daily update
[deliverable/binutils-gdb.git] / bfd / elf64-ppc.c
CommitLineData
5bd4f169 1/* PowerPC64-specific support for 64-bit ELF.
86bbe32f 2 Copyright 1999, 2000, 2001, 2002, 2003 Free Software Foundation, Inc.
5bd4f169
AM
3 Written by Linus Nordberg, Swox AB <info@swox.com>,
4 based on elf32-ppc.c by Ian Lance Taylor.
5
ae9a127f 6 This file is part of BFD, the Binary File Descriptor library.
5bd4f169 7
ae9a127f
NC
8 This program is free software; you can redistribute it and/or modify
9 it under the terms of the GNU General Public License as published by
10 the Free Software Foundation; either version 2 of the License, or
11 (at your option) any later version.
5bd4f169 12
ae9a127f
NC
13 This program is distributed in the hope that it will be useful,
14 but WITHOUT ANY WARRANTY; without even the implied warranty of
15 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
16 GNU General Public License for more details.
5bd4f169 17
ae9a127f
NC
18 You should have received a copy of the GNU General Public License
19 along with this program; if not, write to the Free Software
20 Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA. */
5bd4f169
AM
21
22/* This file is based on the 64-bit PowerPC ELF ABI. It is also based
23 on the file elf32-ppc.c. */
24
25#include "bfd.h"
26#include "sysdep.h"
27#include "bfdlink.h"
28#include "libbfd.h"
29#include "elf-bfd.h"
04c9666a 30#include "elf/ppc64.h"
5d1634d7 31#include "elf64-ppc.h"
5bd4f169 32
5bd4f169
AM
33static void ppc_howto_init
34 PARAMS ((void));
35static reloc_howto_type *ppc64_elf_reloc_type_lookup
36 PARAMS ((bfd *abfd, bfd_reloc_code_real_type code));
37static void ppc64_elf_info_to_howto
947216bf 38 PARAMS ((bfd *abfd, arelent *cache_ptr, Elf_Internal_Rela *dst));
805fc799
AM
39static bfd_reloc_status_type ppc64_elf_ha_reloc
40 PARAMS ((bfd *, arelent *, asymbol *, PTR, asection *, bfd *, char **));
41static bfd_reloc_status_type ppc64_elf_brtaken_reloc
42 PARAMS ((bfd *, arelent *, asymbol *, PTR, asection *, bfd *, char **));
43static bfd_reloc_status_type ppc64_elf_sectoff_reloc
44 PARAMS ((bfd *, arelent *, asymbol *, PTR, asection *, bfd *, char **));
45static bfd_reloc_status_type ppc64_elf_sectoff_ha_reloc
46 PARAMS ((bfd *, arelent *, asymbol *, PTR, asection *, bfd *, char **));
47static bfd_reloc_status_type ppc64_elf_toc_reloc
48 PARAMS ((bfd *, arelent *, asymbol *, PTR, asection *, bfd *, char **));
49static bfd_reloc_status_type ppc64_elf_toc_ha_reloc
50 PARAMS ((bfd *, arelent *, asymbol *, PTR, asection *, bfd *, char **));
51static bfd_reloc_status_type ppc64_elf_toc64_reloc
52 PARAMS ((bfd *, arelent *, asymbol *, PTR, asection *, bfd *, char **));
53static bfd_reloc_status_type ppc64_elf_unhandled_reloc
5bd4f169 54 PARAMS ((bfd *, arelent *, asymbol *, PTR, asection *, bfd *, char **));
b34976b6 55static bfd_boolean ppc64_elf_object_p
feee612b 56 PARAMS ((bfd *));
b34976b6 57static bfd_boolean ppc64_elf_merge_private_bfd_data
5bd4f169 58 PARAMS ((bfd *, bfd *));
f0abc2a1
AM
59static bfd_boolean ppc64_elf_new_section_hook
60 PARAMS ((bfd *, asection *));
5bd4f169
AM
61
62
5bd4f169
AM
63/* The name of the dynamic interpreter. This is put in the .interp
64 section. */
65#define ELF_DYNAMIC_INTERPRETER "/usr/lib/ld.so.1"
66
67/* The size in bytes of an entry in the procedure linkage table. */
68#define PLT_ENTRY_SIZE 24
69
70/* The initial size of the plt reserved for the dynamic linker. */
5d1634d7 71#define PLT_INITIAL_ENTRY_SIZE PLT_ENTRY_SIZE
5bd4f169
AM
72
73/* TOC base pointers offset from start of TOC. */
411e1bfb
AM
74#define TOC_BASE_OFF 0x8000
75
76/* Offset of tp and dtp pointers from start of TLS block. */
77#define TP_OFFSET 0x7000
78#define DTP_OFFSET 0x8000
5bd4f169 79
5d1634d7
AM
80/* .plt call stub instructions. */
81#define ADDIS_R12_R2 0x3d820000 /* addis %r12,%r2,xxx@ha */
82#define STD_R2_40R1 0xf8410028 /* std %r2,40(%r1) */
83#define LD_R11_0R12 0xe96c0000 /* ld %r11,xxx+0@l(%r12) */
84#define LD_R2_0R12 0xe84c0000 /* ld %r2,xxx+8@l(%r12) */
85#define MTCTR_R11 0x7d6903a6 /* mtctr %r11 */
86 /* ld %r11,xxx+16@l(%r12) */
87#define BCTR 0x4e800420 /* bctr */
88
89/* The normal stub is this size. */
90#define PLT_CALL_STUB_SIZE (7*4)
91
92/* But sometimes the .plt entry crosses a 64k boundary, and we need
93 to adjust the high word with this insn. */
94#define ADDIS_R12_R12_1 0x3d8c0001 /* addis %r12,%r12,1 */
5bd4f169 95
5d1634d7
AM
96/* The .glink fixup call stub is the same as the .plt call stub, but
97 the first instruction restores r2, and the std is omitted. */
98#define LD_R2_40R1 0xe8410028 /* ld %r2,40(%r1) */
99
100/* Always allow this much space. */
101#define GLINK_CALL_STUB_SIZE (8*4)
102
103/* Pad with this. */
104#define NOP 0x60000000
105
721956f4
AM
106/* Some other nops. */
107#define CROR_151515 0x4def7b82
108#define CROR_313131 0x4ffffb82
109
cedb70c5 110/* .glink entries for the first 32k functions are two instructions. */
5d1634d7
AM
111#define LI_R0_0 0x38000000 /* li %r0,0 */
112#define B_DOT 0x48000000 /* b . */
113
114/* After that, we need two instructions to load the index, followed by
115 a branch. */
116#define LIS_R0_0 0x3c000000 /* lis %r0,0 */
10ed1bba 117#define ORI_R0_R0_0 0x60000000 /* ori %r0,%r0,0 */
41bd81ab 118
82bd7b59
AM
119/* Instructions to save and restore floating point regs. */
120#define STFD_FR0_0R1 0xd8010000 /* stfd %fr0,0(%r1) */
121#define LFD_FR0_0R1 0xc8010000 /* lfd %fr0,0(%r1) */
122#define BLR 0x4e800020 /* blr */
123
41bd81ab
AM
124/* Since .opd is an array of descriptors and each entry will end up
125 with identical R_PPC64_RELATIVE relocs, there is really no need to
126 propagate .opd relocs; The dynamic linker should be taught to
1e2f5b6e 127 relocate .opd without reloc entries. */
41bd81ab
AM
128#ifndef NO_OPD_RELOCS
129#define NO_OPD_RELOCS 0
130#endif
5bd4f169 131\f
f5e87a1d 132#define ONES(n) (((bfd_vma) 1 << ((n) - 1) << 1) - 1)
b34976b6 133
5bd4f169 134/* Relocation HOWTO's. */
04c9666a 135static reloc_howto_type *ppc64_elf_howto_table[(int) R_PPC64_max];
5bd4f169
AM
136
137static reloc_howto_type ppc64_elf_howto_raw[] = {
138 /* This reloc does nothing. */
139 HOWTO (R_PPC64_NONE, /* type */
140 0, /* rightshift */
411e1bfb
AM
141 2, /* size (0 = byte, 1 = short, 2 = long) */
142 32, /* bitsize */
b34976b6 143 FALSE, /* pc_relative */
5bd4f169 144 0, /* bitpos */
f5e87a1d 145 complain_overflow_dont, /* complain_on_overflow */
5bd4f169
AM
146 bfd_elf_generic_reloc, /* special_function */
147 "R_PPC64_NONE", /* name */
b34976b6 148 FALSE, /* partial_inplace */
d006db6c 149 0, /* src_mask */
5bd4f169 150 0, /* dst_mask */
b34976b6 151 FALSE), /* pcrel_offset */
5bd4f169
AM
152
153 /* A standard 32 bit relocation. */
154 HOWTO (R_PPC64_ADDR32, /* type */
155 0, /* rightshift */
156 2, /* size (0 = byte, 1 = short, 2 = long) */
157 32, /* bitsize */
b34976b6 158 FALSE, /* pc_relative */
5bd4f169
AM
159 0, /* bitpos */
160 complain_overflow_bitfield, /* complain_on_overflow */
161 bfd_elf_generic_reloc, /* special_function */
162 "R_PPC64_ADDR32", /* name */
b34976b6 163 FALSE, /* partial_inplace */
5bd4f169
AM
164 0, /* src_mask */
165 0xffffffff, /* dst_mask */
b34976b6 166 FALSE), /* pcrel_offset */
5bd4f169
AM
167
168 /* An absolute 26 bit branch; the lower two bits must be zero.
169 FIXME: we don't check that, we just clear them. */
170 HOWTO (R_PPC64_ADDR24, /* type */
171 0, /* rightshift */
172 2, /* size (0 = byte, 1 = short, 2 = long) */
173 26, /* bitsize */
b34976b6 174 FALSE, /* pc_relative */
5bd4f169
AM
175 0, /* bitpos */
176 complain_overflow_bitfield, /* complain_on_overflow */
177 bfd_elf_generic_reloc, /* special_function */
178 "R_PPC64_ADDR24", /* name */
b34976b6 179 FALSE, /* partial_inplace */
d006db6c 180 0, /* src_mask */
f5e87a1d 181 0x03fffffc, /* dst_mask */
b34976b6 182 FALSE), /* pcrel_offset */
5bd4f169
AM
183
184 /* A standard 16 bit relocation. */
185 HOWTO (R_PPC64_ADDR16, /* type */
186 0, /* rightshift */
187 1, /* size (0 = byte, 1 = short, 2 = long) */
188 16, /* bitsize */
b34976b6 189 FALSE, /* pc_relative */
5bd4f169
AM
190 0, /* bitpos */
191 complain_overflow_bitfield, /* complain_on_overflow */
192 bfd_elf_generic_reloc, /* special_function */
193 "R_PPC64_ADDR16", /* name */
b34976b6 194 FALSE, /* partial_inplace */
5bd4f169
AM
195 0, /* src_mask */
196 0xffff, /* dst_mask */
b34976b6 197 FALSE), /* pcrel_offset */
5bd4f169
AM
198
199 /* A 16 bit relocation without overflow. */
200 HOWTO (R_PPC64_ADDR16_LO, /* type */
201 0, /* rightshift */
202 1, /* size (0 = byte, 1 = short, 2 = long) */
203 16, /* bitsize */
b34976b6 204 FALSE, /* pc_relative */
5bd4f169
AM
205 0, /* bitpos */
206 complain_overflow_dont,/* complain_on_overflow */
207 bfd_elf_generic_reloc, /* special_function */
208 "R_PPC64_ADDR16_LO", /* name */
b34976b6 209 FALSE, /* partial_inplace */
5bd4f169
AM
210 0, /* src_mask */
211 0xffff, /* dst_mask */
b34976b6 212 FALSE), /* pcrel_offset */
5bd4f169
AM
213
214 /* Bits 16-31 of an address. */
215 HOWTO (R_PPC64_ADDR16_HI, /* type */
216 16, /* rightshift */
217 1, /* size (0 = byte, 1 = short, 2 = long) */
218 16, /* bitsize */
b34976b6 219 FALSE, /* pc_relative */
5bd4f169
AM
220 0, /* bitpos */
221 complain_overflow_dont, /* complain_on_overflow */
222 bfd_elf_generic_reloc, /* special_function */
223 "R_PPC64_ADDR16_HI", /* name */
b34976b6 224 FALSE, /* partial_inplace */
5bd4f169
AM
225 0, /* src_mask */
226 0xffff, /* dst_mask */
b34976b6 227 FALSE), /* pcrel_offset */
5bd4f169
AM
228
229 /* Bits 16-31 of an address, plus 1 if the contents of the low 16
230 bits, treated as a signed number, is negative. */
231 HOWTO (R_PPC64_ADDR16_HA, /* type */
232 16, /* rightshift */
233 1, /* size (0 = byte, 1 = short, 2 = long) */
234 16, /* bitsize */
b34976b6 235 FALSE, /* pc_relative */
5bd4f169
AM
236 0, /* bitpos */
237 complain_overflow_dont, /* complain_on_overflow */
805fc799 238 ppc64_elf_ha_reloc, /* special_function */
5bd4f169 239 "R_PPC64_ADDR16_HA", /* name */
b34976b6 240 FALSE, /* partial_inplace */
5bd4f169
AM
241 0, /* src_mask */
242 0xffff, /* dst_mask */
b34976b6 243 FALSE), /* pcrel_offset */
5bd4f169
AM
244
245 /* An absolute 16 bit branch; the lower two bits must be zero.
246 FIXME: we don't check that, we just clear them. */
247 HOWTO (R_PPC64_ADDR14, /* type */
248 0, /* rightshift */
249 2, /* size (0 = byte, 1 = short, 2 = long) */
250 16, /* bitsize */
b34976b6 251 FALSE, /* pc_relative */
5bd4f169
AM
252 0, /* bitpos */
253 complain_overflow_bitfield, /* complain_on_overflow */
254 bfd_elf_generic_reloc, /* special_function */
255 "R_PPC64_ADDR14", /* name */
b34976b6 256 FALSE, /* partial_inplace */
d006db6c 257 0, /* src_mask */
f5e87a1d 258 0x0000fffc, /* dst_mask */
b34976b6 259 FALSE), /* pcrel_offset */
5bd4f169
AM
260
261 /* An absolute 16 bit branch, for which bit 10 should be set to
262 indicate that the branch is expected to be taken. The lower two
263 bits must be zero. */
264 HOWTO (R_PPC64_ADDR14_BRTAKEN, /* type */
265 0, /* rightshift */
266 2, /* size (0 = byte, 1 = short, 2 = long) */
267 16, /* bitsize */
b34976b6 268 FALSE, /* pc_relative */
5bd4f169
AM
269 0, /* bitpos */
270 complain_overflow_bitfield, /* complain_on_overflow */
805fc799 271 ppc64_elf_brtaken_reloc, /* special_function */
5bd4f169 272 "R_PPC64_ADDR14_BRTAKEN",/* name */
b34976b6 273 FALSE, /* partial_inplace */
d006db6c 274 0, /* src_mask */
f5e87a1d 275 0x0000fffc, /* dst_mask */
b34976b6 276 FALSE), /* pcrel_offset */
5bd4f169
AM
277
278 /* An absolute 16 bit branch, for which bit 10 should be set to
279 indicate that the branch is not expected to be taken. The lower
280 two bits must be zero. */
281 HOWTO (R_PPC64_ADDR14_BRNTAKEN, /* type */
282 0, /* rightshift */
283 2, /* size (0 = byte, 1 = short, 2 = long) */
284 16, /* bitsize */
b34976b6 285 FALSE, /* pc_relative */
5bd4f169
AM
286 0, /* bitpos */
287 complain_overflow_bitfield, /* complain_on_overflow */
805fc799 288 ppc64_elf_brtaken_reloc, /* special_function */
5bd4f169 289 "R_PPC64_ADDR14_BRNTAKEN",/* name */
b34976b6 290 FALSE, /* partial_inplace */
d006db6c 291 0, /* src_mask */
f5e87a1d 292 0x0000fffc, /* dst_mask */
b34976b6 293 FALSE), /* pcrel_offset */
5bd4f169
AM
294
295 /* A relative 26 bit branch; the lower two bits must be zero. */
296 HOWTO (R_PPC64_REL24, /* type */
297 0, /* rightshift */
298 2, /* size (0 = byte, 1 = short, 2 = long) */
299 26, /* bitsize */
b34976b6 300 TRUE, /* pc_relative */
5bd4f169
AM
301 0, /* bitpos */
302 complain_overflow_signed, /* complain_on_overflow */
303 bfd_elf_generic_reloc, /* special_function */
304 "R_PPC64_REL24", /* name */
b34976b6 305 FALSE, /* partial_inplace */
d006db6c 306 0, /* src_mask */
f5e87a1d 307 0x03fffffc, /* dst_mask */
b34976b6 308 TRUE), /* pcrel_offset */
5bd4f169
AM
309
310 /* A relative 16 bit branch; the lower two bits must be zero. */
311 HOWTO (R_PPC64_REL14, /* type */
312 0, /* rightshift */
313 2, /* size (0 = byte, 1 = short, 2 = long) */
314 16, /* bitsize */
b34976b6 315 TRUE, /* pc_relative */
5bd4f169
AM
316 0, /* bitpos */
317 complain_overflow_signed, /* complain_on_overflow */
318 bfd_elf_generic_reloc, /* special_function */
319 "R_PPC64_REL14", /* name */
b34976b6 320 FALSE, /* partial_inplace */
d006db6c 321 0, /* src_mask */
f5e87a1d 322 0x0000fffc, /* dst_mask */
b34976b6 323 TRUE), /* pcrel_offset */
5bd4f169
AM
324
325 /* A relative 16 bit branch. Bit 10 should be set to indicate that
326 the branch is expected to be taken. The lower two bits must be
327 zero. */
328 HOWTO (R_PPC64_REL14_BRTAKEN, /* type */
329 0, /* rightshift */
330 2, /* size (0 = byte, 1 = short, 2 = long) */
331 16, /* bitsize */
b34976b6 332 TRUE, /* pc_relative */
5bd4f169
AM
333 0, /* bitpos */
334 complain_overflow_signed, /* complain_on_overflow */
805fc799 335 ppc64_elf_brtaken_reloc, /* special_function */
5bd4f169 336 "R_PPC64_REL14_BRTAKEN", /* name */
b34976b6 337 FALSE, /* partial_inplace */
d006db6c 338 0, /* src_mask */
f5e87a1d 339 0x0000fffc, /* dst_mask */
b34976b6 340 TRUE), /* pcrel_offset */
5bd4f169
AM
341
342 /* A relative 16 bit branch. Bit 10 should be set to indicate that
343 the branch is not expected to be taken. The lower two bits must
344 be zero. */
345 HOWTO (R_PPC64_REL14_BRNTAKEN, /* type */
346 0, /* rightshift */
347 2, /* size (0 = byte, 1 = short, 2 = long) */
348 16, /* bitsize */
b34976b6 349 TRUE, /* pc_relative */
5bd4f169
AM
350 0, /* bitpos */
351 complain_overflow_signed, /* complain_on_overflow */
805fc799 352 ppc64_elf_brtaken_reloc, /* special_function */
5bd4f169 353 "R_PPC64_REL14_BRNTAKEN",/* name */
b34976b6 354 FALSE, /* partial_inplace */
d006db6c 355 0, /* src_mask */
f5e87a1d 356 0x0000fffc, /* dst_mask */
b34976b6 357 TRUE), /* pcrel_offset */
5bd4f169
AM
358
359 /* Like R_PPC64_ADDR16, but referring to the GOT table entry for the
360 symbol. */
361 HOWTO (R_PPC64_GOT16, /* type */
362 0, /* rightshift */
363 1, /* size (0 = byte, 1 = short, 2 = long) */
364 16, /* bitsize */
b34976b6 365 FALSE, /* pc_relative */
5bd4f169
AM
366 0, /* bitpos */
367 complain_overflow_signed, /* complain_on_overflow */
805fc799 368 ppc64_elf_unhandled_reloc, /* special_function */
5bd4f169 369 "R_PPC64_GOT16", /* name */
b34976b6 370 FALSE, /* partial_inplace */
5bd4f169
AM
371 0, /* src_mask */
372 0xffff, /* dst_mask */
b34976b6 373 FALSE), /* pcrel_offset */
5bd4f169
AM
374
375 /* Like R_PPC64_ADDR16_LO, but referring to the GOT table entry for
376 the symbol. */
377 HOWTO (R_PPC64_GOT16_LO, /* type */
378 0, /* rightshift */
379 1, /* size (0 = byte, 1 = short, 2 = long) */
380 16, /* bitsize */
b34976b6 381 FALSE, /* pc_relative */
5bd4f169
AM
382 0, /* bitpos */
383 complain_overflow_dont, /* complain_on_overflow */
805fc799 384 ppc64_elf_unhandled_reloc, /* special_function */
5bd4f169 385 "R_PPC64_GOT16_LO", /* name */
b34976b6 386 FALSE, /* partial_inplace */
5bd4f169
AM
387 0, /* src_mask */
388 0xffff, /* dst_mask */
b34976b6 389 FALSE), /* pcrel_offset */
5bd4f169
AM
390
391 /* Like R_PPC64_ADDR16_HI, but referring to the GOT table entry for
392 the symbol. */
393 HOWTO (R_PPC64_GOT16_HI, /* type */
394 16, /* rightshift */
395 1, /* size (0 = byte, 1 = short, 2 = long) */
396 16, /* bitsize */
b34976b6 397 FALSE, /* pc_relative */
5bd4f169
AM
398 0, /* bitpos */
399 complain_overflow_dont,/* complain_on_overflow */
805fc799 400 ppc64_elf_unhandled_reloc, /* special_function */
5bd4f169 401 "R_PPC64_GOT16_HI", /* name */
b34976b6 402 FALSE, /* partial_inplace */
5bd4f169
AM
403 0, /* src_mask */
404 0xffff, /* dst_mask */
b34976b6 405 FALSE), /* pcrel_offset */
5bd4f169
AM
406
407 /* Like R_PPC64_ADDR16_HA, but referring to the GOT table entry for
408 the symbol. */
409 HOWTO (R_PPC64_GOT16_HA, /* type */
410 16, /* rightshift */
411 1, /* size (0 = byte, 1 = short, 2 = long) */
412 16, /* bitsize */
b34976b6 413 FALSE, /* pc_relative */
5bd4f169
AM
414 0, /* bitpos */
415 complain_overflow_dont,/* complain_on_overflow */
805fc799 416 ppc64_elf_unhandled_reloc, /* special_function */
5bd4f169 417 "R_PPC64_GOT16_HA", /* name */
b34976b6 418 FALSE, /* partial_inplace */
5bd4f169
AM
419 0, /* src_mask */
420 0xffff, /* dst_mask */
b34976b6 421 FALSE), /* pcrel_offset */
5bd4f169
AM
422
423 /* This is used only by the dynamic linker. The symbol should exist
424 both in the object being run and in some shared library. The
425 dynamic linker copies the data addressed by the symbol from the
426 shared library into the object, because the object being
427 run has to have the data at some particular address. */
428 HOWTO (R_PPC64_COPY, /* type */
429 0, /* rightshift */
f5e87a1d
AM
430 0, /* this one is variable size */
431 0, /* bitsize */
b34976b6 432 FALSE, /* pc_relative */
5bd4f169 433 0, /* bitpos */
f5e87a1d
AM
434 complain_overflow_dont, /* complain_on_overflow */
435 ppc64_elf_unhandled_reloc, /* special_function */
5bd4f169 436 "R_PPC64_COPY", /* name */
b34976b6 437 FALSE, /* partial_inplace */
5bd4f169
AM
438 0, /* src_mask */
439 0, /* dst_mask */
b34976b6 440 FALSE), /* pcrel_offset */
5bd4f169
AM
441
442 /* Like R_PPC64_ADDR64, but used when setting global offset table
443 entries. */
444 HOWTO (R_PPC64_GLOB_DAT, /* type */
445 0, /* rightshift */
446 4, /* size (0=byte, 1=short, 2=long, 4=64 bits) */
447 64, /* bitsize */
b34976b6 448 FALSE, /* pc_relative */
5bd4f169
AM
449 0, /* bitpos */
450 complain_overflow_dont, /* complain_on_overflow */
805fc799 451 ppc64_elf_unhandled_reloc, /* special_function */
5bd4f169 452 "R_PPC64_GLOB_DAT", /* name */
b34976b6 453 FALSE, /* partial_inplace */
5bd4f169 454 0, /* src_mask */
f5e87a1d 455 ONES (64), /* dst_mask */
b34976b6 456 FALSE), /* pcrel_offset */
5bd4f169
AM
457
458 /* Created by the link editor. Marks a procedure linkage table
459 entry for a symbol. */
460 HOWTO (R_PPC64_JMP_SLOT, /* type */
461 0, /* rightshift */
462 0, /* size (0 = byte, 1 = short, 2 = long) */
463 0, /* bitsize */
b34976b6 464 FALSE, /* pc_relative */
5bd4f169
AM
465 0, /* bitpos */
466 complain_overflow_dont, /* complain_on_overflow */
805fc799 467 ppc64_elf_unhandled_reloc, /* special_function */
5bd4f169 468 "R_PPC64_JMP_SLOT", /* name */
b34976b6 469 FALSE, /* partial_inplace */
5bd4f169
AM
470 0, /* src_mask */
471 0, /* dst_mask */
b34976b6 472 FALSE), /* pcrel_offset */
5bd4f169
AM
473
474 /* Used only by the dynamic linker. When the object is run, this
475 doubleword64 is set to the load address of the object, plus the
476 addend. */
477 HOWTO (R_PPC64_RELATIVE, /* type */
478 0, /* rightshift */
479 4, /* size (0=byte, 1=short, 2=long, 4=64 bits) */
480 64, /* bitsize */
b34976b6 481 FALSE, /* pc_relative */
5bd4f169
AM
482 0, /* bitpos */
483 complain_overflow_dont, /* complain_on_overflow */
484 bfd_elf_generic_reloc, /* special_function */
485 "R_PPC64_RELATIVE", /* name */
b34976b6 486 FALSE, /* partial_inplace */
5bd4f169 487 0, /* src_mask */
f5e87a1d 488 ONES (64), /* dst_mask */
b34976b6 489 FALSE), /* pcrel_offset */
5bd4f169
AM
490
491 /* Like R_PPC64_ADDR32, but may be unaligned. */
492 HOWTO (R_PPC64_UADDR32, /* type */
493 0, /* rightshift */
494 2, /* size (0 = byte, 1 = short, 2 = long) */
495 32, /* bitsize */
b34976b6 496 FALSE, /* pc_relative */
5bd4f169
AM
497 0, /* bitpos */
498 complain_overflow_bitfield, /* complain_on_overflow */
499 bfd_elf_generic_reloc, /* special_function */
500 "R_PPC64_UADDR32", /* name */
b34976b6 501 FALSE, /* partial_inplace */
5bd4f169
AM
502 0, /* src_mask */
503 0xffffffff, /* dst_mask */
b34976b6 504 FALSE), /* pcrel_offset */
5bd4f169
AM
505
506 /* Like R_PPC64_ADDR16, but may be unaligned. */
507 HOWTO (R_PPC64_UADDR16, /* type */
508 0, /* rightshift */
509 1, /* size (0 = byte, 1 = short, 2 = long) */
510 16, /* bitsize */
b34976b6 511 FALSE, /* pc_relative */
5bd4f169
AM
512 0, /* bitpos */
513 complain_overflow_bitfield, /* complain_on_overflow */
514 bfd_elf_generic_reloc, /* special_function */
515 "R_PPC64_UADDR16", /* name */
b34976b6 516 FALSE, /* partial_inplace */
5bd4f169
AM
517 0, /* src_mask */
518 0xffff, /* dst_mask */
b34976b6 519 FALSE), /* pcrel_offset */
5bd4f169
AM
520
521 /* 32-bit PC relative. */
522 HOWTO (R_PPC64_REL32, /* type */
523 0, /* rightshift */
524 2, /* size (0 = byte, 1 = short, 2 = long) */
525 32, /* bitsize */
b34976b6 526 TRUE, /* pc_relative */
5bd4f169 527 0, /* bitpos */
cedb70c5 528 /* FIXME: Verify. Was complain_overflow_bitfield. */
5bd4f169
AM
529 complain_overflow_signed, /* complain_on_overflow */
530 bfd_elf_generic_reloc, /* special_function */
531 "R_PPC64_REL32", /* name */
b34976b6 532 FALSE, /* partial_inplace */
5bd4f169
AM
533 0, /* src_mask */
534 0xffffffff, /* dst_mask */
b34976b6 535 TRUE), /* pcrel_offset */
5bd4f169 536
10ed1bba 537 /* 32-bit relocation to the symbol's procedure linkage table. */
5bd4f169
AM
538 HOWTO (R_PPC64_PLT32, /* type */
539 0, /* rightshift */
540 2, /* size (0 = byte, 1 = short, 2 = long) */
541 32, /* bitsize */
b34976b6 542 FALSE, /* pc_relative */
5bd4f169
AM
543 0, /* bitpos */
544 complain_overflow_bitfield, /* complain_on_overflow */
805fc799 545 ppc64_elf_unhandled_reloc, /* special_function */
5bd4f169 546 "R_PPC64_PLT32", /* name */
b34976b6 547 FALSE, /* partial_inplace */
5bd4f169 548 0, /* src_mask */
f5e87a1d 549 0xffffffff, /* dst_mask */
b34976b6 550 FALSE), /* pcrel_offset */
5bd4f169
AM
551
552 /* 32-bit PC relative relocation to the symbol's procedure linkage table.
553 FIXME: R_PPC64_PLTREL32 not supported. */
554 HOWTO (R_PPC64_PLTREL32, /* type */
555 0, /* rightshift */
556 2, /* size (0 = byte, 1 = short, 2 = long) */
557 32, /* bitsize */
b34976b6 558 TRUE, /* pc_relative */
5bd4f169
AM
559 0, /* bitpos */
560 complain_overflow_signed, /* complain_on_overflow */
561 bfd_elf_generic_reloc, /* special_function */
562 "R_PPC64_PLTREL32", /* name */
b34976b6 563 FALSE, /* partial_inplace */
5bd4f169 564 0, /* src_mask */
f5e87a1d 565 0xffffffff, /* dst_mask */
b34976b6 566 TRUE), /* pcrel_offset */
5bd4f169
AM
567
568 /* Like R_PPC64_ADDR16_LO, but referring to the PLT table entry for
569 the symbol. */
570 HOWTO (R_PPC64_PLT16_LO, /* type */
571 0, /* rightshift */
572 1, /* size (0 = byte, 1 = short, 2 = long) */
573 16, /* bitsize */
b34976b6 574 FALSE, /* pc_relative */
5bd4f169
AM
575 0, /* bitpos */
576 complain_overflow_dont, /* complain_on_overflow */
805fc799 577 ppc64_elf_unhandled_reloc, /* special_function */
5bd4f169 578 "R_PPC64_PLT16_LO", /* name */
b34976b6 579 FALSE, /* partial_inplace */
5bd4f169
AM
580 0, /* src_mask */
581 0xffff, /* dst_mask */
b34976b6 582 FALSE), /* pcrel_offset */
5bd4f169
AM
583
584 /* Like R_PPC64_ADDR16_HI, but referring to the PLT table entry for
585 the symbol. */
586 HOWTO (R_PPC64_PLT16_HI, /* type */
587 16, /* rightshift */
588 1, /* size (0 = byte, 1 = short, 2 = long) */
589 16, /* bitsize */
b34976b6 590 FALSE, /* pc_relative */
5bd4f169
AM
591 0, /* bitpos */
592 complain_overflow_dont, /* complain_on_overflow */
805fc799 593 ppc64_elf_unhandled_reloc, /* special_function */
5bd4f169 594 "R_PPC64_PLT16_HI", /* name */
b34976b6 595 FALSE, /* partial_inplace */
5bd4f169
AM
596 0, /* src_mask */
597 0xffff, /* dst_mask */
b34976b6 598 FALSE), /* pcrel_offset */
5bd4f169
AM
599
600 /* Like R_PPC64_ADDR16_HA, but referring to the PLT table entry for
601 the symbol. */
602 HOWTO (R_PPC64_PLT16_HA, /* type */
603 16, /* rightshift */
604 1, /* size (0 = byte, 1 = short, 2 = long) */
605 16, /* bitsize */
b34976b6 606 FALSE, /* pc_relative */
5bd4f169
AM
607 0, /* bitpos */
608 complain_overflow_dont, /* complain_on_overflow */
805fc799 609 ppc64_elf_unhandled_reloc, /* special_function */
5bd4f169 610 "R_PPC64_PLT16_HA", /* name */
b34976b6 611 FALSE, /* partial_inplace */
5bd4f169
AM
612 0, /* src_mask */
613 0xffff, /* dst_mask */
b34976b6 614 FALSE), /* pcrel_offset */
5bd4f169 615
c061c2d8 616 /* 16-bit section relative relocation. */
5bd4f169
AM
617 HOWTO (R_PPC64_SECTOFF, /* type */
618 0, /* rightshift */
c061c2d8
AM
619 1, /* size (0 = byte, 1 = short, 2 = long) */
620 16, /* bitsize */
b34976b6 621 FALSE, /* pc_relative */
5bd4f169
AM
622 0, /* bitpos */
623 complain_overflow_bitfield, /* complain_on_overflow */
805fc799 624 ppc64_elf_sectoff_reloc, /* special_function */
5bd4f169 625 "R_PPC64_SECTOFF", /* name */
b34976b6 626 FALSE, /* partial_inplace */
5bd4f169 627 0, /* src_mask */
c061c2d8 628 0xffff, /* dst_mask */
b34976b6 629 FALSE), /* pcrel_offset */
5bd4f169 630
c061c2d8 631 /* Like R_PPC64_SECTOFF, but no overflow warning. */
5bd4f169
AM
632 HOWTO (R_PPC64_SECTOFF_LO, /* type */
633 0, /* rightshift */
634 1, /* size (0 = byte, 1 = short, 2 = long) */
635 16, /* bitsize */
b34976b6 636 FALSE, /* pc_relative */
5bd4f169
AM
637 0, /* bitpos */
638 complain_overflow_dont, /* complain_on_overflow */
805fc799 639 ppc64_elf_sectoff_reloc, /* special_function */
5bd4f169 640 "R_PPC64_SECTOFF_LO", /* name */
b34976b6 641 FALSE, /* partial_inplace */
5bd4f169
AM
642 0, /* src_mask */
643 0xffff, /* dst_mask */
b34976b6 644 FALSE), /* pcrel_offset */
5bd4f169
AM
645
646 /* 16-bit upper half section relative relocation. */
647 HOWTO (R_PPC64_SECTOFF_HI, /* type */
648 16, /* rightshift */
649 1, /* size (0 = byte, 1 = short, 2 = long) */
650 16, /* bitsize */
b34976b6 651 FALSE, /* pc_relative */
5bd4f169
AM
652 0, /* bitpos */
653 complain_overflow_dont, /* complain_on_overflow */
805fc799 654 ppc64_elf_sectoff_reloc, /* special_function */
5bd4f169 655 "R_PPC64_SECTOFF_HI", /* name */
b34976b6 656 FALSE, /* partial_inplace */
5bd4f169
AM
657 0, /* src_mask */
658 0xffff, /* dst_mask */
b34976b6 659 FALSE), /* pcrel_offset */
5bd4f169
AM
660
661 /* 16-bit upper half adjusted section relative relocation. */
662 HOWTO (R_PPC64_SECTOFF_HA, /* type */
663 16, /* rightshift */
664 1, /* size (0 = byte, 1 = short, 2 = long) */
665 16, /* bitsize */
b34976b6 666 FALSE, /* pc_relative */
5bd4f169
AM
667 0, /* bitpos */
668 complain_overflow_dont, /* complain_on_overflow */
805fc799 669 ppc64_elf_sectoff_ha_reloc, /* special_function */
5bd4f169 670 "R_PPC64_SECTOFF_HA", /* name */
b34976b6 671 FALSE, /* partial_inplace */
5bd4f169
AM
672 0, /* src_mask */
673 0xffff, /* dst_mask */
b34976b6 674 FALSE), /* pcrel_offset */
5bd4f169 675
04c9666a
AM
676 /* Like R_PPC64_REL24 without touching the two least significant bits. */
677 HOWTO (R_PPC64_REL30, /* type */
5bd4f169
AM
678 2, /* rightshift */
679 2, /* size (0 = byte, 1 = short, 2 = long) */
680 30, /* bitsize */
b34976b6 681 TRUE, /* pc_relative */
5bd4f169
AM
682 0, /* bitpos */
683 complain_overflow_dont, /* complain_on_overflow */
684 bfd_elf_generic_reloc, /* special_function */
04c9666a 685 "R_PPC64_REL30", /* name */
b34976b6 686 FALSE, /* partial_inplace */
d006db6c 687 0, /* src_mask */
5bd4f169 688 0xfffffffc, /* dst_mask */
b34976b6 689 TRUE), /* pcrel_offset */
5bd4f169
AM
690
691 /* Relocs in the 64-bit PowerPC ELF ABI, not in the 32-bit ABI. */
692
693 /* A standard 64-bit relocation. */
694 HOWTO (R_PPC64_ADDR64, /* type */
695 0, /* rightshift */
696 4, /* size (0=byte, 1=short, 2=long, 4=64 bits) */
697 64, /* bitsize */
b34976b6 698 FALSE, /* pc_relative */
5bd4f169
AM
699 0, /* bitpos */
700 complain_overflow_dont, /* complain_on_overflow */
701 bfd_elf_generic_reloc, /* special_function */
702 "R_PPC64_ADDR64", /* name */
b34976b6 703 FALSE, /* partial_inplace */
5bd4f169 704 0, /* src_mask */
f5e87a1d 705 ONES (64), /* dst_mask */
b34976b6 706 FALSE), /* pcrel_offset */
5bd4f169
AM
707
708 /* The bits 32-47 of an address. */
709 HOWTO (R_PPC64_ADDR16_HIGHER, /* type */
710 32, /* rightshift */
711 1, /* size (0 = byte, 1 = short, 2 = long) */
712 16, /* bitsize */
b34976b6 713 FALSE, /* pc_relative */
5bd4f169
AM
714 0, /* bitpos */
715 complain_overflow_dont, /* complain_on_overflow */
716 bfd_elf_generic_reloc, /* special_function */
717 "R_PPC64_ADDR16_HIGHER", /* name */
b34976b6 718 FALSE, /* partial_inplace */
5bd4f169
AM
719 0, /* src_mask */
720 0xffff, /* dst_mask */
b34976b6 721 FALSE), /* pcrel_offset */
5bd4f169
AM
722
723 /* The bits 32-47 of an address, plus 1 if the contents of the low
724 16 bits, treated as a signed number, is negative. */
725 HOWTO (R_PPC64_ADDR16_HIGHERA, /* type */
726 32, /* rightshift */
727 1, /* size (0 = byte, 1 = short, 2 = long) */
728 16, /* bitsize */
b34976b6 729 FALSE, /* pc_relative */
5bd4f169
AM
730 0, /* bitpos */
731 complain_overflow_dont, /* complain_on_overflow */
805fc799 732 ppc64_elf_ha_reloc, /* special_function */
5bd4f169 733 "R_PPC64_ADDR16_HIGHERA", /* name */
b34976b6 734 FALSE, /* partial_inplace */
5bd4f169
AM
735 0, /* src_mask */
736 0xffff, /* dst_mask */
b34976b6 737 FALSE), /* pcrel_offset */
5bd4f169
AM
738
739 /* The bits 48-63 of an address. */
740 HOWTO (R_PPC64_ADDR16_HIGHEST,/* type */
741 48, /* rightshift */
742 1, /* size (0 = byte, 1 = short, 2 = long) */
743 16, /* bitsize */
b34976b6 744 FALSE, /* pc_relative */
5bd4f169
AM
745 0, /* bitpos */
746 complain_overflow_dont, /* complain_on_overflow */
747 bfd_elf_generic_reloc, /* special_function */
748 "R_PPC64_ADDR16_HIGHEST", /* name */
b34976b6 749 FALSE, /* partial_inplace */
5bd4f169
AM
750 0, /* src_mask */
751 0xffff, /* dst_mask */
b34976b6 752 FALSE), /* pcrel_offset */
5bd4f169
AM
753
754 /* The bits 48-63 of an address, plus 1 if the contents of the low
755 16 bits, treated as a signed number, is negative. */
756 HOWTO (R_PPC64_ADDR16_HIGHESTA,/* type */
757 48, /* rightshift */
758 1, /* size (0 = byte, 1 = short, 2 = long) */
759 16, /* bitsize */
b34976b6 760 FALSE, /* pc_relative */
5bd4f169
AM
761 0, /* bitpos */
762 complain_overflow_dont, /* complain_on_overflow */
805fc799 763 ppc64_elf_ha_reloc, /* special_function */
5bd4f169 764 "R_PPC64_ADDR16_HIGHESTA", /* name */
b34976b6 765 FALSE, /* partial_inplace */
5bd4f169
AM
766 0, /* src_mask */
767 0xffff, /* dst_mask */
b34976b6 768 FALSE), /* pcrel_offset */
5bd4f169
AM
769
770 /* Like ADDR64, but may be unaligned. */
771 HOWTO (R_PPC64_UADDR64, /* type */
772 0, /* rightshift */
773 4, /* size (0=byte, 1=short, 2=long, 4=64 bits) */
774 64, /* bitsize */
b34976b6 775 FALSE, /* pc_relative */
5bd4f169
AM
776 0, /* bitpos */
777 complain_overflow_dont, /* complain_on_overflow */
778 bfd_elf_generic_reloc, /* special_function */
779 "R_PPC64_UADDR64", /* name */
b34976b6 780 FALSE, /* partial_inplace */
5bd4f169 781 0, /* src_mask */
f5e87a1d 782 ONES (64), /* dst_mask */
b34976b6 783 FALSE), /* pcrel_offset */
5bd4f169
AM
784
785 /* 64-bit relative relocation. */
786 HOWTO (R_PPC64_REL64, /* type */
787 0, /* rightshift */
788 4, /* size (0=byte, 1=short, 2=long, 4=64 bits) */
789 64, /* bitsize */
b34976b6 790 TRUE, /* pc_relative */
5bd4f169
AM
791 0, /* bitpos */
792 complain_overflow_dont, /* complain_on_overflow */
793 bfd_elf_generic_reloc, /* special_function */
794 "R_PPC64_REL64", /* name */
b34976b6 795 FALSE, /* partial_inplace */
5bd4f169 796 0, /* src_mask */
f5e87a1d 797 ONES (64), /* dst_mask */
b34976b6 798 TRUE), /* pcrel_offset */
5bd4f169 799
cedb70c5 800 /* 64-bit relocation to the symbol's procedure linkage table. */
5bd4f169
AM
801 HOWTO (R_PPC64_PLT64, /* type */
802 0, /* rightshift */
803 4, /* size (0=byte, 1=short, 2=long, 4=64 bits) */
804 64, /* bitsize */
b34976b6 805 FALSE, /* pc_relative */
5bd4f169
AM
806 0, /* bitpos */
807 complain_overflow_dont, /* complain_on_overflow */
805fc799 808 ppc64_elf_unhandled_reloc, /* special_function */
5bd4f169 809 "R_PPC64_PLT64", /* name */
b34976b6 810 FALSE, /* partial_inplace */
5bd4f169 811 0, /* src_mask */
f5e87a1d 812 ONES (64), /* dst_mask */
b34976b6 813 FALSE), /* pcrel_offset */
5bd4f169
AM
814
815 /* 64-bit PC relative relocation to the symbol's procedure linkage
816 table. */
817 /* FIXME: R_PPC64_PLTREL64 not supported. */
818 HOWTO (R_PPC64_PLTREL64, /* type */
819 0, /* rightshift */
820 4, /* size (0=byte, 1=short, 2=long, 4=64 bits) */
821 64, /* bitsize */
b34976b6 822 TRUE, /* pc_relative */
5bd4f169
AM
823 0, /* bitpos */
824 complain_overflow_dont, /* complain_on_overflow */
805fc799 825 ppc64_elf_unhandled_reloc, /* special_function */
5bd4f169 826 "R_PPC64_PLTREL64", /* name */
b34976b6 827 FALSE, /* partial_inplace */
5bd4f169 828 0, /* src_mask */
f5e87a1d 829 ONES (64), /* dst_mask */
b34976b6 830 TRUE), /* pcrel_offset */
5bd4f169
AM
831
832 /* 16 bit TOC-relative relocation. */
833
834 /* R_PPC64_TOC16 47 half16* S + A - .TOC. */
835 HOWTO (R_PPC64_TOC16, /* type */
836 0, /* rightshift */
837 1, /* size (0 = byte, 1 = short, 2 = long) */
838 16, /* bitsize */
b34976b6 839 FALSE, /* pc_relative */
5bd4f169
AM
840 0, /* bitpos */
841 complain_overflow_signed, /* complain_on_overflow */
805fc799 842 ppc64_elf_toc_reloc, /* special_function */
5bd4f169 843 "R_PPC64_TOC16", /* name */
b34976b6 844 FALSE, /* partial_inplace */
5bd4f169
AM
845 0, /* src_mask */
846 0xffff, /* dst_mask */
b34976b6 847 FALSE), /* pcrel_offset */
5bd4f169
AM
848
849 /* 16 bit TOC-relative relocation without overflow. */
850
851 /* R_PPC64_TOC16_LO 48 half16 #lo (S + A - .TOC.) */
852 HOWTO (R_PPC64_TOC16_LO, /* type */
853 0, /* rightshift */
854 1, /* size (0 = byte, 1 = short, 2 = long) */
855 16, /* bitsize */
b34976b6 856 FALSE, /* pc_relative */
5bd4f169
AM
857 0, /* bitpos */
858 complain_overflow_dont, /* complain_on_overflow */
805fc799 859 ppc64_elf_toc_reloc, /* special_function */
5bd4f169 860 "R_PPC64_TOC16_LO", /* name */
b34976b6 861 FALSE, /* partial_inplace */
5bd4f169
AM
862 0, /* src_mask */
863 0xffff, /* dst_mask */
b34976b6 864 FALSE), /* pcrel_offset */
5bd4f169
AM
865
866 /* 16 bit TOC-relative relocation, high 16 bits. */
867
868 /* R_PPC64_TOC16_HI 49 half16 #hi (S + A - .TOC.) */
869 HOWTO (R_PPC64_TOC16_HI, /* type */
870 16, /* rightshift */
871 1, /* size (0 = byte, 1 = short, 2 = long) */
872 16, /* bitsize */
b34976b6 873 FALSE, /* pc_relative */
5bd4f169
AM
874 0, /* bitpos */
875 complain_overflow_dont, /* complain_on_overflow */
805fc799 876 ppc64_elf_toc_reloc, /* special_function */
5bd4f169 877 "R_PPC64_TOC16_HI", /* name */
b34976b6 878 FALSE, /* partial_inplace */
5bd4f169
AM
879 0, /* src_mask */
880 0xffff, /* dst_mask */
b34976b6 881 FALSE), /* pcrel_offset */
5bd4f169
AM
882
883 /* 16 bit TOC-relative relocation, high 16 bits, plus 1 if the
884 contents of the low 16 bits, treated as a signed number, is
885 negative. */
886
887 /* R_PPC64_TOC16_HA 50 half16 #ha (S + A - .TOC.) */
888 HOWTO (R_PPC64_TOC16_HA, /* type */
889 16, /* rightshift */
890 1, /* size (0 = byte, 1 = short, 2 = long) */
891 16, /* bitsize */
b34976b6 892 FALSE, /* pc_relative */
5bd4f169
AM
893 0, /* bitpos */
894 complain_overflow_dont, /* complain_on_overflow */
805fc799 895 ppc64_elf_toc_ha_reloc, /* special_function */
5bd4f169 896 "R_PPC64_TOC16_HA", /* name */
b34976b6 897 FALSE, /* partial_inplace */
5bd4f169
AM
898 0, /* src_mask */
899 0xffff, /* dst_mask */
b34976b6 900 FALSE), /* pcrel_offset */
5bd4f169
AM
901
902 /* 64-bit relocation; insert value of TOC base (.TOC.). */
903
904 /* R_PPC64_TOC 51 doubleword64 .TOC. */
905 HOWTO (R_PPC64_TOC, /* type */
906 0, /* rightshift */
907 4, /* size (0=byte, 1=short, 2=long, 4=64 bits) */
908 64, /* bitsize */
b34976b6 909 FALSE, /* pc_relative */
5bd4f169
AM
910 0, /* bitpos */
911 complain_overflow_bitfield, /* complain_on_overflow */
805fc799 912 ppc64_elf_toc64_reloc, /* special_function */
5bd4f169 913 "R_PPC64_TOC", /* name */
b34976b6 914 FALSE, /* partial_inplace */
5bd4f169 915 0, /* src_mask */
f5e87a1d 916 ONES (64), /* dst_mask */
b34976b6 917 FALSE), /* pcrel_offset */
5bd4f169
AM
918
919 /* Like R_PPC64_GOT16, but also informs the link editor that the
920 value to relocate may (!) refer to a PLT entry which the link
921 editor (a) may replace with the symbol value. If the link editor
922 is unable to fully resolve the symbol, it may (b) create a PLT
923 entry and store the address to the new PLT entry in the GOT.
924 This permits lazy resolution of function symbols at run time.
925 The link editor may also skip all of this and just (c) emit a
926 R_PPC64_GLOB_DAT to tie the symbol to the GOT entry. */
927 /* FIXME: R_PPC64_PLTGOT16 not implemented. */
928 HOWTO (R_PPC64_PLTGOT16, /* type */
929 0, /* rightshift */
930 1, /* size (0 = byte, 1 = short, 2 = long) */
931 16, /* bitsize */
b34976b6 932 FALSE, /* pc_relative */
5bd4f169
AM
933 0, /* bitpos */
934 complain_overflow_signed, /* complain_on_overflow */
805fc799 935 ppc64_elf_unhandled_reloc, /* special_function */
411e1bfb
AM
936 "R_PPC64_PLTGOT16", /* name */
937 FALSE, /* partial_inplace */
938 0, /* src_mask */
939 0xffff, /* dst_mask */
940 FALSE), /* pcrel_offset */
941
942 /* Like R_PPC64_PLTGOT16, but without overflow. */
943 /* FIXME: R_PPC64_PLTGOT16_LO not implemented. */
944 HOWTO (R_PPC64_PLTGOT16_LO, /* type */
945 0, /* rightshift */
946 1, /* size (0 = byte, 1 = short, 2 = long) */
947 16, /* bitsize */
948 FALSE, /* pc_relative */
949 0, /* bitpos */
950 complain_overflow_dont, /* complain_on_overflow */
951 ppc64_elf_unhandled_reloc, /* special_function */
952 "R_PPC64_PLTGOT16_LO", /* name */
953 FALSE, /* partial_inplace */
954 0, /* src_mask */
955 0xffff, /* dst_mask */
956 FALSE), /* pcrel_offset */
957
958 /* Like R_PPC64_PLT_GOT16, but using bits 16-31 of the address. */
959 /* FIXME: R_PPC64_PLTGOT16_HI not implemented. */
960 HOWTO (R_PPC64_PLTGOT16_HI, /* type */
961 16, /* rightshift */
962 1, /* size (0 = byte, 1 = short, 2 = long) */
963 16, /* bitsize */
964 FALSE, /* pc_relative */
965 0, /* bitpos */
966 complain_overflow_dont, /* complain_on_overflow */
967 ppc64_elf_unhandled_reloc, /* special_function */
968 "R_PPC64_PLTGOT16_HI", /* name */
969 FALSE, /* partial_inplace */
970 0, /* src_mask */
971 0xffff, /* dst_mask */
972 FALSE), /* pcrel_offset */
973
974 /* Like R_PPC64_PLT_GOT16, but using bits 16-31 of the address, plus
975 1 if the contents of the low 16 bits, treated as a signed number,
976 is negative. */
977 /* FIXME: R_PPC64_PLTGOT16_HA not implemented. */
978 HOWTO (R_PPC64_PLTGOT16_HA, /* type */
979 16, /* rightshift */
980 1, /* size (0 = byte, 1 = short, 2 = long) */
981 16, /* bitsize */
982 FALSE, /* pc_relative */
983 0, /* bitpos */
984 complain_overflow_dont,/* complain_on_overflow */
985 ppc64_elf_unhandled_reloc, /* special_function */
986 "R_PPC64_PLTGOT16_HA", /* name */
987 FALSE, /* partial_inplace */
988 0, /* src_mask */
989 0xffff, /* dst_mask */
990 FALSE), /* pcrel_offset */
991
992 /* Like R_PPC64_ADDR16, but for instructions with a DS field. */
993 HOWTO (R_PPC64_ADDR16_DS, /* type */
994 0, /* rightshift */
995 1, /* size (0 = byte, 1 = short, 2 = long) */
996 16, /* bitsize */
997 FALSE, /* pc_relative */
998 0, /* bitpos */
999 complain_overflow_bitfield, /* complain_on_overflow */
1000 bfd_elf_generic_reloc, /* special_function */
1001 "R_PPC64_ADDR16_DS", /* name */
1002 FALSE, /* partial_inplace */
1003 0, /* src_mask */
1004 0xfffc, /* dst_mask */
1005 FALSE), /* pcrel_offset */
1006
1007 /* Like R_PPC64_ADDR16_LO, but for instructions with a DS field. */
1008 HOWTO (R_PPC64_ADDR16_LO_DS, /* type */
1009 0, /* rightshift */
1010 1, /* size (0 = byte, 1 = short, 2 = long) */
1011 16, /* bitsize */
1012 FALSE, /* pc_relative */
1013 0, /* bitpos */
1014 complain_overflow_dont,/* complain_on_overflow */
1015 bfd_elf_generic_reloc, /* special_function */
1016 "R_PPC64_ADDR16_LO_DS",/* name */
1017 FALSE, /* partial_inplace */
1018 0, /* src_mask */
1019 0xfffc, /* dst_mask */
1020 FALSE), /* pcrel_offset */
1021
1022 /* Like R_PPC64_GOT16, but for instructions with a DS field. */
1023 HOWTO (R_PPC64_GOT16_DS, /* type */
1024 0, /* rightshift */
1025 1, /* size (0 = byte, 1 = short, 2 = long) */
1026 16, /* bitsize */
1027 FALSE, /* pc_relative */
1028 0, /* bitpos */
1029 complain_overflow_signed, /* complain_on_overflow */
1030 ppc64_elf_unhandled_reloc, /* special_function */
1031 "R_PPC64_GOT16_DS", /* name */
1032 FALSE, /* partial_inplace */
1033 0, /* src_mask */
1034 0xfffc, /* dst_mask */
1035 FALSE), /* pcrel_offset */
1036
1037 /* Like R_PPC64_GOT16_LO, but for instructions with a DS field. */
1038 HOWTO (R_PPC64_GOT16_LO_DS, /* type */
1039 0, /* rightshift */
1040 1, /* size (0 = byte, 1 = short, 2 = long) */
1041 16, /* bitsize */
1042 FALSE, /* pc_relative */
1043 0, /* bitpos */
1044 complain_overflow_dont, /* complain_on_overflow */
1045 ppc64_elf_unhandled_reloc, /* special_function */
1046 "R_PPC64_GOT16_LO_DS", /* name */
1047 FALSE, /* partial_inplace */
1048 0, /* src_mask */
1049 0xfffc, /* dst_mask */
1050 FALSE), /* pcrel_offset */
1051
1052 /* Like R_PPC64_PLT16_LO, but for instructions with a DS field. */
1053 HOWTO (R_PPC64_PLT16_LO_DS, /* type */
1054 0, /* rightshift */
1055 1, /* size (0 = byte, 1 = short, 2 = long) */
1056 16, /* bitsize */
1057 FALSE, /* pc_relative */
1058 0, /* bitpos */
1059 complain_overflow_dont, /* complain_on_overflow */
1060 ppc64_elf_unhandled_reloc, /* special_function */
1061 "R_PPC64_PLT16_LO_DS", /* name */
1062 FALSE, /* partial_inplace */
1063 0, /* src_mask */
1064 0xfffc, /* dst_mask */
1065 FALSE), /* pcrel_offset */
1066
1067 /* Like R_PPC64_SECTOFF, but for instructions with a DS field. */
1068 HOWTO (R_PPC64_SECTOFF_DS, /* type */
1069 0, /* rightshift */
1070 1, /* size (0 = byte, 1 = short, 2 = long) */
1071 16, /* bitsize */
1072 FALSE, /* pc_relative */
1073 0, /* bitpos */
1074 complain_overflow_bitfield, /* complain_on_overflow */
1075 ppc64_elf_sectoff_reloc, /* special_function */
1076 "R_PPC64_SECTOFF_DS", /* name */
1077 FALSE, /* partial_inplace */
1078 0, /* src_mask */
1079 0xfffc, /* dst_mask */
1080 FALSE), /* pcrel_offset */
1081
1082 /* Like R_PPC64_SECTOFF_LO, but for instructions with a DS field. */
1083 HOWTO (R_PPC64_SECTOFF_LO_DS, /* type */
1084 0, /* rightshift */
1085 1, /* size (0 = byte, 1 = short, 2 = long) */
1086 16, /* bitsize */
1087 FALSE, /* pc_relative */
1088 0, /* bitpos */
1089 complain_overflow_dont, /* complain_on_overflow */
1090 ppc64_elf_sectoff_reloc, /* special_function */
1091 "R_PPC64_SECTOFF_LO_DS",/* name */
1092 FALSE, /* partial_inplace */
1093 0, /* src_mask */
1094 0xfffc, /* dst_mask */
1095 FALSE), /* pcrel_offset */
1096
1097 /* Like R_PPC64_TOC16, but for instructions with a DS field. */
1098 HOWTO (R_PPC64_TOC16_DS, /* type */
1099 0, /* rightshift */
1100 1, /* size (0 = byte, 1 = short, 2 = long) */
1101 16, /* bitsize */
1102 FALSE, /* pc_relative */
1103 0, /* bitpos */
1104 complain_overflow_signed, /* complain_on_overflow */
1105 ppc64_elf_toc_reloc, /* special_function */
1106 "R_PPC64_TOC16_DS", /* name */
1107 FALSE, /* partial_inplace */
1108 0, /* src_mask */
1109 0xfffc, /* dst_mask */
1110 FALSE), /* pcrel_offset */
1111
1112 /* Like R_PPC64_TOC16_LO, but for instructions with a DS field. */
1113 HOWTO (R_PPC64_TOC16_LO_DS, /* type */
1114 0, /* rightshift */
1115 1, /* size (0 = byte, 1 = short, 2 = long) */
1116 16, /* bitsize */
1117 FALSE, /* pc_relative */
1118 0, /* bitpos */
1119 complain_overflow_dont, /* complain_on_overflow */
1120 ppc64_elf_toc_reloc, /* special_function */
1121 "R_PPC64_TOC16_LO_DS", /* name */
1122 FALSE, /* partial_inplace */
1123 0, /* src_mask */
1124 0xfffc, /* dst_mask */
1125 FALSE), /* pcrel_offset */
1126
1127 /* Like R_PPC64_PLTGOT16, but for instructions with a DS field. */
1128 /* FIXME: R_PPC64_PLTGOT16_DS not implemented. */
1129 HOWTO (R_PPC64_PLTGOT16_DS, /* type */
1130 0, /* rightshift */
1131 1, /* size (0 = byte, 1 = short, 2 = long) */
1132 16, /* bitsize */
1133 FALSE, /* pc_relative */
1134 0, /* bitpos */
1135 complain_overflow_signed, /* complain_on_overflow */
1136 ppc64_elf_unhandled_reloc, /* special_function */
1137 "R_PPC64_PLTGOT16_DS", /* name */
1138 FALSE, /* partial_inplace */
1139 0, /* src_mask */
1140 0xfffc, /* dst_mask */
1141 FALSE), /* pcrel_offset */
1142
1143 /* Like R_PPC64_PLTGOT16_LO, but for instructions with a DS field. */
1144 /* FIXME: R_PPC64_PLTGOT16_LO not implemented. */
1145 HOWTO (R_PPC64_PLTGOT16_LO_DS,/* type */
1146 0, /* rightshift */
1147 1, /* size (0 = byte, 1 = short, 2 = long) */
1148 16, /* bitsize */
1149 FALSE, /* pc_relative */
1150 0, /* bitpos */
1151 complain_overflow_dont, /* complain_on_overflow */
1152 ppc64_elf_unhandled_reloc, /* special_function */
1153 "R_PPC64_PLTGOT16_LO_DS",/* name */
1154 FALSE, /* partial_inplace */
1155 0, /* src_mask */
1156 0xfffc, /* dst_mask */
1157 FALSE), /* pcrel_offset */
1158
1159 /* Marker reloc for TLS. */
1160 HOWTO (R_PPC64_TLS,
1161 0, /* rightshift */
1162 2, /* size (0 = byte, 1 = short, 2 = long) */
1163 32, /* bitsize */
1164 FALSE, /* pc_relative */
1165 0, /* bitpos */
1166 complain_overflow_dont, /* complain_on_overflow */
1167 bfd_elf_generic_reloc, /* special_function */
1168 "R_PPC64_TLS", /* name */
1169 FALSE, /* partial_inplace */
1170 0, /* src_mask */
1171 0, /* dst_mask */
1172 FALSE), /* pcrel_offset */
1173
1174 /* Computes the load module index of the load module that contains the
1175 definition of its TLS sym. */
1176 HOWTO (R_PPC64_DTPMOD64,
1177 0, /* rightshift */
1178 4, /* size (0 = byte, 1 = short, 2 = long) */
1179 64, /* bitsize */
1180 FALSE, /* pc_relative */
1181 0, /* bitpos */
1182 complain_overflow_dont, /* complain_on_overflow */
1183 ppc64_elf_unhandled_reloc, /* special_function */
1184 "R_PPC64_DTPMOD64", /* name */
1185 FALSE, /* partial_inplace */
1186 0, /* src_mask */
1187 ONES (64), /* dst_mask */
1188 FALSE), /* pcrel_offset */
1189
1190 /* Computes a dtv-relative displacement, the difference between the value
1191 of sym+add and the base address of the thread-local storage block that
1192 contains the definition of sym, minus 0x8000. */
1193 HOWTO (R_PPC64_DTPREL64,
1194 0, /* rightshift */
1195 4, /* size (0 = byte, 1 = short, 2 = long) */
1196 64, /* bitsize */
1197 FALSE, /* pc_relative */
1198 0, /* bitpos */
1199 complain_overflow_dont, /* complain_on_overflow */
1200 ppc64_elf_unhandled_reloc, /* special_function */
1201 "R_PPC64_DTPREL64", /* name */
1202 FALSE, /* partial_inplace */
1203 0, /* src_mask */
1204 ONES (64), /* dst_mask */
1205 FALSE), /* pcrel_offset */
1206
1207 /* A 16 bit dtprel reloc. */
1208 HOWTO (R_PPC64_DTPREL16,
1209 0, /* rightshift */
1210 1, /* size (0 = byte, 1 = short, 2 = long) */
1211 16, /* bitsize */
1212 FALSE, /* pc_relative */
1213 0, /* bitpos */
1214 complain_overflow_signed, /* complain_on_overflow */
1215 ppc64_elf_unhandled_reloc, /* special_function */
1216 "R_PPC64_DTPREL16", /* name */
1217 FALSE, /* partial_inplace */
1218 0, /* src_mask */
1219 0xffff, /* dst_mask */
1220 FALSE), /* pcrel_offset */
1221
1222 /* Like DTPREL16, but no overflow. */
1223 HOWTO (R_PPC64_DTPREL16_LO,
1224 0, /* rightshift */
1225 1, /* size (0 = byte, 1 = short, 2 = long) */
1226 16, /* bitsize */
1227 FALSE, /* pc_relative */
1228 0, /* bitpos */
1229 complain_overflow_dont, /* complain_on_overflow */
1230 ppc64_elf_unhandled_reloc, /* special_function */
1231 "R_PPC64_DTPREL16_LO", /* name */
1232 FALSE, /* partial_inplace */
1233 0, /* src_mask */
1234 0xffff, /* dst_mask */
1235 FALSE), /* pcrel_offset */
1236
1237 /* Like DTPREL16_LO, but next higher group of 16 bits. */
1238 HOWTO (R_PPC64_DTPREL16_HI,
1239 16, /* rightshift */
1240 1, /* size (0 = byte, 1 = short, 2 = long) */
1241 16, /* bitsize */
1242 FALSE, /* pc_relative */
1243 0, /* bitpos */
1244 complain_overflow_dont, /* complain_on_overflow */
1245 ppc64_elf_unhandled_reloc, /* special_function */
1246 "R_PPC64_DTPREL16_HI", /* name */
1247 FALSE, /* partial_inplace */
1248 0, /* src_mask */
1249 0xffff, /* dst_mask */
1250 FALSE), /* pcrel_offset */
1251
1252 /* Like DTPREL16_HI, but adjust for low 16 bits. */
1253 HOWTO (R_PPC64_DTPREL16_HA,
1254 16, /* rightshift */
1255 1, /* size (0 = byte, 1 = short, 2 = long) */
1256 16, /* bitsize */
1257 FALSE, /* pc_relative */
1258 0, /* bitpos */
1259 complain_overflow_dont, /* complain_on_overflow */
1260 ppc64_elf_unhandled_reloc, /* special_function */
1261 "R_PPC64_DTPREL16_HA", /* name */
1262 FALSE, /* partial_inplace */
1263 0, /* src_mask */
1264 0xffff, /* dst_mask */
1265 FALSE), /* pcrel_offset */
1266
1267 /* Like DTPREL16_HI, but next higher group of 16 bits. */
1268 HOWTO (R_PPC64_DTPREL16_HIGHER,
1269 32, /* rightshift */
1270 1, /* size (0 = byte, 1 = short, 2 = long) */
1271 16, /* bitsize */
1272 FALSE, /* pc_relative */
1273 0, /* bitpos */
1274 complain_overflow_dont, /* complain_on_overflow */
1275 ppc64_elf_unhandled_reloc, /* special_function */
1276 "R_PPC64_DTPREL16_HIGHER", /* name */
1277 FALSE, /* partial_inplace */
1278 0, /* src_mask */
1279 0xffff, /* dst_mask */
1280 FALSE), /* pcrel_offset */
1281
1282 /* Like DTPREL16_HIGHER, but adjust for low 16 bits. */
1283 HOWTO (R_PPC64_DTPREL16_HIGHERA,
1284 32, /* rightshift */
1285 1, /* size (0 = byte, 1 = short, 2 = long) */
1286 16, /* bitsize */
1287 FALSE, /* pc_relative */
1288 0, /* bitpos */
1289 complain_overflow_dont, /* complain_on_overflow */
1290 ppc64_elf_unhandled_reloc, /* special_function */
1291 "R_PPC64_DTPREL16_HIGHERA", /* name */
1292 FALSE, /* partial_inplace */
1293 0, /* src_mask */
1294 0xffff, /* dst_mask */
1295 FALSE), /* pcrel_offset */
1296
1297 /* Like DTPREL16_HIGHER, but next higher group of 16 bits. */
1298 HOWTO (R_PPC64_DTPREL16_HIGHEST,
1299 48, /* rightshift */
1300 1, /* size (0 = byte, 1 = short, 2 = long) */
1301 16, /* bitsize */
1302 FALSE, /* pc_relative */
1303 0, /* bitpos */
1304 complain_overflow_dont, /* complain_on_overflow */
1305 ppc64_elf_unhandled_reloc, /* special_function */
1306 "R_PPC64_DTPREL16_HIGHEST", /* name */
1307 FALSE, /* partial_inplace */
1308 0, /* src_mask */
1309 0xffff, /* dst_mask */
1310 FALSE), /* pcrel_offset */
1311
1312 /* Like DTPREL16_HIGHEST, but adjust for low 16 bits. */
1313 HOWTO (R_PPC64_DTPREL16_HIGHESTA,
1314 48, /* rightshift */
1315 1, /* size (0 = byte, 1 = short, 2 = long) */
1316 16, /* bitsize */
1317 FALSE, /* pc_relative */
1318 0, /* bitpos */
1319 complain_overflow_dont, /* complain_on_overflow */
1320 ppc64_elf_unhandled_reloc, /* special_function */
1321 "R_PPC64_DTPREL16_HIGHESTA", /* name */
1322 FALSE, /* partial_inplace */
1323 0, /* src_mask */
1324 0xffff, /* dst_mask */
1325 FALSE), /* pcrel_offset */
1326
1327 /* Like DTPREL16, but for insns with a DS field. */
1328 HOWTO (R_PPC64_DTPREL16_DS,
1329 0, /* rightshift */
1330 1, /* size (0 = byte, 1 = short, 2 = long) */
1331 16, /* bitsize */
1332 FALSE, /* pc_relative */
1333 0, /* bitpos */
1334 complain_overflow_signed, /* complain_on_overflow */
1335 ppc64_elf_unhandled_reloc, /* special_function */
1336 "R_PPC64_DTPREL16_DS", /* name */
1337 FALSE, /* partial_inplace */
1338 0, /* src_mask */
1339 0xfffc, /* dst_mask */
1340 FALSE), /* pcrel_offset */
1341
1342 /* Like DTPREL16_DS, but no overflow. */
1343 HOWTO (R_PPC64_DTPREL16_LO_DS,
1344 0, /* rightshift */
1345 1, /* size (0 = byte, 1 = short, 2 = long) */
1346 16, /* bitsize */
1347 FALSE, /* pc_relative */
1348 0, /* bitpos */
1349 complain_overflow_dont, /* complain_on_overflow */
1350 ppc64_elf_unhandled_reloc, /* special_function */
1351 "R_PPC64_DTPREL16_LO_DS", /* name */
1352 FALSE, /* partial_inplace */
1353 0, /* src_mask */
1354 0xfffc, /* dst_mask */
1355 FALSE), /* pcrel_offset */
1356
1357 /* Computes a tp-relative displacement, the difference between the value of
1358 sym+add and the value of the thread pointer (r13). */
1359 HOWTO (R_PPC64_TPREL64,
1360 0, /* rightshift */
1361 4, /* size (0 = byte, 1 = short, 2 = long) */
1362 64, /* bitsize */
1363 FALSE, /* pc_relative */
1364 0, /* bitpos */
1365 complain_overflow_dont, /* complain_on_overflow */
1366 ppc64_elf_unhandled_reloc, /* special_function */
1367 "R_PPC64_TPREL64", /* name */
1368 FALSE, /* partial_inplace */
1369 0, /* src_mask */
1370 ONES (64), /* dst_mask */
1371 FALSE), /* pcrel_offset */
1372
1373 /* A 16 bit tprel reloc. */
1374 HOWTO (R_PPC64_TPREL16,
1375 0, /* rightshift */
1376 1, /* size (0 = byte, 1 = short, 2 = long) */
1377 16, /* bitsize */
1378 FALSE, /* pc_relative */
1379 0, /* bitpos */
1380 complain_overflow_signed, /* complain_on_overflow */
1381 ppc64_elf_unhandled_reloc, /* special_function */
1382 "R_PPC64_TPREL16", /* name */
1383 FALSE, /* partial_inplace */
1384 0, /* src_mask */
1385 0xffff, /* dst_mask */
1386 FALSE), /* pcrel_offset */
1387
1388 /* Like TPREL16, but no overflow. */
1389 HOWTO (R_PPC64_TPREL16_LO,
1390 0, /* rightshift */
1391 1, /* size (0 = byte, 1 = short, 2 = long) */
1392 16, /* bitsize */
1393 FALSE, /* pc_relative */
1394 0, /* bitpos */
1395 complain_overflow_dont, /* complain_on_overflow */
1396 ppc64_elf_unhandled_reloc, /* special_function */
1397 "R_PPC64_TPREL16_LO", /* name */
1398 FALSE, /* partial_inplace */
1399 0, /* src_mask */
1400 0xffff, /* dst_mask */
1401 FALSE), /* pcrel_offset */
1402
1403 /* Like TPREL16_LO, but next higher group of 16 bits. */
1404 HOWTO (R_PPC64_TPREL16_HI,
1405 16, /* rightshift */
1406 1, /* size (0 = byte, 1 = short, 2 = long) */
1407 16, /* bitsize */
1408 FALSE, /* pc_relative */
1409 0, /* bitpos */
1410 complain_overflow_dont, /* complain_on_overflow */
1411 ppc64_elf_unhandled_reloc, /* special_function */
1412 "R_PPC64_TPREL16_HI", /* name */
1413 FALSE, /* partial_inplace */
1414 0, /* src_mask */
1415 0xffff, /* dst_mask */
1416 FALSE), /* pcrel_offset */
1417
1418 /* Like TPREL16_HI, but adjust for low 16 bits. */
1419 HOWTO (R_PPC64_TPREL16_HA,
1420 16, /* rightshift */
1421 1, /* size (0 = byte, 1 = short, 2 = long) */
1422 16, /* bitsize */
1423 FALSE, /* pc_relative */
1424 0, /* bitpos */
1425 complain_overflow_dont, /* complain_on_overflow */
1426 ppc64_elf_unhandled_reloc, /* special_function */
1427 "R_PPC64_TPREL16_HA", /* name */
1428 FALSE, /* partial_inplace */
1429 0, /* src_mask */
1430 0xffff, /* dst_mask */
1431 FALSE), /* pcrel_offset */
1432
1433 /* Like TPREL16_HI, but next higher group of 16 bits. */
1434 HOWTO (R_PPC64_TPREL16_HIGHER,
1435 32, /* rightshift */
1436 1, /* size (0 = byte, 1 = short, 2 = long) */
1437 16, /* bitsize */
1438 FALSE, /* pc_relative */
1439 0, /* bitpos */
1440 complain_overflow_dont, /* complain_on_overflow */
1441 ppc64_elf_unhandled_reloc, /* special_function */
1442 "R_PPC64_TPREL16_HIGHER", /* name */
1443 FALSE, /* partial_inplace */
1444 0, /* src_mask */
1445 0xffff, /* dst_mask */
1446 FALSE), /* pcrel_offset */
1447
1448 /* Like TPREL16_HIGHER, but adjust for low 16 bits. */
1449 HOWTO (R_PPC64_TPREL16_HIGHERA,
1450 32, /* rightshift */
1451 1, /* size (0 = byte, 1 = short, 2 = long) */
1452 16, /* bitsize */
1453 FALSE, /* pc_relative */
1454 0, /* bitpos */
1455 complain_overflow_dont, /* complain_on_overflow */
1456 ppc64_elf_unhandled_reloc, /* special_function */
1457 "R_PPC64_TPREL16_HIGHERA", /* name */
1458 FALSE, /* partial_inplace */
1459 0, /* src_mask */
1460 0xffff, /* dst_mask */
1461 FALSE), /* pcrel_offset */
1462
1463 /* Like TPREL16_HIGHER, but next higher group of 16 bits. */
1464 HOWTO (R_PPC64_TPREL16_HIGHEST,
1465 48, /* rightshift */
1466 1, /* size (0 = byte, 1 = short, 2 = long) */
1467 16, /* bitsize */
1468 FALSE, /* pc_relative */
1469 0, /* bitpos */
1470 complain_overflow_dont, /* complain_on_overflow */
1471 ppc64_elf_unhandled_reloc, /* special_function */
1472 "R_PPC64_TPREL16_HIGHEST", /* name */
1473 FALSE, /* partial_inplace */
1474 0, /* src_mask */
1475 0xffff, /* dst_mask */
1476 FALSE), /* pcrel_offset */
1477
1478 /* Like TPREL16_HIGHEST, but adjust for low 16 bits. */
1479 HOWTO (R_PPC64_TPREL16_HIGHESTA,
1480 48, /* rightshift */
1481 1, /* size (0 = byte, 1 = short, 2 = long) */
1482 16, /* bitsize */
1483 FALSE, /* pc_relative */
1484 0, /* bitpos */
1485 complain_overflow_dont, /* complain_on_overflow */
1486 ppc64_elf_unhandled_reloc, /* special_function */
1487 "R_PPC64_TPREL16_HIGHESTA", /* name */
1488 FALSE, /* partial_inplace */
1489 0, /* src_mask */
1490 0xffff, /* dst_mask */
1491 FALSE), /* pcrel_offset */
1492
1493 /* Like TPREL16, but for insns with a DS field. */
1494 HOWTO (R_PPC64_TPREL16_DS,
1495 0, /* rightshift */
1496 1, /* size (0 = byte, 1 = short, 2 = long) */
1497 16, /* bitsize */
1498 FALSE, /* pc_relative */
1499 0, /* bitpos */
1500 complain_overflow_signed, /* complain_on_overflow */
1501 ppc64_elf_unhandled_reloc, /* special_function */
1502 "R_PPC64_TPREL16_DS", /* name */
1503 FALSE, /* partial_inplace */
1504 0, /* src_mask */
1505 0xfffc, /* dst_mask */
1506 FALSE), /* pcrel_offset */
1507
1508 /* Like TPREL16_DS, but no overflow. */
1509 HOWTO (R_PPC64_TPREL16_LO_DS,
1510 0, /* rightshift */
1511 1, /* size (0 = byte, 1 = short, 2 = long) */
1512 16, /* bitsize */
1513 FALSE, /* pc_relative */
1514 0, /* bitpos */
1515 complain_overflow_dont, /* complain_on_overflow */
1516 ppc64_elf_unhandled_reloc, /* special_function */
1517 "R_PPC64_TPREL16_LO_DS", /* name */
1518 FALSE, /* partial_inplace */
1519 0, /* src_mask */
1520 0xfffc, /* dst_mask */
1521 FALSE), /* pcrel_offset */
1522
1523 /* Allocates two contiguous entries in the GOT to hold a tls_index structure,
1524 with values (sym+add)@dtpmod and (sym+add)@dtprel, and computes the offset
1525 to the first entry relative to the TOC base (r2). */
1526 HOWTO (R_PPC64_GOT_TLSGD16,
1527 0, /* rightshift */
1528 1, /* size (0 = byte, 1 = short, 2 = long) */
1529 16, /* bitsize */
1530 FALSE, /* pc_relative */
1531 0, /* bitpos */
1532 complain_overflow_signed, /* complain_on_overflow */
1533 ppc64_elf_unhandled_reloc, /* special_function */
1534 "R_PPC64_GOT_TLSGD16", /* name */
b34976b6 1535 FALSE, /* partial_inplace */
5bd4f169
AM
1536 0, /* src_mask */
1537 0xffff, /* dst_mask */
b34976b6 1538 FALSE), /* pcrel_offset */
5bd4f169 1539
411e1bfb
AM
1540 /* Like GOT_TLSGD16, but no overflow. */
1541 HOWTO (R_PPC64_GOT_TLSGD16_LO,
5bd4f169
AM
1542 0, /* rightshift */
1543 1, /* size (0 = byte, 1 = short, 2 = long) */
1544 16, /* bitsize */
b34976b6 1545 FALSE, /* pc_relative */
5bd4f169
AM
1546 0, /* bitpos */
1547 complain_overflow_dont, /* complain_on_overflow */
805fc799 1548 ppc64_elf_unhandled_reloc, /* special_function */
411e1bfb 1549 "R_PPC64_GOT_TLSGD16_LO", /* name */
b34976b6 1550 FALSE, /* partial_inplace */
5bd4f169
AM
1551 0, /* src_mask */
1552 0xffff, /* dst_mask */
b34976b6 1553 FALSE), /* pcrel_offset */
5bd4f169 1554
411e1bfb
AM
1555 /* Like GOT_TLSGD16_LO, but next higher group of 16 bits. */
1556 HOWTO (R_PPC64_GOT_TLSGD16_HI,
5bd4f169
AM
1557 16, /* rightshift */
1558 1, /* size (0 = byte, 1 = short, 2 = long) */
1559 16, /* bitsize */
b34976b6 1560 FALSE, /* pc_relative */
5bd4f169
AM
1561 0, /* bitpos */
1562 complain_overflow_dont, /* complain_on_overflow */
805fc799 1563 ppc64_elf_unhandled_reloc, /* special_function */
411e1bfb 1564 "R_PPC64_GOT_TLSGD16_HI", /* name */
b34976b6 1565 FALSE, /* partial_inplace */
5bd4f169
AM
1566 0, /* src_mask */
1567 0xffff, /* dst_mask */
b34976b6 1568 FALSE), /* pcrel_offset */
5bd4f169 1569
411e1bfb
AM
1570 /* Like GOT_TLSGD16_HI, but adjust for low 16 bits. */
1571 HOWTO (R_PPC64_GOT_TLSGD16_HA,
5bd4f169
AM
1572 16, /* rightshift */
1573 1, /* size (0 = byte, 1 = short, 2 = long) */
1574 16, /* bitsize */
b34976b6 1575 FALSE, /* pc_relative */
5bd4f169 1576 0, /* bitpos */
411e1bfb 1577 complain_overflow_dont, /* complain_on_overflow */
805fc799 1578 ppc64_elf_unhandled_reloc, /* special_function */
411e1bfb 1579 "R_PPC64_GOT_TLSGD16_HA", /* name */
b34976b6 1580 FALSE, /* partial_inplace */
5bd4f169
AM
1581 0, /* src_mask */
1582 0xffff, /* dst_mask */
b34976b6 1583 FALSE), /* pcrel_offset */
5bd4f169 1584
411e1bfb
AM
1585 /* Allocates two contiguous entries in the GOT to hold a tls_index structure,
1586 with values (sym+add)@dtpmod and zero, and computes the offset to the
1587 first entry relative to the TOC base (r2). */
1588 HOWTO (R_PPC64_GOT_TLSLD16,
5bd4f169
AM
1589 0, /* rightshift */
1590 1, /* size (0 = byte, 1 = short, 2 = long) */
1591 16, /* bitsize */
b34976b6 1592 FALSE, /* pc_relative */
5bd4f169 1593 0, /* bitpos */
411e1bfb
AM
1594 complain_overflow_signed, /* complain_on_overflow */
1595 ppc64_elf_unhandled_reloc, /* special_function */
1596 "R_PPC64_GOT_TLSLD16", /* name */
b34976b6 1597 FALSE, /* partial_inplace */
d006db6c 1598 0, /* src_mask */
411e1bfb 1599 0xffff, /* dst_mask */
b34976b6 1600 FALSE), /* pcrel_offset */
5bd4f169 1601
411e1bfb
AM
1602 /* Like GOT_TLSLD16, but no overflow. */
1603 HOWTO (R_PPC64_GOT_TLSLD16_LO,
5bd4f169
AM
1604 0, /* rightshift */
1605 1, /* size (0 = byte, 1 = short, 2 = long) */
1606 16, /* bitsize */
b34976b6 1607 FALSE, /* pc_relative */
5bd4f169 1608 0, /* bitpos */
411e1bfb
AM
1609 complain_overflow_dont, /* complain_on_overflow */
1610 ppc64_elf_unhandled_reloc, /* special_function */
1611 "R_PPC64_GOT_TLSLD16_LO", /* name */
b34976b6 1612 FALSE, /* partial_inplace */
d006db6c 1613 0, /* src_mask */
411e1bfb 1614 0xffff, /* dst_mask */
b34976b6 1615 FALSE), /* pcrel_offset */
5bd4f169 1616
411e1bfb
AM
1617 /* Like GOT_TLSLD16_LO, but next higher group of 16 bits. */
1618 HOWTO (R_PPC64_GOT_TLSLD16_HI,
1619 16, /* rightshift */
5bd4f169
AM
1620 1, /* size (0 = byte, 1 = short, 2 = long) */
1621 16, /* bitsize */
b34976b6 1622 FALSE, /* pc_relative */
5bd4f169 1623 0, /* bitpos */
411e1bfb 1624 complain_overflow_dont, /* complain_on_overflow */
805fc799 1625 ppc64_elf_unhandled_reloc, /* special_function */
411e1bfb 1626 "R_PPC64_GOT_TLSLD16_HI", /* name */
b34976b6 1627 FALSE, /* partial_inplace */
d006db6c 1628 0, /* src_mask */
411e1bfb 1629 0xffff, /* dst_mask */
b34976b6 1630 FALSE), /* pcrel_offset */
5bd4f169 1631
411e1bfb
AM
1632 /* Like GOT_TLSLD16_HI, but adjust for low 16 bits. */
1633 HOWTO (R_PPC64_GOT_TLSLD16_HA,
1634 16, /* rightshift */
5bd4f169
AM
1635 1, /* size (0 = byte, 1 = short, 2 = long) */
1636 16, /* bitsize */
b34976b6 1637 FALSE, /* pc_relative */
5bd4f169
AM
1638 0, /* bitpos */
1639 complain_overflow_dont, /* complain_on_overflow */
805fc799 1640 ppc64_elf_unhandled_reloc, /* special_function */
411e1bfb 1641 "R_PPC64_GOT_TLSLD16_HA", /* name */
b34976b6 1642 FALSE, /* partial_inplace */
d006db6c 1643 0, /* src_mask */
411e1bfb 1644 0xffff, /* dst_mask */
b34976b6 1645 FALSE), /* pcrel_offset */
5bd4f169 1646
411e1bfb
AM
1647 /* Allocates an entry in the GOT with value (sym+add)@dtprel, and computes
1648 the offset to the entry relative to the TOC base (r2). */
1649 HOWTO (R_PPC64_GOT_DTPREL16_DS,
5bd4f169
AM
1650 0, /* rightshift */
1651 1, /* size (0 = byte, 1 = short, 2 = long) */
1652 16, /* bitsize */
b34976b6 1653 FALSE, /* pc_relative */
5bd4f169 1654 0, /* bitpos */
411e1bfb 1655 complain_overflow_signed, /* complain_on_overflow */
805fc799 1656 ppc64_elf_unhandled_reloc, /* special_function */
411e1bfb 1657 "R_PPC64_GOT_DTPREL16_DS", /* name */
b34976b6 1658 FALSE, /* partial_inplace */
d006db6c 1659 0, /* src_mask */
5bd4f169 1660 0xfffc, /* dst_mask */
b34976b6 1661 FALSE), /* pcrel_offset */
5bd4f169 1662
411e1bfb
AM
1663 /* Like GOT_DTPREL16_DS, but no overflow. */
1664 HOWTO (R_PPC64_GOT_DTPREL16_LO_DS,
5bd4f169 1665 0, /* rightshift */
c061c2d8
AM
1666 1, /* size (0 = byte, 1 = short, 2 = long) */
1667 16, /* bitsize */
b34976b6 1668 FALSE, /* pc_relative */
5bd4f169 1669 0, /* bitpos */
411e1bfb
AM
1670 complain_overflow_dont, /* complain_on_overflow */
1671 ppc64_elf_unhandled_reloc, /* special_function */
1672 "R_PPC64_GOT_DTPREL16_LO_DS", /* name */
b34976b6 1673 FALSE, /* partial_inplace */
d006db6c 1674 0, /* src_mask */
c061c2d8 1675 0xfffc, /* dst_mask */
b34976b6 1676 FALSE), /* pcrel_offset */
5bd4f169 1677
411e1bfb
AM
1678 /* Like GOT_DTPREL16_LO_DS, but next higher group of 16 bits. */
1679 HOWTO (R_PPC64_GOT_DTPREL16_HI,
1680 16, /* rightshift */
5bd4f169
AM
1681 1, /* size (0 = byte, 1 = short, 2 = long) */
1682 16, /* bitsize */
b34976b6 1683 FALSE, /* pc_relative */
5bd4f169
AM
1684 0, /* bitpos */
1685 complain_overflow_dont, /* complain_on_overflow */
411e1bfb
AM
1686 ppc64_elf_unhandled_reloc, /* special_function */
1687 "R_PPC64_GOT_DTPREL16_HI", /* name */
b34976b6 1688 FALSE, /* partial_inplace */
d006db6c 1689 0, /* src_mask */
411e1bfb 1690 0xffff, /* dst_mask */
b34976b6 1691 FALSE), /* pcrel_offset */
5bd4f169 1692
411e1bfb
AM
1693 /* Like GOT_DTPREL16_HI, but adjust for low 16 bits. */
1694 HOWTO (R_PPC64_GOT_DTPREL16_HA,
1695 16, /* rightshift */
1696 1, /* size (0 = byte, 1 = short, 2 = long) */
1697 16, /* bitsize */
1698 FALSE, /* pc_relative */
1699 0, /* bitpos */
1700 complain_overflow_dont, /* complain_on_overflow */
1701 ppc64_elf_unhandled_reloc, /* special_function */
1702 "R_PPC64_GOT_DTPREL16_HA", /* name */
1703 FALSE, /* partial_inplace */
1704 0, /* src_mask */
1705 0xffff, /* dst_mask */
1706 FALSE), /* pcrel_offset */
1707
1708 /* Allocates an entry in the GOT with value (sym+add)@tprel, and computes the
1709 offset to the entry relative to the TOC base (r2). */
1710 HOWTO (R_PPC64_GOT_TPREL16_DS,
5bd4f169
AM
1711 0, /* rightshift */
1712 1, /* size (0 = byte, 1 = short, 2 = long) */
1713 16, /* bitsize */
b34976b6 1714 FALSE, /* pc_relative */
5bd4f169
AM
1715 0, /* bitpos */
1716 complain_overflow_signed, /* complain_on_overflow */
411e1bfb
AM
1717 ppc64_elf_unhandled_reloc, /* special_function */
1718 "R_PPC64_GOT_TPREL16_DS", /* name */
b34976b6 1719 FALSE, /* partial_inplace */
d006db6c 1720 0, /* src_mask */
411e1bfb 1721 0xffff, /* dst_mask */
b34976b6 1722 FALSE), /* pcrel_offset */
5bd4f169 1723
411e1bfb
AM
1724 /* Like GOT_TPREL16_DS, but no overflow. */
1725 HOWTO (R_PPC64_GOT_TPREL16_LO_DS,
5bd4f169
AM
1726 0, /* rightshift */
1727 1, /* size (0 = byte, 1 = short, 2 = long) */
1728 16, /* bitsize */
b34976b6 1729 FALSE, /* pc_relative */
5bd4f169
AM
1730 0, /* bitpos */
1731 complain_overflow_dont, /* complain_on_overflow */
411e1bfb
AM
1732 ppc64_elf_unhandled_reloc, /* special_function */
1733 "R_PPC64_GOT_TPREL16_LO_DS", /* name */
b34976b6 1734 FALSE, /* partial_inplace */
d006db6c 1735 0, /* src_mask */
411e1bfb 1736 0xffff, /* dst_mask */
b34976b6 1737 FALSE), /* pcrel_offset */
5bd4f169 1738
411e1bfb
AM
1739 /* Like GOT_TPREL16_LO_DS, but next higher group of 16 bits. */
1740 HOWTO (R_PPC64_GOT_TPREL16_HI,
1741 16, /* rightshift */
5bd4f169
AM
1742 1, /* size (0 = byte, 1 = short, 2 = long) */
1743 16, /* bitsize */
b34976b6 1744 FALSE, /* pc_relative */
5bd4f169 1745 0, /* bitpos */
411e1bfb 1746 complain_overflow_dont, /* complain_on_overflow */
805fc799 1747 ppc64_elf_unhandled_reloc, /* special_function */
411e1bfb 1748 "R_PPC64_GOT_TPREL16_HI", /* name */
b34976b6 1749 FALSE, /* partial_inplace */
d006db6c 1750 0, /* src_mask */
411e1bfb 1751 0xffff, /* dst_mask */
b34976b6 1752 FALSE), /* pcrel_offset */
5bd4f169 1753
411e1bfb
AM
1754 /* Like GOT_TPREL16_HI, but adjust for low 16 bits. */
1755 HOWTO (R_PPC64_GOT_TPREL16_HA,
1756 16, /* rightshift */
5bd4f169
AM
1757 1, /* size (0 = byte, 1 = short, 2 = long) */
1758 16, /* bitsize */
b34976b6 1759 FALSE, /* pc_relative */
5bd4f169
AM
1760 0, /* bitpos */
1761 complain_overflow_dont, /* complain_on_overflow */
805fc799 1762 ppc64_elf_unhandled_reloc, /* special_function */
411e1bfb 1763 "R_PPC64_GOT_TPREL16_HA", /* name */
b34976b6 1764 FALSE, /* partial_inplace */
d006db6c 1765 0, /* src_mask */
411e1bfb 1766 0xffff, /* dst_mask */
b34976b6 1767 FALSE), /* pcrel_offset */
5bd4f169
AM
1768
1769 /* GNU extension to record C++ vtable hierarchy. */
1770 HOWTO (R_PPC64_GNU_VTINHERIT, /* type */
1771 0, /* rightshift */
1772 0, /* size (0 = byte, 1 = short, 2 = long) */
1773 0, /* bitsize */
b34976b6 1774 FALSE, /* pc_relative */
5bd4f169
AM
1775 0, /* bitpos */
1776 complain_overflow_dont, /* complain_on_overflow */
1777 NULL, /* special_function */
1778 "R_PPC64_GNU_VTINHERIT", /* name */
b34976b6 1779 FALSE, /* partial_inplace */
5bd4f169
AM
1780 0, /* src_mask */
1781 0, /* dst_mask */
b34976b6 1782 FALSE), /* pcrel_offset */
5bd4f169
AM
1783
1784 /* GNU extension to record C++ vtable member usage. */
1785 HOWTO (R_PPC64_GNU_VTENTRY, /* type */
1786 0, /* rightshift */
1787 0, /* size (0 = byte, 1 = short, 2 = long) */
1788 0, /* bitsize */
b34976b6 1789 FALSE, /* pc_relative */
5bd4f169
AM
1790 0, /* bitpos */
1791 complain_overflow_dont, /* complain_on_overflow */
1792 NULL, /* special_function */
1793 "R_PPC64_GNU_VTENTRY", /* name */
b34976b6 1794 FALSE, /* partial_inplace */
5bd4f169
AM
1795 0, /* src_mask */
1796 0, /* dst_mask */
b34976b6 1797 FALSE), /* pcrel_offset */
5bd4f169
AM
1798};
1799
1800\f
1801/* Initialize the ppc64_elf_howto_table, so that linear accesses can
1802 be done. */
1803
1804static void
1805ppc_howto_init ()
1806{
1807 unsigned int i, type;
1808
1809 for (i = 0;
1810 i < sizeof (ppc64_elf_howto_raw) / sizeof (ppc64_elf_howto_raw[0]);
1811 i++)
1812 {
1813 type = ppc64_elf_howto_raw[i].type;
1814 BFD_ASSERT (type < (sizeof (ppc64_elf_howto_table)
1815 / sizeof (ppc64_elf_howto_table[0])));
1816 ppc64_elf_howto_table[type] = &ppc64_elf_howto_raw[i];
1817 }
1818}
1819
1820static reloc_howto_type *
1821ppc64_elf_reloc_type_lookup (abfd, code)
1822 bfd *abfd ATTRIBUTE_UNUSED;
1823 bfd_reloc_code_real_type code;
1824{
411e1bfb 1825 enum elf_ppc64_reloc_type r = R_PPC64_NONE;
5bd4f169
AM
1826
1827 if (!ppc64_elf_howto_table[R_PPC64_ADDR32])
1828 /* Initialize howto table if needed. */
1829 ppc_howto_init ();
1830
1831 switch ((int) code)
1832 {
1833 default:
1834 return (reloc_howto_type *) NULL;
1835
411e1bfb
AM
1836 case BFD_RELOC_NONE: r = R_PPC64_NONE;
1837 break;
1838 case BFD_RELOC_32: r = R_PPC64_ADDR32;
1839 break;
1840 case BFD_RELOC_PPC_BA26: r = R_PPC64_ADDR24;
1841 break;
1842 case BFD_RELOC_16: r = R_PPC64_ADDR16;
1843 break;
1844 case BFD_RELOC_LO16: r = R_PPC64_ADDR16_LO;
1845 break;
1846 case BFD_RELOC_HI16: r = R_PPC64_ADDR16_HI;
1847 break;
1848 case BFD_RELOC_HI16_S: r = R_PPC64_ADDR16_HA;
5bd4f169 1849 break;
411e1bfb 1850 case BFD_RELOC_PPC_BA16: r = R_PPC64_ADDR14;
5bd4f169 1851 break;
411e1bfb 1852 case BFD_RELOC_PPC_BA16_BRTAKEN: r = R_PPC64_ADDR14_BRTAKEN;
5bd4f169 1853 break;
411e1bfb 1854 case BFD_RELOC_PPC_BA16_BRNTAKEN: r = R_PPC64_ADDR14_BRNTAKEN;
5bd4f169 1855 break;
411e1bfb 1856 case BFD_RELOC_PPC_B26: r = R_PPC64_REL24;
5bd4f169 1857 break;
411e1bfb 1858 case BFD_RELOC_PPC_B16: r = R_PPC64_REL14;
5bd4f169 1859 break;
411e1bfb 1860 case BFD_RELOC_PPC_B16_BRTAKEN: r = R_PPC64_REL14_BRTAKEN;
5bd4f169 1861 break;
411e1bfb 1862 case BFD_RELOC_PPC_B16_BRNTAKEN: r = R_PPC64_REL14_BRNTAKEN;
5bd4f169 1863 break;
411e1bfb 1864 case BFD_RELOC_16_GOTOFF: r = R_PPC64_GOT16;
5bd4f169 1865 break;
411e1bfb 1866 case BFD_RELOC_LO16_GOTOFF: r = R_PPC64_GOT16_LO;
5bd4f169 1867 break;
411e1bfb 1868 case BFD_RELOC_HI16_GOTOFF: r = R_PPC64_GOT16_HI;
5bd4f169 1869 break;
411e1bfb 1870 case BFD_RELOC_HI16_S_GOTOFF: r = R_PPC64_GOT16_HA;
5bd4f169 1871 break;
411e1bfb 1872 case BFD_RELOC_PPC_COPY: r = R_PPC64_COPY;
5bd4f169 1873 break;
411e1bfb 1874 case BFD_RELOC_PPC_GLOB_DAT: r = R_PPC64_GLOB_DAT;
5bd4f169 1875 break;
411e1bfb 1876 case BFD_RELOC_32_PCREL: r = R_PPC64_REL32;
5bd4f169 1877 break;
411e1bfb 1878 case BFD_RELOC_32_PLTOFF: r = R_PPC64_PLT32;
5bd4f169 1879 break;
411e1bfb 1880 case BFD_RELOC_32_PLT_PCREL: r = R_PPC64_PLTREL32;
5bd4f169 1881 break;
411e1bfb 1882 case BFD_RELOC_LO16_PLTOFF: r = R_PPC64_PLT16_LO;
5bd4f169 1883 break;
411e1bfb 1884 case BFD_RELOC_HI16_PLTOFF: r = R_PPC64_PLT16_HI;
5bd4f169 1885 break;
411e1bfb 1886 case BFD_RELOC_HI16_S_PLTOFF: r = R_PPC64_PLT16_HA;
5bd4f169 1887 break;
411e1bfb 1888 case BFD_RELOC_16_BASEREL: r = R_PPC64_SECTOFF;
5bd4f169 1889 break;
411e1bfb 1890 case BFD_RELOC_LO16_BASEREL: r = R_PPC64_SECTOFF_LO;
5bd4f169 1891 break;
411e1bfb 1892 case BFD_RELOC_HI16_BASEREL: r = R_PPC64_SECTOFF_HI;
5bd4f169 1893 break;
411e1bfb 1894 case BFD_RELOC_HI16_S_BASEREL: r = R_PPC64_SECTOFF_HA;
5bd4f169 1895 break;
411e1bfb 1896 case BFD_RELOC_CTOR: r = R_PPC64_ADDR64;
5bd4f169 1897 break;
411e1bfb 1898 case BFD_RELOC_64: r = R_PPC64_ADDR64;
5bd4f169 1899 break;
411e1bfb 1900 case BFD_RELOC_PPC64_HIGHER: r = R_PPC64_ADDR16_HIGHER;
5bd4f169 1901 break;
411e1bfb 1902 case BFD_RELOC_PPC64_HIGHER_S: r = R_PPC64_ADDR16_HIGHERA;
5bd4f169 1903 break;
411e1bfb 1904 case BFD_RELOC_PPC64_HIGHEST: r = R_PPC64_ADDR16_HIGHEST;
5bd4f169 1905 break;
411e1bfb 1906 case BFD_RELOC_PPC64_HIGHEST_S: r = R_PPC64_ADDR16_HIGHESTA;
5bd4f169 1907 break;
411e1bfb 1908 case BFD_RELOC_64_PCREL: r = R_PPC64_REL64;
5bd4f169 1909 break;
411e1bfb 1910 case BFD_RELOC_64_PLTOFF: r = R_PPC64_PLT64;
5bd4f169 1911 break;
411e1bfb 1912 case BFD_RELOC_64_PLT_PCREL: r = R_PPC64_PLTREL64;
5bd4f169 1913 break;
411e1bfb 1914 case BFD_RELOC_PPC_TOC16: r = R_PPC64_TOC16;
5bd4f169 1915 break;
411e1bfb 1916 case BFD_RELOC_PPC64_TOC16_LO: r = R_PPC64_TOC16_LO;
5bd4f169 1917 break;
411e1bfb 1918 case BFD_RELOC_PPC64_TOC16_HI: r = R_PPC64_TOC16_HI;
5bd4f169 1919 break;
411e1bfb 1920 case BFD_RELOC_PPC64_TOC16_HA: r = R_PPC64_TOC16_HA;
5bd4f169 1921 break;
411e1bfb 1922 case BFD_RELOC_PPC64_TOC: r = R_PPC64_TOC;
5bd4f169 1923 break;
411e1bfb 1924 case BFD_RELOC_PPC64_PLTGOT16: r = R_PPC64_PLTGOT16;
5bd4f169 1925 break;
411e1bfb 1926 case BFD_RELOC_PPC64_PLTGOT16_LO: r = R_PPC64_PLTGOT16_LO;
5bd4f169 1927 break;
411e1bfb 1928 case BFD_RELOC_PPC64_PLTGOT16_HI: r = R_PPC64_PLTGOT16_HI;
5bd4f169 1929 break;
411e1bfb 1930 case BFD_RELOC_PPC64_PLTGOT16_HA: r = R_PPC64_PLTGOT16_HA;
5bd4f169 1931 break;
411e1bfb 1932 case BFD_RELOC_PPC64_ADDR16_DS: r = R_PPC64_ADDR16_DS;
5bd4f169 1933 break;
411e1bfb 1934 case BFD_RELOC_PPC64_ADDR16_LO_DS: r = R_PPC64_ADDR16_LO_DS;
5bd4f169 1935 break;
411e1bfb 1936 case BFD_RELOC_PPC64_GOT16_DS: r = R_PPC64_GOT16_DS;
5bd4f169 1937 break;
411e1bfb 1938 case BFD_RELOC_PPC64_GOT16_LO_DS: r = R_PPC64_GOT16_LO_DS;
5bd4f169 1939 break;
411e1bfb 1940 case BFD_RELOC_PPC64_PLT16_LO_DS: r = R_PPC64_PLT16_LO_DS;
5bd4f169 1941 break;
411e1bfb 1942 case BFD_RELOC_PPC64_SECTOFF_DS: r = R_PPC64_SECTOFF_DS;
5bd4f169 1943 break;
411e1bfb 1944 case BFD_RELOC_PPC64_SECTOFF_LO_DS: r = R_PPC64_SECTOFF_LO_DS;
5bd4f169 1945 break;
411e1bfb 1946 case BFD_RELOC_PPC64_TOC16_DS: r = R_PPC64_TOC16_DS;
5bd4f169 1947 break;
411e1bfb 1948 case BFD_RELOC_PPC64_TOC16_LO_DS: r = R_PPC64_TOC16_LO_DS;
5bd4f169 1949 break;
411e1bfb 1950 case BFD_RELOC_PPC64_PLTGOT16_DS: r = R_PPC64_PLTGOT16_DS;
5bd4f169 1951 break;
411e1bfb 1952 case BFD_RELOC_PPC64_PLTGOT16_LO_DS: r = R_PPC64_PLTGOT16_LO_DS;
5bd4f169 1953 break;
411e1bfb 1954 case BFD_RELOC_PPC_TLS: r = R_PPC64_TLS;
5bd4f169 1955 break;
411e1bfb 1956 case BFD_RELOC_PPC_DTPMOD: r = R_PPC64_DTPMOD64;
5bd4f169 1957 break;
411e1bfb 1958 case BFD_RELOC_PPC_TPREL16: r = R_PPC64_TPREL16;
5bd4f169 1959 break;
411e1bfb 1960 case BFD_RELOC_PPC_TPREL16_LO: r = R_PPC64_TPREL16_LO;
5bd4f169 1961 break;
411e1bfb 1962 case BFD_RELOC_PPC_TPREL16_HI: r = R_PPC64_TPREL16_HI;
5bd4f169 1963 break;
411e1bfb 1964 case BFD_RELOC_PPC_TPREL16_HA: r = R_PPC64_TPREL16_HA;
5bd4f169 1965 break;
411e1bfb 1966 case BFD_RELOC_PPC_TPREL: r = R_PPC64_TPREL64;
5bd4f169 1967 break;
411e1bfb
AM
1968 case BFD_RELOC_PPC_DTPREL16: r = R_PPC64_DTPREL16;
1969 break;
1970 case BFD_RELOC_PPC_DTPREL16_LO: r = R_PPC64_DTPREL16_LO;
1971 break;
1972 case BFD_RELOC_PPC_DTPREL16_HI: r = R_PPC64_DTPREL16_HI;
1973 break;
1974 case BFD_RELOC_PPC_DTPREL16_HA: r = R_PPC64_DTPREL16_HA;
1975 break;
1976 case BFD_RELOC_PPC_DTPREL: r = R_PPC64_DTPREL64;
1977 break;
1978 case BFD_RELOC_PPC_GOT_TLSGD16: r = R_PPC64_GOT_TLSGD16;
1979 break;
1980 case BFD_RELOC_PPC_GOT_TLSGD16_LO: r = R_PPC64_GOT_TLSGD16_LO;
1981 break;
1982 case BFD_RELOC_PPC_GOT_TLSGD16_HI: r = R_PPC64_GOT_TLSGD16_HI;
1983 break;
1984 case BFD_RELOC_PPC_GOT_TLSGD16_HA: r = R_PPC64_GOT_TLSGD16_HA;
1985 break;
1986 case BFD_RELOC_PPC_GOT_TLSLD16: r = R_PPC64_GOT_TLSLD16;
1987 break;
1988 case BFD_RELOC_PPC_GOT_TLSLD16_LO: r = R_PPC64_GOT_TLSLD16_LO;
1989 break;
1990 case BFD_RELOC_PPC_GOT_TLSLD16_HI: r = R_PPC64_GOT_TLSLD16_HI;
1991 break;
1992 case BFD_RELOC_PPC_GOT_TLSLD16_HA: r = R_PPC64_GOT_TLSLD16_HA;
1993 break;
1994 case BFD_RELOC_PPC_GOT_TPREL16: r = R_PPC64_GOT_TPREL16_DS;
1995 break;
1996 case BFD_RELOC_PPC_GOT_TPREL16_LO: r = R_PPC64_GOT_TPREL16_LO_DS;
1997 break;
1998 case BFD_RELOC_PPC_GOT_TPREL16_HI: r = R_PPC64_GOT_TPREL16_HI;
1999 break;
2000 case BFD_RELOC_PPC_GOT_TPREL16_HA: r = R_PPC64_GOT_TPREL16_HA;
2001 break;
2002 case BFD_RELOC_PPC_GOT_DTPREL16: r = R_PPC64_GOT_DTPREL16_DS;
2003 break;
2004 case BFD_RELOC_PPC_GOT_DTPREL16_LO: r = R_PPC64_GOT_DTPREL16_LO_DS;
2005 break;
2006 case BFD_RELOC_PPC_GOT_DTPREL16_HI: r = R_PPC64_GOT_DTPREL16_HI;
2007 break;
2008 case BFD_RELOC_PPC_GOT_DTPREL16_HA: r = R_PPC64_GOT_DTPREL16_HA;
2009 break;
2010 case BFD_RELOC_PPC64_TPREL16_DS: r = R_PPC64_TPREL16_DS;
2011 break;
2012 case BFD_RELOC_PPC64_TPREL16_LO_DS: r = R_PPC64_TPREL16_LO_DS;
2013 break;
2014 case BFD_RELOC_PPC64_TPREL16_HIGHER: r = R_PPC64_TPREL16_HIGHER;
2015 break;
2016 case BFD_RELOC_PPC64_TPREL16_HIGHERA: r = R_PPC64_TPREL16_HIGHERA;
2017 break;
2018 case BFD_RELOC_PPC64_TPREL16_HIGHEST: r = R_PPC64_TPREL16_HIGHEST;
2019 break;
2020 case BFD_RELOC_PPC64_TPREL16_HIGHESTA: r = R_PPC64_TPREL16_HIGHESTA;
2021 break;
2022 case BFD_RELOC_PPC64_DTPREL16_DS: r = R_PPC64_DTPREL16_DS;
2023 break;
2024 case BFD_RELOC_PPC64_DTPREL16_LO_DS: r = R_PPC64_DTPREL16_LO_DS;
2025 break;
2026 case BFD_RELOC_PPC64_DTPREL16_HIGHER: r = R_PPC64_DTPREL16_HIGHER;
2027 break;
2028 case BFD_RELOC_PPC64_DTPREL16_HIGHERA: r = R_PPC64_DTPREL16_HIGHERA;
2029 break;
2030 case BFD_RELOC_PPC64_DTPREL16_HIGHEST: r = R_PPC64_DTPREL16_HIGHEST;
2031 break;
2032 case BFD_RELOC_PPC64_DTPREL16_HIGHESTA: r = R_PPC64_DTPREL16_HIGHESTA;
2033 break;
2034 case BFD_RELOC_VTABLE_INHERIT: r = R_PPC64_GNU_VTINHERIT;
2035 break;
2036 case BFD_RELOC_VTABLE_ENTRY: r = R_PPC64_GNU_VTENTRY;
5bd4f169
AM
2037 break;
2038 }
2039
411e1bfb 2040 return ppc64_elf_howto_table[(int) r];
5bd4f169
AM
2041};
2042
2043/* Set the howto pointer for a PowerPC ELF reloc. */
2044
2045static void
2046ppc64_elf_info_to_howto (abfd, cache_ptr, dst)
2047 bfd *abfd ATTRIBUTE_UNUSED;
2048 arelent *cache_ptr;
947216bf 2049 Elf_Internal_Rela *dst;
5bd4f169 2050{
65f38f15
AM
2051 unsigned int type;
2052
ef60b7ff 2053 /* Initialize howto table if needed. */
5bd4f169 2054 if (!ppc64_elf_howto_table[R_PPC64_ADDR32])
5bd4f169
AM
2055 ppc_howto_init ();
2056
65f38f15
AM
2057 type = ELF64_R_TYPE (dst->r_info);
2058 BFD_ASSERT (type < (sizeof (ppc64_elf_howto_table)
2059 / sizeof (ppc64_elf_howto_table[0])));
2060 cache_ptr->howto = ppc64_elf_howto_table[type];
5bd4f169
AM
2061}
2062
04c9666a 2063/* Handle the R_PPC64_ADDR16_HA and similar relocs. */
5bd4f169
AM
2064
2065static bfd_reloc_status_type
805fc799
AM
2066ppc64_elf_ha_reloc (abfd, reloc_entry, symbol, data,
2067 input_section, output_bfd, error_message)
2068 bfd *abfd;
5bd4f169
AM
2069 arelent *reloc_entry;
2070 asymbol *symbol;
805fc799 2071 PTR data;
5bd4f169
AM
2072 asection *input_section;
2073 bfd *output_bfd;
805fc799 2074 char **error_message;
5bd4f169 2075{
805fc799
AM
2076 /* If this is a relocatable link (output_bfd test tells us), just
2077 call the generic function. Any adjustment will be done at final
2078 link time. */
2079 if (output_bfd != NULL)
cedb70c5 2080 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
805fc799
AM
2081 input_section, output_bfd, error_message);
2082
2083 /* Adjust the addend for sign extension of the low 16 bits.
2084 We won't actually be using the low 16 bits, so trashing them
2085 doesn't matter. */
2086 reloc_entry->addend += 0x8000;
2087 return bfd_reloc_continue;
2088}
5bd4f169 2089
805fc799
AM
2090static bfd_reloc_status_type
2091ppc64_elf_brtaken_reloc (abfd, reloc_entry, symbol, data,
2092 input_section, output_bfd, error_message)
2093 bfd *abfd;
2094 arelent *reloc_entry;
2095 asymbol *symbol;
2096 PTR data;
2097 asection *input_section;
2098 bfd *output_bfd;
2099 char **error_message;
2100{
2101 long insn;
04c9666a 2102 enum elf_ppc64_reloc_type r_type;
805fc799
AM
2103 bfd_size_type octets;
2104 /* Disabled until we sort out how ld should choose 'y' vs 'at'. */
b34976b6 2105 bfd_boolean is_power4 = FALSE;
805fc799
AM
2106
2107 /* If this is a relocatable link (output_bfd test tells us), just
2108 call the generic function. Any adjustment will be done at final
2109 link time. */
5bd4f169 2110 if (output_bfd != NULL)
cedb70c5 2111 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
805fc799
AM
2112 input_section, output_bfd, error_message);
2113
2114 octets = reloc_entry->address * bfd_octets_per_byte (abfd);
2115 insn = bfd_get_32 (abfd, (bfd_byte *) data + octets);
2116 insn &= ~(0x01 << 21);
04c9666a 2117 r_type = (enum elf_ppc64_reloc_type) reloc_entry->howto->type;
805fc799
AM
2118 if (r_type == R_PPC64_ADDR14_BRTAKEN
2119 || r_type == R_PPC64_REL14_BRTAKEN)
cedb70c5 2120 insn |= 0x01 << 21; /* 'y' or 't' bit, lowest bit of BO field. */
805fc799
AM
2121
2122 if (is_power4)
5bd4f169 2123 {
805fc799
AM
2124 /* Set 'a' bit. This is 0b00010 in BO field for branch
2125 on CR(BI) insns (BO == 001at or 011at), and 0b01000
2126 for branch on CTR insns (BO == 1a00t or 1a01t). */
2127 if ((insn & (0x14 << 21)) == (0x04 << 21))
2128 insn |= 0x02 << 21;
2129 else if ((insn & (0x14 << 21)) == (0x10 << 21))
2130 insn |= 0x08 << 21;
2131 else
2132 return bfd_reloc_continue;
5bd4f169 2133 }
805fc799
AM
2134 else
2135 {
2136 bfd_vma target = 0;
2137 bfd_vma from;
5bd4f169 2138
805fc799
AM
2139 if (!bfd_is_com_section (symbol->section))
2140 target = symbol->value;
2141 target += symbol->section->output_section->vma;
2142 target += symbol->section->output_offset;
2143 target += reloc_entry->addend;
5bd4f169 2144
805fc799
AM
2145 from = (reloc_entry->address
2146 + input_section->output_offset
2147 + input_section->output_section->vma);
5bd4f169 2148
805fc799
AM
2149 /* Invert 'y' bit if not the default. */
2150 if ((bfd_signed_vma) (target - from) < 0)
2151 insn ^= 0x01 << 21;
2152 }
2153 bfd_put_32 (abfd, (bfd_vma) insn, (bfd_byte *) data + octets);
2154 return bfd_reloc_continue;
2155}
5bd4f169 2156
805fc799
AM
2157static bfd_reloc_status_type
2158ppc64_elf_sectoff_reloc (abfd, reloc_entry, symbol, data,
2159 input_section, output_bfd, error_message)
2160 bfd *abfd;
2161 arelent *reloc_entry;
2162 asymbol *symbol;
2163 PTR data;
2164 asection *input_section;
2165 bfd *output_bfd;
2166 char **error_message;
2167{
2168 /* If this is a relocatable link (output_bfd test tells us), just
2169 call the generic function. Any adjustment will be done at final
2170 link time. */
2171 if (output_bfd != NULL)
cedb70c5 2172 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
805fc799 2173 input_section, output_bfd, error_message);
5bd4f169 2174
805fc799
AM
2175 /* Subtract the symbol section base address. */
2176 reloc_entry->addend -= symbol->section->output_section->vma;
5bd4f169
AM
2177 return bfd_reloc_continue;
2178}
2179
805fc799
AM
2180static bfd_reloc_status_type
2181ppc64_elf_sectoff_ha_reloc (abfd, reloc_entry, symbol, data,
2182 input_section, output_bfd, error_message)
2183 bfd *abfd;
2184 arelent *reloc_entry;
2185 asymbol *symbol;
2186 PTR data;
2187 asection *input_section;
2188 bfd *output_bfd;
2189 char **error_message;
2190{
2191 /* If this is a relocatable link (output_bfd test tells us), just
2192 call the generic function. Any adjustment will be done at final
2193 link time. */
2194 if (output_bfd != NULL)
cedb70c5 2195 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
805fc799
AM
2196 input_section, output_bfd, error_message);
2197
2198 /* Subtract the symbol section base address. */
2199 reloc_entry->addend -= symbol->section->output_section->vma;
2200
2201 /* Adjust the addend for sign extension of the low 16 bits. */
2202 reloc_entry->addend += 0x8000;
2203 return bfd_reloc_continue;
2204}
2205
2206static bfd_reloc_status_type
2207ppc64_elf_toc_reloc (abfd, reloc_entry, symbol, data,
2208 input_section, output_bfd, error_message)
2209 bfd *abfd;
2210 arelent *reloc_entry;
2211 asymbol *symbol;
2212 PTR data;
2213 asection *input_section;
2214 bfd *output_bfd;
2215 char **error_message;
2216{
2217 bfd_vma TOCstart;
2218
2219 /* If this is a relocatable link (output_bfd test tells us), just
2220 call the generic function. Any adjustment will be done at final
2221 link time. */
2222 if (output_bfd != NULL)
cedb70c5 2223 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
805fc799
AM
2224 input_section, output_bfd, error_message);
2225
2226 TOCstart = _bfd_get_gp_value (input_section->output_section->owner);
2227 if (TOCstart == 0)
2228 TOCstart = ppc64_elf_toc (input_section->output_section->owner);
2229
2230 /* Subtract the TOC base address. */
2231 reloc_entry->addend -= TOCstart + TOC_BASE_OFF;
2232 return bfd_reloc_continue;
2233}
2234
2235static bfd_reloc_status_type
2236ppc64_elf_toc_ha_reloc (abfd, reloc_entry, symbol, data,
2237 input_section, output_bfd, error_message)
2238 bfd *abfd;
2239 arelent *reloc_entry;
2240 asymbol *symbol;
2241 PTR data;
2242 asection *input_section;
2243 bfd *output_bfd;
2244 char **error_message;
2245{
2246 bfd_vma TOCstart;
2247
2248 /* If this is a relocatable link (output_bfd test tells us), just
2249 call the generic function. Any adjustment will be done at final
2250 link time. */
2251 if (output_bfd != NULL)
cedb70c5 2252 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
805fc799
AM
2253 input_section, output_bfd, error_message);
2254
2255 TOCstart = _bfd_get_gp_value (input_section->output_section->owner);
2256 if (TOCstart == 0)
2257 TOCstart = ppc64_elf_toc (input_section->output_section->owner);
2258
2259 /* Subtract the TOC base address. */
2260 reloc_entry->addend -= TOCstart + TOC_BASE_OFF;
2261
2262 /* Adjust the addend for sign extension of the low 16 bits. */
2263 reloc_entry->addend += 0x8000;
2264 return bfd_reloc_continue;
2265}
2266
2267static bfd_reloc_status_type
2268ppc64_elf_toc64_reloc (abfd, reloc_entry, symbol, data,
2269 input_section, output_bfd, error_message)
2270 bfd *abfd;
2271 arelent *reloc_entry;
2272 asymbol *symbol;
2273 PTR data;
2274 asection *input_section;
2275 bfd *output_bfd;
2276 char **error_message;
2277{
2278 bfd_vma TOCstart;
2279 bfd_size_type octets;
2280
2281 /* If this is a relocatable link (output_bfd test tells us), just
2282 call the generic function. Any adjustment will be done at final
2283 link time. */
2284 if (output_bfd != NULL)
cedb70c5 2285 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
805fc799
AM
2286 input_section, output_bfd, error_message);
2287
2288 TOCstart = _bfd_get_gp_value (input_section->output_section->owner);
2289 if (TOCstart == 0)
2290 TOCstart = ppc64_elf_toc (input_section->output_section->owner);
2291
2292 octets = reloc_entry->address * bfd_octets_per_byte (abfd);
2293 bfd_put_64 (abfd, TOCstart + TOC_BASE_OFF, (bfd_byte *) data + octets);
2294 return bfd_reloc_ok;
2295}
2296
2297static bfd_reloc_status_type
2298ppc64_elf_unhandled_reloc (abfd, reloc_entry, symbol, data,
2299 input_section, output_bfd, error_message)
2300 bfd *abfd;
2301 arelent *reloc_entry;
2302 asymbol *symbol;
2303 PTR data;
2304 asection *input_section;
2305 bfd *output_bfd;
2306 char **error_message;
2307{
2308 /* If this is a relocatable link (output_bfd test tells us), just
2309 call the generic function. Any adjustment will be done at final
2310 link time. */
2311 if (output_bfd != NULL)
cedb70c5 2312 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
805fc799
AM
2313 input_section, output_bfd, error_message);
2314
2315 if (error_message != NULL)
2316 {
2317 static char buf[60];
2318 sprintf (buf, "generic linker can't handle %s",
2319 reloc_entry->howto->name);
2320 *error_message = buf;
2321 }
2322 return bfd_reloc_dangerous;
2323}
2324
feee612b
AM
2325/* Fix bad default arch selected for a 64 bit input bfd when the
2326 default is 32 bit. */
2327
b34976b6 2328static bfd_boolean
feee612b
AM
2329ppc64_elf_object_p (abfd)
2330 bfd *abfd;
2331{
2332 if (abfd->arch_info->the_default && abfd->arch_info->bits_per_word == 32)
2333 {
2334 Elf_Internal_Ehdr *i_ehdr = elf_elfheader (abfd);
2335
2336 if (i_ehdr->e_ident[EI_CLASS] == ELFCLASS64)
2337 {
2338 /* Relies on arch after 32 bit default being 64 bit default. */
2339 abfd->arch_info = abfd->arch_info->next;
2340 BFD_ASSERT (abfd->arch_info->bits_per_word == 64);
2341 }
2342 }
b34976b6 2343 return TRUE;
feee612b
AM
2344}
2345
5bd4f169
AM
2346/* Merge backend specific data from an object file to the output
2347 object file when linking. */
2f6d9989 2348
b34976b6 2349static bfd_boolean
5bd4f169
AM
2350ppc64_elf_merge_private_bfd_data (ibfd, obfd)
2351 bfd *ibfd;
2352 bfd *obfd;
2353{
5bd4f169
AM
2354 /* Check if we have the same endianess. */
2355 if (ibfd->xvec->byteorder != obfd->xvec->byteorder
87e226ce 2356 && ibfd->xvec->byteorder != BFD_ENDIAN_UNKNOWN
5bd4f169
AM
2357 && obfd->xvec->byteorder != BFD_ENDIAN_UNKNOWN)
2358 {
2359 const char *msg;
2360
2361 if (bfd_big_endian (ibfd))
2362 msg = _("%s: compiled for a big endian system and target is little endian");
2363 else
2364 msg = _("%s: compiled for a little endian system and target is big endian");
2365
8f615d07 2366 (*_bfd_error_handler) (msg, bfd_archive_filename (ibfd));
5bd4f169
AM
2367
2368 bfd_set_error (bfd_error_wrong_format);
b34976b6 2369 return FALSE;
5bd4f169
AM
2370 }
2371
b34976b6 2372 return TRUE;
5bd4f169 2373}
f0abc2a1
AM
2374
2375struct _ppc64_elf_section_data
2376{
2377 struct bfd_elf_section_data elf;
411e1bfb
AM
2378
2379 /* An array with one entry for each opd function descriptor. */
f0abc2a1
AM
2380 union
2381 {
411e1bfb 2382 /* Points to the function code section for local opd entries. */
f0abc2a1 2383 asection **func_sec;
411e1bfb 2384 /* After editing .opd, adjust references to opd local syms. */
f0abc2a1
AM
2385 long *adjust;
2386 } opd;
411e1bfb
AM
2387
2388 /* An array for toc sections, indexed by offset/8.
2389 Specifies the relocation symbol index used at a given toc offset. */
2390 unsigned *t_symndx;
f0abc2a1
AM
2391};
2392
2393#define ppc64_elf_section_data(sec) \
411e1bfb 2394 ((struct _ppc64_elf_section_data *) elf_section_data (sec))
f0abc2a1
AM
2395
2396static bfd_boolean
2397ppc64_elf_new_section_hook (abfd, sec)
2398 bfd *abfd;
2399 asection *sec;
2400{
2401 struct _ppc64_elf_section_data *sdata;
2402 bfd_size_type amt = sizeof (*sdata);
2403
2404 sdata = (struct _ppc64_elf_section_data *) bfd_zalloc (abfd, amt);
2405 if (sdata == NULL)
2406 return FALSE;
2407 sec->used_by_bfd = (PTR) sdata;
2408
2409 return _bfd_elf_new_section_hook (abfd, sec);
2410}
5bd4f169 2411\f
65f38f15
AM
2412/* The following functions are specific to the ELF linker, while
2413 functions above are used generally. Those named ppc64_elf_* are
2414 called by the main ELF linker code. They appear in this file more
2415 or less in the order in which they are called. eg.
2416 ppc64_elf_check_relocs is called early in the link process,
2417 ppc64_elf_finish_dynamic_sections is one of the last functions
e86ce104
AM
2418 called.
2419
2420 PowerPC64-ELF uses a similar scheme to PowerPC64-XCOFF in that
2421 functions have both a function code symbol and a function descriptor
2422 symbol. A call to foo in a relocatable object file looks like:
2423
2424 . .text
2425 . x:
2426 . bl .foo
2427 . nop
2428
2429 The function definition in another object file might be:
2430
2431 . .section .opd
2432 . foo: .quad .foo
2433 . .quad .TOC.@tocbase
2434 . .quad 0
2435 .
2436 . .text
2437 . .foo: blr
2438
2439 When the linker resolves the call during a static link, the branch
2440 unsurprisingly just goes to .foo and the .opd information is unused.
2441 If the function definition is in a shared library, things are a little
2442 different: The call goes via a plt call stub, the opd information gets
2443 copied to the plt, and the linker patches the nop.
2444
2445 . x:
2446 . bl .foo_stub
2447 . ld 2,40(1)
2448 .
2449 .
2450 . .foo_stub:
2451 . addis 12,2,Lfoo@toc@ha # in practice, the call stub
411e1bfb 2452 . addi 12,12,Lfoo@toc@l # is slightly optimized, but
e86ce104
AM
2453 . std 2,40(1) # this is the general idea
2454 . ld 11,0(12)
2455 . ld 2,8(12)
2456 . mtctr 11
2457 . ld 11,16(12)
2458 . bctr
2459 .
2460 . .section .plt
2461 . Lfoo: reloc (R_PPC64_JMP_SLOT, foo)
2462
2463 The "reloc ()" notation is supposed to indicate that the linker emits
2464 an R_PPC64_JMP_SLOT reloc against foo. The dynamic linker does the opd
2465 copying.
2466
2467 What are the difficulties here? Well, firstly, the relocations
2468 examined by the linker in check_relocs are against the function code
2469 sym .foo, while the dynamic relocation in the plt is emitted against
2470 the function descriptor symbol, foo. Somewhere along the line, we need
2471 to carefully copy dynamic link information from one symbol to the other.
2472 Secondly, the generic part of the elf linker will make .foo a dynamic
2473 symbol as is normal for most other backends. We need foo dynamic
2474 instead, at least for an application final link. However, when
2475 creating a shared library containing foo, we need to have both symbols
2476 dynamic so that references to .foo are satisfied during the early
2477 stages of linking. Otherwise the linker might decide to pull in a
41bd81ab 2478 definition from some other object, eg. a static library. */
65f38f15
AM
2479
2480/* The linker needs to keep track of the number of relocs that it
2481 decides to copy as dynamic relocs in check_relocs for each symbol.
2482 This is so that it can later discard them if they are found to be
2483 unnecessary. We store the information in a field extending the
2484 regular ELF linker hash table. */
2485
2486struct ppc_dyn_relocs
2487{
2488 struct ppc_dyn_relocs *next;
2489
2490 /* The input section of the reloc. */
2491 asection *sec;
2492
2493 /* Total number of relocs copied for the input section. */
2494 bfd_size_type count;
2495
2496 /* Number of pc-relative relocs copied for the input section. */
2497 bfd_size_type pc_count;
2498};
2499
411e1bfb
AM
2500/* Track GOT entries needed for a given symbol. We might need more
2501 than one got entry per symbol. */
2502struct got_entry
2503{
2504 struct got_entry *next;
2505
e7b938ca 2506 /* The symbol addend that we'll be placing in the GOT. */
411e1bfb
AM
2507 bfd_vma addend;
2508
e7b938ca 2509 /* Reference count until size_dynamic_sections, GOT offset thereafter. */
411e1bfb
AM
2510 union
2511 {
2512 bfd_signed_vma refcount;
2513 bfd_vma offset;
2514 } got;
2515
e7b938ca
AM
2516 /* Zero for non-tls entries, or TLS_TLS and one of TLS_GD, TLS_LD,
2517 TLS_TPREL or TLS_DTPREL for tls entries. */
411e1bfb
AM
2518 char tls_type;
2519};
2520
2521/* The same for PLT. */
2522struct plt_entry
2523{
2524 struct plt_entry *next;
2525
2526 bfd_vma addend;
2527
2528 union
2529 {
2530 bfd_signed_vma refcount;
2531 bfd_vma offset;
2532 } plt;
2533};
2534
65f38f15 2535/* Of those relocs that might be copied as dynamic relocs, this macro
58ac9f71
AM
2536 selects those that must be copied when linking a shared library,
2537 even when the symbol is local. */
65f38f15 2538
411e1bfb 2539#define MUST_BE_DYN_RELOC(RTYPE) \
805fc799
AM
2540 ((RTYPE) != R_PPC64_REL32 \
2541 && (RTYPE) != R_PPC64_REL64 \
04c9666a 2542 && (RTYPE) != R_PPC64_REL30)
65f38f15 2543
f4656909
AM
2544/* If ELIMINATE_COPY_RELOCS is non-zero, the linker will try to avoid
2545 copying dynamic variables from a shared lib into an app's dynbss
2546 section, and instead use a dynamic relocation to point into the
2547 shared lib. */
a23b6845 2548#define ELIMINATE_COPY_RELOCS 1
f4656909 2549
721956f4
AM
2550/* Section name for stubs is the associated section name plus this
2551 string. */
2552#define STUB_SUFFIX ".stub"
2553
2554/* Linker stubs.
2555 ppc_stub_long_branch:
2556 Used when a 14 bit branch (or even a 24 bit branch) can't reach its
2557 destination, but a 24 bit branch in a stub section will reach.
2558 . b dest
2559
2560 ppc_stub_plt_branch:
2561 Similar to the above, but a 24 bit branch in the stub section won't
2562 reach its destination.
87e226ce
AM
2563 . addis %r12,%r2,xxx@toc@ha
2564 . ld %r11,xxx@toc@l(%r12)
721956f4
AM
2565 . mtctr %r11
2566 . bctr
2567
2568 ppc_stub_plt_call:
2569 Used to call a function in a shared library.
87e226ce 2570 . addis %r12,%r2,xxx@toc@ha
721956f4 2571 . std %r2,40(%r1)
87e226ce
AM
2572 . ld %r11,xxx+0@toc@l(%r12)
2573 . ld %r2,xxx+8@toc@l(%r12)
721956f4 2574 . mtctr %r11
87e226ce 2575 . ld %r11,xxx+16@toc@l(%r12)
721956f4
AM
2576 . bctr
2577*/
2578
2579enum ppc_stub_type {
2580 ppc_stub_none,
2581 ppc_stub_long_branch,
2582 ppc_stub_plt_branch,
2583 ppc_stub_plt_call
2584};
2585
2586struct ppc_stub_hash_entry {
2587
2588 /* Base hash table entry structure. */
2589 struct bfd_hash_entry root;
2590
2591 /* The stub section. */
2592 asection *stub_sec;
2593
2594 /* Offset within stub_sec of the beginning of this stub. */
2595 bfd_vma stub_offset;
2596
2597 /* Given the symbol's value and its section we can determine its final
2598 value when building the stubs (so the stub knows where to jump. */
2599 bfd_vma target_value;
2600 asection *target_section;
2601
2602 enum ppc_stub_type stub_type;
2603
2604 /* The symbol table entry, if any, that this was derived from. */
2605 struct ppc_link_hash_entry *h;
2606
411e1bfb
AM
2607 /* And the reloc addend that this was derived from. */
2608 bfd_vma addend;
2609
721956f4
AM
2610 /* Where this stub is being called from, or, in the case of combined
2611 stub sections, the first input section in the group. */
2612 asection *id_sec;
2613};
2614
2615struct ppc_branch_hash_entry {
2616
2617 /* Base hash table entry structure. */
2618 struct bfd_hash_entry root;
2619
2620 /* Offset within .branch_lt. */
2621 unsigned int offset;
2622
2623 /* Generation marker. */
2624 unsigned int iter;
2625};
65f38f15
AM
2626
2627struct ppc_link_hash_entry
2628{
2629 struct elf_link_hash_entry elf;
2630
721956f4
AM
2631 /* A pointer to the most recently used stub hash entry against this
2632 symbol. */
2633 struct ppc_stub_hash_entry *stub_cache;
2634
65f38f15
AM
2635 /* Track dynamic relocs copied for this symbol. */
2636 struct ppc_dyn_relocs *dyn_relocs;
e86ce104 2637
721956f4
AM
2638 /* Link between function code and descriptor symbols. */
2639 struct elf_link_hash_entry *oh;
2640
e86ce104
AM
2641 /* Flag function code and descriptor symbols. */
2642 unsigned int is_func:1;
2643 unsigned int is_func_descriptor:1;
1e2f5b6e 2644 unsigned int is_entry:1;
411e1bfb
AM
2645
2646 /* Contexts in which symbol is used in the GOT (or TOC).
e7b938ca
AM
2647 TLS_GD .. TLS_EXPLICIT bits are or'd into the mask as the
2648 corresponding relocs are encountered during check_relocs.
2649 tls_optimize clears TLS_GD .. TLS_TPREL when optimizing to
2650 indicate the corresponding GOT entry type is not needed.
2651 tls_optimize may also set TLS_TPRELGD when a GD reloc turns into
2652 a TPREL one. We use a separate flag rather than setting TPREL
2653 just for convenience in distinguishing the two cases. */
2654#define TLS_GD 1 /* GD reloc. */
2655#define TLS_LD 2 /* LD reloc. */
2656#define TLS_TPREL 4 /* TPREL reloc, => IE. */
2657#define TLS_DTPREL 8 /* DTPREL reloc, => LD. */
2658#define TLS_TLS 16 /* Any TLS reloc. */
2659#define TLS_EXPLICIT 32 /* Marks TOC section TLS relocs. */
2660#define TLS_TPRELGD 64 /* TPREL reloc resulting from GD->IE. */
2661 char tls_mask;
65f38f15
AM
2662};
2663
2664/* ppc64 ELF linker hash table. */
2665
2666struct ppc_link_hash_table
2667{
2668 struct elf_link_hash_table elf;
2669
721956f4
AM
2670 /* The stub hash table. */
2671 struct bfd_hash_table stub_hash_table;
2672
2673 /* Another hash table for plt_branch stubs. */
2674 struct bfd_hash_table branch_hash_table;
2675
2676 /* Linker stub bfd. */
2677 bfd *stub_bfd;
2678
2679 /* Linker call-backs. */
2680 asection * (*add_stub_section) PARAMS ((const char *, asection *));
2681 void (*layout_sections_again) PARAMS ((void));
2682
2683 /* Array to keep track of which stub sections have been created, and
2684 information on stub grouping. */
2685 struct map_stub {
2686 /* This is the section to which stubs in the group will be attached. */
2687 asection *link_sec;
2688 /* The stub section. */
2689 asection *stub_sec;
2690 } *stub_group;
2691
2692 /* Assorted information used by ppc64_elf_size_stubs. */
721956f4
AM
2693 int top_index;
2694 asection **input_list;
721956f4 2695
65f38f15
AM
2696 /* Short-cuts to get to dynamic linker sections. */
2697 asection *sgot;
2698 asection *srelgot;
2699 asection *splt;
2700 asection *srelplt;
2701 asection *sdynbss;
2702 asection *srelbss;
2703 asection *sglink;
82bd7b59 2704 asection *sfpr;
721956f4
AM
2705 asection *sbrlt;
2706 asection *srelbrlt;
ec338859 2707
411e1bfb
AM
2708 /* Short-cut to first output tls section. */
2709 asection *tls_sec;
2710
2711 /* Shortcut to .__tls_get_addr. */
2712 struct elf_link_hash_entry *tls_get_addr;
2713
2714 /* TLS local dynamic got entry handling. */
2715 union {
2716 bfd_signed_vma refcount;
2717 bfd_vma offset;
2718 } tlsld_got;
2719
5d1634d7 2720 /* Set on error. */
721956f4
AM
2721 unsigned int stub_error;
2722
2723 /* Flag set when small branches are detected. Used to
2724 select suitable defaults for the stub group size. */
2725 unsigned int has_14bit_branch;
2726
805fc799
AM
2727 /* Set if we detect a reference undefined weak symbol. */
2728 unsigned int have_undefweak;
2729
721956f4
AM
2730 /* Incremented every time we size stubs. */
2731 unsigned int stub_iteration;
5d1634d7 2732
ec338859
AM
2733 /* Small local sym to section mapping cache. */
2734 struct sym_sec_cache sym_sec;
65f38f15
AM
2735};
2736
721956f4
AM
2737static struct bfd_hash_entry *stub_hash_newfunc
2738 PARAMS ((struct bfd_hash_entry *, struct bfd_hash_table *, const char *));
2739static struct bfd_hash_entry *branch_hash_newfunc
2740 PARAMS ((struct bfd_hash_entry *, struct bfd_hash_table *, const char *));
2741static struct bfd_hash_entry *link_hash_newfunc
2742 PARAMS ((struct bfd_hash_entry *, struct bfd_hash_table *, const char *));
2743static struct bfd_link_hash_table *ppc64_elf_link_hash_table_create
2744 PARAMS ((bfd *));
2745static void ppc64_elf_link_hash_table_free
2746 PARAMS ((struct bfd_link_hash_table *));
2747static char *ppc_stub_name
2748 PARAMS ((const asection *, const asection *,
2749 const struct ppc_link_hash_entry *, const Elf_Internal_Rela *));
2750static struct ppc_stub_hash_entry *ppc_get_stub_entry
2751 PARAMS ((const asection *, const asection *, struct elf_link_hash_entry *,
2752 const Elf_Internal_Rela *, struct ppc_link_hash_table *));
2753static struct ppc_stub_hash_entry *ppc_add_stub
2754 PARAMS ((const char *, asection *, struct ppc_link_hash_table *));
b34976b6 2755static bfd_boolean create_linkage_sections
721956f4 2756 PARAMS ((bfd *, struct bfd_link_info *));
b34976b6 2757static bfd_boolean create_got_section
721956f4 2758 PARAMS ((bfd *, struct bfd_link_info *));
b34976b6 2759static bfd_boolean ppc64_elf_create_dynamic_sections
721956f4
AM
2760 PARAMS ((bfd *, struct bfd_link_info *));
2761static void ppc64_elf_copy_indirect_symbol
b48fa14c
AM
2762 PARAMS ((struct elf_backend_data *, struct elf_link_hash_entry *,
2763 struct elf_link_hash_entry *));
411e1bfb
AM
2764static bfd_boolean update_local_sym_info
2765 PARAMS ((bfd *, Elf_Internal_Shdr *, unsigned long, bfd_vma, int));
2766static bfd_boolean update_plt_info
2767 PARAMS ((bfd *, struct ppc_link_hash_entry *, bfd_vma));
b34976b6 2768static bfd_boolean ppc64_elf_check_relocs
721956f4
AM
2769 PARAMS ((bfd *, struct bfd_link_info *, asection *,
2770 const Elf_Internal_Rela *));
2771static asection * ppc64_elf_gc_mark_hook
1e2f5b6e
AM
2772 PARAMS ((asection *, struct bfd_link_info *, Elf_Internal_Rela *,
2773 struct elf_link_hash_entry *, Elf_Internal_Sym *));
b34976b6 2774static bfd_boolean ppc64_elf_gc_sweep_hook
1e2f5b6e
AM
2775 PARAMS ((bfd *, struct bfd_link_info *, asection *,
2776 const Elf_Internal_Rela *));
b34976b6 2777static bfd_boolean func_desc_adjust
721956f4 2778 PARAMS ((struct elf_link_hash_entry *, PTR));
b34976b6 2779static bfd_boolean ppc64_elf_func_desc_adjust
721956f4 2780 PARAMS ((bfd *, struct bfd_link_info *));
b34976b6 2781static bfd_boolean ppc64_elf_adjust_dynamic_symbol
721956f4
AM
2782 PARAMS ((struct bfd_link_info *, struct elf_link_hash_entry *));
2783static void ppc64_elf_hide_symbol
b34976b6 2784 PARAMS ((struct bfd_link_info *, struct elf_link_hash_entry *, bfd_boolean));
411e1bfb
AM
2785static bfd_boolean get_sym_h
2786 PARAMS ((struct elf_link_hash_entry **, Elf_Internal_Sym **, asection **,
2787 char **, Elf_Internal_Sym **, unsigned long, bfd *));
e7b938ca 2788static int get_tls_mask
411e1bfb 2789 PARAMS ((char **, Elf_Internal_Sym **, const Elf_Internal_Rela *, bfd *));
b34976b6 2790static bfd_boolean allocate_dynrelocs
721956f4 2791 PARAMS ((struct elf_link_hash_entry *, PTR));
b34976b6 2792static bfd_boolean readonly_dynrelocs
721956f4
AM
2793 PARAMS ((struct elf_link_hash_entry *, PTR));
2794static enum elf_reloc_type_class ppc64_elf_reloc_type_class
2795 PARAMS ((const Elf_Internal_Rela *));
b34976b6 2796static bfd_boolean ppc64_elf_size_dynamic_sections
721956f4 2797 PARAMS ((bfd *, struct bfd_link_info *));
411e1bfb 2798static enum ppc_stub_type ppc_type_of_stub
721956f4
AM
2799 PARAMS ((asection *, const Elf_Internal_Rela *,
2800 struct ppc_link_hash_entry **, bfd_vma));
2801static bfd_byte *build_plt_stub
2802 PARAMS ((bfd *, bfd_byte *, int, int));
b34976b6 2803static bfd_boolean ppc_build_one_stub
721956f4 2804 PARAMS ((struct bfd_hash_entry *, PTR));
b34976b6 2805static bfd_boolean ppc_size_one_stub
721956f4
AM
2806 PARAMS ((struct bfd_hash_entry *, PTR));
2807static void group_sections
b34976b6
AM
2808 PARAMS ((struct ppc_link_hash_table *, bfd_size_type, bfd_boolean));
2809static bfd_boolean ppc64_elf_relocate_section
721956f4
AM
2810 PARAMS ((bfd *, struct bfd_link_info *info, bfd *, asection *, bfd_byte *,
2811 Elf_Internal_Rela *relocs, Elf_Internal_Sym *local_syms,
2812 asection **));
b34976b6 2813static bfd_boolean ppc64_elf_finish_dynamic_symbol
721956f4
AM
2814 PARAMS ((bfd *, struct bfd_link_info *, struct elf_link_hash_entry *,
2815 Elf_Internal_Sym *));
b34976b6 2816static bfd_boolean ppc64_elf_finish_dynamic_sections
721956f4
AM
2817 PARAMS ((bfd *, struct bfd_link_info *));
2818
65f38f15
AM
2819/* Get the ppc64 ELF linker hash table from a link_info structure. */
2820
2821#define ppc_hash_table(p) \
2822 ((struct ppc_link_hash_table *) ((p)->hash))
2823
721956f4
AM
2824#define ppc_stub_hash_lookup(table, string, create, copy) \
2825 ((struct ppc_stub_hash_entry *) \
2826 bfd_hash_lookup ((table), (string), (create), (copy)))
2827
2828#define ppc_branch_hash_lookup(table, string, create, copy) \
2829 ((struct ppc_branch_hash_entry *) \
2830 bfd_hash_lookup ((table), (string), (create), (copy)))
2831
2832/* Create an entry in the stub hash table. */
2833
2834static struct bfd_hash_entry *
2835stub_hash_newfunc (entry, table, string)
2836 struct bfd_hash_entry *entry;
2837 struct bfd_hash_table *table;
2838 const char *string;
2839{
2840 /* Allocate the structure if it has not already been allocated by a
2841 subclass. */
2842 if (entry == NULL)
2843 {
2844 entry = bfd_hash_allocate (table, sizeof (struct ppc_stub_hash_entry));
2845 if (entry == NULL)
2846 return entry;
2847 }
2848
2849 /* Call the allocation method of the superclass. */
2850 entry = bfd_hash_newfunc (entry, table, string);
2851 if (entry != NULL)
2852 {
2853 struct ppc_stub_hash_entry *eh;
2854
2855 /* Initialize the local fields. */
2856 eh = (struct ppc_stub_hash_entry *) entry;
2857 eh->stub_sec = NULL;
2858 eh->stub_offset = 0;
2859 eh->target_value = 0;
2860 eh->target_section = NULL;
2861 eh->stub_type = ppc_stub_none;
2862 eh->h = NULL;
2863 eh->id_sec = NULL;
2864 }
2865
2866 return entry;
2867}
2868
2869/* Create an entry in the branch hash table. */
2870
2871static struct bfd_hash_entry *
2872branch_hash_newfunc (entry, table, string)
2873 struct bfd_hash_entry *entry;
2874 struct bfd_hash_table *table;
2875 const char *string;
2876{
2877 /* Allocate the structure if it has not already been allocated by a
2878 subclass. */
2879 if (entry == NULL)
2880 {
2881 entry = bfd_hash_allocate (table, sizeof (struct ppc_branch_hash_entry));
2882 if (entry == NULL)
2883 return entry;
2884 }
2885
2886 /* Call the allocation method of the superclass. */
2887 entry = bfd_hash_newfunc (entry, table, string);
2888 if (entry != NULL)
2889 {
2890 struct ppc_branch_hash_entry *eh;
2891
2892 /* Initialize the local fields. */
2893 eh = (struct ppc_branch_hash_entry *) entry;
2894 eh->offset = 0;
2895 eh->iter = 0;
2896 }
2897
2898 return entry;
2899}
2900
65f38f15
AM
2901/* Create an entry in a ppc64 ELF linker hash table. */
2902
2903static struct bfd_hash_entry *
2904link_hash_newfunc (entry, table, string)
2905 struct bfd_hash_entry *entry;
2906 struct bfd_hash_table *table;
2907 const char *string;
2908{
2909 /* Allocate the structure if it has not already been allocated by a
2910 subclass. */
2911 if (entry == NULL)
2912 {
2913 entry = bfd_hash_allocate (table, sizeof (struct ppc_link_hash_entry));
2914 if (entry == NULL)
2915 return entry;
2916 }
2917
2918 /* Call the allocation method of the superclass. */
2919 entry = _bfd_elf_link_hash_newfunc (entry, table, string);
2920 if (entry != NULL)
2921 {
2922 struct ppc_link_hash_entry *eh = (struct ppc_link_hash_entry *) entry;
2923
721956f4 2924 eh->stub_cache = NULL;
65f38f15 2925 eh->dyn_relocs = NULL;
721956f4 2926 eh->oh = NULL;
e86ce104
AM
2927 eh->is_func = 0;
2928 eh->is_func_descriptor = 0;
1e2f5b6e 2929 eh->is_entry = 0;
e7b938ca 2930 eh->tls_mask = 0;
65f38f15
AM
2931 }
2932
2933 return entry;
2934}
2935
2936/* Create a ppc64 ELF linker hash table. */
2937
2938static struct bfd_link_hash_table *
2939ppc64_elf_link_hash_table_create (abfd)
2940 bfd *abfd;
2941{
2942 struct ppc_link_hash_table *htab;
2943 bfd_size_type amt = sizeof (struct ppc_link_hash_table);
2944
e2d34d7d 2945 htab = (struct ppc_link_hash_table *) bfd_malloc (amt);
65f38f15
AM
2946 if (htab == NULL)
2947 return NULL;
2948
2949 if (! _bfd_elf_link_hash_table_init (&htab->elf, abfd, link_hash_newfunc))
2950 {
e2d34d7d 2951 free (htab);
65f38f15
AM
2952 return NULL;
2953 }
2954
721956f4
AM
2955 /* Init the stub hash table too. */
2956 if (!bfd_hash_table_init (&htab->stub_hash_table, stub_hash_newfunc))
2957 return NULL;
2958
2959 /* And the branch hash table. */
2960 if (!bfd_hash_table_init (&htab->branch_hash_table, branch_hash_newfunc))
2961 return NULL;
2962
2963 htab->stub_bfd = NULL;
2964 htab->add_stub_section = NULL;
2965 htab->layout_sections_again = NULL;
2966 htab->stub_group = NULL;
65f38f15
AM
2967 htab->sgot = NULL;
2968 htab->srelgot = NULL;
2969 htab->splt = NULL;
2970 htab->srelplt = NULL;
2971 htab->sdynbss = NULL;
2972 htab->srelbss = NULL;
2973 htab->sglink = NULL;
82bd7b59 2974 htab->sfpr = NULL;
721956f4
AM
2975 htab->sbrlt = NULL;
2976 htab->srelbrlt = NULL;
411e1bfb 2977 htab->tls_sec = NULL;
58ac9f71 2978 htab->tls_get_addr = NULL;
411e1bfb 2979 htab->tlsld_got.refcount = 0;
721956f4
AM
2980 htab->stub_error = 0;
2981 htab->has_14bit_branch = 0;
805fc799 2982 htab->have_undefweak = 0;
721956f4 2983 htab->stub_iteration = 0;
ec338859 2984 htab->sym_sec.abfd = NULL;
951fd09b
AM
2985 /* Initializing two fields of the union is just cosmetic. We really
2986 only care about glist, but when compiled on a 32-bit host the
2987 bfd_vma fields are larger. Setting the bfd_vma to zero makes
2988 debugger inspection of these fields look nicer. */
2989 htab->elf.init_refcount.refcount = 0;
411e1bfb 2990 htab->elf.init_refcount.glist = NULL;
951fd09b 2991 htab->elf.init_offset.offset = 0;
411e1bfb 2992 htab->elf.init_offset.glist = NULL;
65f38f15
AM
2993
2994 return &htab->elf.root;
2995}
2996
721956f4
AM
2997/* Free the derived linker hash table. */
2998
2999static void
3000ppc64_elf_link_hash_table_free (hash)
3001 struct bfd_link_hash_table *hash;
3002{
3003 struct ppc_link_hash_table *ret = (struct ppc_link_hash_table *) hash;
3004
3005 bfd_hash_table_free (&ret->stub_hash_table);
3006 bfd_hash_table_free (&ret->branch_hash_table);
3007 _bfd_generic_link_hash_table_free (hash);
3008}
3009
3010/* Build a name for an entry in the stub hash table. */
3011
3012static char *
3013ppc_stub_name (input_section, sym_sec, h, rel)
3014 const asection *input_section;
3015 const asection *sym_sec;
3016 const struct ppc_link_hash_entry *h;
3017 const Elf_Internal_Rela *rel;
3018{
3019 char *stub_name;
3020 bfd_size_type len;
3021
3022 /* rel->r_addend is actually 64 bit, but who uses more than +/- 2^31
3023 offsets from a sym as a branch target? In fact, we could
3024 probably assume the addend is always zero. */
3025 BFD_ASSERT (((int) rel->r_addend & 0xffffffff) == rel->r_addend);
3026
3027 if (h)
3028 {
3029 len = 8 + 1 + strlen (h->elf.root.root.string) + 1 + 8 + 1;
3030 stub_name = bfd_malloc (len);
3031 if (stub_name != NULL)
3032 {
3033 sprintf (stub_name, "%08x_%s+%x",
3034 input_section->id & 0xffffffff,
3035 h->elf.root.root.string,
3036 (int) rel->r_addend & 0xffffffff);
3037 }
3038 }
3039 else
3040 {
3041 len = 8 + 1 + 8 + 1 + 8 + 1 + 16 + 1;
3042 stub_name = bfd_malloc (len);
3043 if (stub_name != NULL)
3044 {
3045 sprintf (stub_name, "%08x_%x:%x+%x",
3046 input_section->id & 0xffffffff,
3047 sym_sec->id & 0xffffffff,
3048 (int) ELF64_R_SYM (rel->r_info) & 0xffffffff,
3049 (int) rel->r_addend & 0xffffffff);
3050 }
3051 }
3052 return stub_name;
3053}
3054
3055/* Look up an entry in the stub hash. Stub entries are cached because
3056 creating the stub name takes a bit of time. */
3057
3058static struct ppc_stub_hash_entry *
3059ppc_get_stub_entry (input_section, sym_sec, hash, rel, htab)
3060 const asection *input_section;
3061 const asection *sym_sec;
3062 struct elf_link_hash_entry *hash;
3063 const Elf_Internal_Rela *rel;
3064 struct ppc_link_hash_table *htab;
3065{
3066 struct ppc_stub_hash_entry *stub_entry;
3067 struct ppc_link_hash_entry *h = (struct ppc_link_hash_entry *) hash;
3068 const asection *id_sec;
3069
3070 /* If this input section is part of a group of sections sharing one
3071 stub section, then use the id of the first section in the group.
3072 Stub names need to include a section id, as there may well be
3073 more than one stub used to reach say, printf, and we need to
3074 distinguish between them. */
3075 id_sec = htab->stub_group[input_section->id].link_sec;
3076
3077 if (h != NULL && h->stub_cache != NULL
3078 && h->stub_cache->h == h
3079 && h->stub_cache->id_sec == id_sec)
3080 {
3081 stub_entry = h->stub_cache;
3082 }
3083 else
3084 {
3085 char *stub_name;
3086
3087 stub_name = ppc_stub_name (id_sec, sym_sec, h, rel);
3088 if (stub_name == NULL)
3089 return NULL;
3090
3091 stub_entry = ppc_stub_hash_lookup (&htab->stub_hash_table,
b34976b6 3092 stub_name, FALSE, FALSE);
721956f4
AM
3093 if (h != NULL)
3094 h->stub_cache = stub_entry;
3095
3096 free (stub_name);
3097 }
3098
3099 return stub_entry;
3100}
3101
3102/* Add a new stub entry to the stub hash. Not all fields of the new
3103 stub entry are initialised. */
3104
3105static struct ppc_stub_hash_entry *
3106ppc_add_stub (stub_name, section, htab)
3107 const char *stub_name;
3108 asection *section;
3109 struct ppc_link_hash_table *htab;
3110{
3111 asection *link_sec;
3112 asection *stub_sec;
3113 struct ppc_stub_hash_entry *stub_entry;
3114
3115 link_sec = htab->stub_group[section->id].link_sec;
3116 stub_sec = htab->stub_group[section->id].stub_sec;
3117 if (stub_sec == NULL)
3118 {
3119 stub_sec = htab->stub_group[link_sec->id].stub_sec;
3120 if (stub_sec == NULL)
3121 {
d4c88bbb 3122 size_t namelen;
721956f4
AM
3123 bfd_size_type len;
3124 char *s_name;
3125
d4c88bbb
AM
3126 namelen = strlen (link_sec->name);
3127 len = namelen + sizeof (STUB_SUFFIX);
721956f4
AM
3128 s_name = bfd_alloc (htab->stub_bfd, len);
3129 if (s_name == NULL)
3130 return NULL;
3131
d4c88bbb
AM
3132 memcpy (s_name, link_sec->name, namelen);
3133 memcpy (s_name + namelen, STUB_SUFFIX, sizeof (STUB_SUFFIX));
721956f4
AM
3134 stub_sec = (*htab->add_stub_section) (s_name, link_sec);
3135 if (stub_sec == NULL)
3136 return NULL;
3137 htab->stub_group[link_sec->id].stub_sec = stub_sec;
3138 }
3139 htab->stub_group[section->id].stub_sec = stub_sec;
3140 }
3141
3142 /* Enter this entry into the linker stub hash table. */
3143 stub_entry = ppc_stub_hash_lookup (&htab->stub_hash_table, stub_name,
b34976b6 3144 TRUE, FALSE);
721956f4
AM
3145 if (stub_entry == NULL)
3146 {
3147 (*_bfd_error_handler) (_("%s: cannot create stub entry %s"),
3148 bfd_archive_filename (section->owner),
3149 stub_name);
3150 return NULL;
3151 }
3152
3153 stub_entry->stub_sec = stub_sec;
3154 stub_entry->stub_offset = 0;
3155 stub_entry->id_sec = link_sec;
3156 return stub_entry;
3157}
3158
82bd7b59
AM
3159/* Create sections for linker generated code. */
3160
b34976b6 3161static bfd_boolean
82bd7b59
AM
3162create_linkage_sections (dynobj, info)
3163 bfd *dynobj;
3164 struct bfd_link_info *info;
3165{
3166 struct ppc_link_hash_table *htab;
3167 flagword flags;
3168
3169 htab = ppc_hash_table (info);
3170
3171 /* Create .sfpr for code to save and restore fp regs. */
3172 flags = (SEC_ALLOC | SEC_LOAD | SEC_CODE | SEC_READONLY
3173 | SEC_HAS_CONTENTS | SEC_IN_MEMORY | SEC_LINKER_CREATED);
721956f4 3174 htab->sfpr = bfd_make_section_anyway (dynobj, ".sfpr");
82bd7b59
AM
3175 if (htab->sfpr == NULL
3176 || ! bfd_set_section_flags (dynobj, htab->sfpr, flags)
3177 || ! bfd_set_section_alignment (dynobj, htab->sfpr, 2))
b34976b6 3178 return FALSE;
82bd7b59 3179
721956f4
AM
3180 /* Create .glink for lazy dynamic linking support. */
3181 htab->sglink = bfd_make_section_anyway (dynobj, ".glink");
82bd7b59
AM
3182 if (htab->sglink == NULL
3183 || ! bfd_set_section_flags (dynobj, htab->sglink, flags)
3184 || ! bfd_set_section_alignment (dynobj, htab->sglink, 2))
b34976b6 3185 return FALSE;
82bd7b59 3186
721956f4
AM
3187 /* Create .branch_lt for plt_branch stubs. */
3188 flags = (SEC_ALLOC | SEC_LOAD
3189 | SEC_HAS_CONTENTS | SEC_IN_MEMORY | SEC_LINKER_CREATED);
3190 htab->sbrlt = bfd_make_section_anyway (dynobj, ".branch_lt");
3191 if (htab->sbrlt == NULL
3192 || ! bfd_set_section_flags (dynobj, htab->sbrlt, flags)
3193 || ! bfd_set_section_alignment (dynobj, htab->sbrlt, 3))
b34976b6 3194 return FALSE;
721956f4
AM
3195
3196 if (info->shared)
3197 {
3198 flags = (SEC_ALLOC | SEC_LOAD | SEC_READONLY
3199 | SEC_HAS_CONTENTS | SEC_IN_MEMORY | SEC_LINKER_CREATED);
1e2f5b6e 3200 htab->srelbrlt = bfd_make_section_anyway (dynobj, ".rela.branch_lt");
721956f4
AM
3201 if (!htab->srelbrlt
3202 || ! bfd_set_section_flags (dynobj, htab->srelbrlt, flags)
3203 || ! bfd_set_section_alignment (dynobj, htab->srelbrlt, 3))
b34976b6 3204 return FALSE;
721956f4 3205 }
b34976b6 3206 return TRUE;
82bd7b59
AM
3207}
3208
65f38f15
AM
3209/* Create .got and .rela.got sections in DYNOBJ, and set up
3210 shortcuts to them in our hash table. */
3211
b34976b6 3212static bfd_boolean
65f38f15
AM
3213create_got_section (dynobj, info)
3214 bfd *dynobj;
3215 struct bfd_link_info *info;
3216{
3217 struct ppc_link_hash_table *htab;
3218
3219 if (! _bfd_elf_create_got_section (dynobj, info))
b34976b6 3220 return FALSE;
65f38f15
AM
3221
3222 htab = ppc_hash_table (info);
3223 htab->sgot = bfd_get_section_by_name (dynobj, ".got");
3224 if (!htab->sgot)
3225 abort ();
3226
3227 htab->srelgot = bfd_make_section (dynobj, ".rela.got");
3228 if (!htab->srelgot
3229 || ! bfd_set_section_flags (dynobj, htab->srelgot,
3230 (SEC_ALLOC | SEC_LOAD | SEC_HAS_CONTENTS
3231 | SEC_IN_MEMORY | SEC_LINKER_CREATED
3232 | SEC_READONLY))
3233 || ! bfd_set_section_alignment (dynobj, htab->srelgot, 3))
b34976b6
AM
3234 return FALSE;
3235 return TRUE;
65f38f15 3236}
5bd4f169 3237
82bd7b59 3238/* Create the dynamic sections, and set up shortcuts. */
5bd4f169 3239
b34976b6 3240static bfd_boolean
65f38f15
AM
3241ppc64_elf_create_dynamic_sections (dynobj, info)
3242 bfd *dynobj;
5bd4f169
AM
3243 struct bfd_link_info *info;
3244{
65f38f15 3245 struct ppc_link_hash_table *htab;
5bd4f169 3246
65f38f15
AM
3247 htab = ppc_hash_table (info);
3248 if (!htab->sgot && !create_got_section (dynobj, info))
b34976b6 3249 return FALSE;
5bd4f169 3250
65f38f15 3251 if (!_bfd_elf_create_dynamic_sections (dynobj, info))
b34976b6 3252 return FALSE;
65f38f15
AM
3253
3254 htab->splt = bfd_get_section_by_name (dynobj, ".plt");
3255 htab->srelplt = bfd_get_section_by_name (dynobj, ".rela.plt");
3256 htab->sdynbss = bfd_get_section_by_name (dynobj, ".dynbss");
3257 if (!info->shared)
3258 htab->srelbss = bfd_get_section_by_name (dynobj, ".rela.bss");
3259
3260 if (!htab->splt || !htab->srelplt || !htab->sdynbss
3261 || (!info->shared && !htab->srelbss))
3262 abort ();
3263
b34976b6 3264 return TRUE;
5bd4f169
AM
3265}
3266
65f38f15
AM
3267/* Copy the extra info we tack onto an elf_link_hash_entry. */
3268
3269static void
b48fa14c 3270ppc64_elf_copy_indirect_symbol (bed, dir, ind)
411e1bfb 3271 struct elf_backend_data *bed ATTRIBUTE_UNUSED;
65f38f15
AM
3272 struct elf_link_hash_entry *dir, *ind;
3273{
3274 struct ppc_link_hash_entry *edir, *eind;
3275
3276 edir = (struct ppc_link_hash_entry *) dir;
3277 eind = (struct ppc_link_hash_entry *) ind;
3278
411e1bfb 3279 /* Copy over any dynamic relocs we may have on the indirect sym. */
bbd7ec4a 3280 if (eind->dyn_relocs != NULL)
65f38f15 3281 {
bbd7ec4a
AM
3282 if (edir->dyn_relocs != NULL)
3283 {
3284 struct ppc_dyn_relocs **pp;
3285 struct ppc_dyn_relocs *p;
3286
411e1bfb 3287 if (eind->elf.root.type == bfd_link_hash_indirect)
bbd7ec4a
AM
3288 abort ();
3289
3290 /* Add reloc counts against the weak sym to the strong sym
3291 list. Merge any entries against the same section. */
3292 for (pp = &eind->dyn_relocs; (p = *pp) != NULL; )
3293 {
3294 struct ppc_dyn_relocs *q;
3295
3296 for (q = edir->dyn_relocs; q != NULL; q = q->next)
3297 if (q->sec == p->sec)
3298 {
3299 q->pc_count += p->pc_count;
3300 q->count += p->count;
3301 *pp = p->next;
3302 break;
3303 }
3304 if (q == NULL)
3305 pp = &p->next;
3306 }
3307 *pp = edir->dyn_relocs;
3308 }
3309
65f38f15
AM
3310 edir->dyn_relocs = eind->dyn_relocs;
3311 eind->dyn_relocs = NULL;
3312 }
65f38f15 3313
6349e628
AM
3314 edir->is_func |= eind->is_func;
3315 edir->is_func_descriptor |= eind->is_func_descriptor;
3316 edir->is_entry |= eind->is_entry;
58ac9f71 3317 edir->tls_mask |= eind->tls_mask;
6349e628
AM
3318
3319 /* Copy down any references that we may have already seen to the
3320 symbol which just became indirect. */
3321 edir->elf.elf_link_hash_flags |=
3322 (eind->elf.elf_link_hash_flags
3323 & (ELF_LINK_HASH_REF_DYNAMIC
3324 | ELF_LINK_HASH_REF_REGULAR
3325 | ELF_LINK_HASH_REF_REGULAR_NONWEAK
3326 | ELF_LINK_NON_GOT_REF));
3327
3328 /* If we were called to copy over info for a weak sym, that's all. */
3329 if (eind->elf.root.type != bfd_link_hash_indirect)
3330 return;
3331
3332 /* Copy over got entries. */
411e1bfb
AM
3333 if (eind->elf.got.glist != NULL)
3334 {
3335 if (edir->elf.got.glist != NULL)
3336 {
3337 struct got_entry **entp;
3338 struct got_entry *ent;
3339
3340 for (entp = &eind->elf.got.glist; (ent = *entp) != NULL; )
3341 {
3342 struct got_entry *dent;
3343
3344 for (dent = edir->elf.got.glist; dent != NULL; dent = dent->next)
3345 if (dent->addend == ent->addend
3346 && dent->tls_type == ent->tls_type)
3347 {
3348 dent->got.refcount += ent->got.refcount;
3349 *entp = ent->next;
3350 break;
3351 }
3352 if (dent == NULL)
3353 entp = &ent->next;
3354 }
3355 *entp = edir->elf.got.glist;
3356 }
3357
3358 edir->elf.got.glist = eind->elf.got.glist;
3359 eind->elf.got.glist = NULL;
3360 }
3361
3362 /* And plt entries. */
3363 if (eind->elf.plt.plist != NULL)
3364 {
3365 if (edir->elf.plt.plist != NULL)
3366 {
3367 struct plt_entry **entp;
3368 struct plt_entry *ent;
3369
3370 for (entp = &eind->elf.plt.plist; (ent = *entp) != NULL; )
3371 {
3372 struct plt_entry *dent;
3373
3374 for (dent = edir->elf.plt.plist; dent != NULL; dent = dent->next)
3375 if (dent->addend == ent->addend)
3376 {
3377 dent->plt.refcount += ent->plt.refcount;
3378 *entp = ent->next;
3379 break;
3380 }
3381 if (dent == NULL)
3382 entp = &ent->next;
3383 }
3384 *entp = edir->elf.plt.plist;
3385 }
3386
3387 edir->elf.plt.plist = eind->elf.plt.plist;
3388 eind->elf.plt.plist = NULL;
3389 }
3390
411e1bfb
AM
3391 if (edir->elf.dynindx == -1)
3392 {
3393 edir->elf.dynindx = eind->elf.dynindx;
3394 edir->elf.dynstr_index = eind->elf.dynstr_index;
3395 eind->elf.dynindx = -1;
3396 eind->elf.dynstr_index = 0;
3397 }
3398 else
3399 BFD_ASSERT (eind->elf.dynindx == -1);
3400}
3401
3402/* Set a flag, used by ppc64_elf_gc_mark_hook, on the entry symbol and
3403 symbols undefined on the command-line. */
3404
3405bfd_boolean
3406ppc64_elf_mark_entry_syms (info)
3407 struct bfd_link_info *info;
3408{
3409 struct ppc_link_hash_table *htab;
3410 struct bfd_sym_chain *sym;
3411
3412 htab = ppc_hash_table (info);
3413 for (sym = info->gc_sym_list; sym; sym = sym->next)
3414 {
3415 struct elf_link_hash_entry *h;
3416
3417 h = elf_link_hash_lookup (&htab->elf, sym->name, FALSE, FALSE, FALSE);
3418 if (h != NULL)
3419 ((struct ppc_link_hash_entry *) h)->is_entry = 1;
3420 }
3421 return TRUE;
3422}
3423
3424static bfd_boolean
3425update_local_sym_info (abfd, symtab_hdr, r_symndx, r_addend, tls_type)
3426 bfd *abfd;
3427 Elf_Internal_Shdr *symtab_hdr;
3428 unsigned long r_symndx;
3429 bfd_vma r_addend;
3430 int tls_type;
3431{
3432 struct got_entry **local_got_ents = elf_local_got_ents (abfd);
e7b938ca 3433 char *local_got_tls_masks;
411e1bfb
AM
3434
3435 if (local_got_ents == NULL)
3436 {
3437 bfd_size_type size = symtab_hdr->sh_info;
3438
e7b938ca 3439 size *= sizeof (*local_got_ents) + sizeof (*local_got_tls_masks);
411e1bfb
AM
3440 local_got_ents = (struct got_entry **) bfd_zalloc (abfd, size);
3441 if (local_got_ents == NULL)
3442 return FALSE;
3443 elf_local_got_ents (abfd) = local_got_ents;
3444 }
3445
3446 if ((tls_type & TLS_EXPLICIT) == 0)
3447 {
3448 struct got_entry *ent;
3449
3450 for (ent = local_got_ents[r_symndx]; ent != NULL; ent = ent->next)
3451 if (ent->addend == r_addend && ent->tls_type == tls_type)
3452 break;
3453 if (ent == NULL)
3454 {
3455 bfd_size_type amt = sizeof (*ent);
3456 ent = (struct got_entry *) bfd_alloc (abfd, amt);
3457 if (ent == NULL)
3458 return FALSE;
3459 ent->next = local_got_ents[r_symndx];
3460 ent->addend = r_addend;
3461 ent->tls_type = tls_type;
3462 ent->got.refcount = 0;
3463 local_got_ents[r_symndx] = ent;
3464 }
3465 ent->got.refcount += 1;
3466 }
3467
e7b938ca
AM
3468 local_got_tls_masks = (char *) (local_got_ents + symtab_hdr->sh_info);
3469 local_got_tls_masks[r_symndx] |= tls_type;
411e1bfb 3470 return TRUE;
65f38f15
AM
3471}
3472
411e1bfb
AM
3473static bfd_boolean
3474update_plt_info (abfd, eh, addend)
3475 bfd *abfd;
3476 struct ppc_link_hash_entry *eh;
3477 bfd_vma addend;
1e2f5b6e 3478{
411e1bfb 3479 struct plt_entry *ent;
1e2f5b6e 3480
411e1bfb
AM
3481 for (ent = eh->elf.plt.plist; ent != NULL; ent = ent->next)
3482 if (ent->addend == addend)
3483 break;
3484 if (ent == NULL)
1e2f5b6e 3485 {
411e1bfb
AM
3486 bfd_size_type amt = sizeof (*ent);
3487 ent = (struct plt_entry *) bfd_alloc (abfd, amt);
3488 if (ent == NULL)
3489 return FALSE;
3490 ent->next = eh->elf.plt.plist;
3491 ent->addend = addend;
3492 ent->plt.refcount = 0;
3493 eh->elf.plt.plist = ent;
1e2f5b6e 3494 }
411e1bfb
AM
3495 ent->plt.refcount += 1;
3496 eh->elf.elf_link_hash_flags |= ELF_LINK_HASH_NEEDS_PLT;
3497 eh->is_func = 1;
b34976b6 3498 return TRUE;
1e2f5b6e
AM
3499}
3500
5bd4f169 3501/* Look through the relocs for a section during the first phase, and
65f38f15 3502 calculate needed space in the global offset table, procedure
5d1634d7 3503 linkage table, and dynamic reloc sections. */
5bd4f169 3504
b34976b6 3505static bfd_boolean
5bd4f169
AM
3506ppc64_elf_check_relocs (abfd, info, sec, relocs)
3507 bfd *abfd;
3508 struct bfd_link_info *info;
3509 asection *sec;
3510 const Elf_Internal_Rela *relocs;
3511{
65f38f15 3512 struct ppc_link_hash_table *htab;
5bd4f169
AM
3513 Elf_Internal_Shdr *symtab_hdr;
3514 struct elf_link_hash_entry **sym_hashes, **sym_hashes_end;
3515 const Elf_Internal_Rela *rel;
3516 const Elf_Internal_Rela *rel_end;
5bd4f169 3517 asection *sreloc;
1e2f5b6e 3518 asection **opd_sym_map;
5bd4f169
AM
3519
3520 if (info->relocateable)
b34976b6 3521 return TRUE;
5bd4f169 3522
65f38f15 3523 htab = ppc_hash_table (info);
5bd4f169 3524 symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
5bd4f169
AM
3525
3526 sym_hashes = elf_sym_hashes (abfd);
3527 sym_hashes_end = (sym_hashes
1e2f5b6e
AM
3528 + symtab_hdr->sh_size / sizeof (Elf64_External_Sym)
3529 - symtab_hdr->sh_info);
5bd4f169
AM
3530
3531 sreloc = NULL;
1e2f5b6e
AM
3532 opd_sym_map = NULL;
3533 if (strcmp (bfd_get_section_name (abfd, sec), ".opd") == 0)
3534 {
3535 /* Garbage collection needs some extra help with .opd sections.
3536 We don't want to necessarily keep everything referenced by
3537 relocs in .opd, as that would keep all functions. Instead,
3538 if we reference an .opd symbol (a function descriptor), we
3539 want to keep the function code symbol's section. This is
3540 easy for global symbols, but for local syms we need to keep
3541 information about the associated function section. Later, if
3542 edit_opd deletes entries, we'll use this array to adjust
3543 local syms in .opd. */
3544 union opd_info {
3545 asection *func_section;
3546 long entry_adjust;
3547 };
3548 bfd_size_type amt;
3549
3550 amt = sec->_raw_size * sizeof (union opd_info) / 24;
3551 opd_sym_map = (asection **) bfd_zalloc (abfd, amt);
3552 if (opd_sym_map == NULL)
b34976b6 3553 return FALSE;
f0abc2a1 3554 ppc64_elf_section_data (sec)->opd.func_sec = opd_sym_map;
1e2f5b6e 3555 }
5bd4f169 3556
82bd7b59
AM
3557 if (htab->elf.dynobj == NULL)
3558 htab->elf.dynobj = abfd;
3559 if (htab->sfpr == NULL
3560 && !create_linkage_sections (htab->elf.dynobj, info))
b34976b6 3561 return FALSE;
82bd7b59 3562
5bd4f169
AM
3563 rel_end = relocs + sec->reloc_count;
3564 for (rel = relocs; rel < rel_end; rel++)
3565 {
3566 unsigned long r_symndx;
3567 struct elf_link_hash_entry *h;
04c9666a 3568 enum elf_ppc64_reloc_type r_type;
411e1bfb 3569 int tls_type = 0;
5bd4f169
AM
3570
3571 r_symndx = ELF64_R_SYM (rel->r_info);
3572 if (r_symndx < symtab_hdr->sh_info)
3573 h = NULL;
3574 else
3575 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
3576
04c9666a 3577 r_type = (enum elf_ppc64_reloc_type) ELF64_R_TYPE (rel->r_info);
a33d1f77 3578 switch (r_type)
5bd4f169 3579 {
411e1bfb
AM
3580 case R_PPC64_GOT_TLSLD16:
3581 case R_PPC64_GOT_TLSLD16_LO:
3582 case R_PPC64_GOT_TLSLD16_HI:
3583 case R_PPC64_GOT_TLSLD16_HA:
3584 htab->tlsld_got.refcount += 1;
951fd09b 3585 tls_type = TLS_TLS | TLS_LD;
411e1bfb
AM
3586 goto dogottls;
3587
3588 case R_PPC64_GOT_TLSGD16:
3589 case R_PPC64_GOT_TLSGD16_LO:
3590 case R_PPC64_GOT_TLSGD16_HI:
3591 case R_PPC64_GOT_TLSGD16_HA:
951fd09b 3592 tls_type = TLS_TLS | TLS_GD;
411e1bfb
AM
3593 goto dogottls;
3594
3595 case R_PPC64_GOT_TPREL16_DS:
3596 case R_PPC64_GOT_TPREL16_LO_DS:
3597 case R_PPC64_GOT_TPREL16_HI:
3598 case R_PPC64_GOT_TPREL16_HA:
3599 if (info->shared)
3600 info->flags |= DF_STATIC_TLS;
3601 tls_type = TLS_TLS | TLS_TPREL;
3602 goto dogottls;
3603
3604 case R_PPC64_GOT_DTPREL16_DS:
3605 case R_PPC64_GOT_DTPREL16_LO_DS:
3606 case R_PPC64_GOT_DTPREL16_HI:
3607 case R_PPC64_GOT_DTPREL16_HA:
3608 tls_type = TLS_TLS | TLS_DTPREL;
3609 dogottls:
3610 sec->has_tls_reloc = 1;
3611 /* Fall thru */
3612
5bd4f169 3613 case R_PPC64_GOT16:
5bd4f169 3614 case R_PPC64_GOT16_DS:
65f38f15
AM
3615 case R_PPC64_GOT16_HA:
3616 case R_PPC64_GOT16_HI:
3617 case R_PPC64_GOT16_LO:
5bd4f169 3618 case R_PPC64_GOT16_LO_DS:
65f38f15 3619 /* This symbol requires a global offset table entry. */
82bd7b59
AM
3620 if (htab->sgot == NULL
3621 && !create_got_section (htab->elf.dynobj, info))
b34976b6 3622 return FALSE;
5bd4f169
AM
3623
3624 if (h != NULL)
3625 {
411e1bfb
AM
3626 struct ppc_link_hash_entry *eh;
3627 struct got_entry *ent;
65f38f15 3628
411e1bfb
AM
3629 eh = (struct ppc_link_hash_entry *) h;
3630 for (ent = eh->elf.got.glist; ent != NULL; ent = ent->next)
3631 if (ent->addend == rel->r_addend
3632 && ent->tls_type == tls_type)
3633 break;
3634 if (ent == NULL)
5bd4f169 3635 {
411e1bfb
AM
3636 bfd_size_type amt = sizeof (*ent);
3637 ent = (struct got_entry *) bfd_alloc (abfd, amt);
3638 if (ent == NULL)
b34976b6 3639 return FALSE;
411e1bfb
AM
3640 ent->next = eh->elf.got.glist;
3641 ent->addend = rel->r_addend;
3642 ent->tls_type = tls_type;
3643 ent->got.refcount = 0;
3644 eh->elf.got.glist = ent;
5bd4f169 3645 }
411e1bfb 3646 ent->got.refcount += 1;
e7b938ca 3647 eh->tls_mask |= tls_type;
5bd4f169 3648 }
411e1bfb
AM
3649 else
3650 /* This is a global offset table entry for a local symbol. */
3651 if (!update_local_sym_info (abfd, symtab_hdr, r_symndx,
3652 rel->r_addend, tls_type))
3653 return FALSE;
5bd4f169
AM
3654 break;
3655
5bd4f169 3656 case R_PPC64_PLT16_HA:
65f38f15
AM
3657 case R_PPC64_PLT16_HI:
3658 case R_PPC64_PLT16_LO:
3659 case R_PPC64_PLT32:
3660 case R_PPC64_PLT64:
5bd4f169 3661 /* This symbol requires a procedure linkage table entry. We
3fad3c7c
AM
3662 actually build the entry in adjust_dynamic_symbol,
3663 because this might be a case of linking PIC code without
3664 linking in any dynamic objects, in which case we don't
3665 need to generate a procedure linkage table after all. */
5bd4f169
AM
3666 if (h == NULL)
3667 {
3668 /* It does not make sense to have a procedure linkage
3fad3c7c 3669 table entry for a local symbol. */
5bd4f169 3670 bfd_set_error (bfd_error_bad_value);
b34976b6 3671 return FALSE;
5bd4f169 3672 }
411e1bfb
AM
3673 else
3674 if (!update_plt_info (abfd, (struct ppc_link_hash_entry *) h,
3675 rel->r_addend))
3676 return FALSE;
5bd4f169
AM
3677 break;
3678
3679 /* The following relocations don't need to propagate the
3680 relocation if linking a shared object since they are
3681 section relative. */
3682 case R_PPC64_SECTOFF:
3683 case R_PPC64_SECTOFF_LO:
3684 case R_PPC64_SECTOFF_HI:
3685 case R_PPC64_SECTOFF_HA:
3686 case R_PPC64_SECTOFF_DS:
3687 case R_PPC64_SECTOFF_LO_DS:
3688 case R_PPC64_TOC16:
3689 case R_PPC64_TOC16_LO:
3690 case R_PPC64_TOC16_HI:
3691 case R_PPC64_TOC16_HA:
3692 case R_PPC64_TOC16_DS:
3693 case R_PPC64_TOC16_LO_DS:
411e1bfb
AM
3694 case R_PPC64_DTPREL16:
3695 case R_PPC64_DTPREL16_LO:
3696 case R_PPC64_DTPREL16_HI:
3697 case R_PPC64_DTPREL16_HA:
3698 case R_PPC64_DTPREL16_DS:
3699 case R_PPC64_DTPREL16_LO_DS:
3700 case R_PPC64_DTPREL16_HIGHER:
3701 case R_PPC64_DTPREL16_HIGHERA:
3702 case R_PPC64_DTPREL16_HIGHEST:
3703 case R_PPC64_DTPREL16_HIGHESTA:
5bd4f169
AM
3704 break;
3705
3706 /* This relocation describes the C++ object vtable hierarchy.
3707 Reconstruct it for later use during GC. */
3708 case R_PPC64_GNU_VTINHERIT:
3709 if (!_bfd_elf64_gc_record_vtinherit (abfd, sec, h, rel->r_offset))
b34976b6 3710 return FALSE;
5bd4f169
AM
3711 break;
3712
3713 /* This relocation describes which C++ vtable entries are actually
3714 used. Record for later use during GC. */
3715 case R_PPC64_GNU_VTENTRY:
3716 if (!_bfd_elf64_gc_record_vtentry (abfd, sec, h, rel->r_addend))
b34976b6 3717 return FALSE;
5bd4f169
AM
3718 break;
3719
721956f4
AM
3720 case R_PPC64_REL14:
3721 case R_PPC64_REL14_BRTAKEN:
3722 case R_PPC64_REL14_BRNTAKEN:
3723 htab->has_14bit_branch = 1;
3724 /* Fall through. */
3725
5d1634d7 3726 case R_PPC64_REL24:
e86ce104
AM
3727 if (h != NULL
3728 && h->root.root.string[0] == '.'
3729 && h->root.root.string[1] != 0)
5d1634d7
AM
3730 {
3731 /* We may need a .plt entry if the function this reloc
3732 refers to is in a shared lib. */
411e1bfb
AM
3733 if (!update_plt_info (abfd, (struct ppc_link_hash_entry *) h,
3734 rel->r_addend))
3735 return FALSE;
3736 if (h == htab->tls_get_addr)
3737 sec->has_tls_reloc = 1;
a48ebf4d
AM
3738 else if ((strncmp (h->root.root.string, ".__tls_get_addr", 15)
3739 == 0)
3740 && (h->root.root.string[15] == 0
3741 || h->root.root.string[15] == '@'))
411e1bfb
AM
3742 {
3743 htab->tls_get_addr = h;
3744 sec->has_tls_reloc = 1;
3745 }
3746 }
3747 break;
3748
3749 case R_PPC64_TPREL64:
3750 tls_type = TLS_EXPLICIT | TLS_TLS | TLS_TPREL;
3751 if (info->shared)
3752 info->flags |= DF_STATIC_TLS;
3753 goto dotlstoc;
3754
3755 case R_PPC64_DTPMOD64:
3756 if (rel + 1 < rel_end
3757 && rel[1].r_info == ELF64_R_INFO (r_symndx, R_PPC64_DTPREL64)
3758 && rel[1].r_offset == rel->r_offset + 8)
951fd09b 3759 tls_type = TLS_EXPLICIT | TLS_TLS | TLS_GD;
411e1bfb 3760 else
951fd09b 3761 tls_type = TLS_EXPLICIT | TLS_TLS | TLS_LD;
411e1bfb
AM
3762 goto dotlstoc;
3763
3764 case R_PPC64_DTPREL64:
3765 tls_type = TLS_EXPLICIT | TLS_TLS | TLS_DTPREL;
3766 if (rel != relocs
3767 && rel[-1].r_info == ELF64_R_INFO (r_symndx, R_PPC64_DTPMOD64)
3768 && rel[-1].r_offset == rel->r_offset - 8)
3769 /* This is the second reloc of a dtpmod, dtprel pair.
3770 Don't mark with TLS_DTPREL. */
3771 goto dodyn;
3772
3773 dotlstoc:
3774 sec->has_tls_reloc = 1;
3775 if (h != NULL)
3776 {
3777 struct ppc_link_hash_entry *eh;
3778 eh = (struct ppc_link_hash_entry *) h;
e7b938ca 3779 eh->tls_mask |= tls_type;
411e1bfb
AM
3780 }
3781 else
3782 if (!update_local_sym_info (abfd, symtab_hdr, r_symndx,
3783 rel->r_addend, tls_type))
3784 return FALSE;
3785
3786 if (ppc64_elf_section_data (sec)->t_symndx == NULL)
3787 {
e7b938ca 3788 /* One extra to simplify get_tls_mask. */
951fd09b 3789 bfd_size_type amt = sec->_raw_size * sizeof (unsigned) / 8 + 1;
411e1bfb
AM
3790 ppc64_elf_section_data (sec)->t_symndx
3791 = (unsigned *) bfd_zalloc (abfd, amt);
3792 if (ppc64_elf_section_data (sec)->t_symndx == NULL)
3793 return FALSE;
3794 }
3795 BFD_ASSERT (rel->r_offset % 8 == 0);
3796 ppc64_elf_section_data (sec)->t_symndx[rel->r_offset / 8] = r_symndx;
951fd09b
AM
3797
3798 /* Mark the second slot of a GD or LD entry.
3799 -1 to indicate GD and -2 to indicate LD. */
3800 if (tls_type == (TLS_EXPLICIT | TLS_TLS | TLS_GD))
3801 ppc64_elf_section_data (sec)->t_symndx[rel->r_offset / 8 + 1] = -1;
3802 else if (tls_type == (TLS_EXPLICIT | TLS_TLS | TLS_LD))
3803 ppc64_elf_section_data (sec)->t_symndx[rel->r_offset / 8 + 1] = -2;
411e1bfb
AM
3804 goto dodyn;
3805
3806 case R_PPC64_TPREL16:
3807 case R_PPC64_TPREL16_LO:
3808 case R_PPC64_TPREL16_HI:
3809 case R_PPC64_TPREL16_HA:
3810 case R_PPC64_TPREL16_DS:
3811 case R_PPC64_TPREL16_LO_DS:
3812 case R_PPC64_TPREL16_HIGHER:
3813 case R_PPC64_TPREL16_HIGHERA:
3814 case R_PPC64_TPREL16_HIGHEST:
3815 case R_PPC64_TPREL16_HIGHESTA:
3816 if (info->shared)
3817 {
3818 info->flags |= DF_STATIC_TLS;
3819 goto dodyn;
5d1634d7
AM
3820 }
3821 break;
3822
e86ce104 3823 case R_PPC64_ADDR64:
1e2f5b6e 3824 if (opd_sym_map != NULL
e86ce104
AM
3825 && h != NULL
3826 && h->root.root.string[0] == '.'
3827 && h->root.root.string[1] != 0)
3828 {
3829 struct elf_link_hash_entry *fdh;
3830
3831 fdh = elf_link_hash_lookup (&htab->elf, h->root.root.string + 1,
b34976b6 3832 FALSE, FALSE, FALSE);
e86ce104
AM
3833 if (fdh != NULL)
3834 {
e86ce104 3835 ((struct ppc_link_hash_entry *) fdh)->is_func_descriptor = 1;
721956f4 3836 ((struct ppc_link_hash_entry *) fdh)->oh = h;
e86ce104 3837 ((struct ppc_link_hash_entry *) h)->is_func = 1;
721956f4 3838 ((struct ppc_link_hash_entry *) h)->oh = fdh;
e86ce104
AM
3839 }
3840 }
1e2f5b6e
AM
3841 if (opd_sym_map != NULL
3842 && h == NULL
3843 && rel + 1 < rel_end
04c9666a 3844 && ((enum elf_ppc64_reloc_type) ELF64_R_TYPE ((rel + 1)->r_info)
1e2f5b6e
AM
3845 == R_PPC64_TOC))
3846 {
3847 asection *s;
3848
3849 s = bfd_section_from_r_symndx (abfd, &htab->sym_sec, sec,
3850 r_symndx);
3851 if (s == NULL)
b34976b6 3852 return FALSE;
1e2f5b6e
AM
3853 else if (s != sec)
3854 opd_sym_map[rel->r_offset / 24] = s;
3855 }
e86ce104
AM
3856 /* Fall through. */
3857
04c9666a 3858 case R_PPC64_REL30:
5bd4f169 3859 case R_PPC64_REL32:
04c9666a 3860 case R_PPC64_REL64:
65f38f15
AM
3861 case R_PPC64_ADDR14:
3862 case R_PPC64_ADDR14_BRNTAKEN:
3863 case R_PPC64_ADDR14_BRTAKEN:
3864 case R_PPC64_ADDR16:
3865 case R_PPC64_ADDR16_DS:
3866 case R_PPC64_ADDR16_HA:
3867 case R_PPC64_ADDR16_HI:
3868 case R_PPC64_ADDR16_HIGHER:
3869 case R_PPC64_ADDR16_HIGHERA:
3870 case R_PPC64_ADDR16_HIGHEST:
3871 case R_PPC64_ADDR16_HIGHESTA:
3872 case R_PPC64_ADDR16_LO:
3873 case R_PPC64_ADDR16_LO_DS:
3874 case R_PPC64_ADDR24:
65f38f15 3875 case R_PPC64_ADDR32:
65f38f15
AM
3876 case R_PPC64_UADDR16:
3877 case R_PPC64_UADDR32:
3878 case R_PPC64_UADDR64:
5bd4f169 3879 case R_PPC64_TOC:
41bd81ab 3880 /* Don't propagate .opd relocs. */
1e2f5b6e 3881 if (NO_OPD_RELOCS && opd_sym_map != NULL)
e86ce104 3882 break;
e86ce104 3883
f4656909
AM
3884 /* Don't propagate relocs that the dynamic linker won't relocate. */
3885 if ((sec->flags & SEC_ALLOC) == 0)
3886 break;
3887
65f38f15
AM
3888 /* If we are creating a shared library, and this is a reloc
3889 against a global symbol, or a non PC relative reloc
3890 against a local symbol, then we need to copy the reloc
3891 into the shared library. However, if we are linking with
3892 -Bsymbolic, we do not need to copy a reloc against a
3893 global symbol which is defined in an object we are
3894 including in the link (i.e., DEF_REGULAR is set). At
3895 this point we have not seen all the input files, so it is
3896 possible that DEF_REGULAR is not set now but will be set
3897 later (it is never cleared). In case of a weak definition,
3898 DEF_REGULAR may be cleared later by a strong definition in
3899 a shared library. We account for that possibility below by
f4656909 3900 storing information in the dyn_relocs field of the hash
65f38f15
AM
3901 table entry. A similar situation occurs when creating
3902 shared libraries and symbol visibility changes render the
3903 symbol local.
3904
3905 If on the other hand, we are creating an executable, we
3906 may need to keep relocations for symbols satisfied by a
3907 dynamic library if we manage to avoid copy relocs for the
3908 symbol. */
411e1bfb 3909 dodyn:
65f38f15 3910 if ((info->shared
411e1bfb 3911 && (MUST_BE_DYN_RELOC (r_type)
65f38f15
AM
3912 || (h != NULL
3913 && (! info->symbolic
3914 || h->root.type == bfd_link_hash_defweak
3915 || (h->elf_link_hash_flags
3916 & ELF_LINK_HASH_DEF_REGULAR) == 0))))
f4656909
AM
3917 || (ELIMINATE_COPY_RELOCS
3918 && !info->shared
65f38f15
AM
3919 && h != NULL
3920 && (h->root.type == bfd_link_hash_defweak
3921 || (h->elf_link_hash_flags
3922 & ELF_LINK_HASH_DEF_REGULAR) == 0)))
5bd4f169 3923 {
ec338859
AM
3924 struct ppc_dyn_relocs *p;
3925 struct ppc_dyn_relocs **head;
3926
65f38f15
AM
3927 /* We must copy these reloc types into the output file.
3928 Create a reloc section in dynobj and make room for
3929 this reloc. */
5bd4f169
AM
3930 if (sreloc == NULL)
3931 {
3932 const char *name;
65f38f15 3933 bfd *dynobj;
5bd4f169
AM
3934
3935 name = (bfd_elf_string_from_elf_section
3936 (abfd,
3937 elf_elfheader (abfd)->e_shstrndx,
3938 elf_section_data (sec)->rel_hdr.sh_name));
3939 if (name == NULL)
b34976b6 3940 return FALSE;
5bd4f169 3941
65f38f15
AM
3942 if (strncmp (name, ".rela", 5) != 0
3943 || strcmp (bfd_get_section_name (abfd, sec),
3944 name + 5) != 0)
3945 {
3946 (*_bfd_error_handler)
3947 (_("%s: bad relocation section name `%s\'"),
3948 bfd_archive_filename (abfd), name);
5d1634d7 3949 bfd_set_error (bfd_error_bad_value);
65f38f15
AM
3950 }
3951
65f38f15 3952 dynobj = htab->elf.dynobj;
5bd4f169
AM
3953 sreloc = bfd_get_section_by_name (dynobj, name);
3954 if (sreloc == NULL)
3955 {
3956 flagword flags;
3957
3958 sreloc = bfd_make_section (dynobj, name);
3959 flags = (SEC_HAS_CONTENTS | SEC_READONLY
3960 | SEC_IN_MEMORY | SEC_LINKER_CREATED);
3961 if ((sec->flags & SEC_ALLOC) != 0)
3962 flags |= SEC_ALLOC | SEC_LOAD;
3963 if (sreloc == NULL
3964 || ! bfd_set_section_flags (dynobj, sreloc, flags)
65f38f15 3965 || ! bfd_set_section_alignment (dynobj, sreloc, 3))
b34976b6 3966 return FALSE;
5bd4f169 3967 }
65f38f15 3968 elf_section_data (sec)->sreloc = sreloc;
5bd4f169
AM
3969 }
3970
65f38f15
AM
3971 /* If this is a global symbol, we count the number of
3972 relocations we need for this symbol. */
3973 if (h != NULL)
3974 {
ec338859 3975 head = &((struct ppc_link_hash_entry *) h)->dyn_relocs;
65f38f15
AM
3976 }
3977 else
3978 {
ec338859
AM
3979 /* Track dynamic relocs needed for local syms too.
3980 We really need local syms available to do this
3981 easily. Oh well. */
3982
3983 asection *s;
3984 s = bfd_section_from_r_symndx (abfd, &htab->sym_sec,
3985 sec, r_symndx);
3986 if (s == NULL)
b34976b6 3987 return FALSE;
ec338859
AM
3988
3989 head = ((struct ppc_dyn_relocs **)
3990 &elf_section_data (s)->local_dynrel);
65f38f15 3991 }
ec338859
AM
3992
3993 p = *head;
3994 if (p == NULL || p->sec != sec)
3995 {
3996 p = ((struct ppc_dyn_relocs *)
3997 bfd_alloc (htab->elf.dynobj,
3998 (bfd_size_type) sizeof *p));
3999 if (p == NULL)
b34976b6 4000 return FALSE;
ec338859
AM
4001 p->next = *head;
4002 *head = p;
4003 p->sec = sec;
4004 p->count = 0;
4005 p->pc_count = 0;
4006 }
4007
4008 p->count += 1;
411e1bfb 4009 if (!MUST_BE_DYN_RELOC (r_type))
ec338859 4010 p->pc_count += 1;
65f38f15 4011 }
5bd4f169 4012 break;
65f38f15
AM
4013
4014 default:
96e0dda4 4015 break;
5bd4f169
AM
4016 }
4017 }
4018
b34976b6 4019 return TRUE;
5bd4f169
AM
4020}
4021
4022/* Return the section that should be marked against GC for a given
4023 relocation. */
4024
4025static asection *
1e2f5b6e
AM
4026ppc64_elf_gc_mark_hook (sec, info, rel, h, sym)
4027 asection *sec;
5bd4f169
AM
4028 struct bfd_link_info *info ATTRIBUTE_UNUSED;
4029 Elf_Internal_Rela *rel;
4030 struct elf_link_hash_entry *h;
4031 Elf_Internal_Sym *sym;
4032{
1e2f5b6e
AM
4033 asection *rsec = NULL;
4034
5bd4f169
AM
4035 if (h != NULL)
4036 {
04c9666a 4037 enum elf_ppc64_reloc_type r_type;
1e2f5b6e 4038 struct ppc_link_hash_entry *fdh;
a33d1f77 4039
04c9666a 4040 r_type = (enum elf_ppc64_reloc_type) ELF64_R_TYPE (rel->r_info);
a33d1f77 4041 switch (r_type)
5bd4f169
AM
4042 {
4043 case R_PPC64_GNU_VTINHERIT:
4044 case R_PPC64_GNU_VTENTRY:
4045 break;
4046
4047 default:
4048 switch (h->root.type)
4049 {
4050 case bfd_link_hash_defined:
4051 case bfd_link_hash_defweak:
1e2f5b6e
AM
4052 fdh = (struct ppc_link_hash_entry *) h;
4053
4054 /* Function descriptor syms cause the associated
4055 function code sym section to be marked. */
4056 if (fdh->is_func_descriptor)
4057 rsec = fdh->oh->root.u.def.section;
4058
4059 /* Function entry syms return NULL if they are in .opd
4060 and are not ._start (or others undefined on the ld
4061 command line). Thus we avoid marking all function
b34976b6 4062 sections, as all functions are referenced in .opd. */
1e2f5b6e
AM
4063 else if ((fdh->oh != NULL
4064 && ((struct ppc_link_hash_entry *) fdh->oh)->is_entry)
f0abc2a1 4065 || ppc64_elf_section_data (sec)->opd.func_sec == NULL)
1e2f5b6e
AM
4066 rsec = h->root.u.def.section;
4067 break;
5bd4f169
AM
4068
4069 case bfd_link_hash_common:
1e2f5b6e
AM
4070 rsec = h->root.u.c.p->section;
4071 break;
5bd4f169
AM
4072
4073 default:
4074 break;
4075 }
4076 }
4077 }
4078 else
4079 {
1e2f5b6e
AM
4080 asection **opd_sym_section;
4081
4082 rsec = bfd_section_from_elf_index (sec->owner, sym->st_shndx);
f0abc2a1 4083 opd_sym_section = ppc64_elf_section_data (rsec)->opd.func_sec;
1e2f5b6e
AM
4084 if (opd_sym_section != NULL)
4085 rsec = opd_sym_section[sym->st_value / 24];
f0abc2a1 4086 else if (ppc64_elf_section_data (sec)->opd.func_sec != NULL)
1e2f5b6e 4087 rsec = NULL;
5bd4f169
AM
4088 }
4089
1e2f5b6e 4090 return rsec;
5bd4f169
AM
4091}
4092
65f38f15
AM
4093/* Update the .got, .plt. and dynamic reloc reference counts for the
4094 section being removed. */
5bd4f169 4095
b34976b6 4096static bfd_boolean
5bd4f169
AM
4097ppc64_elf_gc_sweep_hook (abfd, info, sec, relocs)
4098 bfd *abfd;
411e1bfb 4099 struct bfd_link_info *info;
5bd4f169
AM
4100 asection *sec;
4101 const Elf_Internal_Rela *relocs;
4102{
411e1bfb 4103 struct ppc_link_hash_table *htab;
5bd4f169
AM
4104 Elf_Internal_Shdr *symtab_hdr;
4105 struct elf_link_hash_entry **sym_hashes;
411e1bfb 4106 struct got_entry **local_got_ents;
5bd4f169 4107 const Elf_Internal_Rela *rel, *relend;
5bd4f169 4108
ec338859
AM
4109 elf_section_data (sec)->local_dynrel = NULL;
4110
411e1bfb 4111 htab = ppc_hash_table (info);
5bd4f169
AM
4112 symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
4113 sym_hashes = elf_sym_hashes (abfd);
411e1bfb 4114 local_got_ents = elf_local_got_ents (abfd);
5bd4f169
AM
4115
4116 relend = relocs + sec->reloc_count;
4117 for (rel = relocs; rel < relend; rel++)
a33d1f77
AM
4118 {
4119 unsigned long r_symndx;
04c9666a 4120 enum elf_ppc64_reloc_type r_type;
58ac9f71 4121 struct elf_link_hash_entry *h = NULL;
411e1bfb 4122 char tls_type = 0;
5bd4f169 4123
a33d1f77 4124 r_symndx = ELF64_R_SYM (rel->r_info);
04c9666a 4125 r_type = (enum elf_ppc64_reloc_type) ELF64_R_TYPE (rel->r_info);
58ac9f71
AM
4126 if (r_symndx >= symtab_hdr->sh_info)
4127 {
4128 struct ppc_link_hash_entry *eh;
4129 struct ppc_dyn_relocs **pp;
4130 struct ppc_dyn_relocs *p;
4131
4132 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
4133 eh = (struct ppc_link_hash_entry *) h;
4134
4135 for (pp = &eh->dyn_relocs; (p = *pp) != NULL; pp = &p->next)
4136 if (p->sec == sec)
4137 {
4138 /* Everything must go for SEC. */
4139 *pp = p->next;
4140 break;
4141 }
4142 }
4143
a33d1f77
AM
4144 switch (r_type)
4145 {
411e1bfb
AM
4146 case R_PPC64_GOT_TLSLD16:
4147 case R_PPC64_GOT_TLSLD16_LO:
4148 case R_PPC64_GOT_TLSLD16_HI:
4149 case R_PPC64_GOT_TLSLD16_HA:
4150 htab->tlsld_got.refcount -= 1;
951fd09b 4151 tls_type = TLS_TLS | TLS_LD;
411e1bfb
AM
4152 goto dogot;
4153
4154 case R_PPC64_GOT_TLSGD16:
4155 case R_PPC64_GOT_TLSGD16_LO:
4156 case R_PPC64_GOT_TLSGD16_HI:
4157 case R_PPC64_GOT_TLSGD16_HA:
951fd09b 4158 tls_type = TLS_TLS | TLS_GD;
411e1bfb
AM
4159 goto dogot;
4160
4161 case R_PPC64_GOT_TPREL16_DS:
4162 case R_PPC64_GOT_TPREL16_LO_DS:
4163 case R_PPC64_GOT_TPREL16_HI:
4164 case R_PPC64_GOT_TPREL16_HA:
4165 tls_type = TLS_TLS | TLS_TPREL;
4166 goto dogot;
4167
4168 case R_PPC64_GOT_DTPREL16_DS:
4169 case R_PPC64_GOT_DTPREL16_LO_DS:
4170 case R_PPC64_GOT_DTPREL16_HI:
4171 case R_PPC64_GOT_DTPREL16_HA:
4172 tls_type = TLS_TLS | TLS_DTPREL;
4173 goto dogot;
4174
a33d1f77
AM
4175 case R_PPC64_GOT16:
4176 case R_PPC64_GOT16_DS:
4177 case R_PPC64_GOT16_HA:
4178 case R_PPC64_GOT16_HI:
4179 case R_PPC64_GOT16_LO:
4180 case R_PPC64_GOT16_LO_DS:
411e1bfb
AM
4181 dogot:
4182 {
4183 struct got_entry *ent;
4184
58ac9f71
AM
4185 if (h != NULL)
4186 ent = h->got.glist;
411e1bfb
AM
4187 else
4188 ent = local_got_ents[r_symndx];
4189
4190 for (; ent != NULL; ent = ent->next)
4191 if (ent->addend == rel->r_addend
4192 && ent->tls_type == tls_type)
4193 break;
4194 if (ent == NULL)
4195 abort ();
4196 if (ent->got.refcount > 0)
4197 ent->got.refcount -= 1;
4198 }
a33d1f77 4199 break;
65f38f15 4200
a33d1f77
AM
4201 case R_PPC64_PLT16_HA:
4202 case R_PPC64_PLT16_HI:
4203 case R_PPC64_PLT16_LO:
4204 case R_PPC64_PLT32:
4205 case R_PPC64_PLT64:
721956f4
AM
4206 case R_PPC64_REL14:
4207 case R_PPC64_REL14_BRNTAKEN:
4208 case R_PPC64_REL14_BRTAKEN:
5d1634d7 4209 case R_PPC64_REL24:
58ac9f71 4210 if (h != NULL)
5d1634d7 4211 {
411e1bfb
AM
4212 struct plt_entry *ent;
4213
411e1bfb
AM
4214 for (ent = h->plt.plist; ent != NULL; ent = ent->next)
4215 if (ent->addend == rel->r_addend)
4216 break;
4217 if (ent == NULL)
4218 abort ();
4219 if (ent->plt.refcount > 0)
4220 ent->plt.refcount -= 1;
5d1634d7 4221 }
e86ce104 4222 break;
5d1634d7 4223
a33d1f77
AM
4224 default:
4225 break;
4226 }
4227 }
b34976b6 4228 return TRUE;
5bd4f169
AM
4229}
4230
e86ce104
AM
4231/* Called via elf_link_hash_traverse to transfer dynamic linking
4232 information on function code symbol entries to their corresponding
4233 function descriptor symbol entries. */
b34976b6 4234static bfd_boolean
e86ce104 4235func_desc_adjust (h, inf)
5bd4f169 4236 struct elf_link_hash_entry *h;
e86ce104 4237 PTR inf;
5bd4f169 4238{
e86ce104 4239 struct bfd_link_info *info;
65f38f15 4240 struct ppc_link_hash_table *htab;
411e1bfb 4241 struct plt_entry *ent;
5bd4f169 4242
e92d460e 4243 if (h->root.type == bfd_link_hash_indirect)
b34976b6 4244 return TRUE;
e86ce104 4245
e92d460e
AM
4246 if (h->root.type == bfd_link_hash_warning)
4247 h = (struct elf_link_hash_entry *) h->root.u.i.link;
4248
e86ce104 4249 info = (struct bfd_link_info *) inf;
65f38f15 4250 htab = ppc_hash_table (info);
5bd4f169 4251
e86ce104
AM
4252 /* If this is a function code symbol, transfer dynamic linking
4253 information to the function descriptor symbol. */
4254 if (!((struct ppc_link_hash_entry *) h)->is_func)
b34976b6 4255 return TRUE;
e86ce104 4256
805fc799
AM
4257 if (h->root.type == bfd_link_hash_undefweak
4258 && (h->elf_link_hash_flags & ELF_LINK_HASH_REF_REGULAR))
b34976b6 4259 htab->have_undefweak = TRUE;
805fc799 4260
411e1bfb
AM
4261 for (ent = h->plt.plist; ent != NULL; ent = ent->next)
4262 if (ent->plt.refcount > 0)
4263 break;
4264 if (ent != NULL
e86ce104
AM
4265 && h->root.root.string[0] == '.'
4266 && h->root.root.string[1] != '\0')
5bd4f169 4267 {
721956f4 4268 struct elf_link_hash_entry *fdh = ((struct ppc_link_hash_entry *) h)->oh;
b34976b6 4269 bfd_boolean force_local;
5bd4f169 4270
648cca2c
AM
4271 /* Find the corresponding function descriptor symbol. Create it
4272 as undefined if necessary. */
5bd4f169 4273
721956f4
AM
4274 if (fdh == NULL)
4275 fdh = elf_link_hash_lookup (&htab->elf, h->root.root.string + 1,
b34976b6 4276 FALSE, FALSE, TRUE);
5bd4f169 4277
d926e03d
AM
4278 if (fdh == NULL
4279 && info->shared
4280 && (h->root.type == bfd_link_hash_undefined
4281 || h->root.type == bfd_link_hash_undefweak))
648cca2c
AM
4282 {
4283 bfd *abfd;
4284 asymbol *newsym;
14a793b2 4285 struct bfd_link_hash_entry *bh;
648cca2c 4286
d926e03d 4287 abfd = h->root.u.undef.abfd;
648cca2c
AM
4288 newsym = bfd_make_empty_symbol (abfd);
4289 newsym->name = h->root.root.string + 1;
4290 newsym->section = bfd_und_section_ptr;
4291 newsym->value = 0;
4292 newsym->flags = BSF_OBJECT;
4293 if (h->root.type == bfd_link_hash_undefweak)
4294 newsym->flags |= BSF_WEAK;
4295
14a793b2 4296 bh = &fdh->root;
648cca2c
AM
4297 if ( !(_bfd_generic_link_add_one_symbol
4298 (info, abfd, newsym->name, newsym->flags,
b34976b6 4299 newsym->section, newsym->value, NULL, FALSE, FALSE, &bh)))
648cca2c 4300 {
b34976b6 4301 return FALSE;
648cca2c 4302 }
14a793b2 4303 fdh = (struct elf_link_hash_entry *) bh;
d926e03d 4304 fdh->elf_link_hash_flags &= ~ELF_LINK_NON_ELF;
648cca2c
AM
4305 }
4306
e86ce104
AM
4307 if (fdh != NULL
4308 && (fdh->elf_link_hash_flags & ELF_LINK_FORCED_LOCAL) == 0
4309 && (info->shared
4310 || (fdh->elf_link_hash_flags & ELF_LINK_HASH_DEF_DYNAMIC) != 0
4311 || (fdh->elf_link_hash_flags & ELF_LINK_HASH_REF_DYNAMIC) != 0))
4312 {
4313 if (fdh->dynindx == -1)
4314 if (! bfd_elf64_link_record_dynamic_symbol (info, fdh))
b34976b6 4315 return FALSE;
e86ce104
AM
4316 fdh->elf_link_hash_flags |= (h->elf_link_hash_flags
4317 & (ELF_LINK_HASH_REF_REGULAR
4318 | ELF_LINK_HASH_REF_DYNAMIC
4319 | ELF_LINK_HASH_REF_REGULAR_NONWEAK
4320 | ELF_LINK_NON_GOT_REF));
e1fa50e7
AM
4321 if (ELF_ST_VISIBILITY (h->other) == STV_DEFAULT)
4322 {
411e1bfb 4323 fdh->plt.plist = h->plt.plist;
e1fa50e7
AM
4324 fdh->elf_link_hash_flags |= ELF_LINK_HASH_NEEDS_PLT;
4325 }
e86ce104 4326 ((struct ppc_link_hash_entry *) fdh)->is_func_descriptor = 1;
721956f4 4327 ((struct ppc_link_hash_entry *) fdh)->oh = h;
721956f4 4328 ((struct ppc_link_hash_entry *) h)->oh = fdh;
e86ce104
AM
4329 }
4330
4331 /* Now that the info is on the function descriptor, clear the
4332 function code sym info. Any function code syms for which we
4333 don't have a definition in a regular file, we force local.
4334 This prevents a shared library from exporting syms that have
4335 been imported from another library. Function code syms that
4336 are really in the library we must leave global to prevent the
e1fa50e7 4337 linker dragging in a definition from a static library. */
ea1e4b0d
AM
4338 force_local = (info->shared
4339 && ((h->elf_link_hash_flags
4340 & ELF_LINK_HASH_DEF_REGULAR) == 0
4341 || fdh == NULL
4342 || (fdh->elf_link_hash_flags
4343 & ELF_LINK_HASH_DEF_REGULAR) == 0
4344 || (fdh->elf_link_hash_flags
4345 & ELF_LINK_FORCED_LOCAL) != 0));
e86ce104
AM
4346 _bfd_elf_link_hash_hide_symbol (info, h, force_local);
4347 }
4348
b34976b6 4349 return TRUE;
e86ce104 4350}
40b8271b 4351
82bd7b59
AM
4352#define MIN_SAVE_FPR 14
4353#define MAX_SAVE_FPR 31
4354
e86ce104 4355/* Called near the start of bfd_elf_size_dynamic_sections. We use
82bd7b59
AM
4356 this hook to a) provide some gcc support functions, and b) transfer
4357 dynamic linking information gathered so far on function code symbol
4358 entries, to their corresponding function descriptor symbol entries. */
b34976b6 4359static bfd_boolean
e86ce104
AM
4360ppc64_elf_func_desc_adjust (obfd, info)
4361 bfd *obfd ATTRIBUTE_UNUSED;
4362 struct bfd_link_info *info;
4363{
4364 struct ppc_link_hash_table *htab;
82bd7b59
AM
4365 unsigned int lowest_savef = MAX_SAVE_FPR + 2;
4366 unsigned int lowest_restf = MAX_SAVE_FPR + 2;
4367 unsigned int i;
4368 struct elf_link_hash_entry *h;
721956f4 4369 bfd_byte *p;
82bd7b59 4370 char sym[10];
e86ce104
AM
4371
4372 htab = ppc_hash_table (info);
82bd7b59
AM
4373
4374 if (htab->sfpr == NULL)
4375 /* We don't have any relocs. */
b34976b6 4376 return TRUE;
82bd7b59
AM
4377
4378 /* First provide any missing ._savef* and ._restf* functions. */
4379 memcpy (sym, "._savef14", 10);
4380 for (i = MIN_SAVE_FPR; i <= MAX_SAVE_FPR; i++)
4381 {
4382 sym[7] = i / 10 + '0';
4383 sym[8] = i % 10 + '0';
b34976b6 4384 h = elf_link_hash_lookup (&htab->elf, sym, FALSE, FALSE, TRUE);
82bd7b59
AM
4385 if (h != NULL
4386 && h->root.type == bfd_link_hash_undefined)
4387 {
4388 if (lowest_savef > i)
4389 lowest_savef = i;
4390 h->root.type = bfd_link_hash_defined;
4391 h->root.u.def.section = htab->sfpr;
4392 h->root.u.def.value = (i - lowest_savef) * 4;
4393 h->type = STT_FUNC;
4394 h->elf_link_hash_flags |= ELF_LINK_HASH_DEF_REGULAR;
4395 _bfd_elf_link_hash_hide_symbol (info, h, info->shared);
4396 }
4397 }
4398
4399 memcpy (sym, "._restf14", 10);
4400 for (i = MIN_SAVE_FPR; i <= MAX_SAVE_FPR; i++)
4401 {
4402 sym[7] = i / 10 + '0';
4403 sym[8] = i % 10 + '0';
b34976b6 4404 h = elf_link_hash_lookup (&htab->elf, sym, FALSE, FALSE, TRUE);
82bd7b59
AM
4405 if (h != NULL
4406 && h->root.type == bfd_link_hash_undefined)
4407 {
4408 if (lowest_restf > i)
4409 lowest_restf = i;
4410 h->root.type = bfd_link_hash_defined;
4411 h->root.u.def.section = htab->sfpr;
4412 h->root.u.def.value = ((MAX_SAVE_FPR + 2 - lowest_savef) * 4
4413 + (i - lowest_restf) * 4);
4414 h->type = STT_FUNC;
4415 h->elf_link_hash_flags |= ELF_LINK_HASH_DEF_REGULAR;
4416 _bfd_elf_link_hash_hide_symbol (info, h, info->shared);
4417 }
4418 }
4419
805fc799
AM
4420 elf_link_hash_traverse (&htab->elf, func_desc_adjust, (PTR) info);
4421
82bd7b59
AM
4422 htab->sfpr->_raw_size = ((MAX_SAVE_FPR + 2 - lowest_savef) * 4
4423 + (MAX_SAVE_FPR + 2 - lowest_restf) * 4);
4424
4425 if (htab->sfpr->_raw_size == 0)
805fc799
AM
4426 {
4427 if (!htab->have_undefweak)
4428 {
4429 _bfd_strip_section_from_output (info, htab->sfpr);
b34976b6 4430 return TRUE;
805fc799
AM
4431 }
4432
4433 htab->sfpr->_raw_size = 4;
4434 }
82bd7b59 4435
721956f4
AM
4436 p = (bfd_byte *) bfd_alloc (htab->elf.dynobj, htab->sfpr->_raw_size);
4437 if (p == NULL)
b34976b6 4438 return FALSE;
721956f4
AM
4439 htab->sfpr->contents = p;
4440
4441 for (i = lowest_savef; i <= MAX_SAVE_FPR; i++)
4442 {
4443 unsigned int fpr = i << 21;
4444 unsigned int stackoff = (1 << 16) - (MAX_SAVE_FPR + 1 - i) * 8;
4445 bfd_put_32 (htab->elf.dynobj, STFD_FR0_0R1 + fpr + stackoff, p);
4446 p += 4;
4447 }
4448 if (lowest_savef <= MAX_SAVE_FPR)
4449 {
82bd7b59
AM
4450 bfd_put_32 (htab->elf.dynobj, BLR, p);
4451 p += 4;
721956f4 4452 }
82bd7b59 4453
721956f4
AM
4454 for (i = lowest_restf; i <= MAX_SAVE_FPR; i++)
4455 {
4456 unsigned int fpr = i << 21;
4457 unsigned int stackoff = (1 << 16) - (MAX_SAVE_FPR + 1 - i) * 8;
4458 bfd_put_32 (htab->elf.dynobj, LFD_FR0_0R1 + fpr + stackoff, p);
82bd7b59
AM
4459 p += 4;
4460 }
721956f4
AM
4461 if (lowest_restf <= MAX_SAVE_FPR
4462 || htab->sfpr->_raw_size == 4)
4463 {
4464 bfd_put_32 (htab->elf.dynobj, BLR, p);
4465 }
82bd7b59 4466
b34976b6 4467 return TRUE;
e86ce104
AM
4468}
4469
4470/* Adjust a symbol defined by a dynamic object and referenced by a
4471 regular object. The current definition is in some section of the
4472 dynamic object, but we're not including those sections. We have to
4473 change the definition to something the rest of the link can
4474 understand. */
4475
b34976b6 4476static bfd_boolean
e86ce104
AM
4477ppc64_elf_adjust_dynamic_symbol (info, h)
4478 struct bfd_link_info *info;
4479 struct elf_link_hash_entry *h;
4480{
4481 struct ppc_link_hash_table *htab;
e86ce104
AM
4482 asection *s;
4483 unsigned int power_of_two;
4484
4485 htab = ppc_hash_table (info);
4486
4487 /* Deal with function syms. */
4488 if (h->type == STT_FUNC
4489 || (h->elf_link_hash_flags & ELF_LINK_HASH_NEEDS_PLT) != 0)
4490 {
4491 /* Clear procedure linkage table information for any symbol that
4492 won't need a .plt entry. */
411e1bfb
AM
4493 struct plt_entry *ent;
4494 for (ent = h->plt.plist; ent != NULL; ent = ent->next)
4495 if (ent->plt.refcount > 0)
4496 break;
e86ce104 4497 if (!((struct ppc_link_hash_entry *) h)->is_func_descriptor
411e1bfb 4498 || ent == NULL
e86ce104
AM
4499 || (h->elf_link_hash_flags & ELF_LINK_FORCED_LOCAL) != 0
4500 || (! info->shared
4501 && (h->elf_link_hash_flags & ELF_LINK_HASH_DEF_DYNAMIC) == 0
4502 && (h->elf_link_hash_flags & ELF_LINK_HASH_REF_DYNAMIC) == 0))
40b8271b 4503 {
411e1bfb 4504 h->plt.plist = NULL;
40b8271b 4505 h->elf_link_hash_flags &= ~ELF_LINK_HASH_NEEDS_PLT;
40b8271b 4506 }
b34976b6 4507 return TRUE;
5bd4f169 4508 }
bbd7ec4a 4509 else
411e1bfb 4510 h->plt.plist = NULL;
5bd4f169
AM
4511
4512 /* If this is a weak symbol, and there is a real definition, the
4513 processor independent code will have arranged for us to see the
4514 real definition first, and we can just use the same value. */
4515 if (h->weakdef != NULL)
4516 {
4517 BFD_ASSERT (h->weakdef->root.type == bfd_link_hash_defined
4518 || h->weakdef->root.type == bfd_link_hash_defweak);
4519 h->root.u.def.section = h->weakdef->root.u.def.section;
4520 h->root.u.def.value = h->weakdef->root.u.def.value;
a23b6845
AM
4521 if (ELIMINATE_COPY_RELOCS)
4522 h->elf_link_hash_flags
4523 = ((h->elf_link_hash_flags & ~ELF_LINK_NON_GOT_REF)
4524 | (h->weakdef->elf_link_hash_flags & ELF_LINK_NON_GOT_REF));
b34976b6 4525 return TRUE;
5bd4f169
AM
4526 }
4527
4528 /* This is a reference to a symbol defined by a dynamic object which
4529 is not a function. */
4530
4531 /* If we are creating a shared library, we must presume that the
4532 only references to the symbol are via the global offset table.
4533 For such cases we need not do anything here; the relocations will
4534 be handled correctly by relocate_section. */
4535 if (info->shared)
b34976b6 4536 return TRUE;
5bd4f169 4537
65f38f15
AM
4538 /* If there are no references to this symbol that do not use the
4539 GOT, we don't need to generate a copy reloc. */
4540 if ((h->elf_link_hash_flags & ELF_LINK_NON_GOT_REF) == 0)
b34976b6 4541 return TRUE;
65f38f15 4542
f4656909 4543 if (ELIMINATE_COPY_RELOCS)
65f38f15 4544 {
f4656909
AM
4545 struct ppc_link_hash_entry * eh;
4546 struct ppc_dyn_relocs *p;
65f38f15 4547
f4656909
AM
4548 eh = (struct ppc_link_hash_entry *) h;
4549 for (p = eh->dyn_relocs; p != NULL; p = p->next)
4550 {
4551 s = p->sec->output_section;
4552 if (s != NULL && (s->flags & SEC_READONLY) != 0)
4553 break;
4554 }
4555
4556 /* If we didn't find any dynamic relocs in read-only sections, then
4557 we'll be keeping the dynamic relocs and avoiding the copy reloc. */
4558 if (p == NULL)
4559 {
4560 h->elf_link_hash_flags &= ~ELF_LINK_NON_GOT_REF;
4561 return TRUE;
4562 }
65f38f15
AM
4563 }
4564
5bd4f169
AM
4565 /* We must allocate the symbol in our .dynbss section, which will
4566 become part of the .bss section of the executable. There will be
4567 an entry for this symbol in the .dynsym section. The dynamic
4568 object will contain position independent code, so all references
4569 from the dynamic object to this symbol will go through the global
4570 offset table. The dynamic linker will use the .dynsym entry to
4571 determine the address it must put in the global offset table, so
4572 both the dynamic object and the regular object will refer to the
4573 same memory location for the variable. */
5bd4f169 4574
04c9666a
AM
4575 /* We must generate a R_PPC64_COPY reloc to tell the dynamic linker
4576 to copy the initial value out of the dynamic object and into the
5bd4f169
AM
4577 runtime process image. We need to remember the offset into the
4578 .rela.bss section we are going to use. */
4579 if ((h->root.u.def.section->flags & SEC_ALLOC) != 0)
4580 {
65f38f15 4581 htab->srelbss->_raw_size += sizeof (Elf64_External_Rela);
5bd4f169
AM
4582 h->elf_link_hash_flags |= ELF_LINK_HASH_NEEDS_COPY;
4583 }
4584
4585 /* We need to figure out the alignment required for this symbol. I
4586 have no idea how ELF linkers handle this. */
4587 power_of_two = bfd_log2 (h->size);
4588 if (power_of_two > 4)
4589 power_of_two = 4;
4590
4591 /* Apply the required alignment. */
65f38f15
AM
4592 s = htab->sdynbss;
4593 s->_raw_size = BFD_ALIGN (s->_raw_size, (bfd_size_type) (1 << power_of_two));
4594 if (power_of_two > bfd_get_section_alignment (htab->elf.dynobj, s))
5bd4f169 4595 {
65f38f15 4596 if (! bfd_set_section_alignment (htab->elf.dynobj, s, power_of_two))
b34976b6 4597 return FALSE;
5bd4f169
AM
4598 }
4599
4600 /* Define the symbol as being at this point in the section. */
4601 h->root.u.def.section = s;
4602 h->root.u.def.value = s->_raw_size;
4603
4604 /* Increment the section size to make room for the symbol. */
4605 s->_raw_size += h->size;
4606
b34976b6 4607 return TRUE;
5bd4f169
AM
4608}
4609
e86ce104
AM
4610/* If given a function descriptor symbol, hide both the function code
4611 sym and the descriptor. */
4612static void
4613ppc64_elf_hide_symbol (info, h, force_local)
4614 struct bfd_link_info *info;
4615 struct elf_link_hash_entry *h;
b34976b6 4616 bfd_boolean force_local;
e86ce104
AM
4617{
4618 _bfd_elf_link_hash_hide_symbol (info, h, force_local);
4619
4620 if (((struct ppc_link_hash_entry *) h)->is_func_descriptor)
4621 {
721956f4 4622 struct elf_link_hash_entry *fh = ((struct ppc_link_hash_entry *) h)->oh;
e86ce104 4623
721956f4 4624 if (fh == NULL)
d1329ca3
AM
4625 {
4626 const char *p, *q;
4627 struct ppc_link_hash_table *htab;
4628 char save;
4629
4630 /* We aren't supposed to use alloca in BFD because on
4631 systems which do not have alloca the version in libiberty
4632 calls xmalloc, which might cause the program to crash
4633 when it runs out of memory. This function doesn't have a
4634 return status, so there's no way to gracefully return an
4635 error. So cheat. We know that string[-1] can be safely
4636 dereferenced; It's either a string in an ELF string
4637 table, or allocated in an objalloc structure. */
4638
4639 p = h->root.root.string - 1;
4640 save = *p;
4641 *(char *) p = '.';
4642 htab = ppc_hash_table (info);
b34976b6 4643 fh = elf_link_hash_lookup (&htab->elf, p, FALSE, FALSE, FALSE);
d1329ca3
AM
4644 *(char *) p = save;
4645
4646 /* Unfortunately, if it so happens that the string we were
4647 looking for was allocated immediately before this string,
4648 then we overwrote the string terminator. That's the only
4649 reason the lookup should fail. */
4650 if (fh == NULL)
4651 {
4652 q = h->root.root.string + strlen (h->root.root.string);
4653 while (q >= h->root.root.string && *q == *p)
4654 --q, --p;
4655 if (q < h->root.root.string && *p == '.')
b34976b6 4656 fh = elf_link_hash_lookup (&htab->elf, p, FALSE, FALSE, FALSE);
d1329ca3
AM
4657 }
4658 if (fh != NULL)
4659 {
4660 ((struct ppc_link_hash_entry *) h)->oh = fh;
4661 ((struct ppc_link_hash_entry *) fh)->oh = h;
4662 }
4663 }
e86ce104
AM
4664 if (fh != NULL)
4665 _bfd_elf_link_hash_hide_symbol (info, fh, force_local);
4666 }
4667}
4668
411e1bfb 4669static bfd_boolean
e7b938ca 4670get_sym_h (hp, symp, symsecp, tls_maskp, locsymsp, r_symndx, ibfd)
411e1bfb
AM
4671 struct elf_link_hash_entry **hp;
4672 Elf_Internal_Sym **symp;
4673 asection **symsecp;
e7b938ca 4674 char **tls_maskp;
411e1bfb
AM
4675 Elf_Internal_Sym **locsymsp;
4676 unsigned long r_symndx;
4677 bfd *ibfd;
4678{
4679 Elf_Internal_Shdr *symtab_hdr = &elf_tdata (ibfd)->symtab_hdr;
4680
4681 if (r_symndx >= symtab_hdr->sh_info)
4682 {
4683 struct elf_link_hash_entry **sym_hashes = elf_sym_hashes (ibfd);
4684 struct elf_link_hash_entry *h;
4685
4686 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
4687 while (h->root.type == bfd_link_hash_indirect
4688 || h->root.type == bfd_link_hash_warning)
4689 h = (struct elf_link_hash_entry *) h->root.u.i.link;
4690
4691 if (hp != NULL)
4692 *hp = h;
4693
4694 if (symp != NULL)
4695 *symp = NULL;
4696
4697 if (symsecp != NULL)
4698 {
4699 asection *symsec = NULL;
4700 if (h->root.type == bfd_link_hash_defined
4701 || h->root.type == bfd_link_hash_defweak)
4702 symsec = h->root.u.def.section;
4703 *symsecp = symsec;
4704 }
4705
e7b938ca 4706 if (tls_maskp != NULL)
411e1bfb
AM
4707 {
4708 struct ppc_link_hash_entry *eh;
4709
4710 eh = (struct ppc_link_hash_entry *) h;
e7b938ca 4711 *tls_maskp = &eh->tls_mask;
411e1bfb
AM
4712 }
4713 }
4714 else
4715 {
4716 Elf_Internal_Sym *sym;
4717 Elf_Internal_Sym *locsyms = *locsymsp;
4718
4719 if (locsyms == NULL)
4720 {
4721 locsyms = (Elf_Internal_Sym *) symtab_hdr->contents;
4722 if (locsyms == NULL)
4723 locsyms = bfd_elf_get_elf_syms (ibfd, symtab_hdr,
4724 symtab_hdr->sh_info,
4725 0, NULL, NULL, NULL);
4726 if (locsyms == NULL)
4727 return FALSE;
4728 *locsymsp = locsyms;
4729 }
4730 sym = locsyms + r_symndx;
4731
4732 if (hp != NULL)
4733 *hp = NULL;
4734
4735 if (symp != NULL)
4736 *symp = sym;
4737
4738 if (symsecp != NULL)
4739 {
4740 asection *symsec = NULL;
4741 if ((sym->st_shndx != SHN_UNDEF
4742 && sym->st_shndx < SHN_LORESERVE)
4743 || sym->st_shndx > SHN_HIRESERVE)
4744 symsec = bfd_section_from_elf_index (ibfd, sym->st_shndx);
4745 *symsecp = symsec;
4746 }
4747
e7b938ca 4748 if (tls_maskp != NULL)
411e1bfb
AM
4749 {
4750 struct got_entry **lgot_ents;
e7b938ca 4751 char *tls_mask;
411e1bfb 4752
e7b938ca 4753 tls_mask = NULL;
411e1bfb
AM
4754 lgot_ents = elf_local_got_ents (ibfd);
4755 if (lgot_ents != NULL)
4756 {
e7b938ca
AM
4757 char *lgot_masks = (char *) (lgot_ents + symtab_hdr->sh_info);
4758 tls_mask = &lgot_masks[r_symndx];
411e1bfb 4759 }
e7b938ca 4760 *tls_maskp = tls_mask;
411e1bfb
AM
4761 }
4762 }
4763 return TRUE;
4764}
4765
e7b938ca 4766/* Returns TLS_MASKP for the given REL symbol. Function return is 0 on
951fd09b
AM
4767 error, 2 on a toc GD type suitable for optimization, 3 on a toc LD
4768 type suitable for optimization, and 1 otherwise. */
4769
4770static int
e7b938ca
AM
4771get_tls_mask (tls_maskp, locsymsp, rel, ibfd)
4772 char **tls_maskp;
411e1bfb
AM
4773 Elf_Internal_Sym **locsymsp;
4774 const Elf_Internal_Rela *rel;
4775 bfd *ibfd;
4776{
4777 unsigned long r_symndx;
951fd09b 4778 unsigned int next_r;
411e1bfb
AM
4779 struct elf_link_hash_entry *h;
4780 Elf_Internal_Sym *sym;
4781 asection *sec;
4782 bfd_vma off;
4783
4784 r_symndx = ELF64_R_SYM (rel->r_info);
e7b938ca 4785 if (!get_sym_h (&h, &sym, &sec, tls_maskp, locsymsp, r_symndx, ibfd))
951fd09b 4786 return 0;
411e1bfb 4787
e7b938ca 4788 if ((*tls_maskp != NULL && **tls_maskp != 0)
411e1bfb
AM
4789 || sec == NULL
4790 || ppc64_elf_section_data (sec)->t_symndx == NULL)
951fd09b 4791 return 1;
411e1bfb
AM
4792
4793 /* Look inside a TOC section too. */
4794 if (h != NULL)
4795 {
4796 BFD_ASSERT (h->root.type == bfd_link_hash_defined);
4797 off = h->root.u.def.value;
4798 }
4799 else
4800 off = sym->st_value;
4801 off += rel->r_addend;
4802 BFD_ASSERT (off % 8 == 0);
4803 r_symndx = ppc64_elf_section_data (sec)->t_symndx[off / 8];
951fd09b 4804 next_r = ppc64_elf_section_data (sec)->t_symndx[off / 8 + 1];
e7b938ca 4805 if (!get_sym_h (&h, &sym, &sec, tls_maskp, locsymsp, r_symndx, ibfd))
951fd09b
AM
4806 return 0;
4807 if (h == NULL
4808 || h->root.type == bfd_link_hash_defined
4809 || h->root.type == bfd_link_hash_defweak)
4810 {
4811 if (next_r == (unsigned) -1)
4812 return 2;
4813 if (next_r == (unsigned) -2
4814 && (h == NULL
4815 || !(h->elf_link_hash_flags & ELF_LINK_HASH_DEF_DYNAMIC)))
4816 return 3;
4817 }
4818 return 1;
411e1bfb
AM
4819}
4820
b34976b6 4821bfd_boolean
d6fe2dc1 4822ppc64_elf_edit_opd (obfd, info)
1e2f5b6e
AM
4823 bfd *obfd;
4824 struct bfd_link_info *info;
4825{
4826 bfd *ibfd;
1e2f5b6e 4827
411e1bfb 4828 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link_next)
1e2f5b6e
AM
4829 {
4830 asection *sec;
4831 Elf_Internal_Rela *relstart, *rel, *relend;
4832 Elf_Internal_Shdr *symtab_hdr;
6cdc0ccc 4833 Elf_Internal_Sym *local_syms;
1e2f5b6e
AM
4834 struct elf_link_hash_entry **sym_hashes;
4835 bfd_vma offset;
d6fe2dc1 4836 bfd_size_type amt;
1e2f5b6e 4837 long *adjust;
b34976b6 4838 bfd_boolean need_edit;
1e2f5b6e
AM
4839
4840 sec = bfd_get_section_by_name (ibfd, ".opd");
4841 if (sec == NULL)
4842 continue;
4843
d6fe2dc1 4844 amt = sec->_raw_size * sizeof (long) / 24;
f0abc2a1 4845 adjust = ppc64_elf_section_data (sec)->opd.adjust;
d6fe2dc1
AM
4846 if (adjust == NULL)
4847 {
4848 /* Must be a ld -r link. ie. check_relocs hasn't been
4849 called. */
4850 adjust = (long *) bfd_zalloc (obfd, amt);
f0abc2a1 4851 ppc64_elf_section_data (sec)->opd.adjust = adjust;
d6fe2dc1
AM
4852 }
4853 memset (adjust, 0, (size_t) amt);
1e2f5b6e
AM
4854
4855 if (sec->output_section == bfd_abs_section_ptr)
4856 continue;
4857
4858 /* Look through the section relocs. */
4859 if ((sec->flags & SEC_RELOC) == 0 || sec->reloc_count == 0)
4860 continue;
4861
6cdc0ccc 4862 local_syms = NULL;
1e2f5b6e
AM
4863 symtab_hdr = &elf_tdata (ibfd)->symtab_hdr;
4864 sym_hashes = elf_sym_hashes (ibfd);
4865
4866 /* Read the relocations. */
73374ef1 4867 relstart = _bfd_elf64_link_read_relocs (ibfd, sec, (PTR) NULL,
1e2f5b6e
AM
4868 (Elf_Internal_Rela *) NULL,
4869 info->keep_memory);
4870 if (relstart == NULL)
b34976b6 4871 return FALSE;
1e2f5b6e
AM
4872
4873 /* First run through the relocs to check they are sane, and to
4874 determine whether we need to edit this opd section. */
b34976b6 4875 need_edit = FALSE;
1e2f5b6e
AM
4876 offset = 0;
4877 relend = relstart + sec->reloc_count;
4878 for (rel = relstart; rel < relend; rel++)
4879 {
04c9666a 4880 enum elf_ppc64_reloc_type r_type;
1e2f5b6e
AM
4881 unsigned long r_symndx;
4882 asection *sym_sec;
4883 struct elf_link_hash_entry *h;
4884 Elf_Internal_Sym *sym;
4885
4886 /* .opd contains a regular array of 24 byte entries. We're
4887 only interested in the reloc pointing to a function entry
4888 point. */
04c9666a 4889 r_type = (enum elf_ppc64_reloc_type) ELF64_R_TYPE (rel->r_info);
1e2f5b6e
AM
4890 if (r_type == R_PPC64_TOC)
4891 continue;
4892
4893 if (r_type != R_PPC64_ADDR64)
4894 {
4895 (*_bfd_error_handler)
4896 (_("%s: unexpected reloc type %u in .opd section"),
4897 bfd_archive_filename (ibfd), r_type);
b34976b6 4898 need_edit = FALSE;
1e2f5b6e
AM
4899 break;
4900 }
4901
4902 if (rel + 1 >= relend)
4903 continue;
04c9666a 4904 r_type = (enum elf_ppc64_reloc_type) ELF64_R_TYPE ((rel + 1)->r_info);
1e2f5b6e
AM
4905 if (r_type != R_PPC64_TOC)
4906 continue;
4907
4908 if (rel->r_offset != offset)
4909 {
4910 /* If someone messes with .opd alignment then after a
4911 "ld -r" we might have padding in the middle of .opd.
4912 Also, there's nothing to prevent someone putting
4913 something silly in .opd with the assembler. No .opd
b34976b6 4914 optimization for them! */
1e2f5b6e
AM
4915 (*_bfd_error_handler)
4916 (_("%s: .opd is not a regular array of opd entries"),
4917 bfd_archive_filename (ibfd));
b34976b6 4918 need_edit = FALSE;
1e2f5b6e
AM
4919 break;
4920 }
4921
4922 r_symndx = ELF64_R_SYM (rel->r_info);
411e1bfb
AM
4923 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms,
4924 r_symndx, ibfd))
4925 goto error_free_rel;
1e2f5b6e
AM
4926
4927 if (sym_sec == NULL || sym_sec->owner == NULL)
4928 {
411e1bfb
AM
4929 const char *sym_name;
4930 if (h != NULL)
4931 sym_name = h->root.root.string;
4932 else
4933 sym_name = bfd_elf_local_sym_name (ibfd, sym);
4934
1e2f5b6e
AM
4935 (*_bfd_error_handler)
4936 (_("%s: undefined sym `%s' in .opd section"),
4937 bfd_archive_filename (ibfd),
411e1bfb 4938 sym_name);
b34976b6 4939 need_edit = FALSE;
1e2f5b6e
AM
4940 break;
4941 }
4942
51020317
AM
4943 /* opd entries are always for functions defined in the
4944 current input bfd. If the symbol isn't defined in the
4945 input bfd, then we won't be using the function in this
4946 bfd; It must be defined in a linkonce section in another
4947 bfd, or is weak. It's also possible that we are
4948 discarding the function due to a linker script /DISCARD/,
4949 which we test for via the output_section. */
4950 if (sym_sec->owner != ibfd
4951 || sym_sec->output_section == bfd_abs_section_ptr)
b34976b6 4952 need_edit = TRUE;
1e2f5b6e
AM
4953
4954 offset += 24;
4955 }
4956
4957 if (need_edit)
4958 {
4959 Elf_Internal_Rela *write_rel;
4960 bfd_byte *rptr, *wptr;
b34976b6 4961 bfd_boolean skip;
1e2f5b6e
AM
4962
4963 /* This seems a waste of time as input .opd sections are all
4964 zeros as generated by gcc, but I suppose there's no reason
4965 this will always be so. We might start putting something in
4966 the third word of .opd entries. */
4967 if ((sec->flags & SEC_IN_MEMORY) == 0)
4968 {
4969 bfd_byte *loc = bfd_alloc (ibfd, sec->_raw_size);
6cdc0ccc
AM
4970 if (loc == NULL
4971 || !bfd_get_section_contents (ibfd, sec, loc, (bfd_vma) 0,
4972 sec->_raw_size))
4973 {
4974 if (local_syms != NULL
4975 && symtab_hdr->contents != (unsigned char *) local_syms)
4976 free (local_syms);
4977 error_free_rel:
4978 if (elf_section_data (sec)->relocs != relstart)
4979 free (relstart);
b34976b6 4980 return FALSE;
6cdc0ccc 4981 }
1e2f5b6e
AM
4982 sec->contents = loc;
4983 sec->flags |= (SEC_IN_MEMORY | SEC_HAS_CONTENTS);
4984 }
4985
4986 elf_section_data (sec)->relocs = relstart;
4987
4988 wptr = sec->contents;
4989 rptr = sec->contents;
4990 write_rel = relstart;
b34976b6 4991 skip = FALSE;
1e2f5b6e
AM
4992 offset = 0;
4993 for (rel = relstart; rel < relend; rel++)
4994 {
4995 if (rel->r_offset == offset)
4996 {
4997 unsigned long r_symndx;
4998 asection *sym_sec;
4999 struct elf_link_hash_entry *h;
5000 Elf_Internal_Sym *sym;
5001
5002 r_symndx = ELF64_R_SYM (rel->r_info);
411e1bfb
AM
5003 get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms,
5004 r_symndx, ibfd);
1e2f5b6e 5005
51020317
AM
5006 skip = (sym_sec->owner != ibfd
5007 || sym_sec->output_section == bfd_abs_section_ptr);
a4aa0fb7
AM
5008 if (skip)
5009 {
0be617ce 5010 if (h != NULL && sym_sec->owner == ibfd)
a4aa0fb7
AM
5011 {
5012 /* Arrange for the function descriptor sym
5013 to be dropped. */
d6fe2dc1 5014 struct ppc_link_hash_entry *fdh;
a4aa0fb7
AM
5015 struct ppc_link_hash_entry *fh;
5016
5017 fh = (struct ppc_link_hash_entry *) h;
d6fe2dc1
AM
5018 fdh = (struct ppc_link_hash_entry *) fh->oh;
5019 if (fdh == NULL)
5020 {
5021 const char *fd_name;
5022 struct ppc_link_hash_table *htab;
5023
5024 fd_name = h->root.root.string + 1;
5025 htab = ppc_hash_table (info);
5026 fdh = (struct ppc_link_hash_entry *)
5027 elf_link_hash_lookup (&htab->elf, fd_name,
b34976b6 5028 FALSE, FALSE, FALSE);
d6fe2dc1
AM
5029 fdh->is_func_descriptor = 1;
5030 fdh->oh = &fh->elf;
5031 fh->is_func = 1;
5032 fh->oh = &fdh->elf;
5033 }
5034
5035 fdh->elf.root.u.def.value = 0;
5036 fdh->elf.root.u.def.section = sym_sec;
a4aa0fb7
AM
5037 }
5038 }
5039 else
1e2f5b6e
AM
5040 {
5041 /* We'll be keeping this opd entry. */
5042
5043 if (h != NULL)
5044 {
5045 /* Redefine the function descriptor symbol
5046 to this location in the opd section.
5047 We've checked above that opd relocs are
5048 ordered. */
d6fe2dc1 5049 struct ppc_link_hash_entry *fdh;
1e2f5b6e
AM
5050 struct ppc_link_hash_entry *fh;
5051
5052 fh = (struct ppc_link_hash_entry *) h;
d6fe2dc1
AM
5053 fdh = (struct ppc_link_hash_entry *) fh->oh;
5054 if (fdh == NULL)
5055 {
5056 const char *fd_name;
5057 struct ppc_link_hash_table *htab;
5058
5059 fd_name = h->root.root.string + 1;
5060 htab = ppc_hash_table (info);
5061 fdh = (struct ppc_link_hash_entry *)
5062 elf_link_hash_lookup (&htab->elf, fd_name,
b34976b6 5063 FALSE, FALSE, FALSE);
d6fe2dc1
AM
5064 fdh->is_func_descriptor = 1;
5065 fdh->oh = &fh->elf;
5066 fh->is_func = 1;
5067 fh->oh = &fdh->elf;
5068 }
5069
5070 fdh->elf.root.u.def.value = wptr - sec->contents;
1e2f5b6e
AM
5071 }
5072 else
5073 {
6cdc0ccc
AM
5074 /* Local syms are a bit tricky. We could
5075 tweak them as they can be cached, but
5076 we'd need to look through the local syms
5077 for the function descriptor sym which we
5078 don't have at the moment. So keep an
b34976b6 5079 array of adjustments. */
7f6a7663 5080 adjust[rel->r_offset / 24] = wptr - rptr;
1e2f5b6e
AM
5081 }
5082
5083 if (wptr != rptr)
5084 memcpy (wptr, rptr, 24);
5085 wptr += 24;
5086 }
5087 rptr += 24;
5088 offset += 24;
5089 }
5090
5091 /* We need to adjust any reloc offsets to point to the
5092 new opd entries. While we're at it, we may as well
5093 remove redundant relocs. */
5094 if (!skip)
5095 {
5096 rel->r_offset += wptr - rptr;
5097 if (write_rel != rel)
5098 memcpy (write_rel, rel, sizeof (*rel));
5099 ++write_rel;
5100 }
5101 }
5102
5103 sec->_cooked_size = wptr - sec->contents;
5104 sec->reloc_count = write_rel - relstart;
cdcf6e38
AM
5105 /* Fudge the size too, as this is used later in
5106 elf_bfd_final_link if we are emitting relocs. */
5107 elf_section_data (sec)->rel_hdr.sh_size
5108 = sec->reloc_count * elf_section_data (sec)->rel_hdr.sh_entsize;
5109 BFD_ASSERT (elf_section_data (sec)->rel_hdr2 == NULL);
1e2f5b6e 5110 }
6cdc0ccc 5111 else if (elf_section_data (sec)->relocs != relstart)
1e2f5b6e 5112 free (relstart);
6cdc0ccc 5113
411e1bfb
AM
5114 if (local_syms != NULL
5115 && symtab_hdr->contents != (unsigned char *) local_syms)
5116 {
5117 if (!info->keep_memory)
5118 free (local_syms);
5119 else
5120 symtab_hdr->contents = (unsigned char *) local_syms;
5121 }
5122 }
5123
5124 return TRUE;
5125}
5126
951fd09b 5127/* Set htab->tls_sec. */
411e1bfb
AM
5128
5129bfd_boolean
951fd09b 5130ppc64_elf_tls_setup (obfd, info)
411e1bfb
AM
5131 bfd *obfd;
5132 struct bfd_link_info *info;
5133{
5134 asection *tls;
411e1bfb
AM
5135 struct ppc_link_hash_table *htab;
5136
411e1bfb
AM
5137 for (tls = obfd->sections; tls != NULL; tls = tls->next)
5138 if ((tls->flags & (SEC_THREAD_LOCAL | SEC_LOAD))
5139 == (SEC_THREAD_LOCAL | SEC_LOAD))
5140 break;
411e1bfb
AM
5141
5142 htab = ppc_hash_table (info);
5143 htab->tls_sec = tls;
a48ebf4d
AM
5144
5145 if (htab->tls_get_addr != NULL)
5146 {
5147 struct elf_link_hash_entry *h = htab->tls_get_addr;
5148
5149 while (h->root.type == bfd_link_hash_indirect
5150 || h->root.type == bfd_link_hash_warning)
5151 h = (struct elf_link_hash_entry *) h->root.u.i.link;
5152
5153 htab->tls_get_addr = h;
5154 }
5155
951fd09b
AM
5156 return tls != NULL;
5157}
411e1bfb 5158
951fd09b
AM
5159/* Run through all the TLS relocs looking for optimization
5160 opportunities. The linker has been hacked (see ppc64elf.em) to do
5161 a preliminary section layout so that we know the TLS segment
5162 offsets. We can't optimize earlier because some optimizations need
5163 to know the tp offset, and we need to optimize before allocating
5164 dynamic relocations. */
5165
5166bfd_boolean
5167ppc64_elf_tls_optimize (obfd, info)
5168 bfd *obfd ATTRIBUTE_UNUSED;
5169 struct bfd_link_info *info;
5170{
5171 bfd *ibfd;
5172 asection *sec;
5173 struct ppc_link_hash_table *htab;
5174
5175 if (info->relocateable || info->shared)
411e1bfb
AM
5176 return TRUE;
5177
951fd09b 5178 htab = ppc_hash_table (info);
411e1bfb
AM
5179 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link_next)
5180 {
5181 Elf_Internal_Sym *locsyms = NULL;
5182
5183 for (sec = ibfd->sections; sec != NULL; sec = sec->next)
5184 if (sec->has_tls_reloc && !bfd_is_abs_section (sec->output_section))
5185 {
5186 Elf_Internal_Rela *relstart, *rel, *relend;
5187 int expecting_tls_get_addr;
5188
5189 /* Read the relocations. */
5190 relstart = _bfd_elf64_link_read_relocs (ibfd, sec, (PTR) NULL,
5191 (Elf_Internal_Rela *) NULL,
5192 info->keep_memory);
5193 if (relstart == NULL)
5194 return FALSE;
5195
5196 expecting_tls_get_addr = 0;
5197 relend = relstart + sec->reloc_count;
5198 for (rel = relstart; rel < relend; rel++)
5199 {
5200 enum elf_ppc64_reloc_type r_type;
5201 unsigned long r_symndx;
5202 struct elf_link_hash_entry *h;
5203 Elf_Internal_Sym *sym;
5204 asection *sym_sec;
e7b938ca
AM
5205 char *tls_mask;
5206 char tls_set, tls_clear, tls_type = 0;
411e1bfb 5207 bfd_vma value;
951fd09b 5208 bfd_boolean ok_tprel, is_local;
411e1bfb
AM
5209
5210 r_symndx = ELF64_R_SYM (rel->r_info);
e7b938ca 5211 if (!get_sym_h (&h, &sym, &sym_sec, &tls_mask, &locsyms,
411e1bfb
AM
5212 r_symndx, ibfd))
5213 {
5214 err_free_rel:
5215 if (elf_section_data (sec)->relocs != relstart)
5216 free (relstart);
5217 if (locsyms != NULL
5218 && (elf_tdata (ibfd)->symtab_hdr.contents
5219 != (unsigned char *) locsyms))
5220 free (locsyms);
5221 return FALSE;
5222 }
5223
5224 if (h != NULL)
5225 {
5226 if (h->root.type != bfd_link_hash_defined
5227 && h->root.type != bfd_link_hash_defweak)
5228 continue;
5229 value = h->root.u.def.value;
5230 }
5231 else
5232 value = sym->st_value;
951fd09b 5233
411e1bfb 5234 ok_tprel = FALSE;
951fd09b
AM
5235 is_local = FALSE;
5236 if (h == NULL
5237 || !(h->elf_link_hash_flags & ELF_LINK_HASH_DEF_DYNAMIC))
411e1bfb 5238 {
951fd09b 5239 is_local = TRUE;
411e1bfb
AM
5240 value += sym_sec->output_offset;
5241 value += sym_sec->output_section->vma;
5242 value -= htab->tls_sec->vma;
5243 ok_tprel = (value + TP_OFFSET + ((bfd_vma) 1 << 31)
5244 < (bfd_vma) 1 << 32);
5245 }
5246
5247 r_type
5248 = (enum elf_ppc64_reloc_type) ELF64_R_TYPE (rel->r_info);
5249 switch (r_type)
5250 {
5251 case R_PPC64_GOT_TLSLD16:
5252 case R_PPC64_GOT_TLSLD16_LO:
5253 case R_PPC64_GOT_TLSLD16_HI:
5254 case R_PPC64_GOT_TLSLD16_HA:
951fd09b
AM
5255 /* These relocs should never be against a symbol
5256 defined in a shared lib. Leave them alone if
5257 that turns out to be the case. */
d881513a 5258 htab->tlsld_got.refcount -= 1;
951fd09b
AM
5259 if (!is_local)
5260 continue;
5261
951fd09b
AM
5262 /* LD -> LE */
5263 tls_set = 0;
5264 tls_clear = TLS_LD;
e7b938ca 5265 tls_type = TLS_TLS | TLS_LD;
411e1bfb
AM
5266 expecting_tls_get_addr = 1;
5267 break;
5268
5269 case R_PPC64_GOT_TLSGD16:
5270 case R_PPC64_GOT_TLSGD16_LO:
5271 case R_PPC64_GOT_TLSGD16_HI:
5272 case R_PPC64_GOT_TLSGD16_HA:
951fd09b 5273 if (ok_tprel)
411e1bfb
AM
5274 /* GD -> LE */
5275 tls_set = 0;
5276 else
5277 /* GD -> IE */
951fd09b
AM
5278 tls_set = TLS_TLS | TLS_TPRELGD;
5279 tls_clear = TLS_GD;
e7b938ca 5280 tls_type = TLS_TLS | TLS_GD;
411e1bfb
AM
5281 expecting_tls_get_addr = 1;
5282 break;
5283
5284 case R_PPC64_GOT_TPREL16_DS:
5285 case R_PPC64_GOT_TPREL16_LO_DS:
5286 case R_PPC64_GOT_TPREL16_HI:
5287 case R_PPC64_GOT_TPREL16_HA:
5288 expecting_tls_get_addr = 0;
5289 if (ok_tprel)
5290 {
5291 /* IE -> LE */
5292 tls_set = 0;
5293 tls_clear = TLS_TPREL;
e7b938ca 5294 tls_type = TLS_TLS | TLS_TPREL;
411e1bfb
AM
5295 break;
5296 }
5297 else
5298 continue;
5299
5300 case R_PPC64_REL14:
5301 case R_PPC64_REL14_BRTAKEN:
5302 case R_PPC64_REL14_BRNTAKEN:
5303 case R_PPC64_REL24:
5304 if (h != NULL
5305 && h == htab->tls_get_addr)
5306 {
5307 if (!expecting_tls_get_addr
5308 && rel != relstart
5309 && ((ELF64_R_TYPE (rel[-1].r_info)
5310 == R_PPC64_TOC16)
5311 || (ELF64_R_TYPE (rel[-1].r_info)
5312 == R_PPC64_TOC16_LO)))
5313 {
5314 /* Check for toc tls entries. */
5315 char *toc_tls;
951fd09b 5316 int retval;
411e1bfb 5317
e7b938ca 5318 retval = get_tls_mask (&toc_tls, &locsyms,
951fd09b
AM
5319 rel - 1, ibfd);
5320 if (retval == 0)
411e1bfb
AM
5321 goto err_free_rel;
5322 if (toc_tls != NULL)
951fd09b 5323 expecting_tls_get_addr = retval > 1;
411e1bfb
AM
5324 }
5325
5326 if (expecting_tls_get_addr)
5327 {
5328 struct plt_entry *ent;
5329 for (ent = h->plt.plist; ent; ent = ent->next)
5330 if (ent->addend == 0)
5331 {
5332 if (ent->plt.refcount > 0)
5333 ent->plt.refcount -= 1;
5334 break;
5335 }
5336 }
5337 }
5338 expecting_tls_get_addr = 0;
5339 continue;
5340
5341 case R_PPC64_TPREL64:
5342 expecting_tls_get_addr = 0;
5343 if (ok_tprel)
5344 {
5345 /* IE -> LE */
5346 tls_set = TLS_EXPLICIT;
5347 tls_clear = TLS_TPREL;
5348 break;
5349 }
5350 else
5351 continue;
5352
5353 case R_PPC64_DTPMOD64:
5354 expecting_tls_get_addr = 0;
951fd09b
AM
5355 if (rel + 1 < relend
5356 && (rel[1].r_info
5357 == ELF64_R_INFO (r_symndx, R_PPC64_DTPREL64))
5358 && rel[1].r_offset == rel->r_offset + 8)
411e1bfb 5359 {
951fd09b 5360 if (ok_tprel)
411e1bfb 5361 /* GD -> LE */
951fd09b 5362 tls_set = TLS_EXPLICIT | TLS_GD;
411e1bfb
AM
5363 else
5364 /* GD -> IE */
951fd09b
AM
5365 tls_set = TLS_EXPLICIT | TLS_GD | TLS_TPRELGD;
5366 tls_clear = TLS_GD;
411e1bfb
AM
5367 }
5368 else
5369 {
951fd09b
AM
5370 if (!is_local)
5371 continue;
5372
5373 /* LD -> LE */
5374 tls_set = TLS_EXPLICIT;
5375 tls_clear = TLS_LD;
411e1bfb
AM
5376 }
5377 break;
5378
5379 default:
5380 expecting_tls_get_addr = 0;
5381 continue;
5382 }
5383
5384 if ((tls_set & TLS_EXPLICIT) == 0)
5385 {
5386 struct got_entry *ent;
5387
5388 /* Adjust got entry for this reloc. */
5389 if (h != NULL)
5390 ent = h->got.glist;
5391 else
5392 ent = elf_local_got_ents (ibfd)[r_symndx];
5393
5394 for (; ent != NULL; ent = ent->next)
5395 if (ent->addend == rel->r_addend
e7b938ca 5396 && ent->tls_type == tls_type)
411e1bfb
AM
5397 break;
5398 if (ent == NULL)
5399 abort ();
5400
5401 if (tls_set == 0)
5402 {
5403 /* We managed to get rid of a got entry. */
5404 if (ent->got.refcount > 0)
5405 ent->got.refcount -= 1;
5406 }
411e1bfb
AM
5407 }
5408 else if (h != NULL)
5409 {
5410 struct ppc_link_hash_entry * eh;
5411 struct ppc_dyn_relocs **pp;
5412 struct ppc_dyn_relocs *p;
5413
5414 /* Adjust dynamic relocs. */
5415 eh = (struct ppc_link_hash_entry *) h;
5416 for (pp = &eh->dyn_relocs;
5417 (p = *pp) != NULL;
5418 pp = &p->next)
5419 if (p->sec == sec)
5420 {
5421 /* If we got rid of a DTPMOD/DTPREL reloc
5422 pair then we'll lose one or two dyn
5423 relocs. */
951fd09b 5424 if (tls_set == (TLS_EXPLICIT | TLS_GD))
411e1bfb 5425 p->count -= 1;
951fd09b 5426 p->count -= 1;
411e1bfb
AM
5427 if (p->count == 0)
5428 *pp = p->next;
5429 break;
5430 }
5431 }
5432
e7b938ca
AM
5433 *tls_mask |= tls_set;
5434 *tls_mask &= ~tls_clear;
411e1bfb
AM
5435 }
5436
5437 if (elf_section_data (sec)->relocs != relstart)
5438 free (relstart);
5439 }
5440
5441 if (locsyms != NULL
5442 && (elf_tdata (ibfd)->symtab_hdr.contents
5443 != (unsigned char *) locsyms))
6cdc0ccc
AM
5444 {
5445 if (!info->keep_memory)
411e1bfb 5446 free (locsyms);
6cdc0ccc 5447 else
411e1bfb 5448 elf_tdata (ibfd)->symtab_hdr.contents = (unsigned char *) locsyms;
6cdc0ccc 5449 }
1e2f5b6e 5450 }
b34976b6 5451 return TRUE;
1e2f5b6e 5452}
b34976b6 5453
65f38f15
AM
5454/* This is the condition under which ppc64_elf_finish_dynamic_symbol
5455 will be called from elflink.h. If elflink.h doesn't call our
5456 finish_dynamic_symbol routine, we'll need to do something about
5457 initializing any .plt and .got entries in ppc64_elf_relocate_section. */
f4656909 5458#define WILL_CALL_FINISH_DYNAMIC_SYMBOL(DYN, SHARED, H) \
65f38f15 5459 ((DYN) \
f4656909 5460 && ((SHARED) \
65f38f15
AM
5461 || ((H)->elf_link_hash_flags & ELF_LINK_FORCED_LOCAL) == 0) \
5462 && ((H)->dynindx != -1 \
5463 || ((H)->elf_link_hash_flags & ELF_LINK_FORCED_LOCAL) != 0))
5bd4f169 5464
65f38f15
AM
5465/* Allocate space in .plt, .got and associated reloc sections for
5466 dynamic relocs. */
5bd4f169 5467
b34976b6 5468static bfd_boolean
65f38f15
AM
5469allocate_dynrelocs (h, inf)
5470 struct elf_link_hash_entry *h;
5471 PTR inf;
5bd4f169 5472{
65f38f15
AM
5473 struct bfd_link_info *info;
5474 struct ppc_link_hash_table *htab;
5bd4f169 5475 asection *s;
65f38f15
AM
5476 struct ppc_link_hash_entry *eh;
5477 struct ppc_dyn_relocs *p;
411e1bfb 5478 struct got_entry *gent;
5bd4f169 5479
e92d460e 5480 if (h->root.type == bfd_link_hash_indirect)
b34976b6 5481 return TRUE;
5bd4f169 5482
e92d460e
AM
5483 if (h->root.type == bfd_link_hash_warning)
5484 h = (struct elf_link_hash_entry *) h->root.u.i.link;
5485
65f38f15
AM
5486 info = (struct bfd_link_info *) inf;
5487 htab = ppc_hash_table (info);
5bd4f169 5488
65f38f15 5489 if (htab->elf.dynamic_sections_created
411e1bfb 5490 && h->dynindx != -1
f4656909 5491 && WILL_CALL_FINISH_DYNAMIC_SYMBOL (1, info->shared, h))
5bd4f169 5492 {
411e1bfb
AM
5493 struct plt_entry *pent;
5494 bfd_boolean doneone = FALSE;
5495 for (pent = h->plt.plist; pent != NULL; pent = pent->next)
5496 if (pent->plt.refcount > 0)
5497 {
5498 BFD_ASSERT (((struct ppc_link_hash_entry *) h)->is_func_descriptor);
5499
5500 /* If this is the first .plt entry, make room for the special
5501 first entry. */
5502 s = htab->splt;
5503 if (s->_raw_size == 0)
5504 s->_raw_size += PLT_INITIAL_ENTRY_SIZE;
5505
5506 pent->plt.offset = s->_raw_size;
5507
5508 /* Make room for this entry. */
5509 s->_raw_size += PLT_ENTRY_SIZE;
5510
5511 /* Make room for the .glink code. */
5512 s = htab->sglink;
5513 if (s->_raw_size == 0)
5514 s->_raw_size += GLINK_CALL_STUB_SIZE;
5515 /* We need bigger stubs past index 32767. */
5516 if (s->_raw_size >= GLINK_CALL_STUB_SIZE + 32768*2*4)
5517 s->_raw_size += 4;
5518 s->_raw_size += 2*4;
5519
5520 /* We also need to make an entry in the .rela.plt section. */
5521 s = htab->srelplt;
5522 s->_raw_size += sizeof (Elf64_External_Rela);
5523 doneone = TRUE;
5524 }
5525 else
5526 pent->plt.offset = (bfd_vma) -1;
5527 if (!doneone)
65f38f15 5528 {
411e1bfb 5529 h->plt.plist = NULL;
65f38f15
AM
5530 h->elf_link_hash_flags &= ~ELF_LINK_HASH_NEEDS_PLT;
5531 }
5532 }
5533 else
5534 {
411e1bfb 5535 h->plt.plist = NULL;
65f38f15
AM
5536 h->elf_link_hash_flags &= ~ELF_LINK_HASH_NEEDS_PLT;
5537 }
5538
951fd09b
AM
5539 eh = (struct ppc_link_hash_entry *) h;
5540 /* Run through the TLS GD got entries first if we're changing them
5541 to TPREL. */
e7b938ca 5542 if ((eh->tls_mask & TLS_TPRELGD) != 0)
951fd09b
AM
5543 for (gent = h->got.glist; gent != NULL; gent = gent->next)
5544 if (gent->got.refcount > 0
5545 && (gent->tls_type & TLS_GD) != 0)
5546 {
5547 /* This was a GD entry that has been converted to TPREL. If
5548 there happens to be a TPREL entry we can use that one. */
5549 struct got_entry *ent;
5550 for (ent = h->got.glist; ent != NULL; ent = ent->next)
5551 if (ent->got.refcount > 0
5552 && (ent->tls_type & TLS_TPREL) != 0
5553 && ent->addend == gent->addend)
5554 {
5555 gent->got.refcount = 0;
5556 break;
5557 }
5558
5559 /* If not, then we'll be using our own TPREL entry. */
5560 if (gent->got.refcount != 0)
5561 gent->tls_type = TLS_TLS | TLS_TPREL;
5562 }
5563
411e1bfb
AM
5564 for (gent = h->got.glist; gent != NULL; gent = gent->next)
5565 if (gent->got.refcount > 0)
5566 {
951fd09b
AM
5567 bfd_boolean dyn;
5568
411e1bfb 5569 /* Make sure this symbol is output as a dynamic symbol.
951fd09b
AM
5570 Undefined weak syms won't yet be marked as dynamic,
5571 nor will all TLS symbols. */
411e1bfb
AM
5572 if (h->dynindx == -1
5573 && (h->elf_link_hash_flags & ELF_LINK_FORCED_LOCAL) == 0)
5574 {
5575 if (! bfd_elf64_link_record_dynamic_symbol (info, h))
5576 return FALSE;
5577 }
65f38f15 5578
d881513a
AM
5579 if ((gent->tls_type & TLS_LD) != 0
5580 && !(h->elf_link_hash_flags & ELF_LINK_HASH_DEF_DYNAMIC))
411e1bfb 5581 {
951fd09b
AM
5582 gent->got.offset = htab->tlsld_got.offset;
5583 continue;
411e1bfb 5584 }
951fd09b
AM
5585
5586 s = htab->sgot;
5587 gent->got.offset = s->_raw_size;
d881513a
AM
5588 s->_raw_size
5589 += (gent->tls_type & eh->tls_mask & (TLS_GD | TLS_LD)) ? 16 : 8;
951fd09b 5590 dyn = htab->elf.dynamic_sections_created;
f4656909
AM
5591 if (info->shared
5592 || WILL_CALL_FINISH_DYNAMIC_SYMBOL (dyn, 0, h))
951fd09b 5593 htab->srelgot->_raw_size
e7b938ca 5594 += (gent->tls_type & eh->tls_mask & TLS_GD
951fd09b
AM
5595 ? 2 * sizeof (Elf64_External_Rela)
5596 : sizeof (Elf64_External_Rela));
411e1bfb
AM
5597 }
5598 else
5599 gent->got.offset = (bfd_vma) -1;
65f38f15 5600
65f38f15 5601 if (eh->dyn_relocs == NULL)
b34976b6 5602 return TRUE;
65f38f15
AM
5603
5604 /* In the shared -Bsymbolic case, discard space allocated for
5605 dynamic pc-relative relocs against symbols which turn out to be
5606 defined in regular objects. For the normal shared case, discard
5607 space for relocs that have become local due to symbol visibility
5608 changes. */
5609
5610 if (info->shared)
5611 {
5612 if ((h->elf_link_hash_flags & ELF_LINK_HASH_DEF_REGULAR) != 0
5613 && ((h->elf_link_hash_flags & ELF_LINK_FORCED_LOCAL) != 0
5614 || info->symbolic))
5615 {
5616 struct ppc_dyn_relocs **pp;
5617
5618 for (pp = &eh->dyn_relocs; (p = *pp) != NULL; )
5bd4f169 5619 {
65f38f15
AM
5620 p->count -= p->pc_count;
5621 p->pc_count = 0;
5622 if (p->count == 0)
5623 *pp = p->next;
5624 else
5625 pp = &p->next;
5bd4f169 5626 }
65f38f15
AM
5627 }
5628 }
f4656909 5629 else if (ELIMINATE_COPY_RELOCS)
65f38f15
AM
5630 {
5631 /* For the non-shared case, discard space for relocs against
5632 symbols which turn out to need copy relocs or are not
5633 dynamic. */
5634
5635 if ((h->elf_link_hash_flags & ELF_LINK_NON_GOT_REF) == 0
58ac9f71
AM
5636 && (h->elf_link_hash_flags & ELF_LINK_HASH_DEF_DYNAMIC) != 0
5637 && (h->elf_link_hash_flags & ELF_LINK_HASH_DEF_REGULAR) == 0)
65f38f15
AM
5638 {
5639 /* Make sure this symbol is output as a dynamic symbol.
5640 Undefined weak syms won't yet be marked as dynamic. */
5641 if (h->dynindx == -1
5642 && (h->elf_link_hash_flags & ELF_LINK_FORCED_LOCAL) == 0)
5643 {
ec338859 5644 if (! bfd_elf64_link_record_dynamic_symbol (info, h))
b34976b6 5645 return FALSE;
65f38f15
AM
5646 }
5647
5648 /* If that succeeded, we know we'll be keeping all the
5649 relocs. */
5650 if (h->dynindx != -1)
5651 goto keep;
5652 }
5653
5654 eh->dyn_relocs = NULL;
5655
ec338859 5656 keep: ;
65f38f15
AM
5657 }
5658
5659 /* Finally, allocate space. */
5660 for (p = eh->dyn_relocs; p != NULL; p = p->next)
5661 {
5662 asection *sreloc = elf_section_data (p->sec)->sreloc;
5663 sreloc->_raw_size += p->count * sizeof (Elf64_External_Rela);
5664 }
5665
b34976b6 5666 return TRUE;
65f38f15
AM
5667}
5668
5669/* Find any dynamic relocs that apply to read-only sections. */
5670
b34976b6 5671static bfd_boolean
65f38f15
AM
5672readonly_dynrelocs (h, inf)
5673 struct elf_link_hash_entry *h;
5674 PTR inf;
5675{
5676 struct ppc_link_hash_entry *eh;
5677 struct ppc_dyn_relocs *p;
5678
e92d460e
AM
5679 if (h->root.type == bfd_link_hash_warning)
5680 h = (struct elf_link_hash_entry *) h->root.u.i.link;
5681
65f38f15
AM
5682 eh = (struct ppc_link_hash_entry *) h;
5683 for (p = eh->dyn_relocs; p != NULL; p = p->next)
5684 {
5685 asection *s = p->sec->output_section;
5686
5687 if (s != NULL && (s->flags & SEC_READONLY) != 0)
5688 {
5689 struct bfd_link_info *info = (struct bfd_link_info *) inf;
5690
5691 info->flags |= DF_TEXTREL;
5692
5693 /* Not an error, just cut short the traversal. */
b34976b6 5694 return FALSE;
65f38f15
AM
5695 }
5696 }
b34976b6 5697 return TRUE;
65f38f15
AM
5698}
5699
5700/* Set the sizes of the dynamic sections. */
5701
b34976b6 5702static bfd_boolean
65f38f15
AM
5703ppc64_elf_size_dynamic_sections (output_bfd, info)
5704 bfd *output_bfd ATTRIBUTE_UNUSED;
5705 struct bfd_link_info *info;
5706{
5707 struct ppc_link_hash_table *htab;
5708 bfd *dynobj;
5709 asection *s;
b34976b6 5710 bfd_boolean relocs;
65f38f15
AM
5711 bfd *ibfd;
5712
5713 htab = ppc_hash_table (info);
5714 dynobj = htab->elf.dynobj;
5715 if (dynobj == NULL)
5716 abort ();
5717
5718 if (htab->elf.dynamic_sections_created)
5719 {
5720 /* Set the contents of the .interp section to the interpreter. */
5721 if (! info->shared)
5722 {
5723 s = bfd_get_section_by_name (dynobj, ".interp");
5724 if (s == NULL)
5725 abort ();
5726 s->_raw_size = sizeof ELF_DYNAMIC_INTERPRETER;
5727 s->contents = (unsigned char *) ELF_DYNAMIC_INTERPRETER;
5728 }
5729 }
5730
411e1bfb
AM
5731 if (htab->tlsld_got.refcount > 0)
5732 {
5733 htab->tlsld_got.offset = htab->sgot->_raw_size;
5734 htab->sgot->_raw_size += 16;
5735 if (info->shared)
5736 htab->srelgot->_raw_size += sizeof (Elf64_External_Rela);
5737 }
5738 else
5739 htab->tlsld_got.offset = (bfd_vma) -1;
5740
65f38f15
AM
5741 /* Set up .got offsets for local syms, and space for local dynamic
5742 relocs. */
5743 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link_next)
5744 {
411e1bfb
AM
5745 struct got_entry **lgot_ents;
5746 struct got_entry **end_lgot_ents;
e7b938ca 5747 char *lgot_masks;
65f38f15
AM
5748 bfd_size_type locsymcount;
5749 Elf_Internal_Shdr *symtab_hdr;
5750 asection *srel;
5751
5752 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour)
5753 continue;
5754
5755 for (s = ibfd->sections; s != NULL; s = s->next)
5756 {
ec338859 5757 struct ppc_dyn_relocs *p;
65f38f15 5758
ec338859
AM
5759 for (p = *((struct ppc_dyn_relocs **)
5760 &elf_section_data (s)->local_dynrel);
5761 p != NULL;
5762 p = p->next)
65f38f15 5763 {
ec338859
AM
5764 if (!bfd_is_abs_section (p->sec)
5765 && bfd_is_abs_section (p->sec->output_section))
5766 {
5767 /* Input section has been discarded, either because
5768 it is a copy of a linkonce section or due to
5769 linker script /DISCARD/, so we'll be discarding
5770 the relocs too. */
5771 }
248866a8 5772 else if (p->count != 0)
ec338859
AM
5773 {
5774 srel = elf_section_data (p->sec)->sreloc;
5775 srel->_raw_size += p->count * sizeof (Elf64_External_Rela);
248866a8
AM
5776 if ((p->sec->output_section->flags & SEC_READONLY) != 0)
5777 info->flags |= DF_TEXTREL;
ec338859 5778 }
65f38f15
AM
5779 }
5780 }
5781
411e1bfb
AM
5782 lgot_ents = elf_local_got_ents (ibfd);
5783 if (!lgot_ents)
65f38f15
AM
5784 continue;
5785
5786 symtab_hdr = &elf_tdata (ibfd)->symtab_hdr;
5787 locsymcount = symtab_hdr->sh_info;
411e1bfb 5788 end_lgot_ents = lgot_ents + locsymcount;
e7b938ca 5789 lgot_masks = (char *) end_lgot_ents;
65f38f15
AM
5790 s = htab->sgot;
5791 srel = htab->srelgot;
e7b938ca 5792 for (; lgot_ents < end_lgot_ents; ++lgot_ents, ++lgot_masks)
65f38f15 5793 {
411e1bfb
AM
5794 struct got_entry *ent;
5795
5796 for (ent = *lgot_ents; ent != NULL; ent = ent->next)
5797 if (ent->got.refcount > 0)
5798 {
e7b938ca 5799 if ((ent->tls_type & *lgot_masks & TLS_LD) != 0)
411e1bfb
AM
5800 {
5801 if (htab->tlsld_got.offset == (bfd_vma) -1)
5802 {
5803 htab->tlsld_got.offset = s->_raw_size;
5804 s->_raw_size += 16;
5805 if (info->shared)
5806 srel->_raw_size += sizeof (Elf64_External_Rela);
5807 }
5808 ent->got.offset = htab->tlsld_got.offset;
5809 }
5810 else
5811 {
5812 ent->got.offset = s->_raw_size;
e7b938ca 5813 if ((ent->tls_type & *lgot_masks & TLS_GD) != 0)
411e1bfb
AM
5814 {
5815 s->_raw_size += 16;
5816 if (info->shared)
5817 srel->_raw_size += 2 * sizeof (Elf64_External_Rela);
5818 }
5819 else
5820 {
5821 s->_raw_size += 8;
5822 if (info->shared)
5823 srel->_raw_size += sizeof (Elf64_External_Rela);
5824 }
5825 }
5826 }
5827 else
5828 ent->got.offset = (bfd_vma) -1;
65f38f15
AM
5829 }
5830 }
5831
5832 /* Allocate global sym .plt and .got entries, and space for global
5833 sym dynamic relocs. */
5834 elf_link_hash_traverse (&htab->elf, allocate_dynrelocs, (PTR) info);
5835
5836 /* We now have determined the sizes of the various dynamic sections.
5837 Allocate memory for them. */
b34976b6 5838 relocs = FALSE;
65f38f15
AM
5839 for (s = dynobj->sections; s != NULL; s = s->next)
5840 {
5841 if ((s->flags & SEC_LINKER_CREATED) == 0)
5842 continue;
5843
411e1bfb
AM
5844 /* Reset _cooked_size since prelim layout will set it wrongly,
5845 and a non-zero _cooked_size sticks. */
5846 s->_cooked_size = 0;
5847
721956f4
AM
5848 if (s == htab->sbrlt || s == htab->srelbrlt)
5849 /* These haven't been allocated yet; don't strip. */
5850 continue;
5851 else if (s == htab->splt
5852 || s == htab->sgot
5853 || s == htab->sglink)
65f38f15
AM
5854 {
5855 /* Strip this section if we don't need it; see the
5856 comment below. */
5bd4f169 5857 }
65f38f15 5858 else if (strncmp (bfd_get_section_name (dynobj, s), ".rela", 5) == 0)
5bd4f169
AM
5859 {
5860 if (s->_raw_size == 0)
5861 {
5862 /* If we don't need this section, strip it from the
5863 output file. This is mostly to handle .rela.bss and
5864 .rela.plt. We must create both sections in
5865 create_dynamic_sections, because they must be created
5866 before the linker maps input sections to output
5867 sections. The linker does that before
5868 adjust_dynamic_symbol is called, and it is that
5869 function which decides whether anything needs to go
5870 into these sections. */
5bd4f169
AM
5871 }
5872 else
5873 {
65f38f15 5874 if (s != htab->srelplt)
b34976b6 5875 relocs = TRUE;
5bd4f169
AM
5876
5877 /* We use the reloc_count field as a counter if we need
5878 to copy relocs into the output file. */
5879 s->reloc_count = 0;
5880 }
5881 }
65f38f15 5882 else
5bd4f169
AM
5883 {
5884 /* It's not one of our sections, so don't allocate space. */
5885 continue;
5886 }
5887
65f38f15 5888 if (s->_raw_size == 0)
5bd4f169
AM
5889 {
5890 _bfd_strip_section_from_output (info, s);
5891 continue;
5892 }
5893
5f333394
AM
5894 /* .plt is in the bss section. We don't initialise it. */
5895 if ((s->flags & SEC_LOAD) == 0)
5896 continue;
5897
65f38f15
AM
5898 /* Allocate memory for the section contents. We use bfd_zalloc
5899 here in case unused entries are not reclaimed before the
5900 section's contents are written out. This should not happen,
411e1bfb
AM
5901 but this way if it does we get a R_PPC64_NONE reloc in .rela
5902 sections instead of garbage.
5903 We also rely on the section contents being zero when writing
5904 the GOT. */
721956f4 5905 s->contents = (bfd_byte *) bfd_zalloc (dynobj, s->_raw_size);
65f38f15 5906 if (s->contents == NULL)
b34976b6 5907 return FALSE;
5bd4f169
AM
5908 }
5909
e86ce104 5910 if (htab->elf.dynamic_sections_created)
5bd4f169
AM
5911 {
5912 /* Add some entries to the .dynamic section. We fill in the
5913 values later, in ppc64_elf_finish_dynamic_sections, but we
5914 must add the entries now so that we get the correct size for
5915 the .dynamic section. The DT_DEBUG entry is filled in by the
5916 dynamic linker and used by the debugger. */
dc810e39
AM
5917#define add_dynamic_entry(TAG, VAL) \
5918 bfd_elf64_add_dynamic_entry (info, (bfd_vma) (TAG), (bfd_vma) (VAL))
5919
5920 if (!info->shared)
5bd4f169 5921 {
dc810e39 5922 if (!add_dynamic_entry (DT_DEBUG, 0))
b34976b6 5923 return FALSE;
5bd4f169
AM
5924 }
5925
9c07fe7c 5926 if (htab->splt != NULL && htab->splt->_raw_size != 0)
5bd4f169 5927 {
dc810e39
AM
5928 if (!add_dynamic_entry (DT_PLTGOT, 0)
5929 || !add_dynamic_entry (DT_PLTRELSZ, 0)
5930 || !add_dynamic_entry (DT_PLTREL, DT_RELA)
5d1634d7
AM
5931 || !add_dynamic_entry (DT_JMPREL, 0)
5932 || !add_dynamic_entry (DT_PPC64_GLINK, 0))
b34976b6 5933 return FALSE;
5bd4f169
AM
5934 }
5935
19397422
AM
5936 if (NO_OPD_RELOCS)
5937 {
5938 if (!add_dynamic_entry (DT_PPC64_OPD, 0)
5939 || !add_dynamic_entry (DT_PPC64_OPDSZ, 0))
b34976b6 5940 return FALSE;
19397422
AM
5941 }
5942
5bd4f169
AM
5943 if (relocs)
5944 {
dc810e39
AM
5945 if (!add_dynamic_entry (DT_RELA, 0)
5946 || !add_dynamic_entry (DT_RELASZ, 0)
5947 || !add_dynamic_entry (DT_RELAENT, sizeof (Elf64_External_Rela)))
b34976b6 5948 return FALSE;
5bd4f169 5949
65f38f15
AM
5950 /* If any dynamic relocs apply to a read-only section,
5951 then we need a DT_TEXTREL entry. */
248866a8
AM
5952 if ((info->flags & DF_TEXTREL) == 0)
5953 elf_link_hash_traverse (&htab->elf, readonly_dynrelocs,
5954 (PTR) info);
5bd4f169 5955
65f38f15 5956 if ((info->flags & DF_TEXTREL) != 0)
5bd4f169 5957 {
65f38f15 5958 if (!add_dynamic_entry (DT_TEXTREL, 0))
b34976b6 5959 return FALSE;
5bd4f169 5960 }
5bd4f169 5961 }
5bd4f169 5962 }
65f38f15 5963#undef add_dynamic_entry
5bd4f169 5964
b34976b6 5965 return TRUE;
5bd4f169
AM
5966}
5967
721956f4 5968/* Determine the type of stub needed, if any, for a call. */
5bd4f169 5969
721956f4
AM
5970static INLINE enum ppc_stub_type
5971ppc_type_of_stub (input_sec, rel, hash, destination)
5972 asection *input_sec;
5973 const Elf_Internal_Rela *rel;
5974 struct ppc_link_hash_entry **hash;
5975 bfd_vma destination;
5bd4f169 5976{
721956f4
AM
5977 struct ppc_link_hash_entry *h = *hash;
5978 bfd_vma location;
5979 bfd_vma branch_offset;
5980 bfd_vma max_branch_offset;
5981 unsigned int r_type;
5bd4f169 5982
721956f4
AM
5983 if (h != NULL)
5984 {
5985 if (h->oh != NULL
721956f4 5986 && h->oh->dynindx != -1)
5bd4f169 5987 {
411e1bfb
AM
5988 struct plt_entry *ent;
5989 for (ent = h->oh->plt.plist; ent != NULL; ent = ent->next)
5990 if (ent->addend == rel->r_addend
5991 && ent->plt.offset != (bfd_vma) -1)
5992 {
5993 *hash = (struct ppc_link_hash_entry *) h->oh;
5994 return ppc_stub_plt_call;
5995 }
5bd4f169
AM
5996 }
5997
721956f4
AM
5998 if (h->elf.root.type == bfd_link_hash_undefweak
5999 || h->elf.root.type == bfd_link_hash_undefined)
6000 return ppc_stub_none;
5d1634d7 6001 }
5d1634d7 6002
721956f4
AM
6003 /* Determine where the call point is. */
6004 location = (input_sec->output_offset
6005 + input_sec->output_section->vma
6006 + rel->r_offset);
5d1634d7 6007
721956f4
AM
6008 branch_offset = destination - location;
6009 r_type = ELF64_R_TYPE (rel->r_info);
5d1634d7 6010
721956f4
AM
6011 /* Determine if a long branch stub is needed. */
6012 max_branch_offset = 1 << 25;
6013 if (r_type != (unsigned int) R_PPC64_REL24)
6014 max_branch_offset = 1 << 15;
5d1634d7 6015
721956f4
AM
6016 if (branch_offset + max_branch_offset >= 2 * max_branch_offset)
6017 /* We need a stub. Figure out whether a long_branch or plt_branch
6018 is needed later. */
6019 return ppc_stub_long_branch;
5d1634d7 6020
721956f4 6021 return ppc_stub_none;
5d1634d7
AM
6022}
6023
6024/* Build a .plt call stub. */
6025
6026static bfd_byte *
6027build_plt_stub (obfd, p, offset, glink)
6028 bfd *obfd;
6029 bfd_byte *p;
6030 int offset;
6031 int glink;
6032{
6033#define PPC_LO(v) ((v) & 0xffff)
6034#define PPC_HI(v) (((v) >> 16) & 0xffff)
6035#define PPC_HA(v) PPC_HI ((v) + 0x8000)
6036
6037 if (glink)
6038 bfd_put_32 (obfd, LD_R2_40R1, p), p += 4;
6039 bfd_put_32 (obfd, ADDIS_R12_R2 | PPC_HA (offset), p), p += 4;
6040 if (!glink)
6041 bfd_put_32 (obfd, STD_R2_40R1, p), p += 4;
6042 bfd_put_32 (obfd, LD_R11_0R12 | PPC_LO (offset), p), p += 4;
6043 if (PPC_HA (offset + 8) != PPC_HA (offset))
6044 bfd_put_32 (obfd, ADDIS_R12_R12_1, p), p += 4;
6045 offset += 8;
6046 bfd_put_32 (obfd, LD_R2_0R12 | PPC_LO (offset), p), p += 4;
6047 if (PPC_HA (offset + 8) != PPC_HA (offset))
6048 bfd_put_32 (obfd, ADDIS_R12_R12_1, p), p += 4;
6049 offset += 8;
6050 bfd_put_32 (obfd, MTCTR_R11, p), p += 4;
6051 bfd_put_32 (obfd, LD_R11_0R12 | PPC_LO (offset), p), p += 4;
6052 bfd_put_32 (obfd, BCTR, p), p += 4;
6053 return p;
6054}
6055
b34976b6 6056static bfd_boolean
721956f4
AM
6057ppc_build_one_stub (gen_entry, in_arg)
6058 struct bfd_hash_entry *gen_entry;
6059 PTR in_arg;
5d1634d7 6060{
721956f4
AM
6061 struct ppc_stub_hash_entry *stub_entry;
6062 struct ppc_branch_hash_entry *br_entry;
5d1634d7
AM
6063 struct bfd_link_info *info;
6064 struct ppc_link_hash_table *htab;
721956f4
AM
6065 asection *stub_sec;
6066 bfd *stub_bfd;
6067 bfd_byte *loc;
6068 bfd_byte *p;
6069 unsigned int indx;
411e1bfb 6070 struct plt_entry *ent;
721956f4
AM
6071 bfd_vma off;
6072 int size;
5d1634d7 6073
721956f4
AM
6074 /* Massage our args to the form they really have. */
6075 stub_entry = (struct ppc_stub_hash_entry *) gen_entry;
6076 info = (struct bfd_link_info *) in_arg;
5d1634d7 6077
5d1634d7 6078 htab = ppc_hash_table (info);
721956f4 6079 stub_sec = stub_entry->stub_sec;
5d1634d7 6080
721956f4
AM
6081 /* Make a note of the offset within the stubs for this entry. */
6082 stub_entry->stub_offset = stub_sec->_cooked_size;
6083 loc = stub_sec->contents + stub_entry->stub_offset;
6084
6085 stub_bfd = stub_sec->owner;
6086
6087 switch (stub_entry->stub_type)
5d1634d7 6088 {
721956f4
AM
6089 case ppc_stub_long_branch:
6090 /* Branches are relative. This is where we are going to. */
6091 off = (stub_entry->target_value
6092 + stub_entry->target_section->output_offset
6093 + stub_entry->target_section->output_section->vma);
5d1634d7 6094
721956f4
AM
6095 /* And this is where we are coming from. */
6096 off -= (stub_entry->stub_offset
6097 + stub_sec->output_offset
6098 + stub_sec->output_section->vma);
e86ce104 6099
721956f4 6100 BFD_ASSERT (off + (1 << 25) < (bfd_vma) (1 << 26));
e86ce104 6101
721956f4
AM
6102 bfd_put_32 (stub_bfd, (bfd_vma) B_DOT | (off & 0x3fffffc), loc);
6103 size = 4;
6104 break;
e86ce104 6105
721956f4
AM
6106 case ppc_stub_plt_branch:
6107 br_entry = ppc_branch_hash_lookup (&htab->branch_hash_table,
6108 stub_entry->root.string + 9,
b34976b6 6109 FALSE, FALSE);
721956f4
AM
6110 if (br_entry == NULL)
6111 {
6112 (*_bfd_error_handler) (_("can't find branch stub `%s'"),
6113 stub_entry->root.string + 9);
b34976b6
AM
6114 htab->stub_error = TRUE;
6115 return FALSE;
721956f4
AM
6116 }
6117
6118 off = (stub_entry->target_value
6119 + stub_entry->target_section->output_offset
6120 + stub_entry->target_section->output_section->vma);
6121
6122 bfd_put_64 (htab->sbrlt->owner, off,
6123 htab->sbrlt->contents + br_entry->offset);
6124
6125 if (info->shared)
6126 {
6127 /* Create a reloc for the branch lookup table entry. */
6128 Elf_Internal_Rela rela;
947216bf 6129 bfd_byte *loc;
5d1634d7 6130
721956f4
AM
6131 rela.r_offset = (br_entry->offset
6132 + htab->sbrlt->output_offset
6133 + htab->sbrlt->output_section->vma);
6134 rela.r_info = ELF64_R_INFO (0, R_PPC64_RELATIVE);
6135 rela.r_addend = off;
6136
947216bf
AM
6137 loc = htab->srelbrlt->contents;
6138 loc += htab->srelbrlt->reloc_count++ * sizeof (Elf64_External_Rela);
6139 bfd_elf64_swap_reloca_out (htab->srelbrlt->owner, &rela, loc);
721956f4
AM
6140 }
6141
6142 off = (br_entry->offset
6143 + htab->sbrlt->output_offset
6144 + htab->sbrlt->output_section->vma
6145 - elf_gp (htab->sbrlt->output_section->owner)
6146 - TOC_BASE_OFF);
6147
6148 if (off + 0x80000000 > 0xffffffff || (off & 7) != 0)
5d1634d7
AM
6149 {
6150 (*_bfd_error_handler)
e86ce104 6151 (_("linkage table error against `%s'"),
721956f4 6152 stub_entry->root.string);
5d1634d7 6153 bfd_set_error (bfd_error_bad_value);
b34976b6
AM
6154 htab->stub_error = TRUE;
6155 return FALSE;
5d1634d7 6156 }
41bd81ab 6157
721956f4
AM
6158 indx = off;
6159 bfd_put_32 (stub_bfd, (bfd_vma) ADDIS_R12_R2 | PPC_HA (indx), loc);
6160 bfd_put_32 (stub_bfd, (bfd_vma) LD_R11_0R12 | PPC_LO (indx), loc + 4);
6161 bfd_put_32 (stub_bfd, (bfd_vma) MTCTR_R11, loc + 8);
6162 bfd_put_32 (stub_bfd, (bfd_vma) BCTR, loc + 12);
6163 size = 16;
6164 break;
5d1634d7 6165
721956f4 6166 case ppc_stub_plt_call:
c862ae31
AM
6167 /* Do the best we can for shared libraries built without
6168 exporting ".foo" for each "foo". This can happen when symbol
6169 versioning scripts strip all bar a subset of symbols. */
6170 if (stub_entry->h->oh->root.type != bfd_link_hash_defined
6171 && stub_entry->h->oh->root.type != bfd_link_hash_defweak)
6172 {
6173 /* Point the symbol at the stub. There may be multiple stubs,
6174 we don't really care; The main thing is to make this sym
6175 defined somewhere. */
6176 stub_entry->h->oh->root.type = bfd_link_hash_defined;
6177 stub_entry->h->oh->root.u.def.section = stub_entry->stub_sec;
6178 stub_entry->h->oh->root.u.def.value = stub_entry->stub_offset;
6179 }
6180
721956f4 6181 /* Now build the stub. */
411e1bfb
AM
6182 off = (bfd_vma) -1;
6183 for (ent = stub_entry->h->elf.plt.plist; ent != NULL; ent = ent->next)
6184 if (ent->addend == stub_entry->addend)
6185 {
6186 off = ent->plt.offset;
6187 break;
6188 }
721956f4
AM
6189 if (off >= (bfd_vma) -2)
6190 abort ();
6191
6192 off &= ~ (bfd_vma) 1;
6193 off += (htab->splt->output_offset
6194 + htab->splt->output_section->vma
6195 - elf_gp (htab->splt->output_section->owner)
6196 - TOC_BASE_OFF);
6197
6198 if (off + 0x80000000 > 0xffffffff || (off & 7) != 0)
6199 {
6200 (*_bfd_error_handler)
6201 (_("linkage table error against `%s'"),
6202 stub_entry->h->elf.root.root.string);
6203 bfd_set_error (bfd_error_bad_value);
b34976b6
AM
6204 htab->stub_error = TRUE;
6205 return FALSE;
721956f4
AM
6206 }
6207
6208 p = build_plt_stub (stub_bfd, loc, (int) off, 0);
6209 size = p - loc;
6210 break;
6211
6212 default:
6213 BFD_FAIL ();
b34976b6 6214 return FALSE;
721956f4
AM
6215 }
6216
6217 stub_sec->_cooked_size += size;
b34976b6 6218 return TRUE;
721956f4
AM
6219}
6220
6221/* As above, but don't actually build the stub. Just bump offset so
6222 we know stub section sizes, and select plt_branch stubs where
6223 long_branch stubs won't do. */
6224
b34976b6 6225static bfd_boolean
721956f4
AM
6226ppc_size_one_stub (gen_entry, in_arg)
6227 struct bfd_hash_entry *gen_entry;
6228 PTR in_arg;
6229{
6230 struct ppc_stub_hash_entry *stub_entry;
6231 struct ppc_link_hash_table *htab;
6232 bfd_vma off;
6233 int size;
6234
6235 /* Massage our args to the form they really have. */
6236 stub_entry = (struct ppc_stub_hash_entry *) gen_entry;
6237 htab = (struct ppc_link_hash_table *) in_arg;
6238
6239 if (stub_entry->stub_type == ppc_stub_plt_call)
6240 {
411e1bfb 6241 struct plt_entry *ent;
58ac9f71 6242 off = (bfd_vma) -1;
411e1bfb
AM
6243 for (ent = stub_entry->h->elf.plt.plist; ent != NULL; ent = ent->next)
6244 if (ent->addend == stub_entry->addend)
6245 {
6246 off = ent->plt.offset & ~(bfd_vma) 1;
6247 break;
6248 }
58ac9f71 6249 if (off >= (bfd_vma) -2)
411e1bfb 6250 abort ();
721956f4
AM
6251 off += (htab->splt->output_offset
6252 + htab->splt->output_section->vma
6253 - elf_gp (htab->splt->output_section->owner)
6254 - TOC_BASE_OFF);
6255
6256 size = 28;
6257 if (PPC_HA ((int) off + 16) != PPC_HA ((int) off))
6258 size += 4;
6259 }
6260 else
6261 {
6262 /* ppc_stub_long_branch or ppc_stub_plt_branch. */
6263 stub_entry->stub_type = ppc_stub_long_branch;
6264 size = 4;
6265
6266 off = (stub_entry->target_value
6267 + stub_entry->target_section->output_offset
6268 + stub_entry->target_section->output_section->vma);
6269 off -= (stub_entry->stub_sec->_raw_size
6270 + stub_entry->stub_sec->output_offset
6271 + stub_entry->stub_sec->output_section->vma);
6272
6273 if (off + (1 << 25) >= (bfd_vma) (1 << 26))
6274 {
6275 struct ppc_branch_hash_entry *br_entry;
6276
6277 br_entry = ppc_branch_hash_lookup (&htab->branch_hash_table,
6278 stub_entry->root.string + 9,
b34976b6 6279 TRUE, FALSE);
721956f4
AM
6280 if (br_entry == NULL)
6281 {
6282 (*_bfd_error_handler) (_("can't build branch stub `%s'"),
6283 stub_entry->root.string + 9);
b34976b6
AM
6284 htab->stub_error = TRUE;
6285 return FALSE;
721956f4
AM
6286 }
6287
6288 if (br_entry->iter != htab->stub_iteration)
6289 {
6290 br_entry->iter = htab->stub_iteration;
6291 br_entry->offset = htab->sbrlt->_raw_size;
6292 htab->sbrlt->_raw_size += 8;
6293 }
6294 stub_entry->stub_type = ppc_stub_plt_branch;
6295 size = 16;
6296 }
6297 }
6298
6299 stub_entry->stub_sec->_raw_size += size;
b34976b6 6300 return TRUE;
721956f4
AM
6301}
6302
6303/* Set up various things so that we can make a list of input sections
6304 for each output section included in the link. Returns -1 on error,
cedb70c5 6305 0 when no stubs will be needed, and 1 on success. */
721956f4
AM
6306
6307int
6308ppc64_elf_setup_section_lists (output_bfd, info)
6309 bfd *output_bfd;
6310 struct bfd_link_info *info;
6311{
6312 bfd *input_bfd;
721956f4
AM
6313 int top_id, top_index;
6314 asection *section;
6315 asection **input_list, **list;
6316 bfd_size_type amt;
6317 struct ppc_link_hash_table *htab = ppc_hash_table (info);
6318
805fc799
AM
6319 if (htab->elf.root.creator->flavour != bfd_target_elf_flavour
6320 || htab->sbrlt == NULL)
721956f4
AM
6321 return 0;
6322
1e2f5b6e
AM
6323 /* Find the top input section id. */
6324 for (input_bfd = info->input_bfds, top_id = 0;
721956f4
AM
6325 input_bfd != NULL;
6326 input_bfd = input_bfd->link_next)
6327 {
721956f4
AM
6328 for (section = input_bfd->sections;
6329 section != NULL;
6330 section = section->next)
6331 {
6332 if (top_id < section->id)
6333 top_id = section->id;
6334 }
6335 }
721956f4
AM
6336
6337 amt = sizeof (struct map_stub) * (top_id + 1);
6338 htab->stub_group = (struct map_stub *) bfd_zmalloc (amt);
6339 if (htab->stub_group == NULL)
6340 return -1;
6341
6342 /* We can't use output_bfd->section_count here to find the top output
6343 section index as some sections may have been removed, and
6344 _bfd_strip_section_from_output doesn't renumber the indices. */
6345 for (section = output_bfd->sections, top_index = 0;
6346 section != NULL;
6347 section = section->next)
6348 {
6349 if (top_index < section->index)
6350 top_index = section->index;
6351 }
6352
6353 htab->top_index = top_index;
6354 amt = sizeof (asection *) * (top_index + 1);
6355 input_list = (asection **) bfd_malloc (amt);
6356 htab->input_list = input_list;
6357 if (input_list == NULL)
6358 return -1;
6359
6360 /* For sections we aren't interested in, mark their entries with a
6361 value we can check later. */
6362 list = input_list + top_index;
6363 do
6364 *list = bfd_abs_section_ptr;
6365 while (list-- != input_list);
6366
6367 for (section = output_bfd->sections;
6368 section != NULL;
6369 section = section->next)
6370 {
6371 if ((section->flags & SEC_CODE) != 0)
6372 input_list[section->index] = NULL;
6373 }
6374
6375 return 1;
6376}
6377
6378/* The linker repeatedly calls this function for each input section,
6379 in the order that input sections are linked into output sections.
6380 Build lists of input sections to determine groupings between which
6381 we may insert linker stubs. */
6382
6383void
805fc799 6384ppc64_elf_next_input_section (info, isec)
721956f4
AM
6385 struct bfd_link_info *info;
6386 asection *isec;
6387{
6388 struct ppc_link_hash_table *htab = ppc_hash_table (info);
6389
805fc799 6390 if (isec->output_section->index <= htab->top_index)
721956f4
AM
6391 {
6392 asection **list = htab->input_list + isec->output_section->index;
6393 if (*list != bfd_abs_section_ptr)
6394 {
6395 /* Steal the link_sec pointer for our list. */
6396#define PREV_SEC(sec) (htab->stub_group[(sec)->id].link_sec)
6397 /* This happens to make the list in reverse order,
6398 which is what we want. */
6399 PREV_SEC (isec) = *list;
6400 *list = isec;
6401 }
6402 }
6403}
6404
6405/* See whether we can group stub sections together. Grouping stub
6406 sections may result in fewer stubs. More importantly, we need to
6407 put all .init* and .fini* stubs at the beginning of the .init or
6408 .fini output sections respectively, because glibc splits the
6409 _init and _fini functions into multiple parts. Putting a stub in
6410 the middle of a function is not a good idea. */
6411
6412static void
6413group_sections (htab, stub_group_size, stubs_always_before_branch)
6414 struct ppc_link_hash_table *htab;
6415 bfd_size_type stub_group_size;
b34976b6 6416 bfd_boolean stubs_always_before_branch;
721956f4
AM
6417{
6418 asection **list = htab->input_list + htab->top_index;
6419 do
6420 {
6421 asection *tail = *list;
6422 if (tail == bfd_abs_section_ptr)
6423 continue;
6424 while (tail != NULL)
6425 {
6426 asection *curr;
6427 asection *prev;
6428 bfd_size_type total;
58ac9f71 6429 bfd_boolean big_sec;
721956f4
AM
6430
6431 curr = tail;
6432 if (tail->_cooked_size)
6433 total = tail->_cooked_size;
6434 else
6435 total = tail->_raw_size;
58ac9f71
AM
6436 big_sec = total >= stub_group_size;
6437
721956f4
AM
6438 while ((prev = PREV_SEC (curr)) != NULL
6439 && ((total += curr->output_offset - prev->output_offset)
6440 < stub_group_size))
6441 curr = prev;
6442
6443 /* OK, the size from the start of CURR to the end is less
6444 than stub_group_size and thus can be handled by one stub
6445 section. (or the tail section is itself larger than
6446 stub_group_size, in which case we may be toast.) We
6447 should really be keeping track of the total size of stubs
6448 added here, as stubs contribute to the final output
6449 section size. That's a little tricky, and this way will
6450 only break if stubs added make the total size more than
6451 2^25, ie. for the default stub_group_size, if stubs total
58ac9f71 6452 more than 2097152 bytes, or nearly 75000 plt call stubs. */
721956f4
AM
6453 do
6454 {
6455 prev = PREV_SEC (tail);
6456 /* Set up this stub group. */
6457 htab->stub_group[tail->id].link_sec = curr;
6458 }
6459 while (tail != curr && (tail = prev) != NULL);
6460
6461 /* But wait, there's more! Input sections up to stub_group_size
58ac9f71
AM
6462 bytes before the stub section can be handled by it too.
6463 Don't do this if we have a really large section after the
6464 stubs, as adding more stubs increases the chance that
6465 branches may not reach into the stub section. */
6466 if (!stubs_always_before_branch && !big_sec)
721956f4
AM
6467 {
6468 total = 0;
6469 while (prev != NULL
6470 && ((total += tail->output_offset - prev->output_offset)
6471 < stub_group_size))
6472 {
6473 tail = prev;
6474 prev = PREV_SEC (tail);
6475 htab->stub_group[tail->id].link_sec = curr;
6476 }
6477 }
6478 tail = prev;
6479 }
6480 }
6481 while (list-- != htab->input_list);
6482 free (htab->input_list);
6483#undef PREV_SEC
6484}
6485
721956f4
AM
6486/* Determine and set the size of the stub section for a final link.
6487
6488 The basic idea here is to examine all the relocations looking for
6489 PC-relative calls to a target that is unreachable with a "bl"
6490 instruction. */
6491
b34976b6 6492bfd_boolean
721956f4
AM
6493ppc64_elf_size_stubs (output_bfd, stub_bfd, info, group_size,
6494 add_stub_section, layout_sections_again)
6495 bfd *output_bfd;
6496 bfd *stub_bfd;
6497 struct bfd_link_info *info;
6498 bfd_signed_vma group_size;
6499 asection * (*add_stub_section) PARAMS ((const char *, asection *));
6500 void (*layout_sections_again) PARAMS ((void));
6501{
6502 bfd_size_type stub_group_size;
b34976b6 6503 bfd_boolean stubs_always_before_branch;
721956f4
AM
6504 struct ppc_link_hash_table *htab = ppc_hash_table (info);
6505
6506 /* Stash our params away. */
6507 htab->stub_bfd = stub_bfd;
6508 htab->add_stub_section = add_stub_section;
6509 htab->layout_sections_again = layout_sections_again;
6510 stubs_always_before_branch = group_size < 0;
6511 if (group_size < 0)
6512 stub_group_size = -group_size;
6513 else
6514 stub_group_size = group_size;
6515 if (stub_group_size == 1)
6516 {
6517 /* Default values. */
58ac9f71
AM
6518 if (stubs_always_before_branch)
6519 {
6520 stub_group_size = 0x1e00000;
6521 if (htab->has_14bit_branch)
6522 stub_group_size = 0x7800;
6523 }
6524 else
6525 {
6526 stub_group_size = 0x1c00000;
6527 if (htab->has_14bit_branch)
6528 stub_group_size = 0x7000;
6529 }
721956f4
AM
6530 }
6531
6532 group_sections (htab, stub_group_size, stubs_always_before_branch);
6533
721956f4
AM
6534 while (1)
6535 {
6536 bfd *input_bfd;
6537 unsigned int bfd_indx;
6538 asection *stub_sec;
b34976b6 6539 bfd_boolean stub_changed;
721956f4
AM
6540
6541 htab->stub_iteration += 1;
b34976b6 6542 stub_changed = FALSE;
721956f4
AM
6543
6544 for (input_bfd = info->input_bfds, bfd_indx = 0;
6545 input_bfd != NULL;
6546 input_bfd = input_bfd->link_next, bfd_indx++)
6547 {
6548 Elf_Internal_Shdr *symtab_hdr;
6549 asection *section;
6cdc0ccc 6550 Elf_Internal_Sym *local_syms = NULL;
721956f4
AM
6551
6552 /* We'll need the symbol table in a second. */
6553 symtab_hdr = &elf_tdata (input_bfd)->symtab_hdr;
6554 if (symtab_hdr->sh_info == 0)
6555 continue;
6556
721956f4
AM
6557 /* Walk over each section attached to the input bfd. */
6558 for (section = input_bfd->sections;
6559 section != NULL;
6560 section = section->next)
6561 {
721956f4 6562 Elf_Internal_Rela *internal_relocs, *irelaend, *irela;
721956f4
AM
6563
6564 /* If there aren't any relocs, then there's nothing more
6565 to do. */
6566 if ((section->flags & SEC_RELOC) == 0
6567 || section->reloc_count == 0)
6568 continue;
6569
6570 /* If this section is a link-once section that will be
6571 discarded, then don't create any stubs. */
6572 if (section->output_section == NULL
6573 || section->output_section->owner != output_bfd)
6574 continue;
6575
1e2f5b6e
AM
6576 /* Get the relocs. */
6577 internal_relocs
6578 = _bfd_elf64_link_read_relocs (input_bfd, section, NULL,
6579 (Elf_Internal_Rela *) NULL,
6580 info->keep_memory);
721956f4 6581 if (internal_relocs == NULL)
1e2f5b6e 6582 goto error_ret_free_local;
721956f4
AM
6583
6584 /* Now examine each relocation. */
6585 irela = internal_relocs;
6586 irelaend = irela + section->reloc_count;
6587 for (; irela < irelaend; irela++)
6588 {
6589 unsigned int r_type, r_indx;
6590 enum ppc_stub_type stub_type;
6591 struct ppc_stub_hash_entry *stub_entry;
6592 asection *sym_sec;
6593 bfd_vma sym_value;
6594 bfd_vma destination;
6595 struct ppc_link_hash_entry *hash;
411e1bfb
AM
6596 struct elf_link_hash_entry *h;
6597 Elf_Internal_Sym *sym;
721956f4
AM
6598 char *stub_name;
6599 const asection *id_sec;
6600
6601 r_type = ELF64_R_TYPE (irela->r_info);
6602 r_indx = ELF64_R_SYM (irela->r_info);
6603
04c9666a 6604 if (r_type >= (unsigned int) R_PPC64_max)
721956f4
AM
6605 {
6606 bfd_set_error (bfd_error_bad_value);
6cdc0ccc 6607 goto error_ret_free_internal;
721956f4
AM
6608 }
6609
6610 /* Only look for stubs on branch instructions. */
6611 if (r_type != (unsigned int) R_PPC64_REL24
6612 && r_type != (unsigned int) R_PPC64_REL14
6613 && r_type != (unsigned int) R_PPC64_REL14_BRTAKEN
6614 && r_type != (unsigned int) R_PPC64_REL14_BRNTAKEN)
6615 continue;
6616
6617 /* Now determine the call target, its name, value,
6618 section. */
721956f4 6619 destination = 0;
411e1bfb
AM
6620 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms,
6621 r_indx, input_bfd))
6622 goto error_ret_free_internal;
6623 hash = (struct ppc_link_hash_entry *) h;
6624
6625 if (hash == NULL)
721956f4
AM
6626 {
6627 /* It's a local symbol. */
411e1bfb 6628 sym_value = sym->st_value;
721956f4
AM
6629 destination = (sym_value + irela->r_addend
6630 + sym_sec->output_offset
6631 + sym_sec->output_section->vma);
6632 }
6633 else
6634 {
6635 /* It's an external symbol. */
411e1bfb 6636 sym_value = 0;
721956f4
AM
6637 if (hash->elf.root.type == bfd_link_hash_defined
6638 || hash->elf.root.type == bfd_link_hash_defweak)
6639 {
721956f4
AM
6640 sym_value = hash->elf.root.u.def.value;
6641 if (sym_sec->output_section != NULL)
6642 destination = (sym_value + irela->r_addend
6643 + sym_sec->output_offset
6644 + sym_sec->output_section->vma);
6645 }
6646 else if (hash->elf.root.type == bfd_link_hash_undefweak)
6647 ;
6648 else if (hash->elf.root.type == bfd_link_hash_undefined)
6649 ;
6650 else
6651 {
6652 bfd_set_error (bfd_error_bad_value);
6653 goto error_ret_free_internal;
6654 }
6655 }
6656
6657 /* Determine what (if any) linker stub is needed. */
6658 stub_type = ppc_type_of_stub (section, irela, &hash,
6659 destination);
6660 if (stub_type == ppc_stub_none)
6661 continue;
6662
411e1bfb
AM
6663 /* __tls_get_addr calls might be eliminated. */
6664 if (stub_type != ppc_stub_plt_call
6665 && hash != NULL
6666 && &hash->elf == htab->tls_get_addr
6667 && section->has_tls_reloc
6668 && irela != internal_relocs)
6669 {
6670 /* Get tls info. */
e7b938ca 6671 char *tls_mask;
411e1bfb 6672
e7b938ca 6673 if (!get_tls_mask (&tls_mask, &local_syms,
411e1bfb
AM
6674 irela - 1, input_bfd))
6675 goto error_ret_free_internal;
e7b938ca 6676 if (*tls_mask != 0)
411e1bfb
AM
6677 continue;
6678 }
6679
721956f4
AM
6680 /* Support for grouping stub sections. */
6681 id_sec = htab->stub_group[section->id].link_sec;
6682
6683 /* Get the name of this stub. */
6684 stub_name = ppc_stub_name (id_sec, sym_sec, hash, irela);
6685 if (!stub_name)
6686 goto error_ret_free_internal;
6687
6688 stub_entry = ppc_stub_hash_lookup (&htab->stub_hash_table,
b34976b6 6689 stub_name, FALSE, FALSE);
721956f4
AM
6690 if (stub_entry != NULL)
6691 {
6692 /* The proper stub has already been created. */
6693 free (stub_name);
6694 continue;
6695 }
6696
6697 stub_entry = ppc_add_stub (stub_name, section, htab);
6698 if (stub_entry == NULL)
6699 {
6700 free (stub_name);
6cdc0ccc
AM
6701 error_ret_free_internal:
6702 if (elf_section_data (section)->relocs == NULL)
6703 free (internal_relocs);
6704 error_ret_free_local:
6705 if (local_syms != NULL
6706 && (symtab_hdr->contents
6707 != (unsigned char *) local_syms))
6708 free (local_syms);
b34976b6 6709 return FALSE;
721956f4
AM
6710 }
6711
6712 stub_entry->target_value = sym_value;
6713 stub_entry->target_section = sym_sec;
6714 stub_entry->stub_type = stub_type;
6715 stub_entry->h = hash;
411e1bfb 6716 stub_entry->addend = irela->r_addend;
b34976b6 6717 stub_changed = TRUE;
721956f4
AM
6718 }
6719
6720 /* We're done with the internal relocs, free them. */
6cdc0ccc 6721 if (elf_section_data (section)->relocs != internal_relocs)
1e2f5b6e 6722 free (internal_relocs);
721956f4 6723 }
6cdc0ccc
AM
6724
6725 if (local_syms != NULL
6726 && symtab_hdr->contents != (unsigned char *) local_syms)
6727 {
6728 if (!info->keep_memory)
6729 free (local_syms);
6730 else
6731 symtab_hdr->contents = (unsigned char *) local_syms;
6732 }
721956f4
AM
6733 }
6734
6735 if (!stub_changed)
6736 break;
6737
6738 /* OK, we've added some stubs. Find out the new size of the
6739 stub sections. */
6740 for (stub_sec = htab->stub_bfd->sections;
6741 stub_sec != NULL;
6742 stub_sec = stub_sec->next)
6743 {
6744 stub_sec->_raw_size = 0;
6745 stub_sec->_cooked_size = 0;
6746 }
6747 htab->sbrlt->_raw_size = 0;
6748 htab->sbrlt->_cooked_size = 0;
6749
6750 bfd_hash_traverse (&htab->stub_hash_table, ppc_size_one_stub, htab);
6751
6752 /* Ask the linker to do its stuff. */
6753 (*htab->layout_sections_again) ();
6754 }
6755
afbe61cf
AM
6756 /* It would be nice to strip .branch_lt from the output if the
6757 section is empty, but it's too late. If we strip sections here,
6758 the dynamic symbol table is corrupted since the section symbol
6759 for the stripped section isn't written. */
721956f4 6760
b34976b6 6761 return TRUE;
721956f4
AM
6762}
6763
6764/* Called after we have determined section placement. If sections
805fc799 6765 move, we'll be called again. Provide a value for TOCstart. */
721956f4 6766
805fc799
AM
6767bfd_vma
6768ppc64_elf_toc (obfd)
5d1634d7 6769 bfd *obfd;
721956f4 6770{
805fc799
AM
6771 asection *s;
6772 bfd_vma TOCstart;
721956f4 6773
805fc799
AM
6774 /* The TOC consists of sections .got, .toc, .tocbss, .plt in that
6775 order. The TOC starts where the first of these sections starts. */
6776 s = bfd_get_section_by_name (obfd, ".got");
6777 if (s == NULL)
6778 s = bfd_get_section_by_name (obfd, ".toc");
6779 if (s == NULL)
6780 s = bfd_get_section_by_name (obfd, ".tocbss");
6781 if (s == NULL)
6782 s = bfd_get_section_by_name (obfd, ".plt");
6783 if (s == NULL)
6784 {
6785 /* This may happen for
6786 o references to TOC base (SYM@toc / TOC[tc0]) without a
6787 .toc directive
6788 o bad linker script
6789 o --gc-sections and empty TOC sections
6790
6791 FIXME: Warn user? */
6792
6793 /* Look for a likely section. We probably won't even be
6794 using TOCstart. */
6795 for (s = obfd->sections; s != NULL; s = s->next)
6796 if ((s->flags & (SEC_ALLOC | SEC_SMALL_DATA | SEC_READONLY))
6797 == (SEC_ALLOC | SEC_SMALL_DATA))
6798 break;
721956f4 6799 if (s == NULL)
805fc799
AM
6800 for (s = obfd->sections; s != NULL; s = s->next)
6801 if ((s->flags & (SEC_ALLOC | SEC_SMALL_DATA))
6802 == (SEC_ALLOC | SEC_SMALL_DATA))
6803 break;
721956f4 6804 if (s == NULL)
805fc799
AM
6805 for (s = obfd->sections; s != NULL; s = s->next)
6806 if ((s->flags & (SEC_ALLOC | SEC_READONLY)) == SEC_ALLOC)
6807 break;
721956f4 6808 if (s == NULL)
805fc799
AM
6809 for (s = obfd->sections; s != NULL; s = s->next)
6810 if ((s->flags & SEC_ALLOC) == SEC_ALLOC)
6811 break;
6812 }
721956f4 6813
805fc799
AM
6814 TOCstart = 0;
6815 if (s != NULL)
6816 TOCstart = s->output_section->vma + s->output_offset;
721956f4 6817
805fc799 6818 return TOCstart;
721956f4
AM
6819}
6820
6821/* Build all the stubs associated with the current output file.
6822 The stubs are kept in a hash table attached to the main linker
6823 hash table. This function is called via gldelf64ppc_finish. */
6824
b34976b6 6825bfd_boolean
721956f4
AM
6826ppc64_elf_build_stubs (info)
6827 struct bfd_link_info *info;
5d1634d7
AM
6828{
6829 struct ppc_link_hash_table *htab = ppc_hash_table (info);
721956f4 6830 asection *stub_sec;
5d1634d7
AM
6831 bfd_vma plt_r2;
6832 bfd_byte *p;
6833
721956f4
AM
6834 for (stub_sec = htab->stub_bfd->sections;
6835 stub_sec != NULL;
6836 stub_sec = stub_sec->next)
6837 {
6838 bfd_size_type size;
6839
6840 /* Allocate memory to hold the linker stubs. */
6841 size = stub_sec->_raw_size;
6842 if (size != 0)
6843 {
6844 stub_sec->contents = (bfd_byte *) bfd_zalloc (htab->stub_bfd, size);
6845 if (stub_sec->contents == NULL)
b34976b6 6846 return FALSE;
721956f4
AM
6847 }
6848 stub_sec->_cooked_size = 0;
6849 }
5d1634d7 6850
721956f4 6851 if (htab->splt != NULL)
5d1634d7 6852 {
9f951329
AM
6853 unsigned int indx;
6854
721956f4
AM
6855 /* Build the .glink plt call stub. */
6856 plt_r2 = (htab->splt->output_offset
6857 + htab->splt->output_section->vma
6858 - elf_gp (htab->splt->output_section->owner)
6859 - TOC_BASE_OFF);
6860 p = htab->sglink->contents;
6861 p = build_plt_stub (htab->sglink->owner, p, (int) plt_r2, 1);
9f951329 6862 while (p < htab->sglink->contents + GLINK_CALL_STUB_SIZE)
721956f4
AM
6863 {
6864 bfd_put_32 (htab->sglink->owner, NOP, p);
6865 p += 4;
6866 }
721956f4 6867
9f951329
AM
6868 /* Build the .glink lazy link call stubs. */
6869 indx = 0;
6870 while (p < htab->sglink->contents + htab->sglink->_raw_size)
6871 {
6872 if (indx < 0x8000)
6873 {
6874 bfd_put_32 (htab->sglink->owner, LI_R0_0 | indx, p);
6875 p += 4;
6876 }
6877 else
6878 {
6879 bfd_put_32 (htab->sglink->owner, LIS_R0_0 | PPC_HI (indx), p);
6880 p += 4;
6881 bfd_put_32 (htab->sglink->owner, ORI_R0_R0_0 | PPC_LO (indx), p);
6882 p += 4;
6883 }
6884 bfd_put_32 (htab->sglink->owner,
6885 B_DOT | ((htab->sglink->contents - p) & 0x3fffffc), p);
a16d5acb 6886 indx++;
9f951329
AM
6887 p += 4;
6888 }
6889 htab->sglink->_cooked_size = p - htab->sglink->contents;
5d1634d7 6890 }
5d1634d7 6891
721956f4
AM
6892 if (htab->sbrlt->_raw_size != 0)
6893 {
6894 htab->sbrlt->contents = (bfd_byte *) bfd_zalloc (htab->sbrlt->owner,
6895 htab->sbrlt->_raw_size);
6896 if (htab->sbrlt->contents == NULL)
b34976b6 6897 return FALSE;
721956f4 6898 }
5d1634d7 6899
721956f4
AM
6900 /* Build the stubs as directed by the stub hash table. */
6901 bfd_hash_traverse (&htab->stub_hash_table, ppc_build_one_stub, info);
5d1634d7 6902
721956f4
AM
6903 for (stub_sec = htab->stub_bfd->sections;
6904 stub_sec != NULL;
6905 stub_sec = stub_sec->next)
6906 {
6907 if (stub_sec->_raw_size != stub_sec->_cooked_size)
6908 break;
6909 }
5d1634d7 6910
721956f4 6911 if (stub_sec != NULL
5d1634d7
AM
6912 || htab->sglink->_raw_size != htab->sglink->_cooked_size)
6913 {
b34976b6 6914 htab->stub_error = TRUE;
721956f4 6915 (*_bfd_error_handler) (_("stubs don't match calculated size"));
5d1634d7 6916 }
721956f4
AM
6917
6918 return !htab->stub_error;
5bd4f169
AM
6919}
6920
5bd4f169
AM
6921/* The RELOCATE_SECTION function is called by the ELF backend linker
6922 to handle the relocations for a section.
6923
6924 The relocs are always passed as Rela structures; if the section
6925 actually uses Rel structures, the r_addend field will always be
6926 zero.
6927
6928 This function is responsible for adjust the section contents as
6929 necessary, and (if using Rela relocs and generating a
6930 relocateable output file) adjusting the reloc addend as
6931 necessary.
6932
6933 This function does not have to worry about setting the reloc
6934 address or the reloc symbol index.
6935
6936 LOCAL_SYMS is a pointer to the swapped in local symbols.
6937
6938 LOCAL_SECTIONS is an array giving the section in the input file
6939 corresponding to the st_shndx field of each local symbol.
6940
6941 The global hash table entry for the global symbols can be found
6942 via elf_sym_hashes (input_bfd).
6943
6944 When generating relocateable output, this function must handle
6945 STB_LOCAL/STT_SECTION symbols specially. The output symbol is
6946 going to be the section symbol corresponding to the output
6947 section, which means that the addend must be adjusted
6948 accordingly. */
6949
b34976b6 6950static bfd_boolean
5bd4f169
AM
6951ppc64_elf_relocate_section (output_bfd, info, input_bfd, input_section,
6952 contents, relocs, local_syms, local_sections)
6953 bfd *output_bfd;
6954 struct bfd_link_info *info;
6955 bfd *input_bfd;
6956 asection *input_section;
6957 bfd_byte *contents;
6958 Elf_Internal_Rela *relocs;
6959 Elf_Internal_Sym *local_syms;
6960 asection **local_sections;
6961{
65f38f15 6962 struct ppc_link_hash_table *htab;
5bd4f169
AM
6963 Elf_Internal_Shdr *symtab_hdr;
6964 struct elf_link_hash_entry **sym_hashes;
5bd4f169
AM
6965 Elf_Internal_Rela *rel;
6966 Elf_Internal_Rela *relend;
411e1bfb
AM
6967 Elf_Internal_Rela outrel;
6968 bfd_byte *loc;
411e1bfb 6969 struct got_entry **local_got_ents;
5bd4f169 6970 bfd_vma TOCstart;
b34976b6
AM
6971 bfd_boolean ret = TRUE;
6972 bfd_boolean is_opd;
96e0dda4 6973 /* Disabled until we sort out how ld should choose 'y' vs 'at'. */
b34976b6 6974 bfd_boolean is_power4 = FALSE;
5bd4f169 6975
b491616a 6976 if (info->relocateable)
b34976b6 6977 return TRUE;
b491616a 6978
65f38f15 6979 /* Initialize howto table if needed. */
5bd4f169 6980 if (!ppc64_elf_howto_table[R_PPC64_ADDR32])
5bd4f169
AM
6981 ppc_howto_init ();
6982
65f38f15 6983 htab = ppc_hash_table (info);
411e1bfb 6984 local_got_ents = elf_local_got_ents (input_bfd);
5bd4f169 6985 TOCstart = elf_gp (output_bfd);
5bd4f169
AM
6986 symtab_hdr = &elf_tdata (input_bfd)->symtab_hdr;
6987 sym_hashes = elf_sym_hashes (input_bfd);
f0abc2a1 6988 is_opd = ppc64_elf_section_data (input_section)->opd.adjust != NULL;
65f38f15 6989
5bd4f169
AM
6990 rel = relocs;
6991 relend = relocs + input_section->reloc_count;
6992 for (; rel < relend; rel++)
6993 {
04c9666a 6994 enum elf_ppc64_reloc_type r_type;
5bd4f169
AM
6995 bfd_vma addend;
6996 bfd_reloc_status_type r;
6997 Elf_Internal_Sym *sym;
6998 asection *sec;
6999 struct elf_link_hash_entry *h;
721956f4 7000 struct elf_link_hash_entry *fdh;
5bd4f169 7001 const char *sym_name;
5bd4f169 7002 unsigned long r_symndx;
951fd09b 7003 char tls_mask, tls_gd, tls_type;
5bd4f169 7004 bfd_vma relocation;
b34976b6
AM
7005 bfd_boolean unresolved_reloc;
7006 bfd_boolean warned;
dc810e39 7007 long insn;
721956f4
AM
7008 struct ppc_stub_hash_entry *stub_entry;
7009 bfd_vma max_br_offset;
7010 bfd_vma from;
5bd4f169 7011
04c9666a 7012 r_type = (enum elf_ppc64_reloc_type) ELF64_R_TYPE (rel->r_info);
5bd4f169 7013 r_symndx = ELF64_R_SYM (rel->r_info);
65f38f15
AM
7014 sym = (Elf_Internal_Sym *) 0;
7015 sec = (asection *) 0;
7016 h = (struct elf_link_hash_entry *) 0;
7017 sym_name = (const char *) 0;
b34976b6
AM
7018 unresolved_reloc = FALSE;
7019 warned = FALSE;
65f38f15 7020
5bd4f169
AM
7021 if (r_type == R_PPC64_TOC)
7022 {
7023 /* Relocation value is TOC base. Symbol is ignored. */
7024 relocation = TOCstart + TOC_BASE_OFF;
7025 }
7026 else if (r_symndx < symtab_hdr->sh_info)
7027 {
7028 /* It's a local symbol. */
7029 sym = local_syms + r_symndx;
7030 sec = local_sections[r_symndx];
411e1bfb 7031 sym_name = bfd_elf_local_sym_name (input_bfd, sym);
f8df10f4 7032 relocation = _bfd_elf_rela_local_sym (output_bfd, sym, sec, rel);
1e2f5b6e
AM
7033 if (elf_section_data (sec) != NULL)
7034 {
7035 long *opd_sym_adjust;
7036
f0abc2a1 7037 opd_sym_adjust = ppc64_elf_section_data (sec)->opd.adjust;
1e2f5b6e
AM
7038 if (opd_sym_adjust != NULL && sym->st_value % 24 == 0)
7039 relocation += opd_sym_adjust[sym->st_value / 24];
7040 }
5bd4f169
AM
7041 }
7042 else
7043 {
7044 /* It's a global symbol. */
7045 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
7046 while (h->root.type == bfd_link_hash_indirect
7047 || h->root.type == bfd_link_hash_warning)
7048 h = (struct elf_link_hash_entry *) h->root.u.i.link;
7049 sym_name = h->root.root.string;
65f38f15 7050 relocation = 0;
5bd4f169
AM
7051 if (h->root.type == bfd_link_hash_defined
7052 || h->root.type == bfd_link_hash_defweak)
7053 {
7054 sec = h->root.u.def.section;
65f38f15
AM
7055 if (sec->output_section == NULL)
7056 /* Set a flag that will be cleared later if we find a
7057 relocation value for this symbol. output_section
7058 is typically NULL for symbols satisfied by a shared
7059 library. */
b34976b6 7060 unresolved_reloc = TRUE;
5bd4f169
AM
7061 else
7062 relocation = (h->root.u.def.value
7063 + sec->output_section->vma
7064 + sec->output_offset);
7065 }
7066 else if (h->root.type == bfd_link_hash_undefweak)
65f38f15 7067 ;
671bae9c 7068 else if (info->shared
65f38f15
AM
7069 && !info->no_undefined
7070 && ELF_ST_VISIBILITY (h->other) == STV_DEFAULT)
7071 ;
5bd4f169
AM
7072 else
7073 {
7074 if (! ((*info->callbacks->undefined_symbol)
7075 (info, h->root.root.string, input_bfd, input_section,
411e1bfb
AM
7076 rel->r_offset, (!info->shared
7077 || info->no_undefined
7078 || ELF_ST_VISIBILITY (h->other)))))
b34976b6
AM
7079 return FALSE;
7080 warned = TRUE;
5bd4f169
AM
7081 }
7082 }
7083
951fd09b
AM
7084 /* TLS optimizations. Replace instruction sequences and relocs
7085 based on information we collected in tls_optimize. We edit
7086 RELOCS so that --emit-relocs will output something sensible
7087 for the final instruction stream. */
7088 tls_mask = 0;
7089 tls_gd = 0;
d881513a 7090 if (IS_PPC64_TLS_RELOC (r_type))
411e1bfb
AM
7091 {
7092 if (h != NULL)
e7b938ca 7093 tls_mask = ((struct ppc_link_hash_entry *) h)->tls_mask;
411e1bfb
AM
7094 else if (local_got_ents != NULL)
7095 {
e7b938ca
AM
7096 char *lgot_masks;
7097 lgot_masks = (char *) (local_got_ents + symtab_hdr->sh_info);
7098 tls_mask = lgot_masks[r_symndx];
411e1bfb
AM
7099 }
7100 }
7101
7102 /* Ensure reloc mapping code below stays sane. */
7103 if (R_PPC64_TOC16_LO_DS != R_PPC64_TOC16_DS + 1
7104 || R_PPC64_TOC16_LO != R_PPC64_TOC16 + 1
7105 || (R_PPC64_GOT_TLSLD16 & 3) != (R_PPC64_GOT_TLSGD16 & 3)
7106 || (R_PPC64_GOT_TLSLD16_LO & 3) != (R_PPC64_GOT_TLSGD16_LO & 3)
7107 || (R_PPC64_GOT_TLSLD16_HI & 3) != (R_PPC64_GOT_TLSGD16_HI & 3)
7108 || (R_PPC64_GOT_TLSLD16_HA & 3) != (R_PPC64_GOT_TLSGD16_HA & 3)
7109 || (R_PPC64_GOT_TLSLD16 & 3) != (R_PPC64_GOT_TPREL16_DS & 3)
7110 || (R_PPC64_GOT_TLSLD16_LO & 3) != (R_PPC64_GOT_TPREL16_LO_DS & 3)
7111 || (R_PPC64_GOT_TLSLD16_HI & 3) != (R_PPC64_GOT_TPREL16_HI & 3)
7112 || (R_PPC64_GOT_TLSLD16_HA & 3) != (R_PPC64_GOT_TPREL16_HA & 3))
7113 abort ();
7114 switch (r_type)
7115 {
7116 default:
411e1bfb
AM
7117 break;
7118
7119 case R_PPC64_TOC16:
7120 case R_PPC64_TOC16_LO:
7121 case R_PPC64_TOC16_DS:
7122 case R_PPC64_TOC16_LO_DS:
411e1bfb
AM
7123 {
7124 /* Check for toc tls entries. */
7125 char *toc_tls;
951fd09b 7126 int retval;
411e1bfb 7127
e7b938ca 7128 retval = get_tls_mask (&toc_tls, &local_syms, rel, input_bfd);
951fd09b 7129 if (retval == 0)
411e1bfb
AM
7130 return FALSE;
7131
7132 if (toc_tls)
7133 {
951fd09b 7134 tls_mask = *toc_tls;
411e1bfb
AM
7135 if (r_type == R_PPC64_TOC16_DS
7136 || r_type == R_PPC64_TOC16_LO_DS)
7137 goto toctprel;
7138 else
951fd09b
AM
7139 {
7140 /* If we found a GD reloc pair, then we might be
7141 doing a GD->IE transition. */
7142 if (retval == 2)
7143 {
7144 tls_gd = TLS_TPRELGD;
7145 if (tls_mask != 0 && (tls_mask & TLS_GD) == 0)
7146 goto tls_get_addr_check;
7147 }
7148 else if (retval == 3)
7149 {
7150 if (tls_mask != 0 && (tls_mask & TLS_LD) == 0)
7151 goto tls_get_addr_check;
7152 }
7153 }
411e1bfb
AM
7154 }
7155 }
7156 break;
7157
7158 case R_PPC64_GOT_TPREL16_DS:
7159 case R_PPC64_GOT_TPREL16_LO_DS:
411e1bfb 7160 toctprel:
951fd09b
AM
7161 if (tls_mask != 0
7162 && (tls_mask & TLS_TPREL) == 0)
411e1bfb
AM
7163 {
7164 bfd_vma insn;
7165 insn = bfd_get_32 (output_bfd, contents + rel->r_offset - 2);
7166 insn &= 31 << 21;
7167 insn |= 0x3c0d0000; /* addis 0,13,0 */
7168 bfd_put_32 (output_bfd, insn, contents + rel->r_offset - 2);
7169 r_type = R_PPC64_TPREL16_HA;
7170 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
7171 }
7172 break;
7173
7174 case R_PPC64_TLS:
951fd09b 7175 if (tls_mask == 0)
411e1bfb
AM
7176 {
7177 /* Check for toc tls entries. */
7178 char *toc_tls;
7179
e7b938ca 7180 if (!get_tls_mask (&toc_tls, &local_syms, rel, input_bfd))
411e1bfb
AM
7181 return FALSE;
7182
7183 if (toc_tls)
951fd09b 7184 tls_mask = *toc_tls;
411e1bfb 7185 }
951fd09b
AM
7186 if (tls_mask != 0
7187 && (tls_mask & TLS_TPREL) == 0)
411e1bfb
AM
7188 {
7189 bfd_vma insn, rtra;
7190 insn = bfd_get_32 (output_bfd, contents + rel->r_offset);
7191 if ((insn & ((31 << 26) | (31 << 11)))
7192 == ((31 << 26) | (13 << 11)))
7193 rtra = insn & ((1 << 26) - (1 << 16));
7194 else if ((insn & ((31 << 26) | (31 << 16)))
7195 == ((31 << 26) | (13 << 16)))
7196 rtra = (insn & (31 << 21)) | ((insn & (31 << 11)) << 5);
7197 else
7198 abort ();
7199 if ((insn & ((1 << 11) - (1 << 1))) == 266 << 1)
7200 /* add -> addi. */
7201 insn = 14 << 26;
7202 else if ((insn & (31 << 1)) == 23 << 1
7203 && ((insn & (31 << 6)) < 14 << 6
7204 || ((insn & (31 << 6)) >= 16 << 6
7205 && (insn & (31 << 6)) < 24 << 6)))
7206 /* load and store indexed -> dform. */
7207 insn = (32 | ((insn >> 6) & 31)) << 26;
7208 else if ((insn & (31 << 1)) == 21 << 1
7209 && (insn & (0x1a << 6)) == 0)
7210 /* ldx, ldux, stdx, stdux -> ld, ldu, std, stdu. */
7211 insn = (((58 | ((insn >> 6) & 4)) << 26)
7212 | ((insn >> 6) & 1));
7213 else if ((insn & (31 << 1)) == 21 << 1
7214 && (insn & ((1 << 11) - (1 << 1))) == 341 << 1)
7215 /* lwax -> lwa. */
7216 insn = (58 << 26) | 2;
7217 else
7218 abort ();
7219 insn |= rtra;
7220 bfd_put_32 (output_bfd, insn, contents + rel->r_offset);
7221 r_type = R_PPC64_TPREL16_LO;
7222 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
7223 /* Was PPC64_TLS which sits on insn boundary, now
7224 PPC64_TPREL16_LO which is at insn+2. */
7225 rel->r_offset += 2;
7226 }
7227 break;
7228
411e1bfb
AM
7229 case R_PPC64_GOT_TLSGD16_HI:
7230 case R_PPC64_GOT_TLSGD16_HA:
951fd09b
AM
7231 tls_gd = TLS_TPRELGD;
7232 if (tls_mask != 0 && (tls_mask & TLS_GD) == 0)
7233 goto tls_gdld_hi;
7234 break;
7235
411e1bfb
AM
7236 case R_PPC64_GOT_TLSLD16_HI:
7237 case R_PPC64_GOT_TLSLD16_HA:
951fd09b 7238 if (tls_mask != 0 && (tls_mask & TLS_LD) == 0)
411e1bfb 7239 {
951fd09b
AM
7240 tls_gdld_hi:
7241 if ((tls_mask & tls_gd) != 0)
7242 r_type = (((r_type - (R_PPC64_GOT_TLSGD16 & 3)) & 3)
7243 + R_PPC64_GOT_TPREL16_DS);
7244 else
411e1bfb 7245 {
951fd09b
AM
7246 bfd_put_32 (output_bfd, NOP, contents + rel->r_offset);
7247 rel->r_offset -= 2;
7248 r_type = R_PPC64_NONE;
411e1bfb 7249 }
951fd09b 7250 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
411e1bfb
AM
7251 }
7252 break;
7253
951fd09b
AM
7254 case R_PPC64_GOT_TLSGD16:
7255 case R_PPC64_GOT_TLSGD16_LO:
7256 tls_gd = TLS_TPRELGD;
7257 if (tls_mask != 0 && (tls_mask & TLS_GD) == 0)
7258 goto tls_get_addr_check;
7259 break;
411e1bfb 7260
951fd09b
AM
7261 case R_PPC64_GOT_TLSLD16:
7262 case R_PPC64_GOT_TLSLD16_LO:
7263 if (tls_mask != 0 && (tls_mask & TLS_LD) == 0)
7264 {
7265 tls_get_addr_check:
7266 if (rel + 1 < relend)
411e1bfb 7267 {
951fd09b
AM
7268 enum elf_ppc64_reloc_type r_type2;
7269 unsigned long r_symndx2;
7270 struct elf_link_hash_entry *h2;
7271 bfd_vma insn1, insn2, insn3;
7272 bfd_vma offset;
7273
7274 /* The next instruction should be a call to
7275 __tls_get_addr. Peek at the reloc to be sure. */
7276 r_type2
7277 = (enum elf_ppc64_reloc_type) ELF64_R_TYPE (rel[1].r_info);
7278 r_symndx2 = ELF64_R_SYM (rel[1].r_info);
7279 if (r_symndx2 < symtab_hdr->sh_info
7280 || (r_type2 != R_PPC64_REL14
7281 && r_type2 != R_PPC64_REL14_BRTAKEN
7282 && r_type2 != R_PPC64_REL14_BRNTAKEN
7283 && r_type2 != R_PPC64_REL24))
7284 break;
7285
7286 h2 = sym_hashes[r_symndx2 - symtab_hdr->sh_info];
7287 while (h2->root.type == bfd_link_hash_indirect
7288 || h2->root.type == bfd_link_hash_warning)
7289 h2 = (struct elf_link_hash_entry *) h2->root.u.i.link;
7290 if (h2 == NULL || h2 != htab->tls_get_addr)
7291 break;
7292
7293 /* OK, it checks out. Replace the call. */
7294 offset = rel[1].r_offset;
7295 insn1 = bfd_get_32 (output_bfd,
7296 contents + rel->r_offset - 2);
7297 insn3 = bfd_get_32 (output_bfd,
7298 contents + offset + 4);
7299 if ((tls_mask & tls_gd) != 0)
411e1bfb 7300 {
951fd09b
AM
7301 /* IE */
7302 insn1 &= (1 << 26) - (1 << 2);
7303 insn1 |= 58 << 26; /* ld */
7304 insn2 = 0x7c636a14; /* add 3,3,13 */
7305 rel[1].r_info = ELF64_R_INFO (r_symndx2, R_PPC64_NONE);
7306 if ((tls_mask & TLS_EXPLICIT) == 0)
7307 r_type = (((r_type - (R_PPC64_GOT_TLSGD16 & 3)) & 3)
7308 + R_PPC64_GOT_TPREL16_DS);
7309 else
7310 r_type += R_PPC64_TOC16_DS - R_PPC64_TOC16;
7311 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
411e1bfb
AM
7312 }
7313 else
951fd09b
AM
7314 {
7315 /* LE */
7316 insn1 = 0x3c6d0000; /* addis 3,13,0 */
7317 insn2 = 0x38630000; /* addi 3,3,0 */
7318 if (tls_gd == 0)
7319 {
7320 /* Was an LD reloc. */
7321 r_symndx = 0;
7322 rel->r_addend = htab->tls_sec->vma + DTP_OFFSET;
7323 rel[1].r_addend = htab->tls_sec->vma + DTP_OFFSET;
7324 }
7325 r_type = R_PPC64_TPREL16_HA;
7326 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
7327 rel[1].r_info = ELF64_R_INFO (r_symndx,
7328 R_PPC64_TPREL16_LO);
7329 rel[1].r_offset += 2;
7330 }
7331 if (insn3 == NOP
7332 || insn3 == CROR_151515 || insn3 == CROR_313131)
7333 {
7334 insn3 = insn2;
7335 insn2 = NOP;
7336 rel[1].r_offset += 4;
7337 }
7338 bfd_put_32 (output_bfd, insn1, contents + rel->r_offset - 2);
7339 bfd_put_32 (output_bfd, insn2, contents + offset);
7340 bfd_put_32 (output_bfd, insn3, contents + offset + 4);
7341 if (tls_gd == 0)
7342 {
7343 /* We changed the symbol on an LD reloc. Start over
7344 in order to get h, sym, sec etc. right. */
7345 rel--;
7346 continue;
7347 }
411e1bfb 7348 }
411e1bfb 7349 }
411e1bfb
AM
7350 break;
7351
7352 case R_PPC64_DTPMOD64:
951fd09b
AM
7353 if (rel + 1 < relend
7354 && rel[1].r_info == ELF64_R_INFO (r_symndx, R_PPC64_DTPREL64)
7355 && rel[1].r_offset == rel->r_offset + 8)
411e1bfb 7356 {
951fd09b
AM
7357 if ((tls_mask & TLS_GD) == 0)
7358 {
7359 rel[1].r_info = ELF64_R_INFO (r_symndx, R_PPC64_NONE);
7360 if ((tls_mask & TLS_TPRELGD) != 0)
7361 r_type = R_PPC64_TPREL64;
7362 else
7363 {
7364 bfd_put_64 (output_bfd, (bfd_vma) 1,
7365 contents + rel->r_offset);
7366 r_type = R_PPC64_NONE;
7367 }
7368 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
7369 }
7370 }
7371 else
7372 {
7373 if ((tls_mask & TLS_LD) == 0)
411e1bfb
AM
7374 {
7375 bfd_put_64 (output_bfd, (bfd_vma) 1,
7376 contents + rel->r_offset);
7377 r_type = R_PPC64_NONE;
951fd09b 7378 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
411e1bfb 7379 }
411e1bfb
AM
7380 }
7381 break;
7382
7383 case R_PPC64_TPREL64:
951fd09b 7384 if ((tls_mask & TLS_TPREL) == 0)
411e1bfb
AM
7385 {
7386 r_type = R_PPC64_NONE;
7387 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
7388 }
7389 break;
7390 }
7391
7392 /* Handle other relocations that tweak non-addend part of insn. */
86c76c7b 7393 insn = 0;
65f38f15 7394 switch (r_type)
5bd4f169
AM
7395 {
7396 default:
65f38f15 7397 break;
5bd4f169 7398
65f38f15
AM
7399 /* Branch taken prediction relocations. */
7400 case R_PPC64_ADDR14_BRTAKEN:
7401 case R_PPC64_REL14_BRTAKEN:
cedb70c5
KH
7402 insn = 0x01 << 21; /* 'y' or 't' bit, lowest bit of BO field. */
7403 /* Fall thru. */
65f38f15 7404
86c76c7b 7405 /* Branch not taken prediction relocations. */
65f38f15
AM
7406 case R_PPC64_ADDR14_BRNTAKEN:
7407 case R_PPC64_REL14_BRNTAKEN:
411e1bfb
AM
7408 insn |= bfd_get_32 (output_bfd,
7409 contents + rel->r_offset) & ~(0x01 << 21);
96e0dda4
AM
7410 if (is_power4)
7411 {
7412 /* Set 'a' bit. This is 0b00010 in BO field for branch
7413 on CR(BI) insns (BO == 001at or 011at), and 0b01000
7414 for branch on CTR insns (BO == 1a00t or 1a01t). */
7415 if ((insn & (0x14 << 21)) == (0x04 << 21))
7416 insn |= 0x02 << 21;
7417 else if ((insn & (0x14 << 21)) == (0x10 << 21))
7418 insn |= 0x08 << 21;
7419 else
7420 break;
7421 }
65f38f15 7422 else
96e0dda4 7423 {
411e1bfb 7424 from = (rel->r_offset
805fc799
AM
7425 + input_section->output_offset
7426 + input_section->output_section->vma);
7427
96e0dda4 7428 /* Invert 'y' bit if not the default. */
411e1bfb 7429 if ((bfd_signed_vma) (relocation + rel->r_addend - from) < 0)
96e0dda4
AM
7430 insn ^= 0x01 << 21;
7431 }
86c76c7b 7432
411e1bfb 7433 bfd_put_32 (output_bfd, (bfd_vma) insn, contents + rel->r_offset);
65f38f15 7434 break;
5bd4f169 7435
65f38f15 7436 case R_PPC64_REL24:
721956f4
AM
7437 /* A REL24 branching to a linkage function is followed by a
7438 nop. We replace the nop with a ld in order to restore
7439 the TOC base pointer. Only calls to shared objects need
7440 to alter the TOC base. These are recognized by their
7441 need for a PLT entry. */
5bd4f169 7442 if (h != NULL
721956f4 7443 && (fdh = ((struct ppc_link_hash_entry *) h)->oh) != NULL
411e1bfb 7444 && fdh->plt.plist != NULL
721956f4
AM
7445 && (stub_entry = ppc_get_stub_entry (input_section, sec, fdh,
7446 rel, htab)) != NULL)
41bd81ab 7447 {
b34976b6 7448 bfd_boolean can_plt_call = 0;
721956f4 7449
411e1bfb 7450 if (rel->r_offset + 8 <= input_section->_cooked_size)
41bd81ab 7451 {
411e1bfb 7452 insn = bfd_get_32 (input_bfd, contents + rel->r_offset + 4);
721956f4
AM
7453 if (insn == NOP
7454 || insn == CROR_151515 || insn == CROR_313131)
41bd81ab 7455 {
721956f4 7456 bfd_put_32 (input_bfd, (bfd_vma) LD_R2_40R1,
411e1bfb 7457 contents + rel->r_offset + 4);
721956f4 7458 can_plt_call = 1;
41bd81ab 7459 }
5bd4f169 7460 }
721956f4
AM
7461
7462 if (!can_plt_call)
7463 {
7464 /* If this is a plain branch rather than a branch
7465 and link, don't require a nop. */
411e1bfb 7466 insn = bfd_get_32 (input_bfd, contents + rel->r_offset);
721956f4
AM
7467 if ((insn & 1) == 0)
7468 can_plt_call = 1;
7469 }
7470
7471 if (can_plt_call)
7472 {
7473 relocation = (stub_entry->stub_offset
7474 + stub_entry->stub_sec->output_offset
7475 + stub_entry->stub_sec->output_section->vma);
b34976b6 7476 unresolved_reloc = FALSE;
721956f4 7477 }
5bd4f169 7478 }
e86ce104
AM
7479
7480 if (h != NULL
7481 && h->root.type == bfd_link_hash_undefweak
721956f4 7482 && relocation == 0
411e1bfb 7483 && rel->r_addend == 0)
e86ce104 7484 {
721956f4
AM
7485 /* Tweak calls to undefined weak functions to point at a
7486 blr. We can thus call a weak function without first
7487 checking whether the function is defined. We have a
7488 blr at the end of .sfpr. */
805fc799 7489 BFD_ASSERT (htab->sfpr->_raw_size != 0);
721956f4
AM
7490 relocation = (htab->sfpr->_raw_size - 4
7491 + htab->sfpr->output_offset
7492 + htab->sfpr->output_section->vma);
411e1bfb 7493 from = (rel->r_offset
721956f4
AM
7494 + input_section->output_offset
7495 + input_section->output_section->vma);
805fc799 7496
721956f4
AM
7497 /* But let's not be silly about it. If the blr isn't in
7498 reach, just go to the next instruction. */
805fc799
AM
7499 if (relocation - from + (1 << 25) >= (1 << 26)
7500 || htab->sfpr->_raw_size == 0)
721956f4 7501 relocation = from + 4;
e86ce104 7502 }
65f38f15
AM
7503 break;
7504 }
5bd4f169 7505
65f38f15 7506 /* Set `addend'. */
411e1bfb
AM
7507 tls_type = 0;
7508 addend = rel->r_addend;
65f38f15
AM
7509 switch (r_type)
7510 {
7511 default:
7512 (*_bfd_error_handler)
7513 (_("%s: unknown relocation type %d for symbol %s"),
7514 bfd_archive_filename (input_bfd), (int) r_type, sym_name);
5bd4f169 7515
65f38f15 7516 bfd_set_error (bfd_error_bad_value);
b34976b6 7517 ret = FALSE;
65f38f15 7518 continue;
5bd4f169 7519
65f38f15 7520 case R_PPC64_NONE:
411e1bfb 7521 case R_PPC64_TLS:
04c9666a
AM
7522 case R_PPC64_GNU_VTINHERIT:
7523 case R_PPC64_GNU_VTENTRY:
65f38f15 7524 continue;
5bd4f169
AM
7525
7526 /* GOT16 relocations. Like an ADDR16 using the symbol's
7527 address in the GOT as relocation value instead of the
411e1bfb 7528 symbol's value itself. Also, create a GOT entry for the
5bd4f169 7529 symbol and put the symbol value there. */
411e1bfb
AM
7530 case R_PPC64_GOT_TLSGD16:
7531 case R_PPC64_GOT_TLSGD16_LO:
7532 case R_PPC64_GOT_TLSGD16_HI:
7533 case R_PPC64_GOT_TLSGD16_HA:
951fd09b 7534 tls_type = TLS_TLS | TLS_GD;
411e1bfb
AM
7535 goto dogot;
7536
7537 case R_PPC64_GOT_TLSLD16:
7538 case R_PPC64_GOT_TLSLD16_LO:
7539 case R_PPC64_GOT_TLSLD16_HI:
7540 case R_PPC64_GOT_TLSLD16_HA:
951fd09b 7541 tls_type = TLS_TLS | TLS_LD;
411e1bfb
AM
7542 goto dogot;
7543
7544 case R_PPC64_GOT_TPREL16_DS:
7545 case R_PPC64_GOT_TPREL16_LO_DS:
7546 case R_PPC64_GOT_TPREL16_HI:
7547 case R_PPC64_GOT_TPREL16_HA:
7548 tls_type = TLS_TLS | TLS_TPREL;
7549 goto dogot;
7550
7551 case R_PPC64_GOT_DTPREL16_DS:
7552 case R_PPC64_GOT_DTPREL16_LO_DS:
7553 case R_PPC64_GOT_DTPREL16_HI:
7554 case R_PPC64_GOT_DTPREL16_HA:
7555 tls_type = TLS_TLS | TLS_DTPREL;
7556 goto dogot;
7557
65f38f15
AM
7558 case R_PPC64_GOT16:
7559 case R_PPC64_GOT16_LO:
7560 case R_PPC64_GOT16_HI:
7561 case R_PPC64_GOT16_HA:
7562 case R_PPC64_GOT16_DS:
7563 case R_PPC64_GOT16_LO_DS:
411e1bfb 7564 dogot:
5bd4f169
AM
7565 {
7566 /* Relocation is to the entry for this symbol in the global
7567 offset table. */
d881513a 7568 bfd_vma *offp;
5bd4f169 7569 bfd_vma off;
d881513a 7570 unsigned long indx = 0;
65f38f15
AM
7571
7572 if (htab->sgot == NULL)
7573 abort ();
5bd4f169 7574
d881513a
AM
7575 if (tls_type == (TLS_TLS | TLS_LD)
7576 && (h == NULL
7577 || !(h->elf_link_hash_flags & ELF_LINK_HASH_DEF_DYNAMIC)))
7578 offp = &htab->tlsld_got.offset;
411e1bfb 7579 else
5bd4f169 7580 {
d881513a 7581 struct got_entry *ent;
5bd4f169 7582
d881513a
AM
7583 if (h != NULL)
7584 {
7585 bfd_boolean dyn = htab->elf.dynamic_sections_created;
f4656909 7586 if (!WILL_CALL_FINISH_DYNAMIC_SYMBOL (dyn, info->shared, h)
d881513a
AM
7587 || (info->shared
7588 && (info->symbolic
7589 || h->dynindx == -1
7590 || (h->elf_link_hash_flags
7591 & ELF_LINK_FORCED_LOCAL))
7592 && (h->elf_link_hash_flags
7593 & ELF_LINK_HASH_DEF_REGULAR)))
7594 /* This is actually a static link, or it is a
7595 -Bsymbolic link and the symbol is defined
7596 locally, or the symbol was forced to be local
7597 because of a version file. */
7598 ;
7599 else
7600 {
7601 indx = h->dynindx;
7602 unresolved_reloc = FALSE;
7603 }
7604 ent = h->got.glist;
7605 }
411e1bfb 7606 else
5bd4f169 7607 {
d881513a
AM
7608 if (local_got_ents == NULL)
7609 abort ();
7610 ent = local_got_ents[r_symndx];
5bd4f169 7611 }
d881513a
AM
7612
7613 for (; ent != NULL; ent = ent->next)
7614 if (ent->addend == rel->r_addend
7615 && ent->tls_type == tls_type)
7616 break;
7617 if (ent == NULL)
7618 abort ();
7619 offp = &ent->got.offset;
5bd4f169 7620 }
411e1bfb
AM
7621
7622 /* The offset must always be a multiple of 8. We use the
7623 least significant bit to record whether we have already
7624 processed this entry. */
d881513a 7625 off = *offp;
411e1bfb
AM
7626 if ((off & 1) != 0)
7627 off &= ~1;
5bd4f169
AM
7628 else
7629 {
411e1bfb
AM
7630 /* Generate relocs for the dynamic linker, except in
7631 the case of TLSLD where we'll use one entry per
7632 module. */
d881513a
AM
7633 *offp = off | 1;
7634 if (info->shared || indx != 0)
5bd4f169 7635 {
411e1bfb
AM
7636 outrel.r_offset = (htab->sgot->output_section->vma
7637 + htab->sgot->output_offset
7638 + off);
d881513a 7639 if (tls_type & (TLS_LD | TLS_GD))
5bd4f169 7640 {
411e1bfb
AM
7641 outrel.r_info = ELF64_R_INFO (indx, R_PPC64_DTPMOD64);
7642 outrel.r_addend = 0;
d881513a
AM
7643 if (tls_type == (TLS_TLS | TLS_GD))
7644 {
7645 loc = htab->srelgot->contents;
7646 loc += (htab->srelgot->reloc_count++
7647 * sizeof (Elf64_External_Rela));
7648 bfd_elf64_swap_reloca_out (output_bfd,
7649 &outrel, loc);
7650 outrel.r_info
7651 = ELF64_R_INFO (indx, R_PPC64_DTPREL64);
7652 outrel.r_offset += 8;
7653 }
411e1bfb 7654 }
951fd09b 7655 else if (tls_type == (TLS_TLS | TLS_DTPREL))
411e1bfb 7656 outrel.r_info = ELF64_R_INFO (indx, R_PPC64_DTPREL64);
951fd09b 7657 else if (tls_type == (TLS_TLS | TLS_TPREL))
411e1bfb
AM
7658 outrel.r_info = ELF64_R_INFO (indx, R_PPC64_TPREL64);
7659 else if (indx == 0)
7660 outrel.r_info = ELF64_R_INFO (indx, R_PPC64_RELATIVE);
7661 else
7662 outrel.r_info = ELF64_R_INFO (indx, R_PPC64_GLOB_DAT);
951fd09b 7663 outrel.r_addend = rel->r_addend;
411e1bfb
AM
7664 if (indx == 0)
7665 outrel.r_addend += relocation;
7666 loc = htab->srelgot->contents;
7667 loc += (htab->srelgot->reloc_count++
7668 * sizeof (Elf64_External_Rela));
7669 bfd_elf64_swap_reloca_out (output_bfd, &outrel, loc);
7670 }
7671
7672 /* Init the .got section contents if we're not
7673 emitting a reloc. */
d881513a 7674 else
411e1bfb 7675 {
d881513a 7676 relocation += rel->r_addend;
7b609f53
AM
7677 if (tls_type == (TLS_TLS | TLS_LD))
7678 relocation = 1;
7679 else if (tls_type != 0)
411e1bfb
AM
7680 {
7681 relocation -= htab->tls_sec->vma + DTP_OFFSET;
7b609f53 7682 if (tls_type == (TLS_TLS | TLS_TPREL))
411e1bfb 7683 relocation += DTP_OFFSET - TP_OFFSET;
5bd4f169 7684
7b609f53
AM
7685 if (tls_type == (TLS_TLS | TLS_GD))
7686 {
7687 bfd_put_64 (output_bfd, relocation,
7688 htab->sgot->contents + off + 8);
7689 relocation = 1;
7690 }
411e1bfb 7691 }
7b609f53 7692
411e1bfb
AM
7693 bfd_put_64 (output_bfd, relocation,
7694 htab->sgot->contents + off);
5bd4f169
AM
7695 }
7696 }
7697
65f38f15
AM
7698 if (off >= (bfd_vma) -2)
7699 abort ();
7700
7701 relocation = htab->sgot->output_offset + off;
7702
5bd4f169 7703 /* TOC base (r2) is TOC start plus 0x8000. */
411e1bfb 7704 addend = - TOC_BASE_OFF;
5bd4f169 7705 }
65f38f15
AM
7706 break;
7707
7708 case R_PPC64_PLT16_HA:
7709 case R_PPC64_PLT16_HI:
7710 case R_PPC64_PLT16_LO:
7711 case R_PPC64_PLT32:
7712 case R_PPC64_PLT64:
7713 /* Relocation is to the entry for this symbol in the
7714 procedure linkage table. */
7715
7716 /* Resolve a PLT reloc against a local symbol directly,
7717 without using the procedure linkage table. */
7718 if (h == NULL)
7719 break;
7720
411e1bfb
AM
7721 /* It's possible that we didn't make a PLT entry for this
7722 symbol. This happens when statically linking PIC code,
7723 or when using -Bsymbolic. Go find a match if there is a
7724 PLT entry. */
7725 if (htab->splt != NULL)
65f38f15 7726 {
411e1bfb
AM
7727 struct plt_entry *ent;
7728 for (ent = h->plt.plist; ent != NULL; ent = ent->next)
7729 if (ent->addend == rel->r_addend
7730 && ent->plt.offset != (bfd_vma) -1)
7731 {
7732 relocation = (htab->splt->output_section->vma
7733 + htab->splt->output_offset
7734 + ent->plt.offset);
7735 unresolved_reloc = FALSE;
7736 }
65f38f15 7737 }
65f38f15 7738 break;
5bd4f169
AM
7739
7740 /* TOC16 relocs. We want the offset relative to the TOC base,
7741 which is the address of the start of the TOC plus 0x8000.
7742 The TOC consists of sections .got, .toc, .tocbss, and .plt,
7743 in this order. */
65f38f15
AM
7744 case R_PPC64_TOC16:
7745 case R_PPC64_TOC16_LO:
7746 case R_PPC64_TOC16_HI:
7747 case R_PPC64_TOC16_DS:
7748 case R_PPC64_TOC16_LO_DS:
7749 case R_PPC64_TOC16_HA:
5bd4f169 7750 addend -= TOCstart + TOC_BASE_OFF;
5bd4f169
AM
7751 break;
7752
7753 /* Relocate against the beginning of the section. */
65f38f15
AM
7754 case R_PPC64_SECTOFF:
7755 case R_PPC64_SECTOFF_LO:
7756 case R_PPC64_SECTOFF_HI:
7757 case R_PPC64_SECTOFF_DS:
7758 case R_PPC64_SECTOFF_LO_DS:
7759 case R_PPC64_SECTOFF_HA:
7760 if (sec != (asection *) 0)
7761 addend -= sec->output_section->vma;
5bd4f169
AM
7762 break;
7763
721956f4
AM
7764 case R_PPC64_REL14:
7765 case R_PPC64_REL14_BRNTAKEN:
7766 case R_PPC64_REL14_BRTAKEN:
5d1634d7
AM
7767 case R_PPC64_REL24:
7768 break;
7769
411e1bfb
AM
7770 case R_PPC64_TPREL16:
7771 case R_PPC64_TPREL16_LO:
7772 case R_PPC64_TPREL16_HI:
7773 case R_PPC64_TPREL16_HA:
7774 case R_PPC64_TPREL16_DS:
7775 case R_PPC64_TPREL16_LO_DS:
7776 case R_PPC64_TPREL16_HIGHER:
7777 case R_PPC64_TPREL16_HIGHERA:
7778 case R_PPC64_TPREL16_HIGHEST:
7779 case R_PPC64_TPREL16_HIGHESTA:
7780 addend -= htab->tls_sec->vma + TP_OFFSET;
7781 if (info->shared)
7782 /* The TPREL16 relocs shouldn't really be used in shared
7783 libs as they will result in DT_TEXTREL being set, but
7784 support them anyway. */
7785 goto dodyn;
7786 break;
7787
7788 case R_PPC64_DTPREL16:
7789 case R_PPC64_DTPREL16_LO:
7790 case R_PPC64_DTPREL16_HI:
7791 case R_PPC64_DTPREL16_HA:
7792 case R_PPC64_DTPREL16_DS:
7793 case R_PPC64_DTPREL16_LO_DS:
7794 case R_PPC64_DTPREL16_HIGHER:
7795 case R_PPC64_DTPREL16_HIGHERA:
7796 case R_PPC64_DTPREL16_HIGHEST:
7797 case R_PPC64_DTPREL16_HIGHESTA:
7798 addend -= htab->tls_sec->vma + DTP_OFFSET;
7799 break;
7800
7801 case R_PPC64_TPREL64:
7802 addend -= htab->tls_sec->vma + TP_OFFSET;
7803 goto dodyn;
7804
7805 case R_PPC64_DTPREL64:
7806 addend -= htab->tls_sec->vma + DTP_OFFSET;
7807 /* Fall thru */
7808
65f38f15
AM
7809 /* Relocations that may need to be propagated if this is a
7810 dynamic object. */
411e1bfb 7811 case R_PPC64_DTPMOD64:
04c9666a 7812 case R_PPC64_REL30:
65f38f15
AM
7813 case R_PPC64_REL32:
7814 case R_PPC64_REL64:
7815 case R_PPC64_ADDR14:
7816 case R_PPC64_ADDR14_BRNTAKEN:
7817 case R_PPC64_ADDR14_BRTAKEN:
7818 case R_PPC64_ADDR16:
7819 case R_PPC64_ADDR16_DS:
7820 case R_PPC64_ADDR16_HA:
7821 case R_PPC64_ADDR16_HI:
7822 case R_PPC64_ADDR16_HIGHER:
7823 case R_PPC64_ADDR16_HIGHERA:
7824 case R_PPC64_ADDR16_HIGHEST:
7825 case R_PPC64_ADDR16_HIGHESTA:
7826 case R_PPC64_ADDR16_LO:
7827 case R_PPC64_ADDR16_LO_DS:
7828 case R_PPC64_ADDR24:
65f38f15
AM
7829 case R_PPC64_ADDR32:
7830 case R_PPC64_ADDR64:
7831 case R_PPC64_UADDR16:
7832 case R_PPC64_UADDR32:
7833 case R_PPC64_UADDR64:
ec338859
AM
7834 /* r_symndx will be zero only for relocs against symbols
7835 from removed linkonce sections, or sections discarded by
7836 a linker script. */
411e1bfb 7837 dodyn:
5d1634d7
AM
7838 if (r_symndx == 0)
7839 break;
7840 /* Fall thru. */
7841
7842 case R_PPC64_TOC:
7843 if ((input_section->flags & SEC_ALLOC) == 0)
ec338859
AM
7844 break;
7845
41bd81ab
AM
7846 if (NO_OPD_RELOCS && is_opd)
7847 break;
7848
65f38f15 7849 if ((info->shared
411e1bfb 7850 && (MUST_BE_DYN_RELOC (r_type)
65f38f15
AM
7851 || (h != NULL
7852 && h->dynindx != -1
7853 && (! info->symbolic
7854 || (h->elf_link_hash_flags
7855 & ELF_LINK_HASH_DEF_REGULAR) == 0))))
f4656909
AM
7856 || (ELIMINATE_COPY_RELOCS
7857 && !info->shared
65f38f15
AM
7858 && h != NULL
7859 && h->dynindx != -1
7860 && (h->elf_link_hash_flags & ELF_LINK_NON_GOT_REF) == 0
58ac9f71
AM
7861 && (h->elf_link_hash_flags & ELF_LINK_HASH_DEF_DYNAMIC) != 0
7862 && (h->elf_link_hash_flags & ELF_LINK_HASH_DEF_REGULAR) == 0))
65f38f15
AM
7863 {
7864 Elf_Internal_Rela outrel;
b34976b6 7865 bfd_boolean skip, relocate;
65f38f15 7866 asection *sreloc;
947216bf 7867 bfd_byte *loc;
65f38f15
AM
7868
7869 /* When generating a dynamic object, these relocations
7870 are copied into the output file to be resolved at run
7871 time. */
7872
b34976b6
AM
7873 skip = FALSE;
7874 relocate = FALSE;
65f38f15 7875
c629eae0
JJ
7876 outrel.r_offset =
7877 _bfd_elf_section_offset (output_bfd, info, input_section,
7878 rel->r_offset);
7879 if (outrel.r_offset == (bfd_vma) -1)
b34976b6 7880 skip = TRUE;
0bb2d96a 7881 else if (outrel.r_offset == (bfd_vma) -2)
b34976b6 7882 skip = TRUE, relocate = TRUE;
65f38f15
AM
7883 outrel.r_offset += (input_section->output_section->vma
7884 + input_section->output_offset);
411e1bfb 7885 outrel.r_addend = rel->r_addend;
65f38f15
AM
7886
7887 if (skip)
0bb2d96a 7888 memset (&outrel, 0, sizeof outrel);
65f38f15
AM
7889 else if (h != NULL
7890 && h->dynindx != -1
41bd81ab 7891 && !is_opd
411e1bfb 7892 && (!MUST_BE_DYN_RELOC (r_type)
65f38f15
AM
7893 || !info->shared
7894 || !info->symbolic
7895 || (h->elf_link_hash_flags
7896 & ELF_LINK_HASH_DEF_REGULAR) == 0))
0bb2d96a 7897 outrel.r_info = ELF64_R_INFO (h->dynindx, r_type);
65f38f15
AM
7898 else
7899 {
41bd81ab
AM
7900 /* This symbol is local, or marked to become local,
7901 or this is an opd section reloc which must point
7902 at a local function. */
65f38f15 7903 outrel.r_addend += relocation;
411e1bfb 7904 /* ??? why? */
b34976b6 7905 relocate = TRUE;
e86ce104 7906 if (r_type == R_PPC64_ADDR64 || r_type == R_PPC64_TOC)
65f38f15 7907 {
3fad3c7c 7908 if (is_opd && h != NULL)
afbe61cf
AM
7909 {
7910 /* Lie about opd entries. This case occurs
7911 when building shared libraries and we
7912 reference a function in another shared
3fad3c7c
AM
7913 lib. The same thing happens for a weak
7914 definition in an application that's
7915 overridden by a strong definition in a
7916 shared lib. (I believe this is a generic
7917 bug in binutils handling of weak syms.)
7918 In these cases we won't use the opd
1e2f5b6e 7919 entry in this lib. */
b34976b6 7920 unresolved_reloc = FALSE;
afbe61cf 7921 }
65f38f15
AM
7922 outrel.r_info = ELF64_R_INFO (0, R_PPC64_RELATIVE);
7923 }
7924 else
7925 {
7926 long indx = 0;
7927
41bd81ab 7928 if (bfd_is_abs_section (sec))
65f38f15
AM
7929 ;
7930 else if (sec == NULL || sec->owner == NULL)
7931 {
7932 bfd_set_error (bfd_error_bad_value);
b34976b6 7933 return FALSE;
65f38f15
AM
7934 }
7935 else
7936 {
7937 asection *osec;
7938
7939 osec = sec->output_section;
7940 indx = elf_section_data (osec)->dynindx;
7941
7942 /* We are turning this relocation into one
7943 against a section symbol, so subtract out
7944 the output section's address but not the
7945 offset of the input section in the output
7946 section. */
7947 outrel.r_addend -= osec->vma;
7948 }
7949
7950 outrel.r_info = ELF64_R_INFO (indx, r_type);
7951 }
7952 }
7953
7954 sreloc = elf_section_data (input_section)->sreloc;
7955 if (sreloc == NULL)
7956 abort ();
7957
947216bf
AM
7958 loc = sreloc->contents;
7959 loc += sreloc->reloc_count++ * sizeof (Elf64_External_Rela);
65f38f15
AM
7960 bfd_elf64_swap_reloca_out (output_bfd, &outrel, loc);
7961
7962 /* If this reloc is against an external symbol, it will
7963 be computed at runtime, so there's no need to do
7964 anything now. */
7965 if (! relocate)
7966 continue;
7967 }
5bd4f169
AM
7968 break;
7969
65f38f15
AM
7970 case R_PPC64_COPY:
7971 case R_PPC64_GLOB_DAT:
7972 case R_PPC64_JMP_SLOT:
7973 case R_PPC64_RELATIVE:
7974 /* We shouldn't ever see these dynamic relocs in relocatable
7975 files. */
ae9a127f 7976 /* Fall through. */
65f38f15
AM
7977
7978 case R_PPC64_PLTGOT16:
7979 case R_PPC64_PLTGOT16_DS:
7980 case R_PPC64_PLTGOT16_HA:
7981 case R_PPC64_PLTGOT16_HI:
7982 case R_PPC64_PLTGOT16_LO:
7983 case R_PPC64_PLTGOT16_LO_DS:
7984 case R_PPC64_PLTREL32:
7985 case R_PPC64_PLTREL64:
7986 /* These ones haven't been implemented yet. */
7987
7988 (*_bfd_error_handler)
7b609f53 7989 (_("%s: relocation %s is not supported for symbol %s."),
65f38f15
AM
7990 bfd_archive_filename (input_bfd),
7991 ppc64_elf_howto_table[(int) r_type]->name, sym_name);
5bd4f169
AM
7992
7993 bfd_set_error (bfd_error_invalid_operation);
b34976b6 7994 ret = FALSE;
5bd4f169 7995 continue;
65f38f15 7996 }
5bd4f169 7997
65f38f15
AM
7998 /* Do any further special processing. */
7999 switch (r_type)
8000 {
8001 default:
8002 break;
8003
8004 case R_PPC64_ADDR16_HA:
8005 case R_PPC64_ADDR16_HIGHERA:
8006 case R_PPC64_ADDR16_HIGHESTA:
86bbe32f
AM
8007 case R_PPC64_GOT16_HA:
8008 case R_PPC64_PLTGOT16_HA:
65f38f15
AM
8009 case R_PPC64_PLT16_HA:
8010 case R_PPC64_TOC16_HA:
8011 case R_PPC64_SECTOFF_HA:
411e1bfb
AM
8012 case R_PPC64_TPREL16_HA:
8013 case R_PPC64_DTPREL16_HA:
8014 case R_PPC64_GOT_TLSGD16_HA:
8015 case R_PPC64_GOT_TLSLD16_HA:
8016 case R_PPC64_GOT_TPREL16_HA:
8017 case R_PPC64_GOT_DTPREL16_HA:
8018 case R_PPC64_TPREL16_HIGHER:
8019 case R_PPC64_TPREL16_HIGHERA:
8020 case R_PPC64_TPREL16_HIGHEST:
8021 case R_PPC64_TPREL16_HIGHESTA:
8022 case R_PPC64_DTPREL16_HIGHER:
8023 case R_PPC64_DTPREL16_HIGHERA:
8024 case R_PPC64_DTPREL16_HIGHEST:
8025 case R_PPC64_DTPREL16_HIGHESTA:
65f38f15
AM
8026 /* It's just possible that this symbol is a weak symbol
8027 that's not actually defined anywhere. In that case,
8028 'sec' would be NULL, and we should leave the symbol
8029 alone (it will be set to zero elsewhere in the link). */
8030 if (sec != NULL)
8031 /* Add 0x10000 if sign bit in 0:15 is set. */
8032 addend += ((relocation + addend) & 0x8000) << 1;
8033 break;
8034
8035 case R_PPC64_ADDR16_DS:
8036 case R_PPC64_ADDR16_LO_DS:
8037 case R_PPC64_GOT16_DS:
8038 case R_PPC64_GOT16_LO_DS:
8039 case R_PPC64_PLT16_LO_DS:
8040 case R_PPC64_SECTOFF_DS:
8041 case R_PPC64_SECTOFF_LO_DS:
8042 case R_PPC64_TOC16_DS:
8043 case R_PPC64_TOC16_LO_DS:
8044 case R_PPC64_PLTGOT16_DS:
8045 case R_PPC64_PLTGOT16_LO_DS:
411e1bfb
AM
8046 case R_PPC64_GOT_TPREL16_DS:
8047 case R_PPC64_GOT_TPREL16_LO_DS:
8048 case R_PPC64_GOT_DTPREL16_DS:
8049 case R_PPC64_GOT_DTPREL16_LO_DS:
8050 case R_PPC64_TPREL16_DS:
8051 case R_PPC64_TPREL16_LO_DS:
8052 case R_PPC64_DTPREL16_DS:
8053 case R_PPC64_DTPREL16_LO_DS:
65f38f15
AM
8054 if (((relocation + addend) & 3) != 0)
8055 {
8056 (*_bfd_error_handler)
8057 (_("%s: error: relocation %s not a multiple of 4"),
8058 bfd_archive_filename (input_bfd),
8059 ppc64_elf_howto_table[(int) r_type]->name);
8060 bfd_set_error (bfd_error_bad_value);
b34976b6 8061 ret = FALSE;
65f38f15
AM
8062 continue;
8063 }
8064 break;
721956f4
AM
8065
8066 case R_PPC64_REL14:
8067 case R_PPC64_REL14_BRNTAKEN:
8068 case R_PPC64_REL14_BRTAKEN:
8069 max_br_offset = 1 << 15;
8070 goto branch_check;
8071
8072 case R_PPC64_REL24:
8073 max_br_offset = 1 << 25;
8074
8075 branch_check:
8076 /* If the branch is out of reach, then redirect the
8077 call to the local stub for this function. */
411e1bfb 8078 from = (rel->r_offset
721956f4
AM
8079 + input_section->output_offset
8080 + input_section->output_section->vma);
8081 if (relocation + addend - from + max_br_offset >= 2 * max_br_offset
8082 && (stub_entry = ppc_get_stub_entry (input_section, sec, h,
8083 rel, htab)) != NULL)
8084 {
8085 /* Munge up the value and addend so that we call the stub
8086 rather than the procedure directly. */
8087 relocation = (stub_entry->stub_offset
8088 + stub_entry->stub_sec->output_offset
8089 + stub_entry->stub_sec->output_section->vma);
8090 addend = 0;
8091 }
8092 break;
5bd4f169
AM
8093 }
8094
239e1f3a
AM
8095 /* Dynamic relocs are not propagated for SEC_DEBUGGING sections
8096 because such sections are not SEC_ALLOC and thus ld.so will
8097 not process them. */
65f38f15 8098 if (unresolved_reloc
239e1f3a 8099 && !((input_section->flags & SEC_DEBUGGING) != 0
65f38f15 8100 && (h->elf_link_hash_flags & ELF_LINK_HASH_DEF_DYNAMIC) != 0))
9c07fe7c
AM
8101 {
8102 (*_bfd_error_handler)
7b609f53 8103 (_("%s(%s+0x%lx): unresolvable %s relocation against symbol `%s'"),
9c07fe7c
AM
8104 bfd_archive_filename (input_bfd),
8105 bfd_get_section_name (input_bfd, input_section),
8106 (long) rel->r_offset,
7b609f53 8107 ppc64_elf_howto_table[(int) r_type]->name,
9c07fe7c 8108 h->root.root.string);
b34976b6 8109 ret = FALSE;
9c07fe7c 8110 }
5bd4f169 8111
65f38f15 8112 r = _bfd_final_link_relocate (ppc64_elf_howto_table[(int) r_type],
5bd4f169
AM
8113 input_bfd,
8114 input_section,
8115 contents,
411e1bfb 8116 rel->r_offset,
5bd4f169
AM
8117 relocation,
8118 addend);
8119
ef60b7ff 8120 if (r != bfd_reloc_ok)
5bd4f169 8121 {
cd27b276
AM
8122 if (sym_name == NULL)
8123 sym_name = "(null)";
8124 if (r == bfd_reloc_overflow)
5bd4f169 8125 {
cd27b276
AM
8126 if (warned)
8127 continue;
8128 if (h != NULL
8129 && h->root.type == bfd_link_hash_undefweak
65f38f15 8130 && ppc64_elf_howto_table[(int) r_type]->pc_relative)
5bd4f169
AM
8131 {
8132 /* Assume this is a call protected by other code that
8133 detects the symbol is undefined. If this is the case,
8134 we can safely ignore the overflow. If not, the
8135 program is hosed anyway, and a little warning isn't
8136 going to help. */
8137
8138 continue;
8139 }
8140
ef60b7ff 8141 if (!((*info->callbacks->reloc_overflow)
cd27b276 8142 (info, sym_name, ppc64_elf_howto_table[(int) r_type]->name,
411e1bfb 8143 rel->r_addend, input_bfd, input_section, rel->r_offset)))
b34976b6 8144 return FALSE;
ef60b7ff
AM
8145 }
8146 else
8147 {
8148 (*_bfd_error_handler)
7b609f53 8149 (_("%s(%s+0x%lx): %s reloc against `%s': error %d"),
ef60b7ff
AM
8150 bfd_archive_filename (input_bfd),
8151 bfd_get_section_name (input_bfd, input_section),
7b609f53
AM
8152 (long) rel->r_offset,
8153 ppc64_elf_howto_table[(int) r_type]->name,
8154 sym_name,
8155 (int) r);
b34976b6 8156 ret = FALSE;
ef60b7ff 8157 }
5bd4f169 8158 }
5bd4f169
AM
8159 }
8160
5bd4f169
AM
8161 return ret;
8162}
8163
8164/* Finish up dynamic symbol handling. We set the contents of various
8165 dynamic sections here. */
8166
b34976b6 8167static bfd_boolean
5bd4f169
AM
8168ppc64_elf_finish_dynamic_symbol (output_bfd, info, h, sym)
8169 bfd *output_bfd;
8170 struct bfd_link_info *info;
8171 struct elf_link_hash_entry *h;
8172 Elf_Internal_Sym *sym;
8173{
65f38f15 8174 struct ppc_link_hash_table *htab;
5bd4f169
AM
8175 bfd *dynobj;
8176
65f38f15
AM
8177 htab = ppc_hash_table (info);
8178 dynobj = htab->elf.dynobj;
5bd4f169 8179
411e1bfb 8180 if (((struct ppc_link_hash_entry *) h)->is_func_descriptor)
5bd4f169 8181 {
411e1bfb 8182 struct plt_entry *ent;
65f38f15 8183 Elf_Internal_Rela rela;
947216bf 8184 bfd_byte *loc;
5bd4f169 8185
411e1bfb
AM
8186 for (ent = h->plt.plist; ent != NULL; ent = ent->next)
8187 if (ent->plt.offset != (bfd_vma) -1)
8188 {
8189 /* This symbol has an entry in the procedure linkage
8190 table. Set it up. */
5bd4f169 8191
411e1bfb
AM
8192 if (htab->splt == NULL
8193 || htab->srelplt == NULL
8194 || htab->sglink == NULL)
8195 abort ();
5bd4f169 8196
411e1bfb
AM
8197 /* Create a JMP_SLOT reloc to inform the dynamic linker to
8198 fill in the PLT entry. */
411e1bfb
AM
8199 rela.r_offset = (htab->splt->output_section->vma
8200 + htab->splt->output_offset
8201 + ent->plt.offset);
8202 rela.r_info = ELF64_R_INFO (h->dynindx, R_PPC64_JMP_SLOT);
8203 rela.r_addend = ent->addend;
5bd4f169 8204
411e1bfb
AM
8205 loc = htab->srelplt->contents;
8206 loc += ((ent->plt.offset - PLT_INITIAL_ENTRY_SIZE) / PLT_ENTRY_SIZE
8207 * sizeof (Elf64_External_Rela));
8208 bfd_elf64_swap_reloca_out (output_bfd, &rela, loc);
8209 }
5bd4f169
AM
8210 }
8211
8212 if ((h->elf_link_hash_flags & ELF_LINK_HASH_NEEDS_COPY) != 0)
8213 {
5bd4f169 8214 Elf_Internal_Rela rela;
947216bf 8215 bfd_byte *loc;
5bd4f169 8216
65f38f15 8217 /* This symbol needs a copy reloc. Set it up. */
5bd4f169 8218
65f38f15
AM
8219 if (h->dynindx == -1
8220 || (h->root.type != bfd_link_hash_defined
8221 && h->root.type != bfd_link_hash_defweak)
8222 || htab->srelbss == NULL)
8223 abort ();
5bd4f169
AM
8224
8225 rela.r_offset = (h->root.u.def.value
8226 + h->root.u.def.section->output_section->vma
8227 + h->root.u.def.section->output_offset);
8228 rela.r_info = ELF64_R_INFO (h->dynindx, R_PPC64_COPY);
8229 rela.r_addend = 0;
947216bf
AM
8230 loc = htab->srelbss->contents;
8231 loc += htab->srelbss->reloc_count++ * sizeof (Elf64_External_Rela);
65f38f15 8232 bfd_elf64_swap_reloca_out (output_bfd, &rela, loc);
5bd4f169
AM
8233 }
8234
5bd4f169
AM
8235 /* Mark some specially defined symbols as absolute. */
8236 if (strcmp (h->root.root.string, "_DYNAMIC") == 0)
8237 sym->st_shndx = SHN_ABS;
8238
b34976b6 8239 return TRUE;
5bd4f169
AM
8240}
8241
65f38f15
AM
8242/* Used to decide how to sort relocs in an optimal manner for the
8243 dynamic linker, before writing them out. */
8244
8245static enum elf_reloc_type_class
8246ppc64_elf_reloc_type_class (rela)
8247 const Elf_Internal_Rela *rela;
8248{
04c9666a 8249 enum elf_ppc64_reloc_type r_type;
a33d1f77 8250
04c9666a 8251 r_type = (enum elf_ppc64_reloc_type) ELF64_R_TYPE (rela->r_info);
a33d1f77 8252 switch (r_type)
65f38f15
AM
8253 {
8254 case R_PPC64_RELATIVE:
8255 return reloc_class_relative;
8256 case R_PPC64_JMP_SLOT:
8257 return reloc_class_plt;
8258 case R_PPC64_COPY:
8259 return reloc_class_copy;
8260 default:
8261 return reloc_class_normal;
8262 }
8263}
8264
5bd4f169
AM
8265/* Finish up the dynamic sections. */
8266
b34976b6 8267static bfd_boolean
5bd4f169
AM
8268ppc64_elf_finish_dynamic_sections (output_bfd, info)
8269 bfd *output_bfd;
8270 struct bfd_link_info *info;
8271{
65f38f15
AM
8272 struct ppc_link_hash_table *htab;
8273 bfd *dynobj;
5bd4f169 8274 asection *sdyn;
5bd4f169 8275
65f38f15
AM
8276 htab = ppc_hash_table (info);
8277 dynobj = htab->elf.dynobj;
5bd4f169
AM
8278 sdyn = bfd_get_section_by_name (dynobj, ".dynamic");
8279
65f38f15 8280 if (htab->elf.dynamic_sections_created)
5bd4f169 8281 {
5bd4f169
AM
8282 Elf64_External_Dyn *dyncon, *dynconend;
8283
65f38f15
AM
8284 if (sdyn == NULL || htab->sgot == NULL)
8285 abort ();
5bd4f169
AM
8286
8287 dyncon = (Elf64_External_Dyn *) sdyn->contents;
8288 dynconend = (Elf64_External_Dyn *) (sdyn->contents + sdyn->_raw_size);
8289 for (; dyncon < dynconend; dyncon++)
8290 {
8291 Elf_Internal_Dyn dyn;
19397422 8292 asection *s;
5bd4f169
AM
8293
8294 bfd_elf64_swap_dyn_in (dynobj, dyncon, &dyn);
8295
8296 switch (dyn.d_tag)
8297 {
65f38f15
AM
8298 default:
8299 continue;
5bd4f169 8300
5d1634d7 8301 case DT_PPC64_GLINK:
6348e046
AM
8302 s = htab->sglink;
8303 dyn.d_un.d_ptr = s->output_section->vma + s->output_offset;
5d1634d7
AM
8304 break;
8305
19397422
AM
8306 case DT_PPC64_OPD:
8307 s = bfd_get_section_by_name (output_bfd, ".opd");
6348e046
AM
8308 if (s == NULL)
8309 continue;
8310 dyn.d_un.d_ptr = s->vma;
19397422
AM
8311 break;
8312
8313 case DT_PPC64_OPDSZ:
8314 s = bfd_get_section_by_name (output_bfd, ".opd");
6348e046
AM
8315 if (s == NULL)
8316 continue;
8317 dyn.d_un.d_val = s->_raw_size;
19397422
AM
8318 break;
8319
65f38f15 8320 case DT_PLTGOT:
6348e046
AM
8321 s = htab->splt;
8322 dyn.d_un.d_ptr = s->output_section->vma + s->output_offset;
65f38f15
AM
8323 break;
8324
8325 case DT_JMPREL:
6348e046
AM
8326 s = htab->srelplt;
8327 dyn.d_un.d_ptr = s->output_section->vma + s->output_offset;
65f38f15 8328 break;
5bd4f169 8329
65f38f15 8330 case DT_PLTRELSZ:
5d1634d7
AM
8331 dyn.d_un.d_val = htab->srelplt->_raw_size;
8332 break;
8333
8334 case DT_RELASZ:
8335 /* Don't count procedure linkage table relocs in the
8336 overall reloc count. */
6348e046
AM
8337 s = htab->srelplt;
8338 if (s == NULL)
8339 continue;
8340 dyn.d_un.d_val -= s->_raw_size;
8341 break;
8342
8343 case DT_RELA:
8344 /* We may not be using the standard ELF linker script.
8345 If .rela.plt is the first .rela section, we adjust
8346 DT_RELA to not include it. */
8347 s = htab->srelplt;
8348 if (s == NULL)
8349 continue;
8350 if (dyn.d_un.d_ptr != s->output_section->vma + s->output_offset)
8351 continue;
8352 dyn.d_un.d_ptr += s->_raw_size;
65f38f15 8353 break;
5bd4f169 8354 }
5bd4f169 8355
65f38f15 8356 bfd_elf64_swap_dyn_out (output_bfd, &dyn, dyncon);
5bd4f169 8357 }
5bd4f169
AM
8358 }
8359
5d1634d7
AM
8360 if (htab->sgot != NULL && htab->sgot->_raw_size != 0)
8361 {
8362 /* Fill in the first entry in the global offset table.
8363 We use it to hold the link-time TOCbase. */
8364 bfd_put_64 (output_bfd,
60ee0d4a 8365 elf_gp (output_bfd) + TOC_BASE_OFF,
5d1634d7
AM
8366 htab->sgot->contents);
8367
8368 /* Set .got entry size. */
8369 elf_section_data (htab->sgot->output_section)->this_hdr.sh_entsize = 8;
8370 }
8371
8372 if (htab->splt != NULL && htab->splt->_raw_size != 0)
8373 {
8374 /* Set .plt entry size. */
8375 elf_section_data (htab->splt->output_section)->this_hdr.sh_entsize
8376 = PLT_ENTRY_SIZE;
8377 }
8378
b34976b6 8379 return TRUE;
5bd4f169
AM
8380}
8381
8382#define TARGET_LITTLE_SYM bfd_elf64_powerpcle_vec
8383#define TARGET_LITTLE_NAME "elf64-powerpcle"
8384#define TARGET_BIG_SYM bfd_elf64_powerpc_vec
8385#define TARGET_BIG_NAME "elf64-powerpc"
8386#define ELF_ARCH bfd_arch_powerpc
8387#define ELF_MACHINE_CODE EM_PPC64
8388#define ELF_MAXPAGESIZE 0x10000
8389#define elf_info_to_howto ppc64_elf_info_to_howto
8390
8391#ifdef EM_CYGNUS_POWERPC
8392#define ELF_MACHINE_ALT1 EM_CYGNUS_POWERPC
8393#endif
8394
8395#ifdef EM_PPC_OLD
8396#define ELF_MACHINE_ALT2 EM_PPC_OLD
8397#endif
8398
8399#define elf_backend_want_got_sym 0
8400#define elf_backend_want_plt_sym 0
8401#define elf_backend_plt_alignment 3
8402#define elf_backend_plt_not_loaded 1
8403#define elf_backend_got_symbol_offset 0
5d1634d7
AM
8404#define elf_backend_got_header_size 8
8405#define elf_backend_plt_header_size PLT_INITIAL_ENTRY_SIZE
5bd4f169 8406#define elf_backend_can_gc_sections 1
65f38f15 8407#define elf_backend_can_refcount 1
b491616a 8408#define elf_backend_rela_normal 1
5bd4f169 8409
65f38f15 8410#define bfd_elf64_bfd_reloc_type_lookup ppc64_elf_reloc_type_lookup
65f38f15 8411#define bfd_elf64_bfd_merge_private_bfd_data ppc64_elf_merge_private_bfd_data
f0abc2a1 8412#define bfd_elf64_new_section_hook ppc64_elf_new_section_hook
65f38f15 8413#define bfd_elf64_bfd_link_hash_table_create ppc64_elf_link_hash_table_create
721956f4 8414#define bfd_elf64_bfd_link_hash_table_free ppc64_elf_link_hash_table_free
65f38f15 8415
feee612b 8416#define elf_backend_object_p ppc64_elf_object_p
65f38f15
AM
8417#define elf_backend_create_dynamic_sections ppc64_elf_create_dynamic_sections
8418#define elf_backend_copy_indirect_symbol ppc64_elf_copy_indirect_symbol
8419#define elf_backend_check_relocs ppc64_elf_check_relocs
8420#define elf_backend_gc_mark_hook ppc64_elf_gc_mark_hook
8421#define elf_backend_gc_sweep_hook ppc64_elf_gc_sweep_hook
8422#define elf_backend_adjust_dynamic_symbol ppc64_elf_adjust_dynamic_symbol
e86ce104
AM
8423#define elf_backend_hide_symbol ppc64_elf_hide_symbol
8424#define elf_backend_always_size_sections ppc64_elf_func_desc_adjust
65f38f15 8425#define elf_backend_size_dynamic_sections ppc64_elf_size_dynamic_sections
65f38f15
AM
8426#define elf_backend_relocate_section ppc64_elf_relocate_section
8427#define elf_backend_finish_dynamic_symbol ppc64_elf_finish_dynamic_symbol
8428#define elf_backend_reloc_type_class ppc64_elf_reloc_type_class
8429#define elf_backend_finish_dynamic_sections ppc64_elf_finish_dynamic_sections
5bd4f169
AM
8430
8431#include "elf64-target.h"
This page took 0.730292 seconds and 4 git commands to generate.