]> git.ipfire.org Git - thirdparty/binutils-gdb.git/blame - bfd/elf64-ppc.c
* gdb.base/readline.exp: Add tests for operate-and-get-next with a
[thirdparty/binutils-gdb.git] / bfd / elf64-ppc.c
CommitLineData
5bd4f169 1/* PowerPC64-specific support for 64-bit ELF.
86bbe32f 2 Copyright 1999, 2000, 2001, 2002, 2003 Free Software Foundation, Inc.
5bd4f169
AM
3 Written by Linus Nordberg, Swox AB <info@swox.com>,
4 based on elf32-ppc.c by Ian Lance Taylor.
5
ae9a127f 6 This file is part of BFD, the Binary File Descriptor library.
5bd4f169 7
ae9a127f
NC
8 This program is free software; you can redistribute it and/or modify
9 it under the terms of the GNU General Public License as published by
10 the Free Software Foundation; either version 2 of the License, or
11 (at your option) any later version.
5bd4f169 12
ae9a127f
NC
13 This program is distributed in the hope that it will be useful,
14 but WITHOUT ANY WARRANTY; without even the implied warranty of
15 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
16 GNU General Public License for more details.
5bd4f169 17
ae9a127f
NC
18 You should have received a copy of the GNU General Public License
19 along with this program; if not, write to the Free Software
20 Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA. */
5bd4f169
AM
21
22/* This file is based on the 64-bit PowerPC ELF ABI. It is also based
23 on the file elf32-ppc.c. */
24
25#include "bfd.h"
26#include "sysdep.h"
27#include "bfdlink.h"
28#include "libbfd.h"
29#include "elf-bfd.h"
04c9666a 30#include "elf/ppc64.h"
5d1634d7 31#include "elf64-ppc.h"
5bd4f169 32
5bd4f169
AM
33static void ppc_howto_init
34 PARAMS ((void));
35static reloc_howto_type *ppc64_elf_reloc_type_lookup
36 PARAMS ((bfd *abfd, bfd_reloc_code_real_type code));
37static void ppc64_elf_info_to_howto
947216bf 38 PARAMS ((bfd *abfd, arelent *cache_ptr, Elf_Internal_Rela *dst));
805fc799
AM
39static bfd_reloc_status_type ppc64_elf_ha_reloc
40 PARAMS ((bfd *, arelent *, asymbol *, PTR, asection *, bfd *, char **));
41static bfd_reloc_status_type ppc64_elf_brtaken_reloc
42 PARAMS ((bfd *, arelent *, asymbol *, PTR, asection *, bfd *, char **));
43static bfd_reloc_status_type ppc64_elf_sectoff_reloc
44 PARAMS ((bfd *, arelent *, asymbol *, PTR, asection *, bfd *, char **));
45static bfd_reloc_status_type ppc64_elf_sectoff_ha_reloc
46 PARAMS ((bfd *, arelent *, asymbol *, PTR, asection *, bfd *, char **));
47static bfd_reloc_status_type ppc64_elf_toc_reloc
48 PARAMS ((bfd *, arelent *, asymbol *, PTR, asection *, bfd *, char **));
49static bfd_reloc_status_type ppc64_elf_toc_ha_reloc
50 PARAMS ((bfd *, arelent *, asymbol *, PTR, asection *, bfd *, char **));
51static bfd_reloc_status_type ppc64_elf_toc64_reloc
52 PARAMS ((bfd *, arelent *, asymbol *, PTR, asection *, bfd *, char **));
53static bfd_reloc_status_type ppc64_elf_unhandled_reloc
5bd4f169 54 PARAMS ((bfd *, arelent *, asymbol *, PTR, asection *, bfd *, char **));
b34976b6 55static bfd_boolean ppc64_elf_object_p
feee612b 56 PARAMS ((bfd *));
b34976b6 57static bfd_boolean ppc64_elf_merge_private_bfd_data
5bd4f169 58 PARAMS ((bfd *, bfd *));
f0abc2a1
AM
59static bfd_boolean ppc64_elf_new_section_hook
60 PARAMS ((bfd *, asection *));
5bd4f169
AM
61
62
5bd4f169
AM
63/* The name of the dynamic interpreter. This is put in the .interp
64 section. */
65#define ELF_DYNAMIC_INTERPRETER "/usr/lib/ld.so.1"
66
67/* The size in bytes of an entry in the procedure linkage table. */
68#define PLT_ENTRY_SIZE 24
69
70/* The initial size of the plt reserved for the dynamic linker. */
5d1634d7 71#define PLT_INITIAL_ENTRY_SIZE PLT_ENTRY_SIZE
5bd4f169
AM
72
73/* TOC base pointers offset from start of TOC. */
411e1bfb
AM
74#define TOC_BASE_OFF 0x8000
75
76/* Offset of tp and dtp pointers from start of TLS block. */
77#define TP_OFFSET 0x7000
78#define DTP_OFFSET 0x8000
5bd4f169 79
5d1634d7
AM
80/* .plt call stub instructions. */
81#define ADDIS_R12_R2 0x3d820000 /* addis %r12,%r2,xxx@ha */
82#define STD_R2_40R1 0xf8410028 /* std %r2,40(%r1) */
83#define LD_R11_0R12 0xe96c0000 /* ld %r11,xxx+0@l(%r12) */
84#define LD_R2_0R12 0xe84c0000 /* ld %r2,xxx+8@l(%r12) */
85#define MTCTR_R11 0x7d6903a6 /* mtctr %r11 */
86 /* ld %r11,xxx+16@l(%r12) */
87#define BCTR 0x4e800420 /* bctr */
88
89/* The normal stub is this size. */
90#define PLT_CALL_STUB_SIZE (7*4)
91
92/* But sometimes the .plt entry crosses a 64k boundary, and we need
93 to adjust the high word with this insn. */
94#define ADDIS_R12_R12_1 0x3d8c0001 /* addis %r12,%r12,1 */
5bd4f169 95
5d1634d7
AM
96/* The .glink fixup call stub is the same as the .plt call stub, but
97 the first instruction restores r2, and the std is omitted. */
98#define LD_R2_40R1 0xe8410028 /* ld %r2,40(%r1) */
99
100/* Always allow this much space. */
101#define GLINK_CALL_STUB_SIZE (8*4)
102
103/* Pad with this. */
104#define NOP 0x60000000
105
721956f4
AM
106/* Some other nops. */
107#define CROR_151515 0x4def7b82
108#define CROR_313131 0x4ffffb82
109
cedb70c5 110/* .glink entries for the first 32k functions are two instructions. */
5d1634d7
AM
111#define LI_R0_0 0x38000000 /* li %r0,0 */
112#define B_DOT 0x48000000 /* b . */
113
114/* After that, we need two instructions to load the index, followed by
115 a branch. */
116#define LIS_R0_0 0x3c000000 /* lis %r0,0 */
10ed1bba 117#define ORI_R0_R0_0 0x60000000 /* ori %r0,%r0,0 */
41bd81ab 118
82bd7b59
AM
119/* Instructions to save and restore floating point regs. */
120#define STFD_FR0_0R1 0xd8010000 /* stfd %fr0,0(%r1) */
121#define LFD_FR0_0R1 0xc8010000 /* lfd %fr0,0(%r1) */
122#define BLR 0x4e800020 /* blr */
123
41bd81ab
AM
124/* Since .opd is an array of descriptors and each entry will end up
125 with identical R_PPC64_RELATIVE relocs, there is really no need to
126 propagate .opd relocs; The dynamic linker should be taught to
1e2f5b6e 127 relocate .opd without reloc entries. */
41bd81ab
AM
128#ifndef NO_OPD_RELOCS
129#define NO_OPD_RELOCS 0
130#endif
5bd4f169 131\f
f5e87a1d 132#define ONES(n) (((bfd_vma) 1 << ((n) - 1) << 1) - 1)
b34976b6 133
5bd4f169 134/* Relocation HOWTO's. */
04c9666a 135static reloc_howto_type *ppc64_elf_howto_table[(int) R_PPC64_max];
5bd4f169
AM
136
137static reloc_howto_type ppc64_elf_howto_raw[] = {
138 /* This reloc does nothing. */
139 HOWTO (R_PPC64_NONE, /* type */
140 0, /* rightshift */
411e1bfb
AM
141 2, /* size (0 = byte, 1 = short, 2 = long) */
142 32, /* bitsize */
b34976b6 143 FALSE, /* pc_relative */
5bd4f169 144 0, /* bitpos */
f5e87a1d 145 complain_overflow_dont, /* complain_on_overflow */
5bd4f169
AM
146 bfd_elf_generic_reloc, /* special_function */
147 "R_PPC64_NONE", /* name */
b34976b6 148 FALSE, /* partial_inplace */
d006db6c 149 0, /* src_mask */
5bd4f169 150 0, /* dst_mask */
b34976b6 151 FALSE), /* pcrel_offset */
5bd4f169
AM
152
153 /* A standard 32 bit relocation. */
154 HOWTO (R_PPC64_ADDR32, /* type */
155 0, /* rightshift */
156 2, /* size (0 = byte, 1 = short, 2 = long) */
157 32, /* bitsize */
b34976b6 158 FALSE, /* pc_relative */
5bd4f169
AM
159 0, /* bitpos */
160 complain_overflow_bitfield, /* complain_on_overflow */
161 bfd_elf_generic_reloc, /* special_function */
162 "R_PPC64_ADDR32", /* name */
b34976b6 163 FALSE, /* partial_inplace */
5bd4f169
AM
164 0, /* src_mask */
165 0xffffffff, /* dst_mask */
b34976b6 166 FALSE), /* pcrel_offset */
5bd4f169
AM
167
168 /* An absolute 26 bit branch; the lower two bits must be zero.
169 FIXME: we don't check that, we just clear them. */
170 HOWTO (R_PPC64_ADDR24, /* type */
171 0, /* rightshift */
172 2, /* size (0 = byte, 1 = short, 2 = long) */
173 26, /* bitsize */
b34976b6 174 FALSE, /* pc_relative */
5bd4f169
AM
175 0, /* bitpos */
176 complain_overflow_bitfield, /* complain_on_overflow */
177 bfd_elf_generic_reloc, /* special_function */
178 "R_PPC64_ADDR24", /* name */
b34976b6 179 FALSE, /* partial_inplace */
d006db6c 180 0, /* src_mask */
f5e87a1d 181 0x03fffffc, /* dst_mask */
b34976b6 182 FALSE), /* pcrel_offset */
5bd4f169
AM
183
184 /* A standard 16 bit relocation. */
185 HOWTO (R_PPC64_ADDR16, /* type */
186 0, /* rightshift */
187 1, /* size (0 = byte, 1 = short, 2 = long) */
188 16, /* bitsize */
b34976b6 189 FALSE, /* pc_relative */
5bd4f169
AM
190 0, /* bitpos */
191 complain_overflow_bitfield, /* complain_on_overflow */
192 bfd_elf_generic_reloc, /* special_function */
193 "R_PPC64_ADDR16", /* name */
b34976b6 194 FALSE, /* partial_inplace */
5bd4f169
AM
195 0, /* src_mask */
196 0xffff, /* dst_mask */
b34976b6 197 FALSE), /* pcrel_offset */
5bd4f169
AM
198
199 /* A 16 bit relocation without overflow. */
200 HOWTO (R_PPC64_ADDR16_LO, /* type */
201 0, /* rightshift */
202 1, /* size (0 = byte, 1 = short, 2 = long) */
203 16, /* bitsize */
b34976b6 204 FALSE, /* pc_relative */
5bd4f169
AM
205 0, /* bitpos */
206 complain_overflow_dont,/* complain_on_overflow */
207 bfd_elf_generic_reloc, /* special_function */
208 "R_PPC64_ADDR16_LO", /* name */
b34976b6 209 FALSE, /* partial_inplace */
5bd4f169
AM
210 0, /* src_mask */
211 0xffff, /* dst_mask */
b34976b6 212 FALSE), /* pcrel_offset */
5bd4f169
AM
213
214 /* Bits 16-31 of an address. */
215 HOWTO (R_PPC64_ADDR16_HI, /* type */
216 16, /* rightshift */
217 1, /* size (0 = byte, 1 = short, 2 = long) */
218 16, /* bitsize */
b34976b6 219 FALSE, /* pc_relative */
5bd4f169
AM
220 0, /* bitpos */
221 complain_overflow_dont, /* complain_on_overflow */
222 bfd_elf_generic_reloc, /* special_function */
223 "R_PPC64_ADDR16_HI", /* name */
b34976b6 224 FALSE, /* partial_inplace */
5bd4f169
AM
225 0, /* src_mask */
226 0xffff, /* dst_mask */
b34976b6 227 FALSE), /* pcrel_offset */
5bd4f169
AM
228
229 /* Bits 16-31 of an address, plus 1 if the contents of the low 16
230 bits, treated as a signed number, is negative. */
231 HOWTO (R_PPC64_ADDR16_HA, /* type */
232 16, /* rightshift */
233 1, /* size (0 = byte, 1 = short, 2 = long) */
234 16, /* bitsize */
b34976b6 235 FALSE, /* pc_relative */
5bd4f169
AM
236 0, /* bitpos */
237 complain_overflow_dont, /* complain_on_overflow */
805fc799 238 ppc64_elf_ha_reloc, /* special_function */
5bd4f169 239 "R_PPC64_ADDR16_HA", /* name */
b34976b6 240 FALSE, /* partial_inplace */
5bd4f169
AM
241 0, /* src_mask */
242 0xffff, /* dst_mask */
b34976b6 243 FALSE), /* pcrel_offset */
5bd4f169
AM
244
245 /* An absolute 16 bit branch; the lower two bits must be zero.
246 FIXME: we don't check that, we just clear them. */
247 HOWTO (R_PPC64_ADDR14, /* type */
248 0, /* rightshift */
249 2, /* size (0 = byte, 1 = short, 2 = long) */
250 16, /* bitsize */
b34976b6 251 FALSE, /* pc_relative */
5bd4f169
AM
252 0, /* bitpos */
253 complain_overflow_bitfield, /* complain_on_overflow */
254 bfd_elf_generic_reloc, /* special_function */
255 "R_PPC64_ADDR14", /* name */
b34976b6 256 FALSE, /* partial_inplace */
d006db6c 257 0, /* src_mask */
f5e87a1d 258 0x0000fffc, /* dst_mask */
b34976b6 259 FALSE), /* pcrel_offset */
5bd4f169
AM
260
261 /* An absolute 16 bit branch, for which bit 10 should be set to
262 indicate that the branch is expected to be taken. The lower two
263 bits must be zero. */
264 HOWTO (R_PPC64_ADDR14_BRTAKEN, /* type */
265 0, /* rightshift */
266 2, /* size (0 = byte, 1 = short, 2 = long) */
267 16, /* bitsize */
b34976b6 268 FALSE, /* pc_relative */
5bd4f169
AM
269 0, /* bitpos */
270 complain_overflow_bitfield, /* complain_on_overflow */
805fc799 271 ppc64_elf_brtaken_reloc, /* special_function */
5bd4f169 272 "R_PPC64_ADDR14_BRTAKEN",/* name */
b34976b6 273 FALSE, /* partial_inplace */
d006db6c 274 0, /* src_mask */
f5e87a1d 275 0x0000fffc, /* dst_mask */
b34976b6 276 FALSE), /* pcrel_offset */
5bd4f169
AM
277
278 /* An absolute 16 bit branch, for which bit 10 should be set to
279 indicate that the branch is not expected to be taken. The lower
280 two bits must be zero. */
281 HOWTO (R_PPC64_ADDR14_BRNTAKEN, /* type */
282 0, /* rightshift */
283 2, /* size (0 = byte, 1 = short, 2 = long) */
284 16, /* bitsize */
b34976b6 285 FALSE, /* pc_relative */
5bd4f169
AM
286 0, /* bitpos */
287 complain_overflow_bitfield, /* complain_on_overflow */
805fc799 288 ppc64_elf_brtaken_reloc, /* special_function */
5bd4f169 289 "R_PPC64_ADDR14_BRNTAKEN",/* name */
b34976b6 290 FALSE, /* partial_inplace */
d006db6c 291 0, /* src_mask */
f5e87a1d 292 0x0000fffc, /* dst_mask */
b34976b6 293 FALSE), /* pcrel_offset */
5bd4f169
AM
294
295 /* A relative 26 bit branch; the lower two bits must be zero. */
296 HOWTO (R_PPC64_REL24, /* type */
297 0, /* rightshift */
298 2, /* size (0 = byte, 1 = short, 2 = long) */
299 26, /* bitsize */
b34976b6 300 TRUE, /* pc_relative */
5bd4f169
AM
301 0, /* bitpos */
302 complain_overflow_signed, /* complain_on_overflow */
303 bfd_elf_generic_reloc, /* special_function */
304 "R_PPC64_REL24", /* name */
b34976b6 305 FALSE, /* partial_inplace */
d006db6c 306 0, /* src_mask */
f5e87a1d 307 0x03fffffc, /* dst_mask */
b34976b6 308 TRUE), /* pcrel_offset */
5bd4f169
AM
309
310 /* A relative 16 bit branch; the lower two bits must be zero. */
311 HOWTO (R_PPC64_REL14, /* type */
312 0, /* rightshift */
313 2, /* size (0 = byte, 1 = short, 2 = long) */
314 16, /* bitsize */
b34976b6 315 TRUE, /* pc_relative */
5bd4f169
AM
316 0, /* bitpos */
317 complain_overflow_signed, /* complain_on_overflow */
318 bfd_elf_generic_reloc, /* special_function */
319 "R_PPC64_REL14", /* name */
b34976b6 320 FALSE, /* partial_inplace */
d006db6c 321 0, /* src_mask */
f5e87a1d 322 0x0000fffc, /* dst_mask */
b34976b6 323 TRUE), /* pcrel_offset */
5bd4f169
AM
324
325 /* A relative 16 bit branch. Bit 10 should be set to indicate that
326 the branch is expected to be taken. The lower two bits must be
327 zero. */
328 HOWTO (R_PPC64_REL14_BRTAKEN, /* type */
329 0, /* rightshift */
330 2, /* size (0 = byte, 1 = short, 2 = long) */
331 16, /* bitsize */
b34976b6 332 TRUE, /* pc_relative */
5bd4f169
AM
333 0, /* bitpos */
334 complain_overflow_signed, /* complain_on_overflow */
805fc799 335 ppc64_elf_brtaken_reloc, /* special_function */
5bd4f169 336 "R_PPC64_REL14_BRTAKEN", /* name */
b34976b6 337 FALSE, /* partial_inplace */
d006db6c 338 0, /* src_mask */
f5e87a1d 339 0x0000fffc, /* dst_mask */
b34976b6 340 TRUE), /* pcrel_offset */
5bd4f169
AM
341
342 /* A relative 16 bit branch. Bit 10 should be set to indicate that
343 the branch is not expected to be taken. The lower two bits must
344 be zero. */
345 HOWTO (R_PPC64_REL14_BRNTAKEN, /* type */
346 0, /* rightshift */
347 2, /* size (0 = byte, 1 = short, 2 = long) */
348 16, /* bitsize */
b34976b6 349 TRUE, /* pc_relative */
5bd4f169
AM
350 0, /* bitpos */
351 complain_overflow_signed, /* complain_on_overflow */
805fc799 352 ppc64_elf_brtaken_reloc, /* special_function */
5bd4f169 353 "R_PPC64_REL14_BRNTAKEN",/* name */
b34976b6 354 FALSE, /* partial_inplace */
d006db6c 355 0, /* src_mask */
f5e87a1d 356 0x0000fffc, /* dst_mask */
b34976b6 357 TRUE), /* pcrel_offset */
5bd4f169
AM
358
359 /* Like R_PPC64_ADDR16, but referring to the GOT table entry for the
360 symbol. */
361 HOWTO (R_PPC64_GOT16, /* type */
362 0, /* rightshift */
363 1, /* size (0 = byte, 1 = short, 2 = long) */
364 16, /* bitsize */
b34976b6 365 FALSE, /* pc_relative */
5bd4f169
AM
366 0, /* bitpos */
367 complain_overflow_signed, /* complain_on_overflow */
805fc799 368 ppc64_elf_unhandled_reloc, /* special_function */
5bd4f169 369 "R_PPC64_GOT16", /* name */
b34976b6 370 FALSE, /* partial_inplace */
5bd4f169
AM
371 0, /* src_mask */
372 0xffff, /* dst_mask */
b34976b6 373 FALSE), /* pcrel_offset */
5bd4f169
AM
374
375 /* Like R_PPC64_ADDR16_LO, but referring to the GOT table entry for
376 the symbol. */
377 HOWTO (R_PPC64_GOT16_LO, /* type */
378 0, /* rightshift */
379 1, /* size (0 = byte, 1 = short, 2 = long) */
380 16, /* bitsize */
b34976b6 381 FALSE, /* pc_relative */
5bd4f169
AM
382 0, /* bitpos */
383 complain_overflow_dont, /* complain_on_overflow */
805fc799 384 ppc64_elf_unhandled_reloc, /* special_function */
5bd4f169 385 "R_PPC64_GOT16_LO", /* name */
b34976b6 386 FALSE, /* partial_inplace */
5bd4f169
AM
387 0, /* src_mask */
388 0xffff, /* dst_mask */
b34976b6 389 FALSE), /* pcrel_offset */
5bd4f169
AM
390
391 /* Like R_PPC64_ADDR16_HI, but referring to the GOT table entry for
392 the symbol. */
393 HOWTO (R_PPC64_GOT16_HI, /* type */
394 16, /* rightshift */
395 1, /* size (0 = byte, 1 = short, 2 = long) */
396 16, /* bitsize */
b34976b6 397 FALSE, /* pc_relative */
5bd4f169
AM
398 0, /* bitpos */
399 complain_overflow_dont,/* complain_on_overflow */
805fc799 400 ppc64_elf_unhandled_reloc, /* special_function */
5bd4f169 401 "R_PPC64_GOT16_HI", /* name */
b34976b6 402 FALSE, /* partial_inplace */
5bd4f169
AM
403 0, /* src_mask */
404 0xffff, /* dst_mask */
b34976b6 405 FALSE), /* pcrel_offset */
5bd4f169
AM
406
407 /* Like R_PPC64_ADDR16_HA, but referring to the GOT table entry for
408 the symbol. */
409 HOWTO (R_PPC64_GOT16_HA, /* type */
410 16, /* rightshift */
411 1, /* size (0 = byte, 1 = short, 2 = long) */
412 16, /* bitsize */
b34976b6 413 FALSE, /* pc_relative */
5bd4f169
AM
414 0, /* bitpos */
415 complain_overflow_dont,/* complain_on_overflow */
805fc799 416 ppc64_elf_unhandled_reloc, /* special_function */
5bd4f169 417 "R_PPC64_GOT16_HA", /* name */
b34976b6 418 FALSE, /* partial_inplace */
5bd4f169
AM
419 0, /* src_mask */
420 0xffff, /* dst_mask */
b34976b6 421 FALSE), /* pcrel_offset */
5bd4f169
AM
422
423 /* This is used only by the dynamic linker. The symbol should exist
424 both in the object being run and in some shared library. The
425 dynamic linker copies the data addressed by the symbol from the
426 shared library into the object, because the object being
427 run has to have the data at some particular address. */
428 HOWTO (R_PPC64_COPY, /* type */
429 0, /* rightshift */
f5e87a1d
AM
430 0, /* this one is variable size */
431 0, /* bitsize */
b34976b6 432 FALSE, /* pc_relative */
5bd4f169 433 0, /* bitpos */
f5e87a1d
AM
434 complain_overflow_dont, /* complain_on_overflow */
435 ppc64_elf_unhandled_reloc, /* special_function */
5bd4f169 436 "R_PPC64_COPY", /* name */
b34976b6 437 FALSE, /* partial_inplace */
5bd4f169
AM
438 0, /* src_mask */
439 0, /* dst_mask */
b34976b6 440 FALSE), /* pcrel_offset */
5bd4f169
AM
441
442 /* Like R_PPC64_ADDR64, but used when setting global offset table
443 entries. */
444 HOWTO (R_PPC64_GLOB_DAT, /* type */
445 0, /* rightshift */
446 4, /* size (0=byte, 1=short, 2=long, 4=64 bits) */
447 64, /* bitsize */
b34976b6 448 FALSE, /* pc_relative */
5bd4f169
AM
449 0, /* bitpos */
450 complain_overflow_dont, /* complain_on_overflow */
805fc799 451 ppc64_elf_unhandled_reloc, /* special_function */
5bd4f169 452 "R_PPC64_GLOB_DAT", /* name */
b34976b6 453 FALSE, /* partial_inplace */
5bd4f169 454 0, /* src_mask */
f5e87a1d 455 ONES (64), /* dst_mask */
b34976b6 456 FALSE), /* pcrel_offset */
5bd4f169
AM
457
458 /* Created by the link editor. Marks a procedure linkage table
459 entry for a symbol. */
460 HOWTO (R_PPC64_JMP_SLOT, /* type */
461 0, /* rightshift */
462 0, /* size (0 = byte, 1 = short, 2 = long) */
463 0, /* bitsize */
b34976b6 464 FALSE, /* pc_relative */
5bd4f169
AM
465 0, /* bitpos */
466 complain_overflow_dont, /* complain_on_overflow */
805fc799 467 ppc64_elf_unhandled_reloc, /* special_function */
5bd4f169 468 "R_PPC64_JMP_SLOT", /* name */
b34976b6 469 FALSE, /* partial_inplace */
5bd4f169
AM
470 0, /* src_mask */
471 0, /* dst_mask */
b34976b6 472 FALSE), /* pcrel_offset */
5bd4f169
AM
473
474 /* Used only by the dynamic linker. When the object is run, this
475 doubleword64 is set to the load address of the object, plus the
476 addend. */
477 HOWTO (R_PPC64_RELATIVE, /* type */
478 0, /* rightshift */
479 4, /* size (0=byte, 1=short, 2=long, 4=64 bits) */
480 64, /* bitsize */
b34976b6 481 FALSE, /* pc_relative */
5bd4f169
AM
482 0, /* bitpos */
483 complain_overflow_dont, /* complain_on_overflow */
484 bfd_elf_generic_reloc, /* special_function */
485 "R_PPC64_RELATIVE", /* name */
b34976b6 486 FALSE, /* partial_inplace */
5bd4f169 487 0, /* src_mask */
f5e87a1d 488 ONES (64), /* dst_mask */
b34976b6 489 FALSE), /* pcrel_offset */
5bd4f169
AM
490
491 /* Like R_PPC64_ADDR32, but may be unaligned. */
492 HOWTO (R_PPC64_UADDR32, /* type */
493 0, /* rightshift */
494 2, /* size (0 = byte, 1 = short, 2 = long) */
495 32, /* bitsize */
b34976b6 496 FALSE, /* pc_relative */
5bd4f169
AM
497 0, /* bitpos */
498 complain_overflow_bitfield, /* complain_on_overflow */
499 bfd_elf_generic_reloc, /* special_function */
500 "R_PPC64_UADDR32", /* name */
b34976b6 501 FALSE, /* partial_inplace */
5bd4f169
AM
502 0, /* src_mask */
503 0xffffffff, /* dst_mask */
b34976b6 504 FALSE), /* pcrel_offset */
5bd4f169
AM
505
506 /* Like R_PPC64_ADDR16, but may be unaligned. */
507 HOWTO (R_PPC64_UADDR16, /* type */
508 0, /* rightshift */
509 1, /* size (0 = byte, 1 = short, 2 = long) */
510 16, /* bitsize */
b34976b6 511 FALSE, /* pc_relative */
5bd4f169
AM
512 0, /* bitpos */
513 complain_overflow_bitfield, /* complain_on_overflow */
514 bfd_elf_generic_reloc, /* special_function */
515 "R_PPC64_UADDR16", /* name */
b34976b6 516 FALSE, /* partial_inplace */
5bd4f169
AM
517 0, /* src_mask */
518 0xffff, /* dst_mask */
b34976b6 519 FALSE), /* pcrel_offset */
5bd4f169
AM
520
521 /* 32-bit PC relative. */
522 HOWTO (R_PPC64_REL32, /* type */
523 0, /* rightshift */
524 2, /* size (0 = byte, 1 = short, 2 = long) */
525 32, /* bitsize */
b34976b6 526 TRUE, /* pc_relative */
5bd4f169 527 0, /* bitpos */
cedb70c5 528 /* FIXME: Verify. Was complain_overflow_bitfield. */
5bd4f169
AM
529 complain_overflow_signed, /* complain_on_overflow */
530 bfd_elf_generic_reloc, /* special_function */
531 "R_PPC64_REL32", /* name */
b34976b6 532 FALSE, /* partial_inplace */
5bd4f169
AM
533 0, /* src_mask */
534 0xffffffff, /* dst_mask */
b34976b6 535 TRUE), /* pcrel_offset */
5bd4f169 536
10ed1bba 537 /* 32-bit relocation to the symbol's procedure linkage table. */
5bd4f169
AM
538 HOWTO (R_PPC64_PLT32, /* type */
539 0, /* rightshift */
540 2, /* size (0 = byte, 1 = short, 2 = long) */
541 32, /* bitsize */
b34976b6 542 FALSE, /* pc_relative */
5bd4f169
AM
543 0, /* bitpos */
544 complain_overflow_bitfield, /* complain_on_overflow */
805fc799 545 ppc64_elf_unhandled_reloc, /* special_function */
5bd4f169 546 "R_PPC64_PLT32", /* name */
b34976b6 547 FALSE, /* partial_inplace */
5bd4f169 548 0, /* src_mask */
f5e87a1d 549 0xffffffff, /* dst_mask */
b34976b6 550 FALSE), /* pcrel_offset */
5bd4f169
AM
551
552 /* 32-bit PC relative relocation to the symbol's procedure linkage table.
553 FIXME: R_PPC64_PLTREL32 not supported. */
554 HOWTO (R_PPC64_PLTREL32, /* type */
555 0, /* rightshift */
556 2, /* size (0 = byte, 1 = short, 2 = long) */
557 32, /* bitsize */
b34976b6 558 TRUE, /* pc_relative */
5bd4f169
AM
559 0, /* bitpos */
560 complain_overflow_signed, /* complain_on_overflow */
561 bfd_elf_generic_reloc, /* special_function */
562 "R_PPC64_PLTREL32", /* name */
b34976b6 563 FALSE, /* partial_inplace */
5bd4f169 564 0, /* src_mask */
f5e87a1d 565 0xffffffff, /* dst_mask */
b34976b6 566 TRUE), /* pcrel_offset */
5bd4f169
AM
567
568 /* Like R_PPC64_ADDR16_LO, but referring to the PLT table entry for
569 the symbol. */
570 HOWTO (R_PPC64_PLT16_LO, /* type */
571 0, /* rightshift */
572 1, /* size (0 = byte, 1 = short, 2 = long) */
573 16, /* bitsize */
b34976b6 574 FALSE, /* pc_relative */
5bd4f169
AM
575 0, /* bitpos */
576 complain_overflow_dont, /* complain_on_overflow */
805fc799 577 ppc64_elf_unhandled_reloc, /* special_function */
5bd4f169 578 "R_PPC64_PLT16_LO", /* name */
b34976b6 579 FALSE, /* partial_inplace */
5bd4f169
AM
580 0, /* src_mask */
581 0xffff, /* dst_mask */
b34976b6 582 FALSE), /* pcrel_offset */
5bd4f169
AM
583
584 /* Like R_PPC64_ADDR16_HI, but referring to the PLT table entry for
585 the symbol. */
586 HOWTO (R_PPC64_PLT16_HI, /* type */
587 16, /* rightshift */
588 1, /* size (0 = byte, 1 = short, 2 = long) */
589 16, /* bitsize */
b34976b6 590 FALSE, /* pc_relative */
5bd4f169
AM
591 0, /* bitpos */
592 complain_overflow_dont, /* complain_on_overflow */
805fc799 593 ppc64_elf_unhandled_reloc, /* special_function */
5bd4f169 594 "R_PPC64_PLT16_HI", /* name */
b34976b6 595 FALSE, /* partial_inplace */
5bd4f169
AM
596 0, /* src_mask */
597 0xffff, /* dst_mask */
b34976b6 598 FALSE), /* pcrel_offset */
5bd4f169
AM
599
600 /* Like R_PPC64_ADDR16_HA, but referring to the PLT table entry for
601 the symbol. */
602 HOWTO (R_PPC64_PLT16_HA, /* type */
603 16, /* rightshift */
604 1, /* size (0 = byte, 1 = short, 2 = long) */
605 16, /* bitsize */
b34976b6 606 FALSE, /* pc_relative */
5bd4f169
AM
607 0, /* bitpos */
608 complain_overflow_dont, /* complain_on_overflow */
805fc799 609 ppc64_elf_unhandled_reloc, /* special_function */
5bd4f169 610 "R_PPC64_PLT16_HA", /* name */
b34976b6 611 FALSE, /* partial_inplace */
5bd4f169
AM
612 0, /* src_mask */
613 0xffff, /* dst_mask */
b34976b6 614 FALSE), /* pcrel_offset */
5bd4f169 615
c061c2d8 616 /* 16-bit section relative relocation. */
5bd4f169
AM
617 HOWTO (R_PPC64_SECTOFF, /* type */
618 0, /* rightshift */
c061c2d8
AM
619 1, /* size (0 = byte, 1 = short, 2 = long) */
620 16, /* bitsize */
b34976b6 621 FALSE, /* pc_relative */
5bd4f169
AM
622 0, /* bitpos */
623 complain_overflow_bitfield, /* complain_on_overflow */
805fc799 624 ppc64_elf_sectoff_reloc, /* special_function */
5bd4f169 625 "R_PPC64_SECTOFF", /* name */
b34976b6 626 FALSE, /* partial_inplace */
5bd4f169 627 0, /* src_mask */
c061c2d8 628 0xffff, /* dst_mask */
b34976b6 629 FALSE), /* pcrel_offset */
5bd4f169 630
c061c2d8 631 /* Like R_PPC64_SECTOFF, but no overflow warning. */
5bd4f169
AM
632 HOWTO (R_PPC64_SECTOFF_LO, /* type */
633 0, /* rightshift */
634 1, /* size (0 = byte, 1 = short, 2 = long) */
635 16, /* bitsize */
b34976b6 636 FALSE, /* pc_relative */
5bd4f169
AM
637 0, /* bitpos */
638 complain_overflow_dont, /* complain_on_overflow */
805fc799 639 ppc64_elf_sectoff_reloc, /* special_function */
5bd4f169 640 "R_PPC64_SECTOFF_LO", /* name */
b34976b6 641 FALSE, /* partial_inplace */
5bd4f169
AM
642 0, /* src_mask */
643 0xffff, /* dst_mask */
b34976b6 644 FALSE), /* pcrel_offset */
5bd4f169
AM
645
646 /* 16-bit upper half section relative relocation. */
647 HOWTO (R_PPC64_SECTOFF_HI, /* type */
648 16, /* rightshift */
649 1, /* size (0 = byte, 1 = short, 2 = long) */
650 16, /* bitsize */
b34976b6 651 FALSE, /* pc_relative */
5bd4f169
AM
652 0, /* bitpos */
653 complain_overflow_dont, /* complain_on_overflow */
805fc799 654 ppc64_elf_sectoff_reloc, /* special_function */
5bd4f169 655 "R_PPC64_SECTOFF_HI", /* name */
b34976b6 656 FALSE, /* partial_inplace */
5bd4f169
AM
657 0, /* src_mask */
658 0xffff, /* dst_mask */
b34976b6 659 FALSE), /* pcrel_offset */
5bd4f169
AM
660
661 /* 16-bit upper half adjusted section relative relocation. */
662 HOWTO (R_PPC64_SECTOFF_HA, /* type */
663 16, /* rightshift */
664 1, /* size (0 = byte, 1 = short, 2 = long) */
665 16, /* bitsize */
b34976b6 666 FALSE, /* pc_relative */
5bd4f169
AM
667 0, /* bitpos */
668 complain_overflow_dont, /* complain_on_overflow */
805fc799 669 ppc64_elf_sectoff_ha_reloc, /* special_function */
5bd4f169 670 "R_PPC64_SECTOFF_HA", /* name */
b34976b6 671 FALSE, /* partial_inplace */
5bd4f169
AM
672 0, /* src_mask */
673 0xffff, /* dst_mask */
b34976b6 674 FALSE), /* pcrel_offset */
5bd4f169 675
04c9666a
AM
676 /* Like R_PPC64_REL24 without touching the two least significant bits. */
677 HOWTO (R_PPC64_REL30, /* type */
5bd4f169
AM
678 2, /* rightshift */
679 2, /* size (0 = byte, 1 = short, 2 = long) */
680 30, /* bitsize */
b34976b6 681 TRUE, /* pc_relative */
5bd4f169
AM
682 0, /* bitpos */
683 complain_overflow_dont, /* complain_on_overflow */
684 bfd_elf_generic_reloc, /* special_function */
04c9666a 685 "R_PPC64_REL30", /* name */
b34976b6 686 FALSE, /* partial_inplace */
d006db6c 687 0, /* src_mask */
5bd4f169 688 0xfffffffc, /* dst_mask */
b34976b6 689 TRUE), /* pcrel_offset */
5bd4f169
AM
690
691 /* Relocs in the 64-bit PowerPC ELF ABI, not in the 32-bit ABI. */
692
693 /* A standard 64-bit relocation. */
694 HOWTO (R_PPC64_ADDR64, /* type */
695 0, /* rightshift */
696 4, /* size (0=byte, 1=short, 2=long, 4=64 bits) */
697 64, /* bitsize */
b34976b6 698 FALSE, /* pc_relative */
5bd4f169
AM
699 0, /* bitpos */
700 complain_overflow_dont, /* complain_on_overflow */
701 bfd_elf_generic_reloc, /* special_function */
702 "R_PPC64_ADDR64", /* name */
b34976b6 703 FALSE, /* partial_inplace */
5bd4f169 704 0, /* src_mask */
f5e87a1d 705 ONES (64), /* dst_mask */
b34976b6 706 FALSE), /* pcrel_offset */
5bd4f169
AM
707
708 /* The bits 32-47 of an address. */
709 HOWTO (R_PPC64_ADDR16_HIGHER, /* type */
710 32, /* rightshift */
711 1, /* size (0 = byte, 1 = short, 2 = long) */
712 16, /* bitsize */
b34976b6 713 FALSE, /* pc_relative */
5bd4f169
AM
714 0, /* bitpos */
715 complain_overflow_dont, /* complain_on_overflow */
716 bfd_elf_generic_reloc, /* special_function */
717 "R_PPC64_ADDR16_HIGHER", /* name */
b34976b6 718 FALSE, /* partial_inplace */
5bd4f169
AM
719 0, /* src_mask */
720 0xffff, /* dst_mask */
b34976b6 721 FALSE), /* pcrel_offset */
5bd4f169
AM
722
723 /* The bits 32-47 of an address, plus 1 if the contents of the low
724 16 bits, treated as a signed number, is negative. */
725 HOWTO (R_PPC64_ADDR16_HIGHERA, /* type */
726 32, /* rightshift */
727 1, /* size (0 = byte, 1 = short, 2 = long) */
728 16, /* bitsize */
b34976b6 729 FALSE, /* pc_relative */
5bd4f169
AM
730 0, /* bitpos */
731 complain_overflow_dont, /* complain_on_overflow */
805fc799 732 ppc64_elf_ha_reloc, /* special_function */
5bd4f169 733 "R_PPC64_ADDR16_HIGHERA", /* name */
b34976b6 734 FALSE, /* partial_inplace */
5bd4f169
AM
735 0, /* src_mask */
736 0xffff, /* dst_mask */
b34976b6 737 FALSE), /* pcrel_offset */
5bd4f169
AM
738
739 /* The bits 48-63 of an address. */
740 HOWTO (R_PPC64_ADDR16_HIGHEST,/* type */
741 48, /* rightshift */
742 1, /* size (0 = byte, 1 = short, 2 = long) */
743 16, /* bitsize */
b34976b6 744 FALSE, /* pc_relative */
5bd4f169
AM
745 0, /* bitpos */
746 complain_overflow_dont, /* complain_on_overflow */
747 bfd_elf_generic_reloc, /* special_function */
748 "R_PPC64_ADDR16_HIGHEST", /* name */
b34976b6 749 FALSE, /* partial_inplace */
5bd4f169
AM
750 0, /* src_mask */
751 0xffff, /* dst_mask */
b34976b6 752 FALSE), /* pcrel_offset */
5bd4f169
AM
753
754 /* The bits 48-63 of an address, plus 1 if the contents of the low
755 16 bits, treated as a signed number, is negative. */
756 HOWTO (R_PPC64_ADDR16_HIGHESTA,/* type */
757 48, /* rightshift */
758 1, /* size (0 = byte, 1 = short, 2 = long) */
759 16, /* bitsize */
b34976b6 760 FALSE, /* pc_relative */
5bd4f169
AM
761 0, /* bitpos */
762 complain_overflow_dont, /* complain_on_overflow */
805fc799 763 ppc64_elf_ha_reloc, /* special_function */
5bd4f169 764 "R_PPC64_ADDR16_HIGHESTA", /* name */
b34976b6 765 FALSE, /* partial_inplace */
5bd4f169
AM
766 0, /* src_mask */
767 0xffff, /* dst_mask */
b34976b6 768 FALSE), /* pcrel_offset */
5bd4f169
AM
769
770 /* Like ADDR64, but may be unaligned. */
771 HOWTO (R_PPC64_UADDR64, /* type */
772 0, /* rightshift */
773 4, /* size (0=byte, 1=short, 2=long, 4=64 bits) */
774 64, /* bitsize */
b34976b6 775 FALSE, /* pc_relative */
5bd4f169
AM
776 0, /* bitpos */
777 complain_overflow_dont, /* complain_on_overflow */
778 bfd_elf_generic_reloc, /* special_function */
779 "R_PPC64_UADDR64", /* name */
b34976b6 780 FALSE, /* partial_inplace */
5bd4f169 781 0, /* src_mask */
f5e87a1d 782 ONES (64), /* dst_mask */
b34976b6 783 FALSE), /* pcrel_offset */
5bd4f169
AM
784
785 /* 64-bit relative relocation. */
786 HOWTO (R_PPC64_REL64, /* type */
787 0, /* rightshift */
788 4, /* size (0=byte, 1=short, 2=long, 4=64 bits) */
789 64, /* bitsize */
b34976b6 790 TRUE, /* pc_relative */
5bd4f169
AM
791 0, /* bitpos */
792 complain_overflow_dont, /* complain_on_overflow */
793 bfd_elf_generic_reloc, /* special_function */
794 "R_PPC64_REL64", /* name */
b34976b6 795 FALSE, /* partial_inplace */
5bd4f169 796 0, /* src_mask */
f5e87a1d 797 ONES (64), /* dst_mask */
b34976b6 798 TRUE), /* pcrel_offset */
5bd4f169 799
cedb70c5 800 /* 64-bit relocation to the symbol's procedure linkage table. */
5bd4f169
AM
801 HOWTO (R_PPC64_PLT64, /* type */
802 0, /* rightshift */
803 4, /* size (0=byte, 1=short, 2=long, 4=64 bits) */
804 64, /* bitsize */
b34976b6 805 FALSE, /* pc_relative */
5bd4f169
AM
806 0, /* bitpos */
807 complain_overflow_dont, /* complain_on_overflow */
805fc799 808 ppc64_elf_unhandled_reloc, /* special_function */
5bd4f169 809 "R_PPC64_PLT64", /* name */
b34976b6 810 FALSE, /* partial_inplace */
5bd4f169 811 0, /* src_mask */
f5e87a1d 812 ONES (64), /* dst_mask */
b34976b6 813 FALSE), /* pcrel_offset */
5bd4f169
AM
814
815 /* 64-bit PC relative relocation to the symbol's procedure linkage
816 table. */
817 /* FIXME: R_PPC64_PLTREL64 not supported. */
818 HOWTO (R_PPC64_PLTREL64, /* type */
819 0, /* rightshift */
820 4, /* size (0=byte, 1=short, 2=long, 4=64 bits) */
821 64, /* bitsize */
b34976b6 822 TRUE, /* pc_relative */
5bd4f169
AM
823 0, /* bitpos */
824 complain_overflow_dont, /* complain_on_overflow */
805fc799 825 ppc64_elf_unhandled_reloc, /* special_function */
5bd4f169 826 "R_PPC64_PLTREL64", /* name */
b34976b6 827 FALSE, /* partial_inplace */
5bd4f169 828 0, /* src_mask */
f5e87a1d 829 ONES (64), /* dst_mask */
b34976b6 830 TRUE), /* pcrel_offset */
5bd4f169
AM
831
832 /* 16 bit TOC-relative relocation. */
833
834 /* R_PPC64_TOC16 47 half16* S + A - .TOC. */
835 HOWTO (R_PPC64_TOC16, /* type */
836 0, /* rightshift */
837 1, /* size (0 = byte, 1 = short, 2 = long) */
838 16, /* bitsize */
b34976b6 839 FALSE, /* pc_relative */
5bd4f169
AM
840 0, /* bitpos */
841 complain_overflow_signed, /* complain_on_overflow */
805fc799 842 ppc64_elf_toc_reloc, /* special_function */
5bd4f169 843 "R_PPC64_TOC16", /* name */
b34976b6 844 FALSE, /* partial_inplace */
5bd4f169
AM
845 0, /* src_mask */
846 0xffff, /* dst_mask */
b34976b6 847 FALSE), /* pcrel_offset */
5bd4f169
AM
848
849 /* 16 bit TOC-relative relocation without overflow. */
850
851 /* R_PPC64_TOC16_LO 48 half16 #lo (S + A - .TOC.) */
852 HOWTO (R_PPC64_TOC16_LO, /* type */
853 0, /* rightshift */
854 1, /* size (0 = byte, 1 = short, 2 = long) */
855 16, /* bitsize */
b34976b6 856 FALSE, /* pc_relative */
5bd4f169
AM
857 0, /* bitpos */
858 complain_overflow_dont, /* complain_on_overflow */
805fc799 859 ppc64_elf_toc_reloc, /* special_function */
5bd4f169 860 "R_PPC64_TOC16_LO", /* name */
b34976b6 861 FALSE, /* partial_inplace */
5bd4f169
AM
862 0, /* src_mask */
863 0xffff, /* dst_mask */
b34976b6 864 FALSE), /* pcrel_offset */
5bd4f169
AM
865
866 /* 16 bit TOC-relative relocation, high 16 bits. */
867
868 /* R_PPC64_TOC16_HI 49 half16 #hi (S + A - .TOC.) */
869 HOWTO (R_PPC64_TOC16_HI, /* type */
870 16, /* rightshift */
871 1, /* size (0 = byte, 1 = short, 2 = long) */
872 16, /* bitsize */
b34976b6 873 FALSE, /* pc_relative */
5bd4f169
AM
874 0, /* bitpos */
875 complain_overflow_dont, /* complain_on_overflow */
805fc799 876 ppc64_elf_toc_reloc, /* special_function */
5bd4f169 877 "R_PPC64_TOC16_HI", /* name */
b34976b6 878 FALSE, /* partial_inplace */
5bd4f169
AM
879 0, /* src_mask */
880 0xffff, /* dst_mask */
b34976b6 881 FALSE), /* pcrel_offset */
5bd4f169
AM
882
883 /* 16 bit TOC-relative relocation, high 16 bits, plus 1 if the
884 contents of the low 16 bits, treated as a signed number, is
885 negative. */
886
887 /* R_PPC64_TOC16_HA 50 half16 #ha (S + A - .TOC.) */
888 HOWTO (R_PPC64_TOC16_HA, /* type */
889 16, /* rightshift */
890 1, /* size (0 = byte, 1 = short, 2 = long) */
891 16, /* bitsize */
b34976b6 892 FALSE, /* pc_relative */
5bd4f169
AM
893 0, /* bitpos */
894 complain_overflow_dont, /* complain_on_overflow */
805fc799 895 ppc64_elf_toc_ha_reloc, /* special_function */
5bd4f169 896 "R_PPC64_TOC16_HA", /* name */
b34976b6 897 FALSE, /* partial_inplace */
5bd4f169
AM
898 0, /* src_mask */
899 0xffff, /* dst_mask */
b34976b6 900 FALSE), /* pcrel_offset */
5bd4f169
AM
901
902 /* 64-bit relocation; insert value of TOC base (.TOC.). */
903
904 /* R_PPC64_TOC 51 doubleword64 .TOC. */
905 HOWTO (R_PPC64_TOC, /* type */
906 0, /* rightshift */
907 4, /* size (0=byte, 1=short, 2=long, 4=64 bits) */
908 64, /* bitsize */
b34976b6 909 FALSE, /* pc_relative */
5bd4f169
AM
910 0, /* bitpos */
911 complain_overflow_bitfield, /* complain_on_overflow */
805fc799 912 ppc64_elf_toc64_reloc, /* special_function */
5bd4f169 913 "R_PPC64_TOC", /* name */
b34976b6 914 FALSE, /* partial_inplace */
5bd4f169 915 0, /* src_mask */
f5e87a1d 916 ONES (64), /* dst_mask */
b34976b6 917 FALSE), /* pcrel_offset */
5bd4f169
AM
918
919 /* Like R_PPC64_GOT16, but also informs the link editor that the
920 value to relocate may (!) refer to a PLT entry which the link
921 editor (a) may replace with the symbol value. If the link editor
922 is unable to fully resolve the symbol, it may (b) create a PLT
923 entry and store the address to the new PLT entry in the GOT.
924 This permits lazy resolution of function symbols at run time.
925 The link editor may also skip all of this and just (c) emit a
926 R_PPC64_GLOB_DAT to tie the symbol to the GOT entry. */
927 /* FIXME: R_PPC64_PLTGOT16 not implemented. */
928 HOWTO (R_PPC64_PLTGOT16, /* type */
929 0, /* rightshift */
930 1, /* size (0 = byte, 1 = short, 2 = long) */
931 16, /* bitsize */
b34976b6 932 FALSE, /* pc_relative */
5bd4f169
AM
933 0, /* bitpos */
934 complain_overflow_signed, /* complain_on_overflow */
805fc799 935 ppc64_elf_unhandled_reloc, /* special_function */
411e1bfb
AM
936 "R_PPC64_PLTGOT16", /* name */
937 FALSE, /* partial_inplace */
938 0, /* src_mask */
939 0xffff, /* dst_mask */
940 FALSE), /* pcrel_offset */
941
942 /* Like R_PPC64_PLTGOT16, but without overflow. */
943 /* FIXME: R_PPC64_PLTGOT16_LO not implemented. */
944 HOWTO (R_PPC64_PLTGOT16_LO, /* type */
945 0, /* rightshift */
946 1, /* size (0 = byte, 1 = short, 2 = long) */
947 16, /* bitsize */
948 FALSE, /* pc_relative */
949 0, /* bitpos */
950 complain_overflow_dont, /* complain_on_overflow */
951 ppc64_elf_unhandled_reloc, /* special_function */
952 "R_PPC64_PLTGOT16_LO", /* name */
953 FALSE, /* partial_inplace */
954 0, /* src_mask */
955 0xffff, /* dst_mask */
956 FALSE), /* pcrel_offset */
957
958 /* Like R_PPC64_PLT_GOT16, but using bits 16-31 of the address. */
959 /* FIXME: R_PPC64_PLTGOT16_HI not implemented. */
960 HOWTO (R_PPC64_PLTGOT16_HI, /* type */
961 16, /* rightshift */
962 1, /* size (0 = byte, 1 = short, 2 = long) */
963 16, /* bitsize */
964 FALSE, /* pc_relative */
965 0, /* bitpos */
966 complain_overflow_dont, /* complain_on_overflow */
967 ppc64_elf_unhandled_reloc, /* special_function */
968 "R_PPC64_PLTGOT16_HI", /* name */
969 FALSE, /* partial_inplace */
970 0, /* src_mask */
971 0xffff, /* dst_mask */
972 FALSE), /* pcrel_offset */
973
974 /* Like R_PPC64_PLT_GOT16, but using bits 16-31 of the address, plus
975 1 if the contents of the low 16 bits, treated as a signed number,
976 is negative. */
977 /* FIXME: R_PPC64_PLTGOT16_HA not implemented. */
978 HOWTO (R_PPC64_PLTGOT16_HA, /* type */
979 16, /* rightshift */
980 1, /* size (0 = byte, 1 = short, 2 = long) */
981 16, /* bitsize */
982 FALSE, /* pc_relative */
983 0, /* bitpos */
984 complain_overflow_dont,/* complain_on_overflow */
985 ppc64_elf_unhandled_reloc, /* special_function */
986 "R_PPC64_PLTGOT16_HA", /* name */
987 FALSE, /* partial_inplace */
988 0, /* src_mask */
989 0xffff, /* dst_mask */
990 FALSE), /* pcrel_offset */
991
992 /* Like R_PPC64_ADDR16, but for instructions with a DS field. */
993 HOWTO (R_PPC64_ADDR16_DS, /* type */
994 0, /* rightshift */
995 1, /* size (0 = byte, 1 = short, 2 = long) */
996 16, /* bitsize */
997 FALSE, /* pc_relative */
998 0, /* bitpos */
999 complain_overflow_bitfield, /* complain_on_overflow */
1000 bfd_elf_generic_reloc, /* special_function */
1001 "R_PPC64_ADDR16_DS", /* name */
1002 FALSE, /* partial_inplace */
1003 0, /* src_mask */
1004 0xfffc, /* dst_mask */
1005 FALSE), /* pcrel_offset */
1006
1007 /* Like R_PPC64_ADDR16_LO, but for instructions with a DS field. */
1008 HOWTO (R_PPC64_ADDR16_LO_DS, /* type */
1009 0, /* rightshift */
1010 1, /* size (0 = byte, 1 = short, 2 = long) */
1011 16, /* bitsize */
1012 FALSE, /* pc_relative */
1013 0, /* bitpos */
1014 complain_overflow_dont,/* complain_on_overflow */
1015 bfd_elf_generic_reloc, /* special_function */
1016 "R_PPC64_ADDR16_LO_DS",/* name */
1017 FALSE, /* partial_inplace */
1018 0, /* src_mask */
1019 0xfffc, /* dst_mask */
1020 FALSE), /* pcrel_offset */
1021
1022 /* Like R_PPC64_GOT16, but for instructions with a DS field. */
1023 HOWTO (R_PPC64_GOT16_DS, /* type */
1024 0, /* rightshift */
1025 1, /* size (0 = byte, 1 = short, 2 = long) */
1026 16, /* bitsize */
1027 FALSE, /* pc_relative */
1028 0, /* bitpos */
1029 complain_overflow_signed, /* complain_on_overflow */
1030 ppc64_elf_unhandled_reloc, /* special_function */
1031 "R_PPC64_GOT16_DS", /* name */
1032 FALSE, /* partial_inplace */
1033 0, /* src_mask */
1034 0xfffc, /* dst_mask */
1035 FALSE), /* pcrel_offset */
1036
1037 /* Like R_PPC64_GOT16_LO, but for instructions with a DS field. */
1038 HOWTO (R_PPC64_GOT16_LO_DS, /* type */
1039 0, /* rightshift */
1040 1, /* size (0 = byte, 1 = short, 2 = long) */
1041 16, /* bitsize */
1042 FALSE, /* pc_relative */
1043 0, /* bitpos */
1044 complain_overflow_dont, /* complain_on_overflow */
1045 ppc64_elf_unhandled_reloc, /* special_function */
1046 "R_PPC64_GOT16_LO_DS", /* name */
1047 FALSE, /* partial_inplace */
1048 0, /* src_mask */
1049 0xfffc, /* dst_mask */
1050 FALSE), /* pcrel_offset */
1051
1052 /* Like R_PPC64_PLT16_LO, but for instructions with a DS field. */
1053 HOWTO (R_PPC64_PLT16_LO_DS, /* type */
1054 0, /* rightshift */
1055 1, /* size (0 = byte, 1 = short, 2 = long) */
1056 16, /* bitsize */
1057 FALSE, /* pc_relative */
1058 0, /* bitpos */
1059 complain_overflow_dont, /* complain_on_overflow */
1060 ppc64_elf_unhandled_reloc, /* special_function */
1061 "R_PPC64_PLT16_LO_DS", /* name */
1062 FALSE, /* partial_inplace */
1063 0, /* src_mask */
1064 0xfffc, /* dst_mask */
1065 FALSE), /* pcrel_offset */
1066
1067 /* Like R_PPC64_SECTOFF, but for instructions with a DS field. */
1068 HOWTO (R_PPC64_SECTOFF_DS, /* type */
1069 0, /* rightshift */
1070 1, /* size (0 = byte, 1 = short, 2 = long) */
1071 16, /* bitsize */
1072 FALSE, /* pc_relative */
1073 0, /* bitpos */
1074 complain_overflow_bitfield, /* complain_on_overflow */
1075 ppc64_elf_sectoff_reloc, /* special_function */
1076 "R_PPC64_SECTOFF_DS", /* name */
1077 FALSE, /* partial_inplace */
1078 0, /* src_mask */
1079 0xfffc, /* dst_mask */
1080 FALSE), /* pcrel_offset */
1081
1082 /* Like R_PPC64_SECTOFF_LO, but for instructions with a DS field. */
1083 HOWTO (R_PPC64_SECTOFF_LO_DS, /* type */
1084 0, /* rightshift */
1085 1, /* size (0 = byte, 1 = short, 2 = long) */
1086 16, /* bitsize */
1087 FALSE, /* pc_relative */
1088 0, /* bitpos */
1089 complain_overflow_dont, /* complain_on_overflow */
1090 ppc64_elf_sectoff_reloc, /* special_function */
1091 "R_PPC64_SECTOFF_LO_DS",/* name */
1092 FALSE, /* partial_inplace */
1093 0, /* src_mask */
1094 0xfffc, /* dst_mask */
1095 FALSE), /* pcrel_offset */
1096
1097 /* Like R_PPC64_TOC16, but for instructions with a DS field. */
1098 HOWTO (R_PPC64_TOC16_DS, /* type */
1099 0, /* rightshift */
1100 1, /* size (0 = byte, 1 = short, 2 = long) */
1101 16, /* bitsize */
1102 FALSE, /* pc_relative */
1103 0, /* bitpos */
1104 complain_overflow_signed, /* complain_on_overflow */
1105 ppc64_elf_toc_reloc, /* special_function */
1106 "R_PPC64_TOC16_DS", /* name */
1107 FALSE, /* partial_inplace */
1108 0, /* src_mask */
1109 0xfffc, /* dst_mask */
1110 FALSE), /* pcrel_offset */
1111
1112 /* Like R_PPC64_TOC16_LO, but for instructions with a DS field. */
1113 HOWTO (R_PPC64_TOC16_LO_DS, /* type */
1114 0, /* rightshift */
1115 1, /* size (0 = byte, 1 = short, 2 = long) */
1116 16, /* bitsize */
1117 FALSE, /* pc_relative */
1118 0, /* bitpos */
1119 complain_overflow_dont, /* complain_on_overflow */
1120 ppc64_elf_toc_reloc, /* special_function */
1121 "R_PPC64_TOC16_LO_DS", /* name */
1122 FALSE, /* partial_inplace */
1123 0, /* src_mask */
1124 0xfffc, /* dst_mask */
1125 FALSE), /* pcrel_offset */
1126
1127 /* Like R_PPC64_PLTGOT16, but for instructions with a DS field. */
1128 /* FIXME: R_PPC64_PLTGOT16_DS not implemented. */
1129 HOWTO (R_PPC64_PLTGOT16_DS, /* type */
1130 0, /* rightshift */
1131 1, /* size (0 = byte, 1 = short, 2 = long) */
1132 16, /* bitsize */
1133 FALSE, /* pc_relative */
1134 0, /* bitpos */
1135 complain_overflow_signed, /* complain_on_overflow */
1136 ppc64_elf_unhandled_reloc, /* special_function */
1137 "R_PPC64_PLTGOT16_DS", /* name */
1138 FALSE, /* partial_inplace */
1139 0, /* src_mask */
1140 0xfffc, /* dst_mask */
1141 FALSE), /* pcrel_offset */
1142
1143 /* Like R_PPC64_PLTGOT16_LO, but for instructions with a DS field. */
1144 /* FIXME: R_PPC64_PLTGOT16_LO not implemented. */
1145 HOWTO (R_PPC64_PLTGOT16_LO_DS,/* type */
1146 0, /* rightshift */
1147 1, /* size (0 = byte, 1 = short, 2 = long) */
1148 16, /* bitsize */
1149 FALSE, /* pc_relative */
1150 0, /* bitpos */
1151 complain_overflow_dont, /* complain_on_overflow */
1152 ppc64_elf_unhandled_reloc, /* special_function */
1153 "R_PPC64_PLTGOT16_LO_DS",/* name */
1154 FALSE, /* partial_inplace */
1155 0, /* src_mask */
1156 0xfffc, /* dst_mask */
1157 FALSE), /* pcrel_offset */
1158
1159 /* Marker reloc for TLS. */
1160 HOWTO (R_PPC64_TLS,
1161 0, /* rightshift */
1162 2, /* size (0 = byte, 1 = short, 2 = long) */
1163 32, /* bitsize */
1164 FALSE, /* pc_relative */
1165 0, /* bitpos */
1166 complain_overflow_dont, /* complain_on_overflow */
1167 bfd_elf_generic_reloc, /* special_function */
1168 "R_PPC64_TLS", /* name */
1169 FALSE, /* partial_inplace */
1170 0, /* src_mask */
1171 0, /* dst_mask */
1172 FALSE), /* pcrel_offset */
1173
1174 /* Computes the load module index of the load module that contains the
1175 definition of its TLS sym. */
1176 HOWTO (R_PPC64_DTPMOD64,
1177 0, /* rightshift */
1178 4, /* size (0 = byte, 1 = short, 2 = long) */
1179 64, /* bitsize */
1180 FALSE, /* pc_relative */
1181 0, /* bitpos */
1182 complain_overflow_dont, /* complain_on_overflow */
1183 ppc64_elf_unhandled_reloc, /* special_function */
1184 "R_PPC64_DTPMOD64", /* name */
1185 FALSE, /* partial_inplace */
1186 0, /* src_mask */
1187 ONES (64), /* dst_mask */
1188 FALSE), /* pcrel_offset */
1189
1190 /* Computes a dtv-relative displacement, the difference between the value
1191 of sym+add and the base address of the thread-local storage block that
1192 contains the definition of sym, minus 0x8000. */
1193 HOWTO (R_PPC64_DTPREL64,
1194 0, /* rightshift */
1195 4, /* size (0 = byte, 1 = short, 2 = long) */
1196 64, /* bitsize */
1197 FALSE, /* pc_relative */
1198 0, /* bitpos */
1199 complain_overflow_dont, /* complain_on_overflow */
1200 ppc64_elf_unhandled_reloc, /* special_function */
1201 "R_PPC64_DTPREL64", /* name */
1202 FALSE, /* partial_inplace */
1203 0, /* src_mask */
1204 ONES (64), /* dst_mask */
1205 FALSE), /* pcrel_offset */
1206
1207 /* A 16 bit dtprel reloc. */
1208 HOWTO (R_PPC64_DTPREL16,
1209 0, /* rightshift */
1210 1, /* size (0 = byte, 1 = short, 2 = long) */
1211 16, /* bitsize */
1212 FALSE, /* pc_relative */
1213 0, /* bitpos */
1214 complain_overflow_signed, /* complain_on_overflow */
1215 ppc64_elf_unhandled_reloc, /* special_function */
1216 "R_PPC64_DTPREL16", /* name */
1217 FALSE, /* partial_inplace */
1218 0, /* src_mask */
1219 0xffff, /* dst_mask */
1220 FALSE), /* pcrel_offset */
1221
1222 /* Like DTPREL16, but no overflow. */
1223 HOWTO (R_PPC64_DTPREL16_LO,
1224 0, /* rightshift */
1225 1, /* size (0 = byte, 1 = short, 2 = long) */
1226 16, /* bitsize */
1227 FALSE, /* pc_relative */
1228 0, /* bitpos */
1229 complain_overflow_dont, /* complain_on_overflow */
1230 ppc64_elf_unhandled_reloc, /* special_function */
1231 "R_PPC64_DTPREL16_LO", /* name */
1232 FALSE, /* partial_inplace */
1233 0, /* src_mask */
1234 0xffff, /* dst_mask */
1235 FALSE), /* pcrel_offset */
1236
1237 /* Like DTPREL16_LO, but next higher group of 16 bits. */
1238 HOWTO (R_PPC64_DTPREL16_HI,
1239 16, /* rightshift */
1240 1, /* size (0 = byte, 1 = short, 2 = long) */
1241 16, /* bitsize */
1242 FALSE, /* pc_relative */
1243 0, /* bitpos */
1244 complain_overflow_dont, /* complain_on_overflow */
1245 ppc64_elf_unhandled_reloc, /* special_function */
1246 "R_PPC64_DTPREL16_HI", /* name */
1247 FALSE, /* partial_inplace */
1248 0, /* src_mask */
1249 0xffff, /* dst_mask */
1250 FALSE), /* pcrel_offset */
1251
1252 /* Like DTPREL16_HI, but adjust for low 16 bits. */
1253 HOWTO (R_PPC64_DTPREL16_HA,
1254 16, /* rightshift */
1255 1, /* size (0 = byte, 1 = short, 2 = long) */
1256 16, /* bitsize */
1257 FALSE, /* pc_relative */
1258 0, /* bitpos */
1259 complain_overflow_dont, /* complain_on_overflow */
1260 ppc64_elf_unhandled_reloc, /* special_function */
1261 "R_PPC64_DTPREL16_HA", /* name */
1262 FALSE, /* partial_inplace */
1263 0, /* src_mask */
1264 0xffff, /* dst_mask */
1265 FALSE), /* pcrel_offset */
1266
1267 /* Like DTPREL16_HI, but next higher group of 16 bits. */
1268 HOWTO (R_PPC64_DTPREL16_HIGHER,
1269 32, /* rightshift */
1270 1, /* size (0 = byte, 1 = short, 2 = long) */
1271 16, /* bitsize */
1272 FALSE, /* pc_relative */
1273 0, /* bitpos */
1274 complain_overflow_dont, /* complain_on_overflow */
1275 ppc64_elf_unhandled_reloc, /* special_function */
1276 "R_PPC64_DTPREL16_HIGHER", /* name */
1277 FALSE, /* partial_inplace */
1278 0, /* src_mask */
1279 0xffff, /* dst_mask */
1280 FALSE), /* pcrel_offset */
1281
1282 /* Like DTPREL16_HIGHER, but adjust for low 16 bits. */
1283 HOWTO (R_PPC64_DTPREL16_HIGHERA,
1284 32, /* rightshift */
1285 1, /* size (0 = byte, 1 = short, 2 = long) */
1286 16, /* bitsize */
1287 FALSE, /* pc_relative */
1288 0, /* bitpos */
1289 complain_overflow_dont, /* complain_on_overflow */
1290 ppc64_elf_unhandled_reloc, /* special_function */
1291 "R_PPC64_DTPREL16_HIGHERA", /* name */
1292 FALSE, /* partial_inplace */
1293 0, /* src_mask */
1294 0xffff, /* dst_mask */
1295 FALSE), /* pcrel_offset */
1296
1297 /* Like DTPREL16_HIGHER, but next higher group of 16 bits. */
1298 HOWTO (R_PPC64_DTPREL16_HIGHEST,
1299 48, /* rightshift */
1300 1, /* size (0 = byte, 1 = short, 2 = long) */
1301 16, /* bitsize */
1302 FALSE, /* pc_relative */
1303 0, /* bitpos */
1304 complain_overflow_dont, /* complain_on_overflow */
1305 ppc64_elf_unhandled_reloc, /* special_function */
1306 "R_PPC64_DTPREL16_HIGHEST", /* name */
1307 FALSE, /* partial_inplace */
1308 0, /* src_mask */
1309 0xffff, /* dst_mask */
1310 FALSE), /* pcrel_offset */
1311
1312 /* Like DTPREL16_HIGHEST, but adjust for low 16 bits. */
1313 HOWTO (R_PPC64_DTPREL16_HIGHESTA,
1314 48, /* rightshift */
1315 1, /* size (0 = byte, 1 = short, 2 = long) */
1316 16, /* bitsize */
1317 FALSE, /* pc_relative */
1318 0, /* bitpos */
1319 complain_overflow_dont, /* complain_on_overflow */
1320 ppc64_elf_unhandled_reloc, /* special_function */
1321 "R_PPC64_DTPREL16_HIGHESTA", /* name */
1322 FALSE, /* partial_inplace */
1323 0, /* src_mask */
1324 0xffff, /* dst_mask */
1325 FALSE), /* pcrel_offset */
1326
1327 /* Like DTPREL16, but for insns with a DS field. */
1328 HOWTO (R_PPC64_DTPREL16_DS,
1329 0, /* rightshift */
1330 1, /* size (0 = byte, 1 = short, 2 = long) */
1331 16, /* bitsize */
1332 FALSE, /* pc_relative */
1333 0, /* bitpos */
1334 complain_overflow_signed, /* complain_on_overflow */
1335 ppc64_elf_unhandled_reloc, /* special_function */
1336 "R_PPC64_DTPREL16_DS", /* name */
1337 FALSE, /* partial_inplace */
1338 0, /* src_mask */
1339 0xfffc, /* dst_mask */
1340 FALSE), /* pcrel_offset */
1341
1342 /* Like DTPREL16_DS, but no overflow. */
1343 HOWTO (R_PPC64_DTPREL16_LO_DS,
1344 0, /* rightshift */
1345 1, /* size (0 = byte, 1 = short, 2 = long) */
1346 16, /* bitsize */
1347 FALSE, /* pc_relative */
1348 0, /* bitpos */
1349 complain_overflow_dont, /* complain_on_overflow */
1350 ppc64_elf_unhandled_reloc, /* special_function */
1351 "R_PPC64_DTPREL16_LO_DS", /* name */
1352 FALSE, /* partial_inplace */
1353 0, /* src_mask */
1354 0xfffc, /* dst_mask */
1355 FALSE), /* pcrel_offset */
1356
1357 /* Computes a tp-relative displacement, the difference between the value of
1358 sym+add and the value of the thread pointer (r13). */
1359 HOWTO (R_PPC64_TPREL64,
1360 0, /* rightshift */
1361 4, /* size (0 = byte, 1 = short, 2 = long) */
1362 64, /* bitsize */
1363 FALSE, /* pc_relative */
1364 0, /* bitpos */
1365 complain_overflow_dont, /* complain_on_overflow */
1366 ppc64_elf_unhandled_reloc, /* special_function */
1367 "R_PPC64_TPREL64", /* name */
1368 FALSE, /* partial_inplace */
1369 0, /* src_mask */
1370 ONES (64), /* dst_mask */
1371 FALSE), /* pcrel_offset */
1372
1373 /* A 16 bit tprel reloc. */
1374 HOWTO (R_PPC64_TPREL16,
1375 0, /* rightshift */
1376 1, /* size (0 = byte, 1 = short, 2 = long) */
1377 16, /* bitsize */
1378 FALSE, /* pc_relative */
1379 0, /* bitpos */
1380 complain_overflow_signed, /* complain_on_overflow */
1381 ppc64_elf_unhandled_reloc, /* special_function */
1382 "R_PPC64_TPREL16", /* name */
1383 FALSE, /* partial_inplace */
1384 0, /* src_mask */
1385 0xffff, /* dst_mask */
1386 FALSE), /* pcrel_offset */
1387
1388 /* Like TPREL16, but no overflow. */
1389 HOWTO (R_PPC64_TPREL16_LO,
1390 0, /* rightshift */
1391 1, /* size (0 = byte, 1 = short, 2 = long) */
1392 16, /* bitsize */
1393 FALSE, /* pc_relative */
1394 0, /* bitpos */
1395 complain_overflow_dont, /* complain_on_overflow */
1396 ppc64_elf_unhandled_reloc, /* special_function */
1397 "R_PPC64_TPREL16_LO", /* name */
1398 FALSE, /* partial_inplace */
1399 0, /* src_mask */
1400 0xffff, /* dst_mask */
1401 FALSE), /* pcrel_offset */
1402
1403 /* Like TPREL16_LO, but next higher group of 16 bits. */
1404 HOWTO (R_PPC64_TPREL16_HI,
1405 16, /* rightshift */
1406 1, /* size (0 = byte, 1 = short, 2 = long) */
1407 16, /* bitsize */
1408 FALSE, /* pc_relative */
1409 0, /* bitpos */
1410 complain_overflow_dont, /* complain_on_overflow */
1411 ppc64_elf_unhandled_reloc, /* special_function */
1412 "R_PPC64_TPREL16_HI", /* name */
1413 FALSE, /* partial_inplace */
1414 0, /* src_mask */
1415 0xffff, /* dst_mask */
1416 FALSE), /* pcrel_offset */
1417
1418 /* Like TPREL16_HI, but adjust for low 16 bits. */
1419 HOWTO (R_PPC64_TPREL16_HA,
1420 16, /* rightshift */
1421 1, /* size (0 = byte, 1 = short, 2 = long) */
1422 16, /* bitsize */
1423 FALSE, /* pc_relative */
1424 0, /* bitpos */
1425 complain_overflow_dont, /* complain_on_overflow */
1426 ppc64_elf_unhandled_reloc, /* special_function */
1427 "R_PPC64_TPREL16_HA", /* name */
1428 FALSE, /* partial_inplace */
1429 0, /* src_mask */
1430 0xffff, /* dst_mask */
1431 FALSE), /* pcrel_offset */
1432
1433 /* Like TPREL16_HI, but next higher group of 16 bits. */
1434 HOWTO (R_PPC64_TPREL16_HIGHER,
1435 32, /* rightshift */
1436 1, /* size (0 = byte, 1 = short, 2 = long) */
1437 16, /* bitsize */
1438 FALSE, /* pc_relative */
1439 0, /* bitpos */
1440 complain_overflow_dont, /* complain_on_overflow */
1441 ppc64_elf_unhandled_reloc, /* special_function */
1442 "R_PPC64_TPREL16_HIGHER", /* name */
1443 FALSE, /* partial_inplace */
1444 0, /* src_mask */
1445 0xffff, /* dst_mask */
1446 FALSE), /* pcrel_offset */
1447
1448 /* Like TPREL16_HIGHER, but adjust for low 16 bits. */
1449 HOWTO (R_PPC64_TPREL16_HIGHERA,
1450 32, /* rightshift */
1451 1, /* size (0 = byte, 1 = short, 2 = long) */
1452 16, /* bitsize */
1453 FALSE, /* pc_relative */
1454 0, /* bitpos */
1455 complain_overflow_dont, /* complain_on_overflow */
1456 ppc64_elf_unhandled_reloc, /* special_function */
1457 "R_PPC64_TPREL16_HIGHERA", /* name */
1458 FALSE, /* partial_inplace */
1459 0, /* src_mask */
1460 0xffff, /* dst_mask */
1461 FALSE), /* pcrel_offset */
1462
1463 /* Like TPREL16_HIGHER, but next higher group of 16 bits. */
1464 HOWTO (R_PPC64_TPREL16_HIGHEST,
1465 48, /* rightshift */
1466 1, /* size (0 = byte, 1 = short, 2 = long) */
1467 16, /* bitsize */
1468 FALSE, /* pc_relative */
1469 0, /* bitpos */
1470 complain_overflow_dont, /* complain_on_overflow */
1471 ppc64_elf_unhandled_reloc, /* special_function */
1472 "R_PPC64_TPREL16_HIGHEST", /* name */
1473 FALSE, /* partial_inplace */
1474 0, /* src_mask */
1475 0xffff, /* dst_mask */
1476 FALSE), /* pcrel_offset */
1477
1478 /* Like TPREL16_HIGHEST, but adjust for low 16 bits. */
1479 HOWTO (R_PPC64_TPREL16_HIGHESTA,
1480 48, /* rightshift */
1481 1, /* size (0 = byte, 1 = short, 2 = long) */
1482 16, /* bitsize */
1483 FALSE, /* pc_relative */
1484 0, /* bitpos */
1485 complain_overflow_dont, /* complain_on_overflow */
1486 ppc64_elf_unhandled_reloc, /* special_function */
1487 "R_PPC64_TPREL16_HIGHESTA", /* name */
1488 FALSE, /* partial_inplace */
1489 0, /* src_mask */
1490 0xffff, /* dst_mask */
1491 FALSE), /* pcrel_offset */
1492
1493 /* Like TPREL16, but for insns with a DS field. */
1494 HOWTO (R_PPC64_TPREL16_DS,
1495 0, /* rightshift */
1496 1, /* size (0 = byte, 1 = short, 2 = long) */
1497 16, /* bitsize */
1498 FALSE, /* pc_relative */
1499 0, /* bitpos */
1500 complain_overflow_signed, /* complain_on_overflow */
1501 ppc64_elf_unhandled_reloc, /* special_function */
1502 "R_PPC64_TPREL16_DS", /* name */
1503 FALSE, /* partial_inplace */
1504 0, /* src_mask */
1505 0xfffc, /* dst_mask */
1506 FALSE), /* pcrel_offset */
1507
1508 /* Like TPREL16_DS, but no overflow. */
1509 HOWTO (R_PPC64_TPREL16_LO_DS,
1510 0, /* rightshift */
1511 1, /* size (0 = byte, 1 = short, 2 = long) */
1512 16, /* bitsize */
1513 FALSE, /* pc_relative */
1514 0, /* bitpos */
1515 complain_overflow_dont, /* complain_on_overflow */
1516 ppc64_elf_unhandled_reloc, /* special_function */
1517 "R_PPC64_TPREL16_LO_DS", /* name */
1518 FALSE, /* partial_inplace */
1519 0, /* src_mask */
1520 0xfffc, /* dst_mask */
1521 FALSE), /* pcrel_offset */
1522
1523 /* Allocates two contiguous entries in the GOT to hold a tls_index structure,
1524 with values (sym+add)@dtpmod and (sym+add)@dtprel, and computes the offset
1525 to the first entry relative to the TOC base (r2). */
1526 HOWTO (R_PPC64_GOT_TLSGD16,
1527 0, /* rightshift */
1528 1, /* size (0 = byte, 1 = short, 2 = long) */
1529 16, /* bitsize */
1530 FALSE, /* pc_relative */
1531 0, /* bitpos */
1532 complain_overflow_signed, /* complain_on_overflow */
1533 ppc64_elf_unhandled_reloc, /* special_function */
1534 "R_PPC64_GOT_TLSGD16", /* name */
b34976b6 1535 FALSE, /* partial_inplace */
5bd4f169
AM
1536 0, /* src_mask */
1537 0xffff, /* dst_mask */
b34976b6 1538 FALSE), /* pcrel_offset */
5bd4f169 1539
411e1bfb
AM
1540 /* Like GOT_TLSGD16, but no overflow. */
1541 HOWTO (R_PPC64_GOT_TLSGD16_LO,
5bd4f169
AM
1542 0, /* rightshift */
1543 1, /* size (0 = byte, 1 = short, 2 = long) */
1544 16, /* bitsize */
b34976b6 1545 FALSE, /* pc_relative */
5bd4f169
AM
1546 0, /* bitpos */
1547 complain_overflow_dont, /* complain_on_overflow */
805fc799 1548 ppc64_elf_unhandled_reloc, /* special_function */
411e1bfb 1549 "R_PPC64_GOT_TLSGD16_LO", /* name */
b34976b6 1550 FALSE, /* partial_inplace */
5bd4f169
AM
1551 0, /* src_mask */
1552 0xffff, /* dst_mask */
b34976b6 1553 FALSE), /* pcrel_offset */
5bd4f169 1554
411e1bfb
AM
1555 /* Like GOT_TLSGD16_LO, but next higher group of 16 bits. */
1556 HOWTO (R_PPC64_GOT_TLSGD16_HI,
5bd4f169
AM
1557 16, /* rightshift */
1558 1, /* size (0 = byte, 1 = short, 2 = long) */
1559 16, /* bitsize */
b34976b6 1560 FALSE, /* pc_relative */
5bd4f169
AM
1561 0, /* bitpos */
1562 complain_overflow_dont, /* complain_on_overflow */
805fc799 1563 ppc64_elf_unhandled_reloc, /* special_function */
411e1bfb 1564 "R_PPC64_GOT_TLSGD16_HI", /* name */
b34976b6 1565 FALSE, /* partial_inplace */
5bd4f169
AM
1566 0, /* src_mask */
1567 0xffff, /* dst_mask */
b34976b6 1568 FALSE), /* pcrel_offset */
5bd4f169 1569
411e1bfb
AM
1570 /* Like GOT_TLSGD16_HI, but adjust for low 16 bits. */
1571 HOWTO (R_PPC64_GOT_TLSGD16_HA,
5bd4f169
AM
1572 16, /* rightshift */
1573 1, /* size (0 = byte, 1 = short, 2 = long) */
1574 16, /* bitsize */
b34976b6 1575 FALSE, /* pc_relative */
5bd4f169 1576 0, /* bitpos */
411e1bfb 1577 complain_overflow_dont, /* complain_on_overflow */
805fc799 1578 ppc64_elf_unhandled_reloc, /* special_function */
411e1bfb 1579 "R_PPC64_GOT_TLSGD16_HA", /* name */
b34976b6 1580 FALSE, /* partial_inplace */
5bd4f169
AM
1581 0, /* src_mask */
1582 0xffff, /* dst_mask */
b34976b6 1583 FALSE), /* pcrel_offset */
5bd4f169 1584
411e1bfb
AM
1585 /* Allocates two contiguous entries in the GOT to hold a tls_index structure,
1586 with values (sym+add)@dtpmod and zero, and computes the offset to the
1587 first entry relative to the TOC base (r2). */
1588 HOWTO (R_PPC64_GOT_TLSLD16,
5bd4f169
AM
1589 0, /* rightshift */
1590 1, /* size (0 = byte, 1 = short, 2 = long) */
1591 16, /* bitsize */
b34976b6 1592 FALSE, /* pc_relative */
5bd4f169 1593 0, /* bitpos */
411e1bfb
AM
1594 complain_overflow_signed, /* complain_on_overflow */
1595 ppc64_elf_unhandled_reloc, /* special_function */
1596 "R_PPC64_GOT_TLSLD16", /* name */
b34976b6 1597 FALSE, /* partial_inplace */
d006db6c 1598 0, /* src_mask */
411e1bfb 1599 0xffff, /* dst_mask */
b34976b6 1600 FALSE), /* pcrel_offset */
5bd4f169 1601
411e1bfb
AM
1602 /* Like GOT_TLSLD16, but no overflow. */
1603 HOWTO (R_PPC64_GOT_TLSLD16_LO,
5bd4f169
AM
1604 0, /* rightshift */
1605 1, /* size (0 = byte, 1 = short, 2 = long) */
1606 16, /* bitsize */
b34976b6 1607 FALSE, /* pc_relative */
5bd4f169 1608 0, /* bitpos */
411e1bfb
AM
1609 complain_overflow_dont, /* complain_on_overflow */
1610 ppc64_elf_unhandled_reloc, /* special_function */
1611 "R_PPC64_GOT_TLSLD16_LO", /* name */
b34976b6 1612 FALSE, /* partial_inplace */
d006db6c 1613 0, /* src_mask */
411e1bfb 1614 0xffff, /* dst_mask */
b34976b6 1615 FALSE), /* pcrel_offset */
5bd4f169 1616
411e1bfb
AM
1617 /* Like GOT_TLSLD16_LO, but next higher group of 16 bits. */
1618 HOWTO (R_PPC64_GOT_TLSLD16_HI,
1619 16, /* rightshift */
5bd4f169
AM
1620 1, /* size (0 = byte, 1 = short, 2 = long) */
1621 16, /* bitsize */
b34976b6 1622 FALSE, /* pc_relative */
5bd4f169 1623 0, /* bitpos */
411e1bfb 1624 complain_overflow_dont, /* complain_on_overflow */
805fc799 1625 ppc64_elf_unhandled_reloc, /* special_function */
411e1bfb 1626 "R_PPC64_GOT_TLSLD16_HI", /* name */
b34976b6 1627 FALSE, /* partial_inplace */
d006db6c 1628 0, /* src_mask */
411e1bfb 1629 0xffff, /* dst_mask */
b34976b6 1630 FALSE), /* pcrel_offset */
5bd4f169 1631
411e1bfb
AM
1632 /* Like GOT_TLSLD16_HI, but adjust for low 16 bits. */
1633 HOWTO (R_PPC64_GOT_TLSLD16_HA,
1634 16, /* rightshift */
5bd4f169
AM
1635 1, /* size (0 = byte, 1 = short, 2 = long) */
1636 16, /* bitsize */
b34976b6 1637 FALSE, /* pc_relative */
5bd4f169
AM
1638 0, /* bitpos */
1639 complain_overflow_dont, /* complain_on_overflow */
805fc799 1640 ppc64_elf_unhandled_reloc, /* special_function */
411e1bfb 1641 "R_PPC64_GOT_TLSLD16_HA", /* name */
b34976b6 1642 FALSE, /* partial_inplace */
d006db6c 1643 0, /* src_mask */
411e1bfb 1644 0xffff, /* dst_mask */
b34976b6 1645 FALSE), /* pcrel_offset */
5bd4f169 1646
411e1bfb
AM
1647 /* Allocates an entry in the GOT with value (sym+add)@dtprel, and computes
1648 the offset to the entry relative to the TOC base (r2). */
1649 HOWTO (R_PPC64_GOT_DTPREL16_DS,
5bd4f169
AM
1650 0, /* rightshift */
1651 1, /* size (0 = byte, 1 = short, 2 = long) */
1652 16, /* bitsize */
b34976b6 1653 FALSE, /* pc_relative */
5bd4f169 1654 0, /* bitpos */
411e1bfb 1655 complain_overflow_signed, /* complain_on_overflow */
805fc799 1656 ppc64_elf_unhandled_reloc, /* special_function */
411e1bfb 1657 "R_PPC64_GOT_DTPREL16_DS", /* name */
b34976b6 1658 FALSE, /* partial_inplace */
d006db6c 1659 0, /* src_mask */
5bd4f169 1660 0xfffc, /* dst_mask */
b34976b6 1661 FALSE), /* pcrel_offset */
5bd4f169 1662
411e1bfb
AM
1663 /* Like GOT_DTPREL16_DS, but no overflow. */
1664 HOWTO (R_PPC64_GOT_DTPREL16_LO_DS,
5bd4f169 1665 0, /* rightshift */
c061c2d8
AM
1666 1, /* size (0 = byte, 1 = short, 2 = long) */
1667 16, /* bitsize */
b34976b6 1668 FALSE, /* pc_relative */
5bd4f169 1669 0, /* bitpos */
411e1bfb
AM
1670 complain_overflow_dont, /* complain_on_overflow */
1671 ppc64_elf_unhandled_reloc, /* special_function */
1672 "R_PPC64_GOT_DTPREL16_LO_DS", /* name */
b34976b6 1673 FALSE, /* partial_inplace */
d006db6c 1674 0, /* src_mask */
c061c2d8 1675 0xfffc, /* dst_mask */
b34976b6 1676 FALSE), /* pcrel_offset */
5bd4f169 1677
411e1bfb
AM
1678 /* Like GOT_DTPREL16_LO_DS, but next higher group of 16 bits. */
1679 HOWTO (R_PPC64_GOT_DTPREL16_HI,
1680 16, /* rightshift */
5bd4f169
AM
1681 1, /* size (0 = byte, 1 = short, 2 = long) */
1682 16, /* bitsize */
b34976b6 1683 FALSE, /* pc_relative */
5bd4f169
AM
1684 0, /* bitpos */
1685 complain_overflow_dont, /* complain_on_overflow */
411e1bfb
AM
1686 ppc64_elf_unhandled_reloc, /* special_function */
1687 "R_PPC64_GOT_DTPREL16_HI", /* name */
b34976b6 1688 FALSE, /* partial_inplace */
d006db6c 1689 0, /* src_mask */
411e1bfb 1690 0xffff, /* dst_mask */
b34976b6 1691 FALSE), /* pcrel_offset */
5bd4f169 1692
411e1bfb
AM
1693 /* Like GOT_DTPREL16_HI, but adjust for low 16 bits. */
1694 HOWTO (R_PPC64_GOT_DTPREL16_HA,
1695 16, /* rightshift */
1696 1, /* size (0 = byte, 1 = short, 2 = long) */
1697 16, /* bitsize */
1698 FALSE, /* pc_relative */
1699 0, /* bitpos */
1700 complain_overflow_dont, /* complain_on_overflow */
1701 ppc64_elf_unhandled_reloc, /* special_function */
1702 "R_PPC64_GOT_DTPREL16_HA", /* name */
1703 FALSE, /* partial_inplace */
1704 0, /* src_mask */
1705 0xffff, /* dst_mask */
1706 FALSE), /* pcrel_offset */
1707
1708 /* Allocates an entry in the GOT with value (sym+add)@tprel, and computes the
1709 offset to the entry relative to the TOC base (r2). */
1710 HOWTO (R_PPC64_GOT_TPREL16_DS,
5bd4f169
AM
1711 0, /* rightshift */
1712 1, /* size (0 = byte, 1 = short, 2 = long) */
1713 16, /* bitsize */
b34976b6 1714 FALSE, /* pc_relative */
5bd4f169
AM
1715 0, /* bitpos */
1716 complain_overflow_signed, /* complain_on_overflow */
411e1bfb
AM
1717 ppc64_elf_unhandled_reloc, /* special_function */
1718 "R_PPC64_GOT_TPREL16_DS", /* name */
b34976b6 1719 FALSE, /* partial_inplace */
d006db6c 1720 0, /* src_mask */
411e1bfb 1721 0xffff, /* dst_mask */
b34976b6 1722 FALSE), /* pcrel_offset */
5bd4f169 1723
411e1bfb
AM
1724 /* Like GOT_TPREL16_DS, but no overflow. */
1725 HOWTO (R_PPC64_GOT_TPREL16_LO_DS,
5bd4f169
AM
1726 0, /* rightshift */
1727 1, /* size (0 = byte, 1 = short, 2 = long) */
1728 16, /* bitsize */
b34976b6 1729 FALSE, /* pc_relative */
5bd4f169
AM
1730 0, /* bitpos */
1731 complain_overflow_dont, /* complain_on_overflow */
411e1bfb
AM
1732 ppc64_elf_unhandled_reloc, /* special_function */
1733 "R_PPC64_GOT_TPREL16_LO_DS", /* name */
b34976b6 1734 FALSE, /* partial_inplace */
d006db6c 1735 0, /* src_mask */
411e1bfb 1736 0xffff, /* dst_mask */
b34976b6 1737 FALSE), /* pcrel_offset */
5bd4f169 1738
411e1bfb
AM
1739 /* Like GOT_TPREL16_LO_DS, but next higher group of 16 bits. */
1740 HOWTO (R_PPC64_GOT_TPREL16_HI,
1741 16, /* rightshift */
5bd4f169
AM
1742 1, /* size (0 = byte, 1 = short, 2 = long) */
1743 16, /* bitsize */
b34976b6 1744 FALSE, /* pc_relative */
5bd4f169 1745 0, /* bitpos */
411e1bfb 1746 complain_overflow_dont, /* complain_on_overflow */
805fc799 1747 ppc64_elf_unhandled_reloc, /* special_function */
411e1bfb 1748 "R_PPC64_GOT_TPREL16_HI", /* name */
b34976b6 1749 FALSE, /* partial_inplace */
d006db6c 1750 0, /* src_mask */
411e1bfb 1751 0xffff, /* dst_mask */
b34976b6 1752 FALSE), /* pcrel_offset */
5bd4f169 1753
411e1bfb
AM
1754 /* Like GOT_TPREL16_HI, but adjust for low 16 bits. */
1755 HOWTO (R_PPC64_GOT_TPREL16_HA,
1756 16, /* rightshift */
5bd4f169
AM
1757 1, /* size (0 = byte, 1 = short, 2 = long) */
1758 16, /* bitsize */
b34976b6 1759 FALSE, /* pc_relative */
5bd4f169
AM
1760 0, /* bitpos */
1761 complain_overflow_dont, /* complain_on_overflow */
805fc799 1762 ppc64_elf_unhandled_reloc, /* special_function */
411e1bfb 1763 "R_PPC64_GOT_TPREL16_HA", /* name */
b34976b6 1764 FALSE, /* partial_inplace */
d006db6c 1765 0, /* src_mask */
411e1bfb 1766 0xffff, /* dst_mask */
b34976b6 1767 FALSE), /* pcrel_offset */
5bd4f169
AM
1768
1769 /* GNU extension to record C++ vtable hierarchy. */
1770 HOWTO (R_PPC64_GNU_VTINHERIT, /* type */
1771 0, /* rightshift */
1772 0, /* size (0 = byte, 1 = short, 2 = long) */
1773 0, /* bitsize */
b34976b6 1774 FALSE, /* pc_relative */
5bd4f169
AM
1775 0, /* bitpos */
1776 complain_overflow_dont, /* complain_on_overflow */
1777 NULL, /* special_function */
1778 "R_PPC64_GNU_VTINHERIT", /* name */
b34976b6 1779 FALSE, /* partial_inplace */
5bd4f169
AM
1780 0, /* src_mask */
1781 0, /* dst_mask */
b34976b6 1782 FALSE), /* pcrel_offset */
5bd4f169
AM
1783
1784 /* GNU extension to record C++ vtable member usage. */
1785 HOWTO (R_PPC64_GNU_VTENTRY, /* type */
1786 0, /* rightshift */
1787 0, /* size (0 = byte, 1 = short, 2 = long) */
1788 0, /* bitsize */
b34976b6 1789 FALSE, /* pc_relative */
5bd4f169
AM
1790 0, /* bitpos */
1791 complain_overflow_dont, /* complain_on_overflow */
1792 NULL, /* special_function */
1793 "R_PPC64_GNU_VTENTRY", /* name */
b34976b6 1794 FALSE, /* partial_inplace */
5bd4f169
AM
1795 0, /* src_mask */
1796 0, /* dst_mask */
b34976b6 1797 FALSE), /* pcrel_offset */
5bd4f169
AM
1798};
1799
1800\f
1801/* Initialize the ppc64_elf_howto_table, so that linear accesses can
1802 be done. */
1803
1804static void
1805ppc_howto_init ()
1806{
1807 unsigned int i, type;
1808
1809 for (i = 0;
1810 i < sizeof (ppc64_elf_howto_raw) / sizeof (ppc64_elf_howto_raw[0]);
1811 i++)
1812 {
1813 type = ppc64_elf_howto_raw[i].type;
1814 BFD_ASSERT (type < (sizeof (ppc64_elf_howto_table)
1815 / sizeof (ppc64_elf_howto_table[0])));
1816 ppc64_elf_howto_table[type] = &ppc64_elf_howto_raw[i];
1817 }
1818}
1819
1820static reloc_howto_type *
1821ppc64_elf_reloc_type_lookup (abfd, code)
1822 bfd *abfd ATTRIBUTE_UNUSED;
1823 bfd_reloc_code_real_type code;
1824{
411e1bfb 1825 enum elf_ppc64_reloc_type r = R_PPC64_NONE;
5bd4f169
AM
1826
1827 if (!ppc64_elf_howto_table[R_PPC64_ADDR32])
1828 /* Initialize howto table if needed. */
1829 ppc_howto_init ();
1830
1831 switch ((int) code)
1832 {
1833 default:
1834 return (reloc_howto_type *) NULL;
1835
411e1bfb
AM
1836 case BFD_RELOC_NONE: r = R_PPC64_NONE;
1837 break;
1838 case BFD_RELOC_32: r = R_PPC64_ADDR32;
1839 break;
1840 case BFD_RELOC_PPC_BA26: r = R_PPC64_ADDR24;
1841 break;
1842 case BFD_RELOC_16: r = R_PPC64_ADDR16;
1843 break;
1844 case BFD_RELOC_LO16: r = R_PPC64_ADDR16_LO;
1845 break;
1846 case BFD_RELOC_HI16: r = R_PPC64_ADDR16_HI;
1847 break;
1848 case BFD_RELOC_HI16_S: r = R_PPC64_ADDR16_HA;
5bd4f169 1849 break;
411e1bfb 1850 case BFD_RELOC_PPC_BA16: r = R_PPC64_ADDR14;
5bd4f169 1851 break;
411e1bfb 1852 case BFD_RELOC_PPC_BA16_BRTAKEN: r = R_PPC64_ADDR14_BRTAKEN;
5bd4f169 1853 break;
411e1bfb 1854 case BFD_RELOC_PPC_BA16_BRNTAKEN: r = R_PPC64_ADDR14_BRNTAKEN;
5bd4f169 1855 break;
411e1bfb 1856 case BFD_RELOC_PPC_B26: r = R_PPC64_REL24;
5bd4f169 1857 break;
411e1bfb 1858 case BFD_RELOC_PPC_B16: r = R_PPC64_REL14;
5bd4f169 1859 break;
411e1bfb 1860 case BFD_RELOC_PPC_B16_BRTAKEN: r = R_PPC64_REL14_BRTAKEN;
5bd4f169 1861 break;
411e1bfb 1862 case BFD_RELOC_PPC_B16_BRNTAKEN: r = R_PPC64_REL14_BRNTAKEN;
5bd4f169 1863 break;
411e1bfb 1864 case BFD_RELOC_16_GOTOFF: r = R_PPC64_GOT16;
5bd4f169 1865 break;
411e1bfb 1866 case BFD_RELOC_LO16_GOTOFF: r = R_PPC64_GOT16_LO;
5bd4f169 1867 break;
411e1bfb 1868 case BFD_RELOC_HI16_GOTOFF: r = R_PPC64_GOT16_HI;
5bd4f169 1869 break;
411e1bfb 1870 case BFD_RELOC_HI16_S_GOTOFF: r = R_PPC64_GOT16_HA;
5bd4f169 1871 break;
411e1bfb 1872 case BFD_RELOC_PPC_COPY: r = R_PPC64_COPY;
5bd4f169 1873 break;
411e1bfb 1874 case BFD_RELOC_PPC_GLOB_DAT: r = R_PPC64_GLOB_DAT;
5bd4f169 1875 break;
411e1bfb 1876 case BFD_RELOC_32_PCREL: r = R_PPC64_REL32;
5bd4f169 1877 break;
411e1bfb 1878 case BFD_RELOC_32_PLTOFF: r = R_PPC64_PLT32;
5bd4f169 1879 break;
411e1bfb 1880 case BFD_RELOC_32_PLT_PCREL: r = R_PPC64_PLTREL32;
5bd4f169 1881 break;
411e1bfb 1882 case BFD_RELOC_LO16_PLTOFF: r = R_PPC64_PLT16_LO;
5bd4f169 1883 break;
411e1bfb 1884 case BFD_RELOC_HI16_PLTOFF: r = R_PPC64_PLT16_HI;
5bd4f169 1885 break;
411e1bfb 1886 case BFD_RELOC_HI16_S_PLTOFF: r = R_PPC64_PLT16_HA;
5bd4f169 1887 break;
411e1bfb 1888 case BFD_RELOC_16_BASEREL: r = R_PPC64_SECTOFF;
5bd4f169 1889 break;
411e1bfb 1890 case BFD_RELOC_LO16_BASEREL: r = R_PPC64_SECTOFF_LO;
5bd4f169 1891 break;
411e1bfb 1892 case BFD_RELOC_HI16_BASEREL: r = R_PPC64_SECTOFF_HI;
5bd4f169 1893 break;
411e1bfb 1894 case BFD_RELOC_HI16_S_BASEREL: r = R_PPC64_SECTOFF_HA;
5bd4f169 1895 break;
411e1bfb 1896 case BFD_RELOC_CTOR: r = R_PPC64_ADDR64;
5bd4f169 1897 break;
411e1bfb 1898 case BFD_RELOC_64: r = R_PPC64_ADDR64;
5bd4f169 1899 break;
411e1bfb 1900 case BFD_RELOC_PPC64_HIGHER: r = R_PPC64_ADDR16_HIGHER;
5bd4f169 1901 break;
411e1bfb 1902 case BFD_RELOC_PPC64_HIGHER_S: r = R_PPC64_ADDR16_HIGHERA;
5bd4f169 1903 break;
411e1bfb 1904 case BFD_RELOC_PPC64_HIGHEST: r = R_PPC64_ADDR16_HIGHEST;
5bd4f169 1905 break;
411e1bfb 1906 case BFD_RELOC_PPC64_HIGHEST_S: r = R_PPC64_ADDR16_HIGHESTA;
5bd4f169 1907 break;
411e1bfb 1908 case BFD_RELOC_64_PCREL: r = R_PPC64_REL64;
5bd4f169 1909 break;
411e1bfb 1910 case BFD_RELOC_64_PLTOFF: r = R_PPC64_PLT64;
5bd4f169 1911 break;
411e1bfb 1912 case BFD_RELOC_64_PLT_PCREL: r = R_PPC64_PLTREL64;
5bd4f169 1913 break;
411e1bfb 1914 case BFD_RELOC_PPC_TOC16: r = R_PPC64_TOC16;
5bd4f169 1915 break;
411e1bfb 1916 case BFD_RELOC_PPC64_TOC16_LO: r = R_PPC64_TOC16_LO;
5bd4f169 1917 break;
411e1bfb 1918 case BFD_RELOC_PPC64_TOC16_HI: r = R_PPC64_TOC16_HI;
5bd4f169 1919 break;
411e1bfb 1920 case BFD_RELOC_PPC64_TOC16_HA: r = R_PPC64_TOC16_HA;
5bd4f169 1921 break;
411e1bfb 1922 case BFD_RELOC_PPC64_TOC: r = R_PPC64_TOC;
5bd4f169 1923 break;
411e1bfb 1924 case BFD_RELOC_PPC64_PLTGOT16: r = R_PPC64_PLTGOT16;
5bd4f169 1925 break;
411e1bfb 1926 case BFD_RELOC_PPC64_PLTGOT16_LO: r = R_PPC64_PLTGOT16_LO;
5bd4f169 1927 break;
411e1bfb 1928 case BFD_RELOC_PPC64_PLTGOT16_HI: r = R_PPC64_PLTGOT16_HI;
5bd4f169 1929 break;
411e1bfb 1930 case BFD_RELOC_PPC64_PLTGOT16_HA: r = R_PPC64_PLTGOT16_HA;
5bd4f169 1931 break;
411e1bfb 1932 case BFD_RELOC_PPC64_ADDR16_DS: r = R_PPC64_ADDR16_DS;
5bd4f169 1933 break;
411e1bfb 1934 case BFD_RELOC_PPC64_ADDR16_LO_DS: r = R_PPC64_ADDR16_LO_DS;
5bd4f169 1935 break;
411e1bfb 1936 case BFD_RELOC_PPC64_GOT16_DS: r = R_PPC64_GOT16_DS;
5bd4f169 1937 break;
411e1bfb 1938 case BFD_RELOC_PPC64_GOT16_LO_DS: r = R_PPC64_GOT16_LO_DS;
5bd4f169 1939 break;
411e1bfb 1940 case BFD_RELOC_PPC64_PLT16_LO_DS: r = R_PPC64_PLT16_LO_DS;
5bd4f169 1941 break;
411e1bfb 1942 case BFD_RELOC_PPC64_SECTOFF_DS: r = R_PPC64_SECTOFF_DS;
5bd4f169 1943 break;
411e1bfb 1944 case BFD_RELOC_PPC64_SECTOFF_LO_DS: r = R_PPC64_SECTOFF_LO_DS;
5bd4f169 1945 break;
411e1bfb 1946 case BFD_RELOC_PPC64_TOC16_DS: r = R_PPC64_TOC16_DS;
5bd4f169 1947 break;
411e1bfb 1948 case BFD_RELOC_PPC64_TOC16_LO_DS: r = R_PPC64_TOC16_LO_DS;
5bd4f169 1949 break;
411e1bfb 1950 case BFD_RELOC_PPC64_PLTGOT16_DS: r = R_PPC64_PLTGOT16_DS;
5bd4f169 1951 break;
411e1bfb 1952 case BFD_RELOC_PPC64_PLTGOT16_LO_DS: r = R_PPC64_PLTGOT16_LO_DS;
5bd4f169 1953 break;
411e1bfb 1954 case BFD_RELOC_PPC_TLS: r = R_PPC64_TLS;
5bd4f169 1955 break;
411e1bfb 1956 case BFD_RELOC_PPC_DTPMOD: r = R_PPC64_DTPMOD64;
5bd4f169 1957 break;
411e1bfb 1958 case BFD_RELOC_PPC_TPREL16: r = R_PPC64_TPREL16;
5bd4f169 1959 break;
411e1bfb 1960 case BFD_RELOC_PPC_TPREL16_LO: r = R_PPC64_TPREL16_LO;
5bd4f169 1961 break;
411e1bfb 1962 case BFD_RELOC_PPC_TPREL16_HI: r = R_PPC64_TPREL16_HI;
5bd4f169 1963 break;
411e1bfb 1964 case BFD_RELOC_PPC_TPREL16_HA: r = R_PPC64_TPREL16_HA;
5bd4f169 1965 break;
411e1bfb 1966 case BFD_RELOC_PPC_TPREL: r = R_PPC64_TPREL64;
5bd4f169 1967 break;
411e1bfb
AM
1968 case BFD_RELOC_PPC_DTPREL16: r = R_PPC64_DTPREL16;
1969 break;
1970 case BFD_RELOC_PPC_DTPREL16_LO: r = R_PPC64_DTPREL16_LO;
1971 break;
1972 case BFD_RELOC_PPC_DTPREL16_HI: r = R_PPC64_DTPREL16_HI;
1973 break;
1974 case BFD_RELOC_PPC_DTPREL16_HA: r = R_PPC64_DTPREL16_HA;
1975 break;
1976 case BFD_RELOC_PPC_DTPREL: r = R_PPC64_DTPREL64;
1977 break;
1978 case BFD_RELOC_PPC_GOT_TLSGD16: r = R_PPC64_GOT_TLSGD16;
1979 break;
1980 case BFD_RELOC_PPC_GOT_TLSGD16_LO: r = R_PPC64_GOT_TLSGD16_LO;
1981 break;
1982 case BFD_RELOC_PPC_GOT_TLSGD16_HI: r = R_PPC64_GOT_TLSGD16_HI;
1983 break;
1984 case BFD_RELOC_PPC_GOT_TLSGD16_HA: r = R_PPC64_GOT_TLSGD16_HA;
1985 break;
1986 case BFD_RELOC_PPC_GOT_TLSLD16: r = R_PPC64_GOT_TLSLD16;
1987 break;
1988 case BFD_RELOC_PPC_GOT_TLSLD16_LO: r = R_PPC64_GOT_TLSLD16_LO;
1989 break;
1990 case BFD_RELOC_PPC_GOT_TLSLD16_HI: r = R_PPC64_GOT_TLSLD16_HI;
1991 break;
1992 case BFD_RELOC_PPC_GOT_TLSLD16_HA: r = R_PPC64_GOT_TLSLD16_HA;
1993 break;
1994 case BFD_RELOC_PPC_GOT_TPREL16: r = R_PPC64_GOT_TPREL16_DS;
1995 break;
1996 case BFD_RELOC_PPC_GOT_TPREL16_LO: r = R_PPC64_GOT_TPREL16_LO_DS;
1997 break;
1998 case BFD_RELOC_PPC_GOT_TPREL16_HI: r = R_PPC64_GOT_TPREL16_HI;
1999 break;
2000 case BFD_RELOC_PPC_GOT_TPREL16_HA: r = R_PPC64_GOT_TPREL16_HA;
2001 break;
2002 case BFD_RELOC_PPC_GOT_DTPREL16: r = R_PPC64_GOT_DTPREL16_DS;
2003 break;
2004 case BFD_RELOC_PPC_GOT_DTPREL16_LO: r = R_PPC64_GOT_DTPREL16_LO_DS;
2005 break;
2006 case BFD_RELOC_PPC_GOT_DTPREL16_HI: r = R_PPC64_GOT_DTPREL16_HI;
2007 break;
2008 case BFD_RELOC_PPC_GOT_DTPREL16_HA: r = R_PPC64_GOT_DTPREL16_HA;
2009 break;
2010 case BFD_RELOC_PPC64_TPREL16_DS: r = R_PPC64_TPREL16_DS;
2011 break;
2012 case BFD_RELOC_PPC64_TPREL16_LO_DS: r = R_PPC64_TPREL16_LO_DS;
2013 break;
2014 case BFD_RELOC_PPC64_TPREL16_HIGHER: r = R_PPC64_TPREL16_HIGHER;
2015 break;
2016 case BFD_RELOC_PPC64_TPREL16_HIGHERA: r = R_PPC64_TPREL16_HIGHERA;
2017 break;
2018 case BFD_RELOC_PPC64_TPREL16_HIGHEST: r = R_PPC64_TPREL16_HIGHEST;
2019 break;
2020 case BFD_RELOC_PPC64_TPREL16_HIGHESTA: r = R_PPC64_TPREL16_HIGHESTA;
2021 break;
2022 case BFD_RELOC_PPC64_DTPREL16_DS: r = R_PPC64_DTPREL16_DS;
2023 break;
2024 case BFD_RELOC_PPC64_DTPREL16_LO_DS: r = R_PPC64_DTPREL16_LO_DS;
2025 break;
2026 case BFD_RELOC_PPC64_DTPREL16_HIGHER: r = R_PPC64_DTPREL16_HIGHER;
2027 break;
2028 case BFD_RELOC_PPC64_DTPREL16_HIGHERA: r = R_PPC64_DTPREL16_HIGHERA;
2029 break;
2030 case BFD_RELOC_PPC64_DTPREL16_HIGHEST: r = R_PPC64_DTPREL16_HIGHEST;
2031 break;
2032 case BFD_RELOC_PPC64_DTPREL16_HIGHESTA: r = R_PPC64_DTPREL16_HIGHESTA;
2033 break;
2034 case BFD_RELOC_VTABLE_INHERIT: r = R_PPC64_GNU_VTINHERIT;
2035 break;
2036 case BFD_RELOC_VTABLE_ENTRY: r = R_PPC64_GNU_VTENTRY;
5bd4f169
AM
2037 break;
2038 }
2039
411e1bfb 2040 return ppc64_elf_howto_table[(int) r];
5bd4f169
AM
2041};
2042
2043/* Set the howto pointer for a PowerPC ELF reloc. */
2044
2045static void
2046ppc64_elf_info_to_howto (abfd, cache_ptr, dst)
2047 bfd *abfd ATTRIBUTE_UNUSED;
2048 arelent *cache_ptr;
947216bf 2049 Elf_Internal_Rela *dst;
5bd4f169 2050{
65f38f15
AM
2051 unsigned int type;
2052
ef60b7ff 2053 /* Initialize howto table if needed. */
5bd4f169 2054 if (!ppc64_elf_howto_table[R_PPC64_ADDR32])
5bd4f169
AM
2055 ppc_howto_init ();
2056
65f38f15
AM
2057 type = ELF64_R_TYPE (dst->r_info);
2058 BFD_ASSERT (type < (sizeof (ppc64_elf_howto_table)
2059 / sizeof (ppc64_elf_howto_table[0])));
2060 cache_ptr->howto = ppc64_elf_howto_table[type];
5bd4f169
AM
2061}
2062
04c9666a 2063/* Handle the R_PPC64_ADDR16_HA and similar relocs. */
5bd4f169
AM
2064
2065static bfd_reloc_status_type
805fc799
AM
2066ppc64_elf_ha_reloc (abfd, reloc_entry, symbol, data,
2067 input_section, output_bfd, error_message)
2068 bfd *abfd;
5bd4f169
AM
2069 arelent *reloc_entry;
2070 asymbol *symbol;
805fc799 2071 PTR data;
5bd4f169
AM
2072 asection *input_section;
2073 bfd *output_bfd;
805fc799 2074 char **error_message;
5bd4f169 2075{
805fc799
AM
2076 /* If this is a relocatable link (output_bfd test tells us), just
2077 call the generic function. Any adjustment will be done at final
2078 link time. */
2079 if (output_bfd != NULL)
cedb70c5 2080 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
805fc799
AM
2081 input_section, output_bfd, error_message);
2082
2083 /* Adjust the addend for sign extension of the low 16 bits.
2084 We won't actually be using the low 16 bits, so trashing them
2085 doesn't matter. */
2086 reloc_entry->addend += 0x8000;
2087 return bfd_reloc_continue;
2088}
5bd4f169 2089
805fc799
AM
2090static bfd_reloc_status_type
2091ppc64_elf_brtaken_reloc (abfd, reloc_entry, symbol, data,
2092 input_section, output_bfd, error_message)
2093 bfd *abfd;
2094 arelent *reloc_entry;
2095 asymbol *symbol;
2096 PTR data;
2097 asection *input_section;
2098 bfd *output_bfd;
2099 char **error_message;
2100{
2101 long insn;
04c9666a 2102 enum elf_ppc64_reloc_type r_type;
805fc799
AM
2103 bfd_size_type octets;
2104 /* Disabled until we sort out how ld should choose 'y' vs 'at'. */
b34976b6 2105 bfd_boolean is_power4 = FALSE;
805fc799
AM
2106
2107 /* If this is a relocatable link (output_bfd test tells us), just
2108 call the generic function. Any adjustment will be done at final
2109 link time. */
5bd4f169 2110 if (output_bfd != NULL)
cedb70c5 2111 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
805fc799
AM
2112 input_section, output_bfd, error_message);
2113
2114 octets = reloc_entry->address * bfd_octets_per_byte (abfd);
2115 insn = bfd_get_32 (abfd, (bfd_byte *) data + octets);
2116 insn &= ~(0x01 << 21);
04c9666a 2117 r_type = (enum elf_ppc64_reloc_type) reloc_entry->howto->type;
805fc799
AM
2118 if (r_type == R_PPC64_ADDR14_BRTAKEN
2119 || r_type == R_PPC64_REL14_BRTAKEN)
cedb70c5 2120 insn |= 0x01 << 21; /* 'y' or 't' bit, lowest bit of BO field. */
805fc799
AM
2121
2122 if (is_power4)
5bd4f169 2123 {
805fc799
AM
2124 /* Set 'a' bit. This is 0b00010 in BO field for branch
2125 on CR(BI) insns (BO == 001at or 011at), and 0b01000
2126 for branch on CTR insns (BO == 1a00t or 1a01t). */
2127 if ((insn & (0x14 << 21)) == (0x04 << 21))
2128 insn |= 0x02 << 21;
2129 else if ((insn & (0x14 << 21)) == (0x10 << 21))
2130 insn |= 0x08 << 21;
2131 else
2132 return bfd_reloc_continue;
5bd4f169 2133 }
805fc799
AM
2134 else
2135 {
2136 bfd_vma target = 0;
2137 bfd_vma from;
5bd4f169 2138
805fc799
AM
2139 if (!bfd_is_com_section (symbol->section))
2140 target = symbol->value;
2141 target += symbol->section->output_section->vma;
2142 target += symbol->section->output_offset;
2143 target += reloc_entry->addend;
5bd4f169 2144
805fc799
AM
2145 from = (reloc_entry->address
2146 + input_section->output_offset
2147 + input_section->output_section->vma);
5bd4f169 2148
805fc799
AM
2149 /* Invert 'y' bit if not the default. */
2150 if ((bfd_signed_vma) (target - from) < 0)
2151 insn ^= 0x01 << 21;
2152 }
2153 bfd_put_32 (abfd, (bfd_vma) insn, (bfd_byte *) data + octets);
2154 return bfd_reloc_continue;
2155}
5bd4f169 2156
805fc799
AM
2157static bfd_reloc_status_type
2158ppc64_elf_sectoff_reloc (abfd, reloc_entry, symbol, data,
2159 input_section, output_bfd, error_message)
2160 bfd *abfd;
2161 arelent *reloc_entry;
2162 asymbol *symbol;
2163 PTR data;
2164 asection *input_section;
2165 bfd *output_bfd;
2166 char **error_message;
2167{
2168 /* If this is a relocatable link (output_bfd test tells us), just
2169 call the generic function. Any adjustment will be done at final
2170 link time. */
2171 if (output_bfd != NULL)
cedb70c5 2172 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
805fc799 2173 input_section, output_bfd, error_message);
5bd4f169 2174
805fc799
AM
2175 /* Subtract the symbol section base address. */
2176 reloc_entry->addend -= symbol->section->output_section->vma;
5bd4f169
AM
2177 return bfd_reloc_continue;
2178}
2179
805fc799
AM
2180static bfd_reloc_status_type
2181ppc64_elf_sectoff_ha_reloc (abfd, reloc_entry, symbol, data,
2182 input_section, output_bfd, error_message)
2183 bfd *abfd;
2184 arelent *reloc_entry;
2185 asymbol *symbol;
2186 PTR data;
2187 asection *input_section;
2188 bfd *output_bfd;
2189 char **error_message;
2190{
2191 /* If this is a relocatable link (output_bfd test tells us), just
2192 call the generic function. Any adjustment will be done at final
2193 link time. */
2194 if (output_bfd != NULL)
cedb70c5 2195 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
805fc799
AM
2196 input_section, output_bfd, error_message);
2197
2198 /* Subtract the symbol section base address. */
2199 reloc_entry->addend -= symbol->section->output_section->vma;
2200
2201 /* Adjust the addend for sign extension of the low 16 bits. */
2202 reloc_entry->addend += 0x8000;
2203 return bfd_reloc_continue;
2204}
2205
2206static bfd_reloc_status_type
2207ppc64_elf_toc_reloc (abfd, reloc_entry, symbol, data,
2208 input_section, output_bfd, error_message)
2209 bfd *abfd;
2210 arelent *reloc_entry;
2211 asymbol *symbol;
2212 PTR data;
2213 asection *input_section;
2214 bfd *output_bfd;
2215 char **error_message;
2216{
2217 bfd_vma TOCstart;
2218
2219 /* If this is a relocatable link (output_bfd test tells us), just
2220 call the generic function. Any adjustment will be done at final
2221 link time. */
2222 if (output_bfd != NULL)
cedb70c5 2223 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
805fc799
AM
2224 input_section, output_bfd, error_message);
2225
2226 TOCstart = _bfd_get_gp_value (input_section->output_section->owner);
2227 if (TOCstart == 0)
2228 TOCstart = ppc64_elf_toc (input_section->output_section->owner);
2229
2230 /* Subtract the TOC base address. */
2231 reloc_entry->addend -= TOCstart + TOC_BASE_OFF;
2232 return bfd_reloc_continue;
2233}
2234
2235static bfd_reloc_status_type
2236ppc64_elf_toc_ha_reloc (abfd, reloc_entry, symbol, data,
2237 input_section, output_bfd, error_message)
2238 bfd *abfd;
2239 arelent *reloc_entry;
2240 asymbol *symbol;
2241 PTR data;
2242 asection *input_section;
2243 bfd *output_bfd;
2244 char **error_message;
2245{
2246 bfd_vma TOCstart;
2247
2248 /* If this is a relocatable link (output_bfd test tells us), just
2249 call the generic function. Any adjustment will be done at final
2250 link time. */
2251 if (output_bfd != NULL)
cedb70c5 2252 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
805fc799
AM
2253 input_section, output_bfd, error_message);
2254
2255 TOCstart = _bfd_get_gp_value (input_section->output_section->owner);
2256 if (TOCstart == 0)
2257 TOCstart = ppc64_elf_toc (input_section->output_section->owner);
2258
2259 /* Subtract the TOC base address. */
2260 reloc_entry->addend -= TOCstart + TOC_BASE_OFF;
2261
2262 /* Adjust the addend for sign extension of the low 16 bits. */
2263 reloc_entry->addend += 0x8000;
2264 return bfd_reloc_continue;
2265}
2266
2267static bfd_reloc_status_type
2268ppc64_elf_toc64_reloc (abfd, reloc_entry, symbol, data,
2269 input_section, output_bfd, error_message)
2270 bfd *abfd;
2271 arelent *reloc_entry;
2272 asymbol *symbol;
2273 PTR data;
2274 asection *input_section;
2275 bfd *output_bfd;
2276 char **error_message;
2277{
2278 bfd_vma TOCstart;
2279 bfd_size_type octets;
2280
2281 /* If this is a relocatable link (output_bfd test tells us), just
2282 call the generic function. Any adjustment will be done at final
2283 link time. */
2284 if (output_bfd != NULL)
cedb70c5 2285 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
805fc799
AM
2286 input_section, output_bfd, error_message);
2287
2288 TOCstart = _bfd_get_gp_value (input_section->output_section->owner);
2289 if (TOCstart == 0)
2290 TOCstart = ppc64_elf_toc (input_section->output_section->owner);
2291
2292 octets = reloc_entry->address * bfd_octets_per_byte (abfd);
2293 bfd_put_64 (abfd, TOCstart + TOC_BASE_OFF, (bfd_byte *) data + octets);
2294 return bfd_reloc_ok;
2295}
2296
2297static bfd_reloc_status_type
2298ppc64_elf_unhandled_reloc (abfd, reloc_entry, symbol, data,
2299 input_section, output_bfd, error_message)
2300 bfd *abfd;
2301 arelent *reloc_entry;
2302 asymbol *symbol;
2303 PTR data;
2304 asection *input_section;
2305 bfd *output_bfd;
2306 char **error_message;
2307{
2308 /* If this is a relocatable link (output_bfd test tells us), just
2309 call the generic function. Any adjustment will be done at final
2310 link time. */
2311 if (output_bfd != NULL)
cedb70c5 2312 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
805fc799
AM
2313 input_section, output_bfd, error_message);
2314
2315 if (error_message != NULL)
2316 {
2317 static char buf[60];
2318 sprintf (buf, "generic linker can't handle %s",
2319 reloc_entry->howto->name);
2320 *error_message = buf;
2321 }
2322 return bfd_reloc_dangerous;
2323}
2324
feee612b
AM
2325/* Fix bad default arch selected for a 64 bit input bfd when the
2326 default is 32 bit. */
2327
b34976b6 2328static bfd_boolean
feee612b
AM
2329ppc64_elf_object_p (abfd)
2330 bfd *abfd;
2331{
2332 if (abfd->arch_info->the_default && abfd->arch_info->bits_per_word == 32)
2333 {
2334 Elf_Internal_Ehdr *i_ehdr = elf_elfheader (abfd);
2335
2336 if (i_ehdr->e_ident[EI_CLASS] == ELFCLASS64)
2337 {
2338 /* Relies on arch after 32 bit default being 64 bit default. */
2339 abfd->arch_info = abfd->arch_info->next;
2340 BFD_ASSERT (abfd->arch_info->bits_per_word == 64);
2341 }
2342 }
b34976b6 2343 return TRUE;
feee612b
AM
2344}
2345
5bd4f169
AM
2346/* Merge backend specific data from an object file to the output
2347 object file when linking. */
2f6d9989 2348
b34976b6 2349static bfd_boolean
5bd4f169
AM
2350ppc64_elf_merge_private_bfd_data (ibfd, obfd)
2351 bfd *ibfd;
2352 bfd *obfd;
2353{
5bd4f169
AM
2354 /* Check if we have the same endianess. */
2355 if (ibfd->xvec->byteorder != obfd->xvec->byteorder
87e226ce 2356 && ibfd->xvec->byteorder != BFD_ENDIAN_UNKNOWN
5bd4f169
AM
2357 && obfd->xvec->byteorder != BFD_ENDIAN_UNKNOWN)
2358 {
2359 const char *msg;
2360
2361 if (bfd_big_endian (ibfd))
2362 msg = _("%s: compiled for a big endian system and target is little endian");
2363 else
2364 msg = _("%s: compiled for a little endian system and target is big endian");
2365
8f615d07 2366 (*_bfd_error_handler) (msg, bfd_archive_filename (ibfd));
5bd4f169
AM
2367
2368 bfd_set_error (bfd_error_wrong_format);
b34976b6 2369 return FALSE;
5bd4f169
AM
2370 }
2371
b34976b6 2372 return TRUE;
5bd4f169 2373}
f0abc2a1
AM
2374
2375struct _ppc64_elf_section_data
2376{
2377 struct bfd_elf_section_data elf;
411e1bfb
AM
2378
2379 /* An array with one entry for each opd function descriptor. */
f0abc2a1
AM
2380 union
2381 {
411e1bfb 2382 /* Points to the function code section for local opd entries. */
f0abc2a1 2383 asection **func_sec;
411e1bfb 2384 /* After editing .opd, adjust references to opd local syms. */
f0abc2a1
AM
2385 long *adjust;
2386 } opd;
411e1bfb
AM
2387
2388 /* An array for toc sections, indexed by offset/8.
2389 Specifies the relocation symbol index used at a given toc offset. */
2390 unsigned *t_symndx;
f0abc2a1
AM
2391};
2392
2393#define ppc64_elf_section_data(sec) \
411e1bfb 2394 ((struct _ppc64_elf_section_data *) elf_section_data (sec))
f0abc2a1
AM
2395
2396static bfd_boolean
2397ppc64_elf_new_section_hook (abfd, sec)
2398 bfd *abfd;
2399 asection *sec;
2400{
2401 struct _ppc64_elf_section_data *sdata;
2402 bfd_size_type amt = sizeof (*sdata);
2403
2404 sdata = (struct _ppc64_elf_section_data *) bfd_zalloc (abfd, amt);
2405 if (sdata == NULL)
2406 return FALSE;
2407 sec->used_by_bfd = (PTR) sdata;
2408
2409 return _bfd_elf_new_section_hook (abfd, sec);
2410}
5bd4f169 2411\f
65f38f15
AM
2412/* The following functions are specific to the ELF linker, while
2413 functions above are used generally. Those named ppc64_elf_* are
2414 called by the main ELF linker code. They appear in this file more
2415 or less in the order in which they are called. eg.
2416 ppc64_elf_check_relocs is called early in the link process,
2417 ppc64_elf_finish_dynamic_sections is one of the last functions
e86ce104
AM
2418 called.
2419
2420 PowerPC64-ELF uses a similar scheme to PowerPC64-XCOFF in that
2421 functions have both a function code symbol and a function descriptor
2422 symbol. A call to foo in a relocatable object file looks like:
2423
2424 . .text
2425 . x:
2426 . bl .foo
2427 . nop
2428
2429 The function definition in another object file might be:
2430
2431 . .section .opd
2432 . foo: .quad .foo
2433 . .quad .TOC.@tocbase
2434 . .quad 0
2435 .
2436 . .text
2437 . .foo: blr
2438
2439 When the linker resolves the call during a static link, the branch
2440 unsurprisingly just goes to .foo and the .opd information is unused.
2441 If the function definition is in a shared library, things are a little
2442 different: The call goes via a plt call stub, the opd information gets
2443 copied to the plt, and the linker patches the nop.
2444
2445 . x:
2446 . bl .foo_stub
2447 . ld 2,40(1)
2448 .
2449 .
2450 . .foo_stub:
2451 . addis 12,2,Lfoo@toc@ha # in practice, the call stub
411e1bfb 2452 . addi 12,12,Lfoo@toc@l # is slightly optimized, but
e86ce104
AM
2453 . std 2,40(1) # this is the general idea
2454 . ld 11,0(12)
2455 . ld 2,8(12)
2456 . mtctr 11
2457 . ld 11,16(12)
2458 . bctr
2459 .
2460 . .section .plt
2461 . Lfoo: reloc (R_PPC64_JMP_SLOT, foo)
2462
2463 The "reloc ()" notation is supposed to indicate that the linker emits
2464 an R_PPC64_JMP_SLOT reloc against foo. The dynamic linker does the opd
2465 copying.
2466
2467 What are the difficulties here? Well, firstly, the relocations
2468 examined by the linker in check_relocs are against the function code
2469 sym .foo, while the dynamic relocation in the plt is emitted against
2470 the function descriptor symbol, foo. Somewhere along the line, we need
2471 to carefully copy dynamic link information from one symbol to the other.
2472 Secondly, the generic part of the elf linker will make .foo a dynamic
2473 symbol as is normal for most other backends. We need foo dynamic
2474 instead, at least for an application final link. However, when
2475 creating a shared library containing foo, we need to have both symbols
2476 dynamic so that references to .foo are satisfied during the early
2477 stages of linking. Otherwise the linker might decide to pull in a
41bd81ab 2478 definition from some other object, eg. a static library. */
65f38f15
AM
2479
2480/* The linker needs to keep track of the number of relocs that it
2481 decides to copy as dynamic relocs in check_relocs for each symbol.
2482 This is so that it can later discard them if they are found to be
2483 unnecessary. We store the information in a field extending the
2484 regular ELF linker hash table. */
2485
2486struct ppc_dyn_relocs
2487{
2488 struct ppc_dyn_relocs *next;
2489
2490 /* The input section of the reloc. */
2491 asection *sec;
2492
2493 /* Total number of relocs copied for the input section. */
2494 bfd_size_type count;
2495
2496 /* Number of pc-relative relocs copied for the input section. */
2497 bfd_size_type pc_count;
2498};
2499
411e1bfb
AM
2500/* Track GOT entries needed for a given symbol. We might need more
2501 than one got entry per symbol. */
2502struct got_entry
2503{
2504 struct got_entry *next;
2505
e7b938ca 2506 /* The symbol addend that we'll be placing in the GOT. */
411e1bfb
AM
2507 bfd_vma addend;
2508
e7b938ca 2509 /* Reference count until size_dynamic_sections, GOT offset thereafter. */
411e1bfb
AM
2510 union
2511 {
2512 bfd_signed_vma refcount;
2513 bfd_vma offset;
2514 } got;
2515
e7b938ca
AM
2516 /* Zero for non-tls entries, or TLS_TLS and one of TLS_GD, TLS_LD,
2517 TLS_TPREL or TLS_DTPREL for tls entries. */
411e1bfb
AM
2518 char tls_type;
2519};
2520
2521/* The same for PLT. */
2522struct plt_entry
2523{
2524 struct plt_entry *next;
2525
2526 bfd_vma addend;
2527
2528 union
2529 {
2530 bfd_signed_vma refcount;
2531 bfd_vma offset;
2532 } plt;
2533};
2534
65f38f15 2535/* Of those relocs that might be copied as dynamic relocs, this macro
58ac9f71
AM
2536 selects those that must be copied when linking a shared library,
2537 even when the symbol is local. */
65f38f15 2538
411e1bfb 2539#define MUST_BE_DYN_RELOC(RTYPE) \
805fc799
AM
2540 ((RTYPE) != R_PPC64_REL32 \
2541 && (RTYPE) != R_PPC64_REL64 \
04c9666a 2542 && (RTYPE) != R_PPC64_REL30)
65f38f15 2543
f4656909
AM
2544/* If ELIMINATE_COPY_RELOCS is non-zero, the linker will try to avoid
2545 copying dynamic variables from a shared lib into an app's dynbss
2546 section, and instead use a dynamic relocation to point into the
2547 shared lib. */
a23b6845 2548#define ELIMINATE_COPY_RELOCS 1
f4656909 2549
721956f4
AM
2550/* Section name for stubs is the associated section name plus this
2551 string. */
2552#define STUB_SUFFIX ".stub"
2553
2554/* Linker stubs.
2555 ppc_stub_long_branch:
2556 Used when a 14 bit branch (or even a 24 bit branch) can't reach its
2557 destination, but a 24 bit branch in a stub section will reach.
2558 . b dest
2559
2560 ppc_stub_plt_branch:
2561 Similar to the above, but a 24 bit branch in the stub section won't
2562 reach its destination.
87e226ce
AM
2563 . addis %r12,%r2,xxx@toc@ha
2564 . ld %r11,xxx@toc@l(%r12)
721956f4
AM
2565 . mtctr %r11
2566 . bctr
2567
2568 ppc_stub_plt_call:
2569 Used to call a function in a shared library.
87e226ce 2570 . addis %r12,%r2,xxx@toc@ha
721956f4 2571 . std %r2,40(%r1)
87e226ce
AM
2572 . ld %r11,xxx+0@toc@l(%r12)
2573 . ld %r2,xxx+8@toc@l(%r12)
721956f4 2574 . mtctr %r11
87e226ce 2575 . ld %r11,xxx+16@toc@l(%r12)
721956f4
AM
2576 . bctr
2577*/
2578
2579enum ppc_stub_type {
2580 ppc_stub_none,
2581 ppc_stub_long_branch,
2582 ppc_stub_plt_branch,
2583 ppc_stub_plt_call
2584};
2585
2586struct ppc_stub_hash_entry {
2587
2588 /* Base hash table entry structure. */
2589 struct bfd_hash_entry root;
2590
2591 /* The stub section. */
2592 asection *stub_sec;
2593
2594 /* Offset within stub_sec of the beginning of this stub. */
2595 bfd_vma stub_offset;
2596
2597 /* Given the symbol's value and its section we can determine its final
2598 value when building the stubs (so the stub knows where to jump. */
2599 bfd_vma target_value;
2600 asection *target_section;
2601
2602 enum ppc_stub_type stub_type;
2603
2604 /* The symbol table entry, if any, that this was derived from. */
2605 struct ppc_link_hash_entry *h;
2606
411e1bfb
AM
2607 /* And the reloc addend that this was derived from. */
2608 bfd_vma addend;
2609
721956f4
AM
2610 /* Where this stub is being called from, or, in the case of combined
2611 stub sections, the first input section in the group. */
2612 asection *id_sec;
2613};
2614
2615struct ppc_branch_hash_entry {
2616
2617 /* Base hash table entry structure. */
2618 struct bfd_hash_entry root;
2619
2620 /* Offset within .branch_lt. */
2621 unsigned int offset;
2622
2623 /* Generation marker. */
2624 unsigned int iter;
2625};
65f38f15
AM
2626
2627struct ppc_link_hash_entry
2628{
2629 struct elf_link_hash_entry elf;
2630
721956f4
AM
2631 /* A pointer to the most recently used stub hash entry against this
2632 symbol. */
2633 struct ppc_stub_hash_entry *stub_cache;
2634
65f38f15
AM
2635 /* Track dynamic relocs copied for this symbol. */
2636 struct ppc_dyn_relocs *dyn_relocs;
e86ce104 2637
721956f4
AM
2638 /* Link between function code and descriptor symbols. */
2639 struct elf_link_hash_entry *oh;
2640
e86ce104
AM
2641 /* Flag function code and descriptor symbols. */
2642 unsigned int is_func:1;
2643 unsigned int is_func_descriptor:1;
1e2f5b6e 2644 unsigned int is_entry:1;
411e1bfb
AM
2645
2646 /* Contexts in which symbol is used in the GOT (or TOC).
e7b938ca
AM
2647 TLS_GD .. TLS_EXPLICIT bits are or'd into the mask as the
2648 corresponding relocs are encountered during check_relocs.
2649 tls_optimize clears TLS_GD .. TLS_TPREL when optimizing to
2650 indicate the corresponding GOT entry type is not needed.
2651 tls_optimize may also set TLS_TPRELGD when a GD reloc turns into
2652 a TPREL one. We use a separate flag rather than setting TPREL
2653 just for convenience in distinguishing the two cases. */
2654#define TLS_GD 1 /* GD reloc. */
2655#define TLS_LD 2 /* LD reloc. */
2656#define TLS_TPREL 4 /* TPREL reloc, => IE. */
2657#define TLS_DTPREL 8 /* DTPREL reloc, => LD. */
2658#define TLS_TLS 16 /* Any TLS reloc. */
2659#define TLS_EXPLICIT 32 /* Marks TOC section TLS relocs. */
2660#define TLS_TPRELGD 64 /* TPREL reloc resulting from GD->IE. */
2661 char tls_mask;
65f38f15
AM
2662};
2663
2664/* ppc64 ELF linker hash table. */
2665
2666struct ppc_link_hash_table
2667{
2668 struct elf_link_hash_table elf;
2669
721956f4
AM
2670 /* The stub hash table. */
2671 struct bfd_hash_table stub_hash_table;
2672
2673 /* Another hash table for plt_branch stubs. */
2674 struct bfd_hash_table branch_hash_table;
2675
2676 /* Linker stub bfd. */
2677 bfd *stub_bfd;
2678
2679 /* Linker call-backs. */
2680 asection * (*add_stub_section) PARAMS ((const char *, asection *));
2681 void (*layout_sections_again) PARAMS ((void));
2682
2683 /* Array to keep track of which stub sections have been created, and
2684 information on stub grouping. */
2685 struct map_stub {
2686 /* This is the section to which stubs in the group will be attached. */
2687 asection *link_sec;
2688 /* The stub section. */
2689 asection *stub_sec;
2690 } *stub_group;
2691
2692 /* Assorted information used by ppc64_elf_size_stubs. */
721956f4
AM
2693 int top_index;
2694 asection **input_list;
721956f4 2695
65f38f15
AM
2696 /* Short-cuts to get to dynamic linker sections. */
2697 asection *sgot;
2698 asection *srelgot;
2699 asection *splt;
2700 asection *srelplt;
2701 asection *sdynbss;
2702 asection *srelbss;
2703 asection *sglink;
82bd7b59 2704 asection *sfpr;
721956f4
AM
2705 asection *sbrlt;
2706 asection *srelbrlt;
ec338859 2707
411e1bfb
AM
2708 /* Short-cut to first output tls section. */
2709 asection *tls_sec;
2710
2711 /* Shortcut to .__tls_get_addr. */
2712 struct elf_link_hash_entry *tls_get_addr;
2713
2714 /* TLS local dynamic got entry handling. */
2715 union {
2716 bfd_signed_vma refcount;
2717 bfd_vma offset;
2718 } tlsld_got;
2719
5d1634d7 2720 /* Set on error. */
721956f4
AM
2721 unsigned int stub_error;
2722
2723 /* Flag set when small branches are detected. Used to
2724 select suitable defaults for the stub group size. */
2725 unsigned int has_14bit_branch;
2726
805fc799
AM
2727 /* Set if we detect a reference undefined weak symbol. */
2728 unsigned int have_undefweak;
2729
721956f4
AM
2730 /* Incremented every time we size stubs. */
2731 unsigned int stub_iteration;
5d1634d7 2732
ec338859
AM
2733 /* Small local sym to section mapping cache. */
2734 struct sym_sec_cache sym_sec;
65f38f15
AM
2735};
2736
721956f4
AM
2737static struct bfd_hash_entry *stub_hash_newfunc
2738 PARAMS ((struct bfd_hash_entry *, struct bfd_hash_table *, const char *));
2739static struct bfd_hash_entry *branch_hash_newfunc
2740 PARAMS ((struct bfd_hash_entry *, struct bfd_hash_table *, const char *));
2741static struct bfd_hash_entry *link_hash_newfunc
2742 PARAMS ((struct bfd_hash_entry *, struct bfd_hash_table *, const char *));
2743static struct bfd_link_hash_table *ppc64_elf_link_hash_table_create
2744 PARAMS ((bfd *));
2745static void ppc64_elf_link_hash_table_free
2746 PARAMS ((struct bfd_link_hash_table *));
2747static char *ppc_stub_name
2748 PARAMS ((const asection *, const asection *,
2749 const struct ppc_link_hash_entry *, const Elf_Internal_Rela *));
2750static struct ppc_stub_hash_entry *ppc_get_stub_entry
2751 PARAMS ((const asection *, const asection *, struct elf_link_hash_entry *,
2752 const Elf_Internal_Rela *, struct ppc_link_hash_table *));
2753static struct ppc_stub_hash_entry *ppc_add_stub
2754 PARAMS ((const char *, asection *, struct ppc_link_hash_table *));
b34976b6 2755static bfd_boolean create_linkage_sections
721956f4 2756 PARAMS ((bfd *, struct bfd_link_info *));
b34976b6 2757static bfd_boolean create_got_section
721956f4 2758 PARAMS ((bfd *, struct bfd_link_info *));
b34976b6 2759static bfd_boolean ppc64_elf_create_dynamic_sections
721956f4
AM
2760 PARAMS ((bfd *, struct bfd_link_info *));
2761static void ppc64_elf_copy_indirect_symbol
b48fa14c
AM
2762 PARAMS ((struct elf_backend_data *, struct elf_link_hash_entry *,
2763 struct elf_link_hash_entry *));
411e1bfb
AM
2764static bfd_boolean update_local_sym_info
2765 PARAMS ((bfd *, Elf_Internal_Shdr *, unsigned long, bfd_vma, int));
2766static bfd_boolean update_plt_info
2767 PARAMS ((bfd *, struct ppc_link_hash_entry *, bfd_vma));
b34976b6 2768static bfd_boolean ppc64_elf_check_relocs
721956f4
AM
2769 PARAMS ((bfd *, struct bfd_link_info *, asection *,
2770 const Elf_Internal_Rela *));
2771static asection * ppc64_elf_gc_mark_hook
1e2f5b6e
AM
2772 PARAMS ((asection *, struct bfd_link_info *, Elf_Internal_Rela *,
2773 struct elf_link_hash_entry *, Elf_Internal_Sym *));
b34976b6 2774static bfd_boolean ppc64_elf_gc_sweep_hook
1e2f5b6e
AM
2775 PARAMS ((bfd *, struct bfd_link_info *, asection *,
2776 const Elf_Internal_Rela *));
b34976b6 2777static bfd_boolean func_desc_adjust
721956f4 2778 PARAMS ((struct elf_link_hash_entry *, PTR));
b34976b6 2779static bfd_boolean ppc64_elf_func_desc_adjust
721956f4 2780 PARAMS ((bfd *, struct bfd_link_info *));
b34976b6 2781static bfd_boolean ppc64_elf_adjust_dynamic_symbol
721956f4
AM
2782 PARAMS ((struct bfd_link_info *, struct elf_link_hash_entry *));
2783static void ppc64_elf_hide_symbol
b34976b6 2784 PARAMS ((struct bfd_link_info *, struct elf_link_hash_entry *, bfd_boolean));
411e1bfb
AM
2785static bfd_boolean get_sym_h
2786 PARAMS ((struct elf_link_hash_entry **, Elf_Internal_Sym **, asection **,
2787 char **, Elf_Internal_Sym **, unsigned long, bfd *));
e7b938ca 2788static int get_tls_mask
411e1bfb 2789 PARAMS ((char **, Elf_Internal_Sym **, const Elf_Internal_Rela *, bfd *));
b34976b6 2790static bfd_boolean allocate_dynrelocs
721956f4 2791 PARAMS ((struct elf_link_hash_entry *, PTR));
b34976b6 2792static bfd_boolean readonly_dynrelocs
721956f4
AM
2793 PARAMS ((struct elf_link_hash_entry *, PTR));
2794static enum elf_reloc_type_class ppc64_elf_reloc_type_class
2795 PARAMS ((const Elf_Internal_Rela *));
b34976b6 2796static bfd_boolean ppc64_elf_size_dynamic_sections
721956f4 2797 PARAMS ((bfd *, struct bfd_link_info *));
411e1bfb 2798static enum ppc_stub_type ppc_type_of_stub
721956f4
AM
2799 PARAMS ((asection *, const Elf_Internal_Rela *,
2800 struct ppc_link_hash_entry **, bfd_vma));
2801static bfd_byte *build_plt_stub
2802 PARAMS ((bfd *, bfd_byte *, int, int));
b34976b6 2803static bfd_boolean ppc_build_one_stub
721956f4 2804 PARAMS ((struct bfd_hash_entry *, PTR));
b34976b6 2805static bfd_boolean ppc_size_one_stub
721956f4
AM
2806 PARAMS ((struct bfd_hash_entry *, PTR));
2807static void group_sections
b34976b6
AM
2808 PARAMS ((struct ppc_link_hash_table *, bfd_size_type, bfd_boolean));
2809static bfd_boolean ppc64_elf_relocate_section
721956f4
AM
2810 PARAMS ((bfd *, struct bfd_link_info *info, bfd *, asection *, bfd_byte *,
2811 Elf_Internal_Rela *relocs, Elf_Internal_Sym *local_syms,
2812 asection **));
b34976b6 2813static bfd_boolean ppc64_elf_finish_dynamic_symbol
721956f4
AM
2814 PARAMS ((bfd *, struct bfd_link_info *, struct elf_link_hash_entry *,
2815 Elf_Internal_Sym *));
b34976b6 2816static bfd_boolean ppc64_elf_finish_dynamic_sections
721956f4
AM
2817 PARAMS ((bfd *, struct bfd_link_info *));
2818
65f38f15
AM
2819/* Get the ppc64 ELF linker hash table from a link_info structure. */
2820
2821#define ppc_hash_table(p) \
2822 ((struct ppc_link_hash_table *) ((p)->hash))
2823
721956f4
AM
2824#define ppc_stub_hash_lookup(table, string, create, copy) \
2825 ((struct ppc_stub_hash_entry *) \
2826 bfd_hash_lookup ((table), (string), (create), (copy)))
2827
2828#define ppc_branch_hash_lookup(table, string, create, copy) \
2829 ((struct ppc_branch_hash_entry *) \
2830 bfd_hash_lookup ((table), (string), (create), (copy)))
2831
2832/* Create an entry in the stub hash table. */
2833
2834static struct bfd_hash_entry *
2835stub_hash_newfunc (entry, table, string)
2836 struct bfd_hash_entry *entry;
2837 struct bfd_hash_table *table;
2838 const char *string;
2839{
2840 /* Allocate the structure if it has not already been allocated by a
2841 subclass. */
2842 if (entry == NULL)
2843 {
2844 entry = bfd_hash_allocate (table, sizeof (struct ppc_stub_hash_entry));
2845 if (entry == NULL)
2846 return entry;
2847 }
2848
2849 /* Call the allocation method of the superclass. */
2850 entry = bfd_hash_newfunc (entry, table, string);
2851 if (entry != NULL)
2852 {
2853 struct ppc_stub_hash_entry *eh;
2854
2855 /* Initialize the local fields. */
2856 eh = (struct ppc_stub_hash_entry *) entry;
2857 eh->stub_sec = NULL;
2858 eh->stub_offset = 0;
2859 eh->target_value = 0;
2860 eh->target_section = NULL;
2861 eh->stub_type = ppc_stub_none;
2862 eh->h = NULL;
2863 eh->id_sec = NULL;
2864 }
2865
2866 return entry;
2867}
2868
2869/* Create an entry in the branch hash table. */
2870
2871static struct bfd_hash_entry *
2872branch_hash_newfunc (entry, table, string)
2873 struct bfd_hash_entry *entry;
2874 struct bfd_hash_table *table;
2875 const char *string;
2876{
2877 /* Allocate the structure if it has not already been allocated by a
2878 subclass. */
2879 if (entry == NULL)
2880 {
2881 entry = bfd_hash_allocate (table, sizeof (struct ppc_branch_hash_entry));
2882 if (entry == NULL)
2883 return entry;
2884 }
2885
2886 /* Call the allocation method of the superclass. */
2887 entry = bfd_hash_newfunc (entry, table, string);
2888 if (entry != NULL)
2889 {
2890 struct ppc_branch_hash_entry *eh;
2891
2892 /* Initialize the local fields. */
2893 eh = (struct ppc_branch_hash_entry *) entry;
2894 eh->offset = 0;
2895 eh->iter = 0;
2896 }
2897
2898 return entry;
2899}
2900
65f38f15
AM
2901/* Create an entry in a ppc64 ELF linker hash table. */
2902
2903static struct bfd_hash_entry *
2904link_hash_newfunc (entry, table, string)
2905 struct bfd_hash_entry *entry;
2906 struct bfd_hash_table *table;
2907 const char *string;
2908{
2909 /* Allocate the structure if it has not already been allocated by a
2910 subclass. */
2911 if (entry == NULL)
2912 {
2913 entry = bfd_hash_allocate (table, sizeof (struct ppc_link_hash_entry));
2914 if (entry == NULL)
2915 return entry;
2916 }
2917
2918 /* Call the allocation method of the superclass. */
2919 entry = _bfd_elf_link_hash_newfunc (entry, table, string);
2920 if (entry != NULL)
2921 {
2922 struct ppc_link_hash_entry *eh = (struct ppc_link_hash_entry *) entry;
2923
721956f4 2924 eh->stub_cache = NULL;
65f38f15 2925 eh->dyn_relocs = NULL;
721956f4 2926 eh->oh = NULL;
e86ce104
AM
2927 eh->is_func = 0;
2928 eh->is_func_descriptor = 0;
1e2f5b6e 2929 eh->is_entry = 0;
e7b938ca 2930 eh->tls_mask = 0;
65f38f15
AM
2931 }
2932
2933 return entry;
2934}
2935
2936/* Create a ppc64 ELF linker hash table. */
2937
2938static struct bfd_link_hash_table *
2939ppc64_elf_link_hash_table_create (abfd)
2940 bfd *abfd;
2941{
2942 struct ppc_link_hash_table *htab;
2943 bfd_size_type amt = sizeof (struct ppc_link_hash_table);
2944
e2d34d7d 2945 htab = (struct ppc_link_hash_table *) bfd_malloc (amt);
65f38f15
AM
2946 if (htab == NULL)
2947 return NULL;
2948
2949 if (! _bfd_elf_link_hash_table_init (&htab->elf, abfd, link_hash_newfunc))
2950 {
e2d34d7d 2951 free (htab);
65f38f15
AM
2952 return NULL;
2953 }
2954
721956f4
AM
2955 /* Init the stub hash table too. */
2956 if (!bfd_hash_table_init (&htab->stub_hash_table, stub_hash_newfunc))
2957 return NULL;
2958
2959 /* And the branch hash table. */
2960 if (!bfd_hash_table_init (&htab->branch_hash_table, branch_hash_newfunc))
2961 return NULL;
2962
2963 htab->stub_bfd = NULL;
2964 htab->add_stub_section = NULL;
2965 htab->layout_sections_again = NULL;
2966 htab->stub_group = NULL;
65f38f15
AM
2967 htab->sgot = NULL;
2968 htab->srelgot = NULL;
2969 htab->splt = NULL;
2970 htab->srelplt = NULL;
2971 htab->sdynbss = NULL;
2972 htab->srelbss = NULL;
2973 htab->sglink = NULL;
82bd7b59 2974 htab->sfpr = NULL;
721956f4
AM
2975 htab->sbrlt = NULL;
2976 htab->srelbrlt = NULL;
411e1bfb 2977 htab->tls_sec = NULL;
58ac9f71 2978 htab->tls_get_addr = NULL;
411e1bfb 2979 htab->tlsld_got.refcount = 0;
721956f4
AM
2980 htab->stub_error = 0;
2981 htab->has_14bit_branch = 0;
805fc799 2982 htab->have_undefweak = 0;
721956f4 2983 htab->stub_iteration = 0;
ec338859 2984 htab->sym_sec.abfd = NULL;
951fd09b
AM
2985 /* Initializing two fields of the union is just cosmetic. We really
2986 only care about glist, but when compiled on a 32-bit host the
2987 bfd_vma fields are larger. Setting the bfd_vma to zero makes
2988 debugger inspection of these fields look nicer. */
2989 htab->elf.init_refcount.refcount = 0;
411e1bfb 2990 htab->elf.init_refcount.glist = NULL;
951fd09b 2991 htab->elf.init_offset.offset = 0;
411e1bfb 2992 htab->elf.init_offset.glist = NULL;
65f38f15
AM
2993
2994 return &htab->elf.root;
2995}
2996
721956f4
AM
2997/* Free the derived linker hash table. */
2998
2999static void
3000ppc64_elf_link_hash_table_free (hash)
3001 struct bfd_link_hash_table *hash;
3002{
3003 struct ppc_link_hash_table *ret = (struct ppc_link_hash_table *) hash;
3004
3005 bfd_hash_table_free (&ret->stub_hash_table);
3006 bfd_hash_table_free (&ret->branch_hash_table);
3007 _bfd_generic_link_hash_table_free (hash);
3008}
3009
3010/* Build a name for an entry in the stub hash table. */
3011
3012static char *
3013ppc_stub_name (input_section, sym_sec, h, rel)
3014 const asection *input_section;
3015 const asection *sym_sec;
3016 const struct ppc_link_hash_entry *h;
3017 const Elf_Internal_Rela *rel;
3018{
3019 char *stub_name;
3020 bfd_size_type len;
3021
3022 /* rel->r_addend is actually 64 bit, but who uses more than +/- 2^31
3023 offsets from a sym as a branch target? In fact, we could
3024 probably assume the addend is always zero. */
3025 BFD_ASSERT (((int) rel->r_addend & 0xffffffff) == rel->r_addend);
3026
3027 if (h)
3028 {
3029 len = 8 + 1 + strlen (h->elf.root.root.string) + 1 + 8 + 1;
3030 stub_name = bfd_malloc (len);
3031 if (stub_name != NULL)
3032 {
3033 sprintf (stub_name, "%08x_%s+%x",
3034 input_section->id & 0xffffffff,
3035 h->elf.root.root.string,
3036 (int) rel->r_addend & 0xffffffff);
3037 }
3038 }
3039 else
3040 {
3041 len = 8 + 1 + 8 + 1 + 8 + 1 + 16 + 1;
3042 stub_name = bfd_malloc (len);
3043 if (stub_name != NULL)
3044 {
3045 sprintf (stub_name, "%08x_%x:%x+%x",
3046 input_section->id & 0xffffffff,
3047 sym_sec->id & 0xffffffff,
3048 (int) ELF64_R_SYM (rel->r_info) & 0xffffffff,
3049 (int) rel->r_addend & 0xffffffff);
3050 }
3051 }
3052 return stub_name;
3053}
3054
3055/* Look up an entry in the stub hash. Stub entries are cached because
3056 creating the stub name takes a bit of time. */
3057
3058static struct ppc_stub_hash_entry *
3059ppc_get_stub_entry (input_section, sym_sec, hash, rel, htab)
3060 const asection *input_section;
3061 const asection *sym_sec;
3062 struct elf_link_hash_entry *hash;
3063 const Elf_Internal_Rela *rel;
3064 struct ppc_link_hash_table *htab;
3065{
3066 struct ppc_stub_hash_entry *stub_entry;
3067 struct ppc_link_hash_entry *h = (struct ppc_link_hash_entry *) hash;
3068 const asection *id_sec;
3069
3070 /* If this input section is part of a group of sections sharing one
3071 stub section, then use the id of the first section in the group.
3072 Stub names need to include a section id, as there may well be
3073 more than one stub used to reach say, printf, and we need to
3074 distinguish between them. */
3075 id_sec = htab->stub_group[input_section->id].link_sec;
3076
3077 if (h != NULL && h->stub_cache != NULL
3078 && h->stub_cache->h == h
3079 && h->stub_cache->id_sec == id_sec)
3080 {
3081 stub_entry = h->stub_cache;
3082 }
3083 else
3084 {
3085 char *stub_name;
3086
3087 stub_name = ppc_stub_name (id_sec, sym_sec, h, rel);
3088 if (stub_name == NULL)
3089 return NULL;
3090
3091 stub_entry = ppc_stub_hash_lookup (&htab->stub_hash_table,
b34976b6 3092 stub_name, FALSE, FALSE);
721956f4
AM
3093 if (h != NULL)
3094 h->stub_cache = stub_entry;
3095
3096 free (stub_name);
3097 }
3098
3099 return stub_entry;
3100}
3101
3102/* Add a new stub entry to the stub hash. Not all fields of the new
3103 stub entry are initialised. */
3104
3105static struct ppc_stub_hash_entry *
3106ppc_add_stub (stub_name, section, htab)
3107 const char *stub_name;
3108 asection *section;
3109 struct ppc_link_hash_table *htab;
3110{
3111 asection *link_sec;
3112 asection *stub_sec;
3113 struct ppc_stub_hash_entry *stub_entry;
3114
3115 link_sec = htab->stub_group[section->id].link_sec;
3116 stub_sec = htab->stub_group[section->id].stub_sec;
3117 if (stub_sec == NULL)
3118 {
3119 stub_sec = htab->stub_group[link_sec->id].stub_sec;
3120 if (stub_sec == NULL)
3121 {
d4c88bbb 3122 size_t namelen;
721956f4
AM
3123 bfd_size_type len;
3124 char *s_name;
3125
d4c88bbb
AM
3126 namelen = strlen (link_sec->name);
3127 len = namelen + sizeof (STUB_SUFFIX);
721956f4
AM
3128 s_name = bfd_alloc (htab->stub_bfd, len);
3129 if (s_name == NULL)
3130 return NULL;
3131
d4c88bbb
AM
3132 memcpy (s_name, link_sec->name, namelen);
3133 memcpy (s_name + namelen, STUB_SUFFIX, sizeof (STUB_SUFFIX));
721956f4
AM
3134 stub_sec = (*htab->add_stub_section) (s_name, link_sec);
3135 if (stub_sec == NULL)
3136 return NULL;
3137 htab->stub_group[link_sec->id].stub_sec = stub_sec;
3138 }
3139 htab->stub_group[section->id].stub_sec = stub_sec;
3140 }
3141
3142 /* Enter this entry into the linker stub hash table. */
3143 stub_entry = ppc_stub_hash_lookup (&htab->stub_hash_table, stub_name,
b34976b6 3144 TRUE, FALSE);
721956f4
AM
3145 if (stub_entry == NULL)
3146 {
3147 (*_bfd_error_handler) (_("%s: cannot create stub entry %s"),
3148 bfd_archive_filename (section->owner),
3149 stub_name);
3150 return NULL;
3151 }
3152
3153 stub_entry->stub_sec = stub_sec;
3154 stub_entry->stub_offset = 0;
3155 stub_entry->id_sec = link_sec;
3156 return stub_entry;
3157}
3158
82bd7b59
AM
3159/* Create sections for linker generated code. */
3160
b34976b6 3161static bfd_boolean
82bd7b59
AM
3162create_linkage_sections (dynobj, info)
3163 bfd *dynobj;
3164 struct bfd_link_info *info;
3165{
3166 struct ppc_link_hash_table *htab;
3167 flagword flags;
3168
3169 htab = ppc_hash_table (info);
3170
3171 /* Create .sfpr for code to save and restore fp regs. */
3172 flags = (SEC_ALLOC | SEC_LOAD | SEC_CODE | SEC_READONLY
3173 | SEC_HAS_CONTENTS | SEC_IN_MEMORY | SEC_LINKER_CREATED);
721956f4 3174 htab->sfpr = bfd_make_section_anyway (dynobj, ".sfpr");
82bd7b59
AM
3175 if (htab->sfpr == NULL
3176 || ! bfd_set_section_flags (dynobj, htab->sfpr, flags)
3177 || ! bfd_set_section_alignment (dynobj, htab->sfpr, 2))
b34976b6 3178 return FALSE;
82bd7b59 3179
721956f4
AM
3180 /* Create .glink for lazy dynamic linking support. */
3181 htab->sglink = bfd_make_section_anyway (dynobj, ".glink");
82bd7b59
AM
3182 if (htab->sglink == NULL
3183 || ! bfd_set_section_flags (dynobj, htab->sglink, flags)
3184 || ! bfd_set_section_alignment (dynobj, htab->sglink, 2))
b34976b6 3185 return FALSE;
82bd7b59 3186
721956f4
AM
3187 /* Create .branch_lt for plt_branch stubs. */
3188 flags = (SEC_ALLOC | SEC_LOAD
3189 | SEC_HAS_CONTENTS | SEC_IN_MEMORY | SEC_LINKER_CREATED);
3190 htab->sbrlt = bfd_make_section_anyway (dynobj, ".branch_lt");
3191 if (htab->sbrlt == NULL
3192 || ! bfd_set_section_flags (dynobj, htab->sbrlt, flags)
3193 || ! bfd_set_section_alignment (dynobj, htab->sbrlt, 3))
b34976b6 3194 return FALSE;
721956f4
AM
3195
3196 if (info->shared)
3197 {
3198 flags = (SEC_ALLOC | SEC_LOAD | SEC_READONLY
3199 | SEC_HAS_CONTENTS | SEC_IN_MEMORY | SEC_LINKER_CREATED);
1e2f5b6e 3200 htab->srelbrlt = bfd_make_section_anyway (dynobj, ".rela.branch_lt");
721956f4
AM
3201 if (!htab->srelbrlt
3202 || ! bfd_set_section_flags (dynobj, htab->srelbrlt, flags)
3203 || ! bfd_set_section_alignment (dynobj, htab->srelbrlt, 3))
b34976b6 3204 return FALSE;
721956f4 3205 }
b34976b6 3206 return TRUE;
82bd7b59
AM
3207}
3208
65f38f15
AM
3209/* Create .got and .rela.got sections in DYNOBJ, and set up
3210 shortcuts to them in our hash table. */
3211
b34976b6 3212static bfd_boolean
65f38f15
AM
3213create_got_section (dynobj, info)
3214 bfd *dynobj;
3215 struct bfd_link_info *info;
3216{
3217 struct ppc_link_hash_table *htab;
3218
3219 if (! _bfd_elf_create_got_section (dynobj, info))
b34976b6 3220 return FALSE;
65f38f15
AM
3221
3222 htab = ppc_hash_table (info);
3223 htab->sgot = bfd_get_section_by_name (dynobj, ".got");
3224 if (!htab->sgot)
3225 abort ();
3226
3227 htab->srelgot = bfd_make_section (dynobj, ".rela.got");
3228 if (!htab->srelgot
3229 || ! bfd_set_section_flags (dynobj, htab->srelgot,
3230 (SEC_ALLOC | SEC_LOAD | SEC_HAS_CONTENTS
3231 | SEC_IN_MEMORY | SEC_LINKER_CREATED
3232 | SEC_READONLY))
3233 || ! bfd_set_section_alignment (dynobj, htab->srelgot, 3))
b34976b6
AM
3234 return FALSE;
3235 return TRUE;
65f38f15 3236}
5bd4f169 3237
82bd7b59 3238/* Create the dynamic sections, and set up shortcuts. */
5bd4f169 3239
b34976b6 3240static bfd_boolean
65f38f15
AM
3241ppc64_elf_create_dynamic_sections (dynobj, info)
3242 bfd *dynobj;
5bd4f169
AM
3243 struct bfd_link_info *info;
3244{
65f38f15 3245 struct ppc_link_hash_table *htab;
5bd4f169 3246
65f38f15
AM
3247 htab = ppc_hash_table (info);
3248 if (!htab->sgot && !create_got_section (dynobj, info))
b34976b6 3249 return FALSE;
5bd4f169 3250
65f38f15 3251 if (!_bfd_elf_create_dynamic_sections (dynobj, info))
b34976b6 3252 return FALSE;
65f38f15
AM
3253
3254 htab->splt = bfd_get_section_by_name (dynobj, ".plt");
3255 htab->srelplt = bfd_get_section_by_name (dynobj, ".rela.plt");
3256 htab->sdynbss = bfd_get_section_by_name (dynobj, ".dynbss");
3257 if (!info->shared)
3258 htab->srelbss = bfd_get_section_by_name (dynobj, ".rela.bss");
3259
3260 if (!htab->splt || !htab->srelplt || !htab->sdynbss
3261 || (!info->shared && !htab->srelbss))
3262 abort ();
3263
b34976b6 3264 return TRUE;
5bd4f169
AM
3265}
3266
65f38f15
AM
3267/* Copy the extra info we tack onto an elf_link_hash_entry. */
3268
3269static void
b48fa14c 3270ppc64_elf_copy_indirect_symbol (bed, dir, ind)
411e1bfb 3271 struct elf_backend_data *bed ATTRIBUTE_UNUSED;
65f38f15
AM
3272 struct elf_link_hash_entry *dir, *ind;
3273{
3274 struct ppc_link_hash_entry *edir, *eind;
81848ca0 3275 flagword mask;
65f38f15
AM
3276
3277 edir = (struct ppc_link_hash_entry *) dir;
3278 eind = (struct ppc_link_hash_entry *) ind;
3279
411e1bfb 3280 /* Copy over any dynamic relocs we may have on the indirect sym. */
bbd7ec4a 3281 if (eind->dyn_relocs != NULL)
65f38f15 3282 {
bbd7ec4a
AM
3283 if (edir->dyn_relocs != NULL)
3284 {
3285 struct ppc_dyn_relocs **pp;
3286 struct ppc_dyn_relocs *p;
3287
411e1bfb 3288 if (eind->elf.root.type == bfd_link_hash_indirect)
bbd7ec4a
AM
3289 abort ();
3290
3291 /* Add reloc counts against the weak sym to the strong sym
3292 list. Merge any entries against the same section. */
3293 for (pp = &eind->dyn_relocs; (p = *pp) != NULL; )
3294 {
3295 struct ppc_dyn_relocs *q;
3296
3297 for (q = edir->dyn_relocs; q != NULL; q = q->next)
3298 if (q->sec == p->sec)
3299 {
3300 q->pc_count += p->pc_count;
3301 q->count += p->count;
3302 *pp = p->next;
3303 break;
3304 }
3305 if (q == NULL)
3306 pp = &p->next;
3307 }
3308 *pp = edir->dyn_relocs;
3309 }
3310
65f38f15
AM
3311 edir->dyn_relocs = eind->dyn_relocs;
3312 eind->dyn_relocs = NULL;
3313 }
65f38f15 3314
6349e628
AM
3315 edir->is_func |= eind->is_func;
3316 edir->is_func_descriptor |= eind->is_func_descriptor;
3317 edir->is_entry |= eind->is_entry;
58ac9f71 3318 edir->tls_mask |= eind->tls_mask;
6349e628 3319
81848ca0
AM
3320 mask = (ELF_LINK_HASH_REF_DYNAMIC | ELF_LINK_HASH_REF_REGULAR
3321 | ELF_LINK_HASH_REF_REGULAR_NONWEAK | ELF_LINK_NON_GOT_REF);
3322 /* If called to transfer flags for a weakdef during processing
3323 of elf_adjust_dynamic_symbol, don't copy ELF_LINK_NON_GOT_REF.
3324 We clear it ourselves for ELIMINATE_COPY_RELOCS. */
3325 if (ELIMINATE_COPY_RELOCS
3326 && eind->elf.root.type != bfd_link_hash_indirect
3327 && (edir->elf.elf_link_hash_flags & ELF_LINK_HASH_DYNAMIC_ADJUSTED) != 0)
3328 mask &= ~ELF_LINK_NON_GOT_REF;
3329
3330 edir->elf.elf_link_hash_flags |= eind->elf.elf_link_hash_flags & mask;
6349e628
AM
3331
3332 /* If we were called to copy over info for a weak sym, that's all. */
3333 if (eind->elf.root.type != bfd_link_hash_indirect)
3334 return;
3335
81848ca0
AM
3336 /* Copy over got entries that we may have already seen to the
3337 symbol which just became indirect. */
411e1bfb
AM
3338 if (eind->elf.got.glist != NULL)
3339 {
3340 if (edir->elf.got.glist != NULL)
3341 {
3342 struct got_entry **entp;
3343 struct got_entry *ent;
3344
3345 for (entp = &eind->elf.got.glist; (ent = *entp) != NULL; )
3346 {
3347 struct got_entry *dent;
3348
3349 for (dent = edir->elf.got.glist; dent != NULL; dent = dent->next)
3350 if (dent->addend == ent->addend
3351 && dent->tls_type == ent->tls_type)
3352 {
3353 dent->got.refcount += ent->got.refcount;
3354 *entp = ent->next;
3355 break;
3356 }
3357 if (dent == NULL)
3358 entp = &ent->next;
3359 }
3360 *entp = edir->elf.got.glist;
3361 }
3362
3363 edir->elf.got.glist = eind->elf.got.glist;
3364 eind->elf.got.glist = NULL;
3365 }
3366
3367 /* And plt entries. */
3368 if (eind->elf.plt.plist != NULL)
3369 {
3370 if (edir->elf.plt.plist != NULL)
3371 {
3372 struct plt_entry **entp;
3373 struct plt_entry *ent;
3374
3375 for (entp = &eind->elf.plt.plist; (ent = *entp) != NULL; )
3376 {
3377 struct plt_entry *dent;
3378
3379 for (dent = edir->elf.plt.plist; dent != NULL; dent = dent->next)
3380 if (dent->addend == ent->addend)
3381 {
3382 dent->plt.refcount += ent->plt.refcount;
3383 *entp = ent->next;
3384 break;
3385 }
3386 if (dent == NULL)
3387 entp = &ent->next;
3388 }
3389 *entp = edir->elf.plt.plist;
3390 }
3391
3392 edir->elf.plt.plist = eind->elf.plt.plist;
3393 eind->elf.plt.plist = NULL;
3394 }
3395
411e1bfb
AM
3396 if (edir->elf.dynindx == -1)
3397 {
3398 edir->elf.dynindx = eind->elf.dynindx;
3399 edir->elf.dynstr_index = eind->elf.dynstr_index;
3400 eind->elf.dynindx = -1;
3401 eind->elf.dynstr_index = 0;
3402 }
3403 else
3404 BFD_ASSERT (eind->elf.dynindx == -1);
3405}
3406
3407/* Set a flag, used by ppc64_elf_gc_mark_hook, on the entry symbol and
3408 symbols undefined on the command-line. */
3409
3410bfd_boolean
3411ppc64_elf_mark_entry_syms (info)
3412 struct bfd_link_info *info;
3413{
3414 struct ppc_link_hash_table *htab;
3415 struct bfd_sym_chain *sym;
3416
3417 htab = ppc_hash_table (info);
3418 for (sym = info->gc_sym_list; sym; sym = sym->next)
3419 {
3420 struct elf_link_hash_entry *h;
3421
3422 h = elf_link_hash_lookup (&htab->elf, sym->name, FALSE, FALSE, FALSE);
3423 if (h != NULL)
3424 ((struct ppc_link_hash_entry *) h)->is_entry = 1;
3425 }
3426 return TRUE;
3427}
3428
3429static bfd_boolean
3430update_local_sym_info (abfd, symtab_hdr, r_symndx, r_addend, tls_type)
3431 bfd *abfd;
3432 Elf_Internal_Shdr *symtab_hdr;
3433 unsigned long r_symndx;
3434 bfd_vma r_addend;
3435 int tls_type;
3436{
3437 struct got_entry **local_got_ents = elf_local_got_ents (abfd);
e7b938ca 3438 char *local_got_tls_masks;
411e1bfb
AM
3439
3440 if (local_got_ents == NULL)
3441 {
3442 bfd_size_type size = symtab_hdr->sh_info;
3443
e7b938ca 3444 size *= sizeof (*local_got_ents) + sizeof (*local_got_tls_masks);
411e1bfb
AM
3445 local_got_ents = (struct got_entry **) bfd_zalloc (abfd, size);
3446 if (local_got_ents == NULL)
3447 return FALSE;
3448 elf_local_got_ents (abfd) = local_got_ents;
3449 }
3450
3451 if ((tls_type & TLS_EXPLICIT) == 0)
3452 {
3453 struct got_entry *ent;
3454
3455 for (ent = local_got_ents[r_symndx]; ent != NULL; ent = ent->next)
3456 if (ent->addend == r_addend && ent->tls_type == tls_type)
3457 break;
3458 if (ent == NULL)
3459 {
3460 bfd_size_type amt = sizeof (*ent);
3461 ent = (struct got_entry *) bfd_alloc (abfd, amt);
3462 if (ent == NULL)
3463 return FALSE;
3464 ent->next = local_got_ents[r_symndx];
3465 ent->addend = r_addend;
3466 ent->tls_type = tls_type;
3467 ent->got.refcount = 0;
3468 local_got_ents[r_symndx] = ent;
3469 }
3470 ent->got.refcount += 1;
3471 }
3472
e7b938ca
AM
3473 local_got_tls_masks = (char *) (local_got_ents + symtab_hdr->sh_info);
3474 local_got_tls_masks[r_symndx] |= tls_type;
411e1bfb 3475 return TRUE;
65f38f15
AM
3476}
3477
411e1bfb
AM
3478static bfd_boolean
3479update_plt_info (abfd, eh, addend)
3480 bfd *abfd;
3481 struct ppc_link_hash_entry *eh;
3482 bfd_vma addend;
1e2f5b6e 3483{
411e1bfb 3484 struct plt_entry *ent;
1e2f5b6e 3485
411e1bfb
AM
3486 for (ent = eh->elf.plt.plist; ent != NULL; ent = ent->next)
3487 if (ent->addend == addend)
3488 break;
3489 if (ent == NULL)
1e2f5b6e 3490 {
411e1bfb
AM
3491 bfd_size_type amt = sizeof (*ent);
3492 ent = (struct plt_entry *) bfd_alloc (abfd, amt);
3493 if (ent == NULL)
3494 return FALSE;
3495 ent->next = eh->elf.plt.plist;
3496 ent->addend = addend;
3497 ent->plt.refcount = 0;
3498 eh->elf.plt.plist = ent;
1e2f5b6e 3499 }
411e1bfb
AM
3500 ent->plt.refcount += 1;
3501 eh->elf.elf_link_hash_flags |= ELF_LINK_HASH_NEEDS_PLT;
3502 eh->is_func = 1;
b34976b6 3503 return TRUE;
1e2f5b6e
AM
3504}
3505
5bd4f169 3506/* Look through the relocs for a section during the first phase, and
65f38f15 3507 calculate needed space in the global offset table, procedure
5d1634d7 3508 linkage table, and dynamic reloc sections. */
5bd4f169 3509
b34976b6 3510static bfd_boolean
5bd4f169
AM
3511ppc64_elf_check_relocs (abfd, info, sec, relocs)
3512 bfd *abfd;
3513 struct bfd_link_info *info;
3514 asection *sec;
3515 const Elf_Internal_Rela *relocs;
3516{
65f38f15 3517 struct ppc_link_hash_table *htab;
5bd4f169
AM
3518 Elf_Internal_Shdr *symtab_hdr;
3519 struct elf_link_hash_entry **sym_hashes, **sym_hashes_end;
3520 const Elf_Internal_Rela *rel;
3521 const Elf_Internal_Rela *rel_end;
5bd4f169 3522 asection *sreloc;
1e2f5b6e 3523 asection **opd_sym_map;
5bd4f169
AM
3524
3525 if (info->relocateable)
b34976b6 3526 return TRUE;
5bd4f169 3527
65f38f15 3528 htab = ppc_hash_table (info);
5bd4f169 3529 symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
5bd4f169
AM
3530
3531 sym_hashes = elf_sym_hashes (abfd);
3532 sym_hashes_end = (sym_hashes
1e2f5b6e
AM
3533 + symtab_hdr->sh_size / sizeof (Elf64_External_Sym)
3534 - symtab_hdr->sh_info);
5bd4f169
AM
3535
3536 sreloc = NULL;
1e2f5b6e
AM
3537 opd_sym_map = NULL;
3538 if (strcmp (bfd_get_section_name (abfd, sec), ".opd") == 0)
3539 {
3540 /* Garbage collection needs some extra help with .opd sections.
3541 We don't want to necessarily keep everything referenced by
3542 relocs in .opd, as that would keep all functions. Instead,
3543 if we reference an .opd symbol (a function descriptor), we
3544 want to keep the function code symbol's section. This is
3545 easy for global symbols, but for local syms we need to keep
3546 information about the associated function section. Later, if
3547 edit_opd deletes entries, we'll use this array to adjust
3548 local syms in .opd. */
3549 union opd_info {
3550 asection *func_section;
3551 long entry_adjust;
3552 };
3553 bfd_size_type amt;
3554
3555 amt = sec->_raw_size * sizeof (union opd_info) / 24;
3556 opd_sym_map = (asection **) bfd_zalloc (abfd, amt);
3557 if (opd_sym_map == NULL)
b34976b6 3558 return FALSE;
f0abc2a1 3559 ppc64_elf_section_data (sec)->opd.func_sec = opd_sym_map;
1e2f5b6e 3560 }
5bd4f169 3561
82bd7b59
AM
3562 if (htab->elf.dynobj == NULL)
3563 htab->elf.dynobj = abfd;
3564 if (htab->sfpr == NULL
3565 && !create_linkage_sections (htab->elf.dynobj, info))
b34976b6 3566 return FALSE;
82bd7b59 3567
5bd4f169
AM
3568 rel_end = relocs + sec->reloc_count;
3569 for (rel = relocs; rel < rel_end; rel++)
3570 {
3571 unsigned long r_symndx;
3572 struct elf_link_hash_entry *h;
04c9666a 3573 enum elf_ppc64_reloc_type r_type;
411e1bfb 3574 int tls_type = 0;
5bd4f169
AM
3575
3576 r_symndx = ELF64_R_SYM (rel->r_info);
3577 if (r_symndx < symtab_hdr->sh_info)
3578 h = NULL;
3579 else
3580 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
3581
04c9666a 3582 r_type = (enum elf_ppc64_reloc_type) ELF64_R_TYPE (rel->r_info);
a33d1f77 3583 switch (r_type)
5bd4f169 3584 {
411e1bfb
AM
3585 case R_PPC64_GOT_TLSLD16:
3586 case R_PPC64_GOT_TLSLD16_LO:
3587 case R_PPC64_GOT_TLSLD16_HI:
3588 case R_PPC64_GOT_TLSLD16_HA:
3589 htab->tlsld_got.refcount += 1;
951fd09b 3590 tls_type = TLS_TLS | TLS_LD;
411e1bfb
AM
3591 goto dogottls;
3592
3593 case R_PPC64_GOT_TLSGD16:
3594 case R_PPC64_GOT_TLSGD16_LO:
3595 case R_PPC64_GOT_TLSGD16_HI:
3596 case R_PPC64_GOT_TLSGD16_HA:
951fd09b 3597 tls_type = TLS_TLS | TLS_GD;
411e1bfb
AM
3598 goto dogottls;
3599
3600 case R_PPC64_GOT_TPREL16_DS:
3601 case R_PPC64_GOT_TPREL16_LO_DS:
3602 case R_PPC64_GOT_TPREL16_HI:
3603 case R_PPC64_GOT_TPREL16_HA:
3604 if (info->shared)
3605 info->flags |= DF_STATIC_TLS;
3606 tls_type = TLS_TLS | TLS_TPREL;
3607 goto dogottls;
3608
3609 case R_PPC64_GOT_DTPREL16_DS:
3610 case R_PPC64_GOT_DTPREL16_LO_DS:
3611 case R_PPC64_GOT_DTPREL16_HI:
3612 case R_PPC64_GOT_DTPREL16_HA:
3613 tls_type = TLS_TLS | TLS_DTPREL;
3614 dogottls:
3615 sec->has_tls_reloc = 1;
3616 /* Fall thru */
3617
5bd4f169 3618 case R_PPC64_GOT16:
5bd4f169 3619 case R_PPC64_GOT16_DS:
65f38f15
AM
3620 case R_PPC64_GOT16_HA:
3621 case R_PPC64_GOT16_HI:
3622 case R_PPC64_GOT16_LO:
5bd4f169 3623 case R_PPC64_GOT16_LO_DS:
65f38f15 3624 /* This symbol requires a global offset table entry. */
82bd7b59
AM
3625 if (htab->sgot == NULL
3626 && !create_got_section (htab->elf.dynobj, info))
b34976b6 3627 return FALSE;
5bd4f169
AM
3628
3629 if (h != NULL)
3630 {
411e1bfb
AM
3631 struct ppc_link_hash_entry *eh;
3632 struct got_entry *ent;
65f38f15 3633
411e1bfb
AM
3634 eh = (struct ppc_link_hash_entry *) h;
3635 for (ent = eh->elf.got.glist; ent != NULL; ent = ent->next)
3636 if (ent->addend == rel->r_addend
3637 && ent->tls_type == tls_type)
3638 break;
3639 if (ent == NULL)
5bd4f169 3640 {
411e1bfb
AM
3641 bfd_size_type amt = sizeof (*ent);
3642 ent = (struct got_entry *) bfd_alloc (abfd, amt);
3643 if (ent == NULL)
b34976b6 3644 return FALSE;
411e1bfb
AM
3645 ent->next = eh->elf.got.glist;
3646 ent->addend = rel->r_addend;
3647 ent->tls_type = tls_type;
3648 ent->got.refcount = 0;
3649 eh->elf.got.glist = ent;
5bd4f169 3650 }
411e1bfb 3651 ent->got.refcount += 1;
e7b938ca 3652 eh->tls_mask |= tls_type;
5bd4f169 3653 }
411e1bfb
AM
3654 else
3655 /* This is a global offset table entry for a local symbol. */
3656 if (!update_local_sym_info (abfd, symtab_hdr, r_symndx,
3657 rel->r_addend, tls_type))
3658 return FALSE;
5bd4f169
AM
3659 break;
3660
5bd4f169 3661 case R_PPC64_PLT16_HA:
65f38f15
AM
3662 case R_PPC64_PLT16_HI:
3663 case R_PPC64_PLT16_LO:
3664 case R_PPC64_PLT32:
3665 case R_PPC64_PLT64:
5bd4f169 3666 /* This symbol requires a procedure linkage table entry. We
3fad3c7c
AM
3667 actually build the entry in adjust_dynamic_symbol,
3668 because this might be a case of linking PIC code without
3669 linking in any dynamic objects, in which case we don't
3670 need to generate a procedure linkage table after all. */
5bd4f169
AM
3671 if (h == NULL)
3672 {
3673 /* It does not make sense to have a procedure linkage
3fad3c7c 3674 table entry for a local symbol. */
5bd4f169 3675 bfd_set_error (bfd_error_bad_value);
b34976b6 3676 return FALSE;
5bd4f169 3677 }
411e1bfb
AM
3678 else
3679 if (!update_plt_info (abfd, (struct ppc_link_hash_entry *) h,
3680 rel->r_addend))
3681 return FALSE;
5bd4f169
AM
3682 break;
3683
3684 /* The following relocations don't need to propagate the
3685 relocation if linking a shared object since they are
3686 section relative. */
3687 case R_PPC64_SECTOFF:
3688 case R_PPC64_SECTOFF_LO:
3689 case R_PPC64_SECTOFF_HI:
3690 case R_PPC64_SECTOFF_HA:
3691 case R_PPC64_SECTOFF_DS:
3692 case R_PPC64_SECTOFF_LO_DS:
3693 case R_PPC64_TOC16:
3694 case R_PPC64_TOC16_LO:
3695 case R_PPC64_TOC16_HI:
3696 case R_PPC64_TOC16_HA:
3697 case R_PPC64_TOC16_DS:
3698 case R_PPC64_TOC16_LO_DS:
411e1bfb
AM
3699 case R_PPC64_DTPREL16:
3700 case R_PPC64_DTPREL16_LO:
3701 case R_PPC64_DTPREL16_HI:
3702 case R_PPC64_DTPREL16_HA:
3703 case R_PPC64_DTPREL16_DS:
3704 case R_PPC64_DTPREL16_LO_DS:
3705 case R_PPC64_DTPREL16_HIGHER:
3706 case R_PPC64_DTPREL16_HIGHERA:
3707 case R_PPC64_DTPREL16_HIGHEST:
3708 case R_PPC64_DTPREL16_HIGHESTA:
5bd4f169
AM
3709 break;
3710
3711 /* This relocation describes the C++ object vtable hierarchy.
3712 Reconstruct it for later use during GC. */
3713 case R_PPC64_GNU_VTINHERIT:
3714 if (!_bfd_elf64_gc_record_vtinherit (abfd, sec, h, rel->r_offset))
b34976b6 3715 return FALSE;
5bd4f169
AM
3716 break;
3717
3718 /* This relocation describes which C++ vtable entries are actually
3719 used. Record for later use during GC. */
3720 case R_PPC64_GNU_VTENTRY:
3721 if (!_bfd_elf64_gc_record_vtentry (abfd, sec, h, rel->r_addend))
b34976b6 3722 return FALSE;
5bd4f169
AM
3723 break;
3724
721956f4
AM
3725 case R_PPC64_REL14:
3726 case R_PPC64_REL14_BRTAKEN:
3727 case R_PPC64_REL14_BRNTAKEN:
3728 htab->has_14bit_branch = 1;
3729 /* Fall through. */
3730
5d1634d7 3731 case R_PPC64_REL24:
e86ce104
AM
3732 if (h != NULL
3733 && h->root.root.string[0] == '.'
3734 && h->root.root.string[1] != 0)
5d1634d7
AM
3735 {
3736 /* We may need a .plt entry if the function this reloc
3737 refers to is in a shared lib. */
411e1bfb
AM
3738 if (!update_plt_info (abfd, (struct ppc_link_hash_entry *) h,
3739 rel->r_addend))
3740 return FALSE;
3741 if (h == htab->tls_get_addr)
3742 sec->has_tls_reloc = 1;
a48ebf4d
AM
3743 else if ((strncmp (h->root.root.string, ".__tls_get_addr", 15)
3744 == 0)
3745 && (h->root.root.string[15] == 0
3746 || h->root.root.string[15] == '@'))
411e1bfb
AM
3747 {
3748 htab->tls_get_addr = h;
3749 sec->has_tls_reloc = 1;
3750 }
3751 }
3752 break;
3753
3754 case R_PPC64_TPREL64:
3755 tls_type = TLS_EXPLICIT | TLS_TLS | TLS_TPREL;
3756 if (info->shared)
3757 info->flags |= DF_STATIC_TLS;
3758 goto dotlstoc;
3759
3760 case R_PPC64_DTPMOD64:
3761 if (rel + 1 < rel_end
3762 && rel[1].r_info == ELF64_R_INFO (r_symndx, R_PPC64_DTPREL64)
3763 && rel[1].r_offset == rel->r_offset + 8)
951fd09b 3764 tls_type = TLS_EXPLICIT | TLS_TLS | TLS_GD;
411e1bfb 3765 else
951fd09b 3766 tls_type = TLS_EXPLICIT | TLS_TLS | TLS_LD;
411e1bfb
AM
3767 goto dotlstoc;
3768
3769 case R_PPC64_DTPREL64:
3770 tls_type = TLS_EXPLICIT | TLS_TLS | TLS_DTPREL;
3771 if (rel != relocs
3772 && rel[-1].r_info == ELF64_R_INFO (r_symndx, R_PPC64_DTPMOD64)
3773 && rel[-1].r_offset == rel->r_offset - 8)
3774 /* This is the second reloc of a dtpmod, dtprel pair.
3775 Don't mark with TLS_DTPREL. */
3776 goto dodyn;
3777
3778 dotlstoc:
3779 sec->has_tls_reloc = 1;
3780 if (h != NULL)
3781 {
3782 struct ppc_link_hash_entry *eh;
3783 eh = (struct ppc_link_hash_entry *) h;
e7b938ca 3784 eh->tls_mask |= tls_type;
411e1bfb
AM
3785 }
3786 else
3787 if (!update_local_sym_info (abfd, symtab_hdr, r_symndx,
3788 rel->r_addend, tls_type))
3789 return FALSE;
3790
3791 if (ppc64_elf_section_data (sec)->t_symndx == NULL)
3792 {
e7b938ca 3793 /* One extra to simplify get_tls_mask. */
951fd09b 3794 bfd_size_type amt = sec->_raw_size * sizeof (unsigned) / 8 + 1;
411e1bfb
AM
3795 ppc64_elf_section_data (sec)->t_symndx
3796 = (unsigned *) bfd_zalloc (abfd, amt);
3797 if (ppc64_elf_section_data (sec)->t_symndx == NULL)
3798 return FALSE;
3799 }
3800 BFD_ASSERT (rel->r_offset % 8 == 0);
3801 ppc64_elf_section_data (sec)->t_symndx[rel->r_offset / 8] = r_symndx;
951fd09b
AM
3802
3803 /* Mark the second slot of a GD or LD entry.
3804 -1 to indicate GD and -2 to indicate LD. */
3805 if (tls_type == (TLS_EXPLICIT | TLS_TLS | TLS_GD))
3806 ppc64_elf_section_data (sec)->t_symndx[rel->r_offset / 8 + 1] = -1;
3807 else if (tls_type == (TLS_EXPLICIT | TLS_TLS | TLS_LD))
3808 ppc64_elf_section_data (sec)->t_symndx[rel->r_offset / 8 + 1] = -2;
411e1bfb
AM
3809 goto dodyn;
3810
3811 case R_PPC64_TPREL16:
3812 case R_PPC64_TPREL16_LO:
3813 case R_PPC64_TPREL16_HI:
3814 case R_PPC64_TPREL16_HA:
3815 case R_PPC64_TPREL16_DS:
3816 case R_PPC64_TPREL16_LO_DS:
3817 case R_PPC64_TPREL16_HIGHER:
3818 case R_PPC64_TPREL16_HIGHERA:
3819 case R_PPC64_TPREL16_HIGHEST:
3820 case R_PPC64_TPREL16_HIGHESTA:
3821 if (info->shared)
3822 {
3823 info->flags |= DF_STATIC_TLS;
3824 goto dodyn;
5d1634d7
AM
3825 }
3826 break;
3827
e86ce104 3828 case R_PPC64_ADDR64:
1e2f5b6e 3829 if (opd_sym_map != NULL
e86ce104
AM
3830 && h != NULL
3831 && h->root.root.string[0] == '.'
3832 && h->root.root.string[1] != 0)
3833 {
3834 struct elf_link_hash_entry *fdh;
3835
3836 fdh = elf_link_hash_lookup (&htab->elf, h->root.root.string + 1,
b34976b6 3837 FALSE, FALSE, FALSE);
e86ce104
AM
3838 if (fdh != NULL)
3839 {
e86ce104 3840 ((struct ppc_link_hash_entry *) fdh)->is_func_descriptor = 1;
721956f4 3841 ((struct ppc_link_hash_entry *) fdh)->oh = h;
e86ce104 3842 ((struct ppc_link_hash_entry *) h)->is_func = 1;
721956f4 3843 ((struct ppc_link_hash_entry *) h)->oh = fdh;
e86ce104
AM
3844 }
3845 }
1e2f5b6e
AM
3846 if (opd_sym_map != NULL
3847 && h == NULL
3848 && rel + 1 < rel_end
04c9666a 3849 && ((enum elf_ppc64_reloc_type) ELF64_R_TYPE ((rel + 1)->r_info)
1e2f5b6e
AM
3850 == R_PPC64_TOC))
3851 {
3852 asection *s;
3853
3854 s = bfd_section_from_r_symndx (abfd, &htab->sym_sec, sec,
3855 r_symndx);
3856 if (s == NULL)
b34976b6 3857 return FALSE;
1e2f5b6e
AM
3858 else if (s != sec)
3859 opd_sym_map[rel->r_offset / 24] = s;
3860 }
e86ce104
AM
3861 /* Fall through. */
3862
04c9666a 3863 case R_PPC64_REL30:
5bd4f169 3864 case R_PPC64_REL32:
04c9666a 3865 case R_PPC64_REL64:
65f38f15
AM
3866 case R_PPC64_ADDR14:
3867 case R_PPC64_ADDR14_BRNTAKEN:
3868 case R_PPC64_ADDR14_BRTAKEN:
3869 case R_PPC64_ADDR16:
3870 case R_PPC64_ADDR16_DS:
3871 case R_PPC64_ADDR16_HA:
3872 case R_PPC64_ADDR16_HI:
3873 case R_PPC64_ADDR16_HIGHER:
3874 case R_PPC64_ADDR16_HIGHERA:
3875 case R_PPC64_ADDR16_HIGHEST:
3876 case R_PPC64_ADDR16_HIGHESTA:
3877 case R_PPC64_ADDR16_LO:
3878 case R_PPC64_ADDR16_LO_DS:
3879 case R_PPC64_ADDR24:
65f38f15 3880 case R_PPC64_ADDR32:
65f38f15
AM
3881 case R_PPC64_UADDR16:
3882 case R_PPC64_UADDR32:
3883 case R_PPC64_UADDR64:
5bd4f169 3884 case R_PPC64_TOC:
81848ca0
AM
3885 if (h != NULL && !info->shared)
3886 /* We may need a copy reloc. */
3887 h->elf_link_hash_flags |= ELF_LINK_NON_GOT_REF;
3888
41bd81ab 3889 /* Don't propagate .opd relocs. */
1e2f5b6e 3890 if (NO_OPD_RELOCS && opd_sym_map != NULL)
e86ce104 3891 break;
e86ce104 3892
f4656909
AM
3893 /* Don't propagate relocs that the dynamic linker won't relocate. */
3894 if ((sec->flags & SEC_ALLOC) == 0)
3895 break;
3896
65f38f15
AM
3897 /* If we are creating a shared library, and this is a reloc
3898 against a global symbol, or a non PC relative reloc
3899 against a local symbol, then we need to copy the reloc
3900 into the shared library. However, if we are linking with
3901 -Bsymbolic, we do not need to copy a reloc against a
3902 global symbol which is defined in an object we are
3903 including in the link (i.e., DEF_REGULAR is set). At
3904 this point we have not seen all the input files, so it is
3905 possible that DEF_REGULAR is not set now but will be set
3906 later (it is never cleared). In case of a weak definition,
3907 DEF_REGULAR may be cleared later by a strong definition in
3908 a shared library. We account for that possibility below by
f4656909 3909 storing information in the dyn_relocs field of the hash
65f38f15
AM
3910 table entry. A similar situation occurs when creating
3911 shared libraries and symbol visibility changes render the
3912 symbol local.
3913
3914 If on the other hand, we are creating an executable, we
3915 may need to keep relocations for symbols satisfied by a
3916 dynamic library if we manage to avoid copy relocs for the
3917 symbol. */
411e1bfb 3918 dodyn:
65f38f15 3919 if ((info->shared
411e1bfb 3920 && (MUST_BE_DYN_RELOC (r_type)
65f38f15
AM
3921 || (h != NULL
3922 && (! info->symbolic
3923 || h->root.type == bfd_link_hash_defweak
3924 || (h->elf_link_hash_flags
3925 & ELF_LINK_HASH_DEF_REGULAR) == 0))))
f4656909
AM
3926 || (ELIMINATE_COPY_RELOCS
3927 && !info->shared
65f38f15
AM
3928 && h != NULL
3929 && (h->root.type == bfd_link_hash_defweak
3930 || (h->elf_link_hash_flags
3931 & ELF_LINK_HASH_DEF_REGULAR) == 0)))
5bd4f169 3932 {
ec338859
AM
3933 struct ppc_dyn_relocs *p;
3934 struct ppc_dyn_relocs **head;
3935
65f38f15
AM
3936 /* We must copy these reloc types into the output file.
3937 Create a reloc section in dynobj and make room for
3938 this reloc. */
5bd4f169
AM
3939 if (sreloc == NULL)
3940 {
3941 const char *name;
65f38f15 3942 bfd *dynobj;
5bd4f169
AM
3943
3944 name = (bfd_elf_string_from_elf_section
3945 (abfd,
3946 elf_elfheader (abfd)->e_shstrndx,
3947 elf_section_data (sec)->rel_hdr.sh_name));
3948 if (name == NULL)
b34976b6 3949 return FALSE;
5bd4f169 3950
65f38f15
AM
3951 if (strncmp (name, ".rela", 5) != 0
3952 || strcmp (bfd_get_section_name (abfd, sec),
3953 name + 5) != 0)
3954 {
3955 (*_bfd_error_handler)
3956 (_("%s: bad relocation section name `%s\'"),
3957 bfd_archive_filename (abfd), name);
5d1634d7 3958 bfd_set_error (bfd_error_bad_value);
65f38f15
AM
3959 }
3960
65f38f15 3961 dynobj = htab->elf.dynobj;
5bd4f169
AM
3962 sreloc = bfd_get_section_by_name (dynobj, name);
3963 if (sreloc == NULL)
3964 {
3965 flagword flags;
3966
3967 sreloc = bfd_make_section (dynobj, name);
3968 flags = (SEC_HAS_CONTENTS | SEC_READONLY
3969 | SEC_IN_MEMORY | SEC_LINKER_CREATED);
3970 if ((sec->flags & SEC_ALLOC) != 0)
3971 flags |= SEC_ALLOC | SEC_LOAD;
3972 if (sreloc == NULL
3973 || ! bfd_set_section_flags (dynobj, sreloc, flags)
65f38f15 3974 || ! bfd_set_section_alignment (dynobj, sreloc, 3))
b34976b6 3975 return FALSE;
5bd4f169 3976 }
65f38f15 3977 elf_section_data (sec)->sreloc = sreloc;
5bd4f169
AM
3978 }
3979
65f38f15
AM
3980 /* If this is a global symbol, we count the number of
3981 relocations we need for this symbol. */
3982 if (h != NULL)
3983 {
ec338859 3984 head = &((struct ppc_link_hash_entry *) h)->dyn_relocs;
65f38f15
AM
3985 }
3986 else
3987 {
ec338859
AM
3988 /* Track dynamic relocs needed for local syms too.
3989 We really need local syms available to do this
3990 easily. Oh well. */
3991
3992 asection *s;
3993 s = bfd_section_from_r_symndx (abfd, &htab->sym_sec,
3994 sec, r_symndx);
3995 if (s == NULL)
b34976b6 3996 return FALSE;
ec338859
AM
3997
3998 head = ((struct ppc_dyn_relocs **)
3999 &elf_section_data (s)->local_dynrel);
65f38f15 4000 }
ec338859
AM
4001
4002 p = *head;
4003 if (p == NULL || p->sec != sec)
4004 {
4005 p = ((struct ppc_dyn_relocs *)
4006 bfd_alloc (htab->elf.dynobj,
4007 (bfd_size_type) sizeof *p));
4008 if (p == NULL)
b34976b6 4009 return FALSE;
ec338859
AM
4010 p->next = *head;
4011 *head = p;
4012 p->sec = sec;
4013 p->count = 0;
4014 p->pc_count = 0;
4015 }
4016
4017 p->count += 1;
411e1bfb 4018 if (!MUST_BE_DYN_RELOC (r_type))
ec338859 4019 p->pc_count += 1;
65f38f15 4020 }
5bd4f169 4021 break;
65f38f15
AM
4022
4023 default:
96e0dda4 4024 break;
5bd4f169
AM
4025 }
4026 }
4027
b34976b6 4028 return TRUE;
5bd4f169
AM
4029}
4030
4031/* Return the section that should be marked against GC for a given
4032 relocation. */
4033
4034static asection *
1e2f5b6e
AM
4035ppc64_elf_gc_mark_hook (sec, info, rel, h, sym)
4036 asection *sec;
5bd4f169
AM
4037 struct bfd_link_info *info ATTRIBUTE_UNUSED;
4038 Elf_Internal_Rela *rel;
4039 struct elf_link_hash_entry *h;
4040 Elf_Internal_Sym *sym;
4041{
1e2f5b6e
AM
4042 asection *rsec = NULL;
4043
5bd4f169
AM
4044 if (h != NULL)
4045 {
04c9666a 4046 enum elf_ppc64_reloc_type r_type;
1e2f5b6e 4047 struct ppc_link_hash_entry *fdh;
a33d1f77 4048
04c9666a 4049 r_type = (enum elf_ppc64_reloc_type) ELF64_R_TYPE (rel->r_info);
a33d1f77 4050 switch (r_type)
5bd4f169
AM
4051 {
4052 case R_PPC64_GNU_VTINHERIT:
4053 case R_PPC64_GNU_VTENTRY:
4054 break;
4055
4056 default:
4057 switch (h->root.type)
4058 {
4059 case bfd_link_hash_defined:
4060 case bfd_link_hash_defweak:
1e2f5b6e
AM
4061 fdh = (struct ppc_link_hash_entry *) h;
4062
4063 /* Function descriptor syms cause the associated
4064 function code sym section to be marked. */
4065 if (fdh->is_func_descriptor)
4066 rsec = fdh->oh->root.u.def.section;
4067
4068 /* Function entry syms return NULL if they are in .opd
4069 and are not ._start (or others undefined on the ld
4070 command line). Thus we avoid marking all function
b34976b6 4071 sections, as all functions are referenced in .opd. */
1e2f5b6e
AM
4072 else if ((fdh->oh != NULL
4073 && ((struct ppc_link_hash_entry *) fdh->oh)->is_entry)
f0abc2a1 4074 || ppc64_elf_section_data (sec)->opd.func_sec == NULL)
1e2f5b6e
AM
4075 rsec = h->root.u.def.section;
4076 break;
5bd4f169
AM
4077
4078 case bfd_link_hash_common:
1e2f5b6e
AM
4079 rsec = h->root.u.c.p->section;
4080 break;
5bd4f169
AM
4081
4082 default:
4083 break;
4084 }
4085 }
4086 }
4087 else
4088 {
1e2f5b6e
AM
4089 asection **opd_sym_section;
4090
4091 rsec = bfd_section_from_elf_index (sec->owner, sym->st_shndx);
f0abc2a1 4092 opd_sym_section = ppc64_elf_section_data (rsec)->opd.func_sec;
1e2f5b6e
AM
4093 if (opd_sym_section != NULL)
4094 rsec = opd_sym_section[sym->st_value / 24];
f0abc2a1 4095 else if (ppc64_elf_section_data (sec)->opd.func_sec != NULL)
1e2f5b6e 4096 rsec = NULL;
5bd4f169
AM
4097 }
4098
1e2f5b6e 4099 return rsec;
5bd4f169
AM
4100}
4101
65f38f15
AM
4102/* Update the .got, .plt. and dynamic reloc reference counts for the
4103 section being removed. */
5bd4f169 4104
b34976b6 4105static bfd_boolean
5bd4f169
AM
4106ppc64_elf_gc_sweep_hook (abfd, info, sec, relocs)
4107 bfd *abfd;
411e1bfb 4108 struct bfd_link_info *info;
5bd4f169
AM
4109 asection *sec;
4110 const Elf_Internal_Rela *relocs;
4111{
411e1bfb 4112 struct ppc_link_hash_table *htab;
5bd4f169
AM
4113 Elf_Internal_Shdr *symtab_hdr;
4114 struct elf_link_hash_entry **sym_hashes;
411e1bfb 4115 struct got_entry **local_got_ents;
5bd4f169 4116 const Elf_Internal_Rela *rel, *relend;
5bd4f169 4117
ec338859
AM
4118 elf_section_data (sec)->local_dynrel = NULL;
4119
411e1bfb 4120 htab = ppc_hash_table (info);
5bd4f169
AM
4121 symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
4122 sym_hashes = elf_sym_hashes (abfd);
411e1bfb 4123 local_got_ents = elf_local_got_ents (abfd);
5bd4f169
AM
4124
4125 relend = relocs + sec->reloc_count;
4126 for (rel = relocs; rel < relend; rel++)
a33d1f77
AM
4127 {
4128 unsigned long r_symndx;
04c9666a 4129 enum elf_ppc64_reloc_type r_type;
58ac9f71 4130 struct elf_link_hash_entry *h = NULL;
411e1bfb 4131 char tls_type = 0;
5bd4f169 4132
a33d1f77 4133 r_symndx = ELF64_R_SYM (rel->r_info);
04c9666a 4134 r_type = (enum elf_ppc64_reloc_type) ELF64_R_TYPE (rel->r_info);
58ac9f71
AM
4135 if (r_symndx >= symtab_hdr->sh_info)
4136 {
4137 struct ppc_link_hash_entry *eh;
4138 struct ppc_dyn_relocs **pp;
4139 struct ppc_dyn_relocs *p;
4140
4141 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
4142 eh = (struct ppc_link_hash_entry *) h;
4143
4144 for (pp = &eh->dyn_relocs; (p = *pp) != NULL; pp = &p->next)
4145 if (p->sec == sec)
4146 {
4147 /* Everything must go for SEC. */
4148 *pp = p->next;
4149 break;
4150 }
4151 }
4152
a33d1f77
AM
4153 switch (r_type)
4154 {
411e1bfb
AM
4155 case R_PPC64_GOT_TLSLD16:
4156 case R_PPC64_GOT_TLSLD16_LO:
4157 case R_PPC64_GOT_TLSLD16_HI:
4158 case R_PPC64_GOT_TLSLD16_HA:
4159 htab->tlsld_got.refcount -= 1;
951fd09b 4160 tls_type = TLS_TLS | TLS_LD;
411e1bfb
AM
4161 goto dogot;
4162
4163 case R_PPC64_GOT_TLSGD16:
4164 case R_PPC64_GOT_TLSGD16_LO:
4165 case R_PPC64_GOT_TLSGD16_HI:
4166 case R_PPC64_GOT_TLSGD16_HA:
951fd09b 4167 tls_type = TLS_TLS | TLS_GD;
411e1bfb
AM
4168 goto dogot;
4169
4170 case R_PPC64_GOT_TPREL16_DS:
4171 case R_PPC64_GOT_TPREL16_LO_DS:
4172 case R_PPC64_GOT_TPREL16_HI:
4173 case R_PPC64_GOT_TPREL16_HA:
4174 tls_type = TLS_TLS | TLS_TPREL;
4175 goto dogot;
4176
4177 case R_PPC64_GOT_DTPREL16_DS:
4178 case R_PPC64_GOT_DTPREL16_LO_DS:
4179 case R_PPC64_GOT_DTPREL16_HI:
4180 case R_PPC64_GOT_DTPREL16_HA:
4181 tls_type = TLS_TLS | TLS_DTPREL;
4182 goto dogot;
4183
a33d1f77
AM
4184 case R_PPC64_GOT16:
4185 case R_PPC64_GOT16_DS:
4186 case R_PPC64_GOT16_HA:
4187 case R_PPC64_GOT16_HI:
4188 case R_PPC64_GOT16_LO:
4189 case R_PPC64_GOT16_LO_DS:
411e1bfb
AM
4190 dogot:
4191 {
4192 struct got_entry *ent;
4193
58ac9f71
AM
4194 if (h != NULL)
4195 ent = h->got.glist;
411e1bfb
AM
4196 else
4197 ent = local_got_ents[r_symndx];
4198
4199 for (; ent != NULL; ent = ent->next)
4200 if (ent->addend == rel->r_addend
4201 && ent->tls_type == tls_type)
4202 break;
4203 if (ent == NULL)
4204 abort ();
4205 if (ent->got.refcount > 0)
4206 ent->got.refcount -= 1;
4207 }
a33d1f77 4208 break;
65f38f15 4209
a33d1f77
AM
4210 case R_PPC64_PLT16_HA:
4211 case R_PPC64_PLT16_HI:
4212 case R_PPC64_PLT16_LO:
4213 case R_PPC64_PLT32:
4214 case R_PPC64_PLT64:
721956f4
AM
4215 case R_PPC64_REL14:
4216 case R_PPC64_REL14_BRNTAKEN:
4217 case R_PPC64_REL14_BRTAKEN:
5d1634d7 4218 case R_PPC64_REL24:
58ac9f71 4219 if (h != NULL)
5d1634d7 4220 {
411e1bfb
AM
4221 struct plt_entry *ent;
4222
411e1bfb
AM
4223 for (ent = h->plt.plist; ent != NULL; ent = ent->next)
4224 if (ent->addend == rel->r_addend)
4225 break;
4226 if (ent == NULL)
4227 abort ();
4228 if (ent->plt.refcount > 0)
4229 ent->plt.refcount -= 1;
5d1634d7 4230 }
e86ce104 4231 break;
5d1634d7 4232
a33d1f77
AM
4233 default:
4234 break;
4235 }
4236 }
b34976b6 4237 return TRUE;
5bd4f169
AM
4238}
4239
e86ce104
AM
4240/* Called via elf_link_hash_traverse to transfer dynamic linking
4241 information on function code symbol entries to their corresponding
4242 function descriptor symbol entries. */
b34976b6 4243static bfd_boolean
e86ce104 4244func_desc_adjust (h, inf)
5bd4f169 4245 struct elf_link_hash_entry *h;
e86ce104 4246 PTR inf;
5bd4f169 4247{
e86ce104 4248 struct bfd_link_info *info;
65f38f15 4249 struct ppc_link_hash_table *htab;
411e1bfb 4250 struct plt_entry *ent;
5bd4f169 4251
e92d460e 4252 if (h->root.type == bfd_link_hash_indirect)
b34976b6 4253 return TRUE;
e86ce104 4254
e92d460e
AM
4255 if (h->root.type == bfd_link_hash_warning)
4256 h = (struct elf_link_hash_entry *) h->root.u.i.link;
4257
e86ce104 4258 info = (struct bfd_link_info *) inf;
65f38f15 4259 htab = ppc_hash_table (info);
5bd4f169 4260
e86ce104
AM
4261 /* If this is a function code symbol, transfer dynamic linking
4262 information to the function descriptor symbol. */
4263 if (!((struct ppc_link_hash_entry *) h)->is_func)
b34976b6 4264 return TRUE;
e86ce104 4265
805fc799
AM
4266 if (h->root.type == bfd_link_hash_undefweak
4267 && (h->elf_link_hash_flags & ELF_LINK_HASH_REF_REGULAR))
b34976b6 4268 htab->have_undefweak = TRUE;
805fc799 4269
411e1bfb
AM
4270 for (ent = h->plt.plist; ent != NULL; ent = ent->next)
4271 if (ent->plt.refcount > 0)
4272 break;
4273 if (ent != NULL
e86ce104
AM
4274 && h->root.root.string[0] == '.'
4275 && h->root.root.string[1] != '\0')
5bd4f169 4276 {
721956f4 4277 struct elf_link_hash_entry *fdh = ((struct ppc_link_hash_entry *) h)->oh;
b34976b6 4278 bfd_boolean force_local;
5bd4f169 4279
648cca2c
AM
4280 /* Find the corresponding function descriptor symbol. Create it
4281 as undefined if necessary. */
5bd4f169 4282
721956f4
AM
4283 if (fdh == NULL)
4284 fdh = elf_link_hash_lookup (&htab->elf, h->root.root.string + 1,
b34976b6 4285 FALSE, FALSE, TRUE);
5bd4f169 4286
d926e03d
AM
4287 if (fdh == NULL
4288 && info->shared
4289 && (h->root.type == bfd_link_hash_undefined
4290 || h->root.type == bfd_link_hash_undefweak))
648cca2c
AM
4291 {
4292 bfd *abfd;
4293 asymbol *newsym;
14a793b2 4294 struct bfd_link_hash_entry *bh;
648cca2c 4295
d926e03d 4296 abfd = h->root.u.undef.abfd;
648cca2c
AM
4297 newsym = bfd_make_empty_symbol (abfd);
4298 newsym->name = h->root.root.string + 1;
4299 newsym->section = bfd_und_section_ptr;
4300 newsym->value = 0;
4301 newsym->flags = BSF_OBJECT;
4302 if (h->root.type == bfd_link_hash_undefweak)
4303 newsym->flags |= BSF_WEAK;
4304
14a793b2 4305 bh = &fdh->root;
648cca2c
AM
4306 if ( !(_bfd_generic_link_add_one_symbol
4307 (info, abfd, newsym->name, newsym->flags,
b34976b6 4308 newsym->section, newsym->value, NULL, FALSE, FALSE, &bh)))
648cca2c 4309 {
b34976b6 4310 return FALSE;
648cca2c 4311 }
14a793b2 4312 fdh = (struct elf_link_hash_entry *) bh;
d926e03d 4313 fdh->elf_link_hash_flags &= ~ELF_LINK_NON_ELF;
648cca2c
AM
4314 }
4315
e86ce104
AM
4316 if (fdh != NULL
4317 && (fdh->elf_link_hash_flags & ELF_LINK_FORCED_LOCAL) == 0
4318 && (info->shared
4319 || (fdh->elf_link_hash_flags & ELF_LINK_HASH_DEF_DYNAMIC) != 0
4320 || (fdh->elf_link_hash_flags & ELF_LINK_HASH_REF_DYNAMIC) != 0))
4321 {
4322 if (fdh->dynindx == -1)
4323 if (! bfd_elf64_link_record_dynamic_symbol (info, fdh))
b34976b6 4324 return FALSE;
e86ce104
AM
4325 fdh->elf_link_hash_flags |= (h->elf_link_hash_flags
4326 & (ELF_LINK_HASH_REF_REGULAR
4327 | ELF_LINK_HASH_REF_DYNAMIC
4328 | ELF_LINK_HASH_REF_REGULAR_NONWEAK
4329 | ELF_LINK_NON_GOT_REF));
e1fa50e7
AM
4330 if (ELF_ST_VISIBILITY (h->other) == STV_DEFAULT)
4331 {
411e1bfb 4332 fdh->plt.plist = h->plt.plist;
e1fa50e7
AM
4333 fdh->elf_link_hash_flags |= ELF_LINK_HASH_NEEDS_PLT;
4334 }
e86ce104 4335 ((struct ppc_link_hash_entry *) fdh)->is_func_descriptor = 1;
721956f4 4336 ((struct ppc_link_hash_entry *) fdh)->oh = h;
721956f4 4337 ((struct ppc_link_hash_entry *) h)->oh = fdh;
e86ce104
AM
4338 }
4339
4340 /* Now that the info is on the function descriptor, clear the
4341 function code sym info. Any function code syms for which we
4342 don't have a definition in a regular file, we force local.
4343 This prevents a shared library from exporting syms that have
4344 been imported from another library. Function code syms that
4345 are really in the library we must leave global to prevent the
e1fa50e7 4346 linker dragging in a definition from a static library. */
ea1e4b0d
AM
4347 force_local = (info->shared
4348 && ((h->elf_link_hash_flags
4349 & ELF_LINK_HASH_DEF_REGULAR) == 0
4350 || fdh == NULL
4351 || (fdh->elf_link_hash_flags
4352 & ELF_LINK_HASH_DEF_REGULAR) == 0
4353 || (fdh->elf_link_hash_flags
4354 & ELF_LINK_FORCED_LOCAL) != 0));
e86ce104
AM
4355 _bfd_elf_link_hash_hide_symbol (info, h, force_local);
4356 }
4357
b34976b6 4358 return TRUE;
e86ce104 4359}
40b8271b 4360
82bd7b59
AM
4361#define MIN_SAVE_FPR 14
4362#define MAX_SAVE_FPR 31
4363
e86ce104 4364/* Called near the start of bfd_elf_size_dynamic_sections. We use
82bd7b59
AM
4365 this hook to a) provide some gcc support functions, and b) transfer
4366 dynamic linking information gathered so far on function code symbol
4367 entries, to their corresponding function descriptor symbol entries. */
b34976b6 4368static bfd_boolean
e86ce104
AM
4369ppc64_elf_func_desc_adjust (obfd, info)
4370 bfd *obfd ATTRIBUTE_UNUSED;
4371 struct bfd_link_info *info;
4372{
4373 struct ppc_link_hash_table *htab;
82bd7b59
AM
4374 unsigned int lowest_savef = MAX_SAVE_FPR + 2;
4375 unsigned int lowest_restf = MAX_SAVE_FPR + 2;
4376 unsigned int i;
4377 struct elf_link_hash_entry *h;
721956f4 4378 bfd_byte *p;
82bd7b59 4379 char sym[10];
e86ce104
AM
4380
4381 htab = ppc_hash_table (info);
82bd7b59
AM
4382
4383 if (htab->sfpr == NULL)
4384 /* We don't have any relocs. */
b34976b6 4385 return TRUE;
82bd7b59
AM
4386
4387 /* First provide any missing ._savef* and ._restf* functions. */
4388 memcpy (sym, "._savef14", 10);
4389 for (i = MIN_SAVE_FPR; i <= MAX_SAVE_FPR; i++)
4390 {
4391 sym[7] = i / 10 + '0';
4392 sym[8] = i % 10 + '0';
b34976b6 4393 h = elf_link_hash_lookup (&htab->elf, sym, FALSE, FALSE, TRUE);
82bd7b59
AM
4394 if (h != NULL
4395 && h->root.type == bfd_link_hash_undefined)
4396 {
4397 if (lowest_savef > i)
4398 lowest_savef = i;
4399 h->root.type = bfd_link_hash_defined;
4400 h->root.u.def.section = htab->sfpr;
4401 h->root.u.def.value = (i - lowest_savef) * 4;
4402 h->type = STT_FUNC;
4403 h->elf_link_hash_flags |= ELF_LINK_HASH_DEF_REGULAR;
4404 _bfd_elf_link_hash_hide_symbol (info, h, info->shared);
4405 }
4406 }
4407
4408 memcpy (sym, "._restf14", 10);
4409 for (i = MIN_SAVE_FPR; i <= MAX_SAVE_FPR; i++)
4410 {
4411 sym[7] = i / 10 + '0';
4412 sym[8] = i % 10 + '0';
b34976b6 4413 h = elf_link_hash_lookup (&htab->elf, sym, FALSE, FALSE, TRUE);
82bd7b59
AM
4414 if (h != NULL
4415 && h->root.type == bfd_link_hash_undefined)
4416 {
4417 if (lowest_restf > i)
4418 lowest_restf = i;
4419 h->root.type = bfd_link_hash_defined;
4420 h->root.u.def.section = htab->sfpr;
4421 h->root.u.def.value = ((MAX_SAVE_FPR + 2 - lowest_savef) * 4
4422 + (i - lowest_restf) * 4);
4423 h->type = STT_FUNC;
4424 h->elf_link_hash_flags |= ELF_LINK_HASH_DEF_REGULAR;
4425 _bfd_elf_link_hash_hide_symbol (info, h, info->shared);
4426 }
4427 }
4428
805fc799
AM
4429 elf_link_hash_traverse (&htab->elf, func_desc_adjust, (PTR) info);
4430
82bd7b59
AM
4431 htab->sfpr->_raw_size = ((MAX_SAVE_FPR + 2 - lowest_savef) * 4
4432 + (MAX_SAVE_FPR + 2 - lowest_restf) * 4);
4433
4434 if (htab->sfpr->_raw_size == 0)
805fc799
AM
4435 {
4436 if (!htab->have_undefweak)
4437 {
4438 _bfd_strip_section_from_output (info, htab->sfpr);
b34976b6 4439 return TRUE;
805fc799
AM
4440 }
4441
4442 htab->sfpr->_raw_size = 4;
4443 }
82bd7b59 4444
721956f4
AM
4445 p = (bfd_byte *) bfd_alloc (htab->elf.dynobj, htab->sfpr->_raw_size);
4446 if (p == NULL)
b34976b6 4447 return FALSE;
721956f4
AM
4448 htab->sfpr->contents = p;
4449
4450 for (i = lowest_savef; i <= MAX_SAVE_FPR; i++)
4451 {
4452 unsigned int fpr = i << 21;
4453 unsigned int stackoff = (1 << 16) - (MAX_SAVE_FPR + 1 - i) * 8;
4454 bfd_put_32 (htab->elf.dynobj, STFD_FR0_0R1 + fpr + stackoff, p);
4455 p += 4;
4456 }
4457 if (lowest_savef <= MAX_SAVE_FPR)
4458 {
82bd7b59
AM
4459 bfd_put_32 (htab->elf.dynobj, BLR, p);
4460 p += 4;
721956f4 4461 }
82bd7b59 4462
721956f4
AM
4463 for (i = lowest_restf; i <= MAX_SAVE_FPR; i++)
4464 {
4465 unsigned int fpr = i << 21;
4466 unsigned int stackoff = (1 << 16) - (MAX_SAVE_FPR + 1 - i) * 8;
4467 bfd_put_32 (htab->elf.dynobj, LFD_FR0_0R1 + fpr + stackoff, p);
82bd7b59
AM
4468 p += 4;
4469 }
721956f4
AM
4470 if (lowest_restf <= MAX_SAVE_FPR
4471 || htab->sfpr->_raw_size == 4)
4472 {
4473 bfd_put_32 (htab->elf.dynobj, BLR, p);
4474 }
82bd7b59 4475
b34976b6 4476 return TRUE;
e86ce104
AM
4477}
4478
4479/* Adjust a symbol defined by a dynamic object and referenced by a
4480 regular object. The current definition is in some section of the
4481 dynamic object, but we're not including those sections. We have to
4482 change the definition to something the rest of the link can
4483 understand. */
4484
b34976b6 4485static bfd_boolean
e86ce104
AM
4486ppc64_elf_adjust_dynamic_symbol (info, h)
4487 struct bfd_link_info *info;
4488 struct elf_link_hash_entry *h;
4489{
4490 struct ppc_link_hash_table *htab;
e86ce104
AM
4491 asection *s;
4492 unsigned int power_of_two;
4493
4494 htab = ppc_hash_table (info);
4495
4496 /* Deal with function syms. */
4497 if (h->type == STT_FUNC
4498 || (h->elf_link_hash_flags & ELF_LINK_HASH_NEEDS_PLT) != 0)
4499 {
4500 /* Clear procedure linkage table information for any symbol that
4501 won't need a .plt entry. */
411e1bfb
AM
4502 struct plt_entry *ent;
4503 for (ent = h->plt.plist; ent != NULL; ent = ent->next)
4504 if (ent->plt.refcount > 0)
4505 break;
e86ce104 4506 if (!((struct ppc_link_hash_entry *) h)->is_func_descriptor
411e1bfb 4507 || ent == NULL
9c7a29a3
AM
4508 || SYMBOL_CALLS_LOCAL (info, h)
4509 || (ELF_ST_VISIBILITY (h->other) != STV_DEFAULT
4510 && h->root.type == bfd_link_hash_undefweak))
40b8271b 4511 {
411e1bfb 4512 h->plt.plist = NULL;
40b8271b 4513 h->elf_link_hash_flags &= ~ELF_LINK_HASH_NEEDS_PLT;
40b8271b 4514 }
5bd4f169 4515 }
bbd7ec4a 4516 else
411e1bfb 4517 h->plt.plist = NULL;
5bd4f169
AM
4518
4519 /* If this is a weak symbol, and there is a real definition, the
4520 processor independent code will have arranged for us to see the
4521 real definition first, and we can just use the same value. */
4522 if (h->weakdef != NULL)
4523 {
4524 BFD_ASSERT (h->weakdef->root.type == bfd_link_hash_defined
4525 || h->weakdef->root.type == bfd_link_hash_defweak);
4526 h->root.u.def.section = h->weakdef->root.u.def.section;
4527 h->root.u.def.value = h->weakdef->root.u.def.value;
a23b6845
AM
4528 if (ELIMINATE_COPY_RELOCS)
4529 h->elf_link_hash_flags
4530 = ((h->elf_link_hash_flags & ~ELF_LINK_NON_GOT_REF)
4531 | (h->weakdef->elf_link_hash_flags & ELF_LINK_NON_GOT_REF));
b34976b6 4532 return TRUE;
5bd4f169
AM
4533 }
4534
4535 /* This is a reference to a symbol defined by a dynamic object which
4536 is not a function. */
4537
4538 /* If we are creating a shared library, we must presume that the
4539 only references to the symbol are via the global offset table.
4540 For such cases we need not do anything here; the relocations will
4541 be handled correctly by relocate_section. */
4542 if (info->shared)
b34976b6 4543 return TRUE;
5bd4f169 4544
65f38f15
AM
4545 /* If there are no references to this symbol that do not use the
4546 GOT, we don't need to generate a copy reloc. */
4547 if ((h->elf_link_hash_flags & ELF_LINK_NON_GOT_REF) == 0)
b34976b6 4548 return TRUE;
65f38f15 4549
f4656909 4550 if (ELIMINATE_COPY_RELOCS)
65f38f15 4551 {
f4656909
AM
4552 struct ppc_link_hash_entry * eh;
4553 struct ppc_dyn_relocs *p;
65f38f15 4554
f4656909
AM
4555 eh = (struct ppc_link_hash_entry *) h;
4556 for (p = eh->dyn_relocs; p != NULL; p = p->next)
4557 {
4558 s = p->sec->output_section;
4559 if (s != NULL && (s->flags & SEC_READONLY) != 0)
4560 break;
4561 }
4562
4563 /* If we didn't find any dynamic relocs in read-only sections, then
4564 we'll be keeping the dynamic relocs and avoiding the copy reloc. */
4565 if (p == NULL)
4566 {
4567 h->elf_link_hash_flags &= ~ELF_LINK_NON_GOT_REF;
4568 return TRUE;
4569 }
65f38f15
AM
4570 }
4571
5bd4f169
AM
4572 /* We must allocate the symbol in our .dynbss section, which will
4573 become part of the .bss section of the executable. There will be
4574 an entry for this symbol in the .dynsym section. The dynamic
4575 object will contain position independent code, so all references
4576 from the dynamic object to this symbol will go through the global
4577 offset table. The dynamic linker will use the .dynsym entry to
4578 determine the address it must put in the global offset table, so
4579 both the dynamic object and the regular object will refer to the
4580 same memory location for the variable. */
5bd4f169 4581
04c9666a
AM
4582 /* We must generate a R_PPC64_COPY reloc to tell the dynamic linker
4583 to copy the initial value out of the dynamic object and into the
5bd4f169
AM
4584 runtime process image. We need to remember the offset into the
4585 .rela.bss section we are going to use. */
4586 if ((h->root.u.def.section->flags & SEC_ALLOC) != 0)
4587 {
65f38f15 4588 htab->srelbss->_raw_size += sizeof (Elf64_External_Rela);
5bd4f169
AM
4589 h->elf_link_hash_flags |= ELF_LINK_HASH_NEEDS_COPY;
4590 }
4591
4592 /* We need to figure out the alignment required for this symbol. I
4593 have no idea how ELF linkers handle this. */
4594 power_of_two = bfd_log2 (h->size);
4595 if (power_of_two > 4)
4596 power_of_two = 4;
4597
4598 /* Apply the required alignment. */
65f38f15
AM
4599 s = htab->sdynbss;
4600 s->_raw_size = BFD_ALIGN (s->_raw_size, (bfd_size_type) (1 << power_of_two));
4601 if (power_of_two > bfd_get_section_alignment (htab->elf.dynobj, s))
5bd4f169 4602 {
65f38f15 4603 if (! bfd_set_section_alignment (htab->elf.dynobj, s, power_of_two))
b34976b6 4604 return FALSE;
5bd4f169
AM
4605 }
4606
4607 /* Define the symbol as being at this point in the section. */
4608 h->root.u.def.section = s;
4609 h->root.u.def.value = s->_raw_size;
4610
4611 /* Increment the section size to make room for the symbol. */
4612 s->_raw_size += h->size;
4613
b34976b6 4614 return TRUE;
5bd4f169
AM
4615}
4616
e86ce104
AM
4617/* If given a function descriptor symbol, hide both the function code
4618 sym and the descriptor. */
4619static void
4620ppc64_elf_hide_symbol (info, h, force_local)
4621 struct bfd_link_info *info;
4622 struct elf_link_hash_entry *h;
b34976b6 4623 bfd_boolean force_local;
e86ce104
AM
4624{
4625 _bfd_elf_link_hash_hide_symbol (info, h, force_local);
4626
4627 if (((struct ppc_link_hash_entry *) h)->is_func_descriptor)
4628 {
721956f4 4629 struct elf_link_hash_entry *fh = ((struct ppc_link_hash_entry *) h)->oh;
e86ce104 4630
721956f4 4631 if (fh == NULL)
d1329ca3
AM
4632 {
4633 const char *p, *q;
4634 struct ppc_link_hash_table *htab;
4635 char save;
4636
4637 /* We aren't supposed to use alloca in BFD because on
4638 systems which do not have alloca the version in libiberty
4639 calls xmalloc, which might cause the program to crash
4640 when it runs out of memory. This function doesn't have a
4641 return status, so there's no way to gracefully return an
4642 error. So cheat. We know that string[-1] can be safely
4643 dereferenced; It's either a string in an ELF string
4644 table, or allocated in an objalloc structure. */
4645
4646 p = h->root.root.string - 1;
4647 save = *p;
4648 *(char *) p = '.';
4649 htab = ppc_hash_table (info);
b34976b6 4650 fh = elf_link_hash_lookup (&htab->elf, p, FALSE, FALSE, FALSE);
d1329ca3
AM
4651 *(char *) p = save;
4652
4653 /* Unfortunately, if it so happens that the string we were
4654 looking for was allocated immediately before this string,
4655 then we overwrote the string terminator. That's the only
4656 reason the lookup should fail. */
4657 if (fh == NULL)
4658 {
4659 q = h->root.root.string + strlen (h->root.root.string);
4660 while (q >= h->root.root.string && *q == *p)
4661 --q, --p;
4662 if (q < h->root.root.string && *p == '.')
b34976b6 4663 fh = elf_link_hash_lookup (&htab->elf, p, FALSE, FALSE, FALSE);
d1329ca3
AM
4664 }
4665 if (fh != NULL)
4666 {
4667 ((struct ppc_link_hash_entry *) h)->oh = fh;
4668 ((struct ppc_link_hash_entry *) fh)->oh = h;
4669 }
4670 }
e86ce104
AM
4671 if (fh != NULL)
4672 _bfd_elf_link_hash_hide_symbol (info, fh, force_local);
4673 }
4674}
4675
411e1bfb 4676static bfd_boolean
e7b938ca 4677get_sym_h (hp, symp, symsecp, tls_maskp, locsymsp, r_symndx, ibfd)
411e1bfb
AM
4678 struct elf_link_hash_entry **hp;
4679 Elf_Internal_Sym **symp;
4680 asection **symsecp;
e7b938ca 4681 char **tls_maskp;
411e1bfb
AM
4682 Elf_Internal_Sym **locsymsp;
4683 unsigned long r_symndx;
4684 bfd *ibfd;
4685{
4686 Elf_Internal_Shdr *symtab_hdr = &elf_tdata (ibfd)->symtab_hdr;
4687
4688 if (r_symndx >= symtab_hdr->sh_info)
4689 {
4690 struct elf_link_hash_entry **sym_hashes = elf_sym_hashes (ibfd);
4691 struct elf_link_hash_entry *h;
4692
4693 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
4694 while (h->root.type == bfd_link_hash_indirect
4695 || h->root.type == bfd_link_hash_warning)
4696 h = (struct elf_link_hash_entry *) h->root.u.i.link;
4697
4698 if (hp != NULL)
4699 *hp = h;
4700
4701 if (symp != NULL)
4702 *symp = NULL;
4703
4704 if (symsecp != NULL)
4705 {
4706 asection *symsec = NULL;
4707 if (h->root.type == bfd_link_hash_defined
4708 || h->root.type == bfd_link_hash_defweak)
4709 symsec = h->root.u.def.section;
4710 *symsecp = symsec;
4711 }
4712
e7b938ca 4713 if (tls_maskp != NULL)
411e1bfb
AM
4714 {
4715 struct ppc_link_hash_entry *eh;
4716
4717 eh = (struct ppc_link_hash_entry *) h;
e7b938ca 4718 *tls_maskp = &eh->tls_mask;
411e1bfb
AM
4719 }
4720 }
4721 else
4722 {
4723 Elf_Internal_Sym *sym;
4724 Elf_Internal_Sym *locsyms = *locsymsp;
4725
4726 if (locsyms == NULL)
4727 {
4728 locsyms = (Elf_Internal_Sym *) symtab_hdr->contents;
4729 if (locsyms == NULL)
4730 locsyms = bfd_elf_get_elf_syms (ibfd, symtab_hdr,
4731 symtab_hdr->sh_info,
4732 0, NULL, NULL, NULL);
4733 if (locsyms == NULL)
4734 return FALSE;
4735 *locsymsp = locsyms;
4736 }
4737 sym = locsyms + r_symndx;
4738
4739 if (hp != NULL)
4740 *hp = NULL;
4741
4742 if (symp != NULL)
4743 *symp = sym;
4744
4745 if (symsecp != NULL)
4746 {
4747 asection *symsec = NULL;
4748 if ((sym->st_shndx != SHN_UNDEF
4749 && sym->st_shndx < SHN_LORESERVE)
4750 || sym->st_shndx > SHN_HIRESERVE)
4751 symsec = bfd_section_from_elf_index (ibfd, sym->st_shndx);
4752 *symsecp = symsec;
4753 }
4754
e7b938ca 4755 if (tls_maskp != NULL)
411e1bfb
AM
4756 {
4757 struct got_entry **lgot_ents;
e7b938ca 4758 char *tls_mask;
411e1bfb 4759
e7b938ca 4760 tls_mask = NULL;
411e1bfb
AM
4761 lgot_ents = elf_local_got_ents (ibfd);
4762 if (lgot_ents != NULL)
4763 {
e7b938ca
AM
4764 char *lgot_masks = (char *) (lgot_ents + symtab_hdr->sh_info);
4765 tls_mask = &lgot_masks[r_symndx];
411e1bfb 4766 }
e7b938ca 4767 *tls_maskp = tls_mask;
411e1bfb
AM
4768 }
4769 }
4770 return TRUE;
4771}
4772
e7b938ca 4773/* Returns TLS_MASKP for the given REL symbol. Function return is 0 on
951fd09b
AM
4774 error, 2 on a toc GD type suitable for optimization, 3 on a toc LD
4775 type suitable for optimization, and 1 otherwise. */
4776
4777static int
e7b938ca
AM
4778get_tls_mask (tls_maskp, locsymsp, rel, ibfd)
4779 char **tls_maskp;
411e1bfb
AM
4780 Elf_Internal_Sym **locsymsp;
4781 const Elf_Internal_Rela *rel;
4782 bfd *ibfd;
4783{
4784 unsigned long r_symndx;
951fd09b 4785 unsigned int next_r;
411e1bfb
AM
4786 struct elf_link_hash_entry *h;
4787 Elf_Internal_Sym *sym;
4788 asection *sec;
4789 bfd_vma off;
4790
4791 r_symndx = ELF64_R_SYM (rel->r_info);
e7b938ca 4792 if (!get_sym_h (&h, &sym, &sec, tls_maskp, locsymsp, r_symndx, ibfd))
951fd09b 4793 return 0;
411e1bfb 4794
e7b938ca 4795 if ((*tls_maskp != NULL && **tls_maskp != 0)
411e1bfb
AM
4796 || sec == NULL
4797 || ppc64_elf_section_data (sec)->t_symndx == NULL)
951fd09b 4798 return 1;
411e1bfb
AM
4799
4800 /* Look inside a TOC section too. */
4801 if (h != NULL)
4802 {
4803 BFD_ASSERT (h->root.type == bfd_link_hash_defined);
4804 off = h->root.u.def.value;
4805 }
4806 else
4807 off = sym->st_value;
4808 off += rel->r_addend;
4809 BFD_ASSERT (off % 8 == 0);
4810 r_symndx = ppc64_elf_section_data (sec)->t_symndx[off / 8];
951fd09b 4811 next_r = ppc64_elf_section_data (sec)->t_symndx[off / 8 + 1];
e7b938ca 4812 if (!get_sym_h (&h, &sym, &sec, tls_maskp, locsymsp, r_symndx, ibfd))
951fd09b
AM
4813 return 0;
4814 if (h == NULL
4815 || h->root.type == bfd_link_hash_defined
4816 || h->root.type == bfd_link_hash_defweak)
4817 {
4818 if (next_r == (unsigned) -1)
4819 return 2;
4820 if (next_r == (unsigned) -2
4821 && (h == NULL
4822 || !(h->elf_link_hash_flags & ELF_LINK_HASH_DEF_DYNAMIC)))
4823 return 3;
4824 }
4825 return 1;
411e1bfb
AM
4826}
4827
b34976b6 4828bfd_boolean
d6fe2dc1 4829ppc64_elf_edit_opd (obfd, info)
1e2f5b6e
AM
4830 bfd *obfd;
4831 struct bfd_link_info *info;
4832{
4833 bfd *ibfd;
1e2f5b6e 4834
411e1bfb 4835 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link_next)
1e2f5b6e
AM
4836 {
4837 asection *sec;
4838 Elf_Internal_Rela *relstart, *rel, *relend;
4839 Elf_Internal_Shdr *symtab_hdr;
6cdc0ccc 4840 Elf_Internal_Sym *local_syms;
1e2f5b6e
AM
4841 struct elf_link_hash_entry **sym_hashes;
4842 bfd_vma offset;
d6fe2dc1 4843 bfd_size_type amt;
1e2f5b6e 4844 long *adjust;
b34976b6 4845 bfd_boolean need_edit;
1e2f5b6e
AM
4846
4847 sec = bfd_get_section_by_name (ibfd, ".opd");
4848 if (sec == NULL)
4849 continue;
4850
d6fe2dc1 4851 amt = sec->_raw_size * sizeof (long) / 24;
f0abc2a1 4852 adjust = ppc64_elf_section_data (sec)->opd.adjust;
d6fe2dc1
AM
4853 if (adjust == NULL)
4854 {
4855 /* Must be a ld -r link. ie. check_relocs hasn't been
4856 called. */
4857 adjust = (long *) bfd_zalloc (obfd, amt);
f0abc2a1 4858 ppc64_elf_section_data (sec)->opd.adjust = adjust;
d6fe2dc1
AM
4859 }
4860 memset (adjust, 0, (size_t) amt);
1e2f5b6e
AM
4861
4862 if (sec->output_section == bfd_abs_section_ptr)
4863 continue;
4864
4865 /* Look through the section relocs. */
4866 if ((sec->flags & SEC_RELOC) == 0 || sec->reloc_count == 0)
4867 continue;
4868
6cdc0ccc 4869 local_syms = NULL;
1e2f5b6e
AM
4870 symtab_hdr = &elf_tdata (ibfd)->symtab_hdr;
4871 sym_hashes = elf_sym_hashes (ibfd);
4872
4873 /* Read the relocations. */
45d6a902
AM
4874 relstart = _bfd_elf_link_read_relocs (ibfd, sec, (PTR) NULL,
4875 (Elf_Internal_Rela *) NULL,
4876 info->keep_memory);
1e2f5b6e 4877 if (relstart == NULL)
b34976b6 4878 return FALSE;
1e2f5b6e
AM
4879
4880 /* First run through the relocs to check they are sane, and to
4881 determine whether we need to edit this opd section. */
b34976b6 4882 need_edit = FALSE;
1e2f5b6e
AM
4883 offset = 0;
4884 relend = relstart + sec->reloc_count;
4885 for (rel = relstart; rel < relend; rel++)
4886 {
04c9666a 4887 enum elf_ppc64_reloc_type r_type;
1e2f5b6e
AM
4888 unsigned long r_symndx;
4889 asection *sym_sec;
4890 struct elf_link_hash_entry *h;
4891 Elf_Internal_Sym *sym;
4892
4893 /* .opd contains a regular array of 24 byte entries. We're
4894 only interested in the reloc pointing to a function entry
4895 point. */
04c9666a 4896 r_type = (enum elf_ppc64_reloc_type) ELF64_R_TYPE (rel->r_info);
1e2f5b6e
AM
4897 if (r_type == R_PPC64_TOC)
4898 continue;
4899
4900 if (r_type != R_PPC64_ADDR64)
4901 {
4902 (*_bfd_error_handler)
4903 (_("%s: unexpected reloc type %u in .opd section"),
4904 bfd_archive_filename (ibfd), r_type);
b34976b6 4905 need_edit = FALSE;
1e2f5b6e
AM
4906 break;
4907 }
4908
4909 if (rel + 1 >= relend)
4910 continue;
04c9666a 4911 r_type = (enum elf_ppc64_reloc_type) ELF64_R_TYPE ((rel + 1)->r_info);
1e2f5b6e
AM
4912 if (r_type != R_PPC64_TOC)
4913 continue;
4914
4915 if (rel->r_offset != offset)
4916 {
4917 /* If someone messes with .opd alignment then after a
4918 "ld -r" we might have padding in the middle of .opd.
4919 Also, there's nothing to prevent someone putting
4920 something silly in .opd with the assembler. No .opd
b34976b6 4921 optimization for them! */
1e2f5b6e
AM
4922 (*_bfd_error_handler)
4923 (_("%s: .opd is not a regular array of opd entries"),
4924 bfd_archive_filename (ibfd));
b34976b6 4925 need_edit = FALSE;
1e2f5b6e
AM
4926 break;
4927 }
4928
4929 r_symndx = ELF64_R_SYM (rel->r_info);
411e1bfb
AM
4930 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms,
4931 r_symndx, ibfd))
4932 goto error_free_rel;
1e2f5b6e
AM
4933
4934 if (sym_sec == NULL || sym_sec->owner == NULL)
4935 {
411e1bfb
AM
4936 const char *sym_name;
4937 if (h != NULL)
4938 sym_name = h->root.root.string;
4939 else
4940 sym_name = bfd_elf_local_sym_name (ibfd, sym);
4941
1e2f5b6e
AM
4942 (*_bfd_error_handler)
4943 (_("%s: undefined sym `%s' in .opd section"),
4944 bfd_archive_filename (ibfd),
411e1bfb 4945 sym_name);
b34976b6 4946 need_edit = FALSE;
1e2f5b6e
AM
4947 break;
4948 }
4949
51020317
AM
4950 /* opd entries are always for functions defined in the
4951 current input bfd. If the symbol isn't defined in the
4952 input bfd, then we won't be using the function in this
4953 bfd; It must be defined in a linkonce section in another
4954 bfd, or is weak. It's also possible that we are
4955 discarding the function due to a linker script /DISCARD/,
4956 which we test for via the output_section. */
4957 if (sym_sec->owner != ibfd
4958 || sym_sec->output_section == bfd_abs_section_ptr)
b34976b6 4959 need_edit = TRUE;
1e2f5b6e
AM
4960
4961 offset += 24;
4962 }
4963
4964 if (need_edit)
4965 {
4966 Elf_Internal_Rela *write_rel;
4967 bfd_byte *rptr, *wptr;
b34976b6 4968 bfd_boolean skip;
1e2f5b6e
AM
4969
4970 /* This seems a waste of time as input .opd sections are all
4971 zeros as generated by gcc, but I suppose there's no reason
4972 this will always be so. We might start putting something in
4973 the third word of .opd entries. */
4974 if ((sec->flags & SEC_IN_MEMORY) == 0)
4975 {
4976 bfd_byte *loc = bfd_alloc (ibfd, sec->_raw_size);
6cdc0ccc
AM
4977 if (loc == NULL
4978 || !bfd_get_section_contents (ibfd, sec, loc, (bfd_vma) 0,
4979 sec->_raw_size))
4980 {
4981 if (local_syms != NULL
4982 && symtab_hdr->contents != (unsigned char *) local_syms)
4983 free (local_syms);
4984 error_free_rel:
4985 if (elf_section_data (sec)->relocs != relstart)
4986 free (relstart);
b34976b6 4987 return FALSE;
6cdc0ccc 4988 }
1e2f5b6e
AM
4989 sec->contents = loc;
4990 sec->flags |= (SEC_IN_MEMORY | SEC_HAS_CONTENTS);
4991 }
4992
4993 elf_section_data (sec)->relocs = relstart;
4994
4995 wptr = sec->contents;
4996 rptr = sec->contents;
4997 write_rel = relstart;
b34976b6 4998 skip = FALSE;
1e2f5b6e
AM
4999 offset = 0;
5000 for (rel = relstart; rel < relend; rel++)
5001 {
5002 if (rel->r_offset == offset)
5003 {
5004 unsigned long r_symndx;
5005 asection *sym_sec;
5006 struct elf_link_hash_entry *h;
5007 Elf_Internal_Sym *sym;
5008
5009 r_symndx = ELF64_R_SYM (rel->r_info);
411e1bfb
AM
5010 get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms,
5011 r_symndx, ibfd);
1e2f5b6e 5012
51020317
AM
5013 skip = (sym_sec->owner != ibfd
5014 || sym_sec->output_section == bfd_abs_section_ptr);
a4aa0fb7
AM
5015 if (skip)
5016 {
0be617ce 5017 if (h != NULL && sym_sec->owner == ibfd)
a4aa0fb7
AM
5018 {
5019 /* Arrange for the function descriptor sym
5020 to be dropped. */
d6fe2dc1 5021 struct ppc_link_hash_entry *fdh;
a4aa0fb7
AM
5022 struct ppc_link_hash_entry *fh;
5023
5024 fh = (struct ppc_link_hash_entry *) h;
d6fe2dc1
AM
5025 fdh = (struct ppc_link_hash_entry *) fh->oh;
5026 if (fdh == NULL)
5027 {
5028 const char *fd_name;
5029 struct ppc_link_hash_table *htab;
5030
5031 fd_name = h->root.root.string + 1;
5032 htab = ppc_hash_table (info);
5033 fdh = (struct ppc_link_hash_entry *)
5034 elf_link_hash_lookup (&htab->elf, fd_name,
b34976b6 5035 FALSE, FALSE, FALSE);
d6fe2dc1
AM
5036 fdh->is_func_descriptor = 1;
5037 fdh->oh = &fh->elf;
5038 fh->is_func = 1;
5039 fh->oh = &fdh->elf;
5040 }
5041
5042 fdh->elf.root.u.def.value = 0;
5043 fdh->elf.root.u.def.section = sym_sec;
a4aa0fb7
AM
5044 }
5045 }
5046 else
1e2f5b6e
AM
5047 {
5048 /* We'll be keeping this opd entry. */
5049
5050 if (h != NULL)
5051 {
5052 /* Redefine the function descriptor symbol
5053 to this location in the opd section.
5054 We've checked above that opd relocs are
5055 ordered. */
d6fe2dc1 5056 struct ppc_link_hash_entry *fdh;
1e2f5b6e
AM
5057 struct ppc_link_hash_entry *fh;
5058
5059 fh = (struct ppc_link_hash_entry *) h;
d6fe2dc1
AM
5060 fdh = (struct ppc_link_hash_entry *) fh->oh;
5061 if (fdh == NULL)
5062 {
5063 const char *fd_name;
5064 struct ppc_link_hash_table *htab;
5065
5066 fd_name = h->root.root.string + 1;
5067 htab = ppc_hash_table (info);
5068 fdh = (struct ppc_link_hash_entry *)
5069 elf_link_hash_lookup (&htab->elf, fd_name,
b34976b6 5070 FALSE, FALSE, FALSE);
d6fe2dc1
AM
5071 fdh->is_func_descriptor = 1;
5072 fdh->oh = &fh->elf;
5073 fh->is_func = 1;
5074 fh->oh = &fdh->elf;
5075 }
5076
5077 fdh->elf.root.u.def.value = wptr - sec->contents;
1e2f5b6e
AM
5078 }
5079 else
5080 {
6cdc0ccc
AM
5081 /* Local syms are a bit tricky. We could
5082 tweak them as they can be cached, but
5083 we'd need to look through the local syms
5084 for the function descriptor sym which we
5085 don't have at the moment. So keep an
b34976b6 5086 array of adjustments. */
7f6a7663 5087 adjust[rel->r_offset / 24] = wptr - rptr;
1e2f5b6e
AM
5088 }
5089
5090 if (wptr != rptr)
5091 memcpy (wptr, rptr, 24);
5092 wptr += 24;
5093 }
5094 rptr += 24;
5095 offset += 24;
5096 }
5097
5098 /* We need to adjust any reloc offsets to point to the
5099 new opd entries. While we're at it, we may as well
5100 remove redundant relocs. */
5101 if (!skip)
5102 {
5103 rel->r_offset += wptr - rptr;
5104 if (write_rel != rel)
5105 memcpy (write_rel, rel, sizeof (*rel));
5106 ++write_rel;
5107 }
5108 }
5109
5110 sec->_cooked_size = wptr - sec->contents;
5111 sec->reloc_count = write_rel - relstart;
cdcf6e38
AM
5112 /* Fudge the size too, as this is used later in
5113 elf_bfd_final_link if we are emitting relocs. */
5114 elf_section_data (sec)->rel_hdr.sh_size
5115 = sec->reloc_count * elf_section_data (sec)->rel_hdr.sh_entsize;
5116 BFD_ASSERT (elf_section_data (sec)->rel_hdr2 == NULL);
1e2f5b6e 5117 }
6cdc0ccc 5118 else if (elf_section_data (sec)->relocs != relstart)
1e2f5b6e 5119 free (relstart);
6cdc0ccc 5120
411e1bfb
AM
5121 if (local_syms != NULL
5122 && symtab_hdr->contents != (unsigned char *) local_syms)
5123 {
5124 if (!info->keep_memory)
5125 free (local_syms);
5126 else
5127 symtab_hdr->contents = (unsigned char *) local_syms;
5128 }
5129 }
5130
5131 return TRUE;
5132}
5133
951fd09b 5134/* Set htab->tls_sec. */
411e1bfb
AM
5135
5136bfd_boolean
951fd09b 5137ppc64_elf_tls_setup (obfd, info)
411e1bfb
AM
5138 bfd *obfd;
5139 struct bfd_link_info *info;
5140{
5141 asection *tls;
411e1bfb
AM
5142 struct ppc_link_hash_table *htab;
5143
411e1bfb
AM
5144 for (tls = obfd->sections; tls != NULL; tls = tls->next)
5145 if ((tls->flags & (SEC_THREAD_LOCAL | SEC_LOAD))
5146 == (SEC_THREAD_LOCAL | SEC_LOAD))
5147 break;
411e1bfb
AM
5148
5149 htab = ppc_hash_table (info);
5150 htab->tls_sec = tls;
a48ebf4d
AM
5151
5152 if (htab->tls_get_addr != NULL)
5153 {
5154 struct elf_link_hash_entry *h = htab->tls_get_addr;
5155
5156 while (h->root.type == bfd_link_hash_indirect
5157 || h->root.type == bfd_link_hash_warning)
5158 h = (struct elf_link_hash_entry *) h->root.u.i.link;
5159
5160 htab->tls_get_addr = h;
5161 }
5162
951fd09b
AM
5163 return tls != NULL;
5164}
411e1bfb 5165
951fd09b
AM
5166/* Run through all the TLS relocs looking for optimization
5167 opportunities. The linker has been hacked (see ppc64elf.em) to do
5168 a preliminary section layout so that we know the TLS segment
5169 offsets. We can't optimize earlier because some optimizations need
5170 to know the tp offset, and we need to optimize before allocating
5171 dynamic relocations. */
5172
5173bfd_boolean
5174ppc64_elf_tls_optimize (obfd, info)
5175 bfd *obfd ATTRIBUTE_UNUSED;
5176 struct bfd_link_info *info;
5177{
5178 bfd *ibfd;
5179 asection *sec;
5180 struct ppc_link_hash_table *htab;
5181
5182 if (info->relocateable || info->shared)
411e1bfb
AM
5183 return TRUE;
5184
951fd09b 5185 htab = ppc_hash_table (info);
411e1bfb
AM
5186 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link_next)
5187 {
5188 Elf_Internal_Sym *locsyms = NULL;
5189
5190 for (sec = ibfd->sections; sec != NULL; sec = sec->next)
5191 if (sec->has_tls_reloc && !bfd_is_abs_section (sec->output_section))
5192 {
5193 Elf_Internal_Rela *relstart, *rel, *relend;
5194 int expecting_tls_get_addr;
5195
5196 /* Read the relocations. */
45d6a902
AM
5197 relstart = _bfd_elf_link_read_relocs (ibfd, sec, (PTR) NULL,
5198 (Elf_Internal_Rela *) NULL,
5199 info->keep_memory);
411e1bfb
AM
5200 if (relstart == NULL)
5201 return FALSE;
5202
5203 expecting_tls_get_addr = 0;
5204 relend = relstart + sec->reloc_count;
5205 for (rel = relstart; rel < relend; rel++)
5206 {
5207 enum elf_ppc64_reloc_type r_type;
5208 unsigned long r_symndx;
5209 struct elf_link_hash_entry *h;
5210 Elf_Internal_Sym *sym;
5211 asection *sym_sec;
e7b938ca
AM
5212 char *tls_mask;
5213 char tls_set, tls_clear, tls_type = 0;
411e1bfb 5214 bfd_vma value;
951fd09b 5215 bfd_boolean ok_tprel, is_local;
411e1bfb
AM
5216
5217 r_symndx = ELF64_R_SYM (rel->r_info);
e7b938ca 5218 if (!get_sym_h (&h, &sym, &sym_sec, &tls_mask, &locsyms,
411e1bfb
AM
5219 r_symndx, ibfd))
5220 {
5221 err_free_rel:
5222 if (elf_section_data (sec)->relocs != relstart)
5223 free (relstart);
5224 if (locsyms != NULL
5225 && (elf_tdata (ibfd)->symtab_hdr.contents
5226 != (unsigned char *) locsyms))
5227 free (locsyms);
5228 return FALSE;
5229 }
5230
5231 if (h != NULL)
5232 {
5233 if (h->root.type != bfd_link_hash_defined
5234 && h->root.type != bfd_link_hash_defweak)
5235 continue;
5236 value = h->root.u.def.value;
5237 }
5238 else
5239 value = sym->st_value;
951fd09b 5240
411e1bfb 5241 ok_tprel = FALSE;
951fd09b
AM
5242 is_local = FALSE;
5243 if (h == NULL
5244 || !(h->elf_link_hash_flags & ELF_LINK_HASH_DEF_DYNAMIC))
411e1bfb 5245 {
951fd09b 5246 is_local = TRUE;
411e1bfb
AM
5247 value += sym_sec->output_offset;
5248 value += sym_sec->output_section->vma;
5249 value -= htab->tls_sec->vma;
5250 ok_tprel = (value + TP_OFFSET + ((bfd_vma) 1 << 31)
5251 < (bfd_vma) 1 << 32);
5252 }
5253
5254 r_type
5255 = (enum elf_ppc64_reloc_type) ELF64_R_TYPE (rel->r_info);
5256 switch (r_type)
5257 {
5258 case R_PPC64_GOT_TLSLD16:
5259 case R_PPC64_GOT_TLSLD16_LO:
5260 case R_PPC64_GOT_TLSLD16_HI:
5261 case R_PPC64_GOT_TLSLD16_HA:
951fd09b
AM
5262 /* These relocs should never be against a symbol
5263 defined in a shared lib. Leave them alone if
5264 that turns out to be the case. */
d881513a 5265 htab->tlsld_got.refcount -= 1;
951fd09b
AM
5266 if (!is_local)
5267 continue;
5268
951fd09b
AM
5269 /* LD -> LE */
5270 tls_set = 0;
5271 tls_clear = TLS_LD;
e7b938ca 5272 tls_type = TLS_TLS | TLS_LD;
411e1bfb
AM
5273 expecting_tls_get_addr = 1;
5274 break;
5275
5276 case R_PPC64_GOT_TLSGD16:
5277 case R_PPC64_GOT_TLSGD16_LO:
5278 case R_PPC64_GOT_TLSGD16_HI:
5279 case R_PPC64_GOT_TLSGD16_HA:
951fd09b 5280 if (ok_tprel)
411e1bfb
AM
5281 /* GD -> LE */
5282 tls_set = 0;
5283 else
5284 /* GD -> IE */
951fd09b
AM
5285 tls_set = TLS_TLS | TLS_TPRELGD;
5286 tls_clear = TLS_GD;
e7b938ca 5287 tls_type = TLS_TLS | TLS_GD;
411e1bfb
AM
5288 expecting_tls_get_addr = 1;
5289 break;
5290
5291 case R_PPC64_GOT_TPREL16_DS:
5292 case R_PPC64_GOT_TPREL16_LO_DS:
5293 case R_PPC64_GOT_TPREL16_HI:
5294 case R_PPC64_GOT_TPREL16_HA:
5295 expecting_tls_get_addr = 0;
5296 if (ok_tprel)
5297 {
5298 /* IE -> LE */
5299 tls_set = 0;
5300 tls_clear = TLS_TPREL;
e7b938ca 5301 tls_type = TLS_TLS | TLS_TPREL;
411e1bfb
AM
5302 break;
5303 }
5304 else
5305 continue;
5306
5307 case R_PPC64_REL14:
5308 case R_PPC64_REL14_BRTAKEN:
5309 case R_PPC64_REL14_BRNTAKEN:
5310 case R_PPC64_REL24:
5311 if (h != NULL
5312 && h == htab->tls_get_addr)
5313 {
5314 if (!expecting_tls_get_addr
5315 && rel != relstart
5316 && ((ELF64_R_TYPE (rel[-1].r_info)
5317 == R_PPC64_TOC16)
5318 || (ELF64_R_TYPE (rel[-1].r_info)
5319 == R_PPC64_TOC16_LO)))
5320 {
5321 /* Check for toc tls entries. */
5322 char *toc_tls;
951fd09b 5323 int retval;
411e1bfb 5324
e7b938ca 5325 retval = get_tls_mask (&toc_tls, &locsyms,
951fd09b
AM
5326 rel - 1, ibfd);
5327 if (retval == 0)
411e1bfb
AM
5328 goto err_free_rel;
5329 if (toc_tls != NULL)
951fd09b 5330 expecting_tls_get_addr = retval > 1;
411e1bfb
AM
5331 }
5332
5333 if (expecting_tls_get_addr)
5334 {
5335 struct plt_entry *ent;
5336 for (ent = h->plt.plist; ent; ent = ent->next)
5337 if (ent->addend == 0)
5338 {
5339 if (ent->plt.refcount > 0)
5340 ent->plt.refcount -= 1;
5341 break;
5342 }
5343 }
5344 }
5345 expecting_tls_get_addr = 0;
5346 continue;
5347
5348 case R_PPC64_TPREL64:
5349 expecting_tls_get_addr = 0;
5350 if (ok_tprel)
5351 {
5352 /* IE -> LE */
5353 tls_set = TLS_EXPLICIT;
5354 tls_clear = TLS_TPREL;
5355 break;
5356 }
5357 else
5358 continue;
5359
5360 case R_PPC64_DTPMOD64:
5361 expecting_tls_get_addr = 0;
951fd09b
AM
5362 if (rel + 1 < relend
5363 && (rel[1].r_info
5364 == ELF64_R_INFO (r_symndx, R_PPC64_DTPREL64))
5365 && rel[1].r_offset == rel->r_offset + 8)
411e1bfb 5366 {
951fd09b 5367 if (ok_tprel)
411e1bfb 5368 /* GD -> LE */
951fd09b 5369 tls_set = TLS_EXPLICIT | TLS_GD;
411e1bfb
AM
5370 else
5371 /* GD -> IE */
951fd09b
AM
5372 tls_set = TLS_EXPLICIT | TLS_GD | TLS_TPRELGD;
5373 tls_clear = TLS_GD;
411e1bfb
AM
5374 }
5375 else
5376 {
951fd09b
AM
5377 if (!is_local)
5378 continue;
5379
5380 /* LD -> LE */
5381 tls_set = TLS_EXPLICIT;
5382 tls_clear = TLS_LD;
411e1bfb
AM
5383 }
5384 break;
5385
5386 default:
5387 expecting_tls_get_addr = 0;
5388 continue;
5389 }
5390
5391 if ((tls_set & TLS_EXPLICIT) == 0)
5392 {
5393 struct got_entry *ent;
5394
5395 /* Adjust got entry for this reloc. */
5396 if (h != NULL)
5397 ent = h->got.glist;
5398 else
5399 ent = elf_local_got_ents (ibfd)[r_symndx];
5400
5401 for (; ent != NULL; ent = ent->next)
5402 if (ent->addend == rel->r_addend
e7b938ca 5403 && ent->tls_type == tls_type)
411e1bfb
AM
5404 break;
5405 if (ent == NULL)
5406 abort ();
5407
5408 if (tls_set == 0)
5409 {
5410 /* We managed to get rid of a got entry. */
5411 if (ent->got.refcount > 0)
5412 ent->got.refcount -= 1;
5413 }
411e1bfb
AM
5414 }
5415 else if (h != NULL)
5416 {
5417 struct ppc_link_hash_entry * eh;
5418 struct ppc_dyn_relocs **pp;
5419 struct ppc_dyn_relocs *p;
5420
5421 /* Adjust dynamic relocs. */
5422 eh = (struct ppc_link_hash_entry *) h;
5423 for (pp = &eh->dyn_relocs;
5424 (p = *pp) != NULL;
5425 pp = &p->next)
5426 if (p->sec == sec)
5427 {
5428 /* If we got rid of a DTPMOD/DTPREL reloc
5429 pair then we'll lose one or two dyn
5430 relocs. */
951fd09b 5431 if (tls_set == (TLS_EXPLICIT | TLS_GD))
411e1bfb 5432 p->count -= 1;
951fd09b 5433 p->count -= 1;
411e1bfb
AM
5434 if (p->count == 0)
5435 *pp = p->next;
5436 break;
5437 }
5438 }
5439
e7b938ca
AM
5440 *tls_mask |= tls_set;
5441 *tls_mask &= ~tls_clear;
411e1bfb
AM
5442 }
5443
5444 if (elf_section_data (sec)->relocs != relstart)
5445 free (relstart);
5446 }
5447
5448 if (locsyms != NULL
5449 && (elf_tdata (ibfd)->symtab_hdr.contents
5450 != (unsigned char *) locsyms))
6cdc0ccc
AM
5451 {
5452 if (!info->keep_memory)
411e1bfb 5453 free (locsyms);
6cdc0ccc 5454 else
411e1bfb 5455 elf_tdata (ibfd)->symtab_hdr.contents = (unsigned char *) locsyms;
6cdc0ccc 5456 }
1e2f5b6e 5457 }
b34976b6 5458 return TRUE;
1e2f5b6e 5459}
b34976b6 5460
65f38f15
AM
5461/* This is the condition under which ppc64_elf_finish_dynamic_symbol
5462 will be called from elflink.h. If elflink.h doesn't call our
5463 finish_dynamic_symbol routine, we'll need to do something about
5464 initializing any .plt and .got entries in ppc64_elf_relocate_section. */
f4656909 5465#define WILL_CALL_FINISH_DYNAMIC_SYMBOL(DYN, SHARED, H) \
65f38f15 5466 ((DYN) \
f4656909 5467 && ((SHARED) \
65f38f15
AM
5468 || ((H)->elf_link_hash_flags & ELF_LINK_FORCED_LOCAL) == 0) \
5469 && ((H)->dynindx != -1 \
5470 || ((H)->elf_link_hash_flags & ELF_LINK_FORCED_LOCAL) != 0))
5bd4f169 5471
65f38f15
AM
5472/* Allocate space in .plt, .got and associated reloc sections for
5473 dynamic relocs. */
5bd4f169 5474
b34976b6 5475static bfd_boolean
65f38f15
AM
5476allocate_dynrelocs (h, inf)
5477 struct elf_link_hash_entry *h;
5478 PTR inf;
5bd4f169 5479{
65f38f15
AM
5480 struct bfd_link_info *info;
5481 struct ppc_link_hash_table *htab;
5bd4f169 5482 asection *s;
65f38f15
AM
5483 struct ppc_link_hash_entry *eh;
5484 struct ppc_dyn_relocs *p;
411e1bfb 5485 struct got_entry *gent;
5bd4f169 5486
e92d460e 5487 if (h->root.type == bfd_link_hash_indirect)
b34976b6 5488 return TRUE;
5bd4f169 5489
e92d460e
AM
5490 if (h->root.type == bfd_link_hash_warning)
5491 h = (struct elf_link_hash_entry *) h->root.u.i.link;
5492
65f38f15
AM
5493 info = (struct bfd_link_info *) inf;
5494 htab = ppc_hash_table (info);
5bd4f169 5495
65f38f15 5496 if (htab->elf.dynamic_sections_created
411e1bfb 5497 && h->dynindx != -1
9c7a29a3 5498 && WILL_CALL_FINISH_DYNAMIC_SYMBOL (1, info->shared, h))
5bd4f169 5499 {
411e1bfb
AM
5500 struct plt_entry *pent;
5501 bfd_boolean doneone = FALSE;
5502 for (pent = h->plt.plist; pent != NULL; pent = pent->next)
5503 if (pent->plt.refcount > 0)
5504 {
5505 BFD_ASSERT (((struct ppc_link_hash_entry *) h)->is_func_descriptor);
5506
5507 /* If this is the first .plt entry, make room for the special
5508 first entry. */
5509 s = htab->splt;
5510 if (s->_raw_size == 0)
5511 s->_raw_size += PLT_INITIAL_ENTRY_SIZE;
5512
5513 pent->plt.offset = s->_raw_size;
5514
5515 /* Make room for this entry. */
5516 s->_raw_size += PLT_ENTRY_SIZE;
5517
5518 /* Make room for the .glink code. */
5519 s = htab->sglink;
5520 if (s->_raw_size == 0)
5521 s->_raw_size += GLINK_CALL_STUB_SIZE;
5522 /* We need bigger stubs past index 32767. */
5523 if (s->_raw_size >= GLINK_CALL_STUB_SIZE + 32768*2*4)
5524 s->_raw_size += 4;
5525 s->_raw_size += 2*4;
5526
5527 /* We also need to make an entry in the .rela.plt section. */
5528 s = htab->srelplt;
5529 s->_raw_size += sizeof (Elf64_External_Rela);
5530 doneone = TRUE;
5531 }
5532 else
5533 pent->plt.offset = (bfd_vma) -1;
5534 if (!doneone)
65f38f15 5535 {
411e1bfb 5536 h->plt.plist = NULL;
65f38f15
AM
5537 h->elf_link_hash_flags &= ~ELF_LINK_HASH_NEEDS_PLT;
5538 }
5539 }
5540 else
5541 {
411e1bfb 5542 h->plt.plist = NULL;
65f38f15
AM
5543 h->elf_link_hash_flags &= ~ELF_LINK_HASH_NEEDS_PLT;
5544 }
5545
951fd09b
AM
5546 eh = (struct ppc_link_hash_entry *) h;
5547 /* Run through the TLS GD got entries first if we're changing them
5548 to TPREL. */
e7b938ca 5549 if ((eh->tls_mask & TLS_TPRELGD) != 0)
951fd09b
AM
5550 for (gent = h->got.glist; gent != NULL; gent = gent->next)
5551 if (gent->got.refcount > 0
5552 && (gent->tls_type & TLS_GD) != 0)
5553 {
5554 /* This was a GD entry that has been converted to TPREL. If
5555 there happens to be a TPREL entry we can use that one. */
5556 struct got_entry *ent;
5557 for (ent = h->got.glist; ent != NULL; ent = ent->next)
5558 if (ent->got.refcount > 0
5559 && (ent->tls_type & TLS_TPREL) != 0
5560 && ent->addend == gent->addend)
5561 {
5562 gent->got.refcount = 0;
5563 break;
5564 }
5565
5566 /* If not, then we'll be using our own TPREL entry. */
5567 if (gent->got.refcount != 0)
5568 gent->tls_type = TLS_TLS | TLS_TPREL;
5569 }
5570
411e1bfb
AM
5571 for (gent = h->got.glist; gent != NULL; gent = gent->next)
5572 if (gent->got.refcount > 0)
5573 {
951fd09b
AM
5574 bfd_boolean dyn;
5575
411e1bfb 5576 /* Make sure this symbol is output as a dynamic symbol.
951fd09b
AM
5577 Undefined weak syms won't yet be marked as dynamic,
5578 nor will all TLS symbols. */
411e1bfb
AM
5579 if (h->dynindx == -1
5580 && (h->elf_link_hash_flags & ELF_LINK_FORCED_LOCAL) == 0)
5581 {
5582 if (! bfd_elf64_link_record_dynamic_symbol (info, h))
5583 return FALSE;
5584 }
65f38f15 5585
d881513a
AM
5586 if ((gent->tls_type & TLS_LD) != 0
5587 && !(h->elf_link_hash_flags & ELF_LINK_HASH_DEF_DYNAMIC))
411e1bfb 5588 {
951fd09b
AM
5589 gent->got.offset = htab->tlsld_got.offset;
5590 continue;
411e1bfb 5591 }
951fd09b
AM
5592
5593 s = htab->sgot;
5594 gent->got.offset = s->_raw_size;
d881513a
AM
5595 s->_raw_size
5596 += (gent->tls_type & eh->tls_mask & (TLS_GD | TLS_LD)) ? 16 : 8;
951fd09b 5597 dyn = htab->elf.dynamic_sections_created;
4e795f50
AM
5598 if ((info->shared
5599 || WILL_CALL_FINISH_DYNAMIC_SYMBOL (dyn, 0, h))
5600 && (ELF_ST_VISIBILITY (h->other) == STV_DEFAULT
5601 || h->root.type != bfd_link_hash_undefweak))
951fd09b 5602 htab->srelgot->_raw_size
e7b938ca 5603 += (gent->tls_type & eh->tls_mask & TLS_GD
951fd09b
AM
5604 ? 2 * sizeof (Elf64_External_Rela)
5605 : sizeof (Elf64_External_Rela));
411e1bfb
AM
5606 }
5607 else
5608 gent->got.offset = (bfd_vma) -1;
65f38f15 5609
65f38f15 5610 if (eh->dyn_relocs == NULL)
b34976b6 5611 return TRUE;
65f38f15
AM
5612
5613 /* In the shared -Bsymbolic case, discard space allocated for
5614 dynamic pc-relative relocs against symbols which turn out to be
5615 defined in regular objects. For the normal shared case, discard
5616 space for relocs that have become local due to symbol visibility
5617 changes. */
5618
5619 if (info->shared)
5620 {
9c7a29a3
AM
5621 /* Relocs that use pc_count are those that appear on a call insn,
5622 or certain REL relocs (see MUST_BE_DYN_RELOC) that can be
5623 generated via assembly. We want calls to protected symbols to
5624 resolve directly to the function rather than going via the plt.
5625 If people want function pointer comparisons to work as expected
5626 then they should avoid writing weird assembly. */
09695f56 5627 if (SYMBOL_CALLS_LOCAL (info, h))
65f38f15
AM
5628 {
5629 struct ppc_dyn_relocs **pp;
5630
5631 for (pp = &eh->dyn_relocs; (p = *pp) != NULL; )
5bd4f169 5632 {
65f38f15
AM
5633 p->count -= p->pc_count;
5634 p->pc_count = 0;
5635 if (p->count == 0)
5636 *pp = p->next;
5637 else
5638 pp = &p->next;
5bd4f169 5639 }
65f38f15 5640 }
4e795f50
AM
5641
5642 /* Also discard relocs on undefined weak syms with non-default
5643 visibility. */
5644 if (ELF_ST_VISIBILITY (h->other) != STV_DEFAULT
5645 && h->root.type == bfd_link_hash_undefweak)
5646 eh->dyn_relocs = NULL;
65f38f15 5647 }
f4656909 5648 else if (ELIMINATE_COPY_RELOCS)
65f38f15
AM
5649 {
5650 /* For the non-shared case, discard space for relocs against
5651 symbols which turn out to need copy relocs or are not
5652 dynamic. */
5653
5654 if ((h->elf_link_hash_flags & ELF_LINK_NON_GOT_REF) == 0
58ac9f71
AM
5655 && (h->elf_link_hash_flags & ELF_LINK_HASH_DEF_DYNAMIC) != 0
5656 && (h->elf_link_hash_flags & ELF_LINK_HASH_DEF_REGULAR) == 0)
65f38f15
AM
5657 {
5658 /* Make sure this symbol is output as a dynamic symbol.
5659 Undefined weak syms won't yet be marked as dynamic. */
5660 if (h->dynindx == -1
5661 && (h->elf_link_hash_flags & ELF_LINK_FORCED_LOCAL) == 0)
5662 {
ec338859 5663 if (! bfd_elf64_link_record_dynamic_symbol (info, h))
b34976b6 5664 return FALSE;
65f38f15
AM
5665 }
5666
5667 /* If that succeeded, we know we'll be keeping all the
5668 relocs. */
5669 if (h->dynindx != -1)
5670 goto keep;
5671 }
5672
5673 eh->dyn_relocs = NULL;
5674
ec338859 5675 keep: ;
65f38f15
AM
5676 }
5677
5678 /* Finally, allocate space. */
5679 for (p = eh->dyn_relocs; p != NULL; p = p->next)
5680 {
5681 asection *sreloc = elf_section_data (p->sec)->sreloc;
5682 sreloc->_raw_size += p->count * sizeof (Elf64_External_Rela);
5683 }
5684
b34976b6 5685 return TRUE;
65f38f15
AM
5686}
5687
5688/* Find any dynamic relocs that apply to read-only sections. */
5689
b34976b6 5690static bfd_boolean
65f38f15
AM
5691readonly_dynrelocs (h, inf)
5692 struct elf_link_hash_entry *h;
5693 PTR inf;
5694{
5695 struct ppc_link_hash_entry *eh;
5696 struct ppc_dyn_relocs *p;
5697
e92d460e
AM
5698 if (h->root.type == bfd_link_hash_warning)
5699 h = (struct elf_link_hash_entry *) h->root.u.i.link;
5700
65f38f15
AM
5701 eh = (struct ppc_link_hash_entry *) h;
5702 for (p = eh->dyn_relocs; p != NULL; p = p->next)
5703 {
5704 asection *s = p->sec->output_section;
5705
5706 if (s != NULL && (s->flags & SEC_READONLY) != 0)
5707 {
5708 struct bfd_link_info *info = (struct bfd_link_info *) inf;
5709
5710 info->flags |= DF_TEXTREL;
5711
5712 /* Not an error, just cut short the traversal. */
b34976b6 5713 return FALSE;
65f38f15
AM
5714 }
5715 }
b34976b6 5716 return TRUE;
65f38f15
AM
5717}
5718
5719/* Set the sizes of the dynamic sections. */
5720
b34976b6 5721static bfd_boolean
65f38f15
AM
5722ppc64_elf_size_dynamic_sections (output_bfd, info)
5723 bfd *output_bfd ATTRIBUTE_UNUSED;
5724 struct bfd_link_info *info;
5725{
5726 struct ppc_link_hash_table *htab;
5727 bfd *dynobj;
5728 asection *s;
b34976b6 5729 bfd_boolean relocs;
65f38f15
AM
5730 bfd *ibfd;
5731
5732 htab = ppc_hash_table (info);
5733 dynobj = htab->elf.dynobj;
5734 if (dynobj == NULL)
5735 abort ();
5736
5737 if (htab->elf.dynamic_sections_created)
5738 {
5739 /* Set the contents of the .interp section to the interpreter. */
36af4a4e 5740 if (info->executable)
65f38f15
AM
5741 {
5742 s = bfd_get_section_by_name (dynobj, ".interp");
5743 if (s == NULL)
5744 abort ();
5745 s->_raw_size = sizeof ELF_DYNAMIC_INTERPRETER;
5746 s->contents = (unsigned char *) ELF_DYNAMIC_INTERPRETER;
5747 }
5748 }
5749
411e1bfb
AM
5750 if (htab->tlsld_got.refcount > 0)
5751 {
5752 htab->tlsld_got.offset = htab->sgot->_raw_size;
5753 htab->sgot->_raw_size += 16;
5754 if (info->shared)
5755 htab->srelgot->_raw_size += sizeof (Elf64_External_Rela);
5756 }
5757 else
5758 htab->tlsld_got.offset = (bfd_vma) -1;
5759
65f38f15
AM
5760 /* Set up .got offsets for local syms, and space for local dynamic
5761 relocs. */
5762 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link_next)
5763 {
411e1bfb
AM
5764 struct got_entry **lgot_ents;
5765 struct got_entry **end_lgot_ents;
e7b938ca 5766 char *lgot_masks;
65f38f15
AM
5767 bfd_size_type locsymcount;
5768 Elf_Internal_Shdr *symtab_hdr;
5769 asection *srel;
5770
5771 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour)
5772 continue;
5773
5774 for (s = ibfd->sections; s != NULL; s = s->next)
5775 {
ec338859 5776 struct ppc_dyn_relocs *p;
65f38f15 5777
ec338859
AM
5778 for (p = *((struct ppc_dyn_relocs **)
5779 &elf_section_data (s)->local_dynrel);
5780 p != NULL;
5781 p = p->next)
65f38f15 5782 {
ec338859
AM
5783 if (!bfd_is_abs_section (p->sec)
5784 && bfd_is_abs_section (p->sec->output_section))
5785 {
5786 /* Input section has been discarded, either because
5787 it is a copy of a linkonce section or due to
5788 linker script /DISCARD/, so we'll be discarding
5789 the relocs too. */
5790 }
248866a8 5791 else if (p->count != 0)
ec338859
AM
5792 {
5793 srel = elf_section_data (p->sec)->sreloc;
5794 srel->_raw_size += p->count * sizeof (Elf64_External_Rela);
248866a8
AM
5795 if ((p->sec->output_section->flags & SEC_READONLY) != 0)
5796 info->flags |= DF_TEXTREL;
ec338859 5797 }
65f38f15
AM
5798 }
5799 }
5800
411e1bfb
AM
5801 lgot_ents = elf_local_got_ents (ibfd);
5802 if (!lgot_ents)
65f38f15
AM
5803 continue;
5804
5805 symtab_hdr = &elf_tdata (ibfd)->symtab_hdr;
5806 locsymcount = symtab_hdr->sh_info;
411e1bfb 5807 end_lgot_ents = lgot_ents + locsymcount;
e7b938ca 5808 lgot_masks = (char *) end_lgot_ents;
65f38f15
AM
5809 s = htab->sgot;
5810 srel = htab->srelgot;
e7b938ca 5811 for (; lgot_ents < end_lgot_ents; ++lgot_ents, ++lgot_masks)
65f38f15 5812 {
411e1bfb
AM
5813 struct got_entry *ent;
5814
5815 for (ent = *lgot_ents; ent != NULL; ent = ent->next)
5816 if (ent->got.refcount > 0)
5817 {
e7b938ca 5818 if ((ent->tls_type & *lgot_masks & TLS_LD) != 0)
411e1bfb
AM
5819 {
5820 if (htab->tlsld_got.offset == (bfd_vma) -1)
5821 {
5822 htab->tlsld_got.offset = s->_raw_size;
5823 s->_raw_size += 16;
5824 if (info->shared)
5825 srel->_raw_size += sizeof (Elf64_External_Rela);
5826 }
5827 ent->got.offset = htab->tlsld_got.offset;
5828 }
5829 else
5830 {
5831 ent->got.offset = s->_raw_size;
e7b938ca 5832 if ((ent->tls_type & *lgot_masks & TLS_GD) != 0)
411e1bfb
AM
5833 {
5834 s->_raw_size += 16;
5835 if (info->shared)
5836 srel->_raw_size += 2 * sizeof (Elf64_External_Rela);
5837 }
5838 else
5839 {
5840 s->_raw_size += 8;
5841 if (info->shared)
5842 srel->_raw_size += sizeof (Elf64_External_Rela);
5843 }
5844 }
5845 }
5846 else
5847 ent->got.offset = (bfd_vma) -1;
65f38f15
AM
5848 }
5849 }
5850
5851 /* Allocate global sym .plt and .got entries, and space for global
5852 sym dynamic relocs. */
5853 elf_link_hash_traverse (&htab->elf, allocate_dynrelocs, (PTR) info);
5854
5855 /* We now have determined the sizes of the various dynamic sections.
5856 Allocate memory for them. */
b34976b6 5857 relocs = FALSE;
65f38f15
AM
5858 for (s = dynobj->sections; s != NULL; s = s->next)
5859 {
5860 if ((s->flags & SEC_LINKER_CREATED) == 0)
5861 continue;
5862
411e1bfb
AM
5863 /* Reset _cooked_size since prelim layout will set it wrongly,
5864 and a non-zero _cooked_size sticks. */
5865 s->_cooked_size = 0;
5866
721956f4
AM
5867 if (s == htab->sbrlt || s == htab->srelbrlt)
5868 /* These haven't been allocated yet; don't strip. */
5869 continue;
5870 else if (s == htab->splt
5871 || s == htab->sgot
5872 || s == htab->sglink)
65f38f15
AM
5873 {
5874 /* Strip this section if we don't need it; see the
5875 comment below. */
5bd4f169 5876 }
65f38f15 5877 else if (strncmp (bfd_get_section_name (dynobj, s), ".rela", 5) == 0)
5bd4f169
AM
5878 {
5879 if (s->_raw_size == 0)
5880 {
5881 /* If we don't need this section, strip it from the
5882 output file. This is mostly to handle .rela.bss and
5883 .rela.plt. We must create both sections in
5884 create_dynamic_sections, because they must be created
5885 before the linker maps input sections to output
5886 sections. The linker does that before
5887 adjust_dynamic_symbol is called, and it is that
5888 function which decides whether anything needs to go
5889 into these sections. */
5bd4f169
AM
5890 }
5891 else
5892 {
65f38f15 5893 if (s != htab->srelplt)
b34976b6 5894 relocs = TRUE;
5bd4f169
AM
5895
5896 /* We use the reloc_count field as a counter if we need
5897 to copy relocs into the output file. */
5898 s->reloc_count = 0;
5899 }
5900 }
65f38f15 5901 else
5bd4f169
AM
5902 {
5903 /* It's not one of our sections, so don't allocate space. */
5904 continue;
5905 }
5906
65f38f15 5907 if (s->_raw_size == 0)
5bd4f169
AM
5908 {
5909 _bfd_strip_section_from_output (info, s);
5910 continue;
5911 }
5912
5f333394
AM
5913 /* .plt is in the bss section. We don't initialise it. */
5914 if ((s->flags & SEC_LOAD) == 0)
5915 continue;
5916
65f38f15
AM
5917 /* Allocate memory for the section contents. We use bfd_zalloc
5918 here in case unused entries are not reclaimed before the
5919 section's contents are written out. This should not happen,
411e1bfb
AM
5920 but this way if it does we get a R_PPC64_NONE reloc in .rela
5921 sections instead of garbage.
5922 We also rely on the section contents being zero when writing
5923 the GOT. */
721956f4 5924 s->contents = (bfd_byte *) bfd_zalloc (dynobj, s->_raw_size);
65f38f15 5925 if (s->contents == NULL)
b34976b6 5926 return FALSE;
5bd4f169
AM
5927 }
5928
e86ce104 5929 if (htab->elf.dynamic_sections_created)
5bd4f169
AM
5930 {
5931 /* Add some entries to the .dynamic section. We fill in the
5932 values later, in ppc64_elf_finish_dynamic_sections, but we
5933 must add the entries now so that we get the correct size for
5934 the .dynamic section. The DT_DEBUG entry is filled in by the
5935 dynamic linker and used by the debugger. */
dc810e39
AM
5936#define add_dynamic_entry(TAG, VAL) \
5937 bfd_elf64_add_dynamic_entry (info, (bfd_vma) (TAG), (bfd_vma) (VAL))
5938
36af4a4e 5939 if (info->executable)
5bd4f169 5940 {
dc810e39 5941 if (!add_dynamic_entry (DT_DEBUG, 0))
b34976b6 5942 return FALSE;
5bd4f169
AM
5943 }
5944
9c07fe7c 5945 if (htab->splt != NULL && htab->splt->_raw_size != 0)
5bd4f169 5946 {
dc810e39
AM
5947 if (!add_dynamic_entry (DT_PLTGOT, 0)
5948 || !add_dynamic_entry (DT_PLTRELSZ, 0)
5949 || !add_dynamic_entry (DT_PLTREL, DT_RELA)
5d1634d7
AM
5950 || !add_dynamic_entry (DT_JMPREL, 0)
5951 || !add_dynamic_entry (DT_PPC64_GLINK, 0))
b34976b6 5952 return FALSE;
5bd4f169
AM
5953 }
5954
19397422
AM
5955 if (NO_OPD_RELOCS)
5956 {
5957 if (!add_dynamic_entry (DT_PPC64_OPD, 0)
5958 || !add_dynamic_entry (DT_PPC64_OPDSZ, 0))
b34976b6 5959 return FALSE;
19397422
AM
5960 }
5961
5bd4f169
AM
5962 if (relocs)
5963 {
dc810e39
AM
5964 if (!add_dynamic_entry (DT_RELA, 0)
5965 || !add_dynamic_entry (DT_RELASZ, 0)
5966 || !add_dynamic_entry (DT_RELAENT, sizeof (Elf64_External_Rela)))
b34976b6 5967 return FALSE;
5bd4f169 5968
65f38f15
AM
5969 /* If any dynamic relocs apply to a read-only section,
5970 then we need a DT_TEXTREL entry. */
248866a8
AM
5971 if ((info->flags & DF_TEXTREL) == 0)
5972 elf_link_hash_traverse (&htab->elf, readonly_dynrelocs,
5973 (PTR) info);
5bd4f169 5974
65f38f15 5975 if ((info->flags & DF_TEXTREL) != 0)
5bd4f169 5976 {
65f38f15 5977 if (!add_dynamic_entry (DT_TEXTREL, 0))
b34976b6 5978 return FALSE;
5bd4f169 5979 }
5bd4f169 5980 }
5bd4f169 5981 }
65f38f15 5982#undef add_dynamic_entry
5bd4f169 5983
b34976b6 5984 return TRUE;
5bd4f169
AM
5985}
5986
721956f4 5987/* Determine the type of stub needed, if any, for a call. */
5bd4f169 5988
721956f4
AM
5989static INLINE enum ppc_stub_type
5990ppc_type_of_stub (input_sec, rel, hash, destination)
5991 asection *input_sec;
5992 const Elf_Internal_Rela *rel;
5993 struct ppc_link_hash_entry **hash;
5994 bfd_vma destination;
5bd4f169 5995{
721956f4
AM
5996 struct ppc_link_hash_entry *h = *hash;
5997 bfd_vma location;
5998 bfd_vma branch_offset;
5999 bfd_vma max_branch_offset;
6000 unsigned int r_type;
5bd4f169 6001
721956f4
AM
6002 if (h != NULL)
6003 {
6004 if (h->oh != NULL
721956f4 6005 && h->oh->dynindx != -1)
5bd4f169 6006 {
411e1bfb
AM
6007 struct plt_entry *ent;
6008 for (ent = h->oh->plt.plist; ent != NULL; ent = ent->next)
6009 if (ent->addend == rel->r_addend
6010 && ent->plt.offset != (bfd_vma) -1)
6011 {
6012 *hash = (struct ppc_link_hash_entry *) h->oh;
6013 return ppc_stub_plt_call;
6014 }
5bd4f169
AM
6015 }
6016
721956f4
AM
6017 if (h->elf.root.type == bfd_link_hash_undefweak
6018 || h->elf.root.type == bfd_link_hash_undefined)
6019 return ppc_stub_none;
5d1634d7 6020 }
5d1634d7 6021
721956f4
AM
6022 /* Determine where the call point is. */
6023 location = (input_sec->output_offset
6024 + input_sec->output_section->vma
6025 + rel->r_offset);
5d1634d7 6026
721956f4
AM
6027 branch_offset = destination - location;
6028 r_type = ELF64_R_TYPE (rel->r_info);
5d1634d7 6029
721956f4
AM
6030 /* Determine if a long branch stub is needed. */
6031 max_branch_offset = 1 << 25;
6032 if (r_type != (unsigned int) R_PPC64_REL24)
6033 max_branch_offset = 1 << 15;
5d1634d7 6034
721956f4
AM
6035 if (branch_offset + max_branch_offset >= 2 * max_branch_offset)
6036 /* We need a stub. Figure out whether a long_branch or plt_branch
6037 is needed later. */
6038 return ppc_stub_long_branch;
5d1634d7 6039
721956f4 6040 return ppc_stub_none;
5d1634d7
AM
6041}
6042
6043/* Build a .plt call stub. */
6044
6045static bfd_byte *
6046build_plt_stub (obfd, p, offset, glink)
6047 bfd *obfd;
6048 bfd_byte *p;
6049 int offset;
6050 int glink;
6051{
6052#define PPC_LO(v) ((v) & 0xffff)
6053#define PPC_HI(v) (((v) >> 16) & 0xffff)
6054#define PPC_HA(v) PPC_HI ((v) + 0x8000)
6055
6056 if (glink)
6057 bfd_put_32 (obfd, LD_R2_40R1, p), p += 4;
6058 bfd_put_32 (obfd, ADDIS_R12_R2 | PPC_HA (offset), p), p += 4;
6059 if (!glink)
6060 bfd_put_32 (obfd, STD_R2_40R1, p), p += 4;
6061 bfd_put_32 (obfd, LD_R11_0R12 | PPC_LO (offset), p), p += 4;
6062 if (PPC_HA (offset + 8) != PPC_HA (offset))
6063 bfd_put_32 (obfd, ADDIS_R12_R12_1, p), p += 4;
6064 offset += 8;
6065 bfd_put_32 (obfd, LD_R2_0R12 | PPC_LO (offset), p), p += 4;
6066 if (PPC_HA (offset + 8) != PPC_HA (offset))
6067 bfd_put_32 (obfd, ADDIS_R12_R12_1, p), p += 4;
6068 offset += 8;
6069 bfd_put_32 (obfd, MTCTR_R11, p), p += 4;
6070 bfd_put_32 (obfd, LD_R11_0R12 | PPC_LO (offset), p), p += 4;
6071 bfd_put_32 (obfd, BCTR, p), p += 4;
6072 return p;
6073}
6074
b34976b6 6075static bfd_boolean
721956f4
AM
6076ppc_build_one_stub (gen_entry, in_arg)
6077 struct bfd_hash_entry *gen_entry;
6078 PTR in_arg;
5d1634d7 6079{
721956f4
AM
6080 struct ppc_stub_hash_entry *stub_entry;
6081 struct ppc_branch_hash_entry *br_entry;
5d1634d7
AM
6082 struct bfd_link_info *info;
6083 struct ppc_link_hash_table *htab;
721956f4
AM
6084 asection *stub_sec;
6085 bfd *stub_bfd;
6086 bfd_byte *loc;
6087 bfd_byte *p;
6088 unsigned int indx;
411e1bfb 6089 struct plt_entry *ent;
721956f4
AM
6090 bfd_vma off;
6091 int size;
5d1634d7 6092
721956f4
AM
6093 /* Massage our args to the form they really have. */
6094 stub_entry = (struct ppc_stub_hash_entry *) gen_entry;
6095 info = (struct bfd_link_info *) in_arg;
5d1634d7 6096
5d1634d7 6097 htab = ppc_hash_table (info);
721956f4 6098 stub_sec = stub_entry->stub_sec;
5d1634d7 6099
721956f4
AM
6100 /* Make a note of the offset within the stubs for this entry. */
6101 stub_entry->stub_offset = stub_sec->_cooked_size;
6102 loc = stub_sec->contents + stub_entry->stub_offset;
6103
6104 stub_bfd = stub_sec->owner;
6105
6106 switch (stub_entry->stub_type)
5d1634d7 6107 {
721956f4
AM
6108 case ppc_stub_long_branch:
6109 /* Branches are relative. This is where we are going to. */
6110 off = (stub_entry->target_value
6111 + stub_entry->target_section->output_offset
6112 + stub_entry->target_section->output_section->vma);
5d1634d7 6113
721956f4
AM
6114 /* And this is where we are coming from. */
6115 off -= (stub_entry->stub_offset
6116 + stub_sec->output_offset
6117 + stub_sec->output_section->vma);
e86ce104 6118
721956f4 6119 BFD_ASSERT (off + (1 << 25) < (bfd_vma) (1 << 26));
e86ce104 6120
721956f4
AM
6121 bfd_put_32 (stub_bfd, (bfd_vma) B_DOT | (off & 0x3fffffc), loc);
6122 size = 4;
6123 break;
e86ce104 6124
721956f4
AM
6125 case ppc_stub_plt_branch:
6126 br_entry = ppc_branch_hash_lookup (&htab->branch_hash_table,
6127 stub_entry->root.string + 9,
b34976b6 6128 FALSE, FALSE);
721956f4
AM
6129 if (br_entry == NULL)
6130 {
6131 (*_bfd_error_handler) (_("can't find branch stub `%s'"),
6132 stub_entry->root.string + 9);
b34976b6
AM
6133 htab->stub_error = TRUE;
6134 return FALSE;
721956f4
AM
6135 }
6136
6137 off = (stub_entry->target_value
6138 + stub_entry->target_section->output_offset
6139 + stub_entry->target_section->output_section->vma);
6140
6141 bfd_put_64 (htab->sbrlt->owner, off,
6142 htab->sbrlt->contents + br_entry->offset);
6143
6144 if (info->shared)
6145 {
6146 /* Create a reloc for the branch lookup table entry. */
6147 Elf_Internal_Rela rela;
947216bf 6148 bfd_byte *loc;
5d1634d7 6149
721956f4
AM
6150 rela.r_offset = (br_entry->offset
6151 + htab->sbrlt->output_offset
6152 + htab->sbrlt->output_section->vma);
6153 rela.r_info = ELF64_R_INFO (0, R_PPC64_RELATIVE);
6154 rela.r_addend = off;
6155
947216bf
AM
6156 loc = htab->srelbrlt->contents;
6157 loc += htab->srelbrlt->reloc_count++ * sizeof (Elf64_External_Rela);
6158 bfd_elf64_swap_reloca_out (htab->srelbrlt->owner, &rela, loc);
721956f4
AM
6159 }
6160
6161 off = (br_entry->offset
6162 + htab->sbrlt->output_offset
6163 + htab->sbrlt->output_section->vma
6164 - elf_gp (htab->sbrlt->output_section->owner)
6165 - TOC_BASE_OFF);
6166
6167 if (off + 0x80000000 > 0xffffffff || (off & 7) != 0)
5d1634d7
AM
6168 {
6169 (*_bfd_error_handler)
e86ce104 6170 (_("linkage table error against `%s'"),
721956f4 6171 stub_entry->root.string);
5d1634d7 6172 bfd_set_error (bfd_error_bad_value);
b34976b6
AM
6173 htab->stub_error = TRUE;
6174 return FALSE;
5d1634d7 6175 }
41bd81ab 6176
721956f4
AM
6177 indx = off;
6178 bfd_put_32 (stub_bfd, (bfd_vma) ADDIS_R12_R2 | PPC_HA (indx), loc);
6179 bfd_put_32 (stub_bfd, (bfd_vma) LD_R11_0R12 | PPC_LO (indx), loc + 4);
6180 bfd_put_32 (stub_bfd, (bfd_vma) MTCTR_R11, loc + 8);
6181 bfd_put_32 (stub_bfd, (bfd_vma) BCTR, loc + 12);
6182 size = 16;
6183 break;
5d1634d7 6184
721956f4 6185 case ppc_stub_plt_call:
c862ae31
AM
6186 /* Do the best we can for shared libraries built without
6187 exporting ".foo" for each "foo". This can happen when symbol
6188 versioning scripts strip all bar a subset of symbols. */
6189 if (stub_entry->h->oh->root.type != bfd_link_hash_defined
6190 && stub_entry->h->oh->root.type != bfd_link_hash_defweak)
6191 {
6192 /* Point the symbol at the stub. There may be multiple stubs,
6193 we don't really care; The main thing is to make this sym
6194 defined somewhere. */
6195 stub_entry->h->oh->root.type = bfd_link_hash_defined;
6196 stub_entry->h->oh->root.u.def.section = stub_entry->stub_sec;
6197 stub_entry->h->oh->root.u.def.value = stub_entry->stub_offset;
6198 }
6199
721956f4 6200 /* Now build the stub. */
411e1bfb
AM
6201 off = (bfd_vma) -1;
6202 for (ent = stub_entry->h->elf.plt.plist; ent != NULL; ent = ent->next)
6203 if (ent->addend == stub_entry->addend)
6204 {
6205 off = ent->plt.offset;
6206 break;
6207 }
721956f4
AM
6208 if (off >= (bfd_vma) -2)
6209 abort ();
6210
6211 off &= ~ (bfd_vma) 1;
6212 off += (htab->splt->output_offset
6213 + htab->splt->output_section->vma
6214 - elf_gp (htab->splt->output_section->owner)
6215 - TOC_BASE_OFF);
6216
6217 if (off + 0x80000000 > 0xffffffff || (off & 7) != 0)
6218 {
6219 (*_bfd_error_handler)
6220 (_("linkage table error against `%s'"),
6221 stub_entry->h->elf.root.root.string);
6222 bfd_set_error (bfd_error_bad_value);
b34976b6
AM
6223 htab->stub_error = TRUE;
6224 return FALSE;
721956f4
AM
6225 }
6226
6227 p = build_plt_stub (stub_bfd, loc, (int) off, 0);
6228 size = p - loc;
6229 break;
6230
6231 default:
6232 BFD_FAIL ();
b34976b6 6233 return FALSE;
721956f4
AM
6234 }
6235
6236 stub_sec->_cooked_size += size;
b34976b6 6237 return TRUE;
721956f4
AM
6238}
6239
6240/* As above, but don't actually build the stub. Just bump offset so
6241 we know stub section sizes, and select plt_branch stubs where
6242 long_branch stubs won't do. */
6243
b34976b6 6244static bfd_boolean
721956f4
AM
6245ppc_size_one_stub (gen_entry, in_arg)
6246 struct bfd_hash_entry *gen_entry;
6247 PTR in_arg;
6248{
6249 struct ppc_stub_hash_entry *stub_entry;
6250 struct ppc_link_hash_table *htab;
6251 bfd_vma off;
6252 int size;
6253
6254 /* Massage our args to the form they really have. */
6255 stub_entry = (struct ppc_stub_hash_entry *) gen_entry;
6256 htab = (struct ppc_link_hash_table *) in_arg;
6257
6258 if (stub_entry->stub_type == ppc_stub_plt_call)
6259 {
411e1bfb 6260 struct plt_entry *ent;
58ac9f71 6261 off = (bfd_vma) -1;
411e1bfb
AM
6262 for (ent = stub_entry->h->elf.plt.plist; ent != NULL; ent = ent->next)
6263 if (ent->addend == stub_entry->addend)
6264 {
6265 off = ent->plt.offset & ~(bfd_vma) 1;
6266 break;
6267 }
58ac9f71 6268 if (off >= (bfd_vma) -2)
411e1bfb 6269 abort ();
721956f4
AM
6270 off += (htab->splt->output_offset
6271 + htab->splt->output_section->vma
6272 - elf_gp (htab->splt->output_section->owner)
6273 - TOC_BASE_OFF);
6274
6275 size = 28;
6276 if (PPC_HA ((int) off + 16) != PPC_HA ((int) off))
6277 size += 4;
6278 }
6279 else
6280 {
6281 /* ppc_stub_long_branch or ppc_stub_plt_branch. */
6282 stub_entry->stub_type = ppc_stub_long_branch;
6283 size = 4;
6284
6285 off = (stub_entry->target_value
6286 + stub_entry->target_section->output_offset
6287 + stub_entry->target_section->output_section->vma);
6288 off -= (stub_entry->stub_sec->_raw_size
6289 + stub_entry->stub_sec->output_offset
6290 + stub_entry->stub_sec->output_section->vma);
6291
6292 if (off + (1 << 25) >= (bfd_vma) (1 << 26))
6293 {
6294 struct ppc_branch_hash_entry *br_entry;
6295
6296 br_entry = ppc_branch_hash_lookup (&htab->branch_hash_table,
6297 stub_entry->root.string + 9,
b34976b6 6298 TRUE, FALSE);
721956f4
AM
6299 if (br_entry == NULL)
6300 {
6301 (*_bfd_error_handler) (_("can't build branch stub `%s'"),
6302 stub_entry->root.string + 9);
b34976b6
AM
6303 htab->stub_error = TRUE;
6304 return FALSE;
721956f4
AM
6305 }
6306
6307 if (br_entry->iter != htab->stub_iteration)
6308 {
6309 br_entry->iter = htab->stub_iteration;
6310 br_entry->offset = htab->sbrlt->_raw_size;
6311 htab->sbrlt->_raw_size += 8;
6312 }
6313 stub_entry->stub_type = ppc_stub_plt_branch;
6314 size = 16;
6315 }
6316 }
6317
6318 stub_entry->stub_sec->_raw_size += size;
b34976b6 6319 return TRUE;
721956f4
AM
6320}
6321
6322/* Set up various things so that we can make a list of input sections
6323 for each output section included in the link. Returns -1 on error,
cedb70c5 6324 0 when no stubs will be needed, and 1 on success. */
721956f4
AM
6325
6326int
6327ppc64_elf_setup_section_lists (output_bfd, info)
6328 bfd *output_bfd;
6329 struct bfd_link_info *info;
6330{
6331 bfd *input_bfd;
721956f4
AM
6332 int top_id, top_index;
6333 asection *section;
6334 asection **input_list, **list;
6335 bfd_size_type amt;
6336 struct ppc_link_hash_table *htab = ppc_hash_table (info);
6337
805fc799
AM
6338 if (htab->elf.root.creator->flavour != bfd_target_elf_flavour
6339 || htab->sbrlt == NULL)
721956f4
AM
6340 return 0;
6341
1e2f5b6e
AM
6342 /* Find the top input section id. */
6343 for (input_bfd = info->input_bfds, top_id = 0;
721956f4
AM
6344 input_bfd != NULL;
6345 input_bfd = input_bfd->link_next)
6346 {
721956f4
AM
6347 for (section = input_bfd->sections;
6348 section != NULL;
6349 section = section->next)
6350 {
6351 if (top_id < section->id)
6352 top_id = section->id;
6353 }
6354 }
721956f4
AM
6355
6356 amt = sizeof (struct map_stub) * (top_id + 1);
6357 htab->stub_group = (struct map_stub *) bfd_zmalloc (amt);
6358 if (htab->stub_group == NULL)
6359 return -1;
6360
6361 /* We can't use output_bfd->section_count here to find the top output
6362 section index as some sections may have been removed, and
6363 _bfd_strip_section_from_output doesn't renumber the indices. */
6364 for (section = output_bfd->sections, top_index = 0;
6365 section != NULL;
6366 section = section->next)
6367 {
6368 if (top_index < section->index)
6369 top_index = section->index;
6370 }
6371
6372 htab->top_index = top_index;
6373 amt = sizeof (asection *) * (top_index + 1);
6374 input_list = (asection **) bfd_malloc (amt);
6375 htab->input_list = input_list;
6376 if (input_list == NULL)
6377 return -1;
6378
6379 /* For sections we aren't interested in, mark their entries with a
6380 value we can check later. */
6381 list = input_list + top_index;
6382 do
6383 *list = bfd_abs_section_ptr;
6384 while (list-- != input_list);
6385
6386 for (section = output_bfd->sections;
6387 section != NULL;
6388 section = section->next)
6389 {
6390 if ((section->flags & SEC_CODE) != 0)
6391 input_list[section->index] = NULL;
6392 }
6393
6394 return 1;
6395}
6396
6397/* The linker repeatedly calls this function for each input section,
6398 in the order that input sections are linked into output sections.
6399 Build lists of input sections to determine groupings between which
6400 we may insert linker stubs. */
6401
6402void
805fc799 6403ppc64_elf_next_input_section (info, isec)
721956f4
AM
6404 struct bfd_link_info *info;
6405 asection *isec;
6406{
6407 struct ppc_link_hash_table *htab = ppc_hash_table (info);
6408
805fc799 6409 if (isec->output_section->index <= htab->top_index)
721956f4
AM
6410 {
6411 asection **list = htab->input_list + isec->output_section->index;
6412 if (*list != bfd_abs_section_ptr)
6413 {
6414 /* Steal the link_sec pointer for our list. */
6415#define PREV_SEC(sec) (htab->stub_group[(sec)->id].link_sec)
6416 /* This happens to make the list in reverse order,
6417 which is what we want. */
6418 PREV_SEC (isec) = *list;
6419 *list = isec;
6420 }
6421 }
6422}
6423
6424/* See whether we can group stub sections together. Grouping stub
6425 sections may result in fewer stubs. More importantly, we need to
6426 put all .init* and .fini* stubs at the beginning of the .init or
6427 .fini output sections respectively, because glibc splits the
6428 _init and _fini functions into multiple parts. Putting a stub in
6429 the middle of a function is not a good idea. */
6430
6431static void
6432group_sections (htab, stub_group_size, stubs_always_before_branch)
6433 struct ppc_link_hash_table *htab;
6434 bfd_size_type stub_group_size;
b34976b6 6435 bfd_boolean stubs_always_before_branch;
721956f4
AM
6436{
6437 asection **list = htab->input_list + htab->top_index;
6438 do
6439 {
6440 asection *tail = *list;
6441 if (tail == bfd_abs_section_ptr)
6442 continue;
6443 while (tail != NULL)
6444 {
6445 asection *curr;
6446 asection *prev;
6447 bfd_size_type total;
58ac9f71 6448 bfd_boolean big_sec;
721956f4
AM
6449
6450 curr = tail;
6451 if (tail->_cooked_size)
6452 total = tail->_cooked_size;
6453 else
6454 total = tail->_raw_size;
58ac9f71
AM
6455 big_sec = total >= stub_group_size;
6456
721956f4
AM
6457 while ((prev = PREV_SEC (curr)) != NULL
6458 && ((total += curr->output_offset - prev->output_offset)
6459 < stub_group_size))
6460 curr = prev;
6461
6462 /* OK, the size from the start of CURR to the end is less
6463 than stub_group_size and thus can be handled by one stub
6464 section. (or the tail section is itself larger than
6465 stub_group_size, in which case we may be toast.) We
6466 should really be keeping track of the total size of stubs
6467 added here, as stubs contribute to the final output
6468 section size. That's a little tricky, and this way will
6469 only break if stubs added make the total size more than
6470 2^25, ie. for the default stub_group_size, if stubs total
58ac9f71 6471 more than 2097152 bytes, or nearly 75000 plt call stubs. */
721956f4
AM
6472 do
6473 {
6474 prev = PREV_SEC (tail);
6475 /* Set up this stub group. */
6476 htab->stub_group[tail->id].link_sec = curr;
6477 }
6478 while (tail != curr && (tail = prev) != NULL);
6479
6480 /* But wait, there's more! Input sections up to stub_group_size
58ac9f71
AM
6481 bytes before the stub section can be handled by it too.
6482 Don't do this if we have a really large section after the
6483 stubs, as adding more stubs increases the chance that
6484 branches may not reach into the stub section. */
6485 if (!stubs_always_before_branch && !big_sec)
721956f4
AM
6486 {
6487 total = 0;
6488 while (prev != NULL
6489 && ((total += tail->output_offset - prev->output_offset)
6490 < stub_group_size))
6491 {
6492 tail = prev;
6493 prev = PREV_SEC (tail);
6494 htab->stub_group[tail->id].link_sec = curr;
6495 }
6496 }
6497 tail = prev;
6498 }
6499 }
6500 while (list-- != htab->input_list);
6501 free (htab->input_list);
6502#undef PREV_SEC
6503}
6504
721956f4
AM
6505/* Determine and set the size of the stub section for a final link.
6506
6507 The basic idea here is to examine all the relocations looking for
6508 PC-relative calls to a target that is unreachable with a "bl"
6509 instruction. */
6510
b34976b6 6511bfd_boolean
721956f4
AM
6512ppc64_elf_size_stubs (output_bfd, stub_bfd, info, group_size,
6513 add_stub_section, layout_sections_again)
6514 bfd *output_bfd;
6515 bfd *stub_bfd;
6516 struct bfd_link_info *info;
6517 bfd_signed_vma group_size;
6518 asection * (*add_stub_section) PARAMS ((const char *, asection *));
6519 void (*layout_sections_again) PARAMS ((void));
6520{
6521 bfd_size_type stub_group_size;
b34976b6 6522 bfd_boolean stubs_always_before_branch;
721956f4
AM
6523 struct ppc_link_hash_table *htab = ppc_hash_table (info);
6524
6525 /* Stash our params away. */
6526 htab->stub_bfd = stub_bfd;
6527 htab->add_stub_section = add_stub_section;
6528 htab->layout_sections_again = layout_sections_again;
6529 stubs_always_before_branch = group_size < 0;
6530 if (group_size < 0)
6531 stub_group_size = -group_size;
6532 else
6533 stub_group_size = group_size;
6534 if (stub_group_size == 1)
6535 {
6536 /* Default values. */
58ac9f71
AM
6537 if (stubs_always_before_branch)
6538 {
6539 stub_group_size = 0x1e00000;
6540 if (htab->has_14bit_branch)
6541 stub_group_size = 0x7800;
6542 }
6543 else
6544 {
6545 stub_group_size = 0x1c00000;
6546 if (htab->has_14bit_branch)
6547 stub_group_size = 0x7000;
6548 }
721956f4
AM
6549 }
6550
6551 group_sections (htab, stub_group_size, stubs_always_before_branch);
6552
721956f4
AM
6553 while (1)
6554 {
6555 bfd *input_bfd;
6556 unsigned int bfd_indx;
6557 asection *stub_sec;
b34976b6 6558 bfd_boolean stub_changed;
721956f4
AM
6559
6560 htab->stub_iteration += 1;
b34976b6 6561 stub_changed = FALSE;
721956f4
AM
6562
6563 for (input_bfd = info->input_bfds, bfd_indx = 0;
6564 input_bfd != NULL;
6565 input_bfd = input_bfd->link_next, bfd_indx++)
6566 {
6567 Elf_Internal_Shdr *symtab_hdr;
6568 asection *section;
6cdc0ccc 6569 Elf_Internal_Sym *local_syms = NULL;
721956f4
AM
6570
6571 /* We'll need the symbol table in a second. */
6572 symtab_hdr = &elf_tdata (input_bfd)->symtab_hdr;
6573 if (symtab_hdr->sh_info == 0)
6574 continue;
6575
721956f4
AM
6576 /* Walk over each section attached to the input bfd. */
6577 for (section = input_bfd->sections;
6578 section != NULL;
6579 section = section->next)
6580 {
721956f4 6581 Elf_Internal_Rela *internal_relocs, *irelaend, *irela;
721956f4
AM
6582
6583 /* If there aren't any relocs, then there's nothing more
6584 to do. */
6585 if ((section->flags & SEC_RELOC) == 0
6586 || section->reloc_count == 0)
6587 continue;
6588
6589 /* If this section is a link-once section that will be
6590 discarded, then don't create any stubs. */
6591 if (section->output_section == NULL
6592 || section->output_section->owner != output_bfd)
6593 continue;
6594
1e2f5b6e
AM
6595 /* Get the relocs. */
6596 internal_relocs
45d6a902
AM
6597 = _bfd_elf_link_read_relocs (input_bfd, section, NULL,
6598 (Elf_Internal_Rela *) NULL,
6599 info->keep_memory);
721956f4 6600 if (internal_relocs == NULL)
1e2f5b6e 6601 goto error_ret_free_local;
721956f4
AM
6602
6603 /* Now examine each relocation. */
6604 irela = internal_relocs;
6605 irelaend = irela + section->reloc_count;
6606 for (; irela < irelaend; irela++)
6607 {
6608 unsigned int r_type, r_indx;
6609 enum ppc_stub_type stub_type;
6610 struct ppc_stub_hash_entry *stub_entry;
6611 asection *sym_sec;
6612 bfd_vma sym_value;
6613 bfd_vma destination;
6614 struct ppc_link_hash_entry *hash;
411e1bfb
AM
6615 struct elf_link_hash_entry *h;
6616 Elf_Internal_Sym *sym;
721956f4
AM
6617 char *stub_name;
6618 const asection *id_sec;
6619
6620 r_type = ELF64_R_TYPE (irela->r_info);
6621 r_indx = ELF64_R_SYM (irela->r_info);
6622
04c9666a 6623 if (r_type >= (unsigned int) R_PPC64_max)
721956f4
AM
6624 {
6625 bfd_set_error (bfd_error_bad_value);
6cdc0ccc 6626 goto error_ret_free_internal;
721956f4
AM
6627 }
6628
6629 /* Only look for stubs on branch instructions. */
6630 if (r_type != (unsigned int) R_PPC64_REL24
6631 && r_type != (unsigned int) R_PPC64_REL14
6632 && r_type != (unsigned int) R_PPC64_REL14_BRTAKEN
6633 && r_type != (unsigned int) R_PPC64_REL14_BRNTAKEN)
6634 continue;
6635
6636 /* Now determine the call target, its name, value,
6637 section. */
721956f4 6638 destination = 0;
411e1bfb
AM
6639 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms,
6640 r_indx, input_bfd))
6641 goto error_ret_free_internal;
6642 hash = (struct ppc_link_hash_entry *) h;
6643
6644 if (hash == NULL)
721956f4
AM
6645 {
6646 /* It's a local symbol. */
411e1bfb 6647 sym_value = sym->st_value;
721956f4
AM
6648 destination = (sym_value + irela->r_addend
6649 + sym_sec->output_offset
6650 + sym_sec->output_section->vma);
6651 }
6652 else
6653 {
6654 /* It's an external symbol. */
411e1bfb 6655 sym_value = 0;
721956f4
AM
6656 if (hash->elf.root.type == bfd_link_hash_defined
6657 || hash->elf.root.type == bfd_link_hash_defweak)
6658 {
721956f4
AM
6659 sym_value = hash->elf.root.u.def.value;
6660 if (sym_sec->output_section != NULL)
6661 destination = (sym_value + irela->r_addend
6662 + sym_sec->output_offset
6663 + sym_sec->output_section->vma);
6664 }
6665 else if (hash->elf.root.type == bfd_link_hash_undefweak)
6666 ;
6667 else if (hash->elf.root.type == bfd_link_hash_undefined)
6668 ;
6669 else
6670 {
6671 bfd_set_error (bfd_error_bad_value);
6672 goto error_ret_free_internal;
6673 }
6674 }
6675
6676 /* Determine what (if any) linker stub is needed. */
6677 stub_type = ppc_type_of_stub (section, irela, &hash,
6678 destination);
6679 if (stub_type == ppc_stub_none)
6680 continue;
6681
411e1bfb
AM
6682 /* __tls_get_addr calls might be eliminated. */
6683 if (stub_type != ppc_stub_plt_call
6684 && hash != NULL
6685 && &hash->elf == htab->tls_get_addr
6686 && section->has_tls_reloc
6687 && irela != internal_relocs)
6688 {
6689 /* Get tls info. */
e7b938ca 6690 char *tls_mask;
411e1bfb 6691
e7b938ca 6692 if (!get_tls_mask (&tls_mask, &local_syms,
411e1bfb
AM
6693 irela - 1, input_bfd))
6694 goto error_ret_free_internal;
e7b938ca 6695 if (*tls_mask != 0)
411e1bfb
AM
6696 continue;
6697 }
6698
721956f4
AM
6699 /* Support for grouping stub sections. */
6700 id_sec = htab->stub_group[section->id].link_sec;
6701
6702 /* Get the name of this stub. */
6703 stub_name = ppc_stub_name (id_sec, sym_sec, hash, irela);
6704 if (!stub_name)
6705 goto error_ret_free_internal;
6706
6707 stub_entry = ppc_stub_hash_lookup (&htab->stub_hash_table,
b34976b6 6708 stub_name, FALSE, FALSE);
721956f4
AM
6709 if (stub_entry != NULL)
6710 {
6711 /* The proper stub has already been created. */
6712 free (stub_name);
6713 continue;
6714 }
6715
6716 stub_entry = ppc_add_stub (stub_name, section, htab);
6717 if (stub_entry == NULL)
6718 {
6719 free (stub_name);
6cdc0ccc
AM
6720 error_ret_free_internal:
6721 if (elf_section_data (section)->relocs == NULL)
6722 free (internal_relocs);
6723 error_ret_free_local:
6724 if (local_syms != NULL
6725 && (symtab_hdr->contents
6726 != (unsigned char *) local_syms))
6727 free (local_syms);
b34976b6 6728 return FALSE;
721956f4
AM
6729 }
6730
6731 stub_entry->target_value = sym_value;
6732 stub_entry->target_section = sym_sec;
6733 stub_entry->stub_type = stub_type;
6734 stub_entry->h = hash;
411e1bfb 6735 stub_entry->addend = irela->r_addend;
b34976b6 6736 stub_changed = TRUE;
721956f4
AM
6737 }
6738
6739 /* We're done with the internal relocs, free them. */
6cdc0ccc 6740 if (elf_section_data (section)->relocs != internal_relocs)
1e2f5b6e 6741 free (internal_relocs);
721956f4 6742 }
6cdc0ccc
AM
6743
6744 if (local_syms != NULL
6745 && symtab_hdr->contents != (unsigned char *) local_syms)
6746 {
6747 if (!info->keep_memory)
6748 free (local_syms);
6749 else
6750 symtab_hdr->contents = (unsigned char *) local_syms;
6751 }
721956f4
AM
6752 }
6753
6754 if (!stub_changed)
6755 break;
6756
6757 /* OK, we've added some stubs. Find out the new size of the
6758 stub sections. */
6759 for (stub_sec = htab->stub_bfd->sections;
6760 stub_sec != NULL;
6761 stub_sec = stub_sec->next)
6762 {
6763 stub_sec->_raw_size = 0;
6764 stub_sec->_cooked_size = 0;
6765 }
6766 htab->sbrlt->_raw_size = 0;
6767 htab->sbrlt->_cooked_size = 0;
6768
6769 bfd_hash_traverse (&htab->stub_hash_table, ppc_size_one_stub, htab);
6770
6771 /* Ask the linker to do its stuff. */
6772 (*htab->layout_sections_again) ();
6773 }
6774
afbe61cf
AM
6775 /* It would be nice to strip .branch_lt from the output if the
6776 section is empty, but it's too late. If we strip sections here,
6777 the dynamic symbol table is corrupted since the section symbol
6778 for the stripped section isn't written. */
721956f4 6779
b34976b6 6780 return TRUE;
721956f4
AM
6781}
6782
6783/* Called after we have determined section placement. If sections
805fc799 6784 move, we'll be called again. Provide a value for TOCstart. */
721956f4 6785
805fc799
AM
6786bfd_vma
6787ppc64_elf_toc (obfd)
5d1634d7 6788 bfd *obfd;
721956f4 6789{
805fc799
AM
6790 asection *s;
6791 bfd_vma TOCstart;
721956f4 6792
805fc799
AM
6793 /* The TOC consists of sections .got, .toc, .tocbss, .plt in that
6794 order. The TOC starts where the first of these sections starts. */
6795 s = bfd_get_section_by_name (obfd, ".got");
6796 if (s == NULL)
6797 s = bfd_get_section_by_name (obfd, ".toc");
6798 if (s == NULL)
6799 s = bfd_get_section_by_name (obfd, ".tocbss");
6800 if (s == NULL)
6801 s = bfd_get_section_by_name (obfd, ".plt");
6802 if (s == NULL)
6803 {
6804 /* This may happen for
6805 o references to TOC base (SYM@toc / TOC[tc0]) without a
6806 .toc directive
6807 o bad linker script
6808 o --gc-sections and empty TOC sections
6809
6810 FIXME: Warn user? */
6811
6812 /* Look for a likely section. We probably won't even be
6813 using TOCstart. */
6814 for (s = obfd->sections; s != NULL; s = s->next)
6815 if ((s->flags & (SEC_ALLOC | SEC_SMALL_DATA | SEC_READONLY))
6816 == (SEC_ALLOC | SEC_SMALL_DATA))
6817 break;
721956f4 6818 if (s == NULL)
805fc799
AM
6819 for (s = obfd->sections; s != NULL; s = s->next)
6820 if ((s->flags & (SEC_ALLOC | SEC_SMALL_DATA))
6821 == (SEC_ALLOC | SEC_SMALL_DATA))
6822 break;
721956f4 6823 if (s == NULL)
805fc799
AM
6824 for (s = obfd->sections; s != NULL; s = s->next)
6825 if ((s->flags & (SEC_ALLOC | SEC_READONLY)) == SEC_ALLOC)
6826 break;
721956f4 6827 if (s == NULL)
805fc799
AM
6828 for (s = obfd->sections; s != NULL; s = s->next)
6829 if ((s->flags & SEC_ALLOC) == SEC_ALLOC)
6830 break;
6831 }
721956f4 6832
805fc799
AM
6833 TOCstart = 0;
6834 if (s != NULL)
6835 TOCstart = s->output_section->vma + s->output_offset;
721956f4 6836
805fc799 6837 return TOCstart;
721956f4
AM
6838}
6839
6840/* Build all the stubs associated with the current output file.
6841 The stubs are kept in a hash table attached to the main linker
6842 hash table. This function is called via gldelf64ppc_finish. */
6843
b34976b6 6844bfd_boolean
721956f4
AM
6845ppc64_elf_build_stubs (info)
6846 struct bfd_link_info *info;
5d1634d7
AM
6847{
6848 struct ppc_link_hash_table *htab = ppc_hash_table (info);
721956f4 6849 asection *stub_sec;
5d1634d7
AM
6850 bfd_vma plt_r2;
6851 bfd_byte *p;
6852
721956f4
AM
6853 for (stub_sec = htab->stub_bfd->sections;
6854 stub_sec != NULL;
6855 stub_sec = stub_sec->next)
6856 {
6857 bfd_size_type size;
6858
6859 /* Allocate memory to hold the linker stubs. */
6860 size = stub_sec->_raw_size;
6861 if (size != 0)
6862 {
6863 stub_sec->contents = (bfd_byte *) bfd_zalloc (htab->stub_bfd, size);
6864 if (stub_sec->contents == NULL)
b34976b6 6865 return FALSE;
721956f4
AM
6866 }
6867 stub_sec->_cooked_size = 0;
6868 }
5d1634d7 6869
721956f4 6870 if (htab->splt != NULL)
5d1634d7 6871 {
9f951329
AM
6872 unsigned int indx;
6873
721956f4
AM
6874 /* Build the .glink plt call stub. */
6875 plt_r2 = (htab->splt->output_offset
6876 + htab->splt->output_section->vma
6877 - elf_gp (htab->splt->output_section->owner)
6878 - TOC_BASE_OFF);
6879 p = htab->sglink->contents;
6880 p = build_plt_stub (htab->sglink->owner, p, (int) plt_r2, 1);
9f951329 6881 while (p < htab->sglink->contents + GLINK_CALL_STUB_SIZE)
721956f4
AM
6882 {
6883 bfd_put_32 (htab->sglink->owner, NOP, p);
6884 p += 4;
6885 }
721956f4 6886
9f951329
AM
6887 /* Build the .glink lazy link call stubs. */
6888 indx = 0;
6889 while (p < htab->sglink->contents + htab->sglink->_raw_size)
6890 {
6891 if (indx < 0x8000)
6892 {
6893 bfd_put_32 (htab->sglink->owner, LI_R0_0 | indx, p);
6894 p += 4;
6895 }
6896 else
6897 {
6898 bfd_put_32 (htab->sglink->owner, LIS_R0_0 | PPC_HI (indx), p);
6899 p += 4;
6900 bfd_put_32 (htab->sglink->owner, ORI_R0_R0_0 | PPC_LO (indx), p);
6901 p += 4;
6902 }
6903 bfd_put_32 (htab->sglink->owner,
6904 B_DOT | ((htab->sglink->contents - p) & 0x3fffffc), p);
a16d5acb 6905 indx++;
9f951329
AM
6906 p += 4;
6907 }
6908 htab->sglink->_cooked_size = p - htab->sglink->contents;
5d1634d7 6909 }
5d1634d7 6910
721956f4
AM
6911 if (htab->sbrlt->_raw_size != 0)
6912 {
6913 htab->sbrlt->contents = (bfd_byte *) bfd_zalloc (htab->sbrlt->owner,
6914 htab->sbrlt->_raw_size);
6915 if (htab->sbrlt->contents == NULL)
b34976b6 6916 return FALSE;
721956f4 6917 }
5d1634d7 6918
721956f4
AM
6919 /* Build the stubs as directed by the stub hash table. */
6920 bfd_hash_traverse (&htab->stub_hash_table, ppc_build_one_stub, info);
5d1634d7 6921
721956f4
AM
6922 for (stub_sec = htab->stub_bfd->sections;
6923 stub_sec != NULL;
6924 stub_sec = stub_sec->next)
6925 {
6926 if (stub_sec->_raw_size != stub_sec->_cooked_size)
6927 break;
6928 }
5d1634d7 6929
721956f4 6930 if (stub_sec != NULL
5d1634d7
AM
6931 || htab->sglink->_raw_size != htab->sglink->_cooked_size)
6932 {
b34976b6 6933 htab->stub_error = TRUE;
721956f4 6934 (*_bfd_error_handler) (_("stubs don't match calculated size"));
5d1634d7 6935 }
721956f4
AM
6936
6937 return !htab->stub_error;
5bd4f169
AM
6938}
6939
5bd4f169
AM
6940/* The RELOCATE_SECTION function is called by the ELF backend linker
6941 to handle the relocations for a section.
6942
6943 The relocs are always passed as Rela structures; if the section
6944 actually uses Rel structures, the r_addend field will always be
6945 zero.
6946
6947 This function is responsible for adjust the section contents as
6948 necessary, and (if using Rela relocs and generating a
6949 relocateable output file) adjusting the reloc addend as
6950 necessary.
6951
6952 This function does not have to worry about setting the reloc
6953 address or the reloc symbol index.
6954
6955 LOCAL_SYMS is a pointer to the swapped in local symbols.
6956
6957 LOCAL_SECTIONS is an array giving the section in the input file
6958 corresponding to the st_shndx field of each local symbol.
6959
6960 The global hash table entry for the global symbols can be found
6961 via elf_sym_hashes (input_bfd).
6962
6963 When generating relocateable output, this function must handle
6964 STB_LOCAL/STT_SECTION symbols specially. The output symbol is
6965 going to be the section symbol corresponding to the output
6966 section, which means that the addend must be adjusted
6967 accordingly. */
6968
b34976b6 6969static bfd_boolean
5bd4f169
AM
6970ppc64_elf_relocate_section (output_bfd, info, input_bfd, input_section,
6971 contents, relocs, local_syms, local_sections)
6972 bfd *output_bfd;
6973 struct bfd_link_info *info;
6974 bfd *input_bfd;
6975 asection *input_section;
6976 bfd_byte *contents;
6977 Elf_Internal_Rela *relocs;
6978 Elf_Internal_Sym *local_syms;
6979 asection **local_sections;
6980{
65f38f15 6981 struct ppc_link_hash_table *htab;
5bd4f169
AM
6982 Elf_Internal_Shdr *symtab_hdr;
6983 struct elf_link_hash_entry **sym_hashes;
5bd4f169
AM
6984 Elf_Internal_Rela *rel;
6985 Elf_Internal_Rela *relend;
411e1bfb
AM
6986 Elf_Internal_Rela outrel;
6987 bfd_byte *loc;
411e1bfb 6988 struct got_entry **local_got_ents;
5bd4f169 6989 bfd_vma TOCstart;
b34976b6
AM
6990 bfd_boolean ret = TRUE;
6991 bfd_boolean is_opd;
96e0dda4 6992 /* Disabled until we sort out how ld should choose 'y' vs 'at'. */
b34976b6 6993 bfd_boolean is_power4 = FALSE;
5bd4f169 6994
b491616a 6995 if (info->relocateable)
b34976b6 6996 return TRUE;
b491616a 6997
65f38f15 6998 /* Initialize howto table if needed. */
5bd4f169 6999 if (!ppc64_elf_howto_table[R_PPC64_ADDR32])
5bd4f169
AM
7000 ppc_howto_init ();
7001
65f38f15 7002 htab = ppc_hash_table (info);
411e1bfb 7003 local_got_ents = elf_local_got_ents (input_bfd);
5bd4f169 7004 TOCstart = elf_gp (output_bfd);
5bd4f169
AM
7005 symtab_hdr = &elf_tdata (input_bfd)->symtab_hdr;
7006 sym_hashes = elf_sym_hashes (input_bfd);
f0abc2a1 7007 is_opd = ppc64_elf_section_data (input_section)->opd.adjust != NULL;
65f38f15 7008
5bd4f169
AM
7009 rel = relocs;
7010 relend = relocs + input_section->reloc_count;
7011 for (; rel < relend; rel++)
7012 {
04c9666a 7013 enum elf_ppc64_reloc_type r_type;
5bd4f169
AM
7014 bfd_vma addend;
7015 bfd_reloc_status_type r;
7016 Elf_Internal_Sym *sym;
7017 asection *sec;
7018 struct elf_link_hash_entry *h;
721956f4 7019 struct elf_link_hash_entry *fdh;
5bd4f169 7020 const char *sym_name;
5bd4f169 7021 unsigned long r_symndx;
951fd09b 7022 char tls_mask, tls_gd, tls_type;
5bd4f169 7023 bfd_vma relocation;
b34976b6
AM
7024 bfd_boolean unresolved_reloc;
7025 bfd_boolean warned;
dc810e39 7026 long insn;
721956f4
AM
7027 struct ppc_stub_hash_entry *stub_entry;
7028 bfd_vma max_br_offset;
7029 bfd_vma from;
5bd4f169 7030
04c9666a 7031 r_type = (enum elf_ppc64_reloc_type) ELF64_R_TYPE (rel->r_info);
5bd4f169 7032 r_symndx = ELF64_R_SYM (rel->r_info);
65f38f15
AM
7033 sym = (Elf_Internal_Sym *) 0;
7034 sec = (asection *) 0;
7035 h = (struct elf_link_hash_entry *) 0;
7036 sym_name = (const char *) 0;
b34976b6
AM
7037 unresolved_reloc = FALSE;
7038 warned = FALSE;
65f38f15 7039
5bd4f169
AM
7040 if (r_type == R_PPC64_TOC)
7041 {
7042 /* Relocation value is TOC base. Symbol is ignored. */
7043 relocation = TOCstart + TOC_BASE_OFF;
7044 }
7045 else if (r_symndx < symtab_hdr->sh_info)
7046 {
7047 /* It's a local symbol. */
7048 sym = local_syms + r_symndx;
7049 sec = local_sections[r_symndx];
411e1bfb 7050 sym_name = bfd_elf_local_sym_name (input_bfd, sym);
f8df10f4 7051 relocation = _bfd_elf_rela_local_sym (output_bfd, sym, sec, rel);
1e2f5b6e
AM
7052 if (elf_section_data (sec) != NULL)
7053 {
7054 long *opd_sym_adjust;
7055
f0abc2a1 7056 opd_sym_adjust = ppc64_elf_section_data (sec)->opd.adjust;
1e2f5b6e
AM
7057 if (opd_sym_adjust != NULL && sym->st_value % 24 == 0)
7058 relocation += opd_sym_adjust[sym->st_value / 24];
7059 }
5bd4f169
AM
7060 }
7061 else
7062 {
7063 /* It's a global symbol. */
7064 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
7065 while (h->root.type == bfd_link_hash_indirect
7066 || h->root.type == bfd_link_hash_warning)
7067 h = (struct elf_link_hash_entry *) h->root.u.i.link;
7068 sym_name = h->root.root.string;
65f38f15 7069 relocation = 0;
5bd4f169
AM
7070 if (h->root.type == bfd_link_hash_defined
7071 || h->root.type == bfd_link_hash_defweak)
7072 {
7073 sec = h->root.u.def.section;
65f38f15
AM
7074 if (sec->output_section == NULL)
7075 /* Set a flag that will be cleared later if we find a
7076 relocation value for this symbol. output_section
7077 is typically NULL for symbols satisfied by a shared
7078 library. */
b34976b6 7079 unresolved_reloc = TRUE;
5bd4f169
AM
7080 else
7081 relocation = (h->root.u.def.value
7082 + sec->output_section->vma
7083 + sec->output_offset);
7084 }
7085 else if (h->root.type == bfd_link_hash_undefweak)
65f38f15 7086 ;
671bae9c 7087 else if (info->shared
65f38f15
AM
7088 && !info->no_undefined
7089 && ELF_ST_VISIBILITY (h->other) == STV_DEFAULT)
7090 ;
5bd4f169
AM
7091 else
7092 {
7093 if (! ((*info->callbacks->undefined_symbol)
7094 (info, h->root.root.string, input_bfd, input_section,
411e1bfb
AM
7095 rel->r_offset, (!info->shared
7096 || info->no_undefined
7097 || ELF_ST_VISIBILITY (h->other)))))
b34976b6
AM
7098 return FALSE;
7099 warned = TRUE;
5bd4f169
AM
7100 }
7101 }
7102
951fd09b
AM
7103 /* TLS optimizations. Replace instruction sequences and relocs
7104 based on information we collected in tls_optimize. We edit
7105 RELOCS so that --emit-relocs will output something sensible
7106 for the final instruction stream. */
7107 tls_mask = 0;
7108 tls_gd = 0;
d881513a 7109 if (IS_PPC64_TLS_RELOC (r_type))
411e1bfb
AM
7110 {
7111 if (h != NULL)
e7b938ca 7112 tls_mask = ((struct ppc_link_hash_entry *) h)->tls_mask;
411e1bfb
AM
7113 else if (local_got_ents != NULL)
7114 {
e7b938ca
AM
7115 char *lgot_masks;
7116 lgot_masks = (char *) (local_got_ents + symtab_hdr->sh_info);
7117 tls_mask = lgot_masks[r_symndx];
411e1bfb
AM
7118 }
7119 }
7120
7121 /* Ensure reloc mapping code below stays sane. */
7122 if (R_PPC64_TOC16_LO_DS != R_PPC64_TOC16_DS + 1
7123 || R_PPC64_TOC16_LO != R_PPC64_TOC16 + 1
7124 || (R_PPC64_GOT_TLSLD16 & 3) != (R_PPC64_GOT_TLSGD16 & 3)
7125 || (R_PPC64_GOT_TLSLD16_LO & 3) != (R_PPC64_GOT_TLSGD16_LO & 3)
7126 || (R_PPC64_GOT_TLSLD16_HI & 3) != (R_PPC64_GOT_TLSGD16_HI & 3)
7127 || (R_PPC64_GOT_TLSLD16_HA & 3) != (R_PPC64_GOT_TLSGD16_HA & 3)
7128 || (R_PPC64_GOT_TLSLD16 & 3) != (R_PPC64_GOT_TPREL16_DS & 3)
7129 || (R_PPC64_GOT_TLSLD16_LO & 3) != (R_PPC64_GOT_TPREL16_LO_DS & 3)
7130 || (R_PPC64_GOT_TLSLD16_HI & 3) != (R_PPC64_GOT_TPREL16_HI & 3)
7131 || (R_PPC64_GOT_TLSLD16_HA & 3) != (R_PPC64_GOT_TPREL16_HA & 3))
7132 abort ();
7133 switch (r_type)
7134 {
7135 default:
411e1bfb
AM
7136 break;
7137
7138 case R_PPC64_TOC16:
7139 case R_PPC64_TOC16_LO:
7140 case R_PPC64_TOC16_DS:
7141 case R_PPC64_TOC16_LO_DS:
411e1bfb
AM
7142 {
7143 /* Check for toc tls entries. */
7144 char *toc_tls;
951fd09b 7145 int retval;
411e1bfb 7146
e7b938ca 7147 retval = get_tls_mask (&toc_tls, &local_syms, rel, input_bfd);
951fd09b 7148 if (retval == 0)
411e1bfb
AM
7149 return FALSE;
7150
7151 if (toc_tls)
7152 {
951fd09b 7153 tls_mask = *toc_tls;
411e1bfb
AM
7154 if (r_type == R_PPC64_TOC16_DS
7155 || r_type == R_PPC64_TOC16_LO_DS)
7156 goto toctprel;
7157 else
951fd09b
AM
7158 {
7159 /* If we found a GD reloc pair, then we might be
7160 doing a GD->IE transition. */
7161 if (retval == 2)
7162 {
7163 tls_gd = TLS_TPRELGD;
7164 if (tls_mask != 0 && (tls_mask & TLS_GD) == 0)
7165 goto tls_get_addr_check;
7166 }
7167 else if (retval == 3)
7168 {
7169 if (tls_mask != 0 && (tls_mask & TLS_LD) == 0)
7170 goto tls_get_addr_check;
7171 }
7172 }
411e1bfb
AM
7173 }
7174 }
7175 break;
7176
7177 case R_PPC64_GOT_TPREL16_DS:
7178 case R_PPC64_GOT_TPREL16_LO_DS:
411e1bfb 7179 toctprel:
951fd09b
AM
7180 if (tls_mask != 0
7181 && (tls_mask & TLS_TPREL) == 0)
411e1bfb
AM
7182 {
7183 bfd_vma insn;
7184 insn = bfd_get_32 (output_bfd, contents + rel->r_offset - 2);
7185 insn &= 31 << 21;
7186 insn |= 0x3c0d0000; /* addis 0,13,0 */
7187 bfd_put_32 (output_bfd, insn, contents + rel->r_offset - 2);
7188 r_type = R_PPC64_TPREL16_HA;
7189 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
7190 }
7191 break;
7192
7193 case R_PPC64_TLS:
951fd09b 7194 if (tls_mask == 0)
411e1bfb
AM
7195 {
7196 /* Check for toc tls entries. */
7197 char *toc_tls;
7198
e7b938ca 7199 if (!get_tls_mask (&toc_tls, &local_syms, rel, input_bfd))
411e1bfb
AM
7200 return FALSE;
7201
7202 if (toc_tls)
951fd09b 7203 tls_mask = *toc_tls;
411e1bfb 7204 }
951fd09b
AM
7205 if (tls_mask != 0
7206 && (tls_mask & TLS_TPREL) == 0)
411e1bfb
AM
7207 {
7208 bfd_vma insn, rtra;
7209 insn = bfd_get_32 (output_bfd, contents + rel->r_offset);
7210 if ((insn & ((31 << 26) | (31 << 11)))
7211 == ((31 << 26) | (13 << 11)))
7212 rtra = insn & ((1 << 26) - (1 << 16));
7213 else if ((insn & ((31 << 26) | (31 << 16)))
7214 == ((31 << 26) | (13 << 16)))
7215 rtra = (insn & (31 << 21)) | ((insn & (31 << 11)) << 5);
7216 else
7217 abort ();
7218 if ((insn & ((1 << 11) - (1 << 1))) == 266 << 1)
7219 /* add -> addi. */
7220 insn = 14 << 26;
7221 else if ((insn & (31 << 1)) == 23 << 1
7222 && ((insn & (31 << 6)) < 14 << 6
7223 || ((insn & (31 << 6)) >= 16 << 6
7224 && (insn & (31 << 6)) < 24 << 6)))
7225 /* load and store indexed -> dform. */
7226 insn = (32 | ((insn >> 6) & 31)) << 26;
7227 else if ((insn & (31 << 1)) == 21 << 1
7228 && (insn & (0x1a << 6)) == 0)
7229 /* ldx, ldux, stdx, stdux -> ld, ldu, std, stdu. */
7230 insn = (((58 | ((insn >> 6) & 4)) << 26)
7231 | ((insn >> 6) & 1));
7232 else if ((insn & (31 << 1)) == 21 << 1
7233 && (insn & ((1 << 11) - (1 << 1))) == 341 << 1)
7234 /* lwax -> lwa. */
7235 insn = (58 << 26) | 2;
7236 else
7237 abort ();
7238 insn |= rtra;
7239 bfd_put_32 (output_bfd, insn, contents + rel->r_offset);
7240 r_type = R_PPC64_TPREL16_LO;
7241 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
7242 /* Was PPC64_TLS which sits on insn boundary, now
7243 PPC64_TPREL16_LO which is at insn+2. */
7244 rel->r_offset += 2;
7245 }
7246 break;
7247
411e1bfb
AM
7248 case R_PPC64_GOT_TLSGD16_HI:
7249 case R_PPC64_GOT_TLSGD16_HA:
951fd09b
AM
7250 tls_gd = TLS_TPRELGD;
7251 if (tls_mask != 0 && (tls_mask & TLS_GD) == 0)
7252 goto tls_gdld_hi;
7253 break;
7254
411e1bfb
AM
7255 case R_PPC64_GOT_TLSLD16_HI:
7256 case R_PPC64_GOT_TLSLD16_HA:
951fd09b 7257 if (tls_mask != 0 && (tls_mask & TLS_LD) == 0)
411e1bfb 7258 {
951fd09b
AM
7259 tls_gdld_hi:
7260 if ((tls_mask & tls_gd) != 0)
7261 r_type = (((r_type - (R_PPC64_GOT_TLSGD16 & 3)) & 3)
7262 + R_PPC64_GOT_TPREL16_DS);
7263 else
411e1bfb 7264 {
951fd09b
AM
7265 bfd_put_32 (output_bfd, NOP, contents + rel->r_offset);
7266 rel->r_offset -= 2;
7267 r_type = R_PPC64_NONE;
411e1bfb 7268 }
951fd09b 7269 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
411e1bfb
AM
7270 }
7271 break;
7272
951fd09b
AM
7273 case R_PPC64_GOT_TLSGD16:
7274 case R_PPC64_GOT_TLSGD16_LO:
7275 tls_gd = TLS_TPRELGD;
7276 if (tls_mask != 0 && (tls_mask & TLS_GD) == 0)
7277 goto tls_get_addr_check;
7278 break;
411e1bfb 7279
951fd09b
AM
7280 case R_PPC64_GOT_TLSLD16:
7281 case R_PPC64_GOT_TLSLD16_LO:
7282 if (tls_mask != 0 && (tls_mask & TLS_LD) == 0)
7283 {
7284 tls_get_addr_check:
7285 if (rel + 1 < relend)
411e1bfb 7286 {
951fd09b
AM
7287 enum elf_ppc64_reloc_type r_type2;
7288 unsigned long r_symndx2;
7289 struct elf_link_hash_entry *h2;
7290 bfd_vma insn1, insn2, insn3;
7291 bfd_vma offset;
7292
7293 /* The next instruction should be a call to
7294 __tls_get_addr. Peek at the reloc to be sure. */
7295 r_type2
7296 = (enum elf_ppc64_reloc_type) ELF64_R_TYPE (rel[1].r_info);
7297 r_symndx2 = ELF64_R_SYM (rel[1].r_info);
7298 if (r_symndx2 < symtab_hdr->sh_info
7299 || (r_type2 != R_PPC64_REL14
7300 && r_type2 != R_PPC64_REL14_BRTAKEN
7301 && r_type2 != R_PPC64_REL14_BRNTAKEN
7302 && r_type2 != R_PPC64_REL24))
7303 break;
7304
7305 h2 = sym_hashes[r_symndx2 - symtab_hdr->sh_info];
7306 while (h2->root.type == bfd_link_hash_indirect
7307 || h2->root.type == bfd_link_hash_warning)
7308 h2 = (struct elf_link_hash_entry *) h2->root.u.i.link;
7309 if (h2 == NULL || h2 != htab->tls_get_addr)
7310 break;
7311
7312 /* OK, it checks out. Replace the call. */
7313 offset = rel[1].r_offset;
7314 insn1 = bfd_get_32 (output_bfd,
7315 contents + rel->r_offset - 2);
7316 insn3 = bfd_get_32 (output_bfd,
7317 contents + offset + 4);
7318 if ((tls_mask & tls_gd) != 0)
411e1bfb 7319 {
951fd09b
AM
7320 /* IE */
7321 insn1 &= (1 << 26) - (1 << 2);
7322 insn1 |= 58 << 26; /* ld */
7323 insn2 = 0x7c636a14; /* add 3,3,13 */
7324 rel[1].r_info = ELF64_R_INFO (r_symndx2, R_PPC64_NONE);
7325 if ((tls_mask & TLS_EXPLICIT) == 0)
7326 r_type = (((r_type - (R_PPC64_GOT_TLSGD16 & 3)) & 3)
7327 + R_PPC64_GOT_TPREL16_DS);
7328 else
7329 r_type += R_PPC64_TOC16_DS - R_PPC64_TOC16;
7330 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
411e1bfb
AM
7331 }
7332 else
951fd09b
AM
7333 {
7334 /* LE */
7335 insn1 = 0x3c6d0000; /* addis 3,13,0 */
7336 insn2 = 0x38630000; /* addi 3,3,0 */
7337 if (tls_gd == 0)
7338 {
7339 /* Was an LD reloc. */
7340 r_symndx = 0;
7341 rel->r_addend = htab->tls_sec->vma + DTP_OFFSET;
7342 rel[1].r_addend = htab->tls_sec->vma + DTP_OFFSET;
7343 }
7344 r_type = R_PPC64_TPREL16_HA;
7345 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
7346 rel[1].r_info = ELF64_R_INFO (r_symndx,
7347 R_PPC64_TPREL16_LO);
7348 rel[1].r_offset += 2;
7349 }
7350 if (insn3 == NOP
7351 || insn3 == CROR_151515 || insn3 == CROR_313131)
7352 {
7353 insn3 = insn2;
7354 insn2 = NOP;
7355 rel[1].r_offset += 4;
7356 }
7357 bfd_put_32 (output_bfd, insn1, contents + rel->r_offset - 2);
7358 bfd_put_32 (output_bfd, insn2, contents + offset);
7359 bfd_put_32 (output_bfd, insn3, contents + offset + 4);
7360 if (tls_gd == 0)
7361 {
7362 /* We changed the symbol on an LD reloc. Start over
7363 in order to get h, sym, sec etc. right. */
7364 rel--;
7365 continue;
7366 }
411e1bfb 7367 }
411e1bfb 7368 }
411e1bfb
AM
7369 break;
7370
7371 case R_PPC64_DTPMOD64:
951fd09b
AM
7372 if (rel + 1 < relend
7373 && rel[1].r_info == ELF64_R_INFO (r_symndx, R_PPC64_DTPREL64)
7374 && rel[1].r_offset == rel->r_offset + 8)
411e1bfb 7375 {
951fd09b
AM
7376 if ((tls_mask & TLS_GD) == 0)
7377 {
7378 rel[1].r_info = ELF64_R_INFO (r_symndx, R_PPC64_NONE);
7379 if ((tls_mask & TLS_TPRELGD) != 0)
7380 r_type = R_PPC64_TPREL64;
7381 else
7382 {
7383 bfd_put_64 (output_bfd, (bfd_vma) 1,
7384 contents + rel->r_offset);
7385 r_type = R_PPC64_NONE;
7386 }
7387 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
7388 }
7389 }
7390 else
7391 {
7392 if ((tls_mask & TLS_LD) == 0)
411e1bfb
AM
7393 {
7394 bfd_put_64 (output_bfd, (bfd_vma) 1,
7395 contents + rel->r_offset);
7396 r_type = R_PPC64_NONE;
951fd09b 7397 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
411e1bfb 7398 }
411e1bfb
AM
7399 }
7400 break;
7401
7402 case R_PPC64_TPREL64:
951fd09b 7403 if ((tls_mask & TLS_TPREL) == 0)
411e1bfb
AM
7404 {
7405 r_type = R_PPC64_NONE;
7406 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
7407 }
7408 break;
7409 }
7410
7411 /* Handle other relocations that tweak non-addend part of insn. */
86c76c7b 7412 insn = 0;
65f38f15 7413 switch (r_type)
5bd4f169
AM
7414 {
7415 default:
65f38f15 7416 break;
5bd4f169 7417
65f38f15
AM
7418 /* Branch taken prediction relocations. */
7419 case R_PPC64_ADDR14_BRTAKEN:
7420 case R_PPC64_REL14_BRTAKEN:
cedb70c5
KH
7421 insn = 0x01 << 21; /* 'y' or 't' bit, lowest bit of BO field. */
7422 /* Fall thru. */
65f38f15 7423
86c76c7b 7424 /* Branch not taken prediction relocations. */
65f38f15
AM
7425 case R_PPC64_ADDR14_BRNTAKEN:
7426 case R_PPC64_REL14_BRNTAKEN:
411e1bfb
AM
7427 insn |= bfd_get_32 (output_bfd,
7428 contents + rel->r_offset) & ~(0x01 << 21);
96e0dda4
AM
7429 if (is_power4)
7430 {
7431 /* Set 'a' bit. This is 0b00010 in BO field for branch
7432 on CR(BI) insns (BO == 001at or 011at), and 0b01000
7433 for branch on CTR insns (BO == 1a00t or 1a01t). */
7434 if ((insn & (0x14 << 21)) == (0x04 << 21))
7435 insn |= 0x02 << 21;
7436 else if ((insn & (0x14 << 21)) == (0x10 << 21))
7437 insn |= 0x08 << 21;
7438 else
7439 break;
7440 }
65f38f15 7441 else
96e0dda4 7442 {
411e1bfb 7443 from = (rel->r_offset
805fc799
AM
7444 + input_section->output_offset
7445 + input_section->output_section->vma);
7446
96e0dda4 7447 /* Invert 'y' bit if not the default. */
411e1bfb 7448 if ((bfd_signed_vma) (relocation + rel->r_addend - from) < 0)
96e0dda4
AM
7449 insn ^= 0x01 << 21;
7450 }
86c76c7b 7451
411e1bfb 7452 bfd_put_32 (output_bfd, (bfd_vma) insn, contents + rel->r_offset);
65f38f15 7453 break;
5bd4f169 7454
65f38f15 7455 case R_PPC64_REL24:
721956f4
AM
7456 /* A REL24 branching to a linkage function is followed by a
7457 nop. We replace the nop with a ld in order to restore
7458 the TOC base pointer. Only calls to shared objects need
7459 to alter the TOC base. These are recognized by their
7460 need for a PLT entry. */
5bd4f169 7461 if (h != NULL
721956f4 7462 && (fdh = ((struct ppc_link_hash_entry *) h)->oh) != NULL
411e1bfb 7463 && fdh->plt.plist != NULL
721956f4
AM
7464 && (stub_entry = ppc_get_stub_entry (input_section, sec, fdh,
7465 rel, htab)) != NULL)
41bd81ab 7466 {
b34976b6 7467 bfd_boolean can_plt_call = 0;
721956f4 7468
411e1bfb 7469 if (rel->r_offset + 8 <= input_section->_cooked_size)
41bd81ab 7470 {
411e1bfb 7471 insn = bfd_get_32 (input_bfd, contents + rel->r_offset + 4);
721956f4
AM
7472 if (insn == NOP
7473 || insn == CROR_151515 || insn == CROR_313131)
41bd81ab 7474 {
721956f4 7475 bfd_put_32 (input_bfd, (bfd_vma) LD_R2_40R1,
411e1bfb 7476 contents + rel->r_offset + 4);
721956f4 7477 can_plt_call = 1;
41bd81ab 7478 }
5bd4f169 7479 }
721956f4
AM
7480
7481 if (!can_plt_call)
7482 {
7483 /* If this is a plain branch rather than a branch
7484 and link, don't require a nop. */
411e1bfb 7485 insn = bfd_get_32 (input_bfd, contents + rel->r_offset);
721956f4
AM
7486 if ((insn & 1) == 0)
7487 can_plt_call = 1;
7488 }
7489
7490 if (can_plt_call)
7491 {
7492 relocation = (stub_entry->stub_offset
7493 + stub_entry->stub_sec->output_offset
7494 + stub_entry->stub_sec->output_section->vma);
b34976b6 7495 unresolved_reloc = FALSE;
721956f4 7496 }
5bd4f169 7497 }
e86ce104
AM
7498
7499 if (h != NULL
7500 && h->root.type == bfd_link_hash_undefweak
721956f4 7501 && relocation == 0
411e1bfb 7502 && rel->r_addend == 0)
e86ce104 7503 {
721956f4
AM
7504 /* Tweak calls to undefined weak functions to point at a
7505 blr. We can thus call a weak function without first
7506 checking whether the function is defined. We have a
7507 blr at the end of .sfpr. */
805fc799 7508 BFD_ASSERT (htab->sfpr->_raw_size != 0);
721956f4
AM
7509 relocation = (htab->sfpr->_raw_size - 4
7510 + htab->sfpr->output_offset
7511 + htab->sfpr->output_section->vma);
411e1bfb 7512 from = (rel->r_offset
721956f4
AM
7513 + input_section->output_offset
7514 + input_section->output_section->vma);
805fc799 7515
721956f4
AM
7516 /* But let's not be silly about it. If the blr isn't in
7517 reach, just go to the next instruction. */
805fc799
AM
7518 if (relocation - from + (1 << 25) >= (1 << 26)
7519 || htab->sfpr->_raw_size == 0)
721956f4 7520 relocation = from + 4;
e86ce104 7521 }
65f38f15
AM
7522 break;
7523 }
5bd4f169 7524
65f38f15 7525 /* Set `addend'. */
411e1bfb
AM
7526 tls_type = 0;
7527 addend = rel->r_addend;
65f38f15
AM
7528 switch (r_type)
7529 {
7530 default:
7531 (*_bfd_error_handler)
7532 (_("%s: unknown relocation type %d for symbol %s"),
7533 bfd_archive_filename (input_bfd), (int) r_type, sym_name);
5bd4f169 7534
65f38f15 7535 bfd_set_error (bfd_error_bad_value);
b34976b6 7536 ret = FALSE;
65f38f15 7537 continue;
5bd4f169 7538
65f38f15 7539 case R_PPC64_NONE:
411e1bfb 7540 case R_PPC64_TLS:
04c9666a
AM
7541 case R_PPC64_GNU_VTINHERIT:
7542 case R_PPC64_GNU_VTENTRY:
65f38f15 7543 continue;
5bd4f169
AM
7544
7545 /* GOT16 relocations. Like an ADDR16 using the symbol's
7546 address in the GOT as relocation value instead of the
411e1bfb 7547 symbol's value itself. Also, create a GOT entry for the
5bd4f169 7548 symbol and put the symbol value there. */
411e1bfb
AM
7549 case R_PPC64_GOT_TLSGD16:
7550 case R_PPC64_GOT_TLSGD16_LO:
7551 case R_PPC64_GOT_TLSGD16_HI:
7552 case R_PPC64_GOT_TLSGD16_HA:
951fd09b 7553 tls_type = TLS_TLS | TLS_GD;
411e1bfb
AM
7554 goto dogot;
7555
7556 case R_PPC64_GOT_TLSLD16:
7557 case R_PPC64_GOT_TLSLD16_LO:
7558 case R_PPC64_GOT_TLSLD16_HI:
7559 case R_PPC64_GOT_TLSLD16_HA:
951fd09b 7560 tls_type = TLS_TLS | TLS_LD;
411e1bfb
AM
7561 goto dogot;
7562
7563 case R_PPC64_GOT_TPREL16_DS:
7564 case R_PPC64_GOT_TPREL16_LO_DS:
7565 case R_PPC64_GOT_TPREL16_HI:
7566 case R_PPC64_GOT_TPREL16_HA:
7567 tls_type = TLS_TLS | TLS_TPREL;
7568 goto dogot;
7569
7570 case R_PPC64_GOT_DTPREL16_DS:
7571 case R_PPC64_GOT_DTPREL16_LO_DS:
7572 case R_PPC64_GOT_DTPREL16_HI:
7573 case R_PPC64_GOT_DTPREL16_HA:
7574 tls_type = TLS_TLS | TLS_DTPREL;
7575 goto dogot;
7576
65f38f15
AM
7577 case R_PPC64_GOT16:
7578 case R_PPC64_GOT16_LO:
7579 case R_PPC64_GOT16_HI:
7580 case R_PPC64_GOT16_HA:
7581 case R_PPC64_GOT16_DS:
7582 case R_PPC64_GOT16_LO_DS:
411e1bfb 7583 dogot:
5bd4f169
AM
7584 {
7585 /* Relocation is to the entry for this symbol in the global
7586 offset table. */
d881513a 7587 bfd_vma *offp;
5bd4f169 7588 bfd_vma off;
d881513a 7589 unsigned long indx = 0;
65f38f15
AM
7590
7591 if (htab->sgot == NULL)
7592 abort ();
5bd4f169 7593
d881513a
AM
7594 if (tls_type == (TLS_TLS | TLS_LD)
7595 && (h == NULL
7596 || !(h->elf_link_hash_flags & ELF_LINK_HASH_DEF_DYNAMIC)))
7597 offp = &htab->tlsld_got.offset;
411e1bfb 7598 else
5bd4f169 7599 {
d881513a 7600 struct got_entry *ent;
5bd4f169 7601
d881513a
AM
7602 if (h != NULL)
7603 {
7604 bfd_boolean dyn = htab->elf.dynamic_sections_created;
f4656909 7605 if (!WILL_CALL_FINISH_DYNAMIC_SYMBOL (dyn, info->shared, h)
d881513a 7606 || (info->shared
586119b3 7607 && SYMBOL_REFERENCES_LOCAL (info, h)))
d881513a
AM
7608 /* This is actually a static link, or it is a
7609 -Bsymbolic link and the symbol is defined
7610 locally, or the symbol was forced to be local
7611 because of a version file. */
7612 ;
7613 else
7614 {
7615 indx = h->dynindx;
7616 unresolved_reloc = FALSE;
7617 }
7618 ent = h->got.glist;
7619 }
411e1bfb 7620 else
5bd4f169 7621 {
d881513a
AM
7622 if (local_got_ents == NULL)
7623 abort ();
7624 ent = local_got_ents[r_symndx];
5bd4f169 7625 }
d881513a
AM
7626
7627 for (; ent != NULL; ent = ent->next)
7628 if (ent->addend == rel->r_addend
7629 && ent->tls_type == tls_type)
7630 break;
7631 if (ent == NULL)
7632 abort ();
7633 offp = &ent->got.offset;
5bd4f169 7634 }
411e1bfb
AM
7635
7636 /* The offset must always be a multiple of 8. We use the
7637 least significant bit to record whether we have already
7638 processed this entry. */
d881513a 7639 off = *offp;
411e1bfb
AM
7640 if ((off & 1) != 0)
7641 off &= ~1;
5bd4f169
AM
7642 else
7643 {
411e1bfb
AM
7644 /* Generate relocs for the dynamic linker, except in
7645 the case of TLSLD where we'll use one entry per
7646 module. */
d881513a 7647 *offp = off | 1;
4e795f50
AM
7648 if ((info->shared || indx != 0)
7649 && (h == NULL
7650 || ELF_ST_VISIBILITY (h->other) == STV_DEFAULT
7651 || h->root.type != bfd_link_hash_undefweak))
5bd4f169 7652 {
411e1bfb
AM
7653 outrel.r_offset = (htab->sgot->output_section->vma
7654 + htab->sgot->output_offset
7655 + off);
d881513a 7656 if (tls_type & (TLS_LD | TLS_GD))
5bd4f169 7657 {
411e1bfb 7658 outrel.r_addend = 0;
e515b051 7659 outrel.r_info = ELF64_R_INFO (indx, R_PPC64_DTPMOD64);
d881513a
AM
7660 if (tls_type == (TLS_TLS | TLS_GD))
7661 {
7662 loc = htab->srelgot->contents;
7663 loc += (htab->srelgot->reloc_count++
7664 * sizeof (Elf64_External_Rela));
7665 bfd_elf64_swap_reloca_out (output_bfd,
7666 &outrel, loc);
e515b051 7667 outrel.r_offset += 8;
d881513a
AM
7668 outrel.r_info
7669 = ELF64_R_INFO (indx, R_PPC64_DTPREL64);
d881513a 7670 }
411e1bfb 7671 }
951fd09b 7672 else if (tls_type == (TLS_TLS | TLS_DTPREL))
411e1bfb 7673 outrel.r_info = ELF64_R_INFO (indx, R_PPC64_DTPREL64);
951fd09b 7674 else if (tls_type == (TLS_TLS | TLS_TPREL))
411e1bfb
AM
7675 outrel.r_info = ELF64_R_INFO (indx, R_PPC64_TPREL64);
7676 else if (indx == 0)
7677 outrel.r_info = ELF64_R_INFO (indx, R_PPC64_RELATIVE);
7678 else
7679 outrel.r_info = ELF64_R_INFO (indx, R_PPC64_GLOB_DAT);
951fd09b 7680 outrel.r_addend = rel->r_addend;
411e1bfb 7681 if (indx == 0)
e515b051
AM
7682 {
7683 outrel.r_addend += relocation;
7684 if (tls_type & (TLS_GD | TLS_DTPREL | TLS_TPREL))
7685 outrel.r_addend -= htab->tls_sec->vma;
7686 }
411e1bfb
AM
7687 loc = htab->srelgot->contents;
7688 loc += (htab->srelgot->reloc_count++
7689 * sizeof (Elf64_External_Rela));
7690 bfd_elf64_swap_reloca_out (output_bfd, &outrel, loc);
7691 }
7692
7693 /* Init the .got section contents if we're not
7694 emitting a reloc. */
d881513a 7695 else
411e1bfb 7696 {
d881513a 7697 relocation += rel->r_addend;
7b609f53
AM
7698 if (tls_type == (TLS_TLS | TLS_LD))
7699 relocation = 1;
7700 else if (tls_type != 0)
411e1bfb
AM
7701 {
7702 relocation -= htab->tls_sec->vma + DTP_OFFSET;
7b609f53 7703 if (tls_type == (TLS_TLS | TLS_TPREL))
411e1bfb 7704 relocation += DTP_OFFSET - TP_OFFSET;
5bd4f169 7705
7b609f53
AM
7706 if (tls_type == (TLS_TLS | TLS_GD))
7707 {
7708 bfd_put_64 (output_bfd, relocation,
7709 htab->sgot->contents + off + 8);
7710 relocation = 1;
7711 }
411e1bfb 7712 }
7b609f53 7713
411e1bfb
AM
7714 bfd_put_64 (output_bfd, relocation,
7715 htab->sgot->contents + off);
5bd4f169
AM
7716 }
7717 }
7718
65f38f15
AM
7719 if (off >= (bfd_vma) -2)
7720 abort ();
7721
7722 relocation = htab->sgot->output_offset + off;
7723
5bd4f169 7724 /* TOC base (r2) is TOC start plus 0x8000. */
411e1bfb 7725 addend = - TOC_BASE_OFF;
5bd4f169 7726 }
65f38f15
AM
7727 break;
7728
7729 case R_PPC64_PLT16_HA:
7730 case R_PPC64_PLT16_HI:
7731 case R_PPC64_PLT16_LO:
7732 case R_PPC64_PLT32:
7733 case R_PPC64_PLT64:
7734 /* Relocation is to the entry for this symbol in the
7735 procedure linkage table. */
7736
7737 /* Resolve a PLT reloc against a local symbol directly,
7738 without using the procedure linkage table. */
7739 if (h == NULL)
7740 break;
7741
411e1bfb
AM
7742 /* It's possible that we didn't make a PLT entry for this
7743 symbol. This happens when statically linking PIC code,
7744 or when using -Bsymbolic. Go find a match if there is a
7745 PLT entry. */
7746 if (htab->splt != NULL)
65f38f15 7747 {
411e1bfb
AM
7748 struct plt_entry *ent;
7749 for (ent = h->plt.plist; ent != NULL; ent = ent->next)
7750 if (ent->addend == rel->r_addend
7751 && ent->plt.offset != (bfd_vma) -1)
7752 {
7753 relocation = (htab->splt->output_section->vma
7754 + htab->splt->output_offset
7755 + ent->plt.offset);
7756 unresolved_reloc = FALSE;
7757 }
65f38f15 7758 }
65f38f15 7759 break;
5bd4f169
AM
7760
7761 /* TOC16 relocs. We want the offset relative to the TOC base,
7762 which is the address of the start of the TOC plus 0x8000.
7763 The TOC consists of sections .got, .toc, .tocbss, and .plt,
7764 in this order. */
65f38f15
AM
7765 case R_PPC64_TOC16:
7766 case R_PPC64_TOC16_LO:
7767 case R_PPC64_TOC16_HI:
7768 case R_PPC64_TOC16_DS:
7769 case R_PPC64_TOC16_LO_DS:
7770 case R_PPC64_TOC16_HA:
5bd4f169 7771 addend -= TOCstart + TOC_BASE_OFF;
5bd4f169
AM
7772 break;
7773
7774 /* Relocate against the beginning of the section. */
65f38f15
AM
7775 case R_PPC64_SECTOFF:
7776 case R_PPC64_SECTOFF_LO:
7777 case R_PPC64_SECTOFF_HI:
7778 case R_PPC64_SECTOFF_DS:
7779 case R_PPC64_SECTOFF_LO_DS:
7780 case R_PPC64_SECTOFF_HA:
7781 if (sec != (asection *) 0)
7782 addend -= sec->output_section->vma;
5bd4f169
AM
7783 break;
7784
721956f4
AM
7785 case R_PPC64_REL14:
7786 case R_PPC64_REL14_BRNTAKEN:
7787 case R_PPC64_REL14_BRTAKEN:
5d1634d7
AM
7788 case R_PPC64_REL24:
7789 break;
7790
411e1bfb
AM
7791 case R_PPC64_TPREL16:
7792 case R_PPC64_TPREL16_LO:
7793 case R_PPC64_TPREL16_HI:
7794 case R_PPC64_TPREL16_HA:
7795 case R_PPC64_TPREL16_DS:
7796 case R_PPC64_TPREL16_LO_DS:
7797 case R_PPC64_TPREL16_HIGHER:
7798 case R_PPC64_TPREL16_HIGHERA:
7799 case R_PPC64_TPREL16_HIGHEST:
7800 case R_PPC64_TPREL16_HIGHESTA:
7801 addend -= htab->tls_sec->vma + TP_OFFSET;
7802 if (info->shared)
7803 /* The TPREL16 relocs shouldn't really be used in shared
7804 libs as they will result in DT_TEXTREL being set, but
7805 support them anyway. */
7806 goto dodyn;
7807 break;
7808
7809 case R_PPC64_DTPREL16:
7810 case R_PPC64_DTPREL16_LO:
7811 case R_PPC64_DTPREL16_HI:
7812 case R_PPC64_DTPREL16_HA:
7813 case R_PPC64_DTPREL16_DS:
7814 case R_PPC64_DTPREL16_LO_DS:
7815 case R_PPC64_DTPREL16_HIGHER:
7816 case R_PPC64_DTPREL16_HIGHERA:
7817 case R_PPC64_DTPREL16_HIGHEST:
7818 case R_PPC64_DTPREL16_HIGHESTA:
7819 addend -= htab->tls_sec->vma + DTP_OFFSET;
7820 break;
7821
e515b051
AM
7822 case R_PPC64_DTPMOD64:
7823 relocation = 1;
7824 addend = 0;
7825 goto dodyn;
7826
411e1bfb
AM
7827 case R_PPC64_TPREL64:
7828 addend -= htab->tls_sec->vma + TP_OFFSET;
7829 goto dodyn;
7830
7831 case R_PPC64_DTPREL64:
7832 addend -= htab->tls_sec->vma + DTP_OFFSET;
7833 /* Fall thru */
7834
65f38f15
AM
7835 /* Relocations that may need to be propagated if this is a
7836 dynamic object. */
04c9666a 7837 case R_PPC64_REL30:
65f38f15
AM
7838 case R_PPC64_REL32:
7839 case R_PPC64_REL64:
7840 case R_PPC64_ADDR14:
7841 case R_PPC64_ADDR14_BRNTAKEN:
7842 case R_PPC64_ADDR14_BRTAKEN:
7843 case R_PPC64_ADDR16:
7844 case R_PPC64_ADDR16_DS:
7845 case R_PPC64_ADDR16_HA:
7846 case R_PPC64_ADDR16_HI:
7847 case R_PPC64_ADDR16_HIGHER:
7848 case R_PPC64_ADDR16_HIGHERA:
7849 case R_PPC64_ADDR16_HIGHEST:
7850 case R_PPC64_ADDR16_HIGHESTA:
7851 case R_PPC64_ADDR16_LO:
7852 case R_PPC64_ADDR16_LO_DS:
7853 case R_PPC64_ADDR24:
65f38f15
AM
7854 case R_PPC64_ADDR32:
7855 case R_PPC64_ADDR64:
7856 case R_PPC64_UADDR16:
7857 case R_PPC64_UADDR32:
7858 case R_PPC64_UADDR64:
ec338859
AM
7859 /* r_symndx will be zero only for relocs against symbols
7860 from removed linkonce sections, or sections discarded by
7861 a linker script. */
411e1bfb 7862 dodyn:
5d1634d7
AM
7863 if (r_symndx == 0)
7864 break;
7865 /* Fall thru. */
7866
7867 case R_PPC64_TOC:
7868 if ((input_section->flags & SEC_ALLOC) == 0)
ec338859
AM
7869 break;
7870
41bd81ab
AM
7871 if (NO_OPD_RELOCS && is_opd)
7872 break;
7873
65f38f15 7874 if ((info->shared
4e795f50
AM
7875 && (h == NULL
7876 || ELF_ST_VISIBILITY (h->other) == STV_DEFAULT
7877 || h->root.type != bfd_link_hash_undefweak)
411e1bfb 7878 && (MUST_BE_DYN_RELOC (r_type)
65f38f15 7879 || (h != NULL
09695f56 7880 && !SYMBOL_CALLS_LOCAL (info, h))))
f4656909
AM
7881 || (ELIMINATE_COPY_RELOCS
7882 && !info->shared
65f38f15
AM
7883 && h != NULL
7884 && h->dynindx != -1
7885 && (h->elf_link_hash_flags & ELF_LINK_NON_GOT_REF) == 0
58ac9f71
AM
7886 && (h->elf_link_hash_flags & ELF_LINK_HASH_DEF_DYNAMIC) != 0
7887 && (h->elf_link_hash_flags & ELF_LINK_HASH_DEF_REGULAR) == 0))
65f38f15
AM
7888 {
7889 Elf_Internal_Rela outrel;
b34976b6 7890 bfd_boolean skip, relocate;
65f38f15 7891 asection *sreloc;
947216bf 7892 bfd_byte *loc;
65f38f15
AM
7893
7894 /* When generating a dynamic object, these relocations
7895 are copied into the output file to be resolved at run
7896 time. */
7897
b34976b6
AM
7898 skip = FALSE;
7899 relocate = FALSE;
65f38f15 7900
c629eae0
JJ
7901 outrel.r_offset =
7902 _bfd_elf_section_offset (output_bfd, info, input_section,
7903 rel->r_offset);
7904 if (outrel.r_offset == (bfd_vma) -1)
b34976b6 7905 skip = TRUE;
0bb2d96a 7906 else if (outrel.r_offset == (bfd_vma) -2)
b34976b6 7907 skip = TRUE, relocate = TRUE;
65f38f15
AM
7908 outrel.r_offset += (input_section->output_section->vma
7909 + input_section->output_offset);
411e1bfb 7910 outrel.r_addend = rel->r_addend;
65f38f15
AM
7911
7912 if (skip)
0bb2d96a 7913 memset (&outrel, 0, sizeof outrel);
65f38f15 7914 else if (h != NULL
586119b3
AM
7915 && !SYMBOL_REFERENCES_LOCAL (info, h)
7916 && !is_opd)
0bb2d96a 7917 outrel.r_info = ELF64_R_INFO (h->dynindx, r_type);
65f38f15
AM
7918 else
7919 {
41bd81ab
AM
7920 /* This symbol is local, or marked to become local,
7921 or this is an opd section reloc which must point
7922 at a local function. */
65f38f15 7923 outrel.r_addend += relocation;
411e1bfb 7924 /* ??? why? */
b34976b6 7925 relocate = TRUE;
e86ce104 7926 if (r_type == R_PPC64_ADDR64 || r_type == R_PPC64_TOC)
65f38f15 7927 {
3fad3c7c 7928 if (is_opd && h != NULL)
afbe61cf
AM
7929 {
7930 /* Lie about opd entries. This case occurs
7931 when building shared libraries and we
7932 reference a function in another shared
3fad3c7c
AM
7933 lib. The same thing happens for a weak
7934 definition in an application that's
7935 overridden by a strong definition in a
7936 shared lib. (I believe this is a generic
7937 bug in binutils handling of weak syms.)
7938 In these cases we won't use the opd
1e2f5b6e 7939 entry in this lib. */
b34976b6 7940 unresolved_reloc = FALSE;
afbe61cf 7941 }
65f38f15
AM
7942 outrel.r_info = ELF64_R_INFO (0, R_PPC64_RELATIVE);
7943 }
7944 else
7945 {
7946 long indx = 0;
7947
41bd81ab 7948 if (bfd_is_abs_section (sec))
65f38f15
AM
7949 ;
7950 else if (sec == NULL || sec->owner == NULL)
7951 {
7952 bfd_set_error (bfd_error_bad_value);
b34976b6 7953 return FALSE;
65f38f15
AM
7954 }
7955 else
7956 {
7957 asection *osec;
7958
7959 osec = sec->output_section;
7960 indx = elf_section_data (osec)->dynindx;
7961
7962 /* We are turning this relocation into one
7963 against a section symbol, so subtract out
7964 the output section's address but not the
7965 offset of the input section in the output
7966 section. */
7967 outrel.r_addend -= osec->vma;
7968 }
7969
7970 outrel.r_info = ELF64_R_INFO (indx, r_type);
7971 }
7972 }
7973
7974 sreloc = elf_section_data (input_section)->sreloc;
7975 if (sreloc == NULL)
7976 abort ();
7977
947216bf
AM
7978 loc = sreloc->contents;
7979 loc += sreloc->reloc_count++ * sizeof (Elf64_External_Rela);
65f38f15
AM
7980 bfd_elf64_swap_reloca_out (output_bfd, &outrel, loc);
7981
7982 /* If this reloc is against an external symbol, it will
7983 be computed at runtime, so there's no need to do
7984 anything now. */
7985 if (! relocate)
7986 continue;
7987 }
5bd4f169
AM
7988 break;
7989
65f38f15
AM
7990 case R_PPC64_COPY:
7991 case R_PPC64_GLOB_DAT:
7992 case R_PPC64_JMP_SLOT:
7993 case R_PPC64_RELATIVE:
7994 /* We shouldn't ever see these dynamic relocs in relocatable
7995 files. */
ae9a127f 7996 /* Fall through. */
65f38f15
AM
7997
7998 case R_PPC64_PLTGOT16:
7999 case R_PPC64_PLTGOT16_DS:
8000 case R_PPC64_PLTGOT16_HA:
8001 case R_PPC64_PLTGOT16_HI:
8002 case R_PPC64_PLTGOT16_LO:
8003 case R_PPC64_PLTGOT16_LO_DS:
8004 case R_PPC64_PLTREL32:
8005 case R_PPC64_PLTREL64:
8006 /* These ones haven't been implemented yet. */
8007
8008 (*_bfd_error_handler)
7b609f53 8009 (_("%s: relocation %s is not supported for symbol %s."),
65f38f15
AM
8010 bfd_archive_filename (input_bfd),
8011 ppc64_elf_howto_table[(int) r_type]->name, sym_name);
5bd4f169
AM
8012
8013 bfd_set_error (bfd_error_invalid_operation);
b34976b6 8014 ret = FALSE;
5bd4f169 8015 continue;
65f38f15 8016 }
5bd4f169 8017
65f38f15
AM
8018 /* Do any further special processing. */
8019 switch (r_type)
8020 {
8021 default:
8022 break;
8023
8024 case R_PPC64_ADDR16_HA:
8025 case R_PPC64_ADDR16_HIGHERA:
8026 case R_PPC64_ADDR16_HIGHESTA:
86bbe32f
AM
8027 case R_PPC64_GOT16_HA:
8028 case R_PPC64_PLTGOT16_HA:
65f38f15
AM
8029 case R_PPC64_PLT16_HA:
8030 case R_PPC64_TOC16_HA:
8031 case R_PPC64_SECTOFF_HA:
411e1bfb
AM
8032 case R_PPC64_TPREL16_HA:
8033 case R_PPC64_DTPREL16_HA:
8034 case R_PPC64_GOT_TLSGD16_HA:
8035 case R_PPC64_GOT_TLSLD16_HA:
8036 case R_PPC64_GOT_TPREL16_HA:
8037 case R_PPC64_GOT_DTPREL16_HA:
8038 case R_PPC64_TPREL16_HIGHER:
8039 case R_PPC64_TPREL16_HIGHERA:
8040 case R_PPC64_TPREL16_HIGHEST:
8041 case R_PPC64_TPREL16_HIGHESTA:
8042 case R_PPC64_DTPREL16_HIGHER:
8043 case R_PPC64_DTPREL16_HIGHERA:
8044 case R_PPC64_DTPREL16_HIGHEST:
8045 case R_PPC64_DTPREL16_HIGHESTA:
65f38f15
AM
8046 /* It's just possible that this symbol is a weak symbol
8047 that's not actually defined anywhere. In that case,
8048 'sec' would be NULL, and we should leave the symbol
8049 alone (it will be set to zero elsewhere in the link). */
8050 if (sec != NULL)
e515b051
AM
8051 /* Add 0x10000 if sign bit in 0:15 is set.
8052 Bits 0:15 are not used. */
8053 addend += 0x8000;
65f38f15
AM
8054 break;
8055
8056 case R_PPC64_ADDR16_DS:
8057 case R_PPC64_ADDR16_LO_DS:
8058 case R_PPC64_GOT16_DS:
8059 case R_PPC64_GOT16_LO_DS:
8060 case R_PPC64_PLT16_LO_DS:
8061 case R_PPC64_SECTOFF_DS:
8062 case R_PPC64_SECTOFF_LO_DS:
8063 case R_PPC64_TOC16_DS:
8064 case R_PPC64_TOC16_LO_DS:
8065 case R_PPC64_PLTGOT16_DS:
8066 case R_PPC64_PLTGOT16_LO_DS:
411e1bfb
AM
8067 case R_PPC64_GOT_TPREL16_DS:
8068 case R_PPC64_GOT_TPREL16_LO_DS:
8069 case R_PPC64_GOT_DTPREL16_DS:
8070 case R_PPC64_GOT_DTPREL16_LO_DS:
8071 case R_PPC64_TPREL16_DS:
8072 case R_PPC64_TPREL16_LO_DS:
8073 case R_PPC64_DTPREL16_DS:
8074 case R_PPC64_DTPREL16_LO_DS:
65f38f15
AM
8075 if (((relocation + addend) & 3) != 0)
8076 {
8077 (*_bfd_error_handler)
8078 (_("%s: error: relocation %s not a multiple of 4"),
8079 bfd_archive_filename (input_bfd),
8080 ppc64_elf_howto_table[(int) r_type]->name);
8081 bfd_set_error (bfd_error_bad_value);
b34976b6 8082 ret = FALSE;
65f38f15
AM
8083 continue;
8084 }
8085 break;
721956f4
AM
8086
8087 case R_PPC64_REL14:
8088 case R_PPC64_REL14_BRNTAKEN:
8089 case R_PPC64_REL14_BRTAKEN:
8090 max_br_offset = 1 << 15;
8091 goto branch_check;
8092
8093 case R_PPC64_REL24:
8094 max_br_offset = 1 << 25;
8095
8096 branch_check:
8097 /* If the branch is out of reach, then redirect the
8098 call to the local stub for this function. */
411e1bfb 8099 from = (rel->r_offset
721956f4
AM
8100 + input_section->output_offset
8101 + input_section->output_section->vma);
8102 if (relocation + addend - from + max_br_offset >= 2 * max_br_offset
8103 && (stub_entry = ppc_get_stub_entry (input_section, sec, h,
8104 rel, htab)) != NULL)
8105 {
8106 /* Munge up the value and addend so that we call the stub
8107 rather than the procedure directly. */
8108 relocation = (stub_entry->stub_offset
8109 + stub_entry->stub_sec->output_offset
8110 + stub_entry->stub_sec->output_section->vma);
8111 addend = 0;
8112 }
8113 break;
5bd4f169
AM
8114 }
8115
239e1f3a
AM
8116 /* Dynamic relocs are not propagated for SEC_DEBUGGING sections
8117 because such sections are not SEC_ALLOC and thus ld.so will
8118 not process them. */
65f38f15 8119 if (unresolved_reloc
239e1f3a 8120 && !((input_section->flags & SEC_DEBUGGING) != 0
65f38f15 8121 && (h->elf_link_hash_flags & ELF_LINK_HASH_DEF_DYNAMIC) != 0))
9c07fe7c
AM
8122 {
8123 (*_bfd_error_handler)
7b609f53 8124 (_("%s(%s+0x%lx): unresolvable %s relocation against symbol `%s'"),
9c07fe7c
AM
8125 bfd_archive_filename (input_bfd),
8126 bfd_get_section_name (input_bfd, input_section),
8127 (long) rel->r_offset,
7b609f53 8128 ppc64_elf_howto_table[(int) r_type]->name,
9c07fe7c 8129 h->root.root.string);
b34976b6 8130 ret = FALSE;
9c07fe7c 8131 }
5bd4f169 8132
65f38f15 8133 r = _bfd_final_link_relocate (ppc64_elf_howto_table[(int) r_type],
5bd4f169
AM
8134 input_bfd,
8135 input_section,
8136 contents,
411e1bfb 8137 rel->r_offset,
5bd4f169
AM
8138 relocation,
8139 addend);
8140
ef60b7ff 8141 if (r != bfd_reloc_ok)
5bd4f169 8142 {
cd27b276
AM
8143 if (sym_name == NULL)
8144 sym_name = "(null)";
8145 if (r == bfd_reloc_overflow)
5bd4f169 8146 {
cd27b276
AM
8147 if (warned)
8148 continue;
8149 if (h != NULL
8150 && h->root.type == bfd_link_hash_undefweak
65f38f15 8151 && ppc64_elf_howto_table[(int) r_type]->pc_relative)
5bd4f169
AM
8152 {
8153 /* Assume this is a call protected by other code that
8154 detects the symbol is undefined. If this is the case,
8155 we can safely ignore the overflow. If not, the
8156 program is hosed anyway, and a little warning isn't
8157 going to help. */
8158
8159 continue;
8160 }
8161
ef60b7ff 8162 if (!((*info->callbacks->reloc_overflow)
cd27b276 8163 (info, sym_name, ppc64_elf_howto_table[(int) r_type]->name,
411e1bfb 8164 rel->r_addend, input_bfd, input_section, rel->r_offset)))
b34976b6 8165 return FALSE;
ef60b7ff
AM
8166 }
8167 else
8168 {
8169 (*_bfd_error_handler)
7b609f53 8170 (_("%s(%s+0x%lx): %s reloc against `%s': error %d"),
ef60b7ff
AM
8171 bfd_archive_filename (input_bfd),
8172 bfd_get_section_name (input_bfd, input_section),
7b609f53
AM
8173 (long) rel->r_offset,
8174 ppc64_elf_howto_table[(int) r_type]->name,
8175 sym_name,
8176 (int) r);
b34976b6 8177 ret = FALSE;
ef60b7ff 8178 }
5bd4f169 8179 }
5bd4f169
AM
8180 }
8181
5bd4f169
AM
8182 return ret;
8183}
8184
8185/* Finish up dynamic symbol handling. We set the contents of various
8186 dynamic sections here. */
8187
b34976b6 8188static bfd_boolean
5bd4f169
AM
8189ppc64_elf_finish_dynamic_symbol (output_bfd, info, h, sym)
8190 bfd *output_bfd;
8191 struct bfd_link_info *info;
8192 struct elf_link_hash_entry *h;
8193 Elf_Internal_Sym *sym;
8194{
65f38f15 8195 struct ppc_link_hash_table *htab;
5bd4f169
AM
8196 bfd *dynobj;
8197
65f38f15
AM
8198 htab = ppc_hash_table (info);
8199 dynobj = htab->elf.dynobj;
5bd4f169 8200
411e1bfb 8201 if (((struct ppc_link_hash_entry *) h)->is_func_descriptor)
5bd4f169 8202 {
411e1bfb 8203 struct plt_entry *ent;
65f38f15 8204 Elf_Internal_Rela rela;
947216bf 8205 bfd_byte *loc;
5bd4f169 8206
411e1bfb
AM
8207 for (ent = h->plt.plist; ent != NULL; ent = ent->next)
8208 if (ent->plt.offset != (bfd_vma) -1)
8209 {
8210 /* This symbol has an entry in the procedure linkage
8211 table. Set it up. */
5bd4f169 8212
411e1bfb
AM
8213 if (htab->splt == NULL
8214 || htab->srelplt == NULL
8215 || htab->sglink == NULL)
8216 abort ();
5bd4f169 8217
411e1bfb
AM
8218 /* Create a JMP_SLOT reloc to inform the dynamic linker to
8219 fill in the PLT entry. */
411e1bfb
AM
8220 rela.r_offset = (htab->splt->output_section->vma
8221 + htab->splt->output_offset
8222 + ent->plt.offset);
8223 rela.r_info = ELF64_R_INFO (h->dynindx, R_PPC64_JMP_SLOT);
8224 rela.r_addend = ent->addend;
5bd4f169 8225
411e1bfb
AM
8226 loc = htab->srelplt->contents;
8227 loc += ((ent->plt.offset - PLT_INITIAL_ENTRY_SIZE) / PLT_ENTRY_SIZE
8228 * sizeof (Elf64_External_Rela));
8229 bfd_elf64_swap_reloca_out (output_bfd, &rela, loc);
8230 }
5bd4f169
AM
8231 }
8232
8233 if ((h->elf_link_hash_flags & ELF_LINK_HASH_NEEDS_COPY) != 0)
8234 {
5bd4f169 8235 Elf_Internal_Rela rela;
947216bf 8236 bfd_byte *loc;
5bd4f169 8237
65f38f15 8238 /* This symbol needs a copy reloc. Set it up. */
5bd4f169 8239
65f38f15
AM
8240 if (h->dynindx == -1
8241 || (h->root.type != bfd_link_hash_defined
8242 && h->root.type != bfd_link_hash_defweak)
8243 || htab->srelbss == NULL)
8244 abort ();
5bd4f169
AM
8245
8246 rela.r_offset = (h->root.u.def.value
8247 + h->root.u.def.section->output_section->vma
8248 + h->root.u.def.section->output_offset);
8249 rela.r_info = ELF64_R_INFO (h->dynindx, R_PPC64_COPY);
8250 rela.r_addend = 0;
947216bf
AM
8251 loc = htab->srelbss->contents;
8252 loc += htab->srelbss->reloc_count++ * sizeof (Elf64_External_Rela);
65f38f15 8253 bfd_elf64_swap_reloca_out (output_bfd, &rela, loc);
5bd4f169
AM
8254 }
8255
5bd4f169
AM
8256 /* Mark some specially defined symbols as absolute. */
8257 if (strcmp (h->root.root.string, "_DYNAMIC") == 0)
8258 sym->st_shndx = SHN_ABS;
8259
b34976b6 8260 return TRUE;
5bd4f169
AM
8261}
8262
65f38f15
AM
8263/* Used to decide how to sort relocs in an optimal manner for the
8264 dynamic linker, before writing them out. */
8265
8266static enum elf_reloc_type_class
8267ppc64_elf_reloc_type_class (rela)
8268 const Elf_Internal_Rela *rela;
8269{
04c9666a 8270 enum elf_ppc64_reloc_type r_type;
a33d1f77 8271
04c9666a 8272 r_type = (enum elf_ppc64_reloc_type) ELF64_R_TYPE (rela->r_info);
a33d1f77 8273 switch (r_type)
65f38f15
AM
8274 {
8275 case R_PPC64_RELATIVE:
8276 return reloc_class_relative;
8277 case R_PPC64_JMP_SLOT:
8278 return reloc_class_plt;
8279 case R_PPC64_COPY:
8280 return reloc_class_copy;
8281 default:
8282 return reloc_class_normal;
8283 }
8284}
8285
5bd4f169
AM
8286/* Finish up the dynamic sections. */
8287
b34976b6 8288static bfd_boolean
5bd4f169
AM
8289ppc64_elf_finish_dynamic_sections (output_bfd, info)
8290 bfd *output_bfd;
8291 struct bfd_link_info *info;
8292{
65f38f15
AM
8293 struct ppc_link_hash_table *htab;
8294 bfd *dynobj;
5bd4f169 8295 asection *sdyn;
5bd4f169 8296
65f38f15
AM
8297 htab = ppc_hash_table (info);
8298 dynobj = htab->elf.dynobj;
5bd4f169
AM
8299 sdyn = bfd_get_section_by_name (dynobj, ".dynamic");
8300
65f38f15 8301 if (htab->elf.dynamic_sections_created)
5bd4f169 8302 {
5bd4f169
AM
8303 Elf64_External_Dyn *dyncon, *dynconend;
8304
65f38f15
AM
8305 if (sdyn == NULL || htab->sgot == NULL)
8306 abort ();
5bd4f169
AM
8307
8308 dyncon = (Elf64_External_Dyn *) sdyn->contents;
8309 dynconend = (Elf64_External_Dyn *) (sdyn->contents + sdyn->_raw_size);
8310 for (; dyncon < dynconend; dyncon++)
8311 {
8312 Elf_Internal_Dyn dyn;
19397422 8313 asection *s;
5bd4f169
AM
8314
8315 bfd_elf64_swap_dyn_in (dynobj, dyncon, &dyn);
8316
8317 switch (dyn.d_tag)
8318 {
65f38f15
AM
8319 default:
8320 continue;
5bd4f169 8321
5d1634d7 8322 case DT_PPC64_GLINK:
6348e046
AM
8323 s = htab->sglink;
8324 dyn.d_un.d_ptr = s->output_section->vma + s->output_offset;
5d1634d7
AM
8325 break;
8326
19397422
AM
8327 case DT_PPC64_OPD:
8328 s = bfd_get_section_by_name (output_bfd, ".opd");
6348e046
AM
8329 if (s == NULL)
8330 continue;
8331 dyn.d_un.d_ptr = s->vma;
19397422
AM
8332 break;
8333
8334 case DT_PPC64_OPDSZ:
8335 s = bfd_get_section_by_name (output_bfd, ".opd");
6348e046
AM
8336 if (s == NULL)
8337 continue;
8338 dyn.d_un.d_val = s->_raw_size;
19397422
AM
8339 break;
8340
65f38f15 8341 case DT_PLTGOT:
6348e046
AM
8342 s = htab->splt;
8343 dyn.d_un.d_ptr = s->output_section->vma + s->output_offset;
65f38f15
AM
8344 break;
8345
8346 case DT_JMPREL:
6348e046
AM
8347 s = htab->srelplt;
8348 dyn.d_un.d_ptr = s->output_section->vma + s->output_offset;
65f38f15 8349 break;
5bd4f169 8350
65f38f15 8351 case DT_PLTRELSZ:
5d1634d7
AM
8352 dyn.d_un.d_val = htab->srelplt->_raw_size;
8353 break;
8354
8355 case DT_RELASZ:
8356 /* Don't count procedure linkage table relocs in the
8357 overall reloc count. */
6348e046
AM
8358 s = htab->srelplt;
8359 if (s == NULL)
8360 continue;
8361 dyn.d_un.d_val -= s->_raw_size;
8362 break;
8363
8364 case DT_RELA:
8365 /* We may not be using the standard ELF linker script.
8366 If .rela.plt is the first .rela section, we adjust
8367 DT_RELA to not include it. */
8368 s = htab->srelplt;
8369 if (s == NULL)
8370 continue;
8371 if (dyn.d_un.d_ptr != s->output_section->vma + s->output_offset)
8372 continue;
8373 dyn.d_un.d_ptr += s->_raw_size;
65f38f15 8374 break;
5bd4f169 8375 }
5bd4f169 8376
65f38f15 8377 bfd_elf64_swap_dyn_out (output_bfd, &dyn, dyncon);
5bd4f169 8378 }
5bd4f169
AM
8379 }
8380
5d1634d7
AM
8381 if (htab->sgot != NULL && htab->sgot->_raw_size != 0)
8382 {
8383 /* Fill in the first entry in the global offset table.
8384 We use it to hold the link-time TOCbase. */
8385 bfd_put_64 (output_bfd,
60ee0d4a 8386 elf_gp (output_bfd) + TOC_BASE_OFF,
5d1634d7
AM
8387 htab->sgot->contents);
8388
8389 /* Set .got entry size. */
8390 elf_section_data (htab->sgot->output_section)->this_hdr.sh_entsize = 8;
8391 }
8392
8393 if (htab->splt != NULL && htab->splt->_raw_size != 0)
8394 {
8395 /* Set .plt entry size. */
8396 elf_section_data (htab->splt->output_section)->this_hdr.sh_entsize
8397 = PLT_ENTRY_SIZE;
8398 }
8399
b34976b6 8400 return TRUE;
5bd4f169
AM
8401}
8402
8403#define TARGET_LITTLE_SYM bfd_elf64_powerpcle_vec
8404#define TARGET_LITTLE_NAME "elf64-powerpcle"
8405#define TARGET_BIG_SYM bfd_elf64_powerpc_vec
8406#define TARGET_BIG_NAME "elf64-powerpc"
8407#define ELF_ARCH bfd_arch_powerpc
8408#define ELF_MACHINE_CODE EM_PPC64
8409#define ELF_MAXPAGESIZE 0x10000
8410#define elf_info_to_howto ppc64_elf_info_to_howto
8411
8412#ifdef EM_CYGNUS_POWERPC
8413#define ELF_MACHINE_ALT1 EM_CYGNUS_POWERPC
8414#endif
8415
8416#ifdef EM_PPC_OLD
8417#define ELF_MACHINE_ALT2 EM_PPC_OLD
8418#endif
8419
8420#define elf_backend_want_got_sym 0
8421#define elf_backend_want_plt_sym 0
8422#define elf_backend_plt_alignment 3
8423#define elf_backend_plt_not_loaded 1
8424#define elf_backend_got_symbol_offset 0
5d1634d7
AM
8425#define elf_backend_got_header_size 8
8426#define elf_backend_plt_header_size PLT_INITIAL_ENTRY_SIZE
5bd4f169 8427#define elf_backend_can_gc_sections 1
65f38f15 8428#define elf_backend_can_refcount 1
b491616a 8429#define elf_backend_rela_normal 1
5bd4f169 8430
65f38f15 8431#define bfd_elf64_bfd_reloc_type_lookup ppc64_elf_reloc_type_lookup
65f38f15 8432#define bfd_elf64_bfd_merge_private_bfd_data ppc64_elf_merge_private_bfd_data
f0abc2a1 8433#define bfd_elf64_new_section_hook ppc64_elf_new_section_hook
65f38f15 8434#define bfd_elf64_bfd_link_hash_table_create ppc64_elf_link_hash_table_create
721956f4 8435#define bfd_elf64_bfd_link_hash_table_free ppc64_elf_link_hash_table_free
65f38f15 8436
feee612b 8437#define elf_backend_object_p ppc64_elf_object_p
65f38f15
AM
8438#define elf_backend_create_dynamic_sections ppc64_elf_create_dynamic_sections
8439#define elf_backend_copy_indirect_symbol ppc64_elf_copy_indirect_symbol
8440#define elf_backend_check_relocs ppc64_elf_check_relocs
8441#define elf_backend_gc_mark_hook ppc64_elf_gc_mark_hook
8442#define elf_backend_gc_sweep_hook ppc64_elf_gc_sweep_hook
8443#define elf_backend_adjust_dynamic_symbol ppc64_elf_adjust_dynamic_symbol
e86ce104
AM
8444#define elf_backend_hide_symbol ppc64_elf_hide_symbol
8445#define elf_backend_always_size_sections ppc64_elf_func_desc_adjust
65f38f15 8446#define elf_backend_size_dynamic_sections ppc64_elf_size_dynamic_sections
65f38f15
AM
8447#define elf_backend_relocate_section ppc64_elf_relocate_section
8448#define elf_backend_finish_dynamic_symbol ppc64_elf_finish_dynamic_symbol
8449#define elf_backend_reloc_type_class ppc64_elf_reloc_type_class
8450#define elf_backend_finish_dynamic_sections ppc64_elf_finish_dynamic_sections
5bd4f169
AM
8451
8452#include "elf64-target.h"