; rel < relend; rel++)
252b5132 4273 {
4a67a098 4274 struct alpha_elf_link_hash_entry *h = NULL;
3765b1be
RH
4275 struct alpha_elf_got_entry *gotent;
4276 bfd_reloc_status_type r;
252b5132
RH
4277 reloc_howto_type *howto;
4278 unsigned long r_symndx;
4a67a098
RH
4279 Elf_Internal_Sym *sym = NULL;
4280 asection *sec = NULL;
3765b1be 4281 bfd_vma value;
dc810e39 4282 bfd_vma addend;
b34976b6 4283 bfd_boolean dynamic_symbol_p;
1d5316ab 4284 bfd_boolean unresolved_reloc = FALSE;
b34976b6 4285 bfd_boolean undef_weak_ref = FALSE;
3765b1be 4286 unsigned long r_type;
252b5132
RH
4287
4288 r_type = ELF64_R_TYPE(rel->r_info);
3765b1be 4289 if (r_type >= R_ALPHA_max)
252b5132 4290 {
3765b1be 4291 (*_bfd_error_handler)
d003868e
AM
4292 (_("%B: unknown relocation type %d"),
4293 input_bfd, (int) r_type);
252b5132 4294 bfd_set_error (bfd_error_bad_value);
b34976b6 4295 ret_val = FALSE;
3765b1be 4296 continue;
252b5132 4297 }
252b5132 4298
3765b1be 4299 howto = elf64_alpha_howto_table + r_type;
252b5132
RH
4300 r_symndx = ELF64_R_SYM(rel->r_info);
4301
cc03ec80 4302 /* The symbol for a TLSLDM reloc is ignored. Collapse the
cf35638d 4303 reloc to the STN_UNDEF (0) symbol so that they all match. */
cc03ec80 4304 if (r_type == R_ALPHA_TLSLDM)
cf35638d 4305 r_symndx = STN_UNDEF;
cc03ec80 4306
252b5132
RH
4307 if (r_symndx < symtab_hdr->sh_info)
4308 {
8517fae7 4309 asection *msec;
252b5132
RH
4310 sym = local_syms + r_symndx;
4311 sec = local_sections[r_symndx];
8517fae7
AM
4312 msec = sec;
4313 value = _bfd_elf_rela_local_sym (output_bfd, sym, &msec, rel);
3765b1be 4314
cf35638d 4315 /* If this is a tp-relative relocation against sym STN_UNDEF (0),
cc03ec80 4316 this is hackery from relax_section. Force the value to
f915360b 4317 be the tls module base. */
cf35638d 4318 if (r_symndx == STN_UNDEF
cc03ec80
RH
4319 && (r_type == R_ALPHA_TLSLDM
4320 || r_type == R_ALPHA_GOTTPREL
4321 || r_type == R_ALPHA_TPREL64
4322 || r_type == R_ALPHA_TPRELHI
4323 || r_type == R_ALPHA_TPRELLO
4324 || r_type == R_ALPHA_TPREL16))
f915360b 4325 value = dtp_base;
cc03ec80 4326
4a67a098
RH
4327 if (local_got_entries)
4328 gotent = local_got_entries[r_symndx];
4329 else
4330 gotent = NULL;
3765b1be
RH
4331
4332 /* Need to adjust local GOT entries' addends for SEC_MERGE
4333 unless it has been done already. */
4334 if ((sec->flags & SEC_MERGE)
048d873d 4335 && ELF_ST_TYPE (sym->st_info) == STT_SECTION
dbaa2011 4336 && sec->sec_info_type == SEC_INFO_TYPE_MERGE
048d873d
RH
4337 && gotent
4338 && !gotent->reloc_xlated)
3765b1be
RH
4339 {
4340 struct alpha_elf_got_entry *ent;
3765b1be
RH
4341
4342 for (ent = gotent; ent; ent = ent->next)
4343 {
4344 ent->reloc_xlated = 1;
4345 if (ent->use_count == 0)
4346 continue;
4347 msec = sec;
4348 ent->addend =
4349 _bfd_merged_section_offset (output_bfd, &msec,
4350 elf_section_data (sec)->
4351 sec_info,
753731ee 4352 sym->st_value + ent->addend);
3765b1be
RH
4353 ent->addend -= sym->st_value;
4354 ent->addend += msec->output_section->vma
4355 + msec->output_offset
4356 - sec->output_section->vma
4357 - sec->output_offset;
4358 }
4359 }
4360
b34976b6 4361 dynamic_symbol_p = FALSE;
252b5132
RH
4362 }
4363 else
4364 {
62d887d4 4365 bfd_boolean warned, ignored;
560e09e9 4366 struct elf_link_hash_entry *hh;
b2a8e766
AM
4367 struct elf_link_hash_entry **sym_hashes = elf_sym_hashes (input_bfd);
4368
4369 RELOC_FOR_GLOBAL_SYMBOL (info, input_bfd, input_section, rel,
4370 r_symndx, symtab_hdr, sym_hashes,
4371 hh, sec, value,
62d887d4 4372 unresolved_reloc, warned, ignored);
560e09e9
NC
4373
4374 if (warned)
4375 continue;
252b5132 4376
560e09e9
NC
4377 if (value == 0
4378 && ! unresolved_reloc
4379 && hh->root.type == bfd_link_hash_undefweak)
b34976b6 4380 undef_weak_ref = TRUE;
3765b1be 4381
560e09e9 4382 h = (struct alpha_elf_link_hash_entry *) hh;
3765b1be
RH
4383 dynamic_symbol_p = alpha_elf_dynamic_symbol_p (&h->root, info);
4384 gotent = h->got_entries;
252b5132 4385 }
3765b1be 4386
dbaa2011 4387 if (sec != NULL && discarded_section (sec))
e4067dbb 4388 RELOC_AGAINST_DISCARDED_SECTION (info, input_bfd, input_section,
545fd46b 4389 rel, 1, relend, howto, 0, contents);
ab96bf03 4390
252b5132 4391 addend = rel->r_addend;
3765b1be
RH
4392 value += addend;
4393
4394 /* Search for the proper got entry. */
4395 for (; gotent ; gotent = gotent->next)
4396 if (gotent->gotobj == gotobj
4397 && gotent->reloc_type == r_type
4398 && gotent->addend == addend)
4399 break;
252b5132
RH
4400
4401 switch (r_type)
4402 {
4403 case R_ALPHA_GPDISP:
4404 {
4405 bfd_byte *p_ldah, *p_lda;
4406
4407 BFD_ASSERT(gp != 0);
4408
3765b1be
RH
4409 value = (input_section->output_section->vma
4410 + input_section->output_offset
4411 + rel->r_offset);
252b5132 4412
3765b1be 4413 p_ldah = contents + rel->r_offset;
252b5132
RH
4414 p_lda = p_ldah + rel->r_addend;
4415
3765b1be 4416 r = elf64_alpha_do_reloc_gpdisp (input_bfd, gp - value,
252b5132
RH
4417 p_ldah, p_lda);
4418 }
4419 break;
4420
252b5132 4421 case R_ALPHA_LITERAL:
3765b1be
RH
4422 BFD_ASSERT(sgot != NULL);
4423 BFD_ASSERT(gp != 0);
4424 BFD_ASSERT(gotent != NULL);
4425 BFD_ASSERT(gotent->use_count >= 1);
f7460f5f 4426
3765b1be
RH
4427 if (!gotent->reloc_done)
4428 {
4429 gotent->reloc_done = 1;
252b5132 4430
3765b1be
RH
4431 bfd_put_64 (output_bfd, value,
4432 sgot->contents + gotent->got_offset);
252b5132 4433
3765b1be
RH
4434 /* If the symbol has been forced local, output a
4435 RELATIVE reloc, otherwise it will be handled in
4436 finish_dynamic_symbol. */
0e1862bb
L
4437 if (bfd_link_pic (info)
4438 && !dynamic_symbol_p
4439 && !undef_weak_ref)
1bbc9cec
RH
4440 elf64_alpha_emit_dynrel (output_bfd, info, sgot, srelgot,
4441 gotent->got_offset, 0,
4442 R_ALPHA_RELATIVE, value);
3765b1be 4443 }
252b5132 4444
3765b1be
RH
4445 value = (sgot->output_section->vma
4446 + sgot->output_offset
4447 + gotent->got_offset);
4448 value -= gp;
252b5132
RH
4449 goto default_reloc;
4450
4451 case R_ALPHA_GPREL32:
ec1659c8 4452 case R_ALPHA_GPREL16:
252b5132 4453 case R_ALPHA_GPRELLOW:
3765b1be 4454 if (dynamic_symbol_p)
f16fbd61
RH
4455 {
4456 (*_bfd_error_handler)
d003868e
AM
4457 (_("%B: gp-relative relocation against dynamic symbol %s"),
4458 input_bfd, h->root.root.root.string);
b34976b6 4459 ret_val = FALSE;
f16fbd61 4460 }
252b5132 4461 BFD_ASSERT(gp != 0);
3765b1be 4462 value -= gp;
252b5132
RH
4463 goto default_reloc;
4464
4465 case R_ALPHA_GPRELHIGH:
3765b1be 4466 if (dynamic_symbol_p)
f16fbd61
RH
4467 {
4468 (*_bfd_error_handler)
d003868e
AM
4469 (_("%B: gp-relative relocation against dynamic symbol %s"),
4470 input_bfd, h->root.root.root.string);
b34976b6 4471 ret_val = FALSE;
f16fbd61 4472 }
252b5132 4473 BFD_ASSERT(gp != 0);
3765b1be
RH
4474 value -= gp;
4475 value = ((bfd_signed_vma) value >> 16) + ((value >> 15) & 1);
252b5132
RH
4476 goto default_reloc;
4477
252b5132 4478 case R_ALPHA_HINT:
f94952df
RH
4479 /* A call to a dynamic symbol is definitely out of range of
4480 the 16-bit displacement. Don't bother writing anything. */
3765b1be 4481 if (dynamic_symbol_p)
f94952df
RH
4482 {
4483 r = bfd_reloc_ok;
4484 break;
4485 }
3765b1be
RH
4486 /* The regular PC-relative stuff measures from the start of
4487 the instruction rather than the end. */
4488 value -= 4;
4489 goto default_reloc;
f94952df
RH
4490
4491 case R_ALPHA_BRADDR:
3765b1be
RH
4492 if (dynamic_symbol_p)
4493 {
4494 (*_bfd_error_handler)
d003868e
AM
4495 (_("%B: pc-relative relocation against dynamic symbol %s"),
4496 input_bfd, h->root.root.root.string);
b34976b6 4497 ret_val = FALSE;
3765b1be 4498 }
252b5132
RH
4499 /* The regular PC-relative stuff measures from the start of
4500 the instruction rather than the end. */
3765b1be 4501 value -= 4;
252b5132
RH
4502 goto default_reloc;
4503
7793f4d0
RH
4504 case R_ALPHA_BRSGP:
4505 {
4506 int other;
4507 const char *name;
4508
4509 /* The regular PC-relative stuff measures from the start of
4510 the instruction rather than the end. */
3765b1be 4511 value -= 4;
7793f4d0 4512
ccf00ab6
RH
4513 /* The source and destination gp must be the same. Note that
4514 the source will always have an assigned gp, since we forced
4515 one in check_relocs, but that the destination may not, as
cedb70c5 4516 it might not have had any relocations at all. Also take
ccf00ab6
RH
4517 care not to crash if H is an undefined symbol. */
4518 if (h != NULL && sec != NULL
4519 && alpha_elf_tdata (sec->owner)->gotobj
7793f4d0
RH
4520 && gotobj != alpha_elf_tdata (sec->owner)->gotobj)
4521 {
7793f4d0 4522 (*_bfd_error_handler)
d003868e
AM
4523 (_("%B: change in gp: BRSGP %s"),
4524 input_bfd, h->root.root.root.string);
b34976b6 4525 ret_val = FALSE;
7793f4d0
RH
4526 }
4527
4528 /* The symbol should be marked either NOPV or STD_GPLOAD. */
4529 if (h != NULL)
4530 other = h->root.other;
4531 else
4532 other = sym->st_other;
4533 switch (other & STO_ALPHA_STD_GPLOAD)
4534 {
4535 case STO_ALPHA_NOPV:
4536 break;
4537 case STO_ALPHA_STD_GPLOAD:
64e04ecd 4538 value += 8;
7793f4d0
RH
4539 break;
4540 default:
4541 if (h != NULL)
4542 name = h->root.root.root.string;
4543 else
4544 {
4545 name = (bfd_elf_string_from_elf_section
4546 (input_bfd, symtab_hdr->sh_link, sym->st_name));
4547 if (name == NULL)
4548 name = _("<unknown>");
4549 else if (name[0] == 0)
4550 name = bfd_section_name (input_bfd, sec);
4551 }
4552 (*_bfd_error_handler)
d003868e
AM
4553 (_("%B: !samegp reloc against symbol without .prologue: %s"),
4554 input_bfd, name);
b34976b6 4555 ret_val = FALSE;
7793f4d0
RH
4556 break;
4557 }
4558
4559 goto default_reloc;
4560 }
4561
252b5132
RH
4562 case R_ALPHA_REFLONG:
4563 case R_ALPHA_REFQUAD:
3765b1be
RH
4564 case R_ALPHA_DTPREL64:
4565 case R_ALPHA_TPREL64:
252b5132 4566 {
1bbc9cec
RH
4567 long dynindx, dyntype = r_type;
4568 bfd_vma dynaddend;
252b5132
RH
4569
4570 /* Careful here to remember RELATIVE relocations for global
4571 variables for symbolic shared objects. */
4572
3765b1be 4573 if (dynamic_symbol_p)
252b5132
RH
4574 {
4575 BFD_ASSERT(h->root.dynindx != -1);
1bbc9cec
RH
4576 dynindx = h->root.dynindx;
4577 dynaddend = addend;
3765b1be
RH
4578 addend = 0, value = 0;
4579 }
4580 else if (r_type == R_ALPHA_DTPREL64)
4581 {
e1918d23 4582 BFD_ASSERT (elf_hash_table (info)->tls_sec != NULL);
3765b1be
RH
4583 value -= dtp_base;
4584 goto default_reloc;
4585 }
4586 else if (r_type == R_ALPHA_TPREL64)
4587 {
e1918d23 4588 BFD_ASSERT (elf_hash_table (info)->tls_sec != NULL);
0e1862bb 4589 if (!bfd_link_pic (info) || bfd_link_pie (info))
1bbc9cec
RH
4590 {
4591 value -= tp_base;
4592 goto default_reloc;
4593 }
4594 dynindx = 0;
4595 dynaddend = value - dtp_base;
252b5132 4596 }
0e1862bb 4597 else if (bfd_link_pic (info)
cf35638d 4598 && r_symndx != STN_UNDEF
d6ad34f6 4599 && (input_section->flags & SEC_ALLOC)
1d5316ab
AM
4600 && !undef_weak_ref
4601 && !(unresolved_reloc
4602 && (_bfd_elf_section_offset (output_bfd, info,
4603 input_section,
4604 rel->r_offset)
4605 == (bfd_vma) -1)))
252b5132 4606 {
3765b1be
RH
4607 if (r_type == R_ALPHA_REFLONG)
4608 {
4609 (*_bfd_error_handler)
d003868e
AM
4610 (_("%B: unhandled dynamic relocation against %s"),
4611 input_bfd,
3765b1be 4612 h->root.root.root.string);
b34976b6 4613 ret_val = FALSE;
3765b1be 4614 }
1bbc9cec
RH
4615 dynindx = 0;
4616 dyntype = R_ALPHA_RELATIVE;
4617 dynaddend = value;
252b5132
RH
4618 }
4619 else
4620 goto default_reloc;
4621
3241278a
RH
4622 if (input_section->flags & SEC_ALLOC)
4623 elf64_alpha_emit_dynrel (output_bfd, info, input_section,
4624 srel, rel->r_offset, dynindx,
4625 dyntype, dynaddend);
252b5132
RH
4626 }
4627 goto default_reloc;
4628
3765b1be 4629 case R_ALPHA_SREL16:
84de6048
RH
4630 case R_ALPHA_SREL32:
4631 case R_ALPHA_SREL64:
3765b1be
RH
4632 if (dynamic_symbol_p)
4633 {
4634 (*_bfd_error_handler)
d003868e
AM
4635 (_("%B: pc-relative relocation against dynamic symbol %s"),
4636 input_bfd, h->root.root.root.string);
b34976b6 4637 ret_val = FALSE;
3765b1be 4638 }
0e1862bb
L
4639 else if ((bfd_link_pic (info) || bfd_link_pie (info))
4640 && undef_weak_ref)
d6ad34f6
RH
4641 {
4642 (*_bfd_error_handler)
4643 (_("%B: pc-relative relocation against undefined weak symbol %s"),
4644 input_bfd, h->root.root.root.string);
4645 ret_val = FALSE;
4646 }
4647
3765b1be 4648
84de6048
RH
4649 /* ??? .eh_frame references to discarded sections will be smashed
4650 to relocations against SHN_UNDEF. The .eh_frame format allows
4651 NULL to be encoded as 0 in any format, so this works here. */
1d5316ab
AM
4652 if (r_symndx == STN_UNDEF
4653 || (unresolved_reloc
4654 && _bfd_elf_section_offset (output_bfd, info,
4655 input_section,
4656 rel->r_offset) == (bfd_vma) -1))
84de6048
RH
4657 howto = (elf64_alpha_howto_table
4658 + (r_type - R_ALPHA_SREL32 + R_ALPHA_REFLONG));
4659 goto default_reloc;
4660
3765b1be
RH
4661 case R_ALPHA_TLSLDM:
4662 /* Ignore the symbol for the relocation. The result is always
4663 the current module. */
4664 dynamic_symbol_p = 0;
4665 /* FALLTHRU */
4666
4667 case R_ALPHA_TLSGD:
4668 if (!gotent->reloc_done)
4669 {
4670 gotent->reloc_done = 1;
4671
4672 /* Note that the module index for the main program is 1. */
0e1862bb
L
4673 bfd_put_64 (output_bfd,
4674 !bfd_link_pic (info) && !dynamic_symbol_p,
3765b1be
RH
4675 sgot->contents + gotent->got_offset);
4676
4677 /* If the symbol has been forced local, output a
4678 DTPMOD64 reloc, otherwise it will be handled in
4679 finish_dynamic_symbol. */
0e1862bb 4680 if (bfd_link_pic (info) && !dynamic_symbol_p)
1bbc9cec
RH
4681 elf64_alpha_emit_dynrel (output_bfd, info, sgot, srelgot,
4682 gotent->got_offset, 0,
4683 R_ALPHA_DTPMOD64, 0);
3765b1be
RH
4684
4685 if (dynamic_symbol_p || r_type == R_ALPHA_TLSLDM)
4686 value = 0;
4687 else
4688 {
e1918d23 4689 BFD_ASSERT (elf_hash_table (info)->tls_sec != NULL);
3765b1be
RH
4690 value -= dtp_base;
4691 }
4692 bfd_put_64 (output_bfd, value,
4693 sgot->contents + gotent->got_offset + 8);
4694 }
4695
4696 value = (sgot->output_section->vma
4697 + sgot->output_offset
4698 + gotent->got_offset);
4699 value -= gp;
4700 goto default_reloc;
4701
4702 case R_ALPHA_DTPRELHI:
4703 case R_ALPHA_DTPRELLO:
4704 case R_ALPHA_DTPREL16:
4705 if (dynamic_symbol_p)
4706 {
4707 (*_bfd_error_handler)
d003868e
AM
4708 (_("%B: dtp-relative relocation against dynamic symbol %s"),
4709 input_bfd, h->root.root.root.string);
b34976b6 4710 ret_val = FALSE;
3765b1be 4711 }
e1918d23 4712 BFD_ASSERT (elf_hash_table (info)->tls_sec != NULL);
3765b1be 4713 value -= dtp_base;
9e756d64
RH
4714 if (r_type == R_ALPHA_DTPRELHI)
4715 value = ((bfd_signed_vma) value >> 16) + ((value >> 15) & 1);
3765b1be
RH
4716 goto default_reloc;
4717
4718 case R_ALPHA_TPRELHI:
4719 case R_ALPHA_TPRELLO:
4720 case R_ALPHA_TPREL16:
0e1862bb 4721 if (bfd_link_pic (info) && !bfd_link_pie (info))
9e756d64
RH
4722 {
4723 (*_bfd_error_handler)
d003868e
AM
4724 (_("%B: TLS local exec code cannot be linked into shared objects"),
4725 input_bfd);
b34976b6 4726 ret_val = FALSE;
9e756d64
RH
4727 }
4728 else if (dynamic_symbol_p)
3765b1be
RH
4729 {
4730 (*_bfd_error_handler)
d003868e
AM
4731 (_("%B: tp-relative relocation against dynamic symbol %s"),
4732 input_bfd, h->root.root.root.string);
b34976b6 4733 ret_val = FALSE;
3765b1be 4734 }
e1918d23 4735 BFD_ASSERT (elf_hash_table (info)->tls_sec != NULL);
3765b1be 4736 value -= tp_base;
9e756d64
RH
4737 if (r_type == R_ALPHA_TPRELHI)
4738 value = ((bfd_signed_vma) value >> 16) + ((value >> 15) & 1);
3765b1be
RH
4739 goto default_reloc;
4740
4741 case R_ALPHA_GOTDTPREL:
4742 case R_ALPHA_GOTTPREL:
4743 BFD_ASSERT(sgot != NULL);
4744 BFD_ASSERT(gp != 0);
4745 BFD_ASSERT(gotent != NULL);
4746 BFD_ASSERT(gotent->use_count >= 1);
4747
4748 if (!gotent->reloc_done)
4749 {
4750 gotent->reloc_done = 1;
4751
4752 if (dynamic_symbol_p)
4753 value = 0;
4754 else
4755 {
e1918d23 4756 BFD_ASSERT (elf_hash_table (info)->tls_sec != NULL);
1bbc9cec
RH
4757 if (r_type == R_ALPHA_GOTDTPREL)
4758 value -= dtp_base;
0e1862bb 4759 else if (!bfd_link_pic (info))
1bbc9cec
RH
4760 value -= tp_base;
4761 else
4762 {
4763 elf64_alpha_emit_dynrel (output_bfd, info, sgot, srelgot,
4764 gotent->got_offset, 0,
4765 R_ALPHA_TPREL64,
4766 value - dtp_base);
4767 value = 0;
4768 }
3765b1be
RH
4769 }
4770 bfd_put_64 (output_bfd, value,
4771 sgot->contents + gotent->got_offset);
4772 }
4773
4774 value = (sgot->output_section->vma
4775 + sgot->output_offset
4776 + gotent->got_offset);
4777 value -= gp;
4778 goto default_reloc;
4779
252b5132
RH
4780 default:
4781 default_reloc:
4782 r = _bfd_final_link_relocate (howto, input_bfd, input_section,
3765b1be 4783 contents, rel->r_offset, value, 0);
252b5132
RH
4784 break;
4785 }
4786
4787 switch (r)
4788 {
4789 case bfd_reloc_ok:
4790 break;
4791
4792 case bfd_reloc_overflow:
4793 {
4794 const char *name;
4795
ed4de5e2
JJ
4796 /* Don't warn if the overflow is due to pc relative reloc
4797 against discarded section. Section optimization code should
4798 handle it. */
4799
4800 if (r_symndx < symtab_hdr->sh_info
4801 && sec != NULL && howto->pc_relative
dbaa2011 4802 && discarded_section (sec))
ed4de5e2
JJ
4803 break;
4804
252b5132 4805 if (h != NULL)
dfeffb9f 4806 name = NULL;
252b5132
RH
4807 else
4808 {
4809 name = (bfd_elf_string_from_elf_section
4810 (input_bfd, symtab_hdr->sh_link, sym->st_name));
4811 if (name == NULL)
b34976b6 4812 return FALSE;
252b5132
RH
4813 if (*name == '\0')
4814 name = bfd_section_name (input_bfd, sec);
4815 }
4816 if (! ((*info->callbacks->reloc_overflow)
dfeffb9f
L
4817 (info, (h ? &h->root.root : NULL), name, howto->name,
4818 (bfd_vma) 0, input_bfd, input_section,
4819 rel->r_offset)))
b34976b6 4820 ret_val = FALSE;
252b5132
RH
4821 }
4822 break;
4823
4824 default:
4825 case bfd_reloc_outofrange:
4826 abort ();
4827 }
4828 }
4829
f16fbd61 4830 return ret_val;
252b5132
RH
4831}
4832
4833/* Finish up dynamic symbol handling. We set the contents of various
4834 dynamic sections here. */
4835
b34976b6 4836static bfd_boolean
a7519a3c
RH
4837elf64_alpha_finish_dynamic_symbol (bfd *output_bfd, struct bfd_link_info *info,
4838 struct elf_link_hash_entry *h,
4839 Elf_Internal_Sym *sym)
252b5132 4840{
6ec7057a 4841 struct alpha_elf_link_hash_entry *ah = (struct alpha_elf_link_hash_entry *)h;
252b5132
RH
4842 bfd *dynobj = elf_hash_table(info)->dynobj;
4843
6ec7057a 4844 if (h->needs_plt)
252b5132
RH
4845 {
4846 /* Fill in the .plt entry for this symbol. */
4847 asection *splt, *sgot, *srel;
4848 Elf_Internal_Rela outrel;
947216bf 4849 bfd_byte *loc;
252b5132
RH
4850 bfd_vma got_addr, plt_addr;
4851 bfd_vma plt_index;
4852 struct alpha_elf_got_entry *gotent;
4853
4854 BFD_ASSERT (h->dynindx != -1);
4855
3d4d4302 4856 splt = bfd_get_linker_section (dynobj, ".plt");
252b5132 4857 BFD_ASSERT (splt != NULL);
3d4d4302 4858 srel = bfd_get_linker_section (dynobj, ".rela.plt");
252b5132 4859 BFD_ASSERT (srel != NULL);
252b5132 4860
6ec7057a
RH
4861 for (gotent = ah->got_entries; gotent ; gotent = gotent->next)
4862 if (gotent->reloc_type == R_ALPHA_LITERAL
4863 && gotent->use_count > 0)
4864 {
4865 unsigned int insn;
4866 int disp;
252b5132 4867
6ec7057a
RH
4868 sgot = alpha_elf_tdata (gotent->gotobj)->got;
4869 BFD_ASSERT (sgot != NULL);
252b5132 4870
6ec7057a
RH
4871 BFD_ASSERT (gotent->got_offset != -1);
4872 BFD_ASSERT (gotent->plt_offset != -1);
252b5132 4873
6ec7057a
RH
4874 got_addr = (sgot->output_section->vma
4875 + sgot->output_offset
4876 + gotent->got_offset);
4877 plt_addr = (splt->output_section->vma
4878 + splt->output_offset
4879 + gotent->plt_offset);
252b5132 4880
6ec7057a 4881 plt_index = (gotent->plt_offset-PLT_HEADER_SIZE) / PLT_ENTRY_SIZE;
252b5132 4882
6ec7057a
RH
4883 /* Fill in the entry in the procedure linkage table. */
4884 if (elf64_alpha_use_secureplt)
4885 {
4886 disp = (PLT_HEADER_SIZE - 4) - (gotent->plt_offset + 4);
4887 insn = INSN_AD (INSN_BR, 31, disp);
4888 bfd_put_32 (output_bfd, insn,
4889 splt->contents + gotent->plt_offset);
252b5132 4890
6ec7057a
RH
4891 plt_index = ((gotent->plt_offset - NEW_PLT_HEADER_SIZE)
4892 / NEW_PLT_ENTRY_SIZE);
4893 }
4894 else
4895 {
4896 disp = -(gotent->plt_offset + 4);
4897 insn = INSN_AD (INSN_BR, 28, disp);
4898 bfd_put_32 (output_bfd, insn,
4899 splt->contents + gotent->plt_offset);
4900 bfd_put_32 (output_bfd, INSN_UNOP,
4901 splt->contents + gotent->plt_offset + 4);
4902 bfd_put_32 (output_bfd, INSN_UNOP,
4903 splt->contents + gotent->plt_offset + 8);
4904
4905 plt_index = ((gotent->plt_offset - OLD_PLT_HEADER_SIZE)
4906 / OLD_PLT_ENTRY_SIZE);
4907 }
252b5132 4908
6ec7057a
RH
4909 /* Fill in the entry in the .rela.plt section. */
4910 outrel.r_offset = got_addr;
4911 outrel.r_info = ELF64_R_INFO(h->dynindx, R_ALPHA_JMP_SLOT);
4912 outrel.r_addend = 0;
252b5132 4913
6ec7057a
RH
4914 loc = srel->contents + plt_index * sizeof (Elf64_External_Rela);
4915 bfd_elf64_swap_reloca_out (output_bfd, &outrel, loc);
252b5132 4916
6ec7057a
RH
4917 /* Fill in the entry in the .got. */
4918 bfd_put_64 (output_bfd, plt_addr,
4919 sgot->contents + gotent->got_offset);
4920 }
252b5132
RH
4921 }
4922 else if (alpha_elf_dynamic_symbol_p (h, info))
4923 {
4924 /* Fill in the dynamic relocations for this symbol's .got entries. */
4925 asection *srel;
252b5132
RH
4926 struct alpha_elf_got_entry *gotent;
4927
3d4d4302 4928 srel = bfd_get_linker_section (dynobj, ".rela.got");
252b5132
RH
4929 BFD_ASSERT (srel != NULL);
4930
252b5132
RH
4931 for (gotent = ((struct alpha_elf_link_hash_entry *) h)->got_entries;
4932 gotent != NULL;
4933 gotent = gotent->next)
4934 {
f44f99a5 4935 asection *sgot;
1bbc9cec 4936 long r_type;
3765b1be 4937
f44f99a5
RH
4938 if (gotent->use_count == 0)
4939 continue;
4940
4941 sgot = alpha_elf_tdata (gotent->gotobj)->got;
3765b1be
RH
4942
4943 r_type = gotent->reloc_type;
4944 switch (r_type)
4945 {
4946 case R_ALPHA_LITERAL:
4947 r_type = R_ALPHA_GLOB_DAT;
4948 break;
4949 case R_ALPHA_TLSGD:
4950 r_type = R_ALPHA_DTPMOD64;
4951 break;
4952 case R_ALPHA_GOTDTPREL:
4953 r_type = R_ALPHA_DTPREL64;
4954 break;
4955 case R_ALPHA_GOTTPREL:
4956 r_type = R_ALPHA_TPREL64;
4957 break;
4958 case R_ALPHA_TLSLDM:
4959 default:
4960 abort ();
4961 }
4962
68ffbac6 4963 elf64_alpha_emit_dynrel (output_bfd, info, sgot, srel,
1bbc9cec
RH
4964 gotent->got_offset, h->dynindx,
4965 r_type, gotent->addend);
3765b1be
RH
4966
4967 if (gotent->reloc_type == R_ALPHA_TLSGD)
68ffbac6 4968 elf64_alpha_emit_dynrel (output_bfd, info, sgot, srel,
1bbc9cec
RH
4969 gotent->got_offset + 8, h->dynindx,
4970 R_ALPHA_DTPREL64, gotent->addend);
252b5132
RH
4971 }
4972 }
4973
4974 /* Mark some specially defined symbols as absolute. */
9637f6ef 4975 if (h == elf_hash_table (info)->hdynamic
22edb2f1
RS
4976 || h == elf_hash_table (info)->hgot
4977 || h == elf_hash_table (info)->hplt)
252b5132
RH
4978 sym->st_shndx = SHN_ABS;
4979
b34976b6 4980 return TRUE;
252b5132
RH
4981}
4982
4983/* Finish up the dynamic sections. */
4984
b34976b6 4985static bfd_boolean
a7519a3c
RH
4986elf64_alpha_finish_dynamic_sections (bfd *output_bfd,
4987 struct bfd_link_info *info)
252b5132
RH
4988{
4989 bfd *dynobj;
4990 asection *sdyn;
4991
4992 dynobj = elf_hash_table (info)->dynobj;
3d4d4302 4993 sdyn = bfd_get_linker_section (dynobj, ".dynamic");
252b5132
RH
4994
4995 if (elf_hash_table (info)->dynamic_sections_created)
4996 {
6ec7057a 4997 asection *splt, *sgotplt, *srelaplt;
252b5132 4998 Elf64_External_Dyn *dyncon, *dynconend;
6ec7057a 4999 bfd_vma plt_vma, gotplt_vma;
252b5132 5000
3d4d4302
AM
5001 splt = bfd_get_linker_section (dynobj, ".plt");
5002 srelaplt = bfd_get_linker_section (output_bfd, ".rela.plt");
252b5132
RH
5003 BFD_ASSERT (splt != NULL && sdyn != NULL);
5004
6ec7057a
RH
5005 plt_vma = splt->output_section->vma + splt->output_offset;
5006
5007 gotplt_vma = 0;
5008 if (elf64_alpha_use_secureplt)
5009 {
3d4d4302 5010 sgotplt = bfd_get_linker_section (dynobj, ".got.plt");
6ec7057a
RH
5011 BFD_ASSERT (sgotplt != NULL);
5012 if (sgotplt->size > 0)
5013 gotplt_vma = sgotplt->output_section->vma + sgotplt->output_offset;
5014 }
5015
252b5132 5016 dyncon = (Elf64_External_Dyn *) sdyn->contents;
eea6121a 5017 dynconend = (Elf64_External_Dyn *) (sdyn->contents + sdyn->size);
252b5132
RH
5018 for (; dyncon < dynconend; dyncon++)
5019 {
5020 Elf_Internal_Dyn dyn;
252b5132
RH
5021
5022 bfd_elf64_swap_dyn_in (dynobj, dyncon, &dyn);
5023
5024 switch (dyn.d_tag)
5025 {
5026 case DT_PLTGOT:
6ec7057a
RH
5027 dyn.d_un.d_ptr
5028 = elf64_alpha_use_secureplt ? gotplt_vma : plt_vma;
5029 break;
252b5132 5030 case DT_PLTRELSZ:
6ec7057a
RH
5031 dyn.d_un.d_val = srelaplt ? srelaplt->size : 0;
5032 break;
252b5132 5033 case DT_JMPREL:
6ec7057a
RH
5034 dyn.d_un.d_ptr = srelaplt ? srelaplt->vma : 0;
5035 break;
252b5132
RH
5036
5037 case DT_RELASZ:
5038 /* My interpretation of the TIS v1.1 ELF document indicates
5039 that RELASZ should not include JMPREL. This is not what
5040 the rest of the BFD does. It is, however, what the
5041 glibc ld.so wants. Do this fixup here until we found
5042 out who is right. */
6ec7057a
RH
5043 if (srelaplt)
5044 dyn.d_un.d_val -= srelaplt->size;
252b5132
RH
5045 break;
5046 }
5047
5048 bfd_elf64_swap_dyn_out (output_bfd, &dyn, dyncon);
5049 }
5050
6ec7057a 5051 /* Initialize the plt header. */
eea6121a 5052 if (splt->size > 0)
252b5132 5053 {
6ec7057a
RH
5054 unsigned int insn;
5055 int ofs;
5056
5057 if (elf64_alpha_use_secureplt)
5058 {
5059 ofs = gotplt_vma - (plt_vma + PLT_HEADER_SIZE);
5060
5061 insn = INSN_ABC (INSN_SUBQ, 27, 28, 25);
5062 bfd_put_32 (output_bfd, insn, splt->contents);
5063
5064 insn = INSN_ABO (INSN_LDAH, 28, 28, (ofs + 0x8000) >> 16);
5065 bfd_put_32 (output_bfd, insn, splt->contents + 4);
5066
5067 insn = INSN_ABC (INSN_S4SUBQ, 25, 25, 25);
5068 bfd_put_32 (output_bfd, insn, splt->contents + 8);
5069
5070 insn = INSN_ABO (INSN_LDA, 28, 28, ofs);
5071 bfd_put_32 (output_bfd, insn, splt->contents + 12);
5072
5073 insn = INSN_ABO (INSN_LDQ, 27, 28, 0);
5074 bfd_put_32 (output_bfd, insn, splt->contents + 16);
5075
5076 insn = INSN_ABC (INSN_ADDQ, 25, 25, 25);
5077 bfd_put_32 (output_bfd, insn, splt->contents + 20);
5078
5079 insn = INSN_ABO (INSN_LDQ, 28, 28, 8);
5080 bfd_put_32 (output_bfd, insn, splt->contents + 24);
5081
5082 insn = INSN_AB (INSN_JMP, 31, 27);
5083 bfd_put_32 (output_bfd, insn, splt->contents + 28);
5084
5085 insn = INSN_AD (INSN_BR, 28, -PLT_HEADER_SIZE);
5086 bfd_put_32 (output_bfd, insn, splt->contents + 32);
5087 }
5088 else
5089 {
5090 insn = INSN_AD (INSN_BR, 27, 0); /* br $27, .+4 */
5091 bfd_put_32 (output_bfd, insn, splt->contents);
5092
5093 insn = INSN_ABO (INSN_LDQ, 27, 27, 12);
5094 bfd_put_32 (output_bfd, insn, splt->contents + 4);
5095
5096 insn = INSN_UNOP;
5097 bfd_put_32 (output_bfd, insn, splt->contents + 8);
5098
5099 insn = INSN_AB (INSN_JMP, 27, 27);
5100 bfd_put_32 (output_bfd, insn, splt->contents + 12);
5101
5102 /* The next two words will be filled in by ld.so. */
5103 bfd_put_64 (output_bfd, 0, splt->contents + 16);
5104 bfd_put_64 (output_bfd, 0, splt->contents + 24);
5105 }
252b5132 5106
eecdbe52 5107 elf_section_data (splt->output_section)->this_hdr.sh_entsize = 0;
252b5132
RH
5108 }
5109 }
5110
b34976b6 5111 return TRUE;
252b5132
RH
5112}
5113
96e2734b
RH
5114/* We need to use a special link routine to handle the .mdebug section.
5115 We need to merge all instances of these sections together, not write
5116 them all out sequentially. */
252b5132 5117
b34976b6 5118static bfd_boolean
a7519a3c 5119elf64_alpha_final_link (bfd *abfd, struct bfd_link_info *info)
252b5132
RH
5120{
5121 asection *o;
5122 struct bfd_link_order *p;
96e2734b 5123 asection *mdebug_sec;
252b5132
RH
5124 struct ecoff_debug_info debug;
5125 const struct ecoff_debug_swap *swap
5126 = get_elf_backend_data (abfd)->elf_backend_ecoff_debug_swap;
5127 HDRR *symhdr = &debug.symbolic_header;
4dfe6ac6
NC
5128 void * mdebug_handle = NULL;
5129 struct alpha_elf_link_hash_table * htab;
5130
5131 htab = alpha_elf_hash_table (info);
5132 if (htab == NULL)
5133 return FALSE;
252b5132 5134
96e2734b 5135 /* Go through the sections and collect the mdebug information. */
252b5132 5136 mdebug_sec = NULL;
252b5132
RH
5137 for (o = abfd->sections; o != (asection *) NULL; o = o->next)
5138 {
252b5132
RH
5139 if (strcmp (o->name, ".mdebug") == 0)
5140 {
5141 struct extsym_info einfo;
5142
5143 /* We have found the .mdebug section in the output file.
5144 Look through all the link_orders comprising it and merge
5145 the information together. */
5146 symhdr->magic = swap->sym_magic;
5147 /* FIXME: What should the version stamp be? */
5148 symhdr->vstamp = 0;
5149 symhdr->ilineMax = 0;
5150 symhdr->cbLine = 0;
5151 symhdr->idnMax = 0;
5152 symhdr->ipdMax = 0;
5153 symhdr->isymMax = 0;
5154 symhdr->ioptMax = 0;
5155 symhdr->iauxMax = 0;
5156 symhdr->issMax = 0;
5157 symhdr->issExtMax = 0;
5158 symhdr->ifdMax = 0;
5159 symhdr->crfd = 0;
5160 symhdr->iextMax = 0;
5161
5162 /* We accumulate the debugging information itself in the
5163 debug_info structure. */
5164 debug.line = NULL;
5165 debug.external_dnr = NULL;
5166 debug.external_pdr = NULL;
5167 debug.external_sym = NULL;
5168 debug.external_opt = NULL;
5169 debug.external_aux = NULL;
5170 debug.ss = NULL;
5171 debug.ssext = debug.ssext_end = NULL;
5172 debug.external_fdr = NULL;
5173 debug.external_rfd = NULL;
5174 debug.external_ext = debug.external_ext_end = NULL;
5175
5176 mdebug_handle = bfd_ecoff_debug_init (abfd, &debug, swap, info);
2c3fc389 5177 if (mdebug_handle == NULL)
b34976b6 5178 return FALSE;
252b5132
RH
5179
5180 if (1)
5181 {
5182 asection *s;
5183 EXTR esym;
52b9d213 5184 bfd_vma last = 0;
252b5132
RH
5185 unsigned int i;
5186 static const char * const name[] =
5187 {
5188 ".text", ".init", ".fini", ".data",
5189 ".rodata", ".sdata", ".sbss", ".bss"
5190 };
5191 static const int sc[] = { scText, scInit, scFini, scData,
5192 scRData, scSData, scSBss, scBss };
5193
5194 esym.jmptbl = 0;
5195 esym.cobol_main = 0;
5196 esym.weakext = 0;
5197 esym.reserved = 0;
5198 esym.ifd = ifdNil;
5199 esym.asym.iss = issNil;
5200 esym.asym.st = stLocal;
5201 esym.asym.reserved = 0;
5202 esym.asym.index = indexNil;
5203 for (i = 0; i < 8; i++)
5204 {
5205 esym.asym.sc = sc[i];
5206 s = bfd_get_section_by_name (abfd, name[i]);
5207 if (s != NULL)
5208 {
5209 esym.asym.value = s->vma;
eea6121a 5210 last = s->vma + s->size;
252b5132
RH
5211 }
5212 else
5213 esym.asym.value = last;
5214
5215 if (! bfd_ecoff_debug_one_external (abfd, &debug, swap,
5216 name[i], &esym))
b34976b6 5217 return FALSE;
252b5132
RH
5218 }
5219 }
5220
8423293d 5221 for (p = o->map_head.link_order;
252b5132
RH
5222 p != (struct bfd_link_order *) NULL;
5223 p = p->next)
5224 {
5225 asection *input_section;
5226 bfd *input_bfd;
5227 const struct ecoff_debug_swap *input_swap;
5228 struct ecoff_debug_info input_debug;
5229 char *eraw_src;
5230 char *eraw_end;
5231
5232 if (p->type != bfd_indirect_link_order)
5233 {
fd96f80f 5234 if (p->type == bfd_data_link_order)
252b5132
RH
5235 continue;
5236 abort ();
5237 }
5238
5239 input_section = p->u.indirect.section;
5240 input_bfd = input_section->owner;
5241
0ffa91dd
NC
5242 if (! is_alpha_elf (input_bfd))
5243 /* I don't know what a non ALPHA ELF bfd would be
5244 doing with a .mdebug section, but I don't really
5245 want to deal with it. */
5246 continue;
252b5132
RH
5247
5248 input_swap = (get_elf_backend_data (input_bfd)
5249 ->elf_backend_ecoff_debug_swap);
5250
eea6121a 5251 BFD_ASSERT (p->size == input_section->size);
252b5132
RH
5252
5253 /* The ECOFF linking code expects that we have already
5254 read in the debugging information and set up an
5255 ecoff_debug_info structure, so we do that now. */
5256 if (!elf64_alpha_read_ecoff_info (input_bfd, input_section,
5257 &input_debug))
b34976b6 5258 return FALSE;
252b5132
RH
5259
5260 if (! (bfd_ecoff_debug_accumulate
5261 (mdebug_handle, abfd, &debug, swap, input_bfd,
5262 &input_debug, input_swap, info)))
b34976b6 5263 return FALSE;
252b5132
RH
5264
5265 /* Loop through the external symbols. For each one with
5266 interesting information, try to find the symbol in
5267 the linker global hash table and save the information
5268 for the output external symbols. */
21d799b5 5269 eraw_src = (char *) input_debug.external_ext;
252b5132
RH
5270 eraw_end = (eraw_src
5271 + (input_debug.symbolic_header.iextMax
5272 * input_swap->external_ext_size));
5273 for (;
5274 eraw_src < eraw_end;
5275 eraw_src += input_swap->external_ext_size)
5276 {
5277 EXTR ext;
5278 const char *name;
5279 struct alpha_elf_link_hash_entry *h;
5280
2c3fc389 5281 (*input_swap->swap_ext_in) (input_bfd, eraw_src, &ext);
252b5132
RH
5282 if (ext.asym.sc == scNil
5283 || ext.asym.sc == scUndefined
5284 || ext.asym.sc == scSUndefined)
5285 continue;
5286
5287 name = input_debug.ssext + ext.asym.iss;
4dfe6ac6 5288 h = alpha_elf_link_hash_lookup (htab, name, FALSE, FALSE, TRUE);
252b5132
RH
5289 if (h == NULL || h->esym.ifd != -2)
5290 continue;
5291
5292 if (ext.ifd != -1)
5293 {
5294 BFD_ASSERT (ext.ifd
5295 < input_debug.symbolic_header.ifdMax);
5296 ext.ifd = input_debug.ifdmap[ext.ifd];
5297 }
5298
5299 h->esym = ext;
5300 }
5301
5302 /* Free up the information we just read. */
5303 free (input_debug.line);
5304 free (input_debug.external_dnr);
5305 free (input_debug.external_pdr);
5306 free (input_debug.external_sym);
5307 free (input_debug.external_opt);
5308 free (input_debug.external_aux);
5309 free (input_debug.ss);
5310 free (input_debug.ssext);
5311 free (input_debug.external_fdr);
5312 free (input_debug.external_rfd);
5313 free (input_debug.external_ext);
5314
5315 /* Hack: reset the SEC_HAS_CONTENTS flag so that
5316 elf_link_input_bfd ignores this section. */
5317 input_section->flags &=~ SEC_HAS_CONTENTS;
5318 }
5319
252b5132
RH
5320 /* Build the external symbol information. */
5321 einfo.abfd = abfd;
5322 einfo.info = info;
5323 einfo.debug = &debug;
5324 einfo.swap = swap;
b34976b6 5325 einfo.failed = FALSE;
252b5132
RH
5326 elf_link_hash_traverse (elf_hash_table (info),
5327 elf64_alpha_output_extsym,
2c3fc389 5328 &einfo);
252b5132 5329 if (einfo.failed)
b34976b6 5330 return FALSE;
252b5132
RH
5331
5332 /* Set the size of the .mdebug section. */
eea6121a 5333 o->size = bfd_ecoff_debug_size (abfd, &debug, swap);
252b5132
RH
5334
5335 /* Skip this section later on (I don't think this currently
5336 matters, but someday it might). */
8423293d 5337 o->map_head.link_order = (struct bfd_link_order *) NULL;
252b5132
RH
5338
5339 mdebug_sec = o;
5340 }
252b5132
RH
5341 }
5342
5343 /* Invoke the regular ELF backend linker to do all the work. */
c152c796 5344 if (! bfd_elf_final_link (abfd, info))
b34976b6 5345 return FALSE;
252b5132
RH
5346
5347 /* Now write out the computed sections. */
5348
5349 /* The .got subsections... */
5350 {
5351 bfd *i, *dynobj = elf_hash_table(info)->dynobj;
4dfe6ac6 5352 for (i = htab->got_list;
252b5132
RH
5353 i != NULL;
5354 i = alpha_elf_tdata(i)->got_link_next)
5355 {
5356 asection *sgot;
5357
5358 /* elf_bfd_final_link already did everything in dynobj. */
5359 if (i == dynobj)
5360 continue;
5361
5362 sgot = alpha_elf_tdata(i)->got;
5363 if (! bfd_set_section_contents (abfd, sgot->output_section,
dc810e39
AM
5364 sgot->contents,
5365 (file_ptr) sgot->output_offset,
eea6121a 5366 sgot->size))
b34976b6 5367 return FALSE;
252b5132
RH
5368 }
5369 }
5370
252b5132
RH
5371 if (mdebug_sec != (asection *) NULL)
5372 {
5373 BFD_ASSERT (abfd->output_has_begun);
5374 if (! bfd_ecoff_write_accumulated_debug (mdebug_handle, abfd, &debug,
5375 swap, info,
5376 mdebug_sec->filepos))
b34976b6 5377 return FALSE;
252b5132
RH
5378
5379 bfd_ecoff_debug_free (mdebug_handle, abfd, &debug, swap, info);
5380 }
5381
b34976b6 5382 return TRUE;
252b5132 5383}
fcfbdf31
JJ
5384
5385static enum elf_reloc_type_class
7e612e98
AM
5386elf64_alpha_reloc_type_class (const struct bfd_link_info *info ATTRIBUTE_UNUSED,
5387 const asection *rel_sec ATTRIBUTE_UNUSED,
5388 const Elf_Internal_Rela *rela)
fcfbdf31 5389{
f51e552e 5390 switch ((int) ELF64_R_TYPE (rela->r_info))
fcfbdf31
JJ
5391 {
5392 case R_ALPHA_RELATIVE:
5393 return reloc_class_relative;
5394 case R_ALPHA_JMP_SLOT:
5395 return reloc_class_plt;
5396 case R_ALPHA_COPY:
5397 return reloc_class_copy;
5398 default:
5399 return reloc_class_normal;
5400 }
5401}
252b5132 5402\f
b35d266b 5403static const struct bfd_elf_special_section elf64_alpha_special_sections[] =
2f89ff8d 5404{
0112cd26
NC
5405 { STRING_COMMA_LEN (".sbss"), -2, SHT_NOBITS, SHF_ALLOC + SHF_WRITE + SHF_ALPHA_GPREL },
5406 { STRING_COMMA_LEN (".sdata"), -2, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE + SHF_ALPHA_GPREL },
5407 { NULL, 0, 0, 0, 0 }
2f89ff8d
L
5408};
5409
252b5132
RH
5410/* ECOFF swapping routines. These are used when dealing with the
5411 .mdebug section, which is in the ECOFF debugging format. Copied
fe8bc63d 5412 from elf32-mips.c. */
252b5132
RH
5413static const struct ecoff_debug_swap
5414elf64_alpha_ecoff_debug_swap =
5415{
5416 /* Symbol table magic number. */
5417 magicSym2,
5418 /* Alignment of debugging information. E.g., 4. */
5419 8,
5420 /* Sizes of external symbolic information. */
5421 sizeof (struct hdr_ext),
5422 sizeof (struct dnr_ext),
5423 sizeof (struct pdr_ext),
5424 sizeof (struct sym_ext),
5425 sizeof (struct opt_ext),
5426 sizeof (struct fdr_ext),
5427 sizeof (struct rfd_ext),
5428 sizeof (struct ext_ext),
5429 /* Functions to swap in external symbolic data. */
5430 ecoff_swap_hdr_in,
5431 ecoff_swap_dnr_in,
5432 ecoff_swap_pdr_in,
5433 ecoff_swap_sym_in,
5434 ecoff_swap_opt_in,
5435 ecoff_swap_fdr_in,
5436 ecoff_swap_rfd_in,
5437 ecoff_swap_ext_in,
5438 _bfd_ecoff_swap_tir_in,
5439 _bfd_ecoff_swap_rndx_in,
5440 /* Functions to swap out external symbolic data. */
5441 ecoff_swap_hdr_out,
5442 ecoff_swap_dnr_out,
5443 ecoff_swap_pdr_out,
5444 ecoff_swap_sym_out,
5445 ecoff_swap_opt_out,
5446 ecoff_swap_fdr_out,
5447 ecoff_swap_rfd_out,
5448 ecoff_swap_ext_out,
5449 _bfd_ecoff_swap_tir_out,
5450 _bfd_ecoff_swap_rndx_out,
5451 /* Function to read in symbolic data. */
5452 elf64_alpha_read_ecoff_info
5453};
5454\f
70bcb145
JW
5455/* Use a non-standard hash bucket size of 8. */
5456
562ace6b 5457static const struct elf_size_info alpha_elf_size_info =
70bcb145
JW
5458{
5459 sizeof (Elf64_External_Ehdr),
5460 sizeof (Elf64_External_Phdr),
5461 sizeof (Elf64_External_Shdr),
5462 sizeof (Elf64_External_Rel),
5463 sizeof (Elf64_External_Rela),
5464 sizeof (Elf64_External_Sym),
5465 sizeof (Elf64_External_Dyn),
5466 sizeof (Elf_External_Note),
5467 8,
5468 1,
45d6a902 5469 64, 3,
70bcb145
JW
5470 ELFCLASS64, EV_CURRENT,
5471 bfd_elf64_write_out_phdrs,
5472 bfd_elf64_write_shdrs_and_ehdr,
1489a3a0 5473 bfd_elf64_checksum_contents,
70bcb145 5474 bfd_elf64_write_relocs,
73ff0d56 5475 bfd_elf64_swap_symbol_in,
70bcb145
JW
5476 bfd_elf64_swap_symbol_out,
5477 bfd_elf64_slurp_reloc_table,
5478 bfd_elf64_slurp_symbol_table,
5479 bfd_elf64_swap_dyn_in,
5480 bfd_elf64_swap_dyn_out,
947216bf
AM
5481 bfd_elf64_swap_reloc_in,
5482 bfd_elf64_swap_reloc_out,
5483 bfd_elf64_swap_reloca_in,
5484 bfd_elf64_swap_reloca_out
70bcb145
JW
5485};
5486
6d00b590 5487#define TARGET_LITTLE_SYM alpha_elf64_vec
252b5132
RH
5488#define TARGET_LITTLE_NAME "elf64-alpha"
5489#define ELF_ARCH bfd_arch_alpha
ae95ffa6 5490#define ELF_TARGET_ID ALPHA_ELF_DATA
56fc028e
AJ
5491#define ELF_MACHINE_CODE EM_ALPHA
5492#define ELF_MAXPAGESIZE 0x10000
24718e3b 5493#define ELF_COMMONPAGESIZE 0x2000
252b5132
RH
5494
5495#define bfd_elf64_bfd_link_hash_table_create \
5496 elf64_alpha_bfd_link_hash_table_create
5497
5498#define bfd_elf64_bfd_reloc_type_lookup \
5499 elf64_alpha_bfd_reloc_type_lookup
157090f7
AM
5500#define bfd_elf64_bfd_reloc_name_lookup \
5501 elf64_alpha_bfd_reloc_name_lookup
252b5132
RH
5502#define elf_info_to_howto \
5503 elf64_alpha_info_to_howto
5504
5505#define bfd_elf64_mkobject \
5506 elf64_alpha_mkobject
5507#define elf_backend_object_p \
5508 elf64_alpha_object_p
5509
5510#define elf_backend_section_from_shdr \
5511 elf64_alpha_section_from_shdr
204692d7
RH
5512#define elf_backend_section_flags \
5513 elf64_alpha_section_flags
252b5132
RH
5514#define elf_backend_fake_sections \
5515 elf64_alpha_fake_sections
5516
5517#define bfd_elf64_bfd_is_local_label_name \
5518 elf64_alpha_is_local_label_name
5519#define bfd_elf64_find_nearest_line \
5520 elf64_alpha_find_nearest_line
5521#define bfd_elf64_bfd_relax_section \
5522 elf64_alpha_relax_section
5523
5524#define elf_backend_add_symbol_hook \
5525 elf64_alpha_add_symbol_hook
13285a1b
AM
5526#define elf_backend_relocs_compatible \
5527 _bfd_elf_relocs_compatible
252b5132
RH
5528#define elf_backend_check_relocs \
5529 elf64_alpha_check_relocs
5530#define elf_backend_create_dynamic_sections \
5531 elf64_alpha_create_dynamic_sections
5532#define elf_backend_adjust_dynamic_symbol \
5533 elf64_alpha_adjust_dynamic_symbol
747ffa7b
AM
5534#define elf_backend_merge_symbol_attribute \
5535 elf64_alpha_merge_symbol_attribute
48f4b4f5
RH
5536#define elf_backend_copy_indirect_symbol \
5537 elf64_alpha_copy_indirect_symbol
252b5132
RH
5538#define elf_backend_always_size_sections \
5539 elf64_alpha_always_size_sections
5540#define elf_backend_size_dynamic_sections \
5541 elf64_alpha_size_dynamic_sections
74541ad4
AM
5542#define elf_backend_omit_section_dynsym \
5543 ((bfd_boolean (*) (bfd *, struct bfd_link_info *, asection *)) bfd_true)
252b5132
RH
5544#define elf_backend_relocate_section \
5545 elf64_alpha_relocate_section
5546#define elf_backend_finish_dynamic_symbol \
5547 elf64_alpha_finish_dynamic_symbol
5548#define elf_backend_finish_dynamic_sections \
5549 elf64_alpha_finish_dynamic_sections
5550#define bfd_elf64_bfd_final_link \
5551 elf64_alpha_final_link
fcfbdf31
JJ
5552#define elf_backend_reloc_type_class \
5553 elf64_alpha_reloc_type_class
252b5132 5554
e117360e
RH
5555#define elf_backend_can_gc_sections 1
5556#define elf_backend_gc_mark_hook elf64_alpha_gc_mark_hook
5557#define elf_backend_gc_sweep_hook elf64_alpha_gc_sweep_hook
5558
252b5132
RH
5559#define elf_backend_ecoff_debug_swap \
5560 &elf64_alpha_ecoff_debug_swap
5561
70bcb145
JW
5562#define elf_backend_size_info \
5563 alpha_elf_size_info
5564
29ef7005
L
5565#define elf_backend_special_sections \
5566 elf64_alpha_special_sections
2f89ff8d 5567
38b1a46c 5568/* A few constants that determine how the .plt section is set up. */
252b5132
RH
5569#define elf_backend_want_got_plt 0
5570#define elf_backend_plt_readonly 0
5571#define elf_backend_want_plt_sym 1
5572#define elf_backend_got_header_size 0
252b5132
RH
5573
5574#include "elf64-target.h"
2238051f
RH
5575\f
5576/* FreeBSD support. */
5577
5578#undef TARGET_LITTLE_SYM
6d00b590 5579#define TARGET_LITTLE_SYM alpha_elf64_fbsd_vec
2238051f
RH
5580#undef TARGET_LITTLE_NAME
5581#define TARGET_LITTLE_NAME "elf64-alpha-freebsd"
d1036acb
L
5582#undef ELF_OSABI
5583#define ELF_OSABI ELFOSABI_FREEBSD
2238051f
RH
5584
5585/* The kernel recognizes executables as valid only if they carry a
5586 "FreeBSD" label in the ELF header. So we put this label on all
5587 executables and (for simplicity) also all other object files. */
5588
2238051f 5589static void
a7519a3c
RH
5590elf64_alpha_fbsd_post_process_headers (bfd * abfd,
5591 struct bfd_link_info * link_info ATTRIBUTE_UNUSED)
2238051f
RH
5592{
5593 Elf_Internal_Ehdr * i_ehdrp; /* ELF file header, internal form. */
5594
5595 i_ehdrp = elf_elfheader (abfd);
5596
5597 /* Put an ABI label supported by FreeBSD >= 4.1. */
d1036acb 5598 i_ehdrp->e_ident[EI_OSABI] = get_elf_backend_data (abfd)->elf_osabi;
2238051f
RH
5599#ifdef OLD_FREEBSD_ABI_LABEL
5600 /* The ABI label supported by FreeBSD <= 4.0 is quite nonstandard. */
5601 memcpy (&i_ehdrp->e_ident[EI_ABIVERSION], "FreeBSD", 8);
5602#endif
5603}
5604
5605#undef elf_backend_post_process_headers
5606#define elf_backend_post_process_headers \
5607 elf64_alpha_fbsd_post_process_headers
5608
571fe01f 5609#undef elf64_bed
2238051f
RH
5610#define elf64_bed elf64_alpha_fbsd_bed
5611
5612#include "elf64-target.h"