Automatic date update in version.in
[deliverable/binutils-gdb.git] / bfd / elf64-ppc.c
CommitLineData
5bd4f169 1/* PowerPC64-specific support for 64-bit ELF.
6f2750fe 2 Copyright (C) 1999-2016 Free Software Foundation, Inc.
5bd4f169
AM
3 Written by Linus Nordberg, Swox AB <info@swox.com>,
4 based on elf32-ppc.c by Ian Lance Taylor.
32ca9640 5 Largely rewritten by Alan Modra.
5bd4f169 6
ae9a127f 7 This file is part of BFD, the Binary File Descriptor library.
5bd4f169 8
ae9a127f
NC
9 This program is free software; you can redistribute it and/or modify
10 it under the terms of the GNU General Public License as published by
cd123cb7 11 the Free Software Foundation; either version 3 of the License, or
ae9a127f 12 (at your option) any later version.
5bd4f169 13
ae9a127f
NC
14 This program is distributed in the hope that it will be useful,
15 but WITHOUT ANY WARRANTY; without even the implied warranty of
16 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
17 GNU General Public License for more details.
5bd4f169 18
4ce794b7
AM
19 You should have received a copy of the GNU General Public License along
20 with this program; if not, write to the Free Software Foundation, Inc.,
3e110533 21 51 Franklin Street - Fifth Floor, Boston, MA 02110-1301, USA. */
5bd4f169 22
cd123cb7 23
4ce794b7
AM
24/* The 64-bit PowerPC ELF ABI may be found at
25 http://www.linuxbase.org/spec/ELF/ppc64/PPC-elf64abi.txt, and
26 http://www.linuxbase.org/spec/ELF/ppc64/spec/book1.html */
5bd4f169 27
3db64b00 28#include "sysdep.h"
183e98be 29#include <stdarg.h>
5bd4f169 30#include "bfd.h"
5bd4f169
AM
31#include "bfdlink.h"
32#include "libbfd.h"
33#include "elf-bfd.h"
04c9666a 34#include "elf/ppc64.h"
5d1634d7 35#include "elf64-ppc.h"
58d180e8 36#include "dwarf2.h"
5bd4f169 37
805fc799 38static bfd_reloc_status_type ppc64_elf_ha_reloc
4ce794b7 39 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
2441e016
AM
40static bfd_reloc_status_type ppc64_elf_branch_reloc
41 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
805fc799 42static bfd_reloc_status_type ppc64_elf_brtaken_reloc
4ce794b7 43 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
805fc799 44static bfd_reloc_status_type ppc64_elf_sectoff_reloc
4ce794b7 45 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
805fc799 46static bfd_reloc_status_type ppc64_elf_sectoff_ha_reloc
4ce794b7 47 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
805fc799 48static bfd_reloc_status_type ppc64_elf_toc_reloc
4ce794b7 49 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
805fc799 50static bfd_reloc_status_type ppc64_elf_toc_ha_reloc
4ce794b7 51 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
805fc799 52static bfd_reloc_status_type ppc64_elf_toc64_reloc
4ce794b7 53 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
805fc799 54static bfd_reloc_status_type ppc64_elf_unhandled_reloc
4ce794b7 55 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
2441e016 56static bfd_vma opd_entry_value
aef36ac1 57 (asection *, bfd_vma, asection **, bfd_vma *, bfd_boolean);
5bd4f169 58
6d00b590 59#define TARGET_LITTLE_SYM powerpc_elf64_le_vec
ad8e1ba5 60#define TARGET_LITTLE_NAME "elf64-powerpcle"
6d00b590 61#define TARGET_BIG_SYM powerpc_elf64_vec
ad8e1ba5
AM
62#define TARGET_BIG_NAME "elf64-powerpc"
63#define ELF_ARCH bfd_arch_powerpc
ae95ffa6 64#define ELF_TARGET_ID PPC64_ELF_DATA
ad8e1ba5
AM
65#define ELF_MACHINE_CODE EM_PPC64
66#define ELF_MAXPAGESIZE 0x10000
04c6a44c 67#define ELF_COMMONPAGESIZE 0x10000
ad8e1ba5
AM
68#define elf_info_to_howto ppc64_elf_info_to_howto
69
70#define elf_backend_want_got_sym 0
71#define elf_backend_want_plt_sym 0
72#define elf_backend_plt_alignment 3
73#define elf_backend_plt_not_loaded 1
ad8e1ba5 74#define elf_backend_got_header_size 8
ad8e1ba5
AM
75#define elf_backend_can_gc_sections 1
76#define elf_backend_can_refcount 1
77#define elf_backend_rela_normal 1
6bfdb61b 78#define elf_backend_default_execstack 0
ad8e1ba5 79
e717da7e 80#define bfd_elf64_mkobject ppc64_elf_mkobject
ad8e1ba5 81#define bfd_elf64_bfd_reloc_type_lookup ppc64_elf_reloc_type_lookup
aa374f67 82#define bfd_elf64_bfd_reloc_name_lookup ppc64_elf_reloc_name_lookup
ee67d69a
AM
83#define bfd_elf64_bfd_merge_private_bfd_data ppc64_elf_merge_private_bfd_data
84#define bfd_elf64_bfd_print_private_bfd_data ppc64_elf_print_private_bfd_data
ad8e1ba5
AM
85#define bfd_elf64_new_section_hook ppc64_elf_new_section_hook
86#define bfd_elf64_bfd_link_hash_table_create ppc64_elf_link_hash_table_create
90e3cdf2 87#define bfd_elf64_get_synthetic_symtab ppc64_elf_get_synthetic_symtab
aa374f67 88#define bfd_elf64_bfd_link_just_syms ppc64_elf_link_just_syms
ad8e1ba5
AM
89
90#define elf_backend_object_p ppc64_elf_object_p
d37c89e5
AM
91#define elf_backend_grok_prstatus ppc64_elf_grok_prstatus
92#define elf_backend_grok_psinfo ppc64_elf_grok_psinfo
183e98be 93#define elf_backend_write_core_note ppc64_elf_write_core_note
ad8e1ba5
AM
94#define elf_backend_create_dynamic_sections ppc64_elf_create_dynamic_sections
95#define elf_backend_copy_indirect_symbol ppc64_elf_copy_indirect_symbol
555cd476 96#define elf_backend_add_symbol_hook ppc64_elf_add_symbol_hook
f6c7c3e8 97#define elf_backend_check_directives ppc64_elf_before_check_relocs
e5034e59 98#define elf_backend_notice_as_needed ppc64_elf_notice_as_needed
8387904d 99#define elf_backend_archive_symbol_lookup ppc64_elf_archive_symbol_lookup
ad8e1ba5 100#define elf_backend_check_relocs ppc64_elf_check_relocs
74f0fb50 101#define elf_backend_gc_keep ppc64_elf_gc_keep
64d03ab5 102#define elf_backend_gc_mark_dynamic_ref ppc64_elf_gc_mark_dynamic_ref
ad8e1ba5
AM
103#define elf_backend_gc_mark_hook ppc64_elf_gc_mark_hook
104#define elf_backend_gc_sweep_hook ppc64_elf_gc_sweep_hook
105#define elf_backend_adjust_dynamic_symbol ppc64_elf_adjust_dynamic_symbol
106#define elf_backend_hide_symbol ppc64_elf_hide_symbol
9f296da3 107#define elf_backend_maybe_function_sym ppc64_elf_maybe_function_sym
ad8e1ba5
AM
108#define elf_backend_always_size_sections ppc64_elf_func_desc_adjust
109#define elf_backend_size_dynamic_sections ppc64_elf_size_dynamic_sections
a345bc8d 110#define elf_backend_hash_symbol ppc64_elf_hash_symbol
74541ad4 111#define elf_backend_init_index_section _bfd_elf_init_2_index_sections
60124e18 112#define elf_backend_action_discarded ppc64_elf_action_discarded
ad8e1ba5
AM
113#define elf_backend_relocate_section ppc64_elf_relocate_section
114#define elf_backend_finish_dynamic_symbol ppc64_elf_finish_dynamic_symbol
115#define elf_backend_reloc_type_class ppc64_elf_reloc_type_class
116#define elf_backend_finish_dynamic_sections ppc64_elf_finish_dynamic_sections
754021d0 117#define elf_backend_link_output_symbol_hook ppc64_elf_output_symbol_hook
29ef7005 118#define elf_backend_special_sections ppc64_elf_special_sections
6911b7dc 119#define elf_backend_merge_symbol_attribute ppc64_elf_merge_symbol_attribute
ad8e1ba5 120
5bd4f169
AM
121/* The name of the dynamic interpreter. This is put in the .interp
122 section. */
123#define ELF_DYNAMIC_INTERPRETER "/usr/lib/ld.so.1"
124
125/* The size in bytes of an entry in the procedure linkage table. */
b9e5796b 126#define PLT_ENTRY_SIZE(htab) (htab->opd_abi ? 24 : 8)
5bd4f169
AM
127
128/* The initial size of the plt reserved for the dynamic linker. */
b9e5796b 129#define PLT_INITIAL_ENTRY_SIZE(htab) (htab->opd_abi ? 24 : 16)
5bd4f169 130
a078d95a
AM
131/* Offsets to some stack save slots. */
132#define STK_LR 16
133#define STK_TOC(htab) (htab->opd_abi ? 40 : 24)
eb8d7fda 134/* This one is dodgy. ELFv2 does not have a linker word, so use the
a078d95a
AM
135 CR save slot. Used only by optimised __tls_get_addr call stub,
136 relying on __tls_get_addr_opt not saving CR.. */
137#define STK_LINKER(htab) (htab->opd_abi ? 32 : 8)
138
5bd4f169 139/* TOC base pointers offset from start of TOC. */
411e1bfb 140#define TOC_BASE_OFF 0x8000
a27e685f
AM
141/* TOC base alignment. */
142#define TOC_BASE_ALIGN 256
411e1bfb
AM
143
144/* Offset of tp and dtp pointers from start of TLS block. */
145#define TP_OFFSET 0x7000
146#define DTP_OFFSET 0x8000
5bd4f169 147
ad8e1ba5
AM
148/* .plt call stub instructions. The normal stub is like this, but
149 sometimes the .plt entry crosses a 64k boundary and we need to
71a39c98 150 insert an addi to adjust r11. */
a078d95a 151#define STD_R2_0R1 0xf8410000 /* std %r2,0+40(%r1) */
71a39c98
AM
152#define ADDIS_R11_R2 0x3d620000 /* addis %r11,%r2,xxx@ha */
153#define LD_R12_0R11 0xe98b0000 /* ld %r12,xxx+0@l(%r11) */
154#define MTCTR_R12 0x7d8903a6 /* mtctr %r12 */
155#define LD_R2_0R11 0xe84b0000 /* ld %r2,xxx+8@l(%r11) */
156#define LD_R11_0R11 0xe96b0000 /* ld %r11,xxx+16@l(%r11) */
5d1634d7
AM
157#define BCTR 0x4e800420 /* bctr */
158
71a39c98 159#define ADDI_R11_R11 0x396b0000 /* addi %r11,%r11,off@l */
ad8e1ba5
AM
160#define ADDIS_R2_R2 0x3c420000 /* addis %r2,%r2,off@ha */
161#define ADDI_R2_R2 0x38420000 /* addi %r2,%r2,off@l */
162
71a39c98
AM
163#define XOR_R2_R12_R12 0x7d826278 /* xor %r2,%r12,%r12 */
164#define ADD_R11_R11_R2 0x7d6b1214 /* add %r11,%r11,%r2 */
165#define XOR_R11_R12_R12 0x7d8b6278 /* xor %r11,%r12,%r12 */
794e51c0
AM
166#define ADD_R2_R2_R11 0x7c425a14 /* add %r2,%r2,%r11 */
167#define CMPLDI_R2_0 0x28220000 /* cmpldi %r2,0 */
168#define BNECTR 0x4ca20420 /* bnectr+ */
169#define BNECTR_P4 0x4ce20420 /* bnectr+ */
170
71a39c98 171#define LD_R12_0R2 0xe9820000 /* ld %r12,xxx+0(%r2) */
ac2df442
AM
172#define LD_R11_0R2 0xe9620000 /* ld %r11,xxx+0(%r2) */
173#define LD_R2_0R2 0xe8420000 /* ld %r2,xxx+0(%r2) */
174
a078d95a 175#define LD_R2_0R1 0xe8410000 /* ld %r2,0(%r1) */
006589cf
AM
176#define LD_R2_0R12 0xe84c0000 /* ld %r2,0(%r12) */
177#define ADD_R2_R2_R12 0x7c426214 /* add %r2,%r2,%r12 */
ad8e1ba5 178
006589cf
AM
179#define LIS_R2 0x3c400000 /* lis %r2,xxx@ha */
180#define ADDIS_R2_R12 0x3c4c0000 /* addis %r2,%r12,xxx@ha */
181#define ADDIS_R12_R2 0x3d820000 /* addis %r12,%r2,xxx@ha */
a345bc8d
AM
182#define ADDIS_R12_R12 0x3d8c0000 /* addis %r12,%r12,xxx@ha */
183#define LD_R12_0R12 0xe98c0000 /* ld %r12,xxx@l(%r12) */
184
ee4bf8d2 185/* glink call stub instructions. We enter with the index in R0. */
ad8e1ba5 186#define GLINK_CALL_STUB_SIZE (16*4)
ee4bf8d2
AM
187 /* 0: */
188 /* .quad plt0-1f */
189 /* __glink: */
190#define MFLR_R12 0x7d8802a6 /* mflr %12 */
191#define BCL_20_31 0x429f0005 /* bcl 20,31,1f */
192 /* 1: */
193#define MFLR_R11 0x7d6802a6 /* mflr %11 */
71a39c98 194 /* ld %2,(0b-1b)(%11) */
ee4bf8d2 195#define MTLR_R12 0x7d8803a6 /* mtlr %12 */
71a39c98
AM
196#define ADD_R11_R2_R11 0x7d625a14 /* add %11,%2,%11 */
197 /* ld %12,0(%11) */
198 /* ld %2,8(%11) */
199 /* mtctr %12 */
200 /* ld %11,16(%11) */
ee4bf8d2 201 /* bctr */
b9e5796b
AM
202#define MFLR_R0 0x7c0802a6 /* mflr %r0 */
203#define MTLR_R0 0x7c0803a6 /* mtlr %r0 */
204#define SUB_R12_R12_R11 0x7d8b6050 /* subf %r12,%r11,%r12 */
205#define ADDI_R0_R12 0x380c0000 /* addi %r0,%r12,0 */
206#define SRDI_R0_R0_2 0x7800f082 /* rldicl %r0,%r0,62,2 */
5d1634d7
AM
207
208/* Pad with this. */
209#define NOP 0x60000000
210
721956f4
AM
211/* Some other nops. */
212#define CROR_151515 0x4def7b82
213#define CROR_313131 0x4ffffb82
214
cedb70c5 215/* .glink entries for the first 32k functions are two instructions. */
5d1634d7
AM
216#define LI_R0_0 0x38000000 /* li %r0,0 */
217#define B_DOT 0x48000000 /* b . */
218
219/* After that, we need two instructions to load the index, followed by
220 a branch. */
221#define LIS_R0_0 0x3c000000 /* lis %r0,0 */
10ed1bba 222#define ORI_R0_R0_0 0x60000000 /* ori %r0,%r0,0 */
41bd81ab 223
deb0e272
AM
224/* Instructions used by the save and restore reg functions. */
225#define STD_R0_0R1 0xf8010000 /* std %r0,0(%r1) */
226#define STD_R0_0R12 0xf80c0000 /* std %r0,0(%r12) */
227#define LD_R0_0R1 0xe8010000 /* ld %r0,0(%r1) */
228#define LD_R0_0R12 0xe80c0000 /* ld %r0,0(%r12) */
82bd7b59
AM
229#define STFD_FR0_0R1 0xd8010000 /* stfd %fr0,0(%r1) */
230#define LFD_FR0_0R1 0xc8010000 /* lfd %fr0,0(%r1) */
deb0e272
AM
231#define LI_R12_0 0x39800000 /* li %r12,0 */
232#define STVX_VR0_R12_R0 0x7c0c01ce /* stvx %v0,%r12,%r0 */
233#define LVX_VR0_R12_R0 0x7c0c00ce /* lvx %v0,%r12,%r0 */
234#define MTLR_R0 0x7c0803a6 /* mtlr %r0 */
82bd7b59
AM
235#define BLR 0x4e800020 /* blr */
236
41bd81ab
AM
237/* Since .opd is an array of descriptors and each entry will end up
238 with identical R_PPC64_RELATIVE relocs, there is really no need to
239 propagate .opd relocs; The dynamic linker should be taught to
1e2f5b6e 240 relocate .opd without reloc entries. */
41bd81ab
AM
241#ifndef NO_OPD_RELOCS
242#define NO_OPD_RELOCS 0
243#endif
810d4e75 244
a4b6fadd
AM
245#ifndef ARRAY_SIZE
246#define ARRAY_SIZE(a) (sizeof (a) / sizeof ((a)[0]))
247#endif
248
810d4e75
AM
249static inline int
250abiversion (bfd *abfd)
251{
252 return elf_elfheader (abfd)->e_flags & EF_PPC64_ABI;
253}
254
255static inline void
256set_abiversion (bfd *abfd, int ver)
257{
258 elf_elfheader (abfd)->e_flags &= ~EF_PPC64_ABI;
259 elf_elfheader (abfd)->e_flags |= ver & EF_PPC64_ABI;
260}
5bd4f169 261\f
f5e87a1d 262#define ONES(n) (((bfd_vma) 1 << ((n) - 1) << 1) - 1)
b34976b6 263
5bd4f169 264/* Relocation HOWTO's. */
04c9666a 265static reloc_howto_type *ppc64_elf_howto_table[(int) R_PPC64_max];
5bd4f169
AM
266
267static reloc_howto_type ppc64_elf_howto_raw[] = {
268 /* This reloc does nothing. */
269 HOWTO (R_PPC64_NONE, /* type */
270 0, /* rightshift */
6346d5ca
AM
271 3, /* size (0 = byte, 1 = short, 2 = long) */
272 0, /* bitsize */
b34976b6 273 FALSE, /* pc_relative */
5bd4f169 274 0, /* bitpos */
f5e87a1d 275 complain_overflow_dont, /* complain_on_overflow */
5bd4f169
AM
276 bfd_elf_generic_reloc, /* special_function */
277 "R_PPC64_NONE", /* name */
b34976b6 278 FALSE, /* partial_inplace */
d006db6c 279 0, /* src_mask */
5bd4f169 280 0, /* dst_mask */
b34976b6 281 FALSE), /* pcrel_offset */
5bd4f169
AM
282
283 /* A standard 32 bit relocation. */
284 HOWTO (R_PPC64_ADDR32, /* type */
285 0, /* rightshift */
286 2, /* size (0 = byte, 1 = short, 2 = long) */
287 32, /* bitsize */
b34976b6 288 FALSE, /* pc_relative */
5bd4f169
AM
289 0, /* bitpos */
290 complain_overflow_bitfield, /* complain_on_overflow */
291 bfd_elf_generic_reloc, /* special_function */
292 "R_PPC64_ADDR32", /* name */
b34976b6 293 FALSE, /* partial_inplace */
5bd4f169
AM
294 0, /* src_mask */
295 0xffffffff, /* dst_mask */
b34976b6 296 FALSE), /* pcrel_offset */
5bd4f169
AM
297
298 /* An absolute 26 bit branch; the lower two bits must be zero.
299 FIXME: we don't check that, we just clear them. */
300 HOWTO (R_PPC64_ADDR24, /* type */
301 0, /* rightshift */
302 2, /* size (0 = byte, 1 = short, 2 = long) */
303 26, /* bitsize */
b34976b6 304 FALSE, /* pc_relative */
5bd4f169
AM
305 0, /* bitpos */
306 complain_overflow_bitfield, /* complain_on_overflow */
307 bfd_elf_generic_reloc, /* special_function */
308 "R_PPC64_ADDR24", /* name */
b34976b6 309 FALSE, /* partial_inplace */
d006db6c 310 0, /* src_mask */
f5e87a1d 311 0x03fffffc, /* dst_mask */
b34976b6 312 FALSE), /* pcrel_offset */
5bd4f169
AM
313
314 /* A standard 16 bit relocation. */
315 HOWTO (R_PPC64_ADDR16, /* type */
316 0, /* rightshift */
317 1, /* size (0 = byte, 1 = short, 2 = long) */
318 16, /* bitsize */
b34976b6 319 FALSE, /* pc_relative */
5bd4f169
AM
320 0, /* bitpos */
321 complain_overflow_bitfield, /* complain_on_overflow */
322 bfd_elf_generic_reloc, /* special_function */
323 "R_PPC64_ADDR16", /* name */
b34976b6 324 FALSE, /* partial_inplace */
5bd4f169
AM
325 0, /* src_mask */
326 0xffff, /* dst_mask */
b34976b6 327 FALSE), /* pcrel_offset */
5bd4f169
AM
328
329 /* A 16 bit relocation without overflow. */
330 HOWTO (R_PPC64_ADDR16_LO, /* type */
331 0, /* rightshift */
332 1, /* size (0 = byte, 1 = short, 2 = long) */
333 16, /* bitsize */
b34976b6 334 FALSE, /* pc_relative */
5bd4f169
AM
335 0, /* bitpos */
336 complain_overflow_dont,/* complain_on_overflow */
337 bfd_elf_generic_reloc, /* special_function */
338 "R_PPC64_ADDR16_LO", /* name */
b34976b6 339 FALSE, /* partial_inplace */
5bd4f169
AM
340 0, /* src_mask */
341 0xffff, /* dst_mask */
b34976b6 342 FALSE), /* pcrel_offset */
5bd4f169
AM
343
344 /* Bits 16-31 of an address. */
345 HOWTO (R_PPC64_ADDR16_HI, /* type */
346 16, /* rightshift */
347 1, /* size (0 = byte, 1 = short, 2 = long) */
348 16, /* bitsize */
b34976b6 349 FALSE, /* pc_relative */
5bd4f169 350 0, /* bitpos */
f9c6b907 351 complain_overflow_signed, /* complain_on_overflow */
5bd4f169
AM
352 bfd_elf_generic_reloc, /* special_function */
353 "R_PPC64_ADDR16_HI", /* name */
b34976b6 354 FALSE, /* partial_inplace */
5bd4f169
AM
355 0, /* src_mask */
356 0xffff, /* dst_mask */
b34976b6 357 FALSE), /* pcrel_offset */
5bd4f169
AM
358
359 /* Bits 16-31 of an address, plus 1 if the contents of the low 16
360 bits, treated as a signed number, is negative. */
361 HOWTO (R_PPC64_ADDR16_HA, /* type */
362 16, /* rightshift */
363 1, /* size (0 = byte, 1 = short, 2 = long) */
364 16, /* bitsize */
b34976b6 365 FALSE, /* pc_relative */
5bd4f169 366 0, /* bitpos */
f9c6b907 367 complain_overflow_signed, /* complain_on_overflow */
805fc799 368 ppc64_elf_ha_reloc, /* special_function */
5bd4f169 369 "R_PPC64_ADDR16_HA", /* name */
b34976b6 370 FALSE, /* partial_inplace */
5bd4f169
AM
371 0, /* src_mask */
372 0xffff, /* dst_mask */
b34976b6 373 FALSE), /* pcrel_offset */
5bd4f169
AM
374
375 /* An absolute 16 bit branch; the lower two bits must be zero.
376 FIXME: we don't check that, we just clear them. */
377 HOWTO (R_PPC64_ADDR14, /* type */
378 0, /* rightshift */
379 2, /* size (0 = byte, 1 = short, 2 = long) */
380 16, /* bitsize */
b34976b6 381 FALSE, /* pc_relative */
5bd4f169 382 0, /* bitpos */
b80eed39 383 complain_overflow_signed, /* complain_on_overflow */
2441e016 384 ppc64_elf_branch_reloc, /* special_function */
5bd4f169 385 "R_PPC64_ADDR14", /* name */
b34976b6 386 FALSE, /* partial_inplace */
d006db6c 387 0, /* src_mask */
f5e87a1d 388 0x0000fffc, /* dst_mask */
b34976b6 389 FALSE), /* pcrel_offset */
5bd4f169
AM
390
391 /* An absolute 16 bit branch, for which bit 10 should be set to
392 indicate that the branch is expected to be taken. The lower two
393 bits must be zero. */
394 HOWTO (R_PPC64_ADDR14_BRTAKEN, /* type */
395 0, /* rightshift */
396 2, /* size (0 = byte, 1 = short, 2 = long) */
397 16, /* bitsize */
b34976b6 398 FALSE, /* pc_relative */
5bd4f169 399 0, /* bitpos */
b80eed39 400 complain_overflow_signed, /* complain_on_overflow */
805fc799 401 ppc64_elf_brtaken_reloc, /* special_function */
5bd4f169 402 "R_PPC64_ADDR14_BRTAKEN",/* name */
b34976b6 403 FALSE, /* partial_inplace */
d006db6c 404 0, /* src_mask */
f5e87a1d 405 0x0000fffc, /* dst_mask */
b34976b6 406 FALSE), /* pcrel_offset */
5bd4f169
AM
407
408 /* An absolute 16 bit branch, for which bit 10 should be set to
409 indicate that the branch is not expected to be taken. The lower
410 two bits must be zero. */
411 HOWTO (R_PPC64_ADDR14_BRNTAKEN, /* type */
412 0, /* rightshift */
413 2, /* size (0 = byte, 1 = short, 2 = long) */
414 16, /* bitsize */
b34976b6 415 FALSE, /* pc_relative */
5bd4f169 416 0, /* bitpos */
b80eed39 417 complain_overflow_signed, /* complain_on_overflow */
805fc799 418 ppc64_elf_brtaken_reloc, /* special_function */
5bd4f169 419 "R_PPC64_ADDR14_BRNTAKEN",/* name */
b34976b6 420 FALSE, /* partial_inplace */
d006db6c 421 0, /* src_mask */
f5e87a1d 422 0x0000fffc, /* dst_mask */
b34976b6 423 FALSE), /* pcrel_offset */
5bd4f169
AM
424
425 /* A relative 26 bit branch; the lower two bits must be zero. */
426 HOWTO (R_PPC64_REL24, /* type */
427 0, /* rightshift */
428 2, /* size (0 = byte, 1 = short, 2 = long) */
429 26, /* bitsize */
b34976b6 430 TRUE, /* pc_relative */
5bd4f169
AM
431 0, /* bitpos */
432 complain_overflow_signed, /* complain_on_overflow */
2441e016 433 ppc64_elf_branch_reloc, /* special_function */
5bd4f169 434 "R_PPC64_REL24", /* name */
b34976b6 435 FALSE, /* partial_inplace */
d006db6c 436 0, /* src_mask */
f5e87a1d 437 0x03fffffc, /* dst_mask */
b34976b6 438 TRUE), /* pcrel_offset */
5bd4f169
AM
439
440 /* A relative 16 bit branch; the lower two bits must be zero. */
441 HOWTO (R_PPC64_REL14, /* type */
442 0, /* rightshift */
443 2, /* size (0 = byte, 1 = short, 2 = long) */
444 16, /* bitsize */
b34976b6 445 TRUE, /* pc_relative */
5bd4f169
AM
446 0, /* bitpos */
447 complain_overflow_signed, /* complain_on_overflow */
2441e016 448 ppc64_elf_branch_reloc, /* special_function */
5bd4f169 449 "R_PPC64_REL14", /* name */
b34976b6 450 FALSE, /* partial_inplace */
d006db6c 451 0, /* src_mask */
f5e87a1d 452 0x0000fffc, /* dst_mask */
b34976b6 453 TRUE), /* pcrel_offset */
5bd4f169
AM
454
455 /* A relative 16 bit branch. Bit 10 should be set to indicate that
456 the branch is expected to be taken. The lower two bits must be
457 zero. */
458 HOWTO (R_PPC64_REL14_BRTAKEN, /* type */
459 0, /* rightshift */
460 2, /* size (0 = byte, 1 = short, 2 = long) */
461 16, /* bitsize */
b34976b6 462 TRUE, /* pc_relative */
5bd4f169
AM
463 0, /* bitpos */
464 complain_overflow_signed, /* complain_on_overflow */
805fc799 465 ppc64_elf_brtaken_reloc, /* special_function */
5bd4f169 466 "R_PPC64_REL14_BRTAKEN", /* name */
b34976b6 467 FALSE, /* partial_inplace */
d006db6c 468 0, /* src_mask */
f5e87a1d 469 0x0000fffc, /* dst_mask */
b34976b6 470 TRUE), /* pcrel_offset */
5bd4f169
AM
471
472 /* A relative 16 bit branch. Bit 10 should be set to indicate that
473 the branch is not expected to be taken. The lower two bits must
474 be zero. */
475 HOWTO (R_PPC64_REL14_BRNTAKEN, /* type */
476 0, /* rightshift */
477 2, /* size (0 = byte, 1 = short, 2 = long) */
478 16, /* bitsize */
b34976b6 479 TRUE, /* pc_relative */
5bd4f169
AM
480 0, /* bitpos */
481 complain_overflow_signed, /* complain_on_overflow */
805fc799 482 ppc64_elf_brtaken_reloc, /* special_function */
5bd4f169 483 "R_PPC64_REL14_BRNTAKEN",/* name */
b34976b6 484 FALSE, /* partial_inplace */
d006db6c 485 0, /* src_mask */
f5e87a1d 486 0x0000fffc, /* dst_mask */
b34976b6 487 TRUE), /* pcrel_offset */
5bd4f169
AM
488
489 /* Like R_PPC64_ADDR16, but referring to the GOT table entry for the
490 symbol. */
491 HOWTO (R_PPC64_GOT16, /* type */
492 0, /* rightshift */
493 1, /* size (0 = byte, 1 = short, 2 = long) */
494 16, /* bitsize */
b34976b6 495 FALSE, /* pc_relative */
5bd4f169
AM
496 0, /* bitpos */
497 complain_overflow_signed, /* complain_on_overflow */
805fc799 498 ppc64_elf_unhandled_reloc, /* special_function */
5bd4f169 499 "R_PPC64_GOT16", /* name */
b34976b6 500 FALSE, /* partial_inplace */
5bd4f169
AM
501 0, /* src_mask */
502 0xffff, /* dst_mask */
b34976b6 503 FALSE), /* pcrel_offset */
5bd4f169
AM
504
505 /* Like R_PPC64_ADDR16_LO, but referring to the GOT table entry for
506 the symbol. */
507 HOWTO (R_PPC64_GOT16_LO, /* type */
508 0, /* rightshift */
509 1, /* size (0 = byte, 1 = short, 2 = long) */
510 16, /* bitsize */
b34976b6 511 FALSE, /* pc_relative */
5bd4f169
AM
512 0, /* bitpos */
513 complain_overflow_dont, /* complain_on_overflow */
805fc799 514 ppc64_elf_unhandled_reloc, /* special_function */
5bd4f169 515 "R_PPC64_GOT16_LO", /* name */
b34976b6 516 FALSE, /* partial_inplace */
5bd4f169
AM
517 0, /* src_mask */
518 0xffff, /* dst_mask */
b34976b6 519 FALSE), /* pcrel_offset */
5bd4f169
AM
520
521 /* Like R_PPC64_ADDR16_HI, but referring to the GOT table entry for
522 the symbol. */
523 HOWTO (R_PPC64_GOT16_HI, /* type */
524 16, /* rightshift */
525 1, /* size (0 = byte, 1 = short, 2 = long) */
526 16, /* bitsize */
b34976b6 527 FALSE, /* pc_relative */
5bd4f169 528 0, /* bitpos */
f9c6b907 529 complain_overflow_signed,/* complain_on_overflow */
805fc799 530 ppc64_elf_unhandled_reloc, /* special_function */
5bd4f169 531 "R_PPC64_GOT16_HI", /* name */
b34976b6 532 FALSE, /* partial_inplace */
5bd4f169
AM
533 0, /* src_mask */
534 0xffff, /* dst_mask */
b34976b6 535 FALSE), /* pcrel_offset */
5bd4f169
AM
536
537 /* Like R_PPC64_ADDR16_HA, but referring to the GOT table entry for
538 the symbol. */
539 HOWTO (R_PPC64_GOT16_HA, /* type */
540 16, /* rightshift */
541 1, /* size (0 = byte, 1 = short, 2 = long) */
542 16, /* bitsize */
b34976b6 543 FALSE, /* pc_relative */
5bd4f169 544 0, /* bitpos */
f9c6b907 545 complain_overflow_signed,/* complain_on_overflow */
805fc799 546 ppc64_elf_unhandled_reloc, /* special_function */
5bd4f169 547 "R_PPC64_GOT16_HA", /* name */
b34976b6 548 FALSE, /* partial_inplace */
5bd4f169
AM
549 0, /* src_mask */
550 0xffff, /* dst_mask */
b34976b6 551 FALSE), /* pcrel_offset */
5bd4f169
AM
552
553 /* This is used only by the dynamic linker. The symbol should exist
554 both in the object being run and in some shared library. The
555 dynamic linker copies the data addressed by the symbol from the
556 shared library into the object, because the object being
557 run has to have the data at some particular address. */
558 HOWTO (R_PPC64_COPY, /* type */
559 0, /* rightshift */
f5e87a1d
AM
560 0, /* this one is variable size */
561 0, /* bitsize */
b34976b6 562 FALSE, /* pc_relative */
5bd4f169 563 0, /* bitpos */
f5e87a1d
AM
564 complain_overflow_dont, /* complain_on_overflow */
565 ppc64_elf_unhandled_reloc, /* special_function */
5bd4f169 566 "R_PPC64_COPY", /* name */
b34976b6 567 FALSE, /* partial_inplace */
5bd4f169
AM
568 0, /* src_mask */
569 0, /* dst_mask */
b34976b6 570 FALSE), /* pcrel_offset */
5bd4f169
AM
571
572 /* Like R_PPC64_ADDR64, but used when setting global offset table
573 entries. */
574 HOWTO (R_PPC64_GLOB_DAT, /* type */
575 0, /* rightshift */
576 4, /* size (0=byte, 1=short, 2=long, 4=64 bits) */
577 64, /* bitsize */
b34976b6 578 FALSE, /* pc_relative */
5bd4f169
AM
579 0, /* bitpos */
580 complain_overflow_dont, /* complain_on_overflow */
805fc799 581 ppc64_elf_unhandled_reloc, /* special_function */
5bd4f169 582 "R_PPC64_GLOB_DAT", /* name */
b34976b6 583 FALSE, /* partial_inplace */
5bd4f169 584 0, /* src_mask */
f5e87a1d 585 ONES (64), /* dst_mask */
b34976b6 586 FALSE), /* pcrel_offset */
5bd4f169
AM
587
588 /* Created by the link editor. Marks a procedure linkage table
589 entry for a symbol. */
590 HOWTO (R_PPC64_JMP_SLOT, /* type */
591 0, /* rightshift */
592 0, /* size (0 = byte, 1 = short, 2 = long) */
593 0, /* bitsize */
b34976b6 594 FALSE, /* pc_relative */
5bd4f169
AM
595 0, /* bitpos */
596 complain_overflow_dont, /* complain_on_overflow */
805fc799 597 ppc64_elf_unhandled_reloc, /* special_function */
5bd4f169 598 "R_PPC64_JMP_SLOT", /* name */
b34976b6 599 FALSE, /* partial_inplace */
5bd4f169
AM
600 0, /* src_mask */
601 0, /* dst_mask */
b34976b6 602 FALSE), /* pcrel_offset */
5bd4f169
AM
603
604 /* Used only by the dynamic linker. When the object is run, this
605 doubleword64 is set to the load address of the object, plus the
606 addend. */
607 HOWTO (R_PPC64_RELATIVE, /* type */
608 0, /* rightshift */
609 4, /* size (0=byte, 1=short, 2=long, 4=64 bits) */
610 64, /* bitsize */
b34976b6 611 FALSE, /* pc_relative */
5bd4f169
AM
612 0, /* bitpos */
613 complain_overflow_dont, /* complain_on_overflow */
614 bfd_elf_generic_reloc, /* special_function */
615 "R_PPC64_RELATIVE", /* name */
b34976b6 616 FALSE, /* partial_inplace */
5bd4f169 617 0, /* src_mask */
f5e87a1d 618 ONES (64), /* dst_mask */
b34976b6 619 FALSE), /* pcrel_offset */
5bd4f169
AM
620
621 /* Like R_PPC64_ADDR32, but may be unaligned. */
622 HOWTO (R_PPC64_UADDR32, /* type */
623 0, /* rightshift */
624 2, /* size (0 = byte, 1 = short, 2 = long) */
625 32, /* bitsize */
b34976b6 626 FALSE, /* pc_relative */
5bd4f169
AM
627 0, /* bitpos */
628 complain_overflow_bitfield, /* complain_on_overflow */
629 bfd_elf_generic_reloc, /* special_function */
630 "R_PPC64_UADDR32", /* name */
b34976b6 631 FALSE, /* partial_inplace */
5bd4f169
AM
632 0, /* src_mask */
633 0xffffffff, /* dst_mask */
b34976b6 634 FALSE), /* pcrel_offset */
5bd4f169
AM
635
636 /* Like R_PPC64_ADDR16, but may be unaligned. */
637 HOWTO (R_PPC64_UADDR16, /* type */
638 0, /* rightshift */
639 1, /* size (0 = byte, 1 = short, 2 = long) */
640 16, /* bitsize */
b34976b6 641 FALSE, /* pc_relative */
5bd4f169
AM
642 0, /* bitpos */
643 complain_overflow_bitfield, /* complain_on_overflow */
644 bfd_elf_generic_reloc, /* special_function */
645 "R_PPC64_UADDR16", /* name */
b34976b6 646 FALSE, /* partial_inplace */
5bd4f169
AM
647 0, /* src_mask */
648 0xffff, /* dst_mask */
b34976b6 649 FALSE), /* pcrel_offset */
5bd4f169
AM
650
651 /* 32-bit PC relative. */
652 HOWTO (R_PPC64_REL32, /* type */
653 0, /* rightshift */
654 2, /* size (0 = byte, 1 = short, 2 = long) */
655 32, /* bitsize */
b34976b6 656 TRUE, /* pc_relative */
5bd4f169 657 0, /* bitpos */
5bd4f169
AM
658 complain_overflow_signed, /* complain_on_overflow */
659 bfd_elf_generic_reloc, /* special_function */
660 "R_PPC64_REL32", /* name */
b34976b6 661 FALSE, /* partial_inplace */
5bd4f169
AM
662 0, /* src_mask */
663 0xffffffff, /* dst_mask */
b34976b6 664 TRUE), /* pcrel_offset */
5bd4f169 665
10ed1bba 666 /* 32-bit relocation to the symbol's procedure linkage table. */
5bd4f169
AM
667 HOWTO (R_PPC64_PLT32, /* type */
668 0, /* rightshift */
669 2, /* size (0 = byte, 1 = short, 2 = long) */
670 32, /* bitsize */
b34976b6 671 FALSE, /* pc_relative */
5bd4f169
AM
672 0, /* bitpos */
673 complain_overflow_bitfield, /* complain_on_overflow */
805fc799 674 ppc64_elf_unhandled_reloc, /* special_function */
5bd4f169 675 "R_PPC64_PLT32", /* name */
b34976b6 676 FALSE, /* partial_inplace */
5bd4f169 677 0, /* src_mask */
f5e87a1d 678 0xffffffff, /* dst_mask */
b34976b6 679 FALSE), /* pcrel_offset */
5bd4f169
AM
680
681 /* 32-bit PC relative relocation to the symbol's procedure linkage table.
682 FIXME: R_PPC64_PLTREL32 not supported. */
683 HOWTO (R_PPC64_PLTREL32, /* type */
684 0, /* rightshift */
685 2, /* size (0 = byte, 1 = short, 2 = long) */
686 32, /* bitsize */
b34976b6 687 TRUE, /* pc_relative */
5bd4f169
AM
688 0, /* bitpos */
689 complain_overflow_signed, /* complain_on_overflow */
3ce51288 690 ppc64_elf_unhandled_reloc, /* special_function */
5bd4f169 691 "R_PPC64_PLTREL32", /* name */
b34976b6 692 FALSE, /* partial_inplace */
5bd4f169 693 0, /* src_mask */
f5e87a1d 694 0xffffffff, /* dst_mask */
b34976b6 695 TRUE), /* pcrel_offset */
5bd4f169
AM
696
697 /* Like R_PPC64_ADDR16_LO, but referring to the PLT table entry for
698 the symbol. */
699 HOWTO (R_PPC64_PLT16_LO, /* type */
700 0, /* rightshift */
701 1, /* size (0 = byte, 1 = short, 2 = long) */
702 16, /* bitsize */
b34976b6 703 FALSE, /* pc_relative */
5bd4f169
AM
704 0, /* bitpos */
705 complain_overflow_dont, /* complain_on_overflow */
805fc799 706 ppc64_elf_unhandled_reloc, /* special_function */
5bd4f169 707 "R_PPC64_PLT16_LO", /* name */
b34976b6 708 FALSE, /* partial_inplace */
5bd4f169
AM
709 0, /* src_mask */
710 0xffff, /* dst_mask */
b34976b6 711 FALSE), /* pcrel_offset */
5bd4f169
AM
712
713 /* Like R_PPC64_ADDR16_HI, but referring to the PLT table entry for
714 the symbol. */
715 HOWTO (R_PPC64_PLT16_HI, /* type */
716 16, /* rightshift */
717 1, /* size (0 = byte, 1 = short, 2 = long) */
718 16, /* bitsize */
b34976b6 719 FALSE, /* pc_relative */
5bd4f169 720 0, /* bitpos */
f9c6b907 721 complain_overflow_signed, /* complain_on_overflow */
805fc799 722 ppc64_elf_unhandled_reloc, /* special_function */
5bd4f169 723 "R_PPC64_PLT16_HI", /* name */
b34976b6 724 FALSE, /* partial_inplace */
5bd4f169
AM
725 0, /* src_mask */
726 0xffff, /* dst_mask */
b34976b6 727 FALSE), /* pcrel_offset */
5bd4f169
AM
728
729 /* Like R_PPC64_ADDR16_HA, but referring to the PLT table entry for
730 the symbol. */
731 HOWTO (R_PPC64_PLT16_HA, /* type */
732 16, /* rightshift */
733 1, /* size (0 = byte, 1 = short, 2 = long) */
734 16, /* bitsize */
b34976b6 735 FALSE, /* pc_relative */
5bd4f169 736 0, /* bitpos */
f9c6b907 737 complain_overflow_signed, /* complain_on_overflow */
805fc799 738 ppc64_elf_unhandled_reloc, /* special_function */
5bd4f169 739 "R_PPC64_PLT16_HA", /* name */
b34976b6 740 FALSE, /* partial_inplace */
5bd4f169
AM
741 0, /* src_mask */
742 0xffff, /* dst_mask */
b34976b6 743 FALSE), /* pcrel_offset */
5bd4f169 744
c061c2d8 745 /* 16-bit section relative relocation. */
5bd4f169
AM
746 HOWTO (R_PPC64_SECTOFF, /* type */
747 0, /* rightshift */
c061c2d8
AM
748 1, /* size (0 = byte, 1 = short, 2 = long) */
749 16, /* bitsize */
b34976b6 750 FALSE, /* pc_relative */
5bd4f169 751 0, /* bitpos */
b80eed39 752 complain_overflow_signed, /* complain_on_overflow */
805fc799 753 ppc64_elf_sectoff_reloc, /* special_function */
5bd4f169 754 "R_PPC64_SECTOFF", /* name */
b34976b6 755 FALSE, /* partial_inplace */
5bd4f169 756 0, /* src_mask */
c061c2d8 757 0xffff, /* dst_mask */
b34976b6 758 FALSE), /* pcrel_offset */
5bd4f169 759
c061c2d8 760 /* Like R_PPC64_SECTOFF, but no overflow warning. */
5bd4f169
AM
761 HOWTO (R_PPC64_SECTOFF_LO, /* type */
762 0, /* rightshift */
763 1, /* size (0 = byte, 1 = short, 2 = long) */
764 16, /* bitsize */
b34976b6 765 FALSE, /* pc_relative */
5bd4f169
AM
766 0, /* bitpos */
767 complain_overflow_dont, /* complain_on_overflow */
805fc799 768 ppc64_elf_sectoff_reloc, /* special_function */
5bd4f169 769 "R_PPC64_SECTOFF_LO", /* name */
b34976b6 770 FALSE, /* partial_inplace */
5bd4f169
AM
771 0, /* src_mask */
772 0xffff, /* dst_mask */
b34976b6 773 FALSE), /* pcrel_offset */
5bd4f169
AM
774
775 /* 16-bit upper half section relative relocation. */
776 HOWTO (R_PPC64_SECTOFF_HI, /* type */
777 16, /* rightshift */
778 1, /* size (0 = byte, 1 = short, 2 = long) */
779 16, /* bitsize */
b34976b6 780 FALSE, /* pc_relative */
5bd4f169 781 0, /* bitpos */
f9c6b907 782 complain_overflow_signed, /* complain_on_overflow */
805fc799 783 ppc64_elf_sectoff_reloc, /* special_function */
5bd4f169 784 "R_PPC64_SECTOFF_HI", /* name */
b34976b6 785 FALSE, /* partial_inplace */
5bd4f169
AM
786 0, /* src_mask */
787 0xffff, /* dst_mask */
b34976b6 788 FALSE), /* pcrel_offset */
5bd4f169
AM
789
790 /* 16-bit upper half adjusted section relative relocation. */
791 HOWTO (R_PPC64_SECTOFF_HA, /* type */
792 16, /* rightshift */
793 1, /* size (0 = byte, 1 = short, 2 = long) */
794 16, /* bitsize */
b34976b6 795 FALSE, /* pc_relative */
5bd4f169 796 0, /* bitpos */
f9c6b907 797 complain_overflow_signed, /* complain_on_overflow */
805fc799 798 ppc64_elf_sectoff_ha_reloc, /* special_function */
5bd4f169 799 "R_PPC64_SECTOFF_HA", /* name */
b34976b6 800 FALSE, /* partial_inplace */
5bd4f169
AM
801 0, /* src_mask */
802 0xffff, /* dst_mask */
b34976b6 803 FALSE), /* pcrel_offset */
5bd4f169 804
04c9666a
AM
805 /* Like R_PPC64_REL24 without touching the two least significant bits. */
806 HOWTO (R_PPC64_REL30, /* type */
5bd4f169
AM
807 2, /* rightshift */
808 2, /* size (0 = byte, 1 = short, 2 = long) */
809 30, /* bitsize */
b34976b6 810 TRUE, /* pc_relative */
5bd4f169
AM
811 0, /* bitpos */
812 complain_overflow_dont, /* complain_on_overflow */
813 bfd_elf_generic_reloc, /* special_function */
04c9666a 814 "R_PPC64_REL30", /* name */
b34976b6 815 FALSE, /* partial_inplace */
d006db6c 816 0, /* src_mask */
5bd4f169 817 0xfffffffc, /* dst_mask */
b34976b6 818 TRUE), /* pcrel_offset */
5bd4f169
AM
819
820 /* Relocs in the 64-bit PowerPC ELF ABI, not in the 32-bit ABI. */
821
822 /* A standard 64-bit relocation. */
823 HOWTO (R_PPC64_ADDR64, /* type */
824 0, /* rightshift */
825 4, /* size (0=byte, 1=short, 2=long, 4=64 bits) */
826 64, /* bitsize */
b34976b6 827 FALSE, /* pc_relative */
5bd4f169
AM
828 0, /* bitpos */
829 complain_overflow_dont, /* complain_on_overflow */
830 bfd_elf_generic_reloc, /* special_function */
831 "R_PPC64_ADDR64", /* name */
b34976b6 832 FALSE, /* partial_inplace */
5bd4f169 833 0, /* src_mask */
f5e87a1d 834 ONES (64), /* dst_mask */
b34976b6 835 FALSE), /* pcrel_offset */
5bd4f169
AM
836
837 /* The bits 32-47 of an address. */
838 HOWTO (R_PPC64_ADDR16_HIGHER, /* type */
839 32, /* rightshift */
840 1, /* size (0 = byte, 1 = short, 2 = long) */
841 16, /* bitsize */
b34976b6 842 FALSE, /* pc_relative */
5bd4f169
AM
843 0, /* bitpos */
844 complain_overflow_dont, /* complain_on_overflow */
845 bfd_elf_generic_reloc, /* special_function */
846 "R_PPC64_ADDR16_HIGHER", /* name */
b34976b6 847 FALSE, /* partial_inplace */
5bd4f169
AM
848 0, /* src_mask */
849 0xffff, /* dst_mask */
b34976b6 850 FALSE), /* pcrel_offset */
5bd4f169
AM
851
852 /* The bits 32-47 of an address, plus 1 if the contents of the low
853 16 bits, treated as a signed number, is negative. */
854 HOWTO (R_PPC64_ADDR16_HIGHERA, /* type */
855 32, /* rightshift */
856 1, /* size (0 = byte, 1 = short, 2 = long) */
857 16, /* bitsize */
b34976b6 858 FALSE, /* pc_relative */
5bd4f169
AM
859 0, /* bitpos */
860 complain_overflow_dont, /* complain_on_overflow */
805fc799 861 ppc64_elf_ha_reloc, /* special_function */
5bd4f169 862 "R_PPC64_ADDR16_HIGHERA", /* name */
b34976b6 863 FALSE, /* partial_inplace */
5bd4f169
AM
864 0, /* src_mask */
865 0xffff, /* dst_mask */
b34976b6 866 FALSE), /* pcrel_offset */
5bd4f169
AM
867
868 /* The bits 48-63 of an address. */
869 HOWTO (R_PPC64_ADDR16_HIGHEST,/* type */
870 48, /* rightshift */
871 1, /* size (0 = byte, 1 = short, 2 = long) */
872 16, /* bitsize */
b34976b6 873 FALSE, /* pc_relative */
5bd4f169
AM
874 0, /* bitpos */
875 complain_overflow_dont, /* complain_on_overflow */
876 bfd_elf_generic_reloc, /* special_function */
877 "R_PPC64_ADDR16_HIGHEST", /* name */
b34976b6 878 FALSE, /* partial_inplace */
5bd4f169
AM
879 0, /* src_mask */
880 0xffff, /* dst_mask */
b34976b6 881 FALSE), /* pcrel_offset */
5bd4f169
AM
882
883 /* The bits 48-63 of an address, plus 1 if the contents of the low
884 16 bits, treated as a signed number, is negative. */
885 HOWTO (R_PPC64_ADDR16_HIGHESTA,/* type */
886 48, /* rightshift */
887 1, /* size (0 = byte, 1 = short, 2 = long) */
888 16, /* bitsize */
b34976b6 889 FALSE, /* pc_relative */
5bd4f169
AM
890 0, /* bitpos */
891 complain_overflow_dont, /* complain_on_overflow */
805fc799 892 ppc64_elf_ha_reloc, /* special_function */
5bd4f169 893 "R_PPC64_ADDR16_HIGHESTA", /* name */
b34976b6 894 FALSE, /* partial_inplace */
5bd4f169
AM
895 0, /* src_mask */
896 0xffff, /* dst_mask */
b34976b6 897 FALSE), /* pcrel_offset */
5bd4f169
AM
898
899 /* Like ADDR64, but may be unaligned. */
900 HOWTO (R_PPC64_UADDR64, /* type */
901 0, /* rightshift */
902 4, /* size (0=byte, 1=short, 2=long, 4=64 bits) */
903 64, /* bitsize */
b34976b6 904 FALSE, /* pc_relative */
5bd4f169
AM
905 0, /* bitpos */
906 complain_overflow_dont, /* complain_on_overflow */
907 bfd_elf_generic_reloc, /* special_function */
908 "R_PPC64_UADDR64", /* name */
b34976b6 909 FALSE, /* partial_inplace */
5bd4f169 910 0, /* src_mask */
f5e87a1d 911 ONES (64), /* dst_mask */
b34976b6 912 FALSE), /* pcrel_offset */
5bd4f169
AM
913
914 /* 64-bit relative relocation. */
915 HOWTO (R_PPC64_REL64, /* type */
916 0, /* rightshift */
917 4, /* size (0=byte, 1=short, 2=long, 4=64 bits) */
918 64, /* bitsize */
b34976b6 919 TRUE, /* pc_relative */
5bd4f169
AM
920 0, /* bitpos */
921 complain_overflow_dont, /* complain_on_overflow */
922 bfd_elf_generic_reloc, /* special_function */
923 "R_PPC64_REL64", /* name */
b34976b6 924 FALSE, /* partial_inplace */
5bd4f169 925 0, /* src_mask */
f5e87a1d 926 ONES (64), /* dst_mask */
b34976b6 927 TRUE), /* pcrel_offset */
5bd4f169 928
cedb70c5 929 /* 64-bit relocation to the symbol's procedure linkage table. */
5bd4f169
AM
930 HOWTO (R_PPC64_PLT64, /* type */
931 0, /* rightshift */
932 4, /* size (0=byte, 1=short, 2=long, 4=64 bits) */
933 64, /* bitsize */
b34976b6 934 FALSE, /* pc_relative */
5bd4f169
AM
935 0, /* bitpos */
936 complain_overflow_dont, /* complain_on_overflow */
805fc799 937 ppc64_elf_unhandled_reloc, /* special_function */
5bd4f169 938 "R_PPC64_PLT64", /* name */
b34976b6 939 FALSE, /* partial_inplace */
5bd4f169 940 0, /* src_mask */
f5e87a1d 941 ONES (64), /* dst_mask */
b34976b6 942 FALSE), /* pcrel_offset */
5bd4f169
AM
943
944 /* 64-bit PC relative relocation to the symbol's procedure linkage
945 table. */
946 /* FIXME: R_PPC64_PLTREL64 not supported. */
947 HOWTO (R_PPC64_PLTREL64, /* type */
948 0, /* rightshift */
949 4, /* size (0=byte, 1=short, 2=long, 4=64 bits) */
950 64, /* bitsize */
b34976b6 951 TRUE, /* pc_relative */
5bd4f169
AM
952 0, /* bitpos */
953 complain_overflow_dont, /* complain_on_overflow */
805fc799 954 ppc64_elf_unhandled_reloc, /* special_function */
5bd4f169 955 "R_PPC64_PLTREL64", /* name */
b34976b6 956 FALSE, /* partial_inplace */
5bd4f169 957 0, /* src_mask */
f5e87a1d 958 ONES (64), /* dst_mask */
b34976b6 959 TRUE), /* pcrel_offset */
5bd4f169
AM
960
961 /* 16 bit TOC-relative relocation. */
962
963 /* R_PPC64_TOC16 47 half16* S + A - .TOC. */
964 HOWTO (R_PPC64_TOC16, /* type */
965 0, /* rightshift */
966 1, /* size (0 = byte, 1 = short, 2 = long) */
967 16, /* bitsize */
b34976b6 968 FALSE, /* pc_relative */
5bd4f169
AM
969 0, /* bitpos */
970 complain_overflow_signed, /* complain_on_overflow */
805fc799 971 ppc64_elf_toc_reloc, /* special_function */
5bd4f169 972 "R_PPC64_TOC16", /* name */
b34976b6 973 FALSE, /* partial_inplace */
5bd4f169
AM
974 0, /* src_mask */
975 0xffff, /* dst_mask */
b34976b6 976 FALSE), /* pcrel_offset */
5bd4f169
AM
977
978 /* 16 bit TOC-relative relocation without overflow. */
979
980 /* R_PPC64_TOC16_LO 48 half16 #lo (S + A - .TOC.) */
981 HOWTO (R_PPC64_TOC16_LO, /* type */
982 0, /* rightshift */
983 1, /* size (0 = byte, 1 = short, 2 = long) */
984 16, /* bitsize */
b34976b6 985 FALSE, /* pc_relative */
5bd4f169
AM
986 0, /* bitpos */
987 complain_overflow_dont, /* complain_on_overflow */
805fc799 988 ppc64_elf_toc_reloc, /* special_function */
5bd4f169 989 "R_PPC64_TOC16_LO", /* name */
b34976b6 990 FALSE, /* partial_inplace */
5bd4f169
AM
991 0, /* src_mask */
992 0xffff, /* dst_mask */
b34976b6 993 FALSE), /* pcrel_offset */
5bd4f169
AM
994
995 /* 16 bit TOC-relative relocation, high 16 bits. */
996
997 /* R_PPC64_TOC16_HI 49 half16 #hi (S + A - .TOC.) */
998 HOWTO (R_PPC64_TOC16_HI, /* type */
999 16, /* rightshift */
1000 1, /* size (0 = byte, 1 = short, 2 = long) */
1001 16, /* bitsize */
b34976b6 1002 FALSE, /* pc_relative */
5bd4f169 1003 0, /* bitpos */
f9c6b907 1004 complain_overflow_signed, /* complain_on_overflow */
805fc799 1005 ppc64_elf_toc_reloc, /* special_function */
5bd4f169 1006 "R_PPC64_TOC16_HI", /* name */
b34976b6 1007 FALSE, /* partial_inplace */
5bd4f169
AM
1008 0, /* src_mask */
1009 0xffff, /* dst_mask */
b34976b6 1010 FALSE), /* pcrel_offset */
5bd4f169
AM
1011
1012 /* 16 bit TOC-relative relocation, high 16 bits, plus 1 if the
1013 contents of the low 16 bits, treated as a signed number, is
1014 negative. */
1015
1016 /* R_PPC64_TOC16_HA 50 half16 #ha (S + A - .TOC.) */
1017 HOWTO (R_PPC64_TOC16_HA, /* type */
1018 16, /* rightshift */
1019 1, /* size (0 = byte, 1 = short, 2 = long) */
1020 16, /* bitsize */
b34976b6 1021 FALSE, /* pc_relative */
5bd4f169 1022 0, /* bitpos */
f9c6b907 1023 complain_overflow_signed, /* complain_on_overflow */
805fc799 1024 ppc64_elf_toc_ha_reloc, /* special_function */
5bd4f169 1025 "R_PPC64_TOC16_HA", /* name */
b34976b6 1026 FALSE, /* partial_inplace */
5bd4f169
AM
1027 0, /* src_mask */
1028 0xffff, /* dst_mask */
b34976b6 1029 FALSE), /* pcrel_offset */
5bd4f169
AM
1030
1031 /* 64-bit relocation; insert value of TOC base (.TOC.). */
1032
1033 /* R_PPC64_TOC 51 doubleword64 .TOC. */
1034 HOWTO (R_PPC64_TOC, /* type */
1035 0, /* rightshift */
1036 4, /* size (0=byte, 1=short, 2=long, 4=64 bits) */
1037 64, /* bitsize */
b34976b6 1038 FALSE, /* pc_relative */
5bd4f169 1039 0, /* bitpos */
b80eed39 1040 complain_overflow_dont, /* complain_on_overflow */
805fc799 1041 ppc64_elf_toc64_reloc, /* special_function */
5bd4f169 1042 "R_PPC64_TOC", /* name */
b34976b6 1043 FALSE, /* partial_inplace */
5bd4f169 1044 0, /* src_mask */
f5e87a1d 1045 ONES (64), /* dst_mask */
b34976b6 1046 FALSE), /* pcrel_offset */
5bd4f169
AM
1047
1048 /* Like R_PPC64_GOT16, but also informs the link editor that the
1049 value to relocate may (!) refer to a PLT entry which the link
1050 editor (a) may replace with the symbol value. If the link editor
1051 is unable to fully resolve the symbol, it may (b) create a PLT
1052 entry and store the address to the new PLT entry in the GOT.
1053 This permits lazy resolution of function symbols at run time.
1054 The link editor may also skip all of this and just (c) emit a
1055 R_PPC64_GLOB_DAT to tie the symbol to the GOT entry. */
1056 /* FIXME: R_PPC64_PLTGOT16 not implemented. */
1057 HOWTO (R_PPC64_PLTGOT16, /* type */
1058 0, /* rightshift */
1059 1, /* size (0 = byte, 1 = short, 2 = long) */
1060 16, /* bitsize */
b34976b6 1061 FALSE, /* pc_relative */
5bd4f169
AM
1062 0, /* bitpos */
1063 complain_overflow_signed, /* complain_on_overflow */
805fc799 1064 ppc64_elf_unhandled_reloc, /* special_function */
411e1bfb
AM
1065 "R_PPC64_PLTGOT16", /* name */
1066 FALSE, /* partial_inplace */
1067 0, /* src_mask */
1068 0xffff, /* dst_mask */
1069 FALSE), /* pcrel_offset */
1070
1071 /* Like R_PPC64_PLTGOT16, but without overflow. */
1072 /* FIXME: R_PPC64_PLTGOT16_LO not implemented. */
1073 HOWTO (R_PPC64_PLTGOT16_LO, /* type */
1074 0, /* rightshift */
1075 1, /* size (0 = byte, 1 = short, 2 = long) */
1076 16, /* bitsize */
1077 FALSE, /* pc_relative */
1078 0, /* bitpos */
1079 complain_overflow_dont, /* complain_on_overflow */
1080 ppc64_elf_unhandled_reloc, /* special_function */
1081 "R_PPC64_PLTGOT16_LO", /* name */
1082 FALSE, /* partial_inplace */
1083 0, /* src_mask */
1084 0xffff, /* dst_mask */
1085 FALSE), /* pcrel_offset */
1086
1087 /* Like R_PPC64_PLT_GOT16, but using bits 16-31 of the address. */
1088 /* FIXME: R_PPC64_PLTGOT16_HI not implemented. */
1089 HOWTO (R_PPC64_PLTGOT16_HI, /* type */
1090 16, /* rightshift */
1091 1, /* size (0 = byte, 1 = short, 2 = long) */
1092 16, /* bitsize */
1093 FALSE, /* pc_relative */
1094 0, /* bitpos */
f9c6b907 1095 complain_overflow_signed, /* complain_on_overflow */
411e1bfb
AM
1096 ppc64_elf_unhandled_reloc, /* special_function */
1097 "R_PPC64_PLTGOT16_HI", /* name */
1098 FALSE, /* partial_inplace */
1099 0, /* src_mask */
1100 0xffff, /* dst_mask */
1101 FALSE), /* pcrel_offset */
1102
1103 /* Like R_PPC64_PLT_GOT16, but using bits 16-31 of the address, plus
1104 1 if the contents of the low 16 bits, treated as a signed number,
1105 is negative. */
1106 /* FIXME: R_PPC64_PLTGOT16_HA not implemented. */
1107 HOWTO (R_PPC64_PLTGOT16_HA, /* type */
1108 16, /* rightshift */
1109 1, /* size (0 = byte, 1 = short, 2 = long) */
1110 16, /* bitsize */
1111 FALSE, /* pc_relative */
1112 0, /* bitpos */
f9c6b907 1113 complain_overflow_signed, /* complain_on_overflow */
411e1bfb
AM
1114 ppc64_elf_unhandled_reloc, /* special_function */
1115 "R_PPC64_PLTGOT16_HA", /* name */
1116 FALSE, /* partial_inplace */
1117 0, /* src_mask */
1118 0xffff, /* dst_mask */
1119 FALSE), /* pcrel_offset */
1120
1121 /* Like R_PPC64_ADDR16, but for instructions with a DS field. */
1122 HOWTO (R_PPC64_ADDR16_DS, /* type */
1123 0, /* rightshift */
1124 1, /* size (0 = byte, 1 = short, 2 = long) */
1125 16, /* bitsize */
1126 FALSE, /* pc_relative */
1127 0, /* bitpos */
b80eed39 1128 complain_overflow_signed, /* complain_on_overflow */
411e1bfb
AM
1129 bfd_elf_generic_reloc, /* special_function */
1130 "R_PPC64_ADDR16_DS", /* name */
1131 FALSE, /* partial_inplace */
1132 0, /* src_mask */
1133 0xfffc, /* dst_mask */
1134 FALSE), /* pcrel_offset */
1135
1136 /* Like R_PPC64_ADDR16_LO, but for instructions with a DS field. */
1137 HOWTO (R_PPC64_ADDR16_LO_DS, /* type */
1138 0, /* rightshift */
1139 1, /* size (0 = byte, 1 = short, 2 = long) */
1140 16, /* bitsize */
1141 FALSE, /* pc_relative */
1142 0, /* bitpos */
1143 complain_overflow_dont,/* complain_on_overflow */
1144 bfd_elf_generic_reloc, /* special_function */
1145 "R_PPC64_ADDR16_LO_DS",/* name */
1146 FALSE, /* partial_inplace */
1147 0, /* src_mask */
1148 0xfffc, /* dst_mask */
1149 FALSE), /* pcrel_offset */
1150
1151 /* Like R_PPC64_GOT16, but for instructions with a DS field. */
1152 HOWTO (R_PPC64_GOT16_DS, /* type */
1153 0, /* rightshift */
1154 1, /* size (0 = byte, 1 = short, 2 = long) */
1155 16, /* bitsize */
1156 FALSE, /* pc_relative */
1157 0, /* bitpos */
1158 complain_overflow_signed, /* complain_on_overflow */
1159 ppc64_elf_unhandled_reloc, /* special_function */
1160 "R_PPC64_GOT16_DS", /* name */
1161 FALSE, /* partial_inplace */
1162 0, /* src_mask */
1163 0xfffc, /* dst_mask */
1164 FALSE), /* pcrel_offset */
1165
1166 /* Like R_PPC64_GOT16_LO, but for instructions with a DS field. */
1167 HOWTO (R_PPC64_GOT16_LO_DS, /* type */
1168 0, /* rightshift */
1169 1, /* size (0 = byte, 1 = short, 2 = long) */
1170 16, /* bitsize */
1171 FALSE, /* pc_relative */
1172 0, /* bitpos */
1173 complain_overflow_dont, /* complain_on_overflow */
1174 ppc64_elf_unhandled_reloc, /* special_function */
1175 "R_PPC64_GOT16_LO_DS", /* name */
1176 FALSE, /* partial_inplace */
1177 0, /* src_mask */
1178 0xfffc, /* dst_mask */
1179 FALSE), /* pcrel_offset */
1180
1181 /* Like R_PPC64_PLT16_LO, but for instructions with a DS field. */
1182 HOWTO (R_PPC64_PLT16_LO_DS, /* type */
1183 0, /* rightshift */
1184 1, /* size (0 = byte, 1 = short, 2 = long) */
1185 16, /* bitsize */
1186 FALSE, /* pc_relative */
1187 0, /* bitpos */
1188 complain_overflow_dont, /* complain_on_overflow */
1189 ppc64_elf_unhandled_reloc, /* special_function */
1190 "R_PPC64_PLT16_LO_DS", /* name */
1191 FALSE, /* partial_inplace */
1192 0, /* src_mask */
1193 0xfffc, /* dst_mask */
1194 FALSE), /* pcrel_offset */
1195
1196 /* Like R_PPC64_SECTOFF, but for instructions with a DS field. */
1197 HOWTO (R_PPC64_SECTOFF_DS, /* type */
1198 0, /* rightshift */
1199 1, /* size (0 = byte, 1 = short, 2 = long) */
1200 16, /* bitsize */
1201 FALSE, /* pc_relative */
1202 0, /* bitpos */
b80eed39 1203 complain_overflow_signed, /* complain_on_overflow */
411e1bfb
AM
1204 ppc64_elf_sectoff_reloc, /* special_function */
1205 "R_PPC64_SECTOFF_DS", /* name */
1206 FALSE, /* partial_inplace */
1207 0, /* src_mask */
1208 0xfffc, /* dst_mask */
1209 FALSE), /* pcrel_offset */
1210
1211 /* Like R_PPC64_SECTOFF_LO, but for instructions with a DS field. */
1212 HOWTO (R_PPC64_SECTOFF_LO_DS, /* type */
1213 0, /* rightshift */
1214 1, /* size (0 = byte, 1 = short, 2 = long) */
1215 16, /* bitsize */
1216 FALSE, /* pc_relative */
1217 0, /* bitpos */
1218 complain_overflow_dont, /* complain_on_overflow */
1219 ppc64_elf_sectoff_reloc, /* special_function */
1220 "R_PPC64_SECTOFF_LO_DS",/* name */
1221 FALSE, /* partial_inplace */
1222 0, /* src_mask */
1223 0xfffc, /* dst_mask */
1224 FALSE), /* pcrel_offset */
1225
1226 /* Like R_PPC64_TOC16, but for instructions with a DS field. */
1227 HOWTO (R_PPC64_TOC16_DS, /* type */
1228 0, /* rightshift */
1229 1, /* size (0 = byte, 1 = short, 2 = long) */
1230 16, /* bitsize */
1231 FALSE, /* pc_relative */
1232 0, /* bitpos */
1233 complain_overflow_signed, /* complain_on_overflow */
1234 ppc64_elf_toc_reloc, /* special_function */
1235 "R_PPC64_TOC16_DS", /* name */
1236 FALSE, /* partial_inplace */
1237 0, /* src_mask */
1238 0xfffc, /* dst_mask */
1239 FALSE), /* pcrel_offset */
1240
1241 /* Like R_PPC64_TOC16_LO, but for instructions with a DS field. */
1242 HOWTO (R_PPC64_TOC16_LO_DS, /* type */
1243 0, /* rightshift */
1244 1, /* size (0 = byte, 1 = short, 2 = long) */
1245 16, /* bitsize */
1246 FALSE, /* pc_relative */
1247 0, /* bitpos */
1248 complain_overflow_dont, /* complain_on_overflow */
1249 ppc64_elf_toc_reloc, /* special_function */
1250 "R_PPC64_TOC16_LO_DS", /* name */
1251 FALSE, /* partial_inplace */
1252 0, /* src_mask */
1253 0xfffc, /* dst_mask */
1254 FALSE), /* pcrel_offset */
1255
1256 /* Like R_PPC64_PLTGOT16, but for instructions with a DS field. */
1257 /* FIXME: R_PPC64_PLTGOT16_DS not implemented. */
6bfdb61b 1258 HOWTO (R_PPC64_PLTGOT16_DS, /* type */
411e1bfb
AM
1259 0, /* rightshift */
1260 1, /* size (0 = byte, 1 = short, 2 = long) */
1261 16, /* bitsize */
1262 FALSE, /* pc_relative */
1263 0, /* bitpos */
1264 complain_overflow_signed, /* complain_on_overflow */
1265 ppc64_elf_unhandled_reloc, /* special_function */
1266 "R_PPC64_PLTGOT16_DS", /* name */
1267 FALSE, /* partial_inplace */
1268 0, /* src_mask */
1269 0xfffc, /* dst_mask */
1270 FALSE), /* pcrel_offset */
1271
1272 /* Like R_PPC64_PLTGOT16_LO, but for instructions with a DS field. */
1273 /* FIXME: R_PPC64_PLTGOT16_LO not implemented. */
1274 HOWTO (R_PPC64_PLTGOT16_LO_DS,/* type */
1275 0, /* rightshift */
1276 1, /* size (0 = byte, 1 = short, 2 = long) */
1277 16, /* bitsize */
1278 FALSE, /* pc_relative */
1279 0, /* bitpos */
1280 complain_overflow_dont, /* complain_on_overflow */
1281 ppc64_elf_unhandled_reloc, /* special_function */
1282 "R_PPC64_PLTGOT16_LO_DS",/* name */
1283 FALSE, /* partial_inplace */
1284 0, /* src_mask */
1285 0xfffc, /* dst_mask */
1286 FALSE), /* pcrel_offset */
1287
727fc41e 1288 /* Marker relocs for TLS. */
411e1bfb
AM
1289 HOWTO (R_PPC64_TLS,
1290 0, /* rightshift */
1291 2, /* size (0 = byte, 1 = short, 2 = long) */
1292 32, /* bitsize */
1293 FALSE, /* pc_relative */
1294 0, /* bitpos */
1295 complain_overflow_dont, /* complain_on_overflow */
1296 bfd_elf_generic_reloc, /* special_function */
1297 "R_PPC64_TLS", /* name */
1298 FALSE, /* partial_inplace */
1299 0, /* src_mask */
1300 0, /* dst_mask */
1301 FALSE), /* pcrel_offset */
1302
727fc41e
AM
1303 HOWTO (R_PPC64_TLSGD,
1304 0, /* rightshift */
1305 2, /* size (0 = byte, 1 = short, 2 = long) */
1306 32, /* bitsize */
1307 FALSE, /* pc_relative */
1308 0, /* bitpos */
1309 complain_overflow_dont, /* complain_on_overflow */
1310 bfd_elf_generic_reloc, /* special_function */
1311 "R_PPC64_TLSGD", /* name */
1312 FALSE, /* partial_inplace */
1313 0, /* src_mask */
1314 0, /* dst_mask */
1315 FALSE), /* pcrel_offset */
1316
1317 HOWTO (R_PPC64_TLSLD,
1318 0, /* rightshift */
1319 2, /* size (0 = byte, 1 = short, 2 = long) */
1320 32, /* bitsize */
1321 FALSE, /* pc_relative */
1322 0, /* bitpos */
1323 complain_overflow_dont, /* complain_on_overflow */
1324 bfd_elf_generic_reloc, /* special_function */
1325 "R_PPC64_TLSLD", /* name */
1326 FALSE, /* partial_inplace */
1327 0, /* src_mask */
1328 0, /* dst_mask */
1329 FALSE), /* pcrel_offset */
1330
3b421ab3
AM
1331 HOWTO (R_PPC64_TOCSAVE,
1332 0, /* rightshift */
1333 2, /* size (0 = byte, 1 = short, 2 = long) */
1334 32, /* bitsize */
1335 FALSE, /* pc_relative */
1336 0, /* bitpos */
1337 complain_overflow_dont, /* complain_on_overflow */
1338 bfd_elf_generic_reloc, /* special_function */
1339 "R_PPC64_TOCSAVE", /* name */
1340 FALSE, /* partial_inplace */
1341 0, /* src_mask */
1342 0, /* dst_mask */
1343 FALSE), /* pcrel_offset */
1344
411e1bfb
AM
1345 /* Computes the load module index of the load module that contains the
1346 definition of its TLS sym. */
1347 HOWTO (R_PPC64_DTPMOD64,
1348 0, /* rightshift */
1349 4, /* size (0 = byte, 1 = short, 2 = long) */
1350 64, /* bitsize */
1351 FALSE, /* pc_relative */
1352 0, /* bitpos */
1353 complain_overflow_dont, /* complain_on_overflow */
1354 ppc64_elf_unhandled_reloc, /* special_function */
1355 "R_PPC64_DTPMOD64", /* name */
1356 FALSE, /* partial_inplace */
1357 0, /* src_mask */
1358 ONES (64), /* dst_mask */
1359 FALSE), /* pcrel_offset */
1360
1361 /* Computes a dtv-relative displacement, the difference between the value
1362 of sym+add and the base address of the thread-local storage block that
1363 contains the definition of sym, minus 0x8000. */
1364 HOWTO (R_PPC64_DTPREL64,
1365 0, /* rightshift */
1366 4, /* size (0 = byte, 1 = short, 2 = long) */
1367 64, /* bitsize */
1368 FALSE, /* pc_relative */
1369 0, /* bitpos */
1370 complain_overflow_dont, /* complain_on_overflow */
1371 ppc64_elf_unhandled_reloc, /* special_function */
1372 "R_PPC64_DTPREL64", /* name */
1373 FALSE, /* partial_inplace */
1374 0, /* src_mask */
1375 ONES (64), /* dst_mask */
1376 FALSE), /* pcrel_offset */
1377
1378 /* A 16 bit dtprel reloc. */
1379 HOWTO (R_PPC64_DTPREL16,
1380 0, /* rightshift */
1381 1, /* size (0 = byte, 1 = short, 2 = long) */
1382 16, /* bitsize */
1383 FALSE, /* pc_relative */
1384 0, /* bitpos */
1385 complain_overflow_signed, /* complain_on_overflow */
1386 ppc64_elf_unhandled_reloc, /* special_function */
1387 "R_PPC64_DTPREL16", /* name */
1388 FALSE, /* partial_inplace */
1389 0, /* src_mask */
1390 0xffff, /* dst_mask */
1391 FALSE), /* pcrel_offset */
1392
1393 /* Like DTPREL16, but no overflow. */
1394 HOWTO (R_PPC64_DTPREL16_LO,
1395 0, /* rightshift */
1396 1, /* size (0 = byte, 1 = short, 2 = long) */
1397 16, /* bitsize */
1398 FALSE, /* pc_relative */
1399 0, /* bitpos */
1400 complain_overflow_dont, /* complain_on_overflow */
1401 ppc64_elf_unhandled_reloc, /* special_function */
1402 "R_PPC64_DTPREL16_LO", /* name */
1403 FALSE, /* partial_inplace */
1404 0, /* src_mask */
1405 0xffff, /* dst_mask */
1406 FALSE), /* pcrel_offset */
1407
1408 /* Like DTPREL16_LO, but next higher group of 16 bits. */
1409 HOWTO (R_PPC64_DTPREL16_HI,
1410 16, /* rightshift */
1411 1, /* size (0 = byte, 1 = short, 2 = long) */
1412 16, /* bitsize */
1413 FALSE, /* pc_relative */
1414 0, /* bitpos */
f9c6b907 1415 complain_overflow_signed, /* complain_on_overflow */
411e1bfb
AM
1416 ppc64_elf_unhandled_reloc, /* special_function */
1417 "R_PPC64_DTPREL16_HI", /* name */
1418 FALSE, /* partial_inplace */
1419 0, /* src_mask */
1420 0xffff, /* dst_mask */
1421 FALSE), /* pcrel_offset */
1422
1423 /* Like DTPREL16_HI, but adjust for low 16 bits. */
1424 HOWTO (R_PPC64_DTPREL16_HA,
1425 16, /* rightshift */
1426 1, /* size (0 = byte, 1 = short, 2 = long) */
1427 16, /* bitsize */
1428 FALSE, /* pc_relative */
1429 0, /* bitpos */
f9c6b907 1430 complain_overflow_signed, /* complain_on_overflow */
411e1bfb
AM
1431 ppc64_elf_unhandled_reloc, /* special_function */
1432 "R_PPC64_DTPREL16_HA", /* name */
1433 FALSE, /* partial_inplace */
1434 0, /* src_mask */
1435 0xffff, /* dst_mask */
1436 FALSE), /* pcrel_offset */
1437
1438 /* Like DTPREL16_HI, but next higher group of 16 bits. */
1439 HOWTO (R_PPC64_DTPREL16_HIGHER,
1440 32, /* rightshift */
1441 1, /* size (0 = byte, 1 = short, 2 = long) */
1442 16, /* bitsize */
1443 FALSE, /* pc_relative */
1444 0, /* bitpos */
1445 complain_overflow_dont, /* complain_on_overflow */
1446 ppc64_elf_unhandled_reloc, /* special_function */
1447 "R_PPC64_DTPREL16_HIGHER", /* name */
1448 FALSE, /* partial_inplace */
1449 0, /* src_mask */
1450 0xffff, /* dst_mask */
1451 FALSE), /* pcrel_offset */
1452
1453 /* Like DTPREL16_HIGHER, but adjust for low 16 bits. */
1454 HOWTO (R_PPC64_DTPREL16_HIGHERA,
1455 32, /* rightshift */
1456 1, /* size (0 = byte, 1 = short, 2 = long) */
1457 16, /* bitsize */
1458 FALSE, /* pc_relative */
1459 0, /* bitpos */
1460 complain_overflow_dont, /* complain_on_overflow */
1461 ppc64_elf_unhandled_reloc, /* special_function */
1462 "R_PPC64_DTPREL16_HIGHERA", /* name */
1463 FALSE, /* partial_inplace */
1464 0, /* src_mask */
1465 0xffff, /* dst_mask */
1466 FALSE), /* pcrel_offset */
1467
1468 /* Like DTPREL16_HIGHER, but next higher group of 16 bits. */
1469 HOWTO (R_PPC64_DTPREL16_HIGHEST,
1470 48, /* rightshift */
1471 1, /* size (0 = byte, 1 = short, 2 = long) */
1472 16, /* bitsize */
1473 FALSE, /* pc_relative */
1474 0, /* bitpos */
1475 complain_overflow_dont, /* complain_on_overflow */
1476 ppc64_elf_unhandled_reloc, /* special_function */
1477 "R_PPC64_DTPREL16_HIGHEST", /* name */
1478 FALSE, /* partial_inplace */
1479 0, /* src_mask */
1480 0xffff, /* dst_mask */
1481 FALSE), /* pcrel_offset */
1482
1483 /* Like DTPREL16_HIGHEST, but adjust for low 16 bits. */
1484 HOWTO (R_PPC64_DTPREL16_HIGHESTA,
1485 48, /* rightshift */
1486 1, /* size (0 = byte, 1 = short, 2 = long) */
1487 16, /* bitsize */
1488 FALSE, /* pc_relative */
1489 0, /* bitpos */
1490 complain_overflow_dont, /* complain_on_overflow */
1491 ppc64_elf_unhandled_reloc, /* special_function */
1492 "R_PPC64_DTPREL16_HIGHESTA", /* name */
1493 FALSE, /* partial_inplace */
1494 0, /* src_mask */
1495 0xffff, /* dst_mask */
1496 FALSE), /* pcrel_offset */
1497
1498 /* Like DTPREL16, but for insns with a DS field. */
1499 HOWTO (R_PPC64_DTPREL16_DS,
1500 0, /* rightshift */
1501 1, /* size (0 = byte, 1 = short, 2 = long) */
1502 16, /* bitsize */
1503 FALSE, /* pc_relative */
1504 0, /* bitpos */
1505 complain_overflow_signed, /* complain_on_overflow */
1506 ppc64_elf_unhandled_reloc, /* special_function */
1507 "R_PPC64_DTPREL16_DS", /* name */
1508 FALSE, /* partial_inplace */
1509 0, /* src_mask */
1510 0xfffc, /* dst_mask */
1511 FALSE), /* pcrel_offset */
1512
1513 /* Like DTPREL16_DS, but no overflow. */
1514 HOWTO (R_PPC64_DTPREL16_LO_DS,
1515 0, /* rightshift */
1516 1, /* size (0 = byte, 1 = short, 2 = long) */
1517 16, /* bitsize */
1518 FALSE, /* pc_relative */
1519 0, /* bitpos */
1520 complain_overflow_dont, /* complain_on_overflow */
1521 ppc64_elf_unhandled_reloc, /* special_function */
1522 "R_PPC64_DTPREL16_LO_DS", /* name */
1523 FALSE, /* partial_inplace */
1524 0, /* src_mask */
1525 0xfffc, /* dst_mask */
1526 FALSE), /* pcrel_offset */
1527
1528 /* Computes a tp-relative displacement, the difference between the value of
1529 sym+add and the value of the thread pointer (r13). */
1530 HOWTO (R_PPC64_TPREL64,
1531 0, /* rightshift */
1532 4, /* size (0 = byte, 1 = short, 2 = long) */
1533 64, /* bitsize */
1534 FALSE, /* pc_relative */
1535 0, /* bitpos */
1536 complain_overflow_dont, /* complain_on_overflow */
1537 ppc64_elf_unhandled_reloc, /* special_function */
1538 "R_PPC64_TPREL64", /* name */
1539 FALSE, /* partial_inplace */
1540 0, /* src_mask */
1541 ONES (64), /* dst_mask */
1542 FALSE), /* pcrel_offset */
1543
1544 /* A 16 bit tprel reloc. */
1545 HOWTO (R_PPC64_TPREL16,
1546 0, /* rightshift */
1547 1, /* size (0 = byte, 1 = short, 2 = long) */
1548 16, /* bitsize */
1549 FALSE, /* pc_relative */
1550 0, /* bitpos */
1551 complain_overflow_signed, /* complain_on_overflow */
1552 ppc64_elf_unhandled_reloc, /* special_function */
1553 "R_PPC64_TPREL16", /* name */
1554 FALSE, /* partial_inplace */
1555 0, /* src_mask */
1556 0xffff, /* dst_mask */
1557 FALSE), /* pcrel_offset */
1558
1559 /* Like TPREL16, but no overflow. */
1560 HOWTO (R_PPC64_TPREL16_LO,
1561 0, /* rightshift */
1562 1, /* size (0 = byte, 1 = short, 2 = long) */
1563 16, /* bitsize */
1564 FALSE, /* pc_relative */
1565 0, /* bitpos */
1566 complain_overflow_dont, /* complain_on_overflow */
1567 ppc64_elf_unhandled_reloc, /* special_function */
1568 "R_PPC64_TPREL16_LO", /* name */
1569 FALSE, /* partial_inplace */
1570 0, /* src_mask */
1571 0xffff, /* dst_mask */
1572 FALSE), /* pcrel_offset */
1573
1574 /* Like TPREL16_LO, but next higher group of 16 bits. */
1575 HOWTO (R_PPC64_TPREL16_HI,
1576 16, /* rightshift */
1577 1, /* size (0 = byte, 1 = short, 2 = long) */
1578 16, /* bitsize */
1579 FALSE, /* pc_relative */
1580 0, /* bitpos */
f9c6b907 1581 complain_overflow_signed, /* complain_on_overflow */
411e1bfb
AM
1582 ppc64_elf_unhandled_reloc, /* special_function */
1583 "R_PPC64_TPREL16_HI", /* name */
1584 FALSE, /* partial_inplace */
1585 0, /* src_mask */
1586 0xffff, /* dst_mask */
1587 FALSE), /* pcrel_offset */
1588
1589 /* Like TPREL16_HI, but adjust for low 16 bits. */
1590 HOWTO (R_PPC64_TPREL16_HA,
1591 16, /* rightshift */
1592 1, /* size (0 = byte, 1 = short, 2 = long) */
1593 16, /* bitsize */
1594 FALSE, /* pc_relative */
1595 0, /* bitpos */
f9c6b907 1596 complain_overflow_signed, /* complain_on_overflow */
411e1bfb
AM
1597 ppc64_elf_unhandled_reloc, /* special_function */
1598 "R_PPC64_TPREL16_HA", /* name */
1599 FALSE, /* partial_inplace */
1600 0, /* src_mask */
1601 0xffff, /* dst_mask */
1602 FALSE), /* pcrel_offset */
1603
1604 /* Like TPREL16_HI, but next higher group of 16 bits. */
1605 HOWTO (R_PPC64_TPREL16_HIGHER,
1606 32, /* rightshift */
1607 1, /* size (0 = byte, 1 = short, 2 = long) */
1608 16, /* bitsize */
1609 FALSE, /* pc_relative */
1610 0, /* bitpos */
1611 complain_overflow_dont, /* complain_on_overflow */
1612 ppc64_elf_unhandled_reloc, /* special_function */
1613 "R_PPC64_TPREL16_HIGHER", /* name */
1614 FALSE, /* partial_inplace */
1615 0, /* src_mask */
1616 0xffff, /* dst_mask */
1617 FALSE), /* pcrel_offset */
1618
1619 /* Like TPREL16_HIGHER, but adjust for low 16 bits. */
1620 HOWTO (R_PPC64_TPREL16_HIGHERA,
1621 32, /* rightshift */
1622 1, /* size (0 = byte, 1 = short, 2 = long) */
1623 16, /* bitsize */
1624 FALSE, /* pc_relative */
1625 0, /* bitpos */
1626 complain_overflow_dont, /* complain_on_overflow */
1627 ppc64_elf_unhandled_reloc, /* special_function */
1628 "R_PPC64_TPREL16_HIGHERA", /* name */
1629 FALSE, /* partial_inplace */
1630 0, /* src_mask */
1631 0xffff, /* dst_mask */
1632 FALSE), /* pcrel_offset */
1633
1634 /* Like TPREL16_HIGHER, but next higher group of 16 bits. */
1635 HOWTO (R_PPC64_TPREL16_HIGHEST,
1636 48, /* rightshift */
1637 1, /* size (0 = byte, 1 = short, 2 = long) */
1638 16, /* bitsize */
1639 FALSE, /* pc_relative */
1640 0, /* bitpos */
1641 complain_overflow_dont, /* complain_on_overflow */
1642 ppc64_elf_unhandled_reloc, /* special_function */
1643 "R_PPC64_TPREL16_HIGHEST", /* name */
1644 FALSE, /* partial_inplace */
1645 0, /* src_mask */
1646 0xffff, /* dst_mask */
1647 FALSE), /* pcrel_offset */
1648
1649 /* Like TPREL16_HIGHEST, but adjust for low 16 bits. */
1650 HOWTO (R_PPC64_TPREL16_HIGHESTA,
1651 48, /* rightshift */
1652 1, /* size (0 = byte, 1 = short, 2 = long) */
1653 16, /* bitsize */
1654 FALSE, /* pc_relative */
1655 0, /* bitpos */
1656 complain_overflow_dont, /* complain_on_overflow */
1657 ppc64_elf_unhandled_reloc, /* special_function */
1658 "R_PPC64_TPREL16_HIGHESTA", /* name */
1659 FALSE, /* partial_inplace */
1660 0, /* src_mask */
1661 0xffff, /* dst_mask */
1662 FALSE), /* pcrel_offset */
1663
1664 /* Like TPREL16, but for insns with a DS field. */
1665 HOWTO (R_PPC64_TPREL16_DS,
1666 0, /* rightshift */
1667 1, /* size (0 = byte, 1 = short, 2 = long) */
1668 16, /* bitsize */
1669 FALSE, /* pc_relative */
1670 0, /* bitpos */
1671 complain_overflow_signed, /* complain_on_overflow */
1672 ppc64_elf_unhandled_reloc, /* special_function */
1673 "R_PPC64_TPREL16_DS", /* name */
1674 FALSE, /* partial_inplace */
1675 0, /* src_mask */
1676 0xfffc, /* dst_mask */
1677 FALSE), /* pcrel_offset */
1678
1679 /* Like TPREL16_DS, but no overflow. */
1680 HOWTO (R_PPC64_TPREL16_LO_DS,
1681 0, /* rightshift */
1682 1, /* size (0 = byte, 1 = short, 2 = long) */
1683 16, /* bitsize */
1684 FALSE, /* pc_relative */
1685 0, /* bitpos */
1686 complain_overflow_dont, /* complain_on_overflow */
1687 ppc64_elf_unhandled_reloc, /* special_function */
1688 "R_PPC64_TPREL16_LO_DS", /* name */
1689 FALSE, /* partial_inplace */
1690 0, /* src_mask */
1691 0xfffc, /* dst_mask */
1692 FALSE), /* pcrel_offset */
1693
1694 /* Allocates two contiguous entries in the GOT to hold a tls_index structure,
1695 with values (sym+add)@dtpmod and (sym+add)@dtprel, and computes the offset
1696 to the first entry relative to the TOC base (r2). */
1697 HOWTO (R_PPC64_GOT_TLSGD16,
1698 0, /* rightshift */
1699 1, /* size (0 = byte, 1 = short, 2 = long) */
1700 16, /* bitsize */
1701 FALSE, /* pc_relative */
1702 0, /* bitpos */
1703 complain_overflow_signed, /* complain_on_overflow */
1704 ppc64_elf_unhandled_reloc, /* special_function */
1705 "R_PPC64_GOT_TLSGD16", /* name */
b34976b6 1706 FALSE, /* partial_inplace */
5bd4f169
AM
1707 0, /* src_mask */
1708 0xffff, /* dst_mask */
b34976b6 1709 FALSE), /* pcrel_offset */
5bd4f169 1710
411e1bfb
AM
1711 /* Like GOT_TLSGD16, but no overflow. */
1712 HOWTO (R_PPC64_GOT_TLSGD16_LO,
5bd4f169
AM
1713 0, /* rightshift */
1714 1, /* size (0 = byte, 1 = short, 2 = long) */
1715 16, /* bitsize */
b34976b6 1716 FALSE, /* pc_relative */
5bd4f169
AM
1717 0, /* bitpos */
1718 complain_overflow_dont, /* complain_on_overflow */
805fc799 1719 ppc64_elf_unhandled_reloc, /* special_function */
411e1bfb 1720 "R_PPC64_GOT_TLSGD16_LO", /* name */
b34976b6 1721 FALSE, /* partial_inplace */
5bd4f169
AM
1722 0, /* src_mask */
1723 0xffff, /* dst_mask */
b34976b6 1724 FALSE), /* pcrel_offset */
5bd4f169 1725
411e1bfb
AM
1726 /* Like GOT_TLSGD16_LO, but next higher group of 16 bits. */
1727 HOWTO (R_PPC64_GOT_TLSGD16_HI,
5bd4f169
AM
1728 16, /* rightshift */
1729 1, /* size (0 = byte, 1 = short, 2 = long) */
1730 16, /* bitsize */
b34976b6 1731 FALSE, /* pc_relative */
5bd4f169 1732 0, /* bitpos */
f9c6b907 1733 complain_overflow_signed, /* complain_on_overflow */
805fc799 1734 ppc64_elf_unhandled_reloc, /* special_function */
411e1bfb 1735 "R_PPC64_GOT_TLSGD16_HI", /* name */
b34976b6 1736 FALSE, /* partial_inplace */
5bd4f169
AM
1737 0, /* src_mask */
1738 0xffff, /* dst_mask */
b34976b6 1739 FALSE), /* pcrel_offset */
5bd4f169 1740
411e1bfb
AM
1741 /* Like GOT_TLSGD16_HI, but adjust for low 16 bits. */
1742 HOWTO (R_PPC64_GOT_TLSGD16_HA,
5bd4f169
AM
1743 16, /* rightshift */
1744 1, /* size (0 = byte, 1 = short, 2 = long) */
1745 16, /* bitsize */
b34976b6 1746 FALSE, /* pc_relative */
5bd4f169 1747 0, /* bitpos */
f9c6b907 1748 complain_overflow_signed, /* complain_on_overflow */
805fc799 1749 ppc64_elf_unhandled_reloc, /* special_function */
411e1bfb 1750 "R_PPC64_GOT_TLSGD16_HA", /* name */
b34976b6 1751 FALSE, /* partial_inplace */
5bd4f169
AM
1752 0, /* src_mask */
1753 0xffff, /* dst_mask */
b34976b6 1754 FALSE), /* pcrel_offset */
5bd4f169 1755
411e1bfb
AM
1756 /* Allocates two contiguous entries in the GOT to hold a tls_index structure,
1757 with values (sym+add)@dtpmod and zero, and computes the offset to the
1758 first entry relative to the TOC base (r2). */
1759 HOWTO (R_PPC64_GOT_TLSLD16,
5bd4f169
AM
1760 0, /* rightshift */
1761 1, /* size (0 = byte, 1 = short, 2 = long) */
1762 16, /* bitsize */
b34976b6 1763 FALSE, /* pc_relative */
5bd4f169 1764 0, /* bitpos */
411e1bfb
AM
1765 complain_overflow_signed, /* complain_on_overflow */
1766 ppc64_elf_unhandled_reloc, /* special_function */
1767 "R_PPC64_GOT_TLSLD16", /* name */
b34976b6 1768 FALSE, /* partial_inplace */
d006db6c 1769 0, /* src_mask */
411e1bfb 1770 0xffff, /* dst_mask */
b34976b6 1771 FALSE), /* pcrel_offset */
5bd4f169 1772
411e1bfb
AM
1773 /* Like GOT_TLSLD16, but no overflow. */
1774 HOWTO (R_PPC64_GOT_TLSLD16_LO,
5bd4f169
AM
1775 0, /* rightshift */
1776 1, /* size (0 = byte, 1 = short, 2 = long) */
1777 16, /* bitsize */
b34976b6 1778 FALSE, /* pc_relative */
5bd4f169 1779 0, /* bitpos */
411e1bfb
AM
1780 complain_overflow_dont, /* complain_on_overflow */
1781 ppc64_elf_unhandled_reloc, /* special_function */
1782 "R_PPC64_GOT_TLSLD16_LO", /* name */
b34976b6 1783 FALSE, /* partial_inplace */
d006db6c 1784 0, /* src_mask */
411e1bfb 1785 0xffff, /* dst_mask */
b34976b6 1786 FALSE), /* pcrel_offset */
5bd4f169 1787
411e1bfb
AM
1788 /* Like GOT_TLSLD16_LO, but next higher group of 16 bits. */
1789 HOWTO (R_PPC64_GOT_TLSLD16_HI,
1790 16, /* rightshift */
5bd4f169
AM
1791 1, /* size (0 = byte, 1 = short, 2 = long) */
1792 16, /* bitsize */
b34976b6 1793 FALSE, /* pc_relative */
5bd4f169 1794 0, /* bitpos */
f9c6b907 1795 complain_overflow_signed, /* complain_on_overflow */
805fc799 1796 ppc64_elf_unhandled_reloc, /* special_function */
411e1bfb 1797 "R_PPC64_GOT_TLSLD16_HI", /* name */
b34976b6 1798 FALSE, /* partial_inplace */
d006db6c 1799 0, /* src_mask */
411e1bfb 1800 0xffff, /* dst_mask */
b34976b6 1801 FALSE), /* pcrel_offset */
5bd4f169 1802
411e1bfb
AM
1803 /* Like GOT_TLSLD16_HI, but adjust for low 16 bits. */
1804 HOWTO (R_PPC64_GOT_TLSLD16_HA,
1805 16, /* rightshift */
5bd4f169
AM
1806 1, /* size (0 = byte, 1 = short, 2 = long) */
1807 16, /* bitsize */
b34976b6 1808 FALSE, /* pc_relative */
5bd4f169 1809 0, /* bitpos */
f9c6b907 1810 complain_overflow_signed, /* complain_on_overflow */
805fc799 1811 ppc64_elf_unhandled_reloc, /* special_function */
411e1bfb 1812 "R_PPC64_GOT_TLSLD16_HA", /* name */
b34976b6 1813 FALSE, /* partial_inplace */
d006db6c 1814 0, /* src_mask */
411e1bfb 1815 0xffff, /* dst_mask */
b34976b6 1816 FALSE), /* pcrel_offset */
5bd4f169 1817
411e1bfb
AM
1818 /* Allocates an entry in the GOT with value (sym+add)@dtprel, and computes
1819 the offset to the entry relative to the TOC base (r2). */
1820 HOWTO (R_PPC64_GOT_DTPREL16_DS,
5bd4f169
AM
1821 0, /* rightshift */
1822 1, /* size (0 = byte, 1 = short, 2 = long) */
1823 16, /* bitsize */
b34976b6 1824 FALSE, /* pc_relative */
5bd4f169 1825 0, /* bitpos */
411e1bfb 1826 complain_overflow_signed, /* complain_on_overflow */
805fc799 1827 ppc64_elf_unhandled_reloc, /* special_function */
411e1bfb 1828 "R_PPC64_GOT_DTPREL16_DS", /* name */
b34976b6 1829 FALSE, /* partial_inplace */
d006db6c 1830 0, /* src_mask */
5bd4f169 1831 0xfffc, /* dst_mask */
b34976b6 1832 FALSE), /* pcrel_offset */
5bd4f169 1833
411e1bfb
AM
1834 /* Like GOT_DTPREL16_DS, but no overflow. */
1835 HOWTO (R_PPC64_GOT_DTPREL16_LO_DS,
5bd4f169 1836 0, /* rightshift */
c061c2d8
AM
1837 1, /* size (0 = byte, 1 = short, 2 = long) */
1838 16, /* bitsize */
b34976b6 1839 FALSE, /* pc_relative */
5bd4f169 1840 0, /* bitpos */
411e1bfb
AM
1841 complain_overflow_dont, /* complain_on_overflow */
1842 ppc64_elf_unhandled_reloc, /* special_function */
1843 "R_PPC64_GOT_DTPREL16_LO_DS", /* name */
b34976b6 1844 FALSE, /* partial_inplace */
d006db6c 1845 0, /* src_mask */
c061c2d8 1846 0xfffc, /* dst_mask */
b34976b6 1847 FALSE), /* pcrel_offset */
5bd4f169 1848
411e1bfb
AM
1849 /* Like GOT_DTPREL16_LO_DS, but next higher group of 16 bits. */
1850 HOWTO (R_PPC64_GOT_DTPREL16_HI,
1851 16, /* rightshift */
5bd4f169
AM
1852 1, /* size (0 = byte, 1 = short, 2 = long) */
1853 16, /* bitsize */
b34976b6 1854 FALSE, /* pc_relative */
5bd4f169 1855 0, /* bitpos */
f9c6b907 1856 complain_overflow_signed, /* complain_on_overflow */
411e1bfb
AM
1857 ppc64_elf_unhandled_reloc, /* special_function */
1858 "R_PPC64_GOT_DTPREL16_HI", /* name */
b34976b6 1859 FALSE, /* partial_inplace */
d006db6c 1860 0, /* src_mask */
411e1bfb 1861 0xffff, /* dst_mask */
b34976b6 1862 FALSE), /* pcrel_offset */
5bd4f169 1863
411e1bfb
AM
1864 /* Like GOT_DTPREL16_HI, but adjust for low 16 bits. */
1865 HOWTO (R_PPC64_GOT_DTPREL16_HA,
1866 16, /* rightshift */
1867 1, /* size (0 = byte, 1 = short, 2 = long) */
1868 16, /* bitsize */
1869 FALSE, /* pc_relative */
1870 0, /* bitpos */
f9c6b907 1871 complain_overflow_signed, /* complain_on_overflow */
411e1bfb
AM
1872 ppc64_elf_unhandled_reloc, /* special_function */
1873 "R_PPC64_GOT_DTPREL16_HA", /* name */
1874 FALSE, /* partial_inplace */
1875 0, /* src_mask */
1876 0xffff, /* dst_mask */
1877 FALSE), /* pcrel_offset */
1878
1879 /* Allocates an entry in the GOT with value (sym+add)@tprel, and computes the
1880 offset to the entry relative to the TOC base (r2). */
1881 HOWTO (R_PPC64_GOT_TPREL16_DS,
5bd4f169
AM
1882 0, /* rightshift */
1883 1, /* size (0 = byte, 1 = short, 2 = long) */
1884 16, /* bitsize */
b34976b6 1885 FALSE, /* pc_relative */
5bd4f169
AM
1886 0, /* bitpos */
1887 complain_overflow_signed, /* complain_on_overflow */
411e1bfb
AM
1888 ppc64_elf_unhandled_reloc, /* special_function */
1889 "R_PPC64_GOT_TPREL16_DS", /* name */
b34976b6 1890 FALSE, /* partial_inplace */
d006db6c 1891 0, /* src_mask */
ad8e1ba5 1892 0xfffc, /* dst_mask */
b34976b6 1893 FALSE), /* pcrel_offset */
5bd4f169 1894
411e1bfb
AM
1895 /* Like GOT_TPREL16_DS, but no overflow. */
1896 HOWTO (R_PPC64_GOT_TPREL16_LO_DS,
5bd4f169
AM
1897 0, /* rightshift */
1898 1, /* size (0 = byte, 1 = short, 2 = long) */
1899 16, /* bitsize */
b34976b6 1900 FALSE, /* pc_relative */
5bd4f169
AM
1901 0, /* bitpos */
1902 complain_overflow_dont, /* complain_on_overflow */
411e1bfb
AM
1903 ppc64_elf_unhandled_reloc, /* special_function */
1904 "R_PPC64_GOT_TPREL16_LO_DS", /* name */
b34976b6 1905 FALSE, /* partial_inplace */
d006db6c 1906 0, /* src_mask */
ad8e1ba5 1907 0xfffc, /* dst_mask */
b34976b6 1908 FALSE), /* pcrel_offset */
5bd4f169 1909
411e1bfb
AM
1910 /* Like GOT_TPREL16_LO_DS, but next higher group of 16 bits. */
1911 HOWTO (R_PPC64_GOT_TPREL16_HI,
1912 16, /* rightshift */
5bd4f169
AM
1913 1, /* size (0 = byte, 1 = short, 2 = long) */
1914 16, /* bitsize */
b34976b6 1915 FALSE, /* pc_relative */
5bd4f169 1916 0, /* bitpos */
f9c6b907 1917 complain_overflow_signed, /* complain_on_overflow */
805fc799 1918 ppc64_elf_unhandled_reloc, /* special_function */
411e1bfb 1919 "R_PPC64_GOT_TPREL16_HI", /* name */
b34976b6 1920 FALSE, /* partial_inplace */
d006db6c 1921 0, /* src_mask */
411e1bfb 1922 0xffff, /* dst_mask */
b34976b6 1923 FALSE), /* pcrel_offset */
5bd4f169 1924
411e1bfb
AM
1925 /* Like GOT_TPREL16_HI, but adjust for low 16 bits. */
1926 HOWTO (R_PPC64_GOT_TPREL16_HA,
1927 16, /* rightshift */
5bd4f169
AM
1928 1, /* size (0 = byte, 1 = short, 2 = long) */
1929 16, /* bitsize */
b34976b6 1930 FALSE, /* pc_relative */
5bd4f169 1931 0, /* bitpos */
f9c6b907 1932 complain_overflow_signed, /* complain_on_overflow */
805fc799 1933 ppc64_elf_unhandled_reloc, /* special_function */
411e1bfb 1934 "R_PPC64_GOT_TPREL16_HA", /* name */
b34976b6 1935 FALSE, /* partial_inplace */
d006db6c 1936 0, /* src_mask */
411e1bfb 1937 0xffff, /* dst_mask */
b34976b6 1938 FALSE), /* pcrel_offset */
5bd4f169 1939
25f23106
AM
1940 HOWTO (R_PPC64_JMP_IREL, /* type */
1941 0, /* rightshift */
1942 0, /* size (0=byte, 1=short, 2=long, 4=64 bits) */
1943 0, /* bitsize */
1944 FALSE, /* pc_relative */
1945 0, /* bitpos */
1946 complain_overflow_dont, /* complain_on_overflow */
1947 ppc64_elf_unhandled_reloc, /* special_function */
1948 "R_PPC64_JMP_IREL", /* name */
1949 FALSE, /* partial_inplace */
1950 0, /* src_mask */
1951 0, /* dst_mask */
1952 FALSE), /* pcrel_offset */
1953
e054468f
AM
1954 HOWTO (R_PPC64_IRELATIVE, /* type */
1955 0, /* rightshift */
1956 4, /* size (0=byte, 1=short, 2=long, 4=64 bits) */
1957 64, /* bitsize */
1958 FALSE, /* pc_relative */
1959 0, /* bitpos */
1960 complain_overflow_dont, /* complain_on_overflow */
1961 bfd_elf_generic_reloc, /* special_function */
1962 "R_PPC64_IRELATIVE", /* name */
1963 FALSE, /* partial_inplace */
1964 0, /* src_mask */
1965 ONES (64), /* dst_mask */
1966 FALSE), /* pcrel_offset */
1967
25f23106
AM
1968 /* A 16 bit relative relocation. */
1969 HOWTO (R_PPC64_REL16, /* type */
1970 0, /* rightshift */
1971 1, /* size (0 = byte, 1 = short, 2 = long) */
1972 16, /* bitsize */
1973 TRUE, /* pc_relative */
1974 0, /* bitpos */
b80eed39 1975 complain_overflow_signed, /* complain_on_overflow */
25f23106
AM
1976 bfd_elf_generic_reloc, /* special_function */
1977 "R_PPC64_REL16", /* name */
1978 FALSE, /* partial_inplace */
1979 0, /* src_mask */
1980 0xffff, /* dst_mask */
1981 TRUE), /* pcrel_offset */
1982
1983 /* A 16 bit relative relocation without overflow. */
1984 HOWTO (R_PPC64_REL16_LO, /* type */
1985 0, /* rightshift */
1986 1, /* size (0 = byte, 1 = short, 2 = long) */
1987 16, /* bitsize */
1988 TRUE, /* pc_relative */
1989 0, /* bitpos */
1990 complain_overflow_dont,/* complain_on_overflow */
1991 bfd_elf_generic_reloc, /* special_function */
1992 "R_PPC64_REL16_LO", /* name */
1993 FALSE, /* partial_inplace */
1994 0, /* src_mask */
1995 0xffff, /* dst_mask */
1996 TRUE), /* pcrel_offset */
1997
1998 /* The high order 16 bits of a relative address. */
1999 HOWTO (R_PPC64_REL16_HI, /* type */
2000 16, /* rightshift */
2001 1, /* size (0 = byte, 1 = short, 2 = long) */
2002 16, /* bitsize */
2003 TRUE, /* pc_relative */
2004 0, /* bitpos */
f9c6b907 2005 complain_overflow_signed, /* complain_on_overflow */
25f23106
AM
2006 bfd_elf_generic_reloc, /* special_function */
2007 "R_PPC64_REL16_HI", /* name */
2008 FALSE, /* partial_inplace */
2009 0, /* src_mask */
2010 0xffff, /* dst_mask */
2011 TRUE), /* pcrel_offset */
2012
2013 /* The high order 16 bits of a relative address, plus 1 if the contents of
2014 the low 16 bits, treated as a signed number, is negative. */
2015 HOWTO (R_PPC64_REL16_HA, /* type */
2016 16, /* rightshift */
2017 1, /* size (0 = byte, 1 = short, 2 = long) */
2018 16, /* bitsize */
2019 TRUE, /* pc_relative */
2020 0, /* bitpos */
f9c6b907 2021 complain_overflow_signed, /* complain_on_overflow */
25f23106
AM
2022 ppc64_elf_ha_reloc, /* special_function */
2023 "R_PPC64_REL16_HA", /* name */
2024 FALSE, /* partial_inplace */
2025 0, /* src_mask */
2026 0xffff, /* dst_mask */
2027 TRUE), /* pcrel_offset */
2028
a680de9a
PB
2029 /* Like R_PPC64_REL16_HA but for split field in addpcis. */
2030 HOWTO (R_PPC64_REL16DX_HA, /* type */
2031 16, /* rightshift */
2032 2, /* size (0 = byte, 1 = short, 2 = long) */
2033 16, /* bitsize */
2034 TRUE, /* pc_relative */
2035 0, /* bitpos */
2036 complain_overflow_signed, /* complain_on_overflow */
2037 ppc64_elf_ha_reloc, /* special_function */
2038 "R_PPC64_REL16DX_HA", /* name */
2039 FALSE, /* partial_inplace */
2040 0, /* src_mask */
2041 0x1fffc1, /* dst_mask */
2042 TRUE), /* pcrel_offset */
2043
f9c6b907
AM
2044 /* Like R_PPC64_ADDR16_HI, but no overflow. */
2045 HOWTO (R_PPC64_ADDR16_HIGH, /* type */
2046 16, /* rightshift */
2047 1, /* size (0 = byte, 1 = short, 2 = long) */
2048 16, /* bitsize */
2049 FALSE, /* pc_relative */
2050 0, /* bitpos */
2051 complain_overflow_dont, /* complain_on_overflow */
2052 bfd_elf_generic_reloc, /* special_function */
2053 "R_PPC64_ADDR16_HIGH", /* name */
2054 FALSE, /* partial_inplace */
2055 0, /* src_mask */
2056 0xffff, /* dst_mask */
2057 FALSE), /* pcrel_offset */
2058
2059 /* Like R_PPC64_ADDR16_HA, but no overflow. */
2060 HOWTO (R_PPC64_ADDR16_HIGHA, /* type */
2061 16, /* rightshift */
2062 1, /* size (0 = byte, 1 = short, 2 = long) */
2063 16, /* bitsize */
2064 FALSE, /* pc_relative */
2065 0, /* bitpos */
2066 complain_overflow_dont, /* complain_on_overflow */
2067 ppc64_elf_ha_reloc, /* special_function */
2068 "R_PPC64_ADDR16_HIGHA", /* name */
2069 FALSE, /* partial_inplace */
2070 0, /* src_mask */
2071 0xffff, /* dst_mask */
2072 FALSE), /* pcrel_offset */
2073
2074 /* Like R_PPC64_DTPREL16_HI, but no overflow. */
2075 HOWTO (R_PPC64_DTPREL16_HIGH,
2076 16, /* rightshift */
2077 1, /* size (0 = byte, 1 = short, 2 = long) */
2078 16, /* bitsize */
2079 FALSE, /* pc_relative */
2080 0, /* bitpos */
2081 complain_overflow_dont, /* complain_on_overflow */
2082 ppc64_elf_unhandled_reloc, /* special_function */
2083 "R_PPC64_DTPREL16_HIGH", /* name */
2084 FALSE, /* partial_inplace */
2085 0, /* src_mask */
2086 0xffff, /* dst_mask */
2087 FALSE), /* pcrel_offset */
2088
2089 /* Like R_PPC64_DTPREL16_HA, but no overflow. */
2090 HOWTO (R_PPC64_DTPREL16_HIGHA,
2091 16, /* rightshift */
2092 1, /* size (0 = byte, 1 = short, 2 = long) */
2093 16, /* bitsize */
2094 FALSE, /* pc_relative */
2095 0, /* bitpos */
2096 complain_overflow_dont, /* complain_on_overflow */
2097 ppc64_elf_unhandled_reloc, /* special_function */
2098 "R_PPC64_DTPREL16_HIGHA", /* name */
2099 FALSE, /* partial_inplace */
2100 0, /* src_mask */
2101 0xffff, /* dst_mask */
2102 FALSE), /* pcrel_offset */
2103
2104 /* Like R_PPC64_TPREL16_HI, but no overflow. */
2105 HOWTO (R_PPC64_TPREL16_HIGH,
2106 16, /* rightshift */
2107 1, /* size (0 = byte, 1 = short, 2 = long) */
2108 16, /* bitsize */
2109 FALSE, /* pc_relative */
2110 0, /* bitpos */
2111 complain_overflow_dont, /* complain_on_overflow */
2112 ppc64_elf_unhandled_reloc, /* special_function */
2113 "R_PPC64_TPREL16_HIGH", /* name */
2114 FALSE, /* partial_inplace */
2115 0, /* src_mask */
2116 0xffff, /* dst_mask */
2117 FALSE), /* pcrel_offset */
2118
2119 /* Like R_PPC64_TPREL16_HA, but no overflow. */
2120 HOWTO (R_PPC64_TPREL16_HIGHA,
2121 16, /* rightshift */
2122 1, /* size (0 = byte, 1 = short, 2 = long) */
2123 16, /* bitsize */
2124 FALSE, /* pc_relative */
2125 0, /* bitpos */
2126 complain_overflow_dont, /* complain_on_overflow */
2127 ppc64_elf_unhandled_reloc, /* special_function */
2128 "R_PPC64_TPREL16_HIGHA", /* name */
2129 FALSE, /* partial_inplace */
2130 0, /* src_mask */
2131 0xffff, /* dst_mask */
2132 FALSE), /* pcrel_offset */
2133
006589cf
AM
2134 /* Marker reloc on ELFv2 large-model function entry. */
2135 HOWTO (R_PPC64_ENTRY,
2136 0, /* rightshift */
2137 2, /* size (0 = byte, 1 = short, 2 = long) */
2138 32, /* bitsize */
2139 FALSE, /* pc_relative */
2140 0, /* bitpos */
2141 complain_overflow_dont, /* complain_on_overflow */
2142 bfd_elf_generic_reloc, /* special_function */
2143 "R_PPC64_ENTRY", /* name */
2144 FALSE, /* partial_inplace */
2145 0, /* src_mask */
2146 0, /* dst_mask */
2147 FALSE), /* pcrel_offset */
2148
45965137
AM
2149 /* Like ADDR64, but use local entry point of function. */
2150 HOWTO (R_PPC64_ADDR64_LOCAL, /* type */
2151 0, /* rightshift */
2152 4, /* size (0=byte, 1=short, 2=long, 4=64 bits) */
2153 64, /* bitsize */
2154 FALSE, /* pc_relative */
2155 0, /* bitpos */
2156 complain_overflow_dont, /* complain_on_overflow */
2157 bfd_elf_generic_reloc, /* special_function */
2158 "R_PPC64_ADDR64_LOCAL", /* name */
2159 FALSE, /* partial_inplace */
2160 0, /* src_mask */
2161 ONES (64), /* dst_mask */
2162 FALSE), /* pcrel_offset */
2163
5bd4f169
AM
2164 /* GNU extension to record C++ vtable hierarchy. */
2165 HOWTO (R_PPC64_GNU_VTINHERIT, /* type */
2166 0, /* rightshift */
2167 0, /* size (0 = byte, 1 = short, 2 = long) */
2168 0, /* bitsize */
b34976b6 2169 FALSE, /* pc_relative */
5bd4f169
AM
2170 0, /* bitpos */
2171 complain_overflow_dont, /* complain_on_overflow */
2172 NULL, /* special_function */
2173 "R_PPC64_GNU_VTINHERIT", /* name */
b34976b6 2174 FALSE, /* partial_inplace */
5bd4f169
AM
2175 0, /* src_mask */
2176 0, /* dst_mask */
b34976b6 2177 FALSE), /* pcrel_offset */
5bd4f169
AM
2178
2179 /* GNU extension to record C++ vtable member usage. */
2180 HOWTO (R_PPC64_GNU_VTENTRY, /* type */
2181 0, /* rightshift */
2182 0, /* size (0 = byte, 1 = short, 2 = long) */
2183 0, /* bitsize */
b34976b6 2184 FALSE, /* pc_relative */
5bd4f169
AM
2185 0, /* bitpos */
2186 complain_overflow_dont, /* complain_on_overflow */
2187 NULL, /* special_function */
2188 "R_PPC64_GNU_VTENTRY", /* name */
b34976b6 2189 FALSE, /* partial_inplace */
5bd4f169
AM
2190 0, /* src_mask */
2191 0, /* dst_mask */
b34976b6 2192 FALSE), /* pcrel_offset */
5bd4f169
AM
2193};
2194
2195\f
2196/* Initialize the ppc64_elf_howto_table, so that linear accesses can
2197 be done. */
2198
2199static void
4ce794b7 2200ppc_howto_init (void)
5bd4f169
AM
2201{
2202 unsigned int i, type;
2203
a4b6fadd 2204 for (i = 0; i < ARRAY_SIZE (ppc64_elf_howto_raw); i++)
5bd4f169
AM
2205 {
2206 type = ppc64_elf_howto_raw[i].type;
a4b6fadd 2207 BFD_ASSERT (type < ARRAY_SIZE (ppc64_elf_howto_table));
5bd4f169
AM
2208 ppc64_elf_howto_table[type] = &ppc64_elf_howto_raw[i];
2209 }
2210}
2211
2212static reloc_howto_type *
4ce794b7
AM
2213ppc64_elf_reloc_type_lookup (bfd *abfd ATTRIBUTE_UNUSED,
2214 bfd_reloc_code_real_type code)
5bd4f169 2215{
411e1bfb 2216 enum elf_ppc64_reloc_type r = R_PPC64_NONE;
5bd4f169
AM
2217
2218 if (!ppc64_elf_howto_table[R_PPC64_ADDR32])
2219 /* Initialize howto table if needed. */
2220 ppc_howto_init ();
2221
4ce794b7 2222 switch (code)
5bd4f169
AM
2223 {
2224 default:
4ce794b7 2225 return NULL;
5bd4f169 2226
411e1bfb
AM
2227 case BFD_RELOC_NONE: r = R_PPC64_NONE;
2228 break;
2229 case BFD_RELOC_32: r = R_PPC64_ADDR32;
2230 break;
2231 case BFD_RELOC_PPC_BA26: r = R_PPC64_ADDR24;
2232 break;
2233 case BFD_RELOC_16: r = R_PPC64_ADDR16;
2234 break;
2235 case BFD_RELOC_LO16: r = R_PPC64_ADDR16_LO;
2236 break;
2237 case BFD_RELOC_HI16: r = R_PPC64_ADDR16_HI;
2238 break;
f9c6b907
AM
2239 case BFD_RELOC_PPC64_ADDR16_HIGH: r = R_PPC64_ADDR16_HIGH;
2240 break;
411e1bfb 2241 case BFD_RELOC_HI16_S: r = R_PPC64_ADDR16_HA;
5bd4f169 2242 break;
f9c6b907
AM
2243 case BFD_RELOC_PPC64_ADDR16_HIGHA: r = R_PPC64_ADDR16_HIGHA;
2244 break;
411e1bfb 2245 case BFD_RELOC_PPC_BA16: r = R_PPC64_ADDR14;
5bd4f169 2246 break;
411e1bfb 2247 case BFD_RELOC_PPC_BA16_BRTAKEN: r = R_PPC64_ADDR14_BRTAKEN;
5bd4f169 2248 break;
411e1bfb 2249 case BFD_RELOC_PPC_BA16_BRNTAKEN: r = R_PPC64_ADDR14_BRNTAKEN;
5bd4f169 2250 break;
411e1bfb 2251 case BFD_RELOC_PPC_B26: r = R_PPC64_REL24;
5bd4f169 2252 break;
411e1bfb 2253 case BFD_RELOC_PPC_B16: r = R_PPC64_REL14;
5bd4f169 2254 break;
411e1bfb 2255 case BFD_RELOC_PPC_B16_BRTAKEN: r = R_PPC64_REL14_BRTAKEN;
5bd4f169 2256 break;
411e1bfb 2257 case BFD_RELOC_PPC_B16_BRNTAKEN: r = R_PPC64_REL14_BRNTAKEN;
5bd4f169 2258 break;
411e1bfb 2259 case BFD_RELOC_16_GOTOFF: r = R_PPC64_GOT16;
5bd4f169 2260 break;
411e1bfb 2261 case BFD_RELOC_LO16_GOTOFF: r = R_PPC64_GOT16_LO;
5bd4f169 2262 break;
411e1bfb 2263 case BFD_RELOC_HI16_GOTOFF: r = R_PPC64_GOT16_HI;
5bd4f169 2264 break;
411e1bfb 2265 case BFD_RELOC_HI16_S_GOTOFF: r = R_PPC64_GOT16_HA;
5bd4f169 2266 break;
411e1bfb 2267 case BFD_RELOC_PPC_COPY: r = R_PPC64_COPY;
5bd4f169 2268 break;
411e1bfb 2269 case BFD_RELOC_PPC_GLOB_DAT: r = R_PPC64_GLOB_DAT;
5bd4f169 2270 break;
411e1bfb 2271 case BFD_RELOC_32_PCREL: r = R_PPC64_REL32;
5bd4f169 2272 break;
411e1bfb 2273 case BFD_RELOC_32_PLTOFF: r = R_PPC64_PLT32;
5bd4f169 2274 break;
411e1bfb 2275 case BFD_RELOC_32_PLT_PCREL: r = R_PPC64_PLTREL32;
5bd4f169 2276 break;
411e1bfb 2277 case BFD_RELOC_LO16_PLTOFF: r = R_PPC64_PLT16_LO;
5bd4f169 2278 break;
411e1bfb 2279 case BFD_RELOC_HI16_PLTOFF: r = R_PPC64_PLT16_HI;
5bd4f169 2280 break;
411e1bfb 2281 case BFD_RELOC_HI16_S_PLTOFF: r = R_PPC64_PLT16_HA;
5bd4f169 2282 break;
411e1bfb 2283 case BFD_RELOC_16_BASEREL: r = R_PPC64_SECTOFF;
5bd4f169 2284 break;
411e1bfb 2285 case BFD_RELOC_LO16_BASEREL: r = R_PPC64_SECTOFF_LO;
5bd4f169 2286 break;
411e1bfb 2287 case BFD_RELOC_HI16_BASEREL: r = R_PPC64_SECTOFF_HI;
5bd4f169 2288 break;
411e1bfb 2289 case BFD_RELOC_HI16_S_BASEREL: r = R_PPC64_SECTOFF_HA;
5bd4f169 2290 break;
411e1bfb 2291 case BFD_RELOC_CTOR: r = R_PPC64_ADDR64;
5bd4f169 2292 break;
411e1bfb 2293 case BFD_RELOC_64: r = R_PPC64_ADDR64;
5bd4f169 2294 break;
411e1bfb 2295 case BFD_RELOC_PPC64_HIGHER: r = R_PPC64_ADDR16_HIGHER;
5bd4f169 2296 break;
411e1bfb 2297 case BFD_RELOC_PPC64_HIGHER_S: r = R_PPC64_ADDR16_HIGHERA;
5bd4f169 2298 break;
411e1bfb 2299 case BFD_RELOC_PPC64_HIGHEST: r = R_PPC64_ADDR16_HIGHEST;
5bd4f169 2300 break;
411e1bfb 2301 case BFD_RELOC_PPC64_HIGHEST_S: r = R_PPC64_ADDR16_HIGHESTA;
5bd4f169 2302 break;
411e1bfb 2303 case BFD_RELOC_64_PCREL: r = R_PPC64_REL64;
5bd4f169 2304 break;
411e1bfb 2305 case BFD_RELOC_64_PLTOFF: r = R_PPC64_PLT64;
5bd4f169 2306 break;
411e1bfb 2307 case BFD_RELOC_64_PLT_PCREL: r = R_PPC64_PLTREL64;
5bd4f169 2308 break;
411e1bfb 2309 case BFD_RELOC_PPC_TOC16: r = R_PPC64_TOC16;
5bd4f169 2310 break;
411e1bfb 2311 case BFD_RELOC_PPC64_TOC16_LO: r = R_PPC64_TOC16_LO;
5bd4f169 2312 break;
411e1bfb 2313 case BFD_RELOC_PPC64_TOC16_HI: r = R_PPC64_TOC16_HI;
5bd4f169 2314 break;
411e1bfb 2315 case BFD_RELOC_PPC64_TOC16_HA: r = R_PPC64_TOC16_HA;
5bd4f169 2316 break;
411e1bfb 2317 case BFD_RELOC_PPC64_TOC: r = R_PPC64_TOC;
5bd4f169 2318 break;
411e1bfb 2319 case BFD_RELOC_PPC64_PLTGOT16: r = R_PPC64_PLTGOT16;
5bd4f169 2320 break;
411e1bfb 2321 case BFD_RELOC_PPC64_PLTGOT16_LO: r = R_PPC64_PLTGOT16_LO;
5bd4f169 2322 break;
411e1bfb 2323 case BFD_RELOC_PPC64_PLTGOT16_HI: r = R_PPC64_PLTGOT16_HI;
5bd4f169 2324 break;
411e1bfb 2325 case BFD_RELOC_PPC64_PLTGOT16_HA: r = R_PPC64_PLTGOT16_HA;
5bd4f169 2326 break;
411e1bfb 2327 case BFD_RELOC_PPC64_ADDR16_DS: r = R_PPC64_ADDR16_DS;
5bd4f169 2328 break;
411e1bfb 2329 case BFD_RELOC_PPC64_ADDR16_LO_DS: r = R_PPC64_ADDR16_LO_DS;
5bd4f169 2330 break;
411e1bfb 2331 case BFD_RELOC_PPC64_GOT16_DS: r = R_PPC64_GOT16_DS;
5bd4f169 2332 break;
411e1bfb 2333 case BFD_RELOC_PPC64_GOT16_LO_DS: r = R_PPC64_GOT16_LO_DS;
5bd4f169 2334 break;
411e1bfb 2335 case BFD_RELOC_PPC64_PLT16_LO_DS: r = R_PPC64_PLT16_LO_DS;
5bd4f169 2336 break;
411e1bfb 2337 case BFD_RELOC_PPC64_SECTOFF_DS: r = R_PPC64_SECTOFF_DS;
5bd4f169 2338 break;
411e1bfb 2339 case BFD_RELOC_PPC64_SECTOFF_LO_DS: r = R_PPC64_SECTOFF_LO_DS;
5bd4f169 2340 break;
411e1bfb 2341 case BFD_RELOC_PPC64_TOC16_DS: r = R_PPC64_TOC16_DS;
5bd4f169 2342 break;
411e1bfb 2343 case BFD_RELOC_PPC64_TOC16_LO_DS: r = R_PPC64_TOC16_LO_DS;
5bd4f169 2344 break;
411e1bfb 2345 case BFD_RELOC_PPC64_PLTGOT16_DS: r = R_PPC64_PLTGOT16_DS;
5bd4f169 2346 break;
411e1bfb 2347 case BFD_RELOC_PPC64_PLTGOT16_LO_DS: r = R_PPC64_PLTGOT16_LO_DS;
5bd4f169 2348 break;
411e1bfb 2349 case BFD_RELOC_PPC_TLS: r = R_PPC64_TLS;
5bd4f169 2350 break;
727fc41e
AM
2351 case BFD_RELOC_PPC_TLSGD: r = R_PPC64_TLSGD;
2352 break;
2353 case BFD_RELOC_PPC_TLSLD: r = R_PPC64_TLSLD;
2354 break;
411e1bfb 2355 case BFD_RELOC_PPC_DTPMOD: r = R_PPC64_DTPMOD64;
5bd4f169 2356 break;
411e1bfb 2357 case BFD_RELOC_PPC_TPREL16: r = R_PPC64_TPREL16;
5bd4f169 2358 break;
411e1bfb 2359 case BFD_RELOC_PPC_TPREL16_LO: r = R_PPC64_TPREL16_LO;
5bd4f169 2360 break;
411e1bfb 2361 case BFD_RELOC_PPC_TPREL16_HI: r = R_PPC64_TPREL16_HI;
5bd4f169 2362 break;
f9c6b907
AM
2363 case BFD_RELOC_PPC64_TPREL16_HIGH: r = R_PPC64_TPREL16_HIGH;
2364 break;
411e1bfb 2365 case BFD_RELOC_PPC_TPREL16_HA: r = R_PPC64_TPREL16_HA;
5bd4f169 2366 break;
f9c6b907
AM
2367 case BFD_RELOC_PPC64_TPREL16_HIGHA: r = R_PPC64_TPREL16_HIGHA;
2368 break;
411e1bfb 2369 case BFD_RELOC_PPC_TPREL: r = R_PPC64_TPREL64;
5bd4f169 2370 break;
411e1bfb
AM
2371 case BFD_RELOC_PPC_DTPREL16: r = R_PPC64_DTPREL16;
2372 break;
2373 case BFD_RELOC_PPC_DTPREL16_LO: r = R_PPC64_DTPREL16_LO;
2374 break;
2375 case BFD_RELOC_PPC_DTPREL16_HI: r = R_PPC64_DTPREL16_HI;
2376 break;
f9c6b907
AM
2377 case BFD_RELOC_PPC64_DTPREL16_HIGH: r = R_PPC64_DTPREL16_HIGH;
2378 break;
411e1bfb
AM
2379 case BFD_RELOC_PPC_DTPREL16_HA: r = R_PPC64_DTPREL16_HA;
2380 break;
f9c6b907
AM
2381 case BFD_RELOC_PPC64_DTPREL16_HIGHA: r = R_PPC64_DTPREL16_HIGHA;
2382 break;
411e1bfb
AM
2383 case BFD_RELOC_PPC_DTPREL: r = R_PPC64_DTPREL64;
2384 break;
2385 case BFD_RELOC_PPC_GOT_TLSGD16: r = R_PPC64_GOT_TLSGD16;
2386 break;
2387 case BFD_RELOC_PPC_GOT_TLSGD16_LO: r = R_PPC64_GOT_TLSGD16_LO;
2388 break;
2389 case BFD_RELOC_PPC_GOT_TLSGD16_HI: r = R_PPC64_GOT_TLSGD16_HI;
2390 break;
2391 case BFD_RELOC_PPC_GOT_TLSGD16_HA: r = R_PPC64_GOT_TLSGD16_HA;
2392 break;
2393 case BFD_RELOC_PPC_GOT_TLSLD16: r = R_PPC64_GOT_TLSLD16;
2394 break;
2395 case BFD_RELOC_PPC_GOT_TLSLD16_LO: r = R_PPC64_GOT_TLSLD16_LO;
2396 break;
2397 case BFD_RELOC_PPC_GOT_TLSLD16_HI: r = R_PPC64_GOT_TLSLD16_HI;
2398 break;
2399 case BFD_RELOC_PPC_GOT_TLSLD16_HA: r = R_PPC64_GOT_TLSLD16_HA;
2400 break;
2401 case BFD_RELOC_PPC_GOT_TPREL16: r = R_PPC64_GOT_TPREL16_DS;
2402 break;
2403 case BFD_RELOC_PPC_GOT_TPREL16_LO: r = R_PPC64_GOT_TPREL16_LO_DS;
2404 break;
2405 case BFD_RELOC_PPC_GOT_TPREL16_HI: r = R_PPC64_GOT_TPREL16_HI;
2406 break;
2407 case BFD_RELOC_PPC_GOT_TPREL16_HA: r = R_PPC64_GOT_TPREL16_HA;
2408 break;
2409 case BFD_RELOC_PPC_GOT_DTPREL16: r = R_PPC64_GOT_DTPREL16_DS;
2410 break;
2411 case BFD_RELOC_PPC_GOT_DTPREL16_LO: r = R_PPC64_GOT_DTPREL16_LO_DS;
2412 break;
2413 case BFD_RELOC_PPC_GOT_DTPREL16_HI: r = R_PPC64_GOT_DTPREL16_HI;
2414 break;
2415 case BFD_RELOC_PPC_GOT_DTPREL16_HA: r = R_PPC64_GOT_DTPREL16_HA;
2416 break;
2417 case BFD_RELOC_PPC64_TPREL16_DS: r = R_PPC64_TPREL16_DS;
2418 break;
2419 case BFD_RELOC_PPC64_TPREL16_LO_DS: r = R_PPC64_TPREL16_LO_DS;
2420 break;
2421 case BFD_RELOC_PPC64_TPREL16_HIGHER: r = R_PPC64_TPREL16_HIGHER;
2422 break;
2423 case BFD_RELOC_PPC64_TPREL16_HIGHERA: r = R_PPC64_TPREL16_HIGHERA;
2424 break;
2425 case BFD_RELOC_PPC64_TPREL16_HIGHEST: r = R_PPC64_TPREL16_HIGHEST;
2426 break;
2427 case BFD_RELOC_PPC64_TPREL16_HIGHESTA: r = R_PPC64_TPREL16_HIGHESTA;
2428 break;
2429 case BFD_RELOC_PPC64_DTPREL16_DS: r = R_PPC64_DTPREL16_DS;
2430 break;
2431 case BFD_RELOC_PPC64_DTPREL16_LO_DS: r = R_PPC64_DTPREL16_LO_DS;
2432 break;
2433 case BFD_RELOC_PPC64_DTPREL16_HIGHER: r = R_PPC64_DTPREL16_HIGHER;
2434 break;
2435 case BFD_RELOC_PPC64_DTPREL16_HIGHERA: r = R_PPC64_DTPREL16_HIGHERA;
2436 break;
2437 case BFD_RELOC_PPC64_DTPREL16_HIGHEST: r = R_PPC64_DTPREL16_HIGHEST;
2438 break;
2439 case BFD_RELOC_PPC64_DTPREL16_HIGHESTA: r = R_PPC64_DTPREL16_HIGHESTA;
2440 break;
25f23106
AM
2441 case BFD_RELOC_16_PCREL: r = R_PPC64_REL16;
2442 break;
2443 case BFD_RELOC_LO16_PCREL: r = R_PPC64_REL16_LO;
2444 break;
2445 case BFD_RELOC_HI16_PCREL: r = R_PPC64_REL16_HI;
2446 break;
2447 case BFD_RELOC_HI16_S_PCREL: r = R_PPC64_REL16_HA;
2448 break;
a680de9a
PB
2449 case BFD_RELOC_PPC_REL16DX_HA: r = R_PPC64_REL16DX_HA;
2450 break;
006589cf
AM
2451 case BFD_RELOC_PPC64_ENTRY: r = R_PPC64_ENTRY;
2452 break;
45965137
AM
2453 case BFD_RELOC_PPC64_ADDR64_LOCAL: r = R_PPC64_ADDR64_LOCAL;
2454 break;
411e1bfb
AM
2455 case BFD_RELOC_VTABLE_INHERIT: r = R_PPC64_GNU_VTINHERIT;
2456 break;
2457 case BFD_RELOC_VTABLE_ENTRY: r = R_PPC64_GNU_VTENTRY;
5bd4f169
AM
2458 break;
2459 }
2460
4ce794b7 2461 return ppc64_elf_howto_table[r];
5bd4f169
AM
2462};
2463
157090f7
AM
2464static reloc_howto_type *
2465ppc64_elf_reloc_name_lookup (bfd *abfd ATTRIBUTE_UNUSED,
2466 const char *r_name)
2467{
2468 unsigned int i;
2469
a4b6fadd 2470 for (i = 0; i < ARRAY_SIZE (ppc64_elf_howto_raw); i++)
157090f7
AM
2471 if (ppc64_elf_howto_raw[i].name != NULL
2472 && strcasecmp (ppc64_elf_howto_raw[i].name, r_name) == 0)
2473 return &ppc64_elf_howto_raw[i];
2474
2475 return NULL;
2476}
2477
5bd4f169
AM
2478/* Set the howto pointer for a PowerPC ELF reloc. */
2479
2480static void
4ce794b7
AM
2481ppc64_elf_info_to_howto (bfd *abfd ATTRIBUTE_UNUSED, arelent *cache_ptr,
2482 Elf_Internal_Rela *dst)
5bd4f169 2483{
65f38f15
AM
2484 unsigned int type;
2485
ef60b7ff 2486 /* Initialize howto table if needed. */
5bd4f169 2487 if (!ppc64_elf_howto_table[R_PPC64_ADDR32])
5bd4f169
AM
2488 ppc_howto_init ();
2489
65f38f15 2490 type = ELF64_R_TYPE (dst->r_info);
a4b6fadd 2491 if (type >= ARRAY_SIZE (ppc64_elf_howto_table))
d0fb9a8d
JJ
2492 {
2493 (*_bfd_error_handler) (_("%B: invalid relocation type %d"),
3ec2b351
NC
2494 abfd, (int) type);
2495 type = R_PPC64_NONE;
d0fb9a8d 2496 }
65f38f15 2497 cache_ptr->howto = ppc64_elf_howto_table[type];
5bd4f169
AM
2498}
2499
04c9666a 2500/* Handle the R_PPC64_ADDR16_HA and similar relocs. */
5bd4f169
AM
2501
2502static bfd_reloc_status_type
4ce794b7
AM
2503ppc64_elf_ha_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
2504 void *data, asection *input_section,
2505 bfd *output_bfd, char **error_message)
5bd4f169 2506{
a680de9a
PB
2507 enum elf_ppc64_reloc_type r_type;
2508 long insn;
2509 bfd_size_type octets;
2510 bfd_vma value;
2511
805fc799
AM
2512 /* If this is a relocatable link (output_bfd test tells us), just
2513 call the generic function. Any adjustment will be done at final
2514 link time. */
2515 if (output_bfd != NULL)
cedb70c5 2516 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
805fc799
AM
2517 input_section, output_bfd, error_message);
2518
2519 /* Adjust the addend for sign extension of the low 16 bits.
2520 We won't actually be using the low 16 bits, so trashing them
2521 doesn't matter. */
2522 reloc_entry->addend += 0x8000;
a680de9a
PB
2523 r_type = reloc_entry->howto->type;
2524 if (r_type != R_PPC64_REL16DX_HA)
2525 return bfd_reloc_continue;
2526
2527 value = 0;
2528 if (!bfd_is_com_section (symbol->section))
2529 value = symbol->value;
2530 value += (reloc_entry->addend
2531 + symbol->section->output_offset
2532 + symbol->section->output_section->vma);
2533 value -= (reloc_entry->address
2534 + input_section->output_offset
2535 + input_section->output_section->vma);
2536 value = (bfd_signed_vma) value >> 16;
2537
2538 octets = reloc_entry->address * bfd_octets_per_byte (abfd);
2539 insn = bfd_get_32 (abfd, (bfd_byte *) data + octets);
2540 insn &= ~0x1fffc1;
2541 insn |= (value & 0xffc1) | ((value & 0x3e) << 15);
2542 bfd_put_32 (abfd, insn, (bfd_byte *) data + octets);
2543 if (value + 0x8000 > 0xffff)
2544 return bfd_reloc_overflow;
2545 return bfd_reloc_ok;
805fc799 2546}
5bd4f169 2547
2441e016
AM
2548static bfd_reloc_status_type
2549ppc64_elf_branch_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
2550 void *data, asection *input_section,
2551 bfd *output_bfd, char **error_message)
2552{
2553 if (output_bfd != NULL)
2554 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
2555 input_section, output_bfd, error_message);
2556
699733f6
AM
2557 if (strcmp (symbol->section->name, ".opd") == 0
2558 && (symbol->section->owner->flags & DYNAMIC) == 0)
2441e016
AM
2559 {
2560 bfd_vma dest = opd_entry_value (symbol->section,
2561 symbol->value + reloc_entry->addend,
aef36ac1 2562 NULL, NULL, FALSE);
2441e016
AM
2563 if (dest != (bfd_vma) -1)
2564 reloc_entry->addend = dest - (symbol->value
2565 + symbol->section->output_section->vma
2566 + symbol->section->output_offset);
2567 }
810d4e75
AM
2568 else
2569 {
2570 elf_symbol_type *elfsym = (elf_symbol_type *) symbol;
2571
2572 if (symbol->section->owner != abfd
9f284bf9 2573 && symbol->section->owner != NULL
810d4e75
AM
2574 && abiversion (symbol->section->owner) >= 2)
2575 {
2576 unsigned int i;
2577
2578 for (i = 0; i < symbol->section->owner->symcount; ++i)
2579 {
2580 asymbol *symdef = symbol->section->owner->outsymbols[i];
2581
2582 if (strcmp (symdef->name, symbol->name) == 0)
2583 {
2584 elfsym = (elf_symbol_type *) symdef;
2585 break;
2586 }
2587 }
2588 }
2589 reloc_entry->addend
2590 += PPC64_LOCAL_ENTRY_OFFSET (elfsym->internal_elf_sym.st_other);
2591 }
2441e016
AM
2592 return bfd_reloc_continue;
2593}
2594
805fc799 2595static bfd_reloc_status_type
4ce794b7
AM
2596ppc64_elf_brtaken_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
2597 void *data, asection *input_section,
2598 bfd *output_bfd, char **error_message)
805fc799
AM
2599{
2600 long insn;
04c9666a 2601 enum elf_ppc64_reloc_type r_type;
805fc799 2602 bfd_size_type octets;
794e51c0
AM
2603 /* Assume 'at' branch hints. */
2604 bfd_boolean is_isa_v2 = TRUE;
805fc799
AM
2605
2606 /* If this is a relocatable link (output_bfd test tells us), just
2607 call the generic function. Any adjustment will be done at final
2608 link time. */
5bd4f169 2609 if (output_bfd != NULL)
cedb70c5 2610 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
805fc799
AM
2611 input_section, output_bfd, error_message);
2612
2613 octets = reloc_entry->address * bfd_octets_per_byte (abfd);
2614 insn = bfd_get_32 (abfd, (bfd_byte *) data + octets);
2615 insn &= ~(0x01 << 21);
4ce794b7 2616 r_type = reloc_entry->howto->type;
805fc799
AM
2617 if (r_type == R_PPC64_ADDR14_BRTAKEN
2618 || r_type == R_PPC64_REL14_BRTAKEN)
cedb70c5 2619 insn |= 0x01 << 21; /* 'y' or 't' bit, lowest bit of BO field. */
805fc799 2620
794e51c0 2621 if (is_isa_v2)
5bd4f169 2622 {
805fc799
AM
2623 /* Set 'a' bit. This is 0b00010 in BO field for branch
2624 on CR(BI) insns (BO == 001at or 011at), and 0b01000
2625 for branch on CTR insns (BO == 1a00t or 1a01t). */
2626 if ((insn & (0x14 << 21)) == (0x04 << 21))
2627 insn |= 0x02 << 21;
2628 else if ((insn & (0x14 << 21)) == (0x10 << 21))
2629 insn |= 0x08 << 21;
2630 else
2441e016 2631 goto out;
5bd4f169 2632 }
805fc799
AM
2633 else
2634 {
2635 bfd_vma target = 0;
2636 bfd_vma from;
5bd4f169 2637
805fc799
AM
2638 if (!bfd_is_com_section (symbol->section))
2639 target = symbol->value;
2640 target += symbol->section->output_section->vma;
2641 target += symbol->section->output_offset;
2642 target += reloc_entry->addend;
5bd4f169 2643
805fc799
AM
2644 from = (reloc_entry->address
2645 + input_section->output_offset
2646 + input_section->output_section->vma);
5bd4f169 2647
805fc799
AM
2648 /* Invert 'y' bit if not the default. */
2649 if ((bfd_signed_vma) (target - from) < 0)
2650 insn ^= 0x01 << 21;
2651 }
4ce794b7 2652 bfd_put_32 (abfd, insn, (bfd_byte *) data + octets);
2441e016
AM
2653 out:
2654 return ppc64_elf_branch_reloc (abfd, reloc_entry, symbol, data,
2655 input_section, output_bfd, error_message);
805fc799 2656}
5bd4f169 2657
805fc799 2658static bfd_reloc_status_type
4ce794b7
AM
2659ppc64_elf_sectoff_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
2660 void *data, asection *input_section,
2661 bfd *output_bfd, char **error_message)
805fc799
AM
2662{
2663 /* If this is a relocatable link (output_bfd test tells us), just
2664 call the generic function. Any adjustment will be done at final
2665 link time. */
2666 if (output_bfd != NULL)
cedb70c5 2667 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
805fc799 2668 input_section, output_bfd, error_message);
5bd4f169 2669
805fc799
AM
2670 /* Subtract the symbol section base address. */
2671 reloc_entry->addend -= symbol->section->output_section->vma;
5bd4f169
AM
2672 return bfd_reloc_continue;
2673}
2674
805fc799 2675static bfd_reloc_status_type
4ce794b7
AM
2676ppc64_elf_sectoff_ha_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
2677 void *data, asection *input_section,
2678 bfd *output_bfd, char **error_message)
805fc799
AM
2679{
2680 /* If this is a relocatable link (output_bfd test tells us), just
2681 call the generic function. Any adjustment will be done at final
2682 link time. */
2683 if (output_bfd != NULL)
cedb70c5 2684 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
805fc799
AM
2685 input_section, output_bfd, error_message);
2686
2687 /* Subtract the symbol section base address. */
2688 reloc_entry->addend -= symbol->section->output_section->vma;
2689
2690 /* Adjust the addend for sign extension of the low 16 bits. */
2691 reloc_entry->addend += 0x8000;
2692 return bfd_reloc_continue;
2693}
2694
2695static bfd_reloc_status_type
4ce794b7
AM
2696ppc64_elf_toc_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
2697 void *data, asection *input_section,
2698 bfd *output_bfd, char **error_message)
805fc799
AM
2699{
2700 bfd_vma TOCstart;
2701
2702 /* If this is a relocatable link (output_bfd test tells us), just
2703 call the generic function. Any adjustment will be done at final
2704 link time. */
2705 if (output_bfd != NULL)
cedb70c5 2706 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
805fc799
AM
2707 input_section, output_bfd, error_message);
2708
2709 TOCstart = _bfd_get_gp_value (input_section->output_section->owner);
2710 if (TOCstart == 0)
1c865ab2 2711 TOCstart = ppc64_elf_set_toc (NULL, input_section->output_section->owner);
805fc799
AM
2712
2713 /* Subtract the TOC base address. */
2714 reloc_entry->addend -= TOCstart + TOC_BASE_OFF;
2715 return bfd_reloc_continue;
2716}
2717
2718static bfd_reloc_status_type
4ce794b7
AM
2719ppc64_elf_toc_ha_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
2720 void *data, asection *input_section,
2721 bfd *output_bfd, char **error_message)
805fc799
AM
2722{
2723 bfd_vma TOCstart;
2724
2725 /* If this is a relocatable link (output_bfd test tells us), just
2726 call the generic function. Any adjustment will be done at final
2727 link time. */
2728 if (output_bfd != NULL)
cedb70c5 2729 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
805fc799
AM
2730 input_section, output_bfd, error_message);
2731
2732 TOCstart = _bfd_get_gp_value (input_section->output_section->owner);
2733 if (TOCstart == 0)
1c865ab2 2734 TOCstart = ppc64_elf_set_toc (NULL, input_section->output_section->owner);
805fc799
AM
2735
2736 /* Subtract the TOC base address. */
2737 reloc_entry->addend -= TOCstart + TOC_BASE_OFF;
2738
2739 /* Adjust the addend for sign extension of the low 16 bits. */
2740 reloc_entry->addend += 0x8000;
2741 return bfd_reloc_continue;
2742}
2743
2744static bfd_reloc_status_type
4ce794b7
AM
2745ppc64_elf_toc64_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
2746 void *data, asection *input_section,
2747 bfd *output_bfd, char **error_message)
805fc799
AM
2748{
2749 bfd_vma TOCstart;
2750 bfd_size_type octets;
2751
2752 /* If this is a relocatable link (output_bfd test tells us), just
2753 call the generic function. Any adjustment will be done at final
2754 link time. */
2755 if (output_bfd != NULL)
cedb70c5 2756 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
805fc799
AM
2757 input_section, output_bfd, error_message);
2758
2759 TOCstart = _bfd_get_gp_value (input_section->output_section->owner);
2760 if (TOCstart == 0)
1c865ab2 2761 TOCstart = ppc64_elf_set_toc (NULL, input_section->output_section->owner);
805fc799
AM
2762
2763 octets = reloc_entry->address * bfd_octets_per_byte (abfd);
2764 bfd_put_64 (abfd, TOCstart + TOC_BASE_OFF, (bfd_byte *) data + octets);
2765 return bfd_reloc_ok;
2766}
2767
2768static bfd_reloc_status_type
4ce794b7
AM
2769ppc64_elf_unhandled_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
2770 void *data, asection *input_section,
2771 bfd *output_bfd, char **error_message)
805fc799
AM
2772{
2773 /* If this is a relocatable link (output_bfd test tells us), just
2774 call the generic function. Any adjustment will be done at final
2775 link time. */
2776 if (output_bfd != NULL)
cedb70c5 2777 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
805fc799
AM
2778 input_section, output_bfd, error_message);
2779
2780 if (error_message != NULL)
2781 {
2782 static char buf[60];
2783 sprintf (buf, "generic linker can't handle %s",
2784 reloc_entry->howto->name);
2785 *error_message = buf;
2786 }
2787 return bfd_reloc_dangerous;
2788}
2789
927be08e
AM
2790/* Track GOT entries needed for a given symbol. We might need more
2791 than one got entry per symbol. */
2792struct got_entry
2793{
2794 struct got_entry *next;
2795
2796 /* The symbol addend that we'll be placing in the GOT. */
2797 bfd_vma addend;
2798
2799 /* Unlike other ELF targets, we use separate GOT entries for the same
2800 symbol referenced from different input files. This is to support
2801 automatic multiple TOC/GOT sections, where the TOC base can vary
2802 from one input file to another. After partitioning into TOC groups
2803 we merge entries within the group.
2804
2805 Point to the BFD owning this GOT entry. */
2806 bfd *owner;
2807
2808 /* Zero for non-tls entries, or TLS_TLS and one of TLS_GD, TLS_LD,
2809 TLS_TPREL or TLS_DTPREL for tls entries. */
f961d9dd 2810 unsigned char tls_type;
927be08e
AM
2811
2812 /* Non-zero if got.ent points to real entry. */
f961d9dd 2813 unsigned char is_indirect;
927be08e
AM
2814
2815 /* Reference count until size_dynamic_sections, GOT offset thereafter. */
2816 union
2817 {
2818 bfd_signed_vma refcount;
2819 bfd_vma offset;
2820 struct got_entry *ent;
2821 } got;
2822};
2823
2824/* The same for PLT. */
2825struct plt_entry
2826{
2827 struct plt_entry *next;
2828
2829 bfd_vma addend;
2830
2831 union
2832 {
2833 bfd_signed_vma refcount;
2834 bfd_vma offset;
2835 } plt;
2836};
2837
e717da7e
AM
2838struct ppc64_elf_obj_tdata
2839{
2840 struct elf_obj_tdata elf;
2841
2842 /* Shortcuts to dynamic linker sections. */
2843 asection *got;
2844 asection *relgot;
2845
b3fac117
AM
2846 /* Used during garbage collection. We attach global symbols defined
2847 on removed .opd entries to this section so that the sym is removed. */
2848 asection *deleted_section;
81688140 2849
927be08e 2850 /* TLS local dynamic got entry handling. Support for multiple GOT
e717da7e 2851 sections means we potentially need one of these for each input bfd. */
927be08e 2852 struct got_entry tlsld_got;
8860955f 2853
729eabd5
AM
2854 union {
2855 /* A copy of relocs before they are modified for --emit-relocs. */
2856 Elf_Internal_Rela *relocs;
2857
2858 /* Section contents. */
2859 bfd_byte *contents;
2860 } opd;
d77c8a4b
AM
2861
2862 /* Nonzero if this bfd has small toc/got relocs, ie. that expect
2863 the reloc to be in the range -32768 to 32767. */
98528052
AM
2864 unsigned int has_small_toc_reloc : 1;
2865
560c8763
AM
2866 /* Set if toc/got ha relocs detected not using r2, or lo reloc
2867 instruction not one we handle. */
2868 unsigned int unexpected_toc_insn : 1;
e717da7e
AM
2869};
2870
2871#define ppc64_elf_tdata(bfd) \
2872 ((struct ppc64_elf_obj_tdata *) (bfd)->tdata.any)
2873
2874#define ppc64_tlsld_got(bfd) \
2875 (&ppc64_elf_tdata (bfd)->tlsld_got)
2876
0c8d6e5c
AM
2877#define is_ppc64_elf(bfd) \
2878 (bfd_get_flavour (bfd) == bfd_target_elf_flavour \
4dfe6ac6 2879 && elf_object_id (bfd) == PPC64_ELF_DATA)
0c8d6e5c 2880
e717da7e
AM
2881/* Override the generic function because we store some extras. */
2882
2883static bfd_boolean
2884ppc64_elf_mkobject (bfd *abfd)
2885{
0ffa91dd 2886 return bfd_elf_allocate_object (abfd, sizeof (struct ppc64_elf_obj_tdata),
4dfe6ac6 2887 PPC64_ELF_DATA);
e717da7e
AM
2888}
2889
feee612b 2890/* Fix bad default arch selected for a 64 bit input bfd when the
14b57c7c 2891 default is 32 bit. Also select arch based on apuinfo. */
feee612b 2892
b34976b6 2893static bfd_boolean
4ce794b7 2894ppc64_elf_object_p (bfd *abfd)
feee612b 2895{
14b57c7c
AM
2896 if (!abfd->arch_info->the_default)
2897 return TRUE;
2898
2899 if (abfd->arch_info->bits_per_word == 32)
feee612b
AM
2900 {
2901 Elf_Internal_Ehdr *i_ehdr = elf_elfheader (abfd);
2902
2903 if (i_ehdr->e_ident[EI_CLASS] == ELFCLASS64)
2904 {
2905 /* Relies on arch after 32 bit default being 64 bit default. */
2906 abfd->arch_info = abfd->arch_info->next;
2907 BFD_ASSERT (abfd->arch_info->bits_per_word == 64);
2908 }
2909 }
14b57c7c 2910 return _bfd_elf_ppc_set_arch (abfd);
feee612b
AM
2911}
2912
d37c89e5
AM
2913/* Support for core dump NOTE sections. */
2914
2915static bfd_boolean
2916ppc64_elf_grok_prstatus (bfd *abfd, Elf_Internal_Note *note)
2917{
eea6121a 2918 size_t offset, size;
d37c89e5
AM
2919
2920 if (note->descsz != 504)
2921 return FALSE;
2922
2923 /* pr_cursig */
228e534f 2924 elf_tdata (abfd)->core->signal = bfd_get_16 (abfd, note->descdata + 12);
d37c89e5
AM
2925
2926 /* pr_pid */
228e534f 2927 elf_tdata (abfd)->core->lwpid = bfd_get_32 (abfd, note->descdata + 32);
d37c89e5
AM
2928
2929 /* pr_reg */
2930 offset = 112;
eea6121a 2931 size = 384;
d37c89e5
AM
2932
2933 /* Make a ".reg/999" section. */
2934 return _bfd_elfcore_make_pseudosection (abfd, ".reg",
eea6121a 2935 size, note->descpos + offset);
d37c89e5
AM
2936}
2937
2938static bfd_boolean
2939ppc64_elf_grok_psinfo (bfd *abfd, Elf_Internal_Note *note)
2940{
2941 if (note->descsz != 136)
2942 return FALSE;
2943
228e534f 2944 elf_tdata (abfd)->core->pid
bc989cdc 2945 = bfd_get_32 (abfd, note->descdata + 24);
228e534f 2946 elf_tdata (abfd)->core->program
d37c89e5 2947 = _bfd_elfcore_strndup (abfd, note->descdata + 40, 16);
228e534f 2948 elf_tdata (abfd)->core->command
d37c89e5
AM
2949 = _bfd_elfcore_strndup (abfd, note->descdata + 56, 80);
2950
2951 return TRUE;
2952}
2953
183e98be
AM
2954static char *
2955ppc64_elf_write_core_note (bfd *abfd, char *buf, int *bufsiz, int note_type,
2956 ...)
2957{
2958 switch (note_type)
2959 {
2960 default:
2961 return NULL;
2962
2963 case NT_PRPSINFO:
2964 {
2965 char data[136];
2966 va_list ap;
2967
2968 va_start (ap, note_type);
75cd47ed 2969 memset (data, 0, sizeof (data));
183e98be
AM
2970 strncpy (data + 40, va_arg (ap, const char *), 16);
2971 strncpy (data + 56, va_arg (ap, const char *), 80);
2972 va_end (ap);
2973 return elfcore_write_note (abfd, buf, bufsiz,
2974 "CORE", note_type, data, sizeof (data));
2975 }
2976
2977 case NT_PRSTATUS:
2978 {
2979 char data[504];
2980 va_list ap;
2981 long pid;
2982 int cursig;
2983 const void *greg;
2984
2985 va_start (ap, note_type);
2986 memset (data, 0, 112);
2987 pid = va_arg (ap, long);
2988 bfd_put_32 (abfd, pid, data + 32);
2989 cursig = va_arg (ap, int);
2990 bfd_put_16 (abfd, cursig, data + 12);
2991 greg = va_arg (ap, const void *);
2992 memcpy (data + 112, greg, 384);
2993 memset (data + 496, 0, 8);
2994 va_end (ap);
2995 return elfcore_write_note (abfd, buf, bufsiz,
2996 "CORE", note_type, data, sizeof (data));
2997 }
2998 }
2999}
3000
5d35169e
AM
3001/* Add extra PPC sections. */
3002
b35d266b 3003static const struct bfd_elf_special_section ppc64_elf_special_sections[]=
7f4d3958 3004{
0112cd26
NC
3005 { STRING_COMMA_LEN (".plt"), 0, SHT_NOBITS, 0 },
3006 { STRING_COMMA_LEN (".sbss"), -2, SHT_NOBITS, SHF_ALLOC + SHF_WRITE },
3007 { STRING_COMMA_LEN (".sdata"), -2, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE },
3008 { STRING_COMMA_LEN (".toc"), 0, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE },
3009 { STRING_COMMA_LEN (".toc1"), 0, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE },
3010 { STRING_COMMA_LEN (".tocbss"), 0, SHT_NOBITS, SHF_ALLOC + SHF_WRITE },
3011 { NULL, 0, 0, 0, 0 }
5d35169e
AM
3012};
3013
7c8fe5c4
AM
3014enum _ppc64_sec_type {
3015 sec_normal = 0,
3016 sec_opd = 1,
3017 sec_toc = 2
3018};
3019
f0abc2a1
AM
3020struct _ppc64_elf_section_data
3021{
3022 struct bfd_elf_section_data elf;
411e1bfb 3023
f0abc2a1
AM
3024 union
3025 {
51aecdc5
AM
3026 /* An array with one entry for each opd function descriptor,
3027 and some spares since opd entries may be either 16 or 24 bytes. */
3028#define OPD_NDX(OFF) ((OFF) >> 4)
74f0fb50
AM
3029 struct _opd_sec_data
3030 {
3031 /* Points to the function code section for local opd entries. */
3032 asection **func_sec;
3033
3034 /* After editing .opd, adjust references to opd local syms. */
3035 long *adjust;
3036 } opd;
7c8fe5c4 3037
3a71aa26
AM
3038 /* An array for toc sections, indexed by offset/8. */
3039 struct _toc_sec_data
3040 {
3041 /* Specifies the relocation symbol index used at a given toc offset. */
3042 unsigned *symndx;
3043
3044 /* And the relocation addend. */
3045 bfd_vma *add;
3046 } toc;
7c8fe5c4
AM
3047 } u;
3048
3049 enum _ppc64_sec_type sec_type:2;
411e1bfb 3050
7c8fe5c4
AM
3051 /* Flag set when small branches are detected. Used to
3052 select suitable defaults for the stub group size. */
3053 unsigned int has_14bit_branch:1;
f0abc2a1
AM
3054};
3055
3056#define ppc64_elf_section_data(sec) \
411e1bfb 3057 ((struct _ppc64_elf_section_data *) elf_section_data (sec))
f0abc2a1
AM
3058
3059static bfd_boolean
4ce794b7 3060ppc64_elf_new_section_hook (bfd *abfd, asection *sec)
f0abc2a1 3061{
f592407e
AM
3062 if (!sec->used_by_bfd)
3063 {
3064 struct _ppc64_elf_section_data *sdata;
3065 bfd_size_type amt = sizeof (*sdata);
f0abc2a1 3066
f592407e
AM
3067 sdata = bfd_zalloc (abfd, amt);
3068 if (sdata == NULL)
3069 return FALSE;
3070 sec->used_by_bfd = sdata;
3071 }
f0abc2a1
AM
3072
3073 return _bfd_elf_new_section_hook (abfd, sec);
3074}
4025353c 3075
74f0fb50 3076static struct _opd_sec_data *
4025353c
AM
3077get_opd_info (asection * sec)
3078{
3079 if (sec != NULL
3080 && ppc64_elf_section_data (sec) != NULL
7c8fe5c4 3081 && ppc64_elf_section_data (sec)->sec_type == sec_opd)
74f0fb50 3082 return &ppc64_elf_section_data (sec)->u.opd;
4025353c
AM
3083 return NULL;
3084}
90e3cdf2
JJ
3085\f
3086/* Parameters for the qsort hook. */
90e3cdf2
JJ
3087static bfd_boolean synthetic_relocatable;
3088
699733f6 3089/* qsort comparison function for ppc64_elf_get_synthetic_symtab. */
90e3cdf2
JJ
3090
3091static int
3092compare_symbols (const void *ap, const void *bp)
3093{
3094 const asymbol *a = * (const asymbol **) ap;
3095 const asymbol *b = * (const asymbol **) bp;
3096
699733f6
AM
3097 /* Section symbols first. */
3098 if ((a->flags & BSF_SECTION_SYM) && !(b->flags & BSF_SECTION_SYM))
90e3cdf2 3099 return -1;
699733f6 3100 if (!(a->flags & BSF_SECTION_SYM) && (b->flags & BSF_SECTION_SYM))
90e3cdf2
JJ
3101 return 1;
3102
699733f6 3103 /* then .opd symbols. */
ffcfec52
AM
3104 if (strcmp (a->section->name, ".opd") == 0
3105 && strcmp (b->section->name, ".opd") != 0)
90e3cdf2 3106 return -1;
ffcfec52
AM
3107 if (strcmp (a->section->name, ".opd") != 0
3108 && strcmp (b->section->name, ".opd") == 0)
90e3cdf2
JJ
3109 return 1;
3110
699733f6 3111 /* then other code symbols. */
90e3cdf2
JJ
3112 if ((a->section->flags & (SEC_CODE | SEC_ALLOC | SEC_THREAD_LOCAL))
3113 == (SEC_CODE | SEC_ALLOC)
3114 && (b->section->flags & (SEC_CODE | SEC_ALLOC | SEC_THREAD_LOCAL))
3115 != (SEC_CODE | SEC_ALLOC))
3116 return -1;
3117
3118 if ((a->section->flags & (SEC_CODE | SEC_ALLOC | SEC_THREAD_LOCAL))
3119 != (SEC_CODE | SEC_ALLOC)
3120 && (b->section->flags & (SEC_CODE | SEC_ALLOC | SEC_THREAD_LOCAL))
3121 == (SEC_CODE | SEC_ALLOC))
3122 return 1;
3123
3124 if (synthetic_relocatable)
3125 {
3126 if (a->section->id < b->section->id)
3127 return -1;
3128
3129 if (a->section->id > b->section->id)
3130 return 1;
3131 }
3132
3133 if (a->value + a->section->vma < b->value + b->section->vma)
3134 return -1;
3135
3136 if (a->value + a->section->vma > b->value + b->section->vma)
3137 return 1;
3138
4d35a0aa
AM
3139 /* For syms with the same value, prefer strong dynamic global function
3140 syms over other syms. */
3141 if ((a->flags & BSF_GLOBAL) != 0 && (b->flags & BSF_GLOBAL) == 0)
3142 return -1;
3143
3144 if ((a->flags & BSF_GLOBAL) == 0 && (b->flags & BSF_GLOBAL) != 0)
3145 return 1;
3146
3147 if ((a->flags & BSF_FUNCTION) != 0 && (b->flags & BSF_FUNCTION) == 0)
3148 return -1;
3149
3150 if ((a->flags & BSF_FUNCTION) == 0 && (b->flags & BSF_FUNCTION) != 0)
3151 return 1;
3152
3153 if ((a->flags & BSF_WEAK) == 0 && (b->flags & BSF_WEAK) != 0)
3154 return -1;
3155
3156 if ((a->flags & BSF_WEAK) != 0 && (b->flags & BSF_WEAK) == 0)
3157 return 1;
3158
3159 if ((a->flags & BSF_DYNAMIC) != 0 && (b->flags & BSF_DYNAMIC) == 0)
3160 return -1;
3161
3162 if ((a->flags & BSF_DYNAMIC) == 0 && (b->flags & BSF_DYNAMIC) != 0)
3163 return 1;
3164
90e3cdf2
JJ
3165 return 0;
3166}
3167
699733f6 3168/* Search SYMS for a symbol of the given VALUE. */
90e3cdf2 3169
699733f6 3170static asymbol *
7292b3ac 3171sym_exists_at (asymbol **syms, long lo, long hi, unsigned int id, bfd_vma value)
90e3cdf2 3172{
699733f6 3173 long mid;
90e3cdf2 3174
7292b3ac 3175 if (id == (unsigned) -1)
699733f6
AM
3176 {
3177 while (lo < hi)
3178 {
3179 mid = (lo + hi) >> 1;
3180 if (syms[mid]->value + syms[mid]->section->vma < value)
3181 lo = mid + 1;
3182 else if (syms[mid]->value + syms[mid]->section->vma > value)
3183 hi = mid;
3184 else
3185 return syms[mid];
3186 }
3187 }
3188 else
3189 {
3190 while (lo < hi)
3191 {
3192 mid = (lo + hi) >> 1;
3193 if (syms[mid]->section->id < id)
3194 lo = mid + 1;
3195 else if (syms[mid]->section->id > id)
3196 hi = mid;
3197 else if (syms[mid]->value < value)
3198 lo = mid + 1;
3199 else if (syms[mid]->value > value)
3200 hi = mid;
3201 else
3202 return syms[mid];
3203 }
3204 }
3205 return NULL;
90e3cdf2
JJ
3206}
3207
468392fb
AM
3208static bfd_boolean
3209section_covers_vma (bfd *abfd ATTRIBUTE_UNUSED, asection *section, void *ptr)
3210{
3211 bfd_vma vma = *(bfd_vma *) ptr;
3212 return ((section->flags & SEC_ALLOC) != 0
3213 && section->vma <= vma
3214 && vma < section->vma + section->size);
3215}
3216
699733f6 3217/* Create synthetic symbols, effectively restoring "dot-symbol" function
c4b0b099
AM
3218 entry syms. Also generate @plt symbols for the glink branch table.
3219 Returns count of synthetic symbols in RET or -1 on error. */
90e3cdf2
JJ
3220
3221static long
a7535cf3
AM
3222ppc64_elf_get_synthetic_symtab (bfd *abfd,
3223 long static_count, asymbol **static_syms,
3224 long dyn_count, asymbol **dyn_syms,
c9727e01 3225 asymbol **ret)
90e3cdf2
JJ
3226{
3227 asymbol *s;
699733f6
AM
3228 long i;
3229 long count;
90e3cdf2 3230 char *names;
a7535cf3 3231 long symcount, codesecsym, codesecsymend, secsymend, opdsymend;
ee67d69a 3232 asection *opd = NULL;
90e3cdf2 3233 bfd_boolean relocatable = (abfd->flags & (EXEC_P | DYNAMIC)) == 0;
a7535cf3 3234 asymbol **syms;
ee67d69a 3235 int abi = abiversion (abfd);
90e3cdf2
JJ
3236
3237 *ret = NULL;
3238
ee67d69a
AM
3239 if (abi < 2)
3240 {
3241 opd = bfd_get_section_by_name (abfd, ".opd");
3242 if (opd == NULL && abi == 1)
3243 return 0;
3244 }
90e3cdf2 3245
a7535cf3 3246 symcount = static_count;
c9727e01 3247 if (!relocatable)
a7535cf3 3248 symcount += dyn_count;
90e3cdf2 3249 if (symcount == 0)
c9727e01 3250 return 0;
90e3cdf2 3251
a7535cf3
AM
3252 syms = bfd_malloc ((symcount + 1) * sizeof (*syms));
3253 if (syms == NULL)
7356fed5 3254 return -1;
a7535cf3
AM
3255
3256 if (!relocatable && static_count != 0 && dyn_count != 0)
3257 {
3258 /* Use both symbol tables. */
3259 memcpy (syms, static_syms, static_count * sizeof (*syms));
3260 memcpy (syms + static_count, dyn_syms, (dyn_count + 1) * sizeof (*syms));
3261 }
3262 else if (!relocatable && static_count == 0)
3263 memcpy (syms, dyn_syms, (symcount + 1) * sizeof (*syms));
3264 else
3265 memcpy (syms, static_syms, (symcount + 1) * sizeof (*syms));
3266
90e3cdf2 3267 synthetic_relocatable = relocatable;
595da8c5 3268 qsort (syms, symcount, sizeof (*syms), compare_symbols);
90e3cdf2 3269
c9727e01
AM
3270 if (!relocatable && symcount > 1)
3271 {
3272 long j;
3273 /* Trim duplicate syms, since we may have merged the normal and
3274 dynamic symbols. Actually, we only care about syms that have
3b36f7e6 3275 different values, so trim any with the same value. */
c9727e01
AM
3276 for (i = 1, j = 1; i < symcount; ++i)
3277 if (syms[i - 1]->value + syms[i - 1]->section->vma
3278 != syms[i]->value + syms[i]->section->vma)
3279 syms[j++] = syms[i];
3280 symcount = j;
3281 }
3282
699733f6 3283 i = 0;
ffcfec52 3284 if (strcmp (syms[i]->section->name, ".opd") == 0)
699733f6
AM
3285 ++i;
3286 codesecsym = i;
90e3cdf2 3287
699733f6
AM
3288 for (; i < symcount; ++i)
3289 if (((syms[i]->section->flags & (SEC_CODE | SEC_ALLOC | SEC_THREAD_LOCAL))
3290 != (SEC_CODE | SEC_ALLOC))
3291 || (syms[i]->flags & BSF_SECTION_SYM) == 0)
3292 break;
3293 codesecsymend = i;
90e3cdf2 3294
699733f6
AM
3295 for (; i < symcount; ++i)
3296 if ((syms[i]->flags & BSF_SECTION_SYM) == 0)
3297 break;
3298 secsymend = i;
90e3cdf2 3299
699733f6 3300 for (; i < symcount; ++i)
ffcfec52 3301 if (strcmp (syms[i]->section->name, ".opd") != 0)
699733f6
AM
3302 break;
3303 opdsymend = i;
90e3cdf2 3304
699733f6
AM
3305 for (; i < symcount; ++i)
3306 if ((syms[i]->section->flags & (SEC_CODE | SEC_ALLOC | SEC_THREAD_LOCAL))
3307 != (SEC_CODE | SEC_ALLOC))
3308 break;
3309 symcount = i;
3310
c9727e01 3311 count = 0;
90e3cdf2 3312
699733f6 3313 if (relocatable)
90e3cdf2 3314 {
699733f6
AM
3315 bfd_boolean (*slurp_relocs) (bfd *, asection *, asymbol **, bfd_boolean);
3316 arelent *r;
3317 size_t size;
3318 long relcount;
90e3cdf2 3319
468392fb
AM
3320 if (opdsymend == secsymend)
3321 goto done;
3322
699733f6 3323 slurp_relocs = get_elf_backend_data (abfd)->s->slurp_reloc_table;
90e3cdf2 3324 relcount = (opd->flags & SEC_RELOC) ? opd->reloc_count : 0;
7356fed5 3325 if (relcount == 0)
c9727e01 3326 goto done;
90e3cdf2 3327
7356fed5
AM
3328 if (!(*slurp_relocs) (abfd, opd, static_syms, FALSE))
3329 {
3330 count = -1;
3331 goto done;
3332 }
3333
699733f6 3334 size = 0;
595da8c5 3335 for (i = secsymend, r = opd->relocation; i < opdsymend; ++i)
699733f6
AM
3336 {
3337 asymbol *sym;
90e3cdf2 3338
595da8c5 3339 while (r < opd->relocation + relcount
699733f6
AM
3340 && r->address < syms[i]->value + opd->vma)
3341 ++r;
90e3cdf2 3342
595da8c5 3343 if (r == opd->relocation + relcount)
699733f6 3344 break;
90e3cdf2 3345
699733f6
AM
3346 if (r->address != syms[i]->value + opd->vma)
3347 continue;
90e3cdf2 3348
699733f6
AM
3349 if (r->howto->type != R_PPC64_ADDR64)
3350 continue;
90e3cdf2 3351
699733f6
AM
3352 sym = *r->sym_ptr_ptr;
3353 if (!sym_exists_at (syms, opdsymend, symcount,
3354 sym->section->id, sym->value + r->addend))
3355 {
3356 ++count;
3357 size += sizeof (asymbol);
3358 size += strlen (syms[i]->name) + 2;
3359 }
3360 }
90e3cdf2 3361
c4b0b099
AM
3362 if (size == 0)
3363 goto done;
699733f6
AM
3364 s = *ret = bfd_malloc (size);
3365 if (s == NULL)
3366 {
7356fed5 3367 count = -1;
c9727e01 3368 goto done;
699733f6 3369 }
90e3cdf2 3370
699733f6 3371 names = (char *) (s + count);
90e3cdf2 3372
595da8c5 3373 for (i = secsymend, r = opd->relocation; i < opdsymend; ++i)
90e3cdf2 3374 {
699733f6 3375 asymbol *sym;
90e3cdf2 3376
595da8c5 3377 while (r < opd->relocation + relcount
699733f6
AM
3378 && r->address < syms[i]->value + opd->vma)
3379 ++r;
90e3cdf2 3380
595da8c5 3381 if (r == opd->relocation + relcount)
699733f6
AM
3382 break;
3383
3384 if (r->address != syms[i]->value + opd->vma)
3385 continue;
3386
3387 if (r->howto->type != R_PPC64_ADDR64)
3388 continue;
90e3cdf2 3389
699733f6
AM
3390 sym = *r->sym_ptr_ptr;
3391 if (!sym_exists_at (syms, opdsymend, symcount,
3392 sym->section->id, sym->value + r->addend))
3393 {
3394 size_t len;
3395
3396 *s = *syms[i];
6ba2a415 3397 s->flags |= BSF_SYNTHETIC;
699733f6
AM
3398 s->section = sym->section;
3399 s->value = sym->value + r->addend;
3400 s->name = names;
3401 *names++ = '.';
3402 len = strlen (syms[i]->name);
3403 memcpy (names, syms[i]->name, len + 1);
3404 names += len + 1;
6f610d07
UW
3405 /* Have udata.p point back to the original symbol this
3406 synthetic symbol was derived from. */
3407 s->udata.p = syms[i];
699733f6
AM
3408 s++;
3409 }
3410 }
3411 }
3412 else
90e3cdf2 3413 {
468392fb 3414 bfd_boolean (*slurp_relocs) (bfd *, asection *, asymbol **, bfd_boolean);
ee67d69a 3415 bfd_byte *contents = NULL;
699733f6 3416 size_t size;
468392fb
AM
3417 long plt_count = 0;
3418 bfd_vma glink_vma = 0, resolv_vma = 0;
3419 asection *dynamic, *glink = NULL, *relplt = NULL;
3420 arelent *p;
90e3cdf2 3421
ee67d69a 3422 if (opd != NULL && !bfd_malloc_and_get_section (abfd, opd, &contents))
699733f6 3423 {
c4b0b099
AM
3424 free_contents_and_exit_err:
3425 count = -1;
ee67d69a 3426 free_contents_and_exit:
699733f6 3427 if (contents)
ee67d69a 3428 free (contents);
c9727e01 3429 goto done;
699733f6 3430 }
90e3cdf2 3431
699733f6
AM
3432 size = 0;
3433 for (i = secsymend; i < opdsymend; ++i)
3434 {
3435 bfd_vma ent;
90e3cdf2 3436
5ef11c02
AM
3437 /* Ignore bogus symbols. */
3438 if (syms[i]->value > opd->size - 8)
3439 continue;
3440
699733f6
AM
3441 ent = bfd_get_64 (abfd, contents + syms[i]->value);
3442 if (!sym_exists_at (syms, opdsymend, symcount, -1, ent))
3443 {
3444 ++count;
3445 size += sizeof (asymbol);
3446 size += strlen (syms[i]->name) + 2;
3447 }
3448 }
90e3cdf2 3449
468392fb 3450 /* Get start of .glink stubs from DT_PPC64_GLINK. */
066ee829
AM
3451 if (dyn_count != 0
3452 && (dynamic = bfd_get_section_by_name (abfd, ".dynamic")) != NULL)
468392fb
AM
3453 {
3454 bfd_byte *dynbuf, *extdyn, *extdynend;
3455 size_t extdynsize;
3456 void (*swap_dyn_in) (bfd *, const void *, Elf_Internal_Dyn *);
3457
3458 if (!bfd_malloc_and_get_section (abfd, dynamic, &dynbuf))
c4b0b099 3459 goto free_contents_and_exit_err;
468392fb
AM
3460
3461 extdynsize = get_elf_backend_data (abfd)->s->sizeof_dyn;
3462 swap_dyn_in = get_elf_backend_data (abfd)->s->swap_dyn_in;
3463
3464 extdyn = dynbuf;
3465 extdynend = extdyn + dynamic->size;
3466 for (; extdyn < extdynend; extdyn += extdynsize)
3467 {
3468 Elf_Internal_Dyn dyn;
3469 (*swap_dyn_in) (abfd, extdyn, &dyn);
3470
3471 if (dyn.d_tag == DT_NULL)
3472 break;
3473
3474 if (dyn.d_tag == DT_PPC64_GLINK)
3475 {
b9e5796b
AM
3476 /* The first glink stub starts at offset 32; see
3477 comment in ppc64_elf_finish_dynamic_sections. */
3478 glink_vma = dyn.d_un.d_val + GLINK_CALL_STUB_SIZE - 8 * 4;
468392fb
AM
3479 /* The .glink section usually does not survive the final
3480 link; search for the section (usually .text) where the
3481 glink stubs now reside. */
3482 glink = bfd_sections_find_if (abfd, section_covers_vma,
3483 &glink_vma);
3484 break;
3485 }
3486 }
3487
3488 free (dynbuf);
3489 }
3490
3491 if (glink != NULL)
3492 {
3493 /* Determine __glink trampoline by reading the relative branch
3494 from the first glink stub. */
3495 bfd_byte buf[4];
b9e5796b
AM
3496 unsigned int off = 0;
3497
3498 while (bfd_get_section_contents (abfd, glink, buf,
3499 glink_vma + off - glink->vma, 4))
468392fb
AM
3500 {
3501 unsigned int insn = bfd_get_32 (abfd, buf);
3502 insn ^= B_DOT;
3503 if ((insn & ~0x3fffffc) == 0)
b9e5796b
AM
3504 {
3505 resolv_vma = glink_vma + off + (insn ^ 0x2000000) - 0x2000000;
3506 break;
3507 }
3508 off += 4;
3509 if (off > 4)
3510 break;
468392fb
AM
3511 }
3512
3513 if (resolv_vma)
3514 size += sizeof (asymbol) + sizeof ("__glink_PLTresolve");
468392fb 3515
066ee829
AM
3516 relplt = bfd_get_section_by_name (abfd, ".rela.plt");
3517 if (relplt != NULL)
3518 {
3519 slurp_relocs = get_elf_backend_data (abfd)->s->slurp_reloc_table;
3520 if (! (*slurp_relocs) (abfd, relplt, dyn_syms, TRUE))
c4b0b099 3521 goto free_contents_and_exit_err;
68ffbac6 3522
066ee829
AM
3523 plt_count = relplt->size / sizeof (Elf64_External_Rela);
3524 size += plt_count * sizeof (asymbol);
468392fb 3525
066ee829
AM
3526 p = relplt->relocation;
3527 for (i = 0; i < plt_count; i++, p++)
e054468f
AM
3528 {
3529 size += strlen ((*p->sym_ptr_ptr)->name) + sizeof ("@plt");
3530 if (p->addend != 0)
3531 size += sizeof ("+0x") - 1 + 16;
3532 }
066ee829 3533 }
468392fb
AM
3534 }
3535
c4b0b099
AM
3536 if (size == 0)
3537 goto free_contents_and_exit;
699733f6
AM
3538 s = *ret = bfd_malloc (size);
3539 if (s == NULL)
c4b0b099 3540 goto free_contents_and_exit_err;
90e3cdf2 3541
468392fb 3542 names = (char *) (s + count + plt_count + (resolv_vma != 0));
90e3cdf2 3543
699733f6 3544 for (i = secsymend; i < opdsymend; ++i)
90e3cdf2 3545 {
699733f6 3546 bfd_vma ent;
90e3cdf2 3547
5ef11c02
AM
3548 if (syms[i]->value > opd->size - 8)
3549 continue;
3550
699733f6
AM
3551 ent = bfd_get_64 (abfd, contents + syms[i]->value);
3552 if (!sym_exists_at (syms, opdsymend, symcount, -1, ent))
90e3cdf2 3553 {
c9727e01 3554 long lo, hi;
699733f6 3555 size_t len;
c9727e01 3556 asection *sec = abfd->sections;
90e3cdf2 3557
699733f6
AM
3558 *s = *syms[i];
3559 lo = codesecsym;
3560 hi = codesecsymend;
3561 while (lo < hi)
3562 {
c9727e01 3563 long mid = (lo + hi) >> 1;
699733f6
AM
3564 if (syms[mid]->section->vma < ent)
3565 lo = mid + 1;
3566 else if (syms[mid]->section->vma > ent)
3567 hi = mid;
3568 else
c9727e01
AM
3569 {
3570 sec = syms[mid]->section;
3571 break;
3572 }
699733f6
AM
3573 }
3574
c9727e01 3575 if (lo >= hi && lo > codesecsym)
699733f6 3576 sec = syms[lo - 1]->section;
699733f6
AM
3577
3578 for (; sec != NULL; sec = sec->next)
3579 {
3580 if (sec->vma > ent)
3581 break;
63524580
JK
3582 /* SEC_LOAD may not be set if SEC is from a separate debug
3583 info file. */
3584 if ((sec->flags & SEC_ALLOC) == 0)
699733f6
AM
3585 break;
3586 if ((sec->flags & SEC_CODE) != 0)
3587 s->section = sec;
3588 }
6ba2a415 3589 s->flags |= BSF_SYNTHETIC;
699733f6
AM
3590 s->value = ent - s->section->vma;
3591 s->name = names;
3592 *names++ = '.';
3593 len = strlen (syms[i]->name);
3594 memcpy (names, syms[i]->name, len + 1);
3595 names += len + 1;
6f610d07
UW
3596 /* Have udata.p point back to the original symbol this
3597 synthetic symbol was derived from. */
3598 s->udata.p = syms[i];
699733f6 3599 s++;
90e3cdf2 3600 }
90e3cdf2 3601 }
699733f6 3602 free (contents);
468392fb
AM
3603
3604 if (glink != NULL && relplt != NULL)
3605 {
3606 if (resolv_vma)
3607 {
3608 /* Add a symbol for the main glink trampoline. */
86a4952b 3609 memset (s, 0, sizeof *s);
468392fb 3610 s->the_bfd = abfd;
6ba2a415 3611 s->flags = BSF_GLOBAL | BSF_SYNTHETIC;
468392fb
AM
3612 s->section = glink;
3613 s->value = resolv_vma - glink->vma;
3614 s->name = names;
3615 memcpy (names, "__glink_PLTresolve", sizeof ("__glink_PLTresolve"));
3616 names += sizeof ("__glink_PLTresolve");
3617 s++;
3618 count++;
3619 }
3620
3621 /* FIXME: It would be very much nicer to put sym@plt on the
3622 stub rather than on the glink branch table entry. The
3623 objdump disassembler would then use a sensible symbol
3624 name on plt calls. The difficulty in doing so is
3625 a) finding the stubs, and,
3626 b) matching stubs against plt entries, and,
3627 c) there can be multiple stubs for a given plt entry.
3628
3629 Solving (a) could be done by code scanning, but older
3630 ppc64 binaries used different stubs to current code.
3631 (b) is the tricky one since you need to known the toc
3632 pointer for at least one function that uses a pic stub to
3633 be able to calculate the plt address referenced.
3634 (c) means gdb would need to set multiple breakpoints (or
3635 find the glink branch itself) when setting breakpoints
3636 for pending shared library loads. */
3637 p = relplt->relocation;
3638 for (i = 0; i < plt_count; i++, p++)
3639 {
3640 size_t len;
3641
3642 *s = **p->sym_ptr_ptr;
3643 /* Undefined syms won't have BSF_LOCAL or BSF_GLOBAL set. Since
3644 we are defining a symbol, ensure one of them is set. */
3645 if ((s->flags & BSF_LOCAL) == 0)
3646 s->flags |= BSF_GLOBAL;
6ba2a415 3647 s->flags |= BSF_SYNTHETIC;
468392fb
AM
3648 s->section = glink;
3649 s->value = glink_vma - glink->vma;
3650 s->name = names;
3651 s->udata.p = NULL;
3652 len = strlen ((*p->sym_ptr_ptr)->name);
3653 memcpy (names, (*p->sym_ptr_ptr)->name, len);
3654 names += len;
e054468f
AM
3655 if (p->addend != 0)
3656 {
3657 memcpy (names, "+0x", sizeof ("+0x") - 1);
3658 names += sizeof ("+0x") - 1;
3659 bfd_sprintf_vma (abfd, names, p->addend);
3660 names += strlen (names);
3661 }
468392fb
AM
3662 memcpy (names, "@plt", sizeof ("@plt"));
3663 names += sizeof ("@plt");
3664 s++;
b9e5796b
AM
3665 if (abi < 2)
3666 {
3667 glink_vma += 8;
3668 if (i >= 0x8000)
3669 glink_vma += 4;
3670 }
3671 else
468392fb
AM
3672 glink_vma += 4;
3673 }
3674 count += plt_count;
3675 }
90e3cdf2
JJ
3676 }
3677
c9727e01 3678 done:
a7535cf3 3679 free (syms);
90e3cdf2
JJ
3680 return count;
3681}
5bd4f169 3682\f
65f38f15
AM
3683/* The following functions are specific to the ELF linker, while
3684 functions above are used generally. Those named ppc64_elf_* are
3685 called by the main ELF linker code. They appear in this file more
3686 or less in the order in which they are called. eg.
3687 ppc64_elf_check_relocs is called early in the link process,
3688 ppc64_elf_finish_dynamic_sections is one of the last functions
e86ce104
AM
3689 called.
3690
3691 PowerPC64-ELF uses a similar scheme to PowerPC64-XCOFF in that
3692 functions have both a function code symbol and a function descriptor
3693 symbol. A call to foo in a relocatable object file looks like:
3694
3695 . .text
3696 . x:
3697 . bl .foo
3698 . nop
3699
3700 The function definition in another object file might be:
3701
3702 . .section .opd
3703 . foo: .quad .foo
3704 . .quad .TOC.@tocbase
3705 . .quad 0
3706 .
3707 . .text
3708 . .foo: blr
3709
3710 When the linker resolves the call during a static link, the branch
3711 unsurprisingly just goes to .foo and the .opd information is unused.
3712 If the function definition is in a shared library, things are a little
3713 different: The call goes via a plt call stub, the opd information gets
3714 copied to the plt, and the linker patches the nop.
3715
3716 . x:
3717 . bl .foo_stub
3718 . ld 2,40(1)
3719 .
3720 .
3721 . .foo_stub:
71a39c98
AM
3722 . std 2,40(1) # in practice, the call stub
3723 . addis 11,2,Lfoo@toc@ha # is slightly optimized, but
3724 . addi 11,11,Lfoo@toc@l # this is the general idea
3725 . ld 12,0(11)
3726 . ld 2,8(11)
3727 . mtctr 12
3728 . ld 11,16(11)
e86ce104
AM
3729 . bctr
3730 .
3731 . .section .plt
3732 . Lfoo: reloc (R_PPC64_JMP_SLOT, foo)
3733
3734 The "reloc ()" notation is supposed to indicate that the linker emits
3735 an R_PPC64_JMP_SLOT reloc against foo. The dynamic linker does the opd
3736 copying.
3737
3738 What are the difficulties here? Well, firstly, the relocations
3739 examined by the linker in check_relocs are against the function code
3740 sym .foo, while the dynamic relocation in the plt is emitted against
3741 the function descriptor symbol, foo. Somewhere along the line, we need
3742 to carefully copy dynamic link information from one symbol to the other.
3743 Secondly, the generic part of the elf linker will make .foo a dynamic
3744 symbol as is normal for most other backends. We need foo dynamic
3745 instead, at least for an application final link. However, when
3746 creating a shared library containing foo, we need to have both symbols
3747 dynamic so that references to .foo are satisfied during the early
3748 stages of linking. Otherwise the linker might decide to pull in a
8387904d
AM
3749 definition from some other object, eg. a static library.
3750
3751 Update: As of August 2004, we support a new convention. Function
3752 calls may use the function descriptor symbol, ie. "bl foo". This
3753 behaves exactly as "bl .foo". */
65f38f15 3754
1d483afe 3755/* Of those relocs that might be copied as dynamic relocs, this function
58ac9f71
AM
3756 selects those that must be copied when linking a shared library,
3757 even when the symbol is local. */
65f38f15 3758
1d483afe
AM
3759static int
3760must_be_dyn_reloc (struct bfd_link_info *info,
3761 enum elf_ppc64_reloc_type r_type)
3762{
3763 switch (r_type)
3764 {
3765 default:
3766 return 1;
3767
3768 case R_PPC64_REL32:
3769 case R_PPC64_REL64:
3770 case R_PPC64_REL30:
3771 return 0;
3772
3773 case R_PPC64_TPREL16:
3774 case R_PPC64_TPREL16_LO:
3775 case R_PPC64_TPREL16_HI:
3776 case R_PPC64_TPREL16_HA:
3777 case R_PPC64_TPREL16_DS:
3778 case R_PPC64_TPREL16_LO_DS:
f9c6b907
AM
3779 case R_PPC64_TPREL16_HIGH:
3780 case R_PPC64_TPREL16_HIGHA:
1d483afe
AM
3781 case R_PPC64_TPREL16_HIGHER:
3782 case R_PPC64_TPREL16_HIGHERA:
3783 case R_PPC64_TPREL16_HIGHEST:
3784 case R_PPC64_TPREL16_HIGHESTA:
3785 case R_PPC64_TPREL64:
0e1862bb 3786 return !bfd_link_executable (info);
1d483afe
AM
3787 }
3788}
65f38f15 3789
f4656909
AM
3790/* If ELIMINATE_COPY_RELOCS is non-zero, the linker will try to avoid
3791 copying dynamic variables from a shared lib into an app's dynbss
3792 section, and instead use a dynamic relocation to point into the
5d35169e
AM
3793 shared lib. With code that gcc generates, it's vital that this be
3794 enabled; In the PowerPC64 ABI, the address of a function is actually
3795 the address of a function descriptor, which resides in the .opd
3796 section. gcc uses the descriptor directly rather than going via the
3797 GOT as some other ABI's do, which means that initialized function
3798 pointers must reference the descriptor. Thus, a function pointer
3799 initialized to the address of a function in a shared library will
3800 either require a copy reloc, or a dynamic reloc. Using a copy reloc
4cc11e76 3801 redefines the function descriptor symbol to point to the copy. This
5d35169e
AM
3802 presents a problem as a plt entry for that function is also
3803 initialized from the function descriptor symbol and the copy reloc
3804 may not be initialized first. */
a23b6845 3805#define ELIMINATE_COPY_RELOCS 1
f4656909 3806
721956f4 3807/* Section name for stubs is the associated section name plus this
29942be8
NC
3808 string. */
3809#define STUB_SUFFIX ".stub"
721956f4
AM
3810
3811/* Linker stubs.
3812 ppc_stub_long_branch:
3813 Used when a 14 bit branch (or even a 24 bit branch) can't reach its
3814 destination, but a 24 bit branch in a stub section will reach.
3815 . b dest
3816
3817 ppc_stub_plt_branch:
3818 Similar to the above, but a 24 bit branch in the stub section won't
3819 reach its destination.
71a39c98
AM
3820 . addis %r11,%r2,xxx@toc@ha
3821 . ld %r12,xxx@toc@l(%r11)
3822 . mtctr %r12
721956f4
AM
3823 . bctr
3824
3825 ppc_stub_plt_call:
2c66dc6c
AM
3826 Used to call a function in a shared library. If it so happens that
3827 the plt entry referenced crosses a 64k boundary, then an extra
71a39c98 3828 "addi %r11,%r11,xxx@toc@l" will be inserted before the "mtctr".
721956f4 3829 . std %r2,40(%r1)
71a39c98
AM
3830 . addis %r11,%r2,xxx@toc@ha
3831 . ld %r12,xxx+0@toc@l(%r11)
3832 . mtctr %r12
3833 . ld %r2,xxx+8@toc@l(%r11)
3834 . ld %r11,xxx+16@toc@l(%r11)
721956f4 3835 . bctr
ad8e1ba5
AM
3836
3837 ppc_stub_long_branch and ppc_stub_plt_branch may also have additional
3838 code to adjust the value and save r2 to support multiple toc sections.
3839 A ppc_stub_long_branch with an r2 offset looks like:
3840 . std %r2,40(%r1)
3841 . addis %r2,%r2,off@ha
3842 . addi %r2,%r2,off@l
3843 . b dest
3844
3845 A ppc_stub_plt_branch with an r2 offset looks like:
3846 . std %r2,40(%r1)
71a39c98
AM
3847 . addis %r11,%r2,xxx@toc@ha
3848 . ld %r12,xxx@toc@l(%r11)
ad8e1ba5
AM
3849 . addis %r2,%r2,off@ha
3850 . addi %r2,%r2,off@l
71a39c98 3851 . mtctr %r12
ad8e1ba5 3852 . bctr
ac2df442
AM
3853
3854 In cases where the "addis" instruction would add zero, the "addis" is
3855 omitted and following instructions modified slightly in some cases.
721956f4
AM
3856*/
3857
3858enum ppc_stub_type {
3859 ppc_stub_none,
3860 ppc_stub_long_branch,
ad8e1ba5 3861 ppc_stub_long_branch_r2off,
721956f4 3862 ppc_stub_plt_branch,
ad8e1ba5 3863 ppc_stub_plt_branch_r2off,
794e51c0 3864 ppc_stub_plt_call,
7341d5e2 3865 ppc_stub_plt_call_r2save,
a4b6fadd
AM
3866 ppc_stub_global_entry,
3867 ppc_stub_save_res
721956f4
AM
3868};
3869
6f20ed8a
AM
3870/* Information on stub grouping. */
3871struct map_stub
3872{
3873 /* The stub section. */
3874 asection *stub_sec;
3875 /* This is the section to which stubs in the group will be attached. */
3876 asection *link_sec;
a4b6fadd
AM
3877 /* Next group. */
3878 struct map_stub *next;
3879 /* Whether to emit a copy of register save/restore functions in this
3880 group. */
3881 int needs_save_res;
6f20ed8a
AM
3882};
3883
721956f4
AM
3884struct ppc_stub_hash_entry {
3885
3886 /* Base hash table entry structure. */
3887 struct bfd_hash_entry root;
3888
ad8e1ba5
AM
3889 enum ppc_stub_type stub_type;
3890
6f20ed8a
AM
3891 /* Group information. */
3892 struct map_stub *group;
721956f4
AM
3893
3894 /* Offset within stub_sec of the beginning of this stub. */
3895 bfd_vma stub_offset;
3896
3897 /* Given the symbol's value and its section we can determine its final
3898 value when building the stubs (so the stub knows where to jump. */
3899 bfd_vma target_value;
3900 asection *target_section;
3901
721956f4
AM
3902 /* The symbol table entry, if any, that this was derived from. */
3903 struct ppc_link_hash_entry *h;
e054468f 3904 struct plt_entry *plt_ent;
721956f4 3905
6911b7dc
AM
3906 /* Symbol st_other. */
3907 unsigned char other;
721956f4
AM
3908};
3909
3910struct ppc_branch_hash_entry {
3911
3912 /* Base hash table entry structure. */
3913 struct bfd_hash_entry root;
3914
c456f082 3915 /* Offset within branch lookup table. */
721956f4
AM
3916 unsigned int offset;
3917
3918 /* Generation marker. */
3919 unsigned int iter;
3920};
65f38f15 3921
19e08130
AM
3922/* Used to track dynamic relocations for local symbols. */
3923struct ppc_dyn_relocs
3924{
3925 struct ppc_dyn_relocs *next;
3926
3927 /* The input section of the reloc. */
3928 asection *sec;
3929
3930 /* Total number of relocs copied for the input section. */
3931 unsigned int count : 31;
3932
3933 /* Whether this entry is for STT_GNU_IFUNC symbols. */
3934 unsigned int ifunc : 1;
3935};
3936
65f38f15
AM
3937struct ppc_link_hash_entry
3938{
3939 struct elf_link_hash_entry elf;
3940
b3fac117
AM
3941 union {
3942 /* A pointer to the most recently used stub hash entry against this
3943 symbol. */
3944 struct ppc_stub_hash_entry *stub_cache;
3945
3946 /* A pointer to the next symbol starting with a '.' */
3947 struct ppc_link_hash_entry *next_dot_sym;
3948 } u;
721956f4 3949
65f38f15 3950 /* Track dynamic relocs copied for this symbol. */
6061a67d 3951 struct elf_dyn_relocs *dyn_relocs;
e86ce104 3952
d311bc8b
AM
3953 /* Chain of aliases referring to a weakdef. */
3954 struct ppc_link_hash_entry *weakref;
3955
721956f4 3956 /* Link between function code and descriptor symbols. */
34814b9f 3957 struct ppc_link_hash_entry *oh;
721956f4 3958
e86ce104
AM
3959 /* Flag function code and descriptor symbols. */
3960 unsigned int is_func:1;
3961 unsigned int is_func_descriptor:1;
908b32fc 3962 unsigned int fake:1;
411e1bfb 3963
c5614fa4
AM
3964 /* Whether global opd/toc sym has been adjusted or not.
3965 After ppc64_elf_edit_opd/ppc64_elf_edit_toc has run, this flag
3966 should be set for all globals defined in any opd/toc section. */
754021d0
AM
3967 unsigned int adjust_done:1;
3968
99877b66
AM
3969 /* Set if we twiddled this symbol to weak at some stage. */
3970 unsigned int was_undefined:1;
3971
a4b6fadd
AM
3972 /* Set if this is an out-of-line register save/restore function,
3973 with non-standard calling convention. */
3974 unsigned int save_res:1;
3975
411e1bfb 3976 /* Contexts in which symbol is used in the GOT (or TOC).
e7b938ca
AM
3977 TLS_GD .. TLS_EXPLICIT bits are or'd into the mask as the
3978 corresponding relocs are encountered during check_relocs.
3979 tls_optimize clears TLS_GD .. TLS_TPREL when optimizing to
3980 indicate the corresponding GOT entry type is not needed.
3981 tls_optimize may also set TLS_TPRELGD when a GD reloc turns into
3982 a TPREL one. We use a separate flag rather than setting TPREL
3983 just for convenience in distinguishing the two cases. */
3984#define TLS_GD 1 /* GD reloc. */
3985#define TLS_LD 2 /* LD reloc. */
3986#define TLS_TPREL 4 /* TPREL reloc, => IE. */
3987#define TLS_DTPREL 8 /* DTPREL reloc, => LD. */
3988#define TLS_TLS 16 /* Any TLS reloc. */
3989#define TLS_EXPLICIT 32 /* Marks TOC section TLS relocs. */
3990#define TLS_TPRELGD 64 /* TPREL reloc resulting from GD->IE. */
e054468f 3991#define PLT_IFUNC 128 /* STT_GNU_IFUNC. */
f961d9dd 3992 unsigned char tls_mask;
65f38f15
AM
3993};
3994
3995/* ppc64 ELF linker hash table. */
3996
3997struct ppc_link_hash_table
3998{
3999 struct elf_link_hash_table elf;
4000
721956f4
AM
4001 /* The stub hash table. */
4002 struct bfd_hash_table stub_hash_table;
4003
4004 /* Another hash table for plt_branch stubs. */
4005 struct bfd_hash_table branch_hash_table;
4006
3b421ab3
AM
4007 /* Hash table for function prologue tocsave. */
4008 htab_t tocsave_htab;
4009
e7d1c40c
AM
4010 /* Various options and other info passed from the linker. */
4011 struct ppc64_elf_params *params;
721956f4 4012
6f20ed8a
AM
4013 /* The size of sec_info below. */
4014 unsigned int sec_info_arr_size;
4015
4016 /* Per-section array of extra section info. Done this way rather
4017 than as part of ppc64_elf_section_data so we have the info for
4018 non-ppc64 sections. */
4019 struct
4020 {
4021 /* Along with elf_gp, specifies the TOC pointer used by this section. */
ad8e1ba5 4022 bfd_vma toc_off;
6f20ed8a
AM
4023
4024 union
4025 {
4026 /* The section group that this section belongs to. */
4027 struct map_stub *group;
4028 /* A temp section list pointer. */
4029 asection *list;
4030 } u;
4031 } *sec_info;
721956f4 4032
a4b6fadd
AM
4033 /* Linked list of groups. */
4034 struct map_stub *group;
4035
ad8e1ba5
AM
4036 /* Temp used when calculating TOC pointers. */
4037 bfd_vma toc_curr;
bf102f86
AM
4038 bfd *toc_bfd;
4039 asection *toc_first_sec;
ad8e1ba5 4040
b3fac117
AM
4041 /* Used when adding symbols. */
4042 struct ppc_link_hash_entry *dot_syms;
4043
33e44f2e 4044 /* Shortcuts to get to dynamic linker sections. */
4ce794b7
AM
4045 asection *dynbss;
4046 asection *relbss;
4047 asection *glink;
82bd7b59 4048 asection *sfpr;
4ce794b7
AM
4049 asection *brlt;
4050 asection *relbrlt;
58d180e8 4051 asection *glink_eh_frame;
ec338859 4052
8387904d
AM
4053 /* Shortcut to .__tls_get_addr and __tls_get_addr. */
4054 struct ppc_link_hash_entry *tls_get_addr;
4055 struct ppc_link_hash_entry *tls_get_addr_fd;
411e1bfb 4056
927be08e
AM
4057 /* The size of reliplt used by got entry relocs. */
4058 bfd_size_type got_reli_size;
4059
9b5ecbd0 4060 /* Statistics. */
7341d5e2 4061 unsigned long stub_count[ppc_stub_global_entry];
9b5ecbd0 4062
ee75fd95
AM
4063 /* Number of stubs against global syms. */
4064 unsigned long stub_globals;
4065
ee67d69a
AM
4066 /* Set if we're linking code with function descriptors. */
4067 unsigned int opd_abi:1;
4068
4c52953f 4069 /* Support for multiple toc sections. */
33c0ec9d 4070 unsigned int do_multi_toc:1;
4c52953f 4071 unsigned int multi_toc_needed:1;
927be08e 4072 unsigned int second_toc_pass:1;
67f0cbdb 4073 unsigned int do_toc_opt:1;
4c52953f 4074
5d1634d7 4075 /* Set on error. */
99877b66 4076 unsigned int stub_error:1;
721956f4 4077
f6c7c3e8 4078 /* Temp used by ppc64_elf_before_check_relocs. */
99877b66 4079 unsigned int twiddled_syms:1;
721956f4
AM
4080
4081 /* Incremented every time we size stubs. */
4082 unsigned int stub_iteration;
5d1634d7 4083
87d72d41
AM
4084 /* Small local sym cache. */
4085 struct sym_cache sym_cache;
65f38f15
AM
4086};
4087
4c52953f
AM
4088/* Rename some of the generic section flags to better document how they
4089 are used here. */
b0dddeec
AM
4090
4091/* Nonzero if this section has TLS related relocations. */
4092#define has_tls_reloc sec_flg0
4093
4094/* Nonzero if this section has a call to __tls_get_addr. */
4095#define has_tls_get_addr_call sec_flg1
4096
4097/* Nonzero if this section has any toc or got relocs. */
4098#define has_toc_reloc sec_flg2
4099
4100/* Nonzero if this section has a call to another section that uses
4101 the toc or got. */
d77c8a4b 4102#define makes_toc_func_call sec_flg3
b0dddeec
AM
4103
4104/* Recursion protection when determining above flag. */
d77c8a4b 4105#define call_check_in_progress sec_flg4
70cc837d 4106#define call_check_done sec_flg5
4c52953f 4107
65f38f15
AM
4108/* Get the ppc64 ELF linker hash table from a link_info structure. */
4109
4110#define ppc_hash_table(p) \
4dfe6ac6
NC
4111 (elf_hash_table_id ((struct elf_link_hash_table *) ((p)->hash)) \
4112 == PPC64_ELF_DATA ? ((struct ppc_link_hash_table *) ((p)->hash)) : NULL)
65f38f15 4113
721956f4
AM
4114#define ppc_stub_hash_lookup(table, string, create, copy) \
4115 ((struct ppc_stub_hash_entry *) \
4116 bfd_hash_lookup ((table), (string), (create), (copy)))
4117
4118#define ppc_branch_hash_lookup(table, string, create, copy) \
4119 ((struct ppc_branch_hash_entry *) \
4120 bfd_hash_lookup ((table), (string), (create), (copy)))
4121
4122/* Create an entry in the stub hash table. */
4123
4124static struct bfd_hash_entry *
4ce794b7
AM
4125stub_hash_newfunc (struct bfd_hash_entry *entry,
4126 struct bfd_hash_table *table,
4127 const char *string)
721956f4
AM
4128{
4129 /* Allocate the structure if it has not already been allocated by a
4130 subclass. */
4131 if (entry == NULL)
4132 {
4133 entry = bfd_hash_allocate (table, sizeof (struct ppc_stub_hash_entry));
4134 if (entry == NULL)
4135 return entry;
4136 }
4137
4138 /* Call the allocation method of the superclass. */
4139 entry = bfd_hash_newfunc (entry, table, string);
4140 if (entry != NULL)
4141 {
4142 struct ppc_stub_hash_entry *eh;
4143
4144 /* Initialize the local fields. */
4145 eh = (struct ppc_stub_hash_entry *) entry;
ad8e1ba5 4146 eh->stub_type = ppc_stub_none;
6f20ed8a 4147 eh->group = NULL;
721956f4
AM
4148 eh->stub_offset = 0;
4149 eh->target_value = 0;
4150 eh->target_section = NULL;
721956f4 4151 eh->h = NULL;
6911b7dc 4152 eh->plt_ent = NULL;
6911b7dc 4153 eh->other = 0;
721956f4
AM
4154 }
4155
4156 return entry;
4157}
4158
4159/* Create an entry in the branch hash table. */
4160
4161static struct bfd_hash_entry *
4ce794b7
AM
4162branch_hash_newfunc (struct bfd_hash_entry *entry,
4163 struct bfd_hash_table *table,
4164 const char *string)
721956f4
AM
4165{
4166 /* Allocate the structure if it has not already been allocated by a
4167 subclass. */
4168 if (entry == NULL)
4169 {
4170 entry = bfd_hash_allocate (table, sizeof (struct ppc_branch_hash_entry));
4171 if (entry == NULL)
4172 return entry;
4173 }
4174
4175 /* Call the allocation method of the superclass. */
4176 entry = bfd_hash_newfunc (entry, table, string);
4177 if (entry != NULL)
4178 {
4179 struct ppc_branch_hash_entry *eh;
4180
4181 /* Initialize the local fields. */
4182 eh = (struct ppc_branch_hash_entry *) entry;
4183 eh->offset = 0;
4184 eh->iter = 0;
4185 }
4186
4187 return entry;
4188}
4189
65f38f15
AM
4190/* Create an entry in a ppc64 ELF linker hash table. */
4191
4192static struct bfd_hash_entry *
4ce794b7
AM
4193link_hash_newfunc (struct bfd_hash_entry *entry,
4194 struct bfd_hash_table *table,
4195 const char *string)
65f38f15
AM
4196{
4197 /* Allocate the structure if it has not already been allocated by a
4198 subclass. */
4199 if (entry == NULL)
4200 {
4201 entry = bfd_hash_allocate (table, sizeof (struct ppc_link_hash_entry));
4202 if (entry == NULL)
4203 return entry;
4204 }
4205
4206 /* Call the allocation method of the superclass. */
4207 entry = _bfd_elf_link_hash_newfunc (entry, table, string);
4208 if (entry != NULL)
4209 {
4210 struct ppc_link_hash_entry *eh = (struct ppc_link_hash_entry *) entry;
4211
b3fac117 4212 memset (&eh->u.stub_cache, 0,
908b32fc 4213 (sizeof (struct ppc_link_hash_entry)
b3fac117
AM
4214 - offsetof (struct ppc_link_hash_entry, u.stub_cache)));
4215
4216 /* When making function calls, old ABI code references function entry
4217 points (dot symbols), while new ABI code references the function
4218 descriptor symbol. We need to make any combination of reference and
4219 definition work together, without breaking archive linking.
4220
4221 For a defined function "foo" and an undefined call to "bar":
4222 An old object defines "foo" and ".foo", references ".bar" (possibly
4223 "bar" too).
4224 A new object defines "foo" and references "bar".
4225
4226 A new object thus has no problem with its undefined symbols being
4227 satisfied by definitions in an old object. On the other hand, the
4228 old object won't have ".bar" satisfied by a new object.
4229
4230 Keep a list of newly added dot-symbols. */
4231
4232 if (string[0] == '.')
4233 {
4234 struct ppc_link_hash_table *htab;
4235
4236 htab = (struct ppc_link_hash_table *) table;
4237 eh->u.next_dot_sym = htab->dot_syms;
4238 htab->dot_syms = eh;
4239 }
65f38f15
AM
4240 }
4241
4242 return entry;
4243}
4244
3b421ab3
AM
4245struct tocsave_entry {
4246 asection *sec;
4247 bfd_vma offset;
4248};
4249
4250static hashval_t
4251tocsave_htab_hash (const void *p)
4252{
4253 const struct tocsave_entry *e = (const struct tocsave_entry *) p;
4254 return ((bfd_vma)(intptr_t) e->sec ^ e->offset) >> 3;
4255}
4256
4257static int
4258tocsave_htab_eq (const void *p1, const void *p2)
4259{
4260 const struct tocsave_entry *e1 = (const struct tocsave_entry *) p1;
4261 const struct tocsave_entry *e2 = (const struct tocsave_entry *) p2;
4262 return e1->sec == e2->sec && e1->offset == e2->offset;
4263}
4264
68faa637
AM
4265/* Destroy a ppc64 ELF linker hash table. */
4266
4267static void
d495ab0d 4268ppc64_elf_link_hash_table_free (bfd *obfd)
68faa637 4269{
d495ab0d 4270 struct ppc_link_hash_table *htab;
68faa637 4271
d495ab0d 4272 htab = (struct ppc_link_hash_table *) obfd->link.hash;
68faa637
AM
4273 if (htab->tocsave_htab)
4274 htab_delete (htab->tocsave_htab);
d495ab0d
AM
4275 bfd_hash_table_free (&htab->branch_hash_table);
4276 bfd_hash_table_free (&htab->stub_hash_table);
4277 _bfd_elf_link_hash_table_free (obfd);
68faa637
AM
4278}
4279
65f38f15
AM
4280/* Create a ppc64 ELF linker hash table. */
4281
4282static struct bfd_link_hash_table *
4ce794b7 4283ppc64_elf_link_hash_table_create (bfd *abfd)
65f38f15
AM
4284{
4285 struct ppc_link_hash_table *htab;
4286 bfd_size_type amt = sizeof (struct ppc_link_hash_table);
4287
4ce794b7 4288 htab = bfd_zmalloc (amt);
65f38f15
AM
4289 if (htab == NULL)
4290 return NULL;
4291
66eb6687 4292 if (!_bfd_elf_link_hash_table_init (&htab->elf, abfd, link_hash_newfunc,
4dfe6ac6
NC
4293 sizeof (struct ppc_link_hash_entry),
4294 PPC64_ELF_DATA))
65f38f15 4295 {
e2d34d7d 4296 free (htab);
65f38f15
AM
4297 return NULL;
4298 }
4299
721956f4 4300 /* Init the stub hash table too. */
66eb6687
AM
4301 if (!bfd_hash_table_init (&htab->stub_hash_table, stub_hash_newfunc,
4302 sizeof (struct ppc_stub_hash_entry)))
2915c55b 4303 {
d495ab0d 4304 _bfd_elf_link_hash_table_free (abfd);
2915c55b
JK
4305 return NULL;
4306 }
721956f4
AM
4307
4308 /* And the branch hash table. */
66eb6687
AM
4309 if (!bfd_hash_table_init (&htab->branch_hash_table, branch_hash_newfunc,
4310 sizeof (struct ppc_branch_hash_entry)))
2915c55b
JK
4311 {
4312 bfd_hash_table_free (&htab->stub_hash_table);
d495ab0d 4313 _bfd_elf_link_hash_table_free (abfd);
2915c55b
JK
4314 return NULL;
4315 }
721956f4 4316
3b421ab3
AM
4317 htab->tocsave_htab = htab_try_create (1024,
4318 tocsave_htab_hash,
4319 tocsave_htab_eq,
4320 NULL);
4321 if (htab->tocsave_htab == NULL)
2915c55b 4322 {
d495ab0d 4323 ppc64_elf_link_hash_table_free (abfd);
2915c55b
JK
4324 return NULL;
4325 }
d495ab0d 4326 htab->elf.root.hash_table_free = ppc64_elf_link_hash_table_free;
3b421ab3 4327
3254fd24
AM
4328 /* Initializing two fields of the union is just cosmetic. We really
4329 only care about glist, but when compiled on a 32-bit host the
4330 bfd_vma fields are larger. Setting the bfd_vma to zero makes
4331 debugger inspection of these fields look nicer. */
a6aa5195
AM
4332 htab->elf.init_got_refcount.refcount = 0;
4333 htab->elf.init_got_refcount.glist = NULL;
4334 htab->elf.init_plt_refcount.refcount = 0;
4335 htab->elf.init_plt_refcount.glist = NULL;
4336 htab->elf.init_got_offset.offset = 0;
4337 htab->elf.init_got_offset.glist = NULL;
4338 htab->elf.init_plt_offset.offset = 0;
4339 htab->elf.init_plt_offset.glist = NULL;
3254fd24 4340
65f38f15
AM
4341 return &htab->elf.root;
4342}
4343
bfeb4a28
AM
4344/* Create sections for linker generated code. */
4345
4346static bfd_boolean
4347create_linkage_sections (bfd *dynobj, struct bfd_link_info *info)
4348{
4349 struct ppc_link_hash_table *htab;
4350 flagword flags;
4351
4352 htab = ppc_hash_table (info);
4353
bfeb4a28
AM
4354 flags = (SEC_ALLOC | SEC_LOAD | SEC_CODE | SEC_READONLY
4355 | SEC_HAS_CONTENTS | SEC_IN_MEMORY | SEC_LINKER_CREATED);
b32547cd
AM
4356 if (htab->params->save_restore_funcs)
4357 {
4358 /* Create .sfpr for code to save and restore fp regs. */
4359 htab->sfpr = bfd_make_section_anyway_with_flags (dynobj, ".sfpr",
4360 flags);
4361 if (htab->sfpr == NULL
4362 || ! bfd_set_section_alignment (dynobj, htab->sfpr, 2))
4363 return FALSE;
4364 }
4365
4366 if (bfd_link_relocatable (info))
4367 return TRUE;
bfeb4a28
AM
4368
4369 /* Create .glink for lazy dynamic linking support. */
4370 htab->glink = bfd_make_section_anyway_with_flags (dynobj, ".glink",
4371 flags);
4372 if (htab->glink == NULL
4373 || ! bfd_set_section_alignment (dynobj, htab->glink, 3))
4374 return FALSE;
4375
4376 if (!info->no_ld_generated_unwind_info)
4377 {
4378 flags = (SEC_ALLOC | SEC_LOAD | SEC_READONLY | SEC_HAS_CONTENTS
4379 | SEC_IN_MEMORY | SEC_LINKER_CREATED);
4380 htab->glink_eh_frame = bfd_make_section_anyway_with_flags (dynobj,
4381 ".eh_frame",
4382 flags);
4383 if (htab->glink_eh_frame == NULL
4384 || !bfd_set_section_alignment (dynobj, htab->glink_eh_frame, 2))
4385 return FALSE;
4386 }
4387
4388 flags = SEC_ALLOC | SEC_LINKER_CREATED;
33e44f2e
AM
4389 htab->elf.iplt = bfd_make_section_anyway_with_flags (dynobj, ".iplt", flags);
4390 if (htab->elf.iplt == NULL
4391 || ! bfd_set_section_alignment (dynobj, htab->elf.iplt, 3))
bfeb4a28
AM
4392 return FALSE;
4393
4394 flags = (SEC_ALLOC | SEC_LOAD | SEC_READONLY
4395 | SEC_HAS_CONTENTS | SEC_IN_MEMORY | SEC_LINKER_CREATED);
33e44f2e
AM
4396 htab->elf.irelplt
4397 = bfd_make_section_anyway_with_flags (dynobj, ".rela.iplt", flags);
4398 if (htab->elf.irelplt == NULL
4399 || ! bfd_set_section_alignment (dynobj, htab->elf.irelplt, 3))
bfeb4a28
AM
4400 return FALSE;
4401
4402 /* Create branch lookup table for plt_branch stubs. */
4403 flags = (SEC_ALLOC | SEC_LOAD
4404 | SEC_HAS_CONTENTS | SEC_IN_MEMORY | SEC_LINKER_CREATED);
4405 htab->brlt = bfd_make_section_anyway_with_flags (dynobj, ".branch_lt",
4406 flags);
4407 if (htab->brlt == NULL
4408 || ! bfd_set_section_alignment (dynobj, htab->brlt, 3))
4409 return FALSE;
4410
0e1862bb 4411 if (!bfd_link_pic (info))
bfeb4a28
AM
4412 return TRUE;
4413
4414 flags = (SEC_ALLOC | SEC_LOAD | SEC_READONLY
4415 | SEC_HAS_CONTENTS | SEC_IN_MEMORY | SEC_LINKER_CREATED);
4416 htab->relbrlt = bfd_make_section_anyway_with_flags (dynobj,
4417 ".rela.branch_lt",
4418 flags);
4419 if (htab->relbrlt == NULL
4420 || ! bfd_set_section_alignment (dynobj, htab->relbrlt, 3))
4421 return FALSE;
4422
4423 return TRUE;
4424}
4425
e717da7e
AM
4426/* Satisfy the ELF linker by filling in some fields in our fake bfd. */
4427
bfeb4a28 4428bfd_boolean
e7d1c40c
AM
4429ppc64_elf_init_stub_bfd (struct bfd_link_info *info,
4430 struct ppc64_elf_params *params)
e717da7e
AM
4431{
4432 struct ppc_link_hash_table *htab;
4433
e7d1c40c 4434 elf_elfheader (params->stub_bfd)->e_ident[EI_CLASS] = ELFCLASS64;
e717da7e
AM
4435
4436/* Always hook our dynamic sections into the first bfd, which is the
4437 linker created stub bfd. This ensures that the GOT header is at
4438 the start of the output TOC section. */
4439 htab = ppc_hash_table (info);
e7d1c40c
AM
4440 htab->elf.dynobj = params->stub_bfd;
4441 htab->params = params;
bfeb4a28 4442
bfeb4a28 4443 return create_linkage_sections (htab->elf.dynobj, info);
e717da7e
AM
4444}
4445
721956f4
AM
4446/* Build a name for an entry in the stub hash table. */
4447
4448static char *
4ce794b7
AM
4449ppc_stub_name (const asection *input_section,
4450 const asection *sym_sec,
4451 const struct ppc_link_hash_entry *h,
4452 const Elf_Internal_Rela *rel)
721956f4
AM
4453{
4454 char *stub_name;
bcaa2f82 4455 ssize_t len;
721956f4
AM
4456
4457 /* rel->r_addend is actually 64 bit, but who uses more than +/- 2^31
4458 offsets from a sym as a branch target? In fact, we could
4459 probably assume the addend is always zero. */
4460 BFD_ASSERT (((int) rel->r_addend & 0xffffffff) == rel->r_addend);
4461
4462 if (h)
4463 {
4464 len = 8 + 1 + strlen (h->elf.root.root.string) + 1 + 8 + 1;
4465 stub_name = bfd_malloc (len);
46de2a7c
AM
4466 if (stub_name == NULL)
4467 return stub_name;
4468
bcaa2f82
AM
4469 len = sprintf (stub_name, "%08x.%s+%x",
4470 input_section->id & 0xffffffff,
4471 h->elf.root.root.string,
4472 (int) rel->r_addend & 0xffffffff);
721956f4
AM
4473 }
4474 else
4475 {
ad8e1ba5 4476 len = 8 + 1 + 8 + 1 + 8 + 1 + 8 + 1;
721956f4 4477 stub_name = bfd_malloc (len);
46de2a7c
AM
4478 if (stub_name == NULL)
4479 return stub_name;
4480
bcaa2f82
AM
4481 len = sprintf (stub_name, "%08x.%x:%x+%x",
4482 input_section->id & 0xffffffff,
4483 sym_sec->id & 0xffffffff,
4484 (int) ELF64_R_SYM (rel->r_info) & 0xffffffff,
4485 (int) rel->r_addend & 0xffffffff);
721956f4 4486 }
bcaa2f82 4487 if (len > 2 && stub_name[len - 2] == '+' && stub_name[len - 1] == '0')
ee75fd95 4488 stub_name[len - 2] = 0;
721956f4
AM
4489 return stub_name;
4490}
4491
4492/* Look up an entry in the stub hash. Stub entries are cached because
4493 creating the stub name takes a bit of time. */
4494
4495static struct ppc_stub_hash_entry *
4ce794b7
AM
4496ppc_get_stub_entry (const asection *input_section,
4497 const asection *sym_sec,
039b3fef 4498 struct ppc_link_hash_entry *h,
4ce794b7
AM
4499 const Elf_Internal_Rela *rel,
4500 struct ppc_link_hash_table *htab)
721956f4
AM
4501{
4502 struct ppc_stub_hash_entry *stub_entry;
6f20ed8a 4503 struct map_stub *group;
721956f4
AM
4504
4505 /* If this input section is part of a group of sections sharing one
4506 stub section, then use the id of the first section in the group.
4507 Stub names need to include a section id, as there may well be
4508 more than one stub used to reach say, printf, and we need to
4509 distinguish between them. */
6f20ed8a 4510 group = htab->sec_info[input_section->id].u.group;
89d77b8a
AM
4511 if (group == NULL)
4512 return NULL;
721956f4 4513
b3fac117
AM
4514 if (h != NULL && h->u.stub_cache != NULL
4515 && h->u.stub_cache->h == h
6f20ed8a 4516 && h->u.stub_cache->group == group)
721956f4 4517 {
b3fac117 4518 stub_entry = h->u.stub_cache;
721956f4
AM
4519 }
4520 else
4521 {
4522 char *stub_name;
4523
6f20ed8a 4524 stub_name = ppc_stub_name (group->link_sec, sym_sec, h, rel);
721956f4
AM
4525 if (stub_name == NULL)
4526 return NULL;
4527
4528 stub_entry = ppc_stub_hash_lookup (&htab->stub_hash_table,
b34976b6 4529 stub_name, FALSE, FALSE);
721956f4 4530 if (h != NULL)
b3fac117 4531 h->u.stub_cache = stub_entry;
721956f4
AM
4532
4533 free (stub_name);
4534 }
4535
4536 return stub_entry;
4537}
4538
4539/* Add a new stub entry to the stub hash. Not all fields of the new
4540 stub entry are initialised. */
4541
4542static struct ppc_stub_hash_entry *
4ce794b7
AM
4543ppc_add_stub (const char *stub_name,
4544 asection *section,
25f53a85 4545 struct bfd_link_info *info)
721956f4 4546{
25f53a85 4547 struct ppc_link_hash_table *htab = ppc_hash_table (info);
6f20ed8a 4548 struct map_stub *group;
721956f4
AM
4549 asection *link_sec;
4550 asection *stub_sec;
4551 struct ppc_stub_hash_entry *stub_entry;
4552
6f20ed8a
AM
4553 group = htab->sec_info[section->id].u.group;
4554 link_sec = group->link_sec;
4555 stub_sec = group->stub_sec;
721956f4
AM
4556 if (stub_sec == NULL)
4557 {
6f20ed8a
AM
4558 size_t namelen;
4559 bfd_size_type len;
4560 char *s_name;
721956f4 4561
6f20ed8a
AM
4562 namelen = strlen (link_sec->name);
4563 len = namelen + sizeof (STUB_SUFFIX);
4564 s_name = bfd_alloc (htab->params->stub_bfd, len);
4565 if (s_name == NULL)
4566 return NULL;
721956f4 4567
6f20ed8a
AM
4568 memcpy (s_name, link_sec->name, namelen);
4569 memcpy (s_name + namelen, STUB_SUFFIX, sizeof (STUB_SUFFIX));
4570 stub_sec = (*htab->params->add_stub_section) (s_name, link_sec);
4571 if (stub_sec == NULL)
4572 return NULL;
4573 group->stub_sec = stub_sec;
721956f4
AM
4574 }
4575
4576 /* Enter this entry into the linker stub hash table. */
4577 stub_entry = ppc_stub_hash_lookup (&htab->stub_hash_table, stub_name,
b34976b6 4578 TRUE, FALSE);
721956f4
AM
4579 if (stub_entry == NULL)
4580 {
8de848d8 4581 info->callbacks->einfo (_("%P: %B: cannot create stub entry %s\n"),
25f53a85 4582 section->owner, stub_name);
721956f4
AM
4583 return NULL;
4584 }
4585
6f20ed8a 4586 stub_entry->group = group;
721956f4 4587 stub_entry->stub_offset = 0;
721956f4
AM
4588 return stub_entry;
4589}
4590
e717da7e
AM
4591/* Create .got and .rela.got sections in ABFD, and .got in dynobj if
4592 not already done. */
65f38f15 4593
b34976b6 4594static bfd_boolean
e717da7e 4595create_got_section (bfd *abfd, struct bfd_link_info *info)
65f38f15 4596{
e717da7e
AM
4597 asection *got, *relgot;
4598 flagword flags;
4599 struct ppc_link_hash_table *htab = ppc_hash_table (info);
65f38f15 4600
0c8d6e5c 4601 if (!is_ppc64_elf (abfd))
0ffa91dd 4602 return FALSE;
4dfe6ac6
NC
4603 if (htab == NULL)
4604 return FALSE;
0ffa91dd 4605
33e44f2e
AM
4606 if (!htab->elf.sgot
4607 && !_bfd_elf_create_got_section (htab->elf.dynobj, info))
4608 return FALSE;
e717da7e
AM
4609
4610 flags = (SEC_ALLOC | SEC_LOAD | SEC_HAS_CONTENTS | SEC_IN_MEMORY
4611 | SEC_LINKER_CREATED);
4612
c456f082 4613 got = bfd_make_section_anyway_with_flags (abfd, ".got", flags);
e717da7e 4614 if (!got
e717da7e
AM
4615 || !bfd_set_section_alignment (abfd, got, 3))
4616 return FALSE;
65f38f15 4617
c456f082
AM
4618 relgot = bfd_make_section_anyway_with_flags (abfd, ".rela.got",
4619 flags | SEC_READONLY);
e717da7e 4620 if (!relgot
e717da7e 4621 || ! bfd_set_section_alignment (abfd, relgot, 3))
b34976b6 4622 return FALSE;
e717da7e
AM
4623
4624 ppc64_elf_tdata (abfd)->got = got;
4625 ppc64_elf_tdata (abfd)->relgot = relgot;
b34976b6 4626 return TRUE;
65f38f15 4627}
5bd4f169 4628
82bd7b59 4629/* Create the dynamic sections, and set up shortcuts. */
5bd4f169 4630
b34976b6 4631static bfd_boolean
4ce794b7 4632ppc64_elf_create_dynamic_sections (bfd *dynobj, struct bfd_link_info *info)
5bd4f169 4633{
65f38f15 4634 struct ppc_link_hash_table *htab;
5bd4f169 4635
65f38f15 4636 if (!_bfd_elf_create_dynamic_sections (dynobj, info))
b34976b6 4637 return FALSE;
65f38f15 4638
e717da7e 4639 htab = ppc_hash_table (info);
4dfe6ac6
NC
4640 if (htab == NULL)
4641 return FALSE;
4642
3d4d4302 4643 htab->dynbss = bfd_get_linker_section (dynobj, ".dynbss");
0e1862bb 4644 if (!bfd_link_pic (info))
3d4d4302 4645 htab->relbss = bfd_get_linker_section (dynobj, ".rela.bss");
65f38f15 4646
33e44f2e 4647 if (!htab->elf.sgot || !htab->elf.splt || !htab->elf.srelplt || !htab->dynbss
0e1862bb 4648 || (!bfd_link_pic (info) && !htab->relbss))
65f38f15
AM
4649 abort ();
4650
b34976b6 4651 return TRUE;
5bd4f169
AM
4652}
4653
b31867b6
AM
4654/* Follow indirect and warning symbol links. */
4655
4656static inline struct bfd_link_hash_entry *
4657follow_link (struct bfd_link_hash_entry *h)
4658{
4659 while (h->type == bfd_link_hash_indirect
4660 || h->type == bfd_link_hash_warning)
4661 h = h->u.i.link;
4662 return h;
4663}
4664
4665static inline struct elf_link_hash_entry *
4666elf_follow_link (struct elf_link_hash_entry *h)
4667{
4668 return (struct elf_link_hash_entry *) follow_link (&h->root);
4669}
4670
4671static inline struct ppc_link_hash_entry *
4672ppc_follow_link (struct ppc_link_hash_entry *h)
4673{
4674 return (struct ppc_link_hash_entry *) follow_link (&h->elf.root);
4675}
4676
40d16e0b
AM
4677/* Merge PLT info on FROM with that on TO. */
4678
4679static void
4680move_plt_plist (struct ppc_link_hash_entry *from,
4681 struct ppc_link_hash_entry *to)
4682{
4683 if (from->elf.plt.plist != NULL)
4684 {
4685 if (to->elf.plt.plist != NULL)
4686 {
4687 struct plt_entry **entp;
4688 struct plt_entry *ent;
4689
4690 for (entp = &from->elf.plt.plist; (ent = *entp) != NULL; )
4691 {
4692 struct plt_entry *dent;
4693
4694 for (dent = to->elf.plt.plist; dent != NULL; dent = dent->next)
4695 if (dent->addend == ent->addend)
4696 {
4697 dent->plt.refcount += ent->plt.refcount;
4698 *entp = ent->next;
4699 break;
4700 }
4701 if (dent == NULL)
4702 entp = &ent->next;
4703 }
4704 *entp = to->elf.plt.plist;
4705 }
4706
4707 to->elf.plt.plist = from->elf.plt.plist;
4708 from->elf.plt.plist = NULL;
4709 }
4710}
4711
65f38f15
AM
4712/* Copy the extra info we tack onto an elf_link_hash_entry. */
4713
4714static void
fcfa13d2
AM
4715ppc64_elf_copy_indirect_symbol (struct bfd_link_info *info,
4716 struct elf_link_hash_entry *dir,
4717 struct elf_link_hash_entry *ind)
65f38f15
AM
4718{
4719 struct ppc_link_hash_entry *edir, *eind;
4720
4721 edir = (struct ppc_link_hash_entry *) dir;
4722 eind = (struct ppc_link_hash_entry *) ind;
4723
c79d6685
AM
4724 edir->is_func |= eind->is_func;
4725 edir->is_func_descriptor |= eind->is_func_descriptor;
4726 edir->tls_mask |= eind->tls_mask;
4727 if (eind->oh != NULL)
4728 edir->oh = ppc_follow_link (eind->oh);
4729
4730 /* If called to transfer flags for a weakdef during processing
4731 of elf_adjust_dynamic_symbol, don't copy NON_GOT_REF.
4732 We clear it ourselves for ELIMINATE_COPY_RELOCS. */
4733 if (!(ELIMINATE_COPY_RELOCS
4734 && eind->elf.root.type != bfd_link_hash_indirect
4735 && edir->elf.dynamic_adjusted))
4736 edir->elf.non_got_ref |= eind->elf.non_got_ref;
4737
4738 edir->elf.ref_dynamic |= eind->elf.ref_dynamic;
4739 edir->elf.ref_regular |= eind->elf.ref_regular;
4740 edir->elf.ref_regular_nonweak |= eind->elf.ref_regular_nonweak;
4741 edir->elf.needs_plt |= eind->elf.needs_plt;
a345bc8d 4742 edir->elf.pointer_equality_needed |= eind->elf.pointer_equality_needed;
c79d6685 4743
d311bc8b
AM
4744 /* If we were called to copy over info for a weak sym, don't copy
4745 dyn_relocs, plt/got info, or dynindx. We used to copy dyn_relocs
4746 in order to simplify readonly_dynrelocs and save a field in the
4747 symbol hash entry, but that means dyn_relocs can't be used in any
4748 tests about a specific symbol, or affect other symbol flags which
4749 are then tested.
4750 Chain weakdefs so we can get from the weakdef back to an alias.
4751 The list is circular so that we don't need to use u.weakdef as
4752 well as this list to look at all aliases. */
4753 if (eind->elf.root.type != bfd_link_hash_indirect)
4754 {
4755 struct ppc_link_hash_entry *cur, *add, *next;
4756
4757 add = eind;
4758 do
4759 {
4760 cur = edir->weakref;
4761 if (cur != NULL)
4762 {
4763 do
4764 {
4765 /* We can be called twice for the same symbols.
4766 Don't make multiple loops. */
4767 if (cur == add)
4768 return;
4769 cur = cur->weakref;
4770 } while (cur != edir);
4771 }
4772 next = add->weakref;
4773 if (cur != add)
4774 {
4775 add->weakref = edir->weakref != NULL ? edir->weakref : edir;
4776 edir->weakref = add;
4777 }
4778 add = next;
4779 } while (add != NULL && add != eind);
4780 return;
4781 }
4782
411e1bfb 4783 /* Copy over any dynamic relocs we may have on the indirect sym. */
bbd7ec4a 4784 if (eind->dyn_relocs != NULL)
65f38f15 4785 {
bbd7ec4a
AM
4786 if (edir->dyn_relocs != NULL)
4787 {
6061a67d
AM
4788 struct elf_dyn_relocs **pp;
4789 struct elf_dyn_relocs *p;
bbd7ec4a 4790
fcfa13d2 4791 /* Add reloc counts against the indirect sym to the direct sym
bbd7ec4a
AM
4792 list. Merge any entries against the same section. */
4793 for (pp = &eind->dyn_relocs; (p = *pp) != NULL; )
4794 {
6061a67d 4795 struct elf_dyn_relocs *q;
bbd7ec4a
AM
4796
4797 for (q = edir->dyn_relocs; q != NULL; q = q->next)
4798 if (q->sec == p->sec)
4799 {
4800 q->pc_count += p->pc_count;
4801 q->count += p->count;
4802 *pp = p->next;
4803 break;
4804 }
4805 if (q == NULL)
4806 pp = &p->next;
4807 }
4808 *pp = edir->dyn_relocs;
4809 }
4810
65f38f15
AM
4811 edir->dyn_relocs = eind->dyn_relocs;
4812 eind->dyn_relocs = NULL;
4813 }
65f38f15 4814
81848ca0
AM
4815 /* Copy over got entries that we may have already seen to the
4816 symbol which just became indirect. */
411e1bfb
AM
4817 if (eind->elf.got.glist != NULL)
4818 {
4819 if (edir->elf.got.glist != NULL)
4820 {
4821 struct got_entry **entp;
4822 struct got_entry *ent;
4823
4824 for (entp = &eind->elf.got.glist; (ent = *entp) != NULL; )
4825 {
4826 struct got_entry *dent;
4827
4828 for (dent = edir->elf.got.glist; dent != NULL; dent = dent->next)
4829 if (dent->addend == ent->addend
e717da7e 4830 && dent->owner == ent->owner
411e1bfb
AM
4831 && dent->tls_type == ent->tls_type)
4832 {
4833 dent->got.refcount += ent->got.refcount;
4834 *entp = ent->next;
4835 break;
4836 }
4837 if (dent == NULL)
4838 entp = &ent->next;
4839 }
4840 *entp = edir->elf.got.glist;
4841 }
4842
4843 edir->elf.got.glist = eind->elf.got.glist;
4844 eind->elf.got.glist = NULL;
4845 }
4846
4847 /* And plt entries. */
40d16e0b 4848 move_plt_plist (eind, edir);
411e1bfb 4849
fcfa13d2 4850 if (eind->elf.dynindx != -1)
411e1bfb 4851 {
fcfa13d2
AM
4852 if (edir->elf.dynindx != -1)
4853 _bfd_elf_strtab_delref (elf_hash_table (info)->dynstr,
4854 edir->elf.dynstr_index);
411e1bfb
AM
4855 edir->elf.dynindx = eind->elf.dynindx;
4856 edir->elf.dynstr_index = eind->elf.dynstr_index;
4857 eind->elf.dynindx = -1;
4858 eind->elf.dynstr_index = 0;
4859 }
411e1bfb
AM
4860}
4861
8387904d
AM
4862/* Find the function descriptor hash entry from the given function code
4863 hash entry FH. Link the entries via their OH fields. */
4864
4865static struct ppc_link_hash_entry *
b31867b6 4866lookup_fdh (struct ppc_link_hash_entry *fh, struct ppc_link_hash_table *htab)
8387904d
AM
4867{
4868 struct ppc_link_hash_entry *fdh = fh->oh;
4869
4870 if (fdh == NULL)
4871 {
4872 const char *fd_name = fh->elf.root.root.string + 1;
4873
4874 fdh = (struct ppc_link_hash_entry *)
4875 elf_link_hash_lookup (&htab->elf, fd_name, FALSE, FALSE, FALSE);
b31867b6
AM
4876 if (fdh == NULL)
4877 return fdh;
4878
4879 fdh->is_func_descriptor = 1;
4880 fdh->oh = fh;
4881 fh->is_func = 1;
4882 fh->oh = fdh;
8387904d
AM
4883 }
4884
b31867b6 4885 return ppc_follow_link (fdh);
8387904d
AM
4886}
4887
bb700d78
AM
4888/* Make a fake function descriptor sym for the code sym FH. */
4889
4890static struct ppc_link_hash_entry *
4891make_fdh (struct bfd_link_info *info,
908b32fc 4892 struct ppc_link_hash_entry *fh)
bb700d78
AM
4893{
4894 bfd *abfd;
4895 asymbol *newsym;
4896 struct bfd_link_hash_entry *bh;
4897 struct ppc_link_hash_entry *fdh;
4898
4899 abfd = fh->elf.root.u.undef.abfd;
4900 newsym = bfd_make_empty_symbol (abfd);
4901 newsym->name = fh->elf.root.root.string + 1;
4902 newsym->section = bfd_und_section_ptr;
4903 newsym->value = 0;
908b32fc 4904 newsym->flags = BSF_WEAK;
bb700d78
AM
4905
4906 bh = NULL;
4907 if (!_bfd_generic_link_add_one_symbol (info, abfd, newsym->name,
4908 newsym->flags, newsym->section,
4909 newsym->value, NULL, FALSE, FALSE,
4910 &bh))
4911 return NULL;
4912
4913 fdh = (struct ppc_link_hash_entry *) bh;
4914 fdh->elf.non_elf = 0;
908b32fc
AM
4915 fdh->fake = 1;
4916 fdh->is_func_descriptor = 1;
4917 fdh->oh = fh;
4918 fh->is_func = 1;
4919 fh->oh = fdh;
bb700d78
AM
4920 return fdh;
4921}
4922
8387904d
AM
4923/* Fix function descriptor symbols defined in .opd sections to be
4924 function type. */
555cd476
AM
4925
4926static bfd_boolean
c16153ae 4927ppc64_elf_add_symbol_hook (bfd *ibfd,
e054468f 4928 struct bfd_link_info *info,
555cd476 4929 Elf_Internal_Sym *isym,
6911b7dc 4930 const char **name,
555cd476
AM
4931 flagword *flags ATTRIBUTE_UNUSED,
4932 asection **sec,
b53dfeb2 4933 bfd_vma *value)
555cd476 4934{
a43942db 4935 if (ELF_ST_TYPE (isym->st_info) == STT_GNU_IFUNC
f1885d1e
AM
4936 && (ibfd->flags & DYNAMIC) == 0
4937 && bfd_get_flavour (info->output_bfd) == bfd_target_elf_flavour)
a43942db 4938 elf_tdata (info->output_bfd)->has_gnu_symbols |= elf_gnu_symbol_ifunc;
f64b2e8d 4939
b53dfeb2 4940 if (*sec != NULL
f1885d1e 4941 && strcmp ((*sec)->name, ".opd") == 0)
b53dfeb2
AM
4942 {
4943 asection *code_sec;
4944
4945 if (!(ELF_ST_TYPE (isym->st_info) == STT_GNU_IFUNC
4946 || ELF_ST_TYPE (isym->st_info) == STT_FUNC))
4947 isym->st_info = ELF_ST_INFO (ELF_ST_BIND (isym->st_info), STT_FUNC);
4948
4949 /* If the symbol is a function defined in .opd, and the function
4950 code is in a discarded group, let it appear to be undefined. */
0e1862bb 4951 if (!bfd_link_relocatable (info)
b53dfeb2
AM
4952 && (*sec)->reloc_count != 0
4953 && opd_entry_value (*sec, *value, &code_sec, NULL,
4954 FALSE) != (bfd_vma) -1
4955 && discarded_section (code_sec))
4956 {
4957 *sec = bfd_und_section_ptr;
4958 isym->st_shndx = SHN_UNDEF;
4959 }
4960 }
dbd1e97e
AM
4961 else if (*sec != NULL
4962 && strcmp ((*sec)->name, ".toc") == 0
4963 && ELF_ST_TYPE (isym->st_info) == STT_OBJECT)
4964 {
4965 struct ppc_link_hash_table *htab = ppc_hash_table (info);
4966 if (htab != NULL)
4967 htab->params->object_in_toc = 1;
4968 }
433817dd 4969
6911b7dc
AM
4970 if ((STO_PPC64_LOCAL_MASK & isym->st_other) != 0)
4971 {
4972 if (abiversion (ibfd) == 0)
4973 set_abiversion (ibfd, 2);
4974 else if (abiversion (ibfd) == 1)
4975 {
4976 info->callbacks->einfo (_("%P: symbol '%s' has invalid st_other"
4977 " for ABI version 1\n"), name);
4978 bfd_set_error (bfd_error_bad_value);
4979 return FALSE;
4980 }
4981 }
4982
555cd476
AM
4983 return TRUE;
4984}
4985
6911b7dc
AM
4986/* Merge non-visibility st_other attributes: local entry point. */
4987
4988static void
4989ppc64_elf_merge_symbol_attribute (struct elf_link_hash_entry *h,
4990 const Elf_Internal_Sym *isym,
4991 bfd_boolean definition,
4992 bfd_boolean dynamic)
4993{
4994 if (definition && !dynamic)
4995 h->other = ((isym->st_other & ~ELF_ST_VISIBILITY (-1))
4996 | ELF_ST_VISIBILITY (h->other));
4997}
4998
8387904d 4999/* This function makes an old ABI object reference to ".bar" cause the
908b32fc
AM
5000 inclusion of a new ABI object archive that defines "bar".
5001 NAME is a symbol defined in an archive. Return a symbol in the hash
5002 table that might be satisfied by the archive symbols. */
8387904d
AM
5003
5004static struct elf_link_hash_entry *
5005ppc64_elf_archive_symbol_lookup (bfd *abfd,
5006 struct bfd_link_info *info,
5007 const char *name)
5008{
5009 struct elf_link_hash_entry *h;
5010 char *dot_name;
5011 size_t len;
5012
5013 h = _bfd_elf_archive_symbol_lookup (abfd, info, name);
908b32fc
AM
5014 if (h != NULL
5015 /* Don't return this sym if it is a fake function descriptor
5016 created by add_symbol_adjust. */
5017 && !(h->root.type == bfd_link_hash_undefweak
5018 && ((struct ppc_link_hash_entry *) h)->fake))
8387904d
AM
5019 return h;
5020
5021 if (name[0] == '.')
5022 return h;
5023
5024 len = strlen (name);
5025 dot_name = bfd_alloc (abfd, len + 2);
5026 if (dot_name == NULL)
5027 return (struct elf_link_hash_entry *) 0 - 1;
5028 dot_name[0] = '.';
5029 memcpy (dot_name + 1, name, len + 1);
5030 h = _bfd_elf_archive_symbol_lookup (abfd, info, dot_name);
5031 bfd_release (abfd, dot_name);
5032 return h;
5033}
5034
5035/* This function satisfies all old ABI object references to ".bar" if a
99877b66
AM
5036 new ABI object defines "bar". Well, at least, undefined dot symbols
5037 are made weak. This stops later archive searches from including an
5038 object if we already have a function descriptor definition. It also
35b0ce59
AM
5039 prevents the linker complaining about undefined symbols.
5040 We also check and correct mismatched symbol visibility here. The
5041 most restrictive visibility of the function descriptor and the
5042 function entry symbol is used. */
8387904d
AM
5043
5044static bfd_boolean
b3fac117 5045add_symbol_adjust (struct ppc_link_hash_entry *eh, struct bfd_link_info *info)
8387904d 5046{
8387904d
AM
5047 struct ppc_link_hash_table *htab;
5048 struct ppc_link_hash_entry *fdh;
5049
b3fac117 5050 if (eh->elf.root.type == bfd_link_hash_indirect)
8387904d
AM
5051 return TRUE;
5052
b3fac117
AM
5053 if (eh->elf.root.type == bfd_link_hash_warning)
5054 eh = (struct ppc_link_hash_entry *) eh->elf.root.u.i.link;
8387904d 5055
b3fac117
AM
5056 if (eh->elf.root.root.string[0] != '.')
5057 abort ();
8387904d 5058
b3fac117 5059 htab = ppc_hash_table (info);
4dfe6ac6
NC
5060 if (htab == NULL)
5061 return FALSE;
5062
b31867b6
AM
5063 fdh = lookup_fdh (eh, htab);
5064 if (fdh == NULL)
5065 {
0e1862bb 5066 if (!bfd_link_relocatable (info)
b31867b6
AM
5067 && (eh->elf.root.type == bfd_link_hash_undefined
5068 || eh->elf.root.type == bfd_link_hash_undefweak)
5069 && eh->elf.ref_regular)
5070 {
5071 /* Make an undefweak function descriptor sym, which is enough to
5072 pull in an --as-needed shared lib, but won't cause link
5073 errors. Archives are handled elsewhere. */
5074 fdh = make_fdh (info, eh);
5075 if (fdh == NULL)
5076 return FALSE;
5077 fdh->elf.ref_regular = 1;
5078 }
bb700d78 5079 }
b31867b6 5080 else
8387904d 5081 {
35b0ce59
AM
5082 unsigned entry_vis = ELF_ST_VISIBILITY (eh->elf.other) - 1;
5083 unsigned descr_vis = ELF_ST_VISIBILITY (fdh->elf.other) - 1;
5084 if (entry_vis < descr_vis)
5085 fdh->elf.other += entry_vis - descr_vis;
5086 else if (entry_vis > descr_vis)
5087 eh->elf.other += descr_vis - entry_vis;
5088
e87d886e
AM
5089 if ((fdh->elf.root.type == bfd_link_hash_defined
5090 || fdh->elf.root.type == bfd_link_hash_defweak)
5091 && eh->elf.root.type == bfd_link_hash_undefined)
35b0ce59
AM
5092 {
5093 eh->elf.root.type = bfd_link_hash_undefweak;
5094 eh->was_undefined = 1;
5095 htab->twiddled_syms = 1;
5096 }
8387904d 5097 }
99877b66 5098
8387904d
AM
5099 return TRUE;
5100}
5101
f6c7c3e8
AM
5102/* Set up opd section info and abiversion for IBFD, and process list
5103 of dot-symbols we made in link_hash_newfunc. */
b3fac117 5104
8387904d 5105static bfd_boolean
f6c7c3e8 5106ppc64_elf_before_check_relocs (bfd *ibfd, struct bfd_link_info *info)
8387904d 5107{
99877b66 5108 struct ppc_link_hash_table *htab;
b3fac117 5109 struct ppc_link_hash_entry **p, *eh;
459609d6 5110 asection *opd = bfd_get_section_by_name (ibfd, ".opd");
433817dd 5111
459609d6 5112 if (opd != NULL && opd->size != 0)
b3fac117 5113 {
459609d6
AM
5114 if (abiversion (ibfd) == 0)
5115 set_abiversion (ibfd, 1);
8a2058b5 5116 else if (abiversion (ibfd) >= 2)
f6c7c3e8 5117 {
459609d6
AM
5118 info->callbacks->einfo (_("%P: %B .opd not allowed in ABI"
5119 " version %d\n"),
5120 ibfd, abiversion (ibfd));
5121 bfd_set_error (bfd_error_bad_value);
5122 return FALSE;
f6c7c3e8
AM
5123 }
5124
459609d6
AM
5125 if ((ibfd->flags & DYNAMIC) == 0
5126 && (opd->flags & SEC_RELOC) != 0
5127 && opd->reloc_count != 0
5128 && !bfd_is_abs_section (opd->output_section))
b3fac117 5129 {
459609d6
AM
5130 /* Garbage collection needs some extra help with .opd sections.
5131 We don't want to necessarily keep everything referenced by
5132 relocs in .opd, as that would keep all functions. Instead,
5133 if we reference an .opd symbol (a function descriptor), we
5134 want to keep the function code symbol's section. This is
5135 easy for global symbols, but for local syms we need to keep
5136 information about the associated function section. */
5137 bfd_size_type amt;
5138 asection **opd_sym_map;
5139
51aecdc5 5140 amt = OPD_NDX (opd->size) * sizeof (*opd_sym_map);
459609d6
AM
5141 opd_sym_map = bfd_zalloc (ibfd, amt);
5142 if (opd_sym_map == NULL)
b3fac117 5143 return FALSE;
459609d6
AM
5144 ppc64_elf_section_data (opd)->u.opd.func_sec = opd_sym_map;
5145 BFD_ASSERT (ppc64_elf_section_data (opd)->sec_type == sec_normal);
5146 ppc64_elf_section_data (opd)->sec_type = sec_opd;
b3fac117
AM
5147 }
5148 }
5149
459609d6
AM
5150 if (!is_ppc64_elf (info->output_bfd))
5151 return TRUE;
5152 htab = ppc_hash_table (info);
5153 if (htab == NULL)
5154 return FALSE;
5155
5156 /* For input files without an explicit abiversion in e_flags
5157 we should have flagged any with symbol st_other bits set
5158 as ELFv1 and above flagged those with .opd as ELFv2.
5159 Set the output abiversion if not yet set, and for any input
5160 still ambiguous, take its abiversion from the output.
5161 Differences in ABI are reported later. */
5162 if (abiversion (info->output_bfd) == 0)
5163 set_abiversion (info->output_bfd, abiversion (ibfd));
5164 else if (abiversion (ibfd) == 0)
5165 set_abiversion (ibfd, abiversion (info->output_bfd));
5166
5167 p = &htab->dot_syms;
5168 while ((eh = *p) != NULL)
5169 {
5170 *p = NULL;
5171 if (&eh->elf == htab->elf.hgot)
5172 ;
5173 else if (htab->elf.hgot == NULL
5174 && strcmp (eh->elf.root.root.string, ".TOC.") == 0)
5175 htab->elf.hgot = &eh->elf;
5176 else if (!add_symbol_adjust (eh, info))
5177 return FALSE;
5178 p = &eh->u.next_dot_sym;
5179 }
5180
b3fac117
AM
5181 /* Clear the list for non-ppc64 input files. */
5182 p = &htab->dot_syms;
5183 while ((eh = *p) != NULL)
5184 {
5185 *p = NULL;
5186 p = &eh->u.next_dot_sym;
5187 }
99877b66
AM
5188
5189 /* We need to fix the undefs list for any syms we have twiddled to
57e7d118 5190 undefweak. */
99877b66
AM
5191 if (htab->twiddled_syms)
5192 {
77cfaee6 5193 bfd_link_repair_undef_list (&htab->elf.root);
99877b66
AM
5194 htab->twiddled_syms = 0;
5195 }
b3fac117 5196 return TRUE;
8387904d
AM
5197}
5198
97fed1c9
JJ
5199/* Undo hash table changes when an --as-needed input file is determined
5200 not to be needed. */
5201
5202static bfd_boolean
e5034e59
AM
5203ppc64_elf_notice_as_needed (bfd *ibfd,
5204 struct bfd_link_info *info,
5205 enum notice_asneeded_action act)
97fed1c9 5206{
e5034e59
AM
5207 if (act == notice_not_needed)
5208 {
5209 struct ppc_link_hash_table *htab = ppc_hash_table (info);
4dfe6ac6 5210
e5034e59
AM
5211 if (htab == NULL)
5212 return FALSE;
4dfe6ac6 5213
e5034e59
AM
5214 htab->dot_syms = NULL;
5215 }
5216 return _bfd_elf_notice_as_needed (ibfd, info, act);
97fed1c9
JJ
5217}
5218
aa374f67
AM
5219/* If --just-symbols against a final linked binary, then assume we need
5220 toc adjusting stubs when calling functions defined there. */
5221
5222static void
5223ppc64_elf_link_just_syms (asection *sec, struct bfd_link_info *info)
5224{
5225 if ((sec->flags & SEC_CODE) != 0
5226 && (sec->owner->flags & (EXEC_P | DYNAMIC)) != 0
5227 && is_ppc64_elf (sec->owner))
5228 {
2c3f079f
AM
5229 if (abiversion (sec->owner) >= 2
5230 || bfd_get_section_by_name (sec->owner, ".opd") != NULL)
aa374f67
AM
5231 sec->has_toc_reloc = 1;
5232 }
5233 _bfd_elf_link_just_syms (sec, info);
5234}
5235
e054468f 5236static struct plt_entry **
4ce794b7
AM
5237update_local_sym_info (bfd *abfd, Elf_Internal_Shdr *symtab_hdr,
5238 unsigned long r_symndx, bfd_vma r_addend, int tls_type)
411e1bfb
AM
5239{
5240 struct got_entry **local_got_ents = elf_local_got_ents (abfd);
e054468f 5241 struct plt_entry **local_plt;
f961d9dd 5242 unsigned char *local_got_tls_masks;
411e1bfb
AM
5243
5244 if (local_got_ents == NULL)
5245 {
5246 bfd_size_type size = symtab_hdr->sh_info;
5247
e054468f
AM
5248 size *= (sizeof (*local_got_ents)
5249 + sizeof (*local_plt)
5250 + sizeof (*local_got_tls_masks));
4ce794b7 5251 local_got_ents = bfd_zalloc (abfd, size);
411e1bfb 5252 if (local_got_ents == NULL)
e054468f 5253 return NULL;
411e1bfb
AM
5254 elf_local_got_ents (abfd) = local_got_ents;
5255 }
5256
e054468f 5257 if ((tls_type & (PLT_IFUNC | TLS_EXPLICIT)) == 0)
411e1bfb
AM
5258 {
5259 struct got_entry *ent;
5260
5261 for (ent = local_got_ents[r_symndx]; ent != NULL; ent = ent->next)
e717da7e
AM
5262 if (ent->addend == r_addend
5263 && ent->owner == abfd
5264 && ent->tls_type == tls_type)
411e1bfb
AM
5265 break;
5266 if (ent == NULL)
5267 {
5268 bfd_size_type amt = sizeof (*ent);
4ce794b7 5269 ent = bfd_alloc (abfd, amt);
411e1bfb
AM
5270 if (ent == NULL)
5271 return FALSE;
5272 ent->next = local_got_ents[r_symndx];
5273 ent->addend = r_addend;
e717da7e 5274 ent->owner = abfd;
411e1bfb 5275 ent->tls_type = tls_type;
927be08e 5276 ent->is_indirect = FALSE;
411e1bfb
AM
5277 ent->got.refcount = 0;
5278 local_got_ents[r_symndx] = ent;
5279 }
5280 ent->got.refcount += 1;
5281 }
5282
e054468f 5283 local_plt = (struct plt_entry **) (local_got_ents + symtab_hdr->sh_info);
f961d9dd 5284 local_got_tls_masks = (unsigned char *) (local_plt + symtab_hdr->sh_info);
e7b938ca 5285 local_got_tls_masks[r_symndx] |= tls_type;
e054468f
AM
5286
5287 return local_plt + r_symndx;
65f38f15
AM
5288}
5289
411e1bfb 5290static bfd_boolean
e054468f 5291update_plt_info (bfd *abfd, struct plt_entry **plist, bfd_vma addend)
1e2f5b6e 5292{
411e1bfb 5293 struct plt_entry *ent;
1e2f5b6e 5294
e054468f 5295 for (ent = *plist; ent != NULL; ent = ent->next)
411e1bfb
AM
5296 if (ent->addend == addend)
5297 break;
5298 if (ent == NULL)
1e2f5b6e 5299 {
411e1bfb 5300 bfd_size_type amt = sizeof (*ent);
4ce794b7 5301 ent = bfd_alloc (abfd, amt);
411e1bfb
AM
5302 if (ent == NULL)
5303 return FALSE;
e054468f 5304 ent->next = *plist;
411e1bfb
AM
5305 ent->addend = addend;
5306 ent->plt.refcount = 0;
e054468f 5307 *plist = ent;
1e2f5b6e 5308 }
411e1bfb 5309 ent->plt.refcount += 1;
b34976b6 5310 return TRUE;
1e2f5b6e
AM
5311}
5312
e054468f
AM
5313static bfd_boolean
5314is_branch_reloc (enum elf_ppc64_reloc_type r_type)
5315{
5316 return (r_type == R_PPC64_REL24
5317 || r_type == R_PPC64_REL14
5318 || r_type == R_PPC64_REL14_BRTAKEN
5319 || r_type == R_PPC64_REL14_BRNTAKEN
5320 || r_type == R_PPC64_ADDR24
5321 || r_type == R_PPC64_ADDR14
5322 || r_type == R_PPC64_ADDR14_BRTAKEN
5323 || r_type == R_PPC64_ADDR14_BRNTAKEN);
5324}
5325
5bd4f169 5326/* Look through the relocs for a section during the first phase, and
65f38f15 5327 calculate needed space in the global offset table, procedure
5d1634d7 5328 linkage table, and dynamic reloc sections. */
5bd4f169 5329
b34976b6 5330static bfd_boolean
4ce794b7
AM
5331ppc64_elf_check_relocs (bfd *abfd, struct bfd_link_info *info,
5332 asection *sec, const Elf_Internal_Rela *relocs)
5bd4f169 5333{
65f38f15 5334 struct ppc_link_hash_table *htab;
5bd4f169 5335 Elf_Internal_Shdr *symtab_hdr;
c7e2358a 5336 struct elf_link_hash_entry **sym_hashes;
5bd4f169
AM
5337 const Elf_Internal_Rela *rel;
5338 const Elf_Internal_Rela *rel_end;
5bd4f169 5339 asection *sreloc;
1e2f5b6e 5340 asection **opd_sym_map;
3a71aa26 5341 struct elf_link_hash_entry *tga, *dottga;
5bd4f169 5342
0e1862bb 5343 if (bfd_link_relocatable (info))
b34976b6 5344 return TRUE;
5bd4f169 5345
680a3378
AM
5346 /* Don't do anything special with non-loaded, non-alloced sections.
5347 In particular, any relocs in such sections should not affect GOT
5348 and PLT reference counting (ie. we don't allow them to create GOT
5349 or PLT entries), there's no possibility or desire to optimize TLS
5350 relocs, and there's not much point in propagating relocs to shared
5351 libs that the dynamic linker won't relocate. */
5352 if ((sec->flags & SEC_ALLOC) == 0)
5353 return TRUE;
5354
0c8d6e5c 5355 BFD_ASSERT (is_ppc64_elf (abfd));
0ffa91dd 5356
65f38f15 5357 htab = ppc_hash_table (info);
4dfe6ac6
NC
5358 if (htab == NULL)
5359 return FALSE;
5360
3a71aa26
AM
5361 tga = elf_link_hash_lookup (&htab->elf, "__tls_get_addr",
5362 FALSE, FALSE, TRUE);
5363 dottga = elf_link_hash_lookup (&htab->elf, ".__tls_get_addr",
5364 FALSE, FALSE, TRUE);
0ffa91dd 5365 symtab_hdr = &elf_symtab_hdr (abfd);
5bd4f169 5366 sym_hashes = elf_sym_hashes (abfd);
5bd4f169 5367 sreloc = NULL;
1e2f5b6e 5368 opd_sym_map = NULL;
f6c7c3e8
AM
5369 if (ppc64_elf_section_data (sec) != NULL
5370 && ppc64_elf_section_data (sec)->sec_type == sec_opd)
5371 opd_sym_map = ppc64_elf_section_data (sec)->u.opd.func_sec;
5bd4f169
AM
5372
5373 rel_end = relocs + sec->reloc_count;
5374 for (rel = relocs; rel < rel_end; rel++)
5375 {
5376 unsigned long r_symndx;
5377 struct elf_link_hash_entry *h;
04c9666a 5378 enum elf_ppc64_reloc_type r_type;
727fc41e 5379 int tls_type;
7c8fe5c4 5380 struct _ppc64_elf_section_data *ppc64_sec;
cbf95972 5381 struct plt_entry **ifunc, **plt_list;
5bd4f169
AM
5382
5383 r_symndx = ELF64_R_SYM (rel->r_info);
5384 if (r_symndx < symtab_hdr->sh_info)
5385 h = NULL;
5386 else
973a3492
L
5387 {
5388 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
b31867b6 5389 h = elf_follow_link (h);
81fbe831
AM
5390
5391 /* PR15323, ref flags aren't set for references in the same
5392 object. */
5393 h->root.non_ir_ref = 1;
1c865ab2
AM
5394
5395 if (h == htab->elf.hgot)
5396 sec->has_toc_reloc = 1;
973a3492 5397 }
5bd4f169 5398
727fc41e 5399 tls_type = 0;
e054468f 5400 ifunc = NULL;
25f23106
AM
5401 if (h != NULL)
5402 {
5403 if (h->type == STT_GNU_IFUNC)
5404 {
5405 h->needs_plt = 1;
5406 ifunc = &h->plt.plist;
5407 }
5408 }
5409 else
5410 {
5411 Elf_Internal_Sym *isym = bfd_sym_from_r_symndx (&htab->sym_cache,
5412 abfd, r_symndx);
5413 if (isym == NULL)
5414 return FALSE;
5415
5416 if (ELF_ST_TYPE (isym->st_info) == STT_GNU_IFUNC)
5417 {
5418 ifunc = update_local_sym_info (abfd, symtab_hdr, r_symndx,
5419 rel->r_addend, PLT_IFUNC);
5420 if (ifunc == NULL)
5421 return FALSE;
5422 }
5423 }
727fc41e 5424
cbf95972 5425 r_type = ELF64_R_TYPE (rel->r_info);
a33d1f77 5426 switch (r_type)
5bd4f169 5427 {
727fc41e
AM
5428 case R_PPC64_TLSGD:
5429 case R_PPC64_TLSLD:
5430 /* These special tls relocs tie a call to __tls_get_addr with
5431 its parameter symbol. */
5432 break;
5433
411e1bfb
AM
5434 case R_PPC64_GOT_TLSLD16:
5435 case R_PPC64_GOT_TLSLD16_LO:
5436 case R_PPC64_GOT_TLSLD16_HI:
5437 case R_PPC64_GOT_TLSLD16_HA:
951fd09b 5438 tls_type = TLS_TLS | TLS_LD;
411e1bfb
AM
5439 goto dogottls;
5440
5441 case R_PPC64_GOT_TLSGD16:
5442 case R_PPC64_GOT_TLSGD16_LO:
5443 case R_PPC64_GOT_TLSGD16_HI:
5444 case R_PPC64_GOT_TLSGD16_HA:
951fd09b 5445 tls_type = TLS_TLS | TLS_GD;
411e1bfb
AM
5446 goto dogottls;
5447
5448 case R_PPC64_GOT_TPREL16_DS:
5449 case R_PPC64_GOT_TPREL16_LO_DS:
5450 case R_PPC64_GOT_TPREL16_HI:
5451 case R_PPC64_GOT_TPREL16_HA:
0e1862bb 5452 if (bfd_link_pic (info))
411e1bfb
AM
5453 info->flags |= DF_STATIC_TLS;
5454 tls_type = TLS_TLS | TLS_TPREL;
5455 goto dogottls;
5456
5457 case R_PPC64_GOT_DTPREL16_DS:
5458 case R_PPC64_GOT_DTPREL16_LO_DS:
5459 case R_PPC64_GOT_DTPREL16_HI:
5460 case R_PPC64_GOT_DTPREL16_HA:
5461 tls_type = TLS_TLS | TLS_DTPREL;
5462 dogottls:
5463 sec->has_tls_reloc = 1;
5464 /* Fall thru */
5465
5bd4f169 5466 case R_PPC64_GOT16:
5bd4f169 5467 case R_PPC64_GOT16_DS:
65f38f15
AM
5468 case R_PPC64_GOT16_HA:
5469 case R_PPC64_GOT16_HI:
5470 case R_PPC64_GOT16_LO:
5bd4f169 5471 case R_PPC64_GOT16_LO_DS:
65f38f15 5472 /* This symbol requires a global offset table entry. */
4c52953f 5473 sec->has_toc_reloc = 1;
33c0ec9d
AM
5474 if (r_type == R_PPC64_GOT_TLSLD16
5475 || r_type == R_PPC64_GOT_TLSGD16
5476 || r_type == R_PPC64_GOT_TPREL16_DS
5477 || r_type == R_PPC64_GOT_DTPREL16_DS
5478 || r_type == R_PPC64_GOT16
5479 || r_type == R_PPC64_GOT16_DS)
5480 {
5481 htab->do_multi_toc = 1;
d77c8a4b 5482 ppc64_elf_tdata (abfd)->has_small_toc_reloc = 1;
33c0ec9d
AM
5483 }
5484
e717da7e
AM
5485 if (ppc64_elf_tdata (abfd)->got == NULL
5486 && !create_got_section (abfd, info))
b34976b6 5487 return FALSE;
5bd4f169
AM
5488
5489 if (h != NULL)
5490 {
411e1bfb
AM
5491 struct ppc_link_hash_entry *eh;
5492 struct got_entry *ent;
65f38f15 5493
411e1bfb
AM
5494 eh = (struct ppc_link_hash_entry *) h;
5495 for (ent = eh->elf.got.glist; ent != NULL; ent = ent->next)
5496 if (ent->addend == rel->r_addend
e717da7e 5497 && ent->owner == abfd
411e1bfb
AM
5498 && ent->tls_type == tls_type)
5499 break;
5500 if (ent == NULL)
5bd4f169 5501 {
411e1bfb 5502 bfd_size_type amt = sizeof (*ent);
4ce794b7 5503 ent = bfd_alloc (abfd, amt);
411e1bfb 5504 if (ent == NULL)
b34976b6 5505 return FALSE;
411e1bfb
AM
5506 ent->next = eh->elf.got.glist;
5507 ent->addend = rel->r_addend;
e717da7e 5508 ent->owner = abfd;
411e1bfb 5509 ent->tls_type = tls_type;
927be08e 5510 ent->is_indirect = FALSE;
411e1bfb
AM
5511 ent->got.refcount = 0;
5512 eh->elf.got.glist = ent;
5bd4f169 5513 }
411e1bfb 5514 ent->got.refcount += 1;
e7b938ca 5515 eh->tls_mask |= tls_type;
5bd4f169 5516 }
411e1bfb
AM
5517 else
5518 /* This is a global offset table entry for a local symbol. */
5519 if (!update_local_sym_info (abfd, symtab_hdr, r_symndx,
5520 rel->r_addend, tls_type))
5521 return FALSE;
a345bc8d
AM
5522
5523 /* We may also need a plt entry if the symbol turns out to be
5524 an ifunc. */
0e1862bb 5525 if (h != NULL && !bfd_link_pic (info) && abiversion (abfd) != 1)
a345bc8d
AM
5526 {
5527 if (!update_plt_info (abfd, &h->plt.plist, rel->r_addend))
5528 return FALSE;
5529 }
5bd4f169
AM
5530 break;
5531
5bd4f169 5532 case R_PPC64_PLT16_HA:
65f38f15
AM
5533 case R_PPC64_PLT16_HI:
5534 case R_PPC64_PLT16_LO:
5535 case R_PPC64_PLT32:
5536 case R_PPC64_PLT64:
cbf95972
AM
5537 /* This symbol requires a procedure linkage table entry. */
5538 plt_list = ifunc;
5539 if (h != NULL)
e054468f 5540 {
e054468f
AM
5541 h->needs_plt = 1;
5542 if (h->root.root.string[0] == '.'
5543 && h->root.root.string[1] != '\0')
5544 ((struct ppc_link_hash_entry *) h)->is_func = 1;
cbf95972
AM
5545 plt_list = &h->plt.plist;
5546 }
5547 if (plt_list == NULL)
5548 {
5549 /* It does not make sense to have a procedure linkage
5550 table entry for a non-ifunc local symbol. */
5551 info->callbacks->einfo
5552 (_("%P: %H: %s reloc against local symbol\n"),
5553 abfd, sec, rel->r_offset,
5554 ppc64_elf_howto_table[r_type]->name);
5555 bfd_set_error (bfd_error_bad_value);
5556 return FALSE;
e054468f 5557 }
cbf95972
AM
5558 if (!update_plt_info (abfd, plt_list, rel->r_addend))
5559 return FALSE;
5bd4f169
AM
5560 break;
5561
5562 /* The following relocations don't need to propagate the
5563 relocation if linking a shared object since they are
5564 section relative. */
5565 case R_PPC64_SECTOFF:
5566 case R_PPC64_SECTOFF_LO:
5567 case R_PPC64_SECTOFF_HI:
5568 case R_PPC64_SECTOFF_HA:
5569 case R_PPC64_SECTOFF_DS:
5570 case R_PPC64_SECTOFF_LO_DS:
411e1bfb
AM
5571 case R_PPC64_DTPREL16:
5572 case R_PPC64_DTPREL16_LO:
5573 case R_PPC64_DTPREL16_HI:
5574 case R_PPC64_DTPREL16_HA:
5575 case R_PPC64_DTPREL16_DS:
5576 case R_PPC64_DTPREL16_LO_DS:
f9c6b907
AM
5577 case R_PPC64_DTPREL16_HIGH:
5578 case R_PPC64_DTPREL16_HIGHA:
411e1bfb
AM
5579 case R_PPC64_DTPREL16_HIGHER:
5580 case R_PPC64_DTPREL16_HIGHERA:
5581 case R_PPC64_DTPREL16_HIGHEST:
5582 case R_PPC64_DTPREL16_HIGHESTA:
5bd4f169
AM
5583 break;
5584
ad8e1ba5 5585 /* Nor do these. */
25f23106
AM
5586 case R_PPC64_REL16:
5587 case R_PPC64_REL16_LO:
5588 case R_PPC64_REL16_HI:
5589 case R_PPC64_REL16_HA:
a680de9a 5590 case R_PPC64_REL16DX_HA:
25f23106
AM
5591 break;
5592
45965137
AM
5593 /* Not supported as a dynamic relocation. */
5594 case R_PPC64_ADDR64_LOCAL:
0e1862bb 5595 if (bfd_link_pic (info))
45965137
AM
5596 {
5597 if (!ppc64_elf_howto_table[R_PPC64_ADDR32])
5598 ppc_howto_init ();
5599 info->callbacks->einfo (_("%P: %H: %s reloc unsupported "
5600 "in shared libraries and PIEs.\n"),
5601 abfd, sec, rel->r_offset,
5602 ppc64_elf_howto_table[r_type]->name);
5603 bfd_set_error (bfd_error_bad_value);
5604 return FALSE;
5605 }
5606 break;
5607
ad8e1ba5 5608 case R_PPC64_TOC16:
33c0ec9d
AM
5609 case R_PPC64_TOC16_DS:
5610 htab->do_multi_toc = 1;
d77c8a4b 5611 ppc64_elf_tdata (abfd)->has_small_toc_reloc = 1;
ad8e1ba5
AM
5612 case R_PPC64_TOC16_LO:
5613 case R_PPC64_TOC16_HI:
5614 case R_PPC64_TOC16_HA:
ad8e1ba5 5615 case R_PPC64_TOC16_LO_DS:
4c52953f 5616 sec->has_toc_reloc = 1;
ad8e1ba5
AM
5617 break;
5618
006589cf
AM
5619 /* Marker reloc. */
5620 case R_PPC64_ENTRY:
5621 break;
5622
5bd4f169
AM
5623 /* This relocation describes the C++ object vtable hierarchy.
5624 Reconstruct it for later use during GC. */
5625 case R_PPC64_GNU_VTINHERIT:
c152c796 5626 if (!bfd_elf_gc_record_vtinherit (abfd, sec, h, rel->r_offset))
b34976b6 5627 return FALSE;
5bd4f169
AM
5628 break;
5629
5630 /* This relocation describes which C++ vtable entries are actually
5631 used. Record for later use during GC. */
5632 case R_PPC64_GNU_VTENTRY:
d17e0c6e
JB
5633 BFD_ASSERT (h != NULL);
5634 if (h != NULL
5635 && !bfd_elf_gc_record_vtentry (abfd, sec, h, rel->r_addend))
b34976b6 5636 return FALSE;
5bd4f169
AM
5637 break;
5638
721956f4
AM
5639 case R_PPC64_REL14:
5640 case R_PPC64_REL14_BRTAKEN:
5641 case R_PPC64_REL14_BRNTAKEN:
220c76dd
AM
5642 {
5643 asection *dest = NULL;
5644
5645 /* Heuristic: If jumping outside our section, chances are
5646 we are going to need a stub. */
5647 if (h != NULL)
5648 {
5649 /* If the sym is weak it may be overridden later, so
5650 don't assume we know where a weak sym lives. */
5651 if (h->root.type == bfd_link_hash_defined)
5652 dest = h->root.u.def.section;
5653 }
5654 else
87d72d41
AM
5655 {
5656 Elf_Internal_Sym *isym;
5657
5658 isym = bfd_sym_from_r_symndx (&htab->sym_cache,
5659 abfd, r_symndx);
5660 if (isym == NULL)
5661 return FALSE;
5662
5663 dest = bfd_section_from_elf_index (abfd, isym->st_shndx);
5664 }
5665
220c76dd 5666 if (dest != sec)
7c8fe5c4 5667 ppc64_elf_section_data (sec)->has_14bit_branch = 1;
220c76dd 5668 }
721956f4
AM
5669 /* Fall through. */
5670
5d1634d7 5671 case R_PPC64_REL24:
cbf95972
AM
5672 plt_list = ifunc;
5673 if (h != NULL)
5d1634d7 5674 {
e054468f
AM
5675 h->needs_plt = 1;
5676 if (h->root.root.string[0] == '.'
5677 && h->root.root.string[1] != '\0')
5678 ((struct ppc_link_hash_entry *) h)->is_func = 1;
cbf95972 5679
3a71aa26 5680 if (h == tga || h == dottga)
cbf95972
AM
5681 {
5682 sec->has_tls_reloc = 1;
5683 if (rel != relocs
5684 && (ELF64_R_TYPE (rel[-1].r_info) == R_PPC64_TLSGD
5685 || ELF64_R_TYPE (rel[-1].r_info) == R_PPC64_TLSLD))
5686 /* We have a new-style __tls_get_addr call with
5687 a marker reloc. */
5688 ;
5689 else
5690 /* Mark this section as having an old-style call. */
5691 sec->has_tls_get_addr_call = 1;
5692 }
5693 plt_list = &h->plt.plist;
411e1bfb 5694 }
cbf95972
AM
5695
5696 /* We may need a .plt entry if the function this reloc
5697 refers to is in a shared lib. */
5698 if (plt_list
5699 && !update_plt_info (abfd, plt_list, rel->r_addend))
5700 return FALSE;
411e1bfb
AM
5701 break;
5702
cbf95972
AM
5703 case R_PPC64_ADDR14:
5704 case R_PPC64_ADDR14_BRNTAKEN:
5705 case R_PPC64_ADDR14_BRTAKEN:
5706 case R_PPC64_ADDR24:
5707 goto dodyn;
5708
411e1bfb
AM
5709 case R_PPC64_TPREL64:
5710 tls_type = TLS_EXPLICIT | TLS_TLS | TLS_TPREL;
0e1862bb 5711 if (bfd_link_pic (info))
411e1bfb
AM
5712 info->flags |= DF_STATIC_TLS;
5713 goto dotlstoc;
5714
5715 case R_PPC64_DTPMOD64:
5716 if (rel + 1 < rel_end
5717 && rel[1].r_info == ELF64_R_INFO (r_symndx, R_PPC64_DTPREL64)
5718 && rel[1].r_offset == rel->r_offset + 8)
951fd09b 5719 tls_type = TLS_EXPLICIT | TLS_TLS | TLS_GD;
411e1bfb 5720 else
951fd09b 5721 tls_type = TLS_EXPLICIT | TLS_TLS | TLS_LD;
411e1bfb
AM
5722 goto dotlstoc;
5723
5724 case R_PPC64_DTPREL64:
5725 tls_type = TLS_EXPLICIT | TLS_TLS | TLS_DTPREL;
5726 if (rel != relocs
5727 && rel[-1].r_info == ELF64_R_INFO (r_symndx, R_PPC64_DTPMOD64)
5728 && rel[-1].r_offset == rel->r_offset - 8)
5729 /* This is the second reloc of a dtpmod, dtprel pair.
5730 Don't mark with TLS_DTPREL. */
5731 goto dodyn;
5732
5733 dotlstoc:
5734 sec->has_tls_reloc = 1;
5735 if (h != NULL)
5736 {
5737 struct ppc_link_hash_entry *eh;
5738 eh = (struct ppc_link_hash_entry *) h;
e7b938ca 5739 eh->tls_mask |= tls_type;
411e1bfb
AM
5740 }
5741 else
5742 if (!update_local_sym_info (abfd, symtab_hdr, r_symndx,
5743 rel->r_addend, tls_type))
5744 return FALSE;
5745
7c8fe5c4
AM
5746 ppc64_sec = ppc64_elf_section_data (sec);
5747 if (ppc64_sec->sec_type != sec_toc)
411e1bfb 5748 {
3a71aa26
AM
5749 bfd_size_type amt;
5750
e7b938ca 5751 /* One extra to simplify get_tls_mask. */
3a71aa26
AM
5752 amt = sec->size * sizeof (unsigned) / 8 + sizeof (unsigned);
5753 ppc64_sec->u.toc.symndx = bfd_zalloc (abfd, amt);
5754 if (ppc64_sec->u.toc.symndx == NULL)
5755 return FALSE;
5756 amt = sec->size * sizeof (bfd_vma) / 8;
5757 ppc64_sec->u.toc.add = bfd_zalloc (abfd, amt);
5758 if (ppc64_sec->u.toc.add == NULL)
411e1bfb 5759 return FALSE;
7c8fe5c4
AM
5760 BFD_ASSERT (ppc64_sec->sec_type == sec_normal);
5761 ppc64_sec->sec_type = sec_toc;
411e1bfb
AM
5762 }
5763 BFD_ASSERT (rel->r_offset % 8 == 0);
3a71aa26
AM
5764 ppc64_sec->u.toc.symndx[rel->r_offset / 8] = r_symndx;
5765 ppc64_sec->u.toc.add[rel->r_offset / 8] = rel->r_addend;
951fd09b
AM
5766
5767 /* Mark the second slot of a GD or LD entry.
5768 -1 to indicate GD and -2 to indicate LD. */
5769 if (tls_type == (TLS_EXPLICIT | TLS_TLS | TLS_GD))
3a71aa26 5770 ppc64_sec->u.toc.symndx[rel->r_offset / 8 + 1] = -1;
951fd09b 5771 else if (tls_type == (TLS_EXPLICIT | TLS_TLS | TLS_LD))
3a71aa26 5772 ppc64_sec->u.toc.symndx[rel->r_offset / 8 + 1] = -2;
411e1bfb
AM
5773 goto dodyn;
5774
5775 case R_PPC64_TPREL16:
5776 case R_PPC64_TPREL16_LO:
5777 case R_PPC64_TPREL16_HI:
5778 case R_PPC64_TPREL16_HA:
5779 case R_PPC64_TPREL16_DS:
5780 case R_PPC64_TPREL16_LO_DS:
f9c6b907
AM
5781 case R_PPC64_TPREL16_HIGH:
5782 case R_PPC64_TPREL16_HIGHA:
411e1bfb
AM
5783 case R_PPC64_TPREL16_HIGHER:
5784 case R_PPC64_TPREL16_HIGHERA:
5785 case R_PPC64_TPREL16_HIGHEST:
5786 case R_PPC64_TPREL16_HIGHESTA:
0e1862bb 5787 if (bfd_link_pic (info))
411e1bfb 5788 {
afb93314 5789 info->flags |= DF_STATIC_TLS;
411e1bfb 5790 goto dodyn;
5d1634d7
AM
5791 }
5792 break;
5793
e86ce104 5794 case R_PPC64_ADDR64:
1e2f5b6e 5795 if (opd_sym_map != NULL
1e2f5b6e 5796 && rel + 1 < rel_end
4ce794b7 5797 && ELF64_R_TYPE ((rel + 1)->r_info) == R_PPC64_TOC)
1e2f5b6e 5798 {
8387904d
AM
5799 if (h != NULL)
5800 {
5801 if (h->root.root.string[0] == '.'
5802 && h->root.root.string[1] != 0
b31867b6 5803 && lookup_fdh ((struct ppc_link_hash_entry *) h, htab))
8387904d
AM
5804 ;
5805 else
5806 ((struct ppc_link_hash_entry *) h)->is_func = 1;
5807 }
5808 else
5809 {
5810 asection *s;
87d72d41 5811 Elf_Internal_Sym *isym;
1e2f5b6e 5812
87d72d41
AM
5813 isym = bfd_sym_from_r_symndx (&htab->sym_cache,
5814 abfd, r_symndx);
5815 if (isym == NULL)
8387904d 5816 return FALSE;
87d72d41
AM
5817
5818 s = bfd_section_from_elf_index (abfd, isym->st_shndx);
5819 if (s != NULL && s != sec)
51aecdc5 5820 opd_sym_map[OPD_NDX (rel->r_offset)] = s;
8387904d 5821 }
1e2f5b6e 5822 }
e86ce104
AM
5823 /* Fall through. */
5824
65f38f15
AM
5825 case R_PPC64_ADDR16:
5826 case R_PPC64_ADDR16_DS:
5827 case R_PPC64_ADDR16_HA:
5828 case R_PPC64_ADDR16_HI:
f9c6b907
AM
5829 case R_PPC64_ADDR16_HIGH:
5830 case R_PPC64_ADDR16_HIGHA:
65f38f15
AM
5831 case R_PPC64_ADDR16_HIGHER:
5832 case R_PPC64_ADDR16_HIGHERA:
5833 case R_PPC64_ADDR16_HIGHEST:
5834 case R_PPC64_ADDR16_HIGHESTA:
5835 case R_PPC64_ADDR16_LO:
5836 case R_PPC64_ADDR16_LO_DS:
0e1862bb 5837 if (h != NULL && !bfd_link_pic (info) && abiversion (abfd) != 1
a345bc8d
AM
5838 && rel->r_addend == 0)
5839 {
5840 /* We may need a .plt entry if this reloc refers to a
5841 function in a shared lib. */
5842 if (!update_plt_info (abfd, &h->plt.plist, rel->r_addend))
5843 return FALSE;
5844 h->pointer_equality_needed = 1;
5845 }
5846 /* Fall through. */
5847
5848 case R_PPC64_REL30:
5849 case R_PPC64_REL32:
5850 case R_PPC64_REL64:
65f38f15 5851 case R_PPC64_ADDR32:
65f38f15
AM
5852 case R_PPC64_UADDR16:
5853 case R_PPC64_UADDR32:
5854 case R_PPC64_UADDR64:
5bd4f169 5855 case R_PPC64_TOC:
0e1862bb 5856 if (h != NULL && !bfd_link_pic (info))
81848ca0 5857 /* We may need a copy reloc. */
f5385ebf 5858 h->non_got_ref = 1;
81848ca0 5859
41bd81ab 5860 /* Don't propagate .opd relocs. */
1e2f5b6e 5861 if (NO_OPD_RELOCS && opd_sym_map != NULL)
e86ce104 5862 break;
e86ce104 5863
65f38f15
AM
5864 /* If we are creating a shared library, and this is a reloc
5865 against a global symbol, or a non PC relative reloc
5866 against a local symbol, then we need to copy the reloc
5867 into the shared library. However, if we are linking with
5868 -Bsymbolic, we do not need to copy a reloc against a
5869 global symbol which is defined in an object we are
5870 including in the link (i.e., DEF_REGULAR is set). At
5871 this point we have not seen all the input files, so it is
5872 possible that DEF_REGULAR is not set now but will be set
5873 later (it is never cleared). In case of a weak definition,
5874 DEF_REGULAR may be cleared later by a strong definition in
5875 a shared library. We account for that possibility below by
f4656909 5876 storing information in the dyn_relocs field of the hash
65f38f15
AM
5877 table entry. A similar situation occurs when creating
5878 shared libraries and symbol visibility changes render the
5879 symbol local.
5880
5881 If on the other hand, we are creating an executable, we
5882 may need to keep relocations for symbols satisfied by a
5883 dynamic library if we manage to avoid copy relocs for the
5884 symbol. */
411e1bfb 5885 dodyn:
0e1862bb 5886 if ((bfd_link_pic (info)
1d483afe 5887 && (must_be_dyn_reloc (info, r_type)
65f38f15 5888 || (h != NULL
198f1157 5889 && (!SYMBOLIC_BIND (info, h)
65f38f15 5890 || h->root.type == bfd_link_hash_defweak
f5385ebf 5891 || !h->def_regular))))
f4656909 5892 || (ELIMINATE_COPY_RELOCS
0e1862bb 5893 && !bfd_link_pic (info)
65f38f15
AM
5894 && h != NULL
5895 && (h->root.type == bfd_link_hash_defweak
25f23106 5896 || !h->def_regular))
0e1862bb 5897 || (!bfd_link_pic (info)
25f23106 5898 && ifunc != NULL))
5bd4f169 5899 {
65f38f15
AM
5900 /* We must copy these reloc types into the output file.
5901 Create a reloc section in dynobj and make room for
5902 this reloc. */
5bd4f169
AM
5903 if (sreloc == NULL)
5904 {
83bac4b0
NC
5905 sreloc = _bfd_elf_make_dynamic_reloc_section
5906 (sec, htab->elf.dynobj, 3, abfd, /*rela?*/ TRUE);
65f38f15 5907
5bd4f169 5908 if (sreloc == NULL)
83bac4b0 5909 return FALSE;
5bd4f169
AM
5910 }
5911
65f38f15
AM
5912 /* If this is a global symbol, we count the number of
5913 relocations we need for this symbol. */
5914 if (h != NULL)
5915 {
19e08130
AM
5916 struct elf_dyn_relocs *p;
5917 struct elf_dyn_relocs **head;
5918
ec338859 5919 head = &((struct ppc_link_hash_entry *) h)->dyn_relocs;
19e08130
AM
5920 p = *head;
5921 if (p == NULL || p->sec != sec)
5922 {
5923 p = bfd_alloc (htab->elf.dynobj, sizeof *p);
5924 if (p == NULL)
5925 return FALSE;
5926 p->next = *head;
5927 *head = p;
5928 p->sec = sec;
5929 p->count = 0;
5930 p->pc_count = 0;
5931 }
5932 p->count += 1;
5933 if (!must_be_dyn_reloc (info, r_type))
5934 p->pc_count += 1;
65f38f15
AM
5935 }
5936 else
5937 {
ec338859
AM
5938 /* Track dynamic relocs needed for local syms too.
5939 We really need local syms available to do this
5940 easily. Oh well. */
19e08130
AM
5941 struct ppc_dyn_relocs *p;
5942 struct ppc_dyn_relocs **head;
5943 bfd_boolean is_ifunc;
ec338859 5944 asection *s;
6edfbbad 5945 void *vpp;
87d72d41 5946 Elf_Internal_Sym *isym;
6edfbbad 5947
87d72d41
AM
5948 isym = bfd_sym_from_r_symndx (&htab->sym_cache,
5949 abfd, r_symndx);
5950 if (isym == NULL)
b34976b6 5951 return FALSE;
ec338859 5952
87d72d41
AM
5953 s = bfd_section_from_elf_index (abfd, isym->st_shndx);
5954 if (s == NULL)
5955 s = sec;
5956
6edfbbad 5957 vpp = &elf_section_data (s)->local_dynrel;
19e08130
AM
5958 head = (struct ppc_dyn_relocs **) vpp;
5959 is_ifunc = ELF_ST_TYPE (isym->st_info) == STT_GNU_IFUNC;
5960 p = *head;
5961 if (p != NULL && p->sec == sec && p->ifunc != is_ifunc)
5962 p = p->next;
5963 if (p == NULL || p->sec != sec || p->ifunc != is_ifunc)
5964 {
5965 p = bfd_alloc (htab->elf.dynobj, sizeof *p);
5966 if (p == NULL)
5967 return FALSE;
5968 p->next = *head;
5969 *head = p;
5970 p->sec = sec;
5971 p->ifunc = is_ifunc;
5972 p->count = 0;
5973 }
5974 p->count += 1;
ec338859 5975 }
65f38f15 5976 }
5bd4f169 5977 break;
65f38f15
AM
5978
5979 default:
96e0dda4 5980 break;
5bd4f169
AM
5981 }
5982 }
5983
b34976b6 5984 return TRUE;
5bd4f169
AM
5985}
5986
ee67d69a
AM
5987/* Merge backend specific data from an object file to the output
5988 object file when linking. */
5989
5990static bfd_boolean
5991ppc64_elf_merge_private_bfd_data (bfd *ibfd, bfd *obfd)
5992{
5993 unsigned long iflags, oflags;
5994
5995 if ((ibfd->flags & BFD_LINKER_CREATED) != 0)
5996 return TRUE;
5997
5998 if (!is_ppc64_elf (ibfd) || !is_ppc64_elf (obfd))
5999 return TRUE;
6000
6001 if (!_bfd_generic_verify_endian_match (ibfd, obfd))
6002 return FALSE;
6003
6004 iflags = elf_elfheader (ibfd)->e_flags;
6005 oflags = elf_elfheader (obfd)->e_flags;
6006
f6c7c3e8 6007 if (iflags & ~EF_PPC64_ABI)
ee67d69a
AM
6008 {
6009 (*_bfd_error_handler)
6010 (_("%B uses unknown e_flags 0x%lx"), ibfd, iflags);
6011 bfd_set_error (bfd_error_bad_value);
6012 return FALSE;
6013 }
f6c7c3e8 6014 else if (iflags != oflags && iflags != 0)
ee67d69a
AM
6015 {
6016 (*_bfd_error_handler)
6017 (_("%B: ABI version %ld is not compatible with ABI version %ld output"),
6018 ibfd, iflags, oflags);
6019 bfd_set_error (bfd_error_bad_value);
6020 return FALSE;
6021 }
6022
6023 /* Merge Tag_compatibility attributes and any common GNU ones. */
6024 _bfd_elf_merge_object_attributes (ibfd, obfd);
6025
6026 return TRUE;
6027}
6028
6029static bfd_boolean
6030ppc64_elf_print_private_bfd_data (bfd *abfd, void *ptr)
6031{
6032 /* Print normal ELF private data. */
6033 _bfd_elf_print_private_bfd_data (abfd, ptr);
6034
6035 if (elf_elfheader (abfd)->e_flags != 0)
6036 {
6037 FILE *file = ptr;
6038
6039 /* xgettext:c-format */
6040 fprintf (file, _("private flags = 0x%lx:"),
6041 elf_elfheader (abfd)->e_flags);
6042
6043 if ((elf_elfheader (abfd)->e_flags & EF_PPC64_ABI) != 0)
6044 fprintf (file, _(" [abiv%ld]"),
6045 elf_elfheader (abfd)->e_flags & EF_PPC64_ABI);
6046 fputc ('\n', file);
6047 }
6048
6049 return TRUE;
6050}
6051
8387904d 6052/* OFFSET in OPD_SEC specifies a function descriptor. Return the address
b53dfeb2
AM
6053 of the code entry point, and its section, which must be in the same
6054 object as OPD_SEC. Returns (bfd_vma) -1 on error. */
8387904d
AM
6055
6056static bfd_vma
6057opd_entry_value (asection *opd_sec,
6058 bfd_vma offset,
6059 asection **code_sec,
aef36ac1
AM
6060 bfd_vma *code_off,
6061 bfd_boolean in_code_sec)
8387904d
AM
6062{
6063 bfd *opd_bfd = opd_sec->owner;
8860955f 6064 Elf_Internal_Rela *relocs;
8387904d 6065 Elf_Internal_Rela *lo, *hi, *look;
645ea6a9 6066 bfd_vma val;
8387904d 6067
9f296da3
AM
6068 /* No relocs implies we are linking a --just-symbols object, or looking
6069 at a final linked executable with addr2line or somesuch. */
4b85d634
AM
6070 if (opd_sec->reloc_count == 0)
6071 {
729eabd5 6072 bfd_byte *contents = ppc64_elf_tdata (opd_bfd)->opd.contents;
3b36f7e6 6073
729eabd5
AM
6074 if (contents == NULL)
6075 {
6076 if (!bfd_malloc_and_get_section (opd_bfd, opd_sec, &contents))
6077 return (bfd_vma) -1;
6078 ppc64_elf_tdata (opd_bfd)->opd.contents = contents;
6079 }
ee1e4ede 6080
dbb3fbbb 6081 /* PR 17512: file: 64b9dfbb. */
451dfd38 6082 if (offset + 7 >= opd_sec->size || offset + 7 < offset)
dbb3fbbb
NC
6083 return (bfd_vma) -1;
6084
729eabd5 6085 val = bfd_get_64 (opd_bfd, contents + offset);
aef36ac1
AM
6086 if (code_sec != NULL)
6087 {
6088 asection *sec, *likely = NULL;
ee1e4ede 6089
aef36ac1 6090 if (in_code_sec)
4b85d634 6091 {
aef36ac1
AM
6092 sec = *code_sec;
6093 if (sec->vma <= val
6094 && val < sec->vma + sec->size)
6095 likely = sec;
6096 else
6097 val = -1;
6098 }
6099 else
6100 for (sec = opd_bfd->sections; sec != NULL; sec = sec->next)
6101 if (sec->vma <= val
6102 && (sec->flags & SEC_LOAD) != 0
6103 && (sec->flags & SEC_ALLOC) != 0)
6104 likely = sec;
6105 if (likely != NULL)
6106 {
6107 *code_sec = likely;
6108 if (code_off != NULL)
6109 *code_off = val - likely->vma;
4b85d634
AM
6110 }
6111 }
aef36ac1 6112 return val;
4b85d634
AM
6113 }
6114
0c8d6e5c 6115 BFD_ASSERT (is_ppc64_elf (opd_bfd));
0ffa91dd 6116
729eabd5 6117 relocs = ppc64_elf_tdata (opd_bfd)->opd.relocs;
8860955f
AM
6118 if (relocs == NULL)
6119 relocs = _bfd_elf_link_read_relocs (opd_bfd, opd_sec, NULL, NULL, TRUE);
877a8638
NC
6120 /* PR 17512: file: df8e1fd6. */
6121 if (relocs == NULL)
6122 return (bfd_vma) -1;
645ea6a9 6123
8387904d 6124 /* Go find the opd reloc at the sym address. */
8860955f 6125 lo = relocs;
8387904d 6126 hi = lo + opd_sec->reloc_count - 1; /* ignore last reloc */
645ea6a9 6127 val = (bfd_vma) -1;
8387904d
AM
6128 while (lo < hi)
6129 {
6130 look = lo + (hi - lo) / 2;
6131 if (look->r_offset < offset)
6132 lo = look + 1;
6133 else if (look->r_offset > offset)
6134 hi = look;
6135 else
6136 {
0ffa91dd
NC
6137 Elf_Internal_Shdr *symtab_hdr = &elf_symtab_hdr (opd_bfd);
6138
8387904d
AM
6139 if (ELF64_R_TYPE (look->r_info) == R_PPC64_ADDR64
6140 && ELF64_R_TYPE ((look + 1)->r_info) == R_PPC64_TOC)
6141 {
6142 unsigned long symndx = ELF64_R_SYM (look->r_info);
b53dfeb2 6143 asection *sec = NULL;
8387904d 6144
b53dfeb2
AM
6145 if (symndx >= symtab_hdr->sh_info
6146 && elf_sym_hashes (opd_bfd) != NULL)
8387904d
AM
6147 {
6148 struct elf_link_hash_entry **sym_hashes;
6149 struct elf_link_hash_entry *rh;
6150
6151 sym_hashes = elf_sym_hashes (opd_bfd);
6152 rh = sym_hashes[symndx - symtab_hdr->sh_info];
128205bb
AM
6153 if (rh != NULL)
6154 {
6155 rh = elf_follow_link (rh);
bb854a36
AM
6156 if (rh->root.type != bfd_link_hash_defined
6157 && rh->root.type != bfd_link_hash_defweak)
6158 break;
6159 if (rh->root.u.def.section->owner == opd_bfd)
b53dfeb2 6160 {
bb854a36
AM
6161 val = rh->root.u.def.value;
6162 sec = rh->root.u.def.section;
b53dfeb2
AM
6163 }
6164 }
6165 }
6166
6167 if (sec == NULL)
6168 {
6169 Elf_Internal_Sym *sym;
6170
6171 if (symndx < symtab_hdr->sh_info)
6172 {
6173 sym = (Elf_Internal_Sym *) symtab_hdr->contents;
6174 if (sym == NULL)
6175 {
6176 size_t symcnt = symtab_hdr->sh_info;
6177 sym = bfd_elf_get_elf_syms (opd_bfd, symtab_hdr,
6178 symcnt, 0,
6179 NULL, NULL, NULL);
6180 if (sym == NULL)
6181 break;
6182 symtab_hdr->contents = (bfd_byte *) sym;
6183 }
6184 sym += symndx;
128205bb
AM
6185 }
6186 else
6187 {
b53dfeb2
AM
6188 sym = bfd_elf_get_elf_syms (opd_bfd, symtab_hdr,
6189 1, symndx,
6190 NULL, NULL, NULL);
128205bb
AM
6191 if (sym == NULL)
6192 break;
128205bb 6193 }
b53dfeb2
AM
6194 sec = bfd_section_from_elf_index (opd_bfd, sym->st_shndx);
6195 if (sec == NULL)
6196 break;
6197 BFD_ASSERT ((sec->flags & SEC_MERGE) == 0);
6198 val = sym->st_value;
8387904d 6199 }
b53dfeb2 6200
8387904d
AM
6201 val += look->r_addend;
6202 if (code_off != NULL)
6203 *code_off = val;
6204 if (code_sec != NULL)
aef36ac1
AM
6205 {
6206 if (in_code_sec && *code_sec != sec)
6207 return -1;
6208 else
6209 *code_sec = sec;
6210 }
b53dfeb2 6211 if (sec->output_section != NULL)
8387904d 6212 val += sec->output_section->vma + sec->output_offset;
8387904d
AM
6213 }
6214 break;
6215 }
6216 }
645ea6a9 6217
645ea6a9 6218 return val;
8387904d
AM
6219}
6220
aef36ac1
AM
6221/* If the ELF symbol SYM might be a function in SEC, return the
6222 function size and set *CODE_OFF to the function's entry point,
6223 otherwise return zero. */
9f296da3 6224
aef36ac1
AM
6225static bfd_size_type
6226ppc64_elf_maybe_function_sym (const asymbol *sym, asection *sec,
6227 bfd_vma *code_off)
9f296da3 6228{
aef36ac1
AM
6229 bfd_size_type size;
6230
6231 if ((sym->flags & (BSF_SECTION_SYM | BSF_FILE | BSF_OBJECT
6232 | BSF_THREAD_LOCAL | BSF_RELC | BSF_SRELC)) != 0)
6233 return 0;
6234
6235 size = 0;
6236 if (!(sym->flags & BSF_SYNTHETIC))
6237 size = ((elf_symbol_type *) sym)->internal_elf_sym.st_size;
6238
6239 if (strcmp (sym->section->name, ".opd") == 0)
9f296da3 6240 {
b07bca4e
AM
6241 struct _opd_sec_data *opd = get_opd_info (sym->section);
6242 bfd_vma symval = sym->value;
6243
6244 if (opd != NULL
6245 && opd->adjust != NULL
6246 && elf_section_data (sym->section)->relocs != NULL)
6247 {
6248 /* opd_entry_value will use cached relocs that have been
6249 adjusted, but with raw symbols. That means both local
6250 and global symbols need adjusting. */
6251 long adjust = opd->adjust[OPD_NDX (symval)];
6252 if (adjust == -1)
6253 return 0;
6254 symval += adjust;
6255 }
6256
6257 if (opd_entry_value (sym->section, symval,
aef36ac1
AM
6258 &sec, code_off, TRUE) == (bfd_vma) -1)
6259 return 0;
6260 /* An old ABI binary with dot-syms has a size of 24 on the .opd
6261 symbol. This size has nothing to do with the code size of the
6262 function, which is what we're supposed to return, but the
6263 code size isn't available without looking up the dot-sym.
6264 However, doing that would be a waste of time particularly
6265 since elf_find_function will look at the dot-sym anyway.
6266 Now, elf_find_function will keep the largest size of any
6267 function sym found at the code address of interest, so return
6268 1 here to avoid it incorrectly caching a larger function size
6269 for a small function. This does mean we return the wrong
6270 size for a new-ABI function of size 24, but all that does is
6271 disable caching for such functions. */
6272 if (size == 24)
6273 size = 1;
9f296da3 6274 }
aef36ac1
AM
6275 else
6276 {
6277 if (sym->section != sec)
6278 return 0;
6279 *code_off = sym->value;
6280 }
6281 if (size == 0)
6282 size = 1;
6283 return size;
9f296da3
AM
6284}
6285
854b41e7
AM
6286/* Return true if symbol is defined in a regular object file. */
6287
6288static bfd_boolean
6289is_static_defined (struct elf_link_hash_entry *h)
6290{
6291 return ((h->root.type == bfd_link_hash_defined
6292 || h->root.type == bfd_link_hash_defweak)
6293 && h->root.u.def.section != NULL
6294 && h->root.u.def.section->output_section != NULL);
6295}
6296
b31867b6
AM
6297/* If FDH is a function descriptor symbol, return the associated code
6298 entry symbol if it is defined. Return NULL otherwise. */
6299
6300static struct ppc_link_hash_entry *
6301defined_code_entry (struct ppc_link_hash_entry *fdh)
6302{
6303 if (fdh->is_func_descriptor)
6304 {
6305 struct ppc_link_hash_entry *fh = ppc_follow_link (fdh->oh);
6306 if (fh->elf.root.type == bfd_link_hash_defined
6307 || fh->elf.root.type == bfd_link_hash_defweak)
6308 return fh;
6309 }
6310 return NULL;
6311}
6312
6313/* If FH is a function code entry symbol, return the associated
6314 function descriptor symbol if it is defined. Return NULL otherwise. */
6315
6316static struct ppc_link_hash_entry *
6317defined_func_desc (struct ppc_link_hash_entry *fh)
6318{
6319 if (fh->oh != NULL
6320 && fh->oh->is_func_descriptor)
6321 {
6322 struct ppc_link_hash_entry *fdh = ppc_follow_link (fh->oh);
6323 if (fdh->elf.root.type == bfd_link_hash_defined
6324 || fdh->elf.root.type == bfd_link_hash_defweak)
6325 return fdh;
6326 }
6327 return NULL;
6328}
6329
74f0fb50
AM
6330/* Mark all our entry sym sections, both opd and code section. */
6331
6332static void
6333ppc64_elf_gc_keep (struct bfd_link_info *info)
6334{
6335 struct ppc_link_hash_table *htab = ppc_hash_table (info);
6336 struct bfd_sym_chain *sym;
6337
4dfe6ac6
NC
6338 if (htab == NULL)
6339 return;
6340
74f0fb50
AM
6341 for (sym = info->gc_sym_list; sym != NULL; sym = sym->next)
6342 {
b31867b6 6343 struct ppc_link_hash_entry *eh, *fh;
74f0fb50
AM
6344 asection *sec;
6345
6346 eh = (struct ppc_link_hash_entry *)
b31867b6 6347 elf_link_hash_lookup (&htab->elf, sym->name, FALSE, FALSE, TRUE);
74f0fb50
AM
6348 if (eh == NULL)
6349 continue;
6350 if (eh->elf.root.type != bfd_link_hash_defined
6351 && eh->elf.root.type != bfd_link_hash_defweak)
6352 continue;
6353
b31867b6
AM
6354 fh = defined_code_entry (eh);
6355 if (fh != NULL)
74f0fb50 6356 {
b31867b6 6357 sec = fh->elf.root.u.def.section;
74f0fb50
AM
6358 sec->flags |= SEC_KEEP;
6359 }
6360 else if (get_opd_info (eh->elf.root.u.def.section) != NULL
6361 && opd_entry_value (eh->elf.root.u.def.section,
6362 eh->elf.root.u.def.value,
aef36ac1 6363 &sec, NULL, FALSE) != (bfd_vma) -1)
74f0fb50
AM
6364 sec->flags |= SEC_KEEP;
6365
6366 sec = eh->elf.root.u.def.section;
6367 sec->flags |= SEC_KEEP;
6368 }
6369}
6370
64d03ab5
AM
6371/* Mark sections containing dynamically referenced symbols. When
6372 building shared libraries, we must assume that any visible symbol is
6373 referenced. */
6374
6375static bfd_boolean
6376ppc64_elf_gc_mark_dynamic_ref (struct elf_link_hash_entry *h, void *inf)
6377{
6378 struct bfd_link_info *info = (struct bfd_link_info *) inf;
6379 struct ppc_link_hash_entry *eh = (struct ppc_link_hash_entry *) h;
b31867b6 6380 struct ppc_link_hash_entry *fdh;
b407645f 6381 struct bfd_elf_dynamic_list *d = info->dynamic_list;
64d03ab5 6382
64d03ab5 6383 /* Dynamic linking info is on the func descriptor sym. */
b31867b6
AM
6384 fdh = defined_func_desc (eh);
6385 if (fdh != NULL)
6386 eh = fdh;
64d03ab5
AM
6387
6388 if ((eh->elf.root.type == bfd_link_hash_defined
6389 || eh->elf.root.type == bfd_link_hash_defweak)
6390 && (eh->elf.ref_dynamic
1c9177d9 6391 || ((eh->elf.def_regular || ELF_COMMON_DEF_P (&eh->elf))
64d03ab5 6392 && ELF_ST_VISIBILITY (eh->elf.other) != STV_INTERNAL
4c58e0d8 6393 && ELF_ST_VISIBILITY (eh->elf.other) != STV_HIDDEN
0e1862bb 6394 && (!bfd_link_executable (info)
b407645f
AM
6395 || info->export_dynamic
6396 || (eh->elf.dynamic
6397 && d != NULL
6398 && (*d->match) (&d->head, NULL, eh->elf.root.root.string)))
4c58e0d8
AM
6399 && (strchr (eh->elf.root.root.string, ELF_VER_CHR) != NULL
6400 || !bfd_hide_sym_by_version (info->version_info,
6401 eh->elf.root.root.string)))))
64d03ab5
AM
6402 {
6403 asection *code_sec;
b31867b6 6404 struct ppc_link_hash_entry *fh;
64d03ab5
AM
6405
6406 eh->elf.root.u.def.section->flags |= SEC_KEEP;
6407
6408 /* Function descriptor syms cause the associated
6409 function code sym section to be marked. */
b31867b6
AM
6410 fh = defined_code_entry (eh);
6411 if (fh != NULL)
6412 {
6413 code_sec = fh->elf.root.u.def.section;
6414 code_sec->flags |= SEC_KEEP;
6415 }
64d03ab5
AM
6416 else if (get_opd_info (eh->elf.root.u.def.section) != NULL
6417 && opd_entry_value (eh->elf.root.u.def.section,
6418 eh->elf.root.u.def.value,
aef36ac1 6419 &code_sec, NULL, FALSE) != (bfd_vma) -1)
64d03ab5
AM
6420 code_sec->flags |= SEC_KEEP;
6421 }
6422
6423 return TRUE;
6424}
6425
5bd4f169
AM
6426/* Return the section that should be marked against GC for a given
6427 relocation. */
6428
6429static asection *
4ce794b7 6430ppc64_elf_gc_mark_hook (asection *sec,
fb34365b 6431 struct bfd_link_info *info,
4ce794b7
AM
6432 Elf_Internal_Rela *rel,
6433 struct elf_link_hash_entry *h,
6434 Elf_Internal_Sym *sym)
5bd4f169 6435{
ccfa59ea
AM
6436 asection *rsec;
6437
ccfa59ea
AM
6438 /* Syms return NULL if we're marking .opd, so we avoid marking all
6439 function sections, as all functions are referenced in .opd. */
6440 rsec = NULL;
6441 if (get_opd_info (sec) != NULL)
6442 return rsec;
1e2f5b6e 6443
5bd4f169
AM
6444 if (h != NULL)
6445 {
04c9666a 6446 enum elf_ppc64_reloc_type r_type;
b31867b6 6447 struct ppc_link_hash_entry *eh, *fh, *fdh;
a33d1f77 6448
4ce794b7 6449 r_type = ELF64_R_TYPE (rel->r_info);
a33d1f77 6450 switch (r_type)
5bd4f169
AM
6451 {
6452 case R_PPC64_GNU_VTINHERIT:
6453 case R_PPC64_GNU_VTENTRY:
6454 break;
6455
6456 default:
6457 switch (h->root.type)
6458 {
6459 case bfd_link_hash_defined:
6460 case bfd_link_hash_defweak:
ccfa59ea 6461 eh = (struct ppc_link_hash_entry *) h;
b31867b6
AM
6462 fdh = defined_func_desc (eh);
6463 if (fdh != NULL)
6464 eh = fdh;
1e2f5b6e
AM
6465
6466 /* Function descriptor syms cause the associated
6467 function code sym section to be marked. */
b31867b6
AM
6468 fh = defined_code_entry (eh);
6469 if (fh != NULL)
ccfa59ea
AM
6470 {
6471 /* They also mark their opd section. */
74f0fb50 6472 eh->elf.root.u.def.section->gc_mark = 1;
ccfa59ea 6473
b31867b6 6474 rsec = fh->elf.root.u.def.section;
ccfa59ea 6475 }
8387904d
AM
6476 else if (get_opd_info (eh->elf.root.u.def.section) != NULL
6477 && opd_entry_value (eh->elf.root.u.def.section,
6478 eh->elf.root.u.def.value,
aef36ac1 6479 &rsec, NULL, FALSE) != (bfd_vma) -1)
74f0fb50 6480 eh->elf.root.u.def.section->gc_mark = 1;
ccfa59ea 6481 else
1e2f5b6e
AM
6482 rsec = h->root.u.def.section;
6483 break;
5bd4f169
AM
6484
6485 case bfd_link_hash_common:
1e2f5b6e
AM
6486 rsec = h->root.u.c.p->section;
6487 break;
5bd4f169
AM
6488
6489 default:
fb34365b 6490 return _bfd_elf_gc_mark_hook (sec, info, rel, h, sym);
5bd4f169
AM
6491 }
6492 }
6493 }
6494 else
6495 {
74f0fb50 6496 struct _opd_sec_data *opd;
1e2f5b6e
AM
6497
6498 rsec = bfd_section_from_elf_index (sec->owner, sym->st_shndx);
74f0fb50
AM
6499 opd = get_opd_info (rsec);
6500 if (opd != NULL && opd->func_sec != NULL)
ccfa59ea 6501 {
74f0fb50 6502 rsec->gc_mark = 1;
ccfa59ea 6503
51aecdc5 6504 rsec = opd->func_sec[OPD_NDX (sym->st_value + rel->r_addend)];
ccfa59ea 6505 }
5bd4f169
AM
6506 }
6507
1e2f5b6e 6508 return rsec;
5bd4f169
AM
6509}
6510
65f38f15
AM
6511/* Update the .got, .plt. and dynamic reloc reference counts for the
6512 section being removed. */
5bd4f169 6513
b34976b6 6514static bfd_boolean
4ce794b7
AM
6515ppc64_elf_gc_sweep_hook (bfd *abfd, struct bfd_link_info *info,
6516 asection *sec, const Elf_Internal_Rela *relocs)
5bd4f169 6517{
411e1bfb 6518 struct ppc_link_hash_table *htab;
5bd4f169
AM
6519 Elf_Internal_Shdr *symtab_hdr;
6520 struct elf_link_hash_entry **sym_hashes;
411e1bfb 6521 struct got_entry **local_got_ents;
5bd4f169 6522 const Elf_Internal_Rela *rel, *relend;
5bd4f169 6523
0e1862bb 6524 if (bfd_link_relocatable (info))
7dda2462
TG
6525 return TRUE;
6526
680a3378
AM
6527 if ((sec->flags & SEC_ALLOC) == 0)
6528 return TRUE;
6529
ec338859
AM
6530 elf_section_data (sec)->local_dynrel = NULL;
6531
411e1bfb 6532 htab = ppc_hash_table (info);
4dfe6ac6
NC
6533 if (htab == NULL)
6534 return FALSE;
6535
0ffa91dd 6536 symtab_hdr = &elf_symtab_hdr (abfd);
5bd4f169 6537 sym_hashes = elf_sym_hashes (abfd);
411e1bfb 6538 local_got_ents = elf_local_got_ents (abfd);
5bd4f169
AM
6539
6540 relend = relocs + sec->reloc_count;
6541 for (rel = relocs; rel < relend; rel++)
a33d1f77
AM
6542 {
6543 unsigned long r_symndx;
04c9666a 6544 enum elf_ppc64_reloc_type r_type;
58ac9f71 6545 struct elf_link_hash_entry *h = NULL;
cbf95972 6546 struct plt_entry **plt_list;
f961d9dd 6547 unsigned char tls_type = 0;
5bd4f169 6548
a33d1f77 6549 r_symndx = ELF64_R_SYM (rel->r_info);
4ce794b7 6550 r_type = ELF64_R_TYPE (rel->r_info);
58ac9f71
AM
6551 if (r_symndx >= symtab_hdr->sh_info)
6552 {
6553 struct ppc_link_hash_entry *eh;
6061a67d
AM
6554 struct elf_dyn_relocs **pp;
6555 struct elf_dyn_relocs *p;
58ac9f71
AM
6556
6557 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
b31867b6 6558 h = elf_follow_link (h);
58ac9f71
AM
6559 eh = (struct ppc_link_hash_entry *) h;
6560
6561 for (pp = &eh->dyn_relocs; (p = *pp) != NULL; pp = &p->next)
6562 if (p->sec == sec)
6563 {
6564 /* Everything must go for SEC. */
6565 *pp = p->next;
6566 break;
6567 }
6568 }
6569
a33d1f77
AM
6570 switch (r_type)
6571 {
411e1bfb
AM
6572 case R_PPC64_GOT_TLSLD16:
6573 case R_PPC64_GOT_TLSLD16_LO:
6574 case R_PPC64_GOT_TLSLD16_HI:
6575 case R_PPC64_GOT_TLSLD16_HA:
951fd09b 6576 tls_type = TLS_TLS | TLS_LD;
411e1bfb
AM
6577 goto dogot;
6578
6579 case R_PPC64_GOT_TLSGD16:
6580 case R_PPC64_GOT_TLSGD16_LO:
6581 case R_PPC64_GOT_TLSGD16_HI:
6582 case R_PPC64_GOT_TLSGD16_HA:
951fd09b 6583 tls_type = TLS_TLS | TLS_GD;
411e1bfb
AM
6584 goto dogot;
6585
6586 case R_PPC64_GOT_TPREL16_DS:
6587 case R_PPC64_GOT_TPREL16_LO_DS:
6588 case R_PPC64_GOT_TPREL16_HI:
6589 case R_PPC64_GOT_TPREL16_HA:
6590 tls_type = TLS_TLS | TLS_TPREL;
6591 goto dogot;
6592
6593 case R_PPC64_GOT_DTPREL16_DS:
6594 case R_PPC64_GOT_DTPREL16_LO_DS:
6595 case R_PPC64_GOT_DTPREL16_HI:
6596 case R_PPC64_GOT_DTPREL16_HA:
6597 tls_type = TLS_TLS | TLS_DTPREL;
6598 goto dogot;
6599
a33d1f77
AM
6600 case R_PPC64_GOT16:
6601 case R_PPC64_GOT16_DS:
6602 case R_PPC64_GOT16_HA:
6603 case R_PPC64_GOT16_HI:
6604 case R_PPC64_GOT16_LO:
6605 case R_PPC64_GOT16_LO_DS:
411e1bfb
AM
6606 dogot:
6607 {
6608 struct got_entry *ent;
6609
58ac9f71
AM
6610 if (h != NULL)
6611 ent = h->got.glist;
411e1bfb
AM
6612 else
6613 ent = local_got_ents[r_symndx];
6614
6615 for (; ent != NULL; ent = ent->next)
6616 if (ent->addend == rel->r_addend
e717da7e 6617 && ent->owner == abfd
411e1bfb
AM
6618 && ent->tls_type == tls_type)
6619 break;
6620 if (ent == NULL)
6621 abort ();
6622 if (ent->got.refcount > 0)
6623 ent->got.refcount -= 1;
6624 }
a33d1f77 6625 break;
65f38f15 6626
a33d1f77
AM
6627 case R_PPC64_PLT16_HA:
6628 case R_PPC64_PLT16_HI:
6629 case R_PPC64_PLT16_LO:
6630 case R_PPC64_PLT32:
6631 case R_PPC64_PLT64:
721956f4
AM
6632 case R_PPC64_REL14:
6633 case R_PPC64_REL14_BRNTAKEN:
6634 case R_PPC64_REL14_BRTAKEN:
5d1634d7 6635 case R_PPC64_REL24:
cbf95972 6636 plt_list = NULL;
58ac9f71 6637 if (h != NULL)
cbf95972
AM
6638 plt_list = &h->plt.plist;
6639 else if (local_got_ents != NULL)
6640 {
6641 struct plt_entry **local_plt = (struct plt_entry **)
6642 (local_got_ents + symtab_hdr->sh_info);
6643 unsigned char *local_got_tls_masks = (unsigned char *)
6644 (local_plt + symtab_hdr->sh_info);
6645 if ((local_got_tls_masks[r_symndx] & PLT_IFUNC) != 0)
6646 plt_list = local_plt + r_symndx;
6647 }
6648 if (plt_list)
5d1634d7 6649 {
411e1bfb
AM
6650 struct plt_entry *ent;
6651
cbf95972 6652 for (ent = *plt_list; ent != NULL; ent = ent->next)
411e1bfb
AM
6653 if (ent->addend == rel->r_addend)
6654 break;
7c6c1722 6655 if (ent != NULL && ent->plt.refcount > 0)
411e1bfb 6656 ent->plt.refcount -= 1;
5d1634d7 6657 }
e86ce104 6658 break;
5d1634d7 6659
a33d1f77
AM
6660 default:
6661 break;
6662 }
6663 }
b34976b6 6664 return TRUE;
5bd4f169
AM
6665}
6666
deb0e272
AM
6667/* The maximum size of .sfpr. */
6668#define SFPR_MAX (218*4)
6669
6670struct sfpr_def_parms
6671{
699733f6
AM
6672 const char name[12];
6673 unsigned char lo, hi;
deb0e272
AM
6674 bfd_byte * (*write_ent) (bfd *, bfd_byte *, int);
6675 bfd_byte * (*write_tail) (bfd *, bfd_byte *, int);
6676};
6677
a4b6fadd
AM
6678/* Auto-generate _save*, _rest* functions in .sfpr.
6679 If STUB_SEC is non-null, define alias symbols in STUB_SEC
6680 instead. */
deb0e272 6681
4dfe6ac6 6682static bfd_boolean
a4b6fadd
AM
6683sfpr_define (struct bfd_link_info *info,
6684 const struct sfpr_def_parms *parm,
6685 asection *stub_sec)
deb0e272
AM
6686{
6687 struct ppc_link_hash_table *htab = ppc_hash_table (info);
6688 unsigned int i;
6689 size_t len = strlen (parm->name);
6690 bfd_boolean writing = FALSE;
699733f6 6691 char sym[16];
deb0e272 6692
4dfe6ac6
NC
6693 if (htab == NULL)
6694 return FALSE;
6695
deb0e272
AM
6696 memcpy (sym, parm->name, len);
6697 sym[len + 2] = 0;
6698
6699 for (i = parm->lo; i <= parm->hi; i++)
6700 {
a4b6fadd 6701 struct ppc_link_hash_entry *h;
deb0e272
AM
6702
6703 sym[len + 0] = i / 10 + '0';
6704 sym[len + 1] = i % 10 + '0';
a4b6fadd 6705 h = (struct ppc_link_hash_entry *)
b32547cd 6706 elf_link_hash_lookup (&htab->elf, sym, writing, TRUE, TRUE);
a4b6fadd 6707 if (stub_sec != NULL)
deb0e272 6708 {
a4b6fadd
AM
6709 if (h != NULL
6710 && h->elf.root.type == bfd_link_hash_defined
6711 && h->elf.root.u.def.section == htab->sfpr)
6712 {
6713 struct elf_link_hash_entry *s;
6714 char buf[32];
6715 sprintf (buf, "%08x.%s", stub_sec->id & 0xffffffff, sym);
6716 s = elf_link_hash_lookup (&htab->elf, buf, TRUE, TRUE, FALSE);
6717 if (s == NULL)
6718 return FALSE;
6719 if (s->root.type == bfd_link_hash_new
6720 || (s->root.type = bfd_link_hash_defined
6721 && s->root.u.def.section == stub_sec))
6722 {
6723 s->root.type = bfd_link_hash_defined;
6724 s->root.u.def.section = stub_sec;
6725 s->root.u.def.value = (stub_sec->size
6726 + h->elf.root.u.def.value);
6727 s->ref_regular = 1;
6728 s->def_regular = 1;
6729 s->ref_regular_nonweak = 1;
6730 s->forced_local = 1;
6731 s->non_elf = 0;
6732 s->root.linker_def = 1;
6733 }
6734 }
6735 continue;
6736 }
6737 if (h != NULL)
6738 {
6739 h->save_res = 1;
6740 if (!h->elf.def_regular)
deb0e272 6741 {
a4b6fadd
AM
6742 h->elf.root.type = bfd_link_hash_defined;
6743 h->elf.root.u.def.section = htab->sfpr;
6744 h->elf.root.u.def.value = htab->sfpr->size;
6745 h->elf.type = STT_FUNC;
6746 h->elf.def_regular = 1;
b32547cd 6747 h->elf.non_elf = 0;
a4b6fadd
AM
6748 _bfd_elf_link_hash_hide_symbol (info, &h->elf, TRUE);
6749 writing = TRUE;
deb0e272 6750 if (htab->sfpr->contents == NULL)
a4b6fadd
AM
6751 {
6752 htab->sfpr->contents = bfd_alloc (htab->elf.dynobj, SFPR_MAX);
6753 if (htab->sfpr->contents == NULL)
6754 return FALSE;
6755 }
deb0e272
AM
6756 }
6757 }
6758 if (writing)
6759 {
6760 bfd_byte *p = htab->sfpr->contents + htab->sfpr->size;
6761 if (i != parm->hi)
6762 p = (*parm->write_ent) (htab->elf.dynobj, p, i);
6763 else
6764 p = (*parm->write_tail) (htab->elf.dynobj, p, i);
6765 htab->sfpr->size = p - htab->sfpr->contents;
6766 }
6767 }
6768
6769 return TRUE;
6770}
6771
6772static bfd_byte *
6773savegpr0 (bfd *abfd, bfd_byte *p, int r)
6774{
6775 bfd_put_32 (abfd, STD_R0_0R1 + (r << 21) + (1 << 16) - (32 - r) * 8, p);
6776 return p + 4;
6777}
6778
6779static bfd_byte *
6780savegpr0_tail (bfd *abfd, bfd_byte *p, int r)
6781{
6782 p = savegpr0 (abfd, p, r);
a078d95a 6783 bfd_put_32 (abfd, STD_R0_0R1 + STK_LR, p);
deb0e272
AM
6784 p = p + 4;
6785 bfd_put_32 (abfd, BLR, p);
6786 return p + 4;
6787}
6788
6789static bfd_byte *
6790restgpr0 (bfd *abfd, bfd_byte *p, int r)
6791{
6792 bfd_put_32 (abfd, LD_R0_0R1 + (r << 21) + (1 << 16) - (32 - r) * 8, p);
6793 return p + 4;
6794}
6795
6796static bfd_byte *
6797restgpr0_tail (bfd *abfd, bfd_byte *p, int r)
6798{
a078d95a 6799 bfd_put_32 (abfd, LD_R0_0R1 + STK_LR, p);
deb0e272
AM
6800 p = p + 4;
6801 p = restgpr0 (abfd, p, r);
6802 bfd_put_32 (abfd, MTLR_R0, p);
6803 p = p + 4;
6804 if (r == 29)
6805 {
6806 p = restgpr0 (abfd, p, 30);
6807 p = restgpr0 (abfd, p, 31);
6808 }
6809 bfd_put_32 (abfd, BLR, p);
6810 return p + 4;
6811}
6812
6813static bfd_byte *
6814savegpr1 (bfd *abfd, bfd_byte *p, int r)
6815{
6816 bfd_put_32 (abfd, STD_R0_0R12 + (r << 21) + (1 << 16) - (32 - r) * 8, p);
6817 return p + 4;
6818}
6819
6820static bfd_byte *
6821savegpr1_tail (bfd *abfd, bfd_byte *p, int r)
6822{
6823 p = savegpr1 (abfd, p, r);
6824 bfd_put_32 (abfd, BLR, p);
6825 return p + 4;
6826}
6827
6828static bfd_byte *
6829restgpr1 (bfd *abfd, bfd_byte *p, int r)
6830{
6831 bfd_put_32 (abfd, LD_R0_0R12 + (r << 21) + (1 << 16) - (32 - r) * 8, p);
6832 return p + 4;
6833}
6834
6835static bfd_byte *
6836restgpr1_tail (bfd *abfd, bfd_byte *p, int r)
6837{
6838 p = restgpr1 (abfd, p, r);
6839 bfd_put_32 (abfd, BLR, p);
6840 return p + 4;
6841}
6842
6843static bfd_byte *
6844savefpr (bfd *abfd, bfd_byte *p, int r)
6845{
6846 bfd_put_32 (abfd, STFD_FR0_0R1 + (r << 21) + (1 << 16) - (32 - r) * 8, p);
6847 return p + 4;
6848}
6849
6850static bfd_byte *
6851savefpr0_tail (bfd *abfd, bfd_byte *p, int r)
6852{
6853 p = savefpr (abfd, p, r);
a078d95a 6854 bfd_put_32 (abfd, STD_R0_0R1 + STK_LR, p);
deb0e272
AM
6855 p = p + 4;
6856 bfd_put_32 (abfd, BLR, p);
6857 return p + 4;
6858}
6859
6860static bfd_byte *
6861restfpr (bfd *abfd, bfd_byte *p, int r)
6862{
6863 bfd_put_32 (abfd, LFD_FR0_0R1 + (r << 21) + (1 << 16) - (32 - r) * 8, p);
6864 return p + 4;
6865}
6866
6867static bfd_byte *
6868restfpr0_tail (bfd *abfd, bfd_byte *p, int r)
6869{
a078d95a 6870 bfd_put_32 (abfd, LD_R0_0R1 + STK_LR, p);
deb0e272
AM
6871 p = p + 4;
6872 p = restfpr (abfd, p, r);
6873 bfd_put_32 (abfd, MTLR_R0, p);
6874 p = p + 4;
6875 if (r == 29)
6876 {
6877 p = restfpr (abfd, p, 30);
6878 p = restfpr (abfd, p, 31);
6879 }
6880 bfd_put_32 (abfd, BLR, p);
6881 return p + 4;
6882}
6883
6884static bfd_byte *
6885savefpr1_tail (bfd *abfd, bfd_byte *p, int r)
6886{
6887 p = savefpr (abfd, p, r);
6888 bfd_put_32 (abfd, BLR, p);
6889 return p + 4;
6890}
6891
6892static bfd_byte *
6893restfpr1_tail (bfd *abfd, bfd_byte *p, int r)
6894{
6895 p = restfpr (abfd, p, r);
6896 bfd_put_32 (abfd, BLR, p);
6897 return p + 4;
6898}
6899
6900static bfd_byte *
6901savevr (bfd *abfd, bfd_byte *p, int r)
6902{
6903 bfd_put_32 (abfd, LI_R12_0 + (1 << 16) - (32 - r) * 16, p);
6904 p = p + 4;
6905 bfd_put_32 (abfd, STVX_VR0_R12_R0 + (r << 21), p);
6906 return p + 4;
6907}
6908
6909static bfd_byte *
6910savevr_tail (bfd *abfd, bfd_byte *p, int r)
6911{
6912 p = savevr (abfd, p, r);
6913 bfd_put_32 (abfd, BLR, p);
6914 return p + 4;
6915}
6916
6917static bfd_byte *
6918restvr (bfd *abfd, bfd_byte *p, int r)
6919{
6920 bfd_put_32 (abfd, LI_R12_0 + (1 << 16) - (32 - r) * 16, p);
6921 p = p + 4;
6922 bfd_put_32 (abfd, LVX_VR0_R12_R0 + (r << 21), p);
6923 return p + 4;
6924}
6925
6926static bfd_byte *
6927restvr_tail (bfd *abfd, bfd_byte *p, int r)
6928{
6929 p = restvr (abfd, p, r);
6930 bfd_put_32 (abfd, BLR, p);
6931 return p + 4;
6932}
6933
e86ce104
AM
6934/* Called via elf_link_hash_traverse to transfer dynamic linking
6935 information on function code symbol entries to their corresponding
6936 function descriptor symbol entries. */
deb0e272 6937
b34976b6 6938static bfd_boolean
4ce794b7 6939func_desc_adjust (struct elf_link_hash_entry *h, void *inf)
5bd4f169 6940{
e86ce104 6941 struct bfd_link_info *info;
65f38f15 6942 struct ppc_link_hash_table *htab;
411e1bfb 6943 struct plt_entry *ent;
50bc7936
AM
6944 struct ppc_link_hash_entry *fh;
6945 struct ppc_link_hash_entry *fdh;
6946 bfd_boolean force_local;
5bd4f169 6947
50bc7936
AM
6948 fh = (struct ppc_link_hash_entry *) h;
6949 if (fh->elf.root.type == bfd_link_hash_indirect)
b34976b6 6950 return TRUE;
e86ce104 6951
4ce794b7 6952 info = inf;
65f38f15 6953 htab = ppc_hash_table (info);
4dfe6ac6
NC
6954 if (htab == NULL)
6955 return FALSE;
5bd4f169 6956
c09bdfe5
AM
6957 /* Resolve undefined references to dot-symbols as the value
6958 in the function descriptor, if we have one in a regular object.
6959 This is to satisfy cases like ".quad .foo". Calls to functions
6960 in dynamic objects are handled elsewhere. */
6961 if (fh->elf.root.type == bfd_link_hash_undefweak
6962 && fh->was_undefined
b31867b6
AM
6963 && (fdh = defined_func_desc (fh)) != NULL
6964 && get_opd_info (fdh->elf.root.u.def.section) != NULL
6965 && opd_entry_value (fdh->elf.root.u.def.section,
6966 fdh->elf.root.u.def.value,
c09bdfe5 6967 &fh->elf.root.u.def.section,
aef36ac1 6968 &fh->elf.root.u.def.value, FALSE) != (bfd_vma) -1)
c09bdfe5 6969 {
b31867b6 6970 fh->elf.root.type = fdh->elf.root.type;
f5385ebf 6971 fh->elf.forced_local = 1;
b31867b6
AM
6972 fh->elf.def_regular = fdh->elf.def_regular;
6973 fh->elf.def_dynamic = fdh->elf.def_dynamic;
c09bdfe5
AM
6974 }
6975
e86ce104
AM
6976 /* If this is a function code symbol, transfer dynamic linking
6977 information to the function descriptor symbol. */
50bc7936 6978 if (!fh->is_func)
b34976b6 6979 return TRUE;
e86ce104 6980
50bc7936 6981 for (ent = fh->elf.plt.plist; ent != NULL; ent = ent->next)
411e1bfb
AM
6982 if (ent->plt.refcount > 0)
6983 break;
50bc7936
AM
6984 if (ent == NULL
6985 || fh->elf.root.root.string[0] != '.'
6986 || fh->elf.root.root.string[1] == '\0')
6987 return TRUE;
5bd4f169 6988
50bc7936
AM
6989 /* Find the corresponding function descriptor symbol. Create it
6990 as undefined if necessary. */
5bd4f169 6991
b31867b6 6992 fdh = lookup_fdh (fh, htab);
50bc7936 6993 if (fdh == NULL
0e1862bb 6994 && !bfd_link_executable (info)
50bc7936
AM
6995 && (fh->elf.root.type == bfd_link_hash_undefined
6996 || fh->elf.root.type == bfd_link_hash_undefweak))
6997 {
908b32fc 6998 fdh = make_fdh (info, fh);
bb700d78
AM
6999 if (fdh == NULL)
7000 return FALSE;
50bc7936 7001 }
648cca2c 7002
908b32fc 7003 /* Fake function descriptors are made undefweak. If the function
433817dd
AM
7004 code symbol is strong undefined, make the fake sym the same.
7005 If the function code symbol is defined, then force the fake
7006 descriptor local; We can't support overriding of symbols in a
7007 shared library on a fake descriptor. */
908b32fc
AM
7008
7009 if (fdh != NULL
7010 && fdh->fake
433817dd 7011 && fdh->elf.root.type == bfd_link_hash_undefweak)
908b32fc 7012 {
433817dd
AM
7013 if (fh->elf.root.type == bfd_link_hash_undefined)
7014 {
7015 fdh->elf.root.type = bfd_link_hash_undefined;
7016 bfd_link_add_undef (&htab->elf.root, &fdh->elf.root);
7017 }
7018 else if (fh->elf.root.type == bfd_link_hash_defined
7019 || fh->elf.root.type == bfd_link_hash_defweak)
7020 {
7021 _bfd_elf_link_hash_hide_symbol (info, &fdh->elf, TRUE);
7022 }
908b32fc
AM
7023 }
7024
50bc7936 7025 if (fdh != NULL
f5385ebf 7026 && !fdh->elf.forced_local
0e1862bb 7027 && (!bfd_link_executable (info)
f5385ebf
AM
7028 || fdh->elf.def_dynamic
7029 || fdh->elf.ref_dynamic
50bc7936
AM
7030 || (fdh->elf.root.type == bfd_link_hash_undefweak
7031 && ELF_ST_VISIBILITY (fdh->elf.other) == STV_DEFAULT)))
7032 {
7033 if (fdh->elf.dynindx == -1)
c152c796 7034 if (! bfd_elf_link_record_dynamic_symbol (info, &fdh->elf))
50bc7936 7035 return FALSE;
f5385ebf
AM
7036 fdh->elf.ref_regular |= fh->elf.ref_regular;
7037 fdh->elf.ref_dynamic |= fh->elf.ref_dynamic;
7038 fdh->elf.ref_regular_nonweak |= fh->elf.ref_regular_nonweak;
7039 fdh->elf.non_got_ref |= fh->elf.non_got_ref;
50bc7936 7040 if (ELF_ST_VISIBILITY (fh->elf.other) == STV_DEFAULT)
e86ce104 7041 {
40d16e0b 7042 move_plt_plist (fh, fdh);
f5385ebf 7043 fdh->elf.needs_plt = 1;
e86ce104 7044 }
50bc7936 7045 fdh->is_func_descriptor = 1;
34814b9f
AM
7046 fdh->oh = fh;
7047 fh->oh = fdh;
e86ce104
AM
7048 }
7049
50bc7936
AM
7050 /* Now that the info is on the function descriptor, clear the
7051 function code sym info. Any function code syms for which we
7052 don't have a definition in a regular file, we force local.
7053 This prevents a shared library from exporting syms that have
7054 been imported from another library. Function code syms that
7055 are really in the library we must leave global to prevent the
7056 linker dragging in a definition from a static library. */
93f3fa99
AM
7057 force_local = (!fh->elf.def_regular
7058 || fdh == NULL
7059 || !fdh->elf.def_regular
7060 || fdh->elf.forced_local);
50bc7936
AM
7061 _bfd_elf_link_hash_hide_symbol (info, &fh->elf, force_local);
7062
b34976b6 7063 return TRUE;
e86ce104 7064}
40b8271b 7065
a4b6fadd
AM
7066static const struct sfpr_def_parms save_res_funcs[] =
7067 {
7068 { "_savegpr0_", 14, 31, savegpr0, savegpr0_tail },
7069 { "_restgpr0_", 14, 29, restgpr0, restgpr0_tail },
7070 { "_restgpr0_", 30, 31, restgpr0, restgpr0_tail },
7071 { "_savegpr1_", 14, 31, savegpr1, savegpr1_tail },
7072 { "_restgpr1_", 14, 31, restgpr1, restgpr1_tail },
7073 { "_savefpr_", 14, 31, savefpr, savefpr0_tail },
7074 { "_restfpr_", 14, 29, restfpr, restfpr0_tail },
7075 { "_restfpr_", 30, 31, restfpr, restfpr0_tail },
7076 { "._savef", 14, 31, savefpr, savefpr1_tail },
7077 { "._restf", 14, 31, restfpr, restfpr1_tail },
7078 { "_savevr_", 20, 31, savevr, savevr_tail },
7079 { "_restvr_", 20, 31, restvr, restvr_tail }
7080 };
7081
e86ce104 7082/* Called near the start of bfd_elf_size_dynamic_sections. We use
82bd7b59
AM
7083 this hook to a) provide some gcc support functions, and b) transfer
7084 dynamic linking information gathered so far on function code symbol
7085 entries, to their corresponding function descriptor symbol entries. */
deb0e272 7086
b34976b6 7087static bfd_boolean
4ce794b7
AM
7088ppc64_elf_func_desc_adjust (bfd *obfd ATTRIBUTE_UNUSED,
7089 struct bfd_link_info *info)
e86ce104
AM
7090{
7091 struct ppc_link_hash_table *htab;
7092
7093 htab = ppc_hash_table (info);
4dfe6ac6
NC
7094 if (htab == NULL)
7095 return FALSE;
7096
b32547cd
AM
7097 /* Provide any missing _save* and _rest* functions. */
7098 if (htab->sfpr != NULL)
7099 {
7100 unsigned int i;
7101
7102 htab->sfpr->size = 0;
7103 for (i = 0; i < ARRAY_SIZE (save_res_funcs); i++)
7104 if (!sfpr_define (info, &save_res_funcs[i], NULL))
7105 return FALSE;
7106 if (htab->sfpr->size == 0)
7107 htab->sfpr->flags |= SEC_EXCLUDE;
7108 }
7109
7110 if (bfd_link_relocatable (info))
7111 return TRUE;
7112
7113 if (htab->elf.hgot != NULL)
dba6fa9b
AM
7114 {
7115 _bfd_elf_link_hash_hide_symbol (info, htab->elf.hgot, TRUE);
7116 /* Make .TOC. defined so as to prevent it being made dynamic.
7117 The wrong value here is fixed later in ppc64_elf_set_toc. */
43417696
AM
7118 if (!htab->elf.hgot->def_regular
7119 || htab->elf.hgot->root.type != bfd_link_hash_defined)
7120 {
7121 htab->elf.hgot->root.type = bfd_link_hash_defined;
7122 htab->elf.hgot->root.u.def.value = 0;
7123 htab->elf.hgot->root.u.def.section = bfd_abs_section_ptr;
7124 htab->elf.hgot->def_regular = 1;
7125 htab->elf.hgot->root.linker_def = 1;
7126 }
dba6fa9b 7127 htab->elf.hgot->type = STT_OBJECT;
dba6fa9b
AM
7128 htab->elf.hgot->other = ((htab->elf.hgot->other & ~ELF_ST_VISIBILITY (-1))
7129 | STV_HIDDEN);
7130 }
c66bb0ee 7131
4ce794b7 7132 elf_link_hash_traverse (&htab->elf, func_desc_adjust, info);
805fc799 7133
b34976b6 7134 return TRUE;
e86ce104
AM
7135}
7136
8a2058b5
AM
7137/* Return true if we have dynamic relocs against H that apply to
7138 read-only sections. */
a345bc8d
AM
7139
7140static bfd_boolean
7141readonly_dynrelocs (struct elf_link_hash_entry *h)
7142{
7143 struct ppc_link_hash_entry *eh;
7144 struct elf_dyn_relocs *p;
7145
7146 eh = (struct ppc_link_hash_entry *) h;
7147 for (p = eh->dyn_relocs; p != NULL; p = p->next)
7148 {
7149 asection *s = p->sec->output_section;
7150
7151 if (s != NULL && (s->flags & SEC_READONLY) != 0)
7152 return TRUE;
7153 }
7154 return FALSE;
7155}
7156
d311bc8b
AM
7157/* Return true if we have dynamic relocs against H or any of its weak
7158 aliases, that apply to read-only sections. */
7159
7160static bfd_boolean
7161alias_readonly_dynrelocs (struct elf_link_hash_entry *h)
7162{
7163 struct ppc_link_hash_entry *eh;
7164
7165 eh = (struct ppc_link_hash_entry *) h;
7166 do
7167 {
7168 if (readonly_dynrelocs (&eh->elf))
7169 return TRUE;
7170 eh = eh->weakref;
7171 } while (eh != NULL && &eh->elf != h);
7172
7173 return FALSE;
7174}
8a2058b5
AM
7175
7176/* Return true if a global entry stub will be created for H. Valid
7177 for ELFv2 before plt entries have been allocated. */
7178
7179static bfd_boolean
7180global_entry_stub (struct elf_link_hash_entry *h)
7181{
7182 struct plt_entry *pent;
7183
7184 if (!h->pointer_equality_needed
7185 || h->def_regular)
7186 return FALSE;
7187
7188 for (pent = h->plt.plist; pent != NULL; pent = pent->next)
7189 if (pent->plt.refcount > 0
7190 && pent->addend == 0)
7191 return TRUE;
7192
7193 return FALSE;
7194}
7195
e86ce104
AM
7196/* Adjust a symbol defined by a dynamic object and referenced by a
7197 regular object. The current definition is in some section of the
7198 dynamic object, but we're not including those sections. We have to
7199 change the definition to something the rest of the link can
7200 understand. */
7201
b34976b6 7202static bfd_boolean
4ce794b7
AM
7203ppc64_elf_adjust_dynamic_symbol (struct bfd_link_info *info,
7204 struct elf_link_hash_entry *h)
e86ce104
AM
7205{
7206 struct ppc_link_hash_table *htab;
e86ce104 7207 asection *s;
e86ce104
AM
7208
7209 htab = ppc_hash_table (info);
4dfe6ac6
NC
7210 if (htab == NULL)
7211 return FALSE;
e86ce104
AM
7212
7213 /* Deal with function syms. */
7214 if (h->type == STT_FUNC
e054468f 7215 || h->type == STT_GNU_IFUNC
f5385ebf 7216 || h->needs_plt)
e86ce104
AM
7217 {
7218 /* Clear procedure linkage table information for any symbol that
7219 won't need a .plt entry. */
411e1bfb
AM
7220 struct plt_entry *ent;
7221 for (ent = h->plt.plist; ent != NULL; ent = ent->next)
7222 if (ent->plt.refcount > 0)
7223 break;
8387904d 7224 if (ent == NULL
e054468f
AM
7225 || (h->type != STT_GNU_IFUNC
7226 && (SYMBOL_CALLS_LOCAL (info, h)
7227 || (ELF_ST_VISIBILITY (h->other) != STV_DEFAULT
a4b6fadd
AM
7228 && h->root.type == bfd_link_hash_undefweak)))
7229 || ((struct ppc_link_hash_entry *) h)->save_res)
40b8271b 7230 {
411e1bfb 7231 h->plt.plist = NULL;
f5385ebf 7232 h->needs_plt = 0;
d1eca1e4 7233 h->pointer_equality_needed = 0;
40b8271b 7234 }
8a2058b5 7235 else if (abiversion (info->output_bfd) >= 2)
a345bc8d 7236 {
d1eca1e4
AM
7237 /* Taking a function's address in a read/write section
7238 doesn't require us to define the function symbol in the
7239 executable on a global entry stub. A dynamic reloc can
8a2058b5
AM
7240 be used instead. The reason we prefer a few more dynamic
7241 relocs is that calling via a global entry stub costs a
7242 few more instructions, and pointer_equality_needed causes
7243 extra work in ld.so when resolving these symbols. */
7244 if (global_entry_stub (h)
d311bc8b 7245 && !alias_readonly_dynrelocs (h))
d1eca1e4
AM
7246 {
7247 h->pointer_equality_needed = 0;
8a2058b5
AM
7248 /* After adjust_dynamic_symbol, non_got_ref set in
7249 the non-pic case means that dyn_relocs for this
7250 symbol should be discarded. */
d1eca1e4
AM
7251 h->non_got_ref = 0;
7252 }
7253
a345bc8d
AM
7254 /* If making a plt entry, then we don't need copy relocs. */
7255 return TRUE;
7256 }
5bd4f169 7257 }
bbd7ec4a 7258 else
411e1bfb 7259 h->plt.plist = NULL;
5bd4f169
AM
7260
7261 /* If this is a weak symbol, and there is a real definition, the
7262 processor independent code will have arranged for us to see the
7263 real definition first, and we can just use the same value. */
f6e332e6 7264 if (h->u.weakdef != NULL)
5bd4f169 7265 {
f6e332e6
AM
7266 BFD_ASSERT (h->u.weakdef->root.type == bfd_link_hash_defined
7267 || h->u.weakdef->root.type == bfd_link_hash_defweak);
7268 h->root.u.def.section = h->u.weakdef->root.u.def.section;
7269 h->root.u.def.value = h->u.weakdef->root.u.def.value;
a23b6845 7270 if (ELIMINATE_COPY_RELOCS)
f6e332e6 7271 h->non_got_ref = h->u.weakdef->non_got_ref;
b34976b6 7272 return TRUE;
5bd4f169
AM
7273 }
7274
5bd4f169
AM
7275 /* If we are creating a shared library, we must presume that the
7276 only references to the symbol are via the global offset table.
7277 For such cases we need not do anything here; the relocations will
7278 be handled correctly by relocate_section. */
0e1862bb 7279 if (bfd_link_pic (info))
b34976b6 7280 return TRUE;
5bd4f169 7281
65f38f15
AM
7282 /* If there are no references to this symbol that do not use the
7283 GOT, we don't need to generate a copy reloc. */
f5385ebf 7284 if (!h->non_got_ref)
b34976b6 7285 return TRUE;
65f38f15 7286
b186458a 7287 /* Don't generate a copy reloc for symbols defined in the executable. */
d93d1c80 7288 if (!h->def_dynamic || !h->ref_regular || h->def_regular
b186458a 7289
d93d1c80
AM
7290 /* If -z nocopyreloc was given, don't generate them either. */
7291 || info->nocopyreloc
a127494f 7292
d93d1c80
AM
7293 /* If we didn't find any dynamic relocs in read-only sections, then
7294 we'll be keeping the dynamic relocs and avoiding the copy reloc. */
d311bc8b 7295 || (ELIMINATE_COPY_RELOCS && !alias_readonly_dynrelocs (h))
65f38f15 7296
d93d1c80
AM
7297 /* Protected variables do not work with .dynbss. The copy in
7298 .dynbss won't be used by the shared library with the protected
7299 definition for the variable. Text relocations are preferable
7300 to an incorrect program. */
7301 || h->protected_def)
a127494f
AM
7302 {
7303 h->non_got_ref = 0;
7304 return TRUE;
7305 }
7306
5d35169e 7307 if (h->plt.plist != NULL)
97b639ba
AM
7308 {
7309 /* We should never get here, but unfortunately there are versions
7310 of gcc out there that improperly (for this ABI) put initialized
7311 function pointers, vtable refs and suchlike in read-only
7312 sections. Allow them to proceed, but warn that this might
7313 break at runtime. */
25f53a85 7314 info->callbacks->einfo
bc30df16 7315 (_("%P: copy reloc against `%T' requires lazy plt linking; "
25f53a85 7316 "avoid setting LD_BIND_NOW=1 or upgrade gcc\n"),
97b639ba
AM
7317 h->root.root.string);
7318 }
5d35169e
AM
7319
7320 /* This is a reference to a symbol defined by a dynamic object which
7321 is not a function. */
7322
5bd4f169
AM
7323 /* We must allocate the symbol in our .dynbss section, which will
7324 become part of the .bss section of the executable. There will be
7325 an entry for this symbol in the .dynsym section. The dynamic
7326 object will contain position independent code, so all references
7327 from the dynamic object to this symbol will go through the global
7328 offset table. The dynamic linker will use the .dynsym entry to
7329 determine the address it must put in the global offset table, so
7330 both the dynamic object and the regular object will refer to the
7331 same memory location for the variable. */
5bd4f169 7332
04c9666a
AM
7333 /* We must generate a R_PPC64_COPY reloc to tell the dynamic linker
7334 to copy the initial value out of the dynamic object and into the
5bd4f169
AM
7335 runtime process image. We need to remember the offset into the
7336 .rela.bss section we are going to use. */
1d7e9d18 7337 if ((h->root.u.def.section->flags & SEC_ALLOC) != 0 && h->size != 0)
5bd4f169 7338 {
eea6121a 7339 htab->relbss->size += sizeof (Elf64_External_Rela);
f5385ebf 7340 h->needs_copy = 1;
5bd4f169
AM
7341 }
7342
4ce794b7 7343 s = htab->dynbss;
5bd4f169 7344
6cabe1ea 7345 return _bfd_elf_adjust_dynamic_copy (info, h, s);
5bd4f169
AM
7346}
7347
e86ce104
AM
7348/* If given a function descriptor symbol, hide both the function code
7349 sym and the descriptor. */
7350static void
4ce794b7
AM
7351ppc64_elf_hide_symbol (struct bfd_link_info *info,
7352 struct elf_link_hash_entry *h,
7353 bfd_boolean force_local)
e86ce104 7354{
34814b9f 7355 struct ppc_link_hash_entry *eh;
e86ce104
AM
7356 _bfd_elf_link_hash_hide_symbol (info, h, force_local);
7357
34814b9f
AM
7358 eh = (struct ppc_link_hash_entry *) h;
7359 if (eh->is_func_descriptor)
e86ce104 7360 {
34814b9f 7361 struct ppc_link_hash_entry *fh = eh->oh;
e86ce104 7362
721956f4 7363 if (fh == NULL)
d1329ca3
AM
7364 {
7365 const char *p, *q;
7366 struct ppc_link_hash_table *htab;
7367 char save;
7368
7369 /* We aren't supposed to use alloca in BFD because on
7370 systems which do not have alloca the version in libiberty
7371 calls xmalloc, which might cause the program to crash
7372 when it runs out of memory. This function doesn't have a
7373 return status, so there's no way to gracefully return an
7374 error. So cheat. We know that string[-1] can be safely
34814b9f
AM
7375 accessed; It's either a string in an ELF string table,
7376 or allocated in an objalloc structure. */
d1329ca3 7377
34814b9f 7378 p = eh->elf.root.root.string - 1;
d1329ca3
AM
7379 save = *p;
7380 *(char *) p = '.';
7381 htab = ppc_hash_table (info);
4dfe6ac6
NC
7382 if (htab == NULL)
7383 return;
7384
34814b9f
AM
7385 fh = (struct ppc_link_hash_entry *)
7386 elf_link_hash_lookup (&htab->elf, p, FALSE, FALSE, FALSE);
d1329ca3
AM
7387 *(char *) p = save;
7388
7389 /* Unfortunately, if it so happens that the string we were
7390 looking for was allocated immediately before this string,
7391 then we overwrote the string terminator. That's the only
7392 reason the lookup should fail. */
7393 if (fh == NULL)
7394 {
34814b9f
AM
7395 q = eh->elf.root.root.string + strlen (eh->elf.root.root.string);
7396 while (q >= eh->elf.root.root.string && *q == *p)
d1329ca3 7397 --q, --p;
34814b9f
AM
7398 if (q < eh->elf.root.root.string && *p == '.')
7399 fh = (struct ppc_link_hash_entry *)
7400 elf_link_hash_lookup (&htab->elf, p, FALSE, FALSE, FALSE);
d1329ca3
AM
7401 }
7402 if (fh != NULL)
7403 {
34814b9f
AM
7404 eh->oh = fh;
7405 fh->oh = eh;
d1329ca3
AM
7406 }
7407 }
e86ce104 7408 if (fh != NULL)
34814b9f 7409 _bfd_elf_link_hash_hide_symbol (info, &fh->elf, force_local);
e86ce104
AM
7410 }
7411}
7412
411e1bfb 7413static bfd_boolean
8843416a
AM
7414get_sym_h (struct elf_link_hash_entry **hp,
7415 Elf_Internal_Sym **symp,
7416 asection **symsecp,
f961d9dd 7417 unsigned char **tls_maskp,
8843416a
AM
7418 Elf_Internal_Sym **locsymsp,
7419 unsigned long r_symndx,
7420 bfd *ibfd)
411e1bfb 7421{
0ffa91dd 7422 Elf_Internal_Shdr *symtab_hdr = &elf_symtab_hdr (ibfd);
411e1bfb
AM
7423
7424 if (r_symndx >= symtab_hdr->sh_info)
7425 {
7426 struct elf_link_hash_entry **sym_hashes = elf_sym_hashes (ibfd);
7427 struct elf_link_hash_entry *h;
7428
7429 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
b31867b6 7430 h = elf_follow_link (h);
411e1bfb
AM
7431
7432 if (hp != NULL)
7433 *hp = h;
7434
7435 if (symp != NULL)
7436 *symp = NULL;
7437
7438 if (symsecp != NULL)
7439 {
7440 asection *symsec = NULL;
7441 if (h->root.type == bfd_link_hash_defined
7442 || h->root.type == bfd_link_hash_defweak)
7443 symsec = h->root.u.def.section;
7444 *symsecp = symsec;
7445 }
7446
e7b938ca 7447 if (tls_maskp != NULL)
411e1bfb
AM
7448 {
7449 struct ppc_link_hash_entry *eh;
7450
7451 eh = (struct ppc_link_hash_entry *) h;
e7b938ca 7452 *tls_maskp = &eh->tls_mask;
411e1bfb
AM
7453 }
7454 }
7455 else
7456 {
7457 Elf_Internal_Sym *sym;
7458 Elf_Internal_Sym *locsyms = *locsymsp;
7459
7460 if (locsyms == NULL)
7461 {
7462 locsyms = (Elf_Internal_Sym *) symtab_hdr->contents;
7463 if (locsyms == NULL)
7464 locsyms = bfd_elf_get_elf_syms (ibfd, symtab_hdr,
7465 symtab_hdr->sh_info,
7466 0, NULL, NULL, NULL);
7467 if (locsyms == NULL)
7468 return FALSE;
7469 *locsymsp = locsyms;
7470 }
7471 sym = locsyms + r_symndx;
7472
7473 if (hp != NULL)
7474 *hp = NULL;
7475
7476 if (symp != NULL)
7477 *symp = sym;
7478
7479 if (symsecp != NULL)
cb33740c 7480 *symsecp = bfd_section_from_elf_index (ibfd, sym->st_shndx);
411e1bfb 7481
e7b938ca 7482 if (tls_maskp != NULL)
411e1bfb
AM
7483 {
7484 struct got_entry **lgot_ents;
f961d9dd 7485 unsigned char *tls_mask;
411e1bfb 7486
e7b938ca 7487 tls_mask = NULL;
411e1bfb
AM
7488 lgot_ents = elf_local_got_ents (ibfd);
7489 if (lgot_ents != NULL)
7490 {
e054468f
AM
7491 struct plt_entry **local_plt = (struct plt_entry **)
7492 (lgot_ents + symtab_hdr->sh_info);
f961d9dd 7493 unsigned char *lgot_masks = (unsigned char *)
e054468f 7494 (local_plt + symtab_hdr->sh_info);
e7b938ca 7495 tls_mask = &lgot_masks[r_symndx];
411e1bfb 7496 }
e7b938ca 7497 *tls_maskp = tls_mask;
411e1bfb
AM
7498 }
7499 }
7500 return TRUE;
7501}
7502
e7b938ca 7503/* Returns TLS_MASKP for the given REL symbol. Function return is 0 on
951fd09b 7504 error, 2 on a toc GD type suitable for optimization, 3 on a toc LD
ad8e1ba5 7505 type suitable for optimization, and 1 otherwise. */
951fd09b
AM
7506
7507static int
f961d9dd 7508get_tls_mask (unsigned char **tls_maskp,
3a71aa26
AM
7509 unsigned long *toc_symndx,
7510 bfd_vma *toc_addend,
0d4792f7 7511 Elf_Internal_Sym **locsymsp,
3a71aa26
AM
7512 const Elf_Internal_Rela *rel,
7513 bfd *ibfd)
411e1bfb
AM
7514{
7515 unsigned long r_symndx;
0d4792f7 7516 int next_r;
411e1bfb
AM
7517 struct elf_link_hash_entry *h;
7518 Elf_Internal_Sym *sym;
7519 asection *sec;
7520 bfd_vma off;
7521
7522 r_symndx = ELF64_R_SYM (rel->r_info);
e7b938ca 7523 if (!get_sym_h (&h, &sym, &sec, tls_maskp, locsymsp, r_symndx, ibfd))
951fd09b 7524 return 0;
411e1bfb 7525
e7b938ca 7526 if ((*tls_maskp != NULL && **tls_maskp != 0)
411e1bfb 7527 || sec == NULL
6bee8834 7528 || ppc64_elf_section_data (sec) == NULL
7c8fe5c4 7529 || ppc64_elf_section_data (sec)->sec_type != sec_toc)
951fd09b 7530 return 1;
411e1bfb
AM
7531
7532 /* Look inside a TOC section too. */
7533 if (h != NULL)
7534 {
7535 BFD_ASSERT (h->root.type == bfd_link_hash_defined);
7536 off = h->root.u.def.value;
7537 }
7538 else
7539 off = sym->st_value;
7540 off += rel->r_addend;
7541 BFD_ASSERT (off % 8 == 0);
3a71aa26
AM
7542 r_symndx = ppc64_elf_section_data (sec)->u.toc.symndx[off / 8];
7543 next_r = ppc64_elf_section_data (sec)->u.toc.symndx[off / 8 + 1];
0d4792f7
AM
7544 if (toc_symndx != NULL)
7545 *toc_symndx = r_symndx;
3a71aa26
AM
7546 if (toc_addend != NULL)
7547 *toc_addend = ppc64_elf_section_data (sec)->u.toc.add[off / 8];
7548 if (!get_sym_h (&h, &sym, &sec, tls_maskp, locsymsp, r_symndx, ibfd))
7549 return 0;
854b41e7 7550 if ((h == NULL || is_static_defined (h))
0d4792f7
AM
7551 && (next_r == -1 || next_r == -2))
7552 return 1 - next_r;
951fd09b 7553 return 1;
411e1bfb
AM
7554}
7555
3b421ab3
AM
7556/* Find (or create) an entry in the tocsave hash table. */
7557
7558static struct tocsave_entry *
7559tocsave_find (struct ppc_link_hash_table *htab,
7560 enum insert_option insert,
7561 Elf_Internal_Sym **local_syms,
7562 const Elf_Internal_Rela *irela,
7563 bfd *ibfd)
7564{
7565 unsigned long r_indx;
7566 struct elf_link_hash_entry *h;
7567 Elf_Internal_Sym *sym;
7568 struct tocsave_entry ent, *p;
7569 hashval_t hash;
7570 struct tocsave_entry **slot;
7571
7572 r_indx = ELF64_R_SYM (irela->r_info);
7573 if (!get_sym_h (&h, &sym, &ent.sec, NULL, local_syms, r_indx, ibfd))
7574 return NULL;
7575 if (ent.sec == NULL || ent.sec->output_section == NULL)
7576 {
7577 (*_bfd_error_handler)
7578 (_("%B: undefined symbol on R_PPC64_TOCSAVE relocation"));
7579 return NULL;
7580 }
7581
7582 if (h != NULL)
7583 ent.offset = h->root.u.def.value;
7584 else
7585 ent.offset = sym->st_value;
7586 ent.offset += irela->r_addend;
7587
7588 hash = tocsave_htab_hash (&ent);
7589 slot = ((struct tocsave_entry **)
7590 htab_find_slot_with_hash (htab->tocsave_htab, &ent, hash, insert));
7591 if (slot == NULL)
7592 return NULL;
7593
7594 if (*slot == NULL)
7595 {
7596 p = (struct tocsave_entry *) bfd_alloc (ibfd, sizeof (*p));
7597 if (p == NULL)
7598 return NULL;
7599 *p = ent;
7600 *slot = p;
7601 }
7602 return *slot;
7603}
7604
754021d0 7605/* Adjust all global syms defined in opd sections. In gcc generated
8387904d 7606 code for the old ABI, these will already have been done. */
754021d0
AM
7607
7608static bfd_boolean
7609adjust_opd_syms (struct elf_link_hash_entry *h, void *inf ATTRIBUTE_UNUSED)
7610{
7611 struct ppc_link_hash_entry *eh;
7612 asection *sym_sec;
74f0fb50 7613 struct _opd_sec_data *opd;
754021d0
AM
7614
7615 if (h->root.type == bfd_link_hash_indirect)
7616 return TRUE;
7617
754021d0
AM
7618 if (h->root.type != bfd_link_hash_defined
7619 && h->root.type != bfd_link_hash_defweak)
7620 return TRUE;
7621
7622 eh = (struct ppc_link_hash_entry *) h;
7623 if (eh->adjust_done)
7624 return TRUE;
7625
7626 sym_sec = eh->elf.root.u.def.section;
74f0fb50
AM
7627 opd = get_opd_info (sym_sec);
7628 if (opd != NULL && opd->adjust != NULL)
754021d0 7629 {
51aecdc5 7630 long adjust = opd->adjust[OPD_NDX (eh->elf.root.u.def.value)];
4025353c
AM
7631 if (adjust == -1)
7632 {
7633 /* This entry has been deleted. */
b3fac117 7634 asection *dsec = ppc64_elf_tdata (sym_sec->owner)->deleted_section;
81688140
AM
7635 if (dsec == NULL)
7636 {
7637 for (dsec = sym_sec->owner->sections; dsec; dsec = dsec->next)
dbaa2011 7638 if (discarded_section (dsec))
81688140 7639 {
b3fac117 7640 ppc64_elf_tdata (sym_sec->owner)->deleted_section = dsec;
81688140
AM
7641 break;
7642 }
7643 }
4025353c 7644 eh->elf.root.u.def.value = 0;
81688140 7645 eh->elf.root.u.def.section = dsec;
4025353c
AM
7646 }
7647 else
7648 eh->elf.root.u.def.value += adjust;
754021d0
AM
7649 eh->adjust_done = 1;
7650 }
7651 return TRUE;
7652}
7653
8c1d1bb8 7654/* Handles decrementing dynamic reloc counts for the reloc specified by
19e08130 7655 R_INFO in section SEC. If LOCAL_SYMS is NULL, then H and SYM
8c1d1bb8
AM
7656 have already been determined. */
7657
7658static bfd_boolean
7659dec_dynrel_count (bfd_vma r_info,
7660 asection *sec,
7661 struct bfd_link_info *info,
7662 Elf_Internal_Sym **local_syms,
7663 struct elf_link_hash_entry *h,
19e08130 7664 Elf_Internal_Sym *sym)
8c1d1bb8
AM
7665{
7666 enum elf_ppc64_reloc_type r_type;
19e08130 7667 asection *sym_sec = NULL;
8c1d1bb8
AM
7668
7669 /* Can this reloc be dynamic? This switch, and later tests here
7670 should be kept in sync with the code in check_relocs. */
7671 r_type = ELF64_R_TYPE (r_info);
7672 switch (r_type)
7673 {
7674 default:
7675 return TRUE;
7676
7677 case R_PPC64_TPREL16:
7678 case R_PPC64_TPREL16_LO:
7679 case R_PPC64_TPREL16_HI:
7680 case R_PPC64_TPREL16_HA:
7681 case R_PPC64_TPREL16_DS:
7682 case R_PPC64_TPREL16_LO_DS:
f9c6b907
AM
7683 case R_PPC64_TPREL16_HIGH:
7684 case R_PPC64_TPREL16_HIGHA:
8c1d1bb8
AM
7685 case R_PPC64_TPREL16_HIGHER:
7686 case R_PPC64_TPREL16_HIGHERA:
7687 case R_PPC64_TPREL16_HIGHEST:
7688 case R_PPC64_TPREL16_HIGHESTA:
0e1862bb 7689 if (!bfd_link_pic (info))
8c1d1bb8
AM
7690 return TRUE;
7691
7692 case R_PPC64_TPREL64:
7693 case R_PPC64_DTPMOD64:
7694 case R_PPC64_DTPREL64:
7695 case R_PPC64_ADDR64:
7696 case R_PPC64_REL30:
7697 case R_PPC64_REL32:
7698 case R_PPC64_REL64:
7699 case R_PPC64_ADDR14:
7700 case R_PPC64_ADDR14_BRNTAKEN:
7701 case R_PPC64_ADDR14_BRTAKEN:
7702 case R_PPC64_ADDR16:
7703 case R_PPC64_ADDR16_DS:
7704 case R_PPC64_ADDR16_HA:
7705 case R_PPC64_ADDR16_HI:
f9c6b907
AM
7706 case R_PPC64_ADDR16_HIGH:
7707 case R_PPC64_ADDR16_HIGHA:
8c1d1bb8
AM
7708 case R_PPC64_ADDR16_HIGHER:
7709 case R_PPC64_ADDR16_HIGHERA:
7710 case R_PPC64_ADDR16_HIGHEST:
7711 case R_PPC64_ADDR16_HIGHESTA:
7712 case R_PPC64_ADDR16_LO:
7713 case R_PPC64_ADDR16_LO_DS:
7714 case R_PPC64_ADDR24:
7715 case R_PPC64_ADDR32:
7716 case R_PPC64_UADDR16:
7717 case R_PPC64_UADDR32:
7718 case R_PPC64_UADDR64:
7719 case R_PPC64_TOC:
7720 break;
7721 }
7722
7723 if (local_syms != NULL)
7724 {
7725 unsigned long r_symndx;
8c1d1bb8
AM
7726 bfd *ibfd = sec->owner;
7727
7728 r_symndx = ELF64_R_SYM (r_info);
7729 if (!get_sym_h (&h, &sym, &sym_sec, NULL, local_syms, r_symndx, ibfd))
7730 return FALSE;
7731 }
7732
0e1862bb 7733 if ((bfd_link_pic (info)
1d483afe 7734 && (must_be_dyn_reloc (info, r_type)
8c1d1bb8 7735 || (h != NULL
198f1157 7736 && (!SYMBOLIC_BIND (info, h)
8c1d1bb8
AM
7737 || h->root.type == bfd_link_hash_defweak
7738 || !h->def_regular))))
7739 || (ELIMINATE_COPY_RELOCS
0e1862bb 7740 && !bfd_link_pic (info)
8c1d1bb8
AM
7741 && h != NULL
7742 && (h->root.type == bfd_link_hash_defweak
7743 || !h->def_regular)))
7744 ;
7745 else
7746 return TRUE;
7747
7748 if (h != NULL)
6edfbbad 7749 {
19e08130
AM
7750 struct elf_dyn_relocs *p;
7751 struct elf_dyn_relocs **pp;
7752 pp = &((struct ppc_link_hash_entry *) h)->dyn_relocs;
7753
7754 /* elf_gc_sweep may have already removed all dyn relocs associated
7755 with local syms for a given section. Also, symbol flags are
7756 changed by elf_gc_sweep_symbol, confusing the test above. Don't
7757 report a dynreloc miscount. */
7758 if (*pp == NULL && info->gc_sections)
7759 return TRUE;
7760
7761 while ((p = *pp) != NULL)
60124e18 7762 {
19e08130
AM
7763 if (p->sec == sec)
7764 {
7765 if (!must_be_dyn_reloc (info, r_type))
7766 p->pc_count -= 1;
7767 p->count -= 1;
7768 if (p->count == 0)
7769 *pp = p->next;
7770 return TRUE;
7771 }
7772 pp = &p->next;
60124e18 7773 }
6edfbbad 7774 }
19e08130
AM
7775 else
7776 {
7777 struct ppc_dyn_relocs *p;
7778 struct ppc_dyn_relocs **pp;
7779 void *vpp;
7780 bfd_boolean is_ifunc;
8c1d1bb8 7781
19e08130
AM
7782 if (local_syms == NULL)
7783 sym_sec = bfd_section_from_elf_index (sec->owner, sym->st_shndx);
7784 if (sym_sec == NULL)
7785 sym_sec = sec;
c57da1a7 7786
19e08130
AM
7787 vpp = &elf_section_data (sym_sec)->local_dynrel;
7788 pp = (struct ppc_dyn_relocs **) vpp;
7789
7790 if (*pp == NULL && info->gc_sections)
7791 return TRUE;
7792
7793 is_ifunc = ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC;
7794 while ((p = *pp) != NULL)
8c1d1bb8 7795 {
19e08130
AM
7796 if (p->sec == sec && p->ifunc == is_ifunc)
7797 {
7798 p->count -= 1;
7799 if (p->count == 0)
7800 *pp = p->next;
7801 return TRUE;
7802 }
7803 pp = &p->next;
8c1d1bb8 7804 }
8c1d1bb8
AM
7805 }
7806
8de848d8 7807 info->callbacks->einfo (_("%P: dynreloc miscount for %B, section %A\n"),
25f53a85 7808 sec->owner, sec);
8c1d1bb8
AM
7809 bfd_set_error (bfd_error_bad_value);
7810 return FALSE;
7811}
7812
754021d0
AM
7813/* Remove unused Official Procedure Descriptor entries. Currently we
7814 only remove those associated with functions in discarded link-once
7815 sections, or weakly defined functions that have been overridden. It
7816 would be possible to remove many more entries for statically linked
7817 applications. */
7818
b34976b6 7819bfd_boolean
e7d1c40c 7820ppc64_elf_edit_opd (struct bfd_link_info *info)
1e2f5b6e
AM
7821{
7822 bfd *ibfd;
754021d0 7823 bfd_boolean some_edited = FALSE;
3f764659 7824 asection *need_pad = NULL;
e7d1c40c
AM
7825 struct ppc_link_hash_table *htab;
7826
7827 htab = ppc_hash_table (info);
7828 if (htab == NULL)
7829 return FALSE;
1e2f5b6e 7830
c72f2fb2 7831 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
1e2f5b6e
AM
7832 {
7833 asection *sec;
7834 Elf_Internal_Rela *relstart, *rel, *relend;
7835 Elf_Internal_Shdr *symtab_hdr;
6cdc0ccc 7836 Elf_Internal_Sym *local_syms;
74f0fb50 7837 struct _opd_sec_data *opd;
51aecdc5 7838 bfd_boolean need_edit, add_aux_fields, broken;
3f764659 7839 bfd_size_type cnt_16b = 0;
1e2f5b6e 7840
854b41e7
AM
7841 if (!is_ppc64_elf (ibfd))
7842 continue;
7843
1e2f5b6e 7844 sec = bfd_get_section_by_name (ibfd, ".opd");
46de2a7c 7845 if (sec == NULL || sec->size == 0)
1e2f5b6e
AM
7846 continue;
7847
dbaa2011 7848 if (sec->sec_info_type == SEC_INFO_TYPE_JUST_SYMS)
4b85d634
AM
7849 continue;
7850
1e2f5b6e
AM
7851 if (sec->output_section == bfd_abs_section_ptr)
7852 continue;
7853
7854 /* Look through the section relocs. */
7855 if ((sec->flags & SEC_RELOC) == 0 || sec->reloc_count == 0)
7856 continue;
7857
6cdc0ccc 7858 local_syms = NULL;
0ffa91dd 7859 symtab_hdr = &elf_symtab_hdr (ibfd);
1e2f5b6e
AM
7860
7861 /* Read the relocations. */
4ce794b7 7862 relstart = _bfd_elf_link_read_relocs (ibfd, sec, NULL, NULL,
45d6a902 7863 info->keep_memory);
1e2f5b6e 7864 if (relstart == NULL)
b34976b6 7865 return FALSE;
1e2f5b6e
AM
7866
7867 /* First run through the relocs to check they are sane, and to
7868 determine whether we need to edit this opd section. */
b34976b6 7869 need_edit = FALSE;
51aecdc5 7870 broken = FALSE;
3f764659 7871 need_pad = sec;
1e2f5b6e 7872 relend = relstart + sec->reloc_count;
50bc7936 7873 for (rel = relstart; rel < relend; )
1e2f5b6e 7874 {
04c9666a 7875 enum elf_ppc64_reloc_type r_type;
1e2f5b6e
AM
7876 unsigned long r_symndx;
7877 asection *sym_sec;
7878 struct elf_link_hash_entry *h;
7879 Elf_Internal_Sym *sym;
51aecdc5 7880 bfd_vma offset;
1e2f5b6e 7881
51aecdc5 7882 /* .opd contains an array of 16 or 24 byte entries. We're
1e2f5b6e
AM
7883 only interested in the reloc pointing to a function entry
7884 point. */
51aecdc5
AM
7885 offset = rel->r_offset;
7886 if (rel + 1 == relend
7887 || rel[1].r_offset != offset + 8)
1e2f5b6e
AM
7888 {
7889 /* If someone messes with .opd alignment then after a
7890 "ld -r" we might have padding in the middle of .opd.
7891 Also, there's nothing to prevent someone putting
7892 something silly in .opd with the assembler. No .opd
b34976b6 7893 optimization for them! */
3f764659 7894 broken_opd:
1e2f5b6e 7895 (*_bfd_error_handler)
d003868e 7896 (_("%B: .opd is not a regular array of opd entries"), ibfd);
51aecdc5 7897 broken = TRUE;
1e2f5b6e
AM
7898 break;
7899 }
7900
50bc7936
AM
7901 if ((r_type = ELF64_R_TYPE (rel->r_info)) != R_PPC64_ADDR64
7902 || (r_type = ELF64_R_TYPE ((rel + 1)->r_info)) != R_PPC64_TOC)
7903 {
7904 (*_bfd_error_handler)
d003868e
AM
7905 (_("%B: unexpected reloc type %u in .opd section"),
7906 ibfd, r_type);
51aecdc5 7907 broken = TRUE;
50bc7936
AM
7908 break;
7909 }
7910
1e2f5b6e 7911 r_symndx = ELF64_R_SYM (rel->r_info);
411e1bfb
AM
7912 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms,
7913 r_symndx, ibfd))
50bc7936 7914 goto error_ret;
1e2f5b6e
AM
7915
7916 if (sym_sec == NULL || sym_sec->owner == NULL)
7917 {
411e1bfb
AM
7918 const char *sym_name;
7919 if (h != NULL)
7920 sym_name = h->root.root.string;
7921 else
26c61ae5
L
7922 sym_name = bfd_elf_sym_name (ibfd, symtab_hdr, sym,
7923 sym_sec);
411e1bfb 7924
1e2f5b6e 7925 (*_bfd_error_handler)
d003868e
AM
7926 (_("%B: undefined sym `%s' in .opd section"),
7927 ibfd, sym_name);
51aecdc5 7928 broken = TRUE;
1e2f5b6e
AM
7929 break;
7930 }
7931
51020317
AM
7932 /* opd entries are always for functions defined in the
7933 current input bfd. If the symbol isn't defined in the
7934 input bfd, then we won't be using the function in this
7935 bfd; It must be defined in a linkonce section in another
7936 bfd, or is weak. It's also possible that we are
7937 discarding the function due to a linker script /DISCARD/,
7938 which we test for via the output_section. */
7939 if (sym_sec->owner != ibfd
7940 || sym_sec->output_section == bfd_abs_section_ptr)
b34976b6 7941 need_edit = TRUE;
1e2f5b6e 7942
50bc7936 7943 rel += 2;
51aecdc5
AM
7944 if (rel + 1 == relend
7945 || (rel + 2 < relend
7946 && ELF64_R_TYPE (rel[2].r_info) == R_PPC64_TOC))
7947 ++rel;
7948
7949 if (rel == relend)
3f764659
JJ
7950 {
7951 if (sec->size == offset + 24)
7952 {
7953 need_pad = NULL;
7954 break;
7955 }
51aecdc5 7956 if (sec->size == offset + 16)
3f764659
JJ
7957 {
7958 cnt_16b++;
7959 break;
7960 }
7961 goto broken_opd;
7962 }
3f764659
JJ
7963 else if (rel + 1 < relend
7964 && ELF64_R_TYPE (rel[0].r_info) == R_PPC64_ADDR64
7965 && ELF64_R_TYPE (rel[1].r_info) == R_PPC64_TOC)
7966 {
51aecdc5
AM
7967 if (rel[0].r_offset == offset + 16)
7968 cnt_16b++;
7969 else if (rel[0].r_offset != offset + 24)
7970 goto broken_opd;
3f764659
JJ
7971 }
7972 else
7973 goto broken_opd;
1e2f5b6e
AM
7974 }
7975
e7d1c40c 7976 add_aux_fields = htab->params->non_overlapping_opd && cnt_16b > 0;
3f764659 7977
51aecdc5 7978 if (!broken && (need_edit || add_aux_fields))
1e2f5b6e
AM
7979 {
7980 Elf_Internal_Rela *write_rel;
d4730f92 7981 Elf_Internal_Shdr *rel_hdr;
1e2f5b6e 7982 bfd_byte *rptr, *wptr;
983bddc8 7983 bfd_byte *new_contents;
74f0fb50
AM
7984 bfd_size_type amt;
7985
983bddc8 7986 new_contents = NULL;
51aecdc5 7987 amt = OPD_NDX (sec->size) * sizeof (long);
74f0fb50 7988 opd = &ppc64_elf_section_data (sec)->u.opd;
33c0ec9d 7989 opd->adjust = bfd_zalloc (sec->owner, amt);
74f0fb50
AM
7990 if (opd->adjust == NULL)
7991 return FALSE;
7992 ppc64_elf_section_data (sec)->sec_type = sec_opd;
1e2f5b6e
AM
7993
7994 /* This seems a waste of time as input .opd sections are all
7995 zeros as generated by gcc, but I suppose there's no reason
7996 this will always be so. We might start putting something in
7997 the third word of .opd entries. */
7998 if ((sec->flags & SEC_IN_MEMORY) == 0)
7999 {
eea6121a
AM
8000 bfd_byte *loc;
8001 if (!bfd_malloc_and_get_section (ibfd, sec, &loc))
6cdc0ccc 8002 {
eea6121a
AM
8003 if (loc != NULL)
8004 free (loc);
50bc7936 8005 error_ret:
6cdc0ccc
AM
8006 if (local_syms != NULL
8007 && symtab_hdr->contents != (unsigned char *) local_syms)
8008 free (local_syms);
6cdc0ccc
AM
8009 if (elf_section_data (sec)->relocs != relstart)
8010 free (relstart);
b34976b6 8011 return FALSE;
6cdc0ccc 8012 }
1e2f5b6e
AM
8013 sec->contents = loc;
8014 sec->flags |= (SEC_IN_MEMORY | SEC_HAS_CONTENTS);
8015 }
8016
8017 elf_section_data (sec)->relocs = relstart;
8018
3f764659 8019 new_contents = sec->contents;
3f764659
JJ
8020 if (add_aux_fields)
8021 {
8022 new_contents = bfd_malloc (sec->size + cnt_16b * 8);
8023 if (new_contents == NULL)
8024 return FALSE;
51aecdc5 8025 need_pad = NULL;
3f764659 8026 }
b4f4e59f
AM
8027 wptr = new_contents;
8028 rptr = sec->contents;
1e2f5b6e 8029 write_rel = relstart;
51aecdc5 8030 for (rel = relstart; rel < relend; )
1e2f5b6e 8031 {
50bc7936
AM
8032 unsigned long r_symndx;
8033 asection *sym_sec;
8034 struct elf_link_hash_entry *h;
51aecdc5 8035 struct ppc_link_hash_entry *fdh = NULL;
50bc7936 8036 Elf_Internal_Sym *sym;
51aecdc5
AM
8037 long opd_ent_size;
8038 Elf_Internal_Rela *next_rel;
8039 bfd_boolean skip;
50bc7936
AM
8040
8041 r_symndx = ELF64_R_SYM (rel->r_info);
8042 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms,
d37c89e5 8043 r_symndx, ibfd))
50bc7936
AM
8044 goto error_ret;
8045
51aecdc5
AM
8046 next_rel = rel + 2;
8047 if (next_rel + 1 == relend
8048 || (next_rel + 2 < relend
8049 && ELF64_R_TYPE (next_rel[2].r_info) == R_PPC64_TOC))
8050 ++next_rel;
8051
8052 /* See if the .opd entry is full 24 byte or
8053 16 byte (with fd_aux entry overlapped with next
8054 fd_func). */
8055 opd_ent_size = 24;
8056 if (next_rel == relend)
1e2f5b6e 8057 {
51aecdc5 8058 if (sec->size == rel->r_offset + 16)
3f764659 8059 opd_ent_size = 16;
51aecdc5
AM
8060 }
8061 else if (next_rel->r_offset == rel->r_offset + 16)
8062 opd_ent_size = 16;
3f764659 8063
51aecdc5
AM
8064 if (h != NULL
8065 && h->root.root.string[0] == '.')
8066 {
8067 fdh = lookup_fdh ((struct ppc_link_hash_entry *) h, htab);
8068 if (fdh != NULL
8069 && fdh->elf.root.type != bfd_link_hash_defined
8070 && fdh->elf.root.type != bfd_link_hash_defweak)
8071 fdh = NULL;
8072 }
1e2f5b6e 8073
51aecdc5
AM
8074 skip = (sym_sec->owner != ibfd
8075 || sym_sec->output_section == bfd_abs_section_ptr);
8076 if (skip)
8077 {
8078 if (fdh != NULL && sym_sec->owner == ibfd)
a4aa0fb7 8079 {
51aecdc5
AM
8080 /* Arrange for the function descriptor sym
8081 to be dropped. */
8082 fdh->elf.root.u.def.value = 0;
8083 fdh->elf.root.u.def.section = sym_sec;
a4aa0fb7 8084 }
51aecdc5 8085 opd->adjust[OPD_NDX (rel->r_offset)] = -1;
1e2f5b6e 8086
0e1862bb 8087 if (NO_OPD_RELOCS || bfd_link_relocatable (info))
51aecdc5
AM
8088 rel = next_rel;
8089 else
8090 while (1)
8091 {
8092 if (!dec_dynrel_count (rel->r_info, sec, info,
8093 NULL, h, sym))
8094 goto error_ret;
754021d0 8095
51aecdc5
AM
8096 if (++rel == next_rel)
8097 break;
1e2f5b6e 8098
51aecdc5
AM
8099 r_symndx = ELF64_R_SYM (rel->r_info);
8100 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms,
8101 r_symndx, ibfd))
8102 goto error_ret;
8103 }
50bc7936
AM
8104 }
8105 else
1e2f5b6e 8106 {
51aecdc5
AM
8107 /* We'll be keeping this opd entry. */
8108 long adjust;
8109
8110 if (fdh != NULL)
8111 {
8112 /* Redefine the function descriptor symbol to
8113 this location in the opd section. It is
8114 necessary to update the value here rather
8115 than using an array of adjustments as we do
8116 for local symbols, because various places
8117 in the generic ELF code use the value
8118 stored in u.def.value. */
8119 fdh->elf.root.u.def.value = wptr - new_contents;
8120 fdh->adjust_done = 1;
8121 }
8122
8123 /* Local syms are a bit tricky. We could
8124 tweak them as they can be cached, but
8125 we'd need to look through the local syms
8126 for the function descriptor sym which we
8127 don't have at the moment. So keep an
8128 array of adjustments. */
8129 adjust = (wptr - new_contents) - (rptr - sec->contents);
8130 opd->adjust[OPD_NDX (rel->r_offset)] = adjust;
8131
8132 if (wptr != rptr)
8133 memcpy (wptr, rptr, opd_ent_size);
8134 wptr += opd_ent_size;
8135 if (add_aux_fields && opd_ent_size == 16)
8136 {
8137 memset (wptr, '\0', 8);
8138 wptr += 8;
8139 }
8140
50bc7936 8141 /* We need to adjust any reloc offsets to point to the
51aecdc5
AM
8142 new opd entries. */
8143 for ( ; rel != next_rel; ++rel)
8144 {
8145 rel->r_offset += adjust;
8146 if (write_rel != rel)
8147 memcpy (write_rel, rel, sizeof (*rel));
8148 ++write_rel;
8149 }
1e2f5b6e 8150 }
51aecdc5
AM
8151
8152 rptr += opd_ent_size;
1e2f5b6e
AM
8153 }
8154
3f764659 8155 sec->size = wptr - new_contents;
1e2f5b6e 8156 sec->reloc_count = write_rel - relstart;
3f764659
JJ
8157 if (add_aux_fields)
8158 {
8159 free (sec->contents);
8160 sec->contents = new_contents;
8161 }
8162
05bf9422 8163 /* Fudge the header size too, as this is used later in
cdcf6e38 8164 elf_bfd_final_link if we are emitting relocs. */
d4730f92
BS
8165 rel_hdr = _bfd_elf_single_rel_hdr (sec);
8166 rel_hdr->sh_size = sec->reloc_count * rel_hdr->sh_entsize;
754021d0 8167 some_edited = TRUE;
1e2f5b6e 8168 }
6cdc0ccc 8169 else if (elf_section_data (sec)->relocs != relstart)
1e2f5b6e 8170 free (relstart);
6cdc0ccc 8171
411e1bfb
AM
8172 if (local_syms != NULL
8173 && symtab_hdr->contents != (unsigned char *) local_syms)
8174 {
8175 if (!info->keep_memory)
8176 free (local_syms);
8177 else
8178 symtab_hdr->contents = (unsigned char *) local_syms;
8179 }
8180 }
8181
754021d0
AM
8182 if (some_edited)
8183 elf_link_hash_traverse (elf_hash_table (info), adjust_opd_syms, NULL);
8184
3f764659
JJ
8185 /* If we are doing a final link and the last .opd entry is just 16 byte
8186 long, add a 8 byte padding after it. */
0e1862bb 8187 if (need_pad != NULL && !bfd_link_relocatable (info))
3f764659
JJ
8188 {
8189 bfd_byte *p;
8190
8191 if ((need_pad->flags & SEC_IN_MEMORY) == 0)
8192 {
8193 BFD_ASSERT (need_pad->size > 0);
8194
8195 p = bfd_malloc (need_pad->size + 8);
8196 if (p == NULL)
8197 return FALSE;
699733f6 8198
3f764659
JJ
8199 if (! bfd_get_section_contents (need_pad->owner, need_pad,
8200 p, 0, need_pad->size))
8201 return FALSE;
8202
8203 need_pad->contents = p;
8204 need_pad->flags |= (SEC_IN_MEMORY | SEC_HAS_CONTENTS);
8205 }
8206 else
8207 {
8208 p = bfd_realloc (need_pad->contents, need_pad->size + 8);
8209 if (p == NULL)
8210 return FALSE;
8211
8212 need_pad->contents = p;
8213 }
8214
8215 memset (need_pad->contents + need_pad->size, 0, 8);
8216 need_pad->size += 8;
8217 }
8218
411e1bfb
AM
8219 return TRUE;
8220}
8221
e1918d23 8222/* Set htab->tls_get_addr and call the generic ELF tls_setup function. */
411e1bfb 8223
e1918d23 8224asection *
e7d1c40c 8225ppc64_elf_tls_setup (struct bfd_link_info *info)
411e1bfb 8226{
411e1bfb
AM
8227 struct ppc_link_hash_table *htab;
8228
411e1bfb 8229 htab = ppc_hash_table (info);
4dfe6ac6
NC
8230 if (htab == NULL)
8231 return NULL;
8232
ee67d69a
AM
8233 if (abiversion (info->output_bfd) == 1)
8234 htab->opd_abi = 1;
8235
e7d1c40c 8236 if (htab->params->no_multi_toc)
33c0ec9d
AM
8237 htab->do_multi_toc = 0;
8238 else if (!htab->do_multi_toc)
e7d1c40c 8239 htab->params->no_multi_toc = 1;
33c0ec9d 8240
3a71aa26
AM
8241 htab->tls_get_addr = ((struct ppc_link_hash_entry *)
8242 elf_link_hash_lookup (&htab->elf, ".__tls_get_addr",
8243 FALSE, FALSE, TRUE));
a7f2871e
AM
8244 /* Move dynamic linking info to the function descriptor sym. */
8245 if (htab->tls_get_addr != NULL)
8246 func_desc_adjust (&htab->tls_get_addr->elf, info);
3a71aa26
AM
8247 htab->tls_get_addr_fd = ((struct ppc_link_hash_entry *)
8248 elf_link_hash_lookup (&htab->elf, "__tls_get_addr",
8249 FALSE, FALSE, TRUE));
7c9cf415 8250 if (htab->params->tls_get_addr_opt)
a7f2871e
AM
8251 {
8252 struct elf_link_hash_entry *opt, *opt_fd, *tga, *tga_fd;
8253
8254 opt = elf_link_hash_lookup (&htab->elf, ".__tls_get_addr_opt",
8255 FALSE, FALSE, TRUE);
8256 if (opt != NULL)
8257 func_desc_adjust (opt, info);
8258 opt_fd = elf_link_hash_lookup (&htab->elf, "__tls_get_addr_opt",
8259 FALSE, FALSE, TRUE);
8260 if (opt_fd != NULL
8261 && (opt_fd->root.type == bfd_link_hash_defined
8262 || opt_fd->root.type == bfd_link_hash_defweak))
8263 {
8264 /* If glibc supports an optimized __tls_get_addr call stub,
8265 signalled by the presence of __tls_get_addr_opt, and we'll
8266 be calling __tls_get_addr via a plt call stub, then
8267 make __tls_get_addr point to __tls_get_addr_opt. */
8268 tga_fd = &htab->tls_get_addr_fd->elf;
8269 if (htab->elf.dynamic_sections_created
8270 && tga_fd != NULL
8271 && (tga_fd->type == STT_FUNC
8272 || tga_fd->needs_plt)
8273 && !(SYMBOL_CALLS_LOCAL (info, tga_fd)
8274 || (ELF_ST_VISIBILITY (tga_fd->other) != STV_DEFAULT
8275 && tga_fd->root.type == bfd_link_hash_undefweak)))
8276 {
8277 struct plt_entry *ent;
8278
8279 for (ent = tga_fd->plt.plist; ent != NULL; ent = ent->next)
8280 if (ent->plt.refcount > 0)
8281 break;
8282 if (ent != NULL)
8283 {
8284 tga_fd->root.type = bfd_link_hash_indirect;
8285 tga_fd->root.u.i.link = &opt_fd->root;
8286 ppc64_elf_copy_indirect_symbol (info, opt_fd, tga_fd);
3bd43ebc 8287 opt_fd->forced_local = 0;
a7f2871e
AM
8288 if (opt_fd->dynindx != -1)
8289 {
8290 /* Use __tls_get_addr_opt in dynamic relocations. */
8291 opt_fd->dynindx = -1;
8292 _bfd_elf_strtab_delref (elf_hash_table (info)->dynstr,
8293 opt_fd->dynstr_index);
8294 if (!bfd_elf_link_record_dynamic_symbol (info, opt_fd))
854b41e7 8295 return NULL;
a7f2871e
AM
8296 }
8297 htab->tls_get_addr_fd = (struct ppc_link_hash_entry *) opt_fd;
8298 tga = &htab->tls_get_addr->elf;
8299 if (opt != NULL && tga != NULL)
8300 {
8301 tga->root.type = bfd_link_hash_indirect;
8302 tga->root.u.i.link = &opt->root;
8303 ppc64_elf_copy_indirect_symbol (info, opt, tga);
3bd43ebc 8304 opt->forced_local = 0;
a7f2871e
AM
8305 _bfd_elf_link_hash_hide_symbol (info, opt,
8306 tga->forced_local);
8307 htab->tls_get_addr = (struct ppc_link_hash_entry *) opt;
8308 }
8309 htab->tls_get_addr_fd->oh = htab->tls_get_addr;
8310 htab->tls_get_addr_fd->is_func_descriptor = 1;
8311 if (htab->tls_get_addr != NULL)
8312 {
8313 htab->tls_get_addr->oh = htab->tls_get_addr_fd;
8314 htab->tls_get_addr->is_func = 1;
8315 }
8316 }
8317 }
8318 }
7c9cf415
AM
8319 else if (htab->params->tls_get_addr_opt < 0)
8320 htab->params->tls_get_addr_opt = 0;
a7f2871e 8321 }
33c0ec9d 8322 return _bfd_elf_tls_setup (info->output_bfd, info);
3a71aa26 8323}
8387904d 8324
3a71aa26
AM
8325/* Return TRUE iff REL is a branch reloc with a global symbol matching
8326 HASH1 or HASH2. */
8387904d 8327
3a71aa26
AM
8328static bfd_boolean
8329branch_reloc_hash_match (const bfd *ibfd,
8330 const Elf_Internal_Rela *rel,
8331 const struct ppc_link_hash_entry *hash1,
8332 const struct ppc_link_hash_entry *hash2)
8333{
8334 Elf_Internal_Shdr *symtab_hdr = &elf_symtab_hdr (ibfd);
8335 enum elf_ppc64_reloc_type r_type = ELF64_R_TYPE (rel->r_info);
8336 unsigned int r_symndx = ELF64_R_SYM (rel->r_info);
8337
e054468f 8338 if (r_symndx >= symtab_hdr->sh_info && is_branch_reloc (r_type))
8387904d 8339 {
3a71aa26
AM
8340 struct elf_link_hash_entry **sym_hashes = elf_sym_hashes (ibfd);
8341 struct elf_link_hash_entry *h;
8387904d 8342
3a71aa26 8343 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
b31867b6 8344 h = elf_follow_link (h);
3a71aa26
AM
8345 if (h == &hash1->elf || h == &hash2->elf)
8346 return TRUE;
a48ebf4d 8347 }
3a71aa26 8348 return FALSE;
951fd09b 8349}
411e1bfb 8350
951fd09b
AM
8351/* Run through all the TLS relocs looking for optimization
8352 opportunities. The linker has been hacked (see ppc64elf.em) to do
8353 a preliminary section layout so that we know the TLS segment
8354 offsets. We can't optimize earlier because some optimizations need
8355 to know the tp offset, and we need to optimize before allocating
8356 dynamic relocations. */
8357
8358bfd_boolean
33c0ec9d 8359ppc64_elf_tls_optimize (struct bfd_link_info *info)
951fd09b
AM
8360{
8361 bfd *ibfd;
8362 asection *sec;
8363 struct ppc_link_hash_table *htab;
663a1470 8364 unsigned char *toc_ref;
102890f0 8365 int pass;
951fd09b 8366
3cbc1e5e 8367 if (!bfd_link_executable (info))
411e1bfb
AM
8368 return TRUE;
8369
951fd09b 8370 htab = ppc_hash_table (info);
4dfe6ac6
NC
8371 if (htab == NULL)
8372 return FALSE;
8373
663a1470
AM
8374 /* Make two passes over the relocs. On the first pass, mark toc
8375 entries involved with tls relocs, and check that tls relocs
8376 involved in setting up a tls_get_addr call are indeed followed by
8377 such a call. If they are not, we can't do any tls optimization.
8378 On the second pass twiddle tls_mask flags to notify
8379 relocate_section that optimization can be done, and adjust got
8380 and plt refcounts. */
8381 toc_ref = NULL;
8382 for (pass = 0; pass < 2; ++pass)
c72f2fb2 8383 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
663a1470
AM
8384 {
8385 Elf_Internal_Sym *locsyms = NULL;
8386 asection *toc = bfd_get_section_by_name (ibfd, ".toc");
8387
102890f0
AM
8388 for (sec = ibfd->sections; sec != NULL; sec = sec->next)
8389 if (sec->has_tls_reloc && !bfd_is_abs_section (sec->output_section))
8390 {
8391 Elf_Internal_Rela *relstart, *rel, *relend;
663a1470 8392 bfd_boolean found_tls_get_addr_arg = 0;
411e1bfb 8393
102890f0
AM
8394 /* Read the relocations. */
8395 relstart = _bfd_elf_link_read_relocs (ibfd, sec, NULL, NULL,
8396 info->keep_memory);
8397 if (relstart == NULL)
2915c55b
JK
8398 {
8399 free (toc_ref);
8400 return FALSE;
8401 }
411e1bfb 8402
102890f0
AM
8403 relend = relstart + sec->reloc_count;
8404 for (rel = relstart; rel < relend; rel++)
8405 {
8406 enum elf_ppc64_reloc_type r_type;
8407 unsigned long r_symndx;
8408 struct elf_link_hash_entry *h;
8409 Elf_Internal_Sym *sym;
8410 asection *sym_sec;
f961d9dd
AM
8411 unsigned char *tls_mask;
8412 unsigned char tls_set, tls_clear, tls_type = 0;
102890f0
AM
8413 bfd_vma value;
8414 bfd_boolean ok_tprel, is_local;
8415 long toc_ref_index = 0;
8416 int expecting_tls_get_addr = 0;
663a1470 8417 bfd_boolean ret = FALSE;
411e1bfb 8418
102890f0
AM
8419 r_symndx = ELF64_R_SYM (rel->r_info);
8420 if (!get_sym_h (&h, &sym, &sym_sec, &tls_mask, &locsyms,
8421 r_symndx, ibfd))
8422 {
8423 err_free_rel:
8424 if (elf_section_data (sec)->relocs != relstart)
8425 free (relstart);
8426 if (toc_ref != NULL)
8427 free (toc_ref);
8428 if (locsyms != NULL
0ffa91dd 8429 && (elf_symtab_hdr (ibfd).contents
102890f0
AM
8430 != (unsigned char *) locsyms))
8431 free (locsyms);
663a1470 8432 return ret;
102890f0 8433 }
411e1bfb 8434
102890f0
AM
8435 if (h != NULL)
8436 {
766bc656
AM
8437 if (h->root.type == bfd_link_hash_defined
8438 || h->root.type == bfd_link_hash_defweak)
8439 value = h->root.u.def.value;
8440 else if (h->root.type == bfd_link_hash_undefweak)
8441 value = 0;
8442 else
663a1470
AM
8443 {
8444 found_tls_get_addr_arg = 0;
8445 continue;
8446 }
102890f0
AM
8447 }
8448 else
8449 /* Symbols referenced by TLS relocs must be of type
8450 STT_TLS. So no need for .opd local sym adjust. */
8451 value = sym->st_value;
8452
8453 ok_tprel = FALSE;
8454 is_local = FALSE;
8455 if (h == NULL
8456 || !h->def_dynamic)
8457 {
8458 is_local = TRUE;
766bc656
AM
8459 if (h != NULL
8460 && h->root.type == bfd_link_hash_undefweak)
8461 ok_tprel = TRUE;
c27b8c2a
AM
8462 else if (sym_sec != NULL
8463 && sym_sec->output_section != NULL)
766bc656
AM
8464 {
8465 value += sym_sec->output_offset;
8466 value += sym_sec->output_section->vma;
8467 value -= htab->elf.tls_sec->vma;
8468 ok_tprel = (value + TP_OFFSET + ((bfd_vma) 1 << 31)
8469 < (bfd_vma) 1 << 32);
8470 }
102890f0 8471 }
951fd09b 8472
102890f0 8473 r_type = ELF64_R_TYPE (rel->r_info);
663a1470
AM
8474 /* If this section has old-style __tls_get_addr calls
8475 without marker relocs, then check that each
8476 __tls_get_addr call reloc is preceded by a reloc
8477 that conceivably belongs to the __tls_get_addr arg
8478 setup insn. If we don't find matching arg setup
8479 relocs, don't do any tls optimization. */
8480 if (pass == 0
8481 && sec->has_tls_get_addr_call
8482 && h != NULL
8483 && (h == &htab->tls_get_addr->elf
8484 || h == &htab->tls_get_addr_fd->elf)
8485 && !found_tls_get_addr_arg
8486 && is_branch_reloc (r_type))
8487 {
25f53a85 8488 info->callbacks->minfo (_("%H __tls_get_addr lost arg, "
663a1470
AM
8489 "TLS optimization disabled\n"),
8490 ibfd, sec, rel->r_offset);
8491 ret = TRUE;
8492 goto err_free_rel;
8493 }
8494
8495 found_tls_get_addr_arg = 0;
102890f0
AM
8496 switch (r_type)
8497 {
8498 case R_PPC64_GOT_TLSLD16:
8499 case R_PPC64_GOT_TLSLD16_LO:
8500 expecting_tls_get_addr = 1;
663a1470 8501 found_tls_get_addr_arg = 1;
102890f0
AM
8502 /* Fall thru */
8503
8504 case R_PPC64_GOT_TLSLD16_HI:
8505 case R_PPC64_GOT_TLSLD16_HA:
8506 /* These relocs should never be against a symbol
8507 defined in a shared lib. Leave them alone if
8508 that turns out to be the case. */
8509 if (!is_local)
8510 continue;
411e1bfb 8511
102890f0 8512 /* LD -> LE */
411e1bfb 8513 tls_set = 0;
102890f0
AM
8514 tls_clear = TLS_LD;
8515 tls_type = TLS_TLS | TLS_LD;
8516 break;
411e1bfb 8517
102890f0
AM
8518 case R_PPC64_GOT_TLSGD16:
8519 case R_PPC64_GOT_TLSGD16_LO:
8520 expecting_tls_get_addr = 1;
663a1470 8521 found_tls_get_addr_arg = 1;
102890f0
AM
8522 /* Fall thru */
8523
8524 case R_PPC64_GOT_TLSGD16_HI:
8525 case R_PPC64_GOT_TLSGD16_HA:
8526 if (ok_tprel)
8527 /* GD -> LE */
411e1bfb 8528 tls_set = 0;
102890f0
AM
8529 else
8530 /* GD -> IE */
8531 tls_set = TLS_TLS | TLS_TPRELGD;
8532 tls_clear = TLS_GD;
8533 tls_type = TLS_TLS | TLS_GD;
8534 break;
8535
8536 case R_PPC64_GOT_TPREL16_DS:
8537 case R_PPC64_GOT_TPREL16_LO_DS:
8538 case R_PPC64_GOT_TPREL16_HI:
8539 case R_PPC64_GOT_TPREL16_HA:
8540 if (ok_tprel)
8541 {
8542 /* IE -> LE */
8543 tls_set = 0;
8544 tls_clear = TLS_TPREL;
8545 tls_type = TLS_TLS | TLS_TPREL;
8546 break;
8547 }
411e1bfb
AM
8548 continue;
8549
727fc41e
AM
8550 case R_PPC64_TLSGD:
8551 case R_PPC64_TLSLD:
663a1470
AM
8552 found_tls_get_addr_arg = 1;
8553 /* Fall thru */
8554
8555 case R_PPC64_TLS:
8556 case R_PPC64_TOC16:
8557 case R_PPC64_TOC16_LO:
102890f0
AM
8558 if (sym_sec == NULL || sym_sec != toc)
8559 continue;
8560
8561 /* Mark this toc entry as referenced by a TLS
8562 code sequence. We can do that now in the
8563 case of R_PPC64_TLS, and after checking for
8564 tls_get_addr for the TOC16 relocs. */
8565 if (toc_ref == NULL)
663a1470
AM
8566 toc_ref = bfd_zmalloc (toc->output_section->rawsize / 8);
8567 if (toc_ref == NULL)
8568 goto err_free_rel;
8569
102890f0
AM
8570 if (h != NULL)
8571 value = h->root.u.def.value;
8572 else
8573 value = sym->st_value;
8574 value += rel->r_addend;
73242275
AM
8575 if (value % 8 != 0)
8576 continue;
8577 BFD_ASSERT (value < toc->size
8578 && toc->output_offset % 8 == 0);
663a1470 8579 toc_ref_index = (value + toc->output_offset) / 8;
727fc41e
AM
8580 if (r_type == R_PPC64_TLS
8581 || r_type == R_PPC64_TLSGD
8582 || r_type == R_PPC64_TLSLD)
102890f0
AM
8583 {
8584 toc_ref[toc_ref_index] = 1;
8585 continue;
8586 }
8587
8588 if (pass != 0 && toc_ref[toc_ref_index] == 0)
8589 continue;
8590
8591 tls_set = 0;
8592 tls_clear = 0;
8593 expecting_tls_get_addr = 2;
8594 break;
8595
8596 case R_PPC64_TPREL64:
8597 if (pass == 0
8598 || sec != toc
8599 || toc_ref == NULL
663a1470 8600 || !toc_ref[(rel->r_offset + toc->output_offset) / 8])
102890f0
AM
8601 continue;
8602 if (ok_tprel)
8603 {
8604 /* IE -> LE */
8605 tls_set = TLS_EXPLICIT;
8606 tls_clear = TLS_TPREL;
8607 break;
8608 }
8609 continue;
8610
8611 case R_PPC64_DTPMOD64:
8612 if (pass == 0
8613 || sec != toc
8614 || toc_ref == NULL
663a1470 8615 || !toc_ref[(rel->r_offset + toc->output_offset) / 8])
102890f0
AM
8616 continue;
8617 if (rel + 1 < relend
8618 && (rel[1].r_info
8619 == ELF64_R_INFO (r_symndx, R_PPC64_DTPREL64))
8620 && rel[1].r_offset == rel->r_offset + 8)
8621 {
8622 if (ok_tprel)
8623 /* GD -> LE */
8624 tls_set = TLS_EXPLICIT | TLS_GD;
8625 else
8626 /* GD -> IE */
8627 tls_set = TLS_EXPLICIT | TLS_GD | TLS_TPRELGD;
8628 tls_clear = TLS_GD;
8629 }
8630 else
8631 {
8632 if (!is_local)
8633 continue;
8634
8635 /* LD -> LE */
8636 tls_set = TLS_EXPLICIT;
8637 tls_clear = TLS_LD;
8638 }
8639 break;
8640
8641 default:
8642 continue;
8643 }
8644
8645 if (pass == 0)
8646 {
727fc41e
AM
8647 if (!expecting_tls_get_addr
8648 || !sec->has_tls_get_addr_call)
102890f0
AM
8649 continue;
8650
3a71aa26
AM
8651 if (rel + 1 < relend
8652 && branch_reloc_hash_match (ibfd, rel + 1,
8653 htab->tls_get_addr,
8654 htab->tls_get_addr_fd))
102890f0 8655 {
3a71aa26 8656 if (expecting_tls_get_addr == 2)
102890f0 8657 {
3a71aa26 8658 /* Check for toc tls entries. */
f961d9dd 8659 unsigned char *toc_tls;
3a71aa26
AM
8660 int retval;
8661
8662 retval = get_tls_mask (&toc_tls, NULL, NULL,
8663 &locsyms,
8664 rel, ibfd);
8665 if (retval == 0)
8666 goto err_free_rel;
663a1470
AM
8667 if (toc_tls != NULL)
8668 {
8669 if ((*toc_tls & (TLS_GD | TLS_LD)) != 0)
8670 found_tls_get_addr_arg = 1;
8671 if (retval > 1)
8672 toc_ref[toc_ref_index] = 1;
8673 }
102890f0 8674 }
3a71aa26 8675 continue;
102890f0
AM
8676 }
8677
8678 if (expecting_tls_get_addr != 1)
8679 continue;
8680
8681 /* Uh oh, we didn't find the expected call. We
8682 could just mark this symbol to exclude it
8683 from tls optimization but it's safer to skip
663a1470 8684 the entire optimization. */
25f53a85 8685 info->callbacks->minfo (_("%H arg lost __tls_get_addr, "
663a1470
AM
8686 "TLS optimization disabled\n"),
8687 ibfd, sec, rel->r_offset);
8688 ret = TRUE;
8689 goto err_free_rel;
102890f0
AM
8690 }
8691
85f7a9cb 8692 if (expecting_tls_get_addr && htab->tls_get_addr != NULL)
102890f0
AM
8693 {
8694 struct plt_entry *ent;
8695 for (ent = htab->tls_get_addr->elf.plt.plist;
8696 ent != NULL;
8697 ent = ent->next)
8698 if (ent->addend == 0)
411e1bfb 8699 {
102890f0 8700 if (ent->plt.refcount > 0)
30038c59 8701 {
102890f0
AM
8702 ent->plt.refcount -= 1;
8703 expecting_tls_get_addr = 0;
30038c59 8704 }
102890f0 8705 break;
411e1bfb 8706 }
102890f0 8707 }
411e1bfb 8708
85f7a9cb 8709 if (expecting_tls_get_addr && htab->tls_get_addr_fd != NULL)
102890f0
AM
8710 {
8711 struct plt_entry *ent;
8712 for (ent = htab->tls_get_addr_fd->elf.plt.plist;
8713 ent != NULL;
8714 ent = ent->next)
8715 if (ent->addend == 0)
411e1bfb 8716 {
102890f0
AM
8717 if (ent->plt.refcount > 0)
8718 ent->plt.refcount -= 1;
8719 break;
411e1bfb 8720 }
102890f0 8721 }
411e1bfb 8722
102890f0 8723 if (tls_clear == 0)
30038c59
AM
8724 continue;
8725
102890f0
AM
8726 if ((tls_set & TLS_EXPLICIT) == 0)
8727 {
8728 struct got_entry *ent;
411e1bfb 8729
102890f0
AM
8730 /* Adjust got entry for this reloc. */
8731 if (h != NULL)
8732 ent = h->got.glist;
8733 else
8734 ent = elf_local_got_ents (ibfd)[r_symndx];
411e1bfb 8735
102890f0
AM
8736 for (; ent != NULL; ent = ent->next)
8737 if (ent->addend == rel->r_addend
8738 && ent->owner == ibfd
8739 && ent->tls_type == tls_type)
8740 break;
8741 if (ent == NULL)
8742 abort ();
411e1bfb 8743
102890f0
AM
8744 if (tls_set == 0)
8745 {
8746 /* We managed to get rid of a got entry. */
8747 if (ent->got.refcount > 0)
8748 ent->got.refcount -= 1;
8749 }
8750 }
8751 else
8752 {
8753 /* If we got rid of a DTPMOD/DTPREL reloc pair then
8754 we'll lose one or two dyn relocs. */
8755 if (!dec_dynrel_count (rel->r_info, sec, info,
19e08130 8756 NULL, h, sym))
102890f0 8757 return FALSE;
411e1bfb 8758
102890f0
AM
8759 if (tls_set == (TLS_EXPLICIT | TLS_GD))
8760 {
8761 if (!dec_dynrel_count ((rel + 1)->r_info, sec, info,
19e08130 8762 NULL, h, sym))
102890f0
AM
8763 return FALSE;
8764 }
8765 }
411e1bfb 8766
102890f0
AM
8767 *tls_mask |= tls_set;
8768 *tls_mask &= ~tls_clear;
8769 }
8c1d1bb8 8770
102890f0
AM
8771 if (elf_section_data (sec)->relocs != relstart)
8772 free (relstart);
8773 }
411e1bfb 8774
663a1470
AM
8775 if (locsyms != NULL
8776 && (elf_symtab_hdr (ibfd).contents != (unsigned char *) locsyms))
8777 {
8778 if (!info->keep_memory)
8779 free (locsyms);
8780 else
8781 elf_symtab_hdr (ibfd).contents = (unsigned char *) locsyms;
8782 }
8783 }
411e1bfb 8784
663a1470
AM
8785 if (toc_ref != NULL)
8786 free (toc_ref);
b34976b6 8787 return TRUE;
1e2f5b6e 8788}
b34976b6 8789
c5614fa4
AM
8790/* Called via elf_link_hash_traverse from ppc64_elf_edit_toc to adjust
8791 the values of any global symbols in a toc section that has been
8792 edited. Globals in toc sections should be a rarity, so this function
8793 sets a flag if any are found in toc sections other than the one just
8794 edited, so that futher hash table traversals can be avoided. */
8795
8796struct adjust_toc_info
8797{
8798 asection *toc;
8799 unsigned long *skip;
8800 bfd_boolean global_toc_syms;
8801};
8802
ba761f19
AM
8803enum toc_skip_enum { ref_from_discarded = 1, can_optimize = 2 };
8804
c5614fa4
AM
8805static bfd_boolean
8806adjust_toc_syms (struct elf_link_hash_entry *h, void *inf)
8807{
8808 struct ppc_link_hash_entry *eh;
8809 struct adjust_toc_info *toc_inf = (struct adjust_toc_info *) inf;
854b41e7 8810 unsigned long i;
c5614fa4 8811
c5614fa4
AM
8812 if (h->root.type != bfd_link_hash_defined
8813 && h->root.type != bfd_link_hash_defweak)
8814 return TRUE;
8815
8816 eh = (struct ppc_link_hash_entry *) h;
8817 if (eh->adjust_done)
8818 return TRUE;
8819
8820 if (eh->elf.root.u.def.section == toc_inf->toc)
8821 {
854b41e7
AM
8822 if (eh->elf.root.u.def.value > toc_inf->toc->rawsize)
8823 i = toc_inf->toc->rawsize >> 3;
c5614fa4 8824 else
854b41e7
AM
8825 i = eh->elf.root.u.def.value >> 3;
8826
ba761f19 8827 if ((toc_inf->skip[i] & (ref_from_discarded | can_optimize)) != 0)
c5614fa4
AM
8828 {
8829 (*_bfd_error_handler)
854b41e7
AM
8830 (_("%s defined on removed toc entry"), eh->elf.root.root.string);
8831 do
8832 ++i;
ba761f19 8833 while ((toc_inf->skip[i] & (ref_from_discarded | can_optimize)) != 0);
854b41e7 8834 eh->elf.root.u.def.value = (bfd_vma) i << 3;
c5614fa4 8835 }
854b41e7
AM
8836
8837 eh->elf.root.u.def.value -= toc_inf->skip[i];
c5614fa4
AM
8838 eh->adjust_done = 1;
8839 }
8840 else if (strcmp (eh->elf.root.u.def.section->name, ".toc") == 0)
8841 toc_inf->global_toc_syms = TRUE;
8842
8843 return TRUE;
8844}
8845
560c8763
AM
8846/* Return TRUE iff INSN is one we expect on a _LO variety toc/got reloc. */
8847
8848static bfd_boolean
8849ok_lo_toc_insn (unsigned int insn)
8850{
8851 return ((insn & (0x3f << 26)) == 14u << 26 /* addi */
8852 || (insn & (0x3f << 26)) == 32u << 26 /* lwz */
8853 || (insn & (0x3f << 26)) == 34u << 26 /* lbz */
8854 || (insn & (0x3f << 26)) == 36u << 26 /* stw */
8855 || (insn & (0x3f << 26)) == 38u << 26 /* stb */
8856 || (insn & (0x3f << 26)) == 40u << 26 /* lhz */
8857 || (insn & (0x3f << 26)) == 42u << 26 /* lha */
8858 || (insn & (0x3f << 26)) == 44u << 26 /* sth */
8859 || (insn & (0x3f << 26)) == 46u << 26 /* lmw */
8860 || (insn & (0x3f << 26)) == 47u << 26 /* stmw */
8861 || (insn & (0x3f << 26)) == 48u << 26 /* lfs */
8862 || (insn & (0x3f << 26)) == 50u << 26 /* lfd */
8863 || (insn & (0x3f << 26)) == 52u << 26 /* stfs */
8864 || (insn & (0x3f << 26)) == 54u << 26 /* stfd */
8865 || ((insn & (0x3f << 26)) == 58u << 26 /* lwa,ld,lmd */
8866 && (insn & 3) != 1)
8867 || ((insn & (0x3f << 26)) == 62u << 26 /* std, stmd */
8868 && ((insn & 3) == 0 || (insn & 3) == 3))
8869 || (insn & (0x3f << 26)) == 12u << 26 /* addic */);
8870}
8871
c5614fa4
AM
8872/* Examine all relocs referencing .toc sections in order to remove
8873 unused .toc entries. */
8874
8875bfd_boolean
33c0ec9d 8876ppc64_elf_edit_toc (struct bfd_link_info *info)
c5614fa4
AM
8877{
8878 bfd *ibfd;
8879 struct adjust_toc_info toc_inf;
67f0cbdb 8880 struct ppc_link_hash_table *htab = ppc_hash_table (info);
c5614fa4 8881
67f0cbdb 8882 htab->do_toc_opt = 1;
c5614fa4 8883 toc_inf.global_toc_syms = TRUE;
c72f2fb2 8884 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
c5614fa4
AM
8885 {
8886 asection *toc, *sec;
8887 Elf_Internal_Shdr *symtab_hdr;
8888 Elf_Internal_Sym *local_syms;
425b145b 8889 Elf_Internal_Rela *relstart, *rel, *toc_relocs;
c5614fa4
AM
8890 unsigned long *skip, *drop;
8891 unsigned char *used;
8892 unsigned char *keep, last, some_unused;
8893
854b41e7
AM
8894 if (!is_ppc64_elf (ibfd))
8895 continue;
8896
c5614fa4
AM
8897 toc = bfd_get_section_by_name (ibfd, ".toc");
8898 if (toc == NULL
92b7a70f 8899 || toc->size == 0
dbaa2011
AM
8900 || toc->sec_info_type == SEC_INFO_TYPE_JUST_SYMS
8901 || discarded_section (toc))
c5614fa4
AM
8902 continue;
8903
425b145b 8904 toc_relocs = NULL;
c5614fa4 8905 local_syms = NULL;
0ffa91dd 8906 symtab_hdr = &elf_symtab_hdr (ibfd);
c5614fa4
AM
8907
8908 /* Look at sections dropped from the final link. */
8909 skip = NULL;
8910 relstart = NULL;
8911 for (sec = ibfd->sections; sec != NULL; sec = sec->next)
8912 {
8913 if (sec->reloc_count == 0
dbaa2011 8914 || !discarded_section (sec)
c5614fa4
AM
8915 || get_opd_info (sec)
8916 || (sec->flags & SEC_ALLOC) == 0
8917 || (sec->flags & SEC_DEBUGGING) != 0)
8918 continue;
8919
8920 relstart = _bfd_elf_link_read_relocs (ibfd, sec, NULL, NULL, FALSE);
8921 if (relstart == NULL)
8922 goto error_ret;
8923
8924 /* Run through the relocs to see which toc entries might be
8925 unused. */
8926 for (rel = relstart; rel < relstart + sec->reloc_count; ++rel)
8927 {
8928 enum elf_ppc64_reloc_type r_type;
8929 unsigned long r_symndx;
8930 asection *sym_sec;
8931 struct elf_link_hash_entry *h;
8932 Elf_Internal_Sym *sym;
8933 bfd_vma val;
8934
8935 r_type = ELF64_R_TYPE (rel->r_info);
8936 switch (r_type)
8937 {
8938 default:
8939 continue;
8940
8941 case R_PPC64_TOC16:
8942 case R_PPC64_TOC16_LO:
8943 case R_PPC64_TOC16_HI:
8944 case R_PPC64_TOC16_HA:
8945 case R_PPC64_TOC16_DS:
8946 case R_PPC64_TOC16_LO_DS:
8947 break;
8948 }
8949
8950 r_symndx = ELF64_R_SYM (rel->r_info);
8951 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms,
8952 r_symndx, ibfd))
8953 goto error_ret;
8954
8955 if (sym_sec != toc)
8956 continue;
8957
8958 if (h != NULL)
8959 val = h->root.u.def.value;
8960 else
8961 val = sym->st_value;
8962 val += rel->r_addend;
8963
8964 if (val >= toc->size)
8965 continue;
8966
8967 /* Anything in the toc ought to be aligned to 8 bytes.
8968 If not, don't mark as unused. */
8969 if (val & 7)
8970 continue;
8971
8972 if (skip == NULL)
8973 {
854b41e7 8974 skip = bfd_zmalloc (sizeof (*skip) * (toc->size + 15) / 8);
c5614fa4
AM
8975 if (skip == NULL)
8976 goto error_ret;
8977 }
8978
ba761f19 8979 skip[val >> 3] = ref_from_discarded;
c5614fa4
AM
8980 }
8981
8982 if (elf_section_data (sec)->relocs != relstart)
8983 free (relstart);
8984 }
8985
ba761f19
AM
8986 /* For largetoc loads of address constants, we can convert
8987 . addis rx,2,addr@got@ha
8988 . ld ry,addr@got@l(rx)
8989 to
8990 . addis rx,2,addr@toc@ha
8991 . addi ry,rx,addr@toc@l
8992 when addr is within 2G of the toc pointer. This then means
8993 that the word storing "addr" in the toc is no longer needed. */
68ffbac6 8994
ba761f19
AM
8995 if (!ppc64_elf_tdata (ibfd)->has_small_toc_reloc
8996 && toc->output_section->rawsize < (bfd_vma) 1 << 31
8997 && toc->reloc_count != 0)
8998 {
8999 /* Read toc relocs. */
425b145b
AM
9000 toc_relocs = _bfd_elf_link_read_relocs (ibfd, toc, NULL, NULL,
9001 info->keep_memory);
9002 if (toc_relocs == NULL)
ba761f19
AM
9003 goto error_ret;
9004
425b145b 9005 for (rel = toc_relocs; rel < toc_relocs + toc->reloc_count; ++rel)
ba761f19
AM
9006 {
9007 enum elf_ppc64_reloc_type r_type;
9008 unsigned long r_symndx;
9009 asection *sym_sec;
9010 struct elf_link_hash_entry *h;
9011 Elf_Internal_Sym *sym;
9012 bfd_vma val, addr;
9013
9014 r_type = ELF64_R_TYPE (rel->r_info);
9015 if (r_type != R_PPC64_ADDR64)
9016 continue;
9017
9018 r_symndx = ELF64_R_SYM (rel->r_info);
9019 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms,
9020 r_symndx, ibfd))
9021 goto error_ret;
9022
425b145b 9023 if (sym_sec == NULL
c27b8c2a 9024 || sym_sec->output_section == NULL
dbaa2011 9025 || discarded_section (sym_sec))
425b145b
AM
9026 continue;
9027
afe397ea 9028 if (!SYMBOL_REFERENCES_LOCAL (info, h))
ba761f19
AM
9029 continue;
9030
9031 if (h != NULL)
bddc25c9
AM
9032 {
9033 if (h->type == STT_GNU_IFUNC)
9034 continue;
9035 val = h->root.u.def.value;
9036 }
ba761f19 9037 else
bddc25c9
AM
9038 {
9039 if (ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC)
9040 continue;
9041 val = sym->st_value;
9042 }
ba761f19
AM
9043 val += rel->r_addend;
9044 val += sym_sec->output_section->vma + sym_sec->output_offset;
9045
9046 /* We don't yet know the exact toc pointer value, but we
9047 know it will be somewhere in the toc section. Don't
9048 optimize if the difference from any possible toc
9049 pointer is outside [ff..f80008000, 7fff7fff]. */
9050 addr = toc->output_section->vma + TOC_BASE_OFF;
9051 if (val - addr + (bfd_vma) 0x80008000 >= (bfd_vma) 1 << 32)
9052 continue;
9053
9054 addr = toc->output_section->vma + toc->output_section->rawsize;
9055 if (val - addr + (bfd_vma) 0x80008000 >= (bfd_vma) 1 << 32)
9056 continue;
9057
9058 if (skip == NULL)
9059 {
9060 skip = bfd_zmalloc (sizeof (*skip) * (toc->size + 15) / 8);
9061 if (skip == NULL)
9062 goto error_ret;
9063 }
9064
9065 skip[rel->r_offset >> 3]
425b145b 9066 |= can_optimize | ((rel - toc_relocs) << 2);
ba761f19 9067 }
ba761f19
AM
9068 }
9069
c5614fa4
AM
9070 if (skip == NULL)
9071 continue;
9072
9073 used = bfd_zmalloc (sizeof (*used) * (toc->size + 7) / 8);
9074 if (used == NULL)
9075 {
9076 error_ret:
9077 if (local_syms != NULL
9078 && symtab_hdr->contents != (unsigned char *) local_syms)
9079 free (local_syms);
9080 if (sec != NULL
9081 && relstart != NULL
9082 && elf_section_data (sec)->relocs != relstart)
9083 free (relstart);
425b145b
AM
9084 if (toc_relocs != NULL
9085 && elf_section_data (toc)->relocs != toc_relocs)
9086 free (toc_relocs);
c5614fa4
AM
9087 if (skip != NULL)
9088 free (skip);
9089 return FALSE;
9090 }
9091
30038c59
AM
9092 /* Now check all kept sections that might reference the toc.
9093 Check the toc itself last. */
9094 for (sec = (ibfd->sections == toc && toc->next ? toc->next
9095 : ibfd->sections);
c5614fa4 9096 sec != NULL;
c5614fa4 9097 sec = (sec == toc ? NULL
c5614fa4 9098 : sec->next == NULL ? toc
30038c59 9099 : sec->next == toc && toc->next ? toc->next
c5614fa4
AM
9100 : sec->next))
9101 {
9102 int repeat;
9103
9104 if (sec->reloc_count == 0
dbaa2011 9105 || discarded_section (sec)
c5614fa4
AM
9106 || get_opd_info (sec)
9107 || (sec->flags & SEC_ALLOC) == 0
9108 || (sec->flags & SEC_DEBUGGING) != 0)
9109 continue;
9110
854b41e7
AM
9111 relstart = _bfd_elf_link_read_relocs (ibfd, sec, NULL, NULL,
9112 info->keep_memory);
c5614fa4 9113 if (relstart == NULL)
2915c55b
JK
9114 {
9115 free (used);
9116 goto error_ret;
9117 }
c5614fa4
AM
9118
9119 /* Mark toc entries referenced as used. */
c5614fa4 9120 do
d4f1ee75
AM
9121 {
9122 repeat = 0;
9123 for (rel = relstart; rel < relstart + sec->reloc_count; ++rel)
9124 {
9125 enum elf_ppc64_reloc_type r_type;
9126 unsigned long r_symndx;
9127 asection *sym_sec;
9128 struct elf_link_hash_entry *h;
9129 Elf_Internal_Sym *sym;
9130 bfd_vma val;
9131 enum {no_check, check_lo, check_ha} insn_check;
98528052 9132
d4f1ee75
AM
9133 r_type = ELF64_R_TYPE (rel->r_info);
9134 switch (r_type)
9135 {
9136 default:
9137 insn_check = no_check;
9138 break;
98528052 9139
d4f1ee75
AM
9140 case R_PPC64_GOT_TLSLD16_HA:
9141 case R_PPC64_GOT_TLSGD16_HA:
9142 case R_PPC64_GOT_TPREL16_HA:
9143 case R_PPC64_GOT_DTPREL16_HA:
9144 case R_PPC64_GOT16_HA:
9145 case R_PPC64_TOC16_HA:
9146 insn_check = check_ha;
9147 break;
98528052 9148
d4f1ee75
AM
9149 case R_PPC64_GOT_TLSLD16_LO:
9150 case R_PPC64_GOT_TLSGD16_LO:
9151 case R_PPC64_GOT_TPREL16_LO_DS:
9152 case R_PPC64_GOT_DTPREL16_LO_DS:
9153 case R_PPC64_GOT16_LO:
9154 case R_PPC64_GOT16_LO_DS:
9155 case R_PPC64_TOC16_LO:
9156 case R_PPC64_TOC16_LO_DS:
9157 insn_check = check_lo;
9158 break;
9159 }
560c8763 9160
d4f1ee75
AM
9161 if (insn_check != no_check)
9162 {
9163 bfd_vma off = rel->r_offset & ~3;
9164 unsigned char buf[4];
9165 unsigned int insn;
c5614fa4 9166
d4f1ee75
AM
9167 if (!bfd_get_section_contents (ibfd, sec, buf, off, 4))
9168 {
9169 free (used);
9170 goto error_ret;
9171 }
9172 insn = bfd_get_32 (ibfd, buf);
9173 if (insn_check == check_lo
9174 ? !ok_lo_toc_insn (insn)
9175 : ((insn & ((0x3f << 26) | 0x1f << 16))
9176 != ((15u << 26) | (2 << 16)) /* addis rt,2,imm */))
9177 {
9178 char str[12];
9179
9180 ppc64_elf_tdata (ibfd)->unexpected_toc_insn = 1;
9181 sprintf (str, "%#08x", insn);
9182 info->callbacks->einfo
9183 (_("%P: %H: toc optimization is not supported for"
9184 " %s instruction.\n"),
9185 ibfd, sec, rel->r_offset & ~3, str);
9186 }
9187 }
c5614fa4 9188
d4f1ee75
AM
9189 switch (r_type)
9190 {
9191 case R_PPC64_TOC16:
9192 case R_PPC64_TOC16_LO:
9193 case R_PPC64_TOC16_HI:
9194 case R_PPC64_TOC16_HA:
9195 case R_PPC64_TOC16_DS:
9196 case R_PPC64_TOC16_LO_DS:
9197 /* In case we're taking addresses of toc entries. */
9198 case R_PPC64_ADDR64:
9199 break;
c5614fa4 9200
d4f1ee75
AM
9201 default:
9202 continue;
9203 }
c5614fa4 9204
d4f1ee75
AM
9205 r_symndx = ELF64_R_SYM (rel->r_info);
9206 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms,
9207 r_symndx, ibfd))
9208 {
9209 free (used);
9210 goto error_ret;
9211 }
c5614fa4 9212
d4f1ee75
AM
9213 if (sym_sec != toc)
9214 continue;
c5614fa4 9215
d4f1ee75
AM
9216 if (h != NULL)
9217 val = h->root.u.def.value;
9218 else
9219 val = sym->st_value;
9220 val += rel->r_addend;
ba761f19 9221
d4f1ee75
AM
9222 if (val >= toc->size)
9223 continue;
ba761f19 9224
d4f1ee75
AM
9225 if ((skip[val >> 3] & can_optimize) != 0)
9226 {
9227 bfd_vma off;
9228 unsigned char opc;
9229
9230 switch (r_type)
9231 {
9232 case R_PPC64_TOC16_HA:
ba761f19 9233 break;
ba761f19 9234
d4f1ee75
AM
9235 case R_PPC64_TOC16_LO_DS:
9236 off = rel->r_offset;
9237 off += (bfd_big_endian (ibfd) ? -2 : 3);
9238 if (!bfd_get_section_contents (ibfd, sec, &opc,
9239 off, 1))
9240 {
9241 free (used);
9242 goto error_ret;
9243 }
9244 if ((opc & (0x3f << 2)) == (58u << 2))
9245 break;
9246 /* Fall thru */
ba761f19 9247
d4f1ee75
AM
9248 default:
9249 /* Wrong sort of reloc, or not a ld. We may
9250 as well clear ref_from_discarded too. */
9251 skip[val >> 3] = 0;
9252 }
9253 }
9254
9255 if (sec != toc)
9256 used[val >> 3] = 1;
9257 /* For the toc section, we only mark as used if this
9258 entry itself isn't unused. */
9259 else if ((used[rel->r_offset >> 3]
9260 || !(skip[rel->r_offset >> 3] & ref_from_discarded))
9261 && !used[val >> 3])
9262 {
9263 /* Do all the relocs again, to catch reference
9264 chains. */
9265 repeat = 1;
9266 used[val >> 3] = 1;
9267 }
9268 }
9269 }
c5614fa4 9270 while (repeat);
854b41e7
AM
9271
9272 if (elf_section_data (sec)->relocs != relstart)
9273 free (relstart);
c5614fa4
AM
9274 }
9275
9276 /* Merge the used and skip arrays. Assume that TOC
9277 doublewords not appearing as either used or unused belong
9278 to to an entry more than one doubleword in size. */
9279 for (drop = skip, keep = used, last = 0, some_unused = 0;
9280 drop < skip + (toc->size + 7) / 8;
9281 ++drop, ++keep)
9282 {
9283 if (*keep)
9284 {
ba761f19
AM
9285 *drop &= ~ref_from_discarded;
9286 if ((*drop & can_optimize) != 0)
9287 some_unused = 1;
c5614fa4
AM
9288 last = 0;
9289 }
b140b010 9290 else if ((*drop & ref_from_discarded) != 0)
c5614fa4
AM
9291 {
9292 some_unused = 1;
ba761f19 9293 last = ref_from_discarded;
c5614fa4
AM
9294 }
9295 else
9296 *drop = last;
9297 }
9298
9299 free (used);
9300
9301 if (some_unused)
9302 {
9303 bfd_byte *contents, *src;
9304 unsigned long off;
d62b3684 9305 Elf_Internal_Sym *sym;
ba761f19 9306 bfd_boolean local_toc_syms = FALSE;
c5614fa4
AM
9307
9308 /* Shuffle the toc contents, and at the same time convert the
9309 skip array from booleans into offsets. */
9310 if (!bfd_malloc_and_get_section (ibfd, toc, &contents))
9311 goto error_ret;
9312
9313 elf_section_data (toc)->this_hdr.contents = contents;
9314
9315 for (src = contents, off = 0, drop = skip;
9316 src < contents + toc->size;
9317 src += 8, ++drop)
9318 {
ba761f19
AM
9319 if ((*drop & (can_optimize | ref_from_discarded)) != 0)
9320 off += 8;
c5614fa4
AM
9321 else if (off != 0)
9322 {
9323 *drop = off;
9324 memcpy (src - off, src, 8);
9325 }
9326 }
854b41e7 9327 *drop = off;
c5614fa4
AM
9328 toc->rawsize = toc->size;
9329 toc->size = src - contents - off;
9330
ba761f19
AM
9331 /* Adjust addends for relocs against the toc section sym,
9332 and optimize any accesses we can. */
c5614fa4
AM
9333 for (sec = ibfd->sections; sec != NULL; sec = sec->next)
9334 {
9335 if (sec->reloc_count == 0
dbaa2011 9336 || discarded_section (sec))
c5614fa4
AM
9337 continue;
9338
9339 relstart = _bfd_elf_link_read_relocs (ibfd, sec, NULL, NULL,
854b41e7 9340 info->keep_memory);
c5614fa4
AM
9341 if (relstart == NULL)
9342 goto error_ret;
9343
9344 for (rel = relstart; rel < relstart + sec->reloc_count; ++rel)
9345 {
9346 enum elf_ppc64_reloc_type r_type;
9347 unsigned long r_symndx;
9348 asection *sym_sec;
9349 struct elf_link_hash_entry *h;
854b41e7 9350 bfd_vma val;
c5614fa4
AM
9351
9352 r_type = ELF64_R_TYPE (rel->r_info);
9353 switch (r_type)
9354 {
9355 default:
9356 continue;
9357
9358 case R_PPC64_TOC16:
9359 case R_PPC64_TOC16_LO:
9360 case R_PPC64_TOC16_HI:
9361 case R_PPC64_TOC16_HA:
9362 case R_PPC64_TOC16_DS:
9363 case R_PPC64_TOC16_LO_DS:
9364 case R_PPC64_ADDR64:
9365 break;
9366 }
9367
9368 r_symndx = ELF64_R_SYM (rel->r_info);
9369 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms,
9370 r_symndx, ibfd))
9371 goto error_ret;
9372
ba761f19 9373 if (sym_sec != toc)
c5614fa4
AM
9374 continue;
9375
ba761f19
AM
9376 if (h != NULL)
9377 val = h->root.u.def.value;
9378 else
9379 {
9380 val = sym->st_value;
9381 if (val != 0)
9382 local_toc_syms = TRUE;
9383 }
9384
9385 val += rel->r_addend;
854b41e7
AM
9386
9387 if (val > toc->rawsize)
9388 val = toc->rawsize;
ba761f19
AM
9389 else if ((skip[val >> 3] & ref_from_discarded) != 0)
9390 continue;
9391 else if ((skip[val >> 3] & can_optimize) != 0)
9392 {
9393 Elf_Internal_Rela *tocrel
425b145b 9394 = toc_relocs + (skip[val >> 3] >> 2);
ba761f19
AM
9395 unsigned long tsym = ELF64_R_SYM (tocrel->r_info);
9396
9397 switch (r_type)
9398 {
9399 case R_PPC64_TOC16_HA:
9400 rel->r_info = ELF64_R_INFO (tsym, R_PPC64_TOC16_HA);
9401 break;
9402
9403 case R_PPC64_TOC16_LO_DS:
9404 rel->r_info = ELF64_R_INFO (tsym, R_PPC64_LO_DS_OPT);
9405 break;
9406
9407 default:
28942f62
AM
9408 if (!ppc64_elf_howto_table[R_PPC64_ADDR32])
9409 ppc_howto_init ();
b140b010 9410 info->callbacks->einfo
bc30df16 9411 (_("%P: %H: %s references "
b140b010
AM
9412 "optimized away TOC entry\n"),
9413 ibfd, sec, rel->r_offset,
9414 ppc64_elf_howto_table[r_type]->name);
9415 bfd_set_error (bfd_error_bad_value);
9416 goto error_ret;
ba761f19
AM
9417 }
9418 rel->r_addend = tocrel->r_addend;
9419 elf_section_data (sec)->relocs = relstart;
9420 continue;
9421 }
9422
9423 if (h != NULL || sym->st_value != 0)
9424 continue;
854b41e7
AM
9425
9426 rel->r_addend -= skip[val >> 3];
9427 elf_section_data (sec)->relocs = relstart;
c5614fa4 9428 }
854b41e7
AM
9429
9430 if (elf_section_data (sec)->relocs != relstart)
9431 free (relstart);
c5614fa4
AM
9432 }
9433
9434 /* We shouldn't have local or global symbols defined in the TOC,
9435 but handle them anyway. */
df22d223
AM
9436 if (local_syms != NULL)
9437 for (sym = local_syms;
9438 sym < local_syms + symtab_hdr->sh_info;
9439 ++sym)
9440 if (sym->st_value != 0
9441 && bfd_section_from_elf_index (ibfd, sym->st_shndx) == toc)
9442 {
9443 unsigned long i;
854b41e7 9444
df22d223
AM
9445 if (sym->st_value > toc->rawsize)
9446 i = toc->rawsize >> 3;
9447 else
9448 i = sym->st_value >> 3;
854b41e7 9449
df22d223
AM
9450 if ((skip[i] & (ref_from_discarded | can_optimize)) != 0)
9451 {
9452 if (local_toc_syms)
9453 (*_bfd_error_handler)
9454 (_("%s defined on removed toc entry"),
9455 bfd_elf_sym_name (ibfd, symtab_hdr, sym, NULL));
9456 do
9457 ++i;
9458 while ((skip[i] & (ref_from_discarded | can_optimize)));
9459 sym->st_value = (bfd_vma) i << 3;
9460 }
d62b3684 9461
df22d223
AM
9462 sym->st_value -= skip[i];
9463 symtab_hdr->contents = (unsigned char *) local_syms;
9464 }
c5614fa4 9465
854b41e7 9466 /* Adjust any global syms defined in this toc input section. */
c5614fa4
AM
9467 if (toc_inf.global_toc_syms)
9468 {
9469 toc_inf.toc = toc;
9470 toc_inf.skip = skip;
9471 toc_inf.global_toc_syms = FALSE;
9472 elf_link_hash_traverse (elf_hash_table (info), adjust_toc_syms,
9473 &toc_inf);
9474 }
854b41e7
AM
9475
9476 if (toc->reloc_count != 0)
9477 {
d4730f92 9478 Elf_Internal_Shdr *rel_hdr;
854b41e7
AM
9479 Elf_Internal_Rela *wrel;
9480 bfd_size_type sz;
9481
854b41e7 9482 /* Remove unused toc relocs, and adjust those we keep. */
28be611c
AM
9483 if (toc_relocs == NULL)
9484 toc_relocs = _bfd_elf_link_read_relocs (ibfd, toc, NULL, NULL,
9485 info->keep_memory);
9486 if (toc_relocs == NULL)
9487 goto error_ret;
9488
425b145b
AM
9489 wrel = toc_relocs;
9490 for (rel = toc_relocs; rel < toc_relocs + toc->reloc_count; ++rel)
ba761f19
AM
9491 if ((skip[rel->r_offset >> 3]
9492 & (ref_from_discarded | can_optimize)) == 0)
854b41e7
AM
9493 {
9494 wrel->r_offset = rel->r_offset - skip[rel->r_offset >> 3];
9495 wrel->r_info = rel->r_info;
9496 wrel->r_addend = rel->r_addend;
9497 ++wrel;
9498 }
9499 else if (!dec_dynrel_count (rel->r_info, toc, info,
9500 &local_syms, NULL, NULL))
9501 goto error_ret;
9502
425b145b
AM
9503 elf_section_data (toc)->relocs = toc_relocs;
9504 toc->reloc_count = wrel - toc_relocs;
d4730f92
BS
9505 rel_hdr = _bfd_elf_single_rel_hdr (toc);
9506 sz = rel_hdr->sh_entsize;
9507 rel_hdr->sh_size = toc->reloc_count * sz;
854b41e7 9508 }
c5614fa4 9509 }
28be611c
AM
9510 else if (toc_relocs != NULL
9511 && elf_section_data (toc)->relocs != toc_relocs)
425b145b 9512 free (toc_relocs);
c5614fa4
AM
9513
9514 if (local_syms != NULL
9515 && symtab_hdr->contents != (unsigned char *) local_syms)
9516 {
9517 if (!info->keep_memory)
9518 free (local_syms);
9519 else
9520 symtab_hdr->contents = (unsigned char *) local_syms;
9521 }
9522 free (skip);
9523 }
9524
9525 return TRUE;
9526}
9527
1bbe0902
AM
9528/* Return true iff input section I references the TOC using
9529 instructions limited to +/-32k offsets. */
9530
9531bfd_boolean
9532ppc64_elf_has_small_toc_reloc (asection *i)
9533{
9534 return (is_ppc64_elf (i->owner)
9535 && ppc64_elf_tdata (i->owner)->has_small_toc_reloc);
9536}
9537
927be08e
AM
9538/* Allocate space for one GOT entry. */
9539
9540static void
9541allocate_got (struct elf_link_hash_entry *h,
9542 struct bfd_link_info *info,
9543 struct got_entry *gent)
9544{
9545 struct ppc_link_hash_table *htab = ppc_hash_table (info);
9546 bfd_boolean dyn;
9547 struct ppc_link_hash_entry *eh = (struct ppc_link_hash_entry *) h;
9548 int entsize = (gent->tls_type & eh->tls_mask & (TLS_GD | TLS_LD)
9549 ? 16 : 8);
9550 int rentsize = (gent->tls_type & eh->tls_mask & TLS_GD
9551 ? 2 : 1) * sizeof (Elf64_External_Rela);
9552 asection *got = ppc64_elf_tdata (gent->owner)->got;
9553
9554 gent->got.offset = got->size;
9555 got->size += entsize;
9556
9557 dyn = htab->elf.dynamic_sections_created;
19e08130 9558 if (h->type == STT_GNU_IFUNC)
927be08e 9559 {
33e44f2e 9560 htab->elf.irelplt->size += rentsize;
19e08130 9561 htab->got_reli_size += rentsize;
927be08e 9562 }
0e1862bb 9563 else if ((bfd_link_pic (info)
19e08130
AM
9564 || WILL_CALL_FINISH_DYNAMIC_SYMBOL (dyn, 0, h))
9565 && (ELF_ST_VISIBILITY (h->other) == STV_DEFAULT
9566 || h->root.type != bfd_link_hash_undefweak))
927be08e 9567 {
19e08130 9568 asection *relgot = ppc64_elf_tdata (gent->owner)->relgot;
927be08e 9569 relgot->size += rentsize;
927be08e
AM
9570 }
9571}
9572
7865406b
AM
9573/* This function merges got entries in the same toc group. */
9574
9575static void
9576merge_got_entries (struct got_entry **pent)
9577{
9578 struct got_entry *ent, *ent2;
9579
9580 for (ent = *pent; ent != NULL; ent = ent->next)
9581 if (!ent->is_indirect)
9582 for (ent2 = ent->next; ent2 != NULL; ent2 = ent2->next)
9583 if (!ent2->is_indirect
9584 && ent2->addend == ent->addend
9585 && ent2->tls_type == ent->tls_type
9586 && elf_gp (ent2->owner) == elf_gp (ent->owner))
9587 {
9588 ent2->is_indirect = TRUE;
9589 ent2->got.ent = ent;
9590 }
9591}
9592
65f38f15
AM
9593/* Allocate space in .plt, .got and associated reloc sections for
9594 dynamic relocs. */
5bd4f169 9595
b34976b6 9596static bfd_boolean
4ce794b7 9597allocate_dynrelocs (struct elf_link_hash_entry *h, void *inf)
5bd4f169 9598{
65f38f15
AM
9599 struct bfd_link_info *info;
9600 struct ppc_link_hash_table *htab;
5bd4f169 9601 asection *s;
65f38f15 9602 struct ppc_link_hash_entry *eh;
0b8bcf0d 9603 struct got_entry **pgent, *gent;
5bd4f169 9604
e92d460e 9605 if (h->root.type == bfd_link_hash_indirect)
b34976b6 9606 return TRUE;
5bd4f169 9607
65f38f15
AM
9608 info = (struct bfd_link_info *) inf;
9609 htab = ppc_hash_table (info);
4dfe6ac6
NC
9610 if (htab == NULL)
9611 return FALSE;
5bd4f169 9612
951fd09b
AM
9613 eh = (struct ppc_link_hash_entry *) h;
9614 /* Run through the TLS GD got entries first if we're changing them
9615 to TPREL. */
e7b938ca 9616 if ((eh->tls_mask & TLS_TPRELGD) != 0)
951fd09b
AM
9617 for (gent = h->got.glist; gent != NULL; gent = gent->next)
9618 if (gent->got.refcount > 0
9619 && (gent->tls_type & TLS_GD) != 0)
9620 {
9621 /* This was a GD entry that has been converted to TPREL. If
9622 there happens to be a TPREL entry we can use that one. */
9623 struct got_entry *ent;
9624 for (ent = h->got.glist; ent != NULL; ent = ent->next)
9625 if (ent->got.refcount > 0
9626 && (ent->tls_type & TLS_TPREL) != 0
e717da7e
AM
9627 && ent->addend == gent->addend
9628 && ent->owner == gent->owner)
951fd09b
AM
9629 {
9630 gent->got.refcount = 0;
9631 break;
9632 }
9633
9634 /* If not, then we'll be using our own TPREL entry. */
9635 if (gent->got.refcount != 0)
9636 gent->tls_type = TLS_TLS | TLS_TPREL;
9637 }
9638
7865406b
AM
9639 /* Remove any list entry that won't generate a word in the GOT before
9640 we call merge_got_entries. Otherwise we risk merging to empty
9641 entries. */
0b8bcf0d
AM
9642 pgent = &h->got.glist;
9643 while ((gent = *pgent) != NULL)
411e1bfb 9644 if (gent->got.refcount > 0)
7865406b
AM
9645 {
9646 if ((gent->tls_type & TLS_LD) != 0
9647 && !h->def_dynamic)
9648 {
9649 ppc64_tlsld_got (gent->owner)->got.refcount += 1;
9650 *pgent = gent->next;
9651 }
9652 else
9653 pgent = &gent->next;
9654 }
9655 else
9656 *pgent = gent->next;
9657
9658 if (!htab->do_multi_toc)
9659 merge_got_entries (&h->got.glist);
9660
9661 for (gent = h->got.glist; gent != NULL; gent = gent->next)
9662 if (!gent->is_indirect)
411e1bfb
AM
9663 {
9664 /* Make sure this symbol is output as a dynamic symbol.
951fd09b
AM
9665 Undefined weak syms won't yet be marked as dynamic,
9666 nor will all TLS symbols. */
411e1bfb 9667 if (h->dynindx == -1
b099ab9f 9668 && !h->forced_local
25f23106 9669 && h->type != STT_GNU_IFUNC
b099ab9f 9670 && htab->elf.dynamic_sections_created)
411e1bfb 9671 {
c152c796 9672 if (! bfd_elf_link_record_dynamic_symbol (info, h))
411e1bfb
AM
9673 return FALSE;
9674 }
65f38f15 9675
0c8d6e5c 9676 if (!is_ppc64_elf (gent->owner))
927be08e 9677 abort ();
0ffa91dd 9678
927be08e 9679 allocate_got (h, info, gent);
411e1bfb 9680 }
65f38f15 9681
8a2058b5
AM
9682 if (!htab->elf.dynamic_sections_created
9683 && h->type != STT_GNU_IFUNC)
9684 eh->dyn_relocs = NULL;
9685
9686 if (eh->dyn_relocs != NULL)
65f38f15 9687 {
8a2058b5
AM
9688 struct elf_dyn_relocs *p, **pp;
9689
57e7d118
AM
9690 /* In the shared -Bsymbolic case, discard space allocated for
9691 dynamic pc-relative relocs against symbols which turn out to
9692 be defined in regular objects. For the normal shared case,
9693 discard space for relocs that have become local due to symbol
9694 visibility changes. */
9695
9696 if (bfd_link_pic (info))
65f38f15 9697 {
57e7d118
AM
9698 /* Relocs that use pc_count are those that appear on a call
9699 insn, or certain REL relocs (see must_be_dyn_reloc) that
9700 can be generated via assembly. We want calls to
9701 protected symbols to resolve directly to the function
9702 rather than going via the plt. If people want function
9703 pointer comparisons to work as expected then they should
9704 avoid writing weird assembly. */
9705 if (SYMBOL_CALLS_LOCAL (info, h))
9706 {
57e7d118
AM
9707 for (pp = &eh->dyn_relocs; (p = *pp) != NULL; )
9708 {
9709 p->count -= p->pc_count;
9710 p->pc_count = 0;
9711 if (p->count == 0)
9712 *pp = p->next;
9713 else
9714 pp = &p->next;
9715 }
9716 }
65f38f15 9717
57e7d118
AM
9718 /* Also discard relocs on undefined weak syms with
9719 non-default visibility. */
9720 if (eh->dyn_relocs != NULL
9721 && h->root.type == bfd_link_hash_undefweak)
5bd4f169 9722 {
57e7d118
AM
9723 if (ELF_ST_VISIBILITY (h->other) != STV_DEFAULT)
9724 eh->dyn_relocs = NULL;
9725
9726 /* Make sure this symbol is output as a dynamic symbol.
9727 Undefined weak syms won't yet be marked as dynamic. */
9728 else if (h->dynindx == -1
9729 && !h->forced_local)
9730 {
9731 if (! bfd_elf_link_record_dynamic_symbol (info, h))
9732 return FALSE;
9733 }
5bd4f169 9734 }
65f38f15 9735 }
57e7d118 9736 else if (h->type == STT_GNU_IFUNC)
dfbb6ac9 9737 {
8a2058b5
AM
9738 /* A plt entry is always created when making direct calls to
9739 an ifunc, even when building a static executable, but
9740 that doesn't cover all cases. We may have only an ifunc
9741 initialised function pointer for a given ifunc symbol.
9742
9743 For ELFv2, dynamic relocations are not required when
9744 generating a global entry PLT stub. */
9745 if (abiversion (info->output_bfd) >= 2)
9746 {
9747 if (global_entry_stub (h))
9748 eh->dyn_relocs = NULL;
9749 }
9750
9751 /* For ELFv1 we have function descriptors. Descriptors need
9752 to be treated like PLT entries and thus have dynamic
9753 relocations. One exception is when the function
9754 descriptor is copied into .dynbss (which should only
9755 happen with ancient versions of gcc). */
9756 else if (h->needs_copy)
dfbb6ac9 9757 eh->dyn_relocs = NULL;
57e7d118
AM
9758 }
9759 else if (ELIMINATE_COPY_RELOCS)
9760 {
8a2058b5 9761 /* For the non-pic case, discard space for relocs against
57e7d118
AM
9762 symbols which turn out to need copy relocs or are not
9763 dynamic. */
dfbb6ac9 9764
8a2058b5
AM
9765 /* First make sure this symbol is output as a dynamic symbol.
9766 Undefined weak syms won't yet be marked as dynamic. */
9767 if (h->root.type == bfd_link_hash_undefweak
9768 && !h->non_got_ref
9769 && !h->def_regular
9770 && h->dynindx == -1
9771 && !h->forced_local
9772 && !bfd_elf_link_record_dynamic_symbol (info, h))
9773 return FALSE;
57e7d118 9774
8a2058b5
AM
9775 if (h->non_got_ref
9776 || h->def_regular
9777 || h->dynindx == -1)
9778 eh->dyn_relocs = NULL;
57e7d118
AM
9779 }
9780
9781 /* Finally, allocate space. */
9782 for (p = eh->dyn_relocs; p != NULL; p = p->next)
9783 {
9784 asection *sreloc = elf_section_data (p->sec)->sreloc;
9785 if (eh->elf.type == STT_GNU_IFUNC)
9786 sreloc = htab->elf.irelplt;
9787 sreloc->size += p->count * sizeof (Elf64_External_Rela);
dfbb6ac9 9788 }
65f38f15 9789 }
57e7d118
AM
9790
9791 if ((htab->elf.dynamic_sections_created
9792 && h->dynindx != -1
9793 && WILL_CALL_FINISH_DYNAMIC_SYMBOL (1, bfd_link_pic (info), h))
9794 || h->type == STT_GNU_IFUNC)
65f38f15 9795 {
57e7d118
AM
9796 struct plt_entry *pent;
9797 bfd_boolean doneone = FALSE;
9798 for (pent = h->plt.plist; pent != NULL; pent = pent->next)
9799 if (pent->plt.refcount > 0)
9800 {
9801 if (!htab->elf.dynamic_sections_created
9802 || h->dynindx == -1)
9803 {
9804 s = htab->elf.iplt;
9805 pent->plt.offset = s->size;
9806 s->size += PLT_ENTRY_SIZE (htab);
9807 s = htab->elf.irelplt;
9808 }
9809 else
9810 {
9811 /* If this is the first .plt entry, make room for the special
9812 first entry. */
9813 s = htab->elf.splt;
9814 if (s->size == 0)
9815 s->size += PLT_INITIAL_ENTRY_SIZE (htab);
65f38f15 9816
57e7d118 9817 pent->plt.offset = s->size;
65f38f15 9818
57e7d118
AM
9819 /* Make room for this entry. */
9820 s->size += PLT_ENTRY_SIZE (htab);
65f38f15 9821
57e7d118
AM
9822 /* Make room for the .glink code. */
9823 s = htab->glink;
9824 if (s->size == 0)
9825 s->size += GLINK_CALL_STUB_SIZE;
9826 if (htab->opd_abi)
9827 {
9828 /* We need bigger stubs past index 32767. */
9829 if (s->size >= GLINK_CALL_STUB_SIZE + 32768*2*4)
9830 s->size += 4;
9831 s->size += 2*4;
9832 }
9833 else
9834 s->size += 4;
65f38f15 9835
57e7d118
AM
9836 /* We also need to make an entry in the .rela.plt section. */
9837 s = htab->elf.srelplt;
9838 }
9839 s->size += sizeof (Elf64_External_Rela);
9840 doneone = TRUE;
9841 }
9842 else
9843 pent->plt.offset = (bfd_vma) -1;
9844 if (!doneone)
9845 {
9846 h->plt.plist = NULL;
9847 h->needs_plt = 0;
9848 }
65f38f15 9849 }
57e7d118 9850 else
65f38f15 9851 {
57e7d118
AM
9852 h->plt.plist = NULL;
9853 h->needs_plt = 0;
65f38f15
AM
9854 }
9855
b34976b6 9856 return TRUE;
65f38f15
AM
9857}
9858
a345bc8d
AM
9859/* Called via elf_link_hash_traverse from ppc64_elf_size_dynamic_sections
9860 to set up space for global entry stubs. These are put in glink,
9861 after the branch table. */
65f38f15 9862
b34976b6 9863static bfd_boolean
a345bc8d 9864size_global_entry_stubs (struct elf_link_hash_entry *h, void *inf)
65f38f15 9865{
a345bc8d
AM
9866 struct bfd_link_info *info;
9867 struct ppc_link_hash_table *htab;
9868 struct plt_entry *pent;
9869 asection *s;
65f38f15 9870
a345bc8d
AM
9871 if (h->root.type == bfd_link_hash_indirect)
9872 return TRUE;
65f38f15 9873
a345bc8d
AM
9874 if (!h->pointer_equality_needed)
9875 return TRUE;
65f38f15 9876
a345bc8d
AM
9877 if (h->def_regular)
9878 return TRUE;
65f38f15 9879
a345bc8d
AM
9880 info = inf;
9881 htab = ppc_hash_table (info);
9882 if (htab == NULL)
9883 return FALSE;
9884
9885 s = htab->glink;
9886 for (pent = h->plt.plist; pent != NULL; pent = pent->next)
9887 if (pent->plt.offset != (bfd_vma) -1
9888 && pent->addend == 0)
9889 {
afe397ea
AM
9890 /* For ELFv2, if this symbol is not defined in a regular file
9891 and we are not generating a shared library or pie, then we
9892 need to define the symbol in the executable on a call stub.
9893 This is to avoid text relocations. */
a345bc8d 9894 s->size = (s->size + 15) & -16;
8a2058b5 9895 h->root.type = bfd_link_hash_defined;
afe397ea
AM
9896 h->root.u.def.section = s;
9897 h->root.u.def.value = s->size;
a345bc8d
AM
9898 s->size += 16;
9899 break;
9900 }
9901 return TRUE;
9902}
9903
9904/* Set DF_TEXTREL if we find any dynamic relocs that apply to
9905 read-only sections. */
9906
9907static bfd_boolean
9908maybe_set_textrel (struct elf_link_hash_entry *h, void *info)
9909{
9910 if (h->root.type == bfd_link_hash_indirect)
9911 return TRUE;
9912
9913 if (readonly_dynrelocs (h))
9914 {
9915 ((struct bfd_link_info *) info)->flags |= DF_TEXTREL;
9916
9917 /* Not an error, just cut short the traversal. */
9918 return FALSE;
65f38f15 9919 }
b34976b6 9920 return TRUE;
65f38f15
AM
9921}
9922
9923/* Set the sizes of the dynamic sections. */
9924
b34976b6 9925static bfd_boolean
ee67d69a 9926ppc64_elf_size_dynamic_sections (bfd *output_bfd,
4ce794b7 9927 struct bfd_link_info *info)
65f38f15
AM
9928{
9929 struct ppc_link_hash_table *htab;
9930 bfd *dynobj;
9931 asection *s;
b34976b6 9932 bfd_boolean relocs;
65f38f15 9933 bfd *ibfd;
7865406b 9934 struct got_entry *first_tlsld;
65f38f15
AM
9935
9936 htab = ppc_hash_table (info);
4dfe6ac6
NC
9937 if (htab == NULL)
9938 return FALSE;
9939
65f38f15
AM
9940 dynobj = htab->elf.dynobj;
9941 if (dynobj == NULL)
9942 abort ();
9943
9944 if (htab->elf.dynamic_sections_created)
9945 {
9946 /* Set the contents of the .interp section to the interpreter. */
9b8b325a 9947 if (bfd_link_executable (info) && !info->nointerp)
65f38f15 9948 {
3d4d4302 9949 s = bfd_get_linker_section (dynobj, ".interp");
65f38f15
AM
9950 if (s == NULL)
9951 abort ();
eea6121a 9952 s->size = sizeof ELF_DYNAMIC_INTERPRETER;
65f38f15
AM
9953 s->contents = (unsigned char *) ELF_DYNAMIC_INTERPRETER;
9954 }
9955 }
9956
9957 /* Set up .got offsets for local syms, and space for local dynamic
9958 relocs. */
c72f2fb2 9959 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
65f38f15 9960 {
411e1bfb
AM
9961 struct got_entry **lgot_ents;
9962 struct got_entry **end_lgot_ents;
e054468f
AM
9963 struct plt_entry **local_plt;
9964 struct plt_entry **end_local_plt;
f961d9dd 9965 unsigned char *lgot_masks;
65f38f15
AM
9966 bfd_size_type locsymcount;
9967 Elf_Internal_Shdr *symtab_hdr;
65f38f15 9968
0c8d6e5c 9969 if (!is_ppc64_elf (ibfd))
65f38f15
AM
9970 continue;
9971
9972 for (s = ibfd->sections; s != NULL; s = s->next)
9973 {
19e08130 9974 struct ppc_dyn_relocs *p;
65f38f15 9975
6edfbbad 9976 for (p = elf_section_data (s)->local_dynrel; p != NULL; p = p->next)
65f38f15 9977 {
ec338859
AM
9978 if (!bfd_is_abs_section (p->sec)
9979 && bfd_is_abs_section (p->sec->output_section))
9980 {
9981 /* Input section has been discarded, either because
9982 it is a copy of a linkonce section or due to
9983 linker script /DISCARD/, so we'll be discarding
9984 the relocs too. */
9985 }
248866a8 9986 else if (p->count != 0)
ec338859 9987 {
19e08130
AM
9988 asection *srel = elf_section_data (p->sec)->sreloc;
9989 if (p->ifunc)
33e44f2e 9990 srel = htab->elf.irelplt;
eea6121a 9991 srel->size += p->count * sizeof (Elf64_External_Rela);
248866a8
AM
9992 if ((p->sec->output_section->flags & SEC_READONLY) != 0)
9993 info->flags |= DF_TEXTREL;
ec338859 9994 }
65f38f15
AM
9995 }
9996 }
9997
411e1bfb
AM
9998 lgot_ents = elf_local_got_ents (ibfd);
9999 if (!lgot_ents)
65f38f15
AM
10000 continue;
10001
0ffa91dd 10002 symtab_hdr = &elf_symtab_hdr (ibfd);
65f38f15 10003 locsymcount = symtab_hdr->sh_info;
411e1bfb 10004 end_lgot_ents = lgot_ents + locsymcount;
e054468f
AM
10005 local_plt = (struct plt_entry **) end_lgot_ents;
10006 end_local_plt = local_plt + locsymcount;
f961d9dd 10007 lgot_masks = (unsigned char *) end_local_plt;
e717da7e 10008 s = ppc64_elf_tdata (ibfd)->got;
e7b938ca 10009 for (; lgot_ents < end_lgot_ents; ++lgot_ents, ++lgot_masks)
65f38f15 10010 {
0b8bcf0d 10011 struct got_entry **pent, *ent;
411e1bfb 10012
0b8bcf0d
AM
10013 pent = lgot_ents;
10014 while ((ent = *pent) != NULL)
411e1bfb
AM
10015 if (ent->got.refcount > 0)
10016 {
e7b938ca 10017 if ((ent->tls_type & *lgot_masks & TLS_LD) != 0)
411e1bfb 10018 {
927be08e 10019 ppc64_tlsld_got (ibfd)->got.refcount += 1;
0b8bcf0d 10020 *pent = ent->next;
411e1bfb
AM
10021 }
10022 else
10023 {
19e08130
AM
10024 unsigned int ent_size = 8;
10025 unsigned int rel_size = sizeof (Elf64_External_Rela);
10026
eea6121a 10027 ent->got.offset = s->size;
e7b938ca 10028 if ((ent->tls_type & *lgot_masks & TLS_GD) != 0)
927be08e 10029 {
19e08130
AM
10030 ent_size *= 2;
10031 rel_size *= 2;
10032 }
10033 s->size += ent_size;
10034 if ((*lgot_masks & PLT_IFUNC) != 0)
10035 {
33e44f2e 10036 htab->elf.irelplt->size += rel_size;
19e08130
AM
10037 htab->got_reli_size += rel_size;
10038 }
0e1862bb 10039 else if (bfd_link_pic (info))
19e08130
AM
10040 {
10041 asection *srel = ppc64_elf_tdata (ibfd)->relgot;
10042 srel->size += rel_size;
927be08e 10043 }
0b8bcf0d 10044 pent = &ent->next;
411e1bfb
AM
10045 }
10046 }
10047 else
0b8bcf0d 10048 *pent = ent->next;
65f38f15 10049 }
e054468f
AM
10050
10051 /* Allocate space for calls to local STT_GNU_IFUNC syms in .iplt. */
10052 for (; local_plt < end_local_plt; ++local_plt)
10053 {
10054 struct plt_entry *ent;
10055
10056 for (ent = *local_plt; ent != NULL; ent = ent->next)
10057 if (ent->plt.refcount > 0)
10058 {
33e44f2e 10059 s = htab->elf.iplt;
e054468f 10060 ent->plt.offset = s->size;
b9e5796b 10061 s->size += PLT_ENTRY_SIZE (htab);
e054468f 10062
33e44f2e 10063 htab->elf.irelplt->size += sizeof (Elf64_External_Rela);
e054468f
AM
10064 }
10065 else
10066 ent->plt.offset = (bfd_vma) -1;
10067 }
65f38f15
AM
10068 }
10069
10070 /* Allocate global sym .plt and .got entries, and space for global
10071 sym dynamic relocs. */
4ce794b7 10072 elf_link_hash_traverse (&htab->elf, allocate_dynrelocs, info);
a345bc8d
AM
10073 /* Stash the end of glink branch table. */
10074 if (htab->glink != NULL)
10075 htab->glink->rawsize = htab->glink->size;
10076
0e1862bb 10077 if (!htab->opd_abi && !bfd_link_pic (info))
a345bc8d 10078 elf_link_hash_traverse (&htab->elf, size_global_entry_stubs, info);
65f38f15 10079
7865406b 10080 first_tlsld = NULL;
c72f2fb2 10081 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
102890f0 10082 {
7865406b
AM
10083 struct got_entry *ent;
10084
0c8d6e5c 10085 if (!is_ppc64_elf (ibfd))
102890f0
AM
10086 continue;
10087
7865406b
AM
10088 ent = ppc64_tlsld_got (ibfd);
10089 if (ent->got.refcount > 0)
102890f0 10090 {
7865406b 10091 if (!htab->do_multi_toc && first_tlsld != NULL)
102890f0 10092 {
7865406b
AM
10093 ent->is_indirect = TRUE;
10094 ent->got.ent = first_tlsld;
10095 }
10096 else
10097 {
10098 if (first_tlsld == NULL)
10099 first_tlsld = ent;
10100 s = ppc64_elf_tdata (ibfd)->got;
10101 ent->got.offset = s->size;
10102 ent->owner = ibfd;
10103 s->size += 16;
0e1862bb 10104 if (bfd_link_pic (info))
7865406b
AM
10105 {
10106 asection *srel = ppc64_elf_tdata (ibfd)->relgot;
10107 srel->size += sizeof (Elf64_External_Rela);
10108 }
102890f0
AM
10109 }
10110 }
10111 else
7865406b 10112 ent->got.offset = (bfd_vma) -1;
102890f0
AM
10113 }
10114
65f38f15
AM
10115 /* We now have determined the sizes of the various dynamic sections.
10116 Allocate memory for them. */
b34976b6 10117 relocs = FALSE;
65f38f15
AM
10118 for (s = dynobj->sections; s != NULL; s = s->next)
10119 {
10120 if ((s->flags & SEC_LINKER_CREATED) == 0)
10121 continue;
10122
4ce794b7 10123 if (s == htab->brlt || s == htab->relbrlt)
721956f4
AM
10124 /* These haven't been allocated yet; don't strip. */
10125 continue;
33e44f2e
AM
10126 else if (s == htab->elf.sgot
10127 || s == htab->elf.splt
10128 || s == htab->elf.iplt
c456f082
AM
10129 || s == htab->glink
10130 || s == htab->dynbss)
65f38f15
AM
10131 {
10132 /* Strip this section if we don't need it; see the
10133 comment below. */
5bd4f169 10134 }
58d180e8
AM
10135 else if (s == htab->glink_eh_frame)
10136 {
10137 if (!bfd_is_abs_section (s->output_section))
10138 /* Not sized yet. */
10139 continue;
10140 }
70cc837d 10141 else if (CONST_STRNEQ (s->name, ".rela"))
5bd4f169 10142 {
c456f082 10143 if (s->size != 0)
5bd4f169 10144 {
33e44f2e 10145 if (s != htab->elf.srelplt)
b34976b6 10146 relocs = TRUE;
5bd4f169
AM
10147
10148 /* We use the reloc_count field as a counter if we need
10149 to copy relocs into the output file. */
10150 s->reloc_count = 0;
10151 }
10152 }
65f38f15 10153 else
5bd4f169
AM
10154 {
10155 /* It's not one of our sections, so don't allocate space. */
10156 continue;
10157 }
10158
eea6121a 10159 if (s->size == 0)
5bd4f169 10160 {
c456f082
AM
10161 /* If we don't need this section, strip it from the
10162 output file. This is mostly to handle .rela.bss and
10163 .rela.plt. We must create both sections in
10164 create_dynamic_sections, because they must be created
10165 before the linker maps input sections to output
10166 sections. The linker does that before
10167 adjust_dynamic_symbol is called, and it is that
10168 function which decides whether anything needs to go
10169 into these sections. */
8423293d 10170 s->flags |= SEC_EXCLUDE;
5bd4f169
AM
10171 continue;
10172 }
10173
c456f082 10174 if ((s->flags & SEC_HAS_CONTENTS) == 0)
5f333394
AM
10175 continue;
10176
65f38f15
AM
10177 /* Allocate memory for the section contents. We use bfd_zalloc
10178 here in case unused entries are not reclaimed before the
10179 section's contents are written out. This should not happen,
411e1bfb
AM
10180 but this way if it does we get a R_PPC64_NONE reloc in .rela
10181 sections instead of garbage.
10182 We also rely on the section contents being zero when writing
10183 the GOT. */
eea6121a 10184 s->contents = bfd_zalloc (dynobj, s->size);
65f38f15 10185 if (s->contents == NULL)
b34976b6 10186 return FALSE;
5bd4f169
AM
10187 }
10188
c72f2fb2 10189 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
e717da7e 10190 {
0c8d6e5c 10191 if (!is_ppc64_elf (ibfd))
7b53ace3
AM
10192 continue;
10193
e717da7e 10194 s = ppc64_elf_tdata (ibfd)->got;
33e44f2e 10195 if (s != NULL && s != htab->elf.sgot)
e717da7e 10196 {
eea6121a 10197 if (s->size == 0)
8423293d 10198 s->flags |= SEC_EXCLUDE;
e717da7e
AM
10199 else
10200 {
eea6121a 10201 s->contents = bfd_zalloc (ibfd, s->size);
e717da7e
AM
10202 if (s->contents == NULL)
10203 return FALSE;
10204 }
10205 }
10206 s = ppc64_elf_tdata (ibfd)->relgot;
10207 if (s != NULL)
10208 {
eea6121a 10209 if (s->size == 0)
8423293d 10210 s->flags |= SEC_EXCLUDE;
e717da7e
AM
10211 else
10212 {
eea6121a 10213 s->contents = bfd_zalloc (ibfd, s->size);
e717da7e
AM
10214 if (s->contents == NULL)
10215 return FALSE;
10216 relocs = TRUE;
10217 s->reloc_count = 0;
10218 }
10219 }
10220 }
10221
e86ce104 10222 if (htab->elf.dynamic_sections_created)
5bd4f169 10223 {
e8910a83
AM
10224 bfd_boolean tls_opt;
10225
5bd4f169
AM
10226 /* Add some entries to the .dynamic section. We fill in the
10227 values later, in ppc64_elf_finish_dynamic_sections, but we
10228 must add the entries now so that we get the correct size for
10229 the .dynamic section. The DT_DEBUG entry is filled in by the
10230 dynamic linker and used by the debugger. */
dc810e39 10231#define add_dynamic_entry(TAG, VAL) \
5a580b3a 10232 _bfd_elf_add_dynamic_entry (info, TAG, VAL)
dc810e39 10233
0e1862bb 10234 if (bfd_link_executable (info))
5bd4f169 10235 {
dc810e39 10236 if (!add_dynamic_entry (DT_DEBUG, 0))
b34976b6 10237 return FALSE;
5bd4f169
AM
10238 }
10239
33e44f2e 10240 if (htab->elf.splt != NULL && htab->elf.splt->size != 0)
5bd4f169 10241 {
dc810e39
AM
10242 if (!add_dynamic_entry (DT_PLTGOT, 0)
10243 || !add_dynamic_entry (DT_PLTRELSZ, 0)
10244 || !add_dynamic_entry (DT_PLTREL, DT_RELA)
5d1634d7
AM
10245 || !add_dynamic_entry (DT_JMPREL, 0)
10246 || !add_dynamic_entry (DT_PPC64_GLINK, 0))
b34976b6 10247 return FALSE;
5bd4f169
AM
10248 }
10249
ee67d69a 10250 if (NO_OPD_RELOCS && abiversion (output_bfd) <= 1)
19397422
AM
10251 {
10252 if (!add_dynamic_entry (DT_PPC64_OPD, 0)
10253 || !add_dynamic_entry (DT_PPC64_OPDSZ, 0))
b34976b6 10254 return FALSE;
19397422
AM
10255 }
10256
7c9cf415 10257 tls_opt = (htab->params->tls_get_addr_opt
e8910a83
AM
10258 && htab->tls_get_addr_fd != NULL
10259 && htab->tls_get_addr_fd->elf.plt.plist != NULL);
10260 if (tls_opt || !htab->opd_abi)
10261 {
10262 if (!add_dynamic_entry (DT_PPC64_OPT, tls_opt ? PPC64_OPT_TLS : 0))
10263 return FALSE;
10264 }
a7f2871e 10265
5bd4f169
AM
10266 if (relocs)
10267 {
dc810e39
AM
10268 if (!add_dynamic_entry (DT_RELA, 0)
10269 || !add_dynamic_entry (DT_RELASZ, 0)
10270 || !add_dynamic_entry (DT_RELAENT, sizeof (Elf64_External_Rela)))
b34976b6 10271 return FALSE;
5bd4f169 10272
65f38f15
AM
10273 /* If any dynamic relocs apply to a read-only section,
10274 then we need a DT_TEXTREL entry. */
248866a8 10275 if ((info->flags & DF_TEXTREL) == 0)
a345bc8d 10276 elf_link_hash_traverse (&htab->elf, maybe_set_textrel, info);
5bd4f169 10277
65f38f15 10278 if ((info->flags & DF_TEXTREL) != 0)
5bd4f169 10279 {
65f38f15 10280 if (!add_dynamic_entry (DT_TEXTREL, 0))
b34976b6 10281 return FALSE;
5bd4f169 10282 }
5bd4f169 10283 }
5bd4f169 10284 }
65f38f15 10285#undef add_dynamic_entry
5bd4f169 10286
b34976b6 10287 return TRUE;
5bd4f169
AM
10288}
10289
a345bc8d
AM
10290/* Return TRUE if symbol should be hashed in the `.gnu.hash' section. */
10291
10292static bfd_boolean
10293ppc64_elf_hash_symbol (struct elf_link_hash_entry *h)
10294{
10295 if (h->plt.plist != NULL
10296 && !h->def_regular
10297 && !h->pointer_equality_needed)
10298 return FALSE;
10299
10300 return _bfd_elf_hash_symbol (h);
10301}
10302
721956f4 10303/* Determine the type of stub needed, if any, for a call. */
5bd4f169 10304
4ce794b7
AM
10305static inline enum ppc_stub_type
10306ppc_type_of_stub (asection *input_sec,
10307 const Elf_Internal_Rela *rel,
10308 struct ppc_link_hash_entry **hash,
e054468f 10309 struct plt_entry **plt_ent,
6911b7dc
AM
10310 bfd_vma destination,
10311 unsigned long local_off)
5bd4f169 10312{
721956f4
AM
10313 struct ppc_link_hash_entry *h = *hash;
10314 bfd_vma location;
10315 bfd_vma branch_offset;
10316 bfd_vma max_branch_offset;
4ce794b7 10317 enum elf_ppc64_reloc_type r_type;
5bd4f169 10318
721956f4
AM
10319 if (h != NULL)
10320 {
e054468f 10321 struct plt_entry *ent;
7fe2b9a6 10322 struct ppc_link_hash_entry *fdh = h;
b31867b6
AM
10323 if (h->oh != NULL
10324 && h->oh->is_func_descriptor)
7b8f6675
AM
10325 {
10326 fdh = ppc_follow_link (h->oh);
10327 *hash = fdh;
10328 }
8387904d 10329
e054468f
AM
10330 for (ent = fdh->elf.plt.plist; ent != NULL; ent = ent->next)
10331 if (ent->addend == rel->r_addend
10332 && ent->plt.offset != (bfd_vma) -1)
10333 {
e054468f
AM
10334 *plt_ent = ent;
10335 return ppc_stub_plt_call;
10336 }
5bd4f169 10337
7fe2b9a6
AM
10338 /* Here, we know we don't have a plt entry. If we don't have a
10339 either a defined function descriptor or a defined entry symbol
10340 in a regular object file, then it is pointless trying to make
10341 any other type of stub. */
854b41e7
AM
10342 if (!is_static_defined (&fdh->elf)
10343 && !is_static_defined (&h->elf))
721956f4 10344 return ppc_stub_none;
5d1634d7 10345 }
e054468f
AM
10346 else if (elf_local_got_ents (input_sec->owner) != NULL)
10347 {
10348 Elf_Internal_Shdr *symtab_hdr = &elf_symtab_hdr (input_sec->owner);
10349 struct plt_entry **local_plt = (struct plt_entry **)
10350 elf_local_got_ents (input_sec->owner) + symtab_hdr->sh_info;
10351 unsigned long r_symndx = ELF64_R_SYM (rel->r_info);
10352
10353 if (local_plt[r_symndx] != NULL)
10354 {
10355 struct plt_entry *ent;
10356
10357 for (ent = local_plt[r_symndx]; ent != NULL; ent = ent->next)
10358 if (ent->addend == rel->r_addend
10359 && ent->plt.offset != (bfd_vma) -1)
10360 {
10361 *plt_ent = ent;
10362 return ppc_stub_plt_call;
10363 }
10364 }
10365 }
5d1634d7 10366
721956f4
AM
10367 /* Determine where the call point is. */
10368 location = (input_sec->output_offset
10369 + input_sec->output_section->vma
10370 + rel->r_offset);
5d1634d7 10371
721956f4
AM
10372 branch_offset = destination - location;
10373 r_type = ELF64_R_TYPE (rel->r_info);
5d1634d7 10374
721956f4
AM
10375 /* Determine if a long branch stub is needed. */
10376 max_branch_offset = 1 << 25;
4ce794b7 10377 if (r_type != R_PPC64_REL24)
721956f4 10378 max_branch_offset = 1 << 15;
5d1634d7 10379
6911b7dc 10380 if (branch_offset + max_branch_offset >= 2 * max_branch_offset - local_off)
721956f4
AM
10381 /* We need a stub. Figure out whether a long_branch or plt_branch
10382 is needed later. */
10383 return ppc_stub_long_branch;
5d1634d7 10384
721956f4 10385 return ppc_stub_none;
5d1634d7
AM
10386}
10387
794e51c0
AM
10388/* With power7 weakly ordered memory model, it is possible for ld.so
10389 to update a plt entry in one thread and have another thread see a
10390 stale zero toc entry. To avoid this we need some sort of acquire
10391 barrier in the call stub. One solution is to make the load of the
10392 toc word seem to appear to depend on the load of the function entry
10393 word. Another solution is to test for r2 being zero, and branch to
10394 the appropriate glink entry if so.
10395
10396 . fake dep barrier compare
71a39c98
AM
10397 . ld 12,xxx(2) ld 12,xxx(2)
10398 . mtctr 12 mtctr 12
10399 . xor 11,12,12 ld 2,xxx+8(2)
794e51c0
AM
10400 . add 2,2,11 cmpldi 2,0
10401 . ld 2,xxx+8(2) bnectr+
10402 . bctr b <glink_entry>
10403
10404 The solution involving the compare turns out to be faster, so
10405 that's what we use unless the branch won't reach. */
10406
10407#define ALWAYS_USE_FAKE_DEP 0
10408#define ALWAYS_EMIT_R2SAVE 0
5d1634d7 10409
5d1634d7
AM
10410#define PPC_LO(v) ((v) & 0xffff)
10411#define PPC_HI(v) (((v) >> 16) & 0xffff)
10412#define PPC_HA(v) PPC_HI ((v) + 0x8000)
10413
794e51c0
AM
10414static inline unsigned int
10415plt_stub_size (struct ppc_link_hash_table *htab,
10416 struct ppc_stub_hash_entry *stub_entry,
10417 bfd_vma off)
10418{
b9e5796b
AM
10419 unsigned size = 12;
10420
10421 if (ALWAYS_EMIT_R2SAVE
10422 || stub_entry->stub_type == ppc_stub_plt_call_r2save)
10423 size += 4;
10424 if (PPC_HA (off) != 0)
794e51c0 10425 size += 4;
b9e5796b
AM
10426 if (htab->opd_abi)
10427 {
10428 size += 4;
e7d1c40c 10429 if (htab->params->plt_static_chain)
b9e5796b 10430 size += 4;
bd4d2eaa
AM
10431 if (htab->params->plt_thread_safe
10432 && htab->elf.dynamic_sections_created
10433 && stub_entry->h != NULL
10434 && stub_entry->h->elf.dynindx != -1)
b9e5796b 10435 size += 8;
e7d1c40c 10436 if (PPC_HA (off + 8 + 8 * htab->params->plt_static_chain) != PPC_HA (off))
b9e5796b
AM
10437 size += 4;
10438 }
794e51c0
AM
10439 if (stub_entry->h != NULL
10440 && (stub_entry->h == htab->tls_get_addr_fd
10441 || stub_entry->h == htab->tls_get_addr)
7c9cf415 10442 && htab->params->tls_get_addr_opt)
794e51c0
AM
10443 size += 13 * 4;
10444 return size;
10445}
10446
10447/* If this stub would cross fewer 2**plt_stub_align boundaries if we align,
10448 then return the padding needed to do so. */
10449static inline unsigned int
10450plt_stub_pad (struct ppc_link_hash_table *htab,
10451 struct ppc_stub_hash_entry *stub_entry,
10452 bfd_vma plt_off)
10453{
e7d1c40c 10454 int stub_align = 1 << htab->params->plt_stub_align;
794e51c0 10455 unsigned stub_size = plt_stub_size (htab, stub_entry, plt_off);
6f20ed8a 10456 bfd_vma stub_off = stub_entry->group->stub_sec->size;
794e51c0
AM
10457
10458 if (((stub_off + stub_size - 1) & -stub_align) - (stub_off & -stub_align)
e05fa0ba 10459 > ((stub_size - 1) & -stub_align))
794e51c0
AM
10460 return stub_align - (stub_off & (stub_align - 1));
10461 return 0;
10462}
10463
10464/* Build a .plt call stub. */
10465
10466static inline bfd_byte *
10467build_plt_stub (struct ppc_link_hash_table *htab,
10468 struct ppc_stub_hash_entry *stub_entry,
10469 bfd_byte *p, bfd_vma offset, Elf_Internal_Rela *r)
10470{
e7d1c40c 10471 bfd *obfd = htab->params->stub_bfd;
b9e5796b 10472 bfd_boolean plt_load_toc = htab->opd_abi;
e7d1c40c 10473 bfd_boolean plt_static_chain = htab->params->plt_static_chain;
bd4d2eaa
AM
10474 bfd_boolean plt_thread_safe = (htab->params->plt_thread_safe
10475 && htab->elf.dynamic_sections_created
10476 && stub_entry->h != NULL
10477 && stub_entry->h->elf.dynindx != -1);
794e51c0
AM
10478 bfd_boolean use_fake_dep = plt_thread_safe;
10479 bfd_vma cmp_branch_off = 0;
10480
10481 if (!ALWAYS_USE_FAKE_DEP
b9e5796b 10482 && plt_load_toc
794e51c0 10483 && plt_thread_safe
bd4d2eaa
AM
10484 && !((stub_entry->h == htab->tls_get_addr_fd
10485 || stub_entry->h == htab->tls_get_addr)
7c9cf415 10486 && htab->params->tls_get_addr_opt))
794e51c0
AM
10487 {
10488 bfd_vma pltoff = stub_entry->plt_ent->plt.offset & ~1;
b9e5796b
AM
10489 bfd_vma pltindex = ((pltoff - PLT_INITIAL_ENTRY_SIZE (htab))
10490 / PLT_ENTRY_SIZE (htab));
794e51c0
AM
10491 bfd_vma glinkoff = GLINK_CALL_STUB_SIZE + pltindex * 8;
10492 bfd_vma to, from;
10493
68d62958
AM
10494 if (pltindex > 32768)
10495 glinkoff += (pltindex - 32768) * 4;
794e51c0
AM
10496 to = (glinkoff
10497 + htab->glink->output_offset
10498 + htab->glink->output_section->vma);
6f20ed8a 10499 from = (p - stub_entry->group->stub_sec->contents
794e51c0
AM
10500 + 4 * (ALWAYS_EMIT_R2SAVE
10501 || stub_entry->stub_type == ppc_stub_plt_call_r2save)
10502 + 4 * (PPC_HA (offset) != 0)
10503 + 4 * (PPC_HA (offset + 8 + 8 * plt_static_chain)
10504 != PPC_HA (offset))
10505 + 4 * (plt_static_chain != 0)
10506 + 20
6f20ed8a
AM
10507 + stub_entry->group->stub_sec->output_offset
10508 + stub_entry->group->stub_sec->output_section->vma);
794e51c0
AM
10509 cmp_branch_off = to - from;
10510 use_fake_dep = cmp_branch_off + (1 << 25) >= (1 << 26);
10511 }
10512
ac2df442
AM
10513 if (PPC_HA (offset) != 0)
10514 {
176a0d42
AM
10515 if (r != NULL)
10516 {
794e51c0
AM
10517 if (ALWAYS_EMIT_R2SAVE
10518 || stub_entry->stub_type == ppc_stub_plt_call_r2save)
10519 r[0].r_offset += 4;
176a0d42 10520 r[0].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_HA);
3b421ab3 10521 r[1].r_offset = r[0].r_offset + 4;
176a0d42
AM
10522 r[1].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_LO_DS);
10523 r[1].r_addend = r[0].r_addend;
b9e5796b 10524 if (plt_load_toc)
176a0d42 10525 {
b9e5796b 10526 if (PPC_HA (offset + 8 + 8 * plt_static_chain) != PPC_HA (offset))
c7131b65 10527 {
b9e5796b
AM
10528 r[2].r_offset = r[1].r_offset + 4;
10529 r[2].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_LO);
10530 r[2].r_addend = r[0].r_addend;
10531 }
10532 else
10533 {
10534 r[2].r_offset = r[1].r_offset + 8 + 8 * use_fake_dep;
10535 r[2].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_LO_DS);
10536 r[2].r_addend = r[0].r_addend + 8;
10537 if (plt_static_chain)
10538 {
10539 r[3].r_offset = r[2].r_offset + 4;
10540 r[3].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_LO_DS);
10541 r[3].r_addend = r[0].r_addend + 16;
10542 }
c7131b65 10543 }
176a0d42
AM
10544 }
10545 }
794e51c0
AM
10546 if (ALWAYS_EMIT_R2SAVE
10547 || stub_entry->stub_type == ppc_stub_plt_call_r2save)
a078d95a 10548 bfd_put_32 (obfd, STD_R2_0R1 + STK_TOC (htab), p), p += 4;
397998fc
AM
10549 if (plt_load_toc)
10550 {
10551 bfd_put_32 (obfd, ADDIS_R11_R2 | PPC_HA (offset), p), p += 4;
10552 bfd_put_32 (obfd, LD_R12_0R11 | PPC_LO (offset), p), p += 4;
10553 }
10554 else
10555 {
10556 bfd_put_32 (obfd, ADDIS_R12_R2 | PPC_HA (offset), p), p += 4;
10557 bfd_put_32 (obfd, LD_R12_0R12 | PPC_LO (offset), p), p += 4;
10558 }
b9e5796b
AM
10559 if (plt_load_toc
10560 && PPC_HA (offset + 8 + 8 * plt_static_chain) != PPC_HA (offset))
ac2df442 10561 {
71a39c98 10562 bfd_put_32 (obfd, ADDI_R11_R11 | PPC_LO (offset), p), p += 4;
ac2df442
AM
10563 offset = 0;
10564 }
71a39c98 10565 bfd_put_32 (obfd, MTCTR_R12, p), p += 4;
b9e5796b 10566 if (plt_load_toc)
794e51c0 10567 {
b9e5796b
AM
10568 if (use_fake_dep)
10569 {
10570 bfd_put_32 (obfd, XOR_R2_R12_R12, p), p += 4;
10571 bfd_put_32 (obfd, ADD_R11_R11_R2, p), p += 4;
10572 }
10573 bfd_put_32 (obfd, LD_R2_0R11 | PPC_LO (offset + 8), p), p += 4;
10574 if (plt_static_chain)
10575 bfd_put_32 (obfd, LD_R11_0R11 | PPC_LO (offset + 16), p), p += 4;
794e51c0 10576 }
ac2df442
AM
10577 }
10578 else
10579 {
176a0d42
AM
10580 if (r != NULL)
10581 {
794e51c0
AM
10582 if (ALWAYS_EMIT_R2SAVE
10583 || stub_entry->stub_type == ppc_stub_plt_call_r2save)
10584 r[0].r_offset += 4;
176a0d42 10585 r[0].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_DS);
b9e5796b 10586 if (plt_load_toc)
176a0d42 10587 {
b9e5796b 10588 if (PPC_HA (offset + 8 + 8 * plt_static_chain) != PPC_HA (offset))
c7131b65 10589 {
b9e5796b
AM
10590 r[1].r_offset = r[0].r_offset + 4;
10591 r[1].r_info = ELF64_R_INFO (0, R_PPC64_TOC16);
10592 r[1].r_addend = r[0].r_addend;
10593 }
10594 else
10595 {
10596 r[1].r_offset = r[0].r_offset + 8 + 8 * use_fake_dep;
10597 r[1].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_DS);
10598 r[1].r_addend = r[0].r_addend + 8 + 8 * plt_static_chain;
10599 if (plt_static_chain)
10600 {
10601 r[2].r_offset = r[1].r_offset + 4;
10602 r[2].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_DS);
10603 r[2].r_addend = r[0].r_addend + 8;
10604 }
c7131b65 10605 }
176a0d42
AM
10606 }
10607 }
794e51c0
AM
10608 if (ALWAYS_EMIT_R2SAVE
10609 || stub_entry->stub_type == ppc_stub_plt_call_r2save)
a078d95a 10610 bfd_put_32 (obfd, STD_R2_0R1 + STK_TOC (htab), p), p += 4;
71a39c98 10611 bfd_put_32 (obfd, LD_R12_0R2 | PPC_LO (offset), p), p += 4;
b9e5796b
AM
10612 if (plt_load_toc
10613 && PPC_HA (offset + 8 + 8 * plt_static_chain) != PPC_HA (offset))
ac2df442
AM
10614 {
10615 bfd_put_32 (obfd, ADDI_R2_R2 | PPC_LO (offset), p), p += 4;
10616 offset = 0;
10617 }
71a39c98 10618 bfd_put_32 (obfd, MTCTR_R12, p), p += 4;
b9e5796b 10619 if (plt_load_toc)
794e51c0 10620 {
b9e5796b
AM
10621 if (use_fake_dep)
10622 {
10623 bfd_put_32 (obfd, XOR_R11_R12_R12, p), p += 4;
10624 bfd_put_32 (obfd, ADD_R2_R2_R11, p), p += 4;
10625 }
10626 if (plt_static_chain)
10627 bfd_put_32 (obfd, LD_R11_0R2 | PPC_LO (offset + 16), p), p += 4;
10628 bfd_put_32 (obfd, LD_R2_0R2 | PPC_LO (offset + 8), p), p += 4;
794e51c0 10629 }
ac2df442 10630 }
b9e5796b 10631 if (plt_load_toc && plt_thread_safe && !use_fake_dep)
794e51c0
AM
10632 {
10633 bfd_put_32 (obfd, CMPLDI_R2_0, p), p += 4;
10634 bfd_put_32 (obfd, BNECTR_P4, p), p += 4;
22aa0c7e 10635 bfd_put_32 (obfd, B_DOT | (cmp_branch_off & 0x3fffffc), p), p += 4;
794e51c0
AM
10636 }
10637 else
10638 bfd_put_32 (obfd, BCTR, p), p += 4;
5d1634d7
AM
10639 return p;
10640}
10641
a7f2871e
AM
10642/* Build a special .plt call stub for __tls_get_addr. */
10643
10644#define LD_R11_0R3 0xe9630000
10645#define LD_R12_0R3 0xe9830000
10646#define MR_R0_R3 0x7c601b78
10647#define CMPDI_R11_0 0x2c2b0000
10648#define ADD_R3_R12_R13 0x7c6c6a14
10649#define BEQLR 0x4d820020
10650#define MR_R3_R0 0x7c030378
a7f2871e
AM
10651#define STD_R11_0R1 0xf9610000
10652#define BCTRL 0x4e800421
10653#define LD_R11_0R1 0xe9610000
a7f2871e
AM
10654#define MTLR_R11 0x7d6803a6
10655
10656static inline bfd_byte *
794e51c0
AM
10657build_tls_get_addr_stub (struct ppc_link_hash_table *htab,
10658 struct ppc_stub_hash_entry *stub_entry,
10659 bfd_byte *p, bfd_vma offset, Elf_Internal_Rela *r)
a7f2871e 10660{
e7d1c40c 10661 bfd *obfd = htab->params->stub_bfd;
794e51c0 10662
a7f2871e
AM
10663 bfd_put_32 (obfd, LD_R11_0R3 + 0, p), p += 4;
10664 bfd_put_32 (obfd, LD_R12_0R3 + 8, p), p += 4;
10665 bfd_put_32 (obfd, MR_R0_R3, p), p += 4;
10666 bfd_put_32 (obfd, CMPDI_R11_0, p), p += 4;
10667 bfd_put_32 (obfd, ADD_R3_R12_R13, p), p += 4;
10668 bfd_put_32 (obfd, BEQLR, p), p += 4;
10669 bfd_put_32 (obfd, MR_R3_R0, p), p += 4;
10670 bfd_put_32 (obfd, MFLR_R11, p), p += 4;
a078d95a 10671 bfd_put_32 (obfd, STD_R11_0R1 + STK_LINKER (htab), p), p += 4;
a7f2871e
AM
10672
10673 if (r != NULL)
10674 r[0].r_offset += 9 * 4;
794e51c0 10675 p = build_plt_stub (htab, stub_entry, p, offset, r);
a7f2871e
AM
10676 bfd_put_32 (obfd, BCTRL, p - 4);
10677
a078d95a 10678 bfd_put_32 (obfd, LD_R2_0R1 + STK_TOC (htab), p), p += 4;
bd4d2eaa 10679 bfd_put_32 (obfd, LD_R11_0R1 + STK_LINKER (htab), p), p += 4;
a7f2871e
AM
10680 bfd_put_32 (obfd, MTLR_R11, p), p += 4;
10681 bfd_put_32 (obfd, BLR, p), p += 4;
10682
10683 return p;
10684}
10685
176a0d42
AM
10686static Elf_Internal_Rela *
10687get_relocs (asection *sec, int count)
10688{
10689 Elf_Internal_Rela *relocs;
10690 struct bfd_elf_section_data *elfsec_data;
10691
10692 elfsec_data = elf_section_data (sec);
10693 relocs = elfsec_data->relocs;
10694 if (relocs == NULL)
10695 {
10696 bfd_size_type relsize;
10697 relsize = sec->reloc_count * sizeof (*relocs);
10698 relocs = bfd_alloc (sec->owner, relsize);
10699 if (relocs == NULL)
10700 return NULL;
10701 elfsec_data->relocs = relocs;
d4730f92
BS
10702 elfsec_data->rela.hdr = bfd_zalloc (sec->owner,
10703 sizeof (Elf_Internal_Shdr));
10704 if (elfsec_data->rela.hdr == NULL)
10705 return NULL;
10706 elfsec_data->rela.hdr->sh_size = (sec->reloc_count
10707 * sizeof (Elf64_External_Rela));
10708 elfsec_data->rela.hdr->sh_entsize = sizeof (Elf64_External_Rela);
176a0d42
AM
10709 sec->reloc_count = 0;
10710 }
10711 relocs += sec->reloc_count;
10712 sec->reloc_count += count;
10713 return relocs;
10714}
10715
aa374f67 10716static bfd_vma
25f53a85 10717get_r2off (struct bfd_link_info *info,
aa374f67
AM
10718 struct ppc_stub_hash_entry *stub_entry)
10719{
25f53a85 10720 struct ppc_link_hash_table *htab = ppc_hash_table (info);
6f20ed8a 10721 bfd_vma r2off = htab->sec_info[stub_entry->target_section->id].toc_off;
aa374f67
AM
10722
10723 if (r2off == 0)
10724 {
10725 /* Support linking -R objects. Get the toc pointer from the
10726 opd entry. */
10727 char buf[8];
b9e5796b
AM
10728 if (!htab->opd_abi)
10729 return r2off;
aa374f67
AM
10730 asection *opd = stub_entry->h->elf.root.u.def.section;
10731 bfd_vma opd_off = stub_entry->h->elf.root.u.def.value;
10732
10733 if (strcmp (opd->name, ".opd") != 0
10734 || opd->reloc_count != 0)
10735 {
bc30df16 10736 info->callbacks->einfo (_("%P: cannot find opd entry toc for `%T'\n"),
25f53a85 10737 stub_entry->h->elf.root.root.string);
aa374f67 10738 bfd_set_error (bfd_error_bad_value);
a7c49797 10739 return (bfd_vma) -1;
aa374f67
AM
10740 }
10741 if (!bfd_get_section_contents (opd->owner, opd, buf, opd_off + 8, 8))
a7c49797 10742 return (bfd_vma) -1;
aa374f67 10743 r2off = bfd_get_64 (opd->owner, buf);
25f53a85 10744 r2off -= elf_gp (info->output_bfd);
aa374f67 10745 }
6f20ed8a 10746 r2off -= htab->sec_info[stub_entry->group->link_sec->id].toc_off;
aa374f67
AM
10747 return r2off;
10748}
10749
b34976b6 10750static bfd_boolean
4ce794b7 10751ppc_build_one_stub (struct bfd_hash_entry *gen_entry, void *in_arg)
5d1634d7 10752{
721956f4
AM
10753 struct ppc_stub_hash_entry *stub_entry;
10754 struct ppc_branch_hash_entry *br_entry;
5d1634d7
AM
10755 struct bfd_link_info *info;
10756 struct ppc_link_hash_table *htab;
721956f4
AM
10757 bfd_byte *loc;
10758 bfd_byte *p;
ee75fd95 10759 bfd_vma dest, off;
721956f4 10760 int size;
176a0d42 10761 Elf_Internal_Rela *r;
e054468f 10762 asection *plt;
5d1634d7 10763
721956f4
AM
10764 /* Massage our args to the form they really have. */
10765 stub_entry = (struct ppc_stub_hash_entry *) gen_entry;
4ce794b7 10766 info = in_arg;
5d1634d7 10767
5d1634d7 10768 htab = ppc_hash_table (info);
4dfe6ac6
NC
10769 if (htab == NULL)
10770 return FALSE;
5d1634d7 10771
721956f4 10772 /* Make a note of the offset within the stubs for this entry. */
6f20ed8a
AM
10773 stub_entry->stub_offset = stub_entry->group->stub_sec->size;
10774 loc = stub_entry->group->stub_sec->contents + stub_entry->stub_offset;
721956f4 10775
4ce794b7 10776 htab->stub_count[stub_entry->stub_type - 1] += 1;
721956f4 10777 switch (stub_entry->stub_type)
5d1634d7 10778 {
721956f4 10779 case ppc_stub_long_branch:
ad8e1ba5 10780 case ppc_stub_long_branch_r2off:
721956f4 10781 /* Branches are relative. This is where we are going to. */
6911b7dc
AM
10782 dest = (stub_entry->target_value
10783 + stub_entry->target_section->output_offset
10784 + stub_entry->target_section->output_section->vma);
10785 dest += PPC64_LOCAL_ENTRY_OFFSET (stub_entry->other);
10786 off = dest;
5d1634d7 10787
721956f4
AM
10788 /* And this is where we are coming from. */
10789 off -= (stub_entry->stub_offset
6f20ed8a
AM
10790 + stub_entry->group->stub_sec->output_offset
10791 + stub_entry->group->stub_sec->output_section->vma);
e86ce104 10792
ac2df442
AM
10793 size = 4;
10794 if (stub_entry->stub_type == ppc_stub_long_branch_r2off)
ad8e1ba5 10795 {
25f53a85 10796 bfd_vma r2off = get_r2off (info, stub_entry);
ad8e1ba5 10797
a7c49797 10798 if (r2off == (bfd_vma) -1)
aa374f67
AM
10799 {
10800 htab->stub_error = TRUE;
10801 return FALSE;
10802 }
e7d1c40c 10803 bfd_put_32 (htab->params->stub_bfd, STD_R2_0R1 + STK_TOC (htab), loc);
ad8e1ba5 10804 loc += 4;
a7c49797 10805 size = 8;
ac2df442
AM
10806 if (PPC_HA (r2off) != 0)
10807 {
e7d1c40c
AM
10808 bfd_put_32 (htab->params->stub_bfd,
10809 ADDIS_R2_R2 | PPC_HA (r2off), loc);
ac2df442 10810 loc += 4;
a7c49797
AM
10811 size += 4;
10812 }
10813 if (PPC_LO (r2off) != 0)
10814 {
10815 bfd_put_32 (htab->params->stub_bfd,
10816 ADDI_R2_R2 | PPC_LO (r2off), loc);
10817 loc += 4;
10818 size += 4;
ac2df442 10819 }
ac2df442 10820 off -= size - 4;
ad8e1ba5 10821 }
e7d1c40c 10822 bfd_put_32 (htab->params->stub_bfd, B_DOT | (off & 0x3fffffc), loc);
ad8e1ba5 10823
5c3dead3
AM
10824 if (off + (1 << 25) >= (bfd_vma) (1 << 26))
10825 {
bc30df16
AM
10826 info->callbacks->einfo
10827 (_("%P: long branch stub `%s' offset overflow\n"),
10828 stub_entry->root.string);
5c3dead3
AM
10829 htab->stub_error = TRUE;
10830 return FALSE;
10831 }
ee75fd95
AM
10832
10833 if (info->emitrelocations)
10834 {
6f20ed8a 10835 r = get_relocs (stub_entry->group->stub_sec, 1);
176a0d42
AM
10836 if (r == NULL)
10837 return FALSE;
6f20ed8a 10838 r->r_offset = loc - stub_entry->group->stub_sec->contents;
ee75fd95
AM
10839 r->r_info = ELF64_R_INFO (0, R_PPC64_REL24);
10840 r->r_addend = dest;
10841 if (stub_entry->h != NULL)
10842 {
10843 struct elf_link_hash_entry **hashes;
10844 unsigned long symndx;
10845 struct ppc_link_hash_entry *h;
10846
e7d1c40c 10847 hashes = elf_sym_hashes (htab->params->stub_bfd);
ee75fd95
AM
10848 if (hashes == NULL)
10849 {
10850 bfd_size_type hsize;
10851
10852 hsize = (htab->stub_globals + 1) * sizeof (*hashes);
e7d1c40c 10853 hashes = bfd_zalloc (htab->params->stub_bfd, hsize);
ee75fd95
AM
10854 if (hashes == NULL)
10855 return FALSE;
e7d1c40c 10856 elf_sym_hashes (htab->params->stub_bfd) = hashes;
ee75fd95
AM
10857 htab->stub_globals = 1;
10858 }
10859 symndx = htab->stub_globals++;
10860 h = stub_entry->h;
10861 hashes[symndx] = &h->elf;
10862 r->r_info = ELF64_R_INFO (symndx, R_PPC64_REL24);
10863 if (h->oh != NULL && h->oh->is_func)
b31867b6 10864 h = ppc_follow_link (h->oh);
ee75fd95
AM
10865 if (h->elf.root.u.def.section != stub_entry->target_section)
10866 /* H is an opd symbol. The addend must be zero. */
10867 r->r_addend = 0;
10868 else
10869 {
10870 off = (h->elf.root.u.def.value
10871 + h->elf.root.u.def.section->output_offset
10872 + h->elf.root.u.def.section->output_section->vma);
10873 r->r_addend -= off;
10874 }
10875 }
10876 }
721956f4 10877 break;
e86ce104 10878
721956f4 10879 case ppc_stub_plt_branch:
ad8e1ba5 10880 case ppc_stub_plt_branch_r2off:
721956f4
AM
10881 br_entry = ppc_branch_hash_lookup (&htab->branch_hash_table,
10882 stub_entry->root.string + 9,
b34976b6 10883 FALSE, FALSE);
721956f4
AM
10884 if (br_entry == NULL)
10885 {
8de848d8 10886 info->callbacks->einfo (_("%P: can't find branch stub `%s'\n"),
25f53a85 10887 stub_entry->root.string);
b34976b6
AM
10888 htab->stub_error = TRUE;
10889 return FALSE;
721956f4
AM
10890 }
10891
176a0d42
AM
10892 dest = (stub_entry->target_value
10893 + stub_entry->target_section->output_offset
10894 + stub_entry->target_section->output_section->vma);
6911b7dc
AM
10895 if (stub_entry->stub_type != ppc_stub_plt_branch_r2off)
10896 dest += PPC64_LOCAL_ENTRY_OFFSET (stub_entry->other);
721956f4 10897
176a0d42 10898 bfd_put_64 (htab->brlt->owner, dest,
4ce794b7 10899 htab->brlt->contents + br_entry->offset);
721956f4 10900
f94498ff 10901 if (br_entry->iter == htab->stub_iteration)
721956f4 10902 {
f94498ff 10903 br_entry->iter = 0;
84f5d08e 10904
f94498ff 10905 if (htab->relbrlt != NULL)
84f5d08e 10906 {
f94498ff
AM
10907 /* Create a reloc for the branch lookup table entry. */
10908 Elf_Internal_Rela rela;
10909 bfd_byte *rl;
10910
10911 rela.r_offset = (br_entry->offset
10912 + htab->brlt->output_offset
10913 + htab->brlt->output_section->vma);
10914 rela.r_info = ELF64_R_INFO (0, R_PPC64_RELATIVE);
176a0d42 10915 rela.r_addend = dest;
f94498ff
AM
10916
10917 rl = htab->relbrlt->contents;
10918 rl += (htab->relbrlt->reloc_count++
10919 * sizeof (Elf64_External_Rela));
10920 bfd_elf64_swap_reloca_out (htab->relbrlt->owner, &rela, rl);
10921 }
10922 else if (info->emitrelocations)
10923 {
176a0d42
AM
10924 r = get_relocs (htab->brlt, 1);
10925 if (r == NULL)
10926 return FALSE;
10927 /* brlt, being SEC_LINKER_CREATED does not go through the
10928 normal reloc processing. Symbols and offsets are not
10929 translated from input file to output file form, so
10930 set up the offset per the output file. */
f94498ff
AM
10931 r->r_offset = (br_entry->offset
10932 + htab->brlt->output_offset
10933 + htab->brlt->output_section->vma);
10934 r->r_info = ELF64_R_INFO (0, R_PPC64_RELATIVE);
176a0d42 10935 r->r_addend = dest;
84f5d08e 10936 }
84f5d08e 10937 }
721956f4 10938
176a0d42
AM
10939 dest = (br_entry->offset
10940 + htab->brlt->output_offset
10941 + htab->brlt->output_section->vma);
10942
10943 off = (dest
4ce794b7 10944 - elf_gp (htab->brlt->output_section->owner)
6f20ed8a 10945 - htab->sec_info[stub_entry->group->link_sec->id].toc_off);
721956f4 10946
ad8e1ba5 10947 if (off + 0x80008000 > 0xffffffff || (off & 7) != 0)
5d1634d7 10948 {
25f53a85 10949 info->callbacks->einfo
bc30df16 10950 (_("%P: linkage table error against `%T'\n"),
721956f4 10951 stub_entry->root.string);
5d1634d7 10952 bfd_set_error (bfd_error_bad_value);
b34976b6
AM
10953 htab->stub_error = TRUE;
10954 return FALSE;
5d1634d7 10955 }
41bd81ab 10956
176a0d42
AM
10957 if (info->emitrelocations)
10958 {
6f20ed8a 10959 r = get_relocs (stub_entry->group->stub_sec, 1 + (PPC_HA (off) != 0));
176a0d42
AM
10960 if (r == NULL)
10961 return FALSE;
6f20ed8a 10962 r[0].r_offset = loc - stub_entry->group->stub_sec->contents;
7cfbafbc
AM
10963 if (bfd_big_endian (info->output_bfd))
10964 r[0].r_offset += 2;
00f412ee 10965 if (stub_entry->stub_type == ppc_stub_plt_branch_r2off)
176a0d42
AM
10966 r[0].r_offset += 4;
10967 r[0].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_DS);
10968 r[0].r_addend = dest;
10969 if (PPC_HA (off) != 0)
10970 {
10971 r[0].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_HA);
10972 r[1].r_offset = r[0].r_offset + 4;
10973 r[1].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_LO_DS);
10974 r[1].r_addend = r[0].r_addend;
10975 }
10976 }
10977
00f412ee 10978 if (stub_entry->stub_type != ppc_stub_plt_branch_r2off)
ad8e1ba5 10979 {
176a0d42 10980 if (PPC_HA (off) != 0)
ac2df442
AM
10981 {
10982 size = 16;
e7d1c40c 10983 bfd_put_32 (htab->params->stub_bfd,
397998fc 10984 ADDIS_R12_R2 | PPC_HA (off), loc);
ac2df442 10985 loc += 4;
e7d1c40c 10986 bfd_put_32 (htab->params->stub_bfd,
397998fc 10987 LD_R12_0R12 | PPC_LO (off), loc);
ac2df442
AM
10988 }
10989 else
10990 {
10991 size = 12;
e7d1c40c
AM
10992 bfd_put_32 (htab->params->stub_bfd,
10993 LD_R12_0R2 | PPC_LO (off), loc);
ac2df442 10994 }
ad8e1ba5
AM
10995 }
10996 else
10997 {
25f53a85 10998 bfd_vma r2off = get_r2off (info, stub_entry);
aa374f67 10999
a7c49797 11000 if (r2off == (bfd_vma) -1)
aa374f67
AM
11001 {
11002 htab->stub_error = TRUE;
11003 return FALSE;
11004 }
ad8e1ba5 11005
e7d1c40c 11006 bfd_put_32 (htab->params->stub_bfd, STD_R2_0R1 + STK_TOC (htab), loc);
ad8e1ba5 11007 loc += 4;
00f412ee 11008 size = 16;
176a0d42 11009 if (PPC_HA (off) != 0)
ac2df442
AM
11010 {
11011 size += 4;
e7d1c40c 11012 bfd_put_32 (htab->params->stub_bfd,
397998fc 11013 ADDIS_R12_R2 | PPC_HA (off), loc);
ac2df442 11014 loc += 4;
e7d1c40c 11015 bfd_put_32 (htab->params->stub_bfd,
397998fc 11016 LD_R12_0R12 | PPC_LO (off), loc);
ac2df442
AM
11017 }
11018 else
e7d1c40c 11019 bfd_put_32 (htab->params->stub_bfd, LD_R12_0R2 | PPC_LO (off), loc);
ac2df442
AM
11020
11021 if (PPC_HA (r2off) != 0)
11022 {
11023 size += 4;
00f412ee 11024 loc += 4;
e7d1c40c
AM
11025 bfd_put_32 (htab->params->stub_bfd,
11026 ADDIS_R2_R2 | PPC_HA (r2off), loc);
00f412ee
AM
11027 }
11028 if (PPC_LO (r2off) != 0)
11029 {
11030 size += 4;
ac2df442 11031 loc += 4;
e7d1c40c
AM
11032 bfd_put_32 (htab->params->stub_bfd,
11033 ADDI_R2_R2 | PPC_LO (r2off), loc);
ac2df442 11034 }
ad8e1ba5
AM
11035 }
11036 loc += 4;
e7d1c40c 11037 bfd_put_32 (htab->params->stub_bfd, MTCTR_R12, loc);
ad8e1ba5 11038 loc += 4;
e7d1c40c 11039 bfd_put_32 (htab->params->stub_bfd, BCTR, loc);
721956f4 11040 break;
5d1634d7 11041
721956f4 11042 case ppc_stub_plt_call:
794e51c0 11043 case ppc_stub_plt_call_r2save:
e054468f 11044 if (stub_entry->h != NULL
b31867b6
AM
11045 && stub_entry->h->is_func_descriptor
11046 && stub_entry->h->oh != NULL)
c862ae31 11047 {
b31867b6
AM
11048 struct ppc_link_hash_entry *fh = ppc_follow_link (stub_entry->h->oh);
11049
11050 /* If the old-ABI "dot-symbol" is undefined make it weak so
6f20ed8a 11051 we don't get a link error from RELOC_FOR_GLOBAL_SYMBOL. */
b31867b6
AM
11052 if (fh->elf.root.type == bfd_link_hash_undefined)
11053 fh->elf.root.type = bfd_link_hash_undefweak;
9507a174
AM
11054 /* Stop undo_symbol_twiddle changing it back to undefined. */
11055 fh->was_undefined = 0;
c862ae31
AM
11056 }
11057
721956f4 11058 /* Now build the stub. */
e054468f 11059 dest = stub_entry->plt_ent->plt.offset & ~1;
176a0d42 11060 if (dest >= (bfd_vma) -2)
721956f4
AM
11061 abort ();
11062
33e44f2e 11063 plt = htab->elf.splt;
25f23106
AM
11064 if (!htab->elf.dynamic_sections_created
11065 || stub_entry->h == NULL
11066 || stub_entry->h->elf.dynindx == -1)
33e44f2e 11067 plt = htab->elf.iplt;
e054468f
AM
11068
11069 dest += plt->output_offset + plt->output_section->vma;
11070
11071 if (stub_entry->h == NULL
11072 && (stub_entry->plt_ent->plt.offset & 1) == 0)
11073 {
11074 Elf_Internal_Rela rela;
11075 bfd_byte *rl;
11076
11077 rela.r_offset = dest;
ee67d69a
AM
11078 if (htab->opd_abi)
11079 rela.r_info = ELF64_R_INFO (0, R_PPC64_JMP_IREL);
11080 else
11081 rela.r_info = ELF64_R_INFO (0, R_PPC64_IRELATIVE);
e054468f
AM
11082 rela.r_addend = (stub_entry->target_value
11083 + stub_entry->target_section->output_offset
11084 + stub_entry->target_section->output_section->vma);
11085
33e44f2e
AM
11086 rl = (htab->elf.irelplt->contents
11087 + (htab->elf.irelplt->reloc_count++
25f23106
AM
11088 * sizeof (Elf64_External_Rela)));
11089 bfd_elf64_swap_reloca_out (info->output_bfd, &rela, rl);
e054468f
AM
11090 stub_entry->plt_ent->plt.offset |= 1;
11091 }
176a0d42
AM
11092
11093 off = (dest
e054468f 11094 - elf_gp (plt->output_section->owner)
6f20ed8a 11095 - htab->sec_info[stub_entry->group->link_sec->id].toc_off);
721956f4 11096
ad8e1ba5 11097 if (off + 0x80008000 > 0xffffffff || (off & 7) != 0)
721956f4 11098 {
25f53a85 11099 info->callbacks->einfo
bc30df16 11100 (_("%P: linkage table error against `%T'\n"),
e054468f
AM
11101 stub_entry->h != NULL
11102 ? stub_entry->h->elf.root.root.string
11103 : "<local sym>");
721956f4 11104 bfd_set_error (bfd_error_bad_value);
b34976b6
AM
11105 htab->stub_error = TRUE;
11106 return FALSE;
721956f4
AM
11107 }
11108
e7d1c40c 11109 if (htab->params->plt_stub_align != 0)
794e51c0
AM
11110 {
11111 unsigned pad = plt_stub_pad (htab, stub_entry, off);
11112
6f20ed8a
AM
11113 stub_entry->group->stub_sec->size += pad;
11114 stub_entry->stub_offset = stub_entry->group->stub_sec->size;
794e51c0
AM
11115 loc += pad;
11116 }
11117
176a0d42
AM
11118 r = NULL;
11119 if (info->emitrelocations)
11120 {
6f20ed8a 11121 r = get_relocs (stub_entry->group->stub_sec,
3ba720c7
AM
11122 ((PPC_HA (off) != 0)
11123 + (htab->opd_abi
e7d1c40c 11124 ? 2 + (htab->params->plt_static_chain
3ba720c7
AM
11125 && PPC_HA (off + 16) == PPC_HA (off))
11126 : 1)));
176a0d42
AM
11127 if (r == NULL)
11128 return FALSE;
6f20ed8a 11129 r[0].r_offset = loc - stub_entry->group->stub_sec->contents;
7cfbafbc
AM
11130 if (bfd_big_endian (info->output_bfd))
11131 r[0].r_offset += 2;
176a0d42
AM
11132 r[0].r_addend = dest;
11133 }
a7f2871e
AM
11134 if (stub_entry->h != NULL
11135 && (stub_entry->h == htab->tls_get_addr_fd
11136 || stub_entry->h == htab->tls_get_addr)
7c9cf415 11137 && htab->params->tls_get_addr_opt)
794e51c0 11138 p = build_tls_get_addr_stub (htab, stub_entry, loc, off, r);
a7f2871e 11139 else
794e51c0 11140 p = build_plt_stub (htab, stub_entry, loc, off, r);
721956f4
AM
11141 size = p - loc;
11142 break;
11143
a4b6fadd
AM
11144 case ppc_stub_save_res:
11145 return TRUE;
11146
721956f4
AM
11147 default:
11148 BFD_FAIL ();
b34976b6 11149 return FALSE;
721956f4
AM
11150 }
11151
6f20ed8a 11152 stub_entry->group->stub_sec->size += size;
97b639ba 11153
e7d1c40c 11154 if (htab->params->emit_stub_syms)
97b639ba
AM
11155 {
11156 struct elf_link_hash_entry *h;
ee75fd95
AM
11157 size_t len1, len2;
11158 char *name;
11159 const char *const stub_str[] = { "long_branch",
11160 "long_branch_r2off",
11161 "plt_branch",
11162 "plt_branch_r2off",
794e51c0 11163 "plt_call",
ee75fd95
AM
11164 "plt_call" };
11165
11166 len1 = strlen (stub_str[stub_entry->stub_type - 1]);
11167 len2 = strlen (stub_entry->root.string);
11168 name = bfd_malloc (len1 + len2 + 2);
11169 if (name == NULL)
11170 return FALSE;
11171 memcpy (name, stub_entry->root.string, 9);
11172 memcpy (name + 9, stub_str[stub_entry->stub_type - 1], len1);
11173 memcpy (name + len1 + 9, stub_entry->root.string + 8, len2 - 8 + 1);
11174 h = elf_link_hash_lookup (&htab->elf, name, TRUE, FALSE, FALSE);
97b639ba
AM
11175 if (h == NULL)
11176 return FALSE;
11177 if (h->root.type == bfd_link_hash_new)
11178 {
11179 h->root.type = bfd_link_hash_defined;
6f20ed8a 11180 h->root.u.def.section = stub_entry->group->stub_sec;
97b639ba 11181 h->root.u.def.value = stub_entry->stub_offset;
f5385ebf
AM
11182 h->ref_regular = 1;
11183 h->def_regular = 1;
11184 h->ref_regular_nonweak = 1;
11185 h->forced_local = 1;
11186 h->non_elf = 0;
2ec55de3 11187 h->root.linker_def = 1;
97b639ba
AM
11188 }
11189 }
11190
b34976b6 11191 return TRUE;
721956f4
AM
11192}
11193
11194/* As above, but don't actually build the stub. Just bump offset so
11195 we know stub section sizes, and select plt_branch stubs where
11196 long_branch stubs won't do. */
11197
b34976b6 11198static bfd_boolean
4ce794b7 11199ppc_size_one_stub (struct bfd_hash_entry *gen_entry, void *in_arg)
721956f4
AM
11200{
11201 struct ppc_stub_hash_entry *stub_entry;
63bc6f6c 11202 struct bfd_link_info *info;
721956f4
AM
11203 struct ppc_link_hash_table *htab;
11204 bfd_vma off;
11205 int size;
11206
11207 /* Massage our args to the form they really have. */
11208 stub_entry = (struct ppc_stub_hash_entry *) gen_entry;
63bc6f6c
AM
11209 info = in_arg;
11210
11211 htab = ppc_hash_table (info);
4dfe6ac6
NC
11212 if (htab == NULL)
11213 return FALSE;
721956f4 11214
a4b6fadd
AM
11215 if (stub_entry->h != NULL
11216 && stub_entry->h->save_res
11217 && stub_entry->h->elf.root.type == bfd_link_hash_defined
11218 && stub_entry->h->elf.root.u.def.section == htab->sfpr)
11219 {
11220 /* Don't make stubs to out-of-line register save/restore
11221 functions. Instead, emit copies of the functions. */
11222 stub_entry->group->needs_save_res = 1;
11223 stub_entry->stub_type = ppc_stub_save_res;
11224 return TRUE;
11225 }
11226
794e51c0
AM
11227 if (stub_entry->stub_type == ppc_stub_plt_call
11228 || stub_entry->stub_type == ppc_stub_plt_call_r2save)
721956f4 11229 {
e054468f
AM
11230 asection *plt;
11231 off = stub_entry->plt_ent->plt.offset & ~(bfd_vma) 1;
58ac9f71 11232 if (off >= (bfd_vma) -2)
411e1bfb 11233 abort ();
33e44f2e 11234 plt = htab->elf.splt;
25f23106
AM
11235 if (!htab->elf.dynamic_sections_created
11236 || stub_entry->h == NULL
11237 || stub_entry->h->elf.dynindx == -1)
33e44f2e 11238 plt = htab->elf.iplt;
e054468f
AM
11239 off += (plt->output_offset
11240 + plt->output_section->vma
11241 - elf_gp (plt->output_section->owner)
6f20ed8a 11242 - htab->sec_info[stub_entry->group->link_sec->id].toc_off);
721956f4 11243
794e51c0 11244 size = plt_stub_size (htab, stub_entry, off);
e7d1c40c 11245 if (htab->params->plt_stub_align)
794e51c0 11246 size += plt_stub_pad (htab, stub_entry, off);
176a0d42
AM
11247 if (info->emitrelocations)
11248 {
6f20ed8a 11249 stub_entry->group->stub_sec->reloc_count
b9e5796b
AM
11250 += ((PPC_HA (off) != 0)
11251 + (htab->opd_abi
e7d1c40c 11252 ? 2 + (htab->params->plt_static_chain
b9e5796b
AM
11253 && PPC_HA (off + 16) == PPC_HA (off))
11254 : 1));
6f20ed8a 11255 stub_entry->group->stub_sec->flags |= SEC_RELOC;
176a0d42 11256 }
721956f4
AM
11257 }
11258 else
11259 {
ad8e1ba5
AM
11260 /* ppc_stub_long_branch or ppc_stub_plt_branch, or their r2off
11261 variants. */
ac2df442 11262 bfd_vma r2off = 0;
6911b7dc 11263 bfd_vma local_off = 0;
ac2df442 11264
721956f4
AM
11265 off = (stub_entry->target_value
11266 + stub_entry->target_section->output_offset
11267 + stub_entry->target_section->output_section->vma);
6f20ed8a
AM
11268 off -= (stub_entry->group->stub_sec->size
11269 + stub_entry->group->stub_sec->output_offset
11270 + stub_entry->group->stub_sec->output_section->vma);
721956f4 11271
ad8e1ba5
AM
11272 /* Reset the stub type from the plt variant in case we now
11273 can reach with a shorter stub. */
11274 if (stub_entry->stub_type >= ppc_stub_plt_branch)
11275 stub_entry->stub_type += ppc_stub_long_branch - ppc_stub_plt_branch;
11276
11277 size = 4;
11278 if (stub_entry->stub_type == ppc_stub_long_branch_r2off)
11279 {
25f53a85 11280 r2off = get_r2off (info, stub_entry);
a7c49797 11281 if (r2off == (bfd_vma) -1)
aa374f67
AM
11282 {
11283 htab->stub_error = TRUE;
11284 return FALSE;
11285 }
a7c49797 11286 size = 8;
ac2df442 11287 if (PPC_HA (r2off) != 0)
a7c49797
AM
11288 size += 4;
11289 if (PPC_LO (r2off) != 0)
11290 size += 4;
ac2df442 11291 off -= size - 4;
ad8e1ba5
AM
11292 }
11293
6911b7dc
AM
11294 local_off = PPC64_LOCAL_ENTRY_OFFSET (stub_entry->other);
11295
b9e5796b
AM
11296 /* If the branch offset if too big, use a ppc_stub_plt_branch.
11297 Do the same for -R objects without function descriptors. */
11298 if (off + (1 << 25) >= (bfd_vma) (1 << 26) - local_off
11299 || (stub_entry->stub_type == ppc_stub_long_branch_r2off
a7c49797
AM
11300 && r2off == 0
11301 && htab->sec_info[stub_entry->target_section->id].toc_off == 0))
721956f4
AM
11302 {
11303 struct ppc_branch_hash_entry *br_entry;
11304
11305 br_entry = ppc_branch_hash_lookup (&htab->branch_hash_table,
11306 stub_entry->root.string + 9,
b34976b6 11307 TRUE, FALSE);
721956f4
AM
11308 if (br_entry == NULL)
11309 {
8de848d8 11310 info->callbacks->einfo (_("%P: can't build branch stub `%s'\n"),
25f53a85 11311 stub_entry->root.string);
b34976b6
AM
11312 htab->stub_error = TRUE;
11313 return FALSE;
721956f4
AM
11314 }
11315
11316 if (br_entry->iter != htab->stub_iteration)
11317 {
11318 br_entry->iter = htab->stub_iteration;
eea6121a
AM
11319 br_entry->offset = htab->brlt->size;
11320 htab->brlt->size += 8;
63bc6f6c 11321
ee75fd95 11322 if (htab->relbrlt != NULL)
eea6121a 11323 htab->relbrlt->size += sizeof (Elf64_External_Rela);
84f5d08e
AM
11324 else if (info->emitrelocations)
11325 {
11326 htab->brlt->reloc_count += 1;
11327 htab->brlt->flags |= SEC_RELOC;
11328 }
721956f4 11329 }
ad8e1ba5
AM
11330
11331 stub_entry->stub_type += ppc_stub_plt_branch - ppc_stub_long_branch;
ac2df442
AM
11332 off = (br_entry->offset
11333 + htab->brlt->output_offset
11334 + htab->brlt->output_section->vma
11335 - elf_gp (htab->brlt->output_section->owner)
6f20ed8a 11336 - htab->sec_info[stub_entry->group->link_sec->id].toc_off);
ac2df442 11337
176a0d42
AM
11338 if (info->emitrelocations)
11339 {
6f20ed8a
AM
11340 stub_entry->group->stub_sec->reloc_count
11341 += 1 + (PPC_HA (off) != 0);
11342 stub_entry->group->stub_sec->flags |= SEC_RELOC;
176a0d42
AM
11343 }
11344
00f412ee 11345 if (stub_entry->stub_type != ppc_stub_plt_branch_r2off)
ac2df442
AM
11346 {
11347 size = 12;
176a0d42 11348 if (PPC_HA (off) != 0)
ac2df442
AM
11349 size = 16;
11350 }
11351 else
11352 {
00f412ee 11353 size = 16;
176a0d42 11354 if (PPC_HA (off) != 0)
ac2df442
AM
11355 size += 4;
11356
11357 if (PPC_HA (r2off) != 0)
11358 size += 4;
00f412ee
AM
11359 if (PPC_LO (r2off) != 0)
11360 size += 4;
ac2df442 11361 }
721956f4 11362 }
84f5d08e
AM
11363 else if (info->emitrelocations)
11364 {
6f20ed8a
AM
11365 stub_entry->group->stub_sec->reloc_count += 1;
11366 stub_entry->group->stub_sec->flags |= SEC_RELOC;
84f5d08e 11367 }
721956f4
AM
11368 }
11369
6f20ed8a 11370 stub_entry->group->stub_sec->size += size;
b34976b6 11371 return TRUE;
721956f4
AM
11372}
11373
11374/* Set up various things so that we can make a list of input sections
11375 for each output section included in the link. Returns -1 on error,
cedb70c5 11376 0 when no stubs will be needed, and 1 on success. */
721956f4
AM
11377
11378int
e7d1c40c 11379ppc64_elf_setup_section_lists (struct bfd_link_info *info)
721956f4 11380{
6f20ed8a 11381 unsigned int id;
721956f4
AM
11382 bfd_size_type amt;
11383 struct ppc_link_hash_table *htab = ppc_hash_table (info);
11384
4dfe6ac6
NC
11385 if (htab == NULL)
11386 return -1;
4c52953f 11387
6f20ed8a
AM
11388 htab->sec_info_arr_size = bfd_get_next_section_id ();
11389 amt = sizeof (*htab->sec_info) * (htab->sec_info_arr_size);
11390 htab->sec_info = bfd_zmalloc (amt);
11391 if (htab->sec_info == NULL)
721956f4
AM
11392 return -1;
11393
3d6f9012
AM
11394 /* Set toc_off for com, und, abs and ind sections. */
11395 for (id = 0; id < 3; id++)
6f20ed8a 11396 htab->sec_info[id].toc_off = TOC_BASE_OFF;
734b6cf9 11397
721956f4
AM
11398 return 1;
11399}
11400
927be08e
AM
11401/* Set up for first pass at multitoc partitioning. */
11402
11403void
11404ppc64_elf_start_multitoc_partition (struct bfd_link_info *info)
11405{
11406 struct ppc_link_hash_table *htab = ppc_hash_table (info);
11407
1c865ab2 11408 htab->toc_curr = ppc64_elf_set_toc (info, info->output_bfd);
927be08e
AM
11409 htab->toc_bfd = NULL;
11410 htab->toc_first_sec = NULL;
11411}
11412
e717da7e
AM
11413/* The linker repeatedly calls this function for each TOC input section
11414 and linker generated GOT section. Group input bfds such that the toc
927be08e 11415 within a group is less than 64k in size. */
ad8e1ba5 11416
927be08e 11417bfd_boolean
4ce794b7 11418ppc64_elf_next_toc_section (struct bfd_link_info *info, asection *isec)
ad8e1ba5
AM
11419{
11420 struct ppc_link_hash_table *htab = ppc_hash_table (info);
d77c8a4b 11421 bfd_vma addr, off, limit;
ad8e1ba5 11422
4dfe6ac6
NC
11423 if (htab == NULL)
11424 return FALSE;
11425
927be08e 11426 if (!htab->second_toc_pass)
4c52953f 11427 {
927be08e 11428 /* Keep track of the first .toc or .got section for this input bfd. */
a4fd3de5
AM
11429 bfd_boolean new_bfd = htab->toc_bfd != isec->owner;
11430
11431 if (new_bfd)
bf102f86
AM
11432 {
11433 htab->toc_bfd = isec->owner;
11434 htab->toc_first_sec = isec;
11435 }
927be08e 11436
bf102f86
AM
11437 addr = isec->output_offset + isec->output_section->vma;
11438 off = addr - htab->toc_curr;
d77c8a4b
AM
11439 limit = 0x80008000;
11440 if (ppc64_elf_tdata (isec->owner)->has_small_toc_reloc)
11441 limit = 0x10000;
11442 if (off + isec->size > limit)
bf102f86
AM
11443 {
11444 addr = (htab->toc_first_sec->output_offset
11445 + htab->toc_first_sec->output_section->vma);
11446 htab->toc_curr = addr;
a27e685f 11447 htab->toc_curr &= -TOC_BASE_ALIGN;
bf102f86 11448 }
99877b66 11449
927be08e
AM
11450 /* toc_curr is the base address of this toc group. Set elf_gp
11451 for the input section to be the offset relative to the
11452 output toc base plus 0x8000. Making the input elf_gp an
11453 offset allows us to move the toc as a whole without
11454 recalculating input elf_gp. */
11455 off = htab->toc_curr - elf_gp (isec->output_section->owner);
11456 off += TOC_BASE_OFF;
11457
11458 /* Die if someone uses a linker script that doesn't keep input
11459 file .toc and .got together. */
a4fd3de5
AM
11460 if (new_bfd
11461 && elf_gp (isec->owner) != 0
927be08e
AM
11462 && elf_gp (isec->owner) != off)
11463 return FALSE;
11464
11465 elf_gp (isec->owner) = off;
11466 return TRUE;
4c52953f 11467 }
927be08e
AM
11468
11469 /* During the second pass toc_first_sec points to the start of
11470 a toc group, and toc_curr is used to track the old elf_gp.
11471 We use toc_bfd to ensure we only look at each bfd once. */
11472 if (htab->toc_bfd == isec->owner)
11473 return TRUE;
11474 htab->toc_bfd = isec->owner;
11475
11476 if (htab->toc_first_sec == NULL
11477 || htab->toc_curr != elf_gp (isec->owner))
11478 {
11479 htab->toc_curr = elf_gp (isec->owner);
11480 htab->toc_first_sec = isec;
11481 }
11482 addr = (htab->toc_first_sec->output_offset
11483 + htab->toc_first_sec->output_section->vma);
11484 off = addr - elf_gp (isec->output_section->owner) + TOC_BASE_OFF;
11485 elf_gp (isec->owner) = off;
11486
11487 return TRUE;
ad8e1ba5
AM
11488}
11489
927be08e
AM
11490/* Called via elf_link_hash_traverse to merge GOT entries for global
11491 symbol H. */
11492
11493static bfd_boolean
11494merge_global_got (struct elf_link_hash_entry *h, void *inf ATTRIBUTE_UNUSED)
11495{
11496 if (h->root.type == bfd_link_hash_indirect)
11497 return TRUE;
11498
927be08e
AM
11499 merge_got_entries (&h->got.glist);
11500
11501 return TRUE;
11502}
11503
11504/* Called via elf_link_hash_traverse to allocate GOT entries for global
11505 symbol H. */
11506
11507static bfd_boolean
11508reallocate_got (struct elf_link_hash_entry *h, void *inf)
11509{
11510 struct got_entry *gent;
11511
11512 if (h->root.type == bfd_link_hash_indirect)
11513 return TRUE;
11514
927be08e
AM
11515 for (gent = h->got.glist; gent != NULL; gent = gent->next)
11516 if (!gent->is_indirect)
11517 allocate_got (h, (struct bfd_link_info *) inf, gent);
11518 return TRUE;
11519}
11520
11521/* Called on the first multitoc pass after the last call to
11522 ppc64_elf_next_toc_section. This function removes duplicate GOT
11523 entries. */
11524
11525bfd_boolean
11526ppc64_elf_layout_multitoc (struct bfd_link_info *info)
ad8e1ba5
AM
11527{
11528 struct ppc_link_hash_table *htab = ppc_hash_table (info);
927be08e
AM
11529 struct bfd *ibfd, *ibfd2;
11530 bfd_boolean done_something;
11531
11532 htab->multi_toc_needed = htab->toc_curr != elf_gp (info->output_bfd);
ad8e1ba5 11533
7865406b
AM
11534 if (!htab->do_multi_toc)
11535 return FALSE;
11536
d0fae19d 11537 /* Merge global sym got entries within a toc group. */
927be08e
AM
11538 elf_link_hash_traverse (&htab->elf, merge_global_got, info);
11539
11540 /* And tlsld_got. */
c72f2fb2 11541 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
927be08e
AM
11542 {
11543 struct got_entry *ent, *ent2;
11544
11545 if (!is_ppc64_elf (ibfd))
11546 continue;
11547
11548 ent = ppc64_tlsld_got (ibfd);
11549 if (!ent->is_indirect
11550 && ent->got.offset != (bfd_vma) -1)
11551 {
c72f2fb2 11552 for (ibfd2 = ibfd->link.next; ibfd2 != NULL; ibfd2 = ibfd2->link.next)
927be08e
AM
11553 {
11554 if (!is_ppc64_elf (ibfd2))
11555 continue;
11556
11557 ent2 = ppc64_tlsld_got (ibfd2);
11558 if (!ent2->is_indirect
11559 && ent2->got.offset != (bfd_vma) -1
11560 && elf_gp (ibfd2) == elf_gp (ibfd))
11561 {
11562 ent2->is_indirect = TRUE;
11563 ent2->got.ent = ent;
11564 }
11565 }
11566 }
11567 }
11568
11569 /* Zap sizes of got sections. */
33e44f2e
AM
11570 htab->elf.irelplt->rawsize = htab->elf.irelplt->size;
11571 htab->elf.irelplt->size -= htab->got_reli_size;
927be08e
AM
11572 htab->got_reli_size = 0;
11573
c72f2fb2 11574 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
927be08e
AM
11575 {
11576 asection *got, *relgot;
11577
11578 if (!is_ppc64_elf (ibfd))
11579 continue;
11580
11581 got = ppc64_elf_tdata (ibfd)->got;
11582 if (got != NULL)
11583 {
11584 got->rawsize = got->size;
11585 got->size = 0;
11586 relgot = ppc64_elf_tdata (ibfd)->relgot;
11587 relgot->rawsize = relgot->size;
11588 relgot->size = 0;
11589 }
11590 }
11591
11592 /* Now reallocate the got, local syms first. We don't need to
11593 allocate section contents again since we never increase size. */
c72f2fb2 11594 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
927be08e
AM
11595 {
11596 struct got_entry **lgot_ents;
11597 struct got_entry **end_lgot_ents;
11598 struct plt_entry **local_plt;
11599 struct plt_entry **end_local_plt;
f961d9dd 11600 unsigned char *lgot_masks;
927be08e
AM
11601 bfd_size_type locsymcount;
11602 Elf_Internal_Shdr *symtab_hdr;
19e08130 11603 asection *s;
927be08e
AM
11604
11605 if (!is_ppc64_elf (ibfd))
11606 continue;
11607
11608 lgot_ents = elf_local_got_ents (ibfd);
11609 if (!lgot_ents)
11610 continue;
11611
11612 symtab_hdr = &elf_symtab_hdr (ibfd);
11613 locsymcount = symtab_hdr->sh_info;
11614 end_lgot_ents = lgot_ents + locsymcount;
11615 local_plt = (struct plt_entry **) end_lgot_ents;
11616 end_local_plt = local_plt + locsymcount;
f961d9dd 11617 lgot_masks = (unsigned char *) end_local_plt;
927be08e 11618 s = ppc64_elf_tdata (ibfd)->got;
927be08e
AM
11619 for (; lgot_ents < end_lgot_ents; ++lgot_ents, ++lgot_masks)
11620 {
11621 struct got_entry *ent;
11622
11623 for (ent = *lgot_ents; ent != NULL; ent = ent->next)
d0fae19d 11624 {
19e08130
AM
11625 unsigned int ent_size = 8;
11626 unsigned int rel_size = sizeof (Elf64_External_Rela);
11627
d0fae19d
AM
11628 ent->got.offset = s->size;
11629 if ((ent->tls_type & *lgot_masks & TLS_GD) != 0)
d0fae19d 11630 {
19e08130
AM
11631 ent_size *= 2;
11632 rel_size *= 2;
11633 }
11634 s->size += ent_size;
11635 if ((*lgot_masks & PLT_IFUNC) != 0)
11636 {
33e44f2e 11637 htab->elf.irelplt->size += rel_size;
19e08130
AM
11638 htab->got_reli_size += rel_size;
11639 }
0e1862bb 11640 else if (bfd_link_pic (info))
19e08130
AM
11641 {
11642 asection *srel = ppc64_elf_tdata (ibfd)->relgot;
11643 srel->size += rel_size;
d0fae19d
AM
11644 }
11645 }
927be08e
AM
11646 }
11647 }
11648
11649 elf_link_hash_traverse (&htab->elf, reallocate_got, info);
11650
c72f2fb2 11651 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
927be08e
AM
11652 {
11653 struct got_entry *ent;
11654
11655 if (!is_ppc64_elf (ibfd))
11656 continue;
11657
11658 ent = ppc64_tlsld_got (ibfd);
11659 if (!ent->is_indirect
11660 && ent->got.offset != (bfd_vma) -1)
11661 {
11662 asection *s = ppc64_elf_tdata (ibfd)->got;
11663 ent->got.offset = s->size;
11664 s->size += 16;
0e1862bb 11665 if (bfd_link_pic (info))
927be08e
AM
11666 {
11667 asection *srel = ppc64_elf_tdata (ibfd)->relgot;
11668 srel->size += sizeof (Elf64_External_Rela);
11669 }
11670 }
11671 }
11672
33e44f2e 11673 done_something = htab->elf.irelplt->rawsize != htab->elf.irelplt->size;
927be08e 11674 if (!done_something)
c72f2fb2 11675 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
927be08e
AM
11676 {
11677 asection *got;
11678
11679 if (!is_ppc64_elf (ibfd))
11680 continue;
11681
11682 got = ppc64_elf_tdata (ibfd)->got;
11683 if (got != NULL)
11684 {
11685 done_something = got->rawsize != got->size;
11686 if (done_something)
11687 break;
11688 }
11689 }
11690
11691 if (done_something)
e7d1c40c 11692 (*htab->params->layout_sections_again) ();
927be08e
AM
11693
11694 /* Set up for second pass over toc sections to recalculate elf_gp
11695 on input sections. */
11696 htab->toc_bfd = NULL;
11697 htab->toc_first_sec = NULL;
11698 htab->second_toc_pass = TRUE;
11699 return done_something;
11700}
11701
11702/* Called after second pass of multitoc partitioning. */
11703
11704void
11705ppc64_elf_finish_multitoc_partition (struct bfd_link_info *info)
11706{
11707 struct ppc_link_hash_table *htab = ppc_hash_table (info);
11708
11709 /* After the second pass, toc_curr tracks the TOC offset used
11710 for code sections below in ppc64_elf_next_input_section. */
3d6f9012 11711 htab->toc_curr = TOC_BASE_OFF;
ad8e1ba5
AM
11712}
11713
9b5ecbd0
AM
11714/* No toc references were found in ISEC. If the code in ISEC makes no
11715 calls, then there's no need to use toc adjusting stubs when branching
11716 into ISEC. Actually, indirect calls from ISEC are OK as they will
4c52953f
AM
11717 load r2. Returns -1 on error, 0 for no stub needed, 1 for stub
11718 needed, and 2 if a cyclical call-graph was found but no other reason
11719 for a stub was detected. If called from the top level, a return of
11720 2 means the same as a return of 0. */
9b5ecbd0
AM
11721
11722static int
4ce794b7 11723toc_adjusting_stub_needed (struct bfd_link_info *info, asection *isec)
9b5ecbd0 11724{
9b5ecbd0 11725 int ret;
70cc837d
AM
11726
11727 /* Mark this section as checked. */
11728 isec->call_check_done = 1;
9b5ecbd0 11729
772119ce
AM
11730 /* We know none of our code bearing sections will need toc stubs. */
11731 if ((isec->flags & SEC_LINKER_CREATED) != 0)
11732 return 0;
11733
eea6121a 11734 if (isec->size == 0)
082c50f8
AM
11735 return 0;
11736
4c52953f
AM
11737 if (isec->output_section == NULL)
11738 return 0;
11739
4c52953f 11740 ret = 0;
70cc837d 11741 if (isec->reloc_count != 0)
9b5ecbd0 11742 {
70cc837d
AM
11743 Elf_Internal_Rela *relstart, *rel;
11744 Elf_Internal_Sym *local_syms;
11745 struct ppc_link_hash_table *htab;
2917689a 11746
70cc837d
AM
11747 relstart = _bfd_elf_link_read_relocs (isec->owner, isec, NULL, NULL,
11748 info->keep_memory);
11749 if (relstart == NULL)
11750 return -1;
90aecf7a 11751
70cc837d
AM
11752 /* Look for branches to outside of this section. */
11753 local_syms = NULL;
11754 htab = ppc_hash_table (info);
11755 if (htab == NULL)
11756 return -1;
4c52953f 11757
70cc837d 11758 for (rel = relstart; rel < relstart + isec->reloc_count; ++rel)
4c52953f 11759 {
70cc837d
AM
11760 enum elf_ppc64_reloc_type r_type;
11761 unsigned long r_symndx;
11762 struct elf_link_hash_entry *h;
11763 struct ppc_link_hash_entry *eh;
11764 Elf_Internal_Sym *sym;
11765 asection *sym_sec;
11766 struct _opd_sec_data *opd;
11767 bfd_vma sym_value;
11768 bfd_vma dest;
11769
11770 r_type = ELF64_R_TYPE (rel->r_info);
11771 if (r_type != R_PPC64_REL24
11772 && r_type != R_PPC64_REL14
11773 && r_type != R_PPC64_REL14_BRTAKEN
11774 && r_type != R_PPC64_REL14_BRNTAKEN)
11775 continue;
4c52953f 11776
70cc837d
AM
11777 r_symndx = ELF64_R_SYM (rel->r_info);
11778 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms, r_symndx,
11779 isec->owner))
4c52953f 11780 {
70cc837d
AM
11781 ret = -1;
11782 break;
11783 }
4c52953f 11784
70cc837d
AM
11785 /* Calls to dynamic lib functions go through a plt call stub
11786 that uses r2. */
11787 eh = (struct ppc_link_hash_entry *) h;
11788 if (eh != NULL
11789 && (eh->elf.plt.plist != NULL
11790 || (eh->oh != NULL
11791 && ppc_follow_link (eh->oh)->elf.plt.plist != NULL)))
11792 {
11793 ret = 1;
11794 break;
4c52953f
AM
11795 }
11796
70cc837d
AM
11797 if (sym_sec == NULL)
11798 /* Ignore other undefined symbols. */
4c52953f 11799 continue;
4c52953f 11800
70cc837d
AM
11801 /* Assume branches to other sections not included in the
11802 link need stubs too, to cover -R and absolute syms. */
11803 if (sym_sec->output_section == NULL)
11804 {
11805 ret = 1;
11806 break;
11807 }
4c52953f 11808
70cc837d
AM
11809 if (h == NULL)
11810 sym_value = sym->st_value;
11811 else
11812 {
11813 if (h->root.type != bfd_link_hash_defined
11814 && h->root.type != bfd_link_hash_defweak)
11815 abort ();
11816 sym_value = h->root.u.def.value;
11817 }
11818 sym_value += rel->r_addend;
4c52953f 11819
70cc837d
AM
11820 /* If this branch reloc uses an opd sym, find the code section. */
11821 opd = get_opd_info (sym_sec);
11822 if (opd != NULL)
11823 {
11824 if (h == NULL && opd->adjust != NULL)
11825 {
11826 long adjust;
4c52953f 11827
92a9c616 11828 adjust = opd->adjust[OPD_NDX (sym_value)];
70cc837d
AM
11829 if (adjust == -1)
11830 /* Assume deleted functions won't ever be called. */
11831 continue;
11832 sym_value += adjust;
11833 }
4c52953f 11834
aef36ac1
AM
11835 dest = opd_entry_value (sym_sec, sym_value,
11836 &sym_sec, NULL, FALSE);
70cc837d
AM
11837 if (dest == (bfd_vma) -1)
11838 continue;
11839 }
11840 else
11841 dest = (sym_value
11842 + sym_sec->output_offset
11843 + sym_sec->output_section->vma);
4c52953f 11844
70cc837d
AM
11845 /* Ignore branch to self. */
11846 if (sym_sec == isec)
11847 continue;
4c52953f 11848
70cc837d
AM
11849 /* If the called function uses the toc, we need a stub. */
11850 if (sym_sec->has_toc_reloc
11851 || sym_sec->makes_toc_func_call)
4c52953f 11852 {
70cc837d 11853 ret = 1;
4c52953f
AM
11854 break;
11855 }
70cc837d
AM
11856
11857 /* Assume any branch that needs a long branch stub might in fact
11858 need a plt_branch stub. A plt_branch stub uses r2. */
11859 else if (dest - (isec->output_offset
11860 + isec->output_section->vma
6911b7dc
AM
11861 + rel->r_offset) + (1 << 25)
11862 >= (2u << 25) - PPC64_LOCAL_ENTRY_OFFSET (h
11863 ? h->other
11864 : sym->st_other))
4c52953f 11865 {
70cc837d
AM
11866 ret = 1;
11867 break;
11868 }
11869
11870 /* If calling back to a section in the process of being
11871 tested, we can't say for sure that no toc adjusting stubs
11872 are needed, so don't return zero. */
11873 else if (sym_sec->call_check_in_progress)
11874 ret = 2;
11875
11876 /* Branches to another section that itself doesn't have any TOC
11877 references are OK. Recursively call ourselves to check. */
11878 else if (!sym_sec->call_check_done)
11879 {
11880 int recur;
11881
11882 /* Mark current section as indeterminate, so that other
11883 sections that call back to current won't be marked as
11884 known. */
11885 isec->call_check_in_progress = 1;
11886 recur = toc_adjusting_stub_needed (info, sym_sec);
11887 isec->call_check_in_progress = 0;
11888
4c52953f
AM
11889 if (recur != 0)
11890 {
70cc837d
AM
11891 ret = recur;
11892 if (recur != 2)
11893 break;
4c52953f
AM
11894 }
11895 }
4c52953f 11896 }
70cc837d
AM
11897
11898 if (local_syms != NULL
11899 && (elf_symtab_hdr (isec->owner).contents
11900 != (unsigned char *) local_syms))
11901 free (local_syms);
11902 if (elf_section_data (isec)->relocs != relstart)
11903 free (relstart);
9b5ecbd0
AM
11904 }
11905
70cc837d
AM
11906 if ((ret & 1) == 0
11907 && isec->map_head.s != NULL
11908 && (strcmp (isec->output_section->name, ".init") == 0
11909 || strcmp (isec->output_section->name, ".fini") == 0))
11910 {
11911 if (isec->map_head.s->has_toc_reloc
11912 || isec->map_head.s->makes_toc_func_call)
11913 ret = 1;
11914 else if (!isec->map_head.s->call_check_done)
11915 {
11916 int recur;
11917 isec->call_check_in_progress = 1;
11918 recur = toc_adjusting_stub_needed (info, isec->map_head.s);
11919 isec->call_check_in_progress = 0;
11920 if (recur != 0)
11921 ret = recur;
11922 }
11923 }
11924
11925 if (ret == 1)
11926 isec->makes_toc_func_call = 1;
4c52953f 11927
9b5ecbd0
AM
11928 return ret;
11929}
11930
721956f4
AM
11931/* The linker repeatedly calls this function for each input section,
11932 in the order that input sections are linked into output sections.
11933 Build lists of input sections to determine groupings between which
11934 we may insert linker stubs. */
11935
9b5ecbd0 11936bfd_boolean
4ce794b7 11937ppc64_elf_next_input_section (struct bfd_link_info *info, asection *isec)
721956f4
AM
11938{
11939 struct ppc_link_hash_table *htab = ppc_hash_table (info);
11940
4dfe6ac6
NC
11941 if (htab == NULL)
11942 return FALSE;
11943
734b6cf9 11944 if ((isec->output_section->flags & SEC_CODE) != 0
6f20ed8a 11945 && isec->output_section->id < htab->sec_info_arr_size)
721956f4 11946 {
3d6f9012
AM
11947 /* This happens to make the list in reverse order,
11948 which is what we want. */
6f20ed8a
AM
11949 htab->sec_info[isec->id].u.list
11950 = htab->sec_info[isec->output_section->id].u.list;
11951 htab->sec_info[isec->output_section->id].u.list = isec;
721956f4 11952 }
ad8e1ba5 11953
4c52953f 11954 if (htab->multi_toc_needed)
9b5ecbd0 11955 {
8b974ba3
AM
11956 /* Analyse sections that aren't already flagged as needing a
11957 valid toc pointer. Exclude .fixup for the linux kernel.
11958 .fixup contains branches, but only back to the function that
11959 hit an exception. */
11960 if (!(isec->has_toc_reloc
11961 || (isec->flags & SEC_CODE) == 0
11962 || strcmp (isec->name, ".fixup") == 0
11963 || isec->call_check_done))
11964 {
11965 if (toc_adjusting_stub_needed (info, isec) < 0)
6683a28d 11966 return FALSE;
8b974ba3
AM
11967 }
11968 /* Make all sections use the TOC assigned for this object file.
11969 This will be wrong for pasted sections; We fix that in
11970 check_pasted_section(). */
11971 if (elf_gp (isec->owner) != 0)
11972 htab->toc_curr = elf_gp (isec->owner);
11973 }
11974
6f20ed8a 11975 htab->sec_info[isec->id].toc_off = htab->toc_curr;
9b5ecbd0 11976 return TRUE;
721956f4
AM
11977}
11978
70cc837d
AM
11979/* Check that all .init and .fini sections use the same toc, if they
11980 have toc relocs. */
11981
11982static bfd_boolean
11983check_pasted_section (struct bfd_link_info *info, const char *name)
11984{
11985 asection *o = bfd_get_section_by_name (info->output_bfd, name);
11986
11987 if (o != NULL)
11988 {
11989 struct ppc_link_hash_table *htab = ppc_hash_table (info);
11990 bfd_vma toc_off = 0;
11991 asection *i;
11992
11993 for (i = o->map_head.s; i != NULL; i = i->map_head.s)
11994 if (i->has_toc_reloc)
11995 {
11996 if (toc_off == 0)
6f20ed8a
AM
11997 toc_off = htab->sec_info[i->id].toc_off;
11998 else if (toc_off != htab->sec_info[i->id].toc_off)
70cc837d
AM
11999 return FALSE;
12000 }
6683a28d
AM
12001
12002 if (toc_off == 0)
12003 for (i = o->map_head.s; i != NULL; i = i->map_head.s)
12004 if (i->makes_toc_func_call)
12005 {
6f20ed8a 12006 toc_off = htab->sec_info[i->id].toc_off;
6683a28d
AM
12007 break;
12008 }
12009
70cc837d
AM
12010 /* Make sure the whole pasted function uses the same toc offset. */
12011 if (toc_off != 0)
12012 for (i = o->map_head.s; i != NULL; i = i->map_head.s)
6f20ed8a 12013 htab->sec_info[i->id].toc_off = toc_off;
70cc837d
AM
12014 }
12015 return TRUE;
12016}
12017
12018bfd_boolean
12019ppc64_elf_check_init_fini (struct bfd_link_info *info)
12020{
12021 return (check_pasted_section (info, ".init")
12022 & check_pasted_section (info, ".fini"));
12023}
12024
721956f4
AM
12025/* See whether we can group stub sections together. Grouping stub
12026 sections may result in fewer stubs. More importantly, we need to
12027 put all .init* and .fini* stubs at the beginning of the .init or
12028 .fini output sections respectively, because glibc splits the
12029 _init and _fini functions into multiple parts. Putting a stub in
12030 the middle of a function is not a good idea. */
12031
6f20ed8a
AM
12032static bfd_boolean
12033group_sections (struct bfd_link_info *info,
4ce794b7
AM
12034 bfd_size_type stub_group_size,
12035 bfd_boolean stubs_always_before_branch)
721956f4 12036{
6f20ed8a
AM
12037 struct ppc_link_hash_table *htab;
12038 asection *osec;
7c8fe5c4
AM
12039 bfd_size_type stub14_group_size;
12040 bfd_boolean suppress_size_errors;
12041
6f20ed8a
AM
12042 htab = ppc_hash_table (info);
12043 if (htab == NULL)
12044 return FALSE;
12045
7c8fe5c4 12046 suppress_size_errors = FALSE;
0cfb0717 12047 stub14_group_size = stub_group_size >> 10;
7c8fe5c4
AM
12048 if (stub_group_size == 1)
12049 {
12050 /* Default values. */
12051 if (stubs_always_before_branch)
12052 {
12053 stub_group_size = 0x1e00000;
12054 stub14_group_size = 0x7800;
12055 }
12056 else
12057 {
12058 stub_group_size = 0x1c00000;
12059 stub14_group_size = 0x7000;
12060 }
12061 suppress_size_errors = TRUE;
12062 }
12063
6f20ed8a 12064 for (osec = info->output_bfd->sections; osec != NULL; osec = osec->next)
721956f4 12065 {
6f20ed8a
AM
12066 asection *tail;
12067
12068 if (osec->id >= htab->sec_info_arr_size)
12069 continue;
12070
12071 tail = htab->sec_info[osec->id].u.list;
734b6cf9 12072 while (tail != NULL)
721956f4 12073 {
734b6cf9
AM
12074 asection *curr;
12075 asection *prev;
12076 bfd_size_type total;
12077 bfd_boolean big_sec;
12078 bfd_vma curr_toc;
6f20ed8a 12079 struct map_stub *group;
734b6cf9
AM
12080
12081 curr = tail;
eea6121a 12082 total = tail->size;
6bee8834
AM
12083 big_sec = total > (ppc64_elf_section_data (tail) != NULL
12084 && ppc64_elf_section_data (tail)->has_14bit_branch
7c8fe5c4
AM
12085 ? stub14_group_size : stub_group_size);
12086 if (big_sec && !suppress_size_errors)
5c3dead3
AM
12087 (*_bfd_error_handler) (_("%B section %A exceeds stub group size"),
12088 tail->owner, tail);
6f20ed8a 12089 curr_toc = htab->sec_info[tail->id].toc_off;
734b6cf9 12090
6f20ed8a 12091 while ((prev = htab->sec_info[curr->id].u.list) != NULL
734b6cf9 12092 && ((total += curr->output_offset - prev->output_offset)
6bee8834
AM
12093 < (ppc64_elf_section_data (prev) != NULL
12094 && ppc64_elf_section_data (prev)->has_14bit_branch
7c8fe5c4 12095 ? stub14_group_size : stub_group_size))
6f20ed8a 12096 && htab->sec_info[prev->id].toc_off == curr_toc)
734b6cf9
AM
12097 curr = prev;
12098
12099 /* OK, the size from the start of CURR to the end is less
12100 than stub_group_size and thus can be handled by one stub
12101 section. (or the tail section is itself larger than
12102 stub_group_size, in which case we may be toast.) We
12103 should really be keeping track of the total size of stubs
12104 added here, as stubs contribute to the final output
12105 section size. That's a little tricky, and this way will
12106 only break if stubs added make the total size more than
12107 2^25, ie. for the default stub_group_size, if stubs total
12108 more than 2097152 bytes, or nearly 75000 plt call stubs. */
6f20ed8a
AM
12109 group = bfd_alloc (curr->owner, sizeof (*group));
12110 if (group == NULL)
12111 return FALSE;
12112 group->link_sec = curr;
12113 group->stub_sec = NULL;
a4b6fadd
AM
12114 group->needs_save_res = 0;
12115 group->next = htab->group;
12116 htab->group = group;
734b6cf9 12117 do
721956f4 12118 {
6f20ed8a 12119 prev = htab->sec_info[tail->id].u.list;
734b6cf9 12120 /* Set up this stub group. */
6f20ed8a 12121 htab->sec_info[tail->id].u.group = group;
721956f4 12122 }
734b6cf9
AM
12123 while (tail != curr && (tail = prev) != NULL);
12124
12125 /* But wait, there's more! Input sections up to stub_group_size
12126 bytes before the stub section can be handled by it too.
12127 Don't do this if we have a really large section after the
12128 stubs, as adding more stubs increases the chance that
12129 branches may not reach into the stub section. */
12130 if (!stubs_always_before_branch && !big_sec)
12131 {
12132 total = 0;
12133 while (prev != NULL
12134 && ((total += tail->output_offset - prev->output_offset)
6bee8834
AM
12135 < (ppc64_elf_section_data (prev) != NULL
12136 && ppc64_elf_section_data (prev)->has_14bit_branch
7c8fe5c4 12137 ? stub14_group_size : stub_group_size))
6f20ed8a 12138 && htab->sec_info[prev->id].toc_off == curr_toc)
734b6cf9
AM
12139 {
12140 tail = prev;
6f20ed8a
AM
12141 prev = htab->sec_info[tail->id].u.list;
12142 htab->sec_info[tail->id].u.group = group;
734b6cf9
AM
12143 }
12144 }
12145 tail = prev;
721956f4
AM
12146 }
12147 }
6f20ed8a 12148 return TRUE;
721956f4
AM
12149}
12150
58d180e8
AM
12151static const unsigned char glink_eh_frame_cie[] =
12152{
12153 0, 0, 0, 16, /* length. */
12154 0, 0, 0, 0, /* id. */
12155 1, /* CIE version. */
12156 'z', 'R', 0, /* Augmentation string. */
12157 4, /* Code alignment. */
12158 0x78, /* Data alignment. */
12159 65, /* RA reg. */
12160 1, /* Augmentation size. */
12161 DW_EH_PE_pcrel | DW_EH_PE_sdata4, /* FDE encoding. */
da44f4e5
AM
12162 DW_CFA_def_cfa, 1, 0, /* def_cfa: r1 offset 0. */
12163 0, 0, 0, 0
58d180e8
AM
12164};
12165
d969d15f
AM
12166/* Stripping output sections is normally done before dynamic section
12167 symbols have been allocated. This function is called later, and
12168 handles cases like htab->brlt which is mapped to its own output
12169 section. */
12170
12171static void
12172maybe_strip_output (struct bfd_link_info *info, asection *isec)
12173{
12174 if (isec->size == 0
12175 && isec->output_section->size == 0
53d8967a 12176 && !(isec->output_section->flags & SEC_KEEP)
d969d15f
AM
12177 && !bfd_section_removed_from_list (info->output_bfd,
12178 isec->output_section)
12179 && elf_section_data (isec->output_section)->dynindx == 0)
12180 {
12181 isec->output_section->flags |= SEC_EXCLUDE;
12182 bfd_section_list_remove (info->output_bfd, isec->output_section);
12183 info->output_bfd->section_count--;
12184 }
12185}
12186
721956f4
AM
12187/* Determine and set the size of the stub section for a final link.
12188
12189 The basic idea here is to examine all the relocations looking for
12190 PC-relative calls to a target that is unreachable with a "bl"
12191 instruction. */
12192
b34976b6 12193bfd_boolean
e7d1c40c 12194ppc64_elf_size_stubs (struct bfd_link_info *info)
721956f4
AM
12195{
12196 bfd_size_type stub_group_size;
b34976b6 12197 bfd_boolean stubs_always_before_branch;
721956f4
AM
12198 struct ppc_link_hash_table *htab = ppc_hash_table (info);
12199
4dfe6ac6
NC
12200 if (htab == NULL)
12201 return FALSE;
12202
0e1862bb 12203 if (htab->params->plt_thread_safe == -1 && !bfd_link_executable (info))
e7d1c40c 12204 htab->params->plt_thread_safe = 1;
b9e5796b 12205 if (!htab->opd_abi)
e7d1c40c
AM
12206 htab->params->plt_thread_safe = 0;
12207 else if (htab->params->plt_thread_safe == -1)
794e51c0 12208 {
e2458743 12209 static const char *const thread_starter[] =
794e51c0
AM
12210 {
12211 "pthread_create",
12212 /* libstdc++ */
12213 "_ZNSt6thread15_M_start_threadESt10shared_ptrINS_10_Impl_baseEE",
12214 /* librt */
12215 "aio_init", "aio_read", "aio_write", "aio_fsync", "lio_listio",
12216 "mq_notify", "create_timer",
12217 /* libanl */
12218 "getaddrinfo_a",
12219 /* libgomp */
2300b5a1 12220 "GOMP_parallel",
794e51c0 12221 "GOMP_parallel_start",
2300b5a1 12222 "GOMP_parallel_loop_static",
794e51c0 12223 "GOMP_parallel_loop_static_start",
2300b5a1 12224 "GOMP_parallel_loop_dynamic",
794e51c0 12225 "GOMP_parallel_loop_dynamic_start",
2300b5a1 12226 "GOMP_parallel_loop_guided",
794e51c0 12227 "GOMP_parallel_loop_guided_start",
2300b5a1 12228 "GOMP_parallel_loop_runtime",
794e51c0 12229 "GOMP_parallel_loop_runtime_start",
2300b5a1 12230 "GOMP_parallel_sections",
68ffbac6 12231 "GOMP_parallel_sections_start",
f9dffbf0
AM
12232 /* libgo */
12233 "__go_go",
794e51c0
AM
12234 };
12235 unsigned i;
12236
a4b6fadd 12237 for (i = 0; i < ARRAY_SIZE (thread_starter); i++)
794e51c0
AM
12238 {
12239 struct elf_link_hash_entry *h;
12240 h = elf_link_hash_lookup (&htab->elf, thread_starter[i],
12241 FALSE, FALSE, TRUE);
e7d1c40c
AM
12242 htab->params->plt_thread_safe = h != NULL && h->ref_regular;
12243 if (htab->params->plt_thread_safe)
794e51c0
AM
12244 break;
12245 }
12246 }
e7d1c40c
AM
12247 stubs_always_before_branch = htab->params->group_size < 0;
12248 if (htab->params->group_size < 0)
12249 stub_group_size = -htab->params->group_size;
721956f4 12250 else
e7d1c40c 12251 stub_group_size = htab->params->group_size;
721956f4 12252
6f20ed8a
AM
12253 if (!group_sections (info, stub_group_size, stubs_always_before_branch))
12254 return FALSE;
721956f4 12255
c9301e31
AM
12256#define STUB_SHRINK_ITER 20
12257 /* Loop until no stubs added. After iteration 20 of this loop we may
12258 exit on a stub section shrinking. This is to break out of a
12259 pathological case where adding stubs on one iteration decreases
12260 section gaps (perhaps due to alignment), which then requires
12261 fewer or smaller stubs on the next iteration. */
12262
721956f4
AM
12263 while (1)
12264 {
12265 bfd *input_bfd;
12266 unsigned int bfd_indx;
a4b6fadd 12267 struct map_stub *group;
721956f4 12268 asection *stub_sec;
721956f4
AM
12269
12270 htab->stub_iteration += 1;
721956f4
AM
12271
12272 for (input_bfd = info->input_bfds, bfd_indx = 0;
12273 input_bfd != NULL;
c72f2fb2 12274 input_bfd = input_bfd->link.next, bfd_indx++)
721956f4
AM
12275 {
12276 Elf_Internal_Shdr *symtab_hdr;
12277 asection *section;
6cdc0ccc 12278 Elf_Internal_Sym *local_syms = NULL;
721956f4 12279
0c8d6e5c 12280 if (!is_ppc64_elf (input_bfd))
67f93c31
AM
12281 continue;
12282
721956f4 12283 /* We'll need the symbol table in a second. */
0ffa91dd 12284 symtab_hdr = &elf_symtab_hdr (input_bfd);
721956f4
AM
12285 if (symtab_hdr->sh_info == 0)
12286 continue;
12287
721956f4
AM
12288 /* Walk over each section attached to the input bfd. */
12289 for (section = input_bfd->sections;
12290 section != NULL;
12291 section = section->next)
12292 {
721956f4 12293 Elf_Internal_Rela *internal_relocs, *irelaend, *irela;
721956f4
AM
12294
12295 /* If there aren't any relocs, then there's nothing more
12296 to do. */
12297 if ((section->flags & SEC_RELOC) == 0
12c0f757
AM
12298 || (section->flags & SEC_ALLOC) == 0
12299 || (section->flags & SEC_LOAD) == 0
12300 || (section->flags & SEC_CODE) == 0
721956f4
AM
12301 || section->reloc_count == 0)
12302 continue;
12303
12304 /* If this section is a link-once section that will be
12305 discarded, then don't create any stubs. */
12306 if (section->output_section == NULL
927be08e 12307 || section->output_section->owner != info->output_bfd)
721956f4
AM
12308 continue;
12309
1e2f5b6e
AM
12310 /* Get the relocs. */
12311 internal_relocs
4ce794b7 12312 = _bfd_elf_link_read_relocs (input_bfd, section, NULL, NULL,
45d6a902 12313 info->keep_memory);
721956f4 12314 if (internal_relocs == NULL)
1e2f5b6e 12315 goto error_ret_free_local;
721956f4
AM
12316
12317 /* Now examine each relocation. */
12318 irela = internal_relocs;
12319 irelaend = irela + section->reloc_count;
12320 for (; irela < irelaend; irela++)
12321 {
4ce794b7
AM
12322 enum elf_ppc64_reloc_type r_type;
12323 unsigned int r_indx;
721956f4
AM
12324 enum ppc_stub_type stub_type;
12325 struct ppc_stub_hash_entry *stub_entry;
8387904d 12326 asection *sym_sec, *code_sec;
e054468f 12327 bfd_vma sym_value, code_value;
721956f4 12328 bfd_vma destination;
6911b7dc 12329 unsigned long local_off;
8843416a 12330 bfd_boolean ok_dest;
721956f4 12331 struct ppc_link_hash_entry *hash;
8387904d 12332 struct ppc_link_hash_entry *fdh;
411e1bfb
AM
12333 struct elf_link_hash_entry *h;
12334 Elf_Internal_Sym *sym;
721956f4
AM
12335 char *stub_name;
12336 const asection *id_sec;
74f0fb50 12337 struct _opd_sec_data *opd;
e054468f 12338 struct plt_entry *plt_ent;
721956f4
AM
12339
12340 r_type = ELF64_R_TYPE (irela->r_info);
12341 r_indx = ELF64_R_SYM (irela->r_info);
12342
4ce794b7 12343 if (r_type >= R_PPC64_max)
721956f4
AM
12344 {
12345 bfd_set_error (bfd_error_bad_value);
6cdc0ccc 12346 goto error_ret_free_internal;
721956f4
AM
12347 }
12348
12349 /* Only look for stubs on branch instructions. */
4ce794b7
AM
12350 if (r_type != R_PPC64_REL24
12351 && r_type != R_PPC64_REL14
12352 && r_type != R_PPC64_REL14_BRTAKEN
12353 && r_type != R_PPC64_REL14_BRNTAKEN)
721956f4
AM
12354 continue;
12355
12356 /* Now determine the call target, its name, value,
12357 section. */
411e1bfb
AM
12358 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms,
12359 r_indx, input_bfd))
12360 goto error_ret_free_internal;
12361 hash = (struct ppc_link_hash_entry *) h;
12362
8843416a 12363 ok_dest = FALSE;
8387904d 12364 fdh = NULL;
7fe2b9a6 12365 sym_value = 0;
411e1bfb 12366 if (hash == NULL)
721956f4 12367 {
411e1bfb 12368 sym_value = sym->st_value;
c27b8c2a
AM
12369 if (sym_sec != NULL
12370 && sym_sec->output_section != NULL)
12371 ok_dest = TRUE;
721956f4 12372 }
7fe2b9a6
AM
12373 else if (hash->elf.root.type == bfd_link_hash_defined
12374 || hash->elf.root.type == bfd_link_hash_defweak)
12375 {
12376 sym_value = hash->elf.root.u.def.value;
12377 if (sym_sec->output_section != NULL)
12378 ok_dest = TRUE;
12379 }
12380 else if (hash->elf.root.type == bfd_link_hash_undefweak
12381 || hash->elf.root.type == bfd_link_hash_undefined)
721956f4 12382 {
99877b66 12383 /* Recognise an old ABI func code entry sym, and
7fe2b9a6
AM
12384 use the func descriptor sym instead if it is
12385 defined. */
ceb1f1ef 12386 if (hash->elf.root.root.string[0] == '.'
b31867b6 12387 && (fdh = lookup_fdh (hash, htab)) != NULL)
8387904d 12388 {
8387904d
AM
12389 if (fdh->elf.root.type == bfd_link_hash_defined
12390 || fdh->elf.root.type == bfd_link_hash_defweak)
12391 {
12392 sym_sec = fdh->elf.root.u.def.section;
12393 sym_value = fdh->elf.root.u.def.value;
12394 if (sym_sec->output_section != NULL)
12395 ok_dest = TRUE;
12396 }
99877b66
AM
12397 else
12398 fdh = NULL;
8387904d 12399 }
7fe2b9a6
AM
12400 }
12401 else
12402 {
12403 bfd_set_error (bfd_error_bad_value);
12404 goto error_ret_free_internal;
721956f4
AM
12405 }
12406
8843416a 12407 destination = 0;
6911b7dc 12408 local_off = 0;
8843416a
AM
12409 if (ok_dest)
12410 {
12411 sym_value += irela->r_addend;
12412 destination = (sym_value
12413 + sym_sec->output_offset
12414 + sym_sec->output_section->vma);
6911b7dc
AM
12415 local_off = PPC64_LOCAL_ENTRY_OFFSET (hash
12416 ? hash->elf.other
12417 : sym->st_other);
8843416a
AM
12418 }
12419
8387904d 12420 code_sec = sym_sec;
e054468f 12421 code_value = sym_value;
74f0fb50
AM
12422 opd = get_opd_info (sym_sec);
12423 if (opd != NULL)
8387904d
AM
12424 {
12425 bfd_vma dest;
12426
74f0fb50 12427 if (hash == NULL && opd->adjust != NULL)
8387904d 12428 {
51aecdc5 12429 long adjust = opd->adjust[OPD_NDX (sym_value)];
8387904d
AM
12430 if (adjust == -1)
12431 continue;
e054468f 12432 code_value += adjust;
8387904d
AM
12433 sym_value += adjust;
12434 }
12435 dest = opd_entry_value (sym_sec, sym_value,
aef36ac1 12436 &code_sec, &code_value, FALSE);
8387904d
AM
12437 if (dest != (bfd_vma) -1)
12438 {
12439 destination = dest;
12440 if (fdh != NULL)
12441 {
12442 /* Fixup old ABI sym to point at code
12443 entry. */
99877b66 12444 hash->elf.root.type = bfd_link_hash_defweak;
8387904d 12445 hash->elf.root.u.def.section = code_sec;
e054468f 12446 hash->elf.root.u.def.value = code_value;
8387904d
AM
12447 }
12448 }
12449 }
12450
721956f4 12451 /* Determine what (if any) linker stub is needed. */
e054468f 12452 plt_ent = NULL;
721956f4 12453 stub_type = ppc_type_of_stub (section, irela, &hash,
6911b7dc
AM
12454 &plt_ent, destination,
12455 local_off);
ad8e1ba5
AM
12456
12457 if (stub_type != ppc_stub_plt_call)
12458 {
12459 /* Check whether we need a TOC adjusting stub.
12460 Since the linker pastes together pieces from
12461 different object files when creating the
12462 _init and _fini functions, it may be that a
12463 call to what looks like a local sym is in
12464 fact a call needing a TOC adjustment. */
8387904d
AM
12465 if (code_sec != NULL
12466 && code_sec->output_section != NULL
6f20ed8a
AM
12467 && (htab->sec_info[code_sec->id].toc_off
12468 != htab->sec_info[section->id].toc_off)
4c52953f
AM
12469 && (code_sec->has_toc_reloc
12470 || code_sec->makes_toc_func_call))
ad8e1ba5
AM
12471 stub_type = ppc_stub_long_branch_r2off;
12472 }
12473
721956f4
AM
12474 if (stub_type == ppc_stub_none)
12475 continue;
12476
411e1bfb
AM
12477 /* __tls_get_addr calls might be eliminated. */
12478 if (stub_type != ppc_stub_plt_call
12479 && hash != NULL
8387904d
AM
12480 && (hash == htab->tls_get_addr
12481 || hash == htab->tls_get_addr_fd)
411e1bfb
AM
12482 && section->has_tls_reloc
12483 && irela != internal_relocs)
12484 {
12485 /* Get tls info. */
f961d9dd 12486 unsigned char *tls_mask;
411e1bfb 12487
3a71aa26 12488 if (!get_tls_mask (&tls_mask, NULL, NULL, &local_syms,
411e1bfb
AM
12489 irela - 1, input_bfd))
12490 goto error_ret_free_internal;
e7b938ca 12491 if (*tls_mask != 0)
411e1bfb
AM
12492 continue;
12493 }
12494
3b421ab3
AM
12495 if (stub_type == ppc_stub_plt_call
12496 && irela + 1 < irelaend
12497 && irela[1].r_offset == irela->r_offset + 4
794e51c0
AM
12498 && ELF64_R_TYPE (irela[1].r_info) == R_PPC64_TOCSAVE)
12499 {
12500 if (!tocsave_find (htab, INSERT,
12501 &local_syms, irela + 1, input_bfd))
12502 goto error_ret_free_internal;
12503 }
12504 else if (stub_type == ppc_stub_plt_call)
12505 stub_type = ppc_stub_plt_call_r2save;
3b421ab3 12506
721956f4 12507 /* Support for grouping stub sections. */
6f20ed8a 12508 id_sec = htab->sec_info[section->id].u.group->link_sec;
721956f4
AM
12509
12510 /* Get the name of this stub. */
12511 stub_name = ppc_stub_name (id_sec, sym_sec, hash, irela);
12512 if (!stub_name)
12513 goto error_ret_free_internal;
12514
12515 stub_entry = ppc_stub_hash_lookup (&htab->stub_hash_table,
b34976b6 12516 stub_name, FALSE, FALSE);
721956f4
AM
12517 if (stub_entry != NULL)
12518 {
12519 /* The proper stub has already been created. */
12520 free (stub_name);
794e51c0
AM
12521 if (stub_type == ppc_stub_plt_call_r2save)
12522 stub_entry->stub_type = stub_type;
721956f4
AM
12523 continue;
12524 }
12525
25f53a85 12526 stub_entry = ppc_add_stub (stub_name, section, info);
721956f4
AM
12527 if (stub_entry == NULL)
12528 {
12529 free (stub_name);
6cdc0ccc
AM
12530 error_ret_free_internal:
12531 if (elf_section_data (section)->relocs == NULL)
12532 free (internal_relocs);
12533 error_ret_free_local:
12534 if (local_syms != NULL
12535 && (symtab_hdr->contents
12536 != (unsigned char *) local_syms))
12537 free (local_syms);
b34976b6 12538 return FALSE;
721956f4
AM
12539 }
12540
ad8e1ba5 12541 stub_entry->stub_type = stub_type;
794e51c0
AM
12542 if (stub_type != ppc_stub_plt_call
12543 && stub_type != ppc_stub_plt_call_r2save)
e054468f
AM
12544 {
12545 stub_entry->target_value = code_value;
12546 stub_entry->target_section = code_sec;
12547 }
12548 else
12549 {
12550 stub_entry->target_value = sym_value;
12551 stub_entry->target_section = sym_sec;
12552 }
721956f4 12553 stub_entry->h = hash;
e054468f 12554 stub_entry->plt_ent = plt_ent;
6911b7dc 12555 stub_entry->other = hash ? hash->elf.other : sym->st_other;
ee75fd95
AM
12556
12557 if (stub_entry->h != NULL)
12558 htab->stub_globals += 1;
721956f4
AM
12559 }
12560
12561 /* We're done with the internal relocs, free them. */
6cdc0ccc 12562 if (elf_section_data (section)->relocs != internal_relocs)
1e2f5b6e 12563 free (internal_relocs);
721956f4 12564 }
6cdc0ccc
AM
12565
12566 if (local_syms != NULL
12567 && symtab_hdr->contents != (unsigned char *) local_syms)
12568 {
12569 if (!info->keep_memory)
12570 free (local_syms);
12571 else
12572 symtab_hdr->contents = (unsigned char *) local_syms;
12573 }
721956f4
AM
12574 }
12575
5c3dead3 12576 /* We may have added some stubs. Find out the new size of the
721956f4 12577 stub sections. */
e7d1c40c 12578 for (stub_sec = htab->params->stub_bfd->sections;
721956f4
AM
12579 stub_sec != NULL;
12580 stub_sec = stub_sec->next)
e717da7e 12581 if ((stub_sec->flags & SEC_LINKER_CREATED) == 0)
ee75fd95 12582 {
5c3dead3 12583 stub_sec->rawsize = stub_sec->size;
ee75fd95
AM
12584 stub_sec->size = 0;
12585 stub_sec->reloc_count = 0;
84f5d08e 12586 stub_sec->flags &= ~SEC_RELOC;
ee75fd95 12587 }
eea6121a
AM
12588
12589 htab->brlt->size = 0;
84f5d08e
AM
12590 htab->brlt->reloc_count = 0;
12591 htab->brlt->flags &= ~SEC_RELOC;
ee75fd95 12592 if (htab->relbrlt != NULL)
eea6121a 12593 htab->relbrlt->size = 0;
721956f4 12594
63bc6f6c 12595 bfd_hash_traverse (&htab->stub_hash_table, ppc_size_one_stub, info);
721956f4 12596
a4b6fadd
AM
12597 for (group = htab->group; group != NULL; group = group->next)
12598 if (group->needs_save_res)
12599 group->stub_sec->size += htab->sfpr->size;
12600
176a0d42
AM
12601 if (info->emitrelocations
12602 && htab->glink != NULL && htab->glink->size != 0)
12603 {
12604 htab->glink->reloc_count = 1;
12605 htab->glink->flags |= SEC_RELOC;
12606 }
12607
58d180e8
AM
12608 if (htab->glink_eh_frame != NULL
12609 && !bfd_is_abs_section (htab->glink_eh_frame->output_section)
9a2a56cc 12610 && htab->glink_eh_frame->output_section->size != 0)
58d180e8 12611 {
4bbe044a 12612 size_t size = 0, align;
58d180e8 12613
e7d1c40c 12614 for (stub_sec = htab->params->stub_bfd->sections;
58d180e8
AM
12615 stub_sec != NULL;
12616 stub_sec = stub_sec->next)
12617 if ((stub_sec->flags & SEC_LINKER_CREATED) == 0)
da44f4e5 12618 size += 24;
58d180e8
AM
12619 if (htab->glink != NULL && htab->glink->size != 0)
12620 size += 24;
12621 if (size != 0)
12622 size += sizeof (glink_eh_frame_cie);
4bbe044a
AM
12623 align = 1;
12624 align <<= htab->glink_eh_frame->output_section->alignment_power;
12625 align -= 1;
12626 size = (size + align) & ~align;
58d180e8
AM
12627 htab->glink_eh_frame->rawsize = htab->glink_eh_frame->size;
12628 htab->glink_eh_frame->size = size;
12629 }
12630
e7d1c40c
AM
12631 if (htab->params->plt_stub_align != 0)
12632 for (stub_sec = htab->params->stub_bfd->sections;
794e51c0
AM
12633 stub_sec != NULL;
12634 stub_sec = stub_sec->next)
12635 if ((stub_sec->flags & SEC_LINKER_CREATED) == 0)
e7d1c40c
AM
12636 stub_sec->size = ((stub_sec->size
12637 + (1 << htab->params->plt_stub_align) - 1)
29f628db 12638 & -(1 << htab->params->plt_stub_align));
794e51c0 12639
e7d1c40c 12640 for (stub_sec = htab->params->stub_bfd->sections;
5c3dead3
AM
12641 stub_sec != NULL;
12642 stub_sec = stub_sec->next)
12643 if ((stub_sec->flags & SEC_LINKER_CREATED) == 0
c9301e31
AM
12644 && stub_sec->rawsize != stub_sec->size
12645 && (htab->stub_iteration <= STUB_SHRINK_ITER
12646 || stub_sec->rawsize < stub_sec->size))
5c3dead3
AM
12647 break;
12648
58d180e8
AM
12649 if (stub_sec == NULL
12650 && (htab->glink_eh_frame == NULL
12651 || htab->glink_eh_frame->rawsize == htab->glink_eh_frame->size))
5c3dead3
AM
12652 break;
12653
721956f4 12654 /* Ask the linker to do its stuff. */
e7d1c40c 12655 (*htab->params->layout_sections_again) ();
721956f4
AM
12656 }
12657
da44f4e5
AM
12658 if (htab->glink_eh_frame != NULL
12659 && htab->glink_eh_frame->size != 0)
12660 {
12661 bfd_vma val;
12662 bfd_byte *p, *last_fde;
12663 size_t last_fde_len, size, align, pad;
12664 asection *stub_sec;
12665
12666 p = bfd_zalloc (htab->glink_eh_frame->owner, htab->glink_eh_frame->size);
12667 if (p == NULL)
12668 return FALSE;
12669 htab->glink_eh_frame->contents = p;
12670 last_fde = p;
12671
12672 memcpy (p, glink_eh_frame_cie, sizeof (glink_eh_frame_cie));
12673 /* CIE length (rewrite in case little-endian). */
12674 last_fde_len = sizeof (glink_eh_frame_cie) - 4;
12675 bfd_put_32 (htab->elf.dynobj, last_fde_len, p);
12676 p += sizeof (glink_eh_frame_cie);
12677
12678 for (stub_sec = htab->params->stub_bfd->sections;
12679 stub_sec != NULL;
12680 stub_sec = stub_sec->next)
12681 if ((stub_sec->flags & SEC_LINKER_CREATED) == 0)
12682 {
12683 last_fde = p;
12684 last_fde_len = 20;
12685 /* FDE length. */
12686 bfd_put_32 (htab->elf.dynobj, 20, p);
12687 p += 4;
12688 /* CIE pointer. */
12689 val = p - htab->glink_eh_frame->contents;
12690 bfd_put_32 (htab->elf.dynobj, val, p);
12691 p += 4;
12692 /* Offset to stub section, written later. */
12693 p += 4;
12694 /* stub section size. */
12695 bfd_put_32 (htab->elf.dynobj, stub_sec->size, p);
12696 p += 4;
12697 /* Augmentation. */
12698 p += 1;
12699 /* Pad. */
12700 p += 7;
12701 }
12702 if (htab->glink != NULL && htab->glink->size != 0)
12703 {
12704 last_fde = p;
12705 last_fde_len = 20;
12706 /* FDE length. */
12707 bfd_put_32 (htab->elf.dynobj, 20, p);
12708 p += 4;
12709 /* CIE pointer. */
12710 val = p - htab->glink_eh_frame->contents;
12711 bfd_put_32 (htab->elf.dynobj, val, p);
12712 p += 4;
12713 /* Offset to .glink, written later. */
12714 p += 4;
12715 /* .glink size. */
12716 bfd_put_32 (htab->elf.dynobj, htab->glink->size - 8, p);
12717 p += 4;
12718 /* Augmentation. */
12719 p += 1;
12720
12721 *p++ = DW_CFA_advance_loc + 1;
12722 *p++ = DW_CFA_register;
12723 *p++ = 65;
9f08fa5c 12724 *p++ = htab->opd_abi ? 12 : 0;
da44f4e5
AM
12725 *p++ = DW_CFA_advance_loc + 4;
12726 *p++ = DW_CFA_restore_extended;
12727 *p++ = 65;
12728 }
12729 /* Subsume any padding into the last FDE if user .eh_frame
12730 sections are aligned more than glink_eh_frame. Otherwise any
12731 zero padding will be seen as a terminator. */
12732 size = p - htab->glink_eh_frame->contents;
12733 align = 1;
12734 align <<= htab->glink_eh_frame->output_section->alignment_power;
12735 align -= 1;
12736 pad = ((size + align) & ~align) - size;
12737 htab->glink_eh_frame->size = size + pad;
12738 bfd_put_32 (htab->elf.dynobj, last_fde_len + pad, last_fde);
12739 }
12740
d969d15f
AM
12741 maybe_strip_output (info, htab->brlt);
12742 if (htab->glink_eh_frame != NULL)
12743 maybe_strip_output (info, htab->glink_eh_frame);
721956f4 12744
b34976b6 12745 return TRUE;
721956f4
AM
12746}
12747
12748/* Called after we have determined section placement. If sections
805fc799 12749 move, we'll be called again. Provide a value for TOCstart. */
721956f4 12750
805fc799 12751bfd_vma
1c865ab2 12752ppc64_elf_set_toc (struct bfd_link_info *info, bfd *obfd)
721956f4 12753{
805fc799 12754 asection *s;
a27e685f 12755 bfd_vma TOCstart, adjust;
721956f4 12756
43417696
AM
12757 if (info != NULL)
12758 {
12759 struct elf_link_hash_entry *h;
12760 struct elf_link_hash_table *htab = elf_hash_table (info);
12761
12762 if (is_elf_hash_table (htab)
12763 && htab->hgot != NULL)
12764 h = htab->hgot;
12765 else
12766 {
12767 h = elf_link_hash_lookup (htab, ".TOC.", FALSE, FALSE, TRUE);
12768 if (is_elf_hash_table (htab))
12769 htab->hgot = h;
12770 }
12771 if (h != NULL
12772 && h->root.type == bfd_link_hash_defined
12773 && !h->root.linker_def
12774 && (!is_elf_hash_table (htab)
12775 || h->def_regular))
12776 {
12777 TOCstart = (h->root.u.def.value - TOC_BASE_OFF
12778 + h->root.u.def.section->output_offset
12779 + h->root.u.def.section->output_section->vma);
12780 _bfd_set_gp_value (obfd, TOCstart);
12781 return TOCstart;
12782 }
12783 }
12784
805fc799
AM
12785 /* The TOC consists of sections .got, .toc, .tocbss, .plt in that
12786 order. The TOC starts where the first of these sections starts. */
12787 s = bfd_get_section_by_name (obfd, ".got");
e054468f 12788 if (s == NULL || (s->flags & SEC_EXCLUDE) != 0)
805fc799 12789 s = bfd_get_section_by_name (obfd, ".toc");
e054468f 12790 if (s == NULL || (s->flags & SEC_EXCLUDE) != 0)
805fc799 12791 s = bfd_get_section_by_name (obfd, ".tocbss");
e054468f 12792 if (s == NULL || (s->flags & SEC_EXCLUDE) != 0)
805fc799 12793 s = bfd_get_section_by_name (obfd, ".plt");
e054468f 12794 if (s == NULL || (s->flags & SEC_EXCLUDE) != 0)
805fc799
AM
12795 {
12796 /* This may happen for
12797 o references to TOC base (SYM@toc / TOC[tc0]) without a
12798 .toc directive
12799 o bad linker script
12800 o --gc-sections and empty TOC sections
12801
12802 FIXME: Warn user? */
12803
12804 /* Look for a likely section. We probably won't even be
12805 using TOCstart. */
12806 for (s = obfd->sections; s != NULL; s = s->next)
e054468f
AM
12807 if ((s->flags & (SEC_ALLOC | SEC_SMALL_DATA | SEC_READONLY
12808 | SEC_EXCLUDE))
805fc799
AM
12809 == (SEC_ALLOC | SEC_SMALL_DATA))
12810 break;
721956f4 12811 if (s == NULL)
805fc799 12812 for (s = obfd->sections; s != NULL; s = s->next)
e054468f 12813 if ((s->flags & (SEC_ALLOC | SEC_SMALL_DATA | SEC_EXCLUDE))
805fc799
AM
12814 == (SEC_ALLOC | SEC_SMALL_DATA))
12815 break;
721956f4 12816 if (s == NULL)
805fc799 12817 for (s = obfd->sections; s != NULL; s = s->next)
e054468f
AM
12818 if ((s->flags & (SEC_ALLOC | SEC_READONLY | SEC_EXCLUDE))
12819 == SEC_ALLOC)
805fc799 12820 break;
721956f4 12821 if (s == NULL)
805fc799 12822 for (s = obfd->sections; s != NULL; s = s->next)
e054468f 12823 if ((s->flags & (SEC_ALLOC | SEC_EXCLUDE)) == SEC_ALLOC)
805fc799
AM
12824 break;
12825 }
721956f4 12826
805fc799
AM
12827 TOCstart = 0;
12828 if (s != NULL)
12829 TOCstart = s->output_section->vma + s->output_offset;
721956f4 12830
a27e685f
AM
12831 /* Force alignment. */
12832 adjust = TOCstart & (TOC_BASE_ALIGN - 1);
12833 TOCstart -= adjust;
1c865ab2
AM
12834 _bfd_set_gp_value (obfd, TOCstart);
12835
810d4e75 12836 if (info != NULL && s != NULL)
1c865ab2
AM
12837 {
12838 struct ppc_link_hash_table *htab = ppc_hash_table (info);
12839
810d4e75
AM
12840 if (htab != NULL)
12841 {
12842 if (htab->elf.hgot != NULL)
12843 {
a27e685f 12844 htab->elf.hgot->root.u.def.value = TOC_BASE_OFF - adjust;
810d4e75
AM
12845 htab->elf.hgot->root.u.def.section = s;
12846 }
12847 }
12848 else
1c865ab2 12849 {
810d4e75
AM
12850 struct bfd_link_hash_entry *bh = NULL;
12851 _bfd_generic_link_add_one_symbol (info, obfd, ".TOC.", BSF_GLOBAL,
a27e685f
AM
12852 s, TOC_BASE_OFF - adjust,
12853 NULL, FALSE, FALSE, &bh);
1c865ab2
AM
12854 }
12855 }
805fc799 12856 return TOCstart;
721956f4
AM
12857}
12858
a345bc8d
AM
12859/* Called via elf_link_hash_traverse from ppc64_elf_build_stubs to
12860 write out any global entry stubs. */
12861
12862static bfd_boolean
12863build_global_entry_stubs (struct elf_link_hash_entry *h, void *inf)
12864{
12865 struct bfd_link_info *info;
12866 struct ppc_link_hash_table *htab;
12867 struct plt_entry *pent;
12868 asection *s;
12869
12870 if (h->root.type == bfd_link_hash_indirect)
12871 return TRUE;
12872
12873 if (!h->pointer_equality_needed)
12874 return TRUE;
12875
12876 if (h->def_regular)
12877 return TRUE;
12878
12879 info = inf;
12880 htab = ppc_hash_table (info);
12881 if (htab == NULL)
12882 return FALSE;
12883
12884 s = htab->glink;
12885 for (pent = h->plt.plist; pent != NULL; pent = pent->next)
12886 if (pent->plt.offset != (bfd_vma) -1
12887 && pent->addend == 0)
12888 {
12889 bfd_byte *p;
12890 asection *plt;
12891 bfd_vma off;
12892
a345bc8d 12893 p = s->contents + h->root.u.def.value;
33e44f2e 12894 plt = htab->elf.splt;
a345bc8d
AM
12895 if (!htab->elf.dynamic_sections_created
12896 || h->dynindx == -1)
33e44f2e 12897 plt = htab->elf.iplt;
a345bc8d
AM
12898 off = pent->plt.offset + plt->output_offset + plt->output_section->vma;
12899 off -= h->root.u.def.value + s->output_offset + s->output_section->vma;
12900
12901 if (off + 0x80008000 > 0xffffffff || (off & 3) != 0)
12902 {
12903 info->callbacks->einfo
12904 (_("%P: linkage table error against `%T'\n"),
12905 h->root.root.string);
12906 bfd_set_error (bfd_error_bad_value);
12907 htab->stub_error = TRUE;
12908 }
12909
7341d5e2
AM
12910 htab->stub_count[ppc_stub_global_entry - 1] += 1;
12911 if (htab->params->emit_stub_syms)
12912 {
12913 size_t len = strlen (h->root.root.string);
12914 char *name = bfd_malloc (sizeof "12345678.global_entry." + len);
12915
12916 if (name == NULL)
12917 return FALSE;
12918
12919 sprintf (name, "%08x.global_entry.%s", s->id, h->root.root.string);
12920 h = elf_link_hash_lookup (&htab->elf, name, TRUE, FALSE, FALSE);
12921 if (h == NULL)
12922 return FALSE;
12923 if (h->root.type == bfd_link_hash_new)
12924 {
12925 h->root.type = bfd_link_hash_defined;
12926 h->root.u.def.section = s;
12927 h->root.u.def.value = p - s->contents;
12928 h->ref_regular = 1;
12929 h->def_regular = 1;
12930 h->ref_regular_nonweak = 1;
12931 h->forced_local = 1;
12932 h->non_elf = 0;
2ec55de3 12933 h->root.linker_def = 1;
7341d5e2
AM
12934 }
12935 }
12936
a345bc8d
AM
12937 if (PPC_HA (off) != 0)
12938 {
12939 bfd_put_32 (s->owner, ADDIS_R12_R12 | PPC_HA (off), p);
12940 p += 4;
12941 }
12942 bfd_put_32 (s->owner, LD_R12_0R12 | PPC_LO (off), p);
12943 p += 4;
12944 bfd_put_32 (s->owner, MTCTR_R12, p);
12945 p += 4;
12946 bfd_put_32 (s->owner, BCTR, p);
12947 break;
12948 }
12949 return TRUE;
12950}
12951
721956f4
AM
12952/* Build all the stubs associated with the current output file.
12953 The stubs are kept in a hash table attached to the main linker
12954 hash table. This function is called via gldelf64ppc_finish. */
12955
b34976b6 12956bfd_boolean
e7d1c40c 12957ppc64_elf_build_stubs (struct bfd_link_info *info,
4ce794b7 12958 char **stats)
5d1634d7
AM
12959{
12960 struct ppc_link_hash_table *htab = ppc_hash_table (info);
a4b6fadd 12961 struct map_stub *group;
721956f4 12962 asection *stub_sec;
5d1634d7 12963 bfd_byte *p;
e717da7e 12964 int stub_sec_count = 0;
5d1634d7 12965
4dfe6ac6
NC
12966 if (htab == NULL)
12967 return FALSE;
12968
eea6121a 12969 /* Allocate memory to hold the linker stubs. */
e7d1c40c 12970 for (stub_sec = htab->params->stub_bfd->sections;
721956f4
AM
12971 stub_sec != NULL;
12972 stub_sec = stub_sec->next)
eea6121a
AM
12973 if ((stub_sec->flags & SEC_LINKER_CREATED) == 0
12974 && stub_sec->size != 0)
e717da7e 12975 {
e7d1c40c 12976 stub_sec->contents = bfd_zalloc (htab->params->stub_bfd, stub_sec->size);
eea6121a
AM
12977 if (stub_sec->contents == NULL)
12978 return FALSE;
eea6121a 12979 stub_sec->size = 0;
e717da7e 12980 }
5d1634d7 12981
23eb7e01 12982 if (htab->glink != NULL && htab->glink->size != 0)
5d1634d7 12983 {
9f951329 12984 unsigned int indx;
ad8e1ba5 12985 bfd_vma plt0;
9f951329 12986
721956f4 12987 /* Build the .glink plt call stub. */
e7d1c40c 12988 if (htab->params->emit_stub_syms)
97b639ba
AM
12989 {
12990 struct elf_link_hash_entry *h;
468392fb
AM
12991 h = elf_link_hash_lookup (&htab->elf, "__glink_PLTresolve",
12992 TRUE, FALSE, FALSE);
97b639ba
AM
12993 if (h == NULL)
12994 return FALSE;
12995 if (h->root.type == bfd_link_hash_new)
12996 {
12997 h->root.type = bfd_link_hash_defined;
12998 h->root.u.def.section = htab->glink;
ee4bf8d2 12999 h->root.u.def.value = 8;
f5385ebf
AM
13000 h->ref_regular = 1;
13001 h->def_regular = 1;
13002 h->ref_regular_nonweak = 1;
13003 h->forced_local = 1;
13004 h->non_elf = 0;
2ec55de3 13005 h->root.linker_def = 1;
97b639ba
AM
13006 }
13007 }
33e44f2e
AM
13008 plt0 = (htab->elf.splt->output_section->vma
13009 + htab->elf.splt->output_offset
13010 - 16);
176a0d42
AM
13011 if (info->emitrelocations)
13012 {
13013 Elf_Internal_Rela *r = get_relocs (htab->glink, 1);
13014 if (r == NULL)
13015 return FALSE;
13016 r->r_offset = (htab->glink->output_offset
13017 + htab->glink->output_section->vma);
13018 r->r_info = ELF64_R_INFO (0, R_PPC64_REL64);
13019 r->r_addend = plt0;
13020 }
4ce794b7 13021 p = htab->glink->contents;
176a0d42 13022 plt0 -= htab->glink->output_section->vma + htab->glink->output_offset;
ee4bf8d2
AM
13023 bfd_put_64 (htab->glink->owner, plt0, p);
13024 p += 8;
b9e5796b
AM
13025 if (htab->opd_abi)
13026 {
13027 bfd_put_32 (htab->glink->owner, MFLR_R12, p);
13028 p += 4;
13029 bfd_put_32 (htab->glink->owner, BCL_20_31, p);
13030 p += 4;
13031 bfd_put_32 (htab->glink->owner, MFLR_R11, p);
13032 p += 4;
13033 bfd_put_32 (htab->glink->owner, LD_R2_0R11 | (-16 & 0xfffc), p);
13034 p += 4;
13035 bfd_put_32 (htab->glink->owner, MTLR_R12, p);
13036 p += 4;
13037 bfd_put_32 (htab->glink->owner, ADD_R11_R2_R11, p);
13038 p += 4;
13039 bfd_put_32 (htab->glink->owner, LD_R12_0R11, p);
13040 p += 4;
13041 bfd_put_32 (htab->glink->owner, LD_R2_0R11 | 8, p);
13042 p += 4;
13043 bfd_put_32 (htab->glink->owner, MTCTR_R12, p);
13044 p += 4;
13045 bfd_put_32 (htab->glink->owner, LD_R11_0R11 | 16, p);
13046 p += 4;
13047 }
13048 else
13049 {
13050 bfd_put_32 (htab->glink->owner, MFLR_R0, p);
13051 p += 4;
13052 bfd_put_32 (htab->glink->owner, BCL_20_31, p);
13053 p += 4;
13054 bfd_put_32 (htab->glink->owner, MFLR_R11, p);
13055 p += 4;
13056 bfd_put_32 (htab->glink->owner, LD_R2_0R11 | (-16 & 0xfffc), p);
13057 p += 4;
13058 bfd_put_32 (htab->glink->owner, MTLR_R0, p);
13059 p += 4;
13060 bfd_put_32 (htab->glink->owner, SUB_R12_R12_R11, p);
13061 p += 4;
13062 bfd_put_32 (htab->glink->owner, ADD_R11_R2_R11, p);
13063 p += 4;
13064 bfd_put_32 (htab->glink->owner, ADDI_R0_R12 | (-48 & 0xffff), p);
13065 p += 4;
13066 bfd_put_32 (htab->glink->owner, LD_R12_0R11, p);
13067 p += 4;
13068 bfd_put_32 (htab->glink->owner, SRDI_R0_R0_2, p);
13069 p += 4;
13070 bfd_put_32 (htab->glink->owner, MTCTR_R12, p);
13071 p += 4;
13072 bfd_put_32 (htab->glink->owner, LD_R11_0R11 | 8, p);
13073 p += 4;
13074 }
4ce794b7 13075 bfd_put_32 (htab->glink->owner, BCTR, p);
ad8e1ba5 13076 p += 4;
ee4bf8d2
AM
13077 while (p - htab->glink->contents < GLINK_CALL_STUB_SIZE)
13078 {
13079 bfd_put_32 (htab->glink->owner, NOP, p);
13080 p += 4;
13081 }
ad8e1ba5 13082
9f951329
AM
13083 /* Build the .glink lazy link call stubs. */
13084 indx = 0;
a345bc8d 13085 while (p < htab->glink->contents + htab->glink->rawsize)
9f951329 13086 {
b9e5796b 13087 if (htab->opd_abi)
9f951329 13088 {
b9e5796b
AM
13089 if (indx < 0x8000)
13090 {
13091 bfd_put_32 (htab->glink->owner, LI_R0_0 | indx, p);
13092 p += 4;
13093 }
13094 else
13095 {
13096 bfd_put_32 (htab->glink->owner, LIS_R0_0 | PPC_HI (indx), p);
13097 p += 4;
13098 bfd_put_32 (htab->glink->owner, ORI_R0_R0_0 | PPC_LO (indx),
13099 p);
13100 p += 4;
13101 }
9f951329 13102 }
4ce794b7 13103 bfd_put_32 (htab->glink->owner,
ee4bf8d2 13104 B_DOT | ((htab->glink->contents - p + 8) & 0x3fffffc), p);
a16d5acb 13105 indx++;
9f951329
AM
13106 p += 4;
13107 }
a345bc8d
AM
13108
13109 /* Build .glink global entry stubs. */
13110 if (htab->glink->size > htab->glink->rawsize)
afe397ea 13111 elf_link_hash_traverse (&htab->elf, build_global_entry_stubs, info);
5d1634d7 13112 }
5d1634d7 13113
7341d5e2 13114 if (htab->brlt != NULL && htab->brlt->size != 0)
721956f4 13115 {
4ce794b7 13116 htab->brlt->contents = bfd_zalloc (htab->brlt->owner,
eea6121a 13117 htab->brlt->size);
4ce794b7 13118 if (htab->brlt->contents == NULL)
b34976b6 13119 return FALSE;
721956f4 13120 }
ee75fd95 13121 if (htab->relbrlt != NULL && htab->relbrlt->size != 0)
63bc6f6c
AM
13122 {
13123 htab->relbrlt->contents = bfd_zalloc (htab->relbrlt->owner,
eea6121a 13124 htab->relbrlt->size);
63bc6f6c
AM
13125 if (htab->relbrlt->contents == NULL)
13126 return FALSE;
13127 }
5d1634d7 13128
721956f4
AM
13129 /* Build the stubs as directed by the stub hash table. */
13130 bfd_hash_traverse (&htab->stub_hash_table, ppc_build_one_stub, info);
5d1634d7 13131
a4b6fadd
AM
13132 for (group = htab->group; group != NULL; group = group->next)
13133 if (group->needs_save_res)
13134 {
13135 stub_sec = group->stub_sec;
13136 memcpy (stub_sec->contents + stub_sec->size, htab->sfpr->contents,
13137 htab->sfpr->size);
13138 if (htab->params->emit_stub_syms)
13139 {
13140 unsigned int i;
13141
13142 for (i = 0; i < ARRAY_SIZE (save_res_funcs); i++)
13143 if (!sfpr_define (info, &save_res_funcs[i], stub_sec))
13144 return FALSE;
13145 }
13146 stub_sec->size += htab->sfpr->size;
13147 }
13148
aa8a7074
AM
13149 if (htab->relbrlt != NULL)
13150 htab->relbrlt->reloc_count = 0;
13151
e7d1c40c
AM
13152 if (htab->params->plt_stub_align != 0)
13153 for (stub_sec = htab->params->stub_bfd->sections;
794e51c0
AM
13154 stub_sec != NULL;
13155 stub_sec = stub_sec->next)
13156 if ((stub_sec->flags & SEC_LINKER_CREATED) == 0)
e7d1c40c
AM
13157 stub_sec->size = ((stub_sec->size
13158 + (1 << htab->params->plt_stub_align) - 1)
29f628db 13159 & -(1 << htab->params->plt_stub_align));
794e51c0 13160
e7d1c40c 13161 for (stub_sec = htab->params->stub_bfd->sections;
721956f4
AM
13162 stub_sec != NULL;
13163 stub_sec = stub_sec->next)
e717da7e
AM
13164 if ((stub_sec->flags & SEC_LINKER_CREATED) == 0)
13165 {
13166 stub_sec_count += 1;
c9301e31
AM
13167 if (stub_sec->rawsize != stub_sec->size
13168 && (htab->stub_iteration <= STUB_SHRINK_ITER
13169 || stub_sec->rawsize < stub_sec->size))
e717da7e
AM
13170 break;
13171 }
5d1634d7 13172
da44f4e5
AM
13173 /* Note that the glink_eh_frame check here is not only testing that
13174 the generated size matched the calculated size but also that
13175 bfd_elf_discard_info didn't make any changes to the section. */
721956f4 13176 if (stub_sec != NULL
58d180e8
AM
13177 || (htab->glink_eh_frame != NULL
13178 && htab->glink_eh_frame->rawsize != htab->glink_eh_frame->size))
5d1634d7 13179 {
b34976b6 13180 htab->stub_error = TRUE;
8de848d8 13181 info->callbacks->einfo (_("%P: stubs don't match calculated size\n"));
5d1634d7 13182 }
721956f4 13183
d2a300cf
AM
13184 if (htab->stub_error)
13185 return FALSE;
13186
13187 if (stats != NULL)
13188 {
13189 *stats = bfd_malloc (500);
13190 if (*stats == NULL)
13191 return FALSE;
13192
ee75fd95 13193 sprintf (*stats, _("linker stubs in %u group%s\n"
d2a300cf
AM
13194 " branch %lu\n"
13195 " toc adjust %lu\n"
13196 " long branch %lu\n"
13197 " long toc adj %lu\n"
794e51c0 13198 " plt call %lu\n"
7341d5e2
AM
13199 " plt call toc %lu\n"
13200 " global entry %lu"),
e717da7e 13201 stub_sec_count,
ee75fd95 13202 stub_sec_count == 1 ? "" : "s",
4ce794b7
AM
13203 htab->stub_count[ppc_stub_long_branch - 1],
13204 htab->stub_count[ppc_stub_long_branch_r2off - 1],
13205 htab->stub_count[ppc_stub_plt_branch - 1],
13206 htab->stub_count[ppc_stub_plt_branch_r2off - 1],
794e51c0 13207 htab->stub_count[ppc_stub_plt_call - 1],
7341d5e2
AM
13208 htab->stub_count[ppc_stub_plt_call_r2save - 1],
13209 htab->stub_count[ppc_stub_global_entry - 1]);
d2a300cf
AM
13210 }
13211 return TRUE;
5bd4f169
AM
13212}
13213
99877b66
AM
13214/* This function undoes the changes made by add_symbol_adjust. */
13215
13216static bfd_boolean
13217undo_symbol_twiddle (struct elf_link_hash_entry *h, void *inf ATTRIBUTE_UNUSED)
13218{
13219 struct ppc_link_hash_entry *eh;
13220
13221 if (h->root.type == bfd_link_hash_indirect)
13222 return TRUE;
13223
99877b66
AM
13224 eh = (struct ppc_link_hash_entry *) h;
13225 if (eh->elf.root.type != bfd_link_hash_undefweak || !eh->was_undefined)
13226 return TRUE;
13227
13228 eh->elf.root.type = bfd_link_hash_undefined;
13229 return TRUE;
13230}
13231
13232void
13233ppc64_elf_restore_symbols (struct bfd_link_info *info)
13234{
13235 struct ppc_link_hash_table *htab = ppc_hash_table (info);
4dfe6ac6
NC
13236
13237 if (htab != NULL)
13238 elf_link_hash_traverse (&htab->elf, undo_symbol_twiddle, info);
99877b66
AM
13239}
13240
60124e18
AM
13241/* What to do when ld finds relocations against symbols defined in
13242 discarded sections. */
13243
13244static unsigned int
13245ppc64_elf_action_discarded (asection *sec)
13246{
13247 if (strcmp (".opd", sec->name) == 0)
13248 return 0;
13249
13250 if (strcmp (".toc", sec->name) == 0)
13251 return 0;
13252
bce50a28
JJ
13253 if (strcmp (".toc1", sec->name) == 0)
13254 return 0;
13255
60124e18
AM
13256 return _bfd_elf_default_action_discarded (sec);
13257}
13258
5bd4f169
AM
13259/* The RELOCATE_SECTION function is called by the ELF backend linker
13260 to handle the relocations for a section.
13261
13262 The relocs are always passed as Rela structures; if the section
13263 actually uses Rel structures, the r_addend field will always be
13264 zero.
13265
13266 This function is responsible for adjust the section contents as
13267 necessary, and (if using Rela relocs and generating a
1049f94e 13268 relocatable output file) adjusting the reloc addend as
5bd4f169
AM
13269 necessary.
13270
13271 This function does not have to worry about setting the reloc
13272 address or the reloc symbol index.
13273
13274 LOCAL_SYMS is a pointer to the swapped in local symbols.
13275
13276 LOCAL_SECTIONS is an array giving the section in the input file
13277 corresponding to the st_shndx field of each local symbol.
13278
13279 The global hash table entry for the global symbols can be found
13280 via elf_sym_hashes (input_bfd).
13281
1049f94e 13282 When generating relocatable output, this function must handle
5bd4f169
AM
13283 STB_LOCAL/STT_SECTION symbols specially. The output symbol is
13284 going to be the section symbol corresponding to the output
13285 section, which means that the addend must be adjusted
13286 accordingly. */
13287
b34976b6 13288static bfd_boolean
4ce794b7
AM
13289ppc64_elf_relocate_section (bfd *output_bfd,
13290 struct bfd_link_info *info,
13291 bfd *input_bfd,
13292 asection *input_section,
13293 bfd_byte *contents,
13294 Elf_Internal_Rela *relocs,
13295 Elf_Internal_Sym *local_syms,
13296 asection **local_sections)
5bd4f169 13297{
65f38f15 13298 struct ppc_link_hash_table *htab;
5bd4f169
AM
13299 Elf_Internal_Shdr *symtab_hdr;
13300 struct elf_link_hash_entry **sym_hashes;
5bd4f169 13301 Elf_Internal_Rela *rel;
c316a17c 13302 Elf_Internal_Rela *wrel;
5bd4f169 13303 Elf_Internal_Rela *relend;
411e1bfb
AM
13304 Elf_Internal_Rela outrel;
13305 bfd_byte *loc;
411e1bfb 13306 struct got_entry **local_got_ents;
5bd4f169 13307 bfd_vma TOCstart;
b34976b6
AM
13308 bfd_boolean ret = TRUE;
13309 bfd_boolean is_opd;
794e51c0
AM
13310 /* Assume 'at' branch hints. */
13311 bfd_boolean is_isa_v2 = TRUE;
4fe5ca5b 13312 bfd_vma d_offset = (bfd_big_endian (output_bfd) ? 2 : 0);
5bd4f169 13313
65f38f15 13314 /* Initialize howto table if needed. */
5bd4f169 13315 if (!ppc64_elf_howto_table[R_PPC64_ADDR32])
5bd4f169
AM
13316 ppc_howto_init ();
13317
65f38f15 13318 htab = ppc_hash_table (info);
4dfe6ac6
NC
13319 if (htab == NULL)
13320 return FALSE;
ee75fd95
AM
13321
13322 /* Don't relocate stub sections. */
e7d1c40c 13323 if (input_section->owner == htab->params->stub_bfd)
ee75fd95
AM
13324 return TRUE;
13325
0c8d6e5c 13326 BFD_ASSERT (is_ppc64_elf (input_bfd));
0ffa91dd 13327
411e1bfb 13328 local_got_ents = elf_local_got_ents (input_bfd);
5bd4f169 13329 TOCstart = elf_gp (output_bfd);
0ffa91dd 13330 symtab_hdr = &elf_symtab_hdr (input_bfd);
5bd4f169 13331 sym_hashes = elf_sym_hashes (input_bfd);
7c8fe5c4 13332 is_opd = ppc64_elf_section_data (input_section)->sec_type == sec_opd;
65f38f15 13333
c316a17c 13334 rel = wrel = relocs;
5bd4f169 13335 relend = relocs + input_section->reloc_count;
c316a17c 13336 for (; rel < relend; wrel++, rel++)
5bd4f169 13337 {
04c9666a 13338 enum elf_ppc64_reloc_type r_type;
31c76678 13339 bfd_vma addend;
5bd4f169
AM
13340 bfd_reloc_status_type r;
13341 Elf_Internal_Sym *sym;
13342 asection *sec;
039b3fef
AM
13343 struct elf_link_hash_entry *h_elf;
13344 struct ppc_link_hash_entry *h;
13345 struct ppc_link_hash_entry *fdh;
5bd4f169 13346 const char *sym_name;
0d4792f7 13347 unsigned long r_symndx, toc_symndx;
3a71aa26 13348 bfd_vma toc_addend;
f961d9dd
AM
13349 unsigned char tls_mask, tls_gd, tls_type;
13350 unsigned char sym_type;
5bd4f169 13351 bfd_vma relocation;
b34976b6
AM
13352 bfd_boolean unresolved_reloc;
13353 bfd_boolean warned;
bc30df16 13354 enum { DEST_NORMAL, DEST_OPD, DEST_STUB } reloc_dest;
67f0cbdb 13355 unsigned int insn;
e11840f9 13356 unsigned int mask;
721956f4
AM
13357 struct ppc_stub_hash_entry *stub_entry;
13358 bfd_vma max_br_offset;
13359 bfd_vma from;
c316a17c 13360 Elf_Internal_Rela orig_rel;
b80eed39
AM
13361 reloc_howto_type *howto;
13362 struct reloc_howto_struct alt_howto;
5bd4f169 13363
c316a17c
AM
13364 again:
13365 orig_rel = *rel;
13366
4ce794b7 13367 r_type = ELF64_R_TYPE (rel->r_info);
5bd4f169 13368 r_symndx = ELF64_R_SYM (rel->r_info);
ee87f2da
AM
13369
13370 /* For old style R_PPC64_TOC relocs with a zero symbol, use the
13371 symbol of the previous ADDR64 reloc. The symbol gives us the
13372 proper TOC base to use. */
13373 if (rel->r_info == ELF64_R_INFO (0, R_PPC64_TOC)
c316a17c
AM
13374 && wrel != relocs
13375 && ELF64_R_TYPE (wrel[-1].r_info) == R_PPC64_ADDR64
ee87f2da 13376 && is_opd)
c316a17c 13377 r_symndx = ELF64_R_SYM (wrel[-1].r_info);
ee87f2da 13378
4ce794b7
AM
13379 sym = NULL;
13380 sec = NULL;
039b3fef 13381 h_elf = NULL;
4ce794b7 13382 sym_name = NULL;
b34976b6
AM
13383 unresolved_reloc = FALSE;
13384 warned = FALSE;
65f38f15 13385
0b13192e 13386 if (r_symndx < symtab_hdr->sh_info)
5bd4f169
AM
13387 {
13388 /* It's a local symbol. */
74f0fb50 13389 struct _opd_sec_data *opd;
4025353c 13390
5bd4f169
AM
13391 sym = local_syms + r_symndx;
13392 sec = local_sections[r_symndx];
26c61ae5 13393 sym_name = bfd_elf_sym_name (input_bfd, symtab_hdr, sym, sec);
0d4792f7 13394 sym_type = ELF64_ST_TYPE (sym->st_info);
8517fae7 13395 relocation = _bfd_elf_rela_local_sym (output_bfd, sym, &sec, rel);
74f0fb50
AM
13396 opd = get_opd_info (sec);
13397 if (opd != NULL && opd->adjust != NULL)
1e2f5b6e 13398 {
51aecdc5
AM
13399 long adjust = opd->adjust[OPD_NDX (sym->st_value
13400 + rel->r_addend)];
4025353c
AM
13401 if (adjust == -1)
13402 relocation = 0;
13403 else
4cc603a5
AM
13404 {
13405 /* If this is a relocation against the opd section sym
13406 and we have edited .opd, adjust the reloc addend so
13407 that ld -r and ld --emit-relocs output is correct.
13408 If it is a reloc against some other .opd symbol,
13409 then the symbol value will be adjusted later. */
13410 if (ELF_ST_TYPE (sym->st_info) == STT_SECTION)
13411 rel->r_addend += adjust;
13412 else
13413 relocation += adjust;
13414 }
1e2f5b6e 13415 }
5bd4f169
AM
13416 }
13417 else
13418 {
62d887d4
L
13419 bfd_boolean ignored;
13420
b2a8e766
AM
13421 RELOC_FOR_GLOBAL_SYMBOL (info, input_bfd, input_section, rel,
13422 r_symndx, symtab_hdr, sym_hashes,
039b3fef 13423 h_elf, sec, relocation,
62d887d4 13424 unresolved_reloc, warned, ignored);
039b3fef
AM
13425 sym_name = h_elf->root.root.string;
13426 sym_type = h_elf->type;
b69fdb4e
AM
13427 if (sec != NULL
13428 && sec->owner == output_bfd
13429 && strcmp (sec->name, ".opd") == 0)
13430 {
13431 /* This is a symbol defined in a linker script. All
13432 such are defined in output sections, even those
13433 defined by simple assignment from a symbol defined in
13434 an input section. Transfer the symbol to an
13435 appropriate input .opd section, so that a branch to
13436 this symbol will be mapped to the location specified
13437 by the opd entry. */
13438 struct bfd_link_order *lo;
13439 for (lo = sec->map_head.link_order; lo != NULL; lo = lo->next)
13440 if (lo->type == bfd_indirect_link_order)
13441 {
13442 asection *isec = lo->u.indirect.section;
13443 if (h_elf->root.u.def.value >= isec->output_offset
13444 && h_elf->root.u.def.value < (isec->output_offset
13445 + isec->size))
13446 {
13447 h_elf->root.u.def.value -= isec->output_offset;
13448 h_elf->root.u.def.section = isec;
13449 sec = isec;
13450 break;
13451 }
13452 }
13453 }
5bd4f169 13454 }
039b3fef 13455 h = (struct ppc_link_hash_entry *) h_elf;
5bd4f169 13456
dbaa2011 13457 if (sec != NULL && discarded_section (sec))
c316a17c
AM
13458 {
13459 _bfd_clear_contents (ppc64_elf_howto_table[r_type],
13460 input_bfd, input_section,
13461 contents + rel->r_offset);
13462 wrel->r_offset = rel->r_offset;
13463 wrel->r_info = 0;
13464 wrel->r_addend = 0;
13465
13466 /* For ld -r, remove relocations in debug sections against
13467 sections defined in discarded sections. Not done for
13468 non-debug to preserve relocs in .eh_frame which the
13469 eh_frame editing code expects to be present. */
13470 if (bfd_link_relocatable (info)
13471 && (input_section->flags & SEC_DEBUGGING))
13472 wrel--;
13473
13474 continue;
13475 }
ab96bf03 13476
0e1862bb 13477 if (bfd_link_relocatable (info))
c316a17c 13478 goto copy_reloc;
ab96bf03 13479
f40da81b
AM
13480 if (h != NULL && &h->elf == htab->elf.hgot)
13481 {
6f20ed8a 13482 relocation = TOCstart + htab->sec_info[input_section->id].toc_off;
f40da81b
AM
13483 sec = bfd_abs_section_ptr;
13484 unresolved_reloc = FALSE;
13485 }
13486
951fd09b
AM
13487 /* TLS optimizations. Replace instruction sequences and relocs
13488 based on information we collected in tls_optimize. We edit
13489 RELOCS so that --emit-relocs will output something sensible
13490 for the final instruction stream. */
13491 tls_mask = 0;
13492 tls_gd = 0;
0d4792f7 13493 toc_symndx = 0;
727fc41e
AM
13494 if (h != NULL)
13495 tls_mask = h->tls_mask;
13496 else if (local_got_ents != NULL)
411e1bfb 13497 {
e054468f
AM
13498 struct plt_entry **local_plt = (struct plt_entry **)
13499 (local_got_ents + symtab_hdr->sh_info);
f961d9dd 13500 unsigned char *lgot_masks = (unsigned char *)
e054468f 13501 (local_plt + symtab_hdr->sh_info);
727fc41e
AM
13502 tls_mask = lgot_masks[r_symndx];
13503 }
13504 if (tls_mask == 0
13505 && (r_type == R_PPC64_TLS
13506 || r_type == R_PPC64_TLSGD
13507 || r_type == R_PPC64_TLSLD))
13508 {
13509 /* Check for toc tls entries. */
f961d9dd 13510 unsigned char *toc_tls;
0d4792f7 13511
727fc41e
AM
13512 if (!get_tls_mask (&toc_tls, &toc_symndx, &toc_addend,
13513 &local_syms, rel, input_bfd))
13514 return FALSE;
0d4792f7 13515
727fc41e
AM
13516 if (toc_tls)
13517 tls_mask = *toc_tls;
0d4792f7
AM
13518 }
13519
13520 /* Check that tls relocs are used with tls syms, and non-tls
13521 relocs are used with non-tls syms. */
cf35638d 13522 if (r_symndx != STN_UNDEF
0d4792f7
AM
13523 && r_type != R_PPC64_NONE
13524 && (h == NULL
039b3fef
AM
13525 || h->elf.root.type == bfd_link_hash_defined
13526 || h->elf.root.type == bfd_link_hash_defweak)
1d483afe
AM
13527 && (IS_PPC64_TLS_RELOC (r_type)
13528 != (sym_type == STT_TLS
13529 || (sym_type == STT_SECTION
13530 && (sec->flags & SEC_THREAD_LOCAL) != 0))))
0d4792f7 13531 {
727fc41e
AM
13532 if (tls_mask != 0
13533 && (r_type == R_PPC64_TLS
13534 || r_type == R_PPC64_TLSGD
13535 || r_type == R_PPC64_TLSLD))
0d4792f7
AM
13536 /* R_PPC64_TLS is OK against a symbol in the TOC. */
13537 ;
13538 else
25f53a85 13539 info->callbacks->einfo
1d483afe 13540 (!IS_PPC64_TLS_RELOC (r_type)
bc30df16
AM
13541 ? _("%P: %H: %s used with TLS symbol `%T'\n")
13542 : _("%P: %H: %s used with non-TLS symbol `%T'\n"),
25f53a85 13543 input_bfd, input_section, rel->r_offset,
0d4792f7
AM
13544 ppc64_elf_howto_table[r_type]->name,
13545 sym_name);
411e1bfb
AM
13546 }
13547
13548 /* Ensure reloc mapping code below stays sane. */
13549 if (R_PPC64_TOC16_LO_DS != R_PPC64_TOC16_DS + 1
13550 || R_PPC64_TOC16_LO != R_PPC64_TOC16 + 1
13551 || (R_PPC64_GOT_TLSLD16 & 3) != (R_PPC64_GOT_TLSGD16 & 3)
13552 || (R_PPC64_GOT_TLSLD16_LO & 3) != (R_PPC64_GOT_TLSGD16_LO & 3)
13553 || (R_PPC64_GOT_TLSLD16_HI & 3) != (R_PPC64_GOT_TLSGD16_HI & 3)
13554 || (R_PPC64_GOT_TLSLD16_HA & 3) != (R_PPC64_GOT_TLSGD16_HA & 3)
13555 || (R_PPC64_GOT_TLSLD16 & 3) != (R_PPC64_GOT_TPREL16_DS & 3)
13556 || (R_PPC64_GOT_TLSLD16_LO & 3) != (R_PPC64_GOT_TPREL16_LO_DS & 3)
13557 || (R_PPC64_GOT_TLSLD16_HI & 3) != (R_PPC64_GOT_TPREL16_HI & 3)
13558 || (R_PPC64_GOT_TLSLD16_HA & 3) != (R_PPC64_GOT_TPREL16_HA & 3))
13559 abort ();
0d4792f7 13560
411e1bfb
AM
13561 switch (r_type)
13562 {
13563 default:
411e1bfb
AM
13564 break;
13565
ba761f19
AM
13566 case R_PPC64_LO_DS_OPT:
13567 insn = bfd_get_32 (output_bfd, contents + rel->r_offset - d_offset);
13568 if ((insn & (0x3f << 26)) != 58u << 26)
13569 abort ();
13570 insn += (14u << 26) - (58u << 26);
13571 bfd_put_32 (output_bfd, insn, contents + rel->r_offset - d_offset);
13572 r_type = R_PPC64_TOC16_LO;
13573 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
13574 break;
13575
411e1bfb
AM
13576 case R_PPC64_TOC16:
13577 case R_PPC64_TOC16_LO:
13578 case R_PPC64_TOC16_DS:
13579 case R_PPC64_TOC16_LO_DS:
411e1bfb
AM
13580 {
13581 /* Check for toc tls entries. */
f961d9dd 13582 unsigned char *toc_tls;
951fd09b 13583 int retval;
411e1bfb 13584
3a71aa26
AM
13585 retval = get_tls_mask (&toc_tls, &toc_symndx, &toc_addend,
13586 &local_syms, rel, input_bfd);
951fd09b 13587 if (retval == 0)
411e1bfb
AM
13588 return FALSE;
13589
13590 if (toc_tls)
13591 {
951fd09b 13592 tls_mask = *toc_tls;
411e1bfb
AM
13593 if (r_type == R_PPC64_TOC16_DS
13594 || r_type == R_PPC64_TOC16_LO_DS)
81407a69
AM
13595 {
13596 if (tls_mask != 0
13597 && (tls_mask & (TLS_DTPREL | TLS_TPREL)) == 0)
13598 goto toctprel;
13599 }
411e1bfb 13600 else
951fd09b
AM
13601 {
13602 /* If we found a GD reloc pair, then we might be
13603 doing a GD->IE transition. */
13604 if (retval == 2)
13605 {
13606 tls_gd = TLS_TPRELGD;
13607 if (tls_mask != 0 && (tls_mask & TLS_GD) == 0)
102890f0 13608 goto tls_ldgd_opt;
951fd09b
AM
13609 }
13610 else if (retval == 3)
13611 {
13612 if (tls_mask != 0 && (tls_mask & TLS_LD) == 0)
102890f0 13613 goto tls_ldgd_opt;
951fd09b
AM
13614 }
13615 }
411e1bfb
AM
13616 }
13617 }
13618 break;
13619
9d6ded02
AM
13620 case R_PPC64_GOT_TPREL16_HI:
13621 case R_PPC64_GOT_TPREL16_HA:
13622 if (tls_mask != 0
13623 && (tls_mask & TLS_TPREL) == 0)
13624 {
13625 rel->r_offset -= d_offset;
13626 bfd_put_32 (output_bfd, NOP, contents + rel->r_offset);
13627 r_type = R_PPC64_NONE;
13628 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
13629 }
13630 break;
13631
411e1bfb
AM
13632 case R_PPC64_GOT_TPREL16_DS:
13633 case R_PPC64_GOT_TPREL16_LO_DS:
951fd09b
AM
13634 if (tls_mask != 0
13635 && (tls_mask & TLS_TPREL) == 0)
411e1bfb 13636 {
81407a69 13637 toctprel:
c316a17c
AM
13638 insn = bfd_get_32 (output_bfd,
13639 contents + rel->r_offset - d_offset);
411e1bfb
AM
13640 insn &= 31 << 21;
13641 insn |= 0x3c0d0000; /* addis 0,13,0 */
c316a17c
AM
13642 bfd_put_32 (output_bfd, insn,
13643 contents + rel->r_offset - d_offset);
411e1bfb 13644 r_type = R_PPC64_TPREL16_HA;
0d4792f7
AM
13645 if (toc_symndx != 0)
13646 {
13647 rel->r_info = ELF64_R_INFO (toc_symndx, r_type);
3a71aa26 13648 rel->r_addend = toc_addend;
0d4792f7
AM
13649 /* We changed the symbol. Start over in order to
13650 get h, sym, sec etc. right. */
c316a17c 13651 goto again;
0d4792f7
AM
13652 }
13653 else
13654 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
411e1bfb
AM
13655 }
13656 break;
13657
13658 case R_PPC64_TLS:
951fd09b
AM
13659 if (tls_mask != 0
13660 && (tls_mask & TLS_TPREL) == 0)
411e1bfb 13661 {
411e1bfb 13662 insn = bfd_get_32 (output_bfd, contents + rel->r_offset);
2d0f3896
AM
13663 insn = _bfd_elf_ppc_at_tls_transform (insn, 13);
13664 if (insn == 0)
411e1bfb 13665 abort ();
411e1bfb 13666 bfd_put_32 (output_bfd, insn, contents + rel->r_offset);
411e1bfb 13667 /* Was PPC64_TLS which sits on insn boundary, now
4fe5ca5b
GM
13668 PPC64_TPREL16_LO which is at low-order half-word. */
13669 rel->r_offset += d_offset;
0d4792f7
AM
13670 r_type = R_PPC64_TPREL16_LO;
13671 if (toc_symndx != 0)
13672 {
13673 rel->r_info = ELF64_R_INFO (toc_symndx, r_type);
3a71aa26 13674 rel->r_addend = toc_addend;
0d4792f7
AM
13675 /* We changed the symbol. Start over in order to
13676 get h, sym, sec etc. right. */
c316a17c 13677 goto again;
0d4792f7
AM
13678 }
13679 else
13680 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
411e1bfb
AM
13681 }
13682 break;
13683
411e1bfb
AM
13684 case R_PPC64_GOT_TLSGD16_HI:
13685 case R_PPC64_GOT_TLSGD16_HA:
951fd09b
AM
13686 tls_gd = TLS_TPRELGD;
13687 if (tls_mask != 0 && (tls_mask & TLS_GD) == 0)
13688 goto tls_gdld_hi;
13689 break;
13690
411e1bfb
AM
13691 case R_PPC64_GOT_TLSLD16_HI:
13692 case R_PPC64_GOT_TLSLD16_HA:
951fd09b 13693 if (tls_mask != 0 && (tls_mask & TLS_LD) == 0)
411e1bfb 13694 {
951fd09b
AM
13695 tls_gdld_hi:
13696 if ((tls_mask & tls_gd) != 0)
13697 r_type = (((r_type - (R_PPC64_GOT_TLSGD16 & 3)) & 3)
13698 + R_PPC64_GOT_TPREL16_DS);
13699 else
411e1bfb 13700 {
4fe5ca5b 13701 rel->r_offset -= d_offset;
727ac201 13702 bfd_put_32 (output_bfd, NOP, contents + rel->r_offset);
951fd09b 13703 r_type = R_PPC64_NONE;
411e1bfb 13704 }
951fd09b 13705 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
411e1bfb
AM
13706 }
13707 break;
13708
951fd09b
AM
13709 case R_PPC64_GOT_TLSGD16:
13710 case R_PPC64_GOT_TLSGD16_LO:
13711 tls_gd = TLS_TPRELGD;
13712 if (tls_mask != 0 && (tls_mask & TLS_GD) == 0)
102890f0 13713 goto tls_ldgd_opt;
951fd09b 13714 break;
411e1bfb 13715
951fd09b
AM
13716 case R_PPC64_GOT_TLSLD16:
13717 case R_PPC64_GOT_TLSLD16_LO:
13718 if (tls_mask != 0 && (tls_mask & TLS_LD) == 0)
13719 {
3a71aa26 13720 unsigned int insn1, insn2, insn3;
102890f0
AM
13721 bfd_vma offset;
13722
13723 tls_ldgd_opt:
727fc41e
AM
13724 offset = (bfd_vma) -1;
13725 /* If not using the newer R_PPC64_TLSGD/LD to mark
13726 __tls_get_addr calls, we must trust that the call
13727 stays with its arg setup insns, ie. that the next
13728 reloc is the __tls_get_addr call associated with
13729 the current reloc. Edit both insns. */
13730 if (input_section->has_tls_get_addr_call
13731 && rel + 1 < relend
13732 && branch_reloc_hash_match (input_bfd, rel + 1,
13733 htab->tls_get_addr,
13734 htab->tls_get_addr_fd))
13735 offset = rel[1].r_offset;
b86ac8e3
AM
13736 /* We read the low GOT_TLS (or TOC16) insn because we
13737 need to keep the destination reg. It may be
13738 something other than the usual r3, and moved to r3
13739 before the call by intervening code. */
13740 insn1 = bfd_get_32 (output_bfd,
13741 contents + rel->r_offset - d_offset);
102890f0 13742 if ((tls_mask & tls_gd) != 0)
411e1bfb 13743 {
102890f0 13744 /* IE */
b86ac8e3 13745 insn1 &= (0x1f << 21) | (0x1f << 16);
102890f0
AM
13746 insn1 |= 58 << 26; /* ld */
13747 insn2 = 0x7c636a14; /* add 3,3,13 */
727fc41e 13748 if (offset != (bfd_vma) -1)
f58d5a2d 13749 rel[1].r_info = ELF64_R_INFO (STN_UNDEF, R_PPC64_NONE);
102890f0
AM
13750 if ((tls_mask & TLS_EXPLICIT) == 0)
13751 r_type = (((r_type - (R_PPC64_GOT_TLSGD16 & 3)) & 3)
13752 + R_PPC64_GOT_TPREL16_DS);
411e1bfb 13753 else
102890f0
AM
13754 r_type += R_PPC64_TOC16_DS - R_PPC64_TOC16;
13755 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
13756 }
13757 else
13758 {
13759 /* LE */
b86ac8e3
AM
13760 insn1 &= 0x1f << 21;
13761 insn1 |= 0x3c0d0000; /* addis r,13,0 */
102890f0
AM
13762 insn2 = 0x38630000; /* addi 3,3,0 */
13763 if (tls_gd == 0)
951fd09b 13764 {
102890f0 13765 /* Was an LD reloc. */
1d483afe
AM
13766 if (toc_symndx)
13767 sec = local_sections[toc_symndx];
13768 for (r_symndx = 0;
13769 r_symndx < symtab_hdr->sh_info;
13770 r_symndx++)
13771 if (local_sections[r_symndx] == sec)
13772 break;
13773 if (r_symndx >= symtab_hdr->sh_info)
cf35638d 13774 r_symndx = STN_UNDEF;
102890f0 13775 rel->r_addend = htab->elf.tls_sec->vma + DTP_OFFSET;
cf35638d 13776 if (r_symndx != STN_UNDEF)
1d483afe
AM
13777 rel->r_addend -= (local_syms[r_symndx].st_value
13778 + sec->output_offset
13779 + sec->output_section->vma);
951fd09b 13780 }
102890f0 13781 else if (toc_symndx != 0)
3a71aa26
AM
13782 {
13783 r_symndx = toc_symndx;
13784 rel->r_addend = toc_addend;
13785 }
102890f0
AM
13786 r_type = R_PPC64_TPREL16_HA;
13787 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
727fc41e
AM
13788 if (offset != (bfd_vma) -1)
13789 {
13790 rel[1].r_info = ELF64_R_INFO (r_symndx,
13791 R_PPC64_TPREL16_LO);
13792 rel[1].r_offset = offset + d_offset;
13793 rel[1].r_addend = rel->r_addend;
13794 }
102890f0 13795 }
3a71aa26
AM
13796 bfd_put_32 (output_bfd, insn1,
13797 contents + rel->r_offset - d_offset);
727fc41e
AM
13798 if (offset != (bfd_vma) -1)
13799 {
13800 insn3 = bfd_get_32 (output_bfd,
13801 contents + offset + 4);
13802 if (insn3 == NOP
13803 || insn3 == CROR_151515 || insn3 == CROR_313131)
13804 {
13805 rel[1].r_offset += 4;
13806 bfd_put_32 (output_bfd, insn2, contents + offset + 4);
13807 insn2 = NOP;
13808 }
13809 bfd_put_32 (output_bfd, insn2, contents + offset);
13810 }
13811 if ((tls_mask & tls_gd) == 0
13812 && (tls_gd == 0 || toc_symndx != 0))
13813 {
13814 /* We changed the symbol. Start over in order
13815 to get h, sym, sec etc. right. */
c316a17c 13816 goto again;
727fc41e
AM
13817 }
13818 }
13819 break;
13820
13821 case R_PPC64_TLSGD:
13822 if (tls_mask != 0 && (tls_mask & TLS_GD) == 0)
13823 {
13824 unsigned int insn2, insn3;
13825 bfd_vma offset = rel->r_offset;
13826
13827 if ((tls_mask & TLS_TPRELGD) != 0)
13828 {
13829 /* IE */
13830 r_type = R_PPC64_NONE;
13831 insn2 = 0x7c636a14; /* add 3,3,13 */
13832 }
13833 else
13834 {
13835 /* LE */
13836 if (toc_symndx != 0)
13837 {
13838 r_symndx = toc_symndx;
13839 rel->r_addend = toc_addend;
13840 }
13841 r_type = R_PPC64_TPREL16_LO;
13842 rel->r_offset = offset + d_offset;
13843 insn2 = 0x38630000; /* addi 3,3,0 */
13844 }
13845 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
13846 /* Zap the reloc on the _tls_get_addr call too. */
13847 BFD_ASSERT (offset == rel[1].r_offset);
f58d5a2d 13848 rel[1].r_info = ELF64_R_INFO (STN_UNDEF, R_PPC64_NONE);
3a71aa26
AM
13849 insn3 = bfd_get_32 (output_bfd,
13850 contents + offset + 4);
102890f0
AM
13851 if (insn3 == NOP
13852 || insn3 == CROR_151515 || insn3 == CROR_313131)
13853 {
727fc41e 13854 rel->r_offset += 4;
3a71aa26
AM
13855 bfd_put_32 (output_bfd, insn2, contents + offset + 4);
13856 insn2 = NOP;
102890f0 13857 }
102890f0 13858 bfd_put_32 (output_bfd, insn2, contents + offset);
727fc41e 13859 if ((tls_mask & TLS_TPRELGD) == 0 && toc_symndx != 0)
c316a17c 13860 goto again;
411e1bfb 13861 }
411e1bfb
AM
13862 break;
13863
727fc41e
AM
13864 case R_PPC64_TLSLD:
13865 if (tls_mask != 0 && (tls_mask & TLS_LD) == 0)
13866 {
13867 unsigned int insn2, insn3;
13868 bfd_vma offset = rel->r_offset;
13869
13870 if (toc_symndx)
13871 sec = local_sections[toc_symndx];
13872 for (r_symndx = 0;
13873 r_symndx < symtab_hdr->sh_info;
13874 r_symndx++)
13875 if (local_sections[r_symndx] == sec)
13876 break;
13877 if (r_symndx >= symtab_hdr->sh_info)
cf35638d 13878 r_symndx = STN_UNDEF;
727fc41e 13879 rel->r_addend = htab->elf.tls_sec->vma + DTP_OFFSET;
cf35638d 13880 if (r_symndx != STN_UNDEF)
727fc41e
AM
13881 rel->r_addend -= (local_syms[r_symndx].st_value
13882 + sec->output_offset
13883 + sec->output_section->vma);
13884
13885 r_type = R_PPC64_TPREL16_LO;
13886 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
13887 rel->r_offset = offset + d_offset;
13888 /* Zap the reloc on the _tls_get_addr call too. */
13889 BFD_ASSERT (offset == rel[1].r_offset);
f58d5a2d 13890 rel[1].r_info = ELF64_R_INFO (STN_UNDEF, R_PPC64_NONE);
727fc41e
AM
13891 insn2 = 0x38630000; /* addi 3,3,0 */
13892 insn3 = bfd_get_32 (output_bfd,
13893 contents + offset + 4);
13894 if (insn3 == NOP
13895 || insn3 == CROR_151515 || insn3 == CROR_313131)
13896 {
13897 rel->r_offset += 4;
13898 bfd_put_32 (output_bfd, insn2, contents + offset + 4);
13899 insn2 = NOP;
13900 }
13901 bfd_put_32 (output_bfd, insn2, contents + offset);
c316a17c 13902 goto again;
727fc41e
AM
13903 }
13904 break;
13905
411e1bfb 13906 case R_PPC64_DTPMOD64:
951fd09b
AM
13907 if (rel + 1 < relend
13908 && rel[1].r_info == ELF64_R_INFO (r_symndx, R_PPC64_DTPREL64)
13909 && rel[1].r_offset == rel->r_offset + 8)
411e1bfb 13910 {
951fd09b
AM
13911 if ((tls_mask & TLS_GD) == 0)
13912 {
13913 rel[1].r_info = ELF64_R_INFO (r_symndx, R_PPC64_NONE);
13914 if ((tls_mask & TLS_TPRELGD) != 0)
13915 r_type = R_PPC64_TPREL64;
13916 else
13917 {
4ce794b7 13918 bfd_put_64 (output_bfd, 1, contents + rel->r_offset);
951fd09b
AM
13919 r_type = R_PPC64_NONE;
13920 }
13921 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
13922 }
13923 }
13924 else
13925 {
13926 if ((tls_mask & TLS_LD) == 0)
411e1bfb 13927 {
4ce794b7 13928 bfd_put_64 (output_bfd, 1, contents + rel->r_offset);
411e1bfb 13929 r_type = R_PPC64_NONE;
951fd09b 13930 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
411e1bfb 13931 }
411e1bfb
AM
13932 }
13933 break;
13934
13935 case R_PPC64_TPREL64:
951fd09b 13936 if ((tls_mask & TLS_TPREL) == 0)
411e1bfb
AM
13937 {
13938 r_type = R_PPC64_NONE;
13939 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
13940 }
13941 break;
52a82034 13942
006589cf
AM
13943 case R_PPC64_ENTRY:
13944 relocation = TOCstart + htab->sec_info[input_section->id].toc_off;
13945 if (!bfd_link_pic (info)
13946 && !info->traditional_format
13947 && relocation + 0x80008000 <= 0xffffffff)
13948 {
13949 unsigned int insn1, insn2;
13950
13951 insn1 = bfd_get_32 (input_bfd, contents + rel->r_offset);
13952 insn2 = bfd_get_32 (input_bfd, contents + rel->r_offset + 4);
13953 if ((insn1 & ~0xfffc) == LD_R2_0R12
13954 && insn2 == ADD_R2_R2_R12)
13955 {
13956 bfd_put_32 (output_bfd,
13957 LIS_R2 + PPC_HA (relocation),
13958 contents + rel->r_offset);
13959 bfd_put_32 (output_bfd,
13960 ADDI_R2_R2 + PPC_LO (relocation),
13961 contents + rel->r_offset + 4);
13962 }
13963 }
13964 else
13965 {
13966 relocation -= (rel->r_offset
13967 + input_section->output_offset
13968 + input_section->output_section->vma);
13969 if (relocation + 0x80008000 <= 0xffffffff)
13970 {
13971 unsigned int insn1, insn2;
13972
13973 insn1 = bfd_get_32 (input_bfd, contents + rel->r_offset);
13974 insn2 = bfd_get_32 (input_bfd, contents + rel->r_offset + 4);
13975 if ((insn1 & ~0xfffc) == LD_R2_0R12
13976 && insn2 == ADD_R2_R2_R12)
13977 {
13978 bfd_put_32 (output_bfd,
13979 ADDIS_R2_R12 + PPC_HA (relocation),
13980 contents + rel->r_offset);
13981 bfd_put_32 (output_bfd,
13982 ADDI_R2_R2 + PPC_LO (relocation),
13983 contents + rel->r_offset + 4);
13984 }
13985 }
13986 }
13987 break;
13988
52a82034
AM
13989 case R_PPC64_REL16_HA:
13990 /* If we are generating a non-PIC executable, edit
13991 . 0: addis 2,12,.TOC.-0b@ha
13992 . addi 2,2,.TOC.-0b@l
13993 used by ELFv2 global entry points to set up r2, to
13994 . lis 2,.TOC.@ha
13995 . addi 2,2,.TOC.@l
13996 if .TOC. is in range. */
0e1862bb 13997 if (!bfd_link_pic (info)
810d4e75 13998 && !info->traditional_format
006589cf 13999 && !htab->opd_abi
4f038ee5 14000 && rel->r_addend == d_offset
52a82034
AM
14001 && h != NULL && &h->elf == htab->elf.hgot
14002 && rel + 1 < relend
14003 && rel[1].r_info == ELF64_R_INFO (r_symndx, R_PPC64_REL16_LO)
14004 && rel[1].r_offset == rel->r_offset + 4
14005 && rel[1].r_addend == rel->r_addend + 4
14006 && relocation + 0x80008000 <= 0xffffffff)
14007 {
14008 unsigned int insn1, insn2;
14009 bfd_vma offset = rel->r_offset - d_offset;
14010 insn1 = bfd_get_32 (output_bfd, contents + offset);
14011 insn2 = bfd_get_32 (output_bfd, contents + offset + 4);
006589cf
AM
14012 if ((insn1 & 0xffff0000) == ADDIS_R2_R12
14013 && (insn2 & 0xffff0000) == ADDI_R2_R2)
52a82034
AM
14014 {
14015 r_type = R_PPC64_ADDR16_HA;
14016 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
14017 rel->r_addend -= d_offset;
14018 rel[1].r_info = ELF64_R_INFO (r_symndx, R_PPC64_ADDR16_LO);
14019 rel[1].r_addend -= d_offset + 4;
006589cf 14020 bfd_put_32 (output_bfd, LIS_R2, contents + offset);
52a82034
AM
14021 }
14022 }
14023 break;
411e1bfb
AM
14024 }
14025
14026 /* Handle other relocations that tweak non-addend part of insn. */
86c76c7b 14027 insn = 0;
b25116a9
AM
14028 max_br_offset = 1 << 25;
14029 addend = rel->r_addend;
bc30df16 14030 reloc_dest = DEST_NORMAL;
65f38f15 14031 switch (r_type)
5bd4f169
AM
14032 {
14033 default:
65f38f15 14034 break;
5bd4f169 14035
3b421ab3
AM
14036 case R_PPC64_TOCSAVE:
14037 if (relocation + addend == (rel->r_offset
14038 + input_section->output_offset
14039 + input_section->output_section->vma)
14040 && tocsave_find (htab, NO_INSERT,
14041 &local_syms, rel, input_bfd))
14042 {
14043 insn = bfd_get_32 (input_bfd, contents + rel->r_offset);
14044 if (insn == NOP
14045 || insn == CROR_151515 || insn == CROR_313131)
a078d95a
AM
14046 bfd_put_32 (input_bfd,
14047 STD_R2_0R1 + STK_TOC (htab),
3b421ab3
AM
14048 contents + rel->r_offset);
14049 }
14050 break;
14051
65f38f15
AM
14052 /* Branch taken prediction relocations. */
14053 case R_PPC64_ADDR14_BRTAKEN:
14054 case R_PPC64_REL14_BRTAKEN:
cedb70c5
KH
14055 insn = 0x01 << 21; /* 'y' or 't' bit, lowest bit of BO field. */
14056 /* Fall thru. */
65f38f15 14057
86c76c7b 14058 /* Branch not taken prediction relocations. */
65f38f15
AM
14059 case R_PPC64_ADDR14_BRNTAKEN:
14060 case R_PPC64_REL14_BRNTAKEN:
411e1bfb
AM
14061 insn |= bfd_get_32 (output_bfd,
14062 contents + rel->r_offset) & ~(0x01 << 21);
b25116a9 14063 /* Fall thru. */
86c76c7b 14064
b25116a9
AM
14065 case R_PPC64_REL14:
14066 max_br_offset = 1 << 15;
14067 /* Fall thru. */
5bd4f169 14068
65f38f15 14069 case R_PPC64_REL24:
ad8e1ba5
AM
14070 /* Calls to functions with a different TOC, such as calls to
14071 shared objects, need to alter the TOC pointer. This is
14072 done using a linkage stub. A REL24 branching to these
14073 linkage stubs needs to be followed by a nop, as the nop
14074 will be replaced with an instruction to restore the TOC
14075 base pointer. */
8387904d 14076 fdh = h;
b31867b6
AM
14077 if (h != NULL
14078 && h->oh != NULL
14079 && h->oh->is_func_descriptor)
14080 fdh = ppc_follow_link (h->oh);
31c76678
DK
14081 stub_entry = ppc_get_stub_entry (input_section, sec, fdh, &orig_rel,
14082 htab);
6abec6bc 14083 if (stub_entry != NULL
ad8e1ba5 14084 && (stub_entry->stub_type == ppc_stub_plt_call
794e51c0 14085 || stub_entry->stub_type == ppc_stub_plt_call_r2save
ad8e1ba5
AM
14086 || stub_entry->stub_type == ppc_stub_plt_branch_r2off
14087 || stub_entry->stub_type == ppc_stub_long_branch_r2off))
41bd81ab 14088 {
b25116a9 14089 bfd_boolean can_plt_call = FALSE;
721956f4 14090
ba8ca3e7
AM
14091 /* All of these stubs will modify r2, so there must be a
14092 branch and link followed by a nop. The nop is
14093 replaced by an insn to restore r2. */
eea6121a 14094 if (rel->r_offset + 8 <= input_section->size)
41bd81ab 14095 {
ba8ca3e7
AM
14096 unsigned long br;
14097
14098 br = bfd_get_32 (input_bfd,
14099 contents + rel->r_offset);
14100 if ((br & 1) != 0)
41bd81ab 14101 {
ba8ca3e7
AM
14102 unsigned long nop;
14103
14104 nop = bfd_get_32 (input_bfd,
14105 contents + rel->r_offset + 4);
14106 if (nop == NOP
14107 || nop == CROR_151515 || nop == CROR_313131)
a7f2871e 14108 {
ba8ca3e7
AM
14109 if (h != NULL
14110 && (h == htab->tls_get_addr_fd
14111 || h == htab->tls_get_addr)
7c9cf415 14112 && htab->params->tls_get_addr_opt)
ba8ca3e7
AM
14113 {
14114 /* Special stub used, leave nop alone. */
14115 }
14116 else
a078d95a
AM
14117 bfd_put_32 (input_bfd,
14118 LD_R2_0R1 + STK_TOC (htab),
ba8ca3e7
AM
14119 contents + rel->r_offset + 4);
14120 can_plt_call = TRUE;
a7f2871e 14121 }
41bd81ab 14122 }
5bd4f169 14123 }
721956f4 14124
ba8ca3e7 14125 if (!can_plt_call && h != NULL)
721956f4 14126 {
ba8ca3e7
AM
14127 const char *name = h->elf.root.root.string;
14128
14129 if (*name == '.')
14130 ++name;
14131
14132 if (strncmp (name, "__libc_start_main", 17) == 0
14133 && (name[17] == 0 || name[17] == '@'))
6ab189d5 14134 {
ba8ca3e7
AM
14135 /* Allow crt1 branch to go via a toc adjusting
14136 stub. Other calls that never return could do
14137 the same, if we could detect such. */
b25116a9 14138 can_plt_call = TRUE;
6ab189d5 14139 }
ba8ca3e7
AM
14140 }
14141
14142 if (!can_plt_call)
14143 {
14144 /* g++ as of 20130507 emits self-calls without a
14145 following nop. This is arguably wrong since we
14146 have conflicting information. On the one hand a
14147 global symbol and on the other a local call
14148 sequence, but don't error for this special case.
14149 It isn't possible to cheaply verify we have
14150 exactly such a call. Allow all calls to the same
14151 section. */
14152 asection *code_sec = sec;
14153
14154 if (get_opd_info (sec) != NULL)
ad8e1ba5 14155 {
ba8ca3e7
AM
14156 bfd_vma off = (relocation + addend
14157 - sec->output_section->vma
14158 - sec->output_offset);
bc30df16 14159
ba8ca3e7 14160 opd_entry_value (sec, off, &code_sec, NULL, FALSE);
ad8e1ba5 14161 }
ba8ca3e7
AM
14162 if (code_sec == input_section)
14163 can_plt_call = TRUE;
14164 }
14165
14166 if (!can_plt_call)
14167 {
4805fc55
AM
14168 if (stub_entry->stub_type == ppc_stub_plt_call
14169 || stub_entry->stub_type == ppc_stub_plt_call_r2save)
14170 info->callbacks->einfo
14171 (_("%P: %H: call to `%T' lacks nop, can't restore toc; "
14172 "recompile with -fPIC\n"),
14173 input_bfd, input_section, rel->r_offset, sym_name);
14174 else
14175 info->callbacks->einfo
14176 (_("%P: %H: call to `%T' lacks nop, can't restore toc; "
14177 "(-mcmodel=small toc adjust stub)\n"),
14178 input_bfd, input_section, rel->r_offset, sym_name);
ba8ca3e7
AM
14179
14180 bfd_set_error (bfd_error_bad_value);
14181 ret = FALSE;
721956f4
AM
14182 }
14183
b25116a9 14184 if (can_plt_call
794e51c0
AM
14185 && (stub_entry->stub_type == ppc_stub_plt_call
14186 || stub_entry->stub_type == ppc_stub_plt_call_r2save))
b25116a9
AM
14187 unresolved_reloc = FALSE;
14188 }
14189
6abec6bc
AM
14190 if ((stub_entry == NULL
14191 || stub_entry->stub_type == ppc_stub_long_branch
14192 || stub_entry->stub_type == ppc_stub_plt_branch)
8387904d
AM
14193 && get_opd_info (sec) != NULL)
14194 {
14195 /* The branch destination is the value of the opd entry. */
4cc603a5
AM
14196 bfd_vma off = (relocation + addend
14197 - sec->output_section->vma
14198 - sec->output_offset);
aef36ac1 14199 bfd_vma dest = opd_entry_value (sec, off, NULL, NULL, FALSE);
8387904d
AM
14200 if (dest != (bfd_vma) -1)
14201 {
14202 relocation = dest;
14203 addend = 0;
bc30df16 14204 reloc_dest = DEST_OPD;
8387904d
AM
14205 }
14206 }
14207
b25116a9
AM
14208 /* If the branch is out of reach we ought to have a long
14209 branch stub. */
14210 from = (rel->r_offset
14211 + input_section->output_offset
14212 + input_section->output_section->vma);
14213
6911b7dc
AM
14214 relocation += PPC64_LOCAL_ENTRY_OFFSET (fdh
14215 ? fdh->elf.other
14216 : sym->st_other);
14217
6abec6bc
AM
14218 if (stub_entry != NULL
14219 && (stub_entry->stub_type == ppc_stub_long_branch
14220 || stub_entry->stub_type == ppc_stub_plt_branch)
14221 && (r_type == R_PPC64_ADDR14_BRTAKEN
14222 || r_type == R_PPC64_ADDR14_BRNTAKEN
14223 || (relocation + addend - from + max_br_offset
14224 < 2 * max_br_offset)))
14225 /* Don't use the stub if this branch is in range. */
14226 stub_entry = NULL;
b25116a9
AM
14227
14228 if (stub_entry != NULL)
14229 {
14230 /* Munge up the value and addend so that we call the stub
14231 rather than the procedure directly. */
a4b6fadd
AM
14232 asection *stub_sec = stub_entry->group->stub_sec;
14233
14234 if (stub_entry->stub_type == ppc_stub_save_res)
14235 relocation += (stub_sec->output_offset
14236 + stub_sec->output_section->vma
14237 + stub_sec->size - htab->sfpr->size
14238 - htab->sfpr->output_offset
14239 - htab->sfpr->output_section->vma);
14240 else
14241 relocation = (stub_entry->stub_offset
14242 + stub_sec->output_offset
14243 + stub_sec->output_section->vma);
b25116a9 14244 addend = 0;
bc30df16 14245 reloc_dest = DEST_STUB;
3b421ab3 14246
794e51c0
AM
14247 if ((stub_entry->stub_type == ppc_stub_plt_call
14248 || stub_entry->stub_type == ppc_stub_plt_call_r2save)
14249 && (ALWAYS_EMIT_R2SAVE
14250 || stub_entry->stub_type == ppc_stub_plt_call_r2save)
3b421ab3
AM
14251 && rel + 1 < relend
14252 && rel[1].r_offset == rel->r_offset + 4
14253 && ELF64_R_TYPE (rel[1].r_info) == R_PPC64_TOCSAVE)
14254 relocation += 4;
b25116a9
AM
14255 }
14256
14257 if (insn != 0)
14258 {
794e51c0 14259 if (is_isa_v2)
721956f4 14260 {
b25116a9
AM
14261 /* Set 'a' bit. This is 0b00010 in BO field for branch
14262 on CR(BI) insns (BO == 001at or 011at), and 0b01000
14263 for branch on CTR insns (BO == 1a00t or 1a01t). */
14264 if ((insn & (0x14 << 21)) == (0x04 << 21))
14265 insn |= 0x02 << 21;
14266 else if ((insn & (0x14 << 21)) == (0x10 << 21))
14267 insn |= 0x08 << 21;
14268 else
14269 break;
14270 }
14271 else
14272 {
14273 /* Invert 'y' bit if not the default. */
4cc603a5 14274 if ((bfd_signed_vma) (relocation + addend - from) < 0)
b25116a9 14275 insn ^= 0x01 << 21;
721956f4 14276 }
b25116a9
AM
14277
14278 bfd_put_32 (output_bfd, insn, contents + rel->r_offset);
5bd4f169 14279 }
e86ce104 14280
06da1e8e
AM
14281 /* NOP out calls to undefined weak functions.
14282 We can thus call a weak function without first
14283 checking whether the function is defined. */
b25116a9 14284 else if (h != NULL
039b3fef 14285 && h->elf.root.type == bfd_link_hash_undefweak
766bc656 14286 && h->elf.dynindx == -1
b25116a9
AM
14287 && r_type == R_PPC64_REL24
14288 && relocation == 0
4cc603a5 14289 && addend == 0)
e86ce104 14290 {
06da1e8e 14291 bfd_put_32 (output_bfd, NOP, contents + rel->r_offset);
c316a17c 14292 goto copy_reloc;
e86ce104 14293 }
65f38f15
AM
14294 break;
14295 }
5bd4f169 14296
65f38f15 14297 /* Set `addend'. */
411e1bfb 14298 tls_type = 0;
65f38f15
AM
14299 switch (r_type)
14300 {
14301 default:
25f53a85 14302 info->callbacks->einfo
bc30df16 14303 (_("%P: %B: unknown relocation type %d for `%T'\n"),
d003868e 14304 input_bfd, (int) r_type, sym_name);
5bd4f169 14305
65f38f15 14306 bfd_set_error (bfd_error_bad_value);
b34976b6 14307 ret = FALSE;
c316a17c 14308 goto copy_reloc;
5bd4f169 14309
65f38f15 14310 case R_PPC64_NONE:
411e1bfb 14311 case R_PPC64_TLS:
727fc41e
AM
14312 case R_PPC64_TLSGD:
14313 case R_PPC64_TLSLD:
3b421ab3 14314 case R_PPC64_TOCSAVE:
04c9666a
AM
14315 case R_PPC64_GNU_VTINHERIT:
14316 case R_PPC64_GNU_VTENTRY:
006589cf 14317 case R_PPC64_ENTRY:
c316a17c 14318 goto copy_reloc;
5bd4f169
AM
14319
14320 /* GOT16 relocations. Like an ADDR16 using the symbol's
14321 address in the GOT as relocation value instead of the
411e1bfb 14322 symbol's value itself. Also, create a GOT entry for the
5bd4f169 14323 symbol and put the symbol value there. */
411e1bfb
AM
14324 case R_PPC64_GOT_TLSGD16:
14325 case R_PPC64_GOT_TLSGD16_LO:
14326 case R_PPC64_GOT_TLSGD16_HI:
14327 case R_PPC64_GOT_TLSGD16_HA:
951fd09b 14328 tls_type = TLS_TLS | TLS_GD;
411e1bfb
AM
14329 goto dogot;
14330
14331 case R_PPC64_GOT_TLSLD16:
14332 case R_PPC64_GOT_TLSLD16_LO:
14333 case R_PPC64_GOT_TLSLD16_HI:
14334 case R_PPC64_GOT_TLSLD16_HA:
951fd09b 14335 tls_type = TLS_TLS | TLS_LD;
411e1bfb
AM
14336 goto dogot;
14337
14338 case R_PPC64_GOT_TPREL16_DS:
14339 case R_PPC64_GOT_TPREL16_LO_DS:
14340 case R_PPC64_GOT_TPREL16_HI:
14341 case R_PPC64_GOT_TPREL16_HA:
14342 tls_type = TLS_TLS | TLS_TPREL;
14343 goto dogot;
14344
14345 case R_PPC64_GOT_DTPREL16_DS:
14346 case R_PPC64_GOT_DTPREL16_LO_DS:
14347 case R_PPC64_GOT_DTPREL16_HI:
14348 case R_PPC64_GOT_DTPREL16_HA:
14349 tls_type = TLS_TLS | TLS_DTPREL;
14350 goto dogot;
14351
65f38f15
AM
14352 case R_PPC64_GOT16:
14353 case R_PPC64_GOT16_LO:
14354 case R_PPC64_GOT16_HI:
14355 case R_PPC64_GOT16_HA:
14356 case R_PPC64_GOT16_DS:
14357 case R_PPC64_GOT16_LO_DS:
411e1bfb 14358 dogot:
5bd4f169
AM
14359 {
14360 /* Relocation is to the entry for this symbol in the global
14361 offset table. */
e717da7e 14362 asection *got;
d881513a 14363 bfd_vma *offp;
5bd4f169 14364 bfd_vma off;
d881513a 14365 unsigned long indx = 0;
927be08e 14366 struct got_entry *ent;
65f38f15 14367
d881513a
AM
14368 if (tls_type == (TLS_TLS | TLS_LD)
14369 && (h == NULL
f5385ebf 14370 || !h->elf.def_dynamic))
927be08e 14371 ent = ppc64_tlsld_got (input_bfd);
411e1bfb 14372 else
5bd4f169 14373 {
5bd4f169 14374
d881513a
AM
14375 if (h != NULL)
14376 {
14377 bfd_boolean dyn = htab->elf.dynamic_sections_created;
0e1862bb 14378 if (!WILL_CALL_FINISH_DYNAMIC_SYMBOL (dyn, bfd_link_pic (info),
039b3fef 14379 &h->elf)
0e1862bb 14380 || (bfd_link_pic (info)
afe397ea 14381 && SYMBOL_REFERENCES_LOCAL (info, &h->elf)))
d881513a
AM
14382 /* This is actually a static link, or it is a
14383 -Bsymbolic link and the symbol is defined
14384 locally, or the symbol was forced to be local
14385 because of a version file. */
14386 ;
14387 else
14388 {
14acf4dc 14389 BFD_ASSERT (h->elf.dynindx != -1);
039b3fef 14390 indx = h->elf.dynindx;
d881513a
AM
14391 unresolved_reloc = FALSE;
14392 }
039b3fef 14393 ent = h->elf.got.glist;
d881513a 14394 }
411e1bfb 14395 else
5bd4f169 14396 {
d881513a
AM
14397 if (local_got_ents == NULL)
14398 abort ();
14399 ent = local_got_ents[r_symndx];
5bd4f169 14400 }
d881513a
AM
14401
14402 for (; ent != NULL; ent = ent->next)
31c76678 14403 if (ent->addend == orig_rel.r_addend
e717da7e 14404 && ent->owner == input_bfd
d881513a
AM
14405 && ent->tls_type == tls_type)
14406 break;
5bd4f169 14407 }
411e1bfb 14408
927be08e
AM
14409 if (ent == NULL)
14410 abort ();
14411 if (ent->is_indirect)
14412 ent = ent->got.ent;
14413 offp = &ent->got.offset;
14414 got = ppc64_elf_tdata (ent->owner)->got;
e717da7e
AM
14415 if (got == NULL)
14416 abort ();
14417
411e1bfb
AM
14418 /* The offset must always be a multiple of 8. We use the
14419 least significant bit to record whether we have already
14420 processed this entry. */
d881513a 14421 off = *offp;
411e1bfb
AM
14422 if ((off & 1) != 0)
14423 off &= ~1;
5bd4f169
AM
14424 else
14425 {
411e1bfb
AM
14426 /* Generate relocs for the dynamic linker, except in
14427 the case of TLSLD where we'll use one entry per
14428 module. */
25f23106
AM
14429 asection *relgot;
14430 bfd_boolean ifunc;
e717da7e 14431
d881513a 14432 *offp = off | 1;
25f23106
AM
14433 relgot = NULL;
14434 ifunc = (h != NULL
14435 ? h->elf.type == STT_GNU_IFUNC
14436 : ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC);
19e08130 14437 if (ifunc)
33e44f2e 14438 relgot = htab->elf.irelplt;
0e1862bb 14439 else if ((bfd_link_pic (info) || indx != 0)
19e08130
AM
14440 && (h == NULL
14441 || (tls_type == (TLS_TLS | TLS_LD)
14442 && !h->elf.def_dynamic)
14443 || ELF_ST_VISIBILITY (h->elf.other) == STV_DEFAULT
14444 || h->elf.root.type != bfd_link_hash_undefweak))
14445 relgot = ppc64_elf_tdata (ent->owner)->relgot;
25f23106 14446 if (relgot != NULL)
5bd4f169 14447 {
e717da7e
AM
14448 outrel.r_offset = (got->output_section->vma
14449 + got->output_offset
411e1bfb 14450 + off);
4cc603a5 14451 outrel.r_addend = addend;
d881513a 14452 if (tls_type & (TLS_LD | TLS_GD))
5bd4f169 14453 {
411e1bfb 14454 outrel.r_addend = 0;
e515b051 14455 outrel.r_info = ELF64_R_INFO (indx, R_PPC64_DTPMOD64);
d881513a
AM
14456 if (tls_type == (TLS_TLS | TLS_GD))
14457 {
e717da7e
AM
14458 loc = relgot->contents;
14459 loc += (relgot->reloc_count++
d881513a
AM
14460 * sizeof (Elf64_External_Rela));
14461 bfd_elf64_swap_reloca_out (output_bfd,
14462 &outrel, loc);
e515b051 14463 outrel.r_offset += 8;
4cc603a5 14464 outrel.r_addend = addend;
d881513a
AM
14465 outrel.r_info
14466 = ELF64_R_INFO (indx, R_PPC64_DTPREL64);
d881513a 14467 }
411e1bfb 14468 }
951fd09b 14469 else if (tls_type == (TLS_TLS | TLS_DTPREL))
411e1bfb 14470 outrel.r_info = ELF64_R_INFO (indx, R_PPC64_DTPREL64);
951fd09b 14471 else if (tls_type == (TLS_TLS | TLS_TPREL))
411e1bfb 14472 outrel.r_info = ELF64_R_INFO (indx, R_PPC64_TPREL64);
25f23106
AM
14473 else if (indx != 0)
14474 outrel.r_info = ELF64_R_INFO (indx, R_PPC64_GLOB_DAT);
14475 else
81407a69 14476 {
25f23106
AM
14477 if (ifunc)
14478 outrel.r_info = ELF64_R_INFO (0, R_PPC64_IRELATIVE);
14479 else
14480 outrel.r_info = ELF64_R_INFO (0, R_PPC64_RELATIVE);
81407a69
AM
14481
14482 /* Write the .got section contents for the sake
14483 of prelink. */
e717da7e 14484 loc = got->contents + off;
23fbd6fa
JJ
14485 bfd_put_64 (output_bfd, outrel.r_addend + relocation,
14486 loc);
81407a69 14487 }
81407a69
AM
14488
14489 if (indx == 0 && tls_type != (TLS_TLS | TLS_LD))
e515b051
AM
14490 {
14491 outrel.r_addend += relocation;
14492 if (tls_type & (TLS_GD | TLS_DTPREL | TLS_TPREL))
989f9879
AM
14493 {
14494 if (htab->elf.tls_sec == NULL)
14495 outrel.r_addend = 0;
14496 else
14497 outrel.r_addend -= htab->elf.tls_sec->vma;
14498 }
e515b051 14499 }
e717da7e
AM
14500 loc = relgot->contents;
14501 loc += (relgot->reloc_count++
411e1bfb
AM
14502 * sizeof (Elf64_External_Rela));
14503 bfd_elf64_swap_reloca_out (output_bfd, &outrel, loc);
14504 }
14505
ad8e1ba5 14506 /* Init the .got section contents here if we're not
81407a69 14507 emitting a reloc. */
d881513a 14508 else
411e1bfb 14509 {
4cc603a5 14510 relocation += addend;
7b609f53
AM
14511 if (tls_type == (TLS_TLS | TLS_LD))
14512 relocation = 1;
14513 else if (tls_type != 0)
411e1bfb 14514 {
989f9879
AM
14515 if (htab->elf.tls_sec == NULL)
14516 relocation = 0;
14517 else
14518 {
14519 relocation -= htab->elf.tls_sec->vma + DTP_OFFSET;
14520 if (tls_type == (TLS_TLS | TLS_TPREL))
14521 relocation += DTP_OFFSET - TP_OFFSET;
14522 }
5bd4f169 14523
7b609f53
AM
14524 if (tls_type == (TLS_TLS | TLS_GD))
14525 {
14526 bfd_put_64 (output_bfd, relocation,
e717da7e 14527 got->contents + off + 8);
7b609f53
AM
14528 relocation = 1;
14529 }
411e1bfb 14530 }
7b609f53 14531
411e1bfb 14532 bfd_put_64 (output_bfd, relocation,
e717da7e 14533 got->contents + off);
5bd4f169
AM
14534 }
14535 }
14536
65f38f15
AM
14537 if (off >= (bfd_vma) -2)
14538 abort ();
14539
bf102f86 14540 relocation = got->output_section->vma + got->output_offset + off;
6f20ed8a 14541 addend = -(TOCstart + htab->sec_info[input_section->id].toc_off);
5bd4f169 14542 }
65f38f15
AM
14543 break;
14544
14545 case R_PPC64_PLT16_HA:
14546 case R_PPC64_PLT16_HI:
14547 case R_PPC64_PLT16_LO:
14548 case R_PPC64_PLT32:
14549 case R_PPC64_PLT64:
14550 /* Relocation is to the entry for this symbol in the
14551 procedure linkage table. */
cbf95972
AM
14552 {
14553 struct plt_entry **plt_list = NULL;
14554 if (h != NULL)
14555 plt_list = &h->elf.plt.plist;
14556 else if (local_got_ents != NULL)
14557 {
14558 struct plt_entry **local_plt = (struct plt_entry **)
14559 (local_got_ents + symtab_hdr->sh_info);
14560 unsigned char *local_got_tls_masks = (unsigned char *)
14561 (local_plt + symtab_hdr->sh_info);
14562 if ((local_got_tls_masks[r_symndx] & PLT_IFUNC) != 0)
14563 plt_list = local_plt + r_symndx;
14564 }
14565 if (plt_list)
14566 {
14567 struct plt_entry *ent;
65f38f15 14568
cbf95972
AM
14569 for (ent = *plt_list; ent != NULL; ent = ent->next)
14570 if (ent->plt.offset != (bfd_vma) -1
14571 && ent->addend == orig_rel.r_addend)
14572 {
14573 asection *plt;
14574
14575 plt = htab->elf.splt;
14576 if (!htab->elf.dynamic_sections_created
14577 || h == NULL
14578 || h->elf.dynindx == -1)
14579 plt = htab->elf.iplt;
14580 relocation = (plt->output_section->vma
14581 + plt->output_offset
14582 + ent->plt.offset);
14583 addend = 0;
14584 unresolved_reloc = FALSE;
14585 break;
14586 }
14587 }
14588 }
65f38f15 14589 break;
5bd4f169 14590
0b13192e
AM
14591 case R_PPC64_TOC:
14592 /* Relocation value is TOC base. */
14593 relocation = TOCstart;
cf35638d 14594 if (r_symndx == STN_UNDEF)
6f20ed8a 14595 relocation += htab->sec_info[input_section->id].toc_off;
8517fae7
AM
14596 else if (unresolved_reloc)
14597 ;
6f20ed8a
AM
14598 else if (sec != NULL && sec->id < htab->sec_info_arr_size)
14599 relocation += htab->sec_info[sec->id].toc_off;
0b13192e
AM
14600 else
14601 unresolved_reloc = TRUE;
ab96bf03 14602 goto dodyn;
0b13192e 14603
5bd4f169
AM
14604 /* TOC16 relocs. We want the offset relative to the TOC base,
14605 which is the address of the start of the TOC plus 0x8000.
14606 The TOC consists of sections .got, .toc, .tocbss, and .plt,
14607 in this order. */
65f38f15
AM
14608 case R_PPC64_TOC16:
14609 case R_PPC64_TOC16_LO:
14610 case R_PPC64_TOC16_HI:
14611 case R_PPC64_TOC16_DS:
14612 case R_PPC64_TOC16_LO_DS:
14613 case R_PPC64_TOC16_HA:
6f20ed8a 14614 addend -= TOCstart + htab->sec_info[input_section->id].toc_off;
5bd4f169
AM
14615 break;
14616
14617 /* Relocate against the beginning of the section. */
65f38f15
AM
14618 case R_PPC64_SECTOFF:
14619 case R_PPC64_SECTOFF_LO:
14620 case R_PPC64_SECTOFF_HI:
14621 case R_PPC64_SECTOFF_DS:
14622 case R_PPC64_SECTOFF_LO_DS:
14623 case R_PPC64_SECTOFF_HA:
4ce794b7 14624 if (sec != NULL)
65f38f15 14625 addend -= sec->output_section->vma;
5bd4f169
AM
14626 break;
14627
25f23106
AM
14628 case R_PPC64_REL16:
14629 case R_PPC64_REL16_LO:
14630 case R_PPC64_REL16_HI:
14631 case R_PPC64_REL16_HA:
a680de9a 14632 case R_PPC64_REL16DX_HA:
25f23106
AM
14633 break;
14634
721956f4
AM
14635 case R_PPC64_REL14:
14636 case R_PPC64_REL14_BRNTAKEN:
14637 case R_PPC64_REL14_BRTAKEN:
5d1634d7
AM
14638 case R_PPC64_REL24:
14639 break;
14640
411e1bfb
AM
14641 case R_PPC64_TPREL16:
14642 case R_PPC64_TPREL16_LO:
14643 case R_PPC64_TPREL16_HI:
14644 case R_PPC64_TPREL16_HA:
14645 case R_PPC64_TPREL16_DS:
14646 case R_PPC64_TPREL16_LO_DS:
f9c6b907
AM
14647 case R_PPC64_TPREL16_HIGH:
14648 case R_PPC64_TPREL16_HIGHA:
411e1bfb
AM
14649 case R_PPC64_TPREL16_HIGHER:
14650 case R_PPC64_TPREL16_HIGHERA:
14651 case R_PPC64_TPREL16_HIGHEST:
14652 case R_PPC64_TPREL16_HIGHESTA:
766bc656
AM
14653 if (h != NULL
14654 && h->elf.root.type == bfd_link_hash_undefweak
14655 && h->elf.dynindx == -1)
14656 {
14657 /* Make this relocation against an undefined weak symbol
14658 resolve to zero. This is really just a tweak, since
14659 code using weak externs ought to check that they are
14660 defined before using them. */
14661 bfd_byte *p = contents + rel->r_offset - d_offset;
14662
14663 insn = bfd_get_32 (output_bfd, p);
14664 insn = _bfd_elf_ppc_at_tprel_transform (insn, 13);
14665 if (insn != 0)
14666 bfd_put_32 (output_bfd, insn, p);
14667 break;
14668 }
989f9879
AM
14669 if (htab->elf.tls_sec != NULL)
14670 addend -= htab->elf.tls_sec->vma + TP_OFFSET;
0e1862bb 14671 if (bfd_link_pic (info))
411e1bfb
AM
14672 /* The TPREL16 relocs shouldn't really be used in shared
14673 libs as they will result in DT_TEXTREL being set, but
14674 support them anyway. */
14675 goto dodyn;
14676 break;
14677
14678 case R_PPC64_DTPREL16:
14679 case R_PPC64_DTPREL16_LO:
14680 case R_PPC64_DTPREL16_HI:
14681 case R_PPC64_DTPREL16_HA:
14682 case R_PPC64_DTPREL16_DS:
14683 case R_PPC64_DTPREL16_LO_DS:
f9c6b907
AM
14684 case R_PPC64_DTPREL16_HIGH:
14685 case R_PPC64_DTPREL16_HIGHA:
411e1bfb
AM
14686 case R_PPC64_DTPREL16_HIGHER:
14687 case R_PPC64_DTPREL16_HIGHERA:
14688 case R_PPC64_DTPREL16_HIGHEST:
14689 case R_PPC64_DTPREL16_HIGHESTA:
989f9879
AM
14690 if (htab->elf.tls_sec != NULL)
14691 addend -= htab->elf.tls_sec->vma + DTP_OFFSET;
411e1bfb
AM
14692 break;
14693
45965137
AM
14694 case R_PPC64_ADDR64_LOCAL:
14695 addend += PPC64_LOCAL_ENTRY_OFFSET (h != NULL
14696 ? h->elf.other
14697 : sym->st_other);
14698 break;
14699
e515b051
AM
14700 case R_PPC64_DTPMOD64:
14701 relocation = 1;
14702 addend = 0;
14703 goto dodyn;
14704
411e1bfb 14705 case R_PPC64_TPREL64:
989f9879
AM
14706 if (htab->elf.tls_sec != NULL)
14707 addend -= htab->elf.tls_sec->vma + TP_OFFSET;
411e1bfb
AM
14708 goto dodyn;
14709
14710 case R_PPC64_DTPREL64:
989f9879
AM
14711 if (htab->elf.tls_sec != NULL)
14712 addend -= htab->elf.tls_sec->vma + DTP_OFFSET;
411e1bfb
AM
14713 /* Fall thru */
14714
65f38f15
AM
14715 /* Relocations that may need to be propagated if this is a
14716 dynamic object. */
04c9666a 14717 case R_PPC64_REL30:
65f38f15
AM
14718 case R_PPC64_REL32:
14719 case R_PPC64_REL64:
14720 case R_PPC64_ADDR14:
14721 case R_PPC64_ADDR14_BRNTAKEN:
14722 case R_PPC64_ADDR14_BRTAKEN:
14723 case R_PPC64_ADDR16:
14724 case R_PPC64_ADDR16_DS:
14725 case R_PPC64_ADDR16_HA:
14726 case R_PPC64_ADDR16_HI:
f9c6b907
AM
14727 case R_PPC64_ADDR16_HIGH:
14728 case R_PPC64_ADDR16_HIGHA:
65f38f15
AM
14729 case R_PPC64_ADDR16_HIGHER:
14730 case R_PPC64_ADDR16_HIGHERA:
14731 case R_PPC64_ADDR16_HIGHEST:
14732 case R_PPC64_ADDR16_HIGHESTA:
14733 case R_PPC64_ADDR16_LO:
14734 case R_PPC64_ADDR16_LO_DS:
14735 case R_PPC64_ADDR24:
65f38f15
AM
14736 case R_PPC64_ADDR32:
14737 case R_PPC64_ADDR64:
14738 case R_PPC64_UADDR16:
14739 case R_PPC64_UADDR32:
14740 case R_PPC64_UADDR64:
411e1bfb 14741 dodyn:
5d1634d7 14742 if ((input_section->flags & SEC_ALLOC) == 0)
ec338859
AM
14743 break;
14744
41bd81ab
AM
14745 if (NO_OPD_RELOCS && is_opd)
14746 break;
14747
d311bc8b
AM
14748 if (h != NULL
14749 ? h->dyn_relocs != NULL
14750 : (bfd_link_pic (info)
14751 ? must_be_dyn_reloc (info, r_type)
14752 : ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC))
65f38f15 14753 {
b34976b6 14754 bfd_boolean skip, relocate;
65f38f15 14755 asection *sreloc;
1cf1f670 14756 bfd_vma out_off;
65f38f15
AM
14757
14758 /* When generating a dynamic object, these relocations
14759 are copied into the output file to be resolved at run
14760 time. */
14761
b34976b6
AM
14762 skip = FALSE;
14763 relocate = FALSE;
65f38f15 14764
1cf1f670
AM
14765 out_off = _bfd_elf_section_offset (output_bfd, info,
14766 input_section, rel->r_offset);
14767 if (out_off == (bfd_vma) -1)
b34976b6 14768 skip = TRUE;
1cf1f670 14769 else if (out_off == (bfd_vma) -2)
b34976b6 14770 skip = TRUE, relocate = TRUE;
1cf1f670
AM
14771 out_off += (input_section->output_section->vma
14772 + input_section->output_offset);
14773 outrel.r_offset = out_off;
411e1bfb 14774 outrel.r_addend = rel->r_addend;
65f38f15 14775
1cf1f670
AM
14776 /* Optimize unaligned reloc use. */
14777 if ((r_type == R_PPC64_ADDR64 && (out_off & 7) != 0)
14778 || (r_type == R_PPC64_UADDR64 && (out_off & 7) == 0))
14779 r_type ^= R_PPC64_ADDR64 ^ R_PPC64_UADDR64;
14780 else if ((r_type == R_PPC64_ADDR32 && (out_off & 3) != 0)
14781 || (r_type == R_PPC64_UADDR32 && (out_off & 3) == 0))
14782 r_type ^= R_PPC64_ADDR32 ^ R_PPC64_UADDR32;
14783 else if ((r_type == R_PPC64_ADDR16 && (out_off & 1) != 0)
14784 || (r_type == R_PPC64_UADDR16 && (out_off & 1) == 0))
14785 r_type ^= R_PPC64_ADDR16 ^ R_PPC64_UADDR16;
14786
65f38f15 14787 if (skip)
0bb2d96a 14788 memset (&outrel, 0, sizeof outrel);
afe397ea 14789 else if (!SYMBOL_REFERENCES_LOCAL (info, &h->elf)
0b13192e
AM
14790 && !is_opd
14791 && r_type != R_PPC64_TOC)
14acf4dc
MR
14792 {
14793 BFD_ASSERT (h->elf.dynindx != -1);
14794 outrel.r_info = ELF64_R_INFO (h->elf.dynindx, r_type);
14795 }
65f38f15
AM
14796 else
14797 {
41bd81ab
AM
14798 /* This symbol is local, or marked to become local,
14799 or this is an opd section reloc which must point
14800 at a local function. */
65f38f15 14801 outrel.r_addend += relocation;
e86ce104 14802 if (r_type == R_PPC64_ADDR64 || r_type == R_PPC64_TOC)
65f38f15 14803 {
3fad3c7c 14804 if (is_opd && h != NULL)
afbe61cf
AM
14805 {
14806 /* Lie about opd entries. This case occurs
14807 when building shared libraries and we
14808 reference a function in another shared
3fad3c7c
AM
14809 lib. The same thing happens for a weak
14810 definition in an application that's
14811 overridden by a strong definition in a
14812 shared lib. (I believe this is a generic
14813 bug in binutils handling of weak syms.)
14814 In these cases we won't use the opd
1e2f5b6e 14815 entry in this lib. */
b34976b6 14816 unresolved_reloc = FALSE;
afbe61cf 14817 }
25f23106
AM
14818 if (!is_opd
14819 && r_type == R_PPC64_ADDR64
14820 && (h != NULL
14821 ? h->elf.type == STT_GNU_IFUNC
14822 : ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC))
14823 outrel.r_info = ELF64_R_INFO (0, R_PPC64_IRELATIVE);
14824 else
14825 {
14826 outrel.r_info = ELF64_R_INFO (0, R_PPC64_RELATIVE);
81407a69 14827
25f23106
AM
14828 /* We need to relocate .opd contents for ld.so.
14829 Prelink also wants simple and consistent rules
14830 for relocs. This make all RELATIVE relocs have
14831 *r_offset equal to r_addend. */
14832 relocate = TRUE;
14833 }
65f38f15
AM
14834 }
14835 else
14836 {
14837 long indx = 0;
14838
25f23106
AM
14839 if (h != NULL
14840 ? h->elf.type == STT_GNU_IFUNC
14841 : ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC)
14842 {
25f53a85 14843 info->callbacks->einfo
bc30df16
AM
14844 (_("%P: %H: %s for indirect "
14845 "function `%T' unsupported\n"),
25f53a85 14846 input_bfd, input_section, rel->r_offset,
25f23106
AM
14847 ppc64_elf_howto_table[r_type]->name,
14848 sym_name);
14849 ret = FALSE;
14850 }
cf35638d 14851 else if (r_symndx == STN_UNDEF || bfd_is_abs_section (sec))
65f38f15
AM
14852 ;
14853 else if (sec == NULL || sec->owner == NULL)
14854 {
14855 bfd_set_error (bfd_error_bad_value);
b34976b6 14856 return FALSE;
65f38f15
AM
14857 }
14858 else
14859 {
14860 asection *osec;
14861
14862 osec = sec->output_section;
14863 indx = elf_section_data (osec)->dynindx;
14864
74541ad4
AM
14865 if (indx == 0)
14866 {
14867 if ((osec->flags & SEC_READONLY) == 0
14868 && htab->elf.data_index_section != NULL)
14869 osec = htab->elf.data_index_section;
14870 else
14871 osec = htab->elf.text_index_section;
14872 indx = elf_section_data (osec)->dynindx;
14873 }
14874 BFD_ASSERT (indx != 0);
14875
65f38f15
AM
14876 /* We are turning this relocation into one
14877 against a section symbol, so subtract out
14878 the output section's address but not the
14879 offset of the input section in the output
14880 section. */
14881 outrel.r_addend -= osec->vma;
14882 }
14883
14884 outrel.r_info = ELF64_R_INFO (indx, r_type);
14885 }
14886 }
14887
14888 sreloc = elf_section_data (input_section)->sreloc;
19e08130
AM
14889 if (h != NULL
14890 ? h->elf.type == STT_GNU_IFUNC
14891 : ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC)
33e44f2e 14892 sreloc = htab->elf.irelplt;
65f38f15
AM
14893 if (sreloc == NULL)
14894 abort ();
14895
dfbb6ac9
AM
14896 if (sreloc->reloc_count * sizeof (Elf64_External_Rela)
14897 >= sreloc->size)
14898 abort ();
947216bf
AM
14899 loc = sreloc->contents;
14900 loc += sreloc->reloc_count++ * sizeof (Elf64_External_Rela);
65f38f15
AM
14901 bfd_elf64_swap_reloca_out (output_bfd, &outrel, loc);
14902
14903 /* If this reloc is against an external symbol, it will
14904 be computed at runtime, so there's no need to do
81407a69
AM
14905 anything now. However, for the sake of prelink ensure
14906 that the section contents are a known value. */
65f38f15 14907 if (! relocate)
81407a69
AM
14908 {
14909 unresolved_reloc = FALSE;
14910 /* The value chosen here is quite arbitrary as ld.so
14911 ignores section contents except for the special
14912 case of .opd where the contents might be accessed
14913 before relocation. Choose zero, as that won't
14914 cause reloc overflow. */
14915 relocation = 0;
14916 addend = 0;
14917 /* Use *r_offset == r_addend for R_PPC64_ADDR64 relocs
14918 to improve backward compatibility with older
14919 versions of ld. */
14920 if (r_type == R_PPC64_ADDR64)
14921 addend = outrel.r_addend;
14922 /* Adjust pc_relative relocs to have zero in *r_offset. */
4ce794b7 14923 else if (ppc64_elf_howto_table[r_type]->pc_relative)
000732f7
AM
14924 addend = (input_section->output_section->vma
14925 + input_section->output_offset
14926 + rel->r_offset);
81407a69 14927 }
65f38f15 14928 }
5bd4f169
AM
14929 break;
14930
65f38f15
AM
14931 case R_PPC64_COPY:
14932 case R_PPC64_GLOB_DAT:
14933 case R_PPC64_JMP_SLOT:
25f23106 14934 case R_PPC64_JMP_IREL:
65f38f15
AM
14935 case R_PPC64_RELATIVE:
14936 /* We shouldn't ever see these dynamic relocs in relocatable
14937 files. */
ae9a127f 14938 /* Fall through. */
65f38f15
AM
14939
14940 case R_PPC64_PLTGOT16:
14941 case R_PPC64_PLTGOT16_DS:
14942 case R_PPC64_PLTGOT16_HA:
14943 case R_PPC64_PLTGOT16_HI:
14944 case R_PPC64_PLTGOT16_LO:
14945 case R_PPC64_PLTGOT16_LO_DS:
14946 case R_PPC64_PLTREL32:
14947 case R_PPC64_PLTREL64:
14948 /* These ones haven't been implemented yet. */
14949
25f53a85 14950 info->callbacks->einfo
bc30df16 14951 (_("%P: %B: %s is not supported for `%T'\n"),
d003868e 14952 input_bfd,
4ce794b7 14953 ppc64_elf_howto_table[r_type]->name, sym_name);
5bd4f169
AM
14954
14955 bfd_set_error (bfd_error_invalid_operation);
b34976b6 14956 ret = FALSE;
c316a17c 14957 goto copy_reloc;
65f38f15 14958 }
5bd4f169 14959
67f0cbdb
AM
14960 /* Multi-instruction sequences that access the TOC can be
14961 optimized, eg. addis ra,r2,0; addi rb,ra,x;
14962 to nop; addi rb,r2,x; */
14963 switch (r_type)
14964 {
14965 default:
14966 break;
14967
14968 case R_PPC64_GOT_TLSLD16_HI:
14969 case R_PPC64_GOT_TLSGD16_HI:
14970 case R_PPC64_GOT_TPREL16_HI:
14971 case R_PPC64_GOT_DTPREL16_HI:
14972 case R_PPC64_GOT16_HI:
14973 case R_PPC64_TOC16_HI:
14974 /* These relocs would only be useful if building up an
14975 offset to later add to r2, perhaps in an indexed
14976 addressing mode instruction. Don't try to optimize.
14977 Unfortunately, the possibility of someone building up an
14978 offset like this or even with the HA relocs, means that
14979 we need to check the high insn when optimizing the low
14980 insn. */
14981 break;
14982
14983 case R_PPC64_GOT_TLSLD16_HA:
14984 case R_PPC64_GOT_TLSGD16_HA:
14985 case R_PPC64_GOT_TPREL16_HA:
14986 case R_PPC64_GOT_DTPREL16_HA:
14987 case R_PPC64_GOT16_HA:
14988 case R_PPC64_TOC16_HA:
98528052 14989 if (htab->do_toc_opt && relocation + addend + 0x8000 < 0x10000
560c8763 14990 && !ppc64_elf_tdata (input_bfd)->unexpected_toc_insn)
98528052
AM
14991 {
14992 bfd_byte *p = contents + (rel->r_offset & ~3);
14993 bfd_put_32 (input_bfd, NOP, p);
14994 }
67f0cbdb
AM
14995 break;
14996
14997 case R_PPC64_GOT_TLSLD16_LO:
14998 case R_PPC64_GOT_TLSGD16_LO:
14999 case R_PPC64_GOT_TPREL16_LO_DS:
15000 case R_PPC64_GOT_DTPREL16_LO_DS:
15001 case R_PPC64_GOT16_LO:
15002 case R_PPC64_GOT16_LO_DS:
15003 case R_PPC64_TOC16_LO:
15004 case R_PPC64_TOC16_LO_DS:
98528052 15005 if (htab->do_toc_opt && relocation + addend + 0x8000 < 0x10000
560c8763 15006 && !ppc64_elf_tdata (input_bfd)->unexpected_toc_insn)
67f0cbdb
AM
15007 {
15008 bfd_byte *p = contents + (rel->r_offset & ~3);
15009 insn = bfd_get_32 (input_bfd, p);
560c8763
AM
15010 if ((insn & (0x3f << 26)) == 12u << 26 /* addic */)
15011 {
15012 /* Transform addic to addi when we change reg. */
15013 insn &= ~((0x3f << 26) | (0x1f << 16));
15014 insn |= (14u << 26) | (2 << 16);
15015 }
15016 else
67f0cbdb 15017 {
98528052
AM
15018 insn &= ~(0x1f << 16);
15019 insn |= 2 << 16;
67f0cbdb 15020 }
560c8763 15021 bfd_put_32 (input_bfd, insn, p);
67f0cbdb
AM
15022 }
15023 break;
15024 }
15025
65f38f15 15026 /* Do any further special processing. */
b80eed39 15027 howto = ppc64_elf_howto_table[(int) r_type];
65f38f15
AM
15028 switch (r_type)
15029 {
15030 default:
15031 break;
15032
25f23106 15033 case R_PPC64_REL16_HA:
a680de9a 15034 case R_PPC64_REL16DX_HA:
f9c6b907
AM
15035 case R_PPC64_ADDR16_HA:
15036 case R_PPC64_ADDR16_HIGHA:
65f38f15
AM
15037 case R_PPC64_ADDR16_HIGHERA:
15038 case R_PPC64_ADDR16_HIGHESTA:
65f38f15
AM
15039 case R_PPC64_TOC16_HA:
15040 case R_PPC64_SECTOFF_HA:
411e1bfb 15041 case R_PPC64_TPREL16_HA:
f9c6b907 15042 case R_PPC64_TPREL16_HIGHA:
411e1bfb 15043 case R_PPC64_TPREL16_HIGHERA:
411e1bfb 15044 case R_PPC64_TPREL16_HIGHESTA:
f9c6b907
AM
15045 case R_PPC64_DTPREL16_HA:
15046 case R_PPC64_DTPREL16_HIGHA:
411e1bfb 15047 case R_PPC64_DTPREL16_HIGHERA:
411e1bfb 15048 case R_PPC64_DTPREL16_HIGHESTA:
65f38f15
AM
15049 /* It's just possible that this symbol is a weak symbol
15050 that's not actually defined anywhere. In that case,
15051 'sec' would be NULL, and we should leave the symbol
15052 alone (it will be set to zero elsewhere in the link). */
5c5f6e17
AM
15053 if (sec == NULL)
15054 break;
15055 /* Fall thru */
15056
15057 case R_PPC64_GOT16_HA:
15058 case R_PPC64_PLTGOT16_HA:
15059 case R_PPC64_PLT16_HA:
15060 case R_PPC64_GOT_TLSGD16_HA:
15061 case R_PPC64_GOT_TLSLD16_HA:
15062 case R_PPC64_GOT_TPREL16_HA:
15063 case R_PPC64_GOT_DTPREL16_HA:
15064 /* Add 0x10000 if sign bit in 0:15 is set.
15065 Bits 0:15 are not used. */
15066 addend += 0x8000;
65f38f15
AM
15067 break;
15068
15069 case R_PPC64_ADDR16_DS:
15070 case R_PPC64_ADDR16_LO_DS:
15071 case R_PPC64_GOT16_DS:
15072 case R_PPC64_GOT16_LO_DS:
15073 case R_PPC64_PLT16_LO_DS:
15074 case R_PPC64_SECTOFF_DS:
15075 case R_PPC64_SECTOFF_LO_DS:
15076 case R_PPC64_TOC16_DS:
15077 case R_PPC64_TOC16_LO_DS:
15078 case R_PPC64_PLTGOT16_DS:
15079 case R_PPC64_PLTGOT16_LO_DS:
411e1bfb
AM
15080 case R_PPC64_GOT_TPREL16_DS:
15081 case R_PPC64_GOT_TPREL16_LO_DS:
15082 case R_PPC64_GOT_DTPREL16_DS:
15083 case R_PPC64_GOT_DTPREL16_LO_DS:
15084 case R_PPC64_TPREL16_DS:
15085 case R_PPC64_TPREL16_LO_DS:
15086 case R_PPC64_DTPREL16_DS:
15087 case R_PPC64_DTPREL16_LO_DS:
adadcc0c
AM
15088 insn = bfd_get_32 (input_bfd, contents + (rel->r_offset & ~3));
15089 mask = 3;
a680de9a
PB
15090 /* If this reloc is against an lq, lxv, or stxv insn, then
15091 the value must be a multiple of 16. This is somewhat of
15092 a hack, but the "correct" way to do this by defining _DQ
15093 forms of all the _DS relocs bloats all reloc switches in
15094 this file. It doesn't make much sense to use these
15095 relocs in data, so testing the insn should be safe. */
15096 if ((insn & (0x3f << 26)) == (56u << 26)
15097 || ((insn & (0x3f << 26)) == (61u << 26) && (insn & 3) == 1))
adadcc0c 15098 mask = 15;
a680de9a
PB
15099 relocation += addend;
15100 addend = insn & (mask ^ 3);
15101 if ((relocation & mask) != 0)
65f38f15 15102 {
a680de9a 15103 relocation ^= relocation & mask;
25f53a85 15104 info->callbacks->einfo
8de848d8 15105 (_("%P: %H: error: %s not a multiple of %u\n"),
25f53a85 15106 input_bfd, input_section, rel->r_offset,
b80eed39 15107 howto->name,
adadcc0c 15108 mask + 1);
65f38f15 15109 bfd_set_error (bfd_error_bad_value);
b34976b6 15110 ret = FALSE;
c316a17c 15111 goto copy_reloc;
65f38f15
AM
15112 }
15113 break;
5bd4f169
AM
15114 }
15115
239e1f3a
AM
15116 /* Dynamic relocs are not propagated for SEC_DEBUGGING sections
15117 because such sections are not SEC_ALLOC and thus ld.so will
15118 not process them. */
65f38f15 15119 if (unresolved_reloc
239e1f3a 15120 && !((input_section->flags & SEC_DEBUGGING) != 0
1d5316ab
AM
15121 && h->elf.def_dynamic)
15122 && _bfd_elf_section_offset (output_bfd, info, input_section,
15123 rel->r_offset) != (bfd_vma) -1)
9c07fe7c 15124 {
25f53a85 15125 info->callbacks->einfo
bc30df16 15126 (_("%P: %H: unresolvable %s against `%T'\n"),
25f53a85 15127 input_bfd, input_section, rel->r_offset,
b80eed39 15128 howto->name,
039b3fef 15129 h->elf.root.root.string);
b34976b6 15130 ret = FALSE;
9c07fe7c 15131 }
5bd4f169 15132
b80eed39
AM
15133 /* 16-bit fields in insns mostly have signed values, but a
15134 few insns have 16-bit unsigned values. Really, we should
15135 have different reloc types. */
15136 if (howto->complain_on_overflow != complain_overflow_dont
15137 && howto->dst_mask == 0xffff
15138 && (input_section->flags & SEC_CODE) != 0)
15139 {
15140 enum complain_overflow complain = complain_overflow_signed;
15141
15142 insn = bfd_get_32 (input_bfd, contents + (rel->r_offset & ~3));
a47622ac
AM
15143 if ((insn & (0x3f << 26)) == 10u << 26 /* cmpli */)
15144 complain = complain_overflow_bitfield;
15145 else if (howto->rightshift == 0
15146 ? ((insn & (0x3f << 26)) == 28u << 26 /* andi */
15147 || (insn & (0x3f << 26)) == 24u << 26 /* ori */
15148 || (insn & (0x3f << 26)) == 26u << 26 /* xori */)
15149 : ((insn & (0x3f << 26)) == 29u << 26 /* andis */
15150 || (insn & (0x3f << 26)) == 25u << 26 /* oris */
15151 || (insn & (0x3f << 26)) == 27u << 26 /* xoris */))
b80eed39
AM
15152 complain = complain_overflow_unsigned;
15153 if (howto->complain_on_overflow != complain)
15154 {
15155 alt_howto = *howto;
15156 alt_howto.complain_on_overflow = complain;
15157 howto = &alt_howto;
15158 }
15159 }
15160
a680de9a
PB
15161 if (r_type == R_PPC64_REL16DX_HA)
15162 {
15163 /* Split field reloc isn't handled by _bfd_final_link_relocate. */
15164 if (rel->r_offset + 4 > input_section->size)
15165 r = bfd_reloc_outofrange;
15166 else
15167 {
15168 relocation += addend;
15169 relocation -= (rel->r_offset
15170 + input_section->output_offset
15171 + input_section->output_section->vma);
15172 relocation = (bfd_signed_vma) relocation >> 16;
15173 insn = bfd_get_32 (input_bfd, contents + rel->r_offset);
15174 insn &= ~0x1fffc1;
15175 insn |= (relocation & 0xffc1) | ((relocation & 0x3e) << 15);
15176 bfd_put_32 (input_bfd, insn, contents + rel->r_offset);
15177 r = bfd_reloc_ok;
15178 if (relocation + 0x8000 > 0xffff)
15179 r = bfd_reloc_overflow;
15180 }
15181 }
15182 else
15183 r = _bfd_final_link_relocate (howto, input_bfd, input_section, contents,
15184 rel->r_offset, relocation, addend);
5bd4f169 15185
ef60b7ff 15186 if (r != bfd_reloc_ok)
5bd4f169 15187 {
bc30df16 15188 char *more_info = NULL;
b80eed39 15189 const char *reloc_name = howto->name;
bc30df16
AM
15190
15191 if (reloc_dest != DEST_NORMAL)
15192 {
15193 more_info = bfd_malloc (strlen (reloc_name) + 8);
15194 if (more_info != NULL)
15195 {
15196 strcpy (more_info, reloc_name);
15197 strcat (more_info, (reloc_dest == DEST_OPD
15198 ? " (OPD)" : " (stub)"));
15199 reloc_name = more_info;
15200 }
15201 }
15202
cd27b276 15203 if (r == bfd_reloc_overflow)
5bd4f169 15204 {
8131c122
AM
15205 /* On code like "if (foo) foo();" don't report overflow
15206 on a branch to zero when foo is undefined. */
15207 if (!warned
15208 && (reloc_dest == DEST_STUB
15209 || !(h != NULL
15210 && (h->elf.root.type == bfd_link_hash_undefweak
15211 || h->elf.root.type == bfd_link_hash_undefined)
15212 && is_branch_reloc (r_type))))
1a72702b
AM
15213 info->callbacks->reloc_overflow (info, &h->elf.root,
15214 sym_name, reloc_name,
15215 orig_rel.r_addend,
15216 input_bfd, input_section,
15217 rel->r_offset);
ef60b7ff
AM
15218 }
15219 else
15220 {
25f53a85 15221 info->callbacks->einfo
bc30df16 15222 (_("%P: %H: %s against `%T': error %d\n"),
25f53a85 15223 input_bfd, input_section, rel->r_offset,
bc30df16 15224 reloc_name, sym_name, (int) r);
b34976b6 15225 ret = FALSE;
ef60b7ff 15226 }
bc30df16
AM
15227 if (more_info != NULL)
15228 free (more_info);
5bd4f169 15229 }
c316a17c
AM
15230 copy_reloc:
15231 if (wrel != rel)
15232 *wrel = *rel;
15233 }
15234
15235 if (wrel != rel)
15236 {
15237 Elf_Internal_Shdr *rel_hdr;
15238 size_t deleted = rel - wrel;
15239
15240 rel_hdr = _bfd_elf_single_rel_hdr (input_section->output_section);
15241 rel_hdr->sh_size -= rel_hdr->sh_entsize * deleted;
15242 if (rel_hdr->sh_size == 0)
15243 {
15244 /* It is too late to remove an empty reloc section. Leave
15245 one NONE reloc.
15246 ??? What is wrong with an empty section??? */
15247 rel_hdr->sh_size = rel_hdr->sh_entsize;
15248 deleted -= 1;
15249 }
15250 rel_hdr = _bfd_elf_single_rel_hdr (input_section);
15251 rel_hdr->sh_size -= rel_hdr->sh_entsize * deleted;
15252 input_section->reloc_count -= deleted;
5bd4f169
AM
15253 }
15254
645ea6a9
AM
15255 /* If we're emitting relocations, then shortly after this function
15256 returns, reloc offsets and addends for this section will be
15257 adjusted. Worse, reloc symbol indices will be for the output
8860955f
AM
15258 file rather than the input. Save a copy of the relocs for
15259 opd_entry_value. */
0e1862bb 15260 if (is_opd && (info->emitrelocations || bfd_link_relocatable (info)))
8860955f
AM
15261 {
15262 bfd_size_type amt;
15263 amt = input_section->reloc_count * sizeof (Elf_Internal_Rela);
15264 rel = bfd_alloc (input_bfd, amt);
729eabd5
AM
15265 BFD_ASSERT (ppc64_elf_tdata (input_bfd)->opd.relocs == NULL);
15266 ppc64_elf_tdata (input_bfd)->opd.relocs = rel;
8860955f
AM
15267 if (rel == NULL)
15268 return FALSE;
15269 memcpy (rel, relocs, amt);
15270 }
5bd4f169
AM
15271 return ret;
15272}
15273
754021d0
AM
15274/* Adjust the value of any local symbols in opd sections. */
15275
6e0b88f1 15276static int
754021d0
AM
15277ppc64_elf_output_symbol_hook (struct bfd_link_info *info,
15278 const char *name ATTRIBUTE_UNUSED,
15279 Elf_Internal_Sym *elfsym,
15280 asection *input_sec,
15281 struct elf_link_hash_entry *h)
15282{
74f0fb50
AM
15283 struct _opd_sec_data *opd;
15284 long adjust;
754021d0
AM
15285 bfd_vma value;
15286
4025353c 15287 if (h != NULL)
6e0b88f1 15288 return 1;
4025353c 15289
74f0fb50
AM
15290 opd = get_opd_info (input_sec);
15291 if (opd == NULL || opd->adjust == NULL)
6e0b88f1 15292 return 1;
754021d0
AM
15293
15294 value = elfsym->st_value - input_sec->output_offset;
0e1862bb 15295 if (!bfd_link_relocatable (info))
754021d0
AM
15296 value -= input_sec->output_section->vma;
15297
51aecdc5 15298 adjust = opd->adjust[OPD_NDX (value)];
4025353c 15299 if (adjust == -1)
6e0b88f1
AM
15300 return 2;
15301
15302 elfsym->st_value += adjust;
15303 return 1;
754021d0
AM
15304}
15305
5bd4f169
AM
15306/* Finish up dynamic symbol handling. We set the contents of various
15307 dynamic sections here. */
15308
b34976b6 15309static bfd_boolean
4ce794b7
AM
15310ppc64_elf_finish_dynamic_symbol (bfd *output_bfd,
15311 struct bfd_link_info *info,
15312 struct elf_link_hash_entry *h,
ab6dce23 15313 Elf_Internal_Sym *sym ATTRIBUTE_UNUSED)
5bd4f169 15314{
65f38f15 15315 struct ppc_link_hash_table *htab;
8387904d
AM
15316 struct plt_entry *ent;
15317 Elf_Internal_Rela rela;
15318 bfd_byte *loc;
5bd4f169 15319
65f38f15 15320 htab = ppc_hash_table (info);
4dfe6ac6
NC
15321 if (htab == NULL)
15322 return FALSE;
5bd4f169 15323
8387904d
AM
15324 for (ent = h->plt.plist; ent != NULL; ent = ent->next)
15325 if (ent->plt.offset != (bfd_vma) -1)
15326 {
15327 /* This symbol has an entry in the procedure linkage
15328 table. Set it up. */
e054468f
AM
15329 if (!htab->elf.dynamic_sections_created
15330 || h->dynindx == -1)
15331 {
15332 BFD_ASSERT (h->type == STT_GNU_IFUNC
15333 && h->def_regular
15334 && (h->root.type == bfd_link_hash_defined
15335 || h->root.type == bfd_link_hash_defweak));
33e44f2e
AM
15336 rela.r_offset = (htab->elf.iplt->output_section->vma
15337 + htab->elf.iplt->output_offset
25f23106 15338 + ent->plt.offset);
ee67d69a
AM
15339 if (htab->opd_abi)
15340 rela.r_info = ELF64_R_INFO (0, R_PPC64_JMP_IREL);
15341 else
15342 rela.r_info = ELF64_R_INFO (0, R_PPC64_IRELATIVE);
e054468f
AM
15343 rela.r_addend = (h->root.u.def.value
15344 + h->root.u.def.section->output_offset
15345 + h->root.u.def.section->output_section->vma
15346 + ent->addend);
33e44f2e
AM
15347 loc = (htab->elf.irelplt->contents
15348 + (htab->elf.irelplt->reloc_count++
25f23106 15349 * sizeof (Elf64_External_Rela)));
e054468f
AM
15350 }
15351 else
15352 {
33e44f2e
AM
15353 rela.r_offset = (htab->elf.splt->output_section->vma
15354 + htab->elf.splt->output_offset
25f23106 15355 + ent->plt.offset);
e054468f
AM
15356 rela.r_info = ELF64_R_INFO (h->dynindx, R_PPC64_JMP_SLOT);
15357 rela.r_addend = ent->addend;
33e44f2e 15358 loc = (htab->elf.srelplt->contents
b9e5796b
AM
15359 + ((ent->plt.offset - PLT_INITIAL_ENTRY_SIZE (htab))
15360 / PLT_ENTRY_SIZE (htab) * sizeof (Elf64_External_Rela)));
e054468f 15361 }
8387904d 15362 bfd_elf64_swap_reloca_out (output_bfd, &rela, loc);
a345bc8d
AM
15363
15364 if (!htab->opd_abi)
15365 {
15366 if (!h->def_regular)
15367 {
15368 /* Mark the symbol as undefined, rather than as
15369 defined in glink. Leave the value if there were
15370 any relocations where pointer equality matters
15371 (this is a clue for the dynamic linker, to make
15372 function pointer comparisons work between an
15373 application and shared library), otherwise set it
15374 to zero. */
15375 sym->st_shndx = SHN_UNDEF;
15376 if (!h->pointer_equality_needed)
15377 sym->st_value = 0;
15378 else if (!h->ref_regular_nonweak)
15379 {
15380 /* This breaks function pointer comparisons, but
15381 that is better than breaking tests for a NULL
15382 function pointer. */
15383 sym->st_value = 0;
15384 }
15385 }
15386 }
8387904d 15387 }
5bd4f169 15388
f5385ebf 15389 if (h->needs_copy)
5bd4f169 15390 {
65f38f15 15391 /* This symbol needs a copy reloc. Set it up. */
5bd4f169 15392
65f38f15
AM
15393 if (h->dynindx == -1
15394 || (h->root.type != bfd_link_hash_defined
15395 && h->root.type != bfd_link_hash_defweak)
4ce794b7 15396 || htab->relbss == NULL)
65f38f15 15397 abort ();
5bd4f169
AM
15398
15399 rela.r_offset = (h->root.u.def.value
15400 + h->root.u.def.section->output_section->vma
15401 + h->root.u.def.section->output_offset);
15402 rela.r_info = ELF64_R_INFO (h->dynindx, R_PPC64_COPY);
15403 rela.r_addend = 0;
4ce794b7
AM
15404 loc = htab->relbss->contents;
15405 loc += htab->relbss->reloc_count++ * sizeof (Elf64_External_Rela);
65f38f15 15406 bfd_elf64_swap_reloca_out (output_bfd, &rela, loc);
5bd4f169
AM
15407 }
15408
b34976b6 15409 return TRUE;
5bd4f169
AM
15410}
15411
65f38f15
AM
15412/* Used to decide how to sort relocs in an optimal manner for the
15413 dynamic linker, before writing them out. */
15414
15415static enum elf_reloc_type_class
7e612e98
AM
15416ppc64_elf_reloc_type_class (const struct bfd_link_info *info,
15417 const asection *rel_sec,
15418 const Elf_Internal_Rela *rela)
65f38f15 15419{
04c9666a 15420 enum elf_ppc64_reloc_type r_type;
7e612e98
AM
15421 struct ppc_link_hash_table *htab = ppc_hash_table (info);
15422
33e44f2e 15423 if (rel_sec == htab->elf.irelplt)
7e612e98 15424 return reloc_class_ifunc;
a33d1f77 15425
4ce794b7 15426 r_type = ELF64_R_TYPE (rela->r_info);
a33d1f77 15427 switch (r_type)
65f38f15
AM
15428 {
15429 case R_PPC64_RELATIVE:
15430 return reloc_class_relative;
15431 case R_PPC64_JMP_SLOT:
15432 return reloc_class_plt;
15433 case R_PPC64_COPY:
15434 return reloc_class_copy;
15435 default:
15436 return reloc_class_normal;
15437 }
15438}
15439
5bd4f169
AM
15440/* Finish up the dynamic sections. */
15441
b34976b6 15442static bfd_boolean
4ce794b7
AM
15443ppc64_elf_finish_dynamic_sections (bfd *output_bfd,
15444 struct bfd_link_info *info)
5bd4f169 15445{
65f38f15
AM
15446 struct ppc_link_hash_table *htab;
15447 bfd *dynobj;
5bd4f169 15448 asection *sdyn;
5bd4f169 15449
65f38f15 15450 htab = ppc_hash_table (info);
4dfe6ac6
NC
15451 if (htab == NULL)
15452 return FALSE;
15453
65f38f15 15454 dynobj = htab->elf.dynobj;
3d4d4302 15455 sdyn = bfd_get_linker_section (dynobj, ".dynamic");
5bd4f169 15456
65f38f15 15457 if (htab->elf.dynamic_sections_created)
5bd4f169 15458 {
5bd4f169
AM
15459 Elf64_External_Dyn *dyncon, *dynconend;
15460
33e44f2e 15461 if (sdyn == NULL || htab->elf.sgot == NULL)
65f38f15 15462 abort ();
5bd4f169
AM
15463
15464 dyncon = (Elf64_External_Dyn *) sdyn->contents;
eea6121a 15465 dynconend = (Elf64_External_Dyn *) (sdyn->contents + sdyn->size);
5bd4f169
AM
15466 for (; dyncon < dynconend; dyncon++)
15467 {
15468 Elf_Internal_Dyn dyn;
19397422 15469 asection *s;
5bd4f169
AM
15470
15471 bfd_elf64_swap_dyn_in (dynobj, dyncon, &dyn);
15472
15473 switch (dyn.d_tag)
15474 {
65f38f15
AM
15475 default:
15476 continue;
5bd4f169 15477
5d1634d7 15478 case DT_PPC64_GLINK:
4ce794b7 15479 s = htab->glink;
6348e046 15480 dyn.d_un.d_ptr = s->output_section->vma + s->output_offset;
ad8e1ba5
AM
15481 /* We stupidly defined DT_PPC64_GLINK to be the start
15482 of glink rather than the first entry point, which is
15483 what ld.so needs, and now have a bigger stub to
15484 support automatic multiple TOCs. */
b9e5796b 15485 dyn.d_un.d_ptr += GLINK_CALL_STUB_SIZE - 8 * 4;
5d1634d7
AM
15486 break;
15487
19397422
AM
15488 case DT_PPC64_OPD:
15489 s = bfd_get_section_by_name (output_bfd, ".opd");
6348e046
AM
15490 if (s == NULL)
15491 continue;
15492 dyn.d_un.d_ptr = s->vma;
19397422
AM
15493 break;
15494
e8910a83
AM
15495 case DT_PPC64_OPT:
15496 if (htab->do_multi_toc && htab->multi_toc_needed)
15497 dyn.d_un.d_val |= PPC64_OPT_MULTI_TOC;
15498 break;
15499
19397422
AM
15500 case DT_PPC64_OPDSZ:
15501 s = bfd_get_section_by_name (output_bfd, ".opd");
6348e046
AM
15502 if (s == NULL)
15503 continue;
eea6121a 15504 dyn.d_un.d_val = s->size;
19397422
AM
15505 break;
15506
65f38f15 15507 case DT_PLTGOT:
33e44f2e 15508 s = htab->elf.splt;
6348e046 15509 dyn.d_un.d_ptr = s->output_section->vma + s->output_offset;
65f38f15
AM
15510 break;
15511
15512 case DT_JMPREL:
33e44f2e 15513 s = htab->elf.srelplt;
6348e046 15514 dyn.d_un.d_ptr = s->output_section->vma + s->output_offset;
65f38f15 15515 break;
5bd4f169 15516
65f38f15 15517 case DT_PLTRELSZ:
33e44f2e 15518 dyn.d_un.d_val = htab->elf.srelplt->size;
5d1634d7
AM
15519 break;
15520
15521 case DT_RELASZ:
15522 /* Don't count procedure linkage table relocs in the
15523 overall reloc count. */
33e44f2e 15524 s = htab->elf.srelplt;
6348e046
AM
15525 if (s == NULL)
15526 continue;
eea6121a 15527 dyn.d_un.d_val -= s->size;
6348e046
AM
15528 break;
15529
15530 case DT_RELA:
15531 /* We may not be using the standard ELF linker script.
15532 If .rela.plt is the first .rela section, we adjust
15533 DT_RELA to not include it. */
33e44f2e 15534 s = htab->elf.srelplt;
6348e046
AM
15535 if (s == NULL)
15536 continue;
15537 if (dyn.d_un.d_ptr != s->output_section->vma + s->output_offset)
15538 continue;
eea6121a 15539 dyn.d_un.d_ptr += s->size;
65f38f15 15540 break;
5bd4f169 15541 }
5bd4f169 15542
65f38f15 15543 bfd_elf64_swap_dyn_out (output_bfd, &dyn, dyncon);
5bd4f169 15544 }
5bd4f169
AM
15545 }
15546
33e44f2e 15547 if (htab->elf.sgot != NULL && htab->elf.sgot->size != 0)
5d1634d7
AM
15548 {
15549 /* Fill in the first entry in the global offset table.
15550 We use it to hold the link-time TOCbase. */
15551 bfd_put_64 (output_bfd,
60ee0d4a 15552 elf_gp (output_bfd) + TOC_BASE_OFF,
33e44f2e 15553 htab->elf.sgot->contents);
5d1634d7
AM
15554
15555 /* Set .got entry size. */
33e44f2e 15556 elf_section_data (htab->elf.sgot->output_section)->this_hdr.sh_entsize = 8;
5d1634d7
AM
15557 }
15558
33e44f2e 15559 if (htab->elf.splt != NULL && htab->elf.splt->size != 0)
5d1634d7
AM
15560 {
15561 /* Set .plt entry size. */
33e44f2e 15562 elf_section_data (htab->elf.splt->output_section)->this_hdr.sh_entsize
b9e5796b 15563 = PLT_ENTRY_SIZE (htab);
5d1634d7
AM
15564 }
15565
84f5d08e
AM
15566 /* brlt is SEC_LINKER_CREATED, so we need to write out relocs for
15567 brlt ourselves if emitrelocations. */
15568 if (htab->brlt != NULL
15569 && htab->brlt->reloc_count != 0
15570 && !_bfd_elf_link_output_relocs (output_bfd,
15571 htab->brlt,
d4730f92 15572 elf_section_data (htab->brlt)->rela.hdr,
84f5d08e
AM
15573 elf_section_data (htab->brlt)->relocs,
15574 NULL))
15575 return FALSE;
15576
176a0d42
AM
15577 if (htab->glink != NULL
15578 && htab->glink->reloc_count != 0
15579 && !_bfd_elf_link_output_relocs (output_bfd,
15580 htab->glink,
d4730f92 15581 elf_section_data (htab->glink)->rela.hdr,
176a0d42
AM
15582 elf_section_data (htab->glink)->relocs,
15583 NULL))
15584 return FALSE;
15585
58d180e8 15586 if (htab->glink_eh_frame != NULL
da44f4e5
AM
15587 && htab->glink_eh_frame->size != 0)
15588 {
15589 bfd_vma val;
15590 bfd_byte *p;
15591 asection *stub_sec;
15592
15593 p = htab->glink_eh_frame->contents + sizeof (glink_eh_frame_cie);
15594 for (stub_sec = htab->params->stub_bfd->sections;
15595 stub_sec != NULL;
15596 stub_sec = stub_sec->next)
15597 if ((stub_sec->flags & SEC_LINKER_CREATED) == 0)
15598 {
15599 /* FDE length. */
15600 p += 4;
15601 /* CIE pointer. */
15602 p += 4;
15603 /* Offset to stub section. */
15604 val = (stub_sec->output_section->vma
15605 + stub_sec->output_offset);
15606 val -= (htab->glink_eh_frame->output_section->vma
15607 + htab->glink_eh_frame->output_offset
15608 + (p - htab->glink_eh_frame->contents));
15609 if (val + 0x80000000 > 0xffffffff)
15610 {
15611 info->callbacks->einfo
15612 (_("%P: %s offset too large for .eh_frame sdata4 encoding"),
15613 stub_sec->name);
15614 return FALSE;
15615 }
15616 bfd_put_32 (dynobj, val, p);
15617 p += 4;
15618 /* stub section size. */
15619 p += 4;
15620 /* Augmentation. */
15621 p += 1;
15622 /* Pad. */
15623 p += 7;
15624 }
15625 if (htab->glink != NULL && htab->glink->size != 0)
15626 {
15627 /* FDE length. */
15628 p += 4;
15629 /* CIE pointer. */
15630 p += 4;
15631 /* Offset to .glink. */
15632 val = (htab->glink->output_section->vma
15633 + htab->glink->output_offset
15634 + 8);
15635 val -= (htab->glink_eh_frame->output_section->vma
15636 + htab->glink_eh_frame->output_offset
15637 + (p - htab->glink_eh_frame->contents));
15638 if (val + 0x80000000 > 0xffffffff)
15639 {
15640 info->callbacks->einfo
15641 (_("%P: %s offset too large for .eh_frame sdata4 encoding"),
15642 htab->glink->name);
15643 return FALSE;
15644 }
15645 bfd_put_32 (dynobj, val, p);
15646 p += 4;
15647 /* .glink size. */
15648 p += 4;
15649 /* Augmentation. */
15650 p += 1;
15651 /* Ops. */
15652 p += 7;
15653 }
15654
15655 if (htab->glink_eh_frame->sec_info_type == SEC_INFO_TYPE_EH_FRAME
15656 && !_bfd_elf_write_section_eh_frame (output_bfd, info,
15657 htab->glink_eh_frame,
15658 htab->glink_eh_frame->contents))
15659 return FALSE;
15660 }
58d180e8 15661
e717da7e 15662 /* We need to handle writing out multiple GOT sections ourselves,
7b53ace3
AM
15663 since we didn't add them to DYNOBJ. We know dynobj is the first
15664 bfd. */
c72f2fb2 15665 while ((dynobj = dynobj->link.next) != NULL)
e717da7e
AM
15666 {
15667 asection *s;
7b53ace3 15668
0c8d6e5c 15669 if (!is_ppc64_elf (dynobj))
7b53ace3
AM
15670 continue;
15671
e717da7e
AM
15672 s = ppc64_elf_tdata (dynobj)->got;
15673 if (s != NULL
eea6121a 15674 && s->size != 0
e717da7e
AM
15675 && s->output_section != bfd_abs_section_ptr
15676 && !bfd_set_section_contents (output_bfd, s->output_section,
15677 s->contents, s->output_offset,
eea6121a 15678 s->size))
e717da7e
AM
15679 return FALSE;
15680 s = ppc64_elf_tdata (dynobj)->relgot;
15681 if (s != NULL
eea6121a 15682 && s->size != 0
e717da7e
AM
15683 && s->output_section != bfd_abs_section_ptr
15684 && !bfd_set_section_contents (output_bfd, s->output_section,
15685 s->contents, s->output_offset,
eea6121a 15686 s->size))
e717da7e
AM
15687 return FALSE;
15688 }
f6c52c13 15689
b34976b6 15690 return TRUE;
5bd4f169
AM
15691}
15692
5bd4f169 15693#include "elf64-target.h"
7b8e7dad
AM
15694
15695/* FreeBSD support */
15696
15697#undef TARGET_LITTLE_SYM
15698#undef TARGET_LITTLE_NAME
15699
15700#undef TARGET_BIG_SYM
6d00b590 15701#define TARGET_BIG_SYM powerpc_elf64_fbsd_vec
7b8e7dad
AM
15702#undef TARGET_BIG_NAME
15703#define TARGET_BIG_NAME "elf64-powerpc-freebsd"
15704
15705#undef ELF_OSABI
15706#define ELF_OSABI ELFOSABI_FREEBSD
15707
15708#undef elf64_bed
15709#define elf64_bed elf64_powerpc_fbsd_bed
15710
15711#include "elf64-target.h"
15712
This page took 2.361913 seconds and 4 git commands to generate.