2005-12-30 Eric Christopher <echristo@apple.com>
[deliverable/binutils-gdb.git] / bfd / elf64-ppc.c
CommitLineData
5bd4f169 1/* PowerPC64-specific support for 64-bit ELF.
3eb128b2 2 Copyright 1999, 2000, 2001, 2002, 2003, 2004, 2005
b2a8e766 3 Free Software Foundation, Inc.
5bd4f169
AM
4 Written by Linus Nordberg, Swox AB <info@swox.com>,
5 based on elf32-ppc.c by Ian Lance Taylor.
d37c89e5 6 Largely rewritten by Alan Modra <amodra@bigpond.net.au>
5bd4f169 7
ae9a127f 8 This file is part of BFD, the Binary File Descriptor library.
5bd4f169 9
ae9a127f
NC
10 This program is free software; you can redistribute it and/or modify
11 it under the terms of the GNU General Public License as published by
12 the Free Software Foundation; either version 2 of the License, or
13 (at your option) any later version.
5bd4f169 14
ae9a127f
NC
15 This program is distributed in the hope that it will be useful,
16 but WITHOUT ANY WARRANTY; without even the implied warranty of
17 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
18 GNU General Public License for more details.
5bd4f169 19
4ce794b7
AM
20 You should have received a copy of the GNU General Public License along
21 with this program; if not, write to the Free Software Foundation, Inc.,
3e110533 22 51 Franklin Street - Fifth Floor, Boston, MA 02110-1301, USA. */
5bd4f169 23
4ce794b7
AM
24/* The 64-bit PowerPC ELF ABI may be found at
25 http://www.linuxbase.org/spec/ELF/ppc64/PPC-elf64abi.txt, and
26 http://www.linuxbase.org/spec/ELF/ppc64/spec/book1.html */
5bd4f169
AM
27
28#include "bfd.h"
29#include "sysdep.h"
30#include "bfdlink.h"
31#include "libbfd.h"
32#include "elf-bfd.h"
04c9666a 33#include "elf/ppc64.h"
5d1634d7 34#include "elf64-ppc.h"
5bd4f169 35
805fc799 36static bfd_reloc_status_type ppc64_elf_ha_reloc
4ce794b7 37 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
2441e016
AM
38static bfd_reloc_status_type ppc64_elf_branch_reloc
39 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
805fc799 40static bfd_reloc_status_type ppc64_elf_brtaken_reloc
4ce794b7 41 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
805fc799 42static bfd_reloc_status_type ppc64_elf_sectoff_reloc
4ce794b7 43 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
805fc799 44static bfd_reloc_status_type ppc64_elf_sectoff_ha_reloc
4ce794b7 45 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
805fc799 46static bfd_reloc_status_type ppc64_elf_toc_reloc
4ce794b7 47 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
805fc799 48static bfd_reloc_status_type ppc64_elf_toc_ha_reloc
4ce794b7 49 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
805fc799 50static bfd_reloc_status_type ppc64_elf_toc64_reloc
4ce794b7 51 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
805fc799 52static bfd_reloc_status_type ppc64_elf_unhandled_reloc
4ce794b7 53 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
2441e016
AM
54static bfd_vma opd_entry_value
55 (asection *, bfd_vma, asection **, bfd_vma *);
5bd4f169 56
ad8e1ba5
AM
57#define TARGET_LITTLE_SYM bfd_elf64_powerpcle_vec
58#define TARGET_LITTLE_NAME "elf64-powerpcle"
59#define TARGET_BIG_SYM bfd_elf64_powerpc_vec
60#define TARGET_BIG_NAME "elf64-powerpc"
61#define ELF_ARCH bfd_arch_powerpc
62#define ELF_MACHINE_CODE EM_PPC64
63#define ELF_MAXPAGESIZE 0x10000
64#define elf_info_to_howto ppc64_elf_info_to_howto
65
66#define elf_backend_want_got_sym 0
67#define elf_backend_want_plt_sym 0
68#define elf_backend_plt_alignment 3
69#define elf_backend_plt_not_loaded 1
ad8e1ba5 70#define elf_backend_got_header_size 8
ad8e1ba5
AM
71#define elf_backend_can_gc_sections 1
72#define elf_backend_can_refcount 1
73#define elf_backend_rela_normal 1
74
e717da7e 75#define bfd_elf64_mkobject ppc64_elf_mkobject
ad8e1ba5
AM
76#define bfd_elf64_bfd_reloc_type_lookup ppc64_elf_reloc_type_lookup
77#define bfd_elf64_bfd_merge_private_bfd_data ppc64_elf_merge_private_bfd_data
78#define bfd_elf64_new_section_hook ppc64_elf_new_section_hook
79#define bfd_elf64_bfd_link_hash_table_create ppc64_elf_link_hash_table_create
80#define bfd_elf64_bfd_link_hash_table_free ppc64_elf_link_hash_table_free
90e3cdf2 81#define bfd_elf64_get_synthetic_symtab ppc64_elf_get_synthetic_symtab
ad8e1ba5
AM
82
83#define elf_backend_object_p ppc64_elf_object_p
d37c89e5
AM
84#define elf_backend_grok_prstatus ppc64_elf_grok_prstatus
85#define elf_backend_grok_psinfo ppc64_elf_grok_psinfo
ad8e1ba5
AM
86#define elf_backend_create_dynamic_sections ppc64_elf_create_dynamic_sections
87#define elf_backend_copy_indirect_symbol ppc64_elf_copy_indirect_symbol
555cd476 88#define elf_backend_add_symbol_hook ppc64_elf_add_symbol_hook
8387904d
AM
89#define elf_backend_check_directives ppc64_elf_check_directives
90#define elf_backend_archive_symbol_lookup ppc64_elf_archive_symbol_lookup
ad8e1ba5
AM
91#define elf_backend_check_relocs ppc64_elf_check_relocs
92#define elf_backend_gc_mark_hook ppc64_elf_gc_mark_hook
93#define elf_backend_gc_sweep_hook ppc64_elf_gc_sweep_hook
94#define elf_backend_adjust_dynamic_symbol ppc64_elf_adjust_dynamic_symbol
95#define elf_backend_hide_symbol ppc64_elf_hide_symbol
96#define elf_backend_always_size_sections ppc64_elf_func_desc_adjust
97#define elf_backend_size_dynamic_sections ppc64_elf_size_dynamic_sections
60124e18 98#define elf_backend_action_discarded ppc64_elf_action_discarded
ad8e1ba5
AM
99#define elf_backend_relocate_section ppc64_elf_relocate_section
100#define elf_backend_finish_dynamic_symbol ppc64_elf_finish_dynamic_symbol
101#define elf_backend_reloc_type_class ppc64_elf_reloc_type_class
102#define elf_backend_finish_dynamic_sections ppc64_elf_finish_dynamic_sections
754021d0 103#define elf_backend_link_output_symbol_hook ppc64_elf_output_symbol_hook
29ef7005 104#define elf_backend_special_sections ppc64_elf_special_sections
ad8e1ba5 105
5bd4f169
AM
106/* The name of the dynamic interpreter. This is put in the .interp
107 section. */
108#define ELF_DYNAMIC_INTERPRETER "/usr/lib/ld.so.1"
109
110/* The size in bytes of an entry in the procedure linkage table. */
111#define PLT_ENTRY_SIZE 24
112
113/* The initial size of the plt reserved for the dynamic linker. */
5d1634d7 114#define PLT_INITIAL_ENTRY_SIZE PLT_ENTRY_SIZE
5bd4f169
AM
115
116/* TOC base pointers offset from start of TOC. */
411e1bfb
AM
117#define TOC_BASE_OFF 0x8000
118
119/* Offset of tp and dtp pointers from start of TLS block. */
120#define TP_OFFSET 0x7000
121#define DTP_OFFSET 0x8000
5bd4f169 122
ad8e1ba5
AM
123/* .plt call stub instructions. The normal stub is like this, but
124 sometimes the .plt entry crosses a 64k boundary and we need to
125 insert an addis to adjust r12. */
126#define PLT_CALL_STUB_SIZE (7*4)
5d1634d7
AM
127#define ADDIS_R12_R2 0x3d820000 /* addis %r12,%r2,xxx@ha */
128#define STD_R2_40R1 0xf8410028 /* std %r2,40(%r1) */
129#define LD_R11_0R12 0xe96c0000 /* ld %r11,xxx+0@l(%r12) */
130#define LD_R2_0R12 0xe84c0000 /* ld %r2,xxx+8@l(%r12) */
131#define MTCTR_R11 0x7d6903a6 /* mtctr %r11 */
132 /* ld %r11,xxx+16@l(%r12) */
133#define BCTR 0x4e800420 /* bctr */
134
5d1634d7 135
ad8e1ba5
AM
136#define ADDIS_R2_R2 0x3c420000 /* addis %r2,%r2,off@ha */
137#define ADDI_R2_R2 0x38420000 /* addi %r2,%r2,off@l */
138
139#define LD_R2_40R1 0xe8410028 /* ld %r2,40(%r1) */
140
141/* glink call stub instructions. We enter with the index in R0, and the
142 address of glink entry in CTR. From that, we can calculate PLT0. */
143#define GLINK_CALL_STUB_SIZE (16*4)
144#define MFCTR_R12 0x7d8902a6 /* mfctr %r12 */
145#define SLDI_R11_R0_3 0x780b1f24 /* sldi %r11,%r0,3 */
146#define ADDIC_R2_R0_32K 0x34408000 /* addic. %r2,%r0,-32768 */
147#define SUB_R12_R12_R11 0x7d8b6050 /* sub %r12,%r12,%r11 */
148#define SRADI_R2_R2_63 0x7c42fe76 /* sradi %r2,%r2,63 */
149#define SLDI_R11_R0_2 0x780b1764 /* sldi %r11,%r0,2 */
150#define AND_R2_R2_R11 0x7c425838 /* and %r2,%r2,%r11 */
151 /* sub %r12,%r12,%r11 */
152#define ADD_R12_R12_R2 0x7d8c1214 /* add %r12,%r12,%r2 */
153#define ADDIS_R12_R12 0x3d8c0000 /* addis %r12,%r12,xxx@ha */
154 /* ld %r11,xxx@l(%r12) */
155#define ADDI_R12_R12 0x398c0000 /* addi %r12,%r12,xxx@l */
156 /* ld %r2,8(%r12) */
157 /* mtctr %r11 */
158 /* ld %r11,16(%r12) */
159 /* bctr */
5d1634d7
AM
160
161/* Pad with this. */
162#define NOP 0x60000000
163
721956f4
AM
164/* Some other nops. */
165#define CROR_151515 0x4def7b82
166#define CROR_313131 0x4ffffb82
167
cedb70c5 168/* .glink entries for the first 32k functions are two instructions. */
5d1634d7
AM
169#define LI_R0_0 0x38000000 /* li %r0,0 */
170#define B_DOT 0x48000000 /* b . */
171
172/* After that, we need two instructions to load the index, followed by
173 a branch. */
174#define LIS_R0_0 0x3c000000 /* lis %r0,0 */
10ed1bba 175#define ORI_R0_R0_0 0x60000000 /* ori %r0,%r0,0 */
41bd81ab 176
deb0e272
AM
177/* Instructions used by the save and restore reg functions. */
178#define STD_R0_0R1 0xf8010000 /* std %r0,0(%r1) */
179#define STD_R0_0R12 0xf80c0000 /* std %r0,0(%r12) */
180#define LD_R0_0R1 0xe8010000 /* ld %r0,0(%r1) */
181#define LD_R0_0R12 0xe80c0000 /* ld %r0,0(%r12) */
82bd7b59
AM
182#define STFD_FR0_0R1 0xd8010000 /* stfd %fr0,0(%r1) */
183#define LFD_FR0_0R1 0xc8010000 /* lfd %fr0,0(%r1) */
deb0e272
AM
184#define LI_R12_0 0x39800000 /* li %r12,0 */
185#define STVX_VR0_R12_R0 0x7c0c01ce /* stvx %v0,%r12,%r0 */
186#define LVX_VR0_R12_R0 0x7c0c00ce /* lvx %v0,%r12,%r0 */
187#define MTLR_R0 0x7c0803a6 /* mtlr %r0 */
82bd7b59
AM
188#define BLR 0x4e800020 /* blr */
189
41bd81ab
AM
190/* Since .opd is an array of descriptors and each entry will end up
191 with identical R_PPC64_RELATIVE relocs, there is really no need to
192 propagate .opd relocs; The dynamic linker should be taught to
1e2f5b6e 193 relocate .opd without reloc entries. */
41bd81ab
AM
194#ifndef NO_OPD_RELOCS
195#define NO_OPD_RELOCS 0
196#endif
5bd4f169 197\f
f5e87a1d 198#define ONES(n) (((bfd_vma) 1 << ((n) - 1) << 1) - 1)
b34976b6 199
5bd4f169 200/* Relocation HOWTO's. */
04c9666a 201static reloc_howto_type *ppc64_elf_howto_table[(int) R_PPC64_max];
5bd4f169
AM
202
203static reloc_howto_type ppc64_elf_howto_raw[] = {
204 /* This reloc does nothing. */
205 HOWTO (R_PPC64_NONE, /* type */
206 0, /* rightshift */
411e1bfb
AM
207 2, /* size (0 = byte, 1 = short, 2 = long) */
208 32, /* bitsize */
b34976b6 209 FALSE, /* pc_relative */
5bd4f169 210 0, /* bitpos */
f5e87a1d 211 complain_overflow_dont, /* complain_on_overflow */
5bd4f169
AM
212 bfd_elf_generic_reloc, /* special_function */
213 "R_PPC64_NONE", /* name */
b34976b6 214 FALSE, /* partial_inplace */
d006db6c 215 0, /* src_mask */
5bd4f169 216 0, /* dst_mask */
b34976b6 217 FALSE), /* pcrel_offset */
5bd4f169
AM
218
219 /* A standard 32 bit relocation. */
220 HOWTO (R_PPC64_ADDR32, /* type */
221 0, /* rightshift */
222 2, /* size (0 = byte, 1 = short, 2 = long) */
223 32, /* bitsize */
b34976b6 224 FALSE, /* pc_relative */
5bd4f169
AM
225 0, /* bitpos */
226 complain_overflow_bitfield, /* complain_on_overflow */
227 bfd_elf_generic_reloc, /* special_function */
228 "R_PPC64_ADDR32", /* name */
b34976b6 229 FALSE, /* partial_inplace */
5bd4f169
AM
230 0, /* src_mask */
231 0xffffffff, /* dst_mask */
b34976b6 232 FALSE), /* pcrel_offset */
5bd4f169
AM
233
234 /* An absolute 26 bit branch; the lower two bits must be zero.
235 FIXME: we don't check that, we just clear them. */
236 HOWTO (R_PPC64_ADDR24, /* type */
237 0, /* rightshift */
238 2, /* size (0 = byte, 1 = short, 2 = long) */
239 26, /* bitsize */
b34976b6 240 FALSE, /* pc_relative */
5bd4f169
AM
241 0, /* bitpos */
242 complain_overflow_bitfield, /* complain_on_overflow */
243 bfd_elf_generic_reloc, /* special_function */
244 "R_PPC64_ADDR24", /* name */
b34976b6 245 FALSE, /* partial_inplace */
d006db6c 246 0, /* src_mask */
f5e87a1d 247 0x03fffffc, /* dst_mask */
b34976b6 248 FALSE), /* pcrel_offset */
5bd4f169
AM
249
250 /* A standard 16 bit relocation. */
251 HOWTO (R_PPC64_ADDR16, /* type */
252 0, /* rightshift */
253 1, /* size (0 = byte, 1 = short, 2 = long) */
254 16, /* bitsize */
b34976b6 255 FALSE, /* pc_relative */
5bd4f169
AM
256 0, /* bitpos */
257 complain_overflow_bitfield, /* complain_on_overflow */
258 bfd_elf_generic_reloc, /* special_function */
259 "R_PPC64_ADDR16", /* name */
b34976b6 260 FALSE, /* partial_inplace */
5bd4f169
AM
261 0, /* src_mask */
262 0xffff, /* dst_mask */
b34976b6 263 FALSE), /* pcrel_offset */
5bd4f169
AM
264
265 /* A 16 bit relocation without overflow. */
266 HOWTO (R_PPC64_ADDR16_LO, /* type */
267 0, /* rightshift */
268 1, /* size (0 = byte, 1 = short, 2 = long) */
269 16, /* bitsize */
b34976b6 270 FALSE, /* pc_relative */
5bd4f169
AM
271 0, /* bitpos */
272 complain_overflow_dont,/* complain_on_overflow */
273 bfd_elf_generic_reloc, /* special_function */
274 "R_PPC64_ADDR16_LO", /* name */
b34976b6 275 FALSE, /* partial_inplace */
5bd4f169
AM
276 0, /* src_mask */
277 0xffff, /* dst_mask */
b34976b6 278 FALSE), /* pcrel_offset */
5bd4f169
AM
279
280 /* Bits 16-31 of an address. */
281 HOWTO (R_PPC64_ADDR16_HI, /* type */
282 16, /* rightshift */
283 1, /* size (0 = byte, 1 = short, 2 = long) */
284 16, /* bitsize */
b34976b6 285 FALSE, /* pc_relative */
5bd4f169
AM
286 0, /* bitpos */
287 complain_overflow_dont, /* complain_on_overflow */
288 bfd_elf_generic_reloc, /* special_function */
289 "R_PPC64_ADDR16_HI", /* name */
b34976b6 290 FALSE, /* partial_inplace */
5bd4f169
AM
291 0, /* src_mask */
292 0xffff, /* dst_mask */
b34976b6 293 FALSE), /* pcrel_offset */
5bd4f169
AM
294
295 /* Bits 16-31 of an address, plus 1 if the contents of the low 16
296 bits, treated as a signed number, is negative. */
297 HOWTO (R_PPC64_ADDR16_HA, /* type */
298 16, /* rightshift */
299 1, /* size (0 = byte, 1 = short, 2 = long) */
300 16, /* bitsize */
b34976b6 301 FALSE, /* pc_relative */
5bd4f169
AM
302 0, /* bitpos */
303 complain_overflow_dont, /* complain_on_overflow */
805fc799 304 ppc64_elf_ha_reloc, /* special_function */
5bd4f169 305 "R_PPC64_ADDR16_HA", /* name */
b34976b6 306 FALSE, /* partial_inplace */
5bd4f169
AM
307 0, /* src_mask */
308 0xffff, /* dst_mask */
b34976b6 309 FALSE), /* pcrel_offset */
5bd4f169
AM
310
311 /* An absolute 16 bit branch; the lower two bits must be zero.
312 FIXME: we don't check that, we just clear them. */
313 HOWTO (R_PPC64_ADDR14, /* type */
314 0, /* rightshift */
315 2, /* size (0 = byte, 1 = short, 2 = long) */
316 16, /* bitsize */
b34976b6 317 FALSE, /* pc_relative */
5bd4f169
AM
318 0, /* bitpos */
319 complain_overflow_bitfield, /* complain_on_overflow */
2441e016 320 ppc64_elf_branch_reloc, /* special_function */
5bd4f169 321 "R_PPC64_ADDR14", /* name */
b34976b6 322 FALSE, /* partial_inplace */
d006db6c 323 0, /* src_mask */
f5e87a1d 324 0x0000fffc, /* dst_mask */
b34976b6 325 FALSE), /* pcrel_offset */
5bd4f169
AM
326
327 /* An absolute 16 bit branch, for which bit 10 should be set to
328 indicate that the branch is expected to be taken. The lower two
329 bits must be zero. */
330 HOWTO (R_PPC64_ADDR14_BRTAKEN, /* type */
331 0, /* rightshift */
332 2, /* size (0 = byte, 1 = short, 2 = long) */
333 16, /* bitsize */
b34976b6 334 FALSE, /* pc_relative */
5bd4f169
AM
335 0, /* bitpos */
336 complain_overflow_bitfield, /* complain_on_overflow */
805fc799 337 ppc64_elf_brtaken_reloc, /* special_function */
5bd4f169 338 "R_PPC64_ADDR14_BRTAKEN",/* name */
b34976b6 339 FALSE, /* partial_inplace */
d006db6c 340 0, /* src_mask */
f5e87a1d 341 0x0000fffc, /* dst_mask */
b34976b6 342 FALSE), /* pcrel_offset */
5bd4f169
AM
343
344 /* An absolute 16 bit branch, for which bit 10 should be set to
345 indicate that the branch is not expected to be taken. The lower
346 two bits must be zero. */
347 HOWTO (R_PPC64_ADDR14_BRNTAKEN, /* type */
348 0, /* rightshift */
349 2, /* size (0 = byte, 1 = short, 2 = long) */
350 16, /* bitsize */
b34976b6 351 FALSE, /* pc_relative */
5bd4f169
AM
352 0, /* bitpos */
353 complain_overflow_bitfield, /* complain_on_overflow */
805fc799 354 ppc64_elf_brtaken_reloc, /* special_function */
5bd4f169 355 "R_PPC64_ADDR14_BRNTAKEN",/* name */
b34976b6 356 FALSE, /* partial_inplace */
d006db6c 357 0, /* src_mask */
f5e87a1d 358 0x0000fffc, /* dst_mask */
b34976b6 359 FALSE), /* pcrel_offset */
5bd4f169
AM
360
361 /* A relative 26 bit branch; the lower two bits must be zero. */
362 HOWTO (R_PPC64_REL24, /* type */
363 0, /* rightshift */
364 2, /* size (0 = byte, 1 = short, 2 = long) */
365 26, /* bitsize */
b34976b6 366 TRUE, /* pc_relative */
5bd4f169
AM
367 0, /* bitpos */
368 complain_overflow_signed, /* complain_on_overflow */
2441e016 369 ppc64_elf_branch_reloc, /* special_function */
5bd4f169 370 "R_PPC64_REL24", /* name */
b34976b6 371 FALSE, /* partial_inplace */
d006db6c 372 0, /* src_mask */
f5e87a1d 373 0x03fffffc, /* dst_mask */
b34976b6 374 TRUE), /* pcrel_offset */
5bd4f169
AM
375
376 /* A relative 16 bit branch; the lower two bits must be zero. */
377 HOWTO (R_PPC64_REL14, /* type */
378 0, /* rightshift */
379 2, /* size (0 = byte, 1 = short, 2 = long) */
380 16, /* bitsize */
b34976b6 381 TRUE, /* pc_relative */
5bd4f169
AM
382 0, /* bitpos */
383 complain_overflow_signed, /* complain_on_overflow */
2441e016 384 ppc64_elf_branch_reloc, /* special_function */
5bd4f169 385 "R_PPC64_REL14", /* name */
b34976b6 386 FALSE, /* partial_inplace */
d006db6c 387 0, /* src_mask */
f5e87a1d 388 0x0000fffc, /* dst_mask */
b34976b6 389 TRUE), /* pcrel_offset */
5bd4f169
AM
390
391 /* A relative 16 bit branch. Bit 10 should be set to indicate that
392 the branch is expected to be taken. The lower two bits must be
393 zero. */
394 HOWTO (R_PPC64_REL14_BRTAKEN, /* type */
395 0, /* rightshift */
396 2, /* size (0 = byte, 1 = short, 2 = long) */
397 16, /* bitsize */
b34976b6 398 TRUE, /* pc_relative */
5bd4f169
AM
399 0, /* bitpos */
400 complain_overflow_signed, /* complain_on_overflow */
805fc799 401 ppc64_elf_brtaken_reloc, /* special_function */
5bd4f169 402 "R_PPC64_REL14_BRTAKEN", /* name */
b34976b6 403 FALSE, /* partial_inplace */
d006db6c 404 0, /* src_mask */
f5e87a1d 405 0x0000fffc, /* dst_mask */
b34976b6 406 TRUE), /* pcrel_offset */
5bd4f169
AM
407
408 /* A relative 16 bit branch. Bit 10 should be set to indicate that
409 the branch is not expected to be taken. The lower two bits must
410 be zero. */
411 HOWTO (R_PPC64_REL14_BRNTAKEN, /* type */
412 0, /* rightshift */
413 2, /* size (0 = byte, 1 = short, 2 = long) */
414 16, /* bitsize */
b34976b6 415 TRUE, /* pc_relative */
5bd4f169
AM
416 0, /* bitpos */
417 complain_overflow_signed, /* complain_on_overflow */
805fc799 418 ppc64_elf_brtaken_reloc, /* special_function */
5bd4f169 419 "R_PPC64_REL14_BRNTAKEN",/* name */
b34976b6 420 FALSE, /* partial_inplace */
d006db6c 421 0, /* src_mask */
f5e87a1d 422 0x0000fffc, /* dst_mask */
b34976b6 423 TRUE), /* pcrel_offset */
5bd4f169
AM
424
425 /* Like R_PPC64_ADDR16, but referring to the GOT table entry for the
426 symbol. */
427 HOWTO (R_PPC64_GOT16, /* type */
428 0, /* rightshift */
429 1, /* size (0 = byte, 1 = short, 2 = long) */
430 16, /* bitsize */
b34976b6 431 FALSE, /* pc_relative */
5bd4f169
AM
432 0, /* bitpos */
433 complain_overflow_signed, /* complain_on_overflow */
805fc799 434 ppc64_elf_unhandled_reloc, /* special_function */
5bd4f169 435 "R_PPC64_GOT16", /* name */
b34976b6 436 FALSE, /* partial_inplace */
5bd4f169
AM
437 0, /* src_mask */
438 0xffff, /* dst_mask */
b34976b6 439 FALSE), /* pcrel_offset */
5bd4f169
AM
440
441 /* Like R_PPC64_ADDR16_LO, but referring to the GOT table entry for
442 the symbol. */
443 HOWTO (R_PPC64_GOT16_LO, /* type */
444 0, /* rightshift */
445 1, /* size (0 = byte, 1 = short, 2 = long) */
446 16, /* bitsize */
b34976b6 447 FALSE, /* pc_relative */
5bd4f169
AM
448 0, /* bitpos */
449 complain_overflow_dont, /* complain_on_overflow */
805fc799 450 ppc64_elf_unhandled_reloc, /* special_function */
5bd4f169 451 "R_PPC64_GOT16_LO", /* name */
b34976b6 452 FALSE, /* partial_inplace */
5bd4f169
AM
453 0, /* src_mask */
454 0xffff, /* dst_mask */
b34976b6 455 FALSE), /* pcrel_offset */
5bd4f169
AM
456
457 /* Like R_PPC64_ADDR16_HI, but referring to the GOT table entry for
458 the symbol. */
459 HOWTO (R_PPC64_GOT16_HI, /* type */
460 16, /* rightshift */
461 1, /* size (0 = byte, 1 = short, 2 = long) */
462 16, /* bitsize */
b34976b6 463 FALSE, /* pc_relative */
5bd4f169
AM
464 0, /* bitpos */
465 complain_overflow_dont,/* complain_on_overflow */
805fc799 466 ppc64_elf_unhandled_reloc, /* special_function */
5bd4f169 467 "R_PPC64_GOT16_HI", /* name */
b34976b6 468 FALSE, /* partial_inplace */
5bd4f169
AM
469 0, /* src_mask */
470 0xffff, /* dst_mask */
b34976b6 471 FALSE), /* pcrel_offset */
5bd4f169
AM
472
473 /* Like R_PPC64_ADDR16_HA, but referring to the GOT table entry for
474 the symbol. */
475 HOWTO (R_PPC64_GOT16_HA, /* type */
476 16, /* rightshift */
477 1, /* size (0 = byte, 1 = short, 2 = long) */
478 16, /* bitsize */
b34976b6 479 FALSE, /* pc_relative */
5bd4f169
AM
480 0, /* bitpos */
481 complain_overflow_dont,/* complain_on_overflow */
805fc799 482 ppc64_elf_unhandled_reloc, /* special_function */
5bd4f169 483 "R_PPC64_GOT16_HA", /* name */
b34976b6 484 FALSE, /* partial_inplace */
5bd4f169
AM
485 0, /* src_mask */
486 0xffff, /* dst_mask */
b34976b6 487 FALSE), /* pcrel_offset */
5bd4f169
AM
488
489 /* This is used only by the dynamic linker. The symbol should exist
490 both in the object being run and in some shared library. The
491 dynamic linker copies the data addressed by the symbol from the
492 shared library into the object, because the object being
493 run has to have the data at some particular address. */
494 HOWTO (R_PPC64_COPY, /* type */
495 0, /* rightshift */
f5e87a1d
AM
496 0, /* this one is variable size */
497 0, /* bitsize */
b34976b6 498 FALSE, /* pc_relative */
5bd4f169 499 0, /* bitpos */
f5e87a1d
AM
500 complain_overflow_dont, /* complain_on_overflow */
501 ppc64_elf_unhandled_reloc, /* special_function */
5bd4f169 502 "R_PPC64_COPY", /* name */
b34976b6 503 FALSE, /* partial_inplace */
5bd4f169
AM
504 0, /* src_mask */
505 0, /* dst_mask */
b34976b6 506 FALSE), /* pcrel_offset */
5bd4f169
AM
507
508 /* Like R_PPC64_ADDR64, but used when setting global offset table
509 entries. */
510 HOWTO (R_PPC64_GLOB_DAT, /* type */
511 0, /* rightshift */
512 4, /* size (0=byte, 1=short, 2=long, 4=64 bits) */
513 64, /* bitsize */
b34976b6 514 FALSE, /* pc_relative */
5bd4f169
AM
515 0, /* bitpos */
516 complain_overflow_dont, /* complain_on_overflow */
805fc799 517 ppc64_elf_unhandled_reloc, /* special_function */
5bd4f169 518 "R_PPC64_GLOB_DAT", /* name */
b34976b6 519 FALSE, /* partial_inplace */
5bd4f169 520 0, /* src_mask */
f5e87a1d 521 ONES (64), /* dst_mask */
b34976b6 522 FALSE), /* pcrel_offset */
5bd4f169
AM
523
524 /* Created by the link editor. Marks a procedure linkage table
525 entry for a symbol. */
526 HOWTO (R_PPC64_JMP_SLOT, /* type */
527 0, /* rightshift */
528 0, /* size (0 = byte, 1 = short, 2 = long) */
529 0, /* bitsize */
b34976b6 530 FALSE, /* pc_relative */
5bd4f169
AM
531 0, /* bitpos */
532 complain_overflow_dont, /* complain_on_overflow */
805fc799 533 ppc64_elf_unhandled_reloc, /* special_function */
5bd4f169 534 "R_PPC64_JMP_SLOT", /* name */
b34976b6 535 FALSE, /* partial_inplace */
5bd4f169
AM
536 0, /* src_mask */
537 0, /* dst_mask */
b34976b6 538 FALSE), /* pcrel_offset */
5bd4f169
AM
539
540 /* Used only by the dynamic linker. When the object is run, this
541 doubleword64 is set to the load address of the object, plus the
542 addend. */
543 HOWTO (R_PPC64_RELATIVE, /* type */
544 0, /* rightshift */
545 4, /* size (0=byte, 1=short, 2=long, 4=64 bits) */
546 64, /* bitsize */
b34976b6 547 FALSE, /* pc_relative */
5bd4f169
AM
548 0, /* bitpos */
549 complain_overflow_dont, /* complain_on_overflow */
550 bfd_elf_generic_reloc, /* special_function */
551 "R_PPC64_RELATIVE", /* name */
b34976b6 552 FALSE, /* partial_inplace */
5bd4f169 553 0, /* src_mask */
f5e87a1d 554 ONES (64), /* dst_mask */
b34976b6 555 FALSE), /* pcrel_offset */
5bd4f169
AM
556
557 /* Like R_PPC64_ADDR32, but may be unaligned. */
558 HOWTO (R_PPC64_UADDR32, /* type */
559 0, /* rightshift */
560 2, /* size (0 = byte, 1 = short, 2 = long) */
561 32, /* bitsize */
b34976b6 562 FALSE, /* pc_relative */
5bd4f169
AM
563 0, /* bitpos */
564 complain_overflow_bitfield, /* complain_on_overflow */
565 bfd_elf_generic_reloc, /* special_function */
566 "R_PPC64_UADDR32", /* name */
b34976b6 567 FALSE, /* partial_inplace */
5bd4f169
AM
568 0, /* src_mask */
569 0xffffffff, /* dst_mask */
b34976b6 570 FALSE), /* pcrel_offset */
5bd4f169
AM
571
572 /* Like R_PPC64_ADDR16, but may be unaligned. */
573 HOWTO (R_PPC64_UADDR16, /* type */
574 0, /* rightshift */
575 1, /* size (0 = byte, 1 = short, 2 = long) */
576 16, /* bitsize */
b34976b6 577 FALSE, /* pc_relative */
5bd4f169
AM
578 0, /* bitpos */
579 complain_overflow_bitfield, /* complain_on_overflow */
580 bfd_elf_generic_reloc, /* special_function */
581 "R_PPC64_UADDR16", /* name */
b34976b6 582 FALSE, /* partial_inplace */
5bd4f169
AM
583 0, /* src_mask */
584 0xffff, /* dst_mask */
b34976b6 585 FALSE), /* pcrel_offset */
5bd4f169
AM
586
587 /* 32-bit PC relative. */
588 HOWTO (R_PPC64_REL32, /* type */
589 0, /* rightshift */
590 2, /* size (0 = byte, 1 = short, 2 = long) */
591 32, /* bitsize */
b34976b6 592 TRUE, /* pc_relative */
5bd4f169 593 0, /* bitpos */
cedb70c5 594 /* FIXME: Verify. Was complain_overflow_bitfield. */
5bd4f169
AM
595 complain_overflow_signed, /* complain_on_overflow */
596 bfd_elf_generic_reloc, /* special_function */
597 "R_PPC64_REL32", /* name */
b34976b6 598 FALSE, /* partial_inplace */
5bd4f169
AM
599 0, /* src_mask */
600 0xffffffff, /* dst_mask */
b34976b6 601 TRUE), /* pcrel_offset */
5bd4f169 602
10ed1bba 603 /* 32-bit relocation to the symbol's procedure linkage table. */
5bd4f169
AM
604 HOWTO (R_PPC64_PLT32, /* type */
605 0, /* rightshift */
606 2, /* size (0 = byte, 1 = short, 2 = long) */
607 32, /* bitsize */
b34976b6 608 FALSE, /* pc_relative */
5bd4f169
AM
609 0, /* bitpos */
610 complain_overflow_bitfield, /* complain_on_overflow */
805fc799 611 ppc64_elf_unhandled_reloc, /* special_function */
5bd4f169 612 "R_PPC64_PLT32", /* name */
b34976b6 613 FALSE, /* partial_inplace */
5bd4f169 614 0, /* src_mask */
f5e87a1d 615 0xffffffff, /* dst_mask */
b34976b6 616 FALSE), /* pcrel_offset */
5bd4f169
AM
617
618 /* 32-bit PC relative relocation to the symbol's procedure linkage table.
619 FIXME: R_PPC64_PLTREL32 not supported. */
620 HOWTO (R_PPC64_PLTREL32, /* type */
621 0, /* rightshift */
622 2, /* size (0 = byte, 1 = short, 2 = long) */
623 32, /* bitsize */
b34976b6 624 TRUE, /* pc_relative */
5bd4f169
AM
625 0, /* bitpos */
626 complain_overflow_signed, /* complain_on_overflow */
627 bfd_elf_generic_reloc, /* special_function */
628 "R_PPC64_PLTREL32", /* name */
b34976b6 629 FALSE, /* partial_inplace */
5bd4f169 630 0, /* src_mask */
f5e87a1d 631 0xffffffff, /* dst_mask */
b34976b6 632 TRUE), /* pcrel_offset */
5bd4f169
AM
633
634 /* Like R_PPC64_ADDR16_LO, but referring to the PLT table entry for
635 the symbol. */
636 HOWTO (R_PPC64_PLT16_LO, /* type */
637 0, /* rightshift */
638 1, /* size (0 = byte, 1 = short, 2 = long) */
639 16, /* bitsize */
b34976b6 640 FALSE, /* pc_relative */
5bd4f169
AM
641 0, /* bitpos */
642 complain_overflow_dont, /* complain_on_overflow */
805fc799 643 ppc64_elf_unhandled_reloc, /* special_function */
5bd4f169 644 "R_PPC64_PLT16_LO", /* name */
b34976b6 645 FALSE, /* partial_inplace */
5bd4f169
AM
646 0, /* src_mask */
647 0xffff, /* dst_mask */
b34976b6 648 FALSE), /* pcrel_offset */
5bd4f169
AM
649
650 /* Like R_PPC64_ADDR16_HI, but referring to the PLT table entry for
651 the symbol. */
652 HOWTO (R_PPC64_PLT16_HI, /* type */
653 16, /* rightshift */
654 1, /* size (0 = byte, 1 = short, 2 = long) */
655 16, /* bitsize */
b34976b6 656 FALSE, /* pc_relative */
5bd4f169
AM
657 0, /* bitpos */
658 complain_overflow_dont, /* complain_on_overflow */
805fc799 659 ppc64_elf_unhandled_reloc, /* special_function */
5bd4f169 660 "R_PPC64_PLT16_HI", /* name */
b34976b6 661 FALSE, /* partial_inplace */
5bd4f169
AM
662 0, /* src_mask */
663 0xffff, /* dst_mask */
b34976b6 664 FALSE), /* pcrel_offset */
5bd4f169
AM
665
666 /* Like R_PPC64_ADDR16_HA, but referring to the PLT table entry for
667 the symbol. */
668 HOWTO (R_PPC64_PLT16_HA, /* type */
669 16, /* rightshift */
670 1, /* size (0 = byte, 1 = short, 2 = long) */
671 16, /* bitsize */
b34976b6 672 FALSE, /* pc_relative */
5bd4f169
AM
673 0, /* bitpos */
674 complain_overflow_dont, /* complain_on_overflow */
805fc799 675 ppc64_elf_unhandled_reloc, /* special_function */
5bd4f169 676 "R_PPC64_PLT16_HA", /* name */
b34976b6 677 FALSE, /* partial_inplace */
5bd4f169
AM
678 0, /* src_mask */
679 0xffff, /* dst_mask */
b34976b6 680 FALSE), /* pcrel_offset */
5bd4f169 681
c061c2d8 682 /* 16-bit section relative relocation. */
5bd4f169
AM
683 HOWTO (R_PPC64_SECTOFF, /* type */
684 0, /* rightshift */
c061c2d8
AM
685 1, /* size (0 = byte, 1 = short, 2 = long) */
686 16, /* bitsize */
b34976b6 687 FALSE, /* pc_relative */
5bd4f169
AM
688 0, /* bitpos */
689 complain_overflow_bitfield, /* complain_on_overflow */
805fc799 690 ppc64_elf_sectoff_reloc, /* special_function */
5bd4f169 691 "R_PPC64_SECTOFF", /* name */
b34976b6 692 FALSE, /* partial_inplace */
5bd4f169 693 0, /* src_mask */
c061c2d8 694 0xffff, /* dst_mask */
b34976b6 695 FALSE), /* pcrel_offset */
5bd4f169 696
c061c2d8 697 /* Like R_PPC64_SECTOFF, but no overflow warning. */
5bd4f169
AM
698 HOWTO (R_PPC64_SECTOFF_LO, /* type */
699 0, /* rightshift */
700 1, /* size (0 = byte, 1 = short, 2 = long) */
701 16, /* bitsize */
b34976b6 702 FALSE, /* pc_relative */
5bd4f169
AM
703 0, /* bitpos */
704 complain_overflow_dont, /* complain_on_overflow */
805fc799 705 ppc64_elf_sectoff_reloc, /* special_function */
5bd4f169 706 "R_PPC64_SECTOFF_LO", /* name */
b34976b6 707 FALSE, /* partial_inplace */
5bd4f169
AM
708 0, /* src_mask */
709 0xffff, /* dst_mask */
b34976b6 710 FALSE), /* pcrel_offset */
5bd4f169
AM
711
712 /* 16-bit upper half section relative relocation. */
713 HOWTO (R_PPC64_SECTOFF_HI, /* type */
714 16, /* rightshift */
715 1, /* size (0 = byte, 1 = short, 2 = long) */
716 16, /* bitsize */
b34976b6 717 FALSE, /* pc_relative */
5bd4f169
AM
718 0, /* bitpos */
719 complain_overflow_dont, /* complain_on_overflow */
805fc799 720 ppc64_elf_sectoff_reloc, /* special_function */
5bd4f169 721 "R_PPC64_SECTOFF_HI", /* name */
b34976b6 722 FALSE, /* partial_inplace */
5bd4f169
AM
723 0, /* src_mask */
724 0xffff, /* dst_mask */
b34976b6 725 FALSE), /* pcrel_offset */
5bd4f169
AM
726
727 /* 16-bit upper half adjusted section relative relocation. */
728 HOWTO (R_PPC64_SECTOFF_HA, /* type */
729 16, /* rightshift */
730 1, /* size (0 = byte, 1 = short, 2 = long) */
731 16, /* bitsize */
b34976b6 732 FALSE, /* pc_relative */
5bd4f169
AM
733 0, /* bitpos */
734 complain_overflow_dont, /* complain_on_overflow */
805fc799 735 ppc64_elf_sectoff_ha_reloc, /* special_function */
5bd4f169 736 "R_PPC64_SECTOFF_HA", /* name */
b34976b6 737 FALSE, /* partial_inplace */
5bd4f169
AM
738 0, /* src_mask */
739 0xffff, /* dst_mask */
b34976b6 740 FALSE), /* pcrel_offset */
5bd4f169 741
04c9666a
AM
742 /* Like R_PPC64_REL24 without touching the two least significant bits. */
743 HOWTO (R_PPC64_REL30, /* type */
5bd4f169
AM
744 2, /* rightshift */
745 2, /* size (0 = byte, 1 = short, 2 = long) */
746 30, /* bitsize */
b34976b6 747 TRUE, /* pc_relative */
5bd4f169
AM
748 0, /* bitpos */
749 complain_overflow_dont, /* complain_on_overflow */
750 bfd_elf_generic_reloc, /* special_function */
04c9666a 751 "R_PPC64_REL30", /* name */
b34976b6 752 FALSE, /* partial_inplace */
d006db6c 753 0, /* src_mask */
5bd4f169 754 0xfffffffc, /* dst_mask */
b34976b6 755 TRUE), /* pcrel_offset */
5bd4f169
AM
756
757 /* Relocs in the 64-bit PowerPC ELF ABI, not in the 32-bit ABI. */
758
759 /* A standard 64-bit relocation. */
760 HOWTO (R_PPC64_ADDR64, /* type */
761 0, /* rightshift */
762 4, /* size (0=byte, 1=short, 2=long, 4=64 bits) */
763 64, /* bitsize */
b34976b6 764 FALSE, /* pc_relative */
5bd4f169
AM
765 0, /* bitpos */
766 complain_overflow_dont, /* complain_on_overflow */
767 bfd_elf_generic_reloc, /* special_function */
768 "R_PPC64_ADDR64", /* name */
b34976b6 769 FALSE, /* partial_inplace */
5bd4f169 770 0, /* src_mask */
f5e87a1d 771 ONES (64), /* dst_mask */
b34976b6 772 FALSE), /* pcrel_offset */
5bd4f169
AM
773
774 /* The bits 32-47 of an address. */
775 HOWTO (R_PPC64_ADDR16_HIGHER, /* type */
776 32, /* rightshift */
777 1, /* size (0 = byte, 1 = short, 2 = long) */
778 16, /* bitsize */
b34976b6 779 FALSE, /* pc_relative */
5bd4f169
AM
780 0, /* bitpos */
781 complain_overflow_dont, /* complain_on_overflow */
782 bfd_elf_generic_reloc, /* special_function */
783 "R_PPC64_ADDR16_HIGHER", /* name */
b34976b6 784 FALSE, /* partial_inplace */
5bd4f169
AM
785 0, /* src_mask */
786 0xffff, /* dst_mask */
b34976b6 787 FALSE), /* pcrel_offset */
5bd4f169
AM
788
789 /* The bits 32-47 of an address, plus 1 if the contents of the low
790 16 bits, treated as a signed number, is negative. */
791 HOWTO (R_PPC64_ADDR16_HIGHERA, /* type */
792 32, /* rightshift */
793 1, /* size (0 = byte, 1 = short, 2 = long) */
794 16, /* bitsize */
b34976b6 795 FALSE, /* pc_relative */
5bd4f169
AM
796 0, /* bitpos */
797 complain_overflow_dont, /* complain_on_overflow */
805fc799 798 ppc64_elf_ha_reloc, /* special_function */
5bd4f169 799 "R_PPC64_ADDR16_HIGHERA", /* name */
b34976b6 800 FALSE, /* partial_inplace */
5bd4f169
AM
801 0, /* src_mask */
802 0xffff, /* dst_mask */
b34976b6 803 FALSE), /* pcrel_offset */
5bd4f169
AM
804
805 /* The bits 48-63 of an address. */
806 HOWTO (R_PPC64_ADDR16_HIGHEST,/* type */
807 48, /* rightshift */
808 1, /* size (0 = byte, 1 = short, 2 = long) */
809 16, /* bitsize */
b34976b6 810 FALSE, /* pc_relative */
5bd4f169
AM
811 0, /* bitpos */
812 complain_overflow_dont, /* complain_on_overflow */
813 bfd_elf_generic_reloc, /* special_function */
814 "R_PPC64_ADDR16_HIGHEST", /* name */
b34976b6 815 FALSE, /* partial_inplace */
5bd4f169
AM
816 0, /* src_mask */
817 0xffff, /* dst_mask */
b34976b6 818 FALSE), /* pcrel_offset */
5bd4f169
AM
819
820 /* The bits 48-63 of an address, plus 1 if the contents of the low
821 16 bits, treated as a signed number, is negative. */
822 HOWTO (R_PPC64_ADDR16_HIGHESTA,/* type */
823 48, /* rightshift */
824 1, /* size (0 = byte, 1 = short, 2 = long) */
825 16, /* bitsize */
b34976b6 826 FALSE, /* pc_relative */
5bd4f169
AM
827 0, /* bitpos */
828 complain_overflow_dont, /* complain_on_overflow */
805fc799 829 ppc64_elf_ha_reloc, /* special_function */
5bd4f169 830 "R_PPC64_ADDR16_HIGHESTA", /* name */
b34976b6 831 FALSE, /* partial_inplace */
5bd4f169
AM
832 0, /* src_mask */
833 0xffff, /* dst_mask */
b34976b6 834 FALSE), /* pcrel_offset */
5bd4f169
AM
835
836 /* Like ADDR64, but may be unaligned. */
837 HOWTO (R_PPC64_UADDR64, /* type */
838 0, /* rightshift */
839 4, /* size (0=byte, 1=short, 2=long, 4=64 bits) */
840 64, /* bitsize */
b34976b6 841 FALSE, /* pc_relative */
5bd4f169
AM
842 0, /* bitpos */
843 complain_overflow_dont, /* complain_on_overflow */
844 bfd_elf_generic_reloc, /* special_function */
845 "R_PPC64_UADDR64", /* name */
b34976b6 846 FALSE, /* partial_inplace */
5bd4f169 847 0, /* src_mask */
f5e87a1d 848 ONES (64), /* dst_mask */
b34976b6 849 FALSE), /* pcrel_offset */
5bd4f169
AM
850
851 /* 64-bit relative relocation. */
852 HOWTO (R_PPC64_REL64, /* type */
853 0, /* rightshift */
854 4, /* size (0=byte, 1=short, 2=long, 4=64 bits) */
855 64, /* bitsize */
b34976b6 856 TRUE, /* pc_relative */
5bd4f169
AM
857 0, /* bitpos */
858 complain_overflow_dont, /* complain_on_overflow */
859 bfd_elf_generic_reloc, /* special_function */
860 "R_PPC64_REL64", /* name */
b34976b6 861 FALSE, /* partial_inplace */
5bd4f169 862 0, /* src_mask */
f5e87a1d 863 ONES (64), /* dst_mask */
b34976b6 864 TRUE), /* pcrel_offset */
5bd4f169 865
cedb70c5 866 /* 64-bit relocation to the symbol's procedure linkage table. */
5bd4f169
AM
867 HOWTO (R_PPC64_PLT64, /* type */
868 0, /* rightshift */
869 4, /* size (0=byte, 1=short, 2=long, 4=64 bits) */
870 64, /* bitsize */
b34976b6 871 FALSE, /* pc_relative */
5bd4f169
AM
872 0, /* bitpos */
873 complain_overflow_dont, /* complain_on_overflow */
805fc799 874 ppc64_elf_unhandled_reloc, /* special_function */
5bd4f169 875 "R_PPC64_PLT64", /* name */
b34976b6 876 FALSE, /* partial_inplace */
5bd4f169 877 0, /* src_mask */
f5e87a1d 878 ONES (64), /* dst_mask */
b34976b6 879 FALSE), /* pcrel_offset */
5bd4f169
AM
880
881 /* 64-bit PC relative relocation to the symbol's procedure linkage
882 table. */
883 /* FIXME: R_PPC64_PLTREL64 not supported. */
884 HOWTO (R_PPC64_PLTREL64, /* type */
885 0, /* rightshift */
886 4, /* size (0=byte, 1=short, 2=long, 4=64 bits) */
887 64, /* bitsize */
b34976b6 888 TRUE, /* pc_relative */
5bd4f169
AM
889 0, /* bitpos */
890 complain_overflow_dont, /* complain_on_overflow */
805fc799 891 ppc64_elf_unhandled_reloc, /* special_function */
5bd4f169 892 "R_PPC64_PLTREL64", /* name */
b34976b6 893 FALSE, /* partial_inplace */
5bd4f169 894 0, /* src_mask */
f5e87a1d 895 ONES (64), /* dst_mask */
b34976b6 896 TRUE), /* pcrel_offset */
5bd4f169
AM
897
898 /* 16 bit TOC-relative relocation. */
899
900 /* R_PPC64_TOC16 47 half16* S + A - .TOC. */
901 HOWTO (R_PPC64_TOC16, /* type */
902 0, /* rightshift */
903 1, /* size (0 = byte, 1 = short, 2 = long) */
904 16, /* bitsize */
b34976b6 905 FALSE, /* pc_relative */
5bd4f169
AM
906 0, /* bitpos */
907 complain_overflow_signed, /* complain_on_overflow */
805fc799 908 ppc64_elf_toc_reloc, /* special_function */
5bd4f169 909 "R_PPC64_TOC16", /* name */
b34976b6 910 FALSE, /* partial_inplace */
5bd4f169
AM
911 0, /* src_mask */
912 0xffff, /* dst_mask */
b34976b6 913 FALSE), /* pcrel_offset */
5bd4f169
AM
914
915 /* 16 bit TOC-relative relocation without overflow. */
916
917 /* R_PPC64_TOC16_LO 48 half16 #lo (S + A - .TOC.) */
918 HOWTO (R_PPC64_TOC16_LO, /* type */
919 0, /* rightshift */
920 1, /* size (0 = byte, 1 = short, 2 = long) */
921 16, /* bitsize */
b34976b6 922 FALSE, /* pc_relative */
5bd4f169
AM
923 0, /* bitpos */
924 complain_overflow_dont, /* complain_on_overflow */
805fc799 925 ppc64_elf_toc_reloc, /* special_function */
5bd4f169 926 "R_PPC64_TOC16_LO", /* name */
b34976b6 927 FALSE, /* partial_inplace */
5bd4f169
AM
928 0, /* src_mask */
929 0xffff, /* dst_mask */
b34976b6 930 FALSE), /* pcrel_offset */
5bd4f169
AM
931
932 /* 16 bit TOC-relative relocation, high 16 bits. */
933
934 /* R_PPC64_TOC16_HI 49 half16 #hi (S + A - .TOC.) */
935 HOWTO (R_PPC64_TOC16_HI, /* type */
936 16, /* rightshift */
937 1, /* size (0 = byte, 1 = short, 2 = long) */
938 16, /* bitsize */
b34976b6 939 FALSE, /* pc_relative */
5bd4f169
AM
940 0, /* bitpos */
941 complain_overflow_dont, /* complain_on_overflow */
805fc799 942 ppc64_elf_toc_reloc, /* special_function */
5bd4f169 943 "R_PPC64_TOC16_HI", /* name */
b34976b6 944 FALSE, /* partial_inplace */
5bd4f169
AM
945 0, /* src_mask */
946 0xffff, /* dst_mask */
b34976b6 947 FALSE), /* pcrel_offset */
5bd4f169
AM
948
949 /* 16 bit TOC-relative relocation, high 16 bits, plus 1 if the
950 contents of the low 16 bits, treated as a signed number, is
951 negative. */
952
953 /* R_PPC64_TOC16_HA 50 half16 #ha (S + A - .TOC.) */
954 HOWTO (R_PPC64_TOC16_HA, /* type */
955 16, /* rightshift */
956 1, /* size (0 = byte, 1 = short, 2 = long) */
957 16, /* bitsize */
b34976b6 958 FALSE, /* pc_relative */
5bd4f169
AM
959 0, /* bitpos */
960 complain_overflow_dont, /* complain_on_overflow */
805fc799 961 ppc64_elf_toc_ha_reloc, /* special_function */
5bd4f169 962 "R_PPC64_TOC16_HA", /* name */
b34976b6 963 FALSE, /* partial_inplace */
5bd4f169
AM
964 0, /* src_mask */
965 0xffff, /* dst_mask */
b34976b6 966 FALSE), /* pcrel_offset */
5bd4f169
AM
967
968 /* 64-bit relocation; insert value of TOC base (.TOC.). */
969
970 /* R_PPC64_TOC 51 doubleword64 .TOC. */
971 HOWTO (R_PPC64_TOC, /* type */
972 0, /* rightshift */
973 4, /* size (0=byte, 1=short, 2=long, 4=64 bits) */
974 64, /* bitsize */
b34976b6 975 FALSE, /* pc_relative */
5bd4f169
AM
976 0, /* bitpos */
977 complain_overflow_bitfield, /* complain_on_overflow */
805fc799 978 ppc64_elf_toc64_reloc, /* special_function */
5bd4f169 979 "R_PPC64_TOC", /* name */
b34976b6 980 FALSE, /* partial_inplace */
5bd4f169 981 0, /* src_mask */
f5e87a1d 982 ONES (64), /* dst_mask */
b34976b6 983 FALSE), /* pcrel_offset */
5bd4f169
AM
984
985 /* Like R_PPC64_GOT16, but also informs the link editor that the
986 value to relocate may (!) refer to a PLT entry which the link
987 editor (a) may replace with the symbol value. If the link editor
988 is unable to fully resolve the symbol, it may (b) create a PLT
989 entry and store the address to the new PLT entry in the GOT.
990 This permits lazy resolution of function symbols at run time.
991 The link editor may also skip all of this and just (c) emit a
992 R_PPC64_GLOB_DAT to tie the symbol to the GOT entry. */
993 /* FIXME: R_PPC64_PLTGOT16 not implemented. */
994 HOWTO (R_PPC64_PLTGOT16, /* type */
995 0, /* rightshift */
996 1, /* size (0 = byte, 1 = short, 2 = long) */
997 16, /* bitsize */
b34976b6 998 FALSE, /* pc_relative */
5bd4f169
AM
999 0, /* bitpos */
1000 complain_overflow_signed, /* complain_on_overflow */
805fc799 1001 ppc64_elf_unhandled_reloc, /* special_function */
411e1bfb
AM
1002 "R_PPC64_PLTGOT16", /* name */
1003 FALSE, /* partial_inplace */
1004 0, /* src_mask */
1005 0xffff, /* dst_mask */
1006 FALSE), /* pcrel_offset */
1007
1008 /* Like R_PPC64_PLTGOT16, but without overflow. */
1009 /* FIXME: R_PPC64_PLTGOT16_LO not implemented. */
1010 HOWTO (R_PPC64_PLTGOT16_LO, /* type */
1011 0, /* rightshift */
1012 1, /* size (0 = byte, 1 = short, 2 = long) */
1013 16, /* bitsize */
1014 FALSE, /* pc_relative */
1015 0, /* bitpos */
1016 complain_overflow_dont, /* complain_on_overflow */
1017 ppc64_elf_unhandled_reloc, /* special_function */
1018 "R_PPC64_PLTGOT16_LO", /* name */
1019 FALSE, /* partial_inplace */
1020 0, /* src_mask */
1021 0xffff, /* dst_mask */
1022 FALSE), /* pcrel_offset */
1023
1024 /* Like R_PPC64_PLT_GOT16, but using bits 16-31 of the address. */
1025 /* FIXME: R_PPC64_PLTGOT16_HI not implemented. */
1026 HOWTO (R_PPC64_PLTGOT16_HI, /* type */
1027 16, /* rightshift */
1028 1, /* size (0 = byte, 1 = short, 2 = long) */
1029 16, /* bitsize */
1030 FALSE, /* pc_relative */
1031 0, /* bitpos */
1032 complain_overflow_dont, /* complain_on_overflow */
1033 ppc64_elf_unhandled_reloc, /* special_function */
1034 "R_PPC64_PLTGOT16_HI", /* name */
1035 FALSE, /* partial_inplace */
1036 0, /* src_mask */
1037 0xffff, /* dst_mask */
1038 FALSE), /* pcrel_offset */
1039
1040 /* Like R_PPC64_PLT_GOT16, but using bits 16-31 of the address, plus
1041 1 if the contents of the low 16 bits, treated as a signed number,
1042 is negative. */
1043 /* FIXME: R_PPC64_PLTGOT16_HA not implemented. */
1044 HOWTO (R_PPC64_PLTGOT16_HA, /* type */
1045 16, /* rightshift */
1046 1, /* size (0 = byte, 1 = short, 2 = long) */
1047 16, /* bitsize */
1048 FALSE, /* pc_relative */
1049 0, /* bitpos */
1050 complain_overflow_dont,/* complain_on_overflow */
1051 ppc64_elf_unhandled_reloc, /* special_function */
1052 "R_PPC64_PLTGOT16_HA", /* name */
1053 FALSE, /* partial_inplace */
1054 0, /* src_mask */
1055 0xffff, /* dst_mask */
1056 FALSE), /* pcrel_offset */
1057
1058 /* Like R_PPC64_ADDR16, but for instructions with a DS field. */
1059 HOWTO (R_PPC64_ADDR16_DS, /* type */
1060 0, /* rightshift */
1061 1, /* size (0 = byte, 1 = short, 2 = long) */
1062 16, /* bitsize */
1063 FALSE, /* pc_relative */
1064 0, /* bitpos */
1065 complain_overflow_bitfield, /* complain_on_overflow */
1066 bfd_elf_generic_reloc, /* special_function */
1067 "R_PPC64_ADDR16_DS", /* name */
1068 FALSE, /* partial_inplace */
1069 0, /* src_mask */
1070 0xfffc, /* dst_mask */
1071 FALSE), /* pcrel_offset */
1072
1073 /* Like R_PPC64_ADDR16_LO, but for instructions with a DS field. */
1074 HOWTO (R_PPC64_ADDR16_LO_DS, /* type */
1075 0, /* rightshift */
1076 1, /* size (0 = byte, 1 = short, 2 = long) */
1077 16, /* bitsize */
1078 FALSE, /* pc_relative */
1079 0, /* bitpos */
1080 complain_overflow_dont,/* complain_on_overflow */
1081 bfd_elf_generic_reloc, /* special_function */
1082 "R_PPC64_ADDR16_LO_DS",/* name */
1083 FALSE, /* partial_inplace */
1084 0, /* src_mask */
1085 0xfffc, /* dst_mask */
1086 FALSE), /* pcrel_offset */
1087
1088 /* Like R_PPC64_GOT16, but for instructions with a DS field. */
1089 HOWTO (R_PPC64_GOT16_DS, /* type */
1090 0, /* rightshift */
1091 1, /* size (0 = byte, 1 = short, 2 = long) */
1092 16, /* bitsize */
1093 FALSE, /* pc_relative */
1094 0, /* bitpos */
1095 complain_overflow_signed, /* complain_on_overflow */
1096 ppc64_elf_unhandled_reloc, /* special_function */
1097 "R_PPC64_GOT16_DS", /* name */
1098 FALSE, /* partial_inplace */
1099 0, /* src_mask */
1100 0xfffc, /* dst_mask */
1101 FALSE), /* pcrel_offset */
1102
1103 /* Like R_PPC64_GOT16_LO, but for instructions with a DS field. */
1104 HOWTO (R_PPC64_GOT16_LO_DS, /* type */
1105 0, /* rightshift */
1106 1, /* size (0 = byte, 1 = short, 2 = long) */
1107 16, /* bitsize */
1108 FALSE, /* pc_relative */
1109 0, /* bitpos */
1110 complain_overflow_dont, /* complain_on_overflow */
1111 ppc64_elf_unhandled_reloc, /* special_function */
1112 "R_PPC64_GOT16_LO_DS", /* name */
1113 FALSE, /* partial_inplace */
1114 0, /* src_mask */
1115 0xfffc, /* dst_mask */
1116 FALSE), /* pcrel_offset */
1117
1118 /* Like R_PPC64_PLT16_LO, but for instructions with a DS field. */
1119 HOWTO (R_PPC64_PLT16_LO_DS, /* type */
1120 0, /* rightshift */
1121 1, /* size (0 = byte, 1 = short, 2 = long) */
1122 16, /* bitsize */
1123 FALSE, /* pc_relative */
1124 0, /* bitpos */
1125 complain_overflow_dont, /* complain_on_overflow */
1126 ppc64_elf_unhandled_reloc, /* special_function */
1127 "R_PPC64_PLT16_LO_DS", /* name */
1128 FALSE, /* partial_inplace */
1129 0, /* src_mask */
1130 0xfffc, /* dst_mask */
1131 FALSE), /* pcrel_offset */
1132
1133 /* Like R_PPC64_SECTOFF, but for instructions with a DS field. */
1134 HOWTO (R_PPC64_SECTOFF_DS, /* type */
1135 0, /* rightshift */
1136 1, /* size (0 = byte, 1 = short, 2 = long) */
1137 16, /* bitsize */
1138 FALSE, /* pc_relative */
1139 0, /* bitpos */
1140 complain_overflow_bitfield, /* complain_on_overflow */
1141 ppc64_elf_sectoff_reloc, /* special_function */
1142 "R_PPC64_SECTOFF_DS", /* name */
1143 FALSE, /* partial_inplace */
1144 0, /* src_mask */
1145 0xfffc, /* dst_mask */
1146 FALSE), /* pcrel_offset */
1147
1148 /* Like R_PPC64_SECTOFF_LO, but for instructions with a DS field. */
1149 HOWTO (R_PPC64_SECTOFF_LO_DS, /* type */
1150 0, /* rightshift */
1151 1, /* size (0 = byte, 1 = short, 2 = long) */
1152 16, /* bitsize */
1153 FALSE, /* pc_relative */
1154 0, /* bitpos */
1155 complain_overflow_dont, /* complain_on_overflow */
1156 ppc64_elf_sectoff_reloc, /* special_function */
1157 "R_PPC64_SECTOFF_LO_DS",/* name */
1158 FALSE, /* partial_inplace */
1159 0, /* src_mask */
1160 0xfffc, /* dst_mask */
1161 FALSE), /* pcrel_offset */
1162
1163 /* Like R_PPC64_TOC16, but for instructions with a DS field. */
1164 HOWTO (R_PPC64_TOC16_DS, /* type */
1165 0, /* rightshift */
1166 1, /* size (0 = byte, 1 = short, 2 = long) */
1167 16, /* bitsize */
1168 FALSE, /* pc_relative */
1169 0, /* bitpos */
1170 complain_overflow_signed, /* complain_on_overflow */
1171 ppc64_elf_toc_reloc, /* special_function */
1172 "R_PPC64_TOC16_DS", /* name */
1173 FALSE, /* partial_inplace */
1174 0, /* src_mask */
1175 0xfffc, /* dst_mask */
1176 FALSE), /* pcrel_offset */
1177
1178 /* Like R_PPC64_TOC16_LO, but for instructions with a DS field. */
1179 HOWTO (R_PPC64_TOC16_LO_DS, /* type */
1180 0, /* rightshift */
1181 1, /* size (0 = byte, 1 = short, 2 = long) */
1182 16, /* bitsize */
1183 FALSE, /* pc_relative */
1184 0, /* bitpos */
1185 complain_overflow_dont, /* complain_on_overflow */
1186 ppc64_elf_toc_reloc, /* special_function */
1187 "R_PPC64_TOC16_LO_DS", /* name */
1188 FALSE, /* partial_inplace */
1189 0, /* src_mask */
1190 0xfffc, /* dst_mask */
1191 FALSE), /* pcrel_offset */
1192
1193 /* Like R_PPC64_PLTGOT16, but for instructions with a DS field. */
1194 /* FIXME: R_PPC64_PLTGOT16_DS not implemented. */
1195 HOWTO (R_PPC64_PLTGOT16_DS, /* type */
1196 0, /* rightshift */
1197 1, /* size (0 = byte, 1 = short, 2 = long) */
1198 16, /* bitsize */
1199 FALSE, /* pc_relative */
1200 0, /* bitpos */
1201 complain_overflow_signed, /* complain_on_overflow */
1202 ppc64_elf_unhandled_reloc, /* special_function */
1203 "R_PPC64_PLTGOT16_DS", /* name */
1204 FALSE, /* partial_inplace */
1205 0, /* src_mask */
1206 0xfffc, /* dst_mask */
1207 FALSE), /* pcrel_offset */
1208
1209 /* Like R_PPC64_PLTGOT16_LO, but for instructions with a DS field. */
1210 /* FIXME: R_PPC64_PLTGOT16_LO not implemented. */
1211 HOWTO (R_PPC64_PLTGOT16_LO_DS,/* type */
1212 0, /* rightshift */
1213 1, /* size (0 = byte, 1 = short, 2 = long) */
1214 16, /* bitsize */
1215 FALSE, /* pc_relative */
1216 0, /* bitpos */
1217 complain_overflow_dont, /* complain_on_overflow */
1218 ppc64_elf_unhandled_reloc, /* special_function */
1219 "R_PPC64_PLTGOT16_LO_DS",/* name */
1220 FALSE, /* partial_inplace */
1221 0, /* src_mask */
1222 0xfffc, /* dst_mask */
1223 FALSE), /* pcrel_offset */
1224
1225 /* Marker reloc for TLS. */
1226 HOWTO (R_PPC64_TLS,
1227 0, /* rightshift */
1228 2, /* size (0 = byte, 1 = short, 2 = long) */
1229 32, /* bitsize */
1230 FALSE, /* pc_relative */
1231 0, /* bitpos */
1232 complain_overflow_dont, /* complain_on_overflow */
1233 bfd_elf_generic_reloc, /* special_function */
1234 "R_PPC64_TLS", /* name */
1235 FALSE, /* partial_inplace */
1236 0, /* src_mask */
1237 0, /* dst_mask */
1238 FALSE), /* pcrel_offset */
1239
1240 /* Computes the load module index of the load module that contains the
1241 definition of its TLS sym. */
1242 HOWTO (R_PPC64_DTPMOD64,
1243 0, /* rightshift */
1244 4, /* size (0 = byte, 1 = short, 2 = long) */
1245 64, /* bitsize */
1246 FALSE, /* pc_relative */
1247 0, /* bitpos */
1248 complain_overflow_dont, /* complain_on_overflow */
1249 ppc64_elf_unhandled_reloc, /* special_function */
1250 "R_PPC64_DTPMOD64", /* name */
1251 FALSE, /* partial_inplace */
1252 0, /* src_mask */
1253 ONES (64), /* dst_mask */
1254 FALSE), /* pcrel_offset */
1255
1256 /* Computes a dtv-relative displacement, the difference between the value
1257 of sym+add and the base address of the thread-local storage block that
1258 contains the definition of sym, minus 0x8000. */
1259 HOWTO (R_PPC64_DTPREL64,
1260 0, /* rightshift */
1261 4, /* size (0 = byte, 1 = short, 2 = long) */
1262 64, /* bitsize */
1263 FALSE, /* pc_relative */
1264 0, /* bitpos */
1265 complain_overflow_dont, /* complain_on_overflow */
1266 ppc64_elf_unhandled_reloc, /* special_function */
1267 "R_PPC64_DTPREL64", /* name */
1268 FALSE, /* partial_inplace */
1269 0, /* src_mask */
1270 ONES (64), /* dst_mask */
1271 FALSE), /* pcrel_offset */
1272
1273 /* A 16 bit dtprel reloc. */
1274 HOWTO (R_PPC64_DTPREL16,
1275 0, /* rightshift */
1276 1, /* size (0 = byte, 1 = short, 2 = long) */
1277 16, /* bitsize */
1278 FALSE, /* pc_relative */
1279 0, /* bitpos */
1280 complain_overflow_signed, /* complain_on_overflow */
1281 ppc64_elf_unhandled_reloc, /* special_function */
1282 "R_PPC64_DTPREL16", /* name */
1283 FALSE, /* partial_inplace */
1284 0, /* src_mask */
1285 0xffff, /* dst_mask */
1286 FALSE), /* pcrel_offset */
1287
1288 /* Like DTPREL16, but no overflow. */
1289 HOWTO (R_PPC64_DTPREL16_LO,
1290 0, /* rightshift */
1291 1, /* size (0 = byte, 1 = short, 2 = long) */
1292 16, /* bitsize */
1293 FALSE, /* pc_relative */
1294 0, /* bitpos */
1295 complain_overflow_dont, /* complain_on_overflow */
1296 ppc64_elf_unhandled_reloc, /* special_function */
1297 "R_PPC64_DTPREL16_LO", /* name */
1298 FALSE, /* partial_inplace */
1299 0, /* src_mask */
1300 0xffff, /* dst_mask */
1301 FALSE), /* pcrel_offset */
1302
1303 /* Like DTPREL16_LO, but next higher group of 16 bits. */
1304 HOWTO (R_PPC64_DTPREL16_HI,
1305 16, /* rightshift */
1306 1, /* size (0 = byte, 1 = short, 2 = long) */
1307 16, /* bitsize */
1308 FALSE, /* pc_relative */
1309 0, /* bitpos */
1310 complain_overflow_dont, /* complain_on_overflow */
1311 ppc64_elf_unhandled_reloc, /* special_function */
1312 "R_PPC64_DTPREL16_HI", /* name */
1313 FALSE, /* partial_inplace */
1314 0, /* src_mask */
1315 0xffff, /* dst_mask */
1316 FALSE), /* pcrel_offset */
1317
1318 /* Like DTPREL16_HI, but adjust for low 16 bits. */
1319 HOWTO (R_PPC64_DTPREL16_HA,
1320 16, /* rightshift */
1321 1, /* size (0 = byte, 1 = short, 2 = long) */
1322 16, /* bitsize */
1323 FALSE, /* pc_relative */
1324 0, /* bitpos */
1325 complain_overflow_dont, /* complain_on_overflow */
1326 ppc64_elf_unhandled_reloc, /* special_function */
1327 "R_PPC64_DTPREL16_HA", /* name */
1328 FALSE, /* partial_inplace */
1329 0, /* src_mask */
1330 0xffff, /* dst_mask */
1331 FALSE), /* pcrel_offset */
1332
1333 /* Like DTPREL16_HI, but next higher group of 16 bits. */
1334 HOWTO (R_PPC64_DTPREL16_HIGHER,
1335 32, /* rightshift */
1336 1, /* size (0 = byte, 1 = short, 2 = long) */
1337 16, /* bitsize */
1338 FALSE, /* pc_relative */
1339 0, /* bitpos */
1340 complain_overflow_dont, /* complain_on_overflow */
1341 ppc64_elf_unhandled_reloc, /* special_function */
1342 "R_PPC64_DTPREL16_HIGHER", /* name */
1343 FALSE, /* partial_inplace */
1344 0, /* src_mask */
1345 0xffff, /* dst_mask */
1346 FALSE), /* pcrel_offset */
1347
1348 /* Like DTPREL16_HIGHER, but adjust for low 16 bits. */
1349 HOWTO (R_PPC64_DTPREL16_HIGHERA,
1350 32, /* rightshift */
1351 1, /* size (0 = byte, 1 = short, 2 = long) */
1352 16, /* bitsize */
1353 FALSE, /* pc_relative */
1354 0, /* bitpos */
1355 complain_overflow_dont, /* complain_on_overflow */
1356 ppc64_elf_unhandled_reloc, /* special_function */
1357 "R_PPC64_DTPREL16_HIGHERA", /* name */
1358 FALSE, /* partial_inplace */
1359 0, /* src_mask */
1360 0xffff, /* dst_mask */
1361 FALSE), /* pcrel_offset */
1362
1363 /* Like DTPREL16_HIGHER, but next higher group of 16 bits. */
1364 HOWTO (R_PPC64_DTPREL16_HIGHEST,
1365 48, /* rightshift */
1366 1, /* size (0 = byte, 1 = short, 2 = long) */
1367 16, /* bitsize */
1368 FALSE, /* pc_relative */
1369 0, /* bitpos */
1370 complain_overflow_dont, /* complain_on_overflow */
1371 ppc64_elf_unhandled_reloc, /* special_function */
1372 "R_PPC64_DTPREL16_HIGHEST", /* name */
1373 FALSE, /* partial_inplace */
1374 0, /* src_mask */
1375 0xffff, /* dst_mask */
1376 FALSE), /* pcrel_offset */
1377
1378 /* Like DTPREL16_HIGHEST, but adjust for low 16 bits. */
1379 HOWTO (R_PPC64_DTPREL16_HIGHESTA,
1380 48, /* rightshift */
1381 1, /* size (0 = byte, 1 = short, 2 = long) */
1382 16, /* bitsize */
1383 FALSE, /* pc_relative */
1384 0, /* bitpos */
1385 complain_overflow_dont, /* complain_on_overflow */
1386 ppc64_elf_unhandled_reloc, /* special_function */
1387 "R_PPC64_DTPREL16_HIGHESTA", /* name */
1388 FALSE, /* partial_inplace */
1389 0, /* src_mask */
1390 0xffff, /* dst_mask */
1391 FALSE), /* pcrel_offset */
1392
1393 /* Like DTPREL16, but for insns with a DS field. */
1394 HOWTO (R_PPC64_DTPREL16_DS,
1395 0, /* rightshift */
1396 1, /* size (0 = byte, 1 = short, 2 = long) */
1397 16, /* bitsize */
1398 FALSE, /* pc_relative */
1399 0, /* bitpos */
1400 complain_overflow_signed, /* complain_on_overflow */
1401 ppc64_elf_unhandled_reloc, /* special_function */
1402 "R_PPC64_DTPREL16_DS", /* name */
1403 FALSE, /* partial_inplace */
1404 0, /* src_mask */
1405 0xfffc, /* dst_mask */
1406 FALSE), /* pcrel_offset */
1407
1408 /* Like DTPREL16_DS, but no overflow. */
1409 HOWTO (R_PPC64_DTPREL16_LO_DS,
1410 0, /* rightshift */
1411 1, /* size (0 = byte, 1 = short, 2 = long) */
1412 16, /* bitsize */
1413 FALSE, /* pc_relative */
1414 0, /* bitpos */
1415 complain_overflow_dont, /* complain_on_overflow */
1416 ppc64_elf_unhandled_reloc, /* special_function */
1417 "R_PPC64_DTPREL16_LO_DS", /* name */
1418 FALSE, /* partial_inplace */
1419 0, /* src_mask */
1420 0xfffc, /* dst_mask */
1421 FALSE), /* pcrel_offset */
1422
1423 /* Computes a tp-relative displacement, the difference between the value of
1424 sym+add and the value of the thread pointer (r13). */
1425 HOWTO (R_PPC64_TPREL64,
1426 0, /* rightshift */
1427 4, /* size (0 = byte, 1 = short, 2 = long) */
1428 64, /* bitsize */
1429 FALSE, /* pc_relative */
1430 0, /* bitpos */
1431 complain_overflow_dont, /* complain_on_overflow */
1432 ppc64_elf_unhandled_reloc, /* special_function */
1433 "R_PPC64_TPREL64", /* name */
1434 FALSE, /* partial_inplace */
1435 0, /* src_mask */
1436 ONES (64), /* dst_mask */
1437 FALSE), /* pcrel_offset */
1438
1439 /* A 16 bit tprel reloc. */
1440 HOWTO (R_PPC64_TPREL16,
1441 0, /* rightshift */
1442 1, /* size (0 = byte, 1 = short, 2 = long) */
1443 16, /* bitsize */
1444 FALSE, /* pc_relative */
1445 0, /* bitpos */
1446 complain_overflow_signed, /* complain_on_overflow */
1447 ppc64_elf_unhandled_reloc, /* special_function */
1448 "R_PPC64_TPREL16", /* name */
1449 FALSE, /* partial_inplace */
1450 0, /* src_mask */
1451 0xffff, /* dst_mask */
1452 FALSE), /* pcrel_offset */
1453
1454 /* Like TPREL16, but no overflow. */
1455 HOWTO (R_PPC64_TPREL16_LO,
1456 0, /* rightshift */
1457 1, /* size (0 = byte, 1 = short, 2 = long) */
1458 16, /* bitsize */
1459 FALSE, /* pc_relative */
1460 0, /* bitpos */
1461 complain_overflow_dont, /* complain_on_overflow */
1462 ppc64_elf_unhandled_reloc, /* special_function */
1463 "R_PPC64_TPREL16_LO", /* name */
1464 FALSE, /* partial_inplace */
1465 0, /* src_mask */
1466 0xffff, /* dst_mask */
1467 FALSE), /* pcrel_offset */
1468
1469 /* Like TPREL16_LO, but next higher group of 16 bits. */
1470 HOWTO (R_PPC64_TPREL16_HI,
1471 16, /* rightshift */
1472 1, /* size (0 = byte, 1 = short, 2 = long) */
1473 16, /* bitsize */
1474 FALSE, /* pc_relative */
1475 0, /* bitpos */
1476 complain_overflow_dont, /* complain_on_overflow */
1477 ppc64_elf_unhandled_reloc, /* special_function */
1478 "R_PPC64_TPREL16_HI", /* name */
1479 FALSE, /* partial_inplace */
1480 0, /* src_mask */
1481 0xffff, /* dst_mask */
1482 FALSE), /* pcrel_offset */
1483
1484 /* Like TPREL16_HI, but adjust for low 16 bits. */
1485 HOWTO (R_PPC64_TPREL16_HA,
1486 16, /* rightshift */
1487 1, /* size (0 = byte, 1 = short, 2 = long) */
1488 16, /* bitsize */
1489 FALSE, /* pc_relative */
1490 0, /* bitpos */
1491 complain_overflow_dont, /* complain_on_overflow */
1492 ppc64_elf_unhandled_reloc, /* special_function */
1493 "R_PPC64_TPREL16_HA", /* name */
1494 FALSE, /* partial_inplace */
1495 0, /* src_mask */
1496 0xffff, /* dst_mask */
1497 FALSE), /* pcrel_offset */
1498
1499 /* Like TPREL16_HI, but next higher group of 16 bits. */
1500 HOWTO (R_PPC64_TPREL16_HIGHER,
1501 32, /* rightshift */
1502 1, /* size (0 = byte, 1 = short, 2 = long) */
1503 16, /* bitsize */
1504 FALSE, /* pc_relative */
1505 0, /* bitpos */
1506 complain_overflow_dont, /* complain_on_overflow */
1507 ppc64_elf_unhandled_reloc, /* special_function */
1508 "R_PPC64_TPREL16_HIGHER", /* name */
1509 FALSE, /* partial_inplace */
1510 0, /* src_mask */
1511 0xffff, /* dst_mask */
1512 FALSE), /* pcrel_offset */
1513
1514 /* Like TPREL16_HIGHER, but adjust for low 16 bits. */
1515 HOWTO (R_PPC64_TPREL16_HIGHERA,
1516 32, /* rightshift */
1517 1, /* size (0 = byte, 1 = short, 2 = long) */
1518 16, /* bitsize */
1519 FALSE, /* pc_relative */
1520 0, /* bitpos */
1521 complain_overflow_dont, /* complain_on_overflow */
1522 ppc64_elf_unhandled_reloc, /* special_function */
1523 "R_PPC64_TPREL16_HIGHERA", /* name */
1524 FALSE, /* partial_inplace */
1525 0, /* src_mask */
1526 0xffff, /* dst_mask */
1527 FALSE), /* pcrel_offset */
1528
1529 /* Like TPREL16_HIGHER, but next higher group of 16 bits. */
1530 HOWTO (R_PPC64_TPREL16_HIGHEST,
1531 48, /* rightshift */
1532 1, /* size (0 = byte, 1 = short, 2 = long) */
1533 16, /* bitsize */
1534 FALSE, /* pc_relative */
1535 0, /* bitpos */
1536 complain_overflow_dont, /* complain_on_overflow */
1537 ppc64_elf_unhandled_reloc, /* special_function */
1538 "R_PPC64_TPREL16_HIGHEST", /* name */
1539 FALSE, /* partial_inplace */
1540 0, /* src_mask */
1541 0xffff, /* dst_mask */
1542 FALSE), /* pcrel_offset */
1543
1544 /* Like TPREL16_HIGHEST, but adjust for low 16 bits. */
1545 HOWTO (R_PPC64_TPREL16_HIGHESTA,
1546 48, /* rightshift */
1547 1, /* size (0 = byte, 1 = short, 2 = long) */
1548 16, /* bitsize */
1549 FALSE, /* pc_relative */
1550 0, /* bitpos */
1551 complain_overflow_dont, /* complain_on_overflow */
1552 ppc64_elf_unhandled_reloc, /* special_function */
1553 "R_PPC64_TPREL16_HIGHESTA", /* name */
1554 FALSE, /* partial_inplace */
1555 0, /* src_mask */
1556 0xffff, /* dst_mask */
1557 FALSE), /* pcrel_offset */
1558
1559 /* Like TPREL16, but for insns with a DS field. */
1560 HOWTO (R_PPC64_TPREL16_DS,
1561 0, /* rightshift */
1562 1, /* size (0 = byte, 1 = short, 2 = long) */
1563 16, /* bitsize */
1564 FALSE, /* pc_relative */
1565 0, /* bitpos */
1566 complain_overflow_signed, /* complain_on_overflow */
1567 ppc64_elf_unhandled_reloc, /* special_function */
1568 "R_PPC64_TPREL16_DS", /* name */
1569 FALSE, /* partial_inplace */
1570 0, /* src_mask */
1571 0xfffc, /* dst_mask */
1572 FALSE), /* pcrel_offset */
1573
1574 /* Like TPREL16_DS, but no overflow. */
1575 HOWTO (R_PPC64_TPREL16_LO_DS,
1576 0, /* rightshift */
1577 1, /* size (0 = byte, 1 = short, 2 = long) */
1578 16, /* bitsize */
1579 FALSE, /* pc_relative */
1580 0, /* bitpos */
1581 complain_overflow_dont, /* complain_on_overflow */
1582 ppc64_elf_unhandled_reloc, /* special_function */
1583 "R_PPC64_TPREL16_LO_DS", /* name */
1584 FALSE, /* partial_inplace */
1585 0, /* src_mask */
1586 0xfffc, /* dst_mask */
1587 FALSE), /* pcrel_offset */
1588
1589 /* Allocates two contiguous entries in the GOT to hold a tls_index structure,
1590 with values (sym+add)@dtpmod and (sym+add)@dtprel, and computes the offset
1591 to the first entry relative to the TOC base (r2). */
1592 HOWTO (R_PPC64_GOT_TLSGD16,
1593 0, /* rightshift */
1594 1, /* size (0 = byte, 1 = short, 2 = long) */
1595 16, /* bitsize */
1596 FALSE, /* pc_relative */
1597 0, /* bitpos */
1598 complain_overflow_signed, /* complain_on_overflow */
1599 ppc64_elf_unhandled_reloc, /* special_function */
1600 "R_PPC64_GOT_TLSGD16", /* name */
b34976b6 1601 FALSE, /* partial_inplace */
5bd4f169
AM
1602 0, /* src_mask */
1603 0xffff, /* dst_mask */
b34976b6 1604 FALSE), /* pcrel_offset */
5bd4f169 1605
411e1bfb
AM
1606 /* Like GOT_TLSGD16, but no overflow. */
1607 HOWTO (R_PPC64_GOT_TLSGD16_LO,
5bd4f169
AM
1608 0, /* rightshift */
1609 1, /* size (0 = byte, 1 = short, 2 = long) */
1610 16, /* bitsize */
b34976b6 1611 FALSE, /* pc_relative */
5bd4f169
AM
1612 0, /* bitpos */
1613 complain_overflow_dont, /* complain_on_overflow */
805fc799 1614 ppc64_elf_unhandled_reloc, /* special_function */
411e1bfb 1615 "R_PPC64_GOT_TLSGD16_LO", /* name */
b34976b6 1616 FALSE, /* partial_inplace */
5bd4f169
AM
1617 0, /* src_mask */
1618 0xffff, /* dst_mask */
b34976b6 1619 FALSE), /* pcrel_offset */
5bd4f169 1620
411e1bfb
AM
1621 /* Like GOT_TLSGD16_LO, but next higher group of 16 bits. */
1622 HOWTO (R_PPC64_GOT_TLSGD16_HI,
5bd4f169
AM
1623 16, /* rightshift */
1624 1, /* size (0 = byte, 1 = short, 2 = long) */
1625 16, /* bitsize */
b34976b6 1626 FALSE, /* pc_relative */
5bd4f169
AM
1627 0, /* bitpos */
1628 complain_overflow_dont, /* complain_on_overflow */
805fc799 1629 ppc64_elf_unhandled_reloc, /* special_function */
411e1bfb 1630 "R_PPC64_GOT_TLSGD16_HI", /* name */
b34976b6 1631 FALSE, /* partial_inplace */
5bd4f169
AM
1632 0, /* src_mask */
1633 0xffff, /* dst_mask */
b34976b6 1634 FALSE), /* pcrel_offset */
5bd4f169 1635
411e1bfb
AM
1636 /* Like GOT_TLSGD16_HI, but adjust for low 16 bits. */
1637 HOWTO (R_PPC64_GOT_TLSGD16_HA,
5bd4f169
AM
1638 16, /* rightshift */
1639 1, /* size (0 = byte, 1 = short, 2 = long) */
1640 16, /* bitsize */
b34976b6 1641 FALSE, /* pc_relative */
5bd4f169 1642 0, /* bitpos */
411e1bfb 1643 complain_overflow_dont, /* complain_on_overflow */
805fc799 1644 ppc64_elf_unhandled_reloc, /* special_function */
411e1bfb 1645 "R_PPC64_GOT_TLSGD16_HA", /* name */
b34976b6 1646 FALSE, /* partial_inplace */
5bd4f169
AM
1647 0, /* src_mask */
1648 0xffff, /* dst_mask */
b34976b6 1649 FALSE), /* pcrel_offset */
5bd4f169 1650
411e1bfb
AM
1651 /* Allocates two contiguous entries in the GOT to hold a tls_index structure,
1652 with values (sym+add)@dtpmod and zero, and computes the offset to the
1653 first entry relative to the TOC base (r2). */
1654 HOWTO (R_PPC64_GOT_TLSLD16,
5bd4f169
AM
1655 0, /* rightshift */
1656 1, /* size (0 = byte, 1 = short, 2 = long) */
1657 16, /* bitsize */
b34976b6 1658 FALSE, /* pc_relative */
5bd4f169 1659 0, /* bitpos */
411e1bfb
AM
1660 complain_overflow_signed, /* complain_on_overflow */
1661 ppc64_elf_unhandled_reloc, /* special_function */
1662 "R_PPC64_GOT_TLSLD16", /* name */
b34976b6 1663 FALSE, /* partial_inplace */
d006db6c 1664 0, /* src_mask */
411e1bfb 1665 0xffff, /* dst_mask */
b34976b6 1666 FALSE), /* pcrel_offset */
5bd4f169 1667
411e1bfb
AM
1668 /* Like GOT_TLSLD16, but no overflow. */
1669 HOWTO (R_PPC64_GOT_TLSLD16_LO,
5bd4f169
AM
1670 0, /* rightshift */
1671 1, /* size (0 = byte, 1 = short, 2 = long) */
1672 16, /* bitsize */
b34976b6 1673 FALSE, /* pc_relative */
5bd4f169 1674 0, /* bitpos */
411e1bfb
AM
1675 complain_overflow_dont, /* complain_on_overflow */
1676 ppc64_elf_unhandled_reloc, /* special_function */
1677 "R_PPC64_GOT_TLSLD16_LO", /* name */
b34976b6 1678 FALSE, /* partial_inplace */
d006db6c 1679 0, /* src_mask */
411e1bfb 1680 0xffff, /* dst_mask */
b34976b6 1681 FALSE), /* pcrel_offset */
5bd4f169 1682
411e1bfb
AM
1683 /* Like GOT_TLSLD16_LO, but next higher group of 16 bits. */
1684 HOWTO (R_PPC64_GOT_TLSLD16_HI,
1685 16, /* rightshift */
5bd4f169
AM
1686 1, /* size (0 = byte, 1 = short, 2 = long) */
1687 16, /* bitsize */
b34976b6 1688 FALSE, /* pc_relative */
5bd4f169 1689 0, /* bitpos */
411e1bfb 1690 complain_overflow_dont, /* complain_on_overflow */
805fc799 1691 ppc64_elf_unhandled_reloc, /* special_function */
411e1bfb 1692 "R_PPC64_GOT_TLSLD16_HI", /* name */
b34976b6 1693 FALSE, /* partial_inplace */
d006db6c 1694 0, /* src_mask */
411e1bfb 1695 0xffff, /* dst_mask */
b34976b6 1696 FALSE), /* pcrel_offset */
5bd4f169 1697
411e1bfb
AM
1698 /* Like GOT_TLSLD16_HI, but adjust for low 16 bits. */
1699 HOWTO (R_PPC64_GOT_TLSLD16_HA,
1700 16, /* rightshift */
5bd4f169
AM
1701 1, /* size (0 = byte, 1 = short, 2 = long) */
1702 16, /* bitsize */
b34976b6 1703 FALSE, /* pc_relative */
5bd4f169
AM
1704 0, /* bitpos */
1705 complain_overflow_dont, /* complain_on_overflow */
805fc799 1706 ppc64_elf_unhandled_reloc, /* special_function */
411e1bfb 1707 "R_PPC64_GOT_TLSLD16_HA", /* name */
b34976b6 1708 FALSE, /* partial_inplace */
d006db6c 1709 0, /* src_mask */
411e1bfb 1710 0xffff, /* dst_mask */
b34976b6 1711 FALSE), /* pcrel_offset */
5bd4f169 1712
411e1bfb
AM
1713 /* Allocates an entry in the GOT with value (sym+add)@dtprel, and computes
1714 the offset to the entry relative to the TOC base (r2). */
1715 HOWTO (R_PPC64_GOT_DTPREL16_DS,
5bd4f169
AM
1716 0, /* rightshift */
1717 1, /* size (0 = byte, 1 = short, 2 = long) */
1718 16, /* bitsize */
b34976b6 1719 FALSE, /* pc_relative */
5bd4f169 1720 0, /* bitpos */
411e1bfb 1721 complain_overflow_signed, /* complain_on_overflow */
805fc799 1722 ppc64_elf_unhandled_reloc, /* special_function */
411e1bfb 1723 "R_PPC64_GOT_DTPREL16_DS", /* name */
b34976b6 1724 FALSE, /* partial_inplace */
d006db6c 1725 0, /* src_mask */
5bd4f169 1726 0xfffc, /* dst_mask */
b34976b6 1727 FALSE), /* pcrel_offset */
5bd4f169 1728
411e1bfb
AM
1729 /* Like GOT_DTPREL16_DS, but no overflow. */
1730 HOWTO (R_PPC64_GOT_DTPREL16_LO_DS,
5bd4f169 1731 0, /* rightshift */
c061c2d8
AM
1732 1, /* size (0 = byte, 1 = short, 2 = long) */
1733 16, /* bitsize */
b34976b6 1734 FALSE, /* pc_relative */
5bd4f169 1735 0, /* bitpos */
411e1bfb
AM
1736 complain_overflow_dont, /* complain_on_overflow */
1737 ppc64_elf_unhandled_reloc, /* special_function */
1738 "R_PPC64_GOT_DTPREL16_LO_DS", /* name */
b34976b6 1739 FALSE, /* partial_inplace */
d006db6c 1740 0, /* src_mask */
c061c2d8 1741 0xfffc, /* dst_mask */
b34976b6 1742 FALSE), /* pcrel_offset */
5bd4f169 1743
411e1bfb
AM
1744 /* Like GOT_DTPREL16_LO_DS, but next higher group of 16 bits. */
1745 HOWTO (R_PPC64_GOT_DTPREL16_HI,
1746 16, /* rightshift */
5bd4f169
AM
1747 1, /* size (0 = byte, 1 = short, 2 = long) */
1748 16, /* bitsize */
b34976b6 1749 FALSE, /* pc_relative */
5bd4f169
AM
1750 0, /* bitpos */
1751 complain_overflow_dont, /* complain_on_overflow */
411e1bfb
AM
1752 ppc64_elf_unhandled_reloc, /* special_function */
1753 "R_PPC64_GOT_DTPREL16_HI", /* name */
b34976b6 1754 FALSE, /* partial_inplace */
d006db6c 1755 0, /* src_mask */
411e1bfb 1756 0xffff, /* dst_mask */
b34976b6 1757 FALSE), /* pcrel_offset */
5bd4f169 1758
411e1bfb
AM
1759 /* Like GOT_DTPREL16_HI, but adjust for low 16 bits. */
1760 HOWTO (R_PPC64_GOT_DTPREL16_HA,
1761 16, /* rightshift */
1762 1, /* size (0 = byte, 1 = short, 2 = long) */
1763 16, /* bitsize */
1764 FALSE, /* pc_relative */
1765 0, /* bitpos */
1766 complain_overflow_dont, /* complain_on_overflow */
1767 ppc64_elf_unhandled_reloc, /* special_function */
1768 "R_PPC64_GOT_DTPREL16_HA", /* name */
1769 FALSE, /* partial_inplace */
1770 0, /* src_mask */
1771 0xffff, /* dst_mask */
1772 FALSE), /* pcrel_offset */
1773
1774 /* Allocates an entry in the GOT with value (sym+add)@tprel, and computes the
1775 offset to the entry relative to the TOC base (r2). */
1776 HOWTO (R_PPC64_GOT_TPREL16_DS,
5bd4f169
AM
1777 0, /* rightshift */
1778 1, /* size (0 = byte, 1 = short, 2 = long) */
1779 16, /* bitsize */
b34976b6 1780 FALSE, /* pc_relative */
5bd4f169
AM
1781 0, /* bitpos */
1782 complain_overflow_signed, /* complain_on_overflow */
411e1bfb
AM
1783 ppc64_elf_unhandled_reloc, /* special_function */
1784 "R_PPC64_GOT_TPREL16_DS", /* name */
b34976b6 1785 FALSE, /* partial_inplace */
d006db6c 1786 0, /* src_mask */
ad8e1ba5 1787 0xfffc, /* dst_mask */
b34976b6 1788 FALSE), /* pcrel_offset */
5bd4f169 1789
411e1bfb
AM
1790 /* Like GOT_TPREL16_DS, but no overflow. */
1791 HOWTO (R_PPC64_GOT_TPREL16_LO_DS,
5bd4f169
AM
1792 0, /* rightshift */
1793 1, /* size (0 = byte, 1 = short, 2 = long) */
1794 16, /* bitsize */
b34976b6 1795 FALSE, /* pc_relative */
5bd4f169
AM
1796 0, /* bitpos */
1797 complain_overflow_dont, /* complain_on_overflow */
411e1bfb
AM
1798 ppc64_elf_unhandled_reloc, /* special_function */
1799 "R_PPC64_GOT_TPREL16_LO_DS", /* name */
b34976b6 1800 FALSE, /* partial_inplace */
d006db6c 1801 0, /* src_mask */
ad8e1ba5 1802 0xfffc, /* dst_mask */
b34976b6 1803 FALSE), /* pcrel_offset */
5bd4f169 1804
411e1bfb
AM
1805 /* Like GOT_TPREL16_LO_DS, but next higher group of 16 bits. */
1806 HOWTO (R_PPC64_GOT_TPREL16_HI,
1807 16, /* rightshift */
5bd4f169
AM
1808 1, /* size (0 = byte, 1 = short, 2 = long) */
1809 16, /* bitsize */
b34976b6 1810 FALSE, /* pc_relative */
5bd4f169 1811 0, /* bitpos */
411e1bfb 1812 complain_overflow_dont, /* complain_on_overflow */
805fc799 1813 ppc64_elf_unhandled_reloc, /* special_function */
411e1bfb 1814 "R_PPC64_GOT_TPREL16_HI", /* name */
b34976b6 1815 FALSE, /* partial_inplace */
d006db6c 1816 0, /* src_mask */
411e1bfb 1817 0xffff, /* dst_mask */
b34976b6 1818 FALSE), /* pcrel_offset */
5bd4f169 1819
411e1bfb
AM
1820 /* Like GOT_TPREL16_HI, but adjust for low 16 bits. */
1821 HOWTO (R_PPC64_GOT_TPREL16_HA,
1822 16, /* rightshift */
5bd4f169
AM
1823 1, /* size (0 = byte, 1 = short, 2 = long) */
1824 16, /* bitsize */
b34976b6 1825 FALSE, /* pc_relative */
5bd4f169
AM
1826 0, /* bitpos */
1827 complain_overflow_dont, /* complain_on_overflow */
805fc799 1828 ppc64_elf_unhandled_reloc, /* special_function */
411e1bfb 1829 "R_PPC64_GOT_TPREL16_HA", /* name */
b34976b6 1830 FALSE, /* partial_inplace */
d006db6c 1831 0, /* src_mask */
411e1bfb 1832 0xffff, /* dst_mask */
b34976b6 1833 FALSE), /* pcrel_offset */
5bd4f169
AM
1834
1835 /* GNU extension to record C++ vtable hierarchy. */
1836 HOWTO (R_PPC64_GNU_VTINHERIT, /* type */
1837 0, /* rightshift */
1838 0, /* size (0 = byte, 1 = short, 2 = long) */
1839 0, /* bitsize */
b34976b6 1840 FALSE, /* pc_relative */
5bd4f169
AM
1841 0, /* bitpos */
1842 complain_overflow_dont, /* complain_on_overflow */
1843 NULL, /* special_function */
1844 "R_PPC64_GNU_VTINHERIT", /* name */
b34976b6 1845 FALSE, /* partial_inplace */
5bd4f169
AM
1846 0, /* src_mask */
1847 0, /* dst_mask */
b34976b6 1848 FALSE), /* pcrel_offset */
5bd4f169
AM
1849
1850 /* GNU extension to record C++ vtable member usage. */
1851 HOWTO (R_PPC64_GNU_VTENTRY, /* type */
1852 0, /* rightshift */
1853 0, /* size (0 = byte, 1 = short, 2 = long) */
1854 0, /* bitsize */
b34976b6 1855 FALSE, /* pc_relative */
5bd4f169
AM
1856 0, /* bitpos */
1857 complain_overflow_dont, /* complain_on_overflow */
1858 NULL, /* special_function */
1859 "R_PPC64_GNU_VTENTRY", /* name */
b34976b6 1860 FALSE, /* partial_inplace */
5bd4f169
AM
1861 0, /* src_mask */
1862 0, /* dst_mask */
b34976b6 1863 FALSE), /* pcrel_offset */
5bd4f169
AM
1864};
1865
1866\f
1867/* Initialize the ppc64_elf_howto_table, so that linear accesses can
1868 be done. */
1869
1870static void
4ce794b7 1871ppc_howto_init (void)
5bd4f169
AM
1872{
1873 unsigned int i, type;
1874
1875 for (i = 0;
1876 i < sizeof (ppc64_elf_howto_raw) / sizeof (ppc64_elf_howto_raw[0]);
1877 i++)
1878 {
1879 type = ppc64_elf_howto_raw[i].type;
1880 BFD_ASSERT (type < (sizeof (ppc64_elf_howto_table)
1881 / sizeof (ppc64_elf_howto_table[0])));
1882 ppc64_elf_howto_table[type] = &ppc64_elf_howto_raw[i];
1883 }
1884}
1885
1886static reloc_howto_type *
4ce794b7
AM
1887ppc64_elf_reloc_type_lookup (bfd *abfd ATTRIBUTE_UNUSED,
1888 bfd_reloc_code_real_type code)
5bd4f169 1889{
411e1bfb 1890 enum elf_ppc64_reloc_type r = R_PPC64_NONE;
5bd4f169
AM
1891
1892 if (!ppc64_elf_howto_table[R_PPC64_ADDR32])
1893 /* Initialize howto table if needed. */
1894 ppc_howto_init ();
1895
4ce794b7 1896 switch (code)
5bd4f169
AM
1897 {
1898 default:
4ce794b7 1899 return NULL;
5bd4f169 1900
411e1bfb
AM
1901 case BFD_RELOC_NONE: r = R_PPC64_NONE;
1902 break;
1903 case BFD_RELOC_32: r = R_PPC64_ADDR32;
1904 break;
1905 case BFD_RELOC_PPC_BA26: r = R_PPC64_ADDR24;
1906 break;
1907 case BFD_RELOC_16: r = R_PPC64_ADDR16;
1908 break;
1909 case BFD_RELOC_LO16: r = R_PPC64_ADDR16_LO;
1910 break;
1911 case BFD_RELOC_HI16: r = R_PPC64_ADDR16_HI;
1912 break;
1913 case BFD_RELOC_HI16_S: r = R_PPC64_ADDR16_HA;
5bd4f169 1914 break;
411e1bfb 1915 case BFD_RELOC_PPC_BA16: r = R_PPC64_ADDR14;
5bd4f169 1916 break;
411e1bfb 1917 case BFD_RELOC_PPC_BA16_BRTAKEN: r = R_PPC64_ADDR14_BRTAKEN;
5bd4f169 1918 break;
411e1bfb 1919 case BFD_RELOC_PPC_BA16_BRNTAKEN: r = R_PPC64_ADDR14_BRNTAKEN;
5bd4f169 1920 break;
411e1bfb 1921 case BFD_RELOC_PPC_B26: r = R_PPC64_REL24;
5bd4f169 1922 break;
411e1bfb 1923 case BFD_RELOC_PPC_B16: r = R_PPC64_REL14;
5bd4f169 1924 break;
411e1bfb 1925 case BFD_RELOC_PPC_B16_BRTAKEN: r = R_PPC64_REL14_BRTAKEN;
5bd4f169 1926 break;
411e1bfb 1927 case BFD_RELOC_PPC_B16_BRNTAKEN: r = R_PPC64_REL14_BRNTAKEN;
5bd4f169 1928 break;
411e1bfb 1929 case BFD_RELOC_16_GOTOFF: r = R_PPC64_GOT16;
5bd4f169 1930 break;
411e1bfb 1931 case BFD_RELOC_LO16_GOTOFF: r = R_PPC64_GOT16_LO;
5bd4f169 1932 break;
411e1bfb 1933 case BFD_RELOC_HI16_GOTOFF: r = R_PPC64_GOT16_HI;
5bd4f169 1934 break;
411e1bfb 1935 case BFD_RELOC_HI16_S_GOTOFF: r = R_PPC64_GOT16_HA;
5bd4f169 1936 break;
411e1bfb 1937 case BFD_RELOC_PPC_COPY: r = R_PPC64_COPY;
5bd4f169 1938 break;
411e1bfb 1939 case BFD_RELOC_PPC_GLOB_DAT: r = R_PPC64_GLOB_DAT;
5bd4f169 1940 break;
411e1bfb 1941 case BFD_RELOC_32_PCREL: r = R_PPC64_REL32;
5bd4f169 1942 break;
411e1bfb 1943 case BFD_RELOC_32_PLTOFF: r = R_PPC64_PLT32;
5bd4f169 1944 break;
411e1bfb 1945 case BFD_RELOC_32_PLT_PCREL: r = R_PPC64_PLTREL32;
5bd4f169 1946 break;
411e1bfb 1947 case BFD_RELOC_LO16_PLTOFF: r = R_PPC64_PLT16_LO;
5bd4f169 1948 break;
411e1bfb 1949 case BFD_RELOC_HI16_PLTOFF: r = R_PPC64_PLT16_HI;
5bd4f169 1950 break;
411e1bfb 1951 case BFD_RELOC_HI16_S_PLTOFF: r = R_PPC64_PLT16_HA;
5bd4f169 1952 break;
411e1bfb 1953 case BFD_RELOC_16_BASEREL: r = R_PPC64_SECTOFF;
5bd4f169 1954 break;
411e1bfb 1955 case BFD_RELOC_LO16_BASEREL: r = R_PPC64_SECTOFF_LO;
5bd4f169 1956 break;
411e1bfb 1957 case BFD_RELOC_HI16_BASEREL: r = R_PPC64_SECTOFF_HI;
5bd4f169 1958 break;
411e1bfb 1959 case BFD_RELOC_HI16_S_BASEREL: r = R_PPC64_SECTOFF_HA;
5bd4f169 1960 break;
411e1bfb 1961 case BFD_RELOC_CTOR: r = R_PPC64_ADDR64;
5bd4f169 1962 break;
411e1bfb 1963 case BFD_RELOC_64: r = R_PPC64_ADDR64;
5bd4f169 1964 break;
411e1bfb 1965 case BFD_RELOC_PPC64_HIGHER: r = R_PPC64_ADDR16_HIGHER;
5bd4f169 1966 break;
411e1bfb 1967 case BFD_RELOC_PPC64_HIGHER_S: r = R_PPC64_ADDR16_HIGHERA;
5bd4f169 1968 break;
411e1bfb 1969 case BFD_RELOC_PPC64_HIGHEST: r = R_PPC64_ADDR16_HIGHEST;
5bd4f169 1970 break;
411e1bfb 1971 case BFD_RELOC_PPC64_HIGHEST_S: r = R_PPC64_ADDR16_HIGHESTA;
5bd4f169 1972 break;
411e1bfb 1973 case BFD_RELOC_64_PCREL: r = R_PPC64_REL64;
5bd4f169 1974 break;
411e1bfb 1975 case BFD_RELOC_64_PLTOFF: r = R_PPC64_PLT64;
5bd4f169 1976 break;
411e1bfb 1977 case BFD_RELOC_64_PLT_PCREL: r = R_PPC64_PLTREL64;
5bd4f169 1978 break;
411e1bfb 1979 case BFD_RELOC_PPC_TOC16: r = R_PPC64_TOC16;
5bd4f169 1980 break;
411e1bfb 1981 case BFD_RELOC_PPC64_TOC16_LO: r = R_PPC64_TOC16_LO;
5bd4f169 1982 break;
411e1bfb 1983 case BFD_RELOC_PPC64_TOC16_HI: r = R_PPC64_TOC16_HI;
5bd4f169 1984 break;
411e1bfb 1985 case BFD_RELOC_PPC64_TOC16_HA: r = R_PPC64_TOC16_HA;
5bd4f169 1986 break;
411e1bfb 1987 case BFD_RELOC_PPC64_TOC: r = R_PPC64_TOC;
5bd4f169 1988 break;
411e1bfb 1989 case BFD_RELOC_PPC64_PLTGOT16: r = R_PPC64_PLTGOT16;
5bd4f169 1990 break;
411e1bfb 1991 case BFD_RELOC_PPC64_PLTGOT16_LO: r = R_PPC64_PLTGOT16_LO;
5bd4f169 1992 break;
411e1bfb 1993 case BFD_RELOC_PPC64_PLTGOT16_HI: r = R_PPC64_PLTGOT16_HI;
5bd4f169 1994 break;
411e1bfb 1995 case BFD_RELOC_PPC64_PLTGOT16_HA: r = R_PPC64_PLTGOT16_HA;
5bd4f169 1996 break;
411e1bfb 1997 case BFD_RELOC_PPC64_ADDR16_DS: r = R_PPC64_ADDR16_DS;
5bd4f169 1998 break;
411e1bfb 1999 case BFD_RELOC_PPC64_ADDR16_LO_DS: r = R_PPC64_ADDR16_LO_DS;
5bd4f169 2000 break;
411e1bfb 2001 case BFD_RELOC_PPC64_GOT16_DS: r = R_PPC64_GOT16_DS;
5bd4f169 2002 break;
411e1bfb 2003 case BFD_RELOC_PPC64_GOT16_LO_DS: r = R_PPC64_GOT16_LO_DS;
5bd4f169 2004 break;
411e1bfb 2005 case BFD_RELOC_PPC64_PLT16_LO_DS: r = R_PPC64_PLT16_LO_DS;
5bd4f169 2006 break;
411e1bfb 2007 case BFD_RELOC_PPC64_SECTOFF_DS: r = R_PPC64_SECTOFF_DS;
5bd4f169 2008 break;
411e1bfb 2009 case BFD_RELOC_PPC64_SECTOFF_LO_DS: r = R_PPC64_SECTOFF_LO_DS;
5bd4f169 2010 break;
411e1bfb 2011 case BFD_RELOC_PPC64_TOC16_DS: r = R_PPC64_TOC16_DS;
5bd4f169 2012 break;
411e1bfb 2013 case BFD_RELOC_PPC64_TOC16_LO_DS: r = R_PPC64_TOC16_LO_DS;
5bd4f169 2014 break;
411e1bfb 2015 case BFD_RELOC_PPC64_PLTGOT16_DS: r = R_PPC64_PLTGOT16_DS;
5bd4f169 2016 break;
411e1bfb 2017 case BFD_RELOC_PPC64_PLTGOT16_LO_DS: r = R_PPC64_PLTGOT16_LO_DS;
5bd4f169 2018 break;
411e1bfb 2019 case BFD_RELOC_PPC_TLS: r = R_PPC64_TLS;
5bd4f169 2020 break;
411e1bfb 2021 case BFD_RELOC_PPC_DTPMOD: r = R_PPC64_DTPMOD64;
5bd4f169 2022 break;
411e1bfb 2023 case BFD_RELOC_PPC_TPREL16: r = R_PPC64_TPREL16;
5bd4f169 2024 break;
411e1bfb 2025 case BFD_RELOC_PPC_TPREL16_LO: r = R_PPC64_TPREL16_LO;
5bd4f169 2026 break;
411e1bfb 2027 case BFD_RELOC_PPC_TPREL16_HI: r = R_PPC64_TPREL16_HI;
5bd4f169 2028 break;
411e1bfb 2029 case BFD_RELOC_PPC_TPREL16_HA: r = R_PPC64_TPREL16_HA;
5bd4f169 2030 break;
411e1bfb 2031 case BFD_RELOC_PPC_TPREL: r = R_PPC64_TPREL64;
5bd4f169 2032 break;
411e1bfb
AM
2033 case BFD_RELOC_PPC_DTPREL16: r = R_PPC64_DTPREL16;
2034 break;
2035 case BFD_RELOC_PPC_DTPREL16_LO: r = R_PPC64_DTPREL16_LO;
2036 break;
2037 case BFD_RELOC_PPC_DTPREL16_HI: r = R_PPC64_DTPREL16_HI;
2038 break;
2039 case BFD_RELOC_PPC_DTPREL16_HA: r = R_PPC64_DTPREL16_HA;
2040 break;
2041 case BFD_RELOC_PPC_DTPREL: r = R_PPC64_DTPREL64;
2042 break;
2043 case BFD_RELOC_PPC_GOT_TLSGD16: r = R_PPC64_GOT_TLSGD16;
2044 break;
2045 case BFD_RELOC_PPC_GOT_TLSGD16_LO: r = R_PPC64_GOT_TLSGD16_LO;
2046 break;
2047 case BFD_RELOC_PPC_GOT_TLSGD16_HI: r = R_PPC64_GOT_TLSGD16_HI;
2048 break;
2049 case BFD_RELOC_PPC_GOT_TLSGD16_HA: r = R_PPC64_GOT_TLSGD16_HA;
2050 break;
2051 case BFD_RELOC_PPC_GOT_TLSLD16: r = R_PPC64_GOT_TLSLD16;
2052 break;
2053 case BFD_RELOC_PPC_GOT_TLSLD16_LO: r = R_PPC64_GOT_TLSLD16_LO;
2054 break;
2055 case BFD_RELOC_PPC_GOT_TLSLD16_HI: r = R_PPC64_GOT_TLSLD16_HI;
2056 break;
2057 case BFD_RELOC_PPC_GOT_TLSLD16_HA: r = R_PPC64_GOT_TLSLD16_HA;
2058 break;
2059 case BFD_RELOC_PPC_GOT_TPREL16: r = R_PPC64_GOT_TPREL16_DS;
2060 break;
2061 case BFD_RELOC_PPC_GOT_TPREL16_LO: r = R_PPC64_GOT_TPREL16_LO_DS;
2062 break;
2063 case BFD_RELOC_PPC_GOT_TPREL16_HI: r = R_PPC64_GOT_TPREL16_HI;
2064 break;
2065 case BFD_RELOC_PPC_GOT_TPREL16_HA: r = R_PPC64_GOT_TPREL16_HA;
2066 break;
2067 case BFD_RELOC_PPC_GOT_DTPREL16: r = R_PPC64_GOT_DTPREL16_DS;
2068 break;
2069 case BFD_RELOC_PPC_GOT_DTPREL16_LO: r = R_PPC64_GOT_DTPREL16_LO_DS;
2070 break;
2071 case BFD_RELOC_PPC_GOT_DTPREL16_HI: r = R_PPC64_GOT_DTPREL16_HI;
2072 break;
2073 case BFD_RELOC_PPC_GOT_DTPREL16_HA: r = R_PPC64_GOT_DTPREL16_HA;
2074 break;
2075 case BFD_RELOC_PPC64_TPREL16_DS: r = R_PPC64_TPREL16_DS;
2076 break;
2077 case BFD_RELOC_PPC64_TPREL16_LO_DS: r = R_PPC64_TPREL16_LO_DS;
2078 break;
2079 case BFD_RELOC_PPC64_TPREL16_HIGHER: r = R_PPC64_TPREL16_HIGHER;
2080 break;
2081 case BFD_RELOC_PPC64_TPREL16_HIGHERA: r = R_PPC64_TPREL16_HIGHERA;
2082 break;
2083 case BFD_RELOC_PPC64_TPREL16_HIGHEST: r = R_PPC64_TPREL16_HIGHEST;
2084 break;
2085 case BFD_RELOC_PPC64_TPREL16_HIGHESTA: r = R_PPC64_TPREL16_HIGHESTA;
2086 break;
2087 case BFD_RELOC_PPC64_DTPREL16_DS: r = R_PPC64_DTPREL16_DS;
2088 break;
2089 case BFD_RELOC_PPC64_DTPREL16_LO_DS: r = R_PPC64_DTPREL16_LO_DS;
2090 break;
2091 case BFD_RELOC_PPC64_DTPREL16_HIGHER: r = R_PPC64_DTPREL16_HIGHER;
2092 break;
2093 case BFD_RELOC_PPC64_DTPREL16_HIGHERA: r = R_PPC64_DTPREL16_HIGHERA;
2094 break;
2095 case BFD_RELOC_PPC64_DTPREL16_HIGHEST: r = R_PPC64_DTPREL16_HIGHEST;
2096 break;
2097 case BFD_RELOC_PPC64_DTPREL16_HIGHESTA: r = R_PPC64_DTPREL16_HIGHESTA;
2098 break;
2099 case BFD_RELOC_VTABLE_INHERIT: r = R_PPC64_GNU_VTINHERIT;
2100 break;
2101 case BFD_RELOC_VTABLE_ENTRY: r = R_PPC64_GNU_VTENTRY;
5bd4f169
AM
2102 break;
2103 }
2104
4ce794b7 2105 return ppc64_elf_howto_table[r];
5bd4f169
AM
2106};
2107
2108/* Set the howto pointer for a PowerPC ELF reloc. */
2109
2110static void
4ce794b7
AM
2111ppc64_elf_info_to_howto (bfd *abfd ATTRIBUTE_UNUSED, arelent *cache_ptr,
2112 Elf_Internal_Rela *dst)
5bd4f169 2113{
65f38f15
AM
2114 unsigned int type;
2115
ef60b7ff 2116 /* Initialize howto table if needed. */
5bd4f169 2117 if (!ppc64_elf_howto_table[R_PPC64_ADDR32])
5bd4f169
AM
2118 ppc_howto_init ();
2119
65f38f15 2120 type = ELF64_R_TYPE (dst->r_info);
d0fb9a8d
JJ
2121 if (type >= (sizeof (ppc64_elf_howto_table)
2122 / sizeof (ppc64_elf_howto_table[0])))
2123 {
2124 (*_bfd_error_handler) (_("%B: invalid relocation type %d"),
3ec2b351
NC
2125 abfd, (int) type);
2126 type = R_PPC64_NONE;
d0fb9a8d 2127 }
65f38f15 2128 cache_ptr->howto = ppc64_elf_howto_table[type];
5bd4f169
AM
2129}
2130
04c9666a 2131/* Handle the R_PPC64_ADDR16_HA and similar relocs. */
5bd4f169
AM
2132
2133static bfd_reloc_status_type
4ce794b7
AM
2134ppc64_elf_ha_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
2135 void *data, asection *input_section,
2136 bfd *output_bfd, char **error_message)
5bd4f169 2137{
805fc799
AM
2138 /* If this is a relocatable link (output_bfd test tells us), just
2139 call the generic function. Any adjustment will be done at final
2140 link time. */
2141 if (output_bfd != NULL)
cedb70c5 2142 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
805fc799
AM
2143 input_section, output_bfd, error_message);
2144
2145 /* Adjust the addend for sign extension of the low 16 bits.
2146 We won't actually be using the low 16 bits, so trashing them
2147 doesn't matter. */
2148 reloc_entry->addend += 0x8000;
2149 return bfd_reloc_continue;
2150}
5bd4f169 2151
2441e016
AM
2152static bfd_reloc_status_type
2153ppc64_elf_branch_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
2154 void *data, asection *input_section,
2155 bfd *output_bfd, char **error_message)
2156{
2157 if (output_bfd != NULL)
2158 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
2159 input_section, output_bfd, error_message);
2160
699733f6
AM
2161 if (strcmp (symbol->section->name, ".opd") == 0
2162 && (symbol->section->owner->flags & DYNAMIC) == 0)
2441e016
AM
2163 {
2164 bfd_vma dest = opd_entry_value (symbol->section,
2165 symbol->value + reloc_entry->addend,
2166 NULL, NULL);
2167 if (dest != (bfd_vma) -1)
2168 reloc_entry->addend = dest - (symbol->value
2169 + symbol->section->output_section->vma
2170 + symbol->section->output_offset);
2171 }
2172 return bfd_reloc_continue;
2173}
2174
805fc799 2175static bfd_reloc_status_type
4ce794b7
AM
2176ppc64_elf_brtaken_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
2177 void *data, asection *input_section,
2178 bfd *output_bfd, char **error_message)
805fc799
AM
2179{
2180 long insn;
04c9666a 2181 enum elf_ppc64_reloc_type r_type;
805fc799
AM
2182 bfd_size_type octets;
2183 /* Disabled until we sort out how ld should choose 'y' vs 'at'. */
b34976b6 2184 bfd_boolean is_power4 = FALSE;
805fc799
AM
2185
2186 /* If this is a relocatable link (output_bfd test tells us), just
2187 call the generic function. Any adjustment will be done at final
2188 link time. */
5bd4f169 2189 if (output_bfd != NULL)
cedb70c5 2190 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
805fc799
AM
2191 input_section, output_bfd, error_message);
2192
2193 octets = reloc_entry->address * bfd_octets_per_byte (abfd);
2194 insn = bfd_get_32 (abfd, (bfd_byte *) data + octets);
2195 insn &= ~(0x01 << 21);
4ce794b7 2196 r_type = reloc_entry->howto->type;
805fc799
AM
2197 if (r_type == R_PPC64_ADDR14_BRTAKEN
2198 || r_type == R_PPC64_REL14_BRTAKEN)
cedb70c5 2199 insn |= 0x01 << 21; /* 'y' or 't' bit, lowest bit of BO field. */
805fc799
AM
2200
2201 if (is_power4)
5bd4f169 2202 {
805fc799
AM
2203 /* Set 'a' bit. This is 0b00010 in BO field for branch
2204 on CR(BI) insns (BO == 001at or 011at), and 0b01000
2205 for branch on CTR insns (BO == 1a00t or 1a01t). */
2206 if ((insn & (0x14 << 21)) == (0x04 << 21))
2207 insn |= 0x02 << 21;
2208 else if ((insn & (0x14 << 21)) == (0x10 << 21))
2209 insn |= 0x08 << 21;
2210 else
2441e016 2211 goto out;
5bd4f169 2212 }
805fc799
AM
2213 else
2214 {
2215 bfd_vma target = 0;
2216 bfd_vma from;
5bd4f169 2217
805fc799
AM
2218 if (!bfd_is_com_section (symbol->section))
2219 target = symbol->value;
2220 target += symbol->section->output_section->vma;
2221 target += symbol->section->output_offset;
2222 target += reloc_entry->addend;
5bd4f169 2223
805fc799
AM
2224 from = (reloc_entry->address
2225 + input_section->output_offset
2226 + input_section->output_section->vma);
5bd4f169 2227
805fc799
AM
2228 /* Invert 'y' bit if not the default. */
2229 if ((bfd_signed_vma) (target - from) < 0)
2230 insn ^= 0x01 << 21;
2231 }
4ce794b7 2232 bfd_put_32 (abfd, insn, (bfd_byte *) data + octets);
2441e016
AM
2233 out:
2234 return ppc64_elf_branch_reloc (abfd, reloc_entry, symbol, data,
2235 input_section, output_bfd, error_message);
805fc799 2236}
5bd4f169 2237
805fc799 2238static bfd_reloc_status_type
4ce794b7
AM
2239ppc64_elf_sectoff_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
2240 void *data, asection *input_section,
2241 bfd *output_bfd, char **error_message)
805fc799
AM
2242{
2243 /* If this is a relocatable link (output_bfd test tells us), just
2244 call the generic function. Any adjustment will be done at final
2245 link time. */
2246 if (output_bfd != NULL)
cedb70c5 2247 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
805fc799 2248 input_section, output_bfd, error_message);
5bd4f169 2249
805fc799
AM
2250 /* Subtract the symbol section base address. */
2251 reloc_entry->addend -= symbol->section->output_section->vma;
5bd4f169
AM
2252 return bfd_reloc_continue;
2253}
2254
805fc799 2255static bfd_reloc_status_type
4ce794b7
AM
2256ppc64_elf_sectoff_ha_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
2257 void *data, asection *input_section,
2258 bfd *output_bfd, char **error_message)
805fc799
AM
2259{
2260 /* If this is a relocatable link (output_bfd test tells us), just
2261 call the generic function. Any adjustment will be done at final
2262 link time. */
2263 if (output_bfd != NULL)
cedb70c5 2264 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
805fc799
AM
2265 input_section, output_bfd, error_message);
2266
2267 /* Subtract the symbol section base address. */
2268 reloc_entry->addend -= symbol->section->output_section->vma;
2269
2270 /* Adjust the addend for sign extension of the low 16 bits. */
2271 reloc_entry->addend += 0x8000;
2272 return bfd_reloc_continue;
2273}
2274
2275static bfd_reloc_status_type
4ce794b7
AM
2276ppc64_elf_toc_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
2277 void *data, asection *input_section,
2278 bfd *output_bfd, char **error_message)
805fc799
AM
2279{
2280 bfd_vma TOCstart;
2281
2282 /* If this is a relocatable link (output_bfd test tells us), just
2283 call the generic function. Any adjustment will be done at final
2284 link time. */
2285 if (output_bfd != NULL)
cedb70c5 2286 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
805fc799
AM
2287 input_section, output_bfd, error_message);
2288
2289 TOCstart = _bfd_get_gp_value (input_section->output_section->owner);
2290 if (TOCstart == 0)
2291 TOCstart = ppc64_elf_toc (input_section->output_section->owner);
2292
2293 /* Subtract the TOC base address. */
2294 reloc_entry->addend -= TOCstart + TOC_BASE_OFF;
2295 return bfd_reloc_continue;
2296}
2297
2298static bfd_reloc_status_type
4ce794b7
AM
2299ppc64_elf_toc_ha_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
2300 void *data, asection *input_section,
2301 bfd *output_bfd, char **error_message)
805fc799
AM
2302{
2303 bfd_vma TOCstart;
2304
2305 /* If this is a relocatable link (output_bfd test tells us), just
2306 call the generic function. Any adjustment will be done at final
2307 link time. */
2308 if (output_bfd != NULL)
cedb70c5 2309 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
805fc799
AM
2310 input_section, output_bfd, error_message);
2311
2312 TOCstart = _bfd_get_gp_value (input_section->output_section->owner);
2313 if (TOCstart == 0)
2314 TOCstart = ppc64_elf_toc (input_section->output_section->owner);
2315
2316 /* Subtract the TOC base address. */
2317 reloc_entry->addend -= TOCstart + TOC_BASE_OFF;
2318
2319 /* Adjust the addend for sign extension of the low 16 bits. */
2320 reloc_entry->addend += 0x8000;
2321 return bfd_reloc_continue;
2322}
2323
2324static bfd_reloc_status_type
4ce794b7
AM
2325ppc64_elf_toc64_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
2326 void *data, asection *input_section,
2327 bfd *output_bfd, char **error_message)
805fc799
AM
2328{
2329 bfd_vma TOCstart;
2330 bfd_size_type octets;
2331
2332 /* If this is a relocatable link (output_bfd test tells us), just
2333 call the generic function. Any adjustment will be done at final
2334 link time. */
2335 if (output_bfd != NULL)
cedb70c5 2336 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
805fc799
AM
2337 input_section, output_bfd, error_message);
2338
2339 TOCstart = _bfd_get_gp_value (input_section->output_section->owner);
2340 if (TOCstart == 0)
2341 TOCstart = ppc64_elf_toc (input_section->output_section->owner);
2342
2343 octets = reloc_entry->address * bfd_octets_per_byte (abfd);
2344 bfd_put_64 (abfd, TOCstart + TOC_BASE_OFF, (bfd_byte *) data + octets);
2345 return bfd_reloc_ok;
2346}
2347
2348static bfd_reloc_status_type
4ce794b7
AM
2349ppc64_elf_unhandled_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
2350 void *data, asection *input_section,
2351 bfd *output_bfd, char **error_message)
805fc799
AM
2352{
2353 /* If this is a relocatable link (output_bfd test tells us), just
2354 call the generic function. Any adjustment will be done at final
2355 link time. */
2356 if (output_bfd != NULL)
cedb70c5 2357 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
805fc799
AM
2358 input_section, output_bfd, error_message);
2359
2360 if (error_message != NULL)
2361 {
2362 static char buf[60];
2363 sprintf (buf, "generic linker can't handle %s",
2364 reloc_entry->howto->name);
2365 *error_message = buf;
2366 }
2367 return bfd_reloc_dangerous;
2368}
2369
e717da7e
AM
2370struct ppc64_elf_obj_tdata
2371{
2372 struct elf_obj_tdata elf;
2373
2374 /* Shortcuts to dynamic linker sections. */
2375 asection *got;
2376 asection *relgot;
2377
433817dd
AM
2378 union {
2379 /* Used during garbage collection. We attach global symbols defined
2380 on removed .opd entries to this section so that the sym is removed. */
2381 asection *deleted_section;
2382
2383 /* Used when adding symbols. */
2384 bfd_boolean has_dotsym;
2385 } u;
81688140 2386
e717da7e
AM
2387 /* TLS local dynamic got entry handling. Suppose for multiple GOT
2388 sections means we potentially need one of these for each input bfd. */
2389 union {
2390 bfd_signed_vma refcount;
2391 bfd_vma offset;
2392 } tlsld_got;
8860955f
AM
2393
2394 /* A copy of relocs before they are modified for --emit-relocs. */
2395 Elf_Internal_Rela *opd_relocs;
e717da7e
AM
2396};
2397
2398#define ppc64_elf_tdata(bfd) \
2399 ((struct ppc64_elf_obj_tdata *) (bfd)->tdata.any)
2400
2401#define ppc64_tlsld_got(bfd) \
2402 (&ppc64_elf_tdata (bfd)->tlsld_got)
2403
2404/* Override the generic function because we store some extras. */
2405
2406static bfd_boolean
2407ppc64_elf_mkobject (bfd *abfd)
2408{
2409 bfd_size_type amt = sizeof (struct ppc64_elf_obj_tdata);
2410 abfd->tdata.any = bfd_zalloc (abfd, amt);
2411 if (abfd->tdata.any == NULL)
2412 return FALSE;
2413 return TRUE;
2414}
2415
ee75fd95
AM
2416/* Return 1 if target is one of ours. */
2417
7b53ace3 2418static bfd_boolean
ee75fd95 2419is_ppc64_elf_target (const struct bfd_target *targ)
7b53ace3
AM
2420{
2421 extern const bfd_target bfd_elf64_powerpc_vec;
2422 extern const bfd_target bfd_elf64_powerpcle_vec;
2423
2424 return targ == &bfd_elf64_powerpc_vec || targ == &bfd_elf64_powerpcle_vec;
2425}
2426
feee612b
AM
2427/* Fix bad default arch selected for a 64 bit input bfd when the
2428 default is 32 bit. */
2429
b34976b6 2430static bfd_boolean
4ce794b7 2431ppc64_elf_object_p (bfd *abfd)
feee612b
AM
2432{
2433 if (abfd->arch_info->the_default && abfd->arch_info->bits_per_word == 32)
2434 {
2435 Elf_Internal_Ehdr *i_ehdr = elf_elfheader (abfd);
2436
2437 if (i_ehdr->e_ident[EI_CLASS] == ELFCLASS64)
2438 {
2439 /* Relies on arch after 32 bit default being 64 bit default. */
2440 abfd->arch_info = abfd->arch_info->next;
2441 BFD_ASSERT (abfd->arch_info->bits_per_word == 64);
2442 }
2443 }
b34976b6 2444 return TRUE;
feee612b
AM
2445}
2446
d37c89e5
AM
2447/* Support for core dump NOTE sections. */
2448
2449static bfd_boolean
2450ppc64_elf_grok_prstatus (bfd *abfd, Elf_Internal_Note *note)
2451{
eea6121a 2452 size_t offset, size;
d37c89e5
AM
2453
2454 if (note->descsz != 504)
2455 return FALSE;
2456
2457 /* pr_cursig */
2458 elf_tdata (abfd)->core_signal = bfd_get_16 (abfd, note->descdata + 12);
2459
2460 /* pr_pid */
2461 elf_tdata (abfd)->core_pid = bfd_get_32 (abfd, note->descdata + 32);
2462
2463 /* pr_reg */
2464 offset = 112;
eea6121a 2465 size = 384;
d37c89e5
AM
2466
2467 /* Make a ".reg/999" section. */
2468 return _bfd_elfcore_make_pseudosection (abfd, ".reg",
eea6121a 2469 size, note->descpos + offset);
d37c89e5
AM
2470}
2471
2472static bfd_boolean
2473ppc64_elf_grok_psinfo (bfd *abfd, Elf_Internal_Note *note)
2474{
2475 if (note->descsz != 136)
2476 return FALSE;
2477
2478 elf_tdata (abfd)->core_program
2479 = _bfd_elfcore_strndup (abfd, note->descdata + 40, 16);
2480 elf_tdata (abfd)->core_command
2481 = _bfd_elfcore_strndup (abfd, note->descdata + 56, 80);
2482
2483 return TRUE;
2484}
2485
5bd4f169
AM
2486/* Merge backend specific data from an object file to the output
2487 object file when linking. */
2f6d9989 2488
b34976b6 2489static bfd_boolean
4ce794b7 2490ppc64_elf_merge_private_bfd_data (bfd *ibfd, bfd *obfd)
5bd4f169 2491{
5bd4f169
AM
2492 /* Check if we have the same endianess. */
2493 if (ibfd->xvec->byteorder != obfd->xvec->byteorder
87e226ce 2494 && ibfd->xvec->byteorder != BFD_ENDIAN_UNKNOWN
5bd4f169
AM
2495 && obfd->xvec->byteorder != BFD_ENDIAN_UNKNOWN)
2496 {
2497 const char *msg;
2498
2499 if (bfd_big_endian (ibfd))
d003868e 2500 msg = _("%B: compiled for a big endian system "
4ce794b7 2501 "and target is little endian");
5bd4f169 2502 else
d003868e 2503 msg = _("%B: compiled for a little endian system "
4ce794b7 2504 "and target is big endian");
5bd4f169 2505
d003868e 2506 (*_bfd_error_handler) (msg, ibfd);
5bd4f169
AM
2507
2508 bfd_set_error (bfd_error_wrong_format);
b34976b6 2509 return FALSE;
5bd4f169
AM
2510 }
2511
b34976b6 2512 return TRUE;
5bd4f169 2513}
f0abc2a1 2514
5d35169e
AM
2515/* Add extra PPC sections. */
2516
b35d266b 2517static const struct bfd_elf_special_section ppc64_elf_special_sections[]=
7f4d3958
L
2518{
2519 { ".plt", 4, 0, SHT_NOBITS, 0 },
7dcb9820 2520 { ".sbss", 5, -2, SHT_NOBITS, SHF_ALLOC + SHF_WRITE },
551b43fd 2521 { ".sdata", 6, -2, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE },
7dcb9820
AM
2522 { ".toc", 4, 0, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE },
2523 { ".toc1", 5, 0, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE },
2524 { ".tocbss", 7, 0, SHT_NOBITS, SHF_ALLOC + SHF_WRITE },
2525 { NULL, 0, 0, 0, 0 }
5d35169e
AM
2526};
2527
f0abc2a1
AM
2528struct _ppc64_elf_section_data
2529{
2530 struct bfd_elf_section_data elf;
411e1bfb
AM
2531
2532 /* An array with one entry for each opd function descriptor. */
f0abc2a1
AM
2533 union
2534 {
411e1bfb 2535 /* Points to the function code section for local opd entries. */
f0abc2a1 2536 asection **func_sec;
411e1bfb 2537 /* After editing .opd, adjust references to opd local syms. */
f0abc2a1
AM
2538 long *adjust;
2539 } opd;
411e1bfb
AM
2540
2541 /* An array for toc sections, indexed by offset/8.
2542 Specifies the relocation symbol index used at a given toc offset. */
2543 unsigned *t_symndx;
f0abc2a1
AM
2544};
2545
2546#define ppc64_elf_section_data(sec) \
411e1bfb 2547 ((struct _ppc64_elf_section_data *) elf_section_data (sec))
f0abc2a1
AM
2548
2549static bfd_boolean
4ce794b7 2550ppc64_elf_new_section_hook (bfd *abfd, asection *sec)
f0abc2a1
AM
2551{
2552 struct _ppc64_elf_section_data *sdata;
2553 bfd_size_type amt = sizeof (*sdata);
2554
4ce794b7 2555 sdata = bfd_zalloc (abfd, amt);
f0abc2a1
AM
2556 if (sdata == NULL)
2557 return FALSE;
4ce794b7 2558 sec->used_by_bfd = sdata;
f0abc2a1
AM
2559
2560 return _bfd_elf_new_section_hook (abfd, sec);
2561}
4025353c
AM
2562
2563static void *
2564get_opd_info (asection * sec)
2565{
2566 if (sec != NULL
2567 && ppc64_elf_section_data (sec) != NULL
2568 && ppc64_elf_section_data (sec)->opd.adjust != NULL)
2569 return ppc64_elf_section_data (sec)->opd.adjust;
2570 return NULL;
2571}
90e3cdf2
JJ
2572\f
2573/* Parameters for the qsort hook. */
2574static asection *synthetic_opd;
2575static bfd_boolean synthetic_relocatable;
2576
699733f6 2577/* qsort comparison function for ppc64_elf_get_synthetic_symtab. */
90e3cdf2
JJ
2578
2579static int
2580compare_symbols (const void *ap, const void *bp)
2581{
2582 const asymbol *a = * (const asymbol **) ap;
2583 const asymbol *b = * (const asymbol **) bp;
2584
699733f6
AM
2585 /* Section symbols first. */
2586 if ((a->flags & BSF_SECTION_SYM) && !(b->flags & BSF_SECTION_SYM))
90e3cdf2 2587 return -1;
699733f6 2588 if (!(a->flags & BSF_SECTION_SYM) && (b->flags & BSF_SECTION_SYM))
90e3cdf2
JJ
2589 return 1;
2590
699733f6 2591 /* then .opd symbols. */
90e3cdf2
JJ
2592 if (a->section == synthetic_opd && b->section != synthetic_opd)
2593 return -1;
2594 if (a->section != synthetic_opd && b->section == synthetic_opd)
2595 return 1;
2596
699733f6 2597 /* then other code symbols. */
90e3cdf2
JJ
2598 if ((a->section->flags & (SEC_CODE | SEC_ALLOC | SEC_THREAD_LOCAL))
2599 == (SEC_CODE | SEC_ALLOC)
2600 && (b->section->flags & (SEC_CODE | SEC_ALLOC | SEC_THREAD_LOCAL))
2601 != (SEC_CODE | SEC_ALLOC))
2602 return -1;
2603
2604 if ((a->section->flags & (SEC_CODE | SEC_ALLOC | SEC_THREAD_LOCAL))
2605 != (SEC_CODE | SEC_ALLOC)
2606 && (b->section->flags & (SEC_CODE | SEC_ALLOC | SEC_THREAD_LOCAL))
2607 == (SEC_CODE | SEC_ALLOC))
2608 return 1;
2609
2610 if (synthetic_relocatable)
2611 {
2612 if (a->section->id < b->section->id)
2613 return -1;
2614
2615 if (a->section->id > b->section->id)
2616 return 1;
2617 }
2618
2619 if (a->value + a->section->vma < b->value + b->section->vma)
2620 return -1;
2621
2622 if (a->value + a->section->vma > b->value + b->section->vma)
2623 return 1;
2624
2625 return 0;
2626}
2627
699733f6 2628/* Search SYMS for a symbol of the given VALUE. */
90e3cdf2 2629
699733f6
AM
2630static asymbol *
2631sym_exists_at (asymbol **syms, long lo, long hi, int id, bfd_vma value)
90e3cdf2 2632{
699733f6 2633 long mid;
90e3cdf2 2634
699733f6
AM
2635 if (id == -1)
2636 {
2637 while (lo < hi)
2638 {
2639 mid = (lo + hi) >> 1;
2640 if (syms[mid]->value + syms[mid]->section->vma < value)
2641 lo = mid + 1;
2642 else if (syms[mid]->value + syms[mid]->section->vma > value)
2643 hi = mid;
2644 else
2645 return syms[mid];
2646 }
2647 }
2648 else
2649 {
2650 while (lo < hi)
2651 {
2652 mid = (lo + hi) >> 1;
2653 if (syms[mid]->section->id < id)
2654 lo = mid + 1;
2655 else if (syms[mid]->section->id > id)
2656 hi = mid;
2657 else if (syms[mid]->value < value)
2658 lo = mid + 1;
2659 else if (syms[mid]->value > value)
2660 hi = mid;
2661 else
2662 return syms[mid];
2663 }
2664 }
2665 return NULL;
90e3cdf2
JJ
2666}
2667
699733f6
AM
2668/* Create synthetic symbols, effectively restoring "dot-symbol" function
2669 entry syms. */
90e3cdf2
JJ
2670
2671static long
a7535cf3
AM
2672ppc64_elf_get_synthetic_symtab (bfd *abfd,
2673 long static_count, asymbol **static_syms,
2674 long dyn_count, asymbol **dyn_syms,
c9727e01 2675 asymbol **ret)
90e3cdf2
JJ
2676{
2677 asymbol *s;
699733f6
AM
2678 long i;
2679 long count;
90e3cdf2 2680 char *names;
a7535cf3 2681 long symcount, codesecsym, codesecsymend, secsymend, opdsymend;
699733f6 2682 asection *opd;
90e3cdf2 2683 bfd_boolean relocatable = (abfd->flags & (EXEC_P | DYNAMIC)) == 0;
a7535cf3 2684 asymbol **syms;
90e3cdf2
JJ
2685
2686 *ret = NULL;
2687
2688 opd = bfd_get_section_by_name (abfd, ".opd");
2689 if (opd == NULL)
2690 return 0;
2691
a7535cf3 2692 symcount = static_count;
c9727e01 2693 if (!relocatable)
a7535cf3 2694 symcount += dyn_count;
90e3cdf2 2695 if (symcount == 0)
c9727e01 2696 return 0;
90e3cdf2 2697
a7535cf3
AM
2698 syms = bfd_malloc ((symcount + 1) * sizeof (*syms));
2699 if (syms == NULL)
7356fed5 2700 return -1;
a7535cf3
AM
2701
2702 if (!relocatable && static_count != 0 && dyn_count != 0)
2703 {
2704 /* Use both symbol tables. */
2705 memcpy (syms, static_syms, static_count * sizeof (*syms));
2706 memcpy (syms + static_count, dyn_syms, (dyn_count + 1) * sizeof (*syms));
2707 }
2708 else if (!relocatable && static_count == 0)
2709 memcpy (syms, dyn_syms, (symcount + 1) * sizeof (*syms));
2710 else
2711 memcpy (syms, static_syms, (symcount + 1) * sizeof (*syms));
2712
90e3cdf2
JJ
2713 synthetic_opd = opd;
2714 synthetic_relocatable = relocatable;
595da8c5 2715 qsort (syms, symcount, sizeof (*syms), compare_symbols);
90e3cdf2 2716
c9727e01
AM
2717 if (!relocatable && symcount > 1)
2718 {
2719 long j;
2720 /* Trim duplicate syms, since we may have merged the normal and
2721 dynamic symbols. Actually, we only care about syms that have
3b36f7e6 2722 different values, so trim any with the same value. */
c9727e01
AM
2723 for (i = 1, j = 1; i < symcount; ++i)
2724 if (syms[i - 1]->value + syms[i - 1]->section->vma
2725 != syms[i]->value + syms[i]->section->vma)
2726 syms[j++] = syms[i];
2727 symcount = j;
2728 }
2729
699733f6
AM
2730 i = 0;
2731 if (syms[i]->section == opd)
2732 ++i;
2733 codesecsym = i;
90e3cdf2 2734
699733f6
AM
2735 for (; i < symcount; ++i)
2736 if (((syms[i]->section->flags & (SEC_CODE | SEC_ALLOC | SEC_THREAD_LOCAL))
2737 != (SEC_CODE | SEC_ALLOC))
2738 || (syms[i]->flags & BSF_SECTION_SYM) == 0)
2739 break;
2740 codesecsymend = i;
90e3cdf2 2741
699733f6
AM
2742 for (; i < symcount; ++i)
2743 if ((syms[i]->flags & BSF_SECTION_SYM) == 0)
2744 break;
2745 secsymend = i;
90e3cdf2 2746
699733f6
AM
2747 for (; i < symcount; ++i)
2748 if (syms[i]->section != opd)
2749 break;
2750 opdsymend = i;
90e3cdf2 2751
699733f6
AM
2752 for (; i < symcount; ++i)
2753 if ((syms[i]->section->flags & (SEC_CODE | SEC_ALLOC | SEC_THREAD_LOCAL))
2754 != (SEC_CODE | SEC_ALLOC))
2755 break;
2756 symcount = i;
2757
c9727e01 2758 count = 0;
699733f6 2759 if (opdsymend == secsymend)
c9727e01 2760 goto done;
90e3cdf2 2761
699733f6 2762 if (relocatable)
90e3cdf2 2763 {
699733f6
AM
2764 bfd_boolean (*slurp_relocs) (bfd *, asection *, asymbol **, bfd_boolean);
2765 arelent *r;
2766 size_t size;
2767 long relcount;
90e3cdf2 2768
699733f6 2769 slurp_relocs = get_elf_backend_data (abfd)->s->slurp_reloc_table;
90e3cdf2 2770 relcount = (opd->flags & SEC_RELOC) ? opd->reloc_count : 0;
7356fed5 2771 if (relcount == 0)
c9727e01 2772 goto done;
90e3cdf2 2773
7356fed5
AM
2774 if (!(*slurp_relocs) (abfd, opd, static_syms, FALSE))
2775 {
2776 count = -1;
2777 goto done;
2778 }
2779
699733f6 2780 size = 0;
595da8c5 2781 for (i = secsymend, r = opd->relocation; i < opdsymend; ++i)
699733f6
AM
2782 {
2783 asymbol *sym;
90e3cdf2 2784
595da8c5 2785 while (r < opd->relocation + relcount
699733f6
AM
2786 && r->address < syms[i]->value + opd->vma)
2787 ++r;
90e3cdf2 2788
595da8c5 2789 if (r == opd->relocation + relcount)
699733f6 2790 break;
90e3cdf2 2791
699733f6
AM
2792 if (r->address != syms[i]->value + opd->vma)
2793 continue;
90e3cdf2 2794
699733f6
AM
2795 if (r->howto->type != R_PPC64_ADDR64)
2796 continue;
90e3cdf2 2797
699733f6
AM
2798 sym = *r->sym_ptr_ptr;
2799 if (!sym_exists_at (syms, opdsymend, symcount,
2800 sym->section->id, sym->value + r->addend))
2801 {
2802 ++count;
2803 size += sizeof (asymbol);
2804 size += strlen (syms[i]->name) + 2;
2805 }
2806 }
90e3cdf2 2807
699733f6
AM
2808 s = *ret = bfd_malloc (size);
2809 if (s == NULL)
2810 {
7356fed5 2811 count = -1;
c9727e01 2812 goto done;
699733f6 2813 }
90e3cdf2 2814
699733f6 2815 names = (char *) (s + count);
90e3cdf2 2816
595da8c5 2817 for (i = secsymend, r = opd->relocation; i < opdsymend; ++i)
90e3cdf2 2818 {
699733f6 2819 asymbol *sym;
90e3cdf2 2820
595da8c5 2821 while (r < opd->relocation + relcount
699733f6
AM
2822 && r->address < syms[i]->value + opd->vma)
2823 ++r;
90e3cdf2 2824
595da8c5 2825 if (r == opd->relocation + relcount)
699733f6
AM
2826 break;
2827
2828 if (r->address != syms[i]->value + opd->vma)
2829 continue;
2830
2831 if (r->howto->type != R_PPC64_ADDR64)
2832 continue;
90e3cdf2 2833
699733f6
AM
2834 sym = *r->sym_ptr_ptr;
2835 if (!sym_exists_at (syms, opdsymend, symcount,
2836 sym->section->id, sym->value + r->addend))
2837 {
2838 size_t len;
2839
2840 *s = *syms[i];
2841 s->section = sym->section;
2842 s->value = sym->value + r->addend;
2843 s->name = names;
2844 *names++ = '.';
2845 len = strlen (syms[i]->name);
2846 memcpy (names, syms[i]->name, len + 1);
2847 names += len + 1;
2848 s++;
2849 }
2850 }
2851 }
2852 else
90e3cdf2 2853 {
699733f6
AM
2854 bfd_byte *contents;
2855 size_t size;
90e3cdf2 2856
699733f6
AM
2857 if (!bfd_malloc_and_get_section (abfd, opd, &contents))
2858 {
2859 if (contents)
c9727e01
AM
2860 {
2861 free_contents_and_exit:
2862 free (contents);
2863 }
7356fed5 2864 count = -1;
c9727e01 2865 goto done;
699733f6 2866 }
90e3cdf2 2867
699733f6
AM
2868 size = 0;
2869 for (i = secsymend; i < opdsymend; ++i)
2870 {
2871 bfd_vma ent;
90e3cdf2 2872
699733f6
AM
2873 ent = bfd_get_64 (abfd, contents + syms[i]->value);
2874 if (!sym_exists_at (syms, opdsymend, symcount, -1, ent))
2875 {
2876 ++count;
2877 size += sizeof (asymbol);
2878 size += strlen (syms[i]->name) + 2;
2879 }
2880 }
90e3cdf2 2881
699733f6
AM
2882 s = *ret = bfd_malloc (size);
2883 if (s == NULL)
7356fed5 2884 goto free_contents_and_exit;
90e3cdf2 2885
699733f6 2886 names = (char *) (s + count);
90e3cdf2 2887
699733f6 2888 for (i = secsymend; i < opdsymend; ++i)
90e3cdf2 2889 {
699733f6 2890 bfd_vma ent;
90e3cdf2 2891
699733f6
AM
2892 ent = bfd_get_64 (abfd, contents + syms[i]->value);
2893 if (!sym_exists_at (syms, opdsymend, symcount, -1, ent))
90e3cdf2 2894 {
c9727e01 2895 long lo, hi;
699733f6 2896 size_t len;
c9727e01 2897 asection *sec = abfd->sections;
90e3cdf2 2898
699733f6
AM
2899 *s = *syms[i];
2900 lo = codesecsym;
2901 hi = codesecsymend;
2902 while (lo < hi)
2903 {
c9727e01 2904 long mid = (lo + hi) >> 1;
699733f6
AM
2905 if (syms[mid]->section->vma < ent)
2906 lo = mid + 1;
2907 else if (syms[mid]->section->vma > ent)
2908 hi = mid;
2909 else
c9727e01
AM
2910 {
2911 sec = syms[mid]->section;
2912 break;
2913 }
699733f6
AM
2914 }
2915
c9727e01 2916 if (lo >= hi && lo > codesecsym)
699733f6 2917 sec = syms[lo - 1]->section;
699733f6
AM
2918
2919 for (; sec != NULL; sec = sec->next)
2920 {
2921 if (sec->vma > ent)
2922 break;
2923 if ((sec->flags & SEC_ALLOC) == 0
2924 || (sec->flags & SEC_LOAD) == 0)
2925 break;
2926 if ((sec->flags & SEC_CODE) != 0)
2927 s->section = sec;
2928 }
2929 s->value = ent - s->section->vma;
2930 s->name = names;
2931 *names++ = '.';
2932 len = strlen (syms[i]->name);
2933 memcpy (names, syms[i]->name, len + 1);
2934 names += len + 1;
2935 s++;
90e3cdf2 2936 }
90e3cdf2 2937 }
699733f6 2938 free (contents);
90e3cdf2
JJ
2939 }
2940
c9727e01 2941 done:
a7535cf3 2942 free (syms);
90e3cdf2
JJ
2943 return count;
2944}
5bd4f169 2945\f
65f38f15
AM
2946/* The following functions are specific to the ELF linker, while
2947 functions above are used generally. Those named ppc64_elf_* are
2948 called by the main ELF linker code. They appear in this file more
2949 or less in the order in which they are called. eg.
2950 ppc64_elf_check_relocs is called early in the link process,
2951 ppc64_elf_finish_dynamic_sections is one of the last functions
e86ce104
AM
2952 called.
2953
2954 PowerPC64-ELF uses a similar scheme to PowerPC64-XCOFF in that
2955 functions have both a function code symbol and a function descriptor
2956 symbol. A call to foo in a relocatable object file looks like:
2957
2958 . .text
2959 . x:
2960 . bl .foo
2961 . nop
2962
2963 The function definition in another object file might be:
2964
2965 . .section .opd
2966 . foo: .quad .foo
2967 . .quad .TOC.@tocbase
2968 . .quad 0
2969 .
2970 . .text
2971 . .foo: blr
2972
2973 When the linker resolves the call during a static link, the branch
2974 unsurprisingly just goes to .foo and the .opd information is unused.
2975 If the function definition is in a shared library, things are a little
2976 different: The call goes via a plt call stub, the opd information gets
2977 copied to the plt, and the linker patches the nop.
2978
2979 . x:
2980 . bl .foo_stub
2981 . ld 2,40(1)
2982 .
2983 .
2984 . .foo_stub:
2985 . addis 12,2,Lfoo@toc@ha # in practice, the call stub
411e1bfb 2986 . addi 12,12,Lfoo@toc@l # is slightly optimized, but
e86ce104
AM
2987 . std 2,40(1) # this is the general idea
2988 . ld 11,0(12)
2989 . ld 2,8(12)
2990 . mtctr 11
2991 . ld 11,16(12)
2992 . bctr
2993 .
2994 . .section .plt
2995 . Lfoo: reloc (R_PPC64_JMP_SLOT, foo)
2996
2997 The "reloc ()" notation is supposed to indicate that the linker emits
2998 an R_PPC64_JMP_SLOT reloc against foo. The dynamic linker does the opd
2999 copying.
3000
3001 What are the difficulties here? Well, firstly, the relocations
3002 examined by the linker in check_relocs are against the function code
3003 sym .foo, while the dynamic relocation in the plt is emitted against
3004 the function descriptor symbol, foo. Somewhere along the line, we need
3005 to carefully copy dynamic link information from one symbol to the other.
3006 Secondly, the generic part of the elf linker will make .foo a dynamic
3007 symbol as is normal for most other backends. We need foo dynamic
3008 instead, at least for an application final link. However, when
3009 creating a shared library containing foo, we need to have both symbols
3010 dynamic so that references to .foo are satisfied during the early
3011 stages of linking. Otherwise the linker might decide to pull in a
8387904d
AM
3012 definition from some other object, eg. a static library.
3013
3014 Update: As of August 2004, we support a new convention. Function
3015 calls may use the function descriptor symbol, ie. "bl foo". This
3016 behaves exactly as "bl .foo". */
65f38f15
AM
3017
3018/* The linker needs to keep track of the number of relocs that it
3019 decides to copy as dynamic relocs in check_relocs for each symbol.
3020 This is so that it can later discard them if they are found to be
3021 unnecessary. We store the information in a field extending the
3022 regular ELF linker hash table. */
3023
3024struct ppc_dyn_relocs
3025{
3026 struct ppc_dyn_relocs *next;
3027
3028 /* The input section of the reloc. */
3029 asection *sec;
3030
3031 /* Total number of relocs copied for the input section. */
3032 bfd_size_type count;
3033
3034 /* Number of pc-relative relocs copied for the input section. */
3035 bfd_size_type pc_count;
3036};
3037
411e1bfb
AM
3038/* Track GOT entries needed for a given symbol. We might need more
3039 than one got entry per symbol. */
3040struct got_entry
3041{
3042 struct got_entry *next;
3043
e7b938ca 3044 /* The symbol addend that we'll be placing in the GOT. */
411e1bfb
AM
3045 bfd_vma addend;
3046
e717da7e
AM
3047 /* Unlike other ELF targets, we use separate GOT entries for the same
3048 symbol referenced from different input files. This is to support
3049 automatic multiple TOC/GOT sections, where the TOC base can vary
3050 from one input file to another.
3051
3052 Point to the BFD owning this GOT entry. */
3053 bfd *owner;
3054
3055 /* Zero for non-tls entries, or TLS_TLS and one of TLS_GD, TLS_LD,
3056 TLS_TPREL or TLS_DTPREL for tls entries. */
3057 char tls_type;
3058
e7b938ca 3059 /* Reference count until size_dynamic_sections, GOT offset thereafter. */
411e1bfb
AM
3060 union
3061 {
3062 bfd_signed_vma refcount;
3063 bfd_vma offset;
3064 } got;
411e1bfb
AM
3065};
3066
3067/* The same for PLT. */
3068struct plt_entry
3069{
3070 struct plt_entry *next;
3071
3072 bfd_vma addend;
3073
3074 union
3075 {
3076 bfd_signed_vma refcount;
3077 bfd_vma offset;
3078 } plt;
3079};
3080
65f38f15 3081/* Of those relocs that might be copied as dynamic relocs, this macro
58ac9f71
AM
3082 selects those that must be copied when linking a shared library,
3083 even when the symbol is local. */
65f38f15 3084
411e1bfb 3085#define MUST_BE_DYN_RELOC(RTYPE) \
805fc799
AM
3086 ((RTYPE) != R_PPC64_REL32 \
3087 && (RTYPE) != R_PPC64_REL64 \
04c9666a 3088 && (RTYPE) != R_PPC64_REL30)
65f38f15 3089
f4656909
AM
3090/* If ELIMINATE_COPY_RELOCS is non-zero, the linker will try to avoid
3091 copying dynamic variables from a shared lib into an app's dynbss
3092 section, and instead use a dynamic relocation to point into the
5d35169e
AM
3093 shared lib. With code that gcc generates, it's vital that this be
3094 enabled; In the PowerPC64 ABI, the address of a function is actually
3095 the address of a function descriptor, which resides in the .opd
3096 section. gcc uses the descriptor directly rather than going via the
3097 GOT as some other ABI's do, which means that initialized function
3098 pointers must reference the descriptor. Thus, a function pointer
3099 initialized to the address of a function in a shared library will
3100 either require a copy reloc, or a dynamic reloc. Using a copy reloc
4cc11e76 3101 redefines the function descriptor symbol to point to the copy. This
5d35169e
AM
3102 presents a problem as a plt entry for that function is also
3103 initialized from the function descriptor symbol and the copy reloc
3104 may not be initialized first. */
a23b6845 3105#define ELIMINATE_COPY_RELOCS 1
f4656909 3106
721956f4
AM
3107/* Section name for stubs is the associated section name plus this
3108 string. */
3109#define STUB_SUFFIX ".stub"
3110
3111/* Linker stubs.
3112 ppc_stub_long_branch:
3113 Used when a 14 bit branch (or even a 24 bit branch) can't reach its
3114 destination, but a 24 bit branch in a stub section will reach.
3115 . b dest
3116
3117 ppc_stub_plt_branch:
3118 Similar to the above, but a 24 bit branch in the stub section won't
3119 reach its destination.
87e226ce
AM
3120 . addis %r12,%r2,xxx@toc@ha
3121 . ld %r11,xxx@toc@l(%r12)
721956f4
AM
3122 . mtctr %r11
3123 . bctr
3124
3125 ppc_stub_plt_call:
2c66dc6c
AM
3126 Used to call a function in a shared library. If it so happens that
3127 the plt entry referenced crosses a 64k boundary, then an extra
3128 "addis %r12,%r12,1" will be inserted before the load at xxx+8 or
3129 xxx+16 as appropriate.
87e226ce 3130 . addis %r12,%r2,xxx@toc@ha
721956f4 3131 . std %r2,40(%r1)
87e226ce
AM
3132 . ld %r11,xxx+0@toc@l(%r12)
3133 . ld %r2,xxx+8@toc@l(%r12)
721956f4 3134 . mtctr %r11
87e226ce 3135 . ld %r11,xxx+16@toc@l(%r12)
721956f4 3136 . bctr
ad8e1ba5
AM
3137
3138 ppc_stub_long_branch and ppc_stub_plt_branch may also have additional
3139 code to adjust the value and save r2 to support multiple toc sections.
3140 A ppc_stub_long_branch with an r2 offset looks like:
3141 . std %r2,40(%r1)
3142 . addis %r2,%r2,off@ha
3143 . addi %r2,%r2,off@l
3144 . b dest
3145
3146 A ppc_stub_plt_branch with an r2 offset looks like:
3147 . std %r2,40(%r1)
3148 . addis %r12,%r2,xxx@toc@ha
3149 . ld %r11,xxx@toc@l(%r12)
3150 . addis %r2,%r2,off@ha
3151 . addi %r2,%r2,off@l
3152 . mtctr %r11
3153 . bctr
721956f4
AM
3154*/
3155
3156enum ppc_stub_type {
3157 ppc_stub_none,
3158 ppc_stub_long_branch,
ad8e1ba5 3159 ppc_stub_long_branch_r2off,
721956f4 3160 ppc_stub_plt_branch,
ad8e1ba5 3161 ppc_stub_plt_branch_r2off,
721956f4
AM
3162 ppc_stub_plt_call
3163};
3164
3165struct ppc_stub_hash_entry {
3166
3167 /* Base hash table entry structure. */
3168 struct bfd_hash_entry root;
3169
ad8e1ba5
AM
3170 enum ppc_stub_type stub_type;
3171
721956f4
AM
3172 /* The stub section. */
3173 asection *stub_sec;
3174
3175 /* Offset within stub_sec of the beginning of this stub. */
3176 bfd_vma stub_offset;
3177
3178 /* Given the symbol's value and its section we can determine its final
3179 value when building the stubs (so the stub knows where to jump. */
3180 bfd_vma target_value;
3181 asection *target_section;
3182
721956f4
AM
3183 /* The symbol table entry, if any, that this was derived from. */
3184 struct ppc_link_hash_entry *h;
3185
411e1bfb
AM
3186 /* And the reloc addend that this was derived from. */
3187 bfd_vma addend;
3188
721956f4
AM
3189 /* Where this stub is being called from, or, in the case of combined
3190 stub sections, the first input section in the group. */
3191 asection *id_sec;
3192};
3193
3194struct ppc_branch_hash_entry {
3195
3196 /* Base hash table entry structure. */
3197 struct bfd_hash_entry root;
3198
c456f082 3199 /* Offset within branch lookup table. */
721956f4
AM
3200 unsigned int offset;
3201
3202 /* Generation marker. */
3203 unsigned int iter;
3204};
65f38f15
AM
3205
3206struct ppc_link_hash_entry
3207{
3208 struct elf_link_hash_entry elf;
3209
721956f4
AM
3210 /* A pointer to the most recently used stub hash entry against this
3211 symbol. */
3212 struct ppc_stub_hash_entry *stub_cache;
3213
65f38f15
AM
3214 /* Track dynamic relocs copied for this symbol. */
3215 struct ppc_dyn_relocs *dyn_relocs;
e86ce104 3216
721956f4 3217 /* Link between function code and descriptor symbols. */
34814b9f 3218 struct ppc_link_hash_entry *oh;
721956f4 3219
e86ce104
AM
3220 /* Flag function code and descriptor symbols. */
3221 unsigned int is_func:1;
3222 unsigned int is_func_descriptor:1;
908b32fc 3223 unsigned int fake:1;
411e1bfb 3224
c5614fa4
AM
3225 /* Whether global opd/toc sym has been adjusted or not.
3226 After ppc64_elf_edit_opd/ppc64_elf_edit_toc has run, this flag
3227 should be set for all globals defined in any opd/toc section. */
754021d0
AM
3228 unsigned int adjust_done:1;
3229
99877b66
AM
3230 /* Set if we twiddled this symbol to weak at some stage. */
3231 unsigned int was_undefined:1;
3232
411e1bfb 3233 /* Contexts in which symbol is used in the GOT (or TOC).
e7b938ca
AM
3234 TLS_GD .. TLS_EXPLICIT bits are or'd into the mask as the
3235 corresponding relocs are encountered during check_relocs.
3236 tls_optimize clears TLS_GD .. TLS_TPREL when optimizing to
3237 indicate the corresponding GOT entry type is not needed.
3238 tls_optimize may also set TLS_TPRELGD when a GD reloc turns into
3239 a TPREL one. We use a separate flag rather than setting TPREL
3240 just for convenience in distinguishing the two cases. */
3241#define TLS_GD 1 /* GD reloc. */
3242#define TLS_LD 2 /* LD reloc. */
3243#define TLS_TPREL 4 /* TPREL reloc, => IE. */
3244#define TLS_DTPREL 8 /* DTPREL reloc, => LD. */
3245#define TLS_TLS 16 /* Any TLS reloc. */
3246#define TLS_EXPLICIT 32 /* Marks TOC section TLS relocs. */
3247#define TLS_TPRELGD 64 /* TPREL reloc resulting from GD->IE. */
3248 char tls_mask;
65f38f15
AM
3249};
3250
3251/* ppc64 ELF linker hash table. */
3252
3253struct ppc_link_hash_table
3254{
3255 struct elf_link_hash_table elf;
3256
721956f4
AM
3257 /* The stub hash table. */
3258 struct bfd_hash_table stub_hash_table;
3259
3260 /* Another hash table for plt_branch stubs. */
3261 struct bfd_hash_table branch_hash_table;
3262
3263 /* Linker stub bfd. */
3264 bfd *stub_bfd;
3265
3266 /* Linker call-backs. */
4ce794b7
AM
3267 asection * (*add_stub_section) (const char *, asection *);
3268 void (*layout_sections_again) (void);
721956f4
AM
3269
3270 /* Array to keep track of which stub sections have been created, and
3271 information on stub grouping. */
3272 struct map_stub {
3273 /* This is the section to which stubs in the group will be attached. */
3274 asection *link_sec;
3275 /* The stub section. */
3276 asection *stub_sec;
ad8e1ba5
AM
3277 /* Along with elf_gp, specifies the TOC pointer used in this group. */
3278 bfd_vma toc_off;
721956f4
AM
3279 } *stub_group;
3280
ad8e1ba5
AM
3281 /* Temp used when calculating TOC pointers. */
3282 bfd_vma toc_curr;
3283
8f3bab57
AM
3284 /* Highest input section id. */
3285 int top_id;
3286
734b6cf9
AM
3287 /* Highest output section index. */
3288 int top_index;
3289
3290 /* List of input sections for each output section. */
3291 asection **input_list;
721956f4 3292
65f38f15 3293 /* Short-cuts to get to dynamic linker sections. */
4ce794b7 3294 asection *got;
4ce794b7
AM
3295 asection *plt;
3296 asection *relplt;
3297 asection *dynbss;
3298 asection *relbss;
3299 asection *glink;
82bd7b59 3300 asection *sfpr;
4ce794b7
AM
3301 asection *brlt;
3302 asection *relbrlt;
ec338859 3303
8387904d
AM
3304 /* Shortcut to .__tls_get_addr and __tls_get_addr. */
3305 struct ppc_link_hash_entry *tls_get_addr;
3306 struct ppc_link_hash_entry *tls_get_addr_fd;
411e1bfb 3307
9b5ecbd0
AM
3308 /* Statistics. */
3309 unsigned long stub_count[ppc_stub_plt_call];
3310
ee75fd95
AM
3311 /* Number of stubs against global syms. */
3312 unsigned long stub_globals;
3313
ad8e1ba5 3314 /* Set if we should emit symbols for stubs. */
99877b66 3315 unsigned int emit_stub_syms:1;
ad8e1ba5 3316
4c52953f
AM
3317 /* Support for multiple toc sections. */
3318 unsigned int no_multi_toc:1;
3319 unsigned int multi_toc_needed:1;
3320
5d1634d7 3321 /* Set on error. */
99877b66 3322 unsigned int stub_error:1;
721956f4
AM
3323
3324 /* Flag set when small branches are detected. Used to
3325 select suitable defaults for the stub group size. */
99877b66
AM
3326 unsigned int has_14bit_branch:1;
3327
3328 /* Temp used by ppc64_elf_check_directives. */
3329 unsigned int twiddled_syms:1;
721956f4
AM
3330
3331 /* Incremented every time we size stubs. */
3332 unsigned int stub_iteration;
5d1634d7 3333
ec338859
AM
3334 /* Small local sym to section mapping cache. */
3335 struct sym_sec_cache sym_sec;
65f38f15
AM
3336};
3337
4c52953f
AM
3338/* Rename some of the generic section flags to better document how they
3339 are used here. */
3340#define has_toc_reloc has_gp_reloc
3341#define makes_toc_func_call need_finalize_relax
3342#define call_check_in_progress reloc_done
3343
65f38f15
AM
3344/* Get the ppc64 ELF linker hash table from a link_info structure. */
3345
3346#define ppc_hash_table(p) \
3347 ((struct ppc_link_hash_table *) ((p)->hash))
3348
721956f4
AM
3349#define ppc_stub_hash_lookup(table, string, create, copy) \
3350 ((struct ppc_stub_hash_entry *) \
3351 bfd_hash_lookup ((table), (string), (create), (copy)))
3352
3353#define ppc_branch_hash_lookup(table, string, create, copy) \
3354 ((struct ppc_branch_hash_entry *) \
3355 bfd_hash_lookup ((table), (string), (create), (copy)))
3356
3357/* Create an entry in the stub hash table. */
3358
3359static struct bfd_hash_entry *
4ce794b7
AM
3360stub_hash_newfunc (struct bfd_hash_entry *entry,
3361 struct bfd_hash_table *table,
3362 const char *string)
721956f4
AM
3363{
3364 /* Allocate the structure if it has not already been allocated by a
3365 subclass. */
3366 if (entry == NULL)
3367 {
3368 entry = bfd_hash_allocate (table, sizeof (struct ppc_stub_hash_entry));
3369 if (entry == NULL)
3370 return entry;
3371 }
3372
3373 /* Call the allocation method of the superclass. */
3374 entry = bfd_hash_newfunc (entry, table, string);
3375 if (entry != NULL)
3376 {
3377 struct ppc_stub_hash_entry *eh;
3378
3379 /* Initialize the local fields. */
3380 eh = (struct ppc_stub_hash_entry *) entry;
ad8e1ba5 3381 eh->stub_type = ppc_stub_none;
721956f4
AM
3382 eh->stub_sec = NULL;
3383 eh->stub_offset = 0;
3384 eh->target_value = 0;
3385 eh->target_section = NULL;
721956f4
AM
3386 eh->h = NULL;
3387 eh->id_sec = NULL;
3388 }
3389
3390 return entry;
3391}
3392
3393/* Create an entry in the branch hash table. */
3394
3395static struct bfd_hash_entry *
4ce794b7
AM
3396branch_hash_newfunc (struct bfd_hash_entry *entry,
3397 struct bfd_hash_table *table,
3398 const char *string)
721956f4
AM
3399{
3400 /* Allocate the structure if it has not already been allocated by a
3401 subclass. */
3402 if (entry == NULL)
3403 {
3404 entry = bfd_hash_allocate (table, sizeof (struct ppc_branch_hash_entry));
3405 if (entry == NULL)
3406 return entry;
3407 }
3408
3409 /* Call the allocation method of the superclass. */
3410 entry = bfd_hash_newfunc (entry, table, string);
3411 if (entry != NULL)
3412 {
3413 struct ppc_branch_hash_entry *eh;
3414
3415 /* Initialize the local fields. */
3416 eh = (struct ppc_branch_hash_entry *) entry;
3417 eh->offset = 0;
3418 eh->iter = 0;
3419 }
3420
3421 return entry;
3422}
3423
65f38f15
AM
3424/* Create an entry in a ppc64 ELF linker hash table. */
3425
3426static struct bfd_hash_entry *
4ce794b7
AM
3427link_hash_newfunc (struct bfd_hash_entry *entry,
3428 struct bfd_hash_table *table,
3429 const char *string)
65f38f15
AM
3430{
3431 /* Allocate the structure if it has not already been allocated by a
3432 subclass. */
3433 if (entry == NULL)
3434 {
3435 entry = bfd_hash_allocate (table, sizeof (struct ppc_link_hash_entry));
3436 if (entry == NULL)
3437 return entry;
3438 }
3439
3440 /* Call the allocation method of the superclass. */
3441 entry = _bfd_elf_link_hash_newfunc (entry, table, string);
3442 if (entry != NULL)
3443 {
3444 struct ppc_link_hash_entry *eh = (struct ppc_link_hash_entry *) entry;
3445
908b32fc
AM
3446 memset (&eh->stub_cache, 0,
3447 (sizeof (struct ppc_link_hash_entry)
3448 - offsetof (struct ppc_link_hash_entry, stub_cache)));
65f38f15
AM
3449 }
3450
3451 return entry;
3452}
3453
3454/* Create a ppc64 ELF linker hash table. */
3455
3456static struct bfd_link_hash_table *
4ce794b7 3457ppc64_elf_link_hash_table_create (bfd *abfd)
65f38f15
AM
3458{
3459 struct ppc_link_hash_table *htab;
3460 bfd_size_type amt = sizeof (struct ppc_link_hash_table);
3461
4ce794b7 3462 htab = bfd_zmalloc (amt);
65f38f15
AM
3463 if (htab == NULL)
3464 return NULL;
3465
3466 if (! _bfd_elf_link_hash_table_init (&htab->elf, abfd, link_hash_newfunc))
3467 {
e2d34d7d 3468 free (htab);
65f38f15
AM
3469 return NULL;
3470 }
3471
721956f4
AM
3472 /* Init the stub hash table too. */
3473 if (!bfd_hash_table_init (&htab->stub_hash_table, stub_hash_newfunc))
3474 return NULL;
3475
3476 /* And the branch hash table. */
3477 if (!bfd_hash_table_init (&htab->branch_hash_table, branch_hash_newfunc))
3478 return NULL;
3479
3254fd24
AM
3480 /* Initializing two fields of the union is just cosmetic. We really
3481 only care about glist, but when compiled on a 32-bit host the
3482 bfd_vma fields are larger. Setting the bfd_vma to zero makes
3483 debugger inspection of these fields look nicer. */
a6aa5195
AM
3484 htab->elf.init_got_refcount.refcount = 0;
3485 htab->elf.init_got_refcount.glist = NULL;
3486 htab->elf.init_plt_refcount.refcount = 0;
3487 htab->elf.init_plt_refcount.glist = NULL;
3488 htab->elf.init_got_offset.offset = 0;
3489 htab->elf.init_got_offset.glist = NULL;
3490 htab->elf.init_plt_offset.offset = 0;
3491 htab->elf.init_plt_offset.glist = NULL;
3254fd24 3492
65f38f15
AM
3493 return &htab->elf.root;
3494}
3495
721956f4
AM
3496/* Free the derived linker hash table. */
3497
3498static void
4ce794b7 3499ppc64_elf_link_hash_table_free (struct bfd_link_hash_table *hash)
721956f4
AM
3500{
3501 struct ppc_link_hash_table *ret = (struct ppc_link_hash_table *) hash;
3502
3503 bfd_hash_table_free (&ret->stub_hash_table);
3504 bfd_hash_table_free (&ret->branch_hash_table);
3505 _bfd_generic_link_hash_table_free (hash);
3506}
3507
e717da7e
AM
3508/* Satisfy the ELF linker by filling in some fields in our fake bfd. */
3509
3510void
3511ppc64_elf_init_stub_bfd (bfd *abfd, struct bfd_link_info *info)
3512{
3513 struct ppc_link_hash_table *htab;
3514
3515 elf_elfheader (abfd)->e_ident[EI_CLASS] = ELFCLASS64;
3516
3517/* Always hook our dynamic sections into the first bfd, which is the
3518 linker created stub bfd. This ensures that the GOT header is at
3519 the start of the output TOC section. */
3520 htab = ppc_hash_table (info);
3521 htab->stub_bfd = abfd;
3522 htab->elf.dynobj = abfd;
3523}
3524
721956f4
AM
3525/* Build a name for an entry in the stub hash table. */
3526
3527static char *
4ce794b7
AM
3528ppc_stub_name (const asection *input_section,
3529 const asection *sym_sec,
3530 const struct ppc_link_hash_entry *h,
3531 const Elf_Internal_Rela *rel)
721956f4
AM
3532{
3533 char *stub_name;
3534 bfd_size_type len;
3535
3536 /* rel->r_addend is actually 64 bit, but who uses more than +/- 2^31
3537 offsets from a sym as a branch target? In fact, we could
3538 probably assume the addend is always zero. */
3539 BFD_ASSERT (((int) rel->r_addend & 0xffffffff) == rel->r_addend);
3540
3541 if (h)
3542 {
3543 len = 8 + 1 + strlen (h->elf.root.root.string) + 1 + 8 + 1;
3544 stub_name = bfd_malloc (len);
46de2a7c
AM
3545 if (stub_name == NULL)
3546 return stub_name;
3547
3548 sprintf (stub_name, "%08x.%s+%x",
3549 input_section->id & 0xffffffff,
3550 h->elf.root.root.string,
3551 (int) rel->r_addend & 0xffffffff);
721956f4
AM
3552 }
3553 else
3554 {
ad8e1ba5 3555 len = 8 + 1 + 8 + 1 + 8 + 1 + 8 + 1;
721956f4 3556 stub_name = bfd_malloc (len);
46de2a7c
AM
3557 if (stub_name == NULL)
3558 return stub_name;
3559
3560 sprintf (stub_name, "%08x.%x:%x+%x",
3561 input_section->id & 0xffffffff,
3562 sym_sec->id & 0xffffffff,
3563 (int) ELF64_R_SYM (rel->r_info) & 0xffffffff,
3564 (int) rel->r_addend & 0xffffffff);
721956f4 3565 }
ee75fd95
AM
3566 if (stub_name[len - 2] == '+' && stub_name[len - 1] == '0')
3567 stub_name[len - 2] = 0;
721956f4
AM
3568 return stub_name;
3569}
3570
3571/* Look up an entry in the stub hash. Stub entries are cached because
3572 creating the stub name takes a bit of time. */
3573
3574static struct ppc_stub_hash_entry *
4ce794b7
AM
3575ppc_get_stub_entry (const asection *input_section,
3576 const asection *sym_sec,
039b3fef 3577 struct ppc_link_hash_entry *h,
4ce794b7
AM
3578 const Elf_Internal_Rela *rel,
3579 struct ppc_link_hash_table *htab)
721956f4
AM
3580{
3581 struct ppc_stub_hash_entry *stub_entry;
721956f4
AM
3582 const asection *id_sec;
3583
3584 /* If this input section is part of a group of sections sharing one
3585 stub section, then use the id of the first section in the group.
3586 Stub names need to include a section id, as there may well be
3587 more than one stub used to reach say, printf, and we need to
3588 distinguish between them. */
3589 id_sec = htab->stub_group[input_section->id].link_sec;
3590
3591 if (h != NULL && h->stub_cache != NULL
3592 && h->stub_cache->h == h
3593 && h->stub_cache->id_sec == id_sec)
3594 {
3595 stub_entry = h->stub_cache;
3596 }
3597 else
3598 {
3599 char *stub_name;
3600
3601 stub_name = ppc_stub_name (id_sec, sym_sec, h, rel);
3602 if (stub_name == NULL)
3603 return NULL;
3604
3605 stub_entry = ppc_stub_hash_lookup (&htab->stub_hash_table,
b34976b6 3606 stub_name, FALSE, FALSE);
721956f4
AM
3607 if (h != NULL)
3608 h->stub_cache = stub_entry;
3609
3610 free (stub_name);
3611 }
3612
3613 return stub_entry;
3614}
3615
3616/* Add a new stub entry to the stub hash. Not all fields of the new
3617 stub entry are initialised. */
3618
3619static struct ppc_stub_hash_entry *
4ce794b7
AM
3620ppc_add_stub (const char *stub_name,
3621 asection *section,
3622 struct ppc_link_hash_table *htab)
721956f4
AM
3623{
3624 asection *link_sec;
3625 asection *stub_sec;
3626 struct ppc_stub_hash_entry *stub_entry;
3627
3628 link_sec = htab->stub_group[section->id].link_sec;
3629 stub_sec = htab->stub_group[section->id].stub_sec;
3630 if (stub_sec == NULL)
3631 {
3632 stub_sec = htab->stub_group[link_sec->id].stub_sec;
3633 if (stub_sec == NULL)
3634 {
d4c88bbb 3635 size_t namelen;
721956f4
AM
3636 bfd_size_type len;
3637 char *s_name;
3638
d4c88bbb
AM
3639 namelen = strlen (link_sec->name);
3640 len = namelen + sizeof (STUB_SUFFIX);
721956f4
AM
3641 s_name = bfd_alloc (htab->stub_bfd, len);
3642 if (s_name == NULL)
3643 return NULL;
3644
d4c88bbb
AM
3645 memcpy (s_name, link_sec->name, namelen);
3646 memcpy (s_name + namelen, STUB_SUFFIX, sizeof (STUB_SUFFIX));
721956f4
AM
3647 stub_sec = (*htab->add_stub_section) (s_name, link_sec);
3648 if (stub_sec == NULL)
3649 return NULL;
3650 htab->stub_group[link_sec->id].stub_sec = stub_sec;
3651 }
3652 htab->stub_group[section->id].stub_sec = stub_sec;
3653 }
3654
3655 /* Enter this entry into the linker stub hash table. */
3656 stub_entry = ppc_stub_hash_lookup (&htab->stub_hash_table, stub_name,
b34976b6 3657 TRUE, FALSE);
721956f4
AM
3658 if (stub_entry == NULL)
3659 {
d003868e
AM
3660 (*_bfd_error_handler) (_("%B: cannot create stub entry %s"),
3661 section->owner, stub_name);
721956f4
AM
3662 return NULL;
3663 }
3664
3665 stub_entry->stub_sec = stub_sec;
3666 stub_entry->stub_offset = 0;
3667 stub_entry->id_sec = link_sec;
3668 return stub_entry;
3669}
3670
82bd7b59
AM
3671/* Create sections for linker generated code. */
3672
b34976b6 3673static bfd_boolean
4ce794b7 3674create_linkage_sections (bfd *dynobj, struct bfd_link_info *info)
82bd7b59
AM
3675{
3676 struct ppc_link_hash_table *htab;
3677 flagword flags;
3678
3679 htab = ppc_hash_table (info);
3680
3681 /* Create .sfpr for code to save and restore fp regs. */
3682 flags = (SEC_ALLOC | SEC_LOAD | SEC_CODE | SEC_READONLY
3683 | SEC_HAS_CONTENTS | SEC_IN_MEMORY | SEC_LINKER_CREATED);
3496cb2a
L
3684 htab->sfpr = bfd_make_section_anyway_with_flags (dynobj, ".sfpr",
3685 flags);
82bd7b59 3686 if (htab->sfpr == NULL
82bd7b59 3687 || ! bfd_set_section_alignment (dynobj, htab->sfpr, 2))
b34976b6 3688 return FALSE;
82bd7b59 3689
721956f4 3690 /* Create .glink for lazy dynamic linking support. */
3496cb2a
L
3691 htab->glink = bfd_make_section_anyway_with_flags (dynobj, ".glink",
3692 flags);
4ce794b7 3693 if (htab->glink == NULL
4ce794b7 3694 || ! bfd_set_section_alignment (dynobj, htab->glink, 2))
b34976b6 3695 return FALSE;
82bd7b59 3696
c456f082
AM
3697 /* Create branch lookup table for plt_branch stubs. */
3698 if (info->shared)
3699 {
3700 flags = (SEC_ALLOC | SEC_LOAD
3701 | SEC_HAS_CONTENTS | SEC_IN_MEMORY | SEC_LINKER_CREATED);
3702 htab->brlt
3703 = bfd_make_section_anyway_with_flags (dynobj, ".data.rel.ro.brlt",
3704 flags);
3705 }
3706 else
3707 {
3708 flags = (SEC_ALLOC | SEC_LOAD | SEC_READONLY
3709 | SEC_HAS_CONTENTS | SEC_IN_MEMORY | SEC_LINKER_CREATED);
3710 htab->brlt
3711 = bfd_make_section_anyway_with_flags (dynobj, ".rodata.brlt", flags);
3712 }
3713
4ce794b7 3714 if (htab->brlt == NULL
4ce794b7 3715 || ! bfd_set_section_alignment (dynobj, htab->brlt, 3))
b34976b6 3716 return FALSE;
721956f4 3717
c456f082 3718 if (info->shared)
721956f4
AM
3719 {
3720 flags = (SEC_ALLOC | SEC_LOAD | SEC_READONLY
3721 | SEC_HAS_CONTENTS | SEC_IN_MEMORY | SEC_LINKER_CREATED);
c456f082
AM
3722 htab->relbrlt
3723 = bfd_make_section_anyway_with_flags (dynobj, ".rela.data.rel.ro.brlt",
3724 flags);
721956f4 3725 }
c456f082
AM
3726 else if (info->emitrelocations)
3727 {
3728 flags = (SEC_ALLOC | SEC_LOAD | SEC_READONLY
3729 | SEC_HAS_CONTENTS | SEC_IN_MEMORY | SEC_LINKER_CREATED);
3730 htab->relbrlt
3731 = bfd_make_section_anyway_with_flags (dynobj, ".rela.rodata.brlt",
3732 flags);
3733 }
3734 else
3735 return TRUE;
3736
3737 if (!htab->relbrlt
3738 || ! bfd_set_section_alignment (dynobj, htab->relbrlt, 3))
3739 return FALSE;
3740
b34976b6 3741 return TRUE;
82bd7b59
AM
3742}
3743
e717da7e
AM
3744/* Create .got and .rela.got sections in ABFD, and .got in dynobj if
3745 not already done. */
65f38f15 3746
b34976b6 3747static bfd_boolean
e717da7e 3748create_got_section (bfd *abfd, struct bfd_link_info *info)
65f38f15 3749{
e717da7e
AM
3750 asection *got, *relgot;
3751 flagword flags;
3752 struct ppc_link_hash_table *htab = ppc_hash_table (info);
65f38f15 3753
4ce794b7 3754 if (!htab->got)
e717da7e
AM
3755 {
3756 if (! _bfd_elf_create_got_section (htab->elf.dynobj, info))
3757 return FALSE;
3758
3759 htab->got = bfd_get_section_by_name (htab->elf.dynobj, ".got");
3760 if (!htab->got)
3761 abort ();
3762 }
3763
3764 flags = (SEC_ALLOC | SEC_LOAD | SEC_HAS_CONTENTS | SEC_IN_MEMORY
3765 | SEC_LINKER_CREATED);
3766
c456f082 3767 got = bfd_make_section_anyway_with_flags (abfd, ".got", flags);
e717da7e 3768 if (!got
e717da7e
AM
3769 || !bfd_set_section_alignment (abfd, got, 3))
3770 return FALSE;
65f38f15 3771
c456f082
AM
3772 relgot = bfd_make_section_anyway_with_flags (abfd, ".rela.got",
3773 flags | SEC_READONLY);
e717da7e 3774 if (!relgot
e717da7e 3775 || ! bfd_set_section_alignment (abfd, relgot, 3))
b34976b6 3776 return FALSE;
e717da7e
AM
3777
3778 ppc64_elf_tdata (abfd)->got = got;
3779 ppc64_elf_tdata (abfd)->relgot = relgot;
b34976b6 3780 return TRUE;
65f38f15 3781}
5bd4f169 3782
82bd7b59 3783/* Create the dynamic sections, and set up shortcuts. */
5bd4f169 3784
b34976b6 3785static bfd_boolean
4ce794b7 3786ppc64_elf_create_dynamic_sections (bfd *dynobj, struct bfd_link_info *info)
5bd4f169 3787{
65f38f15 3788 struct ppc_link_hash_table *htab;
5bd4f169 3789
65f38f15 3790 if (!_bfd_elf_create_dynamic_sections (dynobj, info))
b34976b6 3791 return FALSE;
65f38f15 3792
e717da7e
AM
3793 htab = ppc_hash_table (info);
3794 if (!htab->got)
3795 htab->got = bfd_get_section_by_name (dynobj, ".got");
4ce794b7
AM
3796 htab->plt = bfd_get_section_by_name (dynobj, ".plt");
3797 htab->relplt = bfd_get_section_by_name (dynobj, ".rela.plt");
3798 htab->dynbss = bfd_get_section_by_name (dynobj, ".dynbss");
65f38f15 3799 if (!info->shared)
4ce794b7 3800 htab->relbss = bfd_get_section_by_name (dynobj, ".rela.bss");
65f38f15 3801
e717da7e 3802 if (!htab->got || !htab->plt || !htab->relplt || !htab->dynbss
4ce794b7 3803 || (!info->shared && !htab->relbss))
65f38f15
AM
3804 abort ();
3805
b34976b6 3806 return TRUE;
5bd4f169
AM
3807}
3808
40d16e0b
AM
3809/* Merge PLT info on FROM with that on TO. */
3810
3811static void
3812move_plt_plist (struct ppc_link_hash_entry *from,
3813 struct ppc_link_hash_entry *to)
3814{
3815 if (from->elf.plt.plist != NULL)
3816 {
3817 if (to->elf.plt.plist != NULL)
3818 {
3819 struct plt_entry **entp;
3820 struct plt_entry *ent;
3821
3822 for (entp = &from->elf.plt.plist; (ent = *entp) != NULL; )
3823 {
3824 struct plt_entry *dent;
3825
3826 for (dent = to->elf.plt.plist; dent != NULL; dent = dent->next)
3827 if (dent->addend == ent->addend)
3828 {
3829 dent->plt.refcount += ent->plt.refcount;
3830 *entp = ent->next;
3831 break;
3832 }
3833 if (dent == NULL)
3834 entp = &ent->next;
3835 }
3836 *entp = to->elf.plt.plist;
3837 }
3838
3839 to->elf.plt.plist = from->elf.plt.plist;
3840 from->elf.plt.plist = NULL;
3841 }
3842}
3843
65f38f15
AM
3844/* Copy the extra info we tack onto an elf_link_hash_entry. */
3845
3846static void
fcfa13d2
AM
3847ppc64_elf_copy_indirect_symbol (struct bfd_link_info *info,
3848 struct elf_link_hash_entry *dir,
3849 struct elf_link_hash_entry *ind)
65f38f15
AM
3850{
3851 struct ppc_link_hash_entry *edir, *eind;
3852
3853 edir = (struct ppc_link_hash_entry *) dir;
3854 eind = (struct ppc_link_hash_entry *) ind;
3855
411e1bfb 3856 /* Copy over any dynamic relocs we may have on the indirect sym. */
bbd7ec4a 3857 if (eind->dyn_relocs != NULL)
65f38f15 3858 {
bbd7ec4a
AM
3859 if (edir->dyn_relocs != NULL)
3860 {
3861 struct ppc_dyn_relocs **pp;
3862 struct ppc_dyn_relocs *p;
3863
fcfa13d2 3864 /* Add reloc counts against the indirect sym to the direct sym
bbd7ec4a
AM
3865 list. Merge any entries against the same section. */
3866 for (pp = &eind->dyn_relocs; (p = *pp) != NULL; )
3867 {
3868 struct ppc_dyn_relocs *q;
3869
3870 for (q = edir->dyn_relocs; q != NULL; q = q->next)
3871 if (q->sec == p->sec)
3872 {
3873 q->pc_count += p->pc_count;
3874 q->count += p->count;
3875 *pp = p->next;
3876 break;
3877 }
3878 if (q == NULL)
3879 pp = &p->next;
3880 }
3881 *pp = edir->dyn_relocs;
3882 }
3883
65f38f15
AM
3884 edir->dyn_relocs = eind->dyn_relocs;
3885 eind->dyn_relocs = NULL;
3886 }
65f38f15 3887
6349e628
AM
3888 edir->is_func |= eind->is_func;
3889 edir->is_func_descriptor |= eind->is_func_descriptor;
58ac9f71 3890 edir->tls_mask |= eind->tls_mask;
6349e628 3891
81848ca0 3892 /* If called to transfer flags for a weakdef during processing
f5385ebf 3893 of elf_adjust_dynamic_symbol, don't copy NON_GOT_REF.
81848ca0 3894 We clear it ourselves for ELIMINATE_COPY_RELOCS. */
f5385ebf
AM
3895 if (!(ELIMINATE_COPY_RELOCS
3896 && eind->elf.root.type != bfd_link_hash_indirect
3897 && edir->elf.dynamic_adjusted))
3898 edir->elf.non_got_ref |= eind->elf.non_got_ref;
81848ca0 3899
f5385ebf
AM
3900 edir->elf.ref_dynamic |= eind->elf.ref_dynamic;
3901 edir->elf.ref_regular |= eind->elf.ref_regular;
3902 edir->elf.ref_regular_nonweak |= eind->elf.ref_regular_nonweak;
3903 edir->elf.needs_plt |= eind->elf.needs_plt;
6349e628
AM
3904
3905 /* If we were called to copy over info for a weak sym, that's all. */
3906 if (eind->elf.root.type != bfd_link_hash_indirect)
3907 return;
3908
81848ca0
AM
3909 /* Copy over got entries that we may have already seen to the
3910 symbol which just became indirect. */
411e1bfb
AM
3911 if (eind->elf.got.glist != NULL)
3912 {
3913 if (edir->elf.got.glist != NULL)
3914 {
3915 struct got_entry **entp;
3916 struct got_entry *ent;
3917
3918 for (entp = &eind->elf.got.glist; (ent = *entp) != NULL; )
3919 {
3920 struct got_entry *dent;
3921
3922 for (dent = edir->elf.got.glist; dent != NULL; dent = dent->next)
3923 if (dent->addend == ent->addend
e717da7e 3924 && dent->owner == ent->owner
411e1bfb
AM
3925 && dent->tls_type == ent->tls_type)
3926 {
3927 dent->got.refcount += ent->got.refcount;
3928 *entp = ent->next;
3929 break;
3930 }
3931 if (dent == NULL)
3932 entp = &ent->next;
3933 }
3934 *entp = edir->elf.got.glist;
3935 }
3936
3937 edir->elf.got.glist = eind->elf.got.glist;
3938 eind->elf.got.glist = NULL;
3939 }
3940
3941 /* And plt entries. */
40d16e0b 3942 move_plt_plist (eind, edir);
411e1bfb 3943
fcfa13d2 3944 if (eind->elf.dynindx != -1)
411e1bfb 3945 {
fcfa13d2
AM
3946 if (edir->elf.dynindx != -1)
3947 _bfd_elf_strtab_delref (elf_hash_table (info)->dynstr,
3948 edir->elf.dynstr_index);
411e1bfb
AM
3949 edir->elf.dynindx = eind->elf.dynindx;
3950 edir->elf.dynstr_index = eind->elf.dynstr_index;
3951 eind->elf.dynindx = -1;
3952 eind->elf.dynstr_index = 0;
3953 }
411e1bfb
AM
3954}
3955
8387904d
AM
3956/* Find the function descriptor hash entry from the given function code
3957 hash entry FH. Link the entries via their OH fields. */
3958
3959static struct ppc_link_hash_entry *
3960get_fdh (struct ppc_link_hash_entry *fh, struct ppc_link_hash_table *htab)
3961{
3962 struct ppc_link_hash_entry *fdh = fh->oh;
3963
3964 if (fdh == NULL)
3965 {
3966 const char *fd_name = fh->elf.root.root.string + 1;
3967
3968 fdh = (struct ppc_link_hash_entry *)
3969 elf_link_hash_lookup (&htab->elf, fd_name, FALSE, FALSE, FALSE);
3970 if (fdh != NULL)
3971 {
3972 fdh->is_func_descriptor = 1;
3973 fdh->oh = fh;
3974 fh->is_func = 1;
3975 fh->oh = fdh;
3976 }
3977 }
3978
3979 return fdh;
3980}
3981
bb700d78
AM
3982/* Make a fake function descriptor sym for the code sym FH. */
3983
3984static struct ppc_link_hash_entry *
3985make_fdh (struct bfd_link_info *info,
908b32fc 3986 struct ppc_link_hash_entry *fh)
bb700d78
AM
3987{
3988 bfd *abfd;
3989 asymbol *newsym;
3990 struct bfd_link_hash_entry *bh;
3991 struct ppc_link_hash_entry *fdh;
3992
3993 abfd = fh->elf.root.u.undef.abfd;
3994 newsym = bfd_make_empty_symbol (abfd);
3995 newsym->name = fh->elf.root.root.string + 1;
3996 newsym->section = bfd_und_section_ptr;
3997 newsym->value = 0;
908b32fc 3998 newsym->flags = BSF_WEAK;
bb700d78
AM
3999
4000 bh = NULL;
4001 if (!_bfd_generic_link_add_one_symbol (info, abfd, newsym->name,
4002 newsym->flags, newsym->section,
4003 newsym->value, NULL, FALSE, FALSE,
4004 &bh))
4005 return NULL;
4006
4007 fdh = (struct ppc_link_hash_entry *) bh;
4008 fdh->elf.non_elf = 0;
908b32fc
AM
4009 fdh->fake = 1;
4010 fdh->is_func_descriptor = 1;
4011 fdh->oh = fh;
4012 fh->is_func = 1;
4013 fh->oh = fdh;
bb700d78
AM
4014 return fdh;
4015}
4016
8387904d
AM
4017/* Hacks to support old ABI code.
4018 When making function calls, old ABI code references function entry
4019 points (dot symbols), while new ABI code references the function
4020 descriptor symbol. We need to make any combination of reference and
4021 definition work together, without breaking archive linking.
4022
4023 For a defined function "foo" and an undefined call to "bar":
4024 An old object defines "foo" and ".foo", references ".bar" (possibly
4025 "bar" too).
4026 A new object defines "foo" and references "bar".
4027
4028 A new object thus has no problem with its undefined symbols being
4029 satisfied by definitions in an old object. On the other hand, the
4030 old object won't have ".bar" satisfied by a new object. */
4031
4032/* Fix function descriptor symbols defined in .opd sections to be
4033 function type. */
555cd476
AM
4034
4035static bfd_boolean
433817dd 4036ppc64_elf_add_symbol_hook (bfd *ibfd,
555cd476
AM
4037 struct bfd_link_info *info ATTRIBUTE_UNUSED,
4038 Elf_Internal_Sym *isym,
433817dd 4039 const char **name,
555cd476
AM
4040 flagword *flags ATTRIBUTE_UNUSED,
4041 asection **sec,
4042 bfd_vma *value ATTRIBUTE_UNUSED)
4043{
8843416a
AM
4044 if (*sec != NULL
4045 && strcmp (bfd_get_section_name (ibfd, *sec), ".opd") == 0)
555cd476 4046 isym->st_info = ELF_ST_INFO (ELF_ST_BIND (isym->st_info), STT_FUNC);
433817dd
AM
4047
4048 if ((*name)[0] == '.'
4049 && ELF_ST_BIND (isym->st_info) == STB_GLOBAL
4050 && ELF_ST_TYPE (isym->st_info) < STT_SECTION
4051 && is_ppc64_elf_target (ibfd->xvec))
4052 ppc64_elf_tdata (ibfd)->u.has_dotsym = 1;
4053
555cd476
AM
4054 return TRUE;
4055}
4056
8387904d 4057/* This function makes an old ABI object reference to ".bar" cause the
908b32fc
AM
4058 inclusion of a new ABI object archive that defines "bar".
4059 NAME is a symbol defined in an archive. Return a symbol in the hash
4060 table that might be satisfied by the archive symbols. */
8387904d
AM
4061
4062static struct elf_link_hash_entry *
4063ppc64_elf_archive_symbol_lookup (bfd *abfd,
4064 struct bfd_link_info *info,
4065 const char *name)
4066{
4067 struct elf_link_hash_entry *h;
4068 char *dot_name;
4069 size_t len;
4070
4071 h = _bfd_elf_archive_symbol_lookup (abfd, info, name);
908b32fc
AM
4072 if (h != NULL
4073 /* Don't return this sym if it is a fake function descriptor
4074 created by add_symbol_adjust. */
4075 && !(h->root.type == bfd_link_hash_undefweak
4076 && ((struct ppc_link_hash_entry *) h)->fake))
8387904d
AM
4077 return h;
4078
4079 if (name[0] == '.')
4080 return h;
4081
4082 len = strlen (name);
4083 dot_name = bfd_alloc (abfd, len + 2);
4084 if (dot_name == NULL)
4085 return (struct elf_link_hash_entry *) 0 - 1;
4086 dot_name[0] = '.';
4087 memcpy (dot_name + 1, name, len + 1);
4088 h = _bfd_elf_archive_symbol_lookup (abfd, info, dot_name);
4089 bfd_release (abfd, dot_name);
4090 return h;
4091}
4092
4093/* This function satisfies all old ABI object references to ".bar" if a
99877b66
AM
4094 new ABI object defines "bar". Well, at least, undefined dot symbols
4095 are made weak. This stops later archive searches from including an
4096 object if we already have a function descriptor definition. It also
35b0ce59
AM
4097 prevents the linker complaining about undefined symbols.
4098 We also check and correct mismatched symbol visibility here. The
4099 most restrictive visibility of the function descriptor and the
4100 function entry symbol is used. */
8387904d 4101
bb700d78
AM
4102struct add_symbol_adjust_data
4103{
4104 struct bfd_link_info *info;
4105 bfd_boolean ok;
4106};
4107
8387904d
AM
4108static bfd_boolean
4109add_symbol_adjust (struct elf_link_hash_entry *h, void *inf)
4110{
bb700d78 4111 struct add_symbol_adjust_data *data;
8387904d 4112 struct ppc_link_hash_table *htab;
99877b66 4113 struct ppc_link_hash_entry *eh;
8387904d
AM
4114 struct ppc_link_hash_entry *fdh;
4115
4116 if (h->root.type == bfd_link_hash_indirect)
4117 return TRUE;
4118
4119 if (h->root.type == bfd_link_hash_warning)
4120 h = (struct elf_link_hash_entry *) h->root.u.i.link;
4121
35b0ce59 4122 if (h->root.root.string[0] != '.')
8387904d
AM
4123 return TRUE;
4124
bb700d78
AM
4125 data = inf;
4126 htab = ppc_hash_table (data->info);
99877b66
AM
4127 eh = (struct ppc_link_hash_entry *) h;
4128 fdh = get_fdh (eh, htab);
bb700d78 4129 if (fdh == NULL
c4f68ce3 4130 && !data->info->relocatable
bb700d78
AM
4131 && (eh->elf.root.type == bfd_link_hash_undefined
4132 || eh->elf.root.type == bfd_link_hash_undefweak)
4133 && eh->elf.ref_regular)
4134 {
4135 /* Make an undefweak function descriptor sym, which is enough to
4136 pull in an --as-needed shared lib, but won't cause link
4137 errors. Archives are handled elsewhere. */
908b32fc 4138 fdh = make_fdh (data->info, eh);
bb700d78
AM
4139 if (fdh == NULL)
4140 data->ok = FALSE;
4141 else
4142 fdh->elf.ref_regular = 1;
4143 }
e87d886e 4144 else if (fdh != NULL)
8387904d 4145 {
35b0ce59
AM
4146 unsigned entry_vis = ELF_ST_VISIBILITY (eh->elf.other) - 1;
4147 unsigned descr_vis = ELF_ST_VISIBILITY (fdh->elf.other) - 1;
4148 if (entry_vis < descr_vis)
4149 fdh->elf.other += entry_vis - descr_vis;
4150 else if (entry_vis > descr_vis)
4151 eh->elf.other += descr_vis - entry_vis;
4152
e87d886e
AM
4153 if ((fdh->elf.root.type == bfd_link_hash_defined
4154 || fdh->elf.root.type == bfd_link_hash_defweak)
4155 && eh->elf.root.type == bfd_link_hash_undefined)
35b0ce59
AM
4156 {
4157 eh->elf.root.type = bfd_link_hash_undefweak;
4158 eh->was_undefined = 1;
4159 htab->twiddled_syms = 1;
4160 }
8387904d 4161 }
99877b66 4162
8387904d
AM
4163 return TRUE;
4164}
4165
4166static bfd_boolean
433817dd 4167ppc64_elf_check_directives (bfd *abfd, struct bfd_link_info *info)
8387904d 4168{
99877b66 4169 struct ppc_link_hash_table *htab;
bb700d78 4170 struct add_symbol_adjust_data data;
99877b66 4171
433817dd
AM
4172 if (!is_ppc64_elf_target (abfd->xvec))
4173 return TRUE;
4174
4175 if (!ppc64_elf_tdata (abfd)->u.has_dotsym)
4176 return TRUE;
4177 ppc64_elf_tdata (abfd)->u.deleted_section = NULL;
4178
99877b66 4179 htab = ppc_hash_table (info);
ee75fd95 4180 if (!is_ppc64_elf_target (htab->elf.root.creator))
35b0ce59
AM
4181 return TRUE;
4182
bb700d78
AM
4183 data.info = info;
4184 data.ok = TRUE;
4185 elf_link_hash_traverse (&htab->elf, add_symbol_adjust, &data);
99877b66
AM
4186
4187 /* We need to fix the undefs list for any syms we have twiddled to
4188 undef_weak. */
4189 if (htab->twiddled_syms)
4190 {
77cfaee6 4191 bfd_link_repair_undef_list (&htab->elf.root);
99877b66
AM
4192 htab->twiddled_syms = 0;
4193 }
bb700d78 4194 return data.ok;
8387904d
AM
4195}
4196
411e1bfb 4197static bfd_boolean
4ce794b7
AM
4198update_local_sym_info (bfd *abfd, Elf_Internal_Shdr *symtab_hdr,
4199 unsigned long r_symndx, bfd_vma r_addend, int tls_type)
411e1bfb
AM
4200{
4201 struct got_entry **local_got_ents = elf_local_got_ents (abfd);
e7b938ca 4202 char *local_got_tls_masks;
411e1bfb
AM
4203
4204 if (local_got_ents == NULL)
4205 {
4206 bfd_size_type size = symtab_hdr->sh_info;
4207
e7b938ca 4208 size *= sizeof (*local_got_ents) + sizeof (*local_got_tls_masks);
4ce794b7 4209 local_got_ents = bfd_zalloc (abfd, size);
411e1bfb
AM
4210 if (local_got_ents == NULL)
4211 return FALSE;
4212 elf_local_got_ents (abfd) = local_got_ents;
4213 }
4214
4215 if ((tls_type & TLS_EXPLICIT) == 0)
4216 {
4217 struct got_entry *ent;
4218
4219 for (ent = local_got_ents[r_symndx]; ent != NULL; ent = ent->next)
e717da7e
AM
4220 if (ent->addend == r_addend
4221 && ent->owner == abfd
4222 && ent->tls_type == tls_type)
411e1bfb
AM
4223 break;
4224 if (ent == NULL)
4225 {
4226 bfd_size_type amt = sizeof (*ent);
4ce794b7 4227 ent = bfd_alloc (abfd, amt);
411e1bfb
AM
4228 if (ent == NULL)
4229 return FALSE;
4230 ent->next = local_got_ents[r_symndx];
4231 ent->addend = r_addend;
e717da7e 4232 ent->owner = abfd;
411e1bfb
AM
4233 ent->tls_type = tls_type;
4234 ent->got.refcount = 0;
4235 local_got_ents[r_symndx] = ent;
4236 }
4237 ent->got.refcount += 1;
4238 }
4239
e7b938ca
AM
4240 local_got_tls_masks = (char *) (local_got_ents + symtab_hdr->sh_info);
4241 local_got_tls_masks[r_symndx] |= tls_type;
411e1bfb 4242 return TRUE;
65f38f15
AM
4243}
4244
411e1bfb 4245static bfd_boolean
4ce794b7 4246update_plt_info (bfd *abfd, struct ppc_link_hash_entry *eh, bfd_vma addend)
1e2f5b6e 4247{
411e1bfb 4248 struct plt_entry *ent;
1e2f5b6e 4249
411e1bfb
AM
4250 for (ent = eh->elf.plt.plist; ent != NULL; ent = ent->next)
4251 if (ent->addend == addend)
4252 break;
4253 if (ent == NULL)
1e2f5b6e 4254 {
411e1bfb 4255 bfd_size_type amt = sizeof (*ent);
4ce794b7 4256 ent = bfd_alloc (abfd, amt);
411e1bfb
AM
4257 if (ent == NULL)
4258 return FALSE;
4259 ent->next = eh->elf.plt.plist;
4260 ent->addend = addend;
4261 ent->plt.refcount = 0;
4262 eh->elf.plt.plist = ent;
1e2f5b6e 4263 }
411e1bfb 4264 ent->plt.refcount += 1;
f5385ebf 4265 eh->elf.needs_plt = 1;
93f3fa99
AM
4266 if (eh->elf.root.root.string[0] == '.'
4267 && eh->elf.root.root.string[1] != '\0')
4268 eh->is_func = 1;
b34976b6 4269 return TRUE;
1e2f5b6e
AM
4270}
4271
5bd4f169 4272/* Look through the relocs for a section during the first phase, and
65f38f15 4273 calculate needed space in the global offset table, procedure
5d1634d7 4274 linkage table, and dynamic reloc sections. */
5bd4f169 4275
b34976b6 4276static bfd_boolean
4ce794b7
AM
4277ppc64_elf_check_relocs (bfd *abfd, struct bfd_link_info *info,
4278 asection *sec, const Elf_Internal_Rela *relocs)
5bd4f169 4279{
65f38f15 4280 struct ppc_link_hash_table *htab;
5bd4f169
AM
4281 Elf_Internal_Shdr *symtab_hdr;
4282 struct elf_link_hash_entry **sym_hashes, **sym_hashes_end;
4283 const Elf_Internal_Rela *rel;
4284 const Elf_Internal_Rela *rel_end;
5bd4f169 4285 asection *sreloc;
1e2f5b6e 4286 asection **opd_sym_map;
5bd4f169 4287
1049f94e 4288 if (info->relocatable)
b34976b6 4289 return TRUE;
5bd4f169 4290
680a3378
AM
4291 /* Don't do anything special with non-loaded, non-alloced sections.
4292 In particular, any relocs in such sections should not affect GOT
4293 and PLT reference counting (ie. we don't allow them to create GOT
4294 or PLT entries), there's no possibility or desire to optimize TLS
4295 relocs, and there's not much point in propagating relocs to shared
4296 libs that the dynamic linker won't relocate. */
4297 if ((sec->flags & SEC_ALLOC) == 0)
4298 return TRUE;
4299
65f38f15 4300 htab = ppc_hash_table (info);
5bd4f169 4301 symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
5bd4f169
AM
4302
4303 sym_hashes = elf_sym_hashes (abfd);
4304 sym_hashes_end = (sym_hashes
1e2f5b6e
AM
4305 + symtab_hdr->sh_size / sizeof (Elf64_External_Sym)
4306 - symtab_hdr->sh_info);
5bd4f169
AM
4307
4308 sreloc = NULL;
1e2f5b6e
AM
4309 opd_sym_map = NULL;
4310 if (strcmp (bfd_get_section_name (abfd, sec), ".opd") == 0)
4311 {
4312 /* Garbage collection needs some extra help with .opd sections.
4313 We don't want to necessarily keep everything referenced by
4314 relocs in .opd, as that would keep all functions. Instead,
4315 if we reference an .opd symbol (a function descriptor), we
4316 want to keep the function code symbol's section. This is
4317 easy for global symbols, but for local syms we need to keep
4318 information about the associated function section. Later, if
4319 edit_opd deletes entries, we'll use this array to adjust
4320 local syms in .opd. */
4321 union opd_info {
4322 asection *func_section;
4323 long entry_adjust;
4324 };
4325 bfd_size_type amt;
4326
3f764659 4327 amt = sec->size * sizeof (union opd_info) / 8;
4ce794b7 4328 opd_sym_map = bfd_zalloc (abfd, amt);
1e2f5b6e 4329 if (opd_sym_map == NULL)
b34976b6 4330 return FALSE;
f0abc2a1 4331 ppc64_elf_section_data (sec)->opd.func_sec = opd_sym_map;
1e2f5b6e 4332 }
5bd4f169 4333
82bd7b59
AM
4334 if (htab->sfpr == NULL
4335 && !create_linkage_sections (htab->elf.dynobj, info))
b34976b6 4336 return FALSE;
82bd7b59 4337
5bd4f169
AM
4338 rel_end = relocs + sec->reloc_count;
4339 for (rel = relocs; rel < rel_end; rel++)
4340 {
4341 unsigned long r_symndx;
4342 struct elf_link_hash_entry *h;
04c9666a 4343 enum elf_ppc64_reloc_type r_type;
411e1bfb 4344 int tls_type = 0;
5bd4f169
AM
4345
4346 r_symndx = ELF64_R_SYM (rel->r_info);
4347 if (r_symndx < symtab_hdr->sh_info)
4348 h = NULL;
4349 else
973a3492
L
4350 {
4351 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
4352 while (h->root.type == bfd_link_hash_indirect
4353 || h->root.type == bfd_link_hash_warning)
4354 h = (struct elf_link_hash_entry *) h->root.u.i.link;
4355 }
5bd4f169 4356
4ce794b7 4357 r_type = ELF64_R_TYPE (rel->r_info);
a33d1f77 4358 switch (r_type)
5bd4f169 4359 {
411e1bfb
AM
4360 case R_PPC64_GOT_TLSLD16:
4361 case R_PPC64_GOT_TLSLD16_LO:
4362 case R_PPC64_GOT_TLSLD16_HI:
4363 case R_PPC64_GOT_TLSLD16_HA:
e717da7e 4364 ppc64_tlsld_got (abfd)->refcount += 1;
951fd09b 4365 tls_type = TLS_TLS | TLS_LD;
411e1bfb
AM
4366 goto dogottls;
4367
4368 case R_PPC64_GOT_TLSGD16:
4369 case R_PPC64_GOT_TLSGD16_LO:
4370 case R_PPC64_GOT_TLSGD16_HI:
4371 case R_PPC64_GOT_TLSGD16_HA:
951fd09b 4372 tls_type = TLS_TLS | TLS_GD;
411e1bfb
AM
4373 goto dogottls;
4374
4375 case R_PPC64_GOT_TPREL16_DS:
4376 case R_PPC64_GOT_TPREL16_LO_DS:
4377 case R_PPC64_GOT_TPREL16_HI:
4378 case R_PPC64_GOT_TPREL16_HA:
4379 if (info->shared)
4380 info->flags |= DF_STATIC_TLS;
4381 tls_type = TLS_TLS | TLS_TPREL;
4382 goto dogottls;
4383
4384 case R_PPC64_GOT_DTPREL16_DS:
4385 case R_PPC64_GOT_DTPREL16_LO_DS:
4386 case R_PPC64_GOT_DTPREL16_HI:
4387 case R_PPC64_GOT_DTPREL16_HA:
4388 tls_type = TLS_TLS | TLS_DTPREL;
4389 dogottls:
4390 sec->has_tls_reloc = 1;
4391 /* Fall thru */
4392
5bd4f169 4393 case R_PPC64_GOT16:
5bd4f169 4394 case R_PPC64_GOT16_DS:
65f38f15
AM
4395 case R_PPC64_GOT16_HA:
4396 case R_PPC64_GOT16_HI:
4397 case R_PPC64_GOT16_LO:
5bd4f169 4398 case R_PPC64_GOT16_LO_DS:
65f38f15 4399 /* This symbol requires a global offset table entry. */
4c52953f 4400 sec->has_toc_reloc = 1;
e717da7e
AM
4401 if (ppc64_elf_tdata (abfd)->got == NULL
4402 && !create_got_section (abfd, info))
b34976b6 4403 return FALSE;
5bd4f169
AM
4404
4405 if (h != NULL)
4406 {
411e1bfb
AM
4407 struct ppc_link_hash_entry *eh;
4408 struct got_entry *ent;
65f38f15 4409
411e1bfb
AM
4410 eh = (struct ppc_link_hash_entry *) h;
4411 for (ent = eh->elf.got.glist; ent != NULL; ent = ent->next)
4412 if (ent->addend == rel->r_addend
e717da7e 4413 && ent->owner == abfd
411e1bfb
AM
4414 && ent->tls_type == tls_type)
4415 break;
4416 if (ent == NULL)
5bd4f169 4417 {
411e1bfb 4418 bfd_size_type amt = sizeof (*ent);
4ce794b7 4419 ent = bfd_alloc (abfd, amt);
411e1bfb 4420 if (ent == NULL)
b34976b6 4421 return FALSE;
411e1bfb
AM
4422 ent->next = eh->elf.got.glist;
4423 ent->addend = rel->r_addend;
e717da7e 4424 ent->owner = abfd;
411e1bfb
AM
4425 ent->tls_type = tls_type;
4426 ent->got.refcount = 0;
4427 eh->elf.got.glist = ent;
5bd4f169 4428 }
411e1bfb 4429 ent->got.refcount += 1;
e7b938ca 4430 eh->tls_mask |= tls_type;
5bd4f169 4431 }
411e1bfb
AM
4432 else
4433 /* This is a global offset table entry for a local symbol. */
4434 if (!update_local_sym_info (abfd, symtab_hdr, r_symndx,
4435 rel->r_addend, tls_type))
4436 return FALSE;
5bd4f169
AM
4437 break;
4438
5bd4f169 4439 case R_PPC64_PLT16_HA:
65f38f15
AM
4440 case R_PPC64_PLT16_HI:
4441 case R_PPC64_PLT16_LO:
4442 case R_PPC64_PLT32:
4443 case R_PPC64_PLT64:
5bd4f169 4444 /* This symbol requires a procedure linkage table entry. We
3fad3c7c
AM
4445 actually build the entry in adjust_dynamic_symbol,
4446 because this might be a case of linking PIC code without
4447 linking in any dynamic objects, in which case we don't
4448 need to generate a procedure linkage table after all. */
5bd4f169
AM
4449 if (h == NULL)
4450 {
4451 /* It does not make sense to have a procedure linkage
3fad3c7c 4452 table entry for a local symbol. */
5bd4f169 4453 bfd_set_error (bfd_error_bad_value);
b34976b6 4454 return FALSE;
5bd4f169 4455 }
411e1bfb
AM
4456 else
4457 if (!update_plt_info (abfd, (struct ppc_link_hash_entry *) h,
4458 rel->r_addend))
4459 return FALSE;
5bd4f169
AM
4460 break;
4461
4462 /* The following relocations don't need to propagate the
4463 relocation if linking a shared object since they are
4464 section relative. */
4465 case R_PPC64_SECTOFF:
4466 case R_PPC64_SECTOFF_LO:
4467 case R_PPC64_SECTOFF_HI:
4468 case R_PPC64_SECTOFF_HA:
4469 case R_PPC64_SECTOFF_DS:
4470 case R_PPC64_SECTOFF_LO_DS:
411e1bfb
AM
4471 case R_PPC64_DTPREL16:
4472 case R_PPC64_DTPREL16_LO:
4473 case R_PPC64_DTPREL16_HI:
4474 case R_PPC64_DTPREL16_HA:
4475 case R_PPC64_DTPREL16_DS:
4476 case R_PPC64_DTPREL16_LO_DS:
4477 case R_PPC64_DTPREL16_HIGHER:
4478 case R_PPC64_DTPREL16_HIGHERA:
4479 case R_PPC64_DTPREL16_HIGHEST:
4480 case R_PPC64_DTPREL16_HIGHESTA:
5bd4f169
AM
4481 break;
4482
ad8e1ba5
AM
4483 /* Nor do these. */
4484 case R_PPC64_TOC16:
4485 case R_PPC64_TOC16_LO:
4486 case R_PPC64_TOC16_HI:
4487 case R_PPC64_TOC16_HA:
4488 case R_PPC64_TOC16_DS:
4489 case R_PPC64_TOC16_LO_DS:
4c52953f 4490 sec->has_toc_reloc = 1;
ad8e1ba5
AM
4491 break;
4492
5bd4f169
AM
4493 /* This relocation describes the C++ object vtable hierarchy.
4494 Reconstruct it for later use during GC. */
4495 case R_PPC64_GNU_VTINHERIT:
c152c796 4496 if (!bfd_elf_gc_record_vtinherit (abfd, sec, h, rel->r_offset))
b34976b6 4497 return FALSE;
5bd4f169
AM
4498 break;
4499
4500 /* This relocation describes which C++ vtable entries are actually
4501 used. Record for later use during GC. */
4502 case R_PPC64_GNU_VTENTRY:
c152c796 4503 if (!bfd_elf_gc_record_vtentry (abfd, sec, h, rel->r_addend))
b34976b6 4504 return FALSE;
5bd4f169
AM
4505 break;
4506
721956f4
AM
4507 case R_PPC64_REL14:
4508 case R_PPC64_REL14_BRTAKEN:
4509 case R_PPC64_REL14_BRNTAKEN:
220c76dd
AM
4510 {
4511 asection *dest = NULL;
4512
4513 /* Heuristic: If jumping outside our section, chances are
4514 we are going to need a stub. */
4515 if (h != NULL)
4516 {
4517 /* If the sym is weak it may be overridden later, so
4518 don't assume we know where a weak sym lives. */
4519 if (h->root.type == bfd_link_hash_defined)
4520 dest = h->root.u.def.section;
4521 }
4522 else
4523 dest = bfd_section_from_r_symndx (abfd, &htab->sym_sec,
4524 sec, r_symndx);
4525 if (dest != sec)
4526 htab->has_14bit_branch = 1;
4527 }
721956f4
AM
4528 /* Fall through. */
4529
5d1634d7 4530 case R_PPC64_REL24:
8387904d 4531 if (h != NULL)
5d1634d7
AM
4532 {
4533 /* We may need a .plt entry if the function this reloc
4534 refers to is in a shared lib. */
411e1bfb
AM
4535 if (!update_plt_info (abfd, (struct ppc_link_hash_entry *) h,
4536 rel->r_addend))
4537 return FALSE;
8387904d
AM
4538 if (h == &htab->tls_get_addr->elf
4539 || h == &htab->tls_get_addr_fd->elf)
411e1bfb 4540 sec->has_tls_reloc = 1;
8387904d
AM
4541 else if (htab->tls_get_addr == NULL
4542 && !strncmp (h->root.root.string, ".__tls_get_addr", 15)
a48ebf4d
AM
4543 && (h->root.root.string[15] == 0
4544 || h->root.root.string[15] == '@'))
411e1bfb 4545 {
8387904d
AM
4546 htab->tls_get_addr = (struct ppc_link_hash_entry *) h;
4547 sec->has_tls_reloc = 1;
4548 }
4549 else if (htab->tls_get_addr_fd == NULL
4550 && !strncmp (h->root.root.string, "__tls_get_addr", 14)
4551 && (h->root.root.string[14] == 0
4552 || h->root.root.string[14] == '@'))
4553 {
4554 htab->tls_get_addr_fd = (struct ppc_link_hash_entry *) h;
411e1bfb
AM
4555 sec->has_tls_reloc = 1;
4556 }
4557 }
4558 break;
4559
4560 case R_PPC64_TPREL64:
4561 tls_type = TLS_EXPLICIT | TLS_TLS | TLS_TPREL;
4562 if (info->shared)
4563 info->flags |= DF_STATIC_TLS;
4564 goto dotlstoc;
4565
4566 case R_PPC64_DTPMOD64:
4567 if (rel + 1 < rel_end
4568 && rel[1].r_info == ELF64_R_INFO (r_symndx, R_PPC64_DTPREL64)
4569 && rel[1].r_offset == rel->r_offset + 8)
951fd09b 4570 tls_type = TLS_EXPLICIT | TLS_TLS | TLS_GD;
411e1bfb 4571 else
951fd09b 4572 tls_type = TLS_EXPLICIT | TLS_TLS | TLS_LD;
411e1bfb
AM
4573 goto dotlstoc;
4574
4575 case R_PPC64_DTPREL64:
4576 tls_type = TLS_EXPLICIT | TLS_TLS | TLS_DTPREL;
4577 if (rel != relocs
4578 && rel[-1].r_info == ELF64_R_INFO (r_symndx, R_PPC64_DTPMOD64)
4579 && rel[-1].r_offset == rel->r_offset - 8)
4580 /* This is the second reloc of a dtpmod, dtprel pair.
4581 Don't mark with TLS_DTPREL. */
4582 goto dodyn;
4583
4584 dotlstoc:
4585 sec->has_tls_reloc = 1;
4586 if (h != NULL)
4587 {
4588 struct ppc_link_hash_entry *eh;
4589 eh = (struct ppc_link_hash_entry *) h;
e7b938ca 4590 eh->tls_mask |= tls_type;
411e1bfb
AM
4591 }
4592 else
4593 if (!update_local_sym_info (abfd, symtab_hdr, r_symndx,
4594 rel->r_addend, tls_type))
4595 return FALSE;
4596
4597 if (ppc64_elf_section_data (sec)->t_symndx == NULL)
4598 {
e7b938ca 4599 /* One extra to simplify get_tls_mask. */
eea6121a 4600 bfd_size_type amt = sec->size * sizeof (unsigned) / 8 + 1;
4ce794b7 4601 ppc64_elf_section_data (sec)->t_symndx = bfd_zalloc (abfd, amt);
411e1bfb
AM
4602 if (ppc64_elf_section_data (sec)->t_symndx == NULL)
4603 return FALSE;
4604 }
4605 BFD_ASSERT (rel->r_offset % 8 == 0);
4606 ppc64_elf_section_data (sec)->t_symndx[rel->r_offset / 8] = r_symndx;
951fd09b
AM
4607
4608 /* Mark the second slot of a GD or LD entry.
4609 -1 to indicate GD and -2 to indicate LD. */
4610 if (tls_type == (TLS_EXPLICIT | TLS_TLS | TLS_GD))
4611 ppc64_elf_section_data (sec)->t_symndx[rel->r_offset / 8 + 1] = -1;
4612 else if (tls_type == (TLS_EXPLICIT | TLS_TLS | TLS_LD))
4613 ppc64_elf_section_data (sec)->t_symndx[rel->r_offset / 8 + 1] = -2;
411e1bfb
AM
4614 goto dodyn;
4615
4616 case R_PPC64_TPREL16:
4617 case R_PPC64_TPREL16_LO:
4618 case R_PPC64_TPREL16_HI:
4619 case R_PPC64_TPREL16_HA:
4620 case R_PPC64_TPREL16_DS:
4621 case R_PPC64_TPREL16_LO_DS:
4622 case R_PPC64_TPREL16_HIGHER:
4623 case R_PPC64_TPREL16_HIGHERA:
4624 case R_PPC64_TPREL16_HIGHEST:
4625 case R_PPC64_TPREL16_HIGHESTA:
4626 if (info->shared)
4627 {
4628 info->flags |= DF_STATIC_TLS;
4629 goto dodyn;
5d1634d7
AM
4630 }
4631 break;
4632
e86ce104 4633 case R_PPC64_ADDR64:
1e2f5b6e 4634 if (opd_sym_map != NULL
1e2f5b6e 4635 && rel + 1 < rel_end
4ce794b7 4636 && ELF64_R_TYPE ((rel + 1)->r_info) == R_PPC64_TOC)
1e2f5b6e 4637 {
8387904d
AM
4638 if (h != NULL)
4639 {
4640 if (h->root.root.string[0] == '.'
4641 && h->root.root.string[1] != 0
4642 && get_fdh ((struct ppc_link_hash_entry *) h, htab))
4643 ;
4644 else
4645 ((struct ppc_link_hash_entry *) h)->is_func = 1;
4646 }
4647 else
4648 {
4649 asection *s;
1e2f5b6e 4650
8387904d
AM
4651 s = bfd_section_from_r_symndx (abfd, &htab->sym_sec, sec,
4652 r_symndx);
4653 if (s == NULL)
4654 return FALSE;
4655 else if (s != sec)
3f764659 4656 opd_sym_map[rel->r_offset / 8] = s;
8387904d 4657 }
1e2f5b6e 4658 }
e86ce104
AM
4659 /* Fall through. */
4660
04c9666a 4661 case R_PPC64_REL30:
5bd4f169 4662 case R_PPC64_REL32:
04c9666a 4663 case R_PPC64_REL64:
65f38f15
AM
4664 case R_PPC64_ADDR14:
4665 case R_PPC64_ADDR14_BRNTAKEN:
4666 case R_PPC64_ADDR14_BRTAKEN:
4667 case R_PPC64_ADDR16:
4668 case R_PPC64_ADDR16_DS:
4669 case R_PPC64_ADDR16_HA:
4670 case R_PPC64_ADDR16_HI:
4671 case R_PPC64_ADDR16_HIGHER:
4672 case R_PPC64_ADDR16_HIGHERA:
4673 case R_PPC64_ADDR16_HIGHEST:
4674 case R_PPC64_ADDR16_HIGHESTA:
4675 case R_PPC64_ADDR16_LO:
4676 case R_PPC64_ADDR16_LO_DS:
4677 case R_PPC64_ADDR24:
65f38f15 4678 case R_PPC64_ADDR32:
65f38f15
AM
4679 case R_PPC64_UADDR16:
4680 case R_PPC64_UADDR32:
4681 case R_PPC64_UADDR64:
5bd4f169 4682 case R_PPC64_TOC:
81848ca0
AM
4683 if (h != NULL && !info->shared)
4684 /* We may need a copy reloc. */
f5385ebf 4685 h->non_got_ref = 1;
81848ca0 4686
41bd81ab 4687 /* Don't propagate .opd relocs. */
1e2f5b6e 4688 if (NO_OPD_RELOCS && opd_sym_map != NULL)
e86ce104 4689 break;
e86ce104 4690
65f38f15
AM
4691 /* If we are creating a shared library, and this is a reloc
4692 against a global symbol, or a non PC relative reloc
4693 against a local symbol, then we need to copy the reloc
4694 into the shared library. However, if we are linking with
4695 -Bsymbolic, we do not need to copy a reloc against a
4696 global symbol which is defined in an object we are
4697 including in the link (i.e., DEF_REGULAR is set). At
4698 this point we have not seen all the input files, so it is
4699 possible that DEF_REGULAR is not set now but will be set
4700 later (it is never cleared). In case of a weak definition,
4701 DEF_REGULAR may be cleared later by a strong definition in
4702 a shared library. We account for that possibility below by
f4656909 4703 storing information in the dyn_relocs field of the hash
65f38f15
AM
4704 table entry. A similar situation occurs when creating
4705 shared libraries and symbol visibility changes render the
4706 symbol local.
4707
4708 If on the other hand, we are creating an executable, we
4709 may need to keep relocations for symbols satisfied by a
4710 dynamic library if we manage to avoid copy relocs for the
4711 symbol. */
411e1bfb 4712 dodyn:
65f38f15 4713 if ((info->shared
411e1bfb 4714 && (MUST_BE_DYN_RELOC (r_type)
65f38f15
AM
4715 || (h != NULL
4716 && (! info->symbolic
4717 || h->root.type == bfd_link_hash_defweak
f5385ebf 4718 || !h->def_regular))))
f4656909
AM
4719 || (ELIMINATE_COPY_RELOCS
4720 && !info->shared
65f38f15
AM
4721 && h != NULL
4722 && (h->root.type == bfd_link_hash_defweak
f5385ebf 4723 || !h->def_regular)))
5bd4f169 4724 {
ec338859
AM
4725 struct ppc_dyn_relocs *p;
4726 struct ppc_dyn_relocs **head;
4727
65f38f15
AM
4728 /* We must copy these reloc types into the output file.
4729 Create a reloc section in dynobj and make room for
4730 this reloc. */
5bd4f169
AM
4731 if (sreloc == NULL)
4732 {
4733 const char *name;
65f38f15 4734 bfd *dynobj;
5bd4f169
AM
4735
4736 name = (bfd_elf_string_from_elf_section
4737 (abfd,
4738 elf_elfheader (abfd)->e_shstrndx,
4739 elf_section_data (sec)->rel_hdr.sh_name));
4740 if (name == NULL)
b34976b6 4741 return FALSE;
5bd4f169 4742
65f38f15
AM
4743 if (strncmp (name, ".rela", 5) != 0
4744 || strcmp (bfd_get_section_name (abfd, sec),
4745 name + 5) != 0)
4746 {
4747 (*_bfd_error_handler)
d003868e
AM
4748 (_("%B: bad relocation section name `%s\'"),
4749 abfd, name);
5d1634d7 4750 bfd_set_error (bfd_error_bad_value);
65f38f15
AM
4751 }
4752
65f38f15 4753 dynobj = htab->elf.dynobj;
5bd4f169
AM
4754 sreloc = bfd_get_section_by_name (dynobj, name);
4755 if (sreloc == NULL)
4756 {
4757 flagword flags;
4758
5bd4f169 4759 flags = (SEC_HAS_CONTENTS | SEC_READONLY
77623a34
AM
4760 | SEC_IN_MEMORY | SEC_LINKER_CREATED
4761 | SEC_ALLOC | SEC_LOAD);
3496cb2a
L
4762 sreloc = bfd_make_section_with_flags (dynobj,
4763 name,
4764 flags);
5bd4f169 4765 if (sreloc == NULL
65f38f15 4766 || ! bfd_set_section_alignment (dynobj, sreloc, 3))
b34976b6 4767 return FALSE;
5bd4f169 4768 }
65f38f15 4769 elf_section_data (sec)->sreloc = sreloc;
5bd4f169
AM
4770 }
4771
65f38f15
AM
4772 /* If this is a global symbol, we count the number of
4773 relocations we need for this symbol. */
4774 if (h != NULL)
4775 {
ec338859 4776 head = &((struct ppc_link_hash_entry *) h)->dyn_relocs;
65f38f15
AM
4777 }
4778 else
4779 {
ec338859
AM
4780 /* Track dynamic relocs needed for local syms too.
4781 We really need local syms available to do this
4782 easily. Oh well. */
4783
4784 asection *s;
6edfbbad
DJ
4785 void *vpp;
4786
ec338859
AM
4787 s = bfd_section_from_r_symndx (abfd, &htab->sym_sec,
4788 sec, r_symndx);
4789 if (s == NULL)
b34976b6 4790 return FALSE;
ec338859 4791
6edfbbad
DJ
4792 vpp = &elf_section_data (s)->local_dynrel;
4793 head = (struct ppc_dyn_relocs **) vpp;
65f38f15 4794 }
ec338859
AM
4795
4796 p = *head;
4797 if (p == NULL || p->sec != sec)
4798 {
4ce794b7 4799 p = bfd_alloc (htab->elf.dynobj, sizeof *p);
ec338859 4800 if (p == NULL)
b34976b6 4801 return FALSE;
ec338859
AM
4802 p->next = *head;
4803 *head = p;
4804 p->sec = sec;
4805 p->count = 0;
4806 p->pc_count = 0;
4807 }
4808
4809 p->count += 1;
411e1bfb 4810 if (!MUST_BE_DYN_RELOC (r_type))
ec338859 4811 p->pc_count += 1;
65f38f15 4812 }
5bd4f169 4813 break;
65f38f15
AM
4814
4815 default:
96e0dda4 4816 break;
5bd4f169
AM
4817 }
4818 }
4819
b34976b6 4820 return TRUE;
5bd4f169
AM
4821}
4822
8387904d
AM
4823/* OFFSET in OPD_SEC specifies a function descriptor. Return the address
4824 of the code entry point, and its section. */
4825
4826static bfd_vma
4827opd_entry_value (asection *opd_sec,
4828 bfd_vma offset,
4829 asection **code_sec,
4830 bfd_vma *code_off)
4831{
4832 bfd *opd_bfd = opd_sec->owner;
8860955f 4833 Elf_Internal_Rela *relocs;
8387904d 4834 Elf_Internal_Rela *lo, *hi, *look;
645ea6a9 4835 bfd_vma val;
8387904d 4836
4b85d634
AM
4837 /* No relocs implies we are linking a --just-symbols object. */
4838 if (opd_sec->reloc_count == 0)
4839 {
4840 bfd_vma val;
4841
4842 if (!bfd_get_section_contents (opd_bfd, opd_sec, &val, offset, 8))
4843 return (bfd_vma) -1;
3b36f7e6 4844
4b85d634
AM
4845 if (code_sec != NULL)
4846 {
4847 asection *sec, *likely = NULL;
4848 for (sec = opd_bfd->sections; sec != NULL; sec = sec->next)
4849 if (sec->vma <= val
4850 && (sec->flags & SEC_LOAD) != 0
4851 && (sec->flags & SEC_ALLOC) != 0)
4852 likely = sec;
4853 if (likely != NULL)
4854 {
4855 *code_sec = likely;
4856 if (code_off != NULL)
4857 *code_off = val - likely->vma;
4858 }
4859 }
4860 return val;
4861 }
4862
8860955f
AM
4863 relocs = ppc64_elf_tdata (opd_bfd)->opd_relocs;
4864 if (relocs == NULL)
4865 relocs = _bfd_elf_link_read_relocs (opd_bfd, opd_sec, NULL, NULL, TRUE);
645ea6a9 4866
8387904d 4867 /* Go find the opd reloc at the sym address. */
8860955f 4868 lo = relocs;
8387904d
AM
4869 BFD_ASSERT (lo != NULL);
4870 hi = lo + opd_sec->reloc_count - 1; /* ignore last reloc */
645ea6a9 4871 val = (bfd_vma) -1;
8387904d
AM
4872 while (lo < hi)
4873 {
4874 look = lo + (hi - lo) / 2;
4875 if (look->r_offset < offset)
4876 lo = look + 1;
4877 else if (look->r_offset > offset)
4878 hi = look;
4879 else
4880 {
4881 Elf_Internal_Shdr *symtab_hdr = &elf_tdata (opd_bfd)->symtab_hdr;
4882 if (ELF64_R_TYPE (look->r_info) == R_PPC64_ADDR64
4883 && ELF64_R_TYPE ((look + 1)->r_info) == R_PPC64_TOC)
4884 {
4885 unsigned long symndx = ELF64_R_SYM (look->r_info);
8387904d
AM
4886 asection *sec;
4887
4888 if (symndx < symtab_hdr->sh_info)
4889 {
4890 Elf_Internal_Sym *sym;
4891
4892 sym = (Elf_Internal_Sym *) symtab_hdr->contents;
4893 if (sym == NULL)
4894 {
4895 sym = bfd_elf_get_elf_syms (opd_bfd, symtab_hdr,
4896 symtab_hdr->sh_info,
4897 0, NULL, NULL, NULL);
4898 if (sym == NULL)
645ea6a9 4899 break;
8387904d
AM
4900 symtab_hdr->contents = (bfd_byte *) sym;
4901 }
4902
4903 sym += symndx;
4904 val = sym->st_value;
4905 sec = NULL;
4906 if ((sym->st_shndx != SHN_UNDEF
4907 && sym->st_shndx < SHN_LORESERVE)
4908 || sym->st_shndx > SHN_HIRESERVE)
4909 sec = bfd_section_from_elf_index (opd_bfd, sym->st_shndx);
4910 BFD_ASSERT ((sec->flags & SEC_MERGE) == 0);
4911 }
4912 else
4913 {
4914 struct elf_link_hash_entry **sym_hashes;
4915 struct elf_link_hash_entry *rh;
4916
4917 sym_hashes = elf_sym_hashes (opd_bfd);
4918 rh = sym_hashes[symndx - symtab_hdr->sh_info];
4919 while (rh->root.type == bfd_link_hash_indirect
4920 || rh->root.type == bfd_link_hash_warning)
4921 rh = ((struct elf_link_hash_entry *) rh->root.u.i.link);
4922 BFD_ASSERT (rh->root.type == bfd_link_hash_defined
4923 || rh->root.type == bfd_link_hash_defweak);
4924 val = rh->root.u.def.value;
4925 sec = rh->root.u.def.section;
4926 }
4927 val += look->r_addend;
4928 if (code_off != NULL)
4929 *code_off = val;
4930 if (code_sec != NULL)
4931 *code_sec = sec;
4932 if (sec != NULL && sec->output_section != NULL)
4933 val += sec->output_section->vma + sec->output_offset;
8387904d
AM
4934 }
4935 break;
4936 }
4937 }
645ea6a9 4938
645ea6a9 4939 return val;
8387904d
AM
4940}
4941
5bd4f169
AM
4942/* Return the section that should be marked against GC for a given
4943 relocation. */
4944
4945static asection *
4ce794b7 4946ppc64_elf_gc_mark_hook (asection *sec,
ccfa59ea 4947 struct bfd_link_info *info,
4ce794b7
AM
4948 Elf_Internal_Rela *rel,
4949 struct elf_link_hash_entry *h,
4950 Elf_Internal_Sym *sym)
5bd4f169 4951{
ccfa59ea
AM
4952 asection *rsec;
4953
4954 /* First mark all our entry sym sections. */
4955 if (info->gc_sym_list != NULL)
4956 {
4957 struct ppc_link_hash_table *htab = ppc_hash_table (info);
4958 struct bfd_sym_chain *sym = info->gc_sym_list;
4959
4960 info->gc_sym_list = NULL;
4961 do
4962 {
4963 struct ppc_link_hash_entry *eh;
4964
4965 eh = (struct ppc_link_hash_entry *)
4966 elf_link_hash_lookup (&htab->elf, sym->name, FALSE, FALSE, FALSE);
4967 if (eh == NULL)
4968 continue;
4969 if (eh->elf.root.type != bfd_link_hash_defined
4970 && eh->elf.root.type != bfd_link_hash_defweak)
4971 continue;
4972
c4f68ce3
AM
4973 if (eh->is_func_descriptor
4974 && (eh->oh->elf.root.type == bfd_link_hash_defined
4975 || eh->oh->elf.root.type == bfd_link_hash_defweak))
ccfa59ea 4976 rsec = eh->oh->elf.root.u.def.section;
8387904d
AM
4977 else if (get_opd_info (eh->elf.root.u.def.section) != NULL
4978 && opd_entry_value (eh->elf.root.u.def.section,
4979 eh->elf.root.u.def.value,
4980 &rsec, NULL) != (bfd_vma) -1)
4981 ;
ccfa59ea
AM
4982 else
4983 continue;
4984
4985 if (!rsec->gc_mark)
4986 _bfd_elf_gc_mark (info, rsec, ppc64_elf_gc_mark_hook);
4987
4988 rsec = eh->elf.root.u.def.section;
4989 if (!rsec->gc_mark)
4990 _bfd_elf_gc_mark (info, rsec, ppc64_elf_gc_mark_hook);
4991
4992 sym = sym->next;
4993 }
4994 while (sym != NULL);
4995 }
4996
4997 /* Syms return NULL if we're marking .opd, so we avoid marking all
4998 function sections, as all functions are referenced in .opd. */
4999 rsec = NULL;
5000 if (get_opd_info (sec) != NULL)
5001 return rsec;
1e2f5b6e 5002
5bd4f169
AM
5003 if (h != NULL)
5004 {
04c9666a 5005 enum elf_ppc64_reloc_type r_type;
ccfa59ea 5006 struct ppc_link_hash_entry *eh;
a33d1f77 5007
4ce794b7 5008 r_type = ELF64_R_TYPE (rel->r_info);
a33d1f77 5009 switch (r_type)
5bd4f169
AM
5010 {
5011 case R_PPC64_GNU_VTINHERIT:
5012 case R_PPC64_GNU_VTENTRY:
5013 break;
5014
5015 default:
5016 switch (h->root.type)
5017 {
5018 case bfd_link_hash_defined:
5019 case bfd_link_hash_defweak:
ccfa59ea 5020 eh = (struct ppc_link_hash_entry *) h;
c4f68ce3
AM
5021 if (eh->oh != NULL
5022 && eh->oh->is_func_descriptor
5023 && (eh->oh->elf.root.type == bfd_link_hash_defined
5024 || eh->oh->elf.root.type == bfd_link_hash_defweak))
ccfa59ea 5025 eh = eh->oh;
1e2f5b6e
AM
5026
5027 /* Function descriptor syms cause the associated
5028 function code sym section to be marked. */
c4f68ce3
AM
5029 if (eh->is_func_descriptor
5030 && (eh->oh->elf.root.type == bfd_link_hash_defined
5031 || eh->oh->elf.root.type == bfd_link_hash_defweak))
ccfa59ea
AM
5032 {
5033 /* They also mark their opd section. */
5034 if (!eh->elf.root.u.def.section->gc_mark)
5035 _bfd_elf_gc_mark (info, eh->elf.root.u.def.section,
5036 ppc64_elf_gc_mark_hook);
5037
5038 rsec = eh->oh->elf.root.u.def.section;
5039 }
8387904d
AM
5040 else if (get_opd_info (eh->elf.root.u.def.section) != NULL
5041 && opd_entry_value (eh->elf.root.u.def.section,
5042 eh->elf.root.u.def.value,
5043 &rsec, NULL) != (bfd_vma) -1)
5044 {
5045 if (!eh->elf.root.u.def.section->gc_mark)
5046 _bfd_elf_gc_mark (info, eh->elf.root.u.def.section,
5047 ppc64_elf_gc_mark_hook);
5048 }
ccfa59ea 5049 else
1e2f5b6e
AM
5050 rsec = h->root.u.def.section;
5051 break;
5bd4f169
AM
5052
5053 case bfd_link_hash_common:
1e2f5b6e
AM
5054 rsec = h->root.u.c.p->section;
5055 break;
5bd4f169
AM
5056
5057 default:
5058 break;
5059 }
5060 }
5061 }
5062 else
5063 {
1e2f5b6e
AM
5064 asection **opd_sym_section;
5065
5066 rsec = bfd_section_from_elf_index (sec->owner, sym->st_shndx);
ccfa59ea 5067 opd_sym_section = get_opd_info (rsec);
1e2f5b6e 5068 if (opd_sym_section != NULL)
ccfa59ea
AM
5069 {
5070 if (!rsec->gc_mark)
5071 _bfd_elf_gc_mark (info, rsec, ppc64_elf_gc_mark_hook);
5072
b4f4e59f 5073 rsec = opd_sym_section[(sym->st_value + rel->r_addend) / 8];
ccfa59ea 5074 }
5bd4f169
AM
5075 }
5076
1e2f5b6e 5077 return rsec;
5bd4f169
AM
5078}
5079
65f38f15
AM
5080/* Update the .got, .plt. and dynamic reloc reference counts for the
5081 section being removed. */
5bd4f169 5082
b34976b6 5083static bfd_boolean
4ce794b7
AM
5084ppc64_elf_gc_sweep_hook (bfd *abfd, struct bfd_link_info *info,
5085 asection *sec, const Elf_Internal_Rela *relocs)
5bd4f169 5086{
411e1bfb 5087 struct ppc_link_hash_table *htab;
5bd4f169
AM
5088 Elf_Internal_Shdr *symtab_hdr;
5089 struct elf_link_hash_entry **sym_hashes;
411e1bfb 5090 struct got_entry **local_got_ents;
5bd4f169 5091 const Elf_Internal_Rela *rel, *relend;
5bd4f169 5092
680a3378
AM
5093 if ((sec->flags & SEC_ALLOC) == 0)
5094 return TRUE;
5095
ec338859
AM
5096 elf_section_data (sec)->local_dynrel = NULL;
5097
411e1bfb 5098 htab = ppc_hash_table (info);
5bd4f169
AM
5099 symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
5100 sym_hashes = elf_sym_hashes (abfd);
411e1bfb 5101 local_got_ents = elf_local_got_ents (abfd);
5bd4f169
AM
5102
5103 relend = relocs + sec->reloc_count;
5104 for (rel = relocs; rel < relend; rel++)
a33d1f77
AM
5105 {
5106 unsigned long r_symndx;
04c9666a 5107 enum elf_ppc64_reloc_type r_type;
58ac9f71 5108 struct elf_link_hash_entry *h = NULL;
411e1bfb 5109 char tls_type = 0;
5bd4f169 5110
a33d1f77 5111 r_symndx = ELF64_R_SYM (rel->r_info);
4ce794b7 5112 r_type = ELF64_R_TYPE (rel->r_info);
58ac9f71
AM
5113 if (r_symndx >= symtab_hdr->sh_info)
5114 {
5115 struct ppc_link_hash_entry *eh;
5116 struct ppc_dyn_relocs **pp;
5117 struct ppc_dyn_relocs *p;
5118
5119 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
3eb128b2
AM
5120 while (h->root.type == bfd_link_hash_indirect
5121 || h->root.type == bfd_link_hash_warning)
5122 h = (struct elf_link_hash_entry *) h->root.u.i.link;
58ac9f71
AM
5123 eh = (struct ppc_link_hash_entry *) h;
5124
5125 for (pp = &eh->dyn_relocs; (p = *pp) != NULL; pp = &p->next)
5126 if (p->sec == sec)
5127 {
5128 /* Everything must go for SEC. */
5129 *pp = p->next;
5130 break;
5131 }
5132 }
5133
a33d1f77
AM
5134 switch (r_type)
5135 {
411e1bfb
AM
5136 case R_PPC64_GOT_TLSLD16:
5137 case R_PPC64_GOT_TLSLD16_LO:
5138 case R_PPC64_GOT_TLSLD16_HI:
5139 case R_PPC64_GOT_TLSLD16_HA:
e717da7e 5140 ppc64_tlsld_got (abfd)->refcount -= 1;
951fd09b 5141 tls_type = TLS_TLS | TLS_LD;
411e1bfb
AM
5142 goto dogot;
5143
5144 case R_PPC64_GOT_TLSGD16:
5145 case R_PPC64_GOT_TLSGD16_LO:
5146 case R_PPC64_GOT_TLSGD16_HI:
5147 case R_PPC64_GOT_TLSGD16_HA:
951fd09b 5148 tls_type = TLS_TLS | TLS_GD;
411e1bfb
AM
5149 goto dogot;
5150
5151 case R_PPC64_GOT_TPREL16_DS:
5152 case R_PPC64_GOT_TPREL16_LO_DS:
5153 case R_PPC64_GOT_TPREL16_HI:
5154 case R_PPC64_GOT_TPREL16_HA:
5155 tls_type = TLS_TLS | TLS_TPREL;
5156 goto dogot;
5157
5158 case R_PPC64_GOT_DTPREL16_DS:
5159 case R_PPC64_GOT_DTPREL16_LO_DS:
5160 case R_PPC64_GOT_DTPREL16_HI:
5161 case R_PPC64_GOT_DTPREL16_HA:
5162 tls_type = TLS_TLS | TLS_DTPREL;
5163 goto dogot;
5164
a33d1f77
AM
5165 case R_PPC64_GOT16:
5166 case R_PPC64_GOT16_DS:
5167 case R_PPC64_GOT16_HA:
5168 case R_PPC64_GOT16_HI:
5169 case R_PPC64_GOT16_LO:
5170 case R_PPC64_GOT16_LO_DS:
411e1bfb
AM
5171 dogot:
5172 {
5173 struct got_entry *ent;
5174
58ac9f71
AM
5175 if (h != NULL)
5176 ent = h->got.glist;
411e1bfb
AM
5177 else
5178 ent = local_got_ents[r_symndx];
5179
5180 for (; ent != NULL; ent = ent->next)
5181 if (ent->addend == rel->r_addend
e717da7e 5182 && ent->owner == abfd
411e1bfb
AM
5183 && ent->tls_type == tls_type)
5184 break;
5185 if (ent == NULL)
5186 abort ();
5187 if (ent->got.refcount > 0)
5188 ent->got.refcount -= 1;
5189 }
a33d1f77 5190 break;
65f38f15 5191
a33d1f77
AM
5192 case R_PPC64_PLT16_HA:
5193 case R_PPC64_PLT16_HI:
5194 case R_PPC64_PLT16_LO:
5195 case R_PPC64_PLT32:
5196 case R_PPC64_PLT64:
721956f4
AM
5197 case R_PPC64_REL14:
5198 case R_PPC64_REL14_BRNTAKEN:
5199 case R_PPC64_REL14_BRTAKEN:
5d1634d7 5200 case R_PPC64_REL24:
58ac9f71 5201 if (h != NULL)
5d1634d7 5202 {
411e1bfb
AM
5203 struct plt_entry *ent;
5204
411e1bfb
AM
5205 for (ent = h->plt.plist; ent != NULL; ent = ent->next)
5206 if (ent->addend == rel->r_addend)
5207 break;
5208 if (ent == NULL)
5209 abort ();
5210 if (ent->plt.refcount > 0)
5211 ent->plt.refcount -= 1;
5d1634d7 5212 }
e86ce104 5213 break;
5d1634d7 5214
a33d1f77
AM
5215 default:
5216 break;
5217 }
5218 }
b34976b6 5219 return TRUE;
5bd4f169
AM
5220}
5221
deb0e272
AM
5222/* The maximum size of .sfpr. */
5223#define SFPR_MAX (218*4)
5224
5225struct sfpr_def_parms
5226{
699733f6
AM
5227 const char name[12];
5228 unsigned char lo, hi;
deb0e272
AM
5229 bfd_byte * (*write_ent) (bfd *, bfd_byte *, int);
5230 bfd_byte * (*write_tail) (bfd *, bfd_byte *, int);
5231};
5232
5233/* Auto-generate _save*, _rest* functions in .sfpr. */
5234
5235static unsigned int
5236sfpr_define (struct bfd_link_info *info, const struct sfpr_def_parms *parm)
5237{
5238 struct ppc_link_hash_table *htab = ppc_hash_table (info);
5239 unsigned int i;
5240 size_t len = strlen (parm->name);
5241 bfd_boolean writing = FALSE;
699733f6 5242 char sym[16];
deb0e272
AM
5243
5244 memcpy (sym, parm->name, len);
5245 sym[len + 2] = 0;
5246
5247 for (i = parm->lo; i <= parm->hi; i++)
5248 {
5249 struct elf_link_hash_entry *h;
5250
5251 sym[len + 0] = i / 10 + '0';
5252 sym[len + 1] = i % 10 + '0';
5253 h = elf_link_hash_lookup (&htab->elf, sym, FALSE, FALSE, TRUE);
5254 if (h != NULL
f5385ebf 5255 && !h->def_regular)
deb0e272
AM
5256 {
5257 h->root.type = bfd_link_hash_defined;
5258 h->root.u.def.section = htab->sfpr;
5259 h->root.u.def.value = htab->sfpr->size;
5260 h->type = STT_FUNC;
f5385ebf 5261 h->def_regular = 1;
deb0e272
AM
5262 _bfd_elf_link_hash_hide_symbol (info, h, TRUE);
5263 writing = TRUE;
5264 if (htab->sfpr->contents == NULL)
5265 {
5266 htab->sfpr->contents = bfd_alloc (htab->elf.dynobj, SFPR_MAX);
5267 if (htab->sfpr->contents == NULL)
5268 return FALSE;
5269 }
5270 }
5271 if (writing)
5272 {
5273 bfd_byte *p = htab->sfpr->contents + htab->sfpr->size;
5274 if (i != parm->hi)
5275 p = (*parm->write_ent) (htab->elf.dynobj, p, i);
5276 else
5277 p = (*parm->write_tail) (htab->elf.dynobj, p, i);
5278 htab->sfpr->size = p - htab->sfpr->contents;
5279 }
5280 }
5281
5282 return TRUE;
5283}
5284
5285static bfd_byte *
5286savegpr0 (bfd *abfd, bfd_byte *p, int r)
5287{
5288 bfd_put_32 (abfd, STD_R0_0R1 + (r << 21) + (1 << 16) - (32 - r) * 8, p);
5289 return p + 4;
5290}
5291
5292static bfd_byte *
5293savegpr0_tail (bfd *abfd, bfd_byte *p, int r)
5294{
5295 p = savegpr0 (abfd, p, r);
5296 bfd_put_32 (abfd, STD_R0_0R1 + 16, p);
5297 p = p + 4;
5298 bfd_put_32 (abfd, BLR, p);
5299 return p + 4;
5300}
5301
5302static bfd_byte *
5303restgpr0 (bfd *abfd, bfd_byte *p, int r)
5304{
5305 bfd_put_32 (abfd, LD_R0_0R1 + (r << 21) + (1 << 16) - (32 - r) * 8, p);
5306 return p + 4;
5307}
5308
5309static bfd_byte *
5310restgpr0_tail (bfd *abfd, bfd_byte *p, int r)
5311{
5312 bfd_put_32 (abfd, LD_R0_0R1 + 16, p);
5313 p = p + 4;
5314 p = restgpr0 (abfd, p, r);
5315 bfd_put_32 (abfd, MTLR_R0, p);
5316 p = p + 4;
5317 if (r == 29)
5318 {
5319 p = restgpr0 (abfd, p, 30);
5320 p = restgpr0 (abfd, p, 31);
5321 }
5322 bfd_put_32 (abfd, BLR, p);
5323 return p + 4;
5324}
5325
5326static bfd_byte *
5327savegpr1 (bfd *abfd, bfd_byte *p, int r)
5328{
5329 bfd_put_32 (abfd, STD_R0_0R12 + (r << 21) + (1 << 16) - (32 - r) * 8, p);
5330 return p + 4;
5331}
5332
5333static bfd_byte *
5334savegpr1_tail (bfd *abfd, bfd_byte *p, int r)
5335{
5336 p = savegpr1 (abfd, p, r);
5337 bfd_put_32 (abfd, BLR, p);
5338 return p + 4;
5339}
5340
5341static bfd_byte *
5342restgpr1 (bfd *abfd, bfd_byte *p, int r)
5343{
5344 bfd_put_32 (abfd, LD_R0_0R12 + (r << 21) + (1 << 16) - (32 - r) * 8, p);
5345 return p + 4;
5346}
5347
5348static bfd_byte *
5349restgpr1_tail (bfd *abfd, bfd_byte *p, int r)
5350{
5351 p = restgpr1 (abfd, p, r);
5352 bfd_put_32 (abfd, BLR, p);
5353 return p + 4;
5354}
5355
5356static bfd_byte *
5357savefpr (bfd *abfd, bfd_byte *p, int r)
5358{
5359 bfd_put_32 (abfd, STFD_FR0_0R1 + (r << 21) + (1 << 16) - (32 - r) * 8, p);
5360 return p + 4;
5361}
5362
5363static bfd_byte *
5364savefpr0_tail (bfd *abfd, bfd_byte *p, int r)
5365{
5366 p = savefpr (abfd, p, r);
5367 bfd_put_32 (abfd, STD_R0_0R1 + 16, p);
5368 p = p + 4;
5369 bfd_put_32 (abfd, BLR, p);
5370 return p + 4;
5371}
5372
5373static bfd_byte *
5374restfpr (bfd *abfd, bfd_byte *p, int r)
5375{
5376 bfd_put_32 (abfd, LFD_FR0_0R1 + (r << 21) + (1 << 16) - (32 - r) * 8, p);
5377 return p + 4;
5378}
5379
5380static bfd_byte *
5381restfpr0_tail (bfd *abfd, bfd_byte *p, int r)
5382{
5383 bfd_put_32 (abfd, LD_R0_0R1 + 16, p);
5384 p = p + 4;
5385 p = restfpr (abfd, p, r);
5386 bfd_put_32 (abfd, MTLR_R0, p);
5387 p = p + 4;
5388 if (r == 29)
5389 {
5390 p = restfpr (abfd, p, 30);
5391 p = restfpr (abfd, p, 31);
5392 }
5393 bfd_put_32 (abfd, BLR, p);
5394 return p + 4;
5395}
5396
5397static bfd_byte *
5398savefpr1_tail (bfd *abfd, bfd_byte *p, int r)
5399{
5400 p = savefpr (abfd, p, r);
5401 bfd_put_32 (abfd, BLR, p);
5402 return p + 4;
5403}
5404
5405static bfd_byte *
5406restfpr1_tail (bfd *abfd, bfd_byte *p, int r)
5407{
5408 p = restfpr (abfd, p, r);
5409 bfd_put_32 (abfd, BLR, p);
5410 return p + 4;
5411}
5412
5413static bfd_byte *
5414savevr (bfd *abfd, bfd_byte *p, int r)
5415{
5416 bfd_put_32 (abfd, LI_R12_0 + (1 << 16) - (32 - r) * 16, p);
5417 p = p + 4;
5418 bfd_put_32 (abfd, STVX_VR0_R12_R0 + (r << 21), p);
5419 return p + 4;
5420}
5421
5422static bfd_byte *
5423savevr_tail (bfd *abfd, bfd_byte *p, int r)
5424{
5425 p = savevr (abfd, p, r);
5426 bfd_put_32 (abfd, BLR, p);
5427 return p + 4;
5428}
5429
5430static bfd_byte *
5431restvr (bfd *abfd, bfd_byte *p, int r)
5432{
5433 bfd_put_32 (abfd, LI_R12_0 + (1 << 16) - (32 - r) * 16, p);
5434 p = p + 4;
5435 bfd_put_32 (abfd, LVX_VR0_R12_R0 + (r << 21), p);
5436 return p + 4;
5437}
5438
5439static bfd_byte *
5440restvr_tail (bfd *abfd, bfd_byte *p, int r)
5441{
5442 p = restvr (abfd, p, r);
5443 bfd_put_32 (abfd, BLR, p);
5444 return p + 4;
5445}
5446
e86ce104
AM
5447/* Called via elf_link_hash_traverse to transfer dynamic linking
5448 information on function code symbol entries to their corresponding
5449 function descriptor symbol entries. */
deb0e272 5450
b34976b6 5451static bfd_boolean
4ce794b7 5452func_desc_adjust (struct elf_link_hash_entry *h, void *inf)
5bd4f169 5453{
e86ce104 5454 struct bfd_link_info *info;
65f38f15 5455 struct ppc_link_hash_table *htab;
411e1bfb 5456 struct plt_entry *ent;
50bc7936
AM
5457 struct ppc_link_hash_entry *fh;
5458 struct ppc_link_hash_entry *fdh;
5459 bfd_boolean force_local;
5bd4f169 5460
50bc7936
AM
5461 fh = (struct ppc_link_hash_entry *) h;
5462 if (fh->elf.root.type == bfd_link_hash_indirect)
b34976b6 5463 return TRUE;
e86ce104 5464
50bc7936
AM
5465 if (fh->elf.root.type == bfd_link_hash_warning)
5466 fh = (struct ppc_link_hash_entry *) fh->elf.root.u.i.link;
e92d460e 5467
4ce794b7 5468 info = inf;
65f38f15 5469 htab = ppc_hash_table (info);
5bd4f169 5470
c09bdfe5
AM
5471 /* Resolve undefined references to dot-symbols as the value
5472 in the function descriptor, if we have one in a regular object.
5473 This is to satisfy cases like ".quad .foo". Calls to functions
5474 in dynamic objects are handled elsewhere. */
5475 if (fh->elf.root.type == bfd_link_hash_undefweak
5476 && fh->was_undefined
5477 && (fh->oh->elf.root.type == bfd_link_hash_defined
5478 || fh->oh->elf.root.type == bfd_link_hash_defweak)
5479 && get_opd_info (fh->oh->elf.root.u.def.section) != NULL
5480 && opd_entry_value (fh->oh->elf.root.u.def.section,
5481 fh->oh->elf.root.u.def.value,
5482 &fh->elf.root.u.def.section,
5483 &fh->elf.root.u.def.value) != (bfd_vma) -1)
5484 {
5485 fh->elf.root.type = fh->oh->elf.root.type;
f5385ebf 5486 fh->elf.forced_local = 1;
c09bdfe5
AM
5487 }
5488
e86ce104
AM
5489 /* If this is a function code symbol, transfer dynamic linking
5490 information to the function descriptor symbol. */
50bc7936 5491 if (!fh->is_func)
b34976b6 5492 return TRUE;
e86ce104 5493
50bc7936 5494 for (ent = fh->elf.plt.plist; ent != NULL; ent = ent->next)
411e1bfb
AM
5495 if (ent->plt.refcount > 0)
5496 break;
50bc7936
AM
5497 if (ent == NULL
5498 || fh->elf.root.root.string[0] != '.'
5499 || fh->elf.root.root.string[1] == '\0')
5500 return TRUE;
5bd4f169 5501
50bc7936
AM
5502 /* Find the corresponding function descriptor symbol. Create it
5503 as undefined if necessary. */
5bd4f169 5504
50bc7936
AM
5505 fdh = get_fdh (fh, htab);
5506 if (fdh != NULL)
5507 while (fdh->elf.root.type == bfd_link_hash_indirect
5508 || fdh->elf.root.type == bfd_link_hash_warning)
5509 fdh = (struct ppc_link_hash_entry *) fdh->elf.root.u.i.link;
5bd4f169 5510
50bc7936
AM
5511 if (fdh == NULL
5512 && info->shared
5513 && (fh->elf.root.type == bfd_link_hash_undefined
5514 || fh->elf.root.type == bfd_link_hash_undefweak))
5515 {
908b32fc 5516 fdh = make_fdh (info, fh);
bb700d78
AM
5517 if (fdh == NULL)
5518 return FALSE;
50bc7936 5519 }
648cca2c 5520
908b32fc 5521 /* Fake function descriptors are made undefweak. If the function
433817dd
AM
5522 code symbol is strong undefined, make the fake sym the same.
5523 If the function code symbol is defined, then force the fake
5524 descriptor local; We can't support overriding of symbols in a
5525 shared library on a fake descriptor. */
908b32fc
AM
5526
5527 if (fdh != NULL
5528 && fdh->fake
433817dd 5529 && fdh->elf.root.type == bfd_link_hash_undefweak)
908b32fc 5530 {
433817dd
AM
5531 if (fh->elf.root.type == bfd_link_hash_undefined)
5532 {
5533 fdh->elf.root.type = bfd_link_hash_undefined;
5534 bfd_link_add_undef (&htab->elf.root, &fdh->elf.root);
5535 }
5536 else if (fh->elf.root.type == bfd_link_hash_defined
5537 || fh->elf.root.type == bfd_link_hash_defweak)
5538 {
5539 _bfd_elf_link_hash_hide_symbol (info, &fdh->elf, TRUE);
5540 }
908b32fc
AM
5541 }
5542
50bc7936 5543 if (fdh != NULL
f5385ebf 5544 && !fdh->elf.forced_local
50bc7936 5545 && (info->shared
f5385ebf
AM
5546 || fdh->elf.def_dynamic
5547 || fdh->elf.ref_dynamic
50bc7936
AM
5548 || (fdh->elf.root.type == bfd_link_hash_undefweak
5549 && ELF_ST_VISIBILITY (fdh->elf.other) == STV_DEFAULT)))
5550 {
5551 if (fdh->elf.dynindx == -1)
c152c796 5552 if (! bfd_elf_link_record_dynamic_symbol (info, &fdh->elf))
50bc7936 5553 return FALSE;
f5385ebf
AM
5554 fdh->elf.ref_regular |= fh->elf.ref_regular;
5555 fdh->elf.ref_dynamic |= fh->elf.ref_dynamic;
5556 fdh->elf.ref_regular_nonweak |= fh->elf.ref_regular_nonweak;
5557 fdh->elf.non_got_ref |= fh->elf.non_got_ref;
50bc7936 5558 if (ELF_ST_VISIBILITY (fh->elf.other) == STV_DEFAULT)
e86ce104 5559 {
40d16e0b 5560 move_plt_plist (fh, fdh);
f5385ebf 5561 fdh->elf.needs_plt = 1;
e86ce104 5562 }
50bc7936 5563 fdh->is_func_descriptor = 1;
34814b9f
AM
5564 fdh->oh = fh;
5565 fh->oh = fdh;
e86ce104
AM
5566 }
5567
50bc7936
AM
5568 /* Now that the info is on the function descriptor, clear the
5569 function code sym info. Any function code syms for which we
5570 don't have a definition in a regular file, we force local.
5571 This prevents a shared library from exporting syms that have
5572 been imported from another library. Function code syms that
5573 are really in the library we must leave global to prevent the
5574 linker dragging in a definition from a static library. */
93f3fa99
AM
5575 force_local = (!fh->elf.def_regular
5576 || fdh == NULL
5577 || !fdh->elf.def_regular
5578 || fdh->elf.forced_local);
50bc7936
AM
5579 _bfd_elf_link_hash_hide_symbol (info, &fh->elf, force_local);
5580
b34976b6 5581 return TRUE;
e86ce104 5582}
40b8271b 5583
e86ce104 5584/* Called near the start of bfd_elf_size_dynamic_sections. We use
82bd7b59
AM
5585 this hook to a) provide some gcc support functions, and b) transfer
5586 dynamic linking information gathered so far on function code symbol
5587 entries, to their corresponding function descriptor symbol entries. */
deb0e272 5588
b34976b6 5589static bfd_boolean
4ce794b7
AM
5590ppc64_elf_func_desc_adjust (bfd *obfd ATTRIBUTE_UNUSED,
5591 struct bfd_link_info *info)
e86ce104
AM
5592{
5593 struct ppc_link_hash_table *htab;
82bd7b59 5594 unsigned int i;
deb0e272
AM
5595 const struct sfpr_def_parms funcs[] =
5596 {
5597 { "_savegpr0_", 14, 31, savegpr0, savegpr0_tail },
5598 { "_restgpr0_", 14, 29, restgpr0, restgpr0_tail },
5599 { "_restgpr0_", 30, 31, restgpr0, restgpr0_tail },
5600 { "_savegpr1_", 14, 31, savegpr1, savegpr1_tail },
5601 { "_restgpr1_", 14, 31, restgpr1, restgpr1_tail },
5602 { "_savefpr_", 14, 31, savefpr, savefpr0_tail },
5603 { "_restfpr_", 14, 29, restfpr, restfpr0_tail },
5604 { "_restfpr_", 30, 31, restfpr, restfpr0_tail },
5605 { "._savef", 14, 31, savefpr, savefpr1_tail },
5606 { "._restf", 14, 31, restfpr, restfpr1_tail },
5607 { "_savevr_", 20, 31, savevr, savevr_tail },
5608 { "_restvr_", 20, 31, restvr, restvr_tail }
5609 };
e86ce104
AM
5610
5611 htab = ppc_hash_table (info);
82bd7b59
AM
5612 if (htab->sfpr == NULL)
5613 /* We don't have any relocs. */
b34976b6 5614 return TRUE;
82bd7b59 5615
deb0e272
AM
5616 /* Provide any missing _save* and _rest* functions. */
5617 htab->sfpr->size = 0;
5618 for (i = 0; i < sizeof (funcs) / sizeof (funcs[0]); i++)
5619 if (!sfpr_define (info, &funcs[i]))
5620 return FALSE;
82bd7b59 5621
4ce794b7 5622 elf_link_hash_traverse (&htab->elf, func_desc_adjust, info);
805fc799 5623
eea6121a 5624 if (htab->sfpr->size == 0)
8423293d 5625 htab->sfpr->flags |= SEC_EXCLUDE;
82bd7b59 5626
b34976b6 5627 return TRUE;
e86ce104
AM
5628}
5629
5630/* Adjust a symbol defined by a dynamic object and referenced by a
5631 regular object. The current definition is in some section of the
5632 dynamic object, but we're not including those sections. We have to
5633 change the definition to something the rest of the link can
5634 understand. */
5635
b34976b6 5636static bfd_boolean
4ce794b7
AM
5637ppc64_elf_adjust_dynamic_symbol (struct bfd_link_info *info,
5638 struct elf_link_hash_entry *h)
e86ce104
AM
5639{
5640 struct ppc_link_hash_table *htab;
e86ce104
AM
5641 asection *s;
5642 unsigned int power_of_two;
5643
5644 htab = ppc_hash_table (info);
5645
5646 /* Deal with function syms. */
5647 if (h->type == STT_FUNC
f5385ebf 5648 || h->needs_plt)
e86ce104
AM
5649 {
5650 /* Clear procedure linkage table information for any symbol that
5651 won't need a .plt entry. */
411e1bfb
AM
5652 struct plt_entry *ent;
5653 for (ent = h->plt.plist; ent != NULL; ent = ent->next)
5654 if (ent->plt.refcount > 0)
5655 break;
8387904d 5656 if (ent == NULL
9c7a29a3
AM
5657 || SYMBOL_CALLS_LOCAL (info, h)
5658 || (ELF_ST_VISIBILITY (h->other) != STV_DEFAULT
5659 && h->root.type == bfd_link_hash_undefweak))
40b8271b 5660 {
411e1bfb 5661 h->plt.plist = NULL;
f5385ebf 5662 h->needs_plt = 0;
40b8271b 5663 }
5bd4f169 5664 }
bbd7ec4a 5665 else
411e1bfb 5666 h->plt.plist = NULL;
5bd4f169
AM
5667
5668 /* If this is a weak symbol, and there is a real definition, the
5669 processor independent code will have arranged for us to see the
5670 real definition first, and we can just use the same value. */
f6e332e6 5671 if (h->u.weakdef != NULL)
5bd4f169 5672 {
f6e332e6
AM
5673 BFD_ASSERT (h->u.weakdef->root.type == bfd_link_hash_defined
5674 || h->u.weakdef->root.type == bfd_link_hash_defweak);
5675 h->root.u.def.section = h->u.weakdef->root.u.def.section;
5676 h->root.u.def.value = h->u.weakdef->root.u.def.value;
a23b6845 5677 if (ELIMINATE_COPY_RELOCS)
f6e332e6 5678 h->non_got_ref = h->u.weakdef->non_got_ref;
b34976b6 5679 return TRUE;
5bd4f169
AM
5680 }
5681
5bd4f169
AM
5682 /* If we are creating a shared library, we must presume that the
5683 only references to the symbol are via the global offset table.
5684 For such cases we need not do anything here; the relocations will
5685 be handled correctly by relocate_section. */
5686 if (info->shared)
b34976b6 5687 return TRUE;
5bd4f169 5688
65f38f15
AM
5689 /* If there are no references to this symbol that do not use the
5690 GOT, we don't need to generate a copy reloc. */
f5385ebf 5691 if (!h->non_got_ref)
b34976b6 5692 return TRUE;
65f38f15 5693
f4656909 5694 if (ELIMINATE_COPY_RELOCS)
65f38f15 5695 {
f4656909
AM
5696 struct ppc_link_hash_entry * eh;
5697 struct ppc_dyn_relocs *p;
65f38f15 5698
f4656909
AM
5699 eh = (struct ppc_link_hash_entry *) h;
5700 for (p = eh->dyn_relocs; p != NULL; p = p->next)
5701 {
5702 s = p->sec->output_section;
5703 if (s != NULL && (s->flags & SEC_READONLY) != 0)
5704 break;
5705 }
5706
5707 /* If we didn't find any dynamic relocs in read-only sections, then
5708 we'll be keeping the dynamic relocs and avoiding the copy reloc. */
5709 if (p == NULL)
5710 {
f5385ebf 5711 h->non_got_ref = 0;
f4656909
AM
5712 return TRUE;
5713 }
65f38f15
AM
5714 }
5715
5d35169e 5716 if (h->plt.plist != NULL)
97b639ba
AM
5717 {
5718 /* We should never get here, but unfortunately there are versions
5719 of gcc out there that improperly (for this ABI) put initialized
5720 function pointers, vtable refs and suchlike in read-only
5721 sections. Allow them to proceed, but warn that this might
5722 break at runtime. */
5723 (*_bfd_error_handler)
5724 (_("copy reloc against `%s' requires lazy plt linking; "
5725 "avoid setting LD_BIND_NOW=1 or upgrade gcc"),
5726 h->root.root.string);
5727 }
5d35169e
AM
5728
5729 /* This is a reference to a symbol defined by a dynamic object which
5730 is not a function. */
5731
909272ee
AM
5732 if (h->size == 0)
5733 {
5734 (*_bfd_error_handler) (_("dynamic variable `%s' is zero size"),
5735 h->root.root.string);
5736 return TRUE;
5737 }
5738
5bd4f169
AM
5739 /* We must allocate the symbol in our .dynbss section, which will
5740 become part of the .bss section of the executable. There will be
5741 an entry for this symbol in the .dynsym section. The dynamic
5742 object will contain position independent code, so all references
5743 from the dynamic object to this symbol will go through the global
5744 offset table. The dynamic linker will use the .dynsym entry to
5745 determine the address it must put in the global offset table, so
5746 both the dynamic object and the regular object will refer to the
5747 same memory location for the variable. */
5bd4f169 5748
04c9666a
AM
5749 /* We must generate a R_PPC64_COPY reloc to tell the dynamic linker
5750 to copy the initial value out of the dynamic object and into the
5bd4f169
AM
5751 runtime process image. We need to remember the offset into the
5752 .rela.bss section we are going to use. */
5753 if ((h->root.u.def.section->flags & SEC_ALLOC) != 0)
5754 {
eea6121a 5755 htab->relbss->size += sizeof (Elf64_External_Rela);
f5385ebf 5756 h->needs_copy = 1;
5bd4f169
AM
5757 }
5758
5759 /* We need to figure out the alignment required for this symbol. I
5760 have no idea how ELF linkers handle this. */
5761 power_of_two = bfd_log2 (h->size);
5762 if (power_of_two > 4)
5763 power_of_two = 4;
5764
5765 /* Apply the required alignment. */
4ce794b7 5766 s = htab->dynbss;
eea6121a 5767 s->size = BFD_ALIGN (s->size, (bfd_size_type) (1 << power_of_two));
65f38f15 5768 if (power_of_two > bfd_get_section_alignment (htab->elf.dynobj, s))
5bd4f169 5769 {
65f38f15 5770 if (! bfd_set_section_alignment (htab->elf.dynobj, s, power_of_two))
b34976b6 5771 return FALSE;
5bd4f169
AM
5772 }
5773
5774 /* Define the symbol as being at this point in the section. */
5775 h->root.u.def.section = s;
eea6121a 5776 h->root.u.def.value = s->size;
5bd4f169
AM
5777
5778 /* Increment the section size to make room for the symbol. */
eea6121a 5779 s->size += h->size;
5bd4f169 5780
b34976b6 5781 return TRUE;
5bd4f169
AM
5782}
5783
e86ce104
AM
5784/* If given a function descriptor symbol, hide both the function code
5785 sym and the descriptor. */
5786static void
4ce794b7
AM
5787ppc64_elf_hide_symbol (struct bfd_link_info *info,
5788 struct elf_link_hash_entry *h,
5789 bfd_boolean force_local)
e86ce104 5790{
34814b9f 5791 struct ppc_link_hash_entry *eh;
e86ce104
AM
5792 _bfd_elf_link_hash_hide_symbol (info, h, force_local);
5793
34814b9f
AM
5794 eh = (struct ppc_link_hash_entry *) h;
5795 if (eh->is_func_descriptor)
e86ce104 5796 {
34814b9f 5797 struct ppc_link_hash_entry *fh = eh->oh;
e86ce104 5798
721956f4 5799 if (fh == NULL)
d1329ca3
AM
5800 {
5801 const char *p, *q;
5802 struct ppc_link_hash_table *htab;
5803 char save;
5804
5805 /* We aren't supposed to use alloca in BFD because on
5806 systems which do not have alloca the version in libiberty
5807 calls xmalloc, which might cause the program to crash
5808 when it runs out of memory. This function doesn't have a
5809 return status, so there's no way to gracefully return an
5810 error. So cheat. We know that string[-1] can be safely
34814b9f
AM
5811 accessed; It's either a string in an ELF string table,
5812 or allocated in an objalloc structure. */
d1329ca3 5813
34814b9f 5814 p = eh->elf.root.root.string - 1;
d1329ca3
AM
5815 save = *p;
5816 *(char *) p = '.';
5817 htab = ppc_hash_table (info);
34814b9f
AM
5818 fh = (struct ppc_link_hash_entry *)
5819 elf_link_hash_lookup (&htab->elf, p, FALSE, FALSE, FALSE);
d1329ca3
AM
5820 *(char *) p = save;
5821
5822 /* Unfortunately, if it so happens that the string we were
5823 looking for was allocated immediately before this string,
5824 then we overwrote the string terminator. That's the only
5825 reason the lookup should fail. */
5826 if (fh == NULL)
5827 {
34814b9f
AM
5828 q = eh->elf.root.root.string + strlen (eh->elf.root.root.string);
5829 while (q >= eh->elf.root.root.string && *q == *p)
d1329ca3 5830 --q, --p;
34814b9f
AM
5831 if (q < eh->elf.root.root.string && *p == '.')
5832 fh = (struct ppc_link_hash_entry *)
5833 elf_link_hash_lookup (&htab->elf, p, FALSE, FALSE, FALSE);
d1329ca3
AM
5834 }
5835 if (fh != NULL)
5836 {
34814b9f
AM
5837 eh->oh = fh;
5838 fh->oh = eh;
d1329ca3
AM
5839 }
5840 }
e86ce104 5841 if (fh != NULL)
34814b9f 5842 _bfd_elf_link_hash_hide_symbol (info, &fh->elf, force_local);
e86ce104
AM
5843 }
5844}
5845
411e1bfb 5846static bfd_boolean
8843416a
AM
5847get_sym_h (struct elf_link_hash_entry **hp,
5848 Elf_Internal_Sym **symp,
5849 asection **symsecp,
5850 char **tls_maskp,
5851 Elf_Internal_Sym **locsymsp,
5852 unsigned long r_symndx,
5853 bfd *ibfd)
411e1bfb
AM
5854{
5855 Elf_Internal_Shdr *symtab_hdr = &elf_tdata (ibfd)->symtab_hdr;
5856
5857 if (r_symndx >= symtab_hdr->sh_info)
5858 {
5859 struct elf_link_hash_entry **sym_hashes = elf_sym_hashes (ibfd);
5860 struct elf_link_hash_entry *h;
5861
5862 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
5863 while (h->root.type == bfd_link_hash_indirect
5864 || h->root.type == bfd_link_hash_warning)
5865 h = (struct elf_link_hash_entry *) h->root.u.i.link;
5866
5867 if (hp != NULL)
5868 *hp = h;
5869
5870 if (symp != NULL)
5871 *symp = NULL;
5872
5873 if (symsecp != NULL)
5874 {
5875 asection *symsec = NULL;
5876 if (h->root.type == bfd_link_hash_defined
5877 || h->root.type == bfd_link_hash_defweak)
5878 symsec = h->root.u.def.section;
5879 *symsecp = symsec;
5880 }
5881
e7b938ca 5882 if (tls_maskp != NULL)
411e1bfb
AM
5883 {
5884 struct ppc_link_hash_entry *eh;
5885
5886 eh = (struct ppc_link_hash_entry *) h;
e7b938ca 5887 *tls_maskp = &eh->tls_mask;
411e1bfb
AM
5888 }
5889 }
5890 else
5891 {
5892 Elf_Internal_Sym *sym;
5893 Elf_Internal_Sym *locsyms = *locsymsp;
5894
5895 if (locsyms == NULL)
5896 {
5897 locsyms = (Elf_Internal_Sym *) symtab_hdr->contents;
5898 if (locsyms == NULL)
5899 locsyms = bfd_elf_get_elf_syms (ibfd, symtab_hdr,
5900 symtab_hdr->sh_info,
5901 0, NULL, NULL, NULL);
5902 if (locsyms == NULL)
5903 return FALSE;
5904 *locsymsp = locsyms;
5905 }
5906 sym = locsyms + r_symndx;
5907
5908 if (hp != NULL)
5909 *hp = NULL;
5910
5911 if (symp != NULL)
5912 *symp = sym;
5913
5914 if (symsecp != NULL)
5915 {
5916 asection *symsec = NULL;
5917 if ((sym->st_shndx != SHN_UNDEF
5918 && sym->st_shndx < SHN_LORESERVE)
5919 || sym->st_shndx > SHN_HIRESERVE)
5920 symsec = bfd_section_from_elf_index (ibfd, sym->st_shndx);
5921 *symsecp = symsec;
5922 }
5923
e7b938ca 5924 if (tls_maskp != NULL)
411e1bfb
AM
5925 {
5926 struct got_entry **lgot_ents;
e7b938ca 5927 char *tls_mask;
411e1bfb 5928
e7b938ca 5929 tls_mask = NULL;
411e1bfb
AM
5930 lgot_ents = elf_local_got_ents (ibfd);
5931 if (lgot_ents != NULL)
5932 {
e7b938ca
AM
5933 char *lgot_masks = (char *) (lgot_ents + symtab_hdr->sh_info);
5934 tls_mask = &lgot_masks[r_symndx];
411e1bfb 5935 }
e7b938ca 5936 *tls_maskp = tls_mask;
411e1bfb
AM
5937 }
5938 }
5939 return TRUE;
5940}
5941
e7b938ca 5942/* Returns TLS_MASKP for the given REL symbol. Function return is 0 on
951fd09b 5943 error, 2 on a toc GD type suitable for optimization, 3 on a toc LD
ad8e1ba5 5944 type suitable for optimization, and 1 otherwise. */
951fd09b
AM
5945
5946static int
0d4792f7
AM
5947get_tls_mask (char **tls_maskp, unsigned long *toc_symndx,
5948 Elf_Internal_Sym **locsymsp,
4ce794b7 5949 const Elf_Internal_Rela *rel, bfd *ibfd)
411e1bfb
AM
5950{
5951 unsigned long r_symndx;
0d4792f7 5952 int next_r;
411e1bfb
AM
5953 struct elf_link_hash_entry *h;
5954 Elf_Internal_Sym *sym;
5955 asection *sec;
5956 bfd_vma off;
5957
5958 r_symndx = ELF64_R_SYM (rel->r_info);
e7b938ca 5959 if (!get_sym_h (&h, &sym, &sec, tls_maskp, locsymsp, r_symndx, ibfd))
951fd09b 5960 return 0;
411e1bfb 5961
e7b938ca 5962 if ((*tls_maskp != NULL && **tls_maskp != 0)
411e1bfb
AM
5963 || sec == NULL
5964 || ppc64_elf_section_data (sec)->t_symndx == NULL)
951fd09b 5965 return 1;
411e1bfb
AM
5966
5967 /* Look inside a TOC section too. */
5968 if (h != NULL)
5969 {
5970 BFD_ASSERT (h->root.type == bfd_link_hash_defined);
5971 off = h->root.u.def.value;
5972 }
5973 else
5974 off = sym->st_value;
5975 off += rel->r_addend;
5976 BFD_ASSERT (off % 8 == 0);
5977 r_symndx = ppc64_elf_section_data (sec)->t_symndx[off / 8];
951fd09b 5978 next_r = ppc64_elf_section_data (sec)->t_symndx[off / 8 + 1];
e7b938ca 5979 if (!get_sym_h (&h, &sym, &sec, tls_maskp, locsymsp, r_symndx, ibfd))
951fd09b 5980 return 0;
0d4792f7
AM
5981 if (toc_symndx != NULL)
5982 *toc_symndx = r_symndx;
5983 if ((h == NULL
5984 || ((h->root.type == bfd_link_hash_defined
5985 || h->root.type == bfd_link_hash_defweak)
f5385ebf 5986 && !h->def_dynamic))
0d4792f7
AM
5987 && (next_r == -1 || next_r == -2))
5988 return 1 - next_r;
951fd09b 5989 return 1;
411e1bfb
AM
5990}
5991
754021d0 5992/* Adjust all global syms defined in opd sections. In gcc generated
8387904d 5993 code for the old ABI, these will already have been done. */
754021d0
AM
5994
5995static bfd_boolean
5996adjust_opd_syms (struct elf_link_hash_entry *h, void *inf ATTRIBUTE_UNUSED)
5997{
5998 struct ppc_link_hash_entry *eh;
5999 asection *sym_sec;
6000 long *opd_adjust;
6001
6002 if (h->root.type == bfd_link_hash_indirect)
6003 return TRUE;
6004
6005 if (h->root.type == bfd_link_hash_warning)
6006 h = (struct elf_link_hash_entry *) h->root.u.i.link;
6007
6008 if (h->root.type != bfd_link_hash_defined
6009 && h->root.type != bfd_link_hash_defweak)
6010 return TRUE;
6011
6012 eh = (struct ppc_link_hash_entry *) h;
6013 if (eh->adjust_done)
6014 return TRUE;
6015
6016 sym_sec = eh->elf.root.u.def.section;
4025353c
AM
6017 opd_adjust = get_opd_info (sym_sec);
6018 if (opd_adjust != NULL)
754021d0 6019 {
3f764659 6020 long adjust = opd_adjust[eh->elf.root.u.def.value / 8];
4025353c
AM
6021 if (adjust == -1)
6022 {
6023 /* This entry has been deleted. */
433817dd 6024 asection *dsec = ppc64_elf_tdata (sym_sec->owner)->u.deleted_section;
81688140
AM
6025 if (dsec == NULL)
6026 {
6027 for (dsec = sym_sec->owner->sections; dsec; dsec = dsec->next)
6028 if (elf_discarded_section (dsec))
6029 {
433817dd 6030 ppc64_elf_tdata (sym_sec->owner)->u.deleted_section = dsec;
81688140
AM
6031 break;
6032 }
6033 }
4025353c 6034 eh->elf.root.u.def.value = 0;
81688140 6035 eh->elf.root.u.def.section = dsec;
4025353c
AM
6036 }
6037 else
6038 eh->elf.root.u.def.value += adjust;
754021d0
AM
6039 eh->adjust_done = 1;
6040 }
6041 return TRUE;
6042}
6043
8c1d1bb8
AM
6044/* Handles decrementing dynamic reloc counts for the reloc specified by
6045 R_INFO in section SEC. If LOCAL_SYMS is NULL, then H and SYM_SEC
6046 have already been determined. */
6047
6048static bfd_boolean
6049dec_dynrel_count (bfd_vma r_info,
6050 asection *sec,
6051 struct bfd_link_info *info,
6052 Elf_Internal_Sym **local_syms,
6053 struct elf_link_hash_entry *h,
6054 asection *sym_sec)
6055{
6056 enum elf_ppc64_reloc_type r_type;
6057 struct ppc_dyn_relocs *p;
6058 struct ppc_dyn_relocs **pp;
6059
6060 /* Can this reloc be dynamic? This switch, and later tests here
6061 should be kept in sync with the code in check_relocs. */
6062 r_type = ELF64_R_TYPE (r_info);
6063 switch (r_type)
6064 {
6065 default:
6066 return TRUE;
6067
6068 case R_PPC64_TPREL16:
6069 case R_PPC64_TPREL16_LO:
6070 case R_PPC64_TPREL16_HI:
6071 case R_PPC64_TPREL16_HA:
6072 case R_PPC64_TPREL16_DS:
6073 case R_PPC64_TPREL16_LO_DS:
6074 case R_PPC64_TPREL16_HIGHER:
6075 case R_PPC64_TPREL16_HIGHERA:
6076 case R_PPC64_TPREL16_HIGHEST:
6077 case R_PPC64_TPREL16_HIGHESTA:
6078 if (!info->shared)
6079 return TRUE;
6080
6081 case R_PPC64_TPREL64:
6082 case R_PPC64_DTPMOD64:
6083 case R_PPC64_DTPREL64:
6084 case R_PPC64_ADDR64:
6085 case R_PPC64_REL30:
6086 case R_PPC64_REL32:
6087 case R_PPC64_REL64:
6088 case R_PPC64_ADDR14:
6089 case R_PPC64_ADDR14_BRNTAKEN:
6090 case R_PPC64_ADDR14_BRTAKEN:
6091 case R_PPC64_ADDR16:
6092 case R_PPC64_ADDR16_DS:
6093 case R_PPC64_ADDR16_HA:
6094 case R_PPC64_ADDR16_HI:
6095 case R_PPC64_ADDR16_HIGHER:
6096 case R_PPC64_ADDR16_HIGHERA:
6097 case R_PPC64_ADDR16_HIGHEST:
6098 case R_PPC64_ADDR16_HIGHESTA:
6099 case R_PPC64_ADDR16_LO:
6100 case R_PPC64_ADDR16_LO_DS:
6101 case R_PPC64_ADDR24:
6102 case R_PPC64_ADDR32:
6103 case R_PPC64_UADDR16:
6104 case R_PPC64_UADDR32:
6105 case R_PPC64_UADDR64:
6106 case R_PPC64_TOC:
6107 break;
6108 }
6109
6110 if (local_syms != NULL)
6111 {
6112 unsigned long r_symndx;
6113 Elf_Internal_Sym *sym;
6114 bfd *ibfd = sec->owner;
6115
6116 r_symndx = ELF64_R_SYM (r_info);
6117 if (!get_sym_h (&h, &sym, &sym_sec, NULL, local_syms, r_symndx, ibfd))
6118 return FALSE;
6119 }
6120
6121 if ((info->shared
6122 && (MUST_BE_DYN_RELOC (r_type)
6123 || (h != NULL
6124 && (!info->symbolic
6125 || h->root.type == bfd_link_hash_defweak
6126 || !h->def_regular))))
6127 || (ELIMINATE_COPY_RELOCS
6128 && !info->shared
6129 && h != NULL
6130 && (h->root.type == bfd_link_hash_defweak
6131 || !h->def_regular)))
6132 ;
6133 else
6134 return TRUE;
6135
6136 if (h != NULL)
6137 pp = &((struct ppc_link_hash_entry *) h)->dyn_relocs;
8c1d1bb8 6138 else
6edfbbad 6139 {
60124e18
AM
6140 if (sym_sec != NULL)
6141 {
6142 void *vpp = &elf_section_data (sym_sec)->local_dynrel;
6143 pp = (struct ppc_dyn_relocs **) vpp;
6144 }
6145 else
6146 {
6147 void *vpp = &elf_section_data (sec)->local_dynrel;
6148 pp = (struct ppc_dyn_relocs **) vpp;
6149 }
6150
6151 /* elf_gc_sweep may have already removed all dyn relocs associated
6152 with local syms for a given section. Don't report a dynreloc
6153 miscount. */
6154 if (*pp == NULL)
6155 return TRUE;
6edfbbad 6156 }
8c1d1bb8
AM
6157
6158 while ((p = *pp) != NULL)
6159 {
6160 if (p->sec == sec)
6161 {
6162 if (!MUST_BE_DYN_RELOC (r_type))
6163 p->pc_count -= 1;
6164 p->count -= 1;
6165 if (p->count == 0)
6166 *pp = p->next;
6167 return TRUE;
6168 }
6169 pp = &p->next;
6170 }
6171
6172 (*_bfd_error_handler) (_("dynreloc miscount for %B, section %A"),
6173 sec->owner, sec);
6174 bfd_set_error (bfd_error_bad_value);
6175 return FALSE;
6176}
6177
754021d0
AM
6178/* Remove unused Official Procedure Descriptor entries. Currently we
6179 only remove those associated with functions in discarded link-once
6180 sections, or weakly defined functions that have been overridden. It
6181 would be possible to remove many more entries for statically linked
6182 applications. */
6183
b34976b6 6184bfd_boolean
3f764659 6185ppc64_elf_edit_opd (bfd *obfd, struct bfd_link_info *info,
b4f4e59f 6186 bfd_boolean no_opd_opt,
3f764659 6187 bfd_boolean non_overlapping)
1e2f5b6e
AM
6188{
6189 bfd *ibfd;
754021d0 6190 bfd_boolean some_edited = FALSE;
3f764659 6191 asection *need_pad = NULL;
1e2f5b6e 6192
411e1bfb 6193 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link_next)
1e2f5b6e
AM
6194 {
6195 asection *sec;
6196 Elf_Internal_Rela *relstart, *rel, *relend;
6197 Elf_Internal_Shdr *symtab_hdr;
6cdc0ccc 6198 Elf_Internal_Sym *local_syms;
1e2f5b6e
AM
6199 struct elf_link_hash_entry **sym_hashes;
6200 bfd_vma offset;
d6fe2dc1 6201 bfd_size_type amt;
4025353c 6202 long *opd_adjust;
3f764659
JJ
6203 bfd_boolean need_edit, add_aux_fields;
6204 bfd_size_type cnt_16b = 0;
1e2f5b6e
AM
6205
6206 sec = bfd_get_section_by_name (ibfd, ".opd");
46de2a7c 6207 if (sec == NULL || sec->size == 0)
1e2f5b6e
AM
6208 continue;
6209
3f764659 6210 amt = sec->size * sizeof (long) / 8;
4025353c
AM
6211 opd_adjust = get_opd_info (sec);
6212 if (opd_adjust == NULL)
d6fe2dc1 6213 {
4b85d634
AM
6214 /* check_relocs hasn't been called. Must be a ld -r link
6215 or --just-symbols object. */
b4f4e59f 6216 opd_adjust = bfd_alloc (obfd, amt);
46de2a7c
AM
6217 if (opd_adjust == NULL)
6218 return FALSE;
4025353c 6219 ppc64_elf_section_data (sec)->opd.adjust = opd_adjust;
d6fe2dc1 6220 }
4025353c 6221 memset (opd_adjust, 0, amt);
1e2f5b6e 6222
b4f4e59f
AM
6223 if (no_opd_opt)
6224 continue;
6225
4b85d634
AM
6226 if (sec->sec_info_type == ELF_INFO_TYPE_JUST_SYMS)
6227 continue;
6228
1e2f5b6e
AM
6229 if (sec->output_section == bfd_abs_section_ptr)
6230 continue;
6231
6232 /* Look through the section relocs. */
6233 if ((sec->flags & SEC_RELOC) == 0 || sec->reloc_count == 0)
6234 continue;
6235
6cdc0ccc 6236 local_syms = NULL;
1e2f5b6e
AM
6237 symtab_hdr = &elf_tdata (ibfd)->symtab_hdr;
6238 sym_hashes = elf_sym_hashes (ibfd);
6239
6240 /* Read the relocations. */
4ce794b7 6241 relstart = _bfd_elf_link_read_relocs (ibfd, sec, NULL, NULL,
45d6a902 6242 info->keep_memory);
1e2f5b6e 6243 if (relstart == NULL)
b34976b6 6244 return FALSE;
1e2f5b6e
AM
6245
6246 /* First run through the relocs to check they are sane, and to
6247 determine whether we need to edit this opd section. */
b34976b6 6248 need_edit = FALSE;
3f764659 6249 need_pad = sec;
1e2f5b6e
AM
6250 offset = 0;
6251 relend = relstart + sec->reloc_count;
50bc7936 6252 for (rel = relstart; rel < relend; )
1e2f5b6e 6253 {
04c9666a 6254 enum elf_ppc64_reloc_type r_type;
1e2f5b6e
AM
6255 unsigned long r_symndx;
6256 asection *sym_sec;
6257 struct elf_link_hash_entry *h;
6258 Elf_Internal_Sym *sym;
6259
3f764659 6260 /* .opd contains a regular array of 16 or 24 byte entries. We're
1e2f5b6e
AM
6261 only interested in the reloc pointing to a function entry
6262 point. */
50bc7936
AM
6263 if (rel->r_offset != offset
6264 || rel + 1 >= relend
6265 || (rel + 1)->r_offset != offset + 8)
1e2f5b6e
AM
6266 {
6267 /* If someone messes with .opd alignment then after a
6268 "ld -r" we might have padding in the middle of .opd.
6269 Also, there's nothing to prevent someone putting
6270 something silly in .opd with the assembler. No .opd
b34976b6 6271 optimization for them! */
3f764659 6272 broken_opd:
1e2f5b6e 6273 (*_bfd_error_handler)
d003868e 6274 (_("%B: .opd is not a regular array of opd entries"), ibfd);
b34976b6 6275 need_edit = FALSE;
1e2f5b6e
AM
6276 break;
6277 }
6278
50bc7936
AM
6279 if ((r_type = ELF64_R_TYPE (rel->r_info)) != R_PPC64_ADDR64
6280 || (r_type = ELF64_R_TYPE ((rel + 1)->r_info)) != R_PPC64_TOC)
6281 {
6282 (*_bfd_error_handler)
d003868e
AM
6283 (_("%B: unexpected reloc type %u in .opd section"),
6284 ibfd, r_type);
50bc7936
AM
6285 need_edit = FALSE;
6286 break;
6287 }
6288
1e2f5b6e 6289 r_symndx = ELF64_R_SYM (rel->r_info);
411e1bfb
AM
6290 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms,
6291 r_symndx, ibfd))
50bc7936 6292 goto error_ret;
1e2f5b6e
AM
6293
6294 if (sym_sec == NULL || sym_sec->owner == NULL)
6295 {
411e1bfb
AM
6296 const char *sym_name;
6297 if (h != NULL)
6298 sym_name = h->root.root.string;
6299 else
26c61ae5
L
6300 sym_name = bfd_elf_sym_name (ibfd, symtab_hdr, sym,
6301 sym_sec);
411e1bfb 6302
1e2f5b6e 6303 (*_bfd_error_handler)
d003868e
AM
6304 (_("%B: undefined sym `%s' in .opd section"),
6305 ibfd, sym_name);
b34976b6 6306 need_edit = FALSE;
1e2f5b6e
AM
6307 break;
6308 }
6309
51020317
AM
6310 /* opd entries are always for functions defined in the
6311 current input bfd. If the symbol isn't defined in the
6312 input bfd, then we won't be using the function in this
6313 bfd; It must be defined in a linkonce section in another
6314 bfd, or is weak. It's also possible that we are
6315 discarding the function due to a linker script /DISCARD/,
6316 which we test for via the output_section. */
6317 if (sym_sec->owner != ibfd
6318 || sym_sec->output_section == bfd_abs_section_ptr)
b34976b6 6319 need_edit = TRUE;
1e2f5b6e 6320
50bc7936 6321 rel += 2;
3f764659
JJ
6322 if (rel == relend
6323 || (rel + 1 == relend && rel->r_offset == offset + 16))
6324 {
6325 if (sec->size == offset + 24)
6326 {
6327 need_pad = NULL;
6328 break;
6329 }
6330 if (rel == relend && sec->size == offset + 16)
6331 {
6332 cnt_16b++;
6333 break;
6334 }
6335 goto broken_opd;
6336 }
6337
6338 if (rel->r_offset == offset + 24)
6339 offset += 24;
6340 else if (rel->r_offset != offset + 16)
6341 goto broken_opd;
6342 else if (rel + 1 < relend
6343 && ELF64_R_TYPE (rel[0].r_info) == R_PPC64_ADDR64
6344 && ELF64_R_TYPE (rel[1].r_info) == R_PPC64_TOC)
6345 {
6346 offset += 16;
6347 cnt_16b++;
6348 }
6349 else if (rel + 2 < relend
6350 && ELF64_R_TYPE (rel[1].r_info) == R_PPC64_ADDR64
6351 && ELF64_R_TYPE (rel[2].r_info) == R_PPC64_TOC)
6352 {
6353 offset += 24;
6354 rel += 1;
6355 }
6356 else
6357 goto broken_opd;
1e2f5b6e
AM
6358 }
6359
3f764659
JJ
6360 add_aux_fields = non_overlapping && cnt_16b > 0;
6361
6362 if (need_edit || add_aux_fields)
1e2f5b6e
AM
6363 {
6364 Elf_Internal_Rela *write_rel;
6365 bfd_byte *rptr, *wptr;
3f764659 6366 bfd_byte *new_contents = NULL;
b34976b6 6367 bfd_boolean skip;
3f764659 6368 long opd_ent_size;
1e2f5b6e
AM
6369
6370 /* This seems a waste of time as input .opd sections are all
6371 zeros as generated by gcc, but I suppose there's no reason
6372 this will always be so. We might start putting something in
6373 the third word of .opd entries. */
6374 if ((sec->flags & SEC_IN_MEMORY) == 0)
6375 {
eea6121a
AM
6376 bfd_byte *loc;
6377 if (!bfd_malloc_and_get_section (ibfd, sec, &loc))
6cdc0ccc 6378 {
eea6121a
AM
6379 if (loc != NULL)
6380 free (loc);
50bc7936 6381 error_ret:
6cdc0ccc
AM
6382 if (local_syms != NULL
6383 && symtab_hdr->contents != (unsigned char *) local_syms)
6384 free (local_syms);
6cdc0ccc
AM
6385 if (elf_section_data (sec)->relocs != relstart)
6386 free (relstart);
b34976b6 6387 return FALSE;
6cdc0ccc 6388 }
1e2f5b6e
AM
6389 sec->contents = loc;
6390 sec->flags |= (SEC_IN_MEMORY | SEC_HAS_CONTENTS);
6391 }
6392
6393 elf_section_data (sec)->relocs = relstart;
6394
3f764659 6395 new_contents = sec->contents;
3f764659
JJ
6396 if (add_aux_fields)
6397 {
6398 new_contents = bfd_malloc (sec->size + cnt_16b * 8);
6399 if (new_contents == NULL)
6400 return FALSE;
6401 need_pad = FALSE;
3f764659 6402 }
b4f4e59f
AM
6403 wptr = new_contents;
6404 rptr = sec->contents;
3f764659 6405
1e2f5b6e 6406 write_rel = relstart;
b34976b6 6407 skip = FALSE;
1e2f5b6e 6408 offset = 0;
3f764659 6409 opd_ent_size = 0;
1e2f5b6e
AM
6410 for (rel = relstart; rel < relend; rel++)
6411 {
50bc7936
AM
6412 unsigned long r_symndx;
6413 asection *sym_sec;
6414 struct elf_link_hash_entry *h;
6415 Elf_Internal_Sym *sym;
6416
6417 r_symndx = ELF64_R_SYM (rel->r_info);
6418 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms,
d37c89e5 6419 r_symndx, ibfd))
50bc7936
AM
6420 goto error_ret;
6421
1e2f5b6e
AM
6422 if (rel->r_offset == offset)
6423 {
50bc7936 6424 struct ppc_link_hash_entry *fdh = NULL;
3f764659
JJ
6425
6426 /* See if the .opd entry is full 24 byte or
6427 16 byte (with fd_aux entry overlapped with next
6428 fd_func). */
6429 opd_ent_size = 24;
6430 if ((rel + 2 == relend && sec->size == offset + 16)
6431 || (rel + 3 < relend
6432 && rel[2].r_offset == offset + 16
6433 && rel[3].r_offset == offset + 24
6434 && ELF64_R_TYPE (rel[2].r_info) == R_PPC64_ADDR64
6435 && ELF64_R_TYPE (rel[3].r_info) == R_PPC64_TOC))
6436 opd_ent_size = 16;
6437
4025353c
AM
6438 if (h != NULL
6439 && h->root.root.string[0] == '.')
c4f68ce3
AM
6440 {
6441 fdh = get_fdh ((struct ppc_link_hash_entry *) h,
6442 ppc_hash_table (info));
6443 if (fdh != NULL
6444 && fdh->elf.root.type != bfd_link_hash_defined
6445 && fdh->elf.root.type != bfd_link_hash_defweak)
6446 fdh = NULL;
6447 }
1e2f5b6e 6448
51020317
AM
6449 skip = (sym_sec->owner != ibfd
6450 || sym_sec->output_section == bfd_abs_section_ptr);
a4aa0fb7
AM
6451 if (skip)
6452 {
4025353c 6453 if (fdh != NULL && sym_sec->owner == ibfd)
a4aa0fb7
AM
6454 {
6455 /* Arrange for the function descriptor sym
6456 to be dropped. */
d6fe2dc1
AM
6457 fdh->elf.root.u.def.value = 0;
6458 fdh->elf.root.u.def.section = sym_sec;
a4aa0fb7 6459 }
3f764659 6460 opd_adjust[rel->r_offset / 8] = -1;
a4aa0fb7
AM
6461 }
6462 else
1e2f5b6e
AM
6463 {
6464 /* We'll be keeping this opd entry. */
6465
4025353c 6466 if (fdh != NULL)
1e2f5b6e 6467 {
754021d0
AM
6468 /* Redefine the function descriptor symbol to
6469 this location in the opd section. It is
6470 necessary to update the value here rather
6471 than using an array of adjustments as we do
6472 for local symbols, because various places
6473 in the generic ELF code use the value
6474 stored in u.def.value. */
3f764659 6475 fdh->elf.root.u.def.value = wptr - new_contents;
754021d0 6476 fdh->adjust_done = 1;
1e2f5b6e 6477 }
754021d0
AM
6478
6479 /* Local syms are a bit tricky. We could
6480 tweak them as they can be cached, but
6481 we'd need to look through the local syms
6482 for the function descriptor sym which we
6483 don't have at the moment. So keep an
6484 array of adjustments. */
3f764659
JJ
6485 opd_adjust[rel->r_offset / 8]
6486 = (wptr - new_contents) - (rptr - sec->contents);
1e2f5b6e
AM
6487
6488 if (wptr != rptr)
3f764659
JJ
6489 memcpy (wptr, rptr, opd_ent_size);
6490 wptr += opd_ent_size;
6491 if (add_aux_fields && opd_ent_size == 16)
6492 {
6493 memset (wptr, '\0', 8);
6494 wptr += 8;
6495 }
1e2f5b6e 6496 }
3f764659
JJ
6497 rptr += opd_ent_size;
6498 offset += opd_ent_size;
1e2f5b6e
AM
6499 }
6500
50bc7936
AM
6501 if (skip)
6502 {
60124e18
AM
6503 if (!NO_OPD_RELOCS
6504 && !info->relocatable
18d944df
AM
6505 && !dec_dynrel_count (rel->r_info, sec, info,
6506 NULL, h, sym_sec))
8c1d1bb8 6507 goto error_ret;
50bc7936
AM
6508 }
6509 else
1e2f5b6e 6510 {
50bc7936
AM
6511 /* We need to adjust any reloc offsets to point to the
6512 new opd entries. While we're at it, we may as well
6513 remove redundant relocs. */
3f764659 6514 rel->r_offset += opd_adjust[(offset - opd_ent_size) / 8];
1e2f5b6e
AM
6515 if (write_rel != rel)
6516 memcpy (write_rel, rel, sizeof (*rel));
6517 ++write_rel;
6518 }
6519 }
6520
3f764659 6521 sec->size = wptr - new_contents;
1e2f5b6e 6522 sec->reloc_count = write_rel - relstart;
3f764659
JJ
6523 if (add_aux_fields)
6524 {
6525 free (sec->contents);
6526 sec->contents = new_contents;
6527 }
6528
cdcf6e38
AM
6529 /* Fudge the size too, as this is used later in
6530 elf_bfd_final_link if we are emitting relocs. */
6531 elf_section_data (sec)->rel_hdr.sh_size
6532 = sec->reloc_count * elf_section_data (sec)->rel_hdr.sh_entsize;
6533 BFD_ASSERT (elf_section_data (sec)->rel_hdr2 == NULL);
754021d0 6534 some_edited = TRUE;
1e2f5b6e 6535 }
6cdc0ccc 6536 else if (elf_section_data (sec)->relocs != relstart)
1e2f5b6e 6537 free (relstart);
6cdc0ccc 6538
411e1bfb
AM
6539 if (local_syms != NULL
6540 && symtab_hdr->contents != (unsigned char *) local_syms)
6541 {
6542 if (!info->keep_memory)
6543 free (local_syms);
6544 else
6545 symtab_hdr->contents = (unsigned char *) local_syms;
6546 }
6547 }
6548
754021d0
AM
6549 if (some_edited)
6550 elf_link_hash_traverse (elf_hash_table (info), adjust_opd_syms, NULL);
6551
3f764659
JJ
6552 /* If we are doing a final link and the last .opd entry is just 16 byte
6553 long, add a 8 byte padding after it. */
6554 if (need_pad != NULL && !info->relocatable)
6555 {
6556 bfd_byte *p;
6557
6558 if ((need_pad->flags & SEC_IN_MEMORY) == 0)
6559 {
6560 BFD_ASSERT (need_pad->size > 0);
6561
6562 p = bfd_malloc (need_pad->size + 8);
6563 if (p == NULL)
6564 return FALSE;
699733f6 6565
3f764659
JJ
6566 if (! bfd_get_section_contents (need_pad->owner, need_pad,
6567 p, 0, need_pad->size))
6568 return FALSE;
6569
6570 need_pad->contents = p;
6571 need_pad->flags |= (SEC_IN_MEMORY | SEC_HAS_CONTENTS);
6572 }
6573 else
6574 {
6575 p = bfd_realloc (need_pad->contents, need_pad->size + 8);
6576 if (p == NULL)
6577 return FALSE;
6578
6579 need_pad->contents = p;
6580 }
6581
6582 memset (need_pad->contents + need_pad->size, 0, 8);
6583 need_pad->size += 8;
6584 }
6585
411e1bfb
AM
6586 return TRUE;
6587}
6588
e1918d23 6589/* Set htab->tls_get_addr and call the generic ELF tls_setup function. */
411e1bfb 6590
e1918d23 6591asection *
4ce794b7 6592ppc64_elf_tls_setup (bfd *obfd, struct bfd_link_info *info)
411e1bfb 6593{
411e1bfb
AM
6594 struct ppc_link_hash_table *htab;
6595
411e1bfb 6596 htab = ppc_hash_table (info);
a48ebf4d
AM
6597 if (htab->tls_get_addr != NULL)
6598 {
8387904d 6599 struct ppc_link_hash_entry *h = htab->tls_get_addr;
a48ebf4d 6600
8387904d
AM
6601 while (h->elf.root.type == bfd_link_hash_indirect
6602 || h->elf.root.type == bfd_link_hash_warning)
6603 h = (struct ppc_link_hash_entry *) h->elf.root.u.i.link;
a48ebf4d
AM
6604
6605 htab->tls_get_addr = h;
8387904d
AM
6606
6607 if (htab->tls_get_addr_fd == NULL
6608 && h->oh != NULL
c4f68ce3
AM
6609 && h->oh->is_func_descriptor
6610 && (h->oh->elf.root.type == bfd_link_hash_defined
6611 || h->oh->elf.root.type == bfd_link_hash_defweak))
8387904d
AM
6612 htab->tls_get_addr_fd = h->oh;
6613 }
6614
6615 if (htab->tls_get_addr_fd != NULL)
6616 {
6617 struct ppc_link_hash_entry *h = htab->tls_get_addr_fd;
6618
6619 while (h->elf.root.type == bfd_link_hash_indirect
6620 || h->elf.root.type == bfd_link_hash_warning)
6621 h = (struct ppc_link_hash_entry *) h->elf.root.u.i.link;
6622
6623 htab->tls_get_addr_fd = h;
a48ebf4d
AM
6624 }
6625
e1918d23 6626 return _bfd_elf_tls_setup (obfd, info);
951fd09b 6627}
411e1bfb 6628
951fd09b
AM
6629/* Run through all the TLS relocs looking for optimization
6630 opportunities. The linker has been hacked (see ppc64elf.em) to do
6631 a preliminary section layout so that we know the TLS segment
6632 offsets. We can't optimize earlier because some optimizations need
6633 to know the tp offset, and we need to optimize before allocating
6634 dynamic relocations. */
6635
6636bfd_boolean
4ce794b7 6637ppc64_elf_tls_optimize (bfd *obfd ATTRIBUTE_UNUSED, struct bfd_link_info *info)
951fd09b
AM
6638{
6639 bfd *ibfd;
6640 asection *sec;
6641 struct ppc_link_hash_table *htab;
6642
1049f94e 6643 if (info->relocatable || info->shared)
411e1bfb
AM
6644 return TRUE;
6645
951fd09b 6646 htab = ppc_hash_table (info);
411e1bfb
AM
6647 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link_next)
6648 {
6649 Elf_Internal_Sym *locsyms = NULL;
6650
6651 for (sec = ibfd->sections; sec != NULL; sec = sec->next)
6652 if (sec->has_tls_reloc && !bfd_is_abs_section (sec->output_section))
6653 {
6654 Elf_Internal_Rela *relstart, *rel, *relend;
6655 int expecting_tls_get_addr;
6656
6657 /* Read the relocations. */
4ce794b7 6658 relstart = _bfd_elf_link_read_relocs (ibfd, sec, NULL, NULL,
45d6a902 6659 info->keep_memory);
411e1bfb
AM
6660 if (relstart == NULL)
6661 return FALSE;
6662
6663 expecting_tls_get_addr = 0;
6664 relend = relstart + sec->reloc_count;
6665 for (rel = relstart; rel < relend; rel++)
6666 {
6667 enum elf_ppc64_reloc_type r_type;
6668 unsigned long r_symndx;
6669 struct elf_link_hash_entry *h;
6670 Elf_Internal_Sym *sym;
6671 asection *sym_sec;
e7b938ca
AM
6672 char *tls_mask;
6673 char tls_set, tls_clear, tls_type = 0;
411e1bfb 6674 bfd_vma value;
951fd09b 6675 bfd_boolean ok_tprel, is_local;
411e1bfb
AM
6676
6677 r_symndx = ELF64_R_SYM (rel->r_info);
e7b938ca 6678 if (!get_sym_h (&h, &sym, &sym_sec, &tls_mask, &locsyms,
411e1bfb
AM
6679 r_symndx, ibfd))
6680 {
6681 err_free_rel:
6682 if (elf_section_data (sec)->relocs != relstart)
6683 free (relstart);
6684 if (locsyms != NULL
6685 && (elf_tdata (ibfd)->symtab_hdr.contents
6686 != (unsigned char *) locsyms))
6687 free (locsyms);
6688 return FALSE;
6689 }
6690
6691 if (h != NULL)
6692 {
6693 if (h->root.type != bfd_link_hash_defined
6694 && h->root.type != bfd_link_hash_defweak)
6695 continue;
6696 value = h->root.u.def.value;
6697 }
6698 else
4025353c
AM
6699 /* Symbols referenced by TLS relocs must be of type
6700 STT_TLS. So no need for .opd local sym adjust. */
6701 value = sym->st_value;
951fd09b 6702
411e1bfb 6703 ok_tprel = FALSE;
951fd09b
AM
6704 is_local = FALSE;
6705 if (h == NULL
f5385ebf 6706 || !h->def_dynamic)
411e1bfb 6707 {
951fd09b 6708 is_local = TRUE;
411e1bfb
AM
6709 value += sym_sec->output_offset;
6710 value += sym_sec->output_section->vma;
e1918d23 6711 value -= htab->elf.tls_sec->vma;
411e1bfb
AM
6712 ok_tprel = (value + TP_OFFSET + ((bfd_vma) 1 << 31)
6713 < (bfd_vma) 1 << 32);
6714 }
6715
4ce794b7 6716 r_type = ELF64_R_TYPE (rel->r_info);
411e1bfb
AM
6717 switch (r_type)
6718 {
6719 case R_PPC64_GOT_TLSLD16:
6720 case R_PPC64_GOT_TLSLD16_LO:
6721 case R_PPC64_GOT_TLSLD16_HI:
6722 case R_PPC64_GOT_TLSLD16_HA:
951fd09b
AM
6723 /* These relocs should never be against a symbol
6724 defined in a shared lib. Leave them alone if
6725 that turns out to be the case. */
e717da7e 6726 ppc64_tlsld_got (ibfd)->refcount -= 1;
951fd09b
AM
6727 if (!is_local)
6728 continue;
6729
951fd09b
AM
6730 /* LD -> LE */
6731 tls_set = 0;
6732 tls_clear = TLS_LD;
e7b938ca 6733 tls_type = TLS_TLS | TLS_LD;
411e1bfb
AM
6734 expecting_tls_get_addr = 1;
6735 break;
6736
6737 case R_PPC64_GOT_TLSGD16:
6738 case R_PPC64_GOT_TLSGD16_LO:
6739 case R_PPC64_GOT_TLSGD16_HI:
6740 case R_PPC64_GOT_TLSGD16_HA:
951fd09b 6741 if (ok_tprel)
411e1bfb
AM
6742 /* GD -> LE */
6743 tls_set = 0;
6744 else
6745 /* GD -> IE */
951fd09b
AM
6746 tls_set = TLS_TLS | TLS_TPRELGD;
6747 tls_clear = TLS_GD;
e7b938ca 6748 tls_type = TLS_TLS | TLS_GD;
411e1bfb
AM
6749 expecting_tls_get_addr = 1;
6750 break;
6751
6752 case R_PPC64_GOT_TPREL16_DS:
6753 case R_PPC64_GOT_TPREL16_LO_DS:
6754 case R_PPC64_GOT_TPREL16_HI:
6755 case R_PPC64_GOT_TPREL16_HA:
6756 expecting_tls_get_addr = 0;
6757 if (ok_tprel)
6758 {
6759 /* IE -> LE */
6760 tls_set = 0;
6761 tls_clear = TLS_TPREL;
e7b938ca 6762 tls_type = TLS_TLS | TLS_TPREL;
411e1bfb
AM
6763 break;
6764 }
6765 else
6766 continue;
6767
6768 case R_PPC64_REL14:
6769 case R_PPC64_REL14_BRTAKEN:
6770 case R_PPC64_REL14_BRNTAKEN:
6771 case R_PPC64_REL24:
6772 if (h != NULL
8387904d
AM
6773 && (h == &htab->tls_get_addr->elf
6774 || h == &htab->tls_get_addr_fd->elf))
411e1bfb
AM
6775 {
6776 if (!expecting_tls_get_addr
6777 && rel != relstart
6778 && ((ELF64_R_TYPE (rel[-1].r_info)
6779 == R_PPC64_TOC16)
6780 || (ELF64_R_TYPE (rel[-1].r_info)
6781 == R_PPC64_TOC16_LO)))
6782 {
6783 /* Check for toc tls entries. */
6784 char *toc_tls;
951fd09b 6785 int retval;
411e1bfb 6786
0d4792f7 6787 retval = get_tls_mask (&toc_tls, NULL, &locsyms,
951fd09b
AM
6788 rel - 1, ibfd);
6789 if (retval == 0)
411e1bfb
AM
6790 goto err_free_rel;
6791 if (toc_tls != NULL)
951fd09b 6792 expecting_tls_get_addr = retval > 1;
411e1bfb
AM
6793 }
6794
6795 if (expecting_tls_get_addr)
6796 {
6797 struct plt_entry *ent;
6798 for (ent = h->plt.plist; ent; ent = ent->next)
6799 if (ent->addend == 0)
6800 {
6801 if (ent->plt.refcount > 0)
6802 ent->plt.refcount -= 1;
6803 break;
6804 }
6805 }
6806 }
6807 expecting_tls_get_addr = 0;
6808 continue;
6809
6810 case R_PPC64_TPREL64:
6811 expecting_tls_get_addr = 0;
6812 if (ok_tprel)
6813 {
6814 /* IE -> LE */
6815 tls_set = TLS_EXPLICIT;
6816 tls_clear = TLS_TPREL;
6817 break;
6818 }
6819 else
6820 continue;
6821
6822 case R_PPC64_DTPMOD64:
6823 expecting_tls_get_addr = 0;
951fd09b
AM
6824 if (rel + 1 < relend
6825 && (rel[1].r_info
6826 == ELF64_R_INFO (r_symndx, R_PPC64_DTPREL64))
6827 && rel[1].r_offset == rel->r_offset + 8)
411e1bfb 6828 {
951fd09b 6829 if (ok_tprel)
411e1bfb 6830 /* GD -> LE */
951fd09b 6831 tls_set = TLS_EXPLICIT | TLS_GD;
411e1bfb
AM
6832 else
6833 /* GD -> IE */
951fd09b
AM
6834 tls_set = TLS_EXPLICIT | TLS_GD | TLS_TPRELGD;
6835 tls_clear = TLS_GD;
411e1bfb
AM
6836 }
6837 else
6838 {
951fd09b
AM
6839 if (!is_local)
6840 continue;
6841
6842 /* LD -> LE */
6843 tls_set = TLS_EXPLICIT;
6844 tls_clear = TLS_LD;
411e1bfb
AM
6845 }
6846 break;
6847
6848 default:
6849 expecting_tls_get_addr = 0;
6850 continue;
6851 }
6852
6853 if ((tls_set & TLS_EXPLICIT) == 0)
6854 {
6855 struct got_entry *ent;
6856
6857 /* Adjust got entry for this reloc. */
6858 if (h != NULL)
6859 ent = h->got.glist;
6860 else
6861 ent = elf_local_got_ents (ibfd)[r_symndx];
6862
6863 for (; ent != NULL; ent = ent->next)
6864 if (ent->addend == rel->r_addend
e717da7e 6865 && ent->owner == ibfd
e7b938ca 6866 && ent->tls_type == tls_type)
411e1bfb
AM
6867 break;
6868 if (ent == NULL)
6869 abort ();
6870
6871 if (tls_set == 0)
6872 {
6873 /* We managed to get rid of a got entry. */
6874 if (ent->got.refcount > 0)
6875 ent->got.refcount -= 1;
6876 }
411e1bfb 6877 }
8c1d1bb8 6878 else
411e1bfb 6879 {
8c1d1bb8
AM
6880 /* If we got rid of a DTPMOD/DTPREL reloc pair then
6881 we'll lose one or two dyn relocs. */
6882 if (!dec_dynrel_count (rel->r_info, sec, info,
6883 NULL, h, sym_sec))
6884 return FALSE;
6885
6886 if (tls_set == (TLS_EXPLICIT | TLS_GD))
6887 {
6888 if (!dec_dynrel_count ((rel + 1)->r_info, sec, info,
6889 NULL, h, sym_sec))
6890 return FALSE;
6891 }
411e1bfb
AM
6892 }
6893
e7b938ca
AM
6894 *tls_mask |= tls_set;
6895 *tls_mask &= ~tls_clear;
411e1bfb
AM
6896 }
6897
6898 if (elf_section_data (sec)->relocs != relstart)
6899 free (relstart);
6900 }
6901
6902 if (locsyms != NULL
6903 && (elf_tdata (ibfd)->symtab_hdr.contents
6904 != (unsigned char *) locsyms))
6cdc0ccc
AM
6905 {
6906 if (!info->keep_memory)
411e1bfb 6907 free (locsyms);
6cdc0ccc 6908 else
411e1bfb 6909 elf_tdata (ibfd)->symtab_hdr.contents = (unsigned char *) locsyms;
6cdc0ccc 6910 }
1e2f5b6e 6911 }
b34976b6 6912 return TRUE;
1e2f5b6e 6913}
b34976b6 6914
c5614fa4
AM
6915/* Called via elf_link_hash_traverse from ppc64_elf_edit_toc to adjust
6916 the values of any global symbols in a toc section that has been
6917 edited. Globals in toc sections should be a rarity, so this function
6918 sets a flag if any are found in toc sections other than the one just
6919 edited, so that futher hash table traversals can be avoided. */
6920
6921struct adjust_toc_info
6922{
6923 asection *toc;
6924 unsigned long *skip;
6925 bfd_boolean global_toc_syms;
6926};
6927
6928static bfd_boolean
6929adjust_toc_syms (struct elf_link_hash_entry *h, void *inf)
6930{
6931 struct ppc_link_hash_entry *eh;
6932 struct adjust_toc_info *toc_inf = (struct adjust_toc_info *) inf;
6933
6934 if (h->root.type == bfd_link_hash_indirect)
6935 return TRUE;
6936
6937 if (h->root.type == bfd_link_hash_warning)
6938 h = (struct elf_link_hash_entry *) h->root.u.i.link;
6939
6940 if (h->root.type != bfd_link_hash_defined
6941 && h->root.type != bfd_link_hash_defweak)
6942 return TRUE;
6943
6944 eh = (struct ppc_link_hash_entry *) h;
6945 if (eh->adjust_done)
6946 return TRUE;
6947
6948 if (eh->elf.root.u.def.section == toc_inf->toc)
6949 {
6950 unsigned long skip = toc_inf->skip[eh->elf.root.u.def.value >> 3];
6951 if (skip != (unsigned long) -1)
6952 eh->elf.root.u.def.value -= skip;
6953 else
6954 {
6955 (*_bfd_error_handler)
6956 (_("%s defined in removed toc entry"), eh->elf.root.root.string);
6957 eh->elf.root.u.def.section = &bfd_abs_section;
6958 eh->elf.root.u.def.value = 0;
6959 }
6960 eh->adjust_done = 1;
6961 }
6962 else if (strcmp (eh->elf.root.u.def.section->name, ".toc") == 0)
6963 toc_inf->global_toc_syms = TRUE;
6964
6965 return TRUE;
6966}
6967
6968/* Examine all relocs referencing .toc sections in order to remove
6969 unused .toc entries. */
6970
6971bfd_boolean
6972ppc64_elf_edit_toc (bfd *obfd ATTRIBUTE_UNUSED, struct bfd_link_info *info)
6973{
6974 bfd *ibfd;
6975 struct adjust_toc_info toc_inf;
6976
6977 toc_inf.global_toc_syms = TRUE;
6978 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link_next)
6979 {
6980 asection *toc, *sec;
6981 Elf_Internal_Shdr *symtab_hdr;
6982 Elf_Internal_Sym *local_syms;
6983 struct elf_link_hash_entry **sym_hashes;
92b7a70f 6984 Elf_Internal_Rela *relstart, *rel;
c5614fa4
AM
6985 unsigned long *skip, *drop;
6986 unsigned char *used;
6987 unsigned char *keep, last, some_unused;
6988
6989 toc = bfd_get_section_by_name (ibfd, ".toc");
6990 if (toc == NULL
92b7a70f 6991 || toc->size == 0
c5614fa4
AM
6992 || toc->sec_info_type == ELF_INFO_TYPE_JUST_SYMS
6993 || elf_discarded_section (toc))
6994 continue;
6995
6996 local_syms = NULL;
6997 symtab_hdr = &elf_tdata (ibfd)->symtab_hdr;
6998 sym_hashes = elf_sym_hashes (ibfd);
6999
7000 /* Look at sections dropped from the final link. */
7001 skip = NULL;
7002 relstart = NULL;
7003 for (sec = ibfd->sections; sec != NULL; sec = sec->next)
7004 {
7005 if (sec->reloc_count == 0
7006 || !elf_discarded_section (sec)
7007 || get_opd_info (sec)
7008 || (sec->flags & SEC_ALLOC) == 0
7009 || (sec->flags & SEC_DEBUGGING) != 0)
7010 continue;
7011
7012 relstart = _bfd_elf_link_read_relocs (ibfd, sec, NULL, NULL, FALSE);
7013 if (relstart == NULL)
7014 goto error_ret;
7015
7016 /* Run through the relocs to see which toc entries might be
7017 unused. */
7018 for (rel = relstart; rel < relstart + sec->reloc_count; ++rel)
7019 {
7020 enum elf_ppc64_reloc_type r_type;
7021 unsigned long r_symndx;
7022 asection *sym_sec;
7023 struct elf_link_hash_entry *h;
7024 Elf_Internal_Sym *sym;
7025 bfd_vma val;
7026
7027 r_type = ELF64_R_TYPE (rel->r_info);
7028 switch (r_type)
7029 {
7030 default:
7031 continue;
7032
7033 case R_PPC64_TOC16:
7034 case R_PPC64_TOC16_LO:
7035 case R_PPC64_TOC16_HI:
7036 case R_PPC64_TOC16_HA:
7037 case R_PPC64_TOC16_DS:
7038 case R_PPC64_TOC16_LO_DS:
7039 break;
7040 }
7041
7042 r_symndx = ELF64_R_SYM (rel->r_info);
7043 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms,
7044 r_symndx, ibfd))
7045 goto error_ret;
7046
7047 if (sym_sec != toc)
7048 continue;
7049
7050 if (h != NULL)
7051 val = h->root.u.def.value;
7052 else
7053 val = sym->st_value;
7054 val += rel->r_addend;
7055
7056 if (val >= toc->size)
7057 continue;
7058
7059 /* Anything in the toc ought to be aligned to 8 bytes.
7060 If not, don't mark as unused. */
7061 if (val & 7)
7062 continue;
7063
7064 if (skip == NULL)
7065 {
7066 skip = bfd_zmalloc (sizeof (*skip) * (toc->size + 7) / 8);
7067 if (skip == NULL)
7068 goto error_ret;
7069 }
7070
7071 skip[val >> 3] = 1;
7072 }
7073
7074 if (elf_section_data (sec)->relocs != relstart)
7075 free (relstart);
7076 }
7077
7078 if (skip == NULL)
7079 continue;
7080
7081 used = bfd_zmalloc (sizeof (*used) * (toc->size + 7) / 8);
7082 if (used == NULL)
7083 {
7084 error_ret:
7085 if (local_syms != NULL
7086 && symtab_hdr->contents != (unsigned char *) local_syms)
7087 free (local_syms);
7088 if (sec != NULL
7089 && relstart != NULL
7090 && elf_section_data (sec)->relocs != relstart)
7091 free (relstart);
7092 if (skip != NULL)
7093 free (skip);
7094 return FALSE;
7095 }
7096
7097 /* Now check all kept sections that might reference the toc. */
7098 for (sec = ibfd->sections;
7099 sec != NULL;
7100 /* Check the toc itself last. */
7101 sec = (sec == toc ? NULL
7102 : sec->next == toc && sec->next->next ? sec->next->next
7103 : sec->next == NULL ? toc
7104 : sec->next))
7105 {
7106 int repeat;
7107
7108 if (sec->reloc_count == 0
7109 || elf_discarded_section (sec)
7110 || get_opd_info (sec)
7111 || (sec->flags & SEC_ALLOC) == 0
7112 || (sec->flags & SEC_DEBUGGING) != 0)
7113 continue;
7114
7115 relstart = _bfd_elf_link_read_relocs (ibfd, sec, NULL, NULL, TRUE);
7116 if (relstart == NULL)
7117 goto error_ret;
7118
7119 /* Mark toc entries referenced as used. */
7120 repeat = 0;
7121 do
7122 for (rel = relstart; rel < relstart + sec->reloc_count; ++rel)
7123 {
7124 enum elf_ppc64_reloc_type r_type;
7125 unsigned long r_symndx;
7126 asection *sym_sec;
7127 struct elf_link_hash_entry *h;
7128 Elf_Internal_Sym *sym;
7129 bfd_vma val;
7130
7131 r_type = ELF64_R_TYPE (rel->r_info);
7132 switch (r_type)
7133 {
7134 case R_PPC64_TOC16:
7135 case R_PPC64_TOC16_LO:
7136 case R_PPC64_TOC16_HI:
7137 case R_PPC64_TOC16_HA:
7138 case R_PPC64_TOC16_DS:
7139 case R_PPC64_TOC16_LO_DS:
7140 /* In case we're taking addresses of toc entries. */
7141 case R_PPC64_ADDR64:
7142 break;
7143
7144 default:
7145 continue;
7146 }
7147
7148 r_symndx = ELF64_R_SYM (rel->r_info);
7149 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms,
7150 r_symndx, ibfd))
7151 {
7152 free (used);
7153 goto error_ret;
7154 }
7155
7156 if (sym_sec != toc)
7157 continue;
7158
7159 if (h != NULL)
7160 val = h->root.u.def.value;
7161 else
7162 val = sym->st_value;
7163 val += rel->r_addend;
7164
7165 if (val >= toc->size)
7166 continue;
7167
7168 /* For the toc section, we only mark as used if
7169 this entry itself isn't unused. */
7170 if (sec == toc
7171 && !used[val >> 3]
7172 && (used[rel->r_offset >> 3]
7173 || !skip[rel->r_offset >> 3]))
7174 /* Do all the relocs again, to catch reference
7175 chains. */
7176 repeat = 1;
7177
7178 used[val >> 3] = 1;
7179 }
7180 while (repeat);
7181 }
7182
7183 /* Merge the used and skip arrays. Assume that TOC
7184 doublewords not appearing as either used or unused belong
7185 to to an entry more than one doubleword in size. */
7186 for (drop = skip, keep = used, last = 0, some_unused = 0;
7187 drop < skip + (toc->size + 7) / 8;
7188 ++drop, ++keep)
7189 {
7190 if (*keep)
7191 {
7192 *drop = 0;
7193 last = 0;
7194 }
7195 else if (*drop)
7196 {
7197 some_unused = 1;
7198 last = 1;
7199 }
7200 else
7201 *drop = last;
7202 }
7203
7204 free (used);
7205
7206 if (some_unused)
7207 {
7208 bfd_byte *contents, *src;
7209 unsigned long off;
7210
7211 /* Shuffle the toc contents, and at the same time convert the
7212 skip array from booleans into offsets. */
7213 if (!bfd_malloc_and_get_section (ibfd, toc, &contents))
7214 goto error_ret;
7215
7216 elf_section_data (toc)->this_hdr.contents = contents;
7217
7218 for (src = contents, off = 0, drop = skip;
7219 src < contents + toc->size;
7220 src += 8, ++drop)
7221 {
7222 if (*drop)
7223 {
7224 *drop = (unsigned long) -1;
7225 off += 8;
7226 }
7227 else if (off != 0)
7228 {
7229 *drop = off;
7230 memcpy (src - off, src, 8);
7231 }
7232 }
7233 toc->rawsize = toc->size;
7234 toc->size = src - contents - off;
7235
92b7a70f
AM
7236 if (toc->reloc_count != 0)
7237 {
7238 Elf_Internal_Rela *wrel;
7239 bfd_size_type sz;
c5614fa4 7240
92b7a70f
AM
7241 /* Read toc relocs. */
7242 relstart = _bfd_elf_link_read_relocs (ibfd, toc, NULL, NULL,
7243 TRUE);
7244 if (relstart == NULL)
7245 goto error_ret;
7246
7247 /* Remove unused toc relocs, and adjust those we keep. */
7248 wrel = relstart;
7249 for (rel = relstart; rel < relstart + toc->reloc_count; ++rel)
7250 if (skip[rel->r_offset >> 3] != (unsigned long) -1)
7251 {
7252 wrel->r_offset = rel->r_offset - skip[rel->r_offset >> 3];
7253 wrel->r_info = rel->r_info;
7254 wrel->r_addend = rel->r_addend;
7255 ++wrel;
7256 }
8c1d1bb8
AM
7257 else if (!dec_dynrel_count (rel->r_info, toc, info,
7258 &local_syms, NULL, NULL))
7259 goto error_ret;
35090471 7260
92b7a70f
AM
7261 toc->reloc_count = wrel - relstart;
7262 sz = elf_section_data (toc)->rel_hdr.sh_entsize;
7263 elf_section_data (toc)->rel_hdr.sh_size = toc->reloc_count * sz;
7264 BFD_ASSERT (elf_section_data (toc)->rel_hdr2 == NULL);
7265 }
c5614fa4
AM
7266
7267 /* Adjust addends for relocs against the toc section sym. */
7268 for (sec = ibfd->sections; sec != NULL; sec = sec->next)
7269 {
7270 if (sec->reloc_count == 0
7271 || elf_discarded_section (sec))
7272 continue;
7273
7274 relstart = _bfd_elf_link_read_relocs (ibfd, sec, NULL, NULL,
7275 TRUE);
7276 if (relstart == NULL)
7277 goto error_ret;
7278
7279 for (rel = relstart; rel < relstart + sec->reloc_count; ++rel)
7280 {
7281 enum elf_ppc64_reloc_type r_type;
7282 unsigned long r_symndx;
7283 asection *sym_sec;
7284 struct elf_link_hash_entry *h;
7285 Elf_Internal_Sym *sym;
7286
7287 r_type = ELF64_R_TYPE (rel->r_info);
7288 switch (r_type)
7289 {
7290 default:
7291 continue;
7292
7293 case R_PPC64_TOC16:
7294 case R_PPC64_TOC16_LO:
7295 case R_PPC64_TOC16_HI:
7296 case R_PPC64_TOC16_HA:
7297 case R_PPC64_TOC16_DS:
7298 case R_PPC64_TOC16_LO_DS:
7299 case R_PPC64_ADDR64:
7300 break;
7301 }
7302
7303 r_symndx = ELF64_R_SYM (rel->r_info);
7304 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms,
7305 r_symndx, ibfd))
7306 goto error_ret;
7307
7308 if (sym_sec != toc || h != NULL || sym->st_value != 0)
7309 continue;
7310
7311 rel->r_addend -= skip[rel->r_addend >> 3];
7312 }
7313 }
7314
7315 /* We shouldn't have local or global symbols defined in the TOC,
7316 but handle them anyway. */
7317 if (local_syms != NULL)
7318 {
7319 Elf_Internal_Sym *sym;
7320
7321 for (sym = local_syms;
7322 sym < local_syms + symtab_hdr->sh_info;
7323 ++sym)
7324 if (sym->st_shndx != SHN_UNDEF
7325 && (sym->st_shndx < SHN_LORESERVE
7326 || sym->st_shndx > SHN_HIRESERVE)
7327 && sym->st_value != 0
7328 && bfd_section_from_elf_index (ibfd, sym->st_shndx) == toc)
7329 {
7330 if (skip[sym->st_value >> 3] != (unsigned long) -1)
7331 sym->st_value -= skip[sym->st_value >> 3];
7332 else
7333 {
7334 (*_bfd_error_handler)
7335 (_("%s defined in removed toc entry"),
26c61ae5
L
7336 bfd_elf_sym_name (ibfd, symtab_hdr, sym,
7337 NULL));
c5614fa4
AM
7338 sym->st_value = 0;
7339 sym->st_shndx = SHN_ABS;
7340 }
7341 symtab_hdr->contents = (unsigned char *) local_syms;
7342 }
7343 }
7344
7345 /* Finally, adjust any global syms defined in the toc. */
7346 if (toc_inf.global_toc_syms)
7347 {
7348 toc_inf.toc = toc;
7349 toc_inf.skip = skip;
7350 toc_inf.global_toc_syms = FALSE;
7351 elf_link_hash_traverse (elf_hash_table (info), adjust_toc_syms,
7352 &toc_inf);
7353 }
7354 }
7355
7356 if (local_syms != NULL
7357 && symtab_hdr->contents != (unsigned char *) local_syms)
7358 {
7359 if (!info->keep_memory)
7360 free (local_syms);
7361 else
7362 symtab_hdr->contents = (unsigned char *) local_syms;
7363 }
7364 free (skip);
7365 }
7366
7367 return TRUE;
7368}
7369
65f38f15
AM
7370/* Allocate space in .plt, .got and associated reloc sections for
7371 dynamic relocs. */
5bd4f169 7372
b34976b6 7373static bfd_boolean
4ce794b7 7374allocate_dynrelocs (struct elf_link_hash_entry *h, void *inf)
5bd4f169 7375{
65f38f15
AM
7376 struct bfd_link_info *info;
7377 struct ppc_link_hash_table *htab;
5bd4f169 7378 asection *s;
65f38f15
AM
7379 struct ppc_link_hash_entry *eh;
7380 struct ppc_dyn_relocs *p;
411e1bfb 7381 struct got_entry *gent;
5bd4f169 7382
e92d460e 7383 if (h->root.type == bfd_link_hash_indirect)
b34976b6 7384 return TRUE;
5bd4f169 7385
e92d460e
AM
7386 if (h->root.type == bfd_link_hash_warning)
7387 h = (struct elf_link_hash_entry *) h->root.u.i.link;
7388
65f38f15
AM
7389 info = (struct bfd_link_info *) inf;
7390 htab = ppc_hash_table (info);
5bd4f169 7391
65f38f15 7392 if (htab->elf.dynamic_sections_created
411e1bfb 7393 && h->dynindx != -1
9c7a29a3 7394 && WILL_CALL_FINISH_DYNAMIC_SYMBOL (1, info->shared, h))
5bd4f169 7395 {
411e1bfb
AM
7396 struct plt_entry *pent;
7397 bfd_boolean doneone = FALSE;
7398 for (pent = h->plt.plist; pent != NULL; pent = pent->next)
7399 if (pent->plt.refcount > 0)
7400 {
411e1bfb
AM
7401 /* If this is the first .plt entry, make room for the special
7402 first entry. */
4ce794b7 7403 s = htab->plt;
eea6121a
AM
7404 if (s->size == 0)
7405 s->size += PLT_INITIAL_ENTRY_SIZE;
411e1bfb 7406
eea6121a 7407 pent->plt.offset = s->size;
411e1bfb
AM
7408
7409 /* Make room for this entry. */
eea6121a 7410 s->size += PLT_ENTRY_SIZE;
411e1bfb
AM
7411
7412 /* Make room for the .glink code. */
4ce794b7 7413 s = htab->glink;
eea6121a
AM
7414 if (s->size == 0)
7415 s->size += GLINK_CALL_STUB_SIZE;
411e1bfb 7416 /* We need bigger stubs past index 32767. */
eea6121a
AM
7417 if (s->size >= GLINK_CALL_STUB_SIZE + 32768*2*4)
7418 s->size += 4;
7419 s->size += 2*4;
411e1bfb
AM
7420
7421 /* We also need to make an entry in the .rela.plt section. */
4ce794b7 7422 s = htab->relplt;
eea6121a 7423 s->size += sizeof (Elf64_External_Rela);
411e1bfb
AM
7424 doneone = TRUE;
7425 }
7426 else
7427 pent->plt.offset = (bfd_vma) -1;
7428 if (!doneone)
65f38f15 7429 {
411e1bfb 7430 h->plt.plist = NULL;
f5385ebf 7431 h->needs_plt = 0;
65f38f15
AM
7432 }
7433 }
7434 else
7435 {
411e1bfb 7436 h->plt.plist = NULL;
f5385ebf 7437 h->needs_plt = 0;
65f38f15
AM
7438 }
7439
951fd09b
AM
7440 eh = (struct ppc_link_hash_entry *) h;
7441 /* Run through the TLS GD got entries first if we're changing them
7442 to TPREL. */
e7b938ca 7443 if ((eh->tls_mask & TLS_TPRELGD) != 0)
951fd09b
AM
7444 for (gent = h->got.glist; gent != NULL; gent = gent->next)
7445 if (gent->got.refcount > 0
7446 && (gent->tls_type & TLS_GD) != 0)
7447 {
7448 /* This was a GD entry that has been converted to TPREL. If
7449 there happens to be a TPREL entry we can use that one. */
7450 struct got_entry *ent;
7451 for (ent = h->got.glist; ent != NULL; ent = ent->next)
7452 if (ent->got.refcount > 0
7453 && (ent->tls_type & TLS_TPREL) != 0
e717da7e
AM
7454 && ent->addend == gent->addend
7455 && ent->owner == gent->owner)
951fd09b
AM
7456 {
7457 gent->got.refcount = 0;
7458 break;
7459 }
7460
7461 /* If not, then we'll be using our own TPREL entry. */
7462 if (gent->got.refcount != 0)
7463 gent->tls_type = TLS_TLS | TLS_TPREL;
7464 }
7465
411e1bfb
AM
7466 for (gent = h->got.glist; gent != NULL; gent = gent->next)
7467 if (gent->got.refcount > 0)
7468 {
951fd09b
AM
7469 bfd_boolean dyn;
7470
411e1bfb 7471 /* Make sure this symbol is output as a dynamic symbol.
951fd09b
AM
7472 Undefined weak syms won't yet be marked as dynamic,
7473 nor will all TLS symbols. */
411e1bfb 7474 if (h->dynindx == -1
f5385ebf 7475 && !h->forced_local)
411e1bfb 7476 {
c152c796 7477 if (! bfd_elf_link_record_dynamic_symbol (info, h))
411e1bfb
AM
7478 return FALSE;
7479 }
65f38f15 7480
d881513a 7481 if ((gent->tls_type & TLS_LD) != 0
f5385ebf 7482 && !h->def_dynamic)
411e1bfb 7483 {
e717da7e 7484 gent->got.offset = ppc64_tlsld_got (gent->owner)->offset;
951fd09b 7485 continue;
411e1bfb 7486 }
951fd09b 7487
e717da7e 7488 s = ppc64_elf_tdata (gent->owner)->got;
eea6121a
AM
7489 gent->got.offset = s->size;
7490 s->size
d881513a 7491 += (gent->tls_type & eh->tls_mask & (TLS_GD | TLS_LD)) ? 16 : 8;
951fd09b 7492 dyn = htab->elf.dynamic_sections_created;
4e795f50
AM
7493 if ((info->shared
7494 || WILL_CALL_FINISH_DYNAMIC_SYMBOL (dyn, 0, h))
7495 && (ELF_ST_VISIBILITY (h->other) == STV_DEFAULT
7496 || h->root.type != bfd_link_hash_undefweak))
eea6121a 7497 ppc64_elf_tdata (gent->owner)->relgot->size
e7b938ca 7498 += (gent->tls_type & eh->tls_mask & TLS_GD
951fd09b
AM
7499 ? 2 * sizeof (Elf64_External_Rela)
7500 : sizeof (Elf64_External_Rela));
411e1bfb
AM
7501 }
7502 else
7503 gent->got.offset = (bfd_vma) -1;
65f38f15 7504
65f38f15 7505 if (eh->dyn_relocs == NULL)
b34976b6 7506 return TRUE;
65f38f15
AM
7507
7508 /* In the shared -Bsymbolic case, discard space allocated for
7509 dynamic pc-relative relocs against symbols which turn out to be
7510 defined in regular objects. For the normal shared case, discard
7511 space for relocs that have become local due to symbol visibility
7512 changes. */
7513
7514 if (info->shared)
7515 {
9c7a29a3
AM
7516 /* Relocs that use pc_count are those that appear on a call insn,
7517 or certain REL relocs (see MUST_BE_DYN_RELOC) that can be
7518 generated via assembly. We want calls to protected symbols to
7519 resolve directly to the function rather than going via the plt.
7520 If people want function pointer comparisons to work as expected
7521 then they should avoid writing weird assembly. */
09695f56 7522 if (SYMBOL_CALLS_LOCAL (info, h))
65f38f15
AM
7523 {
7524 struct ppc_dyn_relocs **pp;
7525
7526 for (pp = &eh->dyn_relocs; (p = *pp) != NULL; )
5bd4f169 7527 {
65f38f15
AM
7528 p->count -= p->pc_count;
7529 p->pc_count = 0;
7530 if (p->count == 0)
7531 *pp = p->next;
7532 else
7533 pp = &p->next;
5bd4f169 7534 }
65f38f15 7535 }
4e795f50
AM
7536
7537 /* Also discard relocs on undefined weak syms with non-default
7538 visibility. */
7539 if (ELF_ST_VISIBILITY (h->other) != STV_DEFAULT
7540 && h->root.type == bfd_link_hash_undefweak)
7541 eh->dyn_relocs = NULL;
65f38f15 7542 }
f4656909 7543 else if (ELIMINATE_COPY_RELOCS)
65f38f15
AM
7544 {
7545 /* For the non-shared case, discard space for relocs against
7546 symbols which turn out to need copy relocs or are not
7547 dynamic. */
7548
f5385ebf
AM
7549 if (!h->non_got_ref
7550 && h->def_dynamic
7551 && !h->def_regular)
65f38f15
AM
7552 {
7553 /* Make sure this symbol is output as a dynamic symbol.
7554 Undefined weak syms won't yet be marked as dynamic. */
7555 if (h->dynindx == -1
f5385ebf 7556 && !h->forced_local)
65f38f15 7557 {
c152c796 7558 if (! bfd_elf_link_record_dynamic_symbol (info, h))
b34976b6 7559 return FALSE;
65f38f15
AM
7560 }
7561
7562 /* If that succeeded, we know we'll be keeping all the
7563 relocs. */
7564 if (h->dynindx != -1)
7565 goto keep;
7566 }
7567
7568 eh->dyn_relocs = NULL;
7569
ec338859 7570 keep: ;
65f38f15
AM
7571 }
7572
7573 /* Finally, allocate space. */
7574 for (p = eh->dyn_relocs; p != NULL; p = p->next)
7575 {
7576 asection *sreloc = elf_section_data (p->sec)->sreloc;
eea6121a 7577 sreloc->size += p->count * sizeof (Elf64_External_Rela);
65f38f15
AM
7578 }
7579
b34976b6 7580 return TRUE;
65f38f15
AM
7581}
7582
7583/* Find any dynamic relocs that apply to read-only sections. */
7584
b34976b6 7585static bfd_boolean
4ce794b7 7586readonly_dynrelocs (struct elf_link_hash_entry *h, void *inf)
65f38f15
AM
7587{
7588 struct ppc_link_hash_entry *eh;
7589 struct ppc_dyn_relocs *p;
7590
e92d460e
AM
7591 if (h->root.type == bfd_link_hash_warning)
7592 h = (struct elf_link_hash_entry *) h->root.u.i.link;
7593
65f38f15
AM
7594 eh = (struct ppc_link_hash_entry *) h;
7595 for (p = eh->dyn_relocs; p != NULL; p = p->next)
7596 {
7597 asection *s = p->sec->output_section;
7598
7599 if (s != NULL && (s->flags & SEC_READONLY) != 0)
7600 {
4ce794b7 7601 struct bfd_link_info *info = inf;
65f38f15
AM
7602
7603 info->flags |= DF_TEXTREL;
7604
7605 /* Not an error, just cut short the traversal. */
b34976b6 7606 return FALSE;
65f38f15
AM
7607 }
7608 }
b34976b6 7609 return TRUE;
65f38f15
AM
7610}
7611
7612/* Set the sizes of the dynamic sections. */
7613
b34976b6 7614static bfd_boolean
4ce794b7
AM
7615ppc64_elf_size_dynamic_sections (bfd *output_bfd ATTRIBUTE_UNUSED,
7616 struct bfd_link_info *info)
65f38f15
AM
7617{
7618 struct ppc_link_hash_table *htab;
7619 bfd *dynobj;
7620 asection *s;
b34976b6 7621 bfd_boolean relocs;
65f38f15
AM
7622 bfd *ibfd;
7623
7624 htab = ppc_hash_table (info);
7625 dynobj = htab->elf.dynobj;
7626 if (dynobj == NULL)
7627 abort ();
7628
7629 if (htab->elf.dynamic_sections_created)
7630 {
7631 /* Set the contents of the .interp section to the interpreter. */
36af4a4e 7632 if (info->executable)
65f38f15
AM
7633 {
7634 s = bfd_get_section_by_name (dynobj, ".interp");
7635 if (s == NULL)
7636 abort ();
eea6121a 7637 s->size = sizeof ELF_DYNAMIC_INTERPRETER;
65f38f15
AM
7638 s->contents = (unsigned char *) ELF_DYNAMIC_INTERPRETER;
7639 }
7640 }
7641
7642 /* Set up .got offsets for local syms, and space for local dynamic
7643 relocs. */
7644 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link_next)
7645 {
411e1bfb
AM
7646 struct got_entry **lgot_ents;
7647 struct got_entry **end_lgot_ents;
e7b938ca 7648 char *lgot_masks;
65f38f15
AM
7649 bfd_size_type locsymcount;
7650 Elf_Internal_Shdr *symtab_hdr;
7651 asection *srel;
7652
ee75fd95 7653 if (!is_ppc64_elf_target (ibfd->xvec))
65f38f15
AM
7654 continue;
7655
e717da7e
AM
7656 if (ppc64_tlsld_got (ibfd)->refcount > 0)
7657 {
7658 s = ppc64_elf_tdata (ibfd)->got;
eea6121a
AM
7659 ppc64_tlsld_got (ibfd)->offset = s->size;
7660 s->size += 16;
e717da7e
AM
7661 if (info->shared)
7662 {
7663 srel = ppc64_elf_tdata (ibfd)->relgot;
eea6121a 7664 srel->size += sizeof (Elf64_External_Rela);
e717da7e
AM
7665 }
7666 }
7667 else
7668 ppc64_tlsld_got (ibfd)->offset = (bfd_vma) -1;
7669
65f38f15
AM
7670 for (s = ibfd->sections; s != NULL; s = s->next)
7671 {
ec338859 7672 struct ppc_dyn_relocs *p;
65f38f15 7673
6edfbbad 7674 for (p = elf_section_data (s)->local_dynrel; p != NULL; p = p->next)
65f38f15 7675 {
ec338859
AM
7676 if (!bfd_is_abs_section (p->sec)
7677 && bfd_is_abs_section (p->sec->output_section))
7678 {
7679 /* Input section has been discarded, either because
7680 it is a copy of a linkonce section or due to
7681 linker script /DISCARD/, so we'll be discarding
7682 the relocs too. */
7683 }
248866a8 7684 else if (p->count != 0)
ec338859
AM
7685 {
7686 srel = elf_section_data (p->sec)->sreloc;
eea6121a 7687 srel->size += p->count * sizeof (Elf64_External_Rela);
248866a8
AM
7688 if ((p->sec->output_section->flags & SEC_READONLY) != 0)
7689 info->flags |= DF_TEXTREL;
ec338859 7690 }
65f38f15
AM
7691 }
7692 }
7693
411e1bfb
AM
7694 lgot_ents = elf_local_got_ents (ibfd);
7695 if (!lgot_ents)
65f38f15
AM
7696 continue;
7697
7698 symtab_hdr = &elf_tdata (ibfd)->symtab_hdr;
7699 locsymcount = symtab_hdr->sh_info;
411e1bfb 7700 end_lgot_ents = lgot_ents + locsymcount;
e7b938ca 7701 lgot_masks = (char *) end_lgot_ents;
e717da7e
AM
7702 s = ppc64_elf_tdata (ibfd)->got;
7703 srel = ppc64_elf_tdata (ibfd)->relgot;
e7b938ca 7704 for (; lgot_ents < end_lgot_ents; ++lgot_ents, ++lgot_masks)
65f38f15 7705 {
411e1bfb
AM
7706 struct got_entry *ent;
7707
7708 for (ent = *lgot_ents; ent != NULL; ent = ent->next)
7709 if (ent->got.refcount > 0)
7710 {
e7b938ca 7711 if ((ent->tls_type & *lgot_masks & TLS_LD) != 0)
411e1bfb 7712 {
e717da7e 7713 if (ppc64_tlsld_got (ibfd)->offset == (bfd_vma) -1)
411e1bfb 7714 {
eea6121a
AM
7715 ppc64_tlsld_got (ibfd)->offset = s->size;
7716 s->size += 16;
411e1bfb 7717 if (info->shared)
eea6121a 7718 srel->size += sizeof (Elf64_External_Rela);
411e1bfb 7719 }
e717da7e 7720 ent->got.offset = ppc64_tlsld_got (ibfd)->offset;
411e1bfb
AM
7721 }
7722 else
7723 {
eea6121a 7724 ent->got.offset = s->size;
e7b938ca 7725 if ((ent->tls_type & *lgot_masks & TLS_GD) != 0)
411e1bfb 7726 {
eea6121a 7727 s->size += 16;
411e1bfb 7728 if (info->shared)
eea6121a 7729 srel->size += 2 * sizeof (Elf64_External_Rela);
411e1bfb
AM
7730 }
7731 else
7732 {
eea6121a 7733 s->size += 8;
411e1bfb 7734 if (info->shared)
eea6121a 7735 srel->size += sizeof (Elf64_External_Rela);
411e1bfb
AM
7736 }
7737 }
7738 }
7739 else
7740 ent->got.offset = (bfd_vma) -1;
65f38f15
AM
7741 }
7742 }
7743
7744 /* Allocate global sym .plt and .got entries, and space for global
7745 sym dynamic relocs. */
4ce794b7 7746 elf_link_hash_traverse (&htab->elf, allocate_dynrelocs, info);
65f38f15
AM
7747
7748 /* We now have determined the sizes of the various dynamic sections.
7749 Allocate memory for them. */
b34976b6 7750 relocs = FALSE;
65f38f15
AM
7751 for (s = dynobj->sections; s != NULL; s = s->next)
7752 {
7753 if ((s->flags & SEC_LINKER_CREATED) == 0)
7754 continue;
7755
4ce794b7 7756 if (s == htab->brlt || s == htab->relbrlt)
721956f4
AM
7757 /* These haven't been allocated yet; don't strip. */
7758 continue;
e717da7e
AM
7759 else if (s == htab->got
7760 || s == htab->plt
c456f082
AM
7761 || s == htab->glink
7762 || s == htab->dynbss)
65f38f15
AM
7763 {
7764 /* Strip this section if we don't need it; see the
7765 comment below. */
5bd4f169 7766 }
65f38f15 7767 else if (strncmp (bfd_get_section_name (dynobj, s), ".rela", 5) == 0)
5bd4f169 7768 {
c456f082 7769 if (s->size != 0)
5bd4f169 7770 {
4ce794b7 7771 if (s != htab->relplt)
b34976b6 7772 relocs = TRUE;
5bd4f169
AM
7773
7774 /* We use the reloc_count field as a counter if we need
7775 to copy relocs into the output file. */
7776 s->reloc_count = 0;
7777 }
7778 }
65f38f15 7779 else
5bd4f169
AM
7780 {
7781 /* It's not one of our sections, so don't allocate space. */
7782 continue;
7783 }
7784
eea6121a 7785 if (s->size == 0)
5bd4f169 7786 {
c456f082
AM
7787 /* If we don't need this section, strip it from the
7788 output file. This is mostly to handle .rela.bss and
7789 .rela.plt. We must create both sections in
7790 create_dynamic_sections, because they must be created
7791 before the linker maps input sections to output
7792 sections. The linker does that before
7793 adjust_dynamic_symbol is called, and it is that
7794 function which decides whether anything needs to go
7795 into these sections. */
8423293d 7796 s->flags |= SEC_EXCLUDE;
5bd4f169
AM
7797 continue;
7798 }
7799
c456f082 7800 if ((s->flags & SEC_HAS_CONTENTS) == 0)
5f333394
AM
7801 continue;
7802
65f38f15
AM
7803 /* Allocate memory for the section contents. We use bfd_zalloc
7804 here in case unused entries are not reclaimed before the
7805 section's contents are written out. This should not happen,
411e1bfb
AM
7806 but this way if it does we get a R_PPC64_NONE reloc in .rela
7807 sections instead of garbage.
7808 We also rely on the section contents being zero when writing
7809 the GOT. */
eea6121a 7810 s->contents = bfd_zalloc (dynobj, s->size);
65f38f15 7811 if (s->contents == NULL)
b34976b6 7812 return FALSE;
5bd4f169
AM
7813 }
7814
e717da7e
AM
7815 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link_next)
7816 {
ee75fd95 7817 if (!is_ppc64_elf_target (ibfd->xvec))
7b53ace3
AM
7818 continue;
7819
e717da7e
AM
7820 s = ppc64_elf_tdata (ibfd)->got;
7821 if (s != NULL && s != htab->got)
7822 {
eea6121a 7823 if (s->size == 0)
8423293d 7824 s->flags |= SEC_EXCLUDE;
e717da7e
AM
7825 else
7826 {
eea6121a 7827 s->contents = bfd_zalloc (ibfd, s->size);
e717da7e
AM
7828 if (s->contents == NULL)
7829 return FALSE;
7830 }
7831 }
7832 s = ppc64_elf_tdata (ibfd)->relgot;
7833 if (s != NULL)
7834 {
eea6121a 7835 if (s->size == 0)
8423293d 7836 s->flags |= SEC_EXCLUDE;
e717da7e
AM
7837 else
7838 {
eea6121a 7839 s->contents = bfd_zalloc (ibfd, s->size);
e717da7e
AM
7840 if (s->contents == NULL)
7841 return FALSE;
7842 relocs = TRUE;
7843 s->reloc_count = 0;
7844 }
7845 }
7846 }
7847
e86ce104 7848 if (htab->elf.dynamic_sections_created)
5bd4f169
AM
7849 {
7850 /* Add some entries to the .dynamic section. We fill in the
7851 values later, in ppc64_elf_finish_dynamic_sections, but we
7852 must add the entries now so that we get the correct size for
7853 the .dynamic section. The DT_DEBUG entry is filled in by the
7854 dynamic linker and used by the debugger. */
dc810e39 7855#define add_dynamic_entry(TAG, VAL) \
5a580b3a 7856 _bfd_elf_add_dynamic_entry (info, TAG, VAL)
dc810e39 7857
36af4a4e 7858 if (info->executable)
5bd4f169 7859 {
dc810e39 7860 if (!add_dynamic_entry (DT_DEBUG, 0))
b34976b6 7861 return FALSE;
5bd4f169
AM
7862 }
7863
eea6121a 7864 if (htab->plt != NULL && htab->plt->size != 0)
5bd4f169 7865 {
dc810e39
AM
7866 if (!add_dynamic_entry (DT_PLTGOT, 0)
7867 || !add_dynamic_entry (DT_PLTRELSZ, 0)
7868 || !add_dynamic_entry (DT_PLTREL, DT_RELA)
5d1634d7
AM
7869 || !add_dynamic_entry (DT_JMPREL, 0)
7870 || !add_dynamic_entry (DT_PPC64_GLINK, 0))
b34976b6 7871 return FALSE;
5bd4f169
AM
7872 }
7873
19397422
AM
7874 if (NO_OPD_RELOCS)
7875 {
7876 if (!add_dynamic_entry (DT_PPC64_OPD, 0)
7877 || !add_dynamic_entry (DT_PPC64_OPDSZ, 0))
b34976b6 7878 return FALSE;
19397422
AM
7879 }
7880
5bd4f169
AM
7881 if (relocs)
7882 {
dc810e39
AM
7883 if (!add_dynamic_entry (DT_RELA, 0)
7884 || !add_dynamic_entry (DT_RELASZ, 0)
7885 || !add_dynamic_entry (DT_RELAENT, sizeof (Elf64_External_Rela)))
b34976b6 7886 return FALSE;
5bd4f169 7887
65f38f15
AM
7888 /* If any dynamic relocs apply to a read-only section,
7889 then we need a DT_TEXTREL entry. */
248866a8 7890 if ((info->flags & DF_TEXTREL) == 0)
4ce794b7 7891 elf_link_hash_traverse (&htab->elf, readonly_dynrelocs, info);
5bd4f169 7892
65f38f15 7893 if ((info->flags & DF_TEXTREL) != 0)
5bd4f169 7894 {
65f38f15 7895 if (!add_dynamic_entry (DT_TEXTREL, 0))
b34976b6 7896 return FALSE;
5bd4f169 7897 }
5bd4f169 7898 }
5bd4f169 7899 }
65f38f15 7900#undef add_dynamic_entry
5bd4f169 7901
b34976b6 7902 return TRUE;
5bd4f169
AM
7903}
7904
721956f4 7905/* Determine the type of stub needed, if any, for a call. */
5bd4f169 7906
4ce794b7
AM
7907static inline enum ppc_stub_type
7908ppc_type_of_stub (asection *input_sec,
7909 const Elf_Internal_Rela *rel,
7910 struct ppc_link_hash_entry **hash,
7911 bfd_vma destination)
5bd4f169 7912{
721956f4
AM
7913 struct ppc_link_hash_entry *h = *hash;
7914 bfd_vma location;
7915 bfd_vma branch_offset;
7916 bfd_vma max_branch_offset;
4ce794b7 7917 enum elf_ppc64_reloc_type r_type;
5bd4f169 7918
721956f4
AM
7919 if (h != NULL)
7920 {
7fe2b9a6
AM
7921 struct ppc_link_hash_entry *fdh = h;
7922 if (fdh->oh != NULL
7923 && fdh->oh->is_func_descriptor)
7924 fdh = fdh->oh;
8387904d 7925
7fe2b9a6 7926 if (fdh->elf.dynindx != -1)
5bd4f169 7927 {
411e1bfb 7928 struct plt_entry *ent;
8387904d 7929
7fe2b9a6 7930 for (ent = fdh->elf.plt.plist; ent != NULL; ent = ent->next)
411e1bfb
AM
7931 if (ent->addend == rel->r_addend
7932 && ent->plt.offset != (bfd_vma) -1)
7933 {
7fe2b9a6 7934 *hash = fdh;
411e1bfb
AM
7935 return ppc_stub_plt_call;
7936 }
5bd4f169
AM
7937 }
7938
7fe2b9a6
AM
7939 /* Here, we know we don't have a plt entry. If we don't have a
7940 either a defined function descriptor or a defined entry symbol
7941 in a regular object file, then it is pointless trying to make
7942 any other type of stub. */
7943 if (!((fdh->elf.root.type == bfd_link_hash_defined
7944 || fdh->elf.root.type == bfd_link_hash_defweak)
7945 && fdh->elf.root.u.def.section->output_section != NULL)
7946 && !((h->elf.root.type == bfd_link_hash_defined
7947 || h->elf.root.type == bfd_link_hash_defweak)
7948 && h->elf.root.u.def.section->output_section != NULL))
721956f4 7949 return ppc_stub_none;
5d1634d7 7950 }
5d1634d7 7951
721956f4
AM
7952 /* Determine where the call point is. */
7953 location = (input_sec->output_offset
7954 + input_sec->output_section->vma
7955 + rel->r_offset);
5d1634d7 7956
721956f4
AM
7957 branch_offset = destination - location;
7958 r_type = ELF64_R_TYPE (rel->r_info);
5d1634d7 7959
721956f4
AM
7960 /* Determine if a long branch stub is needed. */
7961 max_branch_offset = 1 << 25;
4ce794b7 7962 if (r_type != R_PPC64_REL24)
721956f4 7963 max_branch_offset = 1 << 15;
5d1634d7 7964
721956f4
AM
7965 if (branch_offset + max_branch_offset >= 2 * max_branch_offset)
7966 /* We need a stub. Figure out whether a long_branch or plt_branch
7967 is needed later. */
7968 return ppc_stub_long_branch;
5d1634d7 7969
721956f4 7970 return ppc_stub_none;
5d1634d7
AM
7971}
7972
7973/* Build a .plt call stub. */
7974
4ce794b7
AM
7975static inline bfd_byte *
7976build_plt_stub (bfd *obfd, bfd_byte *p, int offset)
5d1634d7
AM
7977{
7978#define PPC_LO(v) ((v) & 0xffff)
7979#define PPC_HI(v) (((v) >> 16) & 0xffff)
7980#define PPC_HA(v) PPC_HI ((v) + 0x8000)
7981
5d1634d7 7982 bfd_put_32 (obfd, ADDIS_R12_R2 | PPC_HA (offset), p), p += 4;
ad8e1ba5 7983 bfd_put_32 (obfd, STD_R2_40R1, p), p += 4;
5d1634d7
AM
7984 bfd_put_32 (obfd, LD_R11_0R12 | PPC_LO (offset), p), p += 4;
7985 if (PPC_HA (offset + 8) != PPC_HA (offset))
ad8e1ba5 7986 bfd_put_32 (obfd, ADDIS_R12_R12 | 1, p), p += 4;
5d1634d7
AM
7987 offset += 8;
7988 bfd_put_32 (obfd, LD_R2_0R12 | PPC_LO (offset), p), p += 4;
7989 if (PPC_HA (offset + 8) != PPC_HA (offset))
ad8e1ba5 7990 bfd_put_32 (obfd, ADDIS_R12_R12 | 1, p), p += 4;
5d1634d7
AM
7991 offset += 8;
7992 bfd_put_32 (obfd, MTCTR_R11, p), p += 4;
7993 bfd_put_32 (obfd, LD_R11_0R12 | PPC_LO (offset), p), p += 4;
7994 bfd_put_32 (obfd, BCTR, p), p += 4;
7995 return p;
7996}
7997
b34976b6 7998static bfd_boolean
4ce794b7 7999ppc_build_one_stub (struct bfd_hash_entry *gen_entry, void *in_arg)
5d1634d7 8000{
721956f4
AM
8001 struct ppc_stub_hash_entry *stub_entry;
8002 struct ppc_branch_hash_entry *br_entry;
5d1634d7
AM
8003 struct bfd_link_info *info;
8004 struct ppc_link_hash_table *htab;
721956f4
AM
8005 bfd_byte *loc;
8006 bfd_byte *p;
8007 unsigned int indx;
411e1bfb 8008 struct plt_entry *ent;
ee75fd95 8009 bfd_vma dest, off;
721956f4 8010 int size;
5d1634d7 8011
721956f4
AM
8012 /* Massage our args to the form they really have. */
8013 stub_entry = (struct ppc_stub_hash_entry *) gen_entry;
4ce794b7 8014 info = in_arg;
5d1634d7 8015
5d1634d7
AM
8016 htab = ppc_hash_table (info);
8017
721956f4 8018 /* Make a note of the offset within the stubs for this entry. */
eea6121a 8019 stub_entry->stub_offset = stub_entry->stub_sec->size;
97b639ba 8020 loc = stub_entry->stub_sec->contents + stub_entry->stub_offset;
721956f4 8021
4ce794b7 8022 htab->stub_count[stub_entry->stub_type - 1] += 1;
721956f4 8023 switch (stub_entry->stub_type)
5d1634d7 8024 {
721956f4 8025 case ppc_stub_long_branch:
ad8e1ba5 8026 case ppc_stub_long_branch_r2off:
721956f4 8027 /* Branches are relative. This is where we are going to. */
ee75fd95
AM
8028 off = dest = (stub_entry->target_value
8029 + stub_entry->target_section->output_offset
8030 + stub_entry->target_section->output_section->vma);
5d1634d7 8031
721956f4
AM
8032 /* And this is where we are coming from. */
8033 off -= (stub_entry->stub_offset
97b639ba
AM
8034 + stub_entry->stub_sec->output_offset
8035 + stub_entry->stub_sec->output_section->vma);
e86ce104 8036
ad8e1ba5
AM
8037 if (stub_entry->stub_type != ppc_stub_long_branch_r2off)
8038 size = 4;
8039 else
8040 {
8041 bfd_vma r2off;
8042
8043 r2off = (htab->stub_group[stub_entry->target_section->id].toc_off
8044 - htab->stub_group[stub_entry->id_sec->id].toc_off);
97b639ba 8045 bfd_put_32 (htab->stub_bfd, STD_R2_40R1, loc);
ad8e1ba5 8046 loc += 4;
97b639ba 8047 bfd_put_32 (htab->stub_bfd, ADDIS_R2_R2 | PPC_HA (r2off), loc);
ad8e1ba5 8048 loc += 4;
97b639ba 8049 bfd_put_32 (htab->stub_bfd, ADDI_R2_R2 | PPC_LO (r2off), loc);
ad8e1ba5
AM
8050 loc += 4;
8051 off -= 12;
8052 size = 16;
8053 }
97b639ba 8054 bfd_put_32 (htab->stub_bfd, B_DOT | (off & 0x3fffffc), loc);
ad8e1ba5 8055
5c3dead3
AM
8056 if (off + (1 << 25) >= (bfd_vma) (1 << 26))
8057 {
8058 (*_bfd_error_handler) (_("long branch stub `%s' offset overflow"),
8059 stub_entry->root.string);
8060 htab->stub_error = TRUE;
8061 return FALSE;
8062 }
ee75fd95
AM
8063
8064 if (info->emitrelocations)
8065 {
8066 Elf_Internal_Rela *relocs, *r;
8067 struct bfd_elf_section_data *elfsec_data;
8068
8069 elfsec_data = elf_section_data (stub_entry->stub_sec);
8070 relocs = elfsec_data->relocs;
8071 if (relocs == NULL)
8072 {
8073 bfd_size_type relsize;
8074 relsize = stub_entry->stub_sec->reloc_count * sizeof (*relocs);
8075 relocs = bfd_alloc (htab->stub_bfd, relsize);
8076 if (relocs == NULL)
8077 return FALSE;
8078 elfsec_data->relocs = relocs;
8079 elfsec_data->rel_hdr.sh_size = relsize;
8080 elfsec_data->rel_hdr.sh_entsize = 24;
8081 stub_entry->stub_sec->reloc_count = 0;
8082 }
8083 r = relocs + stub_entry->stub_sec->reloc_count;
8084 stub_entry->stub_sec->reloc_count += 1;
8085 r->r_offset = loc - stub_entry->stub_sec->contents;
8086 r->r_info = ELF64_R_INFO (0, R_PPC64_REL24);
8087 r->r_addend = dest;
8088 if (stub_entry->h != NULL)
8089 {
8090 struct elf_link_hash_entry **hashes;
8091 unsigned long symndx;
8092 struct ppc_link_hash_entry *h;
8093
8094 hashes = elf_sym_hashes (htab->stub_bfd);
8095 if (hashes == NULL)
8096 {
8097 bfd_size_type hsize;
8098
8099 hsize = (htab->stub_globals + 1) * sizeof (*hashes);
8100 hashes = bfd_zalloc (htab->stub_bfd, hsize);
8101 if (hashes == NULL)
8102 return FALSE;
8103 elf_sym_hashes (htab->stub_bfd) = hashes;
8104 htab->stub_globals = 1;
8105 }
8106 symndx = htab->stub_globals++;
8107 h = stub_entry->h;
8108 hashes[symndx] = &h->elf;
8109 r->r_info = ELF64_R_INFO (symndx, R_PPC64_REL24);
8110 if (h->oh != NULL && h->oh->is_func)
8111 h = h->oh;
8112 if (h->elf.root.u.def.section != stub_entry->target_section)
8113 /* H is an opd symbol. The addend must be zero. */
8114 r->r_addend = 0;
8115 else
8116 {
8117 off = (h->elf.root.u.def.value
8118 + h->elf.root.u.def.section->output_offset
8119 + h->elf.root.u.def.section->output_section->vma);
8120 r->r_addend -= off;
8121 }
8122 }
8123 }
721956f4 8124 break;
e86ce104 8125
721956f4 8126 case ppc_stub_plt_branch:
ad8e1ba5 8127 case ppc_stub_plt_branch_r2off:
721956f4
AM
8128 br_entry = ppc_branch_hash_lookup (&htab->branch_hash_table,
8129 stub_entry->root.string + 9,
b34976b6 8130 FALSE, FALSE);
721956f4
AM
8131 if (br_entry == NULL)
8132 {
8133 (*_bfd_error_handler) (_("can't find branch stub `%s'"),
5c3dead3 8134 stub_entry->root.string);
b34976b6
AM
8135 htab->stub_error = TRUE;
8136 return FALSE;
721956f4
AM
8137 }
8138
8139 off = (stub_entry->target_value
8140 + stub_entry->target_section->output_offset
8141 + stub_entry->target_section->output_section->vma);
8142
4ce794b7
AM
8143 bfd_put_64 (htab->brlt->owner, off,
8144 htab->brlt->contents + br_entry->offset);
721956f4 8145
ee75fd95 8146 if (htab->relbrlt != NULL)
721956f4
AM
8147 {
8148 /* Create a reloc for the branch lookup table entry. */
8149 Elf_Internal_Rela rela;
ad8e1ba5 8150 bfd_byte *rl;
5d1634d7 8151
721956f4 8152 rela.r_offset = (br_entry->offset
4ce794b7
AM
8153 + htab->brlt->output_offset
8154 + htab->brlt->output_section->vma);
721956f4
AM
8155 rela.r_info = ELF64_R_INFO (0, R_PPC64_RELATIVE);
8156 rela.r_addend = off;
8157
4ce794b7
AM
8158 rl = htab->relbrlt->contents;
8159 rl += htab->relbrlt->reloc_count++ * sizeof (Elf64_External_Rela);
8160 bfd_elf64_swap_reloca_out (htab->relbrlt->owner, &rela, rl);
721956f4
AM
8161 }
8162
8163 off = (br_entry->offset
4ce794b7
AM
8164 + htab->brlt->output_offset
8165 + htab->brlt->output_section->vma
8166 - elf_gp (htab->brlt->output_section->owner)
ad8e1ba5 8167 - htab->stub_group[stub_entry->id_sec->id].toc_off);
721956f4 8168
ad8e1ba5 8169 if (off + 0x80008000 > 0xffffffff || (off & 7) != 0)
5d1634d7
AM
8170 {
8171 (*_bfd_error_handler)
e86ce104 8172 (_("linkage table error against `%s'"),
721956f4 8173 stub_entry->root.string);
5d1634d7 8174 bfd_set_error (bfd_error_bad_value);
b34976b6
AM
8175 htab->stub_error = TRUE;
8176 return FALSE;
5d1634d7 8177 }
41bd81ab 8178
721956f4 8179 indx = off;
ad8e1ba5
AM
8180 if (stub_entry->stub_type != ppc_stub_plt_branch_r2off)
8181 {
97b639ba 8182 bfd_put_32 (htab->stub_bfd, ADDIS_R12_R2 | PPC_HA (indx), loc);
ad8e1ba5 8183 loc += 4;
97b639ba 8184 bfd_put_32 (htab->stub_bfd, LD_R11_0R12 | PPC_LO (indx), loc);
ad8e1ba5
AM
8185 size = 16;
8186 }
8187 else
8188 {
8189 bfd_vma r2off;
8190
8191 r2off = (htab->stub_group[stub_entry->target_section->id].toc_off
8192 - htab->stub_group[stub_entry->id_sec->id].toc_off);
97b639ba 8193 bfd_put_32 (htab->stub_bfd, STD_R2_40R1, loc);
ad8e1ba5 8194 loc += 4;
97b639ba 8195 bfd_put_32 (htab->stub_bfd, ADDIS_R12_R2 | PPC_HA (indx), loc);
ad8e1ba5 8196 loc += 4;
97b639ba 8197 bfd_put_32 (htab->stub_bfd, LD_R11_0R12 | PPC_LO (indx), loc);
ad8e1ba5 8198 loc += 4;
97b639ba 8199 bfd_put_32 (htab->stub_bfd, ADDIS_R2_R2 | PPC_HA (r2off), loc);
ad8e1ba5 8200 loc += 4;
97b639ba 8201 bfd_put_32 (htab->stub_bfd, ADDI_R2_R2 | PPC_LO (r2off), loc);
ad8e1ba5
AM
8202 size = 28;
8203 }
8204 loc += 4;
97b639ba 8205 bfd_put_32 (htab->stub_bfd, MTCTR_R11, loc);
ad8e1ba5 8206 loc += 4;
97b639ba 8207 bfd_put_32 (htab->stub_bfd, BCTR, loc);
721956f4 8208 break;
5d1634d7 8209
721956f4 8210 case ppc_stub_plt_call:
c862ae31
AM
8211 /* Do the best we can for shared libraries built without
8212 exporting ".foo" for each "foo". This can happen when symbol
8213 versioning scripts strip all bar a subset of symbols. */
8387904d
AM
8214 if (stub_entry->h->oh != NULL
8215 && stub_entry->h->oh->elf.root.type != bfd_link_hash_defined
34814b9f 8216 && stub_entry->h->oh->elf.root.type != bfd_link_hash_defweak)
c862ae31
AM
8217 {
8218 /* Point the symbol at the stub. There may be multiple stubs,
8219 we don't really care; The main thing is to make this sym
8f3bab57
AM
8220 defined somewhere. Maybe defining the symbol in the stub
8221 section is a silly idea. If we didn't do this, htab->top_id
8222 could disappear. */
34814b9f
AM
8223 stub_entry->h->oh->elf.root.type = bfd_link_hash_defined;
8224 stub_entry->h->oh->elf.root.u.def.section = stub_entry->stub_sec;
8225 stub_entry->h->oh->elf.root.u.def.value = stub_entry->stub_offset;
c862ae31
AM
8226 }
8227
721956f4 8228 /* Now build the stub. */
411e1bfb
AM
8229 off = (bfd_vma) -1;
8230 for (ent = stub_entry->h->elf.plt.plist; ent != NULL; ent = ent->next)
8231 if (ent->addend == stub_entry->addend)
8232 {
8233 off = ent->plt.offset;
8234 break;
8235 }
721956f4
AM
8236 if (off >= (bfd_vma) -2)
8237 abort ();
8238
8239 off &= ~ (bfd_vma) 1;
4ce794b7
AM
8240 off += (htab->plt->output_offset
8241 + htab->plt->output_section->vma
8242 - elf_gp (htab->plt->output_section->owner)
ad8e1ba5 8243 - htab->stub_group[stub_entry->id_sec->id].toc_off);
721956f4 8244
ad8e1ba5 8245 if (off + 0x80008000 > 0xffffffff || (off & 7) != 0)
721956f4
AM
8246 {
8247 (*_bfd_error_handler)
8248 (_("linkage table error against `%s'"),
8249 stub_entry->h->elf.root.root.string);
8250 bfd_set_error (bfd_error_bad_value);
b34976b6
AM
8251 htab->stub_error = TRUE;
8252 return FALSE;
721956f4
AM
8253 }
8254
97b639ba 8255 p = build_plt_stub (htab->stub_bfd, loc, off);
721956f4
AM
8256 size = p - loc;
8257 break;
8258
8259 default:
8260 BFD_FAIL ();
b34976b6 8261 return FALSE;
721956f4
AM
8262 }
8263
eea6121a 8264 stub_entry->stub_sec->size += size;
97b639ba 8265
ee75fd95 8266 if (htab->emit_stub_syms)
97b639ba
AM
8267 {
8268 struct elf_link_hash_entry *h;
ee75fd95
AM
8269 size_t len1, len2;
8270 char *name;
8271 const char *const stub_str[] = { "long_branch",
8272 "long_branch_r2off",
8273 "plt_branch",
8274 "plt_branch_r2off",
8275 "plt_call" };
8276
8277 len1 = strlen (stub_str[stub_entry->stub_type - 1]);
8278 len2 = strlen (stub_entry->root.string);
8279 name = bfd_malloc (len1 + len2 + 2);
8280 if (name == NULL)
8281 return FALSE;
8282 memcpy (name, stub_entry->root.string, 9);
8283 memcpy (name + 9, stub_str[stub_entry->stub_type - 1], len1);
8284 memcpy (name + len1 + 9, stub_entry->root.string + 8, len2 - 8 + 1);
8285 h = elf_link_hash_lookup (&htab->elf, name, TRUE, FALSE, FALSE);
97b639ba
AM
8286 if (h == NULL)
8287 return FALSE;
8288 if (h->root.type == bfd_link_hash_new)
8289 {
8290 h->root.type = bfd_link_hash_defined;
8291 h->root.u.def.section = stub_entry->stub_sec;
8292 h->root.u.def.value = stub_entry->stub_offset;
f5385ebf
AM
8293 h->ref_regular = 1;
8294 h->def_regular = 1;
8295 h->ref_regular_nonweak = 1;
8296 h->forced_local = 1;
8297 h->non_elf = 0;
97b639ba
AM
8298 }
8299 }
8300
b34976b6 8301 return TRUE;
721956f4
AM
8302}
8303
8304/* As above, but don't actually build the stub. Just bump offset so
8305 we know stub section sizes, and select plt_branch stubs where
8306 long_branch stubs won't do. */
8307
b34976b6 8308static bfd_boolean
4ce794b7 8309ppc_size_one_stub (struct bfd_hash_entry *gen_entry, void *in_arg)
721956f4
AM
8310{
8311 struct ppc_stub_hash_entry *stub_entry;
63bc6f6c 8312 struct bfd_link_info *info;
721956f4
AM
8313 struct ppc_link_hash_table *htab;
8314 bfd_vma off;
8315 int size;
8316
8317 /* Massage our args to the form they really have. */
8318 stub_entry = (struct ppc_stub_hash_entry *) gen_entry;
63bc6f6c
AM
8319 info = in_arg;
8320
8321 htab = ppc_hash_table (info);
721956f4
AM
8322
8323 if (stub_entry->stub_type == ppc_stub_plt_call)
8324 {
411e1bfb 8325 struct plt_entry *ent;
58ac9f71 8326 off = (bfd_vma) -1;
411e1bfb
AM
8327 for (ent = stub_entry->h->elf.plt.plist; ent != NULL; ent = ent->next)
8328 if (ent->addend == stub_entry->addend)
8329 {
8330 off = ent->plt.offset & ~(bfd_vma) 1;
8331 break;
8332 }
58ac9f71 8333 if (off >= (bfd_vma) -2)
411e1bfb 8334 abort ();
4ce794b7
AM
8335 off += (htab->plt->output_offset
8336 + htab->plt->output_section->vma
8337 - elf_gp (htab->plt->output_section->owner)
ad8e1ba5 8338 - htab->stub_group[stub_entry->id_sec->id].toc_off);
721956f4 8339
ad8e1ba5 8340 size = PLT_CALL_STUB_SIZE;
4ce794b7 8341 if (PPC_HA (off + 16) != PPC_HA (off))
721956f4
AM
8342 size += 4;
8343 }
8344 else
8345 {
ad8e1ba5
AM
8346 /* ppc_stub_long_branch or ppc_stub_plt_branch, or their r2off
8347 variants. */
721956f4
AM
8348 off = (stub_entry->target_value
8349 + stub_entry->target_section->output_offset
8350 + stub_entry->target_section->output_section->vma);
eea6121a 8351 off -= (stub_entry->stub_sec->size
721956f4
AM
8352 + stub_entry->stub_sec->output_offset
8353 + stub_entry->stub_sec->output_section->vma);
8354
ad8e1ba5
AM
8355 /* Reset the stub type from the plt variant in case we now
8356 can reach with a shorter stub. */
8357 if (stub_entry->stub_type >= ppc_stub_plt_branch)
8358 stub_entry->stub_type += ppc_stub_long_branch - ppc_stub_plt_branch;
8359
8360 size = 4;
8361 if (stub_entry->stub_type == ppc_stub_long_branch_r2off)
8362 {
8363 off -= 12;
8364 size = 16;
8365 }
8366
8367 /* If the branch offset if too big, use a ppc_stub_plt_branch. */
721956f4
AM
8368 if (off + (1 << 25) >= (bfd_vma) (1 << 26))
8369 {
8370 struct ppc_branch_hash_entry *br_entry;
8371
8372 br_entry = ppc_branch_hash_lookup (&htab->branch_hash_table,
8373 stub_entry->root.string + 9,
b34976b6 8374 TRUE, FALSE);
721956f4
AM
8375 if (br_entry == NULL)
8376 {
8377 (*_bfd_error_handler) (_("can't build branch stub `%s'"),
5c3dead3 8378 stub_entry->root.string);
b34976b6
AM
8379 htab->stub_error = TRUE;
8380 return FALSE;
721956f4
AM
8381 }
8382
8383 if (br_entry->iter != htab->stub_iteration)
8384 {
8385 br_entry->iter = htab->stub_iteration;
eea6121a
AM
8386 br_entry->offset = htab->brlt->size;
8387 htab->brlt->size += 8;
63bc6f6c 8388
ee75fd95 8389 if (htab->relbrlt != NULL)
eea6121a 8390 htab->relbrlt->size += sizeof (Elf64_External_Rela);
721956f4 8391 }
ad8e1ba5
AM
8392
8393 stub_entry->stub_type += ppc_stub_plt_branch - ppc_stub_long_branch;
721956f4 8394 size = 16;
ad8e1ba5
AM
8395 if (stub_entry->stub_type != ppc_stub_plt_branch)
8396 size = 28;
721956f4 8397 }
ee75fd95
AM
8398
8399 if (info->emitrelocations
8400 && (stub_entry->stub_type == ppc_stub_long_branch
8401 || stub_entry->stub_type == ppc_stub_long_branch_r2off))
8402 stub_entry->stub_sec->reloc_count += 1;
721956f4
AM
8403 }
8404
eea6121a 8405 stub_entry->stub_sec->size += size;
b34976b6 8406 return TRUE;
721956f4
AM
8407}
8408
8409/* Set up various things so that we can make a list of input sections
8410 for each output section included in the link. Returns -1 on error,
cedb70c5 8411 0 when no stubs will be needed, and 1 on success. */
721956f4
AM
8412
8413int
4c52953f
AM
8414ppc64_elf_setup_section_lists (bfd *output_bfd,
8415 struct bfd_link_info *info,
8416 int no_multi_toc)
721956f4
AM
8417{
8418 bfd *input_bfd;
734b6cf9 8419 int top_id, top_index, id;
721956f4 8420 asection *section;
734b6cf9 8421 asection **input_list;
721956f4
AM
8422 bfd_size_type amt;
8423 struct ppc_link_hash_table *htab = ppc_hash_table (info);
8424
4c52953f
AM
8425 htab->no_multi_toc = no_multi_toc;
8426
4ce794b7 8427 if (htab->brlt == NULL)
721956f4
AM
8428 return 0;
8429
1e2f5b6e 8430 /* Find the top input section id. */
3d6f9012 8431 for (input_bfd = info->input_bfds, top_id = 3;
721956f4
AM
8432 input_bfd != NULL;
8433 input_bfd = input_bfd->link_next)
8434 {
721956f4
AM
8435 for (section = input_bfd->sections;
8436 section != NULL;
8437 section = section->next)
8438 {
8439 if (top_id < section->id)
8440 top_id = section->id;
8441 }
8442 }
721956f4 8443
8f3bab57 8444 htab->top_id = top_id;
721956f4 8445 amt = sizeof (struct map_stub) * (top_id + 1);
4ce794b7 8446 htab->stub_group = bfd_zmalloc (amt);
721956f4
AM
8447 if (htab->stub_group == NULL)
8448 return -1;
8449
3d6f9012
AM
8450 /* Set toc_off for com, und, abs and ind sections. */
8451 for (id = 0; id < 3; id++)
8452 htab->stub_group[id].toc_off = TOC_BASE_OFF;
721956f4 8453
3d6f9012 8454 elf_gp (output_bfd) = htab->toc_curr = ppc64_elf_toc (output_bfd);
734b6cf9
AM
8455
8456 /* We can't use output_bfd->section_count here to find the top output
8457 section index as some sections may have been removed, and
8423293d 8458 strip_excluded_output_sections doesn't renumber the indices. */
734b6cf9
AM
8459 for (section = output_bfd->sections, top_index = 0;
8460 section != NULL;
8461 section = section->next)
8462 {
8463 if (top_index < section->index)
8464 top_index = section->index;
8465 }
8466
8467 htab->top_index = top_index;
8468 amt = sizeof (asection *) * (top_index + 1);
4ce794b7 8469 input_list = bfd_zmalloc (amt);
734b6cf9
AM
8470 htab->input_list = input_list;
8471 if (input_list == NULL)
8472 return -1;
8473
721956f4
AM
8474 return 1;
8475}
8476
e717da7e
AM
8477/* The linker repeatedly calls this function for each TOC input section
8478 and linker generated GOT section. Group input bfds such that the toc
8479 within a group is less than 64k in size. Will break with cute linker
8480 scripts that play games with dot in the output toc section. */
ad8e1ba5
AM
8481
8482void
4ce794b7 8483ppc64_elf_next_toc_section (struct bfd_link_info *info, asection *isec)
ad8e1ba5
AM
8484{
8485 struct ppc_link_hash_table *htab = ppc_hash_table (info);
8486
4c52953f
AM
8487 if (!htab->no_multi_toc)
8488 {
8489 bfd_vma addr = isec->output_offset + isec->output_section->vma;
8490 bfd_vma off = addr - htab->toc_curr;
8491
8492 if (off + isec->size > 0x10000)
8493 htab->toc_curr = addr;
99877b66 8494
4c52953f
AM
8495 elf_gp (isec->owner) = (htab->toc_curr
8496 - elf_gp (isec->output_section->owner)
8497 + TOC_BASE_OFF);
8498 }
ad8e1ba5
AM
8499}
8500
8501/* Called after the last call to the above function. */
8502
8503void
4c52953f 8504ppc64_elf_reinit_toc (bfd *output_bfd, struct bfd_link_info *info)
ad8e1ba5
AM
8505{
8506 struct ppc_link_hash_table *htab = ppc_hash_table (info);
ad8e1ba5 8507
4c52953f
AM
8508 htab->multi_toc_needed = htab->toc_curr != elf_gp (output_bfd);
8509
ad8e1ba5
AM
8510 /* toc_curr tracks the TOC offset used for code sections below in
8511 ppc64_elf_next_input_section. Start off at 0x8000. */
3d6f9012 8512 htab->toc_curr = TOC_BASE_OFF;
ad8e1ba5
AM
8513}
8514
9b5ecbd0
AM
8515/* No toc references were found in ISEC. If the code in ISEC makes no
8516 calls, then there's no need to use toc adjusting stubs when branching
8517 into ISEC. Actually, indirect calls from ISEC are OK as they will
4c52953f
AM
8518 load r2. Returns -1 on error, 0 for no stub needed, 1 for stub
8519 needed, and 2 if a cyclical call-graph was found but no other reason
8520 for a stub was detected. If called from the top level, a return of
8521 2 means the same as a return of 0. */
9b5ecbd0
AM
8522
8523static int
4ce794b7 8524toc_adjusting_stub_needed (struct bfd_link_info *info, asection *isec)
9b5ecbd0 8525{
4c52953f
AM
8526 Elf_Internal_Rela *relstart, *rel;
8527 Elf_Internal_Sym *local_syms;
9b5ecbd0 8528 int ret;
4c52953f 8529 struct ppc_link_hash_table *htab;
9b5ecbd0 8530
772119ce
AM
8531 /* We know none of our code bearing sections will need toc stubs. */
8532 if ((isec->flags & SEC_LINKER_CREATED) != 0)
8533 return 0;
8534
eea6121a 8535 if (isec->size == 0)
082c50f8
AM
8536 return 0;
8537
4c52953f
AM
8538 if (isec->output_section == NULL)
8539 return 0;
8540
9b5ecbd0
AM
8541 /* Hack for linux kernel. .fixup contains branches, but only back to
8542 the function that hit an exception. */
4c52953f
AM
8543 if (strcmp (isec->name, ".fixup") == 0)
8544 return 0;
9b5ecbd0 8545
4c52953f
AM
8546 if (isec->reloc_count == 0)
8547 return 0;
8548
8549 relstart = _bfd_elf_link_read_relocs (isec->owner, isec, NULL, NULL,
8550 info->keep_memory);
8551 if (relstart == NULL)
8552 return -1;
8553
8554 /* Look for branches to outside of this section. */
8555 local_syms = NULL;
8556 ret = 0;
8557 htab = ppc_hash_table (info);
8558 for (rel = relstart; rel < relstart + isec->reloc_count; ++rel)
9b5ecbd0 8559 {
4c52953f
AM
8560 enum elf_ppc64_reloc_type r_type;
8561 unsigned long r_symndx;
8562 struct elf_link_hash_entry *h;
8563 Elf_Internal_Sym *sym;
8564 asection *sym_sec;
8565 long *opd_adjust;
8566 bfd_vma sym_value;
8567 bfd_vma dest;
8568
8569 r_type = ELF64_R_TYPE (rel->r_info);
8570 if (r_type != R_PPC64_REL24
8571 && r_type != R_PPC64_REL14
8572 && r_type != R_PPC64_REL14_BRTAKEN
8573 && r_type != R_PPC64_REL14_BRNTAKEN)
8574 continue;
8575
8576 r_symndx = ELF64_R_SYM (rel->r_info);
8577 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms, r_symndx,
8578 isec->owner))
9b5ecbd0 8579 {
4c52953f
AM
8580 ret = -1;
8581 break;
9b5ecbd0 8582 }
9b5ecbd0 8583
2917689a
AM
8584 /* Calls to dynamic lib functions go through a plt call stub
8585 that uses r2. Branches to undefined symbols might be a call
8586 using old-style dot symbols that can be satisfied by a plt
8587 call into a new-style dynamic library. */
4c52953f 8588 if (sym_sec == NULL)
2917689a
AM
8589 {
8590 struct ppc_link_hash_entry *eh = (struct ppc_link_hash_entry *) h;
8591 if (eh != NULL
8592 && eh->oh != NULL
8593 && eh->oh->elf.plt.plist != NULL)
8594 {
8595 ret = 1;
8596 break;
8597 }
4c52953f 8598
2917689a
AM
8599 /* Ignore other undefined symbols. */
8600 continue;
8601 }
8602
8603 /* Assume branches to other sections not included in the link need
8604 stubs too, to cover -R and absolute syms. */
4c52953f
AM
8605 if (sym_sec->output_section == NULL)
8606 {
8607 ret = 1;
8608 break;
8609 }
8610
8611 if (h == NULL)
8612 sym_value = sym->st_value;
8613 else
8614 {
8615 if (h->root.type != bfd_link_hash_defined
8616 && h->root.type != bfd_link_hash_defweak)
8617 abort ();
8618 sym_value = h->root.u.def.value;
8619 }
8620 sym_value += rel->r_addend;
8621
8622 /* If this branch reloc uses an opd sym, find the code section. */
8623 opd_adjust = get_opd_info (sym_sec);
8624 if (opd_adjust != NULL)
8625 {
4c52953f
AM
8626 if (h == NULL)
8627 {
8628 long adjust;
8629
8630 adjust = opd_adjust[sym->st_value / 8];
8631 if (adjust == -1)
8632 /* Assume deleted functions won't ever be called. */
8633 continue;
8634 sym_value += adjust;
8635 }
8636
8637 dest = opd_entry_value (sym_sec, sym_value, &sym_sec, NULL);
8638 if (dest == (bfd_vma) -1)
8639 continue;
8640 }
8641 else
8642 dest = (sym_value
8643 + sym_sec->output_offset
8644 + sym_sec->output_section->vma);
8645
8646 /* Ignore branch to self. */
8647 if (sym_sec == isec)
8648 continue;
8649
8650 /* If the called function uses the toc, we need a stub. */
8651 if (sym_sec->has_toc_reloc
8652 || sym_sec->makes_toc_func_call)
8653 {
8654 ret = 1;
8655 break;
8656 }
8657
8658 /* Assume any branch that needs a long branch stub might in fact
8659 need a plt_branch stub. A plt_branch stub uses r2. */
8660 else if (dest - (isec->output_offset
8661 + isec->output_section->vma
8662 + rel->r_offset) + (1 << 25) >= (2 << 25))
9b5ecbd0
AM
8663 {
8664 ret = 1;
8665 break;
8666 }
4c52953f
AM
8667
8668 /* If calling back to a section in the process of being tested, we
8669 can't say for sure that no toc adjusting stubs are needed, so
8670 don't return zero. */
8671 else if (sym_sec->call_check_in_progress)
8672 ret = 2;
8673
8674 /* Branches to another section that itself doesn't have any TOC
8675 references are OK. Recursively call ourselves to check. */
8676 else if (sym_sec->id <= htab->top_id
8677 && htab->stub_group[sym_sec->id].toc_off == 0)
8678 {
8679 int recur;
8680
8681 /* Mark current section as indeterminate, so that other
8682 sections that call back to current won't be marked as
8683 known. */
8684 isec->call_check_in_progress = 1;
8685 recur = toc_adjusting_stub_needed (info, sym_sec);
8686 isec->call_check_in_progress = 0;
8687
8688 if (recur < 0)
8689 {
8690 /* An error. Exit. */
8691 ret = -1;
8692 break;
8693 }
8694 else if (recur <= 1)
8695 {
8696 /* Known result. Mark as checked and set section flag. */
8697 htab->stub_group[sym_sec->id].toc_off = 1;
8698 if (recur != 0)
8699 {
8700 sym_sec->makes_toc_func_call = 1;
8701 ret = 1;
8702 break;
8703 }
8704 }
8705 else
8706 {
8707 /* Unknown result. Continue checking. */
8708 ret = 2;
8709 }
8710 }
9b5ecbd0
AM
8711 }
8712
4c52953f
AM
8713 if (local_syms != NULL
8714 && (elf_tdata (isec->owner)->symtab_hdr.contents
8715 != (unsigned char *) local_syms))
8716 free (local_syms);
8717 if (elf_section_data (isec)->relocs != relstart)
8718 free (relstart);
8719
9b5ecbd0
AM
8720 return ret;
8721}
8722
721956f4
AM
8723/* The linker repeatedly calls this function for each input section,
8724 in the order that input sections are linked into output sections.
8725 Build lists of input sections to determine groupings between which
8726 we may insert linker stubs. */
8727
9b5ecbd0 8728bfd_boolean
4ce794b7 8729ppc64_elf_next_input_section (struct bfd_link_info *info, asection *isec)
721956f4
AM
8730{
8731 struct ppc_link_hash_table *htab = ppc_hash_table (info);
8732
734b6cf9
AM
8733 if ((isec->output_section->flags & SEC_CODE) != 0
8734 && isec->output_section->index <= htab->top_index)
721956f4 8735 {
734b6cf9 8736 asection **list = htab->input_list + isec->output_section->index;
3d6f9012 8737 /* Steal the link_sec pointer for our list. */
721956f4 8738#define PREV_SEC(sec) (htab->stub_group[(sec)->id].link_sec)
3d6f9012
AM
8739 /* This happens to make the list in reverse order,
8740 which is what we want. */
734b6cf9
AM
8741 PREV_SEC (isec) = *list;
8742 *list = isec;
721956f4 8743 }
ad8e1ba5 8744
4c52953f 8745 if (htab->multi_toc_needed)
9b5ecbd0 8746 {
4c52953f
AM
8747 /* If a code section has a function that uses the TOC then we need
8748 to use the right TOC (obviously). Also, make sure that .opd gets
8749 the correct TOC value for R_PPC64_TOC relocs that don't have or
8750 can't find their function symbol (shouldn't ever happen now). */
8751 if (isec->has_toc_reloc || (isec->flags & SEC_CODE) == 0)
8752 {
8753 if (elf_gp (isec->owner) != 0)
8754 htab->toc_curr = elf_gp (isec->owner);
8755 }
8756 else if (htab->stub_group[isec->id].toc_off == 0)
8757 {
8758 int ret = toc_adjusting_stub_needed (info, isec);
8759 if (ret < 0)
8760 return FALSE;
8761 else
8762 isec->makes_toc_func_call = ret & 1;
8763 }
9b5ecbd0 8764 }
ad8e1ba5
AM
8765
8766 /* Functions that don't use the TOC can belong in any TOC group.
8767 Use the last TOC base. This happens to make _init and _fini
8768 pasting work. */
8769 htab->stub_group[isec->id].toc_off = htab->toc_curr;
9b5ecbd0 8770 return TRUE;
721956f4
AM
8771}
8772
8773/* See whether we can group stub sections together. Grouping stub
8774 sections may result in fewer stubs. More importantly, we need to
8775 put all .init* and .fini* stubs at the beginning of the .init or
8776 .fini output sections respectively, because glibc splits the
8777 _init and _fini functions into multiple parts. Putting a stub in
8778 the middle of a function is not a good idea. */
8779
8780static void
4ce794b7
AM
8781group_sections (struct ppc_link_hash_table *htab,
8782 bfd_size_type stub_group_size,
8783 bfd_boolean stubs_always_before_branch)
721956f4 8784{
734b6cf9
AM
8785 asection **list = htab->input_list + htab->top_index;
8786 do
721956f4 8787 {
734b6cf9
AM
8788 asection *tail = *list;
8789 while (tail != NULL)
721956f4 8790 {
734b6cf9
AM
8791 asection *curr;
8792 asection *prev;
8793 bfd_size_type total;
8794 bfd_boolean big_sec;
8795 bfd_vma curr_toc;
8796
8797 curr = tail;
eea6121a 8798 total = tail->size;
5c3dead3
AM
8799 big_sec = total > stub_group_size;
8800 if (big_sec)
8801 (*_bfd_error_handler) (_("%B section %A exceeds stub group size"),
8802 tail->owner, tail);
734b6cf9
AM
8803 curr_toc = htab->stub_group[tail->id].toc_off;
8804
8805 while ((prev = PREV_SEC (curr)) != NULL
8806 && ((total += curr->output_offset - prev->output_offset)
ad8e1ba5
AM
8807 < stub_group_size)
8808 && htab->stub_group[prev->id].toc_off == curr_toc)
734b6cf9
AM
8809 curr = prev;
8810
8811 /* OK, the size from the start of CURR to the end is less
8812 than stub_group_size and thus can be handled by one stub
8813 section. (or the tail section is itself larger than
8814 stub_group_size, in which case we may be toast.) We
8815 should really be keeping track of the total size of stubs
8816 added here, as stubs contribute to the final output
8817 section size. That's a little tricky, and this way will
8818 only break if stubs added make the total size more than
8819 2^25, ie. for the default stub_group_size, if stubs total
8820 more than 2097152 bytes, or nearly 75000 plt call stubs. */
8821 do
721956f4
AM
8822 {
8823 prev = PREV_SEC (tail);
734b6cf9 8824 /* Set up this stub group. */
721956f4
AM
8825 htab->stub_group[tail->id].link_sec = curr;
8826 }
734b6cf9
AM
8827 while (tail != curr && (tail = prev) != NULL);
8828
8829 /* But wait, there's more! Input sections up to stub_group_size
8830 bytes before the stub section can be handled by it too.
8831 Don't do this if we have a really large section after the
8832 stubs, as adding more stubs increases the chance that
8833 branches may not reach into the stub section. */
8834 if (!stubs_always_before_branch && !big_sec)
8835 {
8836 total = 0;
8837 while (prev != NULL
8838 && ((total += tail->output_offset - prev->output_offset)
8839 < stub_group_size)
8840 && htab->stub_group[prev->id].toc_off == curr_toc)
8841 {
8842 tail = prev;
8843 prev = PREV_SEC (tail);
8844 htab->stub_group[tail->id].link_sec = curr;
8845 }
8846 }
8847 tail = prev;
721956f4
AM
8848 }
8849 }
734b6cf9
AM
8850 while (list-- != htab->input_list);
8851 free (htab->input_list);
721956f4
AM
8852#undef PREV_SEC
8853}
8854
721956f4
AM
8855/* Determine and set the size of the stub section for a final link.
8856
8857 The basic idea here is to examine all the relocations looking for
8858 PC-relative calls to a target that is unreachable with a "bl"
8859 instruction. */
8860
b34976b6 8861bfd_boolean
4ce794b7 8862ppc64_elf_size_stubs (bfd *output_bfd,
4ce794b7
AM
8863 struct bfd_link_info *info,
8864 bfd_signed_vma group_size,
8865 asection *(*add_stub_section) (const char *, asection *),
8866 void (*layout_sections_again) (void))
721956f4
AM
8867{
8868 bfd_size_type stub_group_size;
b34976b6 8869 bfd_boolean stubs_always_before_branch;
721956f4
AM
8870 struct ppc_link_hash_table *htab = ppc_hash_table (info);
8871
8872 /* Stash our params away. */
721956f4
AM
8873 htab->add_stub_section = add_stub_section;
8874 htab->layout_sections_again = layout_sections_again;
8875 stubs_always_before_branch = group_size < 0;
8876 if (group_size < 0)
8877 stub_group_size = -group_size;
8878 else
8879 stub_group_size = group_size;
8880 if (stub_group_size == 1)
8881 {
8882 /* Default values. */
58ac9f71
AM
8883 if (stubs_always_before_branch)
8884 {
8885 stub_group_size = 0x1e00000;
8886 if (htab->has_14bit_branch)
8887 stub_group_size = 0x7800;
8888 }
8889 else
8890 {
8891 stub_group_size = 0x1c00000;
8892 if (htab->has_14bit_branch)
8893 stub_group_size = 0x7000;
8894 }
721956f4
AM
8895 }
8896
8897 group_sections (htab, stub_group_size, stubs_always_before_branch);
8898
721956f4
AM
8899 while (1)
8900 {
8901 bfd *input_bfd;
8902 unsigned int bfd_indx;
8903 asection *stub_sec;
721956f4
AM
8904
8905 htab->stub_iteration += 1;
721956f4
AM
8906
8907 for (input_bfd = info->input_bfds, bfd_indx = 0;
8908 input_bfd != NULL;
8909 input_bfd = input_bfd->link_next, bfd_indx++)
8910 {
8911 Elf_Internal_Shdr *symtab_hdr;
8912 asection *section;
6cdc0ccc 8913 Elf_Internal_Sym *local_syms = NULL;
721956f4 8914
67f93c31
AM
8915 if (!is_ppc64_elf_target (input_bfd->xvec))
8916 continue;
8917
721956f4
AM
8918 /* We'll need the symbol table in a second. */
8919 symtab_hdr = &elf_tdata (input_bfd)->symtab_hdr;
8920 if (symtab_hdr->sh_info == 0)
8921 continue;
8922
721956f4
AM
8923 /* Walk over each section attached to the input bfd. */
8924 for (section = input_bfd->sections;
8925 section != NULL;
8926 section = section->next)
8927 {
721956f4 8928 Elf_Internal_Rela *internal_relocs, *irelaend, *irela;
721956f4
AM
8929
8930 /* If there aren't any relocs, then there's nothing more
8931 to do. */
8932 if ((section->flags & SEC_RELOC) == 0
8933 || section->reloc_count == 0)
8934 continue;
8935
8936 /* If this section is a link-once section that will be
8937 discarded, then don't create any stubs. */
8938 if (section->output_section == NULL
8939 || section->output_section->owner != output_bfd)
8940 continue;
8941
1e2f5b6e
AM
8942 /* Get the relocs. */
8943 internal_relocs
4ce794b7 8944 = _bfd_elf_link_read_relocs (input_bfd, section, NULL, NULL,
45d6a902 8945 info->keep_memory);
721956f4 8946 if (internal_relocs == NULL)
1e2f5b6e 8947 goto error_ret_free_local;
721956f4
AM
8948
8949 /* Now examine each relocation. */
8950 irela = internal_relocs;
8951 irelaend = irela + section->reloc_count;
8952 for (; irela < irelaend; irela++)
8953 {
4ce794b7
AM
8954 enum elf_ppc64_reloc_type r_type;
8955 unsigned int r_indx;
721956f4
AM
8956 enum ppc_stub_type stub_type;
8957 struct ppc_stub_hash_entry *stub_entry;
8387904d 8958 asection *sym_sec, *code_sec;
721956f4
AM
8959 bfd_vma sym_value;
8960 bfd_vma destination;
8843416a 8961 bfd_boolean ok_dest;
721956f4 8962 struct ppc_link_hash_entry *hash;
8387904d 8963 struct ppc_link_hash_entry *fdh;
411e1bfb
AM
8964 struct elf_link_hash_entry *h;
8965 Elf_Internal_Sym *sym;
721956f4
AM
8966 char *stub_name;
8967 const asection *id_sec;
8387904d 8968 long *opd_adjust;
721956f4
AM
8969
8970 r_type = ELF64_R_TYPE (irela->r_info);
8971 r_indx = ELF64_R_SYM (irela->r_info);
8972
4ce794b7 8973 if (r_type >= R_PPC64_max)
721956f4
AM
8974 {
8975 bfd_set_error (bfd_error_bad_value);
6cdc0ccc 8976 goto error_ret_free_internal;
721956f4
AM
8977 }
8978
8979 /* Only look for stubs on branch instructions. */
4ce794b7
AM
8980 if (r_type != R_PPC64_REL24
8981 && r_type != R_PPC64_REL14
8982 && r_type != R_PPC64_REL14_BRTAKEN
8983 && r_type != R_PPC64_REL14_BRNTAKEN)
721956f4
AM
8984 continue;
8985
8986 /* Now determine the call target, its name, value,
8987 section. */
411e1bfb
AM
8988 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms,
8989 r_indx, input_bfd))
8990 goto error_ret_free_internal;
8991 hash = (struct ppc_link_hash_entry *) h;
8992
8843416a 8993 ok_dest = FALSE;
8387904d 8994 fdh = NULL;
7fe2b9a6 8995 sym_value = 0;
411e1bfb 8996 if (hash == NULL)
721956f4 8997 {
411e1bfb 8998 sym_value = sym->st_value;
8843416a 8999 ok_dest = TRUE;
721956f4 9000 }
7fe2b9a6
AM
9001 else if (hash->elf.root.type == bfd_link_hash_defined
9002 || hash->elf.root.type == bfd_link_hash_defweak)
9003 {
9004 sym_value = hash->elf.root.u.def.value;
9005 if (sym_sec->output_section != NULL)
9006 ok_dest = TRUE;
9007 }
9008 else if (hash->elf.root.type == bfd_link_hash_undefweak
9009 || hash->elf.root.type == bfd_link_hash_undefined)
721956f4 9010 {
99877b66 9011 /* Recognise an old ABI func code entry sym, and
7fe2b9a6
AM
9012 use the func descriptor sym instead if it is
9013 defined. */
ceb1f1ef 9014 if (hash->elf.root.root.string[0] == '.'
8387904d
AM
9015 && (fdh = get_fdh (hash, htab)) != NULL)
9016 {
8387904d
AM
9017 if (fdh->elf.root.type == bfd_link_hash_defined
9018 || fdh->elf.root.type == bfd_link_hash_defweak)
9019 {
9020 sym_sec = fdh->elf.root.u.def.section;
9021 sym_value = fdh->elf.root.u.def.value;
9022 if (sym_sec->output_section != NULL)
9023 ok_dest = TRUE;
9024 }
99877b66
AM
9025 else
9026 fdh = NULL;
8387904d 9027 }
7fe2b9a6
AM
9028 }
9029 else
9030 {
9031 bfd_set_error (bfd_error_bad_value);
9032 goto error_ret_free_internal;
721956f4
AM
9033 }
9034
8843416a
AM
9035 destination = 0;
9036 if (ok_dest)
9037 {
9038 sym_value += irela->r_addend;
9039 destination = (sym_value
9040 + sym_sec->output_offset
9041 + sym_sec->output_section->vma);
9042 }
9043
8387904d
AM
9044 code_sec = sym_sec;
9045 opd_adjust = get_opd_info (sym_sec);
9046 if (opd_adjust != NULL)
9047 {
9048 bfd_vma dest;
9049
9050 if (hash == NULL)
9051 {
3f764659 9052 long adjust = opd_adjust[sym_value / 8];
8387904d
AM
9053 if (adjust == -1)
9054 continue;
9055 sym_value += adjust;
9056 }
9057 dest = opd_entry_value (sym_sec, sym_value,
9058 &code_sec, &sym_value);
9059 if (dest != (bfd_vma) -1)
9060 {
9061 destination = dest;
9062 if (fdh != NULL)
9063 {
9064 /* Fixup old ABI sym to point at code
9065 entry. */
99877b66 9066 hash->elf.root.type = bfd_link_hash_defweak;
8387904d
AM
9067 hash->elf.root.u.def.section = code_sec;
9068 hash->elf.root.u.def.value = sym_value;
9069 }
9070 }
9071 }
9072
721956f4
AM
9073 /* Determine what (if any) linker stub is needed. */
9074 stub_type = ppc_type_of_stub (section, irela, &hash,
9075 destination);
ad8e1ba5
AM
9076
9077 if (stub_type != ppc_stub_plt_call)
9078 {
9079 /* Check whether we need a TOC adjusting stub.
9080 Since the linker pastes together pieces from
9081 different object files when creating the
9082 _init and _fini functions, it may be that a
9083 call to what looks like a local sym is in
9084 fact a call needing a TOC adjustment. */
8387904d
AM
9085 if (code_sec != NULL
9086 && code_sec->output_section != NULL
9087 && (htab->stub_group[code_sec->id].toc_off
9b5ecbd0 9088 != htab->stub_group[section->id].toc_off)
4c52953f
AM
9089 && (code_sec->has_toc_reloc
9090 || code_sec->makes_toc_func_call))
ad8e1ba5
AM
9091 stub_type = ppc_stub_long_branch_r2off;
9092 }
9093
721956f4
AM
9094 if (stub_type == ppc_stub_none)
9095 continue;
9096
411e1bfb
AM
9097 /* __tls_get_addr calls might be eliminated. */
9098 if (stub_type != ppc_stub_plt_call
9099 && hash != NULL
8387904d
AM
9100 && (hash == htab->tls_get_addr
9101 || hash == htab->tls_get_addr_fd)
411e1bfb
AM
9102 && section->has_tls_reloc
9103 && irela != internal_relocs)
9104 {
9105 /* Get tls info. */
e7b938ca 9106 char *tls_mask;
411e1bfb 9107
0d4792f7 9108 if (!get_tls_mask (&tls_mask, NULL, &local_syms,
411e1bfb
AM
9109 irela - 1, input_bfd))
9110 goto error_ret_free_internal;
e7b938ca 9111 if (*tls_mask != 0)
411e1bfb
AM
9112 continue;
9113 }
9114
721956f4
AM
9115 /* Support for grouping stub sections. */
9116 id_sec = htab->stub_group[section->id].link_sec;
9117
9118 /* Get the name of this stub. */
9119 stub_name = ppc_stub_name (id_sec, sym_sec, hash, irela);
9120 if (!stub_name)
9121 goto error_ret_free_internal;
9122
9123 stub_entry = ppc_stub_hash_lookup (&htab->stub_hash_table,
b34976b6 9124 stub_name, FALSE, FALSE);
721956f4
AM
9125 if (stub_entry != NULL)
9126 {
9127 /* The proper stub has already been created. */
9128 free (stub_name);
9129 continue;
9130 }
9131
9132 stub_entry = ppc_add_stub (stub_name, section, htab);
9133 if (stub_entry == NULL)
9134 {
9135 free (stub_name);
6cdc0ccc
AM
9136 error_ret_free_internal:
9137 if (elf_section_data (section)->relocs == NULL)
9138 free (internal_relocs);
9139 error_ret_free_local:
9140 if (local_syms != NULL
9141 && (symtab_hdr->contents
9142 != (unsigned char *) local_syms))
9143 free (local_syms);
b34976b6 9144 return FALSE;
721956f4
AM
9145 }
9146
ad8e1ba5 9147 stub_entry->stub_type = stub_type;
721956f4 9148 stub_entry->target_value = sym_value;
8387904d 9149 stub_entry->target_section = code_sec;
721956f4 9150 stub_entry->h = hash;
411e1bfb 9151 stub_entry->addend = irela->r_addend;
ee75fd95
AM
9152
9153 if (stub_entry->h != NULL)
9154 htab->stub_globals += 1;
721956f4
AM
9155 }
9156
9157 /* We're done with the internal relocs, free them. */
6cdc0ccc 9158 if (elf_section_data (section)->relocs != internal_relocs)
1e2f5b6e 9159 free (internal_relocs);
721956f4 9160 }
6cdc0ccc
AM
9161
9162 if (local_syms != NULL
9163 && symtab_hdr->contents != (unsigned char *) local_syms)
9164 {
9165 if (!info->keep_memory)
9166 free (local_syms);
9167 else
9168 symtab_hdr->contents = (unsigned char *) local_syms;
9169 }
721956f4
AM
9170 }
9171
5c3dead3 9172 /* We may have added some stubs. Find out the new size of the
721956f4
AM
9173 stub sections. */
9174 for (stub_sec = htab->stub_bfd->sections;
9175 stub_sec != NULL;
9176 stub_sec = stub_sec->next)
e717da7e 9177 if ((stub_sec->flags & SEC_LINKER_CREATED) == 0)
ee75fd95 9178 {
5c3dead3 9179 stub_sec->rawsize = stub_sec->size;
ee75fd95
AM
9180 stub_sec->size = 0;
9181 stub_sec->reloc_count = 0;
9182 }
eea6121a
AM
9183
9184 htab->brlt->size = 0;
ee75fd95 9185 if (htab->relbrlt != NULL)
eea6121a 9186 htab->relbrlt->size = 0;
721956f4 9187
63bc6f6c 9188 bfd_hash_traverse (&htab->stub_hash_table, ppc_size_one_stub, info);
721956f4 9189
5c3dead3
AM
9190 for (stub_sec = htab->stub_bfd->sections;
9191 stub_sec != NULL;
9192 stub_sec = stub_sec->next)
9193 if ((stub_sec->flags & SEC_LINKER_CREATED) == 0
9194 && stub_sec->rawsize != stub_sec->size)
9195 break;
9196
9197 /* Exit from this loop when no stubs have been added, and no stubs
9198 have changed size. */
9199 if (stub_sec == NULL)
9200 break;
9201
721956f4
AM
9202 /* Ask the linker to do its stuff. */
9203 (*htab->layout_sections_again) ();
9204 }
9205
c456f082 9206 /* It would be nice to strip htab->brlt from the output if the
afbe61cf
AM
9207 section is empty, but it's too late. If we strip sections here,
9208 the dynamic symbol table is corrupted since the section symbol
9209 for the stripped section isn't written. */
721956f4 9210
b34976b6 9211 return TRUE;
721956f4
AM
9212}
9213
9214/* Called after we have determined section placement. If sections
805fc799 9215 move, we'll be called again. Provide a value for TOCstart. */
721956f4 9216
805fc799 9217bfd_vma
4ce794b7 9218ppc64_elf_toc (bfd *obfd)
721956f4 9219{
805fc799
AM
9220 asection *s;
9221 bfd_vma TOCstart;
721956f4 9222
805fc799
AM
9223 /* The TOC consists of sections .got, .toc, .tocbss, .plt in that
9224 order. The TOC starts where the first of these sections starts. */
9225 s = bfd_get_section_by_name (obfd, ".got");
9226 if (s == NULL)
9227 s = bfd_get_section_by_name (obfd, ".toc");
9228 if (s == NULL)
9229 s = bfd_get_section_by_name (obfd, ".tocbss");
9230 if (s == NULL)
9231 s = bfd_get_section_by_name (obfd, ".plt");
9232 if (s == NULL)
9233 {
9234 /* This may happen for
9235 o references to TOC base (SYM@toc / TOC[tc0]) without a
9236 .toc directive
9237 o bad linker script
9238 o --gc-sections and empty TOC sections
9239
9240 FIXME: Warn user? */
9241
9242 /* Look for a likely section. We probably won't even be
9243 using TOCstart. */
9244 for (s = obfd->sections; s != NULL; s = s->next)
9245 if ((s->flags & (SEC_ALLOC | SEC_SMALL_DATA | SEC_READONLY))
9246 == (SEC_ALLOC | SEC_SMALL_DATA))
9247 break;
721956f4 9248 if (s == NULL)
805fc799
AM
9249 for (s = obfd->sections; s != NULL; s = s->next)
9250 if ((s->flags & (SEC_ALLOC | SEC_SMALL_DATA))
9251 == (SEC_ALLOC | SEC_SMALL_DATA))
9252 break;
721956f4 9253 if (s == NULL)
805fc799
AM
9254 for (s = obfd->sections; s != NULL; s = s->next)
9255 if ((s->flags & (SEC_ALLOC | SEC_READONLY)) == SEC_ALLOC)
9256 break;
721956f4 9257 if (s == NULL)
805fc799
AM
9258 for (s = obfd->sections; s != NULL; s = s->next)
9259 if ((s->flags & SEC_ALLOC) == SEC_ALLOC)
9260 break;
9261 }
721956f4 9262
805fc799
AM
9263 TOCstart = 0;
9264 if (s != NULL)
9265 TOCstart = s->output_section->vma + s->output_offset;
721956f4 9266
805fc799 9267 return TOCstart;
721956f4
AM
9268}
9269
9270/* Build all the stubs associated with the current output file.
9271 The stubs are kept in a hash table attached to the main linker
9272 hash table. This function is called via gldelf64ppc_finish. */
9273
b34976b6 9274bfd_boolean
4ce794b7
AM
9275ppc64_elf_build_stubs (bfd_boolean emit_stub_syms,
9276 struct bfd_link_info *info,
9277 char **stats)
5d1634d7
AM
9278{
9279 struct ppc_link_hash_table *htab = ppc_hash_table (info);
721956f4 9280 asection *stub_sec;
5d1634d7 9281 bfd_byte *p;
e717da7e 9282 int stub_sec_count = 0;
5d1634d7 9283
ad8e1ba5 9284 htab->emit_stub_syms = emit_stub_syms;
eea6121a
AM
9285
9286 /* Allocate memory to hold the linker stubs. */
721956f4
AM
9287 for (stub_sec = htab->stub_bfd->sections;
9288 stub_sec != NULL;
9289 stub_sec = stub_sec->next)
eea6121a
AM
9290 if ((stub_sec->flags & SEC_LINKER_CREATED) == 0
9291 && stub_sec->size != 0)
e717da7e 9292 {
eea6121a
AM
9293 stub_sec->contents = bfd_zalloc (htab->stub_bfd, stub_sec->size);
9294 if (stub_sec->contents == NULL)
9295 return FALSE;
9296 /* We want to check that built size is the same as calculated
9297 size. rawsize is a convenient location to use. */
9298 stub_sec->rawsize = stub_sec->size;
9299 stub_sec->size = 0;
e717da7e 9300 }
5d1634d7 9301
4ce794b7 9302 if (htab->plt != NULL)
5d1634d7 9303 {
9f951329 9304 unsigned int indx;
ad8e1ba5 9305 bfd_vma plt0;
9f951329 9306
721956f4 9307 /* Build the .glink plt call stub. */
4ce794b7
AM
9308 plt0 = (htab->plt->output_section->vma
9309 + htab->plt->output_offset
9310 - (htab->glink->output_section->vma
9311 + htab->glink->output_offset
ad8e1ba5
AM
9312 + GLINK_CALL_STUB_SIZE));
9313 if (plt0 + 0x80008000 > 0xffffffff)
721956f4 9314 {
ad8e1ba5
AM
9315 (*_bfd_error_handler) (_(".glink and .plt too far apart"));
9316 bfd_set_error (bfd_error_bad_value);
9317 return FALSE;
721956f4 9318 }
721956f4 9319
97b639ba
AM
9320 if (htab->emit_stub_syms)
9321 {
9322 struct elf_link_hash_entry *h;
9323 h = elf_link_hash_lookup (&htab->elf, "__glink", TRUE, FALSE, FALSE);
9324 if (h == NULL)
9325 return FALSE;
9326 if (h->root.type == bfd_link_hash_new)
9327 {
9328 h->root.type = bfd_link_hash_defined;
9329 h->root.u.def.section = htab->glink;
9330 h->root.u.def.value = 0;
f5385ebf
AM
9331 h->ref_regular = 1;
9332 h->def_regular = 1;
9333 h->ref_regular_nonweak = 1;
9334 h->forced_local = 1;
9335 h->non_elf = 0;
97b639ba
AM
9336 }
9337 }
4ce794b7
AM
9338 p = htab->glink->contents;
9339 bfd_put_32 (htab->glink->owner, MFCTR_R12, p);
ad8e1ba5 9340 p += 4;
4ce794b7 9341 bfd_put_32 (htab->glink->owner, SLDI_R11_R0_3, p);
ad8e1ba5 9342 p += 4;
4ce794b7 9343 bfd_put_32 (htab->glink->owner, ADDIC_R2_R0_32K, p);
ad8e1ba5 9344 p += 4;
4ce794b7 9345 bfd_put_32 (htab->glink->owner, SUB_R12_R12_R11, p);
ad8e1ba5 9346 p += 4;
4ce794b7 9347 bfd_put_32 (htab->glink->owner, SRADI_R2_R2_63, p);
ad8e1ba5 9348 p += 4;
4ce794b7 9349 bfd_put_32 (htab->glink->owner, SLDI_R11_R0_2, p);
ad8e1ba5 9350 p += 4;
4ce794b7 9351 bfd_put_32 (htab->glink->owner, AND_R2_R2_R11, p);
ad8e1ba5 9352 p += 4;
4ce794b7 9353 bfd_put_32 (htab->glink->owner, SUB_R12_R12_R11, p);
ad8e1ba5 9354 p += 4;
4ce794b7 9355 bfd_put_32 (htab->glink->owner, ADD_R12_R12_R2, p);
ad8e1ba5 9356 p += 4;
4ce794b7 9357 bfd_put_32 (htab->glink->owner, ADDIS_R12_R12 | PPC_HA (plt0), p);
ad8e1ba5 9358 p += 4;
4ce794b7 9359 bfd_put_32 (htab->glink->owner, LD_R11_0R12 | PPC_LO (plt0), p);
ad8e1ba5 9360 p += 4;
4ce794b7 9361 bfd_put_32 (htab->glink->owner, ADDI_R12_R12 | PPC_LO (plt0), p);
ad8e1ba5 9362 p += 4;
4ce794b7 9363 bfd_put_32 (htab->glink->owner, LD_R2_0R12 | 8, p);
ad8e1ba5 9364 p += 4;
4ce794b7 9365 bfd_put_32 (htab->glink->owner, MTCTR_R11, p);
ad8e1ba5 9366 p += 4;
4ce794b7 9367 bfd_put_32 (htab->glink->owner, LD_R11_0R12 | 16, p);
ad8e1ba5 9368 p += 4;
4ce794b7 9369 bfd_put_32 (htab->glink->owner, BCTR, p);
ad8e1ba5
AM
9370 p += 4;
9371
9f951329
AM
9372 /* Build the .glink lazy link call stubs. */
9373 indx = 0;
eea6121a 9374 while (p < htab->glink->contents + htab->glink->size)
9f951329
AM
9375 {
9376 if (indx < 0x8000)
9377 {
4ce794b7 9378 bfd_put_32 (htab->glink->owner, LI_R0_0 | indx, p);
9f951329
AM
9379 p += 4;
9380 }
9381 else
9382 {
4ce794b7 9383 bfd_put_32 (htab->glink->owner, LIS_R0_0 | PPC_HI (indx), p);
9f951329 9384 p += 4;
4ce794b7 9385 bfd_put_32 (htab->glink->owner, ORI_R0_R0_0 | PPC_LO (indx), p);
9f951329
AM
9386 p += 4;
9387 }
4ce794b7
AM
9388 bfd_put_32 (htab->glink->owner,
9389 B_DOT | ((htab->glink->contents - p) & 0x3fffffc), p);
a16d5acb 9390 indx++;
9f951329
AM
9391 p += 4;
9392 }
eea6121a 9393 htab->glink->rawsize = p - htab->glink->contents;
5d1634d7 9394 }
5d1634d7 9395
eea6121a 9396 if (htab->brlt->size != 0)
721956f4 9397 {
4ce794b7 9398 htab->brlt->contents = bfd_zalloc (htab->brlt->owner,
eea6121a 9399 htab->brlt->size);
4ce794b7 9400 if (htab->brlt->contents == NULL)
b34976b6 9401 return FALSE;
721956f4 9402 }
ee75fd95 9403 if (htab->relbrlt != NULL && htab->relbrlt->size != 0)
63bc6f6c
AM
9404 {
9405 htab->relbrlt->contents = bfd_zalloc (htab->relbrlt->owner,
eea6121a 9406 htab->relbrlt->size);
63bc6f6c
AM
9407 if (htab->relbrlt->contents == NULL)
9408 return FALSE;
9409 }
5d1634d7 9410
721956f4
AM
9411 /* Build the stubs as directed by the stub hash table. */
9412 bfd_hash_traverse (&htab->stub_hash_table, ppc_build_one_stub, info);
5d1634d7 9413
721956f4
AM
9414 for (stub_sec = htab->stub_bfd->sections;
9415 stub_sec != NULL;
9416 stub_sec = stub_sec->next)
e717da7e
AM
9417 if ((stub_sec->flags & SEC_LINKER_CREATED) == 0)
9418 {
9419 stub_sec_count += 1;
eea6121a 9420 if (stub_sec->rawsize != stub_sec->size)
e717da7e
AM
9421 break;
9422 }
5d1634d7 9423
721956f4 9424 if (stub_sec != NULL
eea6121a 9425 || htab->glink->rawsize != htab->glink->size)
5d1634d7 9426 {
b34976b6 9427 htab->stub_error = TRUE;
721956f4 9428 (*_bfd_error_handler) (_("stubs don't match calculated size"));
5d1634d7 9429 }
721956f4 9430
d2a300cf
AM
9431 if (htab->stub_error)
9432 return FALSE;
9433
9434 if (stats != NULL)
9435 {
9436 *stats = bfd_malloc (500);
9437 if (*stats == NULL)
9438 return FALSE;
9439
ee75fd95 9440 sprintf (*stats, _("linker stubs in %u group%s\n"
d2a300cf
AM
9441 " branch %lu\n"
9442 " toc adjust %lu\n"
9443 " long branch %lu\n"
9444 " long toc adj %lu\n"
9445 " plt call %lu"),
e717da7e 9446 stub_sec_count,
ee75fd95 9447 stub_sec_count == 1 ? "" : "s",
4ce794b7
AM
9448 htab->stub_count[ppc_stub_long_branch - 1],
9449 htab->stub_count[ppc_stub_long_branch_r2off - 1],
9450 htab->stub_count[ppc_stub_plt_branch - 1],
9451 htab->stub_count[ppc_stub_plt_branch_r2off - 1],
9452 htab->stub_count[ppc_stub_plt_call - 1]);
d2a300cf
AM
9453 }
9454 return TRUE;
5bd4f169
AM
9455}
9456
99877b66
AM
9457/* This function undoes the changes made by add_symbol_adjust. */
9458
9459static bfd_boolean
9460undo_symbol_twiddle (struct elf_link_hash_entry *h, void *inf ATTRIBUTE_UNUSED)
9461{
9462 struct ppc_link_hash_entry *eh;
9463
9464 if (h->root.type == bfd_link_hash_indirect)
9465 return TRUE;
9466
9467 if (h->root.type == bfd_link_hash_warning)
9468 h = (struct elf_link_hash_entry *) h->root.u.i.link;
9469
9470 eh = (struct ppc_link_hash_entry *) h;
9471 if (eh->elf.root.type != bfd_link_hash_undefweak || !eh->was_undefined)
9472 return TRUE;
9473
9474 eh->elf.root.type = bfd_link_hash_undefined;
9475 return TRUE;
9476}
9477
9478void
9479ppc64_elf_restore_symbols (struct bfd_link_info *info)
9480{
9481 struct ppc_link_hash_table *htab = ppc_hash_table (info);
9482 elf_link_hash_traverse (&htab->elf, undo_symbol_twiddle, info);
9483}
9484
60124e18
AM
9485/* What to do when ld finds relocations against symbols defined in
9486 discarded sections. */
9487
9488static unsigned int
9489ppc64_elf_action_discarded (asection *sec)
9490{
9491 if (strcmp (".opd", sec->name) == 0)
9492 return 0;
9493
9494 if (strcmp (".toc", sec->name) == 0)
9495 return 0;
9496
9497 return _bfd_elf_default_action_discarded (sec);
9498}
9499
5bd4f169
AM
9500/* The RELOCATE_SECTION function is called by the ELF backend linker
9501 to handle the relocations for a section.
9502
9503 The relocs are always passed as Rela structures; if the section
9504 actually uses Rel structures, the r_addend field will always be
9505 zero.
9506
9507 This function is responsible for adjust the section contents as
9508 necessary, and (if using Rela relocs and generating a
1049f94e 9509 relocatable output file) adjusting the reloc addend as
5bd4f169
AM
9510 necessary.
9511
9512 This function does not have to worry about setting the reloc
9513 address or the reloc symbol index.
9514
9515 LOCAL_SYMS is a pointer to the swapped in local symbols.
9516
9517 LOCAL_SECTIONS is an array giving the section in the input file
9518 corresponding to the st_shndx field of each local symbol.
9519
9520 The global hash table entry for the global symbols can be found
9521 via elf_sym_hashes (input_bfd).
9522
1049f94e 9523 When generating relocatable output, this function must handle
5bd4f169
AM
9524 STB_LOCAL/STT_SECTION symbols specially. The output symbol is
9525 going to be the section symbol corresponding to the output
9526 section, which means that the addend must be adjusted
9527 accordingly. */
9528
b34976b6 9529static bfd_boolean
4ce794b7
AM
9530ppc64_elf_relocate_section (bfd *output_bfd,
9531 struct bfd_link_info *info,
9532 bfd *input_bfd,
9533 asection *input_section,
9534 bfd_byte *contents,
9535 Elf_Internal_Rela *relocs,
9536 Elf_Internal_Sym *local_syms,
9537 asection **local_sections)
5bd4f169 9538{
65f38f15 9539 struct ppc_link_hash_table *htab;
5bd4f169
AM
9540 Elf_Internal_Shdr *symtab_hdr;
9541 struct elf_link_hash_entry **sym_hashes;
5bd4f169
AM
9542 Elf_Internal_Rela *rel;
9543 Elf_Internal_Rela *relend;
411e1bfb
AM
9544 Elf_Internal_Rela outrel;
9545 bfd_byte *loc;
411e1bfb 9546 struct got_entry **local_got_ents;
5bd4f169 9547 bfd_vma TOCstart;
b34976b6
AM
9548 bfd_boolean ret = TRUE;
9549 bfd_boolean is_opd;
96e0dda4 9550 /* Disabled until we sort out how ld should choose 'y' vs 'at'. */
b34976b6 9551 bfd_boolean is_power4 = FALSE;
5bd4f169 9552
1049f94e 9553 if (info->relocatable)
b34976b6 9554 return TRUE;
b491616a 9555
65f38f15 9556 /* Initialize howto table if needed. */
5bd4f169 9557 if (!ppc64_elf_howto_table[R_PPC64_ADDR32])
5bd4f169
AM
9558 ppc_howto_init ();
9559
65f38f15 9560 htab = ppc_hash_table (info);
ee75fd95
AM
9561
9562 /* Don't relocate stub sections. */
9563 if (input_section->owner == htab->stub_bfd)
9564 return TRUE;
9565
411e1bfb 9566 local_got_ents = elf_local_got_ents (input_bfd);
5bd4f169 9567 TOCstart = elf_gp (output_bfd);
5bd4f169
AM
9568 symtab_hdr = &elf_tdata (input_bfd)->symtab_hdr;
9569 sym_hashes = elf_sym_hashes (input_bfd);
f0abc2a1 9570 is_opd = ppc64_elf_section_data (input_section)->opd.adjust != NULL;
65f38f15 9571
5bd4f169
AM
9572 rel = relocs;
9573 relend = relocs + input_section->reloc_count;
9574 for (; rel < relend; rel++)
9575 {
04c9666a 9576 enum elf_ppc64_reloc_type r_type;
5bd4f169
AM
9577 bfd_vma addend;
9578 bfd_reloc_status_type r;
9579 Elf_Internal_Sym *sym;
9580 asection *sec;
039b3fef
AM
9581 struct elf_link_hash_entry *h_elf;
9582 struct ppc_link_hash_entry *h;
9583 struct ppc_link_hash_entry *fdh;
5bd4f169 9584 const char *sym_name;
0d4792f7 9585 unsigned long r_symndx, toc_symndx;
951fd09b 9586 char tls_mask, tls_gd, tls_type;
0d4792f7 9587 char sym_type;
5bd4f169 9588 bfd_vma relocation;
b34976b6
AM
9589 bfd_boolean unresolved_reloc;
9590 bfd_boolean warned;
50bc7936 9591 unsigned long insn, mask;
721956f4
AM
9592 struct ppc_stub_hash_entry *stub_entry;
9593 bfd_vma max_br_offset;
9594 bfd_vma from;
5bd4f169 9595
4ce794b7 9596 r_type = ELF64_R_TYPE (rel->r_info);
5bd4f169 9597 r_symndx = ELF64_R_SYM (rel->r_info);
ee87f2da
AM
9598
9599 /* For old style R_PPC64_TOC relocs with a zero symbol, use the
9600 symbol of the previous ADDR64 reloc. The symbol gives us the
9601 proper TOC base to use. */
9602 if (rel->r_info == ELF64_R_INFO (0, R_PPC64_TOC)
9603 && rel != relocs
9604 && ELF64_R_TYPE (rel[-1].r_info) == R_PPC64_ADDR64
9605 && is_opd)
9606 r_symndx = ELF64_R_SYM (rel[-1].r_info);
9607
4ce794b7
AM
9608 sym = NULL;
9609 sec = NULL;
039b3fef 9610 h_elf = NULL;
4ce794b7 9611 sym_name = NULL;
b34976b6
AM
9612 unresolved_reloc = FALSE;
9613 warned = FALSE;
65f38f15 9614
0b13192e 9615 if (r_symndx < symtab_hdr->sh_info)
5bd4f169
AM
9616 {
9617 /* It's a local symbol. */
4025353c
AM
9618 long *opd_adjust;
9619
5bd4f169
AM
9620 sym = local_syms + r_symndx;
9621 sec = local_sections[r_symndx];
26c61ae5 9622 sym_name = bfd_elf_sym_name (input_bfd, symtab_hdr, sym, sec);
0d4792f7 9623 sym_type = ELF64_ST_TYPE (sym->st_info);
8517fae7 9624 relocation = _bfd_elf_rela_local_sym (output_bfd, sym, &sec, rel);
4025353c
AM
9625 opd_adjust = get_opd_info (sec);
9626 if (opd_adjust != NULL)
1e2f5b6e 9627 {
3f764659 9628 long adjust = opd_adjust[(sym->st_value + rel->r_addend) / 8];
4025353c
AM
9629 if (adjust == -1)
9630 relocation = 0;
9631 else
9632 relocation += adjust;
1e2f5b6e 9633 }
5bd4f169
AM
9634 }
9635 else
9636 {
b2a8e766
AM
9637 RELOC_FOR_GLOBAL_SYMBOL (info, input_bfd, input_section, rel,
9638 r_symndx, symtab_hdr, sym_hashes,
039b3fef 9639 h_elf, sec, relocation,
b2a8e766 9640 unresolved_reloc, warned);
039b3fef
AM
9641 sym_name = h_elf->root.root.string;
9642 sym_type = h_elf->type;
5bd4f169 9643 }
039b3fef 9644 h = (struct ppc_link_hash_entry *) h_elf;
5bd4f169 9645
951fd09b
AM
9646 /* TLS optimizations. Replace instruction sequences and relocs
9647 based on information we collected in tls_optimize. We edit
9648 RELOCS so that --emit-relocs will output something sensible
9649 for the final instruction stream. */
9650 tls_mask = 0;
9651 tls_gd = 0;
0d4792f7 9652 toc_symndx = 0;
d881513a 9653 if (IS_PPC64_TLS_RELOC (r_type))
411e1bfb
AM
9654 {
9655 if (h != NULL)
039b3fef 9656 tls_mask = h->tls_mask;
411e1bfb
AM
9657 else if (local_got_ents != NULL)
9658 {
e7b938ca
AM
9659 char *lgot_masks;
9660 lgot_masks = (char *) (local_got_ents + symtab_hdr->sh_info);
9661 tls_mask = lgot_masks[r_symndx];
411e1bfb 9662 }
0d4792f7
AM
9663 if (tls_mask == 0 && r_type == R_PPC64_TLS)
9664 {
9665 /* Check for toc tls entries. */
9666 char *toc_tls;
9667
9668 if (!get_tls_mask (&toc_tls, &toc_symndx, &local_syms,
9669 rel, input_bfd))
9670 return FALSE;
9671
9672 if (toc_tls)
9673 tls_mask = *toc_tls;
9674 }
9675 }
9676
9677 /* Check that tls relocs are used with tls syms, and non-tls
9678 relocs are used with non-tls syms. */
9679 if (r_symndx != 0
9680 && r_type != R_PPC64_NONE
9681 && (h == NULL
039b3fef
AM
9682 || h->elf.root.type == bfd_link_hash_defined
9683 || h->elf.root.type == bfd_link_hash_defweak)
0d4792f7
AM
9684 && IS_PPC64_TLS_RELOC (r_type) != (sym_type == STT_TLS))
9685 {
9686 if (r_type == R_PPC64_TLS && tls_mask != 0)
9687 /* R_PPC64_TLS is OK against a symbol in the TOC. */
9688 ;
9689 else
9690 (*_bfd_error_handler)
9691 (sym_type == STT_TLS
d003868e
AM
9692 ? _("%B(%A+0x%lx): %s used with TLS symbol %s")
9693 : _("%B(%A+0x%lx): %s used with non-TLS symbol %s"),
9694 input_bfd,
9695 input_section,
0d4792f7
AM
9696 (long) rel->r_offset,
9697 ppc64_elf_howto_table[r_type]->name,
9698 sym_name);
411e1bfb
AM
9699 }
9700
9701 /* Ensure reloc mapping code below stays sane. */
9702 if (R_PPC64_TOC16_LO_DS != R_PPC64_TOC16_DS + 1
9703 || R_PPC64_TOC16_LO != R_PPC64_TOC16 + 1
9704 || (R_PPC64_GOT_TLSLD16 & 3) != (R_PPC64_GOT_TLSGD16 & 3)
9705 || (R_PPC64_GOT_TLSLD16_LO & 3) != (R_PPC64_GOT_TLSGD16_LO & 3)
9706 || (R_PPC64_GOT_TLSLD16_HI & 3) != (R_PPC64_GOT_TLSGD16_HI & 3)
9707 || (R_PPC64_GOT_TLSLD16_HA & 3) != (R_PPC64_GOT_TLSGD16_HA & 3)
9708 || (R_PPC64_GOT_TLSLD16 & 3) != (R_PPC64_GOT_TPREL16_DS & 3)
9709 || (R_PPC64_GOT_TLSLD16_LO & 3) != (R_PPC64_GOT_TPREL16_LO_DS & 3)
9710 || (R_PPC64_GOT_TLSLD16_HI & 3) != (R_PPC64_GOT_TPREL16_HI & 3)
9711 || (R_PPC64_GOT_TLSLD16_HA & 3) != (R_PPC64_GOT_TPREL16_HA & 3))
9712 abort ();
0d4792f7 9713
411e1bfb
AM
9714 switch (r_type)
9715 {
9716 default:
411e1bfb
AM
9717 break;
9718
9719 case R_PPC64_TOC16:
9720 case R_PPC64_TOC16_LO:
9721 case R_PPC64_TOC16_DS:
9722 case R_PPC64_TOC16_LO_DS:
411e1bfb
AM
9723 {
9724 /* Check for toc tls entries. */
9725 char *toc_tls;
951fd09b 9726 int retval;
411e1bfb 9727
0d4792f7
AM
9728 retval = get_tls_mask (&toc_tls, &toc_symndx, &local_syms,
9729 rel, input_bfd);
951fd09b 9730 if (retval == 0)
411e1bfb
AM
9731 return FALSE;
9732
9733 if (toc_tls)
9734 {
951fd09b 9735 tls_mask = *toc_tls;
411e1bfb
AM
9736 if (r_type == R_PPC64_TOC16_DS
9737 || r_type == R_PPC64_TOC16_LO_DS)
81407a69
AM
9738 {
9739 if (tls_mask != 0
9740 && (tls_mask & (TLS_DTPREL | TLS_TPREL)) == 0)
9741 goto toctprel;
9742 }
411e1bfb 9743 else
951fd09b
AM
9744 {
9745 /* If we found a GD reloc pair, then we might be
9746 doing a GD->IE transition. */
9747 if (retval == 2)
9748 {
9749 tls_gd = TLS_TPRELGD;
9750 if (tls_mask != 0 && (tls_mask & TLS_GD) == 0)
9751 goto tls_get_addr_check;
9752 }
9753 else if (retval == 3)
9754 {
9755 if (tls_mask != 0 && (tls_mask & TLS_LD) == 0)
9756 goto tls_get_addr_check;
9757 }
9758 }
411e1bfb
AM
9759 }
9760 }
9761 break;
9762
9763 case R_PPC64_GOT_TPREL16_DS:
9764 case R_PPC64_GOT_TPREL16_LO_DS:
951fd09b
AM
9765 if (tls_mask != 0
9766 && (tls_mask & TLS_TPREL) == 0)
411e1bfb 9767 {
81407a69 9768 toctprel:
411e1bfb
AM
9769 insn = bfd_get_32 (output_bfd, contents + rel->r_offset - 2);
9770 insn &= 31 << 21;
9771 insn |= 0x3c0d0000; /* addis 0,13,0 */
9772 bfd_put_32 (output_bfd, insn, contents + rel->r_offset - 2);
9773 r_type = R_PPC64_TPREL16_HA;
0d4792f7
AM
9774 if (toc_symndx != 0)
9775 {
9776 rel->r_info = ELF64_R_INFO (toc_symndx, r_type);
9777 /* We changed the symbol. Start over in order to
9778 get h, sym, sec etc. right. */
9779 rel--;
9780 continue;
9781 }
9782 else
9783 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
411e1bfb
AM
9784 }
9785 break;
9786
9787 case R_PPC64_TLS:
951fd09b
AM
9788 if (tls_mask != 0
9789 && (tls_mask & TLS_TPREL) == 0)
411e1bfb 9790 {
50bc7936 9791 bfd_vma rtra;
411e1bfb 9792 insn = bfd_get_32 (output_bfd, contents + rel->r_offset);
772119ce 9793 if ((insn & ((0x3f << 26) | (31 << 11)))
411e1bfb
AM
9794 == ((31 << 26) | (13 << 11)))
9795 rtra = insn & ((1 << 26) - (1 << 16));
772119ce 9796 else if ((insn & ((0x3f << 26) | (31 << 16)))
411e1bfb
AM
9797 == ((31 << 26) | (13 << 16)))
9798 rtra = (insn & (31 << 21)) | ((insn & (31 << 11)) << 5);
9799 else
9800 abort ();
9801 if ((insn & ((1 << 11) - (1 << 1))) == 266 << 1)
9802 /* add -> addi. */
9803 insn = 14 << 26;
9804 else if ((insn & (31 << 1)) == 23 << 1
9805 && ((insn & (31 << 6)) < 14 << 6
9806 || ((insn & (31 << 6)) >= 16 << 6
9807 && (insn & (31 << 6)) < 24 << 6)))
9808 /* load and store indexed -> dform. */
9809 insn = (32 | ((insn >> 6) & 31)) << 26;
9810 else if ((insn & (31 << 1)) == 21 << 1
9811 && (insn & (0x1a << 6)) == 0)
9812 /* ldx, ldux, stdx, stdux -> ld, ldu, std, stdu. */
9813 insn = (((58 | ((insn >> 6) & 4)) << 26)
9814 | ((insn >> 6) & 1));
9815 else if ((insn & (31 << 1)) == 21 << 1
9816 && (insn & ((1 << 11) - (1 << 1))) == 341 << 1)
9817 /* lwax -> lwa. */
9818 insn = (58 << 26) | 2;
9819 else
9820 abort ();
9821 insn |= rtra;
9822 bfd_put_32 (output_bfd, insn, contents + rel->r_offset);
411e1bfb
AM
9823 /* Was PPC64_TLS which sits on insn boundary, now
9824 PPC64_TPREL16_LO which is at insn+2. */
9825 rel->r_offset += 2;
0d4792f7
AM
9826 r_type = R_PPC64_TPREL16_LO;
9827 if (toc_symndx != 0)
9828 {
9829 rel->r_info = ELF64_R_INFO (toc_symndx, r_type);
9830 /* We changed the symbol. Start over in order to
9831 get h, sym, sec etc. right. */
9832 rel--;
9833 continue;
9834 }
9835 else
9836 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
411e1bfb
AM
9837 }
9838 break;
9839
411e1bfb
AM
9840 case R_PPC64_GOT_TLSGD16_HI:
9841 case R_PPC64_GOT_TLSGD16_HA:
951fd09b
AM
9842 tls_gd = TLS_TPRELGD;
9843 if (tls_mask != 0 && (tls_mask & TLS_GD) == 0)
9844 goto tls_gdld_hi;
9845 break;
9846
411e1bfb
AM
9847 case R_PPC64_GOT_TLSLD16_HI:
9848 case R_PPC64_GOT_TLSLD16_HA:
951fd09b 9849 if (tls_mask != 0 && (tls_mask & TLS_LD) == 0)
411e1bfb 9850 {
951fd09b
AM
9851 tls_gdld_hi:
9852 if ((tls_mask & tls_gd) != 0)
9853 r_type = (((r_type - (R_PPC64_GOT_TLSGD16 & 3)) & 3)
9854 + R_PPC64_GOT_TPREL16_DS);
9855 else
411e1bfb 9856 {
951fd09b
AM
9857 bfd_put_32 (output_bfd, NOP, contents + rel->r_offset);
9858 rel->r_offset -= 2;
9859 r_type = R_PPC64_NONE;
411e1bfb 9860 }
951fd09b 9861 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
411e1bfb
AM
9862 }
9863 break;
9864
951fd09b
AM
9865 case R_PPC64_GOT_TLSGD16:
9866 case R_PPC64_GOT_TLSGD16_LO:
9867 tls_gd = TLS_TPRELGD;
9868 if (tls_mask != 0 && (tls_mask & TLS_GD) == 0)
9869 goto tls_get_addr_check;
9870 break;
411e1bfb 9871
951fd09b
AM
9872 case R_PPC64_GOT_TLSLD16:
9873 case R_PPC64_GOT_TLSLD16_LO:
9874 if (tls_mask != 0 && (tls_mask & TLS_LD) == 0)
9875 {
9876 tls_get_addr_check:
9877 if (rel + 1 < relend)
411e1bfb 9878 {
951fd09b
AM
9879 enum elf_ppc64_reloc_type r_type2;
9880 unsigned long r_symndx2;
9881 struct elf_link_hash_entry *h2;
9882 bfd_vma insn1, insn2, insn3;
9883 bfd_vma offset;
9884
9885 /* The next instruction should be a call to
9886 __tls_get_addr. Peek at the reloc to be sure. */
4ce794b7 9887 r_type2 = ELF64_R_TYPE (rel[1].r_info);
951fd09b
AM
9888 r_symndx2 = ELF64_R_SYM (rel[1].r_info);
9889 if (r_symndx2 < symtab_hdr->sh_info
9890 || (r_type2 != R_PPC64_REL14
9891 && r_type2 != R_PPC64_REL14_BRTAKEN
9892 && r_type2 != R_PPC64_REL14_BRNTAKEN
9893 && r_type2 != R_PPC64_REL24))
9894 break;
9895
9896 h2 = sym_hashes[r_symndx2 - symtab_hdr->sh_info];
9897 while (h2->root.type == bfd_link_hash_indirect
9898 || h2->root.type == bfd_link_hash_warning)
9899 h2 = (struct elf_link_hash_entry *) h2->root.u.i.link;
8387904d
AM
9900 if (h2 == NULL || (h2 != &htab->tls_get_addr->elf
9901 && h2 != &htab->tls_get_addr_fd->elf))
951fd09b
AM
9902 break;
9903
9904 /* OK, it checks out. Replace the call. */
9905 offset = rel[1].r_offset;
9906 insn1 = bfd_get_32 (output_bfd,
9907 contents + rel->r_offset - 2);
9908 insn3 = bfd_get_32 (output_bfd,
9909 contents + offset + 4);
9910 if ((tls_mask & tls_gd) != 0)
411e1bfb 9911 {
951fd09b
AM
9912 /* IE */
9913 insn1 &= (1 << 26) - (1 << 2);
9914 insn1 |= 58 << 26; /* ld */
9915 insn2 = 0x7c636a14; /* add 3,3,13 */
9916 rel[1].r_info = ELF64_R_INFO (r_symndx2, R_PPC64_NONE);
9917 if ((tls_mask & TLS_EXPLICIT) == 0)
9918 r_type = (((r_type - (R_PPC64_GOT_TLSGD16 & 3)) & 3)
9919 + R_PPC64_GOT_TPREL16_DS);
9920 else
9921 r_type += R_PPC64_TOC16_DS - R_PPC64_TOC16;
9922 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
411e1bfb
AM
9923 }
9924 else
951fd09b
AM
9925 {
9926 /* LE */
9927 insn1 = 0x3c6d0000; /* addis 3,13,0 */
9928 insn2 = 0x38630000; /* addi 3,3,0 */
9929 if (tls_gd == 0)
9930 {
9931 /* Was an LD reloc. */
9932 r_symndx = 0;
e1918d23
AM
9933 rel->r_addend = htab->elf.tls_sec->vma + DTP_OFFSET;
9934 rel[1].r_addend = htab->elf.tls_sec->vma + DTP_OFFSET;
951fd09b 9935 }
0d4792f7
AM
9936 else if (toc_symndx != 0)
9937 r_symndx = toc_symndx;
951fd09b
AM
9938 r_type = R_PPC64_TPREL16_HA;
9939 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
9940 rel[1].r_info = ELF64_R_INFO (r_symndx,
9941 R_PPC64_TPREL16_LO);
9942 rel[1].r_offset += 2;
9943 }
9944 if (insn3 == NOP
9945 || insn3 == CROR_151515 || insn3 == CROR_313131)
9946 {
9947 insn3 = insn2;
9948 insn2 = NOP;
9949 rel[1].r_offset += 4;
9950 }
9951 bfd_put_32 (output_bfd, insn1, contents + rel->r_offset - 2);
9952 bfd_put_32 (output_bfd, insn2, contents + offset);
9953 bfd_put_32 (output_bfd, insn3, contents + offset + 4);
0d4792f7 9954 if (tls_gd == 0 || toc_symndx != 0)
951fd09b 9955 {
0d4792f7
AM
9956 /* We changed the symbol. Start over in order
9957 to get h, sym, sec etc. right. */
951fd09b
AM
9958 rel--;
9959 continue;
9960 }
411e1bfb 9961 }
411e1bfb 9962 }
411e1bfb
AM
9963 break;
9964
9965 case R_PPC64_DTPMOD64:
951fd09b
AM
9966 if (rel + 1 < relend
9967 && rel[1].r_info == ELF64_R_INFO (r_symndx, R_PPC64_DTPREL64)
9968 && rel[1].r_offset == rel->r_offset + 8)
411e1bfb 9969 {
951fd09b
AM
9970 if ((tls_mask & TLS_GD) == 0)
9971 {
9972 rel[1].r_info = ELF64_R_INFO (r_symndx, R_PPC64_NONE);
9973 if ((tls_mask & TLS_TPRELGD) != 0)
9974 r_type = R_PPC64_TPREL64;
9975 else
9976 {
4ce794b7 9977 bfd_put_64 (output_bfd, 1, contents + rel->r_offset);
951fd09b
AM
9978 r_type = R_PPC64_NONE;
9979 }
9980 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
9981 }
9982 }
9983 else
9984 {
9985 if ((tls_mask & TLS_LD) == 0)
411e1bfb 9986 {
4ce794b7 9987 bfd_put_64 (output_bfd, 1, contents + rel->r_offset);
411e1bfb 9988 r_type = R_PPC64_NONE;
951fd09b 9989 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
411e1bfb 9990 }
411e1bfb
AM
9991 }
9992 break;
9993
9994 case R_PPC64_TPREL64:
951fd09b 9995 if ((tls_mask & TLS_TPREL) == 0)
411e1bfb
AM
9996 {
9997 r_type = R_PPC64_NONE;
9998 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
9999 }
10000 break;
10001 }
10002
10003 /* Handle other relocations that tweak non-addend part of insn. */
86c76c7b 10004 insn = 0;
b25116a9
AM
10005 max_br_offset = 1 << 25;
10006 addend = rel->r_addend;
65f38f15 10007 switch (r_type)
5bd4f169
AM
10008 {
10009 default:
65f38f15 10010 break;
5bd4f169 10011
65f38f15
AM
10012 /* Branch taken prediction relocations. */
10013 case R_PPC64_ADDR14_BRTAKEN:
10014 case R_PPC64_REL14_BRTAKEN:
cedb70c5
KH
10015 insn = 0x01 << 21; /* 'y' or 't' bit, lowest bit of BO field. */
10016 /* Fall thru. */
65f38f15 10017
86c76c7b 10018 /* Branch not taken prediction relocations. */
65f38f15
AM
10019 case R_PPC64_ADDR14_BRNTAKEN:
10020 case R_PPC64_REL14_BRNTAKEN:
411e1bfb
AM
10021 insn |= bfd_get_32 (output_bfd,
10022 contents + rel->r_offset) & ~(0x01 << 21);
b25116a9 10023 /* Fall thru. */
86c76c7b 10024
b25116a9
AM
10025 case R_PPC64_REL14:
10026 max_br_offset = 1 << 15;
10027 /* Fall thru. */
5bd4f169 10028
65f38f15 10029 case R_PPC64_REL24:
ad8e1ba5
AM
10030 /* Calls to functions with a different TOC, such as calls to
10031 shared objects, need to alter the TOC pointer. This is
10032 done using a linkage stub. A REL24 branching to these
10033 linkage stubs needs to be followed by a nop, as the nop
10034 will be replaced with an instruction to restore the TOC
10035 base pointer. */
b25116a9 10036 stub_entry = NULL;
8387904d 10037 fdh = h;
ad8e1ba5 10038 if (((h != NULL
039b3fef
AM
10039 && (((fdh = h->oh) != NULL
10040 && fdh->elf.plt.plist != NULL)
10041 || (fdh = h)->elf.plt.plist != NULL))
8387904d 10042 || (sec != NULL
ad8e1ba5 10043 && sec->output_section != NULL
b25116a9 10044 && sec->id <= htab->top_id
ad8e1ba5
AM
10045 && (htab->stub_group[sec->id].toc_off
10046 != htab->stub_group[input_section->id].toc_off)))
721956f4 10047 && (stub_entry = ppc_get_stub_entry (input_section, sec, fdh,
ad8e1ba5
AM
10048 rel, htab)) != NULL
10049 && (stub_entry->stub_type == ppc_stub_plt_call
10050 || stub_entry->stub_type == ppc_stub_plt_branch_r2off
10051 || stub_entry->stub_type == ppc_stub_long_branch_r2off))
41bd81ab 10052 {
b25116a9 10053 bfd_boolean can_plt_call = FALSE;
721956f4 10054
eea6121a 10055 if (rel->r_offset + 8 <= input_section->size)
41bd81ab 10056 {
b25116a9
AM
10057 unsigned long nop;
10058 nop = bfd_get_32 (input_bfd, contents + rel->r_offset + 4);
10059 if (nop == NOP
10060 || nop == CROR_151515 || nop == CROR_313131)
41bd81ab 10061 {
4ce794b7 10062 bfd_put_32 (input_bfd, LD_R2_40R1,
411e1bfb 10063 contents + rel->r_offset + 4);
b25116a9 10064 can_plt_call = TRUE;
41bd81ab 10065 }
5bd4f169 10066 }
721956f4
AM
10067
10068 if (!can_plt_call)
10069 {
ad8e1ba5
AM
10070 if (stub_entry->stub_type == ppc_stub_plt_call)
10071 {
10072 /* If this is a plain branch rather than a branch
4fa1c237
AM
10073 and link, don't require a nop. However, don't
10074 allow tail calls in a shared library as they
10075 will result in r2 being corrupted. */
b25116a9
AM
10076 unsigned long br;
10077 br = bfd_get_32 (input_bfd, contents + rel->r_offset);
4fa1c237 10078 if (info->executable && (br & 1) == 0)
b25116a9 10079 can_plt_call = TRUE;
15b552e9
AM
10080 else
10081 stub_entry = NULL;
ad8e1ba5 10082 }
6ab189d5 10083 else if (h != NULL
039b3fef 10084 && strcmp (h->elf.root.root.string,
6ab189d5
AM
10085 ".__libc_start_main") == 0)
10086 {
10087 /* Allow crt1 branch to go via a toc adjusting stub. */
b25116a9 10088 can_plt_call = TRUE;
6ab189d5 10089 }
ad8e1ba5
AM
10090 else
10091 {
10092 if (strcmp (input_section->output_section->name,
10093 ".init") == 0
10094 || strcmp (input_section->output_section->name,
10095 ".fini") == 0)
10096 (*_bfd_error_handler)
d003868e 10097 (_("%B(%A+0x%lx): automatic multiple TOCs "
ad8e1ba5
AM
10098 "not supported using your crt files; "
10099 "recompile with -mminimal-toc or upgrade gcc"),
d003868e
AM
10100 input_bfd,
10101 input_section,
ad8e1ba5
AM
10102 (long) rel->r_offset);
10103 else
10104 (*_bfd_error_handler)
d003868e 10105 (_("%B(%A+0x%lx): sibling call optimization to `%s' "
ad8e1ba5
AM
10106 "does not allow automatic multiple TOCs; "
10107 "recompile with -mminimal-toc or "
10108 "-fno-optimize-sibling-calls, "
10109 "or make `%s' extern"),
d003868e
AM
10110 input_bfd,
10111 input_section,
ad8e1ba5
AM
10112 (long) rel->r_offset,
10113 sym_name,
10114 sym_name);
10115 bfd_set_error (bfd_error_bad_value);
10116 ret = FALSE;
10117 }
721956f4
AM
10118 }
10119
b25116a9
AM
10120 if (can_plt_call
10121 && stub_entry->stub_type == ppc_stub_plt_call)
10122 unresolved_reloc = FALSE;
10123 }
10124
8387904d
AM
10125 if (stub_entry == NULL
10126 && get_opd_info (sec) != NULL)
10127 {
10128 /* The branch destination is the value of the opd entry. */
10129 bfd_vma off = (relocation - sec->output_section->vma
10130 - sec->output_offset + rel->r_addend);
10131 bfd_vma dest = opd_entry_value (sec, off, NULL, NULL);
10132 if (dest != (bfd_vma) -1)
10133 {
10134 relocation = dest;
10135 addend = 0;
10136 }
10137 }
10138
b25116a9
AM
10139 /* If the branch is out of reach we ought to have a long
10140 branch stub. */
10141 from = (rel->r_offset
10142 + input_section->output_offset
10143 + input_section->output_section->vma);
10144
10145 if (stub_entry == NULL
10146 && (relocation + rel->r_addend - from + max_br_offset
10147 >= 2 * max_br_offset)
10148 && r_type != R_PPC64_ADDR14_BRTAKEN
10149 && r_type != R_PPC64_ADDR14_BRNTAKEN)
039b3fef
AM
10150 stub_entry = ppc_get_stub_entry (input_section, sec, h, rel,
10151 htab);
b25116a9
AM
10152
10153 if (stub_entry != NULL)
10154 {
10155 /* Munge up the value and addend so that we call the stub
10156 rather than the procedure directly. */
10157 relocation = (stub_entry->stub_offset
10158 + stub_entry->stub_sec->output_offset
10159 + stub_entry->stub_sec->output_section->vma);
10160 addend = 0;
10161 }
10162
10163 if (insn != 0)
10164 {
10165 if (is_power4)
721956f4 10166 {
b25116a9
AM
10167 /* Set 'a' bit. This is 0b00010 in BO field for branch
10168 on CR(BI) insns (BO == 001at or 011at), and 0b01000
10169 for branch on CTR insns (BO == 1a00t or 1a01t). */
10170 if ((insn & (0x14 << 21)) == (0x04 << 21))
10171 insn |= 0x02 << 21;
10172 else if ((insn & (0x14 << 21)) == (0x10 << 21))
10173 insn |= 0x08 << 21;
10174 else
10175 break;
10176 }
10177 else
10178 {
10179 /* Invert 'y' bit if not the default. */
10180 if ((bfd_signed_vma) (relocation + rel->r_addend - from) < 0)
10181 insn ^= 0x01 << 21;
721956f4 10182 }
b25116a9
AM
10183
10184 bfd_put_32 (output_bfd, insn, contents + rel->r_offset);
5bd4f169 10185 }
e86ce104 10186
06da1e8e
AM
10187 /* NOP out calls to undefined weak functions.
10188 We can thus call a weak function without first
10189 checking whether the function is defined. */
b25116a9 10190 else if (h != NULL
039b3fef 10191 && h->elf.root.type == bfd_link_hash_undefweak
b25116a9
AM
10192 && r_type == R_PPC64_REL24
10193 && relocation == 0
10194 && rel->r_addend == 0)
e86ce104 10195 {
06da1e8e
AM
10196 bfd_put_32 (output_bfd, NOP, contents + rel->r_offset);
10197 continue;
e86ce104 10198 }
65f38f15
AM
10199 break;
10200 }
5bd4f169 10201
65f38f15 10202 /* Set `addend'. */
411e1bfb 10203 tls_type = 0;
65f38f15
AM
10204 switch (r_type)
10205 {
10206 default:
10207 (*_bfd_error_handler)
d003868e
AM
10208 (_("%B: unknown relocation type %d for symbol %s"),
10209 input_bfd, (int) r_type, sym_name);
5bd4f169 10210
65f38f15 10211 bfd_set_error (bfd_error_bad_value);
b34976b6 10212 ret = FALSE;
65f38f15 10213 continue;
5bd4f169 10214
65f38f15 10215 case R_PPC64_NONE:
411e1bfb 10216 case R_PPC64_TLS:
04c9666a
AM
10217 case R_PPC64_GNU_VTINHERIT:
10218 case R_PPC64_GNU_VTENTRY:
65f38f15 10219 continue;
5bd4f169
AM
10220
10221 /* GOT16 relocations. Like an ADDR16 using the symbol's
10222 address in the GOT as relocation value instead of the
411e1bfb 10223 symbol's value itself. Also, create a GOT entry for the
5bd4f169 10224 symbol and put the symbol value there. */
411e1bfb
AM
10225 case R_PPC64_GOT_TLSGD16:
10226 case R_PPC64_GOT_TLSGD16_LO:
10227 case R_PPC64_GOT_TLSGD16_HI:
10228 case R_PPC64_GOT_TLSGD16_HA:
951fd09b 10229 tls_type = TLS_TLS | TLS_GD;
411e1bfb
AM
10230 goto dogot;
10231
10232 case R_PPC64_GOT_TLSLD16:
10233 case R_PPC64_GOT_TLSLD16_LO:
10234 case R_PPC64_GOT_TLSLD16_HI:
10235 case R_PPC64_GOT_TLSLD16_HA:
951fd09b 10236 tls_type = TLS_TLS | TLS_LD;
411e1bfb
AM
10237 goto dogot;
10238
10239 case R_PPC64_GOT_TPREL16_DS:
10240 case R_PPC64_GOT_TPREL16_LO_DS:
10241 case R_PPC64_GOT_TPREL16_HI:
10242 case R_PPC64_GOT_TPREL16_HA:
10243 tls_type = TLS_TLS | TLS_TPREL;
10244 goto dogot;
10245
10246 case R_PPC64_GOT_DTPREL16_DS:
10247 case R_PPC64_GOT_DTPREL16_LO_DS:
10248 case R_PPC64_GOT_DTPREL16_HI:
10249 case R_PPC64_GOT_DTPREL16_HA:
10250 tls_type = TLS_TLS | TLS_DTPREL;
10251 goto dogot;
10252
65f38f15
AM
10253 case R_PPC64_GOT16:
10254 case R_PPC64_GOT16_LO:
10255 case R_PPC64_GOT16_HI:
10256 case R_PPC64_GOT16_HA:
10257 case R_PPC64_GOT16_DS:
10258 case R_PPC64_GOT16_LO_DS:
411e1bfb 10259 dogot:
5bd4f169
AM
10260 {
10261 /* Relocation is to the entry for this symbol in the global
10262 offset table. */
e717da7e 10263 asection *got;
d881513a 10264 bfd_vma *offp;
5bd4f169 10265 bfd_vma off;
d881513a 10266 unsigned long indx = 0;
65f38f15 10267
d881513a
AM
10268 if (tls_type == (TLS_TLS | TLS_LD)
10269 && (h == NULL
f5385ebf 10270 || !h->elf.def_dynamic))
e717da7e 10271 offp = &ppc64_tlsld_got (input_bfd)->offset;
411e1bfb 10272 else
5bd4f169 10273 {
d881513a 10274 struct got_entry *ent;
5bd4f169 10275
d881513a
AM
10276 if (h != NULL)
10277 {
10278 bfd_boolean dyn = htab->elf.dynamic_sections_created;
039b3fef
AM
10279 if (!WILL_CALL_FINISH_DYNAMIC_SYMBOL (dyn, info->shared,
10280 &h->elf)
d881513a 10281 || (info->shared
039b3fef 10282 && SYMBOL_REFERENCES_LOCAL (info, &h->elf)))
d881513a
AM
10283 /* This is actually a static link, or it is a
10284 -Bsymbolic link and the symbol is defined
10285 locally, or the symbol was forced to be local
10286 because of a version file. */
10287 ;
10288 else
10289 {
039b3fef 10290 indx = h->elf.dynindx;
d881513a
AM
10291 unresolved_reloc = FALSE;
10292 }
039b3fef 10293 ent = h->elf.got.glist;
d881513a 10294 }
411e1bfb 10295 else
5bd4f169 10296 {
d881513a
AM
10297 if (local_got_ents == NULL)
10298 abort ();
10299 ent = local_got_ents[r_symndx];
5bd4f169 10300 }
d881513a
AM
10301
10302 for (; ent != NULL; ent = ent->next)
10303 if (ent->addend == rel->r_addend
e717da7e 10304 && ent->owner == input_bfd
d881513a
AM
10305 && ent->tls_type == tls_type)
10306 break;
10307 if (ent == NULL)
10308 abort ();
10309 offp = &ent->got.offset;
5bd4f169 10310 }
411e1bfb 10311
e717da7e
AM
10312 got = ppc64_elf_tdata (input_bfd)->got;
10313 if (got == NULL)
10314 abort ();
10315
411e1bfb
AM
10316 /* The offset must always be a multiple of 8. We use the
10317 least significant bit to record whether we have already
10318 processed this entry. */
d881513a 10319 off = *offp;
411e1bfb
AM
10320 if ((off & 1) != 0)
10321 off &= ~1;
5bd4f169
AM
10322 else
10323 {
411e1bfb
AM
10324 /* Generate relocs for the dynamic linker, except in
10325 the case of TLSLD where we'll use one entry per
10326 module. */
e717da7e
AM
10327 asection *relgot = ppc64_elf_tdata (input_bfd)->relgot;
10328
d881513a 10329 *offp = off | 1;
4e795f50
AM
10330 if ((info->shared || indx != 0)
10331 && (h == NULL
039b3fef
AM
10332 || ELF_ST_VISIBILITY (h->elf.other) == STV_DEFAULT
10333 || h->elf.root.type != bfd_link_hash_undefweak))
5bd4f169 10334 {
e717da7e
AM
10335 outrel.r_offset = (got->output_section->vma
10336 + got->output_offset
411e1bfb 10337 + off);
81407a69 10338 outrel.r_addend = rel->r_addend;
d881513a 10339 if (tls_type & (TLS_LD | TLS_GD))
5bd4f169 10340 {
411e1bfb 10341 outrel.r_addend = 0;
e515b051 10342 outrel.r_info = ELF64_R_INFO (indx, R_PPC64_DTPMOD64);
d881513a
AM
10343 if (tls_type == (TLS_TLS | TLS_GD))
10344 {
e717da7e
AM
10345 loc = relgot->contents;
10346 loc += (relgot->reloc_count++
d881513a
AM
10347 * sizeof (Elf64_External_Rela));
10348 bfd_elf64_swap_reloca_out (output_bfd,
10349 &outrel, loc);
e515b051 10350 outrel.r_offset += 8;
81407a69 10351 outrel.r_addend = rel->r_addend;
d881513a
AM
10352 outrel.r_info
10353 = ELF64_R_INFO (indx, R_PPC64_DTPREL64);
d881513a 10354 }
411e1bfb 10355 }
951fd09b 10356 else if (tls_type == (TLS_TLS | TLS_DTPREL))
411e1bfb 10357 outrel.r_info = ELF64_R_INFO (indx, R_PPC64_DTPREL64);
951fd09b 10358 else if (tls_type == (TLS_TLS | TLS_TPREL))
411e1bfb
AM
10359 outrel.r_info = ELF64_R_INFO (indx, R_PPC64_TPREL64);
10360 else if (indx == 0)
81407a69
AM
10361 {
10362 outrel.r_info = ELF64_R_INFO (indx, R_PPC64_RELATIVE);
10363
10364 /* Write the .got section contents for the sake
10365 of prelink. */
e717da7e 10366 loc = got->contents + off;
23fbd6fa
JJ
10367 bfd_put_64 (output_bfd, outrel.r_addend + relocation,
10368 loc);
81407a69 10369 }
411e1bfb
AM
10370 else
10371 outrel.r_info = ELF64_R_INFO (indx, R_PPC64_GLOB_DAT);
81407a69
AM
10372
10373 if (indx == 0 && tls_type != (TLS_TLS | TLS_LD))
e515b051
AM
10374 {
10375 outrel.r_addend += relocation;
10376 if (tls_type & (TLS_GD | TLS_DTPREL | TLS_TPREL))
e1918d23 10377 outrel.r_addend -= htab->elf.tls_sec->vma;
e515b051 10378 }
e717da7e
AM
10379 loc = relgot->contents;
10380 loc += (relgot->reloc_count++
411e1bfb
AM
10381 * sizeof (Elf64_External_Rela));
10382 bfd_elf64_swap_reloca_out (output_bfd, &outrel, loc);
10383 }
10384
ad8e1ba5 10385 /* Init the .got section contents here if we're not
81407a69 10386 emitting a reloc. */
d881513a 10387 else
411e1bfb 10388 {
d881513a 10389 relocation += rel->r_addend;
7b609f53
AM
10390 if (tls_type == (TLS_TLS | TLS_LD))
10391 relocation = 1;
10392 else if (tls_type != 0)
411e1bfb 10393 {
e1918d23 10394 relocation -= htab->elf.tls_sec->vma + DTP_OFFSET;
7b609f53 10395 if (tls_type == (TLS_TLS | TLS_TPREL))
411e1bfb 10396 relocation += DTP_OFFSET - TP_OFFSET;
5bd4f169 10397
7b609f53
AM
10398 if (tls_type == (TLS_TLS | TLS_GD))
10399 {
10400 bfd_put_64 (output_bfd, relocation,
e717da7e 10401 got->contents + off + 8);
7b609f53
AM
10402 relocation = 1;
10403 }
411e1bfb 10404 }
7b609f53 10405
411e1bfb 10406 bfd_put_64 (output_bfd, relocation,
e717da7e 10407 got->contents + off);
5bd4f169
AM
10408 }
10409 }
10410
65f38f15
AM
10411 if (off >= (bfd_vma) -2)
10412 abort ();
10413
e717da7e 10414 relocation = got->output_offset + off;
65f38f15 10415
5bd4f169 10416 /* TOC base (r2) is TOC start plus 0x8000. */
e717da7e 10417 addend = -TOC_BASE_OFF;
5bd4f169 10418 }
65f38f15
AM
10419 break;
10420
10421 case R_PPC64_PLT16_HA:
10422 case R_PPC64_PLT16_HI:
10423 case R_PPC64_PLT16_LO:
10424 case R_PPC64_PLT32:
10425 case R_PPC64_PLT64:
10426 /* Relocation is to the entry for this symbol in the
10427 procedure linkage table. */
10428
10429 /* Resolve a PLT reloc against a local symbol directly,
10430 without using the procedure linkage table. */
10431 if (h == NULL)
10432 break;
10433
411e1bfb
AM
10434 /* It's possible that we didn't make a PLT entry for this
10435 symbol. This happens when statically linking PIC code,
10436 or when using -Bsymbolic. Go find a match if there is a
10437 PLT entry. */
4ce794b7 10438 if (htab->plt != NULL)
65f38f15 10439 {
411e1bfb 10440 struct plt_entry *ent;
039b3fef 10441 for (ent = h->elf.plt.plist; ent != NULL; ent = ent->next)
411e1bfb
AM
10442 if (ent->addend == rel->r_addend
10443 && ent->plt.offset != (bfd_vma) -1)
10444 {
4ce794b7
AM
10445 relocation = (htab->plt->output_section->vma
10446 + htab->plt->output_offset
411e1bfb
AM
10447 + ent->plt.offset);
10448 unresolved_reloc = FALSE;
10449 }
65f38f15 10450 }
65f38f15 10451 break;
5bd4f169 10452
0b13192e
AM
10453 case R_PPC64_TOC:
10454 /* Relocation value is TOC base. */
10455 relocation = TOCstart;
10456 if (r_symndx == 0)
10457 relocation += htab->stub_group[input_section->id].toc_off;
8517fae7
AM
10458 else if (unresolved_reloc)
10459 ;
10460 else if (sec != NULL && sec->id <= htab->top_id)
0b13192e
AM
10461 relocation += htab->stub_group[sec->id].toc_off;
10462 else
10463 unresolved_reloc = TRUE;
10464 goto dodyn2;
10465
5bd4f169
AM
10466 /* TOC16 relocs. We want the offset relative to the TOC base,
10467 which is the address of the start of the TOC plus 0x8000.
10468 The TOC consists of sections .got, .toc, .tocbss, and .plt,
10469 in this order. */
65f38f15
AM
10470 case R_PPC64_TOC16:
10471 case R_PPC64_TOC16_LO:
10472 case R_PPC64_TOC16_HI:
10473 case R_PPC64_TOC16_DS:
10474 case R_PPC64_TOC16_LO_DS:
10475 case R_PPC64_TOC16_HA:
ad8e1ba5 10476 addend -= TOCstart + htab->stub_group[input_section->id].toc_off;
5bd4f169
AM
10477 break;
10478
10479 /* Relocate against the beginning of the section. */
65f38f15
AM
10480 case R_PPC64_SECTOFF:
10481 case R_PPC64_SECTOFF_LO:
10482 case R_PPC64_SECTOFF_HI:
10483 case R_PPC64_SECTOFF_DS:
10484 case R_PPC64_SECTOFF_LO_DS:
10485 case R_PPC64_SECTOFF_HA:
4ce794b7 10486 if (sec != NULL)
65f38f15 10487 addend -= sec->output_section->vma;
5bd4f169
AM
10488 break;
10489
721956f4
AM
10490 case R_PPC64_REL14:
10491 case R_PPC64_REL14_BRNTAKEN:
10492 case R_PPC64_REL14_BRTAKEN:
5d1634d7
AM
10493 case R_PPC64_REL24:
10494 break;
10495
411e1bfb
AM
10496 case R_PPC64_TPREL16:
10497 case R_PPC64_TPREL16_LO:
10498 case R_PPC64_TPREL16_HI:
10499 case R_PPC64_TPREL16_HA:
10500 case R_PPC64_TPREL16_DS:
10501 case R_PPC64_TPREL16_LO_DS:
10502 case R_PPC64_TPREL16_HIGHER:
10503 case R_PPC64_TPREL16_HIGHERA:
10504 case R_PPC64_TPREL16_HIGHEST:
10505 case R_PPC64_TPREL16_HIGHESTA:
e1918d23 10506 addend -= htab->elf.tls_sec->vma + TP_OFFSET;
411e1bfb
AM
10507 if (info->shared)
10508 /* The TPREL16 relocs shouldn't really be used in shared
10509 libs as they will result in DT_TEXTREL being set, but
10510 support them anyway. */
10511 goto dodyn;
10512 break;
10513
10514 case R_PPC64_DTPREL16:
10515 case R_PPC64_DTPREL16_LO:
10516 case R_PPC64_DTPREL16_HI:
10517 case R_PPC64_DTPREL16_HA:
10518 case R_PPC64_DTPREL16_DS:
10519 case R_PPC64_DTPREL16_LO_DS:
10520 case R_PPC64_DTPREL16_HIGHER:
10521 case R_PPC64_DTPREL16_HIGHERA:
10522 case R_PPC64_DTPREL16_HIGHEST:
10523 case R_PPC64_DTPREL16_HIGHESTA:
e1918d23 10524 addend -= htab->elf.tls_sec->vma + DTP_OFFSET;
411e1bfb
AM
10525 break;
10526
e515b051
AM
10527 case R_PPC64_DTPMOD64:
10528 relocation = 1;
10529 addend = 0;
10530 goto dodyn;
10531
411e1bfb 10532 case R_PPC64_TPREL64:
e1918d23 10533 addend -= htab->elf.tls_sec->vma + TP_OFFSET;
411e1bfb
AM
10534 goto dodyn;
10535
10536 case R_PPC64_DTPREL64:
e1918d23 10537 addend -= htab->elf.tls_sec->vma + DTP_OFFSET;
411e1bfb
AM
10538 /* Fall thru */
10539
65f38f15
AM
10540 /* Relocations that may need to be propagated if this is a
10541 dynamic object. */
04c9666a 10542 case R_PPC64_REL30:
65f38f15
AM
10543 case R_PPC64_REL32:
10544 case R_PPC64_REL64:
10545 case R_PPC64_ADDR14:
10546 case R_PPC64_ADDR14_BRNTAKEN:
10547 case R_PPC64_ADDR14_BRTAKEN:
10548 case R_PPC64_ADDR16:
10549 case R_PPC64_ADDR16_DS:
10550 case R_PPC64_ADDR16_HA:
10551 case R_PPC64_ADDR16_HI:
10552 case R_PPC64_ADDR16_HIGHER:
10553 case R_PPC64_ADDR16_HIGHERA:
10554 case R_PPC64_ADDR16_HIGHEST:
10555 case R_PPC64_ADDR16_HIGHESTA:
10556 case R_PPC64_ADDR16_LO:
10557 case R_PPC64_ADDR16_LO_DS:
10558 case R_PPC64_ADDR24:
65f38f15
AM
10559 case R_PPC64_ADDR32:
10560 case R_PPC64_ADDR64:
10561 case R_PPC64_UADDR16:
10562 case R_PPC64_UADDR32:
10563 case R_PPC64_UADDR64:
ec338859
AM
10564 /* r_symndx will be zero only for relocs against symbols
10565 from removed linkonce sections, or sections discarded by
10566 a linker script. */
411e1bfb 10567 dodyn:
5d1634d7
AM
10568 if (r_symndx == 0)
10569 break;
10570 /* Fall thru. */
10571
0b13192e 10572 dodyn2:
5d1634d7 10573 if ((input_section->flags & SEC_ALLOC) == 0)
ec338859
AM
10574 break;
10575
41bd81ab
AM
10576 if (NO_OPD_RELOCS && is_opd)
10577 break;
10578
65f38f15 10579 if ((info->shared
4e795f50 10580 && (h == NULL
039b3fef
AM
10581 || ELF_ST_VISIBILITY (h->elf.other) == STV_DEFAULT
10582 || h->elf.root.type != bfd_link_hash_undefweak)
411e1bfb 10583 && (MUST_BE_DYN_RELOC (r_type)
039b3fef 10584 || !SYMBOL_CALLS_LOCAL (info, &h->elf)))
f4656909
AM
10585 || (ELIMINATE_COPY_RELOCS
10586 && !info->shared
65f38f15 10587 && h != NULL
039b3fef 10588 && h->elf.dynindx != -1
f5385ebf
AM
10589 && !h->elf.non_got_ref
10590 && h->elf.def_dynamic
10591 && !h->elf.def_regular))
65f38f15
AM
10592 {
10593 Elf_Internal_Rela outrel;
b34976b6 10594 bfd_boolean skip, relocate;
65f38f15 10595 asection *sreloc;
947216bf 10596 bfd_byte *loc;
1cf1f670 10597 bfd_vma out_off;
65f38f15
AM
10598
10599 /* When generating a dynamic object, these relocations
10600 are copied into the output file to be resolved at run
10601 time. */
10602
b34976b6
AM
10603 skip = FALSE;
10604 relocate = FALSE;
65f38f15 10605
1cf1f670
AM
10606 out_off = _bfd_elf_section_offset (output_bfd, info,
10607 input_section, rel->r_offset);
10608 if (out_off == (bfd_vma) -1)
b34976b6 10609 skip = TRUE;
1cf1f670 10610 else if (out_off == (bfd_vma) -2)
b34976b6 10611 skip = TRUE, relocate = TRUE;
1cf1f670
AM
10612 out_off += (input_section->output_section->vma
10613 + input_section->output_offset);
10614 outrel.r_offset = out_off;
411e1bfb 10615 outrel.r_addend = rel->r_addend;
65f38f15 10616
1cf1f670
AM
10617 /* Optimize unaligned reloc use. */
10618 if ((r_type == R_PPC64_ADDR64 && (out_off & 7) != 0)
10619 || (r_type == R_PPC64_UADDR64 && (out_off & 7) == 0))
10620 r_type ^= R_PPC64_ADDR64 ^ R_PPC64_UADDR64;
10621 else if ((r_type == R_PPC64_ADDR32 && (out_off & 3) != 0)
10622 || (r_type == R_PPC64_UADDR32 && (out_off & 3) == 0))
10623 r_type ^= R_PPC64_ADDR32 ^ R_PPC64_UADDR32;
10624 else if ((r_type == R_PPC64_ADDR16 && (out_off & 1) != 0)
10625 || (r_type == R_PPC64_UADDR16 && (out_off & 1) == 0))
10626 r_type ^= R_PPC64_ADDR16 ^ R_PPC64_UADDR16;
10627
65f38f15 10628 if (skip)
0bb2d96a 10629 memset (&outrel, 0, sizeof outrel);
039b3fef 10630 else if (!SYMBOL_REFERENCES_LOCAL (info, &h->elf)
0b13192e
AM
10631 && !is_opd
10632 && r_type != R_PPC64_TOC)
039b3fef 10633 outrel.r_info = ELF64_R_INFO (h->elf.dynindx, r_type);
65f38f15
AM
10634 else
10635 {
41bd81ab
AM
10636 /* This symbol is local, or marked to become local,
10637 or this is an opd section reloc which must point
10638 at a local function. */
65f38f15 10639 outrel.r_addend += relocation;
e86ce104 10640 if (r_type == R_PPC64_ADDR64 || r_type == R_PPC64_TOC)
65f38f15 10641 {
3fad3c7c 10642 if (is_opd && h != NULL)
afbe61cf
AM
10643 {
10644 /* Lie about opd entries. This case occurs
10645 when building shared libraries and we
10646 reference a function in another shared
3fad3c7c
AM
10647 lib. The same thing happens for a weak
10648 definition in an application that's
10649 overridden by a strong definition in a
10650 shared lib. (I believe this is a generic
10651 bug in binutils handling of weak syms.)
10652 In these cases we won't use the opd
1e2f5b6e 10653 entry in this lib. */
b34976b6 10654 unresolved_reloc = FALSE;
afbe61cf 10655 }
65f38f15 10656 outrel.r_info = ELF64_R_INFO (0, R_PPC64_RELATIVE);
81407a69
AM
10657
10658 /* We need to relocate .opd contents for ld.so.
10659 Prelink also wants simple and consistent rules
10660 for relocs. This make all RELATIVE relocs have
10661 *r_offset equal to r_addend. */
10662 relocate = TRUE;
65f38f15
AM
10663 }
10664 else
10665 {
10666 long indx = 0;
10667
41bd81ab 10668 if (bfd_is_abs_section (sec))
65f38f15
AM
10669 ;
10670 else if (sec == NULL || sec->owner == NULL)
10671 {
10672 bfd_set_error (bfd_error_bad_value);
b34976b6 10673 return FALSE;
65f38f15
AM
10674 }
10675 else
10676 {
10677 asection *osec;
10678
10679 osec = sec->output_section;
10680 indx = elf_section_data (osec)->dynindx;
10681
10682 /* We are turning this relocation into one
10683 against a section symbol, so subtract out
10684 the output section's address but not the
10685 offset of the input section in the output
10686 section. */
10687 outrel.r_addend -= osec->vma;
10688 }
10689
10690 outrel.r_info = ELF64_R_INFO (indx, r_type);
10691 }
10692 }
10693
10694 sreloc = elf_section_data (input_section)->sreloc;
10695 if (sreloc == NULL)
10696 abort ();
10697
947216bf
AM
10698 loc = sreloc->contents;
10699 loc += sreloc->reloc_count++ * sizeof (Elf64_External_Rela);
65f38f15
AM
10700 bfd_elf64_swap_reloca_out (output_bfd, &outrel, loc);
10701
10702 /* If this reloc is against an external symbol, it will
10703 be computed at runtime, so there's no need to do
81407a69
AM
10704 anything now. However, for the sake of prelink ensure
10705 that the section contents are a known value. */
65f38f15 10706 if (! relocate)
81407a69
AM
10707 {
10708 unresolved_reloc = FALSE;
10709 /* The value chosen here is quite arbitrary as ld.so
10710 ignores section contents except for the special
10711 case of .opd where the contents might be accessed
10712 before relocation. Choose zero, as that won't
10713 cause reloc overflow. */
10714 relocation = 0;
10715 addend = 0;
10716 /* Use *r_offset == r_addend for R_PPC64_ADDR64 relocs
10717 to improve backward compatibility with older
10718 versions of ld. */
10719 if (r_type == R_PPC64_ADDR64)
10720 addend = outrel.r_addend;
10721 /* Adjust pc_relative relocs to have zero in *r_offset. */
4ce794b7 10722 else if (ppc64_elf_howto_table[r_type]->pc_relative)
000732f7
AM
10723 addend = (input_section->output_section->vma
10724 + input_section->output_offset
10725 + rel->r_offset);
81407a69 10726 }
65f38f15 10727 }
5bd4f169
AM
10728 break;
10729
65f38f15
AM
10730 case R_PPC64_COPY:
10731 case R_PPC64_GLOB_DAT:
10732 case R_PPC64_JMP_SLOT:
10733 case R_PPC64_RELATIVE:
10734 /* We shouldn't ever see these dynamic relocs in relocatable
10735 files. */
ae9a127f 10736 /* Fall through. */
65f38f15
AM
10737
10738 case R_PPC64_PLTGOT16:
10739 case R_PPC64_PLTGOT16_DS:
10740 case R_PPC64_PLTGOT16_HA:
10741 case R_PPC64_PLTGOT16_HI:
10742 case R_PPC64_PLTGOT16_LO:
10743 case R_PPC64_PLTGOT16_LO_DS:
10744 case R_PPC64_PLTREL32:
10745 case R_PPC64_PLTREL64:
10746 /* These ones haven't been implemented yet. */
10747
10748 (*_bfd_error_handler)
d003868e
AM
10749 (_("%B: relocation %s is not supported for symbol %s."),
10750 input_bfd,
4ce794b7 10751 ppc64_elf_howto_table[r_type]->name, sym_name);
5bd4f169
AM
10752
10753 bfd_set_error (bfd_error_invalid_operation);
b34976b6 10754 ret = FALSE;
5bd4f169 10755 continue;
65f38f15 10756 }
5bd4f169 10757
65f38f15
AM
10758 /* Do any further special processing. */
10759 switch (r_type)
10760 {
10761 default:
10762 break;
10763
10764 case R_PPC64_ADDR16_HA:
10765 case R_PPC64_ADDR16_HIGHERA:
10766 case R_PPC64_ADDR16_HIGHESTA:
86bbe32f
AM
10767 case R_PPC64_GOT16_HA:
10768 case R_PPC64_PLTGOT16_HA:
65f38f15
AM
10769 case R_PPC64_PLT16_HA:
10770 case R_PPC64_TOC16_HA:
10771 case R_PPC64_SECTOFF_HA:
411e1bfb
AM
10772 case R_PPC64_TPREL16_HA:
10773 case R_PPC64_DTPREL16_HA:
10774 case R_PPC64_GOT_TLSGD16_HA:
10775 case R_PPC64_GOT_TLSLD16_HA:
10776 case R_PPC64_GOT_TPREL16_HA:
10777 case R_PPC64_GOT_DTPREL16_HA:
10778 case R_PPC64_TPREL16_HIGHER:
10779 case R_PPC64_TPREL16_HIGHERA:
10780 case R_PPC64_TPREL16_HIGHEST:
10781 case R_PPC64_TPREL16_HIGHESTA:
10782 case R_PPC64_DTPREL16_HIGHER:
10783 case R_PPC64_DTPREL16_HIGHERA:
10784 case R_PPC64_DTPREL16_HIGHEST:
10785 case R_PPC64_DTPREL16_HIGHESTA:
65f38f15
AM
10786 /* It's just possible that this symbol is a weak symbol
10787 that's not actually defined anywhere. In that case,
10788 'sec' would be NULL, and we should leave the symbol
10789 alone (it will be set to zero elsewhere in the link). */
10790 if (sec != NULL)
e515b051
AM
10791 /* Add 0x10000 if sign bit in 0:15 is set.
10792 Bits 0:15 are not used. */
10793 addend += 0x8000;
65f38f15
AM
10794 break;
10795
10796 case R_PPC64_ADDR16_DS:
10797 case R_PPC64_ADDR16_LO_DS:
10798 case R_PPC64_GOT16_DS:
10799 case R_PPC64_GOT16_LO_DS:
10800 case R_PPC64_PLT16_LO_DS:
10801 case R_PPC64_SECTOFF_DS:
10802 case R_PPC64_SECTOFF_LO_DS:
10803 case R_PPC64_TOC16_DS:
10804 case R_PPC64_TOC16_LO_DS:
10805 case R_PPC64_PLTGOT16_DS:
10806 case R_PPC64_PLTGOT16_LO_DS:
411e1bfb
AM
10807 case R_PPC64_GOT_TPREL16_DS:
10808 case R_PPC64_GOT_TPREL16_LO_DS:
10809 case R_PPC64_GOT_DTPREL16_DS:
10810 case R_PPC64_GOT_DTPREL16_LO_DS:
10811 case R_PPC64_TPREL16_DS:
10812 case R_PPC64_TPREL16_LO_DS:
10813 case R_PPC64_DTPREL16_DS:
10814 case R_PPC64_DTPREL16_LO_DS:
adadcc0c
AM
10815 insn = bfd_get_32 (input_bfd, contents + (rel->r_offset & ~3));
10816 mask = 3;
10817 /* If this reloc is against an lq insn, then the value must be
10818 a multiple of 16. This is somewhat of a hack, but the
10819 "correct" way to do this by defining _DQ forms of all the
10820 _DS relocs bloats all reloc switches in this file. It
10821 doesn't seem to make much sense to use any of these relocs
10822 in data, so testing the insn should be safe. */
494dac0c 10823 if ((insn & (0x3f << 26)) == (56u << 26))
adadcc0c
AM
10824 mask = 15;
10825 if (((relocation + addend) & mask) != 0)
65f38f15
AM
10826 {
10827 (*_bfd_error_handler)
d003868e
AM
10828 (_("%B: error: relocation %s not a multiple of %d"),
10829 input_bfd,
4ce794b7 10830 ppc64_elf_howto_table[r_type]->name,
adadcc0c 10831 mask + 1);
65f38f15 10832 bfd_set_error (bfd_error_bad_value);
b34976b6 10833 ret = FALSE;
65f38f15
AM
10834 continue;
10835 }
10836 break;
5bd4f169
AM
10837 }
10838
239e1f3a
AM
10839 /* Dynamic relocs are not propagated for SEC_DEBUGGING sections
10840 because such sections are not SEC_ALLOC and thus ld.so will
10841 not process them. */
65f38f15 10842 if (unresolved_reloc
239e1f3a 10843 && !((input_section->flags & SEC_DEBUGGING) != 0
f5385ebf 10844 && h->elf.def_dynamic))
9c07fe7c
AM
10845 {
10846 (*_bfd_error_handler)
d003868e
AM
10847 (_("%B(%A+0x%lx): unresolvable %s relocation against symbol `%s'"),
10848 input_bfd,
10849 input_section,
9c07fe7c 10850 (long) rel->r_offset,
7b609f53 10851 ppc64_elf_howto_table[(int) r_type]->name,
039b3fef 10852 h->elf.root.root.string);
b34976b6 10853 ret = FALSE;
9c07fe7c 10854 }
5bd4f169 10855
65f38f15 10856 r = _bfd_final_link_relocate (ppc64_elf_howto_table[(int) r_type],
5bd4f169
AM
10857 input_bfd,
10858 input_section,
10859 contents,
411e1bfb 10860 rel->r_offset,
5bd4f169
AM
10861 relocation,
10862 addend);
10863
ef60b7ff 10864 if (r != bfd_reloc_ok)
5bd4f169 10865 {
cd27b276
AM
10866 if (sym_name == NULL)
10867 sym_name = "(null)";
10868 if (r == bfd_reloc_overflow)
5bd4f169 10869 {
cd27b276
AM
10870 if (warned)
10871 continue;
10872 if (h != NULL
039b3fef 10873 && h->elf.root.type == bfd_link_hash_undefweak
4ce794b7 10874 && ppc64_elf_howto_table[r_type]->pc_relative)
5bd4f169
AM
10875 {
10876 /* Assume this is a call protected by other code that
10877 detects the symbol is undefined. If this is the case,
10878 we can safely ignore the overflow. If not, the
10879 program is hosed anyway, and a little warning isn't
10880 going to help. */
10881
10882 continue;
10883 }
10884
ef60b7ff 10885 if (!((*info->callbacks->reloc_overflow)
dfeffb9f
L
10886 (info, (h ? &h->elf.root : NULL), sym_name,
10887 ppc64_elf_howto_table[r_type]->name,
411e1bfb 10888 rel->r_addend, input_bfd, input_section, rel->r_offset)))
b34976b6 10889 return FALSE;
ef60b7ff
AM
10890 }
10891 else
10892 {
10893 (*_bfd_error_handler)
d003868e
AM
10894 (_("%B(%A+0x%lx): %s reloc against `%s': error %d"),
10895 input_bfd,
10896 input_section,
7b609f53 10897 (long) rel->r_offset,
4ce794b7 10898 ppc64_elf_howto_table[r_type]->name,
7b609f53
AM
10899 sym_name,
10900 (int) r);
b34976b6 10901 ret = FALSE;
ef60b7ff 10902 }
5bd4f169 10903 }
5bd4f169
AM
10904 }
10905
645ea6a9
AM
10906 /* If we're emitting relocations, then shortly after this function
10907 returns, reloc offsets and addends for this section will be
10908 adjusted. Worse, reloc symbol indices will be for the output
8860955f
AM
10909 file rather than the input. Save a copy of the relocs for
10910 opd_entry_value. */
10911 if (is_opd && info->emitrelocations)
10912 {
10913 bfd_size_type amt;
10914 amt = input_section->reloc_count * sizeof (Elf_Internal_Rela);
10915 rel = bfd_alloc (input_bfd, amt);
10916 BFD_ASSERT (ppc64_elf_tdata (input_bfd)->opd_relocs == NULL);
10917 ppc64_elf_tdata (input_bfd)->opd_relocs = rel;
10918 if (rel == NULL)
10919 return FALSE;
10920 memcpy (rel, relocs, amt);
10921 }
5bd4f169
AM
10922 return ret;
10923}
10924
754021d0
AM
10925/* Adjust the value of any local symbols in opd sections. */
10926
10927static bfd_boolean
10928ppc64_elf_output_symbol_hook (struct bfd_link_info *info,
10929 const char *name ATTRIBUTE_UNUSED,
10930 Elf_Internal_Sym *elfsym,
10931 asection *input_sec,
10932 struct elf_link_hash_entry *h)
10933{
4025353c 10934 long *opd_adjust, adjust;
754021d0
AM
10935 bfd_vma value;
10936
4025353c
AM
10937 if (h != NULL)
10938 return TRUE;
10939
10940 opd_adjust = get_opd_info (input_sec);
10941 if (opd_adjust == NULL)
754021d0
AM
10942 return TRUE;
10943
10944 value = elfsym->st_value - input_sec->output_offset;
10945 if (!info->relocatable)
10946 value -= input_sec->output_section->vma;
10947
3f764659 10948 adjust = opd_adjust[value / 8];
4025353c
AM
10949 if (adjust == -1)
10950 elfsym->st_value = 0;
10951 else
10952 elfsym->st_value += adjust;
754021d0
AM
10953 return TRUE;
10954}
10955
5bd4f169
AM
10956/* Finish up dynamic symbol handling. We set the contents of various
10957 dynamic sections here. */
10958
b34976b6 10959static bfd_boolean
4ce794b7
AM
10960ppc64_elf_finish_dynamic_symbol (bfd *output_bfd,
10961 struct bfd_link_info *info,
10962 struct elf_link_hash_entry *h,
10963 Elf_Internal_Sym *sym)
5bd4f169 10964{
65f38f15 10965 struct ppc_link_hash_table *htab;
5bd4f169 10966 bfd *dynobj;
8387904d
AM
10967 struct plt_entry *ent;
10968 Elf_Internal_Rela rela;
10969 bfd_byte *loc;
5bd4f169 10970
65f38f15
AM
10971 htab = ppc_hash_table (info);
10972 dynobj = htab->elf.dynobj;
5bd4f169 10973
8387904d
AM
10974 for (ent = h->plt.plist; ent != NULL; ent = ent->next)
10975 if (ent->plt.offset != (bfd_vma) -1)
10976 {
10977 /* This symbol has an entry in the procedure linkage
10978 table. Set it up. */
10979
10980 if (htab->plt == NULL
10981 || htab->relplt == NULL
10982 || htab->glink == NULL)
10983 abort ();
10984
10985 /* Create a JMP_SLOT reloc to inform the dynamic linker to
10986 fill in the PLT entry. */
10987 rela.r_offset = (htab->plt->output_section->vma
10988 + htab->plt->output_offset
10989 + ent->plt.offset);
10990 rela.r_info = ELF64_R_INFO (h->dynindx, R_PPC64_JMP_SLOT);
10991 rela.r_addend = ent->addend;
10992
10993 loc = htab->relplt->contents;
10994 loc += ((ent->plt.offset - PLT_INITIAL_ENTRY_SIZE) / PLT_ENTRY_SIZE
10995 * sizeof (Elf64_External_Rela));
10996 bfd_elf64_swap_reloca_out (output_bfd, &rela, loc);
10997 }
5bd4f169 10998
f5385ebf 10999 if (h->needs_copy)
5bd4f169 11000 {
5bd4f169 11001 Elf_Internal_Rela rela;
947216bf 11002 bfd_byte *loc;
5bd4f169 11003
65f38f15 11004 /* This symbol needs a copy reloc. Set it up. */
5bd4f169 11005
65f38f15
AM
11006 if (h->dynindx == -1
11007 || (h->root.type != bfd_link_hash_defined
11008 && h->root.type != bfd_link_hash_defweak)
4ce794b7 11009 || htab->relbss == NULL)
65f38f15 11010 abort ();
5bd4f169
AM
11011
11012 rela.r_offset = (h->root.u.def.value
11013 + h->root.u.def.section->output_section->vma
11014 + h->root.u.def.section->output_offset);
11015 rela.r_info = ELF64_R_INFO (h->dynindx, R_PPC64_COPY);
11016 rela.r_addend = 0;
4ce794b7
AM
11017 loc = htab->relbss->contents;
11018 loc += htab->relbss->reloc_count++ * sizeof (Elf64_External_Rela);
65f38f15 11019 bfd_elf64_swap_reloca_out (output_bfd, &rela, loc);
5bd4f169
AM
11020 }
11021
5bd4f169
AM
11022 /* Mark some specially defined symbols as absolute. */
11023 if (strcmp (h->root.root.string, "_DYNAMIC") == 0)
11024 sym->st_shndx = SHN_ABS;
11025
b34976b6 11026 return TRUE;
5bd4f169
AM
11027}
11028
65f38f15
AM
11029/* Used to decide how to sort relocs in an optimal manner for the
11030 dynamic linker, before writing them out. */
11031
11032static enum elf_reloc_type_class
4ce794b7 11033ppc64_elf_reloc_type_class (const Elf_Internal_Rela *rela)
65f38f15 11034{
04c9666a 11035 enum elf_ppc64_reloc_type r_type;
a33d1f77 11036
4ce794b7 11037 r_type = ELF64_R_TYPE (rela->r_info);
a33d1f77 11038 switch (r_type)
65f38f15
AM
11039 {
11040 case R_PPC64_RELATIVE:
11041 return reloc_class_relative;
11042 case R_PPC64_JMP_SLOT:
11043 return reloc_class_plt;
11044 case R_PPC64_COPY:
11045 return reloc_class_copy;
11046 default:
11047 return reloc_class_normal;
11048 }
11049}
11050
5bd4f169
AM
11051/* Finish up the dynamic sections. */
11052
b34976b6 11053static bfd_boolean
4ce794b7
AM
11054ppc64_elf_finish_dynamic_sections (bfd *output_bfd,
11055 struct bfd_link_info *info)
5bd4f169 11056{
65f38f15
AM
11057 struct ppc_link_hash_table *htab;
11058 bfd *dynobj;
5bd4f169 11059 asection *sdyn;
5bd4f169 11060
65f38f15
AM
11061 htab = ppc_hash_table (info);
11062 dynobj = htab->elf.dynobj;
5bd4f169
AM
11063 sdyn = bfd_get_section_by_name (dynobj, ".dynamic");
11064
65f38f15 11065 if (htab->elf.dynamic_sections_created)
5bd4f169 11066 {
5bd4f169
AM
11067 Elf64_External_Dyn *dyncon, *dynconend;
11068
4ce794b7 11069 if (sdyn == NULL || htab->got == NULL)
65f38f15 11070 abort ();
5bd4f169
AM
11071
11072 dyncon = (Elf64_External_Dyn *) sdyn->contents;
eea6121a 11073 dynconend = (Elf64_External_Dyn *) (sdyn->contents + sdyn->size);
5bd4f169
AM
11074 for (; dyncon < dynconend; dyncon++)
11075 {
11076 Elf_Internal_Dyn dyn;
19397422 11077 asection *s;
5bd4f169
AM
11078
11079 bfd_elf64_swap_dyn_in (dynobj, dyncon, &dyn);
11080
11081 switch (dyn.d_tag)
11082 {
65f38f15
AM
11083 default:
11084 continue;
5bd4f169 11085
5d1634d7 11086 case DT_PPC64_GLINK:
4ce794b7 11087 s = htab->glink;
6348e046 11088 dyn.d_un.d_ptr = s->output_section->vma + s->output_offset;
ad8e1ba5
AM
11089 /* We stupidly defined DT_PPC64_GLINK to be the start
11090 of glink rather than the first entry point, which is
11091 what ld.so needs, and now have a bigger stub to
11092 support automatic multiple TOCs. */
11093 dyn.d_un.d_ptr += GLINK_CALL_STUB_SIZE - 32;
5d1634d7
AM
11094 break;
11095
19397422
AM
11096 case DT_PPC64_OPD:
11097 s = bfd_get_section_by_name (output_bfd, ".opd");
6348e046
AM
11098 if (s == NULL)
11099 continue;
11100 dyn.d_un.d_ptr = s->vma;
19397422
AM
11101 break;
11102
11103 case DT_PPC64_OPDSZ:
11104 s = bfd_get_section_by_name (output_bfd, ".opd");
6348e046
AM
11105 if (s == NULL)
11106 continue;
eea6121a 11107 dyn.d_un.d_val = s->size;
19397422
AM
11108 break;
11109
65f38f15 11110 case DT_PLTGOT:
4ce794b7 11111 s = htab->plt;
6348e046 11112 dyn.d_un.d_ptr = s->output_section->vma + s->output_offset;
65f38f15
AM
11113 break;
11114
11115 case DT_JMPREL:
4ce794b7 11116 s = htab->relplt;
6348e046 11117 dyn.d_un.d_ptr = s->output_section->vma + s->output_offset;
65f38f15 11118 break;
5bd4f169 11119
65f38f15 11120 case DT_PLTRELSZ:
eea6121a 11121 dyn.d_un.d_val = htab->relplt->size;
5d1634d7
AM
11122 break;
11123
11124 case DT_RELASZ:
11125 /* Don't count procedure linkage table relocs in the
11126 overall reloc count. */
4ce794b7 11127 s = htab->relplt;
6348e046
AM
11128 if (s == NULL)
11129 continue;
eea6121a 11130 dyn.d_un.d_val -= s->size;
6348e046
AM
11131 break;
11132
11133 case DT_RELA:
11134 /* We may not be using the standard ELF linker script.
11135 If .rela.plt is the first .rela section, we adjust
11136 DT_RELA to not include it. */
4ce794b7 11137 s = htab->relplt;
6348e046
AM
11138 if (s == NULL)
11139 continue;
11140 if (dyn.d_un.d_ptr != s->output_section->vma + s->output_offset)
11141 continue;
eea6121a 11142 dyn.d_un.d_ptr += s->size;
65f38f15 11143 break;
5bd4f169 11144 }
5bd4f169 11145
65f38f15 11146 bfd_elf64_swap_dyn_out (output_bfd, &dyn, dyncon);
5bd4f169 11147 }
5bd4f169
AM
11148 }
11149
eea6121a 11150 if (htab->got != NULL && htab->got->size != 0)
5d1634d7
AM
11151 {
11152 /* Fill in the first entry in the global offset table.
11153 We use it to hold the link-time TOCbase. */
11154 bfd_put_64 (output_bfd,
60ee0d4a 11155 elf_gp (output_bfd) + TOC_BASE_OFF,
4ce794b7 11156 htab->got->contents);
5d1634d7
AM
11157
11158 /* Set .got entry size. */
4ce794b7 11159 elf_section_data (htab->got->output_section)->this_hdr.sh_entsize = 8;
5d1634d7
AM
11160 }
11161
eea6121a 11162 if (htab->plt != NULL && htab->plt->size != 0)
5d1634d7
AM
11163 {
11164 /* Set .plt entry size. */
4ce794b7 11165 elf_section_data (htab->plt->output_section)->this_hdr.sh_entsize
5d1634d7
AM
11166 = PLT_ENTRY_SIZE;
11167 }
11168
e717da7e 11169 /* We need to handle writing out multiple GOT sections ourselves,
7b53ace3
AM
11170 since we didn't add them to DYNOBJ. We know dynobj is the first
11171 bfd. */
e717da7e
AM
11172 while ((dynobj = dynobj->link_next) != NULL)
11173 {
11174 asection *s;
7b53ace3 11175
ee75fd95 11176 if (!is_ppc64_elf_target (dynobj->xvec))
7b53ace3
AM
11177 continue;
11178
e717da7e
AM
11179 s = ppc64_elf_tdata (dynobj)->got;
11180 if (s != NULL
eea6121a 11181 && s->size != 0
e717da7e
AM
11182 && s->output_section != bfd_abs_section_ptr
11183 && !bfd_set_section_contents (output_bfd, s->output_section,
11184 s->contents, s->output_offset,
eea6121a 11185 s->size))
e717da7e
AM
11186 return FALSE;
11187 s = ppc64_elf_tdata (dynobj)->relgot;
11188 if (s != NULL
eea6121a 11189 && s->size != 0
e717da7e
AM
11190 && s->output_section != bfd_abs_section_ptr
11191 && !bfd_set_section_contents (output_bfd, s->output_section,
11192 s->contents, s->output_offset,
eea6121a 11193 s->size))
e717da7e
AM
11194 return FALSE;
11195 }
f6c52c13 11196
b34976b6 11197 return TRUE;
5bd4f169
AM
11198}
11199
5bd4f169 11200#include "elf64-target.h"
This page took 1.068121 seconds and 4 git commands to generate.