Rename u.weakdef and make it a circular list
[deliverable/binutils-gdb.git] / bfd / elf64-alpha.c
CommitLineData
252b5132 1/* Alpha specific support for 64-bit ELF
2571583a 2 Copyright (C) 1996-2017 Free Software Foundation, Inc.
252b5132
RH
3 Contributed by Richard Henderson <rth@tamu.edu>.
4
571fe01f 5 This file is part of BFD, the Binary File Descriptor library.
252b5132 6
571fe01f
NC
7 This program is free software; you can redistribute it and/or modify
8 it under the terms of the GNU General Public License as published by
cd123cb7 9 the Free Software Foundation; either version 3 of the License, or
571fe01f 10 (at your option) any later version.
252b5132 11
571fe01f
NC
12 This program is distributed in the hope that it will be useful,
13 but WITHOUT ANY WARRANTY; without even the implied warranty of
14 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 GNU General Public License for more details.
252b5132 16
571fe01f
NC
17 You should have received a copy of the GNU General Public License
18 along with this program; if not, write to the Free Software
cd123cb7
NC
19 Foundation, Inc., 51 Franklin Street - Fifth Floor, Boston,
20 MA 02110-1301, USA. */
21
252b5132
RH
22
23/* We need a published ABI spec for this. Until one comes out, don't
24 assume this'll remain unchanged forever. */
25
252b5132 26#include "sysdep.h"
3db64b00 27#include "bfd.h"
252b5132
RH
28#include "libbfd.h"
29#include "elf-bfd.h"
30
31#include "elf/alpha.h"
32
33#define ALPHAECOFF
34
35#define NO_COFF_RELOCS
36#define NO_COFF_SYMBOLS
37#define NO_COFF_LINENOS
38
fe8bc63d 39/* Get the ECOFF swapping routines. Needed for the debug information. */
252b5132
RH
40#include "coff/internal.h"
41#include "coff/sym.h"
42#include "coff/symconst.h"
43#include "coff/ecoff.h"
44#include "coff/alpha.h"
45#include "aout/ar.h"
46#include "libcoff.h"
47#include "libecoff.h"
48#define ECOFF_64
49#include "ecoffswap.h"
50
6ec7057a
RH
51\f
52/* Instruction data for plt generation and relaxation. */
53
54#define OP_LDA 0x08
55#define OP_LDAH 0x09
56#define OP_LDQ 0x29
57#define OP_BR 0x30
58#define OP_BSR 0x34
59
60#define INSN_LDA (OP_LDA << 26)
61#define INSN_LDAH (OP_LDAH << 26)
62#define INSN_LDQ (OP_LDQ << 26)
63#define INSN_BR (OP_BR << 26)
64
65#define INSN_ADDQ 0x40000400
66#define INSN_RDUNIQ 0x0000009e
67#define INSN_SUBQ 0x40000520
68#define INSN_S4SUBQ 0x40000560
69#define INSN_UNOP 0x2ffe0000
70
71#define INSN_JSR 0x68004000
72#define INSN_JMP 0x68000000
73#define INSN_JSR_MASK 0xfc00c000
74
75#define INSN_A(I,A) (I | (A << 21))
76#define INSN_AB(I,A,B) (I | (A << 21) | (B << 16))
77#define INSN_ABC(I,A,B,C) (I | (A << 21) | (B << 16) | C)
78#define INSN_ABO(I,A,B,O) (I | (A << 21) | (B << 16) | ((O) & 0xffff))
79#define INSN_AD(I,A,D) (I | (A << 21) | (((D) >> 2) & 0x1fffff))
80
81/* PLT/GOT Stuff */
82
83/* Set by ld emulation. Putting this into the link_info or hash structure
84 is simply working too hard. */
85#ifdef USE_SECUREPLT
86bfd_boolean elf64_alpha_use_secureplt = TRUE;
87#else
88bfd_boolean elf64_alpha_use_secureplt = FALSE;
89#endif
90
91#define OLD_PLT_HEADER_SIZE 32
92#define OLD_PLT_ENTRY_SIZE 12
93#define NEW_PLT_HEADER_SIZE 36
94#define NEW_PLT_ENTRY_SIZE 4
95
96#define PLT_HEADER_SIZE \
97 (elf64_alpha_use_secureplt ? NEW_PLT_HEADER_SIZE : OLD_PLT_HEADER_SIZE)
98#define PLT_ENTRY_SIZE \
99 (elf64_alpha_use_secureplt ? NEW_PLT_ENTRY_SIZE : OLD_PLT_ENTRY_SIZE)
100
101#define MAX_GOT_SIZE (64*1024)
102
103#define ELF_DYNAMIC_INTERPRETER "/usr/lib/ld.so"
252b5132 104\f
21d799b5
NC
105
106/* Used to implement multiple .got subsections. */
107struct alpha_elf_got_entry
108{
109 struct alpha_elf_got_entry *next;
110
111 /* Which .got subsection? */
112 bfd *gotobj;
113
114 /* The addend in effect for this entry. */
115 bfd_vma addend;
116
117 /* The .got offset for this entry. */
118 int got_offset;
119
120 /* The .plt offset for this entry. */
121 int plt_offset;
122
123 /* How many references to this entry? */
124 int use_count;
125
126 /* The relocation type of this entry. */
127 unsigned char reloc_type;
128
129 /* How a LITERAL is used. */
130 unsigned char flags;
131
132 /* Have we initialized the dynamic relocation for this entry? */
133 unsigned char reloc_done;
134
135 /* Have we adjusted this entry for SEC_MERGE? */
136 unsigned char reloc_xlated;
137};
138
139struct alpha_elf_reloc_entry
140{
141 struct alpha_elf_reloc_entry *next;
142
143 /* Which .reloc section? */
144 asection *srel;
145
146 /* What kind of relocation? */
147 unsigned int rtype;
148
149 /* Is this against read-only section? */
150 unsigned int reltext : 1;
151
152 /* How many did we find? */
153 unsigned long count;
154};
155
252b5132
RH
156struct alpha_elf_link_hash_entry
157{
158 struct elf_link_hash_entry root;
159
160 /* External symbol information. */
161 EXTR esym;
162
163 /* Cumulative flags for all the .got entries. */
164 int flags;
165
9e756d64 166 /* Contexts in which a literal was referenced. */
8288a39e
RH
167#define ALPHA_ELF_LINK_HASH_LU_ADDR 0x01
168#define ALPHA_ELF_LINK_HASH_LU_MEM 0x02
169#define ALPHA_ELF_LINK_HASH_LU_BYTE 0x04
170#define ALPHA_ELF_LINK_HASH_LU_JSR 0x08
171#define ALPHA_ELF_LINK_HASH_LU_TLSGD 0x10
172#define ALPHA_ELF_LINK_HASH_LU_TLSLDM 0x20
173#define ALPHA_ELF_LINK_HASH_LU_JSRDIRECT 0x40
174#define ALPHA_ELF_LINK_HASH_LU_PLT 0x38
175#define ALPHA_ELF_LINK_HASH_TLS_IE 0x80
cc03ec80 176
252b5132 177 /* Used to implement multiple .got subsections. */
21d799b5 178 struct alpha_elf_got_entry *got_entries;
252b5132 179
571fe01f 180 /* Used to count non-got, non-plt relocations for delayed sizing
252b5132 181 of relocation sections. */
21d799b5 182 struct alpha_elf_reloc_entry *reloc_entries;
252b5132
RH
183};
184
185/* Alpha ELF linker hash table. */
186
187struct alpha_elf_link_hash_table
188{
189 struct elf_link_hash_table root;
190
191 /* The head of a list of .got subsections linked through
192 alpha_elf_tdata(abfd)->got_link_next. */
193 bfd *got_list;
4a828aab
RH
194
195 /* The most recent relax pass that we've seen. The GOTs
196 should be regenerated if this doesn't match. */
197 int relax_trip;
252b5132
RH
198};
199
200/* Look up an entry in a Alpha ELF linker hash table. */
201
202#define alpha_elf_link_hash_lookup(table, string, create, copy, follow) \
203 ((struct alpha_elf_link_hash_entry *) \
204 elf_link_hash_lookup (&(table)->root, (string), (create), \
205 (copy), (follow)))
206
207/* Traverse a Alpha ELF linker hash table. */
208
209#define alpha_elf_link_hash_traverse(table, func, info) \
210 (elf_link_hash_traverse \
211 (&(table)->root, \
2c3fc389 212 (bfd_boolean (*) (struct elf_link_hash_entry *, void *)) (func), \
252b5132
RH
213 (info)))
214
215/* Get the Alpha ELF linker hash table from a link_info structure. */
216
217#define alpha_elf_hash_table(p) \
4dfe6ac6
NC
218 (elf_hash_table_id ((struct elf_link_hash_table *) ((p)->hash)) \
219 == ALPHA_ELF_DATA ? ((struct alpha_elf_link_hash_table *) ((p)->hash)) : NULL)
252b5132
RH
220
221/* Get the object's symbols as our own entry type. */
222
223#define alpha_elf_sym_hashes(abfd) \
224 ((struct alpha_elf_link_hash_entry **)elf_sym_hashes(abfd))
225
68ffbac6 226/* Should we do dynamic things to this symbol? This differs from the
986a241f
RH
227 generic version in that we never need to consider function pointer
228 equality wrt PLT entries -- we don't create a PLT entry if a symbol's
229 address is ever taken. */
252b5132 230
986a241f 231static inline bfd_boolean
a7519a3c
RH
232alpha_elf_dynamic_symbol_p (struct elf_link_hash_entry *h,
233 struct bfd_link_info *info)
8fb35fed 234{
986a241f 235 return _bfd_elf_dynamic_symbol_p (h, info, 0);
8fb35fed 236}
252b5132
RH
237
238/* Create an entry in a Alpha ELF linker hash table. */
239
240static struct bfd_hash_entry *
a7519a3c
RH
241elf64_alpha_link_hash_newfunc (struct bfd_hash_entry *entry,
242 struct bfd_hash_table *table,
243 const char *string)
252b5132
RH
244{
245 struct alpha_elf_link_hash_entry *ret =
246 (struct alpha_elf_link_hash_entry *) entry;
247
248 /* Allocate the structure if it has not already been allocated by a
249 subclass. */
250 if (ret == (struct alpha_elf_link_hash_entry *) NULL)
251 ret = ((struct alpha_elf_link_hash_entry *)
252 bfd_hash_allocate (table,
253 sizeof (struct alpha_elf_link_hash_entry)));
254 if (ret == (struct alpha_elf_link_hash_entry *) NULL)
255 return (struct bfd_hash_entry *) ret;
256
257 /* Call the allocation method of the superclass. */
258 ret = ((struct alpha_elf_link_hash_entry *)
259 _bfd_elf_link_hash_newfunc ((struct bfd_hash_entry *) ret,
260 table, string));
261 if (ret != (struct alpha_elf_link_hash_entry *) NULL)
262 {
263 /* Set local fields. */
264 memset (&ret->esym, 0, sizeof (EXTR));
265 /* We use -2 as a marker to indicate that the information has
266 not been set. -1 means there is no associated ifd. */
267 ret->esym.ifd = -2;
268 ret->flags = 0;
269 ret->got_entries = NULL;
270 ret->reloc_entries = NULL;
271 }
272
273 return (struct bfd_hash_entry *) ret;
274}
275
276/* Create a Alpha ELF linker hash table. */
277
278static struct bfd_link_hash_table *
a7519a3c 279elf64_alpha_bfd_link_hash_table_create (bfd *abfd)
252b5132
RH
280{
281 struct alpha_elf_link_hash_table *ret;
dc810e39 282 bfd_size_type amt = sizeof (struct alpha_elf_link_hash_table);
252b5132 283
e2d34d7d 284 ret = (struct alpha_elf_link_hash_table *) bfd_zmalloc (amt);
252b5132
RH
285 if (ret == (struct alpha_elf_link_hash_table *) NULL)
286 return NULL;
287
66eb6687
AM
288 if (!_bfd_elf_link_hash_table_init (&ret->root, abfd,
289 elf64_alpha_link_hash_newfunc,
4dfe6ac6
NC
290 sizeof (struct alpha_elf_link_hash_entry),
291 ALPHA_ELF_DATA))
252b5132 292 {
e2d34d7d 293 free (ret);
252b5132
RH
294 return NULL;
295 }
296
297 return &ret->root.root;
298}
299\f
698600e4
AM
300/* Alpha ELF follows MIPS ELF in using a special find_nearest_line
301 routine in order to handle the ECOFF debugging information. */
302
303struct alpha_elf_find_line
304{
305 struct ecoff_debug_info d;
306 struct ecoff_find_line i;
307};
308
252b5132
RH
309/* We have some private fields hanging off of the elf_tdata structure. */
310
311struct alpha_elf_obj_tdata
312{
313 struct elf_obj_tdata root;
314
315 /* For every input file, these are the got entries for that object's
316 local symbols. */
317 struct alpha_elf_got_entry ** local_got_entries;
318
319 /* For every input file, this is the object that owns the got that
320 this input file uses. */
321 bfd *gotobj;
322
323 /* For every got, this is a linked list through the objects using this got */
324 bfd *in_got_link_next;
325
326 /* For every got, this is a link to the next got subsegment. */
327 bfd *got_link_next;
328
329 /* For every got, this is the section. */
330 asection *got;
331
3765b1be
RH
332 /* For every got, this is it's total number of words. */
333 int total_got_size;
252b5132 334
3765b1be 335 /* For every got, this is the sum of the number of words required
252b5132 336 to hold all of the member object's local got. */
3765b1be 337 int local_got_size;
698600e4
AM
338
339 /* Used by elf64_alpha_find_nearest_line entry point. */
340 struct alpha_elf_find_line *find_line_info;
341
252b5132
RH
342};
343
344#define alpha_elf_tdata(abfd) \
345 ((struct alpha_elf_obj_tdata *) (abfd)->tdata.any)
346
0ffa91dd
NC
347#define is_alpha_elf(bfd) \
348 (bfd_get_flavour (bfd) == bfd_target_elf_flavour \
349 && elf_tdata (bfd) != NULL \
4dfe6ac6 350 && elf_object_id (bfd) == ALPHA_ELF_DATA)
0ffa91dd 351
b34976b6 352static bfd_boolean
a7519a3c 353elf64_alpha_mkobject (bfd *abfd)
252b5132 354{
0ffa91dd 355 return bfd_elf_allocate_object (abfd, sizeof (struct alpha_elf_obj_tdata),
4dfe6ac6 356 ALPHA_ELF_DATA);
252b5132
RH
357}
358
b34976b6 359static bfd_boolean
a7519a3c 360elf64_alpha_object_p (bfd *abfd)
252b5132 361{
252b5132
RH
362 /* Set the right machine number for an Alpha ELF file. */
363 return bfd_default_set_arch_mach (abfd, bfd_arch_alpha, 0);
364}
365\f
a7519a3c
RH
366/* A relocation function which doesn't do anything. */
367
368static bfd_reloc_status_type
369elf64_alpha_reloc_nil (bfd *abfd ATTRIBUTE_UNUSED, arelent *reloc,
370 asymbol *sym ATTRIBUTE_UNUSED,
2c3fc389 371 void * data ATTRIBUTE_UNUSED, asection *sec,
a7519a3c
RH
372 bfd *output_bfd, char **error_message ATTRIBUTE_UNUSED)
373{
374 if (output_bfd)
375 reloc->address += sec->output_offset;
376 return bfd_reloc_ok;
377}
378
379/* A relocation function used for an unsupported reloc. */
380
381static bfd_reloc_status_type
382elf64_alpha_reloc_bad (bfd *abfd ATTRIBUTE_UNUSED, arelent *reloc,
383 asymbol *sym ATTRIBUTE_UNUSED,
2c3fc389 384 void * data ATTRIBUTE_UNUSED, asection *sec,
a7519a3c
RH
385 bfd *output_bfd, char **error_message ATTRIBUTE_UNUSED)
386{
387 if (output_bfd)
388 reloc->address += sec->output_offset;
389 return bfd_reloc_notsupported;
390}
391
392/* Do the work of the GPDISP relocation. */
393
394static bfd_reloc_status_type
395elf64_alpha_do_reloc_gpdisp (bfd *abfd, bfd_vma gpdisp, bfd_byte *p_ldah,
396 bfd_byte *p_lda)
397{
398 bfd_reloc_status_type ret = bfd_reloc_ok;
399 bfd_vma addend;
400 unsigned long i_ldah, i_lda;
401
402 i_ldah = bfd_get_32 (abfd, p_ldah);
403 i_lda = bfd_get_32 (abfd, p_lda);
404
405 /* Complain if the instructions are not correct. */
406 if (((i_ldah >> 26) & 0x3f) != 0x09
407 || ((i_lda >> 26) & 0x3f) != 0x08)
408 ret = bfd_reloc_dangerous;
409
410 /* Extract the user-supplied offset, mirroring the sign extensions
411 that the instructions perform. */
412 addend = ((i_ldah & 0xffff) << 16) | (i_lda & 0xffff);
413 addend = (addend ^ 0x80008000) - 0x80008000;
414
415 gpdisp += addend;
416
417 if ((bfd_signed_vma) gpdisp < -(bfd_signed_vma) 0x80000000
418 || (bfd_signed_vma) gpdisp >= (bfd_signed_vma) 0x7fff8000)
419 ret = bfd_reloc_overflow;
420
421 /* compensate for the sign extension again. */
422 i_ldah = ((i_ldah & 0xffff0000)
423 | (((gpdisp >> 16) + ((gpdisp >> 15) & 1)) & 0xffff));
424 i_lda = (i_lda & 0xffff0000) | (gpdisp & 0xffff);
425
426 bfd_put_32 (abfd, (bfd_vma) i_ldah, p_ldah);
427 bfd_put_32 (abfd, (bfd_vma) i_lda, p_lda);
428
429 return ret;
430}
431
432/* The special function for the GPDISP reloc. */
433
434static bfd_reloc_status_type
435elf64_alpha_reloc_gpdisp (bfd *abfd, arelent *reloc_entry,
2c3fc389 436 asymbol *sym ATTRIBUTE_UNUSED, void * data,
a7519a3c
RH
437 asection *input_section, bfd *output_bfd,
438 char **err_msg)
439{
440 bfd_reloc_status_type ret;
441 bfd_vma gp, relocation;
442 bfd_vma high_address;
443 bfd_byte *p_ldah, *p_lda;
444
445 /* Don't do anything if we're not doing a final link. */
446 if (output_bfd)
447 {
448 reloc_entry->address += input_section->output_offset;
449 return bfd_reloc_ok;
450 }
451
452 high_address = bfd_get_section_limit (abfd, input_section);
453 if (reloc_entry->address > high_address
454 || reloc_entry->address + reloc_entry->addend > high_address)
455 return bfd_reloc_outofrange;
456
457 /* The gp used in the portion of the output object to which this
458 input object belongs is cached on the input bfd. */
459 gp = _bfd_get_gp_value (abfd);
460
461 relocation = (input_section->output_section->vma
462 + input_section->output_offset
463 + reloc_entry->address);
464
465 p_ldah = (bfd_byte *) data + reloc_entry->address;
466 p_lda = p_ldah + reloc_entry->addend;
467
468 ret = elf64_alpha_do_reloc_gpdisp (abfd, gp - relocation, p_ldah, p_lda);
469
470 /* Complain if the instructions are not correct. */
471 if (ret == bfd_reloc_dangerous)
472 *err_msg = _("GPDISP relocation did not find ldah and lda instructions");
473
474 return ret;
475}
476
252b5132
RH
477/* In case we're on a 32-bit machine, construct a 64-bit "-1" value
478 from smaller values. Start with zero, widen, *then* decrement. */
479#define MINUS_ONE (((bfd_vma)0) - 1)
480
21d799b5 481
dfe57ca0 482#define SKIP_HOWTO(N) \
21d799b5 483 HOWTO(N, 0, 0, 0, 0, 0, complain_overflow_dont, elf64_alpha_reloc_bad, 0, 0, 0, 0, 0)
dfe57ca0 484
252b5132
RH
485static reloc_howto_type elf64_alpha_howto_table[] =
486{
487 HOWTO (R_ALPHA_NONE, /* type */
488 0, /* rightshift */
6346d5ca
AM
489 3, /* size (0 = byte, 1 = short, 2 = long) */
490 0, /* bitsize */
b34976b6 491 TRUE, /* pc_relative */
252b5132
RH
492 0, /* bitpos */
493 complain_overflow_dont, /* complain_on_overflow */
494 elf64_alpha_reloc_nil, /* special_function */
495 "NONE", /* name */
b34976b6 496 FALSE, /* partial_inplace */
252b5132
RH
497 0, /* src_mask */
498 0, /* dst_mask */
b34976b6 499 TRUE), /* pcrel_offset */
252b5132
RH
500
501 /* A 32 bit reference to a symbol. */
502 HOWTO (R_ALPHA_REFLONG, /* type */
503 0, /* rightshift */
504 2, /* size (0 = byte, 1 = short, 2 = long) */
505 32, /* bitsize */
b34976b6 506 FALSE, /* pc_relative */
252b5132
RH
507 0, /* bitpos */
508 complain_overflow_bitfield, /* complain_on_overflow */
bc1bc43f 509 bfd_elf_generic_reloc, /* special_function */
252b5132 510 "REFLONG", /* name */
b34976b6 511 FALSE, /* partial_inplace */
252b5132
RH
512 0xffffffff, /* src_mask */
513 0xffffffff, /* dst_mask */
b34976b6 514 FALSE), /* pcrel_offset */
252b5132
RH
515
516 /* A 64 bit reference to a symbol. */
517 HOWTO (R_ALPHA_REFQUAD, /* type */
518 0, /* rightshift */
519 4, /* size (0 = byte, 1 = short, 2 = long) */
520 64, /* bitsize */
b34976b6 521 FALSE, /* pc_relative */
252b5132
RH
522 0, /* bitpos */
523 complain_overflow_bitfield, /* complain_on_overflow */
bc1bc43f 524 bfd_elf_generic_reloc, /* special_function */
252b5132 525 "REFQUAD", /* name */
b34976b6 526 FALSE, /* partial_inplace */
252b5132
RH
527 MINUS_ONE, /* src_mask */
528 MINUS_ONE, /* dst_mask */
b34976b6 529 FALSE), /* pcrel_offset */
252b5132
RH
530
531 /* A 32 bit GP relative offset. This is just like REFLONG except
532 that when the value is used the value of the gp register will be
533 added in. */
534 HOWTO (R_ALPHA_GPREL32, /* type */
535 0, /* rightshift */
536 2, /* size (0 = byte, 1 = short, 2 = long) */
537 32, /* bitsize */
b34976b6 538 FALSE, /* pc_relative */
252b5132
RH
539 0, /* bitpos */
540 complain_overflow_bitfield, /* complain_on_overflow */
bc1bc43f 541 bfd_elf_generic_reloc, /* special_function */
252b5132 542 "GPREL32", /* name */
b34976b6 543 FALSE, /* partial_inplace */
252b5132
RH
544 0xffffffff, /* src_mask */
545 0xffffffff, /* dst_mask */
b34976b6 546 FALSE), /* pcrel_offset */
252b5132
RH
547
548 /* Used for an instruction that refers to memory off the GP register. */
549 HOWTO (R_ALPHA_LITERAL, /* type */
550 0, /* rightshift */
dfe57ca0 551 1, /* size (0 = byte, 1 = short, 2 = long) */
252b5132 552 16, /* bitsize */
b34976b6 553 FALSE, /* pc_relative */
252b5132
RH
554 0, /* bitpos */
555 complain_overflow_signed, /* complain_on_overflow */
bc1bc43f 556 bfd_elf_generic_reloc, /* special_function */
252b5132 557 "ELF_LITERAL", /* name */
b34976b6 558 FALSE, /* partial_inplace */
252b5132
RH
559 0xffff, /* src_mask */
560 0xffff, /* dst_mask */
b34976b6 561 FALSE), /* pcrel_offset */
252b5132
RH
562
563 /* This reloc only appears immediately following an ELF_LITERAL reloc.
564 It identifies a use of the literal. The symbol index is special:
565 1 means the literal address is in the base register of a memory
566 format instruction; 2 means the literal address is in the byte
567 offset register of a byte-manipulation instruction; 3 means the
568 literal address is in the target register of a jsr instruction.
569 This does not actually do any relocation. */
570 HOWTO (R_ALPHA_LITUSE, /* type */
571 0, /* rightshift */
dfe57ca0 572 1, /* size (0 = byte, 1 = short, 2 = long) */
252b5132 573 32, /* bitsize */
b34976b6 574 FALSE, /* pc_relative */
252b5132
RH
575 0, /* bitpos */
576 complain_overflow_dont, /* complain_on_overflow */
577 elf64_alpha_reloc_nil, /* special_function */
578 "LITUSE", /* name */
b34976b6 579 FALSE, /* partial_inplace */
252b5132
RH
580 0, /* src_mask */
581 0, /* dst_mask */
b34976b6 582 FALSE), /* pcrel_offset */
252b5132
RH
583
584 /* Load the gp register. This is always used for a ldah instruction
585 which loads the upper 16 bits of the gp register. The symbol
586 index of the GPDISP instruction is an offset in bytes to the lda
587 instruction that loads the lower 16 bits. The value to use for
588 the relocation is the difference between the GP value and the
589 current location; the load will always be done against a register
590 holding the current address.
591
592 NOTE: Unlike ECOFF, partial in-place relocation is not done. If
593 any offset is present in the instructions, it is an offset from
594 the register to the ldah instruction. This lets us avoid any
595 stupid hackery like inventing a gp value to do partial relocation
596 against. Also unlike ECOFF, we do the whole relocation off of
597 the GPDISP rather than a GPDISP_HI16/GPDISP_LO16 pair. An odd,
598 space consuming bit, that, since all the information was present
599 in the GPDISP_HI16 reloc. */
600 HOWTO (R_ALPHA_GPDISP, /* type */
601 16, /* rightshift */
602 2, /* size (0 = byte, 1 = short, 2 = long) */
603 16, /* bitsize */
b34976b6 604 FALSE, /* pc_relative */
252b5132
RH
605 0, /* bitpos */
606 complain_overflow_dont, /* complain_on_overflow */
607 elf64_alpha_reloc_gpdisp, /* special_function */
608 "GPDISP", /* name */
b34976b6 609 FALSE, /* partial_inplace */
252b5132
RH
610 0xffff, /* src_mask */
611 0xffff, /* dst_mask */
b34976b6 612 TRUE), /* pcrel_offset */
252b5132
RH
613
614 /* A 21 bit branch. */
615 HOWTO (R_ALPHA_BRADDR, /* type */
616 2, /* rightshift */
617 2, /* size (0 = byte, 1 = short, 2 = long) */
618 21, /* bitsize */
b34976b6 619 TRUE, /* pc_relative */
252b5132
RH
620 0, /* bitpos */
621 complain_overflow_signed, /* complain_on_overflow */
bc1bc43f 622 bfd_elf_generic_reloc, /* special_function */
252b5132 623 "BRADDR", /* name */
b34976b6 624 FALSE, /* partial_inplace */
252b5132
RH
625 0x1fffff, /* src_mask */
626 0x1fffff, /* dst_mask */
b34976b6 627 TRUE), /* pcrel_offset */
252b5132
RH
628
629 /* A hint for a jump to a register. */
630 HOWTO (R_ALPHA_HINT, /* type */
631 2, /* rightshift */
dfe57ca0 632 1, /* size (0 = byte, 1 = short, 2 = long) */
252b5132 633 14, /* bitsize */
b34976b6 634 TRUE, /* pc_relative */
252b5132
RH
635 0, /* bitpos */
636 complain_overflow_dont, /* complain_on_overflow */
bc1bc43f 637 bfd_elf_generic_reloc, /* special_function */
252b5132 638 "HINT", /* name */
b34976b6 639 FALSE, /* partial_inplace */
252b5132
RH
640 0x3fff, /* src_mask */
641 0x3fff, /* dst_mask */
b34976b6 642 TRUE), /* pcrel_offset */
252b5132
RH
643
644 /* 16 bit PC relative offset. */
645 HOWTO (R_ALPHA_SREL16, /* type */
646 0, /* rightshift */
647 1, /* size (0 = byte, 1 = short, 2 = long) */
648 16, /* bitsize */
b34976b6 649 TRUE, /* pc_relative */
252b5132
RH
650 0, /* bitpos */
651 complain_overflow_signed, /* complain_on_overflow */
bc1bc43f 652 bfd_elf_generic_reloc, /* special_function */
252b5132 653 "SREL16", /* name */
b34976b6 654 FALSE, /* partial_inplace */
252b5132
RH
655 0xffff, /* src_mask */
656 0xffff, /* dst_mask */
b34976b6 657 TRUE), /* pcrel_offset */
252b5132
RH
658
659 /* 32 bit PC relative offset. */
660 HOWTO (R_ALPHA_SREL32, /* type */
661 0, /* rightshift */
662 2, /* size (0 = byte, 1 = short, 2 = long) */
663 32, /* bitsize */
b34976b6 664 TRUE, /* pc_relative */
252b5132
RH
665 0, /* bitpos */
666 complain_overflow_signed, /* complain_on_overflow */
bc1bc43f 667 bfd_elf_generic_reloc, /* special_function */
252b5132 668 "SREL32", /* name */
b34976b6 669 FALSE, /* partial_inplace */
252b5132
RH
670 0xffffffff, /* src_mask */
671 0xffffffff, /* dst_mask */
b34976b6 672 TRUE), /* pcrel_offset */
252b5132
RH
673
674 /* A 64 bit PC relative offset. */
675 HOWTO (R_ALPHA_SREL64, /* type */
676 0, /* rightshift */
677 4, /* size (0 = byte, 1 = short, 2 = long) */
678 64, /* bitsize */
b34976b6 679 TRUE, /* pc_relative */
252b5132
RH
680 0, /* bitpos */
681 complain_overflow_signed, /* complain_on_overflow */
bc1bc43f 682 bfd_elf_generic_reloc, /* special_function */
252b5132 683 "SREL64", /* name */
b34976b6 684 FALSE, /* partial_inplace */
252b5132
RH
685 MINUS_ONE, /* src_mask */
686 MINUS_ONE, /* dst_mask */
b34976b6 687 TRUE), /* pcrel_offset */
252b5132 688
dfe57ca0
RH
689 /* Skip 12 - 16; deprecated ECOFF relocs. */
690 SKIP_HOWTO (12),
691 SKIP_HOWTO (13),
692 SKIP_HOWTO (14),
693 SKIP_HOWTO (15),
694 SKIP_HOWTO (16),
252b5132
RH
695
696 /* The high 16 bits of the displacement from GP to the target. */
697 HOWTO (R_ALPHA_GPRELHIGH,
698 0, /* rightshift */
dfe57ca0 699 1, /* size (0 = byte, 1 = short, 2 = long) */
252b5132 700 16, /* bitsize */
b34976b6 701 FALSE, /* pc_relative */
252b5132
RH
702 0, /* bitpos */
703 complain_overflow_signed, /* complain_on_overflow */
bc1bc43f 704 bfd_elf_generic_reloc, /* special_function */
252b5132 705 "GPRELHIGH", /* name */
b34976b6 706 FALSE, /* partial_inplace */
252b5132
RH
707 0xffff, /* src_mask */
708 0xffff, /* dst_mask */
b34976b6 709 FALSE), /* pcrel_offset */
252b5132
RH
710
711 /* The low 16 bits of the displacement from GP to the target. */
712 HOWTO (R_ALPHA_GPRELLOW,
713 0, /* rightshift */
dfe57ca0 714 1, /* size (0 = byte, 1 = short, 2 = long) */
252b5132 715 16, /* bitsize */
b34976b6 716 FALSE, /* pc_relative */
252b5132
RH
717 0, /* bitpos */
718 complain_overflow_dont, /* complain_on_overflow */
bc1bc43f 719 bfd_elf_generic_reloc, /* special_function */
252b5132 720 "GPRELLOW", /* name */
b34976b6 721 FALSE, /* partial_inplace */
252b5132
RH
722 0xffff, /* src_mask */
723 0xffff, /* dst_mask */
b34976b6 724 FALSE), /* pcrel_offset */
252b5132
RH
725
726 /* A 16-bit displacement from the GP to the target. */
dfe57ca0 727 HOWTO (R_ALPHA_GPREL16,
252b5132 728 0, /* rightshift */
dfe57ca0 729 1, /* size (0 = byte, 1 = short, 2 = long) */
252b5132 730 16, /* bitsize */
b34976b6 731 FALSE, /* pc_relative */
252b5132
RH
732 0, /* bitpos */
733 complain_overflow_signed, /* complain_on_overflow */
bc1bc43f 734 bfd_elf_generic_reloc, /* special_function */
dfe57ca0 735 "GPREL16", /* name */
b34976b6 736 FALSE, /* partial_inplace */
252b5132
RH
737 0xffff, /* src_mask */
738 0xffff, /* dst_mask */
b34976b6 739 FALSE), /* pcrel_offset */
252b5132 740
dfe57ca0
RH
741 /* Skip 20 - 23; deprecated ECOFF relocs. */
742 SKIP_HOWTO (20),
743 SKIP_HOWTO (21),
744 SKIP_HOWTO (22),
745 SKIP_HOWTO (23),
252b5132 746
fe8bc63d 747 /* Misc ELF relocations. */
252b5132
RH
748
749 /* A dynamic relocation to copy the target into our .dynbss section. */
750 /* Not generated, as all Alpha objects use PIC, so it is not needed. It
751 is present because every other ELF has one, but should not be used
752 because .dynbss is an ugly thing. */
753 HOWTO (R_ALPHA_COPY,
754 0,
755 0,
756 0,
b34976b6 757 FALSE,
252b5132
RH
758 0,
759 complain_overflow_dont,
760 bfd_elf_generic_reloc,
761 "COPY",
b34976b6 762 FALSE,
252b5132
RH
763 0,
764 0,
b34976b6 765 TRUE),
252b5132
RH
766
767 /* A dynamic relocation for a .got entry. */
768 HOWTO (R_ALPHA_GLOB_DAT,
769 0,
770 0,
771 0,
b34976b6 772 FALSE,
252b5132
RH
773 0,
774 complain_overflow_dont,
775 bfd_elf_generic_reloc,
776 "GLOB_DAT",
b34976b6 777 FALSE,
252b5132
RH
778 0,
779 0,
b34976b6 780 TRUE),
252b5132
RH
781
782 /* A dynamic relocation for a .plt entry. */
783 HOWTO (R_ALPHA_JMP_SLOT,
784 0,
785 0,
786 0,
b34976b6 787 FALSE,
252b5132
RH
788 0,
789 complain_overflow_dont,
790 bfd_elf_generic_reloc,
791 "JMP_SLOT",
b34976b6 792 FALSE,
252b5132
RH
793 0,
794 0,
b34976b6 795 TRUE),
252b5132
RH
796
797 /* A dynamic relocation to add the base of the DSO to a 64-bit field. */
798 HOWTO (R_ALPHA_RELATIVE,
799 0,
800 0,
801 0,
b34976b6 802 FALSE,
252b5132
RH
803 0,
804 complain_overflow_dont,
805 bfd_elf_generic_reloc,
806 "RELATIVE",
b34976b6 807 FALSE,
252b5132
RH
808 0,
809 0,
b34976b6 810 TRUE),
7793f4d0
RH
811
812 /* A 21 bit branch that adjusts for gp loads. */
813 HOWTO (R_ALPHA_BRSGP, /* type */
814 2, /* rightshift */
815 2, /* size (0 = byte, 1 = short, 2 = long) */
816 21, /* bitsize */
b34976b6 817 TRUE, /* pc_relative */
7793f4d0
RH
818 0, /* bitpos */
819 complain_overflow_signed, /* complain_on_overflow */
bc1bc43f 820 bfd_elf_generic_reloc, /* special_function */
7793f4d0 821 "BRSGP", /* name */
b34976b6 822 FALSE, /* partial_inplace */
7793f4d0
RH
823 0x1fffff, /* src_mask */
824 0x1fffff, /* dst_mask */
b34976b6 825 TRUE), /* pcrel_offset */
3765b1be
RH
826
827 /* Creates a tls_index for the symbol in the got. */
828 HOWTO (R_ALPHA_TLSGD, /* type */
829 0, /* rightshift */
830 1, /* size (0 = byte, 1 = short, 2 = long) */
831 16, /* bitsize */
b34976b6 832 FALSE, /* pc_relative */
3765b1be
RH
833 0, /* bitpos */
834 complain_overflow_signed, /* complain_on_overflow */
bc1bc43f 835 bfd_elf_generic_reloc, /* special_function */
3765b1be 836 "TLSGD", /* name */
b34976b6 837 FALSE, /* partial_inplace */
3765b1be
RH
838 0xffff, /* src_mask */
839 0xffff, /* dst_mask */
b34976b6 840 FALSE), /* pcrel_offset */
3765b1be
RH
841
842 /* Creates a tls_index for the (current) module in the got. */
843 HOWTO (R_ALPHA_TLSLDM, /* type */
844 0, /* rightshift */
845 1, /* size (0 = byte, 1 = short, 2 = long) */
846 16, /* bitsize */
b34976b6 847 FALSE, /* pc_relative */
3765b1be
RH
848 0, /* bitpos */
849 complain_overflow_signed, /* complain_on_overflow */
bc1bc43f 850 bfd_elf_generic_reloc, /* special_function */
3765b1be 851 "TLSLDM", /* name */
b34976b6 852 FALSE, /* partial_inplace */
3765b1be
RH
853 0xffff, /* src_mask */
854 0xffff, /* dst_mask */
b34976b6 855 FALSE), /* pcrel_offset */
3765b1be
RH
856
857 /* A dynamic relocation for a DTP module entry. */
858 HOWTO (R_ALPHA_DTPMOD64, /* type */
859 0, /* rightshift */
860 4, /* size (0 = byte, 1 = short, 2 = long) */
861 64, /* bitsize */
b34976b6 862 FALSE, /* pc_relative */
3765b1be
RH
863 0, /* bitpos */
864 complain_overflow_bitfield, /* complain_on_overflow */
bc1bc43f 865 bfd_elf_generic_reloc, /* special_function */
3765b1be 866 "DTPMOD64", /* name */
b34976b6 867 FALSE, /* partial_inplace */
3765b1be
RH
868 MINUS_ONE, /* src_mask */
869 MINUS_ONE, /* dst_mask */
b34976b6 870 FALSE), /* pcrel_offset */
3765b1be
RH
871
872 /* Creates a 64-bit offset in the got for the displacement
873 from DTP to the target. */
874 HOWTO (R_ALPHA_GOTDTPREL, /* type */
875 0, /* rightshift */
876 1, /* size (0 = byte, 1 = short, 2 = long) */
877 16, /* bitsize */
b34976b6 878 FALSE, /* pc_relative */
3765b1be
RH
879 0, /* bitpos */
880 complain_overflow_signed, /* complain_on_overflow */
bc1bc43f 881 bfd_elf_generic_reloc, /* special_function */
3765b1be 882 "GOTDTPREL", /* name */
b34976b6 883 FALSE, /* partial_inplace */
3765b1be
RH
884 0xffff, /* src_mask */
885 0xffff, /* dst_mask */
b34976b6 886 FALSE), /* pcrel_offset */
3765b1be
RH
887
888 /* A dynamic relocation for a displacement from DTP to the target. */
889 HOWTO (R_ALPHA_DTPREL64, /* type */
890 0, /* rightshift */
891 4, /* size (0 = byte, 1 = short, 2 = long) */
892 64, /* bitsize */
b34976b6 893 FALSE, /* pc_relative */
3765b1be
RH
894 0, /* bitpos */
895 complain_overflow_bitfield, /* complain_on_overflow */
bc1bc43f 896 bfd_elf_generic_reloc, /* special_function */
3765b1be 897 "DTPREL64", /* name */
b34976b6 898 FALSE, /* partial_inplace */
3765b1be
RH
899 MINUS_ONE, /* src_mask */
900 MINUS_ONE, /* dst_mask */
b34976b6 901 FALSE), /* pcrel_offset */
3765b1be
RH
902
903 /* The high 16 bits of the displacement from DTP to the target. */
904 HOWTO (R_ALPHA_DTPRELHI, /* type */
905 0, /* rightshift */
906 1, /* size (0 = byte, 1 = short, 2 = long) */
907 16, /* bitsize */
b34976b6 908 FALSE, /* pc_relative */
3765b1be
RH
909 0, /* bitpos */
910 complain_overflow_signed, /* complain_on_overflow */
bc1bc43f 911 bfd_elf_generic_reloc, /* special_function */
3765b1be 912 "DTPRELHI", /* name */
b34976b6 913 FALSE, /* partial_inplace */
3765b1be
RH
914 0xffff, /* src_mask */
915 0xffff, /* dst_mask */
b34976b6 916 FALSE), /* pcrel_offset */
3765b1be
RH
917
918 /* The low 16 bits of the displacement from DTP to the target. */
919 HOWTO (R_ALPHA_DTPRELLO, /* type */
920 0, /* rightshift */
921 1, /* size (0 = byte, 1 = short, 2 = long) */
922 16, /* bitsize */
b34976b6 923 FALSE, /* pc_relative */
3765b1be
RH
924 0, /* bitpos */
925 complain_overflow_dont, /* complain_on_overflow */
bc1bc43f 926 bfd_elf_generic_reloc, /* special_function */
3765b1be 927 "DTPRELLO", /* name */
b34976b6 928 FALSE, /* partial_inplace */
3765b1be
RH
929 0xffff, /* src_mask */
930 0xffff, /* dst_mask */
b34976b6 931 FALSE), /* pcrel_offset */
3765b1be
RH
932
933 /* A 16-bit displacement from DTP to the target. */
934 HOWTO (R_ALPHA_DTPREL16, /* type */
935 0, /* rightshift */
936 1, /* size (0 = byte, 1 = short, 2 = long) */
937 16, /* bitsize */
b34976b6 938 FALSE, /* pc_relative */
3765b1be
RH
939 0, /* bitpos */
940 complain_overflow_signed, /* complain_on_overflow */
bc1bc43f 941 bfd_elf_generic_reloc, /* special_function */
3765b1be 942 "DTPREL16", /* name */
b34976b6 943 FALSE, /* partial_inplace */
3765b1be
RH
944 0xffff, /* src_mask */
945 0xffff, /* dst_mask */
b34976b6 946 FALSE), /* pcrel_offset */
3765b1be
RH
947
948 /* Creates a 64-bit offset in the got for the displacement
949 from TP to the target. */
950 HOWTO (R_ALPHA_GOTTPREL, /* type */
951 0, /* rightshift */
952 1, /* size (0 = byte, 1 = short, 2 = long) */
953 16, /* bitsize */
b34976b6 954 FALSE, /* pc_relative */
3765b1be
RH
955 0, /* bitpos */
956 complain_overflow_signed, /* complain_on_overflow */
bc1bc43f 957 bfd_elf_generic_reloc, /* special_function */
3765b1be 958 "GOTTPREL", /* name */
b34976b6 959 FALSE, /* partial_inplace */
3765b1be
RH
960 0xffff, /* src_mask */
961 0xffff, /* dst_mask */
b34976b6 962 FALSE), /* pcrel_offset */
3765b1be
RH
963
964 /* A dynamic relocation for a displacement from TP to the target. */
965 HOWTO (R_ALPHA_TPREL64, /* type */
966 0, /* rightshift */
967 4, /* size (0 = byte, 1 = short, 2 = long) */
968 64, /* bitsize */
b34976b6 969 FALSE, /* pc_relative */
3765b1be
RH
970 0, /* bitpos */
971 complain_overflow_bitfield, /* complain_on_overflow */
bc1bc43f 972 bfd_elf_generic_reloc, /* special_function */
3765b1be 973 "TPREL64", /* name */
b34976b6 974 FALSE, /* partial_inplace */
3765b1be
RH
975 MINUS_ONE, /* src_mask */
976 MINUS_ONE, /* dst_mask */
b34976b6 977 FALSE), /* pcrel_offset */
3765b1be
RH
978
979 /* The high 16 bits of the displacement from TP to the target. */
980 HOWTO (R_ALPHA_TPRELHI, /* type */
981 0, /* rightshift */
982 1, /* size (0 = byte, 1 = short, 2 = long) */
983 16, /* bitsize */
b34976b6 984 FALSE, /* pc_relative */
3765b1be
RH
985 0, /* bitpos */
986 complain_overflow_signed, /* complain_on_overflow */
bc1bc43f 987 bfd_elf_generic_reloc, /* special_function */
3765b1be 988 "TPRELHI", /* name */
b34976b6 989 FALSE, /* partial_inplace */
3765b1be
RH
990 0xffff, /* src_mask */
991 0xffff, /* dst_mask */
b34976b6 992 FALSE), /* pcrel_offset */
3765b1be
RH
993
994 /* The low 16 bits of the displacement from TP to the target. */
995 HOWTO (R_ALPHA_TPRELLO, /* type */
996 0, /* rightshift */
997 1, /* size (0 = byte, 1 = short, 2 = long) */
998 16, /* bitsize */
b34976b6 999 FALSE, /* pc_relative */
3765b1be
RH
1000 0, /* bitpos */
1001 complain_overflow_dont, /* complain_on_overflow */
bc1bc43f 1002 bfd_elf_generic_reloc, /* special_function */
3765b1be 1003 "TPRELLO", /* name */
b34976b6 1004 FALSE, /* partial_inplace */
3765b1be
RH
1005 0xffff, /* src_mask */
1006 0xffff, /* dst_mask */
b34976b6 1007 FALSE), /* pcrel_offset */
3765b1be
RH
1008
1009 /* A 16-bit displacement from TP to the target. */
1010 HOWTO (R_ALPHA_TPREL16, /* type */
1011 0, /* rightshift */
1012 1, /* size (0 = byte, 1 = short, 2 = long) */
1013 16, /* bitsize */
b34976b6 1014 FALSE, /* pc_relative */
3765b1be
RH
1015 0, /* bitpos */
1016 complain_overflow_signed, /* complain_on_overflow */
bc1bc43f 1017 bfd_elf_generic_reloc, /* special_function */
3765b1be 1018 "TPREL16", /* name */
b34976b6 1019 FALSE, /* partial_inplace */
3765b1be
RH
1020 0xffff, /* src_mask */
1021 0xffff, /* dst_mask */
b34976b6 1022 FALSE), /* pcrel_offset */
252b5132
RH
1023};
1024
252b5132
RH
1025/* A mapping from BFD reloc types to Alpha ELF reloc types. */
1026
1027struct elf_reloc_map
1028{
1029 bfd_reloc_code_real_type bfd_reloc_val;
1030 int elf_reloc_val;
1031};
1032
1033static const struct elf_reloc_map elf64_alpha_reloc_map[] =
1034{
dfe57ca0
RH
1035 {BFD_RELOC_NONE, R_ALPHA_NONE},
1036 {BFD_RELOC_32, R_ALPHA_REFLONG},
1037 {BFD_RELOC_64, R_ALPHA_REFQUAD},
1038 {BFD_RELOC_CTOR, R_ALPHA_REFQUAD},
1039 {BFD_RELOC_GPREL32, R_ALPHA_GPREL32},
1040 {BFD_RELOC_ALPHA_ELF_LITERAL, R_ALPHA_LITERAL},
1041 {BFD_RELOC_ALPHA_LITUSE, R_ALPHA_LITUSE},
1042 {BFD_RELOC_ALPHA_GPDISP, R_ALPHA_GPDISP},
1043 {BFD_RELOC_23_PCREL_S2, R_ALPHA_BRADDR},
1044 {BFD_RELOC_ALPHA_HINT, R_ALPHA_HINT},
1045 {BFD_RELOC_16_PCREL, R_ALPHA_SREL16},
1046 {BFD_RELOC_32_PCREL, R_ALPHA_SREL32},
1047 {BFD_RELOC_64_PCREL, R_ALPHA_SREL64},
1048 {BFD_RELOC_ALPHA_GPREL_HI16, R_ALPHA_GPRELHIGH},
1049 {BFD_RELOC_ALPHA_GPREL_LO16, R_ALPHA_GPRELLOW},
1050 {BFD_RELOC_GPREL16, R_ALPHA_GPREL16},
7793f4d0 1051 {BFD_RELOC_ALPHA_BRSGP, R_ALPHA_BRSGP},
3765b1be
RH
1052 {BFD_RELOC_ALPHA_TLSGD, R_ALPHA_TLSGD},
1053 {BFD_RELOC_ALPHA_TLSLDM, R_ALPHA_TLSLDM},
1054 {BFD_RELOC_ALPHA_DTPMOD64, R_ALPHA_DTPMOD64},
1055 {BFD_RELOC_ALPHA_GOTDTPREL16, R_ALPHA_GOTDTPREL},
1056 {BFD_RELOC_ALPHA_DTPREL64, R_ALPHA_DTPREL64},
1057 {BFD_RELOC_ALPHA_DTPREL_HI16, R_ALPHA_DTPRELHI},
1058 {BFD_RELOC_ALPHA_DTPREL_LO16, R_ALPHA_DTPRELLO},
1059 {BFD_RELOC_ALPHA_DTPREL16, R_ALPHA_DTPREL16},
1060 {BFD_RELOC_ALPHA_GOTTPREL16, R_ALPHA_GOTTPREL},
1061 {BFD_RELOC_ALPHA_TPREL64, R_ALPHA_TPREL64},
1062 {BFD_RELOC_ALPHA_TPREL_HI16, R_ALPHA_TPRELHI},
1063 {BFD_RELOC_ALPHA_TPREL_LO16, R_ALPHA_TPRELLO},
1064 {BFD_RELOC_ALPHA_TPREL16, R_ALPHA_TPREL16},
252b5132
RH
1065};
1066
1067/* Given a BFD reloc type, return a HOWTO structure. */
1068
1069static reloc_howto_type *
a7519a3c
RH
1070elf64_alpha_bfd_reloc_type_lookup (bfd *abfd ATTRIBUTE_UNUSED,
1071 bfd_reloc_code_real_type code)
252b5132
RH
1072{
1073 const struct elf_reloc_map *i, *e;
1074 i = e = elf64_alpha_reloc_map;
1075 e += sizeof (elf64_alpha_reloc_map) / sizeof (struct elf_reloc_map);
1076 for (; i != e; ++i)
1077 {
1078 if (i->bfd_reloc_val == code)
1079 return &elf64_alpha_howto_table[i->elf_reloc_val];
1080 }
1081 return 0;
1082}
1083
157090f7
AM
1084static reloc_howto_type *
1085elf64_alpha_bfd_reloc_name_lookup (bfd *abfd ATTRIBUTE_UNUSED,
1086 const char *r_name)
1087{
1088 unsigned int i;
1089
1090 for (i = 0;
1091 i < (sizeof (elf64_alpha_howto_table)
1092 / sizeof (elf64_alpha_howto_table[0]));
1093 i++)
1094 if (elf64_alpha_howto_table[i].name != NULL
1095 && strcasecmp (elf64_alpha_howto_table[i].name, r_name) == 0)
1096 return &elf64_alpha_howto_table[i];
1097
1098 return NULL;
1099}
1100
252b5132
RH
1101/* Given an Alpha ELF reloc type, fill in an arelent structure. */
1102
1103static void
a7519a3c
RH
1104elf64_alpha_info_to_howto (bfd *abfd ATTRIBUTE_UNUSED, arelent *cache_ptr,
1105 Elf_Internal_Rela *dst)
252b5132 1106{
a7519a3c 1107 unsigned r_type = ELF64_R_TYPE(dst->r_info);
cd21f5da
NC
1108
1109 if (r_type >= R_ALPHA_max)
1110 {
695344c0 1111 /* xgettext:c-format */
4eca0228
AM
1112 _bfd_error_handler (_("%B: unrecognised Alpha reloc number: %d"),
1113 abfd, r_type);
cd21f5da
NC
1114 bfd_set_error (bfd_error_bad_value);
1115 r_type = R_ALPHA_NONE;
1116 }
252b5132
RH
1117 cache_ptr->howto = &elf64_alpha_howto_table[r_type];
1118}
3765b1be
RH
1119
1120/* These two relocations create a two-word entry in the got. */
1121#define alpha_got_entry_size(r_type) \
1122 (r_type == R_ALPHA_TLSGD || r_type == R_ALPHA_TLSLDM ? 16 : 8)
9e756d64
RH
1123
1124/* This is PT_TLS segment p_vaddr. */
e1918d23
AM
1125#define alpha_get_dtprel_base(info) \
1126 (elf_hash_table (info)->tls_sec->vma)
9e756d64
RH
1127
1128/* Main program TLS (whose template starts at PT_TLS p_vaddr)
1129 is assigned offset round(16, PT_TLS p_align). */
e1918d23
AM
1130#define alpha_get_tprel_base(info) \
1131 (elf_hash_table (info)->tls_sec->vma \
1132 - align_power ((bfd_vma) 16, \
1133 elf_hash_table (info)->tls_sec->alignment_power))
252b5132 1134\f
a7519a3c
RH
1135/* Handle an Alpha specific section when reading an object file. This
1136 is called when bfd_section_from_shdr finds a section with an unknown
1137 type.
1138 FIXME: We need to handle the SHF_ALPHA_GPREL flag, but I'm not sure
1139 how to. */
252b5132 1140
a7519a3c
RH
1141static bfd_boolean
1142elf64_alpha_section_from_shdr (bfd *abfd,
1143 Elf_Internal_Shdr *hdr,
1144 const char *name,
1145 int shindex)
252b5132 1146{
a7519a3c
RH
1147 asection *newsect;
1148
1149 /* There ought to be a place to keep ELF backend specific flags, but
1150 at the moment there isn't one. We just keep track of the
1151 sections by their name, instead. Fortunately, the ABI gives
1152 suggested names for all the MIPS specific sections, so we will
1153 probably get away with this. */
1154 switch (hdr->sh_type)
1155 {
1156 case SHT_ALPHA_DEBUG:
1157 if (strcmp (name, ".mdebug") != 0)
1158 return FALSE;
1159 break;
1160 default:
1161 return FALSE;
1162 }
252b5132 1163
a7519a3c
RH
1164 if (! _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex))
1165 return FALSE;
1166 newsect = hdr->bfd_section;
252b5132 1167
a7519a3c 1168 if (hdr->sh_type == SHT_ALPHA_DEBUG)
252b5132 1169 {
a7519a3c
RH
1170 if (! bfd_set_section_flags (abfd, newsect,
1171 (bfd_get_section_flags (abfd, newsect)
1172 | SEC_DEBUGGING)))
1173 return FALSE;
252b5132 1174 }
a7519a3c
RH
1175
1176 return TRUE;
252b5132
RH
1177}
1178
a7519a3c
RH
1179/* Convert Alpha specific section flags to bfd internal section flags. */
1180
b34976b6 1181static bfd_boolean
a7519a3c 1182elf64_alpha_section_flags (flagword *flags, const Elf_Internal_Shdr *hdr)
252b5132 1183{
a7519a3c
RH
1184 if (hdr->sh_flags & SHF_ALPHA_GPREL)
1185 *flags |= SEC_SMALL_DATA;
252b5132 1186
a7519a3c
RH
1187 return TRUE;
1188}
252b5132 1189
a7519a3c
RH
1190/* Set the correct type for an Alpha ELF section. We do this by the
1191 section name, which is a hack, but ought to work. */
9e756d64 1192
a7519a3c
RH
1193static bfd_boolean
1194elf64_alpha_fake_sections (bfd *abfd, Elf_Internal_Shdr *hdr, asection *sec)
1195{
1196 register const char *name;
1197
1198 name = bfd_get_section_name (abfd, sec);
1199
1200 if (strcmp (name, ".mdebug") == 0)
252b5132 1201 {
a7519a3c
RH
1202 hdr->sh_type = SHT_ALPHA_DEBUG;
1203 /* In a shared object on Irix 5.3, the .mdebug section has an
1204 entsize of 0. FIXME: Does this matter? */
1205 if ((abfd->flags & DYNAMIC) != 0 )
1206 hdr->sh_entsize = 0;
1207 else
1208 hdr->sh_entsize = 1;
252b5132 1209 }
a7519a3c
RH
1210 else if ((sec->flags & SEC_SMALL_DATA)
1211 || strcmp (name, ".sdata") == 0
1212 || strcmp (name, ".sbss") == 0
1213 || strcmp (name, ".lit4") == 0
1214 || strcmp (name, ".lit8") == 0)
1215 hdr->sh_flags |= SHF_ALPHA_GPREL;
252b5132 1216
a7519a3c
RH
1217 return TRUE;
1218}
252b5132 1219
a7519a3c
RH
1220/* Hook called by the linker routine which adds symbols from an object
1221 file. We use it to put .comm items in .sbss, and not .bss. */
1222
1223static bfd_boolean
1224elf64_alpha_add_symbol_hook (bfd *abfd, struct bfd_link_info *info,
1225 Elf_Internal_Sym *sym,
1226 const char **namep ATTRIBUTE_UNUSED,
1227 flagword *flagsp ATTRIBUTE_UNUSED,
1228 asection **secp, bfd_vma *valp)
1229{
1230 if (sym->st_shndx == SHN_COMMON
0e1862bb 1231 && !bfd_link_relocatable (info)
a7519a3c 1232 && sym->st_size <= elf_gp_size (abfd))
252b5132 1233 {
a7519a3c
RH
1234 /* Common symbols less than or equal to -G nn bytes are
1235 automatically put into .sbss. */
ffcb7aff 1236
a7519a3c 1237 asection *scomm = bfd_get_section_by_name (abfd, ".scommon");
252b5132 1238
a7519a3c 1239 if (scomm == NULL)
252b5132 1240 {
a7519a3c
RH
1241 scomm = bfd_make_section_with_flags (abfd, ".scommon",
1242 (SEC_ALLOC
1243 | SEC_IS_COMMON
1244 | SEC_LINKER_CREATED));
1245 if (scomm == NULL)
1246 return FALSE;
1247 }
ffcb7aff 1248
a7519a3c
RH
1249 *secp = scomm;
1250 *valp = sym->st_size;
1251 }
ffcb7aff 1252
a7519a3c
RH
1253 return TRUE;
1254}
252b5132 1255
a7519a3c 1256/* Create the .got section. */
252b5132 1257
a7519a3c
RH
1258static bfd_boolean
1259elf64_alpha_create_got_section (bfd *abfd,
1260 struct bfd_link_info *info ATTRIBUTE_UNUSED)
1261{
85d162e6 1262 flagword flags;
a7519a3c 1263 asection *s;
252b5132 1264
0ffa91dd
NC
1265 if (! is_alpha_elf (abfd))
1266 return FALSE;
1267
85d162e6
AM
1268 flags = (SEC_ALLOC | SEC_LOAD | SEC_HAS_CONTENTS | SEC_IN_MEMORY
1269 | SEC_LINKER_CREATED);
1270 s = bfd_make_section_anyway_with_flags (abfd, ".got", flags);
a7519a3c
RH
1271 if (s == NULL
1272 || !bfd_set_section_alignment (abfd, s, 3))
1273 return FALSE;
252b5132 1274
a7519a3c 1275 alpha_elf_tdata (abfd)->got = s;
252b5132 1276
85d162e6
AM
1277 /* Make sure the object's gotobj is set to itself so that we default
1278 to every object with its own .got. We'll merge .gots later once
1279 we've collected each object's info. */
1280 alpha_elf_tdata (abfd)->gotobj = abfd;
1281
a7519a3c
RH
1282 return TRUE;
1283}
252b5132 1284
a7519a3c 1285/* Create all the dynamic sections. */
252b5132 1286
a7519a3c
RH
1287static bfd_boolean
1288elf64_alpha_create_dynamic_sections (bfd *abfd, struct bfd_link_info *info)
1289{
1290 asection *s;
85d162e6 1291 flagword flags;
a7519a3c 1292 struct elf_link_hash_entry *h;
252b5132 1293
0ffa91dd
NC
1294 if (! is_alpha_elf (abfd))
1295 return FALSE;
1296
a7519a3c 1297 /* We need to create .plt, .rela.plt, .got, and .rela.got sections. */
252b5132 1298
85d162e6
AM
1299 flags = (SEC_ALLOC | SEC_LOAD | SEC_CODE | SEC_HAS_CONTENTS | SEC_IN_MEMORY
1300 | SEC_LINKER_CREATED
1301 | (elf64_alpha_use_secureplt ? SEC_READONLY : 0));
1302 s = bfd_make_section_anyway_with_flags (abfd, ".plt", flags);
ce558b89 1303 elf_hash_table (info)->splt = s;
6ec7057a 1304 if (s == NULL || ! bfd_set_section_alignment (abfd, s, 4))
a7519a3c 1305 return FALSE;
252b5132 1306
a7519a3c
RH
1307 /* Define the symbol _PROCEDURE_LINKAGE_TABLE_ at the start of the
1308 .plt section. */
7325306f
RS
1309 h = _bfd_elf_define_linkage_sym (abfd, info, s,
1310 "_PROCEDURE_LINKAGE_TABLE_");
1311 elf_hash_table (info)->hplt = h;
1312 if (h == NULL)
a7519a3c 1313 return FALSE;
d6ad34f6 1314
85d162e6
AM
1315 flags = (SEC_ALLOC | SEC_LOAD | SEC_HAS_CONTENTS | SEC_IN_MEMORY
1316 | SEC_LINKER_CREATED | SEC_READONLY);
1317 s = bfd_make_section_anyway_with_flags (abfd, ".rela.plt", flags);
ce558b89 1318 elf_hash_table (info)->srelplt = s;
6ec7057a 1319 if (s == NULL || ! bfd_set_section_alignment (abfd, s, 3))
a7519a3c 1320 return FALSE;
252b5132 1321
6ec7057a
RH
1322 if (elf64_alpha_use_secureplt)
1323 {
85d162e6
AM
1324 flags = SEC_ALLOC | SEC_LINKER_CREATED;
1325 s = bfd_make_section_anyway_with_flags (abfd, ".got.plt", flags);
ce558b89 1326 elf_hash_table (info)->sgotplt = s;
6ec7057a
RH
1327 if (s == NULL || ! bfd_set_section_alignment (abfd, s, 3))
1328 return FALSE;
1329 }
1330
a7519a3c
RH
1331 /* We may or may not have created a .got section for this object, but
1332 we definitely havn't done the rest of the work. */
1cd6895c 1333
85d162e6
AM
1334 if (alpha_elf_tdata(abfd)->gotobj == NULL)
1335 {
1336 if (!elf64_alpha_create_got_section (abfd, info))
1337 return FALSE;
1338 }
1cd6895c 1339
85d162e6
AM
1340 flags = (SEC_ALLOC | SEC_LOAD | SEC_HAS_CONTENTS | SEC_IN_MEMORY
1341 | SEC_LINKER_CREATED | SEC_READONLY);
1342 s = bfd_make_section_anyway_with_flags (abfd, ".rela.got", flags);
ce558b89 1343 elf_hash_table (info)->srelgot = s;
a7519a3c
RH
1344 if (s == NULL
1345 || !bfd_set_section_alignment (abfd, s, 3))
1346 return FALSE;
252b5132 1347
a7519a3c
RH
1348 /* Define the symbol _GLOBAL_OFFSET_TABLE_ at the start of the
1349 dynobj's .got section. We don't do this in the linker script
1350 because we don't want to define the symbol if we are not creating
1351 a global offset table. */
d98685ac
AM
1352 h = _bfd_elf_define_linkage_sym (abfd, info, alpha_elf_tdata(abfd)->got,
1353 "_GLOBAL_OFFSET_TABLE_");
a7519a3c 1354 elf_hash_table (info)->hgot = h;
d98685ac
AM
1355 if (h == NULL)
1356 return FALSE;
252b5132 1357
a7519a3c 1358 return TRUE;
252b5132 1359}
a7519a3c
RH
1360\f
1361/* Read ECOFF debugging information from a .mdebug section into a
1362 ecoff_debug_info structure. */
252b5132 1363
a7519a3c
RH
1364static bfd_boolean
1365elf64_alpha_read_ecoff_info (bfd *abfd, asection *section,
1366 struct ecoff_debug_info *debug)
252b5132 1367{
a7519a3c
RH
1368 HDRR *symhdr;
1369 const struct ecoff_debug_swap *swap;
1370 char *ext_hdr = NULL;
252b5132 1371
a7519a3c
RH
1372 swap = get_elf_backend_data (abfd)->elf_backend_ecoff_debug_swap;
1373 memset (debug, 0, sizeof (*debug));
252b5132 1374
a7519a3c
RH
1375 ext_hdr = (char *) bfd_malloc (swap->external_hdr_size);
1376 if (ext_hdr == NULL && swap->external_hdr_size != 0)
1377 goto error_return;
252b5132 1378
a7519a3c
RH
1379 if (! bfd_get_section_contents (abfd, section, ext_hdr, (file_ptr) 0,
1380 swap->external_hdr_size))
1381 goto error_return;
252b5132 1382
a7519a3c
RH
1383 symhdr = &debug->symbolic_header;
1384 (*swap->swap_hdr_in) (abfd, ext_hdr, symhdr);
252b5132 1385
a7519a3c
RH
1386 /* The symbolic header contains absolute file offsets and sizes to
1387 read. */
1388#define READ(ptr, offset, count, size, type) \
1389 if (symhdr->count == 0) \
1390 debug->ptr = NULL; \
1391 else \
1392 { \
1393 bfd_size_type amt = (bfd_size_type) size * symhdr->count; \
1394 debug->ptr = (type) bfd_malloc (amt); \
1395 if (debug->ptr == NULL) \
1396 goto error_return; \
1397 if (bfd_seek (abfd, (file_ptr) symhdr->offset, SEEK_SET) != 0 \
1398 || bfd_bread (debug->ptr, amt, abfd) != amt) \
1399 goto error_return; \
1400 }
fe8bc63d 1401
a7519a3c 1402 READ (line, cbLineOffset, cbLine, sizeof (unsigned char), unsigned char *);
2c3fc389
NC
1403 READ (external_dnr, cbDnOffset, idnMax, swap->external_dnr_size, void *);
1404 READ (external_pdr, cbPdOffset, ipdMax, swap->external_pdr_size, void *);
1405 READ (external_sym, cbSymOffset, isymMax, swap->external_sym_size, void *);
1406 READ (external_opt, cbOptOffset, ioptMax, swap->external_opt_size, void *);
a7519a3c
RH
1407 READ (external_aux, cbAuxOffset, iauxMax, sizeof (union aux_ext),
1408 union aux_ext *);
1409 READ (ss, cbSsOffset, issMax, sizeof (char), char *);
1410 READ (ssext, cbSsExtOffset, issExtMax, sizeof (char), char *);
2c3fc389
NC
1411 READ (external_fdr, cbFdOffset, ifdMax, swap->external_fdr_size, void *);
1412 READ (external_rfd, cbRfdOffset, crfd, swap->external_rfd_size, void *);
1413 READ (external_ext, cbExtOffset, iextMax, swap->external_ext_size, void *);
a7519a3c 1414#undef READ
252b5132 1415
a7519a3c 1416 debug->fdr = NULL;
252b5132 1417
a7519a3c 1418 return TRUE;
252b5132 1419
a7519a3c
RH
1420 error_return:
1421 if (ext_hdr != NULL)
1422 free (ext_hdr);
1423 if (debug->line != NULL)
1424 free (debug->line);
1425 if (debug->external_dnr != NULL)
1426 free (debug->external_dnr);
1427 if (debug->external_pdr != NULL)
1428 free (debug->external_pdr);
1429 if (debug->external_sym != NULL)
1430 free (debug->external_sym);
1431 if (debug->external_opt != NULL)
1432 free (debug->external_opt);
1433 if (debug->external_aux != NULL)
1434 free (debug->external_aux);
1435 if (debug->ss != NULL)
1436 free (debug->ss);
1437 if (debug->ssext != NULL)
1438 free (debug->ssext);
1439 if (debug->external_fdr != NULL)
1440 free (debug->external_fdr);
1441 if (debug->external_rfd != NULL)
1442 free (debug->external_rfd);
1443 if (debug->external_ext != NULL)
1444 free (debug->external_ext);
1445 return FALSE;
252b5132
RH
1446}
1447
a7519a3c
RH
1448/* Alpha ELF local labels start with '$'. */
1449
b34976b6 1450static bfd_boolean
a7519a3c 1451elf64_alpha_is_local_label_name (bfd *abfd ATTRIBUTE_UNUSED, const char *name)
252b5132 1452{
a7519a3c
RH
1453 return name[0] == '$';
1454}
9e756d64 1455
a7519a3c 1456static bfd_boolean
fb167eb2
AM
1457elf64_alpha_find_nearest_line (bfd *abfd, asymbol **symbols,
1458 asection *section, bfd_vma offset,
1459 const char **filename_ptr,
a7519a3c 1460 const char **functionname_ptr,
fb167eb2
AM
1461 unsigned int *line_ptr,
1462 unsigned int *discriminator_ptr)
a7519a3c
RH
1463{
1464 asection *msec;
252b5132 1465
fb167eb2 1466 if (_bfd_dwarf2_find_nearest_line (abfd, symbols, NULL, section, offset,
a7519a3c 1467 filename_ptr, functionname_ptr,
fb167eb2
AM
1468 line_ptr, discriminator_ptr,
1469 dwarf_debug_sections, 0,
a7519a3c 1470 &elf_tdata (abfd)->dwarf2_find_line_info))
b34976b6 1471 return TRUE;
9e756d64 1472
a7519a3c
RH
1473 msec = bfd_get_section_by_name (abfd, ".mdebug");
1474 if (msec != NULL)
1bbc9cec 1475 {
a7519a3c 1476 flagword origflags;
698600e4 1477 struct alpha_elf_find_line *fi;
a7519a3c
RH
1478 const struct ecoff_debug_swap * const swap =
1479 get_elf_backend_data (abfd)->elf_backend_ecoff_debug_swap;
252b5132 1480
a7519a3c
RH
1481 /* If we are called during a link, alpha_elf_final_link may have
1482 cleared the SEC_HAS_CONTENTS field. We force it back on here
1483 if appropriate (which it normally will be). */
1484 origflags = msec->flags;
1485 if (elf_section_data (msec)->this_hdr.sh_type != SHT_NOBITS)
1486 msec->flags |= SEC_HAS_CONTENTS;
9e756d64 1487
698600e4 1488 fi = alpha_elf_tdata (abfd)->find_line_info;
a7519a3c
RH
1489 if (fi == NULL)
1490 {
1491 bfd_size_type external_fdr_size;
1492 char *fraw_src;
1493 char *fraw_end;
1494 struct fdr *fdr_ptr;
698600e4 1495 bfd_size_type amt = sizeof (struct alpha_elf_find_line);
9e756d64 1496
698600e4 1497 fi = (struct alpha_elf_find_line *) bfd_zalloc (abfd, amt);
a7519a3c
RH
1498 if (fi == NULL)
1499 {
1500 msec->flags = origflags;
1501 return FALSE;
1502 }
9e756d64 1503
a7519a3c
RH
1504 if (!elf64_alpha_read_ecoff_info (abfd, msec, &fi->d))
1505 {
1506 msec->flags = origflags;
1507 return FALSE;
1508 }
9e756d64 1509
a7519a3c
RH
1510 /* Swap in the FDR information. */
1511 amt = fi->d.symbolic_header.ifdMax * sizeof (struct fdr);
1512 fi->d.fdr = (struct fdr *) bfd_alloc (abfd, amt);
1513 if (fi->d.fdr == NULL)
1514 {
1515 msec->flags = origflags;
1516 return FALSE;
1517 }
1518 external_fdr_size = swap->external_fdr_size;
1519 fdr_ptr = fi->d.fdr;
1520 fraw_src = (char *) fi->d.external_fdr;
1521 fraw_end = (fraw_src
1522 + fi->d.symbolic_header.ifdMax * external_fdr_size);
1523 for (; fraw_src < fraw_end; fraw_src += external_fdr_size, fdr_ptr++)
2c3fc389 1524 (*swap->swap_fdr_in) (abfd, fraw_src, fdr_ptr);
9e756d64 1525
698600e4 1526 alpha_elf_tdata (abfd)->find_line_info = fi;
9e756d64 1527
a7519a3c
RH
1528 /* Note that we don't bother to ever free this information.
1529 find_nearest_line is either called all the time, as in
1530 objdump -l, so the information should be saved, or it is
1531 rarely called, as in ld error messages, so the memory
1532 wasted is unimportant. Still, it would probably be a
1533 good idea for free_cached_info to throw it away. */
1534 }
9e756d64 1535
a7519a3c
RH
1536 if (_bfd_ecoff_locate_line (abfd, section, offset, &fi->d, swap,
1537 &fi->i, filename_ptr, functionname_ptr,
1538 line_ptr))
1539 {
1540 msec->flags = origflags;
1541 return TRUE;
1542 }
9e756d64 1543
a7519a3c 1544 msec->flags = origflags;
9e756d64 1545 }
9e756d64 1546
a7519a3c 1547 /* Fall back on the generic ELF find_nearest_line routine. */
9e756d64 1548
fb167eb2 1549 return _bfd_elf_find_nearest_line (abfd, symbols, section, offset,
a7519a3c 1550 filename_ptr, functionname_ptr,
fb167eb2 1551 line_ptr, discriminator_ptr);
9e756d64 1552}
a7519a3c
RH
1553\f
1554/* Structure used to pass information to alpha_elf_output_extsym. */
9e756d64 1555
a7519a3c 1556struct extsym_info
9e756d64 1557{
a7519a3c
RH
1558 bfd *abfd;
1559 struct bfd_link_info *info;
1560 struct ecoff_debug_info *debug;
1561 const struct ecoff_debug_swap *swap;
1562 bfd_boolean failed;
1563};
9e756d64 1564
a7519a3c 1565static bfd_boolean
2c3fc389 1566elf64_alpha_output_extsym (struct alpha_elf_link_hash_entry *h, void * data)
a7519a3c
RH
1567{
1568 struct extsym_info *einfo = (struct extsym_info *) data;
1569 bfd_boolean strip;
1570 asection *sec, *output_section;
9e756d64 1571
a7519a3c
RH
1572 if (h->root.indx == -2)
1573 strip = FALSE;
1574 else if ((h->root.def_dynamic
1575 || h->root.ref_dynamic
1576 || h->root.root.type == bfd_link_hash_new)
1577 && !h->root.def_regular
1578 && !h->root.ref_regular)
1579 strip = TRUE;
1580 else if (einfo->info->strip == strip_all
1581 || (einfo->info->strip == strip_some
1582 && bfd_hash_lookup (einfo->info->keep_hash,
1583 h->root.root.root.string,
1584 FALSE, FALSE) == NULL))
1585 strip = TRUE;
1586 else
1587 strip = FALSE;
9e756d64 1588
a7519a3c 1589 if (strip)
b34976b6 1590 return TRUE;
9e756d64 1591
a7519a3c 1592 if (h->esym.ifd == -2)
9e756d64 1593 {
a7519a3c
RH
1594 h->esym.jmptbl = 0;
1595 h->esym.cobol_main = 0;
1596 h->esym.weakext = 0;
1597 h->esym.reserved = 0;
1598 h->esym.ifd = ifdNil;
1599 h->esym.asym.value = 0;
1600 h->esym.asym.st = stGlobal;
9e756d64 1601
a7519a3c
RH
1602 if (h->root.root.type != bfd_link_hash_defined
1603 && h->root.root.type != bfd_link_hash_defweak)
1604 h->esym.asym.sc = scAbs;
1605 else
1606 {
1607 const char *name;
9e756d64 1608
a7519a3c
RH
1609 sec = h->root.root.u.def.section;
1610 output_section = sec->output_section;
9e756d64 1611
a7519a3c
RH
1612 /* When making a shared library and symbol h is the one from
1613 the another shared library, OUTPUT_SECTION may be null. */
1614 if (output_section == NULL)
1615 h->esym.asym.sc = scUndefined;
1616 else
1617 {
1618 name = bfd_section_name (output_section->owner, output_section);
9e756d64 1619
a7519a3c
RH
1620 if (strcmp (name, ".text") == 0)
1621 h->esym.asym.sc = scText;
1622 else if (strcmp (name, ".data") == 0)
1623 h->esym.asym.sc = scData;
1624 else if (strcmp (name, ".sdata") == 0)
1625 h->esym.asym.sc = scSData;
1626 else if (strcmp (name, ".rodata") == 0
1627 || strcmp (name, ".rdata") == 0)
1628 h->esym.asym.sc = scRData;
1629 else if (strcmp (name, ".bss") == 0)
1630 h->esym.asym.sc = scBss;
1631 else if (strcmp (name, ".sbss") == 0)
1632 h->esym.asym.sc = scSBss;
1633 else if (strcmp (name, ".init") == 0)
1634 h->esym.asym.sc = scInit;
1635 else if (strcmp (name, ".fini") == 0)
1636 h->esym.asym.sc = scFini;
1637 else
1638 h->esym.asym.sc = scAbs;
1639 }
1640 }
9e756d64 1641
a7519a3c
RH
1642 h->esym.asym.reserved = 0;
1643 h->esym.asym.index = indexNil;
1644 }
9e756d64 1645
a7519a3c
RH
1646 if (h->root.root.type == bfd_link_hash_common)
1647 h->esym.asym.value = h->root.root.u.c.size;
1648 else if (h->root.root.type == bfd_link_hash_defined
1649 || h->root.root.type == bfd_link_hash_defweak)
1650 {
1651 if (h->esym.asym.sc == scCommon)
1652 h->esym.asym.sc = scBss;
1653 else if (h->esym.asym.sc == scSCommon)
1654 h->esym.asym.sc = scSBss;
9e756d64 1655
a7519a3c
RH
1656 sec = h->root.root.u.def.section;
1657 output_section = sec->output_section;
1658 if (output_section != NULL)
1659 h->esym.asym.value = (h->root.root.u.def.value
1660 + sec->output_offset
1661 + output_section->vma);
1662 else
1663 h->esym.asym.value = 0;
1664 }
9e756d64 1665
a7519a3c
RH
1666 if (! bfd_ecoff_debug_one_external (einfo->abfd, einfo->debug, einfo->swap,
1667 h->root.root.root.string,
1668 &h->esym))
1669 {
1670 einfo->failed = TRUE;
1671 return FALSE;
9e756d64
RH
1672 }
1673
a7519a3c
RH
1674 return TRUE;
1675}
1676\f
1677/* Search for and possibly create a got entry. */
9e756d64 1678
a7519a3c
RH
1679static struct alpha_elf_got_entry *
1680get_got_entry (bfd *abfd, struct alpha_elf_link_hash_entry *h,
1681 unsigned long r_type, unsigned long r_symndx,
1682 bfd_vma r_addend)
1683{
1684 struct alpha_elf_got_entry *gotent;
1685 struct alpha_elf_got_entry **slot;
9e756d64 1686
a7519a3c
RH
1687 if (h)
1688 slot = &h->got_entries;
1689 else
1690 {
1691 /* This is a local .got entry -- record for merge. */
9e756d64 1692
a7519a3c 1693 struct alpha_elf_got_entry **local_got_entries;
9e756d64 1694
a7519a3c
RH
1695 local_got_entries = alpha_elf_tdata(abfd)->local_got_entries;
1696 if (!local_got_entries)
1697 {
1698 bfd_size_type size;
1699 Elf_Internal_Shdr *symtab_hdr;
9e756d64 1700
a7519a3c
RH
1701 symtab_hdr = &elf_tdata(abfd)->symtab_hdr;
1702 size = symtab_hdr->sh_info;
1703 size *= sizeof (struct alpha_elf_got_entry *);
9e756d64 1704
a7519a3c
RH
1705 local_got_entries
1706 = (struct alpha_elf_got_entry **) bfd_zalloc (abfd, size);
1707 if (!local_got_entries)
1708 return NULL;
1709
1710 alpha_elf_tdata (abfd)->local_got_entries = local_got_entries;
1711 }
1712
1713 slot = &local_got_entries[r_symndx];
9e756d64
RH
1714 }
1715
a7519a3c
RH
1716 for (gotent = *slot; gotent ; gotent = gotent->next)
1717 if (gotent->gotobj == abfd
1718 && gotent->reloc_type == r_type
1719 && gotent->addend == r_addend)
1720 break;
1721
1722 if (!gotent)
9e756d64 1723 {
a7519a3c
RH
1724 int entry_size;
1725 bfd_size_type amt;
9e756d64 1726
a7519a3c
RH
1727 amt = sizeof (struct alpha_elf_got_entry);
1728 gotent = (struct alpha_elf_got_entry *) bfd_alloc (abfd, amt);
1729 if (!gotent)
1730 return NULL;
9e756d64 1731
a7519a3c
RH
1732 gotent->gotobj = abfd;
1733 gotent->addend = r_addend;
1734 gotent->got_offset = -1;
6ec7057a 1735 gotent->plt_offset = -1;
a7519a3c
RH
1736 gotent->use_count = 1;
1737 gotent->reloc_type = r_type;
1738 gotent->reloc_done = 0;
1739 gotent->reloc_xlated = 0;
9e756d64 1740
a7519a3c
RH
1741 gotent->next = *slot;
1742 *slot = gotent;
9e756d64 1743
a7519a3c
RH
1744 entry_size = alpha_got_entry_size (r_type);
1745 alpha_elf_tdata (abfd)->total_got_size += entry_size;
1746 if (!h)
1747 alpha_elf_tdata(abfd)->local_got_size += entry_size;
9e756d64 1748 }
a7519a3c
RH
1749 else
1750 gotent->use_count += 1;
9e756d64 1751
a7519a3c 1752 return gotent;
9e756d64
RH
1753}
1754
6ec7057a
RH
1755static bfd_boolean
1756elf64_alpha_want_plt (struct alpha_elf_link_hash_entry *ah)
1757{
1758 return ((ah->root.type == STT_FUNC
1759 || ah->root.root.type == bfd_link_hash_undefweak
1760 || ah->root.root.type == bfd_link_hash_undefined)
8288a39e
RH
1761 && (ah->flags & ALPHA_ELF_LINK_HASH_LU_PLT) != 0
1762 && (ah->flags & ~ALPHA_ELF_LINK_HASH_LU_PLT) == 0);
6ec7057a
RH
1763}
1764
6fc5bb57
AM
1765/* Whether to sort relocs output by ld -r or ld --emit-relocs, by r_offset.
1766 Don't do so for code sections. We want to keep ordering of LITERAL/LITUSE
1767 as is. On the other hand, elf-eh-frame.c processing requires .eh_frame
1768 relocs to be sorted. */
1769
1770static bfd_boolean
1771elf64_alpha_sort_relocs_p (asection *sec)
1772{
1773 return (sec->flags & SEC_CODE) == 0;
1774}
1775
1776
a7519a3c
RH
1777/* Handle dynamic relocations when doing an Alpha ELF link. */
1778
b34976b6 1779static bfd_boolean
a7519a3c
RH
1780elf64_alpha_check_relocs (bfd *abfd, struct bfd_link_info *info,
1781 asection *sec, const Elf_Internal_Rela *relocs)
252b5132 1782{
a7519a3c
RH
1783 bfd *dynobj;
1784 asection *sreloc;
252b5132 1785 Elf_Internal_Shdr *symtab_hdr;
a7519a3c
RH
1786 struct alpha_elf_link_hash_entry **sym_hashes;
1787 const Elf_Internal_Rela *rel, *relend;
a7519a3c 1788 bfd_size_type amt;
252b5132 1789
0e1862bb 1790 if (bfd_link_relocatable (info))
a7519a3c 1791 return TRUE;
252b5132 1792
a7519a3c
RH
1793 /* Don't do anything special with non-loaded, non-alloced sections.
1794 In particular, any relocs in such sections should not affect GOT
1795 and PLT reference counting (ie. we don't allow them to create GOT
1796 or PLT entries), there's no possibility or desire to optimize TLS
1797 relocs, and there's not much point in propagating relocs to shared
1798 libs that the dynamic linker won't relocate. */
1799 if ((sec->flags & SEC_ALLOC) == 0)
b34976b6 1800 return TRUE;
252b5132 1801
0ffa91dd
NC
1802 BFD_ASSERT (is_alpha_elf (abfd));
1803
1804 dynobj = elf_hash_table (info)->dynobj;
a7519a3c 1805 if (dynobj == NULL)
0ffa91dd 1806 elf_hash_table (info)->dynobj = dynobj = abfd;
252b5132 1807
a7519a3c 1808 sreloc = NULL;
0ffa91dd
NC
1809 symtab_hdr = &elf_symtab_hdr (abfd);
1810 sym_hashes = alpha_elf_sym_hashes (abfd);
a7519a3c
RH
1811
1812 relend = relocs + sec->reloc_count;
1813 for (rel = relocs; rel < relend; ++rel)
1814 {
1815 enum {
1816 NEED_GOT = 1,
1817 NEED_GOT_ENTRY = 2,
1818 NEED_DYNREL = 4
1819 };
1820
1821 unsigned long r_symndx, r_type;
1822 struct alpha_elf_link_hash_entry *h;
1823 unsigned int gotent_flags;
1824 bfd_boolean maybe_dynamic;
1825 unsigned int need;
1826 bfd_vma addend;
1827
1828 r_symndx = ELF64_R_SYM (rel->r_info);
1829 if (r_symndx < symtab_hdr->sh_info)
1830 h = NULL;
1831 else
1832 {
1833 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
252b5132 1834
a7519a3c
RH
1835 while (h->root.root.type == bfd_link_hash_indirect
1836 || h->root.root.type == bfd_link_hash_warning)
1837 h = (struct alpha_elf_link_hash_entry *)h->root.root.u.i.link;
252b5132 1838
81fbe831
AM
1839 /* PR15323, ref flags aren't set for references in the same
1840 object. */
bc4e12de 1841 h->root.root.non_ir_ref_regular = 1;
a7519a3c
RH
1842 h->root.ref_regular = 1;
1843 }
252b5132 1844
a7519a3c
RH
1845 /* We can only get preliminary data on whether a symbol is
1846 locally or externally defined, as not all of the input files
1847 have yet been processed. Do something with what we know, as
1848 this may help reduce memory usage and processing time later. */
1849 maybe_dynamic = FALSE;
0e1862bb 1850 if (h && ((bfd_link_pic (info)
a7519a3c
RH
1851 && (!info->symbolic
1852 || info->unresolved_syms_in_shared_libs == RM_IGNORE))
1853 || !h->root.def_regular
1854 || h->root.root.type == bfd_link_hash_defweak))
1855 maybe_dynamic = TRUE;
252b5132 1856
a7519a3c
RH
1857 need = 0;
1858 gotent_flags = 0;
1859 r_type = ELF64_R_TYPE (rel->r_info);
1860 addend = rel->r_addend;
9e756d64 1861
9e756d64
RH
1862 switch (r_type)
1863 {
1864 case R_ALPHA_LITERAL:
a7519a3c
RH
1865 need = NEED_GOT | NEED_GOT_ENTRY;
1866
1867 /* Remember how this literal is used from its LITUSEs.
1868 This will be important when it comes to decide if we can
1869 create a .plt entry for a function symbol. */
1870 while (++rel < relend && ELF64_R_TYPE (rel->r_info) == R_ALPHA_LITUSE)
8288a39e 1871 if (rel->r_addend >= 1 && rel->r_addend <= 6)
a7519a3c
RH
1872 gotent_flags |= 1 << rel->r_addend;
1873 --rel;
1874
1875 /* No LITUSEs -- presumably the address is used somehow. */
1876 if (gotent_flags == 0)
1877 gotent_flags = ALPHA_ELF_LINK_HASH_LU_ADDR;
1878 break;
1879
1880 case R_ALPHA_GPDISP:
1881 case R_ALPHA_GPREL16:
1882 case R_ALPHA_GPREL32:
9e756d64
RH
1883 case R_ALPHA_GPRELHIGH:
1884 case R_ALPHA_GPRELLOW:
a7519a3c
RH
1885 case R_ALPHA_BRSGP:
1886 need = NEED_GOT;
1887 break;
1888
1889 case R_ALPHA_REFLONG:
1890 case R_ALPHA_REFQUAD:
0e1862bb 1891 if (bfd_link_pic (info) || maybe_dynamic)
a7519a3c 1892 need = NEED_DYNREL;
cc03ec80
RH
1893 break;
1894
9e756d64 1895 case R_ALPHA_TLSLDM:
cc03ec80 1896 /* The symbol for a TLSLDM reloc is ignored. Collapse the
cf35638d
TS
1897 reloc to the STN_UNDEF (0) symbol so that they all match. */
1898 r_symndx = STN_UNDEF;
a7519a3c
RH
1899 h = 0;
1900 maybe_dynamic = FALSE;
1901 /* FALLTHRU */
1902
1903 case R_ALPHA_TLSGD:
1904 case R_ALPHA_GOTDTPREL:
1905 need = NEED_GOT | NEED_GOT_ENTRY;
9e756d64 1906 break;
cc03ec80 1907
a7519a3c
RH
1908 case R_ALPHA_GOTTPREL:
1909 need = NEED_GOT | NEED_GOT_ENTRY;
1910 gotent_flags = ALPHA_ELF_LINK_HASH_TLS_IE;
0e1862bb 1911 if (bfd_link_pic (info))
a7519a3c
RH
1912 info->flags |= DF_STATIC_TLS;
1913 break;
1914
1915 case R_ALPHA_TPREL64:
3cbc1e5e 1916 if (bfd_link_dll (info))
e366eeae
RH
1917 {
1918 info->flags |= DF_STATIC_TLS;
1919 need = NEED_DYNREL;
1920 }
1921 else if (maybe_dynamic)
a7519a3c 1922 need = NEED_DYNREL;
a7519a3c 1923 break;
252b5132
RH
1924 }
1925
a7519a3c 1926 if (need & NEED_GOT)
252b5132 1927 {
85d162e6 1928 if (alpha_elf_tdata(abfd)->gotobj == NULL)
6cdc0ccc 1929 {
a7519a3c
RH
1930 if (!elf64_alpha_create_got_section (abfd, info))
1931 return FALSE;
c328dc3f 1932 }
252b5132 1933 }
252b5132 1934
a7519a3c
RH
1935 if (need & NEED_GOT_ENTRY)
1936 {
1937 struct alpha_elf_got_entry *gotent;
252b5132 1938
a7519a3c
RH
1939 gotent = get_got_entry (abfd, h, r_type, r_symndx, addend);
1940 if (!gotent)
1941 return FALSE;
4a67a098 1942
a7519a3c 1943 if (gotent_flags)
cc03ec80 1944 {
a7519a3c
RH
1945 gotent->flags |= gotent_flags;
1946 if (h)
1947 {
1948 gotent_flags |= h->flags;
1949 h->flags = gotent_flags;
4a67a098 1950
a7519a3c 1951 /* Make a guess as to whether a .plt entry is needed. */
6ec7057a
RH
1952 /* ??? It appears that we won't make it into
1953 adjust_dynamic_symbol for symbols that remain
1954 totally undefined. Copying this check here means
1955 we can create a plt entry for them too. */
1956 h->root.needs_plt
1957 = (maybe_dynamic && elf64_alpha_want_plt (h));
1958 }
a7519a3c 1959 }
252b5132
RH
1960 }
1961
a7519a3c 1962 if (need & NEED_DYNREL)
9e756d64 1963 {
a7519a3c
RH
1964 /* We need to create the section here now whether we eventually
1965 use it or not so that it gets mapped to an output section by
83bac4b0 1966 the linker. If not used, we'll kill it in size_dynamic_sections. */
a7519a3c 1967 if (sreloc == NULL)
9e756d64 1968 {
83bac4b0
NC
1969 sreloc = _bfd_elf_make_dynamic_reloc_section
1970 (sec, dynobj, 3, abfd, /*rela?*/ TRUE);
1971
a7519a3c 1972 if (sreloc == NULL)
83bac4b0 1973 return FALSE;
9e756d64 1974 }
252b5132 1975
a7519a3c
RH
1976 if (h)
1977 {
1978 /* Since we havn't seen all of the input symbols yet, we
1979 don't know whether we'll actually need a dynamic relocation
1980 entry for this reloc. So make a record of it. Once we
1981 find out if this thing needs dynamic relocation we'll
1982 expand the relocation sections by the appropriate amount. */
9e756d64 1983
a7519a3c 1984 struct alpha_elf_reloc_entry *rent;
9e756d64 1985
a7519a3c
RH
1986 for (rent = h->reloc_entries; rent; rent = rent->next)
1987 if (rent->rtype == r_type && rent->srel == sreloc)
1988 break;
252b5132 1989
a7519a3c
RH
1990 if (!rent)
1991 {
1992 amt = sizeof (struct alpha_elf_reloc_entry);
1993 rent = (struct alpha_elf_reloc_entry *) bfd_alloc (abfd, amt);
1994 if (!rent)
1995 return FALSE;
252b5132 1996
a7519a3c
RH
1997 rent->srel = sreloc;
1998 rent->rtype = r_type;
1999 rent->count = 1;
2000 rent->reltext = (sec->flags & SEC_READONLY) != 0;
252b5132 2001
a7519a3c
RH
2002 rent->next = h->reloc_entries;
2003 h->reloc_entries = rent;
2004 }
2005 else
2006 rent->count++;
2007 }
0e1862bb 2008 else if (bfd_link_pic (info))
a7519a3c
RH
2009 {
2010 /* If this is a shared library, and the section is to be
2011 loaded into memory, we need a RELATIVE reloc. */
2012 sreloc->size += sizeof (Elf64_External_Rela);
2013 if (sec->flags & SEC_READONLY)
2014 info->flags |= DF_TEXTREL;
2015 }
252b5132
RH
2016 }
2017 }
2018
b34976b6 2019 return TRUE;
252b5132 2020}
252b5132 2021
e117360e
RH
2022/* Return the section that should be marked against GC for a given
2023 relocation. */
2024
2025static asection *
2026elf64_alpha_gc_mark_hook (asection *sec, struct bfd_link_info *info,
2027 Elf_Internal_Rela *rel,
2028 struct elf_link_hash_entry *h, Elf_Internal_Sym *sym)
2029{
2030 /* These relocations don't really reference a symbol. Instead we store
2031 extra data in their addend slot. Ignore the symbol. */
2032 switch (ELF64_R_TYPE (rel->r_info))
2033 {
2034 case R_ALPHA_LITUSE:
2035 case R_ALPHA_GPDISP:
2036 case R_ALPHA_HINT:
2037 return NULL;
2038 }
2039
2040 return _bfd_elf_gc_mark_hook (sec, info, rel, h, sym);
2041}
2042
a7519a3c
RH
2043/* Adjust a symbol defined by a dynamic object and referenced by a
2044 regular object. The current definition is in some section of the
2045 dynamic object, but we're not including those sections. We have to
2046 change the definition to something the rest of the link can
2047 understand. */
252b5132 2048
b34976b6 2049static bfd_boolean
a7519a3c
RH
2050elf64_alpha_adjust_dynamic_symbol (struct bfd_link_info *info,
2051 struct elf_link_hash_entry *h)
252b5132 2052{
a7519a3c
RH
2053 bfd *dynobj;
2054 asection *s;
2055 struct alpha_elf_link_hash_entry *ah;
252b5132 2056
a7519a3c
RH
2057 dynobj = elf_hash_table(info)->dynobj;
2058 ah = (struct alpha_elf_link_hash_entry *)h;
252b5132 2059
a7519a3c 2060 /* Now that we've seen all of the input symbols, finalize our decision
6ec7057a
RH
2061 about whether this symbol should get a .plt entry. Irritatingly, it
2062 is common for folk to leave undefined symbols in shared libraries,
2063 and they still expect lazy binding; accept undefined symbols in lieu
2064 of STT_FUNC. */
2065 if (alpha_elf_dynamic_symbol_p (h, info) && elf64_alpha_want_plt (ah))
252b5132 2066 {
6ec7057a 2067 h->needs_plt = TRUE;
252b5132 2068
ce558b89 2069 s = elf_hash_table(info)->splt;
a7519a3c
RH
2070 if (!s && !elf64_alpha_create_dynamic_sections (dynobj, info))
2071 return FALSE;
204692d7 2072
6ec7057a
RH
2073 /* We need one plt entry per got subsection. Delay allocation of
2074 the actual plt entries until size_plt_section, called from
2075 size_dynamic_sections or during relaxation. */
252b5132 2076
a7519a3c
RH
2077 return TRUE;
2078 }
2079 else
6ec7057a 2080 h->needs_plt = FALSE;
252b5132 2081
a7519a3c
RH
2082 /* If this is a weak symbol, and there is a real definition, the
2083 processor independent code will have arranged for us to see the
2084 real definition first, and we can just use the same value. */
60d67dc8 2085 if (h->is_weakalias)
252b5132 2086 {
60d67dc8
AM
2087 struct elf_link_hash_entry *def = weakdef (h);
2088 BFD_ASSERT (def->root.type == bfd_link_hash_defined);
2089 h->root.u.def.section = def->root.u.def.section;
2090 h->root.u.def.value = def->root.u.def.value;
a7519a3c 2091 return TRUE;
252b5132 2092 }
a7519a3c
RH
2093
2094 /* This is a reference to a symbol defined by a dynamic object which
2095 is not a function. The Alpha, since it uses .got entries for all
2096 symbols even in regular objects, does not need the hackery of a
2097 .dynbss section and COPY dynamic relocations. */
252b5132 2098
b34976b6 2099 return TRUE;
252b5132
RH
2100}
2101
747ffa7b
AM
2102/* Record STO_ALPHA_NOPV and STO_ALPHA_STD_GPLOAD. */
2103
2104static void
2105elf64_alpha_merge_symbol_attribute (struct elf_link_hash_entry *h,
2106 const Elf_Internal_Sym *isym,
2107 bfd_boolean definition,
2108 bfd_boolean dynamic)
2109{
2110 if (!dynamic && definition)
2111 h->other = ((h->other & ELF_ST_VISIBILITY (-1))
2112 | (isym->st_other & ~ELF_ST_VISIBILITY (-1)));
2113}
2114
a7519a3c
RH
2115/* Symbol versioning can create new symbols, and make our old symbols
2116 indirect to the new ones. Consolidate the got and reloc information
2117 in these situations. */
252b5132 2118
48f4b4f5
RH
2119static void
2120elf64_alpha_copy_indirect_symbol (struct bfd_link_info *info,
2121 struct elf_link_hash_entry *dir,
2122 struct elf_link_hash_entry *ind)
252b5132 2123{
48f4b4f5
RH
2124 struct alpha_elf_link_hash_entry *hi
2125 = (struct alpha_elf_link_hash_entry *) ind;
2126 struct alpha_elf_link_hash_entry *hs
2127 = (struct alpha_elf_link_hash_entry *) dir;
252b5132 2128
48f4b4f5
RH
2129 /* Do the merging in the superclass. */
2130 _bfd_elf_link_hash_copy_indirect(info, dir, ind);
252b5132 2131
a7519a3c 2132 /* Merge the flags. Whee. */
a7519a3c
RH
2133 hs->flags |= hi->flags;
2134
48f4b4f5
RH
2135 /* ??? It's unclear to me what's really supposed to happen when
2136 "merging" defweak and defined symbols, given that we don't
2137 actually throw away the defweak. This more-or-less copies
2138 the logic related to got and plt entries in the superclass. */
2139 if (ind->root.type != bfd_link_hash_indirect)
2140 return;
2141
a7519a3c
RH
2142 /* Merge the .got entries. Cannibalize the old symbol's list in
2143 doing so, since we don't need it anymore. */
2144
2145 if (hs->got_entries == NULL)
2146 hs->got_entries = hi->got_entries;
2147 else
2148 {
2149 struct alpha_elf_got_entry *gi, *gs, *gin, *gsh;
2150
2151 gsh = hs->got_entries;
2152 for (gi = hi->got_entries; gi ; gi = gin)
252b5132 2153 {
a7519a3c
RH
2154 gin = gi->next;
2155 for (gs = gsh; gs ; gs = gs->next)
2156 if (gi->gotobj == gs->gotobj
2157 && gi->reloc_type == gs->reloc_type
2158 && gi->addend == gs->addend)
2159 {
68994ca2 2160 gs->use_count += gi->use_count;
a7519a3c
RH
2161 goto got_found;
2162 }
2163 gi->next = hs->got_entries;
2164 hs->got_entries = gi;
2165 got_found:;
252b5132 2166 }
a7519a3c
RH
2167 }
2168 hi->got_entries = NULL;
252b5132 2169
a7519a3c
RH
2170 /* And similar for the reloc entries. */
2171
2172 if (hs->reloc_entries == NULL)
2173 hs->reloc_entries = hi->reloc_entries;
2174 else
2175 {
2176 struct alpha_elf_reloc_entry *ri, *rs, *rin, *rsh;
2177
2178 rsh = hs->reloc_entries;
2179 for (ri = hi->reloc_entries; ri ; ri = rin)
2180 {
2181 rin = ri->next;
2182 for (rs = rsh; rs ; rs = rs->next)
2183 if (ri->rtype == rs->rtype && ri->srel == rs->srel)
2184 {
2185 rs->count += ri->count;
2186 goto found_reloc;
2187 }
2188 ri->next = hs->reloc_entries;
2189 hs->reloc_entries = ri;
2190 found_reloc:;
2191 }
252b5132 2192 }
a7519a3c 2193 hi->reloc_entries = NULL;
252b5132
RH
2194}
2195
a7519a3c 2196/* Is it possible to merge two object file's .got tables? */
252b5132 2197
b34976b6 2198static bfd_boolean
a7519a3c 2199elf64_alpha_can_merge_gots (bfd *a, bfd *b)
252b5132 2200{
a7519a3c
RH
2201 int total = alpha_elf_tdata (a)->total_got_size;
2202 bfd *bsub;
252b5132 2203
a7519a3c
RH
2204 /* Trivial quick fallout test. */
2205 if (total + alpha_elf_tdata (b)->total_got_size <= MAX_GOT_SIZE)
2206 return TRUE;
252b5132 2207
a7519a3c
RH
2208 /* By their nature, local .got entries cannot be merged. */
2209 if ((total += alpha_elf_tdata (b)->local_got_size) > MAX_GOT_SIZE)
b34976b6 2210 return FALSE;
252b5132 2211
a7519a3c
RH
2212 /* Failing the common trivial comparison, we must effectively
2213 perform the merge. Not actually performing the merge means that
2214 we don't have to store undo information in case we fail. */
2215 for (bsub = b; bsub ; bsub = alpha_elf_tdata (bsub)->in_got_link_next)
2216 {
2217 struct alpha_elf_link_hash_entry **hashes = alpha_elf_sym_hashes (bsub);
2218 Elf_Internal_Shdr *symtab_hdr = &elf_tdata (bsub)->symtab_hdr;
2219 int i, n;
2220
2221 n = NUM_SHDR_ENTRIES (symtab_hdr) - symtab_hdr->sh_info;
2222 for (i = 0; i < n; ++i)
2223 {
2224 struct alpha_elf_got_entry *ae, *be;
2225 struct alpha_elf_link_hash_entry *h;
2226
2227 h = hashes[i];
2228 while (h->root.root.type == bfd_link_hash_indirect
2229 || h->root.root.type == bfd_link_hash_warning)
2230 h = (struct alpha_elf_link_hash_entry *)h->root.root.u.i.link;
2231
2232 for (be = h->got_entries; be ; be = be->next)
2233 {
2234 if (be->use_count == 0)
2235 continue;
2236 if (be->gotobj != b)
2237 continue;
2238
2239 for (ae = h->got_entries; ae ; ae = ae->next)
2240 if (ae->gotobj == a
2241 && ae->reloc_type == be->reloc_type
2242 && ae->addend == be->addend)
2243 goto global_found;
2244
2245 total += alpha_got_entry_size (be->reloc_type);
2246 if (total > MAX_GOT_SIZE)
2247 return FALSE;
2248 global_found:;
2249 }
2250 }
2251 }
252b5132 2252
b34976b6 2253 return TRUE;
252b5132
RH
2254}
2255
a7519a3c 2256/* Actually merge two .got tables. */
252b5132 2257
a7519a3c
RH
2258static void
2259elf64_alpha_merge_gots (bfd *a, bfd *b)
252b5132 2260{
a7519a3c
RH
2261 int total = alpha_elf_tdata (a)->total_got_size;
2262 bfd *bsub;
252b5132 2263
a7519a3c
RH
2264 /* Remember local expansion. */
2265 {
2266 int e = alpha_elf_tdata (b)->local_got_size;
2267 total += e;
2268 alpha_elf_tdata (a)->local_got_size += e;
2269 }
252b5132 2270
a7519a3c
RH
2271 for (bsub = b; bsub ; bsub = alpha_elf_tdata (bsub)->in_got_link_next)
2272 {
2273 struct alpha_elf_got_entry **local_got_entries;
2274 struct alpha_elf_link_hash_entry **hashes;
2275 Elf_Internal_Shdr *symtab_hdr;
2276 int i, n;
252b5132 2277
a7519a3c
RH
2278 /* Let the local .got entries know they are part of a new subsegment. */
2279 local_got_entries = alpha_elf_tdata (bsub)->local_got_entries;
2280 if (local_got_entries)
2281 {
2282 n = elf_tdata (bsub)->symtab_hdr.sh_info;
2283 for (i = 0; i < n; ++i)
2284 {
2285 struct alpha_elf_got_entry *ent;
2286 for (ent = local_got_entries[i]; ent; ent = ent->next)
2287 ent->gotobj = a;
2288 }
2289 }
252b5132 2290
a7519a3c
RH
2291 /* Merge the global .got entries. */
2292 hashes = alpha_elf_sym_hashes (bsub);
2293 symtab_hdr = &elf_tdata (bsub)->symtab_hdr;
252b5132 2294
a7519a3c
RH
2295 n = NUM_SHDR_ENTRIES (symtab_hdr) - symtab_hdr->sh_info;
2296 for (i = 0; i < n; ++i)
2297 {
2298 struct alpha_elf_got_entry *ae, *be, **pbe, **start;
2299 struct alpha_elf_link_hash_entry *h;
252b5132 2300
a7519a3c
RH
2301 h = hashes[i];
2302 while (h->root.root.type == bfd_link_hash_indirect
2303 || h->root.root.type == bfd_link_hash_warning)
2304 h = (struct alpha_elf_link_hash_entry *)h->root.root.u.i.link;
252b5132 2305
a7519a3c
RH
2306 pbe = start = &h->got_entries;
2307 while ((be = *pbe) != NULL)
2308 {
2309 if (be->use_count == 0)
2310 {
2311 *pbe = be->next;
2312 memset (be, 0xa5, sizeof (*be));
2313 goto kill;
2314 }
2315 if (be->gotobj != b)
2316 goto next;
2317
2318 for (ae = *start; ae ; ae = ae->next)
2319 if (ae->gotobj == a
2320 && ae->reloc_type == be->reloc_type
2321 && ae->addend == be->addend)
2322 {
2323 ae->flags |= be->flags;
2324 ae->use_count += be->use_count;
2325 *pbe = be->next;
2326 memset (be, 0xa5, sizeof (*be));
2327 goto kill;
2328 }
2329 be->gotobj = a;
2330 total += alpha_got_entry_size (be->reloc_type);
252b5132 2331
a7519a3c
RH
2332 next:;
2333 pbe = &be->next;
2334 kill:;
2335 }
2336 }
252b5132 2337
a7519a3c
RH
2338 alpha_elf_tdata (bsub)->gotobj = a;
2339 }
2340 alpha_elf_tdata (a)->total_got_size = total;
252b5132 2341
a7519a3c
RH
2342 /* Merge the two in_got chains. */
2343 {
2344 bfd *next;
252b5132 2345
a7519a3c
RH
2346 bsub = a;
2347 while ((next = alpha_elf_tdata (bsub)->in_got_link_next) != NULL)
2348 bsub = next;
252b5132 2349
a7519a3c
RH
2350 alpha_elf_tdata (bsub)->in_got_link_next = b;
2351 }
252b5132 2352}
a7519a3c
RH
2353
2354/* Calculate the offsets for the got entries. */
252b5132 2355
b34976b6 2356static bfd_boolean
a7519a3c 2357elf64_alpha_calc_got_offsets_for_symbol (struct alpha_elf_link_hash_entry *h,
2c3fc389 2358 void * arg ATTRIBUTE_UNUSED)
252b5132 2359{
a7519a3c 2360 struct alpha_elf_got_entry *gotent;
252b5132 2361
a7519a3c
RH
2362 for (gotent = h->got_entries; gotent; gotent = gotent->next)
2363 if (gotent->use_count > 0)
2364 {
2365 struct alpha_elf_obj_tdata *td;
2366 bfd_size_type *plge;
252b5132 2367
a7519a3c 2368 td = alpha_elf_tdata (gotent->gotobj);
a7519a3c
RH
2369 plge = &td->got->size;
2370 gotent->got_offset = *plge;
2371 *plge += alpha_got_entry_size (gotent->reloc_type);
2372 }
252b5132 2373
6ec7057a 2374 return TRUE;
a7519a3c 2375}
252b5132 2376
a7519a3c
RH
2377static void
2378elf64_alpha_calc_got_offsets (struct bfd_link_info *info)
2379{
4dfe6ac6
NC
2380 bfd *i, *got_list;
2381 struct alpha_elf_link_hash_table * htab;
2382
2383 htab = alpha_elf_hash_table (info);
2384 if (htab == NULL)
2385 return;
2386 got_list = htab->got_list;
252b5132 2387
a7519a3c
RH
2388 /* First, zero out the .got sizes, as we may be recalculating the
2389 .got after optimizing it. */
2390 for (i = got_list; i ; i = alpha_elf_tdata(i)->got_link_next)
2391 alpha_elf_tdata(i)->got->size = 0;
252b5132 2392
a7519a3c 2393 /* Next, fill in the offsets for all the global entries. */
4dfe6ac6 2394 alpha_elf_link_hash_traverse (htab,
a7519a3c
RH
2395 elf64_alpha_calc_got_offsets_for_symbol,
2396 NULL);
252b5132 2397
a7519a3c
RH
2398 /* Finally, fill in the offsets for the local entries. */
2399 for (i = got_list; i ; i = alpha_elf_tdata(i)->got_link_next)
2400 {
2401 bfd_size_type got_offset = alpha_elf_tdata(i)->got->size;
2402 bfd *j;
252b5132 2403
a7519a3c
RH
2404 for (j = i; j ; j = alpha_elf_tdata(j)->in_got_link_next)
2405 {
2406 struct alpha_elf_got_entry **local_got_entries, *gotent;
2407 int k, n;
252b5132 2408
a7519a3c
RH
2409 local_got_entries = alpha_elf_tdata(j)->local_got_entries;
2410 if (!local_got_entries)
2411 continue;
252b5132 2412
a7519a3c
RH
2413 for (k = 0, n = elf_tdata(j)->symtab_hdr.sh_info; k < n; ++k)
2414 for (gotent = local_got_entries[k]; gotent; gotent = gotent->next)
2415 if (gotent->use_count > 0)
2416 {
2417 gotent->got_offset = got_offset;
2418 got_offset += alpha_got_entry_size (gotent->reloc_type);
2419 }
2420 }
252b5132 2421
a7519a3c
RH
2422 alpha_elf_tdata(i)->got->size = got_offset;
2423 }
2424}
252b5132 2425
a7519a3c 2426/* Constructs the gots. */
252b5132 2427
b34976b6 2428static bfd_boolean
d1c109de
RH
2429elf64_alpha_size_got_sections (struct bfd_link_info *info,
2430 bfd_boolean may_merge)
252b5132 2431{
a7519a3c 2432 bfd *i, *got_list, *cur_got_obj = NULL;
4dfe6ac6 2433 struct alpha_elf_link_hash_table * htab;
252b5132 2434
4dfe6ac6
NC
2435 htab = alpha_elf_hash_table (info);
2436 if (htab == NULL)
2437 return FALSE;
2438 got_list = htab->got_list;
95404643 2439
a7519a3c
RH
2440 /* On the first time through, pretend we have an existing got list
2441 consisting of all of the input files. */
2442 if (got_list == NULL)
252b5132 2443 {
c72f2fb2 2444 for (i = info->input_bfds; i ; i = i->link.next)
252b5132 2445 {
0ffa91dd
NC
2446 bfd *this_got;
2447
2448 if (! is_alpha_elf (i))
2449 continue;
2450
2451 this_got = alpha_elf_tdata (i)->gotobj;
a7519a3c
RH
2452 if (this_got == NULL)
2453 continue;
252b5132 2454
a7519a3c
RH
2455 /* We are assuming no merging has yet occurred. */
2456 BFD_ASSERT (this_got == i);
252b5132 2457
a7519a3c 2458 if (alpha_elf_tdata (this_got)->total_got_size > MAX_GOT_SIZE)
252b5132 2459 {
a7519a3c 2460 /* Yikes! A single object file has too many entries. */
4eca0228 2461 _bfd_error_handler
695344c0 2462 /* xgettext:c-format */
a7519a3c
RH
2463 (_("%B: .got subsegment exceeds 64K (size %d)"),
2464 i, alpha_elf_tdata (this_got)->total_got_size);
b34976b6 2465 return FALSE;
252b5132 2466 }
252b5132 2467
a7519a3c
RH
2468 if (got_list == NULL)
2469 got_list = this_got;
2470 else
2471 alpha_elf_tdata(cur_got_obj)->got_link_next = this_got;
2472 cur_got_obj = this_got;
252b5132
RH
2473 }
2474
a7519a3c
RH
2475 /* Strange degenerate case of no got references. */
2476 if (got_list == NULL)
2477 return TRUE;
2478
4dfe6ac6 2479 htab->got_list = got_list;
a7519a3c
RH
2480 }
2481
2482 cur_got_obj = got_list;
0ffa91dd
NC
2483 if (cur_got_obj == NULL)
2484 return FALSE;
2485
d1c109de 2486 if (may_merge)
a7519a3c 2487 {
d1c109de
RH
2488 i = alpha_elf_tdata(cur_got_obj)->got_link_next;
2489 while (i != NULL)
252b5132 2490 {
d1c109de
RH
2491 if (elf64_alpha_can_merge_gots (cur_got_obj, i))
2492 {
2493 elf64_alpha_merge_gots (cur_got_obj, i);
252b5132 2494
d1c109de
RH
2495 alpha_elf_tdata(i)->got->size = 0;
2496 i = alpha_elf_tdata(i)->got_link_next;
2497 alpha_elf_tdata(cur_got_obj)->got_link_next = i;
2498 }
2499 else
2500 {
2501 cur_got_obj = i;
2502 i = alpha_elf_tdata(i)->got_link_next;
2503 }
a7519a3c 2504 }
252b5132
RH
2505 }
2506
a7519a3c
RH
2507 /* Once the gots have been merged, fill in the got offsets for
2508 everything therein. */
4a828aab 2509 elf64_alpha_calc_got_offsets (info);
252b5132 2510
a7519a3c 2511 return TRUE;
252b5132 2512}
252b5132 2513
b34976b6 2514static bfd_boolean
2c3fc389
NC
2515elf64_alpha_size_plt_section_1 (struct alpha_elf_link_hash_entry *h,
2516 void * data)
252b5132 2517{
a7519a3c
RH
2518 asection *splt = (asection *) data;
2519 struct alpha_elf_got_entry *gotent;
6ec7057a 2520 bfd_boolean saw_one = FALSE;
252b5132 2521
a7519a3c
RH
2522 /* If we didn't need an entry before, we still don't. */
2523 if (!h->root.needs_plt)
2524 return TRUE;
e92d460e 2525
6ec7057a 2526 /* For each LITERAL got entry still in use, allocate a plt entry. */
a7519a3c
RH
2527 for (gotent = h->got_entries; gotent ; gotent = gotent->next)
2528 if (gotent->reloc_type == R_ALPHA_LITERAL
2529 && gotent->use_count > 0)
6ec7057a
RH
2530 {
2531 if (splt->size == 0)
2532 splt->size = PLT_HEADER_SIZE;
2533 gotent->plt_offset = splt->size;
2534 splt->size += PLT_ENTRY_SIZE;
2535 saw_one = TRUE;
2536 }
a7519a3c 2537
6ec7057a
RH
2538 /* If there weren't any, there's no longer a need for the PLT entry. */
2539 if (!saw_one)
2540 h->root.needs_plt = FALSE;
a7519a3c
RH
2541
2542 return TRUE;
2543}
2544
4a828aab
RH
2545/* Called from relax_section to rebuild the PLT in light of potential changes
2546 in the function's status. */
a7519a3c 2547
4a828aab 2548static void
a7519a3c
RH
2549elf64_alpha_size_plt_section (struct bfd_link_info *info)
2550{
6ec7057a 2551 asection *splt, *spltrel, *sgotplt;
a7519a3c 2552 unsigned long entries;
4dfe6ac6
NC
2553 struct alpha_elf_link_hash_table * htab;
2554
2555 htab = alpha_elf_hash_table (info);
2556 if (htab == NULL)
2557 return;
a7519a3c 2558
ce558b89 2559 splt = elf_hash_table(info)->splt;
a7519a3c 2560 if (splt == NULL)
4a828aab 2561 return;
252b5132 2562
a7519a3c 2563 splt->size = 0;
252b5132 2564
4dfe6ac6 2565 alpha_elf_link_hash_traverse (htab,
a7519a3c 2566 elf64_alpha_size_plt_section_1, splt);
e92d460e 2567
a7519a3c 2568 /* Every plt entry requires a JMP_SLOT relocation. */
ce558b89 2569 spltrel = elf_hash_table(info)->srelplt;
4a828aab 2570 entries = 0;
a7519a3c 2571 if (splt->size)
6ec7057a
RH
2572 {
2573 if (elf64_alpha_use_secureplt)
2574 entries = (splt->size - NEW_PLT_HEADER_SIZE) / NEW_PLT_ENTRY_SIZE;
2575 else
2576 entries = (splt->size - OLD_PLT_HEADER_SIZE) / OLD_PLT_ENTRY_SIZE;
2577 }
a7519a3c 2578 spltrel->size = entries * sizeof (Elf64_External_Rela);
e92d460e 2579
6ec7057a
RH
2580 /* When using the secureplt, we need two words somewhere in the data
2581 segment for the dynamic linker to tell us where to go. This is the
2582 entire contents of the .got.plt section. */
2583 if (elf64_alpha_use_secureplt)
2584 {
ce558b89 2585 sgotplt = elf_hash_table(info)->sgotplt;
6ec7057a
RH
2586 sgotplt->size = entries ? 16 : 0;
2587 }
a7519a3c 2588}
e92d460e 2589
a7519a3c
RH
2590static bfd_boolean
2591elf64_alpha_always_size_sections (bfd *output_bfd ATTRIBUTE_UNUSED,
2592 struct bfd_link_info *info)
2593{
2594 bfd *i;
4dfe6ac6 2595 struct alpha_elf_link_hash_table * htab;
252b5132 2596
0e1862bb 2597 if (bfd_link_relocatable (info))
a7519a3c 2598 return TRUE;
252b5132 2599
4dfe6ac6
NC
2600 htab = alpha_elf_hash_table (info);
2601 if (htab == NULL)
2602 return FALSE;
2603
d1c109de 2604 if (!elf64_alpha_size_got_sections (info, TRUE))
a7519a3c 2605 return FALSE;
252b5132 2606
a7519a3c 2607 /* Allocate space for all of the .got subsections. */
4dfe6ac6 2608 i = htab->got_list;
a7519a3c 2609 for ( ; i ; i = alpha_elf_tdata(i)->got_link_next)
252b5132 2610 {
a7519a3c
RH
2611 asection *s = alpha_elf_tdata(i)->got;
2612 if (s->size > 0)
2613 {
2614 s->contents = (bfd_byte *) bfd_zalloc (i, s->size);
2615 if (s->contents == NULL)
2616 return FALSE;
2617 }
252b5132
RH
2618 }
2619
b34976b6 2620 return TRUE;
252b5132 2621}
3765b1be 2622
a7519a3c 2623/* The number of dynamic relocations required by a static relocation. */
3765b1be 2624
a7519a3c 2625static int
e366eeae 2626alpha_dynamic_entries_for_reloc (int r_type, int dynamic, int shared, int pie)
a7519a3c
RH
2627{
2628 switch (r_type)
3765b1be 2629 {
a7519a3c
RH
2630 /* May appear in GOT entries. */
2631 case R_ALPHA_TLSGD:
2632 return (dynamic ? 2 : shared ? 1 : 0);
2633 case R_ALPHA_TLSLDM:
2634 return shared;
2635 case R_ALPHA_LITERAL:
a7519a3c 2636 return dynamic || shared;
e366eeae
RH
2637 case R_ALPHA_GOTTPREL:
2638 return dynamic || (shared && !pie);
a7519a3c
RH
2639 case R_ALPHA_GOTDTPREL:
2640 return dynamic;
3765b1be 2641
a7519a3c
RH
2642 /* May appear in data sections. */
2643 case R_ALPHA_REFLONG:
2644 case R_ALPHA_REFQUAD:
a7519a3c 2645 return dynamic || shared;
e366eeae
RH
2646 case R_ALPHA_TPREL64:
2647 return dynamic || (shared && !pie);
3765b1be 2648
a7519a3c
RH
2649 /* Everything else is illegal. We'll issue an error during
2650 relocate_section. */
2651 default:
2652 return 0;
2653 }
2654}
3765b1be 2655
a7519a3c 2656/* Work out the sizes of the dynamic relocation entries. */
3765b1be 2657
a7519a3c
RH
2658static bfd_boolean
2659elf64_alpha_calc_dynrel_sizes (struct alpha_elf_link_hash_entry *h,
2660 struct bfd_link_info *info)
2661{
2662 bfd_boolean dynamic;
2663 struct alpha_elf_reloc_entry *relent;
2664 unsigned long entries;
3765b1be 2665
a7519a3c
RH
2666 /* If the symbol was defined as a common symbol in a regular object
2667 file, and there was no definition in any dynamic object, then the
2668 linker will have allocated space for the symbol in a common
2669 section but the ELF_LINK_HASH_DEF_REGULAR flag will not have been
2670 set. This is done for dynamic symbols in
2671 elf_adjust_dynamic_symbol but this is not done for non-dynamic
2672 symbols, somehow. */
2673 if (!h->root.def_regular
2674 && h->root.ref_regular
2675 && !h->root.def_dynamic
2676 && (h->root.root.type == bfd_link_hash_defined
2677 || h->root.root.type == bfd_link_hash_defweak)
2678 && !(h->root.root.u.def.section->owner->flags & DYNAMIC))
2679 h->root.def_regular = 1;
3765b1be 2680
a7519a3c
RH
2681 /* If the symbol is dynamic, we'll need all the relocations in their
2682 natural form. If this is a shared object, and it has been forced
2683 local, we'll need the same number of RELATIVE relocations. */
2684 dynamic = alpha_elf_dynamic_symbol_p (&h->root, info);
3765b1be 2685
a7519a3c
RH
2686 /* If the symbol is a hidden undefined weak, then we never have any
2687 relocations. Avoid the loop which may want to add RELATIVE relocs
0e1862bb 2688 based on bfd_link_pic (info). */
a7519a3c
RH
2689 if (h->root.root.type == bfd_link_hash_undefweak && !dynamic)
2690 return TRUE;
2691
2692 for (relent = h->reloc_entries; relent; relent = relent->next)
3765b1be 2693 {
a7519a3c 2694 entries = alpha_dynamic_entries_for_reloc (relent->rtype, dynamic,
3cbc1e5e
AM
2695 bfd_link_pic (info),
2696 bfd_link_pie (info));
a7519a3c
RH
2697 if (entries)
2698 {
2699 relent->srel->size +=
2700 entries * sizeof (Elf64_External_Rela) * relent->count;
2701 if (relent->reltext)
2702 info->flags |= DT_TEXTREL;
2703 }
2704 }
3765b1be 2705
a7519a3c
RH
2706 return TRUE;
2707}
3765b1be 2708
a7519a3c
RH
2709/* Subroutine of elf64_alpha_size_rela_got_section for doing the
2710 global symbols. */
3765b1be 2711
a7519a3c
RH
2712static bfd_boolean
2713elf64_alpha_size_rela_got_1 (struct alpha_elf_link_hash_entry *h,
2714 struct bfd_link_info *info)
2715{
2716 bfd_boolean dynamic;
2717 struct alpha_elf_got_entry *gotent;
2718 unsigned long entries;
3765b1be 2719
6ec7057a
RH
2720 /* If we're using a plt for this symbol, then all of its relocations
2721 for its got entries go into .rela.plt. */
2722 if (h->root.needs_plt)
2723 return TRUE;
2724
a7519a3c
RH
2725 /* If the symbol is dynamic, we'll need all the relocations in their
2726 natural form. If this is a shared object, and it has been forced
2727 local, we'll need the same number of RELATIVE relocations. */
2728 dynamic = alpha_elf_dynamic_symbol_p (&h->root, info);
2729
2730 /* If the symbol is a hidden undefined weak, then we never have any
2731 relocations. Avoid the loop which may want to add RELATIVE relocs
0e1862bb 2732 based on bfd_link_pic (info). */
a7519a3c
RH
2733 if (h->root.root.type == bfd_link_hash_undefweak && !dynamic)
2734 return TRUE;
2735
2736 entries = 0;
2737 for (gotent = h->got_entries; gotent ; gotent = gotent->next)
2738 if (gotent->use_count > 0)
e366eeae 2739 entries += alpha_dynamic_entries_for_reloc (gotent->reloc_type, dynamic,
0e1862bb
L
2740 bfd_link_pic (info),
2741 bfd_link_pie (info));
a7519a3c 2742
a7519a3c
RH
2743 if (entries > 0)
2744 {
ce558b89 2745 asection *srel = elf_hash_table(info)->srelgot;
a7519a3c
RH
2746 BFD_ASSERT (srel != NULL);
2747 srel->size += sizeof (Elf64_External_Rela) * entries;
3765b1be 2748 }
3765b1be 2749
a7519a3c 2750 return TRUE;
3765b1be
RH
2751}
2752
a7519a3c 2753/* Set the sizes of the dynamic relocation sections. */
252b5132 2754
4a828aab 2755static void
a7519a3c 2756elf64_alpha_size_rela_got_section (struct bfd_link_info *info)
252b5132 2757{
a7519a3c 2758 unsigned long entries;
ce558b89 2759 bfd *i;
a7519a3c 2760 asection *srel;
4dfe6ac6
NC
2761 struct alpha_elf_link_hash_table * htab;
2762
2763 htab = alpha_elf_hash_table (info);
2764 if (htab == NULL)
2765 return;
252b5132 2766
a7519a3c
RH
2767 /* Shared libraries often require RELATIVE relocs, and some relocs
2768 require attention for the main application as well. */
252b5132 2769
a7519a3c 2770 entries = 0;
4dfe6ac6 2771 for (i = htab->got_list;
a7519a3c
RH
2772 i ; i = alpha_elf_tdata(i)->got_link_next)
2773 {
2774 bfd *j;
3241278a 2775
a7519a3c
RH
2776 for (j = i; j ; j = alpha_elf_tdata(j)->in_got_link_next)
2777 {
2778 struct alpha_elf_got_entry **local_got_entries, *gotent;
2779 int k, n;
252b5132 2780
a7519a3c
RH
2781 local_got_entries = alpha_elf_tdata(j)->local_got_entries;
2782 if (!local_got_entries)
2783 continue;
252b5132 2784
a7519a3c
RH
2785 for (k = 0, n = elf_tdata(j)->symtab_hdr.sh_info; k < n; ++k)
2786 for (gotent = local_got_entries[k];
2787 gotent ; gotent = gotent->next)
2788 if (gotent->use_count > 0)
2789 entries += (alpha_dynamic_entries_for_reloc
0e1862bb
L
2790 (gotent->reloc_type, 0, bfd_link_pic (info),
2791 bfd_link_pie (info)));
a7519a3c
RH
2792 }
2793 }
3765b1be 2794
ce558b89 2795 srel = elf_hash_table(info)->srelgot;
a7519a3c
RH
2796 if (!srel)
2797 {
2798 BFD_ASSERT (entries == 0);
4a828aab 2799 return;
a7519a3c
RH
2800 }
2801 srel->size = sizeof (Elf64_External_Rela) * entries;
252b5132 2802
a7519a3c 2803 /* Now do the non-local symbols. */
4dfe6ac6 2804 alpha_elf_link_hash_traverse (htab,
a7519a3c 2805 elf64_alpha_size_rela_got_1, info);
a7519a3c 2806}
252b5132 2807
a7519a3c 2808/* Set the sizes of the dynamic sections. */
3765b1be 2809
a7519a3c
RH
2810static bfd_boolean
2811elf64_alpha_size_dynamic_sections (bfd *output_bfd ATTRIBUTE_UNUSED,
2812 struct bfd_link_info *info)
2813{
2814 bfd *dynobj;
2815 asection *s;
24f1a751 2816 bfd_boolean relplt, relocs;
4dfe6ac6
NC
2817 struct alpha_elf_link_hash_table * htab;
2818
2819 htab = alpha_elf_hash_table (info);
2820 if (htab == NULL)
2821 return FALSE;
3765b1be 2822
a7519a3c
RH
2823 dynobj = elf_hash_table(info)->dynobj;
2824 BFD_ASSERT(dynobj != NULL);
252b5132 2825
a7519a3c
RH
2826 if (elf_hash_table (info)->dynamic_sections_created)
2827 {
2828 /* Set the contents of the .interp section to the interpreter. */
9b8b325a 2829 if (bfd_link_executable (info) && !info->nointerp)
252b5132 2830 {
3d4d4302 2831 s = bfd_get_linker_section (dynobj, ".interp");
a7519a3c
RH
2832 BFD_ASSERT (s != NULL);
2833 s->size = sizeof ELF_DYNAMIC_INTERPRETER;
2834 s->contents = (unsigned char *) ELF_DYNAMIC_INTERPRETER;
2835 }
3765b1be 2836
a7519a3c
RH
2837 /* Now that we've seen all of the input files, we can decide which
2838 symbols need dynamic relocation entries and which don't. We've
2839 collected information in check_relocs that we can now apply to
2840 size the dynamic relocation sections. */
4dfe6ac6 2841 alpha_elf_link_hash_traverse (htab,
a7519a3c 2842 elf64_alpha_calc_dynrel_sizes, info);
252b5132 2843
a7519a3c 2844 elf64_alpha_size_rela_got_section (info);
6ec7057a 2845 elf64_alpha_size_plt_section (info);
a7519a3c
RH
2846 }
2847 /* else we're not dynamic and by definition we don't need such things. */
3765b1be 2848
a7519a3c
RH
2849 /* The check_relocs and adjust_dynamic_symbol entry points have
2850 determined the sizes of the various dynamic sections. Allocate
2851 memory for them. */
2852 relplt = FALSE;
24f1a751 2853 relocs = FALSE;
a7519a3c
RH
2854 for (s = dynobj->sections; s != NULL; s = s->next)
2855 {
2856 const char *name;
3765b1be 2857
a7519a3c
RH
2858 if (!(s->flags & SEC_LINKER_CREATED))
2859 continue;
cc03ec80 2860
a7519a3c
RH
2861 /* It's OK to base decisions on the section name, because none
2862 of the dynobj section names depend upon the input files. */
2863 name = bfd_get_section_name (dynobj, s);
3765b1be 2864
0112cd26 2865 if (CONST_STRNEQ (name, ".rela"))
3765b1be 2866 {
c456f082 2867 if (s->size != 0)
a7519a3c 2868 {
c456f082 2869 if (strcmp (name, ".rela.plt") == 0)
a7519a3c 2870 relplt = TRUE;
24f1a751
AM
2871 else
2872 relocs = TRUE;
252b5132 2873
a7519a3c
RH
2874 /* We use the reloc_count field as a counter if we need
2875 to copy relocs into the output file. */
2876 s->reloc_count = 0;
252b5132 2877 }
3765b1be 2878 }
0112cd26 2879 else if (! CONST_STRNEQ (name, ".got")
c456f082
AM
2880 && strcmp (name, ".plt") != 0
2881 && strcmp (name, ".dynbss") != 0)
3765b1be 2882 {
a7519a3c
RH
2883 /* It's not one of our dynamic sections, so don't allocate space. */
2884 continue;
2885 }
252b5132 2886
c456f082
AM
2887 if (s->size == 0)
2888 {
2889 /* If we don't need this section, strip it from the output file.
2890 This is to handle .rela.bss and .rela.plt. We must create it
2891 in create_dynamic_sections, because it must be created before
2892 the linker maps input sections to output sections. The
2893 linker does that before adjust_dynamic_symbol is called, and
2894 it is that function which decides whether anything needs to
2895 go into these sections. */
6452a567
RH
2896 if (!CONST_STRNEQ (name, ".got"))
2897 s->flags |= SEC_EXCLUDE;
c456f082
AM
2898 }
2899 else if ((s->flags & SEC_HAS_CONTENTS) != 0)
a7519a3c
RH
2900 {
2901 /* Allocate memory for the section contents. */
2902 s->contents = (bfd_byte *) bfd_zalloc (dynobj, s->size);
c456f082 2903 if (s->contents == NULL)
b34976b6 2904 return FALSE;
a7519a3c
RH
2905 }
2906 }
3765b1be 2907
a7519a3c
RH
2908 if (elf_hash_table (info)->dynamic_sections_created)
2909 {
2910 /* Add some entries to the .dynamic section. We fill in the
2911 values later, in elf64_alpha_finish_dynamic_sections, but we
2912 must add the entries now so that we get the correct size for
2913 the .dynamic section. The DT_DEBUG entry is filled in by the
2914 dynamic linker and used by the debugger. */
2915#define add_dynamic_entry(TAG, VAL) \
2916 _bfd_elf_add_dynamic_entry (info, TAG, VAL)
3765b1be 2917
0e1862bb 2918 if (bfd_link_executable (info))
a7519a3c
RH
2919 {
2920 if (!add_dynamic_entry (DT_DEBUG, 0))
2921 return FALSE;
3765b1be
RH
2922 }
2923
a7519a3c 2924 if (relplt)
3765b1be 2925 {
a7519a3c
RH
2926 if (!add_dynamic_entry (DT_PLTGOT, 0)
2927 || !add_dynamic_entry (DT_PLTRELSZ, 0)
2928 || !add_dynamic_entry (DT_PLTREL, DT_RELA)
2929 || !add_dynamic_entry (DT_JMPREL, 0))
2930 return FALSE;
6ec7057a
RH
2931
2932 if (elf64_alpha_use_secureplt
2933 && !add_dynamic_entry (DT_ALPHA_PLTRO, 1))
2934 return FALSE;
a7519a3c 2935 }
252b5132 2936
24f1a751 2937 if (relocs)
a7519a3c 2938 {
24f1a751
AM
2939 if (!add_dynamic_entry (DT_RELA, 0)
2940 || !add_dynamic_entry (DT_RELASZ, 0)
2941 || !add_dynamic_entry (DT_RELAENT, sizeof (Elf64_External_Rela)))
a7519a3c 2942 return FALSE;
24f1a751
AM
2943
2944 if (info->flags & DF_TEXTREL)
2945 {
2946 if (!add_dynamic_entry (DT_TEXTREL, 0))
2947 return FALSE;
2948 }
252b5132
RH
2949 }
2950 }
a7519a3c 2951#undef add_dynamic_entry
252b5132 2952
b34976b6 2953 return TRUE;
252b5132 2954}
a7519a3c
RH
2955\f
2956/* These functions do relaxation for Alpha ELF.
252b5132 2957
a7519a3c
RH
2958 Currently I'm only handling what I can do with existing compiler
2959 and assembler support, which means no instructions are removed,
2960 though some may be nopped. At this time GCC does not emit enough
2961 information to do all of the relaxing that is possible. It will
2962 take some not small amount of work for that to happen.
252b5132 2963
a7519a3c
RH
2964 There are a couple of interesting papers that I once read on this
2965 subject, that I cannot find references to at the moment, that
2966 related to Alpha in particular. They are by David Wall, then of
2967 DEC WRL. */
252b5132 2968
a7519a3c
RH
2969struct alpha_relax_info
2970{
2971 bfd *abfd;
2972 asection *sec;
2973 bfd_byte *contents;
2974 Elf_Internal_Shdr *symtab_hdr;
2975 Elf_Internal_Rela *relocs, *relend;
2976 struct bfd_link_info *link_info;
2977 bfd_vma gp;
2978 bfd *gotobj;
2979 asection *tsec;
2980 struct alpha_elf_link_hash_entry *h;
2981 struct alpha_elf_got_entry **first_gotent;
2982 struct alpha_elf_got_entry *gotent;
2983 bfd_boolean changed_contents;
2984 bfd_boolean changed_relocs;
2985 unsigned char other;
2986};
252b5132 2987
a7519a3c
RH
2988static Elf_Internal_Rela *
2989elf64_alpha_find_reloc_at_ofs (Elf_Internal_Rela *rel,
2990 Elf_Internal_Rela *relend,
2991 bfd_vma offset, int type)
2992{
2993 while (rel < relend)
252b5132 2994 {
a7519a3c
RH
2995 if (rel->r_offset == offset
2996 && ELF64_R_TYPE (rel->r_info) == (unsigned int) type)
2997 return rel;
2998 ++rel;
2999 }
3000 return NULL;
3001}
252b5132 3002
a7519a3c
RH
3003static bfd_boolean
3004elf64_alpha_relax_got_load (struct alpha_relax_info *info, bfd_vma symval,
3005 Elf_Internal_Rela *irel, unsigned long r_type)
3006{
3007 unsigned int insn;
3008 bfd_signed_vma disp;
252b5132 3009
a7519a3c
RH
3010 /* Get the instruction. */
3011 insn = bfd_get_32 (info->abfd, info->contents + irel->r_offset);
252b5132 3012
a7519a3c
RH
3013 if (insn >> 26 != OP_LDQ)
3014 {
3015 reloc_howto_type *howto = elf64_alpha_howto_table + r_type;
4eca0228 3016 _bfd_error_handler
695344c0 3017 /* xgettext:c-format */
d42c267e
AM
3018 (_("%B: %A+%#Lx: warning: %s relocation against unexpected insn"),
3019 info->abfd, info->sec, irel->r_offset, howto->name);
a7519a3c
RH
3020 return TRUE;
3021 }
252b5132 3022
a7519a3c
RH
3023 /* Can't relax dynamic symbols. */
3024 if (alpha_elf_dynamic_symbol_p (&info->h->root, info->link_info))
3025 return TRUE;
252b5132 3026
a7519a3c 3027 /* Can't use local-exec relocations in shared libraries. */
e366eeae 3028 if (r_type == R_ALPHA_GOTTPREL
3cbc1e5e 3029 && bfd_link_dll (info->link_info))
a7519a3c 3030 return TRUE;
252b5132 3031
a7519a3c
RH
3032 if (r_type == R_ALPHA_LITERAL)
3033 {
3034 /* Look for nice constant addresses. This includes the not-uncommon
3035 special case of 0 for undefweak symbols. */
3036 if ((info->h && info->h->root.root.type == bfd_link_hash_undefweak)
0e1862bb 3037 || (!bfd_link_pic (info->link_info)
a7519a3c
RH
3038 && (symval >= (bfd_vma)-0x8000 || symval < 0x8000)))
3039 {
3040 disp = 0;
3041 insn = (OP_LDA << 26) | (insn & (31 << 21)) | (31 << 16);
3042 insn |= (symval & 0xffff);
3043 r_type = R_ALPHA_NONE;
3044 }
3045 else
3046 {
d1c109de
RH
3047 /* We may only create GPREL relocs during the second pass. */
3048 if (info->link_info->relax_pass == 0)
3049 return TRUE;
3050
a7519a3c
RH
3051 disp = symval - info->gp;
3052 insn = (OP_LDA << 26) | (insn & 0x03ff0000);
3053 r_type = R_ALPHA_GPREL16;
3054 }
252b5132
RH
3055 }
3056 else
252b5132 3057 {
a7519a3c 3058 bfd_vma dtp_base, tp_base;
252b5132 3059
a7519a3c
RH
3060 BFD_ASSERT (elf_hash_table (info->link_info)->tls_sec != NULL);
3061 dtp_base = alpha_get_dtprel_base (info->link_info);
3062 tp_base = alpha_get_tprel_base (info->link_info);
3063 disp = symval - (r_type == R_ALPHA_GOTDTPREL ? dtp_base : tp_base);
252b5132 3064
a7519a3c 3065 insn = (OP_LDA << 26) | (insn & (31 << 21)) | (31 << 16);
252b5132 3066
a7519a3c
RH
3067 switch (r_type)
3068 {
3069 case R_ALPHA_GOTDTPREL:
3070 r_type = R_ALPHA_DTPREL16;
3071 break;
3072 case R_ALPHA_GOTTPREL:
3073 r_type = R_ALPHA_TPREL16;
3074 break;
3075 default:
3076 BFD_ASSERT (0);
3077 return FALSE;
3078 }
3079 }
252b5132 3080
a7519a3c 3081 if (disp < -0x8000 || disp >= 0x8000)
b34976b6 3082 return TRUE;
252b5132 3083
a7519a3c
RH
3084 bfd_put_32 (info->abfd, (bfd_vma) insn, info->contents + irel->r_offset);
3085 info->changed_contents = TRUE;
252b5132 3086
a7519a3c
RH
3087 /* Reduce the use count on this got entry by one, possibly
3088 eliminating it. */
3089 if (--info->gotent->use_count == 0)
252b5132 3090 {
a7519a3c
RH
3091 int sz = alpha_got_entry_size (r_type);
3092 alpha_elf_tdata (info->gotobj)->total_got_size -= sz;
3093 if (!info->h)
3094 alpha_elf_tdata (info->gotobj)->local_got_size -= sz;
252b5132 3095 }
252b5132 3096
a7519a3c
RH
3097 /* Smash the existing GOT relocation for its 16-bit immediate pair. */
3098 irel->r_info = ELF64_R_INFO (ELF64_R_SYM (irel->r_info), r_type);
3099 info->changed_relocs = TRUE;
3100
3101 /* ??? Search forward through this basic block looking for insns
3102 that use the target register. Stop after an insn modifying the
3103 register is seen, or after a branch or call.
252b5132 3104
a7519a3c
RH
3105 Any such memory load insn may be substituted by a load directly
3106 off the GP. This allows the memory load insn to be issued before
3107 the calculated GP register would otherwise be ready.
252b5132 3108
a7519a3c
RH
3109 Any such jsr insn can be replaced by a bsr if it is in range.
3110
3111 This would mean that we'd have to _add_ relocations, the pain of
3112 which gives one pause. */
252b5132 3113
b34976b6 3114 return TRUE;
252b5132
RH
3115}
3116
a7519a3c
RH
3117static bfd_vma
3118elf64_alpha_relax_opt_call (struct alpha_relax_info *info, bfd_vma symval)
252b5132 3119{
a7519a3c
RH
3120 /* If the function has the same gp, and we can identify that the
3121 function does not use its function pointer, we can eliminate the
3122 address load. */
252b5132 3123
a7519a3c
RH
3124 /* If the symbol is marked NOPV, we are being told the function never
3125 needs its procedure value. */
3126 if ((info->other & STO_ALPHA_STD_GPLOAD) == STO_ALPHA_NOPV)
3127 return symval;
252b5132 3128
a7519a3c
RH
3129 /* If the symbol is marked STD_GP, we are being told the function does
3130 a normal ldgp in the first two words. */
3131 else if ((info->other & STO_ALPHA_STD_GPLOAD) == STO_ALPHA_STD_GPLOAD)
3132 ;
252b5132 3133
a7519a3c
RH
3134 /* Otherwise, we may be able to identify a GP load in the first two
3135 words, which we can then skip. */
3136 else
252b5132 3137 {
a7519a3c
RH
3138 Elf_Internal_Rela *tsec_relocs, *tsec_relend, *tsec_free, *gpdisp;
3139 bfd_vma ofs;
252b5132 3140
a7519a3c
RH
3141 /* Load the relocations from the section that the target symbol is in. */
3142 if (info->sec == info->tsec)
252b5132 3143 {
a7519a3c
RH
3144 tsec_relocs = info->relocs;
3145 tsec_relend = info->relend;
3146 tsec_free = NULL;
3147 }
3148 else
3149 {
3150 tsec_relocs = (_bfd_elf_link_read_relocs
2c3fc389 3151 (info->abfd, info->tsec, NULL,
a7519a3c
RH
3152 (Elf_Internal_Rela *) NULL,
3153 info->link_info->keep_memory));
3154 if (tsec_relocs == NULL)
3155 return 0;
3156 tsec_relend = tsec_relocs + info->tsec->reloc_count;
ae4fda66
JC
3157 tsec_free = (elf_section_data (info->tsec)->relocs == tsec_relocs
3158 ? NULL
3159 : tsec_relocs);
a7519a3c 3160 }
252b5132 3161
a7519a3c
RH
3162 /* Recover the symbol's offset within the section. */
3163 ofs = (symval - info->tsec->output_section->vma
3164 - info->tsec->output_offset);
252b5132 3165
a7519a3c
RH
3166 /* Look for a GPDISP reloc. */
3167 gpdisp = (elf64_alpha_find_reloc_at_ofs
3168 (tsec_relocs, tsec_relend, ofs, R_ALPHA_GPDISP));
252b5132 3169
a7519a3c
RH
3170 if (!gpdisp || gpdisp->r_addend != 4)
3171 {
3172 if (tsec_free)
3173 free (tsec_free);
3174 return 0;
252b5132 3175 }
a7519a3c
RH
3176 if (tsec_free)
3177 free (tsec_free);
252b5132
RH
3178 }
3179
a7519a3c
RH
3180 /* We've now determined that we can skip an initial gp load. Verify
3181 that the call and the target use the same gp. */
f13a99db 3182 if (info->link_info->output_bfd->xvec != info->tsec->owner->xvec
a7519a3c
RH
3183 || info->gotobj != alpha_elf_tdata (info->tsec->owner)->gotobj)
3184 return 0;
252b5132 3185
a7519a3c
RH
3186 return symval + 8;
3187}
252b5132 3188
a7519a3c
RH
3189static bfd_boolean
3190elf64_alpha_relax_with_lituse (struct alpha_relax_info *info,
3191 bfd_vma symval, Elf_Internal_Rela *irel)
252b5132 3192{
d1c109de
RH
3193 Elf_Internal_Rela *urel, *erel, *irelend = info->relend;
3194 int flags;
a7519a3c
RH
3195 bfd_signed_vma disp;
3196 bfd_boolean fits16;
3197 bfd_boolean fits32;
3198 bfd_boolean lit_reused = FALSE;
3199 bfd_boolean all_optimized = TRUE;
d1c109de
RH
3200 bfd_boolean changed_contents;
3201 bfd_boolean changed_relocs;
3202 bfd_byte *contents = info->contents;
3203 bfd *abfd = info->abfd;
3204 bfd_vma sec_output_vma;
a7519a3c 3205 unsigned int lit_insn;
d1c109de 3206 int relax_pass;
252b5132 3207
d1c109de 3208 lit_insn = bfd_get_32 (abfd, contents + irel->r_offset);
a7519a3c
RH
3209 if (lit_insn >> 26 != OP_LDQ)
3210 {
4eca0228 3211 _bfd_error_handler
695344c0 3212 /* xgettext:c-format */
d42c267e
AM
3213 (_("%B: %A+%#Lx: warning: LITERAL relocation against unexpected insn"),
3214 abfd, info->sec, irel->r_offset);
a7519a3c
RH
3215 return TRUE;
3216 }
252b5132 3217
a7519a3c
RH
3218 /* Can't relax dynamic symbols. */
3219 if (alpha_elf_dynamic_symbol_p (&info->h->root, info->link_info))
3220 return TRUE;
3221
d1c109de
RH
3222 changed_contents = info->changed_contents;
3223 changed_relocs = info->changed_relocs;
3224 sec_output_vma = info->sec->output_section->vma + info->sec->output_offset;
3225 relax_pass = info->link_info->relax_pass;
3226
a7519a3c 3227 /* Summarize how this particular LITERAL is used. */
d1c109de 3228 for (erel = irel+1, flags = 0; erel < irelend; ++erel)
252b5132 3229 {
d1c109de 3230 if (ELF64_R_TYPE (erel->r_info) != R_ALPHA_LITUSE)
a7519a3c 3231 break;
d1c109de
RH
3232 if (erel->r_addend <= 6)
3233 flags |= 1 << erel->r_addend;
a7519a3c 3234 }
252b5132 3235
a7519a3c
RH
3236 /* A little preparation for the loop... */
3237 disp = symval - info->gp;
252b5132 3238
d1c109de 3239 for (urel = irel+1; urel < erel; ++urel)
a7519a3c 3240 {
d1c109de 3241 bfd_vma urel_r_offset = urel->r_offset;
a7519a3c
RH
3242 unsigned int insn;
3243 int insn_disp;
3244 bfd_signed_vma xdisp;
d1c109de 3245 Elf_Internal_Rela nrel;
252b5132 3246
d1c109de 3247 insn = bfd_get_32 (abfd, contents + urel_r_offset);
252b5132 3248
a7519a3c
RH
3249 switch (urel->r_addend)
3250 {
3251 case LITUSE_ALPHA_ADDR:
3252 default:
3253 /* This type is really just a placeholder to note that all
3254 uses cannot be optimized, but to still allow some. */
3255 all_optimized = FALSE;
3256 break;
252b5132 3257
a7519a3c 3258 case LITUSE_ALPHA_BASE:
d1c109de
RH
3259 /* We may only create GPREL relocs during the second pass. */
3260 if (relax_pass == 0)
3261 {
3262 all_optimized = FALSE;
3263 break;
3264 }
3265
a7519a3c 3266 /* We can always optimize 16-bit displacements. */
252b5132 3267
a7519a3c
RH
3268 /* Extract the displacement from the instruction, sign-extending
3269 it if necessary, then test whether it is within 16 or 32 bits
3270 displacement from GP. */
3271 insn_disp = ((insn & 0xffff) ^ 0x8000) - 0x8000;
3272
3273 xdisp = disp + insn_disp;
3274 fits16 = (xdisp >= - (bfd_signed_vma) 0x8000 && xdisp < 0x8000);
3275 fits32 = (xdisp >= - (bfd_signed_vma) 0x80000000
3276 && xdisp < 0x7fff8000);
3277
3278 if (fits16)
3279 {
3280 /* Take the op code and dest from this insn, take the base
3281 register from the literal insn. Leave the offset alone. */
3282 insn = (insn & 0xffe0ffff) | (lit_insn & 0x001f0000);
d1c109de
RH
3283 bfd_put_32 (abfd, (bfd_vma) insn, contents + urel_r_offset);
3284 changed_contents = TRUE;
3285
3286 nrel = *urel;
3287 nrel.r_info = ELF64_R_INFO (ELF64_R_SYM (irel->r_info),
3288 R_ALPHA_GPREL16);
3289 nrel.r_addend = irel->r_addend;
3290
3291 /* As we adjust, move the reloc to the end so that we don't
3292 break the LITERAL+LITUSE chain. */
3293 if (urel < --erel)
3294 *urel-- = *erel;
3295 *erel = nrel;
3296 changed_relocs = TRUE;
252b5132 3297 }
252b5132 3298
a7519a3c
RH
3299 /* If all mem+byte, we can optimize 32-bit mem displacements. */
3300 else if (fits32 && !(flags & ~6))
3301 {
3302 /* FIXME: sanity check that lit insn Ra is mem insn Rb. */
252b5132 3303
a7519a3c
RH
3304 irel->r_info = ELF64_R_INFO (ELF64_R_SYM (irel->r_info),
3305 R_ALPHA_GPRELHIGH);
3306 lit_insn = (OP_LDAH << 26) | (lit_insn & 0x03ff0000);
d1c109de 3307 bfd_put_32 (abfd, (bfd_vma) lit_insn, contents + irel->r_offset);
a7519a3c 3308 lit_reused = TRUE;
d1c109de 3309 changed_contents = TRUE;
252b5132 3310
d1c109de
RH
3311 /* Since all relocs must be optimized, don't bother swapping
3312 this relocation to the end. */
a7519a3c
RH
3313 urel->r_info = ELF64_R_INFO (ELF64_R_SYM (irel->r_info),
3314 R_ALPHA_GPRELLOW);
3315 urel->r_addend = irel->r_addend;
d1c109de 3316 changed_relocs = TRUE;
a7519a3c
RH
3317 }
3318 else
3319 all_optimized = FALSE;
3320 break;
252b5132 3321
a7519a3c
RH
3322 case LITUSE_ALPHA_BYTOFF:
3323 /* We can always optimize byte instructions. */
252b5132 3324
a7519a3c
RH
3325 /* FIXME: sanity check the insn for byte op. Check that the
3326 literal dest reg is indeed Rb in the byte insn. */
252b5132 3327
a7519a3c
RH
3328 insn &= ~ (unsigned) 0x001ff000;
3329 insn |= ((symval & 7) << 13) | 0x1000;
d1c109de
RH
3330 bfd_put_32 (abfd, (bfd_vma) insn, contents + urel_r_offset);
3331 changed_contents = TRUE;
3332
3333 nrel = *urel;
3334 nrel.r_info = ELF64_R_INFO (0, R_ALPHA_NONE);
3335 nrel.r_addend = 0;
3336
3337 /* As we adjust, move the reloc to the end so that we don't
3338 break the LITERAL+LITUSE chain. */
3339 if (urel < --erel)
3340 *urel-- = *erel;
3341 *erel = nrel;
3342 changed_relocs = TRUE;
a7519a3c 3343 break;
252b5132 3344
a7519a3c
RH
3345 case LITUSE_ALPHA_JSR:
3346 case LITUSE_ALPHA_TLSGD:
3347 case LITUSE_ALPHA_TLSLDM:
8288a39e 3348 case LITUSE_ALPHA_JSRDIRECT:
0d5f9994 3349 {
a7519a3c
RH
3350 bfd_vma optdest, org;
3351 bfd_signed_vma odisp;
252b5132 3352
a7519a3c
RH
3353 /* For undefined weak symbols, we're mostly interested in getting
3354 rid of the got entry whenever possible, so optimize this to a
3355 use of the zero register. */
3356 if (info->h && info->h->root.root.type == bfd_link_hash_undefweak)
3357 {
3358 insn |= 31 << 16;
d1c109de 3359 bfd_put_32 (abfd, (bfd_vma) insn, contents + urel_r_offset);
252b5132 3360
d1c109de 3361 changed_contents = TRUE;
a7519a3c
RH
3362 break;
3363 }
252b5132 3364
a7519a3c
RH
3365 /* If not zero, place to jump without needing pv. */
3366 optdest = elf64_alpha_relax_opt_call (info, symval);
d1c109de 3367 org = sec_output_vma + urel_r_offset + 4;
a7519a3c 3368 odisp = (optdest ? optdest : symval) - org;
252b5132 3369
a7519a3c
RH
3370 if (odisp >= -0x400000 && odisp < 0x400000)
3371 {
3372 Elf_Internal_Rela *xrel;
252b5132 3373
a7519a3c
RH
3374 /* Preserve branch prediction call stack when possible. */
3375 if ((insn & INSN_JSR_MASK) == INSN_JSR)
3376 insn = (OP_BSR << 26) | (insn & 0x03e00000);
3377 else
3378 insn = (OP_BR << 26) | (insn & 0x03e00000);
d1c109de
RH
3379 bfd_put_32 (abfd, (bfd_vma) insn, contents + urel_r_offset);
3380 changed_contents = TRUE;
252b5132 3381
d1c109de
RH
3382 nrel = *urel;
3383 nrel.r_info = ELF64_R_INFO (ELF64_R_SYM (irel->r_info),
3384 R_ALPHA_BRADDR);
3385 nrel.r_addend = irel->r_addend;
252b5132 3386
a7519a3c 3387 if (optdest)
d1c109de 3388 nrel.r_addend += optdest - symval;
a7519a3c
RH
3389 else
3390 all_optimized = FALSE;
252b5132 3391
a7519a3c
RH
3392 /* Kill any HINT reloc that might exist for this insn. */
3393 xrel = (elf64_alpha_find_reloc_at_ofs
d1c109de 3394 (info->relocs, info->relend, urel_r_offset,
a7519a3c
RH
3395 R_ALPHA_HINT));
3396 if (xrel)
3397 xrel->r_info = ELF64_R_INFO (0, R_ALPHA_NONE);
252b5132 3398
d1c109de
RH
3399 /* As we adjust, move the reloc to the end so that we don't
3400 break the LITERAL+LITUSE chain. */
3401 if (urel < --erel)
3402 *urel-- = *erel;
3403 *erel = nrel;
3404
a7519a3c
RH
3405 info->changed_relocs = TRUE;
3406 }
3407 else
3408 all_optimized = FALSE;
252b5132 3409
a7519a3c
RH
3410 /* Even if the target is not in range for a direct branch,
3411 if we share a GP, we can eliminate the gp reload. */
3412 if (optdest)
3413 {
3414 Elf_Internal_Rela *gpdisp
3415 = (elf64_alpha_find_reloc_at_ofs
d1c109de 3416 (info->relocs, irelend, urel_r_offset + 4,
a7519a3c
RH
3417 R_ALPHA_GPDISP));
3418 if (gpdisp)
3419 {
d1c109de 3420 bfd_byte *p_ldah = contents + gpdisp->r_offset;
a7519a3c 3421 bfd_byte *p_lda = p_ldah + gpdisp->r_addend;
d1c109de
RH
3422 unsigned int ldah = bfd_get_32 (abfd, p_ldah);
3423 unsigned int lda = bfd_get_32 (abfd, p_lda);
252b5132 3424
a7519a3c
RH
3425 /* Verify that the instruction is "ldah $29,0($26)".
3426 Consider a function that ends in a noreturn call,
3427 and that the next function begins with an ldgp,
3428 and that by accident there is no padding between.
3429 In that case the insn would use $27 as the base. */
3430 if (ldah == 0x27ba0000 && lda == 0x23bd0000)
3431 {
d1c109de
RH
3432 bfd_put_32 (abfd, (bfd_vma) INSN_UNOP, p_ldah);
3433 bfd_put_32 (abfd, (bfd_vma) INSN_UNOP, p_lda);
252b5132 3434
a7519a3c 3435 gpdisp->r_info = ELF64_R_INFO (0, R_ALPHA_NONE);
d1c109de
RH
3436 changed_contents = TRUE;
3437 changed_relocs = TRUE;
a7519a3c
RH
3438 }
3439 }
3440 }
3441 }
3442 break;
252b5132 3443 }
252b5132
RH
3444 }
3445
d1c109de
RH
3446 /* If we reused the literal instruction, we must have optimized all. */
3447 BFD_ASSERT(!lit_reused || all_optimized);
3448
a7519a3c
RH
3449 /* If all cases were optimized, we can reduce the use count on this
3450 got entry by one, possibly eliminating it. */
3451 if (all_optimized)
252b5132 3452 {
a7519a3c 3453 if (--info->gotent->use_count == 0)
252b5132 3454 {
a7519a3c
RH
3455 int sz = alpha_got_entry_size (R_ALPHA_LITERAL);
3456 alpha_elf_tdata (info->gotobj)->total_got_size -= sz;
3457 if (!info->h)
3458 alpha_elf_tdata (info->gotobj)->local_got_size -= sz;
252b5132 3459 }
a7519a3c
RH
3460
3461 /* If the literal instruction is no longer needed (it may have been
3462 reused. We can eliminate it. */
3463 /* ??? For now, I don't want to deal with compacting the section,
3464 so just nop it out. */
3465 if (!lit_reused)
252b5132 3466 {
a7519a3c 3467 irel->r_info = ELF64_R_INFO (0, R_ALPHA_NONE);
d1c109de 3468 changed_relocs = TRUE;
252b5132 3469
d1c109de
RH
3470 bfd_put_32 (abfd, (bfd_vma) INSN_UNOP, contents + irel->r_offset);
3471 changed_contents = TRUE;
a7519a3c 3472 }
a7519a3c 3473 }
d1c109de
RH
3474
3475 info->changed_contents = changed_contents;
3476 info->changed_relocs = changed_relocs;
3477
3478 if (all_optimized || relax_pass == 0)
3479 return TRUE;
3480 return elf64_alpha_relax_got_load (info, symval, irel, R_ALPHA_LITERAL);
252b5132
RH
3481}
3482
b34976b6 3483static bfd_boolean
a7519a3c
RH
3484elf64_alpha_relax_tls_get_addr (struct alpha_relax_info *info, bfd_vma symval,
3485 Elf_Internal_Rela *irel, bfd_boolean is_gd)
f44f99a5 3486{
a7519a3c 3487 bfd_byte *pos[5];
891caa9b 3488 unsigned int insn, tlsgd_reg;
a7519a3c 3489 Elf_Internal_Rela *gpdisp, *hint;
891caa9b 3490 bfd_boolean dynamic, use_gottprel;
a7519a3c 3491 unsigned long new_symndx;
f44f99a5 3492
a7519a3c 3493 dynamic = alpha_elf_dynamic_symbol_p (&info->h->root, info->link_info);
f44f99a5 3494
a7519a3c
RH
3495 /* If a TLS symbol is accessed using IE at least once, there is no point
3496 to use dynamic model for it. */
3497 if (is_gd && info->h && (info->h->flags & ALPHA_ELF_LINK_HASH_TLS_IE))
3498 ;
f44f99a5 3499
a7519a3c
RH
3500 /* If the symbol is local, and we've already committed to DF_STATIC_TLS,
3501 then we might as well relax to IE. */
0e1862bb 3502 else if (bfd_link_pic (info->link_info) && !dynamic
a7519a3c
RH
3503 && (info->link_info->flags & DF_STATIC_TLS))
3504 ;
f44f99a5 3505
a7519a3c 3506 /* Otherwise we must be building an executable to do anything. */
0e1862bb 3507 else if (bfd_link_pic (info->link_info))
a7519a3c 3508 return TRUE;
f44f99a5 3509
a7519a3c
RH
3510 /* The TLSGD/TLSLDM relocation must be followed by a LITERAL and
3511 the matching LITUSE_TLS relocations. */
3512 if (irel + 2 >= info->relend)
3513 return TRUE;
3514 if (ELF64_R_TYPE (irel[1].r_info) != R_ALPHA_LITERAL
3515 || ELF64_R_TYPE (irel[2].r_info) != R_ALPHA_LITUSE
3516 || irel[2].r_addend != (is_gd ? LITUSE_ALPHA_TLSGD : LITUSE_ALPHA_TLSLDM))
3517 return TRUE;
f44f99a5 3518
a7519a3c
RH
3519 /* There must be a GPDISP relocation positioned immediately after the
3520 LITUSE relocation. */
3521 gpdisp = elf64_alpha_find_reloc_at_ofs (info->relocs, info->relend,
3522 irel[2].r_offset + 4, R_ALPHA_GPDISP);
3523 if (!gpdisp)
b34976b6 3524 return TRUE;
f44f99a5 3525
a7519a3c
RH
3526 pos[0] = info->contents + irel[0].r_offset;
3527 pos[1] = info->contents + irel[1].r_offset;
3528 pos[2] = info->contents + irel[2].r_offset;
3529 pos[3] = info->contents + gpdisp->r_offset;
3530 pos[4] = pos[3] + gpdisp->r_addend;
f44f99a5 3531
7dbf3b76
RH
3532 /* Beware of the compiler hoisting part of the sequence out a loop
3533 and adjusting the destination register for the TLSGD insn. If this
3534 happens, there will be a move into $16 before the JSR insn, so only
3535 transformations of the first insn pair should use this register. */
3536 tlsgd_reg = bfd_get_32 (info->abfd, pos[0]);
3537 tlsgd_reg = (tlsgd_reg >> 21) & 31;
3538
a7519a3c
RH
3539 /* Generally, the positions are not allowed to be out of order, lest the
3540 modified insn sequence have different register lifetimes. We can make
3541 an exception when pos 1 is adjacent to pos 0. */
3542 if (pos[1] + 4 == pos[0])
f44f99a5 3543 {
a7519a3c
RH
3544 bfd_byte *tmp = pos[0];
3545 pos[0] = pos[1];
3546 pos[1] = tmp;
f44f99a5 3547 }
a7519a3c
RH
3548 if (pos[1] >= pos[2] || pos[2] >= pos[3])
3549 return TRUE;
cc03ec80 3550
a7519a3c
RH
3551 /* Reduce the use count on the LITERAL relocation. Do this before we
3552 smash the symndx when we adjust the relocations below. */
3553 {
3554 struct alpha_elf_got_entry *lit_gotent;
3555 struct alpha_elf_link_hash_entry *lit_h;
3556 unsigned long indx;
f44f99a5 3557
a7519a3c
RH
3558 BFD_ASSERT (ELF64_R_SYM (irel[1].r_info) >= info->symtab_hdr->sh_info);
3559 indx = ELF64_R_SYM (irel[1].r_info) - info->symtab_hdr->sh_info;
3560 lit_h = alpha_elf_sym_hashes (info->abfd)[indx];
f44f99a5 3561
a7519a3c
RH
3562 while (lit_h->root.root.type == bfd_link_hash_indirect
3563 || lit_h->root.root.type == bfd_link_hash_warning)
3564 lit_h = (struct alpha_elf_link_hash_entry *) lit_h->root.root.u.i.link;
252b5132 3565
a7519a3c
RH
3566 for (lit_gotent = lit_h->got_entries; lit_gotent ;
3567 lit_gotent = lit_gotent->next)
3568 if (lit_gotent->gotobj == info->gotobj
3569 && lit_gotent->reloc_type == R_ALPHA_LITERAL
3570 && lit_gotent->addend == irel[1].r_addend)
3571 break;
3572 BFD_ASSERT (lit_gotent);
252b5132 3573
a7519a3c
RH
3574 if (--lit_gotent->use_count == 0)
3575 {
3576 int sz = alpha_got_entry_size (R_ALPHA_LITERAL);
3577 alpha_elf_tdata (info->gotobj)->total_got_size -= sz;
3578 }
3579 }
252b5132 3580
a7519a3c 3581 /* Change
252b5132 3582
a7519a3c
RH
3583 lda $16,x($gp) !tlsgd!1
3584 ldq $27,__tls_get_addr($gp) !literal!1
3585 jsr $26,($27),__tls_get_addr !lituse_tlsgd!1
3586 ldah $29,0($26) !gpdisp!2
3587 lda $29,0($29) !gpdisp!2
3588 to
3589 ldq $16,x($gp) !gottprel
3590 unop
3591 call_pal rduniq
3592 addq $16,$0,$0
3593 unop
3594 or the first pair to
3595 lda $16,x($gp) !tprel
3596 unop
3597 or
3598 ldah $16,x($gp) !tprelhi
3599 lda $16,x($16) !tprello
3600
3601 as appropriate. */
3602
3603 use_gottprel = FALSE;
cf35638d 3604 new_symndx = is_gd ? ELF64_R_SYM (irel->r_info) : STN_UNDEF;
891caa9b 3605
9a757e4d
RM
3606 /* Some compilers warn about a Boolean-looking expression being
3607 used in a switch. The explicit cast silences them. */
0e1862bb 3608 switch ((int) (!dynamic && !bfd_link_pic (info->link_info)))
252b5132 3609 {
a7519a3c
RH
3610 case 1:
3611 {
3612 bfd_vma tp_base;
3613 bfd_signed_vma disp;
252b5132 3614
a7519a3c
RH
3615 BFD_ASSERT (elf_hash_table (info->link_info)->tls_sec != NULL);
3616 tp_base = alpha_get_tprel_base (info->link_info);
3617 disp = symval - tp_base;
252b5132 3618
a7519a3c
RH
3619 if (disp >= -0x8000 && disp < 0x8000)
3620 {
891caa9b 3621 insn = (OP_LDA << 26) | (tlsgd_reg << 21) | (31 << 16);
a7519a3c
RH
3622 bfd_put_32 (info->abfd, (bfd_vma) insn, pos[0]);
3623 bfd_put_32 (info->abfd, (bfd_vma) INSN_UNOP, pos[1]);
3765b1be 3624
a7519a3c
RH
3625 irel[0].r_offset = pos[0] - info->contents;
3626 irel[0].r_info = ELF64_R_INFO (new_symndx, R_ALPHA_TPREL16);
3627 irel[1].r_info = ELF64_R_INFO (0, R_ALPHA_NONE);
3628 break;
3629 }
3630 else if (disp >= -(bfd_signed_vma) 0x80000000
3631 && disp < (bfd_signed_vma) 0x7fff8000
891caa9b 3632 && pos[0] + 4 == pos[1])
a7519a3c 3633 {
891caa9b 3634 insn = (OP_LDAH << 26) | (tlsgd_reg << 21) | (31 << 16);
a7519a3c 3635 bfd_put_32 (info->abfd, (bfd_vma) insn, pos[0]);
891caa9b 3636 insn = (OP_LDA << 26) | (tlsgd_reg << 21) | (tlsgd_reg << 16);
a7519a3c 3637 bfd_put_32 (info->abfd, (bfd_vma) insn, pos[1]);
3765b1be 3638
a7519a3c
RH
3639 irel[0].r_offset = pos[0] - info->contents;
3640 irel[0].r_info = ELF64_R_INFO (new_symndx, R_ALPHA_TPRELHI);
3641 irel[1].r_offset = pos[1] - info->contents;
3642 irel[1].r_info = ELF64_R_INFO (new_symndx, R_ALPHA_TPRELLO);
3643 break;
3644 }
3645 }
3646 /* FALLTHRU */
3765b1be 3647
3765b1be 3648 default:
a7519a3c
RH
3649 use_gottprel = TRUE;
3650
891caa9b 3651 insn = (OP_LDQ << 26) | (tlsgd_reg << 21) | (29 << 16);
a7519a3c
RH
3652 bfd_put_32 (info->abfd, (bfd_vma) insn, pos[0]);
3653 bfd_put_32 (info->abfd, (bfd_vma) INSN_UNOP, pos[1]);
3654
3655 irel[0].r_offset = pos[0] - info->contents;
3656 irel[0].r_info = ELF64_R_INFO (new_symndx, R_ALPHA_GOTTPREL);
3657 irel[1].r_info = ELF64_R_INFO (0, R_ALPHA_NONE);
3658 break;
3765b1be 3659 }
3765b1be 3660
a7519a3c 3661 bfd_put_32 (info->abfd, (bfd_vma) INSN_RDUNIQ, pos[2]);
252b5132 3662
a7519a3c
RH
3663 insn = INSN_ADDQ | (16 << 21) | (0 << 16) | (0 << 0);
3664 bfd_put_32 (info->abfd, (bfd_vma) insn, pos[3]);
3765b1be 3665
a7519a3c 3666 bfd_put_32 (info->abfd, (bfd_vma) INSN_UNOP, pos[4]);
e92d460e 3667
a7519a3c
RH
3668 irel[2].r_info = ELF64_R_INFO (0, R_ALPHA_NONE);
3669 gpdisp->r_info = ELF64_R_INFO (0, R_ALPHA_NONE);
252b5132 3670
a7519a3c
RH
3671 hint = elf64_alpha_find_reloc_at_ofs (info->relocs, info->relend,
3672 irel[2].r_offset, R_ALPHA_HINT);
3673 if (hint)
3674 hint->r_info = ELF64_R_INFO (0, R_ALPHA_NONE);
252b5132 3675
a7519a3c
RH
3676 info->changed_contents = TRUE;
3677 info->changed_relocs = TRUE;
d6ad34f6 3678
a7519a3c
RH
3679 /* Reduce the use count on the TLSGD/TLSLDM relocation. */
3680 if (--info->gotent->use_count == 0)
3765b1be 3681 {
a7519a3c
RH
3682 int sz = alpha_got_entry_size (info->gotent->reloc_type);
3683 alpha_elf_tdata (info->gotobj)->total_got_size -= sz;
3684 if (!info->h)
3685 alpha_elf_tdata (info->gotobj)->local_got_size -= sz;
3765b1be 3686 }
252b5132 3687
a7519a3c
RH
3688 /* If we've switched to a GOTTPREL relocation, increment the reference
3689 count on that got entry. */
3690 if (use_gottprel)
f44f99a5 3691 {
a7519a3c 3692 struct alpha_elf_got_entry *tprel_gotent;
f44f99a5 3693
a7519a3c
RH
3694 for (tprel_gotent = *info->first_gotent; tprel_gotent ;
3695 tprel_gotent = tprel_gotent->next)
3696 if (tprel_gotent->gotobj == info->gotobj
3697 && tprel_gotent->reloc_type == R_ALPHA_GOTTPREL
3698 && tprel_gotent->addend == irel->r_addend)
3699 break;
3700 if (tprel_gotent)
3701 tprel_gotent->use_count++;
3702 else
f44f99a5 3703 {
a7519a3c
RH
3704 if (info->gotent->use_count == 0)
3705 tprel_gotent = info->gotent;
3706 else
3707 {
3708 tprel_gotent = (struct alpha_elf_got_entry *)
3709 bfd_alloc (info->abfd, sizeof (struct alpha_elf_got_entry));
3710 if (!tprel_gotent)
3711 return FALSE;
f44f99a5 3712
a7519a3c
RH
3713 tprel_gotent->next = *info->first_gotent;
3714 *info->first_gotent = tprel_gotent;
f44f99a5 3715
a7519a3c
RH
3716 tprel_gotent->gotobj = info->gotobj;
3717 tprel_gotent->addend = irel->r_addend;
3718 tprel_gotent->got_offset = -1;
3719 tprel_gotent->reloc_done = 0;
3720 tprel_gotent->reloc_xlated = 0;
3721 }
f44f99a5 3722
a7519a3c
RH
3723 tprel_gotent->use_count = 1;
3724 tprel_gotent->reloc_type = R_ALPHA_GOTTPREL;
3725 }
f44f99a5 3726 }
f44f99a5 3727
b34976b6 3728 return TRUE;
f44f99a5
RH
3729}
3730
b34976b6 3731static bfd_boolean
a7519a3c
RH
3732elf64_alpha_relax_section (bfd *abfd, asection *sec,
3733 struct bfd_link_info *link_info, bfd_boolean *again)
f44f99a5 3734{
a7519a3c
RH
3735 Elf_Internal_Shdr *symtab_hdr;
3736 Elf_Internal_Rela *internal_relocs;
3737 Elf_Internal_Rela *irel, *irelend;
3738 Elf_Internal_Sym *isymbuf = NULL;
3739 struct alpha_elf_got_entry **local_got_entries;
3740 struct alpha_relax_info info;
4dfe6ac6 3741 struct alpha_elf_link_hash_table * htab;
d1c109de 3742 int relax_pass;
4dfe6ac6
NC
3743
3744 htab = alpha_elf_hash_table (link_info);
3745 if (htab == NULL)
3746 return FALSE;
f44f99a5 3747
4a828aab 3748 /* There's nothing to change, yet. */
a7519a3c 3749 *again = FALSE;
f44f99a5 3750
0e1862bb 3751 if (bfd_link_relocatable (link_info)
a7519a3c
RH
3752 || ((sec->flags & (SEC_CODE | SEC_RELOC | SEC_ALLOC))
3753 != (SEC_CODE | SEC_RELOC | SEC_ALLOC))
3754 || sec->reloc_count == 0)
d6ad34f6
RH
3755 return TRUE;
3756
0ffa91dd 3757 BFD_ASSERT (is_alpha_elf (abfd));
d1c109de 3758 relax_pass = link_info->relax_pass;
0ffa91dd 3759
4a828aab 3760 /* Make sure our GOT and PLT tables are up-to-date. */
4dfe6ac6 3761 if (htab->relax_trip != link_info->relax_trip)
4a828aab 3762 {
4dfe6ac6 3763 htab->relax_trip = link_info->relax_trip;
4a828aab 3764
d1c109de
RH
3765 /* This should never fail after the initial round, since the only error
3766 is GOT overflow, and relaxation only shrinks the table. However, we
3767 may only merge got sections during the first pass. If we merge
3768 sections after we've created GPREL relocs, the GP for the merged
3769 section backs up which may put the relocs out of range. */
3770 if (!elf64_alpha_size_got_sections (link_info, relax_pass == 0))
4a828aab
RH
3771 abort ();
3772 if (elf_hash_table (link_info)->dynamic_sections_created)
3773 {
3774 elf64_alpha_size_plt_section (link_info);
3775 elf64_alpha_size_rela_got_section (link_info);
3776 }
3777 }
3778
0ffa91dd 3779 symtab_hdr = &elf_symtab_hdr (abfd);
a7519a3c 3780 local_got_entries = alpha_elf_tdata(abfd)->local_got_entries;
252b5132 3781
a7519a3c
RH
3782 /* Load the relocations for this section. */
3783 internal_relocs = (_bfd_elf_link_read_relocs
2c3fc389 3784 (abfd, sec, NULL, (Elf_Internal_Rela *) NULL,
a7519a3c
RH
3785 link_info->keep_memory));
3786 if (internal_relocs == NULL)
3787 return FALSE;
252b5132 3788
a7519a3c
RH
3789 memset(&info, 0, sizeof (info));
3790 info.abfd = abfd;
3791 info.sec = sec;
3792 info.link_info = link_info;
3793 info.symtab_hdr = symtab_hdr;
3794 info.relocs = internal_relocs;
3795 info.relend = irelend = internal_relocs + sec->reloc_count;
3796
3797 /* Find the GP for this object. Do not store the result back via
3798 _bfd_set_gp_value, since this could change again before final. */
3799 info.gotobj = alpha_elf_tdata (abfd)->gotobj;
3800 if (info.gotobj)
3765b1be 3801 {
a7519a3c
RH
3802 asection *sgot = alpha_elf_tdata (info.gotobj)->got;
3803 info.gp = (sgot->output_section->vma
3804 + sgot->output_offset
3805 + 0x8000);
252b5132
RH
3806 }
3807
a7519a3c
RH
3808 /* Get the section contents. */
3809 if (elf_section_data (sec)->this_hdr.contents != NULL)
3810 info.contents = elf_section_data (sec)->this_hdr.contents;
3811 else
3812 {
3813 if (!bfd_malloc_and_get_section (abfd, sec, &info.contents))
3814 goto error_return;
3815 }
252b5132 3816
a7519a3c
RH
3817 for (irel = internal_relocs; irel < irelend; irel++)
3818 {
3819 bfd_vma symval;
3820 struct alpha_elf_got_entry *gotent;
3821 unsigned long r_type = ELF64_R_TYPE (irel->r_info);
3822 unsigned long r_symndx = ELF64_R_SYM (irel->r_info);
3823
3824 /* Early exit for unhandled or unrelaxable relocations. */
d1c109de
RH
3825 if (r_type != R_ALPHA_LITERAL)
3826 {
3827 /* We complete everything except LITERAL in the first pass. */
3828 if (relax_pass != 0)
3829 continue;
3830 if (r_type == R_ALPHA_TLSLDM)
3831 {
3832 /* The symbol for a TLSLDM reloc is ignored. Collapse the
3833 reloc to the STN_UNDEF (0) symbol so that they all match. */
3834 r_symndx = STN_UNDEF;
3835 }
3836 else if (r_type != R_ALPHA_GOTDTPREL
3837 && r_type != R_ALPHA_GOTTPREL
3838 && r_type != R_ALPHA_TLSGD)
3839 continue;
a7519a3c
RH
3840 }
3841
3842 /* Get the value of the symbol referred to by the reloc. */
3843 if (r_symndx < symtab_hdr->sh_info)
3844 {
3845 /* A local symbol. */
3846 Elf_Internal_Sym *isym;
3847
3848 /* Read this BFD's local symbols. */
3849 if (isymbuf == NULL)
3850 {
3851 isymbuf = (Elf_Internal_Sym *) symtab_hdr->contents;
3852 if (isymbuf == NULL)
3853 isymbuf = bfd_elf_get_elf_syms (abfd, symtab_hdr,
3854 symtab_hdr->sh_info, 0,
3855 NULL, NULL, NULL);
3856 if (isymbuf == NULL)
3857 goto error_return;
3858 }
252b5132 3859
a7519a3c 3860 isym = isymbuf + r_symndx;
252b5132 3861
a7519a3c
RH
3862 /* Given the symbol for a TLSLDM reloc is ignored, this also
3863 means forcing the symbol value to the tp base. */
3864 if (r_type == R_ALPHA_TLSLDM)
3865 {
3866 info.tsec = bfd_abs_section_ptr;
3867 symval = alpha_get_tprel_base (info.link_info);
3868 }
3869 else
3870 {
3871 symval = isym->st_value;
3872 if (isym->st_shndx == SHN_UNDEF)
3873 continue;
3874 else if (isym->st_shndx == SHN_ABS)
3875 info.tsec = bfd_abs_section_ptr;
3876 else if (isym->st_shndx == SHN_COMMON)
3877 info.tsec = bfd_com_section_ptr;
3878 else
3879 info.tsec = bfd_section_from_elf_index (abfd, isym->st_shndx);
3880 }
252b5132 3881
a7519a3c
RH
3882 info.h = NULL;
3883 info.other = isym->st_other;
3884 if (local_got_entries)
3885 info.first_gotent = &local_got_entries[r_symndx];
3886 else
3887 {
3888 info.first_gotent = &info.gotent;
3889 info.gotent = NULL;
3890 }
252b5132 3891 }
a7519a3c
RH
3892 else
3893 {
3894 unsigned long indx;
3895 struct alpha_elf_link_hash_entry *h;
252b5132 3896
a7519a3c
RH
3897 indx = r_symndx - symtab_hdr->sh_info;
3898 h = alpha_elf_sym_hashes (abfd)[indx];
3899 BFD_ASSERT (h != NULL);
252b5132 3900
a7519a3c
RH
3901 while (h->root.root.type == bfd_link_hash_indirect
3902 || h->root.root.type == bfd_link_hash_warning)
3903 h = (struct alpha_elf_link_hash_entry *)h->root.root.u.i.link;
252b5132 3904
a7519a3c
RH
3905 /* If the symbol is undefined, we can't do anything with it. */
3906 if (h->root.root.type == bfd_link_hash_undefined)
3907 continue;
252b5132 3908
a7519a3c
RH
3909 /* If the symbol isn't defined in the current module,
3910 again we can't do anything. */
3911 if (h->root.root.type == bfd_link_hash_undefweak)
3912 {
3913 info.tsec = bfd_abs_section_ptr;
3914 symval = 0;
3915 }
3916 else if (!h->root.def_regular)
3917 {
3918 /* Except for TLSGD relocs, which can sometimes be
3919 relaxed to GOTTPREL relocs. */
3920 if (r_type != R_ALPHA_TLSGD)
3921 continue;
3922 info.tsec = bfd_abs_section_ptr;
3923 symval = 0;
3924 }
3925 else
3926 {
3927 info.tsec = h->root.root.u.def.section;
3928 symval = h->root.root.u.def.value;
3929 }
252b5132 3930
a7519a3c
RH
3931 info.h = h;
3932 info.other = h->root.other;
3933 info.first_gotent = &h->got_entries;
3934 }
252b5132 3935
a7519a3c
RH
3936 /* Search for the got entry to be used by this relocation. */
3937 for (gotent = *info.first_gotent; gotent ; gotent = gotent->next)
3938 if (gotent->gotobj == info.gotobj
3939 && gotent->reloc_type == r_type
3940 && gotent->addend == irel->r_addend)
3941 break;
3942 info.gotent = gotent;
252b5132 3943
a7519a3c
RH
3944 symval += info.tsec->output_section->vma + info.tsec->output_offset;
3945 symval += irel->r_addend;
252b5132 3946
a7519a3c 3947 switch (r_type)
252b5132 3948 {
a7519a3c
RH
3949 case R_ALPHA_LITERAL:
3950 BFD_ASSERT(info.gotent != NULL);
252b5132 3951
a7519a3c
RH
3952 /* If there exist LITUSE relocations immediately following, this
3953 opens up all sorts of interesting optimizations, because we
3954 now know every location that this address load is used. */
3955 if (irel+1 < irelend
3956 && ELF64_R_TYPE (irel[1].r_info) == R_ALPHA_LITUSE)
252b5132 3957 {
a7519a3c
RH
3958 if (!elf64_alpha_relax_with_lituse (&info, symval, irel))
3959 goto error_return;
252b5132 3960 }
a7519a3c
RH
3961 else
3962 {
3963 if (!elf64_alpha_relax_got_load (&info, symval, irel, r_type))
3964 goto error_return;
3965 }
3966 break;
252b5132 3967
a7519a3c
RH
3968 case R_ALPHA_GOTDTPREL:
3969 case R_ALPHA_GOTTPREL:
3970 BFD_ASSERT(info.gotent != NULL);
3971 if (!elf64_alpha_relax_got_load (&info, symval, irel, r_type))
3972 goto error_return;
3973 break;
3974
3975 case R_ALPHA_TLSGD:
3976 case R_ALPHA_TLSLDM:
3977 BFD_ASSERT(info.gotent != NULL);
3978 if (!elf64_alpha_relax_tls_get_addr (&info, symval, irel,
3979 r_type == R_ALPHA_TLSGD))
3980 goto error_return;
3981 break;
252b5132
RH
3982 }
3983 }
3984
a7519a3c
RH
3985 if (isymbuf != NULL
3986 && symtab_hdr->contents != (unsigned char *) isymbuf)
3987 {
3988 if (!link_info->keep_memory)
3989 free (isymbuf);
3990 else
252b5132 3991 {
a7519a3c
RH
3992 /* Cache the symbols for elf_link_input_bfd. */
3993 symtab_hdr->contents = (unsigned char *) isymbuf;
252b5132 3994 }
a7519a3c 3995 }
252b5132 3996
a7519a3c
RH
3997 if (info.contents != NULL
3998 && elf_section_data (sec)->this_hdr.contents != info.contents)
3999 {
4000 if (!info.changed_contents && !link_info->keep_memory)
4001 free (info.contents);
4002 else
252b5132 4003 {
a7519a3c
RH
4004 /* Cache the section contents for elf_link_input_bfd. */
4005 elf_section_data (sec)->this_hdr.contents = info.contents;
252b5132 4006 }
a7519a3c 4007 }
252b5132 4008
a7519a3c
RH
4009 if (elf_section_data (sec)->relocs != internal_relocs)
4010 {
4011 if (!info.changed_relocs)
4012 free (internal_relocs);
4013 else
4014 elf_section_data (sec)->relocs = internal_relocs;
252b5132 4015 }
a7519a3c
RH
4016
4017 *again = info.changed_contents || info.changed_relocs;
252b5132 4018
b34976b6 4019 return TRUE;
252b5132 4020
a7519a3c
RH
4021 error_return:
4022 if (isymbuf != NULL
4023 && symtab_hdr->contents != (unsigned char *) isymbuf)
4024 free (isymbuf);
4025 if (info.contents != NULL
4026 && elf_section_data (sec)->this_hdr.contents != info.contents)
4027 free (info.contents);
4028 if (internal_relocs != NULL
4029 && elf_section_data (sec)->relocs != internal_relocs)
4030 free (internal_relocs);
4031 return FALSE;
4032}
4033\f
1bbc9cec
RH
4034/* Emit a dynamic relocation for (DYNINDX, RTYPE, ADDEND) at (SEC, OFFSET)
4035 into the next available slot in SREL. */
4036
4037static void
a7519a3c
RH
4038elf64_alpha_emit_dynrel (bfd *abfd, struct bfd_link_info *info,
4039 asection *sec, asection *srel, bfd_vma offset,
4040 long dynindx, long rtype, bfd_vma addend)
1bbc9cec
RH
4041{
4042 Elf_Internal_Rela outrel;
4043 bfd_byte *loc;
4044
4045 BFD_ASSERT (srel != NULL);
4046
4047 outrel.r_info = ELF64_R_INFO (dynindx, rtype);
4048 outrel.r_addend = addend;
4049
4050 offset = _bfd_elf_section_offset (abfd, info, sec, offset);
4051 if ((offset | 1) != (bfd_vma) -1)
4052 outrel.r_offset = sec->output_section->vma + sec->output_offset + offset;
4053 else
4054 memset (&outrel, 0, sizeof (outrel));
4055
4056 loc = srel->contents;
4057 loc += srel->reloc_count++ * sizeof (Elf64_External_Rela);
4058 bfd_elf64_swap_reloca_out (abfd, &outrel, loc);
eea6121a 4059 BFD_ASSERT (sizeof (Elf64_External_Rela) * srel->reloc_count <= srel->size);
1bbc9cec
RH
4060}
4061
4a67a098
RH
4062/* Relocate an Alpha ELF section for a relocatable link.
4063
4064 We don't have to change anything unless the reloc is against a section
4065 symbol, in which case we have to adjust according to where the section
4066 symbol winds up in the output section. */
4067
b34976b6 4068static bfd_boolean
a7519a3c
RH
4069elf64_alpha_relocate_section_r (bfd *output_bfd ATTRIBUTE_UNUSED,
4070 struct bfd_link_info *info ATTRIBUTE_UNUSED,
4071 bfd *input_bfd, asection *input_section,
4072 bfd_byte *contents ATTRIBUTE_UNUSED,
4073 Elf_Internal_Rela *relocs,
4074 Elf_Internal_Sym *local_syms,
4075 asection **local_sections)
4a67a098
RH
4076{
4077 unsigned long symtab_hdr_sh_info;
4078 Elf_Internal_Rela *rel;
4079 Elf_Internal_Rela *relend;
ab96bf03 4080 struct elf_link_hash_entry **sym_hashes;
b34976b6 4081 bfd_boolean ret_val = TRUE;
4a67a098 4082
0ffa91dd 4083 symtab_hdr_sh_info = elf_symtab_hdr (input_bfd).sh_info;
ab96bf03 4084 sym_hashes = elf_sym_hashes (input_bfd);
4a67a098
RH
4085
4086 relend = relocs + input_section->reloc_count;
4087 for (rel = relocs; rel < relend; rel++)
4088 {
4089 unsigned long r_symndx;
4090 Elf_Internal_Sym *sym;
4091 asection *sec;
4092 unsigned long r_type;
4093
ab96bf03 4094 r_type = ELF64_R_TYPE (rel->r_info);
4a67a098
RH
4095 if (r_type >= R_ALPHA_max)
4096 {
4eca0228 4097 _bfd_error_handler
695344c0 4098 /* xgettext:c-format */
d003868e
AM
4099 (_("%B: unknown relocation type %d"),
4100 input_bfd, (int) r_type);
4a67a098 4101 bfd_set_error (bfd_error_bad_value);
b34976b6 4102 ret_val = FALSE;
4a67a098
RH
4103 continue;
4104 }
4105
4a67a098
RH
4106 /* The symbol associated with GPDISP and LITUSE is
4107 immaterial. Only the addend is significant. */
4108 if (r_type == R_ALPHA_GPDISP || r_type == R_ALPHA_LITUSE)
4109 continue;
4110
ab96bf03 4111 r_symndx = ELF64_R_SYM (rel->r_info);
4a67a098
RH
4112 if (r_symndx < symtab_hdr_sh_info)
4113 {
4114 sym = local_syms + r_symndx;
ab96bf03 4115 sec = local_sections[r_symndx];
4a67a098 4116 }
ab96bf03
AM
4117 else
4118 {
4119 struct elf_link_hash_entry *h;
4120
4121 h = sym_hashes[r_symndx - symtab_hdr_sh_info];
4122
4123 while (h->root.type == bfd_link_hash_indirect
4124 || h->root.type == bfd_link_hash_warning)
4125 h = (struct elf_link_hash_entry *) h->root.u.i.link;
4126
4127 if (h->root.type != bfd_link_hash_defined
4128 && h->root.type != bfd_link_hash_defweak)
4129 continue;
4130
4131 sym = NULL;
4132 sec = h->root.u.def.section;
4133 }
4134
dbaa2011 4135 if (sec != NULL && discarded_section (sec))
e4067dbb 4136 RELOC_AGAINST_DISCARDED_SECTION (info, input_bfd, input_section,
545fd46b
MR
4137 rel, 1, relend,
4138 elf64_alpha_howto_table + r_type, 0,
e4067dbb 4139 contents);
ab96bf03
AM
4140
4141 if (sym != NULL && ELF_ST_TYPE (sym->st_info) == STT_SECTION)
4142 rel->r_addend += sec->output_offset;
4a67a098
RH
4143 }
4144
4145 return ret_val;
4146}
4147
252b5132
RH
4148/* Relocate an Alpha ELF section. */
4149
b34976b6 4150static bfd_boolean
a7519a3c
RH
4151elf64_alpha_relocate_section (bfd *output_bfd, struct bfd_link_info *info,
4152 bfd *input_bfd, asection *input_section,
4153 bfd_byte *contents, Elf_Internal_Rela *relocs,
4154 Elf_Internal_Sym *local_syms,
4155 asection **local_sections)
252b5132 4156{
4a67a098 4157 Elf_Internal_Shdr *symtab_hdr;
252b5132
RH
4158 Elf_Internal_Rela *rel;
4159 Elf_Internal_Rela *relend;
4a67a098
RH
4160 asection *sgot, *srel, *srelgot;
4161 bfd *dynobj, *gotobj;
4162 bfd_vma gp, tp_base, dtp_base;
4163 struct alpha_elf_got_entry **local_got_entries;
b34976b6 4164 bfd_boolean ret_val;
252b5132 4165
0ffa91dd 4166 BFD_ASSERT (is_alpha_elf (input_bfd));
68ffbac6 4167
4a67a098 4168 /* Handle relocatable links with a smaller loop. */
0e1862bb 4169 if (bfd_link_relocatable (info))
4a67a098
RH
4170 return elf64_alpha_relocate_section_r (output_bfd, info, input_bfd,
4171 input_section, contents, relocs,
4172 local_syms, local_sections);
4173
4174 /* This is a final link. */
4175
b34976b6 4176 ret_val = TRUE;
252b5132 4177
0ffa91dd 4178 symtab_hdr = &elf_symtab_hdr (input_bfd);
3765b1be 4179
4a67a098 4180 dynobj = elf_hash_table (info)->dynobj;
ce558b89 4181 srelgot = elf_hash_table (info)->srelgot;
4a67a098 4182
3241278a
RH
4183 if (input_section->flags & SEC_ALLOC)
4184 {
4185 const char *section_name;
4186 section_name = (bfd_elf_string_from_elf_section
4187 (input_bfd, elf_elfheader(input_bfd)->e_shstrndx,
d4730f92 4188 _bfd_elf_single_rel_hdr (input_section)->sh_name));
3241278a 4189 BFD_ASSERT(section_name != NULL);
3d4d4302 4190 srel = bfd_get_linker_section (dynobj, section_name);
3241278a
RH
4191 }
4192 else
4193 srel = NULL;
3765b1be 4194
4a67a098
RH
4195 /* Find the gp value for this input bfd. */
4196 gotobj = alpha_elf_tdata (input_bfd)->gotobj;
4197 if (gotobj)
4198 {
4199 sgot = alpha_elf_tdata (gotobj)->got;
4200 gp = _bfd_get_gp_value (gotobj);
4201 if (gp == 0)
252b5132 4202 {
4a67a098
RH
4203 gp = (sgot->output_section->vma
4204 + sgot->output_offset
4205 + 0x8000);
4206 _bfd_set_gp_value (gotobj, gp);
4207 }
4208 }
4209 else
4210 {
4211 sgot = NULL;
4212 gp = 0;
4213 }
3765b1be 4214
4a67a098
RH
4215 local_got_entries = alpha_elf_tdata(input_bfd)->local_got_entries;
4216
e1918d23 4217 if (elf_hash_table (info)->tls_sec != NULL)
4a67a098 4218 {
e1918d23
AM
4219 dtp_base = alpha_get_dtprel_base (info);
4220 tp_base = alpha_get_tprel_base (info);
252b5132 4221 }
4a67a098
RH
4222 else
4223 dtp_base = tp_base = 0;
252b5132 4224
252b5132 4225 relend = relocs + input_section->reloc_count;
4a67a098 4226 for (rel = relocs; rel < relend; rel++)
252b5132 4227 {
4a67a098 4228 struct alpha_elf_link_hash_entry *h = NULL;
3765b1be
RH
4229 struct alpha_elf_got_entry *gotent;
4230 bfd_reloc_status_type r;
252b5132
RH
4231 reloc_howto_type *howto;
4232 unsigned long r_symndx;
4a67a098
RH
4233 Elf_Internal_Sym *sym = NULL;
4234 asection *sec = NULL;
3765b1be 4235 bfd_vma value;
dc810e39 4236 bfd_vma addend;
b34976b6 4237 bfd_boolean dynamic_symbol_p;
1d5316ab 4238 bfd_boolean unresolved_reloc = FALSE;
b34976b6 4239 bfd_boolean undef_weak_ref = FALSE;
3765b1be 4240 unsigned long r_type;
252b5132
RH
4241
4242 r_type = ELF64_R_TYPE(rel->r_info);
3765b1be 4243 if (r_type >= R_ALPHA_max)
252b5132 4244 {
4eca0228 4245 _bfd_error_handler
695344c0 4246 /* xgettext:c-format */
d003868e
AM
4247 (_("%B: unknown relocation type %d"),
4248 input_bfd, (int) r_type);
252b5132 4249 bfd_set_error (bfd_error_bad_value);
b34976b6 4250 ret_val = FALSE;
3765b1be 4251 continue;
252b5132 4252 }
252b5132 4253
3765b1be 4254 howto = elf64_alpha_howto_table + r_type;
252b5132
RH
4255 r_symndx = ELF64_R_SYM(rel->r_info);
4256
cc03ec80 4257 /* The symbol for a TLSLDM reloc is ignored. Collapse the
cf35638d 4258 reloc to the STN_UNDEF (0) symbol so that they all match. */
cc03ec80 4259 if (r_type == R_ALPHA_TLSLDM)
cf35638d 4260 r_symndx = STN_UNDEF;
cc03ec80 4261
252b5132
RH
4262 if (r_symndx < symtab_hdr->sh_info)
4263 {
8517fae7 4264 asection *msec;
252b5132
RH
4265 sym = local_syms + r_symndx;
4266 sec = local_sections[r_symndx];
8517fae7
AM
4267 msec = sec;
4268 value = _bfd_elf_rela_local_sym (output_bfd, sym, &msec, rel);
3765b1be 4269
cf35638d 4270 /* If this is a tp-relative relocation against sym STN_UNDEF (0),
cc03ec80 4271 this is hackery from relax_section. Force the value to
f915360b 4272 be the tls module base. */
cf35638d 4273 if (r_symndx == STN_UNDEF
cc03ec80
RH
4274 && (r_type == R_ALPHA_TLSLDM
4275 || r_type == R_ALPHA_GOTTPREL
4276 || r_type == R_ALPHA_TPREL64
4277 || r_type == R_ALPHA_TPRELHI
4278 || r_type == R_ALPHA_TPRELLO
4279 || r_type == R_ALPHA_TPREL16))
f915360b 4280 value = dtp_base;
cc03ec80 4281
4a67a098
RH
4282 if (local_got_entries)
4283 gotent = local_got_entries[r_symndx];
4284 else
4285 gotent = NULL;
3765b1be
RH
4286
4287 /* Need to adjust local GOT entries' addends for SEC_MERGE
4288 unless it has been done already. */
4289 if ((sec->flags & SEC_MERGE)
048d873d 4290 && ELF_ST_TYPE (sym->st_info) == STT_SECTION
dbaa2011 4291 && sec->sec_info_type == SEC_INFO_TYPE_MERGE
048d873d
RH
4292 && gotent
4293 && !gotent->reloc_xlated)
3765b1be
RH
4294 {
4295 struct alpha_elf_got_entry *ent;
3765b1be
RH
4296
4297 for (ent = gotent; ent; ent = ent->next)
4298 {
4299 ent->reloc_xlated = 1;
4300 if (ent->use_count == 0)
4301 continue;
4302 msec = sec;
4303 ent->addend =
4304 _bfd_merged_section_offset (output_bfd, &msec,
4305 elf_section_data (sec)->
4306 sec_info,
753731ee 4307 sym->st_value + ent->addend);
3765b1be
RH
4308 ent->addend -= sym->st_value;
4309 ent->addend += msec->output_section->vma
4310 + msec->output_offset
4311 - sec->output_section->vma
4312 - sec->output_offset;
4313 }
4314 }
4315
b34976b6 4316 dynamic_symbol_p = FALSE;
252b5132
RH
4317 }
4318 else
4319 {
62d887d4 4320 bfd_boolean warned, ignored;
560e09e9 4321 struct elf_link_hash_entry *hh;
b2a8e766
AM
4322 struct elf_link_hash_entry **sym_hashes = elf_sym_hashes (input_bfd);
4323
4324 RELOC_FOR_GLOBAL_SYMBOL (info, input_bfd, input_section, rel,
4325 r_symndx, symtab_hdr, sym_hashes,
4326 hh, sec, value,
62d887d4 4327 unresolved_reloc, warned, ignored);
560e09e9
NC
4328
4329 if (warned)
4330 continue;
252b5132 4331
560e09e9
NC
4332 if (value == 0
4333 && ! unresolved_reloc
4334 && hh->root.type == bfd_link_hash_undefweak)
b34976b6 4335 undef_weak_ref = TRUE;
3765b1be 4336
560e09e9 4337 h = (struct alpha_elf_link_hash_entry *) hh;
3765b1be
RH
4338 dynamic_symbol_p = alpha_elf_dynamic_symbol_p (&h->root, info);
4339 gotent = h->got_entries;
252b5132 4340 }
3765b1be 4341
dbaa2011 4342 if (sec != NULL && discarded_section (sec))
e4067dbb 4343 RELOC_AGAINST_DISCARDED_SECTION (info, input_bfd, input_section,
545fd46b 4344 rel, 1, relend, howto, 0, contents);
ab96bf03 4345
252b5132 4346 addend = rel->r_addend;
3765b1be
RH
4347 value += addend;
4348
4349 /* Search for the proper got entry. */
4350 for (; gotent ; gotent = gotent->next)
4351 if (gotent->gotobj == gotobj
4352 && gotent->reloc_type == r_type
4353 && gotent->addend == addend)
4354 break;
252b5132
RH
4355
4356 switch (r_type)
4357 {
4358 case R_ALPHA_GPDISP:
4359 {
4360 bfd_byte *p_ldah, *p_lda;
4361
4362 BFD_ASSERT(gp != 0);
4363
3765b1be
RH
4364 value = (input_section->output_section->vma
4365 + input_section->output_offset
4366 + rel->r_offset);
252b5132 4367
3765b1be 4368 p_ldah = contents + rel->r_offset;
252b5132
RH
4369 p_lda = p_ldah + rel->r_addend;
4370
3765b1be 4371 r = elf64_alpha_do_reloc_gpdisp (input_bfd, gp - value,
252b5132
RH
4372 p_ldah, p_lda);
4373 }
4374 break;
4375
252b5132 4376 case R_ALPHA_LITERAL:
3765b1be
RH
4377 BFD_ASSERT(sgot != NULL);
4378 BFD_ASSERT(gp != 0);
4379 BFD_ASSERT(gotent != NULL);
4380 BFD_ASSERT(gotent->use_count >= 1);
f7460f5f 4381
3765b1be
RH
4382 if (!gotent->reloc_done)
4383 {
4384 gotent->reloc_done = 1;
252b5132 4385
3765b1be
RH
4386 bfd_put_64 (output_bfd, value,
4387 sgot->contents + gotent->got_offset);
252b5132 4388
3765b1be
RH
4389 /* If the symbol has been forced local, output a
4390 RELATIVE reloc, otherwise it will be handled in
4391 finish_dynamic_symbol. */
0e1862bb
L
4392 if (bfd_link_pic (info)
4393 && !dynamic_symbol_p
4394 && !undef_weak_ref)
1bbc9cec
RH
4395 elf64_alpha_emit_dynrel (output_bfd, info, sgot, srelgot,
4396 gotent->got_offset, 0,
4397 R_ALPHA_RELATIVE, value);
3765b1be 4398 }
252b5132 4399
3765b1be
RH
4400 value = (sgot->output_section->vma
4401 + sgot->output_offset
4402 + gotent->got_offset);
4403 value -= gp;
252b5132
RH
4404 goto default_reloc;
4405
4406 case R_ALPHA_GPREL32:
ec1659c8 4407 case R_ALPHA_GPREL16:
252b5132 4408 case R_ALPHA_GPRELLOW:
3765b1be 4409 if (dynamic_symbol_p)
f16fbd61 4410 {
4eca0228 4411 _bfd_error_handler
695344c0 4412 /* xgettext:c-format */
d003868e
AM
4413 (_("%B: gp-relative relocation against dynamic symbol %s"),
4414 input_bfd, h->root.root.root.string);
b34976b6 4415 ret_val = FALSE;
f16fbd61 4416 }
252b5132 4417 BFD_ASSERT(gp != 0);
3765b1be 4418 value -= gp;
252b5132
RH
4419 goto default_reloc;
4420
4421 case R_ALPHA_GPRELHIGH:
3765b1be 4422 if (dynamic_symbol_p)
f16fbd61 4423 {
4eca0228 4424 _bfd_error_handler
695344c0 4425 /* xgettext:c-format */
d003868e
AM
4426 (_("%B: gp-relative relocation against dynamic symbol %s"),
4427 input_bfd, h->root.root.root.string);
b34976b6 4428 ret_val = FALSE;
f16fbd61 4429 }
252b5132 4430 BFD_ASSERT(gp != 0);
3765b1be
RH
4431 value -= gp;
4432 value = ((bfd_signed_vma) value >> 16) + ((value >> 15) & 1);
252b5132
RH
4433 goto default_reloc;
4434
252b5132 4435 case R_ALPHA_HINT:
f94952df
RH
4436 /* A call to a dynamic symbol is definitely out of range of
4437 the 16-bit displacement. Don't bother writing anything. */
3765b1be 4438 if (dynamic_symbol_p)
f94952df
RH
4439 {
4440 r = bfd_reloc_ok;
4441 break;
4442 }
3765b1be
RH
4443 /* The regular PC-relative stuff measures from the start of
4444 the instruction rather than the end. */
4445 value -= 4;
4446 goto default_reloc;
f94952df
RH
4447
4448 case R_ALPHA_BRADDR:
3765b1be
RH
4449 if (dynamic_symbol_p)
4450 {
4eca0228 4451 _bfd_error_handler
695344c0 4452 /* xgettext:c-format */
d003868e
AM
4453 (_("%B: pc-relative relocation against dynamic symbol %s"),
4454 input_bfd, h->root.root.root.string);
b34976b6 4455 ret_val = FALSE;
3765b1be 4456 }
252b5132
RH
4457 /* The regular PC-relative stuff measures from the start of
4458 the instruction rather than the end. */
3765b1be 4459 value -= 4;
252b5132
RH
4460 goto default_reloc;
4461
7793f4d0
RH
4462 case R_ALPHA_BRSGP:
4463 {
4464 int other;
4465 const char *name;
4466
4467 /* The regular PC-relative stuff measures from the start of
4468 the instruction rather than the end. */
3765b1be 4469 value -= 4;
7793f4d0 4470
ccf00ab6
RH
4471 /* The source and destination gp must be the same. Note that
4472 the source will always have an assigned gp, since we forced
4473 one in check_relocs, but that the destination may not, as
cedb70c5 4474 it might not have had any relocations at all. Also take
ccf00ab6
RH
4475 care not to crash if H is an undefined symbol. */
4476 if (h != NULL && sec != NULL
4477 && alpha_elf_tdata (sec->owner)->gotobj
7793f4d0
RH
4478 && gotobj != alpha_elf_tdata (sec->owner)->gotobj)
4479 {
4eca0228 4480 _bfd_error_handler
695344c0 4481 /* xgettext:c-format */
d003868e
AM
4482 (_("%B: change in gp: BRSGP %s"),
4483 input_bfd, h->root.root.root.string);
b34976b6 4484 ret_val = FALSE;
7793f4d0
RH
4485 }
4486
4487 /* The symbol should be marked either NOPV or STD_GPLOAD. */
4488 if (h != NULL)
4489 other = h->root.other;
4490 else
4491 other = sym->st_other;
4492 switch (other & STO_ALPHA_STD_GPLOAD)
4493 {
4494 case STO_ALPHA_NOPV:
4495 break;
4496 case STO_ALPHA_STD_GPLOAD:
64e04ecd 4497 value += 8;
7793f4d0
RH
4498 break;
4499 default:
4500 if (h != NULL)
4501 name = h->root.root.root.string;
4502 else
4503 {
4504 name = (bfd_elf_string_from_elf_section
4505 (input_bfd, symtab_hdr->sh_link, sym->st_name));
4506 if (name == NULL)
4507 name = _("<unknown>");
4508 else if (name[0] == 0)
4509 name = bfd_section_name (input_bfd, sec);
4510 }
4eca0228 4511 _bfd_error_handler
695344c0 4512 /* xgettext:c-format */
d003868e
AM
4513 (_("%B: !samegp reloc against symbol without .prologue: %s"),
4514 input_bfd, name);
b34976b6 4515 ret_val = FALSE;
7793f4d0
RH
4516 break;
4517 }
4518
4519 goto default_reloc;
4520 }
4521
252b5132
RH
4522 case R_ALPHA_REFLONG:
4523 case R_ALPHA_REFQUAD:
3765b1be
RH
4524 case R_ALPHA_DTPREL64:
4525 case R_ALPHA_TPREL64:
252b5132 4526 {
1bbc9cec
RH
4527 long dynindx, dyntype = r_type;
4528 bfd_vma dynaddend;
252b5132
RH
4529
4530 /* Careful here to remember RELATIVE relocations for global
4531 variables for symbolic shared objects. */
4532
3765b1be 4533 if (dynamic_symbol_p)
252b5132
RH
4534 {
4535 BFD_ASSERT(h->root.dynindx != -1);
1bbc9cec
RH
4536 dynindx = h->root.dynindx;
4537 dynaddend = addend;
3765b1be
RH
4538 addend = 0, value = 0;
4539 }
4540 else if (r_type == R_ALPHA_DTPREL64)
4541 {
e1918d23 4542 BFD_ASSERT (elf_hash_table (info)->tls_sec != NULL);
3765b1be
RH
4543 value -= dtp_base;
4544 goto default_reloc;
4545 }
4546 else if (r_type == R_ALPHA_TPREL64)
4547 {
e1918d23 4548 BFD_ASSERT (elf_hash_table (info)->tls_sec != NULL);
3cbc1e5e 4549 if (!bfd_link_dll (info))
1bbc9cec
RH
4550 {
4551 value -= tp_base;
4552 goto default_reloc;
4553 }
4554 dynindx = 0;
4555 dynaddend = value - dtp_base;
252b5132 4556 }
0e1862bb 4557 else if (bfd_link_pic (info)
cf35638d 4558 && r_symndx != STN_UNDEF
d6ad34f6 4559 && (input_section->flags & SEC_ALLOC)
1d5316ab
AM
4560 && !undef_weak_ref
4561 && !(unresolved_reloc
4562 && (_bfd_elf_section_offset (output_bfd, info,
4563 input_section,
4564 rel->r_offset)
4565 == (bfd_vma) -1)))
252b5132 4566 {
3765b1be
RH
4567 if (r_type == R_ALPHA_REFLONG)
4568 {
4eca0228 4569 _bfd_error_handler
695344c0 4570 /* xgettext:c-format */
d003868e
AM
4571 (_("%B: unhandled dynamic relocation against %s"),
4572 input_bfd,
3765b1be 4573 h->root.root.root.string);
b34976b6 4574 ret_val = FALSE;
3765b1be 4575 }
1bbc9cec
RH
4576 dynindx = 0;
4577 dyntype = R_ALPHA_RELATIVE;
4578 dynaddend = value;
252b5132
RH
4579 }
4580 else
4581 goto default_reloc;
4582
3241278a
RH
4583 if (input_section->flags & SEC_ALLOC)
4584 elf64_alpha_emit_dynrel (output_bfd, info, input_section,
4585 srel, rel->r_offset, dynindx,
4586 dyntype, dynaddend);
252b5132
RH
4587 }
4588 goto default_reloc;
4589
3765b1be 4590 case R_ALPHA_SREL16:
84de6048
RH
4591 case R_ALPHA_SREL32:
4592 case R_ALPHA_SREL64:
3765b1be
RH
4593 if (dynamic_symbol_p)
4594 {
4eca0228 4595 _bfd_error_handler
695344c0 4596 /* xgettext:c-format */
d003868e
AM
4597 (_("%B: pc-relative relocation against dynamic symbol %s"),
4598 input_bfd, h->root.root.root.string);
b34976b6 4599 ret_val = FALSE;
3765b1be 4600 }
3cbc1e5e 4601 else if (bfd_link_pic (info)
0e1862bb 4602 && undef_weak_ref)
d6ad34f6 4603 {
4eca0228 4604 _bfd_error_handler
695344c0 4605 /* xgettext:c-format */
d6ad34f6
RH
4606 (_("%B: pc-relative relocation against undefined weak symbol %s"),
4607 input_bfd, h->root.root.root.string);
4608 ret_val = FALSE;
4609 }
4610
3765b1be 4611
84de6048
RH
4612 /* ??? .eh_frame references to discarded sections will be smashed
4613 to relocations against SHN_UNDEF. The .eh_frame format allows
4614 NULL to be encoded as 0 in any format, so this works here. */
1d5316ab
AM
4615 if (r_symndx == STN_UNDEF
4616 || (unresolved_reloc
4617 && _bfd_elf_section_offset (output_bfd, info,
4618 input_section,
4619 rel->r_offset) == (bfd_vma) -1))
84de6048
RH
4620 howto = (elf64_alpha_howto_table
4621 + (r_type - R_ALPHA_SREL32 + R_ALPHA_REFLONG));
4622 goto default_reloc;
4623
3765b1be
RH
4624 case R_ALPHA_TLSLDM:
4625 /* Ignore the symbol for the relocation. The result is always
4626 the current module. */
4627 dynamic_symbol_p = 0;
4628 /* FALLTHRU */
4629
4630 case R_ALPHA_TLSGD:
4631 if (!gotent->reloc_done)
4632 {
4633 gotent->reloc_done = 1;
4634
4635 /* Note that the module index for the main program is 1. */
0e1862bb
L
4636 bfd_put_64 (output_bfd,
4637 !bfd_link_pic (info) && !dynamic_symbol_p,
3765b1be
RH
4638 sgot->contents + gotent->got_offset);
4639
4640 /* If the symbol has been forced local, output a
4641 DTPMOD64 reloc, otherwise it will be handled in
4642 finish_dynamic_symbol. */
0e1862bb 4643 if (bfd_link_pic (info) && !dynamic_symbol_p)
1bbc9cec
RH
4644 elf64_alpha_emit_dynrel (output_bfd, info, sgot, srelgot,
4645 gotent->got_offset, 0,
4646 R_ALPHA_DTPMOD64, 0);
3765b1be
RH
4647
4648 if (dynamic_symbol_p || r_type == R_ALPHA_TLSLDM)
4649 value = 0;
4650 else
4651 {
e1918d23 4652 BFD_ASSERT (elf_hash_table (info)->tls_sec != NULL);
3765b1be
RH
4653 value -= dtp_base;
4654 }
4655 bfd_put_64 (output_bfd, value,
4656 sgot->contents + gotent->got_offset + 8);
4657 }
4658
4659 value = (sgot->output_section->vma
4660 + sgot->output_offset
4661 + gotent->got_offset);
4662 value -= gp;
4663 goto default_reloc;
4664
4665 case R_ALPHA_DTPRELHI:
4666 case R_ALPHA_DTPRELLO:
4667 case R_ALPHA_DTPREL16:
4668 if (dynamic_symbol_p)
4669 {
4eca0228 4670 _bfd_error_handler
695344c0 4671 /* xgettext:c-format */
d003868e
AM
4672 (_("%B: dtp-relative relocation against dynamic symbol %s"),
4673 input_bfd, h->root.root.root.string);
b34976b6 4674 ret_val = FALSE;
3765b1be 4675 }
e1918d23 4676 BFD_ASSERT (elf_hash_table (info)->tls_sec != NULL);
3765b1be 4677 value -= dtp_base;
9e756d64
RH
4678 if (r_type == R_ALPHA_DTPRELHI)
4679 value = ((bfd_signed_vma) value >> 16) + ((value >> 15) & 1);
3765b1be
RH
4680 goto default_reloc;
4681
4682 case R_ALPHA_TPRELHI:
4683 case R_ALPHA_TPRELLO:
4684 case R_ALPHA_TPREL16:
3cbc1e5e 4685 if (bfd_link_dll (info))
9e756d64 4686 {
4eca0228 4687 _bfd_error_handler
695344c0 4688 /* xgettext:c-format */
d003868e
AM
4689 (_("%B: TLS local exec code cannot be linked into shared objects"),
4690 input_bfd);
b34976b6 4691 ret_val = FALSE;
9e756d64
RH
4692 }
4693 else if (dynamic_symbol_p)
3765b1be 4694 {
4eca0228 4695 _bfd_error_handler
695344c0 4696 /* xgettext:c-format */
d003868e
AM
4697 (_("%B: tp-relative relocation against dynamic symbol %s"),
4698 input_bfd, h->root.root.root.string);
b34976b6 4699 ret_val = FALSE;
3765b1be 4700 }
e1918d23 4701 BFD_ASSERT (elf_hash_table (info)->tls_sec != NULL);
3765b1be 4702 value -= tp_base;
9e756d64
RH
4703 if (r_type == R_ALPHA_TPRELHI)
4704 value = ((bfd_signed_vma) value >> 16) + ((value >> 15) & 1);
3765b1be
RH
4705 goto default_reloc;
4706
4707 case R_ALPHA_GOTDTPREL:
4708 case R_ALPHA_GOTTPREL:
4709 BFD_ASSERT(sgot != NULL);
4710 BFD_ASSERT(gp != 0);
4711 BFD_ASSERT(gotent != NULL);
4712 BFD_ASSERT(gotent->use_count >= 1);
4713
4714 if (!gotent->reloc_done)
4715 {
4716 gotent->reloc_done = 1;
4717
4718 if (dynamic_symbol_p)
4719 value = 0;
4720 else
4721 {
e1918d23 4722 BFD_ASSERT (elf_hash_table (info)->tls_sec != NULL);
1bbc9cec
RH
4723 if (r_type == R_ALPHA_GOTDTPREL)
4724 value -= dtp_base;
0e1862bb 4725 else if (!bfd_link_pic (info))
1bbc9cec
RH
4726 value -= tp_base;
4727 else
4728 {
4729 elf64_alpha_emit_dynrel (output_bfd, info, sgot, srelgot,
4730 gotent->got_offset, 0,
4731 R_ALPHA_TPREL64,
4732 value - dtp_base);
4733 value = 0;
4734 }
3765b1be
RH
4735 }
4736 bfd_put_64 (output_bfd, value,
4737 sgot->contents + gotent->got_offset);
4738 }
4739
4740 value = (sgot->output_section->vma
4741 + sgot->output_offset
4742 + gotent->got_offset);
4743 value -= gp;
4744 goto default_reloc;
4745
252b5132
RH
4746 default:
4747 default_reloc:
4748 r = _bfd_final_link_relocate (howto, input_bfd, input_section,
3765b1be 4749 contents, rel->r_offset, value, 0);
252b5132
RH
4750 break;
4751 }
4752
4753 switch (r)
4754 {
4755 case bfd_reloc_ok:
4756 break;
4757
4758 case bfd_reloc_overflow:
4759 {
4760 const char *name;
4761
ed4de5e2
JJ
4762 /* Don't warn if the overflow is due to pc relative reloc
4763 against discarded section. Section optimization code should
4764 handle it. */
4765
4766 if (r_symndx < symtab_hdr->sh_info
4767 && sec != NULL && howto->pc_relative
dbaa2011 4768 && discarded_section (sec))
ed4de5e2
JJ
4769 break;
4770
252b5132 4771 if (h != NULL)
dfeffb9f 4772 name = NULL;
252b5132
RH
4773 else
4774 {
4775 name = (bfd_elf_string_from_elf_section
4776 (input_bfd, symtab_hdr->sh_link, sym->st_name));
4777 if (name == NULL)
b34976b6 4778 return FALSE;
252b5132
RH
4779 if (*name == '\0')
4780 name = bfd_section_name (input_bfd, sec);
4781 }
1a72702b
AM
4782 (*info->callbacks->reloc_overflow)
4783 (info, (h ? &h->root.root : NULL), name, howto->name,
4784 (bfd_vma) 0, input_bfd, input_section, rel->r_offset);
252b5132
RH
4785 }
4786 break;
4787
4788 default:
4789 case bfd_reloc_outofrange:
4790 abort ();
4791 }
4792 }
4793
f16fbd61 4794 return ret_val;
252b5132
RH
4795}
4796
4797/* Finish up dynamic symbol handling. We set the contents of various
4798 dynamic sections here. */
4799
b34976b6 4800static bfd_boolean
a7519a3c
RH
4801elf64_alpha_finish_dynamic_symbol (bfd *output_bfd, struct bfd_link_info *info,
4802 struct elf_link_hash_entry *h,
4803 Elf_Internal_Sym *sym)
252b5132 4804{
6ec7057a 4805 struct alpha_elf_link_hash_entry *ah = (struct alpha_elf_link_hash_entry *)h;
252b5132 4806
6ec7057a 4807 if (h->needs_plt)
252b5132
RH
4808 {
4809 /* Fill in the .plt entry for this symbol. */
4810 asection *splt, *sgot, *srel;
4811 Elf_Internal_Rela outrel;
947216bf 4812 bfd_byte *loc;
252b5132
RH
4813 bfd_vma got_addr, plt_addr;
4814 bfd_vma plt_index;
4815 struct alpha_elf_got_entry *gotent;
4816
4817 BFD_ASSERT (h->dynindx != -1);
4818
ce558b89 4819 splt = elf_hash_table (info)->splt;
252b5132 4820 BFD_ASSERT (splt != NULL);
ce558b89 4821 srel = elf_hash_table (info)->srelplt;
252b5132 4822 BFD_ASSERT (srel != NULL);
252b5132 4823
6ec7057a
RH
4824 for (gotent = ah->got_entries; gotent ; gotent = gotent->next)
4825 if (gotent->reloc_type == R_ALPHA_LITERAL
4826 && gotent->use_count > 0)
4827 {
4828 unsigned int insn;
4829 int disp;
252b5132 4830
6ec7057a
RH
4831 sgot = alpha_elf_tdata (gotent->gotobj)->got;
4832 BFD_ASSERT (sgot != NULL);
252b5132 4833
6ec7057a
RH
4834 BFD_ASSERT (gotent->got_offset != -1);
4835 BFD_ASSERT (gotent->plt_offset != -1);
252b5132 4836
6ec7057a
RH
4837 got_addr = (sgot->output_section->vma
4838 + sgot->output_offset
4839 + gotent->got_offset);
4840 plt_addr = (splt->output_section->vma
4841 + splt->output_offset
4842 + gotent->plt_offset);
252b5132 4843
6ec7057a 4844 plt_index = (gotent->plt_offset-PLT_HEADER_SIZE) / PLT_ENTRY_SIZE;
252b5132 4845
6ec7057a
RH
4846 /* Fill in the entry in the procedure linkage table. */
4847 if (elf64_alpha_use_secureplt)
4848 {
4849 disp = (PLT_HEADER_SIZE - 4) - (gotent->plt_offset + 4);
4850 insn = INSN_AD (INSN_BR, 31, disp);
4851 bfd_put_32 (output_bfd, insn,
4852 splt->contents + gotent->plt_offset);
252b5132 4853
6ec7057a
RH
4854 plt_index = ((gotent->plt_offset - NEW_PLT_HEADER_SIZE)
4855 / NEW_PLT_ENTRY_SIZE);
4856 }
4857 else
4858 {
4859 disp = -(gotent->plt_offset + 4);
4860 insn = INSN_AD (INSN_BR, 28, disp);
4861 bfd_put_32 (output_bfd, insn,
4862 splt->contents + gotent->plt_offset);
4863 bfd_put_32 (output_bfd, INSN_UNOP,
4864 splt->contents + gotent->plt_offset + 4);
4865 bfd_put_32 (output_bfd, INSN_UNOP,
4866 splt->contents + gotent->plt_offset + 8);
4867
4868 plt_index = ((gotent->plt_offset - OLD_PLT_HEADER_SIZE)
4869 / OLD_PLT_ENTRY_SIZE);
4870 }
252b5132 4871
6ec7057a
RH
4872 /* Fill in the entry in the .rela.plt section. */
4873 outrel.r_offset = got_addr;
4874 outrel.r_info = ELF64_R_INFO(h->dynindx, R_ALPHA_JMP_SLOT);
4875 outrel.r_addend = 0;
252b5132 4876
6ec7057a
RH
4877 loc = srel->contents + plt_index * sizeof (Elf64_External_Rela);
4878 bfd_elf64_swap_reloca_out (output_bfd, &outrel, loc);
252b5132 4879
6ec7057a
RH
4880 /* Fill in the entry in the .got. */
4881 bfd_put_64 (output_bfd, plt_addr,
4882 sgot->contents + gotent->got_offset);
4883 }
252b5132
RH
4884 }
4885 else if (alpha_elf_dynamic_symbol_p (h, info))
4886 {
4887 /* Fill in the dynamic relocations for this symbol's .got entries. */
4888 asection *srel;
252b5132
RH
4889 struct alpha_elf_got_entry *gotent;
4890
ce558b89 4891 srel = elf_hash_table (info)->srelgot;
252b5132
RH
4892 BFD_ASSERT (srel != NULL);
4893
252b5132
RH
4894 for (gotent = ((struct alpha_elf_link_hash_entry *) h)->got_entries;
4895 gotent != NULL;
4896 gotent = gotent->next)
4897 {
f44f99a5 4898 asection *sgot;
1bbc9cec 4899 long r_type;
3765b1be 4900
f44f99a5
RH
4901 if (gotent->use_count == 0)
4902 continue;
4903
4904 sgot = alpha_elf_tdata (gotent->gotobj)->got;
3765b1be
RH
4905
4906 r_type = gotent->reloc_type;
4907 switch (r_type)
4908 {
4909 case R_ALPHA_LITERAL:
4910 r_type = R_ALPHA_GLOB_DAT;
4911 break;
4912 case R_ALPHA_TLSGD:
4913 r_type = R_ALPHA_DTPMOD64;
4914 break;
4915 case R_ALPHA_GOTDTPREL:
4916 r_type = R_ALPHA_DTPREL64;
4917 break;
4918 case R_ALPHA_GOTTPREL:
4919 r_type = R_ALPHA_TPREL64;
4920 break;
4921 case R_ALPHA_TLSLDM:
4922 default:
4923 abort ();
4924 }
4925
68ffbac6 4926 elf64_alpha_emit_dynrel (output_bfd, info, sgot, srel,
1bbc9cec
RH
4927 gotent->got_offset, h->dynindx,
4928 r_type, gotent->addend);
3765b1be
RH
4929
4930 if (gotent->reloc_type == R_ALPHA_TLSGD)
68ffbac6 4931 elf64_alpha_emit_dynrel (output_bfd, info, sgot, srel,
1bbc9cec
RH
4932 gotent->got_offset + 8, h->dynindx,
4933 R_ALPHA_DTPREL64, gotent->addend);
252b5132
RH
4934 }
4935 }
4936
4937 /* Mark some specially defined symbols as absolute. */
9637f6ef 4938 if (h == elf_hash_table (info)->hdynamic
22edb2f1
RS
4939 || h == elf_hash_table (info)->hgot
4940 || h == elf_hash_table (info)->hplt)
252b5132
RH
4941 sym->st_shndx = SHN_ABS;
4942
b34976b6 4943 return TRUE;
252b5132
RH
4944}
4945
4946/* Finish up the dynamic sections. */
4947
b34976b6 4948static bfd_boolean
a7519a3c
RH
4949elf64_alpha_finish_dynamic_sections (bfd *output_bfd,
4950 struct bfd_link_info *info)
252b5132
RH
4951{
4952 bfd *dynobj;
4953 asection *sdyn;
4954
4955 dynobj = elf_hash_table (info)->dynobj;
3d4d4302 4956 sdyn = bfd_get_linker_section (dynobj, ".dynamic");
252b5132
RH
4957
4958 if (elf_hash_table (info)->dynamic_sections_created)
4959 {
6ec7057a 4960 asection *splt, *sgotplt, *srelaplt;
252b5132 4961 Elf64_External_Dyn *dyncon, *dynconend;
6ec7057a 4962 bfd_vma plt_vma, gotplt_vma;
252b5132 4963
ce558b89
AM
4964 splt = elf_hash_table (info)->splt;
4965 srelaplt = elf_hash_table (info)->srelplt;
252b5132
RH
4966 BFD_ASSERT (splt != NULL && sdyn != NULL);
4967
6ec7057a
RH
4968 plt_vma = splt->output_section->vma + splt->output_offset;
4969
4970 gotplt_vma = 0;
4971 if (elf64_alpha_use_secureplt)
4972 {
ce558b89 4973 sgotplt = elf_hash_table (info)->sgotplt;
6ec7057a
RH
4974 BFD_ASSERT (sgotplt != NULL);
4975 if (sgotplt->size > 0)
4976 gotplt_vma = sgotplt->output_section->vma + sgotplt->output_offset;
4977 }
4978
252b5132 4979 dyncon = (Elf64_External_Dyn *) sdyn->contents;
eea6121a 4980 dynconend = (Elf64_External_Dyn *) (sdyn->contents + sdyn->size);
252b5132
RH
4981 for (; dyncon < dynconend; dyncon++)
4982 {
4983 Elf_Internal_Dyn dyn;
252b5132
RH
4984
4985 bfd_elf64_swap_dyn_in (dynobj, dyncon, &dyn);
4986
4987 switch (dyn.d_tag)
4988 {
4989 case DT_PLTGOT:
6ec7057a
RH
4990 dyn.d_un.d_ptr
4991 = elf64_alpha_use_secureplt ? gotplt_vma : plt_vma;
4992 break;
252b5132 4993 case DT_PLTRELSZ:
6ec7057a
RH
4994 dyn.d_un.d_val = srelaplt ? srelaplt->size : 0;
4995 break;
252b5132 4996 case DT_JMPREL:
4ade44b7
AM
4997 dyn.d_un.d_ptr = srelaplt ? (srelaplt->output_section->vma
4998 + srelaplt->output_offset) : 0;
6ec7057a 4999 break;
252b5132
RH
5000 }
5001
5002 bfd_elf64_swap_dyn_out (output_bfd, &dyn, dyncon);
5003 }
5004
6ec7057a 5005 /* Initialize the plt header. */
eea6121a 5006 if (splt->size > 0)
252b5132 5007 {
6ec7057a
RH
5008 unsigned int insn;
5009 int ofs;
5010
5011 if (elf64_alpha_use_secureplt)
5012 {
5013 ofs = gotplt_vma - (plt_vma + PLT_HEADER_SIZE);
5014
5015 insn = INSN_ABC (INSN_SUBQ, 27, 28, 25);
5016 bfd_put_32 (output_bfd, insn, splt->contents);
5017
5018 insn = INSN_ABO (INSN_LDAH, 28, 28, (ofs + 0x8000) >> 16);
5019 bfd_put_32 (output_bfd, insn, splt->contents + 4);
5020
5021 insn = INSN_ABC (INSN_S4SUBQ, 25, 25, 25);
5022 bfd_put_32 (output_bfd, insn, splt->contents + 8);
5023
5024 insn = INSN_ABO (INSN_LDA, 28, 28, ofs);
5025 bfd_put_32 (output_bfd, insn, splt->contents + 12);
5026
5027 insn = INSN_ABO (INSN_LDQ, 27, 28, 0);
5028 bfd_put_32 (output_bfd, insn, splt->contents + 16);
5029
5030 insn = INSN_ABC (INSN_ADDQ, 25, 25, 25);
5031 bfd_put_32 (output_bfd, insn, splt->contents + 20);
5032
5033 insn = INSN_ABO (INSN_LDQ, 28, 28, 8);
5034 bfd_put_32 (output_bfd, insn, splt->contents + 24);
5035
5036 insn = INSN_AB (INSN_JMP, 31, 27);
5037 bfd_put_32 (output_bfd, insn, splt->contents + 28);
5038
5039 insn = INSN_AD (INSN_BR, 28, -PLT_HEADER_SIZE);
5040 bfd_put_32 (output_bfd, insn, splt->contents + 32);
5041 }
5042 else
5043 {
5044 insn = INSN_AD (INSN_BR, 27, 0); /* br $27, .+4 */
5045 bfd_put_32 (output_bfd, insn, splt->contents);
5046
5047 insn = INSN_ABO (INSN_LDQ, 27, 27, 12);
5048 bfd_put_32 (output_bfd, insn, splt->contents + 4);
5049
5050 insn = INSN_UNOP;
5051 bfd_put_32 (output_bfd, insn, splt->contents + 8);
5052
5053 insn = INSN_AB (INSN_JMP, 27, 27);
5054 bfd_put_32 (output_bfd, insn, splt->contents + 12);
5055
5056 /* The next two words will be filled in by ld.so. */
5057 bfd_put_64 (output_bfd, 0, splt->contents + 16);
5058 bfd_put_64 (output_bfd, 0, splt->contents + 24);
5059 }
252b5132 5060
eecdbe52 5061 elf_section_data (splt->output_section)->this_hdr.sh_entsize = 0;
252b5132
RH
5062 }
5063 }
5064
b34976b6 5065 return TRUE;
252b5132
RH
5066}
5067
96e2734b
RH
5068/* We need to use a special link routine to handle the .mdebug section.
5069 We need to merge all instances of these sections together, not write
5070 them all out sequentially. */
252b5132 5071
b34976b6 5072static bfd_boolean
a7519a3c 5073elf64_alpha_final_link (bfd *abfd, struct bfd_link_info *info)
252b5132
RH
5074{
5075 asection *o;
5076 struct bfd_link_order *p;
96e2734b 5077 asection *mdebug_sec;
252b5132
RH
5078 struct ecoff_debug_info debug;
5079 const struct ecoff_debug_swap *swap
5080 = get_elf_backend_data (abfd)->elf_backend_ecoff_debug_swap;
5081 HDRR *symhdr = &debug.symbolic_header;
4dfe6ac6
NC
5082 void * mdebug_handle = NULL;
5083 struct alpha_elf_link_hash_table * htab;
5084
5085 htab = alpha_elf_hash_table (info);
5086 if (htab == NULL)
5087 return FALSE;
252b5132 5088
96e2734b 5089 /* Go through the sections and collect the mdebug information. */
252b5132 5090 mdebug_sec = NULL;
252b5132
RH
5091 for (o = abfd->sections; o != (asection *) NULL; o = o->next)
5092 {
252b5132
RH
5093 if (strcmp (o->name, ".mdebug") == 0)
5094 {
5095 struct extsym_info einfo;
5096
5097 /* We have found the .mdebug section in the output file.
5098 Look through all the link_orders comprising it and merge
5099 the information together. */
5100 symhdr->magic = swap->sym_magic;
5101 /* FIXME: What should the version stamp be? */
5102 symhdr->vstamp = 0;
5103 symhdr->ilineMax = 0;
5104 symhdr->cbLine = 0;
5105 symhdr->idnMax = 0;
5106 symhdr->ipdMax = 0;
5107 symhdr->isymMax = 0;
5108 symhdr->ioptMax = 0;
5109 symhdr->iauxMax = 0;
5110 symhdr->issMax = 0;
5111 symhdr->issExtMax = 0;
5112 symhdr->ifdMax = 0;
5113 symhdr->crfd = 0;
5114 symhdr->iextMax = 0;
5115
5116 /* We accumulate the debugging information itself in the
5117 debug_info structure. */
5118 debug.line = NULL;
5119 debug.external_dnr = NULL;
5120 debug.external_pdr = NULL;
5121 debug.external_sym = NULL;
5122 debug.external_opt = NULL;
5123 debug.external_aux = NULL;
5124 debug.ss = NULL;
5125 debug.ssext = debug.ssext_end = NULL;
5126 debug.external_fdr = NULL;
5127 debug.external_rfd = NULL;
5128 debug.external_ext = debug.external_ext_end = NULL;
5129
5130 mdebug_handle = bfd_ecoff_debug_init (abfd, &debug, swap, info);
2c3fc389 5131 if (mdebug_handle == NULL)
b34976b6 5132 return FALSE;
252b5132
RH
5133
5134 if (1)
5135 {
5136 asection *s;
5137 EXTR esym;
52b9d213 5138 bfd_vma last = 0;
252b5132
RH
5139 unsigned int i;
5140 static const char * const name[] =
5141 {
5142 ".text", ".init", ".fini", ".data",
5143 ".rodata", ".sdata", ".sbss", ".bss"
5144 };
5145 static const int sc[] = { scText, scInit, scFini, scData,
5146 scRData, scSData, scSBss, scBss };
5147
5148 esym.jmptbl = 0;
5149 esym.cobol_main = 0;
5150 esym.weakext = 0;
5151 esym.reserved = 0;
5152 esym.ifd = ifdNil;
5153 esym.asym.iss = issNil;
5154 esym.asym.st = stLocal;
5155 esym.asym.reserved = 0;
5156 esym.asym.index = indexNil;
5157 for (i = 0; i < 8; i++)
5158 {
5159 esym.asym.sc = sc[i];
5160 s = bfd_get_section_by_name (abfd, name[i]);
5161 if (s != NULL)
5162 {
5163 esym.asym.value = s->vma;
eea6121a 5164 last = s->vma + s->size;
252b5132
RH
5165 }
5166 else
5167 esym.asym.value = last;
5168
5169 if (! bfd_ecoff_debug_one_external (abfd, &debug, swap,
5170 name[i], &esym))
b34976b6 5171 return FALSE;
252b5132
RH
5172 }
5173 }
5174
8423293d 5175 for (p = o->map_head.link_order;
252b5132
RH
5176 p != (struct bfd_link_order *) NULL;
5177 p = p->next)
5178 {
5179 asection *input_section;
5180 bfd *input_bfd;
5181 const struct ecoff_debug_swap *input_swap;
5182 struct ecoff_debug_info input_debug;
5183 char *eraw_src;
5184 char *eraw_end;
5185
5186 if (p->type != bfd_indirect_link_order)
5187 {
fd96f80f 5188 if (p->type == bfd_data_link_order)
252b5132
RH
5189 continue;
5190 abort ();
5191 }
5192
5193 input_section = p->u.indirect.section;
5194 input_bfd = input_section->owner;
5195
0ffa91dd
NC
5196 if (! is_alpha_elf (input_bfd))
5197 /* I don't know what a non ALPHA ELF bfd would be
5198 doing with a .mdebug section, but I don't really
5199 want to deal with it. */
5200 continue;
252b5132
RH
5201
5202 input_swap = (get_elf_backend_data (input_bfd)
5203 ->elf_backend_ecoff_debug_swap);
5204
eea6121a 5205 BFD_ASSERT (p->size == input_section->size);
252b5132
RH
5206
5207 /* The ECOFF linking code expects that we have already
5208 read in the debugging information and set up an
5209 ecoff_debug_info structure, so we do that now. */
5210 if (!elf64_alpha_read_ecoff_info (input_bfd, input_section,
5211 &input_debug))
b34976b6 5212 return FALSE;
252b5132
RH
5213
5214 if (! (bfd_ecoff_debug_accumulate
5215 (mdebug_handle, abfd, &debug, swap, input_bfd,
5216 &input_debug, input_swap, info)))
b34976b6 5217 return FALSE;
252b5132
RH
5218
5219 /* Loop through the external symbols. For each one with
5220 interesting information, try to find the symbol in
5221 the linker global hash table and save the information
5222 for the output external symbols. */
21d799b5 5223 eraw_src = (char *) input_debug.external_ext;
252b5132
RH
5224 eraw_end = (eraw_src
5225 + (input_debug.symbolic_header.iextMax
5226 * input_swap->external_ext_size));
5227 for (;
5228 eraw_src < eraw_end;
5229 eraw_src += input_swap->external_ext_size)
5230 {
5231 EXTR ext;
5232 const char *name;
5233 struct alpha_elf_link_hash_entry *h;
5234
2c3fc389 5235 (*input_swap->swap_ext_in) (input_bfd, eraw_src, &ext);
252b5132
RH
5236 if (ext.asym.sc == scNil
5237 || ext.asym.sc == scUndefined
5238 || ext.asym.sc == scSUndefined)
5239 continue;
5240
5241 name = input_debug.ssext + ext.asym.iss;
4dfe6ac6 5242 h = alpha_elf_link_hash_lookup (htab, name, FALSE, FALSE, TRUE);
252b5132
RH
5243 if (h == NULL || h->esym.ifd != -2)
5244 continue;
5245
5246 if (ext.ifd != -1)
5247 {
5248 BFD_ASSERT (ext.ifd
5249 < input_debug.symbolic_header.ifdMax);
5250 ext.ifd = input_debug.ifdmap[ext.ifd];
5251 }
5252
5253 h->esym = ext;
5254 }
5255
5256 /* Free up the information we just read. */
5257 free (input_debug.line);
5258 free (input_debug.external_dnr);
5259 free (input_debug.external_pdr);
5260 free (input_debug.external_sym);
5261 free (input_debug.external_opt);
5262 free (input_debug.external_aux);
5263 free (input_debug.ss);
5264 free (input_debug.ssext);
5265 free (input_debug.external_fdr);
5266 free (input_debug.external_rfd);
5267 free (input_debug.external_ext);
5268
5269 /* Hack: reset the SEC_HAS_CONTENTS flag so that
5270 elf_link_input_bfd ignores this section. */
5271 input_section->flags &=~ SEC_HAS_CONTENTS;
5272 }
5273
252b5132
RH
5274 /* Build the external symbol information. */
5275 einfo.abfd = abfd;
5276 einfo.info = info;
5277 einfo.debug = &debug;
5278 einfo.swap = swap;
b34976b6 5279 einfo.failed = FALSE;
252b5132
RH
5280 elf_link_hash_traverse (elf_hash_table (info),
5281 elf64_alpha_output_extsym,
2c3fc389 5282 &einfo);
252b5132 5283 if (einfo.failed)
b34976b6 5284 return FALSE;
252b5132
RH
5285
5286 /* Set the size of the .mdebug section. */
eea6121a 5287 o->size = bfd_ecoff_debug_size (abfd, &debug, swap);
252b5132
RH
5288
5289 /* Skip this section later on (I don't think this currently
5290 matters, but someday it might). */
8423293d 5291 o->map_head.link_order = (struct bfd_link_order *) NULL;
252b5132
RH
5292
5293 mdebug_sec = o;
5294 }
252b5132
RH
5295 }
5296
5297 /* Invoke the regular ELF backend linker to do all the work. */
c152c796 5298 if (! bfd_elf_final_link (abfd, info))
b34976b6 5299 return FALSE;
252b5132
RH
5300
5301 /* Now write out the computed sections. */
5302
5303 /* The .got subsections... */
5304 {
5305 bfd *i, *dynobj = elf_hash_table(info)->dynobj;
4dfe6ac6 5306 for (i = htab->got_list;
252b5132
RH
5307 i != NULL;
5308 i = alpha_elf_tdata(i)->got_link_next)
5309 {
5310 asection *sgot;
5311
5312 /* elf_bfd_final_link already did everything in dynobj. */
5313 if (i == dynobj)
5314 continue;
5315
5316 sgot = alpha_elf_tdata(i)->got;
5317 if (! bfd_set_section_contents (abfd, sgot->output_section,
dc810e39
AM
5318 sgot->contents,
5319 (file_ptr) sgot->output_offset,
eea6121a 5320 sgot->size))
b34976b6 5321 return FALSE;
252b5132
RH
5322 }
5323 }
5324
252b5132
RH
5325 if (mdebug_sec != (asection *) NULL)
5326 {
5327 BFD_ASSERT (abfd->output_has_begun);
5328 if (! bfd_ecoff_write_accumulated_debug (mdebug_handle, abfd, &debug,
5329 swap, info,
5330 mdebug_sec->filepos))
b34976b6 5331 return FALSE;
252b5132
RH
5332
5333 bfd_ecoff_debug_free (mdebug_handle, abfd, &debug, swap, info);
5334 }
5335
b34976b6 5336 return TRUE;
252b5132 5337}
fcfbdf31
JJ
5338
5339static enum elf_reloc_type_class
7e612e98
AM
5340elf64_alpha_reloc_type_class (const struct bfd_link_info *info ATTRIBUTE_UNUSED,
5341 const asection *rel_sec ATTRIBUTE_UNUSED,
5342 const Elf_Internal_Rela *rela)
fcfbdf31 5343{
f51e552e 5344 switch ((int) ELF64_R_TYPE (rela->r_info))
fcfbdf31
JJ
5345 {
5346 case R_ALPHA_RELATIVE:
5347 return reloc_class_relative;
5348 case R_ALPHA_JMP_SLOT:
5349 return reloc_class_plt;
5350 case R_ALPHA_COPY:
5351 return reloc_class_copy;
5352 default:
5353 return reloc_class_normal;
5354 }
5355}
252b5132 5356\f
b35d266b 5357static const struct bfd_elf_special_section elf64_alpha_special_sections[] =
2f89ff8d 5358{
0112cd26
NC
5359 { STRING_COMMA_LEN (".sbss"), -2, SHT_NOBITS, SHF_ALLOC + SHF_WRITE + SHF_ALPHA_GPREL },
5360 { STRING_COMMA_LEN (".sdata"), -2, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE + SHF_ALPHA_GPREL },
5361 { NULL, 0, 0, 0, 0 }
2f89ff8d
L
5362};
5363
252b5132
RH
5364/* ECOFF swapping routines. These are used when dealing with the
5365 .mdebug section, which is in the ECOFF debugging format. Copied
fe8bc63d 5366 from elf32-mips.c. */
252b5132
RH
5367static const struct ecoff_debug_swap
5368elf64_alpha_ecoff_debug_swap =
5369{
5370 /* Symbol table magic number. */
5371 magicSym2,
5372 /* Alignment of debugging information. E.g., 4. */
5373 8,
5374 /* Sizes of external symbolic information. */
5375 sizeof (struct hdr_ext),
5376 sizeof (struct dnr_ext),
5377 sizeof (struct pdr_ext),
5378 sizeof (struct sym_ext),
5379 sizeof (struct opt_ext),
5380 sizeof (struct fdr_ext),
5381 sizeof (struct rfd_ext),
5382 sizeof (struct ext_ext),
5383 /* Functions to swap in external symbolic data. */
5384 ecoff_swap_hdr_in,
5385 ecoff_swap_dnr_in,
5386 ecoff_swap_pdr_in,
5387 ecoff_swap_sym_in,
5388 ecoff_swap_opt_in,
5389 ecoff_swap_fdr_in,
5390 ecoff_swap_rfd_in,
5391 ecoff_swap_ext_in,
5392 _bfd_ecoff_swap_tir_in,
5393 _bfd_ecoff_swap_rndx_in,
5394 /* Functions to swap out external symbolic data. */
5395 ecoff_swap_hdr_out,
5396 ecoff_swap_dnr_out,
5397 ecoff_swap_pdr_out,
5398 ecoff_swap_sym_out,
5399 ecoff_swap_opt_out,
5400 ecoff_swap_fdr_out,
5401 ecoff_swap_rfd_out,
5402 ecoff_swap_ext_out,
5403 _bfd_ecoff_swap_tir_out,
5404 _bfd_ecoff_swap_rndx_out,
5405 /* Function to read in symbolic data. */
5406 elf64_alpha_read_ecoff_info
5407};
5408\f
70bcb145
JW
5409/* Use a non-standard hash bucket size of 8. */
5410
562ace6b 5411static const struct elf_size_info alpha_elf_size_info =
70bcb145
JW
5412{
5413 sizeof (Elf64_External_Ehdr),
5414 sizeof (Elf64_External_Phdr),
5415 sizeof (Elf64_External_Shdr),
5416 sizeof (Elf64_External_Rel),
5417 sizeof (Elf64_External_Rela),
5418 sizeof (Elf64_External_Sym),
5419 sizeof (Elf64_External_Dyn),
5420 sizeof (Elf_External_Note),
5421 8,
5422 1,
45d6a902 5423 64, 3,
70bcb145
JW
5424 ELFCLASS64, EV_CURRENT,
5425 bfd_elf64_write_out_phdrs,
5426 bfd_elf64_write_shdrs_and_ehdr,
1489a3a0 5427 bfd_elf64_checksum_contents,
70bcb145 5428 bfd_elf64_write_relocs,
73ff0d56 5429 bfd_elf64_swap_symbol_in,
70bcb145
JW
5430 bfd_elf64_swap_symbol_out,
5431 bfd_elf64_slurp_reloc_table,
5432 bfd_elf64_slurp_symbol_table,
5433 bfd_elf64_swap_dyn_in,
5434 bfd_elf64_swap_dyn_out,
947216bf
AM
5435 bfd_elf64_swap_reloc_in,
5436 bfd_elf64_swap_reloc_out,
5437 bfd_elf64_swap_reloca_in,
5438 bfd_elf64_swap_reloca_out
70bcb145
JW
5439};
5440
6d00b590 5441#define TARGET_LITTLE_SYM alpha_elf64_vec
252b5132
RH
5442#define TARGET_LITTLE_NAME "elf64-alpha"
5443#define ELF_ARCH bfd_arch_alpha
ae95ffa6 5444#define ELF_TARGET_ID ALPHA_ELF_DATA
56fc028e
AJ
5445#define ELF_MACHINE_CODE EM_ALPHA
5446#define ELF_MAXPAGESIZE 0x10000
24718e3b 5447#define ELF_COMMONPAGESIZE 0x2000
252b5132
RH
5448
5449#define bfd_elf64_bfd_link_hash_table_create \
5450 elf64_alpha_bfd_link_hash_table_create
5451
5452#define bfd_elf64_bfd_reloc_type_lookup \
5453 elf64_alpha_bfd_reloc_type_lookup
157090f7
AM
5454#define bfd_elf64_bfd_reloc_name_lookup \
5455 elf64_alpha_bfd_reloc_name_lookup
252b5132
RH
5456#define elf_info_to_howto \
5457 elf64_alpha_info_to_howto
5458
5459#define bfd_elf64_mkobject \
5460 elf64_alpha_mkobject
5461#define elf_backend_object_p \
5462 elf64_alpha_object_p
5463
5464#define elf_backend_section_from_shdr \
5465 elf64_alpha_section_from_shdr
204692d7
RH
5466#define elf_backend_section_flags \
5467 elf64_alpha_section_flags
252b5132
RH
5468#define elf_backend_fake_sections \
5469 elf64_alpha_fake_sections
5470
5471#define bfd_elf64_bfd_is_local_label_name \
5472 elf64_alpha_is_local_label_name
5473#define bfd_elf64_find_nearest_line \
5474 elf64_alpha_find_nearest_line
5475#define bfd_elf64_bfd_relax_section \
5476 elf64_alpha_relax_section
5477
5478#define elf_backend_add_symbol_hook \
5479 elf64_alpha_add_symbol_hook
13285a1b
AM
5480#define elf_backend_relocs_compatible \
5481 _bfd_elf_relocs_compatible
6fc5bb57
AM
5482#define elf_backend_sort_relocs_p \
5483 elf64_alpha_sort_relocs_p
252b5132
RH
5484#define elf_backend_check_relocs \
5485 elf64_alpha_check_relocs
5486#define elf_backend_create_dynamic_sections \
5487 elf64_alpha_create_dynamic_sections
5488#define elf_backend_adjust_dynamic_symbol \
5489 elf64_alpha_adjust_dynamic_symbol
747ffa7b
AM
5490#define elf_backend_merge_symbol_attribute \
5491 elf64_alpha_merge_symbol_attribute
48f4b4f5
RH
5492#define elf_backend_copy_indirect_symbol \
5493 elf64_alpha_copy_indirect_symbol
252b5132
RH
5494#define elf_backend_always_size_sections \
5495 elf64_alpha_always_size_sections
5496#define elf_backend_size_dynamic_sections \
5497 elf64_alpha_size_dynamic_sections
74541ad4
AM
5498#define elf_backend_omit_section_dynsym \
5499 ((bfd_boolean (*) (bfd *, struct bfd_link_info *, asection *)) bfd_true)
252b5132
RH
5500#define elf_backend_relocate_section \
5501 elf64_alpha_relocate_section
5502#define elf_backend_finish_dynamic_symbol \
5503 elf64_alpha_finish_dynamic_symbol
5504#define elf_backend_finish_dynamic_sections \
5505 elf64_alpha_finish_dynamic_sections
5506#define bfd_elf64_bfd_final_link \
5507 elf64_alpha_final_link
fcfbdf31
JJ
5508#define elf_backend_reloc_type_class \
5509 elf64_alpha_reloc_type_class
252b5132 5510
e117360e
RH
5511#define elf_backend_can_gc_sections 1
5512#define elf_backend_gc_mark_hook elf64_alpha_gc_mark_hook
e117360e 5513
252b5132
RH
5514#define elf_backend_ecoff_debug_swap \
5515 &elf64_alpha_ecoff_debug_swap
5516
70bcb145
JW
5517#define elf_backend_size_info \
5518 alpha_elf_size_info
5519
29ef7005
L
5520#define elf_backend_special_sections \
5521 elf64_alpha_special_sections
2f89ff8d 5522
38b1a46c 5523/* A few constants that determine how the .plt section is set up. */
252b5132
RH
5524#define elf_backend_want_got_plt 0
5525#define elf_backend_plt_readonly 0
5526#define elf_backend_want_plt_sym 1
5527#define elf_backend_got_header_size 0
64f52338 5528#define elf_backend_dtrel_excludes_plt 1
252b5132
RH
5529
5530#include "elf64-target.h"
2238051f
RH
5531\f
5532/* FreeBSD support. */
5533
5534#undef TARGET_LITTLE_SYM
6d00b590 5535#define TARGET_LITTLE_SYM alpha_elf64_fbsd_vec
2238051f
RH
5536#undef TARGET_LITTLE_NAME
5537#define TARGET_LITTLE_NAME "elf64-alpha-freebsd"
d1036acb
L
5538#undef ELF_OSABI
5539#define ELF_OSABI ELFOSABI_FREEBSD
2238051f
RH
5540
5541/* The kernel recognizes executables as valid only if they carry a
5542 "FreeBSD" label in the ELF header. So we put this label on all
5543 executables and (for simplicity) also all other object files. */
5544
2238051f 5545static void
a7519a3c
RH
5546elf64_alpha_fbsd_post_process_headers (bfd * abfd,
5547 struct bfd_link_info * link_info ATTRIBUTE_UNUSED)
2238051f
RH
5548{
5549 Elf_Internal_Ehdr * i_ehdrp; /* ELF file header, internal form. */
5550
5551 i_ehdrp = elf_elfheader (abfd);
5552
5553 /* Put an ABI label supported by FreeBSD >= 4.1. */
d1036acb 5554 i_ehdrp->e_ident[EI_OSABI] = get_elf_backend_data (abfd)->elf_osabi;
2238051f
RH
5555#ifdef OLD_FREEBSD_ABI_LABEL
5556 /* The ABI label supported by FreeBSD <= 4.0 is quite nonstandard. */
5557 memcpy (&i_ehdrp->e_ident[EI_ABIVERSION], "FreeBSD", 8);
5558#endif
5559}
5560
5561#undef elf_backend_post_process_headers
5562#define elf_backend_post_process_headers \
5563 elf64_alpha_fbsd_post_process_headers
5564
571fe01f 5565#undef elf64_bed
2238051f
RH
5566#define elf64_bed elf64_alpha_fbsd_bed
5567
5568#include "elf64-target.h"
This page took 1.477306 seconds and 4 git commands to generate.