non_ir_ref_dynamic
[deliverable/binutils-gdb.git] / bfd / elf64-ppc.c
CommitLineData
5bd4f169 1/* PowerPC64-specific support for 64-bit ELF.
2571583a 2 Copyright (C) 1999-2017 Free Software Foundation, Inc.
5bd4f169
AM
3 Written by Linus Nordberg, Swox AB <info@swox.com>,
4 based on elf32-ppc.c by Ian Lance Taylor.
32ca9640 5 Largely rewritten by Alan Modra.
5bd4f169 6
ae9a127f 7 This file is part of BFD, the Binary File Descriptor library.
5bd4f169 8
ae9a127f
NC
9 This program is free software; you can redistribute it and/or modify
10 it under the terms of the GNU General Public License as published by
cd123cb7 11 the Free Software Foundation; either version 3 of the License, or
ae9a127f 12 (at your option) any later version.
5bd4f169 13
ae9a127f
NC
14 This program is distributed in the hope that it will be useful,
15 but WITHOUT ANY WARRANTY; without even the implied warranty of
16 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
17 GNU General Public License for more details.
5bd4f169 18
4ce794b7
AM
19 You should have received a copy of the GNU General Public License along
20 with this program; if not, write to the Free Software Foundation, Inc.,
3e110533 21 51 Franklin Street - Fifth Floor, Boston, MA 02110-1301, USA. */
5bd4f169 22
cd123cb7 23
4ce794b7
AM
24/* The 64-bit PowerPC ELF ABI may be found at
25 http://www.linuxbase.org/spec/ELF/ppc64/PPC-elf64abi.txt, and
26 http://www.linuxbase.org/spec/ELF/ppc64/spec/book1.html */
5bd4f169 27
3db64b00 28#include "sysdep.h"
183e98be 29#include <stdarg.h>
5bd4f169 30#include "bfd.h"
5bd4f169
AM
31#include "bfdlink.h"
32#include "libbfd.h"
33#include "elf-bfd.h"
04c9666a 34#include "elf/ppc64.h"
5d1634d7 35#include "elf64-ppc.h"
58d180e8 36#include "dwarf2.h"
5bd4f169 37
805fc799 38static bfd_reloc_status_type ppc64_elf_ha_reloc
4ce794b7 39 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
2441e016
AM
40static bfd_reloc_status_type ppc64_elf_branch_reloc
41 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
805fc799 42static bfd_reloc_status_type ppc64_elf_brtaken_reloc
4ce794b7 43 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
805fc799 44static bfd_reloc_status_type ppc64_elf_sectoff_reloc
4ce794b7 45 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
805fc799 46static bfd_reloc_status_type ppc64_elf_sectoff_ha_reloc
4ce794b7 47 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
805fc799 48static bfd_reloc_status_type ppc64_elf_toc_reloc
4ce794b7 49 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
805fc799 50static bfd_reloc_status_type ppc64_elf_toc_ha_reloc
4ce794b7 51 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
805fc799 52static bfd_reloc_status_type ppc64_elf_toc64_reloc
4ce794b7 53 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
805fc799 54static bfd_reloc_status_type ppc64_elf_unhandled_reloc
4ce794b7 55 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
2441e016 56static bfd_vma opd_entry_value
aef36ac1 57 (asection *, bfd_vma, asection **, bfd_vma *, bfd_boolean);
5bd4f169 58
6d00b590 59#define TARGET_LITTLE_SYM powerpc_elf64_le_vec
ad8e1ba5 60#define TARGET_LITTLE_NAME "elf64-powerpcle"
6d00b590 61#define TARGET_BIG_SYM powerpc_elf64_vec
ad8e1ba5
AM
62#define TARGET_BIG_NAME "elf64-powerpc"
63#define ELF_ARCH bfd_arch_powerpc
ae95ffa6 64#define ELF_TARGET_ID PPC64_ELF_DATA
ad8e1ba5
AM
65#define ELF_MACHINE_CODE EM_PPC64
66#define ELF_MAXPAGESIZE 0x10000
04c6a44c 67#define ELF_COMMONPAGESIZE 0x10000
ad8e1ba5
AM
68#define elf_info_to_howto ppc64_elf_info_to_howto
69
70#define elf_backend_want_got_sym 0
71#define elf_backend_want_plt_sym 0
72#define elf_backend_plt_alignment 3
73#define elf_backend_plt_not_loaded 1
ad8e1ba5 74#define elf_backend_got_header_size 8
5474d94f 75#define elf_backend_want_dynrelro 1
ad8e1ba5
AM
76#define elf_backend_can_gc_sections 1
77#define elf_backend_can_refcount 1
78#define elf_backend_rela_normal 1
64f52338 79#define elf_backend_dtrel_excludes_plt 1
6bfdb61b 80#define elf_backend_default_execstack 0
ad8e1ba5 81
e717da7e 82#define bfd_elf64_mkobject ppc64_elf_mkobject
ad8e1ba5 83#define bfd_elf64_bfd_reloc_type_lookup ppc64_elf_reloc_type_lookup
aa374f67 84#define bfd_elf64_bfd_reloc_name_lookup ppc64_elf_reloc_name_lookup
ee67d69a
AM
85#define bfd_elf64_bfd_merge_private_bfd_data ppc64_elf_merge_private_bfd_data
86#define bfd_elf64_bfd_print_private_bfd_data ppc64_elf_print_private_bfd_data
ad8e1ba5
AM
87#define bfd_elf64_new_section_hook ppc64_elf_new_section_hook
88#define bfd_elf64_bfd_link_hash_table_create ppc64_elf_link_hash_table_create
90e3cdf2 89#define bfd_elf64_get_synthetic_symtab ppc64_elf_get_synthetic_symtab
aa374f67 90#define bfd_elf64_bfd_link_just_syms ppc64_elf_link_just_syms
8c5b4e52 91#define bfd_elf64_bfd_gc_sections ppc64_elf_gc_sections
ad8e1ba5
AM
92
93#define elf_backend_object_p ppc64_elf_object_p
d37c89e5
AM
94#define elf_backend_grok_prstatus ppc64_elf_grok_prstatus
95#define elf_backend_grok_psinfo ppc64_elf_grok_psinfo
183e98be 96#define elf_backend_write_core_note ppc64_elf_write_core_note
9d19e4fd 97#define elf_backend_create_dynamic_sections _bfd_elf_create_dynamic_sections
ad8e1ba5 98#define elf_backend_copy_indirect_symbol ppc64_elf_copy_indirect_symbol
555cd476 99#define elf_backend_add_symbol_hook ppc64_elf_add_symbol_hook
f6c7c3e8 100#define elf_backend_check_directives ppc64_elf_before_check_relocs
e5034e59 101#define elf_backend_notice_as_needed ppc64_elf_notice_as_needed
8387904d 102#define elf_backend_archive_symbol_lookup ppc64_elf_archive_symbol_lookup
ad8e1ba5 103#define elf_backend_check_relocs ppc64_elf_check_relocs
74f0fb50 104#define elf_backend_gc_keep ppc64_elf_gc_keep
64d03ab5 105#define elf_backend_gc_mark_dynamic_ref ppc64_elf_gc_mark_dynamic_ref
ad8e1ba5
AM
106#define elf_backend_gc_mark_hook ppc64_elf_gc_mark_hook
107#define elf_backend_gc_sweep_hook ppc64_elf_gc_sweep_hook
108#define elf_backend_adjust_dynamic_symbol ppc64_elf_adjust_dynamic_symbol
109#define elf_backend_hide_symbol ppc64_elf_hide_symbol
9f296da3 110#define elf_backend_maybe_function_sym ppc64_elf_maybe_function_sym
ad8e1ba5
AM
111#define elf_backend_always_size_sections ppc64_elf_func_desc_adjust
112#define elf_backend_size_dynamic_sections ppc64_elf_size_dynamic_sections
a345bc8d 113#define elf_backend_hash_symbol ppc64_elf_hash_symbol
74541ad4 114#define elf_backend_init_index_section _bfd_elf_init_2_index_sections
60124e18 115#define elf_backend_action_discarded ppc64_elf_action_discarded
ad8e1ba5
AM
116#define elf_backend_relocate_section ppc64_elf_relocate_section
117#define elf_backend_finish_dynamic_symbol ppc64_elf_finish_dynamic_symbol
118#define elf_backend_reloc_type_class ppc64_elf_reloc_type_class
119#define elf_backend_finish_dynamic_sections ppc64_elf_finish_dynamic_sections
754021d0 120#define elf_backend_link_output_symbol_hook ppc64_elf_output_symbol_hook
29ef7005 121#define elf_backend_special_sections ppc64_elf_special_sections
6911b7dc 122#define elf_backend_merge_symbol_attribute ppc64_elf_merge_symbol_attribute
8c5b4e52 123#define elf_backend_merge_symbol ppc64_elf_merge_symbol
bce964aa 124#define elf_backend_get_reloc_section bfd_get_section_by_name
ad8e1ba5 125
5bd4f169
AM
126/* The name of the dynamic interpreter. This is put in the .interp
127 section. */
128#define ELF_DYNAMIC_INTERPRETER "/usr/lib/ld.so.1"
129
130/* The size in bytes of an entry in the procedure linkage table. */
b9e5796b 131#define PLT_ENTRY_SIZE(htab) (htab->opd_abi ? 24 : 8)
5bd4f169
AM
132
133/* The initial size of the plt reserved for the dynamic linker. */
b9e5796b 134#define PLT_INITIAL_ENTRY_SIZE(htab) (htab->opd_abi ? 24 : 16)
5bd4f169 135
a078d95a
AM
136/* Offsets to some stack save slots. */
137#define STK_LR 16
138#define STK_TOC(htab) (htab->opd_abi ? 40 : 24)
eb8d7fda 139/* This one is dodgy. ELFv2 does not have a linker word, so use the
a078d95a
AM
140 CR save slot. Used only by optimised __tls_get_addr call stub,
141 relying on __tls_get_addr_opt not saving CR.. */
142#define STK_LINKER(htab) (htab->opd_abi ? 32 : 8)
143
5bd4f169 144/* TOC base pointers offset from start of TOC. */
411e1bfb 145#define TOC_BASE_OFF 0x8000
a27e685f
AM
146/* TOC base alignment. */
147#define TOC_BASE_ALIGN 256
411e1bfb
AM
148
149/* Offset of tp and dtp pointers from start of TLS block. */
150#define TP_OFFSET 0x7000
151#define DTP_OFFSET 0x8000
5bd4f169 152
ad8e1ba5
AM
153/* .plt call stub instructions. The normal stub is like this, but
154 sometimes the .plt entry crosses a 64k boundary and we need to
71a39c98 155 insert an addi to adjust r11. */
a078d95a 156#define STD_R2_0R1 0xf8410000 /* std %r2,0+40(%r1) */
71a39c98
AM
157#define ADDIS_R11_R2 0x3d620000 /* addis %r11,%r2,xxx@ha */
158#define LD_R12_0R11 0xe98b0000 /* ld %r12,xxx+0@l(%r11) */
159#define MTCTR_R12 0x7d8903a6 /* mtctr %r12 */
160#define LD_R2_0R11 0xe84b0000 /* ld %r2,xxx+8@l(%r11) */
161#define LD_R11_0R11 0xe96b0000 /* ld %r11,xxx+16@l(%r11) */
5d1634d7
AM
162#define BCTR 0x4e800420 /* bctr */
163
71a39c98 164#define ADDI_R11_R11 0x396b0000 /* addi %r11,%r11,off@l */
ad8e1ba5
AM
165#define ADDIS_R2_R2 0x3c420000 /* addis %r2,%r2,off@ha */
166#define ADDI_R2_R2 0x38420000 /* addi %r2,%r2,off@l */
167
71a39c98
AM
168#define XOR_R2_R12_R12 0x7d826278 /* xor %r2,%r12,%r12 */
169#define ADD_R11_R11_R2 0x7d6b1214 /* add %r11,%r11,%r2 */
170#define XOR_R11_R12_R12 0x7d8b6278 /* xor %r11,%r12,%r12 */
794e51c0
AM
171#define ADD_R2_R2_R11 0x7c425a14 /* add %r2,%r2,%r11 */
172#define CMPLDI_R2_0 0x28220000 /* cmpldi %r2,0 */
173#define BNECTR 0x4ca20420 /* bnectr+ */
174#define BNECTR_P4 0x4ce20420 /* bnectr+ */
175
71a39c98 176#define LD_R12_0R2 0xe9820000 /* ld %r12,xxx+0(%r2) */
ac2df442
AM
177#define LD_R11_0R2 0xe9620000 /* ld %r11,xxx+0(%r2) */
178#define LD_R2_0R2 0xe8420000 /* ld %r2,xxx+0(%r2) */
179
a078d95a 180#define LD_R2_0R1 0xe8410000 /* ld %r2,0(%r1) */
006589cf
AM
181#define LD_R2_0R12 0xe84c0000 /* ld %r2,0(%r12) */
182#define ADD_R2_R2_R12 0x7c426214 /* add %r2,%r2,%r12 */
ad8e1ba5 183
006589cf
AM
184#define LIS_R2 0x3c400000 /* lis %r2,xxx@ha */
185#define ADDIS_R2_R12 0x3c4c0000 /* addis %r2,%r12,xxx@ha */
186#define ADDIS_R12_R2 0x3d820000 /* addis %r12,%r2,xxx@ha */
a345bc8d
AM
187#define ADDIS_R12_R12 0x3d8c0000 /* addis %r12,%r12,xxx@ha */
188#define LD_R12_0R12 0xe98c0000 /* ld %r12,xxx@l(%r12) */
189
ee4bf8d2 190/* glink call stub instructions. We enter with the index in R0. */
ad8e1ba5 191#define GLINK_CALL_STUB_SIZE (16*4)
ee4bf8d2
AM
192 /* 0: */
193 /* .quad plt0-1f */
194 /* __glink: */
195#define MFLR_R12 0x7d8802a6 /* mflr %12 */
196#define BCL_20_31 0x429f0005 /* bcl 20,31,1f */
197 /* 1: */
198#define MFLR_R11 0x7d6802a6 /* mflr %11 */
71a39c98 199 /* ld %2,(0b-1b)(%11) */
ee4bf8d2 200#define MTLR_R12 0x7d8803a6 /* mtlr %12 */
71a39c98
AM
201#define ADD_R11_R2_R11 0x7d625a14 /* add %11,%2,%11 */
202 /* ld %12,0(%11) */
203 /* ld %2,8(%11) */
204 /* mtctr %12 */
205 /* ld %11,16(%11) */
ee4bf8d2 206 /* bctr */
b9e5796b
AM
207#define MFLR_R0 0x7c0802a6 /* mflr %r0 */
208#define MTLR_R0 0x7c0803a6 /* mtlr %r0 */
209#define SUB_R12_R12_R11 0x7d8b6050 /* subf %r12,%r11,%r12 */
210#define ADDI_R0_R12 0x380c0000 /* addi %r0,%r12,0 */
211#define SRDI_R0_R0_2 0x7800f082 /* rldicl %r0,%r0,62,2 */
5d1634d7
AM
212
213/* Pad with this. */
214#define NOP 0x60000000
215
721956f4
AM
216/* Some other nops. */
217#define CROR_151515 0x4def7b82
218#define CROR_313131 0x4ffffb82
219
cedb70c5 220/* .glink entries for the first 32k functions are two instructions. */
5d1634d7
AM
221#define LI_R0_0 0x38000000 /* li %r0,0 */
222#define B_DOT 0x48000000 /* b . */
223
224/* After that, we need two instructions to load the index, followed by
225 a branch. */
226#define LIS_R0_0 0x3c000000 /* lis %r0,0 */
10ed1bba 227#define ORI_R0_R0_0 0x60000000 /* ori %r0,%r0,0 */
41bd81ab 228
deb0e272
AM
229/* Instructions used by the save and restore reg functions. */
230#define STD_R0_0R1 0xf8010000 /* std %r0,0(%r1) */
231#define STD_R0_0R12 0xf80c0000 /* std %r0,0(%r12) */
232#define LD_R0_0R1 0xe8010000 /* ld %r0,0(%r1) */
233#define LD_R0_0R12 0xe80c0000 /* ld %r0,0(%r12) */
82bd7b59
AM
234#define STFD_FR0_0R1 0xd8010000 /* stfd %fr0,0(%r1) */
235#define LFD_FR0_0R1 0xc8010000 /* lfd %fr0,0(%r1) */
deb0e272
AM
236#define LI_R12_0 0x39800000 /* li %r12,0 */
237#define STVX_VR0_R12_R0 0x7c0c01ce /* stvx %v0,%r12,%r0 */
238#define LVX_VR0_R12_R0 0x7c0c00ce /* lvx %v0,%r12,%r0 */
239#define MTLR_R0 0x7c0803a6 /* mtlr %r0 */
82bd7b59
AM
240#define BLR 0x4e800020 /* blr */
241
41bd81ab
AM
242/* Since .opd is an array of descriptors and each entry will end up
243 with identical R_PPC64_RELATIVE relocs, there is really no need to
244 propagate .opd relocs; The dynamic linker should be taught to
1e2f5b6e 245 relocate .opd without reloc entries. */
41bd81ab
AM
246#ifndef NO_OPD_RELOCS
247#define NO_OPD_RELOCS 0
248#endif
810d4e75 249
a4b6fadd
AM
250#ifndef ARRAY_SIZE
251#define ARRAY_SIZE(a) (sizeof (a) / sizeof ((a)[0]))
252#endif
253
810d4e75
AM
254static inline int
255abiversion (bfd *abfd)
256{
257 return elf_elfheader (abfd)->e_flags & EF_PPC64_ABI;
258}
259
260static inline void
261set_abiversion (bfd *abfd, int ver)
262{
263 elf_elfheader (abfd)->e_flags &= ~EF_PPC64_ABI;
264 elf_elfheader (abfd)->e_flags |= ver & EF_PPC64_ABI;
265}
5bd4f169 266\f
f5e87a1d 267#define ONES(n) (((bfd_vma) 1 << ((n) - 1) << 1) - 1)
b34976b6 268
5bd4f169 269/* Relocation HOWTO's. */
04c9666a 270static reloc_howto_type *ppc64_elf_howto_table[(int) R_PPC64_max];
5bd4f169
AM
271
272static reloc_howto_type ppc64_elf_howto_raw[] = {
273 /* This reloc does nothing. */
274 HOWTO (R_PPC64_NONE, /* type */
275 0, /* rightshift */
6346d5ca
AM
276 3, /* size (0 = byte, 1 = short, 2 = long) */
277 0, /* bitsize */
b34976b6 278 FALSE, /* pc_relative */
5bd4f169 279 0, /* bitpos */
f5e87a1d 280 complain_overflow_dont, /* complain_on_overflow */
5bd4f169
AM
281 bfd_elf_generic_reloc, /* special_function */
282 "R_PPC64_NONE", /* name */
b34976b6 283 FALSE, /* partial_inplace */
d006db6c 284 0, /* src_mask */
5bd4f169 285 0, /* dst_mask */
b34976b6 286 FALSE), /* pcrel_offset */
5bd4f169
AM
287
288 /* A standard 32 bit relocation. */
289 HOWTO (R_PPC64_ADDR32, /* type */
290 0, /* rightshift */
291 2, /* size (0 = byte, 1 = short, 2 = long) */
292 32, /* bitsize */
b34976b6 293 FALSE, /* pc_relative */
5bd4f169
AM
294 0, /* bitpos */
295 complain_overflow_bitfield, /* complain_on_overflow */
296 bfd_elf_generic_reloc, /* special_function */
297 "R_PPC64_ADDR32", /* name */
b34976b6 298 FALSE, /* partial_inplace */
5bd4f169
AM
299 0, /* src_mask */
300 0xffffffff, /* dst_mask */
b34976b6 301 FALSE), /* pcrel_offset */
5bd4f169
AM
302
303 /* An absolute 26 bit branch; the lower two bits must be zero.
304 FIXME: we don't check that, we just clear them. */
305 HOWTO (R_PPC64_ADDR24, /* type */
306 0, /* rightshift */
307 2, /* size (0 = byte, 1 = short, 2 = long) */
308 26, /* bitsize */
b34976b6 309 FALSE, /* pc_relative */
5bd4f169
AM
310 0, /* bitpos */
311 complain_overflow_bitfield, /* complain_on_overflow */
312 bfd_elf_generic_reloc, /* special_function */
313 "R_PPC64_ADDR24", /* name */
b34976b6 314 FALSE, /* partial_inplace */
d006db6c 315 0, /* src_mask */
f5e87a1d 316 0x03fffffc, /* dst_mask */
b34976b6 317 FALSE), /* pcrel_offset */
5bd4f169
AM
318
319 /* A standard 16 bit relocation. */
320 HOWTO (R_PPC64_ADDR16, /* type */
321 0, /* rightshift */
322 1, /* size (0 = byte, 1 = short, 2 = long) */
323 16, /* bitsize */
b34976b6 324 FALSE, /* pc_relative */
5bd4f169
AM
325 0, /* bitpos */
326 complain_overflow_bitfield, /* complain_on_overflow */
327 bfd_elf_generic_reloc, /* special_function */
328 "R_PPC64_ADDR16", /* name */
b34976b6 329 FALSE, /* partial_inplace */
5bd4f169
AM
330 0, /* src_mask */
331 0xffff, /* dst_mask */
b34976b6 332 FALSE), /* pcrel_offset */
5bd4f169
AM
333
334 /* A 16 bit relocation without overflow. */
335 HOWTO (R_PPC64_ADDR16_LO, /* type */
336 0, /* rightshift */
337 1, /* size (0 = byte, 1 = short, 2 = long) */
338 16, /* bitsize */
b34976b6 339 FALSE, /* pc_relative */
5bd4f169
AM
340 0, /* bitpos */
341 complain_overflow_dont,/* complain_on_overflow */
342 bfd_elf_generic_reloc, /* special_function */
343 "R_PPC64_ADDR16_LO", /* name */
b34976b6 344 FALSE, /* partial_inplace */
5bd4f169
AM
345 0, /* src_mask */
346 0xffff, /* dst_mask */
b34976b6 347 FALSE), /* pcrel_offset */
5bd4f169
AM
348
349 /* Bits 16-31 of an address. */
350 HOWTO (R_PPC64_ADDR16_HI, /* type */
351 16, /* rightshift */
352 1, /* size (0 = byte, 1 = short, 2 = long) */
353 16, /* bitsize */
b34976b6 354 FALSE, /* pc_relative */
5bd4f169 355 0, /* bitpos */
f9c6b907 356 complain_overflow_signed, /* complain_on_overflow */
5bd4f169
AM
357 bfd_elf_generic_reloc, /* special_function */
358 "R_PPC64_ADDR16_HI", /* name */
b34976b6 359 FALSE, /* partial_inplace */
5bd4f169
AM
360 0, /* src_mask */
361 0xffff, /* dst_mask */
b34976b6 362 FALSE), /* pcrel_offset */
5bd4f169
AM
363
364 /* Bits 16-31 of an address, plus 1 if the contents of the low 16
365 bits, treated as a signed number, is negative. */
366 HOWTO (R_PPC64_ADDR16_HA, /* type */
367 16, /* rightshift */
368 1, /* size (0 = byte, 1 = short, 2 = long) */
369 16, /* bitsize */
b34976b6 370 FALSE, /* pc_relative */
5bd4f169 371 0, /* bitpos */
f9c6b907 372 complain_overflow_signed, /* complain_on_overflow */
805fc799 373 ppc64_elf_ha_reloc, /* special_function */
5bd4f169 374 "R_PPC64_ADDR16_HA", /* name */
b34976b6 375 FALSE, /* partial_inplace */
5bd4f169
AM
376 0, /* src_mask */
377 0xffff, /* dst_mask */
b34976b6 378 FALSE), /* pcrel_offset */
5bd4f169
AM
379
380 /* An absolute 16 bit branch; the lower two bits must be zero.
381 FIXME: we don't check that, we just clear them. */
382 HOWTO (R_PPC64_ADDR14, /* type */
383 0, /* rightshift */
384 2, /* size (0 = byte, 1 = short, 2 = long) */
385 16, /* bitsize */
b34976b6 386 FALSE, /* pc_relative */
5bd4f169 387 0, /* bitpos */
b80eed39 388 complain_overflow_signed, /* complain_on_overflow */
2441e016 389 ppc64_elf_branch_reloc, /* special_function */
5bd4f169 390 "R_PPC64_ADDR14", /* name */
b34976b6 391 FALSE, /* partial_inplace */
d006db6c 392 0, /* src_mask */
f5e87a1d 393 0x0000fffc, /* dst_mask */
b34976b6 394 FALSE), /* pcrel_offset */
5bd4f169
AM
395
396 /* An absolute 16 bit branch, for which bit 10 should be set to
397 indicate that the branch is expected to be taken. The lower two
398 bits must be zero. */
399 HOWTO (R_PPC64_ADDR14_BRTAKEN, /* type */
400 0, /* rightshift */
401 2, /* size (0 = byte, 1 = short, 2 = long) */
402 16, /* bitsize */
b34976b6 403 FALSE, /* pc_relative */
5bd4f169 404 0, /* bitpos */
b80eed39 405 complain_overflow_signed, /* complain_on_overflow */
805fc799 406 ppc64_elf_brtaken_reloc, /* special_function */
5bd4f169 407 "R_PPC64_ADDR14_BRTAKEN",/* name */
b34976b6 408 FALSE, /* partial_inplace */
d006db6c 409 0, /* src_mask */
f5e87a1d 410 0x0000fffc, /* dst_mask */
b34976b6 411 FALSE), /* pcrel_offset */
5bd4f169
AM
412
413 /* An absolute 16 bit branch, for which bit 10 should be set to
414 indicate that the branch is not expected to be taken. The lower
415 two bits must be zero. */
416 HOWTO (R_PPC64_ADDR14_BRNTAKEN, /* type */
417 0, /* rightshift */
418 2, /* size (0 = byte, 1 = short, 2 = long) */
419 16, /* bitsize */
b34976b6 420 FALSE, /* pc_relative */
5bd4f169 421 0, /* bitpos */
b80eed39 422 complain_overflow_signed, /* complain_on_overflow */
805fc799 423 ppc64_elf_brtaken_reloc, /* special_function */
5bd4f169 424 "R_PPC64_ADDR14_BRNTAKEN",/* name */
b34976b6 425 FALSE, /* partial_inplace */
d006db6c 426 0, /* src_mask */
f5e87a1d 427 0x0000fffc, /* dst_mask */
b34976b6 428 FALSE), /* pcrel_offset */
5bd4f169
AM
429
430 /* A relative 26 bit branch; the lower two bits must be zero. */
431 HOWTO (R_PPC64_REL24, /* type */
432 0, /* rightshift */
433 2, /* size (0 = byte, 1 = short, 2 = long) */
434 26, /* bitsize */
b34976b6 435 TRUE, /* pc_relative */
5bd4f169
AM
436 0, /* bitpos */
437 complain_overflow_signed, /* complain_on_overflow */
2441e016 438 ppc64_elf_branch_reloc, /* special_function */
5bd4f169 439 "R_PPC64_REL24", /* name */
b34976b6 440 FALSE, /* partial_inplace */
d006db6c 441 0, /* src_mask */
f5e87a1d 442 0x03fffffc, /* dst_mask */
b34976b6 443 TRUE), /* pcrel_offset */
5bd4f169
AM
444
445 /* A relative 16 bit branch; the lower two bits must be zero. */
446 HOWTO (R_PPC64_REL14, /* type */
447 0, /* rightshift */
448 2, /* size (0 = byte, 1 = short, 2 = long) */
449 16, /* bitsize */
b34976b6 450 TRUE, /* pc_relative */
5bd4f169
AM
451 0, /* bitpos */
452 complain_overflow_signed, /* complain_on_overflow */
2441e016 453 ppc64_elf_branch_reloc, /* special_function */
5bd4f169 454 "R_PPC64_REL14", /* name */
b34976b6 455 FALSE, /* partial_inplace */
d006db6c 456 0, /* src_mask */
f5e87a1d 457 0x0000fffc, /* dst_mask */
b34976b6 458 TRUE), /* pcrel_offset */
5bd4f169
AM
459
460 /* A relative 16 bit branch. Bit 10 should be set to indicate that
461 the branch is expected to be taken. The lower two bits must be
462 zero. */
463 HOWTO (R_PPC64_REL14_BRTAKEN, /* type */
464 0, /* rightshift */
465 2, /* size (0 = byte, 1 = short, 2 = long) */
466 16, /* bitsize */
b34976b6 467 TRUE, /* pc_relative */
5bd4f169
AM
468 0, /* bitpos */
469 complain_overflow_signed, /* complain_on_overflow */
805fc799 470 ppc64_elf_brtaken_reloc, /* special_function */
5bd4f169 471 "R_PPC64_REL14_BRTAKEN", /* name */
b34976b6 472 FALSE, /* partial_inplace */
d006db6c 473 0, /* src_mask */
f5e87a1d 474 0x0000fffc, /* dst_mask */
b34976b6 475 TRUE), /* pcrel_offset */
5bd4f169
AM
476
477 /* A relative 16 bit branch. Bit 10 should be set to indicate that
478 the branch is not expected to be taken. The lower two bits must
479 be zero. */
480 HOWTO (R_PPC64_REL14_BRNTAKEN, /* type */
481 0, /* rightshift */
482 2, /* size (0 = byte, 1 = short, 2 = long) */
483 16, /* bitsize */
b34976b6 484 TRUE, /* pc_relative */
5bd4f169
AM
485 0, /* bitpos */
486 complain_overflow_signed, /* complain_on_overflow */
805fc799 487 ppc64_elf_brtaken_reloc, /* special_function */
5bd4f169 488 "R_PPC64_REL14_BRNTAKEN",/* name */
b34976b6 489 FALSE, /* partial_inplace */
d006db6c 490 0, /* src_mask */
f5e87a1d 491 0x0000fffc, /* dst_mask */
b34976b6 492 TRUE), /* pcrel_offset */
5bd4f169
AM
493
494 /* Like R_PPC64_ADDR16, but referring to the GOT table entry for the
495 symbol. */
496 HOWTO (R_PPC64_GOT16, /* type */
497 0, /* rightshift */
498 1, /* size (0 = byte, 1 = short, 2 = long) */
499 16, /* bitsize */
b34976b6 500 FALSE, /* pc_relative */
5bd4f169
AM
501 0, /* bitpos */
502 complain_overflow_signed, /* complain_on_overflow */
805fc799 503 ppc64_elf_unhandled_reloc, /* special_function */
5bd4f169 504 "R_PPC64_GOT16", /* name */
b34976b6 505 FALSE, /* partial_inplace */
5bd4f169
AM
506 0, /* src_mask */
507 0xffff, /* dst_mask */
b34976b6 508 FALSE), /* pcrel_offset */
5bd4f169
AM
509
510 /* Like R_PPC64_ADDR16_LO, but referring to the GOT table entry for
511 the symbol. */
512 HOWTO (R_PPC64_GOT16_LO, /* type */
513 0, /* rightshift */
514 1, /* size (0 = byte, 1 = short, 2 = long) */
515 16, /* bitsize */
b34976b6 516 FALSE, /* pc_relative */
5bd4f169
AM
517 0, /* bitpos */
518 complain_overflow_dont, /* complain_on_overflow */
805fc799 519 ppc64_elf_unhandled_reloc, /* special_function */
5bd4f169 520 "R_PPC64_GOT16_LO", /* name */
b34976b6 521 FALSE, /* partial_inplace */
5bd4f169
AM
522 0, /* src_mask */
523 0xffff, /* dst_mask */
b34976b6 524 FALSE), /* pcrel_offset */
5bd4f169
AM
525
526 /* Like R_PPC64_ADDR16_HI, but referring to the GOT table entry for
527 the symbol. */
528 HOWTO (R_PPC64_GOT16_HI, /* type */
529 16, /* rightshift */
530 1, /* size (0 = byte, 1 = short, 2 = long) */
531 16, /* bitsize */
b34976b6 532 FALSE, /* pc_relative */
5bd4f169 533 0, /* bitpos */
f9c6b907 534 complain_overflow_signed,/* complain_on_overflow */
805fc799 535 ppc64_elf_unhandled_reloc, /* special_function */
5bd4f169 536 "R_PPC64_GOT16_HI", /* name */
b34976b6 537 FALSE, /* partial_inplace */
5bd4f169
AM
538 0, /* src_mask */
539 0xffff, /* dst_mask */
b34976b6 540 FALSE), /* pcrel_offset */
5bd4f169
AM
541
542 /* Like R_PPC64_ADDR16_HA, but referring to the GOT table entry for
543 the symbol. */
544 HOWTO (R_PPC64_GOT16_HA, /* type */
545 16, /* rightshift */
546 1, /* size (0 = byte, 1 = short, 2 = long) */
547 16, /* bitsize */
b34976b6 548 FALSE, /* pc_relative */
5bd4f169 549 0, /* bitpos */
f9c6b907 550 complain_overflow_signed,/* complain_on_overflow */
805fc799 551 ppc64_elf_unhandled_reloc, /* special_function */
5bd4f169 552 "R_PPC64_GOT16_HA", /* name */
b34976b6 553 FALSE, /* partial_inplace */
5bd4f169
AM
554 0, /* src_mask */
555 0xffff, /* dst_mask */
b34976b6 556 FALSE), /* pcrel_offset */
5bd4f169
AM
557
558 /* This is used only by the dynamic linker. The symbol should exist
559 both in the object being run and in some shared library. The
560 dynamic linker copies the data addressed by the symbol from the
561 shared library into the object, because the object being
562 run has to have the data at some particular address. */
563 HOWTO (R_PPC64_COPY, /* type */
564 0, /* rightshift */
f5e87a1d
AM
565 0, /* this one is variable size */
566 0, /* bitsize */
b34976b6 567 FALSE, /* pc_relative */
5bd4f169 568 0, /* bitpos */
f5e87a1d
AM
569 complain_overflow_dont, /* complain_on_overflow */
570 ppc64_elf_unhandled_reloc, /* special_function */
5bd4f169 571 "R_PPC64_COPY", /* name */
b34976b6 572 FALSE, /* partial_inplace */
5bd4f169
AM
573 0, /* src_mask */
574 0, /* dst_mask */
b34976b6 575 FALSE), /* pcrel_offset */
5bd4f169
AM
576
577 /* Like R_PPC64_ADDR64, but used when setting global offset table
578 entries. */
579 HOWTO (R_PPC64_GLOB_DAT, /* type */
580 0, /* rightshift */
581 4, /* size (0=byte, 1=short, 2=long, 4=64 bits) */
582 64, /* bitsize */
b34976b6 583 FALSE, /* pc_relative */
5bd4f169
AM
584 0, /* bitpos */
585 complain_overflow_dont, /* complain_on_overflow */
805fc799 586 ppc64_elf_unhandled_reloc, /* special_function */
5bd4f169 587 "R_PPC64_GLOB_DAT", /* name */
b34976b6 588 FALSE, /* partial_inplace */
5bd4f169 589 0, /* src_mask */
f5e87a1d 590 ONES (64), /* dst_mask */
b34976b6 591 FALSE), /* pcrel_offset */
5bd4f169
AM
592
593 /* Created by the link editor. Marks a procedure linkage table
594 entry for a symbol. */
595 HOWTO (R_PPC64_JMP_SLOT, /* type */
596 0, /* rightshift */
597 0, /* size (0 = byte, 1 = short, 2 = long) */
598 0, /* bitsize */
b34976b6 599 FALSE, /* pc_relative */
5bd4f169
AM
600 0, /* bitpos */
601 complain_overflow_dont, /* complain_on_overflow */
805fc799 602 ppc64_elf_unhandled_reloc, /* special_function */
5bd4f169 603 "R_PPC64_JMP_SLOT", /* name */
b34976b6 604 FALSE, /* partial_inplace */
5bd4f169
AM
605 0, /* src_mask */
606 0, /* dst_mask */
b34976b6 607 FALSE), /* pcrel_offset */
5bd4f169
AM
608
609 /* Used only by the dynamic linker. When the object is run, this
610 doubleword64 is set to the load address of the object, plus the
611 addend. */
612 HOWTO (R_PPC64_RELATIVE, /* type */
613 0, /* rightshift */
614 4, /* size (0=byte, 1=short, 2=long, 4=64 bits) */
615 64, /* bitsize */
b34976b6 616 FALSE, /* pc_relative */
5bd4f169
AM
617 0, /* bitpos */
618 complain_overflow_dont, /* complain_on_overflow */
619 bfd_elf_generic_reloc, /* special_function */
620 "R_PPC64_RELATIVE", /* name */
b34976b6 621 FALSE, /* partial_inplace */
5bd4f169 622 0, /* src_mask */
f5e87a1d 623 ONES (64), /* dst_mask */
b34976b6 624 FALSE), /* pcrel_offset */
5bd4f169
AM
625
626 /* Like R_PPC64_ADDR32, but may be unaligned. */
627 HOWTO (R_PPC64_UADDR32, /* type */
628 0, /* rightshift */
629 2, /* size (0 = byte, 1 = short, 2 = long) */
630 32, /* bitsize */
b34976b6 631 FALSE, /* pc_relative */
5bd4f169
AM
632 0, /* bitpos */
633 complain_overflow_bitfield, /* complain_on_overflow */
634 bfd_elf_generic_reloc, /* special_function */
635 "R_PPC64_UADDR32", /* name */
b34976b6 636 FALSE, /* partial_inplace */
5bd4f169
AM
637 0, /* src_mask */
638 0xffffffff, /* dst_mask */
b34976b6 639 FALSE), /* pcrel_offset */
5bd4f169
AM
640
641 /* Like R_PPC64_ADDR16, but may be unaligned. */
642 HOWTO (R_PPC64_UADDR16, /* type */
643 0, /* rightshift */
644 1, /* size (0 = byte, 1 = short, 2 = long) */
645 16, /* bitsize */
b34976b6 646 FALSE, /* pc_relative */
5bd4f169
AM
647 0, /* bitpos */
648 complain_overflow_bitfield, /* complain_on_overflow */
649 bfd_elf_generic_reloc, /* special_function */
650 "R_PPC64_UADDR16", /* name */
b34976b6 651 FALSE, /* partial_inplace */
5bd4f169
AM
652 0, /* src_mask */
653 0xffff, /* dst_mask */
b34976b6 654 FALSE), /* pcrel_offset */
5bd4f169
AM
655
656 /* 32-bit PC relative. */
657 HOWTO (R_PPC64_REL32, /* type */
658 0, /* rightshift */
659 2, /* size (0 = byte, 1 = short, 2 = long) */
660 32, /* bitsize */
b34976b6 661 TRUE, /* pc_relative */
5bd4f169 662 0, /* bitpos */
5bd4f169
AM
663 complain_overflow_signed, /* complain_on_overflow */
664 bfd_elf_generic_reloc, /* special_function */
665 "R_PPC64_REL32", /* name */
b34976b6 666 FALSE, /* partial_inplace */
5bd4f169
AM
667 0, /* src_mask */
668 0xffffffff, /* dst_mask */
b34976b6 669 TRUE), /* pcrel_offset */
5bd4f169 670
10ed1bba 671 /* 32-bit relocation to the symbol's procedure linkage table. */
5bd4f169
AM
672 HOWTO (R_PPC64_PLT32, /* type */
673 0, /* rightshift */
674 2, /* size (0 = byte, 1 = short, 2 = long) */
675 32, /* bitsize */
b34976b6 676 FALSE, /* pc_relative */
5bd4f169
AM
677 0, /* bitpos */
678 complain_overflow_bitfield, /* complain_on_overflow */
805fc799 679 ppc64_elf_unhandled_reloc, /* special_function */
5bd4f169 680 "R_PPC64_PLT32", /* name */
b34976b6 681 FALSE, /* partial_inplace */
5bd4f169 682 0, /* src_mask */
f5e87a1d 683 0xffffffff, /* dst_mask */
b34976b6 684 FALSE), /* pcrel_offset */
5bd4f169
AM
685
686 /* 32-bit PC relative relocation to the symbol's procedure linkage table.
687 FIXME: R_PPC64_PLTREL32 not supported. */
688 HOWTO (R_PPC64_PLTREL32, /* type */
689 0, /* rightshift */
690 2, /* size (0 = byte, 1 = short, 2 = long) */
691 32, /* bitsize */
b34976b6 692 TRUE, /* pc_relative */
5bd4f169
AM
693 0, /* bitpos */
694 complain_overflow_signed, /* complain_on_overflow */
3ce51288 695 ppc64_elf_unhandled_reloc, /* special_function */
5bd4f169 696 "R_PPC64_PLTREL32", /* name */
b34976b6 697 FALSE, /* partial_inplace */
5bd4f169 698 0, /* src_mask */
f5e87a1d 699 0xffffffff, /* dst_mask */
b34976b6 700 TRUE), /* pcrel_offset */
5bd4f169
AM
701
702 /* Like R_PPC64_ADDR16_LO, but referring to the PLT table entry for
703 the symbol. */
704 HOWTO (R_PPC64_PLT16_LO, /* type */
705 0, /* rightshift */
706 1, /* size (0 = byte, 1 = short, 2 = long) */
707 16, /* bitsize */
b34976b6 708 FALSE, /* pc_relative */
5bd4f169
AM
709 0, /* bitpos */
710 complain_overflow_dont, /* complain_on_overflow */
805fc799 711 ppc64_elf_unhandled_reloc, /* special_function */
5bd4f169 712 "R_PPC64_PLT16_LO", /* name */
b34976b6 713 FALSE, /* partial_inplace */
5bd4f169
AM
714 0, /* src_mask */
715 0xffff, /* dst_mask */
b34976b6 716 FALSE), /* pcrel_offset */
5bd4f169
AM
717
718 /* Like R_PPC64_ADDR16_HI, but referring to the PLT table entry for
719 the symbol. */
720 HOWTO (R_PPC64_PLT16_HI, /* type */
721 16, /* rightshift */
722 1, /* size (0 = byte, 1 = short, 2 = long) */
723 16, /* bitsize */
b34976b6 724 FALSE, /* pc_relative */
5bd4f169 725 0, /* bitpos */
f9c6b907 726 complain_overflow_signed, /* complain_on_overflow */
805fc799 727 ppc64_elf_unhandled_reloc, /* special_function */
5bd4f169 728 "R_PPC64_PLT16_HI", /* name */
b34976b6 729 FALSE, /* partial_inplace */
5bd4f169
AM
730 0, /* src_mask */
731 0xffff, /* dst_mask */
b34976b6 732 FALSE), /* pcrel_offset */
5bd4f169
AM
733
734 /* Like R_PPC64_ADDR16_HA, but referring to the PLT table entry for
735 the symbol. */
736 HOWTO (R_PPC64_PLT16_HA, /* type */
737 16, /* rightshift */
738 1, /* size (0 = byte, 1 = short, 2 = long) */
739 16, /* bitsize */
b34976b6 740 FALSE, /* pc_relative */
5bd4f169 741 0, /* bitpos */
f9c6b907 742 complain_overflow_signed, /* complain_on_overflow */
805fc799 743 ppc64_elf_unhandled_reloc, /* special_function */
5bd4f169 744 "R_PPC64_PLT16_HA", /* name */
b34976b6 745 FALSE, /* partial_inplace */
5bd4f169
AM
746 0, /* src_mask */
747 0xffff, /* dst_mask */
b34976b6 748 FALSE), /* pcrel_offset */
5bd4f169 749
c061c2d8 750 /* 16-bit section relative relocation. */
5bd4f169
AM
751 HOWTO (R_PPC64_SECTOFF, /* type */
752 0, /* rightshift */
c061c2d8
AM
753 1, /* size (0 = byte, 1 = short, 2 = long) */
754 16, /* bitsize */
b34976b6 755 FALSE, /* pc_relative */
5bd4f169 756 0, /* bitpos */
b80eed39 757 complain_overflow_signed, /* complain_on_overflow */
805fc799 758 ppc64_elf_sectoff_reloc, /* special_function */
5bd4f169 759 "R_PPC64_SECTOFF", /* name */
b34976b6 760 FALSE, /* partial_inplace */
5bd4f169 761 0, /* src_mask */
c061c2d8 762 0xffff, /* dst_mask */
b34976b6 763 FALSE), /* pcrel_offset */
5bd4f169 764
c061c2d8 765 /* Like R_PPC64_SECTOFF, but no overflow warning. */
5bd4f169
AM
766 HOWTO (R_PPC64_SECTOFF_LO, /* type */
767 0, /* rightshift */
768 1, /* size (0 = byte, 1 = short, 2 = long) */
769 16, /* bitsize */
b34976b6 770 FALSE, /* pc_relative */
5bd4f169
AM
771 0, /* bitpos */
772 complain_overflow_dont, /* complain_on_overflow */
805fc799 773 ppc64_elf_sectoff_reloc, /* special_function */
5bd4f169 774 "R_PPC64_SECTOFF_LO", /* name */
b34976b6 775 FALSE, /* partial_inplace */
5bd4f169
AM
776 0, /* src_mask */
777 0xffff, /* dst_mask */
b34976b6 778 FALSE), /* pcrel_offset */
5bd4f169
AM
779
780 /* 16-bit upper half section relative relocation. */
781 HOWTO (R_PPC64_SECTOFF_HI, /* type */
782 16, /* rightshift */
783 1, /* size (0 = byte, 1 = short, 2 = long) */
784 16, /* bitsize */
b34976b6 785 FALSE, /* pc_relative */
5bd4f169 786 0, /* bitpos */
f9c6b907 787 complain_overflow_signed, /* complain_on_overflow */
805fc799 788 ppc64_elf_sectoff_reloc, /* special_function */
5bd4f169 789 "R_PPC64_SECTOFF_HI", /* name */
b34976b6 790 FALSE, /* partial_inplace */
5bd4f169
AM
791 0, /* src_mask */
792 0xffff, /* dst_mask */
b34976b6 793 FALSE), /* pcrel_offset */
5bd4f169
AM
794
795 /* 16-bit upper half adjusted section relative relocation. */
796 HOWTO (R_PPC64_SECTOFF_HA, /* type */
797 16, /* rightshift */
798 1, /* size (0 = byte, 1 = short, 2 = long) */
799 16, /* bitsize */
b34976b6 800 FALSE, /* pc_relative */
5bd4f169 801 0, /* bitpos */
f9c6b907 802 complain_overflow_signed, /* complain_on_overflow */
805fc799 803 ppc64_elf_sectoff_ha_reloc, /* special_function */
5bd4f169 804 "R_PPC64_SECTOFF_HA", /* name */
b34976b6 805 FALSE, /* partial_inplace */
5bd4f169
AM
806 0, /* src_mask */
807 0xffff, /* dst_mask */
b34976b6 808 FALSE), /* pcrel_offset */
5bd4f169 809
04c9666a
AM
810 /* Like R_PPC64_REL24 without touching the two least significant bits. */
811 HOWTO (R_PPC64_REL30, /* type */
5bd4f169
AM
812 2, /* rightshift */
813 2, /* size (0 = byte, 1 = short, 2 = long) */
814 30, /* bitsize */
b34976b6 815 TRUE, /* pc_relative */
5bd4f169
AM
816 0, /* bitpos */
817 complain_overflow_dont, /* complain_on_overflow */
818 bfd_elf_generic_reloc, /* special_function */
04c9666a 819 "R_PPC64_REL30", /* name */
b34976b6 820 FALSE, /* partial_inplace */
d006db6c 821 0, /* src_mask */
5bd4f169 822 0xfffffffc, /* dst_mask */
b34976b6 823 TRUE), /* pcrel_offset */
5bd4f169
AM
824
825 /* Relocs in the 64-bit PowerPC ELF ABI, not in the 32-bit ABI. */
826
827 /* A standard 64-bit relocation. */
828 HOWTO (R_PPC64_ADDR64, /* type */
829 0, /* rightshift */
830 4, /* size (0=byte, 1=short, 2=long, 4=64 bits) */
831 64, /* bitsize */
b34976b6 832 FALSE, /* pc_relative */
5bd4f169
AM
833 0, /* bitpos */
834 complain_overflow_dont, /* complain_on_overflow */
835 bfd_elf_generic_reloc, /* special_function */
836 "R_PPC64_ADDR64", /* name */
b34976b6 837 FALSE, /* partial_inplace */
5bd4f169 838 0, /* src_mask */
f5e87a1d 839 ONES (64), /* dst_mask */
b34976b6 840 FALSE), /* pcrel_offset */
5bd4f169
AM
841
842 /* The bits 32-47 of an address. */
843 HOWTO (R_PPC64_ADDR16_HIGHER, /* type */
844 32, /* rightshift */
845 1, /* size (0 = byte, 1 = short, 2 = long) */
846 16, /* bitsize */
b34976b6 847 FALSE, /* pc_relative */
5bd4f169
AM
848 0, /* bitpos */
849 complain_overflow_dont, /* complain_on_overflow */
850 bfd_elf_generic_reloc, /* special_function */
851 "R_PPC64_ADDR16_HIGHER", /* name */
b34976b6 852 FALSE, /* partial_inplace */
5bd4f169
AM
853 0, /* src_mask */
854 0xffff, /* dst_mask */
b34976b6 855 FALSE), /* pcrel_offset */
5bd4f169
AM
856
857 /* The bits 32-47 of an address, plus 1 if the contents of the low
858 16 bits, treated as a signed number, is negative. */
859 HOWTO (R_PPC64_ADDR16_HIGHERA, /* type */
860 32, /* rightshift */
861 1, /* size (0 = byte, 1 = short, 2 = long) */
862 16, /* bitsize */
b34976b6 863 FALSE, /* pc_relative */
5bd4f169
AM
864 0, /* bitpos */
865 complain_overflow_dont, /* complain_on_overflow */
805fc799 866 ppc64_elf_ha_reloc, /* special_function */
5bd4f169 867 "R_PPC64_ADDR16_HIGHERA", /* name */
b34976b6 868 FALSE, /* partial_inplace */
5bd4f169
AM
869 0, /* src_mask */
870 0xffff, /* dst_mask */
b34976b6 871 FALSE), /* pcrel_offset */
5bd4f169
AM
872
873 /* The bits 48-63 of an address. */
874 HOWTO (R_PPC64_ADDR16_HIGHEST,/* type */
875 48, /* rightshift */
876 1, /* size (0 = byte, 1 = short, 2 = long) */
877 16, /* bitsize */
b34976b6 878 FALSE, /* pc_relative */
5bd4f169
AM
879 0, /* bitpos */
880 complain_overflow_dont, /* complain_on_overflow */
881 bfd_elf_generic_reloc, /* special_function */
882 "R_PPC64_ADDR16_HIGHEST", /* name */
b34976b6 883 FALSE, /* partial_inplace */
5bd4f169
AM
884 0, /* src_mask */
885 0xffff, /* dst_mask */
b34976b6 886 FALSE), /* pcrel_offset */
5bd4f169
AM
887
888 /* The bits 48-63 of an address, plus 1 if the contents of the low
889 16 bits, treated as a signed number, is negative. */
890 HOWTO (R_PPC64_ADDR16_HIGHESTA,/* type */
891 48, /* rightshift */
892 1, /* size (0 = byte, 1 = short, 2 = long) */
893 16, /* bitsize */
b34976b6 894 FALSE, /* pc_relative */
5bd4f169
AM
895 0, /* bitpos */
896 complain_overflow_dont, /* complain_on_overflow */
805fc799 897 ppc64_elf_ha_reloc, /* special_function */
5bd4f169 898 "R_PPC64_ADDR16_HIGHESTA", /* name */
b34976b6 899 FALSE, /* partial_inplace */
5bd4f169
AM
900 0, /* src_mask */
901 0xffff, /* dst_mask */
b34976b6 902 FALSE), /* pcrel_offset */
5bd4f169
AM
903
904 /* Like ADDR64, but may be unaligned. */
905 HOWTO (R_PPC64_UADDR64, /* type */
906 0, /* rightshift */
907 4, /* size (0=byte, 1=short, 2=long, 4=64 bits) */
908 64, /* bitsize */
b34976b6 909 FALSE, /* pc_relative */
5bd4f169
AM
910 0, /* bitpos */
911 complain_overflow_dont, /* complain_on_overflow */
912 bfd_elf_generic_reloc, /* special_function */
913 "R_PPC64_UADDR64", /* name */
b34976b6 914 FALSE, /* partial_inplace */
5bd4f169 915 0, /* src_mask */
f5e87a1d 916 ONES (64), /* dst_mask */
b34976b6 917 FALSE), /* pcrel_offset */
5bd4f169
AM
918
919 /* 64-bit relative relocation. */
920 HOWTO (R_PPC64_REL64, /* type */
921 0, /* rightshift */
922 4, /* size (0=byte, 1=short, 2=long, 4=64 bits) */
923 64, /* bitsize */
b34976b6 924 TRUE, /* pc_relative */
5bd4f169
AM
925 0, /* bitpos */
926 complain_overflow_dont, /* complain_on_overflow */
927 bfd_elf_generic_reloc, /* special_function */
928 "R_PPC64_REL64", /* name */
b34976b6 929 FALSE, /* partial_inplace */
5bd4f169 930 0, /* src_mask */
f5e87a1d 931 ONES (64), /* dst_mask */
b34976b6 932 TRUE), /* pcrel_offset */
5bd4f169 933
cedb70c5 934 /* 64-bit relocation to the symbol's procedure linkage table. */
5bd4f169
AM
935 HOWTO (R_PPC64_PLT64, /* type */
936 0, /* rightshift */
937 4, /* size (0=byte, 1=short, 2=long, 4=64 bits) */
938 64, /* bitsize */
b34976b6 939 FALSE, /* pc_relative */
5bd4f169
AM
940 0, /* bitpos */
941 complain_overflow_dont, /* complain_on_overflow */
805fc799 942 ppc64_elf_unhandled_reloc, /* special_function */
5bd4f169 943 "R_PPC64_PLT64", /* name */
b34976b6 944 FALSE, /* partial_inplace */
5bd4f169 945 0, /* src_mask */
f5e87a1d 946 ONES (64), /* dst_mask */
b34976b6 947 FALSE), /* pcrel_offset */
5bd4f169
AM
948
949 /* 64-bit PC relative relocation to the symbol's procedure linkage
950 table. */
951 /* FIXME: R_PPC64_PLTREL64 not supported. */
952 HOWTO (R_PPC64_PLTREL64, /* type */
953 0, /* rightshift */
954 4, /* size (0=byte, 1=short, 2=long, 4=64 bits) */
955 64, /* bitsize */
b34976b6 956 TRUE, /* pc_relative */
5bd4f169
AM
957 0, /* bitpos */
958 complain_overflow_dont, /* complain_on_overflow */
805fc799 959 ppc64_elf_unhandled_reloc, /* special_function */
5bd4f169 960 "R_PPC64_PLTREL64", /* name */
b34976b6 961 FALSE, /* partial_inplace */
5bd4f169 962 0, /* src_mask */
f5e87a1d 963 ONES (64), /* dst_mask */
b34976b6 964 TRUE), /* pcrel_offset */
5bd4f169
AM
965
966 /* 16 bit TOC-relative relocation. */
967
968 /* R_PPC64_TOC16 47 half16* S + A - .TOC. */
969 HOWTO (R_PPC64_TOC16, /* type */
970 0, /* rightshift */
971 1, /* size (0 = byte, 1 = short, 2 = long) */
972 16, /* bitsize */
b34976b6 973 FALSE, /* pc_relative */
5bd4f169
AM
974 0, /* bitpos */
975 complain_overflow_signed, /* complain_on_overflow */
805fc799 976 ppc64_elf_toc_reloc, /* special_function */
5bd4f169 977 "R_PPC64_TOC16", /* name */
b34976b6 978 FALSE, /* partial_inplace */
5bd4f169
AM
979 0, /* src_mask */
980 0xffff, /* dst_mask */
b34976b6 981 FALSE), /* pcrel_offset */
5bd4f169
AM
982
983 /* 16 bit TOC-relative relocation without overflow. */
984
985 /* R_PPC64_TOC16_LO 48 half16 #lo (S + A - .TOC.) */
986 HOWTO (R_PPC64_TOC16_LO, /* type */
987 0, /* rightshift */
988 1, /* size (0 = byte, 1 = short, 2 = long) */
989 16, /* bitsize */
b34976b6 990 FALSE, /* pc_relative */
5bd4f169
AM
991 0, /* bitpos */
992 complain_overflow_dont, /* complain_on_overflow */
805fc799 993 ppc64_elf_toc_reloc, /* special_function */
5bd4f169 994 "R_PPC64_TOC16_LO", /* name */
b34976b6 995 FALSE, /* partial_inplace */
5bd4f169
AM
996 0, /* src_mask */
997 0xffff, /* dst_mask */
b34976b6 998 FALSE), /* pcrel_offset */
5bd4f169
AM
999
1000 /* 16 bit TOC-relative relocation, high 16 bits. */
1001
1002 /* R_PPC64_TOC16_HI 49 half16 #hi (S + A - .TOC.) */
1003 HOWTO (R_PPC64_TOC16_HI, /* type */
1004 16, /* rightshift */
1005 1, /* size (0 = byte, 1 = short, 2 = long) */
1006 16, /* bitsize */
b34976b6 1007 FALSE, /* pc_relative */
5bd4f169 1008 0, /* bitpos */
f9c6b907 1009 complain_overflow_signed, /* complain_on_overflow */
805fc799 1010 ppc64_elf_toc_reloc, /* special_function */
5bd4f169 1011 "R_PPC64_TOC16_HI", /* name */
b34976b6 1012 FALSE, /* partial_inplace */
5bd4f169
AM
1013 0, /* src_mask */
1014 0xffff, /* dst_mask */
b34976b6 1015 FALSE), /* pcrel_offset */
5bd4f169
AM
1016
1017 /* 16 bit TOC-relative relocation, high 16 bits, plus 1 if the
1018 contents of the low 16 bits, treated as a signed number, is
1019 negative. */
1020
1021 /* R_PPC64_TOC16_HA 50 half16 #ha (S + A - .TOC.) */
1022 HOWTO (R_PPC64_TOC16_HA, /* type */
1023 16, /* rightshift */
1024 1, /* size (0 = byte, 1 = short, 2 = long) */
1025 16, /* bitsize */
b34976b6 1026 FALSE, /* pc_relative */
5bd4f169 1027 0, /* bitpos */
f9c6b907 1028 complain_overflow_signed, /* complain_on_overflow */
805fc799 1029 ppc64_elf_toc_ha_reloc, /* special_function */
5bd4f169 1030 "R_PPC64_TOC16_HA", /* name */
b34976b6 1031 FALSE, /* partial_inplace */
5bd4f169
AM
1032 0, /* src_mask */
1033 0xffff, /* dst_mask */
b34976b6 1034 FALSE), /* pcrel_offset */
5bd4f169
AM
1035
1036 /* 64-bit relocation; insert value of TOC base (.TOC.). */
1037
1038 /* R_PPC64_TOC 51 doubleword64 .TOC. */
1039 HOWTO (R_PPC64_TOC, /* type */
1040 0, /* rightshift */
1041 4, /* size (0=byte, 1=short, 2=long, 4=64 bits) */
1042 64, /* bitsize */
b34976b6 1043 FALSE, /* pc_relative */
5bd4f169 1044 0, /* bitpos */
b80eed39 1045 complain_overflow_dont, /* complain_on_overflow */
805fc799 1046 ppc64_elf_toc64_reloc, /* special_function */
5bd4f169 1047 "R_PPC64_TOC", /* name */
b34976b6 1048 FALSE, /* partial_inplace */
5bd4f169 1049 0, /* src_mask */
f5e87a1d 1050 ONES (64), /* dst_mask */
b34976b6 1051 FALSE), /* pcrel_offset */
5bd4f169
AM
1052
1053 /* Like R_PPC64_GOT16, but also informs the link editor that the
1054 value to relocate may (!) refer to a PLT entry which the link
1055 editor (a) may replace with the symbol value. If the link editor
1056 is unable to fully resolve the symbol, it may (b) create a PLT
1057 entry and store the address to the new PLT entry in the GOT.
1058 This permits lazy resolution of function symbols at run time.
1059 The link editor may also skip all of this and just (c) emit a
1060 R_PPC64_GLOB_DAT to tie the symbol to the GOT entry. */
1061 /* FIXME: R_PPC64_PLTGOT16 not implemented. */
1062 HOWTO (R_PPC64_PLTGOT16, /* type */
1063 0, /* rightshift */
1064 1, /* size (0 = byte, 1 = short, 2 = long) */
1065 16, /* bitsize */
b34976b6 1066 FALSE, /* pc_relative */
5bd4f169
AM
1067 0, /* bitpos */
1068 complain_overflow_signed, /* complain_on_overflow */
805fc799 1069 ppc64_elf_unhandled_reloc, /* special_function */
411e1bfb
AM
1070 "R_PPC64_PLTGOT16", /* name */
1071 FALSE, /* partial_inplace */
1072 0, /* src_mask */
1073 0xffff, /* dst_mask */
1074 FALSE), /* pcrel_offset */
1075
1076 /* Like R_PPC64_PLTGOT16, but without overflow. */
1077 /* FIXME: R_PPC64_PLTGOT16_LO not implemented. */
1078 HOWTO (R_PPC64_PLTGOT16_LO, /* type */
1079 0, /* rightshift */
1080 1, /* size (0 = byte, 1 = short, 2 = long) */
1081 16, /* bitsize */
1082 FALSE, /* pc_relative */
1083 0, /* bitpos */
1084 complain_overflow_dont, /* complain_on_overflow */
1085 ppc64_elf_unhandled_reloc, /* special_function */
1086 "R_PPC64_PLTGOT16_LO", /* name */
1087 FALSE, /* partial_inplace */
1088 0, /* src_mask */
1089 0xffff, /* dst_mask */
1090 FALSE), /* pcrel_offset */
1091
1092 /* Like R_PPC64_PLT_GOT16, but using bits 16-31 of the address. */
1093 /* FIXME: R_PPC64_PLTGOT16_HI not implemented. */
1094 HOWTO (R_PPC64_PLTGOT16_HI, /* type */
1095 16, /* rightshift */
1096 1, /* size (0 = byte, 1 = short, 2 = long) */
1097 16, /* bitsize */
1098 FALSE, /* pc_relative */
1099 0, /* bitpos */
f9c6b907 1100 complain_overflow_signed, /* complain_on_overflow */
411e1bfb
AM
1101 ppc64_elf_unhandled_reloc, /* special_function */
1102 "R_PPC64_PLTGOT16_HI", /* name */
1103 FALSE, /* partial_inplace */
1104 0, /* src_mask */
1105 0xffff, /* dst_mask */
1106 FALSE), /* pcrel_offset */
1107
1108 /* Like R_PPC64_PLT_GOT16, but using bits 16-31 of the address, plus
1109 1 if the contents of the low 16 bits, treated as a signed number,
1110 is negative. */
1111 /* FIXME: R_PPC64_PLTGOT16_HA not implemented. */
1112 HOWTO (R_PPC64_PLTGOT16_HA, /* type */
1113 16, /* rightshift */
1114 1, /* size (0 = byte, 1 = short, 2 = long) */
1115 16, /* bitsize */
1116 FALSE, /* pc_relative */
1117 0, /* bitpos */
f9c6b907 1118 complain_overflow_signed, /* complain_on_overflow */
411e1bfb
AM
1119 ppc64_elf_unhandled_reloc, /* special_function */
1120 "R_PPC64_PLTGOT16_HA", /* name */
1121 FALSE, /* partial_inplace */
1122 0, /* src_mask */
1123 0xffff, /* dst_mask */
1124 FALSE), /* pcrel_offset */
1125
1126 /* Like R_PPC64_ADDR16, but for instructions with a DS field. */
1127 HOWTO (R_PPC64_ADDR16_DS, /* type */
1128 0, /* rightshift */
1129 1, /* size (0 = byte, 1 = short, 2 = long) */
1130 16, /* bitsize */
1131 FALSE, /* pc_relative */
1132 0, /* bitpos */
b80eed39 1133 complain_overflow_signed, /* complain_on_overflow */
411e1bfb
AM
1134 bfd_elf_generic_reloc, /* special_function */
1135 "R_PPC64_ADDR16_DS", /* name */
1136 FALSE, /* partial_inplace */
1137 0, /* src_mask */
1138 0xfffc, /* dst_mask */
1139 FALSE), /* pcrel_offset */
1140
1141 /* Like R_PPC64_ADDR16_LO, but for instructions with a DS field. */
1142 HOWTO (R_PPC64_ADDR16_LO_DS, /* type */
1143 0, /* rightshift */
1144 1, /* size (0 = byte, 1 = short, 2 = long) */
1145 16, /* bitsize */
1146 FALSE, /* pc_relative */
1147 0, /* bitpos */
1148 complain_overflow_dont,/* complain_on_overflow */
1149 bfd_elf_generic_reloc, /* special_function */
1150 "R_PPC64_ADDR16_LO_DS",/* name */
1151 FALSE, /* partial_inplace */
1152 0, /* src_mask */
1153 0xfffc, /* dst_mask */
1154 FALSE), /* pcrel_offset */
1155
1156 /* Like R_PPC64_GOT16, but for instructions with a DS field. */
1157 HOWTO (R_PPC64_GOT16_DS, /* type */
1158 0, /* rightshift */
1159 1, /* size (0 = byte, 1 = short, 2 = long) */
1160 16, /* bitsize */
1161 FALSE, /* pc_relative */
1162 0, /* bitpos */
1163 complain_overflow_signed, /* complain_on_overflow */
1164 ppc64_elf_unhandled_reloc, /* special_function */
1165 "R_PPC64_GOT16_DS", /* name */
1166 FALSE, /* partial_inplace */
1167 0, /* src_mask */
1168 0xfffc, /* dst_mask */
1169 FALSE), /* pcrel_offset */
1170
1171 /* Like R_PPC64_GOT16_LO, but for instructions with a DS field. */
1172 HOWTO (R_PPC64_GOT16_LO_DS, /* type */
1173 0, /* rightshift */
1174 1, /* size (0 = byte, 1 = short, 2 = long) */
1175 16, /* bitsize */
1176 FALSE, /* pc_relative */
1177 0, /* bitpos */
1178 complain_overflow_dont, /* complain_on_overflow */
1179 ppc64_elf_unhandled_reloc, /* special_function */
1180 "R_PPC64_GOT16_LO_DS", /* name */
1181 FALSE, /* partial_inplace */
1182 0, /* src_mask */
1183 0xfffc, /* dst_mask */
1184 FALSE), /* pcrel_offset */
1185
1186 /* Like R_PPC64_PLT16_LO, but for instructions with a DS field. */
1187 HOWTO (R_PPC64_PLT16_LO_DS, /* type */
1188 0, /* rightshift */
1189 1, /* size (0 = byte, 1 = short, 2 = long) */
1190 16, /* bitsize */
1191 FALSE, /* pc_relative */
1192 0, /* bitpos */
1193 complain_overflow_dont, /* complain_on_overflow */
1194 ppc64_elf_unhandled_reloc, /* special_function */
1195 "R_PPC64_PLT16_LO_DS", /* name */
1196 FALSE, /* partial_inplace */
1197 0, /* src_mask */
1198 0xfffc, /* dst_mask */
1199 FALSE), /* pcrel_offset */
1200
1201 /* Like R_PPC64_SECTOFF, but for instructions with a DS field. */
1202 HOWTO (R_PPC64_SECTOFF_DS, /* type */
1203 0, /* rightshift */
1204 1, /* size (0 = byte, 1 = short, 2 = long) */
1205 16, /* bitsize */
1206 FALSE, /* pc_relative */
1207 0, /* bitpos */
b80eed39 1208 complain_overflow_signed, /* complain_on_overflow */
411e1bfb
AM
1209 ppc64_elf_sectoff_reloc, /* special_function */
1210 "R_PPC64_SECTOFF_DS", /* name */
1211 FALSE, /* partial_inplace */
1212 0, /* src_mask */
1213 0xfffc, /* dst_mask */
1214 FALSE), /* pcrel_offset */
1215
1216 /* Like R_PPC64_SECTOFF_LO, but for instructions with a DS field. */
1217 HOWTO (R_PPC64_SECTOFF_LO_DS, /* type */
1218 0, /* rightshift */
1219 1, /* size (0 = byte, 1 = short, 2 = long) */
1220 16, /* bitsize */
1221 FALSE, /* pc_relative */
1222 0, /* bitpos */
1223 complain_overflow_dont, /* complain_on_overflow */
1224 ppc64_elf_sectoff_reloc, /* special_function */
1225 "R_PPC64_SECTOFF_LO_DS",/* name */
1226 FALSE, /* partial_inplace */
1227 0, /* src_mask */
1228 0xfffc, /* dst_mask */
1229 FALSE), /* pcrel_offset */
1230
1231 /* Like R_PPC64_TOC16, but for instructions with a DS field. */
1232 HOWTO (R_PPC64_TOC16_DS, /* type */
1233 0, /* rightshift */
1234 1, /* size (0 = byte, 1 = short, 2 = long) */
1235 16, /* bitsize */
1236 FALSE, /* pc_relative */
1237 0, /* bitpos */
1238 complain_overflow_signed, /* complain_on_overflow */
1239 ppc64_elf_toc_reloc, /* special_function */
1240 "R_PPC64_TOC16_DS", /* name */
1241 FALSE, /* partial_inplace */
1242 0, /* src_mask */
1243 0xfffc, /* dst_mask */
1244 FALSE), /* pcrel_offset */
1245
1246 /* Like R_PPC64_TOC16_LO, but for instructions with a DS field. */
1247 HOWTO (R_PPC64_TOC16_LO_DS, /* type */
1248 0, /* rightshift */
1249 1, /* size (0 = byte, 1 = short, 2 = long) */
1250 16, /* bitsize */
1251 FALSE, /* pc_relative */
1252 0, /* bitpos */
1253 complain_overflow_dont, /* complain_on_overflow */
1254 ppc64_elf_toc_reloc, /* special_function */
1255 "R_PPC64_TOC16_LO_DS", /* name */
1256 FALSE, /* partial_inplace */
1257 0, /* src_mask */
1258 0xfffc, /* dst_mask */
1259 FALSE), /* pcrel_offset */
1260
1261 /* Like R_PPC64_PLTGOT16, but for instructions with a DS field. */
1262 /* FIXME: R_PPC64_PLTGOT16_DS not implemented. */
6bfdb61b 1263 HOWTO (R_PPC64_PLTGOT16_DS, /* type */
411e1bfb
AM
1264 0, /* rightshift */
1265 1, /* size (0 = byte, 1 = short, 2 = long) */
1266 16, /* bitsize */
1267 FALSE, /* pc_relative */
1268 0, /* bitpos */
1269 complain_overflow_signed, /* complain_on_overflow */
1270 ppc64_elf_unhandled_reloc, /* special_function */
1271 "R_PPC64_PLTGOT16_DS", /* name */
1272 FALSE, /* partial_inplace */
1273 0, /* src_mask */
1274 0xfffc, /* dst_mask */
1275 FALSE), /* pcrel_offset */
1276
1277 /* Like R_PPC64_PLTGOT16_LO, but for instructions with a DS field. */
1278 /* FIXME: R_PPC64_PLTGOT16_LO not implemented. */
1279 HOWTO (R_PPC64_PLTGOT16_LO_DS,/* type */
1280 0, /* rightshift */
1281 1, /* size (0 = byte, 1 = short, 2 = long) */
1282 16, /* bitsize */
1283 FALSE, /* pc_relative */
1284 0, /* bitpos */
1285 complain_overflow_dont, /* complain_on_overflow */
1286 ppc64_elf_unhandled_reloc, /* special_function */
1287 "R_PPC64_PLTGOT16_LO_DS",/* name */
1288 FALSE, /* partial_inplace */
1289 0, /* src_mask */
1290 0xfffc, /* dst_mask */
1291 FALSE), /* pcrel_offset */
1292
727fc41e 1293 /* Marker relocs for TLS. */
411e1bfb
AM
1294 HOWTO (R_PPC64_TLS,
1295 0, /* rightshift */
1296 2, /* size (0 = byte, 1 = short, 2 = long) */
1297 32, /* bitsize */
1298 FALSE, /* pc_relative */
1299 0, /* bitpos */
1300 complain_overflow_dont, /* complain_on_overflow */
1301 bfd_elf_generic_reloc, /* special_function */
1302 "R_PPC64_TLS", /* name */
1303 FALSE, /* partial_inplace */
1304 0, /* src_mask */
1305 0, /* dst_mask */
1306 FALSE), /* pcrel_offset */
1307
727fc41e
AM
1308 HOWTO (R_PPC64_TLSGD,
1309 0, /* rightshift */
1310 2, /* size (0 = byte, 1 = short, 2 = long) */
1311 32, /* bitsize */
1312 FALSE, /* pc_relative */
1313 0, /* bitpos */
1314 complain_overflow_dont, /* complain_on_overflow */
1315 bfd_elf_generic_reloc, /* special_function */
1316 "R_PPC64_TLSGD", /* name */
1317 FALSE, /* partial_inplace */
1318 0, /* src_mask */
1319 0, /* dst_mask */
1320 FALSE), /* pcrel_offset */
1321
1322 HOWTO (R_PPC64_TLSLD,
1323 0, /* rightshift */
1324 2, /* size (0 = byte, 1 = short, 2 = long) */
1325 32, /* bitsize */
1326 FALSE, /* pc_relative */
1327 0, /* bitpos */
1328 complain_overflow_dont, /* complain_on_overflow */
1329 bfd_elf_generic_reloc, /* special_function */
1330 "R_PPC64_TLSLD", /* name */
1331 FALSE, /* partial_inplace */
1332 0, /* src_mask */
1333 0, /* dst_mask */
1334 FALSE), /* pcrel_offset */
1335
3b421ab3
AM
1336 HOWTO (R_PPC64_TOCSAVE,
1337 0, /* rightshift */
1338 2, /* size (0 = byte, 1 = short, 2 = long) */
1339 32, /* bitsize */
1340 FALSE, /* pc_relative */
1341 0, /* bitpos */
1342 complain_overflow_dont, /* complain_on_overflow */
1343 bfd_elf_generic_reloc, /* special_function */
1344 "R_PPC64_TOCSAVE", /* name */
1345 FALSE, /* partial_inplace */
1346 0, /* src_mask */
1347 0, /* dst_mask */
1348 FALSE), /* pcrel_offset */
1349
411e1bfb
AM
1350 /* Computes the load module index of the load module that contains the
1351 definition of its TLS sym. */
1352 HOWTO (R_PPC64_DTPMOD64,
1353 0, /* rightshift */
1354 4, /* size (0 = byte, 1 = short, 2 = long) */
1355 64, /* bitsize */
1356 FALSE, /* pc_relative */
1357 0, /* bitpos */
1358 complain_overflow_dont, /* complain_on_overflow */
1359 ppc64_elf_unhandled_reloc, /* special_function */
1360 "R_PPC64_DTPMOD64", /* name */
1361 FALSE, /* partial_inplace */
1362 0, /* src_mask */
1363 ONES (64), /* dst_mask */
1364 FALSE), /* pcrel_offset */
1365
1366 /* Computes a dtv-relative displacement, the difference between the value
1367 of sym+add and the base address of the thread-local storage block that
1368 contains the definition of sym, minus 0x8000. */
1369 HOWTO (R_PPC64_DTPREL64,
1370 0, /* rightshift */
1371 4, /* size (0 = byte, 1 = short, 2 = long) */
1372 64, /* bitsize */
1373 FALSE, /* pc_relative */
1374 0, /* bitpos */
1375 complain_overflow_dont, /* complain_on_overflow */
1376 ppc64_elf_unhandled_reloc, /* special_function */
1377 "R_PPC64_DTPREL64", /* name */
1378 FALSE, /* partial_inplace */
1379 0, /* src_mask */
1380 ONES (64), /* dst_mask */
1381 FALSE), /* pcrel_offset */
1382
1383 /* A 16 bit dtprel reloc. */
1384 HOWTO (R_PPC64_DTPREL16,
1385 0, /* rightshift */
1386 1, /* size (0 = byte, 1 = short, 2 = long) */
1387 16, /* bitsize */
1388 FALSE, /* pc_relative */
1389 0, /* bitpos */
1390 complain_overflow_signed, /* complain_on_overflow */
1391 ppc64_elf_unhandled_reloc, /* special_function */
1392 "R_PPC64_DTPREL16", /* name */
1393 FALSE, /* partial_inplace */
1394 0, /* src_mask */
1395 0xffff, /* dst_mask */
1396 FALSE), /* pcrel_offset */
1397
1398 /* Like DTPREL16, but no overflow. */
1399 HOWTO (R_PPC64_DTPREL16_LO,
1400 0, /* rightshift */
1401 1, /* size (0 = byte, 1 = short, 2 = long) */
1402 16, /* bitsize */
1403 FALSE, /* pc_relative */
1404 0, /* bitpos */
1405 complain_overflow_dont, /* complain_on_overflow */
1406 ppc64_elf_unhandled_reloc, /* special_function */
1407 "R_PPC64_DTPREL16_LO", /* name */
1408 FALSE, /* partial_inplace */
1409 0, /* src_mask */
1410 0xffff, /* dst_mask */
1411 FALSE), /* pcrel_offset */
1412
1413 /* Like DTPREL16_LO, but next higher group of 16 bits. */
1414 HOWTO (R_PPC64_DTPREL16_HI,
1415 16, /* rightshift */
1416 1, /* size (0 = byte, 1 = short, 2 = long) */
1417 16, /* bitsize */
1418 FALSE, /* pc_relative */
1419 0, /* bitpos */
f9c6b907 1420 complain_overflow_signed, /* complain_on_overflow */
411e1bfb
AM
1421 ppc64_elf_unhandled_reloc, /* special_function */
1422 "R_PPC64_DTPREL16_HI", /* name */
1423 FALSE, /* partial_inplace */
1424 0, /* src_mask */
1425 0xffff, /* dst_mask */
1426 FALSE), /* pcrel_offset */
1427
1428 /* Like DTPREL16_HI, but adjust for low 16 bits. */
1429 HOWTO (R_PPC64_DTPREL16_HA,
1430 16, /* rightshift */
1431 1, /* size (0 = byte, 1 = short, 2 = long) */
1432 16, /* bitsize */
1433 FALSE, /* pc_relative */
1434 0, /* bitpos */
f9c6b907 1435 complain_overflow_signed, /* complain_on_overflow */
411e1bfb
AM
1436 ppc64_elf_unhandled_reloc, /* special_function */
1437 "R_PPC64_DTPREL16_HA", /* name */
1438 FALSE, /* partial_inplace */
1439 0, /* src_mask */
1440 0xffff, /* dst_mask */
1441 FALSE), /* pcrel_offset */
1442
1443 /* Like DTPREL16_HI, but next higher group of 16 bits. */
1444 HOWTO (R_PPC64_DTPREL16_HIGHER,
1445 32, /* rightshift */
1446 1, /* size (0 = byte, 1 = short, 2 = long) */
1447 16, /* bitsize */
1448 FALSE, /* pc_relative */
1449 0, /* bitpos */
1450 complain_overflow_dont, /* complain_on_overflow */
1451 ppc64_elf_unhandled_reloc, /* special_function */
1452 "R_PPC64_DTPREL16_HIGHER", /* name */
1453 FALSE, /* partial_inplace */
1454 0, /* src_mask */
1455 0xffff, /* dst_mask */
1456 FALSE), /* pcrel_offset */
1457
1458 /* Like DTPREL16_HIGHER, but adjust for low 16 bits. */
1459 HOWTO (R_PPC64_DTPREL16_HIGHERA,
1460 32, /* rightshift */
1461 1, /* size (0 = byte, 1 = short, 2 = long) */
1462 16, /* bitsize */
1463 FALSE, /* pc_relative */
1464 0, /* bitpos */
1465 complain_overflow_dont, /* complain_on_overflow */
1466 ppc64_elf_unhandled_reloc, /* special_function */
1467 "R_PPC64_DTPREL16_HIGHERA", /* name */
1468 FALSE, /* partial_inplace */
1469 0, /* src_mask */
1470 0xffff, /* dst_mask */
1471 FALSE), /* pcrel_offset */
1472
1473 /* Like DTPREL16_HIGHER, but next higher group of 16 bits. */
1474 HOWTO (R_PPC64_DTPREL16_HIGHEST,
1475 48, /* rightshift */
1476 1, /* size (0 = byte, 1 = short, 2 = long) */
1477 16, /* bitsize */
1478 FALSE, /* pc_relative */
1479 0, /* bitpos */
1480 complain_overflow_dont, /* complain_on_overflow */
1481 ppc64_elf_unhandled_reloc, /* special_function */
1482 "R_PPC64_DTPREL16_HIGHEST", /* name */
1483 FALSE, /* partial_inplace */
1484 0, /* src_mask */
1485 0xffff, /* dst_mask */
1486 FALSE), /* pcrel_offset */
1487
1488 /* Like DTPREL16_HIGHEST, but adjust for low 16 bits. */
1489 HOWTO (R_PPC64_DTPREL16_HIGHESTA,
1490 48, /* rightshift */
1491 1, /* size (0 = byte, 1 = short, 2 = long) */
1492 16, /* bitsize */
1493 FALSE, /* pc_relative */
1494 0, /* bitpos */
1495 complain_overflow_dont, /* complain_on_overflow */
1496 ppc64_elf_unhandled_reloc, /* special_function */
1497 "R_PPC64_DTPREL16_HIGHESTA", /* name */
1498 FALSE, /* partial_inplace */
1499 0, /* src_mask */
1500 0xffff, /* dst_mask */
1501 FALSE), /* pcrel_offset */
1502
1503 /* Like DTPREL16, but for insns with a DS field. */
1504 HOWTO (R_PPC64_DTPREL16_DS,
1505 0, /* rightshift */
1506 1, /* size (0 = byte, 1 = short, 2 = long) */
1507 16, /* bitsize */
1508 FALSE, /* pc_relative */
1509 0, /* bitpos */
1510 complain_overflow_signed, /* complain_on_overflow */
1511 ppc64_elf_unhandled_reloc, /* special_function */
1512 "R_PPC64_DTPREL16_DS", /* name */
1513 FALSE, /* partial_inplace */
1514 0, /* src_mask */
1515 0xfffc, /* dst_mask */
1516 FALSE), /* pcrel_offset */
1517
1518 /* Like DTPREL16_DS, but no overflow. */
1519 HOWTO (R_PPC64_DTPREL16_LO_DS,
1520 0, /* rightshift */
1521 1, /* size (0 = byte, 1 = short, 2 = long) */
1522 16, /* bitsize */
1523 FALSE, /* pc_relative */
1524 0, /* bitpos */
1525 complain_overflow_dont, /* complain_on_overflow */
1526 ppc64_elf_unhandled_reloc, /* special_function */
1527 "R_PPC64_DTPREL16_LO_DS", /* name */
1528 FALSE, /* partial_inplace */
1529 0, /* src_mask */
1530 0xfffc, /* dst_mask */
1531 FALSE), /* pcrel_offset */
1532
1533 /* Computes a tp-relative displacement, the difference between the value of
1534 sym+add and the value of the thread pointer (r13). */
1535 HOWTO (R_PPC64_TPREL64,
1536 0, /* rightshift */
1537 4, /* size (0 = byte, 1 = short, 2 = long) */
1538 64, /* bitsize */
1539 FALSE, /* pc_relative */
1540 0, /* bitpos */
1541 complain_overflow_dont, /* complain_on_overflow */
1542 ppc64_elf_unhandled_reloc, /* special_function */
1543 "R_PPC64_TPREL64", /* name */
1544 FALSE, /* partial_inplace */
1545 0, /* src_mask */
1546 ONES (64), /* dst_mask */
1547 FALSE), /* pcrel_offset */
1548
1549 /* A 16 bit tprel reloc. */
1550 HOWTO (R_PPC64_TPREL16,
1551 0, /* rightshift */
1552 1, /* size (0 = byte, 1 = short, 2 = long) */
1553 16, /* bitsize */
1554 FALSE, /* pc_relative */
1555 0, /* bitpos */
1556 complain_overflow_signed, /* complain_on_overflow */
1557 ppc64_elf_unhandled_reloc, /* special_function */
1558 "R_PPC64_TPREL16", /* name */
1559 FALSE, /* partial_inplace */
1560 0, /* src_mask */
1561 0xffff, /* dst_mask */
1562 FALSE), /* pcrel_offset */
1563
1564 /* Like TPREL16, but no overflow. */
1565 HOWTO (R_PPC64_TPREL16_LO,
1566 0, /* rightshift */
1567 1, /* size (0 = byte, 1 = short, 2 = long) */
1568 16, /* bitsize */
1569 FALSE, /* pc_relative */
1570 0, /* bitpos */
1571 complain_overflow_dont, /* complain_on_overflow */
1572 ppc64_elf_unhandled_reloc, /* special_function */
1573 "R_PPC64_TPREL16_LO", /* name */
1574 FALSE, /* partial_inplace */
1575 0, /* src_mask */
1576 0xffff, /* dst_mask */
1577 FALSE), /* pcrel_offset */
1578
1579 /* Like TPREL16_LO, but next higher group of 16 bits. */
1580 HOWTO (R_PPC64_TPREL16_HI,
1581 16, /* rightshift */
1582 1, /* size (0 = byte, 1 = short, 2 = long) */
1583 16, /* bitsize */
1584 FALSE, /* pc_relative */
1585 0, /* bitpos */
f9c6b907 1586 complain_overflow_signed, /* complain_on_overflow */
411e1bfb
AM
1587 ppc64_elf_unhandled_reloc, /* special_function */
1588 "R_PPC64_TPREL16_HI", /* name */
1589 FALSE, /* partial_inplace */
1590 0, /* src_mask */
1591 0xffff, /* dst_mask */
1592 FALSE), /* pcrel_offset */
1593
1594 /* Like TPREL16_HI, but adjust for low 16 bits. */
1595 HOWTO (R_PPC64_TPREL16_HA,
1596 16, /* rightshift */
1597 1, /* size (0 = byte, 1 = short, 2 = long) */
1598 16, /* bitsize */
1599 FALSE, /* pc_relative */
1600 0, /* bitpos */
f9c6b907 1601 complain_overflow_signed, /* complain_on_overflow */
411e1bfb
AM
1602 ppc64_elf_unhandled_reloc, /* special_function */
1603 "R_PPC64_TPREL16_HA", /* name */
1604 FALSE, /* partial_inplace */
1605 0, /* src_mask */
1606 0xffff, /* dst_mask */
1607 FALSE), /* pcrel_offset */
1608
1609 /* Like TPREL16_HI, but next higher group of 16 bits. */
1610 HOWTO (R_PPC64_TPREL16_HIGHER,
1611 32, /* rightshift */
1612 1, /* size (0 = byte, 1 = short, 2 = long) */
1613 16, /* bitsize */
1614 FALSE, /* pc_relative */
1615 0, /* bitpos */
1616 complain_overflow_dont, /* complain_on_overflow */
1617 ppc64_elf_unhandled_reloc, /* special_function */
1618 "R_PPC64_TPREL16_HIGHER", /* name */
1619 FALSE, /* partial_inplace */
1620 0, /* src_mask */
1621 0xffff, /* dst_mask */
1622 FALSE), /* pcrel_offset */
1623
1624 /* Like TPREL16_HIGHER, but adjust for low 16 bits. */
1625 HOWTO (R_PPC64_TPREL16_HIGHERA,
1626 32, /* rightshift */
1627 1, /* size (0 = byte, 1 = short, 2 = long) */
1628 16, /* bitsize */
1629 FALSE, /* pc_relative */
1630 0, /* bitpos */
1631 complain_overflow_dont, /* complain_on_overflow */
1632 ppc64_elf_unhandled_reloc, /* special_function */
1633 "R_PPC64_TPREL16_HIGHERA", /* name */
1634 FALSE, /* partial_inplace */
1635 0, /* src_mask */
1636 0xffff, /* dst_mask */
1637 FALSE), /* pcrel_offset */
1638
1639 /* Like TPREL16_HIGHER, but next higher group of 16 bits. */
1640 HOWTO (R_PPC64_TPREL16_HIGHEST,
1641 48, /* rightshift */
1642 1, /* size (0 = byte, 1 = short, 2 = long) */
1643 16, /* bitsize */
1644 FALSE, /* pc_relative */
1645 0, /* bitpos */
1646 complain_overflow_dont, /* complain_on_overflow */
1647 ppc64_elf_unhandled_reloc, /* special_function */
1648 "R_PPC64_TPREL16_HIGHEST", /* name */
1649 FALSE, /* partial_inplace */
1650 0, /* src_mask */
1651 0xffff, /* dst_mask */
1652 FALSE), /* pcrel_offset */
1653
1654 /* Like TPREL16_HIGHEST, but adjust for low 16 bits. */
1655 HOWTO (R_PPC64_TPREL16_HIGHESTA,
1656 48, /* rightshift */
1657 1, /* size (0 = byte, 1 = short, 2 = long) */
1658 16, /* bitsize */
1659 FALSE, /* pc_relative */
1660 0, /* bitpos */
1661 complain_overflow_dont, /* complain_on_overflow */
1662 ppc64_elf_unhandled_reloc, /* special_function */
1663 "R_PPC64_TPREL16_HIGHESTA", /* name */
1664 FALSE, /* partial_inplace */
1665 0, /* src_mask */
1666 0xffff, /* dst_mask */
1667 FALSE), /* pcrel_offset */
1668
1669 /* Like TPREL16, but for insns with a DS field. */
1670 HOWTO (R_PPC64_TPREL16_DS,
1671 0, /* rightshift */
1672 1, /* size (0 = byte, 1 = short, 2 = long) */
1673 16, /* bitsize */
1674 FALSE, /* pc_relative */
1675 0, /* bitpos */
1676 complain_overflow_signed, /* complain_on_overflow */
1677 ppc64_elf_unhandled_reloc, /* special_function */
1678 "R_PPC64_TPREL16_DS", /* name */
1679 FALSE, /* partial_inplace */
1680 0, /* src_mask */
1681 0xfffc, /* dst_mask */
1682 FALSE), /* pcrel_offset */
1683
1684 /* Like TPREL16_DS, but no overflow. */
1685 HOWTO (R_PPC64_TPREL16_LO_DS,
1686 0, /* rightshift */
1687 1, /* size (0 = byte, 1 = short, 2 = long) */
1688 16, /* bitsize */
1689 FALSE, /* pc_relative */
1690 0, /* bitpos */
1691 complain_overflow_dont, /* complain_on_overflow */
1692 ppc64_elf_unhandled_reloc, /* special_function */
1693 "R_PPC64_TPREL16_LO_DS", /* name */
1694 FALSE, /* partial_inplace */
1695 0, /* src_mask */
1696 0xfffc, /* dst_mask */
1697 FALSE), /* pcrel_offset */
1698
1699 /* Allocates two contiguous entries in the GOT to hold a tls_index structure,
1700 with values (sym+add)@dtpmod and (sym+add)@dtprel, and computes the offset
1701 to the first entry relative to the TOC base (r2). */
1702 HOWTO (R_PPC64_GOT_TLSGD16,
1703 0, /* rightshift */
1704 1, /* size (0 = byte, 1 = short, 2 = long) */
1705 16, /* bitsize */
1706 FALSE, /* pc_relative */
1707 0, /* bitpos */
1708 complain_overflow_signed, /* complain_on_overflow */
1709 ppc64_elf_unhandled_reloc, /* special_function */
1710 "R_PPC64_GOT_TLSGD16", /* name */
b34976b6 1711 FALSE, /* partial_inplace */
5bd4f169
AM
1712 0, /* src_mask */
1713 0xffff, /* dst_mask */
b34976b6 1714 FALSE), /* pcrel_offset */
5bd4f169 1715
411e1bfb
AM
1716 /* Like GOT_TLSGD16, but no overflow. */
1717 HOWTO (R_PPC64_GOT_TLSGD16_LO,
5bd4f169
AM
1718 0, /* rightshift */
1719 1, /* size (0 = byte, 1 = short, 2 = long) */
1720 16, /* bitsize */
b34976b6 1721 FALSE, /* pc_relative */
5bd4f169
AM
1722 0, /* bitpos */
1723 complain_overflow_dont, /* complain_on_overflow */
805fc799 1724 ppc64_elf_unhandled_reloc, /* special_function */
411e1bfb 1725 "R_PPC64_GOT_TLSGD16_LO", /* name */
b34976b6 1726 FALSE, /* partial_inplace */
5bd4f169
AM
1727 0, /* src_mask */
1728 0xffff, /* dst_mask */
b34976b6 1729 FALSE), /* pcrel_offset */
5bd4f169 1730
411e1bfb
AM
1731 /* Like GOT_TLSGD16_LO, but next higher group of 16 bits. */
1732 HOWTO (R_PPC64_GOT_TLSGD16_HI,
5bd4f169
AM
1733 16, /* rightshift */
1734 1, /* size (0 = byte, 1 = short, 2 = long) */
1735 16, /* bitsize */
b34976b6 1736 FALSE, /* pc_relative */
5bd4f169 1737 0, /* bitpos */
f9c6b907 1738 complain_overflow_signed, /* complain_on_overflow */
805fc799 1739 ppc64_elf_unhandled_reloc, /* special_function */
411e1bfb 1740 "R_PPC64_GOT_TLSGD16_HI", /* name */
b34976b6 1741 FALSE, /* partial_inplace */
5bd4f169
AM
1742 0, /* src_mask */
1743 0xffff, /* dst_mask */
b34976b6 1744 FALSE), /* pcrel_offset */
5bd4f169 1745
411e1bfb
AM
1746 /* Like GOT_TLSGD16_HI, but adjust for low 16 bits. */
1747 HOWTO (R_PPC64_GOT_TLSGD16_HA,
5bd4f169
AM
1748 16, /* rightshift */
1749 1, /* size (0 = byte, 1 = short, 2 = long) */
1750 16, /* bitsize */
b34976b6 1751 FALSE, /* pc_relative */
5bd4f169 1752 0, /* bitpos */
f9c6b907 1753 complain_overflow_signed, /* complain_on_overflow */
805fc799 1754 ppc64_elf_unhandled_reloc, /* special_function */
411e1bfb 1755 "R_PPC64_GOT_TLSGD16_HA", /* name */
b34976b6 1756 FALSE, /* partial_inplace */
5bd4f169
AM
1757 0, /* src_mask */
1758 0xffff, /* dst_mask */
b34976b6 1759 FALSE), /* pcrel_offset */
5bd4f169 1760
411e1bfb
AM
1761 /* Allocates two contiguous entries in the GOT to hold a tls_index structure,
1762 with values (sym+add)@dtpmod and zero, and computes the offset to the
1763 first entry relative to the TOC base (r2). */
1764 HOWTO (R_PPC64_GOT_TLSLD16,
5bd4f169
AM
1765 0, /* rightshift */
1766 1, /* size (0 = byte, 1 = short, 2 = long) */
1767 16, /* bitsize */
b34976b6 1768 FALSE, /* pc_relative */
5bd4f169 1769 0, /* bitpos */
411e1bfb
AM
1770 complain_overflow_signed, /* complain_on_overflow */
1771 ppc64_elf_unhandled_reloc, /* special_function */
1772 "R_PPC64_GOT_TLSLD16", /* name */
b34976b6 1773 FALSE, /* partial_inplace */
d006db6c 1774 0, /* src_mask */
411e1bfb 1775 0xffff, /* dst_mask */
b34976b6 1776 FALSE), /* pcrel_offset */
5bd4f169 1777
411e1bfb
AM
1778 /* Like GOT_TLSLD16, but no overflow. */
1779 HOWTO (R_PPC64_GOT_TLSLD16_LO,
5bd4f169
AM
1780 0, /* rightshift */
1781 1, /* size (0 = byte, 1 = short, 2 = long) */
1782 16, /* bitsize */
b34976b6 1783 FALSE, /* pc_relative */
5bd4f169 1784 0, /* bitpos */
411e1bfb
AM
1785 complain_overflow_dont, /* complain_on_overflow */
1786 ppc64_elf_unhandled_reloc, /* special_function */
1787 "R_PPC64_GOT_TLSLD16_LO", /* name */
b34976b6 1788 FALSE, /* partial_inplace */
d006db6c 1789 0, /* src_mask */
411e1bfb 1790 0xffff, /* dst_mask */
b34976b6 1791 FALSE), /* pcrel_offset */
5bd4f169 1792
411e1bfb
AM
1793 /* Like GOT_TLSLD16_LO, but next higher group of 16 bits. */
1794 HOWTO (R_PPC64_GOT_TLSLD16_HI,
1795 16, /* rightshift */
5bd4f169
AM
1796 1, /* size (0 = byte, 1 = short, 2 = long) */
1797 16, /* bitsize */
b34976b6 1798 FALSE, /* pc_relative */
5bd4f169 1799 0, /* bitpos */
f9c6b907 1800 complain_overflow_signed, /* complain_on_overflow */
805fc799 1801 ppc64_elf_unhandled_reloc, /* special_function */
411e1bfb 1802 "R_PPC64_GOT_TLSLD16_HI", /* name */
b34976b6 1803 FALSE, /* partial_inplace */
d006db6c 1804 0, /* src_mask */
411e1bfb 1805 0xffff, /* dst_mask */
b34976b6 1806 FALSE), /* pcrel_offset */
5bd4f169 1807
411e1bfb
AM
1808 /* Like GOT_TLSLD16_HI, but adjust for low 16 bits. */
1809 HOWTO (R_PPC64_GOT_TLSLD16_HA,
1810 16, /* rightshift */
5bd4f169
AM
1811 1, /* size (0 = byte, 1 = short, 2 = long) */
1812 16, /* bitsize */
b34976b6 1813 FALSE, /* pc_relative */
5bd4f169 1814 0, /* bitpos */
f9c6b907 1815 complain_overflow_signed, /* complain_on_overflow */
805fc799 1816 ppc64_elf_unhandled_reloc, /* special_function */
411e1bfb 1817 "R_PPC64_GOT_TLSLD16_HA", /* name */
b34976b6 1818 FALSE, /* partial_inplace */
d006db6c 1819 0, /* src_mask */
411e1bfb 1820 0xffff, /* dst_mask */
b34976b6 1821 FALSE), /* pcrel_offset */
5bd4f169 1822
411e1bfb
AM
1823 /* Allocates an entry in the GOT with value (sym+add)@dtprel, and computes
1824 the offset to the entry relative to the TOC base (r2). */
1825 HOWTO (R_PPC64_GOT_DTPREL16_DS,
5bd4f169
AM
1826 0, /* rightshift */
1827 1, /* size (0 = byte, 1 = short, 2 = long) */
1828 16, /* bitsize */
b34976b6 1829 FALSE, /* pc_relative */
5bd4f169 1830 0, /* bitpos */
411e1bfb 1831 complain_overflow_signed, /* complain_on_overflow */
805fc799 1832 ppc64_elf_unhandled_reloc, /* special_function */
411e1bfb 1833 "R_PPC64_GOT_DTPREL16_DS", /* name */
b34976b6 1834 FALSE, /* partial_inplace */
d006db6c 1835 0, /* src_mask */
5bd4f169 1836 0xfffc, /* dst_mask */
b34976b6 1837 FALSE), /* pcrel_offset */
5bd4f169 1838
411e1bfb
AM
1839 /* Like GOT_DTPREL16_DS, but no overflow. */
1840 HOWTO (R_PPC64_GOT_DTPREL16_LO_DS,
5bd4f169 1841 0, /* rightshift */
c061c2d8
AM
1842 1, /* size (0 = byte, 1 = short, 2 = long) */
1843 16, /* bitsize */
b34976b6 1844 FALSE, /* pc_relative */
5bd4f169 1845 0, /* bitpos */
411e1bfb
AM
1846 complain_overflow_dont, /* complain_on_overflow */
1847 ppc64_elf_unhandled_reloc, /* special_function */
1848 "R_PPC64_GOT_DTPREL16_LO_DS", /* name */
b34976b6 1849 FALSE, /* partial_inplace */
d006db6c 1850 0, /* src_mask */
c061c2d8 1851 0xfffc, /* dst_mask */
b34976b6 1852 FALSE), /* pcrel_offset */
5bd4f169 1853
411e1bfb
AM
1854 /* Like GOT_DTPREL16_LO_DS, but next higher group of 16 bits. */
1855 HOWTO (R_PPC64_GOT_DTPREL16_HI,
1856 16, /* rightshift */
5bd4f169
AM
1857 1, /* size (0 = byte, 1 = short, 2 = long) */
1858 16, /* bitsize */
b34976b6 1859 FALSE, /* pc_relative */
5bd4f169 1860 0, /* bitpos */
f9c6b907 1861 complain_overflow_signed, /* complain_on_overflow */
411e1bfb
AM
1862 ppc64_elf_unhandled_reloc, /* special_function */
1863 "R_PPC64_GOT_DTPREL16_HI", /* name */
b34976b6 1864 FALSE, /* partial_inplace */
d006db6c 1865 0, /* src_mask */
411e1bfb 1866 0xffff, /* dst_mask */
b34976b6 1867 FALSE), /* pcrel_offset */
5bd4f169 1868
411e1bfb
AM
1869 /* Like GOT_DTPREL16_HI, but adjust for low 16 bits. */
1870 HOWTO (R_PPC64_GOT_DTPREL16_HA,
1871 16, /* rightshift */
1872 1, /* size (0 = byte, 1 = short, 2 = long) */
1873 16, /* bitsize */
1874 FALSE, /* pc_relative */
1875 0, /* bitpos */
f9c6b907 1876 complain_overflow_signed, /* complain_on_overflow */
411e1bfb
AM
1877 ppc64_elf_unhandled_reloc, /* special_function */
1878 "R_PPC64_GOT_DTPREL16_HA", /* name */
1879 FALSE, /* partial_inplace */
1880 0, /* src_mask */
1881 0xffff, /* dst_mask */
1882 FALSE), /* pcrel_offset */
1883
1884 /* Allocates an entry in the GOT with value (sym+add)@tprel, and computes the
1885 offset to the entry relative to the TOC base (r2). */
1886 HOWTO (R_PPC64_GOT_TPREL16_DS,
5bd4f169
AM
1887 0, /* rightshift */
1888 1, /* size (0 = byte, 1 = short, 2 = long) */
1889 16, /* bitsize */
b34976b6 1890 FALSE, /* pc_relative */
5bd4f169
AM
1891 0, /* bitpos */
1892 complain_overflow_signed, /* complain_on_overflow */
411e1bfb
AM
1893 ppc64_elf_unhandled_reloc, /* special_function */
1894 "R_PPC64_GOT_TPREL16_DS", /* name */
b34976b6 1895 FALSE, /* partial_inplace */
d006db6c 1896 0, /* src_mask */
ad8e1ba5 1897 0xfffc, /* dst_mask */
b34976b6 1898 FALSE), /* pcrel_offset */
5bd4f169 1899
411e1bfb
AM
1900 /* Like GOT_TPREL16_DS, but no overflow. */
1901 HOWTO (R_PPC64_GOT_TPREL16_LO_DS,
5bd4f169
AM
1902 0, /* rightshift */
1903 1, /* size (0 = byte, 1 = short, 2 = long) */
1904 16, /* bitsize */
b34976b6 1905 FALSE, /* pc_relative */
5bd4f169
AM
1906 0, /* bitpos */
1907 complain_overflow_dont, /* complain_on_overflow */
411e1bfb
AM
1908 ppc64_elf_unhandled_reloc, /* special_function */
1909 "R_PPC64_GOT_TPREL16_LO_DS", /* name */
b34976b6 1910 FALSE, /* partial_inplace */
d006db6c 1911 0, /* src_mask */
ad8e1ba5 1912 0xfffc, /* dst_mask */
b34976b6 1913 FALSE), /* pcrel_offset */
5bd4f169 1914
411e1bfb
AM
1915 /* Like GOT_TPREL16_LO_DS, but next higher group of 16 bits. */
1916 HOWTO (R_PPC64_GOT_TPREL16_HI,
1917 16, /* rightshift */
5bd4f169
AM
1918 1, /* size (0 = byte, 1 = short, 2 = long) */
1919 16, /* bitsize */
b34976b6 1920 FALSE, /* pc_relative */
5bd4f169 1921 0, /* bitpos */
f9c6b907 1922 complain_overflow_signed, /* complain_on_overflow */
805fc799 1923 ppc64_elf_unhandled_reloc, /* special_function */
411e1bfb 1924 "R_PPC64_GOT_TPREL16_HI", /* name */
b34976b6 1925 FALSE, /* partial_inplace */
d006db6c 1926 0, /* src_mask */
411e1bfb 1927 0xffff, /* dst_mask */
b34976b6 1928 FALSE), /* pcrel_offset */
5bd4f169 1929
411e1bfb
AM
1930 /* Like GOT_TPREL16_HI, but adjust for low 16 bits. */
1931 HOWTO (R_PPC64_GOT_TPREL16_HA,
1932 16, /* rightshift */
5bd4f169
AM
1933 1, /* size (0 = byte, 1 = short, 2 = long) */
1934 16, /* bitsize */
b34976b6 1935 FALSE, /* pc_relative */
5bd4f169 1936 0, /* bitpos */
f9c6b907 1937 complain_overflow_signed, /* complain_on_overflow */
805fc799 1938 ppc64_elf_unhandled_reloc, /* special_function */
411e1bfb 1939 "R_PPC64_GOT_TPREL16_HA", /* name */
b34976b6 1940 FALSE, /* partial_inplace */
d006db6c 1941 0, /* src_mask */
411e1bfb 1942 0xffff, /* dst_mask */
b34976b6 1943 FALSE), /* pcrel_offset */
5bd4f169 1944
25f23106
AM
1945 HOWTO (R_PPC64_JMP_IREL, /* type */
1946 0, /* rightshift */
1947 0, /* size (0=byte, 1=short, 2=long, 4=64 bits) */
1948 0, /* bitsize */
1949 FALSE, /* pc_relative */
1950 0, /* bitpos */
1951 complain_overflow_dont, /* complain_on_overflow */
1952 ppc64_elf_unhandled_reloc, /* special_function */
1953 "R_PPC64_JMP_IREL", /* name */
1954 FALSE, /* partial_inplace */
1955 0, /* src_mask */
1956 0, /* dst_mask */
1957 FALSE), /* pcrel_offset */
1958
e054468f
AM
1959 HOWTO (R_PPC64_IRELATIVE, /* type */
1960 0, /* rightshift */
1961 4, /* size (0=byte, 1=short, 2=long, 4=64 bits) */
1962 64, /* bitsize */
1963 FALSE, /* pc_relative */
1964 0, /* bitpos */
1965 complain_overflow_dont, /* complain_on_overflow */
1966 bfd_elf_generic_reloc, /* special_function */
1967 "R_PPC64_IRELATIVE", /* name */
1968 FALSE, /* partial_inplace */
1969 0, /* src_mask */
1970 ONES (64), /* dst_mask */
1971 FALSE), /* pcrel_offset */
1972
25f23106
AM
1973 /* A 16 bit relative relocation. */
1974 HOWTO (R_PPC64_REL16, /* type */
1975 0, /* rightshift */
1976 1, /* size (0 = byte, 1 = short, 2 = long) */
1977 16, /* bitsize */
1978 TRUE, /* pc_relative */
1979 0, /* bitpos */
b80eed39 1980 complain_overflow_signed, /* complain_on_overflow */
25f23106
AM
1981 bfd_elf_generic_reloc, /* special_function */
1982 "R_PPC64_REL16", /* name */
1983 FALSE, /* partial_inplace */
1984 0, /* src_mask */
1985 0xffff, /* dst_mask */
1986 TRUE), /* pcrel_offset */
1987
1988 /* A 16 bit relative relocation without overflow. */
1989 HOWTO (R_PPC64_REL16_LO, /* type */
1990 0, /* rightshift */
1991 1, /* size (0 = byte, 1 = short, 2 = long) */
1992 16, /* bitsize */
1993 TRUE, /* pc_relative */
1994 0, /* bitpos */
1995 complain_overflow_dont,/* complain_on_overflow */
1996 bfd_elf_generic_reloc, /* special_function */
1997 "R_PPC64_REL16_LO", /* name */
1998 FALSE, /* partial_inplace */
1999 0, /* src_mask */
2000 0xffff, /* dst_mask */
2001 TRUE), /* pcrel_offset */
2002
2003 /* The high order 16 bits of a relative address. */
2004 HOWTO (R_PPC64_REL16_HI, /* type */
2005 16, /* rightshift */
2006 1, /* size (0 = byte, 1 = short, 2 = long) */
2007 16, /* bitsize */
2008 TRUE, /* pc_relative */
2009 0, /* bitpos */
f9c6b907 2010 complain_overflow_signed, /* complain_on_overflow */
25f23106
AM
2011 bfd_elf_generic_reloc, /* special_function */
2012 "R_PPC64_REL16_HI", /* name */
2013 FALSE, /* partial_inplace */
2014 0, /* src_mask */
2015 0xffff, /* dst_mask */
2016 TRUE), /* pcrel_offset */
2017
2018 /* The high order 16 bits of a relative address, plus 1 if the contents of
2019 the low 16 bits, treated as a signed number, is negative. */
2020 HOWTO (R_PPC64_REL16_HA, /* type */
2021 16, /* rightshift */
2022 1, /* size (0 = byte, 1 = short, 2 = long) */
2023 16, /* bitsize */
2024 TRUE, /* pc_relative */
2025 0, /* bitpos */
f9c6b907 2026 complain_overflow_signed, /* complain_on_overflow */
25f23106
AM
2027 ppc64_elf_ha_reloc, /* special_function */
2028 "R_PPC64_REL16_HA", /* name */
2029 FALSE, /* partial_inplace */
2030 0, /* src_mask */
2031 0xffff, /* dst_mask */
2032 TRUE), /* pcrel_offset */
2033
a680de9a
PB
2034 /* Like R_PPC64_REL16_HA but for split field in addpcis. */
2035 HOWTO (R_PPC64_REL16DX_HA, /* type */
2036 16, /* rightshift */
2037 2, /* size (0 = byte, 1 = short, 2 = long) */
2038 16, /* bitsize */
2039 TRUE, /* pc_relative */
2040 0, /* bitpos */
2041 complain_overflow_signed, /* complain_on_overflow */
2042 ppc64_elf_ha_reloc, /* special_function */
2043 "R_PPC64_REL16DX_HA", /* name */
2044 FALSE, /* partial_inplace */
2045 0, /* src_mask */
2046 0x1fffc1, /* dst_mask */
2047 TRUE), /* pcrel_offset */
2048
7ba71655
AM
2049 /* A split-field reloc for addpcis, non-relative (gas internal use only). */
2050 HOWTO (R_PPC64_16DX_HA, /* type */
2051 16, /* rightshift */
2052 2, /* size (0 = byte, 1 = short, 2 = long) */
2053 16, /* bitsize */
2054 FALSE, /* pc_relative */
2055 0, /* bitpos */
2056 complain_overflow_signed, /* complain_on_overflow */
2057 ppc64_elf_ha_reloc, /* special_function */
2058 "R_PPC64_16DX_HA", /* name */
2059 FALSE, /* partial_inplace */
2060 0, /* src_mask */
2061 0x1fffc1, /* dst_mask */
2062 FALSE), /* pcrel_offset */
2063
f9c6b907
AM
2064 /* Like R_PPC64_ADDR16_HI, but no overflow. */
2065 HOWTO (R_PPC64_ADDR16_HIGH, /* type */
2066 16, /* rightshift */
2067 1, /* size (0 = byte, 1 = short, 2 = long) */
2068 16, /* bitsize */
2069 FALSE, /* pc_relative */
2070 0, /* bitpos */
2071 complain_overflow_dont, /* complain_on_overflow */
2072 bfd_elf_generic_reloc, /* special_function */
2073 "R_PPC64_ADDR16_HIGH", /* name */
2074 FALSE, /* partial_inplace */
2075 0, /* src_mask */
2076 0xffff, /* dst_mask */
2077 FALSE), /* pcrel_offset */
2078
2079 /* Like R_PPC64_ADDR16_HA, but no overflow. */
2080 HOWTO (R_PPC64_ADDR16_HIGHA, /* type */
2081 16, /* rightshift */
2082 1, /* size (0 = byte, 1 = short, 2 = long) */
2083 16, /* bitsize */
2084 FALSE, /* pc_relative */
2085 0, /* bitpos */
2086 complain_overflow_dont, /* complain_on_overflow */
2087 ppc64_elf_ha_reloc, /* special_function */
2088 "R_PPC64_ADDR16_HIGHA", /* name */
2089 FALSE, /* partial_inplace */
2090 0, /* src_mask */
2091 0xffff, /* dst_mask */
2092 FALSE), /* pcrel_offset */
2093
2094 /* Like R_PPC64_DTPREL16_HI, but no overflow. */
2095 HOWTO (R_PPC64_DTPREL16_HIGH,
2096 16, /* rightshift */
2097 1, /* size (0 = byte, 1 = short, 2 = long) */
2098 16, /* bitsize */
2099 FALSE, /* pc_relative */
2100 0, /* bitpos */
2101 complain_overflow_dont, /* complain_on_overflow */
2102 ppc64_elf_unhandled_reloc, /* special_function */
2103 "R_PPC64_DTPREL16_HIGH", /* name */
2104 FALSE, /* partial_inplace */
2105 0, /* src_mask */
2106 0xffff, /* dst_mask */
2107 FALSE), /* pcrel_offset */
2108
2109 /* Like R_PPC64_DTPREL16_HA, but no overflow. */
2110 HOWTO (R_PPC64_DTPREL16_HIGHA,
2111 16, /* rightshift */
2112 1, /* size (0 = byte, 1 = short, 2 = long) */
2113 16, /* bitsize */
2114 FALSE, /* pc_relative */
2115 0, /* bitpos */
2116 complain_overflow_dont, /* complain_on_overflow */
2117 ppc64_elf_unhandled_reloc, /* special_function */
2118 "R_PPC64_DTPREL16_HIGHA", /* name */
2119 FALSE, /* partial_inplace */
2120 0, /* src_mask */
2121 0xffff, /* dst_mask */
2122 FALSE), /* pcrel_offset */
2123
2124 /* Like R_PPC64_TPREL16_HI, but no overflow. */
2125 HOWTO (R_PPC64_TPREL16_HIGH,
2126 16, /* rightshift */
2127 1, /* size (0 = byte, 1 = short, 2 = long) */
2128 16, /* bitsize */
2129 FALSE, /* pc_relative */
2130 0, /* bitpos */
2131 complain_overflow_dont, /* complain_on_overflow */
2132 ppc64_elf_unhandled_reloc, /* special_function */
2133 "R_PPC64_TPREL16_HIGH", /* name */
2134 FALSE, /* partial_inplace */
2135 0, /* src_mask */
2136 0xffff, /* dst_mask */
2137 FALSE), /* pcrel_offset */
2138
2139 /* Like R_PPC64_TPREL16_HA, but no overflow. */
2140 HOWTO (R_PPC64_TPREL16_HIGHA,
2141 16, /* rightshift */
2142 1, /* size (0 = byte, 1 = short, 2 = long) */
2143 16, /* bitsize */
2144 FALSE, /* pc_relative */
2145 0, /* bitpos */
2146 complain_overflow_dont, /* complain_on_overflow */
2147 ppc64_elf_unhandled_reloc, /* special_function */
2148 "R_PPC64_TPREL16_HIGHA", /* name */
2149 FALSE, /* partial_inplace */
2150 0, /* src_mask */
2151 0xffff, /* dst_mask */
2152 FALSE), /* pcrel_offset */
2153
006589cf
AM
2154 /* Marker reloc on ELFv2 large-model function entry. */
2155 HOWTO (R_PPC64_ENTRY,
2156 0, /* rightshift */
2157 2, /* size (0 = byte, 1 = short, 2 = long) */
2158 32, /* bitsize */
2159 FALSE, /* pc_relative */
2160 0, /* bitpos */
2161 complain_overflow_dont, /* complain_on_overflow */
2162 bfd_elf_generic_reloc, /* special_function */
2163 "R_PPC64_ENTRY", /* name */
2164 FALSE, /* partial_inplace */
2165 0, /* src_mask */
2166 0, /* dst_mask */
2167 FALSE), /* pcrel_offset */
2168
45965137
AM
2169 /* Like ADDR64, but use local entry point of function. */
2170 HOWTO (R_PPC64_ADDR64_LOCAL, /* type */
2171 0, /* rightshift */
2172 4, /* size (0=byte, 1=short, 2=long, 4=64 bits) */
2173 64, /* bitsize */
2174 FALSE, /* pc_relative */
2175 0, /* bitpos */
2176 complain_overflow_dont, /* complain_on_overflow */
2177 bfd_elf_generic_reloc, /* special_function */
2178 "R_PPC64_ADDR64_LOCAL", /* name */
2179 FALSE, /* partial_inplace */
2180 0, /* src_mask */
2181 ONES (64), /* dst_mask */
2182 FALSE), /* pcrel_offset */
2183
5bd4f169
AM
2184 /* GNU extension to record C++ vtable hierarchy. */
2185 HOWTO (R_PPC64_GNU_VTINHERIT, /* type */
2186 0, /* rightshift */
2187 0, /* size (0 = byte, 1 = short, 2 = long) */
2188 0, /* bitsize */
b34976b6 2189 FALSE, /* pc_relative */
5bd4f169
AM
2190 0, /* bitpos */
2191 complain_overflow_dont, /* complain_on_overflow */
2192 NULL, /* special_function */
2193 "R_PPC64_GNU_VTINHERIT", /* name */
b34976b6 2194 FALSE, /* partial_inplace */
5bd4f169
AM
2195 0, /* src_mask */
2196 0, /* dst_mask */
b34976b6 2197 FALSE), /* pcrel_offset */
5bd4f169
AM
2198
2199 /* GNU extension to record C++ vtable member usage. */
2200 HOWTO (R_PPC64_GNU_VTENTRY, /* type */
2201 0, /* rightshift */
2202 0, /* size (0 = byte, 1 = short, 2 = long) */
2203 0, /* bitsize */
b34976b6 2204 FALSE, /* pc_relative */
5bd4f169
AM
2205 0, /* bitpos */
2206 complain_overflow_dont, /* complain_on_overflow */
2207 NULL, /* special_function */
2208 "R_PPC64_GNU_VTENTRY", /* name */
b34976b6 2209 FALSE, /* partial_inplace */
5bd4f169
AM
2210 0, /* src_mask */
2211 0, /* dst_mask */
b34976b6 2212 FALSE), /* pcrel_offset */
5bd4f169
AM
2213};
2214
2215\f
2216/* Initialize the ppc64_elf_howto_table, so that linear accesses can
2217 be done. */
2218
2219static void
4ce794b7 2220ppc_howto_init (void)
5bd4f169
AM
2221{
2222 unsigned int i, type;
2223
a4b6fadd 2224 for (i = 0; i < ARRAY_SIZE (ppc64_elf_howto_raw); i++)
5bd4f169
AM
2225 {
2226 type = ppc64_elf_howto_raw[i].type;
a4b6fadd 2227 BFD_ASSERT (type < ARRAY_SIZE (ppc64_elf_howto_table));
5bd4f169
AM
2228 ppc64_elf_howto_table[type] = &ppc64_elf_howto_raw[i];
2229 }
2230}
2231
2232static reloc_howto_type *
4ce794b7
AM
2233ppc64_elf_reloc_type_lookup (bfd *abfd ATTRIBUTE_UNUSED,
2234 bfd_reloc_code_real_type code)
5bd4f169 2235{
411e1bfb 2236 enum elf_ppc64_reloc_type r = R_PPC64_NONE;
5bd4f169
AM
2237
2238 if (!ppc64_elf_howto_table[R_PPC64_ADDR32])
2239 /* Initialize howto table if needed. */
2240 ppc_howto_init ();
2241
4ce794b7 2242 switch (code)
5bd4f169
AM
2243 {
2244 default:
4ce794b7 2245 return NULL;
5bd4f169 2246
411e1bfb
AM
2247 case BFD_RELOC_NONE: r = R_PPC64_NONE;
2248 break;
2249 case BFD_RELOC_32: r = R_PPC64_ADDR32;
2250 break;
2251 case BFD_RELOC_PPC_BA26: r = R_PPC64_ADDR24;
2252 break;
2253 case BFD_RELOC_16: r = R_PPC64_ADDR16;
2254 break;
2255 case BFD_RELOC_LO16: r = R_PPC64_ADDR16_LO;
2256 break;
2257 case BFD_RELOC_HI16: r = R_PPC64_ADDR16_HI;
2258 break;
f9c6b907
AM
2259 case BFD_RELOC_PPC64_ADDR16_HIGH: r = R_PPC64_ADDR16_HIGH;
2260 break;
411e1bfb 2261 case BFD_RELOC_HI16_S: r = R_PPC64_ADDR16_HA;
5bd4f169 2262 break;
f9c6b907
AM
2263 case BFD_RELOC_PPC64_ADDR16_HIGHA: r = R_PPC64_ADDR16_HIGHA;
2264 break;
411e1bfb 2265 case BFD_RELOC_PPC_BA16: r = R_PPC64_ADDR14;
5bd4f169 2266 break;
411e1bfb 2267 case BFD_RELOC_PPC_BA16_BRTAKEN: r = R_PPC64_ADDR14_BRTAKEN;
5bd4f169 2268 break;
411e1bfb 2269 case BFD_RELOC_PPC_BA16_BRNTAKEN: r = R_PPC64_ADDR14_BRNTAKEN;
5bd4f169 2270 break;
411e1bfb 2271 case BFD_RELOC_PPC_B26: r = R_PPC64_REL24;
5bd4f169 2272 break;
411e1bfb 2273 case BFD_RELOC_PPC_B16: r = R_PPC64_REL14;
5bd4f169 2274 break;
411e1bfb 2275 case BFD_RELOC_PPC_B16_BRTAKEN: r = R_PPC64_REL14_BRTAKEN;
5bd4f169 2276 break;
411e1bfb 2277 case BFD_RELOC_PPC_B16_BRNTAKEN: r = R_PPC64_REL14_BRNTAKEN;
5bd4f169 2278 break;
411e1bfb 2279 case BFD_RELOC_16_GOTOFF: r = R_PPC64_GOT16;
5bd4f169 2280 break;
411e1bfb 2281 case BFD_RELOC_LO16_GOTOFF: r = R_PPC64_GOT16_LO;
5bd4f169 2282 break;
411e1bfb 2283 case BFD_RELOC_HI16_GOTOFF: r = R_PPC64_GOT16_HI;
5bd4f169 2284 break;
411e1bfb 2285 case BFD_RELOC_HI16_S_GOTOFF: r = R_PPC64_GOT16_HA;
5bd4f169 2286 break;
411e1bfb 2287 case BFD_RELOC_PPC_COPY: r = R_PPC64_COPY;
5bd4f169 2288 break;
411e1bfb 2289 case BFD_RELOC_PPC_GLOB_DAT: r = R_PPC64_GLOB_DAT;
5bd4f169 2290 break;
411e1bfb 2291 case BFD_RELOC_32_PCREL: r = R_PPC64_REL32;
5bd4f169 2292 break;
411e1bfb 2293 case BFD_RELOC_32_PLTOFF: r = R_PPC64_PLT32;
5bd4f169 2294 break;
411e1bfb 2295 case BFD_RELOC_32_PLT_PCREL: r = R_PPC64_PLTREL32;
5bd4f169 2296 break;
411e1bfb 2297 case BFD_RELOC_LO16_PLTOFF: r = R_PPC64_PLT16_LO;
5bd4f169 2298 break;
411e1bfb 2299 case BFD_RELOC_HI16_PLTOFF: r = R_PPC64_PLT16_HI;
5bd4f169 2300 break;
411e1bfb 2301 case BFD_RELOC_HI16_S_PLTOFF: r = R_PPC64_PLT16_HA;
5bd4f169 2302 break;
411e1bfb 2303 case BFD_RELOC_16_BASEREL: r = R_PPC64_SECTOFF;
5bd4f169 2304 break;
411e1bfb 2305 case BFD_RELOC_LO16_BASEREL: r = R_PPC64_SECTOFF_LO;
5bd4f169 2306 break;
411e1bfb 2307 case BFD_RELOC_HI16_BASEREL: r = R_PPC64_SECTOFF_HI;
5bd4f169 2308 break;
411e1bfb 2309 case BFD_RELOC_HI16_S_BASEREL: r = R_PPC64_SECTOFF_HA;
5bd4f169 2310 break;
411e1bfb 2311 case BFD_RELOC_CTOR: r = R_PPC64_ADDR64;
5bd4f169 2312 break;
411e1bfb 2313 case BFD_RELOC_64: r = R_PPC64_ADDR64;
5bd4f169 2314 break;
411e1bfb 2315 case BFD_RELOC_PPC64_HIGHER: r = R_PPC64_ADDR16_HIGHER;
5bd4f169 2316 break;
411e1bfb 2317 case BFD_RELOC_PPC64_HIGHER_S: r = R_PPC64_ADDR16_HIGHERA;
5bd4f169 2318 break;
411e1bfb 2319 case BFD_RELOC_PPC64_HIGHEST: r = R_PPC64_ADDR16_HIGHEST;
5bd4f169 2320 break;
411e1bfb 2321 case BFD_RELOC_PPC64_HIGHEST_S: r = R_PPC64_ADDR16_HIGHESTA;
5bd4f169 2322 break;
411e1bfb 2323 case BFD_RELOC_64_PCREL: r = R_PPC64_REL64;
5bd4f169 2324 break;
411e1bfb 2325 case BFD_RELOC_64_PLTOFF: r = R_PPC64_PLT64;
5bd4f169 2326 break;
411e1bfb 2327 case BFD_RELOC_64_PLT_PCREL: r = R_PPC64_PLTREL64;
5bd4f169 2328 break;
411e1bfb 2329 case BFD_RELOC_PPC_TOC16: r = R_PPC64_TOC16;
5bd4f169 2330 break;
411e1bfb 2331 case BFD_RELOC_PPC64_TOC16_LO: r = R_PPC64_TOC16_LO;
5bd4f169 2332 break;
411e1bfb 2333 case BFD_RELOC_PPC64_TOC16_HI: r = R_PPC64_TOC16_HI;
5bd4f169 2334 break;
411e1bfb 2335 case BFD_RELOC_PPC64_TOC16_HA: r = R_PPC64_TOC16_HA;
5bd4f169 2336 break;
411e1bfb 2337 case BFD_RELOC_PPC64_TOC: r = R_PPC64_TOC;
5bd4f169 2338 break;
411e1bfb 2339 case BFD_RELOC_PPC64_PLTGOT16: r = R_PPC64_PLTGOT16;
5bd4f169 2340 break;
411e1bfb 2341 case BFD_RELOC_PPC64_PLTGOT16_LO: r = R_PPC64_PLTGOT16_LO;
5bd4f169 2342 break;
411e1bfb 2343 case BFD_RELOC_PPC64_PLTGOT16_HI: r = R_PPC64_PLTGOT16_HI;
5bd4f169 2344 break;
411e1bfb 2345 case BFD_RELOC_PPC64_PLTGOT16_HA: r = R_PPC64_PLTGOT16_HA;
5bd4f169 2346 break;
411e1bfb 2347 case BFD_RELOC_PPC64_ADDR16_DS: r = R_PPC64_ADDR16_DS;
5bd4f169 2348 break;
411e1bfb 2349 case BFD_RELOC_PPC64_ADDR16_LO_DS: r = R_PPC64_ADDR16_LO_DS;
5bd4f169 2350 break;
411e1bfb 2351 case BFD_RELOC_PPC64_GOT16_DS: r = R_PPC64_GOT16_DS;
5bd4f169 2352 break;
411e1bfb 2353 case BFD_RELOC_PPC64_GOT16_LO_DS: r = R_PPC64_GOT16_LO_DS;
5bd4f169 2354 break;
411e1bfb 2355 case BFD_RELOC_PPC64_PLT16_LO_DS: r = R_PPC64_PLT16_LO_DS;
5bd4f169 2356 break;
411e1bfb 2357 case BFD_RELOC_PPC64_SECTOFF_DS: r = R_PPC64_SECTOFF_DS;
5bd4f169 2358 break;
411e1bfb 2359 case BFD_RELOC_PPC64_SECTOFF_LO_DS: r = R_PPC64_SECTOFF_LO_DS;
5bd4f169 2360 break;
411e1bfb 2361 case BFD_RELOC_PPC64_TOC16_DS: r = R_PPC64_TOC16_DS;
5bd4f169 2362 break;
411e1bfb 2363 case BFD_RELOC_PPC64_TOC16_LO_DS: r = R_PPC64_TOC16_LO_DS;
5bd4f169 2364 break;
411e1bfb 2365 case BFD_RELOC_PPC64_PLTGOT16_DS: r = R_PPC64_PLTGOT16_DS;
5bd4f169 2366 break;
411e1bfb 2367 case BFD_RELOC_PPC64_PLTGOT16_LO_DS: r = R_PPC64_PLTGOT16_LO_DS;
5bd4f169 2368 break;
411e1bfb 2369 case BFD_RELOC_PPC_TLS: r = R_PPC64_TLS;
5bd4f169 2370 break;
727fc41e
AM
2371 case BFD_RELOC_PPC_TLSGD: r = R_PPC64_TLSGD;
2372 break;
2373 case BFD_RELOC_PPC_TLSLD: r = R_PPC64_TLSLD;
2374 break;
411e1bfb 2375 case BFD_RELOC_PPC_DTPMOD: r = R_PPC64_DTPMOD64;
5bd4f169 2376 break;
411e1bfb 2377 case BFD_RELOC_PPC_TPREL16: r = R_PPC64_TPREL16;
5bd4f169 2378 break;
411e1bfb 2379 case BFD_RELOC_PPC_TPREL16_LO: r = R_PPC64_TPREL16_LO;
5bd4f169 2380 break;
411e1bfb 2381 case BFD_RELOC_PPC_TPREL16_HI: r = R_PPC64_TPREL16_HI;
5bd4f169 2382 break;
f9c6b907
AM
2383 case BFD_RELOC_PPC64_TPREL16_HIGH: r = R_PPC64_TPREL16_HIGH;
2384 break;
411e1bfb 2385 case BFD_RELOC_PPC_TPREL16_HA: r = R_PPC64_TPREL16_HA;
5bd4f169 2386 break;
f9c6b907
AM
2387 case BFD_RELOC_PPC64_TPREL16_HIGHA: r = R_PPC64_TPREL16_HIGHA;
2388 break;
411e1bfb 2389 case BFD_RELOC_PPC_TPREL: r = R_PPC64_TPREL64;
5bd4f169 2390 break;
411e1bfb
AM
2391 case BFD_RELOC_PPC_DTPREL16: r = R_PPC64_DTPREL16;
2392 break;
2393 case BFD_RELOC_PPC_DTPREL16_LO: r = R_PPC64_DTPREL16_LO;
2394 break;
2395 case BFD_RELOC_PPC_DTPREL16_HI: r = R_PPC64_DTPREL16_HI;
2396 break;
f9c6b907
AM
2397 case BFD_RELOC_PPC64_DTPREL16_HIGH: r = R_PPC64_DTPREL16_HIGH;
2398 break;
411e1bfb
AM
2399 case BFD_RELOC_PPC_DTPREL16_HA: r = R_PPC64_DTPREL16_HA;
2400 break;
f9c6b907
AM
2401 case BFD_RELOC_PPC64_DTPREL16_HIGHA: r = R_PPC64_DTPREL16_HIGHA;
2402 break;
411e1bfb
AM
2403 case BFD_RELOC_PPC_DTPREL: r = R_PPC64_DTPREL64;
2404 break;
2405 case BFD_RELOC_PPC_GOT_TLSGD16: r = R_PPC64_GOT_TLSGD16;
2406 break;
2407 case BFD_RELOC_PPC_GOT_TLSGD16_LO: r = R_PPC64_GOT_TLSGD16_LO;
2408 break;
2409 case BFD_RELOC_PPC_GOT_TLSGD16_HI: r = R_PPC64_GOT_TLSGD16_HI;
2410 break;
2411 case BFD_RELOC_PPC_GOT_TLSGD16_HA: r = R_PPC64_GOT_TLSGD16_HA;
2412 break;
2413 case BFD_RELOC_PPC_GOT_TLSLD16: r = R_PPC64_GOT_TLSLD16;
2414 break;
2415 case BFD_RELOC_PPC_GOT_TLSLD16_LO: r = R_PPC64_GOT_TLSLD16_LO;
2416 break;
2417 case BFD_RELOC_PPC_GOT_TLSLD16_HI: r = R_PPC64_GOT_TLSLD16_HI;
2418 break;
2419 case BFD_RELOC_PPC_GOT_TLSLD16_HA: r = R_PPC64_GOT_TLSLD16_HA;
2420 break;
2421 case BFD_RELOC_PPC_GOT_TPREL16: r = R_PPC64_GOT_TPREL16_DS;
2422 break;
2423 case BFD_RELOC_PPC_GOT_TPREL16_LO: r = R_PPC64_GOT_TPREL16_LO_DS;
2424 break;
2425 case BFD_RELOC_PPC_GOT_TPREL16_HI: r = R_PPC64_GOT_TPREL16_HI;
2426 break;
2427 case BFD_RELOC_PPC_GOT_TPREL16_HA: r = R_PPC64_GOT_TPREL16_HA;
2428 break;
2429 case BFD_RELOC_PPC_GOT_DTPREL16: r = R_PPC64_GOT_DTPREL16_DS;
2430 break;
2431 case BFD_RELOC_PPC_GOT_DTPREL16_LO: r = R_PPC64_GOT_DTPREL16_LO_DS;
2432 break;
2433 case BFD_RELOC_PPC_GOT_DTPREL16_HI: r = R_PPC64_GOT_DTPREL16_HI;
2434 break;
2435 case BFD_RELOC_PPC_GOT_DTPREL16_HA: r = R_PPC64_GOT_DTPREL16_HA;
2436 break;
2437 case BFD_RELOC_PPC64_TPREL16_DS: r = R_PPC64_TPREL16_DS;
2438 break;
2439 case BFD_RELOC_PPC64_TPREL16_LO_DS: r = R_PPC64_TPREL16_LO_DS;
2440 break;
2441 case BFD_RELOC_PPC64_TPREL16_HIGHER: r = R_PPC64_TPREL16_HIGHER;
2442 break;
2443 case BFD_RELOC_PPC64_TPREL16_HIGHERA: r = R_PPC64_TPREL16_HIGHERA;
2444 break;
2445 case BFD_RELOC_PPC64_TPREL16_HIGHEST: r = R_PPC64_TPREL16_HIGHEST;
2446 break;
2447 case BFD_RELOC_PPC64_TPREL16_HIGHESTA: r = R_PPC64_TPREL16_HIGHESTA;
2448 break;
2449 case BFD_RELOC_PPC64_DTPREL16_DS: r = R_PPC64_DTPREL16_DS;
2450 break;
2451 case BFD_RELOC_PPC64_DTPREL16_LO_DS: r = R_PPC64_DTPREL16_LO_DS;
2452 break;
2453 case BFD_RELOC_PPC64_DTPREL16_HIGHER: r = R_PPC64_DTPREL16_HIGHER;
2454 break;
2455 case BFD_RELOC_PPC64_DTPREL16_HIGHERA: r = R_PPC64_DTPREL16_HIGHERA;
2456 break;
2457 case BFD_RELOC_PPC64_DTPREL16_HIGHEST: r = R_PPC64_DTPREL16_HIGHEST;
2458 break;
2459 case BFD_RELOC_PPC64_DTPREL16_HIGHESTA: r = R_PPC64_DTPREL16_HIGHESTA;
2460 break;
25f23106
AM
2461 case BFD_RELOC_16_PCREL: r = R_PPC64_REL16;
2462 break;
2463 case BFD_RELOC_LO16_PCREL: r = R_PPC64_REL16_LO;
2464 break;
2465 case BFD_RELOC_HI16_PCREL: r = R_PPC64_REL16_HI;
2466 break;
2467 case BFD_RELOC_HI16_S_PCREL: r = R_PPC64_REL16_HA;
2468 break;
7ba71655
AM
2469 case BFD_RELOC_PPC_16DX_HA: r = R_PPC64_16DX_HA;
2470 break;
a680de9a
PB
2471 case BFD_RELOC_PPC_REL16DX_HA: r = R_PPC64_REL16DX_HA;
2472 break;
006589cf
AM
2473 case BFD_RELOC_PPC64_ENTRY: r = R_PPC64_ENTRY;
2474 break;
45965137
AM
2475 case BFD_RELOC_PPC64_ADDR64_LOCAL: r = R_PPC64_ADDR64_LOCAL;
2476 break;
411e1bfb
AM
2477 case BFD_RELOC_VTABLE_INHERIT: r = R_PPC64_GNU_VTINHERIT;
2478 break;
2479 case BFD_RELOC_VTABLE_ENTRY: r = R_PPC64_GNU_VTENTRY;
5bd4f169
AM
2480 break;
2481 }
2482
4ce794b7 2483 return ppc64_elf_howto_table[r];
5bd4f169
AM
2484};
2485
157090f7
AM
2486static reloc_howto_type *
2487ppc64_elf_reloc_name_lookup (bfd *abfd ATTRIBUTE_UNUSED,
2488 const char *r_name)
2489{
2490 unsigned int i;
2491
a4b6fadd 2492 for (i = 0; i < ARRAY_SIZE (ppc64_elf_howto_raw); i++)
157090f7
AM
2493 if (ppc64_elf_howto_raw[i].name != NULL
2494 && strcasecmp (ppc64_elf_howto_raw[i].name, r_name) == 0)
2495 return &ppc64_elf_howto_raw[i];
2496
2497 return NULL;
2498}
2499
5bd4f169
AM
2500/* Set the howto pointer for a PowerPC ELF reloc. */
2501
2502static void
4aef7643 2503ppc64_elf_info_to_howto (bfd *abfd, arelent *cache_ptr,
4ce794b7 2504 Elf_Internal_Rela *dst)
5bd4f169 2505{
65f38f15
AM
2506 unsigned int type;
2507
ef60b7ff 2508 /* Initialize howto table if needed. */
5bd4f169 2509 if (!ppc64_elf_howto_table[R_PPC64_ADDR32])
5bd4f169
AM
2510 ppc_howto_init ();
2511
65f38f15 2512 type = ELF64_R_TYPE (dst->r_info);
a4b6fadd 2513 if (type >= ARRAY_SIZE (ppc64_elf_howto_table))
d0fb9a8d 2514 {
695344c0 2515 /* xgettext:c-format */
4eca0228
AM
2516 _bfd_error_handler (_("%B: invalid relocation type %d"),
2517 abfd, (int) type);
3ec2b351 2518 type = R_PPC64_NONE;
d0fb9a8d 2519 }
65f38f15 2520 cache_ptr->howto = ppc64_elf_howto_table[type];
5bd4f169
AM
2521}
2522
04c9666a 2523/* Handle the R_PPC64_ADDR16_HA and similar relocs. */
5bd4f169
AM
2524
2525static bfd_reloc_status_type
4ce794b7
AM
2526ppc64_elf_ha_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
2527 void *data, asection *input_section,
2528 bfd *output_bfd, char **error_message)
5bd4f169 2529{
a680de9a
PB
2530 enum elf_ppc64_reloc_type r_type;
2531 long insn;
2532 bfd_size_type octets;
3de43e7b 2533 bfd_vma value;
a680de9a 2534
805fc799
AM
2535 /* If this is a relocatable link (output_bfd test tells us), just
2536 call the generic function. Any adjustment will be done at final
2537 link time. */
2538 if (output_bfd != NULL)
cedb70c5 2539 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
805fc799
AM
2540 input_section, output_bfd, error_message);
2541
2542 /* Adjust the addend for sign extension of the low 16 bits.
2543 We won't actually be using the low 16 bits, so trashing them
2544 doesn't matter. */
2545 reloc_entry->addend += 0x8000;
a680de9a
PB
2546 r_type = reloc_entry->howto->type;
2547 if (r_type != R_PPC64_REL16DX_HA)
2548 return bfd_reloc_continue;
2549
2550 value = 0;
2551 if (!bfd_is_com_section (symbol->section))
2552 value = symbol->value;
2553 value += (reloc_entry->addend
2554 + symbol->section->output_offset
2555 + symbol->section->output_section->vma);
2556 value -= (reloc_entry->address
2557 + input_section->output_offset
2558 + input_section->output_section->vma);
3de43e7b 2559 value = (bfd_signed_vma) value >> 16;
a680de9a
PB
2560
2561 octets = reloc_entry->address * bfd_octets_per_byte (abfd);
2562 insn = bfd_get_32 (abfd, (bfd_byte *) data + octets);
2563 insn &= ~0x1fffc1;
3de43e7b 2564 insn |= (value & 0xffc1) | ((value & 0x3e) << 15);
a680de9a 2565 bfd_put_32 (abfd, insn, (bfd_byte *) data + octets);
3de43e7b 2566 if (value + 0x8000 > 0xffff)
a680de9a
PB
2567 return bfd_reloc_overflow;
2568 return bfd_reloc_ok;
805fc799 2569}
5bd4f169 2570
2441e016
AM
2571static bfd_reloc_status_type
2572ppc64_elf_branch_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
2573 void *data, asection *input_section,
2574 bfd *output_bfd, char **error_message)
2575{
2576 if (output_bfd != NULL)
2577 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
2578 input_section, output_bfd, error_message);
2579
699733f6
AM
2580 if (strcmp (symbol->section->name, ".opd") == 0
2581 && (symbol->section->owner->flags & DYNAMIC) == 0)
2441e016
AM
2582 {
2583 bfd_vma dest = opd_entry_value (symbol->section,
2584 symbol->value + reloc_entry->addend,
aef36ac1 2585 NULL, NULL, FALSE);
2441e016
AM
2586 if (dest != (bfd_vma) -1)
2587 reloc_entry->addend = dest - (symbol->value
2588 + symbol->section->output_section->vma
2589 + symbol->section->output_offset);
2590 }
810d4e75
AM
2591 else
2592 {
2593 elf_symbol_type *elfsym = (elf_symbol_type *) symbol;
2594
2595 if (symbol->section->owner != abfd
9f284bf9 2596 && symbol->section->owner != NULL
810d4e75
AM
2597 && abiversion (symbol->section->owner) >= 2)
2598 {
2599 unsigned int i;
2600
2601 for (i = 0; i < symbol->section->owner->symcount; ++i)
2602 {
2603 asymbol *symdef = symbol->section->owner->outsymbols[i];
2604
2605 if (strcmp (symdef->name, symbol->name) == 0)
2606 {
2607 elfsym = (elf_symbol_type *) symdef;
2608 break;
2609 }
2610 }
2611 }
2612 reloc_entry->addend
2613 += PPC64_LOCAL_ENTRY_OFFSET (elfsym->internal_elf_sym.st_other);
2614 }
2441e016
AM
2615 return bfd_reloc_continue;
2616}
2617
805fc799 2618static bfd_reloc_status_type
4ce794b7
AM
2619ppc64_elf_brtaken_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
2620 void *data, asection *input_section,
2621 bfd *output_bfd, char **error_message)
805fc799
AM
2622{
2623 long insn;
04c9666a 2624 enum elf_ppc64_reloc_type r_type;
805fc799 2625 bfd_size_type octets;
794e51c0
AM
2626 /* Assume 'at' branch hints. */
2627 bfd_boolean is_isa_v2 = TRUE;
805fc799
AM
2628
2629 /* If this is a relocatable link (output_bfd test tells us), just
2630 call the generic function. Any adjustment will be done at final
2631 link time. */
5bd4f169 2632 if (output_bfd != NULL)
cedb70c5 2633 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
805fc799
AM
2634 input_section, output_bfd, error_message);
2635
2636 octets = reloc_entry->address * bfd_octets_per_byte (abfd);
2637 insn = bfd_get_32 (abfd, (bfd_byte *) data + octets);
2638 insn &= ~(0x01 << 21);
4ce794b7 2639 r_type = reloc_entry->howto->type;
805fc799
AM
2640 if (r_type == R_PPC64_ADDR14_BRTAKEN
2641 || r_type == R_PPC64_REL14_BRTAKEN)
cedb70c5 2642 insn |= 0x01 << 21; /* 'y' or 't' bit, lowest bit of BO field. */
805fc799 2643
794e51c0 2644 if (is_isa_v2)
5bd4f169 2645 {
805fc799
AM
2646 /* Set 'a' bit. This is 0b00010 in BO field for branch
2647 on CR(BI) insns (BO == 001at or 011at), and 0b01000
2648 for branch on CTR insns (BO == 1a00t or 1a01t). */
2649 if ((insn & (0x14 << 21)) == (0x04 << 21))
2650 insn |= 0x02 << 21;
2651 else if ((insn & (0x14 << 21)) == (0x10 << 21))
2652 insn |= 0x08 << 21;
2653 else
2441e016 2654 goto out;
5bd4f169 2655 }
805fc799
AM
2656 else
2657 {
2658 bfd_vma target = 0;
2659 bfd_vma from;
5bd4f169 2660
805fc799
AM
2661 if (!bfd_is_com_section (symbol->section))
2662 target = symbol->value;
2663 target += symbol->section->output_section->vma;
2664 target += symbol->section->output_offset;
2665 target += reloc_entry->addend;
5bd4f169 2666
805fc799
AM
2667 from = (reloc_entry->address
2668 + input_section->output_offset
2669 + input_section->output_section->vma);
5bd4f169 2670
805fc799
AM
2671 /* Invert 'y' bit if not the default. */
2672 if ((bfd_signed_vma) (target - from) < 0)
2673 insn ^= 0x01 << 21;
2674 }
4ce794b7 2675 bfd_put_32 (abfd, insn, (bfd_byte *) data + octets);
2441e016
AM
2676 out:
2677 return ppc64_elf_branch_reloc (abfd, reloc_entry, symbol, data,
2678 input_section, output_bfd, error_message);
805fc799 2679}
5bd4f169 2680
805fc799 2681static bfd_reloc_status_type
4ce794b7
AM
2682ppc64_elf_sectoff_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
2683 void *data, asection *input_section,
2684 bfd *output_bfd, char **error_message)
805fc799
AM
2685{
2686 /* If this is a relocatable link (output_bfd test tells us), just
2687 call the generic function. Any adjustment will be done at final
2688 link time. */
2689 if (output_bfd != NULL)
cedb70c5 2690 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
805fc799 2691 input_section, output_bfd, error_message);
5bd4f169 2692
805fc799
AM
2693 /* Subtract the symbol section base address. */
2694 reloc_entry->addend -= symbol->section->output_section->vma;
5bd4f169
AM
2695 return bfd_reloc_continue;
2696}
2697
805fc799 2698static bfd_reloc_status_type
4ce794b7
AM
2699ppc64_elf_sectoff_ha_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
2700 void *data, asection *input_section,
2701 bfd *output_bfd, char **error_message)
805fc799
AM
2702{
2703 /* If this is a relocatable link (output_bfd test tells us), just
2704 call the generic function. Any adjustment will be done at final
2705 link time. */
2706 if (output_bfd != NULL)
cedb70c5 2707 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
805fc799
AM
2708 input_section, output_bfd, error_message);
2709
2710 /* Subtract the symbol section base address. */
2711 reloc_entry->addend -= symbol->section->output_section->vma;
2712
2713 /* Adjust the addend for sign extension of the low 16 bits. */
2714 reloc_entry->addend += 0x8000;
2715 return bfd_reloc_continue;
2716}
2717
2718static bfd_reloc_status_type
4ce794b7
AM
2719ppc64_elf_toc_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
2720 void *data, asection *input_section,
2721 bfd *output_bfd, char **error_message)
805fc799
AM
2722{
2723 bfd_vma TOCstart;
2724
2725 /* If this is a relocatable link (output_bfd test tells us), just
2726 call the generic function. Any adjustment will be done at final
2727 link time. */
2728 if (output_bfd != NULL)
cedb70c5 2729 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
805fc799
AM
2730 input_section, output_bfd, error_message);
2731
2732 TOCstart = _bfd_get_gp_value (input_section->output_section->owner);
2733 if (TOCstart == 0)
1c865ab2 2734 TOCstart = ppc64_elf_set_toc (NULL, input_section->output_section->owner);
805fc799
AM
2735
2736 /* Subtract the TOC base address. */
2737 reloc_entry->addend -= TOCstart + TOC_BASE_OFF;
2738 return bfd_reloc_continue;
2739}
2740
2741static bfd_reloc_status_type
4ce794b7
AM
2742ppc64_elf_toc_ha_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
2743 void *data, asection *input_section,
2744 bfd *output_bfd, char **error_message)
805fc799
AM
2745{
2746 bfd_vma TOCstart;
2747
2748 /* If this is a relocatable link (output_bfd test tells us), just
2749 call the generic function. Any adjustment will be done at final
2750 link time. */
2751 if (output_bfd != NULL)
cedb70c5 2752 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
805fc799
AM
2753 input_section, output_bfd, error_message);
2754
2755 TOCstart = _bfd_get_gp_value (input_section->output_section->owner);
2756 if (TOCstart == 0)
1c865ab2 2757 TOCstart = ppc64_elf_set_toc (NULL, input_section->output_section->owner);
805fc799
AM
2758
2759 /* Subtract the TOC base address. */
2760 reloc_entry->addend -= TOCstart + TOC_BASE_OFF;
2761
2762 /* Adjust the addend for sign extension of the low 16 bits. */
2763 reloc_entry->addend += 0x8000;
2764 return bfd_reloc_continue;
2765}
2766
2767static bfd_reloc_status_type
4ce794b7
AM
2768ppc64_elf_toc64_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
2769 void *data, asection *input_section,
2770 bfd *output_bfd, char **error_message)
805fc799
AM
2771{
2772 bfd_vma TOCstart;
2773 bfd_size_type octets;
2774
2775 /* If this is a relocatable link (output_bfd test tells us), just
2776 call the generic function. Any adjustment will be done at final
2777 link time. */
2778 if (output_bfd != NULL)
cedb70c5 2779 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
805fc799
AM
2780 input_section, output_bfd, error_message);
2781
2782 TOCstart = _bfd_get_gp_value (input_section->output_section->owner);
2783 if (TOCstart == 0)
1c865ab2 2784 TOCstart = ppc64_elf_set_toc (NULL, input_section->output_section->owner);
805fc799
AM
2785
2786 octets = reloc_entry->address * bfd_octets_per_byte (abfd);
2787 bfd_put_64 (abfd, TOCstart + TOC_BASE_OFF, (bfd_byte *) data + octets);
2788 return bfd_reloc_ok;
2789}
2790
2791static bfd_reloc_status_type
4ce794b7
AM
2792ppc64_elf_unhandled_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
2793 void *data, asection *input_section,
2794 bfd *output_bfd, char **error_message)
805fc799
AM
2795{
2796 /* If this is a relocatable link (output_bfd test tells us), just
2797 call the generic function. Any adjustment will be done at final
2798 link time. */
2799 if (output_bfd != NULL)
cedb70c5 2800 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
805fc799
AM
2801 input_section, output_bfd, error_message);
2802
2803 if (error_message != NULL)
2804 {
2805 static char buf[60];
2806 sprintf (buf, "generic linker can't handle %s",
2807 reloc_entry->howto->name);
2808 *error_message = buf;
2809 }
2810 return bfd_reloc_dangerous;
2811}
2812
927be08e
AM
2813/* Track GOT entries needed for a given symbol. We might need more
2814 than one got entry per symbol. */
2815struct got_entry
2816{
2817 struct got_entry *next;
2818
2819 /* The symbol addend that we'll be placing in the GOT. */
2820 bfd_vma addend;
2821
2822 /* Unlike other ELF targets, we use separate GOT entries for the same
2823 symbol referenced from different input files. This is to support
2824 automatic multiple TOC/GOT sections, where the TOC base can vary
2825 from one input file to another. After partitioning into TOC groups
2826 we merge entries within the group.
2827
2828 Point to the BFD owning this GOT entry. */
2829 bfd *owner;
2830
2831 /* Zero for non-tls entries, or TLS_TLS and one of TLS_GD, TLS_LD,
2832 TLS_TPREL or TLS_DTPREL for tls entries. */
f961d9dd 2833 unsigned char tls_type;
927be08e
AM
2834
2835 /* Non-zero if got.ent points to real entry. */
f961d9dd 2836 unsigned char is_indirect;
927be08e
AM
2837
2838 /* Reference count until size_dynamic_sections, GOT offset thereafter. */
2839 union
2840 {
2841 bfd_signed_vma refcount;
2842 bfd_vma offset;
2843 struct got_entry *ent;
2844 } got;
2845};
2846
2847/* The same for PLT. */
2848struct plt_entry
2849{
2850 struct plt_entry *next;
2851
2852 bfd_vma addend;
2853
2854 union
2855 {
2856 bfd_signed_vma refcount;
2857 bfd_vma offset;
2858 } plt;
2859};
2860
e717da7e
AM
2861struct ppc64_elf_obj_tdata
2862{
2863 struct elf_obj_tdata elf;
2864
2865 /* Shortcuts to dynamic linker sections. */
2866 asection *got;
2867 asection *relgot;
2868
b3fac117
AM
2869 /* Used during garbage collection. We attach global symbols defined
2870 on removed .opd entries to this section so that the sym is removed. */
2871 asection *deleted_section;
81688140 2872
927be08e 2873 /* TLS local dynamic got entry handling. Support for multiple GOT
e717da7e 2874 sections means we potentially need one of these for each input bfd. */
927be08e 2875 struct got_entry tlsld_got;
8860955f 2876
729eabd5
AM
2877 union {
2878 /* A copy of relocs before they are modified for --emit-relocs. */
2879 Elf_Internal_Rela *relocs;
2880
2881 /* Section contents. */
2882 bfd_byte *contents;
2883 } opd;
d77c8a4b
AM
2884
2885 /* Nonzero if this bfd has small toc/got relocs, ie. that expect
2886 the reloc to be in the range -32768 to 32767. */
98528052
AM
2887 unsigned int has_small_toc_reloc : 1;
2888
560c8763
AM
2889 /* Set if toc/got ha relocs detected not using r2, or lo reloc
2890 instruction not one we handle. */
2891 unsigned int unexpected_toc_insn : 1;
e717da7e
AM
2892};
2893
2894#define ppc64_elf_tdata(bfd) \
2895 ((struct ppc64_elf_obj_tdata *) (bfd)->tdata.any)
2896
2897#define ppc64_tlsld_got(bfd) \
2898 (&ppc64_elf_tdata (bfd)->tlsld_got)
2899
0c8d6e5c
AM
2900#define is_ppc64_elf(bfd) \
2901 (bfd_get_flavour (bfd) == bfd_target_elf_flavour \
4dfe6ac6 2902 && elf_object_id (bfd) == PPC64_ELF_DATA)
0c8d6e5c 2903
e717da7e
AM
2904/* Override the generic function because we store some extras. */
2905
2906static bfd_boolean
2907ppc64_elf_mkobject (bfd *abfd)
2908{
0ffa91dd 2909 return bfd_elf_allocate_object (abfd, sizeof (struct ppc64_elf_obj_tdata),
4dfe6ac6 2910 PPC64_ELF_DATA);
e717da7e
AM
2911}
2912
feee612b 2913/* Fix bad default arch selected for a 64 bit input bfd when the
14b57c7c 2914 default is 32 bit. Also select arch based on apuinfo. */
feee612b 2915
b34976b6 2916static bfd_boolean
4ce794b7 2917ppc64_elf_object_p (bfd *abfd)
feee612b 2918{
14b57c7c
AM
2919 if (!abfd->arch_info->the_default)
2920 return TRUE;
2921
2922 if (abfd->arch_info->bits_per_word == 32)
feee612b
AM
2923 {
2924 Elf_Internal_Ehdr *i_ehdr = elf_elfheader (abfd);
2925
2926 if (i_ehdr->e_ident[EI_CLASS] == ELFCLASS64)
2927 {
2928 /* Relies on arch after 32 bit default being 64 bit default. */
2929 abfd->arch_info = abfd->arch_info->next;
2930 BFD_ASSERT (abfd->arch_info->bits_per_word == 64);
2931 }
2932 }
14b57c7c 2933 return _bfd_elf_ppc_set_arch (abfd);
feee612b
AM
2934}
2935
d37c89e5
AM
2936/* Support for core dump NOTE sections. */
2937
2938static bfd_boolean
2939ppc64_elf_grok_prstatus (bfd *abfd, Elf_Internal_Note *note)
2940{
eea6121a 2941 size_t offset, size;
d37c89e5
AM
2942
2943 if (note->descsz != 504)
2944 return FALSE;
2945
2946 /* pr_cursig */
228e534f 2947 elf_tdata (abfd)->core->signal = bfd_get_16 (abfd, note->descdata + 12);
d37c89e5
AM
2948
2949 /* pr_pid */
228e534f 2950 elf_tdata (abfd)->core->lwpid = bfd_get_32 (abfd, note->descdata + 32);
d37c89e5
AM
2951
2952 /* pr_reg */
2953 offset = 112;
eea6121a 2954 size = 384;
d37c89e5
AM
2955
2956 /* Make a ".reg/999" section. */
2957 return _bfd_elfcore_make_pseudosection (abfd, ".reg",
eea6121a 2958 size, note->descpos + offset);
d37c89e5
AM
2959}
2960
2961static bfd_boolean
2962ppc64_elf_grok_psinfo (bfd *abfd, Elf_Internal_Note *note)
2963{
2964 if (note->descsz != 136)
2965 return FALSE;
2966
228e534f 2967 elf_tdata (abfd)->core->pid
bc989cdc 2968 = bfd_get_32 (abfd, note->descdata + 24);
228e534f 2969 elf_tdata (abfd)->core->program
d37c89e5 2970 = _bfd_elfcore_strndup (abfd, note->descdata + 40, 16);
228e534f 2971 elf_tdata (abfd)->core->command
d37c89e5
AM
2972 = _bfd_elfcore_strndup (abfd, note->descdata + 56, 80);
2973
2974 return TRUE;
2975}
2976
183e98be
AM
2977static char *
2978ppc64_elf_write_core_note (bfd *abfd, char *buf, int *bufsiz, int note_type,
2979 ...)
2980{
2981 switch (note_type)
2982 {
2983 default:
2984 return NULL;
2985
2986 case NT_PRPSINFO:
2987 {
2988 char data[136];
2989 va_list ap;
2990
2991 va_start (ap, note_type);
75cd47ed 2992 memset (data, 0, sizeof (data));
183e98be
AM
2993 strncpy (data + 40, va_arg (ap, const char *), 16);
2994 strncpy (data + 56, va_arg (ap, const char *), 80);
2995 va_end (ap);
2996 return elfcore_write_note (abfd, buf, bufsiz,
2997 "CORE", note_type, data, sizeof (data));
2998 }
2999
3000 case NT_PRSTATUS:
3001 {
3002 char data[504];
3003 va_list ap;
3004 long pid;
3005 int cursig;
3006 const void *greg;
3007
3008 va_start (ap, note_type);
3009 memset (data, 0, 112);
3010 pid = va_arg (ap, long);
3011 bfd_put_32 (abfd, pid, data + 32);
3012 cursig = va_arg (ap, int);
3013 bfd_put_16 (abfd, cursig, data + 12);
3014 greg = va_arg (ap, const void *);
3015 memcpy (data + 112, greg, 384);
3016 memset (data + 496, 0, 8);
3017 va_end (ap);
3018 return elfcore_write_note (abfd, buf, bufsiz,
3019 "CORE", note_type, data, sizeof (data));
3020 }
3021 }
3022}
3023
5d35169e
AM
3024/* Add extra PPC sections. */
3025
b35d266b 3026static const struct bfd_elf_special_section ppc64_elf_special_sections[]=
7f4d3958 3027{
0112cd26
NC
3028 { STRING_COMMA_LEN (".plt"), 0, SHT_NOBITS, 0 },
3029 { STRING_COMMA_LEN (".sbss"), -2, SHT_NOBITS, SHF_ALLOC + SHF_WRITE },
3030 { STRING_COMMA_LEN (".sdata"), -2, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE },
3031 { STRING_COMMA_LEN (".toc"), 0, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE },
3032 { STRING_COMMA_LEN (".toc1"), 0, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE },
3033 { STRING_COMMA_LEN (".tocbss"), 0, SHT_NOBITS, SHF_ALLOC + SHF_WRITE },
3034 { NULL, 0, 0, 0, 0 }
5d35169e
AM
3035};
3036
7c8fe5c4
AM
3037enum _ppc64_sec_type {
3038 sec_normal = 0,
3039 sec_opd = 1,
3040 sec_toc = 2
3041};
3042
f0abc2a1
AM
3043struct _ppc64_elf_section_data
3044{
3045 struct bfd_elf_section_data elf;
411e1bfb 3046
f0abc2a1
AM
3047 union
3048 {
51aecdc5
AM
3049 /* An array with one entry for each opd function descriptor,
3050 and some spares since opd entries may be either 16 or 24 bytes. */
3051#define OPD_NDX(OFF) ((OFF) >> 4)
74f0fb50
AM
3052 struct _opd_sec_data
3053 {
3054 /* Points to the function code section for local opd entries. */
3055 asection **func_sec;
3056
3057 /* After editing .opd, adjust references to opd local syms. */
3058 long *adjust;
3059 } opd;
7c8fe5c4 3060
3a71aa26
AM
3061 /* An array for toc sections, indexed by offset/8. */
3062 struct _toc_sec_data
3063 {
3064 /* Specifies the relocation symbol index used at a given toc offset. */
3065 unsigned *symndx;
3066
3067 /* And the relocation addend. */
3068 bfd_vma *add;
3069 } toc;
7c8fe5c4
AM
3070 } u;
3071
3072 enum _ppc64_sec_type sec_type:2;
411e1bfb 3073
7c8fe5c4
AM
3074 /* Flag set when small branches are detected. Used to
3075 select suitable defaults for the stub group size. */
3076 unsigned int has_14bit_branch:1;
f0abc2a1
AM
3077};
3078
3079#define ppc64_elf_section_data(sec) \
411e1bfb 3080 ((struct _ppc64_elf_section_data *) elf_section_data (sec))
f0abc2a1
AM
3081
3082static bfd_boolean
4ce794b7 3083ppc64_elf_new_section_hook (bfd *abfd, asection *sec)
f0abc2a1 3084{
f592407e
AM
3085 if (!sec->used_by_bfd)
3086 {
3087 struct _ppc64_elf_section_data *sdata;
3088 bfd_size_type amt = sizeof (*sdata);
f0abc2a1 3089
f592407e
AM
3090 sdata = bfd_zalloc (abfd, amt);
3091 if (sdata == NULL)
3092 return FALSE;
3093 sec->used_by_bfd = sdata;
3094 }
f0abc2a1
AM
3095
3096 return _bfd_elf_new_section_hook (abfd, sec);
3097}
4025353c 3098
74f0fb50 3099static struct _opd_sec_data *
4025353c
AM
3100get_opd_info (asection * sec)
3101{
3102 if (sec != NULL
3103 && ppc64_elf_section_data (sec) != NULL
7c8fe5c4 3104 && ppc64_elf_section_data (sec)->sec_type == sec_opd)
74f0fb50 3105 return &ppc64_elf_section_data (sec)->u.opd;
4025353c
AM
3106 return NULL;
3107}
90e3cdf2
JJ
3108\f
3109/* Parameters for the qsort hook. */
90e3cdf2 3110static bfd_boolean synthetic_relocatable;
cd285db5 3111static asection *synthetic_opd;
90e3cdf2 3112
699733f6 3113/* qsort comparison function for ppc64_elf_get_synthetic_symtab. */
90e3cdf2
JJ
3114
3115static int
3116compare_symbols (const void *ap, const void *bp)
3117{
3118 const asymbol *a = * (const asymbol **) ap;
3119 const asymbol *b = * (const asymbol **) bp;
3120
699733f6
AM
3121 /* Section symbols first. */
3122 if ((a->flags & BSF_SECTION_SYM) && !(b->flags & BSF_SECTION_SYM))
90e3cdf2 3123 return -1;
699733f6 3124 if (!(a->flags & BSF_SECTION_SYM) && (b->flags & BSF_SECTION_SYM))
90e3cdf2
JJ
3125 return 1;
3126
699733f6 3127 /* then .opd symbols. */
cd285db5
AM
3128 if (synthetic_opd != NULL)
3129 {
3130 if (strcmp (a->section->name, ".opd") == 0
3131 && strcmp (b->section->name, ".opd") != 0)
3132 return -1;
3133 if (strcmp (a->section->name, ".opd") != 0
3134 && strcmp (b->section->name, ".opd") == 0)
3135 return 1;
3136 }
90e3cdf2 3137
699733f6 3138 /* then other code symbols. */
90e3cdf2
JJ
3139 if ((a->section->flags & (SEC_CODE | SEC_ALLOC | SEC_THREAD_LOCAL))
3140 == (SEC_CODE | SEC_ALLOC)
3141 && (b->section->flags & (SEC_CODE | SEC_ALLOC | SEC_THREAD_LOCAL))
3142 != (SEC_CODE | SEC_ALLOC))
3143 return -1;
3144
3145 if ((a->section->flags & (SEC_CODE | SEC_ALLOC | SEC_THREAD_LOCAL))
3146 != (SEC_CODE | SEC_ALLOC)
3147 && (b->section->flags & (SEC_CODE | SEC_ALLOC | SEC_THREAD_LOCAL))
3148 == (SEC_CODE | SEC_ALLOC))
3149 return 1;
3150
3151 if (synthetic_relocatable)
3152 {
3153 if (a->section->id < b->section->id)
3154 return -1;
3155
3156 if (a->section->id > b->section->id)
3157 return 1;
3158 }
3159
3160 if (a->value + a->section->vma < b->value + b->section->vma)
3161 return -1;
3162
3163 if (a->value + a->section->vma > b->value + b->section->vma)
3164 return 1;
3165
4d35a0aa
AM
3166 /* For syms with the same value, prefer strong dynamic global function
3167 syms over other syms. */
3168 if ((a->flags & BSF_GLOBAL) != 0 && (b->flags & BSF_GLOBAL) == 0)
3169 return -1;
3170
3171 if ((a->flags & BSF_GLOBAL) == 0 && (b->flags & BSF_GLOBAL) != 0)
3172 return 1;
3173
3174 if ((a->flags & BSF_FUNCTION) != 0 && (b->flags & BSF_FUNCTION) == 0)
3175 return -1;
3176
3177 if ((a->flags & BSF_FUNCTION) == 0 && (b->flags & BSF_FUNCTION) != 0)
3178 return 1;
3179
3180 if ((a->flags & BSF_WEAK) == 0 && (b->flags & BSF_WEAK) != 0)
3181 return -1;
3182
3183 if ((a->flags & BSF_WEAK) != 0 && (b->flags & BSF_WEAK) == 0)
3184 return 1;
3185
3186 if ((a->flags & BSF_DYNAMIC) != 0 && (b->flags & BSF_DYNAMIC) == 0)
3187 return -1;
3188
3189 if ((a->flags & BSF_DYNAMIC) == 0 && (b->flags & BSF_DYNAMIC) != 0)
3190 return 1;
3191
aaed6f5b 3192 return a > b;
90e3cdf2
JJ
3193}
3194
699733f6 3195/* Search SYMS for a symbol of the given VALUE. */
90e3cdf2 3196
699733f6 3197static asymbol *
7292b3ac 3198sym_exists_at (asymbol **syms, long lo, long hi, unsigned int id, bfd_vma value)
90e3cdf2 3199{
699733f6 3200 long mid;
90e3cdf2 3201
7292b3ac 3202 if (id == (unsigned) -1)
699733f6
AM
3203 {
3204 while (lo < hi)
3205 {
3206 mid = (lo + hi) >> 1;
3207 if (syms[mid]->value + syms[mid]->section->vma < value)
3208 lo = mid + 1;
3209 else if (syms[mid]->value + syms[mid]->section->vma > value)
3210 hi = mid;
3211 else
3212 return syms[mid];
3213 }
3214 }
3215 else
3216 {
3217 while (lo < hi)
3218 {
3219 mid = (lo + hi) >> 1;
3220 if (syms[mid]->section->id < id)
3221 lo = mid + 1;
3222 else if (syms[mid]->section->id > id)
3223 hi = mid;
3224 else if (syms[mid]->value < value)
3225 lo = mid + 1;
3226 else if (syms[mid]->value > value)
3227 hi = mid;
3228 else
3229 return syms[mid];
3230 }
3231 }
3232 return NULL;
90e3cdf2
JJ
3233}
3234
468392fb
AM
3235static bfd_boolean
3236section_covers_vma (bfd *abfd ATTRIBUTE_UNUSED, asection *section, void *ptr)
3237{
3238 bfd_vma vma = *(bfd_vma *) ptr;
3239 return ((section->flags & SEC_ALLOC) != 0
3240 && section->vma <= vma
3241 && vma < section->vma + section->size);
3242}
3243
699733f6 3244/* Create synthetic symbols, effectively restoring "dot-symbol" function
c4b0b099
AM
3245 entry syms. Also generate @plt symbols for the glink branch table.
3246 Returns count of synthetic symbols in RET or -1 on error. */
90e3cdf2
JJ
3247
3248static long
a7535cf3
AM
3249ppc64_elf_get_synthetic_symtab (bfd *abfd,
3250 long static_count, asymbol **static_syms,
3251 long dyn_count, asymbol **dyn_syms,
c9727e01 3252 asymbol **ret)
90e3cdf2
JJ
3253{
3254 asymbol *s;
699733f6
AM
3255 long i;
3256 long count;
90e3cdf2 3257 char *names;
a7535cf3 3258 long symcount, codesecsym, codesecsymend, secsymend, opdsymend;
ee67d69a 3259 asection *opd = NULL;
90e3cdf2 3260 bfd_boolean relocatable = (abfd->flags & (EXEC_P | DYNAMIC)) == 0;
a7535cf3 3261 asymbol **syms;
ee67d69a 3262 int abi = abiversion (abfd);
90e3cdf2
JJ
3263
3264 *ret = NULL;
3265
ee67d69a
AM
3266 if (abi < 2)
3267 {
3268 opd = bfd_get_section_by_name (abfd, ".opd");
3269 if (opd == NULL && abi == 1)
3270 return 0;
3271 }
90e3cdf2 3272
a7535cf3 3273 symcount = static_count;
c9727e01 3274 if (!relocatable)
a7535cf3 3275 symcount += dyn_count;
90e3cdf2 3276 if (symcount == 0)
c9727e01 3277 return 0;
90e3cdf2 3278
a7535cf3
AM
3279 syms = bfd_malloc ((symcount + 1) * sizeof (*syms));
3280 if (syms == NULL)
7356fed5 3281 return -1;
a7535cf3
AM
3282
3283 if (!relocatable && static_count != 0 && dyn_count != 0)
3284 {
3285 /* Use both symbol tables. */
3286 memcpy (syms, static_syms, static_count * sizeof (*syms));
3287 memcpy (syms + static_count, dyn_syms, (dyn_count + 1) * sizeof (*syms));
3288 }
3289 else if (!relocatable && static_count == 0)
3290 memcpy (syms, dyn_syms, (symcount + 1) * sizeof (*syms));
3291 else
3292 memcpy (syms, static_syms, (symcount + 1) * sizeof (*syms));
3293
90e3cdf2 3294 synthetic_relocatable = relocatable;
cd285db5 3295 synthetic_opd = opd;
595da8c5 3296 qsort (syms, symcount, sizeof (*syms), compare_symbols);
90e3cdf2 3297
c9727e01
AM
3298 if (!relocatable && symcount > 1)
3299 {
3300 long j;
3301 /* Trim duplicate syms, since we may have merged the normal and
3302 dynamic symbols. Actually, we only care about syms that have
3b36f7e6 3303 different values, so trim any with the same value. */
c9727e01
AM
3304 for (i = 1, j = 1; i < symcount; ++i)
3305 if (syms[i - 1]->value + syms[i - 1]->section->vma
3306 != syms[i]->value + syms[i]->section->vma)
3307 syms[j++] = syms[i];
3308 symcount = j;
3309 }
3310
699733f6 3311 i = 0;
cd285db5
AM
3312 /* Note that here and in compare_symbols we can't compare opd and
3313 sym->section directly. With separate debug info files, the
3314 symbols will be extracted from the debug file while abfd passed
3315 to this function is the real binary. */
3316 if (opd != NULL && strcmp (syms[i]->section->name, ".opd") == 0)
699733f6
AM
3317 ++i;
3318 codesecsym = i;
90e3cdf2 3319
699733f6
AM
3320 for (; i < symcount; ++i)
3321 if (((syms[i]->section->flags & (SEC_CODE | SEC_ALLOC | SEC_THREAD_LOCAL))
3322 != (SEC_CODE | SEC_ALLOC))
3323 || (syms[i]->flags & BSF_SECTION_SYM) == 0)
3324 break;
3325 codesecsymend = i;
90e3cdf2 3326
699733f6
AM
3327 for (; i < symcount; ++i)
3328 if ((syms[i]->flags & BSF_SECTION_SYM) == 0)
3329 break;
3330 secsymend = i;
90e3cdf2 3331
cd285db5
AM
3332 if (opd != NULL)
3333 for (; i < symcount; ++i)
3334 if (strcmp (syms[i]->section->name, ".opd") != 0)
3335 break;
699733f6 3336 opdsymend = i;
90e3cdf2 3337
699733f6
AM
3338 for (; i < symcount; ++i)
3339 if ((syms[i]->section->flags & (SEC_CODE | SEC_ALLOC | SEC_THREAD_LOCAL))
3340 != (SEC_CODE | SEC_ALLOC))
3341 break;
3342 symcount = i;
3343
c9727e01 3344 count = 0;
90e3cdf2 3345
699733f6 3346 if (relocatable)
90e3cdf2 3347 {
699733f6
AM
3348 bfd_boolean (*slurp_relocs) (bfd *, asection *, asymbol **, bfd_boolean);
3349 arelent *r;
3350 size_t size;
3351 long relcount;
90e3cdf2 3352
468392fb
AM
3353 if (opdsymend == secsymend)
3354 goto done;
3355
699733f6 3356 slurp_relocs = get_elf_backend_data (abfd)->s->slurp_reloc_table;
90e3cdf2 3357 relcount = (opd->flags & SEC_RELOC) ? opd->reloc_count : 0;
7356fed5 3358 if (relcount == 0)
c9727e01 3359 goto done;
90e3cdf2 3360
7356fed5
AM
3361 if (!(*slurp_relocs) (abfd, opd, static_syms, FALSE))
3362 {
3363 count = -1;
3364 goto done;
3365 }
3366
699733f6 3367 size = 0;
595da8c5 3368 for (i = secsymend, r = opd->relocation; i < opdsymend; ++i)
699733f6
AM
3369 {
3370 asymbol *sym;
90e3cdf2 3371
595da8c5 3372 while (r < opd->relocation + relcount
699733f6
AM
3373 && r->address < syms[i]->value + opd->vma)
3374 ++r;
90e3cdf2 3375
595da8c5 3376 if (r == opd->relocation + relcount)
699733f6 3377 break;
90e3cdf2 3378
699733f6
AM
3379 if (r->address != syms[i]->value + opd->vma)
3380 continue;
90e3cdf2 3381
699733f6
AM
3382 if (r->howto->type != R_PPC64_ADDR64)
3383 continue;
90e3cdf2 3384
699733f6
AM
3385 sym = *r->sym_ptr_ptr;
3386 if (!sym_exists_at (syms, opdsymend, symcount,
3387 sym->section->id, sym->value + r->addend))
3388 {
3389 ++count;
3390 size += sizeof (asymbol);
3391 size += strlen (syms[i]->name) + 2;
3392 }
3393 }
90e3cdf2 3394
c4b0b099
AM
3395 if (size == 0)
3396 goto done;
699733f6
AM
3397 s = *ret = bfd_malloc (size);
3398 if (s == NULL)
3399 {
7356fed5 3400 count = -1;
c9727e01 3401 goto done;
699733f6 3402 }
90e3cdf2 3403
699733f6 3404 names = (char *) (s + count);
90e3cdf2 3405
595da8c5 3406 for (i = secsymend, r = opd->relocation; i < opdsymend; ++i)
90e3cdf2 3407 {
699733f6 3408 asymbol *sym;
90e3cdf2 3409
595da8c5 3410 while (r < opd->relocation + relcount
699733f6
AM
3411 && r->address < syms[i]->value + opd->vma)
3412 ++r;
90e3cdf2 3413
595da8c5 3414 if (r == opd->relocation + relcount)
699733f6
AM
3415 break;
3416
3417 if (r->address != syms[i]->value + opd->vma)
3418 continue;
3419
3420 if (r->howto->type != R_PPC64_ADDR64)
3421 continue;
90e3cdf2 3422
699733f6
AM
3423 sym = *r->sym_ptr_ptr;
3424 if (!sym_exists_at (syms, opdsymend, symcount,
3425 sym->section->id, sym->value + r->addend))
3426 {
3427 size_t len;
3428
3429 *s = *syms[i];
6ba2a415 3430 s->flags |= BSF_SYNTHETIC;
699733f6
AM
3431 s->section = sym->section;
3432 s->value = sym->value + r->addend;
3433 s->name = names;
3434 *names++ = '.';
3435 len = strlen (syms[i]->name);
3436 memcpy (names, syms[i]->name, len + 1);
3437 names += len + 1;
6f610d07
UW
3438 /* Have udata.p point back to the original symbol this
3439 synthetic symbol was derived from. */
3440 s->udata.p = syms[i];
699733f6
AM
3441 s++;
3442 }
3443 }
3444 }
3445 else
90e3cdf2 3446 {
468392fb 3447 bfd_boolean (*slurp_relocs) (bfd *, asection *, asymbol **, bfd_boolean);
ee67d69a 3448 bfd_byte *contents = NULL;
699733f6 3449 size_t size;
468392fb
AM
3450 long plt_count = 0;
3451 bfd_vma glink_vma = 0, resolv_vma = 0;
3452 asection *dynamic, *glink = NULL, *relplt = NULL;
3453 arelent *p;
90e3cdf2 3454
ee67d69a 3455 if (opd != NULL && !bfd_malloc_and_get_section (abfd, opd, &contents))
699733f6 3456 {
c4b0b099
AM
3457 free_contents_and_exit_err:
3458 count = -1;
ee67d69a 3459 free_contents_and_exit:
699733f6 3460 if (contents)
ee67d69a 3461 free (contents);
c9727e01 3462 goto done;
699733f6 3463 }
90e3cdf2 3464
699733f6
AM
3465 size = 0;
3466 for (i = secsymend; i < opdsymend; ++i)
3467 {
3468 bfd_vma ent;
90e3cdf2 3469
5ef11c02
AM
3470 /* Ignore bogus symbols. */
3471 if (syms[i]->value > opd->size - 8)
3472 continue;
3473
699733f6
AM
3474 ent = bfd_get_64 (abfd, contents + syms[i]->value);
3475 if (!sym_exists_at (syms, opdsymend, symcount, -1, ent))
3476 {
3477 ++count;
3478 size += sizeof (asymbol);
3479 size += strlen (syms[i]->name) + 2;
3480 }
3481 }
90e3cdf2 3482
468392fb 3483 /* Get start of .glink stubs from DT_PPC64_GLINK. */
066ee829
AM
3484 if (dyn_count != 0
3485 && (dynamic = bfd_get_section_by_name (abfd, ".dynamic")) != NULL)
468392fb
AM
3486 {
3487 bfd_byte *dynbuf, *extdyn, *extdynend;
3488 size_t extdynsize;
3489 void (*swap_dyn_in) (bfd *, const void *, Elf_Internal_Dyn *);
3490
3491 if (!bfd_malloc_and_get_section (abfd, dynamic, &dynbuf))
c4b0b099 3492 goto free_contents_and_exit_err;
468392fb
AM
3493
3494 extdynsize = get_elf_backend_data (abfd)->s->sizeof_dyn;
3495 swap_dyn_in = get_elf_backend_data (abfd)->s->swap_dyn_in;
3496
3497 extdyn = dynbuf;
3498 extdynend = extdyn + dynamic->size;
3499 for (; extdyn < extdynend; extdyn += extdynsize)
3500 {
3501 Elf_Internal_Dyn dyn;
3502 (*swap_dyn_in) (abfd, extdyn, &dyn);
3503
3504 if (dyn.d_tag == DT_NULL)
3505 break;
3506
3507 if (dyn.d_tag == DT_PPC64_GLINK)
3508 {
b9e5796b
AM
3509 /* The first glink stub starts at offset 32; see
3510 comment in ppc64_elf_finish_dynamic_sections. */
3511 glink_vma = dyn.d_un.d_val + GLINK_CALL_STUB_SIZE - 8 * 4;
468392fb
AM
3512 /* The .glink section usually does not survive the final
3513 link; search for the section (usually .text) where the
3514 glink stubs now reside. */
3515 glink = bfd_sections_find_if (abfd, section_covers_vma,
3516 &glink_vma);
3517 break;
3518 }
3519 }
3520
3521 free (dynbuf);
3522 }
3523
3524 if (glink != NULL)
3525 {
3526 /* Determine __glink trampoline by reading the relative branch
3527 from the first glink stub. */
3528 bfd_byte buf[4];
b9e5796b
AM
3529 unsigned int off = 0;
3530
3531 while (bfd_get_section_contents (abfd, glink, buf,
3532 glink_vma + off - glink->vma, 4))
468392fb
AM
3533 {
3534 unsigned int insn = bfd_get_32 (abfd, buf);
3535 insn ^= B_DOT;
3536 if ((insn & ~0x3fffffc) == 0)
b9e5796b
AM
3537 {
3538 resolv_vma = glink_vma + off + (insn ^ 0x2000000) - 0x2000000;
3539 break;
3540 }
3541 off += 4;
3542 if (off > 4)
3543 break;
468392fb
AM
3544 }
3545
3546 if (resolv_vma)
3547 size += sizeof (asymbol) + sizeof ("__glink_PLTresolve");
468392fb 3548
066ee829
AM
3549 relplt = bfd_get_section_by_name (abfd, ".rela.plt");
3550 if (relplt != NULL)
3551 {
3552 slurp_relocs = get_elf_backend_data (abfd)->s->slurp_reloc_table;
3553 if (! (*slurp_relocs) (abfd, relplt, dyn_syms, TRUE))
c4b0b099 3554 goto free_contents_and_exit_err;
68ffbac6 3555
066ee829
AM
3556 plt_count = relplt->size / sizeof (Elf64_External_Rela);
3557 size += plt_count * sizeof (asymbol);
468392fb 3558
066ee829
AM
3559 p = relplt->relocation;
3560 for (i = 0; i < plt_count; i++, p++)
e054468f
AM
3561 {
3562 size += strlen ((*p->sym_ptr_ptr)->name) + sizeof ("@plt");
3563 if (p->addend != 0)
3564 size += sizeof ("+0x") - 1 + 16;
3565 }
066ee829 3566 }
468392fb
AM
3567 }
3568
c4b0b099
AM
3569 if (size == 0)
3570 goto free_contents_and_exit;
699733f6
AM
3571 s = *ret = bfd_malloc (size);
3572 if (s == NULL)
c4b0b099 3573 goto free_contents_and_exit_err;
90e3cdf2 3574
468392fb 3575 names = (char *) (s + count + plt_count + (resolv_vma != 0));
90e3cdf2 3576
699733f6 3577 for (i = secsymend; i < opdsymend; ++i)
90e3cdf2 3578 {
699733f6 3579 bfd_vma ent;
90e3cdf2 3580
5ef11c02
AM
3581 if (syms[i]->value > opd->size - 8)
3582 continue;
3583
699733f6
AM
3584 ent = bfd_get_64 (abfd, contents + syms[i]->value);
3585 if (!sym_exists_at (syms, opdsymend, symcount, -1, ent))
90e3cdf2 3586 {
c9727e01 3587 long lo, hi;
699733f6 3588 size_t len;
c9727e01 3589 asection *sec = abfd->sections;
90e3cdf2 3590
699733f6
AM
3591 *s = *syms[i];
3592 lo = codesecsym;
3593 hi = codesecsymend;
3594 while (lo < hi)
3595 {
c9727e01 3596 long mid = (lo + hi) >> 1;
699733f6
AM
3597 if (syms[mid]->section->vma < ent)
3598 lo = mid + 1;
3599 else if (syms[mid]->section->vma > ent)
3600 hi = mid;
3601 else
c9727e01
AM
3602 {
3603 sec = syms[mid]->section;
3604 break;
3605 }
699733f6
AM
3606 }
3607
c9727e01 3608 if (lo >= hi && lo > codesecsym)
699733f6 3609 sec = syms[lo - 1]->section;
699733f6
AM
3610
3611 for (; sec != NULL; sec = sec->next)
3612 {
3613 if (sec->vma > ent)
3614 break;
63524580
JK
3615 /* SEC_LOAD may not be set if SEC is from a separate debug
3616 info file. */
3617 if ((sec->flags & SEC_ALLOC) == 0)
699733f6
AM
3618 break;
3619 if ((sec->flags & SEC_CODE) != 0)
3620 s->section = sec;
3621 }
6ba2a415 3622 s->flags |= BSF_SYNTHETIC;
699733f6
AM
3623 s->value = ent - s->section->vma;
3624 s->name = names;
3625 *names++ = '.';
3626 len = strlen (syms[i]->name);
3627 memcpy (names, syms[i]->name, len + 1);
3628 names += len + 1;
6f610d07
UW
3629 /* Have udata.p point back to the original symbol this
3630 synthetic symbol was derived from. */
3631 s->udata.p = syms[i];
699733f6 3632 s++;
90e3cdf2 3633 }
90e3cdf2 3634 }
699733f6 3635 free (contents);
468392fb
AM
3636
3637 if (glink != NULL && relplt != NULL)
3638 {
3639 if (resolv_vma)
3640 {
3641 /* Add a symbol for the main glink trampoline. */
86a4952b 3642 memset (s, 0, sizeof *s);
468392fb 3643 s->the_bfd = abfd;
6ba2a415 3644 s->flags = BSF_GLOBAL | BSF_SYNTHETIC;
468392fb
AM
3645 s->section = glink;
3646 s->value = resolv_vma - glink->vma;
3647 s->name = names;
3648 memcpy (names, "__glink_PLTresolve", sizeof ("__glink_PLTresolve"));
3649 names += sizeof ("__glink_PLTresolve");
3650 s++;
3651 count++;
3652 }
3653
3654 /* FIXME: It would be very much nicer to put sym@plt on the
3655 stub rather than on the glink branch table entry. The
3656 objdump disassembler would then use a sensible symbol
3657 name on plt calls. The difficulty in doing so is
3658 a) finding the stubs, and,
3659 b) matching stubs against plt entries, and,
3660 c) there can be multiple stubs for a given plt entry.
3661
3662 Solving (a) could be done by code scanning, but older
3663 ppc64 binaries used different stubs to current code.
3664 (b) is the tricky one since you need to known the toc
3665 pointer for at least one function that uses a pic stub to
3666 be able to calculate the plt address referenced.
3667 (c) means gdb would need to set multiple breakpoints (or
3668 find the glink branch itself) when setting breakpoints
3669 for pending shared library loads. */
3670 p = relplt->relocation;
3671 for (i = 0; i < plt_count; i++, p++)
3672 {
3673 size_t len;
3674
3675 *s = **p->sym_ptr_ptr;
3676 /* Undefined syms won't have BSF_LOCAL or BSF_GLOBAL set. Since
3677 we are defining a symbol, ensure one of them is set. */
3678 if ((s->flags & BSF_LOCAL) == 0)
3679 s->flags |= BSF_GLOBAL;
6ba2a415 3680 s->flags |= BSF_SYNTHETIC;
468392fb
AM
3681 s->section = glink;
3682 s->value = glink_vma - glink->vma;
3683 s->name = names;
3684 s->udata.p = NULL;
3685 len = strlen ((*p->sym_ptr_ptr)->name);
3686 memcpy (names, (*p->sym_ptr_ptr)->name, len);
3687 names += len;
e054468f
AM
3688 if (p->addend != 0)
3689 {
3690 memcpy (names, "+0x", sizeof ("+0x") - 1);
3691 names += sizeof ("+0x") - 1;
3692 bfd_sprintf_vma (abfd, names, p->addend);
3693 names += strlen (names);
3694 }
468392fb
AM
3695 memcpy (names, "@plt", sizeof ("@plt"));
3696 names += sizeof ("@plt");
3697 s++;
b9e5796b
AM
3698 if (abi < 2)
3699 {
3700 glink_vma += 8;
3701 if (i >= 0x8000)
3702 glink_vma += 4;
3703 }
3704 else
468392fb
AM
3705 glink_vma += 4;
3706 }
3707 count += plt_count;
3708 }
90e3cdf2
JJ
3709 }
3710
c9727e01 3711 done:
a7535cf3 3712 free (syms);
90e3cdf2
JJ
3713 return count;
3714}
5bd4f169 3715\f
65f38f15
AM
3716/* The following functions are specific to the ELF linker, while
3717 functions above are used generally. Those named ppc64_elf_* are
3718 called by the main ELF linker code. They appear in this file more
3719 or less in the order in which they are called. eg.
3720 ppc64_elf_check_relocs is called early in the link process,
3721 ppc64_elf_finish_dynamic_sections is one of the last functions
e86ce104
AM
3722 called.
3723
3724 PowerPC64-ELF uses a similar scheme to PowerPC64-XCOFF in that
3725 functions have both a function code symbol and a function descriptor
3726 symbol. A call to foo in a relocatable object file looks like:
3727
3728 . .text
3729 . x:
3730 . bl .foo
3731 . nop
3732
3733 The function definition in another object file might be:
3734
3735 . .section .opd
3736 . foo: .quad .foo
3737 . .quad .TOC.@tocbase
3738 . .quad 0
3739 .
3740 . .text
3741 . .foo: blr
3742
3743 When the linker resolves the call during a static link, the branch
3744 unsurprisingly just goes to .foo and the .opd information is unused.
3745 If the function definition is in a shared library, things are a little
3746 different: The call goes via a plt call stub, the opd information gets
3747 copied to the plt, and the linker patches the nop.
3748
3749 . x:
3750 . bl .foo_stub
3751 . ld 2,40(1)
3752 .
3753 .
3754 . .foo_stub:
71a39c98
AM
3755 . std 2,40(1) # in practice, the call stub
3756 . addis 11,2,Lfoo@toc@ha # is slightly optimized, but
3757 . addi 11,11,Lfoo@toc@l # this is the general idea
3758 . ld 12,0(11)
3759 . ld 2,8(11)
3760 . mtctr 12
3761 . ld 11,16(11)
e86ce104
AM
3762 . bctr
3763 .
3764 . .section .plt
3765 . Lfoo: reloc (R_PPC64_JMP_SLOT, foo)
3766
3767 The "reloc ()" notation is supposed to indicate that the linker emits
3768 an R_PPC64_JMP_SLOT reloc against foo. The dynamic linker does the opd
3769 copying.
3770
3771 What are the difficulties here? Well, firstly, the relocations
3772 examined by the linker in check_relocs are against the function code
3773 sym .foo, while the dynamic relocation in the plt is emitted against
3774 the function descriptor symbol, foo. Somewhere along the line, we need
3775 to carefully copy dynamic link information from one symbol to the other.
3776 Secondly, the generic part of the elf linker will make .foo a dynamic
3777 symbol as is normal for most other backends. We need foo dynamic
3778 instead, at least for an application final link. However, when
3779 creating a shared library containing foo, we need to have both symbols
3780 dynamic so that references to .foo are satisfied during the early
3781 stages of linking. Otherwise the linker might decide to pull in a
8387904d
AM
3782 definition from some other object, eg. a static library.
3783
3784 Update: As of August 2004, we support a new convention. Function
3785 calls may use the function descriptor symbol, ie. "bl foo". This
3786 behaves exactly as "bl .foo". */
65f38f15 3787
1d483afe 3788/* Of those relocs that might be copied as dynamic relocs, this function
58ac9f71
AM
3789 selects those that must be copied when linking a shared library,
3790 even when the symbol is local. */
65f38f15 3791
1d483afe
AM
3792static int
3793must_be_dyn_reloc (struct bfd_link_info *info,
3794 enum elf_ppc64_reloc_type r_type)
3795{
3796 switch (r_type)
3797 {
3798 default:
3799 return 1;
3800
3801 case R_PPC64_REL32:
3802 case R_PPC64_REL64:
3803 case R_PPC64_REL30:
3804 return 0;
3805
3806 case R_PPC64_TPREL16:
3807 case R_PPC64_TPREL16_LO:
3808 case R_PPC64_TPREL16_HI:
3809 case R_PPC64_TPREL16_HA:
3810 case R_PPC64_TPREL16_DS:
3811 case R_PPC64_TPREL16_LO_DS:
f9c6b907
AM
3812 case R_PPC64_TPREL16_HIGH:
3813 case R_PPC64_TPREL16_HIGHA:
1d483afe
AM
3814 case R_PPC64_TPREL16_HIGHER:
3815 case R_PPC64_TPREL16_HIGHERA:
3816 case R_PPC64_TPREL16_HIGHEST:
3817 case R_PPC64_TPREL16_HIGHESTA:
3818 case R_PPC64_TPREL64:
0e1862bb 3819 return !bfd_link_executable (info);
1d483afe
AM
3820 }
3821}
65f38f15 3822
21d68fcd
AM
3823/* Whether an undefined weak symbol should resolve to its link-time
3824 value, even in PIC or PIE objects. */
3825#define UNDEFWEAK_NO_DYNAMIC_RELOC(INFO, H) \
3826 ((H)->root.type == bfd_link_hash_undefweak \
3827 && (ELF_ST_VISIBILITY ((H)->other) != STV_DEFAULT \
3828 || (INFO)->dynamic_undefined_weak == 0))
3829
f4656909
AM
3830/* If ELIMINATE_COPY_RELOCS is non-zero, the linker will try to avoid
3831 copying dynamic variables from a shared lib into an app's dynbss
3832 section, and instead use a dynamic relocation to point into the
5d35169e
AM
3833 shared lib. With code that gcc generates, it's vital that this be
3834 enabled; In the PowerPC64 ABI, the address of a function is actually
3835 the address of a function descriptor, which resides in the .opd
3836 section. gcc uses the descriptor directly rather than going via the
3837 GOT as some other ABI's do, which means that initialized function
3838 pointers must reference the descriptor. Thus, a function pointer
3839 initialized to the address of a function in a shared library will
3840 either require a copy reloc, or a dynamic reloc. Using a copy reloc
4cc11e76 3841 redefines the function descriptor symbol to point to the copy. This
5d35169e
AM
3842 presents a problem as a plt entry for that function is also
3843 initialized from the function descriptor symbol and the copy reloc
3844 may not be initialized first. */
a23b6845 3845#define ELIMINATE_COPY_RELOCS 1
f4656909 3846
721956f4 3847/* Section name for stubs is the associated section name plus this
29942be8
NC
3848 string. */
3849#define STUB_SUFFIX ".stub"
721956f4
AM
3850
3851/* Linker stubs.
3852 ppc_stub_long_branch:
3853 Used when a 14 bit branch (or even a 24 bit branch) can't reach its
3854 destination, but a 24 bit branch in a stub section will reach.
3855 . b dest
3856
3857 ppc_stub_plt_branch:
3858 Similar to the above, but a 24 bit branch in the stub section won't
3859 reach its destination.
71a39c98
AM
3860 . addis %r11,%r2,xxx@toc@ha
3861 . ld %r12,xxx@toc@l(%r11)
3862 . mtctr %r12
721956f4
AM
3863 . bctr
3864
3865 ppc_stub_plt_call:
2c66dc6c
AM
3866 Used to call a function in a shared library. If it so happens that
3867 the plt entry referenced crosses a 64k boundary, then an extra
71a39c98 3868 "addi %r11,%r11,xxx@toc@l" will be inserted before the "mtctr".
721956f4 3869 . std %r2,40(%r1)
71a39c98
AM
3870 . addis %r11,%r2,xxx@toc@ha
3871 . ld %r12,xxx+0@toc@l(%r11)
3872 . mtctr %r12
3873 . ld %r2,xxx+8@toc@l(%r11)
3874 . ld %r11,xxx+16@toc@l(%r11)
721956f4 3875 . bctr
ad8e1ba5
AM
3876
3877 ppc_stub_long_branch and ppc_stub_plt_branch may also have additional
3878 code to adjust the value and save r2 to support multiple toc sections.
3879 A ppc_stub_long_branch with an r2 offset looks like:
3880 . std %r2,40(%r1)
3881 . addis %r2,%r2,off@ha
3882 . addi %r2,%r2,off@l
3883 . b dest
3884
3885 A ppc_stub_plt_branch with an r2 offset looks like:
3886 . std %r2,40(%r1)
71a39c98
AM
3887 . addis %r11,%r2,xxx@toc@ha
3888 . ld %r12,xxx@toc@l(%r11)
ad8e1ba5
AM
3889 . addis %r2,%r2,off@ha
3890 . addi %r2,%r2,off@l
71a39c98 3891 . mtctr %r12
ad8e1ba5 3892 . bctr
ac2df442
AM
3893
3894 In cases where the "addis" instruction would add zero, the "addis" is
3895 omitted and following instructions modified slightly in some cases.
721956f4
AM
3896*/
3897
3898enum ppc_stub_type {
3899 ppc_stub_none,
3900 ppc_stub_long_branch,
ad8e1ba5 3901 ppc_stub_long_branch_r2off,
721956f4 3902 ppc_stub_plt_branch,
ad8e1ba5 3903 ppc_stub_plt_branch_r2off,
794e51c0 3904 ppc_stub_plt_call,
7341d5e2 3905 ppc_stub_plt_call_r2save,
a4b6fadd
AM
3906 ppc_stub_global_entry,
3907 ppc_stub_save_res
721956f4
AM
3908};
3909
6f20ed8a
AM
3910/* Information on stub grouping. */
3911struct map_stub
3912{
3913 /* The stub section. */
3914 asection *stub_sec;
3915 /* This is the section to which stubs in the group will be attached. */
3916 asection *link_sec;
a4b6fadd
AM
3917 /* Next group. */
3918 struct map_stub *next;
3919 /* Whether to emit a copy of register save/restore functions in this
3920 group. */
3921 int needs_save_res;
6f20ed8a
AM
3922};
3923
721956f4
AM
3924struct ppc_stub_hash_entry {
3925
3926 /* Base hash table entry structure. */
3927 struct bfd_hash_entry root;
3928
ad8e1ba5
AM
3929 enum ppc_stub_type stub_type;
3930
6f20ed8a
AM
3931 /* Group information. */
3932 struct map_stub *group;
721956f4
AM
3933
3934 /* Offset within stub_sec of the beginning of this stub. */
3935 bfd_vma stub_offset;
3936
3937 /* Given the symbol's value and its section we can determine its final
3938 value when building the stubs (so the stub knows where to jump. */
3939 bfd_vma target_value;
3940 asection *target_section;
3941
721956f4
AM
3942 /* The symbol table entry, if any, that this was derived from. */
3943 struct ppc_link_hash_entry *h;
e054468f 3944 struct plt_entry *plt_ent;
721956f4 3945
6911b7dc
AM
3946 /* Symbol st_other. */
3947 unsigned char other;
721956f4
AM
3948};
3949
3950struct ppc_branch_hash_entry {
3951
3952 /* Base hash table entry structure. */
3953 struct bfd_hash_entry root;
3954
c456f082 3955 /* Offset within branch lookup table. */
721956f4
AM
3956 unsigned int offset;
3957
3958 /* Generation marker. */
3959 unsigned int iter;
3960};
65f38f15 3961
19e08130
AM
3962/* Used to track dynamic relocations for local symbols. */
3963struct ppc_dyn_relocs
3964{
3965 struct ppc_dyn_relocs *next;
3966
3967 /* The input section of the reloc. */
3968 asection *sec;
3969
3970 /* Total number of relocs copied for the input section. */
3971 unsigned int count : 31;
3972
3973 /* Whether this entry is for STT_GNU_IFUNC symbols. */
3974 unsigned int ifunc : 1;
3975};
3976
65f38f15
AM
3977struct ppc_link_hash_entry
3978{
3979 struct elf_link_hash_entry elf;
3980
b3fac117
AM
3981 union {
3982 /* A pointer to the most recently used stub hash entry against this
3983 symbol. */
3984 struct ppc_stub_hash_entry *stub_cache;
3985
3986 /* A pointer to the next symbol starting with a '.' */
3987 struct ppc_link_hash_entry *next_dot_sym;
3988 } u;
721956f4 3989
65f38f15 3990 /* Track dynamic relocs copied for this symbol. */
6061a67d 3991 struct elf_dyn_relocs *dyn_relocs;
e86ce104 3992
d311bc8b
AM
3993 /* Chain of aliases referring to a weakdef. */
3994 struct ppc_link_hash_entry *weakref;
3995
721956f4 3996 /* Link between function code and descriptor symbols. */
34814b9f 3997 struct ppc_link_hash_entry *oh;
721956f4 3998
e86ce104
AM
3999 /* Flag function code and descriptor symbols. */
4000 unsigned int is_func:1;
4001 unsigned int is_func_descriptor:1;
908b32fc 4002 unsigned int fake:1;
411e1bfb 4003
c5614fa4
AM
4004 /* Whether global opd/toc sym has been adjusted or not.
4005 After ppc64_elf_edit_opd/ppc64_elf_edit_toc has run, this flag
4006 should be set for all globals defined in any opd/toc section. */
754021d0
AM
4007 unsigned int adjust_done:1;
4008
a4b6fadd
AM
4009 /* Set if this is an out-of-line register save/restore function,
4010 with non-standard calling convention. */
4011 unsigned int save_res:1;
4012
411e1bfb 4013 /* Contexts in which symbol is used in the GOT (or TOC).
e7b938ca
AM
4014 TLS_GD .. TLS_EXPLICIT bits are or'd into the mask as the
4015 corresponding relocs are encountered during check_relocs.
4016 tls_optimize clears TLS_GD .. TLS_TPREL when optimizing to
4017 indicate the corresponding GOT entry type is not needed.
4018 tls_optimize may also set TLS_TPRELGD when a GD reloc turns into
4019 a TPREL one. We use a separate flag rather than setting TPREL
4020 just for convenience in distinguishing the two cases. */
4021#define TLS_GD 1 /* GD reloc. */
4022#define TLS_LD 2 /* LD reloc. */
4023#define TLS_TPREL 4 /* TPREL reloc, => IE. */
4024#define TLS_DTPREL 8 /* DTPREL reloc, => LD. */
4025#define TLS_TLS 16 /* Any TLS reloc. */
4026#define TLS_EXPLICIT 32 /* Marks TOC section TLS relocs. */
4027#define TLS_TPRELGD 64 /* TPREL reloc resulting from GD->IE. */
e054468f 4028#define PLT_IFUNC 128 /* STT_GNU_IFUNC. */
f961d9dd 4029 unsigned char tls_mask;
65f38f15
AM
4030};
4031
4032/* ppc64 ELF linker hash table. */
4033
4034struct ppc_link_hash_table
4035{
4036 struct elf_link_hash_table elf;
4037
721956f4
AM
4038 /* The stub hash table. */
4039 struct bfd_hash_table stub_hash_table;
4040
4041 /* Another hash table for plt_branch stubs. */
4042 struct bfd_hash_table branch_hash_table;
4043
3b421ab3
AM
4044 /* Hash table for function prologue tocsave. */
4045 htab_t tocsave_htab;
4046
e7d1c40c
AM
4047 /* Various options and other info passed from the linker. */
4048 struct ppc64_elf_params *params;
721956f4 4049
6f20ed8a
AM
4050 /* The size of sec_info below. */
4051 unsigned int sec_info_arr_size;
4052
4053 /* Per-section array of extra section info. Done this way rather
4054 than as part of ppc64_elf_section_data so we have the info for
4055 non-ppc64 sections. */
4056 struct
4057 {
4058 /* Along with elf_gp, specifies the TOC pointer used by this section. */
ad8e1ba5 4059 bfd_vma toc_off;
6f20ed8a
AM
4060
4061 union
4062 {
4063 /* The section group that this section belongs to. */
4064 struct map_stub *group;
4065 /* A temp section list pointer. */
4066 asection *list;
4067 } u;
4068 } *sec_info;
721956f4 4069
a4b6fadd
AM
4070 /* Linked list of groups. */
4071 struct map_stub *group;
4072
ad8e1ba5
AM
4073 /* Temp used when calculating TOC pointers. */
4074 bfd_vma toc_curr;
bf102f86
AM
4075 bfd *toc_bfd;
4076 asection *toc_first_sec;
ad8e1ba5 4077
b3fac117
AM
4078 /* Used when adding symbols. */
4079 struct ppc_link_hash_entry *dot_syms;
4080
33e44f2e 4081 /* Shortcuts to get to dynamic linker sections. */
4ce794b7 4082 asection *glink;
82bd7b59 4083 asection *sfpr;
4ce794b7
AM
4084 asection *brlt;
4085 asection *relbrlt;
58d180e8 4086 asection *glink_eh_frame;
ec338859 4087
8387904d
AM
4088 /* Shortcut to .__tls_get_addr and __tls_get_addr. */
4089 struct ppc_link_hash_entry *tls_get_addr;
4090 struct ppc_link_hash_entry *tls_get_addr_fd;
411e1bfb 4091
927be08e
AM
4092 /* The size of reliplt used by got entry relocs. */
4093 bfd_size_type got_reli_size;
4094
9b5ecbd0 4095 /* Statistics. */
7341d5e2 4096 unsigned long stub_count[ppc_stub_global_entry];
9b5ecbd0 4097
ee75fd95
AM
4098 /* Number of stubs against global syms. */
4099 unsigned long stub_globals;
4100
ee67d69a
AM
4101 /* Set if we're linking code with function descriptors. */
4102 unsigned int opd_abi:1;
4103
4c52953f 4104 /* Support for multiple toc sections. */
33c0ec9d 4105 unsigned int do_multi_toc:1;
4c52953f 4106 unsigned int multi_toc_needed:1;
927be08e 4107 unsigned int second_toc_pass:1;
67f0cbdb 4108 unsigned int do_toc_opt:1;
4c52953f 4109
5d1634d7 4110 /* Set on error. */
99877b66 4111 unsigned int stub_error:1;
721956f4 4112
8c5b4e52
AM
4113 /* Whether func_desc_adjust needs to be run over symbols. */
4114 unsigned int need_func_desc_adj:1;
721956f4 4115
82e66161
AM
4116 /* Whether there exist local gnu indirect function resolvers,
4117 referenced by dynamic relocations. */
4118 unsigned int local_ifunc_resolver:1;
4119 unsigned int maybe_local_ifunc_resolver:1;
4120
721956f4
AM
4121 /* Incremented every time we size stubs. */
4122 unsigned int stub_iteration;
5d1634d7 4123
87d72d41
AM
4124 /* Small local sym cache. */
4125 struct sym_cache sym_cache;
65f38f15
AM
4126};
4127
4c52953f
AM
4128/* Rename some of the generic section flags to better document how they
4129 are used here. */
b0dddeec
AM
4130
4131/* Nonzero if this section has TLS related relocations. */
4132#define has_tls_reloc sec_flg0
4133
4134/* Nonzero if this section has a call to __tls_get_addr. */
4135#define has_tls_get_addr_call sec_flg1
4136
4137/* Nonzero if this section has any toc or got relocs. */
4138#define has_toc_reloc sec_flg2
4139
4140/* Nonzero if this section has a call to another section that uses
4141 the toc or got. */
d77c8a4b 4142#define makes_toc_func_call sec_flg3
b0dddeec
AM
4143
4144/* Recursion protection when determining above flag. */
d77c8a4b 4145#define call_check_in_progress sec_flg4
70cc837d 4146#define call_check_done sec_flg5
4c52953f 4147
65f38f15
AM
4148/* Get the ppc64 ELF linker hash table from a link_info structure. */
4149
4150#define ppc_hash_table(p) \
4dfe6ac6
NC
4151 (elf_hash_table_id ((struct elf_link_hash_table *) ((p)->hash)) \
4152 == PPC64_ELF_DATA ? ((struct ppc_link_hash_table *) ((p)->hash)) : NULL)
65f38f15 4153
721956f4
AM
4154#define ppc_stub_hash_lookup(table, string, create, copy) \
4155 ((struct ppc_stub_hash_entry *) \
4156 bfd_hash_lookup ((table), (string), (create), (copy)))
4157
4158#define ppc_branch_hash_lookup(table, string, create, copy) \
4159 ((struct ppc_branch_hash_entry *) \
4160 bfd_hash_lookup ((table), (string), (create), (copy)))
4161
4162/* Create an entry in the stub hash table. */
4163
4164static struct bfd_hash_entry *
4ce794b7
AM
4165stub_hash_newfunc (struct bfd_hash_entry *entry,
4166 struct bfd_hash_table *table,
4167 const char *string)
721956f4
AM
4168{
4169 /* Allocate the structure if it has not already been allocated by a
4170 subclass. */
4171 if (entry == NULL)
4172 {
4173 entry = bfd_hash_allocate (table, sizeof (struct ppc_stub_hash_entry));
4174 if (entry == NULL)
4175 return entry;
4176 }
4177
4178 /* Call the allocation method of the superclass. */
4179 entry = bfd_hash_newfunc (entry, table, string);
4180 if (entry != NULL)
4181 {
4182 struct ppc_stub_hash_entry *eh;
4183
4184 /* Initialize the local fields. */
4185 eh = (struct ppc_stub_hash_entry *) entry;
ad8e1ba5 4186 eh->stub_type = ppc_stub_none;
6f20ed8a 4187 eh->group = NULL;
721956f4
AM
4188 eh->stub_offset = 0;
4189 eh->target_value = 0;
4190 eh->target_section = NULL;
721956f4 4191 eh->h = NULL;
6911b7dc 4192 eh->plt_ent = NULL;
6911b7dc 4193 eh->other = 0;
721956f4
AM
4194 }
4195
4196 return entry;
4197}
4198
4199/* Create an entry in the branch hash table. */
4200
4201static struct bfd_hash_entry *
4ce794b7
AM
4202branch_hash_newfunc (struct bfd_hash_entry *entry,
4203 struct bfd_hash_table *table,
4204 const char *string)
721956f4
AM
4205{
4206 /* Allocate the structure if it has not already been allocated by a
4207 subclass. */
4208 if (entry == NULL)
4209 {
4210 entry = bfd_hash_allocate (table, sizeof (struct ppc_branch_hash_entry));
4211 if (entry == NULL)
4212 return entry;
4213 }
4214
4215 /* Call the allocation method of the superclass. */
4216 entry = bfd_hash_newfunc (entry, table, string);
4217 if (entry != NULL)
4218 {
4219 struct ppc_branch_hash_entry *eh;
4220
4221 /* Initialize the local fields. */
4222 eh = (struct ppc_branch_hash_entry *) entry;
4223 eh->offset = 0;
4224 eh->iter = 0;
4225 }
4226
4227 return entry;
4228}
4229
65f38f15
AM
4230/* Create an entry in a ppc64 ELF linker hash table. */
4231
4232static struct bfd_hash_entry *
4ce794b7
AM
4233link_hash_newfunc (struct bfd_hash_entry *entry,
4234 struct bfd_hash_table *table,
4235 const char *string)
65f38f15
AM
4236{
4237 /* Allocate the structure if it has not already been allocated by a
4238 subclass. */
4239 if (entry == NULL)
4240 {
4241 entry = bfd_hash_allocate (table, sizeof (struct ppc_link_hash_entry));
4242 if (entry == NULL)
4243 return entry;
4244 }
4245
4246 /* Call the allocation method of the superclass. */
4247 entry = _bfd_elf_link_hash_newfunc (entry, table, string);
4248 if (entry != NULL)
4249 {
4250 struct ppc_link_hash_entry *eh = (struct ppc_link_hash_entry *) entry;
4251
b3fac117 4252 memset (&eh->u.stub_cache, 0,
908b32fc 4253 (sizeof (struct ppc_link_hash_entry)
b3fac117
AM
4254 - offsetof (struct ppc_link_hash_entry, u.stub_cache)));
4255
4256 /* When making function calls, old ABI code references function entry
4257 points (dot symbols), while new ABI code references the function
4258 descriptor symbol. We need to make any combination of reference and
4259 definition work together, without breaking archive linking.
4260
4261 For a defined function "foo" and an undefined call to "bar":
4262 An old object defines "foo" and ".foo", references ".bar" (possibly
4263 "bar" too).
4264 A new object defines "foo" and references "bar".
4265
4266 A new object thus has no problem with its undefined symbols being
4267 satisfied by definitions in an old object. On the other hand, the
4268 old object won't have ".bar" satisfied by a new object.
4269
4270 Keep a list of newly added dot-symbols. */
4271
4272 if (string[0] == '.')
4273 {
4274 struct ppc_link_hash_table *htab;
4275
4276 htab = (struct ppc_link_hash_table *) table;
4277 eh->u.next_dot_sym = htab->dot_syms;
4278 htab->dot_syms = eh;
4279 }
65f38f15
AM
4280 }
4281
4282 return entry;
4283}
4284
3b421ab3
AM
4285struct tocsave_entry {
4286 asection *sec;
4287 bfd_vma offset;
4288};
4289
4290static hashval_t
4291tocsave_htab_hash (const void *p)
4292{
4293 const struct tocsave_entry *e = (const struct tocsave_entry *) p;
4aef7643 4294 return ((bfd_vma) (intptr_t) e->sec ^ e->offset) >> 3;
3b421ab3
AM
4295}
4296
4297static int
4298tocsave_htab_eq (const void *p1, const void *p2)
4299{
4300 const struct tocsave_entry *e1 = (const struct tocsave_entry *) p1;
4301 const struct tocsave_entry *e2 = (const struct tocsave_entry *) p2;
4302 return e1->sec == e2->sec && e1->offset == e2->offset;
4303}
4304
68faa637
AM
4305/* Destroy a ppc64 ELF linker hash table. */
4306
4307static void
d495ab0d 4308ppc64_elf_link_hash_table_free (bfd *obfd)
68faa637 4309{
d495ab0d 4310 struct ppc_link_hash_table *htab;
68faa637 4311
d495ab0d 4312 htab = (struct ppc_link_hash_table *) obfd->link.hash;
68faa637
AM
4313 if (htab->tocsave_htab)
4314 htab_delete (htab->tocsave_htab);
d495ab0d
AM
4315 bfd_hash_table_free (&htab->branch_hash_table);
4316 bfd_hash_table_free (&htab->stub_hash_table);
4317 _bfd_elf_link_hash_table_free (obfd);
68faa637
AM
4318}
4319
65f38f15
AM
4320/* Create a ppc64 ELF linker hash table. */
4321
4322static struct bfd_link_hash_table *
4ce794b7 4323ppc64_elf_link_hash_table_create (bfd *abfd)
65f38f15
AM
4324{
4325 struct ppc_link_hash_table *htab;
4326 bfd_size_type amt = sizeof (struct ppc_link_hash_table);
4327
4ce794b7 4328 htab = bfd_zmalloc (amt);
65f38f15
AM
4329 if (htab == NULL)
4330 return NULL;
4331
66eb6687 4332 if (!_bfd_elf_link_hash_table_init (&htab->elf, abfd, link_hash_newfunc,
4dfe6ac6
NC
4333 sizeof (struct ppc_link_hash_entry),
4334 PPC64_ELF_DATA))
65f38f15 4335 {
e2d34d7d 4336 free (htab);
65f38f15
AM
4337 return NULL;
4338 }
4339
721956f4 4340 /* Init the stub hash table too. */
66eb6687
AM
4341 if (!bfd_hash_table_init (&htab->stub_hash_table, stub_hash_newfunc,
4342 sizeof (struct ppc_stub_hash_entry)))
2915c55b 4343 {
d495ab0d 4344 _bfd_elf_link_hash_table_free (abfd);
2915c55b
JK
4345 return NULL;
4346 }
721956f4
AM
4347
4348 /* And the branch hash table. */
66eb6687
AM
4349 if (!bfd_hash_table_init (&htab->branch_hash_table, branch_hash_newfunc,
4350 sizeof (struct ppc_branch_hash_entry)))
2915c55b
JK
4351 {
4352 bfd_hash_table_free (&htab->stub_hash_table);
d495ab0d 4353 _bfd_elf_link_hash_table_free (abfd);
2915c55b
JK
4354 return NULL;
4355 }
721956f4 4356
3b421ab3
AM
4357 htab->tocsave_htab = htab_try_create (1024,
4358 tocsave_htab_hash,
4359 tocsave_htab_eq,
4360 NULL);
4361 if (htab->tocsave_htab == NULL)
2915c55b 4362 {
d495ab0d 4363 ppc64_elf_link_hash_table_free (abfd);
2915c55b
JK
4364 return NULL;
4365 }
d495ab0d 4366 htab->elf.root.hash_table_free = ppc64_elf_link_hash_table_free;
3b421ab3 4367
3254fd24
AM
4368 /* Initializing two fields of the union is just cosmetic. We really
4369 only care about glist, but when compiled on a 32-bit host the
4370 bfd_vma fields are larger. Setting the bfd_vma to zero makes
4371 debugger inspection of these fields look nicer. */
a6aa5195
AM
4372 htab->elf.init_got_refcount.refcount = 0;
4373 htab->elf.init_got_refcount.glist = NULL;
4374 htab->elf.init_plt_refcount.refcount = 0;
4375 htab->elf.init_plt_refcount.glist = NULL;
4376 htab->elf.init_got_offset.offset = 0;
4377 htab->elf.init_got_offset.glist = NULL;
4378 htab->elf.init_plt_offset.offset = 0;
4379 htab->elf.init_plt_offset.glist = NULL;
3254fd24 4380
65f38f15
AM
4381 return &htab->elf.root;
4382}
4383
bfeb4a28
AM
4384/* Create sections for linker generated code. */
4385
4386static bfd_boolean
4387create_linkage_sections (bfd *dynobj, struct bfd_link_info *info)
4388{
4389 struct ppc_link_hash_table *htab;
4390 flagword flags;
4391
4392 htab = ppc_hash_table (info);
4393
bfeb4a28
AM
4394 flags = (SEC_ALLOC | SEC_LOAD | SEC_CODE | SEC_READONLY
4395 | SEC_HAS_CONTENTS | SEC_IN_MEMORY | SEC_LINKER_CREATED);
b32547cd
AM
4396 if (htab->params->save_restore_funcs)
4397 {
4398 /* Create .sfpr for code to save and restore fp regs. */
4399 htab->sfpr = bfd_make_section_anyway_with_flags (dynobj, ".sfpr",
4400 flags);
4401 if (htab->sfpr == NULL
4402 || ! bfd_set_section_alignment (dynobj, htab->sfpr, 2))
4403 return FALSE;
4404 }
4405
4406 if (bfd_link_relocatable (info))
4407 return TRUE;
bfeb4a28
AM
4408
4409 /* Create .glink for lazy dynamic linking support. */
4410 htab->glink = bfd_make_section_anyway_with_flags (dynobj, ".glink",
4411 flags);
4412 if (htab->glink == NULL
4413 || ! bfd_set_section_alignment (dynobj, htab->glink, 3))
4414 return FALSE;
4415
4416 if (!info->no_ld_generated_unwind_info)
4417 {
4418 flags = (SEC_ALLOC | SEC_LOAD | SEC_READONLY | SEC_HAS_CONTENTS
4419 | SEC_IN_MEMORY | SEC_LINKER_CREATED);
4420 htab->glink_eh_frame = bfd_make_section_anyway_with_flags (dynobj,
4421 ".eh_frame",
4422 flags);
4423 if (htab->glink_eh_frame == NULL
4424 || !bfd_set_section_alignment (dynobj, htab->glink_eh_frame, 2))
4425 return FALSE;
4426 }
4427
4428 flags = SEC_ALLOC | SEC_LINKER_CREATED;
33e44f2e
AM
4429 htab->elf.iplt = bfd_make_section_anyway_with_flags (dynobj, ".iplt", flags);
4430 if (htab->elf.iplt == NULL
4431 || ! bfd_set_section_alignment (dynobj, htab->elf.iplt, 3))
bfeb4a28
AM
4432 return FALSE;
4433
4434 flags = (SEC_ALLOC | SEC_LOAD | SEC_READONLY
4435 | SEC_HAS_CONTENTS | SEC_IN_MEMORY | SEC_LINKER_CREATED);
33e44f2e
AM
4436 htab->elf.irelplt
4437 = bfd_make_section_anyway_with_flags (dynobj, ".rela.iplt", flags);
4438 if (htab->elf.irelplt == NULL
4439 || ! bfd_set_section_alignment (dynobj, htab->elf.irelplt, 3))
bfeb4a28
AM
4440 return FALSE;
4441
4442 /* Create branch lookup table for plt_branch stubs. */
4443 flags = (SEC_ALLOC | SEC_LOAD
4444 | SEC_HAS_CONTENTS | SEC_IN_MEMORY | SEC_LINKER_CREATED);
4445 htab->brlt = bfd_make_section_anyway_with_flags (dynobj, ".branch_lt",
4446 flags);
4447 if (htab->brlt == NULL
4448 || ! bfd_set_section_alignment (dynobj, htab->brlt, 3))
4449 return FALSE;
4450
0e1862bb 4451 if (!bfd_link_pic (info))
bfeb4a28
AM
4452 return TRUE;
4453
4454 flags = (SEC_ALLOC | SEC_LOAD | SEC_READONLY
4455 | SEC_HAS_CONTENTS | SEC_IN_MEMORY | SEC_LINKER_CREATED);
4456 htab->relbrlt = bfd_make_section_anyway_with_flags (dynobj,
4457 ".rela.branch_lt",
4458 flags);
4459 if (htab->relbrlt == NULL
4460 || ! bfd_set_section_alignment (dynobj, htab->relbrlt, 3))
4461 return FALSE;
4462
4463 return TRUE;
4464}
4465
e717da7e
AM
4466/* Satisfy the ELF linker by filling in some fields in our fake bfd. */
4467
bfeb4a28 4468bfd_boolean
e7d1c40c
AM
4469ppc64_elf_init_stub_bfd (struct bfd_link_info *info,
4470 struct ppc64_elf_params *params)
e717da7e
AM
4471{
4472 struct ppc_link_hash_table *htab;
4473
e7d1c40c 4474 elf_elfheader (params->stub_bfd)->e_ident[EI_CLASS] = ELFCLASS64;
e717da7e
AM
4475
4476/* Always hook our dynamic sections into the first bfd, which is the
4477 linker created stub bfd. This ensures that the GOT header is at
4478 the start of the output TOC section. */
4479 htab = ppc_hash_table (info);
e7d1c40c
AM
4480 htab->elf.dynobj = params->stub_bfd;
4481 htab->params = params;
bfeb4a28 4482
bfeb4a28 4483 return create_linkage_sections (htab->elf.dynobj, info);
e717da7e
AM
4484}
4485
721956f4
AM
4486/* Build a name for an entry in the stub hash table. */
4487
4488static char *
4ce794b7
AM
4489ppc_stub_name (const asection *input_section,
4490 const asection *sym_sec,
4491 const struct ppc_link_hash_entry *h,
4492 const Elf_Internal_Rela *rel)
721956f4
AM
4493{
4494 char *stub_name;
bcaa2f82 4495 ssize_t len;
721956f4
AM
4496
4497 /* rel->r_addend is actually 64 bit, but who uses more than +/- 2^31
4498 offsets from a sym as a branch target? In fact, we could
4499 probably assume the addend is always zero. */
4500 BFD_ASSERT (((int) rel->r_addend & 0xffffffff) == rel->r_addend);
4501
4502 if (h)
4503 {
4504 len = 8 + 1 + strlen (h->elf.root.root.string) + 1 + 8 + 1;
4505 stub_name = bfd_malloc (len);
46de2a7c
AM
4506 if (stub_name == NULL)
4507 return stub_name;
4508
bcaa2f82
AM
4509 len = sprintf (stub_name, "%08x.%s+%x",
4510 input_section->id & 0xffffffff,
4511 h->elf.root.root.string,
4512 (int) rel->r_addend & 0xffffffff);
721956f4
AM
4513 }
4514 else
4515 {
ad8e1ba5 4516 len = 8 + 1 + 8 + 1 + 8 + 1 + 8 + 1;
721956f4 4517 stub_name = bfd_malloc (len);
46de2a7c
AM
4518 if (stub_name == NULL)
4519 return stub_name;
4520
bcaa2f82
AM
4521 len = sprintf (stub_name, "%08x.%x:%x+%x",
4522 input_section->id & 0xffffffff,
4523 sym_sec->id & 0xffffffff,
4524 (int) ELF64_R_SYM (rel->r_info) & 0xffffffff,
4525 (int) rel->r_addend & 0xffffffff);
721956f4 4526 }
bcaa2f82 4527 if (len > 2 && stub_name[len - 2] == '+' && stub_name[len - 1] == '0')
ee75fd95 4528 stub_name[len - 2] = 0;
721956f4
AM
4529 return stub_name;
4530}
4531
4532/* Look up an entry in the stub hash. Stub entries are cached because
4533 creating the stub name takes a bit of time. */
4534
4535static struct ppc_stub_hash_entry *
4ce794b7
AM
4536ppc_get_stub_entry (const asection *input_section,
4537 const asection *sym_sec,
039b3fef 4538 struct ppc_link_hash_entry *h,
4ce794b7
AM
4539 const Elf_Internal_Rela *rel,
4540 struct ppc_link_hash_table *htab)
721956f4
AM
4541{
4542 struct ppc_stub_hash_entry *stub_entry;
6f20ed8a 4543 struct map_stub *group;
721956f4
AM
4544
4545 /* If this input section is part of a group of sections sharing one
4546 stub section, then use the id of the first section in the group.
4547 Stub names need to include a section id, as there may well be
4548 more than one stub used to reach say, printf, and we need to
4549 distinguish between them. */
6f20ed8a 4550 group = htab->sec_info[input_section->id].u.group;
89d77b8a
AM
4551 if (group == NULL)
4552 return NULL;
721956f4 4553
b3fac117
AM
4554 if (h != NULL && h->u.stub_cache != NULL
4555 && h->u.stub_cache->h == h
6f20ed8a 4556 && h->u.stub_cache->group == group)
721956f4 4557 {
b3fac117 4558 stub_entry = h->u.stub_cache;
721956f4
AM
4559 }
4560 else
4561 {
4562 char *stub_name;
4563
6f20ed8a 4564 stub_name = ppc_stub_name (group->link_sec, sym_sec, h, rel);
721956f4
AM
4565 if (stub_name == NULL)
4566 return NULL;
4567
4568 stub_entry = ppc_stub_hash_lookup (&htab->stub_hash_table,
b34976b6 4569 stub_name, FALSE, FALSE);
721956f4 4570 if (h != NULL)
b3fac117 4571 h->u.stub_cache = stub_entry;
721956f4
AM
4572
4573 free (stub_name);
4574 }
4575
4576 return stub_entry;
4577}
4578
4579/* Add a new stub entry to the stub hash. Not all fields of the new
4580 stub entry are initialised. */
4581
4582static struct ppc_stub_hash_entry *
4ce794b7
AM
4583ppc_add_stub (const char *stub_name,
4584 asection *section,
25f53a85 4585 struct bfd_link_info *info)
721956f4 4586{
25f53a85 4587 struct ppc_link_hash_table *htab = ppc_hash_table (info);
6f20ed8a 4588 struct map_stub *group;
721956f4
AM
4589 asection *link_sec;
4590 asection *stub_sec;
4591 struct ppc_stub_hash_entry *stub_entry;
4592
6f20ed8a
AM
4593 group = htab->sec_info[section->id].u.group;
4594 link_sec = group->link_sec;
4595 stub_sec = group->stub_sec;
721956f4
AM
4596 if (stub_sec == NULL)
4597 {
6f20ed8a
AM
4598 size_t namelen;
4599 bfd_size_type len;
4600 char *s_name;
721956f4 4601
6f20ed8a
AM
4602 namelen = strlen (link_sec->name);
4603 len = namelen + sizeof (STUB_SUFFIX);
4604 s_name = bfd_alloc (htab->params->stub_bfd, len);
4605 if (s_name == NULL)
4606 return NULL;
721956f4 4607
6f20ed8a
AM
4608 memcpy (s_name, link_sec->name, namelen);
4609 memcpy (s_name + namelen, STUB_SUFFIX, sizeof (STUB_SUFFIX));
4610 stub_sec = (*htab->params->add_stub_section) (s_name, link_sec);
4611 if (stub_sec == NULL)
4612 return NULL;
4613 group->stub_sec = stub_sec;
721956f4
AM
4614 }
4615
4616 /* Enter this entry into the linker stub hash table. */
4617 stub_entry = ppc_stub_hash_lookup (&htab->stub_hash_table, stub_name,
b34976b6 4618 TRUE, FALSE);
721956f4
AM
4619 if (stub_entry == NULL)
4620 {
695344c0 4621 /* xgettext:c-format */
8de848d8 4622 info->callbacks->einfo (_("%P: %B: cannot create stub entry %s\n"),
25f53a85 4623 section->owner, stub_name);
721956f4
AM
4624 return NULL;
4625 }
4626
6f20ed8a 4627 stub_entry->group = group;
721956f4 4628 stub_entry->stub_offset = 0;
721956f4
AM
4629 return stub_entry;
4630}
4631
e717da7e
AM
4632/* Create .got and .rela.got sections in ABFD, and .got in dynobj if
4633 not already done. */
65f38f15 4634
b34976b6 4635static bfd_boolean
e717da7e 4636create_got_section (bfd *abfd, struct bfd_link_info *info)
65f38f15 4637{
e717da7e
AM
4638 asection *got, *relgot;
4639 flagword flags;
4640 struct ppc_link_hash_table *htab = ppc_hash_table (info);
65f38f15 4641
0c8d6e5c 4642 if (!is_ppc64_elf (abfd))
0ffa91dd 4643 return FALSE;
4dfe6ac6
NC
4644 if (htab == NULL)
4645 return FALSE;
0ffa91dd 4646
33e44f2e
AM
4647 if (!htab->elf.sgot
4648 && !_bfd_elf_create_got_section (htab->elf.dynobj, info))
4649 return FALSE;
e717da7e
AM
4650
4651 flags = (SEC_ALLOC | SEC_LOAD | SEC_HAS_CONTENTS | SEC_IN_MEMORY
4652 | SEC_LINKER_CREATED);
4653
c456f082 4654 got = bfd_make_section_anyway_with_flags (abfd, ".got", flags);
e717da7e 4655 if (!got
e717da7e
AM
4656 || !bfd_set_section_alignment (abfd, got, 3))
4657 return FALSE;
65f38f15 4658
c456f082
AM
4659 relgot = bfd_make_section_anyway_with_flags (abfd, ".rela.got",
4660 flags | SEC_READONLY);
e717da7e 4661 if (!relgot
e717da7e 4662 || ! bfd_set_section_alignment (abfd, relgot, 3))
b34976b6 4663 return FALSE;
e717da7e
AM
4664
4665 ppc64_elf_tdata (abfd)->got = got;
4666 ppc64_elf_tdata (abfd)->relgot = relgot;
b34976b6 4667 return TRUE;
65f38f15 4668}
5bd4f169 4669
b31867b6
AM
4670/* Follow indirect and warning symbol links. */
4671
4672static inline struct bfd_link_hash_entry *
4673follow_link (struct bfd_link_hash_entry *h)
4674{
4675 while (h->type == bfd_link_hash_indirect
4676 || h->type == bfd_link_hash_warning)
4677 h = h->u.i.link;
4678 return h;
4679}
4680
4681static inline struct elf_link_hash_entry *
4682elf_follow_link (struct elf_link_hash_entry *h)
4683{
4684 return (struct elf_link_hash_entry *) follow_link (&h->root);
4685}
4686
4687static inline struct ppc_link_hash_entry *
4688ppc_follow_link (struct ppc_link_hash_entry *h)
4689{
4690 return (struct ppc_link_hash_entry *) follow_link (&h->elf.root);
4691}
4692
40d16e0b
AM
4693/* Merge PLT info on FROM with that on TO. */
4694
4695static void
4696move_plt_plist (struct ppc_link_hash_entry *from,
4697 struct ppc_link_hash_entry *to)
4698{
4699 if (from->elf.plt.plist != NULL)
4700 {
4701 if (to->elf.plt.plist != NULL)
4702 {
4703 struct plt_entry **entp;
4704 struct plt_entry *ent;
4705
4706 for (entp = &from->elf.plt.plist; (ent = *entp) != NULL; )
4707 {
4708 struct plt_entry *dent;
4709
4710 for (dent = to->elf.plt.plist; dent != NULL; dent = dent->next)
4711 if (dent->addend == ent->addend)
4712 {
4713 dent->plt.refcount += ent->plt.refcount;
4714 *entp = ent->next;
4715 break;
4716 }
4717 if (dent == NULL)
4718 entp = &ent->next;
4719 }
4720 *entp = to->elf.plt.plist;
4721 }
4722
4723 to->elf.plt.plist = from->elf.plt.plist;
4724 from->elf.plt.plist = NULL;
4725 }
4726}
4727
65f38f15
AM
4728/* Copy the extra info we tack onto an elf_link_hash_entry. */
4729
4730static void
fcfa13d2
AM
4731ppc64_elf_copy_indirect_symbol (struct bfd_link_info *info,
4732 struct elf_link_hash_entry *dir,
4733 struct elf_link_hash_entry *ind)
65f38f15
AM
4734{
4735 struct ppc_link_hash_entry *edir, *eind;
4736
4737 edir = (struct ppc_link_hash_entry *) dir;
4738 eind = (struct ppc_link_hash_entry *) ind;
4739
c79d6685
AM
4740 edir->is_func |= eind->is_func;
4741 edir->is_func_descriptor |= eind->is_func_descriptor;
4742 edir->tls_mask |= eind->tls_mask;
4743 if (eind->oh != NULL)
4744 edir->oh = ppc_follow_link (eind->oh);
4745
e81830c5
AM
4746 /* If called to transfer flags for a weakdef during processing
4747 of elf_adjust_dynamic_symbol, don't copy NON_GOT_REF.
4748 We clear it ourselves for ELIMINATE_COPY_RELOCS. */
4749 if (!(ELIMINATE_COPY_RELOCS
4750 && eind->elf.root.type != bfd_link_hash_indirect
4751 && edir->elf.dynamic_adjusted))
4752 edir->elf.non_got_ref |= eind->elf.non_got_ref;
4753
474436e6 4754 if (edir->elf.versioned != versioned_hidden)
e81830c5
AM
4755 edir->elf.ref_dynamic |= eind->elf.ref_dynamic;
4756 edir->elf.ref_regular |= eind->elf.ref_regular;
4757 edir->elf.ref_regular_nonweak |= eind->elf.ref_regular_nonweak;
4758 edir->elf.needs_plt |= eind->elf.needs_plt;
4759 edir->elf.pointer_equality_needed |= eind->elf.pointer_equality_needed;
c79d6685 4760
d311bc8b
AM
4761 /* If we were called to copy over info for a weak sym, don't copy
4762 dyn_relocs, plt/got info, or dynindx. We used to copy dyn_relocs
4763 in order to simplify readonly_dynrelocs and save a field in the
4764 symbol hash entry, but that means dyn_relocs can't be used in any
4765 tests about a specific symbol, or affect other symbol flags which
4766 are then tested.
4767 Chain weakdefs so we can get from the weakdef back to an alias.
4768 The list is circular so that we don't need to use u.weakdef as
4769 well as this list to look at all aliases. */
4770 if (eind->elf.root.type != bfd_link_hash_indirect)
4771 {
4772 struct ppc_link_hash_entry *cur, *add, *next;
4773
4774 add = eind;
4775 do
4776 {
4777 cur = edir->weakref;
4778 if (cur != NULL)
4779 {
4780 do
4781 {
4782 /* We can be called twice for the same symbols.
4783 Don't make multiple loops. */
4784 if (cur == add)
4785 return;
4786 cur = cur->weakref;
4787 } while (cur != edir);
4788 }
4789 next = add->weakref;
4790 if (cur != add)
4791 {
4792 add->weakref = edir->weakref != NULL ? edir->weakref : edir;
4793 edir->weakref = add;
4794 }
4795 add = next;
4796 } while (add != NULL && add != eind);
4797 return;
4798 }
4799
411e1bfb 4800 /* Copy over any dynamic relocs we may have on the indirect sym. */
bbd7ec4a 4801 if (eind->dyn_relocs != NULL)
65f38f15 4802 {
bbd7ec4a
AM
4803 if (edir->dyn_relocs != NULL)
4804 {
6061a67d
AM
4805 struct elf_dyn_relocs **pp;
4806 struct elf_dyn_relocs *p;
bbd7ec4a 4807
fcfa13d2 4808 /* Add reloc counts against the indirect sym to the direct sym
bbd7ec4a
AM
4809 list. Merge any entries against the same section. */
4810 for (pp = &eind->dyn_relocs; (p = *pp) != NULL; )
4811 {
6061a67d 4812 struct elf_dyn_relocs *q;
bbd7ec4a
AM
4813
4814 for (q = edir->dyn_relocs; q != NULL; q = q->next)
4815 if (q->sec == p->sec)
4816 {
4817 q->pc_count += p->pc_count;
4818 q->count += p->count;
4819 *pp = p->next;
4820 break;
4821 }
4822 if (q == NULL)
4823 pp = &p->next;
4824 }
4825 *pp = edir->dyn_relocs;
4826 }
4827
65f38f15
AM
4828 edir->dyn_relocs = eind->dyn_relocs;
4829 eind->dyn_relocs = NULL;
4830 }
65f38f15 4831
81848ca0
AM
4832 /* Copy over got entries that we may have already seen to the
4833 symbol which just became indirect. */
411e1bfb
AM
4834 if (eind->elf.got.glist != NULL)
4835 {
4836 if (edir->elf.got.glist != NULL)
4837 {
4838 struct got_entry **entp;
4839 struct got_entry *ent;
4840
4841 for (entp = &eind->elf.got.glist; (ent = *entp) != NULL; )
4842 {
4843 struct got_entry *dent;
4844
4845 for (dent = edir->elf.got.glist; dent != NULL; dent = dent->next)
4846 if (dent->addend == ent->addend
e717da7e 4847 && dent->owner == ent->owner
411e1bfb
AM
4848 && dent->tls_type == ent->tls_type)
4849 {
4850 dent->got.refcount += ent->got.refcount;
4851 *entp = ent->next;
4852 break;
4853 }
4854 if (dent == NULL)
4855 entp = &ent->next;
4856 }
4857 *entp = edir->elf.got.glist;
4858 }
4859
4860 edir->elf.got.glist = eind->elf.got.glist;
4861 eind->elf.got.glist = NULL;
4862 }
4863
4864 /* And plt entries. */
40d16e0b 4865 move_plt_plist (eind, edir);
411e1bfb 4866
fcfa13d2 4867 if (eind->elf.dynindx != -1)
411e1bfb 4868 {
fcfa13d2
AM
4869 if (edir->elf.dynindx != -1)
4870 _bfd_elf_strtab_delref (elf_hash_table (info)->dynstr,
4871 edir->elf.dynstr_index);
411e1bfb
AM
4872 edir->elf.dynindx = eind->elf.dynindx;
4873 edir->elf.dynstr_index = eind->elf.dynstr_index;
4874 eind->elf.dynindx = -1;
4875 eind->elf.dynstr_index = 0;
4876 }
411e1bfb
AM
4877}
4878
8387904d
AM
4879/* Find the function descriptor hash entry from the given function code
4880 hash entry FH. Link the entries via their OH fields. */
4881
4882static struct ppc_link_hash_entry *
b31867b6 4883lookup_fdh (struct ppc_link_hash_entry *fh, struct ppc_link_hash_table *htab)
8387904d
AM
4884{
4885 struct ppc_link_hash_entry *fdh = fh->oh;
4886
4887 if (fdh == NULL)
4888 {
4889 const char *fd_name = fh->elf.root.root.string + 1;
4890
4891 fdh = (struct ppc_link_hash_entry *)
4892 elf_link_hash_lookup (&htab->elf, fd_name, FALSE, FALSE, FALSE);
b31867b6
AM
4893 if (fdh == NULL)
4894 return fdh;
4895
4896 fdh->is_func_descriptor = 1;
4897 fdh->oh = fh;
4898 fh->is_func = 1;
4899 fh->oh = fdh;
8387904d
AM
4900 }
4901
8c5b4e52
AM
4902 fdh = ppc_follow_link (fdh);
4903 fdh->is_func_descriptor = 1;
4904 fdh->oh = fh;
4905 return fdh;
8387904d
AM
4906}
4907
8c5b4e52 4908/* Make a fake function descriptor sym for the undefined code sym FH. */
bb700d78
AM
4909
4910static struct ppc_link_hash_entry *
4911make_fdh (struct bfd_link_info *info,
908b32fc 4912 struct ppc_link_hash_entry *fh)
bb700d78 4913{
8c5b4e52
AM
4914 bfd *abfd = fh->elf.root.u.undef.abfd;
4915 struct bfd_link_hash_entry *bh = NULL;
bb700d78 4916 struct ppc_link_hash_entry *fdh;
8c5b4e52
AM
4917 flagword flags = (fh->elf.root.type == bfd_link_hash_undefweak
4918 ? BSF_WEAK
4919 : BSF_GLOBAL);
4920
4921 if (!_bfd_generic_link_add_one_symbol (info, abfd,
4922 fh->elf.root.root.string + 1,
4923 flags, bfd_und_section_ptr, 0,
4924 NULL, FALSE, FALSE, &bh))
bb700d78
AM
4925 return NULL;
4926
4927 fdh = (struct ppc_link_hash_entry *) bh;
4928 fdh->elf.non_elf = 0;
908b32fc
AM
4929 fdh->fake = 1;
4930 fdh->is_func_descriptor = 1;
4931 fdh->oh = fh;
4932 fh->is_func = 1;
4933 fh->oh = fdh;
bb700d78
AM
4934 return fdh;
4935}
4936
8387904d
AM
4937/* Fix function descriptor symbols defined in .opd sections to be
4938 function type. */
555cd476
AM
4939
4940static bfd_boolean
c16153ae 4941ppc64_elf_add_symbol_hook (bfd *ibfd,
e054468f 4942 struct bfd_link_info *info,
555cd476 4943 Elf_Internal_Sym *isym,
6911b7dc 4944 const char **name,
555cd476
AM
4945 flagword *flags ATTRIBUTE_UNUSED,
4946 asection **sec,
b53dfeb2 4947 bfd_vma *value)
555cd476 4948{
a43942db 4949 if (ELF_ST_TYPE (isym->st_info) == STT_GNU_IFUNC
f1885d1e
AM
4950 && (ibfd->flags & DYNAMIC) == 0
4951 && bfd_get_flavour (info->output_bfd) == bfd_target_elf_flavour)
a43942db 4952 elf_tdata (info->output_bfd)->has_gnu_symbols |= elf_gnu_symbol_ifunc;
f64b2e8d 4953
b53dfeb2 4954 if (*sec != NULL
f1885d1e 4955 && strcmp ((*sec)->name, ".opd") == 0)
b53dfeb2
AM
4956 {
4957 asection *code_sec;
4958
4959 if (!(ELF_ST_TYPE (isym->st_info) == STT_GNU_IFUNC
4960 || ELF_ST_TYPE (isym->st_info) == STT_FUNC))
4961 isym->st_info = ELF_ST_INFO (ELF_ST_BIND (isym->st_info), STT_FUNC);
4962
4963 /* If the symbol is a function defined in .opd, and the function
4964 code is in a discarded group, let it appear to be undefined. */
0e1862bb 4965 if (!bfd_link_relocatable (info)
b53dfeb2
AM
4966 && (*sec)->reloc_count != 0
4967 && opd_entry_value (*sec, *value, &code_sec, NULL,
4968 FALSE) != (bfd_vma) -1
4969 && discarded_section (code_sec))
4970 {
4971 *sec = bfd_und_section_ptr;
4972 isym->st_shndx = SHN_UNDEF;
4973 }
4974 }
dbd1e97e
AM
4975 else if (*sec != NULL
4976 && strcmp ((*sec)->name, ".toc") == 0
4977 && ELF_ST_TYPE (isym->st_info) == STT_OBJECT)
4978 {
4979 struct ppc_link_hash_table *htab = ppc_hash_table (info);
4980 if (htab != NULL)
4981 htab->params->object_in_toc = 1;
4982 }
433817dd 4983
6911b7dc
AM
4984 if ((STO_PPC64_LOCAL_MASK & isym->st_other) != 0)
4985 {
4986 if (abiversion (ibfd) == 0)
4987 set_abiversion (ibfd, 2);
4988 else if (abiversion (ibfd) == 1)
4989 {
4990 info->callbacks->einfo (_("%P: symbol '%s' has invalid st_other"
4991 " for ABI version 1\n"), name);
4992 bfd_set_error (bfd_error_bad_value);
4993 return FALSE;
4994 }
4995 }
4996
555cd476
AM
4997 return TRUE;
4998}
4999
6911b7dc
AM
5000/* Merge non-visibility st_other attributes: local entry point. */
5001
5002static void
5003ppc64_elf_merge_symbol_attribute (struct elf_link_hash_entry *h,
5004 const Elf_Internal_Sym *isym,
5005 bfd_boolean definition,
5006 bfd_boolean dynamic)
5007{
5008 if (definition && !dynamic)
5009 h->other = ((isym->st_other & ~ELF_ST_VISIBILITY (-1))
5010 | ELF_ST_VISIBILITY (h->other));
5011}
5012
8c5b4e52
AM
5013/* Hook called on merging a symbol. We use this to clear "fake" since
5014 we now have a real symbol. */
5015
5016static bfd_boolean
5017ppc64_elf_merge_symbol (struct elf_link_hash_entry *h,
5018 const Elf_Internal_Sym *isym ATTRIBUTE_UNUSED,
5019 asection **psec ATTRIBUTE_UNUSED,
5020 bfd_boolean newdef ATTRIBUTE_UNUSED,
5021 bfd_boolean olddef ATTRIBUTE_UNUSED,
5022 bfd *oldbfd ATTRIBUTE_UNUSED,
5023 const asection *oldsec ATTRIBUTE_UNUSED)
5024{
5025 ((struct ppc_link_hash_entry *) h)->fake = 0;
5026 return TRUE;
5027}
5028
8387904d 5029/* This function makes an old ABI object reference to ".bar" cause the
908b32fc
AM
5030 inclusion of a new ABI object archive that defines "bar".
5031 NAME is a symbol defined in an archive. Return a symbol in the hash
5032 table that might be satisfied by the archive symbols. */
8387904d
AM
5033
5034static struct elf_link_hash_entry *
5035ppc64_elf_archive_symbol_lookup (bfd *abfd,
5036 struct bfd_link_info *info,
5037 const char *name)
5038{
5039 struct elf_link_hash_entry *h;
5040 char *dot_name;
5041 size_t len;
5042
5043 h = _bfd_elf_archive_symbol_lookup (abfd, info, name);
908b32fc
AM
5044 if (h != NULL
5045 /* Don't return this sym if it is a fake function descriptor
5046 created by add_symbol_adjust. */
8c5b4e52 5047 && !((struct ppc_link_hash_entry *) h)->fake)
8387904d
AM
5048 return h;
5049
5050 if (name[0] == '.')
5051 return h;
5052
5053 len = strlen (name);
5054 dot_name = bfd_alloc (abfd, len + 2);
5055 if (dot_name == NULL)
5056 return (struct elf_link_hash_entry *) 0 - 1;
5057 dot_name[0] = '.';
5058 memcpy (dot_name + 1, name, len + 1);
5059 h = _bfd_elf_archive_symbol_lookup (abfd, info, dot_name);
5060 bfd_release (abfd, dot_name);
5061 return h;
5062}
5063
5064/* This function satisfies all old ABI object references to ".bar" if a
99877b66
AM
5065 new ABI object defines "bar". Well, at least, undefined dot symbols
5066 are made weak. This stops later archive searches from including an
5067 object if we already have a function descriptor definition. It also
35b0ce59
AM
5068 prevents the linker complaining about undefined symbols.
5069 We also check and correct mismatched symbol visibility here. The
5070 most restrictive visibility of the function descriptor and the
5071 function entry symbol is used. */
8387904d
AM
5072
5073static bfd_boolean
b3fac117 5074add_symbol_adjust (struct ppc_link_hash_entry *eh, struct bfd_link_info *info)
8387904d 5075{
8387904d
AM
5076 struct ppc_link_hash_table *htab;
5077 struct ppc_link_hash_entry *fdh;
5078
b3fac117
AM
5079 if (eh->elf.root.type == bfd_link_hash_warning)
5080 eh = (struct ppc_link_hash_entry *) eh->elf.root.u.i.link;
8387904d 5081
8400d40d
AM
5082 if (eh->elf.root.type == bfd_link_hash_indirect)
5083 return TRUE;
5084
b3fac117
AM
5085 if (eh->elf.root.root.string[0] != '.')
5086 abort ();
8387904d 5087
b3fac117 5088 htab = ppc_hash_table (info);
4dfe6ac6
NC
5089 if (htab == NULL)
5090 return FALSE;
5091
b31867b6 5092 fdh = lookup_fdh (eh, htab);
8c5b4e52
AM
5093 if (fdh == NULL
5094 && !bfd_link_relocatable (info)
5095 && (eh->elf.root.type == bfd_link_hash_undefined
5096 || eh->elf.root.type == bfd_link_hash_undefweak)
5097 && eh->elf.ref_regular)
5098 {
5099 /* Make an undefined function descriptor sym, in order to
5100 pull in an --as-needed shared lib. Archives are handled
5101 elsewhere. */
5102 fdh = make_fdh (info, eh);
5103 if (fdh == NULL)
5104 return FALSE;
bb700d78 5105 }
8c5b4e52
AM
5106
5107 if (fdh != NULL)
8387904d 5108 {
35b0ce59
AM
5109 unsigned entry_vis = ELF_ST_VISIBILITY (eh->elf.other) - 1;
5110 unsigned descr_vis = ELF_ST_VISIBILITY (fdh->elf.other) - 1;
8c5b4e52
AM
5111
5112 /* Make both descriptor and entry symbol have the most
5113 constraining visibility of either symbol. */
35b0ce59
AM
5114 if (entry_vis < descr_vis)
5115 fdh->elf.other += entry_vis - descr_vis;
5116 else if (entry_vis > descr_vis)
5117 eh->elf.other += descr_vis - entry_vis;
5118
8c5b4e52
AM
5119 /* Propagate reference flags from entry symbol to function
5120 descriptor symbol. */
5121 fdh->elf.root.non_ir_ref |= eh->elf.root.non_ir_ref;
4070765b 5122 fdh->elf.root.non_ir_ref_dynamic |= eh->elf.root.non_ir_ref_dynamic;
8c5b4e52
AM
5123 fdh->elf.ref_regular |= eh->elf.ref_regular;
5124 fdh->elf.ref_regular_nonweak |= eh->elf.ref_regular_nonweak;
5125
5126 if (!fdh->elf.forced_local
5127 && fdh->elf.dynindx == -1
5128 && fdh->elf.versioned != versioned_hidden
5129 && (bfd_link_dll (info)
5130 || fdh->elf.def_dynamic
5131 || fdh->elf.ref_dynamic)
5132 && (eh->elf.ref_regular
5133 || eh->elf.def_regular))
5134 {
5135 if (! bfd_elf_link_record_dynamic_symbol (info, &fdh->elf))
5136 return FALSE;
35b0ce59 5137 }
8387904d 5138 }
99877b66 5139
8387904d
AM
5140 return TRUE;
5141}
5142
f6c7c3e8
AM
5143/* Set up opd section info and abiversion for IBFD, and process list
5144 of dot-symbols we made in link_hash_newfunc. */
b3fac117 5145
8387904d 5146static bfd_boolean
f6c7c3e8 5147ppc64_elf_before_check_relocs (bfd *ibfd, struct bfd_link_info *info)
8387904d 5148{
99877b66 5149 struct ppc_link_hash_table *htab;
b3fac117 5150 struct ppc_link_hash_entry **p, *eh;
459609d6 5151 asection *opd = bfd_get_section_by_name (ibfd, ".opd");
433817dd 5152
459609d6 5153 if (opd != NULL && opd->size != 0)
b3fac117 5154 {
459609d6
AM
5155 if (abiversion (ibfd) == 0)
5156 set_abiversion (ibfd, 1);
8a2058b5 5157 else if (abiversion (ibfd) >= 2)
f6c7c3e8 5158 {
695344c0 5159 /* xgettext:c-format */
459609d6
AM
5160 info->callbacks->einfo (_("%P: %B .opd not allowed in ABI"
5161 " version %d\n"),
5162 ibfd, abiversion (ibfd));
5163 bfd_set_error (bfd_error_bad_value);
5164 return FALSE;
f6c7c3e8
AM
5165 }
5166
459609d6
AM
5167 if ((ibfd->flags & DYNAMIC) == 0
5168 && (opd->flags & SEC_RELOC) != 0
5169 && opd->reloc_count != 0
5170 && !bfd_is_abs_section (opd->output_section))
b3fac117 5171 {
459609d6
AM
5172 /* Garbage collection needs some extra help with .opd sections.
5173 We don't want to necessarily keep everything referenced by
5174 relocs in .opd, as that would keep all functions. Instead,
5175 if we reference an .opd symbol (a function descriptor), we
5176 want to keep the function code symbol's section. This is
5177 easy for global symbols, but for local syms we need to keep
5178 information about the associated function section. */
5179 bfd_size_type amt;
5180 asection **opd_sym_map;
5181
51aecdc5 5182 amt = OPD_NDX (opd->size) * sizeof (*opd_sym_map);
459609d6
AM
5183 opd_sym_map = bfd_zalloc (ibfd, amt);
5184 if (opd_sym_map == NULL)
b3fac117 5185 return FALSE;
459609d6
AM
5186 ppc64_elf_section_data (opd)->u.opd.func_sec = opd_sym_map;
5187 BFD_ASSERT (ppc64_elf_section_data (opd)->sec_type == sec_normal);
5188 ppc64_elf_section_data (opd)->sec_type = sec_opd;
b3fac117
AM
5189 }
5190 }
5191
459609d6
AM
5192 if (!is_ppc64_elf (info->output_bfd))
5193 return TRUE;
5194 htab = ppc_hash_table (info);
5195 if (htab == NULL)
5196 return FALSE;
5197
5198 /* For input files without an explicit abiversion in e_flags
5199 we should have flagged any with symbol st_other bits set
5200 as ELFv1 and above flagged those with .opd as ELFv2.
5201 Set the output abiversion if not yet set, and for any input
5202 still ambiguous, take its abiversion from the output.
5203 Differences in ABI are reported later. */
5204 if (abiversion (info->output_bfd) == 0)
5205 set_abiversion (info->output_bfd, abiversion (ibfd));
5206 else if (abiversion (ibfd) == 0)
5207 set_abiversion (ibfd, abiversion (info->output_bfd));
5208
5209 p = &htab->dot_syms;
5210 while ((eh = *p) != NULL)
5211 {
5212 *p = NULL;
5213 if (&eh->elf == htab->elf.hgot)
5214 ;
5215 else if (htab->elf.hgot == NULL
5216 && strcmp (eh->elf.root.root.string, ".TOC.") == 0)
5217 htab->elf.hgot = &eh->elf;
8c5b4e52
AM
5218 else if (abiversion (ibfd) <= 1)
5219 {
5220 htab->need_func_desc_adj = 1;
5221 if (!add_symbol_adjust (eh, info))
5222 return FALSE;
5223 }
459609d6
AM
5224 p = &eh->u.next_dot_sym;
5225 }
b3fac117 5226 return TRUE;
8387904d
AM
5227}
5228
97fed1c9
JJ
5229/* Undo hash table changes when an --as-needed input file is determined
5230 not to be needed. */
5231
5232static bfd_boolean
e5034e59
AM
5233ppc64_elf_notice_as_needed (bfd *ibfd,
5234 struct bfd_link_info *info,
5235 enum notice_asneeded_action act)
97fed1c9 5236{
e5034e59
AM
5237 if (act == notice_not_needed)
5238 {
5239 struct ppc_link_hash_table *htab = ppc_hash_table (info);
4dfe6ac6 5240
e5034e59
AM
5241 if (htab == NULL)
5242 return FALSE;
4dfe6ac6 5243
e5034e59
AM
5244 htab->dot_syms = NULL;
5245 }
5246 return _bfd_elf_notice_as_needed (ibfd, info, act);
97fed1c9
JJ
5247}
5248
aa374f67
AM
5249/* If --just-symbols against a final linked binary, then assume we need
5250 toc adjusting stubs when calling functions defined there. */
5251
5252static void
5253ppc64_elf_link_just_syms (asection *sec, struct bfd_link_info *info)
5254{
5255 if ((sec->flags & SEC_CODE) != 0
5256 && (sec->owner->flags & (EXEC_P | DYNAMIC)) != 0
5257 && is_ppc64_elf (sec->owner))
5258 {
2c3f079f
AM
5259 if (abiversion (sec->owner) >= 2
5260 || bfd_get_section_by_name (sec->owner, ".opd") != NULL)
aa374f67
AM
5261 sec->has_toc_reloc = 1;
5262 }
5263 _bfd_elf_link_just_syms (sec, info);
5264}
5265
e054468f 5266static struct plt_entry **
4ce794b7
AM
5267update_local_sym_info (bfd *abfd, Elf_Internal_Shdr *symtab_hdr,
5268 unsigned long r_symndx, bfd_vma r_addend, int tls_type)
411e1bfb
AM
5269{
5270 struct got_entry **local_got_ents = elf_local_got_ents (abfd);
e054468f 5271 struct plt_entry **local_plt;
f961d9dd 5272 unsigned char *local_got_tls_masks;
411e1bfb
AM
5273
5274 if (local_got_ents == NULL)
5275 {
5276 bfd_size_type size = symtab_hdr->sh_info;
5277
e054468f
AM
5278 size *= (sizeof (*local_got_ents)
5279 + sizeof (*local_plt)
5280 + sizeof (*local_got_tls_masks));
4ce794b7 5281 local_got_ents = bfd_zalloc (abfd, size);
411e1bfb 5282 if (local_got_ents == NULL)
e054468f 5283 return NULL;
411e1bfb
AM
5284 elf_local_got_ents (abfd) = local_got_ents;
5285 }
5286
e054468f 5287 if ((tls_type & (PLT_IFUNC | TLS_EXPLICIT)) == 0)
411e1bfb
AM
5288 {
5289 struct got_entry *ent;
5290
5291 for (ent = local_got_ents[r_symndx]; ent != NULL; ent = ent->next)
e717da7e
AM
5292 if (ent->addend == r_addend
5293 && ent->owner == abfd
5294 && ent->tls_type == tls_type)
411e1bfb
AM
5295 break;
5296 if (ent == NULL)
5297 {
5298 bfd_size_type amt = sizeof (*ent);
4ce794b7 5299 ent = bfd_alloc (abfd, amt);
411e1bfb
AM
5300 if (ent == NULL)
5301 return FALSE;
5302 ent->next = local_got_ents[r_symndx];
5303 ent->addend = r_addend;
e717da7e 5304 ent->owner = abfd;
411e1bfb 5305 ent->tls_type = tls_type;
927be08e 5306 ent->is_indirect = FALSE;
411e1bfb
AM
5307 ent->got.refcount = 0;
5308 local_got_ents[r_symndx] = ent;
5309 }
5310 ent->got.refcount += 1;
5311 }
5312
e054468f 5313 local_plt = (struct plt_entry **) (local_got_ents + symtab_hdr->sh_info);
f961d9dd 5314 local_got_tls_masks = (unsigned char *) (local_plt + symtab_hdr->sh_info);
e7b938ca 5315 local_got_tls_masks[r_symndx] |= tls_type;
e054468f
AM
5316
5317 return local_plt + r_symndx;
65f38f15
AM
5318}
5319
411e1bfb 5320static bfd_boolean
e054468f 5321update_plt_info (bfd *abfd, struct plt_entry **plist, bfd_vma addend)
1e2f5b6e 5322{
411e1bfb 5323 struct plt_entry *ent;
1e2f5b6e 5324
e054468f 5325 for (ent = *plist; ent != NULL; ent = ent->next)
411e1bfb
AM
5326 if (ent->addend == addend)
5327 break;
5328 if (ent == NULL)
1e2f5b6e 5329 {
411e1bfb 5330 bfd_size_type amt = sizeof (*ent);
4ce794b7 5331 ent = bfd_alloc (abfd, amt);
411e1bfb
AM
5332 if (ent == NULL)
5333 return FALSE;
e054468f 5334 ent->next = *plist;
411e1bfb
AM
5335 ent->addend = addend;
5336 ent->plt.refcount = 0;
e054468f 5337 *plist = ent;
1e2f5b6e 5338 }
411e1bfb 5339 ent->plt.refcount += 1;
b34976b6 5340 return TRUE;
1e2f5b6e
AM
5341}
5342
e054468f
AM
5343static bfd_boolean
5344is_branch_reloc (enum elf_ppc64_reloc_type r_type)
5345{
5346 return (r_type == R_PPC64_REL24
5347 || r_type == R_PPC64_REL14
5348 || r_type == R_PPC64_REL14_BRTAKEN
5349 || r_type == R_PPC64_REL14_BRNTAKEN
5350 || r_type == R_PPC64_ADDR24
5351 || r_type == R_PPC64_ADDR14
5352 || r_type == R_PPC64_ADDR14_BRTAKEN
5353 || r_type == R_PPC64_ADDR14_BRNTAKEN);
5354}
5355
5bd4f169 5356/* Look through the relocs for a section during the first phase, and
65f38f15 5357 calculate needed space in the global offset table, procedure
5d1634d7 5358 linkage table, and dynamic reloc sections. */
5bd4f169 5359
b34976b6 5360static bfd_boolean
4ce794b7
AM
5361ppc64_elf_check_relocs (bfd *abfd, struct bfd_link_info *info,
5362 asection *sec, const Elf_Internal_Rela *relocs)
5bd4f169 5363{
65f38f15 5364 struct ppc_link_hash_table *htab;
5bd4f169 5365 Elf_Internal_Shdr *symtab_hdr;
c7e2358a 5366 struct elf_link_hash_entry **sym_hashes;
5bd4f169
AM
5367 const Elf_Internal_Rela *rel;
5368 const Elf_Internal_Rela *rel_end;
5bd4f169 5369 asection *sreloc;
1e2f5b6e 5370 asection **opd_sym_map;
3a71aa26 5371 struct elf_link_hash_entry *tga, *dottga;
5bd4f169 5372
0e1862bb 5373 if (bfd_link_relocatable (info))
b34976b6 5374 return TRUE;
5bd4f169 5375
680a3378
AM
5376 /* Don't do anything special with non-loaded, non-alloced sections.
5377 In particular, any relocs in such sections should not affect GOT
5378 and PLT reference counting (ie. we don't allow them to create GOT
5379 or PLT entries), there's no possibility or desire to optimize TLS
5380 relocs, and there's not much point in propagating relocs to shared
5381 libs that the dynamic linker won't relocate. */
5382 if ((sec->flags & SEC_ALLOC) == 0)
5383 return TRUE;
5384
0c8d6e5c 5385 BFD_ASSERT (is_ppc64_elf (abfd));
0ffa91dd 5386
65f38f15 5387 htab = ppc_hash_table (info);
4dfe6ac6
NC
5388 if (htab == NULL)
5389 return FALSE;
5390
3a71aa26
AM
5391 tga = elf_link_hash_lookup (&htab->elf, "__tls_get_addr",
5392 FALSE, FALSE, TRUE);
5393 dottga = elf_link_hash_lookup (&htab->elf, ".__tls_get_addr",
5394 FALSE, FALSE, TRUE);
0ffa91dd 5395 symtab_hdr = &elf_symtab_hdr (abfd);
5bd4f169 5396 sym_hashes = elf_sym_hashes (abfd);
5bd4f169 5397 sreloc = NULL;
1e2f5b6e 5398 opd_sym_map = NULL;
f6c7c3e8
AM
5399 if (ppc64_elf_section_data (sec) != NULL
5400 && ppc64_elf_section_data (sec)->sec_type == sec_opd)
5401 opd_sym_map = ppc64_elf_section_data (sec)->u.opd.func_sec;
5bd4f169
AM
5402
5403 rel_end = relocs + sec->reloc_count;
5404 for (rel = relocs; rel < rel_end; rel++)
5405 {
5406 unsigned long r_symndx;
5407 struct elf_link_hash_entry *h;
04c9666a 5408 enum elf_ppc64_reloc_type r_type;
727fc41e 5409 int tls_type;
7c8fe5c4 5410 struct _ppc64_elf_section_data *ppc64_sec;
cbf95972 5411 struct plt_entry **ifunc, **plt_list;
5bd4f169
AM
5412
5413 r_symndx = ELF64_R_SYM (rel->r_info);
5414 if (r_symndx < symtab_hdr->sh_info)
5415 h = NULL;
5416 else
973a3492 5417 {
8c5b4e52
AM
5418 struct ppc_link_hash_entry *eh;
5419
973a3492 5420 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
b31867b6 5421 h = elf_follow_link (h);
8c5b4e52 5422 eh = (struct ppc_link_hash_entry *) h;
81fbe831
AM
5423
5424 /* PR15323, ref flags aren't set for references in the same
5425 object. */
5426 h->root.non_ir_ref = 1;
8c5b4e52
AM
5427 if (eh->is_func && eh->oh != NULL)
5428 eh->oh->elf.root.non_ir_ref = 1;
1c865ab2
AM
5429
5430 if (h == htab->elf.hgot)
5431 sec->has_toc_reloc = 1;
973a3492 5432 }
5bd4f169 5433
727fc41e 5434 tls_type = 0;
e054468f 5435 ifunc = NULL;
25f23106
AM
5436 if (h != NULL)
5437 {
5438 if (h->type == STT_GNU_IFUNC)
5439 {
5440 h->needs_plt = 1;
5441 ifunc = &h->plt.plist;
5442 }
5443 }
5444 else
5445 {
5446 Elf_Internal_Sym *isym = bfd_sym_from_r_symndx (&htab->sym_cache,
5447 abfd, r_symndx);
5448 if (isym == NULL)
5449 return FALSE;
5450
5451 if (ELF_ST_TYPE (isym->st_info) == STT_GNU_IFUNC)
5452 {
5453 ifunc = update_local_sym_info (abfd, symtab_hdr, r_symndx,
5454 rel->r_addend, PLT_IFUNC);
5455 if (ifunc == NULL)
5456 return FALSE;
5457 }
5458 }
727fc41e 5459
cbf95972 5460 r_type = ELF64_R_TYPE (rel->r_info);
a33d1f77 5461 switch (r_type)
5bd4f169 5462 {
727fc41e
AM
5463 case R_PPC64_TLSGD:
5464 case R_PPC64_TLSLD:
5465 /* These special tls relocs tie a call to __tls_get_addr with
5466 its parameter symbol. */
5467 break;
5468
411e1bfb
AM
5469 case R_PPC64_GOT_TLSLD16:
5470 case R_PPC64_GOT_TLSLD16_LO:
5471 case R_PPC64_GOT_TLSLD16_HI:
5472 case R_PPC64_GOT_TLSLD16_HA:
951fd09b 5473 tls_type = TLS_TLS | TLS_LD;
411e1bfb
AM
5474 goto dogottls;
5475
5476 case R_PPC64_GOT_TLSGD16:
5477 case R_PPC64_GOT_TLSGD16_LO:
5478 case R_PPC64_GOT_TLSGD16_HI:
5479 case R_PPC64_GOT_TLSGD16_HA:
951fd09b 5480 tls_type = TLS_TLS | TLS_GD;
411e1bfb
AM
5481 goto dogottls;
5482
5483 case R_PPC64_GOT_TPREL16_DS:
5484 case R_PPC64_GOT_TPREL16_LO_DS:
5485 case R_PPC64_GOT_TPREL16_HI:
5486 case R_PPC64_GOT_TPREL16_HA:
0e1862bb 5487 if (bfd_link_pic (info))
411e1bfb
AM
5488 info->flags |= DF_STATIC_TLS;
5489 tls_type = TLS_TLS | TLS_TPREL;
5490 goto dogottls;
5491
5492 case R_PPC64_GOT_DTPREL16_DS:
5493 case R_PPC64_GOT_DTPREL16_LO_DS:
5494 case R_PPC64_GOT_DTPREL16_HI:
5495 case R_PPC64_GOT_DTPREL16_HA:
5496 tls_type = TLS_TLS | TLS_DTPREL;
5497 dogottls:
5498 sec->has_tls_reloc = 1;
1a0670f3 5499 /* Fall through */
411e1bfb 5500
5bd4f169 5501 case R_PPC64_GOT16:
5bd4f169 5502 case R_PPC64_GOT16_DS:
65f38f15
AM
5503 case R_PPC64_GOT16_HA:
5504 case R_PPC64_GOT16_HI:
5505 case R_PPC64_GOT16_LO:
5bd4f169 5506 case R_PPC64_GOT16_LO_DS:
65f38f15 5507 /* This symbol requires a global offset table entry. */
4c52953f 5508 sec->has_toc_reloc = 1;
33c0ec9d
AM
5509 if (r_type == R_PPC64_GOT_TLSLD16
5510 || r_type == R_PPC64_GOT_TLSGD16
5511 || r_type == R_PPC64_GOT_TPREL16_DS
5512 || r_type == R_PPC64_GOT_DTPREL16_DS
5513 || r_type == R_PPC64_GOT16
5514 || r_type == R_PPC64_GOT16_DS)
5515 {
5516 htab->do_multi_toc = 1;
d77c8a4b 5517 ppc64_elf_tdata (abfd)->has_small_toc_reloc = 1;
33c0ec9d
AM
5518 }
5519
e717da7e
AM
5520 if (ppc64_elf_tdata (abfd)->got == NULL
5521 && !create_got_section (abfd, info))
b34976b6 5522 return FALSE;
5bd4f169
AM
5523
5524 if (h != NULL)
5525 {
411e1bfb
AM
5526 struct ppc_link_hash_entry *eh;
5527 struct got_entry *ent;
65f38f15 5528
411e1bfb
AM
5529 eh = (struct ppc_link_hash_entry *) h;
5530 for (ent = eh->elf.got.glist; ent != NULL; ent = ent->next)
5531 if (ent->addend == rel->r_addend
e717da7e 5532 && ent->owner == abfd
411e1bfb
AM
5533 && ent->tls_type == tls_type)
5534 break;
5535 if (ent == NULL)
5bd4f169 5536 {
411e1bfb 5537 bfd_size_type amt = sizeof (*ent);
4ce794b7 5538 ent = bfd_alloc (abfd, amt);
411e1bfb 5539 if (ent == NULL)
b34976b6 5540 return FALSE;
411e1bfb
AM
5541 ent->next = eh->elf.got.glist;
5542 ent->addend = rel->r_addend;
e717da7e 5543 ent->owner = abfd;
411e1bfb 5544 ent->tls_type = tls_type;
927be08e 5545 ent->is_indirect = FALSE;
411e1bfb
AM
5546 ent->got.refcount = 0;
5547 eh->elf.got.glist = ent;
5bd4f169 5548 }
411e1bfb 5549 ent->got.refcount += 1;
e7b938ca 5550 eh->tls_mask |= tls_type;
5bd4f169 5551 }
411e1bfb
AM
5552 else
5553 /* This is a global offset table entry for a local symbol. */
5554 if (!update_local_sym_info (abfd, symtab_hdr, r_symndx,
5555 rel->r_addend, tls_type))
5556 return FALSE;
a345bc8d
AM
5557
5558 /* We may also need a plt entry if the symbol turns out to be
5559 an ifunc. */
0e1862bb 5560 if (h != NULL && !bfd_link_pic (info) && abiversion (abfd) != 1)
a345bc8d
AM
5561 {
5562 if (!update_plt_info (abfd, &h->plt.plist, rel->r_addend))
5563 return FALSE;
5564 }
5bd4f169
AM
5565 break;
5566
5bd4f169 5567 case R_PPC64_PLT16_HA:
65f38f15
AM
5568 case R_PPC64_PLT16_HI:
5569 case R_PPC64_PLT16_LO:
5570 case R_PPC64_PLT32:
5571 case R_PPC64_PLT64:
cbf95972
AM
5572 /* This symbol requires a procedure linkage table entry. */
5573 plt_list = ifunc;
5574 if (h != NULL)
e054468f 5575 {
e054468f
AM
5576 h->needs_plt = 1;
5577 if (h->root.root.string[0] == '.'
5578 && h->root.root.string[1] != '\0')
5579 ((struct ppc_link_hash_entry *) h)->is_func = 1;
cbf95972
AM
5580 plt_list = &h->plt.plist;
5581 }
5582 if (plt_list == NULL)
5583 {
5584 /* It does not make sense to have a procedure linkage
5585 table entry for a non-ifunc local symbol. */
5586 info->callbacks->einfo
695344c0 5587 /* xgettext:c-format */
174d0a74 5588 (_("%H: %s reloc against local symbol\n"),
cbf95972
AM
5589 abfd, sec, rel->r_offset,
5590 ppc64_elf_howto_table[r_type]->name);
5591 bfd_set_error (bfd_error_bad_value);
5592 return FALSE;
e054468f 5593 }
cbf95972
AM
5594 if (!update_plt_info (abfd, plt_list, rel->r_addend))
5595 return FALSE;
5bd4f169
AM
5596 break;
5597
5598 /* The following relocations don't need to propagate the
5599 relocation if linking a shared object since they are
5600 section relative. */
5601 case R_PPC64_SECTOFF:
5602 case R_PPC64_SECTOFF_LO:
5603 case R_PPC64_SECTOFF_HI:
5604 case R_PPC64_SECTOFF_HA:
5605 case R_PPC64_SECTOFF_DS:
5606 case R_PPC64_SECTOFF_LO_DS:
411e1bfb
AM
5607 case R_PPC64_DTPREL16:
5608 case R_PPC64_DTPREL16_LO:
5609 case R_PPC64_DTPREL16_HI:
5610 case R_PPC64_DTPREL16_HA:
5611 case R_PPC64_DTPREL16_DS:
5612 case R_PPC64_DTPREL16_LO_DS:
f9c6b907
AM
5613 case R_PPC64_DTPREL16_HIGH:
5614 case R_PPC64_DTPREL16_HIGHA:
411e1bfb
AM
5615 case R_PPC64_DTPREL16_HIGHER:
5616 case R_PPC64_DTPREL16_HIGHERA:
5617 case R_PPC64_DTPREL16_HIGHEST:
5618 case R_PPC64_DTPREL16_HIGHESTA:
5bd4f169
AM
5619 break;
5620
ad8e1ba5 5621 /* Nor do these. */
25f23106
AM
5622 case R_PPC64_REL16:
5623 case R_PPC64_REL16_LO:
5624 case R_PPC64_REL16_HI:
5625 case R_PPC64_REL16_HA:
a680de9a 5626 case R_PPC64_REL16DX_HA:
25f23106
AM
5627 break;
5628
45965137
AM
5629 /* Not supported as a dynamic relocation. */
5630 case R_PPC64_ADDR64_LOCAL:
0e1862bb 5631 if (bfd_link_pic (info))
45965137
AM
5632 {
5633 if (!ppc64_elf_howto_table[R_PPC64_ADDR32])
5634 ppc_howto_init ();
695344c0 5635 /* xgettext:c-format */
174d0a74 5636 info->callbacks->einfo (_("%H: %s reloc unsupported "
45965137
AM
5637 "in shared libraries and PIEs.\n"),
5638 abfd, sec, rel->r_offset,
5639 ppc64_elf_howto_table[r_type]->name);
5640 bfd_set_error (bfd_error_bad_value);
5641 return FALSE;
5642 }
5643 break;
5644
ad8e1ba5 5645 case R_PPC64_TOC16:
33c0ec9d
AM
5646 case R_PPC64_TOC16_DS:
5647 htab->do_multi_toc = 1;
d77c8a4b 5648 ppc64_elf_tdata (abfd)->has_small_toc_reloc = 1;
1a0670f3 5649 /* Fall through. */
ad8e1ba5
AM
5650 case R_PPC64_TOC16_LO:
5651 case R_PPC64_TOC16_HI:
5652 case R_PPC64_TOC16_HA:
ad8e1ba5 5653 case R_PPC64_TOC16_LO_DS:
4c52953f 5654 sec->has_toc_reloc = 1;
ad8e1ba5
AM
5655 break;
5656
006589cf
AM
5657 /* Marker reloc. */
5658 case R_PPC64_ENTRY:
5659 break;
5660
5bd4f169
AM
5661 /* This relocation describes the C++ object vtable hierarchy.
5662 Reconstruct it for later use during GC. */
5663 case R_PPC64_GNU_VTINHERIT:
c152c796 5664 if (!bfd_elf_gc_record_vtinherit (abfd, sec, h, rel->r_offset))
b34976b6 5665 return FALSE;
5bd4f169
AM
5666 break;
5667
5668 /* This relocation describes which C++ vtable entries are actually
5669 used. Record for later use during GC. */
5670 case R_PPC64_GNU_VTENTRY:
d17e0c6e
JB
5671 BFD_ASSERT (h != NULL);
5672 if (h != NULL
5673 && !bfd_elf_gc_record_vtentry (abfd, sec, h, rel->r_addend))
b34976b6 5674 return FALSE;
5bd4f169
AM
5675 break;
5676
721956f4
AM
5677 case R_PPC64_REL14:
5678 case R_PPC64_REL14_BRTAKEN:
5679 case R_PPC64_REL14_BRNTAKEN:
220c76dd
AM
5680 {
5681 asection *dest = NULL;
5682
5683 /* Heuristic: If jumping outside our section, chances are
5684 we are going to need a stub. */
5685 if (h != NULL)
5686 {
5687 /* If the sym is weak it may be overridden later, so
5688 don't assume we know where a weak sym lives. */
5689 if (h->root.type == bfd_link_hash_defined)
5690 dest = h->root.u.def.section;
5691 }
5692 else
87d72d41
AM
5693 {
5694 Elf_Internal_Sym *isym;
5695
5696 isym = bfd_sym_from_r_symndx (&htab->sym_cache,
5697 abfd, r_symndx);
5698 if (isym == NULL)
5699 return FALSE;
5700
5701 dest = bfd_section_from_elf_index (abfd, isym->st_shndx);
5702 }
5703
220c76dd 5704 if (dest != sec)
7c8fe5c4 5705 ppc64_elf_section_data (sec)->has_14bit_branch = 1;
220c76dd 5706 }
721956f4
AM
5707 /* Fall through. */
5708
5d1634d7 5709 case R_PPC64_REL24:
cbf95972
AM
5710 plt_list = ifunc;
5711 if (h != NULL)
5d1634d7 5712 {
e054468f
AM
5713 h->needs_plt = 1;
5714 if (h->root.root.string[0] == '.'
5715 && h->root.root.string[1] != '\0')
5716 ((struct ppc_link_hash_entry *) h)->is_func = 1;
cbf95972 5717
3a71aa26 5718 if (h == tga || h == dottga)
cbf95972
AM
5719 {
5720 sec->has_tls_reloc = 1;
5721 if (rel != relocs
5722 && (ELF64_R_TYPE (rel[-1].r_info) == R_PPC64_TLSGD
5723 || ELF64_R_TYPE (rel[-1].r_info) == R_PPC64_TLSLD))
5724 /* We have a new-style __tls_get_addr call with
5725 a marker reloc. */
5726 ;
5727 else
5728 /* Mark this section as having an old-style call. */
5729 sec->has_tls_get_addr_call = 1;
5730 }
5731 plt_list = &h->plt.plist;
411e1bfb 5732 }
cbf95972
AM
5733
5734 /* We may need a .plt entry if the function this reloc
5735 refers to is in a shared lib. */
5736 if (plt_list
5737 && !update_plt_info (abfd, plt_list, rel->r_addend))
5738 return FALSE;
411e1bfb
AM
5739 break;
5740
cbf95972
AM
5741 case R_PPC64_ADDR14:
5742 case R_PPC64_ADDR14_BRNTAKEN:
5743 case R_PPC64_ADDR14_BRTAKEN:
5744 case R_PPC64_ADDR24:
5745 goto dodyn;
5746
411e1bfb
AM
5747 case R_PPC64_TPREL64:
5748 tls_type = TLS_EXPLICIT | TLS_TLS | TLS_TPREL;
0e1862bb 5749 if (bfd_link_pic (info))
411e1bfb
AM
5750 info->flags |= DF_STATIC_TLS;
5751 goto dotlstoc;
5752
5753 case R_PPC64_DTPMOD64:
5754 if (rel + 1 < rel_end
5755 && rel[1].r_info == ELF64_R_INFO (r_symndx, R_PPC64_DTPREL64)
5756 && rel[1].r_offset == rel->r_offset + 8)
951fd09b 5757 tls_type = TLS_EXPLICIT | TLS_TLS | TLS_GD;
411e1bfb 5758 else
951fd09b 5759 tls_type = TLS_EXPLICIT | TLS_TLS | TLS_LD;
411e1bfb
AM
5760 goto dotlstoc;
5761
5762 case R_PPC64_DTPREL64:
5763 tls_type = TLS_EXPLICIT | TLS_TLS | TLS_DTPREL;
5764 if (rel != relocs
5765 && rel[-1].r_info == ELF64_R_INFO (r_symndx, R_PPC64_DTPMOD64)
5766 && rel[-1].r_offset == rel->r_offset - 8)
5767 /* This is the second reloc of a dtpmod, dtprel pair.
5768 Don't mark with TLS_DTPREL. */
5769 goto dodyn;
5770
5771 dotlstoc:
5772 sec->has_tls_reloc = 1;
5773 if (h != NULL)
5774 {
5775 struct ppc_link_hash_entry *eh;
5776 eh = (struct ppc_link_hash_entry *) h;
e7b938ca 5777 eh->tls_mask |= tls_type;
411e1bfb
AM
5778 }
5779 else
5780 if (!update_local_sym_info (abfd, symtab_hdr, r_symndx,
5781 rel->r_addend, tls_type))
5782 return FALSE;
5783
7c8fe5c4
AM
5784 ppc64_sec = ppc64_elf_section_data (sec);
5785 if (ppc64_sec->sec_type != sec_toc)
411e1bfb 5786 {
3a71aa26
AM
5787 bfd_size_type amt;
5788
e7b938ca 5789 /* One extra to simplify get_tls_mask. */
3a71aa26
AM
5790 amt = sec->size * sizeof (unsigned) / 8 + sizeof (unsigned);
5791 ppc64_sec->u.toc.symndx = bfd_zalloc (abfd, amt);
5792 if (ppc64_sec->u.toc.symndx == NULL)
5793 return FALSE;
5794 amt = sec->size * sizeof (bfd_vma) / 8;
5795 ppc64_sec->u.toc.add = bfd_zalloc (abfd, amt);
5796 if (ppc64_sec->u.toc.add == NULL)
411e1bfb 5797 return FALSE;
7c8fe5c4
AM
5798 BFD_ASSERT (ppc64_sec->sec_type == sec_normal);
5799 ppc64_sec->sec_type = sec_toc;
411e1bfb
AM
5800 }
5801 BFD_ASSERT (rel->r_offset % 8 == 0);
3a71aa26
AM
5802 ppc64_sec->u.toc.symndx[rel->r_offset / 8] = r_symndx;
5803 ppc64_sec->u.toc.add[rel->r_offset / 8] = rel->r_addend;
951fd09b
AM
5804
5805 /* Mark the second slot of a GD or LD entry.
5806 -1 to indicate GD and -2 to indicate LD. */
5807 if (tls_type == (TLS_EXPLICIT | TLS_TLS | TLS_GD))
3a71aa26 5808 ppc64_sec->u.toc.symndx[rel->r_offset / 8 + 1] = -1;
951fd09b 5809 else if (tls_type == (TLS_EXPLICIT | TLS_TLS | TLS_LD))
3a71aa26 5810 ppc64_sec->u.toc.symndx[rel->r_offset / 8 + 1] = -2;
411e1bfb
AM
5811 goto dodyn;
5812
5813 case R_PPC64_TPREL16:
5814 case R_PPC64_TPREL16_LO:
5815 case R_PPC64_TPREL16_HI:
5816 case R_PPC64_TPREL16_HA:
5817 case R_PPC64_TPREL16_DS:
5818 case R_PPC64_TPREL16_LO_DS:
f9c6b907
AM
5819 case R_PPC64_TPREL16_HIGH:
5820 case R_PPC64_TPREL16_HIGHA:
411e1bfb
AM
5821 case R_PPC64_TPREL16_HIGHER:
5822 case R_PPC64_TPREL16_HIGHERA:
5823 case R_PPC64_TPREL16_HIGHEST:
5824 case R_PPC64_TPREL16_HIGHESTA:
0e1862bb 5825 if (bfd_link_pic (info))
411e1bfb 5826 {
afb93314 5827 info->flags |= DF_STATIC_TLS;
411e1bfb 5828 goto dodyn;
5d1634d7
AM
5829 }
5830 break;
5831
e86ce104 5832 case R_PPC64_ADDR64:
1e2f5b6e 5833 if (opd_sym_map != NULL
1e2f5b6e 5834 && rel + 1 < rel_end
4ce794b7 5835 && ELF64_R_TYPE ((rel + 1)->r_info) == R_PPC64_TOC)
1e2f5b6e 5836 {
8387904d 5837 if (h != NULL)
8c5b4e52 5838 ((struct ppc_link_hash_entry *) h)->is_func = 1;
8387904d
AM
5839 else
5840 {
5841 asection *s;
87d72d41 5842 Elf_Internal_Sym *isym;
1e2f5b6e 5843
87d72d41
AM
5844 isym = bfd_sym_from_r_symndx (&htab->sym_cache,
5845 abfd, r_symndx);
5846 if (isym == NULL)
8387904d 5847 return FALSE;
87d72d41
AM
5848
5849 s = bfd_section_from_elf_index (abfd, isym->st_shndx);
5850 if (s != NULL && s != sec)
51aecdc5 5851 opd_sym_map[OPD_NDX (rel->r_offset)] = s;
8387904d 5852 }
1e2f5b6e 5853 }
e86ce104
AM
5854 /* Fall through. */
5855
65f38f15
AM
5856 case R_PPC64_ADDR16:
5857 case R_PPC64_ADDR16_DS:
5858 case R_PPC64_ADDR16_HA:
5859 case R_PPC64_ADDR16_HI:
f9c6b907
AM
5860 case R_PPC64_ADDR16_HIGH:
5861 case R_PPC64_ADDR16_HIGHA:
65f38f15
AM
5862 case R_PPC64_ADDR16_HIGHER:
5863 case R_PPC64_ADDR16_HIGHERA:
5864 case R_PPC64_ADDR16_HIGHEST:
5865 case R_PPC64_ADDR16_HIGHESTA:
5866 case R_PPC64_ADDR16_LO:
5867 case R_PPC64_ADDR16_LO_DS:
0e1862bb 5868 if (h != NULL && !bfd_link_pic (info) && abiversion (abfd) != 1
a345bc8d
AM
5869 && rel->r_addend == 0)
5870 {
5871 /* We may need a .plt entry if this reloc refers to a
5872 function in a shared lib. */
5873 if (!update_plt_info (abfd, &h->plt.plist, rel->r_addend))
5874 return FALSE;
5875 h->pointer_equality_needed = 1;
5876 }
5877 /* Fall through. */
5878
5879 case R_PPC64_REL30:
5880 case R_PPC64_REL32:
5881 case R_PPC64_REL64:
65f38f15 5882 case R_PPC64_ADDR32:
65f38f15
AM
5883 case R_PPC64_UADDR16:
5884 case R_PPC64_UADDR32:
5885 case R_PPC64_UADDR64:
5bd4f169 5886 case R_PPC64_TOC:
0e1862bb 5887 if (h != NULL && !bfd_link_pic (info))
81848ca0 5888 /* We may need a copy reloc. */
f5385ebf 5889 h->non_got_ref = 1;
81848ca0 5890
41bd81ab 5891 /* Don't propagate .opd relocs. */
1e2f5b6e 5892 if (NO_OPD_RELOCS && opd_sym_map != NULL)
e86ce104 5893 break;
e86ce104 5894
65f38f15
AM
5895 /* If we are creating a shared library, and this is a reloc
5896 against a global symbol, or a non PC relative reloc
5897 against a local symbol, then we need to copy the reloc
5898 into the shared library. However, if we are linking with
5899 -Bsymbolic, we do not need to copy a reloc against a
5900 global symbol which is defined in an object we are
5901 including in the link (i.e., DEF_REGULAR is set). At
5902 this point we have not seen all the input files, so it is
5903 possible that DEF_REGULAR is not set now but will be set
5904 later (it is never cleared). In case of a weak definition,
5905 DEF_REGULAR may be cleared later by a strong definition in
5906 a shared library. We account for that possibility below by
f4656909 5907 storing information in the dyn_relocs field of the hash
65f38f15
AM
5908 table entry. A similar situation occurs when creating
5909 shared libraries and symbol visibility changes render the
5910 symbol local.
5911
5912 If on the other hand, we are creating an executable, we
5913 may need to keep relocations for symbols satisfied by a
5914 dynamic library if we manage to avoid copy relocs for the
5915 symbol. */
411e1bfb 5916 dodyn:
0e1862bb 5917 if ((bfd_link_pic (info)
1d483afe 5918 && (must_be_dyn_reloc (info, r_type)
65f38f15 5919 || (h != NULL
198f1157 5920 && (!SYMBOLIC_BIND (info, h)
65f38f15 5921 || h->root.type == bfd_link_hash_defweak
f5385ebf 5922 || !h->def_regular))))
f4656909 5923 || (ELIMINATE_COPY_RELOCS
0e1862bb 5924 && !bfd_link_pic (info)
65f38f15
AM
5925 && h != NULL
5926 && (h->root.type == bfd_link_hash_defweak
25f23106 5927 || !h->def_regular))
0e1862bb 5928 || (!bfd_link_pic (info)
25f23106 5929 && ifunc != NULL))
5bd4f169 5930 {
65f38f15
AM
5931 /* We must copy these reloc types into the output file.
5932 Create a reloc section in dynobj and make room for
5933 this reloc. */
5bd4f169
AM
5934 if (sreloc == NULL)
5935 {
83bac4b0
NC
5936 sreloc = _bfd_elf_make_dynamic_reloc_section
5937 (sec, htab->elf.dynobj, 3, abfd, /*rela?*/ TRUE);
65f38f15 5938
5bd4f169 5939 if (sreloc == NULL)
83bac4b0 5940 return FALSE;
5bd4f169
AM
5941 }
5942
65f38f15
AM
5943 /* If this is a global symbol, we count the number of
5944 relocations we need for this symbol. */
5945 if (h != NULL)
5946 {
19e08130
AM
5947 struct elf_dyn_relocs *p;
5948 struct elf_dyn_relocs **head;
5949
ec338859 5950 head = &((struct ppc_link_hash_entry *) h)->dyn_relocs;
19e08130
AM
5951 p = *head;
5952 if (p == NULL || p->sec != sec)
5953 {
5954 p = bfd_alloc (htab->elf.dynobj, sizeof *p);
5955 if (p == NULL)
5956 return FALSE;
5957 p->next = *head;
5958 *head = p;
5959 p->sec = sec;
5960 p->count = 0;
5961 p->pc_count = 0;
5962 }
5963 p->count += 1;
5964 if (!must_be_dyn_reloc (info, r_type))
5965 p->pc_count += 1;
65f38f15
AM
5966 }
5967 else
5968 {
ec338859
AM
5969 /* Track dynamic relocs needed for local syms too.
5970 We really need local syms available to do this
5971 easily. Oh well. */
19e08130
AM
5972 struct ppc_dyn_relocs *p;
5973 struct ppc_dyn_relocs **head;
5974 bfd_boolean is_ifunc;
ec338859 5975 asection *s;
6edfbbad 5976 void *vpp;
87d72d41 5977 Elf_Internal_Sym *isym;
6edfbbad 5978
87d72d41
AM
5979 isym = bfd_sym_from_r_symndx (&htab->sym_cache,
5980 abfd, r_symndx);
5981 if (isym == NULL)
b34976b6 5982 return FALSE;
ec338859 5983
87d72d41
AM
5984 s = bfd_section_from_elf_index (abfd, isym->st_shndx);
5985 if (s == NULL)
5986 s = sec;
5987
6edfbbad 5988 vpp = &elf_section_data (s)->local_dynrel;
19e08130
AM
5989 head = (struct ppc_dyn_relocs **) vpp;
5990 is_ifunc = ELF_ST_TYPE (isym->st_info) == STT_GNU_IFUNC;
5991 p = *head;
5992 if (p != NULL && p->sec == sec && p->ifunc != is_ifunc)
5993 p = p->next;
5994 if (p == NULL || p->sec != sec || p->ifunc != is_ifunc)
5995 {
5996 p = bfd_alloc (htab->elf.dynobj, sizeof *p);
5997 if (p == NULL)
5998 return FALSE;
5999 p->next = *head;
6000 *head = p;
6001 p->sec = sec;
6002 p->ifunc = is_ifunc;
6003 p->count = 0;
6004 }
6005 p->count += 1;
ec338859 6006 }
65f38f15 6007 }
5bd4f169 6008 break;
65f38f15
AM
6009
6010 default:
96e0dda4 6011 break;
5bd4f169
AM
6012 }
6013 }
6014
b34976b6 6015 return TRUE;
5bd4f169
AM
6016}
6017
ee67d69a
AM
6018/* Merge backend specific data from an object file to the output
6019 object file when linking. */
6020
6021static bfd_boolean
50e03d47 6022ppc64_elf_merge_private_bfd_data (bfd *ibfd, struct bfd_link_info *info)
ee67d69a 6023{
50e03d47 6024 bfd *obfd = info->output_bfd;
ee67d69a
AM
6025 unsigned long iflags, oflags;
6026
6027 if ((ibfd->flags & BFD_LINKER_CREATED) != 0)
6028 return TRUE;
6029
6030 if (!is_ppc64_elf (ibfd) || !is_ppc64_elf (obfd))
6031 return TRUE;
6032
50e03d47 6033 if (!_bfd_generic_verify_endian_match (ibfd, info))
ee67d69a
AM
6034 return FALSE;
6035
6036 iflags = elf_elfheader (ibfd)->e_flags;
6037 oflags = elf_elfheader (obfd)->e_flags;
6038
f6c7c3e8 6039 if (iflags & ~EF_PPC64_ABI)
ee67d69a 6040 {
4eca0228 6041 _bfd_error_handler
695344c0 6042 /* xgettext:c-format */
ee67d69a
AM
6043 (_("%B uses unknown e_flags 0x%lx"), ibfd, iflags);
6044 bfd_set_error (bfd_error_bad_value);
6045 return FALSE;
6046 }
f6c7c3e8 6047 else if (iflags != oflags && iflags != 0)
ee67d69a 6048 {
4eca0228 6049 _bfd_error_handler
695344c0 6050 /* xgettext:c-format */
ee67d69a
AM
6051 (_("%B: ABI version %ld is not compatible with ABI version %ld output"),
6052 ibfd, iflags, oflags);
6053 bfd_set_error (bfd_error_bad_value);
6054 return FALSE;
6055 }
6056
50e03d47 6057 _bfd_elf_ppc_merge_fp_attributes (ibfd, info);
005d79fd 6058
ee67d69a 6059 /* Merge Tag_compatibility attributes and any common GNU ones. */
50e03d47 6060 _bfd_elf_merge_object_attributes (ibfd, info);
ee67d69a
AM
6061
6062 return TRUE;
6063}
6064
6065static bfd_boolean
6066ppc64_elf_print_private_bfd_data (bfd *abfd, void *ptr)
6067{
6068 /* Print normal ELF private data. */
6069 _bfd_elf_print_private_bfd_data (abfd, ptr);
6070
6071 if (elf_elfheader (abfd)->e_flags != 0)
6072 {
6073 FILE *file = ptr;
6074
ee67d69a
AM
6075 fprintf (file, _("private flags = 0x%lx:"),
6076 elf_elfheader (abfd)->e_flags);
6077
6078 if ((elf_elfheader (abfd)->e_flags & EF_PPC64_ABI) != 0)
6079 fprintf (file, _(" [abiv%ld]"),
6080 elf_elfheader (abfd)->e_flags & EF_PPC64_ABI);
6081 fputc ('\n', file);
6082 }
6083
6084 return TRUE;
6085}
6086
8387904d 6087/* OFFSET in OPD_SEC specifies a function descriptor. Return the address
b53dfeb2
AM
6088 of the code entry point, and its section, which must be in the same
6089 object as OPD_SEC. Returns (bfd_vma) -1 on error. */
8387904d
AM
6090
6091static bfd_vma
6092opd_entry_value (asection *opd_sec,
6093 bfd_vma offset,
6094 asection **code_sec,
aef36ac1
AM
6095 bfd_vma *code_off,
6096 bfd_boolean in_code_sec)
8387904d
AM
6097{
6098 bfd *opd_bfd = opd_sec->owner;
8860955f 6099 Elf_Internal_Rela *relocs;
8387904d 6100 Elf_Internal_Rela *lo, *hi, *look;
645ea6a9 6101 bfd_vma val;
8387904d 6102
9f296da3
AM
6103 /* No relocs implies we are linking a --just-symbols object, or looking
6104 at a final linked executable with addr2line or somesuch. */
4b85d634
AM
6105 if (opd_sec->reloc_count == 0)
6106 {
729eabd5 6107 bfd_byte *contents = ppc64_elf_tdata (opd_bfd)->opd.contents;
3b36f7e6 6108
729eabd5
AM
6109 if (contents == NULL)
6110 {
6111 if (!bfd_malloc_and_get_section (opd_bfd, opd_sec, &contents))
6112 return (bfd_vma) -1;
6113 ppc64_elf_tdata (opd_bfd)->opd.contents = contents;
6114 }
ee1e4ede 6115
dbb3fbbb 6116 /* PR 17512: file: 64b9dfbb. */
451dfd38 6117 if (offset + 7 >= opd_sec->size || offset + 7 < offset)
dbb3fbbb
NC
6118 return (bfd_vma) -1;
6119
729eabd5 6120 val = bfd_get_64 (opd_bfd, contents + offset);
aef36ac1
AM
6121 if (code_sec != NULL)
6122 {
6123 asection *sec, *likely = NULL;
ee1e4ede 6124
aef36ac1 6125 if (in_code_sec)
4b85d634 6126 {
aef36ac1
AM
6127 sec = *code_sec;
6128 if (sec->vma <= val
6129 && val < sec->vma + sec->size)
6130 likely = sec;
6131 else
6132 val = -1;
6133 }
6134 else
6135 for (sec = opd_bfd->sections; sec != NULL; sec = sec->next)
6136 if (sec->vma <= val
6137 && (sec->flags & SEC_LOAD) != 0
6138 && (sec->flags & SEC_ALLOC) != 0)
6139 likely = sec;
6140 if (likely != NULL)
6141 {
6142 *code_sec = likely;
6143 if (code_off != NULL)
6144 *code_off = val - likely->vma;
4b85d634
AM
6145 }
6146 }
aef36ac1 6147 return val;
4b85d634
AM
6148 }
6149
0c8d6e5c 6150 BFD_ASSERT (is_ppc64_elf (opd_bfd));
0ffa91dd 6151
729eabd5 6152 relocs = ppc64_elf_tdata (opd_bfd)->opd.relocs;
8860955f
AM
6153 if (relocs == NULL)
6154 relocs = _bfd_elf_link_read_relocs (opd_bfd, opd_sec, NULL, NULL, TRUE);
877a8638
NC
6155 /* PR 17512: file: df8e1fd6. */
6156 if (relocs == NULL)
6157 return (bfd_vma) -1;
645ea6a9 6158
8387904d 6159 /* Go find the opd reloc at the sym address. */
8860955f 6160 lo = relocs;
8387904d 6161 hi = lo + opd_sec->reloc_count - 1; /* ignore last reloc */
645ea6a9 6162 val = (bfd_vma) -1;
8387904d
AM
6163 while (lo < hi)
6164 {
6165 look = lo + (hi - lo) / 2;
6166 if (look->r_offset < offset)
6167 lo = look + 1;
6168 else if (look->r_offset > offset)
6169 hi = look;
6170 else
6171 {
0ffa91dd
NC
6172 Elf_Internal_Shdr *symtab_hdr = &elf_symtab_hdr (opd_bfd);
6173
8387904d
AM
6174 if (ELF64_R_TYPE (look->r_info) == R_PPC64_ADDR64
6175 && ELF64_R_TYPE ((look + 1)->r_info) == R_PPC64_TOC)
6176 {
6177 unsigned long symndx = ELF64_R_SYM (look->r_info);
b53dfeb2 6178 asection *sec = NULL;
8387904d 6179
b53dfeb2
AM
6180 if (symndx >= symtab_hdr->sh_info
6181 && elf_sym_hashes (opd_bfd) != NULL)
8387904d
AM
6182 {
6183 struct elf_link_hash_entry **sym_hashes;
6184 struct elf_link_hash_entry *rh;
6185
6186 sym_hashes = elf_sym_hashes (opd_bfd);
6187 rh = sym_hashes[symndx - symtab_hdr->sh_info];
128205bb
AM
6188 if (rh != NULL)
6189 {
6190 rh = elf_follow_link (rh);
bb854a36
AM
6191 if (rh->root.type != bfd_link_hash_defined
6192 && rh->root.type != bfd_link_hash_defweak)
6193 break;
6194 if (rh->root.u.def.section->owner == opd_bfd)
b53dfeb2 6195 {
bb854a36
AM
6196 val = rh->root.u.def.value;
6197 sec = rh->root.u.def.section;
b53dfeb2
AM
6198 }
6199 }
6200 }
6201
6202 if (sec == NULL)
6203 {
6204 Elf_Internal_Sym *sym;
6205
6206 if (symndx < symtab_hdr->sh_info)
6207 {
6208 sym = (Elf_Internal_Sym *) symtab_hdr->contents;
6209 if (sym == NULL)
6210 {
6211 size_t symcnt = symtab_hdr->sh_info;
6212 sym = bfd_elf_get_elf_syms (opd_bfd, symtab_hdr,
6213 symcnt, 0,
6214 NULL, NULL, NULL);
6215 if (sym == NULL)
6216 break;
6217 symtab_hdr->contents = (bfd_byte *) sym;
6218 }
6219 sym += symndx;
128205bb
AM
6220 }
6221 else
6222 {
b53dfeb2
AM
6223 sym = bfd_elf_get_elf_syms (opd_bfd, symtab_hdr,
6224 1, symndx,
6225 NULL, NULL, NULL);
128205bb
AM
6226 if (sym == NULL)
6227 break;
128205bb 6228 }
b53dfeb2
AM
6229 sec = bfd_section_from_elf_index (opd_bfd, sym->st_shndx);
6230 if (sec == NULL)
6231 break;
6232 BFD_ASSERT ((sec->flags & SEC_MERGE) == 0);
6233 val = sym->st_value;
8387904d 6234 }
b53dfeb2 6235
8387904d
AM
6236 val += look->r_addend;
6237 if (code_off != NULL)
6238 *code_off = val;
6239 if (code_sec != NULL)
aef36ac1
AM
6240 {
6241 if (in_code_sec && *code_sec != sec)
6242 return -1;
6243 else
6244 *code_sec = sec;
6245 }
b53dfeb2 6246 if (sec->output_section != NULL)
8387904d 6247 val += sec->output_section->vma + sec->output_offset;
8387904d
AM
6248 }
6249 break;
6250 }
6251 }
645ea6a9 6252
645ea6a9 6253 return val;
8387904d
AM
6254}
6255
aef36ac1
AM
6256/* If the ELF symbol SYM might be a function in SEC, return the
6257 function size and set *CODE_OFF to the function's entry point,
6258 otherwise return zero. */
9f296da3 6259
aef36ac1
AM
6260static bfd_size_type
6261ppc64_elf_maybe_function_sym (const asymbol *sym, asection *sec,
6262 bfd_vma *code_off)
9f296da3 6263{
aef36ac1
AM
6264 bfd_size_type size;
6265
6266 if ((sym->flags & (BSF_SECTION_SYM | BSF_FILE | BSF_OBJECT
6267 | BSF_THREAD_LOCAL | BSF_RELC | BSF_SRELC)) != 0)
6268 return 0;
6269
6270 size = 0;
6271 if (!(sym->flags & BSF_SYNTHETIC))
6272 size = ((elf_symbol_type *) sym)->internal_elf_sym.st_size;
6273
6274 if (strcmp (sym->section->name, ".opd") == 0)
9f296da3 6275 {
b07bca4e
AM
6276 struct _opd_sec_data *opd = get_opd_info (sym->section);
6277 bfd_vma symval = sym->value;
6278
6279 if (opd != NULL
6280 && opd->adjust != NULL
6281 && elf_section_data (sym->section)->relocs != NULL)
6282 {
6283 /* opd_entry_value will use cached relocs that have been
6284 adjusted, but with raw symbols. That means both local
6285 and global symbols need adjusting. */
6286 long adjust = opd->adjust[OPD_NDX (symval)];
6287 if (adjust == -1)
6288 return 0;
6289 symval += adjust;
6290 }
6291
6292 if (opd_entry_value (sym->section, symval,
aef36ac1
AM
6293 &sec, code_off, TRUE) == (bfd_vma) -1)
6294 return 0;
6295 /* An old ABI binary with dot-syms has a size of 24 on the .opd
6296 symbol. This size has nothing to do with the code size of the
6297 function, which is what we're supposed to return, but the
6298 code size isn't available without looking up the dot-sym.
6299 However, doing that would be a waste of time particularly
6300 since elf_find_function will look at the dot-sym anyway.
6301 Now, elf_find_function will keep the largest size of any
6302 function sym found at the code address of interest, so return
6303 1 here to avoid it incorrectly caching a larger function size
6304 for a small function. This does mean we return the wrong
6305 size for a new-ABI function of size 24, but all that does is
6306 disable caching for such functions. */
6307 if (size == 24)
6308 size = 1;
9f296da3 6309 }
aef36ac1
AM
6310 else
6311 {
6312 if (sym->section != sec)
6313 return 0;
6314 *code_off = sym->value;
6315 }
6316 if (size == 0)
6317 size = 1;
6318 return size;
9f296da3
AM
6319}
6320
854b41e7
AM
6321/* Return true if symbol is defined in a regular object file. */
6322
6323static bfd_boolean
6324is_static_defined (struct elf_link_hash_entry *h)
6325{
6326 return ((h->root.type == bfd_link_hash_defined
6327 || h->root.type == bfd_link_hash_defweak)
6328 && h->root.u.def.section != NULL
6329 && h->root.u.def.section->output_section != NULL);
6330}
6331
b31867b6
AM
6332/* If FDH is a function descriptor symbol, return the associated code
6333 entry symbol if it is defined. Return NULL otherwise. */
6334
6335static struct ppc_link_hash_entry *
6336defined_code_entry (struct ppc_link_hash_entry *fdh)
6337{
6338 if (fdh->is_func_descriptor)
6339 {
6340 struct ppc_link_hash_entry *fh = ppc_follow_link (fdh->oh);
6341 if (fh->elf.root.type == bfd_link_hash_defined
6342 || fh->elf.root.type == bfd_link_hash_defweak)
6343 return fh;
6344 }
6345 return NULL;
6346}
6347
6348/* If FH is a function code entry symbol, return the associated
6349 function descriptor symbol if it is defined. Return NULL otherwise. */
6350
6351static struct ppc_link_hash_entry *
6352defined_func_desc (struct ppc_link_hash_entry *fh)
6353{
6354 if (fh->oh != NULL
6355 && fh->oh->is_func_descriptor)
6356 {
6357 struct ppc_link_hash_entry *fdh = ppc_follow_link (fh->oh);
6358 if (fdh->elf.root.type == bfd_link_hash_defined
6359 || fdh->elf.root.type == bfd_link_hash_defweak)
6360 return fdh;
6361 }
6362 return NULL;
6363}
6364
8c5b4e52
AM
6365static bfd_boolean func_desc_adjust (struct elf_link_hash_entry *, void *);
6366
6367/* Garbage collect sections, after first dealing with dot-symbols. */
6368
6369static bfd_boolean
6370ppc64_elf_gc_sections (bfd *abfd, struct bfd_link_info *info)
6371{
6372 struct ppc_link_hash_table *htab = ppc_hash_table (info);
6373
6374 if (htab != NULL && htab->need_func_desc_adj)
6375 {
6376 elf_link_hash_traverse (&htab->elf, func_desc_adjust, info);
6377 htab->need_func_desc_adj = 0;
6378 }
6379 return bfd_elf_gc_sections (abfd, info);
6380}
6381
74f0fb50
AM
6382/* Mark all our entry sym sections, both opd and code section. */
6383
6384static void
6385ppc64_elf_gc_keep (struct bfd_link_info *info)
6386{
6387 struct ppc_link_hash_table *htab = ppc_hash_table (info);
6388 struct bfd_sym_chain *sym;
6389
4dfe6ac6
NC
6390 if (htab == NULL)
6391 return;
6392
74f0fb50
AM
6393 for (sym = info->gc_sym_list; sym != NULL; sym = sym->next)
6394 {
b31867b6 6395 struct ppc_link_hash_entry *eh, *fh;
74f0fb50
AM
6396 asection *sec;
6397
6398 eh = (struct ppc_link_hash_entry *)
b31867b6 6399 elf_link_hash_lookup (&htab->elf, sym->name, FALSE, FALSE, TRUE);
74f0fb50
AM
6400 if (eh == NULL)
6401 continue;
6402 if (eh->elf.root.type != bfd_link_hash_defined
6403 && eh->elf.root.type != bfd_link_hash_defweak)
6404 continue;
6405
b31867b6
AM
6406 fh = defined_code_entry (eh);
6407 if (fh != NULL)
74f0fb50 6408 {
b31867b6 6409 sec = fh->elf.root.u.def.section;
74f0fb50
AM
6410 sec->flags |= SEC_KEEP;
6411 }
6412 else if (get_opd_info (eh->elf.root.u.def.section) != NULL
6413 && opd_entry_value (eh->elf.root.u.def.section,
6414 eh->elf.root.u.def.value,
aef36ac1 6415 &sec, NULL, FALSE) != (bfd_vma) -1)
74f0fb50
AM
6416 sec->flags |= SEC_KEEP;
6417
6418 sec = eh->elf.root.u.def.section;
6419 sec->flags |= SEC_KEEP;
6420 }
6421}
6422
64d03ab5
AM
6423/* Mark sections containing dynamically referenced symbols. When
6424 building shared libraries, we must assume that any visible symbol is
6425 referenced. */
6426
6427static bfd_boolean
6428ppc64_elf_gc_mark_dynamic_ref (struct elf_link_hash_entry *h, void *inf)
6429{
6430 struct bfd_link_info *info = (struct bfd_link_info *) inf;
6431 struct ppc_link_hash_entry *eh = (struct ppc_link_hash_entry *) h;
b31867b6 6432 struct ppc_link_hash_entry *fdh;
b407645f 6433 struct bfd_elf_dynamic_list *d = info->dynamic_list;
64d03ab5 6434
64d03ab5 6435 /* Dynamic linking info is on the func descriptor sym. */
b31867b6
AM
6436 fdh = defined_func_desc (eh);
6437 if (fdh != NULL)
6438 eh = fdh;
64d03ab5
AM
6439
6440 if ((eh->elf.root.type == bfd_link_hash_defined
6441 || eh->elf.root.type == bfd_link_hash_defweak)
6442 && (eh->elf.ref_dynamic
1c9177d9 6443 || ((eh->elf.def_regular || ELF_COMMON_DEF_P (&eh->elf))
64d03ab5 6444 && ELF_ST_VISIBILITY (eh->elf.other) != STV_INTERNAL
4c58e0d8 6445 && ELF_ST_VISIBILITY (eh->elf.other) != STV_HIDDEN
0e1862bb 6446 && (!bfd_link_executable (info)
e278ae05 6447 || info->gc_keep_exported
b407645f
AM
6448 || info->export_dynamic
6449 || (eh->elf.dynamic
6450 && d != NULL
6451 && (*d->match) (&d->head, NULL, eh->elf.root.root.string)))
e278ae05 6452 && (eh->elf.versioned >= versioned
4c58e0d8
AM
6453 || !bfd_hide_sym_by_version (info->version_info,
6454 eh->elf.root.root.string)))))
64d03ab5
AM
6455 {
6456 asection *code_sec;
b31867b6 6457 struct ppc_link_hash_entry *fh;
64d03ab5
AM
6458
6459 eh->elf.root.u.def.section->flags |= SEC_KEEP;
6460
6461 /* Function descriptor syms cause the associated
6462 function code sym section to be marked. */
b31867b6
AM
6463 fh = defined_code_entry (eh);
6464 if (fh != NULL)
6465 {
6466 code_sec = fh->elf.root.u.def.section;
6467 code_sec->flags |= SEC_KEEP;
6468 }
64d03ab5
AM
6469 else if (get_opd_info (eh->elf.root.u.def.section) != NULL
6470 && opd_entry_value (eh->elf.root.u.def.section,
6471 eh->elf.root.u.def.value,
aef36ac1 6472 &code_sec, NULL, FALSE) != (bfd_vma) -1)
64d03ab5
AM
6473 code_sec->flags |= SEC_KEEP;
6474 }
6475
6476 return TRUE;
6477}
6478
5bd4f169
AM
6479/* Return the section that should be marked against GC for a given
6480 relocation. */
6481
6482static asection *
4ce794b7 6483ppc64_elf_gc_mark_hook (asection *sec,
fb34365b 6484 struct bfd_link_info *info,
4ce794b7
AM
6485 Elf_Internal_Rela *rel,
6486 struct elf_link_hash_entry *h,
6487 Elf_Internal_Sym *sym)
5bd4f169 6488{
ccfa59ea
AM
6489 asection *rsec;
6490
ccfa59ea
AM
6491 /* Syms return NULL if we're marking .opd, so we avoid marking all
6492 function sections, as all functions are referenced in .opd. */
6493 rsec = NULL;
6494 if (get_opd_info (sec) != NULL)
6495 return rsec;
1e2f5b6e 6496
5bd4f169
AM
6497 if (h != NULL)
6498 {
04c9666a 6499 enum elf_ppc64_reloc_type r_type;
b31867b6 6500 struct ppc_link_hash_entry *eh, *fh, *fdh;
a33d1f77 6501
4ce794b7 6502 r_type = ELF64_R_TYPE (rel->r_info);
a33d1f77 6503 switch (r_type)
5bd4f169
AM
6504 {
6505 case R_PPC64_GNU_VTINHERIT:
6506 case R_PPC64_GNU_VTENTRY:
6507 break;
6508
6509 default:
6510 switch (h->root.type)
6511 {
6512 case bfd_link_hash_defined:
6513 case bfd_link_hash_defweak:
ccfa59ea 6514 eh = (struct ppc_link_hash_entry *) h;
b31867b6
AM
6515 fdh = defined_func_desc (eh);
6516 if (fdh != NULL)
8c5b4e52
AM
6517 {
6518 /* -mcall-aixdesc code references the dot-symbol on
6519 a call reloc. Mark the function descriptor too
6520 against garbage collection. */
6521 fdh->elf.mark = 1;
6522 if (fdh->elf.u.weakdef != NULL)
6523 fdh->elf.u.weakdef->mark = 1;
6524 eh = fdh;
6525 }
1e2f5b6e
AM
6526
6527 /* Function descriptor syms cause the associated
6528 function code sym section to be marked. */
b31867b6
AM
6529 fh = defined_code_entry (eh);
6530 if (fh != NULL)
ccfa59ea
AM
6531 {
6532 /* They also mark their opd section. */
74f0fb50 6533 eh->elf.root.u.def.section->gc_mark = 1;
ccfa59ea 6534
b31867b6 6535 rsec = fh->elf.root.u.def.section;
ccfa59ea 6536 }
8387904d
AM
6537 else if (get_opd_info (eh->elf.root.u.def.section) != NULL
6538 && opd_entry_value (eh->elf.root.u.def.section,
6539 eh->elf.root.u.def.value,
aef36ac1 6540 &rsec, NULL, FALSE) != (bfd_vma) -1)
74f0fb50 6541 eh->elf.root.u.def.section->gc_mark = 1;
ccfa59ea 6542 else
1e2f5b6e
AM
6543 rsec = h->root.u.def.section;
6544 break;
5bd4f169
AM
6545
6546 case bfd_link_hash_common:
1e2f5b6e
AM
6547 rsec = h->root.u.c.p->section;
6548 break;
5bd4f169
AM
6549
6550 default:
fb34365b 6551 return _bfd_elf_gc_mark_hook (sec, info, rel, h, sym);
5bd4f169
AM
6552 }
6553 }
6554 }
6555 else
6556 {
74f0fb50 6557 struct _opd_sec_data *opd;
1e2f5b6e
AM
6558
6559 rsec = bfd_section_from_elf_index (sec->owner, sym->st_shndx);
74f0fb50
AM
6560 opd = get_opd_info (rsec);
6561 if (opd != NULL && opd->func_sec != NULL)
ccfa59ea 6562 {
74f0fb50 6563 rsec->gc_mark = 1;
ccfa59ea 6564
51aecdc5 6565 rsec = opd->func_sec[OPD_NDX (sym->st_value + rel->r_addend)];
ccfa59ea 6566 }
5bd4f169
AM
6567 }
6568
1e2f5b6e 6569 return rsec;
5bd4f169
AM
6570}
6571
65f38f15
AM
6572/* Update the .got, .plt. and dynamic reloc reference counts for the
6573 section being removed. */
5bd4f169 6574
b34976b6 6575static bfd_boolean
4ce794b7
AM
6576ppc64_elf_gc_sweep_hook (bfd *abfd, struct bfd_link_info *info,
6577 asection *sec, const Elf_Internal_Rela *relocs)
5bd4f169 6578{
411e1bfb 6579 struct ppc_link_hash_table *htab;
5bd4f169
AM
6580 Elf_Internal_Shdr *symtab_hdr;
6581 struct elf_link_hash_entry **sym_hashes;
411e1bfb 6582 struct got_entry **local_got_ents;
5bd4f169 6583 const Elf_Internal_Rela *rel, *relend;
5bd4f169 6584
0e1862bb 6585 if (bfd_link_relocatable (info))
7dda2462
TG
6586 return TRUE;
6587
680a3378
AM
6588 if ((sec->flags & SEC_ALLOC) == 0)
6589 return TRUE;
6590
ec338859
AM
6591 elf_section_data (sec)->local_dynrel = NULL;
6592
411e1bfb 6593 htab = ppc_hash_table (info);
4dfe6ac6
NC
6594 if (htab == NULL)
6595 return FALSE;
6596
0ffa91dd 6597 symtab_hdr = &elf_symtab_hdr (abfd);
5bd4f169 6598 sym_hashes = elf_sym_hashes (abfd);
411e1bfb 6599 local_got_ents = elf_local_got_ents (abfd);
5bd4f169
AM
6600
6601 relend = relocs + sec->reloc_count;
6602 for (rel = relocs; rel < relend; rel++)
a33d1f77
AM
6603 {
6604 unsigned long r_symndx;
04c9666a 6605 enum elf_ppc64_reloc_type r_type;
58ac9f71 6606 struct elf_link_hash_entry *h = NULL;
8dea77f0 6607 struct plt_entry **plt_list = NULL;
f961d9dd 6608 unsigned char tls_type = 0;
5bd4f169 6609
a33d1f77 6610 r_symndx = ELF64_R_SYM (rel->r_info);
4ce794b7 6611 r_type = ELF64_R_TYPE (rel->r_info);
58ac9f71
AM
6612 if (r_symndx >= symtab_hdr->sh_info)
6613 {
6614 struct ppc_link_hash_entry *eh;
6061a67d
AM
6615 struct elf_dyn_relocs **pp;
6616 struct elf_dyn_relocs *p;
58ac9f71
AM
6617
6618 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
b31867b6 6619 h = elf_follow_link (h);
58ac9f71
AM
6620 eh = (struct ppc_link_hash_entry *) h;
6621
6622 for (pp = &eh->dyn_relocs; (p = *pp) != NULL; pp = &p->next)
6623 if (p->sec == sec)
6624 {
6625 /* Everything must go for SEC. */
6626 *pp = p->next;
6627 break;
6628 }
6629 }
6630
a33d1f77
AM
6631 switch (r_type)
6632 {
411e1bfb
AM
6633 case R_PPC64_GOT_TLSLD16:
6634 case R_PPC64_GOT_TLSLD16_LO:
6635 case R_PPC64_GOT_TLSLD16_HI:
6636 case R_PPC64_GOT_TLSLD16_HA:
951fd09b 6637 tls_type = TLS_TLS | TLS_LD;
411e1bfb
AM
6638 goto dogot;
6639
6640 case R_PPC64_GOT_TLSGD16:
6641 case R_PPC64_GOT_TLSGD16_LO:
6642 case R_PPC64_GOT_TLSGD16_HI:
6643 case R_PPC64_GOT_TLSGD16_HA:
951fd09b 6644 tls_type = TLS_TLS | TLS_GD;
411e1bfb
AM
6645 goto dogot;
6646
6647 case R_PPC64_GOT_TPREL16_DS:
6648 case R_PPC64_GOT_TPREL16_LO_DS:
6649 case R_PPC64_GOT_TPREL16_HI:
6650 case R_PPC64_GOT_TPREL16_HA:
6651 tls_type = TLS_TLS | TLS_TPREL;
6652 goto dogot;
6653
6654 case R_PPC64_GOT_DTPREL16_DS:
6655 case R_PPC64_GOT_DTPREL16_LO_DS:
6656 case R_PPC64_GOT_DTPREL16_HI:
6657 case R_PPC64_GOT_DTPREL16_HA:
6658 tls_type = TLS_TLS | TLS_DTPREL;
6659 goto dogot;
6660
a33d1f77
AM
6661 case R_PPC64_GOT16:
6662 case R_PPC64_GOT16_DS:
6663 case R_PPC64_GOT16_HA:
6664 case R_PPC64_GOT16_HI:
6665 case R_PPC64_GOT16_LO:
6666 case R_PPC64_GOT16_LO_DS:
411e1bfb
AM
6667 dogot:
6668 {
6669 struct got_entry *ent;
6670
58ac9f71
AM
6671 if (h != NULL)
6672 ent = h->got.glist;
411e1bfb
AM
6673 else
6674 ent = local_got_ents[r_symndx];
6675
6676 for (; ent != NULL; ent = ent->next)
6677 if (ent->addend == rel->r_addend
e717da7e 6678 && ent->owner == abfd
411e1bfb
AM
6679 && ent->tls_type == tls_type)
6680 break;
6681 if (ent == NULL)
6682 abort ();
6683 if (ent->got.refcount > 0)
6684 ent->got.refcount -= 1;
6685 }
8dea77f0
AM
6686 if (h != NULL && !bfd_link_pic (info) && abiversion (abfd) != 1)
6687 plt_list = &h->plt.plist;
a33d1f77 6688 break;
65f38f15 6689
a33d1f77
AM
6690 case R_PPC64_PLT16_HA:
6691 case R_PPC64_PLT16_HI:
6692 case R_PPC64_PLT16_LO:
6693 case R_PPC64_PLT32:
6694 case R_PPC64_PLT64:
721956f4
AM
6695 case R_PPC64_REL14:
6696 case R_PPC64_REL14_BRNTAKEN:
6697 case R_PPC64_REL14_BRTAKEN:
5d1634d7 6698 case R_PPC64_REL24:
58ac9f71 6699 if (h != NULL)
cbf95972
AM
6700 plt_list = &h->plt.plist;
6701 else if (local_got_ents != NULL)
6702 {
6703 struct plt_entry **local_plt = (struct plt_entry **)
6704 (local_got_ents + symtab_hdr->sh_info);
6705 unsigned char *local_got_tls_masks = (unsigned char *)
6706 (local_plt + symtab_hdr->sh_info);
6707 if ((local_got_tls_masks[r_symndx] & PLT_IFUNC) != 0)
6708 plt_list = local_plt + r_symndx;
6709 }
8dea77f0 6710 break;
411e1bfb 6711
8dea77f0
AM
6712 case R_PPC64_ADDR64:
6713 case R_PPC64_ADDR16:
6714 case R_PPC64_ADDR16_DS:
6715 case R_PPC64_ADDR16_HA:
6716 case R_PPC64_ADDR16_HI:
6717 case R_PPC64_ADDR16_HIGH:
6718 case R_PPC64_ADDR16_HIGHA:
6719 case R_PPC64_ADDR16_HIGHER:
6720 case R_PPC64_ADDR16_HIGHERA:
6721 case R_PPC64_ADDR16_HIGHEST:
6722 case R_PPC64_ADDR16_HIGHESTA:
6723 case R_PPC64_ADDR16_LO:
6724 case R_PPC64_ADDR16_LO_DS:
6725 if (h != NULL && !bfd_link_pic (info) && abiversion (abfd) != 1
6726 && rel->r_addend == 0)
6727 plt_list = &h->plt.plist;
e86ce104 6728 break;
5d1634d7 6729
a33d1f77
AM
6730 default:
6731 break;
6732 }
8dea77f0
AM
6733 if (plt_list != NULL)
6734 {
6735 struct plt_entry *ent;
6736
6737 for (ent = *plt_list; ent != NULL; ent = ent->next)
6738 if (ent->addend == rel->r_addend)
6739 break;
6740 if (ent != NULL && ent->plt.refcount > 0)
6741 ent->plt.refcount -= 1;
6742 }
a33d1f77 6743 }
b34976b6 6744 return TRUE;
5bd4f169
AM
6745}
6746
deb0e272
AM
6747/* The maximum size of .sfpr. */
6748#define SFPR_MAX (218*4)
6749
6750struct sfpr_def_parms
6751{
699733f6
AM
6752 const char name[12];
6753 unsigned char lo, hi;
deb0e272
AM
6754 bfd_byte * (*write_ent) (bfd *, bfd_byte *, int);
6755 bfd_byte * (*write_tail) (bfd *, bfd_byte *, int);
6756};
6757
a4b6fadd
AM
6758/* Auto-generate _save*, _rest* functions in .sfpr.
6759 If STUB_SEC is non-null, define alias symbols in STUB_SEC
6760 instead. */
deb0e272 6761
4dfe6ac6 6762static bfd_boolean
a4b6fadd
AM
6763sfpr_define (struct bfd_link_info *info,
6764 const struct sfpr_def_parms *parm,
6765 asection *stub_sec)
deb0e272
AM
6766{
6767 struct ppc_link_hash_table *htab = ppc_hash_table (info);
6768 unsigned int i;
6769 size_t len = strlen (parm->name);
6770 bfd_boolean writing = FALSE;
699733f6 6771 char sym[16];
deb0e272 6772
4dfe6ac6
NC
6773 if (htab == NULL)
6774 return FALSE;
6775
deb0e272
AM
6776 memcpy (sym, parm->name, len);
6777 sym[len + 2] = 0;
6778
6779 for (i = parm->lo; i <= parm->hi; i++)
6780 {
a4b6fadd 6781 struct ppc_link_hash_entry *h;
deb0e272
AM
6782
6783 sym[len + 0] = i / 10 + '0';
6784 sym[len + 1] = i % 10 + '0';
a4b6fadd 6785 h = (struct ppc_link_hash_entry *)
b32547cd 6786 elf_link_hash_lookup (&htab->elf, sym, writing, TRUE, TRUE);
a4b6fadd 6787 if (stub_sec != NULL)
deb0e272 6788 {
a4b6fadd
AM
6789 if (h != NULL
6790 && h->elf.root.type == bfd_link_hash_defined
6791 && h->elf.root.u.def.section == htab->sfpr)
6792 {
6793 struct elf_link_hash_entry *s;
6794 char buf[32];
6795 sprintf (buf, "%08x.%s", stub_sec->id & 0xffffffff, sym);
6796 s = elf_link_hash_lookup (&htab->elf, buf, TRUE, TRUE, FALSE);
6797 if (s == NULL)
6798 return FALSE;
6799 if (s->root.type == bfd_link_hash_new
6800 || (s->root.type = bfd_link_hash_defined
6801 && s->root.u.def.section == stub_sec))
6802 {
6803 s->root.type = bfd_link_hash_defined;
6804 s->root.u.def.section = stub_sec;
6805 s->root.u.def.value = (stub_sec->size
6806 + h->elf.root.u.def.value);
6807 s->ref_regular = 1;
6808 s->def_regular = 1;
6809 s->ref_regular_nonweak = 1;
6810 s->forced_local = 1;
6811 s->non_elf = 0;
6812 s->root.linker_def = 1;
6813 }
6814 }
6815 continue;
6816 }
6817 if (h != NULL)
6818 {
6819 h->save_res = 1;
6820 if (!h->elf.def_regular)
deb0e272 6821 {
a4b6fadd
AM
6822 h->elf.root.type = bfd_link_hash_defined;
6823 h->elf.root.u.def.section = htab->sfpr;
6824 h->elf.root.u.def.value = htab->sfpr->size;
6825 h->elf.type = STT_FUNC;
6826 h->elf.def_regular = 1;
b32547cd 6827 h->elf.non_elf = 0;
a4b6fadd
AM
6828 _bfd_elf_link_hash_hide_symbol (info, &h->elf, TRUE);
6829 writing = TRUE;
deb0e272 6830 if (htab->sfpr->contents == NULL)
a4b6fadd
AM
6831 {
6832 htab->sfpr->contents = bfd_alloc (htab->elf.dynobj, SFPR_MAX);
6833 if (htab->sfpr->contents == NULL)
6834 return FALSE;
6835 }
deb0e272
AM
6836 }
6837 }
6838 if (writing)
6839 {
6840 bfd_byte *p = htab->sfpr->contents + htab->sfpr->size;
6841 if (i != parm->hi)
6842 p = (*parm->write_ent) (htab->elf.dynobj, p, i);
6843 else
6844 p = (*parm->write_tail) (htab->elf.dynobj, p, i);
6845 htab->sfpr->size = p - htab->sfpr->contents;
6846 }
6847 }
6848
6849 return TRUE;
6850}
6851
6852static bfd_byte *
6853savegpr0 (bfd *abfd, bfd_byte *p, int r)
6854{
6855 bfd_put_32 (abfd, STD_R0_0R1 + (r << 21) + (1 << 16) - (32 - r) * 8, p);
6856 return p + 4;
6857}
6858
6859static bfd_byte *
6860savegpr0_tail (bfd *abfd, bfd_byte *p, int r)
6861{
6862 p = savegpr0 (abfd, p, r);
a078d95a 6863 bfd_put_32 (abfd, STD_R0_0R1 + STK_LR, p);
deb0e272
AM
6864 p = p + 4;
6865 bfd_put_32 (abfd, BLR, p);
6866 return p + 4;
6867}
6868
6869static bfd_byte *
6870restgpr0 (bfd *abfd, bfd_byte *p, int r)
6871{
6872 bfd_put_32 (abfd, LD_R0_0R1 + (r << 21) + (1 << 16) - (32 - r) * 8, p);
6873 return p + 4;
6874}
6875
6876static bfd_byte *
6877restgpr0_tail (bfd *abfd, bfd_byte *p, int r)
6878{
a078d95a 6879 bfd_put_32 (abfd, LD_R0_0R1 + STK_LR, p);
deb0e272
AM
6880 p = p + 4;
6881 p = restgpr0 (abfd, p, r);
6882 bfd_put_32 (abfd, MTLR_R0, p);
6883 p = p + 4;
6884 if (r == 29)
6885 {
6886 p = restgpr0 (abfd, p, 30);
6887 p = restgpr0 (abfd, p, 31);
6888 }
6889 bfd_put_32 (abfd, BLR, p);
6890 return p + 4;
6891}
6892
6893static bfd_byte *
6894savegpr1 (bfd *abfd, bfd_byte *p, int r)
6895{
6896 bfd_put_32 (abfd, STD_R0_0R12 + (r << 21) + (1 << 16) - (32 - r) * 8, p);
6897 return p + 4;
6898}
6899
6900static bfd_byte *
6901savegpr1_tail (bfd *abfd, bfd_byte *p, int r)
6902{
6903 p = savegpr1 (abfd, p, r);
6904 bfd_put_32 (abfd, BLR, p);
6905 return p + 4;
6906}
6907
6908static bfd_byte *
6909restgpr1 (bfd *abfd, bfd_byte *p, int r)
6910{
6911 bfd_put_32 (abfd, LD_R0_0R12 + (r << 21) + (1 << 16) - (32 - r) * 8, p);
6912 return p + 4;
6913}
6914
6915static bfd_byte *
6916restgpr1_tail (bfd *abfd, bfd_byte *p, int r)
6917{
6918 p = restgpr1 (abfd, p, r);
6919 bfd_put_32 (abfd, BLR, p);
6920 return p + 4;
6921}
6922
6923static bfd_byte *
6924savefpr (bfd *abfd, bfd_byte *p, int r)
6925{
6926 bfd_put_32 (abfd, STFD_FR0_0R1 + (r << 21) + (1 << 16) - (32 - r) * 8, p);
6927 return p + 4;
6928}
6929
6930static bfd_byte *
6931savefpr0_tail (bfd *abfd, bfd_byte *p, int r)
6932{
6933 p = savefpr (abfd, p, r);
a078d95a 6934 bfd_put_32 (abfd, STD_R0_0R1 + STK_LR, p);
deb0e272
AM
6935 p = p + 4;
6936 bfd_put_32 (abfd, BLR, p);
6937 return p + 4;
6938}
6939
6940static bfd_byte *
6941restfpr (bfd *abfd, bfd_byte *p, int r)
6942{
6943 bfd_put_32 (abfd, LFD_FR0_0R1 + (r << 21) + (1 << 16) - (32 - r) * 8, p);
6944 return p + 4;
6945}
6946
6947static bfd_byte *
6948restfpr0_tail (bfd *abfd, bfd_byte *p, int r)
6949{
a078d95a 6950 bfd_put_32 (abfd, LD_R0_0R1 + STK_LR, p);
deb0e272
AM
6951 p = p + 4;
6952 p = restfpr (abfd, p, r);
6953 bfd_put_32 (abfd, MTLR_R0, p);
6954 p = p + 4;
6955 if (r == 29)
6956 {
6957 p = restfpr (abfd, p, 30);
6958 p = restfpr (abfd, p, 31);
6959 }
6960 bfd_put_32 (abfd, BLR, p);
6961 return p + 4;
6962}
6963
6964static bfd_byte *
6965savefpr1_tail (bfd *abfd, bfd_byte *p, int r)
6966{
6967 p = savefpr (abfd, p, r);
6968 bfd_put_32 (abfd, BLR, p);
6969 return p + 4;
6970}
6971
6972static bfd_byte *
6973restfpr1_tail (bfd *abfd, bfd_byte *p, int r)
6974{
6975 p = restfpr (abfd, p, r);
6976 bfd_put_32 (abfd, BLR, p);
6977 return p + 4;
6978}
6979
6980static bfd_byte *
6981savevr (bfd *abfd, bfd_byte *p, int r)
6982{
6983 bfd_put_32 (abfd, LI_R12_0 + (1 << 16) - (32 - r) * 16, p);
6984 p = p + 4;
6985 bfd_put_32 (abfd, STVX_VR0_R12_R0 + (r << 21), p);
6986 return p + 4;
6987}
6988
6989static bfd_byte *
6990savevr_tail (bfd *abfd, bfd_byte *p, int r)
6991{
6992 p = savevr (abfd, p, r);
6993 bfd_put_32 (abfd, BLR, p);
6994 return p + 4;
6995}
6996
6997static bfd_byte *
6998restvr (bfd *abfd, bfd_byte *p, int r)
6999{
7000 bfd_put_32 (abfd, LI_R12_0 + (1 << 16) - (32 - r) * 16, p);
7001 p = p + 4;
7002 bfd_put_32 (abfd, LVX_VR0_R12_R0 + (r << 21), p);
7003 return p + 4;
7004}
7005
7006static bfd_byte *
7007restvr_tail (bfd *abfd, bfd_byte *p, int r)
7008{
7009 p = restvr (abfd, p, r);
7010 bfd_put_32 (abfd, BLR, p);
7011 return p + 4;
7012}
7013
e86ce104
AM
7014/* Called via elf_link_hash_traverse to transfer dynamic linking
7015 information on function code symbol entries to their corresponding
7016 function descriptor symbol entries. */
deb0e272 7017
b34976b6 7018static bfd_boolean
4ce794b7 7019func_desc_adjust (struct elf_link_hash_entry *h, void *inf)
5bd4f169 7020{
e86ce104 7021 struct bfd_link_info *info;
65f38f15 7022 struct ppc_link_hash_table *htab;
50bc7936
AM
7023 struct ppc_link_hash_entry *fh;
7024 struct ppc_link_hash_entry *fdh;
7025 bfd_boolean force_local;
5bd4f169 7026
50bc7936
AM
7027 fh = (struct ppc_link_hash_entry *) h;
7028 if (fh->elf.root.type == bfd_link_hash_indirect)
b34976b6 7029 return TRUE;
e86ce104 7030
8c5b4e52
AM
7031 if (!fh->is_func)
7032 return TRUE;
7033
7034 if (fh->elf.root.root.string[0] != '.'
7035 || fh->elf.root.root.string[1] == '\0')
7036 return TRUE;
7037
4ce794b7 7038 info = inf;
65f38f15 7039 htab = ppc_hash_table (info);
4dfe6ac6
NC
7040 if (htab == NULL)
7041 return FALSE;
5bd4f169 7042
8c5b4e52
AM
7043 /* Find the corresponding function descriptor symbol. */
7044 fdh = lookup_fdh (fh, htab);
7045
c09bdfe5
AM
7046 /* Resolve undefined references to dot-symbols as the value
7047 in the function descriptor, if we have one in a regular object.
7048 This is to satisfy cases like ".quad .foo". Calls to functions
7049 in dynamic objects are handled elsewhere. */
8c5b4e52
AM
7050 if ((fh->elf.root.type == bfd_link_hash_undefined
7051 || fh->elf.root.type == bfd_link_hash_undefweak)
7052 && (fdh->elf.root.type == bfd_link_hash_defined
7053 || fdh->elf.root.type == bfd_link_hash_defweak)
b31867b6
AM
7054 && get_opd_info (fdh->elf.root.u.def.section) != NULL
7055 && opd_entry_value (fdh->elf.root.u.def.section,
7056 fdh->elf.root.u.def.value,
c09bdfe5 7057 &fh->elf.root.u.def.section,
aef36ac1 7058 &fh->elf.root.u.def.value, FALSE) != (bfd_vma) -1)
c09bdfe5 7059 {
b31867b6 7060 fh->elf.root.type = fdh->elf.root.type;
f5385ebf 7061 fh->elf.forced_local = 1;
b31867b6
AM
7062 fh->elf.def_regular = fdh->elf.def_regular;
7063 fh->elf.def_dynamic = fdh->elf.def_dynamic;
c09bdfe5
AM
7064 }
7065
8c5b4e52
AM
7066 if (!fh->elf.dynamic)
7067 {
7068 struct plt_entry *ent;
5bd4f169 7069
8c5b4e52
AM
7070 for (ent = fh->elf.plt.plist; ent != NULL; ent = ent->next)
7071 if (ent->plt.refcount > 0)
7072 break;
7073 if (ent == NULL)
7074 return TRUE;
7075 }
5bd4f169 7076
8c5b4e52 7077 /* Create a descriptor as undefined if necessary. */
50bc7936 7078 if (fdh == NULL
0e1862bb 7079 && !bfd_link_executable (info)
50bc7936
AM
7080 && (fh->elf.root.type == bfd_link_hash_undefined
7081 || fh->elf.root.type == bfd_link_hash_undefweak))
7082 {
908b32fc 7083 fdh = make_fdh (info, fh);
bb700d78
AM
7084 if (fdh == NULL)
7085 return FALSE;
50bc7936 7086 }
648cca2c 7087
8c5b4e52 7088 /* We can't support overriding of symbols on a fake descriptor. */
908b32fc
AM
7089 if (fdh != NULL
7090 && fdh->fake
8c5b4e52
AM
7091 && (fh->elf.root.type == bfd_link_hash_defined
7092 || fh->elf.root.type == bfd_link_hash_defweak))
7093 _bfd_elf_link_hash_hide_symbol (info, &fdh->elf, TRUE);
908b32fc 7094
8c5b4e52
AM
7095 /* Transfer dynamic linking information to the function descriptor. */
7096 if (fdh != NULL)
7097 {
f5385ebf
AM
7098 fdh->elf.ref_regular |= fh->elf.ref_regular;
7099 fdh->elf.ref_dynamic |= fh->elf.ref_dynamic;
7100 fdh->elf.ref_regular_nonweak |= fh->elf.ref_regular_nonweak;
7101 fdh->elf.non_got_ref |= fh->elf.non_got_ref;
8c5b4e52
AM
7102 fdh->elf.dynamic |= fh->elf.dynamic;
7103 fdh->elf.needs_plt |= (fh->elf.needs_plt
7104 || fh->elf.type == STT_FUNC
7105 || fh->elf.type == STT_GNU_IFUNC);
7106 move_plt_plist (fh, fdh);
7107
7108 if (!fdh->elf.forced_local
7109 && fh->elf.dynindx != -1)
7110 if (!bfd_elf_link_record_dynamic_symbol (info, &fdh->elf))
7111 return FALSE;
e86ce104
AM
7112 }
7113
50bc7936
AM
7114 /* Now that the info is on the function descriptor, clear the
7115 function code sym info. Any function code syms for which we
7116 don't have a definition in a regular file, we force local.
7117 This prevents a shared library from exporting syms that have
7118 been imported from another library. Function code syms that
7119 are really in the library we must leave global to prevent the
7120 linker dragging in a definition from a static library. */
93f3fa99
AM
7121 force_local = (!fh->elf.def_regular
7122 || fdh == NULL
7123 || !fdh->elf.def_regular
7124 || fdh->elf.forced_local);
50bc7936
AM
7125 _bfd_elf_link_hash_hide_symbol (info, &fh->elf, force_local);
7126
b34976b6 7127 return TRUE;
e86ce104 7128}
40b8271b 7129
a4b6fadd
AM
7130static const struct sfpr_def_parms save_res_funcs[] =
7131 {
7132 { "_savegpr0_", 14, 31, savegpr0, savegpr0_tail },
7133 { "_restgpr0_", 14, 29, restgpr0, restgpr0_tail },
7134 { "_restgpr0_", 30, 31, restgpr0, restgpr0_tail },
7135 { "_savegpr1_", 14, 31, savegpr1, savegpr1_tail },
7136 { "_restgpr1_", 14, 31, restgpr1, restgpr1_tail },
7137 { "_savefpr_", 14, 31, savefpr, savefpr0_tail },
7138 { "_restfpr_", 14, 29, restfpr, restfpr0_tail },
7139 { "_restfpr_", 30, 31, restfpr, restfpr0_tail },
7140 { "._savef", 14, 31, savefpr, savefpr1_tail },
7141 { "._restf", 14, 31, restfpr, restfpr1_tail },
7142 { "_savevr_", 20, 31, savevr, savevr_tail },
7143 { "_restvr_", 20, 31, restvr, restvr_tail }
7144 };
7145
e86ce104 7146/* Called near the start of bfd_elf_size_dynamic_sections. We use
82bd7b59
AM
7147 this hook to a) provide some gcc support functions, and b) transfer
7148 dynamic linking information gathered so far on function code symbol
7149 entries, to their corresponding function descriptor symbol entries. */
deb0e272 7150
b34976b6 7151static bfd_boolean
4ce794b7
AM
7152ppc64_elf_func_desc_adjust (bfd *obfd ATTRIBUTE_UNUSED,
7153 struct bfd_link_info *info)
e86ce104
AM
7154{
7155 struct ppc_link_hash_table *htab;
7156
7157 htab = ppc_hash_table (info);
4dfe6ac6
NC
7158 if (htab == NULL)
7159 return FALSE;
7160
b32547cd
AM
7161 /* Provide any missing _save* and _rest* functions. */
7162 if (htab->sfpr != NULL)
7163 {
7164 unsigned int i;
7165
7166 htab->sfpr->size = 0;
7167 for (i = 0; i < ARRAY_SIZE (save_res_funcs); i++)
7168 if (!sfpr_define (info, &save_res_funcs[i], NULL))
7169 return FALSE;
7170 if (htab->sfpr->size == 0)
7171 htab->sfpr->flags |= SEC_EXCLUDE;
7172 }
7173
7174 if (bfd_link_relocatable (info))
7175 return TRUE;
7176
7177 if (htab->elf.hgot != NULL)
dba6fa9b
AM
7178 {
7179 _bfd_elf_link_hash_hide_symbol (info, htab->elf.hgot, TRUE);
7180 /* Make .TOC. defined so as to prevent it being made dynamic.
7181 The wrong value here is fixed later in ppc64_elf_set_toc. */
43417696
AM
7182 if (!htab->elf.hgot->def_regular
7183 || htab->elf.hgot->root.type != bfd_link_hash_defined)
7184 {
7185 htab->elf.hgot->root.type = bfd_link_hash_defined;
7186 htab->elf.hgot->root.u.def.value = 0;
7187 htab->elf.hgot->root.u.def.section = bfd_abs_section_ptr;
7188 htab->elf.hgot->def_regular = 1;
7189 htab->elf.hgot->root.linker_def = 1;
7190 }
dba6fa9b 7191 htab->elf.hgot->type = STT_OBJECT;
dba6fa9b
AM
7192 htab->elf.hgot->other = ((htab->elf.hgot->other & ~ELF_ST_VISIBILITY (-1))
7193 | STV_HIDDEN);
7194 }
c66bb0ee 7195
8c5b4e52
AM
7196 if (htab->need_func_desc_adj)
7197 {
7198 elf_link_hash_traverse (&htab->elf, func_desc_adjust, info);
7199 htab->need_func_desc_adj = 0;
7200 }
805fc799 7201
b34976b6 7202 return TRUE;
e86ce104
AM
7203}
7204
8a2058b5
AM
7205/* Return true if we have dynamic relocs against H that apply to
7206 read-only sections. */
a345bc8d
AM
7207
7208static bfd_boolean
7209readonly_dynrelocs (struct elf_link_hash_entry *h)
7210{
7211 struct ppc_link_hash_entry *eh;
7212 struct elf_dyn_relocs *p;
7213
7214 eh = (struct ppc_link_hash_entry *) h;
7215 for (p = eh->dyn_relocs; p != NULL; p = p->next)
7216 {
7217 asection *s = p->sec->output_section;
7218
7219 if (s != NULL && (s->flags & SEC_READONLY) != 0)
7220 return TRUE;
7221 }
7222 return FALSE;
7223}
7224
d311bc8b
AM
7225/* Return true if we have dynamic relocs against H or any of its weak
7226 aliases, that apply to read-only sections. */
7227
7228static bfd_boolean
7229alias_readonly_dynrelocs (struct elf_link_hash_entry *h)
7230{
7231 struct ppc_link_hash_entry *eh;
7232
7233 eh = (struct ppc_link_hash_entry *) h;
7234 do
7235 {
7236 if (readonly_dynrelocs (&eh->elf))
7237 return TRUE;
7238 eh = eh->weakref;
7239 } while (eh != NULL && &eh->elf != h);
7240
7241 return FALSE;
7242}
8a2058b5 7243
8a9e8e72
AM
7244/* Return whether EH has pc-relative dynamic relocs. */
7245
7246static bfd_boolean
7247pc_dynrelocs (struct ppc_link_hash_entry *eh)
7248{
7249 struct elf_dyn_relocs *p;
7250
7251 for (p = eh->dyn_relocs; p != NULL; p = p->next)
7252 if (p->pc_count != 0)
7253 return TRUE;
7254 return FALSE;
7255}
7256
8a2058b5
AM
7257/* Return true if a global entry stub will be created for H. Valid
7258 for ELFv2 before plt entries have been allocated. */
7259
7260static bfd_boolean
7261global_entry_stub (struct elf_link_hash_entry *h)
7262{
7263 struct plt_entry *pent;
7264
7265 if (!h->pointer_equality_needed
7266 || h->def_regular)
7267 return FALSE;
7268
7269 for (pent = h->plt.plist; pent != NULL; pent = pent->next)
7270 if (pent->plt.refcount > 0
7271 && pent->addend == 0)
7272 return TRUE;
7273
7274 return FALSE;
7275}
7276
e86ce104
AM
7277/* Adjust a symbol defined by a dynamic object and referenced by a
7278 regular object. The current definition is in some section of the
7279 dynamic object, but we're not including those sections. We have to
7280 change the definition to something the rest of the link can
7281 understand. */
7282
b34976b6 7283static bfd_boolean
4ce794b7
AM
7284ppc64_elf_adjust_dynamic_symbol (struct bfd_link_info *info,
7285 struct elf_link_hash_entry *h)
e86ce104
AM
7286{
7287 struct ppc_link_hash_table *htab;
5474d94f 7288 asection *s, *srel;
e86ce104
AM
7289
7290 htab = ppc_hash_table (info);
4dfe6ac6
NC
7291 if (htab == NULL)
7292 return FALSE;
e86ce104
AM
7293
7294 /* Deal with function syms. */
7295 if (h->type == STT_FUNC
e054468f 7296 || h->type == STT_GNU_IFUNC
f5385ebf 7297 || h->needs_plt)
e86ce104
AM
7298 {
7299 /* Clear procedure linkage table information for any symbol that
7300 won't need a .plt entry. */
411e1bfb
AM
7301 struct plt_entry *ent;
7302 for (ent = h->plt.plist; ent != NULL; ent = ent->next)
7303 if (ent->plt.refcount > 0)
7304 break;
8387904d 7305 if (ent == NULL
e054468f
AM
7306 || (h->type != STT_GNU_IFUNC
7307 && (SYMBOL_CALLS_LOCAL (info, h)
21d68fcd 7308 || UNDEFWEAK_NO_DYNAMIC_RELOC (info, h)))
a4b6fadd 7309 || ((struct ppc_link_hash_entry *) h)->save_res)
40b8271b 7310 {
411e1bfb 7311 h->plt.plist = NULL;
f5385ebf 7312 h->needs_plt = 0;
d1eca1e4 7313 h->pointer_equality_needed = 0;
40b8271b 7314 }
8a2058b5 7315 else if (abiversion (info->output_bfd) >= 2)
a345bc8d 7316 {
d1eca1e4
AM
7317 /* Taking a function's address in a read/write section
7318 doesn't require us to define the function symbol in the
7319 executable on a global entry stub. A dynamic reloc can
8a2058b5
AM
7320 be used instead. The reason we prefer a few more dynamic
7321 relocs is that calling via a global entry stub costs a
7322 few more instructions, and pointer_equality_needed causes
7323 extra work in ld.so when resolving these symbols. */
7324 if (global_entry_stub (h)
d311bc8b 7325 && !alias_readonly_dynrelocs (h))
d1eca1e4
AM
7326 {
7327 h->pointer_equality_needed = 0;
8a2058b5
AM
7328 /* After adjust_dynamic_symbol, non_got_ref set in
7329 the non-pic case means that dyn_relocs for this
7330 symbol should be discarded. */
d1eca1e4
AM
7331 h->non_got_ref = 0;
7332 }
7333
a345bc8d
AM
7334 /* If making a plt entry, then we don't need copy relocs. */
7335 return TRUE;
7336 }
5bd4f169 7337 }
bbd7ec4a 7338 else
411e1bfb 7339 h->plt.plist = NULL;
5bd4f169
AM
7340
7341 /* If this is a weak symbol, and there is a real definition, the
7342 processor independent code will have arranged for us to see the
7343 real definition first, and we can just use the same value. */
f6e332e6 7344 if (h->u.weakdef != NULL)
5bd4f169 7345 {
f6e332e6
AM
7346 BFD_ASSERT (h->u.weakdef->root.type == bfd_link_hash_defined
7347 || h->u.weakdef->root.type == bfd_link_hash_defweak);
7348 h->root.u.def.section = h->u.weakdef->root.u.def.section;
7349 h->root.u.def.value = h->u.weakdef->root.u.def.value;
a23b6845 7350 if (ELIMINATE_COPY_RELOCS)
f6e332e6 7351 h->non_got_ref = h->u.weakdef->non_got_ref;
b34976b6 7352 return TRUE;
5bd4f169
AM
7353 }
7354
5bd4f169
AM
7355 /* If we are creating a shared library, we must presume that the
7356 only references to the symbol are via the global offset table.
7357 For such cases we need not do anything here; the relocations will
7358 be handled correctly by relocate_section. */
0e1862bb 7359 if (bfd_link_pic (info))
b34976b6 7360 return TRUE;
5bd4f169 7361
65f38f15
AM
7362 /* If there are no references to this symbol that do not use the
7363 GOT, we don't need to generate a copy reloc. */
f5385ebf 7364 if (!h->non_got_ref)
b34976b6 7365 return TRUE;
65f38f15 7366
b186458a 7367 /* Don't generate a copy reloc for symbols defined in the executable. */
d93d1c80 7368 if (!h->def_dynamic || !h->ref_regular || h->def_regular
b186458a 7369
d93d1c80
AM
7370 /* If -z nocopyreloc was given, don't generate them either. */
7371 || info->nocopyreloc
a127494f 7372
d93d1c80
AM
7373 /* If we didn't find any dynamic relocs in read-only sections, then
7374 we'll be keeping the dynamic relocs and avoiding the copy reloc. */
d311bc8b 7375 || (ELIMINATE_COPY_RELOCS && !alias_readonly_dynrelocs (h))
65f38f15 7376
d93d1c80
AM
7377 /* Protected variables do not work with .dynbss. The copy in
7378 .dynbss won't be used by the shared library with the protected
7379 definition for the variable. Text relocations are preferable
7380 to an incorrect program. */
7381 || h->protected_def)
a127494f
AM
7382 {
7383 h->non_got_ref = 0;
7384 return TRUE;
7385 }
7386
5d35169e 7387 if (h->plt.plist != NULL)
97b639ba
AM
7388 {
7389 /* We should never get here, but unfortunately there are versions
7390 of gcc out there that improperly (for this ABI) put initialized
7391 function pointers, vtable refs and suchlike in read-only
7392 sections. Allow them to proceed, but warn that this might
7393 break at runtime. */
25f53a85 7394 info->callbacks->einfo
bc30df16 7395 (_("%P: copy reloc against `%T' requires lazy plt linking; "
25f53a85 7396 "avoid setting LD_BIND_NOW=1 or upgrade gcc\n"),
97b639ba
AM
7397 h->root.root.string);
7398 }
5d35169e
AM
7399
7400 /* This is a reference to a symbol defined by a dynamic object which
7401 is not a function. */
7402
5bd4f169
AM
7403 /* We must allocate the symbol in our .dynbss section, which will
7404 become part of the .bss section of the executable. There will be
7405 an entry for this symbol in the .dynsym section. The dynamic
7406 object will contain position independent code, so all references
7407 from the dynamic object to this symbol will go through the global
7408 offset table. The dynamic linker will use the .dynsym entry to
7409 determine the address it must put in the global offset table, so
7410 both the dynamic object and the regular object will refer to the
7411 same memory location for the variable. */
5bd4f169 7412
04c9666a
AM
7413 /* We must generate a R_PPC64_COPY reloc to tell the dynamic linker
7414 to copy the initial value out of the dynamic object and into the
5bd4f169
AM
7415 runtime process image. We need to remember the offset into the
7416 .rela.bss section we are going to use. */
5474d94f
AM
7417 if ((h->root.u.def.section->flags & SEC_READONLY) != 0)
7418 {
7419 s = htab->elf.sdynrelro;
7420 srel = htab->elf.sreldynrelro;
7421 }
7422 else
7423 {
7424 s = htab->elf.sdynbss;
7425 srel = htab->elf.srelbss;
7426 }
1d7e9d18 7427 if ((h->root.u.def.section->flags & SEC_ALLOC) != 0 && h->size != 0)
5bd4f169 7428 {
5474d94f 7429 srel->size += sizeof (Elf64_External_Rela);
f5385ebf 7430 h->needs_copy = 1;
5bd4f169
AM
7431 }
7432
6cabe1ea 7433 return _bfd_elf_adjust_dynamic_copy (info, h, s);
5bd4f169
AM
7434}
7435
e86ce104
AM
7436/* If given a function descriptor symbol, hide both the function code
7437 sym and the descriptor. */
7438static void
4ce794b7
AM
7439ppc64_elf_hide_symbol (struct bfd_link_info *info,
7440 struct elf_link_hash_entry *h,
7441 bfd_boolean force_local)
e86ce104 7442{
34814b9f 7443 struct ppc_link_hash_entry *eh;
e86ce104
AM
7444 _bfd_elf_link_hash_hide_symbol (info, h, force_local);
7445
34814b9f
AM
7446 eh = (struct ppc_link_hash_entry *) h;
7447 if (eh->is_func_descriptor)
e86ce104 7448 {
34814b9f 7449 struct ppc_link_hash_entry *fh = eh->oh;
e86ce104 7450
721956f4 7451 if (fh == NULL)
d1329ca3
AM
7452 {
7453 const char *p, *q;
b8ac2841 7454 struct elf_link_hash_table *htab = elf_hash_table (info);
d1329ca3
AM
7455 char save;
7456
7457 /* We aren't supposed to use alloca in BFD because on
7458 systems which do not have alloca the version in libiberty
7459 calls xmalloc, which might cause the program to crash
7460 when it runs out of memory. This function doesn't have a
7461 return status, so there's no way to gracefully return an
7462 error. So cheat. We know that string[-1] can be safely
34814b9f
AM
7463 accessed; It's either a string in an ELF string table,
7464 or allocated in an objalloc structure. */
d1329ca3 7465
34814b9f 7466 p = eh->elf.root.root.string - 1;
d1329ca3
AM
7467 save = *p;
7468 *(char *) p = '.';
34814b9f 7469 fh = (struct ppc_link_hash_entry *)
b8ac2841 7470 elf_link_hash_lookup (htab, p, FALSE, FALSE, FALSE);
d1329ca3
AM
7471 *(char *) p = save;
7472
7473 /* Unfortunately, if it so happens that the string we were
7474 looking for was allocated immediately before this string,
7475 then we overwrote the string terminator. That's the only
7476 reason the lookup should fail. */
7477 if (fh == NULL)
7478 {
34814b9f
AM
7479 q = eh->elf.root.root.string + strlen (eh->elf.root.root.string);
7480 while (q >= eh->elf.root.root.string && *q == *p)
d1329ca3 7481 --q, --p;
34814b9f
AM
7482 if (q < eh->elf.root.root.string && *p == '.')
7483 fh = (struct ppc_link_hash_entry *)
b8ac2841 7484 elf_link_hash_lookup (htab, p, FALSE, FALSE, FALSE);
d1329ca3
AM
7485 }
7486 if (fh != NULL)
7487 {
34814b9f
AM
7488 eh->oh = fh;
7489 fh->oh = eh;
d1329ca3
AM
7490 }
7491 }
e86ce104 7492 if (fh != NULL)
34814b9f 7493 _bfd_elf_link_hash_hide_symbol (info, &fh->elf, force_local);
e86ce104
AM
7494 }
7495}
7496
411e1bfb 7497static bfd_boolean
8843416a
AM
7498get_sym_h (struct elf_link_hash_entry **hp,
7499 Elf_Internal_Sym **symp,
7500 asection **symsecp,
f961d9dd 7501 unsigned char **tls_maskp,
8843416a
AM
7502 Elf_Internal_Sym **locsymsp,
7503 unsigned long r_symndx,
7504 bfd *ibfd)
411e1bfb 7505{
0ffa91dd 7506 Elf_Internal_Shdr *symtab_hdr = &elf_symtab_hdr (ibfd);
411e1bfb
AM
7507
7508 if (r_symndx >= symtab_hdr->sh_info)
7509 {
7510 struct elf_link_hash_entry **sym_hashes = elf_sym_hashes (ibfd);
7511 struct elf_link_hash_entry *h;
7512
7513 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
b31867b6 7514 h = elf_follow_link (h);
411e1bfb
AM
7515
7516 if (hp != NULL)
7517 *hp = h;
7518
7519 if (symp != NULL)
7520 *symp = NULL;
7521
7522 if (symsecp != NULL)
7523 {
7524 asection *symsec = NULL;
7525 if (h->root.type == bfd_link_hash_defined
7526 || h->root.type == bfd_link_hash_defweak)
7527 symsec = h->root.u.def.section;
7528 *symsecp = symsec;
7529 }
7530
e7b938ca 7531 if (tls_maskp != NULL)
411e1bfb
AM
7532 {
7533 struct ppc_link_hash_entry *eh;
7534
7535 eh = (struct ppc_link_hash_entry *) h;
e7b938ca 7536 *tls_maskp = &eh->tls_mask;
411e1bfb
AM
7537 }
7538 }
7539 else
7540 {
7541 Elf_Internal_Sym *sym;
7542 Elf_Internal_Sym *locsyms = *locsymsp;
7543
7544 if (locsyms == NULL)
7545 {
7546 locsyms = (Elf_Internal_Sym *) symtab_hdr->contents;
7547 if (locsyms == NULL)
7548 locsyms = bfd_elf_get_elf_syms (ibfd, symtab_hdr,
7549 symtab_hdr->sh_info,
7550 0, NULL, NULL, NULL);
7551 if (locsyms == NULL)
7552 return FALSE;
7553 *locsymsp = locsyms;
7554 }
7555 sym = locsyms + r_symndx;
7556
7557 if (hp != NULL)
7558 *hp = NULL;
7559
7560 if (symp != NULL)
7561 *symp = sym;
7562
7563 if (symsecp != NULL)
cb33740c 7564 *symsecp = bfd_section_from_elf_index (ibfd, sym->st_shndx);
411e1bfb 7565
e7b938ca 7566 if (tls_maskp != NULL)
411e1bfb
AM
7567 {
7568 struct got_entry **lgot_ents;
f961d9dd 7569 unsigned char *tls_mask;
411e1bfb 7570
e7b938ca 7571 tls_mask = NULL;
411e1bfb
AM
7572 lgot_ents = elf_local_got_ents (ibfd);
7573 if (lgot_ents != NULL)
7574 {
e054468f
AM
7575 struct plt_entry **local_plt = (struct plt_entry **)
7576 (lgot_ents + symtab_hdr->sh_info);
f961d9dd 7577 unsigned char *lgot_masks = (unsigned char *)
e054468f 7578 (local_plt + symtab_hdr->sh_info);
e7b938ca 7579 tls_mask = &lgot_masks[r_symndx];
411e1bfb 7580 }
e7b938ca 7581 *tls_maskp = tls_mask;
411e1bfb
AM
7582 }
7583 }
7584 return TRUE;
7585}
7586
e7b938ca 7587/* Returns TLS_MASKP for the given REL symbol. Function return is 0 on
951fd09b 7588 error, 2 on a toc GD type suitable for optimization, 3 on a toc LD
ad8e1ba5 7589 type suitable for optimization, and 1 otherwise. */
951fd09b
AM
7590
7591static int
f961d9dd 7592get_tls_mask (unsigned char **tls_maskp,
3a71aa26
AM
7593 unsigned long *toc_symndx,
7594 bfd_vma *toc_addend,
0d4792f7 7595 Elf_Internal_Sym **locsymsp,
3a71aa26
AM
7596 const Elf_Internal_Rela *rel,
7597 bfd *ibfd)
411e1bfb
AM
7598{
7599 unsigned long r_symndx;
0d4792f7 7600 int next_r;
411e1bfb
AM
7601 struct elf_link_hash_entry *h;
7602 Elf_Internal_Sym *sym;
7603 asection *sec;
7604 bfd_vma off;
7605
7606 r_symndx = ELF64_R_SYM (rel->r_info);
e7b938ca 7607 if (!get_sym_h (&h, &sym, &sec, tls_maskp, locsymsp, r_symndx, ibfd))
951fd09b 7608 return 0;
411e1bfb 7609
e7b938ca 7610 if ((*tls_maskp != NULL && **tls_maskp != 0)
411e1bfb 7611 || sec == NULL
6bee8834 7612 || ppc64_elf_section_data (sec) == NULL
7c8fe5c4 7613 || ppc64_elf_section_data (sec)->sec_type != sec_toc)
951fd09b 7614 return 1;
411e1bfb
AM
7615
7616 /* Look inside a TOC section too. */
7617 if (h != NULL)
7618 {
7619 BFD_ASSERT (h->root.type == bfd_link_hash_defined);
7620 off = h->root.u.def.value;
7621 }
7622 else
7623 off = sym->st_value;
7624 off += rel->r_addend;
7625 BFD_ASSERT (off % 8 == 0);
3a71aa26
AM
7626 r_symndx = ppc64_elf_section_data (sec)->u.toc.symndx[off / 8];
7627 next_r = ppc64_elf_section_data (sec)->u.toc.symndx[off / 8 + 1];
0d4792f7
AM
7628 if (toc_symndx != NULL)
7629 *toc_symndx = r_symndx;
3a71aa26
AM
7630 if (toc_addend != NULL)
7631 *toc_addend = ppc64_elf_section_data (sec)->u.toc.add[off / 8];
7632 if (!get_sym_h (&h, &sym, &sec, tls_maskp, locsymsp, r_symndx, ibfd))
7633 return 0;
854b41e7 7634 if ((h == NULL || is_static_defined (h))
0d4792f7
AM
7635 && (next_r == -1 || next_r == -2))
7636 return 1 - next_r;
951fd09b 7637 return 1;
411e1bfb
AM
7638}
7639
3b421ab3
AM
7640/* Find (or create) an entry in the tocsave hash table. */
7641
7642static struct tocsave_entry *
7643tocsave_find (struct ppc_link_hash_table *htab,
7644 enum insert_option insert,
7645 Elf_Internal_Sym **local_syms,
7646 const Elf_Internal_Rela *irela,
7647 bfd *ibfd)
7648{
7649 unsigned long r_indx;
7650 struct elf_link_hash_entry *h;
7651 Elf_Internal_Sym *sym;
7652 struct tocsave_entry ent, *p;
7653 hashval_t hash;
7654 struct tocsave_entry **slot;
7655
7656 r_indx = ELF64_R_SYM (irela->r_info);
7657 if (!get_sym_h (&h, &sym, &ent.sec, NULL, local_syms, r_indx, ibfd))
7658 return NULL;
7659 if (ent.sec == NULL || ent.sec->output_section == NULL)
7660 {
4eca0228 7661 _bfd_error_handler
10463f39 7662 (_("%B: undefined symbol on R_PPC64_TOCSAVE relocation"), ibfd);
3b421ab3
AM
7663 return NULL;
7664 }
7665
7666 if (h != NULL)
7667 ent.offset = h->root.u.def.value;
7668 else
7669 ent.offset = sym->st_value;
7670 ent.offset += irela->r_addend;
7671
7672 hash = tocsave_htab_hash (&ent);
7673 slot = ((struct tocsave_entry **)
7674 htab_find_slot_with_hash (htab->tocsave_htab, &ent, hash, insert));
7675 if (slot == NULL)
7676 return NULL;
7677
7678 if (*slot == NULL)
7679 {
7680 p = (struct tocsave_entry *) bfd_alloc (ibfd, sizeof (*p));
7681 if (p == NULL)
7682 return NULL;
7683 *p = ent;
7684 *slot = p;
7685 }
7686 return *slot;
7687}
7688
754021d0 7689/* Adjust all global syms defined in opd sections. In gcc generated
8387904d 7690 code for the old ABI, these will already have been done. */
754021d0
AM
7691
7692static bfd_boolean
7693adjust_opd_syms (struct elf_link_hash_entry *h, void *inf ATTRIBUTE_UNUSED)
7694{
7695 struct ppc_link_hash_entry *eh;
7696 asection *sym_sec;
74f0fb50 7697 struct _opd_sec_data *opd;
754021d0
AM
7698
7699 if (h->root.type == bfd_link_hash_indirect)
7700 return TRUE;
7701
754021d0
AM
7702 if (h->root.type != bfd_link_hash_defined
7703 && h->root.type != bfd_link_hash_defweak)
7704 return TRUE;
7705
7706 eh = (struct ppc_link_hash_entry *) h;
7707 if (eh->adjust_done)
7708 return TRUE;
7709
7710 sym_sec = eh->elf.root.u.def.section;
74f0fb50
AM
7711 opd = get_opd_info (sym_sec);
7712 if (opd != NULL && opd->adjust != NULL)
754021d0 7713 {
51aecdc5 7714 long adjust = opd->adjust[OPD_NDX (eh->elf.root.u.def.value)];
4025353c
AM
7715 if (adjust == -1)
7716 {
7717 /* This entry has been deleted. */
b3fac117 7718 asection *dsec = ppc64_elf_tdata (sym_sec->owner)->deleted_section;
81688140
AM
7719 if (dsec == NULL)
7720 {
7721 for (dsec = sym_sec->owner->sections; dsec; dsec = dsec->next)
dbaa2011 7722 if (discarded_section (dsec))
81688140 7723 {
b3fac117 7724 ppc64_elf_tdata (sym_sec->owner)->deleted_section = dsec;
81688140
AM
7725 break;
7726 }
7727 }
4025353c 7728 eh->elf.root.u.def.value = 0;
81688140 7729 eh->elf.root.u.def.section = dsec;
4025353c
AM
7730 }
7731 else
7732 eh->elf.root.u.def.value += adjust;
754021d0
AM
7733 eh->adjust_done = 1;
7734 }
7735 return TRUE;
7736}
7737
8c1d1bb8 7738/* Handles decrementing dynamic reloc counts for the reloc specified by
19e08130 7739 R_INFO in section SEC. If LOCAL_SYMS is NULL, then H and SYM
8c1d1bb8
AM
7740 have already been determined. */
7741
7742static bfd_boolean
7743dec_dynrel_count (bfd_vma r_info,
7744 asection *sec,
7745 struct bfd_link_info *info,
7746 Elf_Internal_Sym **local_syms,
7747 struct elf_link_hash_entry *h,
19e08130 7748 Elf_Internal_Sym *sym)
8c1d1bb8
AM
7749{
7750 enum elf_ppc64_reloc_type r_type;
19e08130 7751 asection *sym_sec = NULL;
8c1d1bb8
AM
7752
7753 /* Can this reloc be dynamic? This switch, and later tests here
7754 should be kept in sync with the code in check_relocs. */
7755 r_type = ELF64_R_TYPE (r_info);
7756 switch (r_type)
7757 {
7758 default:
7759 return TRUE;
7760
7761 case R_PPC64_TPREL16:
7762 case R_PPC64_TPREL16_LO:
7763 case R_PPC64_TPREL16_HI:
7764 case R_PPC64_TPREL16_HA:
7765 case R_PPC64_TPREL16_DS:
7766 case R_PPC64_TPREL16_LO_DS:
f9c6b907
AM
7767 case R_PPC64_TPREL16_HIGH:
7768 case R_PPC64_TPREL16_HIGHA:
8c1d1bb8
AM
7769 case R_PPC64_TPREL16_HIGHER:
7770 case R_PPC64_TPREL16_HIGHERA:
7771 case R_PPC64_TPREL16_HIGHEST:
7772 case R_PPC64_TPREL16_HIGHESTA:
0e1862bb 7773 if (!bfd_link_pic (info))
8c1d1bb8
AM
7774 return TRUE;
7775
7776 case R_PPC64_TPREL64:
7777 case R_PPC64_DTPMOD64:
7778 case R_PPC64_DTPREL64:
7779 case R_PPC64_ADDR64:
7780 case R_PPC64_REL30:
7781 case R_PPC64_REL32:
7782 case R_PPC64_REL64:
7783 case R_PPC64_ADDR14:
7784 case R_PPC64_ADDR14_BRNTAKEN:
7785 case R_PPC64_ADDR14_BRTAKEN:
7786 case R_PPC64_ADDR16:
7787 case R_PPC64_ADDR16_DS:
7788 case R_PPC64_ADDR16_HA:
7789 case R_PPC64_ADDR16_HI:
f9c6b907
AM
7790 case R_PPC64_ADDR16_HIGH:
7791 case R_PPC64_ADDR16_HIGHA:
8c1d1bb8
AM
7792 case R_PPC64_ADDR16_HIGHER:
7793 case R_PPC64_ADDR16_HIGHERA:
7794 case R_PPC64_ADDR16_HIGHEST:
7795 case R_PPC64_ADDR16_HIGHESTA:
7796 case R_PPC64_ADDR16_LO:
7797 case R_PPC64_ADDR16_LO_DS:
7798 case R_PPC64_ADDR24:
7799 case R_PPC64_ADDR32:
7800 case R_PPC64_UADDR16:
7801 case R_PPC64_UADDR32:
7802 case R_PPC64_UADDR64:
7803 case R_PPC64_TOC:
7804 break;
7805 }
7806
7807 if (local_syms != NULL)
7808 {
7809 unsigned long r_symndx;
8c1d1bb8
AM
7810 bfd *ibfd = sec->owner;
7811
7812 r_symndx = ELF64_R_SYM (r_info);
7813 if (!get_sym_h (&h, &sym, &sym_sec, NULL, local_syms, r_symndx, ibfd))
7814 return FALSE;
7815 }
7816
0e1862bb 7817 if ((bfd_link_pic (info)
1d483afe 7818 && (must_be_dyn_reloc (info, r_type)
8c1d1bb8 7819 || (h != NULL
198f1157 7820 && (!SYMBOLIC_BIND (info, h)
8c1d1bb8
AM
7821 || h->root.type == bfd_link_hash_defweak
7822 || !h->def_regular))))
7823 || (ELIMINATE_COPY_RELOCS
0e1862bb 7824 && !bfd_link_pic (info)
8c1d1bb8
AM
7825 && h != NULL
7826 && (h->root.type == bfd_link_hash_defweak
7827 || !h->def_regular)))
7828 ;
7829 else
7830 return TRUE;
7831
7832 if (h != NULL)
6edfbbad 7833 {
19e08130
AM
7834 struct elf_dyn_relocs *p;
7835 struct elf_dyn_relocs **pp;
7836 pp = &((struct ppc_link_hash_entry *) h)->dyn_relocs;
7837
7838 /* elf_gc_sweep may have already removed all dyn relocs associated
7839 with local syms for a given section. Also, symbol flags are
7840 changed by elf_gc_sweep_symbol, confusing the test above. Don't
7841 report a dynreloc miscount. */
7842 if (*pp == NULL && info->gc_sections)
7843 return TRUE;
7844
7845 while ((p = *pp) != NULL)
60124e18 7846 {
19e08130
AM
7847 if (p->sec == sec)
7848 {
7849 if (!must_be_dyn_reloc (info, r_type))
7850 p->pc_count -= 1;
7851 p->count -= 1;
7852 if (p->count == 0)
7853 *pp = p->next;
7854 return TRUE;
7855 }
7856 pp = &p->next;
60124e18 7857 }
6edfbbad 7858 }
19e08130
AM
7859 else
7860 {
7861 struct ppc_dyn_relocs *p;
7862 struct ppc_dyn_relocs **pp;
7863 void *vpp;
7864 bfd_boolean is_ifunc;
8c1d1bb8 7865
19e08130
AM
7866 if (local_syms == NULL)
7867 sym_sec = bfd_section_from_elf_index (sec->owner, sym->st_shndx);
7868 if (sym_sec == NULL)
7869 sym_sec = sec;
c57da1a7 7870
19e08130
AM
7871 vpp = &elf_section_data (sym_sec)->local_dynrel;
7872 pp = (struct ppc_dyn_relocs **) vpp;
7873
7874 if (*pp == NULL && info->gc_sections)
7875 return TRUE;
7876
7877 is_ifunc = ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC;
7878 while ((p = *pp) != NULL)
8c1d1bb8 7879 {
19e08130
AM
7880 if (p->sec == sec && p->ifunc == is_ifunc)
7881 {
7882 p->count -= 1;
7883 if (p->count == 0)
7884 *pp = p->next;
7885 return TRUE;
7886 }
7887 pp = &p->next;
8c1d1bb8 7888 }
8c1d1bb8
AM
7889 }
7890
695344c0 7891 /* xgettext:c-format */
8de848d8 7892 info->callbacks->einfo (_("%P: dynreloc miscount for %B, section %A\n"),
25f53a85 7893 sec->owner, sec);
8c1d1bb8
AM
7894 bfd_set_error (bfd_error_bad_value);
7895 return FALSE;
7896}
7897
754021d0
AM
7898/* Remove unused Official Procedure Descriptor entries. Currently we
7899 only remove those associated with functions in discarded link-once
7900 sections, or weakly defined functions that have been overridden. It
7901 would be possible to remove many more entries for statically linked
7902 applications. */
7903
b34976b6 7904bfd_boolean
e7d1c40c 7905ppc64_elf_edit_opd (struct bfd_link_info *info)
1e2f5b6e
AM
7906{
7907 bfd *ibfd;
754021d0 7908 bfd_boolean some_edited = FALSE;
3f764659 7909 asection *need_pad = NULL;
e7d1c40c
AM
7910 struct ppc_link_hash_table *htab;
7911
7912 htab = ppc_hash_table (info);
7913 if (htab == NULL)
7914 return FALSE;
1e2f5b6e 7915
c72f2fb2 7916 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
1e2f5b6e
AM
7917 {
7918 asection *sec;
7919 Elf_Internal_Rela *relstart, *rel, *relend;
7920 Elf_Internal_Shdr *symtab_hdr;
6cdc0ccc 7921 Elf_Internal_Sym *local_syms;
74f0fb50 7922 struct _opd_sec_data *opd;
51aecdc5 7923 bfd_boolean need_edit, add_aux_fields, broken;
3f764659 7924 bfd_size_type cnt_16b = 0;
1e2f5b6e 7925
854b41e7
AM
7926 if (!is_ppc64_elf (ibfd))
7927 continue;
7928
1e2f5b6e 7929 sec = bfd_get_section_by_name (ibfd, ".opd");
46de2a7c 7930 if (sec == NULL || sec->size == 0)
1e2f5b6e
AM
7931 continue;
7932
dbaa2011 7933 if (sec->sec_info_type == SEC_INFO_TYPE_JUST_SYMS)
4b85d634
AM
7934 continue;
7935
1e2f5b6e
AM
7936 if (sec->output_section == bfd_abs_section_ptr)
7937 continue;
7938
7939 /* Look through the section relocs. */
7940 if ((sec->flags & SEC_RELOC) == 0 || sec->reloc_count == 0)
7941 continue;
7942
6cdc0ccc 7943 local_syms = NULL;
0ffa91dd 7944 symtab_hdr = &elf_symtab_hdr (ibfd);
1e2f5b6e
AM
7945
7946 /* Read the relocations. */
4ce794b7 7947 relstart = _bfd_elf_link_read_relocs (ibfd, sec, NULL, NULL,
45d6a902 7948 info->keep_memory);
1e2f5b6e 7949 if (relstart == NULL)
b34976b6 7950 return FALSE;
1e2f5b6e
AM
7951
7952 /* First run through the relocs to check they are sane, and to
7953 determine whether we need to edit this opd section. */
b34976b6 7954 need_edit = FALSE;
51aecdc5 7955 broken = FALSE;
3f764659 7956 need_pad = sec;
1e2f5b6e 7957 relend = relstart + sec->reloc_count;
50bc7936 7958 for (rel = relstart; rel < relend; )
1e2f5b6e 7959 {
04c9666a 7960 enum elf_ppc64_reloc_type r_type;
1e2f5b6e
AM
7961 unsigned long r_symndx;
7962 asection *sym_sec;
7963 struct elf_link_hash_entry *h;
7964 Elf_Internal_Sym *sym;
51aecdc5 7965 bfd_vma offset;
1e2f5b6e 7966
51aecdc5 7967 /* .opd contains an array of 16 or 24 byte entries. We're
1e2f5b6e
AM
7968 only interested in the reloc pointing to a function entry
7969 point. */
51aecdc5
AM
7970 offset = rel->r_offset;
7971 if (rel + 1 == relend
7972 || rel[1].r_offset != offset + 8)
1e2f5b6e
AM
7973 {
7974 /* If someone messes with .opd alignment then after a
7975 "ld -r" we might have padding in the middle of .opd.
7976 Also, there's nothing to prevent someone putting
7977 something silly in .opd with the assembler. No .opd
b34976b6 7978 optimization for them! */
3f764659 7979 broken_opd:
4eca0228 7980 _bfd_error_handler
d003868e 7981 (_("%B: .opd is not a regular array of opd entries"), ibfd);
51aecdc5 7982 broken = TRUE;
1e2f5b6e
AM
7983 break;
7984 }
7985
50bc7936
AM
7986 if ((r_type = ELF64_R_TYPE (rel->r_info)) != R_PPC64_ADDR64
7987 || (r_type = ELF64_R_TYPE ((rel + 1)->r_info)) != R_PPC64_TOC)
7988 {
4eca0228 7989 _bfd_error_handler
695344c0 7990 /* xgettext:c-format */
d003868e
AM
7991 (_("%B: unexpected reloc type %u in .opd section"),
7992 ibfd, r_type);
51aecdc5 7993 broken = TRUE;
50bc7936
AM
7994 break;
7995 }
7996
1e2f5b6e 7997 r_symndx = ELF64_R_SYM (rel->r_info);
411e1bfb
AM
7998 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms,
7999 r_symndx, ibfd))
50bc7936 8000 goto error_ret;
1e2f5b6e
AM
8001
8002 if (sym_sec == NULL || sym_sec->owner == NULL)
8003 {
411e1bfb
AM
8004 const char *sym_name;
8005 if (h != NULL)
8006 sym_name = h->root.root.string;
8007 else
26c61ae5
L
8008 sym_name = bfd_elf_sym_name (ibfd, symtab_hdr, sym,
8009 sym_sec);
411e1bfb 8010
4eca0228 8011 _bfd_error_handler
695344c0 8012 /* xgettext:c-format */
d003868e
AM
8013 (_("%B: undefined sym `%s' in .opd section"),
8014 ibfd, sym_name);
51aecdc5 8015 broken = TRUE;
1e2f5b6e
AM
8016 break;
8017 }
8018
51020317
AM
8019 /* opd entries are always for functions defined in the
8020 current input bfd. If the symbol isn't defined in the
8021 input bfd, then we won't be using the function in this
8022 bfd; It must be defined in a linkonce section in another
8023 bfd, or is weak. It's also possible that we are
8024 discarding the function due to a linker script /DISCARD/,
8025 which we test for via the output_section. */
8026 if (sym_sec->owner != ibfd
8027 || sym_sec->output_section == bfd_abs_section_ptr)
b34976b6 8028 need_edit = TRUE;
1e2f5b6e 8029
50bc7936 8030 rel += 2;
51aecdc5
AM
8031 if (rel + 1 == relend
8032 || (rel + 2 < relend
8033 && ELF64_R_TYPE (rel[2].r_info) == R_PPC64_TOC))
8034 ++rel;
8035
8036 if (rel == relend)
3f764659
JJ
8037 {
8038 if (sec->size == offset + 24)
8039 {
8040 need_pad = NULL;
8041 break;
8042 }
51aecdc5 8043 if (sec->size == offset + 16)
3f764659
JJ
8044 {
8045 cnt_16b++;
8046 break;
8047 }
8048 goto broken_opd;
8049 }
3f764659
JJ
8050 else if (rel + 1 < relend
8051 && ELF64_R_TYPE (rel[0].r_info) == R_PPC64_ADDR64
8052 && ELF64_R_TYPE (rel[1].r_info) == R_PPC64_TOC)
8053 {
51aecdc5
AM
8054 if (rel[0].r_offset == offset + 16)
8055 cnt_16b++;
8056 else if (rel[0].r_offset != offset + 24)
8057 goto broken_opd;
3f764659
JJ
8058 }
8059 else
8060 goto broken_opd;
1e2f5b6e
AM
8061 }
8062
e7d1c40c 8063 add_aux_fields = htab->params->non_overlapping_opd && cnt_16b > 0;
3f764659 8064
51aecdc5 8065 if (!broken && (need_edit || add_aux_fields))
1e2f5b6e
AM
8066 {
8067 Elf_Internal_Rela *write_rel;
d4730f92 8068 Elf_Internal_Shdr *rel_hdr;
1e2f5b6e 8069 bfd_byte *rptr, *wptr;
983bddc8 8070 bfd_byte *new_contents;
74f0fb50
AM
8071 bfd_size_type amt;
8072
983bddc8 8073 new_contents = NULL;
51aecdc5 8074 amt = OPD_NDX (sec->size) * sizeof (long);
74f0fb50 8075 opd = &ppc64_elf_section_data (sec)->u.opd;
33c0ec9d 8076 opd->adjust = bfd_zalloc (sec->owner, amt);
74f0fb50
AM
8077 if (opd->adjust == NULL)
8078 return FALSE;
8079 ppc64_elf_section_data (sec)->sec_type = sec_opd;
1e2f5b6e
AM
8080
8081 /* This seems a waste of time as input .opd sections are all
8082 zeros as generated by gcc, but I suppose there's no reason
8083 this will always be so. We might start putting something in
8084 the third word of .opd entries. */
8085 if ((sec->flags & SEC_IN_MEMORY) == 0)
8086 {
eea6121a
AM
8087 bfd_byte *loc;
8088 if (!bfd_malloc_and_get_section (ibfd, sec, &loc))
6cdc0ccc 8089 {
eea6121a
AM
8090 if (loc != NULL)
8091 free (loc);
50bc7936 8092 error_ret:
6cdc0ccc
AM
8093 if (local_syms != NULL
8094 && symtab_hdr->contents != (unsigned char *) local_syms)
8095 free (local_syms);
6cdc0ccc
AM
8096 if (elf_section_data (sec)->relocs != relstart)
8097 free (relstart);
b34976b6 8098 return FALSE;
6cdc0ccc 8099 }
1e2f5b6e
AM
8100 sec->contents = loc;
8101 sec->flags |= (SEC_IN_MEMORY | SEC_HAS_CONTENTS);
8102 }
8103
8104 elf_section_data (sec)->relocs = relstart;
8105
3f764659 8106 new_contents = sec->contents;
3f764659
JJ
8107 if (add_aux_fields)
8108 {
8109 new_contents = bfd_malloc (sec->size + cnt_16b * 8);
8110 if (new_contents == NULL)
8111 return FALSE;
51aecdc5 8112 need_pad = NULL;
3f764659 8113 }
b4f4e59f
AM
8114 wptr = new_contents;
8115 rptr = sec->contents;
1e2f5b6e 8116 write_rel = relstart;
51aecdc5 8117 for (rel = relstart; rel < relend; )
1e2f5b6e 8118 {
50bc7936
AM
8119 unsigned long r_symndx;
8120 asection *sym_sec;
8121 struct elf_link_hash_entry *h;
51aecdc5 8122 struct ppc_link_hash_entry *fdh = NULL;
50bc7936 8123 Elf_Internal_Sym *sym;
51aecdc5
AM
8124 long opd_ent_size;
8125 Elf_Internal_Rela *next_rel;
8126 bfd_boolean skip;
50bc7936
AM
8127
8128 r_symndx = ELF64_R_SYM (rel->r_info);
8129 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms,
d37c89e5 8130 r_symndx, ibfd))
50bc7936
AM
8131 goto error_ret;
8132
51aecdc5
AM
8133 next_rel = rel + 2;
8134 if (next_rel + 1 == relend
8135 || (next_rel + 2 < relend
8136 && ELF64_R_TYPE (next_rel[2].r_info) == R_PPC64_TOC))
8137 ++next_rel;
8138
8139 /* See if the .opd entry is full 24 byte or
8140 16 byte (with fd_aux entry overlapped with next
8141 fd_func). */
8142 opd_ent_size = 24;
8143 if (next_rel == relend)
1e2f5b6e 8144 {
51aecdc5 8145 if (sec->size == rel->r_offset + 16)
3f764659 8146 opd_ent_size = 16;
51aecdc5
AM
8147 }
8148 else if (next_rel->r_offset == rel->r_offset + 16)
8149 opd_ent_size = 16;
3f764659 8150
51aecdc5
AM
8151 if (h != NULL
8152 && h->root.root.string[0] == '.')
8153 {
8c5b4e52
AM
8154 fdh = ((struct ppc_link_hash_entry *) h)->oh;
8155 if (fdh != NULL)
8156 {
8157 fdh = ppc_follow_link (fdh);
8158 if (fdh->elf.root.type != bfd_link_hash_defined
8159 && fdh->elf.root.type != bfd_link_hash_defweak)
8160 fdh = NULL;
8161 }
51aecdc5 8162 }
1e2f5b6e 8163
51aecdc5
AM
8164 skip = (sym_sec->owner != ibfd
8165 || sym_sec->output_section == bfd_abs_section_ptr);
8166 if (skip)
8167 {
8168 if (fdh != NULL && sym_sec->owner == ibfd)
a4aa0fb7 8169 {
51aecdc5
AM
8170 /* Arrange for the function descriptor sym
8171 to be dropped. */
8172 fdh->elf.root.u.def.value = 0;
8173 fdh->elf.root.u.def.section = sym_sec;
a4aa0fb7 8174 }
51aecdc5 8175 opd->adjust[OPD_NDX (rel->r_offset)] = -1;
1e2f5b6e 8176
0e1862bb 8177 if (NO_OPD_RELOCS || bfd_link_relocatable (info))
51aecdc5
AM
8178 rel = next_rel;
8179 else
8180 while (1)
8181 {
8182 if (!dec_dynrel_count (rel->r_info, sec, info,
8183 NULL, h, sym))
8184 goto error_ret;
754021d0 8185
51aecdc5
AM
8186 if (++rel == next_rel)
8187 break;
1e2f5b6e 8188
51aecdc5
AM
8189 r_symndx = ELF64_R_SYM (rel->r_info);
8190 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms,
8191 r_symndx, ibfd))
8192 goto error_ret;
8193 }
50bc7936
AM
8194 }
8195 else
1e2f5b6e 8196 {
51aecdc5
AM
8197 /* We'll be keeping this opd entry. */
8198 long adjust;
8199
8200 if (fdh != NULL)
8201 {
8202 /* Redefine the function descriptor symbol to
8203 this location in the opd section. It is
8204 necessary to update the value here rather
8205 than using an array of adjustments as we do
8206 for local symbols, because various places
8207 in the generic ELF code use the value
8208 stored in u.def.value. */
8209 fdh->elf.root.u.def.value = wptr - new_contents;
8210 fdh->adjust_done = 1;
8211 }
8212
8213 /* Local syms are a bit tricky. We could
8214 tweak them as they can be cached, but
8215 we'd need to look through the local syms
8216 for the function descriptor sym which we
8217 don't have at the moment. So keep an
8218 array of adjustments. */
8219 adjust = (wptr - new_contents) - (rptr - sec->contents);
8220 opd->adjust[OPD_NDX (rel->r_offset)] = adjust;
8221
8222 if (wptr != rptr)
8223 memcpy (wptr, rptr, opd_ent_size);
8224 wptr += opd_ent_size;
8225 if (add_aux_fields && opd_ent_size == 16)
8226 {
8227 memset (wptr, '\0', 8);
8228 wptr += 8;
8229 }
8230
50bc7936 8231 /* We need to adjust any reloc offsets to point to the
51aecdc5
AM
8232 new opd entries. */
8233 for ( ; rel != next_rel; ++rel)
8234 {
8235 rel->r_offset += adjust;
8236 if (write_rel != rel)
8237 memcpy (write_rel, rel, sizeof (*rel));
8238 ++write_rel;
8239 }
1e2f5b6e 8240 }
51aecdc5
AM
8241
8242 rptr += opd_ent_size;
1e2f5b6e
AM
8243 }
8244
3f764659 8245 sec->size = wptr - new_contents;
1e2f5b6e 8246 sec->reloc_count = write_rel - relstart;
3f764659
JJ
8247 if (add_aux_fields)
8248 {
8249 free (sec->contents);
8250 sec->contents = new_contents;
8251 }
8252
05bf9422 8253 /* Fudge the header size too, as this is used later in
cdcf6e38 8254 elf_bfd_final_link if we are emitting relocs. */
d4730f92
BS
8255 rel_hdr = _bfd_elf_single_rel_hdr (sec);
8256 rel_hdr->sh_size = sec->reloc_count * rel_hdr->sh_entsize;
754021d0 8257 some_edited = TRUE;
1e2f5b6e 8258 }
6cdc0ccc 8259 else if (elf_section_data (sec)->relocs != relstart)
1e2f5b6e 8260 free (relstart);
6cdc0ccc 8261
411e1bfb
AM
8262 if (local_syms != NULL
8263 && symtab_hdr->contents != (unsigned char *) local_syms)
8264 {
8265 if (!info->keep_memory)
8266 free (local_syms);
8267 else
8268 symtab_hdr->contents = (unsigned char *) local_syms;
8269 }
8270 }
8271
754021d0
AM
8272 if (some_edited)
8273 elf_link_hash_traverse (elf_hash_table (info), adjust_opd_syms, NULL);
8274
3f764659
JJ
8275 /* If we are doing a final link and the last .opd entry is just 16 byte
8276 long, add a 8 byte padding after it. */
0e1862bb 8277 if (need_pad != NULL && !bfd_link_relocatable (info))
3f764659
JJ
8278 {
8279 bfd_byte *p;
8280
8281 if ((need_pad->flags & SEC_IN_MEMORY) == 0)
8282 {
8283 BFD_ASSERT (need_pad->size > 0);
8284
8285 p = bfd_malloc (need_pad->size + 8);
8286 if (p == NULL)
8287 return FALSE;
699733f6 8288
3f764659
JJ
8289 if (! bfd_get_section_contents (need_pad->owner, need_pad,
8290 p, 0, need_pad->size))
8291 return FALSE;
8292
8293 need_pad->contents = p;
8294 need_pad->flags |= (SEC_IN_MEMORY | SEC_HAS_CONTENTS);
8295 }
8296 else
8297 {
8298 p = bfd_realloc (need_pad->contents, need_pad->size + 8);
8299 if (p == NULL)
8300 return FALSE;
8301
8302 need_pad->contents = p;
8303 }
8304
8305 memset (need_pad->contents + need_pad->size, 0, 8);
8306 need_pad->size += 8;
8307 }
8308
411e1bfb
AM
8309 return TRUE;
8310}
8311
e1918d23 8312/* Set htab->tls_get_addr and call the generic ELF tls_setup function. */
411e1bfb 8313
e1918d23 8314asection *
e7d1c40c 8315ppc64_elf_tls_setup (struct bfd_link_info *info)
411e1bfb 8316{
411e1bfb
AM
8317 struct ppc_link_hash_table *htab;
8318
411e1bfb 8319 htab = ppc_hash_table (info);
4dfe6ac6
NC
8320 if (htab == NULL)
8321 return NULL;
8322
ee67d69a
AM
8323 if (abiversion (info->output_bfd) == 1)
8324 htab->opd_abi = 1;
8325
e7d1c40c 8326 if (htab->params->no_multi_toc)
33c0ec9d
AM
8327 htab->do_multi_toc = 0;
8328 else if (!htab->do_multi_toc)
e7d1c40c 8329 htab->params->no_multi_toc = 1;
33c0ec9d 8330
3a71aa26
AM
8331 htab->tls_get_addr = ((struct ppc_link_hash_entry *)
8332 elf_link_hash_lookup (&htab->elf, ".__tls_get_addr",
8333 FALSE, FALSE, TRUE));
a7f2871e
AM
8334 /* Move dynamic linking info to the function descriptor sym. */
8335 if (htab->tls_get_addr != NULL)
8336 func_desc_adjust (&htab->tls_get_addr->elf, info);
3a71aa26
AM
8337 htab->tls_get_addr_fd = ((struct ppc_link_hash_entry *)
8338 elf_link_hash_lookup (&htab->elf, "__tls_get_addr",
8339 FALSE, FALSE, TRUE));
7c9cf415 8340 if (htab->params->tls_get_addr_opt)
a7f2871e
AM
8341 {
8342 struct elf_link_hash_entry *opt, *opt_fd, *tga, *tga_fd;
8343
8344 opt = elf_link_hash_lookup (&htab->elf, ".__tls_get_addr_opt",
8345 FALSE, FALSE, TRUE);
8346 if (opt != NULL)
8347 func_desc_adjust (opt, info);
8348 opt_fd = elf_link_hash_lookup (&htab->elf, "__tls_get_addr_opt",
8349 FALSE, FALSE, TRUE);
8350 if (opt_fd != NULL
8351 && (opt_fd->root.type == bfd_link_hash_defined
8352 || opt_fd->root.type == bfd_link_hash_defweak))
8353 {
8354 /* If glibc supports an optimized __tls_get_addr call stub,
8355 signalled by the presence of __tls_get_addr_opt, and we'll
8356 be calling __tls_get_addr via a plt call stub, then
8357 make __tls_get_addr point to __tls_get_addr_opt. */
8358 tga_fd = &htab->tls_get_addr_fd->elf;
8359 if (htab->elf.dynamic_sections_created
8360 && tga_fd != NULL
8361 && (tga_fd->type == STT_FUNC
8362 || tga_fd->needs_plt)
8363 && !(SYMBOL_CALLS_LOCAL (info, tga_fd)
21d68fcd 8364 || UNDEFWEAK_NO_DYNAMIC_RELOC (info, tga_fd)))
a7f2871e
AM
8365 {
8366 struct plt_entry *ent;
8367
8368 for (ent = tga_fd->plt.plist; ent != NULL; ent = ent->next)
8369 if (ent->plt.refcount > 0)
8370 break;
8371 if (ent != NULL)
8372 {
8373 tga_fd->root.type = bfd_link_hash_indirect;
8374 tga_fd->root.u.i.link = &opt_fd->root;
8375 ppc64_elf_copy_indirect_symbol (info, opt_fd, tga_fd);
b531344c 8376 opt_fd->mark = 1;
a7f2871e
AM
8377 if (opt_fd->dynindx != -1)
8378 {
8379 /* Use __tls_get_addr_opt in dynamic relocations. */
8380 opt_fd->dynindx = -1;
8381 _bfd_elf_strtab_delref (elf_hash_table (info)->dynstr,
8382 opt_fd->dynstr_index);
8383 if (!bfd_elf_link_record_dynamic_symbol (info, opt_fd))
854b41e7 8384 return NULL;
a7f2871e
AM
8385 }
8386 htab->tls_get_addr_fd = (struct ppc_link_hash_entry *) opt_fd;
8387 tga = &htab->tls_get_addr->elf;
8388 if (opt != NULL && tga != NULL)
8389 {
8390 tga->root.type = bfd_link_hash_indirect;
8391 tga->root.u.i.link = &opt->root;
8392 ppc64_elf_copy_indirect_symbol (info, opt, tga);
b531344c 8393 opt->mark = 1;
a7f2871e
AM
8394 _bfd_elf_link_hash_hide_symbol (info, opt,
8395 tga->forced_local);
8396 htab->tls_get_addr = (struct ppc_link_hash_entry *) opt;
8397 }
8398 htab->tls_get_addr_fd->oh = htab->tls_get_addr;
8399 htab->tls_get_addr_fd->is_func_descriptor = 1;
8400 if (htab->tls_get_addr != NULL)
8401 {
8402 htab->tls_get_addr->oh = htab->tls_get_addr_fd;
8403 htab->tls_get_addr->is_func = 1;
8404 }
8405 }
8406 }
8407 }
7c9cf415
AM
8408 else if (htab->params->tls_get_addr_opt < 0)
8409 htab->params->tls_get_addr_opt = 0;
a7f2871e 8410 }
33c0ec9d 8411 return _bfd_elf_tls_setup (info->output_bfd, info);
3a71aa26 8412}
8387904d 8413
3a71aa26
AM
8414/* Return TRUE iff REL is a branch reloc with a global symbol matching
8415 HASH1 or HASH2. */
8387904d 8416
3a71aa26
AM
8417static bfd_boolean
8418branch_reloc_hash_match (const bfd *ibfd,
8419 const Elf_Internal_Rela *rel,
8420 const struct ppc_link_hash_entry *hash1,
8421 const struct ppc_link_hash_entry *hash2)
8422{
8423 Elf_Internal_Shdr *symtab_hdr = &elf_symtab_hdr (ibfd);
8424 enum elf_ppc64_reloc_type r_type = ELF64_R_TYPE (rel->r_info);
8425 unsigned int r_symndx = ELF64_R_SYM (rel->r_info);
8426
e054468f 8427 if (r_symndx >= symtab_hdr->sh_info && is_branch_reloc (r_type))
8387904d 8428 {
3a71aa26
AM
8429 struct elf_link_hash_entry **sym_hashes = elf_sym_hashes (ibfd);
8430 struct elf_link_hash_entry *h;
8387904d 8431
3a71aa26 8432 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
b31867b6 8433 h = elf_follow_link (h);
3a71aa26
AM
8434 if (h == &hash1->elf || h == &hash2->elf)
8435 return TRUE;
a48ebf4d 8436 }
3a71aa26 8437 return FALSE;
951fd09b 8438}
411e1bfb 8439
951fd09b
AM
8440/* Run through all the TLS relocs looking for optimization
8441 opportunities. The linker has been hacked (see ppc64elf.em) to do
8442 a preliminary section layout so that we know the TLS segment
8443 offsets. We can't optimize earlier because some optimizations need
8444 to know the tp offset, and we need to optimize before allocating
8445 dynamic relocations. */
8446
8447bfd_boolean
33c0ec9d 8448ppc64_elf_tls_optimize (struct bfd_link_info *info)
951fd09b
AM
8449{
8450 bfd *ibfd;
8451 asection *sec;
8452 struct ppc_link_hash_table *htab;
663a1470 8453 unsigned char *toc_ref;
102890f0 8454 int pass;
951fd09b 8455
3cbc1e5e 8456 if (!bfd_link_executable (info))
411e1bfb
AM
8457 return TRUE;
8458
951fd09b 8459 htab = ppc_hash_table (info);
4dfe6ac6
NC
8460 if (htab == NULL)
8461 return FALSE;
8462
663a1470
AM
8463 /* Make two passes over the relocs. On the first pass, mark toc
8464 entries involved with tls relocs, and check that tls relocs
8465 involved in setting up a tls_get_addr call are indeed followed by
8466 such a call. If they are not, we can't do any tls optimization.
8467 On the second pass twiddle tls_mask flags to notify
8468 relocate_section that optimization can be done, and adjust got
8469 and plt refcounts. */
8470 toc_ref = NULL;
8471 for (pass = 0; pass < 2; ++pass)
c72f2fb2 8472 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
663a1470
AM
8473 {
8474 Elf_Internal_Sym *locsyms = NULL;
8475 asection *toc = bfd_get_section_by_name (ibfd, ".toc");
8476
102890f0
AM
8477 for (sec = ibfd->sections; sec != NULL; sec = sec->next)
8478 if (sec->has_tls_reloc && !bfd_is_abs_section (sec->output_section))
8479 {
8480 Elf_Internal_Rela *relstart, *rel, *relend;
663a1470 8481 bfd_boolean found_tls_get_addr_arg = 0;
411e1bfb 8482
102890f0
AM
8483 /* Read the relocations. */
8484 relstart = _bfd_elf_link_read_relocs (ibfd, sec, NULL, NULL,
8485 info->keep_memory);
8486 if (relstart == NULL)
2915c55b
JK
8487 {
8488 free (toc_ref);
8489 return FALSE;
8490 }
411e1bfb 8491
102890f0
AM
8492 relend = relstart + sec->reloc_count;
8493 for (rel = relstart; rel < relend; rel++)
8494 {
8495 enum elf_ppc64_reloc_type r_type;
8496 unsigned long r_symndx;
8497 struct elf_link_hash_entry *h;
8498 Elf_Internal_Sym *sym;
8499 asection *sym_sec;
f961d9dd
AM
8500 unsigned char *tls_mask;
8501 unsigned char tls_set, tls_clear, tls_type = 0;
102890f0
AM
8502 bfd_vma value;
8503 bfd_boolean ok_tprel, is_local;
8504 long toc_ref_index = 0;
8505 int expecting_tls_get_addr = 0;
663a1470 8506 bfd_boolean ret = FALSE;
411e1bfb 8507
102890f0
AM
8508 r_symndx = ELF64_R_SYM (rel->r_info);
8509 if (!get_sym_h (&h, &sym, &sym_sec, &tls_mask, &locsyms,
8510 r_symndx, ibfd))
8511 {
8512 err_free_rel:
8513 if (elf_section_data (sec)->relocs != relstart)
8514 free (relstart);
8515 if (toc_ref != NULL)
8516 free (toc_ref);
8517 if (locsyms != NULL
0ffa91dd 8518 && (elf_symtab_hdr (ibfd).contents
102890f0
AM
8519 != (unsigned char *) locsyms))
8520 free (locsyms);
663a1470 8521 return ret;
102890f0 8522 }
411e1bfb 8523
102890f0
AM
8524 if (h != NULL)
8525 {
766bc656
AM
8526 if (h->root.type == bfd_link_hash_defined
8527 || h->root.type == bfd_link_hash_defweak)
8528 value = h->root.u.def.value;
8529 else if (h->root.type == bfd_link_hash_undefweak)
8530 value = 0;
8531 else
663a1470
AM
8532 {
8533 found_tls_get_addr_arg = 0;
8534 continue;
8535 }
102890f0
AM
8536 }
8537 else
8538 /* Symbols referenced by TLS relocs must be of type
8539 STT_TLS. So no need for .opd local sym adjust. */
8540 value = sym->st_value;
8541
8542 ok_tprel = FALSE;
8543 is_local = FALSE;
8544 if (h == NULL
8545 || !h->def_dynamic)
8546 {
8547 is_local = TRUE;
766bc656
AM
8548 if (h != NULL
8549 && h->root.type == bfd_link_hash_undefweak)
8550 ok_tprel = TRUE;
c27b8c2a
AM
8551 else if (sym_sec != NULL
8552 && sym_sec->output_section != NULL)
766bc656
AM
8553 {
8554 value += sym_sec->output_offset;
8555 value += sym_sec->output_section->vma;
8556 value -= htab->elf.tls_sec->vma;
8557 ok_tprel = (value + TP_OFFSET + ((bfd_vma) 1 << 31)
8558 < (bfd_vma) 1 << 32);
8559 }
102890f0 8560 }
951fd09b 8561
102890f0 8562 r_type = ELF64_R_TYPE (rel->r_info);
663a1470
AM
8563 /* If this section has old-style __tls_get_addr calls
8564 without marker relocs, then check that each
8565 __tls_get_addr call reloc is preceded by a reloc
8566 that conceivably belongs to the __tls_get_addr arg
8567 setup insn. If we don't find matching arg setup
8568 relocs, don't do any tls optimization. */
8569 if (pass == 0
8570 && sec->has_tls_get_addr_call
8571 && h != NULL
8572 && (h == &htab->tls_get_addr->elf
8573 || h == &htab->tls_get_addr_fd->elf)
8574 && !found_tls_get_addr_arg
8575 && is_branch_reloc (r_type))
8576 {
25f53a85 8577 info->callbacks->minfo (_("%H __tls_get_addr lost arg, "
663a1470
AM
8578 "TLS optimization disabled\n"),
8579 ibfd, sec, rel->r_offset);
8580 ret = TRUE;
8581 goto err_free_rel;
8582 }
8583
8584 found_tls_get_addr_arg = 0;
102890f0
AM
8585 switch (r_type)
8586 {
8587 case R_PPC64_GOT_TLSLD16:
8588 case R_PPC64_GOT_TLSLD16_LO:
8589 expecting_tls_get_addr = 1;
663a1470 8590 found_tls_get_addr_arg = 1;
1a0670f3 8591 /* Fall through. */
102890f0
AM
8592
8593 case R_PPC64_GOT_TLSLD16_HI:
8594 case R_PPC64_GOT_TLSLD16_HA:
8595 /* These relocs should never be against a symbol
8596 defined in a shared lib. Leave them alone if
8597 that turns out to be the case. */
8598 if (!is_local)
8599 continue;
411e1bfb 8600
102890f0 8601 /* LD -> LE */
411e1bfb 8602 tls_set = 0;
102890f0
AM
8603 tls_clear = TLS_LD;
8604 tls_type = TLS_TLS | TLS_LD;
8605 break;
411e1bfb 8606
102890f0
AM
8607 case R_PPC64_GOT_TLSGD16:
8608 case R_PPC64_GOT_TLSGD16_LO:
8609 expecting_tls_get_addr = 1;
663a1470 8610 found_tls_get_addr_arg = 1;
1a0670f3 8611 /* Fall through. */
102890f0
AM
8612
8613 case R_PPC64_GOT_TLSGD16_HI:
8614 case R_PPC64_GOT_TLSGD16_HA:
8615 if (ok_tprel)
8616 /* GD -> LE */
411e1bfb 8617 tls_set = 0;
102890f0
AM
8618 else
8619 /* GD -> IE */
8620 tls_set = TLS_TLS | TLS_TPRELGD;
8621 tls_clear = TLS_GD;
8622 tls_type = TLS_TLS | TLS_GD;
8623 break;
8624
8625 case R_PPC64_GOT_TPREL16_DS:
8626 case R_PPC64_GOT_TPREL16_LO_DS:
8627 case R_PPC64_GOT_TPREL16_HI:
8628 case R_PPC64_GOT_TPREL16_HA:
8629 if (ok_tprel)
8630 {
8631 /* IE -> LE */
8632 tls_set = 0;
8633 tls_clear = TLS_TPREL;
8634 tls_type = TLS_TLS | TLS_TPREL;
8635 break;
8636 }
411e1bfb
AM
8637 continue;
8638
727fc41e
AM
8639 case R_PPC64_TLSGD:
8640 case R_PPC64_TLSLD:
663a1470 8641 found_tls_get_addr_arg = 1;
1a0670f3 8642 /* Fall through. */
663a1470
AM
8643
8644 case R_PPC64_TLS:
8645 case R_PPC64_TOC16:
8646 case R_PPC64_TOC16_LO:
102890f0
AM
8647 if (sym_sec == NULL || sym_sec != toc)
8648 continue;
8649
8650 /* Mark this toc entry as referenced by a TLS
8651 code sequence. We can do that now in the
8652 case of R_PPC64_TLS, and after checking for
8653 tls_get_addr for the TOC16 relocs. */
8654 if (toc_ref == NULL)
663a1470
AM
8655 toc_ref = bfd_zmalloc (toc->output_section->rawsize / 8);
8656 if (toc_ref == NULL)
8657 goto err_free_rel;
8658
102890f0
AM
8659 if (h != NULL)
8660 value = h->root.u.def.value;
8661 else
8662 value = sym->st_value;
8663 value += rel->r_addend;
73242275
AM
8664 if (value % 8 != 0)
8665 continue;
8666 BFD_ASSERT (value < toc->size
8667 && toc->output_offset % 8 == 0);
663a1470 8668 toc_ref_index = (value + toc->output_offset) / 8;
727fc41e
AM
8669 if (r_type == R_PPC64_TLS
8670 || r_type == R_PPC64_TLSGD
8671 || r_type == R_PPC64_TLSLD)
102890f0
AM
8672 {
8673 toc_ref[toc_ref_index] = 1;
8674 continue;
8675 }
8676
8677 if (pass != 0 && toc_ref[toc_ref_index] == 0)
8678 continue;
8679
8680 tls_set = 0;
8681 tls_clear = 0;
8682 expecting_tls_get_addr = 2;
8683 break;
8684
8685 case R_PPC64_TPREL64:
8686 if (pass == 0
8687 || sec != toc
8688 || toc_ref == NULL
663a1470 8689 || !toc_ref[(rel->r_offset + toc->output_offset) / 8])
102890f0
AM
8690 continue;
8691 if (ok_tprel)
8692 {
8693 /* IE -> LE */
8694 tls_set = TLS_EXPLICIT;
8695 tls_clear = TLS_TPREL;
8696 break;
8697 }
8698 continue;
8699
8700 case R_PPC64_DTPMOD64:
8701 if (pass == 0
8702 || sec != toc
8703 || toc_ref == NULL
663a1470 8704 || !toc_ref[(rel->r_offset + toc->output_offset) / 8])
102890f0
AM
8705 continue;
8706 if (rel + 1 < relend
8707 && (rel[1].r_info
8708 == ELF64_R_INFO (r_symndx, R_PPC64_DTPREL64))
8709 && rel[1].r_offset == rel->r_offset + 8)
8710 {
8711 if (ok_tprel)
8712 /* GD -> LE */
8713 tls_set = TLS_EXPLICIT | TLS_GD;
8714 else
8715 /* GD -> IE */
8716 tls_set = TLS_EXPLICIT | TLS_GD | TLS_TPRELGD;
8717 tls_clear = TLS_GD;
8718 }
8719 else
8720 {
8721 if (!is_local)
8722 continue;
8723
8724 /* LD -> LE */
8725 tls_set = TLS_EXPLICIT;
8726 tls_clear = TLS_LD;
8727 }
8728 break;
8729
8730 default:
8731 continue;
8732 }
8733
8734 if (pass == 0)
8735 {
727fc41e
AM
8736 if (!expecting_tls_get_addr
8737 || !sec->has_tls_get_addr_call)
102890f0
AM
8738 continue;
8739
3a71aa26
AM
8740 if (rel + 1 < relend
8741 && branch_reloc_hash_match (ibfd, rel + 1,
8742 htab->tls_get_addr,
8743 htab->tls_get_addr_fd))
102890f0 8744 {
3a71aa26 8745 if (expecting_tls_get_addr == 2)
102890f0 8746 {
3a71aa26 8747 /* Check for toc tls entries. */
f961d9dd 8748 unsigned char *toc_tls;
3a71aa26
AM
8749 int retval;
8750
8751 retval = get_tls_mask (&toc_tls, NULL, NULL,
8752 &locsyms,
8753 rel, ibfd);
8754 if (retval == 0)
8755 goto err_free_rel;
663a1470
AM
8756 if (toc_tls != NULL)
8757 {
8758 if ((*toc_tls & (TLS_GD | TLS_LD)) != 0)
8759 found_tls_get_addr_arg = 1;
8760 if (retval > 1)
8761 toc_ref[toc_ref_index] = 1;
8762 }
102890f0 8763 }
3a71aa26 8764 continue;
102890f0
AM
8765 }
8766
8767 if (expecting_tls_get_addr != 1)
8768 continue;
8769
8770 /* Uh oh, we didn't find the expected call. We
8771 could just mark this symbol to exclude it
8772 from tls optimization but it's safer to skip
663a1470 8773 the entire optimization. */
695344c0 8774 /* xgettext:c-format */
25f53a85 8775 info->callbacks->minfo (_("%H arg lost __tls_get_addr, "
663a1470
AM
8776 "TLS optimization disabled\n"),
8777 ibfd, sec, rel->r_offset);
8778 ret = TRUE;
8779 goto err_free_rel;
102890f0
AM
8780 }
8781
85f7a9cb 8782 if (expecting_tls_get_addr && htab->tls_get_addr != NULL)
102890f0
AM
8783 {
8784 struct plt_entry *ent;
8785 for (ent = htab->tls_get_addr->elf.plt.plist;
8786 ent != NULL;
8787 ent = ent->next)
8788 if (ent->addend == 0)
411e1bfb 8789 {
102890f0 8790 if (ent->plt.refcount > 0)
30038c59 8791 {
102890f0
AM
8792 ent->plt.refcount -= 1;
8793 expecting_tls_get_addr = 0;
30038c59 8794 }
102890f0 8795 break;
411e1bfb 8796 }
102890f0 8797 }
411e1bfb 8798
85f7a9cb 8799 if (expecting_tls_get_addr && htab->tls_get_addr_fd != NULL)
102890f0
AM
8800 {
8801 struct plt_entry *ent;
8802 for (ent = htab->tls_get_addr_fd->elf.plt.plist;
8803 ent != NULL;
8804 ent = ent->next)
8805 if (ent->addend == 0)
411e1bfb 8806 {
102890f0
AM
8807 if (ent->plt.refcount > 0)
8808 ent->plt.refcount -= 1;
8809 break;
411e1bfb 8810 }
102890f0 8811 }
411e1bfb 8812
102890f0 8813 if (tls_clear == 0)
30038c59
AM
8814 continue;
8815
102890f0
AM
8816 if ((tls_set & TLS_EXPLICIT) == 0)
8817 {
8818 struct got_entry *ent;
411e1bfb 8819
102890f0
AM
8820 /* Adjust got entry for this reloc. */
8821 if (h != NULL)
8822 ent = h->got.glist;
8823 else
8824 ent = elf_local_got_ents (ibfd)[r_symndx];
411e1bfb 8825
102890f0
AM
8826 for (; ent != NULL; ent = ent->next)
8827 if (ent->addend == rel->r_addend
8828 && ent->owner == ibfd
8829 && ent->tls_type == tls_type)
8830 break;
8831 if (ent == NULL)
8832 abort ();
411e1bfb 8833
102890f0
AM
8834 if (tls_set == 0)
8835 {
8836 /* We managed to get rid of a got entry. */
8837 if (ent->got.refcount > 0)
8838 ent->got.refcount -= 1;
8839 }
8840 }
8841 else
8842 {
8843 /* If we got rid of a DTPMOD/DTPREL reloc pair then
8844 we'll lose one or two dyn relocs. */
8845 if (!dec_dynrel_count (rel->r_info, sec, info,
19e08130 8846 NULL, h, sym))
102890f0 8847 return FALSE;
411e1bfb 8848
102890f0
AM
8849 if (tls_set == (TLS_EXPLICIT | TLS_GD))
8850 {
8851 if (!dec_dynrel_count ((rel + 1)->r_info, sec, info,
19e08130 8852 NULL, h, sym))
102890f0
AM
8853 return FALSE;
8854 }
8855 }
411e1bfb 8856
102890f0
AM
8857 *tls_mask |= tls_set;
8858 *tls_mask &= ~tls_clear;
8859 }
8c1d1bb8 8860
102890f0
AM
8861 if (elf_section_data (sec)->relocs != relstart)
8862 free (relstart);
8863 }
411e1bfb 8864
663a1470
AM
8865 if (locsyms != NULL
8866 && (elf_symtab_hdr (ibfd).contents != (unsigned char *) locsyms))
8867 {
8868 if (!info->keep_memory)
8869 free (locsyms);
8870 else
8871 elf_symtab_hdr (ibfd).contents = (unsigned char *) locsyms;
8872 }
8873 }
411e1bfb 8874
663a1470
AM
8875 if (toc_ref != NULL)
8876 free (toc_ref);
b34976b6 8877 return TRUE;
1e2f5b6e 8878}
b34976b6 8879
c5614fa4
AM
8880/* Called via elf_link_hash_traverse from ppc64_elf_edit_toc to adjust
8881 the values of any global symbols in a toc section that has been
8882 edited. Globals in toc sections should be a rarity, so this function
8883 sets a flag if any are found in toc sections other than the one just
8884 edited, so that futher hash table traversals can be avoided. */
8885
8886struct adjust_toc_info
8887{
8888 asection *toc;
8889 unsigned long *skip;
8890 bfd_boolean global_toc_syms;
8891};
8892
ba761f19
AM
8893enum toc_skip_enum { ref_from_discarded = 1, can_optimize = 2 };
8894
c5614fa4
AM
8895static bfd_boolean
8896adjust_toc_syms (struct elf_link_hash_entry *h, void *inf)
8897{
8898 struct ppc_link_hash_entry *eh;
8899 struct adjust_toc_info *toc_inf = (struct adjust_toc_info *) inf;
854b41e7 8900 unsigned long i;
c5614fa4 8901
c5614fa4
AM
8902 if (h->root.type != bfd_link_hash_defined
8903 && h->root.type != bfd_link_hash_defweak)
8904 return TRUE;
8905
8906 eh = (struct ppc_link_hash_entry *) h;
8907 if (eh->adjust_done)
8908 return TRUE;
8909
8910 if (eh->elf.root.u.def.section == toc_inf->toc)
8911 {
854b41e7
AM
8912 if (eh->elf.root.u.def.value > toc_inf->toc->rawsize)
8913 i = toc_inf->toc->rawsize >> 3;
c5614fa4 8914 else
854b41e7
AM
8915 i = eh->elf.root.u.def.value >> 3;
8916
ba761f19 8917 if ((toc_inf->skip[i] & (ref_from_discarded | can_optimize)) != 0)
c5614fa4 8918 {
4eca0228 8919 _bfd_error_handler
854b41e7
AM
8920 (_("%s defined on removed toc entry"), eh->elf.root.root.string);
8921 do
8922 ++i;
ba761f19 8923 while ((toc_inf->skip[i] & (ref_from_discarded | can_optimize)) != 0);
854b41e7 8924 eh->elf.root.u.def.value = (bfd_vma) i << 3;
c5614fa4 8925 }
854b41e7
AM
8926
8927 eh->elf.root.u.def.value -= toc_inf->skip[i];
c5614fa4
AM
8928 eh->adjust_done = 1;
8929 }
8930 else if (strcmp (eh->elf.root.u.def.section->name, ".toc") == 0)
8931 toc_inf->global_toc_syms = TRUE;
8932
8933 return TRUE;
8934}
8935
39eeab25
AM
8936/* Return TRUE iff INSN with a relocation of R_TYPE is one we expect
8937 on a _LO variety toc/got reloc. */
560c8763
AM
8938
8939static bfd_boolean
39eeab25 8940ok_lo_toc_insn (unsigned int insn, enum elf_ppc64_reloc_type r_type)
560c8763 8941{
39eeab25
AM
8942 return ((insn & (0x3f << 26)) == 12u << 26 /* addic */
8943 || (insn & (0x3f << 26)) == 14u << 26 /* addi */
560c8763
AM
8944 || (insn & (0x3f << 26)) == 32u << 26 /* lwz */
8945 || (insn & (0x3f << 26)) == 34u << 26 /* lbz */
8946 || (insn & (0x3f << 26)) == 36u << 26 /* stw */
8947 || (insn & (0x3f << 26)) == 38u << 26 /* stb */
8948 || (insn & (0x3f << 26)) == 40u << 26 /* lhz */
8949 || (insn & (0x3f << 26)) == 42u << 26 /* lha */
8950 || (insn & (0x3f << 26)) == 44u << 26 /* sth */
8951 || (insn & (0x3f << 26)) == 46u << 26 /* lmw */
8952 || (insn & (0x3f << 26)) == 47u << 26 /* stmw */
8953 || (insn & (0x3f << 26)) == 48u << 26 /* lfs */
8954 || (insn & (0x3f << 26)) == 50u << 26 /* lfd */
8955 || (insn & (0x3f << 26)) == 52u << 26 /* stfs */
8956 || (insn & (0x3f << 26)) == 54u << 26 /* stfd */
39eeab25
AM
8957 || (insn & (0x3f << 26)) == 56u << 26 /* lq,lfq */
8958 || ((insn & (0x3f << 26)) == 57u << 26 /* lxsd,lxssp,lfdp */
8959 /* Exclude lfqu by testing reloc. If relocs are ever
8960 defined for the reduced D field in psq_lu then those
8961 will need testing too. */
8962 && r_type != R_PPC64_TOC16_LO && r_type != R_PPC64_GOT16_LO)
8963 || ((insn & (0x3f << 26)) == 58u << 26 /* ld,lwa */
8964 && (insn & 1) == 0)
8965 || (insn & (0x3f << 26)) == 60u << 26 /* stfq */
8966 || ((insn & (0x3f << 26)) == 61u << 26 /* lxv,stx{v,sd,ssp},stfdp */
8967 /* Exclude stfqu. psq_stu as above for psq_lu. */
8968 && r_type != R_PPC64_TOC16_LO && r_type != R_PPC64_GOT16_LO)
8969 || ((insn & (0x3f << 26)) == 62u << 26 /* std,stq */
8970 && (insn & 1) == 0));
560c8763
AM
8971}
8972
c5614fa4
AM
8973/* Examine all relocs referencing .toc sections in order to remove
8974 unused .toc entries. */
8975
8976bfd_boolean
33c0ec9d 8977ppc64_elf_edit_toc (struct bfd_link_info *info)
c5614fa4
AM
8978{
8979 bfd *ibfd;
8980 struct adjust_toc_info toc_inf;
67f0cbdb 8981 struct ppc_link_hash_table *htab = ppc_hash_table (info);
c5614fa4 8982
67f0cbdb 8983 htab->do_toc_opt = 1;
c5614fa4 8984 toc_inf.global_toc_syms = TRUE;
c72f2fb2 8985 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
c5614fa4
AM
8986 {
8987 asection *toc, *sec;
8988 Elf_Internal_Shdr *symtab_hdr;
8989 Elf_Internal_Sym *local_syms;
425b145b 8990 Elf_Internal_Rela *relstart, *rel, *toc_relocs;
c5614fa4
AM
8991 unsigned long *skip, *drop;
8992 unsigned char *used;
8993 unsigned char *keep, last, some_unused;
8994
854b41e7
AM
8995 if (!is_ppc64_elf (ibfd))
8996 continue;
8997
c5614fa4
AM
8998 toc = bfd_get_section_by_name (ibfd, ".toc");
8999 if (toc == NULL
92b7a70f 9000 || toc->size == 0
dbaa2011
AM
9001 || toc->sec_info_type == SEC_INFO_TYPE_JUST_SYMS
9002 || discarded_section (toc))
c5614fa4
AM
9003 continue;
9004
425b145b 9005 toc_relocs = NULL;
c5614fa4 9006 local_syms = NULL;
0ffa91dd 9007 symtab_hdr = &elf_symtab_hdr (ibfd);
c5614fa4
AM
9008
9009 /* Look at sections dropped from the final link. */
9010 skip = NULL;
9011 relstart = NULL;
9012 for (sec = ibfd->sections; sec != NULL; sec = sec->next)
9013 {
9014 if (sec->reloc_count == 0
dbaa2011 9015 || !discarded_section (sec)
c5614fa4
AM
9016 || get_opd_info (sec)
9017 || (sec->flags & SEC_ALLOC) == 0
9018 || (sec->flags & SEC_DEBUGGING) != 0)
9019 continue;
9020
9021 relstart = _bfd_elf_link_read_relocs (ibfd, sec, NULL, NULL, FALSE);
9022 if (relstart == NULL)
9023 goto error_ret;
9024
9025 /* Run through the relocs to see which toc entries might be
9026 unused. */
9027 for (rel = relstart; rel < relstart + sec->reloc_count; ++rel)
9028 {
9029 enum elf_ppc64_reloc_type r_type;
9030 unsigned long r_symndx;
9031 asection *sym_sec;
9032 struct elf_link_hash_entry *h;
9033 Elf_Internal_Sym *sym;
9034 bfd_vma val;
9035
9036 r_type = ELF64_R_TYPE (rel->r_info);
9037 switch (r_type)
9038 {
9039 default:
9040 continue;
9041
9042 case R_PPC64_TOC16:
9043 case R_PPC64_TOC16_LO:
9044 case R_PPC64_TOC16_HI:
9045 case R_PPC64_TOC16_HA:
9046 case R_PPC64_TOC16_DS:
9047 case R_PPC64_TOC16_LO_DS:
9048 break;
9049 }
9050
9051 r_symndx = ELF64_R_SYM (rel->r_info);
9052 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms,
9053 r_symndx, ibfd))
9054 goto error_ret;
9055
9056 if (sym_sec != toc)
9057 continue;
9058
9059 if (h != NULL)
9060 val = h->root.u.def.value;
9061 else
9062 val = sym->st_value;
9063 val += rel->r_addend;
9064
9065 if (val >= toc->size)
9066 continue;
9067
9068 /* Anything in the toc ought to be aligned to 8 bytes.
9069 If not, don't mark as unused. */
9070 if (val & 7)
9071 continue;
9072
9073 if (skip == NULL)
9074 {
854b41e7 9075 skip = bfd_zmalloc (sizeof (*skip) * (toc->size + 15) / 8);
c5614fa4
AM
9076 if (skip == NULL)
9077 goto error_ret;
9078 }
9079
ba761f19 9080 skip[val >> 3] = ref_from_discarded;
c5614fa4
AM
9081 }
9082
9083 if (elf_section_data (sec)->relocs != relstart)
9084 free (relstart);
9085 }
9086
ba761f19
AM
9087 /* For largetoc loads of address constants, we can convert
9088 . addis rx,2,addr@got@ha
9089 . ld ry,addr@got@l(rx)
9090 to
9091 . addis rx,2,addr@toc@ha
9092 . addi ry,rx,addr@toc@l
9093 when addr is within 2G of the toc pointer. This then means
9094 that the word storing "addr" in the toc is no longer needed. */
68ffbac6 9095
ba761f19
AM
9096 if (!ppc64_elf_tdata (ibfd)->has_small_toc_reloc
9097 && toc->output_section->rawsize < (bfd_vma) 1 << 31
9098 && toc->reloc_count != 0)
9099 {
9100 /* Read toc relocs. */
425b145b
AM
9101 toc_relocs = _bfd_elf_link_read_relocs (ibfd, toc, NULL, NULL,
9102 info->keep_memory);
9103 if (toc_relocs == NULL)
ba761f19
AM
9104 goto error_ret;
9105
425b145b 9106 for (rel = toc_relocs; rel < toc_relocs + toc->reloc_count; ++rel)
ba761f19
AM
9107 {
9108 enum elf_ppc64_reloc_type r_type;
9109 unsigned long r_symndx;
9110 asection *sym_sec;
9111 struct elf_link_hash_entry *h;
9112 Elf_Internal_Sym *sym;
9113 bfd_vma val, addr;
9114
9115 r_type = ELF64_R_TYPE (rel->r_info);
9116 if (r_type != R_PPC64_ADDR64)
9117 continue;
9118
9119 r_symndx = ELF64_R_SYM (rel->r_info);
9120 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms,
9121 r_symndx, ibfd))
9122 goto error_ret;
9123
425b145b 9124 if (sym_sec == NULL
c27b8c2a 9125 || sym_sec->output_section == NULL
dbaa2011 9126 || discarded_section (sym_sec))
425b145b
AM
9127 continue;
9128
afe397ea 9129 if (!SYMBOL_REFERENCES_LOCAL (info, h))
ba761f19
AM
9130 continue;
9131
9132 if (h != NULL)
bddc25c9
AM
9133 {
9134 if (h->type == STT_GNU_IFUNC)
9135 continue;
9136 val = h->root.u.def.value;
9137 }
ba761f19 9138 else
bddc25c9
AM
9139 {
9140 if (ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC)
9141 continue;
9142 val = sym->st_value;
9143 }
ba761f19
AM
9144 val += rel->r_addend;
9145 val += sym_sec->output_section->vma + sym_sec->output_offset;
9146
9147 /* We don't yet know the exact toc pointer value, but we
9148 know it will be somewhere in the toc section. Don't
9149 optimize if the difference from any possible toc
9150 pointer is outside [ff..f80008000, 7fff7fff]. */
9151 addr = toc->output_section->vma + TOC_BASE_OFF;
9152 if (val - addr + (bfd_vma) 0x80008000 >= (bfd_vma) 1 << 32)
9153 continue;
9154
9155 addr = toc->output_section->vma + toc->output_section->rawsize;
9156 if (val - addr + (bfd_vma) 0x80008000 >= (bfd_vma) 1 << 32)
9157 continue;
9158
9159 if (skip == NULL)
9160 {
9161 skip = bfd_zmalloc (sizeof (*skip) * (toc->size + 15) / 8);
9162 if (skip == NULL)
9163 goto error_ret;
9164 }
9165
9166 skip[rel->r_offset >> 3]
425b145b 9167 |= can_optimize | ((rel - toc_relocs) << 2);
ba761f19 9168 }
ba761f19
AM
9169 }
9170
c5614fa4
AM
9171 if (skip == NULL)
9172 continue;
9173
9174 used = bfd_zmalloc (sizeof (*used) * (toc->size + 7) / 8);
9175 if (used == NULL)
9176 {
9177 error_ret:
9178 if (local_syms != NULL
9179 && symtab_hdr->contents != (unsigned char *) local_syms)
9180 free (local_syms);
9181 if (sec != NULL
9182 && relstart != NULL
9183 && elf_section_data (sec)->relocs != relstart)
9184 free (relstart);
425b145b
AM
9185 if (toc_relocs != NULL
9186 && elf_section_data (toc)->relocs != toc_relocs)
9187 free (toc_relocs);
c5614fa4
AM
9188 if (skip != NULL)
9189 free (skip);
9190 return FALSE;
9191 }
9192
30038c59
AM
9193 /* Now check all kept sections that might reference the toc.
9194 Check the toc itself last. */
9195 for (sec = (ibfd->sections == toc && toc->next ? toc->next
9196 : ibfd->sections);
c5614fa4 9197 sec != NULL;
c5614fa4 9198 sec = (sec == toc ? NULL
c5614fa4 9199 : sec->next == NULL ? toc
30038c59 9200 : sec->next == toc && toc->next ? toc->next
c5614fa4
AM
9201 : sec->next))
9202 {
9203 int repeat;
9204
9205 if (sec->reloc_count == 0
dbaa2011 9206 || discarded_section (sec)
c5614fa4
AM
9207 || get_opd_info (sec)
9208 || (sec->flags & SEC_ALLOC) == 0
9209 || (sec->flags & SEC_DEBUGGING) != 0)
9210 continue;
9211
854b41e7
AM
9212 relstart = _bfd_elf_link_read_relocs (ibfd, sec, NULL, NULL,
9213 info->keep_memory);
c5614fa4 9214 if (relstart == NULL)
2915c55b
JK
9215 {
9216 free (used);
9217 goto error_ret;
9218 }
c5614fa4
AM
9219
9220 /* Mark toc entries referenced as used. */
c5614fa4 9221 do
d4f1ee75
AM
9222 {
9223 repeat = 0;
9224 for (rel = relstart; rel < relstart + sec->reloc_count; ++rel)
9225 {
9226 enum elf_ppc64_reloc_type r_type;
9227 unsigned long r_symndx;
9228 asection *sym_sec;
9229 struct elf_link_hash_entry *h;
9230 Elf_Internal_Sym *sym;
9231 bfd_vma val;
9232 enum {no_check, check_lo, check_ha} insn_check;
98528052 9233
d4f1ee75
AM
9234 r_type = ELF64_R_TYPE (rel->r_info);
9235 switch (r_type)
9236 {
9237 default:
9238 insn_check = no_check;
9239 break;
98528052 9240
d4f1ee75
AM
9241 case R_PPC64_GOT_TLSLD16_HA:
9242 case R_PPC64_GOT_TLSGD16_HA:
9243 case R_PPC64_GOT_TPREL16_HA:
9244 case R_PPC64_GOT_DTPREL16_HA:
9245 case R_PPC64_GOT16_HA:
9246 case R_PPC64_TOC16_HA:
9247 insn_check = check_ha;
9248 break;
98528052 9249
d4f1ee75
AM
9250 case R_PPC64_GOT_TLSLD16_LO:
9251 case R_PPC64_GOT_TLSGD16_LO:
9252 case R_PPC64_GOT_TPREL16_LO_DS:
9253 case R_PPC64_GOT_DTPREL16_LO_DS:
9254 case R_PPC64_GOT16_LO:
9255 case R_PPC64_GOT16_LO_DS:
9256 case R_PPC64_TOC16_LO:
9257 case R_PPC64_TOC16_LO_DS:
9258 insn_check = check_lo;
9259 break;
9260 }
560c8763 9261
d4f1ee75
AM
9262 if (insn_check != no_check)
9263 {
9264 bfd_vma off = rel->r_offset & ~3;
9265 unsigned char buf[4];
9266 unsigned int insn;
c5614fa4 9267
d4f1ee75
AM
9268 if (!bfd_get_section_contents (ibfd, sec, buf, off, 4))
9269 {
9270 free (used);
9271 goto error_ret;
9272 }
9273 insn = bfd_get_32 (ibfd, buf);
9274 if (insn_check == check_lo
39eeab25 9275 ? !ok_lo_toc_insn (insn, r_type)
d4f1ee75
AM
9276 : ((insn & ((0x3f << 26) | 0x1f << 16))
9277 != ((15u << 26) | (2 << 16)) /* addis rt,2,imm */))
9278 {
9279 char str[12];
9280
9281 ppc64_elf_tdata (ibfd)->unexpected_toc_insn = 1;
9282 sprintf (str, "%#08x", insn);
9283 info->callbacks->einfo
695344c0 9284 /* xgettext:c-format */
174d0a74 9285 (_("%H: toc optimization is not supported for"
d4f1ee75
AM
9286 " %s instruction.\n"),
9287 ibfd, sec, rel->r_offset & ~3, str);
9288 }
9289 }
c5614fa4 9290
d4f1ee75
AM
9291 switch (r_type)
9292 {
9293 case R_PPC64_TOC16:
9294 case R_PPC64_TOC16_LO:
9295 case R_PPC64_TOC16_HI:
9296 case R_PPC64_TOC16_HA:
9297 case R_PPC64_TOC16_DS:
9298 case R_PPC64_TOC16_LO_DS:
9299 /* In case we're taking addresses of toc entries. */
9300 case R_PPC64_ADDR64:
9301 break;
c5614fa4 9302
d4f1ee75
AM
9303 default:
9304 continue;
9305 }
c5614fa4 9306
d4f1ee75
AM
9307 r_symndx = ELF64_R_SYM (rel->r_info);
9308 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms,
9309 r_symndx, ibfd))
9310 {
9311 free (used);
9312 goto error_ret;
9313 }
c5614fa4 9314
d4f1ee75
AM
9315 if (sym_sec != toc)
9316 continue;
c5614fa4 9317
d4f1ee75
AM
9318 if (h != NULL)
9319 val = h->root.u.def.value;
9320 else
9321 val = sym->st_value;
9322 val += rel->r_addend;
ba761f19 9323
d4f1ee75
AM
9324 if (val >= toc->size)
9325 continue;
ba761f19 9326
d4f1ee75
AM
9327 if ((skip[val >> 3] & can_optimize) != 0)
9328 {
9329 bfd_vma off;
9330 unsigned char opc;
9331
9332 switch (r_type)
9333 {
9334 case R_PPC64_TOC16_HA:
ba761f19 9335 break;
ba761f19 9336
d4f1ee75
AM
9337 case R_PPC64_TOC16_LO_DS:
9338 off = rel->r_offset;
9339 off += (bfd_big_endian (ibfd) ? -2 : 3);
9340 if (!bfd_get_section_contents (ibfd, sec, &opc,
9341 off, 1))
9342 {
9343 free (used);
9344 goto error_ret;
9345 }
9346 if ((opc & (0x3f << 2)) == (58u << 2))
9347 break;
1a0670f3 9348 /* Fall through. */
ba761f19 9349
d4f1ee75
AM
9350 default:
9351 /* Wrong sort of reloc, or not a ld. We may
9352 as well clear ref_from_discarded too. */
9353 skip[val >> 3] = 0;
9354 }
9355 }
9356
9357 if (sec != toc)
9358 used[val >> 3] = 1;
9359 /* For the toc section, we only mark as used if this
9360 entry itself isn't unused. */
9361 else if ((used[rel->r_offset >> 3]
9362 || !(skip[rel->r_offset >> 3] & ref_from_discarded))
9363 && !used[val >> 3])
9364 {
9365 /* Do all the relocs again, to catch reference
9366 chains. */
9367 repeat = 1;
9368 used[val >> 3] = 1;
9369 }
9370 }
9371 }
c5614fa4 9372 while (repeat);
854b41e7
AM
9373
9374 if (elf_section_data (sec)->relocs != relstart)
9375 free (relstart);
c5614fa4
AM
9376 }
9377
9378 /* Merge the used and skip arrays. Assume that TOC
9379 doublewords not appearing as either used or unused belong
9380 to to an entry more than one doubleword in size. */
9381 for (drop = skip, keep = used, last = 0, some_unused = 0;
9382 drop < skip + (toc->size + 7) / 8;
9383 ++drop, ++keep)
9384 {
9385 if (*keep)
9386 {
ba761f19
AM
9387 *drop &= ~ref_from_discarded;
9388 if ((*drop & can_optimize) != 0)
9389 some_unused = 1;
c5614fa4
AM
9390 last = 0;
9391 }
b140b010 9392 else if ((*drop & ref_from_discarded) != 0)
c5614fa4
AM
9393 {
9394 some_unused = 1;
ba761f19 9395 last = ref_from_discarded;
c5614fa4
AM
9396 }
9397 else
9398 *drop = last;
9399 }
9400
9401 free (used);
9402
9403 if (some_unused)
9404 {
9405 bfd_byte *contents, *src;
9406 unsigned long off;
d62b3684 9407 Elf_Internal_Sym *sym;
ba761f19 9408 bfd_boolean local_toc_syms = FALSE;
c5614fa4
AM
9409
9410 /* Shuffle the toc contents, and at the same time convert the
9411 skip array from booleans into offsets. */
9412 if (!bfd_malloc_and_get_section (ibfd, toc, &contents))
9413 goto error_ret;
9414
9415 elf_section_data (toc)->this_hdr.contents = contents;
9416
9417 for (src = contents, off = 0, drop = skip;
9418 src < contents + toc->size;
9419 src += 8, ++drop)
9420 {
ba761f19
AM
9421 if ((*drop & (can_optimize | ref_from_discarded)) != 0)
9422 off += 8;
c5614fa4
AM
9423 else if (off != 0)
9424 {
9425 *drop = off;
9426 memcpy (src - off, src, 8);
9427 }
9428 }
854b41e7 9429 *drop = off;
c5614fa4
AM
9430 toc->rawsize = toc->size;
9431 toc->size = src - contents - off;
9432
ba761f19
AM
9433 /* Adjust addends for relocs against the toc section sym,
9434 and optimize any accesses we can. */
c5614fa4
AM
9435 for (sec = ibfd->sections; sec != NULL; sec = sec->next)
9436 {
9437 if (sec->reloc_count == 0
dbaa2011 9438 || discarded_section (sec))
c5614fa4
AM
9439 continue;
9440
9441 relstart = _bfd_elf_link_read_relocs (ibfd, sec, NULL, NULL,
854b41e7 9442 info->keep_memory);
c5614fa4
AM
9443 if (relstart == NULL)
9444 goto error_ret;
9445
9446 for (rel = relstart; rel < relstart + sec->reloc_count; ++rel)
9447 {
9448 enum elf_ppc64_reloc_type r_type;
9449 unsigned long r_symndx;
9450 asection *sym_sec;
9451 struct elf_link_hash_entry *h;
854b41e7 9452 bfd_vma val;
c5614fa4
AM
9453
9454 r_type = ELF64_R_TYPE (rel->r_info);
9455 switch (r_type)
9456 {
9457 default:
9458 continue;
9459
9460 case R_PPC64_TOC16:
9461 case R_PPC64_TOC16_LO:
9462 case R_PPC64_TOC16_HI:
9463 case R_PPC64_TOC16_HA:
9464 case R_PPC64_TOC16_DS:
9465 case R_PPC64_TOC16_LO_DS:
9466 case R_PPC64_ADDR64:
9467 break;
9468 }
9469
9470 r_symndx = ELF64_R_SYM (rel->r_info);
9471 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms,
9472 r_symndx, ibfd))
9473 goto error_ret;
9474
ba761f19 9475 if (sym_sec != toc)
c5614fa4
AM
9476 continue;
9477
ba761f19
AM
9478 if (h != NULL)
9479 val = h->root.u.def.value;
9480 else
9481 {
9482 val = sym->st_value;
9483 if (val != 0)
9484 local_toc_syms = TRUE;
9485 }
9486
9487 val += rel->r_addend;
854b41e7
AM
9488
9489 if (val > toc->rawsize)
9490 val = toc->rawsize;
ba761f19
AM
9491 else if ((skip[val >> 3] & ref_from_discarded) != 0)
9492 continue;
9493 else if ((skip[val >> 3] & can_optimize) != 0)
9494 {
9495 Elf_Internal_Rela *tocrel
425b145b 9496 = toc_relocs + (skip[val >> 3] >> 2);
ba761f19
AM
9497 unsigned long tsym = ELF64_R_SYM (tocrel->r_info);
9498
9499 switch (r_type)
9500 {
9501 case R_PPC64_TOC16_HA:
9502 rel->r_info = ELF64_R_INFO (tsym, R_PPC64_TOC16_HA);
9503 break;
9504
9505 case R_PPC64_TOC16_LO_DS:
9506 rel->r_info = ELF64_R_INFO (tsym, R_PPC64_LO_DS_OPT);
9507 break;
9508
9509 default:
28942f62
AM
9510 if (!ppc64_elf_howto_table[R_PPC64_ADDR32])
9511 ppc_howto_init ();
b140b010 9512 info->callbacks->einfo
695344c0 9513 /* xgettext:c-format */
174d0a74 9514 (_("%H: %s references "
b140b010
AM
9515 "optimized away TOC entry\n"),
9516 ibfd, sec, rel->r_offset,
9517 ppc64_elf_howto_table[r_type]->name);
9518 bfd_set_error (bfd_error_bad_value);
9519 goto error_ret;
ba761f19
AM
9520 }
9521 rel->r_addend = tocrel->r_addend;
9522 elf_section_data (sec)->relocs = relstart;
9523 continue;
9524 }
9525
9526 if (h != NULL || sym->st_value != 0)
9527 continue;
854b41e7
AM
9528
9529 rel->r_addend -= skip[val >> 3];
9530 elf_section_data (sec)->relocs = relstart;
c5614fa4 9531 }
854b41e7
AM
9532
9533 if (elf_section_data (sec)->relocs != relstart)
9534 free (relstart);
c5614fa4
AM
9535 }
9536
9537 /* We shouldn't have local or global symbols defined in the TOC,
9538 but handle them anyway. */
df22d223
AM
9539 if (local_syms != NULL)
9540 for (sym = local_syms;
9541 sym < local_syms + symtab_hdr->sh_info;
9542 ++sym)
9543 if (sym->st_value != 0
9544 && bfd_section_from_elf_index (ibfd, sym->st_shndx) == toc)
9545 {
9546 unsigned long i;
854b41e7 9547
df22d223
AM
9548 if (sym->st_value > toc->rawsize)
9549 i = toc->rawsize >> 3;
9550 else
9551 i = sym->st_value >> 3;
854b41e7 9552
df22d223
AM
9553 if ((skip[i] & (ref_from_discarded | can_optimize)) != 0)
9554 {
9555 if (local_toc_syms)
4eca0228 9556 _bfd_error_handler
df22d223
AM
9557 (_("%s defined on removed toc entry"),
9558 bfd_elf_sym_name (ibfd, symtab_hdr, sym, NULL));
9559 do
9560 ++i;
9561 while ((skip[i] & (ref_from_discarded | can_optimize)));
9562 sym->st_value = (bfd_vma) i << 3;
9563 }
d62b3684 9564
df22d223
AM
9565 sym->st_value -= skip[i];
9566 symtab_hdr->contents = (unsigned char *) local_syms;
9567 }
c5614fa4 9568
854b41e7 9569 /* Adjust any global syms defined in this toc input section. */
c5614fa4
AM
9570 if (toc_inf.global_toc_syms)
9571 {
9572 toc_inf.toc = toc;
9573 toc_inf.skip = skip;
9574 toc_inf.global_toc_syms = FALSE;
9575 elf_link_hash_traverse (elf_hash_table (info), adjust_toc_syms,
9576 &toc_inf);
9577 }
854b41e7
AM
9578
9579 if (toc->reloc_count != 0)
9580 {
d4730f92 9581 Elf_Internal_Shdr *rel_hdr;
854b41e7
AM
9582 Elf_Internal_Rela *wrel;
9583 bfd_size_type sz;
9584
854b41e7 9585 /* Remove unused toc relocs, and adjust those we keep. */
28be611c
AM
9586 if (toc_relocs == NULL)
9587 toc_relocs = _bfd_elf_link_read_relocs (ibfd, toc, NULL, NULL,
9588 info->keep_memory);
9589 if (toc_relocs == NULL)
9590 goto error_ret;
9591
425b145b
AM
9592 wrel = toc_relocs;
9593 for (rel = toc_relocs; rel < toc_relocs + toc->reloc_count; ++rel)
ba761f19
AM
9594 if ((skip[rel->r_offset >> 3]
9595 & (ref_from_discarded | can_optimize)) == 0)
854b41e7
AM
9596 {
9597 wrel->r_offset = rel->r_offset - skip[rel->r_offset >> 3];
9598 wrel->r_info = rel->r_info;
9599 wrel->r_addend = rel->r_addend;
9600 ++wrel;
9601 }
9602 else if (!dec_dynrel_count (rel->r_info, toc, info,
9603 &local_syms, NULL, NULL))
9604 goto error_ret;
9605
425b145b
AM
9606 elf_section_data (toc)->relocs = toc_relocs;
9607 toc->reloc_count = wrel - toc_relocs;
d4730f92
BS
9608 rel_hdr = _bfd_elf_single_rel_hdr (toc);
9609 sz = rel_hdr->sh_entsize;
9610 rel_hdr->sh_size = toc->reloc_count * sz;
854b41e7 9611 }
c5614fa4 9612 }
28be611c
AM
9613 else if (toc_relocs != NULL
9614 && elf_section_data (toc)->relocs != toc_relocs)
425b145b 9615 free (toc_relocs);
c5614fa4
AM
9616
9617 if (local_syms != NULL
9618 && symtab_hdr->contents != (unsigned char *) local_syms)
9619 {
9620 if (!info->keep_memory)
9621 free (local_syms);
9622 else
9623 symtab_hdr->contents = (unsigned char *) local_syms;
9624 }
9625 free (skip);
9626 }
9627
9628 return TRUE;
9629}
9630
1bbe0902
AM
9631/* Return true iff input section I references the TOC using
9632 instructions limited to +/-32k offsets. */
9633
9634bfd_boolean
9635ppc64_elf_has_small_toc_reloc (asection *i)
9636{
9637 return (is_ppc64_elf (i->owner)
9638 && ppc64_elf_tdata (i->owner)->has_small_toc_reloc);
9639}
9640
927be08e
AM
9641/* Allocate space for one GOT entry. */
9642
9643static void
9644allocate_got (struct elf_link_hash_entry *h,
9645 struct bfd_link_info *info,
9646 struct got_entry *gent)
9647{
9648 struct ppc_link_hash_table *htab = ppc_hash_table (info);
927be08e
AM
9649 struct ppc_link_hash_entry *eh = (struct ppc_link_hash_entry *) h;
9650 int entsize = (gent->tls_type & eh->tls_mask & (TLS_GD | TLS_LD)
9651 ? 16 : 8);
9652 int rentsize = (gent->tls_type & eh->tls_mask & TLS_GD
9653 ? 2 : 1) * sizeof (Elf64_External_Rela);
9654 asection *got = ppc64_elf_tdata (gent->owner)->got;
9655
9656 gent->got.offset = got->size;
9657 got->size += entsize;
9658
19e08130 9659 if (h->type == STT_GNU_IFUNC)
927be08e 9660 {
33e44f2e 9661 htab->elf.irelplt->size += rentsize;
19e08130 9662 htab->got_reli_size += rentsize;
927be08e 9663 }
0e1862bb 9664 else if ((bfd_link_pic (info)
f0158f44
AM
9665 || (htab->elf.dynamic_sections_created
9666 && h->dynindx != -1
9667 && !SYMBOL_REFERENCES_LOCAL (info, h)))
21d68fcd 9668 && !UNDEFWEAK_NO_DYNAMIC_RELOC (info, h))
927be08e 9669 {
19e08130 9670 asection *relgot = ppc64_elf_tdata (gent->owner)->relgot;
927be08e 9671 relgot->size += rentsize;
927be08e
AM
9672 }
9673}
9674
7865406b
AM
9675/* This function merges got entries in the same toc group. */
9676
9677static void
9678merge_got_entries (struct got_entry **pent)
9679{
9680 struct got_entry *ent, *ent2;
9681
9682 for (ent = *pent; ent != NULL; ent = ent->next)
9683 if (!ent->is_indirect)
9684 for (ent2 = ent->next; ent2 != NULL; ent2 = ent2->next)
9685 if (!ent2->is_indirect
9686 && ent2->addend == ent->addend
9687 && ent2->tls_type == ent->tls_type
9688 && elf_gp (ent2->owner) == elf_gp (ent->owner))
9689 {
9690 ent2->is_indirect = TRUE;
9691 ent2->got.ent = ent;
9692 }
9693}
9694
f0158f44
AM
9695/* If H is undefined weak, make it dynamic if that makes sense. */
9696
9697static bfd_boolean
9698ensure_undefweak_dynamic (struct bfd_link_info *info,
9699 struct elf_link_hash_entry *h)
9700{
9701 struct elf_link_hash_table *htab = elf_hash_table (info);
9702
9703 if (htab->dynamic_sections_created
954b63d4 9704 && info->dynamic_undefined_weak != 0
f0158f44
AM
9705 && h->root.type == bfd_link_hash_undefweak
9706 && h->dynindx == -1
9707 && !h->forced_local
9708 && ELF_ST_VISIBILITY (h->other) == STV_DEFAULT)
9709 return bfd_elf_link_record_dynamic_symbol (info, h);
9710 return TRUE;
9711}
9712
65f38f15
AM
9713/* Allocate space in .plt, .got and associated reloc sections for
9714 dynamic relocs. */
5bd4f169 9715
b34976b6 9716static bfd_boolean
4ce794b7 9717allocate_dynrelocs (struct elf_link_hash_entry *h, void *inf)
5bd4f169 9718{
65f38f15
AM
9719 struct bfd_link_info *info;
9720 struct ppc_link_hash_table *htab;
5bd4f169 9721 asection *s;
65f38f15 9722 struct ppc_link_hash_entry *eh;
0b8bcf0d 9723 struct got_entry **pgent, *gent;
5bd4f169 9724
e92d460e 9725 if (h->root.type == bfd_link_hash_indirect)
b34976b6 9726 return TRUE;
5bd4f169 9727
65f38f15
AM
9728 info = (struct bfd_link_info *) inf;
9729 htab = ppc_hash_table (info);
4dfe6ac6
NC
9730 if (htab == NULL)
9731 return FALSE;
5bd4f169 9732
951fd09b
AM
9733 eh = (struct ppc_link_hash_entry *) h;
9734 /* Run through the TLS GD got entries first if we're changing them
9735 to TPREL. */
e7b938ca 9736 if ((eh->tls_mask & TLS_TPRELGD) != 0)
951fd09b
AM
9737 for (gent = h->got.glist; gent != NULL; gent = gent->next)
9738 if (gent->got.refcount > 0
9739 && (gent->tls_type & TLS_GD) != 0)
9740 {
9741 /* This was a GD entry that has been converted to TPREL. If
9742 there happens to be a TPREL entry we can use that one. */
9743 struct got_entry *ent;
9744 for (ent = h->got.glist; ent != NULL; ent = ent->next)
9745 if (ent->got.refcount > 0
9746 && (ent->tls_type & TLS_TPREL) != 0
e717da7e
AM
9747 && ent->addend == gent->addend
9748 && ent->owner == gent->owner)
951fd09b
AM
9749 {
9750 gent->got.refcount = 0;
9751 break;
9752 }
9753
9754 /* If not, then we'll be using our own TPREL entry. */
9755 if (gent->got.refcount != 0)
9756 gent->tls_type = TLS_TLS | TLS_TPREL;
9757 }
9758
7865406b
AM
9759 /* Remove any list entry that won't generate a word in the GOT before
9760 we call merge_got_entries. Otherwise we risk merging to empty
9761 entries. */
0b8bcf0d
AM
9762 pgent = &h->got.glist;
9763 while ((gent = *pgent) != NULL)
411e1bfb 9764 if (gent->got.refcount > 0)
7865406b
AM
9765 {
9766 if ((gent->tls_type & TLS_LD) != 0
9767 && !h->def_dynamic)
9768 {
9769 ppc64_tlsld_got (gent->owner)->got.refcount += 1;
9770 *pgent = gent->next;
9771 }
9772 else
9773 pgent = &gent->next;
9774 }
9775 else
9776 *pgent = gent->next;
9777
9778 if (!htab->do_multi_toc)
9779 merge_got_entries (&h->got.glist);
9780
9781 for (gent = h->got.glist; gent != NULL; gent = gent->next)
9782 if (!gent->is_indirect)
411e1bfb
AM
9783 {
9784 /* Make sure this symbol is output as a dynamic symbol.
f0158f44
AM
9785 Undefined weak syms won't yet be marked as dynamic. */
9786 if (!ensure_undefweak_dynamic (info, h))
9787 return FALSE;
65f38f15 9788
0c8d6e5c 9789 if (!is_ppc64_elf (gent->owner))
927be08e 9790 abort ();
0ffa91dd 9791
927be08e 9792 allocate_got (h, info, gent);
411e1bfb 9793 }
65f38f15 9794
954b63d4
AM
9795 /* If no dynamic sections we can't have dynamic relocs, except for
9796 IFUNCs which are handled even in static executables. */
8a2058b5
AM
9797 if (!htab->elf.dynamic_sections_created
9798 && h->type != STT_GNU_IFUNC)
9799 eh->dyn_relocs = NULL;
9800
954b63d4
AM
9801 /* Also discard relocs on undefined weak syms with non-default
9802 visibility, or when dynamic_undefined_weak says so. */
21d68fcd 9803 else if (UNDEFWEAK_NO_DYNAMIC_RELOC (info, h))
954b63d4
AM
9804 eh->dyn_relocs = NULL;
9805
8a2058b5 9806 if (eh->dyn_relocs != NULL)
65f38f15 9807 {
8a2058b5
AM
9808 struct elf_dyn_relocs *p, **pp;
9809
57e7d118
AM
9810 /* In the shared -Bsymbolic case, discard space allocated for
9811 dynamic pc-relative relocs against symbols which turn out to
9812 be defined in regular objects. For the normal shared case,
9813 discard space for relocs that have become local due to symbol
9814 visibility changes. */
9815
9816 if (bfd_link_pic (info))
65f38f15 9817 {
57e7d118
AM
9818 /* Relocs that use pc_count are those that appear on a call
9819 insn, or certain REL relocs (see must_be_dyn_reloc) that
9820 can be generated via assembly. We want calls to
9821 protected symbols to resolve directly to the function
9822 rather than going via the plt. If people want function
9823 pointer comparisons to work as expected then they should
9824 avoid writing weird assembly. */
9825 if (SYMBOL_CALLS_LOCAL (info, h))
9826 {
57e7d118
AM
9827 for (pp = &eh->dyn_relocs; (p = *pp) != NULL; )
9828 {
9829 p->count -= p->pc_count;
9830 p->pc_count = 0;
9831 if (p->count == 0)
9832 *pp = p->next;
9833 else
9834 pp = &p->next;
9835 }
9836 }
65f38f15 9837
954b63d4 9838 if (eh->dyn_relocs != NULL)
5bd4f169 9839 {
57e7d118
AM
9840 /* Make sure this symbol is output as a dynamic symbol.
9841 Undefined weak syms won't yet be marked as dynamic. */
954b63d4 9842 if (!ensure_undefweak_dynamic (info, h))
f0158f44 9843 return FALSE;
5bd4f169 9844 }
65f38f15 9845 }
57e7d118 9846 else if (h->type == STT_GNU_IFUNC)
dfbb6ac9 9847 {
8a2058b5
AM
9848 /* A plt entry is always created when making direct calls to
9849 an ifunc, even when building a static executable, but
9850 that doesn't cover all cases. We may have only an ifunc
9851 initialised function pointer for a given ifunc symbol.
9852
9853 For ELFv2, dynamic relocations are not required when
9854 generating a global entry PLT stub. */
9855 if (abiversion (info->output_bfd) >= 2)
9856 {
9857 if (global_entry_stub (h))
9858 eh->dyn_relocs = NULL;
9859 }
9860
9861 /* For ELFv1 we have function descriptors. Descriptors need
9862 to be treated like PLT entries and thus have dynamic
9863 relocations. One exception is when the function
9864 descriptor is copied into .dynbss (which should only
9865 happen with ancient versions of gcc). */
9866 else if (h->needs_copy)
dfbb6ac9 9867 eh->dyn_relocs = NULL;
57e7d118
AM
9868 }
9869 else if (ELIMINATE_COPY_RELOCS)
9870 {
8a2058b5 9871 /* For the non-pic case, discard space for relocs against
57e7d118
AM
9872 symbols which turn out to need copy relocs or are not
9873 dynamic. */
f0158f44
AM
9874 if (!h->non_got_ref
9875 && !h->def_regular)
9876 {
9877 /* Make sure this symbol is output as a dynamic symbol.
9878 Undefined weak syms won't yet be marked as dynamic. */
9879 if (!ensure_undefweak_dynamic (info, h))
9880 return FALSE;
dfbb6ac9 9881
f0158f44
AM
9882 if (h->dynindx == -1)
9883 eh->dyn_relocs = NULL;
9884 }
9885 else
8a2058b5 9886 eh->dyn_relocs = NULL;
57e7d118
AM
9887 }
9888
9889 /* Finally, allocate space. */
9890 for (p = eh->dyn_relocs; p != NULL; p = p->next)
9891 {
9892 asection *sreloc = elf_section_data (p->sec)->sreloc;
9893 if (eh->elf.type == STT_GNU_IFUNC)
9894 sreloc = htab->elf.irelplt;
9895 sreloc->size += p->count * sizeof (Elf64_External_Rela);
dfbb6ac9 9896 }
65f38f15 9897 }
57e7d118
AM
9898
9899 if ((htab->elf.dynamic_sections_created
f0158f44 9900 && h->dynindx != -1)
57e7d118 9901 || h->type == STT_GNU_IFUNC)
65f38f15 9902 {
57e7d118
AM
9903 struct plt_entry *pent;
9904 bfd_boolean doneone = FALSE;
9905 for (pent = h->plt.plist; pent != NULL; pent = pent->next)
9906 if (pent->plt.refcount > 0)
9907 {
9908 if (!htab->elf.dynamic_sections_created
9909 || h->dynindx == -1)
9910 {
9911 s = htab->elf.iplt;
9912 pent->plt.offset = s->size;
9913 s->size += PLT_ENTRY_SIZE (htab);
9914 s = htab->elf.irelplt;
9915 }
9916 else
9917 {
9918 /* If this is the first .plt entry, make room for the special
9919 first entry. */
9920 s = htab->elf.splt;
9921 if (s->size == 0)
9922 s->size += PLT_INITIAL_ENTRY_SIZE (htab);
65f38f15 9923
57e7d118 9924 pent->plt.offset = s->size;
65f38f15 9925
57e7d118
AM
9926 /* Make room for this entry. */
9927 s->size += PLT_ENTRY_SIZE (htab);
65f38f15 9928
57e7d118
AM
9929 /* Make room for the .glink code. */
9930 s = htab->glink;
9931 if (s->size == 0)
9932 s->size += GLINK_CALL_STUB_SIZE;
9933 if (htab->opd_abi)
9934 {
9935 /* We need bigger stubs past index 32767. */
9936 if (s->size >= GLINK_CALL_STUB_SIZE + 32768*2*4)
9937 s->size += 4;
9938 s->size += 2*4;
9939 }
9940 else
9941 s->size += 4;
65f38f15 9942
57e7d118
AM
9943 /* We also need to make an entry in the .rela.plt section. */
9944 s = htab->elf.srelplt;
9945 }
9946 s->size += sizeof (Elf64_External_Rela);
9947 doneone = TRUE;
9948 }
9949 else
9950 pent->plt.offset = (bfd_vma) -1;
9951 if (!doneone)
9952 {
9953 h->plt.plist = NULL;
9954 h->needs_plt = 0;
9955 }
65f38f15 9956 }
57e7d118 9957 else
65f38f15 9958 {
57e7d118
AM
9959 h->plt.plist = NULL;
9960 h->needs_plt = 0;
65f38f15
AM
9961 }
9962
b34976b6 9963 return TRUE;
65f38f15
AM
9964}
9965
a345bc8d
AM
9966/* Called via elf_link_hash_traverse from ppc64_elf_size_dynamic_sections
9967 to set up space for global entry stubs. These are put in glink,
9968 after the branch table. */
65f38f15 9969
b34976b6 9970static bfd_boolean
a345bc8d 9971size_global_entry_stubs (struct elf_link_hash_entry *h, void *inf)
65f38f15 9972{
a345bc8d
AM
9973 struct bfd_link_info *info;
9974 struct ppc_link_hash_table *htab;
9975 struct plt_entry *pent;
9976 asection *s;
65f38f15 9977
a345bc8d
AM
9978 if (h->root.type == bfd_link_hash_indirect)
9979 return TRUE;
65f38f15 9980
a345bc8d
AM
9981 if (!h->pointer_equality_needed)
9982 return TRUE;
65f38f15 9983
a345bc8d
AM
9984 if (h->def_regular)
9985 return TRUE;
65f38f15 9986
a345bc8d
AM
9987 info = inf;
9988 htab = ppc_hash_table (info);
9989 if (htab == NULL)
9990 return FALSE;
9991
9992 s = htab->glink;
9993 for (pent = h->plt.plist; pent != NULL; pent = pent->next)
9994 if (pent->plt.offset != (bfd_vma) -1
9995 && pent->addend == 0)
9996 {
afe397ea
AM
9997 /* For ELFv2, if this symbol is not defined in a regular file
9998 and we are not generating a shared library or pie, then we
9999 need to define the symbol in the executable on a call stub.
10000 This is to avoid text relocations. */
a345bc8d 10001 s->size = (s->size + 15) & -16;
8a2058b5 10002 h->root.type = bfd_link_hash_defined;
afe397ea
AM
10003 h->root.u.def.section = s;
10004 h->root.u.def.value = s->size;
a345bc8d
AM
10005 s->size += 16;
10006 break;
10007 }
10008 return TRUE;
10009}
10010
10011/* Set DF_TEXTREL if we find any dynamic relocs that apply to
10012 read-only sections. */
10013
10014static bfd_boolean
10015maybe_set_textrel (struct elf_link_hash_entry *h, void *info)
10016{
10017 if (h->root.type == bfd_link_hash_indirect)
10018 return TRUE;
10019
10020 if (readonly_dynrelocs (h))
10021 {
10022 ((struct bfd_link_info *) info)->flags |= DF_TEXTREL;
10023
10024 /* Not an error, just cut short the traversal. */
10025 return FALSE;
65f38f15 10026 }
b34976b6 10027 return TRUE;
65f38f15
AM
10028}
10029
10030/* Set the sizes of the dynamic sections. */
10031
b34976b6 10032static bfd_boolean
ee67d69a 10033ppc64_elf_size_dynamic_sections (bfd *output_bfd,
4ce794b7 10034 struct bfd_link_info *info)
65f38f15
AM
10035{
10036 struct ppc_link_hash_table *htab;
10037 bfd *dynobj;
10038 asection *s;
b34976b6 10039 bfd_boolean relocs;
65f38f15 10040 bfd *ibfd;
7865406b 10041 struct got_entry *first_tlsld;
65f38f15
AM
10042
10043 htab = ppc_hash_table (info);
4dfe6ac6
NC
10044 if (htab == NULL)
10045 return FALSE;
10046
65f38f15
AM
10047 dynobj = htab->elf.dynobj;
10048 if (dynobj == NULL)
10049 abort ();
10050
10051 if (htab->elf.dynamic_sections_created)
10052 {
10053 /* Set the contents of the .interp section to the interpreter. */
9b8b325a 10054 if (bfd_link_executable (info) && !info->nointerp)
65f38f15 10055 {
3d4d4302 10056 s = bfd_get_linker_section (dynobj, ".interp");
65f38f15
AM
10057 if (s == NULL)
10058 abort ();
eea6121a 10059 s->size = sizeof ELF_DYNAMIC_INTERPRETER;
65f38f15
AM
10060 s->contents = (unsigned char *) ELF_DYNAMIC_INTERPRETER;
10061 }
10062 }
10063
10064 /* Set up .got offsets for local syms, and space for local dynamic
10065 relocs. */
c72f2fb2 10066 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
65f38f15 10067 {
411e1bfb
AM
10068 struct got_entry **lgot_ents;
10069 struct got_entry **end_lgot_ents;
e054468f
AM
10070 struct plt_entry **local_plt;
10071 struct plt_entry **end_local_plt;
f961d9dd 10072 unsigned char *lgot_masks;
65f38f15
AM
10073 bfd_size_type locsymcount;
10074 Elf_Internal_Shdr *symtab_hdr;
65f38f15 10075
0c8d6e5c 10076 if (!is_ppc64_elf (ibfd))
65f38f15
AM
10077 continue;
10078
10079 for (s = ibfd->sections; s != NULL; s = s->next)
10080 {
19e08130 10081 struct ppc_dyn_relocs *p;
65f38f15 10082
6edfbbad 10083 for (p = elf_section_data (s)->local_dynrel; p != NULL; p = p->next)
65f38f15 10084 {
ec338859
AM
10085 if (!bfd_is_abs_section (p->sec)
10086 && bfd_is_abs_section (p->sec->output_section))
10087 {
10088 /* Input section has been discarded, either because
10089 it is a copy of a linkonce section or due to
10090 linker script /DISCARD/, so we'll be discarding
10091 the relocs too. */
10092 }
248866a8 10093 else if (p->count != 0)
ec338859 10094 {
19e08130
AM
10095 asection *srel = elf_section_data (p->sec)->sreloc;
10096 if (p->ifunc)
33e44f2e 10097 srel = htab->elf.irelplt;
eea6121a 10098 srel->size += p->count * sizeof (Elf64_External_Rela);
248866a8
AM
10099 if ((p->sec->output_section->flags & SEC_READONLY) != 0)
10100 info->flags |= DF_TEXTREL;
ec338859 10101 }
65f38f15
AM
10102 }
10103 }
10104
411e1bfb
AM
10105 lgot_ents = elf_local_got_ents (ibfd);
10106 if (!lgot_ents)
65f38f15
AM
10107 continue;
10108
0ffa91dd 10109 symtab_hdr = &elf_symtab_hdr (ibfd);
65f38f15 10110 locsymcount = symtab_hdr->sh_info;
411e1bfb 10111 end_lgot_ents = lgot_ents + locsymcount;
e054468f
AM
10112 local_plt = (struct plt_entry **) end_lgot_ents;
10113 end_local_plt = local_plt + locsymcount;
f961d9dd 10114 lgot_masks = (unsigned char *) end_local_plt;
e717da7e 10115 s = ppc64_elf_tdata (ibfd)->got;
e7b938ca 10116 for (; lgot_ents < end_lgot_ents; ++lgot_ents, ++lgot_masks)
65f38f15 10117 {
0b8bcf0d 10118 struct got_entry **pent, *ent;
411e1bfb 10119
0b8bcf0d
AM
10120 pent = lgot_ents;
10121 while ((ent = *pent) != NULL)
411e1bfb
AM
10122 if (ent->got.refcount > 0)
10123 {
e7b938ca 10124 if ((ent->tls_type & *lgot_masks & TLS_LD) != 0)
411e1bfb 10125 {
927be08e 10126 ppc64_tlsld_got (ibfd)->got.refcount += 1;
0b8bcf0d 10127 *pent = ent->next;
411e1bfb
AM
10128 }
10129 else
10130 {
19e08130
AM
10131 unsigned int ent_size = 8;
10132 unsigned int rel_size = sizeof (Elf64_External_Rela);
10133
eea6121a 10134 ent->got.offset = s->size;
e7b938ca 10135 if ((ent->tls_type & *lgot_masks & TLS_GD) != 0)
927be08e 10136 {
19e08130
AM
10137 ent_size *= 2;
10138 rel_size *= 2;
10139 }
10140 s->size += ent_size;
10141 if ((*lgot_masks & PLT_IFUNC) != 0)
10142 {
33e44f2e 10143 htab->elf.irelplt->size += rel_size;
19e08130
AM
10144 htab->got_reli_size += rel_size;
10145 }
0e1862bb 10146 else if (bfd_link_pic (info))
19e08130
AM
10147 {
10148 asection *srel = ppc64_elf_tdata (ibfd)->relgot;
10149 srel->size += rel_size;
927be08e 10150 }
0b8bcf0d 10151 pent = &ent->next;
411e1bfb
AM
10152 }
10153 }
10154 else
0b8bcf0d 10155 *pent = ent->next;
65f38f15 10156 }
e054468f
AM
10157
10158 /* Allocate space for calls to local STT_GNU_IFUNC syms in .iplt. */
10159 for (; local_plt < end_local_plt; ++local_plt)
10160 {
10161 struct plt_entry *ent;
10162
10163 for (ent = *local_plt; ent != NULL; ent = ent->next)
10164 if (ent->plt.refcount > 0)
10165 {
33e44f2e 10166 s = htab->elf.iplt;
e054468f 10167 ent->plt.offset = s->size;
b9e5796b 10168 s->size += PLT_ENTRY_SIZE (htab);
e054468f 10169
33e44f2e 10170 htab->elf.irelplt->size += sizeof (Elf64_External_Rela);
e054468f
AM
10171 }
10172 else
10173 ent->plt.offset = (bfd_vma) -1;
10174 }
65f38f15
AM
10175 }
10176
10177 /* Allocate global sym .plt and .got entries, and space for global
10178 sym dynamic relocs. */
4ce794b7 10179 elf_link_hash_traverse (&htab->elf, allocate_dynrelocs, info);
a345bc8d
AM
10180 /* Stash the end of glink branch table. */
10181 if (htab->glink != NULL)
10182 htab->glink->rawsize = htab->glink->size;
10183
0e1862bb 10184 if (!htab->opd_abi && !bfd_link_pic (info))
a345bc8d 10185 elf_link_hash_traverse (&htab->elf, size_global_entry_stubs, info);
65f38f15 10186
7865406b 10187 first_tlsld = NULL;
c72f2fb2 10188 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
102890f0 10189 {
7865406b
AM
10190 struct got_entry *ent;
10191
0c8d6e5c 10192 if (!is_ppc64_elf (ibfd))
102890f0
AM
10193 continue;
10194
7865406b
AM
10195 ent = ppc64_tlsld_got (ibfd);
10196 if (ent->got.refcount > 0)
102890f0 10197 {
7865406b 10198 if (!htab->do_multi_toc && first_tlsld != NULL)
102890f0 10199 {
7865406b
AM
10200 ent->is_indirect = TRUE;
10201 ent->got.ent = first_tlsld;
10202 }
10203 else
10204 {
10205 if (first_tlsld == NULL)
10206 first_tlsld = ent;
10207 s = ppc64_elf_tdata (ibfd)->got;
10208 ent->got.offset = s->size;
10209 ent->owner = ibfd;
10210 s->size += 16;
0e1862bb 10211 if (bfd_link_pic (info))
7865406b
AM
10212 {
10213 asection *srel = ppc64_elf_tdata (ibfd)->relgot;
10214 srel->size += sizeof (Elf64_External_Rela);
10215 }
102890f0
AM
10216 }
10217 }
10218 else
7865406b 10219 ent->got.offset = (bfd_vma) -1;
102890f0
AM
10220 }
10221
65f38f15
AM
10222 /* We now have determined the sizes of the various dynamic sections.
10223 Allocate memory for them. */
b34976b6 10224 relocs = FALSE;
65f38f15
AM
10225 for (s = dynobj->sections; s != NULL; s = s->next)
10226 {
10227 if ((s->flags & SEC_LINKER_CREATED) == 0)
10228 continue;
10229
4ce794b7 10230 if (s == htab->brlt || s == htab->relbrlt)
721956f4
AM
10231 /* These haven't been allocated yet; don't strip. */
10232 continue;
33e44f2e
AM
10233 else if (s == htab->elf.sgot
10234 || s == htab->elf.splt
10235 || s == htab->elf.iplt
c456f082 10236 || s == htab->glink
5474d94f
AM
10237 || s == htab->elf.sdynbss
10238 || s == htab->elf.sdynrelro)
65f38f15
AM
10239 {
10240 /* Strip this section if we don't need it; see the
10241 comment below. */
5bd4f169 10242 }
58d180e8
AM
10243 else if (s == htab->glink_eh_frame)
10244 {
10245 if (!bfd_is_abs_section (s->output_section))
10246 /* Not sized yet. */
10247 continue;
10248 }
70cc837d 10249 else if (CONST_STRNEQ (s->name, ".rela"))
5bd4f169 10250 {
c456f082 10251 if (s->size != 0)
5bd4f169 10252 {
33e44f2e 10253 if (s != htab->elf.srelplt)
b34976b6 10254 relocs = TRUE;
5bd4f169
AM
10255
10256 /* We use the reloc_count field as a counter if we need
10257 to copy relocs into the output file. */
10258 s->reloc_count = 0;
10259 }
10260 }
65f38f15 10261 else
5bd4f169
AM
10262 {
10263 /* It's not one of our sections, so don't allocate space. */
10264 continue;
10265 }
10266
eea6121a 10267 if (s->size == 0)
5bd4f169 10268 {
c456f082
AM
10269 /* If we don't need this section, strip it from the
10270 output file. This is mostly to handle .rela.bss and
10271 .rela.plt. We must create both sections in
10272 create_dynamic_sections, because they must be created
10273 before the linker maps input sections to output
10274 sections. The linker does that before
10275 adjust_dynamic_symbol is called, and it is that
10276 function which decides whether anything needs to go
10277 into these sections. */
8423293d 10278 s->flags |= SEC_EXCLUDE;
5bd4f169
AM
10279 continue;
10280 }
10281
c456f082 10282 if ((s->flags & SEC_HAS_CONTENTS) == 0)
5f333394
AM
10283 continue;
10284
65f38f15
AM
10285 /* Allocate memory for the section contents. We use bfd_zalloc
10286 here in case unused entries are not reclaimed before the
10287 section's contents are written out. This should not happen,
411e1bfb
AM
10288 but this way if it does we get a R_PPC64_NONE reloc in .rela
10289 sections instead of garbage.
10290 We also rely on the section contents being zero when writing
5474d94f 10291 the GOT and .dynrelro. */
eea6121a 10292 s->contents = bfd_zalloc (dynobj, s->size);
65f38f15 10293 if (s->contents == NULL)
b34976b6 10294 return FALSE;
5bd4f169
AM
10295 }
10296
c72f2fb2 10297 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
e717da7e 10298 {
0c8d6e5c 10299 if (!is_ppc64_elf (ibfd))
7b53ace3
AM
10300 continue;
10301
e717da7e 10302 s = ppc64_elf_tdata (ibfd)->got;
33e44f2e 10303 if (s != NULL && s != htab->elf.sgot)
e717da7e 10304 {
eea6121a 10305 if (s->size == 0)
8423293d 10306 s->flags |= SEC_EXCLUDE;
e717da7e
AM
10307 else
10308 {
eea6121a 10309 s->contents = bfd_zalloc (ibfd, s->size);
e717da7e
AM
10310 if (s->contents == NULL)
10311 return FALSE;
10312 }
10313 }
10314 s = ppc64_elf_tdata (ibfd)->relgot;
10315 if (s != NULL)
10316 {
eea6121a 10317 if (s->size == 0)
8423293d 10318 s->flags |= SEC_EXCLUDE;
e717da7e
AM
10319 else
10320 {
eea6121a 10321 s->contents = bfd_zalloc (ibfd, s->size);
e717da7e
AM
10322 if (s->contents == NULL)
10323 return FALSE;
10324 relocs = TRUE;
10325 s->reloc_count = 0;
10326 }
10327 }
10328 }
10329
e86ce104 10330 if (htab->elf.dynamic_sections_created)
5bd4f169 10331 {
e8910a83
AM
10332 bfd_boolean tls_opt;
10333
5bd4f169
AM
10334 /* Add some entries to the .dynamic section. We fill in the
10335 values later, in ppc64_elf_finish_dynamic_sections, but we
10336 must add the entries now so that we get the correct size for
10337 the .dynamic section. The DT_DEBUG entry is filled in by the
10338 dynamic linker and used by the debugger. */
dc810e39 10339#define add_dynamic_entry(TAG, VAL) \
5a580b3a 10340 _bfd_elf_add_dynamic_entry (info, TAG, VAL)
dc810e39 10341
0e1862bb 10342 if (bfd_link_executable (info))
5bd4f169 10343 {
dc810e39 10344 if (!add_dynamic_entry (DT_DEBUG, 0))
b34976b6 10345 return FALSE;
5bd4f169
AM
10346 }
10347
33e44f2e 10348 if (htab->elf.splt != NULL && htab->elf.splt->size != 0)
5bd4f169 10349 {
dc810e39
AM
10350 if (!add_dynamic_entry (DT_PLTGOT, 0)
10351 || !add_dynamic_entry (DT_PLTRELSZ, 0)
10352 || !add_dynamic_entry (DT_PLTREL, DT_RELA)
5d1634d7
AM
10353 || !add_dynamic_entry (DT_JMPREL, 0)
10354 || !add_dynamic_entry (DT_PPC64_GLINK, 0))
b34976b6 10355 return FALSE;
5bd4f169
AM
10356 }
10357
ee67d69a 10358 if (NO_OPD_RELOCS && abiversion (output_bfd) <= 1)
19397422
AM
10359 {
10360 if (!add_dynamic_entry (DT_PPC64_OPD, 0)
10361 || !add_dynamic_entry (DT_PPC64_OPDSZ, 0))
b34976b6 10362 return FALSE;
19397422
AM
10363 }
10364
7c9cf415 10365 tls_opt = (htab->params->tls_get_addr_opt
e8910a83
AM
10366 && htab->tls_get_addr_fd != NULL
10367 && htab->tls_get_addr_fd->elf.plt.plist != NULL);
10368 if (tls_opt || !htab->opd_abi)
10369 {
10370 if (!add_dynamic_entry (DT_PPC64_OPT, tls_opt ? PPC64_OPT_TLS : 0))
10371 return FALSE;
10372 }
a7f2871e 10373
5bd4f169
AM
10374 if (relocs)
10375 {
dc810e39
AM
10376 if (!add_dynamic_entry (DT_RELA, 0)
10377 || !add_dynamic_entry (DT_RELASZ, 0)
10378 || !add_dynamic_entry (DT_RELAENT, sizeof (Elf64_External_Rela)))
b34976b6 10379 return FALSE;
5bd4f169 10380
65f38f15
AM
10381 /* If any dynamic relocs apply to a read-only section,
10382 then we need a DT_TEXTREL entry. */
248866a8 10383 if ((info->flags & DF_TEXTREL) == 0)
a345bc8d 10384 elf_link_hash_traverse (&htab->elf, maybe_set_textrel, info);
5bd4f169 10385
65f38f15 10386 if ((info->flags & DF_TEXTREL) != 0)
5bd4f169 10387 {
65f38f15 10388 if (!add_dynamic_entry (DT_TEXTREL, 0))
b34976b6 10389 return FALSE;
5bd4f169 10390 }
5bd4f169 10391 }
5bd4f169 10392 }
65f38f15 10393#undef add_dynamic_entry
5bd4f169 10394
b34976b6 10395 return TRUE;
5bd4f169
AM
10396}
10397
a345bc8d
AM
10398/* Return TRUE if symbol should be hashed in the `.gnu.hash' section. */
10399
10400static bfd_boolean
10401ppc64_elf_hash_symbol (struct elf_link_hash_entry *h)
10402{
10403 if (h->plt.plist != NULL
10404 && !h->def_regular
10405 && !h->pointer_equality_needed)
10406 return FALSE;
10407
10408 return _bfd_elf_hash_symbol (h);
10409}
10410
721956f4 10411/* Determine the type of stub needed, if any, for a call. */
5bd4f169 10412
4ce794b7
AM
10413static inline enum ppc_stub_type
10414ppc_type_of_stub (asection *input_sec,
10415 const Elf_Internal_Rela *rel,
10416 struct ppc_link_hash_entry **hash,
e054468f 10417 struct plt_entry **plt_ent,
6911b7dc
AM
10418 bfd_vma destination,
10419 unsigned long local_off)
5bd4f169 10420{
721956f4
AM
10421 struct ppc_link_hash_entry *h = *hash;
10422 bfd_vma location;
10423 bfd_vma branch_offset;
10424 bfd_vma max_branch_offset;
4ce794b7 10425 enum elf_ppc64_reloc_type r_type;
5bd4f169 10426
721956f4
AM
10427 if (h != NULL)
10428 {
e054468f 10429 struct plt_entry *ent;
7fe2b9a6 10430 struct ppc_link_hash_entry *fdh = h;
b31867b6
AM
10431 if (h->oh != NULL
10432 && h->oh->is_func_descriptor)
7b8f6675
AM
10433 {
10434 fdh = ppc_follow_link (h->oh);
10435 *hash = fdh;
10436 }
8387904d 10437
e054468f
AM
10438 for (ent = fdh->elf.plt.plist; ent != NULL; ent = ent->next)
10439 if (ent->addend == rel->r_addend
10440 && ent->plt.offset != (bfd_vma) -1)
10441 {
e054468f
AM
10442 *plt_ent = ent;
10443 return ppc_stub_plt_call;
10444 }
5bd4f169 10445
7fe2b9a6
AM
10446 /* Here, we know we don't have a plt entry. If we don't have a
10447 either a defined function descriptor or a defined entry symbol
10448 in a regular object file, then it is pointless trying to make
10449 any other type of stub. */
854b41e7
AM
10450 if (!is_static_defined (&fdh->elf)
10451 && !is_static_defined (&h->elf))
721956f4 10452 return ppc_stub_none;
5d1634d7 10453 }
e054468f
AM
10454 else if (elf_local_got_ents (input_sec->owner) != NULL)
10455 {
10456 Elf_Internal_Shdr *symtab_hdr = &elf_symtab_hdr (input_sec->owner);
10457 struct plt_entry **local_plt = (struct plt_entry **)
10458 elf_local_got_ents (input_sec->owner) + symtab_hdr->sh_info;
10459 unsigned long r_symndx = ELF64_R_SYM (rel->r_info);
10460
10461 if (local_plt[r_symndx] != NULL)
10462 {
10463 struct plt_entry *ent;
10464
10465 for (ent = local_plt[r_symndx]; ent != NULL; ent = ent->next)
10466 if (ent->addend == rel->r_addend
10467 && ent->plt.offset != (bfd_vma) -1)
10468 {
10469 *plt_ent = ent;
10470 return ppc_stub_plt_call;
10471 }
10472 }
10473 }
5d1634d7 10474
721956f4
AM
10475 /* Determine where the call point is. */
10476 location = (input_sec->output_offset
10477 + input_sec->output_section->vma
10478 + rel->r_offset);
5d1634d7 10479
721956f4
AM
10480 branch_offset = destination - location;
10481 r_type = ELF64_R_TYPE (rel->r_info);
5d1634d7 10482
721956f4
AM
10483 /* Determine if a long branch stub is needed. */
10484 max_branch_offset = 1 << 25;
4ce794b7 10485 if (r_type != R_PPC64_REL24)
721956f4 10486 max_branch_offset = 1 << 15;
5d1634d7 10487
6911b7dc 10488 if (branch_offset + max_branch_offset >= 2 * max_branch_offset - local_off)
721956f4
AM
10489 /* We need a stub. Figure out whether a long_branch or plt_branch
10490 is needed later. */
10491 return ppc_stub_long_branch;
5d1634d7 10492
721956f4 10493 return ppc_stub_none;
5d1634d7
AM
10494}
10495
794e51c0
AM
10496/* With power7 weakly ordered memory model, it is possible for ld.so
10497 to update a plt entry in one thread and have another thread see a
10498 stale zero toc entry. To avoid this we need some sort of acquire
10499 barrier in the call stub. One solution is to make the load of the
10500 toc word seem to appear to depend on the load of the function entry
10501 word. Another solution is to test for r2 being zero, and branch to
10502 the appropriate glink entry if so.
10503
10504 . fake dep barrier compare
71a39c98
AM
10505 . ld 12,xxx(2) ld 12,xxx(2)
10506 . mtctr 12 mtctr 12
10507 . xor 11,12,12 ld 2,xxx+8(2)
794e51c0
AM
10508 . add 2,2,11 cmpldi 2,0
10509 . ld 2,xxx+8(2) bnectr+
10510 . bctr b <glink_entry>
10511
10512 The solution involving the compare turns out to be faster, so
10513 that's what we use unless the branch won't reach. */
10514
10515#define ALWAYS_USE_FAKE_DEP 0
10516#define ALWAYS_EMIT_R2SAVE 0
5d1634d7 10517
5d1634d7
AM
10518#define PPC_LO(v) ((v) & 0xffff)
10519#define PPC_HI(v) (((v) >> 16) & 0xffff)
10520#define PPC_HA(v) PPC_HI ((v) + 0x8000)
10521
794e51c0
AM
10522static inline unsigned int
10523plt_stub_size (struct ppc_link_hash_table *htab,
10524 struct ppc_stub_hash_entry *stub_entry,
10525 bfd_vma off)
10526{
b9e5796b
AM
10527 unsigned size = 12;
10528
10529 if (ALWAYS_EMIT_R2SAVE
10530 || stub_entry->stub_type == ppc_stub_plt_call_r2save)
10531 size += 4;
10532 if (PPC_HA (off) != 0)
794e51c0 10533 size += 4;
b9e5796b
AM
10534 if (htab->opd_abi)
10535 {
10536 size += 4;
e7d1c40c 10537 if (htab->params->plt_static_chain)
b9e5796b 10538 size += 4;
bd4d2eaa
AM
10539 if (htab->params->plt_thread_safe
10540 && htab->elf.dynamic_sections_created
10541 && stub_entry->h != NULL
10542 && stub_entry->h->elf.dynindx != -1)
b9e5796b 10543 size += 8;
e7d1c40c 10544 if (PPC_HA (off + 8 + 8 * htab->params->plt_static_chain) != PPC_HA (off))
b9e5796b
AM
10545 size += 4;
10546 }
794e51c0
AM
10547 if (stub_entry->h != NULL
10548 && (stub_entry->h == htab->tls_get_addr_fd
10549 || stub_entry->h == htab->tls_get_addr)
7c9cf415 10550 && htab->params->tls_get_addr_opt)
794e51c0
AM
10551 size += 13 * 4;
10552 return size;
10553}
10554
10555/* If this stub would cross fewer 2**plt_stub_align boundaries if we align,
10556 then return the padding needed to do so. */
10557static inline unsigned int
10558plt_stub_pad (struct ppc_link_hash_table *htab,
10559 struct ppc_stub_hash_entry *stub_entry,
10560 bfd_vma plt_off)
10561{
e7d1c40c 10562 int stub_align = 1 << htab->params->plt_stub_align;
794e51c0 10563 unsigned stub_size = plt_stub_size (htab, stub_entry, plt_off);
6f20ed8a 10564 bfd_vma stub_off = stub_entry->group->stub_sec->size;
794e51c0
AM
10565
10566 if (((stub_off + stub_size - 1) & -stub_align) - (stub_off & -stub_align)
e05fa0ba 10567 > ((stub_size - 1) & -stub_align))
794e51c0
AM
10568 return stub_align - (stub_off & (stub_align - 1));
10569 return 0;
10570}
10571
10572/* Build a .plt call stub. */
10573
10574static inline bfd_byte *
10575build_plt_stub (struct ppc_link_hash_table *htab,
10576 struct ppc_stub_hash_entry *stub_entry,
10577 bfd_byte *p, bfd_vma offset, Elf_Internal_Rela *r)
10578{
e7d1c40c 10579 bfd *obfd = htab->params->stub_bfd;
b9e5796b 10580 bfd_boolean plt_load_toc = htab->opd_abi;
e7d1c40c 10581 bfd_boolean plt_static_chain = htab->params->plt_static_chain;
bd4d2eaa
AM
10582 bfd_boolean plt_thread_safe = (htab->params->plt_thread_safe
10583 && htab->elf.dynamic_sections_created
10584 && stub_entry->h != NULL
10585 && stub_entry->h->elf.dynindx != -1);
794e51c0
AM
10586 bfd_boolean use_fake_dep = plt_thread_safe;
10587 bfd_vma cmp_branch_off = 0;
10588
10589 if (!ALWAYS_USE_FAKE_DEP
b9e5796b 10590 && plt_load_toc
794e51c0 10591 && plt_thread_safe
bd4d2eaa
AM
10592 && !((stub_entry->h == htab->tls_get_addr_fd
10593 || stub_entry->h == htab->tls_get_addr)
7c9cf415 10594 && htab->params->tls_get_addr_opt))
794e51c0
AM
10595 {
10596 bfd_vma pltoff = stub_entry->plt_ent->plt.offset & ~1;
b9e5796b
AM
10597 bfd_vma pltindex = ((pltoff - PLT_INITIAL_ENTRY_SIZE (htab))
10598 / PLT_ENTRY_SIZE (htab));
794e51c0
AM
10599 bfd_vma glinkoff = GLINK_CALL_STUB_SIZE + pltindex * 8;
10600 bfd_vma to, from;
10601
68d62958
AM
10602 if (pltindex > 32768)
10603 glinkoff += (pltindex - 32768) * 4;
794e51c0
AM
10604 to = (glinkoff
10605 + htab->glink->output_offset
10606 + htab->glink->output_section->vma);
6f20ed8a 10607 from = (p - stub_entry->group->stub_sec->contents
794e51c0
AM
10608 + 4 * (ALWAYS_EMIT_R2SAVE
10609 || stub_entry->stub_type == ppc_stub_plt_call_r2save)
10610 + 4 * (PPC_HA (offset) != 0)
10611 + 4 * (PPC_HA (offset + 8 + 8 * plt_static_chain)
10612 != PPC_HA (offset))
10613 + 4 * (plt_static_chain != 0)
10614 + 20
6f20ed8a
AM
10615 + stub_entry->group->stub_sec->output_offset
10616 + stub_entry->group->stub_sec->output_section->vma);
794e51c0
AM
10617 cmp_branch_off = to - from;
10618 use_fake_dep = cmp_branch_off + (1 << 25) >= (1 << 26);
10619 }
10620
ac2df442
AM
10621 if (PPC_HA (offset) != 0)
10622 {
176a0d42
AM
10623 if (r != NULL)
10624 {
794e51c0
AM
10625 if (ALWAYS_EMIT_R2SAVE
10626 || stub_entry->stub_type == ppc_stub_plt_call_r2save)
10627 r[0].r_offset += 4;
176a0d42 10628 r[0].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_HA);
3b421ab3 10629 r[1].r_offset = r[0].r_offset + 4;
176a0d42
AM
10630 r[1].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_LO_DS);
10631 r[1].r_addend = r[0].r_addend;
b9e5796b 10632 if (plt_load_toc)
176a0d42 10633 {
b9e5796b 10634 if (PPC_HA (offset + 8 + 8 * plt_static_chain) != PPC_HA (offset))
c7131b65 10635 {
b9e5796b
AM
10636 r[2].r_offset = r[1].r_offset + 4;
10637 r[2].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_LO);
10638 r[2].r_addend = r[0].r_addend;
10639 }
10640 else
10641 {
10642 r[2].r_offset = r[1].r_offset + 8 + 8 * use_fake_dep;
10643 r[2].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_LO_DS);
10644 r[2].r_addend = r[0].r_addend + 8;
10645 if (plt_static_chain)
10646 {
10647 r[3].r_offset = r[2].r_offset + 4;
10648 r[3].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_LO_DS);
10649 r[3].r_addend = r[0].r_addend + 16;
10650 }
c7131b65 10651 }
176a0d42
AM
10652 }
10653 }
794e51c0
AM
10654 if (ALWAYS_EMIT_R2SAVE
10655 || stub_entry->stub_type == ppc_stub_plt_call_r2save)
a078d95a 10656 bfd_put_32 (obfd, STD_R2_0R1 + STK_TOC (htab), p), p += 4;
397998fc
AM
10657 if (plt_load_toc)
10658 {
10659 bfd_put_32 (obfd, ADDIS_R11_R2 | PPC_HA (offset), p), p += 4;
10660 bfd_put_32 (obfd, LD_R12_0R11 | PPC_LO (offset), p), p += 4;
10661 }
10662 else
10663 {
10664 bfd_put_32 (obfd, ADDIS_R12_R2 | PPC_HA (offset), p), p += 4;
10665 bfd_put_32 (obfd, LD_R12_0R12 | PPC_LO (offset), p), p += 4;
10666 }
b9e5796b
AM
10667 if (plt_load_toc
10668 && PPC_HA (offset + 8 + 8 * plt_static_chain) != PPC_HA (offset))
ac2df442 10669 {
71a39c98 10670 bfd_put_32 (obfd, ADDI_R11_R11 | PPC_LO (offset), p), p += 4;
ac2df442
AM
10671 offset = 0;
10672 }
71a39c98 10673 bfd_put_32 (obfd, MTCTR_R12, p), p += 4;
b9e5796b 10674 if (plt_load_toc)
794e51c0 10675 {
b9e5796b
AM
10676 if (use_fake_dep)
10677 {
10678 bfd_put_32 (obfd, XOR_R2_R12_R12, p), p += 4;
10679 bfd_put_32 (obfd, ADD_R11_R11_R2, p), p += 4;
10680 }
10681 bfd_put_32 (obfd, LD_R2_0R11 | PPC_LO (offset + 8), p), p += 4;
10682 if (plt_static_chain)
10683 bfd_put_32 (obfd, LD_R11_0R11 | PPC_LO (offset + 16), p), p += 4;
794e51c0 10684 }
ac2df442
AM
10685 }
10686 else
10687 {
176a0d42
AM
10688 if (r != NULL)
10689 {
794e51c0
AM
10690 if (ALWAYS_EMIT_R2SAVE
10691 || stub_entry->stub_type == ppc_stub_plt_call_r2save)
10692 r[0].r_offset += 4;
176a0d42 10693 r[0].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_DS);
b9e5796b 10694 if (plt_load_toc)
176a0d42 10695 {
b9e5796b 10696 if (PPC_HA (offset + 8 + 8 * plt_static_chain) != PPC_HA (offset))
c7131b65 10697 {
b9e5796b
AM
10698 r[1].r_offset = r[0].r_offset + 4;
10699 r[1].r_info = ELF64_R_INFO (0, R_PPC64_TOC16);
10700 r[1].r_addend = r[0].r_addend;
10701 }
10702 else
10703 {
10704 r[1].r_offset = r[0].r_offset + 8 + 8 * use_fake_dep;
10705 r[1].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_DS);
10706 r[1].r_addend = r[0].r_addend + 8 + 8 * plt_static_chain;
10707 if (plt_static_chain)
10708 {
10709 r[2].r_offset = r[1].r_offset + 4;
10710 r[2].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_DS);
10711 r[2].r_addend = r[0].r_addend + 8;
10712 }
c7131b65 10713 }
176a0d42
AM
10714 }
10715 }
794e51c0
AM
10716 if (ALWAYS_EMIT_R2SAVE
10717 || stub_entry->stub_type == ppc_stub_plt_call_r2save)
a078d95a 10718 bfd_put_32 (obfd, STD_R2_0R1 + STK_TOC (htab), p), p += 4;
71a39c98 10719 bfd_put_32 (obfd, LD_R12_0R2 | PPC_LO (offset), p), p += 4;
b9e5796b
AM
10720 if (plt_load_toc
10721 && PPC_HA (offset + 8 + 8 * plt_static_chain) != PPC_HA (offset))
ac2df442
AM
10722 {
10723 bfd_put_32 (obfd, ADDI_R2_R2 | PPC_LO (offset), p), p += 4;
10724 offset = 0;
10725 }
71a39c98 10726 bfd_put_32 (obfd, MTCTR_R12, p), p += 4;
b9e5796b 10727 if (plt_load_toc)
794e51c0 10728 {
b9e5796b
AM
10729 if (use_fake_dep)
10730 {
10731 bfd_put_32 (obfd, XOR_R11_R12_R12, p), p += 4;
10732 bfd_put_32 (obfd, ADD_R2_R2_R11, p), p += 4;
10733 }
10734 if (plt_static_chain)
10735 bfd_put_32 (obfd, LD_R11_0R2 | PPC_LO (offset + 16), p), p += 4;
10736 bfd_put_32 (obfd, LD_R2_0R2 | PPC_LO (offset + 8), p), p += 4;
794e51c0 10737 }
ac2df442 10738 }
b9e5796b 10739 if (plt_load_toc && plt_thread_safe && !use_fake_dep)
794e51c0
AM
10740 {
10741 bfd_put_32 (obfd, CMPLDI_R2_0, p), p += 4;
10742 bfd_put_32 (obfd, BNECTR_P4, p), p += 4;
22aa0c7e 10743 bfd_put_32 (obfd, B_DOT | (cmp_branch_off & 0x3fffffc), p), p += 4;
794e51c0
AM
10744 }
10745 else
10746 bfd_put_32 (obfd, BCTR, p), p += 4;
5d1634d7
AM
10747 return p;
10748}
10749
a7f2871e
AM
10750/* Build a special .plt call stub for __tls_get_addr. */
10751
10752#define LD_R11_0R3 0xe9630000
10753#define LD_R12_0R3 0xe9830000
10754#define MR_R0_R3 0x7c601b78
10755#define CMPDI_R11_0 0x2c2b0000
10756#define ADD_R3_R12_R13 0x7c6c6a14
10757#define BEQLR 0x4d820020
10758#define MR_R3_R0 0x7c030378
a7f2871e
AM
10759#define STD_R11_0R1 0xf9610000
10760#define BCTRL 0x4e800421
10761#define LD_R11_0R1 0xe9610000
a7f2871e
AM
10762#define MTLR_R11 0x7d6803a6
10763
10764static inline bfd_byte *
794e51c0
AM
10765build_tls_get_addr_stub (struct ppc_link_hash_table *htab,
10766 struct ppc_stub_hash_entry *stub_entry,
10767 bfd_byte *p, bfd_vma offset, Elf_Internal_Rela *r)
a7f2871e 10768{
e7d1c40c 10769 bfd *obfd = htab->params->stub_bfd;
794e51c0 10770
a7f2871e
AM
10771 bfd_put_32 (obfd, LD_R11_0R3 + 0, p), p += 4;
10772 bfd_put_32 (obfd, LD_R12_0R3 + 8, p), p += 4;
10773 bfd_put_32 (obfd, MR_R0_R3, p), p += 4;
10774 bfd_put_32 (obfd, CMPDI_R11_0, p), p += 4;
10775 bfd_put_32 (obfd, ADD_R3_R12_R13, p), p += 4;
10776 bfd_put_32 (obfd, BEQLR, p), p += 4;
10777 bfd_put_32 (obfd, MR_R3_R0, p), p += 4;
10778 bfd_put_32 (obfd, MFLR_R11, p), p += 4;
a078d95a 10779 bfd_put_32 (obfd, STD_R11_0R1 + STK_LINKER (htab), p), p += 4;
a7f2871e
AM
10780
10781 if (r != NULL)
10782 r[0].r_offset += 9 * 4;
794e51c0 10783 p = build_plt_stub (htab, stub_entry, p, offset, r);
a7f2871e
AM
10784 bfd_put_32 (obfd, BCTRL, p - 4);
10785
a078d95a 10786 bfd_put_32 (obfd, LD_R2_0R1 + STK_TOC (htab), p), p += 4;
bd4d2eaa 10787 bfd_put_32 (obfd, LD_R11_0R1 + STK_LINKER (htab), p), p += 4;
a7f2871e
AM
10788 bfd_put_32 (obfd, MTLR_R11, p), p += 4;
10789 bfd_put_32 (obfd, BLR, p), p += 4;
10790
10791 return p;
10792}
10793
176a0d42
AM
10794static Elf_Internal_Rela *
10795get_relocs (asection *sec, int count)
10796{
10797 Elf_Internal_Rela *relocs;
10798 struct bfd_elf_section_data *elfsec_data;
10799
10800 elfsec_data = elf_section_data (sec);
10801 relocs = elfsec_data->relocs;
10802 if (relocs == NULL)
10803 {
10804 bfd_size_type relsize;
10805 relsize = sec->reloc_count * sizeof (*relocs);
10806 relocs = bfd_alloc (sec->owner, relsize);
10807 if (relocs == NULL)
10808 return NULL;
10809 elfsec_data->relocs = relocs;
d4730f92
BS
10810 elfsec_data->rela.hdr = bfd_zalloc (sec->owner,
10811 sizeof (Elf_Internal_Shdr));
10812 if (elfsec_data->rela.hdr == NULL)
10813 return NULL;
10814 elfsec_data->rela.hdr->sh_size = (sec->reloc_count
10815 * sizeof (Elf64_External_Rela));
10816 elfsec_data->rela.hdr->sh_entsize = sizeof (Elf64_External_Rela);
176a0d42
AM
10817 sec->reloc_count = 0;
10818 }
10819 relocs += sec->reloc_count;
10820 sec->reloc_count += count;
10821 return relocs;
10822}
10823
aa374f67 10824static bfd_vma
25f53a85 10825get_r2off (struct bfd_link_info *info,
aa374f67
AM
10826 struct ppc_stub_hash_entry *stub_entry)
10827{
25f53a85 10828 struct ppc_link_hash_table *htab = ppc_hash_table (info);
6f20ed8a 10829 bfd_vma r2off = htab->sec_info[stub_entry->target_section->id].toc_off;
aa374f67
AM
10830
10831 if (r2off == 0)
10832 {
10833 /* Support linking -R objects. Get the toc pointer from the
10834 opd entry. */
10835 char buf[8];
b9e5796b
AM
10836 if (!htab->opd_abi)
10837 return r2off;
aa374f67
AM
10838 asection *opd = stub_entry->h->elf.root.u.def.section;
10839 bfd_vma opd_off = stub_entry->h->elf.root.u.def.value;
10840
10841 if (strcmp (opd->name, ".opd") != 0
10842 || opd->reloc_count != 0)
10843 {
bc30df16 10844 info->callbacks->einfo (_("%P: cannot find opd entry toc for `%T'\n"),
25f53a85 10845 stub_entry->h->elf.root.root.string);
aa374f67 10846 bfd_set_error (bfd_error_bad_value);
a7c49797 10847 return (bfd_vma) -1;
aa374f67
AM
10848 }
10849 if (!bfd_get_section_contents (opd->owner, opd, buf, opd_off + 8, 8))
a7c49797 10850 return (bfd_vma) -1;
aa374f67 10851 r2off = bfd_get_64 (opd->owner, buf);
25f53a85 10852 r2off -= elf_gp (info->output_bfd);
aa374f67 10853 }
6f20ed8a 10854 r2off -= htab->sec_info[stub_entry->group->link_sec->id].toc_off;
aa374f67
AM
10855 return r2off;
10856}
10857
b34976b6 10858static bfd_boolean
4ce794b7 10859ppc_build_one_stub (struct bfd_hash_entry *gen_entry, void *in_arg)
5d1634d7 10860{
721956f4
AM
10861 struct ppc_stub_hash_entry *stub_entry;
10862 struct ppc_branch_hash_entry *br_entry;
5d1634d7
AM
10863 struct bfd_link_info *info;
10864 struct ppc_link_hash_table *htab;
721956f4
AM
10865 bfd_byte *loc;
10866 bfd_byte *p;
ee75fd95 10867 bfd_vma dest, off;
721956f4 10868 int size;
176a0d42 10869 Elf_Internal_Rela *r;
e054468f 10870 asection *plt;
5d1634d7 10871
721956f4
AM
10872 /* Massage our args to the form they really have. */
10873 stub_entry = (struct ppc_stub_hash_entry *) gen_entry;
4ce794b7 10874 info = in_arg;
5d1634d7 10875
5d1634d7 10876 htab = ppc_hash_table (info);
4dfe6ac6
NC
10877 if (htab == NULL)
10878 return FALSE;
5d1634d7 10879
721956f4 10880 /* Make a note of the offset within the stubs for this entry. */
6f20ed8a
AM
10881 stub_entry->stub_offset = stub_entry->group->stub_sec->size;
10882 loc = stub_entry->group->stub_sec->contents + stub_entry->stub_offset;
721956f4 10883
4ce794b7 10884 htab->stub_count[stub_entry->stub_type - 1] += 1;
721956f4 10885 switch (stub_entry->stub_type)
5d1634d7 10886 {
721956f4 10887 case ppc_stub_long_branch:
ad8e1ba5 10888 case ppc_stub_long_branch_r2off:
721956f4 10889 /* Branches are relative. This is where we are going to. */
6911b7dc
AM
10890 dest = (stub_entry->target_value
10891 + stub_entry->target_section->output_offset
10892 + stub_entry->target_section->output_section->vma);
10893 dest += PPC64_LOCAL_ENTRY_OFFSET (stub_entry->other);
10894 off = dest;
5d1634d7 10895
721956f4
AM
10896 /* And this is where we are coming from. */
10897 off -= (stub_entry->stub_offset
6f20ed8a
AM
10898 + stub_entry->group->stub_sec->output_offset
10899 + stub_entry->group->stub_sec->output_section->vma);
e86ce104 10900
ac2df442
AM
10901 size = 4;
10902 if (stub_entry->stub_type == ppc_stub_long_branch_r2off)
ad8e1ba5 10903 {
25f53a85 10904 bfd_vma r2off = get_r2off (info, stub_entry);
ad8e1ba5 10905
a7c49797 10906 if (r2off == (bfd_vma) -1)
aa374f67
AM
10907 {
10908 htab->stub_error = TRUE;
10909 return FALSE;
10910 }
e7d1c40c 10911 bfd_put_32 (htab->params->stub_bfd, STD_R2_0R1 + STK_TOC (htab), loc);
ad8e1ba5 10912 loc += 4;
a7c49797 10913 size = 8;
ac2df442
AM
10914 if (PPC_HA (r2off) != 0)
10915 {
e7d1c40c
AM
10916 bfd_put_32 (htab->params->stub_bfd,
10917 ADDIS_R2_R2 | PPC_HA (r2off), loc);
ac2df442 10918 loc += 4;
a7c49797
AM
10919 size += 4;
10920 }
10921 if (PPC_LO (r2off) != 0)
10922 {
10923 bfd_put_32 (htab->params->stub_bfd,
10924 ADDI_R2_R2 | PPC_LO (r2off), loc);
10925 loc += 4;
10926 size += 4;
ac2df442 10927 }
ac2df442 10928 off -= size - 4;
ad8e1ba5 10929 }
e7d1c40c 10930 bfd_put_32 (htab->params->stub_bfd, B_DOT | (off & 0x3fffffc), loc);
ad8e1ba5 10931
5c3dead3
AM
10932 if (off + (1 << 25) >= (bfd_vma) (1 << 26))
10933 {
bc30df16
AM
10934 info->callbacks->einfo
10935 (_("%P: long branch stub `%s' offset overflow\n"),
10936 stub_entry->root.string);
5c3dead3
AM
10937 htab->stub_error = TRUE;
10938 return FALSE;
10939 }
ee75fd95
AM
10940
10941 if (info->emitrelocations)
10942 {
6f20ed8a 10943 r = get_relocs (stub_entry->group->stub_sec, 1);
176a0d42
AM
10944 if (r == NULL)
10945 return FALSE;
6f20ed8a 10946 r->r_offset = loc - stub_entry->group->stub_sec->contents;
ee75fd95
AM
10947 r->r_info = ELF64_R_INFO (0, R_PPC64_REL24);
10948 r->r_addend = dest;
10949 if (stub_entry->h != NULL)
10950 {
10951 struct elf_link_hash_entry **hashes;
10952 unsigned long symndx;
10953 struct ppc_link_hash_entry *h;
10954
e7d1c40c 10955 hashes = elf_sym_hashes (htab->params->stub_bfd);
ee75fd95
AM
10956 if (hashes == NULL)
10957 {
10958 bfd_size_type hsize;
10959
10960 hsize = (htab->stub_globals + 1) * sizeof (*hashes);
e7d1c40c 10961 hashes = bfd_zalloc (htab->params->stub_bfd, hsize);
ee75fd95
AM
10962 if (hashes == NULL)
10963 return FALSE;
e7d1c40c 10964 elf_sym_hashes (htab->params->stub_bfd) = hashes;
ee75fd95
AM
10965 htab->stub_globals = 1;
10966 }
10967 symndx = htab->stub_globals++;
10968 h = stub_entry->h;
10969 hashes[symndx] = &h->elf;
10970 r->r_info = ELF64_R_INFO (symndx, R_PPC64_REL24);
10971 if (h->oh != NULL && h->oh->is_func)
b31867b6 10972 h = ppc_follow_link (h->oh);
ee75fd95
AM
10973 if (h->elf.root.u.def.section != stub_entry->target_section)
10974 /* H is an opd symbol. The addend must be zero. */
10975 r->r_addend = 0;
10976 else
10977 {
10978 off = (h->elf.root.u.def.value
10979 + h->elf.root.u.def.section->output_offset
10980 + h->elf.root.u.def.section->output_section->vma);
10981 r->r_addend -= off;
10982 }
10983 }
10984 }
721956f4 10985 break;
e86ce104 10986
721956f4 10987 case ppc_stub_plt_branch:
ad8e1ba5 10988 case ppc_stub_plt_branch_r2off:
721956f4
AM
10989 br_entry = ppc_branch_hash_lookup (&htab->branch_hash_table,
10990 stub_entry->root.string + 9,
b34976b6 10991 FALSE, FALSE);
721956f4
AM
10992 if (br_entry == NULL)
10993 {
8de848d8 10994 info->callbacks->einfo (_("%P: can't find branch stub `%s'\n"),
25f53a85 10995 stub_entry->root.string);
b34976b6
AM
10996 htab->stub_error = TRUE;
10997 return FALSE;
721956f4
AM
10998 }
10999
176a0d42
AM
11000 dest = (stub_entry->target_value
11001 + stub_entry->target_section->output_offset
11002 + stub_entry->target_section->output_section->vma);
6911b7dc
AM
11003 if (stub_entry->stub_type != ppc_stub_plt_branch_r2off)
11004 dest += PPC64_LOCAL_ENTRY_OFFSET (stub_entry->other);
721956f4 11005
176a0d42 11006 bfd_put_64 (htab->brlt->owner, dest,
4ce794b7 11007 htab->brlt->contents + br_entry->offset);
721956f4 11008
f94498ff 11009 if (br_entry->iter == htab->stub_iteration)
721956f4 11010 {
f94498ff 11011 br_entry->iter = 0;
84f5d08e 11012
f94498ff 11013 if (htab->relbrlt != NULL)
84f5d08e 11014 {
f94498ff
AM
11015 /* Create a reloc for the branch lookup table entry. */
11016 Elf_Internal_Rela rela;
11017 bfd_byte *rl;
11018
11019 rela.r_offset = (br_entry->offset
11020 + htab->brlt->output_offset
11021 + htab->brlt->output_section->vma);
11022 rela.r_info = ELF64_R_INFO (0, R_PPC64_RELATIVE);
176a0d42 11023 rela.r_addend = dest;
f94498ff
AM
11024
11025 rl = htab->relbrlt->contents;
11026 rl += (htab->relbrlt->reloc_count++
11027 * sizeof (Elf64_External_Rela));
11028 bfd_elf64_swap_reloca_out (htab->relbrlt->owner, &rela, rl);
11029 }
11030 else if (info->emitrelocations)
11031 {
176a0d42
AM
11032 r = get_relocs (htab->brlt, 1);
11033 if (r == NULL)
11034 return FALSE;
11035 /* brlt, being SEC_LINKER_CREATED does not go through the
11036 normal reloc processing. Symbols and offsets are not
11037 translated from input file to output file form, so
11038 set up the offset per the output file. */
f94498ff
AM
11039 r->r_offset = (br_entry->offset
11040 + htab->brlt->output_offset
11041 + htab->brlt->output_section->vma);
11042 r->r_info = ELF64_R_INFO (0, R_PPC64_RELATIVE);
176a0d42 11043 r->r_addend = dest;
84f5d08e 11044 }
84f5d08e 11045 }
721956f4 11046
176a0d42
AM
11047 dest = (br_entry->offset
11048 + htab->brlt->output_offset
11049 + htab->brlt->output_section->vma);
11050
11051 off = (dest
4ce794b7 11052 - elf_gp (htab->brlt->output_section->owner)
6f20ed8a 11053 - htab->sec_info[stub_entry->group->link_sec->id].toc_off);
721956f4 11054
ad8e1ba5 11055 if (off + 0x80008000 > 0xffffffff || (off & 7) != 0)
5d1634d7 11056 {
25f53a85 11057 info->callbacks->einfo
bc30df16 11058 (_("%P: linkage table error against `%T'\n"),
721956f4 11059 stub_entry->root.string);
5d1634d7 11060 bfd_set_error (bfd_error_bad_value);
b34976b6
AM
11061 htab->stub_error = TRUE;
11062 return FALSE;
5d1634d7 11063 }
41bd81ab 11064
176a0d42
AM
11065 if (info->emitrelocations)
11066 {
6f20ed8a 11067 r = get_relocs (stub_entry->group->stub_sec, 1 + (PPC_HA (off) != 0));
176a0d42
AM
11068 if (r == NULL)
11069 return FALSE;
6f20ed8a 11070 r[0].r_offset = loc - stub_entry->group->stub_sec->contents;
7cfbafbc
AM
11071 if (bfd_big_endian (info->output_bfd))
11072 r[0].r_offset += 2;
00f412ee 11073 if (stub_entry->stub_type == ppc_stub_plt_branch_r2off)
176a0d42
AM
11074 r[0].r_offset += 4;
11075 r[0].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_DS);
11076 r[0].r_addend = dest;
11077 if (PPC_HA (off) != 0)
11078 {
11079 r[0].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_HA);
11080 r[1].r_offset = r[0].r_offset + 4;
11081 r[1].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_LO_DS);
11082 r[1].r_addend = r[0].r_addend;
11083 }
11084 }
11085
00f412ee 11086 if (stub_entry->stub_type != ppc_stub_plt_branch_r2off)
ad8e1ba5 11087 {
176a0d42 11088 if (PPC_HA (off) != 0)
ac2df442
AM
11089 {
11090 size = 16;
e7d1c40c 11091 bfd_put_32 (htab->params->stub_bfd,
397998fc 11092 ADDIS_R12_R2 | PPC_HA (off), loc);
ac2df442 11093 loc += 4;
e7d1c40c 11094 bfd_put_32 (htab->params->stub_bfd,
397998fc 11095 LD_R12_0R12 | PPC_LO (off), loc);
ac2df442
AM
11096 }
11097 else
11098 {
11099 size = 12;
e7d1c40c
AM
11100 bfd_put_32 (htab->params->stub_bfd,
11101 LD_R12_0R2 | PPC_LO (off), loc);
ac2df442 11102 }
ad8e1ba5
AM
11103 }
11104 else
11105 {
25f53a85 11106 bfd_vma r2off = get_r2off (info, stub_entry);
aa374f67 11107
a7c49797 11108 if (r2off == (bfd_vma) -1)
aa374f67
AM
11109 {
11110 htab->stub_error = TRUE;
11111 return FALSE;
11112 }
ad8e1ba5 11113
e7d1c40c 11114 bfd_put_32 (htab->params->stub_bfd, STD_R2_0R1 + STK_TOC (htab), loc);
ad8e1ba5 11115 loc += 4;
00f412ee 11116 size = 16;
176a0d42 11117 if (PPC_HA (off) != 0)
ac2df442
AM
11118 {
11119 size += 4;
e7d1c40c 11120 bfd_put_32 (htab->params->stub_bfd,
397998fc 11121 ADDIS_R12_R2 | PPC_HA (off), loc);
ac2df442 11122 loc += 4;
e7d1c40c 11123 bfd_put_32 (htab->params->stub_bfd,
397998fc 11124 LD_R12_0R12 | PPC_LO (off), loc);
ac2df442
AM
11125 }
11126 else
e7d1c40c 11127 bfd_put_32 (htab->params->stub_bfd, LD_R12_0R2 | PPC_LO (off), loc);
ac2df442
AM
11128
11129 if (PPC_HA (r2off) != 0)
11130 {
11131 size += 4;
00f412ee 11132 loc += 4;
e7d1c40c
AM
11133 bfd_put_32 (htab->params->stub_bfd,
11134 ADDIS_R2_R2 | PPC_HA (r2off), loc);
00f412ee
AM
11135 }
11136 if (PPC_LO (r2off) != 0)
11137 {
11138 size += 4;
ac2df442 11139 loc += 4;
e7d1c40c
AM
11140 bfd_put_32 (htab->params->stub_bfd,
11141 ADDI_R2_R2 | PPC_LO (r2off), loc);
ac2df442 11142 }
ad8e1ba5
AM
11143 }
11144 loc += 4;
e7d1c40c 11145 bfd_put_32 (htab->params->stub_bfd, MTCTR_R12, loc);
ad8e1ba5 11146 loc += 4;
e7d1c40c 11147 bfd_put_32 (htab->params->stub_bfd, BCTR, loc);
721956f4 11148 break;
5d1634d7 11149
721956f4 11150 case ppc_stub_plt_call:
794e51c0 11151 case ppc_stub_plt_call_r2save:
e054468f 11152 if (stub_entry->h != NULL
b31867b6
AM
11153 && stub_entry->h->is_func_descriptor
11154 && stub_entry->h->oh != NULL)
c862ae31 11155 {
b31867b6
AM
11156 struct ppc_link_hash_entry *fh = ppc_follow_link (stub_entry->h->oh);
11157
11158 /* If the old-ABI "dot-symbol" is undefined make it weak so
6f20ed8a 11159 we don't get a link error from RELOC_FOR_GLOBAL_SYMBOL. */
8c5b4e52
AM
11160 if (fh->elf.root.type == bfd_link_hash_undefined
11161 && (stub_entry->h->elf.root.type == bfd_link_hash_defined
11162 || stub_entry->h->elf.root.type == bfd_link_hash_defweak))
b31867b6 11163 fh->elf.root.type = bfd_link_hash_undefweak;
c862ae31
AM
11164 }
11165
721956f4 11166 /* Now build the stub. */
e054468f 11167 dest = stub_entry->plt_ent->plt.offset & ~1;
176a0d42 11168 if (dest >= (bfd_vma) -2)
721956f4
AM
11169 abort ();
11170
33e44f2e 11171 plt = htab->elf.splt;
25f23106
AM
11172 if (!htab->elf.dynamic_sections_created
11173 || stub_entry->h == NULL
11174 || stub_entry->h->elf.dynindx == -1)
33e44f2e 11175 plt = htab->elf.iplt;
e054468f
AM
11176
11177 dest += plt->output_offset + plt->output_section->vma;
11178
11179 if (stub_entry->h == NULL
11180 && (stub_entry->plt_ent->plt.offset & 1) == 0)
11181 {
11182 Elf_Internal_Rela rela;
11183 bfd_byte *rl;
11184
11185 rela.r_offset = dest;
ee67d69a
AM
11186 if (htab->opd_abi)
11187 rela.r_info = ELF64_R_INFO (0, R_PPC64_JMP_IREL);
11188 else
11189 rela.r_info = ELF64_R_INFO (0, R_PPC64_IRELATIVE);
e054468f
AM
11190 rela.r_addend = (stub_entry->target_value
11191 + stub_entry->target_section->output_offset
11192 + stub_entry->target_section->output_section->vma);
11193
33e44f2e
AM
11194 rl = (htab->elf.irelplt->contents
11195 + (htab->elf.irelplt->reloc_count++
25f23106
AM
11196 * sizeof (Elf64_External_Rela)));
11197 bfd_elf64_swap_reloca_out (info->output_bfd, &rela, rl);
e054468f 11198 stub_entry->plt_ent->plt.offset |= 1;
82e66161 11199 htab->local_ifunc_resolver = 1;
e054468f 11200 }
176a0d42
AM
11201
11202 off = (dest
e054468f 11203 - elf_gp (plt->output_section->owner)
6f20ed8a 11204 - htab->sec_info[stub_entry->group->link_sec->id].toc_off);
721956f4 11205
ad8e1ba5 11206 if (off + 0x80008000 > 0xffffffff || (off & 7) != 0)
721956f4 11207 {
25f53a85 11208 info->callbacks->einfo
695344c0 11209 /* xgettext:c-format */
bc30df16 11210 (_("%P: linkage table error against `%T'\n"),
e054468f
AM
11211 stub_entry->h != NULL
11212 ? stub_entry->h->elf.root.root.string
11213 : "<local sym>");
721956f4 11214 bfd_set_error (bfd_error_bad_value);
b34976b6
AM
11215 htab->stub_error = TRUE;
11216 return FALSE;
721956f4
AM
11217 }
11218
e7d1c40c 11219 if (htab->params->plt_stub_align != 0)
794e51c0
AM
11220 {
11221 unsigned pad = plt_stub_pad (htab, stub_entry, off);
11222
6f20ed8a
AM
11223 stub_entry->group->stub_sec->size += pad;
11224 stub_entry->stub_offset = stub_entry->group->stub_sec->size;
794e51c0
AM
11225 loc += pad;
11226 }
11227
176a0d42
AM
11228 r = NULL;
11229 if (info->emitrelocations)
11230 {
6f20ed8a 11231 r = get_relocs (stub_entry->group->stub_sec,
3ba720c7
AM
11232 ((PPC_HA (off) != 0)
11233 + (htab->opd_abi
e7d1c40c 11234 ? 2 + (htab->params->plt_static_chain
3ba720c7
AM
11235 && PPC_HA (off + 16) == PPC_HA (off))
11236 : 1)));
176a0d42
AM
11237 if (r == NULL)
11238 return FALSE;
6f20ed8a 11239 r[0].r_offset = loc - stub_entry->group->stub_sec->contents;
7cfbafbc
AM
11240 if (bfd_big_endian (info->output_bfd))
11241 r[0].r_offset += 2;
176a0d42
AM
11242 r[0].r_addend = dest;
11243 }
a7f2871e
AM
11244 if (stub_entry->h != NULL
11245 && (stub_entry->h == htab->tls_get_addr_fd
11246 || stub_entry->h == htab->tls_get_addr)
7c9cf415 11247 && htab->params->tls_get_addr_opt)
794e51c0 11248 p = build_tls_get_addr_stub (htab, stub_entry, loc, off, r);
a7f2871e 11249 else
794e51c0 11250 p = build_plt_stub (htab, stub_entry, loc, off, r);
721956f4
AM
11251 size = p - loc;
11252 break;
11253
a4b6fadd
AM
11254 case ppc_stub_save_res:
11255 return TRUE;
11256
721956f4
AM
11257 default:
11258 BFD_FAIL ();
b34976b6 11259 return FALSE;
721956f4
AM
11260 }
11261
6f20ed8a 11262 stub_entry->group->stub_sec->size += size;
97b639ba 11263
e7d1c40c 11264 if (htab->params->emit_stub_syms)
97b639ba
AM
11265 {
11266 struct elf_link_hash_entry *h;
ee75fd95
AM
11267 size_t len1, len2;
11268 char *name;
11269 const char *const stub_str[] = { "long_branch",
11270 "long_branch_r2off",
11271 "plt_branch",
11272 "plt_branch_r2off",
794e51c0 11273 "plt_call",
ee75fd95
AM
11274 "plt_call" };
11275
11276 len1 = strlen (stub_str[stub_entry->stub_type - 1]);
11277 len2 = strlen (stub_entry->root.string);
11278 name = bfd_malloc (len1 + len2 + 2);
11279 if (name == NULL)
11280 return FALSE;
11281 memcpy (name, stub_entry->root.string, 9);
11282 memcpy (name + 9, stub_str[stub_entry->stub_type - 1], len1);
11283 memcpy (name + len1 + 9, stub_entry->root.string + 8, len2 - 8 + 1);
11284 h = elf_link_hash_lookup (&htab->elf, name, TRUE, FALSE, FALSE);
97b639ba
AM
11285 if (h == NULL)
11286 return FALSE;
11287 if (h->root.type == bfd_link_hash_new)
11288 {
11289 h->root.type = bfd_link_hash_defined;
6f20ed8a 11290 h->root.u.def.section = stub_entry->group->stub_sec;
97b639ba 11291 h->root.u.def.value = stub_entry->stub_offset;
f5385ebf
AM
11292 h->ref_regular = 1;
11293 h->def_regular = 1;
11294 h->ref_regular_nonweak = 1;
11295 h->forced_local = 1;
11296 h->non_elf = 0;
2ec55de3 11297 h->root.linker_def = 1;
97b639ba
AM
11298 }
11299 }
11300
b34976b6 11301 return TRUE;
721956f4
AM
11302}
11303
11304/* As above, but don't actually build the stub. Just bump offset so
11305 we know stub section sizes, and select plt_branch stubs where
11306 long_branch stubs won't do. */
11307
b34976b6 11308static bfd_boolean
4ce794b7 11309ppc_size_one_stub (struct bfd_hash_entry *gen_entry, void *in_arg)
721956f4
AM
11310{
11311 struct ppc_stub_hash_entry *stub_entry;
63bc6f6c 11312 struct bfd_link_info *info;
721956f4
AM
11313 struct ppc_link_hash_table *htab;
11314 bfd_vma off;
11315 int size;
11316
11317 /* Massage our args to the form they really have. */
11318 stub_entry = (struct ppc_stub_hash_entry *) gen_entry;
63bc6f6c
AM
11319 info = in_arg;
11320
11321 htab = ppc_hash_table (info);
4dfe6ac6
NC
11322 if (htab == NULL)
11323 return FALSE;
721956f4 11324
a4b6fadd
AM
11325 if (stub_entry->h != NULL
11326 && stub_entry->h->save_res
11327 && stub_entry->h->elf.root.type == bfd_link_hash_defined
11328 && stub_entry->h->elf.root.u.def.section == htab->sfpr)
11329 {
11330 /* Don't make stubs to out-of-line register save/restore
11331 functions. Instead, emit copies of the functions. */
11332 stub_entry->group->needs_save_res = 1;
11333 stub_entry->stub_type = ppc_stub_save_res;
11334 return TRUE;
11335 }
11336
794e51c0
AM
11337 if (stub_entry->stub_type == ppc_stub_plt_call
11338 || stub_entry->stub_type == ppc_stub_plt_call_r2save)
721956f4 11339 {
e054468f
AM
11340 asection *plt;
11341 off = stub_entry->plt_ent->plt.offset & ~(bfd_vma) 1;
58ac9f71 11342 if (off >= (bfd_vma) -2)
411e1bfb 11343 abort ();
33e44f2e 11344 plt = htab->elf.splt;
25f23106
AM
11345 if (!htab->elf.dynamic_sections_created
11346 || stub_entry->h == NULL
11347 || stub_entry->h->elf.dynindx == -1)
33e44f2e 11348 plt = htab->elf.iplt;
e054468f
AM
11349 off += (plt->output_offset
11350 + plt->output_section->vma
11351 - elf_gp (plt->output_section->owner)
6f20ed8a 11352 - htab->sec_info[stub_entry->group->link_sec->id].toc_off);
721956f4 11353
794e51c0 11354 size = plt_stub_size (htab, stub_entry, off);
e7d1c40c 11355 if (htab->params->plt_stub_align)
794e51c0 11356 size += plt_stub_pad (htab, stub_entry, off);
176a0d42
AM
11357 if (info->emitrelocations)
11358 {
6f20ed8a 11359 stub_entry->group->stub_sec->reloc_count
b9e5796b
AM
11360 += ((PPC_HA (off) != 0)
11361 + (htab->opd_abi
e7d1c40c 11362 ? 2 + (htab->params->plt_static_chain
b9e5796b
AM
11363 && PPC_HA (off + 16) == PPC_HA (off))
11364 : 1));
6f20ed8a 11365 stub_entry->group->stub_sec->flags |= SEC_RELOC;
176a0d42 11366 }
721956f4
AM
11367 }
11368 else
11369 {
ad8e1ba5
AM
11370 /* ppc_stub_long_branch or ppc_stub_plt_branch, or their r2off
11371 variants. */
ac2df442 11372 bfd_vma r2off = 0;
6911b7dc 11373 bfd_vma local_off = 0;
ac2df442 11374
721956f4
AM
11375 off = (stub_entry->target_value
11376 + stub_entry->target_section->output_offset
11377 + stub_entry->target_section->output_section->vma);
6f20ed8a
AM
11378 off -= (stub_entry->group->stub_sec->size
11379 + stub_entry->group->stub_sec->output_offset
11380 + stub_entry->group->stub_sec->output_section->vma);
721956f4 11381
ad8e1ba5
AM
11382 /* Reset the stub type from the plt variant in case we now
11383 can reach with a shorter stub. */
11384 if (stub_entry->stub_type >= ppc_stub_plt_branch)
11385 stub_entry->stub_type += ppc_stub_long_branch - ppc_stub_plt_branch;
11386
11387 size = 4;
11388 if (stub_entry->stub_type == ppc_stub_long_branch_r2off)
11389 {
25f53a85 11390 r2off = get_r2off (info, stub_entry);
a7c49797 11391 if (r2off == (bfd_vma) -1)
aa374f67
AM
11392 {
11393 htab->stub_error = TRUE;
11394 return FALSE;
11395 }
a7c49797 11396 size = 8;
ac2df442 11397 if (PPC_HA (r2off) != 0)
a7c49797
AM
11398 size += 4;
11399 if (PPC_LO (r2off) != 0)
11400 size += 4;
ac2df442 11401 off -= size - 4;
ad8e1ba5
AM
11402 }
11403
6911b7dc
AM
11404 local_off = PPC64_LOCAL_ENTRY_OFFSET (stub_entry->other);
11405
b9e5796b
AM
11406 /* If the branch offset if too big, use a ppc_stub_plt_branch.
11407 Do the same for -R objects without function descriptors. */
11408 if (off + (1 << 25) >= (bfd_vma) (1 << 26) - local_off
11409 || (stub_entry->stub_type == ppc_stub_long_branch_r2off
a7c49797
AM
11410 && r2off == 0
11411 && htab->sec_info[stub_entry->target_section->id].toc_off == 0))
721956f4
AM
11412 {
11413 struct ppc_branch_hash_entry *br_entry;
11414
11415 br_entry = ppc_branch_hash_lookup (&htab->branch_hash_table,
11416 stub_entry->root.string + 9,
b34976b6 11417 TRUE, FALSE);
721956f4
AM
11418 if (br_entry == NULL)
11419 {
8de848d8 11420 info->callbacks->einfo (_("%P: can't build branch stub `%s'\n"),
25f53a85 11421 stub_entry->root.string);
b34976b6
AM
11422 htab->stub_error = TRUE;
11423 return FALSE;
721956f4
AM
11424 }
11425
11426 if (br_entry->iter != htab->stub_iteration)
11427 {
11428 br_entry->iter = htab->stub_iteration;
eea6121a
AM
11429 br_entry->offset = htab->brlt->size;
11430 htab->brlt->size += 8;
63bc6f6c 11431
ee75fd95 11432 if (htab->relbrlt != NULL)
eea6121a 11433 htab->relbrlt->size += sizeof (Elf64_External_Rela);
84f5d08e
AM
11434 else if (info->emitrelocations)
11435 {
11436 htab->brlt->reloc_count += 1;
11437 htab->brlt->flags |= SEC_RELOC;
11438 }
721956f4 11439 }
ad8e1ba5
AM
11440
11441 stub_entry->stub_type += ppc_stub_plt_branch - ppc_stub_long_branch;
ac2df442
AM
11442 off = (br_entry->offset
11443 + htab->brlt->output_offset
11444 + htab->brlt->output_section->vma
11445 - elf_gp (htab->brlt->output_section->owner)
6f20ed8a 11446 - htab->sec_info[stub_entry->group->link_sec->id].toc_off);
ac2df442 11447
176a0d42
AM
11448 if (info->emitrelocations)
11449 {
6f20ed8a
AM
11450 stub_entry->group->stub_sec->reloc_count
11451 += 1 + (PPC_HA (off) != 0);
11452 stub_entry->group->stub_sec->flags |= SEC_RELOC;
176a0d42
AM
11453 }
11454
00f412ee 11455 if (stub_entry->stub_type != ppc_stub_plt_branch_r2off)
ac2df442
AM
11456 {
11457 size = 12;
176a0d42 11458 if (PPC_HA (off) != 0)
ac2df442
AM
11459 size = 16;
11460 }
11461 else
11462 {
00f412ee 11463 size = 16;
176a0d42 11464 if (PPC_HA (off) != 0)
ac2df442
AM
11465 size += 4;
11466
11467 if (PPC_HA (r2off) != 0)
11468 size += 4;
00f412ee
AM
11469 if (PPC_LO (r2off) != 0)
11470 size += 4;
ac2df442 11471 }
721956f4 11472 }
84f5d08e
AM
11473 else if (info->emitrelocations)
11474 {
6f20ed8a
AM
11475 stub_entry->group->stub_sec->reloc_count += 1;
11476 stub_entry->group->stub_sec->flags |= SEC_RELOC;
84f5d08e 11477 }
721956f4
AM
11478 }
11479
6f20ed8a 11480 stub_entry->group->stub_sec->size += size;
b34976b6 11481 return TRUE;
721956f4
AM
11482}
11483
11484/* Set up various things so that we can make a list of input sections
11485 for each output section included in the link. Returns -1 on error,
cedb70c5 11486 0 when no stubs will be needed, and 1 on success. */
721956f4
AM
11487
11488int
e7d1c40c 11489ppc64_elf_setup_section_lists (struct bfd_link_info *info)
721956f4 11490{
6f20ed8a 11491 unsigned int id;
721956f4
AM
11492 bfd_size_type amt;
11493 struct ppc_link_hash_table *htab = ppc_hash_table (info);
11494
4dfe6ac6
NC
11495 if (htab == NULL)
11496 return -1;
4c52953f 11497
6f20ed8a
AM
11498 htab->sec_info_arr_size = bfd_get_next_section_id ();
11499 amt = sizeof (*htab->sec_info) * (htab->sec_info_arr_size);
11500 htab->sec_info = bfd_zmalloc (amt);
11501 if (htab->sec_info == NULL)
721956f4
AM
11502 return -1;
11503
3d6f9012
AM
11504 /* Set toc_off for com, und, abs and ind sections. */
11505 for (id = 0; id < 3; id++)
6f20ed8a 11506 htab->sec_info[id].toc_off = TOC_BASE_OFF;
734b6cf9 11507
721956f4
AM
11508 return 1;
11509}
11510
927be08e
AM
11511/* Set up for first pass at multitoc partitioning. */
11512
11513void
11514ppc64_elf_start_multitoc_partition (struct bfd_link_info *info)
11515{
11516 struct ppc_link_hash_table *htab = ppc_hash_table (info);
11517
1c865ab2 11518 htab->toc_curr = ppc64_elf_set_toc (info, info->output_bfd);
927be08e
AM
11519 htab->toc_bfd = NULL;
11520 htab->toc_first_sec = NULL;
11521}
11522
e717da7e
AM
11523/* The linker repeatedly calls this function for each TOC input section
11524 and linker generated GOT section. Group input bfds such that the toc
927be08e 11525 within a group is less than 64k in size. */
ad8e1ba5 11526
927be08e 11527bfd_boolean
4ce794b7 11528ppc64_elf_next_toc_section (struct bfd_link_info *info, asection *isec)
ad8e1ba5
AM
11529{
11530 struct ppc_link_hash_table *htab = ppc_hash_table (info);
d77c8a4b 11531 bfd_vma addr, off, limit;
ad8e1ba5 11532
4dfe6ac6
NC
11533 if (htab == NULL)
11534 return FALSE;
11535
927be08e 11536 if (!htab->second_toc_pass)
4c52953f 11537 {
927be08e 11538 /* Keep track of the first .toc or .got section for this input bfd. */
a4fd3de5
AM
11539 bfd_boolean new_bfd = htab->toc_bfd != isec->owner;
11540
11541 if (new_bfd)
bf102f86
AM
11542 {
11543 htab->toc_bfd = isec->owner;
11544 htab->toc_first_sec = isec;
11545 }
927be08e 11546
bf102f86
AM
11547 addr = isec->output_offset + isec->output_section->vma;
11548 off = addr - htab->toc_curr;
d77c8a4b
AM
11549 limit = 0x80008000;
11550 if (ppc64_elf_tdata (isec->owner)->has_small_toc_reloc)
11551 limit = 0x10000;
11552 if (off + isec->size > limit)
bf102f86
AM
11553 {
11554 addr = (htab->toc_first_sec->output_offset
11555 + htab->toc_first_sec->output_section->vma);
11556 htab->toc_curr = addr;
a27e685f 11557 htab->toc_curr &= -TOC_BASE_ALIGN;
bf102f86 11558 }
99877b66 11559
927be08e
AM
11560 /* toc_curr is the base address of this toc group. Set elf_gp
11561 for the input section to be the offset relative to the
11562 output toc base plus 0x8000. Making the input elf_gp an
11563 offset allows us to move the toc as a whole without
11564 recalculating input elf_gp. */
11565 off = htab->toc_curr - elf_gp (isec->output_section->owner);
11566 off += TOC_BASE_OFF;
11567
11568 /* Die if someone uses a linker script that doesn't keep input
11569 file .toc and .got together. */
a4fd3de5
AM
11570 if (new_bfd
11571 && elf_gp (isec->owner) != 0
927be08e
AM
11572 && elf_gp (isec->owner) != off)
11573 return FALSE;
11574
11575 elf_gp (isec->owner) = off;
11576 return TRUE;
4c52953f 11577 }
927be08e
AM
11578
11579 /* During the second pass toc_first_sec points to the start of
11580 a toc group, and toc_curr is used to track the old elf_gp.
11581 We use toc_bfd to ensure we only look at each bfd once. */
11582 if (htab->toc_bfd == isec->owner)
11583 return TRUE;
11584 htab->toc_bfd = isec->owner;
11585
11586 if (htab->toc_first_sec == NULL
11587 || htab->toc_curr != elf_gp (isec->owner))
11588 {
11589 htab->toc_curr = elf_gp (isec->owner);
11590 htab->toc_first_sec = isec;
11591 }
11592 addr = (htab->toc_first_sec->output_offset
11593 + htab->toc_first_sec->output_section->vma);
11594 off = addr - elf_gp (isec->output_section->owner) + TOC_BASE_OFF;
11595 elf_gp (isec->owner) = off;
11596
11597 return TRUE;
ad8e1ba5
AM
11598}
11599
927be08e
AM
11600/* Called via elf_link_hash_traverse to merge GOT entries for global
11601 symbol H. */
11602
11603static bfd_boolean
11604merge_global_got (struct elf_link_hash_entry *h, void *inf ATTRIBUTE_UNUSED)
11605{
11606 if (h->root.type == bfd_link_hash_indirect)
11607 return TRUE;
11608
927be08e
AM
11609 merge_got_entries (&h->got.glist);
11610
11611 return TRUE;
11612}
11613
11614/* Called via elf_link_hash_traverse to allocate GOT entries for global
11615 symbol H. */
11616
11617static bfd_boolean
11618reallocate_got (struct elf_link_hash_entry *h, void *inf)
11619{
11620 struct got_entry *gent;
11621
11622 if (h->root.type == bfd_link_hash_indirect)
11623 return TRUE;
11624
927be08e
AM
11625 for (gent = h->got.glist; gent != NULL; gent = gent->next)
11626 if (!gent->is_indirect)
11627 allocate_got (h, (struct bfd_link_info *) inf, gent);
11628 return TRUE;
11629}
11630
11631/* Called on the first multitoc pass after the last call to
11632 ppc64_elf_next_toc_section. This function removes duplicate GOT
11633 entries. */
11634
11635bfd_boolean
11636ppc64_elf_layout_multitoc (struct bfd_link_info *info)
ad8e1ba5
AM
11637{
11638 struct ppc_link_hash_table *htab = ppc_hash_table (info);
927be08e
AM
11639 struct bfd *ibfd, *ibfd2;
11640 bfd_boolean done_something;
11641
11642 htab->multi_toc_needed = htab->toc_curr != elf_gp (info->output_bfd);
ad8e1ba5 11643
7865406b
AM
11644 if (!htab->do_multi_toc)
11645 return FALSE;
11646
d0fae19d 11647 /* Merge global sym got entries within a toc group. */
927be08e
AM
11648 elf_link_hash_traverse (&htab->elf, merge_global_got, info);
11649
11650 /* And tlsld_got. */
c72f2fb2 11651 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
927be08e
AM
11652 {
11653 struct got_entry *ent, *ent2;
11654
11655 if (!is_ppc64_elf (ibfd))
11656 continue;
11657
11658 ent = ppc64_tlsld_got (ibfd);
11659 if (!ent->is_indirect
11660 && ent->got.offset != (bfd_vma) -1)
11661 {
c72f2fb2 11662 for (ibfd2 = ibfd->link.next; ibfd2 != NULL; ibfd2 = ibfd2->link.next)
927be08e
AM
11663 {
11664 if (!is_ppc64_elf (ibfd2))
11665 continue;
11666
11667 ent2 = ppc64_tlsld_got (ibfd2);
11668 if (!ent2->is_indirect
11669 && ent2->got.offset != (bfd_vma) -1
11670 && elf_gp (ibfd2) == elf_gp (ibfd))
11671 {
11672 ent2->is_indirect = TRUE;
11673 ent2->got.ent = ent;
11674 }
11675 }
11676 }
11677 }
11678
11679 /* Zap sizes of got sections. */
33e44f2e
AM
11680 htab->elf.irelplt->rawsize = htab->elf.irelplt->size;
11681 htab->elf.irelplt->size -= htab->got_reli_size;
927be08e
AM
11682 htab->got_reli_size = 0;
11683
c72f2fb2 11684 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
927be08e
AM
11685 {
11686 asection *got, *relgot;
11687
11688 if (!is_ppc64_elf (ibfd))
11689 continue;
11690
11691 got = ppc64_elf_tdata (ibfd)->got;
11692 if (got != NULL)
11693 {
11694 got->rawsize = got->size;
11695 got->size = 0;
11696 relgot = ppc64_elf_tdata (ibfd)->relgot;
11697 relgot->rawsize = relgot->size;
11698 relgot->size = 0;
11699 }
11700 }
11701
11702 /* Now reallocate the got, local syms first. We don't need to
11703 allocate section contents again since we never increase size. */
c72f2fb2 11704 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
927be08e
AM
11705 {
11706 struct got_entry **lgot_ents;
11707 struct got_entry **end_lgot_ents;
11708 struct plt_entry **local_plt;
11709 struct plt_entry **end_local_plt;
f961d9dd 11710 unsigned char *lgot_masks;
927be08e
AM
11711 bfd_size_type locsymcount;
11712 Elf_Internal_Shdr *symtab_hdr;
19e08130 11713 asection *s;
927be08e
AM
11714
11715 if (!is_ppc64_elf (ibfd))
11716 continue;
11717
11718 lgot_ents = elf_local_got_ents (ibfd);
11719 if (!lgot_ents)
11720 continue;
11721
11722 symtab_hdr = &elf_symtab_hdr (ibfd);
11723 locsymcount = symtab_hdr->sh_info;
11724 end_lgot_ents = lgot_ents + locsymcount;
11725 local_plt = (struct plt_entry **) end_lgot_ents;
11726 end_local_plt = local_plt + locsymcount;
f961d9dd 11727 lgot_masks = (unsigned char *) end_local_plt;
927be08e 11728 s = ppc64_elf_tdata (ibfd)->got;
927be08e
AM
11729 for (; lgot_ents < end_lgot_ents; ++lgot_ents, ++lgot_masks)
11730 {
11731 struct got_entry *ent;
11732
11733 for (ent = *lgot_ents; ent != NULL; ent = ent->next)
d0fae19d 11734 {
19e08130
AM
11735 unsigned int ent_size = 8;
11736 unsigned int rel_size = sizeof (Elf64_External_Rela);
11737
d0fae19d
AM
11738 ent->got.offset = s->size;
11739 if ((ent->tls_type & *lgot_masks & TLS_GD) != 0)
d0fae19d 11740 {
19e08130
AM
11741 ent_size *= 2;
11742 rel_size *= 2;
11743 }
11744 s->size += ent_size;
11745 if ((*lgot_masks & PLT_IFUNC) != 0)
11746 {
33e44f2e 11747 htab->elf.irelplt->size += rel_size;
19e08130
AM
11748 htab->got_reli_size += rel_size;
11749 }
0e1862bb 11750 else if (bfd_link_pic (info))
19e08130
AM
11751 {
11752 asection *srel = ppc64_elf_tdata (ibfd)->relgot;
11753 srel->size += rel_size;
d0fae19d
AM
11754 }
11755 }
927be08e
AM
11756 }
11757 }
11758
11759 elf_link_hash_traverse (&htab->elf, reallocate_got, info);
11760
c72f2fb2 11761 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
927be08e
AM
11762 {
11763 struct got_entry *ent;
11764
11765 if (!is_ppc64_elf (ibfd))
11766 continue;
11767
11768 ent = ppc64_tlsld_got (ibfd);
11769 if (!ent->is_indirect
11770 && ent->got.offset != (bfd_vma) -1)
11771 {
11772 asection *s = ppc64_elf_tdata (ibfd)->got;
11773 ent->got.offset = s->size;
11774 s->size += 16;
0e1862bb 11775 if (bfd_link_pic (info))
927be08e
AM
11776 {
11777 asection *srel = ppc64_elf_tdata (ibfd)->relgot;
11778 srel->size += sizeof (Elf64_External_Rela);
11779 }
11780 }
11781 }
11782
33e44f2e 11783 done_something = htab->elf.irelplt->rawsize != htab->elf.irelplt->size;
927be08e 11784 if (!done_something)
c72f2fb2 11785 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
927be08e
AM
11786 {
11787 asection *got;
11788
11789 if (!is_ppc64_elf (ibfd))
11790 continue;
11791
11792 got = ppc64_elf_tdata (ibfd)->got;
11793 if (got != NULL)
11794 {
11795 done_something = got->rawsize != got->size;
11796 if (done_something)
11797 break;
11798 }
11799 }
11800
11801 if (done_something)
e7d1c40c 11802 (*htab->params->layout_sections_again) ();
927be08e
AM
11803
11804 /* Set up for second pass over toc sections to recalculate elf_gp
11805 on input sections. */
11806 htab->toc_bfd = NULL;
11807 htab->toc_first_sec = NULL;
11808 htab->second_toc_pass = TRUE;
11809 return done_something;
11810}
11811
11812/* Called after second pass of multitoc partitioning. */
11813
11814void
11815ppc64_elf_finish_multitoc_partition (struct bfd_link_info *info)
11816{
11817 struct ppc_link_hash_table *htab = ppc_hash_table (info);
11818
11819 /* After the second pass, toc_curr tracks the TOC offset used
11820 for code sections below in ppc64_elf_next_input_section. */
3d6f9012 11821 htab->toc_curr = TOC_BASE_OFF;
ad8e1ba5
AM
11822}
11823
9b5ecbd0
AM
11824/* No toc references were found in ISEC. If the code in ISEC makes no
11825 calls, then there's no need to use toc adjusting stubs when branching
11826 into ISEC. Actually, indirect calls from ISEC are OK as they will
4c52953f
AM
11827 load r2. Returns -1 on error, 0 for no stub needed, 1 for stub
11828 needed, and 2 if a cyclical call-graph was found but no other reason
11829 for a stub was detected. If called from the top level, a return of
11830 2 means the same as a return of 0. */
9b5ecbd0
AM
11831
11832static int
4ce794b7 11833toc_adjusting_stub_needed (struct bfd_link_info *info, asection *isec)
9b5ecbd0 11834{
9b5ecbd0 11835 int ret;
70cc837d
AM
11836
11837 /* Mark this section as checked. */
11838 isec->call_check_done = 1;
9b5ecbd0 11839
772119ce
AM
11840 /* We know none of our code bearing sections will need toc stubs. */
11841 if ((isec->flags & SEC_LINKER_CREATED) != 0)
11842 return 0;
11843
eea6121a 11844 if (isec->size == 0)
082c50f8
AM
11845 return 0;
11846
4c52953f
AM
11847 if (isec->output_section == NULL)
11848 return 0;
11849
4c52953f 11850 ret = 0;
70cc837d 11851 if (isec->reloc_count != 0)
9b5ecbd0 11852 {
70cc837d
AM
11853 Elf_Internal_Rela *relstart, *rel;
11854 Elf_Internal_Sym *local_syms;
11855 struct ppc_link_hash_table *htab;
2917689a 11856
70cc837d
AM
11857 relstart = _bfd_elf_link_read_relocs (isec->owner, isec, NULL, NULL,
11858 info->keep_memory);
11859 if (relstart == NULL)
11860 return -1;
90aecf7a 11861
70cc837d
AM
11862 /* Look for branches to outside of this section. */
11863 local_syms = NULL;
11864 htab = ppc_hash_table (info);
11865 if (htab == NULL)
11866 return -1;
4c52953f 11867
70cc837d 11868 for (rel = relstart; rel < relstart + isec->reloc_count; ++rel)
4c52953f 11869 {
70cc837d
AM
11870 enum elf_ppc64_reloc_type r_type;
11871 unsigned long r_symndx;
11872 struct elf_link_hash_entry *h;
11873 struct ppc_link_hash_entry *eh;
11874 Elf_Internal_Sym *sym;
11875 asection *sym_sec;
11876 struct _opd_sec_data *opd;
11877 bfd_vma sym_value;
11878 bfd_vma dest;
11879
11880 r_type = ELF64_R_TYPE (rel->r_info);
11881 if (r_type != R_PPC64_REL24
11882 && r_type != R_PPC64_REL14
11883 && r_type != R_PPC64_REL14_BRTAKEN
11884 && r_type != R_PPC64_REL14_BRNTAKEN)
11885 continue;
4c52953f 11886
70cc837d
AM
11887 r_symndx = ELF64_R_SYM (rel->r_info);
11888 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms, r_symndx,
11889 isec->owner))
4c52953f 11890 {
70cc837d
AM
11891 ret = -1;
11892 break;
11893 }
4c52953f 11894
70cc837d
AM
11895 /* Calls to dynamic lib functions go through a plt call stub
11896 that uses r2. */
11897 eh = (struct ppc_link_hash_entry *) h;
11898 if (eh != NULL
11899 && (eh->elf.plt.plist != NULL
11900 || (eh->oh != NULL
11901 && ppc_follow_link (eh->oh)->elf.plt.plist != NULL)))
11902 {
11903 ret = 1;
11904 break;
4c52953f
AM
11905 }
11906
70cc837d
AM
11907 if (sym_sec == NULL)
11908 /* Ignore other undefined symbols. */
4c52953f 11909 continue;
4c52953f 11910
70cc837d
AM
11911 /* Assume branches to other sections not included in the
11912 link need stubs too, to cover -R and absolute syms. */
11913 if (sym_sec->output_section == NULL)
11914 {
11915 ret = 1;
11916 break;
11917 }
4c52953f 11918
70cc837d
AM
11919 if (h == NULL)
11920 sym_value = sym->st_value;
11921 else
11922 {
11923 if (h->root.type != bfd_link_hash_defined
11924 && h->root.type != bfd_link_hash_defweak)
11925 abort ();
11926 sym_value = h->root.u.def.value;
11927 }
11928 sym_value += rel->r_addend;
4c52953f 11929
70cc837d
AM
11930 /* If this branch reloc uses an opd sym, find the code section. */
11931 opd = get_opd_info (sym_sec);
11932 if (opd != NULL)
11933 {
11934 if (h == NULL && opd->adjust != NULL)
11935 {
11936 long adjust;
4c52953f 11937
92a9c616 11938 adjust = opd->adjust[OPD_NDX (sym_value)];
70cc837d
AM
11939 if (adjust == -1)
11940 /* Assume deleted functions won't ever be called. */
11941 continue;
11942 sym_value += adjust;
11943 }
4c52953f 11944
aef36ac1
AM
11945 dest = opd_entry_value (sym_sec, sym_value,
11946 &sym_sec, NULL, FALSE);
70cc837d
AM
11947 if (dest == (bfd_vma) -1)
11948 continue;
11949 }
11950 else
11951 dest = (sym_value
11952 + sym_sec->output_offset
11953 + sym_sec->output_section->vma);
4c52953f 11954
70cc837d
AM
11955 /* Ignore branch to self. */
11956 if (sym_sec == isec)
11957 continue;
4c52953f 11958
70cc837d
AM
11959 /* If the called function uses the toc, we need a stub. */
11960 if (sym_sec->has_toc_reloc
11961 || sym_sec->makes_toc_func_call)
4c52953f 11962 {
70cc837d 11963 ret = 1;
4c52953f
AM
11964 break;
11965 }
70cc837d
AM
11966
11967 /* Assume any branch that needs a long branch stub might in fact
11968 need a plt_branch stub. A plt_branch stub uses r2. */
11969 else if (dest - (isec->output_offset
11970 + isec->output_section->vma
6911b7dc
AM
11971 + rel->r_offset) + (1 << 25)
11972 >= (2u << 25) - PPC64_LOCAL_ENTRY_OFFSET (h
11973 ? h->other
11974 : sym->st_other))
4c52953f 11975 {
70cc837d
AM
11976 ret = 1;
11977 break;
11978 }
11979
11980 /* If calling back to a section in the process of being
11981 tested, we can't say for sure that no toc adjusting stubs
11982 are needed, so don't return zero. */
11983 else if (sym_sec->call_check_in_progress)
11984 ret = 2;
11985
11986 /* Branches to another section that itself doesn't have any TOC
11987 references are OK. Recursively call ourselves to check. */
11988 else if (!sym_sec->call_check_done)
11989 {
11990 int recur;
11991
11992 /* Mark current section as indeterminate, so that other
11993 sections that call back to current won't be marked as
11994 known. */
11995 isec->call_check_in_progress = 1;
11996 recur = toc_adjusting_stub_needed (info, sym_sec);
11997 isec->call_check_in_progress = 0;
11998
4c52953f
AM
11999 if (recur != 0)
12000 {
70cc837d
AM
12001 ret = recur;
12002 if (recur != 2)
12003 break;
4c52953f
AM
12004 }
12005 }
4c52953f 12006 }
70cc837d
AM
12007
12008 if (local_syms != NULL
12009 && (elf_symtab_hdr (isec->owner).contents
12010 != (unsigned char *) local_syms))
12011 free (local_syms);
12012 if (elf_section_data (isec)->relocs != relstart)
12013 free (relstart);
9b5ecbd0
AM
12014 }
12015
70cc837d
AM
12016 if ((ret & 1) == 0
12017 && isec->map_head.s != NULL
12018 && (strcmp (isec->output_section->name, ".init") == 0
12019 || strcmp (isec->output_section->name, ".fini") == 0))
12020 {
12021 if (isec->map_head.s->has_toc_reloc
12022 || isec->map_head.s->makes_toc_func_call)
12023 ret = 1;
12024 else if (!isec->map_head.s->call_check_done)
12025 {
12026 int recur;
12027 isec->call_check_in_progress = 1;
12028 recur = toc_adjusting_stub_needed (info, isec->map_head.s);
12029 isec->call_check_in_progress = 0;
12030 if (recur != 0)
12031 ret = recur;
12032 }
12033 }
12034
12035 if (ret == 1)
12036 isec->makes_toc_func_call = 1;
4c52953f 12037
9b5ecbd0
AM
12038 return ret;
12039}
12040
721956f4
AM
12041/* The linker repeatedly calls this function for each input section,
12042 in the order that input sections are linked into output sections.
12043 Build lists of input sections to determine groupings between which
12044 we may insert linker stubs. */
12045
9b5ecbd0 12046bfd_boolean
4ce794b7 12047ppc64_elf_next_input_section (struct bfd_link_info *info, asection *isec)
721956f4
AM
12048{
12049 struct ppc_link_hash_table *htab = ppc_hash_table (info);
12050
4dfe6ac6
NC
12051 if (htab == NULL)
12052 return FALSE;
12053
734b6cf9 12054 if ((isec->output_section->flags & SEC_CODE) != 0
6f20ed8a 12055 && isec->output_section->id < htab->sec_info_arr_size)
721956f4 12056 {
3d6f9012
AM
12057 /* This happens to make the list in reverse order,
12058 which is what we want. */
6f20ed8a
AM
12059 htab->sec_info[isec->id].u.list
12060 = htab->sec_info[isec->output_section->id].u.list;
12061 htab->sec_info[isec->output_section->id].u.list = isec;
721956f4 12062 }
ad8e1ba5 12063
4c52953f 12064 if (htab->multi_toc_needed)
9b5ecbd0 12065 {
8b974ba3
AM
12066 /* Analyse sections that aren't already flagged as needing a
12067 valid toc pointer. Exclude .fixup for the linux kernel.
12068 .fixup contains branches, but only back to the function that
12069 hit an exception. */
12070 if (!(isec->has_toc_reloc
12071 || (isec->flags & SEC_CODE) == 0
12072 || strcmp (isec->name, ".fixup") == 0
12073 || isec->call_check_done))
12074 {
12075 if (toc_adjusting_stub_needed (info, isec) < 0)
6683a28d 12076 return FALSE;
8b974ba3
AM
12077 }
12078 /* Make all sections use the TOC assigned for this object file.
12079 This will be wrong for pasted sections; We fix that in
12080 check_pasted_section(). */
12081 if (elf_gp (isec->owner) != 0)
12082 htab->toc_curr = elf_gp (isec->owner);
12083 }
12084
6f20ed8a 12085 htab->sec_info[isec->id].toc_off = htab->toc_curr;
9b5ecbd0 12086 return TRUE;
721956f4
AM
12087}
12088
70cc837d
AM
12089/* Check that all .init and .fini sections use the same toc, if they
12090 have toc relocs. */
12091
12092static bfd_boolean
12093check_pasted_section (struct bfd_link_info *info, const char *name)
12094{
12095 asection *o = bfd_get_section_by_name (info->output_bfd, name);
12096
12097 if (o != NULL)
12098 {
12099 struct ppc_link_hash_table *htab = ppc_hash_table (info);
12100 bfd_vma toc_off = 0;
12101 asection *i;
12102
12103 for (i = o->map_head.s; i != NULL; i = i->map_head.s)
12104 if (i->has_toc_reloc)
12105 {
12106 if (toc_off == 0)
6f20ed8a
AM
12107 toc_off = htab->sec_info[i->id].toc_off;
12108 else if (toc_off != htab->sec_info[i->id].toc_off)
70cc837d
AM
12109 return FALSE;
12110 }
6683a28d
AM
12111
12112 if (toc_off == 0)
12113 for (i = o->map_head.s; i != NULL; i = i->map_head.s)
12114 if (i->makes_toc_func_call)
12115 {
6f20ed8a 12116 toc_off = htab->sec_info[i->id].toc_off;
6683a28d
AM
12117 break;
12118 }
12119
70cc837d
AM
12120 /* Make sure the whole pasted function uses the same toc offset. */
12121 if (toc_off != 0)
12122 for (i = o->map_head.s; i != NULL; i = i->map_head.s)
6f20ed8a 12123 htab->sec_info[i->id].toc_off = toc_off;
70cc837d
AM
12124 }
12125 return TRUE;
12126}
12127
12128bfd_boolean
12129ppc64_elf_check_init_fini (struct bfd_link_info *info)
12130{
12131 return (check_pasted_section (info, ".init")
12132 & check_pasted_section (info, ".fini"));
12133}
12134
721956f4
AM
12135/* See whether we can group stub sections together. Grouping stub
12136 sections may result in fewer stubs. More importantly, we need to
12137 put all .init* and .fini* stubs at the beginning of the .init or
12138 .fini output sections respectively, because glibc splits the
12139 _init and _fini functions into multiple parts. Putting a stub in
12140 the middle of a function is not a good idea. */
12141
6f20ed8a
AM
12142static bfd_boolean
12143group_sections (struct bfd_link_info *info,
4ce794b7
AM
12144 bfd_size_type stub_group_size,
12145 bfd_boolean stubs_always_before_branch)
721956f4 12146{
6f20ed8a
AM
12147 struct ppc_link_hash_table *htab;
12148 asection *osec;
7c8fe5c4
AM
12149 bfd_boolean suppress_size_errors;
12150
6f20ed8a
AM
12151 htab = ppc_hash_table (info);
12152 if (htab == NULL)
12153 return FALSE;
12154
7c8fe5c4 12155 suppress_size_errors = FALSE;
7c8fe5c4
AM
12156 if (stub_group_size == 1)
12157 {
12158 /* Default values. */
12159 if (stubs_always_before_branch)
09f92717 12160 stub_group_size = 0x1e00000;
7c8fe5c4 12161 else
09f92717 12162 stub_group_size = 0x1c00000;
7c8fe5c4
AM
12163 suppress_size_errors = TRUE;
12164 }
12165
6f20ed8a 12166 for (osec = info->output_bfd->sections; osec != NULL; osec = osec->next)
721956f4 12167 {
6f20ed8a
AM
12168 asection *tail;
12169
12170 if (osec->id >= htab->sec_info_arr_size)
12171 continue;
12172
12173 tail = htab->sec_info[osec->id].u.list;
734b6cf9 12174 while (tail != NULL)
721956f4 12175 {
734b6cf9
AM
12176 asection *curr;
12177 asection *prev;
12178 bfd_size_type total;
12179 bfd_boolean big_sec;
12180 bfd_vma curr_toc;
6f20ed8a 12181 struct map_stub *group;
09f92717 12182 bfd_size_type group_size;
734b6cf9
AM
12183
12184 curr = tail;
eea6121a 12185 total = tail->size;
09f92717
AM
12186 group_size = (ppc64_elf_section_data (tail) != NULL
12187 && ppc64_elf_section_data (tail)->has_14bit_branch
12188 ? stub_group_size >> 10 : stub_group_size);
12189
12190 big_sec = total > group_size;
7c8fe5c4 12191 if (big_sec && !suppress_size_errors)
695344c0 12192 /* xgettext:c-format */
4eca0228
AM
12193 _bfd_error_handler (_("%B section %A exceeds stub group size"),
12194 tail->owner, tail);
6f20ed8a 12195 curr_toc = htab->sec_info[tail->id].toc_off;
734b6cf9 12196
6f20ed8a 12197 while ((prev = htab->sec_info[curr->id].u.list) != NULL
734b6cf9 12198 && ((total += curr->output_offset - prev->output_offset)
6bee8834
AM
12199 < (ppc64_elf_section_data (prev) != NULL
12200 && ppc64_elf_section_data (prev)->has_14bit_branch
09f92717 12201 ? (group_size = stub_group_size >> 10) : group_size))
6f20ed8a 12202 && htab->sec_info[prev->id].toc_off == curr_toc)
734b6cf9
AM
12203 curr = prev;
12204
12205 /* OK, the size from the start of CURR to the end is less
09f92717 12206 than group_size and thus can be handled by one stub
734b6cf9 12207 section. (or the tail section is itself larger than
09f92717
AM
12208 group_size, in which case we may be toast.) We should
12209 really be keeping track of the total size of stubs added
12210 here, as stubs contribute to the final output section
12211 size. That's a little tricky, and this way will only
12212 break if stubs added make the total size more than 2^25,
12213 ie. for the default stub_group_size, if stubs total more
12214 than 2097152 bytes, or nearly 75000 plt call stubs. */
6f20ed8a
AM
12215 group = bfd_alloc (curr->owner, sizeof (*group));
12216 if (group == NULL)
12217 return FALSE;
12218 group->link_sec = curr;
12219 group->stub_sec = NULL;
a4b6fadd
AM
12220 group->needs_save_res = 0;
12221 group->next = htab->group;
12222 htab->group = group;
734b6cf9 12223 do
721956f4 12224 {
6f20ed8a 12225 prev = htab->sec_info[tail->id].u.list;
734b6cf9 12226 /* Set up this stub group. */
6f20ed8a 12227 htab->sec_info[tail->id].u.group = group;
721956f4 12228 }
734b6cf9
AM
12229 while (tail != curr && (tail = prev) != NULL);
12230
09f92717 12231 /* But wait, there's more! Input sections up to group_size
734b6cf9
AM
12232 bytes before the stub section can be handled by it too.
12233 Don't do this if we have a really large section after the
12234 stubs, as adding more stubs increases the chance that
12235 branches may not reach into the stub section. */
12236 if (!stubs_always_before_branch && !big_sec)
12237 {
12238 total = 0;
12239 while (prev != NULL
12240 && ((total += tail->output_offset - prev->output_offset)
6bee8834
AM
12241 < (ppc64_elf_section_data (prev) != NULL
12242 && ppc64_elf_section_data (prev)->has_14bit_branch
09f92717 12243 ? (group_size = stub_group_size >> 10) : group_size))
6f20ed8a 12244 && htab->sec_info[prev->id].toc_off == curr_toc)
734b6cf9
AM
12245 {
12246 tail = prev;
6f20ed8a
AM
12247 prev = htab->sec_info[tail->id].u.list;
12248 htab->sec_info[tail->id].u.group = group;
734b6cf9
AM
12249 }
12250 }
12251 tail = prev;
721956f4
AM
12252 }
12253 }
6f20ed8a 12254 return TRUE;
721956f4
AM
12255}
12256
58d180e8
AM
12257static const unsigned char glink_eh_frame_cie[] =
12258{
12259 0, 0, 0, 16, /* length. */
12260 0, 0, 0, 0, /* id. */
12261 1, /* CIE version. */
12262 'z', 'R', 0, /* Augmentation string. */
12263 4, /* Code alignment. */
12264 0x78, /* Data alignment. */
12265 65, /* RA reg. */
12266 1, /* Augmentation size. */
12267 DW_EH_PE_pcrel | DW_EH_PE_sdata4, /* FDE encoding. */
2e0ce1c8 12268 DW_CFA_def_cfa, 1, 0 /* def_cfa: r1 offset 0. */
58d180e8
AM
12269};
12270
d969d15f
AM
12271/* Stripping output sections is normally done before dynamic section
12272 symbols have been allocated. This function is called later, and
12273 handles cases like htab->brlt which is mapped to its own output
12274 section. */
12275
12276static void
12277maybe_strip_output (struct bfd_link_info *info, asection *isec)
12278{
12279 if (isec->size == 0
12280 && isec->output_section->size == 0
53d8967a 12281 && !(isec->output_section->flags & SEC_KEEP)
d969d15f
AM
12282 && !bfd_section_removed_from_list (info->output_bfd,
12283 isec->output_section)
12284 && elf_section_data (isec->output_section)->dynindx == 0)
12285 {
12286 isec->output_section->flags |= SEC_EXCLUDE;
12287 bfd_section_list_remove (info->output_bfd, isec->output_section);
12288 info->output_bfd->section_count--;
12289 }
12290}
12291
721956f4
AM
12292/* Determine and set the size of the stub section for a final link.
12293
12294 The basic idea here is to examine all the relocations looking for
12295 PC-relative calls to a target that is unreachable with a "bl"
12296 instruction. */
12297
b34976b6 12298bfd_boolean
e7d1c40c 12299ppc64_elf_size_stubs (struct bfd_link_info *info)
721956f4
AM
12300{
12301 bfd_size_type stub_group_size;
b34976b6 12302 bfd_boolean stubs_always_before_branch;
721956f4
AM
12303 struct ppc_link_hash_table *htab = ppc_hash_table (info);
12304
4dfe6ac6
NC
12305 if (htab == NULL)
12306 return FALSE;
12307
0e1862bb 12308 if (htab->params->plt_thread_safe == -1 && !bfd_link_executable (info))
e7d1c40c 12309 htab->params->plt_thread_safe = 1;
b9e5796b 12310 if (!htab->opd_abi)
e7d1c40c
AM
12311 htab->params->plt_thread_safe = 0;
12312 else if (htab->params->plt_thread_safe == -1)
794e51c0 12313 {
e2458743 12314 static const char *const thread_starter[] =
794e51c0
AM
12315 {
12316 "pthread_create",
12317 /* libstdc++ */
12318 "_ZNSt6thread15_M_start_threadESt10shared_ptrINS_10_Impl_baseEE",
12319 /* librt */
12320 "aio_init", "aio_read", "aio_write", "aio_fsync", "lio_listio",
12321 "mq_notify", "create_timer",
12322 /* libanl */
12323 "getaddrinfo_a",
12324 /* libgomp */
2300b5a1 12325 "GOMP_parallel",
794e51c0 12326 "GOMP_parallel_start",
2300b5a1 12327 "GOMP_parallel_loop_static",
794e51c0 12328 "GOMP_parallel_loop_static_start",
2300b5a1 12329 "GOMP_parallel_loop_dynamic",
794e51c0 12330 "GOMP_parallel_loop_dynamic_start",
2300b5a1 12331 "GOMP_parallel_loop_guided",
794e51c0 12332 "GOMP_parallel_loop_guided_start",
2300b5a1 12333 "GOMP_parallel_loop_runtime",
794e51c0 12334 "GOMP_parallel_loop_runtime_start",
2300b5a1 12335 "GOMP_parallel_sections",
68ffbac6 12336 "GOMP_parallel_sections_start",
f9dffbf0
AM
12337 /* libgo */
12338 "__go_go",
794e51c0
AM
12339 };
12340 unsigned i;
12341
a4b6fadd 12342 for (i = 0; i < ARRAY_SIZE (thread_starter); i++)
794e51c0
AM
12343 {
12344 struct elf_link_hash_entry *h;
12345 h = elf_link_hash_lookup (&htab->elf, thread_starter[i],
12346 FALSE, FALSE, TRUE);
e7d1c40c
AM
12347 htab->params->plt_thread_safe = h != NULL && h->ref_regular;
12348 if (htab->params->plt_thread_safe)
794e51c0
AM
12349 break;
12350 }
12351 }
e7d1c40c
AM
12352 stubs_always_before_branch = htab->params->group_size < 0;
12353 if (htab->params->group_size < 0)
12354 stub_group_size = -htab->params->group_size;
721956f4 12355 else
e7d1c40c 12356 stub_group_size = htab->params->group_size;
721956f4 12357
6f20ed8a
AM
12358 if (!group_sections (info, stub_group_size, stubs_always_before_branch))
12359 return FALSE;
721956f4 12360
c9301e31
AM
12361#define STUB_SHRINK_ITER 20
12362 /* Loop until no stubs added. After iteration 20 of this loop we may
12363 exit on a stub section shrinking. This is to break out of a
12364 pathological case where adding stubs on one iteration decreases
12365 section gaps (perhaps due to alignment), which then requires
12366 fewer or smaller stubs on the next iteration. */
12367
721956f4
AM
12368 while (1)
12369 {
12370 bfd *input_bfd;
12371 unsigned int bfd_indx;
a4b6fadd 12372 struct map_stub *group;
721956f4 12373 asection *stub_sec;
721956f4
AM
12374
12375 htab->stub_iteration += 1;
721956f4
AM
12376
12377 for (input_bfd = info->input_bfds, bfd_indx = 0;
12378 input_bfd != NULL;
c72f2fb2 12379 input_bfd = input_bfd->link.next, bfd_indx++)
721956f4
AM
12380 {
12381 Elf_Internal_Shdr *symtab_hdr;
12382 asection *section;
6cdc0ccc 12383 Elf_Internal_Sym *local_syms = NULL;
721956f4 12384
0c8d6e5c 12385 if (!is_ppc64_elf (input_bfd))
67f93c31
AM
12386 continue;
12387
721956f4 12388 /* We'll need the symbol table in a second. */
0ffa91dd 12389 symtab_hdr = &elf_symtab_hdr (input_bfd);
721956f4
AM
12390 if (symtab_hdr->sh_info == 0)
12391 continue;
12392
721956f4
AM
12393 /* Walk over each section attached to the input bfd. */
12394 for (section = input_bfd->sections;
12395 section != NULL;
12396 section = section->next)
12397 {
721956f4 12398 Elf_Internal_Rela *internal_relocs, *irelaend, *irela;
721956f4
AM
12399
12400 /* If there aren't any relocs, then there's nothing more
12401 to do. */
12402 if ((section->flags & SEC_RELOC) == 0
12c0f757
AM
12403 || (section->flags & SEC_ALLOC) == 0
12404 || (section->flags & SEC_LOAD) == 0
12405 || (section->flags & SEC_CODE) == 0
721956f4
AM
12406 || section->reloc_count == 0)
12407 continue;
12408
12409 /* If this section is a link-once section that will be
12410 discarded, then don't create any stubs. */
12411 if (section->output_section == NULL
927be08e 12412 || section->output_section->owner != info->output_bfd)
721956f4
AM
12413 continue;
12414
1e2f5b6e
AM
12415 /* Get the relocs. */
12416 internal_relocs
4ce794b7 12417 = _bfd_elf_link_read_relocs (input_bfd, section, NULL, NULL,
45d6a902 12418 info->keep_memory);
721956f4 12419 if (internal_relocs == NULL)
1e2f5b6e 12420 goto error_ret_free_local;
721956f4
AM
12421
12422 /* Now examine each relocation. */
12423 irela = internal_relocs;
12424 irelaend = irela + section->reloc_count;
12425 for (; irela < irelaend; irela++)
12426 {
4ce794b7
AM
12427 enum elf_ppc64_reloc_type r_type;
12428 unsigned int r_indx;
721956f4
AM
12429 enum ppc_stub_type stub_type;
12430 struct ppc_stub_hash_entry *stub_entry;
8387904d 12431 asection *sym_sec, *code_sec;
e054468f 12432 bfd_vma sym_value, code_value;
721956f4 12433 bfd_vma destination;
6911b7dc 12434 unsigned long local_off;
8843416a 12435 bfd_boolean ok_dest;
721956f4 12436 struct ppc_link_hash_entry *hash;
8387904d 12437 struct ppc_link_hash_entry *fdh;
411e1bfb
AM
12438 struct elf_link_hash_entry *h;
12439 Elf_Internal_Sym *sym;
721956f4
AM
12440 char *stub_name;
12441 const asection *id_sec;
74f0fb50 12442 struct _opd_sec_data *opd;
e054468f 12443 struct plt_entry *plt_ent;
721956f4
AM
12444
12445 r_type = ELF64_R_TYPE (irela->r_info);
12446 r_indx = ELF64_R_SYM (irela->r_info);
12447
4ce794b7 12448 if (r_type >= R_PPC64_max)
721956f4
AM
12449 {
12450 bfd_set_error (bfd_error_bad_value);
6cdc0ccc 12451 goto error_ret_free_internal;
721956f4
AM
12452 }
12453
12454 /* Only look for stubs on branch instructions. */
4ce794b7
AM
12455 if (r_type != R_PPC64_REL24
12456 && r_type != R_PPC64_REL14
12457 && r_type != R_PPC64_REL14_BRTAKEN
12458 && r_type != R_PPC64_REL14_BRNTAKEN)
721956f4
AM
12459 continue;
12460
12461 /* Now determine the call target, its name, value,
12462 section. */
411e1bfb
AM
12463 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms,
12464 r_indx, input_bfd))
12465 goto error_ret_free_internal;
12466 hash = (struct ppc_link_hash_entry *) h;
12467
8843416a 12468 ok_dest = FALSE;
8387904d 12469 fdh = NULL;
7fe2b9a6 12470 sym_value = 0;
411e1bfb 12471 if (hash == NULL)
721956f4 12472 {
411e1bfb 12473 sym_value = sym->st_value;
c27b8c2a
AM
12474 if (sym_sec != NULL
12475 && sym_sec->output_section != NULL)
12476 ok_dest = TRUE;
721956f4 12477 }
7fe2b9a6
AM
12478 else if (hash->elf.root.type == bfd_link_hash_defined
12479 || hash->elf.root.type == bfd_link_hash_defweak)
12480 {
12481 sym_value = hash->elf.root.u.def.value;
12482 if (sym_sec->output_section != NULL)
12483 ok_dest = TRUE;
12484 }
12485 else if (hash->elf.root.type == bfd_link_hash_undefweak
12486 || hash->elf.root.type == bfd_link_hash_undefined)
721956f4 12487 {
99877b66 12488 /* Recognise an old ABI func code entry sym, and
7fe2b9a6
AM
12489 use the func descriptor sym instead if it is
12490 defined. */
ceb1f1ef 12491 if (hash->elf.root.root.string[0] == '.'
8c5b4e52 12492 && hash->oh != NULL)
8387904d 12493 {
8c5b4e52 12494 fdh = ppc_follow_link (hash->oh);
8387904d
AM
12495 if (fdh->elf.root.type == bfd_link_hash_defined
12496 || fdh->elf.root.type == bfd_link_hash_defweak)
12497 {
12498 sym_sec = fdh->elf.root.u.def.section;
12499 sym_value = fdh->elf.root.u.def.value;
12500 if (sym_sec->output_section != NULL)
12501 ok_dest = TRUE;
12502 }
99877b66
AM
12503 else
12504 fdh = NULL;
8387904d 12505 }
7fe2b9a6
AM
12506 }
12507 else
12508 {
12509 bfd_set_error (bfd_error_bad_value);
12510 goto error_ret_free_internal;
721956f4
AM
12511 }
12512
8843416a 12513 destination = 0;
6911b7dc 12514 local_off = 0;
8843416a
AM
12515 if (ok_dest)
12516 {
12517 sym_value += irela->r_addend;
12518 destination = (sym_value
12519 + sym_sec->output_offset
12520 + sym_sec->output_section->vma);
6911b7dc
AM
12521 local_off = PPC64_LOCAL_ENTRY_OFFSET (hash
12522 ? hash->elf.other
12523 : sym->st_other);
8843416a
AM
12524 }
12525
8387904d 12526 code_sec = sym_sec;
e054468f 12527 code_value = sym_value;
74f0fb50
AM
12528 opd = get_opd_info (sym_sec);
12529 if (opd != NULL)
8387904d
AM
12530 {
12531 bfd_vma dest;
12532
74f0fb50 12533 if (hash == NULL && opd->adjust != NULL)
8387904d 12534 {
51aecdc5 12535 long adjust = opd->adjust[OPD_NDX (sym_value)];
8387904d
AM
12536 if (adjust == -1)
12537 continue;
e054468f 12538 code_value += adjust;
8387904d
AM
12539 sym_value += adjust;
12540 }
12541 dest = opd_entry_value (sym_sec, sym_value,
aef36ac1 12542 &code_sec, &code_value, FALSE);
8387904d
AM
12543 if (dest != (bfd_vma) -1)
12544 {
12545 destination = dest;
12546 if (fdh != NULL)
12547 {
12548 /* Fixup old ABI sym to point at code
12549 entry. */
99877b66 12550 hash->elf.root.type = bfd_link_hash_defweak;
8387904d 12551 hash->elf.root.u.def.section = code_sec;
e054468f 12552 hash->elf.root.u.def.value = code_value;
8387904d
AM
12553 }
12554 }
12555 }
12556
721956f4 12557 /* Determine what (if any) linker stub is needed. */
e054468f 12558 plt_ent = NULL;
721956f4 12559 stub_type = ppc_type_of_stub (section, irela, &hash,
6911b7dc
AM
12560 &plt_ent, destination,
12561 local_off);
ad8e1ba5
AM
12562
12563 if (stub_type != ppc_stub_plt_call)
12564 {
12565 /* Check whether we need a TOC adjusting stub.
12566 Since the linker pastes together pieces from
12567 different object files when creating the
12568 _init and _fini functions, it may be that a
12569 call to what looks like a local sym is in
12570 fact a call needing a TOC adjustment. */
8387904d
AM
12571 if (code_sec != NULL
12572 && code_sec->output_section != NULL
6f20ed8a
AM
12573 && (htab->sec_info[code_sec->id].toc_off
12574 != htab->sec_info[section->id].toc_off)
4c52953f
AM
12575 && (code_sec->has_toc_reloc
12576 || code_sec->makes_toc_func_call))
ad8e1ba5
AM
12577 stub_type = ppc_stub_long_branch_r2off;
12578 }
12579
721956f4
AM
12580 if (stub_type == ppc_stub_none)
12581 continue;
12582
411e1bfb
AM
12583 /* __tls_get_addr calls might be eliminated. */
12584 if (stub_type != ppc_stub_plt_call
12585 && hash != NULL
8387904d
AM
12586 && (hash == htab->tls_get_addr
12587 || hash == htab->tls_get_addr_fd)
411e1bfb
AM
12588 && section->has_tls_reloc
12589 && irela != internal_relocs)
12590 {
12591 /* Get tls info. */
f961d9dd 12592 unsigned char *tls_mask;
411e1bfb 12593
3a71aa26 12594 if (!get_tls_mask (&tls_mask, NULL, NULL, &local_syms,
411e1bfb
AM
12595 irela - 1, input_bfd))
12596 goto error_ret_free_internal;
e7b938ca 12597 if (*tls_mask != 0)
411e1bfb
AM
12598 continue;
12599 }
12600
3b421ab3
AM
12601 if (stub_type == ppc_stub_plt_call
12602 && irela + 1 < irelaend
12603 && irela[1].r_offset == irela->r_offset + 4
794e51c0
AM
12604 && ELF64_R_TYPE (irela[1].r_info) == R_PPC64_TOCSAVE)
12605 {
12606 if (!tocsave_find (htab, INSERT,
12607 &local_syms, irela + 1, input_bfd))
12608 goto error_ret_free_internal;
12609 }
12610 else if (stub_type == ppc_stub_plt_call)
12611 stub_type = ppc_stub_plt_call_r2save;
3b421ab3 12612
721956f4 12613 /* Support for grouping stub sections. */
6f20ed8a 12614 id_sec = htab->sec_info[section->id].u.group->link_sec;
721956f4
AM
12615
12616 /* Get the name of this stub. */
12617 stub_name = ppc_stub_name (id_sec, sym_sec, hash, irela);
12618 if (!stub_name)
12619 goto error_ret_free_internal;
12620
12621 stub_entry = ppc_stub_hash_lookup (&htab->stub_hash_table,
b34976b6 12622 stub_name, FALSE, FALSE);
721956f4
AM
12623 if (stub_entry != NULL)
12624 {
12625 /* The proper stub has already been created. */
12626 free (stub_name);
794e51c0
AM
12627 if (stub_type == ppc_stub_plt_call_r2save)
12628 stub_entry->stub_type = stub_type;
721956f4
AM
12629 continue;
12630 }
12631
25f53a85 12632 stub_entry = ppc_add_stub (stub_name, section, info);
721956f4
AM
12633 if (stub_entry == NULL)
12634 {
12635 free (stub_name);
6cdc0ccc
AM
12636 error_ret_free_internal:
12637 if (elf_section_data (section)->relocs == NULL)
12638 free (internal_relocs);
12639 error_ret_free_local:
12640 if (local_syms != NULL
12641 && (symtab_hdr->contents
12642 != (unsigned char *) local_syms))
12643 free (local_syms);
b34976b6 12644 return FALSE;
721956f4
AM
12645 }
12646
ad8e1ba5 12647 stub_entry->stub_type = stub_type;
794e51c0
AM
12648 if (stub_type != ppc_stub_plt_call
12649 && stub_type != ppc_stub_plt_call_r2save)
e054468f
AM
12650 {
12651 stub_entry->target_value = code_value;
12652 stub_entry->target_section = code_sec;
12653 }
12654 else
12655 {
12656 stub_entry->target_value = sym_value;
12657 stub_entry->target_section = sym_sec;
12658 }
721956f4 12659 stub_entry->h = hash;
e054468f 12660 stub_entry->plt_ent = plt_ent;
6911b7dc 12661 stub_entry->other = hash ? hash->elf.other : sym->st_other;
ee75fd95
AM
12662
12663 if (stub_entry->h != NULL)
12664 htab->stub_globals += 1;
721956f4
AM
12665 }
12666
12667 /* We're done with the internal relocs, free them. */
6cdc0ccc 12668 if (elf_section_data (section)->relocs != internal_relocs)
1e2f5b6e 12669 free (internal_relocs);
721956f4 12670 }
6cdc0ccc
AM
12671
12672 if (local_syms != NULL
12673 && symtab_hdr->contents != (unsigned char *) local_syms)
12674 {
12675 if (!info->keep_memory)
12676 free (local_syms);
12677 else
12678 symtab_hdr->contents = (unsigned char *) local_syms;
12679 }
721956f4
AM
12680 }
12681
5c3dead3 12682 /* We may have added some stubs. Find out the new size of the
721956f4 12683 stub sections. */
e7d1c40c 12684 for (stub_sec = htab->params->stub_bfd->sections;
721956f4
AM
12685 stub_sec != NULL;
12686 stub_sec = stub_sec->next)
e717da7e 12687 if ((stub_sec->flags & SEC_LINKER_CREATED) == 0)
ee75fd95 12688 {
ea3d7d1c
AM
12689 if (htab->stub_iteration <= STUB_SHRINK_ITER
12690 || stub_sec->rawsize < stub_sec->size)
12691 /* Past STUB_SHRINK_ITER, rawsize is the max size seen. */
12692 stub_sec->rawsize = stub_sec->size;
ee75fd95
AM
12693 stub_sec->size = 0;
12694 stub_sec->reloc_count = 0;
84f5d08e 12695 stub_sec->flags &= ~SEC_RELOC;
ee75fd95 12696 }
eea6121a
AM
12697
12698 htab->brlt->size = 0;
84f5d08e
AM
12699 htab->brlt->reloc_count = 0;
12700 htab->brlt->flags &= ~SEC_RELOC;
ee75fd95 12701 if (htab->relbrlt != NULL)
eea6121a 12702 htab->relbrlt->size = 0;
721956f4 12703
63bc6f6c 12704 bfd_hash_traverse (&htab->stub_hash_table, ppc_size_one_stub, info);
721956f4 12705
a4b6fadd
AM
12706 for (group = htab->group; group != NULL; group = group->next)
12707 if (group->needs_save_res)
12708 group->stub_sec->size += htab->sfpr->size;
12709
176a0d42
AM
12710 if (info->emitrelocations
12711 && htab->glink != NULL && htab->glink->size != 0)
12712 {
12713 htab->glink->reloc_count = 1;
12714 htab->glink->flags |= SEC_RELOC;
12715 }
12716
58d180e8
AM
12717 if (htab->glink_eh_frame != NULL
12718 && !bfd_is_abs_section (htab->glink_eh_frame->output_section)
9a2a56cc 12719 && htab->glink_eh_frame->output_section->size != 0)
58d180e8 12720 {
2e0ce1c8 12721 size_t size = 0, align = 4;
58d180e8 12722
e7d1c40c 12723 for (stub_sec = htab->params->stub_bfd->sections;
58d180e8
AM
12724 stub_sec != NULL;
12725 stub_sec = stub_sec->next)
12726 if ((stub_sec->flags & SEC_LINKER_CREATED) == 0)
2e0ce1c8 12727 size += (17 + align - 1) & -align;
58d180e8 12728 if (htab->glink != NULL && htab->glink->size != 0)
2e0ce1c8 12729 size += (24 + align - 1) & -align;
58d180e8 12730 if (size != 0)
2e0ce1c8
AM
12731 size += (sizeof (glink_eh_frame_cie) + align - 1) & -align;
12732 align = 1ul << htab->glink_eh_frame->output_section->alignment_power;
12733 size = (size + align - 1) & -align;
58d180e8
AM
12734 htab->glink_eh_frame->rawsize = htab->glink_eh_frame->size;
12735 htab->glink_eh_frame->size = size;
12736 }
12737
e7d1c40c
AM
12738 if (htab->params->plt_stub_align != 0)
12739 for (stub_sec = htab->params->stub_bfd->sections;
794e51c0
AM
12740 stub_sec != NULL;
12741 stub_sec = stub_sec->next)
12742 if ((stub_sec->flags & SEC_LINKER_CREATED) == 0)
e7d1c40c
AM
12743 stub_sec->size = ((stub_sec->size
12744 + (1 << htab->params->plt_stub_align) - 1)
29f628db 12745 & -(1 << htab->params->plt_stub_align));
794e51c0 12746
e7d1c40c 12747 for (stub_sec = htab->params->stub_bfd->sections;
5c3dead3
AM
12748 stub_sec != NULL;
12749 stub_sec = stub_sec->next)
12750 if ((stub_sec->flags & SEC_LINKER_CREATED) == 0
c9301e31
AM
12751 && stub_sec->rawsize != stub_sec->size
12752 && (htab->stub_iteration <= STUB_SHRINK_ITER
12753 || stub_sec->rawsize < stub_sec->size))
5c3dead3
AM
12754 break;
12755
58d180e8
AM
12756 if (stub_sec == NULL
12757 && (htab->glink_eh_frame == NULL
12758 || htab->glink_eh_frame->rawsize == htab->glink_eh_frame->size))
5c3dead3
AM
12759 break;
12760
721956f4 12761 /* Ask the linker to do its stuff. */
e7d1c40c 12762 (*htab->params->layout_sections_again) ();
721956f4
AM
12763 }
12764
da44f4e5
AM
12765 if (htab->glink_eh_frame != NULL
12766 && htab->glink_eh_frame->size != 0)
12767 {
12768 bfd_vma val;
12769 bfd_byte *p, *last_fde;
12770 size_t last_fde_len, size, align, pad;
12771 asection *stub_sec;
12772
12773 p = bfd_zalloc (htab->glink_eh_frame->owner, htab->glink_eh_frame->size);
12774 if (p == NULL)
12775 return FALSE;
12776 htab->glink_eh_frame->contents = p;
12777 last_fde = p;
2e0ce1c8 12778 align = 4;
da44f4e5
AM
12779
12780 memcpy (p, glink_eh_frame_cie, sizeof (glink_eh_frame_cie));
12781 /* CIE length (rewrite in case little-endian). */
2e0ce1c8 12782 last_fde_len = ((sizeof (glink_eh_frame_cie) + align - 1) & -align) - 4;
da44f4e5 12783 bfd_put_32 (htab->elf.dynobj, last_fde_len, p);
2e0ce1c8 12784 p += last_fde_len + 4;
da44f4e5
AM
12785
12786 for (stub_sec = htab->params->stub_bfd->sections;
12787 stub_sec != NULL;
12788 stub_sec = stub_sec->next)
12789 if ((stub_sec->flags & SEC_LINKER_CREATED) == 0)
12790 {
12791 last_fde = p;
2e0ce1c8 12792 last_fde_len = ((17 + align - 1) & -align) - 4;
da44f4e5 12793 /* FDE length. */
2e0ce1c8 12794 bfd_put_32 (htab->elf.dynobj, last_fde_len, p);
da44f4e5
AM
12795 p += 4;
12796 /* CIE pointer. */
12797 val = p - htab->glink_eh_frame->contents;
12798 bfd_put_32 (htab->elf.dynobj, val, p);
12799 p += 4;
12800 /* Offset to stub section, written later. */
12801 p += 4;
12802 /* stub section size. */
12803 bfd_put_32 (htab->elf.dynobj, stub_sec->size, p);
12804 p += 4;
12805 /* Augmentation. */
12806 p += 1;
12807 /* Pad. */
2e0ce1c8 12808 p += ((17 + align - 1) & -align) - 17;
da44f4e5
AM
12809 }
12810 if (htab->glink != NULL && htab->glink->size != 0)
12811 {
12812 last_fde = p;
2e0ce1c8 12813 last_fde_len = ((24 + align - 1) & -align) - 4;
da44f4e5 12814 /* FDE length. */
2e0ce1c8 12815 bfd_put_32 (htab->elf.dynobj, last_fde_len, p);
da44f4e5
AM
12816 p += 4;
12817 /* CIE pointer. */
12818 val = p - htab->glink_eh_frame->contents;
12819 bfd_put_32 (htab->elf.dynobj, val, p);
12820 p += 4;
12821 /* Offset to .glink, written later. */
12822 p += 4;
12823 /* .glink size. */
12824 bfd_put_32 (htab->elf.dynobj, htab->glink->size - 8, p);
12825 p += 4;
12826 /* Augmentation. */
12827 p += 1;
12828
12829 *p++ = DW_CFA_advance_loc + 1;
12830 *p++ = DW_CFA_register;
12831 *p++ = 65;
9f08fa5c 12832 *p++ = htab->opd_abi ? 12 : 0;
da44f4e5
AM
12833 *p++ = DW_CFA_advance_loc + 4;
12834 *p++ = DW_CFA_restore_extended;
12835 *p++ = 65;
2e0ce1c8 12836 p += ((24 + align - 1) & -align) - 24;
da44f4e5
AM
12837 }
12838 /* Subsume any padding into the last FDE if user .eh_frame
12839 sections are aligned more than glink_eh_frame. Otherwise any
12840 zero padding will be seen as a terminator. */
2e0ce1c8 12841 align = 1ul << htab->glink_eh_frame->output_section->alignment_power;
da44f4e5 12842 size = p - htab->glink_eh_frame->contents;
2e0ce1c8 12843 pad = ((size + align - 1) & -align) - size;
da44f4e5
AM
12844 htab->glink_eh_frame->size = size + pad;
12845 bfd_put_32 (htab->elf.dynobj, last_fde_len + pad, last_fde);
12846 }
12847
d969d15f
AM
12848 maybe_strip_output (info, htab->brlt);
12849 if (htab->glink_eh_frame != NULL)
12850 maybe_strip_output (info, htab->glink_eh_frame);
721956f4 12851
b34976b6 12852 return TRUE;
721956f4
AM
12853}
12854
12855/* Called after we have determined section placement. If sections
805fc799 12856 move, we'll be called again. Provide a value for TOCstart. */
721956f4 12857
805fc799 12858bfd_vma
1c865ab2 12859ppc64_elf_set_toc (struct bfd_link_info *info, bfd *obfd)
721956f4 12860{
805fc799 12861 asection *s;
a27e685f 12862 bfd_vma TOCstart, adjust;
721956f4 12863
43417696
AM
12864 if (info != NULL)
12865 {
12866 struct elf_link_hash_entry *h;
12867 struct elf_link_hash_table *htab = elf_hash_table (info);
12868
12869 if (is_elf_hash_table (htab)
12870 && htab->hgot != NULL)
12871 h = htab->hgot;
12872 else
12873 {
12874 h = elf_link_hash_lookup (htab, ".TOC.", FALSE, FALSE, TRUE);
12875 if (is_elf_hash_table (htab))
12876 htab->hgot = h;
12877 }
12878 if (h != NULL
12879 && h->root.type == bfd_link_hash_defined
12880 && !h->root.linker_def
12881 && (!is_elf_hash_table (htab)
12882 || h->def_regular))
12883 {
12884 TOCstart = (h->root.u.def.value - TOC_BASE_OFF
12885 + h->root.u.def.section->output_offset
12886 + h->root.u.def.section->output_section->vma);
12887 _bfd_set_gp_value (obfd, TOCstart);
12888 return TOCstart;
12889 }
12890 }
12891
805fc799
AM
12892 /* The TOC consists of sections .got, .toc, .tocbss, .plt in that
12893 order. The TOC starts where the first of these sections starts. */
12894 s = bfd_get_section_by_name (obfd, ".got");
e054468f 12895 if (s == NULL || (s->flags & SEC_EXCLUDE) != 0)
805fc799 12896 s = bfd_get_section_by_name (obfd, ".toc");
e054468f 12897 if (s == NULL || (s->flags & SEC_EXCLUDE) != 0)
805fc799 12898 s = bfd_get_section_by_name (obfd, ".tocbss");
e054468f 12899 if (s == NULL || (s->flags & SEC_EXCLUDE) != 0)
805fc799 12900 s = bfd_get_section_by_name (obfd, ".plt");
e054468f 12901 if (s == NULL || (s->flags & SEC_EXCLUDE) != 0)
805fc799
AM
12902 {
12903 /* This may happen for
12904 o references to TOC base (SYM@toc / TOC[tc0]) without a
12905 .toc directive
12906 o bad linker script
12907 o --gc-sections and empty TOC sections
12908
12909 FIXME: Warn user? */
12910
12911 /* Look for a likely section. We probably won't even be
12912 using TOCstart. */
12913 for (s = obfd->sections; s != NULL; s = s->next)
e054468f
AM
12914 if ((s->flags & (SEC_ALLOC | SEC_SMALL_DATA | SEC_READONLY
12915 | SEC_EXCLUDE))
805fc799
AM
12916 == (SEC_ALLOC | SEC_SMALL_DATA))
12917 break;
721956f4 12918 if (s == NULL)
805fc799 12919 for (s = obfd->sections; s != NULL; s = s->next)
e054468f 12920 if ((s->flags & (SEC_ALLOC | SEC_SMALL_DATA | SEC_EXCLUDE))
805fc799
AM
12921 == (SEC_ALLOC | SEC_SMALL_DATA))
12922 break;
721956f4 12923 if (s == NULL)
805fc799 12924 for (s = obfd->sections; s != NULL; s = s->next)
e054468f
AM
12925 if ((s->flags & (SEC_ALLOC | SEC_READONLY | SEC_EXCLUDE))
12926 == SEC_ALLOC)
805fc799 12927 break;
721956f4 12928 if (s == NULL)
805fc799 12929 for (s = obfd->sections; s != NULL; s = s->next)
e054468f 12930 if ((s->flags & (SEC_ALLOC | SEC_EXCLUDE)) == SEC_ALLOC)
805fc799
AM
12931 break;
12932 }
721956f4 12933
805fc799
AM
12934 TOCstart = 0;
12935 if (s != NULL)
12936 TOCstart = s->output_section->vma + s->output_offset;
721956f4 12937
a27e685f
AM
12938 /* Force alignment. */
12939 adjust = TOCstart & (TOC_BASE_ALIGN - 1);
12940 TOCstart -= adjust;
1c865ab2
AM
12941 _bfd_set_gp_value (obfd, TOCstart);
12942
810d4e75 12943 if (info != NULL && s != NULL)
1c865ab2
AM
12944 {
12945 struct ppc_link_hash_table *htab = ppc_hash_table (info);
12946
810d4e75
AM
12947 if (htab != NULL)
12948 {
12949 if (htab->elf.hgot != NULL)
12950 {
a27e685f 12951 htab->elf.hgot->root.u.def.value = TOC_BASE_OFF - adjust;
810d4e75
AM
12952 htab->elf.hgot->root.u.def.section = s;
12953 }
12954 }
12955 else
1c865ab2 12956 {
810d4e75
AM
12957 struct bfd_link_hash_entry *bh = NULL;
12958 _bfd_generic_link_add_one_symbol (info, obfd, ".TOC.", BSF_GLOBAL,
a27e685f
AM
12959 s, TOC_BASE_OFF - adjust,
12960 NULL, FALSE, FALSE, &bh);
1c865ab2
AM
12961 }
12962 }
805fc799 12963 return TOCstart;
721956f4
AM
12964}
12965
a345bc8d
AM
12966/* Called via elf_link_hash_traverse from ppc64_elf_build_stubs to
12967 write out any global entry stubs. */
12968
12969static bfd_boolean
12970build_global_entry_stubs (struct elf_link_hash_entry *h, void *inf)
12971{
12972 struct bfd_link_info *info;
12973 struct ppc_link_hash_table *htab;
12974 struct plt_entry *pent;
12975 asection *s;
12976
12977 if (h->root.type == bfd_link_hash_indirect)
12978 return TRUE;
12979
12980 if (!h->pointer_equality_needed)
12981 return TRUE;
12982
12983 if (h->def_regular)
12984 return TRUE;
12985
12986 info = inf;
12987 htab = ppc_hash_table (info);
12988 if (htab == NULL)
12989 return FALSE;
12990
12991 s = htab->glink;
12992 for (pent = h->plt.plist; pent != NULL; pent = pent->next)
12993 if (pent->plt.offset != (bfd_vma) -1
12994 && pent->addend == 0)
12995 {
12996 bfd_byte *p;
12997 asection *plt;
12998 bfd_vma off;
12999
a345bc8d 13000 p = s->contents + h->root.u.def.value;
33e44f2e 13001 plt = htab->elf.splt;
a345bc8d
AM
13002 if (!htab->elf.dynamic_sections_created
13003 || h->dynindx == -1)
33e44f2e 13004 plt = htab->elf.iplt;
a345bc8d
AM
13005 off = pent->plt.offset + plt->output_offset + plt->output_section->vma;
13006 off -= h->root.u.def.value + s->output_offset + s->output_section->vma;
13007
13008 if (off + 0x80008000 > 0xffffffff || (off & 3) != 0)
13009 {
13010 info->callbacks->einfo
13011 (_("%P: linkage table error against `%T'\n"),
13012 h->root.root.string);
13013 bfd_set_error (bfd_error_bad_value);
13014 htab->stub_error = TRUE;
13015 }
13016
7341d5e2
AM
13017 htab->stub_count[ppc_stub_global_entry - 1] += 1;
13018 if (htab->params->emit_stub_syms)
13019 {
13020 size_t len = strlen (h->root.root.string);
13021 char *name = bfd_malloc (sizeof "12345678.global_entry." + len);
13022
13023 if (name == NULL)
13024 return FALSE;
13025
13026 sprintf (name, "%08x.global_entry.%s", s->id, h->root.root.string);
13027 h = elf_link_hash_lookup (&htab->elf, name, TRUE, FALSE, FALSE);
13028 if (h == NULL)
13029 return FALSE;
13030 if (h->root.type == bfd_link_hash_new)
13031 {
13032 h->root.type = bfd_link_hash_defined;
13033 h->root.u.def.section = s;
13034 h->root.u.def.value = p - s->contents;
13035 h->ref_regular = 1;
13036 h->def_regular = 1;
13037 h->ref_regular_nonweak = 1;
13038 h->forced_local = 1;
13039 h->non_elf = 0;
2ec55de3 13040 h->root.linker_def = 1;
7341d5e2
AM
13041 }
13042 }
13043
a345bc8d
AM
13044 if (PPC_HA (off) != 0)
13045 {
13046 bfd_put_32 (s->owner, ADDIS_R12_R12 | PPC_HA (off), p);
13047 p += 4;
13048 }
13049 bfd_put_32 (s->owner, LD_R12_0R12 | PPC_LO (off), p);
13050 p += 4;
13051 bfd_put_32 (s->owner, MTCTR_R12, p);
13052 p += 4;
13053 bfd_put_32 (s->owner, BCTR, p);
13054 break;
13055 }
13056 return TRUE;
13057}
13058
721956f4
AM
13059/* Build all the stubs associated with the current output file.
13060 The stubs are kept in a hash table attached to the main linker
13061 hash table. This function is called via gldelf64ppc_finish. */
13062
b34976b6 13063bfd_boolean
e7d1c40c 13064ppc64_elf_build_stubs (struct bfd_link_info *info,
4ce794b7 13065 char **stats)
5d1634d7
AM
13066{
13067 struct ppc_link_hash_table *htab = ppc_hash_table (info);
a4b6fadd 13068 struct map_stub *group;
721956f4 13069 asection *stub_sec;
5d1634d7 13070 bfd_byte *p;
e717da7e 13071 int stub_sec_count = 0;
5d1634d7 13072
4dfe6ac6
NC
13073 if (htab == NULL)
13074 return FALSE;
13075
eea6121a 13076 /* Allocate memory to hold the linker stubs. */
e7d1c40c 13077 for (stub_sec = htab->params->stub_bfd->sections;
721956f4
AM
13078 stub_sec != NULL;
13079 stub_sec = stub_sec->next)
eea6121a
AM
13080 if ((stub_sec->flags & SEC_LINKER_CREATED) == 0
13081 && stub_sec->size != 0)
e717da7e 13082 {
e7d1c40c 13083 stub_sec->contents = bfd_zalloc (htab->params->stub_bfd, stub_sec->size);
eea6121a
AM
13084 if (stub_sec->contents == NULL)
13085 return FALSE;
eea6121a 13086 stub_sec->size = 0;
e717da7e 13087 }
5d1634d7 13088
23eb7e01 13089 if (htab->glink != NULL && htab->glink->size != 0)
5d1634d7 13090 {
9f951329 13091 unsigned int indx;
ad8e1ba5 13092 bfd_vma plt0;
9f951329 13093
721956f4 13094 /* Build the .glink plt call stub. */
e7d1c40c 13095 if (htab->params->emit_stub_syms)
97b639ba
AM
13096 {
13097 struct elf_link_hash_entry *h;
468392fb
AM
13098 h = elf_link_hash_lookup (&htab->elf, "__glink_PLTresolve",
13099 TRUE, FALSE, FALSE);
97b639ba
AM
13100 if (h == NULL)
13101 return FALSE;
13102 if (h->root.type == bfd_link_hash_new)
13103 {
13104 h->root.type = bfd_link_hash_defined;
13105 h->root.u.def.section = htab->glink;
ee4bf8d2 13106 h->root.u.def.value = 8;
f5385ebf
AM
13107 h->ref_regular = 1;
13108 h->def_regular = 1;
13109 h->ref_regular_nonweak = 1;
13110 h->forced_local = 1;
13111 h->non_elf = 0;
2ec55de3 13112 h->root.linker_def = 1;
97b639ba
AM
13113 }
13114 }
33e44f2e
AM
13115 plt0 = (htab->elf.splt->output_section->vma
13116 + htab->elf.splt->output_offset
13117 - 16);
176a0d42
AM
13118 if (info->emitrelocations)
13119 {
13120 Elf_Internal_Rela *r = get_relocs (htab->glink, 1);
13121 if (r == NULL)
13122 return FALSE;
13123 r->r_offset = (htab->glink->output_offset
13124 + htab->glink->output_section->vma);
13125 r->r_info = ELF64_R_INFO (0, R_PPC64_REL64);
13126 r->r_addend = plt0;
13127 }
4ce794b7 13128 p = htab->glink->contents;
176a0d42 13129 plt0 -= htab->glink->output_section->vma + htab->glink->output_offset;
ee4bf8d2
AM
13130 bfd_put_64 (htab->glink->owner, plt0, p);
13131 p += 8;
b9e5796b
AM
13132 if (htab->opd_abi)
13133 {
13134 bfd_put_32 (htab->glink->owner, MFLR_R12, p);
13135 p += 4;
13136 bfd_put_32 (htab->glink->owner, BCL_20_31, p);
13137 p += 4;
13138 bfd_put_32 (htab->glink->owner, MFLR_R11, p);
13139 p += 4;
13140 bfd_put_32 (htab->glink->owner, LD_R2_0R11 | (-16 & 0xfffc), p);
13141 p += 4;
13142 bfd_put_32 (htab->glink->owner, MTLR_R12, p);
13143 p += 4;
13144 bfd_put_32 (htab->glink->owner, ADD_R11_R2_R11, p);
13145 p += 4;
13146 bfd_put_32 (htab->glink->owner, LD_R12_0R11, p);
13147 p += 4;
13148 bfd_put_32 (htab->glink->owner, LD_R2_0R11 | 8, p);
13149 p += 4;
13150 bfd_put_32 (htab->glink->owner, MTCTR_R12, p);
13151 p += 4;
13152 bfd_put_32 (htab->glink->owner, LD_R11_0R11 | 16, p);
13153 p += 4;
13154 }
13155 else
13156 {
13157 bfd_put_32 (htab->glink->owner, MFLR_R0, p);
13158 p += 4;
13159 bfd_put_32 (htab->glink->owner, BCL_20_31, p);
13160 p += 4;
13161 bfd_put_32 (htab->glink->owner, MFLR_R11, p);
13162 p += 4;
13163 bfd_put_32 (htab->glink->owner, LD_R2_0R11 | (-16 & 0xfffc), p);
13164 p += 4;
13165 bfd_put_32 (htab->glink->owner, MTLR_R0, p);
13166 p += 4;
13167 bfd_put_32 (htab->glink->owner, SUB_R12_R12_R11, p);
13168 p += 4;
13169 bfd_put_32 (htab->glink->owner, ADD_R11_R2_R11, p);
13170 p += 4;
13171 bfd_put_32 (htab->glink->owner, ADDI_R0_R12 | (-48 & 0xffff), p);
13172 p += 4;
13173 bfd_put_32 (htab->glink->owner, LD_R12_0R11, p);
13174 p += 4;
13175 bfd_put_32 (htab->glink->owner, SRDI_R0_R0_2, p);
13176 p += 4;
13177 bfd_put_32 (htab->glink->owner, MTCTR_R12, p);
13178 p += 4;
13179 bfd_put_32 (htab->glink->owner, LD_R11_0R11 | 8, p);
13180 p += 4;
13181 }
4ce794b7 13182 bfd_put_32 (htab->glink->owner, BCTR, p);
ad8e1ba5 13183 p += 4;
ee4bf8d2
AM
13184 while (p - htab->glink->contents < GLINK_CALL_STUB_SIZE)
13185 {
13186 bfd_put_32 (htab->glink->owner, NOP, p);
13187 p += 4;
13188 }
ad8e1ba5 13189
9f951329
AM
13190 /* Build the .glink lazy link call stubs. */
13191 indx = 0;
a345bc8d 13192 while (p < htab->glink->contents + htab->glink->rawsize)
9f951329 13193 {
b9e5796b 13194 if (htab->opd_abi)
9f951329 13195 {
b9e5796b
AM
13196 if (indx < 0x8000)
13197 {
13198 bfd_put_32 (htab->glink->owner, LI_R0_0 | indx, p);
13199 p += 4;
13200 }
13201 else
13202 {
13203 bfd_put_32 (htab->glink->owner, LIS_R0_0 | PPC_HI (indx), p);
13204 p += 4;
13205 bfd_put_32 (htab->glink->owner, ORI_R0_R0_0 | PPC_LO (indx),
13206 p);
13207 p += 4;
13208 }
9f951329 13209 }
4ce794b7 13210 bfd_put_32 (htab->glink->owner,
ee4bf8d2 13211 B_DOT | ((htab->glink->contents - p + 8) & 0x3fffffc), p);
a16d5acb 13212 indx++;
9f951329
AM
13213 p += 4;
13214 }
a345bc8d
AM
13215
13216 /* Build .glink global entry stubs. */
13217 if (htab->glink->size > htab->glink->rawsize)
afe397ea 13218 elf_link_hash_traverse (&htab->elf, build_global_entry_stubs, info);
5d1634d7 13219 }
5d1634d7 13220
7341d5e2 13221 if (htab->brlt != NULL && htab->brlt->size != 0)
721956f4 13222 {
4ce794b7 13223 htab->brlt->contents = bfd_zalloc (htab->brlt->owner,
eea6121a 13224 htab->brlt->size);
4ce794b7 13225 if (htab->brlt->contents == NULL)
b34976b6 13226 return FALSE;
721956f4 13227 }
ee75fd95 13228 if (htab->relbrlt != NULL && htab->relbrlt->size != 0)
63bc6f6c
AM
13229 {
13230 htab->relbrlt->contents = bfd_zalloc (htab->relbrlt->owner,
eea6121a 13231 htab->relbrlt->size);
63bc6f6c
AM
13232 if (htab->relbrlt->contents == NULL)
13233 return FALSE;
13234 }
5d1634d7 13235
721956f4
AM
13236 /* Build the stubs as directed by the stub hash table. */
13237 bfd_hash_traverse (&htab->stub_hash_table, ppc_build_one_stub, info);
5d1634d7 13238
a4b6fadd
AM
13239 for (group = htab->group; group != NULL; group = group->next)
13240 if (group->needs_save_res)
13241 {
13242 stub_sec = group->stub_sec;
13243 memcpy (stub_sec->contents + stub_sec->size, htab->sfpr->contents,
13244 htab->sfpr->size);
13245 if (htab->params->emit_stub_syms)
13246 {
13247 unsigned int i;
13248
13249 for (i = 0; i < ARRAY_SIZE (save_res_funcs); i++)
13250 if (!sfpr_define (info, &save_res_funcs[i], stub_sec))
13251 return FALSE;
13252 }
13253 stub_sec->size += htab->sfpr->size;
13254 }
13255
aa8a7074
AM
13256 if (htab->relbrlt != NULL)
13257 htab->relbrlt->reloc_count = 0;
13258
e7d1c40c
AM
13259 if (htab->params->plt_stub_align != 0)
13260 for (stub_sec = htab->params->stub_bfd->sections;
794e51c0
AM
13261 stub_sec != NULL;
13262 stub_sec = stub_sec->next)
13263 if ((stub_sec->flags & SEC_LINKER_CREATED) == 0)
e7d1c40c
AM
13264 stub_sec->size = ((stub_sec->size
13265 + (1 << htab->params->plt_stub_align) - 1)
29f628db 13266 & -(1 << htab->params->plt_stub_align));
794e51c0 13267
e7d1c40c 13268 for (stub_sec = htab->params->stub_bfd->sections;
721956f4
AM
13269 stub_sec != NULL;
13270 stub_sec = stub_sec->next)
e717da7e
AM
13271 if ((stub_sec->flags & SEC_LINKER_CREATED) == 0)
13272 {
13273 stub_sec_count += 1;
c9301e31
AM
13274 if (stub_sec->rawsize != stub_sec->size
13275 && (htab->stub_iteration <= STUB_SHRINK_ITER
13276 || stub_sec->rawsize < stub_sec->size))
e717da7e
AM
13277 break;
13278 }
5d1634d7 13279
da44f4e5
AM
13280 /* Note that the glink_eh_frame check here is not only testing that
13281 the generated size matched the calculated size but also that
13282 bfd_elf_discard_info didn't make any changes to the section. */
721956f4 13283 if (stub_sec != NULL
58d180e8
AM
13284 || (htab->glink_eh_frame != NULL
13285 && htab->glink_eh_frame->rawsize != htab->glink_eh_frame->size))
5d1634d7 13286 {
b34976b6 13287 htab->stub_error = TRUE;
8de848d8 13288 info->callbacks->einfo (_("%P: stubs don't match calculated size\n"));
5d1634d7 13289 }
721956f4 13290
d2a300cf
AM
13291 if (htab->stub_error)
13292 return FALSE;
13293
13294 if (stats != NULL)
13295 {
13296 *stats = bfd_malloc (500);
13297 if (*stats == NULL)
13298 return FALSE;
13299
ee75fd95 13300 sprintf (*stats, _("linker stubs in %u group%s\n"
d2a300cf
AM
13301 " branch %lu\n"
13302 " toc adjust %lu\n"
13303 " long branch %lu\n"
13304 " long toc adj %lu\n"
794e51c0 13305 " plt call %lu\n"
7341d5e2
AM
13306 " plt call toc %lu\n"
13307 " global entry %lu"),
e717da7e 13308 stub_sec_count,
ee75fd95 13309 stub_sec_count == 1 ? "" : "s",
4ce794b7
AM
13310 htab->stub_count[ppc_stub_long_branch - 1],
13311 htab->stub_count[ppc_stub_long_branch_r2off - 1],
13312 htab->stub_count[ppc_stub_plt_branch - 1],
13313 htab->stub_count[ppc_stub_plt_branch_r2off - 1],
794e51c0 13314 htab->stub_count[ppc_stub_plt_call - 1],
7341d5e2
AM
13315 htab->stub_count[ppc_stub_plt_call_r2save - 1],
13316 htab->stub_count[ppc_stub_global_entry - 1]);
d2a300cf
AM
13317 }
13318 return TRUE;
5bd4f169
AM
13319}
13320
60124e18
AM
13321/* What to do when ld finds relocations against symbols defined in
13322 discarded sections. */
13323
13324static unsigned int
13325ppc64_elf_action_discarded (asection *sec)
13326{
13327 if (strcmp (".opd", sec->name) == 0)
13328 return 0;
13329
13330 if (strcmp (".toc", sec->name) == 0)
13331 return 0;
13332
bce50a28
JJ
13333 if (strcmp (".toc1", sec->name) == 0)
13334 return 0;
13335
60124e18
AM
13336 return _bfd_elf_default_action_discarded (sec);
13337}
13338
5bd4f169
AM
13339/* The RELOCATE_SECTION function is called by the ELF backend linker
13340 to handle the relocations for a section.
13341
13342 The relocs are always passed as Rela structures; if the section
13343 actually uses Rel structures, the r_addend field will always be
13344 zero.
13345
13346 This function is responsible for adjust the section contents as
13347 necessary, and (if using Rela relocs and generating a
1049f94e 13348 relocatable output file) adjusting the reloc addend as
5bd4f169
AM
13349 necessary.
13350
13351 This function does not have to worry about setting the reloc
13352 address or the reloc symbol index.
13353
13354 LOCAL_SYMS is a pointer to the swapped in local symbols.
13355
13356 LOCAL_SECTIONS is an array giving the section in the input file
13357 corresponding to the st_shndx field of each local symbol.
13358
13359 The global hash table entry for the global symbols can be found
13360 via elf_sym_hashes (input_bfd).
13361
1049f94e 13362 When generating relocatable output, this function must handle
5bd4f169
AM
13363 STB_LOCAL/STT_SECTION symbols specially. The output symbol is
13364 going to be the section symbol corresponding to the output
13365 section, which means that the addend must be adjusted
13366 accordingly. */
13367
b34976b6 13368static bfd_boolean
4ce794b7
AM
13369ppc64_elf_relocate_section (bfd *output_bfd,
13370 struct bfd_link_info *info,
13371 bfd *input_bfd,
13372 asection *input_section,
13373 bfd_byte *contents,
13374 Elf_Internal_Rela *relocs,
13375 Elf_Internal_Sym *local_syms,
13376 asection **local_sections)
5bd4f169 13377{
65f38f15 13378 struct ppc_link_hash_table *htab;
5bd4f169
AM
13379 Elf_Internal_Shdr *symtab_hdr;
13380 struct elf_link_hash_entry **sym_hashes;
5bd4f169 13381 Elf_Internal_Rela *rel;
c316a17c 13382 Elf_Internal_Rela *wrel;
5bd4f169 13383 Elf_Internal_Rela *relend;
411e1bfb
AM
13384 Elf_Internal_Rela outrel;
13385 bfd_byte *loc;
411e1bfb 13386 struct got_entry **local_got_ents;
5bd4f169 13387 bfd_vma TOCstart;
b34976b6
AM
13388 bfd_boolean ret = TRUE;
13389 bfd_boolean is_opd;
794e51c0
AM
13390 /* Assume 'at' branch hints. */
13391 bfd_boolean is_isa_v2 = TRUE;
95f0d0d2 13392 bfd_vma d_offset = (bfd_big_endian (input_bfd) ? 2 : 0);
5bd4f169 13393
65f38f15 13394 /* Initialize howto table if needed. */
5bd4f169 13395 if (!ppc64_elf_howto_table[R_PPC64_ADDR32])
5bd4f169
AM
13396 ppc_howto_init ();
13397
65f38f15 13398 htab = ppc_hash_table (info);
4dfe6ac6
NC
13399 if (htab == NULL)
13400 return FALSE;
ee75fd95
AM
13401
13402 /* Don't relocate stub sections. */
e7d1c40c 13403 if (input_section->owner == htab->params->stub_bfd)
ee75fd95
AM
13404 return TRUE;
13405
0c8d6e5c 13406 BFD_ASSERT (is_ppc64_elf (input_bfd));
0ffa91dd 13407
411e1bfb 13408 local_got_ents = elf_local_got_ents (input_bfd);
5bd4f169 13409 TOCstart = elf_gp (output_bfd);
0ffa91dd 13410 symtab_hdr = &elf_symtab_hdr (input_bfd);
5bd4f169 13411 sym_hashes = elf_sym_hashes (input_bfd);
7c8fe5c4 13412 is_opd = ppc64_elf_section_data (input_section)->sec_type == sec_opd;
65f38f15 13413
c316a17c 13414 rel = wrel = relocs;
5bd4f169 13415 relend = relocs + input_section->reloc_count;
c316a17c 13416 for (; rel < relend; wrel++, rel++)
5bd4f169 13417 {
04c9666a 13418 enum elf_ppc64_reloc_type r_type;
31c76678 13419 bfd_vma addend;
5bd4f169
AM
13420 bfd_reloc_status_type r;
13421 Elf_Internal_Sym *sym;
13422 asection *sec;
039b3fef
AM
13423 struct elf_link_hash_entry *h_elf;
13424 struct ppc_link_hash_entry *h;
13425 struct ppc_link_hash_entry *fdh;
5bd4f169 13426 const char *sym_name;
0d4792f7 13427 unsigned long r_symndx, toc_symndx;
3a71aa26 13428 bfd_vma toc_addend;
f961d9dd
AM
13429 unsigned char tls_mask, tls_gd, tls_type;
13430 unsigned char sym_type;
5bd4f169 13431 bfd_vma relocation;
b34976b6
AM
13432 bfd_boolean unresolved_reloc;
13433 bfd_boolean warned;
bc30df16 13434 enum { DEST_NORMAL, DEST_OPD, DEST_STUB } reloc_dest;
67f0cbdb 13435 unsigned int insn;
e11840f9 13436 unsigned int mask;
721956f4
AM
13437 struct ppc_stub_hash_entry *stub_entry;
13438 bfd_vma max_br_offset;
13439 bfd_vma from;
c316a17c 13440 Elf_Internal_Rela orig_rel;
b80eed39
AM
13441 reloc_howto_type *howto;
13442 struct reloc_howto_struct alt_howto;
5bd4f169 13443
c316a17c
AM
13444 again:
13445 orig_rel = *rel;
13446
4ce794b7 13447 r_type = ELF64_R_TYPE (rel->r_info);
5bd4f169 13448 r_symndx = ELF64_R_SYM (rel->r_info);
ee87f2da
AM
13449
13450 /* For old style R_PPC64_TOC relocs with a zero symbol, use the
13451 symbol of the previous ADDR64 reloc. The symbol gives us the
13452 proper TOC base to use. */
13453 if (rel->r_info == ELF64_R_INFO (0, R_PPC64_TOC)
c316a17c
AM
13454 && wrel != relocs
13455 && ELF64_R_TYPE (wrel[-1].r_info) == R_PPC64_ADDR64
ee87f2da 13456 && is_opd)
c316a17c 13457 r_symndx = ELF64_R_SYM (wrel[-1].r_info);
ee87f2da 13458
4ce794b7
AM
13459 sym = NULL;
13460 sec = NULL;
039b3fef 13461 h_elf = NULL;
4ce794b7 13462 sym_name = NULL;
b34976b6
AM
13463 unresolved_reloc = FALSE;
13464 warned = FALSE;
65f38f15 13465
0b13192e 13466 if (r_symndx < symtab_hdr->sh_info)
5bd4f169
AM
13467 {
13468 /* It's a local symbol. */
74f0fb50 13469 struct _opd_sec_data *opd;
4025353c 13470
5bd4f169
AM
13471 sym = local_syms + r_symndx;
13472 sec = local_sections[r_symndx];
26c61ae5 13473 sym_name = bfd_elf_sym_name (input_bfd, symtab_hdr, sym, sec);
0d4792f7 13474 sym_type = ELF64_ST_TYPE (sym->st_info);
8517fae7 13475 relocation = _bfd_elf_rela_local_sym (output_bfd, sym, &sec, rel);
74f0fb50
AM
13476 opd = get_opd_info (sec);
13477 if (opd != NULL && opd->adjust != NULL)
1e2f5b6e 13478 {
51aecdc5
AM
13479 long adjust = opd->adjust[OPD_NDX (sym->st_value
13480 + rel->r_addend)];
4025353c
AM
13481 if (adjust == -1)
13482 relocation = 0;
13483 else
4cc603a5
AM
13484 {
13485 /* If this is a relocation against the opd section sym
13486 and we have edited .opd, adjust the reloc addend so
13487 that ld -r and ld --emit-relocs output is correct.
13488 If it is a reloc against some other .opd symbol,
13489 then the symbol value will be adjusted later. */
13490 if (ELF_ST_TYPE (sym->st_info) == STT_SECTION)
13491 rel->r_addend += adjust;
13492 else
13493 relocation += adjust;
13494 }
1e2f5b6e 13495 }
5bd4f169
AM
13496 }
13497 else
13498 {
62d887d4
L
13499 bfd_boolean ignored;
13500
b2a8e766
AM
13501 RELOC_FOR_GLOBAL_SYMBOL (info, input_bfd, input_section, rel,
13502 r_symndx, symtab_hdr, sym_hashes,
039b3fef 13503 h_elf, sec, relocation,
62d887d4 13504 unresolved_reloc, warned, ignored);
039b3fef
AM
13505 sym_name = h_elf->root.root.string;
13506 sym_type = h_elf->type;
b69fdb4e
AM
13507 if (sec != NULL
13508 && sec->owner == output_bfd
13509 && strcmp (sec->name, ".opd") == 0)
13510 {
13511 /* This is a symbol defined in a linker script. All
13512 such are defined in output sections, even those
13513 defined by simple assignment from a symbol defined in
13514 an input section. Transfer the symbol to an
13515 appropriate input .opd section, so that a branch to
13516 this symbol will be mapped to the location specified
13517 by the opd entry. */
13518 struct bfd_link_order *lo;
13519 for (lo = sec->map_head.link_order; lo != NULL; lo = lo->next)
13520 if (lo->type == bfd_indirect_link_order)
13521 {
13522 asection *isec = lo->u.indirect.section;
13523 if (h_elf->root.u.def.value >= isec->output_offset
13524 && h_elf->root.u.def.value < (isec->output_offset
13525 + isec->size))
13526 {
13527 h_elf->root.u.def.value -= isec->output_offset;
13528 h_elf->root.u.def.section = isec;
13529 sec = isec;
13530 break;
13531 }
13532 }
13533 }
5bd4f169 13534 }
039b3fef 13535 h = (struct ppc_link_hash_entry *) h_elf;
5bd4f169 13536
dbaa2011 13537 if (sec != NULL && discarded_section (sec))
c316a17c
AM
13538 {
13539 _bfd_clear_contents (ppc64_elf_howto_table[r_type],
13540 input_bfd, input_section,
13541 contents + rel->r_offset);
13542 wrel->r_offset = rel->r_offset;
13543 wrel->r_info = 0;
13544 wrel->r_addend = 0;
13545
13546 /* For ld -r, remove relocations in debug sections against
13547 sections defined in discarded sections. Not done for
13548 non-debug to preserve relocs in .eh_frame which the
13549 eh_frame editing code expects to be present. */
13550 if (bfd_link_relocatable (info)
13551 && (input_section->flags & SEC_DEBUGGING))
13552 wrel--;
13553
13554 continue;
13555 }
ab96bf03 13556
0e1862bb 13557 if (bfd_link_relocatable (info))
c316a17c 13558 goto copy_reloc;
ab96bf03 13559
f40da81b
AM
13560 if (h != NULL && &h->elf == htab->elf.hgot)
13561 {
6f20ed8a 13562 relocation = TOCstart + htab->sec_info[input_section->id].toc_off;
f40da81b
AM
13563 sec = bfd_abs_section_ptr;
13564 unresolved_reloc = FALSE;
13565 }
13566
951fd09b
AM
13567 /* TLS optimizations. Replace instruction sequences and relocs
13568 based on information we collected in tls_optimize. We edit
13569 RELOCS so that --emit-relocs will output something sensible
13570 for the final instruction stream. */
13571 tls_mask = 0;
13572 tls_gd = 0;
0d4792f7 13573 toc_symndx = 0;
727fc41e
AM
13574 if (h != NULL)
13575 tls_mask = h->tls_mask;
13576 else if (local_got_ents != NULL)
411e1bfb 13577 {
e054468f
AM
13578 struct plt_entry **local_plt = (struct plt_entry **)
13579 (local_got_ents + symtab_hdr->sh_info);
f961d9dd 13580 unsigned char *lgot_masks = (unsigned char *)
e054468f 13581 (local_plt + symtab_hdr->sh_info);
727fc41e
AM
13582 tls_mask = lgot_masks[r_symndx];
13583 }
13584 if (tls_mask == 0
13585 && (r_type == R_PPC64_TLS
13586 || r_type == R_PPC64_TLSGD
13587 || r_type == R_PPC64_TLSLD))
13588 {
13589 /* Check for toc tls entries. */
f961d9dd 13590 unsigned char *toc_tls;
0d4792f7 13591
727fc41e
AM
13592 if (!get_tls_mask (&toc_tls, &toc_symndx, &toc_addend,
13593 &local_syms, rel, input_bfd))
13594 return FALSE;
0d4792f7 13595
727fc41e
AM
13596 if (toc_tls)
13597 tls_mask = *toc_tls;
0d4792f7
AM
13598 }
13599
13600 /* Check that tls relocs are used with tls syms, and non-tls
13601 relocs are used with non-tls syms. */
cf35638d 13602 if (r_symndx != STN_UNDEF
0d4792f7
AM
13603 && r_type != R_PPC64_NONE
13604 && (h == NULL
039b3fef
AM
13605 || h->elf.root.type == bfd_link_hash_defined
13606 || h->elf.root.type == bfd_link_hash_defweak)
1d483afe
AM
13607 && (IS_PPC64_TLS_RELOC (r_type)
13608 != (sym_type == STT_TLS
13609 || (sym_type == STT_SECTION
13610 && (sec->flags & SEC_THREAD_LOCAL) != 0))))
0d4792f7 13611 {
727fc41e
AM
13612 if (tls_mask != 0
13613 && (r_type == R_PPC64_TLS
13614 || r_type == R_PPC64_TLSGD
13615 || r_type == R_PPC64_TLSLD))
0d4792f7
AM
13616 /* R_PPC64_TLS is OK against a symbol in the TOC. */
13617 ;
13618 else
25f53a85 13619 info->callbacks->einfo
1d483afe 13620 (!IS_PPC64_TLS_RELOC (r_type)
695344c0 13621 /* xgettext:c-format */
174d0a74 13622 ? _("%H: %s used with TLS symbol `%T'\n")
695344c0 13623 /* xgettext:c-format */
174d0a74 13624 : _("%H: %s used with non-TLS symbol `%T'\n"),
25f53a85 13625 input_bfd, input_section, rel->r_offset,
0d4792f7
AM
13626 ppc64_elf_howto_table[r_type]->name,
13627 sym_name);
411e1bfb
AM
13628 }
13629
13630 /* Ensure reloc mapping code below stays sane. */
13631 if (R_PPC64_TOC16_LO_DS != R_PPC64_TOC16_DS + 1
13632 || R_PPC64_TOC16_LO != R_PPC64_TOC16 + 1
13633 || (R_PPC64_GOT_TLSLD16 & 3) != (R_PPC64_GOT_TLSGD16 & 3)
13634 || (R_PPC64_GOT_TLSLD16_LO & 3) != (R_PPC64_GOT_TLSGD16_LO & 3)
13635 || (R_PPC64_GOT_TLSLD16_HI & 3) != (R_PPC64_GOT_TLSGD16_HI & 3)
13636 || (R_PPC64_GOT_TLSLD16_HA & 3) != (R_PPC64_GOT_TLSGD16_HA & 3)
13637 || (R_PPC64_GOT_TLSLD16 & 3) != (R_PPC64_GOT_TPREL16_DS & 3)
13638 || (R_PPC64_GOT_TLSLD16_LO & 3) != (R_PPC64_GOT_TPREL16_LO_DS & 3)
13639 || (R_PPC64_GOT_TLSLD16_HI & 3) != (R_PPC64_GOT_TPREL16_HI & 3)
13640 || (R_PPC64_GOT_TLSLD16_HA & 3) != (R_PPC64_GOT_TPREL16_HA & 3))
13641 abort ();
0d4792f7 13642
411e1bfb
AM
13643 switch (r_type)
13644 {
13645 default:
411e1bfb
AM
13646 break;
13647
ba761f19 13648 case R_PPC64_LO_DS_OPT:
95f0d0d2 13649 insn = bfd_get_32 (input_bfd, contents + rel->r_offset - d_offset);
ba761f19
AM
13650 if ((insn & (0x3f << 26)) != 58u << 26)
13651 abort ();
13652 insn += (14u << 26) - (58u << 26);
95f0d0d2 13653 bfd_put_32 (input_bfd, insn, contents + rel->r_offset - d_offset);
ba761f19
AM
13654 r_type = R_PPC64_TOC16_LO;
13655 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
13656 break;
13657
411e1bfb
AM
13658 case R_PPC64_TOC16:
13659 case R_PPC64_TOC16_LO:
13660 case R_PPC64_TOC16_DS:
13661 case R_PPC64_TOC16_LO_DS:
411e1bfb
AM
13662 {
13663 /* Check for toc tls entries. */
f961d9dd 13664 unsigned char *toc_tls;
951fd09b 13665 int retval;
411e1bfb 13666
3a71aa26
AM
13667 retval = get_tls_mask (&toc_tls, &toc_symndx, &toc_addend,
13668 &local_syms, rel, input_bfd);
951fd09b 13669 if (retval == 0)
411e1bfb
AM
13670 return FALSE;
13671
13672 if (toc_tls)
13673 {
951fd09b 13674 tls_mask = *toc_tls;
411e1bfb
AM
13675 if (r_type == R_PPC64_TOC16_DS
13676 || r_type == R_PPC64_TOC16_LO_DS)
81407a69
AM
13677 {
13678 if (tls_mask != 0
13679 && (tls_mask & (TLS_DTPREL | TLS_TPREL)) == 0)
13680 goto toctprel;
13681 }
411e1bfb 13682 else
951fd09b
AM
13683 {
13684 /* If we found a GD reloc pair, then we might be
13685 doing a GD->IE transition. */
13686 if (retval == 2)
13687 {
13688 tls_gd = TLS_TPRELGD;
13689 if (tls_mask != 0 && (tls_mask & TLS_GD) == 0)
102890f0 13690 goto tls_ldgd_opt;
951fd09b
AM
13691 }
13692 else if (retval == 3)
13693 {
13694 if (tls_mask != 0 && (tls_mask & TLS_LD) == 0)
102890f0 13695 goto tls_ldgd_opt;
951fd09b
AM
13696 }
13697 }
411e1bfb
AM
13698 }
13699 }
13700 break;
13701
9d6ded02
AM
13702 case R_PPC64_GOT_TPREL16_HI:
13703 case R_PPC64_GOT_TPREL16_HA:
13704 if (tls_mask != 0
13705 && (tls_mask & TLS_TPREL) == 0)
13706 {
13707 rel->r_offset -= d_offset;
95f0d0d2 13708 bfd_put_32 (input_bfd, NOP, contents + rel->r_offset);
9d6ded02
AM
13709 r_type = R_PPC64_NONE;
13710 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
13711 }
13712 break;
13713
411e1bfb
AM
13714 case R_PPC64_GOT_TPREL16_DS:
13715 case R_PPC64_GOT_TPREL16_LO_DS:
951fd09b
AM
13716 if (tls_mask != 0
13717 && (tls_mask & TLS_TPREL) == 0)
411e1bfb 13718 {
81407a69 13719 toctprel:
95f0d0d2 13720 insn = bfd_get_32 (input_bfd,
c316a17c 13721 contents + rel->r_offset - d_offset);
411e1bfb
AM
13722 insn &= 31 << 21;
13723 insn |= 0x3c0d0000; /* addis 0,13,0 */
95f0d0d2 13724 bfd_put_32 (input_bfd, insn,
c316a17c 13725 contents + rel->r_offset - d_offset);
411e1bfb 13726 r_type = R_PPC64_TPREL16_HA;
0d4792f7
AM
13727 if (toc_symndx != 0)
13728 {
13729 rel->r_info = ELF64_R_INFO (toc_symndx, r_type);
3a71aa26 13730 rel->r_addend = toc_addend;
0d4792f7
AM
13731 /* We changed the symbol. Start over in order to
13732 get h, sym, sec etc. right. */
c316a17c 13733 goto again;
0d4792f7
AM
13734 }
13735 else
13736 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
411e1bfb
AM
13737 }
13738 break;
13739
13740 case R_PPC64_TLS:
951fd09b
AM
13741 if (tls_mask != 0
13742 && (tls_mask & TLS_TPREL) == 0)
411e1bfb 13743 {
95f0d0d2 13744 insn = bfd_get_32 (input_bfd, contents + rel->r_offset);
2d0f3896
AM
13745 insn = _bfd_elf_ppc_at_tls_transform (insn, 13);
13746 if (insn == 0)
411e1bfb 13747 abort ();
95f0d0d2 13748 bfd_put_32 (input_bfd, insn, contents + rel->r_offset);
411e1bfb 13749 /* Was PPC64_TLS which sits on insn boundary, now
4fe5ca5b
GM
13750 PPC64_TPREL16_LO which is at low-order half-word. */
13751 rel->r_offset += d_offset;
0d4792f7
AM
13752 r_type = R_PPC64_TPREL16_LO;
13753 if (toc_symndx != 0)
13754 {
13755 rel->r_info = ELF64_R_INFO (toc_symndx, r_type);
3a71aa26 13756 rel->r_addend = toc_addend;
0d4792f7
AM
13757 /* We changed the symbol. Start over in order to
13758 get h, sym, sec etc. right. */
c316a17c 13759 goto again;
0d4792f7
AM
13760 }
13761 else
13762 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
411e1bfb
AM
13763 }
13764 break;
13765
411e1bfb
AM
13766 case R_PPC64_GOT_TLSGD16_HI:
13767 case R_PPC64_GOT_TLSGD16_HA:
951fd09b
AM
13768 tls_gd = TLS_TPRELGD;
13769 if (tls_mask != 0 && (tls_mask & TLS_GD) == 0)
13770 goto tls_gdld_hi;
13771 break;
13772
411e1bfb
AM
13773 case R_PPC64_GOT_TLSLD16_HI:
13774 case R_PPC64_GOT_TLSLD16_HA:
951fd09b 13775 if (tls_mask != 0 && (tls_mask & TLS_LD) == 0)
411e1bfb 13776 {
951fd09b
AM
13777 tls_gdld_hi:
13778 if ((tls_mask & tls_gd) != 0)
13779 r_type = (((r_type - (R_PPC64_GOT_TLSGD16 & 3)) & 3)
13780 + R_PPC64_GOT_TPREL16_DS);
13781 else
411e1bfb 13782 {
4fe5ca5b 13783 rel->r_offset -= d_offset;
95f0d0d2 13784 bfd_put_32 (input_bfd, NOP, contents + rel->r_offset);
951fd09b 13785 r_type = R_PPC64_NONE;
411e1bfb 13786 }
951fd09b 13787 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
411e1bfb
AM
13788 }
13789 break;
13790
951fd09b
AM
13791 case R_PPC64_GOT_TLSGD16:
13792 case R_PPC64_GOT_TLSGD16_LO:
13793 tls_gd = TLS_TPRELGD;
13794 if (tls_mask != 0 && (tls_mask & TLS_GD) == 0)
102890f0 13795 goto tls_ldgd_opt;
951fd09b 13796 break;
411e1bfb 13797
951fd09b
AM
13798 case R_PPC64_GOT_TLSLD16:
13799 case R_PPC64_GOT_TLSLD16_LO:
13800 if (tls_mask != 0 && (tls_mask & TLS_LD) == 0)
13801 {
3a71aa26 13802 unsigned int insn1, insn2, insn3;
102890f0
AM
13803 bfd_vma offset;
13804
13805 tls_ldgd_opt:
727fc41e
AM
13806 offset = (bfd_vma) -1;
13807 /* If not using the newer R_PPC64_TLSGD/LD to mark
13808 __tls_get_addr calls, we must trust that the call
13809 stays with its arg setup insns, ie. that the next
13810 reloc is the __tls_get_addr call associated with
13811 the current reloc. Edit both insns. */
13812 if (input_section->has_tls_get_addr_call
13813 && rel + 1 < relend
13814 && branch_reloc_hash_match (input_bfd, rel + 1,
13815 htab->tls_get_addr,
13816 htab->tls_get_addr_fd))
13817 offset = rel[1].r_offset;
b86ac8e3
AM
13818 /* We read the low GOT_TLS (or TOC16) insn because we
13819 need to keep the destination reg. It may be
13820 something other than the usual r3, and moved to r3
13821 before the call by intervening code. */
95f0d0d2 13822 insn1 = bfd_get_32 (input_bfd,
b86ac8e3 13823 contents + rel->r_offset - d_offset);
102890f0 13824 if ((tls_mask & tls_gd) != 0)
411e1bfb 13825 {
102890f0 13826 /* IE */
b86ac8e3 13827 insn1 &= (0x1f << 21) | (0x1f << 16);
102890f0
AM
13828 insn1 |= 58 << 26; /* ld */
13829 insn2 = 0x7c636a14; /* add 3,3,13 */
727fc41e 13830 if (offset != (bfd_vma) -1)
f58d5a2d 13831 rel[1].r_info = ELF64_R_INFO (STN_UNDEF, R_PPC64_NONE);
102890f0
AM
13832 if ((tls_mask & TLS_EXPLICIT) == 0)
13833 r_type = (((r_type - (R_PPC64_GOT_TLSGD16 & 3)) & 3)
13834 + R_PPC64_GOT_TPREL16_DS);
411e1bfb 13835 else
102890f0
AM
13836 r_type += R_PPC64_TOC16_DS - R_PPC64_TOC16;
13837 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
13838 }
13839 else
13840 {
13841 /* LE */
b86ac8e3
AM
13842 insn1 &= 0x1f << 21;
13843 insn1 |= 0x3c0d0000; /* addis r,13,0 */
102890f0
AM
13844 insn2 = 0x38630000; /* addi 3,3,0 */
13845 if (tls_gd == 0)
951fd09b 13846 {
102890f0 13847 /* Was an LD reloc. */
1d483afe
AM
13848 if (toc_symndx)
13849 sec = local_sections[toc_symndx];
13850 for (r_symndx = 0;
13851 r_symndx < symtab_hdr->sh_info;
13852 r_symndx++)
13853 if (local_sections[r_symndx] == sec)
13854 break;
13855 if (r_symndx >= symtab_hdr->sh_info)
cf35638d 13856 r_symndx = STN_UNDEF;
102890f0 13857 rel->r_addend = htab->elf.tls_sec->vma + DTP_OFFSET;
cf35638d 13858 if (r_symndx != STN_UNDEF)
1d483afe
AM
13859 rel->r_addend -= (local_syms[r_symndx].st_value
13860 + sec->output_offset
13861 + sec->output_section->vma);
951fd09b 13862 }
102890f0 13863 else if (toc_symndx != 0)
3a71aa26
AM
13864 {
13865 r_symndx = toc_symndx;
13866 rel->r_addend = toc_addend;
13867 }
102890f0
AM
13868 r_type = R_PPC64_TPREL16_HA;
13869 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
727fc41e
AM
13870 if (offset != (bfd_vma) -1)
13871 {
13872 rel[1].r_info = ELF64_R_INFO (r_symndx,
13873 R_PPC64_TPREL16_LO);
13874 rel[1].r_offset = offset + d_offset;
13875 rel[1].r_addend = rel->r_addend;
13876 }
102890f0 13877 }
95f0d0d2 13878 bfd_put_32 (input_bfd, insn1,
3a71aa26 13879 contents + rel->r_offset - d_offset);
727fc41e
AM
13880 if (offset != (bfd_vma) -1)
13881 {
95f0d0d2 13882 insn3 = bfd_get_32 (input_bfd,
727fc41e
AM
13883 contents + offset + 4);
13884 if (insn3 == NOP
13885 || insn3 == CROR_151515 || insn3 == CROR_313131)
13886 {
13887 rel[1].r_offset += 4;
95f0d0d2 13888 bfd_put_32 (input_bfd, insn2, contents + offset + 4);
727fc41e
AM
13889 insn2 = NOP;
13890 }
95f0d0d2 13891 bfd_put_32 (input_bfd, insn2, contents + offset);
727fc41e
AM
13892 }
13893 if ((tls_mask & tls_gd) == 0
13894 && (tls_gd == 0 || toc_symndx != 0))
13895 {
13896 /* We changed the symbol. Start over in order
13897 to get h, sym, sec etc. right. */
c316a17c 13898 goto again;
727fc41e
AM
13899 }
13900 }
13901 break;
13902
13903 case R_PPC64_TLSGD:
13904 if (tls_mask != 0 && (tls_mask & TLS_GD) == 0)
13905 {
13906 unsigned int insn2, insn3;
13907 bfd_vma offset = rel->r_offset;
13908
13909 if ((tls_mask & TLS_TPRELGD) != 0)
13910 {
13911 /* IE */
13912 r_type = R_PPC64_NONE;
13913 insn2 = 0x7c636a14; /* add 3,3,13 */
13914 }
13915 else
13916 {
13917 /* LE */
13918 if (toc_symndx != 0)
13919 {
13920 r_symndx = toc_symndx;
13921 rel->r_addend = toc_addend;
13922 }
13923 r_type = R_PPC64_TPREL16_LO;
13924 rel->r_offset = offset + d_offset;
13925 insn2 = 0x38630000; /* addi 3,3,0 */
13926 }
13927 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
13928 /* Zap the reloc on the _tls_get_addr call too. */
13929 BFD_ASSERT (offset == rel[1].r_offset);
f58d5a2d 13930 rel[1].r_info = ELF64_R_INFO (STN_UNDEF, R_PPC64_NONE);
95f0d0d2 13931 insn3 = bfd_get_32 (input_bfd,
3a71aa26 13932 contents + offset + 4);
102890f0
AM
13933 if (insn3 == NOP
13934 || insn3 == CROR_151515 || insn3 == CROR_313131)
13935 {
727fc41e 13936 rel->r_offset += 4;
95f0d0d2 13937 bfd_put_32 (input_bfd, insn2, contents + offset + 4);
3a71aa26 13938 insn2 = NOP;
102890f0 13939 }
95f0d0d2 13940 bfd_put_32 (input_bfd, insn2, contents + offset);
727fc41e 13941 if ((tls_mask & TLS_TPRELGD) == 0 && toc_symndx != 0)
c316a17c 13942 goto again;
411e1bfb 13943 }
411e1bfb
AM
13944 break;
13945
727fc41e
AM
13946 case R_PPC64_TLSLD:
13947 if (tls_mask != 0 && (tls_mask & TLS_LD) == 0)
13948 {
13949 unsigned int insn2, insn3;
13950 bfd_vma offset = rel->r_offset;
13951
13952 if (toc_symndx)
13953 sec = local_sections[toc_symndx];
13954 for (r_symndx = 0;
13955 r_symndx < symtab_hdr->sh_info;
13956 r_symndx++)
13957 if (local_sections[r_symndx] == sec)
13958 break;
13959 if (r_symndx >= symtab_hdr->sh_info)
cf35638d 13960 r_symndx = STN_UNDEF;
727fc41e 13961 rel->r_addend = htab->elf.tls_sec->vma + DTP_OFFSET;
cf35638d 13962 if (r_symndx != STN_UNDEF)
727fc41e
AM
13963 rel->r_addend -= (local_syms[r_symndx].st_value
13964 + sec->output_offset
13965 + sec->output_section->vma);
13966
13967 r_type = R_PPC64_TPREL16_LO;
13968 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
13969 rel->r_offset = offset + d_offset;
13970 /* Zap the reloc on the _tls_get_addr call too. */
13971 BFD_ASSERT (offset == rel[1].r_offset);
f58d5a2d 13972 rel[1].r_info = ELF64_R_INFO (STN_UNDEF, R_PPC64_NONE);
727fc41e 13973 insn2 = 0x38630000; /* addi 3,3,0 */
95f0d0d2 13974 insn3 = bfd_get_32 (input_bfd,
727fc41e
AM
13975 contents + offset + 4);
13976 if (insn3 == NOP
13977 || insn3 == CROR_151515 || insn3 == CROR_313131)
13978 {
13979 rel->r_offset += 4;
95f0d0d2 13980 bfd_put_32 (input_bfd, insn2, contents + offset + 4);
727fc41e
AM
13981 insn2 = NOP;
13982 }
95f0d0d2 13983 bfd_put_32 (input_bfd, insn2, contents + offset);
c316a17c 13984 goto again;
727fc41e
AM
13985 }
13986 break;
13987
411e1bfb 13988 case R_PPC64_DTPMOD64:
951fd09b
AM
13989 if (rel + 1 < relend
13990 && rel[1].r_info == ELF64_R_INFO (r_symndx, R_PPC64_DTPREL64)
13991 && rel[1].r_offset == rel->r_offset + 8)
411e1bfb 13992 {
951fd09b
AM
13993 if ((tls_mask & TLS_GD) == 0)
13994 {
13995 rel[1].r_info = ELF64_R_INFO (r_symndx, R_PPC64_NONE);
13996 if ((tls_mask & TLS_TPRELGD) != 0)
13997 r_type = R_PPC64_TPREL64;
13998 else
13999 {
4ce794b7 14000 bfd_put_64 (output_bfd, 1, contents + rel->r_offset);
951fd09b
AM
14001 r_type = R_PPC64_NONE;
14002 }
14003 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
14004 }
14005 }
14006 else
14007 {
14008 if ((tls_mask & TLS_LD) == 0)
411e1bfb 14009 {
4ce794b7 14010 bfd_put_64 (output_bfd, 1, contents + rel->r_offset);
411e1bfb 14011 r_type = R_PPC64_NONE;
951fd09b 14012 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
411e1bfb 14013 }
411e1bfb
AM
14014 }
14015 break;
14016
14017 case R_PPC64_TPREL64:
951fd09b 14018 if ((tls_mask & TLS_TPREL) == 0)
411e1bfb
AM
14019 {
14020 r_type = R_PPC64_NONE;
14021 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
14022 }
14023 break;
52a82034 14024
006589cf
AM
14025 case R_PPC64_ENTRY:
14026 relocation = TOCstart + htab->sec_info[input_section->id].toc_off;
14027 if (!bfd_link_pic (info)
14028 && !info->traditional_format
14029 && relocation + 0x80008000 <= 0xffffffff)
14030 {
14031 unsigned int insn1, insn2;
14032
14033 insn1 = bfd_get_32 (input_bfd, contents + rel->r_offset);
14034 insn2 = bfd_get_32 (input_bfd, contents + rel->r_offset + 4);
14035 if ((insn1 & ~0xfffc) == LD_R2_0R12
14036 && insn2 == ADD_R2_R2_R12)
14037 {
95f0d0d2 14038 bfd_put_32 (input_bfd,
006589cf
AM
14039 LIS_R2 + PPC_HA (relocation),
14040 contents + rel->r_offset);
95f0d0d2 14041 bfd_put_32 (input_bfd,
006589cf
AM
14042 ADDI_R2_R2 + PPC_LO (relocation),
14043 contents + rel->r_offset + 4);
14044 }
14045 }
14046 else
14047 {
14048 relocation -= (rel->r_offset
14049 + input_section->output_offset
14050 + input_section->output_section->vma);
14051 if (relocation + 0x80008000 <= 0xffffffff)
14052 {
14053 unsigned int insn1, insn2;
14054
14055 insn1 = bfd_get_32 (input_bfd, contents + rel->r_offset);
14056 insn2 = bfd_get_32 (input_bfd, contents + rel->r_offset + 4);
14057 if ((insn1 & ~0xfffc) == LD_R2_0R12
14058 && insn2 == ADD_R2_R2_R12)
14059 {
95f0d0d2 14060 bfd_put_32 (input_bfd,
006589cf
AM
14061 ADDIS_R2_R12 + PPC_HA (relocation),
14062 contents + rel->r_offset);
95f0d0d2 14063 bfd_put_32 (input_bfd,
006589cf
AM
14064 ADDI_R2_R2 + PPC_LO (relocation),
14065 contents + rel->r_offset + 4);
14066 }
14067 }
14068 }
14069 break;
14070
52a82034
AM
14071 case R_PPC64_REL16_HA:
14072 /* If we are generating a non-PIC executable, edit
14073 . 0: addis 2,12,.TOC.-0b@ha
14074 . addi 2,2,.TOC.-0b@l
14075 used by ELFv2 global entry points to set up r2, to
14076 . lis 2,.TOC.@ha
14077 . addi 2,2,.TOC.@l
14078 if .TOC. is in range. */
0e1862bb 14079 if (!bfd_link_pic (info)
810d4e75 14080 && !info->traditional_format
006589cf 14081 && !htab->opd_abi
4f038ee5 14082 && rel->r_addend == d_offset
52a82034
AM
14083 && h != NULL && &h->elf == htab->elf.hgot
14084 && rel + 1 < relend
14085 && rel[1].r_info == ELF64_R_INFO (r_symndx, R_PPC64_REL16_LO)
14086 && rel[1].r_offset == rel->r_offset + 4
14087 && rel[1].r_addend == rel->r_addend + 4
14088 && relocation + 0x80008000 <= 0xffffffff)
14089 {
14090 unsigned int insn1, insn2;
14091 bfd_vma offset = rel->r_offset - d_offset;
95f0d0d2
AM
14092 insn1 = bfd_get_32 (input_bfd, contents + offset);
14093 insn2 = bfd_get_32 (input_bfd, contents + offset + 4);
006589cf
AM
14094 if ((insn1 & 0xffff0000) == ADDIS_R2_R12
14095 && (insn2 & 0xffff0000) == ADDI_R2_R2)
52a82034
AM
14096 {
14097 r_type = R_PPC64_ADDR16_HA;
14098 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
14099 rel->r_addend -= d_offset;
14100 rel[1].r_info = ELF64_R_INFO (r_symndx, R_PPC64_ADDR16_LO);
14101 rel[1].r_addend -= d_offset + 4;
95f0d0d2 14102 bfd_put_32 (input_bfd, LIS_R2, contents + offset);
52a82034
AM
14103 }
14104 }
14105 break;
411e1bfb
AM
14106 }
14107
14108 /* Handle other relocations that tweak non-addend part of insn. */
86c76c7b 14109 insn = 0;
b25116a9
AM
14110 max_br_offset = 1 << 25;
14111 addend = rel->r_addend;
bc30df16 14112 reloc_dest = DEST_NORMAL;
65f38f15 14113 switch (r_type)
5bd4f169
AM
14114 {
14115 default:
65f38f15 14116 break;
5bd4f169 14117
3b421ab3
AM
14118 case R_PPC64_TOCSAVE:
14119 if (relocation + addend == (rel->r_offset
14120 + input_section->output_offset
14121 + input_section->output_section->vma)
14122 && tocsave_find (htab, NO_INSERT,
14123 &local_syms, rel, input_bfd))
14124 {
14125 insn = bfd_get_32 (input_bfd, contents + rel->r_offset);
14126 if (insn == NOP
14127 || insn == CROR_151515 || insn == CROR_313131)
a078d95a
AM
14128 bfd_put_32 (input_bfd,
14129 STD_R2_0R1 + STK_TOC (htab),
3b421ab3
AM
14130 contents + rel->r_offset);
14131 }
14132 break;
14133
65f38f15
AM
14134 /* Branch taken prediction relocations. */
14135 case R_PPC64_ADDR14_BRTAKEN:
14136 case R_PPC64_REL14_BRTAKEN:
cedb70c5 14137 insn = 0x01 << 21; /* 'y' or 't' bit, lowest bit of BO field. */
1a0670f3 14138 /* Fall through. */
65f38f15 14139
86c76c7b 14140 /* Branch not taken prediction relocations. */
65f38f15
AM
14141 case R_PPC64_ADDR14_BRNTAKEN:
14142 case R_PPC64_REL14_BRNTAKEN:
95f0d0d2 14143 insn |= bfd_get_32 (input_bfd,
411e1bfb 14144 contents + rel->r_offset) & ~(0x01 << 21);
1a0670f3 14145 /* Fall through. */
86c76c7b 14146
b25116a9
AM
14147 case R_PPC64_REL14:
14148 max_br_offset = 1 << 15;
1a0670f3 14149 /* Fall through. */
5bd4f169 14150
65f38f15 14151 case R_PPC64_REL24:
ad8e1ba5
AM
14152 /* Calls to functions with a different TOC, such as calls to
14153 shared objects, need to alter the TOC pointer. This is
14154 done using a linkage stub. A REL24 branching to these
14155 linkage stubs needs to be followed by a nop, as the nop
14156 will be replaced with an instruction to restore the TOC
14157 base pointer. */
8387904d 14158 fdh = h;
b31867b6
AM
14159 if (h != NULL
14160 && h->oh != NULL
14161 && h->oh->is_func_descriptor)
14162 fdh = ppc_follow_link (h->oh);
31c76678
DK
14163 stub_entry = ppc_get_stub_entry (input_section, sec, fdh, &orig_rel,
14164 htab);
6abec6bc 14165 if (stub_entry != NULL
ad8e1ba5 14166 && (stub_entry->stub_type == ppc_stub_plt_call
794e51c0 14167 || stub_entry->stub_type == ppc_stub_plt_call_r2save
ad8e1ba5
AM
14168 || stub_entry->stub_type == ppc_stub_plt_branch_r2off
14169 || stub_entry->stub_type == ppc_stub_long_branch_r2off))
41bd81ab 14170 {
b25116a9 14171 bfd_boolean can_plt_call = FALSE;
721956f4 14172
ba8ca3e7
AM
14173 /* All of these stubs will modify r2, so there must be a
14174 branch and link followed by a nop. The nop is
14175 replaced by an insn to restore r2. */
eea6121a 14176 if (rel->r_offset + 8 <= input_section->size)
41bd81ab 14177 {
ba8ca3e7
AM
14178 unsigned long br;
14179
14180 br = bfd_get_32 (input_bfd,
14181 contents + rel->r_offset);
14182 if ((br & 1) != 0)
41bd81ab 14183 {
ba8ca3e7
AM
14184 unsigned long nop;
14185
14186 nop = bfd_get_32 (input_bfd,
14187 contents + rel->r_offset + 4);
14188 if (nop == NOP
14189 || nop == CROR_151515 || nop == CROR_313131)
a7f2871e 14190 {
ba8ca3e7
AM
14191 if (h != NULL
14192 && (h == htab->tls_get_addr_fd
14193 || h == htab->tls_get_addr)
7c9cf415 14194 && htab->params->tls_get_addr_opt)
ba8ca3e7
AM
14195 {
14196 /* Special stub used, leave nop alone. */
14197 }
14198 else
a078d95a
AM
14199 bfd_put_32 (input_bfd,
14200 LD_R2_0R1 + STK_TOC (htab),
ba8ca3e7
AM
14201 contents + rel->r_offset + 4);
14202 can_plt_call = TRUE;
a7f2871e 14203 }
41bd81ab 14204 }
5bd4f169 14205 }
721956f4 14206
ba8ca3e7 14207 if (!can_plt_call && h != NULL)
721956f4 14208 {
ba8ca3e7
AM
14209 const char *name = h->elf.root.root.string;
14210
14211 if (*name == '.')
14212 ++name;
14213
14214 if (strncmp (name, "__libc_start_main", 17) == 0
14215 && (name[17] == 0 || name[17] == '@'))
6ab189d5 14216 {
ba8ca3e7
AM
14217 /* Allow crt1 branch to go via a toc adjusting
14218 stub. Other calls that never return could do
14219 the same, if we could detect such. */
b25116a9 14220 can_plt_call = TRUE;
6ab189d5 14221 }
ba8ca3e7
AM
14222 }
14223
14224 if (!can_plt_call)
14225 {
14226 /* g++ as of 20130507 emits self-calls without a
14227 following nop. This is arguably wrong since we
14228 have conflicting information. On the one hand a
14229 global symbol and on the other a local call
14230 sequence, but don't error for this special case.
14231 It isn't possible to cheaply verify we have
14232 exactly such a call. Allow all calls to the same
14233 section. */
14234 asection *code_sec = sec;
14235
14236 if (get_opd_info (sec) != NULL)
ad8e1ba5 14237 {
ba8ca3e7
AM
14238 bfd_vma off = (relocation + addend
14239 - sec->output_section->vma
14240 - sec->output_offset);
bc30df16 14241
ba8ca3e7 14242 opd_entry_value (sec, off, &code_sec, NULL, FALSE);
ad8e1ba5 14243 }
ba8ca3e7
AM
14244 if (code_sec == input_section)
14245 can_plt_call = TRUE;
14246 }
14247
14248 if (!can_plt_call)
14249 {
4805fc55
AM
14250 if (stub_entry->stub_type == ppc_stub_plt_call
14251 || stub_entry->stub_type == ppc_stub_plt_call_r2save)
14252 info->callbacks->einfo
695344c0 14253 /* xgettext:c-format */
174d0a74 14254 (_("%H: call to `%T' lacks nop, can't restore toc; "
4805fc55
AM
14255 "recompile with -fPIC\n"),
14256 input_bfd, input_section, rel->r_offset, sym_name);
14257 else
14258 info->callbacks->einfo
695344c0 14259 /* xgettext:c-format */
174d0a74 14260 (_("%H: call to `%T' lacks nop, can't restore toc; "
4805fc55
AM
14261 "(-mcmodel=small toc adjust stub)\n"),
14262 input_bfd, input_section, rel->r_offset, sym_name);
ba8ca3e7
AM
14263
14264 bfd_set_error (bfd_error_bad_value);
14265 ret = FALSE;
721956f4
AM
14266 }
14267
b25116a9 14268 if (can_plt_call
794e51c0
AM
14269 && (stub_entry->stub_type == ppc_stub_plt_call
14270 || stub_entry->stub_type == ppc_stub_plt_call_r2save))
b25116a9
AM
14271 unresolved_reloc = FALSE;
14272 }
14273
6abec6bc
AM
14274 if ((stub_entry == NULL
14275 || stub_entry->stub_type == ppc_stub_long_branch
14276 || stub_entry->stub_type == ppc_stub_plt_branch)
8387904d
AM
14277 && get_opd_info (sec) != NULL)
14278 {
14279 /* The branch destination is the value of the opd entry. */
4cc603a5
AM
14280 bfd_vma off = (relocation + addend
14281 - sec->output_section->vma
14282 - sec->output_offset);
aef36ac1 14283 bfd_vma dest = opd_entry_value (sec, off, NULL, NULL, FALSE);
8387904d
AM
14284 if (dest != (bfd_vma) -1)
14285 {
14286 relocation = dest;
14287 addend = 0;
bc30df16 14288 reloc_dest = DEST_OPD;
8387904d
AM
14289 }
14290 }
14291
b25116a9
AM
14292 /* If the branch is out of reach we ought to have a long
14293 branch stub. */
14294 from = (rel->r_offset
14295 + input_section->output_offset
14296 + input_section->output_section->vma);
14297
6911b7dc
AM
14298 relocation += PPC64_LOCAL_ENTRY_OFFSET (fdh
14299 ? fdh->elf.other
14300 : sym->st_other);
14301
6abec6bc
AM
14302 if (stub_entry != NULL
14303 && (stub_entry->stub_type == ppc_stub_long_branch
14304 || stub_entry->stub_type == ppc_stub_plt_branch)
14305 && (r_type == R_PPC64_ADDR14_BRTAKEN
14306 || r_type == R_PPC64_ADDR14_BRNTAKEN
14307 || (relocation + addend - from + max_br_offset
14308 < 2 * max_br_offset)))
14309 /* Don't use the stub if this branch is in range. */
14310 stub_entry = NULL;
b25116a9
AM
14311
14312 if (stub_entry != NULL)
14313 {
14314 /* Munge up the value and addend so that we call the stub
14315 rather than the procedure directly. */
a4b6fadd
AM
14316 asection *stub_sec = stub_entry->group->stub_sec;
14317
14318 if (stub_entry->stub_type == ppc_stub_save_res)
14319 relocation += (stub_sec->output_offset
14320 + stub_sec->output_section->vma
14321 + stub_sec->size - htab->sfpr->size
14322 - htab->sfpr->output_offset
14323 - htab->sfpr->output_section->vma);
14324 else
14325 relocation = (stub_entry->stub_offset
14326 + stub_sec->output_offset
14327 + stub_sec->output_section->vma);
b25116a9 14328 addend = 0;
bc30df16 14329 reloc_dest = DEST_STUB;
3b421ab3 14330
954b63d4 14331 if ((stub_entry->stub_type == ppc_stub_plt_call
794e51c0
AM
14332 || stub_entry->stub_type == ppc_stub_plt_call_r2save)
14333 && (ALWAYS_EMIT_R2SAVE
14334 || stub_entry->stub_type == ppc_stub_plt_call_r2save)
3b421ab3
AM
14335 && rel + 1 < relend
14336 && rel[1].r_offset == rel->r_offset + 4
14337 && ELF64_R_TYPE (rel[1].r_info) == R_PPC64_TOCSAVE)
14338 relocation += 4;
b25116a9
AM
14339 }
14340
14341 if (insn != 0)
14342 {
794e51c0 14343 if (is_isa_v2)
721956f4 14344 {
b25116a9
AM
14345 /* Set 'a' bit. This is 0b00010 in BO field for branch
14346 on CR(BI) insns (BO == 001at or 011at), and 0b01000
14347 for branch on CTR insns (BO == 1a00t or 1a01t). */
14348 if ((insn & (0x14 << 21)) == (0x04 << 21))
14349 insn |= 0x02 << 21;
14350 else if ((insn & (0x14 << 21)) == (0x10 << 21))
14351 insn |= 0x08 << 21;
14352 else
14353 break;
14354 }
14355 else
14356 {
14357 /* Invert 'y' bit if not the default. */
4cc603a5 14358 if ((bfd_signed_vma) (relocation + addend - from) < 0)
b25116a9 14359 insn ^= 0x01 << 21;
721956f4 14360 }
b25116a9 14361
95f0d0d2 14362 bfd_put_32 (input_bfd, insn, contents + rel->r_offset);
5bd4f169 14363 }
e86ce104 14364
06da1e8e
AM
14365 /* NOP out calls to undefined weak functions.
14366 We can thus call a weak function without first
14367 checking whether the function is defined. */
b25116a9 14368 else if (h != NULL
039b3fef 14369 && h->elf.root.type == bfd_link_hash_undefweak
766bc656 14370 && h->elf.dynindx == -1
b25116a9
AM
14371 && r_type == R_PPC64_REL24
14372 && relocation == 0
4cc603a5 14373 && addend == 0)
e86ce104 14374 {
95f0d0d2 14375 bfd_put_32 (input_bfd, NOP, contents + rel->r_offset);
c316a17c 14376 goto copy_reloc;
e86ce104 14377 }
65f38f15
AM
14378 break;
14379 }
5bd4f169 14380
65f38f15 14381 /* Set `addend'. */
411e1bfb 14382 tls_type = 0;
65f38f15
AM
14383 switch (r_type)
14384 {
14385 default:
25f53a85 14386 info->callbacks->einfo
695344c0 14387 /* xgettext:c-format */
bc30df16 14388 (_("%P: %B: unknown relocation type %d for `%T'\n"),
d003868e 14389 input_bfd, (int) r_type, sym_name);
5bd4f169 14390
65f38f15 14391 bfd_set_error (bfd_error_bad_value);
b34976b6 14392 ret = FALSE;
c316a17c 14393 goto copy_reloc;
5bd4f169 14394
65f38f15 14395 case R_PPC64_NONE:
411e1bfb 14396 case R_PPC64_TLS:
727fc41e
AM
14397 case R_PPC64_TLSGD:
14398 case R_PPC64_TLSLD:
3b421ab3 14399 case R_PPC64_TOCSAVE:
04c9666a
AM
14400 case R_PPC64_GNU_VTINHERIT:
14401 case R_PPC64_GNU_VTENTRY:
006589cf 14402 case R_PPC64_ENTRY:
c316a17c 14403 goto copy_reloc;
5bd4f169
AM
14404
14405 /* GOT16 relocations. Like an ADDR16 using the symbol's
14406 address in the GOT as relocation value instead of the
411e1bfb 14407 symbol's value itself. Also, create a GOT entry for the
5bd4f169 14408 symbol and put the symbol value there. */
411e1bfb
AM
14409 case R_PPC64_GOT_TLSGD16:
14410 case R_PPC64_GOT_TLSGD16_LO:
14411 case R_PPC64_GOT_TLSGD16_HI:
14412 case R_PPC64_GOT_TLSGD16_HA:
951fd09b 14413 tls_type = TLS_TLS | TLS_GD;
411e1bfb
AM
14414 goto dogot;
14415
14416 case R_PPC64_GOT_TLSLD16:
14417 case R_PPC64_GOT_TLSLD16_LO:
14418 case R_PPC64_GOT_TLSLD16_HI:
14419 case R_PPC64_GOT_TLSLD16_HA:
951fd09b 14420 tls_type = TLS_TLS | TLS_LD;
411e1bfb
AM
14421 goto dogot;
14422
14423 case R_PPC64_GOT_TPREL16_DS:
14424 case R_PPC64_GOT_TPREL16_LO_DS:
14425 case R_PPC64_GOT_TPREL16_HI:
14426 case R_PPC64_GOT_TPREL16_HA:
14427 tls_type = TLS_TLS | TLS_TPREL;
14428 goto dogot;
14429
14430 case R_PPC64_GOT_DTPREL16_DS:
14431 case R_PPC64_GOT_DTPREL16_LO_DS:
14432 case R_PPC64_GOT_DTPREL16_HI:
14433 case R_PPC64_GOT_DTPREL16_HA:
14434 tls_type = TLS_TLS | TLS_DTPREL;
14435 goto dogot;
14436
65f38f15
AM
14437 case R_PPC64_GOT16:
14438 case R_PPC64_GOT16_LO:
14439 case R_PPC64_GOT16_HI:
14440 case R_PPC64_GOT16_HA:
14441 case R_PPC64_GOT16_DS:
14442 case R_PPC64_GOT16_LO_DS:
411e1bfb 14443 dogot:
5bd4f169
AM
14444 {
14445 /* Relocation is to the entry for this symbol in the global
14446 offset table. */
e717da7e 14447 asection *got;
d881513a 14448 bfd_vma *offp;
5bd4f169 14449 bfd_vma off;
d881513a 14450 unsigned long indx = 0;
927be08e 14451 struct got_entry *ent;
65f38f15 14452
d881513a
AM
14453 if (tls_type == (TLS_TLS | TLS_LD)
14454 && (h == NULL
f5385ebf 14455 || !h->elf.def_dynamic))
927be08e 14456 ent = ppc64_tlsld_got (input_bfd);
411e1bfb 14457 else
5bd4f169 14458 {
d881513a
AM
14459 if (h != NULL)
14460 {
f0158f44
AM
14461 if (!htab->elf.dynamic_sections_created
14462 || h->elf.dynindx == -1
14463 || SYMBOL_REFERENCES_LOCAL (info, &h->elf)
21d68fcd 14464 || UNDEFWEAK_NO_DYNAMIC_RELOC (info, &h->elf))
d881513a
AM
14465 /* This is actually a static link, or it is a
14466 -Bsymbolic link and the symbol is defined
14467 locally, or the symbol was forced to be local
14468 because of a version file. */
14469 ;
14470 else
14471 {
039b3fef 14472 indx = h->elf.dynindx;
d881513a
AM
14473 unresolved_reloc = FALSE;
14474 }
039b3fef 14475 ent = h->elf.got.glist;
d881513a 14476 }
411e1bfb 14477 else
5bd4f169 14478 {
d881513a
AM
14479 if (local_got_ents == NULL)
14480 abort ();
14481 ent = local_got_ents[r_symndx];
5bd4f169 14482 }
d881513a
AM
14483
14484 for (; ent != NULL; ent = ent->next)
31c76678 14485 if (ent->addend == orig_rel.r_addend
e717da7e 14486 && ent->owner == input_bfd
d881513a
AM
14487 && ent->tls_type == tls_type)
14488 break;
5bd4f169 14489 }
411e1bfb 14490
927be08e
AM
14491 if (ent == NULL)
14492 abort ();
14493 if (ent->is_indirect)
14494 ent = ent->got.ent;
14495 offp = &ent->got.offset;
14496 got = ppc64_elf_tdata (ent->owner)->got;
e717da7e
AM
14497 if (got == NULL)
14498 abort ();
14499
411e1bfb
AM
14500 /* The offset must always be a multiple of 8. We use the
14501 least significant bit to record whether we have already
14502 processed this entry. */
d881513a 14503 off = *offp;
411e1bfb
AM
14504 if ((off & 1) != 0)
14505 off &= ~1;
5bd4f169
AM
14506 else
14507 {
411e1bfb
AM
14508 /* Generate relocs for the dynamic linker, except in
14509 the case of TLSLD where we'll use one entry per
14510 module. */
25f23106
AM
14511 asection *relgot;
14512 bfd_boolean ifunc;
e717da7e 14513
d881513a 14514 *offp = off | 1;
25f23106
AM
14515 relgot = NULL;
14516 ifunc = (h != NULL
14517 ? h->elf.type == STT_GNU_IFUNC
14518 : ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC);
19e08130 14519 if (ifunc)
82e66161
AM
14520 {
14521 relgot = htab->elf.irelplt;
14522 if (indx == 0)
14523 htab->local_ifunc_resolver = 1;
14524 else if (is_static_defined (&h->elf))
14525 htab->maybe_local_ifunc_resolver = 1;
14526 }
f0158f44
AM
14527 else if (indx != 0
14528 || (bfd_link_pic (info)
14529 && (h == NULL
21d68fcd 14530 || !UNDEFWEAK_NO_DYNAMIC_RELOC (info, &h->elf)
f0158f44
AM
14531 || (tls_type == (TLS_TLS | TLS_LD)
14532 && !h->elf.def_dynamic))))
19e08130 14533 relgot = ppc64_elf_tdata (ent->owner)->relgot;
25f23106 14534 if (relgot != NULL)
5bd4f169 14535 {
e717da7e
AM
14536 outrel.r_offset = (got->output_section->vma
14537 + got->output_offset
411e1bfb 14538 + off);
4cc603a5 14539 outrel.r_addend = addend;
d881513a 14540 if (tls_type & (TLS_LD | TLS_GD))
5bd4f169 14541 {
411e1bfb 14542 outrel.r_addend = 0;
e515b051 14543 outrel.r_info = ELF64_R_INFO (indx, R_PPC64_DTPMOD64);
d881513a
AM
14544 if (tls_type == (TLS_TLS | TLS_GD))
14545 {
e717da7e
AM
14546 loc = relgot->contents;
14547 loc += (relgot->reloc_count++
d881513a
AM
14548 * sizeof (Elf64_External_Rela));
14549 bfd_elf64_swap_reloca_out (output_bfd,
14550 &outrel, loc);
e515b051 14551 outrel.r_offset += 8;
4cc603a5 14552 outrel.r_addend = addend;
d881513a
AM
14553 outrel.r_info
14554 = ELF64_R_INFO (indx, R_PPC64_DTPREL64);
d881513a 14555 }
411e1bfb 14556 }
951fd09b 14557 else if (tls_type == (TLS_TLS | TLS_DTPREL))
411e1bfb 14558 outrel.r_info = ELF64_R_INFO (indx, R_PPC64_DTPREL64);
951fd09b 14559 else if (tls_type == (TLS_TLS | TLS_TPREL))
411e1bfb 14560 outrel.r_info = ELF64_R_INFO (indx, R_PPC64_TPREL64);
25f23106
AM
14561 else if (indx != 0)
14562 outrel.r_info = ELF64_R_INFO (indx, R_PPC64_GLOB_DAT);
14563 else
81407a69 14564 {
25f23106
AM
14565 if (ifunc)
14566 outrel.r_info = ELF64_R_INFO (0, R_PPC64_IRELATIVE);
14567 else
14568 outrel.r_info = ELF64_R_INFO (0, R_PPC64_RELATIVE);
81407a69
AM
14569
14570 /* Write the .got section contents for the sake
14571 of prelink. */
e717da7e 14572 loc = got->contents + off;
23fbd6fa
JJ
14573 bfd_put_64 (output_bfd, outrel.r_addend + relocation,
14574 loc);
81407a69 14575 }
81407a69
AM
14576
14577 if (indx == 0 && tls_type != (TLS_TLS | TLS_LD))
e515b051
AM
14578 {
14579 outrel.r_addend += relocation;
14580 if (tls_type & (TLS_GD | TLS_DTPREL | TLS_TPREL))
989f9879
AM
14581 {
14582 if (htab->elf.tls_sec == NULL)
14583 outrel.r_addend = 0;
14584 else
14585 outrel.r_addend -= htab->elf.tls_sec->vma;
14586 }
e515b051 14587 }
e717da7e
AM
14588 loc = relgot->contents;
14589 loc += (relgot->reloc_count++
411e1bfb
AM
14590 * sizeof (Elf64_External_Rela));
14591 bfd_elf64_swap_reloca_out (output_bfd, &outrel, loc);
14592 }
14593
ad8e1ba5 14594 /* Init the .got section contents here if we're not
81407a69 14595 emitting a reloc. */
d881513a 14596 else
411e1bfb 14597 {
f0158f44
AM
14598 int tlsopt
14599 = (htab->params->tls_get_addr_opt
14600 && htab->tls_get_addr_fd != NULL
14601 && htab->tls_get_addr_fd->elf.plt.plist != NULL);
14602
4cc603a5 14603 relocation += addend;
f0158f44 14604 if (tls_type != 0)
411e1bfb 14605 {
989f9879
AM
14606 if (htab->elf.tls_sec == NULL)
14607 relocation = 0;
14608 else
14609 {
f0158f44
AM
14610 if (tls_type & TLS_LD)
14611 relocation = 0;
14612 else
14613 relocation -= htab->elf.tls_sec->vma + DTP_OFFSET;
14614 if ((tls_type & TLS_TPREL)
14615 || (tlsopt && !(tls_type & TLS_DTPREL)))
989f9879
AM
14616 relocation += DTP_OFFSET - TP_OFFSET;
14617 }
5bd4f169 14618
f0158f44 14619 if (tls_type & (TLS_GD | TLS_LD))
7b609f53
AM
14620 {
14621 bfd_put_64 (output_bfd, relocation,
e717da7e 14622 got->contents + off + 8);
f0158f44 14623 relocation = !tlsopt;
7b609f53 14624 }
411e1bfb
AM
14625 }
14626 bfd_put_64 (output_bfd, relocation,
e717da7e 14627 got->contents + off);
5bd4f169
AM
14628 }
14629 }
14630
65f38f15
AM
14631 if (off >= (bfd_vma) -2)
14632 abort ();
14633
bf102f86 14634 relocation = got->output_section->vma + got->output_offset + off;
6f20ed8a 14635 addend = -(TOCstart + htab->sec_info[input_section->id].toc_off);
5bd4f169 14636 }
65f38f15
AM
14637 break;
14638
14639 case R_PPC64_PLT16_HA:
14640 case R_PPC64_PLT16_HI:
14641 case R_PPC64_PLT16_LO:
14642 case R_PPC64_PLT32:
14643 case R_PPC64_PLT64:
14644 /* Relocation is to the entry for this symbol in the
14645 procedure linkage table. */
cbf95972
AM
14646 {
14647 struct plt_entry **plt_list = NULL;
14648 if (h != NULL)
14649 plt_list = &h->elf.plt.plist;
14650 else if (local_got_ents != NULL)
14651 {
14652 struct plt_entry **local_plt = (struct plt_entry **)
14653 (local_got_ents + symtab_hdr->sh_info);
14654 unsigned char *local_got_tls_masks = (unsigned char *)
14655 (local_plt + symtab_hdr->sh_info);
14656 if ((local_got_tls_masks[r_symndx] & PLT_IFUNC) != 0)
14657 plt_list = local_plt + r_symndx;
14658 }
14659 if (plt_list)
14660 {
14661 struct plt_entry *ent;
65f38f15 14662
cbf95972
AM
14663 for (ent = *plt_list; ent != NULL; ent = ent->next)
14664 if (ent->plt.offset != (bfd_vma) -1
14665 && ent->addend == orig_rel.r_addend)
14666 {
14667 asection *plt;
14668
14669 plt = htab->elf.splt;
14670 if (!htab->elf.dynamic_sections_created
14671 || h == NULL
14672 || h->elf.dynindx == -1)
14673 plt = htab->elf.iplt;
14674 relocation = (plt->output_section->vma
14675 + plt->output_offset
14676 + ent->plt.offset);
14677 addend = 0;
14678 unresolved_reloc = FALSE;
14679 break;
14680 }
14681 }
14682 }
65f38f15 14683 break;
5bd4f169 14684
0b13192e
AM
14685 case R_PPC64_TOC:
14686 /* Relocation value is TOC base. */
14687 relocation = TOCstart;
cf35638d 14688 if (r_symndx == STN_UNDEF)
6f20ed8a 14689 relocation += htab->sec_info[input_section->id].toc_off;
8517fae7
AM
14690 else if (unresolved_reloc)
14691 ;
6f20ed8a
AM
14692 else if (sec != NULL && sec->id < htab->sec_info_arr_size)
14693 relocation += htab->sec_info[sec->id].toc_off;
0b13192e
AM
14694 else
14695 unresolved_reloc = TRUE;
ab96bf03 14696 goto dodyn;
0b13192e 14697
5bd4f169
AM
14698 /* TOC16 relocs. We want the offset relative to the TOC base,
14699 which is the address of the start of the TOC plus 0x8000.
14700 The TOC consists of sections .got, .toc, .tocbss, and .plt,
14701 in this order. */
65f38f15
AM
14702 case R_PPC64_TOC16:
14703 case R_PPC64_TOC16_LO:
14704 case R_PPC64_TOC16_HI:
14705 case R_PPC64_TOC16_DS:
14706 case R_PPC64_TOC16_LO_DS:
14707 case R_PPC64_TOC16_HA:
6f20ed8a 14708 addend -= TOCstart + htab->sec_info[input_section->id].toc_off;
5bd4f169
AM
14709 break;
14710
14711 /* Relocate against the beginning of the section. */
65f38f15
AM
14712 case R_PPC64_SECTOFF:
14713 case R_PPC64_SECTOFF_LO:
14714 case R_PPC64_SECTOFF_HI:
14715 case R_PPC64_SECTOFF_DS:
14716 case R_PPC64_SECTOFF_LO_DS:
14717 case R_PPC64_SECTOFF_HA:
4ce794b7 14718 if (sec != NULL)
65f38f15 14719 addend -= sec->output_section->vma;
5bd4f169
AM
14720 break;
14721
25f23106
AM
14722 case R_PPC64_REL16:
14723 case R_PPC64_REL16_LO:
14724 case R_PPC64_REL16_HI:
14725 case R_PPC64_REL16_HA:
a680de9a 14726 case R_PPC64_REL16DX_HA:
25f23106
AM
14727 break;
14728
721956f4
AM
14729 case R_PPC64_REL14:
14730 case R_PPC64_REL14_BRNTAKEN:
14731 case R_PPC64_REL14_BRTAKEN:
5d1634d7
AM
14732 case R_PPC64_REL24:
14733 break;
14734
411e1bfb
AM
14735 case R_PPC64_TPREL16:
14736 case R_PPC64_TPREL16_LO:
14737 case R_PPC64_TPREL16_HI:
14738 case R_PPC64_TPREL16_HA:
14739 case R_PPC64_TPREL16_DS:
14740 case R_PPC64_TPREL16_LO_DS:
f9c6b907
AM
14741 case R_PPC64_TPREL16_HIGH:
14742 case R_PPC64_TPREL16_HIGHA:
411e1bfb
AM
14743 case R_PPC64_TPREL16_HIGHER:
14744 case R_PPC64_TPREL16_HIGHERA:
14745 case R_PPC64_TPREL16_HIGHEST:
14746 case R_PPC64_TPREL16_HIGHESTA:
766bc656
AM
14747 if (h != NULL
14748 && h->elf.root.type == bfd_link_hash_undefweak
14749 && h->elf.dynindx == -1)
14750 {
14751 /* Make this relocation against an undefined weak symbol
14752 resolve to zero. This is really just a tweak, since
14753 code using weak externs ought to check that they are
14754 defined before using them. */
14755 bfd_byte *p = contents + rel->r_offset - d_offset;
14756
95f0d0d2 14757 insn = bfd_get_32 (input_bfd, p);
766bc656
AM
14758 insn = _bfd_elf_ppc_at_tprel_transform (insn, 13);
14759 if (insn != 0)
95f0d0d2 14760 bfd_put_32 (input_bfd, insn, p);
766bc656
AM
14761 break;
14762 }
989f9879
AM
14763 if (htab->elf.tls_sec != NULL)
14764 addend -= htab->elf.tls_sec->vma + TP_OFFSET;
0e1862bb 14765 if (bfd_link_pic (info))
411e1bfb
AM
14766 /* The TPREL16 relocs shouldn't really be used in shared
14767 libs as they will result in DT_TEXTREL being set, but
14768 support them anyway. */
14769 goto dodyn;
14770 break;
14771
14772 case R_PPC64_DTPREL16:
14773 case R_PPC64_DTPREL16_LO:
14774 case R_PPC64_DTPREL16_HI:
14775 case R_PPC64_DTPREL16_HA:
14776 case R_PPC64_DTPREL16_DS:
14777 case R_PPC64_DTPREL16_LO_DS:
f9c6b907
AM
14778 case R_PPC64_DTPREL16_HIGH:
14779 case R_PPC64_DTPREL16_HIGHA:
411e1bfb
AM
14780 case R_PPC64_DTPREL16_HIGHER:
14781 case R_PPC64_DTPREL16_HIGHERA:
14782 case R_PPC64_DTPREL16_HIGHEST:
14783 case R_PPC64_DTPREL16_HIGHESTA:
989f9879
AM
14784 if (htab->elf.tls_sec != NULL)
14785 addend -= htab->elf.tls_sec->vma + DTP_OFFSET;
411e1bfb
AM
14786 break;
14787
45965137
AM
14788 case R_PPC64_ADDR64_LOCAL:
14789 addend += PPC64_LOCAL_ENTRY_OFFSET (h != NULL
14790 ? h->elf.other
14791 : sym->st_other);
14792 break;
14793
e515b051
AM
14794 case R_PPC64_DTPMOD64:
14795 relocation = 1;
14796 addend = 0;
14797 goto dodyn;
14798
411e1bfb 14799 case R_PPC64_TPREL64:
989f9879
AM
14800 if (htab->elf.tls_sec != NULL)
14801 addend -= htab->elf.tls_sec->vma + TP_OFFSET;
411e1bfb
AM
14802 goto dodyn;
14803
14804 case R_PPC64_DTPREL64:
989f9879
AM
14805 if (htab->elf.tls_sec != NULL)
14806 addend -= htab->elf.tls_sec->vma + DTP_OFFSET;
1a0670f3 14807 /* Fall through. */
411e1bfb 14808
65f38f15
AM
14809 /* Relocations that may need to be propagated if this is a
14810 dynamic object. */
04c9666a 14811 case R_PPC64_REL30:
65f38f15
AM
14812 case R_PPC64_REL32:
14813 case R_PPC64_REL64:
14814 case R_PPC64_ADDR14:
14815 case R_PPC64_ADDR14_BRNTAKEN:
14816 case R_PPC64_ADDR14_BRTAKEN:
14817 case R_PPC64_ADDR16:
14818 case R_PPC64_ADDR16_DS:
14819 case R_PPC64_ADDR16_HA:
14820 case R_PPC64_ADDR16_HI:
f9c6b907
AM
14821 case R_PPC64_ADDR16_HIGH:
14822 case R_PPC64_ADDR16_HIGHA:
65f38f15
AM
14823 case R_PPC64_ADDR16_HIGHER:
14824 case R_PPC64_ADDR16_HIGHERA:
14825 case R_PPC64_ADDR16_HIGHEST:
14826 case R_PPC64_ADDR16_HIGHESTA:
14827 case R_PPC64_ADDR16_LO:
14828 case R_PPC64_ADDR16_LO_DS:
14829 case R_PPC64_ADDR24:
65f38f15
AM
14830 case R_PPC64_ADDR32:
14831 case R_PPC64_ADDR64:
14832 case R_PPC64_UADDR16:
14833 case R_PPC64_UADDR32:
14834 case R_PPC64_UADDR64:
411e1bfb 14835 dodyn:
5d1634d7 14836 if ((input_section->flags & SEC_ALLOC) == 0)
ec338859
AM
14837 break;
14838
41bd81ab
AM
14839 if (NO_OPD_RELOCS && is_opd)
14840 break;
14841
8a9e8e72 14842 if (bfd_link_pic (info)
b1b07054
AM
14843 ? ((h == NULL
14844 || h->dyn_relocs != NULL)
14845 && ((h != NULL && pc_dynrelocs (h))
14846 || must_be_dyn_reloc (info, r_type)))
8a9e8e72
AM
14847 : (h != NULL
14848 ? h->dyn_relocs != NULL
d311bc8b 14849 : ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC))
65f38f15 14850 {
b34976b6 14851 bfd_boolean skip, relocate;
65f38f15 14852 asection *sreloc;
1cf1f670 14853 bfd_vma out_off;
82e66161 14854 long indx = 0;
65f38f15
AM
14855
14856 /* When generating a dynamic object, these relocations
14857 are copied into the output file to be resolved at run
14858 time. */
14859
b34976b6
AM
14860 skip = FALSE;
14861 relocate = FALSE;
65f38f15 14862
1cf1f670
AM
14863 out_off = _bfd_elf_section_offset (output_bfd, info,
14864 input_section, rel->r_offset);
14865 if (out_off == (bfd_vma) -1)
b34976b6 14866 skip = TRUE;
1cf1f670 14867 else if (out_off == (bfd_vma) -2)
b34976b6 14868 skip = TRUE, relocate = TRUE;
1cf1f670
AM
14869 out_off += (input_section->output_section->vma
14870 + input_section->output_offset);
14871 outrel.r_offset = out_off;
411e1bfb 14872 outrel.r_addend = rel->r_addend;
65f38f15 14873
1cf1f670
AM
14874 /* Optimize unaligned reloc use. */
14875 if ((r_type == R_PPC64_ADDR64 && (out_off & 7) != 0)
14876 || (r_type == R_PPC64_UADDR64 && (out_off & 7) == 0))
14877 r_type ^= R_PPC64_ADDR64 ^ R_PPC64_UADDR64;
14878 else if ((r_type == R_PPC64_ADDR32 && (out_off & 3) != 0)
14879 || (r_type == R_PPC64_UADDR32 && (out_off & 3) == 0))
14880 r_type ^= R_PPC64_ADDR32 ^ R_PPC64_UADDR32;
14881 else if ((r_type == R_PPC64_ADDR16 && (out_off & 1) != 0)
14882 || (r_type == R_PPC64_UADDR16 && (out_off & 1) == 0))
14883 r_type ^= R_PPC64_ADDR16 ^ R_PPC64_UADDR16;
14884
65f38f15 14885 if (skip)
0bb2d96a 14886 memset (&outrel, 0, sizeof outrel);
afe397ea 14887 else if (!SYMBOL_REFERENCES_LOCAL (info, &h->elf)
0b13192e
AM
14888 && !is_opd
14889 && r_type != R_PPC64_TOC)
14acf4dc 14890 {
82e66161
AM
14891 indx = h->elf.dynindx;
14892 BFD_ASSERT (indx != -1);
14893 outrel.r_info = ELF64_R_INFO (indx, r_type);
14acf4dc 14894 }
65f38f15
AM
14895 else
14896 {
41bd81ab
AM
14897 /* This symbol is local, or marked to become local,
14898 or this is an opd section reloc which must point
14899 at a local function. */
65f38f15 14900 outrel.r_addend += relocation;
e86ce104 14901 if (r_type == R_PPC64_ADDR64 || r_type == R_PPC64_TOC)
65f38f15 14902 {
3fad3c7c 14903 if (is_opd && h != NULL)
afbe61cf
AM
14904 {
14905 /* Lie about opd entries. This case occurs
14906 when building shared libraries and we
14907 reference a function in another shared
3fad3c7c
AM
14908 lib. The same thing happens for a weak
14909 definition in an application that's
14910 overridden by a strong definition in a
14911 shared lib. (I believe this is a generic
14912 bug in binutils handling of weak syms.)
14913 In these cases we won't use the opd
1e2f5b6e 14914 entry in this lib. */
b34976b6 14915 unresolved_reloc = FALSE;
afbe61cf 14916 }
25f23106
AM
14917 if (!is_opd
14918 && r_type == R_PPC64_ADDR64
14919 && (h != NULL
14920 ? h->elf.type == STT_GNU_IFUNC
14921 : ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC))
14922 outrel.r_info = ELF64_R_INFO (0, R_PPC64_IRELATIVE);
14923 else
14924 {
14925 outrel.r_info = ELF64_R_INFO (0, R_PPC64_RELATIVE);
81407a69 14926
25f23106
AM
14927 /* We need to relocate .opd contents for ld.so.
14928 Prelink also wants simple and consistent rules
14929 for relocs. This make all RELATIVE relocs have
14930 *r_offset equal to r_addend. */
14931 relocate = TRUE;
14932 }
65f38f15
AM
14933 }
14934 else
14935 {
25f23106
AM
14936 if (h != NULL
14937 ? h->elf.type == STT_GNU_IFUNC
14938 : ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC)
14939 {
25f53a85 14940 info->callbacks->einfo
695344c0 14941 /* xgettext:c-format */
174d0a74 14942 (_("%H: %s for indirect "
bc30df16 14943 "function `%T' unsupported\n"),
25f53a85 14944 input_bfd, input_section, rel->r_offset,
25f23106
AM
14945 ppc64_elf_howto_table[r_type]->name,
14946 sym_name);
14947 ret = FALSE;
14948 }
cf35638d 14949 else if (r_symndx == STN_UNDEF || bfd_is_abs_section (sec))
65f38f15
AM
14950 ;
14951 else if (sec == NULL || sec->owner == NULL)
14952 {
14953 bfd_set_error (bfd_error_bad_value);
b34976b6 14954 return FALSE;
65f38f15
AM
14955 }
14956 else
14957 {
14958 asection *osec;
14959
14960 osec = sec->output_section;
14961 indx = elf_section_data (osec)->dynindx;
14962
74541ad4
AM
14963 if (indx == 0)
14964 {
14965 if ((osec->flags & SEC_READONLY) == 0
14966 && htab->elf.data_index_section != NULL)
14967 osec = htab->elf.data_index_section;
14968 else
14969 osec = htab->elf.text_index_section;
14970 indx = elf_section_data (osec)->dynindx;
14971 }
14972 BFD_ASSERT (indx != 0);
14973
65f38f15
AM
14974 /* We are turning this relocation into one
14975 against a section symbol, so subtract out
14976 the output section's address but not the
14977 offset of the input section in the output
14978 section. */
14979 outrel.r_addend -= osec->vma;
14980 }
14981
14982 outrel.r_info = ELF64_R_INFO (indx, r_type);
14983 }
14984 }
14985
14986 sreloc = elf_section_data (input_section)->sreloc;
19e08130
AM
14987 if (h != NULL
14988 ? h->elf.type == STT_GNU_IFUNC
14989 : ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC)
82e66161
AM
14990 {
14991 sreloc = htab->elf.irelplt;
14992 if (indx == 0)
14993 htab->local_ifunc_resolver = 1;
14994 else if (is_static_defined (&h->elf))
14995 htab->maybe_local_ifunc_resolver = 1;
14996 }
65f38f15
AM
14997 if (sreloc == NULL)
14998 abort ();
14999
dfbb6ac9
AM
15000 if (sreloc->reloc_count * sizeof (Elf64_External_Rela)
15001 >= sreloc->size)
15002 abort ();
947216bf
AM
15003 loc = sreloc->contents;
15004 loc += sreloc->reloc_count++ * sizeof (Elf64_External_Rela);
65f38f15
AM
15005 bfd_elf64_swap_reloca_out (output_bfd, &outrel, loc);
15006
15007 /* If this reloc is against an external symbol, it will
15008 be computed at runtime, so there's no need to do
81407a69
AM
15009 anything now. However, for the sake of prelink ensure
15010 that the section contents are a known value. */
65f38f15 15011 if (! relocate)
81407a69
AM
15012 {
15013 unresolved_reloc = FALSE;
15014 /* The value chosen here is quite arbitrary as ld.so
15015 ignores section contents except for the special
15016 case of .opd where the contents might be accessed
15017 before relocation. Choose zero, as that won't
15018 cause reloc overflow. */
15019 relocation = 0;
15020 addend = 0;
15021 /* Use *r_offset == r_addend for R_PPC64_ADDR64 relocs
15022 to improve backward compatibility with older
15023 versions of ld. */
15024 if (r_type == R_PPC64_ADDR64)
15025 addend = outrel.r_addend;
15026 /* Adjust pc_relative relocs to have zero in *r_offset. */
4ce794b7 15027 else if (ppc64_elf_howto_table[r_type]->pc_relative)
f0158f44 15028 addend = outrel.r_offset;
81407a69 15029 }
65f38f15 15030 }
f0158f44
AM
15031 else if (r_type == R_PPC64_DTPMOD64
15032 && htab->params->tls_get_addr_opt
15033 && htab->tls_get_addr_fd != NULL
15034 && htab->tls_get_addr_fd->elf.plt.plist != NULL)
15035 {
15036 /* Set up for __tls_get_addr_opt stub, when this entry
15037 does not have dynamic relocs. */
15038 relocation = 0;
15039 /* Set up the next word for local dynamic. If it turns
15040 out to be global dynamic, the reloc will overwrite
15041 this value. */
15042 if (rel->r_offset + 16 <= input_section->size)
15043 bfd_put_64 (input_bfd, DTP_OFFSET - TP_OFFSET,
15044 contents + rel->r_offset + 8);
15045 }
15046 else if (r_type == R_PPC64_DTPREL64
15047 && htab->params->tls_get_addr_opt
15048 && htab->tls_get_addr_fd != NULL
15049 && htab->tls_get_addr_fd->elf.plt.plist != NULL
15050 && rel > relocs
15051 && rel[-1].r_info == ELF64_R_INFO (r_symndx, R_PPC64_DTPMOD64)
15052 && rel[-1].r_offset + 8 == rel->r_offset)
15053 {
15054 /* __tls_get_addr_opt stub value. */
15055 addend += DTP_OFFSET - TP_OFFSET;
15056 }
5bd4f169
AM
15057 break;
15058
65f38f15
AM
15059 case R_PPC64_COPY:
15060 case R_PPC64_GLOB_DAT:
15061 case R_PPC64_JMP_SLOT:
25f23106 15062 case R_PPC64_JMP_IREL:
65f38f15
AM
15063 case R_PPC64_RELATIVE:
15064 /* We shouldn't ever see these dynamic relocs in relocatable
15065 files. */
ae9a127f 15066 /* Fall through. */
65f38f15
AM
15067
15068 case R_PPC64_PLTGOT16:
15069 case R_PPC64_PLTGOT16_DS:
15070 case R_PPC64_PLTGOT16_HA:
15071 case R_PPC64_PLTGOT16_HI:
15072 case R_PPC64_PLTGOT16_LO:
15073 case R_PPC64_PLTGOT16_LO_DS:
15074 case R_PPC64_PLTREL32:
15075 case R_PPC64_PLTREL64:
15076 /* These ones haven't been implemented yet. */
15077
25f53a85 15078 info->callbacks->einfo
695344c0 15079 /* xgettext:c-format */
bc30df16 15080 (_("%P: %B: %s is not supported for `%T'\n"),
d003868e 15081 input_bfd,
4ce794b7 15082 ppc64_elf_howto_table[r_type]->name, sym_name);
5bd4f169
AM
15083
15084 bfd_set_error (bfd_error_invalid_operation);
b34976b6 15085 ret = FALSE;
c316a17c 15086 goto copy_reloc;
65f38f15 15087 }
5bd4f169 15088
67f0cbdb
AM
15089 /* Multi-instruction sequences that access the TOC can be
15090 optimized, eg. addis ra,r2,0; addi rb,ra,x;
15091 to nop; addi rb,r2,x; */
15092 switch (r_type)
15093 {
15094 default:
15095 break;
15096
15097 case R_PPC64_GOT_TLSLD16_HI:
15098 case R_PPC64_GOT_TLSGD16_HI:
15099 case R_PPC64_GOT_TPREL16_HI:
15100 case R_PPC64_GOT_DTPREL16_HI:
15101 case R_PPC64_GOT16_HI:
15102 case R_PPC64_TOC16_HI:
15103 /* These relocs would only be useful if building up an
15104 offset to later add to r2, perhaps in an indexed
15105 addressing mode instruction. Don't try to optimize.
15106 Unfortunately, the possibility of someone building up an
15107 offset like this or even with the HA relocs, means that
15108 we need to check the high insn when optimizing the low
15109 insn. */
15110 break;
15111
15112 case R_PPC64_GOT_TLSLD16_HA:
15113 case R_PPC64_GOT_TLSGD16_HA:
15114 case R_PPC64_GOT_TPREL16_HA:
15115 case R_PPC64_GOT_DTPREL16_HA:
15116 case R_PPC64_GOT16_HA:
15117 case R_PPC64_TOC16_HA:
98528052 15118 if (htab->do_toc_opt && relocation + addend + 0x8000 < 0x10000
560c8763 15119 && !ppc64_elf_tdata (input_bfd)->unexpected_toc_insn)
98528052
AM
15120 {
15121 bfd_byte *p = contents + (rel->r_offset & ~3);
15122 bfd_put_32 (input_bfd, NOP, p);
15123 }
67f0cbdb
AM
15124 break;
15125
15126 case R_PPC64_GOT_TLSLD16_LO:
15127 case R_PPC64_GOT_TLSGD16_LO:
15128 case R_PPC64_GOT_TPREL16_LO_DS:
15129 case R_PPC64_GOT_DTPREL16_LO_DS:
15130 case R_PPC64_GOT16_LO:
15131 case R_PPC64_GOT16_LO_DS:
15132 case R_PPC64_TOC16_LO:
15133 case R_PPC64_TOC16_LO_DS:
98528052 15134 if (htab->do_toc_opt && relocation + addend + 0x8000 < 0x10000
560c8763 15135 && !ppc64_elf_tdata (input_bfd)->unexpected_toc_insn)
67f0cbdb
AM
15136 {
15137 bfd_byte *p = contents + (rel->r_offset & ~3);
15138 insn = bfd_get_32 (input_bfd, p);
560c8763
AM
15139 if ((insn & (0x3f << 26)) == 12u << 26 /* addic */)
15140 {
15141 /* Transform addic to addi when we change reg. */
15142 insn &= ~((0x3f << 26) | (0x1f << 16));
15143 insn |= (14u << 26) | (2 << 16);
15144 }
15145 else
67f0cbdb 15146 {
98528052
AM
15147 insn &= ~(0x1f << 16);
15148 insn |= 2 << 16;
67f0cbdb 15149 }
560c8763 15150 bfd_put_32 (input_bfd, insn, p);
67f0cbdb
AM
15151 }
15152 break;
15153 }
15154
65f38f15 15155 /* Do any further special processing. */
b80eed39 15156 howto = ppc64_elf_howto_table[(int) r_type];
65f38f15
AM
15157 switch (r_type)
15158 {
15159 default:
15160 break;
15161
25f23106 15162 case R_PPC64_REL16_HA:
a680de9a 15163 case R_PPC64_REL16DX_HA:
f9c6b907
AM
15164 case R_PPC64_ADDR16_HA:
15165 case R_PPC64_ADDR16_HIGHA:
65f38f15
AM
15166 case R_PPC64_ADDR16_HIGHERA:
15167 case R_PPC64_ADDR16_HIGHESTA:
65f38f15
AM
15168 case R_PPC64_TOC16_HA:
15169 case R_PPC64_SECTOFF_HA:
411e1bfb 15170 case R_PPC64_TPREL16_HA:
f9c6b907 15171 case R_PPC64_TPREL16_HIGHA:
411e1bfb 15172 case R_PPC64_TPREL16_HIGHERA:
411e1bfb 15173 case R_PPC64_TPREL16_HIGHESTA:
f9c6b907
AM
15174 case R_PPC64_DTPREL16_HA:
15175 case R_PPC64_DTPREL16_HIGHA:
411e1bfb 15176 case R_PPC64_DTPREL16_HIGHERA:
411e1bfb 15177 case R_PPC64_DTPREL16_HIGHESTA:
65f38f15
AM
15178 /* It's just possible that this symbol is a weak symbol
15179 that's not actually defined anywhere. In that case,
15180 'sec' would be NULL, and we should leave the symbol
15181 alone (it will be set to zero elsewhere in the link). */
5c5f6e17
AM
15182 if (sec == NULL)
15183 break;
1a0670f3 15184 /* Fall through. */
5c5f6e17
AM
15185
15186 case R_PPC64_GOT16_HA:
15187 case R_PPC64_PLTGOT16_HA:
15188 case R_PPC64_PLT16_HA:
15189 case R_PPC64_GOT_TLSGD16_HA:
15190 case R_PPC64_GOT_TLSLD16_HA:
15191 case R_PPC64_GOT_TPREL16_HA:
15192 case R_PPC64_GOT_DTPREL16_HA:
15193 /* Add 0x10000 if sign bit in 0:15 is set.
15194 Bits 0:15 are not used. */
15195 addend += 0x8000;
65f38f15
AM
15196 break;
15197
15198 case R_PPC64_ADDR16_DS:
15199 case R_PPC64_ADDR16_LO_DS:
15200 case R_PPC64_GOT16_DS:
15201 case R_PPC64_GOT16_LO_DS:
15202 case R_PPC64_PLT16_LO_DS:
15203 case R_PPC64_SECTOFF_DS:
15204 case R_PPC64_SECTOFF_LO_DS:
15205 case R_PPC64_TOC16_DS:
15206 case R_PPC64_TOC16_LO_DS:
15207 case R_PPC64_PLTGOT16_DS:
15208 case R_PPC64_PLTGOT16_LO_DS:
411e1bfb
AM
15209 case R_PPC64_GOT_TPREL16_DS:
15210 case R_PPC64_GOT_TPREL16_LO_DS:
15211 case R_PPC64_GOT_DTPREL16_DS:
15212 case R_PPC64_GOT_DTPREL16_LO_DS:
15213 case R_PPC64_TPREL16_DS:
15214 case R_PPC64_TPREL16_LO_DS:
15215 case R_PPC64_DTPREL16_DS:
15216 case R_PPC64_DTPREL16_LO_DS:
adadcc0c
AM
15217 insn = bfd_get_32 (input_bfd, contents + (rel->r_offset & ~3));
15218 mask = 3;
a680de9a
PB
15219 /* If this reloc is against an lq, lxv, or stxv insn, then
15220 the value must be a multiple of 16. This is somewhat of
15221 a hack, but the "correct" way to do this by defining _DQ
15222 forms of all the _DS relocs bloats all reloc switches in
15223 this file. It doesn't make much sense to use these
15224 relocs in data, so testing the insn should be safe. */
15225 if ((insn & (0x3f << 26)) == (56u << 26)
15226 || ((insn & (0x3f << 26)) == (61u << 26) && (insn & 3) == 1))
adadcc0c 15227 mask = 15;
a680de9a
PB
15228 relocation += addend;
15229 addend = insn & (mask ^ 3);
15230 if ((relocation & mask) != 0)
65f38f15 15231 {
a680de9a 15232 relocation ^= relocation & mask;
25f53a85 15233 info->callbacks->einfo
695344c0 15234 /* xgettext:c-format */
174d0a74 15235 (_("%H: error: %s not a multiple of %u\n"),
25f53a85 15236 input_bfd, input_section, rel->r_offset,
b80eed39 15237 howto->name,
adadcc0c 15238 mask + 1);
65f38f15 15239 bfd_set_error (bfd_error_bad_value);
b34976b6 15240 ret = FALSE;
c316a17c 15241 goto copy_reloc;
65f38f15
AM
15242 }
15243 break;
5bd4f169
AM
15244 }
15245
239e1f3a
AM
15246 /* Dynamic relocs are not propagated for SEC_DEBUGGING sections
15247 because such sections are not SEC_ALLOC and thus ld.so will
15248 not process them. */
65f38f15 15249 if (unresolved_reloc
239e1f3a 15250 && !((input_section->flags & SEC_DEBUGGING) != 0
1d5316ab
AM
15251 && h->elf.def_dynamic)
15252 && _bfd_elf_section_offset (output_bfd, info, input_section,
15253 rel->r_offset) != (bfd_vma) -1)
9c07fe7c 15254 {
25f53a85 15255 info->callbacks->einfo
695344c0 15256 /* xgettext:c-format */
174d0a74 15257 (_("%H: unresolvable %s against `%T'\n"),
25f53a85 15258 input_bfd, input_section, rel->r_offset,
b80eed39 15259 howto->name,
039b3fef 15260 h->elf.root.root.string);
b34976b6 15261 ret = FALSE;
9c07fe7c 15262 }
5bd4f169 15263
b80eed39
AM
15264 /* 16-bit fields in insns mostly have signed values, but a
15265 few insns have 16-bit unsigned values. Really, we should
15266 have different reloc types. */
15267 if (howto->complain_on_overflow != complain_overflow_dont
15268 && howto->dst_mask == 0xffff
15269 && (input_section->flags & SEC_CODE) != 0)
15270 {
15271 enum complain_overflow complain = complain_overflow_signed;
15272
15273 insn = bfd_get_32 (input_bfd, contents + (rel->r_offset & ~3));
a47622ac
AM
15274 if ((insn & (0x3f << 26)) == 10u << 26 /* cmpli */)
15275 complain = complain_overflow_bitfield;
15276 else if (howto->rightshift == 0
15277 ? ((insn & (0x3f << 26)) == 28u << 26 /* andi */
15278 || (insn & (0x3f << 26)) == 24u << 26 /* ori */
15279 || (insn & (0x3f << 26)) == 26u << 26 /* xori */)
15280 : ((insn & (0x3f << 26)) == 29u << 26 /* andis */
15281 || (insn & (0x3f << 26)) == 25u << 26 /* oris */
15282 || (insn & (0x3f << 26)) == 27u << 26 /* xoris */))
b80eed39
AM
15283 complain = complain_overflow_unsigned;
15284 if (howto->complain_on_overflow != complain)
15285 {
15286 alt_howto = *howto;
15287 alt_howto.complain_on_overflow = complain;
15288 howto = &alt_howto;
15289 }
15290 }
15291
a680de9a
PB
15292 if (r_type == R_PPC64_REL16DX_HA)
15293 {
15294 /* Split field reloc isn't handled by _bfd_final_link_relocate. */
15295 if (rel->r_offset + 4 > input_section->size)
15296 r = bfd_reloc_outofrange;
15297 else
15298 {
15299 relocation += addend;
15300 relocation -= (rel->r_offset
15301 + input_section->output_offset
15302 + input_section->output_section->vma);
3de43e7b 15303 relocation = (bfd_signed_vma) relocation >> 16;
a680de9a
PB
15304 insn = bfd_get_32 (input_bfd, contents + rel->r_offset);
15305 insn &= ~0x1fffc1;
3de43e7b 15306 insn |= (relocation & 0xffc1) | ((relocation & 0x3e) << 15);
a680de9a
PB
15307 bfd_put_32 (input_bfd, insn, contents + rel->r_offset);
15308 r = bfd_reloc_ok;
3de43e7b 15309 if (relocation + 0x8000 > 0xffff)
a680de9a
PB
15310 r = bfd_reloc_overflow;
15311 }
15312 }
15313 else
15314 r = _bfd_final_link_relocate (howto, input_bfd, input_section, contents,
15315 rel->r_offset, relocation, addend);
5bd4f169 15316
ef60b7ff 15317 if (r != bfd_reloc_ok)
5bd4f169 15318 {
bc30df16 15319 char *more_info = NULL;
b80eed39 15320 const char *reloc_name = howto->name;
bc30df16
AM
15321
15322 if (reloc_dest != DEST_NORMAL)
15323 {
15324 more_info = bfd_malloc (strlen (reloc_name) + 8);
15325 if (more_info != NULL)
15326 {
15327 strcpy (more_info, reloc_name);
15328 strcat (more_info, (reloc_dest == DEST_OPD
15329 ? " (OPD)" : " (stub)"));
15330 reloc_name = more_info;
15331 }
15332 }
15333
cd27b276 15334 if (r == bfd_reloc_overflow)
5bd4f169 15335 {
8131c122
AM
15336 /* On code like "if (foo) foo();" don't report overflow
15337 on a branch to zero when foo is undefined. */
15338 if (!warned
15339 && (reloc_dest == DEST_STUB
15340 || !(h != NULL
15341 && (h->elf.root.type == bfd_link_hash_undefweak
15342 || h->elf.root.type == bfd_link_hash_undefined)
15343 && is_branch_reloc (r_type))))
1a72702b
AM
15344 info->callbacks->reloc_overflow (info, &h->elf.root,
15345 sym_name, reloc_name,
15346 orig_rel.r_addend,
15347 input_bfd, input_section,
15348 rel->r_offset);
ef60b7ff
AM
15349 }
15350 else
15351 {
25f53a85 15352 info->callbacks->einfo
695344c0 15353 /* xgettext:c-format */
174d0a74 15354 (_("%H: %s against `%T': error %d\n"),
25f53a85 15355 input_bfd, input_section, rel->r_offset,
bc30df16 15356 reloc_name, sym_name, (int) r);
b34976b6 15357 ret = FALSE;
ef60b7ff 15358 }
bc30df16
AM
15359 if (more_info != NULL)
15360 free (more_info);
5bd4f169 15361 }
c316a17c
AM
15362 copy_reloc:
15363 if (wrel != rel)
15364 *wrel = *rel;
15365 }
15366
15367 if (wrel != rel)
15368 {
15369 Elf_Internal_Shdr *rel_hdr;
15370 size_t deleted = rel - wrel;
15371
15372 rel_hdr = _bfd_elf_single_rel_hdr (input_section->output_section);
15373 rel_hdr->sh_size -= rel_hdr->sh_entsize * deleted;
15374 if (rel_hdr->sh_size == 0)
15375 {
15376 /* It is too late to remove an empty reloc section. Leave
15377 one NONE reloc.
15378 ??? What is wrong with an empty section??? */
15379 rel_hdr->sh_size = rel_hdr->sh_entsize;
15380 deleted -= 1;
15381 }
15382 rel_hdr = _bfd_elf_single_rel_hdr (input_section);
15383 rel_hdr->sh_size -= rel_hdr->sh_entsize * deleted;
15384 input_section->reloc_count -= deleted;
5bd4f169
AM
15385 }
15386
645ea6a9
AM
15387 /* If we're emitting relocations, then shortly after this function
15388 returns, reloc offsets and addends for this section will be
15389 adjusted. Worse, reloc symbol indices will be for the output
8860955f
AM
15390 file rather than the input. Save a copy of the relocs for
15391 opd_entry_value. */
0e1862bb 15392 if (is_opd && (info->emitrelocations || bfd_link_relocatable (info)))
8860955f
AM
15393 {
15394 bfd_size_type amt;
15395 amt = input_section->reloc_count * sizeof (Elf_Internal_Rela);
15396 rel = bfd_alloc (input_bfd, amt);
729eabd5
AM
15397 BFD_ASSERT (ppc64_elf_tdata (input_bfd)->opd.relocs == NULL);
15398 ppc64_elf_tdata (input_bfd)->opd.relocs = rel;
8860955f
AM
15399 if (rel == NULL)
15400 return FALSE;
15401 memcpy (rel, relocs, amt);
15402 }
5bd4f169
AM
15403 return ret;
15404}
15405
754021d0
AM
15406/* Adjust the value of any local symbols in opd sections. */
15407
6e0b88f1 15408static int
754021d0
AM
15409ppc64_elf_output_symbol_hook (struct bfd_link_info *info,
15410 const char *name ATTRIBUTE_UNUSED,
15411 Elf_Internal_Sym *elfsym,
15412 asection *input_sec,
15413 struct elf_link_hash_entry *h)
15414{
74f0fb50
AM
15415 struct _opd_sec_data *opd;
15416 long adjust;
754021d0
AM
15417 bfd_vma value;
15418
4025353c 15419 if (h != NULL)
6e0b88f1 15420 return 1;
4025353c 15421
74f0fb50
AM
15422 opd = get_opd_info (input_sec);
15423 if (opd == NULL || opd->adjust == NULL)
6e0b88f1 15424 return 1;
754021d0
AM
15425
15426 value = elfsym->st_value - input_sec->output_offset;
0e1862bb 15427 if (!bfd_link_relocatable (info))
754021d0
AM
15428 value -= input_sec->output_section->vma;
15429
51aecdc5 15430 adjust = opd->adjust[OPD_NDX (value)];
4025353c 15431 if (adjust == -1)
6e0b88f1
AM
15432 return 2;
15433
15434 elfsym->st_value += adjust;
15435 return 1;
754021d0
AM
15436}
15437
5bd4f169
AM
15438/* Finish up dynamic symbol handling. We set the contents of various
15439 dynamic sections here. */
15440
b34976b6 15441static bfd_boolean
4ce794b7
AM
15442ppc64_elf_finish_dynamic_symbol (bfd *output_bfd,
15443 struct bfd_link_info *info,
15444 struct elf_link_hash_entry *h,
4aef7643 15445 Elf_Internal_Sym *sym)
5bd4f169 15446{
65f38f15 15447 struct ppc_link_hash_table *htab;
8387904d
AM
15448 struct plt_entry *ent;
15449 Elf_Internal_Rela rela;
15450 bfd_byte *loc;
5bd4f169 15451
65f38f15 15452 htab = ppc_hash_table (info);
4dfe6ac6
NC
15453 if (htab == NULL)
15454 return FALSE;
5bd4f169 15455
8387904d
AM
15456 for (ent = h->plt.plist; ent != NULL; ent = ent->next)
15457 if (ent->plt.offset != (bfd_vma) -1)
15458 {
15459 /* This symbol has an entry in the procedure linkage
15460 table. Set it up. */
e054468f
AM
15461 if (!htab->elf.dynamic_sections_created
15462 || h->dynindx == -1)
15463 {
15464 BFD_ASSERT (h->type == STT_GNU_IFUNC
15465 && h->def_regular
15466 && (h->root.type == bfd_link_hash_defined
15467 || h->root.type == bfd_link_hash_defweak));
33e44f2e
AM
15468 rela.r_offset = (htab->elf.iplt->output_section->vma
15469 + htab->elf.iplt->output_offset
25f23106 15470 + ent->plt.offset);
ee67d69a
AM
15471 if (htab->opd_abi)
15472 rela.r_info = ELF64_R_INFO (0, R_PPC64_JMP_IREL);
15473 else
15474 rela.r_info = ELF64_R_INFO (0, R_PPC64_IRELATIVE);
e054468f
AM
15475 rela.r_addend = (h->root.u.def.value
15476 + h->root.u.def.section->output_offset
15477 + h->root.u.def.section->output_section->vma
15478 + ent->addend);
33e44f2e
AM
15479 loc = (htab->elf.irelplt->contents
15480 + (htab->elf.irelplt->reloc_count++
25f23106 15481 * sizeof (Elf64_External_Rela)));
82e66161 15482 htab->local_ifunc_resolver = 1;
e054468f
AM
15483 }
15484 else
15485 {
33e44f2e
AM
15486 rela.r_offset = (htab->elf.splt->output_section->vma
15487 + htab->elf.splt->output_offset
25f23106 15488 + ent->plt.offset);
e054468f
AM
15489 rela.r_info = ELF64_R_INFO (h->dynindx, R_PPC64_JMP_SLOT);
15490 rela.r_addend = ent->addend;
33e44f2e 15491 loc = (htab->elf.srelplt->contents
b9e5796b
AM
15492 + ((ent->plt.offset - PLT_INITIAL_ENTRY_SIZE (htab))
15493 / PLT_ENTRY_SIZE (htab) * sizeof (Elf64_External_Rela)));
82e66161
AM
15494 if (h->type == STT_GNU_IFUNC && is_static_defined (h))
15495 htab->maybe_local_ifunc_resolver = 1;
e054468f 15496 }
8387904d 15497 bfd_elf64_swap_reloca_out (output_bfd, &rela, loc);
a345bc8d
AM
15498
15499 if (!htab->opd_abi)
15500 {
15501 if (!h->def_regular)
15502 {
15503 /* Mark the symbol as undefined, rather than as
15504 defined in glink. Leave the value if there were
15505 any relocations where pointer equality matters
15506 (this is a clue for the dynamic linker, to make
15507 function pointer comparisons work between an
15508 application and shared library), otherwise set it
15509 to zero. */
15510 sym->st_shndx = SHN_UNDEF;
15511 if (!h->pointer_equality_needed)
15512 sym->st_value = 0;
15513 else if (!h->ref_regular_nonweak)
15514 {
15515 /* This breaks function pointer comparisons, but
15516 that is better than breaking tests for a NULL
15517 function pointer. */
15518 sym->st_value = 0;
15519 }
15520 }
15521 }
8387904d 15522 }
5bd4f169 15523
f5385ebf 15524 if (h->needs_copy)
5bd4f169 15525 {
65f38f15 15526 /* This symbol needs a copy reloc. Set it up. */
5474d94f 15527 asection *srel;
5bd4f169 15528
65f38f15
AM
15529 if (h->dynindx == -1
15530 || (h->root.type != bfd_link_hash_defined
15531 && h->root.type != bfd_link_hash_defweak)
5474d94f
AM
15532 || htab->elf.srelbss == NULL
15533 || htab->elf.sreldynrelro == NULL)
65f38f15 15534 abort ();
5bd4f169
AM
15535
15536 rela.r_offset = (h->root.u.def.value
15537 + h->root.u.def.section->output_section->vma
15538 + h->root.u.def.section->output_offset);
15539 rela.r_info = ELF64_R_INFO (h->dynindx, R_PPC64_COPY);
15540 rela.r_addend = 0;
afbf7e8e 15541 if (h->root.u.def.section == htab->elf.sdynrelro)
5474d94f
AM
15542 srel = htab->elf.sreldynrelro;
15543 else
15544 srel = htab->elf.srelbss;
15545 loc = srel->contents;
15546 loc += srel->reloc_count++ * sizeof (Elf64_External_Rela);
65f38f15 15547 bfd_elf64_swap_reloca_out (output_bfd, &rela, loc);
5bd4f169
AM
15548 }
15549
b34976b6 15550 return TRUE;
5bd4f169
AM
15551}
15552
65f38f15
AM
15553/* Used to decide how to sort relocs in an optimal manner for the
15554 dynamic linker, before writing them out. */
15555
15556static enum elf_reloc_type_class
7e612e98
AM
15557ppc64_elf_reloc_type_class (const struct bfd_link_info *info,
15558 const asection *rel_sec,
15559 const Elf_Internal_Rela *rela)
65f38f15 15560{
04c9666a 15561 enum elf_ppc64_reloc_type r_type;
7e612e98
AM
15562 struct ppc_link_hash_table *htab = ppc_hash_table (info);
15563
33e44f2e 15564 if (rel_sec == htab->elf.irelplt)
7e612e98 15565 return reloc_class_ifunc;
a33d1f77 15566
4ce794b7 15567 r_type = ELF64_R_TYPE (rela->r_info);
a33d1f77 15568 switch (r_type)
65f38f15
AM
15569 {
15570 case R_PPC64_RELATIVE:
15571 return reloc_class_relative;
15572 case R_PPC64_JMP_SLOT:
15573 return reloc_class_plt;
15574 case R_PPC64_COPY:
15575 return reloc_class_copy;
15576 default:
15577 return reloc_class_normal;
15578 }
15579}
15580
5bd4f169
AM
15581/* Finish up the dynamic sections. */
15582
b34976b6 15583static bfd_boolean
4ce794b7
AM
15584ppc64_elf_finish_dynamic_sections (bfd *output_bfd,
15585 struct bfd_link_info *info)
5bd4f169 15586{
65f38f15
AM
15587 struct ppc_link_hash_table *htab;
15588 bfd *dynobj;
5bd4f169 15589 asection *sdyn;
5bd4f169 15590
65f38f15 15591 htab = ppc_hash_table (info);
4dfe6ac6
NC
15592 if (htab == NULL)
15593 return FALSE;
15594
65f38f15 15595 dynobj = htab->elf.dynobj;
3d4d4302 15596 sdyn = bfd_get_linker_section (dynobj, ".dynamic");
5bd4f169 15597
65f38f15 15598 if (htab->elf.dynamic_sections_created)
5bd4f169 15599 {
5bd4f169
AM
15600 Elf64_External_Dyn *dyncon, *dynconend;
15601
33e44f2e 15602 if (sdyn == NULL || htab->elf.sgot == NULL)
65f38f15 15603 abort ();
5bd4f169
AM
15604
15605 dyncon = (Elf64_External_Dyn *) sdyn->contents;
eea6121a 15606 dynconend = (Elf64_External_Dyn *) (sdyn->contents + sdyn->size);
5bd4f169
AM
15607 for (; dyncon < dynconend; dyncon++)
15608 {
15609 Elf_Internal_Dyn dyn;
19397422 15610 asection *s;
5bd4f169
AM
15611
15612 bfd_elf64_swap_dyn_in (dynobj, dyncon, &dyn);
15613
15614 switch (dyn.d_tag)
15615 {
65f38f15
AM
15616 default:
15617 continue;
5bd4f169 15618
5d1634d7 15619 case DT_PPC64_GLINK:
4ce794b7 15620 s = htab->glink;
6348e046 15621 dyn.d_un.d_ptr = s->output_section->vma + s->output_offset;
ad8e1ba5
AM
15622 /* We stupidly defined DT_PPC64_GLINK to be the start
15623 of glink rather than the first entry point, which is
15624 what ld.so needs, and now have a bigger stub to
15625 support automatic multiple TOCs. */
b9e5796b 15626 dyn.d_un.d_ptr += GLINK_CALL_STUB_SIZE - 8 * 4;
5d1634d7
AM
15627 break;
15628
19397422
AM
15629 case DT_PPC64_OPD:
15630 s = bfd_get_section_by_name (output_bfd, ".opd");
6348e046
AM
15631 if (s == NULL)
15632 continue;
15633 dyn.d_un.d_ptr = s->vma;
19397422
AM
15634 break;
15635
e8910a83
AM
15636 case DT_PPC64_OPT:
15637 if (htab->do_multi_toc && htab->multi_toc_needed)
15638 dyn.d_un.d_val |= PPC64_OPT_MULTI_TOC;
15639 break;
15640
19397422
AM
15641 case DT_PPC64_OPDSZ:
15642 s = bfd_get_section_by_name (output_bfd, ".opd");
6348e046
AM
15643 if (s == NULL)
15644 continue;
eea6121a 15645 dyn.d_un.d_val = s->size;
19397422
AM
15646 break;
15647
65f38f15 15648 case DT_PLTGOT:
33e44f2e 15649 s = htab->elf.splt;
6348e046 15650 dyn.d_un.d_ptr = s->output_section->vma + s->output_offset;
65f38f15
AM
15651 break;
15652
15653 case DT_JMPREL:
33e44f2e 15654 s = htab->elf.srelplt;
6348e046 15655 dyn.d_un.d_ptr = s->output_section->vma + s->output_offset;
65f38f15 15656 break;
5bd4f169 15657
65f38f15 15658 case DT_PLTRELSZ:
33e44f2e 15659 dyn.d_un.d_val = htab->elf.srelplt->size;
5d1634d7 15660 break;
82e66161
AM
15661
15662 case DT_TEXTREL:
15663 if (htab->local_ifunc_resolver)
15664 info->callbacks->einfo
15665 (_("%X%P: text relocations and GNU indirect "
15666 "functions will result in a segfault at runtime\n"));
15667 else if (htab->maybe_local_ifunc_resolver)
15668 info->callbacks->einfo
15669 (_("%P: warning: text relocations and GNU indirect "
15670 "functions may result in a segfault at runtime\n"));
15671 continue;
5bd4f169 15672 }
5bd4f169 15673
65f38f15 15674 bfd_elf64_swap_dyn_out (output_bfd, &dyn, dyncon);
5bd4f169 15675 }
5bd4f169
AM
15676 }
15677
6528b6eb
AM
15678 if (htab->elf.sgot != NULL && htab->elf.sgot->size != 0
15679 && htab->elf.sgot->output_section != bfd_abs_section_ptr)
5d1634d7
AM
15680 {
15681 /* Fill in the first entry in the global offset table.
15682 We use it to hold the link-time TOCbase. */
15683 bfd_put_64 (output_bfd,
60ee0d4a 15684 elf_gp (output_bfd) + TOC_BASE_OFF,
33e44f2e 15685 htab->elf.sgot->contents);
5d1634d7
AM
15686
15687 /* Set .got entry size. */
33e44f2e 15688 elf_section_data (htab->elf.sgot->output_section)->this_hdr.sh_entsize = 8;
5d1634d7
AM
15689 }
15690
6528b6eb
AM
15691 if (htab->elf.splt != NULL && htab->elf.splt->size != 0
15692 && htab->elf.splt->output_section != bfd_abs_section_ptr)
5d1634d7
AM
15693 {
15694 /* Set .plt entry size. */
33e44f2e 15695 elf_section_data (htab->elf.splt->output_section)->this_hdr.sh_entsize
b9e5796b 15696 = PLT_ENTRY_SIZE (htab);
5d1634d7
AM
15697 }
15698
84f5d08e
AM
15699 /* brlt is SEC_LINKER_CREATED, so we need to write out relocs for
15700 brlt ourselves if emitrelocations. */
15701 if (htab->brlt != NULL
15702 && htab->brlt->reloc_count != 0
15703 && !_bfd_elf_link_output_relocs (output_bfd,
15704 htab->brlt,
d4730f92 15705 elf_section_data (htab->brlt)->rela.hdr,
84f5d08e
AM
15706 elf_section_data (htab->brlt)->relocs,
15707 NULL))
15708 return FALSE;
15709
176a0d42
AM
15710 if (htab->glink != NULL
15711 && htab->glink->reloc_count != 0
15712 && !_bfd_elf_link_output_relocs (output_bfd,
15713 htab->glink,
d4730f92 15714 elf_section_data (htab->glink)->rela.hdr,
176a0d42
AM
15715 elf_section_data (htab->glink)->relocs,
15716 NULL))
15717 return FALSE;
15718
58d180e8 15719 if (htab->glink_eh_frame != NULL
da44f4e5
AM
15720 && htab->glink_eh_frame->size != 0)
15721 {
15722 bfd_vma val;
15723 bfd_byte *p;
15724 asection *stub_sec;
2e0ce1c8 15725 size_t align = 4;
da44f4e5 15726
2e0ce1c8
AM
15727 p = htab->glink_eh_frame->contents;
15728 p += (sizeof (glink_eh_frame_cie) + align - 1) & -align;
da44f4e5
AM
15729 for (stub_sec = htab->params->stub_bfd->sections;
15730 stub_sec != NULL;
15731 stub_sec = stub_sec->next)
15732 if ((stub_sec->flags & SEC_LINKER_CREATED) == 0)
15733 {
15734 /* FDE length. */
15735 p += 4;
15736 /* CIE pointer. */
15737 p += 4;
15738 /* Offset to stub section. */
15739 val = (stub_sec->output_section->vma
15740 + stub_sec->output_offset);
15741 val -= (htab->glink_eh_frame->output_section->vma
15742 + htab->glink_eh_frame->output_offset
15743 + (p - htab->glink_eh_frame->contents));
15744 if (val + 0x80000000 > 0xffffffff)
15745 {
15746 info->callbacks->einfo
15747 (_("%P: %s offset too large for .eh_frame sdata4 encoding"),
15748 stub_sec->name);
15749 return FALSE;
15750 }
15751 bfd_put_32 (dynobj, val, p);
15752 p += 4;
15753 /* stub section size. */
15754 p += 4;
15755 /* Augmentation. */
15756 p += 1;
15757 /* Pad. */
2e0ce1c8 15758 p += ((17 + align - 1) & -align) - 17;
da44f4e5
AM
15759 }
15760 if (htab->glink != NULL && htab->glink->size != 0)
15761 {
15762 /* FDE length. */
15763 p += 4;
15764 /* CIE pointer. */
15765 p += 4;
15766 /* Offset to .glink. */
15767 val = (htab->glink->output_section->vma
15768 + htab->glink->output_offset
15769 + 8);
15770 val -= (htab->glink_eh_frame->output_section->vma
15771 + htab->glink_eh_frame->output_offset
15772 + (p - htab->glink_eh_frame->contents));
15773 if (val + 0x80000000 > 0xffffffff)
15774 {
15775 info->callbacks->einfo
15776 (_("%P: %s offset too large for .eh_frame sdata4 encoding"),
15777 htab->glink->name);
15778 return FALSE;
15779 }
15780 bfd_put_32 (dynobj, val, p);
15781 p += 4;
15782 /* .glink size. */
15783 p += 4;
15784 /* Augmentation. */
15785 p += 1;
15786 /* Ops. */
15787 p += 7;
2e0ce1c8 15788 p += ((24 + align - 1) & -align) - 24;
da44f4e5
AM
15789 }
15790
15791 if (htab->glink_eh_frame->sec_info_type == SEC_INFO_TYPE_EH_FRAME
15792 && !_bfd_elf_write_section_eh_frame (output_bfd, info,
15793 htab->glink_eh_frame,
15794 htab->glink_eh_frame->contents))
15795 return FALSE;
15796 }
58d180e8 15797
e717da7e 15798 /* We need to handle writing out multiple GOT sections ourselves,
7b53ace3
AM
15799 since we didn't add them to DYNOBJ. We know dynobj is the first
15800 bfd. */
c72f2fb2 15801 while ((dynobj = dynobj->link.next) != NULL)
e717da7e
AM
15802 {
15803 asection *s;
7b53ace3 15804
0c8d6e5c 15805 if (!is_ppc64_elf (dynobj))
7b53ace3
AM
15806 continue;
15807
e717da7e
AM
15808 s = ppc64_elf_tdata (dynobj)->got;
15809 if (s != NULL
eea6121a 15810 && s->size != 0
e717da7e
AM
15811 && s->output_section != bfd_abs_section_ptr
15812 && !bfd_set_section_contents (output_bfd, s->output_section,
15813 s->contents, s->output_offset,
eea6121a 15814 s->size))
e717da7e
AM
15815 return FALSE;
15816 s = ppc64_elf_tdata (dynobj)->relgot;
15817 if (s != NULL
eea6121a 15818 && s->size != 0
e717da7e
AM
15819 && s->output_section != bfd_abs_section_ptr
15820 && !bfd_set_section_contents (output_bfd, s->output_section,
15821 s->contents, s->output_offset,
eea6121a 15822 s->size))
e717da7e
AM
15823 return FALSE;
15824 }
f6c52c13 15825
b34976b6 15826 return TRUE;
5bd4f169
AM
15827}
15828
5bd4f169 15829#include "elf64-target.h"
7b8e7dad
AM
15830
15831/* FreeBSD support */
15832
15833#undef TARGET_LITTLE_SYM
15834#undef TARGET_LITTLE_NAME
15835
15836#undef TARGET_BIG_SYM
6d00b590 15837#define TARGET_BIG_SYM powerpc_elf64_fbsd_vec
7b8e7dad
AM
15838#undef TARGET_BIG_NAME
15839#define TARGET_BIG_NAME "elf64-powerpc-freebsd"
15840
15841#undef ELF_OSABI
15842#define ELF_OSABI ELFOSABI_FREEBSD
15843
15844#undef elf64_bed
15845#define elf64_bed elf64_powerpc_fbsd_bed
15846
15847#include "elf64-target.h"
15848
This page took 2.386197 seconds and 4 git commands to generate.