Adjust VLE testsuite
[deliverable/binutils-gdb.git] / bfd / elf64-ppc.c
CommitLineData
5bd4f169 1/* PowerPC64-specific support for 64-bit ELF.
6f2750fe 2 Copyright (C) 1999-2016 Free Software Foundation, Inc.
5bd4f169
AM
3 Written by Linus Nordberg, Swox AB <info@swox.com>,
4 based on elf32-ppc.c by Ian Lance Taylor.
32ca9640 5 Largely rewritten by Alan Modra.
5bd4f169 6
ae9a127f 7 This file is part of BFD, the Binary File Descriptor library.
5bd4f169 8
ae9a127f
NC
9 This program is free software; you can redistribute it and/or modify
10 it under the terms of the GNU General Public License as published by
cd123cb7 11 the Free Software Foundation; either version 3 of the License, or
ae9a127f 12 (at your option) any later version.
5bd4f169 13
ae9a127f
NC
14 This program is distributed in the hope that it will be useful,
15 but WITHOUT ANY WARRANTY; without even the implied warranty of
16 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
17 GNU General Public License for more details.
5bd4f169 18
4ce794b7
AM
19 You should have received a copy of the GNU General Public License along
20 with this program; if not, write to the Free Software Foundation, Inc.,
3e110533 21 51 Franklin Street - Fifth Floor, Boston, MA 02110-1301, USA. */
5bd4f169 22
cd123cb7 23
4ce794b7
AM
24/* The 64-bit PowerPC ELF ABI may be found at
25 http://www.linuxbase.org/spec/ELF/ppc64/PPC-elf64abi.txt, and
26 http://www.linuxbase.org/spec/ELF/ppc64/spec/book1.html */
5bd4f169 27
3db64b00 28#include "sysdep.h"
183e98be 29#include <stdarg.h>
5bd4f169 30#include "bfd.h"
5bd4f169
AM
31#include "bfdlink.h"
32#include "libbfd.h"
33#include "elf-bfd.h"
04c9666a 34#include "elf/ppc64.h"
5d1634d7 35#include "elf64-ppc.h"
58d180e8 36#include "dwarf2.h"
5bd4f169 37
805fc799 38static bfd_reloc_status_type ppc64_elf_ha_reloc
4ce794b7 39 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
2441e016
AM
40static bfd_reloc_status_type ppc64_elf_branch_reloc
41 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
805fc799 42static bfd_reloc_status_type ppc64_elf_brtaken_reloc
4ce794b7 43 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
805fc799 44static bfd_reloc_status_type ppc64_elf_sectoff_reloc
4ce794b7 45 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
805fc799 46static bfd_reloc_status_type ppc64_elf_sectoff_ha_reloc
4ce794b7 47 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
805fc799 48static bfd_reloc_status_type ppc64_elf_toc_reloc
4ce794b7 49 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
805fc799 50static bfd_reloc_status_type ppc64_elf_toc_ha_reloc
4ce794b7 51 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
805fc799 52static bfd_reloc_status_type ppc64_elf_toc64_reloc
4ce794b7 53 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
805fc799 54static bfd_reloc_status_type ppc64_elf_unhandled_reloc
4ce794b7 55 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
2441e016 56static bfd_vma opd_entry_value
aef36ac1 57 (asection *, bfd_vma, asection **, bfd_vma *, bfd_boolean);
5bd4f169 58
6d00b590 59#define TARGET_LITTLE_SYM powerpc_elf64_le_vec
ad8e1ba5 60#define TARGET_LITTLE_NAME "elf64-powerpcle"
6d00b590 61#define TARGET_BIG_SYM powerpc_elf64_vec
ad8e1ba5
AM
62#define TARGET_BIG_NAME "elf64-powerpc"
63#define ELF_ARCH bfd_arch_powerpc
ae95ffa6 64#define ELF_TARGET_ID PPC64_ELF_DATA
ad8e1ba5
AM
65#define ELF_MACHINE_CODE EM_PPC64
66#define ELF_MAXPAGESIZE 0x10000
04c6a44c 67#define ELF_COMMONPAGESIZE 0x10000
ad8e1ba5
AM
68#define elf_info_to_howto ppc64_elf_info_to_howto
69
70#define elf_backend_want_got_sym 0
71#define elf_backend_want_plt_sym 0
72#define elf_backend_plt_alignment 3
73#define elf_backend_plt_not_loaded 1
ad8e1ba5 74#define elf_backend_got_header_size 8
ad8e1ba5
AM
75#define elf_backend_can_gc_sections 1
76#define elf_backend_can_refcount 1
77#define elf_backend_rela_normal 1
6bfdb61b 78#define elf_backend_default_execstack 0
ad8e1ba5 79
e717da7e 80#define bfd_elf64_mkobject ppc64_elf_mkobject
ad8e1ba5 81#define bfd_elf64_bfd_reloc_type_lookup ppc64_elf_reloc_type_lookup
aa374f67 82#define bfd_elf64_bfd_reloc_name_lookup ppc64_elf_reloc_name_lookup
ee67d69a
AM
83#define bfd_elf64_bfd_merge_private_bfd_data ppc64_elf_merge_private_bfd_data
84#define bfd_elf64_bfd_print_private_bfd_data ppc64_elf_print_private_bfd_data
ad8e1ba5
AM
85#define bfd_elf64_new_section_hook ppc64_elf_new_section_hook
86#define bfd_elf64_bfd_link_hash_table_create ppc64_elf_link_hash_table_create
90e3cdf2 87#define bfd_elf64_get_synthetic_symtab ppc64_elf_get_synthetic_symtab
aa374f67 88#define bfd_elf64_bfd_link_just_syms ppc64_elf_link_just_syms
ad8e1ba5
AM
89
90#define elf_backend_object_p ppc64_elf_object_p
d37c89e5
AM
91#define elf_backend_grok_prstatus ppc64_elf_grok_prstatus
92#define elf_backend_grok_psinfo ppc64_elf_grok_psinfo
183e98be 93#define elf_backend_write_core_note ppc64_elf_write_core_note
ad8e1ba5
AM
94#define elf_backend_create_dynamic_sections ppc64_elf_create_dynamic_sections
95#define elf_backend_copy_indirect_symbol ppc64_elf_copy_indirect_symbol
555cd476 96#define elf_backend_add_symbol_hook ppc64_elf_add_symbol_hook
f6c7c3e8 97#define elf_backend_check_directives ppc64_elf_before_check_relocs
e5034e59 98#define elf_backend_notice_as_needed ppc64_elf_notice_as_needed
8387904d 99#define elf_backend_archive_symbol_lookup ppc64_elf_archive_symbol_lookup
ad8e1ba5 100#define elf_backend_check_relocs ppc64_elf_check_relocs
74f0fb50 101#define elf_backend_gc_keep ppc64_elf_gc_keep
64d03ab5 102#define elf_backend_gc_mark_dynamic_ref ppc64_elf_gc_mark_dynamic_ref
ad8e1ba5
AM
103#define elf_backend_gc_mark_hook ppc64_elf_gc_mark_hook
104#define elf_backend_gc_sweep_hook ppc64_elf_gc_sweep_hook
105#define elf_backend_adjust_dynamic_symbol ppc64_elf_adjust_dynamic_symbol
106#define elf_backend_hide_symbol ppc64_elf_hide_symbol
9f296da3 107#define elf_backend_maybe_function_sym ppc64_elf_maybe_function_sym
ad8e1ba5
AM
108#define elf_backend_always_size_sections ppc64_elf_func_desc_adjust
109#define elf_backend_size_dynamic_sections ppc64_elf_size_dynamic_sections
a345bc8d 110#define elf_backend_hash_symbol ppc64_elf_hash_symbol
74541ad4 111#define elf_backend_init_index_section _bfd_elf_init_2_index_sections
60124e18 112#define elf_backend_action_discarded ppc64_elf_action_discarded
ad8e1ba5
AM
113#define elf_backend_relocate_section ppc64_elf_relocate_section
114#define elf_backend_finish_dynamic_symbol ppc64_elf_finish_dynamic_symbol
115#define elf_backend_reloc_type_class ppc64_elf_reloc_type_class
116#define elf_backend_finish_dynamic_sections ppc64_elf_finish_dynamic_sections
754021d0 117#define elf_backend_link_output_symbol_hook ppc64_elf_output_symbol_hook
29ef7005 118#define elf_backend_special_sections ppc64_elf_special_sections
6911b7dc 119#define elf_backend_merge_symbol_attribute ppc64_elf_merge_symbol_attribute
ad8e1ba5 120
5bd4f169
AM
121/* The name of the dynamic interpreter. This is put in the .interp
122 section. */
123#define ELF_DYNAMIC_INTERPRETER "/usr/lib/ld.so.1"
124
125/* The size in bytes of an entry in the procedure linkage table. */
b9e5796b 126#define PLT_ENTRY_SIZE(htab) (htab->opd_abi ? 24 : 8)
5bd4f169
AM
127
128/* The initial size of the plt reserved for the dynamic linker. */
b9e5796b 129#define PLT_INITIAL_ENTRY_SIZE(htab) (htab->opd_abi ? 24 : 16)
5bd4f169 130
a078d95a
AM
131/* Offsets to some stack save slots. */
132#define STK_LR 16
133#define STK_TOC(htab) (htab->opd_abi ? 40 : 24)
eb8d7fda 134/* This one is dodgy. ELFv2 does not have a linker word, so use the
a078d95a
AM
135 CR save slot. Used only by optimised __tls_get_addr call stub,
136 relying on __tls_get_addr_opt not saving CR.. */
137#define STK_LINKER(htab) (htab->opd_abi ? 32 : 8)
138
5bd4f169 139/* TOC base pointers offset from start of TOC. */
411e1bfb 140#define TOC_BASE_OFF 0x8000
a27e685f
AM
141/* TOC base alignment. */
142#define TOC_BASE_ALIGN 256
411e1bfb
AM
143
144/* Offset of tp and dtp pointers from start of TLS block. */
145#define TP_OFFSET 0x7000
146#define DTP_OFFSET 0x8000
5bd4f169 147
ad8e1ba5
AM
148/* .plt call stub instructions. The normal stub is like this, but
149 sometimes the .plt entry crosses a 64k boundary and we need to
71a39c98 150 insert an addi to adjust r11. */
a078d95a 151#define STD_R2_0R1 0xf8410000 /* std %r2,0+40(%r1) */
71a39c98
AM
152#define ADDIS_R11_R2 0x3d620000 /* addis %r11,%r2,xxx@ha */
153#define LD_R12_0R11 0xe98b0000 /* ld %r12,xxx+0@l(%r11) */
154#define MTCTR_R12 0x7d8903a6 /* mtctr %r12 */
155#define LD_R2_0R11 0xe84b0000 /* ld %r2,xxx+8@l(%r11) */
156#define LD_R11_0R11 0xe96b0000 /* ld %r11,xxx+16@l(%r11) */
5d1634d7
AM
157#define BCTR 0x4e800420 /* bctr */
158
71a39c98 159#define ADDI_R11_R11 0x396b0000 /* addi %r11,%r11,off@l */
ad8e1ba5
AM
160#define ADDIS_R2_R2 0x3c420000 /* addis %r2,%r2,off@ha */
161#define ADDI_R2_R2 0x38420000 /* addi %r2,%r2,off@l */
162
71a39c98
AM
163#define XOR_R2_R12_R12 0x7d826278 /* xor %r2,%r12,%r12 */
164#define ADD_R11_R11_R2 0x7d6b1214 /* add %r11,%r11,%r2 */
165#define XOR_R11_R12_R12 0x7d8b6278 /* xor %r11,%r12,%r12 */
794e51c0
AM
166#define ADD_R2_R2_R11 0x7c425a14 /* add %r2,%r2,%r11 */
167#define CMPLDI_R2_0 0x28220000 /* cmpldi %r2,0 */
168#define BNECTR 0x4ca20420 /* bnectr+ */
169#define BNECTR_P4 0x4ce20420 /* bnectr+ */
170
71a39c98 171#define LD_R12_0R2 0xe9820000 /* ld %r12,xxx+0(%r2) */
ac2df442
AM
172#define LD_R11_0R2 0xe9620000 /* ld %r11,xxx+0(%r2) */
173#define LD_R2_0R2 0xe8420000 /* ld %r2,xxx+0(%r2) */
174
a078d95a 175#define LD_R2_0R1 0xe8410000 /* ld %r2,0(%r1) */
006589cf
AM
176#define LD_R2_0R12 0xe84c0000 /* ld %r2,0(%r12) */
177#define ADD_R2_R2_R12 0x7c426214 /* add %r2,%r2,%r12 */
ad8e1ba5 178
006589cf
AM
179#define LIS_R2 0x3c400000 /* lis %r2,xxx@ha */
180#define ADDIS_R2_R12 0x3c4c0000 /* addis %r2,%r12,xxx@ha */
181#define ADDIS_R12_R2 0x3d820000 /* addis %r12,%r2,xxx@ha */
a345bc8d
AM
182#define ADDIS_R12_R12 0x3d8c0000 /* addis %r12,%r12,xxx@ha */
183#define LD_R12_0R12 0xe98c0000 /* ld %r12,xxx@l(%r12) */
184
ee4bf8d2 185/* glink call stub instructions. We enter with the index in R0. */
ad8e1ba5 186#define GLINK_CALL_STUB_SIZE (16*4)
ee4bf8d2
AM
187 /* 0: */
188 /* .quad plt0-1f */
189 /* __glink: */
190#define MFLR_R12 0x7d8802a6 /* mflr %12 */
191#define BCL_20_31 0x429f0005 /* bcl 20,31,1f */
192 /* 1: */
193#define MFLR_R11 0x7d6802a6 /* mflr %11 */
71a39c98 194 /* ld %2,(0b-1b)(%11) */
ee4bf8d2 195#define MTLR_R12 0x7d8803a6 /* mtlr %12 */
71a39c98
AM
196#define ADD_R11_R2_R11 0x7d625a14 /* add %11,%2,%11 */
197 /* ld %12,0(%11) */
198 /* ld %2,8(%11) */
199 /* mtctr %12 */
200 /* ld %11,16(%11) */
ee4bf8d2 201 /* bctr */
b9e5796b
AM
202#define MFLR_R0 0x7c0802a6 /* mflr %r0 */
203#define MTLR_R0 0x7c0803a6 /* mtlr %r0 */
204#define SUB_R12_R12_R11 0x7d8b6050 /* subf %r12,%r11,%r12 */
205#define ADDI_R0_R12 0x380c0000 /* addi %r0,%r12,0 */
206#define SRDI_R0_R0_2 0x7800f082 /* rldicl %r0,%r0,62,2 */
5d1634d7
AM
207
208/* Pad with this. */
209#define NOP 0x60000000
210
721956f4
AM
211/* Some other nops. */
212#define CROR_151515 0x4def7b82
213#define CROR_313131 0x4ffffb82
214
cedb70c5 215/* .glink entries for the first 32k functions are two instructions. */
5d1634d7
AM
216#define LI_R0_0 0x38000000 /* li %r0,0 */
217#define B_DOT 0x48000000 /* b . */
218
219/* After that, we need two instructions to load the index, followed by
220 a branch. */
221#define LIS_R0_0 0x3c000000 /* lis %r0,0 */
10ed1bba 222#define ORI_R0_R0_0 0x60000000 /* ori %r0,%r0,0 */
41bd81ab 223
deb0e272
AM
224/* Instructions used by the save and restore reg functions. */
225#define STD_R0_0R1 0xf8010000 /* std %r0,0(%r1) */
226#define STD_R0_0R12 0xf80c0000 /* std %r0,0(%r12) */
227#define LD_R0_0R1 0xe8010000 /* ld %r0,0(%r1) */
228#define LD_R0_0R12 0xe80c0000 /* ld %r0,0(%r12) */
82bd7b59
AM
229#define STFD_FR0_0R1 0xd8010000 /* stfd %fr0,0(%r1) */
230#define LFD_FR0_0R1 0xc8010000 /* lfd %fr0,0(%r1) */
deb0e272
AM
231#define LI_R12_0 0x39800000 /* li %r12,0 */
232#define STVX_VR0_R12_R0 0x7c0c01ce /* stvx %v0,%r12,%r0 */
233#define LVX_VR0_R12_R0 0x7c0c00ce /* lvx %v0,%r12,%r0 */
234#define MTLR_R0 0x7c0803a6 /* mtlr %r0 */
82bd7b59
AM
235#define BLR 0x4e800020 /* blr */
236
41bd81ab
AM
237/* Since .opd is an array of descriptors and each entry will end up
238 with identical R_PPC64_RELATIVE relocs, there is really no need to
239 propagate .opd relocs; The dynamic linker should be taught to
1e2f5b6e 240 relocate .opd without reloc entries. */
41bd81ab
AM
241#ifndef NO_OPD_RELOCS
242#define NO_OPD_RELOCS 0
243#endif
810d4e75 244
a4b6fadd
AM
245#ifndef ARRAY_SIZE
246#define ARRAY_SIZE(a) (sizeof (a) / sizeof ((a)[0]))
247#endif
248
810d4e75
AM
249static inline int
250abiversion (bfd *abfd)
251{
252 return elf_elfheader (abfd)->e_flags & EF_PPC64_ABI;
253}
254
255static inline void
256set_abiversion (bfd *abfd, int ver)
257{
258 elf_elfheader (abfd)->e_flags &= ~EF_PPC64_ABI;
259 elf_elfheader (abfd)->e_flags |= ver & EF_PPC64_ABI;
260}
5bd4f169 261\f
f5e87a1d 262#define ONES(n) (((bfd_vma) 1 << ((n) - 1) << 1) - 1)
b34976b6 263
5bd4f169 264/* Relocation HOWTO's. */
04c9666a 265static reloc_howto_type *ppc64_elf_howto_table[(int) R_PPC64_max];
5bd4f169
AM
266
267static reloc_howto_type ppc64_elf_howto_raw[] = {
268 /* This reloc does nothing. */
269 HOWTO (R_PPC64_NONE, /* type */
270 0, /* rightshift */
6346d5ca
AM
271 3, /* size (0 = byte, 1 = short, 2 = long) */
272 0, /* bitsize */
b34976b6 273 FALSE, /* pc_relative */
5bd4f169 274 0, /* bitpos */
f5e87a1d 275 complain_overflow_dont, /* complain_on_overflow */
5bd4f169
AM
276 bfd_elf_generic_reloc, /* special_function */
277 "R_PPC64_NONE", /* name */
b34976b6 278 FALSE, /* partial_inplace */
d006db6c 279 0, /* src_mask */
5bd4f169 280 0, /* dst_mask */
b34976b6 281 FALSE), /* pcrel_offset */
5bd4f169
AM
282
283 /* A standard 32 bit relocation. */
284 HOWTO (R_PPC64_ADDR32, /* type */
285 0, /* rightshift */
286 2, /* size (0 = byte, 1 = short, 2 = long) */
287 32, /* bitsize */
b34976b6 288 FALSE, /* pc_relative */
5bd4f169
AM
289 0, /* bitpos */
290 complain_overflow_bitfield, /* complain_on_overflow */
291 bfd_elf_generic_reloc, /* special_function */
292 "R_PPC64_ADDR32", /* name */
b34976b6 293 FALSE, /* partial_inplace */
5bd4f169
AM
294 0, /* src_mask */
295 0xffffffff, /* dst_mask */
b34976b6 296 FALSE), /* pcrel_offset */
5bd4f169
AM
297
298 /* An absolute 26 bit branch; the lower two bits must be zero.
299 FIXME: we don't check that, we just clear them. */
300 HOWTO (R_PPC64_ADDR24, /* type */
301 0, /* rightshift */
302 2, /* size (0 = byte, 1 = short, 2 = long) */
303 26, /* bitsize */
b34976b6 304 FALSE, /* pc_relative */
5bd4f169
AM
305 0, /* bitpos */
306 complain_overflow_bitfield, /* complain_on_overflow */
307 bfd_elf_generic_reloc, /* special_function */
308 "R_PPC64_ADDR24", /* name */
b34976b6 309 FALSE, /* partial_inplace */
d006db6c 310 0, /* src_mask */
f5e87a1d 311 0x03fffffc, /* dst_mask */
b34976b6 312 FALSE), /* pcrel_offset */
5bd4f169
AM
313
314 /* A standard 16 bit relocation. */
315 HOWTO (R_PPC64_ADDR16, /* type */
316 0, /* rightshift */
317 1, /* size (0 = byte, 1 = short, 2 = long) */
318 16, /* bitsize */
b34976b6 319 FALSE, /* pc_relative */
5bd4f169
AM
320 0, /* bitpos */
321 complain_overflow_bitfield, /* complain_on_overflow */
322 bfd_elf_generic_reloc, /* special_function */
323 "R_PPC64_ADDR16", /* name */
b34976b6 324 FALSE, /* partial_inplace */
5bd4f169
AM
325 0, /* src_mask */
326 0xffff, /* dst_mask */
b34976b6 327 FALSE), /* pcrel_offset */
5bd4f169
AM
328
329 /* A 16 bit relocation without overflow. */
330 HOWTO (R_PPC64_ADDR16_LO, /* type */
331 0, /* rightshift */
332 1, /* size (0 = byte, 1 = short, 2 = long) */
333 16, /* bitsize */
b34976b6 334 FALSE, /* pc_relative */
5bd4f169
AM
335 0, /* bitpos */
336 complain_overflow_dont,/* complain_on_overflow */
337 bfd_elf_generic_reloc, /* special_function */
338 "R_PPC64_ADDR16_LO", /* name */
b34976b6 339 FALSE, /* partial_inplace */
5bd4f169
AM
340 0, /* src_mask */
341 0xffff, /* dst_mask */
b34976b6 342 FALSE), /* pcrel_offset */
5bd4f169
AM
343
344 /* Bits 16-31 of an address. */
345 HOWTO (R_PPC64_ADDR16_HI, /* type */
346 16, /* rightshift */
347 1, /* size (0 = byte, 1 = short, 2 = long) */
348 16, /* bitsize */
b34976b6 349 FALSE, /* pc_relative */
5bd4f169 350 0, /* bitpos */
f9c6b907 351 complain_overflow_signed, /* complain_on_overflow */
5bd4f169
AM
352 bfd_elf_generic_reloc, /* special_function */
353 "R_PPC64_ADDR16_HI", /* name */
b34976b6 354 FALSE, /* partial_inplace */
5bd4f169
AM
355 0, /* src_mask */
356 0xffff, /* dst_mask */
b34976b6 357 FALSE), /* pcrel_offset */
5bd4f169
AM
358
359 /* Bits 16-31 of an address, plus 1 if the contents of the low 16
360 bits, treated as a signed number, is negative. */
361 HOWTO (R_PPC64_ADDR16_HA, /* type */
362 16, /* rightshift */
363 1, /* size (0 = byte, 1 = short, 2 = long) */
364 16, /* bitsize */
b34976b6 365 FALSE, /* pc_relative */
5bd4f169 366 0, /* bitpos */
f9c6b907 367 complain_overflow_signed, /* complain_on_overflow */
805fc799 368 ppc64_elf_ha_reloc, /* special_function */
5bd4f169 369 "R_PPC64_ADDR16_HA", /* name */
b34976b6 370 FALSE, /* partial_inplace */
5bd4f169
AM
371 0, /* src_mask */
372 0xffff, /* dst_mask */
b34976b6 373 FALSE), /* pcrel_offset */
5bd4f169
AM
374
375 /* An absolute 16 bit branch; the lower two bits must be zero.
376 FIXME: we don't check that, we just clear them. */
377 HOWTO (R_PPC64_ADDR14, /* type */
378 0, /* rightshift */
379 2, /* size (0 = byte, 1 = short, 2 = long) */
380 16, /* bitsize */
b34976b6 381 FALSE, /* pc_relative */
5bd4f169 382 0, /* bitpos */
b80eed39 383 complain_overflow_signed, /* complain_on_overflow */
2441e016 384 ppc64_elf_branch_reloc, /* special_function */
5bd4f169 385 "R_PPC64_ADDR14", /* name */
b34976b6 386 FALSE, /* partial_inplace */
d006db6c 387 0, /* src_mask */
f5e87a1d 388 0x0000fffc, /* dst_mask */
b34976b6 389 FALSE), /* pcrel_offset */
5bd4f169
AM
390
391 /* An absolute 16 bit branch, for which bit 10 should be set to
392 indicate that the branch is expected to be taken. The lower two
393 bits must be zero. */
394 HOWTO (R_PPC64_ADDR14_BRTAKEN, /* type */
395 0, /* rightshift */
396 2, /* size (0 = byte, 1 = short, 2 = long) */
397 16, /* bitsize */
b34976b6 398 FALSE, /* pc_relative */
5bd4f169 399 0, /* bitpos */
b80eed39 400 complain_overflow_signed, /* complain_on_overflow */
805fc799 401 ppc64_elf_brtaken_reloc, /* special_function */
5bd4f169 402 "R_PPC64_ADDR14_BRTAKEN",/* name */
b34976b6 403 FALSE, /* partial_inplace */
d006db6c 404 0, /* src_mask */
f5e87a1d 405 0x0000fffc, /* dst_mask */
b34976b6 406 FALSE), /* pcrel_offset */
5bd4f169
AM
407
408 /* An absolute 16 bit branch, for which bit 10 should be set to
409 indicate that the branch is not expected to be taken. The lower
410 two bits must be zero. */
411 HOWTO (R_PPC64_ADDR14_BRNTAKEN, /* type */
412 0, /* rightshift */
413 2, /* size (0 = byte, 1 = short, 2 = long) */
414 16, /* bitsize */
b34976b6 415 FALSE, /* pc_relative */
5bd4f169 416 0, /* bitpos */
b80eed39 417 complain_overflow_signed, /* complain_on_overflow */
805fc799 418 ppc64_elf_brtaken_reloc, /* special_function */
5bd4f169 419 "R_PPC64_ADDR14_BRNTAKEN",/* name */
b34976b6 420 FALSE, /* partial_inplace */
d006db6c 421 0, /* src_mask */
f5e87a1d 422 0x0000fffc, /* dst_mask */
b34976b6 423 FALSE), /* pcrel_offset */
5bd4f169
AM
424
425 /* A relative 26 bit branch; the lower two bits must be zero. */
426 HOWTO (R_PPC64_REL24, /* type */
427 0, /* rightshift */
428 2, /* size (0 = byte, 1 = short, 2 = long) */
429 26, /* bitsize */
b34976b6 430 TRUE, /* pc_relative */
5bd4f169
AM
431 0, /* bitpos */
432 complain_overflow_signed, /* complain_on_overflow */
2441e016 433 ppc64_elf_branch_reloc, /* special_function */
5bd4f169 434 "R_PPC64_REL24", /* name */
b34976b6 435 FALSE, /* partial_inplace */
d006db6c 436 0, /* src_mask */
f5e87a1d 437 0x03fffffc, /* dst_mask */
b34976b6 438 TRUE), /* pcrel_offset */
5bd4f169
AM
439
440 /* A relative 16 bit branch; the lower two bits must be zero. */
441 HOWTO (R_PPC64_REL14, /* type */
442 0, /* rightshift */
443 2, /* size (0 = byte, 1 = short, 2 = long) */
444 16, /* bitsize */
b34976b6 445 TRUE, /* pc_relative */
5bd4f169
AM
446 0, /* bitpos */
447 complain_overflow_signed, /* complain_on_overflow */
2441e016 448 ppc64_elf_branch_reloc, /* special_function */
5bd4f169 449 "R_PPC64_REL14", /* name */
b34976b6 450 FALSE, /* partial_inplace */
d006db6c 451 0, /* src_mask */
f5e87a1d 452 0x0000fffc, /* dst_mask */
b34976b6 453 TRUE), /* pcrel_offset */
5bd4f169
AM
454
455 /* A relative 16 bit branch. Bit 10 should be set to indicate that
456 the branch is expected to be taken. The lower two bits must be
457 zero. */
458 HOWTO (R_PPC64_REL14_BRTAKEN, /* type */
459 0, /* rightshift */
460 2, /* size (0 = byte, 1 = short, 2 = long) */
461 16, /* bitsize */
b34976b6 462 TRUE, /* pc_relative */
5bd4f169
AM
463 0, /* bitpos */
464 complain_overflow_signed, /* complain_on_overflow */
805fc799 465 ppc64_elf_brtaken_reloc, /* special_function */
5bd4f169 466 "R_PPC64_REL14_BRTAKEN", /* name */
b34976b6 467 FALSE, /* partial_inplace */
d006db6c 468 0, /* src_mask */
f5e87a1d 469 0x0000fffc, /* dst_mask */
b34976b6 470 TRUE), /* pcrel_offset */
5bd4f169
AM
471
472 /* A relative 16 bit branch. Bit 10 should be set to indicate that
473 the branch is not expected to be taken. The lower two bits must
474 be zero. */
475 HOWTO (R_PPC64_REL14_BRNTAKEN, /* type */
476 0, /* rightshift */
477 2, /* size (0 = byte, 1 = short, 2 = long) */
478 16, /* bitsize */
b34976b6 479 TRUE, /* pc_relative */
5bd4f169
AM
480 0, /* bitpos */
481 complain_overflow_signed, /* complain_on_overflow */
805fc799 482 ppc64_elf_brtaken_reloc, /* special_function */
5bd4f169 483 "R_PPC64_REL14_BRNTAKEN",/* name */
b34976b6 484 FALSE, /* partial_inplace */
d006db6c 485 0, /* src_mask */
f5e87a1d 486 0x0000fffc, /* dst_mask */
b34976b6 487 TRUE), /* pcrel_offset */
5bd4f169
AM
488
489 /* Like R_PPC64_ADDR16, but referring to the GOT table entry for the
490 symbol. */
491 HOWTO (R_PPC64_GOT16, /* type */
492 0, /* rightshift */
493 1, /* size (0 = byte, 1 = short, 2 = long) */
494 16, /* bitsize */
b34976b6 495 FALSE, /* pc_relative */
5bd4f169
AM
496 0, /* bitpos */
497 complain_overflow_signed, /* complain_on_overflow */
805fc799 498 ppc64_elf_unhandled_reloc, /* special_function */
5bd4f169 499 "R_PPC64_GOT16", /* name */
b34976b6 500 FALSE, /* partial_inplace */
5bd4f169
AM
501 0, /* src_mask */
502 0xffff, /* dst_mask */
b34976b6 503 FALSE), /* pcrel_offset */
5bd4f169
AM
504
505 /* Like R_PPC64_ADDR16_LO, but referring to the GOT table entry for
506 the symbol. */
507 HOWTO (R_PPC64_GOT16_LO, /* type */
508 0, /* rightshift */
509 1, /* size (0 = byte, 1 = short, 2 = long) */
510 16, /* bitsize */
b34976b6 511 FALSE, /* pc_relative */
5bd4f169
AM
512 0, /* bitpos */
513 complain_overflow_dont, /* complain_on_overflow */
805fc799 514 ppc64_elf_unhandled_reloc, /* special_function */
5bd4f169 515 "R_PPC64_GOT16_LO", /* name */
b34976b6 516 FALSE, /* partial_inplace */
5bd4f169
AM
517 0, /* src_mask */
518 0xffff, /* dst_mask */
b34976b6 519 FALSE), /* pcrel_offset */
5bd4f169
AM
520
521 /* Like R_PPC64_ADDR16_HI, but referring to the GOT table entry for
522 the symbol. */
523 HOWTO (R_PPC64_GOT16_HI, /* type */
524 16, /* rightshift */
525 1, /* size (0 = byte, 1 = short, 2 = long) */
526 16, /* bitsize */
b34976b6 527 FALSE, /* pc_relative */
5bd4f169 528 0, /* bitpos */
f9c6b907 529 complain_overflow_signed,/* complain_on_overflow */
805fc799 530 ppc64_elf_unhandled_reloc, /* special_function */
5bd4f169 531 "R_PPC64_GOT16_HI", /* name */
b34976b6 532 FALSE, /* partial_inplace */
5bd4f169
AM
533 0, /* src_mask */
534 0xffff, /* dst_mask */
b34976b6 535 FALSE), /* pcrel_offset */
5bd4f169
AM
536
537 /* Like R_PPC64_ADDR16_HA, but referring to the GOT table entry for
538 the symbol. */
539 HOWTO (R_PPC64_GOT16_HA, /* type */
540 16, /* rightshift */
541 1, /* size (0 = byte, 1 = short, 2 = long) */
542 16, /* bitsize */
b34976b6 543 FALSE, /* pc_relative */
5bd4f169 544 0, /* bitpos */
f9c6b907 545 complain_overflow_signed,/* complain_on_overflow */
805fc799 546 ppc64_elf_unhandled_reloc, /* special_function */
5bd4f169 547 "R_PPC64_GOT16_HA", /* name */
b34976b6 548 FALSE, /* partial_inplace */
5bd4f169
AM
549 0, /* src_mask */
550 0xffff, /* dst_mask */
b34976b6 551 FALSE), /* pcrel_offset */
5bd4f169
AM
552
553 /* This is used only by the dynamic linker. The symbol should exist
554 both in the object being run and in some shared library. The
555 dynamic linker copies the data addressed by the symbol from the
556 shared library into the object, because the object being
557 run has to have the data at some particular address. */
558 HOWTO (R_PPC64_COPY, /* type */
559 0, /* rightshift */
f5e87a1d
AM
560 0, /* this one is variable size */
561 0, /* bitsize */
b34976b6 562 FALSE, /* pc_relative */
5bd4f169 563 0, /* bitpos */
f5e87a1d
AM
564 complain_overflow_dont, /* complain_on_overflow */
565 ppc64_elf_unhandled_reloc, /* special_function */
5bd4f169 566 "R_PPC64_COPY", /* name */
b34976b6 567 FALSE, /* partial_inplace */
5bd4f169
AM
568 0, /* src_mask */
569 0, /* dst_mask */
b34976b6 570 FALSE), /* pcrel_offset */
5bd4f169
AM
571
572 /* Like R_PPC64_ADDR64, but used when setting global offset table
573 entries. */
574 HOWTO (R_PPC64_GLOB_DAT, /* type */
575 0, /* rightshift */
576 4, /* size (0=byte, 1=short, 2=long, 4=64 bits) */
577 64, /* bitsize */
b34976b6 578 FALSE, /* pc_relative */
5bd4f169
AM
579 0, /* bitpos */
580 complain_overflow_dont, /* complain_on_overflow */
805fc799 581 ppc64_elf_unhandled_reloc, /* special_function */
5bd4f169 582 "R_PPC64_GLOB_DAT", /* name */
b34976b6 583 FALSE, /* partial_inplace */
5bd4f169 584 0, /* src_mask */
f5e87a1d 585 ONES (64), /* dst_mask */
b34976b6 586 FALSE), /* pcrel_offset */
5bd4f169
AM
587
588 /* Created by the link editor. Marks a procedure linkage table
589 entry for a symbol. */
590 HOWTO (R_PPC64_JMP_SLOT, /* type */
591 0, /* rightshift */
592 0, /* size (0 = byte, 1 = short, 2 = long) */
593 0, /* bitsize */
b34976b6 594 FALSE, /* pc_relative */
5bd4f169
AM
595 0, /* bitpos */
596 complain_overflow_dont, /* complain_on_overflow */
805fc799 597 ppc64_elf_unhandled_reloc, /* special_function */
5bd4f169 598 "R_PPC64_JMP_SLOT", /* name */
b34976b6 599 FALSE, /* partial_inplace */
5bd4f169
AM
600 0, /* src_mask */
601 0, /* dst_mask */
b34976b6 602 FALSE), /* pcrel_offset */
5bd4f169
AM
603
604 /* Used only by the dynamic linker. When the object is run, this
605 doubleword64 is set to the load address of the object, plus the
606 addend. */
607 HOWTO (R_PPC64_RELATIVE, /* type */
608 0, /* rightshift */
609 4, /* size (0=byte, 1=short, 2=long, 4=64 bits) */
610 64, /* bitsize */
b34976b6 611 FALSE, /* pc_relative */
5bd4f169
AM
612 0, /* bitpos */
613 complain_overflow_dont, /* complain_on_overflow */
614 bfd_elf_generic_reloc, /* special_function */
615 "R_PPC64_RELATIVE", /* name */
b34976b6 616 FALSE, /* partial_inplace */
5bd4f169 617 0, /* src_mask */
f5e87a1d 618 ONES (64), /* dst_mask */
b34976b6 619 FALSE), /* pcrel_offset */
5bd4f169
AM
620
621 /* Like R_PPC64_ADDR32, but may be unaligned. */
622 HOWTO (R_PPC64_UADDR32, /* type */
623 0, /* rightshift */
624 2, /* size (0 = byte, 1 = short, 2 = long) */
625 32, /* bitsize */
b34976b6 626 FALSE, /* pc_relative */
5bd4f169
AM
627 0, /* bitpos */
628 complain_overflow_bitfield, /* complain_on_overflow */
629 bfd_elf_generic_reloc, /* special_function */
630 "R_PPC64_UADDR32", /* name */
b34976b6 631 FALSE, /* partial_inplace */
5bd4f169
AM
632 0, /* src_mask */
633 0xffffffff, /* dst_mask */
b34976b6 634 FALSE), /* pcrel_offset */
5bd4f169
AM
635
636 /* Like R_PPC64_ADDR16, but may be unaligned. */
637 HOWTO (R_PPC64_UADDR16, /* type */
638 0, /* rightshift */
639 1, /* size (0 = byte, 1 = short, 2 = long) */
640 16, /* bitsize */
b34976b6 641 FALSE, /* pc_relative */
5bd4f169
AM
642 0, /* bitpos */
643 complain_overflow_bitfield, /* complain_on_overflow */
644 bfd_elf_generic_reloc, /* special_function */
645 "R_PPC64_UADDR16", /* name */
b34976b6 646 FALSE, /* partial_inplace */
5bd4f169
AM
647 0, /* src_mask */
648 0xffff, /* dst_mask */
b34976b6 649 FALSE), /* pcrel_offset */
5bd4f169
AM
650
651 /* 32-bit PC relative. */
652 HOWTO (R_PPC64_REL32, /* type */
653 0, /* rightshift */
654 2, /* size (0 = byte, 1 = short, 2 = long) */
655 32, /* bitsize */
b34976b6 656 TRUE, /* pc_relative */
5bd4f169 657 0, /* bitpos */
5bd4f169
AM
658 complain_overflow_signed, /* complain_on_overflow */
659 bfd_elf_generic_reloc, /* special_function */
660 "R_PPC64_REL32", /* name */
b34976b6 661 FALSE, /* partial_inplace */
5bd4f169
AM
662 0, /* src_mask */
663 0xffffffff, /* dst_mask */
b34976b6 664 TRUE), /* pcrel_offset */
5bd4f169 665
10ed1bba 666 /* 32-bit relocation to the symbol's procedure linkage table. */
5bd4f169
AM
667 HOWTO (R_PPC64_PLT32, /* type */
668 0, /* rightshift */
669 2, /* size (0 = byte, 1 = short, 2 = long) */
670 32, /* bitsize */
b34976b6 671 FALSE, /* pc_relative */
5bd4f169
AM
672 0, /* bitpos */
673 complain_overflow_bitfield, /* complain_on_overflow */
805fc799 674 ppc64_elf_unhandled_reloc, /* special_function */
5bd4f169 675 "R_PPC64_PLT32", /* name */
b34976b6 676 FALSE, /* partial_inplace */
5bd4f169 677 0, /* src_mask */
f5e87a1d 678 0xffffffff, /* dst_mask */
b34976b6 679 FALSE), /* pcrel_offset */
5bd4f169
AM
680
681 /* 32-bit PC relative relocation to the symbol's procedure linkage table.
682 FIXME: R_PPC64_PLTREL32 not supported. */
683 HOWTO (R_PPC64_PLTREL32, /* type */
684 0, /* rightshift */
685 2, /* size (0 = byte, 1 = short, 2 = long) */
686 32, /* bitsize */
b34976b6 687 TRUE, /* pc_relative */
5bd4f169
AM
688 0, /* bitpos */
689 complain_overflow_signed, /* complain_on_overflow */
3ce51288 690 ppc64_elf_unhandled_reloc, /* special_function */
5bd4f169 691 "R_PPC64_PLTREL32", /* name */
b34976b6 692 FALSE, /* partial_inplace */
5bd4f169 693 0, /* src_mask */
f5e87a1d 694 0xffffffff, /* dst_mask */
b34976b6 695 TRUE), /* pcrel_offset */
5bd4f169
AM
696
697 /* Like R_PPC64_ADDR16_LO, but referring to the PLT table entry for
698 the symbol. */
699 HOWTO (R_PPC64_PLT16_LO, /* type */
700 0, /* rightshift */
701 1, /* size (0 = byte, 1 = short, 2 = long) */
702 16, /* bitsize */
b34976b6 703 FALSE, /* pc_relative */
5bd4f169
AM
704 0, /* bitpos */
705 complain_overflow_dont, /* complain_on_overflow */
805fc799 706 ppc64_elf_unhandled_reloc, /* special_function */
5bd4f169 707 "R_PPC64_PLT16_LO", /* name */
b34976b6 708 FALSE, /* partial_inplace */
5bd4f169
AM
709 0, /* src_mask */
710 0xffff, /* dst_mask */
b34976b6 711 FALSE), /* pcrel_offset */
5bd4f169
AM
712
713 /* Like R_PPC64_ADDR16_HI, but referring to the PLT table entry for
714 the symbol. */
715 HOWTO (R_PPC64_PLT16_HI, /* type */
716 16, /* rightshift */
717 1, /* size (0 = byte, 1 = short, 2 = long) */
718 16, /* bitsize */
b34976b6 719 FALSE, /* pc_relative */
5bd4f169 720 0, /* bitpos */
f9c6b907 721 complain_overflow_signed, /* complain_on_overflow */
805fc799 722 ppc64_elf_unhandled_reloc, /* special_function */
5bd4f169 723 "R_PPC64_PLT16_HI", /* name */
b34976b6 724 FALSE, /* partial_inplace */
5bd4f169
AM
725 0, /* src_mask */
726 0xffff, /* dst_mask */
b34976b6 727 FALSE), /* pcrel_offset */
5bd4f169
AM
728
729 /* Like R_PPC64_ADDR16_HA, but referring to the PLT table entry for
730 the symbol. */
731 HOWTO (R_PPC64_PLT16_HA, /* type */
732 16, /* rightshift */
733 1, /* size (0 = byte, 1 = short, 2 = long) */
734 16, /* bitsize */
b34976b6 735 FALSE, /* pc_relative */
5bd4f169 736 0, /* bitpos */
f9c6b907 737 complain_overflow_signed, /* complain_on_overflow */
805fc799 738 ppc64_elf_unhandled_reloc, /* special_function */
5bd4f169 739 "R_PPC64_PLT16_HA", /* name */
b34976b6 740 FALSE, /* partial_inplace */
5bd4f169
AM
741 0, /* src_mask */
742 0xffff, /* dst_mask */
b34976b6 743 FALSE), /* pcrel_offset */
5bd4f169 744
c061c2d8 745 /* 16-bit section relative relocation. */
5bd4f169
AM
746 HOWTO (R_PPC64_SECTOFF, /* type */
747 0, /* rightshift */
c061c2d8
AM
748 1, /* size (0 = byte, 1 = short, 2 = long) */
749 16, /* bitsize */
b34976b6 750 FALSE, /* pc_relative */
5bd4f169 751 0, /* bitpos */
b80eed39 752 complain_overflow_signed, /* complain_on_overflow */
805fc799 753 ppc64_elf_sectoff_reloc, /* special_function */
5bd4f169 754 "R_PPC64_SECTOFF", /* name */
b34976b6 755 FALSE, /* partial_inplace */
5bd4f169 756 0, /* src_mask */
c061c2d8 757 0xffff, /* dst_mask */
b34976b6 758 FALSE), /* pcrel_offset */
5bd4f169 759
c061c2d8 760 /* Like R_PPC64_SECTOFF, but no overflow warning. */
5bd4f169
AM
761 HOWTO (R_PPC64_SECTOFF_LO, /* type */
762 0, /* rightshift */
763 1, /* size (0 = byte, 1 = short, 2 = long) */
764 16, /* bitsize */
b34976b6 765 FALSE, /* pc_relative */
5bd4f169
AM
766 0, /* bitpos */
767 complain_overflow_dont, /* complain_on_overflow */
805fc799 768 ppc64_elf_sectoff_reloc, /* special_function */
5bd4f169 769 "R_PPC64_SECTOFF_LO", /* name */
b34976b6 770 FALSE, /* partial_inplace */
5bd4f169
AM
771 0, /* src_mask */
772 0xffff, /* dst_mask */
b34976b6 773 FALSE), /* pcrel_offset */
5bd4f169
AM
774
775 /* 16-bit upper half section relative relocation. */
776 HOWTO (R_PPC64_SECTOFF_HI, /* type */
777 16, /* rightshift */
778 1, /* size (0 = byte, 1 = short, 2 = long) */
779 16, /* bitsize */
b34976b6 780 FALSE, /* pc_relative */
5bd4f169 781 0, /* bitpos */
f9c6b907 782 complain_overflow_signed, /* complain_on_overflow */
805fc799 783 ppc64_elf_sectoff_reloc, /* special_function */
5bd4f169 784 "R_PPC64_SECTOFF_HI", /* name */
b34976b6 785 FALSE, /* partial_inplace */
5bd4f169
AM
786 0, /* src_mask */
787 0xffff, /* dst_mask */
b34976b6 788 FALSE), /* pcrel_offset */
5bd4f169
AM
789
790 /* 16-bit upper half adjusted section relative relocation. */
791 HOWTO (R_PPC64_SECTOFF_HA, /* type */
792 16, /* rightshift */
793 1, /* size (0 = byte, 1 = short, 2 = long) */
794 16, /* bitsize */
b34976b6 795 FALSE, /* pc_relative */
5bd4f169 796 0, /* bitpos */
f9c6b907 797 complain_overflow_signed, /* complain_on_overflow */
805fc799 798 ppc64_elf_sectoff_ha_reloc, /* special_function */
5bd4f169 799 "R_PPC64_SECTOFF_HA", /* name */
b34976b6 800 FALSE, /* partial_inplace */
5bd4f169
AM
801 0, /* src_mask */
802 0xffff, /* dst_mask */
b34976b6 803 FALSE), /* pcrel_offset */
5bd4f169 804
04c9666a
AM
805 /* Like R_PPC64_REL24 without touching the two least significant bits. */
806 HOWTO (R_PPC64_REL30, /* type */
5bd4f169
AM
807 2, /* rightshift */
808 2, /* size (0 = byte, 1 = short, 2 = long) */
809 30, /* bitsize */
b34976b6 810 TRUE, /* pc_relative */
5bd4f169
AM
811 0, /* bitpos */
812 complain_overflow_dont, /* complain_on_overflow */
813 bfd_elf_generic_reloc, /* special_function */
04c9666a 814 "R_PPC64_REL30", /* name */
b34976b6 815 FALSE, /* partial_inplace */
d006db6c 816 0, /* src_mask */
5bd4f169 817 0xfffffffc, /* dst_mask */
b34976b6 818 TRUE), /* pcrel_offset */
5bd4f169
AM
819
820 /* Relocs in the 64-bit PowerPC ELF ABI, not in the 32-bit ABI. */
821
822 /* A standard 64-bit relocation. */
823 HOWTO (R_PPC64_ADDR64, /* type */
824 0, /* rightshift */
825 4, /* size (0=byte, 1=short, 2=long, 4=64 bits) */
826 64, /* bitsize */
b34976b6 827 FALSE, /* pc_relative */
5bd4f169
AM
828 0, /* bitpos */
829 complain_overflow_dont, /* complain_on_overflow */
830 bfd_elf_generic_reloc, /* special_function */
831 "R_PPC64_ADDR64", /* name */
b34976b6 832 FALSE, /* partial_inplace */
5bd4f169 833 0, /* src_mask */
f5e87a1d 834 ONES (64), /* dst_mask */
b34976b6 835 FALSE), /* pcrel_offset */
5bd4f169
AM
836
837 /* The bits 32-47 of an address. */
838 HOWTO (R_PPC64_ADDR16_HIGHER, /* type */
839 32, /* rightshift */
840 1, /* size (0 = byte, 1 = short, 2 = long) */
841 16, /* bitsize */
b34976b6 842 FALSE, /* pc_relative */
5bd4f169
AM
843 0, /* bitpos */
844 complain_overflow_dont, /* complain_on_overflow */
845 bfd_elf_generic_reloc, /* special_function */
846 "R_PPC64_ADDR16_HIGHER", /* name */
b34976b6 847 FALSE, /* partial_inplace */
5bd4f169
AM
848 0, /* src_mask */
849 0xffff, /* dst_mask */
b34976b6 850 FALSE), /* pcrel_offset */
5bd4f169
AM
851
852 /* The bits 32-47 of an address, plus 1 if the contents of the low
853 16 bits, treated as a signed number, is negative. */
854 HOWTO (R_PPC64_ADDR16_HIGHERA, /* type */
855 32, /* rightshift */
856 1, /* size (0 = byte, 1 = short, 2 = long) */
857 16, /* bitsize */
b34976b6 858 FALSE, /* pc_relative */
5bd4f169
AM
859 0, /* bitpos */
860 complain_overflow_dont, /* complain_on_overflow */
805fc799 861 ppc64_elf_ha_reloc, /* special_function */
5bd4f169 862 "R_PPC64_ADDR16_HIGHERA", /* name */
b34976b6 863 FALSE, /* partial_inplace */
5bd4f169
AM
864 0, /* src_mask */
865 0xffff, /* dst_mask */
b34976b6 866 FALSE), /* pcrel_offset */
5bd4f169
AM
867
868 /* The bits 48-63 of an address. */
869 HOWTO (R_PPC64_ADDR16_HIGHEST,/* type */
870 48, /* rightshift */
871 1, /* size (0 = byte, 1 = short, 2 = long) */
872 16, /* bitsize */
b34976b6 873 FALSE, /* pc_relative */
5bd4f169
AM
874 0, /* bitpos */
875 complain_overflow_dont, /* complain_on_overflow */
876 bfd_elf_generic_reloc, /* special_function */
877 "R_PPC64_ADDR16_HIGHEST", /* name */
b34976b6 878 FALSE, /* partial_inplace */
5bd4f169
AM
879 0, /* src_mask */
880 0xffff, /* dst_mask */
b34976b6 881 FALSE), /* pcrel_offset */
5bd4f169
AM
882
883 /* The bits 48-63 of an address, plus 1 if the contents of the low
884 16 bits, treated as a signed number, is negative. */
885 HOWTO (R_PPC64_ADDR16_HIGHESTA,/* type */
886 48, /* rightshift */
887 1, /* size (0 = byte, 1 = short, 2 = long) */
888 16, /* bitsize */
b34976b6 889 FALSE, /* pc_relative */
5bd4f169
AM
890 0, /* bitpos */
891 complain_overflow_dont, /* complain_on_overflow */
805fc799 892 ppc64_elf_ha_reloc, /* special_function */
5bd4f169 893 "R_PPC64_ADDR16_HIGHESTA", /* name */
b34976b6 894 FALSE, /* partial_inplace */
5bd4f169
AM
895 0, /* src_mask */
896 0xffff, /* dst_mask */
b34976b6 897 FALSE), /* pcrel_offset */
5bd4f169
AM
898
899 /* Like ADDR64, but may be unaligned. */
900 HOWTO (R_PPC64_UADDR64, /* type */
901 0, /* rightshift */
902 4, /* size (0=byte, 1=short, 2=long, 4=64 bits) */
903 64, /* bitsize */
b34976b6 904 FALSE, /* pc_relative */
5bd4f169
AM
905 0, /* bitpos */
906 complain_overflow_dont, /* complain_on_overflow */
907 bfd_elf_generic_reloc, /* special_function */
908 "R_PPC64_UADDR64", /* name */
b34976b6 909 FALSE, /* partial_inplace */
5bd4f169 910 0, /* src_mask */
f5e87a1d 911 ONES (64), /* dst_mask */
b34976b6 912 FALSE), /* pcrel_offset */
5bd4f169
AM
913
914 /* 64-bit relative relocation. */
915 HOWTO (R_PPC64_REL64, /* type */
916 0, /* rightshift */
917 4, /* size (0=byte, 1=short, 2=long, 4=64 bits) */
918 64, /* bitsize */
b34976b6 919 TRUE, /* pc_relative */
5bd4f169
AM
920 0, /* bitpos */
921 complain_overflow_dont, /* complain_on_overflow */
922 bfd_elf_generic_reloc, /* special_function */
923 "R_PPC64_REL64", /* name */
b34976b6 924 FALSE, /* partial_inplace */
5bd4f169 925 0, /* src_mask */
f5e87a1d 926 ONES (64), /* dst_mask */
b34976b6 927 TRUE), /* pcrel_offset */
5bd4f169 928
cedb70c5 929 /* 64-bit relocation to the symbol's procedure linkage table. */
5bd4f169
AM
930 HOWTO (R_PPC64_PLT64, /* type */
931 0, /* rightshift */
932 4, /* size (0=byte, 1=short, 2=long, 4=64 bits) */
933 64, /* bitsize */
b34976b6 934 FALSE, /* pc_relative */
5bd4f169
AM
935 0, /* bitpos */
936 complain_overflow_dont, /* complain_on_overflow */
805fc799 937 ppc64_elf_unhandled_reloc, /* special_function */
5bd4f169 938 "R_PPC64_PLT64", /* name */
b34976b6 939 FALSE, /* partial_inplace */
5bd4f169 940 0, /* src_mask */
f5e87a1d 941 ONES (64), /* dst_mask */
b34976b6 942 FALSE), /* pcrel_offset */
5bd4f169
AM
943
944 /* 64-bit PC relative relocation to the symbol's procedure linkage
945 table. */
946 /* FIXME: R_PPC64_PLTREL64 not supported. */
947 HOWTO (R_PPC64_PLTREL64, /* type */
948 0, /* rightshift */
949 4, /* size (0=byte, 1=short, 2=long, 4=64 bits) */
950 64, /* bitsize */
b34976b6 951 TRUE, /* pc_relative */
5bd4f169
AM
952 0, /* bitpos */
953 complain_overflow_dont, /* complain_on_overflow */
805fc799 954 ppc64_elf_unhandled_reloc, /* special_function */
5bd4f169 955 "R_PPC64_PLTREL64", /* name */
b34976b6 956 FALSE, /* partial_inplace */
5bd4f169 957 0, /* src_mask */
f5e87a1d 958 ONES (64), /* dst_mask */
b34976b6 959 TRUE), /* pcrel_offset */
5bd4f169
AM
960
961 /* 16 bit TOC-relative relocation. */
962
963 /* R_PPC64_TOC16 47 half16* S + A - .TOC. */
964 HOWTO (R_PPC64_TOC16, /* type */
965 0, /* rightshift */
966 1, /* size (0 = byte, 1 = short, 2 = long) */
967 16, /* bitsize */
b34976b6 968 FALSE, /* pc_relative */
5bd4f169
AM
969 0, /* bitpos */
970 complain_overflow_signed, /* complain_on_overflow */
805fc799 971 ppc64_elf_toc_reloc, /* special_function */
5bd4f169 972 "R_PPC64_TOC16", /* name */
b34976b6 973 FALSE, /* partial_inplace */
5bd4f169
AM
974 0, /* src_mask */
975 0xffff, /* dst_mask */
b34976b6 976 FALSE), /* pcrel_offset */
5bd4f169
AM
977
978 /* 16 bit TOC-relative relocation without overflow. */
979
980 /* R_PPC64_TOC16_LO 48 half16 #lo (S + A - .TOC.) */
981 HOWTO (R_PPC64_TOC16_LO, /* type */
982 0, /* rightshift */
983 1, /* size (0 = byte, 1 = short, 2 = long) */
984 16, /* bitsize */
b34976b6 985 FALSE, /* pc_relative */
5bd4f169
AM
986 0, /* bitpos */
987 complain_overflow_dont, /* complain_on_overflow */
805fc799 988 ppc64_elf_toc_reloc, /* special_function */
5bd4f169 989 "R_PPC64_TOC16_LO", /* name */
b34976b6 990 FALSE, /* partial_inplace */
5bd4f169
AM
991 0, /* src_mask */
992 0xffff, /* dst_mask */
b34976b6 993 FALSE), /* pcrel_offset */
5bd4f169
AM
994
995 /* 16 bit TOC-relative relocation, high 16 bits. */
996
997 /* R_PPC64_TOC16_HI 49 half16 #hi (S + A - .TOC.) */
998 HOWTO (R_PPC64_TOC16_HI, /* type */
999 16, /* rightshift */
1000 1, /* size (0 = byte, 1 = short, 2 = long) */
1001 16, /* bitsize */
b34976b6 1002 FALSE, /* pc_relative */
5bd4f169 1003 0, /* bitpos */
f9c6b907 1004 complain_overflow_signed, /* complain_on_overflow */
805fc799 1005 ppc64_elf_toc_reloc, /* special_function */
5bd4f169 1006 "R_PPC64_TOC16_HI", /* name */
b34976b6 1007 FALSE, /* partial_inplace */
5bd4f169
AM
1008 0, /* src_mask */
1009 0xffff, /* dst_mask */
b34976b6 1010 FALSE), /* pcrel_offset */
5bd4f169
AM
1011
1012 /* 16 bit TOC-relative relocation, high 16 bits, plus 1 if the
1013 contents of the low 16 bits, treated as a signed number, is
1014 negative. */
1015
1016 /* R_PPC64_TOC16_HA 50 half16 #ha (S + A - .TOC.) */
1017 HOWTO (R_PPC64_TOC16_HA, /* type */
1018 16, /* rightshift */
1019 1, /* size (0 = byte, 1 = short, 2 = long) */
1020 16, /* bitsize */
b34976b6 1021 FALSE, /* pc_relative */
5bd4f169 1022 0, /* bitpos */
f9c6b907 1023 complain_overflow_signed, /* complain_on_overflow */
805fc799 1024 ppc64_elf_toc_ha_reloc, /* special_function */
5bd4f169 1025 "R_PPC64_TOC16_HA", /* name */
b34976b6 1026 FALSE, /* partial_inplace */
5bd4f169
AM
1027 0, /* src_mask */
1028 0xffff, /* dst_mask */
b34976b6 1029 FALSE), /* pcrel_offset */
5bd4f169
AM
1030
1031 /* 64-bit relocation; insert value of TOC base (.TOC.). */
1032
1033 /* R_PPC64_TOC 51 doubleword64 .TOC. */
1034 HOWTO (R_PPC64_TOC, /* type */
1035 0, /* rightshift */
1036 4, /* size (0=byte, 1=short, 2=long, 4=64 bits) */
1037 64, /* bitsize */
b34976b6 1038 FALSE, /* pc_relative */
5bd4f169 1039 0, /* bitpos */
b80eed39 1040 complain_overflow_dont, /* complain_on_overflow */
805fc799 1041 ppc64_elf_toc64_reloc, /* special_function */
5bd4f169 1042 "R_PPC64_TOC", /* name */
b34976b6 1043 FALSE, /* partial_inplace */
5bd4f169 1044 0, /* src_mask */
f5e87a1d 1045 ONES (64), /* dst_mask */
b34976b6 1046 FALSE), /* pcrel_offset */
5bd4f169
AM
1047
1048 /* Like R_PPC64_GOT16, but also informs the link editor that the
1049 value to relocate may (!) refer to a PLT entry which the link
1050 editor (a) may replace with the symbol value. If the link editor
1051 is unable to fully resolve the symbol, it may (b) create a PLT
1052 entry and store the address to the new PLT entry in the GOT.
1053 This permits lazy resolution of function symbols at run time.
1054 The link editor may also skip all of this and just (c) emit a
1055 R_PPC64_GLOB_DAT to tie the symbol to the GOT entry. */
1056 /* FIXME: R_PPC64_PLTGOT16 not implemented. */
1057 HOWTO (R_PPC64_PLTGOT16, /* type */
1058 0, /* rightshift */
1059 1, /* size (0 = byte, 1 = short, 2 = long) */
1060 16, /* bitsize */
b34976b6 1061 FALSE, /* pc_relative */
5bd4f169
AM
1062 0, /* bitpos */
1063 complain_overflow_signed, /* complain_on_overflow */
805fc799 1064 ppc64_elf_unhandled_reloc, /* special_function */
411e1bfb
AM
1065 "R_PPC64_PLTGOT16", /* name */
1066 FALSE, /* partial_inplace */
1067 0, /* src_mask */
1068 0xffff, /* dst_mask */
1069 FALSE), /* pcrel_offset */
1070
1071 /* Like R_PPC64_PLTGOT16, but without overflow. */
1072 /* FIXME: R_PPC64_PLTGOT16_LO not implemented. */
1073 HOWTO (R_PPC64_PLTGOT16_LO, /* type */
1074 0, /* rightshift */
1075 1, /* size (0 = byte, 1 = short, 2 = long) */
1076 16, /* bitsize */
1077 FALSE, /* pc_relative */
1078 0, /* bitpos */
1079 complain_overflow_dont, /* complain_on_overflow */
1080 ppc64_elf_unhandled_reloc, /* special_function */
1081 "R_PPC64_PLTGOT16_LO", /* name */
1082 FALSE, /* partial_inplace */
1083 0, /* src_mask */
1084 0xffff, /* dst_mask */
1085 FALSE), /* pcrel_offset */
1086
1087 /* Like R_PPC64_PLT_GOT16, but using bits 16-31 of the address. */
1088 /* FIXME: R_PPC64_PLTGOT16_HI not implemented. */
1089 HOWTO (R_PPC64_PLTGOT16_HI, /* type */
1090 16, /* rightshift */
1091 1, /* size (0 = byte, 1 = short, 2 = long) */
1092 16, /* bitsize */
1093 FALSE, /* pc_relative */
1094 0, /* bitpos */
f9c6b907 1095 complain_overflow_signed, /* complain_on_overflow */
411e1bfb
AM
1096 ppc64_elf_unhandled_reloc, /* special_function */
1097 "R_PPC64_PLTGOT16_HI", /* name */
1098 FALSE, /* partial_inplace */
1099 0, /* src_mask */
1100 0xffff, /* dst_mask */
1101 FALSE), /* pcrel_offset */
1102
1103 /* Like R_PPC64_PLT_GOT16, but using bits 16-31 of the address, plus
1104 1 if the contents of the low 16 bits, treated as a signed number,
1105 is negative. */
1106 /* FIXME: R_PPC64_PLTGOT16_HA not implemented. */
1107 HOWTO (R_PPC64_PLTGOT16_HA, /* type */
1108 16, /* rightshift */
1109 1, /* size (0 = byte, 1 = short, 2 = long) */
1110 16, /* bitsize */
1111 FALSE, /* pc_relative */
1112 0, /* bitpos */
f9c6b907 1113 complain_overflow_signed, /* complain_on_overflow */
411e1bfb
AM
1114 ppc64_elf_unhandled_reloc, /* special_function */
1115 "R_PPC64_PLTGOT16_HA", /* name */
1116 FALSE, /* partial_inplace */
1117 0, /* src_mask */
1118 0xffff, /* dst_mask */
1119 FALSE), /* pcrel_offset */
1120
1121 /* Like R_PPC64_ADDR16, but for instructions with a DS field. */
1122 HOWTO (R_PPC64_ADDR16_DS, /* type */
1123 0, /* rightshift */
1124 1, /* size (0 = byte, 1 = short, 2 = long) */
1125 16, /* bitsize */
1126 FALSE, /* pc_relative */
1127 0, /* bitpos */
b80eed39 1128 complain_overflow_signed, /* complain_on_overflow */
411e1bfb
AM
1129 bfd_elf_generic_reloc, /* special_function */
1130 "R_PPC64_ADDR16_DS", /* name */
1131 FALSE, /* partial_inplace */
1132 0, /* src_mask */
1133 0xfffc, /* dst_mask */
1134 FALSE), /* pcrel_offset */
1135
1136 /* Like R_PPC64_ADDR16_LO, but for instructions with a DS field. */
1137 HOWTO (R_PPC64_ADDR16_LO_DS, /* type */
1138 0, /* rightshift */
1139 1, /* size (0 = byte, 1 = short, 2 = long) */
1140 16, /* bitsize */
1141 FALSE, /* pc_relative */
1142 0, /* bitpos */
1143 complain_overflow_dont,/* complain_on_overflow */
1144 bfd_elf_generic_reloc, /* special_function */
1145 "R_PPC64_ADDR16_LO_DS",/* name */
1146 FALSE, /* partial_inplace */
1147 0, /* src_mask */
1148 0xfffc, /* dst_mask */
1149 FALSE), /* pcrel_offset */
1150
1151 /* Like R_PPC64_GOT16, but for instructions with a DS field. */
1152 HOWTO (R_PPC64_GOT16_DS, /* type */
1153 0, /* rightshift */
1154 1, /* size (0 = byte, 1 = short, 2 = long) */
1155 16, /* bitsize */
1156 FALSE, /* pc_relative */
1157 0, /* bitpos */
1158 complain_overflow_signed, /* complain_on_overflow */
1159 ppc64_elf_unhandled_reloc, /* special_function */
1160 "R_PPC64_GOT16_DS", /* name */
1161 FALSE, /* partial_inplace */
1162 0, /* src_mask */
1163 0xfffc, /* dst_mask */
1164 FALSE), /* pcrel_offset */
1165
1166 /* Like R_PPC64_GOT16_LO, but for instructions with a DS field. */
1167 HOWTO (R_PPC64_GOT16_LO_DS, /* type */
1168 0, /* rightshift */
1169 1, /* size (0 = byte, 1 = short, 2 = long) */
1170 16, /* bitsize */
1171 FALSE, /* pc_relative */
1172 0, /* bitpos */
1173 complain_overflow_dont, /* complain_on_overflow */
1174 ppc64_elf_unhandled_reloc, /* special_function */
1175 "R_PPC64_GOT16_LO_DS", /* name */
1176 FALSE, /* partial_inplace */
1177 0, /* src_mask */
1178 0xfffc, /* dst_mask */
1179 FALSE), /* pcrel_offset */
1180
1181 /* Like R_PPC64_PLT16_LO, but for instructions with a DS field. */
1182 HOWTO (R_PPC64_PLT16_LO_DS, /* type */
1183 0, /* rightshift */
1184 1, /* size (0 = byte, 1 = short, 2 = long) */
1185 16, /* bitsize */
1186 FALSE, /* pc_relative */
1187 0, /* bitpos */
1188 complain_overflow_dont, /* complain_on_overflow */
1189 ppc64_elf_unhandled_reloc, /* special_function */
1190 "R_PPC64_PLT16_LO_DS", /* name */
1191 FALSE, /* partial_inplace */
1192 0, /* src_mask */
1193 0xfffc, /* dst_mask */
1194 FALSE), /* pcrel_offset */
1195
1196 /* Like R_PPC64_SECTOFF, but for instructions with a DS field. */
1197 HOWTO (R_PPC64_SECTOFF_DS, /* type */
1198 0, /* rightshift */
1199 1, /* size (0 = byte, 1 = short, 2 = long) */
1200 16, /* bitsize */
1201 FALSE, /* pc_relative */
1202 0, /* bitpos */
b80eed39 1203 complain_overflow_signed, /* complain_on_overflow */
411e1bfb
AM
1204 ppc64_elf_sectoff_reloc, /* special_function */
1205 "R_PPC64_SECTOFF_DS", /* name */
1206 FALSE, /* partial_inplace */
1207 0, /* src_mask */
1208 0xfffc, /* dst_mask */
1209 FALSE), /* pcrel_offset */
1210
1211 /* Like R_PPC64_SECTOFF_LO, but for instructions with a DS field. */
1212 HOWTO (R_PPC64_SECTOFF_LO_DS, /* type */
1213 0, /* rightshift */
1214 1, /* size (0 = byte, 1 = short, 2 = long) */
1215 16, /* bitsize */
1216 FALSE, /* pc_relative */
1217 0, /* bitpos */
1218 complain_overflow_dont, /* complain_on_overflow */
1219 ppc64_elf_sectoff_reloc, /* special_function */
1220 "R_PPC64_SECTOFF_LO_DS",/* name */
1221 FALSE, /* partial_inplace */
1222 0, /* src_mask */
1223 0xfffc, /* dst_mask */
1224 FALSE), /* pcrel_offset */
1225
1226 /* Like R_PPC64_TOC16, but for instructions with a DS field. */
1227 HOWTO (R_PPC64_TOC16_DS, /* type */
1228 0, /* rightshift */
1229 1, /* size (0 = byte, 1 = short, 2 = long) */
1230 16, /* bitsize */
1231 FALSE, /* pc_relative */
1232 0, /* bitpos */
1233 complain_overflow_signed, /* complain_on_overflow */
1234 ppc64_elf_toc_reloc, /* special_function */
1235 "R_PPC64_TOC16_DS", /* name */
1236 FALSE, /* partial_inplace */
1237 0, /* src_mask */
1238 0xfffc, /* dst_mask */
1239 FALSE), /* pcrel_offset */
1240
1241 /* Like R_PPC64_TOC16_LO, but for instructions with a DS field. */
1242 HOWTO (R_PPC64_TOC16_LO_DS, /* type */
1243 0, /* rightshift */
1244 1, /* size (0 = byte, 1 = short, 2 = long) */
1245 16, /* bitsize */
1246 FALSE, /* pc_relative */
1247 0, /* bitpos */
1248 complain_overflow_dont, /* complain_on_overflow */
1249 ppc64_elf_toc_reloc, /* special_function */
1250 "R_PPC64_TOC16_LO_DS", /* name */
1251 FALSE, /* partial_inplace */
1252 0, /* src_mask */
1253 0xfffc, /* dst_mask */
1254 FALSE), /* pcrel_offset */
1255
1256 /* Like R_PPC64_PLTGOT16, but for instructions with a DS field. */
1257 /* FIXME: R_PPC64_PLTGOT16_DS not implemented. */
6bfdb61b 1258 HOWTO (R_PPC64_PLTGOT16_DS, /* type */
411e1bfb
AM
1259 0, /* rightshift */
1260 1, /* size (0 = byte, 1 = short, 2 = long) */
1261 16, /* bitsize */
1262 FALSE, /* pc_relative */
1263 0, /* bitpos */
1264 complain_overflow_signed, /* complain_on_overflow */
1265 ppc64_elf_unhandled_reloc, /* special_function */
1266 "R_PPC64_PLTGOT16_DS", /* name */
1267 FALSE, /* partial_inplace */
1268 0, /* src_mask */
1269 0xfffc, /* dst_mask */
1270 FALSE), /* pcrel_offset */
1271
1272 /* Like R_PPC64_PLTGOT16_LO, but for instructions with a DS field. */
1273 /* FIXME: R_PPC64_PLTGOT16_LO not implemented. */
1274 HOWTO (R_PPC64_PLTGOT16_LO_DS,/* type */
1275 0, /* rightshift */
1276 1, /* size (0 = byte, 1 = short, 2 = long) */
1277 16, /* bitsize */
1278 FALSE, /* pc_relative */
1279 0, /* bitpos */
1280 complain_overflow_dont, /* complain_on_overflow */
1281 ppc64_elf_unhandled_reloc, /* special_function */
1282 "R_PPC64_PLTGOT16_LO_DS",/* name */
1283 FALSE, /* partial_inplace */
1284 0, /* src_mask */
1285 0xfffc, /* dst_mask */
1286 FALSE), /* pcrel_offset */
1287
727fc41e 1288 /* Marker relocs for TLS. */
411e1bfb
AM
1289 HOWTO (R_PPC64_TLS,
1290 0, /* rightshift */
1291 2, /* size (0 = byte, 1 = short, 2 = long) */
1292 32, /* bitsize */
1293 FALSE, /* pc_relative */
1294 0, /* bitpos */
1295 complain_overflow_dont, /* complain_on_overflow */
1296 bfd_elf_generic_reloc, /* special_function */
1297 "R_PPC64_TLS", /* name */
1298 FALSE, /* partial_inplace */
1299 0, /* src_mask */
1300 0, /* dst_mask */
1301 FALSE), /* pcrel_offset */
1302
727fc41e
AM
1303 HOWTO (R_PPC64_TLSGD,
1304 0, /* rightshift */
1305 2, /* size (0 = byte, 1 = short, 2 = long) */
1306 32, /* bitsize */
1307 FALSE, /* pc_relative */
1308 0, /* bitpos */
1309 complain_overflow_dont, /* complain_on_overflow */
1310 bfd_elf_generic_reloc, /* special_function */
1311 "R_PPC64_TLSGD", /* name */
1312 FALSE, /* partial_inplace */
1313 0, /* src_mask */
1314 0, /* dst_mask */
1315 FALSE), /* pcrel_offset */
1316
1317 HOWTO (R_PPC64_TLSLD,
1318 0, /* rightshift */
1319 2, /* size (0 = byte, 1 = short, 2 = long) */
1320 32, /* bitsize */
1321 FALSE, /* pc_relative */
1322 0, /* bitpos */
1323 complain_overflow_dont, /* complain_on_overflow */
1324 bfd_elf_generic_reloc, /* special_function */
1325 "R_PPC64_TLSLD", /* name */
1326 FALSE, /* partial_inplace */
1327 0, /* src_mask */
1328 0, /* dst_mask */
1329 FALSE), /* pcrel_offset */
1330
3b421ab3
AM
1331 HOWTO (R_PPC64_TOCSAVE,
1332 0, /* rightshift */
1333 2, /* size (0 = byte, 1 = short, 2 = long) */
1334 32, /* bitsize */
1335 FALSE, /* pc_relative */
1336 0, /* bitpos */
1337 complain_overflow_dont, /* complain_on_overflow */
1338 bfd_elf_generic_reloc, /* special_function */
1339 "R_PPC64_TOCSAVE", /* name */
1340 FALSE, /* partial_inplace */
1341 0, /* src_mask */
1342 0, /* dst_mask */
1343 FALSE), /* pcrel_offset */
1344
411e1bfb
AM
1345 /* Computes the load module index of the load module that contains the
1346 definition of its TLS sym. */
1347 HOWTO (R_PPC64_DTPMOD64,
1348 0, /* rightshift */
1349 4, /* size (0 = byte, 1 = short, 2 = long) */
1350 64, /* bitsize */
1351 FALSE, /* pc_relative */
1352 0, /* bitpos */
1353 complain_overflow_dont, /* complain_on_overflow */
1354 ppc64_elf_unhandled_reloc, /* special_function */
1355 "R_PPC64_DTPMOD64", /* name */
1356 FALSE, /* partial_inplace */
1357 0, /* src_mask */
1358 ONES (64), /* dst_mask */
1359 FALSE), /* pcrel_offset */
1360
1361 /* Computes a dtv-relative displacement, the difference between the value
1362 of sym+add and the base address of the thread-local storage block that
1363 contains the definition of sym, minus 0x8000. */
1364 HOWTO (R_PPC64_DTPREL64,
1365 0, /* rightshift */
1366 4, /* size (0 = byte, 1 = short, 2 = long) */
1367 64, /* bitsize */
1368 FALSE, /* pc_relative */
1369 0, /* bitpos */
1370 complain_overflow_dont, /* complain_on_overflow */
1371 ppc64_elf_unhandled_reloc, /* special_function */
1372 "R_PPC64_DTPREL64", /* name */
1373 FALSE, /* partial_inplace */
1374 0, /* src_mask */
1375 ONES (64), /* dst_mask */
1376 FALSE), /* pcrel_offset */
1377
1378 /* A 16 bit dtprel reloc. */
1379 HOWTO (R_PPC64_DTPREL16,
1380 0, /* rightshift */
1381 1, /* size (0 = byte, 1 = short, 2 = long) */
1382 16, /* bitsize */
1383 FALSE, /* pc_relative */
1384 0, /* bitpos */
1385 complain_overflow_signed, /* complain_on_overflow */
1386 ppc64_elf_unhandled_reloc, /* special_function */
1387 "R_PPC64_DTPREL16", /* name */
1388 FALSE, /* partial_inplace */
1389 0, /* src_mask */
1390 0xffff, /* dst_mask */
1391 FALSE), /* pcrel_offset */
1392
1393 /* Like DTPREL16, but no overflow. */
1394 HOWTO (R_PPC64_DTPREL16_LO,
1395 0, /* rightshift */
1396 1, /* size (0 = byte, 1 = short, 2 = long) */
1397 16, /* bitsize */
1398 FALSE, /* pc_relative */
1399 0, /* bitpos */
1400 complain_overflow_dont, /* complain_on_overflow */
1401 ppc64_elf_unhandled_reloc, /* special_function */
1402 "R_PPC64_DTPREL16_LO", /* name */
1403 FALSE, /* partial_inplace */
1404 0, /* src_mask */
1405 0xffff, /* dst_mask */
1406 FALSE), /* pcrel_offset */
1407
1408 /* Like DTPREL16_LO, but next higher group of 16 bits. */
1409 HOWTO (R_PPC64_DTPREL16_HI,
1410 16, /* rightshift */
1411 1, /* size (0 = byte, 1 = short, 2 = long) */
1412 16, /* bitsize */
1413 FALSE, /* pc_relative */
1414 0, /* bitpos */
f9c6b907 1415 complain_overflow_signed, /* complain_on_overflow */
411e1bfb
AM
1416 ppc64_elf_unhandled_reloc, /* special_function */
1417 "R_PPC64_DTPREL16_HI", /* name */
1418 FALSE, /* partial_inplace */
1419 0, /* src_mask */
1420 0xffff, /* dst_mask */
1421 FALSE), /* pcrel_offset */
1422
1423 /* Like DTPREL16_HI, but adjust for low 16 bits. */
1424 HOWTO (R_PPC64_DTPREL16_HA,
1425 16, /* rightshift */
1426 1, /* size (0 = byte, 1 = short, 2 = long) */
1427 16, /* bitsize */
1428 FALSE, /* pc_relative */
1429 0, /* bitpos */
f9c6b907 1430 complain_overflow_signed, /* complain_on_overflow */
411e1bfb
AM
1431 ppc64_elf_unhandled_reloc, /* special_function */
1432 "R_PPC64_DTPREL16_HA", /* name */
1433 FALSE, /* partial_inplace */
1434 0, /* src_mask */
1435 0xffff, /* dst_mask */
1436 FALSE), /* pcrel_offset */
1437
1438 /* Like DTPREL16_HI, but next higher group of 16 bits. */
1439 HOWTO (R_PPC64_DTPREL16_HIGHER,
1440 32, /* rightshift */
1441 1, /* size (0 = byte, 1 = short, 2 = long) */
1442 16, /* bitsize */
1443 FALSE, /* pc_relative */
1444 0, /* bitpos */
1445 complain_overflow_dont, /* complain_on_overflow */
1446 ppc64_elf_unhandled_reloc, /* special_function */
1447 "R_PPC64_DTPREL16_HIGHER", /* name */
1448 FALSE, /* partial_inplace */
1449 0, /* src_mask */
1450 0xffff, /* dst_mask */
1451 FALSE), /* pcrel_offset */
1452
1453 /* Like DTPREL16_HIGHER, but adjust for low 16 bits. */
1454 HOWTO (R_PPC64_DTPREL16_HIGHERA,
1455 32, /* rightshift */
1456 1, /* size (0 = byte, 1 = short, 2 = long) */
1457 16, /* bitsize */
1458 FALSE, /* pc_relative */
1459 0, /* bitpos */
1460 complain_overflow_dont, /* complain_on_overflow */
1461 ppc64_elf_unhandled_reloc, /* special_function */
1462 "R_PPC64_DTPREL16_HIGHERA", /* name */
1463 FALSE, /* partial_inplace */
1464 0, /* src_mask */
1465 0xffff, /* dst_mask */
1466 FALSE), /* pcrel_offset */
1467
1468 /* Like DTPREL16_HIGHER, but next higher group of 16 bits. */
1469 HOWTO (R_PPC64_DTPREL16_HIGHEST,
1470 48, /* rightshift */
1471 1, /* size (0 = byte, 1 = short, 2 = long) */
1472 16, /* bitsize */
1473 FALSE, /* pc_relative */
1474 0, /* bitpos */
1475 complain_overflow_dont, /* complain_on_overflow */
1476 ppc64_elf_unhandled_reloc, /* special_function */
1477 "R_PPC64_DTPREL16_HIGHEST", /* name */
1478 FALSE, /* partial_inplace */
1479 0, /* src_mask */
1480 0xffff, /* dst_mask */
1481 FALSE), /* pcrel_offset */
1482
1483 /* Like DTPREL16_HIGHEST, but adjust for low 16 bits. */
1484 HOWTO (R_PPC64_DTPREL16_HIGHESTA,
1485 48, /* rightshift */
1486 1, /* size (0 = byte, 1 = short, 2 = long) */
1487 16, /* bitsize */
1488 FALSE, /* pc_relative */
1489 0, /* bitpos */
1490 complain_overflow_dont, /* complain_on_overflow */
1491 ppc64_elf_unhandled_reloc, /* special_function */
1492 "R_PPC64_DTPREL16_HIGHESTA", /* name */
1493 FALSE, /* partial_inplace */
1494 0, /* src_mask */
1495 0xffff, /* dst_mask */
1496 FALSE), /* pcrel_offset */
1497
1498 /* Like DTPREL16, but for insns with a DS field. */
1499 HOWTO (R_PPC64_DTPREL16_DS,
1500 0, /* rightshift */
1501 1, /* size (0 = byte, 1 = short, 2 = long) */
1502 16, /* bitsize */
1503 FALSE, /* pc_relative */
1504 0, /* bitpos */
1505 complain_overflow_signed, /* complain_on_overflow */
1506 ppc64_elf_unhandled_reloc, /* special_function */
1507 "R_PPC64_DTPREL16_DS", /* name */
1508 FALSE, /* partial_inplace */
1509 0, /* src_mask */
1510 0xfffc, /* dst_mask */
1511 FALSE), /* pcrel_offset */
1512
1513 /* Like DTPREL16_DS, but no overflow. */
1514 HOWTO (R_PPC64_DTPREL16_LO_DS,
1515 0, /* rightshift */
1516 1, /* size (0 = byte, 1 = short, 2 = long) */
1517 16, /* bitsize */
1518 FALSE, /* pc_relative */
1519 0, /* bitpos */
1520 complain_overflow_dont, /* complain_on_overflow */
1521 ppc64_elf_unhandled_reloc, /* special_function */
1522 "R_PPC64_DTPREL16_LO_DS", /* name */
1523 FALSE, /* partial_inplace */
1524 0, /* src_mask */
1525 0xfffc, /* dst_mask */
1526 FALSE), /* pcrel_offset */
1527
1528 /* Computes a tp-relative displacement, the difference between the value of
1529 sym+add and the value of the thread pointer (r13). */
1530 HOWTO (R_PPC64_TPREL64,
1531 0, /* rightshift */
1532 4, /* size (0 = byte, 1 = short, 2 = long) */
1533 64, /* bitsize */
1534 FALSE, /* pc_relative */
1535 0, /* bitpos */
1536 complain_overflow_dont, /* complain_on_overflow */
1537 ppc64_elf_unhandled_reloc, /* special_function */
1538 "R_PPC64_TPREL64", /* name */
1539 FALSE, /* partial_inplace */
1540 0, /* src_mask */
1541 ONES (64), /* dst_mask */
1542 FALSE), /* pcrel_offset */
1543
1544 /* A 16 bit tprel reloc. */
1545 HOWTO (R_PPC64_TPREL16,
1546 0, /* rightshift */
1547 1, /* size (0 = byte, 1 = short, 2 = long) */
1548 16, /* bitsize */
1549 FALSE, /* pc_relative */
1550 0, /* bitpos */
1551 complain_overflow_signed, /* complain_on_overflow */
1552 ppc64_elf_unhandled_reloc, /* special_function */
1553 "R_PPC64_TPREL16", /* name */
1554 FALSE, /* partial_inplace */
1555 0, /* src_mask */
1556 0xffff, /* dst_mask */
1557 FALSE), /* pcrel_offset */
1558
1559 /* Like TPREL16, but no overflow. */
1560 HOWTO (R_PPC64_TPREL16_LO,
1561 0, /* rightshift */
1562 1, /* size (0 = byte, 1 = short, 2 = long) */
1563 16, /* bitsize */
1564 FALSE, /* pc_relative */
1565 0, /* bitpos */
1566 complain_overflow_dont, /* complain_on_overflow */
1567 ppc64_elf_unhandled_reloc, /* special_function */
1568 "R_PPC64_TPREL16_LO", /* name */
1569 FALSE, /* partial_inplace */
1570 0, /* src_mask */
1571 0xffff, /* dst_mask */
1572 FALSE), /* pcrel_offset */
1573
1574 /* Like TPREL16_LO, but next higher group of 16 bits. */
1575 HOWTO (R_PPC64_TPREL16_HI,
1576 16, /* rightshift */
1577 1, /* size (0 = byte, 1 = short, 2 = long) */
1578 16, /* bitsize */
1579 FALSE, /* pc_relative */
1580 0, /* bitpos */
f9c6b907 1581 complain_overflow_signed, /* complain_on_overflow */
411e1bfb
AM
1582 ppc64_elf_unhandled_reloc, /* special_function */
1583 "R_PPC64_TPREL16_HI", /* name */
1584 FALSE, /* partial_inplace */
1585 0, /* src_mask */
1586 0xffff, /* dst_mask */
1587 FALSE), /* pcrel_offset */
1588
1589 /* Like TPREL16_HI, but adjust for low 16 bits. */
1590 HOWTO (R_PPC64_TPREL16_HA,
1591 16, /* rightshift */
1592 1, /* size (0 = byte, 1 = short, 2 = long) */
1593 16, /* bitsize */
1594 FALSE, /* pc_relative */
1595 0, /* bitpos */
f9c6b907 1596 complain_overflow_signed, /* complain_on_overflow */
411e1bfb
AM
1597 ppc64_elf_unhandled_reloc, /* special_function */
1598 "R_PPC64_TPREL16_HA", /* name */
1599 FALSE, /* partial_inplace */
1600 0, /* src_mask */
1601 0xffff, /* dst_mask */
1602 FALSE), /* pcrel_offset */
1603
1604 /* Like TPREL16_HI, but next higher group of 16 bits. */
1605 HOWTO (R_PPC64_TPREL16_HIGHER,
1606 32, /* rightshift */
1607 1, /* size (0 = byte, 1 = short, 2 = long) */
1608 16, /* bitsize */
1609 FALSE, /* pc_relative */
1610 0, /* bitpos */
1611 complain_overflow_dont, /* complain_on_overflow */
1612 ppc64_elf_unhandled_reloc, /* special_function */
1613 "R_PPC64_TPREL16_HIGHER", /* name */
1614 FALSE, /* partial_inplace */
1615 0, /* src_mask */
1616 0xffff, /* dst_mask */
1617 FALSE), /* pcrel_offset */
1618
1619 /* Like TPREL16_HIGHER, but adjust for low 16 bits. */
1620 HOWTO (R_PPC64_TPREL16_HIGHERA,
1621 32, /* rightshift */
1622 1, /* size (0 = byte, 1 = short, 2 = long) */
1623 16, /* bitsize */
1624 FALSE, /* pc_relative */
1625 0, /* bitpos */
1626 complain_overflow_dont, /* complain_on_overflow */
1627 ppc64_elf_unhandled_reloc, /* special_function */
1628 "R_PPC64_TPREL16_HIGHERA", /* name */
1629 FALSE, /* partial_inplace */
1630 0, /* src_mask */
1631 0xffff, /* dst_mask */
1632 FALSE), /* pcrel_offset */
1633
1634 /* Like TPREL16_HIGHER, but next higher group of 16 bits. */
1635 HOWTO (R_PPC64_TPREL16_HIGHEST,
1636 48, /* rightshift */
1637 1, /* size (0 = byte, 1 = short, 2 = long) */
1638 16, /* bitsize */
1639 FALSE, /* pc_relative */
1640 0, /* bitpos */
1641 complain_overflow_dont, /* complain_on_overflow */
1642 ppc64_elf_unhandled_reloc, /* special_function */
1643 "R_PPC64_TPREL16_HIGHEST", /* name */
1644 FALSE, /* partial_inplace */
1645 0, /* src_mask */
1646 0xffff, /* dst_mask */
1647 FALSE), /* pcrel_offset */
1648
1649 /* Like TPREL16_HIGHEST, but adjust for low 16 bits. */
1650 HOWTO (R_PPC64_TPREL16_HIGHESTA,
1651 48, /* rightshift */
1652 1, /* size (0 = byte, 1 = short, 2 = long) */
1653 16, /* bitsize */
1654 FALSE, /* pc_relative */
1655 0, /* bitpos */
1656 complain_overflow_dont, /* complain_on_overflow */
1657 ppc64_elf_unhandled_reloc, /* special_function */
1658 "R_PPC64_TPREL16_HIGHESTA", /* name */
1659 FALSE, /* partial_inplace */
1660 0, /* src_mask */
1661 0xffff, /* dst_mask */
1662 FALSE), /* pcrel_offset */
1663
1664 /* Like TPREL16, but for insns with a DS field. */
1665 HOWTO (R_PPC64_TPREL16_DS,
1666 0, /* rightshift */
1667 1, /* size (0 = byte, 1 = short, 2 = long) */
1668 16, /* bitsize */
1669 FALSE, /* pc_relative */
1670 0, /* bitpos */
1671 complain_overflow_signed, /* complain_on_overflow */
1672 ppc64_elf_unhandled_reloc, /* special_function */
1673 "R_PPC64_TPREL16_DS", /* name */
1674 FALSE, /* partial_inplace */
1675 0, /* src_mask */
1676 0xfffc, /* dst_mask */
1677 FALSE), /* pcrel_offset */
1678
1679 /* Like TPREL16_DS, but no overflow. */
1680 HOWTO (R_PPC64_TPREL16_LO_DS,
1681 0, /* rightshift */
1682 1, /* size (0 = byte, 1 = short, 2 = long) */
1683 16, /* bitsize */
1684 FALSE, /* pc_relative */
1685 0, /* bitpos */
1686 complain_overflow_dont, /* complain_on_overflow */
1687 ppc64_elf_unhandled_reloc, /* special_function */
1688 "R_PPC64_TPREL16_LO_DS", /* name */
1689 FALSE, /* partial_inplace */
1690 0, /* src_mask */
1691 0xfffc, /* dst_mask */
1692 FALSE), /* pcrel_offset */
1693
1694 /* Allocates two contiguous entries in the GOT to hold a tls_index structure,
1695 with values (sym+add)@dtpmod and (sym+add)@dtprel, and computes the offset
1696 to the first entry relative to the TOC base (r2). */
1697 HOWTO (R_PPC64_GOT_TLSGD16,
1698 0, /* rightshift */
1699 1, /* size (0 = byte, 1 = short, 2 = long) */
1700 16, /* bitsize */
1701 FALSE, /* pc_relative */
1702 0, /* bitpos */
1703 complain_overflow_signed, /* complain_on_overflow */
1704 ppc64_elf_unhandled_reloc, /* special_function */
1705 "R_PPC64_GOT_TLSGD16", /* name */
b34976b6 1706 FALSE, /* partial_inplace */
5bd4f169
AM
1707 0, /* src_mask */
1708 0xffff, /* dst_mask */
b34976b6 1709 FALSE), /* pcrel_offset */
5bd4f169 1710
411e1bfb
AM
1711 /* Like GOT_TLSGD16, but no overflow. */
1712 HOWTO (R_PPC64_GOT_TLSGD16_LO,
5bd4f169
AM
1713 0, /* rightshift */
1714 1, /* size (0 = byte, 1 = short, 2 = long) */
1715 16, /* bitsize */
b34976b6 1716 FALSE, /* pc_relative */
5bd4f169
AM
1717 0, /* bitpos */
1718 complain_overflow_dont, /* complain_on_overflow */
805fc799 1719 ppc64_elf_unhandled_reloc, /* special_function */
411e1bfb 1720 "R_PPC64_GOT_TLSGD16_LO", /* name */
b34976b6 1721 FALSE, /* partial_inplace */
5bd4f169
AM
1722 0, /* src_mask */
1723 0xffff, /* dst_mask */
b34976b6 1724 FALSE), /* pcrel_offset */
5bd4f169 1725
411e1bfb
AM
1726 /* Like GOT_TLSGD16_LO, but next higher group of 16 bits. */
1727 HOWTO (R_PPC64_GOT_TLSGD16_HI,
5bd4f169
AM
1728 16, /* rightshift */
1729 1, /* size (0 = byte, 1 = short, 2 = long) */
1730 16, /* bitsize */
b34976b6 1731 FALSE, /* pc_relative */
5bd4f169 1732 0, /* bitpos */
f9c6b907 1733 complain_overflow_signed, /* complain_on_overflow */
805fc799 1734 ppc64_elf_unhandled_reloc, /* special_function */
411e1bfb 1735 "R_PPC64_GOT_TLSGD16_HI", /* name */
b34976b6 1736 FALSE, /* partial_inplace */
5bd4f169
AM
1737 0, /* src_mask */
1738 0xffff, /* dst_mask */
b34976b6 1739 FALSE), /* pcrel_offset */
5bd4f169 1740
411e1bfb
AM
1741 /* Like GOT_TLSGD16_HI, but adjust for low 16 bits. */
1742 HOWTO (R_PPC64_GOT_TLSGD16_HA,
5bd4f169
AM
1743 16, /* rightshift */
1744 1, /* size (0 = byte, 1 = short, 2 = long) */
1745 16, /* bitsize */
b34976b6 1746 FALSE, /* pc_relative */
5bd4f169 1747 0, /* bitpos */
f9c6b907 1748 complain_overflow_signed, /* complain_on_overflow */
805fc799 1749 ppc64_elf_unhandled_reloc, /* special_function */
411e1bfb 1750 "R_PPC64_GOT_TLSGD16_HA", /* name */
b34976b6 1751 FALSE, /* partial_inplace */
5bd4f169
AM
1752 0, /* src_mask */
1753 0xffff, /* dst_mask */
b34976b6 1754 FALSE), /* pcrel_offset */
5bd4f169 1755
411e1bfb
AM
1756 /* Allocates two contiguous entries in the GOT to hold a tls_index structure,
1757 with values (sym+add)@dtpmod and zero, and computes the offset to the
1758 first entry relative to the TOC base (r2). */
1759 HOWTO (R_PPC64_GOT_TLSLD16,
5bd4f169
AM
1760 0, /* rightshift */
1761 1, /* size (0 = byte, 1 = short, 2 = long) */
1762 16, /* bitsize */
b34976b6 1763 FALSE, /* pc_relative */
5bd4f169 1764 0, /* bitpos */
411e1bfb
AM
1765 complain_overflow_signed, /* complain_on_overflow */
1766 ppc64_elf_unhandled_reloc, /* special_function */
1767 "R_PPC64_GOT_TLSLD16", /* name */
b34976b6 1768 FALSE, /* partial_inplace */
d006db6c 1769 0, /* src_mask */
411e1bfb 1770 0xffff, /* dst_mask */
b34976b6 1771 FALSE), /* pcrel_offset */
5bd4f169 1772
411e1bfb
AM
1773 /* Like GOT_TLSLD16, but no overflow. */
1774 HOWTO (R_PPC64_GOT_TLSLD16_LO,
5bd4f169
AM
1775 0, /* rightshift */
1776 1, /* size (0 = byte, 1 = short, 2 = long) */
1777 16, /* bitsize */
b34976b6 1778 FALSE, /* pc_relative */
5bd4f169 1779 0, /* bitpos */
411e1bfb
AM
1780 complain_overflow_dont, /* complain_on_overflow */
1781 ppc64_elf_unhandled_reloc, /* special_function */
1782 "R_PPC64_GOT_TLSLD16_LO", /* name */
b34976b6 1783 FALSE, /* partial_inplace */
d006db6c 1784 0, /* src_mask */
411e1bfb 1785 0xffff, /* dst_mask */
b34976b6 1786 FALSE), /* pcrel_offset */
5bd4f169 1787
411e1bfb
AM
1788 /* Like GOT_TLSLD16_LO, but next higher group of 16 bits. */
1789 HOWTO (R_PPC64_GOT_TLSLD16_HI,
1790 16, /* rightshift */
5bd4f169
AM
1791 1, /* size (0 = byte, 1 = short, 2 = long) */
1792 16, /* bitsize */
b34976b6 1793 FALSE, /* pc_relative */
5bd4f169 1794 0, /* bitpos */
f9c6b907 1795 complain_overflow_signed, /* complain_on_overflow */
805fc799 1796 ppc64_elf_unhandled_reloc, /* special_function */
411e1bfb 1797 "R_PPC64_GOT_TLSLD16_HI", /* name */
b34976b6 1798 FALSE, /* partial_inplace */
d006db6c 1799 0, /* src_mask */
411e1bfb 1800 0xffff, /* dst_mask */
b34976b6 1801 FALSE), /* pcrel_offset */
5bd4f169 1802
411e1bfb
AM
1803 /* Like GOT_TLSLD16_HI, but adjust for low 16 bits. */
1804 HOWTO (R_PPC64_GOT_TLSLD16_HA,
1805 16, /* rightshift */
5bd4f169
AM
1806 1, /* size (0 = byte, 1 = short, 2 = long) */
1807 16, /* bitsize */
b34976b6 1808 FALSE, /* pc_relative */
5bd4f169 1809 0, /* bitpos */
f9c6b907 1810 complain_overflow_signed, /* complain_on_overflow */
805fc799 1811 ppc64_elf_unhandled_reloc, /* special_function */
411e1bfb 1812 "R_PPC64_GOT_TLSLD16_HA", /* name */
b34976b6 1813 FALSE, /* partial_inplace */
d006db6c 1814 0, /* src_mask */
411e1bfb 1815 0xffff, /* dst_mask */
b34976b6 1816 FALSE), /* pcrel_offset */
5bd4f169 1817
411e1bfb
AM
1818 /* Allocates an entry in the GOT with value (sym+add)@dtprel, and computes
1819 the offset to the entry relative to the TOC base (r2). */
1820 HOWTO (R_PPC64_GOT_DTPREL16_DS,
5bd4f169
AM
1821 0, /* rightshift */
1822 1, /* size (0 = byte, 1 = short, 2 = long) */
1823 16, /* bitsize */
b34976b6 1824 FALSE, /* pc_relative */
5bd4f169 1825 0, /* bitpos */
411e1bfb 1826 complain_overflow_signed, /* complain_on_overflow */
805fc799 1827 ppc64_elf_unhandled_reloc, /* special_function */
411e1bfb 1828 "R_PPC64_GOT_DTPREL16_DS", /* name */
b34976b6 1829 FALSE, /* partial_inplace */
d006db6c 1830 0, /* src_mask */
5bd4f169 1831 0xfffc, /* dst_mask */
b34976b6 1832 FALSE), /* pcrel_offset */
5bd4f169 1833
411e1bfb
AM
1834 /* Like GOT_DTPREL16_DS, but no overflow. */
1835 HOWTO (R_PPC64_GOT_DTPREL16_LO_DS,
5bd4f169 1836 0, /* rightshift */
c061c2d8
AM
1837 1, /* size (0 = byte, 1 = short, 2 = long) */
1838 16, /* bitsize */
b34976b6 1839 FALSE, /* pc_relative */
5bd4f169 1840 0, /* bitpos */
411e1bfb
AM
1841 complain_overflow_dont, /* complain_on_overflow */
1842 ppc64_elf_unhandled_reloc, /* special_function */
1843 "R_PPC64_GOT_DTPREL16_LO_DS", /* name */
b34976b6 1844 FALSE, /* partial_inplace */
d006db6c 1845 0, /* src_mask */
c061c2d8 1846 0xfffc, /* dst_mask */
b34976b6 1847 FALSE), /* pcrel_offset */
5bd4f169 1848
411e1bfb
AM
1849 /* Like GOT_DTPREL16_LO_DS, but next higher group of 16 bits. */
1850 HOWTO (R_PPC64_GOT_DTPREL16_HI,
1851 16, /* rightshift */
5bd4f169
AM
1852 1, /* size (0 = byte, 1 = short, 2 = long) */
1853 16, /* bitsize */
b34976b6 1854 FALSE, /* pc_relative */
5bd4f169 1855 0, /* bitpos */
f9c6b907 1856 complain_overflow_signed, /* complain_on_overflow */
411e1bfb
AM
1857 ppc64_elf_unhandled_reloc, /* special_function */
1858 "R_PPC64_GOT_DTPREL16_HI", /* name */
b34976b6 1859 FALSE, /* partial_inplace */
d006db6c 1860 0, /* src_mask */
411e1bfb 1861 0xffff, /* dst_mask */
b34976b6 1862 FALSE), /* pcrel_offset */
5bd4f169 1863
411e1bfb
AM
1864 /* Like GOT_DTPREL16_HI, but adjust for low 16 bits. */
1865 HOWTO (R_PPC64_GOT_DTPREL16_HA,
1866 16, /* rightshift */
1867 1, /* size (0 = byte, 1 = short, 2 = long) */
1868 16, /* bitsize */
1869 FALSE, /* pc_relative */
1870 0, /* bitpos */
f9c6b907 1871 complain_overflow_signed, /* complain_on_overflow */
411e1bfb
AM
1872 ppc64_elf_unhandled_reloc, /* special_function */
1873 "R_PPC64_GOT_DTPREL16_HA", /* name */
1874 FALSE, /* partial_inplace */
1875 0, /* src_mask */
1876 0xffff, /* dst_mask */
1877 FALSE), /* pcrel_offset */
1878
1879 /* Allocates an entry in the GOT with value (sym+add)@tprel, and computes the
1880 offset to the entry relative to the TOC base (r2). */
1881 HOWTO (R_PPC64_GOT_TPREL16_DS,
5bd4f169
AM
1882 0, /* rightshift */
1883 1, /* size (0 = byte, 1 = short, 2 = long) */
1884 16, /* bitsize */
b34976b6 1885 FALSE, /* pc_relative */
5bd4f169
AM
1886 0, /* bitpos */
1887 complain_overflow_signed, /* complain_on_overflow */
411e1bfb
AM
1888 ppc64_elf_unhandled_reloc, /* special_function */
1889 "R_PPC64_GOT_TPREL16_DS", /* name */
b34976b6 1890 FALSE, /* partial_inplace */
d006db6c 1891 0, /* src_mask */
ad8e1ba5 1892 0xfffc, /* dst_mask */
b34976b6 1893 FALSE), /* pcrel_offset */
5bd4f169 1894
411e1bfb
AM
1895 /* Like GOT_TPREL16_DS, but no overflow. */
1896 HOWTO (R_PPC64_GOT_TPREL16_LO_DS,
5bd4f169
AM
1897 0, /* rightshift */
1898 1, /* size (0 = byte, 1 = short, 2 = long) */
1899 16, /* bitsize */
b34976b6 1900 FALSE, /* pc_relative */
5bd4f169
AM
1901 0, /* bitpos */
1902 complain_overflow_dont, /* complain_on_overflow */
411e1bfb
AM
1903 ppc64_elf_unhandled_reloc, /* special_function */
1904 "R_PPC64_GOT_TPREL16_LO_DS", /* name */
b34976b6 1905 FALSE, /* partial_inplace */
d006db6c 1906 0, /* src_mask */
ad8e1ba5 1907 0xfffc, /* dst_mask */
b34976b6 1908 FALSE), /* pcrel_offset */
5bd4f169 1909
411e1bfb
AM
1910 /* Like GOT_TPREL16_LO_DS, but next higher group of 16 bits. */
1911 HOWTO (R_PPC64_GOT_TPREL16_HI,
1912 16, /* rightshift */
5bd4f169
AM
1913 1, /* size (0 = byte, 1 = short, 2 = long) */
1914 16, /* bitsize */
b34976b6 1915 FALSE, /* pc_relative */
5bd4f169 1916 0, /* bitpos */
f9c6b907 1917 complain_overflow_signed, /* complain_on_overflow */
805fc799 1918 ppc64_elf_unhandled_reloc, /* special_function */
411e1bfb 1919 "R_PPC64_GOT_TPREL16_HI", /* name */
b34976b6 1920 FALSE, /* partial_inplace */
d006db6c 1921 0, /* src_mask */
411e1bfb 1922 0xffff, /* dst_mask */
b34976b6 1923 FALSE), /* pcrel_offset */
5bd4f169 1924
411e1bfb
AM
1925 /* Like GOT_TPREL16_HI, but adjust for low 16 bits. */
1926 HOWTO (R_PPC64_GOT_TPREL16_HA,
1927 16, /* rightshift */
5bd4f169
AM
1928 1, /* size (0 = byte, 1 = short, 2 = long) */
1929 16, /* bitsize */
b34976b6 1930 FALSE, /* pc_relative */
5bd4f169 1931 0, /* bitpos */
f9c6b907 1932 complain_overflow_signed, /* complain_on_overflow */
805fc799 1933 ppc64_elf_unhandled_reloc, /* special_function */
411e1bfb 1934 "R_PPC64_GOT_TPREL16_HA", /* name */
b34976b6 1935 FALSE, /* partial_inplace */
d006db6c 1936 0, /* src_mask */
411e1bfb 1937 0xffff, /* dst_mask */
b34976b6 1938 FALSE), /* pcrel_offset */
5bd4f169 1939
25f23106
AM
1940 HOWTO (R_PPC64_JMP_IREL, /* type */
1941 0, /* rightshift */
1942 0, /* size (0=byte, 1=short, 2=long, 4=64 bits) */
1943 0, /* bitsize */
1944 FALSE, /* pc_relative */
1945 0, /* bitpos */
1946 complain_overflow_dont, /* complain_on_overflow */
1947 ppc64_elf_unhandled_reloc, /* special_function */
1948 "R_PPC64_JMP_IREL", /* name */
1949 FALSE, /* partial_inplace */
1950 0, /* src_mask */
1951 0, /* dst_mask */
1952 FALSE), /* pcrel_offset */
1953
e054468f
AM
1954 HOWTO (R_PPC64_IRELATIVE, /* type */
1955 0, /* rightshift */
1956 4, /* size (0=byte, 1=short, 2=long, 4=64 bits) */
1957 64, /* bitsize */
1958 FALSE, /* pc_relative */
1959 0, /* bitpos */
1960 complain_overflow_dont, /* complain_on_overflow */
1961 bfd_elf_generic_reloc, /* special_function */
1962 "R_PPC64_IRELATIVE", /* name */
1963 FALSE, /* partial_inplace */
1964 0, /* src_mask */
1965 ONES (64), /* dst_mask */
1966 FALSE), /* pcrel_offset */
1967
25f23106
AM
1968 /* A 16 bit relative relocation. */
1969 HOWTO (R_PPC64_REL16, /* type */
1970 0, /* rightshift */
1971 1, /* size (0 = byte, 1 = short, 2 = long) */
1972 16, /* bitsize */
1973 TRUE, /* pc_relative */
1974 0, /* bitpos */
b80eed39 1975 complain_overflow_signed, /* complain_on_overflow */
25f23106
AM
1976 bfd_elf_generic_reloc, /* special_function */
1977 "R_PPC64_REL16", /* name */
1978 FALSE, /* partial_inplace */
1979 0, /* src_mask */
1980 0xffff, /* dst_mask */
1981 TRUE), /* pcrel_offset */
1982
1983 /* A 16 bit relative relocation without overflow. */
1984 HOWTO (R_PPC64_REL16_LO, /* type */
1985 0, /* rightshift */
1986 1, /* size (0 = byte, 1 = short, 2 = long) */
1987 16, /* bitsize */
1988 TRUE, /* pc_relative */
1989 0, /* bitpos */
1990 complain_overflow_dont,/* complain_on_overflow */
1991 bfd_elf_generic_reloc, /* special_function */
1992 "R_PPC64_REL16_LO", /* name */
1993 FALSE, /* partial_inplace */
1994 0, /* src_mask */
1995 0xffff, /* dst_mask */
1996 TRUE), /* pcrel_offset */
1997
1998 /* The high order 16 bits of a relative address. */
1999 HOWTO (R_PPC64_REL16_HI, /* type */
2000 16, /* rightshift */
2001 1, /* size (0 = byte, 1 = short, 2 = long) */
2002 16, /* bitsize */
2003 TRUE, /* pc_relative */
2004 0, /* bitpos */
f9c6b907 2005 complain_overflow_signed, /* complain_on_overflow */
25f23106
AM
2006 bfd_elf_generic_reloc, /* special_function */
2007 "R_PPC64_REL16_HI", /* name */
2008 FALSE, /* partial_inplace */
2009 0, /* src_mask */
2010 0xffff, /* dst_mask */
2011 TRUE), /* pcrel_offset */
2012
2013 /* The high order 16 bits of a relative address, plus 1 if the contents of
2014 the low 16 bits, treated as a signed number, is negative. */
2015 HOWTO (R_PPC64_REL16_HA, /* type */
2016 16, /* rightshift */
2017 1, /* size (0 = byte, 1 = short, 2 = long) */
2018 16, /* bitsize */
2019 TRUE, /* pc_relative */
2020 0, /* bitpos */
f9c6b907 2021 complain_overflow_signed, /* complain_on_overflow */
25f23106
AM
2022 ppc64_elf_ha_reloc, /* special_function */
2023 "R_PPC64_REL16_HA", /* name */
2024 FALSE, /* partial_inplace */
2025 0, /* src_mask */
2026 0xffff, /* dst_mask */
2027 TRUE), /* pcrel_offset */
2028
a680de9a
PB
2029 /* Like R_PPC64_REL16_HA but for split field in addpcis. */
2030 HOWTO (R_PPC64_REL16DX_HA, /* type */
2031 16, /* rightshift */
2032 2, /* size (0 = byte, 1 = short, 2 = long) */
2033 16, /* bitsize */
2034 TRUE, /* pc_relative */
2035 0, /* bitpos */
2036 complain_overflow_signed, /* complain_on_overflow */
2037 ppc64_elf_ha_reloc, /* special_function */
2038 "R_PPC64_REL16DX_HA", /* name */
2039 FALSE, /* partial_inplace */
2040 0, /* src_mask */
2041 0x1fffc1, /* dst_mask */
2042 TRUE), /* pcrel_offset */
2043
f9c6b907
AM
2044 /* Like R_PPC64_ADDR16_HI, but no overflow. */
2045 HOWTO (R_PPC64_ADDR16_HIGH, /* type */
2046 16, /* rightshift */
2047 1, /* size (0 = byte, 1 = short, 2 = long) */
2048 16, /* bitsize */
2049 FALSE, /* pc_relative */
2050 0, /* bitpos */
2051 complain_overflow_dont, /* complain_on_overflow */
2052 bfd_elf_generic_reloc, /* special_function */
2053 "R_PPC64_ADDR16_HIGH", /* name */
2054 FALSE, /* partial_inplace */
2055 0, /* src_mask */
2056 0xffff, /* dst_mask */
2057 FALSE), /* pcrel_offset */
2058
2059 /* Like R_PPC64_ADDR16_HA, but no overflow. */
2060 HOWTO (R_PPC64_ADDR16_HIGHA, /* type */
2061 16, /* rightshift */
2062 1, /* size (0 = byte, 1 = short, 2 = long) */
2063 16, /* bitsize */
2064 FALSE, /* pc_relative */
2065 0, /* bitpos */
2066 complain_overflow_dont, /* complain_on_overflow */
2067 ppc64_elf_ha_reloc, /* special_function */
2068 "R_PPC64_ADDR16_HIGHA", /* name */
2069 FALSE, /* partial_inplace */
2070 0, /* src_mask */
2071 0xffff, /* dst_mask */
2072 FALSE), /* pcrel_offset */
2073
2074 /* Like R_PPC64_DTPREL16_HI, but no overflow. */
2075 HOWTO (R_PPC64_DTPREL16_HIGH,
2076 16, /* rightshift */
2077 1, /* size (0 = byte, 1 = short, 2 = long) */
2078 16, /* bitsize */
2079 FALSE, /* pc_relative */
2080 0, /* bitpos */
2081 complain_overflow_dont, /* complain_on_overflow */
2082 ppc64_elf_unhandled_reloc, /* special_function */
2083 "R_PPC64_DTPREL16_HIGH", /* name */
2084 FALSE, /* partial_inplace */
2085 0, /* src_mask */
2086 0xffff, /* dst_mask */
2087 FALSE), /* pcrel_offset */
2088
2089 /* Like R_PPC64_DTPREL16_HA, but no overflow. */
2090 HOWTO (R_PPC64_DTPREL16_HIGHA,
2091 16, /* rightshift */
2092 1, /* size (0 = byte, 1 = short, 2 = long) */
2093 16, /* bitsize */
2094 FALSE, /* pc_relative */
2095 0, /* bitpos */
2096 complain_overflow_dont, /* complain_on_overflow */
2097 ppc64_elf_unhandled_reloc, /* special_function */
2098 "R_PPC64_DTPREL16_HIGHA", /* name */
2099 FALSE, /* partial_inplace */
2100 0, /* src_mask */
2101 0xffff, /* dst_mask */
2102 FALSE), /* pcrel_offset */
2103
2104 /* Like R_PPC64_TPREL16_HI, but no overflow. */
2105 HOWTO (R_PPC64_TPREL16_HIGH,
2106 16, /* rightshift */
2107 1, /* size (0 = byte, 1 = short, 2 = long) */
2108 16, /* bitsize */
2109 FALSE, /* pc_relative */
2110 0, /* bitpos */
2111 complain_overflow_dont, /* complain_on_overflow */
2112 ppc64_elf_unhandled_reloc, /* special_function */
2113 "R_PPC64_TPREL16_HIGH", /* name */
2114 FALSE, /* partial_inplace */
2115 0, /* src_mask */
2116 0xffff, /* dst_mask */
2117 FALSE), /* pcrel_offset */
2118
2119 /* Like R_PPC64_TPREL16_HA, but no overflow. */
2120 HOWTO (R_PPC64_TPREL16_HIGHA,
2121 16, /* rightshift */
2122 1, /* size (0 = byte, 1 = short, 2 = long) */
2123 16, /* bitsize */
2124 FALSE, /* pc_relative */
2125 0, /* bitpos */
2126 complain_overflow_dont, /* complain_on_overflow */
2127 ppc64_elf_unhandled_reloc, /* special_function */
2128 "R_PPC64_TPREL16_HIGHA", /* name */
2129 FALSE, /* partial_inplace */
2130 0, /* src_mask */
2131 0xffff, /* dst_mask */
2132 FALSE), /* pcrel_offset */
2133
006589cf
AM
2134 /* Marker reloc on ELFv2 large-model function entry. */
2135 HOWTO (R_PPC64_ENTRY,
2136 0, /* rightshift */
2137 2, /* size (0 = byte, 1 = short, 2 = long) */
2138 32, /* bitsize */
2139 FALSE, /* pc_relative */
2140 0, /* bitpos */
2141 complain_overflow_dont, /* complain_on_overflow */
2142 bfd_elf_generic_reloc, /* special_function */
2143 "R_PPC64_ENTRY", /* name */
2144 FALSE, /* partial_inplace */
2145 0, /* src_mask */
2146 0, /* dst_mask */
2147 FALSE), /* pcrel_offset */
2148
45965137
AM
2149 /* Like ADDR64, but use local entry point of function. */
2150 HOWTO (R_PPC64_ADDR64_LOCAL, /* type */
2151 0, /* rightshift */
2152 4, /* size (0=byte, 1=short, 2=long, 4=64 bits) */
2153 64, /* bitsize */
2154 FALSE, /* pc_relative */
2155 0, /* bitpos */
2156 complain_overflow_dont, /* complain_on_overflow */
2157 bfd_elf_generic_reloc, /* special_function */
2158 "R_PPC64_ADDR64_LOCAL", /* name */
2159 FALSE, /* partial_inplace */
2160 0, /* src_mask */
2161 ONES (64), /* dst_mask */
2162 FALSE), /* pcrel_offset */
2163
5bd4f169
AM
2164 /* GNU extension to record C++ vtable hierarchy. */
2165 HOWTO (R_PPC64_GNU_VTINHERIT, /* type */
2166 0, /* rightshift */
2167 0, /* size (0 = byte, 1 = short, 2 = long) */
2168 0, /* bitsize */
b34976b6 2169 FALSE, /* pc_relative */
5bd4f169
AM
2170 0, /* bitpos */
2171 complain_overflow_dont, /* complain_on_overflow */
2172 NULL, /* special_function */
2173 "R_PPC64_GNU_VTINHERIT", /* name */
b34976b6 2174 FALSE, /* partial_inplace */
5bd4f169
AM
2175 0, /* src_mask */
2176 0, /* dst_mask */
b34976b6 2177 FALSE), /* pcrel_offset */
5bd4f169
AM
2178
2179 /* GNU extension to record C++ vtable member usage. */
2180 HOWTO (R_PPC64_GNU_VTENTRY, /* type */
2181 0, /* rightshift */
2182 0, /* size (0 = byte, 1 = short, 2 = long) */
2183 0, /* bitsize */
b34976b6 2184 FALSE, /* pc_relative */
5bd4f169
AM
2185 0, /* bitpos */
2186 complain_overflow_dont, /* complain_on_overflow */
2187 NULL, /* special_function */
2188 "R_PPC64_GNU_VTENTRY", /* name */
b34976b6 2189 FALSE, /* partial_inplace */
5bd4f169
AM
2190 0, /* src_mask */
2191 0, /* dst_mask */
b34976b6 2192 FALSE), /* pcrel_offset */
5bd4f169
AM
2193};
2194
2195\f
2196/* Initialize the ppc64_elf_howto_table, so that linear accesses can
2197 be done. */
2198
2199static void
4ce794b7 2200ppc_howto_init (void)
5bd4f169
AM
2201{
2202 unsigned int i, type;
2203
a4b6fadd 2204 for (i = 0; i < ARRAY_SIZE (ppc64_elf_howto_raw); i++)
5bd4f169
AM
2205 {
2206 type = ppc64_elf_howto_raw[i].type;
a4b6fadd 2207 BFD_ASSERT (type < ARRAY_SIZE (ppc64_elf_howto_table));
5bd4f169
AM
2208 ppc64_elf_howto_table[type] = &ppc64_elf_howto_raw[i];
2209 }
2210}
2211
2212static reloc_howto_type *
4ce794b7
AM
2213ppc64_elf_reloc_type_lookup (bfd *abfd ATTRIBUTE_UNUSED,
2214 bfd_reloc_code_real_type code)
5bd4f169 2215{
411e1bfb 2216 enum elf_ppc64_reloc_type r = R_PPC64_NONE;
5bd4f169
AM
2217
2218 if (!ppc64_elf_howto_table[R_PPC64_ADDR32])
2219 /* Initialize howto table if needed. */
2220 ppc_howto_init ();
2221
4ce794b7 2222 switch (code)
5bd4f169
AM
2223 {
2224 default:
4ce794b7 2225 return NULL;
5bd4f169 2226
411e1bfb
AM
2227 case BFD_RELOC_NONE: r = R_PPC64_NONE;
2228 break;
2229 case BFD_RELOC_32: r = R_PPC64_ADDR32;
2230 break;
2231 case BFD_RELOC_PPC_BA26: r = R_PPC64_ADDR24;
2232 break;
2233 case BFD_RELOC_16: r = R_PPC64_ADDR16;
2234 break;
2235 case BFD_RELOC_LO16: r = R_PPC64_ADDR16_LO;
2236 break;
2237 case BFD_RELOC_HI16: r = R_PPC64_ADDR16_HI;
2238 break;
f9c6b907
AM
2239 case BFD_RELOC_PPC64_ADDR16_HIGH: r = R_PPC64_ADDR16_HIGH;
2240 break;
411e1bfb 2241 case BFD_RELOC_HI16_S: r = R_PPC64_ADDR16_HA;
5bd4f169 2242 break;
f9c6b907
AM
2243 case BFD_RELOC_PPC64_ADDR16_HIGHA: r = R_PPC64_ADDR16_HIGHA;
2244 break;
411e1bfb 2245 case BFD_RELOC_PPC_BA16: r = R_PPC64_ADDR14;
5bd4f169 2246 break;
411e1bfb 2247 case BFD_RELOC_PPC_BA16_BRTAKEN: r = R_PPC64_ADDR14_BRTAKEN;
5bd4f169 2248 break;
411e1bfb 2249 case BFD_RELOC_PPC_BA16_BRNTAKEN: r = R_PPC64_ADDR14_BRNTAKEN;
5bd4f169 2250 break;
411e1bfb 2251 case BFD_RELOC_PPC_B26: r = R_PPC64_REL24;
5bd4f169 2252 break;
411e1bfb 2253 case BFD_RELOC_PPC_B16: r = R_PPC64_REL14;
5bd4f169 2254 break;
411e1bfb 2255 case BFD_RELOC_PPC_B16_BRTAKEN: r = R_PPC64_REL14_BRTAKEN;
5bd4f169 2256 break;
411e1bfb 2257 case BFD_RELOC_PPC_B16_BRNTAKEN: r = R_PPC64_REL14_BRNTAKEN;
5bd4f169 2258 break;
411e1bfb 2259 case BFD_RELOC_16_GOTOFF: r = R_PPC64_GOT16;
5bd4f169 2260 break;
411e1bfb 2261 case BFD_RELOC_LO16_GOTOFF: r = R_PPC64_GOT16_LO;
5bd4f169 2262 break;
411e1bfb 2263 case BFD_RELOC_HI16_GOTOFF: r = R_PPC64_GOT16_HI;
5bd4f169 2264 break;
411e1bfb 2265 case BFD_RELOC_HI16_S_GOTOFF: r = R_PPC64_GOT16_HA;
5bd4f169 2266 break;
411e1bfb 2267 case BFD_RELOC_PPC_COPY: r = R_PPC64_COPY;
5bd4f169 2268 break;
411e1bfb 2269 case BFD_RELOC_PPC_GLOB_DAT: r = R_PPC64_GLOB_DAT;
5bd4f169 2270 break;
411e1bfb 2271 case BFD_RELOC_32_PCREL: r = R_PPC64_REL32;
5bd4f169 2272 break;
411e1bfb 2273 case BFD_RELOC_32_PLTOFF: r = R_PPC64_PLT32;
5bd4f169 2274 break;
411e1bfb 2275 case BFD_RELOC_32_PLT_PCREL: r = R_PPC64_PLTREL32;
5bd4f169 2276 break;
411e1bfb 2277 case BFD_RELOC_LO16_PLTOFF: r = R_PPC64_PLT16_LO;
5bd4f169 2278 break;
411e1bfb 2279 case BFD_RELOC_HI16_PLTOFF: r = R_PPC64_PLT16_HI;
5bd4f169 2280 break;
411e1bfb 2281 case BFD_RELOC_HI16_S_PLTOFF: r = R_PPC64_PLT16_HA;
5bd4f169 2282 break;
411e1bfb 2283 case BFD_RELOC_16_BASEREL: r = R_PPC64_SECTOFF;
5bd4f169 2284 break;
411e1bfb 2285 case BFD_RELOC_LO16_BASEREL: r = R_PPC64_SECTOFF_LO;
5bd4f169 2286 break;
411e1bfb 2287 case BFD_RELOC_HI16_BASEREL: r = R_PPC64_SECTOFF_HI;
5bd4f169 2288 break;
411e1bfb 2289 case BFD_RELOC_HI16_S_BASEREL: r = R_PPC64_SECTOFF_HA;
5bd4f169 2290 break;
411e1bfb 2291 case BFD_RELOC_CTOR: r = R_PPC64_ADDR64;
5bd4f169 2292 break;
411e1bfb 2293 case BFD_RELOC_64: r = R_PPC64_ADDR64;
5bd4f169 2294 break;
411e1bfb 2295 case BFD_RELOC_PPC64_HIGHER: r = R_PPC64_ADDR16_HIGHER;
5bd4f169 2296 break;
411e1bfb 2297 case BFD_RELOC_PPC64_HIGHER_S: r = R_PPC64_ADDR16_HIGHERA;
5bd4f169 2298 break;
411e1bfb 2299 case BFD_RELOC_PPC64_HIGHEST: r = R_PPC64_ADDR16_HIGHEST;
5bd4f169 2300 break;
411e1bfb 2301 case BFD_RELOC_PPC64_HIGHEST_S: r = R_PPC64_ADDR16_HIGHESTA;
5bd4f169 2302 break;
411e1bfb 2303 case BFD_RELOC_64_PCREL: r = R_PPC64_REL64;
5bd4f169 2304 break;
411e1bfb 2305 case BFD_RELOC_64_PLTOFF: r = R_PPC64_PLT64;
5bd4f169 2306 break;
411e1bfb 2307 case BFD_RELOC_64_PLT_PCREL: r = R_PPC64_PLTREL64;
5bd4f169 2308 break;
411e1bfb 2309 case BFD_RELOC_PPC_TOC16: r = R_PPC64_TOC16;
5bd4f169 2310 break;
411e1bfb 2311 case BFD_RELOC_PPC64_TOC16_LO: r = R_PPC64_TOC16_LO;
5bd4f169 2312 break;
411e1bfb 2313 case BFD_RELOC_PPC64_TOC16_HI: r = R_PPC64_TOC16_HI;
5bd4f169 2314 break;
411e1bfb 2315 case BFD_RELOC_PPC64_TOC16_HA: r = R_PPC64_TOC16_HA;
5bd4f169 2316 break;
411e1bfb 2317 case BFD_RELOC_PPC64_TOC: r = R_PPC64_TOC;
5bd4f169 2318 break;
411e1bfb 2319 case BFD_RELOC_PPC64_PLTGOT16: r = R_PPC64_PLTGOT16;
5bd4f169 2320 break;
411e1bfb 2321 case BFD_RELOC_PPC64_PLTGOT16_LO: r = R_PPC64_PLTGOT16_LO;
5bd4f169 2322 break;
411e1bfb 2323 case BFD_RELOC_PPC64_PLTGOT16_HI: r = R_PPC64_PLTGOT16_HI;
5bd4f169 2324 break;
411e1bfb 2325 case BFD_RELOC_PPC64_PLTGOT16_HA: r = R_PPC64_PLTGOT16_HA;
5bd4f169 2326 break;
411e1bfb 2327 case BFD_RELOC_PPC64_ADDR16_DS: r = R_PPC64_ADDR16_DS;
5bd4f169 2328 break;
411e1bfb 2329 case BFD_RELOC_PPC64_ADDR16_LO_DS: r = R_PPC64_ADDR16_LO_DS;
5bd4f169 2330 break;
411e1bfb 2331 case BFD_RELOC_PPC64_GOT16_DS: r = R_PPC64_GOT16_DS;
5bd4f169 2332 break;
411e1bfb 2333 case BFD_RELOC_PPC64_GOT16_LO_DS: r = R_PPC64_GOT16_LO_DS;
5bd4f169 2334 break;
411e1bfb 2335 case BFD_RELOC_PPC64_PLT16_LO_DS: r = R_PPC64_PLT16_LO_DS;
5bd4f169 2336 break;
411e1bfb 2337 case BFD_RELOC_PPC64_SECTOFF_DS: r = R_PPC64_SECTOFF_DS;
5bd4f169 2338 break;
411e1bfb 2339 case BFD_RELOC_PPC64_SECTOFF_LO_DS: r = R_PPC64_SECTOFF_LO_DS;
5bd4f169 2340 break;
411e1bfb 2341 case BFD_RELOC_PPC64_TOC16_DS: r = R_PPC64_TOC16_DS;
5bd4f169 2342 break;
411e1bfb 2343 case BFD_RELOC_PPC64_TOC16_LO_DS: r = R_PPC64_TOC16_LO_DS;
5bd4f169 2344 break;
411e1bfb 2345 case BFD_RELOC_PPC64_PLTGOT16_DS: r = R_PPC64_PLTGOT16_DS;
5bd4f169 2346 break;
411e1bfb 2347 case BFD_RELOC_PPC64_PLTGOT16_LO_DS: r = R_PPC64_PLTGOT16_LO_DS;
5bd4f169 2348 break;
411e1bfb 2349 case BFD_RELOC_PPC_TLS: r = R_PPC64_TLS;
5bd4f169 2350 break;
727fc41e
AM
2351 case BFD_RELOC_PPC_TLSGD: r = R_PPC64_TLSGD;
2352 break;
2353 case BFD_RELOC_PPC_TLSLD: r = R_PPC64_TLSLD;
2354 break;
411e1bfb 2355 case BFD_RELOC_PPC_DTPMOD: r = R_PPC64_DTPMOD64;
5bd4f169 2356 break;
411e1bfb 2357 case BFD_RELOC_PPC_TPREL16: r = R_PPC64_TPREL16;
5bd4f169 2358 break;
411e1bfb 2359 case BFD_RELOC_PPC_TPREL16_LO: r = R_PPC64_TPREL16_LO;
5bd4f169 2360 break;
411e1bfb 2361 case BFD_RELOC_PPC_TPREL16_HI: r = R_PPC64_TPREL16_HI;
5bd4f169 2362 break;
f9c6b907
AM
2363 case BFD_RELOC_PPC64_TPREL16_HIGH: r = R_PPC64_TPREL16_HIGH;
2364 break;
411e1bfb 2365 case BFD_RELOC_PPC_TPREL16_HA: r = R_PPC64_TPREL16_HA;
5bd4f169 2366 break;
f9c6b907
AM
2367 case BFD_RELOC_PPC64_TPREL16_HIGHA: r = R_PPC64_TPREL16_HIGHA;
2368 break;
411e1bfb 2369 case BFD_RELOC_PPC_TPREL: r = R_PPC64_TPREL64;
5bd4f169 2370 break;
411e1bfb
AM
2371 case BFD_RELOC_PPC_DTPREL16: r = R_PPC64_DTPREL16;
2372 break;
2373 case BFD_RELOC_PPC_DTPREL16_LO: r = R_PPC64_DTPREL16_LO;
2374 break;
2375 case BFD_RELOC_PPC_DTPREL16_HI: r = R_PPC64_DTPREL16_HI;
2376 break;
f9c6b907
AM
2377 case BFD_RELOC_PPC64_DTPREL16_HIGH: r = R_PPC64_DTPREL16_HIGH;
2378 break;
411e1bfb
AM
2379 case BFD_RELOC_PPC_DTPREL16_HA: r = R_PPC64_DTPREL16_HA;
2380 break;
f9c6b907
AM
2381 case BFD_RELOC_PPC64_DTPREL16_HIGHA: r = R_PPC64_DTPREL16_HIGHA;
2382 break;
411e1bfb
AM
2383 case BFD_RELOC_PPC_DTPREL: r = R_PPC64_DTPREL64;
2384 break;
2385 case BFD_RELOC_PPC_GOT_TLSGD16: r = R_PPC64_GOT_TLSGD16;
2386 break;
2387 case BFD_RELOC_PPC_GOT_TLSGD16_LO: r = R_PPC64_GOT_TLSGD16_LO;
2388 break;
2389 case BFD_RELOC_PPC_GOT_TLSGD16_HI: r = R_PPC64_GOT_TLSGD16_HI;
2390 break;
2391 case BFD_RELOC_PPC_GOT_TLSGD16_HA: r = R_PPC64_GOT_TLSGD16_HA;
2392 break;
2393 case BFD_RELOC_PPC_GOT_TLSLD16: r = R_PPC64_GOT_TLSLD16;
2394 break;
2395 case BFD_RELOC_PPC_GOT_TLSLD16_LO: r = R_PPC64_GOT_TLSLD16_LO;
2396 break;
2397 case BFD_RELOC_PPC_GOT_TLSLD16_HI: r = R_PPC64_GOT_TLSLD16_HI;
2398 break;
2399 case BFD_RELOC_PPC_GOT_TLSLD16_HA: r = R_PPC64_GOT_TLSLD16_HA;
2400 break;
2401 case BFD_RELOC_PPC_GOT_TPREL16: r = R_PPC64_GOT_TPREL16_DS;
2402 break;
2403 case BFD_RELOC_PPC_GOT_TPREL16_LO: r = R_PPC64_GOT_TPREL16_LO_DS;
2404 break;
2405 case BFD_RELOC_PPC_GOT_TPREL16_HI: r = R_PPC64_GOT_TPREL16_HI;
2406 break;
2407 case BFD_RELOC_PPC_GOT_TPREL16_HA: r = R_PPC64_GOT_TPREL16_HA;
2408 break;
2409 case BFD_RELOC_PPC_GOT_DTPREL16: r = R_PPC64_GOT_DTPREL16_DS;
2410 break;
2411 case BFD_RELOC_PPC_GOT_DTPREL16_LO: r = R_PPC64_GOT_DTPREL16_LO_DS;
2412 break;
2413 case BFD_RELOC_PPC_GOT_DTPREL16_HI: r = R_PPC64_GOT_DTPREL16_HI;
2414 break;
2415 case BFD_RELOC_PPC_GOT_DTPREL16_HA: r = R_PPC64_GOT_DTPREL16_HA;
2416 break;
2417 case BFD_RELOC_PPC64_TPREL16_DS: r = R_PPC64_TPREL16_DS;
2418 break;
2419 case BFD_RELOC_PPC64_TPREL16_LO_DS: r = R_PPC64_TPREL16_LO_DS;
2420 break;
2421 case BFD_RELOC_PPC64_TPREL16_HIGHER: r = R_PPC64_TPREL16_HIGHER;
2422 break;
2423 case BFD_RELOC_PPC64_TPREL16_HIGHERA: r = R_PPC64_TPREL16_HIGHERA;
2424 break;
2425 case BFD_RELOC_PPC64_TPREL16_HIGHEST: r = R_PPC64_TPREL16_HIGHEST;
2426 break;
2427 case BFD_RELOC_PPC64_TPREL16_HIGHESTA: r = R_PPC64_TPREL16_HIGHESTA;
2428 break;
2429 case BFD_RELOC_PPC64_DTPREL16_DS: r = R_PPC64_DTPREL16_DS;
2430 break;
2431 case BFD_RELOC_PPC64_DTPREL16_LO_DS: r = R_PPC64_DTPREL16_LO_DS;
2432 break;
2433 case BFD_RELOC_PPC64_DTPREL16_HIGHER: r = R_PPC64_DTPREL16_HIGHER;
2434 break;
2435 case BFD_RELOC_PPC64_DTPREL16_HIGHERA: r = R_PPC64_DTPREL16_HIGHERA;
2436 break;
2437 case BFD_RELOC_PPC64_DTPREL16_HIGHEST: r = R_PPC64_DTPREL16_HIGHEST;
2438 break;
2439 case BFD_RELOC_PPC64_DTPREL16_HIGHESTA: r = R_PPC64_DTPREL16_HIGHESTA;
2440 break;
25f23106
AM
2441 case BFD_RELOC_16_PCREL: r = R_PPC64_REL16;
2442 break;
2443 case BFD_RELOC_LO16_PCREL: r = R_PPC64_REL16_LO;
2444 break;
2445 case BFD_RELOC_HI16_PCREL: r = R_PPC64_REL16_HI;
2446 break;
2447 case BFD_RELOC_HI16_S_PCREL: r = R_PPC64_REL16_HA;
2448 break;
a680de9a
PB
2449 case BFD_RELOC_PPC_REL16DX_HA: r = R_PPC64_REL16DX_HA;
2450 break;
006589cf
AM
2451 case BFD_RELOC_PPC64_ENTRY: r = R_PPC64_ENTRY;
2452 break;
45965137
AM
2453 case BFD_RELOC_PPC64_ADDR64_LOCAL: r = R_PPC64_ADDR64_LOCAL;
2454 break;
411e1bfb
AM
2455 case BFD_RELOC_VTABLE_INHERIT: r = R_PPC64_GNU_VTINHERIT;
2456 break;
2457 case BFD_RELOC_VTABLE_ENTRY: r = R_PPC64_GNU_VTENTRY;
5bd4f169
AM
2458 break;
2459 }
2460
4ce794b7 2461 return ppc64_elf_howto_table[r];
5bd4f169
AM
2462};
2463
157090f7
AM
2464static reloc_howto_type *
2465ppc64_elf_reloc_name_lookup (bfd *abfd ATTRIBUTE_UNUSED,
2466 const char *r_name)
2467{
2468 unsigned int i;
2469
a4b6fadd 2470 for (i = 0; i < ARRAY_SIZE (ppc64_elf_howto_raw); i++)
157090f7
AM
2471 if (ppc64_elf_howto_raw[i].name != NULL
2472 && strcasecmp (ppc64_elf_howto_raw[i].name, r_name) == 0)
2473 return &ppc64_elf_howto_raw[i];
2474
2475 return NULL;
2476}
2477
5bd4f169
AM
2478/* Set the howto pointer for a PowerPC ELF reloc. */
2479
2480static void
4ce794b7
AM
2481ppc64_elf_info_to_howto (bfd *abfd ATTRIBUTE_UNUSED, arelent *cache_ptr,
2482 Elf_Internal_Rela *dst)
5bd4f169 2483{
65f38f15
AM
2484 unsigned int type;
2485
ef60b7ff 2486 /* Initialize howto table if needed. */
5bd4f169 2487 if (!ppc64_elf_howto_table[R_PPC64_ADDR32])
5bd4f169
AM
2488 ppc_howto_init ();
2489
65f38f15 2490 type = ELF64_R_TYPE (dst->r_info);
a4b6fadd 2491 if (type >= ARRAY_SIZE (ppc64_elf_howto_table))
d0fb9a8d
JJ
2492 {
2493 (*_bfd_error_handler) (_("%B: invalid relocation type %d"),
3ec2b351
NC
2494 abfd, (int) type);
2495 type = R_PPC64_NONE;
d0fb9a8d 2496 }
65f38f15 2497 cache_ptr->howto = ppc64_elf_howto_table[type];
5bd4f169
AM
2498}
2499
04c9666a 2500/* Handle the R_PPC64_ADDR16_HA and similar relocs. */
5bd4f169
AM
2501
2502static bfd_reloc_status_type
4ce794b7
AM
2503ppc64_elf_ha_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
2504 void *data, asection *input_section,
2505 bfd *output_bfd, char **error_message)
5bd4f169 2506{
a680de9a
PB
2507 enum elf_ppc64_reloc_type r_type;
2508 long insn;
2509 bfd_size_type octets;
2510 bfd_vma value;
2511
805fc799
AM
2512 /* If this is a relocatable link (output_bfd test tells us), just
2513 call the generic function. Any adjustment will be done at final
2514 link time. */
2515 if (output_bfd != NULL)
cedb70c5 2516 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
805fc799
AM
2517 input_section, output_bfd, error_message);
2518
2519 /* Adjust the addend for sign extension of the low 16 bits.
2520 We won't actually be using the low 16 bits, so trashing them
2521 doesn't matter. */
2522 reloc_entry->addend += 0x8000;
a680de9a
PB
2523 r_type = reloc_entry->howto->type;
2524 if (r_type != R_PPC64_REL16DX_HA)
2525 return bfd_reloc_continue;
2526
2527 value = 0;
2528 if (!bfd_is_com_section (symbol->section))
2529 value = symbol->value;
2530 value += (reloc_entry->addend
2531 + symbol->section->output_offset
2532 + symbol->section->output_section->vma);
2533 value -= (reloc_entry->address
2534 + input_section->output_offset
2535 + input_section->output_section->vma);
2536 value = (bfd_signed_vma) value >> 16;
2537
2538 octets = reloc_entry->address * bfd_octets_per_byte (abfd);
2539 insn = bfd_get_32 (abfd, (bfd_byte *) data + octets);
2540 insn &= ~0x1fffc1;
2541 insn |= (value & 0xffc1) | ((value & 0x3e) << 15);
2542 bfd_put_32 (abfd, insn, (bfd_byte *) data + octets);
2543 if (value + 0x8000 > 0xffff)
2544 return bfd_reloc_overflow;
2545 return bfd_reloc_ok;
805fc799 2546}
5bd4f169 2547
2441e016
AM
2548static bfd_reloc_status_type
2549ppc64_elf_branch_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
2550 void *data, asection *input_section,
2551 bfd *output_bfd, char **error_message)
2552{
2553 if (output_bfd != NULL)
2554 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
2555 input_section, output_bfd, error_message);
2556
699733f6
AM
2557 if (strcmp (symbol->section->name, ".opd") == 0
2558 && (symbol->section->owner->flags & DYNAMIC) == 0)
2441e016
AM
2559 {
2560 bfd_vma dest = opd_entry_value (symbol->section,
2561 symbol->value + reloc_entry->addend,
aef36ac1 2562 NULL, NULL, FALSE);
2441e016
AM
2563 if (dest != (bfd_vma) -1)
2564 reloc_entry->addend = dest - (symbol->value
2565 + symbol->section->output_section->vma
2566 + symbol->section->output_offset);
2567 }
810d4e75
AM
2568 else
2569 {
2570 elf_symbol_type *elfsym = (elf_symbol_type *) symbol;
2571
2572 if (symbol->section->owner != abfd
9f284bf9 2573 && symbol->section->owner != NULL
810d4e75
AM
2574 && abiversion (symbol->section->owner) >= 2)
2575 {
2576 unsigned int i;
2577
2578 for (i = 0; i < symbol->section->owner->symcount; ++i)
2579 {
2580 asymbol *symdef = symbol->section->owner->outsymbols[i];
2581
2582 if (strcmp (symdef->name, symbol->name) == 0)
2583 {
2584 elfsym = (elf_symbol_type *) symdef;
2585 break;
2586 }
2587 }
2588 }
2589 reloc_entry->addend
2590 += PPC64_LOCAL_ENTRY_OFFSET (elfsym->internal_elf_sym.st_other);
2591 }
2441e016
AM
2592 return bfd_reloc_continue;
2593}
2594
805fc799 2595static bfd_reloc_status_type
4ce794b7
AM
2596ppc64_elf_brtaken_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
2597 void *data, asection *input_section,
2598 bfd *output_bfd, char **error_message)
805fc799
AM
2599{
2600 long insn;
04c9666a 2601 enum elf_ppc64_reloc_type r_type;
805fc799 2602 bfd_size_type octets;
794e51c0
AM
2603 /* Assume 'at' branch hints. */
2604 bfd_boolean is_isa_v2 = TRUE;
805fc799
AM
2605
2606 /* If this is a relocatable link (output_bfd test tells us), just
2607 call the generic function. Any adjustment will be done at final
2608 link time. */
5bd4f169 2609 if (output_bfd != NULL)
cedb70c5 2610 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
805fc799
AM
2611 input_section, output_bfd, error_message);
2612
2613 octets = reloc_entry->address * bfd_octets_per_byte (abfd);
2614 insn = bfd_get_32 (abfd, (bfd_byte *) data + octets);
2615 insn &= ~(0x01 << 21);
4ce794b7 2616 r_type = reloc_entry->howto->type;
805fc799
AM
2617 if (r_type == R_PPC64_ADDR14_BRTAKEN
2618 || r_type == R_PPC64_REL14_BRTAKEN)
cedb70c5 2619 insn |= 0x01 << 21; /* 'y' or 't' bit, lowest bit of BO field. */
805fc799 2620
794e51c0 2621 if (is_isa_v2)
5bd4f169 2622 {
805fc799
AM
2623 /* Set 'a' bit. This is 0b00010 in BO field for branch
2624 on CR(BI) insns (BO == 001at or 011at), and 0b01000
2625 for branch on CTR insns (BO == 1a00t or 1a01t). */
2626 if ((insn & (0x14 << 21)) == (0x04 << 21))
2627 insn |= 0x02 << 21;
2628 else if ((insn & (0x14 << 21)) == (0x10 << 21))
2629 insn |= 0x08 << 21;
2630 else
2441e016 2631 goto out;
5bd4f169 2632 }
805fc799
AM
2633 else
2634 {
2635 bfd_vma target = 0;
2636 bfd_vma from;
5bd4f169 2637
805fc799
AM
2638 if (!bfd_is_com_section (symbol->section))
2639 target = symbol->value;
2640 target += symbol->section->output_section->vma;
2641 target += symbol->section->output_offset;
2642 target += reloc_entry->addend;
5bd4f169 2643
805fc799
AM
2644 from = (reloc_entry->address
2645 + input_section->output_offset
2646 + input_section->output_section->vma);
5bd4f169 2647
805fc799
AM
2648 /* Invert 'y' bit if not the default. */
2649 if ((bfd_signed_vma) (target - from) < 0)
2650 insn ^= 0x01 << 21;
2651 }
4ce794b7 2652 bfd_put_32 (abfd, insn, (bfd_byte *) data + octets);
2441e016
AM
2653 out:
2654 return ppc64_elf_branch_reloc (abfd, reloc_entry, symbol, data,
2655 input_section, output_bfd, error_message);
805fc799 2656}
5bd4f169 2657
805fc799 2658static bfd_reloc_status_type
4ce794b7
AM
2659ppc64_elf_sectoff_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
2660 void *data, asection *input_section,
2661 bfd *output_bfd, char **error_message)
805fc799
AM
2662{
2663 /* If this is a relocatable link (output_bfd test tells us), just
2664 call the generic function. Any adjustment will be done at final
2665 link time. */
2666 if (output_bfd != NULL)
cedb70c5 2667 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
805fc799 2668 input_section, output_bfd, error_message);
5bd4f169 2669
805fc799
AM
2670 /* Subtract the symbol section base address. */
2671 reloc_entry->addend -= symbol->section->output_section->vma;
5bd4f169
AM
2672 return bfd_reloc_continue;
2673}
2674
805fc799 2675static bfd_reloc_status_type
4ce794b7
AM
2676ppc64_elf_sectoff_ha_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
2677 void *data, asection *input_section,
2678 bfd *output_bfd, char **error_message)
805fc799
AM
2679{
2680 /* If this is a relocatable link (output_bfd test tells us), just
2681 call the generic function. Any adjustment will be done at final
2682 link time. */
2683 if (output_bfd != NULL)
cedb70c5 2684 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
805fc799
AM
2685 input_section, output_bfd, error_message);
2686
2687 /* Subtract the symbol section base address. */
2688 reloc_entry->addend -= symbol->section->output_section->vma;
2689
2690 /* Adjust the addend for sign extension of the low 16 bits. */
2691 reloc_entry->addend += 0x8000;
2692 return bfd_reloc_continue;
2693}
2694
2695static bfd_reloc_status_type
4ce794b7
AM
2696ppc64_elf_toc_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
2697 void *data, asection *input_section,
2698 bfd *output_bfd, char **error_message)
805fc799
AM
2699{
2700 bfd_vma TOCstart;
2701
2702 /* If this is a relocatable link (output_bfd test tells us), just
2703 call the generic function. Any adjustment will be done at final
2704 link time. */
2705 if (output_bfd != NULL)
cedb70c5 2706 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
805fc799
AM
2707 input_section, output_bfd, error_message);
2708
2709 TOCstart = _bfd_get_gp_value (input_section->output_section->owner);
2710 if (TOCstart == 0)
1c865ab2 2711 TOCstart = ppc64_elf_set_toc (NULL, input_section->output_section->owner);
805fc799
AM
2712
2713 /* Subtract the TOC base address. */
2714 reloc_entry->addend -= TOCstart + TOC_BASE_OFF;
2715 return bfd_reloc_continue;
2716}
2717
2718static bfd_reloc_status_type
4ce794b7
AM
2719ppc64_elf_toc_ha_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
2720 void *data, asection *input_section,
2721 bfd *output_bfd, char **error_message)
805fc799
AM
2722{
2723 bfd_vma TOCstart;
2724
2725 /* If this is a relocatable link (output_bfd test tells us), just
2726 call the generic function. Any adjustment will be done at final
2727 link time. */
2728 if (output_bfd != NULL)
cedb70c5 2729 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
805fc799
AM
2730 input_section, output_bfd, error_message);
2731
2732 TOCstart = _bfd_get_gp_value (input_section->output_section->owner);
2733 if (TOCstart == 0)
1c865ab2 2734 TOCstart = ppc64_elf_set_toc (NULL, input_section->output_section->owner);
805fc799
AM
2735
2736 /* Subtract the TOC base address. */
2737 reloc_entry->addend -= TOCstart + TOC_BASE_OFF;
2738
2739 /* Adjust the addend for sign extension of the low 16 bits. */
2740 reloc_entry->addend += 0x8000;
2741 return bfd_reloc_continue;
2742}
2743
2744static bfd_reloc_status_type
4ce794b7
AM
2745ppc64_elf_toc64_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
2746 void *data, asection *input_section,
2747 bfd *output_bfd, char **error_message)
805fc799
AM
2748{
2749 bfd_vma TOCstart;
2750 bfd_size_type octets;
2751
2752 /* If this is a relocatable link (output_bfd test tells us), just
2753 call the generic function. Any adjustment will be done at final
2754 link time. */
2755 if (output_bfd != NULL)
cedb70c5 2756 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
805fc799
AM
2757 input_section, output_bfd, error_message);
2758
2759 TOCstart = _bfd_get_gp_value (input_section->output_section->owner);
2760 if (TOCstart == 0)
1c865ab2 2761 TOCstart = ppc64_elf_set_toc (NULL, input_section->output_section->owner);
805fc799
AM
2762
2763 octets = reloc_entry->address * bfd_octets_per_byte (abfd);
2764 bfd_put_64 (abfd, TOCstart + TOC_BASE_OFF, (bfd_byte *) data + octets);
2765 return bfd_reloc_ok;
2766}
2767
2768static bfd_reloc_status_type
4ce794b7
AM
2769ppc64_elf_unhandled_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
2770 void *data, asection *input_section,
2771 bfd *output_bfd, char **error_message)
805fc799
AM
2772{
2773 /* If this is a relocatable link (output_bfd test tells us), just
2774 call the generic function. Any adjustment will be done at final
2775 link time. */
2776 if (output_bfd != NULL)
cedb70c5 2777 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
805fc799
AM
2778 input_section, output_bfd, error_message);
2779
2780 if (error_message != NULL)
2781 {
2782 static char buf[60];
2783 sprintf (buf, "generic linker can't handle %s",
2784 reloc_entry->howto->name);
2785 *error_message = buf;
2786 }
2787 return bfd_reloc_dangerous;
2788}
2789
927be08e
AM
2790/* Track GOT entries needed for a given symbol. We might need more
2791 than one got entry per symbol. */
2792struct got_entry
2793{
2794 struct got_entry *next;
2795
2796 /* The symbol addend that we'll be placing in the GOT. */
2797 bfd_vma addend;
2798
2799 /* Unlike other ELF targets, we use separate GOT entries for the same
2800 symbol referenced from different input files. This is to support
2801 automatic multiple TOC/GOT sections, where the TOC base can vary
2802 from one input file to another. After partitioning into TOC groups
2803 we merge entries within the group.
2804
2805 Point to the BFD owning this GOT entry. */
2806 bfd *owner;
2807
2808 /* Zero for non-tls entries, or TLS_TLS and one of TLS_GD, TLS_LD,
2809 TLS_TPREL or TLS_DTPREL for tls entries. */
f961d9dd 2810 unsigned char tls_type;
927be08e
AM
2811
2812 /* Non-zero if got.ent points to real entry. */
f961d9dd 2813 unsigned char is_indirect;
927be08e
AM
2814
2815 /* Reference count until size_dynamic_sections, GOT offset thereafter. */
2816 union
2817 {
2818 bfd_signed_vma refcount;
2819 bfd_vma offset;
2820 struct got_entry *ent;
2821 } got;
2822};
2823
2824/* The same for PLT. */
2825struct plt_entry
2826{
2827 struct plt_entry *next;
2828
2829 bfd_vma addend;
2830
2831 union
2832 {
2833 bfd_signed_vma refcount;
2834 bfd_vma offset;
2835 } plt;
2836};
2837
e717da7e
AM
2838struct ppc64_elf_obj_tdata
2839{
2840 struct elf_obj_tdata elf;
2841
2842 /* Shortcuts to dynamic linker sections. */
2843 asection *got;
2844 asection *relgot;
2845
b3fac117
AM
2846 /* Used during garbage collection. We attach global symbols defined
2847 on removed .opd entries to this section so that the sym is removed. */
2848 asection *deleted_section;
81688140 2849
927be08e 2850 /* TLS local dynamic got entry handling. Support for multiple GOT
e717da7e 2851 sections means we potentially need one of these for each input bfd. */
927be08e 2852 struct got_entry tlsld_got;
8860955f 2853
729eabd5
AM
2854 union {
2855 /* A copy of relocs before they are modified for --emit-relocs. */
2856 Elf_Internal_Rela *relocs;
2857
2858 /* Section contents. */
2859 bfd_byte *contents;
2860 } opd;
d77c8a4b
AM
2861
2862 /* Nonzero if this bfd has small toc/got relocs, ie. that expect
2863 the reloc to be in the range -32768 to 32767. */
98528052
AM
2864 unsigned int has_small_toc_reloc : 1;
2865
560c8763
AM
2866 /* Set if toc/got ha relocs detected not using r2, or lo reloc
2867 instruction not one we handle. */
2868 unsigned int unexpected_toc_insn : 1;
e717da7e
AM
2869};
2870
2871#define ppc64_elf_tdata(bfd) \
2872 ((struct ppc64_elf_obj_tdata *) (bfd)->tdata.any)
2873
2874#define ppc64_tlsld_got(bfd) \
2875 (&ppc64_elf_tdata (bfd)->tlsld_got)
2876
0c8d6e5c
AM
2877#define is_ppc64_elf(bfd) \
2878 (bfd_get_flavour (bfd) == bfd_target_elf_flavour \
4dfe6ac6 2879 && elf_object_id (bfd) == PPC64_ELF_DATA)
0c8d6e5c 2880
e717da7e
AM
2881/* Override the generic function because we store some extras. */
2882
2883static bfd_boolean
2884ppc64_elf_mkobject (bfd *abfd)
2885{
0ffa91dd 2886 return bfd_elf_allocate_object (abfd, sizeof (struct ppc64_elf_obj_tdata),
4dfe6ac6 2887 PPC64_ELF_DATA);
e717da7e
AM
2888}
2889
feee612b 2890/* Fix bad default arch selected for a 64 bit input bfd when the
14b57c7c 2891 default is 32 bit. Also select arch based on apuinfo. */
feee612b 2892
b34976b6 2893static bfd_boolean
4ce794b7 2894ppc64_elf_object_p (bfd *abfd)
feee612b 2895{
14b57c7c
AM
2896 if (!abfd->arch_info->the_default)
2897 return TRUE;
2898
2899 if (abfd->arch_info->bits_per_word == 32)
feee612b
AM
2900 {
2901 Elf_Internal_Ehdr *i_ehdr = elf_elfheader (abfd);
2902
2903 if (i_ehdr->e_ident[EI_CLASS] == ELFCLASS64)
2904 {
2905 /* Relies on arch after 32 bit default being 64 bit default. */
2906 abfd->arch_info = abfd->arch_info->next;
2907 BFD_ASSERT (abfd->arch_info->bits_per_word == 64);
2908 }
2909 }
14b57c7c 2910 return _bfd_elf_ppc_set_arch (abfd);
feee612b
AM
2911}
2912
d37c89e5
AM
2913/* Support for core dump NOTE sections. */
2914
2915static bfd_boolean
2916ppc64_elf_grok_prstatus (bfd *abfd, Elf_Internal_Note *note)
2917{
eea6121a 2918 size_t offset, size;
d37c89e5
AM
2919
2920 if (note->descsz != 504)
2921 return FALSE;
2922
2923 /* pr_cursig */
228e534f 2924 elf_tdata (abfd)->core->signal = bfd_get_16 (abfd, note->descdata + 12);
d37c89e5
AM
2925
2926 /* pr_pid */
228e534f 2927 elf_tdata (abfd)->core->lwpid = bfd_get_32 (abfd, note->descdata + 32);
d37c89e5
AM
2928
2929 /* pr_reg */
2930 offset = 112;
eea6121a 2931 size = 384;
d37c89e5
AM
2932
2933 /* Make a ".reg/999" section. */
2934 return _bfd_elfcore_make_pseudosection (abfd, ".reg",
eea6121a 2935 size, note->descpos + offset);
d37c89e5
AM
2936}
2937
2938static bfd_boolean
2939ppc64_elf_grok_psinfo (bfd *abfd, Elf_Internal_Note *note)
2940{
2941 if (note->descsz != 136)
2942 return FALSE;
2943
228e534f 2944 elf_tdata (abfd)->core->pid
bc989cdc 2945 = bfd_get_32 (abfd, note->descdata + 24);
228e534f 2946 elf_tdata (abfd)->core->program
d37c89e5 2947 = _bfd_elfcore_strndup (abfd, note->descdata + 40, 16);
228e534f 2948 elf_tdata (abfd)->core->command
d37c89e5
AM
2949 = _bfd_elfcore_strndup (abfd, note->descdata + 56, 80);
2950
2951 return TRUE;
2952}
2953
183e98be
AM
2954static char *
2955ppc64_elf_write_core_note (bfd *abfd, char *buf, int *bufsiz, int note_type,
2956 ...)
2957{
2958 switch (note_type)
2959 {
2960 default:
2961 return NULL;
2962
2963 case NT_PRPSINFO:
2964 {
2965 char data[136];
2966 va_list ap;
2967
2968 va_start (ap, note_type);
75cd47ed 2969 memset (data, 0, sizeof (data));
183e98be
AM
2970 strncpy (data + 40, va_arg (ap, const char *), 16);
2971 strncpy (data + 56, va_arg (ap, const char *), 80);
2972 va_end (ap);
2973 return elfcore_write_note (abfd, buf, bufsiz,
2974 "CORE", note_type, data, sizeof (data));
2975 }
2976
2977 case NT_PRSTATUS:
2978 {
2979 char data[504];
2980 va_list ap;
2981 long pid;
2982 int cursig;
2983 const void *greg;
2984
2985 va_start (ap, note_type);
2986 memset (data, 0, 112);
2987 pid = va_arg (ap, long);
2988 bfd_put_32 (abfd, pid, data + 32);
2989 cursig = va_arg (ap, int);
2990 bfd_put_16 (abfd, cursig, data + 12);
2991 greg = va_arg (ap, const void *);
2992 memcpy (data + 112, greg, 384);
2993 memset (data + 496, 0, 8);
2994 va_end (ap);
2995 return elfcore_write_note (abfd, buf, bufsiz,
2996 "CORE", note_type, data, sizeof (data));
2997 }
2998 }
2999}
3000
5d35169e
AM
3001/* Add extra PPC sections. */
3002
b35d266b 3003static const struct bfd_elf_special_section ppc64_elf_special_sections[]=
7f4d3958 3004{
0112cd26
NC
3005 { STRING_COMMA_LEN (".plt"), 0, SHT_NOBITS, 0 },
3006 { STRING_COMMA_LEN (".sbss"), -2, SHT_NOBITS, SHF_ALLOC + SHF_WRITE },
3007 { STRING_COMMA_LEN (".sdata"), -2, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE },
3008 { STRING_COMMA_LEN (".toc"), 0, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE },
3009 { STRING_COMMA_LEN (".toc1"), 0, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE },
3010 { STRING_COMMA_LEN (".tocbss"), 0, SHT_NOBITS, SHF_ALLOC + SHF_WRITE },
3011 { NULL, 0, 0, 0, 0 }
5d35169e
AM
3012};
3013
7c8fe5c4
AM
3014enum _ppc64_sec_type {
3015 sec_normal = 0,
3016 sec_opd = 1,
3017 sec_toc = 2
3018};
3019
f0abc2a1
AM
3020struct _ppc64_elf_section_data
3021{
3022 struct bfd_elf_section_data elf;
411e1bfb 3023
f0abc2a1
AM
3024 union
3025 {
51aecdc5
AM
3026 /* An array with one entry for each opd function descriptor,
3027 and some spares since opd entries may be either 16 or 24 bytes. */
3028#define OPD_NDX(OFF) ((OFF) >> 4)
74f0fb50
AM
3029 struct _opd_sec_data
3030 {
3031 /* Points to the function code section for local opd entries. */
3032 asection **func_sec;
3033
3034 /* After editing .opd, adjust references to opd local syms. */
3035 long *adjust;
3036 } opd;
7c8fe5c4 3037
3a71aa26
AM
3038 /* An array for toc sections, indexed by offset/8. */
3039 struct _toc_sec_data
3040 {
3041 /* Specifies the relocation symbol index used at a given toc offset. */
3042 unsigned *symndx;
3043
3044 /* And the relocation addend. */
3045 bfd_vma *add;
3046 } toc;
7c8fe5c4
AM
3047 } u;
3048
3049 enum _ppc64_sec_type sec_type:2;
411e1bfb 3050
7c8fe5c4
AM
3051 /* Flag set when small branches are detected. Used to
3052 select suitable defaults for the stub group size. */
3053 unsigned int has_14bit_branch:1;
f0abc2a1
AM
3054};
3055
3056#define ppc64_elf_section_data(sec) \
411e1bfb 3057 ((struct _ppc64_elf_section_data *) elf_section_data (sec))
f0abc2a1
AM
3058
3059static bfd_boolean
4ce794b7 3060ppc64_elf_new_section_hook (bfd *abfd, asection *sec)
f0abc2a1 3061{
f592407e
AM
3062 if (!sec->used_by_bfd)
3063 {
3064 struct _ppc64_elf_section_data *sdata;
3065 bfd_size_type amt = sizeof (*sdata);
f0abc2a1 3066
f592407e
AM
3067 sdata = bfd_zalloc (abfd, amt);
3068 if (sdata == NULL)
3069 return FALSE;
3070 sec->used_by_bfd = sdata;
3071 }
f0abc2a1
AM
3072
3073 return _bfd_elf_new_section_hook (abfd, sec);
3074}
4025353c 3075
74f0fb50 3076static struct _opd_sec_data *
4025353c
AM
3077get_opd_info (asection * sec)
3078{
3079 if (sec != NULL
3080 && ppc64_elf_section_data (sec) != NULL
7c8fe5c4 3081 && ppc64_elf_section_data (sec)->sec_type == sec_opd)
74f0fb50 3082 return &ppc64_elf_section_data (sec)->u.opd;
4025353c
AM
3083 return NULL;
3084}
90e3cdf2
JJ
3085\f
3086/* Parameters for the qsort hook. */
90e3cdf2
JJ
3087static bfd_boolean synthetic_relocatable;
3088
699733f6 3089/* qsort comparison function for ppc64_elf_get_synthetic_symtab. */
90e3cdf2
JJ
3090
3091static int
3092compare_symbols (const void *ap, const void *bp)
3093{
3094 const asymbol *a = * (const asymbol **) ap;
3095 const asymbol *b = * (const asymbol **) bp;
3096
699733f6
AM
3097 /* Section symbols first. */
3098 if ((a->flags & BSF_SECTION_SYM) && !(b->flags & BSF_SECTION_SYM))
90e3cdf2 3099 return -1;
699733f6 3100 if (!(a->flags & BSF_SECTION_SYM) && (b->flags & BSF_SECTION_SYM))
90e3cdf2
JJ
3101 return 1;
3102
699733f6 3103 /* then .opd symbols. */
ffcfec52
AM
3104 if (strcmp (a->section->name, ".opd") == 0
3105 && strcmp (b->section->name, ".opd") != 0)
90e3cdf2 3106 return -1;
ffcfec52
AM
3107 if (strcmp (a->section->name, ".opd") != 0
3108 && strcmp (b->section->name, ".opd") == 0)
90e3cdf2
JJ
3109 return 1;
3110
699733f6 3111 /* then other code symbols. */
90e3cdf2
JJ
3112 if ((a->section->flags & (SEC_CODE | SEC_ALLOC | SEC_THREAD_LOCAL))
3113 == (SEC_CODE | SEC_ALLOC)
3114 && (b->section->flags & (SEC_CODE | SEC_ALLOC | SEC_THREAD_LOCAL))
3115 != (SEC_CODE | SEC_ALLOC))
3116 return -1;
3117
3118 if ((a->section->flags & (SEC_CODE | SEC_ALLOC | SEC_THREAD_LOCAL))
3119 != (SEC_CODE | SEC_ALLOC)
3120 && (b->section->flags & (SEC_CODE | SEC_ALLOC | SEC_THREAD_LOCAL))
3121 == (SEC_CODE | SEC_ALLOC))
3122 return 1;
3123
3124 if (synthetic_relocatable)
3125 {
3126 if (a->section->id < b->section->id)
3127 return -1;
3128
3129 if (a->section->id > b->section->id)
3130 return 1;
3131 }
3132
3133 if (a->value + a->section->vma < b->value + b->section->vma)
3134 return -1;
3135
3136 if (a->value + a->section->vma > b->value + b->section->vma)
3137 return 1;
3138
4d35a0aa
AM
3139 /* For syms with the same value, prefer strong dynamic global function
3140 syms over other syms. */
3141 if ((a->flags & BSF_GLOBAL) != 0 && (b->flags & BSF_GLOBAL) == 0)
3142 return -1;
3143
3144 if ((a->flags & BSF_GLOBAL) == 0 && (b->flags & BSF_GLOBAL) != 0)
3145 return 1;
3146
3147 if ((a->flags & BSF_FUNCTION) != 0 && (b->flags & BSF_FUNCTION) == 0)
3148 return -1;
3149
3150 if ((a->flags & BSF_FUNCTION) == 0 && (b->flags & BSF_FUNCTION) != 0)
3151 return 1;
3152
3153 if ((a->flags & BSF_WEAK) == 0 && (b->flags & BSF_WEAK) != 0)
3154 return -1;
3155
3156 if ((a->flags & BSF_WEAK) != 0 && (b->flags & BSF_WEAK) == 0)
3157 return 1;
3158
3159 if ((a->flags & BSF_DYNAMIC) != 0 && (b->flags & BSF_DYNAMIC) == 0)
3160 return -1;
3161
3162 if ((a->flags & BSF_DYNAMIC) == 0 && (b->flags & BSF_DYNAMIC) != 0)
3163 return 1;
3164
90e3cdf2
JJ
3165 return 0;
3166}
3167
699733f6 3168/* Search SYMS for a symbol of the given VALUE. */
90e3cdf2 3169
699733f6 3170static asymbol *
7292b3ac 3171sym_exists_at (asymbol **syms, long lo, long hi, unsigned int id, bfd_vma value)
90e3cdf2 3172{
699733f6 3173 long mid;
90e3cdf2 3174
7292b3ac 3175 if (id == (unsigned) -1)
699733f6
AM
3176 {
3177 while (lo < hi)
3178 {
3179 mid = (lo + hi) >> 1;
3180 if (syms[mid]->value + syms[mid]->section->vma < value)
3181 lo = mid + 1;
3182 else if (syms[mid]->value + syms[mid]->section->vma > value)
3183 hi = mid;
3184 else
3185 return syms[mid];
3186 }
3187 }
3188 else
3189 {
3190 while (lo < hi)
3191 {
3192 mid = (lo + hi) >> 1;
3193 if (syms[mid]->section->id < id)
3194 lo = mid + 1;
3195 else if (syms[mid]->section->id > id)
3196 hi = mid;
3197 else if (syms[mid]->value < value)
3198 lo = mid + 1;
3199 else if (syms[mid]->value > value)
3200 hi = mid;
3201 else
3202 return syms[mid];
3203 }
3204 }
3205 return NULL;
90e3cdf2
JJ
3206}
3207
468392fb
AM
3208static bfd_boolean
3209section_covers_vma (bfd *abfd ATTRIBUTE_UNUSED, asection *section, void *ptr)
3210{
3211 bfd_vma vma = *(bfd_vma *) ptr;
3212 return ((section->flags & SEC_ALLOC) != 0
3213 && section->vma <= vma
3214 && vma < section->vma + section->size);
3215}
3216
699733f6 3217/* Create synthetic symbols, effectively restoring "dot-symbol" function
c4b0b099
AM
3218 entry syms. Also generate @plt symbols for the glink branch table.
3219 Returns count of synthetic symbols in RET or -1 on error. */
90e3cdf2
JJ
3220
3221static long
a7535cf3
AM
3222ppc64_elf_get_synthetic_symtab (bfd *abfd,
3223 long static_count, asymbol **static_syms,
3224 long dyn_count, asymbol **dyn_syms,
c9727e01 3225 asymbol **ret)
90e3cdf2
JJ
3226{
3227 asymbol *s;
699733f6
AM
3228 long i;
3229 long count;
90e3cdf2 3230 char *names;
a7535cf3 3231 long symcount, codesecsym, codesecsymend, secsymend, opdsymend;
ee67d69a 3232 asection *opd = NULL;
90e3cdf2 3233 bfd_boolean relocatable = (abfd->flags & (EXEC_P | DYNAMIC)) == 0;
a7535cf3 3234 asymbol **syms;
ee67d69a 3235 int abi = abiversion (abfd);
90e3cdf2
JJ
3236
3237 *ret = NULL;
3238
ee67d69a
AM
3239 if (abi < 2)
3240 {
3241 opd = bfd_get_section_by_name (abfd, ".opd");
3242 if (opd == NULL && abi == 1)
3243 return 0;
3244 }
90e3cdf2 3245
a7535cf3 3246 symcount = static_count;
c9727e01 3247 if (!relocatable)
a7535cf3 3248 symcount += dyn_count;
90e3cdf2 3249 if (symcount == 0)
c9727e01 3250 return 0;
90e3cdf2 3251
a7535cf3
AM
3252 syms = bfd_malloc ((symcount + 1) * sizeof (*syms));
3253 if (syms == NULL)
7356fed5 3254 return -1;
a7535cf3
AM
3255
3256 if (!relocatable && static_count != 0 && dyn_count != 0)
3257 {
3258 /* Use both symbol tables. */
3259 memcpy (syms, static_syms, static_count * sizeof (*syms));
3260 memcpy (syms + static_count, dyn_syms, (dyn_count + 1) * sizeof (*syms));
3261 }
3262 else if (!relocatable && static_count == 0)
3263 memcpy (syms, dyn_syms, (symcount + 1) * sizeof (*syms));
3264 else
3265 memcpy (syms, static_syms, (symcount + 1) * sizeof (*syms));
3266
90e3cdf2 3267 synthetic_relocatable = relocatable;
595da8c5 3268 qsort (syms, symcount, sizeof (*syms), compare_symbols);
90e3cdf2 3269
c9727e01
AM
3270 if (!relocatable && symcount > 1)
3271 {
3272 long j;
3273 /* Trim duplicate syms, since we may have merged the normal and
3274 dynamic symbols. Actually, we only care about syms that have
3b36f7e6 3275 different values, so trim any with the same value. */
c9727e01
AM
3276 for (i = 1, j = 1; i < symcount; ++i)
3277 if (syms[i - 1]->value + syms[i - 1]->section->vma
3278 != syms[i]->value + syms[i]->section->vma)
3279 syms[j++] = syms[i];
3280 symcount = j;
3281 }
3282
699733f6 3283 i = 0;
ffcfec52 3284 if (strcmp (syms[i]->section->name, ".opd") == 0)
699733f6
AM
3285 ++i;
3286 codesecsym = i;
90e3cdf2 3287
699733f6
AM
3288 for (; i < symcount; ++i)
3289 if (((syms[i]->section->flags & (SEC_CODE | SEC_ALLOC | SEC_THREAD_LOCAL))
3290 != (SEC_CODE | SEC_ALLOC))
3291 || (syms[i]->flags & BSF_SECTION_SYM) == 0)
3292 break;
3293 codesecsymend = i;
90e3cdf2 3294
699733f6
AM
3295 for (; i < symcount; ++i)
3296 if ((syms[i]->flags & BSF_SECTION_SYM) == 0)
3297 break;
3298 secsymend = i;
90e3cdf2 3299
699733f6 3300 for (; i < symcount; ++i)
ffcfec52 3301 if (strcmp (syms[i]->section->name, ".opd") != 0)
699733f6
AM
3302 break;
3303 opdsymend = i;
90e3cdf2 3304
699733f6
AM
3305 for (; i < symcount; ++i)
3306 if ((syms[i]->section->flags & (SEC_CODE | SEC_ALLOC | SEC_THREAD_LOCAL))
3307 != (SEC_CODE | SEC_ALLOC))
3308 break;
3309 symcount = i;
3310
c9727e01 3311 count = 0;
90e3cdf2 3312
699733f6 3313 if (relocatable)
90e3cdf2 3314 {
699733f6
AM
3315 bfd_boolean (*slurp_relocs) (bfd *, asection *, asymbol **, bfd_boolean);
3316 arelent *r;
3317 size_t size;
3318 long relcount;
90e3cdf2 3319
468392fb
AM
3320 if (opdsymend == secsymend)
3321 goto done;
3322
699733f6 3323 slurp_relocs = get_elf_backend_data (abfd)->s->slurp_reloc_table;
90e3cdf2 3324 relcount = (opd->flags & SEC_RELOC) ? opd->reloc_count : 0;
7356fed5 3325 if (relcount == 0)
c9727e01 3326 goto done;
90e3cdf2 3327
7356fed5
AM
3328 if (!(*slurp_relocs) (abfd, opd, static_syms, FALSE))
3329 {
3330 count = -1;
3331 goto done;
3332 }
3333
699733f6 3334 size = 0;
595da8c5 3335 for (i = secsymend, r = opd->relocation; i < opdsymend; ++i)
699733f6
AM
3336 {
3337 asymbol *sym;
90e3cdf2 3338
595da8c5 3339 while (r < opd->relocation + relcount
699733f6
AM
3340 && r->address < syms[i]->value + opd->vma)
3341 ++r;
90e3cdf2 3342
595da8c5 3343 if (r == opd->relocation + relcount)
699733f6 3344 break;
90e3cdf2 3345
699733f6
AM
3346 if (r->address != syms[i]->value + opd->vma)
3347 continue;
90e3cdf2 3348
699733f6
AM
3349 if (r->howto->type != R_PPC64_ADDR64)
3350 continue;
90e3cdf2 3351
699733f6
AM
3352 sym = *r->sym_ptr_ptr;
3353 if (!sym_exists_at (syms, opdsymend, symcount,
3354 sym->section->id, sym->value + r->addend))
3355 {
3356 ++count;
3357 size += sizeof (asymbol);
3358 size += strlen (syms[i]->name) + 2;
3359 }
3360 }
90e3cdf2 3361
c4b0b099
AM
3362 if (size == 0)
3363 goto done;
699733f6
AM
3364 s = *ret = bfd_malloc (size);
3365 if (s == NULL)
3366 {
7356fed5 3367 count = -1;
c9727e01 3368 goto done;
699733f6 3369 }
90e3cdf2 3370
699733f6 3371 names = (char *) (s + count);
90e3cdf2 3372
595da8c5 3373 for (i = secsymend, r = opd->relocation; i < opdsymend; ++i)
90e3cdf2 3374 {
699733f6 3375 asymbol *sym;
90e3cdf2 3376
595da8c5 3377 while (r < opd->relocation + relcount
699733f6
AM
3378 && r->address < syms[i]->value + opd->vma)
3379 ++r;
90e3cdf2 3380
595da8c5 3381 if (r == opd->relocation + relcount)
699733f6
AM
3382 break;
3383
3384 if (r->address != syms[i]->value + opd->vma)
3385 continue;
3386
3387 if (r->howto->type != R_PPC64_ADDR64)
3388 continue;
90e3cdf2 3389
699733f6
AM
3390 sym = *r->sym_ptr_ptr;
3391 if (!sym_exists_at (syms, opdsymend, symcount,
3392 sym->section->id, sym->value + r->addend))
3393 {
3394 size_t len;
3395
3396 *s = *syms[i];
6ba2a415 3397 s->flags |= BSF_SYNTHETIC;
699733f6
AM
3398 s->section = sym->section;
3399 s->value = sym->value + r->addend;
3400 s->name = names;
3401 *names++ = '.';
3402 len = strlen (syms[i]->name);
3403 memcpy (names, syms[i]->name, len + 1);
3404 names += len + 1;
6f610d07
UW
3405 /* Have udata.p point back to the original symbol this
3406 synthetic symbol was derived from. */
3407 s->udata.p = syms[i];
699733f6
AM
3408 s++;
3409 }
3410 }
3411 }
3412 else
90e3cdf2 3413 {
468392fb 3414 bfd_boolean (*slurp_relocs) (bfd *, asection *, asymbol **, bfd_boolean);
ee67d69a 3415 bfd_byte *contents = NULL;
699733f6 3416 size_t size;
468392fb
AM
3417 long plt_count = 0;
3418 bfd_vma glink_vma = 0, resolv_vma = 0;
3419 asection *dynamic, *glink = NULL, *relplt = NULL;
3420 arelent *p;
90e3cdf2 3421
ee67d69a 3422 if (opd != NULL && !bfd_malloc_and_get_section (abfd, opd, &contents))
699733f6 3423 {
c4b0b099
AM
3424 free_contents_and_exit_err:
3425 count = -1;
ee67d69a 3426 free_contents_and_exit:
699733f6 3427 if (contents)
ee67d69a 3428 free (contents);
c9727e01 3429 goto done;
699733f6 3430 }
90e3cdf2 3431
699733f6
AM
3432 size = 0;
3433 for (i = secsymend; i < opdsymend; ++i)
3434 {
3435 bfd_vma ent;
90e3cdf2 3436
5ef11c02
AM
3437 /* Ignore bogus symbols. */
3438 if (syms[i]->value > opd->size - 8)
3439 continue;
3440
699733f6
AM
3441 ent = bfd_get_64 (abfd, contents + syms[i]->value);
3442 if (!sym_exists_at (syms, opdsymend, symcount, -1, ent))
3443 {
3444 ++count;
3445 size += sizeof (asymbol);
3446 size += strlen (syms[i]->name) + 2;
3447 }
3448 }
90e3cdf2 3449
468392fb 3450 /* Get start of .glink stubs from DT_PPC64_GLINK. */
066ee829
AM
3451 if (dyn_count != 0
3452 && (dynamic = bfd_get_section_by_name (abfd, ".dynamic")) != NULL)
468392fb
AM
3453 {
3454 bfd_byte *dynbuf, *extdyn, *extdynend;
3455 size_t extdynsize;
3456 void (*swap_dyn_in) (bfd *, const void *, Elf_Internal_Dyn *);
3457
3458 if (!bfd_malloc_and_get_section (abfd, dynamic, &dynbuf))
c4b0b099 3459 goto free_contents_and_exit_err;
468392fb
AM
3460
3461 extdynsize = get_elf_backend_data (abfd)->s->sizeof_dyn;
3462 swap_dyn_in = get_elf_backend_data (abfd)->s->swap_dyn_in;
3463
3464 extdyn = dynbuf;
3465 extdynend = extdyn + dynamic->size;
3466 for (; extdyn < extdynend; extdyn += extdynsize)
3467 {
3468 Elf_Internal_Dyn dyn;
3469 (*swap_dyn_in) (abfd, extdyn, &dyn);
3470
3471 if (dyn.d_tag == DT_NULL)
3472 break;
3473
3474 if (dyn.d_tag == DT_PPC64_GLINK)
3475 {
b9e5796b
AM
3476 /* The first glink stub starts at offset 32; see
3477 comment in ppc64_elf_finish_dynamic_sections. */
3478 glink_vma = dyn.d_un.d_val + GLINK_CALL_STUB_SIZE - 8 * 4;
468392fb
AM
3479 /* The .glink section usually does not survive the final
3480 link; search for the section (usually .text) where the
3481 glink stubs now reside. */
3482 glink = bfd_sections_find_if (abfd, section_covers_vma,
3483 &glink_vma);
3484 break;
3485 }
3486 }
3487
3488 free (dynbuf);
3489 }
3490
3491 if (glink != NULL)
3492 {
3493 /* Determine __glink trampoline by reading the relative branch
3494 from the first glink stub. */
3495 bfd_byte buf[4];
b9e5796b
AM
3496 unsigned int off = 0;
3497
3498 while (bfd_get_section_contents (abfd, glink, buf,
3499 glink_vma + off - glink->vma, 4))
468392fb
AM
3500 {
3501 unsigned int insn = bfd_get_32 (abfd, buf);
3502 insn ^= B_DOT;
3503 if ((insn & ~0x3fffffc) == 0)
b9e5796b
AM
3504 {
3505 resolv_vma = glink_vma + off + (insn ^ 0x2000000) - 0x2000000;
3506 break;
3507 }
3508 off += 4;
3509 if (off > 4)
3510 break;
468392fb
AM
3511 }
3512
3513 if (resolv_vma)
3514 size += sizeof (asymbol) + sizeof ("__glink_PLTresolve");
468392fb 3515
066ee829
AM
3516 relplt = bfd_get_section_by_name (abfd, ".rela.plt");
3517 if (relplt != NULL)
3518 {
3519 slurp_relocs = get_elf_backend_data (abfd)->s->slurp_reloc_table;
3520 if (! (*slurp_relocs) (abfd, relplt, dyn_syms, TRUE))
c4b0b099 3521 goto free_contents_and_exit_err;
68ffbac6 3522
066ee829
AM
3523 plt_count = relplt->size / sizeof (Elf64_External_Rela);
3524 size += plt_count * sizeof (asymbol);
468392fb 3525
066ee829
AM
3526 p = relplt->relocation;
3527 for (i = 0; i < plt_count; i++, p++)
e054468f
AM
3528 {
3529 size += strlen ((*p->sym_ptr_ptr)->name) + sizeof ("@plt");
3530 if (p->addend != 0)
3531 size += sizeof ("+0x") - 1 + 16;
3532 }
066ee829 3533 }
468392fb
AM
3534 }
3535
c4b0b099
AM
3536 if (size == 0)
3537 goto free_contents_and_exit;
699733f6
AM
3538 s = *ret = bfd_malloc (size);
3539 if (s == NULL)
c4b0b099 3540 goto free_contents_and_exit_err;
90e3cdf2 3541
468392fb 3542 names = (char *) (s + count + plt_count + (resolv_vma != 0));
90e3cdf2 3543
699733f6 3544 for (i = secsymend; i < opdsymend; ++i)
90e3cdf2 3545 {
699733f6 3546 bfd_vma ent;
90e3cdf2 3547
5ef11c02
AM
3548 if (syms[i]->value > opd->size - 8)
3549 continue;
3550
699733f6
AM
3551 ent = bfd_get_64 (abfd, contents + syms[i]->value);
3552 if (!sym_exists_at (syms, opdsymend, symcount, -1, ent))
90e3cdf2 3553 {
c9727e01 3554 long lo, hi;
699733f6 3555 size_t len;
c9727e01 3556 asection *sec = abfd->sections;
90e3cdf2 3557
699733f6
AM
3558 *s = *syms[i];
3559 lo = codesecsym;
3560 hi = codesecsymend;
3561 while (lo < hi)
3562 {
c9727e01 3563 long mid = (lo + hi) >> 1;
699733f6
AM
3564 if (syms[mid]->section->vma < ent)
3565 lo = mid + 1;
3566 else if (syms[mid]->section->vma > ent)
3567 hi = mid;
3568 else
c9727e01
AM
3569 {
3570 sec = syms[mid]->section;
3571 break;
3572 }
699733f6
AM
3573 }
3574
c9727e01 3575 if (lo >= hi && lo > codesecsym)
699733f6 3576 sec = syms[lo - 1]->section;
699733f6
AM
3577
3578 for (; sec != NULL; sec = sec->next)
3579 {
3580 if (sec->vma > ent)
3581 break;
63524580
JK
3582 /* SEC_LOAD may not be set if SEC is from a separate debug
3583 info file. */
3584 if ((sec->flags & SEC_ALLOC) == 0)
699733f6
AM
3585 break;
3586 if ((sec->flags & SEC_CODE) != 0)
3587 s->section = sec;
3588 }
6ba2a415 3589 s->flags |= BSF_SYNTHETIC;
699733f6
AM
3590 s->value = ent - s->section->vma;
3591 s->name = names;
3592 *names++ = '.';
3593 len = strlen (syms[i]->name);
3594 memcpy (names, syms[i]->name, len + 1);
3595 names += len + 1;
6f610d07
UW
3596 /* Have udata.p point back to the original symbol this
3597 synthetic symbol was derived from. */
3598 s->udata.p = syms[i];
699733f6 3599 s++;
90e3cdf2 3600 }
90e3cdf2 3601 }
699733f6 3602 free (contents);
468392fb
AM
3603
3604 if (glink != NULL && relplt != NULL)
3605 {
3606 if (resolv_vma)
3607 {
3608 /* Add a symbol for the main glink trampoline. */
86a4952b 3609 memset (s, 0, sizeof *s);
468392fb 3610 s->the_bfd = abfd;
6ba2a415 3611 s->flags = BSF_GLOBAL | BSF_SYNTHETIC;
468392fb
AM
3612 s->section = glink;
3613 s->value = resolv_vma - glink->vma;
3614 s->name = names;
3615 memcpy (names, "__glink_PLTresolve", sizeof ("__glink_PLTresolve"));
3616 names += sizeof ("__glink_PLTresolve");
3617 s++;
3618 count++;
3619 }
3620
3621 /* FIXME: It would be very much nicer to put sym@plt on the
3622 stub rather than on the glink branch table entry. The
3623 objdump disassembler would then use a sensible symbol
3624 name on plt calls. The difficulty in doing so is
3625 a) finding the stubs, and,
3626 b) matching stubs against plt entries, and,
3627 c) there can be multiple stubs for a given plt entry.
3628
3629 Solving (a) could be done by code scanning, but older
3630 ppc64 binaries used different stubs to current code.
3631 (b) is the tricky one since you need to known the toc
3632 pointer for at least one function that uses a pic stub to
3633 be able to calculate the plt address referenced.
3634 (c) means gdb would need to set multiple breakpoints (or
3635 find the glink branch itself) when setting breakpoints
3636 for pending shared library loads. */
3637 p = relplt->relocation;
3638 for (i = 0; i < plt_count; i++, p++)
3639 {
3640 size_t len;
3641
3642 *s = **p->sym_ptr_ptr;
3643 /* Undefined syms won't have BSF_LOCAL or BSF_GLOBAL set. Since
3644 we are defining a symbol, ensure one of them is set. */
3645 if ((s->flags & BSF_LOCAL) == 0)
3646 s->flags |= BSF_GLOBAL;
6ba2a415 3647 s->flags |= BSF_SYNTHETIC;
468392fb
AM
3648 s->section = glink;
3649 s->value = glink_vma - glink->vma;
3650 s->name = names;
3651 s->udata.p = NULL;
3652 len = strlen ((*p->sym_ptr_ptr)->name);
3653 memcpy (names, (*p->sym_ptr_ptr)->name, len);
3654 names += len;
e054468f
AM
3655 if (p->addend != 0)
3656 {
3657 memcpy (names, "+0x", sizeof ("+0x") - 1);
3658 names += sizeof ("+0x") - 1;
3659 bfd_sprintf_vma (abfd, names, p->addend);
3660 names += strlen (names);
3661 }
468392fb
AM
3662 memcpy (names, "@plt", sizeof ("@plt"));
3663 names += sizeof ("@plt");
3664 s++;
b9e5796b
AM
3665 if (abi < 2)
3666 {
3667 glink_vma += 8;
3668 if (i >= 0x8000)
3669 glink_vma += 4;
3670 }
3671 else
468392fb
AM
3672 glink_vma += 4;
3673 }
3674 count += plt_count;
3675 }
90e3cdf2
JJ
3676 }
3677
c9727e01 3678 done:
a7535cf3 3679 free (syms);
90e3cdf2
JJ
3680 return count;
3681}
5bd4f169 3682\f
65f38f15
AM
3683/* The following functions are specific to the ELF linker, while
3684 functions above are used generally. Those named ppc64_elf_* are
3685 called by the main ELF linker code. They appear in this file more
3686 or less in the order in which they are called. eg.
3687 ppc64_elf_check_relocs is called early in the link process,
3688 ppc64_elf_finish_dynamic_sections is one of the last functions
e86ce104
AM
3689 called.
3690
3691 PowerPC64-ELF uses a similar scheme to PowerPC64-XCOFF in that
3692 functions have both a function code symbol and a function descriptor
3693 symbol. A call to foo in a relocatable object file looks like:
3694
3695 . .text
3696 . x:
3697 . bl .foo
3698 . nop
3699
3700 The function definition in another object file might be:
3701
3702 . .section .opd
3703 . foo: .quad .foo
3704 . .quad .TOC.@tocbase
3705 . .quad 0
3706 .
3707 . .text
3708 . .foo: blr
3709
3710 When the linker resolves the call during a static link, the branch
3711 unsurprisingly just goes to .foo and the .opd information is unused.
3712 If the function definition is in a shared library, things are a little
3713 different: The call goes via a plt call stub, the opd information gets
3714 copied to the plt, and the linker patches the nop.
3715
3716 . x:
3717 . bl .foo_stub
3718 . ld 2,40(1)
3719 .
3720 .
3721 . .foo_stub:
71a39c98
AM
3722 . std 2,40(1) # in practice, the call stub
3723 . addis 11,2,Lfoo@toc@ha # is slightly optimized, but
3724 . addi 11,11,Lfoo@toc@l # this is the general idea
3725 . ld 12,0(11)
3726 . ld 2,8(11)
3727 . mtctr 12
3728 . ld 11,16(11)
e86ce104
AM
3729 . bctr
3730 .
3731 . .section .plt
3732 . Lfoo: reloc (R_PPC64_JMP_SLOT, foo)
3733
3734 The "reloc ()" notation is supposed to indicate that the linker emits
3735 an R_PPC64_JMP_SLOT reloc against foo. The dynamic linker does the opd
3736 copying.
3737
3738 What are the difficulties here? Well, firstly, the relocations
3739 examined by the linker in check_relocs are against the function code
3740 sym .foo, while the dynamic relocation in the plt is emitted against
3741 the function descriptor symbol, foo. Somewhere along the line, we need
3742 to carefully copy dynamic link information from one symbol to the other.
3743 Secondly, the generic part of the elf linker will make .foo a dynamic
3744 symbol as is normal for most other backends. We need foo dynamic
3745 instead, at least for an application final link. However, when
3746 creating a shared library containing foo, we need to have both symbols
3747 dynamic so that references to .foo are satisfied during the early
3748 stages of linking. Otherwise the linker might decide to pull in a
8387904d
AM
3749 definition from some other object, eg. a static library.
3750
3751 Update: As of August 2004, we support a new convention. Function
3752 calls may use the function descriptor symbol, ie. "bl foo". This
3753 behaves exactly as "bl .foo". */
65f38f15 3754
1d483afe 3755/* Of those relocs that might be copied as dynamic relocs, this function
58ac9f71
AM
3756 selects those that must be copied when linking a shared library,
3757 even when the symbol is local. */
65f38f15 3758
1d483afe
AM
3759static int
3760must_be_dyn_reloc (struct bfd_link_info *info,
3761 enum elf_ppc64_reloc_type r_type)
3762{
3763 switch (r_type)
3764 {
3765 default:
3766 return 1;
3767
3768 case R_PPC64_REL32:
3769 case R_PPC64_REL64:
3770 case R_PPC64_REL30:
3771 return 0;
3772
3773 case R_PPC64_TPREL16:
3774 case R_PPC64_TPREL16_LO:
3775 case R_PPC64_TPREL16_HI:
3776 case R_PPC64_TPREL16_HA:
3777 case R_PPC64_TPREL16_DS:
3778 case R_PPC64_TPREL16_LO_DS:
f9c6b907
AM
3779 case R_PPC64_TPREL16_HIGH:
3780 case R_PPC64_TPREL16_HIGHA:
1d483afe
AM
3781 case R_PPC64_TPREL16_HIGHER:
3782 case R_PPC64_TPREL16_HIGHERA:
3783 case R_PPC64_TPREL16_HIGHEST:
3784 case R_PPC64_TPREL16_HIGHESTA:
3785 case R_PPC64_TPREL64:
0e1862bb 3786 return !bfd_link_executable (info);
1d483afe
AM
3787 }
3788}
65f38f15 3789
f4656909
AM
3790/* If ELIMINATE_COPY_RELOCS is non-zero, the linker will try to avoid
3791 copying dynamic variables from a shared lib into an app's dynbss
3792 section, and instead use a dynamic relocation to point into the
5d35169e
AM
3793 shared lib. With code that gcc generates, it's vital that this be
3794 enabled; In the PowerPC64 ABI, the address of a function is actually
3795 the address of a function descriptor, which resides in the .opd
3796 section. gcc uses the descriptor directly rather than going via the
3797 GOT as some other ABI's do, which means that initialized function
3798 pointers must reference the descriptor. Thus, a function pointer
3799 initialized to the address of a function in a shared library will
3800 either require a copy reloc, or a dynamic reloc. Using a copy reloc
4cc11e76 3801 redefines the function descriptor symbol to point to the copy. This
5d35169e
AM
3802 presents a problem as a plt entry for that function is also
3803 initialized from the function descriptor symbol and the copy reloc
3804 may not be initialized first. */
a23b6845 3805#define ELIMINATE_COPY_RELOCS 1
f4656909 3806
721956f4 3807/* Section name for stubs is the associated section name plus this
29942be8
NC
3808 string. */
3809#define STUB_SUFFIX ".stub"
721956f4
AM
3810
3811/* Linker stubs.
3812 ppc_stub_long_branch:
3813 Used when a 14 bit branch (or even a 24 bit branch) can't reach its
3814 destination, but a 24 bit branch in a stub section will reach.
3815 . b dest
3816
3817 ppc_stub_plt_branch:
3818 Similar to the above, but a 24 bit branch in the stub section won't
3819 reach its destination.
71a39c98
AM
3820 . addis %r11,%r2,xxx@toc@ha
3821 . ld %r12,xxx@toc@l(%r11)
3822 . mtctr %r12
721956f4
AM
3823 . bctr
3824
3825 ppc_stub_plt_call:
2c66dc6c
AM
3826 Used to call a function in a shared library. If it so happens that
3827 the plt entry referenced crosses a 64k boundary, then an extra
71a39c98 3828 "addi %r11,%r11,xxx@toc@l" will be inserted before the "mtctr".
721956f4 3829 . std %r2,40(%r1)
71a39c98
AM
3830 . addis %r11,%r2,xxx@toc@ha
3831 . ld %r12,xxx+0@toc@l(%r11)
3832 . mtctr %r12
3833 . ld %r2,xxx+8@toc@l(%r11)
3834 . ld %r11,xxx+16@toc@l(%r11)
721956f4 3835 . bctr
ad8e1ba5
AM
3836
3837 ppc_stub_long_branch and ppc_stub_plt_branch may also have additional
3838 code to adjust the value and save r2 to support multiple toc sections.
3839 A ppc_stub_long_branch with an r2 offset looks like:
3840 . std %r2,40(%r1)
3841 . addis %r2,%r2,off@ha
3842 . addi %r2,%r2,off@l
3843 . b dest
3844
3845 A ppc_stub_plt_branch with an r2 offset looks like:
3846 . std %r2,40(%r1)
71a39c98
AM
3847 . addis %r11,%r2,xxx@toc@ha
3848 . ld %r12,xxx@toc@l(%r11)
ad8e1ba5
AM
3849 . addis %r2,%r2,off@ha
3850 . addi %r2,%r2,off@l
71a39c98 3851 . mtctr %r12
ad8e1ba5 3852 . bctr
ac2df442
AM
3853
3854 In cases where the "addis" instruction would add zero, the "addis" is
3855 omitted and following instructions modified slightly in some cases.
721956f4
AM
3856*/
3857
3858enum ppc_stub_type {
3859 ppc_stub_none,
3860 ppc_stub_long_branch,
ad8e1ba5 3861 ppc_stub_long_branch_r2off,
721956f4 3862 ppc_stub_plt_branch,
ad8e1ba5 3863 ppc_stub_plt_branch_r2off,
794e51c0 3864 ppc_stub_plt_call,
7341d5e2 3865 ppc_stub_plt_call_r2save,
a4b6fadd
AM
3866 ppc_stub_global_entry,
3867 ppc_stub_save_res
721956f4
AM
3868};
3869
6f20ed8a
AM
3870/* Information on stub grouping. */
3871struct map_stub
3872{
3873 /* The stub section. */
3874 asection *stub_sec;
3875 /* This is the section to which stubs in the group will be attached. */
3876 asection *link_sec;
a4b6fadd
AM
3877 /* Next group. */
3878 struct map_stub *next;
3879 /* Whether to emit a copy of register save/restore functions in this
3880 group. */
3881 int needs_save_res;
6f20ed8a
AM
3882};
3883
721956f4
AM
3884struct ppc_stub_hash_entry {
3885
3886 /* Base hash table entry structure. */
3887 struct bfd_hash_entry root;
3888
ad8e1ba5
AM
3889 enum ppc_stub_type stub_type;
3890
6f20ed8a
AM
3891 /* Group information. */
3892 struct map_stub *group;
721956f4
AM
3893
3894 /* Offset within stub_sec of the beginning of this stub. */
3895 bfd_vma stub_offset;
3896
3897 /* Given the symbol's value and its section we can determine its final
3898 value when building the stubs (so the stub knows where to jump. */
3899 bfd_vma target_value;
3900 asection *target_section;
3901
721956f4
AM
3902 /* The symbol table entry, if any, that this was derived from. */
3903 struct ppc_link_hash_entry *h;
e054468f 3904 struct plt_entry *plt_ent;
721956f4 3905
6911b7dc
AM
3906 /* Symbol st_other. */
3907 unsigned char other;
721956f4
AM
3908};
3909
3910struct ppc_branch_hash_entry {
3911
3912 /* Base hash table entry structure. */
3913 struct bfd_hash_entry root;
3914
c456f082 3915 /* Offset within branch lookup table. */
721956f4
AM
3916 unsigned int offset;
3917
3918 /* Generation marker. */
3919 unsigned int iter;
3920};
65f38f15 3921
19e08130
AM
3922/* Used to track dynamic relocations for local symbols. */
3923struct ppc_dyn_relocs
3924{
3925 struct ppc_dyn_relocs *next;
3926
3927 /* The input section of the reloc. */
3928 asection *sec;
3929
3930 /* Total number of relocs copied for the input section. */
3931 unsigned int count : 31;
3932
3933 /* Whether this entry is for STT_GNU_IFUNC symbols. */
3934 unsigned int ifunc : 1;
3935};
3936
65f38f15
AM
3937struct ppc_link_hash_entry
3938{
3939 struct elf_link_hash_entry elf;
3940
b3fac117
AM
3941 union {
3942 /* A pointer to the most recently used stub hash entry against this
3943 symbol. */
3944 struct ppc_stub_hash_entry *stub_cache;
3945
3946 /* A pointer to the next symbol starting with a '.' */
3947 struct ppc_link_hash_entry *next_dot_sym;
3948 } u;
721956f4 3949
65f38f15 3950 /* Track dynamic relocs copied for this symbol. */
6061a67d 3951 struct elf_dyn_relocs *dyn_relocs;
e86ce104 3952
d311bc8b
AM
3953 /* Chain of aliases referring to a weakdef. */
3954 struct ppc_link_hash_entry *weakref;
3955
721956f4 3956 /* Link between function code and descriptor symbols. */
34814b9f 3957 struct ppc_link_hash_entry *oh;
721956f4 3958
e86ce104
AM
3959 /* Flag function code and descriptor symbols. */
3960 unsigned int is_func:1;
3961 unsigned int is_func_descriptor:1;
908b32fc 3962 unsigned int fake:1;
411e1bfb 3963
c5614fa4
AM
3964 /* Whether global opd/toc sym has been adjusted or not.
3965 After ppc64_elf_edit_opd/ppc64_elf_edit_toc has run, this flag
3966 should be set for all globals defined in any opd/toc section. */
754021d0
AM
3967 unsigned int adjust_done:1;
3968
99877b66
AM
3969 /* Set if we twiddled this symbol to weak at some stage. */
3970 unsigned int was_undefined:1;
3971
a4b6fadd
AM
3972 /* Set if this is an out-of-line register save/restore function,
3973 with non-standard calling convention. */
3974 unsigned int save_res:1;
3975
411e1bfb 3976 /* Contexts in which symbol is used in the GOT (or TOC).
e7b938ca
AM
3977 TLS_GD .. TLS_EXPLICIT bits are or'd into the mask as the
3978 corresponding relocs are encountered during check_relocs.
3979 tls_optimize clears TLS_GD .. TLS_TPREL when optimizing to
3980 indicate the corresponding GOT entry type is not needed.
3981 tls_optimize may also set TLS_TPRELGD when a GD reloc turns into
3982 a TPREL one. We use a separate flag rather than setting TPREL
3983 just for convenience in distinguishing the two cases. */
3984#define TLS_GD 1 /* GD reloc. */
3985#define TLS_LD 2 /* LD reloc. */
3986#define TLS_TPREL 4 /* TPREL reloc, => IE. */
3987#define TLS_DTPREL 8 /* DTPREL reloc, => LD. */
3988#define TLS_TLS 16 /* Any TLS reloc. */
3989#define TLS_EXPLICIT 32 /* Marks TOC section TLS relocs. */
3990#define TLS_TPRELGD 64 /* TPREL reloc resulting from GD->IE. */
e054468f 3991#define PLT_IFUNC 128 /* STT_GNU_IFUNC. */
f961d9dd 3992 unsigned char tls_mask;
65f38f15
AM
3993};
3994
3995/* ppc64 ELF linker hash table. */
3996
3997struct ppc_link_hash_table
3998{
3999 struct elf_link_hash_table elf;
4000
721956f4
AM
4001 /* The stub hash table. */
4002 struct bfd_hash_table stub_hash_table;
4003
4004 /* Another hash table for plt_branch stubs. */
4005 struct bfd_hash_table branch_hash_table;
4006
3b421ab3
AM
4007 /* Hash table for function prologue tocsave. */
4008 htab_t tocsave_htab;
4009
e7d1c40c
AM
4010 /* Various options and other info passed from the linker. */
4011 struct ppc64_elf_params *params;
721956f4 4012
6f20ed8a
AM
4013 /* The size of sec_info below. */
4014 unsigned int sec_info_arr_size;
4015
4016 /* Per-section array of extra section info. Done this way rather
4017 than as part of ppc64_elf_section_data so we have the info for
4018 non-ppc64 sections. */
4019 struct
4020 {
4021 /* Along with elf_gp, specifies the TOC pointer used by this section. */
ad8e1ba5 4022 bfd_vma toc_off;
6f20ed8a
AM
4023
4024 union
4025 {
4026 /* The section group that this section belongs to. */
4027 struct map_stub *group;
4028 /* A temp section list pointer. */
4029 asection *list;
4030 } u;
4031 } *sec_info;
721956f4 4032
a4b6fadd
AM
4033 /* Linked list of groups. */
4034 struct map_stub *group;
4035
ad8e1ba5
AM
4036 /* Temp used when calculating TOC pointers. */
4037 bfd_vma toc_curr;
bf102f86
AM
4038 bfd *toc_bfd;
4039 asection *toc_first_sec;
ad8e1ba5 4040
b3fac117
AM
4041 /* Used when adding symbols. */
4042 struct ppc_link_hash_entry *dot_syms;
4043
33e44f2e 4044 /* Shortcuts to get to dynamic linker sections. */
4ce794b7
AM
4045 asection *dynbss;
4046 asection *relbss;
4047 asection *glink;
82bd7b59 4048 asection *sfpr;
4ce794b7
AM
4049 asection *brlt;
4050 asection *relbrlt;
58d180e8 4051 asection *glink_eh_frame;
ec338859 4052
8387904d
AM
4053 /* Shortcut to .__tls_get_addr and __tls_get_addr. */
4054 struct ppc_link_hash_entry *tls_get_addr;
4055 struct ppc_link_hash_entry *tls_get_addr_fd;
411e1bfb 4056
927be08e
AM
4057 /* The size of reliplt used by got entry relocs. */
4058 bfd_size_type got_reli_size;
4059
9b5ecbd0 4060 /* Statistics. */
7341d5e2 4061 unsigned long stub_count[ppc_stub_global_entry];
9b5ecbd0 4062
ee75fd95
AM
4063 /* Number of stubs against global syms. */
4064 unsigned long stub_globals;
4065
ee67d69a
AM
4066 /* Set if we're linking code with function descriptors. */
4067 unsigned int opd_abi:1;
4068
4c52953f 4069 /* Support for multiple toc sections. */
33c0ec9d 4070 unsigned int do_multi_toc:1;
4c52953f 4071 unsigned int multi_toc_needed:1;
927be08e 4072 unsigned int second_toc_pass:1;
67f0cbdb 4073 unsigned int do_toc_opt:1;
4c52953f 4074
5d1634d7 4075 /* Set on error. */
99877b66 4076 unsigned int stub_error:1;
721956f4 4077
f6c7c3e8 4078 /* Temp used by ppc64_elf_before_check_relocs. */
99877b66 4079 unsigned int twiddled_syms:1;
721956f4
AM
4080
4081 /* Incremented every time we size stubs. */
4082 unsigned int stub_iteration;
5d1634d7 4083
87d72d41
AM
4084 /* Small local sym cache. */
4085 struct sym_cache sym_cache;
65f38f15
AM
4086};
4087
4c52953f
AM
4088/* Rename some of the generic section flags to better document how they
4089 are used here. */
b0dddeec
AM
4090
4091/* Nonzero if this section has TLS related relocations. */
4092#define has_tls_reloc sec_flg0
4093
4094/* Nonzero if this section has a call to __tls_get_addr. */
4095#define has_tls_get_addr_call sec_flg1
4096
4097/* Nonzero if this section has any toc or got relocs. */
4098#define has_toc_reloc sec_flg2
4099
4100/* Nonzero if this section has a call to another section that uses
4101 the toc or got. */
d77c8a4b 4102#define makes_toc_func_call sec_flg3
b0dddeec
AM
4103
4104/* Recursion protection when determining above flag. */
d77c8a4b 4105#define call_check_in_progress sec_flg4
70cc837d 4106#define call_check_done sec_flg5
4c52953f 4107
65f38f15
AM
4108/* Get the ppc64 ELF linker hash table from a link_info structure. */
4109
4110#define ppc_hash_table(p) \
4dfe6ac6
NC
4111 (elf_hash_table_id ((struct elf_link_hash_table *) ((p)->hash)) \
4112 == PPC64_ELF_DATA ? ((struct ppc_link_hash_table *) ((p)->hash)) : NULL)
65f38f15 4113
721956f4
AM
4114#define ppc_stub_hash_lookup(table, string, create, copy) \
4115 ((struct ppc_stub_hash_entry *) \
4116 bfd_hash_lookup ((table), (string), (create), (copy)))
4117
4118#define ppc_branch_hash_lookup(table, string, create, copy) \
4119 ((struct ppc_branch_hash_entry *) \
4120 bfd_hash_lookup ((table), (string), (create), (copy)))
4121
4122/* Create an entry in the stub hash table. */
4123
4124static struct bfd_hash_entry *
4ce794b7
AM
4125stub_hash_newfunc (struct bfd_hash_entry *entry,
4126 struct bfd_hash_table *table,
4127 const char *string)
721956f4
AM
4128{
4129 /* Allocate the structure if it has not already been allocated by a
4130 subclass. */
4131 if (entry == NULL)
4132 {
4133 entry = bfd_hash_allocate (table, sizeof (struct ppc_stub_hash_entry));
4134 if (entry == NULL)
4135 return entry;
4136 }
4137
4138 /* Call the allocation method of the superclass. */
4139 entry = bfd_hash_newfunc (entry, table, string);
4140 if (entry != NULL)
4141 {
4142 struct ppc_stub_hash_entry *eh;
4143
4144 /* Initialize the local fields. */
4145 eh = (struct ppc_stub_hash_entry *) entry;
ad8e1ba5 4146 eh->stub_type = ppc_stub_none;
6f20ed8a 4147 eh->group = NULL;
721956f4
AM
4148 eh->stub_offset = 0;
4149 eh->target_value = 0;
4150 eh->target_section = NULL;
721956f4 4151 eh->h = NULL;
6911b7dc 4152 eh->plt_ent = NULL;
6911b7dc 4153 eh->other = 0;
721956f4
AM
4154 }
4155
4156 return entry;
4157}
4158
4159/* Create an entry in the branch hash table. */
4160
4161static struct bfd_hash_entry *
4ce794b7
AM
4162branch_hash_newfunc (struct bfd_hash_entry *entry,
4163 struct bfd_hash_table *table,
4164 const char *string)
721956f4
AM
4165{
4166 /* Allocate the structure if it has not already been allocated by a
4167 subclass. */
4168 if (entry == NULL)
4169 {
4170 entry = bfd_hash_allocate (table, sizeof (struct ppc_branch_hash_entry));
4171 if (entry == NULL)
4172 return entry;
4173 }
4174
4175 /* Call the allocation method of the superclass. */
4176 entry = bfd_hash_newfunc (entry, table, string);
4177 if (entry != NULL)
4178 {
4179 struct ppc_branch_hash_entry *eh;
4180
4181 /* Initialize the local fields. */
4182 eh = (struct ppc_branch_hash_entry *) entry;
4183 eh->offset = 0;
4184 eh->iter = 0;
4185 }
4186
4187 return entry;
4188}
4189
65f38f15
AM
4190/* Create an entry in a ppc64 ELF linker hash table. */
4191
4192static struct bfd_hash_entry *
4ce794b7
AM
4193link_hash_newfunc (struct bfd_hash_entry *entry,
4194 struct bfd_hash_table *table,
4195 const char *string)
65f38f15
AM
4196{
4197 /* Allocate the structure if it has not already been allocated by a
4198 subclass. */
4199 if (entry == NULL)
4200 {
4201 entry = bfd_hash_allocate (table, sizeof (struct ppc_link_hash_entry));
4202 if (entry == NULL)
4203 return entry;
4204 }
4205
4206 /* Call the allocation method of the superclass. */
4207 entry = _bfd_elf_link_hash_newfunc (entry, table, string);
4208 if (entry != NULL)
4209 {
4210 struct ppc_link_hash_entry *eh = (struct ppc_link_hash_entry *) entry;
4211
b3fac117 4212 memset (&eh->u.stub_cache, 0,
908b32fc 4213 (sizeof (struct ppc_link_hash_entry)
b3fac117
AM
4214 - offsetof (struct ppc_link_hash_entry, u.stub_cache)));
4215
4216 /* When making function calls, old ABI code references function entry
4217 points (dot symbols), while new ABI code references the function
4218 descriptor symbol. We need to make any combination of reference and
4219 definition work together, without breaking archive linking.
4220
4221 For a defined function "foo" and an undefined call to "bar":
4222 An old object defines "foo" and ".foo", references ".bar" (possibly
4223 "bar" too).
4224 A new object defines "foo" and references "bar".
4225
4226 A new object thus has no problem with its undefined symbols being
4227 satisfied by definitions in an old object. On the other hand, the
4228 old object won't have ".bar" satisfied by a new object.
4229
4230 Keep a list of newly added dot-symbols. */
4231
4232 if (string[0] == '.')
4233 {
4234 struct ppc_link_hash_table *htab;
4235
4236 htab = (struct ppc_link_hash_table *) table;
4237 eh->u.next_dot_sym = htab->dot_syms;
4238 htab->dot_syms = eh;
4239 }
65f38f15
AM
4240 }
4241
4242 return entry;
4243}
4244
3b421ab3
AM
4245struct tocsave_entry {
4246 asection *sec;
4247 bfd_vma offset;
4248};
4249
4250static hashval_t
4251tocsave_htab_hash (const void *p)
4252{
4253 const struct tocsave_entry *e = (const struct tocsave_entry *) p;
4254 return ((bfd_vma)(intptr_t) e->sec ^ e->offset) >> 3;
4255}
4256
4257static int
4258tocsave_htab_eq (const void *p1, const void *p2)
4259{
4260 const struct tocsave_entry *e1 = (const struct tocsave_entry *) p1;
4261 const struct tocsave_entry *e2 = (const struct tocsave_entry *) p2;
4262 return e1->sec == e2->sec && e1->offset == e2->offset;
4263}
4264
68faa637
AM
4265/* Destroy a ppc64 ELF linker hash table. */
4266
4267static void
d495ab0d 4268ppc64_elf_link_hash_table_free (bfd *obfd)
68faa637 4269{
d495ab0d 4270 struct ppc_link_hash_table *htab;
68faa637 4271
d495ab0d 4272 htab = (struct ppc_link_hash_table *) obfd->link.hash;
68faa637
AM
4273 if (htab->tocsave_htab)
4274 htab_delete (htab->tocsave_htab);
d495ab0d
AM
4275 bfd_hash_table_free (&htab->branch_hash_table);
4276 bfd_hash_table_free (&htab->stub_hash_table);
4277 _bfd_elf_link_hash_table_free (obfd);
68faa637
AM
4278}
4279
65f38f15
AM
4280/* Create a ppc64 ELF linker hash table. */
4281
4282static struct bfd_link_hash_table *
4ce794b7 4283ppc64_elf_link_hash_table_create (bfd *abfd)
65f38f15
AM
4284{
4285 struct ppc_link_hash_table *htab;
4286 bfd_size_type amt = sizeof (struct ppc_link_hash_table);
4287
4ce794b7 4288 htab = bfd_zmalloc (amt);
65f38f15
AM
4289 if (htab == NULL)
4290 return NULL;
4291
66eb6687 4292 if (!_bfd_elf_link_hash_table_init (&htab->elf, abfd, link_hash_newfunc,
4dfe6ac6
NC
4293 sizeof (struct ppc_link_hash_entry),
4294 PPC64_ELF_DATA))
65f38f15 4295 {
e2d34d7d 4296 free (htab);
65f38f15
AM
4297 return NULL;
4298 }
4299
721956f4 4300 /* Init the stub hash table too. */
66eb6687
AM
4301 if (!bfd_hash_table_init (&htab->stub_hash_table, stub_hash_newfunc,
4302 sizeof (struct ppc_stub_hash_entry)))
2915c55b 4303 {
d495ab0d 4304 _bfd_elf_link_hash_table_free (abfd);
2915c55b
JK
4305 return NULL;
4306 }
721956f4
AM
4307
4308 /* And the branch hash table. */
66eb6687
AM
4309 if (!bfd_hash_table_init (&htab->branch_hash_table, branch_hash_newfunc,
4310 sizeof (struct ppc_branch_hash_entry)))
2915c55b
JK
4311 {
4312 bfd_hash_table_free (&htab->stub_hash_table);
d495ab0d 4313 _bfd_elf_link_hash_table_free (abfd);
2915c55b
JK
4314 return NULL;
4315 }
721956f4 4316
3b421ab3
AM
4317 htab->tocsave_htab = htab_try_create (1024,
4318 tocsave_htab_hash,
4319 tocsave_htab_eq,
4320 NULL);
4321 if (htab->tocsave_htab == NULL)
2915c55b 4322 {
d495ab0d 4323 ppc64_elf_link_hash_table_free (abfd);
2915c55b
JK
4324 return NULL;
4325 }
d495ab0d 4326 htab->elf.root.hash_table_free = ppc64_elf_link_hash_table_free;
3b421ab3 4327
3254fd24
AM
4328 /* Initializing two fields of the union is just cosmetic. We really
4329 only care about glist, but when compiled on a 32-bit host the
4330 bfd_vma fields are larger. Setting the bfd_vma to zero makes
4331 debugger inspection of these fields look nicer. */
a6aa5195
AM
4332 htab->elf.init_got_refcount.refcount = 0;
4333 htab->elf.init_got_refcount.glist = NULL;
4334 htab->elf.init_plt_refcount.refcount = 0;
4335 htab->elf.init_plt_refcount.glist = NULL;
4336 htab->elf.init_got_offset.offset = 0;
4337 htab->elf.init_got_offset.glist = NULL;
4338 htab->elf.init_plt_offset.offset = 0;
4339 htab->elf.init_plt_offset.glist = NULL;
3254fd24 4340
65f38f15
AM
4341 return &htab->elf.root;
4342}
4343
bfeb4a28
AM
4344/* Create sections for linker generated code. */
4345
4346static bfd_boolean
4347create_linkage_sections (bfd *dynobj, struct bfd_link_info *info)
4348{
4349 struct ppc_link_hash_table *htab;
4350 flagword flags;
4351
4352 htab = ppc_hash_table (info);
4353
bfeb4a28
AM
4354 flags = (SEC_ALLOC | SEC_LOAD | SEC_CODE | SEC_READONLY
4355 | SEC_HAS_CONTENTS | SEC_IN_MEMORY | SEC_LINKER_CREATED);
b32547cd
AM
4356 if (htab->params->save_restore_funcs)
4357 {
4358 /* Create .sfpr for code to save and restore fp regs. */
4359 htab->sfpr = bfd_make_section_anyway_with_flags (dynobj, ".sfpr",
4360 flags);
4361 if (htab->sfpr == NULL
4362 || ! bfd_set_section_alignment (dynobj, htab->sfpr, 2))
4363 return FALSE;
4364 }
4365
4366 if (bfd_link_relocatable (info))
4367 return TRUE;
bfeb4a28
AM
4368
4369 /* Create .glink for lazy dynamic linking support. */
4370 htab->glink = bfd_make_section_anyway_with_flags (dynobj, ".glink",
4371 flags);
4372 if (htab->glink == NULL
4373 || ! bfd_set_section_alignment (dynobj, htab->glink, 3))
4374 return FALSE;
4375
4376 if (!info->no_ld_generated_unwind_info)
4377 {
4378 flags = (SEC_ALLOC | SEC_LOAD | SEC_READONLY | SEC_HAS_CONTENTS
4379 | SEC_IN_MEMORY | SEC_LINKER_CREATED);
4380 htab->glink_eh_frame = bfd_make_section_anyway_with_flags (dynobj,
4381 ".eh_frame",
4382 flags);
4383 if (htab->glink_eh_frame == NULL
4384 || !bfd_set_section_alignment (dynobj, htab->glink_eh_frame, 2))
4385 return FALSE;
4386 }
4387
4388 flags = SEC_ALLOC | SEC_LINKER_CREATED;
33e44f2e
AM
4389 htab->elf.iplt = bfd_make_section_anyway_with_flags (dynobj, ".iplt", flags);
4390 if (htab->elf.iplt == NULL
4391 || ! bfd_set_section_alignment (dynobj, htab->elf.iplt, 3))
bfeb4a28
AM
4392 return FALSE;
4393
4394 flags = (SEC_ALLOC | SEC_LOAD | SEC_READONLY
4395 | SEC_HAS_CONTENTS | SEC_IN_MEMORY | SEC_LINKER_CREATED);
33e44f2e
AM
4396 htab->elf.irelplt
4397 = bfd_make_section_anyway_with_flags (dynobj, ".rela.iplt", flags);
4398 if (htab->elf.irelplt == NULL
4399 || ! bfd_set_section_alignment (dynobj, htab->elf.irelplt, 3))
bfeb4a28
AM
4400 return FALSE;
4401
4402 /* Create branch lookup table for plt_branch stubs. */
4403 flags = (SEC_ALLOC | SEC_LOAD
4404 | SEC_HAS_CONTENTS | SEC_IN_MEMORY | SEC_LINKER_CREATED);
4405 htab->brlt = bfd_make_section_anyway_with_flags (dynobj, ".branch_lt",
4406 flags);
4407 if (htab->brlt == NULL
4408 || ! bfd_set_section_alignment (dynobj, htab->brlt, 3))
4409 return FALSE;
4410
0e1862bb 4411 if (!bfd_link_pic (info))
bfeb4a28
AM
4412 return TRUE;
4413
4414 flags = (SEC_ALLOC | SEC_LOAD | SEC_READONLY
4415 | SEC_HAS_CONTENTS | SEC_IN_MEMORY | SEC_LINKER_CREATED);
4416 htab->relbrlt = bfd_make_section_anyway_with_flags (dynobj,
4417 ".rela.branch_lt",
4418 flags);
4419 if (htab->relbrlt == NULL
4420 || ! bfd_set_section_alignment (dynobj, htab->relbrlt, 3))
4421 return FALSE;
4422
4423 return TRUE;
4424}
4425
e717da7e
AM
4426/* Satisfy the ELF linker by filling in some fields in our fake bfd. */
4427
bfeb4a28 4428bfd_boolean
e7d1c40c
AM
4429ppc64_elf_init_stub_bfd (struct bfd_link_info *info,
4430 struct ppc64_elf_params *params)
e717da7e
AM
4431{
4432 struct ppc_link_hash_table *htab;
4433
e7d1c40c 4434 elf_elfheader (params->stub_bfd)->e_ident[EI_CLASS] = ELFCLASS64;
e717da7e
AM
4435
4436/* Always hook our dynamic sections into the first bfd, which is the
4437 linker created stub bfd. This ensures that the GOT header is at
4438 the start of the output TOC section. */
4439 htab = ppc_hash_table (info);
e7d1c40c
AM
4440 htab->elf.dynobj = params->stub_bfd;
4441 htab->params = params;
bfeb4a28 4442
bfeb4a28 4443 return create_linkage_sections (htab->elf.dynobj, info);
e717da7e
AM
4444}
4445
721956f4
AM
4446/* Build a name for an entry in the stub hash table. */
4447
4448static char *
4ce794b7
AM
4449ppc_stub_name (const asection *input_section,
4450 const asection *sym_sec,
4451 const struct ppc_link_hash_entry *h,
4452 const Elf_Internal_Rela *rel)
721956f4
AM
4453{
4454 char *stub_name;
bcaa2f82 4455 ssize_t len;
721956f4
AM
4456
4457 /* rel->r_addend is actually 64 bit, but who uses more than +/- 2^31
4458 offsets from a sym as a branch target? In fact, we could
4459 probably assume the addend is always zero. */
4460 BFD_ASSERT (((int) rel->r_addend & 0xffffffff) == rel->r_addend);
4461
4462 if (h)
4463 {
4464 len = 8 + 1 + strlen (h->elf.root.root.string) + 1 + 8 + 1;
4465 stub_name = bfd_malloc (len);
46de2a7c
AM
4466 if (stub_name == NULL)
4467 return stub_name;
4468
bcaa2f82
AM
4469 len = sprintf (stub_name, "%08x.%s+%x",
4470 input_section->id & 0xffffffff,
4471 h->elf.root.root.string,
4472 (int) rel->r_addend & 0xffffffff);
721956f4
AM
4473 }
4474 else
4475 {
ad8e1ba5 4476 len = 8 + 1 + 8 + 1 + 8 + 1 + 8 + 1;
721956f4 4477 stub_name = bfd_malloc (len);
46de2a7c
AM
4478 if (stub_name == NULL)
4479 return stub_name;
4480
bcaa2f82
AM
4481 len = sprintf (stub_name, "%08x.%x:%x+%x",
4482 input_section->id & 0xffffffff,
4483 sym_sec->id & 0xffffffff,
4484 (int) ELF64_R_SYM (rel->r_info) & 0xffffffff,
4485 (int) rel->r_addend & 0xffffffff);
721956f4 4486 }
bcaa2f82 4487 if (len > 2 && stub_name[len - 2] == '+' && stub_name[len - 1] == '0')
ee75fd95 4488 stub_name[len - 2] = 0;
721956f4
AM
4489 return stub_name;
4490}
4491
4492/* Look up an entry in the stub hash. Stub entries are cached because
4493 creating the stub name takes a bit of time. */
4494
4495static struct ppc_stub_hash_entry *
4ce794b7
AM
4496ppc_get_stub_entry (const asection *input_section,
4497 const asection *sym_sec,
039b3fef 4498 struct ppc_link_hash_entry *h,
4ce794b7
AM
4499 const Elf_Internal_Rela *rel,
4500 struct ppc_link_hash_table *htab)
721956f4
AM
4501{
4502 struct ppc_stub_hash_entry *stub_entry;
6f20ed8a 4503 struct map_stub *group;
721956f4
AM
4504
4505 /* If this input section is part of a group of sections sharing one
4506 stub section, then use the id of the first section in the group.
4507 Stub names need to include a section id, as there may well be
4508 more than one stub used to reach say, printf, and we need to
4509 distinguish between them. */
6f20ed8a 4510 group = htab->sec_info[input_section->id].u.group;
89d77b8a
AM
4511 if (group == NULL)
4512 return NULL;
721956f4 4513
b3fac117
AM
4514 if (h != NULL && h->u.stub_cache != NULL
4515 && h->u.stub_cache->h == h
6f20ed8a 4516 && h->u.stub_cache->group == group)
721956f4 4517 {
b3fac117 4518 stub_entry = h->u.stub_cache;
721956f4
AM
4519 }
4520 else
4521 {
4522 char *stub_name;
4523
6f20ed8a 4524 stub_name = ppc_stub_name (group->link_sec, sym_sec, h, rel);
721956f4
AM
4525 if (stub_name == NULL)
4526 return NULL;
4527
4528 stub_entry = ppc_stub_hash_lookup (&htab->stub_hash_table,
b34976b6 4529 stub_name, FALSE, FALSE);
721956f4 4530 if (h != NULL)
b3fac117 4531 h->u.stub_cache = stub_entry;
721956f4
AM
4532
4533 free (stub_name);
4534 }
4535
4536 return stub_entry;
4537}
4538
4539/* Add a new stub entry to the stub hash. Not all fields of the new
4540 stub entry are initialised. */
4541
4542static struct ppc_stub_hash_entry *
4ce794b7
AM
4543ppc_add_stub (const char *stub_name,
4544 asection *section,
25f53a85 4545 struct bfd_link_info *info)
721956f4 4546{
25f53a85 4547 struct ppc_link_hash_table *htab = ppc_hash_table (info);
6f20ed8a 4548 struct map_stub *group;
721956f4
AM
4549 asection *link_sec;
4550 asection *stub_sec;
4551 struct ppc_stub_hash_entry *stub_entry;
4552
6f20ed8a
AM
4553 group = htab->sec_info[section->id].u.group;
4554 link_sec = group->link_sec;
4555 stub_sec = group->stub_sec;
721956f4
AM
4556 if (stub_sec == NULL)
4557 {
6f20ed8a
AM
4558 size_t namelen;
4559 bfd_size_type len;
4560 char *s_name;
721956f4 4561
6f20ed8a
AM
4562 namelen = strlen (link_sec->name);
4563 len = namelen + sizeof (STUB_SUFFIX);
4564 s_name = bfd_alloc (htab->params->stub_bfd, len);
4565 if (s_name == NULL)
4566 return NULL;
721956f4 4567
6f20ed8a
AM
4568 memcpy (s_name, link_sec->name, namelen);
4569 memcpy (s_name + namelen, STUB_SUFFIX, sizeof (STUB_SUFFIX));
4570 stub_sec = (*htab->params->add_stub_section) (s_name, link_sec);
4571 if (stub_sec == NULL)
4572 return NULL;
4573 group->stub_sec = stub_sec;
721956f4
AM
4574 }
4575
4576 /* Enter this entry into the linker stub hash table. */
4577 stub_entry = ppc_stub_hash_lookup (&htab->stub_hash_table, stub_name,
b34976b6 4578 TRUE, FALSE);
721956f4
AM
4579 if (stub_entry == NULL)
4580 {
8de848d8 4581 info->callbacks->einfo (_("%P: %B: cannot create stub entry %s\n"),
25f53a85 4582 section->owner, stub_name);
721956f4
AM
4583 return NULL;
4584 }
4585
6f20ed8a 4586 stub_entry->group = group;
721956f4 4587 stub_entry->stub_offset = 0;
721956f4
AM
4588 return stub_entry;
4589}
4590
e717da7e
AM
4591/* Create .got and .rela.got sections in ABFD, and .got in dynobj if
4592 not already done. */
65f38f15 4593
b34976b6 4594static bfd_boolean
e717da7e 4595create_got_section (bfd *abfd, struct bfd_link_info *info)
65f38f15 4596{
e717da7e
AM
4597 asection *got, *relgot;
4598 flagword flags;
4599 struct ppc_link_hash_table *htab = ppc_hash_table (info);
65f38f15 4600
0c8d6e5c 4601 if (!is_ppc64_elf (abfd))
0ffa91dd 4602 return FALSE;
4dfe6ac6
NC
4603 if (htab == NULL)
4604 return FALSE;
0ffa91dd 4605
33e44f2e
AM
4606 if (!htab->elf.sgot
4607 && !_bfd_elf_create_got_section (htab->elf.dynobj, info))
4608 return FALSE;
e717da7e
AM
4609
4610 flags = (SEC_ALLOC | SEC_LOAD | SEC_HAS_CONTENTS | SEC_IN_MEMORY
4611 | SEC_LINKER_CREATED);
4612
c456f082 4613 got = bfd_make_section_anyway_with_flags (abfd, ".got", flags);
e717da7e 4614 if (!got
e717da7e
AM
4615 || !bfd_set_section_alignment (abfd, got, 3))
4616 return FALSE;
65f38f15 4617
c456f082
AM
4618 relgot = bfd_make_section_anyway_with_flags (abfd, ".rela.got",
4619 flags | SEC_READONLY);
e717da7e 4620 if (!relgot
e717da7e 4621 || ! bfd_set_section_alignment (abfd, relgot, 3))
b34976b6 4622 return FALSE;
e717da7e
AM
4623
4624 ppc64_elf_tdata (abfd)->got = got;
4625 ppc64_elf_tdata (abfd)->relgot = relgot;
b34976b6 4626 return TRUE;
65f38f15 4627}
5bd4f169 4628
82bd7b59 4629/* Create the dynamic sections, and set up shortcuts. */
5bd4f169 4630
b34976b6 4631static bfd_boolean
4ce794b7 4632ppc64_elf_create_dynamic_sections (bfd *dynobj, struct bfd_link_info *info)
5bd4f169 4633{
65f38f15 4634 struct ppc_link_hash_table *htab;
5bd4f169 4635
65f38f15 4636 if (!_bfd_elf_create_dynamic_sections (dynobj, info))
b34976b6 4637 return FALSE;
65f38f15 4638
e717da7e 4639 htab = ppc_hash_table (info);
4dfe6ac6
NC
4640 if (htab == NULL)
4641 return FALSE;
4642
3d4d4302 4643 htab->dynbss = bfd_get_linker_section (dynobj, ".dynbss");
0e1862bb 4644 if (!bfd_link_pic (info))
3d4d4302 4645 htab->relbss = bfd_get_linker_section (dynobj, ".rela.bss");
65f38f15 4646
33e44f2e 4647 if (!htab->elf.sgot || !htab->elf.splt || !htab->elf.srelplt || !htab->dynbss
0e1862bb 4648 || (!bfd_link_pic (info) && !htab->relbss))
65f38f15
AM
4649 abort ();
4650
b34976b6 4651 return TRUE;
5bd4f169
AM
4652}
4653
b31867b6
AM
4654/* Follow indirect and warning symbol links. */
4655
4656static inline struct bfd_link_hash_entry *
4657follow_link (struct bfd_link_hash_entry *h)
4658{
4659 while (h->type == bfd_link_hash_indirect
4660 || h->type == bfd_link_hash_warning)
4661 h = h->u.i.link;
4662 return h;
4663}
4664
4665static inline struct elf_link_hash_entry *
4666elf_follow_link (struct elf_link_hash_entry *h)
4667{
4668 return (struct elf_link_hash_entry *) follow_link (&h->root);
4669}
4670
4671static inline struct ppc_link_hash_entry *
4672ppc_follow_link (struct ppc_link_hash_entry *h)
4673{
4674 return (struct ppc_link_hash_entry *) follow_link (&h->elf.root);
4675}
4676
40d16e0b
AM
4677/* Merge PLT info on FROM with that on TO. */
4678
4679static void
4680move_plt_plist (struct ppc_link_hash_entry *from,
4681 struct ppc_link_hash_entry *to)
4682{
4683 if (from->elf.plt.plist != NULL)
4684 {
4685 if (to->elf.plt.plist != NULL)
4686 {
4687 struct plt_entry **entp;
4688 struct plt_entry *ent;
4689
4690 for (entp = &from->elf.plt.plist; (ent = *entp) != NULL; )
4691 {
4692 struct plt_entry *dent;
4693
4694 for (dent = to->elf.plt.plist; dent != NULL; dent = dent->next)
4695 if (dent->addend == ent->addend)
4696 {
4697 dent->plt.refcount += ent->plt.refcount;
4698 *entp = ent->next;
4699 break;
4700 }
4701 if (dent == NULL)
4702 entp = &ent->next;
4703 }
4704 *entp = to->elf.plt.plist;
4705 }
4706
4707 to->elf.plt.plist = from->elf.plt.plist;
4708 from->elf.plt.plist = NULL;
4709 }
4710}
4711
65f38f15
AM
4712/* Copy the extra info we tack onto an elf_link_hash_entry. */
4713
4714static void
fcfa13d2
AM
4715ppc64_elf_copy_indirect_symbol (struct bfd_link_info *info,
4716 struct elf_link_hash_entry *dir,
4717 struct elf_link_hash_entry *ind)
65f38f15
AM
4718{
4719 struct ppc_link_hash_entry *edir, *eind;
4720
4721 edir = (struct ppc_link_hash_entry *) dir;
4722 eind = (struct ppc_link_hash_entry *) ind;
4723
c79d6685
AM
4724 edir->is_func |= eind->is_func;
4725 edir->is_func_descriptor |= eind->is_func_descriptor;
4726 edir->tls_mask |= eind->tls_mask;
4727 if (eind->oh != NULL)
4728 edir->oh = ppc_follow_link (eind->oh);
4729
4730 /* If called to transfer flags for a weakdef during processing
4731 of elf_adjust_dynamic_symbol, don't copy NON_GOT_REF.
4732 We clear it ourselves for ELIMINATE_COPY_RELOCS. */
4733 if (!(ELIMINATE_COPY_RELOCS
4734 && eind->elf.root.type != bfd_link_hash_indirect
4735 && edir->elf.dynamic_adjusted))
4736 edir->elf.non_got_ref |= eind->elf.non_got_ref;
4737
4738 edir->elf.ref_dynamic |= eind->elf.ref_dynamic;
4739 edir->elf.ref_regular |= eind->elf.ref_regular;
4740 edir->elf.ref_regular_nonweak |= eind->elf.ref_regular_nonweak;
4741 edir->elf.needs_plt |= eind->elf.needs_plt;
a345bc8d 4742 edir->elf.pointer_equality_needed |= eind->elf.pointer_equality_needed;
c79d6685 4743
d311bc8b
AM
4744 /* If we were called to copy over info for a weak sym, don't copy
4745 dyn_relocs, plt/got info, or dynindx. We used to copy dyn_relocs
4746 in order to simplify readonly_dynrelocs and save a field in the
4747 symbol hash entry, but that means dyn_relocs can't be used in any
4748 tests about a specific symbol, or affect other symbol flags which
4749 are then tested.
4750 Chain weakdefs so we can get from the weakdef back to an alias.
4751 The list is circular so that we don't need to use u.weakdef as
4752 well as this list to look at all aliases. */
4753 if (eind->elf.root.type != bfd_link_hash_indirect)
4754 {
4755 struct ppc_link_hash_entry *cur, *add, *next;
4756
4757 add = eind;
4758 do
4759 {
4760 cur = edir->weakref;
4761 if (cur != NULL)
4762 {
4763 do
4764 {
4765 /* We can be called twice for the same symbols.
4766 Don't make multiple loops. */
4767 if (cur == add)
4768 return;
4769 cur = cur->weakref;
4770 } while (cur != edir);
4771 }
4772 next = add->weakref;
4773 if (cur != add)
4774 {
4775 add->weakref = edir->weakref != NULL ? edir->weakref : edir;
4776 edir->weakref = add;
4777 }
4778 add = next;
4779 } while (add != NULL && add != eind);
4780 return;
4781 }
4782
411e1bfb 4783 /* Copy over any dynamic relocs we may have on the indirect sym. */
bbd7ec4a 4784 if (eind->dyn_relocs != NULL)
65f38f15 4785 {
bbd7ec4a
AM
4786 if (edir->dyn_relocs != NULL)
4787 {
6061a67d
AM
4788 struct elf_dyn_relocs **pp;
4789 struct elf_dyn_relocs *p;
bbd7ec4a 4790
fcfa13d2 4791 /* Add reloc counts against the indirect sym to the direct sym
bbd7ec4a
AM
4792 list. Merge any entries against the same section. */
4793 for (pp = &eind->dyn_relocs; (p = *pp) != NULL; )
4794 {
6061a67d 4795 struct elf_dyn_relocs *q;
bbd7ec4a
AM
4796
4797 for (q = edir->dyn_relocs; q != NULL; q = q->next)
4798 if (q->sec == p->sec)
4799 {
4800 q->pc_count += p->pc_count;
4801 q->count += p->count;
4802 *pp = p->next;
4803 break;
4804 }
4805 if (q == NULL)
4806 pp = &p->next;
4807 }
4808 *pp = edir->dyn_relocs;
4809 }
4810
65f38f15
AM
4811 edir->dyn_relocs = eind->dyn_relocs;
4812 eind->dyn_relocs = NULL;
4813 }
65f38f15 4814
81848ca0
AM
4815 /* Copy over got entries that we may have already seen to the
4816 symbol which just became indirect. */
411e1bfb
AM
4817 if (eind->elf.got.glist != NULL)
4818 {
4819 if (edir->elf.got.glist != NULL)
4820 {
4821 struct got_entry **entp;
4822 struct got_entry *ent;
4823
4824 for (entp = &eind->elf.got.glist; (ent = *entp) != NULL; )
4825 {
4826 struct got_entry *dent;
4827
4828 for (dent = edir->elf.got.glist; dent != NULL; dent = dent->next)
4829 if (dent->addend == ent->addend
e717da7e 4830 && dent->owner == ent->owner
411e1bfb
AM
4831 && dent->tls_type == ent->tls_type)
4832 {
4833 dent->got.refcount += ent->got.refcount;
4834 *entp = ent->next;
4835 break;
4836 }
4837 if (dent == NULL)
4838 entp = &ent->next;
4839 }
4840 *entp = edir->elf.got.glist;
4841 }
4842
4843 edir->elf.got.glist = eind->elf.got.glist;
4844 eind->elf.got.glist = NULL;
4845 }
4846
4847 /* And plt entries. */
40d16e0b 4848 move_plt_plist (eind, edir);
411e1bfb 4849
fcfa13d2 4850 if (eind->elf.dynindx != -1)
411e1bfb 4851 {
fcfa13d2
AM
4852 if (edir->elf.dynindx != -1)
4853 _bfd_elf_strtab_delref (elf_hash_table (info)->dynstr,
4854 edir->elf.dynstr_index);
411e1bfb
AM
4855 edir->elf.dynindx = eind->elf.dynindx;
4856 edir->elf.dynstr_index = eind->elf.dynstr_index;
4857 eind->elf.dynindx = -1;
4858 eind->elf.dynstr_index = 0;
4859 }
411e1bfb
AM
4860}
4861
8387904d
AM
4862/* Find the function descriptor hash entry from the given function code
4863 hash entry FH. Link the entries via their OH fields. */
4864
4865static struct ppc_link_hash_entry *
b31867b6 4866lookup_fdh (struct ppc_link_hash_entry *fh, struct ppc_link_hash_table *htab)
8387904d
AM
4867{
4868 struct ppc_link_hash_entry *fdh = fh->oh;
4869
4870 if (fdh == NULL)
4871 {
4872 const char *fd_name = fh->elf.root.root.string + 1;
4873
4874 fdh = (struct ppc_link_hash_entry *)
4875 elf_link_hash_lookup (&htab->elf, fd_name, FALSE, FALSE, FALSE);
b31867b6
AM
4876 if (fdh == NULL)
4877 return fdh;
4878
4879 fdh->is_func_descriptor = 1;
4880 fdh->oh = fh;
4881 fh->is_func = 1;
4882 fh->oh = fdh;
8387904d
AM
4883 }
4884
b31867b6 4885 return ppc_follow_link (fdh);
8387904d
AM
4886}
4887
bb700d78
AM
4888/* Make a fake function descriptor sym for the code sym FH. */
4889
4890static struct ppc_link_hash_entry *
4891make_fdh (struct bfd_link_info *info,
908b32fc 4892 struct ppc_link_hash_entry *fh)
bb700d78
AM
4893{
4894 bfd *abfd;
4895 asymbol *newsym;
4896 struct bfd_link_hash_entry *bh;
4897 struct ppc_link_hash_entry *fdh;
4898
4899 abfd = fh->elf.root.u.undef.abfd;
4900 newsym = bfd_make_empty_symbol (abfd);
4901 newsym->name = fh->elf.root.root.string + 1;
4902 newsym->section = bfd_und_section_ptr;
4903 newsym->value = 0;
908b32fc 4904 newsym->flags = BSF_WEAK;
bb700d78
AM
4905
4906 bh = NULL;
4907 if (!_bfd_generic_link_add_one_symbol (info, abfd, newsym->name,
4908 newsym->flags, newsym->section,
4909 newsym->value, NULL, FALSE, FALSE,
4910 &bh))
4911 return NULL;
4912
4913 fdh = (struct ppc_link_hash_entry *) bh;
4914 fdh->elf.non_elf = 0;
908b32fc
AM
4915 fdh->fake = 1;
4916 fdh->is_func_descriptor = 1;
4917 fdh->oh = fh;
4918 fh->is_func = 1;
4919 fh->oh = fdh;
bb700d78
AM
4920 return fdh;
4921}
4922
8387904d
AM
4923/* Fix function descriptor symbols defined in .opd sections to be
4924 function type. */
555cd476
AM
4925
4926static bfd_boolean
c16153ae 4927ppc64_elf_add_symbol_hook (bfd *ibfd,
e054468f 4928 struct bfd_link_info *info,
555cd476 4929 Elf_Internal_Sym *isym,
6911b7dc 4930 const char **name,
555cd476
AM
4931 flagword *flags ATTRIBUTE_UNUSED,
4932 asection **sec,
b53dfeb2 4933 bfd_vma *value)
555cd476 4934{
a43942db 4935 if (ELF_ST_TYPE (isym->st_info) == STT_GNU_IFUNC
f1885d1e
AM
4936 && (ibfd->flags & DYNAMIC) == 0
4937 && bfd_get_flavour (info->output_bfd) == bfd_target_elf_flavour)
a43942db 4938 elf_tdata (info->output_bfd)->has_gnu_symbols |= elf_gnu_symbol_ifunc;
f64b2e8d 4939
b53dfeb2 4940 if (*sec != NULL
f1885d1e 4941 && strcmp ((*sec)->name, ".opd") == 0)
b53dfeb2
AM
4942 {
4943 asection *code_sec;
4944
4945 if (!(ELF_ST_TYPE (isym->st_info) == STT_GNU_IFUNC
4946 || ELF_ST_TYPE (isym->st_info) == STT_FUNC))
4947 isym->st_info = ELF_ST_INFO (ELF_ST_BIND (isym->st_info), STT_FUNC);
4948
4949 /* If the symbol is a function defined in .opd, and the function
4950 code is in a discarded group, let it appear to be undefined. */
0e1862bb 4951 if (!bfd_link_relocatable (info)
b53dfeb2
AM
4952 && (*sec)->reloc_count != 0
4953 && opd_entry_value (*sec, *value, &code_sec, NULL,
4954 FALSE) != (bfd_vma) -1
4955 && discarded_section (code_sec))
4956 {
4957 *sec = bfd_und_section_ptr;
4958 isym->st_shndx = SHN_UNDEF;
4959 }
4960 }
dbd1e97e
AM
4961 else if (*sec != NULL
4962 && strcmp ((*sec)->name, ".toc") == 0
4963 && ELF_ST_TYPE (isym->st_info) == STT_OBJECT)
4964 {
4965 struct ppc_link_hash_table *htab = ppc_hash_table (info);
4966 if (htab != NULL)
4967 htab->params->object_in_toc = 1;
4968 }
433817dd 4969
6911b7dc
AM
4970 if ((STO_PPC64_LOCAL_MASK & isym->st_other) != 0)
4971 {
4972 if (abiversion (ibfd) == 0)
4973 set_abiversion (ibfd, 2);
4974 else if (abiversion (ibfd) == 1)
4975 {
4976 info->callbacks->einfo (_("%P: symbol '%s' has invalid st_other"
4977 " for ABI version 1\n"), name);
4978 bfd_set_error (bfd_error_bad_value);
4979 return FALSE;
4980 }
4981 }
4982
555cd476
AM
4983 return TRUE;
4984}
4985
6911b7dc
AM
4986/* Merge non-visibility st_other attributes: local entry point. */
4987
4988static void
4989ppc64_elf_merge_symbol_attribute (struct elf_link_hash_entry *h,
4990 const Elf_Internal_Sym *isym,
4991 bfd_boolean definition,
4992 bfd_boolean dynamic)
4993{
4994 if (definition && !dynamic)
4995 h->other = ((isym->st_other & ~ELF_ST_VISIBILITY (-1))
4996 | ELF_ST_VISIBILITY (h->other));
4997}
4998
8387904d 4999/* This function makes an old ABI object reference to ".bar" cause the
908b32fc
AM
5000 inclusion of a new ABI object archive that defines "bar".
5001 NAME is a symbol defined in an archive. Return a symbol in the hash
5002 table that might be satisfied by the archive symbols. */
8387904d
AM
5003
5004static struct elf_link_hash_entry *
5005ppc64_elf_archive_symbol_lookup (bfd *abfd,
5006 struct bfd_link_info *info,
5007 const char *name)
5008{
5009 struct elf_link_hash_entry *h;
5010 char *dot_name;
5011 size_t len;
5012
5013 h = _bfd_elf_archive_symbol_lookup (abfd, info, name);
908b32fc
AM
5014 if (h != NULL
5015 /* Don't return this sym if it is a fake function descriptor
5016 created by add_symbol_adjust. */
5017 && !(h->root.type == bfd_link_hash_undefweak
5018 && ((struct ppc_link_hash_entry *) h)->fake))
8387904d
AM
5019 return h;
5020
5021 if (name[0] == '.')
5022 return h;
5023
5024 len = strlen (name);
5025 dot_name = bfd_alloc (abfd, len + 2);
5026 if (dot_name == NULL)
5027 return (struct elf_link_hash_entry *) 0 - 1;
5028 dot_name[0] = '.';
5029 memcpy (dot_name + 1, name, len + 1);
5030 h = _bfd_elf_archive_symbol_lookup (abfd, info, dot_name);
5031 bfd_release (abfd, dot_name);
5032 return h;
5033}
5034
5035/* This function satisfies all old ABI object references to ".bar" if a
99877b66
AM
5036 new ABI object defines "bar". Well, at least, undefined dot symbols
5037 are made weak. This stops later archive searches from including an
5038 object if we already have a function descriptor definition. It also
35b0ce59
AM
5039 prevents the linker complaining about undefined symbols.
5040 We also check and correct mismatched symbol visibility here. The
5041 most restrictive visibility of the function descriptor and the
5042 function entry symbol is used. */
8387904d
AM
5043
5044static bfd_boolean
b3fac117 5045add_symbol_adjust (struct ppc_link_hash_entry *eh, struct bfd_link_info *info)
8387904d 5046{
8387904d
AM
5047 struct ppc_link_hash_table *htab;
5048 struct ppc_link_hash_entry *fdh;
5049
b3fac117 5050 if (eh->elf.root.type == bfd_link_hash_indirect)
8387904d
AM
5051 return TRUE;
5052
b3fac117
AM
5053 if (eh->elf.root.type == bfd_link_hash_warning)
5054 eh = (struct ppc_link_hash_entry *) eh->elf.root.u.i.link;
8387904d 5055
b3fac117
AM
5056 if (eh->elf.root.root.string[0] != '.')
5057 abort ();
8387904d 5058
b3fac117 5059 htab = ppc_hash_table (info);
4dfe6ac6
NC
5060 if (htab == NULL)
5061 return FALSE;
5062
b31867b6
AM
5063 fdh = lookup_fdh (eh, htab);
5064 if (fdh == NULL)
5065 {
0e1862bb 5066 if (!bfd_link_relocatable (info)
b31867b6
AM
5067 && (eh->elf.root.type == bfd_link_hash_undefined
5068 || eh->elf.root.type == bfd_link_hash_undefweak)
5069 && eh->elf.ref_regular)
5070 {
5071 /* Make an undefweak function descriptor sym, which is enough to
5072 pull in an --as-needed shared lib, but won't cause link
5073 errors. Archives are handled elsewhere. */
5074 fdh = make_fdh (info, eh);
5075 if (fdh == NULL)
5076 return FALSE;
5077 fdh->elf.ref_regular = 1;
5078 }
bb700d78 5079 }
b31867b6 5080 else
8387904d 5081 {
35b0ce59
AM
5082 unsigned entry_vis = ELF_ST_VISIBILITY (eh->elf.other) - 1;
5083 unsigned descr_vis = ELF_ST_VISIBILITY (fdh->elf.other) - 1;
5084 if (entry_vis < descr_vis)
5085 fdh->elf.other += entry_vis - descr_vis;
5086 else if (entry_vis > descr_vis)
5087 eh->elf.other += descr_vis - entry_vis;
5088
e87d886e
AM
5089 if ((fdh->elf.root.type == bfd_link_hash_defined
5090 || fdh->elf.root.type == bfd_link_hash_defweak)
5091 && eh->elf.root.type == bfd_link_hash_undefined)
35b0ce59
AM
5092 {
5093 eh->elf.root.type = bfd_link_hash_undefweak;
5094 eh->was_undefined = 1;
5095 htab->twiddled_syms = 1;
5096 }
8387904d 5097 }
99877b66 5098
8387904d
AM
5099 return TRUE;
5100}
5101
f6c7c3e8
AM
5102/* Set up opd section info and abiversion for IBFD, and process list
5103 of dot-symbols we made in link_hash_newfunc. */
b3fac117 5104
8387904d 5105static bfd_boolean
f6c7c3e8 5106ppc64_elf_before_check_relocs (bfd *ibfd, struct bfd_link_info *info)
8387904d 5107{
99877b66 5108 struct ppc_link_hash_table *htab;
b3fac117 5109 struct ppc_link_hash_entry **p, *eh;
459609d6 5110 asection *opd = bfd_get_section_by_name (ibfd, ".opd");
433817dd 5111
459609d6 5112 if (opd != NULL && opd->size != 0)
b3fac117 5113 {
459609d6
AM
5114 if (abiversion (ibfd) == 0)
5115 set_abiversion (ibfd, 1);
8a2058b5 5116 else if (abiversion (ibfd) >= 2)
f6c7c3e8 5117 {
459609d6
AM
5118 info->callbacks->einfo (_("%P: %B .opd not allowed in ABI"
5119 " version %d\n"),
5120 ibfd, abiversion (ibfd));
5121 bfd_set_error (bfd_error_bad_value);
5122 return FALSE;
f6c7c3e8
AM
5123 }
5124
459609d6
AM
5125 if ((ibfd->flags & DYNAMIC) == 0
5126 && (opd->flags & SEC_RELOC) != 0
5127 && opd->reloc_count != 0
5128 && !bfd_is_abs_section (opd->output_section))
b3fac117 5129 {
459609d6
AM
5130 /* Garbage collection needs some extra help with .opd sections.
5131 We don't want to necessarily keep everything referenced by
5132 relocs in .opd, as that would keep all functions. Instead,
5133 if we reference an .opd symbol (a function descriptor), we
5134 want to keep the function code symbol's section. This is
5135 easy for global symbols, but for local syms we need to keep
5136 information about the associated function section. */
5137 bfd_size_type amt;
5138 asection **opd_sym_map;
5139
51aecdc5 5140 amt = OPD_NDX (opd->size) * sizeof (*opd_sym_map);
459609d6
AM
5141 opd_sym_map = bfd_zalloc (ibfd, amt);
5142 if (opd_sym_map == NULL)
b3fac117 5143 return FALSE;
459609d6
AM
5144 ppc64_elf_section_data (opd)->u.opd.func_sec = opd_sym_map;
5145 BFD_ASSERT (ppc64_elf_section_data (opd)->sec_type == sec_normal);
5146 ppc64_elf_section_data (opd)->sec_type = sec_opd;
b3fac117
AM
5147 }
5148 }
5149
459609d6
AM
5150 if (!is_ppc64_elf (info->output_bfd))
5151 return TRUE;
5152 htab = ppc_hash_table (info);
5153 if (htab == NULL)
5154 return FALSE;
5155
5156 /* For input files without an explicit abiversion in e_flags
5157 we should have flagged any with symbol st_other bits set
5158 as ELFv1 and above flagged those with .opd as ELFv2.
5159 Set the output abiversion if not yet set, and for any input
5160 still ambiguous, take its abiversion from the output.
5161 Differences in ABI are reported later. */
5162 if (abiversion (info->output_bfd) == 0)
5163 set_abiversion (info->output_bfd, abiversion (ibfd));
5164 else if (abiversion (ibfd) == 0)
5165 set_abiversion (ibfd, abiversion (info->output_bfd));
5166
5167 p = &htab->dot_syms;
5168 while ((eh = *p) != NULL)
5169 {
5170 *p = NULL;
5171 if (&eh->elf == htab->elf.hgot)
5172 ;
5173 else if (htab->elf.hgot == NULL
5174 && strcmp (eh->elf.root.root.string, ".TOC.") == 0)
5175 htab->elf.hgot = &eh->elf;
5176 else if (!add_symbol_adjust (eh, info))
5177 return FALSE;
5178 p = &eh->u.next_dot_sym;
5179 }
5180
b3fac117
AM
5181 /* Clear the list for non-ppc64 input files. */
5182 p = &htab->dot_syms;
5183 while ((eh = *p) != NULL)
5184 {
5185 *p = NULL;
5186 p = &eh->u.next_dot_sym;
5187 }
99877b66
AM
5188
5189 /* We need to fix the undefs list for any syms we have twiddled to
57e7d118 5190 undefweak. */
99877b66
AM
5191 if (htab->twiddled_syms)
5192 {
77cfaee6 5193 bfd_link_repair_undef_list (&htab->elf.root);
99877b66
AM
5194 htab->twiddled_syms = 0;
5195 }
b3fac117 5196 return TRUE;
8387904d
AM
5197}
5198
97fed1c9
JJ
5199/* Undo hash table changes when an --as-needed input file is determined
5200 not to be needed. */
5201
5202static bfd_boolean
e5034e59
AM
5203ppc64_elf_notice_as_needed (bfd *ibfd,
5204 struct bfd_link_info *info,
5205 enum notice_asneeded_action act)
97fed1c9 5206{
e5034e59
AM
5207 if (act == notice_not_needed)
5208 {
5209 struct ppc_link_hash_table *htab = ppc_hash_table (info);
4dfe6ac6 5210
e5034e59
AM
5211 if (htab == NULL)
5212 return FALSE;
4dfe6ac6 5213
e5034e59
AM
5214 htab->dot_syms = NULL;
5215 }
5216 return _bfd_elf_notice_as_needed (ibfd, info, act);
97fed1c9
JJ
5217}
5218
aa374f67
AM
5219/* If --just-symbols against a final linked binary, then assume we need
5220 toc adjusting stubs when calling functions defined there. */
5221
5222static void
5223ppc64_elf_link_just_syms (asection *sec, struct bfd_link_info *info)
5224{
5225 if ((sec->flags & SEC_CODE) != 0
5226 && (sec->owner->flags & (EXEC_P | DYNAMIC)) != 0
5227 && is_ppc64_elf (sec->owner))
5228 {
2c3f079f
AM
5229 if (abiversion (sec->owner) >= 2
5230 || bfd_get_section_by_name (sec->owner, ".opd") != NULL)
aa374f67
AM
5231 sec->has_toc_reloc = 1;
5232 }
5233 _bfd_elf_link_just_syms (sec, info);
5234}
5235
e054468f 5236static struct plt_entry **
4ce794b7
AM
5237update_local_sym_info (bfd *abfd, Elf_Internal_Shdr *symtab_hdr,
5238 unsigned long r_symndx, bfd_vma r_addend, int tls_type)
411e1bfb
AM
5239{
5240 struct got_entry **local_got_ents = elf_local_got_ents (abfd);
e054468f 5241 struct plt_entry **local_plt;
f961d9dd 5242 unsigned char *local_got_tls_masks;
411e1bfb
AM
5243
5244 if (local_got_ents == NULL)
5245 {
5246 bfd_size_type size = symtab_hdr->sh_info;
5247
e054468f
AM
5248 size *= (sizeof (*local_got_ents)
5249 + sizeof (*local_plt)
5250 + sizeof (*local_got_tls_masks));
4ce794b7 5251 local_got_ents = bfd_zalloc (abfd, size);
411e1bfb 5252 if (local_got_ents == NULL)
e054468f 5253 return NULL;
411e1bfb
AM
5254 elf_local_got_ents (abfd) = local_got_ents;
5255 }
5256
e054468f 5257 if ((tls_type & (PLT_IFUNC | TLS_EXPLICIT)) == 0)
411e1bfb
AM
5258 {
5259 struct got_entry *ent;
5260
5261 for (ent = local_got_ents[r_symndx]; ent != NULL; ent = ent->next)
e717da7e
AM
5262 if (ent->addend == r_addend
5263 && ent->owner == abfd
5264 && ent->tls_type == tls_type)
411e1bfb
AM
5265 break;
5266 if (ent == NULL)
5267 {
5268 bfd_size_type amt = sizeof (*ent);
4ce794b7 5269 ent = bfd_alloc (abfd, amt);
411e1bfb
AM
5270 if (ent == NULL)
5271 return FALSE;
5272 ent->next = local_got_ents[r_symndx];
5273 ent->addend = r_addend;
e717da7e 5274 ent->owner = abfd;
411e1bfb 5275 ent->tls_type = tls_type;
927be08e 5276 ent->is_indirect = FALSE;
411e1bfb
AM
5277 ent->got.refcount = 0;
5278 local_got_ents[r_symndx] = ent;
5279 }
5280 ent->got.refcount += 1;
5281 }
5282
e054468f 5283 local_plt = (struct plt_entry **) (local_got_ents + symtab_hdr->sh_info);
f961d9dd 5284 local_got_tls_masks = (unsigned char *) (local_plt + symtab_hdr->sh_info);
e7b938ca 5285 local_got_tls_masks[r_symndx] |= tls_type;
e054468f
AM
5286
5287 return local_plt + r_symndx;
65f38f15
AM
5288}
5289
411e1bfb 5290static bfd_boolean
e054468f 5291update_plt_info (bfd *abfd, struct plt_entry **plist, bfd_vma addend)
1e2f5b6e 5292{
411e1bfb 5293 struct plt_entry *ent;
1e2f5b6e 5294
e054468f 5295 for (ent = *plist; ent != NULL; ent = ent->next)
411e1bfb
AM
5296 if (ent->addend == addend)
5297 break;
5298 if (ent == NULL)
1e2f5b6e 5299 {
411e1bfb 5300 bfd_size_type amt = sizeof (*ent);
4ce794b7 5301 ent = bfd_alloc (abfd, amt);
411e1bfb
AM
5302 if (ent == NULL)
5303 return FALSE;
e054468f 5304 ent->next = *plist;
411e1bfb
AM
5305 ent->addend = addend;
5306 ent->plt.refcount = 0;
e054468f 5307 *plist = ent;
1e2f5b6e 5308 }
411e1bfb 5309 ent->plt.refcount += 1;
b34976b6 5310 return TRUE;
1e2f5b6e
AM
5311}
5312
e054468f
AM
5313static bfd_boolean
5314is_branch_reloc (enum elf_ppc64_reloc_type r_type)
5315{
5316 return (r_type == R_PPC64_REL24
5317 || r_type == R_PPC64_REL14
5318 || r_type == R_PPC64_REL14_BRTAKEN
5319 || r_type == R_PPC64_REL14_BRNTAKEN
5320 || r_type == R_PPC64_ADDR24
5321 || r_type == R_PPC64_ADDR14
5322 || r_type == R_PPC64_ADDR14_BRTAKEN
5323 || r_type == R_PPC64_ADDR14_BRNTAKEN);
5324}
5325
5bd4f169 5326/* Look through the relocs for a section during the first phase, and
65f38f15 5327 calculate needed space in the global offset table, procedure
5d1634d7 5328 linkage table, and dynamic reloc sections. */
5bd4f169 5329
b34976b6 5330static bfd_boolean
4ce794b7
AM
5331ppc64_elf_check_relocs (bfd *abfd, struct bfd_link_info *info,
5332 asection *sec, const Elf_Internal_Rela *relocs)
5bd4f169 5333{
65f38f15 5334 struct ppc_link_hash_table *htab;
5bd4f169 5335 Elf_Internal_Shdr *symtab_hdr;
c7e2358a 5336 struct elf_link_hash_entry **sym_hashes;
5bd4f169
AM
5337 const Elf_Internal_Rela *rel;
5338 const Elf_Internal_Rela *rel_end;
5bd4f169 5339 asection *sreloc;
1e2f5b6e 5340 asection **opd_sym_map;
3a71aa26 5341 struct elf_link_hash_entry *tga, *dottga;
5bd4f169 5342
0e1862bb 5343 if (bfd_link_relocatable (info))
b34976b6 5344 return TRUE;
5bd4f169 5345
680a3378
AM
5346 /* Don't do anything special with non-loaded, non-alloced sections.
5347 In particular, any relocs in such sections should not affect GOT
5348 and PLT reference counting (ie. we don't allow them to create GOT
5349 or PLT entries), there's no possibility or desire to optimize TLS
5350 relocs, and there's not much point in propagating relocs to shared
5351 libs that the dynamic linker won't relocate. */
5352 if ((sec->flags & SEC_ALLOC) == 0)
5353 return TRUE;
5354
0c8d6e5c 5355 BFD_ASSERT (is_ppc64_elf (abfd));
0ffa91dd 5356
65f38f15 5357 htab = ppc_hash_table (info);
4dfe6ac6
NC
5358 if (htab == NULL)
5359 return FALSE;
5360
3a71aa26
AM
5361 tga = elf_link_hash_lookup (&htab->elf, "__tls_get_addr",
5362 FALSE, FALSE, TRUE);
5363 dottga = elf_link_hash_lookup (&htab->elf, ".__tls_get_addr",
5364 FALSE, FALSE, TRUE);
0ffa91dd 5365 symtab_hdr = &elf_symtab_hdr (abfd);
5bd4f169 5366 sym_hashes = elf_sym_hashes (abfd);
5bd4f169 5367 sreloc = NULL;
1e2f5b6e 5368 opd_sym_map = NULL;
f6c7c3e8
AM
5369 if (ppc64_elf_section_data (sec) != NULL
5370 && ppc64_elf_section_data (sec)->sec_type == sec_opd)
5371 opd_sym_map = ppc64_elf_section_data (sec)->u.opd.func_sec;
5bd4f169
AM
5372
5373 rel_end = relocs + sec->reloc_count;
5374 for (rel = relocs; rel < rel_end; rel++)
5375 {
5376 unsigned long r_symndx;
5377 struct elf_link_hash_entry *h;
04c9666a 5378 enum elf_ppc64_reloc_type r_type;
727fc41e 5379 int tls_type;
7c8fe5c4 5380 struct _ppc64_elf_section_data *ppc64_sec;
cbf95972 5381 struct plt_entry **ifunc, **plt_list;
5bd4f169
AM
5382
5383 r_symndx = ELF64_R_SYM (rel->r_info);
5384 if (r_symndx < symtab_hdr->sh_info)
5385 h = NULL;
5386 else
973a3492
L
5387 {
5388 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
b31867b6 5389 h = elf_follow_link (h);
81fbe831
AM
5390
5391 /* PR15323, ref flags aren't set for references in the same
5392 object. */
5393 h->root.non_ir_ref = 1;
1c865ab2
AM
5394
5395 if (h == htab->elf.hgot)
5396 sec->has_toc_reloc = 1;
973a3492 5397 }
5bd4f169 5398
727fc41e 5399 tls_type = 0;
e054468f 5400 ifunc = NULL;
25f23106
AM
5401 if (h != NULL)
5402 {
5403 if (h->type == STT_GNU_IFUNC)
5404 {
5405 h->needs_plt = 1;
5406 ifunc = &h->plt.plist;
5407 }
5408 }
5409 else
5410 {
5411 Elf_Internal_Sym *isym = bfd_sym_from_r_symndx (&htab->sym_cache,
5412 abfd, r_symndx);
5413 if (isym == NULL)
5414 return FALSE;
5415
5416 if (ELF_ST_TYPE (isym->st_info) == STT_GNU_IFUNC)
5417 {
5418 ifunc = update_local_sym_info (abfd, symtab_hdr, r_symndx,
5419 rel->r_addend, PLT_IFUNC);
5420 if (ifunc == NULL)
5421 return FALSE;
5422 }
5423 }
727fc41e 5424
cbf95972 5425 r_type = ELF64_R_TYPE (rel->r_info);
a33d1f77 5426 switch (r_type)
5bd4f169 5427 {
727fc41e
AM
5428 case R_PPC64_TLSGD:
5429 case R_PPC64_TLSLD:
5430 /* These special tls relocs tie a call to __tls_get_addr with
5431 its parameter symbol. */
5432 break;
5433
411e1bfb
AM
5434 case R_PPC64_GOT_TLSLD16:
5435 case R_PPC64_GOT_TLSLD16_LO:
5436 case R_PPC64_GOT_TLSLD16_HI:
5437 case R_PPC64_GOT_TLSLD16_HA:
951fd09b 5438 tls_type = TLS_TLS | TLS_LD;
411e1bfb
AM
5439 goto dogottls;
5440
5441 case R_PPC64_GOT_TLSGD16:
5442 case R_PPC64_GOT_TLSGD16_LO:
5443 case R_PPC64_GOT_TLSGD16_HI:
5444 case R_PPC64_GOT_TLSGD16_HA:
951fd09b 5445 tls_type = TLS_TLS | TLS_GD;
411e1bfb
AM
5446 goto dogottls;
5447
5448 case R_PPC64_GOT_TPREL16_DS:
5449 case R_PPC64_GOT_TPREL16_LO_DS:
5450 case R_PPC64_GOT_TPREL16_HI:
5451 case R_PPC64_GOT_TPREL16_HA:
0e1862bb 5452 if (bfd_link_pic (info))
411e1bfb
AM
5453 info->flags |= DF_STATIC_TLS;
5454 tls_type = TLS_TLS | TLS_TPREL;
5455 goto dogottls;
5456
5457 case R_PPC64_GOT_DTPREL16_DS:
5458 case R_PPC64_GOT_DTPREL16_LO_DS:
5459 case R_PPC64_GOT_DTPREL16_HI:
5460 case R_PPC64_GOT_DTPREL16_HA:
5461 tls_type = TLS_TLS | TLS_DTPREL;
5462 dogottls:
5463 sec->has_tls_reloc = 1;
5464 /* Fall thru */
5465
5bd4f169 5466 case R_PPC64_GOT16:
5bd4f169 5467 case R_PPC64_GOT16_DS:
65f38f15
AM
5468 case R_PPC64_GOT16_HA:
5469 case R_PPC64_GOT16_HI:
5470 case R_PPC64_GOT16_LO:
5bd4f169 5471 case R_PPC64_GOT16_LO_DS:
65f38f15 5472 /* This symbol requires a global offset table entry. */
4c52953f 5473 sec->has_toc_reloc = 1;
33c0ec9d
AM
5474 if (r_type == R_PPC64_GOT_TLSLD16
5475 || r_type == R_PPC64_GOT_TLSGD16
5476 || r_type == R_PPC64_GOT_TPREL16_DS
5477 || r_type == R_PPC64_GOT_DTPREL16_DS
5478 || r_type == R_PPC64_GOT16
5479 || r_type == R_PPC64_GOT16_DS)
5480 {
5481 htab->do_multi_toc = 1;
d77c8a4b 5482 ppc64_elf_tdata (abfd)->has_small_toc_reloc = 1;
33c0ec9d
AM
5483 }
5484
e717da7e
AM
5485 if (ppc64_elf_tdata (abfd)->got == NULL
5486 && !create_got_section (abfd, info))
b34976b6 5487 return FALSE;
5bd4f169
AM
5488
5489 if (h != NULL)
5490 {
411e1bfb
AM
5491 struct ppc_link_hash_entry *eh;
5492 struct got_entry *ent;
65f38f15 5493
411e1bfb
AM
5494 eh = (struct ppc_link_hash_entry *) h;
5495 for (ent = eh->elf.got.glist; ent != NULL; ent = ent->next)
5496 if (ent->addend == rel->r_addend
e717da7e 5497 && ent->owner == abfd
411e1bfb
AM
5498 && ent->tls_type == tls_type)
5499 break;
5500 if (ent == NULL)
5bd4f169 5501 {
411e1bfb 5502 bfd_size_type amt = sizeof (*ent);
4ce794b7 5503 ent = bfd_alloc (abfd, amt);
411e1bfb 5504 if (ent == NULL)
b34976b6 5505 return FALSE;
411e1bfb
AM
5506 ent->next = eh->elf.got.glist;
5507 ent->addend = rel->r_addend;
e717da7e 5508 ent->owner = abfd;
411e1bfb 5509 ent->tls_type = tls_type;
927be08e 5510 ent->is_indirect = FALSE;
411e1bfb
AM
5511 ent->got.refcount = 0;
5512 eh->elf.got.glist = ent;
5bd4f169 5513 }
411e1bfb 5514 ent->got.refcount += 1;
e7b938ca 5515 eh->tls_mask |= tls_type;
5bd4f169 5516 }
411e1bfb
AM
5517 else
5518 /* This is a global offset table entry for a local symbol. */
5519 if (!update_local_sym_info (abfd, symtab_hdr, r_symndx,
5520 rel->r_addend, tls_type))
5521 return FALSE;
a345bc8d
AM
5522
5523 /* We may also need a plt entry if the symbol turns out to be
5524 an ifunc. */
0e1862bb 5525 if (h != NULL && !bfd_link_pic (info) && abiversion (abfd) != 1)
a345bc8d
AM
5526 {
5527 if (!update_plt_info (abfd, &h->plt.plist, rel->r_addend))
5528 return FALSE;
5529 }
5bd4f169
AM
5530 break;
5531
5bd4f169 5532 case R_PPC64_PLT16_HA:
65f38f15
AM
5533 case R_PPC64_PLT16_HI:
5534 case R_PPC64_PLT16_LO:
5535 case R_PPC64_PLT32:
5536 case R_PPC64_PLT64:
cbf95972
AM
5537 /* This symbol requires a procedure linkage table entry. */
5538 plt_list = ifunc;
5539 if (h != NULL)
e054468f 5540 {
e054468f
AM
5541 h->needs_plt = 1;
5542 if (h->root.root.string[0] == '.'
5543 && h->root.root.string[1] != '\0')
5544 ((struct ppc_link_hash_entry *) h)->is_func = 1;
cbf95972
AM
5545 plt_list = &h->plt.plist;
5546 }
5547 if (plt_list == NULL)
5548 {
5549 /* It does not make sense to have a procedure linkage
5550 table entry for a non-ifunc local symbol. */
5551 info->callbacks->einfo
5552 (_("%P: %H: %s reloc against local symbol\n"),
5553 abfd, sec, rel->r_offset,
5554 ppc64_elf_howto_table[r_type]->name);
5555 bfd_set_error (bfd_error_bad_value);
5556 return FALSE;
e054468f 5557 }
cbf95972
AM
5558 if (!update_plt_info (abfd, plt_list, rel->r_addend))
5559 return FALSE;
5bd4f169
AM
5560 break;
5561
5562 /* The following relocations don't need to propagate the
5563 relocation if linking a shared object since they are
5564 section relative. */
5565 case R_PPC64_SECTOFF:
5566 case R_PPC64_SECTOFF_LO:
5567 case R_PPC64_SECTOFF_HI:
5568 case R_PPC64_SECTOFF_HA:
5569 case R_PPC64_SECTOFF_DS:
5570 case R_PPC64_SECTOFF_LO_DS:
411e1bfb
AM
5571 case R_PPC64_DTPREL16:
5572 case R_PPC64_DTPREL16_LO:
5573 case R_PPC64_DTPREL16_HI:
5574 case R_PPC64_DTPREL16_HA:
5575 case R_PPC64_DTPREL16_DS:
5576 case R_PPC64_DTPREL16_LO_DS:
f9c6b907
AM
5577 case R_PPC64_DTPREL16_HIGH:
5578 case R_PPC64_DTPREL16_HIGHA:
411e1bfb
AM
5579 case R_PPC64_DTPREL16_HIGHER:
5580 case R_PPC64_DTPREL16_HIGHERA:
5581 case R_PPC64_DTPREL16_HIGHEST:
5582 case R_PPC64_DTPREL16_HIGHESTA:
5bd4f169
AM
5583 break;
5584
ad8e1ba5 5585 /* Nor do these. */
25f23106
AM
5586 case R_PPC64_REL16:
5587 case R_PPC64_REL16_LO:
5588 case R_PPC64_REL16_HI:
5589 case R_PPC64_REL16_HA:
a680de9a 5590 case R_PPC64_REL16DX_HA:
25f23106
AM
5591 break;
5592
45965137
AM
5593 /* Not supported as a dynamic relocation. */
5594 case R_PPC64_ADDR64_LOCAL:
0e1862bb 5595 if (bfd_link_pic (info))
45965137
AM
5596 {
5597 if (!ppc64_elf_howto_table[R_PPC64_ADDR32])
5598 ppc_howto_init ();
5599 info->callbacks->einfo (_("%P: %H: %s reloc unsupported "
5600 "in shared libraries and PIEs.\n"),
5601 abfd, sec, rel->r_offset,
5602 ppc64_elf_howto_table[r_type]->name);
5603 bfd_set_error (bfd_error_bad_value);
5604 return FALSE;
5605 }
5606 break;
5607
ad8e1ba5 5608 case R_PPC64_TOC16:
33c0ec9d
AM
5609 case R_PPC64_TOC16_DS:
5610 htab->do_multi_toc = 1;
d77c8a4b 5611 ppc64_elf_tdata (abfd)->has_small_toc_reloc = 1;
ad8e1ba5
AM
5612 case R_PPC64_TOC16_LO:
5613 case R_PPC64_TOC16_HI:
5614 case R_PPC64_TOC16_HA:
ad8e1ba5 5615 case R_PPC64_TOC16_LO_DS:
4c52953f 5616 sec->has_toc_reloc = 1;
ad8e1ba5
AM
5617 break;
5618
006589cf
AM
5619 /* Marker reloc. */
5620 case R_PPC64_ENTRY:
5621 break;
5622
5bd4f169
AM
5623 /* This relocation describes the C++ object vtable hierarchy.
5624 Reconstruct it for later use during GC. */
5625 case R_PPC64_GNU_VTINHERIT:
c152c796 5626 if (!bfd_elf_gc_record_vtinherit (abfd, sec, h, rel->r_offset))
b34976b6 5627 return FALSE;
5bd4f169
AM
5628 break;
5629
5630 /* This relocation describes which C++ vtable entries are actually
5631 used. Record for later use during GC. */
5632 case R_PPC64_GNU_VTENTRY:
d17e0c6e
JB
5633 BFD_ASSERT (h != NULL);
5634 if (h != NULL
5635 && !bfd_elf_gc_record_vtentry (abfd, sec, h, rel->r_addend))
b34976b6 5636 return FALSE;
5bd4f169
AM
5637 break;
5638
721956f4
AM
5639 case R_PPC64_REL14:
5640 case R_PPC64_REL14_BRTAKEN:
5641 case R_PPC64_REL14_BRNTAKEN:
220c76dd
AM
5642 {
5643 asection *dest = NULL;
5644
5645 /* Heuristic: If jumping outside our section, chances are
5646 we are going to need a stub. */
5647 if (h != NULL)
5648 {
5649 /* If the sym is weak it may be overridden later, so
5650 don't assume we know where a weak sym lives. */
5651 if (h->root.type == bfd_link_hash_defined)
5652 dest = h->root.u.def.section;
5653 }
5654 else
87d72d41
AM
5655 {
5656 Elf_Internal_Sym *isym;
5657
5658 isym = bfd_sym_from_r_symndx (&htab->sym_cache,
5659 abfd, r_symndx);
5660 if (isym == NULL)
5661 return FALSE;
5662
5663 dest = bfd_section_from_elf_index (abfd, isym->st_shndx);
5664 }
5665
220c76dd 5666 if (dest != sec)
7c8fe5c4 5667 ppc64_elf_section_data (sec)->has_14bit_branch = 1;
220c76dd 5668 }
721956f4
AM
5669 /* Fall through. */
5670
5d1634d7 5671 case R_PPC64_REL24:
cbf95972
AM
5672 plt_list = ifunc;
5673 if (h != NULL)
5d1634d7 5674 {
e054468f
AM
5675 h->needs_plt = 1;
5676 if (h->root.root.string[0] == '.'
5677 && h->root.root.string[1] != '\0')
5678 ((struct ppc_link_hash_entry *) h)->is_func = 1;
cbf95972 5679
3a71aa26 5680 if (h == tga || h == dottga)
cbf95972
AM
5681 {
5682 sec->has_tls_reloc = 1;
5683 if (rel != relocs
5684 && (ELF64_R_TYPE (rel[-1].r_info) == R_PPC64_TLSGD
5685 || ELF64_R_TYPE (rel[-1].r_info) == R_PPC64_TLSLD))
5686 /* We have a new-style __tls_get_addr call with
5687 a marker reloc. */
5688 ;
5689 else
5690 /* Mark this section as having an old-style call. */
5691 sec->has_tls_get_addr_call = 1;
5692 }
5693 plt_list = &h->plt.plist;
411e1bfb 5694 }
cbf95972
AM
5695
5696 /* We may need a .plt entry if the function this reloc
5697 refers to is in a shared lib. */
5698 if (plt_list
5699 && !update_plt_info (abfd, plt_list, rel->r_addend))
5700 return FALSE;
411e1bfb
AM
5701 break;
5702
cbf95972
AM
5703 case R_PPC64_ADDR14:
5704 case R_PPC64_ADDR14_BRNTAKEN:
5705 case R_PPC64_ADDR14_BRTAKEN:
5706 case R_PPC64_ADDR24:
5707 goto dodyn;
5708
411e1bfb
AM
5709 case R_PPC64_TPREL64:
5710 tls_type = TLS_EXPLICIT | TLS_TLS | TLS_TPREL;
0e1862bb 5711 if (bfd_link_pic (info))
411e1bfb
AM
5712 info->flags |= DF_STATIC_TLS;
5713 goto dotlstoc;
5714
5715 case R_PPC64_DTPMOD64:
5716 if (rel + 1 < rel_end
5717 && rel[1].r_info == ELF64_R_INFO (r_symndx, R_PPC64_DTPREL64)
5718 && rel[1].r_offset == rel->r_offset + 8)
951fd09b 5719 tls_type = TLS_EXPLICIT | TLS_TLS | TLS_GD;
411e1bfb 5720 else
951fd09b 5721 tls_type = TLS_EXPLICIT | TLS_TLS | TLS_LD;
411e1bfb
AM
5722 goto dotlstoc;
5723
5724 case R_PPC64_DTPREL64:
5725 tls_type = TLS_EXPLICIT | TLS_TLS | TLS_DTPREL;
5726 if (rel != relocs
5727 && rel[-1].r_info == ELF64_R_INFO (r_symndx, R_PPC64_DTPMOD64)
5728 && rel[-1].r_offset == rel->r_offset - 8)
5729 /* This is the second reloc of a dtpmod, dtprel pair.
5730 Don't mark with TLS_DTPREL. */
5731 goto dodyn;
5732
5733 dotlstoc:
5734 sec->has_tls_reloc = 1;
5735 if (h != NULL)
5736 {
5737 struct ppc_link_hash_entry *eh;
5738 eh = (struct ppc_link_hash_entry *) h;
e7b938ca 5739 eh->tls_mask |= tls_type;
411e1bfb
AM
5740 }
5741 else
5742 if (!update_local_sym_info (abfd, symtab_hdr, r_symndx,
5743 rel->r_addend, tls_type))
5744 return FALSE;
5745
7c8fe5c4
AM
5746 ppc64_sec = ppc64_elf_section_data (sec);
5747 if (ppc64_sec->sec_type != sec_toc)
411e1bfb 5748 {
3a71aa26
AM
5749 bfd_size_type amt;
5750
e7b938ca 5751 /* One extra to simplify get_tls_mask. */
3a71aa26
AM
5752 amt = sec->size * sizeof (unsigned) / 8 + sizeof (unsigned);
5753 ppc64_sec->u.toc.symndx = bfd_zalloc (abfd, amt);
5754 if (ppc64_sec->u.toc.symndx == NULL)
5755 return FALSE;
5756 amt = sec->size * sizeof (bfd_vma) / 8;
5757 ppc64_sec->u.toc.add = bfd_zalloc (abfd, amt);
5758 if (ppc64_sec->u.toc.add == NULL)
411e1bfb 5759 return FALSE;
7c8fe5c4
AM
5760 BFD_ASSERT (ppc64_sec->sec_type == sec_normal);
5761 ppc64_sec->sec_type = sec_toc;
411e1bfb
AM
5762 }
5763 BFD_ASSERT (rel->r_offset % 8 == 0);
3a71aa26
AM
5764 ppc64_sec->u.toc.symndx[rel->r_offset / 8] = r_symndx;
5765 ppc64_sec->u.toc.add[rel->r_offset / 8] = rel->r_addend;
951fd09b
AM
5766
5767 /* Mark the second slot of a GD or LD entry.
5768 -1 to indicate GD and -2 to indicate LD. */
5769 if (tls_type == (TLS_EXPLICIT | TLS_TLS | TLS_GD))
3a71aa26 5770 ppc64_sec->u.toc.symndx[rel->r_offset / 8 + 1] = -1;
951fd09b 5771 else if (tls_type == (TLS_EXPLICIT | TLS_TLS | TLS_LD))
3a71aa26 5772 ppc64_sec->u.toc.symndx[rel->r_offset / 8 + 1] = -2;
411e1bfb
AM
5773 goto dodyn;
5774
5775 case R_PPC64_TPREL16:
5776 case R_PPC64_TPREL16_LO:
5777 case R_PPC64_TPREL16_HI:
5778 case R_PPC64_TPREL16_HA:
5779 case R_PPC64_TPREL16_DS:
5780 case R_PPC64_TPREL16_LO_DS:
f9c6b907
AM
5781 case R_PPC64_TPREL16_HIGH:
5782 case R_PPC64_TPREL16_HIGHA:
411e1bfb
AM
5783 case R_PPC64_TPREL16_HIGHER:
5784 case R_PPC64_TPREL16_HIGHERA:
5785 case R_PPC64_TPREL16_HIGHEST:
5786 case R_PPC64_TPREL16_HIGHESTA:
0e1862bb 5787 if (bfd_link_pic (info))
411e1bfb 5788 {
afb93314 5789 info->flags |= DF_STATIC_TLS;
411e1bfb 5790 goto dodyn;
5d1634d7
AM
5791 }
5792 break;
5793
e86ce104 5794 case R_PPC64_ADDR64:
1e2f5b6e 5795 if (opd_sym_map != NULL
1e2f5b6e 5796 && rel + 1 < rel_end
4ce794b7 5797 && ELF64_R_TYPE ((rel + 1)->r_info) == R_PPC64_TOC)
1e2f5b6e 5798 {
8387904d
AM
5799 if (h != NULL)
5800 {
5801 if (h->root.root.string[0] == '.'
5802 && h->root.root.string[1] != 0
b31867b6 5803 && lookup_fdh ((struct ppc_link_hash_entry *) h, htab))
8387904d
AM
5804 ;
5805 else
5806 ((struct ppc_link_hash_entry *) h)->is_func = 1;
5807 }
5808 else
5809 {
5810 asection *s;
87d72d41 5811 Elf_Internal_Sym *isym;
1e2f5b6e 5812
87d72d41
AM
5813 isym = bfd_sym_from_r_symndx (&htab->sym_cache,
5814 abfd, r_symndx);
5815 if (isym == NULL)
8387904d 5816 return FALSE;
87d72d41
AM
5817
5818 s = bfd_section_from_elf_index (abfd, isym->st_shndx);
5819 if (s != NULL && s != sec)
51aecdc5 5820 opd_sym_map[OPD_NDX (rel->r_offset)] = s;
8387904d 5821 }
1e2f5b6e 5822 }
e86ce104
AM
5823 /* Fall through. */
5824
65f38f15
AM
5825 case R_PPC64_ADDR16:
5826 case R_PPC64_ADDR16_DS:
5827 case R_PPC64_ADDR16_HA:
5828 case R_PPC64_ADDR16_HI:
f9c6b907
AM
5829 case R_PPC64_ADDR16_HIGH:
5830 case R_PPC64_ADDR16_HIGHA:
65f38f15
AM
5831 case R_PPC64_ADDR16_HIGHER:
5832 case R_PPC64_ADDR16_HIGHERA:
5833 case R_PPC64_ADDR16_HIGHEST:
5834 case R_PPC64_ADDR16_HIGHESTA:
5835 case R_PPC64_ADDR16_LO:
5836 case R_PPC64_ADDR16_LO_DS:
0e1862bb 5837 if (h != NULL && !bfd_link_pic (info) && abiversion (abfd) != 1
a345bc8d
AM
5838 && rel->r_addend == 0)
5839 {
5840 /* We may need a .plt entry if this reloc refers to a
5841 function in a shared lib. */
5842 if (!update_plt_info (abfd, &h->plt.plist, rel->r_addend))
5843 return FALSE;
5844 h->pointer_equality_needed = 1;
5845 }
5846 /* Fall through. */
5847
5848 case R_PPC64_REL30:
5849 case R_PPC64_REL32:
5850 case R_PPC64_REL64:
65f38f15 5851 case R_PPC64_ADDR32:
65f38f15
AM
5852 case R_PPC64_UADDR16:
5853 case R_PPC64_UADDR32:
5854 case R_PPC64_UADDR64:
5bd4f169 5855 case R_PPC64_TOC:
0e1862bb 5856 if (h != NULL && !bfd_link_pic (info))
81848ca0 5857 /* We may need a copy reloc. */
f5385ebf 5858 h->non_got_ref = 1;
81848ca0 5859
41bd81ab 5860 /* Don't propagate .opd relocs. */
1e2f5b6e 5861 if (NO_OPD_RELOCS && opd_sym_map != NULL)
e86ce104 5862 break;
e86ce104 5863
65f38f15
AM
5864 /* If we are creating a shared library, and this is a reloc
5865 against a global symbol, or a non PC relative reloc
5866 against a local symbol, then we need to copy the reloc
5867 into the shared library. However, if we are linking with
5868 -Bsymbolic, we do not need to copy a reloc against a
5869 global symbol which is defined in an object we are
5870 including in the link (i.e., DEF_REGULAR is set). At
5871 this point we have not seen all the input files, so it is
5872 possible that DEF_REGULAR is not set now but will be set
5873 later (it is never cleared). In case of a weak definition,
5874 DEF_REGULAR may be cleared later by a strong definition in
5875 a shared library. We account for that possibility below by
f4656909 5876 storing information in the dyn_relocs field of the hash
65f38f15
AM
5877 table entry. A similar situation occurs when creating
5878 shared libraries and symbol visibility changes render the
5879 symbol local.
5880
5881 If on the other hand, we are creating an executable, we
5882 may need to keep relocations for symbols satisfied by a
5883 dynamic library if we manage to avoid copy relocs for the
5884 symbol. */
411e1bfb 5885 dodyn:
0e1862bb 5886 if ((bfd_link_pic (info)
1d483afe 5887 && (must_be_dyn_reloc (info, r_type)
65f38f15 5888 || (h != NULL
198f1157 5889 && (!SYMBOLIC_BIND (info, h)
65f38f15 5890 || h->root.type == bfd_link_hash_defweak
f5385ebf 5891 || !h->def_regular))))
f4656909 5892 || (ELIMINATE_COPY_RELOCS
0e1862bb 5893 && !bfd_link_pic (info)
65f38f15
AM
5894 && h != NULL
5895 && (h->root.type == bfd_link_hash_defweak
25f23106 5896 || !h->def_regular))
0e1862bb 5897 || (!bfd_link_pic (info)
25f23106 5898 && ifunc != NULL))
5bd4f169 5899 {
65f38f15
AM
5900 /* We must copy these reloc types into the output file.
5901 Create a reloc section in dynobj and make room for
5902 this reloc. */
5bd4f169
AM
5903 if (sreloc == NULL)
5904 {
83bac4b0
NC
5905 sreloc = _bfd_elf_make_dynamic_reloc_section
5906 (sec, htab->elf.dynobj, 3, abfd, /*rela?*/ TRUE);
65f38f15 5907
5bd4f169 5908 if (sreloc == NULL)
83bac4b0 5909 return FALSE;
5bd4f169
AM
5910 }
5911
65f38f15
AM
5912 /* If this is a global symbol, we count the number of
5913 relocations we need for this symbol. */
5914 if (h != NULL)
5915 {
19e08130
AM
5916 struct elf_dyn_relocs *p;
5917 struct elf_dyn_relocs **head;
5918
ec338859 5919 head = &((struct ppc_link_hash_entry *) h)->dyn_relocs;
19e08130
AM
5920 p = *head;
5921 if (p == NULL || p->sec != sec)
5922 {
5923 p = bfd_alloc (htab->elf.dynobj, sizeof *p);
5924 if (p == NULL)
5925 return FALSE;
5926 p->next = *head;
5927 *head = p;
5928 p->sec = sec;
5929 p->count = 0;
5930 p->pc_count = 0;
5931 }
5932 p->count += 1;
5933 if (!must_be_dyn_reloc (info, r_type))
5934 p->pc_count += 1;
65f38f15
AM
5935 }
5936 else
5937 {
ec338859
AM
5938 /* Track dynamic relocs needed for local syms too.
5939 We really need local syms available to do this
5940 easily. Oh well. */
19e08130
AM
5941 struct ppc_dyn_relocs *p;
5942 struct ppc_dyn_relocs **head;
5943 bfd_boolean is_ifunc;
ec338859 5944 asection *s;
6edfbbad 5945 void *vpp;
87d72d41 5946 Elf_Internal_Sym *isym;
6edfbbad 5947
87d72d41
AM
5948 isym = bfd_sym_from_r_symndx (&htab->sym_cache,
5949 abfd, r_symndx);
5950 if (isym == NULL)
b34976b6 5951 return FALSE;
ec338859 5952
87d72d41
AM
5953 s = bfd_section_from_elf_index (abfd, isym->st_shndx);
5954 if (s == NULL)
5955 s = sec;
5956
6edfbbad 5957 vpp = &elf_section_data (s)->local_dynrel;
19e08130
AM
5958 head = (struct ppc_dyn_relocs **) vpp;
5959 is_ifunc = ELF_ST_TYPE (isym->st_info) == STT_GNU_IFUNC;
5960 p = *head;
5961 if (p != NULL && p->sec == sec && p->ifunc != is_ifunc)
5962 p = p->next;
5963 if (p == NULL || p->sec != sec || p->ifunc != is_ifunc)
5964 {
5965 p = bfd_alloc (htab->elf.dynobj, sizeof *p);
5966 if (p == NULL)
5967 return FALSE;
5968 p->next = *head;
5969 *head = p;
5970 p->sec = sec;
5971 p->ifunc = is_ifunc;
5972 p->count = 0;
5973 }
5974 p->count += 1;
ec338859 5975 }
65f38f15 5976 }
5bd4f169 5977 break;
65f38f15
AM
5978
5979 default:
96e0dda4 5980 break;
5bd4f169
AM
5981 }
5982 }
5983
b34976b6 5984 return TRUE;
5bd4f169
AM
5985}
5986
ee67d69a
AM
5987/* Merge backend specific data from an object file to the output
5988 object file when linking. */
5989
5990static bfd_boolean
5991ppc64_elf_merge_private_bfd_data (bfd *ibfd, bfd *obfd)
5992{
5993 unsigned long iflags, oflags;
5994
5995 if ((ibfd->flags & BFD_LINKER_CREATED) != 0)
5996 return TRUE;
5997
5998 if (!is_ppc64_elf (ibfd) || !is_ppc64_elf (obfd))
5999 return TRUE;
6000
6001 if (!_bfd_generic_verify_endian_match (ibfd, obfd))
6002 return FALSE;
6003
6004 iflags = elf_elfheader (ibfd)->e_flags;
6005 oflags = elf_elfheader (obfd)->e_flags;
6006
f6c7c3e8 6007 if (iflags & ~EF_PPC64_ABI)
ee67d69a
AM
6008 {
6009 (*_bfd_error_handler)
6010 (_("%B uses unknown e_flags 0x%lx"), ibfd, iflags);
6011 bfd_set_error (bfd_error_bad_value);
6012 return FALSE;
6013 }
f6c7c3e8 6014 else if (iflags != oflags && iflags != 0)
ee67d69a
AM
6015 {
6016 (*_bfd_error_handler)
6017 (_("%B: ABI version %ld is not compatible with ABI version %ld output"),
6018 ibfd, iflags, oflags);
6019 bfd_set_error (bfd_error_bad_value);
6020 return FALSE;
6021 }
6022
6023 /* Merge Tag_compatibility attributes and any common GNU ones. */
6024 _bfd_elf_merge_object_attributes (ibfd, obfd);
6025
6026 return TRUE;
6027}
6028
6029static bfd_boolean
6030ppc64_elf_print_private_bfd_data (bfd *abfd, void *ptr)
6031{
6032 /* Print normal ELF private data. */
6033 _bfd_elf_print_private_bfd_data (abfd, ptr);
6034
6035 if (elf_elfheader (abfd)->e_flags != 0)
6036 {
6037 FILE *file = ptr;
6038
6039 /* xgettext:c-format */
6040 fprintf (file, _("private flags = 0x%lx:"),
6041 elf_elfheader (abfd)->e_flags);
6042
6043 if ((elf_elfheader (abfd)->e_flags & EF_PPC64_ABI) != 0)
6044 fprintf (file, _(" [abiv%ld]"),
6045 elf_elfheader (abfd)->e_flags & EF_PPC64_ABI);
6046 fputc ('\n', file);
6047 }
6048
6049 return TRUE;
6050}
6051
8387904d 6052/* OFFSET in OPD_SEC specifies a function descriptor. Return the address
b53dfeb2
AM
6053 of the code entry point, and its section, which must be in the same
6054 object as OPD_SEC. Returns (bfd_vma) -1 on error. */
8387904d
AM
6055
6056static bfd_vma
6057opd_entry_value (asection *opd_sec,
6058 bfd_vma offset,
6059 asection **code_sec,
aef36ac1
AM
6060 bfd_vma *code_off,
6061 bfd_boolean in_code_sec)
8387904d
AM
6062{
6063 bfd *opd_bfd = opd_sec->owner;
8860955f 6064 Elf_Internal_Rela *relocs;
8387904d 6065 Elf_Internal_Rela *lo, *hi, *look;
645ea6a9 6066 bfd_vma val;
8387904d 6067
9f296da3
AM
6068 /* No relocs implies we are linking a --just-symbols object, or looking
6069 at a final linked executable with addr2line or somesuch. */
4b85d634
AM
6070 if (opd_sec->reloc_count == 0)
6071 {
729eabd5 6072 bfd_byte *contents = ppc64_elf_tdata (opd_bfd)->opd.contents;
3b36f7e6 6073
729eabd5
AM
6074 if (contents == NULL)
6075 {
6076 if (!bfd_malloc_and_get_section (opd_bfd, opd_sec, &contents))
6077 return (bfd_vma) -1;
6078 ppc64_elf_tdata (opd_bfd)->opd.contents = contents;
6079 }
ee1e4ede 6080
dbb3fbbb 6081 /* PR 17512: file: 64b9dfbb. */
451dfd38 6082 if (offset + 7 >= opd_sec->size || offset + 7 < offset)
dbb3fbbb
NC
6083 return (bfd_vma) -1;
6084
729eabd5 6085 val = bfd_get_64 (opd_bfd, contents + offset);
aef36ac1
AM
6086 if (code_sec != NULL)
6087 {
6088 asection *sec, *likely = NULL;
ee1e4ede 6089
aef36ac1 6090 if (in_code_sec)
4b85d634 6091 {
aef36ac1
AM
6092 sec = *code_sec;
6093 if (sec->vma <= val
6094 && val < sec->vma + sec->size)
6095 likely = sec;
6096 else
6097 val = -1;
6098 }
6099 else
6100 for (sec = opd_bfd->sections; sec != NULL; sec = sec->next)
6101 if (sec->vma <= val
6102 && (sec->flags & SEC_LOAD) != 0
6103 && (sec->flags & SEC_ALLOC) != 0)
6104 likely = sec;
6105 if (likely != NULL)
6106 {
6107 *code_sec = likely;
6108 if (code_off != NULL)
6109 *code_off = val - likely->vma;
4b85d634
AM
6110 }
6111 }
aef36ac1 6112 return val;
4b85d634
AM
6113 }
6114
0c8d6e5c 6115 BFD_ASSERT (is_ppc64_elf (opd_bfd));
0ffa91dd 6116
729eabd5 6117 relocs = ppc64_elf_tdata (opd_bfd)->opd.relocs;
8860955f
AM
6118 if (relocs == NULL)
6119 relocs = _bfd_elf_link_read_relocs (opd_bfd, opd_sec, NULL, NULL, TRUE);
877a8638
NC
6120 /* PR 17512: file: df8e1fd6. */
6121 if (relocs == NULL)
6122 return (bfd_vma) -1;
645ea6a9 6123
8387904d 6124 /* Go find the opd reloc at the sym address. */
8860955f 6125 lo = relocs;
8387904d 6126 hi = lo + opd_sec->reloc_count - 1; /* ignore last reloc */
645ea6a9 6127 val = (bfd_vma) -1;
8387904d
AM
6128 while (lo < hi)
6129 {
6130 look = lo + (hi - lo) / 2;
6131 if (look->r_offset < offset)
6132 lo = look + 1;
6133 else if (look->r_offset > offset)
6134 hi = look;
6135 else
6136 {
0ffa91dd
NC
6137 Elf_Internal_Shdr *symtab_hdr = &elf_symtab_hdr (opd_bfd);
6138
8387904d
AM
6139 if (ELF64_R_TYPE (look->r_info) == R_PPC64_ADDR64
6140 && ELF64_R_TYPE ((look + 1)->r_info) == R_PPC64_TOC)
6141 {
6142 unsigned long symndx = ELF64_R_SYM (look->r_info);
b53dfeb2 6143 asection *sec = NULL;
8387904d 6144
b53dfeb2
AM
6145 if (symndx >= symtab_hdr->sh_info
6146 && elf_sym_hashes (opd_bfd) != NULL)
8387904d
AM
6147 {
6148 struct elf_link_hash_entry **sym_hashes;
6149 struct elf_link_hash_entry *rh;
6150
6151 sym_hashes = elf_sym_hashes (opd_bfd);
6152 rh = sym_hashes[symndx - symtab_hdr->sh_info];
128205bb
AM
6153 if (rh != NULL)
6154 {
6155 rh = elf_follow_link (rh);
bb854a36
AM
6156 if (rh->root.type != bfd_link_hash_defined
6157 && rh->root.type != bfd_link_hash_defweak)
6158 break;
6159 if (rh->root.u.def.section->owner == opd_bfd)
b53dfeb2 6160 {
bb854a36
AM
6161 val = rh->root.u.def.value;
6162 sec = rh->root.u.def.section;
b53dfeb2
AM
6163 }
6164 }
6165 }
6166
6167 if (sec == NULL)
6168 {
6169 Elf_Internal_Sym *sym;
6170
6171 if (symndx < symtab_hdr->sh_info)
6172 {
6173 sym = (Elf_Internal_Sym *) symtab_hdr->contents;
6174 if (sym == NULL)
6175 {
6176 size_t symcnt = symtab_hdr->sh_info;
6177 sym = bfd_elf_get_elf_syms (opd_bfd, symtab_hdr,
6178 symcnt, 0,
6179 NULL, NULL, NULL);
6180 if (sym == NULL)
6181 break;
6182 symtab_hdr->contents = (bfd_byte *) sym;
6183 }
6184 sym += symndx;
128205bb
AM
6185 }
6186 else
6187 {
b53dfeb2
AM
6188 sym = bfd_elf_get_elf_syms (opd_bfd, symtab_hdr,
6189 1, symndx,
6190 NULL, NULL, NULL);
128205bb
AM
6191 if (sym == NULL)
6192 break;
128205bb 6193 }
b53dfeb2
AM
6194 sec = bfd_section_from_elf_index (opd_bfd, sym->st_shndx);
6195 if (sec == NULL)
6196 break;
6197 BFD_ASSERT ((sec->flags & SEC_MERGE) == 0);
6198 val = sym->st_value;
8387904d 6199 }
b53dfeb2 6200
8387904d
AM
6201 val += look->r_addend;
6202 if (code_off != NULL)
6203 *code_off = val;
6204 if (code_sec != NULL)
aef36ac1
AM
6205 {
6206 if (in_code_sec && *code_sec != sec)
6207 return -1;
6208 else
6209 *code_sec = sec;
6210 }
b53dfeb2 6211 if (sec->output_section != NULL)
8387904d 6212 val += sec->output_section->vma + sec->output_offset;
8387904d
AM
6213 }
6214 break;
6215 }
6216 }
645ea6a9 6217
645ea6a9 6218 return val;
8387904d
AM
6219}
6220
aef36ac1
AM
6221/* If the ELF symbol SYM might be a function in SEC, return the
6222 function size and set *CODE_OFF to the function's entry point,
6223 otherwise return zero. */
9f296da3 6224
aef36ac1
AM
6225static bfd_size_type
6226ppc64_elf_maybe_function_sym (const asymbol *sym, asection *sec,
6227 bfd_vma *code_off)
9f296da3 6228{
aef36ac1
AM
6229 bfd_size_type size;
6230
6231 if ((sym->flags & (BSF_SECTION_SYM | BSF_FILE | BSF_OBJECT
6232 | BSF_THREAD_LOCAL | BSF_RELC | BSF_SRELC)) != 0)
6233 return 0;
6234
6235 size = 0;
6236 if (!(sym->flags & BSF_SYNTHETIC))
6237 size = ((elf_symbol_type *) sym)->internal_elf_sym.st_size;
6238
6239 if (strcmp (sym->section->name, ".opd") == 0)
9f296da3 6240 {
b07bca4e
AM
6241 struct _opd_sec_data *opd = get_opd_info (sym->section);
6242 bfd_vma symval = sym->value;
6243
6244 if (opd != NULL
6245 && opd->adjust != NULL
6246 && elf_section_data (sym->section)->relocs != NULL)
6247 {
6248 /* opd_entry_value will use cached relocs that have been
6249 adjusted, but with raw symbols. That means both local
6250 and global symbols need adjusting. */
6251 long adjust = opd->adjust[OPD_NDX (symval)];
6252 if (adjust == -1)
6253 return 0;
6254 symval += adjust;
6255 }
6256
6257 if (opd_entry_value (sym->section, symval,
aef36ac1
AM
6258 &sec, code_off, TRUE) == (bfd_vma) -1)
6259 return 0;
6260 /* An old ABI binary with dot-syms has a size of 24 on the .opd
6261 symbol. This size has nothing to do with the code size of the
6262 function, which is what we're supposed to return, but the
6263 code size isn't available without looking up the dot-sym.
6264 However, doing that would be a waste of time particularly
6265 since elf_find_function will look at the dot-sym anyway.
6266 Now, elf_find_function will keep the largest size of any
6267 function sym found at the code address of interest, so return
6268 1 here to avoid it incorrectly caching a larger function size
6269 for a small function. This does mean we return the wrong
6270 size for a new-ABI function of size 24, but all that does is
6271 disable caching for such functions. */
6272 if (size == 24)
6273 size = 1;
9f296da3 6274 }
aef36ac1
AM
6275 else
6276 {
6277 if (sym->section != sec)
6278 return 0;
6279 *code_off = sym->value;
6280 }
6281 if (size == 0)
6282 size = 1;
6283 return size;
9f296da3
AM
6284}
6285
854b41e7
AM
6286/* Return true if symbol is defined in a regular object file. */
6287
6288static bfd_boolean
6289is_static_defined (struct elf_link_hash_entry *h)
6290{
6291 return ((h->root.type == bfd_link_hash_defined
6292 || h->root.type == bfd_link_hash_defweak)
6293 && h->root.u.def.section != NULL
6294 && h->root.u.def.section->output_section != NULL);
6295}
6296
b31867b6
AM
6297/* If FDH is a function descriptor symbol, return the associated code
6298 entry symbol if it is defined. Return NULL otherwise. */
6299
6300static struct ppc_link_hash_entry *
6301defined_code_entry (struct ppc_link_hash_entry *fdh)
6302{
6303 if (fdh->is_func_descriptor)
6304 {
6305 struct ppc_link_hash_entry *fh = ppc_follow_link (fdh->oh);
6306 if (fh->elf.root.type == bfd_link_hash_defined
6307 || fh->elf.root.type == bfd_link_hash_defweak)
6308 return fh;
6309 }
6310 return NULL;
6311}
6312
6313/* If FH is a function code entry symbol, return the associated
6314 function descriptor symbol if it is defined. Return NULL otherwise. */
6315
6316static struct ppc_link_hash_entry *
6317defined_func_desc (struct ppc_link_hash_entry *fh)
6318{
6319 if (fh->oh != NULL
6320 && fh->oh->is_func_descriptor)
6321 {
6322 struct ppc_link_hash_entry *fdh = ppc_follow_link (fh->oh);
6323 if (fdh->elf.root.type == bfd_link_hash_defined
6324 || fdh->elf.root.type == bfd_link_hash_defweak)
6325 return fdh;
6326 }
6327 return NULL;
6328}
6329
74f0fb50
AM
6330/* Mark all our entry sym sections, both opd and code section. */
6331
6332static void
6333ppc64_elf_gc_keep (struct bfd_link_info *info)
6334{
6335 struct ppc_link_hash_table *htab = ppc_hash_table (info);
6336 struct bfd_sym_chain *sym;
6337
4dfe6ac6
NC
6338 if (htab == NULL)
6339 return;
6340
74f0fb50
AM
6341 for (sym = info->gc_sym_list; sym != NULL; sym = sym->next)
6342 {
b31867b6 6343 struct ppc_link_hash_entry *eh, *fh;
74f0fb50
AM
6344 asection *sec;
6345
6346 eh = (struct ppc_link_hash_entry *)
b31867b6 6347 elf_link_hash_lookup (&htab->elf, sym->name, FALSE, FALSE, TRUE);
74f0fb50
AM
6348 if (eh == NULL)
6349 continue;
6350 if (eh->elf.root.type != bfd_link_hash_defined
6351 && eh->elf.root.type != bfd_link_hash_defweak)
6352 continue;
6353
b31867b6
AM
6354 fh = defined_code_entry (eh);
6355 if (fh != NULL)
74f0fb50 6356 {
b31867b6 6357 sec = fh->elf.root.u.def.section;
74f0fb50
AM
6358 sec->flags |= SEC_KEEP;
6359 }
6360 else if (get_opd_info (eh->elf.root.u.def.section) != NULL
6361 && opd_entry_value (eh->elf.root.u.def.section,
6362 eh->elf.root.u.def.value,
aef36ac1 6363 &sec, NULL, FALSE) != (bfd_vma) -1)
74f0fb50
AM
6364 sec->flags |= SEC_KEEP;
6365
6366 sec = eh->elf.root.u.def.section;
6367 sec->flags |= SEC_KEEP;
6368 }
6369}
6370
64d03ab5
AM
6371/* Mark sections containing dynamically referenced symbols. When
6372 building shared libraries, we must assume that any visible symbol is
6373 referenced. */
6374
6375static bfd_boolean
6376ppc64_elf_gc_mark_dynamic_ref (struct elf_link_hash_entry *h, void *inf)
6377{
6378 struct bfd_link_info *info = (struct bfd_link_info *) inf;
6379 struct ppc_link_hash_entry *eh = (struct ppc_link_hash_entry *) h;
b31867b6 6380 struct ppc_link_hash_entry *fdh;
b407645f 6381 struct bfd_elf_dynamic_list *d = info->dynamic_list;
64d03ab5 6382
64d03ab5 6383 /* Dynamic linking info is on the func descriptor sym. */
b31867b6
AM
6384 fdh = defined_func_desc (eh);
6385 if (fdh != NULL)
6386 eh = fdh;
64d03ab5
AM
6387
6388 if ((eh->elf.root.type == bfd_link_hash_defined
6389 || eh->elf.root.type == bfd_link_hash_defweak)
6390 && (eh->elf.ref_dynamic
1c9177d9 6391 || ((eh->elf.def_regular || ELF_COMMON_DEF_P (&eh->elf))
64d03ab5 6392 && ELF_ST_VISIBILITY (eh->elf.other) != STV_INTERNAL
4c58e0d8 6393 && ELF_ST_VISIBILITY (eh->elf.other) != STV_HIDDEN
0e1862bb 6394 && (!bfd_link_executable (info)
b407645f
AM
6395 || info->export_dynamic
6396 || (eh->elf.dynamic
6397 && d != NULL
6398 && (*d->match) (&d->head, NULL, eh->elf.root.root.string)))
4c58e0d8
AM
6399 && (strchr (eh->elf.root.root.string, ELF_VER_CHR) != NULL
6400 || !bfd_hide_sym_by_version (info->version_info,
6401 eh->elf.root.root.string)))))
64d03ab5
AM
6402 {
6403 asection *code_sec;
b31867b6 6404 struct ppc_link_hash_entry *fh;
64d03ab5
AM
6405
6406 eh->elf.root.u.def.section->flags |= SEC_KEEP;
6407
6408 /* Function descriptor syms cause the associated
6409 function code sym section to be marked. */
b31867b6
AM
6410 fh = defined_code_entry (eh);
6411 if (fh != NULL)
6412 {
6413 code_sec = fh->elf.root.u.def.section;
6414 code_sec->flags |= SEC_KEEP;
6415 }
64d03ab5
AM
6416 else if (get_opd_info (eh->elf.root.u.def.section) != NULL
6417 && opd_entry_value (eh->elf.root.u.def.section,
6418 eh->elf.root.u.def.value,
aef36ac1 6419 &code_sec, NULL, FALSE) != (bfd_vma) -1)
64d03ab5
AM
6420 code_sec->flags |= SEC_KEEP;
6421 }
6422
6423 return TRUE;
6424}
6425
5bd4f169
AM
6426/* Return the section that should be marked against GC for a given
6427 relocation. */
6428
6429static asection *
4ce794b7 6430ppc64_elf_gc_mark_hook (asection *sec,
fb34365b 6431 struct bfd_link_info *info,
4ce794b7
AM
6432 Elf_Internal_Rela *rel,
6433 struct elf_link_hash_entry *h,
6434 Elf_Internal_Sym *sym)
5bd4f169 6435{
ccfa59ea
AM
6436 asection *rsec;
6437
ccfa59ea
AM
6438 /* Syms return NULL if we're marking .opd, so we avoid marking all
6439 function sections, as all functions are referenced in .opd. */
6440 rsec = NULL;
6441 if (get_opd_info (sec) != NULL)
6442 return rsec;
1e2f5b6e 6443
5bd4f169
AM
6444 if (h != NULL)
6445 {
04c9666a 6446 enum elf_ppc64_reloc_type r_type;
b31867b6 6447 struct ppc_link_hash_entry *eh, *fh, *fdh;
a33d1f77 6448
4ce794b7 6449 r_type = ELF64_R_TYPE (rel->r_info);
a33d1f77 6450 switch (r_type)
5bd4f169
AM
6451 {
6452 case R_PPC64_GNU_VTINHERIT:
6453 case R_PPC64_GNU_VTENTRY:
6454 break;
6455
6456 default:
6457 switch (h->root.type)
6458 {
6459 case bfd_link_hash_defined:
6460 case bfd_link_hash_defweak:
ccfa59ea 6461 eh = (struct ppc_link_hash_entry *) h;
b31867b6
AM
6462 fdh = defined_func_desc (eh);
6463 if (fdh != NULL)
6464 eh = fdh;
1e2f5b6e
AM
6465
6466 /* Function descriptor syms cause the associated
6467 function code sym section to be marked. */
b31867b6
AM
6468 fh = defined_code_entry (eh);
6469 if (fh != NULL)
ccfa59ea
AM
6470 {
6471 /* They also mark their opd section. */
74f0fb50 6472 eh->elf.root.u.def.section->gc_mark = 1;
ccfa59ea 6473
b31867b6 6474 rsec = fh->elf.root.u.def.section;
ccfa59ea 6475 }
8387904d
AM
6476 else if (get_opd_info (eh->elf.root.u.def.section) != NULL
6477 && opd_entry_value (eh->elf.root.u.def.section,
6478 eh->elf.root.u.def.value,
aef36ac1 6479 &rsec, NULL, FALSE) != (bfd_vma) -1)
74f0fb50 6480 eh->elf.root.u.def.section->gc_mark = 1;
ccfa59ea 6481 else
1e2f5b6e
AM
6482 rsec = h->root.u.def.section;
6483 break;
5bd4f169
AM
6484
6485 case bfd_link_hash_common:
1e2f5b6e
AM
6486 rsec = h->root.u.c.p->section;
6487 break;
5bd4f169
AM
6488
6489 default:
fb34365b 6490 return _bfd_elf_gc_mark_hook (sec, info, rel, h, sym);
5bd4f169
AM
6491 }
6492 }
6493 }
6494 else
6495 {
74f0fb50 6496 struct _opd_sec_data *opd;
1e2f5b6e
AM
6497
6498 rsec = bfd_section_from_elf_index (sec->owner, sym->st_shndx);
74f0fb50
AM
6499 opd = get_opd_info (rsec);
6500 if (opd != NULL && opd->func_sec != NULL)
ccfa59ea 6501 {
74f0fb50 6502 rsec->gc_mark = 1;
ccfa59ea 6503
51aecdc5 6504 rsec = opd->func_sec[OPD_NDX (sym->st_value + rel->r_addend)];
ccfa59ea 6505 }
5bd4f169
AM
6506 }
6507
1e2f5b6e 6508 return rsec;
5bd4f169
AM
6509}
6510
65f38f15
AM
6511/* Update the .got, .plt. and dynamic reloc reference counts for the
6512 section being removed. */
5bd4f169 6513
b34976b6 6514static bfd_boolean
4ce794b7
AM
6515ppc64_elf_gc_sweep_hook (bfd *abfd, struct bfd_link_info *info,
6516 asection *sec, const Elf_Internal_Rela *relocs)
5bd4f169 6517{
411e1bfb 6518 struct ppc_link_hash_table *htab;
5bd4f169
AM
6519 Elf_Internal_Shdr *symtab_hdr;
6520 struct elf_link_hash_entry **sym_hashes;
411e1bfb 6521 struct got_entry **local_got_ents;
5bd4f169 6522 const Elf_Internal_Rela *rel, *relend;
5bd4f169 6523
0e1862bb 6524 if (bfd_link_relocatable (info))
7dda2462
TG
6525 return TRUE;
6526
680a3378
AM
6527 if ((sec->flags & SEC_ALLOC) == 0)
6528 return TRUE;
6529
ec338859
AM
6530 elf_section_data (sec)->local_dynrel = NULL;
6531
411e1bfb 6532 htab = ppc_hash_table (info);
4dfe6ac6
NC
6533 if (htab == NULL)
6534 return FALSE;
6535
0ffa91dd 6536 symtab_hdr = &elf_symtab_hdr (abfd);
5bd4f169 6537 sym_hashes = elf_sym_hashes (abfd);
411e1bfb 6538 local_got_ents = elf_local_got_ents (abfd);
5bd4f169
AM
6539
6540 relend = relocs + sec->reloc_count;
6541 for (rel = relocs; rel < relend; rel++)
a33d1f77
AM
6542 {
6543 unsigned long r_symndx;
04c9666a 6544 enum elf_ppc64_reloc_type r_type;
58ac9f71 6545 struct elf_link_hash_entry *h = NULL;
cbf95972 6546 struct plt_entry **plt_list;
f961d9dd 6547 unsigned char tls_type = 0;
5bd4f169 6548
a33d1f77 6549 r_symndx = ELF64_R_SYM (rel->r_info);
4ce794b7 6550 r_type = ELF64_R_TYPE (rel->r_info);
58ac9f71
AM
6551 if (r_symndx >= symtab_hdr->sh_info)
6552 {
6553 struct ppc_link_hash_entry *eh;
6061a67d
AM
6554 struct elf_dyn_relocs **pp;
6555 struct elf_dyn_relocs *p;
58ac9f71
AM
6556
6557 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
b31867b6 6558 h = elf_follow_link (h);
58ac9f71
AM
6559 eh = (struct ppc_link_hash_entry *) h;
6560
6561 for (pp = &eh->dyn_relocs; (p = *pp) != NULL; pp = &p->next)
6562 if (p->sec == sec)
6563 {
6564 /* Everything must go for SEC. */
6565 *pp = p->next;
6566 break;
6567 }
6568 }
6569
a33d1f77
AM
6570 switch (r_type)
6571 {
411e1bfb
AM
6572 case R_PPC64_GOT_TLSLD16:
6573 case R_PPC64_GOT_TLSLD16_LO:
6574 case R_PPC64_GOT_TLSLD16_HI:
6575 case R_PPC64_GOT_TLSLD16_HA:
951fd09b 6576 tls_type = TLS_TLS | TLS_LD;
411e1bfb
AM
6577 goto dogot;
6578
6579 case R_PPC64_GOT_TLSGD16:
6580 case R_PPC64_GOT_TLSGD16_LO:
6581 case R_PPC64_GOT_TLSGD16_HI:
6582 case R_PPC64_GOT_TLSGD16_HA:
951fd09b 6583 tls_type = TLS_TLS | TLS_GD;
411e1bfb
AM
6584 goto dogot;
6585
6586 case R_PPC64_GOT_TPREL16_DS:
6587 case R_PPC64_GOT_TPREL16_LO_DS:
6588 case R_PPC64_GOT_TPREL16_HI:
6589 case R_PPC64_GOT_TPREL16_HA:
6590 tls_type = TLS_TLS | TLS_TPREL;
6591 goto dogot;
6592
6593 case R_PPC64_GOT_DTPREL16_DS:
6594 case R_PPC64_GOT_DTPREL16_LO_DS:
6595 case R_PPC64_GOT_DTPREL16_HI:
6596 case R_PPC64_GOT_DTPREL16_HA:
6597 tls_type = TLS_TLS | TLS_DTPREL;
6598 goto dogot;
6599
a33d1f77
AM
6600 case R_PPC64_GOT16:
6601 case R_PPC64_GOT16_DS:
6602 case R_PPC64_GOT16_HA:
6603 case R_PPC64_GOT16_HI:
6604 case R_PPC64_GOT16_LO:
6605 case R_PPC64_GOT16_LO_DS:
411e1bfb
AM
6606 dogot:
6607 {
6608 struct got_entry *ent;
6609
58ac9f71
AM
6610 if (h != NULL)
6611 ent = h->got.glist;
411e1bfb
AM
6612 else
6613 ent = local_got_ents[r_symndx];
6614
6615 for (; ent != NULL; ent = ent->next)
6616 if (ent->addend == rel->r_addend
e717da7e 6617 && ent->owner == abfd
411e1bfb
AM
6618 && ent->tls_type == tls_type)
6619 break;
6620 if (ent == NULL)
6621 abort ();
6622 if (ent->got.refcount > 0)
6623 ent->got.refcount -= 1;
6624 }
a33d1f77 6625 break;
65f38f15 6626
a33d1f77
AM
6627 case R_PPC64_PLT16_HA:
6628 case R_PPC64_PLT16_HI:
6629 case R_PPC64_PLT16_LO:
6630 case R_PPC64_PLT32:
6631 case R_PPC64_PLT64:
721956f4
AM
6632 case R_PPC64_REL14:
6633 case R_PPC64_REL14_BRNTAKEN:
6634 case R_PPC64_REL14_BRTAKEN:
5d1634d7 6635 case R_PPC64_REL24:
cbf95972 6636 plt_list = NULL;
58ac9f71 6637 if (h != NULL)
cbf95972
AM
6638 plt_list = &h->plt.plist;
6639 else if (local_got_ents != NULL)
6640 {
6641 struct plt_entry **local_plt = (struct plt_entry **)
6642 (local_got_ents + symtab_hdr->sh_info);
6643 unsigned char *local_got_tls_masks = (unsigned char *)
6644 (local_plt + symtab_hdr->sh_info);
6645 if ((local_got_tls_masks[r_symndx] & PLT_IFUNC) != 0)
6646 plt_list = local_plt + r_symndx;
6647 }
6648 if (plt_list)
5d1634d7 6649 {
411e1bfb
AM
6650 struct plt_entry *ent;
6651
cbf95972 6652 for (ent = *plt_list; ent != NULL; ent = ent->next)
411e1bfb
AM
6653 if (ent->addend == rel->r_addend)
6654 break;
7c6c1722 6655 if (ent != NULL && ent->plt.refcount > 0)
411e1bfb 6656 ent->plt.refcount -= 1;
5d1634d7 6657 }
e86ce104 6658 break;
5d1634d7 6659
a33d1f77
AM
6660 default:
6661 break;
6662 }
6663 }
b34976b6 6664 return TRUE;
5bd4f169
AM
6665}
6666
deb0e272
AM
6667/* The maximum size of .sfpr. */
6668#define SFPR_MAX (218*4)
6669
6670struct sfpr_def_parms
6671{
699733f6
AM
6672 const char name[12];
6673 unsigned char lo, hi;
deb0e272
AM
6674 bfd_byte * (*write_ent) (bfd *, bfd_byte *, int);
6675 bfd_byte * (*write_tail) (bfd *, bfd_byte *, int);
6676};
6677
a4b6fadd
AM
6678/* Auto-generate _save*, _rest* functions in .sfpr.
6679 If STUB_SEC is non-null, define alias symbols in STUB_SEC
6680 instead. */
deb0e272 6681
4dfe6ac6 6682static bfd_boolean
a4b6fadd
AM
6683sfpr_define (struct bfd_link_info *info,
6684 const struct sfpr_def_parms *parm,
6685 asection *stub_sec)
deb0e272
AM
6686{
6687 struct ppc_link_hash_table *htab = ppc_hash_table (info);
6688 unsigned int i;
6689 size_t len = strlen (parm->name);
6690 bfd_boolean writing = FALSE;
699733f6 6691 char sym[16];
deb0e272 6692
4dfe6ac6
NC
6693 if (htab == NULL)
6694 return FALSE;
6695
deb0e272
AM
6696 memcpy (sym, parm->name, len);
6697 sym[len + 2] = 0;
6698
6699 for (i = parm->lo; i <= parm->hi; i++)
6700 {
a4b6fadd 6701 struct ppc_link_hash_entry *h;
deb0e272
AM
6702
6703 sym[len + 0] = i / 10 + '0';
6704 sym[len + 1] = i % 10 + '0';
a4b6fadd 6705 h = (struct ppc_link_hash_entry *)
b32547cd 6706 elf_link_hash_lookup (&htab->elf, sym, writing, TRUE, TRUE);
a4b6fadd 6707 if (stub_sec != NULL)
deb0e272 6708 {
a4b6fadd
AM
6709 if (h != NULL
6710 && h->elf.root.type == bfd_link_hash_defined
6711 && h->elf.root.u.def.section == htab->sfpr)
6712 {
6713 struct elf_link_hash_entry *s;
6714 char buf[32];
6715 sprintf (buf, "%08x.%s", stub_sec->id & 0xffffffff, sym);
6716 s = elf_link_hash_lookup (&htab->elf, buf, TRUE, TRUE, FALSE);
6717 if (s == NULL)
6718 return FALSE;
6719 if (s->root.type == bfd_link_hash_new
6720 || (s->root.type = bfd_link_hash_defined
6721 && s->root.u.def.section == stub_sec))
6722 {
6723 s->root.type = bfd_link_hash_defined;
6724 s->root.u.def.section = stub_sec;
6725 s->root.u.def.value = (stub_sec->size
6726 + h->elf.root.u.def.value);
6727 s->ref_regular = 1;
6728 s->def_regular = 1;
6729 s->ref_regular_nonweak = 1;
6730 s->forced_local = 1;
6731 s->non_elf = 0;
6732 s->root.linker_def = 1;
6733 }
6734 }
6735 continue;
6736 }
6737 if (h != NULL)
6738 {
6739 h->save_res = 1;
6740 if (!h->elf.def_regular)
deb0e272 6741 {
a4b6fadd
AM
6742 h->elf.root.type = bfd_link_hash_defined;
6743 h->elf.root.u.def.section = htab->sfpr;
6744 h->elf.root.u.def.value = htab->sfpr->size;
6745 h->elf.type = STT_FUNC;
6746 h->elf.def_regular = 1;
b32547cd 6747 h->elf.non_elf = 0;
a4b6fadd
AM
6748 _bfd_elf_link_hash_hide_symbol (info, &h->elf, TRUE);
6749 writing = TRUE;
deb0e272 6750 if (htab->sfpr->contents == NULL)
a4b6fadd
AM
6751 {
6752 htab->sfpr->contents = bfd_alloc (htab->elf.dynobj, SFPR_MAX);
6753 if (htab->sfpr->contents == NULL)
6754 return FALSE;
6755 }
deb0e272
AM
6756 }
6757 }
6758 if (writing)
6759 {
6760 bfd_byte *p = htab->sfpr->contents + htab->sfpr->size;
6761 if (i != parm->hi)
6762 p = (*parm->write_ent) (htab->elf.dynobj, p, i);
6763 else
6764 p = (*parm->write_tail) (htab->elf.dynobj, p, i);
6765 htab->sfpr->size = p - htab->sfpr->contents;
6766 }
6767 }
6768
6769 return TRUE;
6770}
6771
6772static bfd_byte *
6773savegpr0 (bfd *abfd, bfd_byte *p, int r)
6774{
6775 bfd_put_32 (abfd, STD_R0_0R1 + (r << 21) + (1 << 16) - (32 - r) * 8, p);
6776 return p + 4;
6777}
6778
6779static bfd_byte *
6780savegpr0_tail (bfd *abfd, bfd_byte *p, int r)
6781{
6782 p = savegpr0 (abfd, p, r);
a078d95a 6783 bfd_put_32 (abfd, STD_R0_0R1 + STK_LR, p);
deb0e272
AM
6784 p = p + 4;
6785 bfd_put_32 (abfd, BLR, p);
6786 return p + 4;
6787}
6788
6789static bfd_byte *
6790restgpr0 (bfd *abfd, bfd_byte *p, int r)
6791{
6792 bfd_put_32 (abfd, LD_R0_0R1 + (r << 21) + (1 << 16) - (32 - r) * 8, p);
6793 return p + 4;
6794}
6795
6796static bfd_byte *
6797restgpr0_tail (bfd *abfd, bfd_byte *p, int r)
6798{
a078d95a 6799 bfd_put_32 (abfd, LD_R0_0R1 + STK_LR, p);
deb0e272
AM
6800 p = p + 4;
6801 p = restgpr0 (abfd, p, r);
6802 bfd_put_32 (abfd, MTLR_R0, p);
6803 p = p + 4;
6804 if (r == 29)
6805 {
6806 p = restgpr0 (abfd, p, 30);
6807 p = restgpr0 (abfd, p, 31);
6808 }
6809 bfd_put_32 (abfd, BLR, p);
6810 return p + 4;
6811}
6812
6813static bfd_byte *
6814savegpr1 (bfd *abfd, bfd_byte *p, int r)
6815{
6816 bfd_put_32 (abfd, STD_R0_0R12 + (r << 21) + (1 << 16) - (32 - r) * 8, p);
6817 return p + 4;
6818}
6819
6820static bfd_byte *
6821savegpr1_tail (bfd *abfd, bfd_byte *p, int r)
6822{
6823 p = savegpr1 (abfd, p, r);
6824 bfd_put_32 (abfd, BLR, p);
6825 return p + 4;
6826}
6827
6828static bfd_byte *
6829restgpr1 (bfd *abfd, bfd_byte *p, int r)
6830{
6831 bfd_put_32 (abfd, LD_R0_0R12 + (r << 21) + (1 << 16) - (32 - r) * 8, p);
6832 return p + 4;
6833}
6834
6835static bfd_byte *
6836restgpr1_tail (bfd *abfd, bfd_byte *p, int r)
6837{
6838 p = restgpr1 (abfd, p, r);
6839 bfd_put_32 (abfd, BLR, p);
6840 return p + 4;
6841}
6842
6843static bfd_byte *
6844savefpr (bfd *abfd, bfd_byte *p, int r)
6845{
6846 bfd_put_32 (abfd, STFD_FR0_0R1 + (r << 21) + (1 << 16) - (32 - r) * 8, p);
6847 return p + 4;
6848}
6849
6850static bfd_byte *
6851savefpr0_tail (bfd *abfd, bfd_byte *p, int r)
6852{
6853 p = savefpr (abfd, p, r);
a078d95a 6854 bfd_put_32 (abfd, STD_R0_0R1 + STK_LR, p);
deb0e272
AM
6855 p = p + 4;
6856 bfd_put_32 (abfd, BLR, p);
6857 return p + 4;
6858}
6859
6860static bfd_byte *
6861restfpr (bfd *abfd, bfd_byte *p, int r)
6862{
6863 bfd_put_32 (abfd, LFD_FR0_0R1 + (r << 21) + (1 << 16) - (32 - r) * 8, p);
6864 return p + 4;
6865}
6866
6867static bfd_byte *
6868restfpr0_tail (bfd *abfd, bfd_byte *p, int r)
6869{
a078d95a 6870 bfd_put_32 (abfd, LD_R0_0R1 + STK_LR, p);
deb0e272
AM
6871 p = p + 4;
6872 p = restfpr (abfd, p, r);
6873 bfd_put_32 (abfd, MTLR_R0, p);
6874 p = p + 4;
6875 if (r == 29)
6876 {
6877 p = restfpr (abfd, p, 30);
6878 p = restfpr (abfd, p, 31);
6879 }
6880 bfd_put_32 (abfd, BLR, p);
6881 return p + 4;
6882}
6883
6884static bfd_byte *
6885savefpr1_tail (bfd *abfd, bfd_byte *p, int r)
6886{
6887 p = savefpr (abfd, p, r);
6888 bfd_put_32 (abfd, BLR, p);
6889 return p + 4;
6890}
6891
6892static bfd_byte *
6893restfpr1_tail (bfd *abfd, bfd_byte *p, int r)
6894{
6895 p = restfpr (abfd, p, r);
6896 bfd_put_32 (abfd, BLR, p);
6897 return p + 4;
6898}
6899
6900static bfd_byte *
6901savevr (bfd *abfd, bfd_byte *p, int r)
6902{
6903 bfd_put_32 (abfd, LI_R12_0 + (1 << 16) - (32 - r) * 16, p);
6904 p = p + 4;
6905 bfd_put_32 (abfd, STVX_VR0_R12_R0 + (r << 21), p);
6906 return p + 4;
6907}
6908
6909static bfd_byte *
6910savevr_tail (bfd *abfd, bfd_byte *p, int r)
6911{
6912 p = savevr (abfd, p, r);
6913 bfd_put_32 (abfd, BLR, p);
6914 return p + 4;
6915}
6916
6917static bfd_byte *
6918restvr (bfd *abfd, bfd_byte *p, int r)
6919{
6920 bfd_put_32 (abfd, LI_R12_0 + (1 << 16) - (32 - r) * 16, p);
6921 p = p + 4;
6922 bfd_put_32 (abfd, LVX_VR0_R12_R0 + (r << 21), p);
6923 return p + 4;
6924}
6925
6926static bfd_byte *
6927restvr_tail (bfd *abfd, bfd_byte *p, int r)
6928{
6929 p = restvr (abfd, p, r);
6930 bfd_put_32 (abfd, BLR, p);
6931 return p + 4;
6932}
6933
e86ce104
AM
6934/* Called via elf_link_hash_traverse to transfer dynamic linking
6935 information on function code symbol entries to their corresponding
6936 function descriptor symbol entries. */
deb0e272 6937
b34976b6 6938static bfd_boolean
4ce794b7 6939func_desc_adjust (struct elf_link_hash_entry *h, void *inf)
5bd4f169 6940{
e86ce104 6941 struct bfd_link_info *info;
65f38f15 6942 struct ppc_link_hash_table *htab;
411e1bfb 6943 struct plt_entry *ent;
50bc7936
AM
6944 struct ppc_link_hash_entry *fh;
6945 struct ppc_link_hash_entry *fdh;
6946 bfd_boolean force_local;
5bd4f169 6947
50bc7936
AM
6948 fh = (struct ppc_link_hash_entry *) h;
6949 if (fh->elf.root.type == bfd_link_hash_indirect)
b34976b6 6950 return TRUE;
e86ce104 6951
4ce794b7 6952 info = inf;
65f38f15 6953 htab = ppc_hash_table (info);
4dfe6ac6
NC
6954 if (htab == NULL)
6955 return FALSE;
5bd4f169 6956
c09bdfe5
AM
6957 /* Resolve undefined references to dot-symbols as the value
6958 in the function descriptor, if we have one in a regular object.
6959 This is to satisfy cases like ".quad .foo". Calls to functions
6960 in dynamic objects are handled elsewhere. */
6961 if (fh->elf.root.type == bfd_link_hash_undefweak
6962 && fh->was_undefined
b31867b6
AM
6963 && (fdh = defined_func_desc (fh)) != NULL
6964 && get_opd_info (fdh->elf.root.u.def.section) != NULL
6965 && opd_entry_value (fdh->elf.root.u.def.section,
6966 fdh->elf.root.u.def.value,
c09bdfe5 6967 &fh->elf.root.u.def.section,
aef36ac1 6968 &fh->elf.root.u.def.value, FALSE) != (bfd_vma) -1)
c09bdfe5 6969 {
b31867b6 6970 fh->elf.root.type = fdh->elf.root.type;
f5385ebf 6971 fh->elf.forced_local = 1;
b31867b6
AM
6972 fh->elf.def_regular = fdh->elf.def_regular;
6973 fh->elf.def_dynamic = fdh->elf.def_dynamic;
c09bdfe5
AM
6974 }
6975
e86ce104
AM
6976 /* If this is a function code symbol, transfer dynamic linking
6977 information to the function descriptor symbol. */
50bc7936 6978 if (!fh->is_func)
b34976b6 6979 return TRUE;
e86ce104 6980
50bc7936 6981 for (ent = fh->elf.plt.plist; ent != NULL; ent = ent->next)
411e1bfb
AM
6982 if (ent->plt.refcount > 0)
6983 break;
50bc7936
AM
6984 if (ent == NULL
6985 || fh->elf.root.root.string[0] != '.'
6986 || fh->elf.root.root.string[1] == '\0')
6987 return TRUE;
5bd4f169 6988
50bc7936
AM
6989 /* Find the corresponding function descriptor symbol. Create it
6990 as undefined if necessary. */
5bd4f169 6991
b31867b6 6992 fdh = lookup_fdh (fh, htab);
50bc7936 6993 if (fdh == NULL
0e1862bb 6994 && !bfd_link_executable (info)
50bc7936
AM
6995 && (fh->elf.root.type == bfd_link_hash_undefined
6996 || fh->elf.root.type == bfd_link_hash_undefweak))
6997 {
908b32fc 6998 fdh = make_fdh (info, fh);
bb700d78
AM
6999 if (fdh == NULL)
7000 return FALSE;
50bc7936 7001 }
648cca2c 7002
908b32fc 7003 /* Fake function descriptors are made undefweak. If the function
433817dd
AM
7004 code symbol is strong undefined, make the fake sym the same.
7005 If the function code symbol is defined, then force the fake
7006 descriptor local; We can't support overriding of symbols in a
7007 shared library on a fake descriptor. */
908b32fc
AM
7008
7009 if (fdh != NULL
7010 && fdh->fake
433817dd 7011 && fdh->elf.root.type == bfd_link_hash_undefweak)
908b32fc 7012 {
433817dd
AM
7013 if (fh->elf.root.type == bfd_link_hash_undefined)
7014 {
7015 fdh->elf.root.type = bfd_link_hash_undefined;
7016 bfd_link_add_undef (&htab->elf.root, &fdh->elf.root);
7017 }
7018 else if (fh->elf.root.type == bfd_link_hash_defined
7019 || fh->elf.root.type == bfd_link_hash_defweak)
7020 {
7021 _bfd_elf_link_hash_hide_symbol (info, &fdh->elf, TRUE);
7022 }
908b32fc
AM
7023 }
7024
50bc7936 7025 if (fdh != NULL
f5385ebf 7026 && !fdh->elf.forced_local
0e1862bb 7027 && (!bfd_link_executable (info)
f5385ebf
AM
7028 || fdh->elf.def_dynamic
7029 || fdh->elf.ref_dynamic
50bc7936
AM
7030 || (fdh->elf.root.type == bfd_link_hash_undefweak
7031 && ELF_ST_VISIBILITY (fdh->elf.other) == STV_DEFAULT)))
7032 {
7033 if (fdh->elf.dynindx == -1)
c152c796 7034 if (! bfd_elf_link_record_dynamic_symbol (info, &fdh->elf))
50bc7936 7035 return FALSE;
f5385ebf
AM
7036 fdh->elf.ref_regular |= fh->elf.ref_regular;
7037 fdh->elf.ref_dynamic |= fh->elf.ref_dynamic;
7038 fdh->elf.ref_regular_nonweak |= fh->elf.ref_regular_nonweak;
7039 fdh->elf.non_got_ref |= fh->elf.non_got_ref;
50bc7936 7040 if (ELF_ST_VISIBILITY (fh->elf.other) == STV_DEFAULT)
e86ce104 7041 {
40d16e0b 7042 move_plt_plist (fh, fdh);
f5385ebf 7043 fdh->elf.needs_plt = 1;
e86ce104 7044 }
50bc7936 7045 fdh->is_func_descriptor = 1;
34814b9f
AM
7046 fdh->oh = fh;
7047 fh->oh = fdh;
e86ce104
AM
7048 }
7049
50bc7936
AM
7050 /* Now that the info is on the function descriptor, clear the
7051 function code sym info. Any function code syms for which we
7052 don't have a definition in a regular file, we force local.
7053 This prevents a shared library from exporting syms that have
7054 been imported from another library. Function code syms that
7055 are really in the library we must leave global to prevent the
7056 linker dragging in a definition from a static library. */
93f3fa99
AM
7057 force_local = (!fh->elf.def_regular
7058 || fdh == NULL
7059 || !fdh->elf.def_regular
7060 || fdh->elf.forced_local);
50bc7936
AM
7061 _bfd_elf_link_hash_hide_symbol (info, &fh->elf, force_local);
7062
b34976b6 7063 return TRUE;
e86ce104 7064}
40b8271b 7065
a4b6fadd
AM
7066static const struct sfpr_def_parms save_res_funcs[] =
7067 {
7068 { "_savegpr0_", 14, 31, savegpr0, savegpr0_tail },
7069 { "_restgpr0_", 14, 29, restgpr0, restgpr0_tail },
7070 { "_restgpr0_", 30, 31, restgpr0, restgpr0_tail },
7071 { "_savegpr1_", 14, 31, savegpr1, savegpr1_tail },
7072 { "_restgpr1_", 14, 31, restgpr1, restgpr1_tail },
7073 { "_savefpr_", 14, 31, savefpr, savefpr0_tail },
7074 { "_restfpr_", 14, 29, restfpr, restfpr0_tail },
7075 { "_restfpr_", 30, 31, restfpr, restfpr0_tail },
7076 { "._savef", 14, 31, savefpr, savefpr1_tail },
7077 { "._restf", 14, 31, restfpr, restfpr1_tail },
7078 { "_savevr_", 20, 31, savevr, savevr_tail },
7079 { "_restvr_", 20, 31, restvr, restvr_tail }
7080 };
7081
e86ce104 7082/* Called near the start of bfd_elf_size_dynamic_sections. We use
82bd7b59
AM
7083 this hook to a) provide some gcc support functions, and b) transfer
7084 dynamic linking information gathered so far on function code symbol
7085 entries, to their corresponding function descriptor symbol entries. */
deb0e272 7086
b34976b6 7087static bfd_boolean
4ce794b7
AM
7088ppc64_elf_func_desc_adjust (bfd *obfd ATTRIBUTE_UNUSED,
7089 struct bfd_link_info *info)
e86ce104
AM
7090{
7091 struct ppc_link_hash_table *htab;
7092
7093 htab = ppc_hash_table (info);
4dfe6ac6
NC
7094 if (htab == NULL)
7095 return FALSE;
7096
b32547cd
AM
7097 /* Provide any missing _save* and _rest* functions. */
7098 if (htab->sfpr != NULL)
7099 {
7100 unsigned int i;
7101
7102 htab->sfpr->size = 0;
7103 for (i = 0; i < ARRAY_SIZE (save_res_funcs); i++)
7104 if (!sfpr_define (info, &save_res_funcs[i], NULL))
7105 return FALSE;
7106 if (htab->sfpr->size == 0)
7107 htab->sfpr->flags |= SEC_EXCLUDE;
7108 }
7109
7110 if (bfd_link_relocatable (info))
7111 return TRUE;
7112
7113 if (htab->elf.hgot != NULL)
dba6fa9b
AM
7114 {
7115 _bfd_elf_link_hash_hide_symbol (info, htab->elf.hgot, TRUE);
7116 /* Make .TOC. defined so as to prevent it being made dynamic.
7117 The wrong value here is fixed later in ppc64_elf_set_toc. */
43417696
AM
7118 if (!htab->elf.hgot->def_regular
7119 || htab->elf.hgot->root.type != bfd_link_hash_defined)
7120 {
7121 htab->elf.hgot->root.type = bfd_link_hash_defined;
7122 htab->elf.hgot->root.u.def.value = 0;
7123 htab->elf.hgot->root.u.def.section = bfd_abs_section_ptr;
7124 htab->elf.hgot->def_regular = 1;
7125 htab->elf.hgot->root.linker_def = 1;
7126 }
dba6fa9b 7127 htab->elf.hgot->type = STT_OBJECT;
dba6fa9b
AM
7128 htab->elf.hgot->other = ((htab->elf.hgot->other & ~ELF_ST_VISIBILITY (-1))
7129 | STV_HIDDEN);
7130 }
c66bb0ee 7131
4ce794b7 7132 elf_link_hash_traverse (&htab->elf, func_desc_adjust, info);
805fc799 7133
b34976b6 7134 return TRUE;
e86ce104
AM
7135}
7136
8a2058b5
AM
7137/* Return true if we have dynamic relocs against H that apply to
7138 read-only sections. */
a345bc8d
AM
7139
7140static bfd_boolean
7141readonly_dynrelocs (struct elf_link_hash_entry *h)
7142{
7143 struct ppc_link_hash_entry *eh;
7144 struct elf_dyn_relocs *p;
7145
7146 eh = (struct ppc_link_hash_entry *) h;
7147 for (p = eh->dyn_relocs; p != NULL; p = p->next)
7148 {
7149 asection *s = p->sec->output_section;
7150
7151 if (s != NULL && (s->flags & SEC_READONLY) != 0)
7152 return TRUE;
7153 }
7154 return FALSE;
7155}
7156
d311bc8b
AM
7157/* Return true if we have dynamic relocs against H or any of its weak
7158 aliases, that apply to read-only sections. */
7159
7160static bfd_boolean
7161alias_readonly_dynrelocs (struct elf_link_hash_entry *h)
7162{
7163 struct ppc_link_hash_entry *eh;
7164
7165 eh = (struct ppc_link_hash_entry *) h;
7166 do
7167 {
7168 if (readonly_dynrelocs (&eh->elf))
7169 return TRUE;
7170 eh = eh->weakref;
7171 } while (eh != NULL && &eh->elf != h);
7172
7173 return FALSE;
7174}
8a2058b5 7175
8a9e8e72
AM
7176/* Return whether EH has pc-relative dynamic relocs. */
7177
7178static bfd_boolean
7179pc_dynrelocs (struct ppc_link_hash_entry *eh)
7180{
7181 struct elf_dyn_relocs *p;
7182
7183 for (p = eh->dyn_relocs; p != NULL; p = p->next)
7184 if (p->pc_count != 0)
7185 return TRUE;
7186 return FALSE;
7187}
7188
8a2058b5
AM
7189/* Return true if a global entry stub will be created for H. Valid
7190 for ELFv2 before plt entries have been allocated. */
7191
7192static bfd_boolean
7193global_entry_stub (struct elf_link_hash_entry *h)
7194{
7195 struct plt_entry *pent;
7196
7197 if (!h->pointer_equality_needed
7198 || h->def_regular)
7199 return FALSE;
7200
7201 for (pent = h->plt.plist; pent != NULL; pent = pent->next)
7202 if (pent->plt.refcount > 0
7203 && pent->addend == 0)
7204 return TRUE;
7205
7206 return FALSE;
7207}
7208
e86ce104
AM
7209/* Adjust a symbol defined by a dynamic object and referenced by a
7210 regular object. The current definition is in some section of the
7211 dynamic object, but we're not including those sections. We have to
7212 change the definition to something the rest of the link can
7213 understand. */
7214
b34976b6 7215static bfd_boolean
4ce794b7
AM
7216ppc64_elf_adjust_dynamic_symbol (struct bfd_link_info *info,
7217 struct elf_link_hash_entry *h)
e86ce104
AM
7218{
7219 struct ppc_link_hash_table *htab;
e86ce104 7220 asection *s;
e86ce104
AM
7221
7222 htab = ppc_hash_table (info);
4dfe6ac6
NC
7223 if (htab == NULL)
7224 return FALSE;
e86ce104
AM
7225
7226 /* Deal with function syms. */
7227 if (h->type == STT_FUNC
e054468f 7228 || h->type == STT_GNU_IFUNC
f5385ebf 7229 || h->needs_plt)
e86ce104
AM
7230 {
7231 /* Clear procedure linkage table information for any symbol that
7232 won't need a .plt entry. */
411e1bfb
AM
7233 struct plt_entry *ent;
7234 for (ent = h->plt.plist; ent != NULL; ent = ent->next)
7235 if (ent->plt.refcount > 0)
7236 break;
8387904d 7237 if (ent == NULL
e054468f
AM
7238 || (h->type != STT_GNU_IFUNC
7239 && (SYMBOL_CALLS_LOCAL (info, h)
7240 || (ELF_ST_VISIBILITY (h->other) != STV_DEFAULT
a4b6fadd
AM
7241 && h->root.type == bfd_link_hash_undefweak)))
7242 || ((struct ppc_link_hash_entry *) h)->save_res)
40b8271b 7243 {
411e1bfb 7244 h->plt.plist = NULL;
f5385ebf 7245 h->needs_plt = 0;
d1eca1e4 7246 h->pointer_equality_needed = 0;
40b8271b 7247 }
8a2058b5 7248 else if (abiversion (info->output_bfd) >= 2)
a345bc8d 7249 {
d1eca1e4
AM
7250 /* Taking a function's address in a read/write section
7251 doesn't require us to define the function symbol in the
7252 executable on a global entry stub. A dynamic reloc can
8a2058b5
AM
7253 be used instead. The reason we prefer a few more dynamic
7254 relocs is that calling via a global entry stub costs a
7255 few more instructions, and pointer_equality_needed causes
7256 extra work in ld.so when resolving these symbols. */
7257 if (global_entry_stub (h)
d311bc8b 7258 && !alias_readonly_dynrelocs (h))
d1eca1e4
AM
7259 {
7260 h->pointer_equality_needed = 0;
8a2058b5
AM
7261 /* After adjust_dynamic_symbol, non_got_ref set in
7262 the non-pic case means that dyn_relocs for this
7263 symbol should be discarded. */
d1eca1e4
AM
7264 h->non_got_ref = 0;
7265 }
7266
a345bc8d
AM
7267 /* If making a plt entry, then we don't need copy relocs. */
7268 return TRUE;
7269 }
5bd4f169 7270 }
bbd7ec4a 7271 else
411e1bfb 7272 h->plt.plist = NULL;
5bd4f169
AM
7273
7274 /* If this is a weak symbol, and there is a real definition, the
7275 processor independent code will have arranged for us to see the
7276 real definition first, and we can just use the same value. */
f6e332e6 7277 if (h->u.weakdef != NULL)
5bd4f169 7278 {
f6e332e6
AM
7279 BFD_ASSERT (h->u.weakdef->root.type == bfd_link_hash_defined
7280 || h->u.weakdef->root.type == bfd_link_hash_defweak);
7281 h->root.u.def.section = h->u.weakdef->root.u.def.section;
7282 h->root.u.def.value = h->u.weakdef->root.u.def.value;
a23b6845 7283 if (ELIMINATE_COPY_RELOCS)
f6e332e6 7284 h->non_got_ref = h->u.weakdef->non_got_ref;
b34976b6 7285 return TRUE;
5bd4f169
AM
7286 }
7287
5bd4f169
AM
7288 /* If we are creating a shared library, we must presume that the
7289 only references to the symbol are via the global offset table.
7290 For such cases we need not do anything here; the relocations will
7291 be handled correctly by relocate_section. */
0e1862bb 7292 if (bfd_link_pic (info))
b34976b6 7293 return TRUE;
5bd4f169 7294
65f38f15
AM
7295 /* If there are no references to this symbol that do not use the
7296 GOT, we don't need to generate a copy reloc. */
f5385ebf 7297 if (!h->non_got_ref)
b34976b6 7298 return TRUE;
65f38f15 7299
b186458a 7300 /* Don't generate a copy reloc for symbols defined in the executable. */
d93d1c80 7301 if (!h->def_dynamic || !h->ref_regular || h->def_regular
b186458a 7302
d93d1c80
AM
7303 /* If -z nocopyreloc was given, don't generate them either. */
7304 || info->nocopyreloc
a127494f 7305
d93d1c80
AM
7306 /* If we didn't find any dynamic relocs in read-only sections, then
7307 we'll be keeping the dynamic relocs and avoiding the copy reloc. */
d311bc8b 7308 || (ELIMINATE_COPY_RELOCS && !alias_readonly_dynrelocs (h))
65f38f15 7309
d93d1c80
AM
7310 /* Protected variables do not work with .dynbss. The copy in
7311 .dynbss won't be used by the shared library with the protected
7312 definition for the variable. Text relocations are preferable
7313 to an incorrect program. */
7314 || h->protected_def)
a127494f
AM
7315 {
7316 h->non_got_ref = 0;
7317 return TRUE;
7318 }
7319
5d35169e 7320 if (h->plt.plist != NULL)
97b639ba
AM
7321 {
7322 /* We should never get here, but unfortunately there are versions
7323 of gcc out there that improperly (for this ABI) put initialized
7324 function pointers, vtable refs and suchlike in read-only
7325 sections. Allow them to proceed, but warn that this might
7326 break at runtime. */
25f53a85 7327 info->callbacks->einfo
bc30df16 7328 (_("%P: copy reloc against `%T' requires lazy plt linking; "
25f53a85 7329 "avoid setting LD_BIND_NOW=1 or upgrade gcc\n"),
97b639ba
AM
7330 h->root.root.string);
7331 }
5d35169e
AM
7332
7333 /* This is a reference to a symbol defined by a dynamic object which
7334 is not a function. */
7335
5bd4f169
AM
7336 /* We must allocate the symbol in our .dynbss section, which will
7337 become part of the .bss section of the executable. There will be
7338 an entry for this symbol in the .dynsym section. The dynamic
7339 object will contain position independent code, so all references
7340 from the dynamic object to this symbol will go through the global
7341 offset table. The dynamic linker will use the .dynsym entry to
7342 determine the address it must put in the global offset table, so
7343 both the dynamic object and the regular object will refer to the
7344 same memory location for the variable. */
5bd4f169 7345
04c9666a
AM
7346 /* We must generate a R_PPC64_COPY reloc to tell the dynamic linker
7347 to copy the initial value out of the dynamic object and into the
5bd4f169
AM
7348 runtime process image. We need to remember the offset into the
7349 .rela.bss section we are going to use. */
1d7e9d18 7350 if ((h->root.u.def.section->flags & SEC_ALLOC) != 0 && h->size != 0)
5bd4f169 7351 {
eea6121a 7352 htab->relbss->size += sizeof (Elf64_External_Rela);
f5385ebf 7353 h->needs_copy = 1;
5bd4f169
AM
7354 }
7355
4ce794b7 7356 s = htab->dynbss;
5bd4f169 7357
6cabe1ea 7358 return _bfd_elf_adjust_dynamic_copy (info, h, s);
5bd4f169
AM
7359}
7360
e86ce104
AM
7361/* If given a function descriptor symbol, hide both the function code
7362 sym and the descriptor. */
7363static void
4ce794b7
AM
7364ppc64_elf_hide_symbol (struct bfd_link_info *info,
7365 struct elf_link_hash_entry *h,
7366 bfd_boolean force_local)
e86ce104 7367{
34814b9f 7368 struct ppc_link_hash_entry *eh;
e86ce104
AM
7369 _bfd_elf_link_hash_hide_symbol (info, h, force_local);
7370
34814b9f
AM
7371 eh = (struct ppc_link_hash_entry *) h;
7372 if (eh->is_func_descriptor)
e86ce104 7373 {
34814b9f 7374 struct ppc_link_hash_entry *fh = eh->oh;
e86ce104 7375
721956f4 7376 if (fh == NULL)
d1329ca3
AM
7377 {
7378 const char *p, *q;
7379 struct ppc_link_hash_table *htab;
7380 char save;
7381
7382 /* We aren't supposed to use alloca in BFD because on
7383 systems which do not have alloca the version in libiberty
7384 calls xmalloc, which might cause the program to crash
7385 when it runs out of memory. This function doesn't have a
7386 return status, so there's no way to gracefully return an
7387 error. So cheat. We know that string[-1] can be safely
34814b9f
AM
7388 accessed; It's either a string in an ELF string table,
7389 or allocated in an objalloc structure. */
d1329ca3 7390
34814b9f 7391 p = eh->elf.root.root.string - 1;
d1329ca3
AM
7392 save = *p;
7393 *(char *) p = '.';
7394 htab = ppc_hash_table (info);
4dfe6ac6
NC
7395 if (htab == NULL)
7396 return;
7397
34814b9f
AM
7398 fh = (struct ppc_link_hash_entry *)
7399 elf_link_hash_lookup (&htab->elf, p, FALSE, FALSE, FALSE);
d1329ca3
AM
7400 *(char *) p = save;
7401
7402 /* Unfortunately, if it so happens that the string we were
7403 looking for was allocated immediately before this string,
7404 then we overwrote the string terminator. That's the only
7405 reason the lookup should fail. */
7406 if (fh == NULL)
7407 {
34814b9f
AM
7408 q = eh->elf.root.root.string + strlen (eh->elf.root.root.string);
7409 while (q >= eh->elf.root.root.string && *q == *p)
d1329ca3 7410 --q, --p;
34814b9f
AM
7411 if (q < eh->elf.root.root.string && *p == '.')
7412 fh = (struct ppc_link_hash_entry *)
7413 elf_link_hash_lookup (&htab->elf, p, FALSE, FALSE, FALSE);
d1329ca3
AM
7414 }
7415 if (fh != NULL)
7416 {
34814b9f
AM
7417 eh->oh = fh;
7418 fh->oh = eh;
d1329ca3
AM
7419 }
7420 }
e86ce104 7421 if (fh != NULL)
34814b9f 7422 _bfd_elf_link_hash_hide_symbol (info, &fh->elf, force_local);
e86ce104
AM
7423 }
7424}
7425
411e1bfb 7426static bfd_boolean
8843416a
AM
7427get_sym_h (struct elf_link_hash_entry **hp,
7428 Elf_Internal_Sym **symp,
7429 asection **symsecp,
f961d9dd 7430 unsigned char **tls_maskp,
8843416a
AM
7431 Elf_Internal_Sym **locsymsp,
7432 unsigned long r_symndx,
7433 bfd *ibfd)
411e1bfb 7434{
0ffa91dd 7435 Elf_Internal_Shdr *symtab_hdr = &elf_symtab_hdr (ibfd);
411e1bfb
AM
7436
7437 if (r_symndx >= symtab_hdr->sh_info)
7438 {
7439 struct elf_link_hash_entry **sym_hashes = elf_sym_hashes (ibfd);
7440 struct elf_link_hash_entry *h;
7441
7442 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
b31867b6 7443 h = elf_follow_link (h);
411e1bfb
AM
7444
7445 if (hp != NULL)
7446 *hp = h;
7447
7448 if (symp != NULL)
7449 *symp = NULL;
7450
7451 if (symsecp != NULL)
7452 {
7453 asection *symsec = NULL;
7454 if (h->root.type == bfd_link_hash_defined
7455 || h->root.type == bfd_link_hash_defweak)
7456 symsec = h->root.u.def.section;
7457 *symsecp = symsec;
7458 }
7459
e7b938ca 7460 if (tls_maskp != NULL)
411e1bfb
AM
7461 {
7462 struct ppc_link_hash_entry *eh;
7463
7464 eh = (struct ppc_link_hash_entry *) h;
e7b938ca 7465 *tls_maskp = &eh->tls_mask;
411e1bfb
AM
7466 }
7467 }
7468 else
7469 {
7470 Elf_Internal_Sym *sym;
7471 Elf_Internal_Sym *locsyms = *locsymsp;
7472
7473 if (locsyms == NULL)
7474 {
7475 locsyms = (Elf_Internal_Sym *) symtab_hdr->contents;
7476 if (locsyms == NULL)
7477 locsyms = bfd_elf_get_elf_syms (ibfd, symtab_hdr,
7478 symtab_hdr->sh_info,
7479 0, NULL, NULL, NULL);
7480 if (locsyms == NULL)
7481 return FALSE;
7482 *locsymsp = locsyms;
7483 }
7484 sym = locsyms + r_symndx;
7485
7486 if (hp != NULL)
7487 *hp = NULL;
7488
7489 if (symp != NULL)
7490 *symp = sym;
7491
7492 if (symsecp != NULL)
cb33740c 7493 *symsecp = bfd_section_from_elf_index (ibfd, sym->st_shndx);
411e1bfb 7494
e7b938ca 7495 if (tls_maskp != NULL)
411e1bfb
AM
7496 {
7497 struct got_entry **lgot_ents;
f961d9dd 7498 unsigned char *tls_mask;
411e1bfb 7499
e7b938ca 7500 tls_mask = NULL;
411e1bfb
AM
7501 lgot_ents = elf_local_got_ents (ibfd);
7502 if (lgot_ents != NULL)
7503 {
e054468f
AM
7504 struct plt_entry **local_plt = (struct plt_entry **)
7505 (lgot_ents + symtab_hdr->sh_info);
f961d9dd 7506 unsigned char *lgot_masks = (unsigned char *)
e054468f 7507 (local_plt + symtab_hdr->sh_info);
e7b938ca 7508 tls_mask = &lgot_masks[r_symndx];
411e1bfb 7509 }
e7b938ca 7510 *tls_maskp = tls_mask;
411e1bfb
AM
7511 }
7512 }
7513 return TRUE;
7514}
7515
e7b938ca 7516/* Returns TLS_MASKP for the given REL symbol. Function return is 0 on
951fd09b 7517 error, 2 on a toc GD type suitable for optimization, 3 on a toc LD
ad8e1ba5 7518 type suitable for optimization, and 1 otherwise. */
951fd09b
AM
7519
7520static int
f961d9dd 7521get_tls_mask (unsigned char **tls_maskp,
3a71aa26
AM
7522 unsigned long *toc_symndx,
7523 bfd_vma *toc_addend,
0d4792f7 7524 Elf_Internal_Sym **locsymsp,
3a71aa26
AM
7525 const Elf_Internal_Rela *rel,
7526 bfd *ibfd)
411e1bfb
AM
7527{
7528 unsigned long r_symndx;
0d4792f7 7529 int next_r;
411e1bfb
AM
7530 struct elf_link_hash_entry *h;
7531 Elf_Internal_Sym *sym;
7532 asection *sec;
7533 bfd_vma off;
7534
7535 r_symndx = ELF64_R_SYM (rel->r_info);
e7b938ca 7536 if (!get_sym_h (&h, &sym, &sec, tls_maskp, locsymsp, r_symndx, ibfd))
951fd09b 7537 return 0;
411e1bfb 7538
e7b938ca 7539 if ((*tls_maskp != NULL && **tls_maskp != 0)
411e1bfb 7540 || sec == NULL
6bee8834 7541 || ppc64_elf_section_data (sec) == NULL
7c8fe5c4 7542 || ppc64_elf_section_data (sec)->sec_type != sec_toc)
951fd09b 7543 return 1;
411e1bfb
AM
7544
7545 /* Look inside a TOC section too. */
7546 if (h != NULL)
7547 {
7548 BFD_ASSERT (h->root.type == bfd_link_hash_defined);
7549 off = h->root.u.def.value;
7550 }
7551 else
7552 off = sym->st_value;
7553 off += rel->r_addend;
7554 BFD_ASSERT (off % 8 == 0);
3a71aa26
AM
7555 r_symndx = ppc64_elf_section_data (sec)->u.toc.symndx[off / 8];
7556 next_r = ppc64_elf_section_data (sec)->u.toc.symndx[off / 8 + 1];
0d4792f7
AM
7557 if (toc_symndx != NULL)
7558 *toc_symndx = r_symndx;
3a71aa26
AM
7559 if (toc_addend != NULL)
7560 *toc_addend = ppc64_elf_section_data (sec)->u.toc.add[off / 8];
7561 if (!get_sym_h (&h, &sym, &sec, tls_maskp, locsymsp, r_symndx, ibfd))
7562 return 0;
854b41e7 7563 if ((h == NULL || is_static_defined (h))
0d4792f7
AM
7564 && (next_r == -1 || next_r == -2))
7565 return 1 - next_r;
951fd09b 7566 return 1;
411e1bfb
AM
7567}
7568
3b421ab3
AM
7569/* Find (or create) an entry in the tocsave hash table. */
7570
7571static struct tocsave_entry *
7572tocsave_find (struct ppc_link_hash_table *htab,
7573 enum insert_option insert,
7574 Elf_Internal_Sym **local_syms,
7575 const Elf_Internal_Rela *irela,
7576 bfd *ibfd)
7577{
7578 unsigned long r_indx;
7579 struct elf_link_hash_entry *h;
7580 Elf_Internal_Sym *sym;
7581 struct tocsave_entry ent, *p;
7582 hashval_t hash;
7583 struct tocsave_entry **slot;
7584
7585 r_indx = ELF64_R_SYM (irela->r_info);
7586 if (!get_sym_h (&h, &sym, &ent.sec, NULL, local_syms, r_indx, ibfd))
7587 return NULL;
7588 if (ent.sec == NULL || ent.sec->output_section == NULL)
7589 {
7590 (*_bfd_error_handler)
7591 (_("%B: undefined symbol on R_PPC64_TOCSAVE relocation"));
7592 return NULL;
7593 }
7594
7595 if (h != NULL)
7596 ent.offset = h->root.u.def.value;
7597 else
7598 ent.offset = sym->st_value;
7599 ent.offset += irela->r_addend;
7600
7601 hash = tocsave_htab_hash (&ent);
7602 slot = ((struct tocsave_entry **)
7603 htab_find_slot_with_hash (htab->tocsave_htab, &ent, hash, insert));
7604 if (slot == NULL)
7605 return NULL;
7606
7607 if (*slot == NULL)
7608 {
7609 p = (struct tocsave_entry *) bfd_alloc (ibfd, sizeof (*p));
7610 if (p == NULL)
7611 return NULL;
7612 *p = ent;
7613 *slot = p;
7614 }
7615 return *slot;
7616}
7617
754021d0 7618/* Adjust all global syms defined in opd sections. In gcc generated
8387904d 7619 code for the old ABI, these will already have been done. */
754021d0
AM
7620
7621static bfd_boolean
7622adjust_opd_syms (struct elf_link_hash_entry *h, void *inf ATTRIBUTE_UNUSED)
7623{
7624 struct ppc_link_hash_entry *eh;
7625 asection *sym_sec;
74f0fb50 7626 struct _opd_sec_data *opd;
754021d0
AM
7627
7628 if (h->root.type == bfd_link_hash_indirect)
7629 return TRUE;
7630
754021d0
AM
7631 if (h->root.type != bfd_link_hash_defined
7632 && h->root.type != bfd_link_hash_defweak)
7633 return TRUE;
7634
7635 eh = (struct ppc_link_hash_entry *) h;
7636 if (eh->adjust_done)
7637 return TRUE;
7638
7639 sym_sec = eh->elf.root.u.def.section;
74f0fb50
AM
7640 opd = get_opd_info (sym_sec);
7641 if (opd != NULL && opd->adjust != NULL)
754021d0 7642 {
51aecdc5 7643 long adjust = opd->adjust[OPD_NDX (eh->elf.root.u.def.value)];
4025353c
AM
7644 if (adjust == -1)
7645 {
7646 /* This entry has been deleted. */
b3fac117 7647 asection *dsec = ppc64_elf_tdata (sym_sec->owner)->deleted_section;
81688140
AM
7648 if (dsec == NULL)
7649 {
7650 for (dsec = sym_sec->owner->sections; dsec; dsec = dsec->next)
dbaa2011 7651 if (discarded_section (dsec))
81688140 7652 {
b3fac117 7653 ppc64_elf_tdata (sym_sec->owner)->deleted_section = dsec;
81688140
AM
7654 break;
7655 }
7656 }
4025353c 7657 eh->elf.root.u.def.value = 0;
81688140 7658 eh->elf.root.u.def.section = dsec;
4025353c
AM
7659 }
7660 else
7661 eh->elf.root.u.def.value += adjust;
754021d0
AM
7662 eh->adjust_done = 1;
7663 }
7664 return TRUE;
7665}
7666
8c1d1bb8 7667/* Handles decrementing dynamic reloc counts for the reloc specified by
19e08130 7668 R_INFO in section SEC. If LOCAL_SYMS is NULL, then H and SYM
8c1d1bb8
AM
7669 have already been determined. */
7670
7671static bfd_boolean
7672dec_dynrel_count (bfd_vma r_info,
7673 asection *sec,
7674 struct bfd_link_info *info,
7675 Elf_Internal_Sym **local_syms,
7676 struct elf_link_hash_entry *h,
19e08130 7677 Elf_Internal_Sym *sym)
8c1d1bb8
AM
7678{
7679 enum elf_ppc64_reloc_type r_type;
19e08130 7680 asection *sym_sec = NULL;
8c1d1bb8
AM
7681
7682 /* Can this reloc be dynamic? This switch, and later tests here
7683 should be kept in sync with the code in check_relocs. */
7684 r_type = ELF64_R_TYPE (r_info);
7685 switch (r_type)
7686 {
7687 default:
7688 return TRUE;
7689
7690 case R_PPC64_TPREL16:
7691 case R_PPC64_TPREL16_LO:
7692 case R_PPC64_TPREL16_HI:
7693 case R_PPC64_TPREL16_HA:
7694 case R_PPC64_TPREL16_DS:
7695 case R_PPC64_TPREL16_LO_DS:
f9c6b907
AM
7696 case R_PPC64_TPREL16_HIGH:
7697 case R_PPC64_TPREL16_HIGHA:
8c1d1bb8
AM
7698 case R_PPC64_TPREL16_HIGHER:
7699 case R_PPC64_TPREL16_HIGHERA:
7700 case R_PPC64_TPREL16_HIGHEST:
7701 case R_PPC64_TPREL16_HIGHESTA:
0e1862bb 7702 if (!bfd_link_pic (info))
8c1d1bb8
AM
7703 return TRUE;
7704
7705 case R_PPC64_TPREL64:
7706 case R_PPC64_DTPMOD64:
7707 case R_PPC64_DTPREL64:
7708 case R_PPC64_ADDR64:
7709 case R_PPC64_REL30:
7710 case R_PPC64_REL32:
7711 case R_PPC64_REL64:
7712 case R_PPC64_ADDR14:
7713 case R_PPC64_ADDR14_BRNTAKEN:
7714 case R_PPC64_ADDR14_BRTAKEN:
7715 case R_PPC64_ADDR16:
7716 case R_PPC64_ADDR16_DS:
7717 case R_PPC64_ADDR16_HA:
7718 case R_PPC64_ADDR16_HI:
f9c6b907
AM
7719 case R_PPC64_ADDR16_HIGH:
7720 case R_PPC64_ADDR16_HIGHA:
8c1d1bb8
AM
7721 case R_PPC64_ADDR16_HIGHER:
7722 case R_PPC64_ADDR16_HIGHERA:
7723 case R_PPC64_ADDR16_HIGHEST:
7724 case R_PPC64_ADDR16_HIGHESTA:
7725 case R_PPC64_ADDR16_LO:
7726 case R_PPC64_ADDR16_LO_DS:
7727 case R_PPC64_ADDR24:
7728 case R_PPC64_ADDR32:
7729 case R_PPC64_UADDR16:
7730 case R_PPC64_UADDR32:
7731 case R_PPC64_UADDR64:
7732 case R_PPC64_TOC:
7733 break;
7734 }
7735
7736 if (local_syms != NULL)
7737 {
7738 unsigned long r_symndx;
8c1d1bb8
AM
7739 bfd *ibfd = sec->owner;
7740
7741 r_symndx = ELF64_R_SYM (r_info);
7742 if (!get_sym_h (&h, &sym, &sym_sec, NULL, local_syms, r_symndx, ibfd))
7743 return FALSE;
7744 }
7745
0e1862bb 7746 if ((bfd_link_pic (info)
1d483afe 7747 && (must_be_dyn_reloc (info, r_type)
8c1d1bb8 7748 || (h != NULL
198f1157 7749 && (!SYMBOLIC_BIND (info, h)
8c1d1bb8
AM
7750 || h->root.type == bfd_link_hash_defweak
7751 || !h->def_regular))))
7752 || (ELIMINATE_COPY_RELOCS
0e1862bb 7753 && !bfd_link_pic (info)
8c1d1bb8
AM
7754 && h != NULL
7755 && (h->root.type == bfd_link_hash_defweak
7756 || !h->def_regular)))
7757 ;
7758 else
7759 return TRUE;
7760
7761 if (h != NULL)
6edfbbad 7762 {
19e08130
AM
7763 struct elf_dyn_relocs *p;
7764 struct elf_dyn_relocs **pp;
7765 pp = &((struct ppc_link_hash_entry *) h)->dyn_relocs;
7766
7767 /* elf_gc_sweep may have already removed all dyn relocs associated
7768 with local syms for a given section. Also, symbol flags are
7769 changed by elf_gc_sweep_symbol, confusing the test above. Don't
7770 report a dynreloc miscount. */
7771 if (*pp == NULL && info->gc_sections)
7772 return TRUE;
7773
7774 while ((p = *pp) != NULL)
60124e18 7775 {
19e08130
AM
7776 if (p->sec == sec)
7777 {
7778 if (!must_be_dyn_reloc (info, r_type))
7779 p->pc_count -= 1;
7780 p->count -= 1;
7781 if (p->count == 0)
7782 *pp = p->next;
7783 return TRUE;
7784 }
7785 pp = &p->next;
60124e18 7786 }
6edfbbad 7787 }
19e08130
AM
7788 else
7789 {
7790 struct ppc_dyn_relocs *p;
7791 struct ppc_dyn_relocs **pp;
7792 void *vpp;
7793 bfd_boolean is_ifunc;
8c1d1bb8 7794
19e08130
AM
7795 if (local_syms == NULL)
7796 sym_sec = bfd_section_from_elf_index (sec->owner, sym->st_shndx);
7797 if (sym_sec == NULL)
7798 sym_sec = sec;
c57da1a7 7799
19e08130
AM
7800 vpp = &elf_section_data (sym_sec)->local_dynrel;
7801 pp = (struct ppc_dyn_relocs **) vpp;
7802
7803 if (*pp == NULL && info->gc_sections)
7804 return TRUE;
7805
7806 is_ifunc = ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC;
7807 while ((p = *pp) != NULL)
8c1d1bb8 7808 {
19e08130
AM
7809 if (p->sec == sec && p->ifunc == is_ifunc)
7810 {
7811 p->count -= 1;
7812 if (p->count == 0)
7813 *pp = p->next;
7814 return TRUE;
7815 }
7816 pp = &p->next;
8c1d1bb8 7817 }
8c1d1bb8
AM
7818 }
7819
8de848d8 7820 info->callbacks->einfo (_("%P: dynreloc miscount for %B, section %A\n"),
25f53a85 7821 sec->owner, sec);
8c1d1bb8
AM
7822 bfd_set_error (bfd_error_bad_value);
7823 return FALSE;
7824}
7825
754021d0
AM
7826/* Remove unused Official Procedure Descriptor entries. Currently we
7827 only remove those associated with functions in discarded link-once
7828 sections, or weakly defined functions that have been overridden. It
7829 would be possible to remove many more entries for statically linked
7830 applications. */
7831
b34976b6 7832bfd_boolean
e7d1c40c 7833ppc64_elf_edit_opd (struct bfd_link_info *info)
1e2f5b6e
AM
7834{
7835 bfd *ibfd;
754021d0 7836 bfd_boolean some_edited = FALSE;
3f764659 7837 asection *need_pad = NULL;
e7d1c40c
AM
7838 struct ppc_link_hash_table *htab;
7839
7840 htab = ppc_hash_table (info);
7841 if (htab == NULL)
7842 return FALSE;
1e2f5b6e 7843
c72f2fb2 7844 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
1e2f5b6e
AM
7845 {
7846 asection *sec;
7847 Elf_Internal_Rela *relstart, *rel, *relend;
7848 Elf_Internal_Shdr *symtab_hdr;
6cdc0ccc 7849 Elf_Internal_Sym *local_syms;
74f0fb50 7850 struct _opd_sec_data *opd;
51aecdc5 7851 bfd_boolean need_edit, add_aux_fields, broken;
3f764659 7852 bfd_size_type cnt_16b = 0;
1e2f5b6e 7853
854b41e7
AM
7854 if (!is_ppc64_elf (ibfd))
7855 continue;
7856
1e2f5b6e 7857 sec = bfd_get_section_by_name (ibfd, ".opd");
46de2a7c 7858 if (sec == NULL || sec->size == 0)
1e2f5b6e
AM
7859 continue;
7860
dbaa2011 7861 if (sec->sec_info_type == SEC_INFO_TYPE_JUST_SYMS)
4b85d634
AM
7862 continue;
7863
1e2f5b6e
AM
7864 if (sec->output_section == bfd_abs_section_ptr)
7865 continue;
7866
7867 /* Look through the section relocs. */
7868 if ((sec->flags & SEC_RELOC) == 0 || sec->reloc_count == 0)
7869 continue;
7870
6cdc0ccc 7871 local_syms = NULL;
0ffa91dd 7872 symtab_hdr = &elf_symtab_hdr (ibfd);
1e2f5b6e
AM
7873
7874 /* Read the relocations. */
4ce794b7 7875 relstart = _bfd_elf_link_read_relocs (ibfd, sec, NULL, NULL,
45d6a902 7876 info->keep_memory);
1e2f5b6e 7877 if (relstart == NULL)
b34976b6 7878 return FALSE;
1e2f5b6e
AM
7879
7880 /* First run through the relocs to check they are sane, and to
7881 determine whether we need to edit this opd section. */
b34976b6 7882 need_edit = FALSE;
51aecdc5 7883 broken = FALSE;
3f764659 7884 need_pad = sec;
1e2f5b6e 7885 relend = relstart + sec->reloc_count;
50bc7936 7886 for (rel = relstart; rel < relend; )
1e2f5b6e 7887 {
04c9666a 7888 enum elf_ppc64_reloc_type r_type;
1e2f5b6e
AM
7889 unsigned long r_symndx;
7890 asection *sym_sec;
7891 struct elf_link_hash_entry *h;
7892 Elf_Internal_Sym *sym;
51aecdc5 7893 bfd_vma offset;
1e2f5b6e 7894
51aecdc5 7895 /* .opd contains an array of 16 or 24 byte entries. We're
1e2f5b6e
AM
7896 only interested in the reloc pointing to a function entry
7897 point. */
51aecdc5
AM
7898 offset = rel->r_offset;
7899 if (rel + 1 == relend
7900 || rel[1].r_offset != offset + 8)
1e2f5b6e
AM
7901 {
7902 /* If someone messes with .opd alignment then after a
7903 "ld -r" we might have padding in the middle of .opd.
7904 Also, there's nothing to prevent someone putting
7905 something silly in .opd with the assembler. No .opd
b34976b6 7906 optimization for them! */
3f764659 7907 broken_opd:
1e2f5b6e 7908 (*_bfd_error_handler)
d003868e 7909 (_("%B: .opd is not a regular array of opd entries"), ibfd);
51aecdc5 7910 broken = TRUE;
1e2f5b6e
AM
7911 break;
7912 }
7913
50bc7936
AM
7914 if ((r_type = ELF64_R_TYPE (rel->r_info)) != R_PPC64_ADDR64
7915 || (r_type = ELF64_R_TYPE ((rel + 1)->r_info)) != R_PPC64_TOC)
7916 {
7917 (*_bfd_error_handler)
d003868e
AM
7918 (_("%B: unexpected reloc type %u in .opd section"),
7919 ibfd, r_type);
51aecdc5 7920 broken = TRUE;
50bc7936
AM
7921 break;
7922 }
7923
1e2f5b6e 7924 r_symndx = ELF64_R_SYM (rel->r_info);
411e1bfb
AM
7925 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms,
7926 r_symndx, ibfd))
50bc7936 7927 goto error_ret;
1e2f5b6e
AM
7928
7929 if (sym_sec == NULL || sym_sec->owner == NULL)
7930 {
411e1bfb
AM
7931 const char *sym_name;
7932 if (h != NULL)
7933 sym_name = h->root.root.string;
7934 else
26c61ae5
L
7935 sym_name = bfd_elf_sym_name (ibfd, symtab_hdr, sym,
7936 sym_sec);
411e1bfb 7937
1e2f5b6e 7938 (*_bfd_error_handler)
d003868e
AM
7939 (_("%B: undefined sym `%s' in .opd section"),
7940 ibfd, sym_name);
51aecdc5 7941 broken = TRUE;
1e2f5b6e
AM
7942 break;
7943 }
7944
51020317
AM
7945 /* opd entries are always for functions defined in the
7946 current input bfd. If the symbol isn't defined in the
7947 input bfd, then we won't be using the function in this
7948 bfd; It must be defined in a linkonce section in another
7949 bfd, or is weak. It's also possible that we are
7950 discarding the function due to a linker script /DISCARD/,
7951 which we test for via the output_section. */
7952 if (sym_sec->owner != ibfd
7953 || sym_sec->output_section == bfd_abs_section_ptr)
b34976b6 7954 need_edit = TRUE;
1e2f5b6e 7955
50bc7936 7956 rel += 2;
51aecdc5
AM
7957 if (rel + 1 == relend
7958 || (rel + 2 < relend
7959 && ELF64_R_TYPE (rel[2].r_info) == R_PPC64_TOC))
7960 ++rel;
7961
7962 if (rel == relend)
3f764659
JJ
7963 {
7964 if (sec->size == offset + 24)
7965 {
7966 need_pad = NULL;
7967 break;
7968 }
51aecdc5 7969 if (sec->size == offset + 16)
3f764659
JJ
7970 {
7971 cnt_16b++;
7972 break;
7973 }
7974 goto broken_opd;
7975 }
3f764659
JJ
7976 else if (rel + 1 < relend
7977 && ELF64_R_TYPE (rel[0].r_info) == R_PPC64_ADDR64
7978 && ELF64_R_TYPE (rel[1].r_info) == R_PPC64_TOC)
7979 {
51aecdc5
AM
7980 if (rel[0].r_offset == offset + 16)
7981 cnt_16b++;
7982 else if (rel[0].r_offset != offset + 24)
7983 goto broken_opd;
3f764659
JJ
7984 }
7985 else
7986 goto broken_opd;
1e2f5b6e
AM
7987 }
7988
e7d1c40c 7989 add_aux_fields = htab->params->non_overlapping_opd && cnt_16b > 0;
3f764659 7990
51aecdc5 7991 if (!broken && (need_edit || add_aux_fields))
1e2f5b6e
AM
7992 {
7993 Elf_Internal_Rela *write_rel;
d4730f92 7994 Elf_Internal_Shdr *rel_hdr;
1e2f5b6e 7995 bfd_byte *rptr, *wptr;
983bddc8 7996 bfd_byte *new_contents;
74f0fb50
AM
7997 bfd_size_type amt;
7998
983bddc8 7999 new_contents = NULL;
51aecdc5 8000 amt = OPD_NDX (sec->size) * sizeof (long);
74f0fb50 8001 opd = &ppc64_elf_section_data (sec)->u.opd;
33c0ec9d 8002 opd->adjust = bfd_zalloc (sec->owner, amt);
74f0fb50
AM
8003 if (opd->adjust == NULL)
8004 return FALSE;
8005 ppc64_elf_section_data (sec)->sec_type = sec_opd;
1e2f5b6e
AM
8006
8007 /* This seems a waste of time as input .opd sections are all
8008 zeros as generated by gcc, but I suppose there's no reason
8009 this will always be so. We might start putting something in
8010 the third word of .opd entries. */
8011 if ((sec->flags & SEC_IN_MEMORY) == 0)
8012 {
eea6121a
AM
8013 bfd_byte *loc;
8014 if (!bfd_malloc_and_get_section (ibfd, sec, &loc))
6cdc0ccc 8015 {
eea6121a
AM
8016 if (loc != NULL)
8017 free (loc);
50bc7936 8018 error_ret:
6cdc0ccc
AM
8019 if (local_syms != NULL
8020 && symtab_hdr->contents != (unsigned char *) local_syms)
8021 free (local_syms);
6cdc0ccc
AM
8022 if (elf_section_data (sec)->relocs != relstart)
8023 free (relstart);
b34976b6 8024 return FALSE;
6cdc0ccc 8025 }
1e2f5b6e
AM
8026 sec->contents = loc;
8027 sec->flags |= (SEC_IN_MEMORY | SEC_HAS_CONTENTS);
8028 }
8029
8030 elf_section_data (sec)->relocs = relstart;
8031
3f764659 8032 new_contents = sec->contents;
3f764659
JJ
8033 if (add_aux_fields)
8034 {
8035 new_contents = bfd_malloc (sec->size + cnt_16b * 8);
8036 if (new_contents == NULL)
8037 return FALSE;
51aecdc5 8038 need_pad = NULL;
3f764659 8039 }
b4f4e59f
AM
8040 wptr = new_contents;
8041 rptr = sec->contents;
1e2f5b6e 8042 write_rel = relstart;
51aecdc5 8043 for (rel = relstart; rel < relend; )
1e2f5b6e 8044 {
50bc7936
AM
8045 unsigned long r_symndx;
8046 asection *sym_sec;
8047 struct elf_link_hash_entry *h;
51aecdc5 8048 struct ppc_link_hash_entry *fdh = NULL;
50bc7936 8049 Elf_Internal_Sym *sym;
51aecdc5
AM
8050 long opd_ent_size;
8051 Elf_Internal_Rela *next_rel;
8052 bfd_boolean skip;
50bc7936
AM
8053
8054 r_symndx = ELF64_R_SYM (rel->r_info);
8055 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms,
d37c89e5 8056 r_symndx, ibfd))
50bc7936
AM
8057 goto error_ret;
8058
51aecdc5
AM
8059 next_rel = rel + 2;
8060 if (next_rel + 1 == relend
8061 || (next_rel + 2 < relend
8062 && ELF64_R_TYPE (next_rel[2].r_info) == R_PPC64_TOC))
8063 ++next_rel;
8064
8065 /* See if the .opd entry is full 24 byte or
8066 16 byte (with fd_aux entry overlapped with next
8067 fd_func). */
8068 opd_ent_size = 24;
8069 if (next_rel == relend)
1e2f5b6e 8070 {
51aecdc5 8071 if (sec->size == rel->r_offset + 16)
3f764659 8072 opd_ent_size = 16;
51aecdc5
AM
8073 }
8074 else if (next_rel->r_offset == rel->r_offset + 16)
8075 opd_ent_size = 16;
3f764659 8076
51aecdc5
AM
8077 if (h != NULL
8078 && h->root.root.string[0] == '.')
8079 {
8080 fdh = lookup_fdh ((struct ppc_link_hash_entry *) h, htab);
8081 if (fdh != NULL
8082 && fdh->elf.root.type != bfd_link_hash_defined
8083 && fdh->elf.root.type != bfd_link_hash_defweak)
8084 fdh = NULL;
8085 }
1e2f5b6e 8086
51aecdc5
AM
8087 skip = (sym_sec->owner != ibfd
8088 || sym_sec->output_section == bfd_abs_section_ptr);
8089 if (skip)
8090 {
8091 if (fdh != NULL && sym_sec->owner == ibfd)
a4aa0fb7 8092 {
51aecdc5
AM
8093 /* Arrange for the function descriptor sym
8094 to be dropped. */
8095 fdh->elf.root.u.def.value = 0;
8096 fdh->elf.root.u.def.section = sym_sec;
a4aa0fb7 8097 }
51aecdc5 8098 opd->adjust[OPD_NDX (rel->r_offset)] = -1;
1e2f5b6e 8099
0e1862bb 8100 if (NO_OPD_RELOCS || bfd_link_relocatable (info))
51aecdc5
AM
8101 rel = next_rel;
8102 else
8103 while (1)
8104 {
8105 if (!dec_dynrel_count (rel->r_info, sec, info,
8106 NULL, h, sym))
8107 goto error_ret;
754021d0 8108
51aecdc5
AM
8109 if (++rel == next_rel)
8110 break;
1e2f5b6e 8111
51aecdc5
AM
8112 r_symndx = ELF64_R_SYM (rel->r_info);
8113 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms,
8114 r_symndx, ibfd))
8115 goto error_ret;
8116 }
50bc7936
AM
8117 }
8118 else
1e2f5b6e 8119 {
51aecdc5
AM
8120 /* We'll be keeping this opd entry. */
8121 long adjust;
8122
8123 if (fdh != NULL)
8124 {
8125 /* Redefine the function descriptor symbol to
8126 this location in the opd section. It is
8127 necessary to update the value here rather
8128 than using an array of adjustments as we do
8129 for local symbols, because various places
8130 in the generic ELF code use the value
8131 stored in u.def.value. */
8132 fdh->elf.root.u.def.value = wptr - new_contents;
8133 fdh->adjust_done = 1;
8134 }
8135
8136 /* Local syms are a bit tricky. We could
8137 tweak them as they can be cached, but
8138 we'd need to look through the local syms
8139 for the function descriptor sym which we
8140 don't have at the moment. So keep an
8141 array of adjustments. */
8142 adjust = (wptr - new_contents) - (rptr - sec->contents);
8143 opd->adjust[OPD_NDX (rel->r_offset)] = adjust;
8144
8145 if (wptr != rptr)
8146 memcpy (wptr, rptr, opd_ent_size);
8147 wptr += opd_ent_size;
8148 if (add_aux_fields && opd_ent_size == 16)
8149 {
8150 memset (wptr, '\0', 8);
8151 wptr += 8;
8152 }
8153
50bc7936 8154 /* We need to adjust any reloc offsets to point to the
51aecdc5
AM
8155 new opd entries. */
8156 for ( ; rel != next_rel; ++rel)
8157 {
8158 rel->r_offset += adjust;
8159 if (write_rel != rel)
8160 memcpy (write_rel, rel, sizeof (*rel));
8161 ++write_rel;
8162 }
1e2f5b6e 8163 }
51aecdc5
AM
8164
8165 rptr += opd_ent_size;
1e2f5b6e
AM
8166 }
8167
3f764659 8168 sec->size = wptr - new_contents;
1e2f5b6e 8169 sec->reloc_count = write_rel - relstart;
3f764659
JJ
8170 if (add_aux_fields)
8171 {
8172 free (sec->contents);
8173 sec->contents = new_contents;
8174 }
8175
05bf9422 8176 /* Fudge the header size too, as this is used later in
cdcf6e38 8177 elf_bfd_final_link if we are emitting relocs. */
d4730f92
BS
8178 rel_hdr = _bfd_elf_single_rel_hdr (sec);
8179 rel_hdr->sh_size = sec->reloc_count * rel_hdr->sh_entsize;
754021d0 8180 some_edited = TRUE;
1e2f5b6e 8181 }
6cdc0ccc 8182 else if (elf_section_data (sec)->relocs != relstart)
1e2f5b6e 8183 free (relstart);
6cdc0ccc 8184
411e1bfb
AM
8185 if (local_syms != NULL
8186 && symtab_hdr->contents != (unsigned char *) local_syms)
8187 {
8188 if (!info->keep_memory)
8189 free (local_syms);
8190 else
8191 symtab_hdr->contents = (unsigned char *) local_syms;
8192 }
8193 }
8194
754021d0
AM
8195 if (some_edited)
8196 elf_link_hash_traverse (elf_hash_table (info), adjust_opd_syms, NULL);
8197
3f764659
JJ
8198 /* If we are doing a final link and the last .opd entry is just 16 byte
8199 long, add a 8 byte padding after it. */
0e1862bb 8200 if (need_pad != NULL && !bfd_link_relocatable (info))
3f764659
JJ
8201 {
8202 bfd_byte *p;
8203
8204 if ((need_pad->flags & SEC_IN_MEMORY) == 0)
8205 {
8206 BFD_ASSERT (need_pad->size > 0);
8207
8208 p = bfd_malloc (need_pad->size + 8);
8209 if (p == NULL)
8210 return FALSE;
699733f6 8211
3f764659
JJ
8212 if (! bfd_get_section_contents (need_pad->owner, need_pad,
8213 p, 0, need_pad->size))
8214 return FALSE;
8215
8216 need_pad->contents = p;
8217 need_pad->flags |= (SEC_IN_MEMORY | SEC_HAS_CONTENTS);
8218 }
8219 else
8220 {
8221 p = bfd_realloc (need_pad->contents, need_pad->size + 8);
8222 if (p == NULL)
8223 return FALSE;
8224
8225 need_pad->contents = p;
8226 }
8227
8228 memset (need_pad->contents + need_pad->size, 0, 8);
8229 need_pad->size += 8;
8230 }
8231
411e1bfb
AM
8232 return TRUE;
8233}
8234
e1918d23 8235/* Set htab->tls_get_addr and call the generic ELF tls_setup function. */
411e1bfb 8236
e1918d23 8237asection *
e7d1c40c 8238ppc64_elf_tls_setup (struct bfd_link_info *info)
411e1bfb 8239{
411e1bfb
AM
8240 struct ppc_link_hash_table *htab;
8241
411e1bfb 8242 htab = ppc_hash_table (info);
4dfe6ac6
NC
8243 if (htab == NULL)
8244 return NULL;
8245
ee67d69a
AM
8246 if (abiversion (info->output_bfd) == 1)
8247 htab->opd_abi = 1;
8248
e7d1c40c 8249 if (htab->params->no_multi_toc)
33c0ec9d
AM
8250 htab->do_multi_toc = 0;
8251 else if (!htab->do_multi_toc)
e7d1c40c 8252 htab->params->no_multi_toc = 1;
33c0ec9d 8253
3a71aa26
AM
8254 htab->tls_get_addr = ((struct ppc_link_hash_entry *)
8255 elf_link_hash_lookup (&htab->elf, ".__tls_get_addr",
8256 FALSE, FALSE, TRUE));
a7f2871e
AM
8257 /* Move dynamic linking info to the function descriptor sym. */
8258 if (htab->tls_get_addr != NULL)
8259 func_desc_adjust (&htab->tls_get_addr->elf, info);
3a71aa26
AM
8260 htab->tls_get_addr_fd = ((struct ppc_link_hash_entry *)
8261 elf_link_hash_lookup (&htab->elf, "__tls_get_addr",
8262 FALSE, FALSE, TRUE));
7c9cf415 8263 if (htab->params->tls_get_addr_opt)
a7f2871e
AM
8264 {
8265 struct elf_link_hash_entry *opt, *opt_fd, *tga, *tga_fd;
8266
8267 opt = elf_link_hash_lookup (&htab->elf, ".__tls_get_addr_opt",
8268 FALSE, FALSE, TRUE);
8269 if (opt != NULL)
8270 func_desc_adjust (opt, info);
8271 opt_fd = elf_link_hash_lookup (&htab->elf, "__tls_get_addr_opt",
8272 FALSE, FALSE, TRUE);
8273 if (opt_fd != NULL
8274 && (opt_fd->root.type == bfd_link_hash_defined
8275 || opt_fd->root.type == bfd_link_hash_defweak))
8276 {
8277 /* If glibc supports an optimized __tls_get_addr call stub,
8278 signalled by the presence of __tls_get_addr_opt, and we'll
8279 be calling __tls_get_addr via a plt call stub, then
8280 make __tls_get_addr point to __tls_get_addr_opt. */
8281 tga_fd = &htab->tls_get_addr_fd->elf;
8282 if (htab->elf.dynamic_sections_created
8283 && tga_fd != NULL
8284 && (tga_fd->type == STT_FUNC
8285 || tga_fd->needs_plt)
8286 && !(SYMBOL_CALLS_LOCAL (info, tga_fd)
8287 || (ELF_ST_VISIBILITY (tga_fd->other) != STV_DEFAULT
8288 && tga_fd->root.type == bfd_link_hash_undefweak)))
8289 {
8290 struct plt_entry *ent;
8291
8292 for (ent = tga_fd->plt.plist; ent != NULL; ent = ent->next)
8293 if (ent->plt.refcount > 0)
8294 break;
8295 if (ent != NULL)
8296 {
8297 tga_fd->root.type = bfd_link_hash_indirect;
8298 tga_fd->root.u.i.link = &opt_fd->root;
8299 ppc64_elf_copy_indirect_symbol (info, opt_fd, tga_fd);
3bd43ebc 8300 opt_fd->forced_local = 0;
a7f2871e
AM
8301 if (opt_fd->dynindx != -1)
8302 {
8303 /* Use __tls_get_addr_opt in dynamic relocations. */
8304 opt_fd->dynindx = -1;
8305 _bfd_elf_strtab_delref (elf_hash_table (info)->dynstr,
8306 opt_fd->dynstr_index);
8307 if (!bfd_elf_link_record_dynamic_symbol (info, opt_fd))
854b41e7 8308 return NULL;
a7f2871e
AM
8309 }
8310 htab->tls_get_addr_fd = (struct ppc_link_hash_entry *) opt_fd;
8311 tga = &htab->tls_get_addr->elf;
8312 if (opt != NULL && tga != NULL)
8313 {
8314 tga->root.type = bfd_link_hash_indirect;
8315 tga->root.u.i.link = &opt->root;
8316 ppc64_elf_copy_indirect_symbol (info, opt, tga);
3bd43ebc 8317 opt->forced_local = 0;
a7f2871e
AM
8318 _bfd_elf_link_hash_hide_symbol (info, opt,
8319 tga->forced_local);
8320 htab->tls_get_addr = (struct ppc_link_hash_entry *) opt;
8321 }
8322 htab->tls_get_addr_fd->oh = htab->tls_get_addr;
8323 htab->tls_get_addr_fd->is_func_descriptor = 1;
8324 if (htab->tls_get_addr != NULL)
8325 {
8326 htab->tls_get_addr->oh = htab->tls_get_addr_fd;
8327 htab->tls_get_addr->is_func = 1;
8328 }
8329 }
8330 }
8331 }
7c9cf415
AM
8332 else if (htab->params->tls_get_addr_opt < 0)
8333 htab->params->tls_get_addr_opt = 0;
a7f2871e 8334 }
33c0ec9d 8335 return _bfd_elf_tls_setup (info->output_bfd, info);
3a71aa26 8336}
8387904d 8337
3a71aa26
AM
8338/* Return TRUE iff REL is a branch reloc with a global symbol matching
8339 HASH1 or HASH2. */
8387904d 8340
3a71aa26
AM
8341static bfd_boolean
8342branch_reloc_hash_match (const bfd *ibfd,
8343 const Elf_Internal_Rela *rel,
8344 const struct ppc_link_hash_entry *hash1,
8345 const struct ppc_link_hash_entry *hash2)
8346{
8347 Elf_Internal_Shdr *symtab_hdr = &elf_symtab_hdr (ibfd);
8348 enum elf_ppc64_reloc_type r_type = ELF64_R_TYPE (rel->r_info);
8349 unsigned int r_symndx = ELF64_R_SYM (rel->r_info);
8350
e054468f 8351 if (r_symndx >= symtab_hdr->sh_info && is_branch_reloc (r_type))
8387904d 8352 {
3a71aa26
AM
8353 struct elf_link_hash_entry **sym_hashes = elf_sym_hashes (ibfd);
8354 struct elf_link_hash_entry *h;
8387904d 8355
3a71aa26 8356 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
b31867b6 8357 h = elf_follow_link (h);
3a71aa26
AM
8358 if (h == &hash1->elf || h == &hash2->elf)
8359 return TRUE;
a48ebf4d 8360 }
3a71aa26 8361 return FALSE;
951fd09b 8362}
411e1bfb 8363
951fd09b
AM
8364/* Run through all the TLS relocs looking for optimization
8365 opportunities. The linker has been hacked (see ppc64elf.em) to do
8366 a preliminary section layout so that we know the TLS segment
8367 offsets. We can't optimize earlier because some optimizations need
8368 to know the tp offset, and we need to optimize before allocating
8369 dynamic relocations. */
8370
8371bfd_boolean
33c0ec9d 8372ppc64_elf_tls_optimize (struct bfd_link_info *info)
951fd09b
AM
8373{
8374 bfd *ibfd;
8375 asection *sec;
8376 struct ppc_link_hash_table *htab;
663a1470 8377 unsigned char *toc_ref;
102890f0 8378 int pass;
951fd09b 8379
3cbc1e5e 8380 if (!bfd_link_executable (info))
411e1bfb
AM
8381 return TRUE;
8382
951fd09b 8383 htab = ppc_hash_table (info);
4dfe6ac6
NC
8384 if (htab == NULL)
8385 return FALSE;
8386
663a1470
AM
8387 /* Make two passes over the relocs. On the first pass, mark toc
8388 entries involved with tls relocs, and check that tls relocs
8389 involved in setting up a tls_get_addr call are indeed followed by
8390 such a call. If they are not, we can't do any tls optimization.
8391 On the second pass twiddle tls_mask flags to notify
8392 relocate_section that optimization can be done, and adjust got
8393 and plt refcounts. */
8394 toc_ref = NULL;
8395 for (pass = 0; pass < 2; ++pass)
c72f2fb2 8396 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
663a1470
AM
8397 {
8398 Elf_Internal_Sym *locsyms = NULL;
8399 asection *toc = bfd_get_section_by_name (ibfd, ".toc");
8400
102890f0
AM
8401 for (sec = ibfd->sections; sec != NULL; sec = sec->next)
8402 if (sec->has_tls_reloc && !bfd_is_abs_section (sec->output_section))
8403 {
8404 Elf_Internal_Rela *relstart, *rel, *relend;
663a1470 8405 bfd_boolean found_tls_get_addr_arg = 0;
411e1bfb 8406
102890f0
AM
8407 /* Read the relocations. */
8408 relstart = _bfd_elf_link_read_relocs (ibfd, sec, NULL, NULL,
8409 info->keep_memory);
8410 if (relstart == NULL)
2915c55b
JK
8411 {
8412 free (toc_ref);
8413 return FALSE;
8414 }
411e1bfb 8415
102890f0
AM
8416 relend = relstart + sec->reloc_count;
8417 for (rel = relstart; rel < relend; rel++)
8418 {
8419 enum elf_ppc64_reloc_type r_type;
8420 unsigned long r_symndx;
8421 struct elf_link_hash_entry *h;
8422 Elf_Internal_Sym *sym;
8423 asection *sym_sec;
f961d9dd
AM
8424 unsigned char *tls_mask;
8425 unsigned char tls_set, tls_clear, tls_type = 0;
102890f0
AM
8426 bfd_vma value;
8427 bfd_boolean ok_tprel, is_local;
8428 long toc_ref_index = 0;
8429 int expecting_tls_get_addr = 0;
663a1470 8430 bfd_boolean ret = FALSE;
411e1bfb 8431
102890f0
AM
8432 r_symndx = ELF64_R_SYM (rel->r_info);
8433 if (!get_sym_h (&h, &sym, &sym_sec, &tls_mask, &locsyms,
8434 r_symndx, ibfd))
8435 {
8436 err_free_rel:
8437 if (elf_section_data (sec)->relocs != relstart)
8438 free (relstart);
8439 if (toc_ref != NULL)
8440 free (toc_ref);
8441 if (locsyms != NULL
0ffa91dd 8442 && (elf_symtab_hdr (ibfd).contents
102890f0
AM
8443 != (unsigned char *) locsyms))
8444 free (locsyms);
663a1470 8445 return ret;
102890f0 8446 }
411e1bfb 8447
102890f0
AM
8448 if (h != NULL)
8449 {
766bc656
AM
8450 if (h->root.type == bfd_link_hash_defined
8451 || h->root.type == bfd_link_hash_defweak)
8452 value = h->root.u.def.value;
8453 else if (h->root.type == bfd_link_hash_undefweak)
8454 value = 0;
8455 else
663a1470
AM
8456 {
8457 found_tls_get_addr_arg = 0;
8458 continue;
8459 }
102890f0
AM
8460 }
8461 else
8462 /* Symbols referenced by TLS relocs must be of type
8463 STT_TLS. So no need for .opd local sym adjust. */
8464 value = sym->st_value;
8465
8466 ok_tprel = FALSE;
8467 is_local = FALSE;
8468 if (h == NULL
8469 || !h->def_dynamic)
8470 {
8471 is_local = TRUE;
766bc656
AM
8472 if (h != NULL
8473 && h->root.type == bfd_link_hash_undefweak)
8474 ok_tprel = TRUE;
c27b8c2a
AM
8475 else if (sym_sec != NULL
8476 && sym_sec->output_section != NULL)
766bc656
AM
8477 {
8478 value += sym_sec->output_offset;
8479 value += sym_sec->output_section->vma;
8480 value -= htab->elf.tls_sec->vma;
8481 ok_tprel = (value + TP_OFFSET + ((bfd_vma) 1 << 31)
8482 < (bfd_vma) 1 << 32);
8483 }
102890f0 8484 }
951fd09b 8485
102890f0 8486 r_type = ELF64_R_TYPE (rel->r_info);
663a1470
AM
8487 /* If this section has old-style __tls_get_addr calls
8488 without marker relocs, then check that each
8489 __tls_get_addr call reloc is preceded by a reloc
8490 that conceivably belongs to the __tls_get_addr arg
8491 setup insn. If we don't find matching arg setup
8492 relocs, don't do any tls optimization. */
8493 if (pass == 0
8494 && sec->has_tls_get_addr_call
8495 && h != NULL
8496 && (h == &htab->tls_get_addr->elf
8497 || h == &htab->tls_get_addr_fd->elf)
8498 && !found_tls_get_addr_arg
8499 && is_branch_reloc (r_type))
8500 {
25f53a85 8501 info->callbacks->minfo (_("%H __tls_get_addr lost arg, "
663a1470
AM
8502 "TLS optimization disabled\n"),
8503 ibfd, sec, rel->r_offset);
8504 ret = TRUE;
8505 goto err_free_rel;
8506 }
8507
8508 found_tls_get_addr_arg = 0;
102890f0
AM
8509 switch (r_type)
8510 {
8511 case R_PPC64_GOT_TLSLD16:
8512 case R_PPC64_GOT_TLSLD16_LO:
8513 expecting_tls_get_addr = 1;
663a1470 8514 found_tls_get_addr_arg = 1;
102890f0
AM
8515 /* Fall thru */
8516
8517 case R_PPC64_GOT_TLSLD16_HI:
8518 case R_PPC64_GOT_TLSLD16_HA:
8519 /* These relocs should never be against a symbol
8520 defined in a shared lib. Leave them alone if
8521 that turns out to be the case. */
8522 if (!is_local)
8523 continue;
411e1bfb 8524
102890f0 8525 /* LD -> LE */
411e1bfb 8526 tls_set = 0;
102890f0
AM
8527 tls_clear = TLS_LD;
8528 tls_type = TLS_TLS | TLS_LD;
8529 break;
411e1bfb 8530
102890f0
AM
8531 case R_PPC64_GOT_TLSGD16:
8532 case R_PPC64_GOT_TLSGD16_LO:
8533 expecting_tls_get_addr = 1;
663a1470 8534 found_tls_get_addr_arg = 1;
102890f0
AM
8535 /* Fall thru */
8536
8537 case R_PPC64_GOT_TLSGD16_HI:
8538 case R_PPC64_GOT_TLSGD16_HA:
8539 if (ok_tprel)
8540 /* GD -> LE */
411e1bfb 8541 tls_set = 0;
102890f0
AM
8542 else
8543 /* GD -> IE */
8544 tls_set = TLS_TLS | TLS_TPRELGD;
8545 tls_clear = TLS_GD;
8546 tls_type = TLS_TLS | TLS_GD;
8547 break;
8548
8549 case R_PPC64_GOT_TPREL16_DS:
8550 case R_PPC64_GOT_TPREL16_LO_DS:
8551 case R_PPC64_GOT_TPREL16_HI:
8552 case R_PPC64_GOT_TPREL16_HA:
8553 if (ok_tprel)
8554 {
8555 /* IE -> LE */
8556 tls_set = 0;
8557 tls_clear = TLS_TPREL;
8558 tls_type = TLS_TLS | TLS_TPREL;
8559 break;
8560 }
411e1bfb
AM
8561 continue;
8562
727fc41e
AM
8563 case R_PPC64_TLSGD:
8564 case R_PPC64_TLSLD:
663a1470
AM
8565 found_tls_get_addr_arg = 1;
8566 /* Fall thru */
8567
8568 case R_PPC64_TLS:
8569 case R_PPC64_TOC16:
8570 case R_PPC64_TOC16_LO:
102890f0
AM
8571 if (sym_sec == NULL || sym_sec != toc)
8572 continue;
8573
8574 /* Mark this toc entry as referenced by a TLS
8575 code sequence. We can do that now in the
8576 case of R_PPC64_TLS, and after checking for
8577 tls_get_addr for the TOC16 relocs. */
8578 if (toc_ref == NULL)
663a1470
AM
8579 toc_ref = bfd_zmalloc (toc->output_section->rawsize / 8);
8580 if (toc_ref == NULL)
8581 goto err_free_rel;
8582
102890f0
AM
8583 if (h != NULL)
8584 value = h->root.u.def.value;
8585 else
8586 value = sym->st_value;
8587 value += rel->r_addend;
73242275
AM
8588 if (value % 8 != 0)
8589 continue;
8590 BFD_ASSERT (value < toc->size
8591 && toc->output_offset % 8 == 0);
663a1470 8592 toc_ref_index = (value + toc->output_offset) / 8;
727fc41e
AM
8593 if (r_type == R_PPC64_TLS
8594 || r_type == R_PPC64_TLSGD
8595 || r_type == R_PPC64_TLSLD)
102890f0
AM
8596 {
8597 toc_ref[toc_ref_index] = 1;
8598 continue;
8599 }
8600
8601 if (pass != 0 && toc_ref[toc_ref_index] == 0)
8602 continue;
8603
8604 tls_set = 0;
8605 tls_clear = 0;
8606 expecting_tls_get_addr = 2;
8607 break;
8608
8609 case R_PPC64_TPREL64:
8610 if (pass == 0
8611 || sec != toc
8612 || toc_ref == NULL
663a1470 8613 || !toc_ref[(rel->r_offset + toc->output_offset) / 8])
102890f0
AM
8614 continue;
8615 if (ok_tprel)
8616 {
8617 /* IE -> LE */
8618 tls_set = TLS_EXPLICIT;
8619 tls_clear = TLS_TPREL;
8620 break;
8621 }
8622 continue;
8623
8624 case R_PPC64_DTPMOD64:
8625 if (pass == 0
8626 || sec != toc
8627 || toc_ref == NULL
663a1470 8628 || !toc_ref[(rel->r_offset + toc->output_offset) / 8])
102890f0
AM
8629 continue;
8630 if (rel + 1 < relend
8631 && (rel[1].r_info
8632 == ELF64_R_INFO (r_symndx, R_PPC64_DTPREL64))
8633 && rel[1].r_offset == rel->r_offset + 8)
8634 {
8635 if (ok_tprel)
8636 /* GD -> LE */
8637 tls_set = TLS_EXPLICIT | TLS_GD;
8638 else
8639 /* GD -> IE */
8640 tls_set = TLS_EXPLICIT | TLS_GD | TLS_TPRELGD;
8641 tls_clear = TLS_GD;
8642 }
8643 else
8644 {
8645 if (!is_local)
8646 continue;
8647
8648 /* LD -> LE */
8649 tls_set = TLS_EXPLICIT;
8650 tls_clear = TLS_LD;
8651 }
8652 break;
8653
8654 default:
8655 continue;
8656 }
8657
8658 if (pass == 0)
8659 {
727fc41e
AM
8660 if (!expecting_tls_get_addr
8661 || !sec->has_tls_get_addr_call)
102890f0
AM
8662 continue;
8663
3a71aa26
AM
8664 if (rel + 1 < relend
8665 && branch_reloc_hash_match (ibfd, rel + 1,
8666 htab->tls_get_addr,
8667 htab->tls_get_addr_fd))
102890f0 8668 {
3a71aa26 8669 if (expecting_tls_get_addr == 2)
102890f0 8670 {
3a71aa26 8671 /* Check for toc tls entries. */
f961d9dd 8672 unsigned char *toc_tls;
3a71aa26
AM
8673 int retval;
8674
8675 retval = get_tls_mask (&toc_tls, NULL, NULL,
8676 &locsyms,
8677 rel, ibfd);
8678 if (retval == 0)
8679 goto err_free_rel;
663a1470
AM
8680 if (toc_tls != NULL)
8681 {
8682 if ((*toc_tls & (TLS_GD | TLS_LD)) != 0)
8683 found_tls_get_addr_arg = 1;
8684 if (retval > 1)
8685 toc_ref[toc_ref_index] = 1;
8686 }
102890f0 8687 }
3a71aa26 8688 continue;
102890f0
AM
8689 }
8690
8691 if (expecting_tls_get_addr != 1)
8692 continue;
8693
8694 /* Uh oh, we didn't find the expected call. We
8695 could just mark this symbol to exclude it
8696 from tls optimization but it's safer to skip
663a1470 8697 the entire optimization. */
25f53a85 8698 info->callbacks->minfo (_("%H arg lost __tls_get_addr, "
663a1470
AM
8699 "TLS optimization disabled\n"),
8700 ibfd, sec, rel->r_offset);
8701 ret = TRUE;
8702 goto err_free_rel;
102890f0
AM
8703 }
8704
85f7a9cb 8705 if (expecting_tls_get_addr && htab->tls_get_addr != NULL)
102890f0
AM
8706 {
8707 struct plt_entry *ent;
8708 for (ent = htab->tls_get_addr->elf.plt.plist;
8709 ent != NULL;
8710 ent = ent->next)
8711 if (ent->addend == 0)
411e1bfb 8712 {
102890f0 8713 if (ent->plt.refcount > 0)
30038c59 8714 {
102890f0
AM
8715 ent->plt.refcount -= 1;
8716 expecting_tls_get_addr = 0;
30038c59 8717 }
102890f0 8718 break;
411e1bfb 8719 }
102890f0 8720 }
411e1bfb 8721
85f7a9cb 8722 if (expecting_tls_get_addr && htab->tls_get_addr_fd != NULL)
102890f0
AM
8723 {
8724 struct plt_entry *ent;
8725 for (ent = htab->tls_get_addr_fd->elf.plt.plist;
8726 ent != NULL;
8727 ent = ent->next)
8728 if (ent->addend == 0)
411e1bfb 8729 {
102890f0
AM
8730 if (ent->plt.refcount > 0)
8731 ent->plt.refcount -= 1;
8732 break;
411e1bfb 8733 }
102890f0 8734 }
411e1bfb 8735
102890f0 8736 if (tls_clear == 0)
30038c59
AM
8737 continue;
8738
102890f0
AM
8739 if ((tls_set & TLS_EXPLICIT) == 0)
8740 {
8741 struct got_entry *ent;
411e1bfb 8742
102890f0
AM
8743 /* Adjust got entry for this reloc. */
8744 if (h != NULL)
8745 ent = h->got.glist;
8746 else
8747 ent = elf_local_got_ents (ibfd)[r_symndx];
411e1bfb 8748
102890f0
AM
8749 for (; ent != NULL; ent = ent->next)
8750 if (ent->addend == rel->r_addend
8751 && ent->owner == ibfd
8752 && ent->tls_type == tls_type)
8753 break;
8754 if (ent == NULL)
8755 abort ();
411e1bfb 8756
102890f0
AM
8757 if (tls_set == 0)
8758 {
8759 /* We managed to get rid of a got entry. */
8760 if (ent->got.refcount > 0)
8761 ent->got.refcount -= 1;
8762 }
8763 }
8764 else
8765 {
8766 /* If we got rid of a DTPMOD/DTPREL reloc pair then
8767 we'll lose one or two dyn relocs. */
8768 if (!dec_dynrel_count (rel->r_info, sec, info,
19e08130 8769 NULL, h, sym))
102890f0 8770 return FALSE;
411e1bfb 8771
102890f0
AM
8772 if (tls_set == (TLS_EXPLICIT | TLS_GD))
8773 {
8774 if (!dec_dynrel_count ((rel + 1)->r_info, sec, info,
19e08130 8775 NULL, h, sym))
102890f0
AM
8776 return FALSE;
8777 }
8778 }
411e1bfb 8779
102890f0
AM
8780 *tls_mask |= tls_set;
8781 *tls_mask &= ~tls_clear;
8782 }
8c1d1bb8 8783
102890f0
AM
8784 if (elf_section_data (sec)->relocs != relstart)
8785 free (relstart);
8786 }
411e1bfb 8787
663a1470
AM
8788 if (locsyms != NULL
8789 && (elf_symtab_hdr (ibfd).contents != (unsigned char *) locsyms))
8790 {
8791 if (!info->keep_memory)
8792 free (locsyms);
8793 else
8794 elf_symtab_hdr (ibfd).contents = (unsigned char *) locsyms;
8795 }
8796 }
411e1bfb 8797
663a1470
AM
8798 if (toc_ref != NULL)
8799 free (toc_ref);
b34976b6 8800 return TRUE;
1e2f5b6e 8801}
b34976b6 8802
c5614fa4
AM
8803/* Called via elf_link_hash_traverse from ppc64_elf_edit_toc to adjust
8804 the values of any global symbols in a toc section that has been
8805 edited. Globals in toc sections should be a rarity, so this function
8806 sets a flag if any are found in toc sections other than the one just
8807 edited, so that futher hash table traversals can be avoided. */
8808
8809struct adjust_toc_info
8810{
8811 asection *toc;
8812 unsigned long *skip;
8813 bfd_boolean global_toc_syms;
8814};
8815
ba761f19
AM
8816enum toc_skip_enum { ref_from_discarded = 1, can_optimize = 2 };
8817
c5614fa4
AM
8818static bfd_boolean
8819adjust_toc_syms (struct elf_link_hash_entry *h, void *inf)
8820{
8821 struct ppc_link_hash_entry *eh;
8822 struct adjust_toc_info *toc_inf = (struct adjust_toc_info *) inf;
854b41e7 8823 unsigned long i;
c5614fa4 8824
c5614fa4
AM
8825 if (h->root.type != bfd_link_hash_defined
8826 && h->root.type != bfd_link_hash_defweak)
8827 return TRUE;
8828
8829 eh = (struct ppc_link_hash_entry *) h;
8830 if (eh->adjust_done)
8831 return TRUE;
8832
8833 if (eh->elf.root.u.def.section == toc_inf->toc)
8834 {
854b41e7
AM
8835 if (eh->elf.root.u.def.value > toc_inf->toc->rawsize)
8836 i = toc_inf->toc->rawsize >> 3;
c5614fa4 8837 else
854b41e7
AM
8838 i = eh->elf.root.u.def.value >> 3;
8839
ba761f19 8840 if ((toc_inf->skip[i] & (ref_from_discarded | can_optimize)) != 0)
c5614fa4
AM
8841 {
8842 (*_bfd_error_handler)
854b41e7
AM
8843 (_("%s defined on removed toc entry"), eh->elf.root.root.string);
8844 do
8845 ++i;
ba761f19 8846 while ((toc_inf->skip[i] & (ref_from_discarded | can_optimize)) != 0);
854b41e7 8847 eh->elf.root.u.def.value = (bfd_vma) i << 3;
c5614fa4 8848 }
854b41e7
AM
8849
8850 eh->elf.root.u.def.value -= toc_inf->skip[i];
c5614fa4
AM
8851 eh->adjust_done = 1;
8852 }
8853 else if (strcmp (eh->elf.root.u.def.section->name, ".toc") == 0)
8854 toc_inf->global_toc_syms = TRUE;
8855
8856 return TRUE;
8857}
8858
560c8763
AM
8859/* Return TRUE iff INSN is one we expect on a _LO variety toc/got reloc. */
8860
8861static bfd_boolean
8862ok_lo_toc_insn (unsigned int insn)
8863{
8864 return ((insn & (0x3f << 26)) == 14u << 26 /* addi */
8865 || (insn & (0x3f << 26)) == 32u << 26 /* lwz */
8866 || (insn & (0x3f << 26)) == 34u << 26 /* lbz */
8867 || (insn & (0x3f << 26)) == 36u << 26 /* stw */
8868 || (insn & (0x3f << 26)) == 38u << 26 /* stb */
8869 || (insn & (0x3f << 26)) == 40u << 26 /* lhz */
8870 || (insn & (0x3f << 26)) == 42u << 26 /* lha */
8871 || (insn & (0x3f << 26)) == 44u << 26 /* sth */
8872 || (insn & (0x3f << 26)) == 46u << 26 /* lmw */
8873 || (insn & (0x3f << 26)) == 47u << 26 /* stmw */
8874 || (insn & (0x3f << 26)) == 48u << 26 /* lfs */
8875 || (insn & (0x3f << 26)) == 50u << 26 /* lfd */
8876 || (insn & (0x3f << 26)) == 52u << 26 /* stfs */
8877 || (insn & (0x3f << 26)) == 54u << 26 /* stfd */
8878 || ((insn & (0x3f << 26)) == 58u << 26 /* lwa,ld,lmd */
8879 && (insn & 3) != 1)
8880 || ((insn & (0x3f << 26)) == 62u << 26 /* std, stmd */
8881 && ((insn & 3) == 0 || (insn & 3) == 3))
8882 || (insn & (0x3f << 26)) == 12u << 26 /* addic */);
8883}
8884
c5614fa4
AM
8885/* Examine all relocs referencing .toc sections in order to remove
8886 unused .toc entries. */
8887
8888bfd_boolean
33c0ec9d 8889ppc64_elf_edit_toc (struct bfd_link_info *info)
c5614fa4
AM
8890{
8891 bfd *ibfd;
8892 struct adjust_toc_info toc_inf;
67f0cbdb 8893 struct ppc_link_hash_table *htab = ppc_hash_table (info);
c5614fa4 8894
67f0cbdb 8895 htab->do_toc_opt = 1;
c5614fa4 8896 toc_inf.global_toc_syms = TRUE;
c72f2fb2 8897 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
c5614fa4
AM
8898 {
8899 asection *toc, *sec;
8900 Elf_Internal_Shdr *symtab_hdr;
8901 Elf_Internal_Sym *local_syms;
425b145b 8902 Elf_Internal_Rela *relstart, *rel, *toc_relocs;
c5614fa4
AM
8903 unsigned long *skip, *drop;
8904 unsigned char *used;
8905 unsigned char *keep, last, some_unused;
8906
854b41e7
AM
8907 if (!is_ppc64_elf (ibfd))
8908 continue;
8909
c5614fa4
AM
8910 toc = bfd_get_section_by_name (ibfd, ".toc");
8911 if (toc == NULL
92b7a70f 8912 || toc->size == 0
dbaa2011
AM
8913 || toc->sec_info_type == SEC_INFO_TYPE_JUST_SYMS
8914 || discarded_section (toc))
c5614fa4
AM
8915 continue;
8916
425b145b 8917 toc_relocs = NULL;
c5614fa4 8918 local_syms = NULL;
0ffa91dd 8919 symtab_hdr = &elf_symtab_hdr (ibfd);
c5614fa4
AM
8920
8921 /* Look at sections dropped from the final link. */
8922 skip = NULL;
8923 relstart = NULL;
8924 for (sec = ibfd->sections; sec != NULL; sec = sec->next)
8925 {
8926 if (sec->reloc_count == 0
dbaa2011 8927 || !discarded_section (sec)
c5614fa4
AM
8928 || get_opd_info (sec)
8929 || (sec->flags & SEC_ALLOC) == 0
8930 || (sec->flags & SEC_DEBUGGING) != 0)
8931 continue;
8932
8933 relstart = _bfd_elf_link_read_relocs (ibfd, sec, NULL, NULL, FALSE);
8934 if (relstart == NULL)
8935 goto error_ret;
8936
8937 /* Run through the relocs to see which toc entries might be
8938 unused. */
8939 for (rel = relstart; rel < relstart + sec->reloc_count; ++rel)
8940 {
8941 enum elf_ppc64_reloc_type r_type;
8942 unsigned long r_symndx;
8943 asection *sym_sec;
8944 struct elf_link_hash_entry *h;
8945 Elf_Internal_Sym *sym;
8946 bfd_vma val;
8947
8948 r_type = ELF64_R_TYPE (rel->r_info);
8949 switch (r_type)
8950 {
8951 default:
8952 continue;
8953
8954 case R_PPC64_TOC16:
8955 case R_PPC64_TOC16_LO:
8956 case R_PPC64_TOC16_HI:
8957 case R_PPC64_TOC16_HA:
8958 case R_PPC64_TOC16_DS:
8959 case R_PPC64_TOC16_LO_DS:
8960 break;
8961 }
8962
8963 r_symndx = ELF64_R_SYM (rel->r_info);
8964 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms,
8965 r_symndx, ibfd))
8966 goto error_ret;
8967
8968 if (sym_sec != toc)
8969 continue;
8970
8971 if (h != NULL)
8972 val = h->root.u.def.value;
8973 else
8974 val = sym->st_value;
8975 val += rel->r_addend;
8976
8977 if (val >= toc->size)
8978 continue;
8979
8980 /* Anything in the toc ought to be aligned to 8 bytes.
8981 If not, don't mark as unused. */
8982 if (val & 7)
8983 continue;
8984
8985 if (skip == NULL)
8986 {
854b41e7 8987 skip = bfd_zmalloc (sizeof (*skip) * (toc->size + 15) / 8);
c5614fa4
AM
8988 if (skip == NULL)
8989 goto error_ret;
8990 }
8991
ba761f19 8992 skip[val >> 3] = ref_from_discarded;
c5614fa4
AM
8993 }
8994
8995 if (elf_section_data (sec)->relocs != relstart)
8996 free (relstart);
8997 }
8998
ba761f19
AM
8999 /* For largetoc loads of address constants, we can convert
9000 . addis rx,2,addr@got@ha
9001 . ld ry,addr@got@l(rx)
9002 to
9003 . addis rx,2,addr@toc@ha
9004 . addi ry,rx,addr@toc@l
9005 when addr is within 2G of the toc pointer. This then means
9006 that the word storing "addr" in the toc is no longer needed. */
68ffbac6 9007
ba761f19
AM
9008 if (!ppc64_elf_tdata (ibfd)->has_small_toc_reloc
9009 && toc->output_section->rawsize < (bfd_vma) 1 << 31
9010 && toc->reloc_count != 0)
9011 {
9012 /* Read toc relocs. */
425b145b
AM
9013 toc_relocs = _bfd_elf_link_read_relocs (ibfd, toc, NULL, NULL,
9014 info->keep_memory);
9015 if (toc_relocs == NULL)
ba761f19
AM
9016 goto error_ret;
9017
425b145b 9018 for (rel = toc_relocs; rel < toc_relocs + toc->reloc_count; ++rel)
ba761f19
AM
9019 {
9020 enum elf_ppc64_reloc_type r_type;
9021 unsigned long r_symndx;
9022 asection *sym_sec;
9023 struct elf_link_hash_entry *h;
9024 Elf_Internal_Sym *sym;
9025 bfd_vma val, addr;
9026
9027 r_type = ELF64_R_TYPE (rel->r_info);
9028 if (r_type != R_PPC64_ADDR64)
9029 continue;
9030
9031 r_symndx = ELF64_R_SYM (rel->r_info);
9032 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms,
9033 r_symndx, ibfd))
9034 goto error_ret;
9035
425b145b 9036 if (sym_sec == NULL
c27b8c2a 9037 || sym_sec->output_section == NULL
dbaa2011 9038 || discarded_section (sym_sec))
425b145b
AM
9039 continue;
9040
afe397ea 9041 if (!SYMBOL_REFERENCES_LOCAL (info, h))
ba761f19
AM
9042 continue;
9043
9044 if (h != NULL)
bddc25c9
AM
9045 {
9046 if (h->type == STT_GNU_IFUNC)
9047 continue;
9048 val = h->root.u.def.value;
9049 }
ba761f19 9050 else
bddc25c9
AM
9051 {
9052 if (ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC)
9053 continue;
9054 val = sym->st_value;
9055 }
ba761f19
AM
9056 val += rel->r_addend;
9057 val += sym_sec->output_section->vma + sym_sec->output_offset;
9058
9059 /* We don't yet know the exact toc pointer value, but we
9060 know it will be somewhere in the toc section. Don't
9061 optimize if the difference from any possible toc
9062 pointer is outside [ff..f80008000, 7fff7fff]. */
9063 addr = toc->output_section->vma + TOC_BASE_OFF;
9064 if (val - addr + (bfd_vma) 0x80008000 >= (bfd_vma) 1 << 32)
9065 continue;
9066
9067 addr = toc->output_section->vma + toc->output_section->rawsize;
9068 if (val - addr + (bfd_vma) 0x80008000 >= (bfd_vma) 1 << 32)
9069 continue;
9070
9071 if (skip == NULL)
9072 {
9073 skip = bfd_zmalloc (sizeof (*skip) * (toc->size + 15) / 8);
9074 if (skip == NULL)
9075 goto error_ret;
9076 }
9077
9078 skip[rel->r_offset >> 3]
425b145b 9079 |= can_optimize | ((rel - toc_relocs) << 2);
ba761f19 9080 }
ba761f19
AM
9081 }
9082
c5614fa4
AM
9083 if (skip == NULL)
9084 continue;
9085
9086 used = bfd_zmalloc (sizeof (*used) * (toc->size + 7) / 8);
9087 if (used == NULL)
9088 {
9089 error_ret:
9090 if (local_syms != NULL
9091 && symtab_hdr->contents != (unsigned char *) local_syms)
9092 free (local_syms);
9093 if (sec != NULL
9094 && relstart != NULL
9095 && elf_section_data (sec)->relocs != relstart)
9096 free (relstart);
425b145b
AM
9097 if (toc_relocs != NULL
9098 && elf_section_data (toc)->relocs != toc_relocs)
9099 free (toc_relocs);
c5614fa4
AM
9100 if (skip != NULL)
9101 free (skip);
9102 return FALSE;
9103 }
9104
30038c59
AM
9105 /* Now check all kept sections that might reference the toc.
9106 Check the toc itself last. */
9107 for (sec = (ibfd->sections == toc && toc->next ? toc->next
9108 : ibfd->sections);
c5614fa4 9109 sec != NULL;
c5614fa4 9110 sec = (sec == toc ? NULL
c5614fa4 9111 : sec->next == NULL ? toc
30038c59 9112 : sec->next == toc && toc->next ? toc->next
c5614fa4
AM
9113 : sec->next))
9114 {
9115 int repeat;
9116
9117 if (sec->reloc_count == 0
dbaa2011 9118 || discarded_section (sec)
c5614fa4
AM
9119 || get_opd_info (sec)
9120 || (sec->flags & SEC_ALLOC) == 0
9121 || (sec->flags & SEC_DEBUGGING) != 0)
9122 continue;
9123
854b41e7
AM
9124 relstart = _bfd_elf_link_read_relocs (ibfd, sec, NULL, NULL,
9125 info->keep_memory);
c5614fa4 9126 if (relstart == NULL)
2915c55b
JK
9127 {
9128 free (used);
9129 goto error_ret;
9130 }
c5614fa4
AM
9131
9132 /* Mark toc entries referenced as used. */
c5614fa4 9133 do
d4f1ee75
AM
9134 {
9135 repeat = 0;
9136 for (rel = relstart; rel < relstart + sec->reloc_count; ++rel)
9137 {
9138 enum elf_ppc64_reloc_type r_type;
9139 unsigned long r_symndx;
9140 asection *sym_sec;
9141 struct elf_link_hash_entry *h;
9142 Elf_Internal_Sym *sym;
9143 bfd_vma val;
9144 enum {no_check, check_lo, check_ha} insn_check;
98528052 9145
d4f1ee75
AM
9146 r_type = ELF64_R_TYPE (rel->r_info);
9147 switch (r_type)
9148 {
9149 default:
9150 insn_check = no_check;
9151 break;
98528052 9152
d4f1ee75
AM
9153 case R_PPC64_GOT_TLSLD16_HA:
9154 case R_PPC64_GOT_TLSGD16_HA:
9155 case R_PPC64_GOT_TPREL16_HA:
9156 case R_PPC64_GOT_DTPREL16_HA:
9157 case R_PPC64_GOT16_HA:
9158 case R_PPC64_TOC16_HA:
9159 insn_check = check_ha;
9160 break;
98528052 9161
d4f1ee75
AM
9162 case R_PPC64_GOT_TLSLD16_LO:
9163 case R_PPC64_GOT_TLSGD16_LO:
9164 case R_PPC64_GOT_TPREL16_LO_DS:
9165 case R_PPC64_GOT_DTPREL16_LO_DS:
9166 case R_PPC64_GOT16_LO:
9167 case R_PPC64_GOT16_LO_DS:
9168 case R_PPC64_TOC16_LO:
9169 case R_PPC64_TOC16_LO_DS:
9170 insn_check = check_lo;
9171 break;
9172 }
560c8763 9173
d4f1ee75
AM
9174 if (insn_check != no_check)
9175 {
9176 bfd_vma off = rel->r_offset & ~3;
9177 unsigned char buf[4];
9178 unsigned int insn;
c5614fa4 9179
d4f1ee75
AM
9180 if (!bfd_get_section_contents (ibfd, sec, buf, off, 4))
9181 {
9182 free (used);
9183 goto error_ret;
9184 }
9185 insn = bfd_get_32 (ibfd, buf);
9186 if (insn_check == check_lo
9187 ? !ok_lo_toc_insn (insn)
9188 : ((insn & ((0x3f << 26) | 0x1f << 16))
9189 != ((15u << 26) | (2 << 16)) /* addis rt,2,imm */))
9190 {
9191 char str[12];
9192
9193 ppc64_elf_tdata (ibfd)->unexpected_toc_insn = 1;
9194 sprintf (str, "%#08x", insn);
9195 info->callbacks->einfo
9196 (_("%P: %H: toc optimization is not supported for"
9197 " %s instruction.\n"),
9198 ibfd, sec, rel->r_offset & ~3, str);
9199 }
9200 }
c5614fa4 9201
d4f1ee75
AM
9202 switch (r_type)
9203 {
9204 case R_PPC64_TOC16:
9205 case R_PPC64_TOC16_LO:
9206 case R_PPC64_TOC16_HI:
9207 case R_PPC64_TOC16_HA:
9208 case R_PPC64_TOC16_DS:
9209 case R_PPC64_TOC16_LO_DS:
9210 /* In case we're taking addresses of toc entries. */
9211 case R_PPC64_ADDR64:
9212 break;
c5614fa4 9213
d4f1ee75
AM
9214 default:
9215 continue;
9216 }
c5614fa4 9217
d4f1ee75
AM
9218 r_symndx = ELF64_R_SYM (rel->r_info);
9219 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms,
9220 r_symndx, ibfd))
9221 {
9222 free (used);
9223 goto error_ret;
9224 }
c5614fa4 9225
d4f1ee75
AM
9226 if (sym_sec != toc)
9227 continue;
c5614fa4 9228
d4f1ee75
AM
9229 if (h != NULL)
9230 val = h->root.u.def.value;
9231 else
9232 val = sym->st_value;
9233 val += rel->r_addend;
ba761f19 9234
d4f1ee75
AM
9235 if (val >= toc->size)
9236 continue;
ba761f19 9237
d4f1ee75
AM
9238 if ((skip[val >> 3] & can_optimize) != 0)
9239 {
9240 bfd_vma off;
9241 unsigned char opc;
9242
9243 switch (r_type)
9244 {
9245 case R_PPC64_TOC16_HA:
ba761f19 9246 break;
ba761f19 9247
d4f1ee75
AM
9248 case R_PPC64_TOC16_LO_DS:
9249 off = rel->r_offset;
9250 off += (bfd_big_endian (ibfd) ? -2 : 3);
9251 if (!bfd_get_section_contents (ibfd, sec, &opc,
9252 off, 1))
9253 {
9254 free (used);
9255 goto error_ret;
9256 }
9257 if ((opc & (0x3f << 2)) == (58u << 2))
9258 break;
9259 /* Fall thru */
ba761f19 9260
d4f1ee75
AM
9261 default:
9262 /* Wrong sort of reloc, or not a ld. We may
9263 as well clear ref_from_discarded too. */
9264 skip[val >> 3] = 0;
9265 }
9266 }
9267
9268 if (sec != toc)
9269 used[val >> 3] = 1;
9270 /* For the toc section, we only mark as used if this
9271 entry itself isn't unused. */
9272 else if ((used[rel->r_offset >> 3]
9273 || !(skip[rel->r_offset >> 3] & ref_from_discarded))
9274 && !used[val >> 3])
9275 {
9276 /* Do all the relocs again, to catch reference
9277 chains. */
9278 repeat = 1;
9279 used[val >> 3] = 1;
9280 }
9281 }
9282 }
c5614fa4 9283 while (repeat);
854b41e7
AM
9284
9285 if (elf_section_data (sec)->relocs != relstart)
9286 free (relstart);
c5614fa4
AM
9287 }
9288
9289 /* Merge the used and skip arrays. Assume that TOC
9290 doublewords not appearing as either used or unused belong
9291 to to an entry more than one doubleword in size. */
9292 for (drop = skip, keep = used, last = 0, some_unused = 0;
9293 drop < skip + (toc->size + 7) / 8;
9294 ++drop, ++keep)
9295 {
9296 if (*keep)
9297 {
ba761f19
AM
9298 *drop &= ~ref_from_discarded;
9299 if ((*drop & can_optimize) != 0)
9300 some_unused = 1;
c5614fa4
AM
9301 last = 0;
9302 }
b140b010 9303 else if ((*drop & ref_from_discarded) != 0)
c5614fa4
AM
9304 {
9305 some_unused = 1;
ba761f19 9306 last = ref_from_discarded;
c5614fa4
AM
9307 }
9308 else
9309 *drop = last;
9310 }
9311
9312 free (used);
9313
9314 if (some_unused)
9315 {
9316 bfd_byte *contents, *src;
9317 unsigned long off;
d62b3684 9318 Elf_Internal_Sym *sym;
ba761f19 9319 bfd_boolean local_toc_syms = FALSE;
c5614fa4
AM
9320
9321 /* Shuffle the toc contents, and at the same time convert the
9322 skip array from booleans into offsets. */
9323 if (!bfd_malloc_and_get_section (ibfd, toc, &contents))
9324 goto error_ret;
9325
9326 elf_section_data (toc)->this_hdr.contents = contents;
9327
9328 for (src = contents, off = 0, drop = skip;
9329 src < contents + toc->size;
9330 src += 8, ++drop)
9331 {
ba761f19
AM
9332 if ((*drop & (can_optimize | ref_from_discarded)) != 0)
9333 off += 8;
c5614fa4
AM
9334 else if (off != 0)
9335 {
9336 *drop = off;
9337 memcpy (src - off, src, 8);
9338 }
9339 }
854b41e7 9340 *drop = off;
c5614fa4
AM
9341 toc->rawsize = toc->size;
9342 toc->size = src - contents - off;
9343
ba761f19
AM
9344 /* Adjust addends for relocs against the toc section sym,
9345 and optimize any accesses we can. */
c5614fa4
AM
9346 for (sec = ibfd->sections; sec != NULL; sec = sec->next)
9347 {
9348 if (sec->reloc_count == 0
dbaa2011 9349 || discarded_section (sec))
c5614fa4
AM
9350 continue;
9351
9352 relstart = _bfd_elf_link_read_relocs (ibfd, sec, NULL, NULL,
854b41e7 9353 info->keep_memory);
c5614fa4
AM
9354 if (relstart == NULL)
9355 goto error_ret;
9356
9357 for (rel = relstart; rel < relstart + sec->reloc_count; ++rel)
9358 {
9359 enum elf_ppc64_reloc_type r_type;
9360 unsigned long r_symndx;
9361 asection *sym_sec;
9362 struct elf_link_hash_entry *h;
854b41e7 9363 bfd_vma val;
c5614fa4
AM
9364
9365 r_type = ELF64_R_TYPE (rel->r_info);
9366 switch (r_type)
9367 {
9368 default:
9369 continue;
9370
9371 case R_PPC64_TOC16:
9372 case R_PPC64_TOC16_LO:
9373 case R_PPC64_TOC16_HI:
9374 case R_PPC64_TOC16_HA:
9375 case R_PPC64_TOC16_DS:
9376 case R_PPC64_TOC16_LO_DS:
9377 case R_PPC64_ADDR64:
9378 break;
9379 }
9380
9381 r_symndx = ELF64_R_SYM (rel->r_info);
9382 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms,
9383 r_symndx, ibfd))
9384 goto error_ret;
9385
ba761f19 9386 if (sym_sec != toc)
c5614fa4
AM
9387 continue;
9388
ba761f19
AM
9389 if (h != NULL)
9390 val = h->root.u.def.value;
9391 else
9392 {
9393 val = sym->st_value;
9394 if (val != 0)
9395 local_toc_syms = TRUE;
9396 }
9397
9398 val += rel->r_addend;
854b41e7
AM
9399
9400 if (val > toc->rawsize)
9401 val = toc->rawsize;
ba761f19
AM
9402 else if ((skip[val >> 3] & ref_from_discarded) != 0)
9403 continue;
9404 else if ((skip[val >> 3] & can_optimize) != 0)
9405 {
9406 Elf_Internal_Rela *tocrel
425b145b 9407 = toc_relocs + (skip[val >> 3] >> 2);
ba761f19
AM
9408 unsigned long tsym = ELF64_R_SYM (tocrel->r_info);
9409
9410 switch (r_type)
9411 {
9412 case R_PPC64_TOC16_HA:
9413 rel->r_info = ELF64_R_INFO (tsym, R_PPC64_TOC16_HA);
9414 break;
9415
9416 case R_PPC64_TOC16_LO_DS:
9417 rel->r_info = ELF64_R_INFO (tsym, R_PPC64_LO_DS_OPT);
9418 break;
9419
9420 default:
28942f62
AM
9421 if (!ppc64_elf_howto_table[R_PPC64_ADDR32])
9422 ppc_howto_init ();
b140b010 9423 info->callbacks->einfo
bc30df16 9424 (_("%P: %H: %s references "
b140b010
AM
9425 "optimized away TOC entry\n"),
9426 ibfd, sec, rel->r_offset,
9427 ppc64_elf_howto_table[r_type]->name);
9428 bfd_set_error (bfd_error_bad_value);
9429 goto error_ret;
ba761f19
AM
9430 }
9431 rel->r_addend = tocrel->r_addend;
9432 elf_section_data (sec)->relocs = relstart;
9433 continue;
9434 }
9435
9436 if (h != NULL || sym->st_value != 0)
9437 continue;
854b41e7
AM
9438
9439 rel->r_addend -= skip[val >> 3];
9440 elf_section_data (sec)->relocs = relstart;
c5614fa4 9441 }
854b41e7
AM
9442
9443 if (elf_section_data (sec)->relocs != relstart)
9444 free (relstart);
c5614fa4
AM
9445 }
9446
9447 /* We shouldn't have local or global symbols defined in the TOC,
9448 but handle them anyway. */
df22d223
AM
9449 if (local_syms != NULL)
9450 for (sym = local_syms;
9451 sym < local_syms + symtab_hdr->sh_info;
9452 ++sym)
9453 if (sym->st_value != 0
9454 && bfd_section_from_elf_index (ibfd, sym->st_shndx) == toc)
9455 {
9456 unsigned long i;
854b41e7 9457
df22d223
AM
9458 if (sym->st_value > toc->rawsize)
9459 i = toc->rawsize >> 3;
9460 else
9461 i = sym->st_value >> 3;
854b41e7 9462
df22d223
AM
9463 if ((skip[i] & (ref_from_discarded | can_optimize)) != 0)
9464 {
9465 if (local_toc_syms)
9466 (*_bfd_error_handler)
9467 (_("%s defined on removed toc entry"),
9468 bfd_elf_sym_name (ibfd, symtab_hdr, sym, NULL));
9469 do
9470 ++i;
9471 while ((skip[i] & (ref_from_discarded | can_optimize)));
9472 sym->st_value = (bfd_vma) i << 3;
9473 }
d62b3684 9474
df22d223
AM
9475 sym->st_value -= skip[i];
9476 symtab_hdr->contents = (unsigned char *) local_syms;
9477 }
c5614fa4 9478
854b41e7 9479 /* Adjust any global syms defined in this toc input section. */
c5614fa4
AM
9480 if (toc_inf.global_toc_syms)
9481 {
9482 toc_inf.toc = toc;
9483 toc_inf.skip = skip;
9484 toc_inf.global_toc_syms = FALSE;
9485 elf_link_hash_traverse (elf_hash_table (info), adjust_toc_syms,
9486 &toc_inf);
9487 }
854b41e7
AM
9488
9489 if (toc->reloc_count != 0)
9490 {
d4730f92 9491 Elf_Internal_Shdr *rel_hdr;
854b41e7
AM
9492 Elf_Internal_Rela *wrel;
9493 bfd_size_type sz;
9494
854b41e7 9495 /* Remove unused toc relocs, and adjust those we keep. */
28be611c
AM
9496 if (toc_relocs == NULL)
9497 toc_relocs = _bfd_elf_link_read_relocs (ibfd, toc, NULL, NULL,
9498 info->keep_memory);
9499 if (toc_relocs == NULL)
9500 goto error_ret;
9501
425b145b
AM
9502 wrel = toc_relocs;
9503 for (rel = toc_relocs; rel < toc_relocs + toc->reloc_count; ++rel)
ba761f19
AM
9504 if ((skip[rel->r_offset >> 3]
9505 & (ref_from_discarded | can_optimize)) == 0)
854b41e7
AM
9506 {
9507 wrel->r_offset = rel->r_offset - skip[rel->r_offset >> 3];
9508 wrel->r_info = rel->r_info;
9509 wrel->r_addend = rel->r_addend;
9510 ++wrel;
9511 }
9512 else if (!dec_dynrel_count (rel->r_info, toc, info,
9513 &local_syms, NULL, NULL))
9514 goto error_ret;
9515
425b145b
AM
9516 elf_section_data (toc)->relocs = toc_relocs;
9517 toc->reloc_count = wrel - toc_relocs;
d4730f92
BS
9518 rel_hdr = _bfd_elf_single_rel_hdr (toc);
9519 sz = rel_hdr->sh_entsize;
9520 rel_hdr->sh_size = toc->reloc_count * sz;
854b41e7 9521 }
c5614fa4 9522 }
28be611c
AM
9523 else if (toc_relocs != NULL
9524 && elf_section_data (toc)->relocs != toc_relocs)
425b145b 9525 free (toc_relocs);
c5614fa4
AM
9526
9527 if (local_syms != NULL
9528 && symtab_hdr->contents != (unsigned char *) local_syms)
9529 {
9530 if (!info->keep_memory)
9531 free (local_syms);
9532 else
9533 symtab_hdr->contents = (unsigned char *) local_syms;
9534 }
9535 free (skip);
9536 }
9537
9538 return TRUE;
9539}
9540
1bbe0902
AM
9541/* Return true iff input section I references the TOC using
9542 instructions limited to +/-32k offsets. */
9543
9544bfd_boolean
9545ppc64_elf_has_small_toc_reloc (asection *i)
9546{
9547 return (is_ppc64_elf (i->owner)
9548 && ppc64_elf_tdata (i->owner)->has_small_toc_reloc);
9549}
9550
927be08e
AM
9551/* Allocate space for one GOT entry. */
9552
9553static void
9554allocate_got (struct elf_link_hash_entry *h,
9555 struct bfd_link_info *info,
9556 struct got_entry *gent)
9557{
9558 struct ppc_link_hash_table *htab = ppc_hash_table (info);
9559 bfd_boolean dyn;
9560 struct ppc_link_hash_entry *eh = (struct ppc_link_hash_entry *) h;
9561 int entsize = (gent->tls_type & eh->tls_mask & (TLS_GD | TLS_LD)
9562 ? 16 : 8);
9563 int rentsize = (gent->tls_type & eh->tls_mask & TLS_GD
9564 ? 2 : 1) * sizeof (Elf64_External_Rela);
9565 asection *got = ppc64_elf_tdata (gent->owner)->got;
9566
9567 gent->got.offset = got->size;
9568 got->size += entsize;
9569
9570 dyn = htab->elf.dynamic_sections_created;
19e08130 9571 if (h->type == STT_GNU_IFUNC)
927be08e 9572 {
33e44f2e 9573 htab->elf.irelplt->size += rentsize;
19e08130 9574 htab->got_reli_size += rentsize;
927be08e 9575 }
0e1862bb 9576 else if ((bfd_link_pic (info)
19e08130
AM
9577 || WILL_CALL_FINISH_DYNAMIC_SYMBOL (dyn, 0, h))
9578 && (ELF_ST_VISIBILITY (h->other) == STV_DEFAULT
9579 || h->root.type != bfd_link_hash_undefweak))
927be08e 9580 {
19e08130 9581 asection *relgot = ppc64_elf_tdata (gent->owner)->relgot;
927be08e 9582 relgot->size += rentsize;
927be08e
AM
9583 }
9584}
9585
7865406b
AM
9586/* This function merges got entries in the same toc group. */
9587
9588static void
9589merge_got_entries (struct got_entry **pent)
9590{
9591 struct got_entry *ent, *ent2;
9592
9593 for (ent = *pent; ent != NULL; ent = ent->next)
9594 if (!ent->is_indirect)
9595 for (ent2 = ent->next; ent2 != NULL; ent2 = ent2->next)
9596 if (!ent2->is_indirect
9597 && ent2->addend == ent->addend
9598 && ent2->tls_type == ent->tls_type
9599 && elf_gp (ent2->owner) == elf_gp (ent->owner))
9600 {
9601 ent2->is_indirect = TRUE;
9602 ent2->got.ent = ent;
9603 }
9604}
9605
65f38f15
AM
9606/* Allocate space in .plt, .got and associated reloc sections for
9607 dynamic relocs. */
5bd4f169 9608
b34976b6 9609static bfd_boolean
4ce794b7 9610allocate_dynrelocs (struct elf_link_hash_entry *h, void *inf)
5bd4f169 9611{
65f38f15
AM
9612 struct bfd_link_info *info;
9613 struct ppc_link_hash_table *htab;
5bd4f169 9614 asection *s;
65f38f15 9615 struct ppc_link_hash_entry *eh;
0b8bcf0d 9616 struct got_entry **pgent, *gent;
5bd4f169 9617
e92d460e 9618 if (h->root.type == bfd_link_hash_indirect)
b34976b6 9619 return TRUE;
5bd4f169 9620
65f38f15
AM
9621 info = (struct bfd_link_info *) inf;
9622 htab = ppc_hash_table (info);
4dfe6ac6
NC
9623 if (htab == NULL)
9624 return FALSE;
5bd4f169 9625
951fd09b
AM
9626 eh = (struct ppc_link_hash_entry *) h;
9627 /* Run through the TLS GD got entries first if we're changing them
9628 to TPREL. */
e7b938ca 9629 if ((eh->tls_mask & TLS_TPRELGD) != 0)
951fd09b
AM
9630 for (gent = h->got.glist; gent != NULL; gent = gent->next)
9631 if (gent->got.refcount > 0
9632 && (gent->tls_type & TLS_GD) != 0)
9633 {
9634 /* This was a GD entry that has been converted to TPREL. If
9635 there happens to be a TPREL entry we can use that one. */
9636 struct got_entry *ent;
9637 for (ent = h->got.glist; ent != NULL; ent = ent->next)
9638 if (ent->got.refcount > 0
9639 && (ent->tls_type & TLS_TPREL) != 0
e717da7e
AM
9640 && ent->addend == gent->addend
9641 && ent->owner == gent->owner)
951fd09b
AM
9642 {
9643 gent->got.refcount = 0;
9644 break;
9645 }
9646
9647 /* If not, then we'll be using our own TPREL entry. */
9648 if (gent->got.refcount != 0)
9649 gent->tls_type = TLS_TLS | TLS_TPREL;
9650 }
9651
7865406b
AM
9652 /* Remove any list entry that won't generate a word in the GOT before
9653 we call merge_got_entries. Otherwise we risk merging to empty
9654 entries. */
0b8bcf0d
AM
9655 pgent = &h->got.glist;
9656 while ((gent = *pgent) != NULL)
411e1bfb 9657 if (gent->got.refcount > 0)
7865406b
AM
9658 {
9659 if ((gent->tls_type & TLS_LD) != 0
9660 && !h->def_dynamic)
9661 {
9662 ppc64_tlsld_got (gent->owner)->got.refcount += 1;
9663 *pgent = gent->next;
9664 }
9665 else
9666 pgent = &gent->next;
9667 }
9668 else
9669 *pgent = gent->next;
9670
9671 if (!htab->do_multi_toc)
9672 merge_got_entries (&h->got.glist);
9673
9674 for (gent = h->got.glist; gent != NULL; gent = gent->next)
9675 if (!gent->is_indirect)
411e1bfb
AM
9676 {
9677 /* Make sure this symbol is output as a dynamic symbol.
951fd09b
AM
9678 Undefined weak syms won't yet be marked as dynamic,
9679 nor will all TLS symbols. */
411e1bfb 9680 if (h->dynindx == -1
b099ab9f 9681 && !h->forced_local
25f23106 9682 && h->type != STT_GNU_IFUNC
b099ab9f 9683 && htab->elf.dynamic_sections_created)
411e1bfb 9684 {
c152c796 9685 if (! bfd_elf_link_record_dynamic_symbol (info, h))
411e1bfb
AM
9686 return FALSE;
9687 }
65f38f15 9688
0c8d6e5c 9689 if (!is_ppc64_elf (gent->owner))
927be08e 9690 abort ();
0ffa91dd 9691
927be08e 9692 allocate_got (h, info, gent);
411e1bfb 9693 }
65f38f15 9694
8a2058b5
AM
9695 if (!htab->elf.dynamic_sections_created
9696 && h->type != STT_GNU_IFUNC)
9697 eh->dyn_relocs = NULL;
9698
9699 if (eh->dyn_relocs != NULL)
65f38f15 9700 {
8a2058b5
AM
9701 struct elf_dyn_relocs *p, **pp;
9702
57e7d118
AM
9703 /* In the shared -Bsymbolic case, discard space allocated for
9704 dynamic pc-relative relocs against symbols which turn out to
9705 be defined in regular objects. For the normal shared case,
9706 discard space for relocs that have become local due to symbol
9707 visibility changes. */
9708
9709 if (bfd_link_pic (info))
65f38f15 9710 {
57e7d118
AM
9711 /* Relocs that use pc_count are those that appear on a call
9712 insn, or certain REL relocs (see must_be_dyn_reloc) that
9713 can be generated via assembly. We want calls to
9714 protected symbols to resolve directly to the function
9715 rather than going via the plt. If people want function
9716 pointer comparisons to work as expected then they should
9717 avoid writing weird assembly. */
9718 if (SYMBOL_CALLS_LOCAL (info, h))
9719 {
57e7d118
AM
9720 for (pp = &eh->dyn_relocs; (p = *pp) != NULL; )
9721 {
9722 p->count -= p->pc_count;
9723 p->pc_count = 0;
9724 if (p->count == 0)
9725 *pp = p->next;
9726 else
9727 pp = &p->next;
9728 }
9729 }
65f38f15 9730
57e7d118
AM
9731 /* Also discard relocs on undefined weak syms with
9732 non-default visibility. */
9733 if (eh->dyn_relocs != NULL
9734 && h->root.type == bfd_link_hash_undefweak)
5bd4f169 9735 {
57e7d118
AM
9736 if (ELF_ST_VISIBILITY (h->other) != STV_DEFAULT)
9737 eh->dyn_relocs = NULL;
9738
9739 /* Make sure this symbol is output as a dynamic symbol.
9740 Undefined weak syms won't yet be marked as dynamic. */
9741 else if (h->dynindx == -1
9742 && !h->forced_local)
9743 {
9744 if (! bfd_elf_link_record_dynamic_symbol (info, h))
9745 return FALSE;
9746 }
5bd4f169 9747 }
65f38f15 9748 }
57e7d118 9749 else if (h->type == STT_GNU_IFUNC)
dfbb6ac9 9750 {
8a2058b5
AM
9751 /* A plt entry is always created when making direct calls to
9752 an ifunc, even when building a static executable, but
9753 that doesn't cover all cases. We may have only an ifunc
9754 initialised function pointer for a given ifunc symbol.
9755
9756 For ELFv2, dynamic relocations are not required when
9757 generating a global entry PLT stub. */
9758 if (abiversion (info->output_bfd) >= 2)
9759 {
9760 if (global_entry_stub (h))
9761 eh->dyn_relocs = NULL;
9762 }
9763
9764 /* For ELFv1 we have function descriptors. Descriptors need
9765 to be treated like PLT entries and thus have dynamic
9766 relocations. One exception is when the function
9767 descriptor is copied into .dynbss (which should only
9768 happen with ancient versions of gcc). */
9769 else if (h->needs_copy)
dfbb6ac9 9770 eh->dyn_relocs = NULL;
57e7d118
AM
9771 }
9772 else if (ELIMINATE_COPY_RELOCS)
9773 {
8a2058b5 9774 /* For the non-pic case, discard space for relocs against
57e7d118
AM
9775 symbols which turn out to need copy relocs or are not
9776 dynamic. */
dfbb6ac9 9777
8a2058b5
AM
9778 /* First make sure this symbol is output as a dynamic symbol.
9779 Undefined weak syms won't yet be marked as dynamic. */
9780 if (h->root.type == bfd_link_hash_undefweak
9781 && !h->non_got_ref
9782 && !h->def_regular
9783 && h->dynindx == -1
9784 && !h->forced_local
9785 && !bfd_elf_link_record_dynamic_symbol (info, h))
9786 return FALSE;
57e7d118 9787
8a2058b5
AM
9788 if (h->non_got_ref
9789 || h->def_regular
9790 || h->dynindx == -1)
9791 eh->dyn_relocs = NULL;
57e7d118
AM
9792 }
9793
9794 /* Finally, allocate space. */
9795 for (p = eh->dyn_relocs; p != NULL; p = p->next)
9796 {
9797 asection *sreloc = elf_section_data (p->sec)->sreloc;
9798 if (eh->elf.type == STT_GNU_IFUNC)
9799 sreloc = htab->elf.irelplt;
9800 sreloc->size += p->count * sizeof (Elf64_External_Rela);
dfbb6ac9 9801 }
65f38f15 9802 }
57e7d118
AM
9803
9804 if ((htab->elf.dynamic_sections_created
9805 && h->dynindx != -1
9806 && WILL_CALL_FINISH_DYNAMIC_SYMBOL (1, bfd_link_pic (info), h))
9807 || h->type == STT_GNU_IFUNC)
65f38f15 9808 {
57e7d118
AM
9809 struct plt_entry *pent;
9810 bfd_boolean doneone = FALSE;
9811 for (pent = h->plt.plist; pent != NULL; pent = pent->next)
9812 if (pent->plt.refcount > 0)
9813 {
9814 if (!htab->elf.dynamic_sections_created
9815 || h->dynindx == -1)
9816 {
9817 s = htab->elf.iplt;
9818 pent->plt.offset = s->size;
9819 s->size += PLT_ENTRY_SIZE (htab);
9820 s = htab->elf.irelplt;
9821 }
9822 else
9823 {
9824 /* If this is the first .plt entry, make room for the special
9825 first entry. */
9826 s = htab->elf.splt;
9827 if (s->size == 0)
9828 s->size += PLT_INITIAL_ENTRY_SIZE (htab);
65f38f15 9829
57e7d118 9830 pent->plt.offset = s->size;
65f38f15 9831
57e7d118
AM
9832 /* Make room for this entry. */
9833 s->size += PLT_ENTRY_SIZE (htab);
65f38f15 9834
57e7d118
AM
9835 /* Make room for the .glink code. */
9836 s = htab->glink;
9837 if (s->size == 0)
9838 s->size += GLINK_CALL_STUB_SIZE;
9839 if (htab->opd_abi)
9840 {
9841 /* We need bigger stubs past index 32767. */
9842 if (s->size >= GLINK_CALL_STUB_SIZE + 32768*2*4)
9843 s->size += 4;
9844 s->size += 2*4;
9845 }
9846 else
9847 s->size += 4;
65f38f15 9848
57e7d118
AM
9849 /* We also need to make an entry in the .rela.plt section. */
9850 s = htab->elf.srelplt;
9851 }
9852 s->size += sizeof (Elf64_External_Rela);
9853 doneone = TRUE;
9854 }
9855 else
9856 pent->plt.offset = (bfd_vma) -1;
9857 if (!doneone)
9858 {
9859 h->plt.plist = NULL;
9860 h->needs_plt = 0;
9861 }
65f38f15 9862 }
57e7d118 9863 else
65f38f15 9864 {
57e7d118
AM
9865 h->plt.plist = NULL;
9866 h->needs_plt = 0;
65f38f15
AM
9867 }
9868
b34976b6 9869 return TRUE;
65f38f15
AM
9870}
9871
a345bc8d
AM
9872/* Called via elf_link_hash_traverse from ppc64_elf_size_dynamic_sections
9873 to set up space for global entry stubs. These are put in glink,
9874 after the branch table. */
65f38f15 9875
b34976b6 9876static bfd_boolean
a345bc8d 9877size_global_entry_stubs (struct elf_link_hash_entry *h, void *inf)
65f38f15 9878{
a345bc8d
AM
9879 struct bfd_link_info *info;
9880 struct ppc_link_hash_table *htab;
9881 struct plt_entry *pent;
9882 asection *s;
65f38f15 9883
a345bc8d
AM
9884 if (h->root.type == bfd_link_hash_indirect)
9885 return TRUE;
65f38f15 9886
a345bc8d
AM
9887 if (!h->pointer_equality_needed)
9888 return TRUE;
65f38f15 9889
a345bc8d
AM
9890 if (h->def_regular)
9891 return TRUE;
65f38f15 9892
a345bc8d
AM
9893 info = inf;
9894 htab = ppc_hash_table (info);
9895 if (htab == NULL)
9896 return FALSE;
9897
9898 s = htab->glink;
9899 for (pent = h->plt.plist; pent != NULL; pent = pent->next)
9900 if (pent->plt.offset != (bfd_vma) -1
9901 && pent->addend == 0)
9902 {
afe397ea
AM
9903 /* For ELFv2, if this symbol is not defined in a regular file
9904 and we are not generating a shared library or pie, then we
9905 need to define the symbol in the executable on a call stub.
9906 This is to avoid text relocations. */
a345bc8d 9907 s->size = (s->size + 15) & -16;
8a2058b5 9908 h->root.type = bfd_link_hash_defined;
afe397ea
AM
9909 h->root.u.def.section = s;
9910 h->root.u.def.value = s->size;
a345bc8d
AM
9911 s->size += 16;
9912 break;
9913 }
9914 return TRUE;
9915}
9916
9917/* Set DF_TEXTREL if we find any dynamic relocs that apply to
9918 read-only sections. */
9919
9920static bfd_boolean
9921maybe_set_textrel (struct elf_link_hash_entry *h, void *info)
9922{
9923 if (h->root.type == bfd_link_hash_indirect)
9924 return TRUE;
9925
9926 if (readonly_dynrelocs (h))
9927 {
9928 ((struct bfd_link_info *) info)->flags |= DF_TEXTREL;
9929
9930 /* Not an error, just cut short the traversal. */
9931 return FALSE;
65f38f15 9932 }
b34976b6 9933 return TRUE;
65f38f15
AM
9934}
9935
9936/* Set the sizes of the dynamic sections. */
9937
b34976b6 9938static bfd_boolean
ee67d69a 9939ppc64_elf_size_dynamic_sections (bfd *output_bfd,
4ce794b7 9940 struct bfd_link_info *info)
65f38f15
AM
9941{
9942 struct ppc_link_hash_table *htab;
9943 bfd *dynobj;
9944 asection *s;
b34976b6 9945 bfd_boolean relocs;
65f38f15 9946 bfd *ibfd;
7865406b 9947 struct got_entry *first_tlsld;
65f38f15
AM
9948
9949 htab = ppc_hash_table (info);
4dfe6ac6
NC
9950 if (htab == NULL)
9951 return FALSE;
9952
65f38f15
AM
9953 dynobj = htab->elf.dynobj;
9954 if (dynobj == NULL)
9955 abort ();
9956
9957 if (htab->elf.dynamic_sections_created)
9958 {
9959 /* Set the contents of the .interp section to the interpreter. */
9b8b325a 9960 if (bfd_link_executable (info) && !info->nointerp)
65f38f15 9961 {
3d4d4302 9962 s = bfd_get_linker_section (dynobj, ".interp");
65f38f15
AM
9963 if (s == NULL)
9964 abort ();
eea6121a 9965 s->size = sizeof ELF_DYNAMIC_INTERPRETER;
65f38f15
AM
9966 s->contents = (unsigned char *) ELF_DYNAMIC_INTERPRETER;
9967 }
9968 }
9969
9970 /* Set up .got offsets for local syms, and space for local dynamic
9971 relocs. */
c72f2fb2 9972 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
65f38f15 9973 {
411e1bfb
AM
9974 struct got_entry **lgot_ents;
9975 struct got_entry **end_lgot_ents;
e054468f
AM
9976 struct plt_entry **local_plt;
9977 struct plt_entry **end_local_plt;
f961d9dd 9978 unsigned char *lgot_masks;
65f38f15
AM
9979 bfd_size_type locsymcount;
9980 Elf_Internal_Shdr *symtab_hdr;
65f38f15 9981
0c8d6e5c 9982 if (!is_ppc64_elf (ibfd))
65f38f15
AM
9983 continue;
9984
9985 for (s = ibfd->sections; s != NULL; s = s->next)
9986 {
19e08130 9987 struct ppc_dyn_relocs *p;
65f38f15 9988
6edfbbad 9989 for (p = elf_section_data (s)->local_dynrel; p != NULL; p = p->next)
65f38f15 9990 {
ec338859
AM
9991 if (!bfd_is_abs_section (p->sec)
9992 && bfd_is_abs_section (p->sec->output_section))
9993 {
9994 /* Input section has been discarded, either because
9995 it is a copy of a linkonce section or due to
9996 linker script /DISCARD/, so we'll be discarding
9997 the relocs too. */
9998 }
248866a8 9999 else if (p->count != 0)
ec338859 10000 {
19e08130
AM
10001 asection *srel = elf_section_data (p->sec)->sreloc;
10002 if (p->ifunc)
33e44f2e 10003 srel = htab->elf.irelplt;
eea6121a 10004 srel->size += p->count * sizeof (Elf64_External_Rela);
248866a8
AM
10005 if ((p->sec->output_section->flags & SEC_READONLY) != 0)
10006 info->flags |= DF_TEXTREL;
ec338859 10007 }
65f38f15
AM
10008 }
10009 }
10010
411e1bfb
AM
10011 lgot_ents = elf_local_got_ents (ibfd);
10012 if (!lgot_ents)
65f38f15
AM
10013 continue;
10014
0ffa91dd 10015 symtab_hdr = &elf_symtab_hdr (ibfd);
65f38f15 10016 locsymcount = symtab_hdr->sh_info;
411e1bfb 10017 end_lgot_ents = lgot_ents + locsymcount;
e054468f
AM
10018 local_plt = (struct plt_entry **) end_lgot_ents;
10019 end_local_plt = local_plt + locsymcount;
f961d9dd 10020 lgot_masks = (unsigned char *) end_local_plt;
e717da7e 10021 s = ppc64_elf_tdata (ibfd)->got;
e7b938ca 10022 for (; lgot_ents < end_lgot_ents; ++lgot_ents, ++lgot_masks)
65f38f15 10023 {
0b8bcf0d 10024 struct got_entry **pent, *ent;
411e1bfb 10025
0b8bcf0d
AM
10026 pent = lgot_ents;
10027 while ((ent = *pent) != NULL)
411e1bfb
AM
10028 if (ent->got.refcount > 0)
10029 {
e7b938ca 10030 if ((ent->tls_type & *lgot_masks & TLS_LD) != 0)
411e1bfb 10031 {
927be08e 10032 ppc64_tlsld_got (ibfd)->got.refcount += 1;
0b8bcf0d 10033 *pent = ent->next;
411e1bfb
AM
10034 }
10035 else
10036 {
19e08130
AM
10037 unsigned int ent_size = 8;
10038 unsigned int rel_size = sizeof (Elf64_External_Rela);
10039
eea6121a 10040 ent->got.offset = s->size;
e7b938ca 10041 if ((ent->tls_type & *lgot_masks & TLS_GD) != 0)
927be08e 10042 {
19e08130
AM
10043 ent_size *= 2;
10044 rel_size *= 2;
10045 }
10046 s->size += ent_size;
10047 if ((*lgot_masks & PLT_IFUNC) != 0)
10048 {
33e44f2e 10049 htab->elf.irelplt->size += rel_size;
19e08130
AM
10050 htab->got_reli_size += rel_size;
10051 }
0e1862bb 10052 else if (bfd_link_pic (info))
19e08130
AM
10053 {
10054 asection *srel = ppc64_elf_tdata (ibfd)->relgot;
10055 srel->size += rel_size;
927be08e 10056 }
0b8bcf0d 10057 pent = &ent->next;
411e1bfb
AM
10058 }
10059 }
10060 else
0b8bcf0d 10061 *pent = ent->next;
65f38f15 10062 }
e054468f
AM
10063
10064 /* Allocate space for calls to local STT_GNU_IFUNC syms in .iplt. */
10065 for (; local_plt < end_local_plt; ++local_plt)
10066 {
10067 struct plt_entry *ent;
10068
10069 for (ent = *local_plt; ent != NULL; ent = ent->next)
10070 if (ent->plt.refcount > 0)
10071 {
33e44f2e 10072 s = htab->elf.iplt;
e054468f 10073 ent->plt.offset = s->size;
b9e5796b 10074 s->size += PLT_ENTRY_SIZE (htab);
e054468f 10075
33e44f2e 10076 htab->elf.irelplt->size += sizeof (Elf64_External_Rela);
e054468f
AM
10077 }
10078 else
10079 ent->plt.offset = (bfd_vma) -1;
10080 }
65f38f15
AM
10081 }
10082
10083 /* Allocate global sym .plt and .got entries, and space for global
10084 sym dynamic relocs. */
4ce794b7 10085 elf_link_hash_traverse (&htab->elf, allocate_dynrelocs, info);
a345bc8d
AM
10086 /* Stash the end of glink branch table. */
10087 if (htab->glink != NULL)
10088 htab->glink->rawsize = htab->glink->size;
10089
0e1862bb 10090 if (!htab->opd_abi && !bfd_link_pic (info))
a345bc8d 10091 elf_link_hash_traverse (&htab->elf, size_global_entry_stubs, info);
65f38f15 10092
7865406b 10093 first_tlsld = NULL;
c72f2fb2 10094 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
102890f0 10095 {
7865406b
AM
10096 struct got_entry *ent;
10097
0c8d6e5c 10098 if (!is_ppc64_elf (ibfd))
102890f0
AM
10099 continue;
10100
7865406b
AM
10101 ent = ppc64_tlsld_got (ibfd);
10102 if (ent->got.refcount > 0)
102890f0 10103 {
7865406b 10104 if (!htab->do_multi_toc && first_tlsld != NULL)
102890f0 10105 {
7865406b
AM
10106 ent->is_indirect = TRUE;
10107 ent->got.ent = first_tlsld;
10108 }
10109 else
10110 {
10111 if (first_tlsld == NULL)
10112 first_tlsld = ent;
10113 s = ppc64_elf_tdata (ibfd)->got;
10114 ent->got.offset = s->size;
10115 ent->owner = ibfd;
10116 s->size += 16;
0e1862bb 10117 if (bfd_link_pic (info))
7865406b
AM
10118 {
10119 asection *srel = ppc64_elf_tdata (ibfd)->relgot;
10120 srel->size += sizeof (Elf64_External_Rela);
10121 }
102890f0
AM
10122 }
10123 }
10124 else
7865406b 10125 ent->got.offset = (bfd_vma) -1;
102890f0
AM
10126 }
10127
65f38f15
AM
10128 /* We now have determined the sizes of the various dynamic sections.
10129 Allocate memory for them. */
b34976b6 10130 relocs = FALSE;
65f38f15
AM
10131 for (s = dynobj->sections; s != NULL; s = s->next)
10132 {
10133 if ((s->flags & SEC_LINKER_CREATED) == 0)
10134 continue;
10135
4ce794b7 10136 if (s == htab->brlt || s == htab->relbrlt)
721956f4
AM
10137 /* These haven't been allocated yet; don't strip. */
10138 continue;
33e44f2e
AM
10139 else if (s == htab->elf.sgot
10140 || s == htab->elf.splt
10141 || s == htab->elf.iplt
c456f082
AM
10142 || s == htab->glink
10143 || s == htab->dynbss)
65f38f15
AM
10144 {
10145 /* Strip this section if we don't need it; see the
10146 comment below. */
5bd4f169 10147 }
58d180e8
AM
10148 else if (s == htab->glink_eh_frame)
10149 {
10150 if (!bfd_is_abs_section (s->output_section))
10151 /* Not sized yet. */
10152 continue;
10153 }
70cc837d 10154 else if (CONST_STRNEQ (s->name, ".rela"))
5bd4f169 10155 {
c456f082 10156 if (s->size != 0)
5bd4f169 10157 {
33e44f2e 10158 if (s != htab->elf.srelplt)
b34976b6 10159 relocs = TRUE;
5bd4f169
AM
10160
10161 /* We use the reloc_count field as a counter if we need
10162 to copy relocs into the output file. */
10163 s->reloc_count = 0;
10164 }
10165 }
65f38f15 10166 else
5bd4f169
AM
10167 {
10168 /* It's not one of our sections, so don't allocate space. */
10169 continue;
10170 }
10171
eea6121a 10172 if (s->size == 0)
5bd4f169 10173 {
c456f082
AM
10174 /* If we don't need this section, strip it from the
10175 output file. This is mostly to handle .rela.bss and
10176 .rela.plt. We must create both sections in
10177 create_dynamic_sections, because they must be created
10178 before the linker maps input sections to output
10179 sections. The linker does that before
10180 adjust_dynamic_symbol is called, and it is that
10181 function which decides whether anything needs to go
10182 into these sections. */
8423293d 10183 s->flags |= SEC_EXCLUDE;
5bd4f169
AM
10184 continue;
10185 }
10186
c456f082 10187 if ((s->flags & SEC_HAS_CONTENTS) == 0)
5f333394
AM
10188 continue;
10189
65f38f15
AM
10190 /* Allocate memory for the section contents. We use bfd_zalloc
10191 here in case unused entries are not reclaimed before the
10192 section's contents are written out. This should not happen,
411e1bfb
AM
10193 but this way if it does we get a R_PPC64_NONE reloc in .rela
10194 sections instead of garbage.
10195 We also rely on the section contents being zero when writing
10196 the GOT. */
eea6121a 10197 s->contents = bfd_zalloc (dynobj, s->size);
65f38f15 10198 if (s->contents == NULL)
b34976b6 10199 return FALSE;
5bd4f169
AM
10200 }
10201
c72f2fb2 10202 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
e717da7e 10203 {
0c8d6e5c 10204 if (!is_ppc64_elf (ibfd))
7b53ace3
AM
10205 continue;
10206
e717da7e 10207 s = ppc64_elf_tdata (ibfd)->got;
33e44f2e 10208 if (s != NULL && s != htab->elf.sgot)
e717da7e 10209 {
eea6121a 10210 if (s->size == 0)
8423293d 10211 s->flags |= SEC_EXCLUDE;
e717da7e
AM
10212 else
10213 {
eea6121a 10214 s->contents = bfd_zalloc (ibfd, s->size);
e717da7e
AM
10215 if (s->contents == NULL)
10216 return FALSE;
10217 }
10218 }
10219 s = ppc64_elf_tdata (ibfd)->relgot;
10220 if (s != NULL)
10221 {
eea6121a 10222 if (s->size == 0)
8423293d 10223 s->flags |= SEC_EXCLUDE;
e717da7e
AM
10224 else
10225 {
eea6121a 10226 s->contents = bfd_zalloc (ibfd, s->size);
e717da7e
AM
10227 if (s->contents == NULL)
10228 return FALSE;
10229 relocs = TRUE;
10230 s->reloc_count = 0;
10231 }
10232 }
10233 }
10234
e86ce104 10235 if (htab->elf.dynamic_sections_created)
5bd4f169 10236 {
e8910a83
AM
10237 bfd_boolean tls_opt;
10238
5bd4f169
AM
10239 /* Add some entries to the .dynamic section. We fill in the
10240 values later, in ppc64_elf_finish_dynamic_sections, but we
10241 must add the entries now so that we get the correct size for
10242 the .dynamic section. The DT_DEBUG entry is filled in by the
10243 dynamic linker and used by the debugger. */
dc810e39 10244#define add_dynamic_entry(TAG, VAL) \
5a580b3a 10245 _bfd_elf_add_dynamic_entry (info, TAG, VAL)
dc810e39 10246
0e1862bb 10247 if (bfd_link_executable (info))
5bd4f169 10248 {
dc810e39 10249 if (!add_dynamic_entry (DT_DEBUG, 0))
b34976b6 10250 return FALSE;
5bd4f169
AM
10251 }
10252
33e44f2e 10253 if (htab->elf.splt != NULL && htab->elf.splt->size != 0)
5bd4f169 10254 {
dc810e39
AM
10255 if (!add_dynamic_entry (DT_PLTGOT, 0)
10256 || !add_dynamic_entry (DT_PLTRELSZ, 0)
10257 || !add_dynamic_entry (DT_PLTREL, DT_RELA)
5d1634d7
AM
10258 || !add_dynamic_entry (DT_JMPREL, 0)
10259 || !add_dynamic_entry (DT_PPC64_GLINK, 0))
b34976b6 10260 return FALSE;
5bd4f169
AM
10261 }
10262
ee67d69a 10263 if (NO_OPD_RELOCS && abiversion (output_bfd) <= 1)
19397422
AM
10264 {
10265 if (!add_dynamic_entry (DT_PPC64_OPD, 0)
10266 || !add_dynamic_entry (DT_PPC64_OPDSZ, 0))
b34976b6 10267 return FALSE;
19397422
AM
10268 }
10269
7c9cf415 10270 tls_opt = (htab->params->tls_get_addr_opt
e8910a83
AM
10271 && htab->tls_get_addr_fd != NULL
10272 && htab->tls_get_addr_fd->elf.plt.plist != NULL);
10273 if (tls_opt || !htab->opd_abi)
10274 {
10275 if (!add_dynamic_entry (DT_PPC64_OPT, tls_opt ? PPC64_OPT_TLS : 0))
10276 return FALSE;
10277 }
a7f2871e 10278
5bd4f169
AM
10279 if (relocs)
10280 {
dc810e39
AM
10281 if (!add_dynamic_entry (DT_RELA, 0)
10282 || !add_dynamic_entry (DT_RELASZ, 0)
10283 || !add_dynamic_entry (DT_RELAENT, sizeof (Elf64_External_Rela)))
b34976b6 10284 return FALSE;
5bd4f169 10285
65f38f15
AM
10286 /* If any dynamic relocs apply to a read-only section,
10287 then we need a DT_TEXTREL entry. */
248866a8 10288 if ((info->flags & DF_TEXTREL) == 0)
a345bc8d 10289 elf_link_hash_traverse (&htab->elf, maybe_set_textrel, info);
5bd4f169 10290
65f38f15 10291 if ((info->flags & DF_TEXTREL) != 0)
5bd4f169 10292 {
65f38f15 10293 if (!add_dynamic_entry (DT_TEXTREL, 0))
b34976b6 10294 return FALSE;
5bd4f169 10295 }
5bd4f169 10296 }
5bd4f169 10297 }
65f38f15 10298#undef add_dynamic_entry
5bd4f169 10299
b34976b6 10300 return TRUE;
5bd4f169
AM
10301}
10302
a345bc8d
AM
10303/* Return TRUE if symbol should be hashed in the `.gnu.hash' section. */
10304
10305static bfd_boolean
10306ppc64_elf_hash_symbol (struct elf_link_hash_entry *h)
10307{
10308 if (h->plt.plist != NULL
10309 && !h->def_regular
10310 && !h->pointer_equality_needed)
10311 return FALSE;
10312
10313 return _bfd_elf_hash_symbol (h);
10314}
10315
721956f4 10316/* Determine the type of stub needed, if any, for a call. */
5bd4f169 10317
4ce794b7
AM
10318static inline enum ppc_stub_type
10319ppc_type_of_stub (asection *input_sec,
10320 const Elf_Internal_Rela *rel,
10321 struct ppc_link_hash_entry **hash,
e054468f 10322 struct plt_entry **plt_ent,
6911b7dc
AM
10323 bfd_vma destination,
10324 unsigned long local_off)
5bd4f169 10325{
721956f4
AM
10326 struct ppc_link_hash_entry *h = *hash;
10327 bfd_vma location;
10328 bfd_vma branch_offset;
10329 bfd_vma max_branch_offset;
4ce794b7 10330 enum elf_ppc64_reloc_type r_type;
5bd4f169 10331
721956f4
AM
10332 if (h != NULL)
10333 {
e054468f 10334 struct plt_entry *ent;
7fe2b9a6 10335 struct ppc_link_hash_entry *fdh = h;
b31867b6
AM
10336 if (h->oh != NULL
10337 && h->oh->is_func_descriptor)
7b8f6675
AM
10338 {
10339 fdh = ppc_follow_link (h->oh);
10340 *hash = fdh;
10341 }
8387904d 10342
e054468f
AM
10343 for (ent = fdh->elf.plt.plist; ent != NULL; ent = ent->next)
10344 if (ent->addend == rel->r_addend
10345 && ent->plt.offset != (bfd_vma) -1)
10346 {
e054468f
AM
10347 *plt_ent = ent;
10348 return ppc_stub_plt_call;
10349 }
5bd4f169 10350
7fe2b9a6
AM
10351 /* Here, we know we don't have a plt entry. If we don't have a
10352 either a defined function descriptor or a defined entry symbol
10353 in a regular object file, then it is pointless trying to make
10354 any other type of stub. */
854b41e7
AM
10355 if (!is_static_defined (&fdh->elf)
10356 && !is_static_defined (&h->elf))
721956f4 10357 return ppc_stub_none;
5d1634d7 10358 }
e054468f
AM
10359 else if (elf_local_got_ents (input_sec->owner) != NULL)
10360 {
10361 Elf_Internal_Shdr *symtab_hdr = &elf_symtab_hdr (input_sec->owner);
10362 struct plt_entry **local_plt = (struct plt_entry **)
10363 elf_local_got_ents (input_sec->owner) + symtab_hdr->sh_info;
10364 unsigned long r_symndx = ELF64_R_SYM (rel->r_info);
10365
10366 if (local_plt[r_symndx] != NULL)
10367 {
10368 struct plt_entry *ent;
10369
10370 for (ent = local_plt[r_symndx]; ent != NULL; ent = ent->next)
10371 if (ent->addend == rel->r_addend
10372 && ent->plt.offset != (bfd_vma) -1)
10373 {
10374 *plt_ent = ent;
10375 return ppc_stub_plt_call;
10376 }
10377 }
10378 }
5d1634d7 10379
721956f4
AM
10380 /* Determine where the call point is. */
10381 location = (input_sec->output_offset
10382 + input_sec->output_section->vma
10383 + rel->r_offset);
5d1634d7 10384
721956f4
AM
10385 branch_offset = destination - location;
10386 r_type = ELF64_R_TYPE (rel->r_info);
5d1634d7 10387
721956f4
AM
10388 /* Determine if a long branch stub is needed. */
10389 max_branch_offset = 1 << 25;
4ce794b7 10390 if (r_type != R_PPC64_REL24)
721956f4 10391 max_branch_offset = 1 << 15;
5d1634d7 10392
6911b7dc 10393 if (branch_offset + max_branch_offset >= 2 * max_branch_offset - local_off)
721956f4
AM
10394 /* We need a stub. Figure out whether a long_branch or plt_branch
10395 is needed later. */
10396 return ppc_stub_long_branch;
5d1634d7 10397
721956f4 10398 return ppc_stub_none;
5d1634d7
AM
10399}
10400
794e51c0
AM
10401/* With power7 weakly ordered memory model, it is possible for ld.so
10402 to update a plt entry in one thread and have another thread see a
10403 stale zero toc entry. To avoid this we need some sort of acquire
10404 barrier in the call stub. One solution is to make the load of the
10405 toc word seem to appear to depend on the load of the function entry
10406 word. Another solution is to test for r2 being zero, and branch to
10407 the appropriate glink entry if so.
10408
10409 . fake dep barrier compare
71a39c98
AM
10410 . ld 12,xxx(2) ld 12,xxx(2)
10411 . mtctr 12 mtctr 12
10412 . xor 11,12,12 ld 2,xxx+8(2)
794e51c0
AM
10413 . add 2,2,11 cmpldi 2,0
10414 . ld 2,xxx+8(2) bnectr+
10415 . bctr b <glink_entry>
10416
10417 The solution involving the compare turns out to be faster, so
10418 that's what we use unless the branch won't reach. */
10419
10420#define ALWAYS_USE_FAKE_DEP 0
10421#define ALWAYS_EMIT_R2SAVE 0
5d1634d7 10422
5d1634d7
AM
10423#define PPC_LO(v) ((v) & 0xffff)
10424#define PPC_HI(v) (((v) >> 16) & 0xffff)
10425#define PPC_HA(v) PPC_HI ((v) + 0x8000)
10426
794e51c0
AM
10427static inline unsigned int
10428plt_stub_size (struct ppc_link_hash_table *htab,
10429 struct ppc_stub_hash_entry *stub_entry,
10430 bfd_vma off)
10431{
b9e5796b
AM
10432 unsigned size = 12;
10433
10434 if (ALWAYS_EMIT_R2SAVE
10435 || stub_entry->stub_type == ppc_stub_plt_call_r2save)
10436 size += 4;
10437 if (PPC_HA (off) != 0)
794e51c0 10438 size += 4;
b9e5796b
AM
10439 if (htab->opd_abi)
10440 {
10441 size += 4;
e7d1c40c 10442 if (htab->params->plt_static_chain)
b9e5796b 10443 size += 4;
bd4d2eaa
AM
10444 if (htab->params->plt_thread_safe
10445 && htab->elf.dynamic_sections_created
10446 && stub_entry->h != NULL
10447 && stub_entry->h->elf.dynindx != -1)
b9e5796b 10448 size += 8;
e7d1c40c 10449 if (PPC_HA (off + 8 + 8 * htab->params->plt_static_chain) != PPC_HA (off))
b9e5796b
AM
10450 size += 4;
10451 }
794e51c0
AM
10452 if (stub_entry->h != NULL
10453 && (stub_entry->h == htab->tls_get_addr_fd
10454 || stub_entry->h == htab->tls_get_addr)
7c9cf415 10455 && htab->params->tls_get_addr_opt)
794e51c0
AM
10456 size += 13 * 4;
10457 return size;
10458}
10459
10460/* If this stub would cross fewer 2**plt_stub_align boundaries if we align,
10461 then return the padding needed to do so. */
10462static inline unsigned int
10463plt_stub_pad (struct ppc_link_hash_table *htab,
10464 struct ppc_stub_hash_entry *stub_entry,
10465 bfd_vma plt_off)
10466{
e7d1c40c 10467 int stub_align = 1 << htab->params->plt_stub_align;
794e51c0 10468 unsigned stub_size = plt_stub_size (htab, stub_entry, plt_off);
6f20ed8a 10469 bfd_vma stub_off = stub_entry->group->stub_sec->size;
794e51c0
AM
10470
10471 if (((stub_off + stub_size - 1) & -stub_align) - (stub_off & -stub_align)
e05fa0ba 10472 > ((stub_size - 1) & -stub_align))
794e51c0
AM
10473 return stub_align - (stub_off & (stub_align - 1));
10474 return 0;
10475}
10476
10477/* Build a .plt call stub. */
10478
10479static inline bfd_byte *
10480build_plt_stub (struct ppc_link_hash_table *htab,
10481 struct ppc_stub_hash_entry *stub_entry,
10482 bfd_byte *p, bfd_vma offset, Elf_Internal_Rela *r)
10483{
e7d1c40c 10484 bfd *obfd = htab->params->stub_bfd;
b9e5796b 10485 bfd_boolean plt_load_toc = htab->opd_abi;
e7d1c40c 10486 bfd_boolean plt_static_chain = htab->params->plt_static_chain;
bd4d2eaa
AM
10487 bfd_boolean plt_thread_safe = (htab->params->plt_thread_safe
10488 && htab->elf.dynamic_sections_created
10489 && stub_entry->h != NULL
10490 && stub_entry->h->elf.dynindx != -1);
794e51c0
AM
10491 bfd_boolean use_fake_dep = plt_thread_safe;
10492 bfd_vma cmp_branch_off = 0;
10493
10494 if (!ALWAYS_USE_FAKE_DEP
b9e5796b 10495 && plt_load_toc
794e51c0 10496 && plt_thread_safe
bd4d2eaa
AM
10497 && !((stub_entry->h == htab->tls_get_addr_fd
10498 || stub_entry->h == htab->tls_get_addr)
7c9cf415 10499 && htab->params->tls_get_addr_opt))
794e51c0
AM
10500 {
10501 bfd_vma pltoff = stub_entry->plt_ent->plt.offset & ~1;
b9e5796b
AM
10502 bfd_vma pltindex = ((pltoff - PLT_INITIAL_ENTRY_SIZE (htab))
10503 / PLT_ENTRY_SIZE (htab));
794e51c0
AM
10504 bfd_vma glinkoff = GLINK_CALL_STUB_SIZE + pltindex * 8;
10505 bfd_vma to, from;
10506
68d62958
AM
10507 if (pltindex > 32768)
10508 glinkoff += (pltindex - 32768) * 4;
794e51c0
AM
10509 to = (glinkoff
10510 + htab->glink->output_offset
10511 + htab->glink->output_section->vma);
6f20ed8a 10512 from = (p - stub_entry->group->stub_sec->contents
794e51c0
AM
10513 + 4 * (ALWAYS_EMIT_R2SAVE
10514 || stub_entry->stub_type == ppc_stub_plt_call_r2save)
10515 + 4 * (PPC_HA (offset) != 0)
10516 + 4 * (PPC_HA (offset + 8 + 8 * plt_static_chain)
10517 != PPC_HA (offset))
10518 + 4 * (plt_static_chain != 0)
10519 + 20
6f20ed8a
AM
10520 + stub_entry->group->stub_sec->output_offset
10521 + stub_entry->group->stub_sec->output_section->vma);
794e51c0
AM
10522 cmp_branch_off = to - from;
10523 use_fake_dep = cmp_branch_off + (1 << 25) >= (1 << 26);
10524 }
10525
ac2df442
AM
10526 if (PPC_HA (offset) != 0)
10527 {
176a0d42
AM
10528 if (r != NULL)
10529 {
794e51c0
AM
10530 if (ALWAYS_EMIT_R2SAVE
10531 || stub_entry->stub_type == ppc_stub_plt_call_r2save)
10532 r[0].r_offset += 4;
176a0d42 10533 r[0].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_HA);
3b421ab3 10534 r[1].r_offset = r[0].r_offset + 4;
176a0d42
AM
10535 r[1].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_LO_DS);
10536 r[1].r_addend = r[0].r_addend;
b9e5796b 10537 if (plt_load_toc)
176a0d42 10538 {
b9e5796b 10539 if (PPC_HA (offset + 8 + 8 * plt_static_chain) != PPC_HA (offset))
c7131b65 10540 {
b9e5796b
AM
10541 r[2].r_offset = r[1].r_offset + 4;
10542 r[2].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_LO);
10543 r[2].r_addend = r[0].r_addend;
10544 }
10545 else
10546 {
10547 r[2].r_offset = r[1].r_offset + 8 + 8 * use_fake_dep;
10548 r[2].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_LO_DS);
10549 r[2].r_addend = r[0].r_addend + 8;
10550 if (plt_static_chain)
10551 {
10552 r[3].r_offset = r[2].r_offset + 4;
10553 r[3].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_LO_DS);
10554 r[3].r_addend = r[0].r_addend + 16;
10555 }
c7131b65 10556 }
176a0d42
AM
10557 }
10558 }
794e51c0
AM
10559 if (ALWAYS_EMIT_R2SAVE
10560 || stub_entry->stub_type == ppc_stub_plt_call_r2save)
a078d95a 10561 bfd_put_32 (obfd, STD_R2_0R1 + STK_TOC (htab), p), p += 4;
397998fc
AM
10562 if (plt_load_toc)
10563 {
10564 bfd_put_32 (obfd, ADDIS_R11_R2 | PPC_HA (offset), p), p += 4;
10565 bfd_put_32 (obfd, LD_R12_0R11 | PPC_LO (offset), p), p += 4;
10566 }
10567 else
10568 {
10569 bfd_put_32 (obfd, ADDIS_R12_R2 | PPC_HA (offset), p), p += 4;
10570 bfd_put_32 (obfd, LD_R12_0R12 | PPC_LO (offset), p), p += 4;
10571 }
b9e5796b
AM
10572 if (plt_load_toc
10573 && PPC_HA (offset + 8 + 8 * plt_static_chain) != PPC_HA (offset))
ac2df442 10574 {
71a39c98 10575 bfd_put_32 (obfd, ADDI_R11_R11 | PPC_LO (offset), p), p += 4;
ac2df442
AM
10576 offset = 0;
10577 }
71a39c98 10578 bfd_put_32 (obfd, MTCTR_R12, p), p += 4;
b9e5796b 10579 if (plt_load_toc)
794e51c0 10580 {
b9e5796b
AM
10581 if (use_fake_dep)
10582 {
10583 bfd_put_32 (obfd, XOR_R2_R12_R12, p), p += 4;
10584 bfd_put_32 (obfd, ADD_R11_R11_R2, p), p += 4;
10585 }
10586 bfd_put_32 (obfd, LD_R2_0R11 | PPC_LO (offset + 8), p), p += 4;
10587 if (plt_static_chain)
10588 bfd_put_32 (obfd, LD_R11_0R11 | PPC_LO (offset + 16), p), p += 4;
794e51c0 10589 }
ac2df442
AM
10590 }
10591 else
10592 {
176a0d42
AM
10593 if (r != NULL)
10594 {
794e51c0
AM
10595 if (ALWAYS_EMIT_R2SAVE
10596 || stub_entry->stub_type == ppc_stub_plt_call_r2save)
10597 r[0].r_offset += 4;
176a0d42 10598 r[0].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_DS);
b9e5796b 10599 if (plt_load_toc)
176a0d42 10600 {
b9e5796b 10601 if (PPC_HA (offset + 8 + 8 * plt_static_chain) != PPC_HA (offset))
c7131b65 10602 {
b9e5796b
AM
10603 r[1].r_offset = r[0].r_offset + 4;
10604 r[1].r_info = ELF64_R_INFO (0, R_PPC64_TOC16);
10605 r[1].r_addend = r[0].r_addend;
10606 }
10607 else
10608 {
10609 r[1].r_offset = r[0].r_offset + 8 + 8 * use_fake_dep;
10610 r[1].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_DS);
10611 r[1].r_addend = r[0].r_addend + 8 + 8 * plt_static_chain;
10612 if (plt_static_chain)
10613 {
10614 r[2].r_offset = r[1].r_offset + 4;
10615 r[2].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_DS);
10616 r[2].r_addend = r[0].r_addend + 8;
10617 }
c7131b65 10618 }
176a0d42
AM
10619 }
10620 }
794e51c0
AM
10621 if (ALWAYS_EMIT_R2SAVE
10622 || stub_entry->stub_type == ppc_stub_plt_call_r2save)
a078d95a 10623 bfd_put_32 (obfd, STD_R2_0R1 + STK_TOC (htab), p), p += 4;
71a39c98 10624 bfd_put_32 (obfd, LD_R12_0R2 | PPC_LO (offset), p), p += 4;
b9e5796b
AM
10625 if (plt_load_toc
10626 && PPC_HA (offset + 8 + 8 * plt_static_chain) != PPC_HA (offset))
ac2df442
AM
10627 {
10628 bfd_put_32 (obfd, ADDI_R2_R2 | PPC_LO (offset), p), p += 4;
10629 offset = 0;
10630 }
71a39c98 10631 bfd_put_32 (obfd, MTCTR_R12, p), p += 4;
b9e5796b 10632 if (plt_load_toc)
794e51c0 10633 {
b9e5796b
AM
10634 if (use_fake_dep)
10635 {
10636 bfd_put_32 (obfd, XOR_R11_R12_R12, p), p += 4;
10637 bfd_put_32 (obfd, ADD_R2_R2_R11, p), p += 4;
10638 }
10639 if (plt_static_chain)
10640 bfd_put_32 (obfd, LD_R11_0R2 | PPC_LO (offset + 16), p), p += 4;
10641 bfd_put_32 (obfd, LD_R2_0R2 | PPC_LO (offset + 8), p), p += 4;
794e51c0 10642 }
ac2df442 10643 }
b9e5796b 10644 if (plt_load_toc && plt_thread_safe && !use_fake_dep)
794e51c0
AM
10645 {
10646 bfd_put_32 (obfd, CMPLDI_R2_0, p), p += 4;
10647 bfd_put_32 (obfd, BNECTR_P4, p), p += 4;
22aa0c7e 10648 bfd_put_32 (obfd, B_DOT | (cmp_branch_off & 0x3fffffc), p), p += 4;
794e51c0
AM
10649 }
10650 else
10651 bfd_put_32 (obfd, BCTR, p), p += 4;
5d1634d7
AM
10652 return p;
10653}
10654
a7f2871e
AM
10655/* Build a special .plt call stub for __tls_get_addr. */
10656
10657#define LD_R11_0R3 0xe9630000
10658#define LD_R12_0R3 0xe9830000
10659#define MR_R0_R3 0x7c601b78
10660#define CMPDI_R11_0 0x2c2b0000
10661#define ADD_R3_R12_R13 0x7c6c6a14
10662#define BEQLR 0x4d820020
10663#define MR_R3_R0 0x7c030378
a7f2871e
AM
10664#define STD_R11_0R1 0xf9610000
10665#define BCTRL 0x4e800421
10666#define LD_R11_0R1 0xe9610000
a7f2871e
AM
10667#define MTLR_R11 0x7d6803a6
10668
10669static inline bfd_byte *
794e51c0
AM
10670build_tls_get_addr_stub (struct ppc_link_hash_table *htab,
10671 struct ppc_stub_hash_entry *stub_entry,
10672 bfd_byte *p, bfd_vma offset, Elf_Internal_Rela *r)
a7f2871e 10673{
e7d1c40c 10674 bfd *obfd = htab->params->stub_bfd;
794e51c0 10675
a7f2871e
AM
10676 bfd_put_32 (obfd, LD_R11_0R3 + 0, p), p += 4;
10677 bfd_put_32 (obfd, LD_R12_0R3 + 8, p), p += 4;
10678 bfd_put_32 (obfd, MR_R0_R3, p), p += 4;
10679 bfd_put_32 (obfd, CMPDI_R11_0, p), p += 4;
10680 bfd_put_32 (obfd, ADD_R3_R12_R13, p), p += 4;
10681 bfd_put_32 (obfd, BEQLR, p), p += 4;
10682 bfd_put_32 (obfd, MR_R3_R0, p), p += 4;
10683 bfd_put_32 (obfd, MFLR_R11, p), p += 4;
a078d95a 10684 bfd_put_32 (obfd, STD_R11_0R1 + STK_LINKER (htab), p), p += 4;
a7f2871e
AM
10685
10686 if (r != NULL)
10687 r[0].r_offset += 9 * 4;
794e51c0 10688 p = build_plt_stub (htab, stub_entry, p, offset, r);
a7f2871e
AM
10689 bfd_put_32 (obfd, BCTRL, p - 4);
10690
a078d95a 10691 bfd_put_32 (obfd, LD_R2_0R1 + STK_TOC (htab), p), p += 4;
bd4d2eaa 10692 bfd_put_32 (obfd, LD_R11_0R1 + STK_LINKER (htab), p), p += 4;
a7f2871e
AM
10693 bfd_put_32 (obfd, MTLR_R11, p), p += 4;
10694 bfd_put_32 (obfd, BLR, p), p += 4;
10695
10696 return p;
10697}
10698
176a0d42
AM
10699static Elf_Internal_Rela *
10700get_relocs (asection *sec, int count)
10701{
10702 Elf_Internal_Rela *relocs;
10703 struct bfd_elf_section_data *elfsec_data;
10704
10705 elfsec_data = elf_section_data (sec);
10706 relocs = elfsec_data->relocs;
10707 if (relocs == NULL)
10708 {
10709 bfd_size_type relsize;
10710 relsize = sec->reloc_count * sizeof (*relocs);
10711 relocs = bfd_alloc (sec->owner, relsize);
10712 if (relocs == NULL)
10713 return NULL;
10714 elfsec_data->relocs = relocs;
d4730f92
BS
10715 elfsec_data->rela.hdr = bfd_zalloc (sec->owner,
10716 sizeof (Elf_Internal_Shdr));
10717 if (elfsec_data->rela.hdr == NULL)
10718 return NULL;
10719 elfsec_data->rela.hdr->sh_size = (sec->reloc_count
10720 * sizeof (Elf64_External_Rela));
10721 elfsec_data->rela.hdr->sh_entsize = sizeof (Elf64_External_Rela);
176a0d42
AM
10722 sec->reloc_count = 0;
10723 }
10724 relocs += sec->reloc_count;
10725 sec->reloc_count += count;
10726 return relocs;
10727}
10728
aa374f67 10729static bfd_vma
25f53a85 10730get_r2off (struct bfd_link_info *info,
aa374f67
AM
10731 struct ppc_stub_hash_entry *stub_entry)
10732{
25f53a85 10733 struct ppc_link_hash_table *htab = ppc_hash_table (info);
6f20ed8a 10734 bfd_vma r2off = htab->sec_info[stub_entry->target_section->id].toc_off;
aa374f67
AM
10735
10736 if (r2off == 0)
10737 {
10738 /* Support linking -R objects. Get the toc pointer from the
10739 opd entry. */
10740 char buf[8];
b9e5796b
AM
10741 if (!htab->opd_abi)
10742 return r2off;
aa374f67
AM
10743 asection *opd = stub_entry->h->elf.root.u.def.section;
10744 bfd_vma opd_off = stub_entry->h->elf.root.u.def.value;
10745
10746 if (strcmp (opd->name, ".opd") != 0
10747 || opd->reloc_count != 0)
10748 {
bc30df16 10749 info->callbacks->einfo (_("%P: cannot find opd entry toc for `%T'\n"),
25f53a85 10750 stub_entry->h->elf.root.root.string);
aa374f67 10751 bfd_set_error (bfd_error_bad_value);
a7c49797 10752 return (bfd_vma) -1;
aa374f67
AM
10753 }
10754 if (!bfd_get_section_contents (opd->owner, opd, buf, opd_off + 8, 8))
a7c49797 10755 return (bfd_vma) -1;
aa374f67 10756 r2off = bfd_get_64 (opd->owner, buf);
25f53a85 10757 r2off -= elf_gp (info->output_bfd);
aa374f67 10758 }
6f20ed8a 10759 r2off -= htab->sec_info[stub_entry->group->link_sec->id].toc_off;
aa374f67
AM
10760 return r2off;
10761}
10762
b34976b6 10763static bfd_boolean
4ce794b7 10764ppc_build_one_stub (struct bfd_hash_entry *gen_entry, void *in_arg)
5d1634d7 10765{
721956f4
AM
10766 struct ppc_stub_hash_entry *stub_entry;
10767 struct ppc_branch_hash_entry *br_entry;
5d1634d7
AM
10768 struct bfd_link_info *info;
10769 struct ppc_link_hash_table *htab;
721956f4
AM
10770 bfd_byte *loc;
10771 bfd_byte *p;
ee75fd95 10772 bfd_vma dest, off;
721956f4 10773 int size;
176a0d42 10774 Elf_Internal_Rela *r;
e054468f 10775 asection *plt;
5d1634d7 10776
721956f4
AM
10777 /* Massage our args to the form they really have. */
10778 stub_entry = (struct ppc_stub_hash_entry *) gen_entry;
4ce794b7 10779 info = in_arg;
5d1634d7 10780
5d1634d7 10781 htab = ppc_hash_table (info);
4dfe6ac6
NC
10782 if (htab == NULL)
10783 return FALSE;
5d1634d7 10784
721956f4 10785 /* Make a note of the offset within the stubs for this entry. */
6f20ed8a
AM
10786 stub_entry->stub_offset = stub_entry->group->stub_sec->size;
10787 loc = stub_entry->group->stub_sec->contents + stub_entry->stub_offset;
721956f4 10788
4ce794b7 10789 htab->stub_count[stub_entry->stub_type - 1] += 1;
721956f4 10790 switch (stub_entry->stub_type)
5d1634d7 10791 {
721956f4 10792 case ppc_stub_long_branch:
ad8e1ba5 10793 case ppc_stub_long_branch_r2off:
721956f4 10794 /* Branches are relative. This is where we are going to. */
6911b7dc
AM
10795 dest = (stub_entry->target_value
10796 + stub_entry->target_section->output_offset
10797 + stub_entry->target_section->output_section->vma);
10798 dest += PPC64_LOCAL_ENTRY_OFFSET (stub_entry->other);
10799 off = dest;
5d1634d7 10800
721956f4
AM
10801 /* And this is where we are coming from. */
10802 off -= (stub_entry->stub_offset
6f20ed8a
AM
10803 + stub_entry->group->stub_sec->output_offset
10804 + stub_entry->group->stub_sec->output_section->vma);
e86ce104 10805
ac2df442
AM
10806 size = 4;
10807 if (stub_entry->stub_type == ppc_stub_long_branch_r2off)
ad8e1ba5 10808 {
25f53a85 10809 bfd_vma r2off = get_r2off (info, stub_entry);
ad8e1ba5 10810
a7c49797 10811 if (r2off == (bfd_vma) -1)
aa374f67
AM
10812 {
10813 htab->stub_error = TRUE;
10814 return FALSE;
10815 }
e7d1c40c 10816 bfd_put_32 (htab->params->stub_bfd, STD_R2_0R1 + STK_TOC (htab), loc);
ad8e1ba5 10817 loc += 4;
a7c49797 10818 size = 8;
ac2df442
AM
10819 if (PPC_HA (r2off) != 0)
10820 {
e7d1c40c
AM
10821 bfd_put_32 (htab->params->stub_bfd,
10822 ADDIS_R2_R2 | PPC_HA (r2off), loc);
ac2df442 10823 loc += 4;
a7c49797
AM
10824 size += 4;
10825 }
10826 if (PPC_LO (r2off) != 0)
10827 {
10828 bfd_put_32 (htab->params->stub_bfd,
10829 ADDI_R2_R2 | PPC_LO (r2off), loc);
10830 loc += 4;
10831 size += 4;
ac2df442 10832 }
ac2df442 10833 off -= size - 4;
ad8e1ba5 10834 }
e7d1c40c 10835 bfd_put_32 (htab->params->stub_bfd, B_DOT | (off & 0x3fffffc), loc);
ad8e1ba5 10836
5c3dead3
AM
10837 if (off + (1 << 25) >= (bfd_vma) (1 << 26))
10838 {
bc30df16
AM
10839 info->callbacks->einfo
10840 (_("%P: long branch stub `%s' offset overflow\n"),
10841 stub_entry->root.string);
5c3dead3
AM
10842 htab->stub_error = TRUE;
10843 return FALSE;
10844 }
ee75fd95
AM
10845
10846 if (info->emitrelocations)
10847 {
6f20ed8a 10848 r = get_relocs (stub_entry->group->stub_sec, 1);
176a0d42
AM
10849 if (r == NULL)
10850 return FALSE;
6f20ed8a 10851 r->r_offset = loc - stub_entry->group->stub_sec->contents;
ee75fd95
AM
10852 r->r_info = ELF64_R_INFO (0, R_PPC64_REL24);
10853 r->r_addend = dest;
10854 if (stub_entry->h != NULL)
10855 {
10856 struct elf_link_hash_entry **hashes;
10857 unsigned long symndx;
10858 struct ppc_link_hash_entry *h;
10859
e7d1c40c 10860 hashes = elf_sym_hashes (htab->params->stub_bfd);
ee75fd95
AM
10861 if (hashes == NULL)
10862 {
10863 bfd_size_type hsize;
10864
10865 hsize = (htab->stub_globals + 1) * sizeof (*hashes);
e7d1c40c 10866 hashes = bfd_zalloc (htab->params->stub_bfd, hsize);
ee75fd95
AM
10867 if (hashes == NULL)
10868 return FALSE;
e7d1c40c 10869 elf_sym_hashes (htab->params->stub_bfd) = hashes;
ee75fd95
AM
10870 htab->stub_globals = 1;
10871 }
10872 symndx = htab->stub_globals++;
10873 h = stub_entry->h;
10874 hashes[symndx] = &h->elf;
10875 r->r_info = ELF64_R_INFO (symndx, R_PPC64_REL24);
10876 if (h->oh != NULL && h->oh->is_func)
b31867b6 10877 h = ppc_follow_link (h->oh);
ee75fd95
AM
10878 if (h->elf.root.u.def.section != stub_entry->target_section)
10879 /* H is an opd symbol. The addend must be zero. */
10880 r->r_addend = 0;
10881 else
10882 {
10883 off = (h->elf.root.u.def.value
10884 + h->elf.root.u.def.section->output_offset
10885 + h->elf.root.u.def.section->output_section->vma);
10886 r->r_addend -= off;
10887 }
10888 }
10889 }
721956f4 10890 break;
e86ce104 10891
721956f4 10892 case ppc_stub_plt_branch:
ad8e1ba5 10893 case ppc_stub_plt_branch_r2off:
721956f4
AM
10894 br_entry = ppc_branch_hash_lookup (&htab->branch_hash_table,
10895 stub_entry->root.string + 9,
b34976b6 10896 FALSE, FALSE);
721956f4
AM
10897 if (br_entry == NULL)
10898 {
8de848d8 10899 info->callbacks->einfo (_("%P: can't find branch stub `%s'\n"),
25f53a85 10900 stub_entry->root.string);
b34976b6
AM
10901 htab->stub_error = TRUE;
10902 return FALSE;
721956f4
AM
10903 }
10904
176a0d42
AM
10905 dest = (stub_entry->target_value
10906 + stub_entry->target_section->output_offset
10907 + stub_entry->target_section->output_section->vma);
6911b7dc
AM
10908 if (stub_entry->stub_type != ppc_stub_plt_branch_r2off)
10909 dest += PPC64_LOCAL_ENTRY_OFFSET (stub_entry->other);
721956f4 10910
176a0d42 10911 bfd_put_64 (htab->brlt->owner, dest,
4ce794b7 10912 htab->brlt->contents + br_entry->offset);
721956f4 10913
f94498ff 10914 if (br_entry->iter == htab->stub_iteration)
721956f4 10915 {
f94498ff 10916 br_entry->iter = 0;
84f5d08e 10917
f94498ff 10918 if (htab->relbrlt != NULL)
84f5d08e 10919 {
f94498ff
AM
10920 /* Create a reloc for the branch lookup table entry. */
10921 Elf_Internal_Rela rela;
10922 bfd_byte *rl;
10923
10924 rela.r_offset = (br_entry->offset
10925 + htab->brlt->output_offset
10926 + htab->brlt->output_section->vma);
10927 rela.r_info = ELF64_R_INFO (0, R_PPC64_RELATIVE);
176a0d42 10928 rela.r_addend = dest;
f94498ff
AM
10929
10930 rl = htab->relbrlt->contents;
10931 rl += (htab->relbrlt->reloc_count++
10932 * sizeof (Elf64_External_Rela));
10933 bfd_elf64_swap_reloca_out (htab->relbrlt->owner, &rela, rl);
10934 }
10935 else if (info->emitrelocations)
10936 {
176a0d42
AM
10937 r = get_relocs (htab->brlt, 1);
10938 if (r == NULL)
10939 return FALSE;
10940 /* brlt, being SEC_LINKER_CREATED does not go through the
10941 normal reloc processing. Symbols and offsets are not
10942 translated from input file to output file form, so
10943 set up the offset per the output file. */
f94498ff
AM
10944 r->r_offset = (br_entry->offset
10945 + htab->brlt->output_offset
10946 + htab->brlt->output_section->vma);
10947 r->r_info = ELF64_R_INFO (0, R_PPC64_RELATIVE);
176a0d42 10948 r->r_addend = dest;
84f5d08e 10949 }
84f5d08e 10950 }
721956f4 10951
176a0d42
AM
10952 dest = (br_entry->offset
10953 + htab->brlt->output_offset
10954 + htab->brlt->output_section->vma);
10955
10956 off = (dest
4ce794b7 10957 - elf_gp (htab->brlt->output_section->owner)
6f20ed8a 10958 - htab->sec_info[stub_entry->group->link_sec->id].toc_off);
721956f4 10959
ad8e1ba5 10960 if (off + 0x80008000 > 0xffffffff || (off & 7) != 0)
5d1634d7 10961 {
25f53a85 10962 info->callbacks->einfo
bc30df16 10963 (_("%P: linkage table error against `%T'\n"),
721956f4 10964 stub_entry->root.string);
5d1634d7 10965 bfd_set_error (bfd_error_bad_value);
b34976b6
AM
10966 htab->stub_error = TRUE;
10967 return FALSE;
5d1634d7 10968 }
41bd81ab 10969
176a0d42
AM
10970 if (info->emitrelocations)
10971 {
6f20ed8a 10972 r = get_relocs (stub_entry->group->stub_sec, 1 + (PPC_HA (off) != 0));
176a0d42
AM
10973 if (r == NULL)
10974 return FALSE;
6f20ed8a 10975 r[0].r_offset = loc - stub_entry->group->stub_sec->contents;
7cfbafbc
AM
10976 if (bfd_big_endian (info->output_bfd))
10977 r[0].r_offset += 2;
00f412ee 10978 if (stub_entry->stub_type == ppc_stub_plt_branch_r2off)
176a0d42
AM
10979 r[0].r_offset += 4;
10980 r[0].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_DS);
10981 r[0].r_addend = dest;
10982 if (PPC_HA (off) != 0)
10983 {
10984 r[0].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_HA);
10985 r[1].r_offset = r[0].r_offset + 4;
10986 r[1].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_LO_DS);
10987 r[1].r_addend = r[0].r_addend;
10988 }
10989 }
10990
00f412ee 10991 if (stub_entry->stub_type != ppc_stub_plt_branch_r2off)
ad8e1ba5 10992 {
176a0d42 10993 if (PPC_HA (off) != 0)
ac2df442
AM
10994 {
10995 size = 16;
e7d1c40c 10996 bfd_put_32 (htab->params->stub_bfd,
397998fc 10997 ADDIS_R12_R2 | PPC_HA (off), loc);
ac2df442 10998 loc += 4;
e7d1c40c 10999 bfd_put_32 (htab->params->stub_bfd,
397998fc 11000 LD_R12_0R12 | PPC_LO (off), loc);
ac2df442
AM
11001 }
11002 else
11003 {
11004 size = 12;
e7d1c40c
AM
11005 bfd_put_32 (htab->params->stub_bfd,
11006 LD_R12_0R2 | PPC_LO (off), loc);
ac2df442 11007 }
ad8e1ba5
AM
11008 }
11009 else
11010 {
25f53a85 11011 bfd_vma r2off = get_r2off (info, stub_entry);
aa374f67 11012
a7c49797 11013 if (r2off == (bfd_vma) -1)
aa374f67
AM
11014 {
11015 htab->stub_error = TRUE;
11016 return FALSE;
11017 }
ad8e1ba5 11018
e7d1c40c 11019 bfd_put_32 (htab->params->stub_bfd, STD_R2_0R1 + STK_TOC (htab), loc);
ad8e1ba5 11020 loc += 4;
00f412ee 11021 size = 16;
176a0d42 11022 if (PPC_HA (off) != 0)
ac2df442
AM
11023 {
11024 size += 4;
e7d1c40c 11025 bfd_put_32 (htab->params->stub_bfd,
397998fc 11026 ADDIS_R12_R2 | PPC_HA (off), loc);
ac2df442 11027 loc += 4;
e7d1c40c 11028 bfd_put_32 (htab->params->stub_bfd,
397998fc 11029 LD_R12_0R12 | PPC_LO (off), loc);
ac2df442
AM
11030 }
11031 else
e7d1c40c 11032 bfd_put_32 (htab->params->stub_bfd, LD_R12_0R2 | PPC_LO (off), loc);
ac2df442
AM
11033
11034 if (PPC_HA (r2off) != 0)
11035 {
11036 size += 4;
00f412ee 11037 loc += 4;
e7d1c40c
AM
11038 bfd_put_32 (htab->params->stub_bfd,
11039 ADDIS_R2_R2 | PPC_HA (r2off), loc);
00f412ee
AM
11040 }
11041 if (PPC_LO (r2off) != 0)
11042 {
11043 size += 4;
ac2df442 11044 loc += 4;
e7d1c40c
AM
11045 bfd_put_32 (htab->params->stub_bfd,
11046 ADDI_R2_R2 | PPC_LO (r2off), loc);
ac2df442 11047 }
ad8e1ba5
AM
11048 }
11049 loc += 4;
e7d1c40c 11050 bfd_put_32 (htab->params->stub_bfd, MTCTR_R12, loc);
ad8e1ba5 11051 loc += 4;
e7d1c40c 11052 bfd_put_32 (htab->params->stub_bfd, BCTR, loc);
721956f4 11053 break;
5d1634d7 11054
721956f4 11055 case ppc_stub_plt_call:
794e51c0 11056 case ppc_stub_plt_call_r2save:
e054468f 11057 if (stub_entry->h != NULL
b31867b6
AM
11058 && stub_entry->h->is_func_descriptor
11059 && stub_entry->h->oh != NULL)
c862ae31 11060 {
b31867b6
AM
11061 struct ppc_link_hash_entry *fh = ppc_follow_link (stub_entry->h->oh);
11062
11063 /* If the old-ABI "dot-symbol" is undefined make it weak so
6f20ed8a 11064 we don't get a link error from RELOC_FOR_GLOBAL_SYMBOL. */
b31867b6
AM
11065 if (fh->elf.root.type == bfd_link_hash_undefined)
11066 fh->elf.root.type = bfd_link_hash_undefweak;
9507a174
AM
11067 /* Stop undo_symbol_twiddle changing it back to undefined. */
11068 fh->was_undefined = 0;
c862ae31
AM
11069 }
11070
721956f4 11071 /* Now build the stub. */
e054468f 11072 dest = stub_entry->plt_ent->plt.offset & ~1;
176a0d42 11073 if (dest >= (bfd_vma) -2)
721956f4
AM
11074 abort ();
11075
33e44f2e 11076 plt = htab->elf.splt;
25f23106
AM
11077 if (!htab->elf.dynamic_sections_created
11078 || stub_entry->h == NULL
11079 || stub_entry->h->elf.dynindx == -1)
33e44f2e 11080 plt = htab->elf.iplt;
e054468f
AM
11081
11082 dest += plt->output_offset + plt->output_section->vma;
11083
11084 if (stub_entry->h == NULL
11085 && (stub_entry->plt_ent->plt.offset & 1) == 0)
11086 {
11087 Elf_Internal_Rela rela;
11088 bfd_byte *rl;
11089
11090 rela.r_offset = dest;
ee67d69a
AM
11091 if (htab->opd_abi)
11092 rela.r_info = ELF64_R_INFO (0, R_PPC64_JMP_IREL);
11093 else
11094 rela.r_info = ELF64_R_INFO (0, R_PPC64_IRELATIVE);
e054468f
AM
11095 rela.r_addend = (stub_entry->target_value
11096 + stub_entry->target_section->output_offset
11097 + stub_entry->target_section->output_section->vma);
11098
33e44f2e
AM
11099 rl = (htab->elf.irelplt->contents
11100 + (htab->elf.irelplt->reloc_count++
25f23106
AM
11101 * sizeof (Elf64_External_Rela)));
11102 bfd_elf64_swap_reloca_out (info->output_bfd, &rela, rl);
e054468f
AM
11103 stub_entry->plt_ent->plt.offset |= 1;
11104 }
176a0d42
AM
11105
11106 off = (dest
e054468f 11107 - elf_gp (plt->output_section->owner)
6f20ed8a 11108 - htab->sec_info[stub_entry->group->link_sec->id].toc_off);
721956f4 11109
ad8e1ba5 11110 if (off + 0x80008000 > 0xffffffff || (off & 7) != 0)
721956f4 11111 {
25f53a85 11112 info->callbacks->einfo
bc30df16 11113 (_("%P: linkage table error against `%T'\n"),
e054468f
AM
11114 stub_entry->h != NULL
11115 ? stub_entry->h->elf.root.root.string
11116 : "<local sym>");
721956f4 11117 bfd_set_error (bfd_error_bad_value);
b34976b6
AM
11118 htab->stub_error = TRUE;
11119 return FALSE;
721956f4
AM
11120 }
11121
e7d1c40c 11122 if (htab->params->plt_stub_align != 0)
794e51c0
AM
11123 {
11124 unsigned pad = plt_stub_pad (htab, stub_entry, off);
11125
6f20ed8a
AM
11126 stub_entry->group->stub_sec->size += pad;
11127 stub_entry->stub_offset = stub_entry->group->stub_sec->size;
794e51c0
AM
11128 loc += pad;
11129 }
11130
176a0d42
AM
11131 r = NULL;
11132 if (info->emitrelocations)
11133 {
6f20ed8a 11134 r = get_relocs (stub_entry->group->stub_sec,
3ba720c7
AM
11135 ((PPC_HA (off) != 0)
11136 + (htab->opd_abi
e7d1c40c 11137 ? 2 + (htab->params->plt_static_chain
3ba720c7
AM
11138 && PPC_HA (off + 16) == PPC_HA (off))
11139 : 1)));
176a0d42
AM
11140 if (r == NULL)
11141 return FALSE;
6f20ed8a 11142 r[0].r_offset = loc - stub_entry->group->stub_sec->contents;
7cfbafbc
AM
11143 if (bfd_big_endian (info->output_bfd))
11144 r[0].r_offset += 2;
176a0d42
AM
11145 r[0].r_addend = dest;
11146 }
a7f2871e
AM
11147 if (stub_entry->h != NULL
11148 && (stub_entry->h == htab->tls_get_addr_fd
11149 || stub_entry->h == htab->tls_get_addr)
7c9cf415 11150 && htab->params->tls_get_addr_opt)
794e51c0 11151 p = build_tls_get_addr_stub (htab, stub_entry, loc, off, r);
a7f2871e 11152 else
794e51c0 11153 p = build_plt_stub (htab, stub_entry, loc, off, r);
721956f4
AM
11154 size = p - loc;
11155 break;
11156
a4b6fadd
AM
11157 case ppc_stub_save_res:
11158 return TRUE;
11159
721956f4
AM
11160 default:
11161 BFD_FAIL ();
b34976b6 11162 return FALSE;
721956f4
AM
11163 }
11164
6f20ed8a 11165 stub_entry->group->stub_sec->size += size;
97b639ba 11166
e7d1c40c 11167 if (htab->params->emit_stub_syms)
97b639ba
AM
11168 {
11169 struct elf_link_hash_entry *h;
ee75fd95
AM
11170 size_t len1, len2;
11171 char *name;
11172 const char *const stub_str[] = { "long_branch",
11173 "long_branch_r2off",
11174 "plt_branch",
11175 "plt_branch_r2off",
794e51c0 11176 "plt_call",
ee75fd95
AM
11177 "plt_call" };
11178
11179 len1 = strlen (stub_str[stub_entry->stub_type - 1]);
11180 len2 = strlen (stub_entry->root.string);
11181 name = bfd_malloc (len1 + len2 + 2);
11182 if (name == NULL)
11183 return FALSE;
11184 memcpy (name, stub_entry->root.string, 9);
11185 memcpy (name + 9, stub_str[stub_entry->stub_type - 1], len1);
11186 memcpy (name + len1 + 9, stub_entry->root.string + 8, len2 - 8 + 1);
11187 h = elf_link_hash_lookup (&htab->elf, name, TRUE, FALSE, FALSE);
97b639ba
AM
11188 if (h == NULL)
11189 return FALSE;
11190 if (h->root.type == bfd_link_hash_new)
11191 {
11192 h->root.type = bfd_link_hash_defined;
6f20ed8a 11193 h->root.u.def.section = stub_entry->group->stub_sec;
97b639ba 11194 h->root.u.def.value = stub_entry->stub_offset;
f5385ebf
AM
11195 h->ref_regular = 1;
11196 h->def_regular = 1;
11197 h->ref_regular_nonweak = 1;
11198 h->forced_local = 1;
11199 h->non_elf = 0;
2ec55de3 11200 h->root.linker_def = 1;
97b639ba
AM
11201 }
11202 }
11203
b34976b6 11204 return TRUE;
721956f4
AM
11205}
11206
11207/* As above, but don't actually build the stub. Just bump offset so
11208 we know stub section sizes, and select plt_branch stubs where
11209 long_branch stubs won't do. */
11210
b34976b6 11211static bfd_boolean
4ce794b7 11212ppc_size_one_stub (struct bfd_hash_entry *gen_entry, void *in_arg)
721956f4
AM
11213{
11214 struct ppc_stub_hash_entry *stub_entry;
63bc6f6c 11215 struct bfd_link_info *info;
721956f4
AM
11216 struct ppc_link_hash_table *htab;
11217 bfd_vma off;
11218 int size;
11219
11220 /* Massage our args to the form they really have. */
11221 stub_entry = (struct ppc_stub_hash_entry *) gen_entry;
63bc6f6c
AM
11222 info = in_arg;
11223
11224 htab = ppc_hash_table (info);
4dfe6ac6
NC
11225 if (htab == NULL)
11226 return FALSE;
721956f4 11227
a4b6fadd
AM
11228 if (stub_entry->h != NULL
11229 && stub_entry->h->save_res
11230 && stub_entry->h->elf.root.type == bfd_link_hash_defined
11231 && stub_entry->h->elf.root.u.def.section == htab->sfpr)
11232 {
11233 /* Don't make stubs to out-of-line register save/restore
11234 functions. Instead, emit copies of the functions. */
11235 stub_entry->group->needs_save_res = 1;
11236 stub_entry->stub_type = ppc_stub_save_res;
11237 return TRUE;
11238 }
11239
794e51c0
AM
11240 if (stub_entry->stub_type == ppc_stub_plt_call
11241 || stub_entry->stub_type == ppc_stub_plt_call_r2save)
721956f4 11242 {
e054468f
AM
11243 asection *plt;
11244 off = stub_entry->plt_ent->plt.offset & ~(bfd_vma) 1;
58ac9f71 11245 if (off >= (bfd_vma) -2)
411e1bfb 11246 abort ();
33e44f2e 11247 plt = htab->elf.splt;
25f23106
AM
11248 if (!htab->elf.dynamic_sections_created
11249 || stub_entry->h == NULL
11250 || stub_entry->h->elf.dynindx == -1)
33e44f2e 11251 plt = htab->elf.iplt;
e054468f
AM
11252 off += (plt->output_offset
11253 + plt->output_section->vma
11254 - elf_gp (plt->output_section->owner)
6f20ed8a 11255 - htab->sec_info[stub_entry->group->link_sec->id].toc_off);
721956f4 11256
794e51c0 11257 size = plt_stub_size (htab, stub_entry, off);
e7d1c40c 11258 if (htab->params->plt_stub_align)
794e51c0 11259 size += plt_stub_pad (htab, stub_entry, off);
176a0d42
AM
11260 if (info->emitrelocations)
11261 {
6f20ed8a 11262 stub_entry->group->stub_sec->reloc_count
b9e5796b
AM
11263 += ((PPC_HA (off) != 0)
11264 + (htab->opd_abi
e7d1c40c 11265 ? 2 + (htab->params->plt_static_chain
b9e5796b
AM
11266 && PPC_HA (off + 16) == PPC_HA (off))
11267 : 1));
6f20ed8a 11268 stub_entry->group->stub_sec->flags |= SEC_RELOC;
176a0d42 11269 }
721956f4
AM
11270 }
11271 else
11272 {
ad8e1ba5
AM
11273 /* ppc_stub_long_branch or ppc_stub_plt_branch, or their r2off
11274 variants. */
ac2df442 11275 bfd_vma r2off = 0;
6911b7dc 11276 bfd_vma local_off = 0;
ac2df442 11277
721956f4
AM
11278 off = (stub_entry->target_value
11279 + stub_entry->target_section->output_offset
11280 + stub_entry->target_section->output_section->vma);
6f20ed8a
AM
11281 off -= (stub_entry->group->stub_sec->size
11282 + stub_entry->group->stub_sec->output_offset
11283 + stub_entry->group->stub_sec->output_section->vma);
721956f4 11284
ad8e1ba5
AM
11285 /* Reset the stub type from the plt variant in case we now
11286 can reach with a shorter stub. */
11287 if (stub_entry->stub_type >= ppc_stub_plt_branch)
11288 stub_entry->stub_type += ppc_stub_long_branch - ppc_stub_plt_branch;
11289
11290 size = 4;
11291 if (stub_entry->stub_type == ppc_stub_long_branch_r2off)
11292 {
25f53a85 11293 r2off = get_r2off (info, stub_entry);
a7c49797 11294 if (r2off == (bfd_vma) -1)
aa374f67
AM
11295 {
11296 htab->stub_error = TRUE;
11297 return FALSE;
11298 }
a7c49797 11299 size = 8;
ac2df442 11300 if (PPC_HA (r2off) != 0)
a7c49797
AM
11301 size += 4;
11302 if (PPC_LO (r2off) != 0)
11303 size += 4;
ac2df442 11304 off -= size - 4;
ad8e1ba5
AM
11305 }
11306
6911b7dc
AM
11307 local_off = PPC64_LOCAL_ENTRY_OFFSET (stub_entry->other);
11308
b9e5796b
AM
11309 /* If the branch offset if too big, use a ppc_stub_plt_branch.
11310 Do the same for -R objects without function descriptors. */
11311 if (off + (1 << 25) >= (bfd_vma) (1 << 26) - local_off
11312 || (stub_entry->stub_type == ppc_stub_long_branch_r2off
a7c49797
AM
11313 && r2off == 0
11314 && htab->sec_info[stub_entry->target_section->id].toc_off == 0))
721956f4
AM
11315 {
11316 struct ppc_branch_hash_entry *br_entry;
11317
11318 br_entry = ppc_branch_hash_lookup (&htab->branch_hash_table,
11319 stub_entry->root.string + 9,
b34976b6 11320 TRUE, FALSE);
721956f4
AM
11321 if (br_entry == NULL)
11322 {
8de848d8 11323 info->callbacks->einfo (_("%P: can't build branch stub `%s'\n"),
25f53a85 11324 stub_entry->root.string);
b34976b6
AM
11325 htab->stub_error = TRUE;
11326 return FALSE;
721956f4
AM
11327 }
11328
11329 if (br_entry->iter != htab->stub_iteration)
11330 {
11331 br_entry->iter = htab->stub_iteration;
eea6121a
AM
11332 br_entry->offset = htab->brlt->size;
11333 htab->brlt->size += 8;
63bc6f6c 11334
ee75fd95 11335 if (htab->relbrlt != NULL)
eea6121a 11336 htab->relbrlt->size += sizeof (Elf64_External_Rela);
84f5d08e
AM
11337 else if (info->emitrelocations)
11338 {
11339 htab->brlt->reloc_count += 1;
11340 htab->brlt->flags |= SEC_RELOC;
11341 }
721956f4 11342 }
ad8e1ba5
AM
11343
11344 stub_entry->stub_type += ppc_stub_plt_branch - ppc_stub_long_branch;
ac2df442
AM
11345 off = (br_entry->offset
11346 + htab->brlt->output_offset
11347 + htab->brlt->output_section->vma
11348 - elf_gp (htab->brlt->output_section->owner)
6f20ed8a 11349 - htab->sec_info[stub_entry->group->link_sec->id].toc_off);
ac2df442 11350
176a0d42
AM
11351 if (info->emitrelocations)
11352 {
6f20ed8a
AM
11353 stub_entry->group->stub_sec->reloc_count
11354 += 1 + (PPC_HA (off) != 0);
11355 stub_entry->group->stub_sec->flags |= SEC_RELOC;
176a0d42
AM
11356 }
11357
00f412ee 11358 if (stub_entry->stub_type != ppc_stub_plt_branch_r2off)
ac2df442
AM
11359 {
11360 size = 12;
176a0d42 11361 if (PPC_HA (off) != 0)
ac2df442
AM
11362 size = 16;
11363 }
11364 else
11365 {
00f412ee 11366 size = 16;
176a0d42 11367 if (PPC_HA (off) != 0)
ac2df442
AM
11368 size += 4;
11369
11370 if (PPC_HA (r2off) != 0)
11371 size += 4;
00f412ee
AM
11372 if (PPC_LO (r2off) != 0)
11373 size += 4;
ac2df442 11374 }
721956f4 11375 }
84f5d08e
AM
11376 else if (info->emitrelocations)
11377 {
6f20ed8a
AM
11378 stub_entry->group->stub_sec->reloc_count += 1;
11379 stub_entry->group->stub_sec->flags |= SEC_RELOC;
84f5d08e 11380 }
721956f4
AM
11381 }
11382
6f20ed8a 11383 stub_entry->group->stub_sec->size += size;
b34976b6 11384 return TRUE;
721956f4
AM
11385}
11386
11387/* Set up various things so that we can make a list of input sections
11388 for each output section included in the link. Returns -1 on error,
cedb70c5 11389 0 when no stubs will be needed, and 1 on success. */
721956f4
AM
11390
11391int
e7d1c40c 11392ppc64_elf_setup_section_lists (struct bfd_link_info *info)
721956f4 11393{
6f20ed8a 11394 unsigned int id;
721956f4
AM
11395 bfd_size_type amt;
11396 struct ppc_link_hash_table *htab = ppc_hash_table (info);
11397
4dfe6ac6
NC
11398 if (htab == NULL)
11399 return -1;
4c52953f 11400
6f20ed8a
AM
11401 htab->sec_info_arr_size = bfd_get_next_section_id ();
11402 amt = sizeof (*htab->sec_info) * (htab->sec_info_arr_size);
11403 htab->sec_info = bfd_zmalloc (amt);
11404 if (htab->sec_info == NULL)
721956f4
AM
11405 return -1;
11406
3d6f9012
AM
11407 /* Set toc_off for com, und, abs and ind sections. */
11408 for (id = 0; id < 3; id++)
6f20ed8a 11409 htab->sec_info[id].toc_off = TOC_BASE_OFF;
734b6cf9 11410
721956f4
AM
11411 return 1;
11412}
11413
927be08e
AM
11414/* Set up for first pass at multitoc partitioning. */
11415
11416void
11417ppc64_elf_start_multitoc_partition (struct bfd_link_info *info)
11418{
11419 struct ppc_link_hash_table *htab = ppc_hash_table (info);
11420
1c865ab2 11421 htab->toc_curr = ppc64_elf_set_toc (info, info->output_bfd);
927be08e
AM
11422 htab->toc_bfd = NULL;
11423 htab->toc_first_sec = NULL;
11424}
11425
e717da7e
AM
11426/* The linker repeatedly calls this function for each TOC input section
11427 and linker generated GOT section. Group input bfds such that the toc
927be08e 11428 within a group is less than 64k in size. */
ad8e1ba5 11429
927be08e 11430bfd_boolean
4ce794b7 11431ppc64_elf_next_toc_section (struct bfd_link_info *info, asection *isec)
ad8e1ba5
AM
11432{
11433 struct ppc_link_hash_table *htab = ppc_hash_table (info);
d77c8a4b 11434 bfd_vma addr, off, limit;
ad8e1ba5 11435
4dfe6ac6
NC
11436 if (htab == NULL)
11437 return FALSE;
11438
927be08e 11439 if (!htab->second_toc_pass)
4c52953f 11440 {
927be08e 11441 /* Keep track of the first .toc or .got section for this input bfd. */
a4fd3de5
AM
11442 bfd_boolean new_bfd = htab->toc_bfd != isec->owner;
11443
11444 if (new_bfd)
bf102f86
AM
11445 {
11446 htab->toc_bfd = isec->owner;
11447 htab->toc_first_sec = isec;
11448 }
927be08e 11449
bf102f86
AM
11450 addr = isec->output_offset + isec->output_section->vma;
11451 off = addr - htab->toc_curr;
d77c8a4b
AM
11452 limit = 0x80008000;
11453 if (ppc64_elf_tdata (isec->owner)->has_small_toc_reloc)
11454 limit = 0x10000;
11455 if (off + isec->size > limit)
bf102f86
AM
11456 {
11457 addr = (htab->toc_first_sec->output_offset
11458 + htab->toc_first_sec->output_section->vma);
11459 htab->toc_curr = addr;
a27e685f 11460 htab->toc_curr &= -TOC_BASE_ALIGN;
bf102f86 11461 }
99877b66 11462
927be08e
AM
11463 /* toc_curr is the base address of this toc group. Set elf_gp
11464 for the input section to be the offset relative to the
11465 output toc base plus 0x8000. Making the input elf_gp an
11466 offset allows us to move the toc as a whole without
11467 recalculating input elf_gp. */
11468 off = htab->toc_curr - elf_gp (isec->output_section->owner);
11469 off += TOC_BASE_OFF;
11470
11471 /* Die if someone uses a linker script that doesn't keep input
11472 file .toc and .got together. */
a4fd3de5
AM
11473 if (new_bfd
11474 && elf_gp (isec->owner) != 0
927be08e
AM
11475 && elf_gp (isec->owner) != off)
11476 return FALSE;
11477
11478 elf_gp (isec->owner) = off;
11479 return TRUE;
4c52953f 11480 }
927be08e
AM
11481
11482 /* During the second pass toc_first_sec points to the start of
11483 a toc group, and toc_curr is used to track the old elf_gp.
11484 We use toc_bfd to ensure we only look at each bfd once. */
11485 if (htab->toc_bfd == isec->owner)
11486 return TRUE;
11487 htab->toc_bfd = isec->owner;
11488
11489 if (htab->toc_first_sec == NULL
11490 || htab->toc_curr != elf_gp (isec->owner))
11491 {
11492 htab->toc_curr = elf_gp (isec->owner);
11493 htab->toc_first_sec = isec;
11494 }
11495 addr = (htab->toc_first_sec->output_offset
11496 + htab->toc_first_sec->output_section->vma);
11497 off = addr - elf_gp (isec->output_section->owner) + TOC_BASE_OFF;
11498 elf_gp (isec->owner) = off;
11499
11500 return TRUE;
ad8e1ba5
AM
11501}
11502
927be08e
AM
11503/* Called via elf_link_hash_traverse to merge GOT entries for global
11504 symbol H. */
11505
11506static bfd_boolean
11507merge_global_got (struct elf_link_hash_entry *h, void *inf ATTRIBUTE_UNUSED)
11508{
11509 if (h->root.type == bfd_link_hash_indirect)
11510 return TRUE;
11511
927be08e
AM
11512 merge_got_entries (&h->got.glist);
11513
11514 return TRUE;
11515}
11516
11517/* Called via elf_link_hash_traverse to allocate GOT entries for global
11518 symbol H. */
11519
11520static bfd_boolean
11521reallocate_got (struct elf_link_hash_entry *h, void *inf)
11522{
11523 struct got_entry *gent;
11524
11525 if (h->root.type == bfd_link_hash_indirect)
11526 return TRUE;
11527
927be08e
AM
11528 for (gent = h->got.glist; gent != NULL; gent = gent->next)
11529 if (!gent->is_indirect)
11530 allocate_got (h, (struct bfd_link_info *) inf, gent);
11531 return TRUE;
11532}
11533
11534/* Called on the first multitoc pass after the last call to
11535 ppc64_elf_next_toc_section. This function removes duplicate GOT
11536 entries. */
11537
11538bfd_boolean
11539ppc64_elf_layout_multitoc (struct bfd_link_info *info)
ad8e1ba5
AM
11540{
11541 struct ppc_link_hash_table *htab = ppc_hash_table (info);
927be08e
AM
11542 struct bfd *ibfd, *ibfd2;
11543 bfd_boolean done_something;
11544
11545 htab->multi_toc_needed = htab->toc_curr != elf_gp (info->output_bfd);
ad8e1ba5 11546
7865406b
AM
11547 if (!htab->do_multi_toc)
11548 return FALSE;
11549
d0fae19d 11550 /* Merge global sym got entries within a toc group. */
927be08e
AM
11551 elf_link_hash_traverse (&htab->elf, merge_global_got, info);
11552
11553 /* And tlsld_got. */
c72f2fb2 11554 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
927be08e
AM
11555 {
11556 struct got_entry *ent, *ent2;
11557
11558 if (!is_ppc64_elf (ibfd))
11559 continue;
11560
11561 ent = ppc64_tlsld_got (ibfd);
11562 if (!ent->is_indirect
11563 && ent->got.offset != (bfd_vma) -1)
11564 {
c72f2fb2 11565 for (ibfd2 = ibfd->link.next; ibfd2 != NULL; ibfd2 = ibfd2->link.next)
927be08e
AM
11566 {
11567 if (!is_ppc64_elf (ibfd2))
11568 continue;
11569
11570 ent2 = ppc64_tlsld_got (ibfd2);
11571 if (!ent2->is_indirect
11572 && ent2->got.offset != (bfd_vma) -1
11573 && elf_gp (ibfd2) == elf_gp (ibfd))
11574 {
11575 ent2->is_indirect = TRUE;
11576 ent2->got.ent = ent;
11577 }
11578 }
11579 }
11580 }
11581
11582 /* Zap sizes of got sections. */
33e44f2e
AM
11583 htab->elf.irelplt->rawsize = htab->elf.irelplt->size;
11584 htab->elf.irelplt->size -= htab->got_reli_size;
927be08e
AM
11585 htab->got_reli_size = 0;
11586
c72f2fb2 11587 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
927be08e
AM
11588 {
11589 asection *got, *relgot;
11590
11591 if (!is_ppc64_elf (ibfd))
11592 continue;
11593
11594 got = ppc64_elf_tdata (ibfd)->got;
11595 if (got != NULL)
11596 {
11597 got->rawsize = got->size;
11598 got->size = 0;
11599 relgot = ppc64_elf_tdata (ibfd)->relgot;
11600 relgot->rawsize = relgot->size;
11601 relgot->size = 0;
11602 }
11603 }
11604
11605 /* Now reallocate the got, local syms first. We don't need to
11606 allocate section contents again since we never increase size. */
c72f2fb2 11607 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
927be08e
AM
11608 {
11609 struct got_entry **lgot_ents;
11610 struct got_entry **end_lgot_ents;
11611 struct plt_entry **local_plt;
11612 struct plt_entry **end_local_plt;
f961d9dd 11613 unsigned char *lgot_masks;
927be08e
AM
11614 bfd_size_type locsymcount;
11615 Elf_Internal_Shdr *symtab_hdr;
19e08130 11616 asection *s;
927be08e
AM
11617
11618 if (!is_ppc64_elf (ibfd))
11619 continue;
11620
11621 lgot_ents = elf_local_got_ents (ibfd);
11622 if (!lgot_ents)
11623 continue;
11624
11625 symtab_hdr = &elf_symtab_hdr (ibfd);
11626 locsymcount = symtab_hdr->sh_info;
11627 end_lgot_ents = lgot_ents + locsymcount;
11628 local_plt = (struct plt_entry **) end_lgot_ents;
11629 end_local_plt = local_plt + locsymcount;
f961d9dd 11630 lgot_masks = (unsigned char *) end_local_plt;
927be08e 11631 s = ppc64_elf_tdata (ibfd)->got;
927be08e
AM
11632 for (; lgot_ents < end_lgot_ents; ++lgot_ents, ++lgot_masks)
11633 {
11634 struct got_entry *ent;
11635
11636 for (ent = *lgot_ents; ent != NULL; ent = ent->next)
d0fae19d 11637 {
19e08130
AM
11638 unsigned int ent_size = 8;
11639 unsigned int rel_size = sizeof (Elf64_External_Rela);
11640
d0fae19d
AM
11641 ent->got.offset = s->size;
11642 if ((ent->tls_type & *lgot_masks & TLS_GD) != 0)
d0fae19d 11643 {
19e08130
AM
11644 ent_size *= 2;
11645 rel_size *= 2;
11646 }
11647 s->size += ent_size;
11648 if ((*lgot_masks & PLT_IFUNC) != 0)
11649 {
33e44f2e 11650 htab->elf.irelplt->size += rel_size;
19e08130
AM
11651 htab->got_reli_size += rel_size;
11652 }
0e1862bb 11653 else if (bfd_link_pic (info))
19e08130
AM
11654 {
11655 asection *srel = ppc64_elf_tdata (ibfd)->relgot;
11656 srel->size += rel_size;
d0fae19d
AM
11657 }
11658 }
927be08e
AM
11659 }
11660 }
11661
11662 elf_link_hash_traverse (&htab->elf, reallocate_got, info);
11663
c72f2fb2 11664 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
927be08e
AM
11665 {
11666 struct got_entry *ent;
11667
11668 if (!is_ppc64_elf (ibfd))
11669 continue;
11670
11671 ent = ppc64_tlsld_got (ibfd);
11672 if (!ent->is_indirect
11673 && ent->got.offset != (bfd_vma) -1)
11674 {
11675 asection *s = ppc64_elf_tdata (ibfd)->got;
11676 ent->got.offset = s->size;
11677 s->size += 16;
0e1862bb 11678 if (bfd_link_pic (info))
927be08e
AM
11679 {
11680 asection *srel = ppc64_elf_tdata (ibfd)->relgot;
11681 srel->size += sizeof (Elf64_External_Rela);
11682 }
11683 }
11684 }
11685
33e44f2e 11686 done_something = htab->elf.irelplt->rawsize != htab->elf.irelplt->size;
927be08e 11687 if (!done_something)
c72f2fb2 11688 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
927be08e
AM
11689 {
11690 asection *got;
11691
11692 if (!is_ppc64_elf (ibfd))
11693 continue;
11694
11695 got = ppc64_elf_tdata (ibfd)->got;
11696 if (got != NULL)
11697 {
11698 done_something = got->rawsize != got->size;
11699 if (done_something)
11700 break;
11701 }
11702 }
11703
11704 if (done_something)
e7d1c40c 11705 (*htab->params->layout_sections_again) ();
927be08e
AM
11706
11707 /* Set up for second pass over toc sections to recalculate elf_gp
11708 on input sections. */
11709 htab->toc_bfd = NULL;
11710 htab->toc_first_sec = NULL;
11711 htab->second_toc_pass = TRUE;
11712 return done_something;
11713}
11714
11715/* Called after second pass of multitoc partitioning. */
11716
11717void
11718ppc64_elf_finish_multitoc_partition (struct bfd_link_info *info)
11719{
11720 struct ppc_link_hash_table *htab = ppc_hash_table (info);
11721
11722 /* After the second pass, toc_curr tracks the TOC offset used
11723 for code sections below in ppc64_elf_next_input_section. */
3d6f9012 11724 htab->toc_curr = TOC_BASE_OFF;
ad8e1ba5
AM
11725}
11726
9b5ecbd0
AM
11727/* No toc references were found in ISEC. If the code in ISEC makes no
11728 calls, then there's no need to use toc adjusting stubs when branching
11729 into ISEC. Actually, indirect calls from ISEC are OK as they will
4c52953f
AM
11730 load r2. Returns -1 on error, 0 for no stub needed, 1 for stub
11731 needed, and 2 if a cyclical call-graph was found but no other reason
11732 for a stub was detected. If called from the top level, a return of
11733 2 means the same as a return of 0. */
9b5ecbd0
AM
11734
11735static int
4ce794b7 11736toc_adjusting_stub_needed (struct bfd_link_info *info, asection *isec)
9b5ecbd0 11737{
9b5ecbd0 11738 int ret;
70cc837d
AM
11739
11740 /* Mark this section as checked. */
11741 isec->call_check_done = 1;
9b5ecbd0 11742
772119ce
AM
11743 /* We know none of our code bearing sections will need toc stubs. */
11744 if ((isec->flags & SEC_LINKER_CREATED) != 0)
11745 return 0;
11746
eea6121a 11747 if (isec->size == 0)
082c50f8
AM
11748 return 0;
11749
4c52953f
AM
11750 if (isec->output_section == NULL)
11751 return 0;
11752
4c52953f 11753 ret = 0;
70cc837d 11754 if (isec->reloc_count != 0)
9b5ecbd0 11755 {
70cc837d
AM
11756 Elf_Internal_Rela *relstart, *rel;
11757 Elf_Internal_Sym *local_syms;
11758 struct ppc_link_hash_table *htab;
2917689a 11759
70cc837d
AM
11760 relstart = _bfd_elf_link_read_relocs (isec->owner, isec, NULL, NULL,
11761 info->keep_memory);
11762 if (relstart == NULL)
11763 return -1;
90aecf7a 11764
70cc837d
AM
11765 /* Look for branches to outside of this section. */
11766 local_syms = NULL;
11767 htab = ppc_hash_table (info);
11768 if (htab == NULL)
11769 return -1;
4c52953f 11770
70cc837d 11771 for (rel = relstart; rel < relstart + isec->reloc_count; ++rel)
4c52953f 11772 {
70cc837d
AM
11773 enum elf_ppc64_reloc_type r_type;
11774 unsigned long r_symndx;
11775 struct elf_link_hash_entry *h;
11776 struct ppc_link_hash_entry *eh;
11777 Elf_Internal_Sym *sym;
11778 asection *sym_sec;
11779 struct _opd_sec_data *opd;
11780 bfd_vma sym_value;
11781 bfd_vma dest;
11782
11783 r_type = ELF64_R_TYPE (rel->r_info);
11784 if (r_type != R_PPC64_REL24
11785 && r_type != R_PPC64_REL14
11786 && r_type != R_PPC64_REL14_BRTAKEN
11787 && r_type != R_PPC64_REL14_BRNTAKEN)
11788 continue;
4c52953f 11789
70cc837d
AM
11790 r_symndx = ELF64_R_SYM (rel->r_info);
11791 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms, r_symndx,
11792 isec->owner))
4c52953f 11793 {
70cc837d
AM
11794 ret = -1;
11795 break;
11796 }
4c52953f 11797
70cc837d
AM
11798 /* Calls to dynamic lib functions go through a plt call stub
11799 that uses r2. */
11800 eh = (struct ppc_link_hash_entry *) h;
11801 if (eh != NULL
11802 && (eh->elf.plt.plist != NULL
11803 || (eh->oh != NULL
11804 && ppc_follow_link (eh->oh)->elf.plt.plist != NULL)))
11805 {
11806 ret = 1;
11807 break;
4c52953f
AM
11808 }
11809
70cc837d
AM
11810 if (sym_sec == NULL)
11811 /* Ignore other undefined symbols. */
4c52953f 11812 continue;
4c52953f 11813
70cc837d
AM
11814 /* Assume branches to other sections not included in the
11815 link need stubs too, to cover -R and absolute syms. */
11816 if (sym_sec->output_section == NULL)
11817 {
11818 ret = 1;
11819 break;
11820 }
4c52953f 11821
70cc837d
AM
11822 if (h == NULL)
11823 sym_value = sym->st_value;
11824 else
11825 {
11826 if (h->root.type != bfd_link_hash_defined
11827 && h->root.type != bfd_link_hash_defweak)
11828 abort ();
11829 sym_value = h->root.u.def.value;
11830 }
11831 sym_value += rel->r_addend;
4c52953f 11832
70cc837d
AM
11833 /* If this branch reloc uses an opd sym, find the code section. */
11834 opd = get_opd_info (sym_sec);
11835 if (opd != NULL)
11836 {
11837 if (h == NULL && opd->adjust != NULL)
11838 {
11839 long adjust;
4c52953f 11840
92a9c616 11841 adjust = opd->adjust[OPD_NDX (sym_value)];
70cc837d
AM
11842 if (adjust == -1)
11843 /* Assume deleted functions won't ever be called. */
11844 continue;
11845 sym_value += adjust;
11846 }
4c52953f 11847
aef36ac1
AM
11848 dest = opd_entry_value (sym_sec, sym_value,
11849 &sym_sec, NULL, FALSE);
70cc837d
AM
11850 if (dest == (bfd_vma) -1)
11851 continue;
11852 }
11853 else
11854 dest = (sym_value
11855 + sym_sec->output_offset
11856 + sym_sec->output_section->vma);
4c52953f 11857
70cc837d
AM
11858 /* Ignore branch to self. */
11859 if (sym_sec == isec)
11860 continue;
4c52953f 11861
70cc837d
AM
11862 /* If the called function uses the toc, we need a stub. */
11863 if (sym_sec->has_toc_reloc
11864 || sym_sec->makes_toc_func_call)
4c52953f 11865 {
70cc837d 11866 ret = 1;
4c52953f
AM
11867 break;
11868 }
70cc837d
AM
11869
11870 /* Assume any branch that needs a long branch stub might in fact
11871 need a plt_branch stub. A plt_branch stub uses r2. */
11872 else if (dest - (isec->output_offset
11873 + isec->output_section->vma
6911b7dc
AM
11874 + rel->r_offset) + (1 << 25)
11875 >= (2u << 25) - PPC64_LOCAL_ENTRY_OFFSET (h
11876 ? h->other
11877 : sym->st_other))
4c52953f 11878 {
70cc837d
AM
11879 ret = 1;
11880 break;
11881 }
11882
11883 /* If calling back to a section in the process of being
11884 tested, we can't say for sure that no toc adjusting stubs
11885 are needed, so don't return zero. */
11886 else if (sym_sec->call_check_in_progress)
11887 ret = 2;
11888
11889 /* Branches to another section that itself doesn't have any TOC
11890 references are OK. Recursively call ourselves to check. */
11891 else if (!sym_sec->call_check_done)
11892 {
11893 int recur;
11894
11895 /* Mark current section as indeterminate, so that other
11896 sections that call back to current won't be marked as
11897 known. */
11898 isec->call_check_in_progress = 1;
11899 recur = toc_adjusting_stub_needed (info, sym_sec);
11900 isec->call_check_in_progress = 0;
11901
4c52953f
AM
11902 if (recur != 0)
11903 {
70cc837d
AM
11904 ret = recur;
11905 if (recur != 2)
11906 break;
4c52953f
AM
11907 }
11908 }
4c52953f 11909 }
70cc837d
AM
11910
11911 if (local_syms != NULL
11912 && (elf_symtab_hdr (isec->owner).contents
11913 != (unsigned char *) local_syms))
11914 free (local_syms);
11915 if (elf_section_data (isec)->relocs != relstart)
11916 free (relstart);
9b5ecbd0
AM
11917 }
11918
70cc837d
AM
11919 if ((ret & 1) == 0
11920 && isec->map_head.s != NULL
11921 && (strcmp (isec->output_section->name, ".init") == 0
11922 || strcmp (isec->output_section->name, ".fini") == 0))
11923 {
11924 if (isec->map_head.s->has_toc_reloc
11925 || isec->map_head.s->makes_toc_func_call)
11926 ret = 1;
11927 else if (!isec->map_head.s->call_check_done)
11928 {
11929 int recur;
11930 isec->call_check_in_progress = 1;
11931 recur = toc_adjusting_stub_needed (info, isec->map_head.s);
11932 isec->call_check_in_progress = 0;
11933 if (recur != 0)
11934 ret = recur;
11935 }
11936 }
11937
11938 if (ret == 1)
11939 isec->makes_toc_func_call = 1;
4c52953f 11940
9b5ecbd0
AM
11941 return ret;
11942}
11943
721956f4
AM
11944/* The linker repeatedly calls this function for each input section,
11945 in the order that input sections are linked into output sections.
11946 Build lists of input sections to determine groupings between which
11947 we may insert linker stubs. */
11948
9b5ecbd0 11949bfd_boolean
4ce794b7 11950ppc64_elf_next_input_section (struct bfd_link_info *info, asection *isec)
721956f4
AM
11951{
11952 struct ppc_link_hash_table *htab = ppc_hash_table (info);
11953
4dfe6ac6
NC
11954 if (htab == NULL)
11955 return FALSE;
11956
734b6cf9 11957 if ((isec->output_section->flags & SEC_CODE) != 0
6f20ed8a 11958 && isec->output_section->id < htab->sec_info_arr_size)
721956f4 11959 {
3d6f9012
AM
11960 /* This happens to make the list in reverse order,
11961 which is what we want. */
6f20ed8a
AM
11962 htab->sec_info[isec->id].u.list
11963 = htab->sec_info[isec->output_section->id].u.list;
11964 htab->sec_info[isec->output_section->id].u.list = isec;
721956f4 11965 }
ad8e1ba5 11966
4c52953f 11967 if (htab->multi_toc_needed)
9b5ecbd0 11968 {
8b974ba3
AM
11969 /* Analyse sections that aren't already flagged as needing a
11970 valid toc pointer. Exclude .fixup for the linux kernel.
11971 .fixup contains branches, but only back to the function that
11972 hit an exception. */
11973 if (!(isec->has_toc_reloc
11974 || (isec->flags & SEC_CODE) == 0
11975 || strcmp (isec->name, ".fixup") == 0
11976 || isec->call_check_done))
11977 {
11978 if (toc_adjusting_stub_needed (info, isec) < 0)
6683a28d 11979 return FALSE;
8b974ba3
AM
11980 }
11981 /* Make all sections use the TOC assigned for this object file.
11982 This will be wrong for pasted sections; We fix that in
11983 check_pasted_section(). */
11984 if (elf_gp (isec->owner) != 0)
11985 htab->toc_curr = elf_gp (isec->owner);
11986 }
11987
6f20ed8a 11988 htab->sec_info[isec->id].toc_off = htab->toc_curr;
9b5ecbd0 11989 return TRUE;
721956f4
AM
11990}
11991
70cc837d
AM
11992/* Check that all .init and .fini sections use the same toc, if they
11993 have toc relocs. */
11994
11995static bfd_boolean
11996check_pasted_section (struct bfd_link_info *info, const char *name)
11997{
11998 asection *o = bfd_get_section_by_name (info->output_bfd, name);
11999
12000 if (o != NULL)
12001 {
12002 struct ppc_link_hash_table *htab = ppc_hash_table (info);
12003 bfd_vma toc_off = 0;
12004 asection *i;
12005
12006 for (i = o->map_head.s; i != NULL; i = i->map_head.s)
12007 if (i->has_toc_reloc)
12008 {
12009 if (toc_off == 0)
6f20ed8a
AM
12010 toc_off = htab->sec_info[i->id].toc_off;
12011 else if (toc_off != htab->sec_info[i->id].toc_off)
70cc837d
AM
12012 return FALSE;
12013 }
6683a28d
AM
12014
12015 if (toc_off == 0)
12016 for (i = o->map_head.s; i != NULL; i = i->map_head.s)
12017 if (i->makes_toc_func_call)
12018 {
6f20ed8a 12019 toc_off = htab->sec_info[i->id].toc_off;
6683a28d
AM
12020 break;
12021 }
12022
70cc837d
AM
12023 /* Make sure the whole pasted function uses the same toc offset. */
12024 if (toc_off != 0)
12025 for (i = o->map_head.s; i != NULL; i = i->map_head.s)
6f20ed8a 12026 htab->sec_info[i->id].toc_off = toc_off;
70cc837d
AM
12027 }
12028 return TRUE;
12029}
12030
12031bfd_boolean
12032ppc64_elf_check_init_fini (struct bfd_link_info *info)
12033{
12034 return (check_pasted_section (info, ".init")
12035 & check_pasted_section (info, ".fini"));
12036}
12037
721956f4
AM
12038/* See whether we can group stub sections together. Grouping stub
12039 sections may result in fewer stubs. More importantly, we need to
12040 put all .init* and .fini* stubs at the beginning of the .init or
12041 .fini output sections respectively, because glibc splits the
12042 _init and _fini functions into multiple parts. Putting a stub in
12043 the middle of a function is not a good idea. */
12044
6f20ed8a
AM
12045static bfd_boolean
12046group_sections (struct bfd_link_info *info,
4ce794b7
AM
12047 bfd_size_type stub_group_size,
12048 bfd_boolean stubs_always_before_branch)
721956f4 12049{
6f20ed8a
AM
12050 struct ppc_link_hash_table *htab;
12051 asection *osec;
7c8fe5c4
AM
12052 bfd_size_type stub14_group_size;
12053 bfd_boolean suppress_size_errors;
12054
6f20ed8a
AM
12055 htab = ppc_hash_table (info);
12056 if (htab == NULL)
12057 return FALSE;
12058
7c8fe5c4 12059 suppress_size_errors = FALSE;
0cfb0717 12060 stub14_group_size = stub_group_size >> 10;
7c8fe5c4
AM
12061 if (stub_group_size == 1)
12062 {
12063 /* Default values. */
12064 if (stubs_always_before_branch)
12065 {
12066 stub_group_size = 0x1e00000;
12067 stub14_group_size = 0x7800;
12068 }
12069 else
12070 {
12071 stub_group_size = 0x1c00000;
12072 stub14_group_size = 0x7000;
12073 }
12074 suppress_size_errors = TRUE;
12075 }
12076
6f20ed8a 12077 for (osec = info->output_bfd->sections; osec != NULL; osec = osec->next)
721956f4 12078 {
6f20ed8a
AM
12079 asection *tail;
12080
12081 if (osec->id >= htab->sec_info_arr_size)
12082 continue;
12083
12084 tail = htab->sec_info[osec->id].u.list;
734b6cf9 12085 while (tail != NULL)
721956f4 12086 {
734b6cf9
AM
12087 asection *curr;
12088 asection *prev;
12089 bfd_size_type total;
12090 bfd_boolean big_sec;
12091 bfd_vma curr_toc;
6f20ed8a 12092 struct map_stub *group;
734b6cf9
AM
12093
12094 curr = tail;
eea6121a 12095 total = tail->size;
6bee8834
AM
12096 big_sec = total > (ppc64_elf_section_data (tail) != NULL
12097 && ppc64_elf_section_data (tail)->has_14bit_branch
7c8fe5c4
AM
12098 ? stub14_group_size : stub_group_size);
12099 if (big_sec && !suppress_size_errors)
5c3dead3
AM
12100 (*_bfd_error_handler) (_("%B section %A exceeds stub group size"),
12101 tail->owner, tail);
6f20ed8a 12102 curr_toc = htab->sec_info[tail->id].toc_off;
734b6cf9 12103
6f20ed8a 12104 while ((prev = htab->sec_info[curr->id].u.list) != NULL
734b6cf9 12105 && ((total += curr->output_offset - prev->output_offset)
6bee8834
AM
12106 < (ppc64_elf_section_data (prev) != NULL
12107 && ppc64_elf_section_data (prev)->has_14bit_branch
7c8fe5c4 12108 ? stub14_group_size : stub_group_size))
6f20ed8a 12109 && htab->sec_info[prev->id].toc_off == curr_toc)
734b6cf9
AM
12110 curr = prev;
12111
12112 /* OK, the size from the start of CURR to the end is less
12113 than stub_group_size and thus can be handled by one stub
12114 section. (or the tail section is itself larger than
12115 stub_group_size, in which case we may be toast.) We
12116 should really be keeping track of the total size of stubs
12117 added here, as stubs contribute to the final output
12118 section size. That's a little tricky, and this way will
12119 only break if stubs added make the total size more than
12120 2^25, ie. for the default stub_group_size, if stubs total
12121 more than 2097152 bytes, or nearly 75000 plt call stubs. */
6f20ed8a
AM
12122 group = bfd_alloc (curr->owner, sizeof (*group));
12123 if (group == NULL)
12124 return FALSE;
12125 group->link_sec = curr;
12126 group->stub_sec = NULL;
a4b6fadd
AM
12127 group->needs_save_res = 0;
12128 group->next = htab->group;
12129 htab->group = group;
734b6cf9 12130 do
721956f4 12131 {
6f20ed8a 12132 prev = htab->sec_info[tail->id].u.list;
734b6cf9 12133 /* Set up this stub group. */
6f20ed8a 12134 htab->sec_info[tail->id].u.group = group;
721956f4 12135 }
734b6cf9
AM
12136 while (tail != curr && (tail = prev) != NULL);
12137
12138 /* But wait, there's more! Input sections up to stub_group_size
12139 bytes before the stub section can be handled by it too.
12140 Don't do this if we have a really large section after the
12141 stubs, as adding more stubs increases the chance that
12142 branches may not reach into the stub section. */
12143 if (!stubs_always_before_branch && !big_sec)
12144 {
12145 total = 0;
12146 while (prev != NULL
12147 && ((total += tail->output_offset - prev->output_offset)
6bee8834
AM
12148 < (ppc64_elf_section_data (prev) != NULL
12149 && ppc64_elf_section_data (prev)->has_14bit_branch
7c8fe5c4 12150 ? stub14_group_size : stub_group_size))
6f20ed8a 12151 && htab->sec_info[prev->id].toc_off == curr_toc)
734b6cf9
AM
12152 {
12153 tail = prev;
6f20ed8a
AM
12154 prev = htab->sec_info[tail->id].u.list;
12155 htab->sec_info[tail->id].u.group = group;
734b6cf9
AM
12156 }
12157 }
12158 tail = prev;
721956f4
AM
12159 }
12160 }
6f20ed8a 12161 return TRUE;
721956f4
AM
12162}
12163
58d180e8
AM
12164static const unsigned char glink_eh_frame_cie[] =
12165{
12166 0, 0, 0, 16, /* length. */
12167 0, 0, 0, 0, /* id. */
12168 1, /* CIE version. */
12169 'z', 'R', 0, /* Augmentation string. */
12170 4, /* Code alignment. */
12171 0x78, /* Data alignment. */
12172 65, /* RA reg. */
12173 1, /* Augmentation size. */
12174 DW_EH_PE_pcrel | DW_EH_PE_sdata4, /* FDE encoding. */
da44f4e5
AM
12175 DW_CFA_def_cfa, 1, 0, /* def_cfa: r1 offset 0. */
12176 0, 0, 0, 0
58d180e8
AM
12177};
12178
d969d15f
AM
12179/* Stripping output sections is normally done before dynamic section
12180 symbols have been allocated. This function is called later, and
12181 handles cases like htab->brlt which is mapped to its own output
12182 section. */
12183
12184static void
12185maybe_strip_output (struct bfd_link_info *info, asection *isec)
12186{
12187 if (isec->size == 0
12188 && isec->output_section->size == 0
53d8967a 12189 && !(isec->output_section->flags & SEC_KEEP)
d969d15f
AM
12190 && !bfd_section_removed_from_list (info->output_bfd,
12191 isec->output_section)
12192 && elf_section_data (isec->output_section)->dynindx == 0)
12193 {
12194 isec->output_section->flags |= SEC_EXCLUDE;
12195 bfd_section_list_remove (info->output_bfd, isec->output_section);
12196 info->output_bfd->section_count--;
12197 }
12198}
12199
721956f4
AM
12200/* Determine and set the size of the stub section for a final link.
12201
12202 The basic idea here is to examine all the relocations looking for
12203 PC-relative calls to a target that is unreachable with a "bl"
12204 instruction. */
12205
b34976b6 12206bfd_boolean
e7d1c40c 12207ppc64_elf_size_stubs (struct bfd_link_info *info)
721956f4
AM
12208{
12209 bfd_size_type stub_group_size;
b34976b6 12210 bfd_boolean stubs_always_before_branch;
721956f4
AM
12211 struct ppc_link_hash_table *htab = ppc_hash_table (info);
12212
4dfe6ac6
NC
12213 if (htab == NULL)
12214 return FALSE;
12215
0e1862bb 12216 if (htab->params->plt_thread_safe == -1 && !bfd_link_executable (info))
e7d1c40c 12217 htab->params->plt_thread_safe = 1;
b9e5796b 12218 if (!htab->opd_abi)
e7d1c40c
AM
12219 htab->params->plt_thread_safe = 0;
12220 else if (htab->params->plt_thread_safe == -1)
794e51c0 12221 {
e2458743 12222 static const char *const thread_starter[] =
794e51c0
AM
12223 {
12224 "pthread_create",
12225 /* libstdc++ */
12226 "_ZNSt6thread15_M_start_threadESt10shared_ptrINS_10_Impl_baseEE",
12227 /* librt */
12228 "aio_init", "aio_read", "aio_write", "aio_fsync", "lio_listio",
12229 "mq_notify", "create_timer",
12230 /* libanl */
12231 "getaddrinfo_a",
12232 /* libgomp */
2300b5a1 12233 "GOMP_parallel",
794e51c0 12234 "GOMP_parallel_start",
2300b5a1 12235 "GOMP_parallel_loop_static",
794e51c0 12236 "GOMP_parallel_loop_static_start",
2300b5a1 12237 "GOMP_parallel_loop_dynamic",
794e51c0 12238 "GOMP_parallel_loop_dynamic_start",
2300b5a1 12239 "GOMP_parallel_loop_guided",
794e51c0 12240 "GOMP_parallel_loop_guided_start",
2300b5a1 12241 "GOMP_parallel_loop_runtime",
794e51c0 12242 "GOMP_parallel_loop_runtime_start",
2300b5a1 12243 "GOMP_parallel_sections",
68ffbac6 12244 "GOMP_parallel_sections_start",
f9dffbf0
AM
12245 /* libgo */
12246 "__go_go",
794e51c0
AM
12247 };
12248 unsigned i;
12249
a4b6fadd 12250 for (i = 0; i < ARRAY_SIZE (thread_starter); i++)
794e51c0
AM
12251 {
12252 struct elf_link_hash_entry *h;
12253 h = elf_link_hash_lookup (&htab->elf, thread_starter[i],
12254 FALSE, FALSE, TRUE);
e7d1c40c
AM
12255 htab->params->plt_thread_safe = h != NULL && h->ref_regular;
12256 if (htab->params->plt_thread_safe)
794e51c0
AM
12257 break;
12258 }
12259 }
e7d1c40c
AM
12260 stubs_always_before_branch = htab->params->group_size < 0;
12261 if (htab->params->group_size < 0)
12262 stub_group_size = -htab->params->group_size;
721956f4 12263 else
e7d1c40c 12264 stub_group_size = htab->params->group_size;
721956f4 12265
6f20ed8a
AM
12266 if (!group_sections (info, stub_group_size, stubs_always_before_branch))
12267 return FALSE;
721956f4 12268
c9301e31
AM
12269#define STUB_SHRINK_ITER 20
12270 /* Loop until no stubs added. After iteration 20 of this loop we may
12271 exit on a stub section shrinking. This is to break out of a
12272 pathological case where adding stubs on one iteration decreases
12273 section gaps (perhaps due to alignment), which then requires
12274 fewer or smaller stubs on the next iteration. */
12275
721956f4
AM
12276 while (1)
12277 {
12278 bfd *input_bfd;
12279 unsigned int bfd_indx;
a4b6fadd 12280 struct map_stub *group;
721956f4 12281 asection *stub_sec;
721956f4
AM
12282
12283 htab->stub_iteration += 1;
721956f4
AM
12284
12285 for (input_bfd = info->input_bfds, bfd_indx = 0;
12286 input_bfd != NULL;
c72f2fb2 12287 input_bfd = input_bfd->link.next, bfd_indx++)
721956f4
AM
12288 {
12289 Elf_Internal_Shdr *symtab_hdr;
12290 asection *section;
6cdc0ccc 12291 Elf_Internal_Sym *local_syms = NULL;
721956f4 12292
0c8d6e5c 12293 if (!is_ppc64_elf (input_bfd))
67f93c31
AM
12294 continue;
12295
721956f4 12296 /* We'll need the symbol table in a second. */
0ffa91dd 12297 symtab_hdr = &elf_symtab_hdr (input_bfd);
721956f4
AM
12298 if (symtab_hdr->sh_info == 0)
12299 continue;
12300
721956f4
AM
12301 /* Walk over each section attached to the input bfd. */
12302 for (section = input_bfd->sections;
12303 section != NULL;
12304 section = section->next)
12305 {
721956f4 12306 Elf_Internal_Rela *internal_relocs, *irelaend, *irela;
721956f4
AM
12307
12308 /* If there aren't any relocs, then there's nothing more
12309 to do. */
12310 if ((section->flags & SEC_RELOC) == 0
12c0f757
AM
12311 || (section->flags & SEC_ALLOC) == 0
12312 || (section->flags & SEC_LOAD) == 0
12313 || (section->flags & SEC_CODE) == 0
721956f4
AM
12314 || section->reloc_count == 0)
12315 continue;
12316
12317 /* If this section is a link-once section that will be
12318 discarded, then don't create any stubs. */
12319 if (section->output_section == NULL
927be08e 12320 || section->output_section->owner != info->output_bfd)
721956f4
AM
12321 continue;
12322
1e2f5b6e
AM
12323 /* Get the relocs. */
12324 internal_relocs
4ce794b7 12325 = _bfd_elf_link_read_relocs (input_bfd, section, NULL, NULL,
45d6a902 12326 info->keep_memory);
721956f4 12327 if (internal_relocs == NULL)
1e2f5b6e 12328 goto error_ret_free_local;
721956f4
AM
12329
12330 /* Now examine each relocation. */
12331 irela = internal_relocs;
12332 irelaend = irela + section->reloc_count;
12333 for (; irela < irelaend; irela++)
12334 {
4ce794b7
AM
12335 enum elf_ppc64_reloc_type r_type;
12336 unsigned int r_indx;
721956f4
AM
12337 enum ppc_stub_type stub_type;
12338 struct ppc_stub_hash_entry *stub_entry;
8387904d 12339 asection *sym_sec, *code_sec;
e054468f 12340 bfd_vma sym_value, code_value;
721956f4 12341 bfd_vma destination;
6911b7dc 12342 unsigned long local_off;
8843416a 12343 bfd_boolean ok_dest;
721956f4 12344 struct ppc_link_hash_entry *hash;
8387904d 12345 struct ppc_link_hash_entry *fdh;
411e1bfb
AM
12346 struct elf_link_hash_entry *h;
12347 Elf_Internal_Sym *sym;
721956f4
AM
12348 char *stub_name;
12349 const asection *id_sec;
74f0fb50 12350 struct _opd_sec_data *opd;
e054468f 12351 struct plt_entry *plt_ent;
721956f4
AM
12352
12353 r_type = ELF64_R_TYPE (irela->r_info);
12354 r_indx = ELF64_R_SYM (irela->r_info);
12355
4ce794b7 12356 if (r_type >= R_PPC64_max)
721956f4
AM
12357 {
12358 bfd_set_error (bfd_error_bad_value);
6cdc0ccc 12359 goto error_ret_free_internal;
721956f4
AM
12360 }
12361
12362 /* Only look for stubs on branch instructions. */
4ce794b7
AM
12363 if (r_type != R_PPC64_REL24
12364 && r_type != R_PPC64_REL14
12365 && r_type != R_PPC64_REL14_BRTAKEN
12366 && r_type != R_PPC64_REL14_BRNTAKEN)
721956f4
AM
12367 continue;
12368
12369 /* Now determine the call target, its name, value,
12370 section. */
411e1bfb
AM
12371 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms,
12372 r_indx, input_bfd))
12373 goto error_ret_free_internal;
12374 hash = (struct ppc_link_hash_entry *) h;
12375
8843416a 12376 ok_dest = FALSE;
8387904d 12377 fdh = NULL;
7fe2b9a6 12378 sym_value = 0;
411e1bfb 12379 if (hash == NULL)
721956f4 12380 {
411e1bfb 12381 sym_value = sym->st_value;
c27b8c2a
AM
12382 if (sym_sec != NULL
12383 && sym_sec->output_section != NULL)
12384 ok_dest = TRUE;
721956f4 12385 }
7fe2b9a6
AM
12386 else if (hash->elf.root.type == bfd_link_hash_defined
12387 || hash->elf.root.type == bfd_link_hash_defweak)
12388 {
12389 sym_value = hash->elf.root.u.def.value;
12390 if (sym_sec->output_section != NULL)
12391 ok_dest = TRUE;
12392 }
12393 else if (hash->elf.root.type == bfd_link_hash_undefweak
12394 || hash->elf.root.type == bfd_link_hash_undefined)
721956f4 12395 {
99877b66 12396 /* Recognise an old ABI func code entry sym, and
7fe2b9a6
AM
12397 use the func descriptor sym instead if it is
12398 defined. */
ceb1f1ef 12399 if (hash->elf.root.root.string[0] == '.'
b31867b6 12400 && (fdh = lookup_fdh (hash, htab)) != NULL)
8387904d 12401 {
8387904d
AM
12402 if (fdh->elf.root.type == bfd_link_hash_defined
12403 || fdh->elf.root.type == bfd_link_hash_defweak)
12404 {
12405 sym_sec = fdh->elf.root.u.def.section;
12406 sym_value = fdh->elf.root.u.def.value;
12407 if (sym_sec->output_section != NULL)
12408 ok_dest = TRUE;
12409 }
99877b66
AM
12410 else
12411 fdh = NULL;
8387904d 12412 }
7fe2b9a6
AM
12413 }
12414 else
12415 {
12416 bfd_set_error (bfd_error_bad_value);
12417 goto error_ret_free_internal;
721956f4
AM
12418 }
12419
8843416a 12420 destination = 0;
6911b7dc 12421 local_off = 0;
8843416a
AM
12422 if (ok_dest)
12423 {
12424 sym_value += irela->r_addend;
12425 destination = (sym_value
12426 + sym_sec->output_offset
12427 + sym_sec->output_section->vma);
6911b7dc
AM
12428 local_off = PPC64_LOCAL_ENTRY_OFFSET (hash
12429 ? hash->elf.other
12430 : sym->st_other);
8843416a
AM
12431 }
12432
8387904d 12433 code_sec = sym_sec;
e054468f 12434 code_value = sym_value;
74f0fb50
AM
12435 opd = get_opd_info (sym_sec);
12436 if (opd != NULL)
8387904d
AM
12437 {
12438 bfd_vma dest;
12439
74f0fb50 12440 if (hash == NULL && opd->adjust != NULL)
8387904d 12441 {
51aecdc5 12442 long adjust = opd->adjust[OPD_NDX (sym_value)];
8387904d
AM
12443 if (adjust == -1)
12444 continue;
e054468f 12445 code_value += adjust;
8387904d
AM
12446 sym_value += adjust;
12447 }
12448 dest = opd_entry_value (sym_sec, sym_value,
aef36ac1 12449 &code_sec, &code_value, FALSE);
8387904d
AM
12450 if (dest != (bfd_vma) -1)
12451 {
12452 destination = dest;
12453 if (fdh != NULL)
12454 {
12455 /* Fixup old ABI sym to point at code
12456 entry. */
99877b66 12457 hash->elf.root.type = bfd_link_hash_defweak;
8387904d 12458 hash->elf.root.u.def.section = code_sec;
e054468f 12459 hash->elf.root.u.def.value = code_value;
8387904d
AM
12460 }
12461 }
12462 }
12463
721956f4 12464 /* Determine what (if any) linker stub is needed. */
e054468f 12465 plt_ent = NULL;
721956f4 12466 stub_type = ppc_type_of_stub (section, irela, &hash,
6911b7dc
AM
12467 &plt_ent, destination,
12468 local_off);
ad8e1ba5
AM
12469
12470 if (stub_type != ppc_stub_plt_call)
12471 {
12472 /* Check whether we need a TOC adjusting stub.
12473 Since the linker pastes together pieces from
12474 different object files when creating the
12475 _init and _fini functions, it may be that a
12476 call to what looks like a local sym is in
12477 fact a call needing a TOC adjustment. */
8387904d
AM
12478 if (code_sec != NULL
12479 && code_sec->output_section != NULL
6f20ed8a
AM
12480 && (htab->sec_info[code_sec->id].toc_off
12481 != htab->sec_info[section->id].toc_off)
4c52953f
AM
12482 && (code_sec->has_toc_reloc
12483 || code_sec->makes_toc_func_call))
ad8e1ba5
AM
12484 stub_type = ppc_stub_long_branch_r2off;
12485 }
12486
721956f4
AM
12487 if (stub_type == ppc_stub_none)
12488 continue;
12489
411e1bfb
AM
12490 /* __tls_get_addr calls might be eliminated. */
12491 if (stub_type != ppc_stub_plt_call
12492 && hash != NULL
8387904d
AM
12493 && (hash == htab->tls_get_addr
12494 || hash == htab->tls_get_addr_fd)
411e1bfb
AM
12495 && section->has_tls_reloc
12496 && irela != internal_relocs)
12497 {
12498 /* Get tls info. */
f961d9dd 12499 unsigned char *tls_mask;
411e1bfb 12500
3a71aa26 12501 if (!get_tls_mask (&tls_mask, NULL, NULL, &local_syms,
411e1bfb
AM
12502 irela - 1, input_bfd))
12503 goto error_ret_free_internal;
e7b938ca 12504 if (*tls_mask != 0)
411e1bfb
AM
12505 continue;
12506 }
12507
3b421ab3
AM
12508 if (stub_type == ppc_stub_plt_call
12509 && irela + 1 < irelaend
12510 && irela[1].r_offset == irela->r_offset + 4
794e51c0
AM
12511 && ELF64_R_TYPE (irela[1].r_info) == R_PPC64_TOCSAVE)
12512 {
12513 if (!tocsave_find (htab, INSERT,
12514 &local_syms, irela + 1, input_bfd))
12515 goto error_ret_free_internal;
12516 }
12517 else if (stub_type == ppc_stub_plt_call)
12518 stub_type = ppc_stub_plt_call_r2save;
3b421ab3 12519
721956f4 12520 /* Support for grouping stub sections. */
6f20ed8a 12521 id_sec = htab->sec_info[section->id].u.group->link_sec;
721956f4
AM
12522
12523 /* Get the name of this stub. */
12524 stub_name = ppc_stub_name (id_sec, sym_sec, hash, irela);
12525 if (!stub_name)
12526 goto error_ret_free_internal;
12527
12528 stub_entry = ppc_stub_hash_lookup (&htab->stub_hash_table,
b34976b6 12529 stub_name, FALSE, FALSE);
721956f4
AM
12530 if (stub_entry != NULL)
12531 {
12532 /* The proper stub has already been created. */
12533 free (stub_name);
794e51c0
AM
12534 if (stub_type == ppc_stub_plt_call_r2save)
12535 stub_entry->stub_type = stub_type;
721956f4
AM
12536 continue;
12537 }
12538
25f53a85 12539 stub_entry = ppc_add_stub (stub_name, section, info);
721956f4
AM
12540 if (stub_entry == NULL)
12541 {
12542 free (stub_name);
6cdc0ccc
AM
12543 error_ret_free_internal:
12544 if (elf_section_data (section)->relocs == NULL)
12545 free (internal_relocs);
12546 error_ret_free_local:
12547 if (local_syms != NULL
12548 && (symtab_hdr->contents
12549 != (unsigned char *) local_syms))
12550 free (local_syms);
b34976b6 12551 return FALSE;
721956f4
AM
12552 }
12553
ad8e1ba5 12554 stub_entry->stub_type = stub_type;
794e51c0
AM
12555 if (stub_type != ppc_stub_plt_call
12556 && stub_type != ppc_stub_plt_call_r2save)
e054468f
AM
12557 {
12558 stub_entry->target_value = code_value;
12559 stub_entry->target_section = code_sec;
12560 }
12561 else
12562 {
12563 stub_entry->target_value = sym_value;
12564 stub_entry->target_section = sym_sec;
12565 }
721956f4 12566 stub_entry->h = hash;
e054468f 12567 stub_entry->plt_ent = plt_ent;
6911b7dc 12568 stub_entry->other = hash ? hash->elf.other : sym->st_other;
ee75fd95
AM
12569
12570 if (stub_entry->h != NULL)
12571 htab->stub_globals += 1;
721956f4
AM
12572 }
12573
12574 /* We're done with the internal relocs, free them. */
6cdc0ccc 12575 if (elf_section_data (section)->relocs != internal_relocs)
1e2f5b6e 12576 free (internal_relocs);
721956f4 12577 }
6cdc0ccc
AM
12578
12579 if (local_syms != NULL
12580 && symtab_hdr->contents != (unsigned char *) local_syms)
12581 {
12582 if (!info->keep_memory)
12583 free (local_syms);
12584 else
12585 symtab_hdr->contents = (unsigned char *) local_syms;
12586 }
721956f4
AM
12587 }
12588
5c3dead3 12589 /* We may have added some stubs. Find out the new size of the
721956f4 12590 stub sections. */
e7d1c40c 12591 for (stub_sec = htab->params->stub_bfd->sections;
721956f4
AM
12592 stub_sec != NULL;
12593 stub_sec = stub_sec->next)
e717da7e 12594 if ((stub_sec->flags & SEC_LINKER_CREATED) == 0)
ee75fd95 12595 {
5c3dead3 12596 stub_sec->rawsize = stub_sec->size;
ee75fd95
AM
12597 stub_sec->size = 0;
12598 stub_sec->reloc_count = 0;
84f5d08e 12599 stub_sec->flags &= ~SEC_RELOC;
ee75fd95 12600 }
eea6121a
AM
12601
12602 htab->brlt->size = 0;
84f5d08e
AM
12603 htab->brlt->reloc_count = 0;
12604 htab->brlt->flags &= ~SEC_RELOC;
ee75fd95 12605 if (htab->relbrlt != NULL)
eea6121a 12606 htab->relbrlt->size = 0;
721956f4 12607
63bc6f6c 12608 bfd_hash_traverse (&htab->stub_hash_table, ppc_size_one_stub, info);
721956f4 12609
a4b6fadd
AM
12610 for (group = htab->group; group != NULL; group = group->next)
12611 if (group->needs_save_res)
12612 group->stub_sec->size += htab->sfpr->size;
12613
176a0d42
AM
12614 if (info->emitrelocations
12615 && htab->glink != NULL && htab->glink->size != 0)
12616 {
12617 htab->glink->reloc_count = 1;
12618 htab->glink->flags |= SEC_RELOC;
12619 }
12620
58d180e8
AM
12621 if (htab->glink_eh_frame != NULL
12622 && !bfd_is_abs_section (htab->glink_eh_frame->output_section)
9a2a56cc 12623 && htab->glink_eh_frame->output_section->size != 0)
58d180e8 12624 {
4bbe044a 12625 size_t size = 0, align;
58d180e8 12626
e7d1c40c 12627 for (stub_sec = htab->params->stub_bfd->sections;
58d180e8
AM
12628 stub_sec != NULL;
12629 stub_sec = stub_sec->next)
12630 if ((stub_sec->flags & SEC_LINKER_CREATED) == 0)
da44f4e5 12631 size += 24;
58d180e8
AM
12632 if (htab->glink != NULL && htab->glink->size != 0)
12633 size += 24;
12634 if (size != 0)
12635 size += sizeof (glink_eh_frame_cie);
4bbe044a
AM
12636 align = 1;
12637 align <<= htab->glink_eh_frame->output_section->alignment_power;
12638 align -= 1;
12639 size = (size + align) & ~align;
58d180e8
AM
12640 htab->glink_eh_frame->rawsize = htab->glink_eh_frame->size;
12641 htab->glink_eh_frame->size = size;
12642 }
12643
e7d1c40c
AM
12644 if (htab->params->plt_stub_align != 0)
12645 for (stub_sec = htab->params->stub_bfd->sections;
794e51c0
AM
12646 stub_sec != NULL;
12647 stub_sec = stub_sec->next)
12648 if ((stub_sec->flags & SEC_LINKER_CREATED) == 0)
e7d1c40c
AM
12649 stub_sec->size = ((stub_sec->size
12650 + (1 << htab->params->plt_stub_align) - 1)
29f628db 12651 & -(1 << htab->params->plt_stub_align));
794e51c0 12652
e7d1c40c 12653 for (stub_sec = htab->params->stub_bfd->sections;
5c3dead3
AM
12654 stub_sec != NULL;
12655 stub_sec = stub_sec->next)
12656 if ((stub_sec->flags & SEC_LINKER_CREATED) == 0
c9301e31
AM
12657 && stub_sec->rawsize != stub_sec->size
12658 && (htab->stub_iteration <= STUB_SHRINK_ITER
12659 || stub_sec->rawsize < stub_sec->size))
5c3dead3
AM
12660 break;
12661
58d180e8
AM
12662 if (stub_sec == NULL
12663 && (htab->glink_eh_frame == NULL
12664 || htab->glink_eh_frame->rawsize == htab->glink_eh_frame->size))
5c3dead3
AM
12665 break;
12666
721956f4 12667 /* Ask the linker to do its stuff. */
e7d1c40c 12668 (*htab->params->layout_sections_again) ();
721956f4
AM
12669 }
12670
da44f4e5
AM
12671 if (htab->glink_eh_frame != NULL
12672 && htab->glink_eh_frame->size != 0)
12673 {
12674 bfd_vma val;
12675 bfd_byte *p, *last_fde;
12676 size_t last_fde_len, size, align, pad;
12677 asection *stub_sec;
12678
12679 p = bfd_zalloc (htab->glink_eh_frame->owner, htab->glink_eh_frame->size);
12680 if (p == NULL)
12681 return FALSE;
12682 htab->glink_eh_frame->contents = p;
12683 last_fde = p;
12684
12685 memcpy (p, glink_eh_frame_cie, sizeof (glink_eh_frame_cie));
12686 /* CIE length (rewrite in case little-endian). */
12687 last_fde_len = sizeof (glink_eh_frame_cie) - 4;
12688 bfd_put_32 (htab->elf.dynobj, last_fde_len, p);
12689 p += sizeof (glink_eh_frame_cie);
12690
12691 for (stub_sec = htab->params->stub_bfd->sections;
12692 stub_sec != NULL;
12693 stub_sec = stub_sec->next)
12694 if ((stub_sec->flags & SEC_LINKER_CREATED) == 0)
12695 {
12696 last_fde = p;
12697 last_fde_len = 20;
12698 /* FDE length. */
12699 bfd_put_32 (htab->elf.dynobj, 20, p);
12700 p += 4;
12701 /* CIE pointer. */
12702 val = p - htab->glink_eh_frame->contents;
12703 bfd_put_32 (htab->elf.dynobj, val, p);
12704 p += 4;
12705 /* Offset to stub section, written later. */
12706 p += 4;
12707 /* stub section size. */
12708 bfd_put_32 (htab->elf.dynobj, stub_sec->size, p);
12709 p += 4;
12710 /* Augmentation. */
12711 p += 1;
12712 /* Pad. */
12713 p += 7;
12714 }
12715 if (htab->glink != NULL && htab->glink->size != 0)
12716 {
12717 last_fde = p;
12718 last_fde_len = 20;
12719 /* FDE length. */
12720 bfd_put_32 (htab->elf.dynobj, 20, p);
12721 p += 4;
12722 /* CIE pointer. */
12723 val = p - htab->glink_eh_frame->contents;
12724 bfd_put_32 (htab->elf.dynobj, val, p);
12725 p += 4;
12726 /* Offset to .glink, written later. */
12727 p += 4;
12728 /* .glink size. */
12729 bfd_put_32 (htab->elf.dynobj, htab->glink->size - 8, p);
12730 p += 4;
12731 /* Augmentation. */
12732 p += 1;
12733
12734 *p++ = DW_CFA_advance_loc + 1;
12735 *p++ = DW_CFA_register;
12736 *p++ = 65;
9f08fa5c 12737 *p++ = htab->opd_abi ? 12 : 0;
da44f4e5
AM
12738 *p++ = DW_CFA_advance_loc + 4;
12739 *p++ = DW_CFA_restore_extended;
12740 *p++ = 65;
12741 }
12742 /* Subsume any padding into the last FDE if user .eh_frame
12743 sections are aligned more than glink_eh_frame. Otherwise any
12744 zero padding will be seen as a terminator. */
12745 size = p - htab->glink_eh_frame->contents;
12746 align = 1;
12747 align <<= htab->glink_eh_frame->output_section->alignment_power;
12748 align -= 1;
12749 pad = ((size + align) & ~align) - size;
12750 htab->glink_eh_frame->size = size + pad;
12751 bfd_put_32 (htab->elf.dynobj, last_fde_len + pad, last_fde);
12752 }
12753
d969d15f
AM
12754 maybe_strip_output (info, htab->brlt);
12755 if (htab->glink_eh_frame != NULL)
12756 maybe_strip_output (info, htab->glink_eh_frame);
721956f4 12757
b34976b6 12758 return TRUE;
721956f4
AM
12759}
12760
12761/* Called after we have determined section placement. If sections
805fc799 12762 move, we'll be called again. Provide a value for TOCstart. */
721956f4 12763
805fc799 12764bfd_vma
1c865ab2 12765ppc64_elf_set_toc (struct bfd_link_info *info, bfd *obfd)
721956f4 12766{
805fc799 12767 asection *s;
a27e685f 12768 bfd_vma TOCstart, adjust;
721956f4 12769
43417696
AM
12770 if (info != NULL)
12771 {
12772 struct elf_link_hash_entry *h;
12773 struct elf_link_hash_table *htab = elf_hash_table (info);
12774
12775 if (is_elf_hash_table (htab)
12776 && htab->hgot != NULL)
12777 h = htab->hgot;
12778 else
12779 {
12780 h = elf_link_hash_lookup (htab, ".TOC.", FALSE, FALSE, TRUE);
12781 if (is_elf_hash_table (htab))
12782 htab->hgot = h;
12783 }
12784 if (h != NULL
12785 && h->root.type == bfd_link_hash_defined
12786 && !h->root.linker_def
12787 && (!is_elf_hash_table (htab)
12788 || h->def_regular))
12789 {
12790 TOCstart = (h->root.u.def.value - TOC_BASE_OFF
12791 + h->root.u.def.section->output_offset
12792 + h->root.u.def.section->output_section->vma);
12793 _bfd_set_gp_value (obfd, TOCstart);
12794 return TOCstart;
12795 }
12796 }
12797
805fc799
AM
12798 /* The TOC consists of sections .got, .toc, .tocbss, .plt in that
12799 order. The TOC starts where the first of these sections starts. */
12800 s = bfd_get_section_by_name (obfd, ".got");
e054468f 12801 if (s == NULL || (s->flags & SEC_EXCLUDE) != 0)
805fc799 12802 s = bfd_get_section_by_name (obfd, ".toc");
e054468f 12803 if (s == NULL || (s->flags & SEC_EXCLUDE) != 0)
805fc799 12804 s = bfd_get_section_by_name (obfd, ".tocbss");
e054468f 12805 if (s == NULL || (s->flags & SEC_EXCLUDE) != 0)
805fc799 12806 s = bfd_get_section_by_name (obfd, ".plt");
e054468f 12807 if (s == NULL || (s->flags & SEC_EXCLUDE) != 0)
805fc799
AM
12808 {
12809 /* This may happen for
12810 o references to TOC base (SYM@toc / TOC[tc0]) without a
12811 .toc directive
12812 o bad linker script
12813 o --gc-sections and empty TOC sections
12814
12815 FIXME: Warn user? */
12816
12817 /* Look for a likely section. We probably won't even be
12818 using TOCstart. */
12819 for (s = obfd->sections; s != NULL; s = s->next)
e054468f
AM
12820 if ((s->flags & (SEC_ALLOC | SEC_SMALL_DATA | SEC_READONLY
12821 | SEC_EXCLUDE))
805fc799
AM
12822 == (SEC_ALLOC | SEC_SMALL_DATA))
12823 break;
721956f4 12824 if (s == NULL)
805fc799 12825 for (s = obfd->sections; s != NULL; s = s->next)
e054468f 12826 if ((s->flags & (SEC_ALLOC | SEC_SMALL_DATA | SEC_EXCLUDE))
805fc799
AM
12827 == (SEC_ALLOC | SEC_SMALL_DATA))
12828 break;
721956f4 12829 if (s == NULL)
805fc799 12830 for (s = obfd->sections; s != NULL; s = s->next)
e054468f
AM
12831 if ((s->flags & (SEC_ALLOC | SEC_READONLY | SEC_EXCLUDE))
12832 == SEC_ALLOC)
805fc799 12833 break;
721956f4 12834 if (s == NULL)
805fc799 12835 for (s = obfd->sections; s != NULL; s = s->next)
e054468f 12836 if ((s->flags & (SEC_ALLOC | SEC_EXCLUDE)) == SEC_ALLOC)
805fc799
AM
12837 break;
12838 }
721956f4 12839
805fc799
AM
12840 TOCstart = 0;
12841 if (s != NULL)
12842 TOCstart = s->output_section->vma + s->output_offset;
721956f4 12843
a27e685f
AM
12844 /* Force alignment. */
12845 adjust = TOCstart & (TOC_BASE_ALIGN - 1);
12846 TOCstart -= adjust;
1c865ab2
AM
12847 _bfd_set_gp_value (obfd, TOCstart);
12848
810d4e75 12849 if (info != NULL && s != NULL)
1c865ab2
AM
12850 {
12851 struct ppc_link_hash_table *htab = ppc_hash_table (info);
12852
810d4e75
AM
12853 if (htab != NULL)
12854 {
12855 if (htab->elf.hgot != NULL)
12856 {
a27e685f 12857 htab->elf.hgot->root.u.def.value = TOC_BASE_OFF - adjust;
810d4e75
AM
12858 htab->elf.hgot->root.u.def.section = s;
12859 }
12860 }
12861 else
1c865ab2 12862 {
810d4e75
AM
12863 struct bfd_link_hash_entry *bh = NULL;
12864 _bfd_generic_link_add_one_symbol (info, obfd, ".TOC.", BSF_GLOBAL,
a27e685f
AM
12865 s, TOC_BASE_OFF - adjust,
12866 NULL, FALSE, FALSE, &bh);
1c865ab2
AM
12867 }
12868 }
805fc799 12869 return TOCstart;
721956f4
AM
12870}
12871
a345bc8d
AM
12872/* Called via elf_link_hash_traverse from ppc64_elf_build_stubs to
12873 write out any global entry stubs. */
12874
12875static bfd_boolean
12876build_global_entry_stubs (struct elf_link_hash_entry *h, void *inf)
12877{
12878 struct bfd_link_info *info;
12879 struct ppc_link_hash_table *htab;
12880 struct plt_entry *pent;
12881 asection *s;
12882
12883 if (h->root.type == bfd_link_hash_indirect)
12884 return TRUE;
12885
12886 if (!h->pointer_equality_needed)
12887 return TRUE;
12888
12889 if (h->def_regular)
12890 return TRUE;
12891
12892 info = inf;
12893 htab = ppc_hash_table (info);
12894 if (htab == NULL)
12895 return FALSE;
12896
12897 s = htab->glink;
12898 for (pent = h->plt.plist; pent != NULL; pent = pent->next)
12899 if (pent->plt.offset != (bfd_vma) -1
12900 && pent->addend == 0)
12901 {
12902 bfd_byte *p;
12903 asection *plt;
12904 bfd_vma off;
12905
a345bc8d 12906 p = s->contents + h->root.u.def.value;
33e44f2e 12907 plt = htab->elf.splt;
a345bc8d
AM
12908 if (!htab->elf.dynamic_sections_created
12909 || h->dynindx == -1)
33e44f2e 12910 plt = htab->elf.iplt;
a345bc8d
AM
12911 off = pent->plt.offset + plt->output_offset + plt->output_section->vma;
12912 off -= h->root.u.def.value + s->output_offset + s->output_section->vma;
12913
12914 if (off + 0x80008000 > 0xffffffff || (off & 3) != 0)
12915 {
12916 info->callbacks->einfo
12917 (_("%P: linkage table error against `%T'\n"),
12918 h->root.root.string);
12919 bfd_set_error (bfd_error_bad_value);
12920 htab->stub_error = TRUE;
12921 }
12922
7341d5e2
AM
12923 htab->stub_count[ppc_stub_global_entry - 1] += 1;
12924 if (htab->params->emit_stub_syms)
12925 {
12926 size_t len = strlen (h->root.root.string);
12927 char *name = bfd_malloc (sizeof "12345678.global_entry." + len);
12928
12929 if (name == NULL)
12930 return FALSE;
12931
12932 sprintf (name, "%08x.global_entry.%s", s->id, h->root.root.string);
12933 h = elf_link_hash_lookup (&htab->elf, name, TRUE, FALSE, FALSE);
12934 if (h == NULL)
12935 return FALSE;
12936 if (h->root.type == bfd_link_hash_new)
12937 {
12938 h->root.type = bfd_link_hash_defined;
12939 h->root.u.def.section = s;
12940 h->root.u.def.value = p - s->contents;
12941 h->ref_regular = 1;
12942 h->def_regular = 1;
12943 h->ref_regular_nonweak = 1;
12944 h->forced_local = 1;
12945 h->non_elf = 0;
2ec55de3 12946 h->root.linker_def = 1;
7341d5e2
AM
12947 }
12948 }
12949
a345bc8d
AM
12950 if (PPC_HA (off) != 0)
12951 {
12952 bfd_put_32 (s->owner, ADDIS_R12_R12 | PPC_HA (off), p);
12953 p += 4;
12954 }
12955 bfd_put_32 (s->owner, LD_R12_0R12 | PPC_LO (off), p);
12956 p += 4;
12957 bfd_put_32 (s->owner, MTCTR_R12, p);
12958 p += 4;
12959 bfd_put_32 (s->owner, BCTR, p);
12960 break;
12961 }
12962 return TRUE;
12963}
12964
721956f4
AM
12965/* Build all the stubs associated with the current output file.
12966 The stubs are kept in a hash table attached to the main linker
12967 hash table. This function is called via gldelf64ppc_finish. */
12968
b34976b6 12969bfd_boolean
e7d1c40c 12970ppc64_elf_build_stubs (struct bfd_link_info *info,
4ce794b7 12971 char **stats)
5d1634d7
AM
12972{
12973 struct ppc_link_hash_table *htab = ppc_hash_table (info);
a4b6fadd 12974 struct map_stub *group;
721956f4 12975 asection *stub_sec;
5d1634d7 12976 bfd_byte *p;
e717da7e 12977 int stub_sec_count = 0;
5d1634d7 12978
4dfe6ac6
NC
12979 if (htab == NULL)
12980 return FALSE;
12981
eea6121a 12982 /* Allocate memory to hold the linker stubs. */
e7d1c40c 12983 for (stub_sec = htab->params->stub_bfd->sections;
721956f4
AM
12984 stub_sec != NULL;
12985 stub_sec = stub_sec->next)
eea6121a
AM
12986 if ((stub_sec->flags & SEC_LINKER_CREATED) == 0
12987 && stub_sec->size != 0)
e717da7e 12988 {
e7d1c40c 12989 stub_sec->contents = bfd_zalloc (htab->params->stub_bfd, stub_sec->size);
eea6121a
AM
12990 if (stub_sec->contents == NULL)
12991 return FALSE;
eea6121a 12992 stub_sec->size = 0;
e717da7e 12993 }
5d1634d7 12994
23eb7e01 12995 if (htab->glink != NULL && htab->glink->size != 0)
5d1634d7 12996 {
9f951329 12997 unsigned int indx;
ad8e1ba5 12998 bfd_vma plt0;
9f951329 12999
721956f4 13000 /* Build the .glink plt call stub. */
e7d1c40c 13001 if (htab->params->emit_stub_syms)
97b639ba
AM
13002 {
13003 struct elf_link_hash_entry *h;
468392fb
AM
13004 h = elf_link_hash_lookup (&htab->elf, "__glink_PLTresolve",
13005 TRUE, FALSE, FALSE);
97b639ba
AM
13006 if (h == NULL)
13007 return FALSE;
13008 if (h->root.type == bfd_link_hash_new)
13009 {
13010 h->root.type = bfd_link_hash_defined;
13011 h->root.u.def.section = htab->glink;
ee4bf8d2 13012 h->root.u.def.value = 8;
f5385ebf
AM
13013 h->ref_regular = 1;
13014 h->def_regular = 1;
13015 h->ref_regular_nonweak = 1;
13016 h->forced_local = 1;
13017 h->non_elf = 0;
2ec55de3 13018 h->root.linker_def = 1;
97b639ba
AM
13019 }
13020 }
33e44f2e
AM
13021 plt0 = (htab->elf.splt->output_section->vma
13022 + htab->elf.splt->output_offset
13023 - 16);
176a0d42
AM
13024 if (info->emitrelocations)
13025 {
13026 Elf_Internal_Rela *r = get_relocs (htab->glink, 1);
13027 if (r == NULL)
13028 return FALSE;
13029 r->r_offset = (htab->glink->output_offset
13030 + htab->glink->output_section->vma);
13031 r->r_info = ELF64_R_INFO (0, R_PPC64_REL64);
13032 r->r_addend = plt0;
13033 }
4ce794b7 13034 p = htab->glink->contents;
176a0d42 13035 plt0 -= htab->glink->output_section->vma + htab->glink->output_offset;
ee4bf8d2
AM
13036 bfd_put_64 (htab->glink->owner, plt0, p);
13037 p += 8;
b9e5796b
AM
13038 if (htab->opd_abi)
13039 {
13040 bfd_put_32 (htab->glink->owner, MFLR_R12, p);
13041 p += 4;
13042 bfd_put_32 (htab->glink->owner, BCL_20_31, p);
13043 p += 4;
13044 bfd_put_32 (htab->glink->owner, MFLR_R11, p);
13045 p += 4;
13046 bfd_put_32 (htab->glink->owner, LD_R2_0R11 | (-16 & 0xfffc), p);
13047 p += 4;
13048 bfd_put_32 (htab->glink->owner, MTLR_R12, p);
13049 p += 4;
13050 bfd_put_32 (htab->glink->owner, ADD_R11_R2_R11, p);
13051 p += 4;
13052 bfd_put_32 (htab->glink->owner, LD_R12_0R11, p);
13053 p += 4;
13054 bfd_put_32 (htab->glink->owner, LD_R2_0R11 | 8, p);
13055 p += 4;
13056 bfd_put_32 (htab->glink->owner, MTCTR_R12, p);
13057 p += 4;
13058 bfd_put_32 (htab->glink->owner, LD_R11_0R11 | 16, p);
13059 p += 4;
13060 }
13061 else
13062 {
13063 bfd_put_32 (htab->glink->owner, MFLR_R0, p);
13064 p += 4;
13065 bfd_put_32 (htab->glink->owner, BCL_20_31, p);
13066 p += 4;
13067 bfd_put_32 (htab->glink->owner, MFLR_R11, p);
13068 p += 4;
13069 bfd_put_32 (htab->glink->owner, LD_R2_0R11 | (-16 & 0xfffc), p);
13070 p += 4;
13071 bfd_put_32 (htab->glink->owner, MTLR_R0, p);
13072 p += 4;
13073 bfd_put_32 (htab->glink->owner, SUB_R12_R12_R11, p);
13074 p += 4;
13075 bfd_put_32 (htab->glink->owner, ADD_R11_R2_R11, p);
13076 p += 4;
13077 bfd_put_32 (htab->glink->owner, ADDI_R0_R12 | (-48 & 0xffff), p);
13078 p += 4;
13079 bfd_put_32 (htab->glink->owner, LD_R12_0R11, p);
13080 p += 4;
13081 bfd_put_32 (htab->glink->owner, SRDI_R0_R0_2, p);
13082 p += 4;
13083 bfd_put_32 (htab->glink->owner, MTCTR_R12, p);
13084 p += 4;
13085 bfd_put_32 (htab->glink->owner, LD_R11_0R11 | 8, p);
13086 p += 4;
13087 }
4ce794b7 13088 bfd_put_32 (htab->glink->owner, BCTR, p);
ad8e1ba5 13089 p += 4;
ee4bf8d2
AM
13090 while (p - htab->glink->contents < GLINK_CALL_STUB_SIZE)
13091 {
13092 bfd_put_32 (htab->glink->owner, NOP, p);
13093 p += 4;
13094 }
ad8e1ba5 13095
9f951329
AM
13096 /* Build the .glink lazy link call stubs. */
13097 indx = 0;
a345bc8d 13098 while (p < htab->glink->contents + htab->glink->rawsize)
9f951329 13099 {
b9e5796b 13100 if (htab->opd_abi)
9f951329 13101 {
b9e5796b
AM
13102 if (indx < 0x8000)
13103 {
13104 bfd_put_32 (htab->glink->owner, LI_R0_0 | indx, p);
13105 p += 4;
13106 }
13107 else
13108 {
13109 bfd_put_32 (htab->glink->owner, LIS_R0_0 | PPC_HI (indx), p);
13110 p += 4;
13111 bfd_put_32 (htab->glink->owner, ORI_R0_R0_0 | PPC_LO (indx),
13112 p);
13113 p += 4;
13114 }
9f951329 13115 }
4ce794b7 13116 bfd_put_32 (htab->glink->owner,
ee4bf8d2 13117 B_DOT | ((htab->glink->contents - p + 8) & 0x3fffffc), p);
a16d5acb 13118 indx++;
9f951329
AM
13119 p += 4;
13120 }
a345bc8d
AM
13121
13122 /* Build .glink global entry stubs. */
13123 if (htab->glink->size > htab->glink->rawsize)
afe397ea 13124 elf_link_hash_traverse (&htab->elf, build_global_entry_stubs, info);
5d1634d7 13125 }
5d1634d7 13126
7341d5e2 13127 if (htab->brlt != NULL && htab->brlt->size != 0)
721956f4 13128 {
4ce794b7 13129 htab->brlt->contents = bfd_zalloc (htab->brlt->owner,
eea6121a 13130 htab->brlt->size);
4ce794b7 13131 if (htab->brlt->contents == NULL)
b34976b6 13132 return FALSE;
721956f4 13133 }
ee75fd95 13134 if (htab->relbrlt != NULL && htab->relbrlt->size != 0)
63bc6f6c
AM
13135 {
13136 htab->relbrlt->contents = bfd_zalloc (htab->relbrlt->owner,
eea6121a 13137 htab->relbrlt->size);
63bc6f6c
AM
13138 if (htab->relbrlt->contents == NULL)
13139 return FALSE;
13140 }
5d1634d7 13141
721956f4
AM
13142 /* Build the stubs as directed by the stub hash table. */
13143 bfd_hash_traverse (&htab->stub_hash_table, ppc_build_one_stub, info);
5d1634d7 13144
a4b6fadd
AM
13145 for (group = htab->group; group != NULL; group = group->next)
13146 if (group->needs_save_res)
13147 {
13148 stub_sec = group->stub_sec;
13149 memcpy (stub_sec->contents + stub_sec->size, htab->sfpr->contents,
13150 htab->sfpr->size);
13151 if (htab->params->emit_stub_syms)
13152 {
13153 unsigned int i;
13154
13155 for (i = 0; i < ARRAY_SIZE (save_res_funcs); i++)
13156 if (!sfpr_define (info, &save_res_funcs[i], stub_sec))
13157 return FALSE;
13158 }
13159 stub_sec->size += htab->sfpr->size;
13160 }
13161
aa8a7074
AM
13162 if (htab->relbrlt != NULL)
13163 htab->relbrlt->reloc_count = 0;
13164
e7d1c40c
AM
13165 if (htab->params->plt_stub_align != 0)
13166 for (stub_sec = htab->params->stub_bfd->sections;
794e51c0
AM
13167 stub_sec != NULL;
13168 stub_sec = stub_sec->next)
13169 if ((stub_sec->flags & SEC_LINKER_CREATED) == 0)
e7d1c40c
AM
13170 stub_sec->size = ((stub_sec->size
13171 + (1 << htab->params->plt_stub_align) - 1)
29f628db 13172 & -(1 << htab->params->plt_stub_align));
794e51c0 13173
e7d1c40c 13174 for (stub_sec = htab->params->stub_bfd->sections;
721956f4
AM
13175 stub_sec != NULL;
13176 stub_sec = stub_sec->next)
e717da7e
AM
13177 if ((stub_sec->flags & SEC_LINKER_CREATED) == 0)
13178 {
13179 stub_sec_count += 1;
c9301e31
AM
13180 if (stub_sec->rawsize != stub_sec->size
13181 && (htab->stub_iteration <= STUB_SHRINK_ITER
13182 || stub_sec->rawsize < stub_sec->size))
e717da7e
AM
13183 break;
13184 }
5d1634d7 13185
da44f4e5
AM
13186 /* Note that the glink_eh_frame check here is not only testing that
13187 the generated size matched the calculated size but also that
13188 bfd_elf_discard_info didn't make any changes to the section. */
721956f4 13189 if (stub_sec != NULL
58d180e8
AM
13190 || (htab->glink_eh_frame != NULL
13191 && htab->glink_eh_frame->rawsize != htab->glink_eh_frame->size))
5d1634d7 13192 {
b34976b6 13193 htab->stub_error = TRUE;
8de848d8 13194 info->callbacks->einfo (_("%P: stubs don't match calculated size\n"));
5d1634d7 13195 }
721956f4 13196
d2a300cf
AM
13197 if (htab->stub_error)
13198 return FALSE;
13199
13200 if (stats != NULL)
13201 {
13202 *stats = bfd_malloc (500);
13203 if (*stats == NULL)
13204 return FALSE;
13205
ee75fd95 13206 sprintf (*stats, _("linker stubs in %u group%s\n"
d2a300cf
AM
13207 " branch %lu\n"
13208 " toc adjust %lu\n"
13209 " long branch %lu\n"
13210 " long toc adj %lu\n"
794e51c0 13211 " plt call %lu\n"
7341d5e2
AM
13212 " plt call toc %lu\n"
13213 " global entry %lu"),
e717da7e 13214 stub_sec_count,
ee75fd95 13215 stub_sec_count == 1 ? "" : "s",
4ce794b7
AM
13216 htab->stub_count[ppc_stub_long_branch - 1],
13217 htab->stub_count[ppc_stub_long_branch_r2off - 1],
13218 htab->stub_count[ppc_stub_plt_branch - 1],
13219 htab->stub_count[ppc_stub_plt_branch_r2off - 1],
794e51c0 13220 htab->stub_count[ppc_stub_plt_call - 1],
7341d5e2
AM
13221 htab->stub_count[ppc_stub_plt_call_r2save - 1],
13222 htab->stub_count[ppc_stub_global_entry - 1]);
d2a300cf
AM
13223 }
13224 return TRUE;
5bd4f169
AM
13225}
13226
99877b66
AM
13227/* This function undoes the changes made by add_symbol_adjust. */
13228
13229static bfd_boolean
13230undo_symbol_twiddle (struct elf_link_hash_entry *h, void *inf ATTRIBUTE_UNUSED)
13231{
13232 struct ppc_link_hash_entry *eh;
13233
13234 if (h->root.type == bfd_link_hash_indirect)
13235 return TRUE;
13236
99877b66
AM
13237 eh = (struct ppc_link_hash_entry *) h;
13238 if (eh->elf.root.type != bfd_link_hash_undefweak || !eh->was_undefined)
13239 return TRUE;
13240
13241 eh->elf.root.type = bfd_link_hash_undefined;
13242 return TRUE;
13243}
13244
13245void
13246ppc64_elf_restore_symbols (struct bfd_link_info *info)
13247{
13248 struct ppc_link_hash_table *htab = ppc_hash_table (info);
4dfe6ac6
NC
13249
13250 if (htab != NULL)
13251 elf_link_hash_traverse (&htab->elf, undo_symbol_twiddle, info);
99877b66
AM
13252}
13253
60124e18
AM
13254/* What to do when ld finds relocations against symbols defined in
13255 discarded sections. */
13256
13257static unsigned int
13258ppc64_elf_action_discarded (asection *sec)
13259{
13260 if (strcmp (".opd", sec->name) == 0)
13261 return 0;
13262
13263 if (strcmp (".toc", sec->name) == 0)
13264 return 0;
13265
bce50a28
JJ
13266 if (strcmp (".toc1", sec->name) == 0)
13267 return 0;
13268
60124e18
AM
13269 return _bfd_elf_default_action_discarded (sec);
13270}
13271
5bd4f169
AM
13272/* The RELOCATE_SECTION function is called by the ELF backend linker
13273 to handle the relocations for a section.
13274
13275 The relocs are always passed as Rela structures; if the section
13276 actually uses Rel structures, the r_addend field will always be
13277 zero.
13278
13279 This function is responsible for adjust the section contents as
13280 necessary, and (if using Rela relocs and generating a
1049f94e 13281 relocatable output file) adjusting the reloc addend as
5bd4f169
AM
13282 necessary.
13283
13284 This function does not have to worry about setting the reloc
13285 address or the reloc symbol index.
13286
13287 LOCAL_SYMS is a pointer to the swapped in local symbols.
13288
13289 LOCAL_SECTIONS is an array giving the section in the input file
13290 corresponding to the st_shndx field of each local symbol.
13291
13292 The global hash table entry for the global symbols can be found
13293 via elf_sym_hashes (input_bfd).
13294
1049f94e 13295 When generating relocatable output, this function must handle
5bd4f169
AM
13296 STB_LOCAL/STT_SECTION symbols specially. The output symbol is
13297 going to be the section symbol corresponding to the output
13298 section, which means that the addend must be adjusted
13299 accordingly. */
13300
b34976b6 13301static bfd_boolean
4ce794b7
AM
13302ppc64_elf_relocate_section (bfd *output_bfd,
13303 struct bfd_link_info *info,
13304 bfd *input_bfd,
13305 asection *input_section,
13306 bfd_byte *contents,
13307 Elf_Internal_Rela *relocs,
13308 Elf_Internal_Sym *local_syms,
13309 asection **local_sections)
5bd4f169 13310{
65f38f15 13311 struct ppc_link_hash_table *htab;
5bd4f169
AM
13312 Elf_Internal_Shdr *symtab_hdr;
13313 struct elf_link_hash_entry **sym_hashes;
5bd4f169 13314 Elf_Internal_Rela *rel;
c316a17c 13315 Elf_Internal_Rela *wrel;
5bd4f169 13316 Elf_Internal_Rela *relend;
411e1bfb
AM
13317 Elf_Internal_Rela outrel;
13318 bfd_byte *loc;
411e1bfb 13319 struct got_entry **local_got_ents;
5bd4f169 13320 bfd_vma TOCstart;
b34976b6
AM
13321 bfd_boolean ret = TRUE;
13322 bfd_boolean is_opd;
794e51c0
AM
13323 /* Assume 'at' branch hints. */
13324 bfd_boolean is_isa_v2 = TRUE;
4fe5ca5b 13325 bfd_vma d_offset = (bfd_big_endian (output_bfd) ? 2 : 0);
5bd4f169 13326
65f38f15 13327 /* Initialize howto table if needed. */
5bd4f169 13328 if (!ppc64_elf_howto_table[R_PPC64_ADDR32])
5bd4f169
AM
13329 ppc_howto_init ();
13330
65f38f15 13331 htab = ppc_hash_table (info);
4dfe6ac6
NC
13332 if (htab == NULL)
13333 return FALSE;
ee75fd95
AM
13334
13335 /* Don't relocate stub sections. */
e7d1c40c 13336 if (input_section->owner == htab->params->stub_bfd)
ee75fd95
AM
13337 return TRUE;
13338
0c8d6e5c 13339 BFD_ASSERT (is_ppc64_elf (input_bfd));
0ffa91dd 13340
411e1bfb 13341 local_got_ents = elf_local_got_ents (input_bfd);
5bd4f169 13342 TOCstart = elf_gp (output_bfd);
0ffa91dd 13343 symtab_hdr = &elf_symtab_hdr (input_bfd);
5bd4f169 13344 sym_hashes = elf_sym_hashes (input_bfd);
7c8fe5c4 13345 is_opd = ppc64_elf_section_data (input_section)->sec_type == sec_opd;
65f38f15 13346
c316a17c 13347 rel = wrel = relocs;
5bd4f169 13348 relend = relocs + input_section->reloc_count;
c316a17c 13349 for (; rel < relend; wrel++, rel++)
5bd4f169 13350 {
04c9666a 13351 enum elf_ppc64_reloc_type r_type;
31c76678 13352 bfd_vma addend;
5bd4f169
AM
13353 bfd_reloc_status_type r;
13354 Elf_Internal_Sym *sym;
13355 asection *sec;
039b3fef
AM
13356 struct elf_link_hash_entry *h_elf;
13357 struct ppc_link_hash_entry *h;
13358 struct ppc_link_hash_entry *fdh;
5bd4f169 13359 const char *sym_name;
0d4792f7 13360 unsigned long r_symndx, toc_symndx;
3a71aa26 13361 bfd_vma toc_addend;
f961d9dd
AM
13362 unsigned char tls_mask, tls_gd, tls_type;
13363 unsigned char sym_type;
5bd4f169 13364 bfd_vma relocation;
b34976b6
AM
13365 bfd_boolean unresolved_reloc;
13366 bfd_boolean warned;
bc30df16 13367 enum { DEST_NORMAL, DEST_OPD, DEST_STUB } reloc_dest;
67f0cbdb 13368 unsigned int insn;
e11840f9 13369 unsigned int mask;
721956f4
AM
13370 struct ppc_stub_hash_entry *stub_entry;
13371 bfd_vma max_br_offset;
13372 bfd_vma from;
c316a17c 13373 Elf_Internal_Rela orig_rel;
b80eed39
AM
13374 reloc_howto_type *howto;
13375 struct reloc_howto_struct alt_howto;
5bd4f169 13376
c316a17c
AM
13377 again:
13378 orig_rel = *rel;
13379
4ce794b7 13380 r_type = ELF64_R_TYPE (rel->r_info);
5bd4f169 13381 r_symndx = ELF64_R_SYM (rel->r_info);
ee87f2da
AM
13382
13383 /* For old style R_PPC64_TOC relocs with a zero symbol, use the
13384 symbol of the previous ADDR64 reloc. The symbol gives us the
13385 proper TOC base to use. */
13386 if (rel->r_info == ELF64_R_INFO (0, R_PPC64_TOC)
c316a17c
AM
13387 && wrel != relocs
13388 && ELF64_R_TYPE (wrel[-1].r_info) == R_PPC64_ADDR64
ee87f2da 13389 && is_opd)
c316a17c 13390 r_symndx = ELF64_R_SYM (wrel[-1].r_info);
ee87f2da 13391
4ce794b7
AM
13392 sym = NULL;
13393 sec = NULL;
039b3fef 13394 h_elf = NULL;
4ce794b7 13395 sym_name = NULL;
b34976b6
AM
13396 unresolved_reloc = FALSE;
13397 warned = FALSE;
65f38f15 13398
0b13192e 13399 if (r_symndx < symtab_hdr->sh_info)
5bd4f169
AM
13400 {
13401 /* It's a local symbol. */
74f0fb50 13402 struct _opd_sec_data *opd;
4025353c 13403
5bd4f169
AM
13404 sym = local_syms + r_symndx;
13405 sec = local_sections[r_symndx];
26c61ae5 13406 sym_name = bfd_elf_sym_name (input_bfd, symtab_hdr, sym, sec);
0d4792f7 13407 sym_type = ELF64_ST_TYPE (sym->st_info);
8517fae7 13408 relocation = _bfd_elf_rela_local_sym (output_bfd, sym, &sec, rel);
74f0fb50
AM
13409 opd = get_opd_info (sec);
13410 if (opd != NULL && opd->adjust != NULL)
1e2f5b6e 13411 {
51aecdc5
AM
13412 long adjust = opd->adjust[OPD_NDX (sym->st_value
13413 + rel->r_addend)];
4025353c
AM
13414 if (adjust == -1)
13415 relocation = 0;
13416 else
4cc603a5
AM
13417 {
13418 /* If this is a relocation against the opd section sym
13419 and we have edited .opd, adjust the reloc addend so
13420 that ld -r and ld --emit-relocs output is correct.
13421 If it is a reloc against some other .opd symbol,
13422 then the symbol value will be adjusted later. */
13423 if (ELF_ST_TYPE (sym->st_info) == STT_SECTION)
13424 rel->r_addend += adjust;
13425 else
13426 relocation += adjust;
13427 }
1e2f5b6e 13428 }
5bd4f169
AM
13429 }
13430 else
13431 {
62d887d4
L
13432 bfd_boolean ignored;
13433
b2a8e766
AM
13434 RELOC_FOR_GLOBAL_SYMBOL (info, input_bfd, input_section, rel,
13435 r_symndx, symtab_hdr, sym_hashes,
039b3fef 13436 h_elf, sec, relocation,
62d887d4 13437 unresolved_reloc, warned, ignored);
039b3fef
AM
13438 sym_name = h_elf->root.root.string;
13439 sym_type = h_elf->type;
b69fdb4e
AM
13440 if (sec != NULL
13441 && sec->owner == output_bfd
13442 && strcmp (sec->name, ".opd") == 0)
13443 {
13444 /* This is a symbol defined in a linker script. All
13445 such are defined in output sections, even those
13446 defined by simple assignment from a symbol defined in
13447 an input section. Transfer the symbol to an
13448 appropriate input .opd section, so that a branch to
13449 this symbol will be mapped to the location specified
13450 by the opd entry. */
13451 struct bfd_link_order *lo;
13452 for (lo = sec->map_head.link_order; lo != NULL; lo = lo->next)
13453 if (lo->type == bfd_indirect_link_order)
13454 {
13455 asection *isec = lo->u.indirect.section;
13456 if (h_elf->root.u.def.value >= isec->output_offset
13457 && h_elf->root.u.def.value < (isec->output_offset
13458 + isec->size))
13459 {
13460 h_elf->root.u.def.value -= isec->output_offset;
13461 h_elf->root.u.def.section = isec;
13462 sec = isec;
13463 break;
13464 }
13465 }
13466 }
5bd4f169 13467 }
039b3fef 13468 h = (struct ppc_link_hash_entry *) h_elf;
5bd4f169 13469
dbaa2011 13470 if (sec != NULL && discarded_section (sec))
c316a17c
AM
13471 {
13472 _bfd_clear_contents (ppc64_elf_howto_table[r_type],
13473 input_bfd, input_section,
13474 contents + rel->r_offset);
13475 wrel->r_offset = rel->r_offset;
13476 wrel->r_info = 0;
13477 wrel->r_addend = 0;
13478
13479 /* For ld -r, remove relocations in debug sections against
13480 sections defined in discarded sections. Not done for
13481 non-debug to preserve relocs in .eh_frame which the
13482 eh_frame editing code expects to be present. */
13483 if (bfd_link_relocatable (info)
13484 && (input_section->flags & SEC_DEBUGGING))
13485 wrel--;
13486
13487 continue;
13488 }
ab96bf03 13489
0e1862bb 13490 if (bfd_link_relocatable (info))
c316a17c 13491 goto copy_reloc;
ab96bf03 13492
f40da81b
AM
13493 if (h != NULL && &h->elf == htab->elf.hgot)
13494 {
6f20ed8a 13495 relocation = TOCstart + htab->sec_info[input_section->id].toc_off;
f40da81b
AM
13496 sec = bfd_abs_section_ptr;
13497 unresolved_reloc = FALSE;
13498 }
13499
951fd09b
AM
13500 /* TLS optimizations. Replace instruction sequences and relocs
13501 based on information we collected in tls_optimize. We edit
13502 RELOCS so that --emit-relocs will output something sensible
13503 for the final instruction stream. */
13504 tls_mask = 0;
13505 tls_gd = 0;
0d4792f7 13506 toc_symndx = 0;
727fc41e
AM
13507 if (h != NULL)
13508 tls_mask = h->tls_mask;
13509 else if (local_got_ents != NULL)
411e1bfb 13510 {
e054468f
AM
13511 struct plt_entry **local_plt = (struct plt_entry **)
13512 (local_got_ents + symtab_hdr->sh_info);
f961d9dd 13513 unsigned char *lgot_masks = (unsigned char *)
e054468f 13514 (local_plt + symtab_hdr->sh_info);
727fc41e
AM
13515 tls_mask = lgot_masks[r_symndx];
13516 }
13517 if (tls_mask == 0
13518 && (r_type == R_PPC64_TLS
13519 || r_type == R_PPC64_TLSGD
13520 || r_type == R_PPC64_TLSLD))
13521 {
13522 /* Check for toc tls entries. */
f961d9dd 13523 unsigned char *toc_tls;
0d4792f7 13524
727fc41e
AM
13525 if (!get_tls_mask (&toc_tls, &toc_symndx, &toc_addend,
13526 &local_syms, rel, input_bfd))
13527 return FALSE;
0d4792f7 13528
727fc41e
AM
13529 if (toc_tls)
13530 tls_mask = *toc_tls;
0d4792f7
AM
13531 }
13532
13533 /* Check that tls relocs are used with tls syms, and non-tls
13534 relocs are used with non-tls syms. */
cf35638d 13535 if (r_symndx != STN_UNDEF
0d4792f7
AM
13536 && r_type != R_PPC64_NONE
13537 && (h == NULL
039b3fef
AM
13538 || h->elf.root.type == bfd_link_hash_defined
13539 || h->elf.root.type == bfd_link_hash_defweak)
1d483afe
AM
13540 && (IS_PPC64_TLS_RELOC (r_type)
13541 != (sym_type == STT_TLS
13542 || (sym_type == STT_SECTION
13543 && (sec->flags & SEC_THREAD_LOCAL) != 0))))
0d4792f7 13544 {
727fc41e
AM
13545 if (tls_mask != 0
13546 && (r_type == R_PPC64_TLS
13547 || r_type == R_PPC64_TLSGD
13548 || r_type == R_PPC64_TLSLD))
0d4792f7
AM
13549 /* R_PPC64_TLS is OK against a symbol in the TOC. */
13550 ;
13551 else
25f53a85 13552 info->callbacks->einfo
1d483afe 13553 (!IS_PPC64_TLS_RELOC (r_type)
bc30df16
AM
13554 ? _("%P: %H: %s used with TLS symbol `%T'\n")
13555 : _("%P: %H: %s used with non-TLS symbol `%T'\n"),
25f53a85 13556 input_bfd, input_section, rel->r_offset,
0d4792f7
AM
13557 ppc64_elf_howto_table[r_type]->name,
13558 sym_name);
411e1bfb
AM
13559 }
13560
13561 /* Ensure reloc mapping code below stays sane. */
13562 if (R_PPC64_TOC16_LO_DS != R_PPC64_TOC16_DS + 1
13563 || R_PPC64_TOC16_LO != R_PPC64_TOC16 + 1
13564 || (R_PPC64_GOT_TLSLD16 & 3) != (R_PPC64_GOT_TLSGD16 & 3)
13565 || (R_PPC64_GOT_TLSLD16_LO & 3) != (R_PPC64_GOT_TLSGD16_LO & 3)
13566 || (R_PPC64_GOT_TLSLD16_HI & 3) != (R_PPC64_GOT_TLSGD16_HI & 3)
13567 || (R_PPC64_GOT_TLSLD16_HA & 3) != (R_PPC64_GOT_TLSGD16_HA & 3)
13568 || (R_PPC64_GOT_TLSLD16 & 3) != (R_PPC64_GOT_TPREL16_DS & 3)
13569 || (R_PPC64_GOT_TLSLD16_LO & 3) != (R_PPC64_GOT_TPREL16_LO_DS & 3)
13570 || (R_PPC64_GOT_TLSLD16_HI & 3) != (R_PPC64_GOT_TPREL16_HI & 3)
13571 || (R_PPC64_GOT_TLSLD16_HA & 3) != (R_PPC64_GOT_TPREL16_HA & 3))
13572 abort ();
0d4792f7 13573
411e1bfb
AM
13574 switch (r_type)
13575 {
13576 default:
411e1bfb
AM
13577 break;
13578
ba761f19
AM
13579 case R_PPC64_LO_DS_OPT:
13580 insn = bfd_get_32 (output_bfd, contents + rel->r_offset - d_offset);
13581 if ((insn & (0x3f << 26)) != 58u << 26)
13582 abort ();
13583 insn += (14u << 26) - (58u << 26);
13584 bfd_put_32 (output_bfd, insn, contents + rel->r_offset - d_offset);
13585 r_type = R_PPC64_TOC16_LO;
13586 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
13587 break;
13588
411e1bfb
AM
13589 case R_PPC64_TOC16:
13590 case R_PPC64_TOC16_LO:
13591 case R_PPC64_TOC16_DS:
13592 case R_PPC64_TOC16_LO_DS:
411e1bfb
AM
13593 {
13594 /* Check for toc tls entries. */
f961d9dd 13595 unsigned char *toc_tls;
951fd09b 13596 int retval;
411e1bfb 13597
3a71aa26
AM
13598 retval = get_tls_mask (&toc_tls, &toc_symndx, &toc_addend,
13599 &local_syms, rel, input_bfd);
951fd09b 13600 if (retval == 0)
411e1bfb
AM
13601 return FALSE;
13602
13603 if (toc_tls)
13604 {
951fd09b 13605 tls_mask = *toc_tls;
411e1bfb
AM
13606 if (r_type == R_PPC64_TOC16_DS
13607 || r_type == R_PPC64_TOC16_LO_DS)
81407a69
AM
13608 {
13609 if (tls_mask != 0
13610 && (tls_mask & (TLS_DTPREL | TLS_TPREL)) == 0)
13611 goto toctprel;
13612 }
411e1bfb 13613 else
951fd09b
AM
13614 {
13615 /* If we found a GD reloc pair, then we might be
13616 doing a GD->IE transition. */
13617 if (retval == 2)
13618 {
13619 tls_gd = TLS_TPRELGD;
13620 if (tls_mask != 0 && (tls_mask & TLS_GD) == 0)
102890f0 13621 goto tls_ldgd_opt;
951fd09b
AM
13622 }
13623 else if (retval == 3)
13624 {
13625 if (tls_mask != 0 && (tls_mask & TLS_LD) == 0)
102890f0 13626 goto tls_ldgd_opt;
951fd09b
AM
13627 }
13628 }
411e1bfb
AM
13629 }
13630 }
13631 break;
13632
9d6ded02
AM
13633 case R_PPC64_GOT_TPREL16_HI:
13634 case R_PPC64_GOT_TPREL16_HA:
13635 if (tls_mask != 0
13636 && (tls_mask & TLS_TPREL) == 0)
13637 {
13638 rel->r_offset -= d_offset;
13639 bfd_put_32 (output_bfd, NOP, contents + rel->r_offset);
13640 r_type = R_PPC64_NONE;
13641 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
13642 }
13643 break;
13644
411e1bfb
AM
13645 case R_PPC64_GOT_TPREL16_DS:
13646 case R_PPC64_GOT_TPREL16_LO_DS:
951fd09b
AM
13647 if (tls_mask != 0
13648 && (tls_mask & TLS_TPREL) == 0)
411e1bfb 13649 {
81407a69 13650 toctprel:
c316a17c
AM
13651 insn = bfd_get_32 (output_bfd,
13652 contents + rel->r_offset - d_offset);
411e1bfb
AM
13653 insn &= 31 << 21;
13654 insn |= 0x3c0d0000; /* addis 0,13,0 */
c316a17c
AM
13655 bfd_put_32 (output_bfd, insn,
13656 contents + rel->r_offset - d_offset);
411e1bfb 13657 r_type = R_PPC64_TPREL16_HA;
0d4792f7
AM
13658 if (toc_symndx != 0)
13659 {
13660 rel->r_info = ELF64_R_INFO (toc_symndx, r_type);
3a71aa26 13661 rel->r_addend = toc_addend;
0d4792f7
AM
13662 /* We changed the symbol. Start over in order to
13663 get h, sym, sec etc. right. */
c316a17c 13664 goto again;
0d4792f7
AM
13665 }
13666 else
13667 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
411e1bfb
AM
13668 }
13669 break;
13670
13671 case R_PPC64_TLS:
951fd09b
AM
13672 if (tls_mask != 0
13673 && (tls_mask & TLS_TPREL) == 0)
411e1bfb 13674 {
411e1bfb 13675 insn = bfd_get_32 (output_bfd, contents + rel->r_offset);
2d0f3896
AM
13676 insn = _bfd_elf_ppc_at_tls_transform (insn, 13);
13677 if (insn == 0)
411e1bfb 13678 abort ();
411e1bfb 13679 bfd_put_32 (output_bfd, insn, contents + rel->r_offset);
411e1bfb 13680 /* Was PPC64_TLS which sits on insn boundary, now
4fe5ca5b
GM
13681 PPC64_TPREL16_LO which is at low-order half-word. */
13682 rel->r_offset += d_offset;
0d4792f7
AM
13683 r_type = R_PPC64_TPREL16_LO;
13684 if (toc_symndx != 0)
13685 {
13686 rel->r_info = ELF64_R_INFO (toc_symndx, r_type);
3a71aa26 13687 rel->r_addend = toc_addend;
0d4792f7
AM
13688 /* We changed the symbol. Start over in order to
13689 get h, sym, sec etc. right. */
c316a17c 13690 goto again;
0d4792f7
AM
13691 }
13692 else
13693 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
411e1bfb
AM
13694 }
13695 break;
13696
411e1bfb
AM
13697 case R_PPC64_GOT_TLSGD16_HI:
13698 case R_PPC64_GOT_TLSGD16_HA:
951fd09b
AM
13699 tls_gd = TLS_TPRELGD;
13700 if (tls_mask != 0 && (tls_mask & TLS_GD) == 0)
13701 goto tls_gdld_hi;
13702 break;
13703
411e1bfb
AM
13704 case R_PPC64_GOT_TLSLD16_HI:
13705 case R_PPC64_GOT_TLSLD16_HA:
951fd09b 13706 if (tls_mask != 0 && (tls_mask & TLS_LD) == 0)
411e1bfb 13707 {
951fd09b
AM
13708 tls_gdld_hi:
13709 if ((tls_mask & tls_gd) != 0)
13710 r_type = (((r_type - (R_PPC64_GOT_TLSGD16 & 3)) & 3)
13711 + R_PPC64_GOT_TPREL16_DS);
13712 else
411e1bfb 13713 {
4fe5ca5b 13714 rel->r_offset -= d_offset;
727ac201 13715 bfd_put_32 (output_bfd, NOP, contents + rel->r_offset);
951fd09b 13716 r_type = R_PPC64_NONE;
411e1bfb 13717 }
951fd09b 13718 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
411e1bfb
AM
13719 }
13720 break;
13721
951fd09b
AM
13722 case R_PPC64_GOT_TLSGD16:
13723 case R_PPC64_GOT_TLSGD16_LO:
13724 tls_gd = TLS_TPRELGD;
13725 if (tls_mask != 0 && (tls_mask & TLS_GD) == 0)
102890f0 13726 goto tls_ldgd_opt;
951fd09b 13727 break;
411e1bfb 13728
951fd09b
AM
13729 case R_PPC64_GOT_TLSLD16:
13730 case R_PPC64_GOT_TLSLD16_LO:
13731 if (tls_mask != 0 && (tls_mask & TLS_LD) == 0)
13732 {
3a71aa26 13733 unsigned int insn1, insn2, insn3;
102890f0
AM
13734 bfd_vma offset;
13735
13736 tls_ldgd_opt:
727fc41e
AM
13737 offset = (bfd_vma) -1;
13738 /* If not using the newer R_PPC64_TLSGD/LD to mark
13739 __tls_get_addr calls, we must trust that the call
13740 stays with its arg setup insns, ie. that the next
13741 reloc is the __tls_get_addr call associated with
13742 the current reloc. Edit both insns. */
13743 if (input_section->has_tls_get_addr_call
13744 && rel + 1 < relend
13745 && branch_reloc_hash_match (input_bfd, rel + 1,
13746 htab->tls_get_addr,
13747 htab->tls_get_addr_fd))
13748 offset = rel[1].r_offset;
b86ac8e3
AM
13749 /* We read the low GOT_TLS (or TOC16) insn because we
13750 need to keep the destination reg. It may be
13751 something other than the usual r3, and moved to r3
13752 before the call by intervening code. */
13753 insn1 = bfd_get_32 (output_bfd,
13754 contents + rel->r_offset - d_offset);
102890f0 13755 if ((tls_mask & tls_gd) != 0)
411e1bfb 13756 {
102890f0 13757 /* IE */
b86ac8e3 13758 insn1 &= (0x1f << 21) | (0x1f << 16);
102890f0
AM
13759 insn1 |= 58 << 26; /* ld */
13760 insn2 = 0x7c636a14; /* add 3,3,13 */
727fc41e 13761 if (offset != (bfd_vma) -1)
f58d5a2d 13762 rel[1].r_info = ELF64_R_INFO (STN_UNDEF, R_PPC64_NONE);
102890f0
AM
13763 if ((tls_mask & TLS_EXPLICIT) == 0)
13764 r_type = (((r_type - (R_PPC64_GOT_TLSGD16 & 3)) & 3)
13765 + R_PPC64_GOT_TPREL16_DS);
411e1bfb 13766 else
102890f0
AM
13767 r_type += R_PPC64_TOC16_DS - R_PPC64_TOC16;
13768 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
13769 }
13770 else
13771 {
13772 /* LE */
b86ac8e3
AM
13773 insn1 &= 0x1f << 21;
13774 insn1 |= 0x3c0d0000; /* addis r,13,0 */
102890f0
AM
13775 insn2 = 0x38630000; /* addi 3,3,0 */
13776 if (tls_gd == 0)
951fd09b 13777 {
102890f0 13778 /* Was an LD reloc. */
1d483afe
AM
13779 if (toc_symndx)
13780 sec = local_sections[toc_symndx];
13781 for (r_symndx = 0;
13782 r_symndx < symtab_hdr->sh_info;
13783 r_symndx++)
13784 if (local_sections[r_symndx] == sec)
13785 break;
13786 if (r_symndx >= symtab_hdr->sh_info)
cf35638d 13787 r_symndx = STN_UNDEF;
102890f0 13788 rel->r_addend = htab->elf.tls_sec->vma + DTP_OFFSET;
cf35638d 13789 if (r_symndx != STN_UNDEF)
1d483afe
AM
13790 rel->r_addend -= (local_syms[r_symndx].st_value
13791 + sec->output_offset
13792 + sec->output_section->vma);
951fd09b 13793 }
102890f0 13794 else if (toc_symndx != 0)
3a71aa26
AM
13795 {
13796 r_symndx = toc_symndx;
13797 rel->r_addend = toc_addend;
13798 }
102890f0
AM
13799 r_type = R_PPC64_TPREL16_HA;
13800 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
727fc41e
AM
13801 if (offset != (bfd_vma) -1)
13802 {
13803 rel[1].r_info = ELF64_R_INFO (r_symndx,
13804 R_PPC64_TPREL16_LO);
13805 rel[1].r_offset = offset + d_offset;
13806 rel[1].r_addend = rel->r_addend;
13807 }
102890f0 13808 }
3a71aa26
AM
13809 bfd_put_32 (output_bfd, insn1,
13810 contents + rel->r_offset - d_offset);
727fc41e
AM
13811 if (offset != (bfd_vma) -1)
13812 {
13813 insn3 = bfd_get_32 (output_bfd,
13814 contents + offset + 4);
13815 if (insn3 == NOP
13816 || insn3 == CROR_151515 || insn3 == CROR_313131)
13817 {
13818 rel[1].r_offset += 4;
13819 bfd_put_32 (output_bfd, insn2, contents + offset + 4);
13820 insn2 = NOP;
13821 }
13822 bfd_put_32 (output_bfd, insn2, contents + offset);
13823 }
13824 if ((tls_mask & tls_gd) == 0
13825 && (tls_gd == 0 || toc_symndx != 0))
13826 {
13827 /* We changed the symbol. Start over in order
13828 to get h, sym, sec etc. right. */
c316a17c 13829 goto again;
727fc41e
AM
13830 }
13831 }
13832 break;
13833
13834 case R_PPC64_TLSGD:
13835 if (tls_mask != 0 && (tls_mask & TLS_GD) == 0)
13836 {
13837 unsigned int insn2, insn3;
13838 bfd_vma offset = rel->r_offset;
13839
13840 if ((tls_mask & TLS_TPRELGD) != 0)
13841 {
13842 /* IE */
13843 r_type = R_PPC64_NONE;
13844 insn2 = 0x7c636a14; /* add 3,3,13 */
13845 }
13846 else
13847 {
13848 /* LE */
13849 if (toc_symndx != 0)
13850 {
13851 r_symndx = toc_symndx;
13852 rel->r_addend = toc_addend;
13853 }
13854 r_type = R_PPC64_TPREL16_LO;
13855 rel->r_offset = offset + d_offset;
13856 insn2 = 0x38630000; /* addi 3,3,0 */
13857 }
13858 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
13859 /* Zap the reloc on the _tls_get_addr call too. */
13860 BFD_ASSERT (offset == rel[1].r_offset);
f58d5a2d 13861 rel[1].r_info = ELF64_R_INFO (STN_UNDEF, R_PPC64_NONE);
3a71aa26
AM
13862 insn3 = bfd_get_32 (output_bfd,
13863 contents + offset + 4);
102890f0
AM
13864 if (insn3 == NOP
13865 || insn3 == CROR_151515 || insn3 == CROR_313131)
13866 {
727fc41e 13867 rel->r_offset += 4;
3a71aa26
AM
13868 bfd_put_32 (output_bfd, insn2, contents + offset + 4);
13869 insn2 = NOP;
102890f0 13870 }
102890f0 13871 bfd_put_32 (output_bfd, insn2, contents + offset);
727fc41e 13872 if ((tls_mask & TLS_TPRELGD) == 0 && toc_symndx != 0)
c316a17c 13873 goto again;
411e1bfb 13874 }
411e1bfb
AM
13875 break;
13876
727fc41e
AM
13877 case R_PPC64_TLSLD:
13878 if (tls_mask != 0 && (tls_mask & TLS_LD) == 0)
13879 {
13880 unsigned int insn2, insn3;
13881 bfd_vma offset = rel->r_offset;
13882
13883 if (toc_symndx)
13884 sec = local_sections[toc_symndx];
13885 for (r_symndx = 0;
13886 r_symndx < symtab_hdr->sh_info;
13887 r_symndx++)
13888 if (local_sections[r_symndx] == sec)
13889 break;
13890 if (r_symndx >= symtab_hdr->sh_info)
cf35638d 13891 r_symndx = STN_UNDEF;
727fc41e 13892 rel->r_addend = htab->elf.tls_sec->vma + DTP_OFFSET;
cf35638d 13893 if (r_symndx != STN_UNDEF)
727fc41e
AM
13894 rel->r_addend -= (local_syms[r_symndx].st_value
13895 + sec->output_offset
13896 + sec->output_section->vma);
13897
13898 r_type = R_PPC64_TPREL16_LO;
13899 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
13900 rel->r_offset = offset + d_offset;
13901 /* Zap the reloc on the _tls_get_addr call too. */
13902 BFD_ASSERT (offset == rel[1].r_offset);
f58d5a2d 13903 rel[1].r_info = ELF64_R_INFO (STN_UNDEF, R_PPC64_NONE);
727fc41e
AM
13904 insn2 = 0x38630000; /* addi 3,3,0 */
13905 insn3 = bfd_get_32 (output_bfd,
13906 contents + offset + 4);
13907 if (insn3 == NOP
13908 || insn3 == CROR_151515 || insn3 == CROR_313131)
13909 {
13910 rel->r_offset += 4;
13911 bfd_put_32 (output_bfd, insn2, contents + offset + 4);
13912 insn2 = NOP;
13913 }
13914 bfd_put_32 (output_bfd, insn2, contents + offset);
c316a17c 13915 goto again;
727fc41e
AM
13916 }
13917 break;
13918
411e1bfb 13919 case R_PPC64_DTPMOD64:
951fd09b
AM
13920 if (rel + 1 < relend
13921 && rel[1].r_info == ELF64_R_INFO (r_symndx, R_PPC64_DTPREL64)
13922 && rel[1].r_offset == rel->r_offset + 8)
411e1bfb 13923 {
951fd09b
AM
13924 if ((tls_mask & TLS_GD) == 0)
13925 {
13926 rel[1].r_info = ELF64_R_INFO (r_symndx, R_PPC64_NONE);
13927 if ((tls_mask & TLS_TPRELGD) != 0)
13928 r_type = R_PPC64_TPREL64;
13929 else
13930 {
4ce794b7 13931 bfd_put_64 (output_bfd, 1, contents + rel->r_offset);
951fd09b
AM
13932 r_type = R_PPC64_NONE;
13933 }
13934 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
13935 }
13936 }
13937 else
13938 {
13939 if ((tls_mask & TLS_LD) == 0)
411e1bfb 13940 {
4ce794b7 13941 bfd_put_64 (output_bfd, 1, contents + rel->r_offset);
411e1bfb 13942 r_type = R_PPC64_NONE;
951fd09b 13943 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
411e1bfb 13944 }
411e1bfb
AM
13945 }
13946 break;
13947
13948 case R_PPC64_TPREL64:
951fd09b 13949 if ((tls_mask & TLS_TPREL) == 0)
411e1bfb
AM
13950 {
13951 r_type = R_PPC64_NONE;
13952 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
13953 }
13954 break;
52a82034 13955
006589cf
AM
13956 case R_PPC64_ENTRY:
13957 relocation = TOCstart + htab->sec_info[input_section->id].toc_off;
13958 if (!bfd_link_pic (info)
13959 && !info->traditional_format
13960 && relocation + 0x80008000 <= 0xffffffff)
13961 {
13962 unsigned int insn1, insn2;
13963
13964 insn1 = bfd_get_32 (input_bfd, contents + rel->r_offset);
13965 insn2 = bfd_get_32 (input_bfd, contents + rel->r_offset + 4);
13966 if ((insn1 & ~0xfffc) == LD_R2_0R12
13967 && insn2 == ADD_R2_R2_R12)
13968 {
13969 bfd_put_32 (output_bfd,
13970 LIS_R2 + PPC_HA (relocation),
13971 contents + rel->r_offset);
13972 bfd_put_32 (output_bfd,
13973 ADDI_R2_R2 + PPC_LO (relocation),
13974 contents + rel->r_offset + 4);
13975 }
13976 }
13977 else
13978 {
13979 relocation -= (rel->r_offset
13980 + input_section->output_offset
13981 + input_section->output_section->vma);
13982 if (relocation + 0x80008000 <= 0xffffffff)
13983 {
13984 unsigned int insn1, insn2;
13985
13986 insn1 = bfd_get_32 (input_bfd, contents + rel->r_offset);
13987 insn2 = bfd_get_32 (input_bfd, contents + rel->r_offset + 4);
13988 if ((insn1 & ~0xfffc) == LD_R2_0R12
13989 && insn2 == ADD_R2_R2_R12)
13990 {
13991 bfd_put_32 (output_bfd,
13992 ADDIS_R2_R12 + PPC_HA (relocation),
13993 contents + rel->r_offset);
13994 bfd_put_32 (output_bfd,
13995 ADDI_R2_R2 + PPC_LO (relocation),
13996 contents + rel->r_offset + 4);
13997 }
13998 }
13999 }
14000 break;
14001
52a82034
AM
14002 case R_PPC64_REL16_HA:
14003 /* If we are generating a non-PIC executable, edit
14004 . 0: addis 2,12,.TOC.-0b@ha
14005 . addi 2,2,.TOC.-0b@l
14006 used by ELFv2 global entry points to set up r2, to
14007 . lis 2,.TOC.@ha
14008 . addi 2,2,.TOC.@l
14009 if .TOC. is in range. */
0e1862bb 14010 if (!bfd_link_pic (info)
810d4e75 14011 && !info->traditional_format
006589cf 14012 && !htab->opd_abi
4f038ee5 14013 && rel->r_addend == d_offset
52a82034
AM
14014 && h != NULL && &h->elf == htab->elf.hgot
14015 && rel + 1 < relend
14016 && rel[1].r_info == ELF64_R_INFO (r_symndx, R_PPC64_REL16_LO)
14017 && rel[1].r_offset == rel->r_offset + 4
14018 && rel[1].r_addend == rel->r_addend + 4
14019 && relocation + 0x80008000 <= 0xffffffff)
14020 {
14021 unsigned int insn1, insn2;
14022 bfd_vma offset = rel->r_offset - d_offset;
14023 insn1 = bfd_get_32 (output_bfd, contents + offset);
14024 insn2 = bfd_get_32 (output_bfd, contents + offset + 4);
006589cf
AM
14025 if ((insn1 & 0xffff0000) == ADDIS_R2_R12
14026 && (insn2 & 0xffff0000) == ADDI_R2_R2)
52a82034
AM
14027 {
14028 r_type = R_PPC64_ADDR16_HA;
14029 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
14030 rel->r_addend -= d_offset;
14031 rel[1].r_info = ELF64_R_INFO (r_symndx, R_PPC64_ADDR16_LO);
14032 rel[1].r_addend -= d_offset + 4;
006589cf 14033 bfd_put_32 (output_bfd, LIS_R2, contents + offset);
52a82034
AM
14034 }
14035 }
14036 break;
411e1bfb
AM
14037 }
14038
14039 /* Handle other relocations that tweak non-addend part of insn. */
86c76c7b 14040 insn = 0;
b25116a9
AM
14041 max_br_offset = 1 << 25;
14042 addend = rel->r_addend;
bc30df16 14043 reloc_dest = DEST_NORMAL;
65f38f15 14044 switch (r_type)
5bd4f169
AM
14045 {
14046 default:
65f38f15 14047 break;
5bd4f169 14048
3b421ab3
AM
14049 case R_PPC64_TOCSAVE:
14050 if (relocation + addend == (rel->r_offset
14051 + input_section->output_offset
14052 + input_section->output_section->vma)
14053 && tocsave_find (htab, NO_INSERT,
14054 &local_syms, rel, input_bfd))
14055 {
14056 insn = bfd_get_32 (input_bfd, contents + rel->r_offset);
14057 if (insn == NOP
14058 || insn == CROR_151515 || insn == CROR_313131)
a078d95a
AM
14059 bfd_put_32 (input_bfd,
14060 STD_R2_0R1 + STK_TOC (htab),
3b421ab3
AM
14061 contents + rel->r_offset);
14062 }
14063 break;
14064
65f38f15
AM
14065 /* Branch taken prediction relocations. */
14066 case R_PPC64_ADDR14_BRTAKEN:
14067 case R_PPC64_REL14_BRTAKEN:
cedb70c5
KH
14068 insn = 0x01 << 21; /* 'y' or 't' bit, lowest bit of BO field. */
14069 /* Fall thru. */
65f38f15 14070
86c76c7b 14071 /* Branch not taken prediction relocations. */
65f38f15
AM
14072 case R_PPC64_ADDR14_BRNTAKEN:
14073 case R_PPC64_REL14_BRNTAKEN:
411e1bfb
AM
14074 insn |= bfd_get_32 (output_bfd,
14075 contents + rel->r_offset) & ~(0x01 << 21);
b25116a9 14076 /* Fall thru. */
86c76c7b 14077
b25116a9
AM
14078 case R_PPC64_REL14:
14079 max_br_offset = 1 << 15;
14080 /* Fall thru. */
5bd4f169 14081
65f38f15 14082 case R_PPC64_REL24:
ad8e1ba5
AM
14083 /* Calls to functions with a different TOC, such as calls to
14084 shared objects, need to alter the TOC pointer. This is
14085 done using a linkage stub. A REL24 branching to these
14086 linkage stubs needs to be followed by a nop, as the nop
14087 will be replaced with an instruction to restore the TOC
14088 base pointer. */
8387904d 14089 fdh = h;
b31867b6
AM
14090 if (h != NULL
14091 && h->oh != NULL
14092 && h->oh->is_func_descriptor)
14093 fdh = ppc_follow_link (h->oh);
31c76678
DK
14094 stub_entry = ppc_get_stub_entry (input_section, sec, fdh, &orig_rel,
14095 htab);
6abec6bc 14096 if (stub_entry != NULL
ad8e1ba5 14097 && (stub_entry->stub_type == ppc_stub_plt_call
794e51c0 14098 || stub_entry->stub_type == ppc_stub_plt_call_r2save
ad8e1ba5
AM
14099 || stub_entry->stub_type == ppc_stub_plt_branch_r2off
14100 || stub_entry->stub_type == ppc_stub_long_branch_r2off))
41bd81ab 14101 {
b25116a9 14102 bfd_boolean can_plt_call = FALSE;
721956f4 14103
ba8ca3e7
AM
14104 /* All of these stubs will modify r2, so there must be a
14105 branch and link followed by a nop. The nop is
14106 replaced by an insn to restore r2. */
eea6121a 14107 if (rel->r_offset + 8 <= input_section->size)
41bd81ab 14108 {
ba8ca3e7
AM
14109 unsigned long br;
14110
14111 br = bfd_get_32 (input_bfd,
14112 contents + rel->r_offset);
14113 if ((br & 1) != 0)
41bd81ab 14114 {
ba8ca3e7
AM
14115 unsigned long nop;
14116
14117 nop = bfd_get_32 (input_bfd,
14118 contents + rel->r_offset + 4);
14119 if (nop == NOP
14120 || nop == CROR_151515 || nop == CROR_313131)
a7f2871e 14121 {
ba8ca3e7
AM
14122 if (h != NULL
14123 && (h == htab->tls_get_addr_fd
14124 || h == htab->tls_get_addr)
7c9cf415 14125 && htab->params->tls_get_addr_opt)
ba8ca3e7
AM
14126 {
14127 /* Special stub used, leave nop alone. */
14128 }
14129 else
a078d95a
AM
14130 bfd_put_32 (input_bfd,
14131 LD_R2_0R1 + STK_TOC (htab),
ba8ca3e7
AM
14132 contents + rel->r_offset + 4);
14133 can_plt_call = TRUE;
a7f2871e 14134 }
41bd81ab 14135 }
5bd4f169 14136 }
721956f4 14137
ba8ca3e7 14138 if (!can_plt_call && h != NULL)
721956f4 14139 {
ba8ca3e7
AM
14140 const char *name = h->elf.root.root.string;
14141
14142 if (*name == '.')
14143 ++name;
14144
14145 if (strncmp (name, "__libc_start_main", 17) == 0
14146 && (name[17] == 0 || name[17] == '@'))
6ab189d5 14147 {
ba8ca3e7
AM
14148 /* Allow crt1 branch to go via a toc adjusting
14149 stub. Other calls that never return could do
14150 the same, if we could detect such. */
b25116a9 14151 can_plt_call = TRUE;
6ab189d5 14152 }
ba8ca3e7
AM
14153 }
14154
14155 if (!can_plt_call)
14156 {
14157 /* g++ as of 20130507 emits self-calls without a
14158 following nop. This is arguably wrong since we
14159 have conflicting information. On the one hand a
14160 global symbol and on the other a local call
14161 sequence, but don't error for this special case.
14162 It isn't possible to cheaply verify we have
14163 exactly such a call. Allow all calls to the same
14164 section. */
14165 asection *code_sec = sec;
14166
14167 if (get_opd_info (sec) != NULL)
ad8e1ba5 14168 {
ba8ca3e7
AM
14169 bfd_vma off = (relocation + addend
14170 - sec->output_section->vma
14171 - sec->output_offset);
bc30df16 14172
ba8ca3e7 14173 opd_entry_value (sec, off, &code_sec, NULL, FALSE);
ad8e1ba5 14174 }
ba8ca3e7
AM
14175 if (code_sec == input_section)
14176 can_plt_call = TRUE;
14177 }
14178
14179 if (!can_plt_call)
14180 {
4805fc55
AM
14181 if (stub_entry->stub_type == ppc_stub_plt_call
14182 || stub_entry->stub_type == ppc_stub_plt_call_r2save)
14183 info->callbacks->einfo
14184 (_("%P: %H: call to `%T' lacks nop, can't restore toc; "
14185 "recompile with -fPIC\n"),
14186 input_bfd, input_section, rel->r_offset, sym_name);
14187 else
14188 info->callbacks->einfo
14189 (_("%P: %H: call to `%T' lacks nop, can't restore toc; "
14190 "(-mcmodel=small toc adjust stub)\n"),
14191 input_bfd, input_section, rel->r_offset, sym_name);
ba8ca3e7
AM
14192
14193 bfd_set_error (bfd_error_bad_value);
14194 ret = FALSE;
721956f4
AM
14195 }
14196
b25116a9 14197 if (can_plt_call
794e51c0
AM
14198 && (stub_entry->stub_type == ppc_stub_plt_call
14199 || stub_entry->stub_type == ppc_stub_plt_call_r2save))
b25116a9
AM
14200 unresolved_reloc = FALSE;
14201 }
14202
6abec6bc
AM
14203 if ((stub_entry == NULL
14204 || stub_entry->stub_type == ppc_stub_long_branch
14205 || stub_entry->stub_type == ppc_stub_plt_branch)
8387904d
AM
14206 && get_opd_info (sec) != NULL)
14207 {
14208 /* The branch destination is the value of the opd entry. */
4cc603a5
AM
14209 bfd_vma off = (relocation + addend
14210 - sec->output_section->vma
14211 - sec->output_offset);
aef36ac1 14212 bfd_vma dest = opd_entry_value (sec, off, NULL, NULL, FALSE);
8387904d
AM
14213 if (dest != (bfd_vma) -1)
14214 {
14215 relocation = dest;
14216 addend = 0;
bc30df16 14217 reloc_dest = DEST_OPD;
8387904d
AM
14218 }
14219 }
14220
b25116a9
AM
14221 /* If the branch is out of reach we ought to have a long
14222 branch stub. */
14223 from = (rel->r_offset
14224 + input_section->output_offset
14225 + input_section->output_section->vma);
14226
6911b7dc
AM
14227 relocation += PPC64_LOCAL_ENTRY_OFFSET (fdh
14228 ? fdh->elf.other
14229 : sym->st_other);
14230
6abec6bc
AM
14231 if (stub_entry != NULL
14232 && (stub_entry->stub_type == ppc_stub_long_branch
14233 || stub_entry->stub_type == ppc_stub_plt_branch)
14234 && (r_type == R_PPC64_ADDR14_BRTAKEN
14235 || r_type == R_PPC64_ADDR14_BRNTAKEN
14236 || (relocation + addend - from + max_br_offset
14237 < 2 * max_br_offset)))
14238 /* Don't use the stub if this branch is in range. */
14239 stub_entry = NULL;
b25116a9
AM
14240
14241 if (stub_entry != NULL)
14242 {
14243 /* Munge up the value and addend so that we call the stub
14244 rather than the procedure directly. */
a4b6fadd
AM
14245 asection *stub_sec = stub_entry->group->stub_sec;
14246
14247 if (stub_entry->stub_type == ppc_stub_save_res)
14248 relocation += (stub_sec->output_offset
14249 + stub_sec->output_section->vma
14250 + stub_sec->size - htab->sfpr->size
14251 - htab->sfpr->output_offset
14252 - htab->sfpr->output_section->vma);
14253 else
14254 relocation = (stub_entry->stub_offset
14255 + stub_sec->output_offset
14256 + stub_sec->output_section->vma);
b25116a9 14257 addend = 0;
bc30df16 14258 reloc_dest = DEST_STUB;
3b421ab3 14259
794e51c0
AM
14260 if ((stub_entry->stub_type == ppc_stub_plt_call
14261 || stub_entry->stub_type == ppc_stub_plt_call_r2save)
14262 && (ALWAYS_EMIT_R2SAVE
14263 || stub_entry->stub_type == ppc_stub_plt_call_r2save)
3b421ab3
AM
14264 && rel + 1 < relend
14265 && rel[1].r_offset == rel->r_offset + 4
14266 && ELF64_R_TYPE (rel[1].r_info) == R_PPC64_TOCSAVE)
14267 relocation += 4;
b25116a9
AM
14268 }
14269
14270 if (insn != 0)
14271 {
794e51c0 14272 if (is_isa_v2)
721956f4 14273 {
b25116a9
AM
14274 /* Set 'a' bit. This is 0b00010 in BO field for branch
14275 on CR(BI) insns (BO == 001at or 011at), and 0b01000
14276 for branch on CTR insns (BO == 1a00t or 1a01t). */
14277 if ((insn & (0x14 << 21)) == (0x04 << 21))
14278 insn |= 0x02 << 21;
14279 else if ((insn & (0x14 << 21)) == (0x10 << 21))
14280 insn |= 0x08 << 21;
14281 else
14282 break;
14283 }
14284 else
14285 {
14286 /* Invert 'y' bit if not the default. */
4cc603a5 14287 if ((bfd_signed_vma) (relocation + addend - from) < 0)
b25116a9 14288 insn ^= 0x01 << 21;
721956f4 14289 }
b25116a9
AM
14290
14291 bfd_put_32 (output_bfd, insn, contents + rel->r_offset);
5bd4f169 14292 }
e86ce104 14293
06da1e8e
AM
14294 /* NOP out calls to undefined weak functions.
14295 We can thus call a weak function without first
14296 checking whether the function is defined. */
b25116a9 14297 else if (h != NULL
039b3fef 14298 && h->elf.root.type == bfd_link_hash_undefweak
766bc656 14299 && h->elf.dynindx == -1
b25116a9
AM
14300 && r_type == R_PPC64_REL24
14301 && relocation == 0
4cc603a5 14302 && addend == 0)
e86ce104 14303 {
06da1e8e 14304 bfd_put_32 (output_bfd, NOP, contents + rel->r_offset);
c316a17c 14305 goto copy_reloc;
e86ce104 14306 }
65f38f15
AM
14307 break;
14308 }
5bd4f169 14309
65f38f15 14310 /* Set `addend'. */
411e1bfb 14311 tls_type = 0;
65f38f15
AM
14312 switch (r_type)
14313 {
14314 default:
25f53a85 14315 info->callbacks->einfo
bc30df16 14316 (_("%P: %B: unknown relocation type %d for `%T'\n"),
d003868e 14317 input_bfd, (int) r_type, sym_name);
5bd4f169 14318
65f38f15 14319 bfd_set_error (bfd_error_bad_value);
b34976b6 14320 ret = FALSE;
c316a17c 14321 goto copy_reloc;
5bd4f169 14322
65f38f15 14323 case R_PPC64_NONE:
411e1bfb 14324 case R_PPC64_TLS:
727fc41e
AM
14325 case R_PPC64_TLSGD:
14326 case R_PPC64_TLSLD:
3b421ab3 14327 case R_PPC64_TOCSAVE:
04c9666a
AM
14328 case R_PPC64_GNU_VTINHERIT:
14329 case R_PPC64_GNU_VTENTRY:
006589cf 14330 case R_PPC64_ENTRY:
c316a17c 14331 goto copy_reloc;
5bd4f169
AM
14332
14333 /* GOT16 relocations. Like an ADDR16 using the symbol's
14334 address in the GOT as relocation value instead of the
411e1bfb 14335 symbol's value itself. Also, create a GOT entry for the
5bd4f169 14336 symbol and put the symbol value there. */
411e1bfb
AM
14337 case R_PPC64_GOT_TLSGD16:
14338 case R_PPC64_GOT_TLSGD16_LO:
14339 case R_PPC64_GOT_TLSGD16_HI:
14340 case R_PPC64_GOT_TLSGD16_HA:
951fd09b 14341 tls_type = TLS_TLS | TLS_GD;
411e1bfb
AM
14342 goto dogot;
14343
14344 case R_PPC64_GOT_TLSLD16:
14345 case R_PPC64_GOT_TLSLD16_LO:
14346 case R_PPC64_GOT_TLSLD16_HI:
14347 case R_PPC64_GOT_TLSLD16_HA:
951fd09b 14348 tls_type = TLS_TLS | TLS_LD;
411e1bfb
AM
14349 goto dogot;
14350
14351 case R_PPC64_GOT_TPREL16_DS:
14352 case R_PPC64_GOT_TPREL16_LO_DS:
14353 case R_PPC64_GOT_TPREL16_HI:
14354 case R_PPC64_GOT_TPREL16_HA:
14355 tls_type = TLS_TLS | TLS_TPREL;
14356 goto dogot;
14357
14358 case R_PPC64_GOT_DTPREL16_DS:
14359 case R_PPC64_GOT_DTPREL16_LO_DS:
14360 case R_PPC64_GOT_DTPREL16_HI:
14361 case R_PPC64_GOT_DTPREL16_HA:
14362 tls_type = TLS_TLS | TLS_DTPREL;
14363 goto dogot;
14364
65f38f15
AM
14365 case R_PPC64_GOT16:
14366 case R_PPC64_GOT16_LO:
14367 case R_PPC64_GOT16_HI:
14368 case R_PPC64_GOT16_HA:
14369 case R_PPC64_GOT16_DS:
14370 case R_PPC64_GOT16_LO_DS:
411e1bfb 14371 dogot:
5bd4f169
AM
14372 {
14373 /* Relocation is to the entry for this symbol in the global
14374 offset table. */
e717da7e 14375 asection *got;
d881513a 14376 bfd_vma *offp;
5bd4f169 14377 bfd_vma off;
d881513a 14378 unsigned long indx = 0;
927be08e 14379 struct got_entry *ent;
65f38f15 14380
d881513a
AM
14381 if (tls_type == (TLS_TLS | TLS_LD)
14382 && (h == NULL
f5385ebf 14383 || !h->elf.def_dynamic))
927be08e 14384 ent = ppc64_tlsld_got (input_bfd);
411e1bfb 14385 else
5bd4f169 14386 {
5bd4f169 14387
d881513a
AM
14388 if (h != NULL)
14389 {
14390 bfd_boolean dyn = htab->elf.dynamic_sections_created;
0e1862bb 14391 if (!WILL_CALL_FINISH_DYNAMIC_SYMBOL (dyn, bfd_link_pic (info),
039b3fef 14392 &h->elf)
0e1862bb 14393 || (bfd_link_pic (info)
afe397ea 14394 && SYMBOL_REFERENCES_LOCAL (info, &h->elf)))
d881513a
AM
14395 /* This is actually a static link, or it is a
14396 -Bsymbolic link and the symbol is defined
14397 locally, or the symbol was forced to be local
14398 because of a version file. */
14399 ;
14400 else
14401 {
14acf4dc 14402 BFD_ASSERT (h->elf.dynindx != -1);
039b3fef 14403 indx = h->elf.dynindx;
d881513a
AM
14404 unresolved_reloc = FALSE;
14405 }
039b3fef 14406 ent = h->elf.got.glist;
d881513a 14407 }
411e1bfb 14408 else
5bd4f169 14409 {
d881513a
AM
14410 if (local_got_ents == NULL)
14411 abort ();
14412 ent = local_got_ents[r_symndx];
5bd4f169 14413 }
d881513a
AM
14414
14415 for (; ent != NULL; ent = ent->next)
31c76678 14416 if (ent->addend == orig_rel.r_addend
e717da7e 14417 && ent->owner == input_bfd
d881513a
AM
14418 && ent->tls_type == tls_type)
14419 break;
5bd4f169 14420 }
411e1bfb 14421
927be08e
AM
14422 if (ent == NULL)
14423 abort ();
14424 if (ent->is_indirect)
14425 ent = ent->got.ent;
14426 offp = &ent->got.offset;
14427 got = ppc64_elf_tdata (ent->owner)->got;
e717da7e
AM
14428 if (got == NULL)
14429 abort ();
14430
411e1bfb
AM
14431 /* The offset must always be a multiple of 8. We use the
14432 least significant bit to record whether we have already
14433 processed this entry. */
d881513a 14434 off = *offp;
411e1bfb
AM
14435 if ((off & 1) != 0)
14436 off &= ~1;
5bd4f169
AM
14437 else
14438 {
411e1bfb
AM
14439 /* Generate relocs for the dynamic linker, except in
14440 the case of TLSLD where we'll use one entry per
14441 module. */
25f23106
AM
14442 asection *relgot;
14443 bfd_boolean ifunc;
e717da7e 14444
d881513a 14445 *offp = off | 1;
25f23106
AM
14446 relgot = NULL;
14447 ifunc = (h != NULL
14448 ? h->elf.type == STT_GNU_IFUNC
14449 : ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC);
19e08130 14450 if (ifunc)
33e44f2e 14451 relgot = htab->elf.irelplt;
0e1862bb 14452 else if ((bfd_link_pic (info) || indx != 0)
19e08130
AM
14453 && (h == NULL
14454 || (tls_type == (TLS_TLS | TLS_LD)
14455 && !h->elf.def_dynamic)
14456 || ELF_ST_VISIBILITY (h->elf.other) == STV_DEFAULT
14457 || h->elf.root.type != bfd_link_hash_undefweak))
14458 relgot = ppc64_elf_tdata (ent->owner)->relgot;
25f23106 14459 if (relgot != NULL)
5bd4f169 14460 {
e717da7e
AM
14461 outrel.r_offset = (got->output_section->vma
14462 + got->output_offset
411e1bfb 14463 + off);
4cc603a5 14464 outrel.r_addend = addend;
d881513a 14465 if (tls_type & (TLS_LD | TLS_GD))
5bd4f169 14466 {
411e1bfb 14467 outrel.r_addend = 0;
e515b051 14468 outrel.r_info = ELF64_R_INFO (indx, R_PPC64_DTPMOD64);
d881513a
AM
14469 if (tls_type == (TLS_TLS | TLS_GD))
14470 {
e717da7e
AM
14471 loc = relgot->contents;
14472 loc += (relgot->reloc_count++
d881513a
AM
14473 * sizeof (Elf64_External_Rela));
14474 bfd_elf64_swap_reloca_out (output_bfd,
14475 &outrel, loc);
e515b051 14476 outrel.r_offset += 8;
4cc603a5 14477 outrel.r_addend = addend;
d881513a
AM
14478 outrel.r_info
14479 = ELF64_R_INFO (indx, R_PPC64_DTPREL64);
d881513a 14480 }
411e1bfb 14481 }
951fd09b 14482 else if (tls_type == (TLS_TLS | TLS_DTPREL))
411e1bfb 14483 outrel.r_info = ELF64_R_INFO (indx, R_PPC64_DTPREL64);
951fd09b 14484 else if (tls_type == (TLS_TLS | TLS_TPREL))
411e1bfb 14485 outrel.r_info = ELF64_R_INFO (indx, R_PPC64_TPREL64);
25f23106
AM
14486 else if (indx != 0)
14487 outrel.r_info = ELF64_R_INFO (indx, R_PPC64_GLOB_DAT);
14488 else
81407a69 14489 {
25f23106
AM
14490 if (ifunc)
14491 outrel.r_info = ELF64_R_INFO (0, R_PPC64_IRELATIVE);
14492 else
14493 outrel.r_info = ELF64_R_INFO (0, R_PPC64_RELATIVE);
81407a69
AM
14494
14495 /* Write the .got section contents for the sake
14496 of prelink. */
e717da7e 14497 loc = got->contents + off;
23fbd6fa
JJ
14498 bfd_put_64 (output_bfd, outrel.r_addend + relocation,
14499 loc);
81407a69 14500 }
81407a69
AM
14501
14502 if (indx == 0 && tls_type != (TLS_TLS | TLS_LD))
e515b051
AM
14503 {
14504 outrel.r_addend += relocation;
14505 if (tls_type & (TLS_GD | TLS_DTPREL | TLS_TPREL))
989f9879
AM
14506 {
14507 if (htab->elf.tls_sec == NULL)
14508 outrel.r_addend = 0;
14509 else
14510 outrel.r_addend -= htab->elf.tls_sec->vma;
14511 }
e515b051 14512 }
e717da7e
AM
14513 loc = relgot->contents;
14514 loc += (relgot->reloc_count++
411e1bfb
AM
14515 * sizeof (Elf64_External_Rela));
14516 bfd_elf64_swap_reloca_out (output_bfd, &outrel, loc);
14517 }
14518
ad8e1ba5 14519 /* Init the .got section contents here if we're not
81407a69 14520 emitting a reloc. */
d881513a 14521 else
411e1bfb 14522 {
4cc603a5 14523 relocation += addend;
7b609f53
AM
14524 if (tls_type == (TLS_TLS | TLS_LD))
14525 relocation = 1;
14526 else if (tls_type != 0)
411e1bfb 14527 {
989f9879
AM
14528 if (htab->elf.tls_sec == NULL)
14529 relocation = 0;
14530 else
14531 {
14532 relocation -= htab->elf.tls_sec->vma + DTP_OFFSET;
14533 if (tls_type == (TLS_TLS | TLS_TPREL))
14534 relocation += DTP_OFFSET - TP_OFFSET;
14535 }
5bd4f169 14536
7b609f53
AM
14537 if (tls_type == (TLS_TLS | TLS_GD))
14538 {
14539 bfd_put_64 (output_bfd, relocation,
e717da7e 14540 got->contents + off + 8);
7b609f53
AM
14541 relocation = 1;
14542 }
411e1bfb 14543 }
7b609f53 14544
411e1bfb 14545 bfd_put_64 (output_bfd, relocation,
e717da7e 14546 got->contents + off);
5bd4f169
AM
14547 }
14548 }
14549
65f38f15
AM
14550 if (off >= (bfd_vma) -2)
14551 abort ();
14552
bf102f86 14553 relocation = got->output_section->vma + got->output_offset + off;
6f20ed8a 14554 addend = -(TOCstart + htab->sec_info[input_section->id].toc_off);
5bd4f169 14555 }
65f38f15
AM
14556 break;
14557
14558 case R_PPC64_PLT16_HA:
14559 case R_PPC64_PLT16_HI:
14560 case R_PPC64_PLT16_LO:
14561 case R_PPC64_PLT32:
14562 case R_PPC64_PLT64:
14563 /* Relocation is to the entry for this symbol in the
14564 procedure linkage table. */
cbf95972
AM
14565 {
14566 struct plt_entry **plt_list = NULL;
14567 if (h != NULL)
14568 plt_list = &h->elf.plt.plist;
14569 else if (local_got_ents != NULL)
14570 {
14571 struct plt_entry **local_plt = (struct plt_entry **)
14572 (local_got_ents + symtab_hdr->sh_info);
14573 unsigned char *local_got_tls_masks = (unsigned char *)
14574 (local_plt + symtab_hdr->sh_info);
14575 if ((local_got_tls_masks[r_symndx] & PLT_IFUNC) != 0)
14576 plt_list = local_plt + r_symndx;
14577 }
14578 if (plt_list)
14579 {
14580 struct plt_entry *ent;
65f38f15 14581
cbf95972
AM
14582 for (ent = *plt_list; ent != NULL; ent = ent->next)
14583 if (ent->plt.offset != (bfd_vma) -1
14584 && ent->addend == orig_rel.r_addend)
14585 {
14586 asection *plt;
14587
14588 plt = htab->elf.splt;
14589 if (!htab->elf.dynamic_sections_created
14590 || h == NULL
14591 || h->elf.dynindx == -1)
14592 plt = htab->elf.iplt;
14593 relocation = (plt->output_section->vma
14594 + plt->output_offset
14595 + ent->plt.offset);
14596 addend = 0;
14597 unresolved_reloc = FALSE;
14598 break;
14599 }
14600 }
14601 }
65f38f15 14602 break;
5bd4f169 14603
0b13192e
AM
14604 case R_PPC64_TOC:
14605 /* Relocation value is TOC base. */
14606 relocation = TOCstart;
cf35638d 14607 if (r_symndx == STN_UNDEF)
6f20ed8a 14608 relocation += htab->sec_info[input_section->id].toc_off;
8517fae7
AM
14609 else if (unresolved_reloc)
14610 ;
6f20ed8a
AM
14611 else if (sec != NULL && sec->id < htab->sec_info_arr_size)
14612 relocation += htab->sec_info[sec->id].toc_off;
0b13192e
AM
14613 else
14614 unresolved_reloc = TRUE;
ab96bf03 14615 goto dodyn;
0b13192e 14616
5bd4f169
AM
14617 /* TOC16 relocs. We want the offset relative to the TOC base,
14618 which is the address of the start of the TOC plus 0x8000.
14619 The TOC consists of sections .got, .toc, .tocbss, and .plt,
14620 in this order. */
65f38f15
AM
14621 case R_PPC64_TOC16:
14622 case R_PPC64_TOC16_LO:
14623 case R_PPC64_TOC16_HI:
14624 case R_PPC64_TOC16_DS:
14625 case R_PPC64_TOC16_LO_DS:
14626 case R_PPC64_TOC16_HA:
6f20ed8a 14627 addend -= TOCstart + htab->sec_info[input_section->id].toc_off;
5bd4f169
AM
14628 break;
14629
14630 /* Relocate against the beginning of the section. */
65f38f15
AM
14631 case R_PPC64_SECTOFF:
14632 case R_PPC64_SECTOFF_LO:
14633 case R_PPC64_SECTOFF_HI:
14634 case R_PPC64_SECTOFF_DS:
14635 case R_PPC64_SECTOFF_LO_DS:
14636 case R_PPC64_SECTOFF_HA:
4ce794b7 14637 if (sec != NULL)
65f38f15 14638 addend -= sec->output_section->vma;
5bd4f169
AM
14639 break;
14640
25f23106
AM
14641 case R_PPC64_REL16:
14642 case R_PPC64_REL16_LO:
14643 case R_PPC64_REL16_HI:
14644 case R_PPC64_REL16_HA:
a680de9a 14645 case R_PPC64_REL16DX_HA:
25f23106
AM
14646 break;
14647
721956f4
AM
14648 case R_PPC64_REL14:
14649 case R_PPC64_REL14_BRNTAKEN:
14650 case R_PPC64_REL14_BRTAKEN:
5d1634d7
AM
14651 case R_PPC64_REL24:
14652 break;
14653
411e1bfb
AM
14654 case R_PPC64_TPREL16:
14655 case R_PPC64_TPREL16_LO:
14656 case R_PPC64_TPREL16_HI:
14657 case R_PPC64_TPREL16_HA:
14658 case R_PPC64_TPREL16_DS:
14659 case R_PPC64_TPREL16_LO_DS:
f9c6b907
AM
14660 case R_PPC64_TPREL16_HIGH:
14661 case R_PPC64_TPREL16_HIGHA:
411e1bfb
AM
14662 case R_PPC64_TPREL16_HIGHER:
14663 case R_PPC64_TPREL16_HIGHERA:
14664 case R_PPC64_TPREL16_HIGHEST:
14665 case R_PPC64_TPREL16_HIGHESTA:
766bc656
AM
14666 if (h != NULL
14667 && h->elf.root.type == bfd_link_hash_undefweak
14668 && h->elf.dynindx == -1)
14669 {
14670 /* Make this relocation against an undefined weak symbol
14671 resolve to zero. This is really just a tweak, since
14672 code using weak externs ought to check that they are
14673 defined before using them. */
14674 bfd_byte *p = contents + rel->r_offset - d_offset;
14675
14676 insn = bfd_get_32 (output_bfd, p);
14677 insn = _bfd_elf_ppc_at_tprel_transform (insn, 13);
14678 if (insn != 0)
14679 bfd_put_32 (output_bfd, insn, p);
14680 break;
14681 }
989f9879
AM
14682 if (htab->elf.tls_sec != NULL)
14683 addend -= htab->elf.tls_sec->vma + TP_OFFSET;
0e1862bb 14684 if (bfd_link_pic (info))
411e1bfb
AM
14685 /* The TPREL16 relocs shouldn't really be used in shared
14686 libs as they will result in DT_TEXTREL being set, but
14687 support them anyway. */
14688 goto dodyn;
14689 break;
14690
14691 case R_PPC64_DTPREL16:
14692 case R_PPC64_DTPREL16_LO:
14693 case R_PPC64_DTPREL16_HI:
14694 case R_PPC64_DTPREL16_HA:
14695 case R_PPC64_DTPREL16_DS:
14696 case R_PPC64_DTPREL16_LO_DS:
f9c6b907
AM
14697 case R_PPC64_DTPREL16_HIGH:
14698 case R_PPC64_DTPREL16_HIGHA:
411e1bfb
AM
14699 case R_PPC64_DTPREL16_HIGHER:
14700 case R_PPC64_DTPREL16_HIGHERA:
14701 case R_PPC64_DTPREL16_HIGHEST:
14702 case R_PPC64_DTPREL16_HIGHESTA:
989f9879
AM
14703 if (htab->elf.tls_sec != NULL)
14704 addend -= htab->elf.tls_sec->vma + DTP_OFFSET;
411e1bfb
AM
14705 break;
14706
45965137
AM
14707 case R_PPC64_ADDR64_LOCAL:
14708 addend += PPC64_LOCAL_ENTRY_OFFSET (h != NULL
14709 ? h->elf.other
14710 : sym->st_other);
14711 break;
14712
e515b051
AM
14713 case R_PPC64_DTPMOD64:
14714 relocation = 1;
14715 addend = 0;
14716 goto dodyn;
14717
411e1bfb 14718 case R_PPC64_TPREL64:
989f9879
AM
14719 if (htab->elf.tls_sec != NULL)
14720 addend -= htab->elf.tls_sec->vma + TP_OFFSET;
411e1bfb
AM
14721 goto dodyn;
14722
14723 case R_PPC64_DTPREL64:
989f9879
AM
14724 if (htab->elf.tls_sec != NULL)
14725 addend -= htab->elf.tls_sec->vma + DTP_OFFSET;
411e1bfb
AM
14726 /* Fall thru */
14727
65f38f15
AM
14728 /* Relocations that may need to be propagated if this is a
14729 dynamic object. */
04c9666a 14730 case R_PPC64_REL30:
65f38f15
AM
14731 case R_PPC64_REL32:
14732 case R_PPC64_REL64:
14733 case R_PPC64_ADDR14:
14734 case R_PPC64_ADDR14_BRNTAKEN:
14735 case R_PPC64_ADDR14_BRTAKEN:
14736 case R_PPC64_ADDR16:
14737 case R_PPC64_ADDR16_DS:
14738 case R_PPC64_ADDR16_HA:
14739 case R_PPC64_ADDR16_HI:
f9c6b907
AM
14740 case R_PPC64_ADDR16_HIGH:
14741 case R_PPC64_ADDR16_HIGHA:
65f38f15
AM
14742 case R_PPC64_ADDR16_HIGHER:
14743 case R_PPC64_ADDR16_HIGHERA:
14744 case R_PPC64_ADDR16_HIGHEST:
14745 case R_PPC64_ADDR16_HIGHESTA:
14746 case R_PPC64_ADDR16_LO:
14747 case R_PPC64_ADDR16_LO_DS:
14748 case R_PPC64_ADDR24:
65f38f15
AM
14749 case R_PPC64_ADDR32:
14750 case R_PPC64_ADDR64:
14751 case R_PPC64_UADDR16:
14752 case R_PPC64_UADDR32:
14753 case R_PPC64_UADDR64:
411e1bfb 14754 dodyn:
5d1634d7 14755 if ((input_section->flags & SEC_ALLOC) == 0)
ec338859
AM
14756 break;
14757
41bd81ab
AM
14758 if (NO_OPD_RELOCS && is_opd)
14759 break;
14760
8a9e8e72
AM
14761 if (bfd_link_pic (info)
14762 ? ((h != NULL && pc_dynrelocs (h))
14763 || must_be_dyn_reloc (info, r_type))
14764 : (h != NULL
14765 ? h->dyn_relocs != NULL
d311bc8b 14766 : ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC))
65f38f15 14767 {
b34976b6 14768 bfd_boolean skip, relocate;
65f38f15 14769 asection *sreloc;
1cf1f670 14770 bfd_vma out_off;
65f38f15
AM
14771
14772 /* When generating a dynamic object, these relocations
14773 are copied into the output file to be resolved at run
14774 time. */
14775
b34976b6
AM
14776 skip = FALSE;
14777 relocate = FALSE;
65f38f15 14778
1cf1f670
AM
14779 out_off = _bfd_elf_section_offset (output_bfd, info,
14780 input_section, rel->r_offset);
14781 if (out_off == (bfd_vma) -1)
b34976b6 14782 skip = TRUE;
1cf1f670 14783 else if (out_off == (bfd_vma) -2)
b34976b6 14784 skip = TRUE, relocate = TRUE;
1cf1f670
AM
14785 out_off += (input_section->output_section->vma
14786 + input_section->output_offset);
14787 outrel.r_offset = out_off;
411e1bfb 14788 outrel.r_addend = rel->r_addend;
65f38f15 14789
1cf1f670
AM
14790 /* Optimize unaligned reloc use. */
14791 if ((r_type == R_PPC64_ADDR64 && (out_off & 7) != 0)
14792 || (r_type == R_PPC64_UADDR64 && (out_off & 7) == 0))
14793 r_type ^= R_PPC64_ADDR64 ^ R_PPC64_UADDR64;
14794 else if ((r_type == R_PPC64_ADDR32 && (out_off & 3) != 0)
14795 || (r_type == R_PPC64_UADDR32 && (out_off & 3) == 0))
14796 r_type ^= R_PPC64_ADDR32 ^ R_PPC64_UADDR32;
14797 else if ((r_type == R_PPC64_ADDR16 && (out_off & 1) != 0)
14798 || (r_type == R_PPC64_UADDR16 && (out_off & 1) == 0))
14799 r_type ^= R_PPC64_ADDR16 ^ R_PPC64_UADDR16;
14800
65f38f15 14801 if (skip)
0bb2d96a 14802 memset (&outrel, 0, sizeof outrel);
afe397ea 14803 else if (!SYMBOL_REFERENCES_LOCAL (info, &h->elf)
0b13192e
AM
14804 && !is_opd
14805 && r_type != R_PPC64_TOC)
14acf4dc
MR
14806 {
14807 BFD_ASSERT (h->elf.dynindx != -1);
14808 outrel.r_info = ELF64_R_INFO (h->elf.dynindx, r_type);
14809 }
65f38f15
AM
14810 else
14811 {
41bd81ab
AM
14812 /* This symbol is local, or marked to become local,
14813 or this is an opd section reloc which must point
14814 at a local function. */
65f38f15 14815 outrel.r_addend += relocation;
e86ce104 14816 if (r_type == R_PPC64_ADDR64 || r_type == R_PPC64_TOC)
65f38f15 14817 {
3fad3c7c 14818 if (is_opd && h != NULL)
afbe61cf
AM
14819 {
14820 /* Lie about opd entries. This case occurs
14821 when building shared libraries and we
14822 reference a function in another shared
3fad3c7c
AM
14823 lib. The same thing happens for a weak
14824 definition in an application that's
14825 overridden by a strong definition in a
14826 shared lib. (I believe this is a generic
14827 bug in binutils handling of weak syms.)
14828 In these cases we won't use the opd
1e2f5b6e 14829 entry in this lib. */
b34976b6 14830 unresolved_reloc = FALSE;
afbe61cf 14831 }
25f23106
AM
14832 if (!is_opd
14833 && r_type == R_PPC64_ADDR64
14834 && (h != NULL
14835 ? h->elf.type == STT_GNU_IFUNC
14836 : ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC))
14837 outrel.r_info = ELF64_R_INFO (0, R_PPC64_IRELATIVE);
14838 else
14839 {
14840 outrel.r_info = ELF64_R_INFO (0, R_PPC64_RELATIVE);
81407a69 14841
25f23106
AM
14842 /* We need to relocate .opd contents for ld.so.
14843 Prelink also wants simple and consistent rules
14844 for relocs. This make all RELATIVE relocs have
14845 *r_offset equal to r_addend. */
14846 relocate = TRUE;
14847 }
65f38f15
AM
14848 }
14849 else
14850 {
14851 long indx = 0;
14852
25f23106
AM
14853 if (h != NULL
14854 ? h->elf.type == STT_GNU_IFUNC
14855 : ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC)
14856 {
25f53a85 14857 info->callbacks->einfo
bc30df16
AM
14858 (_("%P: %H: %s for indirect "
14859 "function `%T' unsupported\n"),
25f53a85 14860 input_bfd, input_section, rel->r_offset,
25f23106
AM
14861 ppc64_elf_howto_table[r_type]->name,
14862 sym_name);
14863 ret = FALSE;
14864 }
cf35638d 14865 else if (r_symndx == STN_UNDEF || bfd_is_abs_section (sec))
65f38f15
AM
14866 ;
14867 else if (sec == NULL || sec->owner == NULL)
14868 {
14869 bfd_set_error (bfd_error_bad_value);
b34976b6 14870 return FALSE;
65f38f15
AM
14871 }
14872 else
14873 {
14874 asection *osec;
14875
14876 osec = sec->output_section;
14877 indx = elf_section_data (osec)->dynindx;
14878
74541ad4
AM
14879 if (indx == 0)
14880 {
14881 if ((osec->flags & SEC_READONLY) == 0
14882 && htab->elf.data_index_section != NULL)
14883 osec = htab->elf.data_index_section;
14884 else
14885 osec = htab->elf.text_index_section;
14886 indx = elf_section_data (osec)->dynindx;
14887 }
14888 BFD_ASSERT (indx != 0);
14889
65f38f15
AM
14890 /* We are turning this relocation into one
14891 against a section symbol, so subtract out
14892 the output section's address but not the
14893 offset of the input section in the output
14894 section. */
14895 outrel.r_addend -= osec->vma;
14896 }
14897
14898 outrel.r_info = ELF64_R_INFO (indx, r_type);
14899 }
14900 }
14901
14902 sreloc = elf_section_data (input_section)->sreloc;
19e08130
AM
14903 if (h != NULL
14904 ? h->elf.type == STT_GNU_IFUNC
14905 : ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC)
33e44f2e 14906 sreloc = htab->elf.irelplt;
65f38f15
AM
14907 if (sreloc == NULL)
14908 abort ();
14909
dfbb6ac9
AM
14910 if (sreloc->reloc_count * sizeof (Elf64_External_Rela)
14911 >= sreloc->size)
14912 abort ();
947216bf
AM
14913 loc = sreloc->contents;
14914 loc += sreloc->reloc_count++ * sizeof (Elf64_External_Rela);
65f38f15
AM
14915 bfd_elf64_swap_reloca_out (output_bfd, &outrel, loc);
14916
14917 /* If this reloc is against an external symbol, it will
14918 be computed at runtime, so there's no need to do
81407a69
AM
14919 anything now. However, for the sake of prelink ensure
14920 that the section contents are a known value. */
65f38f15 14921 if (! relocate)
81407a69
AM
14922 {
14923 unresolved_reloc = FALSE;
14924 /* The value chosen here is quite arbitrary as ld.so
14925 ignores section contents except for the special
14926 case of .opd where the contents might be accessed
14927 before relocation. Choose zero, as that won't
14928 cause reloc overflow. */
14929 relocation = 0;
14930 addend = 0;
14931 /* Use *r_offset == r_addend for R_PPC64_ADDR64 relocs
14932 to improve backward compatibility with older
14933 versions of ld. */
14934 if (r_type == R_PPC64_ADDR64)
14935 addend = outrel.r_addend;
14936 /* Adjust pc_relative relocs to have zero in *r_offset. */
4ce794b7 14937 else if (ppc64_elf_howto_table[r_type]->pc_relative)
000732f7
AM
14938 addend = (input_section->output_section->vma
14939 + input_section->output_offset
14940 + rel->r_offset);
81407a69 14941 }
65f38f15 14942 }
5bd4f169
AM
14943 break;
14944
65f38f15
AM
14945 case R_PPC64_COPY:
14946 case R_PPC64_GLOB_DAT:
14947 case R_PPC64_JMP_SLOT:
25f23106 14948 case R_PPC64_JMP_IREL:
65f38f15
AM
14949 case R_PPC64_RELATIVE:
14950 /* We shouldn't ever see these dynamic relocs in relocatable
14951 files. */
ae9a127f 14952 /* Fall through. */
65f38f15
AM
14953
14954 case R_PPC64_PLTGOT16:
14955 case R_PPC64_PLTGOT16_DS:
14956 case R_PPC64_PLTGOT16_HA:
14957 case R_PPC64_PLTGOT16_HI:
14958 case R_PPC64_PLTGOT16_LO:
14959 case R_PPC64_PLTGOT16_LO_DS:
14960 case R_PPC64_PLTREL32:
14961 case R_PPC64_PLTREL64:
14962 /* These ones haven't been implemented yet. */
14963
25f53a85 14964 info->callbacks->einfo
bc30df16 14965 (_("%P: %B: %s is not supported for `%T'\n"),
d003868e 14966 input_bfd,
4ce794b7 14967 ppc64_elf_howto_table[r_type]->name, sym_name);
5bd4f169
AM
14968
14969 bfd_set_error (bfd_error_invalid_operation);
b34976b6 14970 ret = FALSE;
c316a17c 14971 goto copy_reloc;
65f38f15 14972 }
5bd4f169 14973
67f0cbdb
AM
14974 /* Multi-instruction sequences that access the TOC can be
14975 optimized, eg. addis ra,r2,0; addi rb,ra,x;
14976 to nop; addi rb,r2,x; */
14977 switch (r_type)
14978 {
14979 default:
14980 break;
14981
14982 case R_PPC64_GOT_TLSLD16_HI:
14983 case R_PPC64_GOT_TLSGD16_HI:
14984 case R_PPC64_GOT_TPREL16_HI:
14985 case R_PPC64_GOT_DTPREL16_HI:
14986 case R_PPC64_GOT16_HI:
14987 case R_PPC64_TOC16_HI:
14988 /* These relocs would only be useful if building up an
14989 offset to later add to r2, perhaps in an indexed
14990 addressing mode instruction. Don't try to optimize.
14991 Unfortunately, the possibility of someone building up an
14992 offset like this or even with the HA relocs, means that
14993 we need to check the high insn when optimizing the low
14994 insn. */
14995 break;
14996
14997 case R_PPC64_GOT_TLSLD16_HA:
14998 case R_PPC64_GOT_TLSGD16_HA:
14999 case R_PPC64_GOT_TPREL16_HA:
15000 case R_PPC64_GOT_DTPREL16_HA:
15001 case R_PPC64_GOT16_HA:
15002 case R_PPC64_TOC16_HA:
98528052 15003 if (htab->do_toc_opt && relocation + addend + 0x8000 < 0x10000
560c8763 15004 && !ppc64_elf_tdata (input_bfd)->unexpected_toc_insn)
98528052
AM
15005 {
15006 bfd_byte *p = contents + (rel->r_offset & ~3);
15007 bfd_put_32 (input_bfd, NOP, p);
15008 }
67f0cbdb
AM
15009 break;
15010
15011 case R_PPC64_GOT_TLSLD16_LO:
15012 case R_PPC64_GOT_TLSGD16_LO:
15013 case R_PPC64_GOT_TPREL16_LO_DS:
15014 case R_PPC64_GOT_DTPREL16_LO_DS:
15015 case R_PPC64_GOT16_LO:
15016 case R_PPC64_GOT16_LO_DS:
15017 case R_PPC64_TOC16_LO:
15018 case R_PPC64_TOC16_LO_DS:
98528052 15019 if (htab->do_toc_opt && relocation + addend + 0x8000 < 0x10000
560c8763 15020 && !ppc64_elf_tdata (input_bfd)->unexpected_toc_insn)
67f0cbdb
AM
15021 {
15022 bfd_byte *p = contents + (rel->r_offset & ~3);
15023 insn = bfd_get_32 (input_bfd, p);
560c8763
AM
15024 if ((insn & (0x3f << 26)) == 12u << 26 /* addic */)
15025 {
15026 /* Transform addic to addi when we change reg. */
15027 insn &= ~((0x3f << 26) | (0x1f << 16));
15028 insn |= (14u << 26) | (2 << 16);
15029 }
15030 else
67f0cbdb 15031 {
98528052
AM
15032 insn &= ~(0x1f << 16);
15033 insn |= 2 << 16;
67f0cbdb 15034 }
560c8763 15035 bfd_put_32 (input_bfd, insn, p);
67f0cbdb
AM
15036 }
15037 break;
15038 }
15039
65f38f15 15040 /* Do any further special processing. */
b80eed39 15041 howto = ppc64_elf_howto_table[(int) r_type];
65f38f15
AM
15042 switch (r_type)
15043 {
15044 default:
15045 break;
15046
25f23106 15047 case R_PPC64_REL16_HA:
a680de9a 15048 case R_PPC64_REL16DX_HA:
f9c6b907
AM
15049 case R_PPC64_ADDR16_HA:
15050 case R_PPC64_ADDR16_HIGHA:
65f38f15
AM
15051 case R_PPC64_ADDR16_HIGHERA:
15052 case R_PPC64_ADDR16_HIGHESTA:
65f38f15
AM
15053 case R_PPC64_TOC16_HA:
15054 case R_PPC64_SECTOFF_HA:
411e1bfb 15055 case R_PPC64_TPREL16_HA:
f9c6b907 15056 case R_PPC64_TPREL16_HIGHA:
411e1bfb 15057 case R_PPC64_TPREL16_HIGHERA:
411e1bfb 15058 case R_PPC64_TPREL16_HIGHESTA:
f9c6b907
AM
15059 case R_PPC64_DTPREL16_HA:
15060 case R_PPC64_DTPREL16_HIGHA:
411e1bfb 15061 case R_PPC64_DTPREL16_HIGHERA:
411e1bfb 15062 case R_PPC64_DTPREL16_HIGHESTA:
65f38f15
AM
15063 /* It's just possible that this symbol is a weak symbol
15064 that's not actually defined anywhere. In that case,
15065 'sec' would be NULL, and we should leave the symbol
15066 alone (it will be set to zero elsewhere in the link). */
5c5f6e17
AM
15067 if (sec == NULL)
15068 break;
15069 /* Fall thru */
15070
15071 case R_PPC64_GOT16_HA:
15072 case R_PPC64_PLTGOT16_HA:
15073 case R_PPC64_PLT16_HA:
15074 case R_PPC64_GOT_TLSGD16_HA:
15075 case R_PPC64_GOT_TLSLD16_HA:
15076 case R_PPC64_GOT_TPREL16_HA:
15077 case R_PPC64_GOT_DTPREL16_HA:
15078 /* Add 0x10000 if sign bit in 0:15 is set.
15079 Bits 0:15 are not used. */
15080 addend += 0x8000;
65f38f15
AM
15081 break;
15082
15083 case R_PPC64_ADDR16_DS:
15084 case R_PPC64_ADDR16_LO_DS:
15085 case R_PPC64_GOT16_DS:
15086 case R_PPC64_GOT16_LO_DS:
15087 case R_PPC64_PLT16_LO_DS:
15088 case R_PPC64_SECTOFF_DS:
15089 case R_PPC64_SECTOFF_LO_DS:
15090 case R_PPC64_TOC16_DS:
15091 case R_PPC64_TOC16_LO_DS:
15092 case R_PPC64_PLTGOT16_DS:
15093 case R_PPC64_PLTGOT16_LO_DS:
411e1bfb
AM
15094 case R_PPC64_GOT_TPREL16_DS:
15095 case R_PPC64_GOT_TPREL16_LO_DS:
15096 case R_PPC64_GOT_DTPREL16_DS:
15097 case R_PPC64_GOT_DTPREL16_LO_DS:
15098 case R_PPC64_TPREL16_DS:
15099 case R_PPC64_TPREL16_LO_DS:
15100 case R_PPC64_DTPREL16_DS:
15101 case R_PPC64_DTPREL16_LO_DS:
adadcc0c
AM
15102 insn = bfd_get_32 (input_bfd, contents + (rel->r_offset & ~3));
15103 mask = 3;
a680de9a
PB
15104 /* If this reloc is against an lq, lxv, or stxv insn, then
15105 the value must be a multiple of 16. This is somewhat of
15106 a hack, but the "correct" way to do this by defining _DQ
15107 forms of all the _DS relocs bloats all reloc switches in
15108 this file. It doesn't make much sense to use these
15109 relocs in data, so testing the insn should be safe. */
15110 if ((insn & (0x3f << 26)) == (56u << 26)
15111 || ((insn & (0x3f << 26)) == (61u << 26) && (insn & 3) == 1))
adadcc0c 15112 mask = 15;
a680de9a
PB
15113 relocation += addend;
15114 addend = insn & (mask ^ 3);
15115 if ((relocation & mask) != 0)
65f38f15 15116 {
a680de9a 15117 relocation ^= relocation & mask;
25f53a85 15118 info->callbacks->einfo
8de848d8 15119 (_("%P: %H: error: %s not a multiple of %u\n"),
25f53a85 15120 input_bfd, input_section, rel->r_offset,
b80eed39 15121 howto->name,
adadcc0c 15122 mask + 1);
65f38f15 15123 bfd_set_error (bfd_error_bad_value);
b34976b6 15124 ret = FALSE;
c316a17c 15125 goto copy_reloc;
65f38f15
AM
15126 }
15127 break;
5bd4f169
AM
15128 }
15129
239e1f3a
AM
15130 /* Dynamic relocs are not propagated for SEC_DEBUGGING sections
15131 because such sections are not SEC_ALLOC and thus ld.so will
15132 not process them. */
65f38f15 15133 if (unresolved_reloc
239e1f3a 15134 && !((input_section->flags & SEC_DEBUGGING) != 0
1d5316ab
AM
15135 && h->elf.def_dynamic)
15136 && _bfd_elf_section_offset (output_bfd, info, input_section,
15137 rel->r_offset) != (bfd_vma) -1)
9c07fe7c 15138 {
25f53a85 15139 info->callbacks->einfo
bc30df16 15140 (_("%P: %H: unresolvable %s against `%T'\n"),
25f53a85 15141 input_bfd, input_section, rel->r_offset,
b80eed39 15142 howto->name,
039b3fef 15143 h->elf.root.root.string);
b34976b6 15144 ret = FALSE;
9c07fe7c 15145 }
5bd4f169 15146
b80eed39
AM
15147 /* 16-bit fields in insns mostly have signed values, but a
15148 few insns have 16-bit unsigned values. Really, we should
15149 have different reloc types. */
15150 if (howto->complain_on_overflow != complain_overflow_dont
15151 && howto->dst_mask == 0xffff
15152 && (input_section->flags & SEC_CODE) != 0)
15153 {
15154 enum complain_overflow complain = complain_overflow_signed;
15155
15156 insn = bfd_get_32 (input_bfd, contents + (rel->r_offset & ~3));
a47622ac
AM
15157 if ((insn & (0x3f << 26)) == 10u << 26 /* cmpli */)
15158 complain = complain_overflow_bitfield;
15159 else if (howto->rightshift == 0
15160 ? ((insn & (0x3f << 26)) == 28u << 26 /* andi */
15161 || (insn & (0x3f << 26)) == 24u << 26 /* ori */
15162 || (insn & (0x3f << 26)) == 26u << 26 /* xori */)
15163 : ((insn & (0x3f << 26)) == 29u << 26 /* andis */
15164 || (insn & (0x3f << 26)) == 25u << 26 /* oris */
15165 || (insn & (0x3f << 26)) == 27u << 26 /* xoris */))
b80eed39
AM
15166 complain = complain_overflow_unsigned;
15167 if (howto->complain_on_overflow != complain)
15168 {
15169 alt_howto = *howto;
15170 alt_howto.complain_on_overflow = complain;
15171 howto = &alt_howto;
15172 }
15173 }
15174
a680de9a
PB
15175 if (r_type == R_PPC64_REL16DX_HA)
15176 {
15177 /* Split field reloc isn't handled by _bfd_final_link_relocate. */
15178 if (rel->r_offset + 4 > input_section->size)
15179 r = bfd_reloc_outofrange;
15180 else
15181 {
15182 relocation += addend;
15183 relocation -= (rel->r_offset
15184 + input_section->output_offset
15185 + input_section->output_section->vma);
15186 relocation = (bfd_signed_vma) relocation >> 16;
15187 insn = bfd_get_32 (input_bfd, contents + rel->r_offset);
15188 insn &= ~0x1fffc1;
15189 insn |= (relocation & 0xffc1) | ((relocation & 0x3e) << 15);
15190 bfd_put_32 (input_bfd, insn, contents + rel->r_offset);
15191 r = bfd_reloc_ok;
15192 if (relocation + 0x8000 > 0xffff)
15193 r = bfd_reloc_overflow;
15194 }
15195 }
15196 else
15197 r = _bfd_final_link_relocate (howto, input_bfd, input_section, contents,
15198 rel->r_offset, relocation, addend);
5bd4f169 15199
ef60b7ff 15200 if (r != bfd_reloc_ok)
5bd4f169 15201 {
bc30df16 15202 char *more_info = NULL;
b80eed39 15203 const char *reloc_name = howto->name;
bc30df16
AM
15204
15205 if (reloc_dest != DEST_NORMAL)
15206 {
15207 more_info = bfd_malloc (strlen (reloc_name) + 8);
15208 if (more_info != NULL)
15209 {
15210 strcpy (more_info, reloc_name);
15211 strcat (more_info, (reloc_dest == DEST_OPD
15212 ? " (OPD)" : " (stub)"));
15213 reloc_name = more_info;
15214 }
15215 }
15216
cd27b276 15217 if (r == bfd_reloc_overflow)
5bd4f169 15218 {
8131c122
AM
15219 /* On code like "if (foo) foo();" don't report overflow
15220 on a branch to zero when foo is undefined. */
15221 if (!warned
15222 && (reloc_dest == DEST_STUB
15223 || !(h != NULL
15224 && (h->elf.root.type == bfd_link_hash_undefweak
15225 || h->elf.root.type == bfd_link_hash_undefined)
15226 && is_branch_reloc (r_type))))
1a72702b
AM
15227 info->callbacks->reloc_overflow (info, &h->elf.root,
15228 sym_name, reloc_name,
15229 orig_rel.r_addend,
15230 input_bfd, input_section,
15231 rel->r_offset);
ef60b7ff
AM
15232 }
15233 else
15234 {
25f53a85 15235 info->callbacks->einfo
bc30df16 15236 (_("%P: %H: %s against `%T': error %d\n"),
25f53a85 15237 input_bfd, input_section, rel->r_offset,
bc30df16 15238 reloc_name, sym_name, (int) r);
b34976b6 15239 ret = FALSE;
ef60b7ff 15240 }
bc30df16
AM
15241 if (more_info != NULL)
15242 free (more_info);
5bd4f169 15243 }
c316a17c
AM
15244 copy_reloc:
15245 if (wrel != rel)
15246 *wrel = *rel;
15247 }
15248
15249 if (wrel != rel)
15250 {
15251 Elf_Internal_Shdr *rel_hdr;
15252 size_t deleted = rel - wrel;
15253
15254 rel_hdr = _bfd_elf_single_rel_hdr (input_section->output_section);
15255 rel_hdr->sh_size -= rel_hdr->sh_entsize * deleted;
15256 if (rel_hdr->sh_size == 0)
15257 {
15258 /* It is too late to remove an empty reloc section. Leave
15259 one NONE reloc.
15260 ??? What is wrong with an empty section??? */
15261 rel_hdr->sh_size = rel_hdr->sh_entsize;
15262 deleted -= 1;
15263 }
15264 rel_hdr = _bfd_elf_single_rel_hdr (input_section);
15265 rel_hdr->sh_size -= rel_hdr->sh_entsize * deleted;
15266 input_section->reloc_count -= deleted;
5bd4f169
AM
15267 }
15268
645ea6a9
AM
15269 /* If we're emitting relocations, then shortly after this function
15270 returns, reloc offsets and addends for this section will be
15271 adjusted. Worse, reloc symbol indices will be for the output
8860955f
AM
15272 file rather than the input. Save a copy of the relocs for
15273 opd_entry_value. */
0e1862bb 15274 if (is_opd && (info->emitrelocations || bfd_link_relocatable (info)))
8860955f
AM
15275 {
15276 bfd_size_type amt;
15277 amt = input_section->reloc_count * sizeof (Elf_Internal_Rela);
15278 rel = bfd_alloc (input_bfd, amt);
729eabd5
AM
15279 BFD_ASSERT (ppc64_elf_tdata (input_bfd)->opd.relocs == NULL);
15280 ppc64_elf_tdata (input_bfd)->opd.relocs = rel;
8860955f
AM
15281 if (rel == NULL)
15282 return FALSE;
15283 memcpy (rel, relocs, amt);
15284 }
5bd4f169
AM
15285 return ret;
15286}
15287
754021d0
AM
15288/* Adjust the value of any local symbols in opd sections. */
15289
6e0b88f1 15290static int
754021d0
AM
15291ppc64_elf_output_symbol_hook (struct bfd_link_info *info,
15292 const char *name ATTRIBUTE_UNUSED,
15293 Elf_Internal_Sym *elfsym,
15294 asection *input_sec,
15295 struct elf_link_hash_entry *h)
15296{
74f0fb50
AM
15297 struct _opd_sec_data *opd;
15298 long adjust;
754021d0
AM
15299 bfd_vma value;
15300
4025353c 15301 if (h != NULL)
6e0b88f1 15302 return 1;
4025353c 15303
74f0fb50
AM
15304 opd = get_opd_info (input_sec);
15305 if (opd == NULL || opd->adjust == NULL)
6e0b88f1 15306 return 1;
754021d0
AM
15307
15308 value = elfsym->st_value - input_sec->output_offset;
0e1862bb 15309 if (!bfd_link_relocatable (info))
754021d0
AM
15310 value -= input_sec->output_section->vma;
15311
51aecdc5 15312 adjust = opd->adjust[OPD_NDX (value)];
4025353c 15313 if (adjust == -1)
6e0b88f1
AM
15314 return 2;
15315
15316 elfsym->st_value += adjust;
15317 return 1;
754021d0
AM
15318}
15319
5bd4f169
AM
15320/* Finish up dynamic symbol handling. We set the contents of various
15321 dynamic sections here. */
15322
b34976b6 15323static bfd_boolean
4ce794b7
AM
15324ppc64_elf_finish_dynamic_symbol (bfd *output_bfd,
15325 struct bfd_link_info *info,
15326 struct elf_link_hash_entry *h,
ab6dce23 15327 Elf_Internal_Sym *sym ATTRIBUTE_UNUSED)
5bd4f169 15328{
65f38f15 15329 struct ppc_link_hash_table *htab;
8387904d
AM
15330 struct plt_entry *ent;
15331 Elf_Internal_Rela rela;
15332 bfd_byte *loc;
5bd4f169 15333
65f38f15 15334 htab = ppc_hash_table (info);
4dfe6ac6
NC
15335 if (htab == NULL)
15336 return FALSE;
5bd4f169 15337
8387904d
AM
15338 for (ent = h->plt.plist; ent != NULL; ent = ent->next)
15339 if (ent->plt.offset != (bfd_vma) -1)
15340 {
15341 /* This symbol has an entry in the procedure linkage
15342 table. Set it up. */
e054468f
AM
15343 if (!htab->elf.dynamic_sections_created
15344 || h->dynindx == -1)
15345 {
15346 BFD_ASSERT (h->type == STT_GNU_IFUNC
15347 && h->def_regular
15348 && (h->root.type == bfd_link_hash_defined
15349 || h->root.type == bfd_link_hash_defweak));
33e44f2e
AM
15350 rela.r_offset = (htab->elf.iplt->output_section->vma
15351 + htab->elf.iplt->output_offset
25f23106 15352 + ent->plt.offset);
ee67d69a
AM
15353 if (htab->opd_abi)
15354 rela.r_info = ELF64_R_INFO (0, R_PPC64_JMP_IREL);
15355 else
15356 rela.r_info = ELF64_R_INFO (0, R_PPC64_IRELATIVE);
e054468f
AM
15357 rela.r_addend = (h->root.u.def.value
15358 + h->root.u.def.section->output_offset
15359 + h->root.u.def.section->output_section->vma
15360 + ent->addend);
33e44f2e
AM
15361 loc = (htab->elf.irelplt->contents
15362 + (htab->elf.irelplt->reloc_count++
25f23106 15363 * sizeof (Elf64_External_Rela)));
e054468f
AM
15364 }
15365 else
15366 {
33e44f2e
AM
15367 rela.r_offset = (htab->elf.splt->output_section->vma
15368 + htab->elf.splt->output_offset
25f23106 15369 + ent->plt.offset);
e054468f
AM
15370 rela.r_info = ELF64_R_INFO (h->dynindx, R_PPC64_JMP_SLOT);
15371 rela.r_addend = ent->addend;
33e44f2e 15372 loc = (htab->elf.srelplt->contents
b9e5796b
AM
15373 + ((ent->plt.offset - PLT_INITIAL_ENTRY_SIZE (htab))
15374 / PLT_ENTRY_SIZE (htab) * sizeof (Elf64_External_Rela)));
e054468f 15375 }
8387904d 15376 bfd_elf64_swap_reloca_out (output_bfd, &rela, loc);
a345bc8d
AM
15377
15378 if (!htab->opd_abi)
15379 {
15380 if (!h->def_regular)
15381 {
15382 /* Mark the symbol as undefined, rather than as
15383 defined in glink. Leave the value if there were
15384 any relocations where pointer equality matters
15385 (this is a clue for the dynamic linker, to make
15386 function pointer comparisons work between an
15387 application and shared library), otherwise set it
15388 to zero. */
15389 sym->st_shndx = SHN_UNDEF;
15390 if (!h->pointer_equality_needed)
15391 sym->st_value = 0;
15392 else if (!h->ref_regular_nonweak)
15393 {
15394 /* This breaks function pointer comparisons, but
15395 that is better than breaking tests for a NULL
15396 function pointer. */
15397 sym->st_value = 0;
15398 }
15399 }
15400 }
8387904d 15401 }
5bd4f169 15402
f5385ebf 15403 if (h->needs_copy)
5bd4f169 15404 {
65f38f15 15405 /* This symbol needs a copy reloc. Set it up. */
5bd4f169 15406
65f38f15
AM
15407 if (h->dynindx == -1
15408 || (h->root.type != bfd_link_hash_defined
15409 && h->root.type != bfd_link_hash_defweak)
4ce794b7 15410 || htab->relbss == NULL)
65f38f15 15411 abort ();
5bd4f169
AM
15412
15413 rela.r_offset = (h->root.u.def.value
15414 + h->root.u.def.section->output_section->vma
15415 + h->root.u.def.section->output_offset);
15416 rela.r_info = ELF64_R_INFO (h->dynindx, R_PPC64_COPY);
15417 rela.r_addend = 0;
4ce794b7
AM
15418 loc = htab->relbss->contents;
15419 loc += htab->relbss->reloc_count++ * sizeof (Elf64_External_Rela);
65f38f15 15420 bfd_elf64_swap_reloca_out (output_bfd, &rela, loc);
5bd4f169
AM
15421 }
15422
b34976b6 15423 return TRUE;
5bd4f169
AM
15424}
15425
65f38f15
AM
15426/* Used to decide how to sort relocs in an optimal manner for the
15427 dynamic linker, before writing them out. */
15428
15429static enum elf_reloc_type_class
7e612e98
AM
15430ppc64_elf_reloc_type_class (const struct bfd_link_info *info,
15431 const asection *rel_sec,
15432 const Elf_Internal_Rela *rela)
65f38f15 15433{
04c9666a 15434 enum elf_ppc64_reloc_type r_type;
7e612e98
AM
15435 struct ppc_link_hash_table *htab = ppc_hash_table (info);
15436
33e44f2e 15437 if (rel_sec == htab->elf.irelplt)
7e612e98 15438 return reloc_class_ifunc;
a33d1f77 15439
4ce794b7 15440 r_type = ELF64_R_TYPE (rela->r_info);
a33d1f77 15441 switch (r_type)
65f38f15
AM
15442 {
15443 case R_PPC64_RELATIVE:
15444 return reloc_class_relative;
15445 case R_PPC64_JMP_SLOT:
15446 return reloc_class_plt;
15447 case R_PPC64_COPY:
15448 return reloc_class_copy;
15449 default:
15450 return reloc_class_normal;
15451 }
15452}
15453
5bd4f169
AM
15454/* Finish up the dynamic sections. */
15455
b34976b6 15456static bfd_boolean
4ce794b7
AM
15457ppc64_elf_finish_dynamic_sections (bfd *output_bfd,
15458 struct bfd_link_info *info)
5bd4f169 15459{
65f38f15
AM
15460 struct ppc_link_hash_table *htab;
15461 bfd *dynobj;
5bd4f169 15462 asection *sdyn;
5bd4f169 15463
65f38f15 15464 htab = ppc_hash_table (info);
4dfe6ac6
NC
15465 if (htab == NULL)
15466 return FALSE;
15467
65f38f15 15468 dynobj = htab->elf.dynobj;
3d4d4302 15469 sdyn = bfd_get_linker_section (dynobj, ".dynamic");
5bd4f169 15470
65f38f15 15471 if (htab->elf.dynamic_sections_created)
5bd4f169 15472 {
5bd4f169
AM
15473 Elf64_External_Dyn *dyncon, *dynconend;
15474
33e44f2e 15475 if (sdyn == NULL || htab->elf.sgot == NULL)
65f38f15 15476 abort ();
5bd4f169
AM
15477
15478 dyncon = (Elf64_External_Dyn *) sdyn->contents;
eea6121a 15479 dynconend = (Elf64_External_Dyn *) (sdyn->contents + sdyn->size);
5bd4f169
AM
15480 for (; dyncon < dynconend; dyncon++)
15481 {
15482 Elf_Internal_Dyn dyn;
19397422 15483 asection *s;
5bd4f169
AM
15484
15485 bfd_elf64_swap_dyn_in (dynobj, dyncon, &dyn);
15486
15487 switch (dyn.d_tag)
15488 {
65f38f15
AM
15489 default:
15490 continue;
5bd4f169 15491
5d1634d7 15492 case DT_PPC64_GLINK:
4ce794b7 15493 s = htab->glink;
6348e046 15494 dyn.d_un.d_ptr = s->output_section->vma + s->output_offset;
ad8e1ba5
AM
15495 /* We stupidly defined DT_PPC64_GLINK to be the start
15496 of glink rather than the first entry point, which is
15497 what ld.so needs, and now have a bigger stub to
15498 support automatic multiple TOCs. */
b9e5796b 15499 dyn.d_un.d_ptr += GLINK_CALL_STUB_SIZE - 8 * 4;
5d1634d7
AM
15500 break;
15501
19397422
AM
15502 case DT_PPC64_OPD:
15503 s = bfd_get_section_by_name (output_bfd, ".opd");
6348e046
AM
15504 if (s == NULL)
15505 continue;
15506 dyn.d_un.d_ptr = s->vma;
19397422
AM
15507 break;
15508
e8910a83
AM
15509 case DT_PPC64_OPT:
15510 if (htab->do_multi_toc && htab->multi_toc_needed)
15511 dyn.d_un.d_val |= PPC64_OPT_MULTI_TOC;
15512 break;
15513
19397422
AM
15514 case DT_PPC64_OPDSZ:
15515 s = bfd_get_section_by_name (output_bfd, ".opd");
6348e046
AM
15516 if (s == NULL)
15517 continue;
eea6121a 15518 dyn.d_un.d_val = s->size;
19397422
AM
15519 break;
15520
65f38f15 15521 case DT_PLTGOT:
33e44f2e 15522 s = htab->elf.splt;
6348e046 15523 dyn.d_un.d_ptr = s->output_section->vma + s->output_offset;
65f38f15
AM
15524 break;
15525
15526 case DT_JMPREL:
33e44f2e 15527 s = htab->elf.srelplt;
6348e046 15528 dyn.d_un.d_ptr = s->output_section->vma + s->output_offset;
65f38f15 15529 break;
5bd4f169 15530
65f38f15 15531 case DT_PLTRELSZ:
33e44f2e 15532 dyn.d_un.d_val = htab->elf.srelplt->size;
5d1634d7
AM
15533 break;
15534
15535 case DT_RELASZ:
15536 /* Don't count procedure linkage table relocs in the
15537 overall reloc count. */
33e44f2e 15538 s = htab->elf.srelplt;
6348e046
AM
15539 if (s == NULL)
15540 continue;
eea6121a 15541 dyn.d_un.d_val -= s->size;
6348e046
AM
15542 break;
15543
15544 case DT_RELA:
15545 /* We may not be using the standard ELF linker script.
15546 If .rela.plt is the first .rela section, we adjust
15547 DT_RELA to not include it. */
33e44f2e 15548 s = htab->elf.srelplt;
6348e046
AM
15549 if (s == NULL)
15550 continue;
15551 if (dyn.d_un.d_ptr != s->output_section->vma + s->output_offset)
15552 continue;
eea6121a 15553 dyn.d_un.d_ptr += s->size;
65f38f15 15554 break;
5bd4f169 15555 }
5bd4f169 15556
65f38f15 15557 bfd_elf64_swap_dyn_out (output_bfd, &dyn, dyncon);
5bd4f169 15558 }
5bd4f169
AM
15559 }
15560
33e44f2e 15561 if (htab->elf.sgot != NULL && htab->elf.sgot->size != 0)
5d1634d7
AM
15562 {
15563 /* Fill in the first entry in the global offset table.
15564 We use it to hold the link-time TOCbase. */
15565 bfd_put_64 (output_bfd,
60ee0d4a 15566 elf_gp (output_bfd) + TOC_BASE_OFF,
33e44f2e 15567 htab->elf.sgot->contents);
5d1634d7
AM
15568
15569 /* Set .got entry size. */
33e44f2e 15570 elf_section_data (htab->elf.sgot->output_section)->this_hdr.sh_entsize = 8;
5d1634d7
AM
15571 }
15572
33e44f2e 15573 if (htab->elf.splt != NULL && htab->elf.splt->size != 0)
5d1634d7
AM
15574 {
15575 /* Set .plt entry size. */
33e44f2e 15576 elf_section_data (htab->elf.splt->output_section)->this_hdr.sh_entsize
b9e5796b 15577 = PLT_ENTRY_SIZE (htab);
5d1634d7
AM
15578 }
15579
84f5d08e
AM
15580 /* brlt is SEC_LINKER_CREATED, so we need to write out relocs for
15581 brlt ourselves if emitrelocations. */
15582 if (htab->brlt != NULL
15583 && htab->brlt->reloc_count != 0
15584 && !_bfd_elf_link_output_relocs (output_bfd,
15585 htab->brlt,
d4730f92 15586 elf_section_data (htab->brlt)->rela.hdr,
84f5d08e
AM
15587 elf_section_data (htab->brlt)->relocs,
15588 NULL))
15589 return FALSE;
15590
176a0d42
AM
15591 if (htab->glink != NULL
15592 && htab->glink->reloc_count != 0
15593 && !_bfd_elf_link_output_relocs (output_bfd,
15594 htab->glink,
d4730f92 15595 elf_section_data (htab->glink)->rela.hdr,
176a0d42
AM
15596 elf_section_data (htab->glink)->relocs,
15597 NULL))
15598 return FALSE;
15599
58d180e8 15600 if (htab->glink_eh_frame != NULL
da44f4e5
AM
15601 && htab->glink_eh_frame->size != 0)
15602 {
15603 bfd_vma val;
15604 bfd_byte *p;
15605 asection *stub_sec;
15606
15607 p = htab->glink_eh_frame->contents + sizeof (glink_eh_frame_cie);
15608 for (stub_sec = htab->params->stub_bfd->sections;
15609 stub_sec != NULL;
15610 stub_sec = stub_sec->next)
15611 if ((stub_sec->flags & SEC_LINKER_CREATED) == 0)
15612 {
15613 /* FDE length. */
15614 p += 4;
15615 /* CIE pointer. */
15616 p += 4;
15617 /* Offset to stub section. */
15618 val = (stub_sec->output_section->vma
15619 + stub_sec->output_offset);
15620 val -= (htab->glink_eh_frame->output_section->vma
15621 + htab->glink_eh_frame->output_offset
15622 + (p - htab->glink_eh_frame->contents));
15623 if (val + 0x80000000 > 0xffffffff)
15624 {
15625 info->callbacks->einfo
15626 (_("%P: %s offset too large for .eh_frame sdata4 encoding"),
15627 stub_sec->name);
15628 return FALSE;
15629 }
15630 bfd_put_32 (dynobj, val, p);
15631 p += 4;
15632 /* stub section size. */
15633 p += 4;
15634 /* Augmentation. */
15635 p += 1;
15636 /* Pad. */
15637 p += 7;
15638 }
15639 if (htab->glink != NULL && htab->glink->size != 0)
15640 {
15641 /* FDE length. */
15642 p += 4;
15643 /* CIE pointer. */
15644 p += 4;
15645 /* Offset to .glink. */
15646 val = (htab->glink->output_section->vma
15647 + htab->glink->output_offset
15648 + 8);
15649 val -= (htab->glink_eh_frame->output_section->vma
15650 + htab->glink_eh_frame->output_offset
15651 + (p - htab->glink_eh_frame->contents));
15652 if (val + 0x80000000 > 0xffffffff)
15653 {
15654 info->callbacks->einfo
15655 (_("%P: %s offset too large for .eh_frame sdata4 encoding"),
15656 htab->glink->name);
15657 return FALSE;
15658 }
15659 bfd_put_32 (dynobj, val, p);
15660 p += 4;
15661 /* .glink size. */
15662 p += 4;
15663 /* Augmentation. */
15664 p += 1;
15665 /* Ops. */
15666 p += 7;
15667 }
15668
15669 if (htab->glink_eh_frame->sec_info_type == SEC_INFO_TYPE_EH_FRAME
15670 && !_bfd_elf_write_section_eh_frame (output_bfd, info,
15671 htab->glink_eh_frame,
15672 htab->glink_eh_frame->contents))
15673 return FALSE;
15674 }
58d180e8 15675
e717da7e 15676 /* We need to handle writing out multiple GOT sections ourselves,
7b53ace3
AM
15677 since we didn't add them to DYNOBJ. We know dynobj is the first
15678 bfd. */
c72f2fb2 15679 while ((dynobj = dynobj->link.next) != NULL)
e717da7e
AM
15680 {
15681 asection *s;
7b53ace3 15682
0c8d6e5c 15683 if (!is_ppc64_elf (dynobj))
7b53ace3
AM
15684 continue;
15685
e717da7e
AM
15686 s = ppc64_elf_tdata (dynobj)->got;
15687 if (s != NULL
eea6121a 15688 && s->size != 0
e717da7e
AM
15689 && s->output_section != bfd_abs_section_ptr
15690 && !bfd_set_section_contents (output_bfd, s->output_section,
15691 s->contents, s->output_offset,
eea6121a 15692 s->size))
e717da7e
AM
15693 return FALSE;
15694 s = ppc64_elf_tdata (dynobj)->relgot;
15695 if (s != NULL
eea6121a 15696 && s->size != 0
e717da7e
AM
15697 && s->output_section != bfd_abs_section_ptr
15698 && !bfd_set_section_contents (output_bfd, s->output_section,
15699 s->contents, s->output_offset,
eea6121a 15700 s->size))
e717da7e
AM
15701 return FALSE;
15702 }
f6c52c13 15703
b34976b6 15704 return TRUE;
5bd4f169
AM
15705}
15706
5bd4f169 15707#include "elf64-target.h"
7b8e7dad
AM
15708
15709/* FreeBSD support */
15710
15711#undef TARGET_LITTLE_SYM
15712#undef TARGET_LITTLE_NAME
15713
15714#undef TARGET_BIG_SYM
6d00b590 15715#define TARGET_BIG_SYM powerpc_elf64_fbsd_vec
7b8e7dad
AM
15716#undef TARGET_BIG_NAME
15717#define TARGET_BIG_NAME "elf64-powerpc-freebsd"
15718
15719#undef ELF_OSABI
15720#define ELF_OSABI ELFOSABI_FREEBSD
15721
15722#undef elf64_bed
15723#define elf64_bed elf64_powerpc_fbsd_bed
15724
15725#include "elf64-target.h"
15726
This page took 2.783943 seconds and 4 git commands to generate.