2003-02-05 Andrew Cagney <ac131313@redhat.com>
[deliverable/binutils-gdb.git] / bfd / elf64-ppc.c
CommitLineData
5bd4f169 1/* PowerPC64-specific support for 64-bit ELF.
86bbe32f 2 Copyright 1999, 2000, 2001, 2002, 2003 Free Software Foundation, Inc.
5bd4f169
AM
3 Written by Linus Nordberg, Swox AB <info@swox.com>,
4 based on elf32-ppc.c by Ian Lance Taylor.
5
6This file is part of BFD, the Binary File Descriptor library.
7
8This program is free software; you can redistribute it and/or modify
9it under the terms of the GNU General Public License as published by
10the Free Software Foundation; either version 2 of the License, or
11(at your option) any later version.
12
13This program is distributed in the hope that it will be useful,
14but WITHOUT ANY WARRANTY; without even the implied warranty of
15MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
16GNU General Public License for more details.
17
18You should have received a copy of the GNU General Public License
19along with this program; if not, write to the Free Software
20Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA. */
21
22/* This file is based on the 64-bit PowerPC ELF ABI. It is also based
23 on the file elf32-ppc.c. */
24
25#include "bfd.h"
26#include "sysdep.h"
27#include "bfdlink.h"
28#include "libbfd.h"
29#include "elf-bfd.h"
04c9666a 30#include "elf/ppc64.h"
5d1634d7 31#include "elf64-ppc.h"
5bd4f169 32
5bd4f169
AM
33static void ppc_howto_init
34 PARAMS ((void));
35static reloc_howto_type *ppc64_elf_reloc_type_lookup
36 PARAMS ((bfd *abfd, bfd_reloc_code_real_type code));
37static void ppc64_elf_info_to_howto
947216bf 38 PARAMS ((bfd *abfd, arelent *cache_ptr, Elf_Internal_Rela *dst));
805fc799
AM
39static bfd_reloc_status_type ppc64_elf_ha_reloc
40 PARAMS ((bfd *, arelent *, asymbol *, PTR, asection *, bfd *, char **));
41static bfd_reloc_status_type ppc64_elf_brtaken_reloc
42 PARAMS ((bfd *, arelent *, asymbol *, PTR, asection *, bfd *, char **));
43static bfd_reloc_status_type ppc64_elf_sectoff_reloc
44 PARAMS ((bfd *, arelent *, asymbol *, PTR, asection *, bfd *, char **));
45static bfd_reloc_status_type ppc64_elf_sectoff_ha_reloc
46 PARAMS ((bfd *, arelent *, asymbol *, PTR, asection *, bfd *, char **));
47static bfd_reloc_status_type ppc64_elf_toc_reloc
48 PARAMS ((bfd *, arelent *, asymbol *, PTR, asection *, bfd *, char **));
49static bfd_reloc_status_type ppc64_elf_toc_ha_reloc
50 PARAMS ((bfd *, arelent *, asymbol *, PTR, asection *, bfd *, char **));
51static bfd_reloc_status_type ppc64_elf_toc64_reloc
52 PARAMS ((bfd *, arelent *, asymbol *, PTR, asection *, bfd *, char **));
53static bfd_reloc_status_type ppc64_elf_unhandled_reloc
5bd4f169 54 PARAMS ((bfd *, arelent *, asymbol *, PTR, asection *, bfd *, char **));
b34976b6 55static bfd_boolean ppc64_elf_object_p
feee612b 56 PARAMS ((bfd *));
b34976b6 57static bfd_boolean ppc64_elf_merge_private_bfd_data
5bd4f169 58 PARAMS ((bfd *, bfd *));
f0abc2a1
AM
59static bfd_boolean ppc64_elf_new_section_hook
60 PARAMS ((bfd *, asection *));
5bd4f169
AM
61
62
5bd4f169
AM
63/* The name of the dynamic interpreter. This is put in the .interp
64 section. */
65#define ELF_DYNAMIC_INTERPRETER "/usr/lib/ld.so.1"
66
67/* The size in bytes of an entry in the procedure linkage table. */
68#define PLT_ENTRY_SIZE 24
69
70/* The initial size of the plt reserved for the dynamic linker. */
5d1634d7 71#define PLT_INITIAL_ENTRY_SIZE PLT_ENTRY_SIZE
5bd4f169
AM
72
73/* TOC base pointers offset from start of TOC. */
411e1bfb
AM
74#define TOC_BASE_OFF 0x8000
75
76/* Offset of tp and dtp pointers from start of TLS block. */
77#define TP_OFFSET 0x7000
78#define DTP_OFFSET 0x8000
5bd4f169 79
5d1634d7
AM
80/* .plt call stub instructions. */
81#define ADDIS_R12_R2 0x3d820000 /* addis %r12,%r2,xxx@ha */
82#define STD_R2_40R1 0xf8410028 /* std %r2,40(%r1) */
83#define LD_R11_0R12 0xe96c0000 /* ld %r11,xxx+0@l(%r12) */
84#define LD_R2_0R12 0xe84c0000 /* ld %r2,xxx+8@l(%r12) */
85#define MTCTR_R11 0x7d6903a6 /* mtctr %r11 */
86 /* ld %r11,xxx+16@l(%r12) */
87#define BCTR 0x4e800420 /* bctr */
88
89/* The normal stub is this size. */
90#define PLT_CALL_STUB_SIZE (7*4)
91
92/* But sometimes the .plt entry crosses a 64k boundary, and we need
93 to adjust the high word with this insn. */
94#define ADDIS_R12_R12_1 0x3d8c0001 /* addis %r12,%r12,1 */
5bd4f169 95
5d1634d7
AM
96/* The .glink fixup call stub is the same as the .plt call stub, but
97 the first instruction restores r2, and the std is omitted. */
98#define LD_R2_40R1 0xe8410028 /* ld %r2,40(%r1) */
99
100/* Always allow this much space. */
101#define GLINK_CALL_STUB_SIZE (8*4)
102
103/* Pad with this. */
104#define NOP 0x60000000
105
721956f4
AM
106/* Some other nops. */
107#define CROR_151515 0x4def7b82
108#define CROR_313131 0x4ffffb82
109
cedb70c5 110/* .glink entries for the first 32k functions are two instructions. */
5d1634d7
AM
111#define LI_R0_0 0x38000000 /* li %r0,0 */
112#define B_DOT 0x48000000 /* b . */
113
114/* After that, we need two instructions to load the index, followed by
115 a branch. */
116#define LIS_R0_0 0x3c000000 /* lis %r0,0 */
10ed1bba 117#define ORI_R0_R0_0 0x60000000 /* ori %r0,%r0,0 */
41bd81ab 118
82bd7b59
AM
119/* Instructions to save and restore floating point regs. */
120#define STFD_FR0_0R1 0xd8010000 /* stfd %fr0,0(%r1) */
121#define LFD_FR0_0R1 0xc8010000 /* lfd %fr0,0(%r1) */
122#define BLR 0x4e800020 /* blr */
123
41bd81ab
AM
124/* Since .opd is an array of descriptors and each entry will end up
125 with identical R_PPC64_RELATIVE relocs, there is really no need to
126 propagate .opd relocs; The dynamic linker should be taught to
1e2f5b6e 127 relocate .opd without reloc entries. */
41bd81ab
AM
128#ifndef NO_OPD_RELOCS
129#define NO_OPD_RELOCS 0
130#endif
5bd4f169 131\f
f5e87a1d 132#define ONES(n) (((bfd_vma) 1 << ((n) - 1) << 1) - 1)
b34976b6 133
5bd4f169 134/* Relocation HOWTO's. */
04c9666a 135static reloc_howto_type *ppc64_elf_howto_table[(int) R_PPC64_max];
5bd4f169
AM
136
137static reloc_howto_type ppc64_elf_howto_raw[] = {
138 /* This reloc does nothing. */
139 HOWTO (R_PPC64_NONE, /* type */
140 0, /* rightshift */
411e1bfb
AM
141 2, /* size (0 = byte, 1 = short, 2 = long) */
142 32, /* bitsize */
b34976b6 143 FALSE, /* pc_relative */
5bd4f169 144 0, /* bitpos */
f5e87a1d 145 complain_overflow_dont, /* complain_on_overflow */
5bd4f169
AM
146 bfd_elf_generic_reloc, /* special_function */
147 "R_PPC64_NONE", /* name */
b34976b6 148 FALSE, /* partial_inplace */
d006db6c 149 0, /* src_mask */
5bd4f169 150 0, /* dst_mask */
b34976b6 151 FALSE), /* pcrel_offset */
5bd4f169
AM
152
153 /* A standard 32 bit relocation. */
154 HOWTO (R_PPC64_ADDR32, /* type */
155 0, /* rightshift */
156 2, /* size (0 = byte, 1 = short, 2 = long) */
157 32, /* bitsize */
b34976b6 158 FALSE, /* pc_relative */
5bd4f169
AM
159 0, /* bitpos */
160 complain_overflow_bitfield, /* complain_on_overflow */
161 bfd_elf_generic_reloc, /* special_function */
162 "R_PPC64_ADDR32", /* name */
b34976b6 163 FALSE, /* partial_inplace */
5bd4f169
AM
164 0, /* src_mask */
165 0xffffffff, /* dst_mask */
b34976b6 166 FALSE), /* pcrel_offset */
5bd4f169
AM
167
168 /* An absolute 26 bit branch; the lower two bits must be zero.
169 FIXME: we don't check that, we just clear them. */
170 HOWTO (R_PPC64_ADDR24, /* type */
171 0, /* rightshift */
172 2, /* size (0 = byte, 1 = short, 2 = long) */
173 26, /* bitsize */
b34976b6 174 FALSE, /* pc_relative */
5bd4f169
AM
175 0, /* bitpos */
176 complain_overflow_bitfield, /* complain_on_overflow */
177 bfd_elf_generic_reloc, /* special_function */
178 "R_PPC64_ADDR24", /* name */
b34976b6 179 FALSE, /* partial_inplace */
d006db6c 180 0, /* src_mask */
f5e87a1d 181 0x03fffffc, /* dst_mask */
b34976b6 182 FALSE), /* pcrel_offset */
5bd4f169
AM
183
184 /* A standard 16 bit relocation. */
185 HOWTO (R_PPC64_ADDR16, /* type */
186 0, /* rightshift */
187 1, /* size (0 = byte, 1 = short, 2 = long) */
188 16, /* bitsize */
b34976b6 189 FALSE, /* pc_relative */
5bd4f169
AM
190 0, /* bitpos */
191 complain_overflow_bitfield, /* complain_on_overflow */
192 bfd_elf_generic_reloc, /* special_function */
193 "R_PPC64_ADDR16", /* name */
b34976b6 194 FALSE, /* partial_inplace */
5bd4f169
AM
195 0, /* src_mask */
196 0xffff, /* dst_mask */
b34976b6 197 FALSE), /* pcrel_offset */
5bd4f169
AM
198
199 /* A 16 bit relocation without overflow. */
200 HOWTO (R_PPC64_ADDR16_LO, /* type */
201 0, /* rightshift */
202 1, /* size (0 = byte, 1 = short, 2 = long) */
203 16, /* bitsize */
b34976b6 204 FALSE, /* pc_relative */
5bd4f169
AM
205 0, /* bitpos */
206 complain_overflow_dont,/* complain_on_overflow */
207 bfd_elf_generic_reloc, /* special_function */
208 "R_PPC64_ADDR16_LO", /* name */
b34976b6 209 FALSE, /* partial_inplace */
5bd4f169
AM
210 0, /* src_mask */
211 0xffff, /* dst_mask */
b34976b6 212 FALSE), /* pcrel_offset */
5bd4f169
AM
213
214 /* Bits 16-31 of an address. */
215 HOWTO (R_PPC64_ADDR16_HI, /* type */
216 16, /* rightshift */
217 1, /* size (0 = byte, 1 = short, 2 = long) */
218 16, /* bitsize */
b34976b6 219 FALSE, /* pc_relative */
5bd4f169
AM
220 0, /* bitpos */
221 complain_overflow_dont, /* complain_on_overflow */
222 bfd_elf_generic_reloc, /* special_function */
223 "R_PPC64_ADDR16_HI", /* name */
b34976b6 224 FALSE, /* partial_inplace */
5bd4f169
AM
225 0, /* src_mask */
226 0xffff, /* dst_mask */
b34976b6 227 FALSE), /* pcrel_offset */
5bd4f169
AM
228
229 /* Bits 16-31 of an address, plus 1 if the contents of the low 16
230 bits, treated as a signed number, is negative. */
231 HOWTO (R_PPC64_ADDR16_HA, /* type */
232 16, /* rightshift */
233 1, /* size (0 = byte, 1 = short, 2 = long) */
234 16, /* bitsize */
b34976b6 235 FALSE, /* pc_relative */
5bd4f169
AM
236 0, /* bitpos */
237 complain_overflow_dont, /* complain_on_overflow */
805fc799 238 ppc64_elf_ha_reloc, /* special_function */
5bd4f169 239 "R_PPC64_ADDR16_HA", /* name */
b34976b6 240 FALSE, /* partial_inplace */
5bd4f169
AM
241 0, /* src_mask */
242 0xffff, /* dst_mask */
b34976b6 243 FALSE), /* pcrel_offset */
5bd4f169
AM
244
245 /* An absolute 16 bit branch; the lower two bits must be zero.
246 FIXME: we don't check that, we just clear them. */
247 HOWTO (R_PPC64_ADDR14, /* type */
248 0, /* rightshift */
249 2, /* size (0 = byte, 1 = short, 2 = long) */
250 16, /* bitsize */
b34976b6 251 FALSE, /* pc_relative */
5bd4f169
AM
252 0, /* bitpos */
253 complain_overflow_bitfield, /* complain_on_overflow */
254 bfd_elf_generic_reloc, /* special_function */
255 "R_PPC64_ADDR14", /* name */
b34976b6 256 FALSE, /* partial_inplace */
d006db6c 257 0, /* src_mask */
f5e87a1d 258 0x0000fffc, /* dst_mask */
b34976b6 259 FALSE), /* pcrel_offset */
5bd4f169
AM
260
261 /* An absolute 16 bit branch, for which bit 10 should be set to
262 indicate that the branch is expected to be taken. The lower two
263 bits must be zero. */
264 HOWTO (R_PPC64_ADDR14_BRTAKEN, /* type */
265 0, /* rightshift */
266 2, /* size (0 = byte, 1 = short, 2 = long) */
267 16, /* bitsize */
b34976b6 268 FALSE, /* pc_relative */
5bd4f169
AM
269 0, /* bitpos */
270 complain_overflow_bitfield, /* complain_on_overflow */
805fc799 271 ppc64_elf_brtaken_reloc, /* special_function */
5bd4f169 272 "R_PPC64_ADDR14_BRTAKEN",/* name */
b34976b6 273 FALSE, /* partial_inplace */
d006db6c 274 0, /* src_mask */
f5e87a1d 275 0x0000fffc, /* dst_mask */
b34976b6 276 FALSE), /* pcrel_offset */
5bd4f169
AM
277
278 /* An absolute 16 bit branch, for which bit 10 should be set to
279 indicate that the branch is not expected to be taken. The lower
280 two bits must be zero. */
281 HOWTO (R_PPC64_ADDR14_BRNTAKEN, /* type */
282 0, /* rightshift */
283 2, /* size (0 = byte, 1 = short, 2 = long) */
284 16, /* bitsize */
b34976b6 285 FALSE, /* pc_relative */
5bd4f169
AM
286 0, /* bitpos */
287 complain_overflow_bitfield, /* complain_on_overflow */
805fc799 288 ppc64_elf_brtaken_reloc, /* special_function */
5bd4f169 289 "R_PPC64_ADDR14_BRNTAKEN",/* name */
b34976b6 290 FALSE, /* partial_inplace */
d006db6c 291 0, /* src_mask */
f5e87a1d 292 0x0000fffc, /* dst_mask */
b34976b6 293 FALSE), /* pcrel_offset */
5bd4f169
AM
294
295 /* A relative 26 bit branch; the lower two bits must be zero. */
296 HOWTO (R_PPC64_REL24, /* type */
297 0, /* rightshift */
298 2, /* size (0 = byte, 1 = short, 2 = long) */
299 26, /* bitsize */
b34976b6 300 TRUE, /* pc_relative */
5bd4f169
AM
301 0, /* bitpos */
302 complain_overflow_signed, /* complain_on_overflow */
303 bfd_elf_generic_reloc, /* special_function */
304 "R_PPC64_REL24", /* name */
b34976b6 305 FALSE, /* partial_inplace */
d006db6c 306 0, /* src_mask */
f5e87a1d 307 0x03fffffc, /* dst_mask */
b34976b6 308 TRUE), /* pcrel_offset */
5bd4f169
AM
309
310 /* A relative 16 bit branch; the lower two bits must be zero. */
311 HOWTO (R_PPC64_REL14, /* type */
312 0, /* rightshift */
313 2, /* size (0 = byte, 1 = short, 2 = long) */
314 16, /* bitsize */
b34976b6 315 TRUE, /* pc_relative */
5bd4f169
AM
316 0, /* bitpos */
317 complain_overflow_signed, /* complain_on_overflow */
318 bfd_elf_generic_reloc, /* special_function */
319 "R_PPC64_REL14", /* name */
b34976b6 320 FALSE, /* partial_inplace */
d006db6c 321 0, /* src_mask */
f5e87a1d 322 0x0000fffc, /* dst_mask */
b34976b6 323 TRUE), /* pcrel_offset */
5bd4f169
AM
324
325 /* A relative 16 bit branch. Bit 10 should be set to indicate that
326 the branch is expected to be taken. The lower two bits must be
327 zero. */
328 HOWTO (R_PPC64_REL14_BRTAKEN, /* type */
329 0, /* rightshift */
330 2, /* size (0 = byte, 1 = short, 2 = long) */
331 16, /* bitsize */
b34976b6 332 TRUE, /* pc_relative */
5bd4f169
AM
333 0, /* bitpos */
334 complain_overflow_signed, /* complain_on_overflow */
805fc799 335 ppc64_elf_brtaken_reloc, /* special_function */
5bd4f169 336 "R_PPC64_REL14_BRTAKEN", /* name */
b34976b6 337 FALSE, /* partial_inplace */
d006db6c 338 0, /* src_mask */
f5e87a1d 339 0x0000fffc, /* dst_mask */
b34976b6 340 TRUE), /* pcrel_offset */
5bd4f169
AM
341
342 /* A relative 16 bit branch. Bit 10 should be set to indicate that
343 the branch is not expected to be taken. The lower two bits must
344 be zero. */
345 HOWTO (R_PPC64_REL14_BRNTAKEN, /* type */
346 0, /* rightshift */
347 2, /* size (0 = byte, 1 = short, 2 = long) */
348 16, /* bitsize */
b34976b6 349 TRUE, /* pc_relative */
5bd4f169
AM
350 0, /* bitpos */
351 complain_overflow_signed, /* complain_on_overflow */
805fc799 352 ppc64_elf_brtaken_reloc, /* special_function */
5bd4f169 353 "R_PPC64_REL14_BRNTAKEN",/* name */
b34976b6 354 FALSE, /* partial_inplace */
d006db6c 355 0, /* src_mask */
f5e87a1d 356 0x0000fffc, /* dst_mask */
b34976b6 357 TRUE), /* pcrel_offset */
5bd4f169
AM
358
359 /* Like R_PPC64_ADDR16, but referring to the GOT table entry for the
360 symbol. */
361 HOWTO (R_PPC64_GOT16, /* type */
362 0, /* rightshift */
363 1, /* size (0 = byte, 1 = short, 2 = long) */
364 16, /* bitsize */
b34976b6 365 FALSE, /* pc_relative */
5bd4f169
AM
366 0, /* bitpos */
367 complain_overflow_signed, /* complain_on_overflow */
805fc799 368 ppc64_elf_unhandled_reloc, /* special_function */
5bd4f169 369 "R_PPC64_GOT16", /* name */
b34976b6 370 FALSE, /* partial_inplace */
5bd4f169
AM
371 0, /* src_mask */
372 0xffff, /* dst_mask */
b34976b6 373 FALSE), /* pcrel_offset */
5bd4f169
AM
374
375 /* Like R_PPC64_ADDR16_LO, but referring to the GOT table entry for
376 the symbol. */
377 HOWTO (R_PPC64_GOT16_LO, /* type */
378 0, /* rightshift */
379 1, /* size (0 = byte, 1 = short, 2 = long) */
380 16, /* bitsize */
b34976b6 381 FALSE, /* pc_relative */
5bd4f169
AM
382 0, /* bitpos */
383 complain_overflow_dont, /* complain_on_overflow */
805fc799 384 ppc64_elf_unhandled_reloc, /* special_function */
5bd4f169 385 "R_PPC64_GOT16_LO", /* name */
b34976b6 386 FALSE, /* partial_inplace */
5bd4f169
AM
387 0, /* src_mask */
388 0xffff, /* dst_mask */
b34976b6 389 FALSE), /* pcrel_offset */
5bd4f169
AM
390
391 /* Like R_PPC64_ADDR16_HI, but referring to the GOT table entry for
392 the symbol. */
393 HOWTO (R_PPC64_GOT16_HI, /* type */
394 16, /* rightshift */
395 1, /* size (0 = byte, 1 = short, 2 = long) */
396 16, /* bitsize */
b34976b6 397 FALSE, /* pc_relative */
5bd4f169
AM
398 0, /* bitpos */
399 complain_overflow_dont,/* complain_on_overflow */
805fc799 400 ppc64_elf_unhandled_reloc, /* special_function */
5bd4f169 401 "R_PPC64_GOT16_HI", /* name */
b34976b6 402 FALSE, /* partial_inplace */
5bd4f169
AM
403 0, /* src_mask */
404 0xffff, /* dst_mask */
b34976b6 405 FALSE), /* pcrel_offset */
5bd4f169
AM
406
407 /* Like R_PPC64_ADDR16_HA, but referring to the GOT table entry for
408 the symbol. */
409 HOWTO (R_PPC64_GOT16_HA, /* type */
410 16, /* rightshift */
411 1, /* size (0 = byte, 1 = short, 2 = long) */
412 16, /* bitsize */
b34976b6 413 FALSE, /* pc_relative */
5bd4f169
AM
414 0, /* bitpos */
415 complain_overflow_dont,/* complain_on_overflow */
805fc799 416 ppc64_elf_unhandled_reloc, /* special_function */
5bd4f169 417 "R_PPC64_GOT16_HA", /* name */
b34976b6 418 FALSE, /* partial_inplace */
5bd4f169
AM
419 0, /* src_mask */
420 0xffff, /* dst_mask */
b34976b6 421 FALSE), /* pcrel_offset */
5bd4f169
AM
422
423 /* This is used only by the dynamic linker. The symbol should exist
424 both in the object being run and in some shared library. The
425 dynamic linker copies the data addressed by the symbol from the
426 shared library into the object, because the object being
427 run has to have the data at some particular address. */
428 HOWTO (R_PPC64_COPY, /* type */
429 0, /* rightshift */
f5e87a1d
AM
430 0, /* this one is variable size */
431 0, /* bitsize */
b34976b6 432 FALSE, /* pc_relative */
5bd4f169 433 0, /* bitpos */
f5e87a1d
AM
434 complain_overflow_dont, /* complain_on_overflow */
435 ppc64_elf_unhandled_reloc, /* special_function */
5bd4f169 436 "R_PPC64_COPY", /* name */
b34976b6 437 FALSE, /* partial_inplace */
5bd4f169
AM
438 0, /* src_mask */
439 0, /* dst_mask */
b34976b6 440 FALSE), /* pcrel_offset */
5bd4f169
AM
441
442 /* Like R_PPC64_ADDR64, but used when setting global offset table
443 entries. */
444 HOWTO (R_PPC64_GLOB_DAT, /* type */
445 0, /* rightshift */
446 4, /* size (0=byte, 1=short, 2=long, 4=64 bits) */
447 64, /* bitsize */
b34976b6 448 FALSE, /* pc_relative */
5bd4f169
AM
449 0, /* bitpos */
450 complain_overflow_dont, /* complain_on_overflow */
805fc799 451 ppc64_elf_unhandled_reloc, /* special_function */
5bd4f169 452 "R_PPC64_GLOB_DAT", /* name */
b34976b6 453 FALSE, /* partial_inplace */
5bd4f169 454 0, /* src_mask */
f5e87a1d 455 ONES (64), /* dst_mask */
b34976b6 456 FALSE), /* pcrel_offset */
5bd4f169
AM
457
458 /* Created by the link editor. Marks a procedure linkage table
459 entry for a symbol. */
460 HOWTO (R_PPC64_JMP_SLOT, /* type */
461 0, /* rightshift */
462 0, /* size (0 = byte, 1 = short, 2 = long) */
463 0, /* bitsize */
b34976b6 464 FALSE, /* pc_relative */
5bd4f169
AM
465 0, /* bitpos */
466 complain_overflow_dont, /* complain_on_overflow */
805fc799 467 ppc64_elf_unhandled_reloc, /* special_function */
5bd4f169 468 "R_PPC64_JMP_SLOT", /* name */
b34976b6 469 FALSE, /* partial_inplace */
5bd4f169
AM
470 0, /* src_mask */
471 0, /* dst_mask */
b34976b6 472 FALSE), /* pcrel_offset */
5bd4f169
AM
473
474 /* Used only by the dynamic linker. When the object is run, this
475 doubleword64 is set to the load address of the object, plus the
476 addend. */
477 HOWTO (R_PPC64_RELATIVE, /* type */
478 0, /* rightshift */
479 4, /* size (0=byte, 1=short, 2=long, 4=64 bits) */
480 64, /* bitsize */
b34976b6 481 FALSE, /* pc_relative */
5bd4f169
AM
482 0, /* bitpos */
483 complain_overflow_dont, /* complain_on_overflow */
484 bfd_elf_generic_reloc, /* special_function */
485 "R_PPC64_RELATIVE", /* name */
b34976b6 486 FALSE, /* partial_inplace */
5bd4f169 487 0, /* src_mask */
f5e87a1d 488 ONES (64), /* dst_mask */
b34976b6 489 FALSE), /* pcrel_offset */
5bd4f169
AM
490
491 /* Like R_PPC64_ADDR32, but may be unaligned. */
492 HOWTO (R_PPC64_UADDR32, /* type */
493 0, /* rightshift */
494 2, /* size (0 = byte, 1 = short, 2 = long) */
495 32, /* bitsize */
b34976b6 496 FALSE, /* pc_relative */
5bd4f169
AM
497 0, /* bitpos */
498 complain_overflow_bitfield, /* complain_on_overflow */
499 bfd_elf_generic_reloc, /* special_function */
500 "R_PPC64_UADDR32", /* name */
b34976b6 501 FALSE, /* partial_inplace */
5bd4f169
AM
502 0, /* src_mask */
503 0xffffffff, /* dst_mask */
b34976b6 504 FALSE), /* pcrel_offset */
5bd4f169
AM
505
506 /* Like R_PPC64_ADDR16, but may be unaligned. */
507 HOWTO (R_PPC64_UADDR16, /* type */
508 0, /* rightshift */
509 1, /* size (0 = byte, 1 = short, 2 = long) */
510 16, /* bitsize */
b34976b6 511 FALSE, /* pc_relative */
5bd4f169
AM
512 0, /* bitpos */
513 complain_overflow_bitfield, /* complain_on_overflow */
514 bfd_elf_generic_reloc, /* special_function */
515 "R_PPC64_UADDR16", /* name */
b34976b6 516 FALSE, /* partial_inplace */
5bd4f169
AM
517 0, /* src_mask */
518 0xffff, /* dst_mask */
b34976b6 519 FALSE), /* pcrel_offset */
5bd4f169
AM
520
521 /* 32-bit PC relative. */
522 HOWTO (R_PPC64_REL32, /* type */
523 0, /* rightshift */
524 2, /* size (0 = byte, 1 = short, 2 = long) */
525 32, /* bitsize */
b34976b6 526 TRUE, /* pc_relative */
5bd4f169 527 0, /* bitpos */
cedb70c5 528 /* FIXME: Verify. Was complain_overflow_bitfield. */
5bd4f169
AM
529 complain_overflow_signed, /* complain_on_overflow */
530 bfd_elf_generic_reloc, /* special_function */
531 "R_PPC64_REL32", /* name */
b34976b6 532 FALSE, /* partial_inplace */
5bd4f169
AM
533 0, /* src_mask */
534 0xffffffff, /* dst_mask */
b34976b6 535 TRUE), /* pcrel_offset */
5bd4f169 536
10ed1bba 537 /* 32-bit relocation to the symbol's procedure linkage table. */
5bd4f169
AM
538 HOWTO (R_PPC64_PLT32, /* type */
539 0, /* rightshift */
540 2, /* size (0 = byte, 1 = short, 2 = long) */
541 32, /* bitsize */
b34976b6 542 FALSE, /* pc_relative */
5bd4f169
AM
543 0, /* bitpos */
544 complain_overflow_bitfield, /* complain_on_overflow */
805fc799 545 ppc64_elf_unhandled_reloc, /* special_function */
5bd4f169 546 "R_PPC64_PLT32", /* name */
b34976b6 547 FALSE, /* partial_inplace */
5bd4f169 548 0, /* src_mask */
f5e87a1d 549 0xffffffff, /* dst_mask */
b34976b6 550 FALSE), /* pcrel_offset */
5bd4f169
AM
551
552 /* 32-bit PC relative relocation to the symbol's procedure linkage table.
553 FIXME: R_PPC64_PLTREL32 not supported. */
554 HOWTO (R_PPC64_PLTREL32, /* type */
555 0, /* rightshift */
556 2, /* size (0 = byte, 1 = short, 2 = long) */
557 32, /* bitsize */
b34976b6 558 TRUE, /* pc_relative */
5bd4f169
AM
559 0, /* bitpos */
560 complain_overflow_signed, /* complain_on_overflow */
561 bfd_elf_generic_reloc, /* special_function */
562 "R_PPC64_PLTREL32", /* name */
b34976b6 563 FALSE, /* partial_inplace */
5bd4f169 564 0, /* src_mask */
f5e87a1d 565 0xffffffff, /* dst_mask */
b34976b6 566 TRUE), /* pcrel_offset */
5bd4f169
AM
567
568 /* Like R_PPC64_ADDR16_LO, but referring to the PLT table entry for
569 the symbol. */
570 HOWTO (R_PPC64_PLT16_LO, /* type */
571 0, /* rightshift */
572 1, /* size (0 = byte, 1 = short, 2 = long) */
573 16, /* bitsize */
b34976b6 574 FALSE, /* pc_relative */
5bd4f169
AM
575 0, /* bitpos */
576 complain_overflow_dont, /* complain_on_overflow */
805fc799 577 ppc64_elf_unhandled_reloc, /* special_function */
5bd4f169 578 "R_PPC64_PLT16_LO", /* name */
b34976b6 579 FALSE, /* partial_inplace */
5bd4f169
AM
580 0, /* src_mask */
581 0xffff, /* dst_mask */
b34976b6 582 FALSE), /* pcrel_offset */
5bd4f169
AM
583
584 /* Like R_PPC64_ADDR16_HI, but referring to the PLT table entry for
585 the symbol. */
586 HOWTO (R_PPC64_PLT16_HI, /* type */
587 16, /* rightshift */
588 1, /* size (0 = byte, 1 = short, 2 = long) */
589 16, /* bitsize */
b34976b6 590 FALSE, /* pc_relative */
5bd4f169
AM
591 0, /* bitpos */
592 complain_overflow_dont, /* complain_on_overflow */
805fc799 593 ppc64_elf_unhandled_reloc, /* special_function */
5bd4f169 594 "R_PPC64_PLT16_HI", /* name */
b34976b6 595 FALSE, /* partial_inplace */
5bd4f169
AM
596 0, /* src_mask */
597 0xffff, /* dst_mask */
b34976b6 598 FALSE), /* pcrel_offset */
5bd4f169
AM
599
600 /* Like R_PPC64_ADDR16_HA, but referring to the PLT table entry for
601 the symbol. */
602 HOWTO (R_PPC64_PLT16_HA, /* type */
603 16, /* rightshift */
604 1, /* size (0 = byte, 1 = short, 2 = long) */
605 16, /* bitsize */
b34976b6 606 FALSE, /* pc_relative */
5bd4f169
AM
607 0, /* bitpos */
608 complain_overflow_dont, /* complain_on_overflow */
805fc799 609 ppc64_elf_unhandled_reloc, /* special_function */
5bd4f169 610 "R_PPC64_PLT16_HA", /* name */
b34976b6 611 FALSE, /* partial_inplace */
5bd4f169
AM
612 0, /* src_mask */
613 0xffff, /* dst_mask */
b34976b6 614 FALSE), /* pcrel_offset */
5bd4f169 615
c061c2d8 616 /* 16-bit section relative relocation. */
5bd4f169
AM
617 HOWTO (R_PPC64_SECTOFF, /* type */
618 0, /* rightshift */
c061c2d8
AM
619 1, /* size (0 = byte, 1 = short, 2 = long) */
620 16, /* bitsize */
b34976b6 621 FALSE, /* pc_relative */
5bd4f169
AM
622 0, /* bitpos */
623 complain_overflow_bitfield, /* complain_on_overflow */
805fc799 624 ppc64_elf_sectoff_reloc, /* special_function */
5bd4f169 625 "R_PPC64_SECTOFF", /* name */
b34976b6 626 FALSE, /* partial_inplace */
5bd4f169 627 0, /* src_mask */
c061c2d8 628 0xffff, /* dst_mask */
b34976b6 629 FALSE), /* pcrel_offset */
5bd4f169 630
c061c2d8 631 /* Like R_PPC64_SECTOFF, but no overflow warning. */
5bd4f169
AM
632 HOWTO (R_PPC64_SECTOFF_LO, /* type */
633 0, /* rightshift */
634 1, /* size (0 = byte, 1 = short, 2 = long) */
635 16, /* bitsize */
b34976b6 636 FALSE, /* pc_relative */
5bd4f169
AM
637 0, /* bitpos */
638 complain_overflow_dont, /* complain_on_overflow */
805fc799 639 ppc64_elf_sectoff_reloc, /* special_function */
5bd4f169 640 "R_PPC64_SECTOFF_LO", /* name */
b34976b6 641 FALSE, /* partial_inplace */
5bd4f169
AM
642 0, /* src_mask */
643 0xffff, /* dst_mask */
b34976b6 644 FALSE), /* pcrel_offset */
5bd4f169
AM
645
646 /* 16-bit upper half section relative relocation. */
647 HOWTO (R_PPC64_SECTOFF_HI, /* type */
648 16, /* rightshift */
649 1, /* size (0 = byte, 1 = short, 2 = long) */
650 16, /* bitsize */
b34976b6 651 FALSE, /* pc_relative */
5bd4f169
AM
652 0, /* bitpos */
653 complain_overflow_dont, /* complain_on_overflow */
805fc799 654 ppc64_elf_sectoff_reloc, /* special_function */
5bd4f169 655 "R_PPC64_SECTOFF_HI", /* name */
b34976b6 656 FALSE, /* partial_inplace */
5bd4f169
AM
657 0, /* src_mask */
658 0xffff, /* dst_mask */
b34976b6 659 FALSE), /* pcrel_offset */
5bd4f169
AM
660
661 /* 16-bit upper half adjusted section relative relocation. */
662 HOWTO (R_PPC64_SECTOFF_HA, /* type */
663 16, /* rightshift */
664 1, /* size (0 = byte, 1 = short, 2 = long) */
665 16, /* bitsize */
b34976b6 666 FALSE, /* pc_relative */
5bd4f169
AM
667 0, /* bitpos */
668 complain_overflow_dont, /* complain_on_overflow */
805fc799 669 ppc64_elf_sectoff_ha_reloc, /* special_function */
5bd4f169 670 "R_PPC64_SECTOFF_HA", /* name */
b34976b6 671 FALSE, /* partial_inplace */
5bd4f169
AM
672 0, /* src_mask */
673 0xffff, /* dst_mask */
b34976b6 674 FALSE), /* pcrel_offset */
5bd4f169 675
04c9666a
AM
676 /* Like R_PPC64_REL24 without touching the two least significant bits. */
677 HOWTO (R_PPC64_REL30, /* type */
5bd4f169
AM
678 2, /* rightshift */
679 2, /* size (0 = byte, 1 = short, 2 = long) */
680 30, /* bitsize */
b34976b6 681 TRUE, /* pc_relative */
5bd4f169
AM
682 0, /* bitpos */
683 complain_overflow_dont, /* complain_on_overflow */
684 bfd_elf_generic_reloc, /* special_function */
04c9666a 685 "R_PPC64_REL30", /* name */
b34976b6 686 FALSE, /* partial_inplace */
d006db6c 687 0, /* src_mask */
5bd4f169 688 0xfffffffc, /* dst_mask */
b34976b6 689 TRUE), /* pcrel_offset */
5bd4f169
AM
690
691 /* Relocs in the 64-bit PowerPC ELF ABI, not in the 32-bit ABI. */
692
693 /* A standard 64-bit relocation. */
694 HOWTO (R_PPC64_ADDR64, /* type */
695 0, /* rightshift */
696 4, /* size (0=byte, 1=short, 2=long, 4=64 bits) */
697 64, /* bitsize */
b34976b6 698 FALSE, /* pc_relative */
5bd4f169
AM
699 0, /* bitpos */
700 complain_overflow_dont, /* complain_on_overflow */
701 bfd_elf_generic_reloc, /* special_function */
702 "R_PPC64_ADDR64", /* name */
b34976b6 703 FALSE, /* partial_inplace */
5bd4f169 704 0, /* src_mask */
f5e87a1d 705 ONES (64), /* dst_mask */
b34976b6 706 FALSE), /* pcrel_offset */
5bd4f169
AM
707
708 /* The bits 32-47 of an address. */
709 HOWTO (R_PPC64_ADDR16_HIGHER, /* type */
710 32, /* rightshift */
711 1, /* size (0 = byte, 1 = short, 2 = long) */
712 16, /* bitsize */
b34976b6 713 FALSE, /* pc_relative */
5bd4f169
AM
714 0, /* bitpos */
715 complain_overflow_dont, /* complain_on_overflow */
716 bfd_elf_generic_reloc, /* special_function */
717 "R_PPC64_ADDR16_HIGHER", /* name */
b34976b6 718 FALSE, /* partial_inplace */
5bd4f169
AM
719 0, /* src_mask */
720 0xffff, /* dst_mask */
b34976b6 721 FALSE), /* pcrel_offset */
5bd4f169
AM
722
723 /* The bits 32-47 of an address, plus 1 if the contents of the low
724 16 bits, treated as a signed number, is negative. */
725 HOWTO (R_PPC64_ADDR16_HIGHERA, /* type */
726 32, /* rightshift */
727 1, /* size (0 = byte, 1 = short, 2 = long) */
728 16, /* bitsize */
b34976b6 729 FALSE, /* pc_relative */
5bd4f169
AM
730 0, /* bitpos */
731 complain_overflow_dont, /* complain_on_overflow */
805fc799 732 ppc64_elf_ha_reloc, /* special_function */
5bd4f169 733 "R_PPC64_ADDR16_HIGHERA", /* name */
b34976b6 734 FALSE, /* partial_inplace */
5bd4f169
AM
735 0, /* src_mask */
736 0xffff, /* dst_mask */
b34976b6 737 FALSE), /* pcrel_offset */
5bd4f169
AM
738
739 /* The bits 48-63 of an address. */
740 HOWTO (R_PPC64_ADDR16_HIGHEST,/* type */
741 48, /* rightshift */
742 1, /* size (0 = byte, 1 = short, 2 = long) */
743 16, /* bitsize */
b34976b6 744 FALSE, /* pc_relative */
5bd4f169
AM
745 0, /* bitpos */
746 complain_overflow_dont, /* complain_on_overflow */
747 bfd_elf_generic_reloc, /* special_function */
748 "R_PPC64_ADDR16_HIGHEST", /* name */
b34976b6 749 FALSE, /* partial_inplace */
5bd4f169
AM
750 0, /* src_mask */
751 0xffff, /* dst_mask */
b34976b6 752 FALSE), /* pcrel_offset */
5bd4f169
AM
753
754 /* The bits 48-63 of an address, plus 1 if the contents of the low
755 16 bits, treated as a signed number, is negative. */
756 HOWTO (R_PPC64_ADDR16_HIGHESTA,/* type */
757 48, /* rightshift */
758 1, /* size (0 = byte, 1 = short, 2 = long) */
759 16, /* bitsize */
b34976b6 760 FALSE, /* pc_relative */
5bd4f169
AM
761 0, /* bitpos */
762 complain_overflow_dont, /* complain_on_overflow */
805fc799 763 ppc64_elf_ha_reloc, /* special_function */
5bd4f169 764 "R_PPC64_ADDR16_HIGHESTA", /* name */
b34976b6 765 FALSE, /* partial_inplace */
5bd4f169
AM
766 0, /* src_mask */
767 0xffff, /* dst_mask */
b34976b6 768 FALSE), /* pcrel_offset */
5bd4f169
AM
769
770 /* Like ADDR64, but may be unaligned. */
771 HOWTO (R_PPC64_UADDR64, /* type */
772 0, /* rightshift */
773 4, /* size (0=byte, 1=short, 2=long, 4=64 bits) */
774 64, /* bitsize */
b34976b6 775 FALSE, /* pc_relative */
5bd4f169
AM
776 0, /* bitpos */
777 complain_overflow_dont, /* complain_on_overflow */
778 bfd_elf_generic_reloc, /* special_function */
779 "R_PPC64_UADDR64", /* name */
b34976b6 780 FALSE, /* partial_inplace */
5bd4f169 781 0, /* src_mask */
f5e87a1d 782 ONES (64), /* dst_mask */
b34976b6 783 FALSE), /* pcrel_offset */
5bd4f169
AM
784
785 /* 64-bit relative relocation. */
786 HOWTO (R_PPC64_REL64, /* type */
787 0, /* rightshift */
788 4, /* size (0=byte, 1=short, 2=long, 4=64 bits) */
789 64, /* bitsize */
b34976b6 790 TRUE, /* pc_relative */
5bd4f169
AM
791 0, /* bitpos */
792 complain_overflow_dont, /* complain_on_overflow */
793 bfd_elf_generic_reloc, /* special_function */
794 "R_PPC64_REL64", /* name */
b34976b6 795 FALSE, /* partial_inplace */
5bd4f169 796 0, /* src_mask */
f5e87a1d 797 ONES (64), /* dst_mask */
b34976b6 798 TRUE), /* pcrel_offset */
5bd4f169 799
cedb70c5 800 /* 64-bit relocation to the symbol's procedure linkage table. */
5bd4f169
AM
801 HOWTO (R_PPC64_PLT64, /* type */
802 0, /* rightshift */
803 4, /* size (0=byte, 1=short, 2=long, 4=64 bits) */
804 64, /* bitsize */
b34976b6 805 FALSE, /* pc_relative */
5bd4f169
AM
806 0, /* bitpos */
807 complain_overflow_dont, /* complain_on_overflow */
805fc799 808 ppc64_elf_unhandled_reloc, /* special_function */
5bd4f169 809 "R_PPC64_PLT64", /* name */
b34976b6 810 FALSE, /* partial_inplace */
5bd4f169 811 0, /* src_mask */
f5e87a1d 812 ONES (64), /* dst_mask */
b34976b6 813 FALSE), /* pcrel_offset */
5bd4f169
AM
814
815 /* 64-bit PC relative relocation to the symbol's procedure linkage
816 table. */
817 /* FIXME: R_PPC64_PLTREL64 not supported. */
818 HOWTO (R_PPC64_PLTREL64, /* type */
819 0, /* rightshift */
820 4, /* size (0=byte, 1=short, 2=long, 4=64 bits) */
821 64, /* bitsize */
b34976b6 822 TRUE, /* pc_relative */
5bd4f169
AM
823 0, /* bitpos */
824 complain_overflow_dont, /* complain_on_overflow */
805fc799 825 ppc64_elf_unhandled_reloc, /* special_function */
5bd4f169 826 "R_PPC64_PLTREL64", /* name */
b34976b6 827 FALSE, /* partial_inplace */
5bd4f169 828 0, /* src_mask */
f5e87a1d 829 ONES (64), /* dst_mask */
b34976b6 830 TRUE), /* pcrel_offset */
5bd4f169
AM
831
832 /* 16 bit TOC-relative relocation. */
833
834 /* R_PPC64_TOC16 47 half16* S + A - .TOC. */
835 HOWTO (R_PPC64_TOC16, /* type */
836 0, /* rightshift */
837 1, /* size (0 = byte, 1 = short, 2 = long) */
838 16, /* bitsize */
b34976b6 839 FALSE, /* pc_relative */
5bd4f169
AM
840 0, /* bitpos */
841 complain_overflow_signed, /* complain_on_overflow */
805fc799 842 ppc64_elf_toc_reloc, /* special_function */
5bd4f169 843 "R_PPC64_TOC16", /* name */
b34976b6 844 FALSE, /* partial_inplace */
5bd4f169
AM
845 0, /* src_mask */
846 0xffff, /* dst_mask */
b34976b6 847 FALSE), /* pcrel_offset */
5bd4f169
AM
848
849 /* 16 bit TOC-relative relocation without overflow. */
850
851 /* R_PPC64_TOC16_LO 48 half16 #lo (S + A - .TOC.) */
852 HOWTO (R_PPC64_TOC16_LO, /* type */
853 0, /* rightshift */
854 1, /* size (0 = byte, 1 = short, 2 = long) */
855 16, /* bitsize */
b34976b6 856 FALSE, /* pc_relative */
5bd4f169
AM
857 0, /* bitpos */
858 complain_overflow_dont, /* complain_on_overflow */
805fc799 859 ppc64_elf_toc_reloc, /* special_function */
5bd4f169 860 "R_PPC64_TOC16_LO", /* name */
b34976b6 861 FALSE, /* partial_inplace */
5bd4f169
AM
862 0, /* src_mask */
863 0xffff, /* dst_mask */
b34976b6 864 FALSE), /* pcrel_offset */
5bd4f169
AM
865
866 /* 16 bit TOC-relative relocation, high 16 bits. */
867
868 /* R_PPC64_TOC16_HI 49 half16 #hi (S + A - .TOC.) */
869 HOWTO (R_PPC64_TOC16_HI, /* type */
870 16, /* rightshift */
871 1, /* size (0 = byte, 1 = short, 2 = long) */
872 16, /* bitsize */
b34976b6 873 FALSE, /* pc_relative */
5bd4f169
AM
874 0, /* bitpos */
875 complain_overflow_dont, /* complain_on_overflow */
805fc799 876 ppc64_elf_toc_reloc, /* special_function */
5bd4f169 877 "R_PPC64_TOC16_HI", /* name */
b34976b6 878 FALSE, /* partial_inplace */
5bd4f169
AM
879 0, /* src_mask */
880 0xffff, /* dst_mask */
b34976b6 881 FALSE), /* pcrel_offset */
5bd4f169
AM
882
883 /* 16 bit TOC-relative relocation, high 16 bits, plus 1 if the
884 contents of the low 16 bits, treated as a signed number, is
885 negative. */
886
887 /* R_PPC64_TOC16_HA 50 half16 #ha (S + A - .TOC.) */
888 HOWTO (R_PPC64_TOC16_HA, /* type */
889 16, /* rightshift */
890 1, /* size (0 = byte, 1 = short, 2 = long) */
891 16, /* bitsize */
b34976b6 892 FALSE, /* pc_relative */
5bd4f169
AM
893 0, /* bitpos */
894 complain_overflow_dont, /* complain_on_overflow */
805fc799 895 ppc64_elf_toc_ha_reloc, /* special_function */
5bd4f169 896 "R_PPC64_TOC16_HA", /* name */
b34976b6 897 FALSE, /* partial_inplace */
5bd4f169
AM
898 0, /* src_mask */
899 0xffff, /* dst_mask */
b34976b6 900 FALSE), /* pcrel_offset */
5bd4f169
AM
901
902 /* 64-bit relocation; insert value of TOC base (.TOC.). */
903
904 /* R_PPC64_TOC 51 doubleword64 .TOC. */
905 HOWTO (R_PPC64_TOC, /* type */
906 0, /* rightshift */
907 4, /* size (0=byte, 1=short, 2=long, 4=64 bits) */
908 64, /* bitsize */
b34976b6 909 FALSE, /* pc_relative */
5bd4f169
AM
910 0, /* bitpos */
911 complain_overflow_bitfield, /* complain_on_overflow */
805fc799 912 ppc64_elf_toc64_reloc, /* special_function */
5bd4f169 913 "R_PPC64_TOC", /* name */
b34976b6 914 FALSE, /* partial_inplace */
5bd4f169 915 0, /* src_mask */
f5e87a1d 916 ONES (64), /* dst_mask */
b34976b6 917 FALSE), /* pcrel_offset */
5bd4f169
AM
918
919 /* Like R_PPC64_GOT16, but also informs the link editor that the
920 value to relocate may (!) refer to a PLT entry which the link
921 editor (a) may replace with the symbol value. If the link editor
922 is unable to fully resolve the symbol, it may (b) create a PLT
923 entry and store the address to the new PLT entry in the GOT.
924 This permits lazy resolution of function symbols at run time.
925 The link editor may also skip all of this and just (c) emit a
926 R_PPC64_GLOB_DAT to tie the symbol to the GOT entry. */
927 /* FIXME: R_PPC64_PLTGOT16 not implemented. */
928 HOWTO (R_PPC64_PLTGOT16, /* type */
929 0, /* rightshift */
930 1, /* size (0 = byte, 1 = short, 2 = long) */
931 16, /* bitsize */
b34976b6 932 FALSE, /* pc_relative */
5bd4f169
AM
933 0, /* bitpos */
934 complain_overflow_signed, /* complain_on_overflow */
805fc799 935 ppc64_elf_unhandled_reloc, /* special_function */
411e1bfb
AM
936 "R_PPC64_PLTGOT16", /* name */
937 FALSE, /* partial_inplace */
938 0, /* src_mask */
939 0xffff, /* dst_mask */
940 FALSE), /* pcrel_offset */
941
942 /* Like R_PPC64_PLTGOT16, but without overflow. */
943 /* FIXME: R_PPC64_PLTGOT16_LO not implemented. */
944 HOWTO (R_PPC64_PLTGOT16_LO, /* type */
945 0, /* rightshift */
946 1, /* size (0 = byte, 1 = short, 2 = long) */
947 16, /* bitsize */
948 FALSE, /* pc_relative */
949 0, /* bitpos */
950 complain_overflow_dont, /* complain_on_overflow */
951 ppc64_elf_unhandled_reloc, /* special_function */
952 "R_PPC64_PLTGOT16_LO", /* name */
953 FALSE, /* partial_inplace */
954 0, /* src_mask */
955 0xffff, /* dst_mask */
956 FALSE), /* pcrel_offset */
957
958 /* Like R_PPC64_PLT_GOT16, but using bits 16-31 of the address. */
959 /* FIXME: R_PPC64_PLTGOT16_HI not implemented. */
960 HOWTO (R_PPC64_PLTGOT16_HI, /* type */
961 16, /* rightshift */
962 1, /* size (0 = byte, 1 = short, 2 = long) */
963 16, /* bitsize */
964 FALSE, /* pc_relative */
965 0, /* bitpos */
966 complain_overflow_dont, /* complain_on_overflow */
967 ppc64_elf_unhandled_reloc, /* special_function */
968 "R_PPC64_PLTGOT16_HI", /* name */
969 FALSE, /* partial_inplace */
970 0, /* src_mask */
971 0xffff, /* dst_mask */
972 FALSE), /* pcrel_offset */
973
974 /* Like R_PPC64_PLT_GOT16, but using bits 16-31 of the address, plus
975 1 if the contents of the low 16 bits, treated as a signed number,
976 is negative. */
977 /* FIXME: R_PPC64_PLTGOT16_HA not implemented. */
978 HOWTO (R_PPC64_PLTGOT16_HA, /* type */
979 16, /* rightshift */
980 1, /* size (0 = byte, 1 = short, 2 = long) */
981 16, /* bitsize */
982 FALSE, /* pc_relative */
983 0, /* bitpos */
984 complain_overflow_dont,/* complain_on_overflow */
985 ppc64_elf_unhandled_reloc, /* special_function */
986 "R_PPC64_PLTGOT16_HA", /* name */
987 FALSE, /* partial_inplace */
988 0, /* src_mask */
989 0xffff, /* dst_mask */
990 FALSE), /* pcrel_offset */
991
992 /* Like R_PPC64_ADDR16, but for instructions with a DS field. */
993 HOWTO (R_PPC64_ADDR16_DS, /* type */
994 0, /* rightshift */
995 1, /* size (0 = byte, 1 = short, 2 = long) */
996 16, /* bitsize */
997 FALSE, /* pc_relative */
998 0, /* bitpos */
999 complain_overflow_bitfield, /* complain_on_overflow */
1000 bfd_elf_generic_reloc, /* special_function */
1001 "R_PPC64_ADDR16_DS", /* name */
1002 FALSE, /* partial_inplace */
1003 0, /* src_mask */
1004 0xfffc, /* dst_mask */
1005 FALSE), /* pcrel_offset */
1006
1007 /* Like R_PPC64_ADDR16_LO, but for instructions with a DS field. */
1008 HOWTO (R_PPC64_ADDR16_LO_DS, /* type */
1009 0, /* rightshift */
1010 1, /* size (0 = byte, 1 = short, 2 = long) */
1011 16, /* bitsize */
1012 FALSE, /* pc_relative */
1013 0, /* bitpos */
1014 complain_overflow_dont,/* complain_on_overflow */
1015 bfd_elf_generic_reloc, /* special_function */
1016 "R_PPC64_ADDR16_LO_DS",/* name */
1017 FALSE, /* partial_inplace */
1018 0, /* src_mask */
1019 0xfffc, /* dst_mask */
1020 FALSE), /* pcrel_offset */
1021
1022 /* Like R_PPC64_GOT16, but for instructions with a DS field. */
1023 HOWTO (R_PPC64_GOT16_DS, /* type */
1024 0, /* rightshift */
1025 1, /* size (0 = byte, 1 = short, 2 = long) */
1026 16, /* bitsize */
1027 FALSE, /* pc_relative */
1028 0, /* bitpos */
1029 complain_overflow_signed, /* complain_on_overflow */
1030 ppc64_elf_unhandled_reloc, /* special_function */
1031 "R_PPC64_GOT16_DS", /* name */
1032 FALSE, /* partial_inplace */
1033 0, /* src_mask */
1034 0xfffc, /* dst_mask */
1035 FALSE), /* pcrel_offset */
1036
1037 /* Like R_PPC64_GOT16_LO, but for instructions with a DS field. */
1038 HOWTO (R_PPC64_GOT16_LO_DS, /* type */
1039 0, /* rightshift */
1040 1, /* size (0 = byte, 1 = short, 2 = long) */
1041 16, /* bitsize */
1042 FALSE, /* pc_relative */
1043 0, /* bitpos */
1044 complain_overflow_dont, /* complain_on_overflow */
1045 ppc64_elf_unhandled_reloc, /* special_function */
1046 "R_PPC64_GOT16_LO_DS", /* name */
1047 FALSE, /* partial_inplace */
1048 0, /* src_mask */
1049 0xfffc, /* dst_mask */
1050 FALSE), /* pcrel_offset */
1051
1052 /* Like R_PPC64_PLT16_LO, but for instructions with a DS field. */
1053 HOWTO (R_PPC64_PLT16_LO_DS, /* type */
1054 0, /* rightshift */
1055 1, /* size (0 = byte, 1 = short, 2 = long) */
1056 16, /* bitsize */
1057 FALSE, /* pc_relative */
1058 0, /* bitpos */
1059 complain_overflow_dont, /* complain_on_overflow */
1060 ppc64_elf_unhandled_reloc, /* special_function */
1061 "R_PPC64_PLT16_LO_DS", /* name */
1062 FALSE, /* partial_inplace */
1063 0, /* src_mask */
1064 0xfffc, /* dst_mask */
1065 FALSE), /* pcrel_offset */
1066
1067 /* Like R_PPC64_SECTOFF, but for instructions with a DS field. */
1068 HOWTO (R_PPC64_SECTOFF_DS, /* type */
1069 0, /* rightshift */
1070 1, /* size (0 = byte, 1 = short, 2 = long) */
1071 16, /* bitsize */
1072 FALSE, /* pc_relative */
1073 0, /* bitpos */
1074 complain_overflow_bitfield, /* complain_on_overflow */
1075 ppc64_elf_sectoff_reloc, /* special_function */
1076 "R_PPC64_SECTOFF_DS", /* name */
1077 FALSE, /* partial_inplace */
1078 0, /* src_mask */
1079 0xfffc, /* dst_mask */
1080 FALSE), /* pcrel_offset */
1081
1082 /* Like R_PPC64_SECTOFF_LO, but for instructions with a DS field. */
1083 HOWTO (R_PPC64_SECTOFF_LO_DS, /* type */
1084 0, /* rightshift */
1085 1, /* size (0 = byte, 1 = short, 2 = long) */
1086 16, /* bitsize */
1087 FALSE, /* pc_relative */
1088 0, /* bitpos */
1089 complain_overflow_dont, /* complain_on_overflow */
1090 ppc64_elf_sectoff_reloc, /* special_function */
1091 "R_PPC64_SECTOFF_LO_DS",/* name */
1092 FALSE, /* partial_inplace */
1093 0, /* src_mask */
1094 0xfffc, /* dst_mask */
1095 FALSE), /* pcrel_offset */
1096
1097 /* Like R_PPC64_TOC16, but for instructions with a DS field. */
1098 HOWTO (R_PPC64_TOC16_DS, /* type */
1099 0, /* rightshift */
1100 1, /* size (0 = byte, 1 = short, 2 = long) */
1101 16, /* bitsize */
1102 FALSE, /* pc_relative */
1103 0, /* bitpos */
1104 complain_overflow_signed, /* complain_on_overflow */
1105 ppc64_elf_toc_reloc, /* special_function */
1106 "R_PPC64_TOC16_DS", /* name */
1107 FALSE, /* partial_inplace */
1108 0, /* src_mask */
1109 0xfffc, /* dst_mask */
1110 FALSE), /* pcrel_offset */
1111
1112 /* Like R_PPC64_TOC16_LO, but for instructions with a DS field. */
1113 HOWTO (R_PPC64_TOC16_LO_DS, /* type */
1114 0, /* rightshift */
1115 1, /* size (0 = byte, 1 = short, 2 = long) */
1116 16, /* bitsize */
1117 FALSE, /* pc_relative */
1118 0, /* bitpos */
1119 complain_overflow_dont, /* complain_on_overflow */
1120 ppc64_elf_toc_reloc, /* special_function */
1121 "R_PPC64_TOC16_LO_DS", /* name */
1122 FALSE, /* partial_inplace */
1123 0, /* src_mask */
1124 0xfffc, /* dst_mask */
1125 FALSE), /* pcrel_offset */
1126
1127 /* Like R_PPC64_PLTGOT16, but for instructions with a DS field. */
1128 /* FIXME: R_PPC64_PLTGOT16_DS not implemented. */
1129 HOWTO (R_PPC64_PLTGOT16_DS, /* type */
1130 0, /* rightshift */
1131 1, /* size (0 = byte, 1 = short, 2 = long) */
1132 16, /* bitsize */
1133 FALSE, /* pc_relative */
1134 0, /* bitpos */
1135 complain_overflow_signed, /* complain_on_overflow */
1136 ppc64_elf_unhandled_reloc, /* special_function */
1137 "R_PPC64_PLTGOT16_DS", /* name */
1138 FALSE, /* partial_inplace */
1139 0, /* src_mask */
1140 0xfffc, /* dst_mask */
1141 FALSE), /* pcrel_offset */
1142
1143 /* Like R_PPC64_PLTGOT16_LO, but for instructions with a DS field. */
1144 /* FIXME: R_PPC64_PLTGOT16_LO not implemented. */
1145 HOWTO (R_PPC64_PLTGOT16_LO_DS,/* type */
1146 0, /* rightshift */
1147 1, /* size (0 = byte, 1 = short, 2 = long) */
1148 16, /* bitsize */
1149 FALSE, /* pc_relative */
1150 0, /* bitpos */
1151 complain_overflow_dont, /* complain_on_overflow */
1152 ppc64_elf_unhandled_reloc, /* special_function */
1153 "R_PPC64_PLTGOT16_LO_DS",/* name */
1154 FALSE, /* partial_inplace */
1155 0, /* src_mask */
1156 0xfffc, /* dst_mask */
1157 FALSE), /* pcrel_offset */
1158
1159 /* Marker reloc for TLS. */
1160 HOWTO (R_PPC64_TLS,
1161 0, /* rightshift */
1162 2, /* size (0 = byte, 1 = short, 2 = long) */
1163 32, /* bitsize */
1164 FALSE, /* pc_relative */
1165 0, /* bitpos */
1166 complain_overflow_dont, /* complain_on_overflow */
1167 bfd_elf_generic_reloc, /* special_function */
1168 "R_PPC64_TLS", /* name */
1169 FALSE, /* partial_inplace */
1170 0, /* src_mask */
1171 0, /* dst_mask */
1172 FALSE), /* pcrel_offset */
1173
1174 /* Computes the load module index of the load module that contains the
1175 definition of its TLS sym. */
1176 HOWTO (R_PPC64_DTPMOD64,
1177 0, /* rightshift */
1178 4, /* size (0 = byte, 1 = short, 2 = long) */
1179 64, /* bitsize */
1180 FALSE, /* pc_relative */
1181 0, /* bitpos */
1182 complain_overflow_dont, /* complain_on_overflow */
1183 ppc64_elf_unhandled_reloc, /* special_function */
1184 "R_PPC64_DTPMOD64", /* name */
1185 FALSE, /* partial_inplace */
1186 0, /* src_mask */
1187 ONES (64), /* dst_mask */
1188 FALSE), /* pcrel_offset */
1189
1190 /* Computes a dtv-relative displacement, the difference between the value
1191 of sym+add and the base address of the thread-local storage block that
1192 contains the definition of sym, minus 0x8000. */
1193 HOWTO (R_PPC64_DTPREL64,
1194 0, /* rightshift */
1195 4, /* size (0 = byte, 1 = short, 2 = long) */
1196 64, /* bitsize */
1197 FALSE, /* pc_relative */
1198 0, /* bitpos */
1199 complain_overflow_dont, /* complain_on_overflow */
1200 ppc64_elf_unhandled_reloc, /* special_function */
1201 "R_PPC64_DTPREL64", /* name */
1202 FALSE, /* partial_inplace */
1203 0, /* src_mask */
1204 ONES (64), /* dst_mask */
1205 FALSE), /* pcrel_offset */
1206
1207 /* A 16 bit dtprel reloc. */
1208 HOWTO (R_PPC64_DTPREL16,
1209 0, /* rightshift */
1210 1, /* size (0 = byte, 1 = short, 2 = long) */
1211 16, /* bitsize */
1212 FALSE, /* pc_relative */
1213 0, /* bitpos */
1214 complain_overflow_signed, /* complain_on_overflow */
1215 ppc64_elf_unhandled_reloc, /* special_function */
1216 "R_PPC64_DTPREL16", /* name */
1217 FALSE, /* partial_inplace */
1218 0, /* src_mask */
1219 0xffff, /* dst_mask */
1220 FALSE), /* pcrel_offset */
1221
1222 /* Like DTPREL16, but no overflow. */
1223 HOWTO (R_PPC64_DTPREL16_LO,
1224 0, /* rightshift */
1225 1, /* size (0 = byte, 1 = short, 2 = long) */
1226 16, /* bitsize */
1227 FALSE, /* pc_relative */
1228 0, /* bitpos */
1229 complain_overflow_dont, /* complain_on_overflow */
1230 ppc64_elf_unhandled_reloc, /* special_function */
1231 "R_PPC64_DTPREL16_LO", /* name */
1232 FALSE, /* partial_inplace */
1233 0, /* src_mask */
1234 0xffff, /* dst_mask */
1235 FALSE), /* pcrel_offset */
1236
1237 /* Like DTPREL16_LO, but next higher group of 16 bits. */
1238 HOWTO (R_PPC64_DTPREL16_HI,
1239 16, /* rightshift */
1240 1, /* size (0 = byte, 1 = short, 2 = long) */
1241 16, /* bitsize */
1242 FALSE, /* pc_relative */
1243 0, /* bitpos */
1244 complain_overflow_dont, /* complain_on_overflow */
1245 ppc64_elf_unhandled_reloc, /* special_function */
1246 "R_PPC64_DTPREL16_HI", /* name */
1247 FALSE, /* partial_inplace */
1248 0, /* src_mask */
1249 0xffff, /* dst_mask */
1250 FALSE), /* pcrel_offset */
1251
1252 /* Like DTPREL16_HI, but adjust for low 16 bits. */
1253 HOWTO (R_PPC64_DTPREL16_HA,
1254 16, /* rightshift */
1255 1, /* size (0 = byte, 1 = short, 2 = long) */
1256 16, /* bitsize */
1257 FALSE, /* pc_relative */
1258 0, /* bitpos */
1259 complain_overflow_dont, /* complain_on_overflow */
1260 ppc64_elf_unhandled_reloc, /* special_function */
1261 "R_PPC64_DTPREL16_HA", /* name */
1262 FALSE, /* partial_inplace */
1263 0, /* src_mask */
1264 0xffff, /* dst_mask */
1265 FALSE), /* pcrel_offset */
1266
1267 /* Like DTPREL16_HI, but next higher group of 16 bits. */
1268 HOWTO (R_PPC64_DTPREL16_HIGHER,
1269 32, /* rightshift */
1270 1, /* size (0 = byte, 1 = short, 2 = long) */
1271 16, /* bitsize */
1272 FALSE, /* pc_relative */
1273 0, /* bitpos */
1274 complain_overflow_dont, /* complain_on_overflow */
1275 ppc64_elf_unhandled_reloc, /* special_function */
1276 "R_PPC64_DTPREL16_HIGHER", /* name */
1277 FALSE, /* partial_inplace */
1278 0, /* src_mask */
1279 0xffff, /* dst_mask */
1280 FALSE), /* pcrel_offset */
1281
1282 /* Like DTPREL16_HIGHER, but adjust for low 16 bits. */
1283 HOWTO (R_PPC64_DTPREL16_HIGHERA,
1284 32, /* rightshift */
1285 1, /* size (0 = byte, 1 = short, 2 = long) */
1286 16, /* bitsize */
1287 FALSE, /* pc_relative */
1288 0, /* bitpos */
1289 complain_overflow_dont, /* complain_on_overflow */
1290 ppc64_elf_unhandled_reloc, /* special_function */
1291 "R_PPC64_DTPREL16_HIGHERA", /* name */
1292 FALSE, /* partial_inplace */
1293 0, /* src_mask */
1294 0xffff, /* dst_mask */
1295 FALSE), /* pcrel_offset */
1296
1297 /* Like DTPREL16_HIGHER, but next higher group of 16 bits. */
1298 HOWTO (R_PPC64_DTPREL16_HIGHEST,
1299 48, /* rightshift */
1300 1, /* size (0 = byte, 1 = short, 2 = long) */
1301 16, /* bitsize */
1302 FALSE, /* pc_relative */
1303 0, /* bitpos */
1304 complain_overflow_dont, /* complain_on_overflow */
1305 ppc64_elf_unhandled_reloc, /* special_function */
1306 "R_PPC64_DTPREL16_HIGHEST", /* name */
1307 FALSE, /* partial_inplace */
1308 0, /* src_mask */
1309 0xffff, /* dst_mask */
1310 FALSE), /* pcrel_offset */
1311
1312 /* Like DTPREL16_HIGHEST, but adjust for low 16 bits. */
1313 HOWTO (R_PPC64_DTPREL16_HIGHESTA,
1314 48, /* rightshift */
1315 1, /* size (0 = byte, 1 = short, 2 = long) */
1316 16, /* bitsize */
1317 FALSE, /* pc_relative */
1318 0, /* bitpos */
1319 complain_overflow_dont, /* complain_on_overflow */
1320 ppc64_elf_unhandled_reloc, /* special_function */
1321 "R_PPC64_DTPREL16_HIGHESTA", /* name */
1322 FALSE, /* partial_inplace */
1323 0, /* src_mask */
1324 0xffff, /* dst_mask */
1325 FALSE), /* pcrel_offset */
1326
1327 /* Like DTPREL16, but for insns with a DS field. */
1328 HOWTO (R_PPC64_DTPREL16_DS,
1329 0, /* rightshift */
1330 1, /* size (0 = byte, 1 = short, 2 = long) */
1331 16, /* bitsize */
1332 FALSE, /* pc_relative */
1333 0, /* bitpos */
1334 complain_overflow_signed, /* complain_on_overflow */
1335 ppc64_elf_unhandled_reloc, /* special_function */
1336 "R_PPC64_DTPREL16_DS", /* name */
1337 FALSE, /* partial_inplace */
1338 0, /* src_mask */
1339 0xfffc, /* dst_mask */
1340 FALSE), /* pcrel_offset */
1341
1342 /* Like DTPREL16_DS, but no overflow. */
1343 HOWTO (R_PPC64_DTPREL16_LO_DS,
1344 0, /* rightshift */
1345 1, /* size (0 = byte, 1 = short, 2 = long) */
1346 16, /* bitsize */
1347 FALSE, /* pc_relative */
1348 0, /* bitpos */
1349 complain_overflow_dont, /* complain_on_overflow */
1350 ppc64_elf_unhandled_reloc, /* special_function */
1351 "R_PPC64_DTPREL16_LO_DS", /* name */
1352 FALSE, /* partial_inplace */
1353 0, /* src_mask */
1354 0xfffc, /* dst_mask */
1355 FALSE), /* pcrel_offset */
1356
1357 /* Computes a tp-relative displacement, the difference between the value of
1358 sym+add and the value of the thread pointer (r13). */
1359 HOWTO (R_PPC64_TPREL64,
1360 0, /* rightshift */
1361 4, /* size (0 = byte, 1 = short, 2 = long) */
1362 64, /* bitsize */
1363 FALSE, /* pc_relative */
1364 0, /* bitpos */
1365 complain_overflow_dont, /* complain_on_overflow */
1366 ppc64_elf_unhandled_reloc, /* special_function */
1367 "R_PPC64_TPREL64", /* name */
1368 FALSE, /* partial_inplace */
1369 0, /* src_mask */
1370 ONES (64), /* dst_mask */
1371 FALSE), /* pcrel_offset */
1372
1373 /* A 16 bit tprel reloc. */
1374 HOWTO (R_PPC64_TPREL16,
1375 0, /* rightshift */
1376 1, /* size (0 = byte, 1 = short, 2 = long) */
1377 16, /* bitsize */
1378 FALSE, /* pc_relative */
1379 0, /* bitpos */
1380 complain_overflow_signed, /* complain_on_overflow */
1381 ppc64_elf_unhandled_reloc, /* special_function */
1382 "R_PPC64_TPREL16", /* name */
1383 FALSE, /* partial_inplace */
1384 0, /* src_mask */
1385 0xffff, /* dst_mask */
1386 FALSE), /* pcrel_offset */
1387
1388 /* Like TPREL16, but no overflow. */
1389 HOWTO (R_PPC64_TPREL16_LO,
1390 0, /* rightshift */
1391 1, /* size (0 = byte, 1 = short, 2 = long) */
1392 16, /* bitsize */
1393 FALSE, /* pc_relative */
1394 0, /* bitpos */
1395 complain_overflow_dont, /* complain_on_overflow */
1396 ppc64_elf_unhandled_reloc, /* special_function */
1397 "R_PPC64_TPREL16_LO", /* name */
1398 FALSE, /* partial_inplace */
1399 0, /* src_mask */
1400 0xffff, /* dst_mask */
1401 FALSE), /* pcrel_offset */
1402
1403 /* Like TPREL16_LO, but next higher group of 16 bits. */
1404 HOWTO (R_PPC64_TPREL16_HI,
1405 16, /* rightshift */
1406 1, /* size (0 = byte, 1 = short, 2 = long) */
1407 16, /* bitsize */
1408 FALSE, /* pc_relative */
1409 0, /* bitpos */
1410 complain_overflow_dont, /* complain_on_overflow */
1411 ppc64_elf_unhandled_reloc, /* special_function */
1412 "R_PPC64_TPREL16_HI", /* name */
1413 FALSE, /* partial_inplace */
1414 0, /* src_mask */
1415 0xffff, /* dst_mask */
1416 FALSE), /* pcrel_offset */
1417
1418 /* Like TPREL16_HI, but adjust for low 16 bits. */
1419 HOWTO (R_PPC64_TPREL16_HA,
1420 16, /* rightshift */
1421 1, /* size (0 = byte, 1 = short, 2 = long) */
1422 16, /* bitsize */
1423 FALSE, /* pc_relative */
1424 0, /* bitpos */
1425 complain_overflow_dont, /* complain_on_overflow */
1426 ppc64_elf_unhandled_reloc, /* special_function */
1427 "R_PPC64_TPREL16_HA", /* name */
1428 FALSE, /* partial_inplace */
1429 0, /* src_mask */
1430 0xffff, /* dst_mask */
1431 FALSE), /* pcrel_offset */
1432
1433 /* Like TPREL16_HI, but next higher group of 16 bits. */
1434 HOWTO (R_PPC64_TPREL16_HIGHER,
1435 32, /* rightshift */
1436 1, /* size (0 = byte, 1 = short, 2 = long) */
1437 16, /* bitsize */
1438 FALSE, /* pc_relative */
1439 0, /* bitpos */
1440 complain_overflow_dont, /* complain_on_overflow */
1441 ppc64_elf_unhandled_reloc, /* special_function */
1442 "R_PPC64_TPREL16_HIGHER", /* name */
1443 FALSE, /* partial_inplace */
1444 0, /* src_mask */
1445 0xffff, /* dst_mask */
1446 FALSE), /* pcrel_offset */
1447
1448 /* Like TPREL16_HIGHER, but adjust for low 16 bits. */
1449 HOWTO (R_PPC64_TPREL16_HIGHERA,
1450 32, /* rightshift */
1451 1, /* size (0 = byte, 1 = short, 2 = long) */
1452 16, /* bitsize */
1453 FALSE, /* pc_relative */
1454 0, /* bitpos */
1455 complain_overflow_dont, /* complain_on_overflow */
1456 ppc64_elf_unhandled_reloc, /* special_function */
1457 "R_PPC64_TPREL16_HIGHERA", /* name */
1458 FALSE, /* partial_inplace */
1459 0, /* src_mask */
1460 0xffff, /* dst_mask */
1461 FALSE), /* pcrel_offset */
1462
1463 /* Like TPREL16_HIGHER, but next higher group of 16 bits. */
1464 HOWTO (R_PPC64_TPREL16_HIGHEST,
1465 48, /* rightshift */
1466 1, /* size (0 = byte, 1 = short, 2 = long) */
1467 16, /* bitsize */
1468 FALSE, /* pc_relative */
1469 0, /* bitpos */
1470 complain_overflow_dont, /* complain_on_overflow */
1471 ppc64_elf_unhandled_reloc, /* special_function */
1472 "R_PPC64_TPREL16_HIGHEST", /* name */
1473 FALSE, /* partial_inplace */
1474 0, /* src_mask */
1475 0xffff, /* dst_mask */
1476 FALSE), /* pcrel_offset */
1477
1478 /* Like TPREL16_HIGHEST, but adjust for low 16 bits. */
1479 HOWTO (R_PPC64_TPREL16_HIGHESTA,
1480 48, /* rightshift */
1481 1, /* size (0 = byte, 1 = short, 2 = long) */
1482 16, /* bitsize */
1483 FALSE, /* pc_relative */
1484 0, /* bitpos */
1485 complain_overflow_dont, /* complain_on_overflow */
1486 ppc64_elf_unhandled_reloc, /* special_function */
1487 "R_PPC64_TPREL16_HIGHESTA", /* name */
1488 FALSE, /* partial_inplace */
1489 0, /* src_mask */
1490 0xffff, /* dst_mask */
1491 FALSE), /* pcrel_offset */
1492
1493 /* Like TPREL16, but for insns with a DS field. */
1494 HOWTO (R_PPC64_TPREL16_DS,
1495 0, /* rightshift */
1496 1, /* size (0 = byte, 1 = short, 2 = long) */
1497 16, /* bitsize */
1498 FALSE, /* pc_relative */
1499 0, /* bitpos */
1500 complain_overflow_signed, /* complain_on_overflow */
1501 ppc64_elf_unhandled_reloc, /* special_function */
1502 "R_PPC64_TPREL16_DS", /* name */
1503 FALSE, /* partial_inplace */
1504 0, /* src_mask */
1505 0xfffc, /* dst_mask */
1506 FALSE), /* pcrel_offset */
1507
1508 /* Like TPREL16_DS, but no overflow. */
1509 HOWTO (R_PPC64_TPREL16_LO_DS,
1510 0, /* rightshift */
1511 1, /* size (0 = byte, 1 = short, 2 = long) */
1512 16, /* bitsize */
1513 FALSE, /* pc_relative */
1514 0, /* bitpos */
1515 complain_overflow_dont, /* complain_on_overflow */
1516 ppc64_elf_unhandled_reloc, /* special_function */
1517 "R_PPC64_TPREL16_LO_DS", /* name */
1518 FALSE, /* partial_inplace */
1519 0, /* src_mask */
1520 0xfffc, /* dst_mask */
1521 FALSE), /* pcrel_offset */
1522
1523 /* Allocates two contiguous entries in the GOT to hold a tls_index structure,
1524 with values (sym+add)@dtpmod and (sym+add)@dtprel, and computes the offset
1525 to the first entry relative to the TOC base (r2). */
1526 HOWTO (R_PPC64_GOT_TLSGD16,
1527 0, /* rightshift */
1528 1, /* size (0 = byte, 1 = short, 2 = long) */
1529 16, /* bitsize */
1530 FALSE, /* pc_relative */
1531 0, /* bitpos */
1532 complain_overflow_signed, /* complain_on_overflow */
1533 ppc64_elf_unhandled_reloc, /* special_function */
1534 "R_PPC64_GOT_TLSGD16", /* name */
b34976b6 1535 FALSE, /* partial_inplace */
5bd4f169
AM
1536 0, /* src_mask */
1537 0xffff, /* dst_mask */
b34976b6 1538 FALSE), /* pcrel_offset */
5bd4f169 1539
411e1bfb
AM
1540 /* Like GOT_TLSGD16, but no overflow. */
1541 HOWTO (R_PPC64_GOT_TLSGD16_LO,
5bd4f169
AM
1542 0, /* rightshift */
1543 1, /* size (0 = byte, 1 = short, 2 = long) */
1544 16, /* bitsize */
b34976b6 1545 FALSE, /* pc_relative */
5bd4f169
AM
1546 0, /* bitpos */
1547 complain_overflow_dont, /* complain_on_overflow */
805fc799 1548 ppc64_elf_unhandled_reloc, /* special_function */
411e1bfb 1549 "R_PPC64_GOT_TLSGD16_LO", /* name */
b34976b6 1550 FALSE, /* partial_inplace */
5bd4f169
AM
1551 0, /* src_mask */
1552 0xffff, /* dst_mask */
b34976b6 1553 FALSE), /* pcrel_offset */
5bd4f169 1554
411e1bfb
AM
1555 /* Like GOT_TLSGD16_LO, but next higher group of 16 bits. */
1556 HOWTO (R_PPC64_GOT_TLSGD16_HI,
5bd4f169
AM
1557 16, /* rightshift */
1558 1, /* size (0 = byte, 1 = short, 2 = long) */
1559 16, /* bitsize */
b34976b6 1560 FALSE, /* pc_relative */
5bd4f169
AM
1561 0, /* bitpos */
1562 complain_overflow_dont, /* complain_on_overflow */
805fc799 1563 ppc64_elf_unhandled_reloc, /* special_function */
411e1bfb 1564 "R_PPC64_GOT_TLSGD16_HI", /* name */
b34976b6 1565 FALSE, /* partial_inplace */
5bd4f169
AM
1566 0, /* src_mask */
1567 0xffff, /* dst_mask */
b34976b6 1568 FALSE), /* pcrel_offset */
5bd4f169 1569
411e1bfb
AM
1570 /* Like GOT_TLSGD16_HI, but adjust for low 16 bits. */
1571 HOWTO (R_PPC64_GOT_TLSGD16_HA,
5bd4f169
AM
1572 16, /* rightshift */
1573 1, /* size (0 = byte, 1 = short, 2 = long) */
1574 16, /* bitsize */
b34976b6 1575 FALSE, /* pc_relative */
5bd4f169 1576 0, /* bitpos */
411e1bfb 1577 complain_overflow_dont, /* complain_on_overflow */
805fc799 1578 ppc64_elf_unhandled_reloc, /* special_function */
411e1bfb 1579 "R_PPC64_GOT_TLSGD16_HA", /* name */
b34976b6 1580 FALSE, /* partial_inplace */
5bd4f169
AM
1581 0, /* src_mask */
1582 0xffff, /* dst_mask */
b34976b6 1583 FALSE), /* pcrel_offset */
5bd4f169 1584
411e1bfb
AM
1585 /* Allocates two contiguous entries in the GOT to hold a tls_index structure,
1586 with values (sym+add)@dtpmod and zero, and computes the offset to the
1587 first entry relative to the TOC base (r2). */
1588 HOWTO (R_PPC64_GOT_TLSLD16,
5bd4f169
AM
1589 0, /* rightshift */
1590 1, /* size (0 = byte, 1 = short, 2 = long) */
1591 16, /* bitsize */
b34976b6 1592 FALSE, /* pc_relative */
5bd4f169 1593 0, /* bitpos */
411e1bfb
AM
1594 complain_overflow_signed, /* complain_on_overflow */
1595 ppc64_elf_unhandled_reloc, /* special_function */
1596 "R_PPC64_GOT_TLSLD16", /* name */
b34976b6 1597 FALSE, /* partial_inplace */
d006db6c 1598 0, /* src_mask */
411e1bfb 1599 0xffff, /* dst_mask */
b34976b6 1600 FALSE), /* pcrel_offset */
5bd4f169 1601
411e1bfb
AM
1602 /* Like GOT_TLSLD16, but no overflow. */
1603 HOWTO (R_PPC64_GOT_TLSLD16_LO,
5bd4f169
AM
1604 0, /* rightshift */
1605 1, /* size (0 = byte, 1 = short, 2 = long) */
1606 16, /* bitsize */
b34976b6 1607 FALSE, /* pc_relative */
5bd4f169 1608 0, /* bitpos */
411e1bfb
AM
1609 complain_overflow_dont, /* complain_on_overflow */
1610 ppc64_elf_unhandled_reloc, /* special_function */
1611 "R_PPC64_GOT_TLSLD16_LO", /* name */
b34976b6 1612 FALSE, /* partial_inplace */
d006db6c 1613 0, /* src_mask */
411e1bfb 1614 0xffff, /* dst_mask */
b34976b6 1615 FALSE), /* pcrel_offset */
5bd4f169 1616
411e1bfb
AM
1617 /* Like GOT_TLSLD16_LO, but next higher group of 16 bits. */
1618 HOWTO (R_PPC64_GOT_TLSLD16_HI,
1619 16, /* rightshift */
5bd4f169
AM
1620 1, /* size (0 = byte, 1 = short, 2 = long) */
1621 16, /* bitsize */
b34976b6 1622 FALSE, /* pc_relative */
5bd4f169 1623 0, /* bitpos */
411e1bfb 1624 complain_overflow_dont, /* complain_on_overflow */
805fc799 1625 ppc64_elf_unhandled_reloc, /* special_function */
411e1bfb 1626 "R_PPC64_GOT_TLSLD16_HI", /* name */
b34976b6 1627 FALSE, /* partial_inplace */
d006db6c 1628 0, /* src_mask */
411e1bfb 1629 0xffff, /* dst_mask */
b34976b6 1630 FALSE), /* pcrel_offset */
5bd4f169 1631
411e1bfb
AM
1632 /* Like GOT_TLSLD16_HI, but adjust for low 16 bits. */
1633 HOWTO (R_PPC64_GOT_TLSLD16_HA,
1634 16, /* rightshift */
5bd4f169
AM
1635 1, /* size (0 = byte, 1 = short, 2 = long) */
1636 16, /* bitsize */
b34976b6 1637 FALSE, /* pc_relative */
5bd4f169
AM
1638 0, /* bitpos */
1639 complain_overflow_dont, /* complain_on_overflow */
805fc799 1640 ppc64_elf_unhandled_reloc, /* special_function */
411e1bfb 1641 "R_PPC64_GOT_TLSLD16_HA", /* name */
b34976b6 1642 FALSE, /* partial_inplace */
d006db6c 1643 0, /* src_mask */
411e1bfb 1644 0xffff, /* dst_mask */
b34976b6 1645 FALSE), /* pcrel_offset */
5bd4f169 1646
411e1bfb
AM
1647 /* Allocates an entry in the GOT with value (sym+add)@dtprel, and computes
1648 the offset to the entry relative to the TOC base (r2). */
1649 HOWTO (R_PPC64_GOT_DTPREL16_DS,
5bd4f169
AM
1650 0, /* rightshift */
1651 1, /* size (0 = byte, 1 = short, 2 = long) */
1652 16, /* bitsize */
b34976b6 1653 FALSE, /* pc_relative */
5bd4f169 1654 0, /* bitpos */
411e1bfb 1655 complain_overflow_signed, /* complain_on_overflow */
805fc799 1656 ppc64_elf_unhandled_reloc, /* special_function */
411e1bfb 1657 "R_PPC64_GOT_DTPREL16_DS", /* name */
b34976b6 1658 FALSE, /* partial_inplace */
d006db6c 1659 0, /* src_mask */
5bd4f169 1660 0xfffc, /* dst_mask */
b34976b6 1661 FALSE), /* pcrel_offset */
5bd4f169 1662
411e1bfb
AM
1663 /* Like GOT_DTPREL16_DS, but no overflow. */
1664 HOWTO (R_PPC64_GOT_DTPREL16_LO_DS,
5bd4f169 1665 0, /* rightshift */
c061c2d8
AM
1666 1, /* size (0 = byte, 1 = short, 2 = long) */
1667 16, /* bitsize */
b34976b6 1668 FALSE, /* pc_relative */
5bd4f169 1669 0, /* bitpos */
411e1bfb
AM
1670 complain_overflow_dont, /* complain_on_overflow */
1671 ppc64_elf_unhandled_reloc, /* special_function */
1672 "R_PPC64_GOT_DTPREL16_LO_DS", /* name */
b34976b6 1673 FALSE, /* partial_inplace */
d006db6c 1674 0, /* src_mask */
c061c2d8 1675 0xfffc, /* dst_mask */
b34976b6 1676 FALSE), /* pcrel_offset */
5bd4f169 1677
411e1bfb
AM
1678 /* Like GOT_DTPREL16_LO_DS, but next higher group of 16 bits. */
1679 HOWTO (R_PPC64_GOT_DTPREL16_HI,
1680 16, /* rightshift */
5bd4f169
AM
1681 1, /* size (0 = byte, 1 = short, 2 = long) */
1682 16, /* bitsize */
b34976b6 1683 FALSE, /* pc_relative */
5bd4f169
AM
1684 0, /* bitpos */
1685 complain_overflow_dont, /* complain_on_overflow */
411e1bfb
AM
1686 ppc64_elf_unhandled_reloc, /* special_function */
1687 "R_PPC64_GOT_DTPREL16_HI", /* name */
b34976b6 1688 FALSE, /* partial_inplace */
d006db6c 1689 0, /* src_mask */
411e1bfb 1690 0xffff, /* dst_mask */
b34976b6 1691 FALSE), /* pcrel_offset */
5bd4f169 1692
411e1bfb
AM
1693 /* Like GOT_DTPREL16_HI, but adjust for low 16 bits. */
1694 HOWTO (R_PPC64_GOT_DTPREL16_HA,
1695 16, /* rightshift */
1696 1, /* size (0 = byte, 1 = short, 2 = long) */
1697 16, /* bitsize */
1698 FALSE, /* pc_relative */
1699 0, /* bitpos */
1700 complain_overflow_dont, /* complain_on_overflow */
1701 ppc64_elf_unhandled_reloc, /* special_function */
1702 "R_PPC64_GOT_DTPREL16_HA", /* name */
1703 FALSE, /* partial_inplace */
1704 0, /* src_mask */
1705 0xffff, /* dst_mask */
1706 FALSE), /* pcrel_offset */
1707
1708 /* Allocates an entry in the GOT with value (sym+add)@tprel, and computes the
1709 offset to the entry relative to the TOC base (r2). */
1710 HOWTO (R_PPC64_GOT_TPREL16_DS,
5bd4f169
AM
1711 0, /* rightshift */
1712 1, /* size (0 = byte, 1 = short, 2 = long) */
1713 16, /* bitsize */
b34976b6 1714 FALSE, /* pc_relative */
5bd4f169
AM
1715 0, /* bitpos */
1716 complain_overflow_signed, /* complain_on_overflow */
411e1bfb
AM
1717 ppc64_elf_unhandled_reloc, /* special_function */
1718 "R_PPC64_GOT_TPREL16_DS", /* name */
b34976b6 1719 FALSE, /* partial_inplace */
d006db6c 1720 0, /* src_mask */
411e1bfb 1721 0xffff, /* dst_mask */
b34976b6 1722 FALSE), /* pcrel_offset */
5bd4f169 1723
411e1bfb
AM
1724 /* Like GOT_TPREL16_DS, but no overflow. */
1725 HOWTO (R_PPC64_GOT_TPREL16_LO_DS,
5bd4f169
AM
1726 0, /* rightshift */
1727 1, /* size (0 = byte, 1 = short, 2 = long) */
1728 16, /* bitsize */
b34976b6 1729 FALSE, /* pc_relative */
5bd4f169
AM
1730 0, /* bitpos */
1731 complain_overflow_dont, /* complain_on_overflow */
411e1bfb
AM
1732 ppc64_elf_unhandled_reloc, /* special_function */
1733 "R_PPC64_GOT_TPREL16_LO_DS", /* name */
b34976b6 1734 FALSE, /* partial_inplace */
d006db6c 1735 0, /* src_mask */
411e1bfb 1736 0xffff, /* dst_mask */
b34976b6 1737 FALSE), /* pcrel_offset */
5bd4f169 1738
411e1bfb
AM
1739 /* Like GOT_TPREL16_LO_DS, but next higher group of 16 bits. */
1740 HOWTO (R_PPC64_GOT_TPREL16_HI,
1741 16, /* rightshift */
5bd4f169
AM
1742 1, /* size (0 = byte, 1 = short, 2 = long) */
1743 16, /* bitsize */
b34976b6 1744 FALSE, /* pc_relative */
5bd4f169 1745 0, /* bitpos */
411e1bfb 1746 complain_overflow_dont, /* complain_on_overflow */
805fc799 1747 ppc64_elf_unhandled_reloc, /* special_function */
411e1bfb 1748 "R_PPC64_GOT_TPREL16_HI", /* name */
b34976b6 1749 FALSE, /* partial_inplace */
d006db6c 1750 0, /* src_mask */
411e1bfb 1751 0xffff, /* dst_mask */
b34976b6 1752 FALSE), /* pcrel_offset */
5bd4f169 1753
411e1bfb
AM
1754 /* Like GOT_TPREL16_HI, but adjust for low 16 bits. */
1755 HOWTO (R_PPC64_GOT_TPREL16_HA,
1756 16, /* rightshift */
5bd4f169
AM
1757 1, /* size (0 = byte, 1 = short, 2 = long) */
1758 16, /* bitsize */
b34976b6 1759 FALSE, /* pc_relative */
5bd4f169
AM
1760 0, /* bitpos */
1761 complain_overflow_dont, /* complain_on_overflow */
805fc799 1762 ppc64_elf_unhandled_reloc, /* special_function */
411e1bfb 1763 "R_PPC64_GOT_TPREL16_HA", /* name */
b34976b6 1764 FALSE, /* partial_inplace */
d006db6c 1765 0, /* src_mask */
411e1bfb 1766 0xffff, /* dst_mask */
b34976b6 1767 FALSE), /* pcrel_offset */
5bd4f169
AM
1768
1769 /* GNU extension to record C++ vtable hierarchy. */
1770 HOWTO (R_PPC64_GNU_VTINHERIT, /* type */
1771 0, /* rightshift */
1772 0, /* size (0 = byte, 1 = short, 2 = long) */
1773 0, /* bitsize */
b34976b6 1774 FALSE, /* pc_relative */
5bd4f169
AM
1775 0, /* bitpos */
1776 complain_overflow_dont, /* complain_on_overflow */
1777 NULL, /* special_function */
1778 "R_PPC64_GNU_VTINHERIT", /* name */
b34976b6 1779 FALSE, /* partial_inplace */
5bd4f169
AM
1780 0, /* src_mask */
1781 0, /* dst_mask */
b34976b6 1782 FALSE), /* pcrel_offset */
5bd4f169
AM
1783
1784 /* GNU extension to record C++ vtable member usage. */
1785 HOWTO (R_PPC64_GNU_VTENTRY, /* type */
1786 0, /* rightshift */
1787 0, /* size (0 = byte, 1 = short, 2 = long) */
1788 0, /* bitsize */
b34976b6 1789 FALSE, /* pc_relative */
5bd4f169
AM
1790 0, /* bitpos */
1791 complain_overflow_dont, /* complain_on_overflow */
1792 NULL, /* special_function */
1793 "R_PPC64_GNU_VTENTRY", /* name */
b34976b6 1794 FALSE, /* partial_inplace */
5bd4f169
AM
1795 0, /* src_mask */
1796 0, /* dst_mask */
b34976b6 1797 FALSE), /* pcrel_offset */
5bd4f169
AM
1798};
1799
1800\f
1801/* Initialize the ppc64_elf_howto_table, so that linear accesses can
1802 be done. */
1803
1804static void
1805ppc_howto_init ()
1806{
1807 unsigned int i, type;
1808
1809 for (i = 0;
1810 i < sizeof (ppc64_elf_howto_raw) / sizeof (ppc64_elf_howto_raw[0]);
1811 i++)
1812 {
1813 type = ppc64_elf_howto_raw[i].type;
1814 BFD_ASSERT (type < (sizeof (ppc64_elf_howto_table)
1815 / sizeof (ppc64_elf_howto_table[0])));
1816 ppc64_elf_howto_table[type] = &ppc64_elf_howto_raw[i];
1817 }
1818}
1819
1820static reloc_howto_type *
1821ppc64_elf_reloc_type_lookup (abfd, code)
1822 bfd *abfd ATTRIBUTE_UNUSED;
1823 bfd_reloc_code_real_type code;
1824{
411e1bfb 1825 enum elf_ppc64_reloc_type r = R_PPC64_NONE;
5bd4f169
AM
1826
1827 if (!ppc64_elf_howto_table[R_PPC64_ADDR32])
1828 /* Initialize howto table if needed. */
1829 ppc_howto_init ();
1830
1831 switch ((int) code)
1832 {
1833 default:
1834 return (reloc_howto_type *) NULL;
1835
411e1bfb
AM
1836 case BFD_RELOC_NONE: r = R_PPC64_NONE;
1837 break;
1838 case BFD_RELOC_32: r = R_PPC64_ADDR32;
1839 break;
1840 case BFD_RELOC_PPC_BA26: r = R_PPC64_ADDR24;
1841 break;
1842 case BFD_RELOC_16: r = R_PPC64_ADDR16;
1843 break;
1844 case BFD_RELOC_LO16: r = R_PPC64_ADDR16_LO;
1845 break;
1846 case BFD_RELOC_HI16: r = R_PPC64_ADDR16_HI;
1847 break;
1848 case BFD_RELOC_HI16_S: r = R_PPC64_ADDR16_HA;
5bd4f169 1849 break;
411e1bfb 1850 case BFD_RELOC_PPC_BA16: r = R_PPC64_ADDR14;
5bd4f169 1851 break;
411e1bfb 1852 case BFD_RELOC_PPC_BA16_BRTAKEN: r = R_PPC64_ADDR14_BRTAKEN;
5bd4f169 1853 break;
411e1bfb 1854 case BFD_RELOC_PPC_BA16_BRNTAKEN: r = R_PPC64_ADDR14_BRNTAKEN;
5bd4f169 1855 break;
411e1bfb 1856 case BFD_RELOC_PPC_B26: r = R_PPC64_REL24;
5bd4f169 1857 break;
411e1bfb 1858 case BFD_RELOC_PPC_B16: r = R_PPC64_REL14;
5bd4f169 1859 break;
411e1bfb 1860 case BFD_RELOC_PPC_B16_BRTAKEN: r = R_PPC64_REL14_BRTAKEN;
5bd4f169 1861 break;
411e1bfb 1862 case BFD_RELOC_PPC_B16_BRNTAKEN: r = R_PPC64_REL14_BRNTAKEN;
5bd4f169 1863 break;
411e1bfb 1864 case BFD_RELOC_16_GOTOFF: r = R_PPC64_GOT16;
5bd4f169 1865 break;
411e1bfb 1866 case BFD_RELOC_LO16_GOTOFF: r = R_PPC64_GOT16_LO;
5bd4f169 1867 break;
411e1bfb 1868 case BFD_RELOC_HI16_GOTOFF: r = R_PPC64_GOT16_HI;
5bd4f169 1869 break;
411e1bfb 1870 case BFD_RELOC_HI16_S_GOTOFF: r = R_PPC64_GOT16_HA;
5bd4f169 1871 break;
411e1bfb 1872 case BFD_RELOC_PPC_COPY: r = R_PPC64_COPY;
5bd4f169 1873 break;
411e1bfb 1874 case BFD_RELOC_PPC_GLOB_DAT: r = R_PPC64_GLOB_DAT;
5bd4f169 1875 break;
411e1bfb 1876 case BFD_RELOC_32_PCREL: r = R_PPC64_REL32;
5bd4f169 1877 break;
411e1bfb 1878 case BFD_RELOC_32_PLTOFF: r = R_PPC64_PLT32;
5bd4f169 1879 break;
411e1bfb 1880 case BFD_RELOC_32_PLT_PCREL: r = R_PPC64_PLTREL32;
5bd4f169 1881 break;
411e1bfb 1882 case BFD_RELOC_LO16_PLTOFF: r = R_PPC64_PLT16_LO;
5bd4f169 1883 break;
411e1bfb 1884 case BFD_RELOC_HI16_PLTOFF: r = R_PPC64_PLT16_HI;
5bd4f169 1885 break;
411e1bfb 1886 case BFD_RELOC_HI16_S_PLTOFF: r = R_PPC64_PLT16_HA;
5bd4f169 1887 break;
411e1bfb 1888 case BFD_RELOC_16_BASEREL: r = R_PPC64_SECTOFF;
5bd4f169 1889 break;
411e1bfb 1890 case BFD_RELOC_LO16_BASEREL: r = R_PPC64_SECTOFF_LO;
5bd4f169 1891 break;
411e1bfb 1892 case BFD_RELOC_HI16_BASEREL: r = R_PPC64_SECTOFF_HI;
5bd4f169 1893 break;
411e1bfb 1894 case BFD_RELOC_HI16_S_BASEREL: r = R_PPC64_SECTOFF_HA;
5bd4f169 1895 break;
411e1bfb 1896 case BFD_RELOC_CTOR: r = R_PPC64_ADDR64;
5bd4f169 1897 break;
411e1bfb 1898 case BFD_RELOC_64: r = R_PPC64_ADDR64;
5bd4f169 1899 break;
411e1bfb 1900 case BFD_RELOC_PPC64_HIGHER: r = R_PPC64_ADDR16_HIGHER;
5bd4f169 1901 break;
411e1bfb 1902 case BFD_RELOC_PPC64_HIGHER_S: r = R_PPC64_ADDR16_HIGHERA;
5bd4f169 1903 break;
411e1bfb 1904 case BFD_RELOC_PPC64_HIGHEST: r = R_PPC64_ADDR16_HIGHEST;
5bd4f169 1905 break;
411e1bfb 1906 case BFD_RELOC_PPC64_HIGHEST_S: r = R_PPC64_ADDR16_HIGHESTA;
5bd4f169 1907 break;
411e1bfb 1908 case BFD_RELOC_64_PCREL: r = R_PPC64_REL64;
5bd4f169 1909 break;
411e1bfb 1910 case BFD_RELOC_64_PLTOFF: r = R_PPC64_PLT64;
5bd4f169 1911 break;
411e1bfb 1912 case BFD_RELOC_64_PLT_PCREL: r = R_PPC64_PLTREL64;
5bd4f169 1913 break;
411e1bfb 1914 case BFD_RELOC_PPC_TOC16: r = R_PPC64_TOC16;
5bd4f169 1915 break;
411e1bfb 1916 case BFD_RELOC_PPC64_TOC16_LO: r = R_PPC64_TOC16_LO;
5bd4f169 1917 break;
411e1bfb 1918 case BFD_RELOC_PPC64_TOC16_HI: r = R_PPC64_TOC16_HI;
5bd4f169 1919 break;
411e1bfb 1920 case BFD_RELOC_PPC64_TOC16_HA: r = R_PPC64_TOC16_HA;
5bd4f169 1921 break;
411e1bfb 1922 case BFD_RELOC_PPC64_TOC: r = R_PPC64_TOC;
5bd4f169 1923 break;
411e1bfb 1924 case BFD_RELOC_PPC64_PLTGOT16: r = R_PPC64_PLTGOT16;
5bd4f169 1925 break;
411e1bfb 1926 case BFD_RELOC_PPC64_PLTGOT16_LO: r = R_PPC64_PLTGOT16_LO;
5bd4f169 1927 break;
411e1bfb 1928 case BFD_RELOC_PPC64_PLTGOT16_HI: r = R_PPC64_PLTGOT16_HI;
5bd4f169 1929 break;
411e1bfb 1930 case BFD_RELOC_PPC64_PLTGOT16_HA: r = R_PPC64_PLTGOT16_HA;
5bd4f169 1931 break;
411e1bfb 1932 case BFD_RELOC_PPC64_ADDR16_DS: r = R_PPC64_ADDR16_DS;
5bd4f169 1933 break;
411e1bfb 1934 case BFD_RELOC_PPC64_ADDR16_LO_DS: r = R_PPC64_ADDR16_LO_DS;
5bd4f169 1935 break;
411e1bfb 1936 case BFD_RELOC_PPC64_GOT16_DS: r = R_PPC64_GOT16_DS;
5bd4f169 1937 break;
411e1bfb 1938 case BFD_RELOC_PPC64_GOT16_LO_DS: r = R_PPC64_GOT16_LO_DS;
5bd4f169 1939 break;
411e1bfb 1940 case BFD_RELOC_PPC64_PLT16_LO_DS: r = R_PPC64_PLT16_LO_DS;
5bd4f169 1941 break;
411e1bfb 1942 case BFD_RELOC_PPC64_SECTOFF_DS: r = R_PPC64_SECTOFF_DS;
5bd4f169 1943 break;
411e1bfb 1944 case BFD_RELOC_PPC64_SECTOFF_LO_DS: r = R_PPC64_SECTOFF_LO_DS;
5bd4f169 1945 break;
411e1bfb 1946 case BFD_RELOC_PPC64_TOC16_DS: r = R_PPC64_TOC16_DS;
5bd4f169 1947 break;
411e1bfb 1948 case BFD_RELOC_PPC64_TOC16_LO_DS: r = R_PPC64_TOC16_LO_DS;
5bd4f169 1949 break;
411e1bfb 1950 case BFD_RELOC_PPC64_PLTGOT16_DS: r = R_PPC64_PLTGOT16_DS;
5bd4f169 1951 break;
411e1bfb 1952 case BFD_RELOC_PPC64_PLTGOT16_LO_DS: r = R_PPC64_PLTGOT16_LO_DS;
5bd4f169 1953 break;
411e1bfb 1954 case BFD_RELOC_PPC_TLS: r = R_PPC64_TLS;
5bd4f169 1955 break;
411e1bfb 1956 case BFD_RELOC_PPC_DTPMOD: r = R_PPC64_DTPMOD64;
5bd4f169 1957 break;
411e1bfb 1958 case BFD_RELOC_PPC_TPREL16: r = R_PPC64_TPREL16;
5bd4f169 1959 break;
411e1bfb 1960 case BFD_RELOC_PPC_TPREL16_LO: r = R_PPC64_TPREL16_LO;
5bd4f169 1961 break;
411e1bfb 1962 case BFD_RELOC_PPC_TPREL16_HI: r = R_PPC64_TPREL16_HI;
5bd4f169 1963 break;
411e1bfb 1964 case BFD_RELOC_PPC_TPREL16_HA: r = R_PPC64_TPREL16_HA;
5bd4f169 1965 break;
411e1bfb 1966 case BFD_RELOC_PPC_TPREL: r = R_PPC64_TPREL64;
5bd4f169 1967 break;
411e1bfb
AM
1968 case BFD_RELOC_PPC_DTPREL16: r = R_PPC64_DTPREL16;
1969 break;
1970 case BFD_RELOC_PPC_DTPREL16_LO: r = R_PPC64_DTPREL16_LO;
1971 break;
1972 case BFD_RELOC_PPC_DTPREL16_HI: r = R_PPC64_DTPREL16_HI;
1973 break;
1974 case BFD_RELOC_PPC_DTPREL16_HA: r = R_PPC64_DTPREL16_HA;
1975 break;
1976 case BFD_RELOC_PPC_DTPREL: r = R_PPC64_DTPREL64;
1977 break;
1978 case BFD_RELOC_PPC_GOT_TLSGD16: r = R_PPC64_GOT_TLSGD16;
1979 break;
1980 case BFD_RELOC_PPC_GOT_TLSGD16_LO: r = R_PPC64_GOT_TLSGD16_LO;
1981 break;
1982 case BFD_RELOC_PPC_GOT_TLSGD16_HI: r = R_PPC64_GOT_TLSGD16_HI;
1983 break;
1984 case BFD_RELOC_PPC_GOT_TLSGD16_HA: r = R_PPC64_GOT_TLSGD16_HA;
1985 break;
1986 case BFD_RELOC_PPC_GOT_TLSLD16: r = R_PPC64_GOT_TLSLD16;
1987 break;
1988 case BFD_RELOC_PPC_GOT_TLSLD16_LO: r = R_PPC64_GOT_TLSLD16_LO;
1989 break;
1990 case BFD_RELOC_PPC_GOT_TLSLD16_HI: r = R_PPC64_GOT_TLSLD16_HI;
1991 break;
1992 case BFD_RELOC_PPC_GOT_TLSLD16_HA: r = R_PPC64_GOT_TLSLD16_HA;
1993 break;
1994 case BFD_RELOC_PPC_GOT_TPREL16: r = R_PPC64_GOT_TPREL16_DS;
1995 break;
1996 case BFD_RELOC_PPC_GOT_TPREL16_LO: r = R_PPC64_GOT_TPREL16_LO_DS;
1997 break;
1998 case BFD_RELOC_PPC_GOT_TPREL16_HI: r = R_PPC64_GOT_TPREL16_HI;
1999 break;
2000 case BFD_RELOC_PPC_GOT_TPREL16_HA: r = R_PPC64_GOT_TPREL16_HA;
2001 break;
2002 case BFD_RELOC_PPC_GOT_DTPREL16: r = R_PPC64_GOT_DTPREL16_DS;
2003 break;
2004 case BFD_RELOC_PPC_GOT_DTPREL16_LO: r = R_PPC64_GOT_DTPREL16_LO_DS;
2005 break;
2006 case BFD_RELOC_PPC_GOT_DTPREL16_HI: r = R_PPC64_GOT_DTPREL16_HI;
2007 break;
2008 case BFD_RELOC_PPC_GOT_DTPREL16_HA: r = R_PPC64_GOT_DTPREL16_HA;
2009 break;
2010 case BFD_RELOC_PPC64_TPREL16_DS: r = R_PPC64_TPREL16_DS;
2011 break;
2012 case BFD_RELOC_PPC64_TPREL16_LO_DS: r = R_PPC64_TPREL16_LO_DS;
2013 break;
2014 case BFD_RELOC_PPC64_TPREL16_HIGHER: r = R_PPC64_TPREL16_HIGHER;
2015 break;
2016 case BFD_RELOC_PPC64_TPREL16_HIGHERA: r = R_PPC64_TPREL16_HIGHERA;
2017 break;
2018 case BFD_RELOC_PPC64_TPREL16_HIGHEST: r = R_PPC64_TPREL16_HIGHEST;
2019 break;
2020 case BFD_RELOC_PPC64_TPREL16_HIGHESTA: r = R_PPC64_TPREL16_HIGHESTA;
2021 break;
2022 case BFD_RELOC_PPC64_DTPREL16_DS: r = R_PPC64_DTPREL16_DS;
2023 break;
2024 case BFD_RELOC_PPC64_DTPREL16_LO_DS: r = R_PPC64_DTPREL16_LO_DS;
2025 break;
2026 case BFD_RELOC_PPC64_DTPREL16_HIGHER: r = R_PPC64_DTPREL16_HIGHER;
2027 break;
2028 case BFD_RELOC_PPC64_DTPREL16_HIGHERA: r = R_PPC64_DTPREL16_HIGHERA;
2029 break;
2030 case BFD_RELOC_PPC64_DTPREL16_HIGHEST: r = R_PPC64_DTPREL16_HIGHEST;
2031 break;
2032 case BFD_RELOC_PPC64_DTPREL16_HIGHESTA: r = R_PPC64_DTPREL16_HIGHESTA;
2033 break;
2034 case BFD_RELOC_VTABLE_INHERIT: r = R_PPC64_GNU_VTINHERIT;
2035 break;
2036 case BFD_RELOC_VTABLE_ENTRY: r = R_PPC64_GNU_VTENTRY;
5bd4f169
AM
2037 break;
2038 }
2039
411e1bfb 2040 return ppc64_elf_howto_table[(int) r];
5bd4f169
AM
2041};
2042
2043/* Set the howto pointer for a PowerPC ELF reloc. */
2044
2045static void
2046ppc64_elf_info_to_howto (abfd, cache_ptr, dst)
2047 bfd *abfd ATTRIBUTE_UNUSED;
2048 arelent *cache_ptr;
947216bf 2049 Elf_Internal_Rela *dst;
5bd4f169 2050{
65f38f15
AM
2051 unsigned int type;
2052
ef60b7ff 2053 /* Initialize howto table if needed. */
5bd4f169 2054 if (!ppc64_elf_howto_table[R_PPC64_ADDR32])
5bd4f169
AM
2055 ppc_howto_init ();
2056
65f38f15
AM
2057 type = ELF64_R_TYPE (dst->r_info);
2058 BFD_ASSERT (type < (sizeof (ppc64_elf_howto_table)
2059 / sizeof (ppc64_elf_howto_table[0])));
2060 cache_ptr->howto = ppc64_elf_howto_table[type];
5bd4f169
AM
2061}
2062
04c9666a 2063/* Handle the R_PPC64_ADDR16_HA and similar relocs. */
5bd4f169
AM
2064
2065static bfd_reloc_status_type
805fc799
AM
2066ppc64_elf_ha_reloc (abfd, reloc_entry, symbol, data,
2067 input_section, output_bfd, error_message)
2068 bfd *abfd;
5bd4f169
AM
2069 arelent *reloc_entry;
2070 asymbol *symbol;
805fc799 2071 PTR data;
5bd4f169
AM
2072 asection *input_section;
2073 bfd *output_bfd;
805fc799 2074 char **error_message;
5bd4f169 2075{
805fc799
AM
2076 /* If this is a relocatable link (output_bfd test tells us), just
2077 call the generic function. Any adjustment will be done at final
2078 link time. */
2079 if (output_bfd != NULL)
cedb70c5 2080 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
805fc799
AM
2081 input_section, output_bfd, error_message);
2082
2083 /* Adjust the addend for sign extension of the low 16 bits.
2084 We won't actually be using the low 16 bits, so trashing them
2085 doesn't matter. */
2086 reloc_entry->addend += 0x8000;
2087 return bfd_reloc_continue;
2088}
5bd4f169 2089
805fc799
AM
2090static bfd_reloc_status_type
2091ppc64_elf_brtaken_reloc (abfd, reloc_entry, symbol, data,
2092 input_section, output_bfd, error_message)
2093 bfd *abfd;
2094 arelent *reloc_entry;
2095 asymbol *symbol;
2096 PTR data;
2097 asection *input_section;
2098 bfd *output_bfd;
2099 char **error_message;
2100{
2101 long insn;
04c9666a 2102 enum elf_ppc64_reloc_type r_type;
805fc799
AM
2103 bfd_size_type octets;
2104 /* Disabled until we sort out how ld should choose 'y' vs 'at'. */
b34976b6 2105 bfd_boolean is_power4 = FALSE;
805fc799
AM
2106
2107 /* If this is a relocatable link (output_bfd test tells us), just
2108 call the generic function. Any adjustment will be done at final
2109 link time. */
5bd4f169 2110 if (output_bfd != NULL)
cedb70c5 2111 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
805fc799
AM
2112 input_section, output_bfd, error_message);
2113
2114 octets = reloc_entry->address * bfd_octets_per_byte (abfd);
2115 insn = bfd_get_32 (abfd, (bfd_byte *) data + octets);
2116 insn &= ~(0x01 << 21);
04c9666a 2117 r_type = (enum elf_ppc64_reloc_type) reloc_entry->howto->type;
805fc799
AM
2118 if (r_type == R_PPC64_ADDR14_BRTAKEN
2119 || r_type == R_PPC64_REL14_BRTAKEN)
cedb70c5 2120 insn |= 0x01 << 21; /* 'y' or 't' bit, lowest bit of BO field. */
805fc799
AM
2121
2122 if (is_power4)
5bd4f169 2123 {
805fc799
AM
2124 /* Set 'a' bit. This is 0b00010 in BO field for branch
2125 on CR(BI) insns (BO == 001at or 011at), and 0b01000
2126 for branch on CTR insns (BO == 1a00t or 1a01t). */
2127 if ((insn & (0x14 << 21)) == (0x04 << 21))
2128 insn |= 0x02 << 21;
2129 else if ((insn & (0x14 << 21)) == (0x10 << 21))
2130 insn |= 0x08 << 21;
2131 else
2132 return bfd_reloc_continue;
5bd4f169 2133 }
805fc799
AM
2134 else
2135 {
2136 bfd_vma target = 0;
2137 bfd_vma from;
5bd4f169 2138
805fc799
AM
2139 if (!bfd_is_com_section (symbol->section))
2140 target = symbol->value;
2141 target += symbol->section->output_section->vma;
2142 target += symbol->section->output_offset;
2143 target += reloc_entry->addend;
5bd4f169 2144
805fc799
AM
2145 from = (reloc_entry->address
2146 + input_section->output_offset
2147 + input_section->output_section->vma);
5bd4f169 2148
805fc799
AM
2149 /* Invert 'y' bit if not the default. */
2150 if ((bfd_signed_vma) (target - from) < 0)
2151 insn ^= 0x01 << 21;
2152 }
2153 bfd_put_32 (abfd, (bfd_vma) insn, (bfd_byte *) data + octets);
2154 return bfd_reloc_continue;
2155}
5bd4f169 2156
805fc799
AM
2157static bfd_reloc_status_type
2158ppc64_elf_sectoff_reloc (abfd, reloc_entry, symbol, data,
2159 input_section, output_bfd, error_message)
2160 bfd *abfd;
2161 arelent *reloc_entry;
2162 asymbol *symbol;
2163 PTR data;
2164 asection *input_section;
2165 bfd *output_bfd;
2166 char **error_message;
2167{
2168 /* If this is a relocatable link (output_bfd test tells us), just
2169 call the generic function. Any adjustment will be done at final
2170 link time. */
2171 if (output_bfd != NULL)
cedb70c5 2172 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
805fc799 2173 input_section, output_bfd, error_message);
5bd4f169 2174
805fc799
AM
2175 /* Subtract the symbol section base address. */
2176 reloc_entry->addend -= symbol->section->output_section->vma;
5bd4f169
AM
2177 return bfd_reloc_continue;
2178}
2179
805fc799
AM
2180static bfd_reloc_status_type
2181ppc64_elf_sectoff_ha_reloc (abfd, reloc_entry, symbol, data,
2182 input_section, output_bfd, error_message)
2183 bfd *abfd;
2184 arelent *reloc_entry;
2185 asymbol *symbol;
2186 PTR data;
2187 asection *input_section;
2188 bfd *output_bfd;
2189 char **error_message;
2190{
2191 /* If this is a relocatable link (output_bfd test tells us), just
2192 call the generic function. Any adjustment will be done at final
2193 link time. */
2194 if (output_bfd != NULL)
cedb70c5 2195 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
805fc799
AM
2196 input_section, output_bfd, error_message);
2197
2198 /* Subtract the symbol section base address. */
2199 reloc_entry->addend -= symbol->section->output_section->vma;
2200
2201 /* Adjust the addend for sign extension of the low 16 bits. */
2202 reloc_entry->addend += 0x8000;
2203 return bfd_reloc_continue;
2204}
2205
2206static bfd_reloc_status_type
2207ppc64_elf_toc_reloc (abfd, reloc_entry, symbol, data,
2208 input_section, output_bfd, error_message)
2209 bfd *abfd;
2210 arelent *reloc_entry;
2211 asymbol *symbol;
2212 PTR data;
2213 asection *input_section;
2214 bfd *output_bfd;
2215 char **error_message;
2216{
2217 bfd_vma TOCstart;
2218
2219 /* If this is a relocatable link (output_bfd test tells us), just
2220 call the generic function. Any adjustment will be done at final
2221 link time. */
2222 if (output_bfd != NULL)
cedb70c5 2223 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
805fc799
AM
2224 input_section, output_bfd, error_message);
2225
2226 TOCstart = _bfd_get_gp_value (input_section->output_section->owner);
2227 if (TOCstart == 0)
2228 TOCstart = ppc64_elf_toc (input_section->output_section->owner);
2229
2230 /* Subtract the TOC base address. */
2231 reloc_entry->addend -= TOCstart + TOC_BASE_OFF;
2232 return bfd_reloc_continue;
2233}
2234
2235static bfd_reloc_status_type
2236ppc64_elf_toc_ha_reloc (abfd, reloc_entry, symbol, data,
2237 input_section, output_bfd, error_message)
2238 bfd *abfd;
2239 arelent *reloc_entry;
2240 asymbol *symbol;
2241 PTR data;
2242 asection *input_section;
2243 bfd *output_bfd;
2244 char **error_message;
2245{
2246 bfd_vma TOCstart;
2247
2248 /* If this is a relocatable link (output_bfd test tells us), just
2249 call the generic function. Any adjustment will be done at final
2250 link time. */
2251 if (output_bfd != NULL)
cedb70c5 2252 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
805fc799
AM
2253 input_section, output_bfd, error_message);
2254
2255 TOCstart = _bfd_get_gp_value (input_section->output_section->owner);
2256 if (TOCstart == 0)
2257 TOCstart = ppc64_elf_toc (input_section->output_section->owner);
2258
2259 /* Subtract the TOC base address. */
2260 reloc_entry->addend -= TOCstart + TOC_BASE_OFF;
2261
2262 /* Adjust the addend for sign extension of the low 16 bits. */
2263 reloc_entry->addend += 0x8000;
2264 return bfd_reloc_continue;
2265}
2266
2267static bfd_reloc_status_type
2268ppc64_elf_toc64_reloc (abfd, reloc_entry, symbol, data,
2269 input_section, output_bfd, error_message)
2270 bfd *abfd;
2271 arelent *reloc_entry;
2272 asymbol *symbol;
2273 PTR data;
2274 asection *input_section;
2275 bfd *output_bfd;
2276 char **error_message;
2277{
2278 bfd_vma TOCstart;
2279 bfd_size_type octets;
2280
2281 /* If this is a relocatable link (output_bfd test tells us), just
2282 call the generic function. Any adjustment will be done at final
2283 link time. */
2284 if (output_bfd != NULL)
cedb70c5 2285 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
805fc799
AM
2286 input_section, output_bfd, error_message);
2287
2288 TOCstart = _bfd_get_gp_value (input_section->output_section->owner);
2289 if (TOCstart == 0)
2290 TOCstart = ppc64_elf_toc (input_section->output_section->owner);
2291
2292 octets = reloc_entry->address * bfd_octets_per_byte (abfd);
2293 bfd_put_64 (abfd, TOCstart + TOC_BASE_OFF, (bfd_byte *) data + octets);
2294 return bfd_reloc_ok;
2295}
2296
2297static bfd_reloc_status_type
2298ppc64_elf_unhandled_reloc (abfd, reloc_entry, symbol, data,
2299 input_section, output_bfd, error_message)
2300 bfd *abfd;
2301 arelent *reloc_entry;
2302 asymbol *symbol;
2303 PTR data;
2304 asection *input_section;
2305 bfd *output_bfd;
2306 char **error_message;
2307{
2308 /* If this is a relocatable link (output_bfd test tells us), just
2309 call the generic function. Any adjustment will be done at final
2310 link time. */
2311 if (output_bfd != NULL)
cedb70c5 2312 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
805fc799
AM
2313 input_section, output_bfd, error_message);
2314
2315 if (error_message != NULL)
2316 {
2317 static char buf[60];
2318 sprintf (buf, "generic linker can't handle %s",
2319 reloc_entry->howto->name);
2320 *error_message = buf;
2321 }
2322 return bfd_reloc_dangerous;
2323}
2324
feee612b
AM
2325/* Fix bad default arch selected for a 64 bit input bfd when the
2326 default is 32 bit. */
2327
b34976b6 2328static bfd_boolean
feee612b
AM
2329ppc64_elf_object_p (abfd)
2330 bfd *abfd;
2331{
2332 if (abfd->arch_info->the_default && abfd->arch_info->bits_per_word == 32)
2333 {
2334 Elf_Internal_Ehdr *i_ehdr = elf_elfheader (abfd);
2335
2336 if (i_ehdr->e_ident[EI_CLASS] == ELFCLASS64)
2337 {
2338 /* Relies on arch after 32 bit default being 64 bit default. */
2339 abfd->arch_info = abfd->arch_info->next;
2340 BFD_ASSERT (abfd->arch_info->bits_per_word == 64);
2341 }
2342 }
b34976b6 2343 return TRUE;
feee612b
AM
2344}
2345
5bd4f169
AM
2346/* Merge backend specific data from an object file to the output
2347 object file when linking. */
2f6d9989 2348
b34976b6 2349static bfd_boolean
5bd4f169
AM
2350ppc64_elf_merge_private_bfd_data (ibfd, obfd)
2351 bfd *ibfd;
2352 bfd *obfd;
2353{
5bd4f169
AM
2354 /* Check if we have the same endianess. */
2355 if (ibfd->xvec->byteorder != obfd->xvec->byteorder
87e226ce 2356 && ibfd->xvec->byteorder != BFD_ENDIAN_UNKNOWN
5bd4f169
AM
2357 && obfd->xvec->byteorder != BFD_ENDIAN_UNKNOWN)
2358 {
2359 const char *msg;
2360
2361 if (bfd_big_endian (ibfd))
2362 msg = _("%s: compiled for a big endian system and target is little endian");
2363 else
2364 msg = _("%s: compiled for a little endian system and target is big endian");
2365
8f615d07 2366 (*_bfd_error_handler) (msg, bfd_archive_filename (ibfd));
5bd4f169
AM
2367
2368 bfd_set_error (bfd_error_wrong_format);
b34976b6 2369 return FALSE;
5bd4f169
AM
2370 }
2371
b34976b6 2372 return TRUE;
5bd4f169 2373}
f0abc2a1
AM
2374
2375struct _ppc64_elf_section_data
2376{
2377 struct bfd_elf_section_data elf;
411e1bfb
AM
2378
2379 /* An array with one entry for each opd function descriptor. */
f0abc2a1
AM
2380 union
2381 {
411e1bfb 2382 /* Points to the function code section for local opd entries. */
f0abc2a1 2383 asection **func_sec;
411e1bfb 2384 /* After editing .opd, adjust references to opd local syms. */
f0abc2a1
AM
2385 long *adjust;
2386 } opd;
411e1bfb
AM
2387
2388 /* An array for toc sections, indexed by offset/8.
2389 Specifies the relocation symbol index used at a given toc offset. */
2390 unsigned *t_symndx;
f0abc2a1
AM
2391};
2392
2393#define ppc64_elf_section_data(sec) \
411e1bfb 2394 ((struct _ppc64_elf_section_data *) elf_section_data (sec))
f0abc2a1
AM
2395
2396static bfd_boolean
2397ppc64_elf_new_section_hook (abfd, sec)
2398 bfd *abfd;
2399 asection *sec;
2400{
2401 struct _ppc64_elf_section_data *sdata;
2402 bfd_size_type amt = sizeof (*sdata);
2403
2404 sdata = (struct _ppc64_elf_section_data *) bfd_zalloc (abfd, amt);
2405 if (sdata == NULL)
2406 return FALSE;
2407 sec->used_by_bfd = (PTR) sdata;
2408
2409 return _bfd_elf_new_section_hook (abfd, sec);
2410}
5bd4f169 2411\f
65f38f15
AM
2412/* The following functions are specific to the ELF linker, while
2413 functions above are used generally. Those named ppc64_elf_* are
2414 called by the main ELF linker code. They appear in this file more
2415 or less in the order in which they are called. eg.
2416 ppc64_elf_check_relocs is called early in the link process,
2417 ppc64_elf_finish_dynamic_sections is one of the last functions
e86ce104
AM
2418 called.
2419
2420 PowerPC64-ELF uses a similar scheme to PowerPC64-XCOFF in that
2421 functions have both a function code symbol and a function descriptor
2422 symbol. A call to foo in a relocatable object file looks like:
2423
2424 . .text
2425 . x:
2426 . bl .foo
2427 . nop
2428
2429 The function definition in another object file might be:
2430
2431 . .section .opd
2432 . foo: .quad .foo
2433 . .quad .TOC.@tocbase
2434 . .quad 0
2435 .
2436 . .text
2437 . .foo: blr
2438
2439 When the linker resolves the call during a static link, the branch
2440 unsurprisingly just goes to .foo and the .opd information is unused.
2441 If the function definition is in a shared library, things are a little
2442 different: The call goes via a plt call stub, the opd information gets
2443 copied to the plt, and the linker patches the nop.
2444
2445 . x:
2446 . bl .foo_stub
2447 . ld 2,40(1)
2448 .
2449 .
2450 . .foo_stub:
2451 . addis 12,2,Lfoo@toc@ha # in practice, the call stub
411e1bfb 2452 . addi 12,12,Lfoo@toc@l # is slightly optimized, but
e86ce104
AM
2453 . std 2,40(1) # this is the general idea
2454 . ld 11,0(12)
2455 . ld 2,8(12)
2456 . mtctr 11
2457 . ld 11,16(12)
2458 . bctr
2459 .
2460 . .section .plt
2461 . Lfoo: reloc (R_PPC64_JMP_SLOT, foo)
2462
2463 The "reloc ()" notation is supposed to indicate that the linker emits
2464 an R_PPC64_JMP_SLOT reloc against foo. The dynamic linker does the opd
2465 copying.
2466
2467 What are the difficulties here? Well, firstly, the relocations
2468 examined by the linker in check_relocs are against the function code
2469 sym .foo, while the dynamic relocation in the plt is emitted against
2470 the function descriptor symbol, foo. Somewhere along the line, we need
2471 to carefully copy dynamic link information from one symbol to the other.
2472 Secondly, the generic part of the elf linker will make .foo a dynamic
2473 symbol as is normal for most other backends. We need foo dynamic
2474 instead, at least for an application final link. However, when
2475 creating a shared library containing foo, we need to have both symbols
2476 dynamic so that references to .foo are satisfied during the early
2477 stages of linking. Otherwise the linker might decide to pull in a
41bd81ab 2478 definition from some other object, eg. a static library. */
65f38f15
AM
2479
2480/* The linker needs to keep track of the number of relocs that it
2481 decides to copy as dynamic relocs in check_relocs for each symbol.
2482 This is so that it can later discard them if they are found to be
2483 unnecessary. We store the information in a field extending the
2484 regular ELF linker hash table. */
2485
2486struct ppc_dyn_relocs
2487{
2488 struct ppc_dyn_relocs *next;
2489
2490 /* The input section of the reloc. */
2491 asection *sec;
2492
2493 /* Total number of relocs copied for the input section. */
2494 bfd_size_type count;
2495
2496 /* Number of pc-relative relocs copied for the input section. */
2497 bfd_size_type pc_count;
2498};
2499
411e1bfb
AM
2500/* Track GOT entries needed for a given symbol. We might need more
2501 than one got entry per symbol. */
2502struct got_entry
2503{
2504 struct got_entry *next;
2505
2506 bfd_vma addend;
2507
2508 union
2509 {
2510 bfd_signed_vma refcount;
2511 bfd_vma offset;
2512 } got;
2513
2514 char tls_type;
2515};
2516
2517/* The same for PLT. */
2518struct plt_entry
2519{
2520 struct plt_entry *next;
2521
2522 bfd_vma addend;
2523
2524 union
2525 {
2526 bfd_signed_vma refcount;
2527 bfd_vma offset;
2528 } plt;
2529};
2530
65f38f15 2531/* Of those relocs that might be copied as dynamic relocs, this macro
411e1bfb 2532 selects those that must be copied when linking a shared library. */
65f38f15 2533
411e1bfb 2534#define MUST_BE_DYN_RELOC(RTYPE) \
805fc799
AM
2535 ((RTYPE) != R_PPC64_REL32 \
2536 && (RTYPE) != R_PPC64_REL64 \
04c9666a 2537 && (RTYPE) != R_PPC64_REL30)
65f38f15 2538
721956f4
AM
2539/* Section name for stubs is the associated section name plus this
2540 string. */
2541#define STUB_SUFFIX ".stub"
2542
2543/* Linker stubs.
2544 ppc_stub_long_branch:
2545 Used when a 14 bit branch (or even a 24 bit branch) can't reach its
2546 destination, but a 24 bit branch in a stub section will reach.
2547 . b dest
2548
2549 ppc_stub_plt_branch:
2550 Similar to the above, but a 24 bit branch in the stub section won't
2551 reach its destination.
87e226ce
AM
2552 . addis %r12,%r2,xxx@toc@ha
2553 . ld %r11,xxx@toc@l(%r12)
721956f4
AM
2554 . mtctr %r11
2555 . bctr
2556
2557 ppc_stub_plt_call:
2558 Used to call a function in a shared library.
87e226ce 2559 . addis %r12,%r2,xxx@toc@ha
721956f4 2560 . std %r2,40(%r1)
87e226ce
AM
2561 . ld %r11,xxx+0@toc@l(%r12)
2562 . ld %r2,xxx+8@toc@l(%r12)
721956f4 2563 . mtctr %r11
87e226ce 2564 . ld %r11,xxx+16@toc@l(%r12)
721956f4
AM
2565 . bctr
2566*/
2567
2568enum ppc_stub_type {
2569 ppc_stub_none,
2570 ppc_stub_long_branch,
2571 ppc_stub_plt_branch,
2572 ppc_stub_plt_call
2573};
2574
2575struct ppc_stub_hash_entry {
2576
2577 /* Base hash table entry structure. */
2578 struct bfd_hash_entry root;
2579
2580 /* The stub section. */
2581 asection *stub_sec;
2582
2583 /* Offset within stub_sec of the beginning of this stub. */
2584 bfd_vma stub_offset;
2585
2586 /* Given the symbol's value and its section we can determine its final
2587 value when building the stubs (so the stub knows where to jump. */
2588 bfd_vma target_value;
2589 asection *target_section;
2590
2591 enum ppc_stub_type stub_type;
2592
2593 /* The symbol table entry, if any, that this was derived from. */
2594 struct ppc_link_hash_entry *h;
2595
411e1bfb
AM
2596 /* And the reloc addend that this was derived from. */
2597 bfd_vma addend;
2598
721956f4
AM
2599 /* Where this stub is being called from, or, in the case of combined
2600 stub sections, the first input section in the group. */
2601 asection *id_sec;
2602};
2603
2604struct ppc_branch_hash_entry {
2605
2606 /* Base hash table entry structure. */
2607 struct bfd_hash_entry root;
2608
2609 /* Offset within .branch_lt. */
2610 unsigned int offset;
2611
2612 /* Generation marker. */
2613 unsigned int iter;
2614};
65f38f15
AM
2615
2616struct ppc_link_hash_entry
2617{
2618 struct elf_link_hash_entry elf;
2619
721956f4
AM
2620 /* A pointer to the most recently used stub hash entry against this
2621 symbol. */
2622 struct ppc_stub_hash_entry *stub_cache;
2623
65f38f15
AM
2624 /* Track dynamic relocs copied for this symbol. */
2625 struct ppc_dyn_relocs *dyn_relocs;
e86ce104 2626
721956f4
AM
2627 /* Link between function code and descriptor symbols. */
2628 struct elf_link_hash_entry *oh;
2629
e86ce104
AM
2630 /* Flag function code and descriptor symbols. */
2631 unsigned int is_func:1;
2632 unsigned int is_func_descriptor:1;
1e2f5b6e 2633 unsigned int is_entry:1;
411e1bfb
AM
2634
2635 /* Contexts in which symbol is used in the GOT (or TOC).
2636 Linker optimization will result in various transformations. */
2637#define TLS_TLS 1 /* Any TLS reloc. */
2638#define TLS_GD_LD 2 /* GD or LD reloc requiring 2 got slots. */
2639#define TLS_LD 4 /* LD reloc. */
2640#define TLS_TPREL 8 /* TPREL reloc, => IE. */
2641#define TLS_DTPREL 16 /* DTPREL reloc, => LD. */
2642#define TLS_EXPLICIT 32 /* Marks TOC section relocs. */
2643 char tls_type;
65f38f15
AM
2644};
2645
2646/* ppc64 ELF linker hash table. */
2647
2648struct ppc_link_hash_table
2649{
2650 struct elf_link_hash_table elf;
2651
721956f4
AM
2652 /* The stub hash table. */
2653 struct bfd_hash_table stub_hash_table;
2654
2655 /* Another hash table for plt_branch stubs. */
2656 struct bfd_hash_table branch_hash_table;
2657
2658 /* Linker stub bfd. */
2659 bfd *stub_bfd;
2660
2661 /* Linker call-backs. */
2662 asection * (*add_stub_section) PARAMS ((const char *, asection *));
2663 void (*layout_sections_again) PARAMS ((void));
2664
2665 /* Array to keep track of which stub sections have been created, and
2666 information on stub grouping. */
2667 struct map_stub {
2668 /* This is the section to which stubs in the group will be attached. */
2669 asection *link_sec;
2670 /* The stub section. */
2671 asection *stub_sec;
2672 } *stub_group;
2673
2674 /* Assorted information used by ppc64_elf_size_stubs. */
721956f4
AM
2675 int top_index;
2676 asection **input_list;
721956f4 2677
65f38f15
AM
2678 /* Short-cuts to get to dynamic linker sections. */
2679 asection *sgot;
2680 asection *srelgot;
2681 asection *splt;
2682 asection *srelplt;
2683 asection *sdynbss;
2684 asection *srelbss;
2685 asection *sglink;
82bd7b59 2686 asection *sfpr;
721956f4
AM
2687 asection *sbrlt;
2688 asection *srelbrlt;
ec338859 2689
411e1bfb
AM
2690 /* Short-cut to first output tls section. */
2691 asection *tls_sec;
2692
2693 /* Shortcut to .__tls_get_addr. */
2694 struct elf_link_hash_entry *tls_get_addr;
2695
2696 /* TLS local dynamic got entry handling. */
2697 union {
2698 bfd_signed_vma refcount;
2699 bfd_vma offset;
2700 } tlsld_got;
2701
5d1634d7 2702 /* Set on error. */
721956f4
AM
2703 unsigned int stub_error;
2704
2705 /* Flag set when small branches are detected. Used to
2706 select suitable defaults for the stub group size. */
2707 unsigned int has_14bit_branch;
2708
805fc799
AM
2709 /* Set if we detect a reference undefined weak symbol. */
2710 unsigned int have_undefweak;
2711
721956f4
AM
2712 /* Incremented every time we size stubs. */
2713 unsigned int stub_iteration;
5d1634d7 2714
ec338859
AM
2715 /* Small local sym to section mapping cache. */
2716 struct sym_sec_cache sym_sec;
65f38f15
AM
2717};
2718
721956f4
AM
2719static struct bfd_hash_entry *stub_hash_newfunc
2720 PARAMS ((struct bfd_hash_entry *, struct bfd_hash_table *, const char *));
2721static struct bfd_hash_entry *branch_hash_newfunc
2722 PARAMS ((struct bfd_hash_entry *, struct bfd_hash_table *, const char *));
2723static struct bfd_hash_entry *link_hash_newfunc
2724 PARAMS ((struct bfd_hash_entry *, struct bfd_hash_table *, const char *));
2725static struct bfd_link_hash_table *ppc64_elf_link_hash_table_create
2726 PARAMS ((bfd *));
2727static void ppc64_elf_link_hash_table_free
2728 PARAMS ((struct bfd_link_hash_table *));
2729static char *ppc_stub_name
2730 PARAMS ((const asection *, const asection *,
2731 const struct ppc_link_hash_entry *, const Elf_Internal_Rela *));
2732static struct ppc_stub_hash_entry *ppc_get_stub_entry
2733 PARAMS ((const asection *, const asection *, struct elf_link_hash_entry *,
2734 const Elf_Internal_Rela *, struct ppc_link_hash_table *));
2735static struct ppc_stub_hash_entry *ppc_add_stub
2736 PARAMS ((const char *, asection *, struct ppc_link_hash_table *));
b34976b6 2737static bfd_boolean create_linkage_sections
721956f4 2738 PARAMS ((bfd *, struct bfd_link_info *));
b34976b6 2739static bfd_boolean create_got_section
721956f4 2740 PARAMS ((bfd *, struct bfd_link_info *));
b34976b6 2741static bfd_boolean ppc64_elf_create_dynamic_sections
721956f4
AM
2742 PARAMS ((bfd *, struct bfd_link_info *));
2743static void ppc64_elf_copy_indirect_symbol
b48fa14c
AM
2744 PARAMS ((struct elf_backend_data *, struct elf_link_hash_entry *,
2745 struct elf_link_hash_entry *));
411e1bfb
AM
2746static bfd_boolean update_local_sym_info
2747 PARAMS ((bfd *, Elf_Internal_Shdr *, unsigned long, bfd_vma, int));
2748static bfd_boolean update_plt_info
2749 PARAMS ((bfd *, struct ppc_link_hash_entry *, bfd_vma));
b34976b6 2750static bfd_boolean ppc64_elf_check_relocs
721956f4
AM
2751 PARAMS ((bfd *, struct bfd_link_info *, asection *,
2752 const Elf_Internal_Rela *));
2753static asection * ppc64_elf_gc_mark_hook
1e2f5b6e
AM
2754 PARAMS ((asection *, struct bfd_link_info *, Elf_Internal_Rela *,
2755 struct elf_link_hash_entry *, Elf_Internal_Sym *));
b34976b6 2756static bfd_boolean ppc64_elf_gc_sweep_hook
1e2f5b6e
AM
2757 PARAMS ((bfd *, struct bfd_link_info *, asection *,
2758 const Elf_Internal_Rela *));
b34976b6 2759static bfd_boolean func_desc_adjust
721956f4 2760 PARAMS ((struct elf_link_hash_entry *, PTR));
b34976b6 2761static bfd_boolean ppc64_elf_func_desc_adjust
721956f4 2762 PARAMS ((bfd *, struct bfd_link_info *));
b34976b6 2763static bfd_boolean ppc64_elf_adjust_dynamic_symbol
721956f4
AM
2764 PARAMS ((struct bfd_link_info *, struct elf_link_hash_entry *));
2765static void ppc64_elf_hide_symbol
b34976b6 2766 PARAMS ((struct bfd_link_info *, struct elf_link_hash_entry *, bfd_boolean));
411e1bfb
AM
2767static bfd_boolean get_sym_h
2768 PARAMS ((struct elf_link_hash_entry **, Elf_Internal_Sym **, asection **,
2769 char **, Elf_Internal_Sym **, unsigned long, bfd *));
2770static bfd_boolean get_tls_type
2771 PARAMS ((char **, Elf_Internal_Sym **, const Elf_Internal_Rela *, bfd *));
b34976b6 2772static bfd_boolean allocate_dynrelocs
721956f4 2773 PARAMS ((struct elf_link_hash_entry *, PTR));
b34976b6 2774static bfd_boolean readonly_dynrelocs
721956f4
AM
2775 PARAMS ((struct elf_link_hash_entry *, PTR));
2776static enum elf_reloc_type_class ppc64_elf_reloc_type_class
2777 PARAMS ((const Elf_Internal_Rela *));
b34976b6 2778static bfd_boolean ppc64_elf_size_dynamic_sections
721956f4 2779 PARAMS ((bfd *, struct bfd_link_info *));
411e1bfb 2780static enum ppc_stub_type ppc_type_of_stub
721956f4
AM
2781 PARAMS ((asection *, const Elf_Internal_Rela *,
2782 struct ppc_link_hash_entry **, bfd_vma));
2783static bfd_byte *build_plt_stub
2784 PARAMS ((bfd *, bfd_byte *, int, int));
b34976b6 2785static bfd_boolean ppc_build_one_stub
721956f4 2786 PARAMS ((struct bfd_hash_entry *, PTR));
b34976b6 2787static bfd_boolean ppc_size_one_stub
721956f4
AM
2788 PARAMS ((struct bfd_hash_entry *, PTR));
2789static void group_sections
b34976b6
AM
2790 PARAMS ((struct ppc_link_hash_table *, bfd_size_type, bfd_boolean));
2791static bfd_boolean ppc64_elf_relocate_section
721956f4
AM
2792 PARAMS ((bfd *, struct bfd_link_info *info, bfd *, asection *, bfd_byte *,
2793 Elf_Internal_Rela *relocs, Elf_Internal_Sym *local_syms,
2794 asection **));
b34976b6 2795static bfd_boolean ppc64_elf_finish_dynamic_symbol
721956f4
AM
2796 PARAMS ((bfd *, struct bfd_link_info *, struct elf_link_hash_entry *,
2797 Elf_Internal_Sym *));
b34976b6 2798static bfd_boolean ppc64_elf_finish_dynamic_sections
721956f4
AM
2799 PARAMS ((bfd *, struct bfd_link_info *));
2800
65f38f15
AM
2801/* Get the ppc64 ELF linker hash table from a link_info structure. */
2802
2803#define ppc_hash_table(p) \
2804 ((struct ppc_link_hash_table *) ((p)->hash))
2805
721956f4
AM
2806#define ppc_stub_hash_lookup(table, string, create, copy) \
2807 ((struct ppc_stub_hash_entry *) \
2808 bfd_hash_lookup ((table), (string), (create), (copy)))
2809
2810#define ppc_branch_hash_lookup(table, string, create, copy) \
2811 ((struct ppc_branch_hash_entry *) \
2812 bfd_hash_lookup ((table), (string), (create), (copy)))
2813
2814/* Create an entry in the stub hash table. */
2815
2816static struct bfd_hash_entry *
2817stub_hash_newfunc (entry, table, string)
2818 struct bfd_hash_entry *entry;
2819 struct bfd_hash_table *table;
2820 const char *string;
2821{
2822 /* Allocate the structure if it has not already been allocated by a
2823 subclass. */
2824 if (entry == NULL)
2825 {
2826 entry = bfd_hash_allocate (table, sizeof (struct ppc_stub_hash_entry));
2827 if (entry == NULL)
2828 return entry;
2829 }
2830
2831 /* Call the allocation method of the superclass. */
2832 entry = bfd_hash_newfunc (entry, table, string);
2833 if (entry != NULL)
2834 {
2835 struct ppc_stub_hash_entry *eh;
2836
2837 /* Initialize the local fields. */
2838 eh = (struct ppc_stub_hash_entry *) entry;
2839 eh->stub_sec = NULL;
2840 eh->stub_offset = 0;
2841 eh->target_value = 0;
2842 eh->target_section = NULL;
2843 eh->stub_type = ppc_stub_none;
2844 eh->h = NULL;
2845 eh->id_sec = NULL;
2846 }
2847
2848 return entry;
2849}
2850
2851/* Create an entry in the branch hash table. */
2852
2853static struct bfd_hash_entry *
2854branch_hash_newfunc (entry, table, string)
2855 struct bfd_hash_entry *entry;
2856 struct bfd_hash_table *table;
2857 const char *string;
2858{
2859 /* Allocate the structure if it has not already been allocated by a
2860 subclass. */
2861 if (entry == NULL)
2862 {
2863 entry = bfd_hash_allocate (table, sizeof (struct ppc_branch_hash_entry));
2864 if (entry == NULL)
2865 return entry;
2866 }
2867
2868 /* Call the allocation method of the superclass. */
2869 entry = bfd_hash_newfunc (entry, table, string);
2870 if (entry != NULL)
2871 {
2872 struct ppc_branch_hash_entry *eh;
2873
2874 /* Initialize the local fields. */
2875 eh = (struct ppc_branch_hash_entry *) entry;
2876 eh->offset = 0;
2877 eh->iter = 0;
2878 }
2879
2880 return entry;
2881}
2882
65f38f15
AM
2883/* Create an entry in a ppc64 ELF linker hash table. */
2884
2885static struct bfd_hash_entry *
2886link_hash_newfunc (entry, table, string)
2887 struct bfd_hash_entry *entry;
2888 struct bfd_hash_table *table;
2889 const char *string;
2890{
2891 /* Allocate the structure if it has not already been allocated by a
2892 subclass. */
2893 if (entry == NULL)
2894 {
2895 entry = bfd_hash_allocate (table, sizeof (struct ppc_link_hash_entry));
2896 if (entry == NULL)
2897 return entry;
2898 }
2899
2900 /* Call the allocation method of the superclass. */
2901 entry = _bfd_elf_link_hash_newfunc (entry, table, string);
2902 if (entry != NULL)
2903 {
2904 struct ppc_link_hash_entry *eh = (struct ppc_link_hash_entry *) entry;
2905
721956f4 2906 eh->stub_cache = NULL;
65f38f15 2907 eh->dyn_relocs = NULL;
721956f4 2908 eh->oh = NULL;
e86ce104
AM
2909 eh->is_func = 0;
2910 eh->is_func_descriptor = 0;
1e2f5b6e 2911 eh->is_entry = 0;
411e1bfb 2912 eh->tls_type = 0;
65f38f15
AM
2913 }
2914
2915 return entry;
2916}
2917
2918/* Create a ppc64 ELF linker hash table. */
2919
2920static struct bfd_link_hash_table *
2921ppc64_elf_link_hash_table_create (abfd)
2922 bfd *abfd;
2923{
2924 struct ppc_link_hash_table *htab;
2925 bfd_size_type amt = sizeof (struct ppc_link_hash_table);
2926
e2d34d7d 2927 htab = (struct ppc_link_hash_table *) bfd_malloc (amt);
65f38f15
AM
2928 if (htab == NULL)
2929 return NULL;
2930
2931 if (! _bfd_elf_link_hash_table_init (&htab->elf, abfd, link_hash_newfunc))
2932 {
e2d34d7d 2933 free (htab);
65f38f15
AM
2934 return NULL;
2935 }
2936
721956f4
AM
2937 /* Init the stub hash table too. */
2938 if (!bfd_hash_table_init (&htab->stub_hash_table, stub_hash_newfunc))
2939 return NULL;
2940
2941 /* And the branch hash table. */
2942 if (!bfd_hash_table_init (&htab->branch_hash_table, branch_hash_newfunc))
2943 return NULL;
2944
2945 htab->stub_bfd = NULL;
2946 htab->add_stub_section = NULL;
2947 htab->layout_sections_again = NULL;
2948 htab->stub_group = NULL;
65f38f15
AM
2949 htab->sgot = NULL;
2950 htab->srelgot = NULL;
2951 htab->splt = NULL;
2952 htab->srelplt = NULL;
2953 htab->sdynbss = NULL;
2954 htab->srelbss = NULL;
2955 htab->sglink = NULL;
82bd7b59 2956 htab->sfpr = NULL;
721956f4
AM
2957 htab->sbrlt = NULL;
2958 htab->srelbrlt = NULL;
411e1bfb
AM
2959 htab->tls_sec = NULL;
2960 htab->tlsld_got.refcount = 0;
721956f4
AM
2961 htab->stub_error = 0;
2962 htab->has_14bit_branch = 0;
805fc799 2963 htab->have_undefweak = 0;
721956f4 2964 htab->stub_iteration = 0;
ec338859 2965 htab->sym_sec.abfd = NULL;
411e1bfb
AM
2966 htab->elf.init_refcount.glist = NULL;
2967 htab->elf.init_offset.glist = NULL;
65f38f15
AM
2968
2969 return &htab->elf.root;
2970}
2971
721956f4
AM
2972/* Free the derived linker hash table. */
2973
2974static void
2975ppc64_elf_link_hash_table_free (hash)
2976 struct bfd_link_hash_table *hash;
2977{
2978 struct ppc_link_hash_table *ret = (struct ppc_link_hash_table *) hash;
2979
2980 bfd_hash_table_free (&ret->stub_hash_table);
2981 bfd_hash_table_free (&ret->branch_hash_table);
2982 _bfd_generic_link_hash_table_free (hash);
2983}
2984
2985/* Build a name for an entry in the stub hash table. */
2986
2987static char *
2988ppc_stub_name (input_section, sym_sec, h, rel)
2989 const asection *input_section;
2990 const asection *sym_sec;
2991 const struct ppc_link_hash_entry *h;
2992 const Elf_Internal_Rela *rel;
2993{
2994 char *stub_name;
2995 bfd_size_type len;
2996
2997 /* rel->r_addend is actually 64 bit, but who uses more than +/- 2^31
2998 offsets from a sym as a branch target? In fact, we could
2999 probably assume the addend is always zero. */
3000 BFD_ASSERT (((int) rel->r_addend & 0xffffffff) == rel->r_addend);
3001
3002 if (h)
3003 {
3004 len = 8 + 1 + strlen (h->elf.root.root.string) + 1 + 8 + 1;
3005 stub_name = bfd_malloc (len);
3006 if (stub_name != NULL)
3007 {
3008 sprintf (stub_name, "%08x_%s+%x",
3009 input_section->id & 0xffffffff,
3010 h->elf.root.root.string,
3011 (int) rel->r_addend & 0xffffffff);
3012 }
3013 }
3014 else
3015 {
3016 len = 8 + 1 + 8 + 1 + 8 + 1 + 16 + 1;
3017 stub_name = bfd_malloc (len);
3018 if (stub_name != NULL)
3019 {
3020 sprintf (stub_name, "%08x_%x:%x+%x",
3021 input_section->id & 0xffffffff,
3022 sym_sec->id & 0xffffffff,
3023 (int) ELF64_R_SYM (rel->r_info) & 0xffffffff,
3024 (int) rel->r_addend & 0xffffffff);
3025 }
3026 }
3027 return stub_name;
3028}
3029
3030/* Look up an entry in the stub hash. Stub entries are cached because
3031 creating the stub name takes a bit of time. */
3032
3033static struct ppc_stub_hash_entry *
3034ppc_get_stub_entry (input_section, sym_sec, hash, rel, htab)
3035 const asection *input_section;
3036 const asection *sym_sec;
3037 struct elf_link_hash_entry *hash;
3038 const Elf_Internal_Rela *rel;
3039 struct ppc_link_hash_table *htab;
3040{
3041 struct ppc_stub_hash_entry *stub_entry;
3042 struct ppc_link_hash_entry *h = (struct ppc_link_hash_entry *) hash;
3043 const asection *id_sec;
3044
3045 /* If this input section is part of a group of sections sharing one
3046 stub section, then use the id of the first section in the group.
3047 Stub names need to include a section id, as there may well be
3048 more than one stub used to reach say, printf, and we need to
3049 distinguish between them. */
3050 id_sec = htab->stub_group[input_section->id].link_sec;
3051
3052 if (h != NULL && h->stub_cache != NULL
3053 && h->stub_cache->h == h
3054 && h->stub_cache->id_sec == id_sec)
3055 {
3056 stub_entry = h->stub_cache;
3057 }
3058 else
3059 {
3060 char *stub_name;
3061
3062 stub_name = ppc_stub_name (id_sec, sym_sec, h, rel);
3063 if (stub_name == NULL)
3064 return NULL;
3065
3066 stub_entry = ppc_stub_hash_lookup (&htab->stub_hash_table,
b34976b6 3067 stub_name, FALSE, FALSE);
721956f4
AM
3068 if (h != NULL)
3069 h->stub_cache = stub_entry;
3070
3071 free (stub_name);
3072 }
3073
3074 return stub_entry;
3075}
3076
3077/* Add a new stub entry to the stub hash. Not all fields of the new
3078 stub entry are initialised. */
3079
3080static struct ppc_stub_hash_entry *
3081ppc_add_stub (stub_name, section, htab)
3082 const char *stub_name;
3083 asection *section;
3084 struct ppc_link_hash_table *htab;
3085{
3086 asection *link_sec;
3087 asection *stub_sec;
3088 struct ppc_stub_hash_entry *stub_entry;
3089
3090 link_sec = htab->stub_group[section->id].link_sec;
3091 stub_sec = htab->stub_group[section->id].stub_sec;
3092 if (stub_sec == NULL)
3093 {
3094 stub_sec = htab->stub_group[link_sec->id].stub_sec;
3095 if (stub_sec == NULL)
3096 {
d4c88bbb 3097 size_t namelen;
721956f4
AM
3098 bfd_size_type len;
3099 char *s_name;
3100
d4c88bbb
AM
3101 namelen = strlen (link_sec->name);
3102 len = namelen + sizeof (STUB_SUFFIX);
721956f4
AM
3103 s_name = bfd_alloc (htab->stub_bfd, len);
3104 if (s_name == NULL)
3105 return NULL;
3106
d4c88bbb
AM
3107 memcpy (s_name, link_sec->name, namelen);
3108 memcpy (s_name + namelen, STUB_SUFFIX, sizeof (STUB_SUFFIX));
721956f4
AM
3109 stub_sec = (*htab->add_stub_section) (s_name, link_sec);
3110 if (stub_sec == NULL)
3111 return NULL;
3112 htab->stub_group[link_sec->id].stub_sec = stub_sec;
3113 }
3114 htab->stub_group[section->id].stub_sec = stub_sec;
3115 }
3116
3117 /* Enter this entry into the linker stub hash table. */
3118 stub_entry = ppc_stub_hash_lookup (&htab->stub_hash_table, stub_name,
b34976b6 3119 TRUE, FALSE);
721956f4
AM
3120 if (stub_entry == NULL)
3121 {
3122 (*_bfd_error_handler) (_("%s: cannot create stub entry %s"),
3123 bfd_archive_filename (section->owner),
3124 stub_name);
3125 return NULL;
3126 }
3127
3128 stub_entry->stub_sec = stub_sec;
3129 stub_entry->stub_offset = 0;
3130 stub_entry->id_sec = link_sec;
3131 return stub_entry;
3132}
3133
82bd7b59
AM
3134/* Create sections for linker generated code. */
3135
b34976b6 3136static bfd_boolean
82bd7b59
AM
3137create_linkage_sections (dynobj, info)
3138 bfd *dynobj;
3139 struct bfd_link_info *info;
3140{
3141 struct ppc_link_hash_table *htab;
3142 flagword flags;
3143
3144 htab = ppc_hash_table (info);
3145
3146 /* Create .sfpr for code to save and restore fp regs. */
3147 flags = (SEC_ALLOC | SEC_LOAD | SEC_CODE | SEC_READONLY
3148 | SEC_HAS_CONTENTS | SEC_IN_MEMORY | SEC_LINKER_CREATED);
721956f4 3149 htab->sfpr = bfd_make_section_anyway (dynobj, ".sfpr");
82bd7b59
AM
3150 if (htab->sfpr == NULL
3151 || ! bfd_set_section_flags (dynobj, htab->sfpr, flags)
3152 || ! bfd_set_section_alignment (dynobj, htab->sfpr, 2))
b34976b6 3153 return FALSE;
82bd7b59 3154
721956f4
AM
3155 /* Create .glink for lazy dynamic linking support. */
3156 htab->sglink = bfd_make_section_anyway (dynobj, ".glink");
82bd7b59
AM
3157 if (htab->sglink == NULL
3158 || ! bfd_set_section_flags (dynobj, htab->sglink, flags)
3159 || ! bfd_set_section_alignment (dynobj, htab->sglink, 2))
b34976b6 3160 return FALSE;
82bd7b59 3161
721956f4
AM
3162 /* Create .branch_lt for plt_branch stubs. */
3163 flags = (SEC_ALLOC | SEC_LOAD
3164 | SEC_HAS_CONTENTS | SEC_IN_MEMORY | SEC_LINKER_CREATED);
3165 htab->sbrlt = bfd_make_section_anyway (dynobj, ".branch_lt");
3166 if (htab->sbrlt == NULL
3167 || ! bfd_set_section_flags (dynobj, htab->sbrlt, flags)
3168 || ! bfd_set_section_alignment (dynobj, htab->sbrlt, 3))
b34976b6 3169 return FALSE;
721956f4
AM
3170
3171 if (info->shared)
3172 {
3173 flags = (SEC_ALLOC | SEC_LOAD | SEC_READONLY
3174 | SEC_HAS_CONTENTS | SEC_IN_MEMORY | SEC_LINKER_CREATED);
1e2f5b6e 3175 htab->srelbrlt = bfd_make_section_anyway (dynobj, ".rela.branch_lt");
721956f4
AM
3176 if (!htab->srelbrlt
3177 || ! bfd_set_section_flags (dynobj, htab->srelbrlt, flags)
3178 || ! bfd_set_section_alignment (dynobj, htab->srelbrlt, 3))
b34976b6 3179 return FALSE;
721956f4 3180 }
b34976b6 3181 return TRUE;
82bd7b59
AM
3182}
3183
65f38f15
AM
3184/* Create .got and .rela.got sections in DYNOBJ, and set up
3185 shortcuts to them in our hash table. */
3186
b34976b6 3187static bfd_boolean
65f38f15
AM
3188create_got_section (dynobj, info)
3189 bfd *dynobj;
3190 struct bfd_link_info *info;
3191{
3192 struct ppc_link_hash_table *htab;
3193
3194 if (! _bfd_elf_create_got_section (dynobj, info))
b34976b6 3195 return FALSE;
65f38f15
AM
3196
3197 htab = ppc_hash_table (info);
3198 htab->sgot = bfd_get_section_by_name (dynobj, ".got");
3199 if (!htab->sgot)
3200 abort ();
3201
3202 htab->srelgot = bfd_make_section (dynobj, ".rela.got");
3203 if (!htab->srelgot
3204 || ! bfd_set_section_flags (dynobj, htab->srelgot,
3205 (SEC_ALLOC | SEC_LOAD | SEC_HAS_CONTENTS
3206 | SEC_IN_MEMORY | SEC_LINKER_CREATED
3207 | SEC_READONLY))
3208 || ! bfd_set_section_alignment (dynobj, htab->srelgot, 3))
b34976b6
AM
3209 return FALSE;
3210 return TRUE;
65f38f15 3211}
5bd4f169 3212
82bd7b59 3213/* Create the dynamic sections, and set up shortcuts. */
5bd4f169 3214
b34976b6 3215static bfd_boolean
65f38f15
AM
3216ppc64_elf_create_dynamic_sections (dynobj, info)
3217 bfd *dynobj;
5bd4f169
AM
3218 struct bfd_link_info *info;
3219{
65f38f15 3220 struct ppc_link_hash_table *htab;
5bd4f169 3221
65f38f15
AM
3222 htab = ppc_hash_table (info);
3223 if (!htab->sgot && !create_got_section (dynobj, info))
b34976b6 3224 return FALSE;
5bd4f169 3225
65f38f15 3226 if (!_bfd_elf_create_dynamic_sections (dynobj, info))
b34976b6 3227 return FALSE;
65f38f15
AM
3228
3229 htab->splt = bfd_get_section_by_name (dynobj, ".plt");
3230 htab->srelplt = bfd_get_section_by_name (dynobj, ".rela.plt");
3231 htab->sdynbss = bfd_get_section_by_name (dynobj, ".dynbss");
3232 if (!info->shared)
3233 htab->srelbss = bfd_get_section_by_name (dynobj, ".rela.bss");
3234
3235 if (!htab->splt || !htab->srelplt || !htab->sdynbss
3236 || (!info->shared && !htab->srelbss))
3237 abort ();
3238
b34976b6 3239 return TRUE;
5bd4f169
AM
3240}
3241
65f38f15
AM
3242/* Copy the extra info we tack onto an elf_link_hash_entry. */
3243
3244static void
b48fa14c 3245ppc64_elf_copy_indirect_symbol (bed, dir, ind)
411e1bfb 3246 struct elf_backend_data *bed ATTRIBUTE_UNUSED;
65f38f15
AM
3247 struct elf_link_hash_entry *dir, *ind;
3248{
3249 struct ppc_link_hash_entry *edir, *eind;
3250
3251 edir = (struct ppc_link_hash_entry *) dir;
3252 eind = (struct ppc_link_hash_entry *) ind;
3253
411e1bfb 3254 /* Copy over any dynamic relocs we may have on the indirect sym. */
bbd7ec4a 3255 if (eind->dyn_relocs != NULL)
65f38f15 3256 {
bbd7ec4a
AM
3257 if (edir->dyn_relocs != NULL)
3258 {
3259 struct ppc_dyn_relocs **pp;
3260 struct ppc_dyn_relocs *p;
3261
411e1bfb 3262 if (eind->elf.root.type == bfd_link_hash_indirect)
bbd7ec4a
AM
3263 abort ();
3264
3265 /* Add reloc counts against the weak sym to the strong sym
3266 list. Merge any entries against the same section. */
3267 for (pp = &eind->dyn_relocs; (p = *pp) != NULL; )
3268 {
3269 struct ppc_dyn_relocs *q;
3270
3271 for (q = edir->dyn_relocs; q != NULL; q = q->next)
3272 if (q->sec == p->sec)
3273 {
3274 q->pc_count += p->pc_count;
3275 q->count += p->count;
3276 *pp = p->next;
3277 break;
3278 }
3279 if (q == NULL)
3280 pp = &p->next;
3281 }
3282 *pp = edir->dyn_relocs;
3283 }
3284
65f38f15
AM
3285 edir->dyn_relocs = eind->dyn_relocs;
3286 eind->dyn_relocs = NULL;
3287 }
65f38f15 3288
411e1bfb
AM
3289 /* Do the same for got entries. */
3290 if (eind->elf.got.glist != NULL)
3291 {
3292 if (edir->elf.got.glist != NULL)
3293 {
3294 struct got_entry **entp;
3295 struct got_entry *ent;
3296
3297 for (entp = &eind->elf.got.glist; (ent = *entp) != NULL; )
3298 {
3299 struct got_entry *dent;
3300
3301 for (dent = edir->elf.got.glist; dent != NULL; dent = dent->next)
3302 if (dent->addend == ent->addend
3303 && dent->tls_type == ent->tls_type)
3304 {
3305 dent->got.refcount += ent->got.refcount;
3306 *entp = ent->next;
3307 break;
3308 }
3309 if (dent == NULL)
3310 entp = &ent->next;
3311 }
3312 *entp = edir->elf.got.glist;
3313 }
3314
3315 edir->elf.got.glist = eind->elf.got.glist;
3316 eind->elf.got.glist = NULL;
3317 }
3318
3319 /* And plt entries. */
3320 if (eind->elf.plt.plist != NULL)
3321 {
3322 if (edir->elf.plt.plist != NULL)
3323 {
3324 struct plt_entry **entp;
3325 struct plt_entry *ent;
3326
3327 for (entp = &eind->elf.plt.plist; (ent = *entp) != NULL; )
3328 {
3329 struct plt_entry *dent;
3330
3331 for (dent = edir->elf.plt.plist; dent != NULL; dent = dent->next)
3332 if (dent->addend == ent->addend)
3333 {
3334 dent->plt.refcount += ent->plt.refcount;
3335 *entp = ent->next;
3336 break;
3337 }
3338 if (dent == NULL)
3339 entp = &ent->next;
3340 }
3341 *entp = edir->elf.plt.plist;
3342 }
3343
3344 edir->elf.plt.plist = eind->elf.plt.plist;
3345 eind->elf.plt.plist = NULL;
3346 }
3347
d1329ca3
AM
3348 edir->is_func |= eind->is_func;
3349 edir->is_func_descriptor |= eind->is_func_descriptor;
1e2f5b6e 3350 edir->is_entry |= eind->is_entry;
e86ce104 3351
411e1bfb
AM
3352 /* Copy down any references that we may have already seen to the
3353 symbol which just became indirect. */
3354 edir->elf.elf_link_hash_flags |=
3355 (eind->elf.elf_link_hash_flags
3356 & (ELF_LINK_HASH_REF_DYNAMIC
3357 | ELF_LINK_HASH_REF_REGULAR
3358 | ELF_LINK_HASH_REF_REGULAR_NONWEAK
3359 | ELF_LINK_NON_GOT_REF));
3360
3361 if (eind->elf.root.type != bfd_link_hash_indirect)
3362 return;
3363
3364 if (edir->elf.dynindx == -1)
3365 {
3366 edir->elf.dynindx = eind->elf.dynindx;
3367 edir->elf.dynstr_index = eind->elf.dynstr_index;
3368 eind->elf.dynindx = -1;
3369 eind->elf.dynstr_index = 0;
3370 }
3371 else
3372 BFD_ASSERT (eind->elf.dynindx == -1);
3373}
3374
3375/* Set a flag, used by ppc64_elf_gc_mark_hook, on the entry symbol and
3376 symbols undefined on the command-line. */
3377
3378bfd_boolean
3379ppc64_elf_mark_entry_syms (info)
3380 struct bfd_link_info *info;
3381{
3382 struct ppc_link_hash_table *htab;
3383 struct bfd_sym_chain *sym;
3384
3385 htab = ppc_hash_table (info);
3386 for (sym = info->gc_sym_list; sym; sym = sym->next)
3387 {
3388 struct elf_link_hash_entry *h;
3389
3390 h = elf_link_hash_lookup (&htab->elf, sym->name, FALSE, FALSE, FALSE);
3391 if (h != NULL)
3392 ((struct ppc_link_hash_entry *) h)->is_entry = 1;
3393 }
3394 return TRUE;
3395}
3396
3397static bfd_boolean
3398update_local_sym_info (abfd, symtab_hdr, r_symndx, r_addend, tls_type)
3399 bfd *abfd;
3400 Elf_Internal_Shdr *symtab_hdr;
3401 unsigned long r_symndx;
3402 bfd_vma r_addend;
3403 int tls_type;
3404{
3405 struct got_entry **local_got_ents = elf_local_got_ents (abfd);
3406 char *local_got_tls_types;
3407
3408 if (local_got_ents == NULL)
3409 {
3410 bfd_size_type size = symtab_hdr->sh_info;
3411
3412 size *= sizeof (*local_got_ents) + sizeof (char);
3413 local_got_ents = (struct got_entry **) bfd_zalloc (abfd, size);
3414 if (local_got_ents == NULL)
3415 return FALSE;
3416 elf_local_got_ents (abfd) = local_got_ents;
3417 }
3418
3419 if ((tls_type & TLS_EXPLICIT) == 0)
3420 {
3421 struct got_entry *ent;
3422
3423 for (ent = local_got_ents[r_symndx]; ent != NULL; ent = ent->next)
3424 if (ent->addend == r_addend && ent->tls_type == tls_type)
3425 break;
3426 if (ent == NULL)
3427 {
3428 bfd_size_type amt = sizeof (*ent);
3429 ent = (struct got_entry *) bfd_alloc (abfd, amt);
3430 if (ent == NULL)
3431 return FALSE;
3432 ent->next = local_got_ents[r_symndx];
3433 ent->addend = r_addend;
3434 ent->tls_type = tls_type;
3435 ent->got.refcount = 0;
3436 local_got_ents[r_symndx] = ent;
3437 }
3438 ent->got.refcount += 1;
3439 }
3440
3441 local_got_tls_types = (char *) (local_got_ents + symtab_hdr->sh_info);
3442 local_got_tls_types[r_symndx] |= tls_type;
3443 return TRUE;
65f38f15
AM
3444}
3445
411e1bfb
AM
3446static bfd_boolean
3447update_plt_info (abfd, eh, addend)
3448 bfd *abfd;
3449 struct ppc_link_hash_entry *eh;
3450 bfd_vma addend;
1e2f5b6e 3451{
411e1bfb 3452 struct plt_entry *ent;
1e2f5b6e 3453
411e1bfb
AM
3454 for (ent = eh->elf.plt.plist; ent != NULL; ent = ent->next)
3455 if (ent->addend == addend)
3456 break;
3457 if (ent == NULL)
1e2f5b6e 3458 {
411e1bfb
AM
3459 bfd_size_type amt = sizeof (*ent);
3460 ent = (struct plt_entry *) bfd_alloc (abfd, amt);
3461 if (ent == NULL)
3462 return FALSE;
3463 ent->next = eh->elf.plt.plist;
3464 ent->addend = addend;
3465 ent->plt.refcount = 0;
3466 eh->elf.plt.plist = ent;
1e2f5b6e 3467 }
411e1bfb
AM
3468 ent->plt.refcount += 1;
3469 eh->elf.elf_link_hash_flags |= ELF_LINK_HASH_NEEDS_PLT;
3470 eh->is_func = 1;
b34976b6 3471 return TRUE;
1e2f5b6e
AM
3472}
3473
5bd4f169 3474/* Look through the relocs for a section during the first phase, and
65f38f15 3475 calculate needed space in the global offset table, procedure
5d1634d7 3476 linkage table, and dynamic reloc sections. */
5bd4f169 3477
b34976b6 3478static bfd_boolean
5bd4f169
AM
3479ppc64_elf_check_relocs (abfd, info, sec, relocs)
3480 bfd *abfd;
3481 struct bfd_link_info *info;
3482 asection *sec;
3483 const Elf_Internal_Rela *relocs;
3484{
65f38f15 3485 struct ppc_link_hash_table *htab;
5bd4f169
AM
3486 Elf_Internal_Shdr *symtab_hdr;
3487 struct elf_link_hash_entry **sym_hashes, **sym_hashes_end;
3488 const Elf_Internal_Rela *rel;
3489 const Elf_Internal_Rela *rel_end;
5bd4f169 3490 asection *sreloc;
1e2f5b6e 3491 asection **opd_sym_map;
5bd4f169
AM
3492
3493 if (info->relocateable)
b34976b6 3494 return TRUE;
5bd4f169 3495
65f38f15 3496 htab = ppc_hash_table (info);
5bd4f169 3497 symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
5bd4f169
AM
3498
3499 sym_hashes = elf_sym_hashes (abfd);
3500 sym_hashes_end = (sym_hashes
1e2f5b6e
AM
3501 + symtab_hdr->sh_size / sizeof (Elf64_External_Sym)
3502 - symtab_hdr->sh_info);
5bd4f169
AM
3503
3504 sreloc = NULL;
1e2f5b6e
AM
3505 opd_sym_map = NULL;
3506 if (strcmp (bfd_get_section_name (abfd, sec), ".opd") == 0)
3507 {
3508 /* Garbage collection needs some extra help with .opd sections.
3509 We don't want to necessarily keep everything referenced by
3510 relocs in .opd, as that would keep all functions. Instead,
3511 if we reference an .opd symbol (a function descriptor), we
3512 want to keep the function code symbol's section. This is
3513 easy for global symbols, but for local syms we need to keep
3514 information about the associated function section. Later, if
3515 edit_opd deletes entries, we'll use this array to adjust
3516 local syms in .opd. */
3517 union opd_info {
3518 asection *func_section;
3519 long entry_adjust;
3520 };
3521 bfd_size_type amt;
3522
3523 amt = sec->_raw_size * sizeof (union opd_info) / 24;
3524 opd_sym_map = (asection **) bfd_zalloc (abfd, amt);
3525 if (opd_sym_map == NULL)
b34976b6 3526 return FALSE;
f0abc2a1 3527 ppc64_elf_section_data (sec)->opd.func_sec = opd_sym_map;
1e2f5b6e 3528 }
5bd4f169 3529
82bd7b59
AM
3530 if (htab->elf.dynobj == NULL)
3531 htab->elf.dynobj = abfd;
3532 if (htab->sfpr == NULL
3533 && !create_linkage_sections (htab->elf.dynobj, info))
b34976b6 3534 return FALSE;
82bd7b59 3535
5bd4f169
AM
3536 rel_end = relocs + sec->reloc_count;
3537 for (rel = relocs; rel < rel_end; rel++)
3538 {
3539 unsigned long r_symndx;
3540 struct elf_link_hash_entry *h;
04c9666a 3541 enum elf_ppc64_reloc_type r_type;
411e1bfb 3542 int tls_type = 0;
5bd4f169
AM
3543
3544 r_symndx = ELF64_R_SYM (rel->r_info);
3545 if (r_symndx < symtab_hdr->sh_info)
3546 h = NULL;
3547 else
3548 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
3549
04c9666a 3550 r_type = (enum elf_ppc64_reloc_type) ELF64_R_TYPE (rel->r_info);
a33d1f77 3551 switch (r_type)
5bd4f169 3552 {
411e1bfb
AM
3553 case R_PPC64_GOT_TLSLD16:
3554 case R_PPC64_GOT_TLSLD16_LO:
3555 case R_PPC64_GOT_TLSLD16_HI:
3556 case R_PPC64_GOT_TLSLD16_HA:
3557 htab->tlsld_got.refcount += 1;
3558 tls_type = TLS_TLS | TLS_GD_LD | TLS_LD;
3559 goto dogottls;
3560
3561 case R_PPC64_GOT_TLSGD16:
3562 case R_PPC64_GOT_TLSGD16_LO:
3563 case R_PPC64_GOT_TLSGD16_HI:
3564 case R_PPC64_GOT_TLSGD16_HA:
3565 tls_type = TLS_TLS | TLS_GD_LD;
3566 goto dogottls;
3567
3568 case R_PPC64_GOT_TPREL16_DS:
3569 case R_PPC64_GOT_TPREL16_LO_DS:
3570 case R_PPC64_GOT_TPREL16_HI:
3571 case R_PPC64_GOT_TPREL16_HA:
3572 if (info->shared)
3573 info->flags |= DF_STATIC_TLS;
3574 tls_type = TLS_TLS | TLS_TPREL;
3575 goto dogottls;
3576
3577 case R_PPC64_GOT_DTPREL16_DS:
3578 case R_PPC64_GOT_DTPREL16_LO_DS:
3579 case R_PPC64_GOT_DTPREL16_HI:
3580 case R_PPC64_GOT_DTPREL16_HA:
3581 tls_type = TLS_TLS | TLS_DTPREL;
3582 dogottls:
3583 sec->has_tls_reloc = 1;
3584 /* Fall thru */
3585
5bd4f169 3586 case R_PPC64_GOT16:
5bd4f169 3587 case R_PPC64_GOT16_DS:
65f38f15
AM
3588 case R_PPC64_GOT16_HA:
3589 case R_PPC64_GOT16_HI:
3590 case R_PPC64_GOT16_LO:
5bd4f169 3591 case R_PPC64_GOT16_LO_DS:
65f38f15 3592 /* This symbol requires a global offset table entry. */
82bd7b59
AM
3593 if (htab->sgot == NULL
3594 && !create_got_section (htab->elf.dynobj, info))
b34976b6 3595 return FALSE;
5bd4f169
AM
3596
3597 if (h != NULL)
3598 {
411e1bfb
AM
3599 struct ppc_link_hash_entry *eh;
3600 struct got_entry *ent;
65f38f15 3601
411e1bfb
AM
3602 eh = (struct ppc_link_hash_entry *) h;
3603 for (ent = eh->elf.got.glist; ent != NULL; ent = ent->next)
3604 if (ent->addend == rel->r_addend
3605 && ent->tls_type == tls_type)
3606 break;
3607 if (ent == NULL)
5bd4f169 3608 {
411e1bfb
AM
3609 bfd_size_type amt = sizeof (*ent);
3610 ent = (struct got_entry *) bfd_alloc (abfd, amt);
3611 if (ent == NULL)
b34976b6 3612 return FALSE;
411e1bfb
AM
3613 ent->next = eh->elf.got.glist;
3614 ent->addend = rel->r_addend;
3615 ent->tls_type = tls_type;
3616 ent->got.refcount = 0;
3617 eh->elf.got.glist = ent;
5bd4f169 3618 }
411e1bfb
AM
3619 ent->got.refcount += 1;
3620 eh->tls_type |= tls_type;
5bd4f169 3621 }
411e1bfb
AM
3622 else
3623 /* This is a global offset table entry for a local symbol. */
3624 if (!update_local_sym_info (abfd, symtab_hdr, r_symndx,
3625 rel->r_addend, tls_type))
3626 return FALSE;
5bd4f169
AM
3627 break;
3628
5bd4f169 3629 case R_PPC64_PLT16_HA:
65f38f15
AM
3630 case R_PPC64_PLT16_HI:
3631 case R_PPC64_PLT16_LO:
3632 case R_PPC64_PLT32:
3633 case R_PPC64_PLT64:
5bd4f169 3634 /* This symbol requires a procedure linkage table entry. We
3fad3c7c
AM
3635 actually build the entry in adjust_dynamic_symbol,
3636 because this might be a case of linking PIC code without
3637 linking in any dynamic objects, in which case we don't
3638 need to generate a procedure linkage table after all. */
5bd4f169
AM
3639 if (h == NULL)
3640 {
3641 /* It does not make sense to have a procedure linkage
3fad3c7c 3642 table entry for a local symbol. */
5bd4f169 3643 bfd_set_error (bfd_error_bad_value);
b34976b6 3644 return FALSE;
5bd4f169 3645 }
411e1bfb
AM
3646 else
3647 if (!update_plt_info (abfd, (struct ppc_link_hash_entry *) h,
3648 rel->r_addend))
3649 return FALSE;
5bd4f169
AM
3650 break;
3651
3652 /* The following relocations don't need to propagate the
3653 relocation if linking a shared object since they are
3654 section relative. */
3655 case R_PPC64_SECTOFF:
3656 case R_PPC64_SECTOFF_LO:
3657 case R_PPC64_SECTOFF_HI:
3658 case R_PPC64_SECTOFF_HA:
3659 case R_PPC64_SECTOFF_DS:
3660 case R_PPC64_SECTOFF_LO_DS:
3661 case R_PPC64_TOC16:
3662 case R_PPC64_TOC16_LO:
3663 case R_PPC64_TOC16_HI:
3664 case R_PPC64_TOC16_HA:
3665 case R_PPC64_TOC16_DS:
3666 case R_PPC64_TOC16_LO_DS:
411e1bfb
AM
3667 case R_PPC64_DTPREL16:
3668 case R_PPC64_DTPREL16_LO:
3669 case R_PPC64_DTPREL16_HI:
3670 case R_PPC64_DTPREL16_HA:
3671 case R_PPC64_DTPREL16_DS:
3672 case R_PPC64_DTPREL16_LO_DS:
3673 case R_PPC64_DTPREL16_HIGHER:
3674 case R_PPC64_DTPREL16_HIGHERA:
3675 case R_PPC64_DTPREL16_HIGHEST:
3676 case R_PPC64_DTPREL16_HIGHESTA:
5bd4f169
AM
3677 break;
3678
3679 /* This relocation describes the C++ object vtable hierarchy.
3680 Reconstruct it for later use during GC. */
3681 case R_PPC64_GNU_VTINHERIT:
3682 if (!_bfd_elf64_gc_record_vtinherit (abfd, sec, h, rel->r_offset))
b34976b6 3683 return FALSE;
5bd4f169
AM
3684 break;
3685
3686 /* This relocation describes which C++ vtable entries are actually
3687 used. Record for later use during GC. */
3688 case R_PPC64_GNU_VTENTRY:
3689 if (!_bfd_elf64_gc_record_vtentry (abfd, sec, h, rel->r_addend))
b34976b6 3690 return FALSE;
5bd4f169
AM
3691 break;
3692
721956f4
AM
3693 case R_PPC64_REL14:
3694 case R_PPC64_REL14_BRTAKEN:
3695 case R_PPC64_REL14_BRNTAKEN:
3696 htab->has_14bit_branch = 1;
3697 /* Fall through. */
3698
5d1634d7 3699 case R_PPC64_REL24:
e86ce104
AM
3700 if (h != NULL
3701 && h->root.root.string[0] == '.'
3702 && h->root.root.string[1] != 0)
5d1634d7
AM
3703 {
3704 /* We may need a .plt entry if the function this reloc
3705 refers to is in a shared lib. */
411e1bfb
AM
3706 if (!update_plt_info (abfd, (struct ppc_link_hash_entry *) h,
3707 rel->r_addend))
3708 return FALSE;
3709 if (h == htab->tls_get_addr)
3710 sec->has_tls_reloc = 1;
3711 else if (strcmp (h->root.root.string, ".__tls_get_addr") == 0)
3712 {
3713 htab->tls_get_addr = h;
3714 sec->has_tls_reloc = 1;
3715 }
3716 }
3717 break;
3718
3719 case R_PPC64_TPREL64:
3720 tls_type = TLS_EXPLICIT | TLS_TLS | TLS_TPREL;
3721 if (info->shared)
3722 info->flags |= DF_STATIC_TLS;
3723 goto dotlstoc;
3724
3725 case R_PPC64_DTPMOD64:
3726 if (rel + 1 < rel_end
3727 && rel[1].r_info == ELF64_R_INFO (r_symndx, R_PPC64_DTPREL64)
3728 && rel[1].r_offset == rel->r_offset + 8)
3729 tls_type = TLS_EXPLICIT | TLS_TLS | TLS_GD_LD;
3730 else
3731 tls_type = TLS_EXPLICIT | TLS_TLS | TLS_GD_LD | TLS_LD;
3732 goto dotlstoc;
3733
3734 case R_PPC64_DTPREL64:
3735 tls_type = TLS_EXPLICIT | TLS_TLS | TLS_DTPREL;
3736 if (rel != relocs
3737 && rel[-1].r_info == ELF64_R_INFO (r_symndx, R_PPC64_DTPMOD64)
3738 && rel[-1].r_offset == rel->r_offset - 8)
3739 /* This is the second reloc of a dtpmod, dtprel pair.
3740 Don't mark with TLS_DTPREL. */
3741 goto dodyn;
3742
3743 dotlstoc:
3744 sec->has_tls_reloc = 1;
3745 if (h != NULL)
3746 {
3747 struct ppc_link_hash_entry *eh;
3748 eh = (struct ppc_link_hash_entry *) h;
3749 eh->tls_type |= tls_type;
3750 }
3751 else
3752 if (!update_local_sym_info (abfd, symtab_hdr, r_symndx,
3753 rel->r_addend, tls_type))
3754 return FALSE;
3755
3756 if (ppc64_elf_section_data (sec)->t_symndx == NULL)
3757 {
3758 bfd_size_type amt = sec->_raw_size * sizeof (unsigned) / 8;
3759 ppc64_elf_section_data (sec)->t_symndx
3760 = (unsigned *) bfd_zalloc (abfd, amt);
3761 if (ppc64_elf_section_data (sec)->t_symndx == NULL)
3762 return FALSE;
3763 }
3764 BFD_ASSERT (rel->r_offset % 8 == 0);
3765 ppc64_elf_section_data (sec)->t_symndx[rel->r_offset / 8] = r_symndx;
3766 goto dodyn;
3767
3768 case R_PPC64_TPREL16:
3769 case R_PPC64_TPREL16_LO:
3770 case R_PPC64_TPREL16_HI:
3771 case R_PPC64_TPREL16_HA:
3772 case R_PPC64_TPREL16_DS:
3773 case R_PPC64_TPREL16_LO_DS:
3774 case R_PPC64_TPREL16_HIGHER:
3775 case R_PPC64_TPREL16_HIGHERA:
3776 case R_PPC64_TPREL16_HIGHEST:
3777 case R_PPC64_TPREL16_HIGHESTA:
3778 if (info->shared)
3779 {
3780 info->flags |= DF_STATIC_TLS;
3781 goto dodyn;
5d1634d7
AM
3782 }
3783 break;
3784
e86ce104 3785 case R_PPC64_ADDR64:
1e2f5b6e 3786 if (opd_sym_map != NULL
e86ce104
AM
3787 && h != NULL
3788 && h->root.root.string[0] == '.'
3789 && h->root.root.string[1] != 0)
3790 {
3791 struct elf_link_hash_entry *fdh;
3792
3793 fdh = elf_link_hash_lookup (&htab->elf, h->root.root.string + 1,
b34976b6 3794 FALSE, FALSE, FALSE);
e86ce104
AM
3795 if (fdh != NULL)
3796 {
e86ce104 3797 ((struct ppc_link_hash_entry *) fdh)->is_func_descriptor = 1;
721956f4 3798 ((struct ppc_link_hash_entry *) fdh)->oh = h;
e86ce104 3799 ((struct ppc_link_hash_entry *) h)->is_func = 1;
721956f4 3800 ((struct ppc_link_hash_entry *) h)->oh = fdh;
e86ce104
AM
3801 }
3802 }
1e2f5b6e
AM
3803 if (opd_sym_map != NULL
3804 && h == NULL
3805 && rel + 1 < rel_end
04c9666a 3806 && ((enum elf_ppc64_reloc_type) ELF64_R_TYPE ((rel + 1)->r_info)
1e2f5b6e
AM
3807 == R_PPC64_TOC))
3808 {
3809 asection *s;
3810
3811 s = bfd_section_from_r_symndx (abfd, &htab->sym_sec, sec,
3812 r_symndx);
3813 if (s == NULL)
b34976b6 3814 return FALSE;
1e2f5b6e
AM
3815 else if (s != sec)
3816 opd_sym_map[rel->r_offset / 24] = s;
3817 }
e86ce104
AM
3818 /* Fall through. */
3819
04c9666a 3820 case R_PPC64_REL30:
5bd4f169 3821 case R_PPC64_REL32:
04c9666a 3822 case R_PPC64_REL64:
65f38f15
AM
3823 case R_PPC64_ADDR14:
3824 case R_PPC64_ADDR14_BRNTAKEN:
3825 case R_PPC64_ADDR14_BRTAKEN:
3826 case R_PPC64_ADDR16:
3827 case R_PPC64_ADDR16_DS:
3828 case R_PPC64_ADDR16_HA:
3829 case R_PPC64_ADDR16_HI:
3830 case R_PPC64_ADDR16_HIGHER:
3831 case R_PPC64_ADDR16_HIGHERA:
3832 case R_PPC64_ADDR16_HIGHEST:
3833 case R_PPC64_ADDR16_HIGHESTA:
3834 case R_PPC64_ADDR16_LO:
3835 case R_PPC64_ADDR16_LO_DS:
3836 case R_PPC64_ADDR24:
65f38f15 3837 case R_PPC64_ADDR32:
65f38f15
AM
3838 case R_PPC64_UADDR16:
3839 case R_PPC64_UADDR32:
3840 case R_PPC64_UADDR64:
5bd4f169 3841 case R_PPC64_TOC:
41bd81ab 3842 /* Don't propagate .opd relocs. */
1e2f5b6e 3843 if (NO_OPD_RELOCS && opd_sym_map != NULL)
e86ce104 3844 break;
e86ce104 3845
65f38f15
AM
3846 /* If we are creating a shared library, and this is a reloc
3847 against a global symbol, or a non PC relative reloc
3848 against a local symbol, then we need to copy the reloc
3849 into the shared library. However, if we are linking with
3850 -Bsymbolic, we do not need to copy a reloc against a
3851 global symbol which is defined in an object we are
3852 including in the link (i.e., DEF_REGULAR is set). At
3853 this point we have not seen all the input files, so it is
3854 possible that DEF_REGULAR is not set now but will be set
3855 later (it is never cleared). In case of a weak definition,
3856 DEF_REGULAR may be cleared later by a strong definition in
3857 a shared library. We account for that possibility below by
3858 storing information in the relocs_copied field of the hash
3859 table entry. A similar situation occurs when creating
3860 shared libraries and symbol visibility changes render the
3861 symbol local.
3862
3863 If on the other hand, we are creating an executable, we
3864 may need to keep relocations for symbols satisfied by a
3865 dynamic library if we manage to avoid copy relocs for the
3866 symbol. */
411e1bfb 3867 dodyn:
65f38f15
AM
3868 if ((info->shared
3869 && (sec->flags & SEC_ALLOC) != 0
411e1bfb 3870 && (MUST_BE_DYN_RELOC (r_type)
65f38f15
AM
3871 || (h != NULL
3872 && (! info->symbolic
3873 || h->root.type == bfd_link_hash_defweak
3874 || (h->elf_link_hash_flags
3875 & ELF_LINK_HASH_DEF_REGULAR) == 0))))
3876 || (!info->shared
3877 && (sec->flags & SEC_ALLOC) != 0
3878 && h != NULL
3879 && (h->root.type == bfd_link_hash_defweak
3880 || (h->elf_link_hash_flags
3881 & ELF_LINK_HASH_DEF_REGULAR) == 0)))
5bd4f169 3882 {
ec338859
AM
3883 struct ppc_dyn_relocs *p;
3884 struct ppc_dyn_relocs **head;
3885
65f38f15
AM
3886 /* We must copy these reloc types into the output file.
3887 Create a reloc section in dynobj and make room for
3888 this reloc. */
5bd4f169
AM
3889 if (sreloc == NULL)
3890 {
3891 const char *name;
65f38f15 3892 bfd *dynobj;
5bd4f169
AM
3893
3894 name = (bfd_elf_string_from_elf_section
3895 (abfd,
3896 elf_elfheader (abfd)->e_shstrndx,
3897 elf_section_data (sec)->rel_hdr.sh_name));
3898 if (name == NULL)
b34976b6 3899 return FALSE;
5bd4f169 3900
65f38f15
AM
3901 if (strncmp (name, ".rela", 5) != 0
3902 || strcmp (bfd_get_section_name (abfd, sec),
3903 name + 5) != 0)
3904 {
3905 (*_bfd_error_handler)
3906 (_("%s: bad relocation section name `%s\'"),
3907 bfd_archive_filename (abfd), name);
5d1634d7 3908 bfd_set_error (bfd_error_bad_value);
65f38f15
AM
3909 }
3910
65f38f15 3911 dynobj = htab->elf.dynobj;
5bd4f169
AM
3912 sreloc = bfd_get_section_by_name (dynobj, name);
3913 if (sreloc == NULL)
3914 {
3915 flagword flags;
3916
3917 sreloc = bfd_make_section (dynobj, name);
3918 flags = (SEC_HAS_CONTENTS | SEC_READONLY
3919 | SEC_IN_MEMORY | SEC_LINKER_CREATED);
3920 if ((sec->flags & SEC_ALLOC) != 0)
3921 flags |= SEC_ALLOC | SEC_LOAD;
3922 if (sreloc == NULL
3923 || ! bfd_set_section_flags (dynobj, sreloc, flags)
65f38f15 3924 || ! bfd_set_section_alignment (dynobj, sreloc, 3))
b34976b6 3925 return FALSE;
5bd4f169 3926 }
65f38f15 3927 elf_section_data (sec)->sreloc = sreloc;
5bd4f169
AM
3928 }
3929
65f38f15
AM
3930 /* If this is a global symbol, we count the number of
3931 relocations we need for this symbol. */
3932 if (h != NULL)
3933 {
ec338859 3934 head = &((struct ppc_link_hash_entry *) h)->dyn_relocs;
65f38f15
AM
3935 }
3936 else
3937 {
ec338859
AM
3938 /* Track dynamic relocs needed for local syms too.
3939 We really need local syms available to do this
3940 easily. Oh well. */
3941
3942 asection *s;
3943 s = bfd_section_from_r_symndx (abfd, &htab->sym_sec,
3944 sec, r_symndx);
3945 if (s == NULL)
b34976b6 3946 return FALSE;
ec338859
AM
3947
3948 head = ((struct ppc_dyn_relocs **)
3949 &elf_section_data (s)->local_dynrel);
65f38f15 3950 }
ec338859
AM
3951
3952 p = *head;
3953 if (p == NULL || p->sec != sec)
3954 {
3955 p = ((struct ppc_dyn_relocs *)
3956 bfd_alloc (htab->elf.dynobj,
3957 (bfd_size_type) sizeof *p));
3958 if (p == NULL)
b34976b6 3959 return FALSE;
ec338859
AM
3960 p->next = *head;
3961 *head = p;
3962 p->sec = sec;
3963 p->count = 0;
3964 p->pc_count = 0;
3965 }
3966
3967 p->count += 1;
411e1bfb 3968 if (!MUST_BE_DYN_RELOC (r_type))
ec338859 3969 p->pc_count += 1;
65f38f15 3970 }
5bd4f169 3971 break;
65f38f15
AM
3972
3973 default:
96e0dda4 3974 break;
5bd4f169
AM
3975 }
3976 }
3977
b34976b6 3978 return TRUE;
5bd4f169
AM
3979}
3980
3981/* Return the section that should be marked against GC for a given
3982 relocation. */
3983
3984static asection *
1e2f5b6e
AM
3985ppc64_elf_gc_mark_hook (sec, info, rel, h, sym)
3986 asection *sec;
5bd4f169
AM
3987 struct bfd_link_info *info ATTRIBUTE_UNUSED;
3988 Elf_Internal_Rela *rel;
3989 struct elf_link_hash_entry *h;
3990 Elf_Internal_Sym *sym;
3991{
1e2f5b6e
AM
3992 asection *rsec = NULL;
3993
5bd4f169
AM
3994 if (h != NULL)
3995 {
04c9666a 3996 enum elf_ppc64_reloc_type r_type;
1e2f5b6e 3997 struct ppc_link_hash_entry *fdh;
a33d1f77 3998
04c9666a 3999 r_type = (enum elf_ppc64_reloc_type) ELF64_R_TYPE (rel->r_info);
a33d1f77 4000 switch (r_type)
5bd4f169
AM
4001 {
4002 case R_PPC64_GNU_VTINHERIT:
4003 case R_PPC64_GNU_VTENTRY:
4004 break;
4005
4006 default:
4007 switch (h->root.type)
4008 {
4009 case bfd_link_hash_defined:
4010 case bfd_link_hash_defweak:
1e2f5b6e
AM
4011 fdh = (struct ppc_link_hash_entry *) h;
4012
4013 /* Function descriptor syms cause the associated
4014 function code sym section to be marked. */
4015 if (fdh->is_func_descriptor)
4016 rsec = fdh->oh->root.u.def.section;
4017
4018 /* Function entry syms return NULL if they are in .opd
4019 and are not ._start (or others undefined on the ld
4020 command line). Thus we avoid marking all function
b34976b6 4021 sections, as all functions are referenced in .opd. */
1e2f5b6e
AM
4022 else if ((fdh->oh != NULL
4023 && ((struct ppc_link_hash_entry *) fdh->oh)->is_entry)
f0abc2a1 4024 || ppc64_elf_section_data (sec)->opd.func_sec == NULL)
1e2f5b6e
AM
4025 rsec = h->root.u.def.section;
4026 break;
5bd4f169
AM
4027
4028 case bfd_link_hash_common:
1e2f5b6e
AM
4029 rsec = h->root.u.c.p->section;
4030 break;
5bd4f169
AM
4031
4032 default:
4033 break;
4034 }
4035 }
4036 }
4037 else
4038 {
1e2f5b6e
AM
4039 asection **opd_sym_section;
4040
4041 rsec = bfd_section_from_elf_index (sec->owner, sym->st_shndx);
f0abc2a1 4042 opd_sym_section = ppc64_elf_section_data (rsec)->opd.func_sec;
1e2f5b6e
AM
4043 if (opd_sym_section != NULL)
4044 rsec = opd_sym_section[sym->st_value / 24];
f0abc2a1 4045 else if (ppc64_elf_section_data (sec)->opd.func_sec != NULL)
1e2f5b6e 4046 rsec = NULL;
5bd4f169
AM
4047 }
4048
1e2f5b6e 4049 return rsec;
5bd4f169
AM
4050}
4051
65f38f15
AM
4052/* Update the .got, .plt. and dynamic reloc reference counts for the
4053 section being removed. */
5bd4f169 4054
b34976b6 4055static bfd_boolean
5bd4f169
AM
4056ppc64_elf_gc_sweep_hook (abfd, info, sec, relocs)
4057 bfd *abfd;
411e1bfb 4058 struct bfd_link_info *info;
5bd4f169
AM
4059 asection *sec;
4060 const Elf_Internal_Rela *relocs;
4061{
411e1bfb 4062 struct ppc_link_hash_table *htab;
5bd4f169
AM
4063 Elf_Internal_Shdr *symtab_hdr;
4064 struct elf_link_hash_entry **sym_hashes;
411e1bfb 4065 struct got_entry **local_got_ents;
5bd4f169 4066 const Elf_Internal_Rela *rel, *relend;
5bd4f169 4067
ec338859
AM
4068 elf_section_data (sec)->local_dynrel = NULL;
4069
411e1bfb 4070 htab = ppc_hash_table (info);
5bd4f169
AM
4071 symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
4072 sym_hashes = elf_sym_hashes (abfd);
411e1bfb 4073 local_got_ents = elf_local_got_ents (abfd);
5bd4f169
AM
4074
4075 relend = relocs + sec->reloc_count;
4076 for (rel = relocs; rel < relend; rel++)
a33d1f77
AM
4077 {
4078 unsigned long r_symndx;
04c9666a 4079 enum elf_ppc64_reloc_type r_type;
a33d1f77 4080 struct elf_link_hash_entry *h;
411e1bfb 4081 char tls_type = 0;
5bd4f169 4082
a33d1f77 4083 r_symndx = ELF64_R_SYM (rel->r_info);
04c9666a 4084 r_type = (enum elf_ppc64_reloc_type) ELF64_R_TYPE (rel->r_info);
a33d1f77
AM
4085 switch (r_type)
4086 {
411e1bfb
AM
4087 case R_PPC64_GOT_TLSLD16:
4088 case R_PPC64_GOT_TLSLD16_LO:
4089 case R_PPC64_GOT_TLSLD16_HI:
4090 case R_PPC64_GOT_TLSLD16_HA:
4091 htab->tlsld_got.refcount -= 1;
4092 tls_type = TLS_TLS | TLS_GD_LD | TLS_LD;
4093 goto dogot;
4094
4095 case R_PPC64_GOT_TLSGD16:
4096 case R_PPC64_GOT_TLSGD16_LO:
4097 case R_PPC64_GOT_TLSGD16_HI:
4098 case R_PPC64_GOT_TLSGD16_HA:
4099 tls_type = TLS_TLS | TLS_GD_LD;
4100 goto dogot;
4101
4102 case R_PPC64_GOT_TPREL16_DS:
4103 case R_PPC64_GOT_TPREL16_LO_DS:
4104 case R_PPC64_GOT_TPREL16_HI:
4105 case R_PPC64_GOT_TPREL16_HA:
4106 tls_type = TLS_TLS | TLS_TPREL;
4107 goto dogot;
4108
4109 case R_PPC64_GOT_DTPREL16_DS:
4110 case R_PPC64_GOT_DTPREL16_LO_DS:
4111 case R_PPC64_GOT_DTPREL16_HI:
4112 case R_PPC64_GOT_DTPREL16_HA:
4113 tls_type = TLS_TLS | TLS_DTPREL;
4114 goto dogot;
4115
a33d1f77
AM
4116 case R_PPC64_GOT16:
4117 case R_PPC64_GOT16_DS:
4118 case R_PPC64_GOT16_HA:
4119 case R_PPC64_GOT16_HI:
4120 case R_PPC64_GOT16_LO:
4121 case R_PPC64_GOT16_LO_DS:
411e1bfb
AM
4122 dogot:
4123 {
4124 struct got_entry *ent;
4125
4126 if (r_symndx >= symtab_hdr->sh_info)
4127 {
4128 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
4129 ent = h->got.glist;
4130 }
4131 else
4132 ent = local_got_ents[r_symndx];
4133
4134 for (; ent != NULL; ent = ent->next)
4135 if (ent->addend == rel->r_addend
4136 && ent->tls_type == tls_type)
4137 break;
4138 if (ent == NULL)
4139 abort ();
4140 if (ent->got.refcount > 0)
4141 ent->got.refcount -= 1;
4142 }
a33d1f77 4143 break;
65f38f15 4144
a33d1f77
AM
4145 case R_PPC64_PLT16_HA:
4146 case R_PPC64_PLT16_HI:
4147 case R_PPC64_PLT16_LO:
4148 case R_PPC64_PLT32:
4149 case R_PPC64_PLT64:
721956f4
AM
4150 case R_PPC64_REL14:
4151 case R_PPC64_REL14_BRNTAKEN:
4152 case R_PPC64_REL14_BRTAKEN:
5d1634d7
AM
4153 case R_PPC64_REL24:
4154 if (r_symndx >= symtab_hdr->sh_info)
4155 {
411e1bfb
AM
4156 struct plt_entry *ent;
4157
5d1634d7 4158 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
411e1bfb
AM
4159 for (ent = h->plt.plist; ent != NULL; ent = ent->next)
4160 if (ent->addend == rel->r_addend)
4161 break;
4162 if (ent == NULL)
4163 abort ();
4164 if (ent->plt.refcount > 0)
4165 ent->plt.refcount -= 1;
5d1634d7 4166 }
e86ce104 4167 break;
5d1634d7 4168
04c9666a 4169 case R_PPC64_REL30:
a33d1f77
AM
4170 case R_PPC64_REL32:
4171 case R_PPC64_REL64:
4172 if (r_symndx >= symtab_hdr->sh_info)
4173 {
4174 struct ppc_link_hash_entry *eh;
4175 struct ppc_dyn_relocs **pp;
4176 struct ppc_dyn_relocs *p;
65f38f15 4177
a33d1f77
AM
4178 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
4179 eh = (struct ppc_link_hash_entry *) h;
65f38f15 4180
a33d1f77
AM
4181 for (pp = &eh->dyn_relocs; (p = *pp) != NULL; pp = &p->next)
4182 if (p->sec == sec)
4183 {
4184 p->pc_count -= 1;
4185 p->count -= 1;
4186 if (p->count == 0)
4187 *pp = p->next;
4188 break;
4189 }
4190 }
4191 break;
65f38f15 4192
411e1bfb
AM
4193 case R_PPC64_DTPMOD64:
4194 case R_PPC64_DTPREL64:
4195 case R_PPC64_TPREL64:
a33d1f77
AM
4196 case R_PPC64_ADDR14:
4197 case R_PPC64_ADDR14_BRNTAKEN:
4198 case R_PPC64_ADDR14_BRTAKEN:
4199 case R_PPC64_ADDR16:
4200 case R_PPC64_ADDR16_DS:
4201 case R_PPC64_ADDR16_HA:
4202 case R_PPC64_ADDR16_HI:
4203 case R_PPC64_ADDR16_HIGHER:
4204 case R_PPC64_ADDR16_HIGHERA:
4205 case R_PPC64_ADDR16_HIGHEST:
4206 case R_PPC64_ADDR16_HIGHESTA:
4207 case R_PPC64_ADDR16_LO:
4208 case R_PPC64_ADDR16_LO_DS:
4209 case R_PPC64_ADDR24:
a33d1f77
AM
4210 case R_PPC64_ADDR32:
4211 case R_PPC64_ADDR64:
4212 case R_PPC64_UADDR16:
4213 case R_PPC64_UADDR32:
4214 case R_PPC64_UADDR64:
4215 case R_PPC64_TOC:
4216 if (r_symndx >= symtab_hdr->sh_info)
4217 {
4218 struct ppc_link_hash_entry *eh;
4219 struct ppc_dyn_relocs **pp;
4220 struct ppc_dyn_relocs *p;
65f38f15 4221
a33d1f77
AM
4222 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
4223 eh = (struct ppc_link_hash_entry *) h;
4224
4225 for (pp = &eh->dyn_relocs; (p = *pp) != NULL; pp = &p->next)
4226 if (p->sec == sec)
4227 {
4228 p->count -= 1;
4229 if (p->count == 0)
4230 *pp = p->next;
4231 break;
4232 }
4233 }
4234 break;
5bd4f169 4235
a33d1f77
AM
4236 default:
4237 break;
4238 }
4239 }
b34976b6 4240 return TRUE;
5bd4f169
AM
4241}
4242
e86ce104
AM
4243/* Called via elf_link_hash_traverse to transfer dynamic linking
4244 information on function code symbol entries to their corresponding
4245 function descriptor symbol entries. */
b34976b6 4246static bfd_boolean
e86ce104 4247func_desc_adjust (h, inf)
5bd4f169 4248 struct elf_link_hash_entry *h;
e86ce104 4249 PTR inf;
5bd4f169 4250{
e86ce104 4251 struct bfd_link_info *info;
65f38f15 4252 struct ppc_link_hash_table *htab;
411e1bfb 4253 struct plt_entry *ent;
5bd4f169 4254
e92d460e 4255 if (h->root.type == bfd_link_hash_indirect)
b34976b6 4256 return TRUE;
e86ce104 4257
e92d460e
AM
4258 if (h->root.type == bfd_link_hash_warning)
4259 h = (struct elf_link_hash_entry *) h->root.u.i.link;
4260
e86ce104 4261 info = (struct bfd_link_info *) inf;
65f38f15 4262 htab = ppc_hash_table (info);
5bd4f169 4263
e86ce104
AM
4264 /* If this is a function code symbol, transfer dynamic linking
4265 information to the function descriptor symbol. */
4266 if (!((struct ppc_link_hash_entry *) h)->is_func)
b34976b6 4267 return TRUE;
e86ce104 4268
805fc799
AM
4269 if (h->root.type == bfd_link_hash_undefweak
4270 && (h->elf_link_hash_flags & ELF_LINK_HASH_REF_REGULAR))
b34976b6 4271 htab->have_undefweak = TRUE;
805fc799 4272
411e1bfb
AM
4273 for (ent = h->plt.plist; ent != NULL; ent = ent->next)
4274 if (ent->plt.refcount > 0)
4275 break;
4276 if (ent != NULL
e86ce104
AM
4277 && h->root.root.string[0] == '.'
4278 && h->root.root.string[1] != '\0')
5bd4f169 4279 {
721956f4 4280 struct elf_link_hash_entry *fdh = ((struct ppc_link_hash_entry *) h)->oh;
b34976b6 4281 bfd_boolean force_local;
5bd4f169 4282
648cca2c
AM
4283 /* Find the corresponding function descriptor symbol. Create it
4284 as undefined if necessary. */
5bd4f169 4285
721956f4
AM
4286 if (fdh == NULL)
4287 fdh = elf_link_hash_lookup (&htab->elf, h->root.root.string + 1,
b34976b6 4288 FALSE, FALSE, TRUE);
5bd4f169 4289
d926e03d
AM
4290 if (fdh == NULL
4291 && info->shared
4292 && (h->root.type == bfd_link_hash_undefined
4293 || h->root.type == bfd_link_hash_undefweak))
648cca2c
AM
4294 {
4295 bfd *abfd;
4296 asymbol *newsym;
14a793b2 4297 struct bfd_link_hash_entry *bh;
648cca2c 4298
d926e03d 4299 abfd = h->root.u.undef.abfd;
648cca2c
AM
4300 newsym = bfd_make_empty_symbol (abfd);
4301 newsym->name = h->root.root.string + 1;
4302 newsym->section = bfd_und_section_ptr;
4303 newsym->value = 0;
4304 newsym->flags = BSF_OBJECT;
4305 if (h->root.type == bfd_link_hash_undefweak)
4306 newsym->flags |= BSF_WEAK;
4307
14a793b2 4308 bh = &fdh->root;
648cca2c
AM
4309 if ( !(_bfd_generic_link_add_one_symbol
4310 (info, abfd, newsym->name, newsym->flags,
b34976b6 4311 newsym->section, newsym->value, NULL, FALSE, FALSE, &bh)))
648cca2c 4312 {
b34976b6 4313 return FALSE;
648cca2c 4314 }
14a793b2 4315 fdh = (struct elf_link_hash_entry *) bh;
d926e03d 4316 fdh->elf_link_hash_flags &= ~ELF_LINK_NON_ELF;
648cca2c
AM
4317 }
4318
e86ce104
AM
4319 if (fdh != NULL
4320 && (fdh->elf_link_hash_flags & ELF_LINK_FORCED_LOCAL) == 0
4321 && (info->shared
4322 || (fdh->elf_link_hash_flags & ELF_LINK_HASH_DEF_DYNAMIC) != 0
4323 || (fdh->elf_link_hash_flags & ELF_LINK_HASH_REF_DYNAMIC) != 0))
4324 {
4325 if (fdh->dynindx == -1)
4326 if (! bfd_elf64_link_record_dynamic_symbol (info, fdh))
b34976b6 4327 return FALSE;
e86ce104
AM
4328 fdh->elf_link_hash_flags |= (h->elf_link_hash_flags
4329 & (ELF_LINK_HASH_REF_REGULAR
4330 | ELF_LINK_HASH_REF_DYNAMIC
4331 | ELF_LINK_HASH_REF_REGULAR_NONWEAK
4332 | ELF_LINK_NON_GOT_REF));
e1fa50e7
AM
4333 if (ELF_ST_VISIBILITY (h->other) == STV_DEFAULT)
4334 {
411e1bfb 4335 fdh->plt.plist = h->plt.plist;
e1fa50e7
AM
4336 fdh->elf_link_hash_flags |= ELF_LINK_HASH_NEEDS_PLT;
4337 }
e86ce104 4338 ((struct ppc_link_hash_entry *) fdh)->is_func_descriptor = 1;
721956f4 4339 ((struct ppc_link_hash_entry *) fdh)->oh = h;
721956f4 4340 ((struct ppc_link_hash_entry *) h)->oh = fdh;
e86ce104
AM
4341 }
4342
4343 /* Now that the info is on the function descriptor, clear the
4344 function code sym info. Any function code syms for which we
4345 don't have a definition in a regular file, we force local.
4346 This prevents a shared library from exporting syms that have
4347 been imported from another library. Function code syms that
4348 are really in the library we must leave global to prevent the
e1fa50e7 4349 linker dragging in a definition from a static library. */
ea1e4b0d
AM
4350 force_local = (info->shared
4351 && ((h->elf_link_hash_flags
4352 & ELF_LINK_HASH_DEF_REGULAR) == 0
4353 || fdh == NULL
4354 || (fdh->elf_link_hash_flags
4355 & ELF_LINK_HASH_DEF_REGULAR) == 0
4356 || (fdh->elf_link_hash_flags
4357 & ELF_LINK_FORCED_LOCAL) != 0));
e86ce104
AM
4358 _bfd_elf_link_hash_hide_symbol (info, h, force_local);
4359 }
4360
b34976b6 4361 return TRUE;
e86ce104 4362}
40b8271b 4363
82bd7b59
AM
4364#define MIN_SAVE_FPR 14
4365#define MAX_SAVE_FPR 31
4366
e86ce104 4367/* Called near the start of bfd_elf_size_dynamic_sections. We use
82bd7b59
AM
4368 this hook to a) provide some gcc support functions, and b) transfer
4369 dynamic linking information gathered so far on function code symbol
4370 entries, to their corresponding function descriptor symbol entries. */
b34976b6 4371static bfd_boolean
e86ce104
AM
4372ppc64_elf_func_desc_adjust (obfd, info)
4373 bfd *obfd ATTRIBUTE_UNUSED;
4374 struct bfd_link_info *info;
4375{
4376 struct ppc_link_hash_table *htab;
82bd7b59
AM
4377 unsigned int lowest_savef = MAX_SAVE_FPR + 2;
4378 unsigned int lowest_restf = MAX_SAVE_FPR + 2;
4379 unsigned int i;
4380 struct elf_link_hash_entry *h;
721956f4 4381 bfd_byte *p;
82bd7b59 4382 char sym[10];
e86ce104
AM
4383
4384 htab = ppc_hash_table (info);
82bd7b59
AM
4385
4386 if (htab->sfpr == NULL)
4387 /* We don't have any relocs. */
b34976b6 4388 return TRUE;
82bd7b59
AM
4389
4390 /* First provide any missing ._savef* and ._restf* functions. */
4391 memcpy (sym, "._savef14", 10);
4392 for (i = MIN_SAVE_FPR; i <= MAX_SAVE_FPR; i++)
4393 {
4394 sym[7] = i / 10 + '0';
4395 sym[8] = i % 10 + '0';
b34976b6 4396 h = elf_link_hash_lookup (&htab->elf, sym, FALSE, FALSE, TRUE);
82bd7b59
AM
4397 if (h != NULL
4398 && h->root.type == bfd_link_hash_undefined)
4399 {
4400 if (lowest_savef > i)
4401 lowest_savef = i;
4402 h->root.type = bfd_link_hash_defined;
4403 h->root.u.def.section = htab->sfpr;
4404 h->root.u.def.value = (i - lowest_savef) * 4;
4405 h->type = STT_FUNC;
4406 h->elf_link_hash_flags |= ELF_LINK_HASH_DEF_REGULAR;
4407 _bfd_elf_link_hash_hide_symbol (info, h, info->shared);
4408 }
4409 }
4410
4411 memcpy (sym, "._restf14", 10);
4412 for (i = MIN_SAVE_FPR; i <= MAX_SAVE_FPR; i++)
4413 {
4414 sym[7] = i / 10 + '0';
4415 sym[8] = i % 10 + '0';
b34976b6 4416 h = elf_link_hash_lookup (&htab->elf, sym, FALSE, FALSE, TRUE);
82bd7b59
AM
4417 if (h != NULL
4418 && h->root.type == bfd_link_hash_undefined)
4419 {
4420 if (lowest_restf > i)
4421 lowest_restf = i;
4422 h->root.type = bfd_link_hash_defined;
4423 h->root.u.def.section = htab->sfpr;
4424 h->root.u.def.value = ((MAX_SAVE_FPR + 2 - lowest_savef) * 4
4425 + (i - lowest_restf) * 4);
4426 h->type = STT_FUNC;
4427 h->elf_link_hash_flags |= ELF_LINK_HASH_DEF_REGULAR;
4428 _bfd_elf_link_hash_hide_symbol (info, h, info->shared);
4429 }
4430 }
4431
805fc799
AM
4432 elf_link_hash_traverse (&htab->elf, func_desc_adjust, (PTR) info);
4433
82bd7b59
AM
4434 htab->sfpr->_raw_size = ((MAX_SAVE_FPR + 2 - lowest_savef) * 4
4435 + (MAX_SAVE_FPR + 2 - lowest_restf) * 4);
4436
4437 if (htab->sfpr->_raw_size == 0)
805fc799
AM
4438 {
4439 if (!htab->have_undefweak)
4440 {
4441 _bfd_strip_section_from_output (info, htab->sfpr);
b34976b6 4442 return TRUE;
805fc799
AM
4443 }
4444
4445 htab->sfpr->_raw_size = 4;
4446 }
82bd7b59 4447
721956f4
AM
4448 p = (bfd_byte *) bfd_alloc (htab->elf.dynobj, htab->sfpr->_raw_size);
4449 if (p == NULL)
b34976b6 4450 return FALSE;
721956f4
AM
4451 htab->sfpr->contents = p;
4452
4453 for (i = lowest_savef; i <= MAX_SAVE_FPR; i++)
4454 {
4455 unsigned int fpr = i << 21;
4456 unsigned int stackoff = (1 << 16) - (MAX_SAVE_FPR + 1 - i) * 8;
4457 bfd_put_32 (htab->elf.dynobj, STFD_FR0_0R1 + fpr + stackoff, p);
4458 p += 4;
4459 }
4460 if (lowest_savef <= MAX_SAVE_FPR)
4461 {
82bd7b59
AM
4462 bfd_put_32 (htab->elf.dynobj, BLR, p);
4463 p += 4;
721956f4 4464 }
82bd7b59 4465
721956f4
AM
4466 for (i = lowest_restf; i <= MAX_SAVE_FPR; i++)
4467 {
4468 unsigned int fpr = i << 21;
4469 unsigned int stackoff = (1 << 16) - (MAX_SAVE_FPR + 1 - i) * 8;
4470 bfd_put_32 (htab->elf.dynobj, LFD_FR0_0R1 + fpr + stackoff, p);
82bd7b59
AM
4471 p += 4;
4472 }
721956f4
AM
4473 if (lowest_restf <= MAX_SAVE_FPR
4474 || htab->sfpr->_raw_size == 4)
4475 {
4476 bfd_put_32 (htab->elf.dynobj, BLR, p);
4477 }
82bd7b59 4478
b34976b6 4479 return TRUE;
e86ce104
AM
4480}
4481
4482/* Adjust a symbol defined by a dynamic object and referenced by a
4483 regular object. The current definition is in some section of the
4484 dynamic object, but we're not including those sections. We have to
4485 change the definition to something the rest of the link can
4486 understand. */
4487
b34976b6 4488static bfd_boolean
e86ce104
AM
4489ppc64_elf_adjust_dynamic_symbol (info, h)
4490 struct bfd_link_info *info;
4491 struct elf_link_hash_entry *h;
4492{
4493 struct ppc_link_hash_table *htab;
4494 struct ppc_link_hash_entry * eh;
4495 struct ppc_dyn_relocs *p;
4496 asection *s;
4497 unsigned int power_of_two;
4498
4499 htab = ppc_hash_table (info);
4500
4501 /* Deal with function syms. */
4502 if (h->type == STT_FUNC
4503 || (h->elf_link_hash_flags & ELF_LINK_HASH_NEEDS_PLT) != 0)
4504 {
4505 /* Clear procedure linkage table information for any symbol that
4506 won't need a .plt entry. */
411e1bfb
AM
4507 struct plt_entry *ent;
4508 for (ent = h->plt.plist; ent != NULL; ent = ent->next)
4509 if (ent->plt.refcount > 0)
4510 break;
e86ce104 4511 if (!((struct ppc_link_hash_entry *) h)->is_func_descriptor
411e1bfb 4512 || ent == NULL
e86ce104
AM
4513 || (h->elf_link_hash_flags & ELF_LINK_FORCED_LOCAL) != 0
4514 || (! info->shared
4515 && (h->elf_link_hash_flags & ELF_LINK_HASH_DEF_DYNAMIC) == 0
4516 && (h->elf_link_hash_flags & ELF_LINK_HASH_REF_DYNAMIC) == 0))
40b8271b 4517 {
411e1bfb 4518 h->plt.plist = NULL;
40b8271b 4519 h->elf_link_hash_flags &= ~ELF_LINK_HASH_NEEDS_PLT;
40b8271b 4520 }
b34976b6 4521 return TRUE;
5bd4f169 4522 }
bbd7ec4a 4523 else
411e1bfb 4524 h->plt.plist = NULL;
5bd4f169
AM
4525
4526 /* If this is a weak symbol, and there is a real definition, the
4527 processor independent code will have arranged for us to see the
4528 real definition first, and we can just use the same value. */
4529 if (h->weakdef != NULL)
4530 {
4531 BFD_ASSERT (h->weakdef->root.type == bfd_link_hash_defined
4532 || h->weakdef->root.type == bfd_link_hash_defweak);
4533 h->root.u.def.section = h->weakdef->root.u.def.section;
4534 h->root.u.def.value = h->weakdef->root.u.def.value;
b34976b6 4535 return TRUE;
5bd4f169
AM
4536 }
4537
4538 /* This is a reference to a symbol defined by a dynamic object which
4539 is not a function. */
4540
4541 /* If we are creating a shared library, we must presume that the
4542 only references to the symbol are via the global offset table.
4543 For such cases we need not do anything here; the relocations will
4544 be handled correctly by relocate_section. */
4545 if (info->shared)
b34976b6 4546 return TRUE;
5bd4f169 4547
65f38f15
AM
4548 /* If there are no references to this symbol that do not use the
4549 GOT, we don't need to generate a copy reloc. */
4550 if ((h->elf_link_hash_flags & ELF_LINK_NON_GOT_REF) == 0)
b34976b6 4551 return TRUE;
65f38f15
AM
4552
4553 eh = (struct ppc_link_hash_entry *) h;
4554 for (p = eh->dyn_relocs; p != NULL; p = p->next)
4555 {
4556 s = p->sec->output_section;
4557 if (s != NULL && (s->flags & SEC_READONLY) != 0)
4558 break;
4559 }
4560
4561 /* If we didn't find any dynamic relocs in read-only sections, then
5d1634d7 4562 we'll be keeping the dynamic relocs and avoiding the copy reloc. */
65f38f15
AM
4563 if (p == NULL)
4564 {
4565 h->elf_link_hash_flags &= ~ELF_LINK_NON_GOT_REF;
b34976b6 4566 return TRUE;
65f38f15
AM
4567 }
4568
5bd4f169
AM
4569 /* We must allocate the symbol in our .dynbss section, which will
4570 become part of the .bss section of the executable. There will be
4571 an entry for this symbol in the .dynsym section. The dynamic
4572 object will contain position independent code, so all references
4573 from the dynamic object to this symbol will go through the global
4574 offset table. The dynamic linker will use the .dynsym entry to
4575 determine the address it must put in the global offset table, so
4576 both the dynamic object and the regular object will refer to the
4577 same memory location for the variable. */
5bd4f169 4578
04c9666a
AM
4579 /* We must generate a R_PPC64_COPY reloc to tell the dynamic linker
4580 to copy the initial value out of the dynamic object and into the
5bd4f169
AM
4581 runtime process image. We need to remember the offset into the
4582 .rela.bss section we are going to use. */
4583 if ((h->root.u.def.section->flags & SEC_ALLOC) != 0)
4584 {
65f38f15 4585 htab->srelbss->_raw_size += sizeof (Elf64_External_Rela);
5bd4f169
AM
4586 h->elf_link_hash_flags |= ELF_LINK_HASH_NEEDS_COPY;
4587 }
4588
4589 /* We need to figure out the alignment required for this symbol. I
4590 have no idea how ELF linkers handle this. */
4591 power_of_two = bfd_log2 (h->size);
4592 if (power_of_two > 4)
4593 power_of_two = 4;
4594
4595 /* Apply the required alignment. */
65f38f15
AM
4596 s = htab->sdynbss;
4597 s->_raw_size = BFD_ALIGN (s->_raw_size, (bfd_size_type) (1 << power_of_two));
4598 if (power_of_two > bfd_get_section_alignment (htab->elf.dynobj, s))
5bd4f169 4599 {
65f38f15 4600 if (! bfd_set_section_alignment (htab->elf.dynobj, s, power_of_two))
b34976b6 4601 return FALSE;
5bd4f169
AM
4602 }
4603
4604 /* Define the symbol as being at this point in the section. */
4605 h->root.u.def.section = s;
4606 h->root.u.def.value = s->_raw_size;
4607
4608 /* Increment the section size to make room for the symbol. */
4609 s->_raw_size += h->size;
4610
b34976b6 4611 return TRUE;
5bd4f169
AM
4612}
4613
e86ce104
AM
4614/* If given a function descriptor symbol, hide both the function code
4615 sym and the descriptor. */
4616static void
4617ppc64_elf_hide_symbol (info, h, force_local)
4618 struct bfd_link_info *info;
4619 struct elf_link_hash_entry *h;
b34976b6 4620 bfd_boolean force_local;
e86ce104
AM
4621{
4622 _bfd_elf_link_hash_hide_symbol (info, h, force_local);
4623
4624 if (((struct ppc_link_hash_entry *) h)->is_func_descriptor)
4625 {
721956f4 4626 struct elf_link_hash_entry *fh = ((struct ppc_link_hash_entry *) h)->oh;
e86ce104 4627
721956f4 4628 if (fh == NULL)
d1329ca3
AM
4629 {
4630 const char *p, *q;
4631 struct ppc_link_hash_table *htab;
4632 char save;
4633
4634 /* We aren't supposed to use alloca in BFD because on
4635 systems which do not have alloca the version in libiberty
4636 calls xmalloc, which might cause the program to crash
4637 when it runs out of memory. This function doesn't have a
4638 return status, so there's no way to gracefully return an
4639 error. So cheat. We know that string[-1] can be safely
4640 dereferenced; It's either a string in an ELF string
4641 table, or allocated in an objalloc structure. */
4642
4643 p = h->root.root.string - 1;
4644 save = *p;
4645 *(char *) p = '.';
4646 htab = ppc_hash_table (info);
b34976b6 4647 fh = elf_link_hash_lookup (&htab->elf, p, FALSE, FALSE, FALSE);
d1329ca3
AM
4648 *(char *) p = save;
4649
4650 /* Unfortunately, if it so happens that the string we were
4651 looking for was allocated immediately before this string,
4652 then we overwrote the string terminator. That's the only
4653 reason the lookup should fail. */
4654 if (fh == NULL)
4655 {
4656 q = h->root.root.string + strlen (h->root.root.string);
4657 while (q >= h->root.root.string && *q == *p)
4658 --q, --p;
4659 if (q < h->root.root.string && *p == '.')
b34976b6 4660 fh = elf_link_hash_lookup (&htab->elf, p, FALSE, FALSE, FALSE);
d1329ca3
AM
4661 }
4662 if (fh != NULL)
4663 {
4664 ((struct ppc_link_hash_entry *) h)->oh = fh;
4665 ((struct ppc_link_hash_entry *) fh)->oh = h;
4666 }
4667 }
e86ce104
AM
4668 if (fh != NULL)
4669 _bfd_elf_link_hash_hide_symbol (info, fh, force_local);
4670 }
4671}
4672
411e1bfb
AM
4673static bfd_boolean
4674get_sym_h (hp, symp, symsecp, tlstypep, locsymsp, r_symndx, ibfd)
4675 struct elf_link_hash_entry **hp;
4676 Elf_Internal_Sym **symp;
4677 asection **symsecp;
4678 char **tlstypep;
4679 Elf_Internal_Sym **locsymsp;
4680 unsigned long r_symndx;
4681 bfd *ibfd;
4682{
4683 Elf_Internal_Shdr *symtab_hdr = &elf_tdata (ibfd)->symtab_hdr;
4684
4685 if (r_symndx >= symtab_hdr->sh_info)
4686 {
4687 struct elf_link_hash_entry **sym_hashes = elf_sym_hashes (ibfd);
4688 struct elf_link_hash_entry *h;
4689
4690 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
4691 while (h->root.type == bfd_link_hash_indirect
4692 || h->root.type == bfd_link_hash_warning)
4693 h = (struct elf_link_hash_entry *) h->root.u.i.link;
4694
4695 if (hp != NULL)
4696 *hp = h;
4697
4698 if (symp != NULL)
4699 *symp = NULL;
4700
4701 if (symsecp != NULL)
4702 {
4703 asection *symsec = NULL;
4704 if (h->root.type == bfd_link_hash_defined
4705 || h->root.type == bfd_link_hash_defweak)
4706 symsec = h->root.u.def.section;
4707 *symsecp = symsec;
4708 }
4709
4710 if (tlstypep != NULL)
4711 {
4712 struct ppc_link_hash_entry *eh;
4713
4714 eh = (struct ppc_link_hash_entry *) h;
4715 *tlstypep = &eh->tls_type;
4716 }
4717 }
4718 else
4719 {
4720 Elf_Internal_Sym *sym;
4721 Elf_Internal_Sym *locsyms = *locsymsp;
4722
4723 if (locsyms == NULL)
4724 {
4725 locsyms = (Elf_Internal_Sym *) symtab_hdr->contents;
4726 if (locsyms == NULL)
4727 locsyms = bfd_elf_get_elf_syms (ibfd, symtab_hdr,
4728 symtab_hdr->sh_info,
4729 0, NULL, NULL, NULL);
4730 if (locsyms == NULL)
4731 return FALSE;
4732 *locsymsp = locsyms;
4733 }
4734 sym = locsyms + r_symndx;
4735
4736 if (hp != NULL)
4737 *hp = NULL;
4738
4739 if (symp != NULL)
4740 *symp = sym;
4741
4742 if (symsecp != NULL)
4743 {
4744 asection *symsec = NULL;
4745 if ((sym->st_shndx != SHN_UNDEF
4746 && sym->st_shndx < SHN_LORESERVE)
4747 || sym->st_shndx > SHN_HIRESERVE)
4748 symsec = bfd_section_from_elf_index (ibfd, sym->st_shndx);
4749 *symsecp = symsec;
4750 }
4751
4752 if (tlstypep != NULL)
4753 {
4754 struct got_entry **lgot_ents;
4755 char *tlstype;
4756
4757 tlstype = NULL;
4758 lgot_ents = elf_local_got_ents (ibfd);
4759 if (lgot_ents != NULL)
4760 {
4761 char *lgot_types = (char *) (lgot_ents + symtab_hdr->sh_info);
4762 tlstype = &lgot_types[r_symndx];
4763 }
4764 *tlstypep = tlstype;
4765 }
4766 }
4767 return TRUE;
4768}
4769
4770static bfd_boolean
4771get_tls_type (tls_type, locsymsp, rel, ibfd)
4772 char **tls_type;
4773 Elf_Internal_Sym **locsymsp;
4774 const Elf_Internal_Rela *rel;
4775 bfd *ibfd;
4776{
4777 unsigned long r_symndx;
4778 struct elf_link_hash_entry *h;
4779 Elf_Internal_Sym *sym;
4780 asection *sec;
4781 bfd_vma off;
4782
4783 r_symndx = ELF64_R_SYM (rel->r_info);
4784 if (!get_sym_h (&h, &sym, &sec, tls_type, locsymsp, r_symndx, ibfd))
4785 return FALSE;
4786
4787 if ((*tls_type != NULL && **tls_type != 0)
4788 || sec == NULL
4789 || ppc64_elf_section_data (sec)->t_symndx == NULL)
4790 return TRUE;
4791
4792 /* Look inside a TOC section too. */
4793 if (h != NULL)
4794 {
4795 BFD_ASSERT (h->root.type == bfd_link_hash_defined);
4796 off = h->root.u.def.value;
4797 }
4798 else
4799 off = sym->st_value;
4800 off += rel->r_addend;
4801 BFD_ASSERT (off % 8 == 0);
4802 r_symndx = ppc64_elf_section_data (sec)->t_symndx[off / 8];
4803 return get_sym_h (&h, &sym, NULL, tls_type, locsymsp, r_symndx, ibfd);
4804}
4805
b34976b6 4806bfd_boolean
d6fe2dc1 4807ppc64_elf_edit_opd (obfd, info)
1e2f5b6e
AM
4808 bfd *obfd;
4809 struct bfd_link_info *info;
4810{
4811 bfd *ibfd;
1e2f5b6e 4812
411e1bfb 4813 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link_next)
1e2f5b6e
AM
4814 {
4815 asection *sec;
4816 Elf_Internal_Rela *relstart, *rel, *relend;
4817 Elf_Internal_Shdr *symtab_hdr;
6cdc0ccc 4818 Elf_Internal_Sym *local_syms;
1e2f5b6e
AM
4819 struct elf_link_hash_entry **sym_hashes;
4820 bfd_vma offset;
d6fe2dc1 4821 bfd_size_type amt;
1e2f5b6e 4822 long *adjust;
b34976b6 4823 bfd_boolean need_edit;
1e2f5b6e
AM
4824
4825 sec = bfd_get_section_by_name (ibfd, ".opd");
4826 if (sec == NULL)
4827 continue;
4828
d6fe2dc1 4829 amt = sec->_raw_size * sizeof (long) / 24;
f0abc2a1 4830 adjust = ppc64_elf_section_data (sec)->opd.adjust;
d6fe2dc1
AM
4831 if (adjust == NULL)
4832 {
4833 /* Must be a ld -r link. ie. check_relocs hasn't been
4834 called. */
4835 adjust = (long *) bfd_zalloc (obfd, amt);
f0abc2a1 4836 ppc64_elf_section_data (sec)->opd.adjust = adjust;
d6fe2dc1
AM
4837 }
4838 memset (adjust, 0, (size_t) amt);
1e2f5b6e
AM
4839
4840 if (sec->output_section == bfd_abs_section_ptr)
4841 continue;
4842
4843 /* Look through the section relocs. */
4844 if ((sec->flags & SEC_RELOC) == 0 || sec->reloc_count == 0)
4845 continue;
4846
6cdc0ccc 4847 local_syms = NULL;
1e2f5b6e
AM
4848 symtab_hdr = &elf_tdata (ibfd)->symtab_hdr;
4849 sym_hashes = elf_sym_hashes (ibfd);
4850
4851 /* Read the relocations. */
73374ef1 4852 relstart = _bfd_elf64_link_read_relocs (ibfd, sec, (PTR) NULL,
1e2f5b6e
AM
4853 (Elf_Internal_Rela *) NULL,
4854 info->keep_memory);
4855 if (relstart == NULL)
b34976b6 4856 return FALSE;
1e2f5b6e
AM
4857
4858 /* First run through the relocs to check they are sane, and to
4859 determine whether we need to edit this opd section. */
b34976b6 4860 need_edit = FALSE;
1e2f5b6e
AM
4861 offset = 0;
4862 relend = relstart + sec->reloc_count;
4863 for (rel = relstart; rel < relend; rel++)
4864 {
04c9666a 4865 enum elf_ppc64_reloc_type r_type;
1e2f5b6e
AM
4866 unsigned long r_symndx;
4867 asection *sym_sec;
4868 struct elf_link_hash_entry *h;
4869 Elf_Internal_Sym *sym;
4870
4871 /* .opd contains a regular array of 24 byte entries. We're
4872 only interested in the reloc pointing to a function entry
4873 point. */
04c9666a 4874 r_type = (enum elf_ppc64_reloc_type) ELF64_R_TYPE (rel->r_info);
1e2f5b6e
AM
4875 if (r_type == R_PPC64_TOC)
4876 continue;
4877
4878 if (r_type != R_PPC64_ADDR64)
4879 {
4880 (*_bfd_error_handler)
4881 (_("%s: unexpected reloc type %u in .opd section"),
4882 bfd_archive_filename (ibfd), r_type);
b34976b6 4883 need_edit = FALSE;
1e2f5b6e
AM
4884 break;
4885 }
4886
4887 if (rel + 1 >= relend)
4888 continue;
04c9666a 4889 r_type = (enum elf_ppc64_reloc_type) ELF64_R_TYPE ((rel + 1)->r_info);
1e2f5b6e
AM
4890 if (r_type != R_PPC64_TOC)
4891 continue;
4892
4893 if (rel->r_offset != offset)
4894 {
4895 /* If someone messes with .opd alignment then after a
4896 "ld -r" we might have padding in the middle of .opd.
4897 Also, there's nothing to prevent someone putting
4898 something silly in .opd with the assembler. No .opd
b34976b6 4899 optimization for them! */
1e2f5b6e
AM
4900 (*_bfd_error_handler)
4901 (_("%s: .opd is not a regular array of opd entries"),
4902 bfd_archive_filename (ibfd));
b34976b6 4903 need_edit = FALSE;
1e2f5b6e
AM
4904 break;
4905 }
4906
4907 r_symndx = ELF64_R_SYM (rel->r_info);
411e1bfb
AM
4908 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms,
4909 r_symndx, ibfd))
4910 goto error_free_rel;
1e2f5b6e
AM
4911
4912 if (sym_sec == NULL || sym_sec->owner == NULL)
4913 {
411e1bfb
AM
4914 const char *sym_name;
4915 if (h != NULL)
4916 sym_name = h->root.root.string;
4917 else
4918 sym_name = bfd_elf_local_sym_name (ibfd, sym);
4919
1e2f5b6e
AM
4920 (*_bfd_error_handler)
4921 (_("%s: undefined sym `%s' in .opd section"),
4922 bfd_archive_filename (ibfd),
411e1bfb 4923 sym_name);
b34976b6 4924 need_edit = FALSE;
1e2f5b6e
AM
4925 break;
4926 }
4927
51020317
AM
4928 /* opd entries are always for functions defined in the
4929 current input bfd. If the symbol isn't defined in the
4930 input bfd, then we won't be using the function in this
4931 bfd; It must be defined in a linkonce section in another
4932 bfd, or is weak. It's also possible that we are
4933 discarding the function due to a linker script /DISCARD/,
4934 which we test for via the output_section. */
4935 if (sym_sec->owner != ibfd
4936 || sym_sec->output_section == bfd_abs_section_ptr)
b34976b6 4937 need_edit = TRUE;
1e2f5b6e
AM
4938
4939 offset += 24;
4940 }
4941
4942 if (need_edit)
4943 {
4944 Elf_Internal_Rela *write_rel;
4945 bfd_byte *rptr, *wptr;
b34976b6 4946 bfd_boolean skip;
1e2f5b6e
AM
4947
4948 /* This seems a waste of time as input .opd sections are all
4949 zeros as generated by gcc, but I suppose there's no reason
4950 this will always be so. We might start putting something in
4951 the third word of .opd entries. */
4952 if ((sec->flags & SEC_IN_MEMORY) == 0)
4953 {
4954 bfd_byte *loc = bfd_alloc (ibfd, sec->_raw_size);
6cdc0ccc
AM
4955 if (loc == NULL
4956 || !bfd_get_section_contents (ibfd, sec, loc, (bfd_vma) 0,
4957 sec->_raw_size))
4958 {
4959 if (local_syms != NULL
4960 && symtab_hdr->contents != (unsigned char *) local_syms)
4961 free (local_syms);
4962 error_free_rel:
4963 if (elf_section_data (sec)->relocs != relstart)
4964 free (relstart);
b34976b6 4965 return FALSE;
6cdc0ccc 4966 }
1e2f5b6e
AM
4967 sec->contents = loc;
4968 sec->flags |= (SEC_IN_MEMORY | SEC_HAS_CONTENTS);
4969 }
4970
4971 elf_section_data (sec)->relocs = relstart;
4972
4973 wptr = sec->contents;
4974 rptr = sec->contents;
4975 write_rel = relstart;
b34976b6 4976 skip = FALSE;
1e2f5b6e
AM
4977 offset = 0;
4978 for (rel = relstart; rel < relend; rel++)
4979 {
4980 if (rel->r_offset == offset)
4981 {
4982 unsigned long r_symndx;
4983 asection *sym_sec;
4984 struct elf_link_hash_entry *h;
4985 Elf_Internal_Sym *sym;
4986
4987 r_symndx = ELF64_R_SYM (rel->r_info);
411e1bfb
AM
4988 get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms,
4989 r_symndx, ibfd);
1e2f5b6e 4990
51020317
AM
4991 skip = (sym_sec->owner != ibfd
4992 || sym_sec->output_section == bfd_abs_section_ptr);
a4aa0fb7
AM
4993 if (skip)
4994 {
0be617ce 4995 if (h != NULL && sym_sec->owner == ibfd)
a4aa0fb7
AM
4996 {
4997 /* Arrange for the function descriptor sym
4998 to be dropped. */
d6fe2dc1 4999 struct ppc_link_hash_entry *fdh;
a4aa0fb7
AM
5000 struct ppc_link_hash_entry *fh;
5001
5002 fh = (struct ppc_link_hash_entry *) h;
d6fe2dc1
AM
5003 fdh = (struct ppc_link_hash_entry *) fh->oh;
5004 if (fdh == NULL)
5005 {
5006 const char *fd_name;
5007 struct ppc_link_hash_table *htab;
5008
5009 fd_name = h->root.root.string + 1;
5010 htab = ppc_hash_table (info);
5011 fdh = (struct ppc_link_hash_entry *)
5012 elf_link_hash_lookup (&htab->elf, fd_name,
b34976b6 5013 FALSE, FALSE, FALSE);
d6fe2dc1
AM
5014 fdh->is_func_descriptor = 1;
5015 fdh->oh = &fh->elf;
5016 fh->is_func = 1;
5017 fh->oh = &fdh->elf;
5018 }
5019
5020 fdh->elf.root.u.def.value = 0;
5021 fdh->elf.root.u.def.section = sym_sec;
a4aa0fb7
AM
5022 }
5023 }
5024 else
1e2f5b6e
AM
5025 {
5026 /* We'll be keeping this opd entry. */
5027
5028 if (h != NULL)
5029 {
5030 /* Redefine the function descriptor symbol
5031 to this location in the opd section.
5032 We've checked above that opd relocs are
5033 ordered. */
d6fe2dc1 5034 struct ppc_link_hash_entry *fdh;
1e2f5b6e
AM
5035 struct ppc_link_hash_entry *fh;
5036
5037 fh = (struct ppc_link_hash_entry *) h;
d6fe2dc1
AM
5038 fdh = (struct ppc_link_hash_entry *) fh->oh;
5039 if (fdh == NULL)
5040 {
5041 const char *fd_name;
5042 struct ppc_link_hash_table *htab;
5043
5044 fd_name = h->root.root.string + 1;
5045 htab = ppc_hash_table (info);
5046 fdh = (struct ppc_link_hash_entry *)
5047 elf_link_hash_lookup (&htab->elf, fd_name,
b34976b6 5048 FALSE, FALSE, FALSE);
d6fe2dc1
AM
5049 fdh->is_func_descriptor = 1;
5050 fdh->oh = &fh->elf;
5051 fh->is_func = 1;
5052 fh->oh = &fdh->elf;
5053 }
5054
5055 fdh->elf.root.u.def.value = wptr - sec->contents;
1e2f5b6e
AM
5056 }
5057 else
5058 {
6cdc0ccc
AM
5059 /* Local syms are a bit tricky. We could
5060 tweak them as they can be cached, but
5061 we'd need to look through the local syms
5062 for the function descriptor sym which we
5063 don't have at the moment. So keep an
b34976b6 5064 array of adjustments. */
7f6a7663 5065 adjust[rel->r_offset / 24] = wptr - rptr;
1e2f5b6e
AM
5066 }
5067
5068 if (wptr != rptr)
5069 memcpy (wptr, rptr, 24);
5070 wptr += 24;
5071 }
5072 rptr += 24;
5073 offset += 24;
5074 }
5075
5076 /* We need to adjust any reloc offsets to point to the
5077 new opd entries. While we're at it, we may as well
5078 remove redundant relocs. */
5079 if (!skip)
5080 {
5081 rel->r_offset += wptr - rptr;
5082 if (write_rel != rel)
5083 memcpy (write_rel, rel, sizeof (*rel));
5084 ++write_rel;
5085 }
5086 }
5087
5088 sec->_cooked_size = wptr - sec->contents;
5089 sec->reloc_count = write_rel - relstart;
cdcf6e38
AM
5090 /* Fudge the size too, as this is used later in
5091 elf_bfd_final_link if we are emitting relocs. */
5092 elf_section_data (sec)->rel_hdr.sh_size
5093 = sec->reloc_count * elf_section_data (sec)->rel_hdr.sh_entsize;
5094 BFD_ASSERT (elf_section_data (sec)->rel_hdr2 == NULL);
1e2f5b6e 5095 }
6cdc0ccc 5096 else if (elf_section_data (sec)->relocs != relstart)
1e2f5b6e 5097 free (relstart);
6cdc0ccc 5098
411e1bfb
AM
5099 if (local_syms != NULL
5100 && symtab_hdr->contents != (unsigned char *) local_syms)
5101 {
5102 if (!info->keep_memory)
5103 free (local_syms);
5104 else
5105 symtab_hdr->contents = (unsigned char *) local_syms;
5106 }
5107 }
5108
5109 return TRUE;
5110}
5111
5112/* Run through all the TLS relocs looking for optimization
5113 opportunities. The linker has been hacked (see ppc64elf.em) to do
5114 a preliminary section layout so that we know the TLS segment
5115 offsets. We can't optimize earlier because some optimizations need
5116 to know the tp offset, and we need to optimize before allocating
5117 dynamic relocations. */
5118
5119bfd_boolean
5120ppc64_elf_tls_optimize (obfd, info)
5121 bfd *obfd;
5122 struct bfd_link_info *info;
5123{
5124 asection *tls;
5125 bfd *ibfd;
5126 asection *sec;
5127 struct ppc_link_hash_table *htab;
5128
5129 if (info->relocateable)
5130 return TRUE;
5131
5132 for (tls = obfd->sections; tls != NULL; tls = tls->next)
5133 if ((tls->flags & (SEC_THREAD_LOCAL | SEC_LOAD))
5134 == (SEC_THREAD_LOCAL | SEC_LOAD))
5135 break;
5136 if (tls == NULL)
5137 return TRUE;
5138
5139 htab = ppc_hash_table (info);
5140 htab->tls_sec = tls;
5141
5142 if (info->shared)
5143 return TRUE;
5144
5145 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link_next)
5146 {
5147 Elf_Internal_Sym *locsyms = NULL;
5148
5149 for (sec = ibfd->sections; sec != NULL; sec = sec->next)
5150 if (sec->has_tls_reloc && !bfd_is_abs_section (sec->output_section))
5151 {
5152 Elf_Internal_Rela *relstart, *rel, *relend;
5153 int expecting_tls_get_addr;
5154
5155 /* Read the relocations. */
5156 relstart = _bfd_elf64_link_read_relocs (ibfd, sec, (PTR) NULL,
5157 (Elf_Internal_Rela *) NULL,
5158 info->keep_memory);
5159 if (relstart == NULL)
5160 return FALSE;
5161
5162 expecting_tls_get_addr = 0;
5163 relend = relstart + sec->reloc_count;
5164 for (rel = relstart; rel < relend; rel++)
5165 {
5166 enum elf_ppc64_reloc_type r_type;
5167 unsigned long r_symndx;
5168 struct elf_link_hash_entry *h;
5169 Elf_Internal_Sym *sym;
5170 asection *sym_sec;
5171 char *tls_type;
5172 char tls_set, tls_clear, got_tls_type = 0;
5173 bfd_vma value;
5174 bfd_boolean ok_tprel;
5175
5176 r_symndx = ELF64_R_SYM (rel->r_info);
5177 if (!get_sym_h (&h, &sym, &sym_sec, &tls_type, &locsyms,
5178 r_symndx, ibfd))
5179 {
5180 err_free_rel:
5181 if (elf_section_data (sec)->relocs != relstart)
5182 free (relstart);
5183 if (locsyms != NULL
5184 && (elf_tdata (ibfd)->symtab_hdr.contents
5185 != (unsigned char *) locsyms))
5186 free (locsyms);
5187 return FALSE;
5188 }
5189
5190 if (h != NULL)
5191 {
5192 if (h->root.type != bfd_link_hash_defined
5193 && h->root.type != bfd_link_hash_defweak)
5194 continue;
5195 value = h->root.u.def.value;
5196 }
5197 else
5198 value = sym->st_value;
5199 ok_tprel = FALSE;
5200 if (sym_sec != NULL && sym_sec->output_section != NULL)
5201 {
5202 value += sym_sec->output_offset;
5203 value += sym_sec->output_section->vma;
5204 value -= htab->tls_sec->vma;
5205 ok_tprel = (value + TP_OFFSET + ((bfd_vma) 1 << 31)
5206 < (bfd_vma) 1 << 32);
5207 }
5208
5209 r_type
5210 = (enum elf_ppc64_reloc_type) ELF64_R_TYPE (rel->r_info);
5211 switch (r_type)
5212 {
5213 case R_PPC64_GOT_TLSLD16:
5214 case R_PPC64_GOT_TLSLD16_LO:
5215 case R_PPC64_GOT_TLSLD16_HI:
5216 case R_PPC64_GOT_TLSLD16_HA:
5217 htab->tlsld_got.refcount -= 1;
5218 if (ok_tprel)
5219 /* LD -> LE */
5220 tls_set = 0;
5221 else
5222 /* We still need a GOT entry as the offset is
5223 too big. ie. LD -> IE. */
5224 tls_set = TLS_TLS | TLS_TPREL;
5225 tls_clear = TLS_GD_LD;
5226 got_tls_type = TLS_TLS | TLS_GD_LD | TLS_LD;
5227 expecting_tls_get_addr = 1;
5228 break;
5229
5230 case R_PPC64_GOT_TLSGD16:
5231 case R_PPC64_GOT_TLSGD16_LO:
5232 case R_PPC64_GOT_TLSGD16_HI:
5233 case R_PPC64_GOT_TLSGD16_HA:
5234 if (ok_tprel
5235 && (h == NULL
5236 || ((h->elf_link_hash_flags
5237 & ELF_LINK_HASH_DEF_REGULAR) != 0
5238 && ((h->elf_link_hash_flags
5239 & ELF_LINK_FORCED_LOCAL) != 0
5240 || !info->shared
5241 || info->symbolic))))
5242 /* GD -> LE */
5243 tls_set = 0;
5244 else
5245 /* GD -> IE */
5246 tls_set = TLS_TLS | TLS_TPREL;
5247 tls_clear = TLS_GD_LD;
5248 got_tls_type = TLS_TLS | TLS_GD_LD;
5249 expecting_tls_get_addr = 1;
5250 break;
5251
5252 case R_PPC64_GOT_TPREL16_DS:
5253 case R_PPC64_GOT_TPREL16_LO_DS:
5254 case R_PPC64_GOT_TPREL16_HI:
5255 case R_PPC64_GOT_TPREL16_HA:
5256 expecting_tls_get_addr = 0;
5257 if (ok_tprel)
5258 {
5259 /* IE -> LE */
5260 tls_set = 0;
5261 tls_clear = TLS_TPREL;
5262 got_tls_type = TLS_TLS | TLS_TPREL;
5263 break;
5264 }
5265 else
5266 continue;
5267
5268 case R_PPC64_REL14:
5269 case R_PPC64_REL14_BRTAKEN:
5270 case R_PPC64_REL14_BRNTAKEN:
5271 case R_PPC64_REL24:
5272 if (h != NULL
5273 && h == htab->tls_get_addr)
5274 {
5275 if (!expecting_tls_get_addr
5276 && rel != relstart
5277 && ((ELF64_R_TYPE (rel[-1].r_info)
5278 == R_PPC64_TOC16)
5279 || (ELF64_R_TYPE (rel[-1].r_info)
5280 == R_PPC64_TOC16_LO)))
5281 {
5282 /* Check for toc tls entries. */
5283 char *toc_tls;
5284
5285 if (!get_tls_type (&toc_tls, &locsyms,
5286 rel - 1, ibfd))
5287 goto err_free_rel;
5288 if (toc_tls != NULL)
5289 expecting_tls_get_addr = *toc_tls != 0;
5290 }
5291
5292 if (expecting_tls_get_addr)
5293 {
5294 struct plt_entry *ent;
5295 for (ent = h->plt.plist; ent; ent = ent->next)
5296 if (ent->addend == 0)
5297 {
5298 if (ent->plt.refcount > 0)
5299 ent->plt.refcount -= 1;
5300 break;
5301 }
5302 }
5303 }
5304 expecting_tls_get_addr = 0;
5305 continue;
5306
5307 case R_PPC64_TPREL64:
5308 expecting_tls_get_addr = 0;
5309 if (ok_tprel)
5310 {
5311 /* IE -> LE */
5312 tls_set = TLS_EXPLICIT;
5313 tls_clear = TLS_TPREL;
5314 break;
5315 }
5316 else
5317 continue;
5318
5319 case R_PPC64_DTPMOD64:
5320 expecting_tls_get_addr = 0;
5321 if ((*tls_type & TLS_LD) == 0)
5322 {
5323 if ((h == NULL
5324 || ((h->elf_link_hash_flags
5325 & ELF_LINK_HASH_DEF_REGULAR) != 0
5326 && ((h->elf_link_hash_flags
5327 & ELF_LINK_FORCED_LOCAL) != 0
5328 || !info->shared
5329 || info->symbolic)))
5330 && ok_tprel)
5331 /* GD -> LE */
5332 tls_set = TLS_EXPLICIT;
5333 else
5334 /* GD -> IE */
5335 tls_set = TLS_EXPLICIT | TLS_TPREL;
5336 tls_clear = TLS_GD_LD;
5337 }
5338 else
5339 {
5340 if (ok_tprel)
5341 /* LD -> LE */
5342 tls_set = TLS_EXPLICIT;
5343 else
5344 /* LD -> IE */
5345 tls_set = TLS_EXPLICIT | TLS_TPREL;
5346 tls_clear = TLS_GD_LD;
5347 }
5348 break;
5349
5350 default:
5351 expecting_tls_get_addr = 0;
5352 continue;
5353 }
5354
5355 if ((tls_set & TLS_EXPLICIT) == 0)
5356 {
5357 struct got_entry *ent;
5358
5359 /* Adjust got entry for this reloc. */
5360 if (h != NULL)
5361 ent = h->got.glist;
5362 else
5363 ent = elf_local_got_ents (ibfd)[r_symndx];
5364
5365 for (; ent != NULL; ent = ent->next)
5366 if (ent->addend == rel->r_addend
5367 && ent->tls_type == got_tls_type)
5368 break;
5369 if (ent == NULL)
5370 abort ();
5371
5372 if (tls_set == 0)
5373 {
5374 /* We managed to get rid of a got entry. */
5375 if (ent->got.refcount > 0)
5376 ent->got.refcount -= 1;
5377 }
5378 else
5379 ent->tls_type = tls_set;
5380 }
5381 else if (h != NULL)
5382 {
5383 struct ppc_link_hash_entry * eh;
5384 struct ppc_dyn_relocs **pp;
5385 struct ppc_dyn_relocs *p;
5386
5387 /* Adjust dynamic relocs. */
5388 eh = (struct ppc_link_hash_entry *) h;
5389 for (pp = &eh->dyn_relocs;
5390 (p = *pp) != NULL;
5391 pp = &p->next)
5392 if (p->sec == sec)
5393 {
5394 /* If we got rid of a DTPMOD/DTPREL reloc
5395 pair then we'll lose one or two dyn
5396 relocs. */
5397 if (tls_clear == TLS_GD_LD
5398 && rel + 1 < relend
5399 && (rel[1].r_info
5400 == ELF64_R_INFO (r_symndx, R_PPC64_DTPREL64))
5401 && rel[1].r_offset == rel->r_offset + 8)
5402 p->count -= 1;
5403 if (tls_set == TLS_EXPLICIT)
5404 p->count -= 1;
5405 if (p->count == 0)
5406 *pp = p->next;
5407 break;
5408 }
5409 }
5410
5411 *tls_type |= tls_set;
5412 *tls_type &= ~tls_clear;
5413 }
5414
5415 if (elf_section_data (sec)->relocs != relstart)
5416 free (relstart);
5417 }
5418
5419 if (locsyms != NULL
5420 && (elf_tdata (ibfd)->symtab_hdr.contents
5421 != (unsigned char *) locsyms))
6cdc0ccc
AM
5422 {
5423 if (!info->keep_memory)
411e1bfb 5424 free (locsyms);
6cdc0ccc 5425 else
411e1bfb 5426 elf_tdata (ibfd)->symtab_hdr.contents = (unsigned char *) locsyms;
6cdc0ccc 5427 }
1e2f5b6e 5428 }
b34976b6 5429 return TRUE;
1e2f5b6e 5430}
b34976b6 5431
65f38f15
AM
5432/* This is the condition under which ppc64_elf_finish_dynamic_symbol
5433 will be called from elflink.h. If elflink.h doesn't call our
5434 finish_dynamic_symbol routine, we'll need to do something about
5435 initializing any .plt and .got entries in ppc64_elf_relocate_section. */
5436#define WILL_CALL_FINISH_DYNAMIC_SYMBOL(DYN, INFO, H) \
5437 ((DYN) \
5438 && ((INFO)->shared \
5439 || ((H)->elf_link_hash_flags & ELF_LINK_FORCED_LOCAL) == 0) \
5440 && ((H)->dynindx != -1 \
5441 || ((H)->elf_link_hash_flags & ELF_LINK_FORCED_LOCAL) != 0))
5bd4f169 5442
65f38f15
AM
5443/* Allocate space in .plt, .got and associated reloc sections for
5444 dynamic relocs. */
5bd4f169 5445
b34976b6 5446static bfd_boolean
65f38f15
AM
5447allocate_dynrelocs (h, inf)
5448 struct elf_link_hash_entry *h;
5449 PTR inf;
5bd4f169 5450{
65f38f15
AM
5451 struct bfd_link_info *info;
5452 struct ppc_link_hash_table *htab;
5bd4f169 5453 asection *s;
65f38f15
AM
5454 struct ppc_link_hash_entry *eh;
5455 struct ppc_dyn_relocs *p;
411e1bfb 5456 struct got_entry *gent;
5bd4f169 5457
e92d460e 5458 if (h->root.type == bfd_link_hash_indirect)
b34976b6 5459 return TRUE;
5bd4f169 5460
e92d460e
AM
5461 if (h->root.type == bfd_link_hash_warning)
5462 h = (struct elf_link_hash_entry *) h->root.u.i.link;
5463
65f38f15
AM
5464 info = (struct bfd_link_info *) inf;
5465 htab = ppc_hash_table (info);
5bd4f169 5466
65f38f15 5467 if (htab->elf.dynamic_sections_created
411e1bfb
AM
5468 && h->dynindx != -1
5469 && WILL_CALL_FINISH_DYNAMIC_SYMBOL (1, info, h))
5bd4f169 5470 {
411e1bfb
AM
5471 struct plt_entry *pent;
5472 bfd_boolean doneone = FALSE;
5473 for (pent = h->plt.plist; pent != NULL; pent = pent->next)
5474 if (pent->plt.refcount > 0)
5475 {
5476 BFD_ASSERT (((struct ppc_link_hash_entry *) h)->is_func_descriptor);
5477
5478 /* If this is the first .plt entry, make room for the special
5479 first entry. */
5480 s = htab->splt;
5481 if (s->_raw_size == 0)
5482 s->_raw_size += PLT_INITIAL_ENTRY_SIZE;
5483
5484 pent->plt.offset = s->_raw_size;
5485
5486 /* Make room for this entry. */
5487 s->_raw_size += PLT_ENTRY_SIZE;
5488
5489 /* Make room for the .glink code. */
5490 s = htab->sglink;
5491 if (s->_raw_size == 0)
5492 s->_raw_size += GLINK_CALL_STUB_SIZE;
5493 /* We need bigger stubs past index 32767. */
5494 if (s->_raw_size >= GLINK_CALL_STUB_SIZE + 32768*2*4)
5495 s->_raw_size += 4;
5496 s->_raw_size += 2*4;
5497
5498 /* We also need to make an entry in the .rela.plt section. */
5499 s = htab->srelplt;
5500 s->_raw_size += sizeof (Elf64_External_Rela);
5501 doneone = TRUE;
5502 }
5503 else
5504 pent->plt.offset = (bfd_vma) -1;
5505 if (!doneone)
65f38f15 5506 {
411e1bfb 5507 h->plt.plist = NULL;
65f38f15
AM
5508 h->elf_link_hash_flags &= ~ELF_LINK_HASH_NEEDS_PLT;
5509 }
5510 }
5511 else
5512 {
411e1bfb 5513 h->plt.plist = NULL;
65f38f15
AM
5514 h->elf_link_hash_flags &= ~ELF_LINK_HASH_NEEDS_PLT;
5515 }
5516
411e1bfb
AM
5517 for (gent = h->got.glist; gent != NULL; gent = gent->next)
5518 if (gent->got.refcount > 0)
5519 {
5520 /* Make sure this symbol is output as a dynamic symbol.
5521 Undefined weak syms won't yet be marked as dynamic. */
5522 if (h->dynindx == -1
5523 && (h->elf_link_hash_flags & ELF_LINK_FORCED_LOCAL) == 0)
5524 {
5525 if (! bfd_elf64_link_record_dynamic_symbol (info, h))
5526 return FALSE;
5527 }
65f38f15 5528
411e1bfb
AM
5529 if ((gent->tls_type & TLS_LD) != 0)
5530 gent->got.offset = htab->tlsld_got.offset;
5531 else
5532 {
5533 bfd_boolean dyn;
5534
5535 s = htab->sgot;
5536 gent->got.offset = s->_raw_size;
5537 s->_raw_size += (gent->tls_type & TLS_GD_LD) != 0 ? 16 : 8;
5538 dyn = htab->elf.dynamic_sections_created;
5539 if (WILL_CALL_FINISH_DYNAMIC_SYMBOL (dyn, info, h))
5540 htab->srelgot->_raw_size
5541 += ((gent->tls_type & TLS_GD_LD) != 0
5542 ? 2 * sizeof (Elf64_External_Rela)
5543 : sizeof (Elf64_External_Rela));
5544 }
5545 }
5546 else
5547 gent->got.offset = (bfd_vma) -1;
65f38f15
AM
5548
5549 eh = (struct ppc_link_hash_entry *) h;
5550 if (eh->dyn_relocs == NULL)
b34976b6 5551 return TRUE;
65f38f15
AM
5552
5553 /* In the shared -Bsymbolic case, discard space allocated for
5554 dynamic pc-relative relocs against symbols which turn out to be
5555 defined in regular objects. For the normal shared case, discard
5556 space for relocs that have become local due to symbol visibility
5557 changes. */
5558
5559 if (info->shared)
5560 {
5561 if ((h->elf_link_hash_flags & ELF_LINK_HASH_DEF_REGULAR) != 0
5562 && ((h->elf_link_hash_flags & ELF_LINK_FORCED_LOCAL) != 0
5563 || info->symbolic))
5564 {
5565 struct ppc_dyn_relocs **pp;
5566
5567 for (pp = &eh->dyn_relocs; (p = *pp) != NULL; )
5bd4f169 5568 {
65f38f15
AM
5569 p->count -= p->pc_count;
5570 p->pc_count = 0;
5571 if (p->count == 0)
5572 *pp = p->next;
5573 else
5574 pp = &p->next;
5bd4f169 5575 }
65f38f15
AM
5576 }
5577 }
5578 else
5579 {
5580 /* For the non-shared case, discard space for relocs against
5581 symbols which turn out to need copy relocs or are not
5582 dynamic. */
5583
5584 if ((h->elf_link_hash_flags & ELF_LINK_NON_GOT_REF) == 0
5585 && (((h->elf_link_hash_flags & ELF_LINK_HASH_DEF_DYNAMIC) != 0
5586 && (h->elf_link_hash_flags & ELF_LINK_HASH_DEF_REGULAR) == 0)
5587 || (htab->elf.dynamic_sections_created
5588 && (h->root.type == bfd_link_hash_undefweak
5589 || h->root.type == bfd_link_hash_undefined))))
5590 {
5591 /* Make sure this symbol is output as a dynamic symbol.
5592 Undefined weak syms won't yet be marked as dynamic. */
5593 if (h->dynindx == -1
5594 && (h->elf_link_hash_flags & ELF_LINK_FORCED_LOCAL) == 0)
5595 {
ec338859 5596 if (! bfd_elf64_link_record_dynamic_symbol (info, h))
b34976b6 5597 return FALSE;
65f38f15
AM
5598 }
5599
5600 /* If that succeeded, we know we'll be keeping all the
5601 relocs. */
5602 if (h->dynindx != -1)
5603 goto keep;
5604 }
5605
5606 eh->dyn_relocs = NULL;
5607
ec338859 5608 keep: ;
65f38f15
AM
5609 }
5610
5611 /* Finally, allocate space. */
5612 for (p = eh->dyn_relocs; p != NULL; p = p->next)
5613 {
5614 asection *sreloc = elf_section_data (p->sec)->sreloc;
5615 sreloc->_raw_size += p->count * sizeof (Elf64_External_Rela);
5616 }
5617
b34976b6 5618 return TRUE;
65f38f15
AM
5619}
5620
5621/* Find any dynamic relocs that apply to read-only sections. */
5622
b34976b6 5623static bfd_boolean
65f38f15
AM
5624readonly_dynrelocs (h, inf)
5625 struct elf_link_hash_entry *h;
5626 PTR inf;
5627{
5628 struct ppc_link_hash_entry *eh;
5629 struct ppc_dyn_relocs *p;
5630
e92d460e
AM
5631 if (h->root.type == bfd_link_hash_warning)
5632 h = (struct elf_link_hash_entry *) h->root.u.i.link;
5633
65f38f15
AM
5634 eh = (struct ppc_link_hash_entry *) h;
5635 for (p = eh->dyn_relocs; p != NULL; p = p->next)
5636 {
5637 asection *s = p->sec->output_section;
5638
5639 if (s != NULL && (s->flags & SEC_READONLY) != 0)
5640 {
5641 struct bfd_link_info *info = (struct bfd_link_info *) inf;
5642
5643 info->flags |= DF_TEXTREL;
5644
5645 /* Not an error, just cut short the traversal. */
b34976b6 5646 return FALSE;
65f38f15
AM
5647 }
5648 }
b34976b6 5649 return TRUE;
65f38f15
AM
5650}
5651
5652/* Set the sizes of the dynamic sections. */
5653
b34976b6 5654static bfd_boolean
65f38f15
AM
5655ppc64_elf_size_dynamic_sections (output_bfd, info)
5656 bfd *output_bfd ATTRIBUTE_UNUSED;
5657 struct bfd_link_info *info;
5658{
5659 struct ppc_link_hash_table *htab;
5660 bfd *dynobj;
5661 asection *s;
b34976b6 5662 bfd_boolean relocs;
65f38f15
AM
5663 bfd *ibfd;
5664
5665 htab = ppc_hash_table (info);
5666 dynobj = htab->elf.dynobj;
5667 if (dynobj == NULL)
5668 abort ();
5669
5670 if (htab->elf.dynamic_sections_created)
5671 {
5672 /* Set the contents of the .interp section to the interpreter. */
5673 if (! info->shared)
5674 {
5675 s = bfd_get_section_by_name (dynobj, ".interp");
5676 if (s == NULL)
5677 abort ();
5678 s->_raw_size = sizeof ELF_DYNAMIC_INTERPRETER;
5679 s->contents = (unsigned char *) ELF_DYNAMIC_INTERPRETER;
5680 }
5681 }
5682
411e1bfb
AM
5683 if (htab->tlsld_got.refcount > 0)
5684 {
5685 htab->tlsld_got.offset = htab->sgot->_raw_size;
5686 htab->sgot->_raw_size += 16;
5687 if (info->shared)
5688 htab->srelgot->_raw_size += sizeof (Elf64_External_Rela);
5689 }
5690 else
5691 htab->tlsld_got.offset = (bfd_vma) -1;
5692
65f38f15
AM
5693 /* Set up .got offsets for local syms, and space for local dynamic
5694 relocs. */
5695 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link_next)
5696 {
411e1bfb
AM
5697 struct got_entry **lgot_ents;
5698 struct got_entry **end_lgot_ents;
65f38f15
AM
5699 bfd_size_type locsymcount;
5700 Elf_Internal_Shdr *symtab_hdr;
5701 asection *srel;
5702
5703 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour)
5704 continue;
5705
5706 for (s = ibfd->sections; s != NULL; s = s->next)
5707 {
ec338859 5708 struct ppc_dyn_relocs *p;
65f38f15 5709
ec338859
AM
5710 for (p = *((struct ppc_dyn_relocs **)
5711 &elf_section_data (s)->local_dynrel);
5712 p != NULL;
5713 p = p->next)
65f38f15 5714 {
ec338859
AM
5715 if (!bfd_is_abs_section (p->sec)
5716 && bfd_is_abs_section (p->sec->output_section))
5717 {
5718 /* Input section has been discarded, either because
5719 it is a copy of a linkonce section or due to
5720 linker script /DISCARD/, so we'll be discarding
5721 the relocs too. */
5722 }
248866a8 5723 else if (p->count != 0)
ec338859
AM
5724 {
5725 srel = elf_section_data (p->sec)->sreloc;
5726 srel->_raw_size += p->count * sizeof (Elf64_External_Rela);
248866a8
AM
5727 if ((p->sec->output_section->flags & SEC_READONLY) != 0)
5728 info->flags |= DF_TEXTREL;
ec338859 5729 }
65f38f15
AM
5730 }
5731 }
5732
411e1bfb
AM
5733 lgot_ents = elf_local_got_ents (ibfd);
5734 if (!lgot_ents)
65f38f15
AM
5735 continue;
5736
5737 symtab_hdr = &elf_tdata (ibfd)->symtab_hdr;
5738 locsymcount = symtab_hdr->sh_info;
411e1bfb 5739 end_lgot_ents = lgot_ents + locsymcount;
65f38f15
AM
5740 s = htab->sgot;
5741 srel = htab->srelgot;
411e1bfb 5742 for (; lgot_ents < end_lgot_ents; ++lgot_ents)
65f38f15 5743 {
411e1bfb
AM
5744 struct got_entry *ent;
5745
5746 for (ent = *lgot_ents; ent != NULL; ent = ent->next)
5747 if (ent->got.refcount > 0)
5748 {
5749 if ((ent->tls_type & TLS_LD) != 0)
5750 {
5751 if (htab->tlsld_got.offset == (bfd_vma) -1)
5752 {
5753 htab->tlsld_got.offset = s->_raw_size;
5754 s->_raw_size += 16;
5755 if (info->shared)
5756 srel->_raw_size += sizeof (Elf64_External_Rela);
5757 }
5758 ent->got.offset = htab->tlsld_got.offset;
5759 }
5760 else
5761 {
5762 ent->got.offset = s->_raw_size;
5763 if ((ent->tls_type & TLS_GD_LD) != 0)
5764 {
5765 s->_raw_size += 16;
5766 if (info->shared)
5767 srel->_raw_size += 2 * sizeof (Elf64_External_Rela);
5768 }
5769 else
5770 {
5771 s->_raw_size += 8;
5772 if (info->shared)
5773 srel->_raw_size += sizeof (Elf64_External_Rela);
5774 }
5775 }
5776 }
5777 else
5778 ent->got.offset = (bfd_vma) -1;
65f38f15
AM
5779 }
5780 }
5781
5782 /* Allocate global sym .plt and .got entries, and space for global
5783 sym dynamic relocs. */
5784 elf_link_hash_traverse (&htab->elf, allocate_dynrelocs, (PTR) info);
5785
5786 /* We now have determined the sizes of the various dynamic sections.
5787 Allocate memory for them. */
b34976b6 5788 relocs = FALSE;
65f38f15
AM
5789 for (s = dynobj->sections; s != NULL; s = s->next)
5790 {
5791 if ((s->flags & SEC_LINKER_CREATED) == 0)
5792 continue;
5793
411e1bfb
AM
5794 /* Reset _cooked_size since prelim layout will set it wrongly,
5795 and a non-zero _cooked_size sticks. */
5796 s->_cooked_size = 0;
5797
721956f4
AM
5798 if (s == htab->sbrlt || s == htab->srelbrlt)
5799 /* These haven't been allocated yet; don't strip. */
5800 continue;
5801 else if (s == htab->splt
5802 || s == htab->sgot
5803 || s == htab->sglink)
65f38f15
AM
5804 {
5805 /* Strip this section if we don't need it; see the
5806 comment below. */
5bd4f169 5807 }
65f38f15 5808 else if (strncmp (bfd_get_section_name (dynobj, s), ".rela", 5) == 0)
5bd4f169
AM
5809 {
5810 if (s->_raw_size == 0)
5811 {
5812 /* If we don't need this section, strip it from the
5813 output file. This is mostly to handle .rela.bss and
5814 .rela.plt. We must create both sections in
5815 create_dynamic_sections, because they must be created
5816 before the linker maps input sections to output
5817 sections. The linker does that before
5818 adjust_dynamic_symbol is called, and it is that
5819 function which decides whether anything needs to go
5820 into these sections. */
5bd4f169
AM
5821 }
5822 else
5823 {
65f38f15 5824 if (s != htab->srelplt)
b34976b6 5825 relocs = TRUE;
5bd4f169
AM
5826
5827 /* We use the reloc_count field as a counter if we need
5828 to copy relocs into the output file. */
5829 s->reloc_count = 0;
5830 }
5831 }
65f38f15 5832 else
5bd4f169
AM
5833 {
5834 /* It's not one of our sections, so don't allocate space. */
5835 continue;
5836 }
5837
65f38f15 5838 if (s->_raw_size == 0)
5bd4f169
AM
5839 {
5840 _bfd_strip_section_from_output (info, s);
5841 continue;
5842 }
5843
5f333394
AM
5844 /* .plt is in the bss section. We don't initialise it. */
5845 if ((s->flags & SEC_LOAD) == 0)
5846 continue;
5847
65f38f15
AM
5848 /* Allocate memory for the section contents. We use bfd_zalloc
5849 here in case unused entries are not reclaimed before the
5850 section's contents are written out. This should not happen,
411e1bfb
AM
5851 but this way if it does we get a R_PPC64_NONE reloc in .rela
5852 sections instead of garbage.
5853 We also rely on the section contents being zero when writing
5854 the GOT. */
721956f4 5855 s->contents = (bfd_byte *) bfd_zalloc (dynobj, s->_raw_size);
65f38f15 5856 if (s->contents == NULL)
b34976b6 5857 return FALSE;
5bd4f169
AM
5858 }
5859
e86ce104 5860 if (htab->elf.dynamic_sections_created)
5bd4f169
AM
5861 {
5862 /* Add some entries to the .dynamic section. We fill in the
5863 values later, in ppc64_elf_finish_dynamic_sections, but we
5864 must add the entries now so that we get the correct size for
5865 the .dynamic section. The DT_DEBUG entry is filled in by the
5866 dynamic linker and used by the debugger. */
dc810e39
AM
5867#define add_dynamic_entry(TAG, VAL) \
5868 bfd_elf64_add_dynamic_entry (info, (bfd_vma) (TAG), (bfd_vma) (VAL))
5869
5870 if (!info->shared)
5bd4f169 5871 {
dc810e39 5872 if (!add_dynamic_entry (DT_DEBUG, 0))
b34976b6 5873 return FALSE;
5bd4f169
AM
5874 }
5875
9c07fe7c 5876 if (htab->splt != NULL && htab->splt->_raw_size != 0)
5bd4f169 5877 {
dc810e39
AM
5878 if (!add_dynamic_entry (DT_PLTGOT, 0)
5879 || !add_dynamic_entry (DT_PLTRELSZ, 0)
5880 || !add_dynamic_entry (DT_PLTREL, DT_RELA)
5d1634d7
AM
5881 || !add_dynamic_entry (DT_JMPREL, 0)
5882 || !add_dynamic_entry (DT_PPC64_GLINK, 0))
b34976b6 5883 return FALSE;
5bd4f169
AM
5884 }
5885
19397422
AM
5886 if (NO_OPD_RELOCS)
5887 {
5888 if (!add_dynamic_entry (DT_PPC64_OPD, 0)
5889 || !add_dynamic_entry (DT_PPC64_OPDSZ, 0))
b34976b6 5890 return FALSE;
19397422
AM
5891 }
5892
5bd4f169
AM
5893 if (relocs)
5894 {
dc810e39
AM
5895 if (!add_dynamic_entry (DT_RELA, 0)
5896 || !add_dynamic_entry (DT_RELASZ, 0)
5897 || !add_dynamic_entry (DT_RELAENT, sizeof (Elf64_External_Rela)))
b34976b6 5898 return FALSE;
5bd4f169 5899
65f38f15
AM
5900 /* If any dynamic relocs apply to a read-only section,
5901 then we need a DT_TEXTREL entry. */
248866a8
AM
5902 if ((info->flags & DF_TEXTREL) == 0)
5903 elf_link_hash_traverse (&htab->elf, readonly_dynrelocs,
5904 (PTR) info);
5bd4f169 5905
65f38f15 5906 if ((info->flags & DF_TEXTREL) != 0)
5bd4f169 5907 {
65f38f15 5908 if (!add_dynamic_entry (DT_TEXTREL, 0))
b34976b6 5909 return FALSE;
5bd4f169 5910 }
5bd4f169 5911 }
5bd4f169 5912 }
65f38f15 5913#undef add_dynamic_entry
5bd4f169 5914
b34976b6 5915 return TRUE;
5bd4f169
AM
5916}
5917
721956f4 5918/* Determine the type of stub needed, if any, for a call. */
5bd4f169 5919
721956f4
AM
5920static INLINE enum ppc_stub_type
5921ppc_type_of_stub (input_sec, rel, hash, destination)
5922 asection *input_sec;
5923 const Elf_Internal_Rela *rel;
5924 struct ppc_link_hash_entry **hash;
5925 bfd_vma destination;
5bd4f169 5926{
721956f4
AM
5927 struct ppc_link_hash_entry *h = *hash;
5928 bfd_vma location;
5929 bfd_vma branch_offset;
5930 bfd_vma max_branch_offset;
5931 unsigned int r_type;
5bd4f169 5932
721956f4
AM
5933 if (h != NULL)
5934 {
5935 if (h->oh != NULL
721956f4 5936 && h->oh->dynindx != -1)
5bd4f169 5937 {
411e1bfb
AM
5938 struct plt_entry *ent;
5939 for (ent = h->oh->plt.plist; ent != NULL; ent = ent->next)
5940 if (ent->addend == rel->r_addend
5941 && ent->plt.offset != (bfd_vma) -1)
5942 {
5943 *hash = (struct ppc_link_hash_entry *) h->oh;
5944 return ppc_stub_plt_call;
5945 }
5bd4f169
AM
5946 }
5947
721956f4
AM
5948 if (h->elf.root.type == bfd_link_hash_undefweak
5949 || h->elf.root.type == bfd_link_hash_undefined)
5950 return ppc_stub_none;
5d1634d7 5951 }
5d1634d7 5952
721956f4
AM
5953 /* Determine where the call point is. */
5954 location = (input_sec->output_offset
5955 + input_sec->output_section->vma
5956 + rel->r_offset);
5d1634d7 5957
721956f4
AM
5958 branch_offset = destination - location;
5959 r_type = ELF64_R_TYPE (rel->r_info);
5d1634d7 5960
721956f4
AM
5961 /* Determine if a long branch stub is needed. */
5962 max_branch_offset = 1 << 25;
5963 if (r_type != (unsigned int) R_PPC64_REL24)
5964 max_branch_offset = 1 << 15;
5d1634d7 5965
721956f4
AM
5966 if (branch_offset + max_branch_offset >= 2 * max_branch_offset)
5967 /* We need a stub. Figure out whether a long_branch or plt_branch
5968 is needed later. */
5969 return ppc_stub_long_branch;
5d1634d7 5970
721956f4 5971 return ppc_stub_none;
5d1634d7
AM
5972}
5973
5974/* Build a .plt call stub. */
5975
5976static bfd_byte *
5977build_plt_stub (obfd, p, offset, glink)
5978 bfd *obfd;
5979 bfd_byte *p;
5980 int offset;
5981 int glink;
5982{
5983#define PPC_LO(v) ((v) & 0xffff)
5984#define PPC_HI(v) (((v) >> 16) & 0xffff)
5985#define PPC_HA(v) PPC_HI ((v) + 0x8000)
5986
5987 if (glink)
5988 bfd_put_32 (obfd, LD_R2_40R1, p), p += 4;
5989 bfd_put_32 (obfd, ADDIS_R12_R2 | PPC_HA (offset), p), p += 4;
5990 if (!glink)
5991 bfd_put_32 (obfd, STD_R2_40R1, p), p += 4;
5992 bfd_put_32 (obfd, LD_R11_0R12 | PPC_LO (offset), p), p += 4;
5993 if (PPC_HA (offset + 8) != PPC_HA (offset))
5994 bfd_put_32 (obfd, ADDIS_R12_R12_1, p), p += 4;
5995 offset += 8;
5996 bfd_put_32 (obfd, LD_R2_0R12 | PPC_LO (offset), p), p += 4;
5997 if (PPC_HA (offset + 8) != PPC_HA (offset))
5998 bfd_put_32 (obfd, ADDIS_R12_R12_1, p), p += 4;
5999 offset += 8;
6000 bfd_put_32 (obfd, MTCTR_R11, p), p += 4;
6001 bfd_put_32 (obfd, LD_R11_0R12 | PPC_LO (offset), p), p += 4;
6002 bfd_put_32 (obfd, BCTR, p), p += 4;
6003 return p;
6004}
6005
b34976b6 6006static bfd_boolean
721956f4
AM
6007ppc_build_one_stub (gen_entry, in_arg)
6008 struct bfd_hash_entry *gen_entry;
6009 PTR in_arg;
5d1634d7 6010{
721956f4
AM
6011 struct ppc_stub_hash_entry *stub_entry;
6012 struct ppc_branch_hash_entry *br_entry;
5d1634d7
AM
6013 struct bfd_link_info *info;
6014 struct ppc_link_hash_table *htab;
721956f4
AM
6015 asection *stub_sec;
6016 bfd *stub_bfd;
6017 bfd_byte *loc;
6018 bfd_byte *p;
6019 unsigned int indx;
411e1bfb 6020 struct plt_entry *ent;
721956f4
AM
6021 bfd_vma off;
6022 int size;
5d1634d7 6023
721956f4
AM
6024 /* Massage our args to the form they really have. */
6025 stub_entry = (struct ppc_stub_hash_entry *) gen_entry;
6026 info = (struct bfd_link_info *) in_arg;
5d1634d7 6027
5d1634d7 6028 htab = ppc_hash_table (info);
721956f4 6029 stub_sec = stub_entry->stub_sec;
5d1634d7 6030
721956f4
AM
6031 /* Make a note of the offset within the stubs for this entry. */
6032 stub_entry->stub_offset = stub_sec->_cooked_size;
6033 loc = stub_sec->contents + stub_entry->stub_offset;
6034
6035 stub_bfd = stub_sec->owner;
6036
6037 switch (stub_entry->stub_type)
5d1634d7 6038 {
721956f4
AM
6039 case ppc_stub_long_branch:
6040 /* Branches are relative. This is where we are going to. */
6041 off = (stub_entry->target_value
6042 + stub_entry->target_section->output_offset
6043 + stub_entry->target_section->output_section->vma);
5d1634d7 6044
721956f4
AM
6045 /* And this is where we are coming from. */
6046 off -= (stub_entry->stub_offset
6047 + stub_sec->output_offset
6048 + stub_sec->output_section->vma);
e86ce104 6049
721956f4 6050 BFD_ASSERT (off + (1 << 25) < (bfd_vma) (1 << 26));
e86ce104 6051
721956f4
AM
6052 bfd_put_32 (stub_bfd, (bfd_vma) B_DOT | (off & 0x3fffffc), loc);
6053 size = 4;
6054 break;
e86ce104 6055
721956f4
AM
6056 case ppc_stub_plt_branch:
6057 br_entry = ppc_branch_hash_lookup (&htab->branch_hash_table,
6058 stub_entry->root.string + 9,
b34976b6 6059 FALSE, FALSE);
721956f4
AM
6060 if (br_entry == NULL)
6061 {
6062 (*_bfd_error_handler) (_("can't find branch stub `%s'"),
6063 stub_entry->root.string + 9);
b34976b6
AM
6064 htab->stub_error = TRUE;
6065 return FALSE;
721956f4
AM
6066 }
6067
6068 off = (stub_entry->target_value
6069 + stub_entry->target_section->output_offset
6070 + stub_entry->target_section->output_section->vma);
6071
6072 bfd_put_64 (htab->sbrlt->owner, off,
6073 htab->sbrlt->contents + br_entry->offset);
6074
6075 if (info->shared)
6076 {
6077 /* Create a reloc for the branch lookup table entry. */
6078 Elf_Internal_Rela rela;
947216bf 6079 bfd_byte *loc;
5d1634d7 6080
721956f4
AM
6081 rela.r_offset = (br_entry->offset
6082 + htab->sbrlt->output_offset
6083 + htab->sbrlt->output_section->vma);
6084 rela.r_info = ELF64_R_INFO (0, R_PPC64_RELATIVE);
6085 rela.r_addend = off;
6086
947216bf
AM
6087 loc = htab->srelbrlt->contents;
6088 loc += htab->srelbrlt->reloc_count++ * sizeof (Elf64_External_Rela);
6089 bfd_elf64_swap_reloca_out (htab->srelbrlt->owner, &rela, loc);
721956f4
AM
6090 }
6091
6092 off = (br_entry->offset
6093 + htab->sbrlt->output_offset
6094 + htab->sbrlt->output_section->vma
6095 - elf_gp (htab->sbrlt->output_section->owner)
6096 - TOC_BASE_OFF);
6097
6098 if (off + 0x80000000 > 0xffffffff || (off & 7) != 0)
5d1634d7
AM
6099 {
6100 (*_bfd_error_handler)
e86ce104 6101 (_("linkage table error against `%s'"),
721956f4 6102 stub_entry->root.string);
5d1634d7 6103 bfd_set_error (bfd_error_bad_value);
b34976b6
AM
6104 htab->stub_error = TRUE;
6105 return FALSE;
5d1634d7 6106 }
41bd81ab 6107
721956f4
AM
6108 indx = off;
6109 bfd_put_32 (stub_bfd, (bfd_vma) ADDIS_R12_R2 | PPC_HA (indx), loc);
6110 bfd_put_32 (stub_bfd, (bfd_vma) LD_R11_0R12 | PPC_LO (indx), loc + 4);
6111 bfd_put_32 (stub_bfd, (bfd_vma) MTCTR_R11, loc + 8);
6112 bfd_put_32 (stub_bfd, (bfd_vma) BCTR, loc + 12);
6113 size = 16;
6114 break;
5d1634d7 6115
721956f4 6116 case ppc_stub_plt_call:
c862ae31
AM
6117 /* Do the best we can for shared libraries built without
6118 exporting ".foo" for each "foo". This can happen when symbol
6119 versioning scripts strip all bar a subset of symbols. */
6120 if (stub_entry->h->oh->root.type != bfd_link_hash_defined
6121 && stub_entry->h->oh->root.type != bfd_link_hash_defweak)
6122 {
6123 /* Point the symbol at the stub. There may be multiple stubs,
6124 we don't really care; The main thing is to make this sym
6125 defined somewhere. */
6126 stub_entry->h->oh->root.type = bfd_link_hash_defined;
6127 stub_entry->h->oh->root.u.def.section = stub_entry->stub_sec;
6128 stub_entry->h->oh->root.u.def.value = stub_entry->stub_offset;
6129 }
6130
721956f4 6131 /* Now build the stub. */
411e1bfb
AM
6132 off = (bfd_vma) -1;
6133 for (ent = stub_entry->h->elf.plt.plist; ent != NULL; ent = ent->next)
6134 if (ent->addend == stub_entry->addend)
6135 {
6136 off = ent->plt.offset;
6137 break;
6138 }
721956f4
AM
6139 if (off >= (bfd_vma) -2)
6140 abort ();
6141
6142 off &= ~ (bfd_vma) 1;
6143 off += (htab->splt->output_offset
6144 + htab->splt->output_section->vma
6145 - elf_gp (htab->splt->output_section->owner)
6146 - TOC_BASE_OFF);
6147
6148 if (off + 0x80000000 > 0xffffffff || (off & 7) != 0)
6149 {
6150 (*_bfd_error_handler)
6151 (_("linkage table error against `%s'"),
6152 stub_entry->h->elf.root.root.string);
6153 bfd_set_error (bfd_error_bad_value);
b34976b6
AM
6154 htab->stub_error = TRUE;
6155 return FALSE;
721956f4
AM
6156 }
6157
6158 p = build_plt_stub (stub_bfd, loc, (int) off, 0);
6159 size = p - loc;
6160 break;
6161
6162 default:
6163 BFD_FAIL ();
b34976b6 6164 return FALSE;
721956f4
AM
6165 }
6166
6167 stub_sec->_cooked_size += size;
b34976b6 6168 return TRUE;
721956f4
AM
6169}
6170
6171/* As above, but don't actually build the stub. Just bump offset so
6172 we know stub section sizes, and select plt_branch stubs where
6173 long_branch stubs won't do. */
6174
b34976b6 6175static bfd_boolean
721956f4
AM
6176ppc_size_one_stub (gen_entry, in_arg)
6177 struct bfd_hash_entry *gen_entry;
6178 PTR in_arg;
6179{
6180 struct ppc_stub_hash_entry *stub_entry;
6181 struct ppc_link_hash_table *htab;
6182 bfd_vma off;
6183 int size;
6184
6185 /* Massage our args to the form they really have. */
6186 stub_entry = (struct ppc_stub_hash_entry *) gen_entry;
6187 htab = (struct ppc_link_hash_table *) in_arg;
6188
6189 if (stub_entry->stub_type == ppc_stub_plt_call)
6190 {
411e1bfb
AM
6191 struct plt_entry *ent;
6192 for (ent = stub_entry->h->elf.plt.plist; ent != NULL; ent = ent->next)
6193 if (ent->addend == stub_entry->addend)
6194 {
6195 off = ent->plt.offset & ~(bfd_vma) 1;
6196 break;
6197 }
6198 if (ent == NULL)
6199 abort ();
721956f4
AM
6200 off += (htab->splt->output_offset
6201 + htab->splt->output_section->vma
6202 - elf_gp (htab->splt->output_section->owner)
6203 - TOC_BASE_OFF);
6204
6205 size = 28;
6206 if (PPC_HA ((int) off + 16) != PPC_HA ((int) off))
6207 size += 4;
6208 }
6209 else
6210 {
6211 /* ppc_stub_long_branch or ppc_stub_plt_branch. */
6212 stub_entry->stub_type = ppc_stub_long_branch;
6213 size = 4;
6214
6215 off = (stub_entry->target_value
6216 + stub_entry->target_section->output_offset
6217 + stub_entry->target_section->output_section->vma);
6218 off -= (stub_entry->stub_sec->_raw_size
6219 + stub_entry->stub_sec->output_offset
6220 + stub_entry->stub_sec->output_section->vma);
6221
6222 if (off + (1 << 25) >= (bfd_vma) (1 << 26))
6223 {
6224 struct ppc_branch_hash_entry *br_entry;
6225
6226 br_entry = ppc_branch_hash_lookup (&htab->branch_hash_table,
6227 stub_entry->root.string + 9,
b34976b6 6228 TRUE, FALSE);
721956f4
AM
6229 if (br_entry == NULL)
6230 {
6231 (*_bfd_error_handler) (_("can't build branch stub `%s'"),
6232 stub_entry->root.string + 9);
b34976b6
AM
6233 htab->stub_error = TRUE;
6234 return FALSE;
721956f4
AM
6235 }
6236
6237 if (br_entry->iter != htab->stub_iteration)
6238 {
6239 br_entry->iter = htab->stub_iteration;
6240 br_entry->offset = htab->sbrlt->_raw_size;
6241 htab->sbrlt->_raw_size += 8;
6242 }
6243 stub_entry->stub_type = ppc_stub_plt_branch;
6244 size = 16;
6245 }
6246 }
6247
6248 stub_entry->stub_sec->_raw_size += size;
b34976b6 6249 return TRUE;
721956f4
AM
6250}
6251
6252/* Set up various things so that we can make a list of input sections
6253 for each output section included in the link. Returns -1 on error,
cedb70c5 6254 0 when no stubs will be needed, and 1 on success. */
721956f4
AM
6255
6256int
6257ppc64_elf_setup_section_lists (output_bfd, info)
6258 bfd *output_bfd;
6259 struct bfd_link_info *info;
6260{
6261 bfd *input_bfd;
721956f4
AM
6262 int top_id, top_index;
6263 asection *section;
6264 asection **input_list, **list;
6265 bfd_size_type amt;
6266 struct ppc_link_hash_table *htab = ppc_hash_table (info);
6267
805fc799
AM
6268 if (htab->elf.root.creator->flavour != bfd_target_elf_flavour
6269 || htab->sbrlt == NULL)
721956f4
AM
6270 return 0;
6271
1e2f5b6e
AM
6272 /* Find the top input section id. */
6273 for (input_bfd = info->input_bfds, top_id = 0;
721956f4
AM
6274 input_bfd != NULL;
6275 input_bfd = input_bfd->link_next)
6276 {
721956f4
AM
6277 for (section = input_bfd->sections;
6278 section != NULL;
6279 section = section->next)
6280 {
6281 if (top_id < section->id)
6282 top_id = section->id;
6283 }
6284 }
721956f4
AM
6285
6286 amt = sizeof (struct map_stub) * (top_id + 1);
6287 htab->stub_group = (struct map_stub *) bfd_zmalloc (amt);
6288 if (htab->stub_group == NULL)
6289 return -1;
6290
6291 /* We can't use output_bfd->section_count here to find the top output
6292 section index as some sections may have been removed, and
6293 _bfd_strip_section_from_output doesn't renumber the indices. */
6294 for (section = output_bfd->sections, top_index = 0;
6295 section != NULL;
6296 section = section->next)
6297 {
6298 if (top_index < section->index)
6299 top_index = section->index;
6300 }
6301
6302 htab->top_index = top_index;
6303 amt = sizeof (asection *) * (top_index + 1);
6304 input_list = (asection **) bfd_malloc (amt);
6305 htab->input_list = input_list;
6306 if (input_list == NULL)
6307 return -1;
6308
6309 /* For sections we aren't interested in, mark their entries with a
6310 value we can check later. */
6311 list = input_list + top_index;
6312 do
6313 *list = bfd_abs_section_ptr;
6314 while (list-- != input_list);
6315
6316 for (section = output_bfd->sections;
6317 section != NULL;
6318 section = section->next)
6319 {
6320 if ((section->flags & SEC_CODE) != 0)
6321 input_list[section->index] = NULL;
6322 }
6323
6324 return 1;
6325}
6326
6327/* The linker repeatedly calls this function for each input section,
6328 in the order that input sections are linked into output sections.
6329 Build lists of input sections to determine groupings between which
6330 we may insert linker stubs. */
6331
6332void
805fc799 6333ppc64_elf_next_input_section (info, isec)
721956f4
AM
6334 struct bfd_link_info *info;
6335 asection *isec;
6336{
6337 struct ppc_link_hash_table *htab = ppc_hash_table (info);
6338
805fc799 6339 if (isec->output_section->index <= htab->top_index)
721956f4
AM
6340 {
6341 asection **list = htab->input_list + isec->output_section->index;
6342 if (*list != bfd_abs_section_ptr)
6343 {
6344 /* Steal the link_sec pointer for our list. */
6345#define PREV_SEC(sec) (htab->stub_group[(sec)->id].link_sec)
6346 /* This happens to make the list in reverse order,
6347 which is what we want. */
6348 PREV_SEC (isec) = *list;
6349 *list = isec;
6350 }
6351 }
6352}
6353
6354/* See whether we can group stub sections together. Grouping stub
6355 sections may result in fewer stubs. More importantly, we need to
6356 put all .init* and .fini* stubs at the beginning of the .init or
6357 .fini output sections respectively, because glibc splits the
6358 _init and _fini functions into multiple parts. Putting a stub in
6359 the middle of a function is not a good idea. */
6360
6361static void
6362group_sections (htab, stub_group_size, stubs_always_before_branch)
6363 struct ppc_link_hash_table *htab;
6364 bfd_size_type stub_group_size;
b34976b6 6365 bfd_boolean stubs_always_before_branch;
721956f4
AM
6366{
6367 asection **list = htab->input_list + htab->top_index;
6368 do
6369 {
6370 asection *tail = *list;
6371 if (tail == bfd_abs_section_ptr)
6372 continue;
6373 while (tail != NULL)
6374 {
6375 asection *curr;
6376 asection *prev;
6377 bfd_size_type total;
6378
6379 curr = tail;
6380 if (tail->_cooked_size)
6381 total = tail->_cooked_size;
6382 else
6383 total = tail->_raw_size;
6384 while ((prev = PREV_SEC (curr)) != NULL
6385 && ((total += curr->output_offset - prev->output_offset)
6386 < stub_group_size))
6387 curr = prev;
6388
6389 /* OK, the size from the start of CURR to the end is less
6390 than stub_group_size and thus can be handled by one stub
6391 section. (or the tail section is itself larger than
6392 stub_group_size, in which case we may be toast.) We
6393 should really be keeping track of the total size of stubs
6394 added here, as stubs contribute to the final output
6395 section size. That's a little tricky, and this way will
6396 only break if stubs added make the total size more than
6397 2^25, ie. for the default stub_group_size, if stubs total
6398 more than 2834432 bytes, or over 100000 plt call stubs. */
6399 do
6400 {
6401 prev = PREV_SEC (tail);
6402 /* Set up this stub group. */
6403 htab->stub_group[tail->id].link_sec = curr;
6404 }
6405 while (tail != curr && (tail = prev) != NULL);
6406
6407 /* But wait, there's more! Input sections up to stub_group_size
6408 bytes before the stub section can be handled by it too. */
6409 if (!stubs_always_before_branch)
6410 {
6411 total = 0;
6412 while (prev != NULL
6413 && ((total += tail->output_offset - prev->output_offset)
6414 < stub_group_size))
6415 {
6416 tail = prev;
6417 prev = PREV_SEC (tail);
6418 htab->stub_group[tail->id].link_sec = curr;
6419 }
6420 }
6421 tail = prev;
6422 }
6423 }
6424 while (list-- != htab->input_list);
6425 free (htab->input_list);
6426#undef PREV_SEC
6427}
6428
721956f4
AM
6429/* Determine and set the size of the stub section for a final link.
6430
6431 The basic idea here is to examine all the relocations looking for
6432 PC-relative calls to a target that is unreachable with a "bl"
6433 instruction. */
6434
b34976b6 6435bfd_boolean
721956f4
AM
6436ppc64_elf_size_stubs (output_bfd, stub_bfd, info, group_size,
6437 add_stub_section, layout_sections_again)
6438 bfd *output_bfd;
6439 bfd *stub_bfd;
6440 struct bfd_link_info *info;
6441 bfd_signed_vma group_size;
6442 asection * (*add_stub_section) PARAMS ((const char *, asection *));
6443 void (*layout_sections_again) PARAMS ((void));
6444{
6445 bfd_size_type stub_group_size;
b34976b6 6446 bfd_boolean stubs_always_before_branch;
721956f4
AM
6447 struct ppc_link_hash_table *htab = ppc_hash_table (info);
6448
6449 /* Stash our params away. */
6450 htab->stub_bfd = stub_bfd;
6451 htab->add_stub_section = add_stub_section;
6452 htab->layout_sections_again = layout_sections_again;
6453 stubs_always_before_branch = group_size < 0;
6454 if (group_size < 0)
6455 stub_group_size = -group_size;
6456 else
6457 stub_group_size = group_size;
6458 if (stub_group_size == 1)
6459 {
6460 /* Default values. */
6461 stub_group_size = 30720000;
6462 if (htab->has_14bit_branch)
6463 stub_group_size = 30000;
6464 }
6465
6466 group_sections (htab, stub_group_size, stubs_always_before_branch);
6467
721956f4
AM
6468 while (1)
6469 {
6470 bfd *input_bfd;
6471 unsigned int bfd_indx;
6472 asection *stub_sec;
b34976b6 6473 bfd_boolean stub_changed;
721956f4
AM
6474
6475 htab->stub_iteration += 1;
b34976b6 6476 stub_changed = FALSE;
721956f4
AM
6477
6478 for (input_bfd = info->input_bfds, bfd_indx = 0;
6479 input_bfd != NULL;
6480 input_bfd = input_bfd->link_next, bfd_indx++)
6481 {
6482 Elf_Internal_Shdr *symtab_hdr;
6483 asection *section;
6cdc0ccc 6484 Elf_Internal_Sym *local_syms = NULL;
721956f4
AM
6485
6486 /* We'll need the symbol table in a second. */
6487 symtab_hdr = &elf_tdata (input_bfd)->symtab_hdr;
6488 if (symtab_hdr->sh_info == 0)
6489 continue;
6490
721956f4
AM
6491 /* Walk over each section attached to the input bfd. */
6492 for (section = input_bfd->sections;
6493 section != NULL;
6494 section = section->next)
6495 {
721956f4 6496 Elf_Internal_Rela *internal_relocs, *irelaend, *irela;
721956f4
AM
6497
6498 /* If there aren't any relocs, then there's nothing more
6499 to do. */
6500 if ((section->flags & SEC_RELOC) == 0
6501 || section->reloc_count == 0)
6502 continue;
6503
6504 /* If this section is a link-once section that will be
6505 discarded, then don't create any stubs. */
6506 if (section->output_section == NULL
6507 || section->output_section->owner != output_bfd)
6508 continue;
6509
1e2f5b6e
AM
6510 /* Get the relocs. */
6511 internal_relocs
6512 = _bfd_elf64_link_read_relocs (input_bfd, section, NULL,
6513 (Elf_Internal_Rela *) NULL,
6514 info->keep_memory);
721956f4 6515 if (internal_relocs == NULL)
1e2f5b6e 6516 goto error_ret_free_local;
721956f4
AM
6517
6518 /* Now examine each relocation. */
6519 irela = internal_relocs;
6520 irelaend = irela + section->reloc_count;
6521 for (; irela < irelaend; irela++)
6522 {
6523 unsigned int r_type, r_indx;
6524 enum ppc_stub_type stub_type;
6525 struct ppc_stub_hash_entry *stub_entry;
6526 asection *sym_sec;
6527 bfd_vma sym_value;
6528 bfd_vma destination;
6529 struct ppc_link_hash_entry *hash;
411e1bfb
AM
6530 struct elf_link_hash_entry *h;
6531 Elf_Internal_Sym *sym;
721956f4
AM
6532 char *stub_name;
6533 const asection *id_sec;
6534
6535 r_type = ELF64_R_TYPE (irela->r_info);
6536 r_indx = ELF64_R_SYM (irela->r_info);
6537
04c9666a 6538 if (r_type >= (unsigned int) R_PPC64_max)
721956f4
AM
6539 {
6540 bfd_set_error (bfd_error_bad_value);
6cdc0ccc 6541 goto error_ret_free_internal;
721956f4
AM
6542 }
6543
6544 /* Only look for stubs on branch instructions. */
6545 if (r_type != (unsigned int) R_PPC64_REL24
6546 && r_type != (unsigned int) R_PPC64_REL14
6547 && r_type != (unsigned int) R_PPC64_REL14_BRTAKEN
6548 && r_type != (unsigned int) R_PPC64_REL14_BRNTAKEN)
6549 continue;
6550
6551 /* Now determine the call target, its name, value,
6552 section. */
721956f4 6553 destination = 0;
411e1bfb
AM
6554 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms,
6555 r_indx, input_bfd))
6556 goto error_ret_free_internal;
6557 hash = (struct ppc_link_hash_entry *) h;
6558
6559 if (hash == NULL)
721956f4
AM
6560 {
6561 /* It's a local symbol. */
411e1bfb 6562 sym_value = sym->st_value;
721956f4
AM
6563 destination = (sym_value + irela->r_addend
6564 + sym_sec->output_offset
6565 + sym_sec->output_section->vma);
6566 }
6567 else
6568 {
6569 /* It's an external symbol. */
411e1bfb 6570 sym_value = 0;
721956f4
AM
6571 if (hash->elf.root.type == bfd_link_hash_defined
6572 || hash->elf.root.type == bfd_link_hash_defweak)
6573 {
721956f4
AM
6574 sym_value = hash->elf.root.u.def.value;
6575 if (sym_sec->output_section != NULL)
6576 destination = (sym_value + irela->r_addend
6577 + sym_sec->output_offset
6578 + sym_sec->output_section->vma);
6579 }
6580 else if (hash->elf.root.type == bfd_link_hash_undefweak)
6581 ;
6582 else if (hash->elf.root.type == bfd_link_hash_undefined)
6583 ;
6584 else
6585 {
6586 bfd_set_error (bfd_error_bad_value);
6587 goto error_ret_free_internal;
6588 }
6589 }
6590
6591 /* Determine what (if any) linker stub is needed. */
6592 stub_type = ppc_type_of_stub (section, irela, &hash,
6593 destination);
6594 if (stub_type == ppc_stub_none)
6595 continue;
6596
411e1bfb
AM
6597 /* __tls_get_addr calls might be eliminated. */
6598 if (stub_type != ppc_stub_plt_call
6599 && hash != NULL
6600 && &hash->elf == htab->tls_get_addr
6601 && section->has_tls_reloc
6602 && irela != internal_relocs)
6603 {
6604 /* Get tls info. */
6605 char *tls_type;
6606
6607 if (!get_tls_type (&tls_type, &local_syms,
6608 irela - 1, input_bfd))
6609 goto error_ret_free_internal;
6610 if (tls_type != NULL
6611 && (*tls_type & (TLS_TLS | TLS_GD_LD)) == TLS_TLS)
6612 continue;
6613 }
6614
721956f4
AM
6615 /* Support for grouping stub sections. */
6616 id_sec = htab->stub_group[section->id].link_sec;
6617
6618 /* Get the name of this stub. */
6619 stub_name = ppc_stub_name (id_sec, sym_sec, hash, irela);
6620 if (!stub_name)
6621 goto error_ret_free_internal;
6622
6623 stub_entry = ppc_stub_hash_lookup (&htab->stub_hash_table,
b34976b6 6624 stub_name, FALSE, FALSE);
721956f4
AM
6625 if (stub_entry != NULL)
6626 {
6627 /* The proper stub has already been created. */
6628 free (stub_name);
6629 continue;
6630 }
6631
6632 stub_entry = ppc_add_stub (stub_name, section, htab);
6633 if (stub_entry == NULL)
6634 {
6635 free (stub_name);
6cdc0ccc
AM
6636 error_ret_free_internal:
6637 if (elf_section_data (section)->relocs == NULL)
6638 free (internal_relocs);
6639 error_ret_free_local:
6640 if (local_syms != NULL
6641 && (symtab_hdr->contents
6642 != (unsigned char *) local_syms))
6643 free (local_syms);
b34976b6 6644 return FALSE;
721956f4
AM
6645 }
6646
6647 stub_entry->target_value = sym_value;
6648 stub_entry->target_section = sym_sec;
6649 stub_entry->stub_type = stub_type;
6650 stub_entry->h = hash;
411e1bfb 6651 stub_entry->addend = irela->r_addend;
b34976b6 6652 stub_changed = TRUE;
721956f4
AM
6653 }
6654
6655 /* We're done with the internal relocs, free them. */
6cdc0ccc 6656 if (elf_section_data (section)->relocs != internal_relocs)
1e2f5b6e 6657 free (internal_relocs);
721956f4 6658 }
6cdc0ccc
AM
6659
6660 if (local_syms != NULL
6661 && symtab_hdr->contents != (unsigned char *) local_syms)
6662 {
6663 if (!info->keep_memory)
6664 free (local_syms);
6665 else
6666 symtab_hdr->contents = (unsigned char *) local_syms;
6667 }
721956f4
AM
6668 }
6669
6670 if (!stub_changed)
6671 break;
6672
6673 /* OK, we've added some stubs. Find out the new size of the
6674 stub sections. */
6675 for (stub_sec = htab->stub_bfd->sections;
6676 stub_sec != NULL;
6677 stub_sec = stub_sec->next)
6678 {
6679 stub_sec->_raw_size = 0;
6680 stub_sec->_cooked_size = 0;
6681 }
6682 htab->sbrlt->_raw_size = 0;
6683 htab->sbrlt->_cooked_size = 0;
6684
6685 bfd_hash_traverse (&htab->stub_hash_table, ppc_size_one_stub, htab);
6686
6687 /* Ask the linker to do its stuff. */
6688 (*htab->layout_sections_again) ();
6689 }
6690
afbe61cf
AM
6691 /* It would be nice to strip .branch_lt from the output if the
6692 section is empty, but it's too late. If we strip sections here,
6693 the dynamic symbol table is corrupted since the section symbol
6694 for the stripped section isn't written. */
721956f4 6695
b34976b6 6696 return TRUE;
721956f4
AM
6697}
6698
6699/* Called after we have determined section placement. If sections
805fc799 6700 move, we'll be called again. Provide a value for TOCstart. */
721956f4 6701
805fc799
AM
6702bfd_vma
6703ppc64_elf_toc (obfd)
5d1634d7 6704 bfd *obfd;
721956f4 6705{
805fc799
AM
6706 asection *s;
6707 bfd_vma TOCstart;
721956f4 6708
805fc799
AM
6709 /* The TOC consists of sections .got, .toc, .tocbss, .plt in that
6710 order. The TOC starts where the first of these sections starts. */
6711 s = bfd_get_section_by_name (obfd, ".got");
6712 if (s == NULL)
6713 s = bfd_get_section_by_name (obfd, ".toc");
6714 if (s == NULL)
6715 s = bfd_get_section_by_name (obfd, ".tocbss");
6716 if (s == NULL)
6717 s = bfd_get_section_by_name (obfd, ".plt");
6718 if (s == NULL)
6719 {
6720 /* This may happen for
6721 o references to TOC base (SYM@toc / TOC[tc0]) without a
6722 .toc directive
6723 o bad linker script
6724 o --gc-sections and empty TOC sections
6725
6726 FIXME: Warn user? */
6727
6728 /* Look for a likely section. We probably won't even be
6729 using TOCstart. */
6730 for (s = obfd->sections; s != NULL; s = s->next)
6731 if ((s->flags & (SEC_ALLOC | SEC_SMALL_DATA | SEC_READONLY))
6732 == (SEC_ALLOC | SEC_SMALL_DATA))
6733 break;
721956f4 6734 if (s == NULL)
805fc799
AM
6735 for (s = obfd->sections; s != NULL; s = s->next)
6736 if ((s->flags & (SEC_ALLOC | SEC_SMALL_DATA))
6737 == (SEC_ALLOC | SEC_SMALL_DATA))
6738 break;
721956f4 6739 if (s == NULL)
805fc799
AM
6740 for (s = obfd->sections; s != NULL; s = s->next)
6741 if ((s->flags & (SEC_ALLOC | SEC_READONLY)) == SEC_ALLOC)
6742 break;
721956f4 6743 if (s == NULL)
805fc799
AM
6744 for (s = obfd->sections; s != NULL; s = s->next)
6745 if ((s->flags & SEC_ALLOC) == SEC_ALLOC)
6746 break;
6747 }
721956f4 6748
805fc799
AM
6749 TOCstart = 0;
6750 if (s != NULL)
6751 TOCstart = s->output_section->vma + s->output_offset;
721956f4 6752
805fc799 6753 return TOCstart;
721956f4
AM
6754}
6755
6756/* Build all the stubs associated with the current output file.
6757 The stubs are kept in a hash table attached to the main linker
6758 hash table. This function is called via gldelf64ppc_finish. */
6759
b34976b6 6760bfd_boolean
721956f4
AM
6761ppc64_elf_build_stubs (info)
6762 struct bfd_link_info *info;
5d1634d7
AM
6763{
6764 struct ppc_link_hash_table *htab = ppc_hash_table (info);
721956f4 6765 asection *stub_sec;
5d1634d7
AM
6766 bfd_vma plt_r2;
6767 bfd_byte *p;
6768
721956f4
AM
6769 for (stub_sec = htab->stub_bfd->sections;
6770 stub_sec != NULL;
6771 stub_sec = stub_sec->next)
6772 {
6773 bfd_size_type size;
6774
6775 /* Allocate memory to hold the linker stubs. */
6776 size = stub_sec->_raw_size;
6777 if (size != 0)
6778 {
6779 stub_sec->contents = (bfd_byte *) bfd_zalloc (htab->stub_bfd, size);
6780 if (stub_sec->contents == NULL)
b34976b6 6781 return FALSE;
721956f4
AM
6782 }
6783 stub_sec->_cooked_size = 0;
6784 }
5d1634d7 6785
721956f4 6786 if (htab->splt != NULL)
5d1634d7 6787 {
9f951329
AM
6788 unsigned int indx;
6789
721956f4
AM
6790 /* Build the .glink plt call stub. */
6791 plt_r2 = (htab->splt->output_offset
6792 + htab->splt->output_section->vma
6793 - elf_gp (htab->splt->output_section->owner)
6794 - TOC_BASE_OFF);
6795 p = htab->sglink->contents;
6796 p = build_plt_stub (htab->sglink->owner, p, (int) plt_r2, 1);
9f951329 6797 while (p < htab->sglink->contents + GLINK_CALL_STUB_SIZE)
721956f4
AM
6798 {
6799 bfd_put_32 (htab->sglink->owner, NOP, p);
6800 p += 4;
6801 }
721956f4 6802
9f951329
AM
6803 /* Build the .glink lazy link call stubs. */
6804 indx = 0;
6805 while (p < htab->sglink->contents + htab->sglink->_raw_size)
6806 {
6807 if (indx < 0x8000)
6808 {
6809 bfd_put_32 (htab->sglink->owner, LI_R0_0 | indx, p);
6810 p += 4;
6811 }
6812 else
6813 {
6814 bfd_put_32 (htab->sglink->owner, LIS_R0_0 | PPC_HI (indx), p);
6815 p += 4;
6816 bfd_put_32 (htab->sglink->owner, ORI_R0_R0_0 | PPC_LO (indx), p);
6817 p += 4;
6818 }
6819 bfd_put_32 (htab->sglink->owner,
6820 B_DOT | ((htab->sglink->contents - p) & 0x3fffffc), p);
a16d5acb 6821 indx++;
9f951329
AM
6822 p += 4;
6823 }
6824 htab->sglink->_cooked_size = p - htab->sglink->contents;
5d1634d7 6825 }
5d1634d7 6826
721956f4
AM
6827 if (htab->sbrlt->_raw_size != 0)
6828 {
6829 htab->sbrlt->contents = (bfd_byte *) bfd_zalloc (htab->sbrlt->owner,
6830 htab->sbrlt->_raw_size);
6831 if (htab->sbrlt->contents == NULL)
b34976b6 6832 return FALSE;
721956f4 6833 }
5d1634d7 6834
721956f4
AM
6835 /* Build the stubs as directed by the stub hash table. */
6836 bfd_hash_traverse (&htab->stub_hash_table, ppc_build_one_stub, info);
5d1634d7 6837
721956f4
AM
6838 for (stub_sec = htab->stub_bfd->sections;
6839 stub_sec != NULL;
6840 stub_sec = stub_sec->next)
6841 {
6842 if (stub_sec->_raw_size != stub_sec->_cooked_size)
6843 break;
6844 }
5d1634d7 6845
721956f4 6846 if (stub_sec != NULL
5d1634d7
AM
6847 || htab->sglink->_raw_size != htab->sglink->_cooked_size)
6848 {
b34976b6 6849 htab->stub_error = TRUE;
721956f4 6850 (*_bfd_error_handler) (_("stubs don't match calculated size"));
5d1634d7 6851 }
721956f4
AM
6852
6853 return !htab->stub_error;
5bd4f169
AM
6854}
6855
5bd4f169
AM
6856/* The RELOCATE_SECTION function is called by the ELF backend linker
6857 to handle the relocations for a section.
6858
6859 The relocs are always passed as Rela structures; if the section
6860 actually uses Rel structures, the r_addend field will always be
6861 zero.
6862
6863 This function is responsible for adjust the section contents as
6864 necessary, and (if using Rela relocs and generating a
6865 relocateable output file) adjusting the reloc addend as
6866 necessary.
6867
6868 This function does not have to worry about setting the reloc
6869 address or the reloc symbol index.
6870
6871 LOCAL_SYMS is a pointer to the swapped in local symbols.
6872
6873 LOCAL_SECTIONS is an array giving the section in the input file
6874 corresponding to the st_shndx field of each local symbol.
6875
6876 The global hash table entry for the global symbols can be found
6877 via elf_sym_hashes (input_bfd).
6878
6879 When generating relocateable output, this function must handle
6880 STB_LOCAL/STT_SECTION symbols specially. The output symbol is
6881 going to be the section symbol corresponding to the output
6882 section, which means that the addend must be adjusted
6883 accordingly. */
6884
b34976b6 6885static bfd_boolean
5bd4f169
AM
6886ppc64_elf_relocate_section (output_bfd, info, input_bfd, input_section,
6887 contents, relocs, local_syms, local_sections)
6888 bfd *output_bfd;
6889 struct bfd_link_info *info;
6890 bfd *input_bfd;
6891 asection *input_section;
6892 bfd_byte *contents;
6893 Elf_Internal_Rela *relocs;
6894 Elf_Internal_Sym *local_syms;
6895 asection **local_sections;
6896{
65f38f15 6897 struct ppc_link_hash_table *htab;
5bd4f169
AM
6898 Elf_Internal_Shdr *symtab_hdr;
6899 struct elf_link_hash_entry **sym_hashes;
5bd4f169
AM
6900 Elf_Internal_Rela *rel;
6901 Elf_Internal_Rela *relend;
411e1bfb
AM
6902 Elf_Internal_Rela outrel;
6903 bfd_byte *loc;
6904 unsigned int tls_get_addr_type;
6905 struct got_entry **local_got_ents;
5bd4f169 6906 bfd_vma TOCstart;
b34976b6
AM
6907 bfd_boolean ret = TRUE;
6908 bfd_boolean is_opd;
96e0dda4 6909 /* Disabled until we sort out how ld should choose 'y' vs 'at'. */
b34976b6 6910 bfd_boolean is_power4 = FALSE;
5bd4f169 6911
b491616a 6912 if (info->relocateable)
b34976b6 6913 return TRUE;
b491616a 6914
65f38f15 6915 /* Initialize howto table if needed. */
5bd4f169 6916 if (!ppc64_elf_howto_table[R_PPC64_ADDR32])
5bd4f169
AM
6917 ppc_howto_init ();
6918
65f38f15 6919 htab = ppc_hash_table (info);
411e1bfb
AM
6920 if (info->shared && (htab->tlsld_got.offset & 1) == 0)
6921 {
6922 outrel.r_offset = (htab->sgot->output_section->vma
6923 + htab->sgot->output_offset
6924 + htab->tlsld_got.offset);
6925 outrel.r_info = ELF64_R_INFO (0, R_PPC64_DTPMOD64);
6926 outrel.r_addend = 0;
6927
6928 loc = htab->srelgot->contents;
6929 loc += htab->srelgot->reloc_count++ * sizeof (Elf64_External_Rela);
6930 bfd_elf64_swap_reloca_out (output_bfd, &outrel, loc);
6931 htab->tlsld_got.offset |= 1;
6932 }
6933
6934 local_got_ents = elf_local_got_ents (input_bfd);
5bd4f169 6935 TOCstart = elf_gp (output_bfd);
5bd4f169
AM
6936 symtab_hdr = &elf_tdata (input_bfd)->symtab_hdr;
6937 sym_hashes = elf_sym_hashes (input_bfd);
f0abc2a1 6938 is_opd = ppc64_elf_section_data (input_section)->opd.adjust != NULL;
65f38f15 6939
411e1bfb 6940 tls_get_addr_type = 0;
5bd4f169
AM
6941 rel = relocs;
6942 relend = relocs + input_section->reloc_count;
6943 for (; rel < relend; rel++)
6944 {
04c9666a 6945 enum elf_ppc64_reloc_type r_type;
5bd4f169
AM
6946 bfd_vma addend;
6947 bfd_reloc_status_type r;
6948 Elf_Internal_Sym *sym;
6949 asection *sec;
6950 struct elf_link_hash_entry *h;
721956f4 6951 struct elf_link_hash_entry *fdh;
5bd4f169 6952 const char *sym_name;
5bd4f169 6953 unsigned long r_symndx;
411e1bfb 6954 char tls_type;
5bd4f169 6955 bfd_vma relocation;
b34976b6
AM
6956 bfd_boolean unresolved_reloc;
6957 bfd_boolean warned;
dc810e39 6958 long insn;
721956f4
AM
6959 struct ppc_stub_hash_entry *stub_entry;
6960 bfd_vma max_br_offset;
6961 bfd_vma from;
5bd4f169 6962
04c9666a 6963 r_type = (enum elf_ppc64_reloc_type) ELF64_R_TYPE (rel->r_info);
5bd4f169 6964 r_symndx = ELF64_R_SYM (rel->r_info);
65f38f15
AM
6965 r = bfd_reloc_other;
6966 sym = (Elf_Internal_Sym *) 0;
6967 sec = (asection *) 0;
6968 h = (struct elf_link_hash_entry *) 0;
6969 sym_name = (const char *) 0;
b34976b6
AM
6970 unresolved_reloc = FALSE;
6971 warned = FALSE;
65f38f15 6972
5bd4f169
AM
6973 if (r_type == R_PPC64_TOC)
6974 {
6975 /* Relocation value is TOC base. Symbol is ignored. */
6976 relocation = TOCstart + TOC_BASE_OFF;
6977 }
6978 else if (r_symndx < symtab_hdr->sh_info)
6979 {
6980 /* It's a local symbol. */
6981 sym = local_syms + r_symndx;
6982 sec = local_sections[r_symndx];
411e1bfb 6983 sym_name = bfd_elf_local_sym_name (input_bfd, sym);
f8df10f4 6984 relocation = _bfd_elf_rela_local_sym (output_bfd, sym, sec, rel);
1e2f5b6e
AM
6985 if (elf_section_data (sec) != NULL)
6986 {
6987 long *opd_sym_adjust;
6988
f0abc2a1 6989 opd_sym_adjust = ppc64_elf_section_data (sec)->opd.adjust;
1e2f5b6e
AM
6990 if (opd_sym_adjust != NULL && sym->st_value % 24 == 0)
6991 relocation += opd_sym_adjust[sym->st_value / 24];
6992 }
5bd4f169
AM
6993 }
6994 else
6995 {
6996 /* It's a global symbol. */
6997 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
6998 while (h->root.type == bfd_link_hash_indirect
6999 || h->root.type == bfd_link_hash_warning)
7000 h = (struct elf_link_hash_entry *) h->root.u.i.link;
7001 sym_name = h->root.root.string;
65f38f15 7002 relocation = 0;
5bd4f169
AM
7003 if (h->root.type == bfd_link_hash_defined
7004 || h->root.type == bfd_link_hash_defweak)
7005 {
7006 sec = h->root.u.def.section;
65f38f15
AM
7007 if (sec->output_section == NULL)
7008 /* Set a flag that will be cleared later if we find a
7009 relocation value for this symbol. output_section
7010 is typically NULL for symbols satisfied by a shared
7011 library. */
b34976b6 7012 unresolved_reloc = TRUE;
5bd4f169
AM
7013 else
7014 relocation = (h->root.u.def.value
7015 + sec->output_section->vma
7016 + sec->output_offset);
7017 }
7018 else if (h->root.type == bfd_link_hash_undefweak)
65f38f15 7019 ;
671bae9c 7020 else if (info->shared
65f38f15
AM
7021 && (!info->symbolic || info->allow_shlib_undefined)
7022 && !info->no_undefined
7023 && ELF_ST_VISIBILITY (h->other) == STV_DEFAULT)
7024 ;
5bd4f169
AM
7025 else
7026 {
7027 if (! ((*info->callbacks->undefined_symbol)
7028 (info, h->root.root.string, input_bfd, input_section,
411e1bfb
AM
7029 rel->r_offset, (!info->shared
7030 || info->no_undefined
7031 || ELF_ST_VISIBILITY (h->other)))))
b34976b6
AM
7032 return FALSE;
7033 warned = TRUE;
5bd4f169
AM
7034 }
7035 }
7036
411e1bfb
AM
7037 /* TLS optimizations. */
7038 tls_type = 0;
7039 if (IS_TLS_RELOC (r_type))
7040 {
7041 if (h != NULL)
7042 tls_type = ((struct ppc_link_hash_entry *) h)->tls_type;
7043 else if (local_got_ents != NULL)
7044 {
7045 char *lgot_types;
7046 lgot_types = (char *) (local_got_ents + symtab_hdr->sh_info);
7047 tls_type = lgot_types[r_symndx];
7048 }
7049 }
7050
7051 /* Ensure reloc mapping code below stays sane. */
7052 if (R_PPC64_TOC16_LO_DS != R_PPC64_TOC16_DS + 1
7053 || R_PPC64_TOC16_LO != R_PPC64_TOC16 + 1
7054 || (R_PPC64_GOT_TLSLD16 & 3) != (R_PPC64_GOT_TLSGD16 & 3)
7055 || (R_PPC64_GOT_TLSLD16_LO & 3) != (R_PPC64_GOT_TLSGD16_LO & 3)
7056 || (R_PPC64_GOT_TLSLD16_HI & 3) != (R_PPC64_GOT_TLSGD16_HI & 3)
7057 || (R_PPC64_GOT_TLSLD16_HA & 3) != (R_PPC64_GOT_TLSGD16_HA & 3)
7058 || (R_PPC64_GOT_TLSLD16 & 3) != (R_PPC64_GOT_TPREL16_DS & 3)
7059 || (R_PPC64_GOT_TLSLD16_LO & 3) != (R_PPC64_GOT_TPREL16_LO_DS & 3)
7060 || (R_PPC64_GOT_TLSLD16_HI & 3) != (R_PPC64_GOT_TPREL16_HI & 3)
7061 || (R_PPC64_GOT_TLSLD16_HA & 3) != (R_PPC64_GOT_TPREL16_HA & 3))
7062 abort ();
7063 switch (r_type)
7064 {
7065 default:
7066 tls_get_addr_type = 0;
7067 break;
7068
7069 case R_PPC64_TOC16:
7070 case R_PPC64_TOC16_LO:
7071 case R_PPC64_TOC16_DS:
7072 case R_PPC64_TOC16_LO_DS:
7073 tls_get_addr_type = 0;
7074 {
7075 /* Check for toc tls entries. */
7076 char *toc_tls;
7077
7078 if (!get_tls_type (&toc_tls, &local_syms, rel, input_bfd))
7079 return FALSE;
7080
7081 if (toc_tls)
7082 {
7083 tls_type = *toc_tls;
7084 if (r_type == R_PPC64_TOC16_DS
7085 || r_type == R_PPC64_TOC16_LO_DS)
7086 goto toctprel;
7087 else
7088 tls_get_addr_type = tls_type;
7089 }
7090 }
7091 break;
7092
7093 case R_PPC64_GOT_TPREL16_DS:
7094 case R_PPC64_GOT_TPREL16_LO_DS:
7095 tls_get_addr_type = 0;
7096 toctprel:
7097 if (tls_type != 0
7098 && (tls_type & TLS_TPREL) == 0)
7099 {
7100 bfd_vma insn;
7101 insn = bfd_get_32 (output_bfd, contents + rel->r_offset - 2);
7102 insn &= 31 << 21;
7103 insn |= 0x3c0d0000; /* addis 0,13,0 */
7104 bfd_put_32 (output_bfd, insn, contents + rel->r_offset - 2);
7105 r_type = R_PPC64_TPREL16_HA;
7106 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
7107 }
7108 break;
7109
7110 case R_PPC64_TLS:
7111 tls_get_addr_type = 0;
7112 if (tls_type == 0)
7113 {
7114 /* Check for toc tls entries. */
7115 char *toc_tls;
7116
7117 if (!get_tls_type (&toc_tls, &local_syms, rel, input_bfd))
7118 return FALSE;
7119
7120 if (toc_tls)
7121 tls_type = *toc_tls;
7122 }
7123 if (tls_type != 0
7124 && (tls_type & TLS_TPREL) == 0)
7125 {
7126 bfd_vma insn, rtra;
7127 insn = bfd_get_32 (output_bfd, contents + rel->r_offset);
7128 if ((insn & ((31 << 26) | (31 << 11)))
7129 == ((31 << 26) | (13 << 11)))
7130 rtra = insn & ((1 << 26) - (1 << 16));
7131 else if ((insn & ((31 << 26) | (31 << 16)))
7132 == ((31 << 26) | (13 << 16)))
7133 rtra = (insn & (31 << 21)) | ((insn & (31 << 11)) << 5);
7134 else
7135 abort ();
7136 if ((insn & ((1 << 11) - (1 << 1))) == 266 << 1)
7137 /* add -> addi. */
7138 insn = 14 << 26;
7139 else if ((insn & (31 << 1)) == 23 << 1
7140 && ((insn & (31 << 6)) < 14 << 6
7141 || ((insn & (31 << 6)) >= 16 << 6
7142 && (insn & (31 << 6)) < 24 << 6)))
7143 /* load and store indexed -> dform. */
7144 insn = (32 | ((insn >> 6) & 31)) << 26;
7145 else if ((insn & (31 << 1)) == 21 << 1
7146 && (insn & (0x1a << 6)) == 0)
7147 /* ldx, ldux, stdx, stdux -> ld, ldu, std, stdu. */
7148 insn = (((58 | ((insn >> 6) & 4)) << 26)
7149 | ((insn >> 6) & 1));
7150 else if ((insn & (31 << 1)) == 21 << 1
7151 && (insn & ((1 << 11) - (1 << 1))) == 341 << 1)
7152 /* lwax -> lwa. */
7153 insn = (58 << 26) | 2;
7154 else
7155 abort ();
7156 insn |= rtra;
7157 bfd_put_32 (output_bfd, insn, contents + rel->r_offset);
7158 r_type = R_PPC64_TPREL16_LO;
7159 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
7160 /* Was PPC64_TLS which sits on insn boundary, now
7161 PPC64_TPREL16_LO which is at insn+2. */
7162 rel->r_offset += 2;
7163 }
7164 break;
7165
7166 case R_PPC64_GOT_TLSGD16:
7167 case R_PPC64_GOT_TLSGD16_LO:
7168 case R_PPC64_GOT_TLSGD16_HI:
7169 case R_PPC64_GOT_TLSGD16_HA:
7170 case R_PPC64_GOT_TLSLD16:
7171 case R_PPC64_GOT_TLSLD16_LO:
7172 case R_PPC64_GOT_TLSLD16_HI:
7173 case R_PPC64_GOT_TLSLD16_HA:
7174 tls_get_addr_type = 0;
7175 if (tls_type != 0 && (tls_type & TLS_GD_LD) == 0)
7176 {
7177 if (r_type == R_PPC64_GOT_TLSGD16_HI
7178 || r_type == R_PPC64_GOT_TLSGD16_HA
7179 || r_type == R_PPC64_GOT_TLSLD16_HI
7180 || r_type == R_PPC64_GOT_TLSLD16_HA)
7181 {
7182 if ((tls_type & TLS_LD) != 0)
7183 {
7184 bfd_put_32 (output_bfd, NOP, contents + rel->r_offset);
7185 r_type = R_PPC64_NONE;
7186 rel->r_offset -= 2;
7187 }
7188 else
7189 r_type = (((r_type - (R_PPC64_GOT_TLSGD16 & 3)) & 3)
7190 + R_PPC64_GOT_TPREL16_DS);
7191 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
7192 break;
7193 }
7194
7195 /* This reloc and its instruction will be replaced so there's
7196 not much point in doing anything more here. We know the
7197 next reloc will be a REL24 to __tls_get_addr, and will
7198 be handled below. */
7199 tls_get_addr_type = tls_type;
7200 continue;
7201 }
7202 break;
7203
7204 case R_PPC64_REL14:
7205 case R_PPC64_REL14_BRTAKEN:
7206 case R_PPC64_REL14_BRNTAKEN:
7207 case R_PPC64_REL24:
7208 if (h != NULL
7209 && h == htab->tls_get_addr
7210 && tls_get_addr_type != 0
7211 && (tls_get_addr_type & TLS_GD_LD) == 0)
7212 {
7213 /* Replace the call. */
7214 bfd_vma insn1, insn2, insn3;
7215 bfd_vma offset = rel->r_offset;
7216
7217 insn1 = bfd_get_32 (output_bfd, contents + rel[-1].r_offset - 2);
7218 insn3 = bfd_get_32 (output_bfd, contents + offset + 4);
7219 if (tls_get_addr_type & TLS_TPREL)
7220 {
7221 /* IE */
7222 insn1 &= (1 << 26) - (1 << 2);
7223 insn1 |= 58 << 26; /* ld */
7224 insn2 = 0x7c636a14; /* add 3,3,13 */
7225 /* Fix the relocs for --emit-relocs. */
7226 r_type = ELF64_R_TYPE (rel[-1].r_info);
7227 if (tls_get_addr_type & TLS_EXPLICIT)
7228 r_type += R_PPC64_TOC16_DS - R_PPC64_TOC16;
7229 else
7230 r_type = (((r_type - (R_PPC64_GOT_TLSGD16 & 3)) & 3)
7231 + R_PPC64_GOT_TPREL16_DS);
7232 rel[-1].r_info
7233 = ELF64_R_INFO (ELF64_R_SYM (rel[-1].r_info), r_type);
7234 rel->r_info = 0;
7235 }
7236 else
7237 {
7238 /* LE */
7239 insn1 = 0x3c6d0000; /* addis 3,13,0 */
7240 insn2 = 0x38630000; /* addi 3,3,0 */
7241 if (tls_get_addr_type & TLS_LD)
7242 {
7243 r_symndx = 0;
7244 rel[-1].r_addend = htab->tls_sec->vma + DTP_OFFSET;
7245 rel->r_addend = htab->tls_sec->vma + DTP_OFFSET;
7246 }
7247 else
7248 r_symndx = ELF64_R_SYM (rel[-1].r_info);
7249 rel[-1].r_info = ELF64_R_INFO (r_symndx, R_PPC64_TPREL16_HA);
7250 rel->r_info = ELF64_R_INFO (r_symndx, R_PPC64_TPREL16_LO);
7251 rel->r_offset += 2;
7252 }
7253 if (insn3 == NOP
7254 || insn3 == CROR_151515 || insn3 == CROR_313131)
7255 {
7256 insn3 = insn2;
7257 insn2 = NOP;
7258 rel->r_offset += 4;
7259 }
7260 bfd_put_32 (output_bfd, insn1, contents + rel[-1].r_offset - 2);
7261 bfd_put_32 (output_bfd, insn2, contents + offset);
7262 bfd_put_32 (output_bfd, insn3, contents + offset + 4);
7263 /* Do the relocs again. */
7264 rel -= 2;
7265 tls_get_addr_type = 0;
7266 continue;
7267 }
7268 tls_get_addr_type = 0;
7269 break;
7270
7271 case R_PPC64_DTPMOD64:
7272 if ((tls_type & TLS_GD_LD) == 0)
7273 {
7274 if ((tls_type & TLS_TPREL) != 0)
7275 r_type = R_PPC64_TPREL64;
7276 else
7277 {
7278 bfd_put_64 (output_bfd, (bfd_vma) 1,
7279 contents + rel->r_offset);
7280 r_type = R_PPC64_NONE;
7281 }
7282 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
7283 if ((tls_type & TLS_LD) == 0)
7284 rel[1].r_info = 0;
7285 }
7286 break;
7287
7288 case R_PPC64_TPREL64:
7289 if ((tls_type & TLS_TPREL) == 0)
7290 {
7291 r_type = R_PPC64_NONE;
7292 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
7293 }
7294 break;
7295 }
7296
7297 /* Handle other relocations that tweak non-addend part of insn. */
86c76c7b 7298 insn = 0;
65f38f15 7299 switch (r_type)
5bd4f169
AM
7300 {
7301 default:
65f38f15 7302 break;
5bd4f169 7303
65f38f15
AM
7304 /* Branch taken prediction relocations. */
7305 case R_PPC64_ADDR14_BRTAKEN:
7306 case R_PPC64_REL14_BRTAKEN:
cedb70c5
KH
7307 insn = 0x01 << 21; /* 'y' or 't' bit, lowest bit of BO field. */
7308 /* Fall thru. */
65f38f15 7309
86c76c7b 7310 /* Branch not taken prediction relocations. */
65f38f15
AM
7311 case R_PPC64_ADDR14_BRNTAKEN:
7312 case R_PPC64_REL14_BRNTAKEN:
411e1bfb
AM
7313 insn |= bfd_get_32 (output_bfd,
7314 contents + rel->r_offset) & ~(0x01 << 21);
96e0dda4
AM
7315 if (is_power4)
7316 {
7317 /* Set 'a' bit. This is 0b00010 in BO field for branch
7318 on CR(BI) insns (BO == 001at or 011at), and 0b01000
7319 for branch on CTR insns (BO == 1a00t or 1a01t). */
7320 if ((insn & (0x14 << 21)) == (0x04 << 21))
7321 insn |= 0x02 << 21;
7322 else if ((insn & (0x14 << 21)) == (0x10 << 21))
7323 insn |= 0x08 << 21;
7324 else
7325 break;
7326 }
65f38f15 7327 else
96e0dda4 7328 {
411e1bfb 7329 from = (rel->r_offset
805fc799
AM
7330 + input_section->output_offset
7331 + input_section->output_section->vma);
7332
96e0dda4 7333 /* Invert 'y' bit if not the default. */
411e1bfb 7334 if ((bfd_signed_vma) (relocation + rel->r_addend - from) < 0)
96e0dda4
AM
7335 insn ^= 0x01 << 21;
7336 }
86c76c7b 7337
411e1bfb 7338 bfd_put_32 (output_bfd, (bfd_vma) insn, contents + rel->r_offset);
65f38f15 7339 break;
5bd4f169 7340
65f38f15 7341 case R_PPC64_REL24:
721956f4
AM
7342 /* A REL24 branching to a linkage function is followed by a
7343 nop. We replace the nop with a ld in order to restore
7344 the TOC base pointer. Only calls to shared objects need
7345 to alter the TOC base. These are recognized by their
7346 need for a PLT entry. */
5bd4f169 7347 if (h != NULL
721956f4 7348 && (fdh = ((struct ppc_link_hash_entry *) h)->oh) != NULL
411e1bfb 7349 && fdh->plt.plist != NULL
721956f4
AM
7350 && (stub_entry = ppc_get_stub_entry (input_section, sec, fdh,
7351 rel, htab)) != NULL)
41bd81ab 7352 {
b34976b6 7353 bfd_boolean can_plt_call = 0;
721956f4 7354
411e1bfb 7355 if (rel->r_offset + 8 <= input_section->_cooked_size)
41bd81ab 7356 {
411e1bfb 7357 insn = bfd_get_32 (input_bfd, contents + rel->r_offset + 4);
721956f4
AM
7358 if (insn == NOP
7359 || insn == CROR_151515 || insn == CROR_313131)
41bd81ab 7360 {
721956f4 7361 bfd_put_32 (input_bfd, (bfd_vma) LD_R2_40R1,
411e1bfb 7362 contents + rel->r_offset + 4);
721956f4 7363 can_plt_call = 1;
41bd81ab 7364 }
5bd4f169 7365 }
721956f4
AM
7366
7367 if (!can_plt_call)
7368 {
7369 /* If this is a plain branch rather than a branch
7370 and link, don't require a nop. */
411e1bfb 7371 insn = bfd_get_32 (input_bfd, contents + rel->r_offset);
721956f4
AM
7372 if ((insn & 1) == 0)
7373 can_plt_call = 1;
7374 }
7375
7376 if (can_plt_call)
7377 {
7378 relocation = (stub_entry->stub_offset
7379 + stub_entry->stub_sec->output_offset
7380 + stub_entry->stub_sec->output_section->vma);
b34976b6 7381 unresolved_reloc = FALSE;
721956f4 7382 }
5bd4f169 7383 }
e86ce104
AM
7384
7385 if (h != NULL
7386 && h->root.type == bfd_link_hash_undefweak
721956f4 7387 && relocation == 0
411e1bfb 7388 && rel->r_addend == 0)
e86ce104 7389 {
721956f4
AM
7390 /* Tweak calls to undefined weak functions to point at a
7391 blr. We can thus call a weak function without first
7392 checking whether the function is defined. We have a
7393 blr at the end of .sfpr. */
805fc799 7394 BFD_ASSERT (htab->sfpr->_raw_size != 0);
721956f4
AM
7395 relocation = (htab->sfpr->_raw_size - 4
7396 + htab->sfpr->output_offset
7397 + htab->sfpr->output_section->vma);
411e1bfb 7398 from = (rel->r_offset
721956f4
AM
7399 + input_section->output_offset
7400 + input_section->output_section->vma);
805fc799 7401
721956f4
AM
7402 /* But let's not be silly about it. If the blr isn't in
7403 reach, just go to the next instruction. */
805fc799
AM
7404 if (relocation - from + (1 << 25) >= (1 << 26)
7405 || htab->sfpr->_raw_size == 0)
721956f4 7406 relocation = from + 4;
e86ce104 7407 }
65f38f15
AM
7408 break;
7409 }
5bd4f169 7410
65f38f15 7411 /* Set `addend'. */
411e1bfb
AM
7412 tls_type = 0;
7413 addend = rel->r_addend;
65f38f15
AM
7414 switch (r_type)
7415 {
7416 default:
7417 (*_bfd_error_handler)
7418 (_("%s: unknown relocation type %d for symbol %s"),
7419 bfd_archive_filename (input_bfd), (int) r_type, sym_name);
5bd4f169 7420
65f38f15 7421 bfd_set_error (bfd_error_bad_value);
b34976b6 7422 ret = FALSE;
65f38f15 7423 continue;
5bd4f169 7424
65f38f15 7425 case R_PPC64_NONE:
411e1bfb 7426 case R_PPC64_TLS:
04c9666a
AM
7427 case R_PPC64_GNU_VTINHERIT:
7428 case R_PPC64_GNU_VTENTRY:
65f38f15 7429 continue;
5bd4f169
AM
7430
7431 /* GOT16 relocations. Like an ADDR16 using the symbol's
7432 address in the GOT as relocation value instead of the
411e1bfb 7433 symbol's value itself. Also, create a GOT entry for the
5bd4f169 7434 symbol and put the symbol value there. */
411e1bfb
AM
7435 case R_PPC64_GOT_TLSGD16:
7436 case R_PPC64_GOT_TLSGD16_LO:
7437 case R_PPC64_GOT_TLSGD16_HI:
7438 case R_PPC64_GOT_TLSGD16_HA:
7439 tls_type = TLS_TLS | TLS_GD_LD;
7440 goto dogot;
7441
7442 case R_PPC64_GOT_TLSLD16:
7443 case R_PPC64_GOT_TLSLD16_LO:
7444 case R_PPC64_GOT_TLSLD16_HI:
7445 case R_PPC64_GOT_TLSLD16_HA:
7446 tls_type = TLS_TLS | TLS_GD_LD | TLS_LD;
7447 goto dogot;
7448
7449 case R_PPC64_GOT_TPREL16_DS:
7450 case R_PPC64_GOT_TPREL16_LO_DS:
7451 case R_PPC64_GOT_TPREL16_HI:
7452 case R_PPC64_GOT_TPREL16_HA:
7453 tls_type = TLS_TLS | TLS_TPREL;
7454 goto dogot;
7455
7456 case R_PPC64_GOT_DTPREL16_DS:
7457 case R_PPC64_GOT_DTPREL16_LO_DS:
7458 case R_PPC64_GOT_DTPREL16_HI:
7459 case R_PPC64_GOT_DTPREL16_HA:
7460 tls_type = TLS_TLS | TLS_DTPREL;
7461 goto dogot;
7462
65f38f15
AM
7463 case R_PPC64_GOT16:
7464 case R_PPC64_GOT16_LO:
7465 case R_PPC64_GOT16_HI:
7466 case R_PPC64_GOT16_HA:
7467 case R_PPC64_GOT16_DS:
7468 case R_PPC64_GOT16_LO_DS:
411e1bfb 7469 dogot:
5bd4f169
AM
7470 {
7471 /* Relocation is to the entry for this symbol in the global
7472 offset table. */
411e1bfb 7473 struct got_entry *ent;
5bd4f169 7474 bfd_vma off;
411e1bfb 7475 unsigned long indx;
65f38f15
AM
7476
7477 if (htab->sgot == NULL)
7478 abort ();
5bd4f169
AM
7479
7480 if (h != NULL)
411e1bfb
AM
7481 ent = h->got.glist;
7482 else
5bd4f169 7483 {
411e1bfb
AM
7484 if (local_got_ents == NULL)
7485 abort ();
7486 ent = local_got_ents[r_symndx];
7487 }
7488
7489 for (; ent != NULL; ent = ent->next)
7490 if (ent->addend == rel->r_addend
7491 && ent->tls_type == tls_type)
7492 break;
7493 if (ent == NULL)
7494 abort ();
5bd4f169 7495
411e1bfb
AM
7496 off = ent->got.offset;
7497 indx = 0;
7498 if (h != NULL)
7499 {
7500 bfd_boolean dyn = htab->elf.dynamic_sections_created;
65f38f15 7501 if (! WILL_CALL_FINISH_DYNAMIC_SYMBOL (dyn, info, h)
5bd4f169 7502 || (info->shared
65f38f15
AM
7503 && (info->symbolic
7504 || h->dynindx == -1
7505 || (h->elf_link_hash_flags
7506 & ELF_LINK_FORCED_LOCAL))
5bd4f169
AM
7507 && (h->elf_link_hash_flags
7508 & ELF_LINK_HASH_DEF_REGULAR)))
411e1bfb
AM
7509 /* This is actually a static link, or it is a
7510 -Bsymbolic link and the symbol is defined
7511 locally, or the symbol was forced to be local
7512 because of a version file. */
7513 ;
7514 else
5bd4f169 7515 {
411e1bfb
AM
7516 indx = h->dynindx;
7517 unresolved_reloc = FALSE;
5bd4f169
AM
7518 }
7519 }
411e1bfb
AM
7520
7521 /* The offset must always be a multiple of 8. We use the
7522 least significant bit to record whether we have already
7523 processed this entry. */
7524 if ((off & 1) != 0)
7525 off &= ~1;
5bd4f169
AM
7526 else
7527 {
411e1bfb
AM
7528 /* Generate relocs for the dynamic linker, except in
7529 the case of TLSLD where we'll use one entry per
7530 module. */
7531 if ((info->shared || indx != 0)
7532 && ent->tls_type != (TLS_TLS | TLS_GD_LD | TLS_LD))
5bd4f169 7533 {
411e1bfb
AM
7534 outrel.r_offset = (htab->sgot->output_section->vma
7535 + htab->sgot->output_offset
7536 + off);
7537 if (ent->tls_type == (TLS_TLS | TLS_GD_LD))
5bd4f169 7538 {
411e1bfb
AM
7539 outrel.r_info = ELF64_R_INFO (indx, R_PPC64_DTPMOD64);
7540 outrel.r_addend = 0;
947216bf
AM
7541 loc = htab->srelgot->contents;
7542 loc += (htab->srelgot->reloc_count++
7543 * sizeof (Elf64_External_Rela));
65f38f15 7544 bfd_elf64_swap_reloca_out (output_bfd, &outrel, loc);
411e1bfb
AM
7545 outrel.r_info = ELF64_R_INFO (indx, R_PPC64_DTPREL64);
7546 outrel.r_offset += 8;
7547 }
7548 else if (ent->tls_type == (TLS_TLS | TLS_DTPREL))
7549 outrel.r_info = ELF64_R_INFO (indx, R_PPC64_DTPREL64);
7550 else if (ent->tls_type == (TLS_TLS | TLS_TPREL))
7551 outrel.r_info = ELF64_R_INFO (indx, R_PPC64_TPREL64);
7552 else if (indx == 0)
7553 outrel.r_info = ELF64_R_INFO (indx, R_PPC64_RELATIVE);
7554 else
7555 outrel.r_info = ELF64_R_INFO (indx, R_PPC64_GLOB_DAT);
7556 outrel.r_addend = ent->addend;
7557 if (indx == 0)
7558 outrel.r_addend += relocation;
7559 loc = htab->srelgot->contents;
7560 loc += (htab->srelgot->reloc_count++
7561 * sizeof (Elf64_External_Rela));
7562 bfd_elf64_swap_reloca_out (output_bfd, &outrel, loc);
7563 }
7564
7565 /* Init the .got section contents if we're not
7566 emitting a reloc. */
7567 if (!(info->shared || indx != 0))
7568 {
7569
7570 relocation += ent->addend;
7571 if ((tls_type & TLS_TLS) != 0)
7572 {
7573 relocation -= htab->tls_sec->vma + DTP_OFFSET;
7574 if ((tls_type & TLS_TPREL) != 0)
7575 relocation += DTP_OFFSET - TP_OFFSET;
5bd4f169
AM
7576 }
7577
411e1bfb
AM
7578 if ((tls_type & TLS_GD_LD) != 0)
7579 {
7580 if ((tls_type & TLS_LD) != 0)
7581 relocation = - DTP_OFFSET;
7582 bfd_put_64 (output_bfd, relocation,
7583 htab->sgot->contents + off + 8);
7584 relocation = 1;
7585 }
7586 bfd_put_64 (output_bfd, relocation,
7587 htab->sgot->contents + off);
5bd4f169 7588 }
411e1bfb 7589 ent->got.offset |= 1;
5bd4f169
AM
7590 }
7591
65f38f15
AM
7592 if (off >= (bfd_vma) -2)
7593 abort ();
7594
7595 relocation = htab->sgot->output_offset + off;
7596
5bd4f169 7597 /* TOC base (r2) is TOC start plus 0x8000. */
411e1bfb 7598 addend = - TOC_BASE_OFF;
5bd4f169 7599 }
65f38f15
AM
7600 break;
7601
7602 case R_PPC64_PLT16_HA:
7603 case R_PPC64_PLT16_HI:
7604 case R_PPC64_PLT16_LO:
7605 case R_PPC64_PLT32:
7606 case R_PPC64_PLT64:
7607 /* Relocation is to the entry for this symbol in the
7608 procedure linkage table. */
7609
7610 /* Resolve a PLT reloc against a local symbol directly,
7611 without using the procedure linkage table. */
7612 if (h == NULL)
7613 break;
7614
411e1bfb
AM
7615 /* It's possible that we didn't make a PLT entry for this
7616 symbol. This happens when statically linking PIC code,
7617 or when using -Bsymbolic. Go find a match if there is a
7618 PLT entry. */
7619 if (htab->splt != NULL)
65f38f15 7620 {
411e1bfb
AM
7621 struct plt_entry *ent;
7622 for (ent = h->plt.plist; ent != NULL; ent = ent->next)
7623 if (ent->addend == rel->r_addend
7624 && ent->plt.offset != (bfd_vma) -1)
7625 {
7626 relocation = (htab->splt->output_section->vma
7627 + htab->splt->output_offset
7628 + ent->plt.offset);
7629 unresolved_reloc = FALSE;
7630 }
65f38f15 7631 }
65f38f15 7632 break;
5bd4f169
AM
7633
7634 /* TOC16 relocs. We want the offset relative to the TOC base,
7635 which is the address of the start of the TOC plus 0x8000.
7636 The TOC consists of sections .got, .toc, .tocbss, and .plt,
7637 in this order. */
65f38f15
AM
7638 case R_PPC64_TOC16:
7639 case R_PPC64_TOC16_LO:
7640 case R_PPC64_TOC16_HI:
7641 case R_PPC64_TOC16_DS:
7642 case R_PPC64_TOC16_LO_DS:
7643 case R_PPC64_TOC16_HA:
5bd4f169 7644 addend -= TOCstart + TOC_BASE_OFF;
5bd4f169
AM
7645 break;
7646
7647 /* Relocate against the beginning of the section. */
65f38f15
AM
7648 case R_PPC64_SECTOFF:
7649 case R_PPC64_SECTOFF_LO:
7650 case R_PPC64_SECTOFF_HI:
7651 case R_PPC64_SECTOFF_DS:
7652 case R_PPC64_SECTOFF_LO_DS:
7653 case R_PPC64_SECTOFF_HA:
7654 if (sec != (asection *) 0)
7655 addend -= sec->output_section->vma;
5bd4f169
AM
7656 break;
7657
721956f4
AM
7658 case R_PPC64_REL14:
7659 case R_PPC64_REL14_BRNTAKEN:
7660 case R_PPC64_REL14_BRTAKEN:
5d1634d7
AM
7661 case R_PPC64_REL24:
7662 break;
7663
411e1bfb
AM
7664 case R_PPC64_TPREL16:
7665 case R_PPC64_TPREL16_LO:
7666 case R_PPC64_TPREL16_HI:
7667 case R_PPC64_TPREL16_HA:
7668 case R_PPC64_TPREL16_DS:
7669 case R_PPC64_TPREL16_LO_DS:
7670 case R_PPC64_TPREL16_HIGHER:
7671 case R_PPC64_TPREL16_HIGHERA:
7672 case R_PPC64_TPREL16_HIGHEST:
7673 case R_PPC64_TPREL16_HIGHESTA:
7674 addend -= htab->tls_sec->vma + TP_OFFSET;
7675 if (info->shared)
7676 /* The TPREL16 relocs shouldn't really be used in shared
7677 libs as they will result in DT_TEXTREL being set, but
7678 support them anyway. */
7679 goto dodyn;
7680 break;
7681
7682 case R_PPC64_DTPREL16:
7683 case R_PPC64_DTPREL16_LO:
7684 case R_PPC64_DTPREL16_HI:
7685 case R_PPC64_DTPREL16_HA:
7686 case R_PPC64_DTPREL16_DS:
7687 case R_PPC64_DTPREL16_LO_DS:
7688 case R_PPC64_DTPREL16_HIGHER:
7689 case R_PPC64_DTPREL16_HIGHERA:
7690 case R_PPC64_DTPREL16_HIGHEST:
7691 case R_PPC64_DTPREL16_HIGHESTA:
7692 addend -= htab->tls_sec->vma + DTP_OFFSET;
7693 break;
7694
7695 case R_PPC64_TPREL64:
7696 addend -= htab->tls_sec->vma + TP_OFFSET;
7697 goto dodyn;
7698
7699 case R_PPC64_DTPREL64:
7700 addend -= htab->tls_sec->vma + DTP_OFFSET;
7701 /* Fall thru */
7702
65f38f15
AM
7703 /* Relocations that may need to be propagated if this is a
7704 dynamic object. */
411e1bfb 7705 case R_PPC64_DTPMOD64:
04c9666a 7706 case R_PPC64_REL30:
65f38f15
AM
7707 case R_PPC64_REL32:
7708 case R_PPC64_REL64:
7709 case R_PPC64_ADDR14:
7710 case R_PPC64_ADDR14_BRNTAKEN:
7711 case R_PPC64_ADDR14_BRTAKEN:
7712 case R_PPC64_ADDR16:
7713 case R_PPC64_ADDR16_DS:
7714 case R_PPC64_ADDR16_HA:
7715 case R_PPC64_ADDR16_HI:
7716 case R_PPC64_ADDR16_HIGHER:
7717 case R_PPC64_ADDR16_HIGHERA:
7718 case R_PPC64_ADDR16_HIGHEST:
7719 case R_PPC64_ADDR16_HIGHESTA:
7720 case R_PPC64_ADDR16_LO:
7721 case R_PPC64_ADDR16_LO_DS:
7722 case R_PPC64_ADDR24:
65f38f15
AM
7723 case R_PPC64_ADDR32:
7724 case R_PPC64_ADDR64:
7725 case R_PPC64_UADDR16:
7726 case R_PPC64_UADDR32:
7727 case R_PPC64_UADDR64:
ec338859
AM
7728 /* r_symndx will be zero only for relocs against symbols
7729 from removed linkonce sections, or sections discarded by
7730 a linker script. */
411e1bfb 7731 dodyn:
5d1634d7
AM
7732 if (r_symndx == 0)
7733 break;
7734 /* Fall thru. */
7735
7736 case R_PPC64_TOC:
7737 if ((input_section->flags & SEC_ALLOC) == 0)
ec338859
AM
7738 break;
7739
41bd81ab
AM
7740 if (NO_OPD_RELOCS && is_opd)
7741 break;
7742
65f38f15 7743 if ((info->shared
411e1bfb 7744 && (MUST_BE_DYN_RELOC (r_type)
65f38f15
AM
7745 || (h != NULL
7746 && h->dynindx != -1
7747 && (! info->symbolic
7748 || (h->elf_link_hash_flags
7749 & ELF_LINK_HASH_DEF_REGULAR) == 0))))
7750 || (!info->shared
65f38f15
AM
7751 && h != NULL
7752 && h->dynindx != -1
7753 && (h->elf_link_hash_flags & ELF_LINK_NON_GOT_REF) == 0
7754 && (((h->elf_link_hash_flags
7755 & ELF_LINK_HASH_DEF_DYNAMIC) != 0
7756 && (h->elf_link_hash_flags
7757 & ELF_LINK_HASH_DEF_REGULAR) == 0)
7758 || h->root.type == bfd_link_hash_undefweak
7759 || h->root.type == bfd_link_hash_undefined)))
7760 {
7761 Elf_Internal_Rela outrel;
b34976b6 7762 bfd_boolean skip, relocate;
65f38f15 7763 asection *sreloc;
947216bf 7764 bfd_byte *loc;
65f38f15
AM
7765
7766 /* When generating a dynamic object, these relocations
7767 are copied into the output file to be resolved at run
7768 time. */
7769
b34976b6
AM
7770 skip = FALSE;
7771 relocate = FALSE;
65f38f15 7772
c629eae0
JJ
7773 outrel.r_offset =
7774 _bfd_elf_section_offset (output_bfd, info, input_section,
7775 rel->r_offset);
7776 if (outrel.r_offset == (bfd_vma) -1)
b34976b6 7777 skip = TRUE;
0bb2d96a 7778 else if (outrel.r_offset == (bfd_vma) -2)
b34976b6 7779 skip = TRUE, relocate = TRUE;
65f38f15
AM
7780 outrel.r_offset += (input_section->output_section->vma
7781 + input_section->output_offset);
411e1bfb 7782 outrel.r_addend = rel->r_addend;
65f38f15
AM
7783
7784 if (skip)
0bb2d96a 7785 memset (&outrel, 0, sizeof outrel);
65f38f15
AM
7786 else if (h != NULL
7787 && h->dynindx != -1
41bd81ab 7788 && !is_opd
411e1bfb 7789 && (!MUST_BE_DYN_RELOC (r_type)
65f38f15
AM
7790 || !info->shared
7791 || !info->symbolic
7792 || (h->elf_link_hash_flags
7793 & ELF_LINK_HASH_DEF_REGULAR) == 0))
0bb2d96a 7794 outrel.r_info = ELF64_R_INFO (h->dynindx, r_type);
65f38f15
AM
7795 else
7796 {
41bd81ab
AM
7797 /* This symbol is local, or marked to become local,
7798 or this is an opd section reloc which must point
7799 at a local function. */
65f38f15 7800 outrel.r_addend += relocation;
411e1bfb 7801 /* ??? why? */
b34976b6 7802 relocate = TRUE;
e86ce104 7803 if (r_type == R_PPC64_ADDR64 || r_type == R_PPC64_TOC)
65f38f15 7804 {
3fad3c7c 7805 if (is_opd && h != NULL)
afbe61cf
AM
7806 {
7807 /* Lie about opd entries. This case occurs
7808 when building shared libraries and we
7809 reference a function in another shared
3fad3c7c
AM
7810 lib. The same thing happens for a weak
7811 definition in an application that's
7812 overridden by a strong definition in a
7813 shared lib. (I believe this is a generic
7814 bug in binutils handling of weak syms.)
7815 In these cases we won't use the opd
1e2f5b6e 7816 entry in this lib. */
b34976b6 7817 unresolved_reloc = FALSE;
afbe61cf 7818 }
65f38f15
AM
7819 outrel.r_info = ELF64_R_INFO (0, R_PPC64_RELATIVE);
7820 }
7821 else
7822 {
7823 long indx = 0;
7824
41bd81ab 7825 if (bfd_is_abs_section (sec))
65f38f15
AM
7826 ;
7827 else if (sec == NULL || sec->owner == NULL)
7828 {
7829 bfd_set_error (bfd_error_bad_value);
b34976b6 7830 return FALSE;
65f38f15
AM
7831 }
7832 else
7833 {
7834 asection *osec;
7835
7836 osec = sec->output_section;
7837 indx = elf_section_data (osec)->dynindx;
7838
7839 /* We are turning this relocation into one
7840 against a section symbol, so subtract out
7841 the output section's address but not the
7842 offset of the input section in the output
7843 section. */
7844 outrel.r_addend -= osec->vma;
7845 }
7846
7847 outrel.r_info = ELF64_R_INFO (indx, r_type);
7848 }
7849 }
7850
7851 sreloc = elf_section_data (input_section)->sreloc;
7852 if (sreloc == NULL)
7853 abort ();
7854
947216bf
AM
7855 loc = sreloc->contents;
7856 loc += sreloc->reloc_count++ * sizeof (Elf64_External_Rela);
65f38f15
AM
7857 bfd_elf64_swap_reloca_out (output_bfd, &outrel, loc);
7858
7859 /* If this reloc is against an external symbol, it will
7860 be computed at runtime, so there's no need to do
7861 anything now. */
7862 if (! relocate)
7863 continue;
7864 }
5bd4f169
AM
7865 break;
7866
65f38f15
AM
7867 case R_PPC64_COPY:
7868 case R_PPC64_GLOB_DAT:
7869 case R_PPC64_JMP_SLOT:
7870 case R_PPC64_RELATIVE:
7871 /* We shouldn't ever see these dynamic relocs in relocatable
7872 files. */
7873 /* Fall thru */
7874
7875 case R_PPC64_PLTGOT16:
7876 case R_PPC64_PLTGOT16_DS:
7877 case R_PPC64_PLTGOT16_HA:
7878 case R_PPC64_PLTGOT16_HI:
7879 case R_PPC64_PLTGOT16_LO:
7880 case R_PPC64_PLTGOT16_LO_DS:
7881 case R_PPC64_PLTREL32:
7882 case R_PPC64_PLTREL64:
7883 /* These ones haven't been implemented yet. */
7884
7885 (*_bfd_error_handler)
7886 (_("%s: Relocation %s is not supported for symbol %s."),
7887 bfd_archive_filename (input_bfd),
7888 ppc64_elf_howto_table[(int) r_type]->name, sym_name);
5bd4f169
AM
7889
7890 bfd_set_error (bfd_error_invalid_operation);
b34976b6 7891 ret = FALSE;
5bd4f169 7892 continue;
65f38f15 7893 }
5bd4f169 7894
65f38f15
AM
7895 /* Do any further special processing. */
7896 switch (r_type)
7897 {
7898 default:
7899 break;
7900
7901 case R_PPC64_ADDR16_HA:
7902 case R_PPC64_ADDR16_HIGHERA:
7903 case R_PPC64_ADDR16_HIGHESTA:
86bbe32f
AM
7904 case R_PPC64_GOT16_HA:
7905 case R_PPC64_PLTGOT16_HA:
65f38f15
AM
7906 case R_PPC64_PLT16_HA:
7907 case R_PPC64_TOC16_HA:
7908 case R_PPC64_SECTOFF_HA:
411e1bfb
AM
7909 case R_PPC64_TPREL16_HA:
7910 case R_PPC64_DTPREL16_HA:
7911 case R_PPC64_GOT_TLSGD16_HA:
7912 case R_PPC64_GOT_TLSLD16_HA:
7913 case R_PPC64_GOT_TPREL16_HA:
7914 case R_PPC64_GOT_DTPREL16_HA:
7915 case R_PPC64_TPREL16_HIGHER:
7916 case R_PPC64_TPREL16_HIGHERA:
7917 case R_PPC64_TPREL16_HIGHEST:
7918 case R_PPC64_TPREL16_HIGHESTA:
7919 case R_PPC64_DTPREL16_HIGHER:
7920 case R_PPC64_DTPREL16_HIGHERA:
7921 case R_PPC64_DTPREL16_HIGHEST:
7922 case R_PPC64_DTPREL16_HIGHESTA:
65f38f15
AM
7923 /* It's just possible that this symbol is a weak symbol
7924 that's not actually defined anywhere. In that case,
7925 'sec' would be NULL, and we should leave the symbol
7926 alone (it will be set to zero elsewhere in the link). */
7927 if (sec != NULL)
7928 /* Add 0x10000 if sign bit in 0:15 is set. */
7929 addend += ((relocation + addend) & 0x8000) << 1;
7930 break;
7931
7932 case R_PPC64_ADDR16_DS:
7933 case R_PPC64_ADDR16_LO_DS:
7934 case R_PPC64_GOT16_DS:
7935 case R_PPC64_GOT16_LO_DS:
7936 case R_PPC64_PLT16_LO_DS:
7937 case R_PPC64_SECTOFF_DS:
7938 case R_PPC64_SECTOFF_LO_DS:
7939 case R_PPC64_TOC16_DS:
7940 case R_PPC64_TOC16_LO_DS:
7941 case R_PPC64_PLTGOT16_DS:
7942 case R_PPC64_PLTGOT16_LO_DS:
411e1bfb
AM
7943 case R_PPC64_GOT_TPREL16_DS:
7944 case R_PPC64_GOT_TPREL16_LO_DS:
7945 case R_PPC64_GOT_DTPREL16_DS:
7946 case R_PPC64_GOT_DTPREL16_LO_DS:
7947 case R_PPC64_TPREL16_DS:
7948 case R_PPC64_TPREL16_LO_DS:
7949 case R_PPC64_DTPREL16_DS:
7950 case R_PPC64_DTPREL16_LO_DS:
65f38f15
AM
7951 if (((relocation + addend) & 3) != 0)
7952 {
7953 (*_bfd_error_handler)
7954 (_("%s: error: relocation %s not a multiple of 4"),
7955 bfd_archive_filename (input_bfd),
7956 ppc64_elf_howto_table[(int) r_type]->name);
7957 bfd_set_error (bfd_error_bad_value);
b34976b6 7958 ret = FALSE;
65f38f15
AM
7959 continue;
7960 }
7961 break;
721956f4
AM
7962
7963 case R_PPC64_REL14:
7964 case R_PPC64_REL14_BRNTAKEN:
7965 case R_PPC64_REL14_BRTAKEN:
7966 max_br_offset = 1 << 15;
7967 goto branch_check;
7968
7969 case R_PPC64_REL24:
7970 max_br_offset = 1 << 25;
7971
7972 branch_check:
7973 /* If the branch is out of reach, then redirect the
7974 call to the local stub for this function. */
411e1bfb 7975 from = (rel->r_offset
721956f4
AM
7976 + input_section->output_offset
7977 + input_section->output_section->vma);
7978 if (relocation + addend - from + max_br_offset >= 2 * max_br_offset
7979 && (stub_entry = ppc_get_stub_entry (input_section, sec, h,
7980 rel, htab)) != NULL)
7981 {
7982 /* Munge up the value and addend so that we call the stub
7983 rather than the procedure directly. */
7984 relocation = (stub_entry->stub_offset
7985 + stub_entry->stub_sec->output_offset
7986 + stub_entry->stub_sec->output_section->vma);
7987 addend = 0;
7988 }
7989 break;
5bd4f169
AM
7990 }
7991
239e1f3a
AM
7992 /* Dynamic relocs are not propagated for SEC_DEBUGGING sections
7993 because such sections are not SEC_ALLOC and thus ld.so will
7994 not process them. */
65f38f15 7995 if (unresolved_reloc
239e1f3a 7996 && !((input_section->flags & SEC_DEBUGGING) != 0
65f38f15 7997 && (h->elf_link_hash_flags & ELF_LINK_HASH_DEF_DYNAMIC) != 0))
9c07fe7c
AM
7998 {
7999 (*_bfd_error_handler)
8000 (_("%s(%s+0x%lx): unresolvable relocation against symbol `%s'"),
8001 bfd_archive_filename (input_bfd),
8002 bfd_get_section_name (input_bfd, input_section),
8003 (long) rel->r_offset,
8004 h->root.root.string);
b34976b6 8005 ret = FALSE;
9c07fe7c 8006 }
5bd4f169 8007
65f38f15 8008 r = _bfd_final_link_relocate (ppc64_elf_howto_table[(int) r_type],
5bd4f169
AM
8009 input_bfd,
8010 input_section,
8011 contents,
411e1bfb 8012 rel->r_offset,
5bd4f169
AM
8013 relocation,
8014 addend);
8015
ef60b7ff 8016 if (r != bfd_reloc_ok)
5bd4f169
AM
8017 {
8018 const char *name;
8019
8020 if (h != NULL)
8021 {
8022 if (h->root.type == bfd_link_hash_undefweak
65f38f15 8023 && ppc64_elf_howto_table[(int) r_type]->pc_relative)
5bd4f169
AM
8024 {
8025 /* Assume this is a call protected by other code that
8026 detects the symbol is undefined. If this is the case,
8027 we can safely ignore the overflow. If not, the
8028 program is hosed anyway, and a little warning isn't
8029 going to help. */
8030
8031 continue;
8032 }
8033
8034 name = h->root.root.string;
8035 }
8036 else
8037 {
411e1bfb 8038 name = bfd_elf_local_sym_name (input_bfd, sym);
5bd4f169
AM
8039 if (name == NULL)
8040 continue;
5bd4f169
AM
8041 }
8042
ef60b7ff
AM
8043 if (r == bfd_reloc_overflow)
8044 {
8045 if (warned)
8046 continue;
8047 if (!((*info->callbacks->reloc_overflow)
8048 (info, name, ppc64_elf_howto_table[(int) r_type]->name,
411e1bfb 8049 rel->r_addend, input_bfd, input_section, rel->r_offset)))
b34976b6 8050 return FALSE;
ef60b7ff
AM
8051 }
8052 else
8053 {
8054 (*_bfd_error_handler)
8055 (_("%s(%s+0x%lx): reloc against `%s': error %d"),
8056 bfd_archive_filename (input_bfd),
8057 bfd_get_section_name (input_bfd, input_section),
8058 (long) rel->r_offset, name, (int) r);
b34976b6 8059 ret = FALSE;
ef60b7ff 8060 }
5bd4f169 8061 }
5bd4f169
AM
8062 }
8063
5bd4f169
AM
8064 return ret;
8065}
8066
8067/* Finish up dynamic symbol handling. We set the contents of various
8068 dynamic sections here. */
8069
b34976b6 8070static bfd_boolean
5bd4f169
AM
8071ppc64_elf_finish_dynamic_symbol (output_bfd, info, h, sym)
8072 bfd *output_bfd;
8073 struct bfd_link_info *info;
8074 struct elf_link_hash_entry *h;
8075 Elf_Internal_Sym *sym;
8076{
65f38f15 8077 struct ppc_link_hash_table *htab;
5bd4f169
AM
8078 bfd *dynobj;
8079
65f38f15
AM
8080 htab = ppc_hash_table (info);
8081 dynobj = htab->elf.dynobj;
5bd4f169 8082
411e1bfb 8083 if (((struct ppc_link_hash_entry *) h)->is_func_descriptor)
5bd4f169 8084 {
411e1bfb 8085 struct plt_entry *ent;
65f38f15 8086 Elf_Internal_Rela rela;
947216bf 8087 bfd_byte *loc;
5bd4f169 8088
411e1bfb
AM
8089 for (ent = h->plt.plist; ent != NULL; ent = ent->next)
8090 if (ent->plt.offset != (bfd_vma) -1)
8091 {
8092 /* This symbol has an entry in the procedure linkage
8093 table. Set it up. */
5bd4f169 8094
411e1bfb
AM
8095 if (htab->splt == NULL
8096 || htab->srelplt == NULL
8097 || htab->sglink == NULL)
8098 abort ();
5bd4f169 8099
411e1bfb
AM
8100 /* Create a JMP_SLOT reloc to inform the dynamic linker to
8101 fill in the PLT entry. */
5bd4f169 8102
411e1bfb
AM
8103 rela.r_offset = (htab->splt->output_section->vma
8104 + htab->splt->output_offset
8105 + ent->plt.offset);
8106 rela.r_info = ELF64_R_INFO (h->dynindx, R_PPC64_JMP_SLOT);
8107 rela.r_addend = ent->addend;
5bd4f169 8108
411e1bfb
AM
8109 loc = htab->srelplt->contents;
8110 loc += ((ent->plt.offset - PLT_INITIAL_ENTRY_SIZE) / PLT_ENTRY_SIZE
8111 * sizeof (Elf64_External_Rela));
8112 bfd_elf64_swap_reloca_out (output_bfd, &rela, loc);
8113 }
5bd4f169
AM
8114 }
8115
8116 if ((h->elf_link_hash_flags & ELF_LINK_HASH_NEEDS_COPY) != 0)
8117 {
5bd4f169 8118 Elf_Internal_Rela rela;
947216bf 8119 bfd_byte *loc;
5bd4f169 8120
65f38f15 8121 /* This symbol needs a copy reloc. Set it up. */
5bd4f169 8122
65f38f15
AM
8123 if (h->dynindx == -1
8124 || (h->root.type != bfd_link_hash_defined
8125 && h->root.type != bfd_link_hash_defweak)
8126 || htab->srelbss == NULL)
8127 abort ();
5bd4f169
AM
8128
8129 rela.r_offset = (h->root.u.def.value
8130 + h->root.u.def.section->output_section->vma
8131 + h->root.u.def.section->output_offset);
8132 rela.r_info = ELF64_R_INFO (h->dynindx, R_PPC64_COPY);
8133 rela.r_addend = 0;
947216bf
AM
8134 loc = htab->srelbss->contents;
8135 loc += htab->srelbss->reloc_count++ * sizeof (Elf64_External_Rela);
65f38f15 8136 bfd_elf64_swap_reloca_out (output_bfd, &rela, loc);
5bd4f169
AM
8137 }
8138
5bd4f169
AM
8139 /* Mark some specially defined symbols as absolute. */
8140 if (strcmp (h->root.root.string, "_DYNAMIC") == 0)
8141 sym->st_shndx = SHN_ABS;
8142
b34976b6 8143 return TRUE;
5bd4f169
AM
8144}
8145
65f38f15
AM
8146/* Used to decide how to sort relocs in an optimal manner for the
8147 dynamic linker, before writing them out. */
8148
8149static enum elf_reloc_type_class
8150ppc64_elf_reloc_type_class (rela)
8151 const Elf_Internal_Rela *rela;
8152{
04c9666a 8153 enum elf_ppc64_reloc_type r_type;
a33d1f77 8154
04c9666a 8155 r_type = (enum elf_ppc64_reloc_type) ELF64_R_TYPE (rela->r_info);
a33d1f77 8156 switch (r_type)
65f38f15
AM
8157 {
8158 case R_PPC64_RELATIVE:
8159 return reloc_class_relative;
8160 case R_PPC64_JMP_SLOT:
8161 return reloc_class_plt;
8162 case R_PPC64_COPY:
8163 return reloc_class_copy;
8164 default:
8165 return reloc_class_normal;
8166 }
8167}
8168
5bd4f169
AM
8169/* Finish up the dynamic sections. */
8170
b34976b6 8171static bfd_boolean
5bd4f169
AM
8172ppc64_elf_finish_dynamic_sections (output_bfd, info)
8173 bfd *output_bfd;
8174 struct bfd_link_info *info;
8175{
65f38f15
AM
8176 struct ppc_link_hash_table *htab;
8177 bfd *dynobj;
5bd4f169 8178 asection *sdyn;
5bd4f169 8179
65f38f15
AM
8180 htab = ppc_hash_table (info);
8181 dynobj = htab->elf.dynobj;
5bd4f169
AM
8182 sdyn = bfd_get_section_by_name (dynobj, ".dynamic");
8183
65f38f15 8184 if (htab->elf.dynamic_sections_created)
5bd4f169 8185 {
5bd4f169
AM
8186 Elf64_External_Dyn *dyncon, *dynconend;
8187
65f38f15
AM
8188 if (sdyn == NULL || htab->sgot == NULL)
8189 abort ();
5bd4f169
AM
8190
8191 dyncon = (Elf64_External_Dyn *) sdyn->contents;
8192 dynconend = (Elf64_External_Dyn *) (sdyn->contents + sdyn->_raw_size);
8193 for (; dyncon < dynconend; dyncon++)
8194 {
8195 Elf_Internal_Dyn dyn;
19397422 8196 asection *s;
5bd4f169
AM
8197
8198 bfd_elf64_swap_dyn_in (dynobj, dyncon, &dyn);
8199
8200 switch (dyn.d_tag)
8201 {
65f38f15
AM
8202 default:
8203 continue;
5bd4f169 8204
5d1634d7 8205 case DT_PPC64_GLINK:
6348e046
AM
8206 s = htab->sglink;
8207 dyn.d_un.d_ptr = s->output_section->vma + s->output_offset;
5d1634d7
AM
8208 break;
8209
19397422
AM
8210 case DT_PPC64_OPD:
8211 s = bfd_get_section_by_name (output_bfd, ".opd");
6348e046
AM
8212 if (s == NULL)
8213 continue;
8214 dyn.d_un.d_ptr = s->vma;
19397422
AM
8215 break;
8216
8217 case DT_PPC64_OPDSZ:
8218 s = bfd_get_section_by_name (output_bfd, ".opd");
6348e046
AM
8219 if (s == NULL)
8220 continue;
8221 dyn.d_un.d_val = s->_raw_size;
19397422
AM
8222 break;
8223
65f38f15 8224 case DT_PLTGOT:
6348e046
AM
8225 s = htab->splt;
8226 dyn.d_un.d_ptr = s->output_section->vma + s->output_offset;
65f38f15
AM
8227 break;
8228
8229 case DT_JMPREL:
6348e046
AM
8230 s = htab->srelplt;
8231 dyn.d_un.d_ptr = s->output_section->vma + s->output_offset;
65f38f15 8232 break;
5bd4f169 8233
65f38f15 8234 case DT_PLTRELSZ:
5d1634d7
AM
8235 dyn.d_un.d_val = htab->srelplt->_raw_size;
8236 break;
8237
8238 case DT_RELASZ:
8239 /* Don't count procedure linkage table relocs in the
8240 overall reloc count. */
6348e046
AM
8241 s = htab->srelplt;
8242 if (s == NULL)
8243 continue;
8244 dyn.d_un.d_val -= s->_raw_size;
8245 break;
8246
8247 case DT_RELA:
8248 /* We may not be using the standard ELF linker script.
8249 If .rela.plt is the first .rela section, we adjust
8250 DT_RELA to not include it. */
8251 s = htab->srelplt;
8252 if (s == NULL)
8253 continue;
8254 if (dyn.d_un.d_ptr != s->output_section->vma + s->output_offset)
8255 continue;
8256 dyn.d_un.d_ptr += s->_raw_size;
65f38f15 8257 break;
5bd4f169 8258 }
5bd4f169 8259
65f38f15 8260 bfd_elf64_swap_dyn_out (output_bfd, &dyn, dyncon);
5bd4f169 8261 }
5bd4f169
AM
8262 }
8263
5d1634d7
AM
8264 if (htab->sgot != NULL && htab->sgot->_raw_size != 0)
8265 {
8266 /* Fill in the first entry in the global offset table.
8267 We use it to hold the link-time TOCbase. */
8268 bfd_put_64 (output_bfd,
60ee0d4a 8269 elf_gp (output_bfd) + TOC_BASE_OFF,
5d1634d7
AM
8270 htab->sgot->contents);
8271
8272 /* Set .got entry size. */
8273 elf_section_data (htab->sgot->output_section)->this_hdr.sh_entsize = 8;
8274 }
8275
8276 if (htab->splt != NULL && htab->splt->_raw_size != 0)
8277 {
8278 /* Set .plt entry size. */
8279 elf_section_data (htab->splt->output_section)->this_hdr.sh_entsize
8280 = PLT_ENTRY_SIZE;
8281 }
8282
b34976b6 8283 return TRUE;
5bd4f169
AM
8284}
8285
8286#define TARGET_LITTLE_SYM bfd_elf64_powerpcle_vec
8287#define TARGET_LITTLE_NAME "elf64-powerpcle"
8288#define TARGET_BIG_SYM bfd_elf64_powerpc_vec
8289#define TARGET_BIG_NAME "elf64-powerpc"
8290#define ELF_ARCH bfd_arch_powerpc
8291#define ELF_MACHINE_CODE EM_PPC64
8292#define ELF_MAXPAGESIZE 0x10000
8293#define elf_info_to_howto ppc64_elf_info_to_howto
8294
8295#ifdef EM_CYGNUS_POWERPC
8296#define ELF_MACHINE_ALT1 EM_CYGNUS_POWERPC
8297#endif
8298
8299#ifdef EM_PPC_OLD
8300#define ELF_MACHINE_ALT2 EM_PPC_OLD
8301#endif
8302
8303#define elf_backend_want_got_sym 0
8304#define elf_backend_want_plt_sym 0
8305#define elf_backend_plt_alignment 3
8306#define elf_backend_plt_not_loaded 1
8307#define elf_backend_got_symbol_offset 0
5d1634d7
AM
8308#define elf_backend_got_header_size 8
8309#define elf_backend_plt_header_size PLT_INITIAL_ENTRY_SIZE
5bd4f169 8310#define elf_backend_can_gc_sections 1
65f38f15 8311#define elf_backend_can_refcount 1
b491616a 8312#define elf_backend_rela_normal 1
5bd4f169 8313
65f38f15 8314#define bfd_elf64_bfd_reloc_type_lookup ppc64_elf_reloc_type_lookup
65f38f15 8315#define bfd_elf64_bfd_merge_private_bfd_data ppc64_elf_merge_private_bfd_data
f0abc2a1 8316#define bfd_elf64_new_section_hook ppc64_elf_new_section_hook
65f38f15 8317#define bfd_elf64_bfd_link_hash_table_create ppc64_elf_link_hash_table_create
721956f4 8318#define bfd_elf64_bfd_link_hash_table_free ppc64_elf_link_hash_table_free
65f38f15 8319
feee612b 8320#define elf_backend_object_p ppc64_elf_object_p
65f38f15
AM
8321#define elf_backend_create_dynamic_sections ppc64_elf_create_dynamic_sections
8322#define elf_backend_copy_indirect_symbol ppc64_elf_copy_indirect_symbol
8323#define elf_backend_check_relocs ppc64_elf_check_relocs
8324#define elf_backend_gc_mark_hook ppc64_elf_gc_mark_hook
8325#define elf_backend_gc_sweep_hook ppc64_elf_gc_sweep_hook
8326#define elf_backend_adjust_dynamic_symbol ppc64_elf_adjust_dynamic_symbol
e86ce104
AM
8327#define elf_backend_hide_symbol ppc64_elf_hide_symbol
8328#define elf_backend_always_size_sections ppc64_elf_func_desc_adjust
65f38f15 8329#define elf_backend_size_dynamic_sections ppc64_elf_size_dynamic_sections
65f38f15
AM
8330#define elf_backend_relocate_section ppc64_elf_relocate_section
8331#define elf_backend_finish_dynamic_symbol ppc64_elf_finish_dynamic_symbol
8332#define elf_backend_reloc_type_class ppc64_elf_reloc_type_class
8333#define elf_backend_finish_dynamic_sections ppc64_elf_finish_dynamic_sections
5bd4f169
AM
8334
8335#include "elf64-target.h"
This page took 0.555914 seconds and 4 git commands to generate.