Replace thread config with automatic config using ax_pthread.m4.
[deliverable/binutils-gdb.git] / bfd / elf64-ppc.c
CommitLineData
5bd4f169 1/* PowerPC64-specific support for 64-bit ELF.
219d1afa 2 Copyright (C) 1999-2018 Free Software Foundation, Inc.
5bd4f169
AM
3 Written by Linus Nordberg, Swox AB <info@swox.com>,
4 based on elf32-ppc.c by Ian Lance Taylor.
32ca9640 5 Largely rewritten by Alan Modra.
5bd4f169 6
ae9a127f 7 This file is part of BFD, the Binary File Descriptor library.
5bd4f169 8
ae9a127f
NC
9 This program is free software; you can redistribute it and/or modify
10 it under the terms of the GNU General Public License as published by
cd123cb7 11 the Free Software Foundation; either version 3 of the License, or
ae9a127f 12 (at your option) any later version.
5bd4f169 13
ae9a127f
NC
14 This program is distributed in the hope that it will be useful,
15 but WITHOUT ANY WARRANTY; without even the implied warranty of
16 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
17 GNU General Public License for more details.
5bd4f169 18
4ce794b7
AM
19 You should have received a copy of the GNU General Public License along
20 with this program; if not, write to the Free Software Foundation, Inc.,
3e110533 21 51 Franklin Street - Fifth Floor, Boston, MA 02110-1301, USA. */
5bd4f169 22
cd123cb7 23
4ce794b7
AM
24/* The 64-bit PowerPC ELF ABI may be found at
25 http://www.linuxbase.org/spec/ELF/ppc64/PPC-elf64abi.txt, and
26 http://www.linuxbase.org/spec/ELF/ppc64/spec/book1.html */
5bd4f169 27
3db64b00 28#include "sysdep.h"
183e98be 29#include <stdarg.h>
5bd4f169 30#include "bfd.h"
5bd4f169
AM
31#include "bfdlink.h"
32#include "libbfd.h"
33#include "elf-bfd.h"
04c9666a 34#include "elf/ppc64.h"
5d1634d7 35#include "elf64-ppc.h"
58d180e8 36#include "dwarf2.h"
5bd4f169 37
805fc799 38static bfd_reloc_status_type ppc64_elf_ha_reloc
4ce794b7 39 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
2441e016
AM
40static bfd_reloc_status_type ppc64_elf_branch_reloc
41 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
805fc799 42static bfd_reloc_status_type ppc64_elf_brtaken_reloc
4ce794b7 43 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
805fc799 44static bfd_reloc_status_type ppc64_elf_sectoff_reloc
4ce794b7 45 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
805fc799 46static bfd_reloc_status_type ppc64_elf_sectoff_ha_reloc
4ce794b7 47 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
805fc799 48static bfd_reloc_status_type ppc64_elf_toc_reloc
4ce794b7 49 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
805fc799 50static bfd_reloc_status_type ppc64_elf_toc_ha_reloc
4ce794b7 51 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
805fc799 52static bfd_reloc_status_type ppc64_elf_toc64_reloc
4ce794b7 53 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
805fc799 54static bfd_reloc_status_type ppc64_elf_unhandled_reloc
4ce794b7 55 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
2441e016 56static bfd_vma opd_entry_value
aef36ac1 57 (asection *, bfd_vma, asection **, bfd_vma *, bfd_boolean);
5bd4f169 58
6d00b590 59#define TARGET_LITTLE_SYM powerpc_elf64_le_vec
ad8e1ba5 60#define TARGET_LITTLE_NAME "elf64-powerpcle"
6d00b590 61#define TARGET_BIG_SYM powerpc_elf64_vec
ad8e1ba5
AM
62#define TARGET_BIG_NAME "elf64-powerpc"
63#define ELF_ARCH bfd_arch_powerpc
ae95ffa6 64#define ELF_TARGET_ID PPC64_ELF_DATA
ad8e1ba5
AM
65#define ELF_MACHINE_CODE EM_PPC64
66#define ELF_MAXPAGESIZE 0x10000
702d1671
AM
67#define ELF_COMMONPAGESIZE 0x1000
68#define ELF_RELROPAGESIZE ELF_MAXPAGESIZE
ad8e1ba5
AM
69#define elf_info_to_howto ppc64_elf_info_to_howto
70
71#define elf_backend_want_got_sym 0
72#define elf_backend_want_plt_sym 0
73#define elf_backend_plt_alignment 3
74#define elf_backend_plt_not_loaded 1
ad8e1ba5 75#define elf_backend_got_header_size 8
5474d94f 76#define elf_backend_want_dynrelro 1
ad8e1ba5
AM
77#define elf_backend_can_gc_sections 1
78#define elf_backend_can_refcount 1
79#define elf_backend_rela_normal 1
64f52338 80#define elf_backend_dtrel_excludes_plt 1
6bfdb61b 81#define elf_backend_default_execstack 0
ad8e1ba5 82
e717da7e 83#define bfd_elf64_mkobject ppc64_elf_mkobject
ad8e1ba5 84#define bfd_elf64_bfd_reloc_type_lookup ppc64_elf_reloc_type_lookup
aa374f67 85#define bfd_elf64_bfd_reloc_name_lookup ppc64_elf_reloc_name_lookup
ee67d69a
AM
86#define bfd_elf64_bfd_merge_private_bfd_data ppc64_elf_merge_private_bfd_data
87#define bfd_elf64_bfd_print_private_bfd_data ppc64_elf_print_private_bfd_data
ad8e1ba5
AM
88#define bfd_elf64_new_section_hook ppc64_elf_new_section_hook
89#define bfd_elf64_bfd_link_hash_table_create ppc64_elf_link_hash_table_create
90e3cdf2 90#define bfd_elf64_get_synthetic_symtab ppc64_elf_get_synthetic_symtab
aa374f67 91#define bfd_elf64_bfd_link_just_syms ppc64_elf_link_just_syms
8c5b4e52 92#define bfd_elf64_bfd_gc_sections ppc64_elf_gc_sections
ad8e1ba5
AM
93
94#define elf_backend_object_p ppc64_elf_object_p
d37c89e5
AM
95#define elf_backend_grok_prstatus ppc64_elf_grok_prstatus
96#define elf_backend_grok_psinfo ppc64_elf_grok_psinfo
183e98be 97#define elf_backend_write_core_note ppc64_elf_write_core_note
9d19e4fd 98#define elf_backend_create_dynamic_sections _bfd_elf_create_dynamic_sections
ad8e1ba5 99#define elf_backend_copy_indirect_symbol ppc64_elf_copy_indirect_symbol
555cd476 100#define elf_backend_add_symbol_hook ppc64_elf_add_symbol_hook
f6c7c3e8 101#define elf_backend_check_directives ppc64_elf_before_check_relocs
e5034e59 102#define elf_backend_notice_as_needed ppc64_elf_notice_as_needed
8387904d 103#define elf_backend_archive_symbol_lookup ppc64_elf_archive_symbol_lookup
ad8e1ba5 104#define elf_backend_check_relocs ppc64_elf_check_relocs
c0e331c7 105#define elf_backend_relocs_compatible _bfd_elf_relocs_compatible
74f0fb50 106#define elf_backend_gc_keep ppc64_elf_gc_keep
64d03ab5 107#define elf_backend_gc_mark_dynamic_ref ppc64_elf_gc_mark_dynamic_ref
ad8e1ba5 108#define elf_backend_gc_mark_hook ppc64_elf_gc_mark_hook
ad8e1ba5
AM
109#define elf_backend_adjust_dynamic_symbol ppc64_elf_adjust_dynamic_symbol
110#define elf_backend_hide_symbol ppc64_elf_hide_symbol
9f296da3 111#define elf_backend_maybe_function_sym ppc64_elf_maybe_function_sym
ad8e1ba5
AM
112#define elf_backend_always_size_sections ppc64_elf_func_desc_adjust
113#define elf_backend_size_dynamic_sections ppc64_elf_size_dynamic_sections
a345bc8d 114#define elf_backend_hash_symbol ppc64_elf_hash_symbol
74541ad4 115#define elf_backend_init_index_section _bfd_elf_init_2_index_sections
60124e18 116#define elf_backend_action_discarded ppc64_elf_action_discarded
ad8e1ba5
AM
117#define elf_backend_relocate_section ppc64_elf_relocate_section
118#define elf_backend_finish_dynamic_symbol ppc64_elf_finish_dynamic_symbol
119#define elf_backend_reloc_type_class ppc64_elf_reloc_type_class
120#define elf_backend_finish_dynamic_sections ppc64_elf_finish_dynamic_sections
754021d0 121#define elf_backend_link_output_symbol_hook ppc64_elf_output_symbol_hook
29ef7005 122#define elf_backend_special_sections ppc64_elf_special_sections
6911b7dc 123#define elf_backend_merge_symbol_attribute ppc64_elf_merge_symbol_attribute
8c5b4e52 124#define elf_backend_merge_symbol ppc64_elf_merge_symbol
bce964aa 125#define elf_backend_get_reloc_section bfd_get_section_by_name
ad8e1ba5 126
5bd4f169
AM
127/* The name of the dynamic interpreter. This is put in the .interp
128 section. */
129#define ELF_DYNAMIC_INTERPRETER "/usr/lib/ld.so.1"
130
131/* The size in bytes of an entry in the procedure linkage table. */
b9e5796b 132#define PLT_ENTRY_SIZE(htab) (htab->opd_abi ? 24 : 8)
2d7ad24e 133#define LOCAL_PLT_ENTRY_SIZE(htab) (htab->opd_abi ? 16 : 8)
5bd4f169
AM
134
135/* The initial size of the plt reserved for the dynamic linker. */
b9e5796b 136#define PLT_INITIAL_ENTRY_SIZE(htab) (htab->opd_abi ? 24 : 16)
5bd4f169 137
a078d95a
AM
138/* Offsets to some stack save slots. */
139#define STK_LR 16
140#define STK_TOC(htab) (htab->opd_abi ? 40 : 24)
eb8d7fda 141/* This one is dodgy. ELFv2 does not have a linker word, so use the
a078d95a
AM
142 CR save slot. Used only by optimised __tls_get_addr call stub,
143 relying on __tls_get_addr_opt not saving CR.. */
144#define STK_LINKER(htab) (htab->opd_abi ? 32 : 8)
145
5bd4f169 146/* TOC base pointers offset from start of TOC. */
411e1bfb 147#define TOC_BASE_OFF 0x8000
a27e685f
AM
148/* TOC base alignment. */
149#define TOC_BASE_ALIGN 256
411e1bfb
AM
150
151/* Offset of tp and dtp pointers from start of TLS block. */
152#define TP_OFFSET 0x7000
153#define DTP_OFFSET 0x8000
5bd4f169 154
ad8e1ba5
AM
155/* .plt call stub instructions. The normal stub is like this, but
156 sometimes the .plt entry crosses a 64k boundary and we need to
71a39c98 157 insert an addi to adjust r11. */
a078d95a 158#define STD_R2_0R1 0xf8410000 /* std %r2,0+40(%r1) */
71a39c98
AM
159#define ADDIS_R11_R2 0x3d620000 /* addis %r11,%r2,xxx@ha */
160#define LD_R12_0R11 0xe98b0000 /* ld %r12,xxx+0@l(%r11) */
161#define MTCTR_R12 0x7d8903a6 /* mtctr %r12 */
162#define LD_R2_0R11 0xe84b0000 /* ld %r2,xxx+8@l(%r11) */
163#define LD_R11_0R11 0xe96b0000 /* ld %r11,xxx+16@l(%r11) */
5d1634d7
AM
164#define BCTR 0x4e800420 /* bctr */
165
07d6d2b8
AM
166#define ADDI_R11_R11 0x396b0000 /* addi %r11,%r11,off@l */
167#define ADDIS_R2_R2 0x3c420000 /* addis %r2,%r2,off@ha */
168#define ADDI_R2_R2 0x38420000 /* addi %r2,%r2,off@l */
169
170#define XOR_R2_R12_R12 0x7d826278 /* xor %r2,%r12,%r12 */
171#define ADD_R11_R11_R2 0x7d6b1214 /* add %r11,%r11,%r2 */
172#define XOR_R11_R12_R12 0x7d8b6278 /* xor %r11,%r12,%r12 */
173#define ADD_R2_R2_R11 0x7c425a14 /* add %r2,%r2,%r11 */
174#define CMPLDI_R2_0 0x28220000 /* cmpldi %r2,0 */
175#define BNECTR 0x4ca20420 /* bnectr+ */
176#define BNECTR_P4 0x4ce20420 /* bnectr+ */
794e51c0 177
71a39c98 178#define LD_R12_0R2 0xe9820000 /* ld %r12,xxx+0(%r2) */
ac2df442 179#define LD_R11_0R2 0xe9620000 /* ld %r11,xxx+0(%r2) */
07d6d2b8 180#define LD_R2_0R2 0xe8420000 /* ld %r2,xxx+0(%r2) */
ac2df442 181
07d6d2b8
AM
182#define LD_R2_0R1 0xe8410000 /* ld %r2,0(%r1) */
183#define LD_R2_0R12 0xe84c0000 /* ld %r2,0(%r12) */
184#define ADD_R2_R2_R12 0x7c426214 /* add %r2,%r2,%r12 */
ad8e1ba5 185
07d6d2b8 186#define LIS_R2 0x3c400000 /* lis %r2,xxx@ha */
006589cf
AM
187#define ADDIS_R2_R12 0x3c4c0000 /* addis %r2,%r12,xxx@ha */
188#define ADDIS_R12_R2 0x3d820000 /* addis %r12,%r2,xxx@ha */
a345bc8d 189#define ADDIS_R12_R12 0x3d8c0000 /* addis %r12,%r12,xxx@ha */
07d6d2b8 190#define LD_R12_0R12 0xe98c0000 /* ld %r12,xxx@l(%r12) */
a345bc8d 191
9e390558
AM
192/* __glink_PLTresolve stub instructions. We enter with the index in R0. */
193#define GLINK_PLTRESOLVE_SIZE(htab) \
407aa07c 194 (8u + (htab->opd_abi ? 11 * 4 : 14 * 4))
ee4bf8d2
AM
195 /* 0: */
196 /* .quad plt0-1f */
197 /* __glink: */
198#define MFLR_R12 0x7d8802a6 /* mflr %12 */
199#define BCL_20_31 0x429f0005 /* bcl 20,31,1f */
200 /* 1: */
201#define MFLR_R11 0x7d6802a6 /* mflr %11 */
71a39c98 202 /* ld %2,(0b-1b)(%11) */
ee4bf8d2 203#define MTLR_R12 0x7d8803a6 /* mtlr %12 */
71a39c98
AM
204#define ADD_R11_R2_R11 0x7d625a14 /* add %11,%2,%11 */
205 /* ld %12,0(%11) */
206 /* ld %2,8(%11) */
207 /* mtctr %12 */
208 /* ld %11,16(%11) */
ee4bf8d2 209 /* bctr */
b9e5796b
AM
210#define MFLR_R0 0x7c0802a6 /* mflr %r0 */
211#define MTLR_R0 0x7c0803a6 /* mtlr %r0 */
212#define SUB_R12_R12_R11 0x7d8b6050 /* subf %r12,%r11,%r12 */
213#define ADDI_R0_R12 0x380c0000 /* addi %r0,%r12,0 */
214#define SRDI_R0_R0_2 0x7800f082 /* rldicl %r0,%r0,62,2 */
5d1634d7
AM
215
216/* Pad with this. */
217#define NOP 0x60000000
218
721956f4
AM
219/* Some other nops. */
220#define CROR_151515 0x4def7b82
221#define CROR_313131 0x4ffffb82
222
cedb70c5 223/* .glink entries for the first 32k functions are two instructions. */
5d1634d7
AM
224#define LI_R0_0 0x38000000 /* li %r0,0 */
225#define B_DOT 0x48000000 /* b . */
226
227/* After that, we need two instructions to load the index, followed by
228 a branch. */
229#define LIS_R0_0 0x3c000000 /* lis %r0,0 */
10ed1bba 230#define ORI_R0_R0_0 0x60000000 /* ori %r0,%r0,0 */
41bd81ab 231
deb0e272
AM
232/* Instructions used by the save and restore reg functions. */
233#define STD_R0_0R1 0xf8010000 /* std %r0,0(%r1) */
234#define STD_R0_0R12 0xf80c0000 /* std %r0,0(%r12) */
235#define LD_R0_0R1 0xe8010000 /* ld %r0,0(%r1) */
236#define LD_R0_0R12 0xe80c0000 /* ld %r0,0(%r12) */
82bd7b59
AM
237#define STFD_FR0_0R1 0xd8010000 /* stfd %fr0,0(%r1) */
238#define LFD_FR0_0R1 0xc8010000 /* lfd %fr0,0(%r1) */
deb0e272
AM
239#define LI_R12_0 0x39800000 /* li %r12,0 */
240#define STVX_VR0_R12_R0 0x7c0c01ce /* stvx %v0,%r12,%r0 */
241#define LVX_VR0_R12_R0 0x7c0c00ce /* lvx %v0,%r12,%r0 */
242#define MTLR_R0 0x7c0803a6 /* mtlr %r0 */
82bd7b59
AM
243#define BLR 0x4e800020 /* blr */
244
41bd81ab
AM
245/* Since .opd is an array of descriptors and each entry will end up
246 with identical R_PPC64_RELATIVE relocs, there is really no need to
247 propagate .opd relocs; The dynamic linker should be taught to
1e2f5b6e 248 relocate .opd without reloc entries. */
41bd81ab
AM
249#ifndef NO_OPD_RELOCS
250#define NO_OPD_RELOCS 0
251#endif
810d4e75 252
a4b6fadd
AM
253#ifndef ARRAY_SIZE
254#define ARRAY_SIZE(a) (sizeof (a) / sizeof ((a)[0]))
255#endif
256
810d4e75
AM
257static inline int
258abiversion (bfd *abfd)
259{
260 return elf_elfheader (abfd)->e_flags & EF_PPC64_ABI;
261}
262
263static inline void
264set_abiversion (bfd *abfd, int ver)
265{
266 elf_elfheader (abfd)->e_flags &= ~EF_PPC64_ABI;
267 elf_elfheader (abfd)->e_flags |= ver & EF_PPC64_ABI;
268}
5bd4f169 269\f
f5e87a1d 270#define ONES(n) (((bfd_vma) 1 << ((n) - 1) << 1) - 1)
b34976b6 271
5bd4f169 272/* Relocation HOWTO's. */
04c9666a 273static reloc_howto_type *ppc64_elf_howto_table[(int) R_PPC64_max];
5bd4f169 274
f3185997
NC
275static reloc_howto_type ppc64_elf_howto_raw[] =
276{
5bd4f169
AM
277 /* This reloc does nothing. */
278 HOWTO (R_PPC64_NONE, /* type */
279 0, /* rightshift */
6346d5ca
AM
280 3, /* size (0 = byte, 1 = short, 2 = long) */
281 0, /* bitsize */
b34976b6 282 FALSE, /* pc_relative */
5bd4f169 283 0, /* bitpos */
f5e87a1d 284 complain_overflow_dont, /* complain_on_overflow */
5bd4f169
AM
285 bfd_elf_generic_reloc, /* special_function */
286 "R_PPC64_NONE", /* name */
b34976b6 287 FALSE, /* partial_inplace */
d006db6c 288 0, /* src_mask */
5bd4f169 289 0, /* dst_mask */
b34976b6 290 FALSE), /* pcrel_offset */
5bd4f169
AM
291
292 /* A standard 32 bit relocation. */
293 HOWTO (R_PPC64_ADDR32, /* type */
294 0, /* rightshift */
295 2, /* size (0 = byte, 1 = short, 2 = long) */
296 32, /* bitsize */
b34976b6 297 FALSE, /* pc_relative */
5bd4f169
AM
298 0, /* bitpos */
299 complain_overflow_bitfield, /* complain_on_overflow */
300 bfd_elf_generic_reloc, /* special_function */
301 "R_PPC64_ADDR32", /* name */
b34976b6 302 FALSE, /* partial_inplace */
5bd4f169
AM
303 0, /* src_mask */
304 0xffffffff, /* dst_mask */
b34976b6 305 FALSE), /* pcrel_offset */
5bd4f169
AM
306
307 /* An absolute 26 bit branch; the lower two bits must be zero.
308 FIXME: we don't check that, we just clear them. */
309 HOWTO (R_PPC64_ADDR24, /* type */
310 0, /* rightshift */
311 2, /* size (0 = byte, 1 = short, 2 = long) */
312 26, /* bitsize */
b34976b6 313 FALSE, /* pc_relative */
5bd4f169
AM
314 0, /* bitpos */
315 complain_overflow_bitfield, /* complain_on_overflow */
316 bfd_elf_generic_reloc, /* special_function */
317 "R_PPC64_ADDR24", /* name */
b34976b6 318 FALSE, /* partial_inplace */
d006db6c 319 0, /* src_mask */
f5e87a1d 320 0x03fffffc, /* dst_mask */
b34976b6 321 FALSE), /* pcrel_offset */
5bd4f169
AM
322
323 /* A standard 16 bit relocation. */
324 HOWTO (R_PPC64_ADDR16, /* type */
325 0, /* rightshift */
326 1, /* size (0 = byte, 1 = short, 2 = long) */
327 16, /* bitsize */
b34976b6 328 FALSE, /* pc_relative */
5bd4f169
AM
329 0, /* bitpos */
330 complain_overflow_bitfield, /* complain_on_overflow */
331 bfd_elf_generic_reloc, /* special_function */
332 "R_PPC64_ADDR16", /* name */
b34976b6 333 FALSE, /* partial_inplace */
5bd4f169
AM
334 0, /* src_mask */
335 0xffff, /* dst_mask */
b34976b6 336 FALSE), /* pcrel_offset */
5bd4f169
AM
337
338 /* A 16 bit relocation without overflow. */
339 HOWTO (R_PPC64_ADDR16_LO, /* type */
340 0, /* rightshift */
341 1, /* size (0 = byte, 1 = short, 2 = long) */
342 16, /* bitsize */
b34976b6 343 FALSE, /* pc_relative */
5bd4f169
AM
344 0, /* bitpos */
345 complain_overflow_dont,/* complain_on_overflow */
346 bfd_elf_generic_reloc, /* special_function */
347 "R_PPC64_ADDR16_LO", /* name */
b34976b6 348 FALSE, /* partial_inplace */
5bd4f169
AM
349 0, /* src_mask */
350 0xffff, /* dst_mask */
b34976b6 351 FALSE), /* pcrel_offset */
5bd4f169
AM
352
353 /* Bits 16-31 of an address. */
354 HOWTO (R_PPC64_ADDR16_HI, /* type */
355 16, /* rightshift */
356 1, /* size (0 = byte, 1 = short, 2 = long) */
357 16, /* bitsize */
b34976b6 358 FALSE, /* pc_relative */
5bd4f169 359 0, /* bitpos */
f9c6b907 360 complain_overflow_signed, /* complain_on_overflow */
5bd4f169
AM
361 bfd_elf_generic_reloc, /* special_function */
362 "R_PPC64_ADDR16_HI", /* name */
b34976b6 363 FALSE, /* partial_inplace */
5bd4f169
AM
364 0, /* src_mask */
365 0xffff, /* dst_mask */
b34976b6 366 FALSE), /* pcrel_offset */
5bd4f169
AM
367
368 /* Bits 16-31 of an address, plus 1 if the contents of the low 16
369 bits, treated as a signed number, is negative. */
370 HOWTO (R_PPC64_ADDR16_HA, /* type */
371 16, /* rightshift */
372 1, /* size (0 = byte, 1 = short, 2 = long) */
373 16, /* bitsize */
b34976b6 374 FALSE, /* pc_relative */
5bd4f169 375 0, /* bitpos */
f9c6b907 376 complain_overflow_signed, /* complain_on_overflow */
805fc799 377 ppc64_elf_ha_reloc, /* special_function */
5bd4f169 378 "R_PPC64_ADDR16_HA", /* name */
b34976b6 379 FALSE, /* partial_inplace */
5bd4f169
AM
380 0, /* src_mask */
381 0xffff, /* dst_mask */
b34976b6 382 FALSE), /* pcrel_offset */
5bd4f169
AM
383
384 /* An absolute 16 bit branch; the lower two bits must be zero.
385 FIXME: we don't check that, we just clear them. */
386 HOWTO (R_PPC64_ADDR14, /* type */
387 0, /* rightshift */
388 2, /* size (0 = byte, 1 = short, 2 = long) */
389 16, /* bitsize */
b34976b6 390 FALSE, /* pc_relative */
5bd4f169 391 0, /* bitpos */
b80eed39 392 complain_overflow_signed, /* complain_on_overflow */
2441e016 393 ppc64_elf_branch_reloc, /* special_function */
5bd4f169 394 "R_PPC64_ADDR14", /* name */
b34976b6 395 FALSE, /* partial_inplace */
d006db6c 396 0, /* src_mask */
f5e87a1d 397 0x0000fffc, /* dst_mask */
b34976b6 398 FALSE), /* pcrel_offset */
5bd4f169
AM
399
400 /* An absolute 16 bit branch, for which bit 10 should be set to
401 indicate that the branch is expected to be taken. The lower two
402 bits must be zero. */
403 HOWTO (R_PPC64_ADDR14_BRTAKEN, /* type */
404 0, /* rightshift */
405 2, /* size (0 = byte, 1 = short, 2 = long) */
406 16, /* bitsize */
b34976b6 407 FALSE, /* pc_relative */
5bd4f169 408 0, /* bitpos */
b80eed39 409 complain_overflow_signed, /* complain_on_overflow */
805fc799 410 ppc64_elf_brtaken_reloc, /* special_function */
5bd4f169 411 "R_PPC64_ADDR14_BRTAKEN",/* name */
b34976b6 412 FALSE, /* partial_inplace */
d006db6c 413 0, /* src_mask */
f5e87a1d 414 0x0000fffc, /* dst_mask */
b34976b6 415 FALSE), /* pcrel_offset */
5bd4f169
AM
416
417 /* An absolute 16 bit branch, for which bit 10 should be set to
418 indicate that the branch is not expected to be taken. The lower
419 two bits must be zero. */
420 HOWTO (R_PPC64_ADDR14_BRNTAKEN, /* type */
421 0, /* rightshift */
422 2, /* size (0 = byte, 1 = short, 2 = long) */
423 16, /* bitsize */
b34976b6 424 FALSE, /* pc_relative */
5bd4f169 425 0, /* bitpos */
b80eed39 426 complain_overflow_signed, /* complain_on_overflow */
805fc799 427 ppc64_elf_brtaken_reloc, /* special_function */
5bd4f169 428 "R_PPC64_ADDR14_BRNTAKEN",/* name */
b34976b6 429 FALSE, /* partial_inplace */
d006db6c 430 0, /* src_mask */
f5e87a1d 431 0x0000fffc, /* dst_mask */
b34976b6 432 FALSE), /* pcrel_offset */
5bd4f169
AM
433
434 /* A relative 26 bit branch; the lower two bits must be zero. */
435 HOWTO (R_PPC64_REL24, /* type */
436 0, /* rightshift */
437 2, /* size (0 = byte, 1 = short, 2 = long) */
438 26, /* bitsize */
b34976b6 439 TRUE, /* pc_relative */
5bd4f169
AM
440 0, /* bitpos */
441 complain_overflow_signed, /* complain_on_overflow */
2441e016 442 ppc64_elf_branch_reloc, /* special_function */
5bd4f169 443 "R_PPC64_REL24", /* name */
b34976b6 444 FALSE, /* partial_inplace */
d006db6c 445 0, /* src_mask */
f5e87a1d 446 0x03fffffc, /* dst_mask */
b34976b6 447 TRUE), /* pcrel_offset */
5bd4f169
AM
448
449 /* A relative 16 bit branch; the lower two bits must be zero. */
450 HOWTO (R_PPC64_REL14, /* type */
451 0, /* rightshift */
452 2, /* size (0 = byte, 1 = short, 2 = long) */
453 16, /* bitsize */
b34976b6 454 TRUE, /* pc_relative */
5bd4f169
AM
455 0, /* bitpos */
456 complain_overflow_signed, /* complain_on_overflow */
2441e016 457 ppc64_elf_branch_reloc, /* special_function */
5bd4f169 458 "R_PPC64_REL14", /* name */
b34976b6 459 FALSE, /* partial_inplace */
d006db6c 460 0, /* src_mask */
f5e87a1d 461 0x0000fffc, /* dst_mask */
b34976b6 462 TRUE), /* pcrel_offset */
5bd4f169
AM
463
464 /* A relative 16 bit branch. Bit 10 should be set to indicate that
465 the branch is expected to be taken. The lower two bits must be
466 zero. */
467 HOWTO (R_PPC64_REL14_BRTAKEN, /* type */
468 0, /* rightshift */
469 2, /* size (0 = byte, 1 = short, 2 = long) */
470 16, /* bitsize */
b34976b6 471 TRUE, /* pc_relative */
5bd4f169
AM
472 0, /* bitpos */
473 complain_overflow_signed, /* complain_on_overflow */
805fc799 474 ppc64_elf_brtaken_reloc, /* special_function */
5bd4f169 475 "R_PPC64_REL14_BRTAKEN", /* name */
b34976b6 476 FALSE, /* partial_inplace */
d006db6c 477 0, /* src_mask */
f5e87a1d 478 0x0000fffc, /* dst_mask */
b34976b6 479 TRUE), /* pcrel_offset */
5bd4f169
AM
480
481 /* A relative 16 bit branch. Bit 10 should be set to indicate that
482 the branch is not expected to be taken. The lower two bits must
483 be zero. */
484 HOWTO (R_PPC64_REL14_BRNTAKEN, /* type */
485 0, /* rightshift */
486 2, /* size (0 = byte, 1 = short, 2 = long) */
487 16, /* bitsize */
b34976b6 488 TRUE, /* pc_relative */
5bd4f169
AM
489 0, /* bitpos */
490 complain_overflow_signed, /* complain_on_overflow */
805fc799 491 ppc64_elf_brtaken_reloc, /* special_function */
5bd4f169 492 "R_PPC64_REL14_BRNTAKEN",/* name */
b34976b6 493 FALSE, /* partial_inplace */
d006db6c 494 0, /* src_mask */
f5e87a1d 495 0x0000fffc, /* dst_mask */
b34976b6 496 TRUE), /* pcrel_offset */
5bd4f169
AM
497
498 /* Like R_PPC64_ADDR16, but referring to the GOT table entry for the
499 symbol. */
500 HOWTO (R_PPC64_GOT16, /* type */
501 0, /* rightshift */
502 1, /* size (0 = byte, 1 = short, 2 = long) */
503 16, /* bitsize */
b34976b6 504 FALSE, /* pc_relative */
5bd4f169
AM
505 0, /* bitpos */
506 complain_overflow_signed, /* complain_on_overflow */
805fc799 507 ppc64_elf_unhandled_reloc, /* special_function */
5bd4f169 508 "R_PPC64_GOT16", /* name */
b34976b6 509 FALSE, /* partial_inplace */
5bd4f169
AM
510 0, /* src_mask */
511 0xffff, /* dst_mask */
b34976b6 512 FALSE), /* pcrel_offset */
5bd4f169
AM
513
514 /* Like R_PPC64_ADDR16_LO, but referring to the GOT table entry for
515 the symbol. */
516 HOWTO (R_PPC64_GOT16_LO, /* type */
517 0, /* rightshift */
518 1, /* size (0 = byte, 1 = short, 2 = long) */
519 16, /* bitsize */
b34976b6 520 FALSE, /* pc_relative */
5bd4f169
AM
521 0, /* bitpos */
522 complain_overflow_dont, /* complain_on_overflow */
805fc799 523 ppc64_elf_unhandled_reloc, /* special_function */
5bd4f169 524 "R_PPC64_GOT16_LO", /* name */
b34976b6 525 FALSE, /* partial_inplace */
5bd4f169
AM
526 0, /* src_mask */
527 0xffff, /* dst_mask */
b34976b6 528 FALSE), /* pcrel_offset */
5bd4f169
AM
529
530 /* Like R_PPC64_ADDR16_HI, but referring to the GOT table entry for
531 the symbol. */
532 HOWTO (R_PPC64_GOT16_HI, /* type */
533 16, /* rightshift */
534 1, /* size (0 = byte, 1 = short, 2 = long) */
535 16, /* bitsize */
b34976b6 536 FALSE, /* pc_relative */
5bd4f169 537 0, /* bitpos */
f9c6b907 538 complain_overflow_signed,/* complain_on_overflow */
805fc799 539 ppc64_elf_unhandled_reloc, /* special_function */
5bd4f169 540 "R_PPC64_GOT16_HI", /* name */
b34976b6 541 FALSE, /* partial_inplace */
5bd4f169
AM
542 0, /* src_mask */
543 0xffff, /* dst_mask */
b34976b6 544 FALSE), /* pcrel_offset */
5bd4f169
AM
545
546 /* Like R_PPC64_ADDR16_HA, but referring to the GOT table entry for
547 the symbol. */
548 HOWTO (R_PPC64_GOT16_HA, /* type */
549 16, /* rightshift */
550 1, /* size (0 = byte, 1 = short, 2 = long) */
551 16, /* bitsize */
b34976b6 552 FALSE, /* pc_relative */
5bd4f169 553 0, /* bitpos */
f9c6b907 554 complain_overflow_signed,/* complain_on_overflow */
805fc799 555 ppc64_elf_unhandled_reloc, /* special_function */
5bd4f169 556 "R_PPC64_GOT16_HA", /* name */
b34976b6 557 FALSE, /* partial_inplace */
5bd4f169
AM
558 0, /* src_mask */
559 0xffff, /* dst_mask */
b34976b6 560 FALSE), /* pcrel_offset */
5bd4f169
AM
561
562 /* This is used only by the dynamic linker. The symbol should exist
563 both in the object being run and in some shared library. The
564 dynamic linker copies the data addressed by the symbol from the
565 shared library into the object, because the object being
566 run has to have the data at some particular address. */
567 HOWTO (R_PPC64_COPY, /* type */
568 0, /* rightshift */
f5e87a1d
AM
569 0, /* this one is variable size */
570 0, /* bitsize */
b34976b6 571 FALSE, /* pc_relative */
5bd4f169 572 0, /* bitpos */
f5e87a1d
AM
573 complain_overflow_dont, /* complain_on_overflow */
574 ppc64_elf_unhandled_reloc, /* special_function */
5bd4f169 575 "R_PPC64_COPY", /* name */
b34976b6 576 FALSE, /* partial_inplace */
5bd4f169
AM
577 0, /* src_mask */
578 0, /* dst_mask */
b34976b6 579 FALSE), /* pcrel_offset */
5bd4f169
AM
580
581 /* Like R_PPC64_ADDR64, but used when setting global offset table
582 entries. */
583 HOWTO (R_PPC64_GLOB_DAT, /* type */
584 0, /* rightshift */
585 4, /* size (0=byte, 1=short, 2=long, 4=64 bits) */
586 64, /* bitsize */
b34976b6 587 FALSE, /* pc_relative */
5bd4f169
AM
588 0, /* bitpos */
589 complain_overflow_dont, /* complain_on_overflow */
805fc799 590 ppc64_elf_unhandled_reloc, /* special_function */
5bd4f169 591 "R_PPC64_GLOB_DAT", /* name */
b34976b6 592 FALSE, /* partial_inplace */
5bd4f169 593 0, /* src_mask */
f5e87a1d 594 ONES (64), /* dst_mask */
b34976b6 595 FALSE), /* pcrel_offset */
5bd4f169
AM
596
597 /* Created by the link editor. Marks a procedure linkage table
598 entry for a symbol. */
599 HOWTO (R_PPC64_JMP_SLOT, /* type */
600 0, /* rightshift */
601 0, /* size (0 = byte, 1 = short, 2 = long) */
602 0, /* bitsize */
b34976b6 603 FALSE, /* pc_relative */
5bd4f169
AM
604 0, /* bitpos */
605 complain_overflow_dont, /* complain_on_overflow */
805fc799 606 ppc64_elf_unhandled_reloc, /* special_function */
5bd4f169 607 "R_PPC64_JMP_SLOT", /* name */
b34976b6 608 FALSE, /* partial_inplace */
5bd4f169
AM
609 0, /* src_mask */
610 0, /* dst_mask */
b34976b6 611 FALSE), /* pcrel_offset */
5bd4f169
AM
612
613 /* Used only by the dynamic linker. When the object is run, this
614 doubleword64 is set to the load address of the object, plus the
615 addend. */
616 HOWTO (R_PPC64_RELATIVE, /* type */
617 0, /* rightshift */
618 4, /* size (0=byte, 1=short, 2=long, 4=64 bits) */
619 64, /* bitsize */
b34976b6 620 FALSE, /* pc_relative */
5bd4f169
AM
621 0, /* bitpos */
622 complain_overflow_dont, /* complain_on_overflow */
623 bfd_elf_generic_reloc, /* special_function */
624 "R_PPC64_RELATIVE", /* name */
b34976b6 625 FALSE, /* partial_inplace */
5bd4f169 626 0, /* src_mask */
f5e87a1d 627 ONES (64), /* dst_mask */
b34976b6 628 FALSE), /* pcrel_offset */
5bd4f169
AM
629
630 /* Like R_PPC64_ADDR32, but may be unaligned. */
631 HOWTO (R_PPC64_UADDR32, /* type */
632 0, /* rightshift */
633 2, /* size (0 = byte, 1 = short, 2 = long) */
634 32, /* bitsize */
b34976b6 635 FALSE, /* pc_relative */
5bd4f169
AM
636 0, /* bitpos */
637 complain_overflow_bitfield, /* complain_on_overflow */
638 bfd_elf_generic_reloc, /* special_function */
639 "R_PPC64_UADDR32", /* name */
b34976b6 640 FALSE, /* partial_inplace */
5bd4f169
AM
641 0, /* src_mask */
642 0xffffffff, /* dst_mask */
b34976b6 643 FALSE), /* pcrel_offset */
5bd4f169
AM
644
645 /* Like R_PPC64_ADDR16, but may be unaligned. */
646 HOWTO (R_PPC64_UADDR16, /* type */
647 0, /* rightshift */
648 1, /* size (0 = byte, 1 = short, 2 = long) */
649 16, /* bitsize */
b34976b6 650 FALSE, /* pc_relative */
5bd4f169
AM
651 0, /* bitpos */
652 complain_overflow_bitfield, /* complain_on_overflow */
653 bfd_elf_generic_reloc, /* special_function */
654 "R_PPC64_UADDR16", /* name */
b34976b6 655 FALSE, /* partial_inplace */
5bd4f169
AM
656 0, /* src_mask */
657 0xffff, /* dst_mask */
b34976b6 658 FALSE), /* pcrel_offset */
5bd4f169
AM
659
660 /* 32-bit PC relative. */
661 HOWTO (R_PPC64_REL32, /* type */
662 0, /* rightshift */
663 2, /* size (0 = byte, 1 = short, 2 = long) */
664 32, /* bitsize */
b34976b6 665 TRUE, /* pc_relative */
5bd4f169 666 0, /* bitpos */
5bd4f169
AM
667 complain_overflow_signed, /* complain_on_overflow */
668 bfd_elf_generic_reloc, /* special_function */
669 "R_PPC64_REL32", /* name */
b34976b6 670 FALSE, /* partial_inplace */
5bd4f169
AM
671 0, /* src_mask */
672 0xffffffff, /* dst_mask */
b34976b6 673 TRUE), /* pcrel_offset */
5bd4f169 674
10ed1bba 675 /* 32-bit relocation to the symbol's procedure linkage table. */
5bd4f169
AM
676 HOWTO (R_PPC64_PLT32, /* type */
677 0, /* rightshift */
678 2, /* size (0 = byte, 1 = short, 2 = long) */
679 32, /* bitsize */
b34976b6 680 FALSE, /* pc_relative */
5bd4f169
AM
681 0, /* bitpos */
682 complain_overflow_bitfield, /* complain_on_overflow */
805fc799 683 ppc64_elf_unhandled_reloc, /* special_function */
5bd4f169 684 "R_PPC64_PLT32", /* name */
b34976b6 685 FALSE, /* partial_inplace */
5bd4f169 686 0, /* src_mask */
f5e87a1d 687 0xffffffff, /* dst_mask */
b34976b6 688 FALSE), /* pcrel_offset */
5bd4f169
AM
689
690 /* 32-bit PC relative relocation to the symbol's procedure linkage table.
691 FIXME: R_PPC64_PLTREL32 not supported. */
692 HOWTO (R_PPC64_PLTREL32, /* type */
693 0, /* rightshift */
694 2, /* size (0 = byte, 1 = short, 2 = long) */
695 32, /* bitsize */
b34976b6 696 TRUE, /* pc_relative */
5bd4f169
AM
697 0, /* bitpos */
698 complain_overflow_signed, /* complain_on_overflow */
3ce51288 699 ppc64_elf_unhandled_reloc, /* special_function */
5bd4f169 700 "R_PPC64_PLTREL32", /* name */
b34976b6 701 FALSE, /* partial_inplace */
5bd4f169 702 0, /* src_mask */
f5e87a1d 703 0xffffffff, /* dst_mask */
b34976b6 704 TRUE), /* pcrel_offset */
5bd4f169
AM
705
706 /* Like R_PPC64_ADDR16_LO, but referring to the PLT table entry for
707 the symbol. */
708 HOWTO (R_PPC64_PLT16_LO, /* type */
709 0, /* rightshift */
710 1, /* size (0 = byte, 1 = short, 2 = long) */
711 16, /* bitsize */
b34976b6 712 FALSE, /* pc_relative */
5bd4f169
AM
713 0, /* bitpos */
714 complain_overflow_dont, /* complain_on_overflow */
805fc799 715 ppc64_elf_unhandled_reloc, /* special_function */
5bd4f169 716 "R_PPC64_PLT16_LO", /* name */
b34976b6 717 FALSE, /* partial_inplace */
5bd4f169
AM
718 0, /* src_mask */
719 0xffff, /* dst_mask */
b34976b6 720 FALSE), /* pcrel_offset */
5bd4f169
AM
721
722 /* Like R_PPC64_ADDR16_HI, but referring to the PLT table entry for
723 the symbol. */
724 HOWTO (R_PPC64_PLT16_HI, /* type */
725 16, /* rightshift */
726 1, /* size (0 = byte, 1 = short, 2 = long) */
727 16, /* bitsize */
b34976b6 728 FALSE, /* pc_relative */
5bd4f169 729 0, /* bitpos */
f9c6b907 730 complain_overflow_signed, /* complain_on_overflow */
805fc799 731 ppc64_elf_unhandled_reloc, /* special_function */
5bd4f169 732 "R_PPC64_PLT16_HI", /* name */
b34976b6 733 FALSE, /* partial_inplace */
5bd4f169
AM
734 0, /* src_mask */
735 0xffff, /* dst_mask */
b34976b6 736 FALSE), /* pcrel_offset */
5bd4f169
AM
737
738 /* Like R_PPC64_ADDR16_HA, but referring to the PLT table entry for
739 the symbol. */
740 HOWTO (R_PPC64_PLT16_HA, /* type */
741 16, /* rightshift */
742 1, /* size (0 = byte, 1 = short, 2 = long) */
743 16, /* bitsize */
b34976b6 744 FALSE, /* pc_relative */
5bd4f169 745 0, /* bitpos */
f9c6b907 746 complain_overflow_signed, /* complain_on_overflow */
805fc799 747 ppc64_elf_unhandled_reloc, /* special_function */
5bd4f169 748 "R_PPC64_PLT16_HA", /* name */
b34976b6 749 FALSE, /* partial_inplace */
5bd4f169
AM
750 0, /* src_mask */
751 0xffff, /* dst_mask */
b34976b6 752 FALSE), /* pcrel_offset */
5bd4f169 753
c061c2d8 754 /* 16-bit section relative relocation. */
5bd4f169
AM
755 HOWTO (R_PPC64_SECTOFF, /* type */
756 0, /* rightshift */
c061c2d8
AM
757 1, /* size (0 = byte, 1 = short, 2 = long) */
758 16, /* bitsize */
b34976b6 759 FALSE, /* pc_relative */
5bd4f169 760 0, /* bitpos */
b80eed39 761 complain_overflow_signed, /* complain_on_overflow */
805fc799 762 ppc64_elf_sectoff_reloc, /* special_function */
5bd4f169 763 "R_PPC64_SECTOFF", /* name */
b34976b6 764 FALSE, /* partial_inplace */
5bd4f169 765 0, /* src_mask */
c061c2d8 766 0xffff, /* dst_mask */
b34976b6 767 FALSE), /* pcrel_offset */
5bd4f169 768
c061c2d8 769 /* Like R_PPC64_SECTOFF, but no overflow warning. */
5bd4f169
AM
770 HOWTO (R_PPC64_SECTOFF_LO, /* type */
771 0, /* rightshift */
772 1, /* size (0 = byte, 1 = short, 2 = long) */
773 16, /* bitsize */
b34976b6 774 FALSE, /* pc_relative */
5bd4f169
AM
775 0, /* bitpos */
776 complain_overflow_dont, /* complain_on_overflow */
805fc799 777 ppc64_elf_sectoff_reloc, /* special_function */
5bd4f169 778 "R_PPC64_SECTOFF_LO", /* name */
b34976b6 779 FALSE, /* partial_inplace */
5bd4f169
AM
780 0, /* src_mask */
781 0xffff, /* dst_mask */
b34976b6 782 FALSE), /* pcrel_offset */
5bd4f169
AM
783
784 /* 16-bit upper half section relative relocation. */
785 HOWTO (R_PPC64_SECTOFF_HI, /* type */
786 16, /* rightshift */
787 1, /* size (0 = byte, 1 = short, 2 = long) */
788 16, /* bitsize */
b34976b6 789 FALSE, /* pc_relative */
5bd4f169 790 0, /* bitpos */
f9c6b907 791 complain_overflow_signed, /* complain_on_overflow */
805fc799 792 ppc64_elf_sectoff_reloc, /* special_function */
5bd4f169 793 "R_PPC64_SECTOFF_HI", /* name */
b34976b6 794 FALSE, /* partial_inplace */
5bd4f169
AM
795 0, /* src_mask */
796 0xffff, /* dst_mask */
b34976b6 797 FALSE), /* pcrel_offset */
5bd4f169
AM
798
799 /* 16-bit upper half adjusted section relative relocation. */
800 HOWTO (R_PPC64_SECTOFF_HA, /* type */
801 16, /* rightshift */
802 1, /* size (0 = byte, 1 = short, 2 = long) */
803 16, /* bitsize */
b34976b6 804 FALSE, /* pc_relative */
5bd4f169 805 0, /* bitpos */
f9c6b907 806 complain_overflow_signed, /* complain_on_overflow */
805fc799 807 ppc64_elf_sectoff_ha_reloc, /* special_function */
5bd4f169 808 "R_PPC64_SECTOFF_HA", /* name */
b34976b6 809 FALSE, /* partial_inplace */
5bd4f169
AM
810 0, /* src_mask */
811 0xffff, /* dst_mask */
b34976b6 812 FALSE), /* pcrel_offset */
5bd4f169 813
04c9666a
AM
814 /* Like R_PPC64_REL24 without touching the two least significant bits. */
815 HOWTO (R_PPC64_REL30, /* type */
5bd4f169
AM
816 2, /* rightshift */
817 2, /* size (0 = byte, 1 = short, 2 = long) */
818 30, /* bitsize */
b34976b6 819 TRUE, /* pc_relative */
5bd4f169
AM
820 0, /* bitpos */
821 complain_overflow_dont, /* complain_on_overflow */
822 bfd_elf_generic_reloc, /* special_function */
04c9666a 823 "R_PPC64_REL30", /* name */
b34976b6 824 FALSE, /* partial_inplace */
d006db6c 825 0, /* src_mask */
5bd4f169 826 0xfffffffc, /* dst_mask */
b34976b6 827 TRUE), /* pcrel_offset */
5bd4f169
AM
828
829 /* Relocs in the 64-bit PowerPC ELF ABI, not in the 32-bit ABI. */
830
831 /* A standard 64-bit relocation. */
832 HOWTO (R_PPC64_ADDR64, /* type */
833 0, /* rightshift */
834 4, /* size (0=byte, 1=short, 2=long, 4=64 bits) */
835 64, /* bitsize */
b34976b6 836 FALSE, /* pc_relative */
5bd4f169
AM
837 0, /* bitpos */
838 complain_overflow_dont, /* complain_on_overflow */
839 bfd_elf_generic_reloc, /* special_function */
840 "R_PPC64_ADDR64", /* name */
b34976b6 841 FALSE, /* partial_inplace */
5bd4f169 842 0, /* src_mask */
f5e87a1d 843 ONES (64), /* dst_mask */
b34976b6 844 FALSE), /* pcrel_offset */
5bd4f169
AM
845
846 /* The bits 32-47 of an address. */
847 HOWTO (R_PPC64_ADDR16_HIGHER, /* type */
848 32, /* rightshift */
849 1, /* size (0 = byte, 1 = short, 2 = long) */
850 16, /* bitsize */
b34976b6 851 FALSE, /* pc_relative */
5bd4f169
AM
852 0, /* bitpos */
853 complain_overflow_dont, /* complain_on_overflow */
854 bfd_elf_generic_reloc, /* special_function */
855 "R_PPC64_ADDR16_HIGHER", /* name */
b34976b6 856 FALSE, /* partial_inplace */
5bd4f169
AM
857 0, /* src_mask */
858 0xffff, /* dst_mask */
b34976b6 859 FALSE), /* pcrel_offset */
5bd4f169
AM
860
861 /* The bits 32-47 of an address, plus 1 if the contents of the low
862 16 bits, treated as a signed number, is negative. */
863 HOWTO (R_PPC64_ADDR16_HIGHERA, /* type */
864 32, /* rightshift */
865 1, /* size (0 = byte, 1 = short, 2 = long) */
866 16, /* bitsize */
b34976b6 867 FALSE, /* pc_relative */
5bd4f169
AM
868 0, /* bitpos */
869 complain_overflow_dont, /* complain_on_overflow */
805fc799 870 ppc64_elf_ha_reloc, /* special_function */
5bd4f169 871 "R_PPC64_ADDR16_HIGHERA", /* name */
b34976b6 872 FALSE, /* partial_inplace */
5bd4f169
AM
873 0, /* src_mask */
874 0xffff, /* dst_mask */
b34976b6 875 FALSE), /* pcrel_offset */
5bd4f169
AM
876
877 /* The bits 48-63 of an address. */
878 HOWTO (R_PPC64_ADDR16_HIGHEST,/* type */
879 48, /* rightshift */
880 1, /* size (0 = byte, 1 = short, 2 = long) */
881 16, /* bitsize */
b34976b6 882 FALSE, /* pc_relative */
5bd4f169
AM
883 0, /* bitpos */
884 complain_overflow_dont, /* complain_on_overflow */
885 bfd_elf_generic_reloc, /* special_function */
886 "R_PPC64_ADDR16_HIGHEST", /* name */
b34976b6 887 FALSE, /* partial_inplace */
5bd4f169
AM
888 0, /* src_mask */
889 0xffff, /* dst_mask */
b34976b6 890 FALSE), /* pcrel_offset */
5bd4f169
AM
891
892 /* The bits 48-63 of an address, plus 1 if the contents of the low
893 16 bits, treated as a signed number, is negative. */
894 HOWTO (R_PPC64_ADDR16_HIGHESTA,/* type */
895 48, /* rightshift */
896 1, /* size (0 = byte, 1 = short, 2 = long) */
897 16, /* bitsize */
b34976b6 898 FALSE, /* pc_relative */
5bd4f169
AM
899 0, /* bitpos */
900 complain_overflow_dont, /* complain_on_overflow */
805fc799 901 ppc64_elf_ha_reloc, /* special_function */
5bd4f169 902 "R_PPC64_ADDR16_HIGHESTA", /* name */
b34976b6 903 FALSE, /* partial_inplace */
5bd4f169
AM
904 0, /* src_mask */
905 0xffff, /* dst_mask */
b34976b6 906 FALSE), /* pcrel_offset */
5bd4f169
AM
907
908 /* Like ADDR64, but may be unaligned. */
909 HOWTO (R_PPC64_UADDR64, /* type */
910 0, /* rightshift */
911 4, /* size (0=byte, 1=short, 2=long, 4=64 bits) */
912 64, /* bitsize */
b34976b6 913 FALSE, /* pc_relative */
5bd4f169
AM
914 0, /* bitpos */
915 complain_overflow_dont, /* complain_on_overflow */
916 bfd_elf_generic_reloc, /* special_function */
917 "R_PPC64_UADDR64", /* name */
b34976b6 918 FALSE, /* partial_inplace */
5bd4f169 919 0, /* src_mask */
f5e87a1d 920 ONES (64), /* dst_mask */
b34976b6 921 FALSE), /* pcrel_offset */
5bd4f169
AM
922
923 /* 64-bit relative relocation. */
924 HOWTO (R_PPC64_REL64, /* type */
925 0, /* rightshift */
926 4, /* size (0=byte, 1=short, 2=long, 4=64 bits) */
927 64, /* bitsize */
b34976b6 928 TRUE, /* pc_relative */
5bd4f169
AM
929 0, /* bitpos */
930 complain_overflow_dont, /* complain_on_overflow */
931 bfd_elf_generic_reloc, /* special_function */
932 "R_PPC64_REL64", /* name */
b34976b6 933 FALSE, /* partial_inplace */
5bd4f169 934 0, /* src_mask */
f5e87a1d 935 ONES (64), /* dst_mask */
b34976b6 936 TRUE), /* pcrel_offset */
5bd4f169 937
cedb70c5 938 /* 64-bit relocation to the symbol's procedure linkage table. */
5bd4f169
AM
939 HOWTO (R_PPC64_PLT64, /* type */
940 0, /* rightshift */
941 4, /* size (0=byte, 1=short, 2=long, 4=64 bits) */
942 64, /* bitsize */
b34976b6 943 FALSE, /* pc_relative */
5bd4f169
AM
944 0, /* bitpos */
945 complain_overflow_dont, /* complain_on_overflow */
805fc799 946 ppc64_elf_unhandled_reloc, /* special_function */
5bd4f169 947 "R_PPC64_PLT64", /* name */
b34976b6 948 FALSE, /* partial_inplace */
5bd4f169 949 0, /* src_mask */
f5e87a1d 950 ONES (64), /* dst_mask */
b34976b6 951 FALSE), /* pcrel_offset */
5bd4f169
AM
952
953 /* 64-bit PC relative relocation to the symbol's procedure linkage
954 table. */
955 /* FIXME: R_PPC64_PLTREL64 not supported. */
956 HOWTO (R_PPC64_PLTREL64, /* type */
957 0, /* rightshift */
958 4, /* size (0=byte, 1=short, 2=long, 4=64 bits) */
959 64, /* bitsize */
b34976b6 960 TRUE, /* pc_relative */
5bd4f169
AM
961 0, /* bitpos */
962 complain_overflow_dont, /* complain_on_overflow */
805fc799 963 ppc64_elf_unhandled_reloc, /* special_function */
5bd4f169 964 "R_PPC64_PLTREL64", /* name */
b34976b6 965 FALSE, /* partial_inplace */
5bd4f169 966 0, /* src_mask */
f5e87a1d 967 ONES (64), /* dst_mask */
b34976b6 968 TRUE), /* pcrel_offset */
5bd4f169
AM
969
970 /* 16 bit TOC-relative relocation. */
971
972 /* R_PPC64_TOC16 47 half16* S + A - .TOC. */
973 HOWTO (R_PPC64_TOC16, /* type */
974 0, /* rightshift */
975 1, /* size (0 = byte, 1 = short, 2 = long) */
976 16, /* bitsize */
b34976b6 977 FALSE, /* pc_relative */
5bd4f169
AM
978 0, /* bitpos */
979 complain_overflow_signed, /* complain_on_overflow */
805fc799 980 ppc64_elf_toc_reloc, /* special_function */
5bd4f169 981 "R_PPC64_TOC16", /* name */
b34976b6 982 FALSE, /* partial_inplace */
5bd4f169
AM
983 0, /* src_mask */
984 0xffff, /* dst_mask */
b34976b6 985 FALSE), /* pcrel_offset */
5bd4f169
AM
986
987 /* 16 bit TOC-relative relocation without overflow. */
988
989 /* R_PPC64_TOC16_LO 48 half16 #lo (S + A - .TOC.) */
990 HOWTO (R_PPC64_TOC16_LO, /* type */
991 0, /* rightshift */
992 1, /* size (0 = byte, 1 = short, 2 = long) */
993 16, /* bitsize */
b34976b6 994 FALSE, /* pc_relative */
5bd4f169
AM
995 0, /* bitpos */
996 complain_overflow_dont, /* complain_on_overflow */
805fc799 997 ppc64_elf_toc_reloc, /* special_function */
5bd4f169 998 "R_PPC64_TOC16_LO", /* name */
b34976b6 999 FALSE, /* partial_inplace */
5bd4f169
AM
1000 0, /* src_mask */
1001 0xffff, /* dst_mask */
b34976b6 1002 FALSE), /* pcrel_offset */
5bd4f169
AM
1003
1004 /* 16 bit TOC-relative relocation, high 16 bits. */
1005
1006 /* R_PPC64_TOC16_HI 49 half16 #hi (S + A - .TOC.) */
1007 HOWTO (R_PPC64_TOC16_HI, /* type */
1008 16, /* rightshift */
1009 1, /* size (0 = byte, 1 = short, 2 = long) */
1010 16, /* bitsize */
b34976b6 1011 FALSE, /* pc_relative */
5bd4f169 1012 0, /* bitpos */
f9c6b907 1013 complain_overflow_signed, /* complain_on_overflow */
805fc799 1014 ppc64_elf_toc_reloc, /* special_function */
5bd4f169 1015 "R_PPC64_TOC16_HI", /* name */
b34976b6 1016 FALSE, /* partial_inplace */
5bd4f169
AM
1017 0, /* src_mask */
1018 0xffff, /* dst_mask */
b34976b6 1019 FALSE), /* pcrel_offset */
5bd4f169
AM
1020
1021 /* 16 bit TOC-relative relocation, high 16 bits, plus 1 if the
1022 contents of the low 16 bits, treated as a signed number, is
1023 negative. */
1024
1025 /* R_PPC64_TOC16_HA 50 half16 #ha (S + A - .TOC.) */
1026 HOWTO (R_PPC64_TOC16_HA, /* type */
1027 16, /* rightshift */
1028 1, /* size (0 = byte, 1 = short, 2 = long) */
1029 16, /* bitsize */
b34976b6 1030 FALSE, /* pc_relative */
5bd4f169 1031 0, /* bitpos */
f9c6b907 1032 complain_overflow_signed, /* complain_on_overflow */
805fc799 1033 ppc64_elf_toc_ha_reloc, /* special_function */
5bd4f169 1034 "R_PPC64_TOC16_HA", /* name */
b34976b6 1035 FALSE, /* partial_inplace */
5bd4f169
AM
1036 0, /* src_mask */
1037 0xffff, /* dst_mask */
b34976b6 1038 FALSE), /* pcrel_offset */
5bd4f169
AM
1039
1040 /* 64-bit relocation; insert value of TOC base (.TOC.). */
1041
1042 /* R_PPC64_TOC 51 doubleword64 .TOC. */
1043 HOWTO (R_PPC64_TOC, /* type */
1044 0, /* rightshift */
1045 4, /* size (0=byte, 1=short, 2=long, 4=64 bits) */
1046 64, /* bitsize */
b34976b6 1047 FALSE, /* pc_relative */
5bd4f169 1048 0, /* bitpos */
b80eed39 1049 complain_overflow_dont, /* complain_on_overflow */
805fc799 1050 ppc64_elf_toc64_reloc, /* special_function */
5bd4f169 1051 "R_PPC64_TOC", /* name */
b34976b6 1052 FALSE, /* partial_inplace */
5bd4f169 1053 0, /* src_mask */
f5e87a1d 1054 ONES (64), /* dst_mask */
b34976b6 1055 FALSE), /* pcrel_offset */
5bd4f169
AM
1056
1057 /* Like R_PPC64_GOT16, but also informs the link editor that the
1058 value to relocate may (!) refer to a PLT entry which the link
1059 editor (a) may replace with the symbol value. If the link editor
1060 is unable to fully resolve the symbol, it may (b) create a PLT
1061 entry and store the address to the new PLT entry in the GOT.
1062 This permits lazy resolution of function symbols at run time.
1063 The link editor may also skip all of this and just (c) emit a
1064 R_PPC64_GLOB_DAT to tie the symbol to the GOT entry. */
1065 /* FIXME: R_PPC64_PLTGOT16 not implemented. */
1066 HOWTO (R_PPC64_PLTGOT16, /* type */
1067 0, /* rightshift */
1068 1, /* size (0 = byte, 1 = short, 2 = long) */
1069 16, /* bitsize */
b34976b6 1070 FALSE, /* pc_relative */
5bd4f169
AM
1071 0, /* bitpos */
1072 complain_overflow_signed, /* complain_on_overflow */
805fc799 1073 ppc64_elf_unhandled_reloc, /* special_function */
411e1bfb
AM
1074 "R_PPC64_PLTGOT16", /* name */
1075 FALSE, /* partial_inplace */
1076 0, /* src_mask */
1077 0xffff, /* dst_mask */
1078 FALSE), /* pcrel_offset */
1079
1080 /* Like R_PPC64_PLTGOT16, but without overflow. */
1081 /* FIXME: R_PPC64_PLTGOT16_LO not implemented. */
1082 HOWTO (R_PPC64_PLTGOT16_LO, /* type */
1083 0, /* rightshift */
1084 1, /* size (0 = byte, 1 = short, 2 = long) */
1085 16, /* bitsize */
1086 FALSE, /* pc_relative */
1087 0, /* bitpos */
1088 complain_overflow_dont, /* complain_on_overflow */
1089 ppc64_elf_unhandled_reloc, /* special_function */
1090 "R_PPC64_PLTGOT16_LO", /* name */
1091 FALSE, /* partial_inplace */
1092 0, /* src_mask */
1093 0xffff, /* dst_mask */
1094 FALSE), /* pcrel_offset */
1095
1096 /* Like R_PPC64_PLT_GOT16, but using bits 16-31 of the address. */
1097 /* FIXME: R_PPC64_PLTGOT16_HI not implemented. */
1098 HOWTO (R_PPC64_PLTGOT16_HI, /* type */
1099 16, /* rightshift */
1100 1, /* size (0 = byte, 1 = short, 2 = long) */
1101 16, /* bitsize */
1102 FALSE, /* pc_relative */
1103 0, /* bitpos */
f9c6b907 1104 complain_overflow_signed, /* complain_on_overflow */
411e1bfb
AM
1105 ppc64_elf_unhandled_reloc, /* special_function */
1106 "R_PPC64_PLTGOT16_HI", /* name */
1107 FALSE, /* partial_inplace */
1108 0, /* src_mask */
1109 0xffff, /* dst_mask */
1110 FALSE), /* pcrel_offset */
1111
1112 /* Like R_PPC64_PLT_GOT16, but using bits 16-31 of the address, plus
1113 1 if the contents of the low 16 bits, treated as a signed number,
1114 is negative. */
1115 /* FIXME: R_PPC64_PLTGOT16_HA not implemented. */
1116 HOWTO (R_PPC64_PLTGOT16_HA, /* type */
1117 16, /* rightshift */
1118 1, /* size (0 = byte, 1 = short, 2 = long) */
1119 16, /* bitsize */
1120 FALSE, /* pc_relative */
1121 0, /* bitpos */
f9c6b907 1122 complain_overflow_signed, /* complain_on_overflow */
411e1bfb
AM
1123 ppc64_elf_unhandled_reloc, /* special_function */
1124 "R_PPC64_PLTGOT16_HA", /* name */
1125 FALSE, /* partial_inplace */
1126 0, /* src_mask */
1127 0xffff, /* dst_mask */
1128 FALSE), /* pcrel_offset */
1129
1130 /* Like R_PPC64_ADDR16, but for instructions with a DS field. */
1131 HOWTO (R_PPC64_ADDR16_DS, /* type */
1132 0, /* rightshift */
1133 1, /* size (0 = byte, 1 = short, 2 = long) */
1134 16, /* bitsize */
1135 FALSE, /* pc_relative */
1136 0, /* bitpos */
b80eed39 1137 complain_overflow_signed, /* complain_on_overflow */
411e1bfb
AM
1138 bfd_elf_generic_reloc, /* special_function */
1139 "R_PPC64_ADDR16_DS", /* name */
1140 FALSE, /* partial_inplace */
1141 0, /* src_mask */
1142 0xfffc, /* dst_mask */
1143 FALSE), /* pcrel_offset */
1144
1145 /* Like R_PPC64_ADDR16_LO, but for instructions with a DS field. */
1146 HOWTO (R_PPC64_ADDR16_LO_DS, /* type */
1147 0, /* rightshift */
1148 1, /* size (0 = byte, 1 = short, 2 = long) */
1149 16, /* bitsize */
1150 FALSE, /* pc_relative */
1151 0, /* bitpos */
1152 complain_overflow_dont,/* complain_on_overflow */
1153 bfd_elf_generic_reloc, /* special_function */
1154 "R_PPC64_ADDR16_LO_DS",/* name */
1155 FALSE, /* partial_inplace */
1156 0, /* src_mask */
1157 0xfffc, /* dst_mask */
1158 FALSE), /* pcrel_offset */
1159
1160 /* Like R_PPC64_GOT16, but for instructions with a DS field. */
1161 HOWTO (R_PPC64_GOT16_DS, /* type */
1162 0, /* rightshift */
1163 1, /* size (0 = byte, 1 = short, 2 = long) */
1164 16, /* bitsize */
1165 FALSE, /* pc_relative */
1166 0, /* bitpos */
1167 complain_overflow_signed, /* complain_on_overflow */
1168 ppc64_elf_unhandled_reloc, /* special_function */
1169 "R_PPC64_GOT16_DS", /* name */
1170 FALSE, /* partial_inplace */
1171 0, /* src_mask */
1172 0xfffc, /* dst_mask */
1173 FALSE), /* pcrel_offset */
1174
1175 /* Like R_PPC64_GOT16_LO, but for instructions with a DS field. */
1176 HOWTO (R_PPC64_GOT16_LO_DS, /* type */
1177 0, /* rightshift */
1178 1, /* size (0 = byte, 1 = short, 2 = long) */
1179 16, /* bitsize */
1180 FALSE, /* pc_relative */
1181 0, /* bitpos */
1182 complain_overflow_dont, /* complain_on_overflow */
1183 ppc64_elf_unhandled_reloc, /* special_function */
1184 "R_PPC64_GOT16_LO_DS", /* name */
1185 FALSE, /* partial_inplace */
1186 0, /* src_mask */
1187 0xfffc, /* dst_mask */
1188 FALSE), /* pcrel_offset */
1189
1190 /* Like R_PPC64_PLT16_LO, but for instructions with a DS field. */
1191 HOWTO (R_PPC64_PLT16_LO_DS, /* type */
1192 0, /* rightshift */
1193 1, /* size (0 = byte, 1 = short, 2 = long) */
1194 16, /* bitsize */
1195 FALSE, /* pc_relative */
1196 0, /* bitpos */
1197 complain_overflow_dont, /* complain_on_overflow */
1198 ppc64_elf_unhandled_reloc, /* special_function */
1199 "R_PPC64_PLT16_LO_DS", /* name */
1200 FALSE, /* partial_inplace */
1201 0, /* src_mask */
1202 0xfffc, /* dst_mask */
1203 FALSE), /* pcrel_offset */
1204
1205 /* Like R_PPC64_SECTOFF, but for instructions with a DS field. */
1206 HOWTO (R_PPC64_SECTOFF_DS, /* type */
1207 0, /* rightshift */
1208 1, /* size (0 = byte, 1 = short, 2 = long) */
1209 16, /* bitsize */
1210 FALSE, /* pc_relative */
1211 0, /* bitpos */
b80eed39 1212 complain_overflow_signed, /* complain_on_overflow */
411e1bfb
AM
1213 ppc64_elf_sectoff_reloc, /* special_function */
1214 "R_PPC64_SECTOFF_DS", /* name */
1215 FALSE, /* partial_inplace */
1216 0, /* src_mask */
1217 0xfffc, /* dst_mask */
1218 FALSE), /* pcrel_offset */
1219
1220 /* Like R_PPC64_SECTOFF_LO, but for instructions with a DS field. */
1221 HOWTO (R_PPC64_SECTOFF_LO_DS, /* type */
1222 0, /* rightshift */
1223 1, /* size (0 = byte, 1 = short, 2 = long) */
1224 16, /* bitsize */
1225 FALSE, /* pc_relative */
1226 0, /* bitpos */
1227 complain_overflow_dont, /* complain_on_overflow */
1228 ppc64_elf_sectoff_reloc, /* special_function */
1229 "R_PPC64_SECTOFF_LO_DS",/* name */
1230 FALSE, /* partial_inplace */
1231 0, /* src_mask */
1232 0xfffc, /* dst_mask */
1233 FALSE), /* pcrel_offset */
1234
1235 /* Like R_PPC64_TOC16, but for instructions with a DS field. */
1236 HOWTO (R_PPC64_TOC16_DS, /* type */
1237 0, /* rightshift */
1238 1, /* size (0 = byte, 1 = short, 2 = long) */
1239 16, /* bitsize */
1240 FALSE, /* pc_relative */
1241 0, /* bitpos */
1242 complain_overflow_signed, /* complain_on_overflow */
1243 ppc64_elf_toc_reloc, /* special_function */
1244 "R_PPC64_TOC16_DS", /* name */
1245 FALSE, /* partial_inplace */
1246 0, /* src_mask */
1247 0xfffc, /* dst_mask */
1248 FALSE), /* pcrel_offset */
1249
1250 /* Like R_PPC64_TOC16_LO, but for instructions with a DS field. */
1251 HOWTO (R_PPC64_TOC16_LO_DS, /* type */
1252 0, /* rightshift */
1253 1, /* size (0 = byte, 1 = short, 2 = long) */
1254 16, /* bitsize */
1255 FALSE, /* pc_relative */
1256 0, /* bitpos */
1257 complain_overflow_dont, /* complain_on_overflow */
1258 ppc64_elf_toc_reloc, /* special_function */
1259 "R_PPC64_TOC16_LO_DS", /* name */
1260 FALSE, /* partial_inplace */
1261 0, /* src_mask */
1262 0xfffc, /* dst_mask */
1263 FALSE), /* pcrel_offset */
1264
1265 /* Like R_PPC64_PLTGOT16, but for instructions with a DS field. */
1266 /* FIXME: R_PPC64_PLTGOT16_DS not implemented. */
6bfdb61b 1267 HOWTO (R_PPC64_PLTGOT16_DS, /* type */
411e1bfb
AM
1268 0, /* rightshift */
1269 1, /* size (0 = byte, 1 = short, 2 = long) */
1270 16, /* bitsize */
1271 FALSE, /* pc_relative */
1272 0, /* bitpos */
1273 complain_overflow_signed, /* complain_on_overflow */
1274 ppc64_elf_unhandled_reloc, /* special_function */
1275 "R_PPC64_PLTGOT16_DS", /* name */
1276 FALSE, /* partial_inplace */
1277 0, /* src_mask */
1278 0xfffc, /* dst_mask */
1279 FALSE), /* pcrel_offset */
1280
1281 /* Like R_PPC64_PLTGOT16_LO, but for instructions with a DS field. */
1282 /* FIXME: R_PPC64_PLTGOT16_LO not implemented. */
1283 HOWTO (R_PPC64_PLTGOT16_LO_DS,/* type */
1284 0, /* rightshift */
1285 1, /* size (0 = byte, 1 = short, 2 = long) */
1286 16, /* bitsize */
1287 FALSE, /* pc_relative */
1288 0, /* bitpos */
1289 complain_overflow_dont, /* complain_on_overflow */
1290 ppc64_elf_unhandled_reloc, /* special_function */
1291 "R_PPC64_PLTGOT16_LO_DS",/* name */
1292 FALSE, /* partial_inplace */
1293 0, /* src_mask */
1294 0xfffc, /* dst_mask */
1295 FALSE), /* pcrel_offset */
1296
727fc41e 1297 /* Marker relocs for TLS. */
411e1bfb
AM
1298 HOWTO (R_PPC64_TLS,
1299 0, /* rightshift */
1300 2, /* size (0 = byte, 1 = short, 2 = long) */
1301 32, /* bitsize */
1302 FALSE, /* pc_relative */
1303 0, /* bitpos */
1304 complain_overflow_dont, /* complain_on_overflow */
1305 bfd_elf_generic_reloc, /* special_function */
1306 "R_PPC64_TLS", /* name */
1307 FALSE, /* partial_inplace */
1308 0, /* src_mask */
1309 0, /* dst_mask */
1310 FALSE), /* pcrel_offset */
1311
727fc41e
AM
1312 HOWTO (R_PPC64_TLSGD,
1313 0, /* rightshift */
1314 2, /* size (0 = byte, 1 = short, 2 = long) */
1315 32, /* bitsize */
1316 FALSE, /* pc_relative */
1317 0, /* bitpos */
1318 complain_overflow_dont, /* complain_on_overflow */
1319 bfd_elf_generic_reloc, /* special_function */
1320 "R_PPC64_TLSGD", /* name */
1321 FALSE, /* partial_inplace */
1322 0, /* src_mask */
1323 0, /* dst_mask */
1324 FALSE), /* pcrel_offset */
1325
1326 HOWTO (R_PPC64_TLSLD,
1327 0, /* rightshift */
1328 2, /* size (0 = byte, 1 = short, 2 = long) */
1329 32, /* bitsize */
1330 FALSE, /* pc_relative */
1331 0, /* bitpos */
1332 complain_overflow_dont, /* complain_on_overflow */
1333 bfd_elf_generic_reloc, /* special_function */
1334 "R_PPC64_TLSLD", /* name */
1335 FALSE, /* partial_inplace */
1336 0, /* src_mask */
1337 0, /* dst_mask */
1338 FALSE), /* pcrel_offset */
1339
23cedd1d
AM
1340 /* Marker reloc for optimizing r2 save in prologue rather than on
1341 each plt call stub. */
3b421ab3
AM
1342 HOWTO (R_PPC64_TOCSAVE,
1343 0, /* rightshift */
1344 2, /* size (0 = byte, 1 = short, 2 = long) */
1345 32, /* bitsize */
1346 FALSE, /* pc_relative */
1347 0, /* bitpos */
1348 complain_overflow_dont, /* complain_on_overflow */
1349 bfd_elf_generic_reloc, /* special_function */
1350 "R_PPC64_TOCSAVE", /* name */
1351 FALSE, /* partial_inplace */
1352 0, /* src_mask */
1353 0, /* dst_mask */
1354 FALSE), /* pcrel_offset */
1355
23cedd1d
AM
1356 /* Marker relocs on inline plt call instructions. */
1357 HOWTO (R_PPC64_PLTSEQ,
1358 0, /* rightshift */
1359 2, /* size (0 = byte, 1 = short, 2 = long) */
1360 32, /* bitsize */
1361 FALSE, /* pc_relative */
1362 0, /* bitpos */
1363 complain_overflow_dont, /* complain_on_overflow */
1364 bfd_elf_generic_reloc, /* special_function */
1365 "R_PPC64_PLTSEQ", /* name */
1366 FALSE, /* partial_inplace */
1367 0, /* src_mask */
1368 0, /* dst_mask */
1369 FALSE), /* pcrel_offset */
1370
1371 HOWTO (R_PPC64_PLTCALL,
1372 0, /* rightshift */
1373 2, /* size (0 = byte, 1 = short, 2 = long) */
1374 32, /* bitsize */
1375 FALSE, /* pc_relative */
1376 0, /* bitpos */
1377 complain_overflow_dont, /* complain_on_overflow */
1378 bfd_elf_generic_reloc, /* special_function */
1379 "R_PPC64_PLTCALL", /* name */
1380 FALSE, /* partial_inplace */
1381 0, /* src_mask */
1382 0, /* dst_mask */
1383 FALSE), /* pcrel_offset */
1384
411e1bfb
AM
1385 /* Computes the load module index of the load module that contains the
1386 definition of its TLS sym. */
1387 HOWTO (R_PPC64_DTPMOD64,
1388 0, /* rightshift */
1389 4, /* size (0 = byte, 1 = short, 2 = long) */
1390 64, /* bitsize */
1391 FALSE, /* pc_relative */
1392 0, /* bitpos */
1393 complain_overflow_dont, /* complain_on_overflow */
1394 ppc64_elf_unhandled_reloc, /* special_function */
1395 "R_PPC64_DTPMOD64", /* name */
1396 FALSE, /* partial_inplace */
1397 0, /* src_mask */
1398 ONES (64), /* dst_mask */
1399 FALSE), /* pcrel_offset */
1400
1401 /* Computes a dtv-relative displacement, the difference between the value
1402 of sym+add and the base address of the thread-local storage block that
1403 contains the definition of sym, minus 0x8000. */
1404 HOWTO (R_PPC64_DTPREL64,
1405 0, /* rightshift */
1406 4, /* size (0 = byte, 1 = short, 2 = long) */
1407 64, /* bitsize */
1408 FALSE, /* pc_relative */
1409 0, /* bitpos */
1410 complain_overflow_dont, /* complain_on_overflow */
1411 ppc64_elf_unhandled_reloc, /* special_function */
1412 "R_PPC64_DTPREL64", /* name */
1413 FALSE, /* partial_inplace */
1414 0, /* src_mask */
1415 ONES (64), /* dst_mask */
1416 FALSE), /* pcrel_offset */
1417
1418 /* A 16 bit dtprel reloc. */
1419 HOWTO (R_PPC64_DTPREL16,
1420 0, /* rightshift */
1421 1, /* size (0 = byte, 1 = short, 2 = long) */
1422 16, /* bitsize */
1423 FALSE, /* pc_relative */
1424 0, /* bitpos */
1425 complain_overflow_signed, /* complain_on_overflow */
1426 ppc64_elf_unhandled_reloc, /* special_function */
1427 "R_PPC64_DTPREL16", /* name */
1428 FALSE, /* partial_inplace */
1429 0, /* src_mask */
1430 0xffff, /* dst_mask */
1431 FALSE), /* pcrel_offset */
1432
1433 /* Like DTPREL16, but no overflow. */
1434 HOWTO (R_PPC64_DTPREL16_LO,
1435 0, /* rightshift */
1436 1, /* size (0 = byte, 1 = short, 2 = long) */
1437 16, /* bitsize */
1438 FALSE, /* pc_relative */
1439 0, /* bitpos */
1440 complain_overflow_dont, /* complain_on_overflow */
1441 ppc64_elf_unhandled_reloc, /* special_function */
1442 "R_PPC64_DTPREL16_LO", /* name */
1443 FALSE, /* partial_inplace */
1444 0, /* src_mask */
1445 0xffff, /* dst_mask */
1446 FALSE), /* pcrel_offset */
1447
1448 /* Like DTPREL16_LO, but next higher group of 16 bits. */
1449 HOWTO (R_PPC64_DTPREL16_HI,
1450 16, /* rightshift */
1451 1, /* size (0 = byte, 1 = short, 2 = long) */
1452 16, /* bitsize */
1453 FALSE, /* pc_relative */
1454 0, /* bitpos */
f9c6b907 1455 complain_overflow_signed, /* complain_on_overflow */
411e1bfb
AM
1456 ppc64_elf_unhandled_reloc, /* special_function */
1457 "R_PPC64_DTPREL16_HI", /* name */
1458 FALSE, /* partial_inplace */
1459 0, /* src_mask */
1460 0xffff, /* dst_mask */
1461 FALSE), /* pcrel_offset */
1462
1463 /* Like DTPREL16_HI, but adjust for low 16 bits. */
1464 HOWTO (R_PPC64_DTPREL16_HA,
1465 16, /* rightshift */
1466 1, /* size (0 = byte, 1 = short, 2 = long) */
1467 16, /* bitsize */
1468 FALSE, /* pc_relative */
1469 0, /* bitpos */
f9c6b907 1470 complain_overflow_signed, /* complain_on_overflow */
411e1bfb
AM
1471 ppc64_elf_unhandled_reloc, /* special_function */
1472 "R_PPC64_DTPREL16_HA", /* name */
1473 FALSE, /* partial_inplace */
1474 0, /* src_mask */
1475 0xffff, /* dst_mask */
1476 FALSE), /* pcrel_offset */
1477
1478 /* Like DTPREL16_HI, but next higher group of 16 bits. */
1479 HOWTO (R_PPC64_DTPREL16_HIGHER,
1480 32, /* rightshift */
1481 1, /* size (0 = byte, 1 = short, 2 = long) */
1482 16, /* bitsize */
1483 FALSE, /* pc_relative */
1484 0, /* bitpos */
1485 complain_overflow_dont, /* complain_on_overflow */
1486 ppc64_elf_unhandled_reloc, /* special_function */
1487 "R_PPC64_DTPREL16_HIGHER", /* name */
1488 FALSE, /* partial_inplace */
1489 0, /* src_mask */
1490 0xffff, /* dst_mask */
1491 FALSE), /* pcrel_offset */
1492
1493 /* Like DTPREL16_HIGHER, but adjust for low 16 bits. */
1494 HOWTO (R_PPC64_DTPREL16_HIGHERA,
1495 32, /* rightshift */
1496 1, /* size (0 = byte, 1 = short, 2 = long) */
1497 16, /* bitsize */
1498 FALSE, /* pc_relative */
1499 0, /* bitpos */
1500 complain_overflow_dont, /* complain_on_overflow */
1501 ppc64_elf_unhandled_reloc, /* special_function */
1502 "R_PPC64_DTPREL16_HIGHERA", /* name */
1503 FALSE, /* partial_inplace */
1504 0, /* src_mask */
1505 0xffff, /* dst_mask */
1506 FALSE), /* pcrel_offset */
1507
1508 /* Like DTPREL16_HIGHER, but next higher group of 16 bits. */
1509 HOWTO (R_PPC64_DTPREL16_HIGHEST,
1510 48, /* rightshift */
1511 1, /* size (0 = byte, 1 = short, 2 = long) */
1512 16, /* bitsize */
1513 FALSE, /* pc_relative */
1514 0, /* bitpos */
1515 complain_overflow_dont, /* complain_on_overflow */
1516 ppc64_elf_unhandled_reloc, /* special_function */
1517 "R_PPC64_DTPREL16_HIGHEST", /* name */
1518 FALSE, /* partial_inplace */
1519 0, /* src_mask */
1520 0xffff, /* dst_mask */
1521 FALSE), /* pcrel_offset */
1522
1523 /* Like DTPREL16_HIGHEST, but adjust for low 16 bits. */
1524 HOWTO (R_PPC64_DTPREL16_HIGHESTA,
1525 48, /* rightshift */
1526 1, /* size (0 = byte, 1 = short, 2 = long) */
1527 16, /* bitsize */
1528 FALSE, /* pc_relative */
1529 0, /* bitpos */
1530 complain_overflow_dont, /* complain_on_overflow */
1531 ppc64_elf_unhandled_reloc, /* special_function */
1532 "R_PPC64_DTPREL16_HIGHESTA", /* name */
1533 FALSE, /* partial_inplace */
1534 0, /* src_mask */
1535 0xffff, /* dst_mask */
1536 FALSE), /* pcrel_offset */
1537
1538 /* Like DTPREL16, but for insns with a DS field. */
1539 HOWTO (R_PPC64_DTPREL16_DS,
1540 0, /* rightshift */
1541 1, /* size (0 = byte, 1 = short, 2 = long) */
1542 16, /* bitsize */
1543 FALSE, /* pc_relative */
1544 0, /* bitpos */
1545 complain_overflow_signed, /* complain_on_overflow */
1546 ppc64_elf_unhandled_reloc, /* special_function */
1547 "R_PPC64_DTPREL16_DS", /* name */
1548 FALSE, /* partial_inplace */
1549 0, /* src_mask */
1550 0xfffc, /* dst_mask */
1551 FALSE), /* pcrel_offset */
1552
1553 /* Like DTPREL16_DS, but no overflow. */
1554 HOWTO (R_PPC64_DTPREL16_LO_DS,
1555 0, /* rightshift */
1556 1, /* size (0 = byte, 1 = short, 2 = long) */
1557 16, /* bitsize */
1558 FALSE, /* pc_relative */
1559 0, /* bitpos */
1560 complain_overflow_dont, /* complain_on_overflow */
1561 ppc64_elf_unhandled_reloc, /* special_function */
1562 "R_PPC64_DTPREL16_LO_DS", /* name */
1563 FALSE, /* partial_inplace */
1564 0, /* src_mask */
1565 0xfffc, /* dst_mask */
1566 FALSE), /* pcrel_offset */
1567
1568 /* Computes a tp-relative displacement, the difference between the value of
1569 sym+add and the value of the thread pointer (r13). */
1570 HOWTO (R_PPC64_TPREL64,
1571 0, /* rightshift */
1572 4, /* size (0 = byte, 1 = short, 2 = long) */
1573 64, /* bitsize */
1574 FALSE, /* pc_relative */
1575 0, /* bitpos */
1576 complain_overflow_dont, /* complain_on_overflow */
1577 ppc64_elf_unhandled_reloc, /* special_function */
1578 "R_PPC64_TPREL64", /* name */
1579 FALSE, /* partial_inplace */
1580 0, /* src_mask */
1581 ONES (64), /* dst_mask */
1582 FALSE), /* pcrel_offset */
1583
1584 /* A 16 bit tprel reloc. */
1585 HOWTO (R_PPC64_TPREL16,
1586 0, /* rightshift */
1587 1, /* size (0 = byte, 1 = short, 2 = long) */
1588 16, /* bitsize */
1589 FALSE, /* pc_relative */
1590 0, /* bitpos */
1591 complain_overflow_signed, /* complain_on_overflow */
1592 ppc64_elf_unhandled_reloc, /* special_function */
1593 "R_PPC64_TPREL16", /* name */
1594 FALSE, /* partial_inplace */
1595 0, /* src_mask */
1596 0xffff, /* dst_mask */
1597 FALSE), /* pcrel_offset */
1598
1599 /* Like TPREL16, but no overflow. */
1600 HOWTO (R_PPC64_TPREL16_LO,
1601 0, /* rightshift */
1602 1, /* size (0 = byte, 1 = short, 2 = long) */
1603 16, /* bitsize */
1604 FALSE, /* pc_relative */
1605 0, /* bitpos */
1606 complain_overflow_dont, /* complain_on_overflow */
1607 ppc64_elf_unhandled_reloc, /* special_function */
1608 "R_PPC64_TPREL16_LO", /* name */
1609 FALSE, /* partial_inplace */
1610 0, /* src_mask */
1611 0xffff, /* dst_mask */
1612 FALSE), /* pcrel_offset */
1613
1614 /* Like TPREL16_LO, but next higher group of 16 bits. */
1615 HOWTO (R_PPC64_TPREL16_HI,
1616 16, /* rightshift */
1617 1, /* size (0 = byte, 1 = short, 2 = long) */
1618 16, /* bitsize */
1619 FALSE, /* pc_relative */
1620 0, /* bitpos */
f9c6b907 1621 complain_overflow_signed, /* complain_on_overflow */
411e1bfb
AM
1622 ppc64_elf_unhandled_reloc, /* special_function */
1623 "R_PPC64_TPREL16_HI", /* name */
1624 FALSE, /* partial_inplace */
1625 0, /* src_mask */
1626 0xffff, /* dst_mask */
1627 FALSE), /* pcrel_offset */
1628
1629 /* Like TPREL16_HI, but adjust for low 16 bits. */
1630 HOWTO (R_PPC64_TPREL16_HA,
1631 16, /* rightshift */
1632 1, /* size (0 = byte, 1 = short, 2 = long) */
1633 16, /* bitsize */
1634 FALSE, /* pc_relative */
1635 0, /* bitpos */
f9c6b907 1636 complain_overflow_signed, /* complain_on_overflow */
411e1bfb
AM
1637 ppc64_elf_unhandled_reloc, /* special_function */
1638 "R_PPC64_TPREL16_HA", /* name */
1639 FALSE, /* partial_inplace */
1640 0, /* src_mask */
1641 0xffff, /* dst_mask */
1642 FALSE), /* pcrel_offset */
1643
1644 /* Like TPREL16_HI, but next higher group of 16 bits. */
1645 HOWTO (R_PPC64_TPREL16_HIGHER,
1646 32, /* rightshift */
1647 1, /* size (0 = byte, 1 = short, 2 = long) */
1648 16, /* bitsize */
1649 FALSE, /* pc_relative */
1650 0, /* bitpos */
1651 complain_overflow_dont, /* complain_on_overflow */
1652 ppc64_elf_unhandled_reloc, /* special_function */
1653 "R_PPC64_TPREL16_HIGHER", /* name */
1654 FALSE, /* partial_inplace */
1655 0, /* src_mask */
1656 0xffff, /* dst_mask */
1657 FALSE), /* pcrel_offset */
1658
1659 /* Like TPREL16_HIGHER, but adjust for low 16 bits. */
1660 HOWTO (R_PPC64_TPREL16_HIGHERA,
1661 32, /* rightshift */
1662 1, /* size (0 = byte, 1 = short, 2 = long) */
1663 16, /* bitsize */
1664 FALSE, /* pc_relative */
1665 0, /* bitpos */
1666 complain_overflow_dont, /* complain_on_overflow */
1667 ppc64_elf_unhandled_reloc, /* special_function */
1668 "R_PPC64_TPREL16_HIGHERA", /* name */
1669 FALSE, /* partial_inplace */
1670 0, /* src_mask */
1671 0xffff, /* dst_mask */
1672 FALSE), /* pcrel_offset */
1673
1674 /* Like TPREL16_HIGHER, but next higher group of 16 bits. */
1675 HOWTO (R_PPC64_TPREL16_HIGHEST,
1676 48, /* rightshift */
1677 1, /* size (0 = byte, 1 = short, 2 = long) */
1678 16, /* bitsize */
1679 FALSE, /* pc_relative */
1680 0, /* bitpos */
1681 complain_overflow_dont, /* complain_on_overflow */
1682 ppc64_elf_unhandled_reloc, /* special_function */
1683 "R_PPC64_TPREL16_HIGHEST", /* name */
1684 FALSE, /* partial_inplace */
1685 0, /* src_mask */
1686 0xffff, /* dst_mask */
1687 FALSE), /* pcrel_offset */
1688
1689 /* Like TPREL16_HIGHEST, but adjust for low 16 bits. */
1690 HOWTO (R_PPC64_TPREL16_HIGHESTA,
1691 48, /* rightshift */
1692 1, /* size (0 = byte, 1 = short, 2 = long) */
1693 16, /* bitsize */
1694 FALSE, /* pc_relative */
1695 0, /* bitpos */
1696 complain_overflow_dont, /* complain_on_overflow */
1697 ppc64_elf_unhandled_reloc, /* special_function */
1698 "R_PPC64_TPREL16_HIGHESTA", /* name */
1699 FALSE, /* partial_inplace */
1700 0, /* src_mask */
1701 0xffff, /* dst_mask */
1702 FALSE), /* pcrel_offset */
1703
1704 /* Like TPREL16, but for insns with a DS field. */
1705 HOWTO (R_PPC64_TPREL16_DS,
1706 0, /* rightshift */
1707 1, /* size (0 = byte, 1 = short, 2 = long) */
1708 16, /* bitsize */
1709 FALSE, /* pc_relative */
1710 0, /* bitpos */
1711 complain_overflow_signed, /* complain_on_overflow */
1712 ppc64_elf_unhandled_reloc, /* special_function */
1713 "R_PPC64_TPREL16_DS", /* name */
1714 FALSE, /* partial_inplace */
1715 0, /* src_mask */
1716 0xfffc, /* dst_mask */
1717 FALSE), /* pcrel_offset */
1718
1719 /* Like TPREL16_DS, but no overflow. */
1720 HOWTO (R_PPC64_TPREL16_LO_DS,
1721 0, /* rightshift */
1722 1, /* size (0 = byte, 1 = short, 2 = long) */
1723 16, /* bitsize */
1724 FALSE, /* pc_relative */
1725 0, /* bitpos */
1726 complain_overflow_dont, /* complain_on_overflow */
1727 ppc64_elf_unhandled_reloc, /* special_function */
1728 "R_PPC64_TPREL16_LO_DS", /* name */
1729 FALSE, /* partial_inplace */
1730 0, /* src_mask */
1731 0xfffc, /* dst_mask */
1732 FALSE), /* pcrel_offset */
1733
1734 /* Allocates two contiguous entries in the GOT to hold a tls_index structure,
1735 with values (sym+add)@dtpmod and (sym+add)@dtprel, and computes the offset
1736 to the first entry relative to the TOC base (r2). */
1737 HOWTO (R_PPC64_GOT_TLSGD16,
1738 0, /* rightshift */
1739 1, /* size (0 = byte, 1 = short, 2 = long) */
1740 16, /* bitsize */
1741 FALSE, /* pc_relative */
1742 0, /* bitpos */
1743 complain_overflow_signed, /* complain_on_overflow */
1744 ppc64_elf_unhandled_reloc, /* special_function */
1745 "R_PPC64_GOT_TLSGD16", /* name */
b34976b6 1746 FALSE, /* partial_inplace */
5bd4f169
AM
1747 0, /* src_mask */
1748 0xffff, /* dst_mask */
b34976b6 1749 FALSE), /* pcrel_offset */
5bd4f169 1750
411e1bfb
AM
1751 /* Like GOT_TLSGD16, but no overflow. */
1752 HOWTO (R_PPC64_GOT_TLSGD16_LO,
5bd4f169
AM
1753 0, /* rightshift */
1754 1, /* size (0 = byte, 1 = short, 2 = long) */
1755 16, /* bitsize */
b34976b6 1756 FALSE, /* pc_relative */
5bd4f169
AM
1757 0, /* bitpos */
1758 complain_overflow_dont, /* complain_on_overflow */
805fc799 1759 ppc64_elf_unhandled_reloc, /* special_function */
411e1bfb 1760 "R_PPC64_GOT_TLSGD16_LO", /* name */
b34976b6 1761 FALSE, /* partial_inplace */
5bd4f169
AM
1762 0, /* src_mask */
1763 0xffff, /* dst_mask */
b34976b6 1764 FALSE), /* pcrel_offset */
5bd4f169 1765
411e1bfb
AM
1766 /* Like GOT_TLSGD16_LO, but next higher group of 16 bits. */
1767 HOWTO (R_PPC64_GOT_TLSGD16_HI,
5bd4f169
AM
1768 16, /* rightshift */
1769 1, /* size (0 = byte, 1 = short, 2 = long) */
1770 16, /* bitsize */
b34976b6 1771 FALSE, /* pc_relative */
5bd4f169 1772 0, /* bitpos */
f9c6b907 1773 complain_overflow_signed, /* complain_on_overflow */
805fc799 1774 ppc64_elf_unhandled_reloc, /* special_function */
411e1bfb 1775 "R_PPC64_GOT_TLSGD16_HI", /* name */
b34976b6 1776 FALSE, /* partial_inplace */
5bd4f169
AM
1777 0, /* src_mask */
1778 0xffff, /* dst_mask */
b34976b6 1779 FALSE), /* pcrel_offset */
5bd4f169 1780
411e1bfb
AM
1781 /* Like GOT_TLSGD16_HI, but adjust for low 16 bits. */
1782 HOWTO (R_PPC64_GOT_TLSGD16_HA,
5bd4f169
AM
1783 16, /* rightshift */
1784 1, /* size (0 = byte, 1 = short, 2 = long) */
1785 16, /* bitsize */
b34976b6 1786 FALSE, /* pc_relative */
5bd4f169 1787 0, /* bitpos */
f9c6b907 1788 complain_overflow_signed, /* complain_on_overflow */
805fc799 1789 ppc64_elf_unhandled_reloc, /* special_function */
411e1bfb 1790 "R_PPC64_GOT_TLSGD16_HA", /* name */
b34976b6 1791 FALSE, /* partial_inplace */
5bd4f169
AM
1792 0, /* src_mask */
1793 0xffff, /* dst_mask */
b34976b6 1794 FALSE), /* pcrel_offset */
5bd4f169 1795
411e1bfb
AM
1796 /* Allocates two contiguous entries in the GOT to hold a tls_index structure,
1797 with values (sym+add)@dtpmod and zero, and computes the offset to the
1798 first entry relative to the TOC base (r2). */
1799 HOWTO (R_PPC64_GOT_TLSLD16,
5bd4f169
AM
1800 0, /* rightshift */
1801 1, /* size (0 = byte, 1 = short, 2 = long) */
1802 16, /* bitsize */
b34976b6 1803 FALSE, /* pc_relative */
5bd4f169 1804 0, /* bitpos */
411e1bfb
AM
1805 complain_overflow_signed, /* complain_on_overflow */
1806 ppc64_elf_unhandled_reloc, /* special_function */
1807 "R_PPC64_GOT_TLSLD16", /* name */
b34976b6 1808 FALSE, /* partial_inplace */
d006db6c 1809 0, /* src_mask */
411e1bfb 1810 0xffff, /* dst_mask */
b34976b6 1811 FALSE), /* pcrel_offset */
5bd4f169 1812
411e1bfb
AM
1813 /* Like GOT_TLSLD16, but no overflow. */
1814 HOWTO (R_PPC64_GOT_TLSLD16_LO,
5bd4f169
AM
1815 0, /* rightshift */
1816 1, /* size (0 = byte, 1 = short, 2 = long) */
1817 16, /* bitsize */
b34976b6 1818 FALSE, /* pc_relative */
5bd4f169 1819 0, /* bitpos */
411e1bfb
AM
1820 complain_overflow_dont, /* complain_on_overflow */
1821 ppc64_elf_unhandled_reloc, /* special_function */
1822 "R_PPC64_GOT_TLSLD16_LO", /* name */
b34976b6 1823 FALSE, /* partial_inplace */
d006db6c 1824 0, /* src_mask */
411e1bfb 1825 0xffff, /* dst_mask */
b34976b6 1826 FALSE), /* pcrel_offset */
5bd4f169 1827
411e1bfb
AM
1828 /* Like GOT_TLSLD16_LO, but next higher group of 16 bits. */
1829 HOWTO (R_PPC64_GOT_TLSLD16_HI,
1830 16, /* rightshift */
5bd4f169
AM
1831 1, /* size (0 = byte, 1 = short, 2 = long) */
1832 16, /* bitsize */
b34976b6 1833 FALSE, /* pc_relative */
5bd4f169 1834 0, /* bitpos */
f9c6b907 1835 complain_overflow_signed, /* complain_on_overflow */
805fc799 1836 ppc64_elf_unhandled_reloc, /* special_function */
411e1bfb 1837 "R_PPC64_GOT_TLSLD16_HI", /* name */
b34976b6 1838 FALSE, /* partial_inplace */
d006db6c 1839 0, /* src_mask */
411e1bfb 1840 0xffff, /* dst_mask */
b34976b6 1841 FALSE), /* pcrel_offset */
5bd4f169 1842
411e1bfb
AM
1843 /* Like GOT_TLSLD16_HI, but adjust for low 16 bits. */
1844 HOWTO (R_PPC64_GOT_TLSLD16_HA,
1845 16, /* rightshift */
5bd4f169
AM
1846 1, /* size (0 = byte, 1 = short, 2 = long) */
1847 16, /* bitsize */
b34976b6 1848 FALSE, /* pc_relative */
5bd4f169 1849 0, /* bitpos */
f9c6b907 1850 complain_overflow_signed, /* complain_on_overflow */
805fc799 1851 ppc64_elf_unhandled_reloc, /* special_function */
411e1bfb 1852 "R_PPC64_GOT_TLSLD16_HA", /* name */
b34976b6 1853 FALSE, /* partial_inplace */
d006db6c 1854 0, /* src_mask */
411e1bfb 1855 0xffff, /* dst_mask */
b34976b6 1856 FALSE), /* pcrel_offset */
5bd4f169 1857
411e1bfb
AM
1858 /* Allocates an entry in the GOT with value (sym+add)@dtprel, and computes
1859 the offset to the entry relative to the TOC base (r2). */
1860 HOWTO (R_PPC64_GOT_DTPREL16_DS,
5bd4f169
AM
1861 0, /* rightshift */
1862 1, /* size (0 = byte, 1 = short, 2 = long) */
1863 16, /* bitsize */
b34976b6 1864 FALSE, /* pc_relative */
5bd4f169 1865 0, /* bitpos */
411e1bfb 1866 complain_overflow_signed, /* complain_on_overflow */
805fc799 1867 ppc64_elf_unhandled_reloc, /* special_function */
411e1bfb 1868 "R_PPC64_GOT_DTPREL16_DS", /* name */
b34976b6 1869 FALSE, /* partial_inplace */
d006db6c 1870 0, /* src_mask */
5bd4f169 1871 0xfffc, /* dst_mask */
b34976b6 1872 FALSE), /* pcrel_offset */
5bd4f169 1873
411e1bfb
AM
1874 /* Like GOT_DTPREL16_DS, but no overflow. */
1875 HOWTO (R_PPC64_GOT_DTPREL16_LO_DS,
5bd4f169 1876 0, /* rightshift */
c061c2d8
AM
1877 1, /* size (0 = byte, 1 = short, 2 = long) */
1878 16, /* bitsize */
b34976b6 1879 FALSE, /* pc_relative */
5bd4f169 1880 0, /* bitpos */
411e1bfb
AM
1881 complain_overflow_dont, /* complain_on_overflow */
1882 ppc64_elf_unhandled_reloc, /* special_function */
1883 "R_PPC64_GOT_DTPREL16_LO_DS", /* name */
b34976b6 1884 FALSE, /* partial_inplace */
d006db6c 1885 0, /* src_mask */
c061c2d8 1886 0xfffc, /* dst_mask */
b34976b6 1887 FALSE), /* pcrel_offset */
5bd4f169 1888
411e1bfb
AM
1889 /* Like GOT_DTPREL16_LO_DS, but next higher group of 16 bits. */
1890 HOWTO (R_PPC64_GOT_DTPREL16_HI,
1891 16, /* rightshift */
5bd4f169
AM
1892 1, /* size (0 = byte, 1 = short, 2 = long) */
1893 16, /* bitsize */
b34976b6 1894 FALSE, /* pc_relative */
5bd4f169 1895 0, /* bitpos */
f9c6b907 1896 complain_overflow_signed, /* complain_on_overflow */
411e1bfb
AM
1897 ppc64_elf_unhandled_reloc, /* special_function */
1898 "R_PPC64_GOT_DTPREL16_HI", /* name */
b34976b6 1899 FALSE, /* partial_inplace */
d006db6c 1900 0, /* src_mask */
411e1bfb 1901 0xffff, /* dst_mask */
b34976b6 1902 FALSE), /* pcrel_offset */
5bd4f169 1903
411e1bfb
AM
1904 /* Like GOT_DTPREL16_HI, but adjust for low 16 bits. */
1905 HOWTO (R_PPC64_GOT_DTPREL16_HA,
1906 16, /* rightshift */
1907 1, /* size (0 = byte, 1 = short, 2 = long) */
1908 16, /* bitsize */
1909 FALSE, /* pc_relative */
1910 0, /* bitpos */
f9c6b907 1911 complain_overflow_signed, /* complain_on_overflow */
411e1bfb
AM
1912 ppc64_elf_unhandled_reloc, /* special_function */
1913 "R_PPC64_GOT_DTPREL16_HA", /* name */
1914 FALSE, /* partial_inplace */
1915 0, /* src_mask */
1916 0xffff, /* dst_mask */
1917 FALSE), /* pcrel_offset */
1918
1919 /* Allocates an entry in the GOT with value (sym+add)@tprel, and computes the
1920 offset to the entry relative to the TOC base (r2). */
1921 HOWTO (R_PPC64_GOT_TPREL16_DS,
5bd4f169
AM
1922 0, /* rightshift */
1923 1, /* size (0 = byte, 1 = short, 2 = long) */
1924 16, /* bitsize */
b34976b6 1925 FALSE, /* pc_relative */
5bd4f169
AM
1926 0, /* bitpos */
1927 complain_overflow_signed, /* complain_on_overflow */
411e1bfb
AM
1928 ppc64_elf_unhandled_reloc, /* special_function */
1929 "R_PPC64_GOT_TPREL16_DS", /* name */
b34976b6 1930 FALSE, /* partial_inplace */
d006db6c 1931 0, /* src_mask */
ad8e1ba5 1932 0xfffc, /* dst_mask */
b34976b6 1933 FALSE), /* pcrel_offset */
5bd4f169 1934
411e1bfb
AM
1935 /* Like GOT_TPREL16_DS, but no overflow. */
1936 HOWTO (R_PPC64_GOT_TPREL16_LO_DS,
5bd4f169
AM
1937 0, /* rightshift */
1938 1, /* size (0 = byte, 1 = short, 2 = long) */
1939 16, /* bitsize */
b34976b6 1940 FALSE, /* pc_relative */
5bd4f169
AM
1941 0, /* bitpos */
1942 complain_overflow_dont, /* complain_on_overflow */
411e1bfb
AM
1943 ppc64_elf_unhandled_reloc, /* special_function */
1944 "R_PPC64_GOT_TPREL16_LO_DS", /* name */
b34976b6 1945 FALSE, /* partial_inplace */
d006db6c 1946 0, /* src_mask */
ad8e1ba5 1947 0xfffc, /* dst_mask */
b34976b6 1948 FALSE), /* pcrel_offset */
5bd4f169 1949
411e1bfb
AM
1950 /* Like GOT_TPREL16_LO_DS, but next higher group of 16 bits. */
1951 HOWTO (R_PPC64_GOT_TPREL16_HI,
1952 16, /* rightshift */
5bd4f169
AM
1953 1, /* size (0 = byte, 1 = short, 2 = long) */
1954 16, /* bitsize */
b34976b6 1955 FALSE, /* pc_relative */
5bd4f169 1956 0, /* bitpos */
f9c6b907 1957 complain_overflow_signed, /* complain_on_overflow */
805fc799 1958 ppc64_elf_unhandled_reloc, /* special_function */
411e1bfb 1959 "R_PPC64_GOT_TPREL16_HI", /* name */
b34976b6 1960 FALSE, /* partial_inplace */
d006db6c 1961 0, /* src_mask */
411e1bfb 1962 0xffff, /* dst_mask */
b34976b6 1963 FALSE), /* pcrel_offset */
5bd4f169 1964
411e1bfb
AM
1965 /* Like GOT_TPREL16_HI, but adjust for low 16 bits. */
1966 HOWTO (R_PPC64_GOT_TPREL16_HA,
1967 16, /* rightshift */
5bd4f169
AM
1968 1, /* size (0 = byte, 1 = short, 2 = long) */
1969 16, /* bitsize */
b34976b6 1970 FALSE, /* pc_relative */
5bd4f169 1971 0, /* bitpos */
f9c6b907 1972 complain_overflow_signed, /* complain_on_overflow */
805fc799 1973 ppc64_elf_unhandled_reloc, /* special_function */
411e1bfb 1974 "R_PPC64_GOT_TPREL16_HA", /* name */
b34976b6 1975 FALSE, /* partial_inplace */
d006db6c 1976 0, /* src_mask */
411e1bfb 1977 0xffff, /* dst_mask */
b34976b6 1978 FALSE), /* pcrel_offset */
5bd4f169 1979
25f23106
AM
1980 HOWTO (R_PPC64_JMP_IREL, /* type */
1981 0, /* rightshift */
1982 0, /* size (0=byte, 1=short, 2=long, 4=64 bits) */
1983 0, /* bitsize */
1984 FALSE, /* pc_relative */
1985 0, /* bitpos */
1986 complain_overflow_dont, /* complain_on_overflow */
1987 ppc64_elf_unhandled_reloc, /* special_function */
1988 "R_PPC64_JMP_IREL", /* name */
1989 FALSE, /* partial_inplace */
1990 0, /* src_mask */
1991 0, /* dst_mask */
1992 FALSE), /* pcrel_offset */
1993
e054468f
AM
1994 HOWTO (R_PPC64_IRELATIVE, /* type */
1995 0, /* rightshift */
1996 4, /* size (0=byte, 1=short, 2=long, 4=64 bits) */
1997 64, /* bitsize */
1998 FALSE, /* pc_relative */
1999 0, /* bitpos */
2000 complain_overflow_dont, /* complain_on_overflow */
2001 bfd_elf_generic_reloc, /* special_function */
2002 "R_PPC64_IRELATIVE", /* name */
2003 FALSE, /* partial_inplace */
2004 0, /* src_mask */
2005 ONES (64), /* dst_mask */
2006 FALSE), /* pcrel_offset */
2007
25f23106
AM
2008 /* A 16 bit relative relocation. */
2009 HOWTO (R_PPC64_REL16, /* type */
2010 0, /* rightshift */
2011 1, /* size (0 = byte, 1 = short, 2 = long) */
2012 16, /* bitsize */
2013 TRUE, /* pc_relative */
2014 0, /* bitpos */
b80eed39 2015 complain_overflow_signed, /* complain_on_overflow */
25f23106
AM
2016 bfd_elf_generic_reloc, /* special_function */
2017 "R_PPC64_REL16", /* name */
2018 FALSE, /* partial_inplace */
2019 0, /* src_mask */
2020 0xffff, /* dst_mask */
2021 TRUE), /* pcrel_offset */
2022
2023 /* A 16 bit relative relocation without overflow. */
2024 HOWTO (R_PPC64_REL16_LO, /* type */
2025 0, /* rightshift */
2026 1, /* size (0 = byte, 1 = short, 2 = long) */
2027 16, /* bitsize */
2028 TRUE, /* pc_relative */
2029 0, /* bitpos */
2030 complain_overflow_dont,/* complain_on_overflow */
2031 bfd_elf_generic_reloc, /* special_function */
2032 "R_PPC64_REL16_LO", /* name */
2033 FALSE, /* partial_inplace */
2034 0, /* src_mask */
2035 0xffff, /* dst_mask */
2036 TRUE), /* pcrel_offset */
2037
2038 /* The high order 16 bits of a relative address. */
2039 HOWTO (R_PPC64_REL16_HI, /* type */
2040 16, /* rightshift */
2041 1, /* size (0 = byte, 1 = short, 2 = long) */
2042 16, /* bitsize */
2043 TRUE, /* pc_relative */
2044 0, /* bitpos */
f9c6b907 2045 complain_overflow_signed, /* complain_on_overflow */
25f23106
AM
2046 bfd_elf_generic_reloc, /* special_function */
2047 "R_PPC64_REL16_HI", /* name */
2048 FALSE, /* partial_inplace */
2049 0, /* src_mask */
2050 0xffff, /* dst_mask */
2051 TRUE), /* pcrel_offset */
2052
2053 /* The high order 16 bits of a relative address, plus 1 if the contents of
2054 the low 16 bits, treated as a signed number, is negative. */
2055 HOWTO (R_PPC64_REL16_HA, /* type */
2056 16, /* rightshift */
2057 1, /* size (0 = byte, 1 = short, 2 = long) */
2058 16, /* bitsize */
2059 TRUE, /* pc_relative */
2060 0, /* bitpos */
f9c6b907 2061 complain_overflow_signed, /* complain_on_overflow */
25f23106
AM
2062 ppc64_elf_ha_reloc, /* special_function */
2063 "R_PPC64_REL16_HA", /* name */
2064 FALSE, /* partial_inplace */
2065 0, /* src_mask */
2066 0xffff, /* dst_mask */
2067 TRUE), /* pcrel_offset */
2068
a680de9a
PB
2069 /* Like R_PPC64_REL16_HA but for split field in addpcis. */
2070 HOWTO (R_PPC64_REL16DX_HA, /* type */
2071 16, /* rightshift */
2072 2, /* size (0 = byte, 1 = short, 2 = long) */
2073 16, /* bitsize */
2074 TRUE, /* pc_relative */
2075 0, /* bitpos */
2076 complain_overflow_signed, /* complain_on_overflow */
2077 ppc64_elf_ha_reloc, /* special_function */
2078 "R_PPC64_REL16DX_HA", /* name */
2079 FALSE, /* partial_inplace */
2080 0, /* src_mask */
2081 0x1fffc1, /* dst_mask */
2082 TRUE), /* pcrel_offset */
2083
7ba71655
AM
2084 /* A split-field reloc for addpcis, non-relative (gas internal use only). */
2085 HOWTO (R_PPC64_16DX_HA, /* type */
2086 16, /* rightshift */
2087 2, /* size (0 = byte, 1 = short, 2 = long) */
2088 16, /* bitsize */
2089 FALSE, /* pc_relative */
2090 0, /* bitpos */
2091 complain_overflow_signed, /* complain_on_overflow */
2092 ppc64_elf_ha_reloc, /* special_function */
2093 "R_PPC64_16DX_HA", /* name */
2094 FALSE, /* partial_inplace */
2095 0, /* src_mask */
2096 0x1fffc1, /* dst_mask */
2097 FALSE), /* pcrel_offset */
2098
f9c6b907
AM
2099 /* Like R_PPC64_ADDR16_HI, but no overflow. */
2100 HOWTO (R_PPC64_ADDR16_HIGH, /* type */
2101 16, /* rightshift */
2102 1, /* size (0 = byte, 1 = short, 2 = long) */
2103 16, /* bitsize */
2104 FALSE, /* pc_relative */
2105 0, /* bitpos */
2106 complain_overflow_dont, /* complain_on_overflow */
2107 bfd_elf_generic_reloc, /* special_function */
2108 "R_PPC64_ADDR16_HIGH", /* name */
2109 FALSE, /* partial_inplace */
2110 0, /* src_mask */
2111 0xffff, /* dst_mask */
2112 FALSE), /* pcrel_offset */
2113
2114 /* Like R_PPC64_ADDR16_HA, but no overflow. */
2115 HOWTO (R_PPC64_ADDR16_HIGHA, /* type */
2116 16, /* rightshift */
2117 1, /* size (0 = byte, 1 = short, 2 = long) */
2118 16, /* bitsize */
2119 FALSE, /* pc_relative */
2120 0, /* bitpos */
2121 complain_overflow_dont, /* complain_on_overflow */
2122 ppc64_elf_ha_reloc, /* special_function */
2123 "R_PPC64_ADDR16_HIGHA", /* name */
2124 FALSE, /* partial_inplace */
2125 0, /* src_mask */
2126 0xffff, /* dst_mask */
2127 FALSE), /* pcrel_offset */
2128
2129 /* Like R_PPC64_DTPREL16_HI, but no overflow. */
2130 HOWTO (R_PPC64_DTPREL16_HIGH,
2131 16, /* rightshift */
2132 1, /* size (0 = byte, 1 = short, 2 = long) */
2133 16, /* bitsize */
2134 FALSE, /* pc_relative */
2135 0, /* bitpos */
2136 complain_overflow_dont, /* complain_on_overflow */
2137 ppc64_elf_unhandled_reloc, /* special_function */
2138 "R_PPC64_DTPREL16_HIGH", /* name */
2139 FALSE, /* partial_inplace */
2140 0, /* src_mask */
2141 0xffff, /* dst_mask */
2142 FALSE), /* pcrel_offset */
2143
2144 /* Like R_PPC64_DTPREL16_HA, but no overflow. */
2145 HOWTO (R_PPC64_DTPREL16_HIGHA,
2146 16, /* rightshift */
2147 1, /* size (0 = byte, 1 = short, 2 = long) */
2148 16, /* bitsize */
2149 FALSE, /* pc_relative */
2150 0, /* bitpos */
2151 complain_overflow_dont, /* complain_on_overflow */
2152 ppc64_elf_unhandled_reloc, /* special_function */
2153 "R_PPC64_DTPREL16_HIGHA", /* name */
2154 FALSE, /* partial_inplace */
2155 0, /* src_mask */
2156 0xffff, /* dst_mask */
2157 FALSE), /* pcrel_offset */
2158
2159 /* Like R_PPC64_TPREL16_HI, but no overflow. */
2160 HOWTO (R_PPC64_TPREL16_HIGH,
2161 16, /* rightshift */
2162 1, /* size (0 = byte, 1 = short, 2 = long) */
2163 16, /* bitsize */
2164 FALSE, /* pc_relative */
2165 0, /* bitpos */
2166 complain_overflow_dont, /* complain_on_overflow */
2167 ppc64_elf_unhandled_reloc, /* special_function */
2168 "R_PPC64_TPREL16_HIGH", /* name */
2169 FALSE, /* partial_inplace */
2170 0, /* src_mask */
2171 0xffff, /* dst_mask */
2172 FALSE), /* pcrel_offset */
2173
2174 /* Like R_PPC64_TPREL16_HA, but no overflow. */
2175 HOWTO (R_PPC64_TPREL16_HIGHA,
2176 16, /* rightshift */
2177 1, /* size (0 = byte, 1 = short, 2 = long) */
2178 16, /* bitsize */
2179 FALSE, /* pc_relative */
2180 0, /* bitpos */
2181 complain_overflow_dont, /* complain_on_overflow */
2182 ppc64_elf_unhandled_reloc, /* special_function */
2183 "R_PPC64_TPREL16_HIGHA", /* name */
2184 FALSE, /* partial_inplace */
2185 0, /* src_mask */
2186 0xffff, /* dst_mask */
2187 FALSE), /* pcrel_offset */
2188
006589cf
AM
2189 /* Marker reloc on ELFv2 large-model function entry. */
2190 HOWTO (R_PPC64_ENTRY,
2191 0, /* rightshift */
2192 2, /* size (0 = byte, 1 = short, 2 = long) */
2193 32, /* bitsize */
2194 FALSE, /* pc_relative */
2195 0, /* bitpos */
2196 complain_overflow_dont, /* complain_on_overflow */
2197 bfd_elf_generic_reloc, /* special_function */
2198 "R_PPC64_ENTRY", /* name */
2199 FALSE, /* partial_inplace */
2200 0, /* src_mask */
2201 0, /* dst_mask */
2202 FALSE), /* pcrel_offset */
2203
45965137
AM
2204 /* Like ADDR64, but use local entry point of function. */
2205 HOWTO (R_PPC64_ADDR64_LOCAL, /* type */
2206 0, /* rightshift */
2207 4, /* size (0=byte, 1=short, 2=long, 4=64 bits) */
2208 64, /* bitsize */
2209 FALSE, /* pc_relative */
2210 0, /* bitpos */
2211 complain_overflow_dont, /* complain_on_overflow */
2212 bfd_elf_generic_reloc, /* special_function */
2213 "R_PPC64_ADDR64_LOCAL", /* name */
2214 FALSE, /* partial_inplace */
2215 0, /* src_mask */
2216 ONES (64), /* dst_mask */
2217 FALSE), /* pcrel_offset */
2218
5bd4f169
AM
2219 /* GNU extension to record C++ vtable hierarchy. */
2220 HOWTO (R_PPC64_GNU_VTINHERIT, /* type */
2221 0, /* rightshift */
2222 0, /* size (0 = byte, 1 = short, 2 = long) */
2223 0, /* bitsize */
b34976b6 2224 FALSE, /* pc_relative */
5bd4f169
AM
2225 0, /* bitpos */
2226 complain_overflow_dont, /* complain_on_overflow */
2227 NULL, /* special_function */
2228 "R_PPC64_GNU_VTINHERIT", /* name */
b34976b6 2229 FALSE, /* partial_inplace */
5bd4f169
AM
2230 0, /* src_mask */
2231 0, /* dst_mask */
b34976b6 2232 FALSE), /* pcrel_offset */
5bd4f169
AM
2233
2234 /* GNU extension to record C++ vtable member usage. */
2235 HOWTO (R_PPC64_GNU_VTENTRY, /* type */
2236 0, /* rightshift */
2237 0, /* size (0 = byte, 1 = short, 2 = long) */
2238 0, /* bitsize */
b34976b6 2239 FALSE, /* pc_relative */
5bd4f169
AM
2240 0, /* bitpos */
2241 complain_overflow_dont, /* complain_on_overflow */
2242 NULL, /* special_function */
2243 "R_PPC64_GNU_VTENTRY", /* name */
b34976b6 2244 FALSE, /* partial_inplace */
5bd4f169
AM
2245 0, /* src_mask */
2246 0, /* dst_mask */
b34976b6 2247 FALSE), /* pcrel_offset */
5bd4f169
AM
2248};
2249
2250\f
2251/* Initialize the ppc64_elf_howto_table, so that linear accesses can
2252 be done. */
2253
2254static void
4ce794b7 2255ppc_howto_init (void)
5bd4f169
AM
2256{
2257 unsigned int i, type;
2258
a4b6fadd 2259 for (i = 0; i < ARRAY_SIZE (ppc64_elf_howto_raw); i++)
5bd4f169
AM
2260 {
2261 type = ppc64_elf_howto_raw[i].type;
a4b6fadd 2262 BFD_ASSERT (type < ARRAY_SIZE (ppc64_elf_howto_table));
5bd4f169
AM
2263 ppc64_elf_howto_table[type] = &ppc64_elf_howto_raw[i];
2264 }
2265}
2266
2267static reloc_howto_type *
f3185997 2268ppc64_elf_reloc_type_lookup (bfd *abfd,
4ce794b7 2269 bfd_reloc_code_real_type code)
5bd4f169 2270{
411e1bfb 2271 enum elf_ppc64_reloc_type r = R_PPC64_NONE;
5bd4f169
AM
2272
2273 if (!ppc64_elf_howto_table[R_PPC64_ADDR32])
2274 /* Initialize howto table if needed. */
2275 ppc_howto_init ();
2276
4ce794b7 2277 switch (code)
5bd4f169
AM
2278 {
2279 default:
f3185997 2280 /* xgettext:c-format */
e8f5af78 2281 _bfd_error_handler (_("%pB: unsupported relocation type %#x"), abfd, (int) code);
f3185997 2282 bfd_set_error (bfd_error_bad_value);
4ce794b7 2283 return NULL;
5bd4f169 2284
411e1bfb
AM
2285 case BFD_RELOC_NONE: r = R_PPC64_NONE;
2286 break;
2287 case BFD_RELOC_32: r = R_PPC64_ADDR32;
2288 break;
2289 case BFD_RELOC_PPC_BA26: r = R_PPC64_ADDR24;
2290 break;
2291 case BFD_RELOC_16: r = R_PPC64_ADDR16;
2292 break;
2293 case BFD_RELOC_LO16: r = R_PPC64_ADDR16_LO;
2294 break;
2295 case BFD_RELOC_HI16: r = R_PPC64_ADDR16_HI;
2296 break;
f9c6b907
AM
2297 case BFD_RELOC_PPC64_ADDR16_HIGH: r = R_PPC64_ADDR16_HIGH;
2298 break;
411e1bfb 2299 case BFD_RELOC_HI16_S: r = R_PPC64_ADDR16_HA;
5bd4f169 2300 break;
f9c6b907
AM
2301 case BFD_RELOC_PPC64_ADDR16_HIGHA: r = R_PPC64_ADDR16_HIGHA;
2302 break;
411e1bfb 2303 case BFD_RELOC_PPC_BA16: r = R_PPC64_ADDR14;
5bd4f169 2304 break;
411e1bfb 2305 case BFD_RELOC_PPC_BA16_BRTAKEN: r = R_PPC64_ADDR14_BRTAKEN;
5bd4f169 2306 break;
411e1bfb 2307 case BFD_RELOC_PPC_BA16_BRNTAKEN: r = R_PPC64_ADDR14_BRNTAKEN;
5bd4f169 2308 break;
411e1bfb 2309 case BFD_RELOC_PPC_B26: r = R_PPC64_REL24;
5bd4f169 2310 break;
411e1bfb 2311 case BFD_RELOC_PPC_B16: r = R_PPC64_REL14;
5bd4f169 2312 break;
411e1bfb 2313 case BFD_RELOC_PPC_B16_BRTAKEN: r = R_PPC64_REL14_BRTAKEN;
5bd4f169 2314 break;
411e1bfb 2315 case BFD_RELOC_PPC_B16_BRNTAKEN: r = R_PPC64_REL14_BRNTAKEN;
5bd4f169 2316 break;
411e1bfb 2317 case BFD_RELOC_16_GOTOFF: r = R_PPC64_GOT16;
5bd4f169 2318 break;
411e1bfb 2319 case BFD_RELOC_LO16_GOTOFF: r = R_PPC64_GOT16_LO;
5bd4f169 2320 break;
411e1bfb 2321 case BFD_RELOC_HI16_GOTOFF: r = R_PPC64_GOT16_HI;
5bd4f169 2322 break;
411e1bfb 2323 case BFD_RELOC_HI16_S_GOTOFF: r = R_PPC64_GOT16_HA;
5bd4f169 2324 break;
411e1bfb 2325 case BFD_RELOC_PPC_COPY: r = R_PPC64_COPY;
5bd4f169 2326 break;
411e1bfb 2327 case BFD_RELOC_PPC_GLOB_DAT: r = R_PPC64_GLOB_DAT;
5bd4f169 2328 break;
411e1bfb 2329 case BFD_RELOC_32_PCREL: r = R_PPC64_REL32;
5bd4f169 2330 break;
411e1bfb 2331 case BFD_RELOC_32_PLTOFF: r = R_PPC64_PLT32;
5bd4f169 2332 break;
411e1bfb 2333 case BFD_RELOC_32_PLT_PCREL: r = R_PPC64_PLTREL32;
5bd4f169 2334 break;
411e1bfb 2335 case BFD_RELOC_LO16_PLTOFF: r = R_PPC64_PLT16_LO;
5bd4f169 2336 break;
411e1bfb 2337 case BFD_RELOC_HI16_PLTOFF: r = R_PPC64_PLT16_HI;
5bd4f169 2338 break;
411e1bfb 2339 case BFD_RELOC_HI16_S_PLTOFF: r = R_PPC64_PLT16_HA;
5bd4f169 2340 break;
411e1bfb 2341 case BFD_RELOC_16_BASEREL: r = R_PPC64_SECTOFF;
5bd4f169 2342 break;
411e1bfb 2343 case BFD_RELOC_LO16_BASEREL: r = R_PPC64_SECTOFF_LO;
5bd4f169 2344 break;
411e1bfb 2345 case BFD_RELOC_HI16_BASEREL: r = R_PPC64_SECTOFF_HI;
5bd4f169 2346 break;
411e1bfb 2347 case BFD_RELOC_HI16_S_BASEREL: r = R_PPC64_SECTOFF_HA;
5bd4f169 2348 break;
411e1bfb 2349 case BFD_RELOC_CTOR: r = R_PPC64_ADDR64;
5bd4f169 2350 break;
411e1bfb 2351 case BFD_RELOC_64: r = R_PPC64_ADDR64;
5bd4f169 2352 break;
411e1bfb 2353 case BFD_RELOC_PPC64_HIGHER: r = R_PPC64_ADDR16_HIGHER;
5bd4f169 2354 break;
411e1bfb 2355 case BFD_RELOC_PPC64_HIGHER_S: r = R_PPC64_ADDR16_HIGHERA;
5bd4f169 2356 break;
411e1bfb 2357 case BFD_RELOC_PPC64_HIGHEST: r = R_PPC64_ADDR16_HIGHEST;
5bd4f169 2358 break;
411e1bfb 2359 case BFD_RELOC_PPC64_HIGHEST_S: r = R_PPC64_ADDR16_HIGHESTA;
5bd4f169 2360 break;
411e1bfb 2361 case BFD_RELOC_64_PCREL: r = R_PPC64_REL64;
5bd4f169 2362 break;
411e1bfb 2363 case BFD_RELOC_64_PLTOFF: r = R_PPC64_PLT64;
5bd4f169 2364 break;
411e1bfb 2365 case BFD_RELOC_64_PLT_PCREL: r = R_PPC64_PLTREL64;
5bd4f169 2366 break;
411e1bfb 2367 case BFD_RELOC_PPC_TOC16: r = R_PPC64_TOC16;
5bd4f169 2368 break;
411e1bfb 2369 case BFD_RELOC_PPC64_TOC16_LO: r = R_PPC64_TOC16_LO;
5bd4f169 2370 break;
411e1bfb 2371 case BFD_RELOC_PPC64_TOC16_HI: r = R_PPC64_TOC16_HI;
5bd4f169 2372 break;
411e1bfb 2373 case BFD_RELOC_PPC64_TOC16_HA: r = R_PPC64_TOC16_HA;
5bd4f169 2374 break;
411e1bfb 2375 case BFD_RELOC_PPC64_TOC: r = R_PPC64_TOC;
5bd4f169 2376 break;
411e1bfb 2377 case BFD_RELOC_PPC64_PLTGOT16: r = R_PPC64_PLTGOT16;
5bd4f169 2378 break;
411e1bfb 2379 case BFD_RELOC_PPC64_PLTGOT16_LO: r = R_PPC64_PLTGOT16_LO;
5bd4f169 2380 break;
411e1bfb 2381 case BFD_RELOC_PPC64_PLTGOT16_HI: r = R_PPC64_PLTGOT16_HI;
5bd4f169 2382 break;
411e1bfb 2383 case BFD_RELOC_PPC64_PLTGOT16_HA: r = R_PPC64_PLTGOT16_HA;
5bd4f169 2384 break;
411e1bfb 2385 case BFD_RELOC_PPC64_ADDR16_DS: r = R_PPC64_ADDR16_DS;
5bd4f169 2386 break;
411e1bfb 2387 case BFD_RELOC_PPC64_ADDR16_LO_DS: r = R_PPC64_ADDR16_LO_DS;
5bd4f169 2388 break;
411e1bfb 2389 case BFD_RELOC_PPC64_GOT16_DS: r = R_PPC64_GOT16_DS;
5bd4f169 2390 break;
411e1bfb 2391 case BFD_RELOC_PPC64_GOT16_LO_DS: r = R_PPC64_GOT16_LO_DS;
5bd4f169 2392 break;
411e1bfb 2393 case BFD_RELOC_PPC64_PLT16_LO_DS: r = R_PPC64_PLT16_LO_DS;
5bd4f169 2394 break;
411e1bfb 2395 case BFD_RELOC_PPC64_SECTOFF_DS: r = R_PPC64_SECTOFF_DS;
5bd4f169 2396 break;
411e1bfb 2397 case BFD_RELOC_PPC64_SECTOFF_LO_DS: r = R_PPC64_SECTOFF_LO_DS;
5bd4f169 2398 break;
411e1bfb 2399 case BFD_RELOC_PPC64_TOC16_DS: r = R_PPC64_TOC16_DS;
5bd4f169 2400 break;
411e1bfb 2401 case BFD_RELOC_PPC64_TOC16_LO_DS: r = R_PPC64_TOC16_LO_DS;
5bd4f169 2402 break;
411e1bfb 2403 case BFD_RELOC_PPC64_PLTGOT16_DS: r = R_PPC64_PLTGOT16_DS;
5bd4f169 2404 break;
411e1bfb 2405 case BFD_RELOC_PPC64_PLTGOT16_LO_DS: r = R_PPC64_PLTGOT16_LO_DS;
5bd4f169 2406 break;
411e1bfb 2407 case BFD_RELOC_PPC_TLS: r = R_PPC64_TLS;
5bd4f169 2408 break;
727fc41e
AM
2409 case BFD_RELOC_PPC_TLSGD: r = R_PPC64_TLSGD;
2410 break;
2411 case BFD_RELOC_PPC_TLSLD: r = R_PPC64_TLSLD;
2412 break;
411e1bfb 2413 case BFD_RELOC_PPC_DTPMOD: r = R_PPC64_DTPMOD64;
5bd4f169 2414 break;
411e1bfb 2415 case BFD_RELOC_PPC_TPREL16: r = R_PPC64_TPREL16;
5bd4f169 2416 break;
411e1bfb 2417 case BFD_RELOC_PPC_TPREL16_LO: r = R_PPC64_TPREL16_LO;
5bd4f169 2418 break;
411e1bfb 2419 case BFD_RELOC_PPC_TPREL16_HI: r = R_PPC64_TPREL16_HI;
5bd4f169 2420 break;
f9c6b907
AM
2421 case BFD_RELOC_PPC64_TPREL16_HIGH: r = R_PPC64_TPREL16_HIGH;
2422 break;
411e1bfb 2423 case BFD_RELOC_PPC_TPREL16_HA: r = R_PPC64_TPREL16_HA;
5bd4f169 2424 break;
f9c6b907
AM
2425 case BFD_RELOC_PPC64_TPREL16_HIGHA: r = R_PPC64_TPREL16_HIGHA;
2426 break;
411e1bfb 2427 case BFD_RELOC_PPC_TPREL: r = R_PPC64_TPREL64;
5bd4f169 2428 break;
411e1bfb
AM
2429 case BFD_RELOC_PPC_DTPREL16: r = R_PPC64_DTPREL16;
2430 break;
2431 case BFD_RELOC_PPC_DTPREL16_LO: r = R_PPC64_DTPREL16_LO;
2432 break;
2433 case BFD_RELOC_PPC_DTPREL16_HI: r = R_PPC64_DTPREL16_HI;
2434 break;
f9c6b907
AM
2435 case BFD_RELOC_PPC64_DTPREL16_HIGH: r = R_PPC64_DTPREL16_HIGH;
2436 break;
411e1bfb
AM
2437 case BFD_RELOC_PPC_DTPREL16_HA: r = R_PPC64_DTPREL16_HA;
2438 break;
f9c6b907
AM
2439 case BFD_RELOC_PPC64_DTPREL16_HIGHA: r = R_PPC64_DTPREL16_HIGHA;
2440 break;
411e1bfb
AM
2441 case BFD_RELOC_PPC_DTPREL: r = R_PPC64_DTPREL64;
2442 break;
2443 case BFD_RELOC_PPC_GOT_TLSGD16: r = R_PPC64_GOT_TLSGD16;
2444 break;
2445 case BFD_RELOC_PPC_GOT_TLSGD16_LO: r = R_PPC64_GOT_TLSGD16_LO;
2446 break;
2447 case BFD_RELOC_PPC_GOT_TLSGD16_HI: r = R_PPC64_GOT_TLSGD16_HI;
2448 break;
2449 case BFD_RELOC_PPC_GOT_TLSGD16_HA: r = R_PPC64_GOT_TLSGD16_HA;
2450 break;
2451 case BFD_RELOC_PPC_GOT_TLSLD16: r = R_PPC64_GOT_TLSLD16;
2452 break;
2453 case BFD_RELOC_PPC_GOT_TLSLD16_LO: r = R_PPC64_GOT_TLSLD16_LO;
2454 break;
2455 case BFD_RELOC_PPC_GOT_TLSLD16_HI: r = R_PPC64_GOT_TLSLD16_HI;
2456 break;
2457 case BFD_RELOC_PPC_GOT_TLSLD16_HA: r = R_PPC64_GOT_TLSLD16_HA;
2458 break;
2459 case BFD_RELOC_PPC_GOT_TPREL16: r = R_PPC64_GOT_TPREL16_DS;
2460 break;
2461 case BFD_RELOC_PPC_GOT_TPREL16_LO: r = R_PPC64_GOT_TPREL16_LO_DS;
2462 break;
2463 case BFD_RELOC_PPC_GOT_TPREL16_HI: r = R_PPC64_GOT_TPREL16_HI;
2464 break;
2465 case BFD_RELOC_PPC_GOT_TPREL16_HA: r = R_PPC64_GOT_TPREL16_HA;
2466 break;
2467 case BFD_RELOC_PPC_GOT_DTPREL16: r = R_PPC64_GOT_DTPREL16_DS;
2468 break;
2469 case BFD_RELOC_PPC_GOT_DTPREL16_LO: r = R_PPC64_GOT_DTPREL16_LO_DS;
2470 break;
2471 case BFD_RELOC_PPC_GOT_DTPREL16_HI: r = R_PPC64_GOT_DTPREL16_HI;
2472 break;
2473 case BFD_RELOC_PPC_GOT_DTPREL16_HA: r = R_PPC64_GOT_DTPREL16_HA;
2474 break;
2475 case BFD_RELOC_PPC64_TPREL16_DS: r = R_PPC64_TPREL16_DS;
2476 break;
2477 case BFD_RELOC_PPC64_TPREL16_LO_DS: r = R_PPC64_TPREL16_LO_DS;
2478 break;
2479 case BFD_RELOC_PPC64_TPREL16_HIGHER: r = R_PPC64_TPREL16_HIGHER;
2480 break;
2481 case BFD_RELOC_PPC64_TPREL16_HIGHERA: r = R_PPC64_TPREL16_HIGHERA;
2482 break;
2483 case BFD_RELOC_PPC64_TPREL16_HIGHEST: r = R_PPC64_TPREL16_HIGHEST;
2484 break;
2485 case BFD_RELOC_PPC64_TPREL16_HIGHESTA: r = R_PPC64_TPREL16_HIGHESTA;
2486 break;
2487 case BFD_RELOC_PPC64_DTPREL16_DS: r = R_PPC64_DTPREL16_DS;
2488 break;
2489 case BFD_RELOC_PPC64_DTPREL16_LO_DS: r = R_PPC64_DTPREL16_LO_DS;
2490 break;
2491 case BFD_RELOC_PPC64_DTPREL16_HIGHER: r = R_PPC64_DTPREL16_HIGHER;
2492 break;
2493 case BFD_RELOC_PPC64_DTPREL16_HIGHERA: r = R_PPC64_DTPREL16_HIGHERA;
2494 break;
2495 case BFD_RELOC_PPC64_DTPREL16_HIGHEST: r = R_PPC64_DTPREL16_HIGHEST;
2496 break;
2497 case BFD_RELOC_PPC64_DTPREL16_HIGHESTA: r = R_PPC64_DTPREL16_HIGHESTA;
2498 break;
25f23106
AM
2499 case BFD_RELOC_16_PCREL: r = R_PPC64_REL16;
2500 break;
2501 case BFD_RELOC_LO16_PCREL: r = R_PPC64_REL16_LO;
2502 break;
2503 case BFD_RELOC_HI16_PCREL: r = R_PPC64_REL16_HI;
2504 break;
2505 case BFD_RELOC_HI16_S_PCREL: r = R_PPC64_REL16_HA;
2506 break;
7ba71655
AM
2507 case BFD_RELOC_PPC_16DX_HA: r = R_PPC64_16DX_HA;
2508 break;
a680de9a
PB
2509 case BFD_RELOC_PPC_REL16DX_HA: r = R_PPC64_REL16DX_HA;
2510 break;
006589cf
AM
2511 case BFD_RELOC_PPC64_ENTRY: r = R_PPC64_ENTRY;
2512 break;
45965137
AM
2513 case BFD_RELOC_PPC64_ADDR64_LOCAL: r = R_PPC64_ADDR64_LOCAL;
2514 break;
411e1bfb
AM
2515 case BFD_RELOC_VTABLE_INHERIT: r = R_PPC64_GNU_VTINHERIT;
2516 break;
2517 case BFD_RELOC_VTABLE_ENTRY: r = R_PPC64_GNU_VTENTRY;
5bd4f169
AM
2518 break;
2519 }
2520
4ce794b7 2521 return ppc64_elf_howto_table[r];
5bd4f169
AM
2522};
2523
157090f7
AM
2524static reloc_howto_type *
2525ppc64_elf_reloc_name_lookup (bfd *abfd ATTRIBUTE_UNUSED,
2526 const char *r_name)
2527{
2528 unsigned int i;
2529
a4b6fadd 2530 for (i = 0; i < ARRAY_SIZE (ppc64_elf_howto_raw); i++)
157090f7
AM
2531 if (ppc64_elf_howto_raw[i].name != NULL
2532 && strcasecmp (ppc64_elf_howto_raw[i].name, r_name) == 0)
2533 return &ppc64_elf_howto_raw[i];
2534
f3185997 2535
157090f7
AM
2536 return NULL;
2537}
2538
5bd4f169
AM
2539/* Set the howto pointer for a PowerPC ELF reloc. */
2540
f3185997 2541static bfd_boolean
4aef7643 2542ppc64_elf_info_to_howto (bfd *abfd, arelent *cache_ptr,
4ce794b7 2543 Elf_Internal_Rela *dst)
5bd4f169 2544{
65f38f15
AM
2545 unsigned int type;
2546
ef60b7ff 2547 /* Initialize howto table if needed. */
5bd4f169 2548 if (!ppc64_elf_howto_table[R_PPC64_ADDR32])
5bd4f169
AM
2549 ppc_howto_init ();
2550
65f38f15 2551 type = ELF64_R_TYPE (dst->r_info);
a4b6fadd 2552 if (type >= ARRAY_SIZE (ppc64_elf_howto_table))
d0fb9a8d 2553 {
695344c0 2554 /* xgettext:c-format */
0aa13fee 2555 _bfd_error_handler (_("%pB: unsupported relocation type %#x"),
cf97bcb0 2556 abfd, type);
f3185997
NC
2557 bfd_set_error (bfd_error_bad_value);
2558 return FALSE;
d0fb9a8d 2559 }
65f38f15 2560 cache_ptr->howto = ppc64_elf_howto_table[type];
f3185997
NC
2561 if (cache_ptr->howto == NULL || cache_ptr->howto->name == NULL)
2562 {
2563 /* xgettext:c-format */
2564 _bfd_error_handler (_("%pB: unsupported relocation type %#x"),
2565 abfd, type);
2566 bfd_set_error (bfd_error_bad_value);
2567 return FALSE;
2568 }
2569
2570 return TRUE;
5bd4f169
AM
2571}
2572
04c9666a 2573/* Handle the R_PPC64_ADDR16_HA and similar relocs. */
5bd4f169
AM
2574
2575static bfd_reloc_status_type
4ce794b7
AM
2576ppc64_elf_ha_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
2577 void *data, asection *input_section,
2578 bfd *output_bfd, char **error_message)
5bd4f169 2579{
a680de9a
PB
2580 enum elf_ppc64_reloc_type r_type;
2581 long insn;
2582 bfd_size_type octets;
3de43e7b 2583 bfd_vma value;
a680de9a 2584
805fc799
AM
2585 /* If this is a relocatable link (output_bfd test tells us), just
2586 call the generic function. Any adjustment will be done at final
2587 link time. */
2588 if (output_bfd != NULL)
cedb70c5 2589 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
805fc799
AM
2590 input_section, output_bfd, error_message);
2591
2592 /* Adjust the addend for sign extension of the low 16 bits.
2593 We won't actually be using the low 16 bits, so trashing them
2594 doesn't matter. */
2595 reloc_entry->addend += 0x8000;
a680de9a
PB
2596 r_type = reloc_entry->howto->type;
2597 if (r_type != R_PPC64_REL16DX_HA)
2598 return bfd_reloc_continue;
2599
2600 value = 0;
2601 if (!bfd_is_com_section (symbol->section))
2602 value = symbol->value;
2603 value += (reloc_entry->addend
2604 + symbol->section->output_offset
2605 + symbol->section->output_section->vma);
2606 value -= (reloc_entry->address
2607 + input_section->output_offset
2608 + input_section->output_section->vma);
3de43e7b 2609 value = (bfd_signed_vma) value >> 16;
a680de9a
PB
2610
2611 octets = reloc_entry->address * bfd_octets_per_byte (abfd);
2612 insn = bfd_get_32 (abfd, (bfd_byte *) data + octets);
2613 insn &= ~0x1fffc1;
3de43e7b 2614 insn |= (value & 0xffc1) | ((value & 0x3e) << 15);
a680de9a 2615 bfd_put_32 (abfd, insn, (bfd_byte *) data + octets);
3de43e7b 2616 if (value + 0x8000 > 0xffff)
a680de9a
PB
2617 return bfd_reloc_overflow;
2618 return bfd_reloc_ok;
805fc799 2619}
5bd4f169 2620
2441e016
AM
2621static bfd_reloc_status_type
2622ppc64_elf_branch_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
2623 void *data, asection *input_section,
2624 bfd *output_bfd, char **error_message)
2625{
2626 if (output_bfd != NULL)
2627 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
2628 input_section, output_bfd, error_message);
2629
699733f6
AM
2630 if (strcmp (symbol->section->name, ".opd") == 0
2631 && (symbol->section->owner->flags & DYNAMIC) == 0)
2441e016
AM
2632 {
2633 bfd_vma dest = opd_entry_value (symbol->section,
2634 symbol->value + reloc_entry->addend,
aef36ac1 2635 NULL, NULL, FALSE);
2441e016
AM
2636 if (dest != (bfd_vma) -1)
2637 reloc_entry->addend = dest - (symbol->value
2638 + symbol->section->output_section->vma
2639 + symbol->section->output_offset);
2640 }
810d4e75
AM
2641 else
2642 {
2643 elf_symbol_type *elfsym = (elf_symbol_type *) symbol;
2644
2645 if (symbol->section->owner != abfd
9f284bf9 2646 && symbol->section->owner != NULL
810d4e75
AM
2647 && abiversion (symbol->section->owner) >= 2)
2648 {
2649 unsigned int i;
2650
2651 for (i = 0; i < symbol->section->owner->symcount; ++i)
2652 {
2653 asymbol *symdef = symbol->section->owner->outsymbols[i];
2654
2655 if (strcmp (symdef->name, symbol->name) == 0)
2656 {
2657 elfsym = (elf_symbol_type *) symdef;
2658 break;
2659 }
2660 }
2661 }
2662 reloc_entry->addend
2663 += PPC64_LOCAL_ENTRY_OFFSET (elfsym->internal_elf_sym.st_other);
2664 }
2441e016
AM
2665 return bfd_reloc_continue;
2666}
2667
805fc799 2668static bfd_reloc_status_type
4ce794b7
AM
2669ppc64_elf_brtaken_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
2670 void *data, asection *input_section,
2671 bfd *output_bfd, char **error_message)
805fc799
AM
2672{
2673 long insn;
04c9666a 2674 enum elf_ppc64_reloc_type r_type;
805fc799 2675 bfd_size_type octets;
794e51c0
AM
2676 /* Assume 'at' branch hints. */
2677 bfd_boolean is_isa_v2 = TRUE;
805fc799
AM
2678
2679 /* If this is a relocatable link (output_bfd test tells us), just
2680 call the generic function. Any adjustment will be done at final
2681 link time. */
5bd4f169 2682 if (output_bfd != NULL)
cedb70c5 2683 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
805fc799
AM
2684 input_section, output_bfd, error_message);
2685
2686 octets = reloc_entry->address * bfd_octets_per_byte (abfd);
2687 insn = bfd_get_32 (abfd, (bfd_byte *) data + octets);
2688 insn &= ~(0x01 << 21);
4ce794b7 2689 r_type = reloc_entry->howto->type;
805fc799
AM
2690 if (r_type == R_PPC64_ADDR14_BRTAKEN
2691 || r_type == R_PPC64_REL14_BRTAKEN)
cedb70c5 2692 insn |= 0x01 << 21; /* 'y' or 't' bit, lowest bit of BO field. */
805fc799 2693
794e51c0 2694 if (is_isa_v2)
5bd4f169 2695 {
805fc799
AM
2696 /* Set 'a' bit. This is 0b00010 in BO field for branch
2697 on CR(BI) insns (BO == 001at or 011at), and 0b01000
2698 for branch on CTR insns (BO == 1a00t or 1a01t). */
2699 if ((insn & (0x14 << 21)) == (0x04 << 21))
2700 insn |= 0x02 << 21;
2701 else if ((insn & (0x14 << 21)) == (0x10 << 21))
2702 insn |= 0x08 << 21;
2703 else
2441e016 2704 goto out;
5bd4f169 2705 }
805fc799
AM
2706 else
2707 {
2708 bfd_vma target = 0;
2709 bfd_vma from;
5bd4f169 2710
805fc799
AM
2711 if (!bfd_is_com_section (symbol->section))
2712 target = symbol->value;
2713 target += symbol->section->output_section->vma;
2714 target += symbol->section->output_offset;
2715 target += reloc_entry->addend;
5bd4f169 2716
805fc799
AM
2717 from = (reloc_entry->address
2718 + input_section->output_offset
2719 + input_section->output_section->vma);
5bd4f169 2720
805fc799
AM
2721 /* Invert 'y' bit if not the default. */
2722 if ((bfd_signed_vma) (target - from) < 0)
2723 insn ^= 0x01 << 21;
2724 }
4ce794b7 2725 bfd_put_32 (abfd, insn, (bfd_byte *) data + octets);
2441e016
AM
2726 out:
2727 return ppc64_elf_branch_reloc (abfd, reloc_entry, symbol, data,
2728 input_section, output_bfd, error_message);
805fc799 2729}
5bd4f169 2730
805fc799 2731static bfd_reloc_status_type
4ce794b7
AM
2732ppc64_elf_sectoff_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
2733 void *data, asection *input_section,
2734 bfd *output_bfd, char **error_message)
805fc799
AM
2735{
2736 /* If this is a relocatable link (output_bfd test tells us), just
2737 call the generic function. Any adjustment will be done at final
2738 link time. */
2739 if (output_bfd != NULL)
cedb70c5 2740 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
805fc799 2741 input_section, output_bfd, error_message);
5bd4f169 2742
805fc799
AM
2743 /* Subtract the symbol section base address. */
2744 reloc_entry->addend -= symbol->section->output_section->vma;
5bd4f169
AM
2745 return bfd_reloc_continue;
2746}
2747
805fc799 2748static bfd_reloc_status_type
4ce794b7
AM
2749ppc64_elf_sectoff_ha_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
2750 void *data, asection *input_section,
2751 bfd *output_bfd, char **error_message)
805fc799
AM
2752{
2753 /* If this is a relocatable link (output_bfd test tells us), just
2754 call the generic function. Any adjustment will be done at final
2755 link time. */
2756 if (output_bfd != NULL)
cedb70c5 2757 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
805fc799
AM
2758 input_section, output_bfd, error_message);
2759
2760 /* Subtract the symbol section base address. */
2761 reloc_entry->addend -= symbol->section->output_section->vma;
2762
2763 /* Adjust the addend for sign extension of the low 16 bits. */
2764 reloc_entry->addend += 0x8000;
2765 return bfd_reloc_continue;
2766}
2767
2768static bfd_reloc_status_type
4ce794b7
AM
2769ppc64_elf_toc_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
2770 void *data, asection *input_section,
2771 bfd *output_bfd, char **error_message)
805fc799
AM
2772{
2773 bfd_vma TOCstart;
2774
2775 /* If this is a relocatable link (output_bfd test tells us), just
2776 call the generic function. Any adjustment will be done at final
2777 link time. */
2778 if (output_bfd != NULL)
cedb70c5 2779 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
805fc799
AM
2780 input_section, output_bfd, error_message);
2781
2782 TOCstart = _bfd_get_gp_value (input_section->output_section->owner);
2783 if (TOCstart == 0)
1c865ab2 2784 TOCstart = ppc64_elf_set_toc (NULL, input_section->output_section->owner);
805fc799
AM
2785
2786 /* Subtract the TOC base address. */
2787 reloc_entry->addend -= TOCstart + TOC_BASE_OFF;
2788 return bfd_reloc_continue;
2789}
2790
2791static bfd_reloc_status_type
4ce794b7
AM
2792ppc64_elf_toc_ha_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
2793 void *data, asection *input_section,
2794 bfd *output_bfd, char **error_message)
805fc799
AM
2795{
2796 bfd_vma TOCstart;
2797
2798 /* If this is a relocatable link (output_bfd test tells us), just
2799 call the generic function. Any adjustment will be done at final
2800 link time. */
2801 if (output_bfd != NULL)
cedb70c5 2802 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
805fc799
AM
2803 input_section, output_bfd, error_message);
2804
2805 TOCstart = _bfd_get_gp_value (input_section->output_section->owner);
2806 if (TOCstart == 0)
1c865ab2 2807 TOCstart = ppc64_elf_set_toc (NULL, input_section->output_section->owner);
805fc799
AM
2808
2809 /* Subtract the TOC base address. */
2810 reloc_entry->addend -= TOCstart + TOC_BASE_OFF;
2811
2812 /* Adjust the addend for sign extension of the low 16 bits. */
2813 reloc_entry->addend += 0x8000;
2814 return bfd_reloc_continue;
2815}
2816
2817static bfd_reloc_status_type
4ce794b7
AM
2818ppc64_elf_toc64_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
2819 void *data, asection *input_section,
2820 bfd *output_bfd, char **error_message)
805fc799
AM
2821{
2822 bfd_vma TOCstart;
2823 bfd_size_type octets;
2824
2825 /* If this is a relocatable link (output_bfd test tells us), just
2826 call the generic function. Any adjustment will be done at final
2827 link time. */
2828 if (output_bfd != NULL)
cedb70c5 2829 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
805fc799
AM
2830 input_section, output_bfd, error_message);
2831
2832 TOCstart = _bfd_get_gp_value (input_section->output_section->owner);
2833 if (TOCstart == 0)
1c865ab2 2834 TOCstart = ppc64_elf_set_toc (NULL, input_section->output_section->owner);
805fc799
AM
2835
2836 octets = reloc_entry->address * bfd_octets_per_byte (abfd);
2837 bfd_put_64 (abfd, TOCstart + TOC_BASE_OFF, (bfd_byte *) data + octets);
2838 return bfd_reloc_ok;
2839}
2840
2841static bfd_reloc_status_type
4ce794b7
AM
2842ppc64_elf_unhandled_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
2843 void *data, asection *input_section,
2844 bfd *output_bfd, char **error_message)
805fc799
AM
2845{
2846 /* If this is a relocatable link (output_bfd test tells us), just
2847 call the generic function. Any adjustment will be done at final
2848 link time. */
2849 if (output_bfd != NULL)
cedb70c5 2850 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
805fc799
AM
2851 input_section, output_bfd, error_message);
2852
2853 if (error_message != NULL)
2854 {
2855 static char buf[60];
2856 sprintf (buf, "generic linker can't handle %s",
2857 reloc_entry->howto->name);
2858 *error_message = buf;
2859 }
2860 return bfd_reloc_dangerous;
2861}
2862
927be08e
AM
2863/* Track GOT entries needed for a given symbol. We might need more
2864 than one got entry per symbol. */
2865struct got_entry
2866{
2867 struct got_entry *next;
2868
2869 /* The symbol addend that we'll be placing in the GOT. */
2870 bfd_vma addend;
2871
2872 /* Unlike other ELF targets, we use separate GOT entries for the same
2873 symbol referenced from different input files. This is to support
2874 automatic multiple TOC/GOT sections, where the TOC base can vary
2875 from one input file to another. After partitioning into TOC groups
2876 we merge entries within the group.
2877
2878 Point to the BFD owning this GOT entry. */
2879 bfd *owner;
2880
2881 /* Zero for non-tls entries, or TLS_TLS and one of TLS_GD, TLS_LD,
2882 TLS_TPREL or TLS_DTPREL for tls entries. */
f961d9dd 2883 unsigned char tls_type;
927be08e
AM
2884
2885 /* Non-zero if got.ent points to real entry. */
f961d9dd 2886 unsigned char is_indirect;
927be08e
AM
2887
2888 /* Reference count until size_dynamic_sections, GOT offset thereafter. */
2889 union
2890 {
2891 bfd_signed_vma refcount;
2892 bfd_vma offset;
2893 struct got_entry *ent;
2894 } got;
2895};
2896
2897/* The same for PLT. */
2898struct plt_entry
2899{
2900 struct plt_entry *next;
2901
2902 bfd_vma addend;
2903
2904 union
2905 {
2906 bfd_signed_vma refcount;
2907 bfd_vma offset;
2908 } plt;
2909};
2910
e717da7e
AM
2911struct ppc64_elf_obj_tdata
2912{
2913 struct elf_obj_tdata elf;
2914
2915 /* Shortcuts to dynamic linker sections. */
2916 asection *got;
2917 asection *relgot;
2918
b3fac117
AM
2919 /* Used during garbage collection. We attach global symbols defined
2920 on removed .opd entries to this section so that the sym is removed. */
2921 asection *deleted_section;
81688140 2922
927be08e 2923 /* TLS local dynamic got entry handling. Support for multiple GOT
e717da7e 2924 sections means we potentially need one of these for each input bfd. */
927be08e 2925 struct got_entry tlsld_got;
8860955f 2926
729eabd5
AM
2927 union {
2928 /* A copy of relocs before they are modified for --emit-relocs. */
2929 Elf_Internal_Rela *relocs;
2930
2931 /* Section contents. */
2932 bfd_byte *contents;
2933 } opd;
d77c8a4b
AM
2934
2935 /* Nonzero if this bfd has small toc/got relocs, ie. that expect
2936 the reloc to be in the range -32768 to 32767. */
98528052
AM
2937 unsigned int has_small_toc_reloc : 1;
2938
560c8763
AM
2939 /* Set if toc/got ha relocs detected not using r2, or lo reloc
2940 instruction not one we handle. */
2941 unsigned int unexpected_toc_insn : 1;
e717da7e
AM
2942};
2943
2944#define ppc64_elf_tdata(bfd) \
2945 ((struct ppc64_elf_obj_tdata *) (bfd)->tdata.any)
2946
2947#define ppc64_tlsld_got(bfd) \
2948 (&ppc64_elf_tdata (bfd)->tlsld_got)
2949
0c8d6e5c
AM
2950#define is_ppc64_elf(bfd) \
2951 (bfd_get_flavour (bfd) == bfd_target_elf_flavour \
4dfe6ac6 2952 && elf_object_id (bfd) == PPC64_ELF_DATA)
0c8d6e5c 2953
e717da7e
AM
2954/* Override the generic function because we store some extras. */
2955
2956static bfd_boolean
2957ppc64_elf_mkobject (bfd *abfd)
2958{
0ffa91dd 2959 return bfd_elf_allocate_object (abfd, sizeof (struct ppc64_elf_obj_tdata),
4dfe6ac6 2960 PPC64_ELF_DATA);
e717da7e
AM
2961}
2962
feee612b 2963/* Fix bad default arch selected for a 64 bit input bfd when the
14b57c7c 2964 default is 32 bit. Also select arch based on apuinfo. */
feee612b 2965
b34976b6 2966static bfd_boolean
4ce794b7 2967ppc64_elf_object_p (bfd *abfd)
feee612b 2968{
14b57c7c
AM
2969 if (!abfd->arch_info->the_default)
2970 return TRUE;
2971
2972 if (abfd->arch_info->bits_per_word == 32)
feee612b
AM
2973 {
2974 Elf_Internal_Ehdr *i_ehdr = elf_elfheader (abfd);
2975
2976 if (i_ehdr->e_ident[EI_CLASS] == ELFCLASS64)
2977 {
2978 /* Relies on arch after 32 bit default being 64 bit default. */
2979 abfd->arch_info = abfd->arch_info->next;
2980 BFD_ASSERT (abfd->arch_info->bits_per_word == 64);
2981 }
2982 }
14b57c7c 2983 return _bfd_elf_ppc_set_arch (abfd);
feee612b
AM
2984}
2985
d37c89e5
AM
2986/* Support for core dump NOTE sections. */
2987
2988static bfd_boolean
2989ppc64_elf_grok_prstatus (bfd *abfd, Elf_Internal_Note *note)
2990{
eea6121a 2991 size_t offset, size;
d37c89e5
AM
2992
2993 if (note->descsz != 504)
2994 return FALSE;
2995
2996 /* pr_cursig */
228e534f 2997 elf_tdata (abfd)->core->signal = bfd_get_16 (abfd, note->descdata + 12);
d37c89e5
AM
2998
2999 /* pr_pid */
228e534f 3000 elf_tdata (abfd)->core->lwpid = bfd_get_32 (abfd, note->descdata + 32);
d37c89e5
AM
3001
3002 /* pr_reg */
3003 offset = 112;
eea6121a 3004 size = 384;
d37c89e5
AM
3005
3006 /* Make a ".reg/999" section. */
3007 return _bfd_elfcore_make_pseudosection (abfd, ".reg",
eea6121a 3008 size, note->descpos + offset);
d37c89e5
AM
3009}
3010
3011static bfd_boolean
3012ppc64_elf_grok_psinfo (bfd *abfd, Elf_Internal_Note *note)
3013{
3014 if (note->descsz != 136)
3015 return FALSE;
3016
228e534f 3017 elf_tdata (abfd)->core->pid
bc989cdc 3018 = bfd_get_32 (abfd, note->descdata + 24);
228e534f 3019 elf_tdata (abfd)->core->program
d37c89e5 3020 = _bfd_elfcore_strndup (abfd, note->descdata + 40, 16);
228e534f 3021 elf_tdata (abfd)->core->command
d37c89e5
AM
3022 = _bfd_elfcore_strndup (abfd, note->descdata + 56, 80);
3023
3024 return TRUE;
3025}
3026
183e98be
AM
3027static char *
3028ppc64_elf_write_core_note (bfd *abfd, char *buf, int *bufsiz, int note_type,
3029 ...)
3030{
3031 switch (note_type)
3032 {
3033 default:
3034 return NULL;
3035
3036 case NT_PRPSINFO:
3037 {
9ef6d1e3 3038 char data[136] ATTRIBUTE_NONSTRING;
183e98be
AM
3039 va_list ap;
3040
3041 va_start (ap, note_type);
75cd47ed 3042 memset (data, 0, sizeof (data));
183e98be 3043 strncpy (data + 40, va_arg (ap, const char *), 16);
95da9854
L
3044 DIAGNOSTIC_PUSH;
3045 /* GCC 8.1 warns about 80 equals destination size with
3046 -Wstringop-truncation:
3047 https://gcc.gnu.org/bugzilla/show_bug.cgi?id=85643
3048 */
3049#if GCC_VERSION == 8001
3050 DIAGNOSTIC_IGNORE_STRINGOP_TRUNCATION;
3051#endif
183e98be 3052 strncpy (data + 56, va_arg (ap, const char *), 80);
95da9854 3053 DIAGNOSTIC_POP;
183e98be
AM
3054 va_end (ap);
3055 return elfcore_write_note (abfd, buf, bufsiz,
3056 "CORE", note_type, data, sizeof (data));
3057 }
3058
3059 case NT_PRSTATUS:
3060 {
3061 char data[504];
3062 va_list ap;
3063 long pid;
3064 int cursig;
3065 const void *greg;
3066
3067 va_start (ap, note_type);
3068 memset (data, 0, 112);
3069 pid = va_arg (ap, long);
3070 bfd_put_32 (abfd, pid, data + 32);
3071 cursig = va_arg (ap, int);
3072 bfd_put_16 (abfd, cursig, data + 12);
3073 greg = va_arg (ap, const void *);
3074 memcpy (data + 112, greg, 384);
3075 memset (data + 496, 0, 8);
3076 va_end (ap);
3077 return elfcore_write_note (abfd, buf, bufsiz,
3078 "CORE", note_type, data, sizeof (data));
3079 }
3080 }
3081}
3082
5d35169e
AM
3083/* Add extra PPC sections. */
3084
b35d266b 3085static const struct bfd_elf_special_section ppc64_elf_special_sections[]=
7f4d3958 3086{
07d6d2b8
AM
3087 { STRING_COMMA_LEN (".plt"), 0, SHT_NOBITS, 0 },
3088 { STRING_COMMA_LEN (".sbss"), -2, SHT_NOBITS, SHF_ALLOC + SHF_WRITE },
0112cd26 3089 { STRING_COMMA_LEN (".sdata"), -2, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE },
07d6d2b8
AM
3090 { STRING_COMMA_LEN (".toc"), 0, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE },
3091 { STRING_COMMA_LEN (".toc1"), 0, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE },
0112cd26 3092 { STRING_COMMA_LEN (".tocbss"), 0, SHT_NOBITS, SHF_ALLOC + SHF_WRITE },
07d6d2b8 3093 { NULL, 0, 0, 0, 0 }
5d35169e
AM
3094};
3095
7c8fe5c4
AM
3096enum _ppc64_sec_type {
3097 sec_normal = 0,
3098 sec_opd = 1,
3099 sec_toc = 2
3100};
3101
f0abc2a1
AM
3102struct _ppc64_elf_section_data
3103{
3104 struct bfd_elf_section_data elf;
411e1bfb 3105
f0abc2a1
AM
3106 union
3107 {
51aecdc5
AM
3108 /* An array with one entry for each opd function descriptor,
3109 and some spares since opd entries may be either 16 or 24 bytes. */
3110#define OPD_NDX(OFF) ((OFF) >> 4)
74f0fb50
AM
3111 struct _opd_sec_data
3112 {
3113 /* Points to the function code section for local opd entries. */
3114 asection **func_sec;
3115
3116 /* After editing .opd, adjust references to opd local syms. */
3117 long *adjust;
3118 } opd;
7c8fe5c4 3119
3a71aa26
AM
3120 /* An array for toc sections, indexed by offset/8. */
3121 struct _toc_sec_data
3122 {
3123 /* Specifies the relocation symbol index used at a given toc offset. */
3124 unsigned *symndx;
3125
3126 /* And the relocation addend. */
3127 bfd_vma *add;
3128 } toc;
7c8fe5c4
AM
3129 } u;
3130
3131 enum _ppc64_sec_type sec_type:2;
411e1bfb 3132
7c8fe5c4
AM
3133 /* Flag set when small branches are detected. Used to
3134 select suitable defaults for the stub group size. */
3135 unsigned int has_14bit_branch:1;
3e04d765
AM
3136
3137 /* Flag set when PLTCALL relocs are detected. */
3138 unsigned int has_pltcall:1;
f0abc2a1
AM
3139};
3140
3141#define ppc64_elf_section_data(sec) \
411e1bfb 3142 ((struct _ppc64_elf_section_data *) elf_section_data (sec))
f0abc2a1
AM
3143
3144static bfd_boolean
4ce794b7 3145ppc64_elf_new_section_hook (bfd *abfd, asection *sec)
f0abc2a1 3146{
f592407e
AM
3147 if (!sec->used_by_bfd)
3148 {
3149 struct _ppc64_elf_section_data *sdata;
3150 bfd_size_type amt = sizeof (*sdata);
f0abc2a1 3151
f592407e
AM
3152 sdata = bfd_zalloc (abfd, amt);
3153 if (sdata == NULL)
3154 return FALSE;
3155 sec->used_by_bfd = sdata;
3156 }
f0abc2a1
AM
3157
3158 return _bfd_elf_new_section_hook (abfd, sec);
3159}
4025353c 3160
74f0fb50 3161static struct _opd_sec_data *
4025353c
AM
3162get_opd_info (asection * sec)
3163{
3164 if (sec != NULL
3165 && ppc64_elf_section_data (sec) != NULL
7c8fe5c4 3166 && ppc64_elf_section_data (sec)->sec_type == sec_opd)
74f0fb50 3167 return &ppc64_elf_section_data (sec)->u.opd;
4025353c
AM
3168 return NULL;
3169}
90e3cdf2
JJ
3170\f
3171/* Parameters for the qsort hook. */
90e3cdf2 3172static bfd_boolean synthetic_relocatable;
cd285db5 3173static asection *synthetic_opd;
90e3cdf2 3174
699733f6 3175/* qsort comparison function for ppc64_elf_get_synthetic_symtab. */
90e3cdf2
JJ
3176
3177static int
3178compare_symbols (const void *ap, const void *bp)
3179{
3180 const asymbol *a = * (const asymbol **) ap;
3181 const asymbol *b = * (const asymbol **) bp;
3182
699733f6
AM
3183 /* Section symbols first. */
3184 if ((a->flags & BSF_SECTION_SYM) && !(b->flags & BSF_SECTION_SYM))
90e3cdf2 3185 return -1;
699733f6 3186 if (!(a->flags & BSF_SECTION_SYM) && (b->flags & BSF_SECTION_SYM))
90e3cdf2
JJ
3187 return 1;
3188
699733f6 3189 /* then .opd symbols. */
cd285db5
AM
3190 if (synthetic_opd != NULL)
3191 {
3192 if (strcmp (a->section->name, ".opd") == 0
3193 && strcmp (b->section->name, ".opd") != 0)
3194 return -1;
3195 if (strcmp (a->section->name, ".opd") != 0
3196 && strcmp (b->section->name, ".opd") == 0)
3197 return 1;
3198 }
90e3cdf2 3199
699733f6 3200 /* then other code symbols. */
90e3cdf2
JJ
3201 if ((a->section->flags & (SEC_CODE | SEC_ALLOC | SEC_THREAD_LOCAL))
3202 == (SEC_CODE | SEC_ALLOC)
3203 && (b->section->flags & (SEC_CODE | SEC_ALLOC | SEC_THREAD_LOCAL))
3204 != (SEC_CODE | SEC_ALLOC))
3205 return -1;
3206
3207 if ((a->section->flags & (SEC_CODE | SEC_ALLOC | SEC_THREAD_LOCAL))
3208 != (SEC_CODE | SEC_ALLOC)
3209 && (b->section->flags & (SEC_CODE | SEC_ALLOC | SEC_THREAD_LOCAL))
3210 == (SEC_CODE | SEC_ALLOC))
3211 return 1;
3212
3213 if (synthetic_relocatable)
3214 {
3215 if (a->section->id < b->section->id)
3216 return -1;
3217
3218 if (a->section->id > b->section->id)
3219 return 1;
3220 }
3221
3222 if (a->value + a->section->vma < b->value + b->section->vma)
3223 return -1;
3224
3225 if (a->value + a->section->vma > b->value + b->section->vma)
3226 return 1;
3227
4d35a0aa
AM
3228 /* For syms with the same value, prefer strong dynamic global function
3229 syms over other syms. */
3230 if ((a->flags & BSF_GLOBAL) != 0 && (b->flags & BSF_GLOBAL) == 0)
3231 return -1;
3232
3233 if ((a->flags & BSF_GLOBAL) == 0 && (b->flags & BSF_GLOBAL) != 0)
3234 return 1;
3235
3236 if ((a->flags & BSF_FUNCTION) != 0 && (b->flags & BSF_FUNCTION) == 0)
3237 return -1;
3238
3239 if ((a->flags & BSF_FUNCTION) == 0 && (b->flags & BSF_FUNCTION) != 0)
3240 return 1;
3241
3242 if ((a->flags & BSF_WEAK) == 0 && (b->flags & BSF_WEAK) != 0)
3243 return -1;
3244
3245 if ((a->flags & BSF_WEAK) != 0 && (b->flags & BSF_WEAK) == 0)
3246 return 1;
3247
3248 if ((a->flags & BSF_DYNAMIC) != 0 && (b->flags & BSF_DYNAMIC) == 0)
3249 return -1;
3250
3251 if ((a->flags & BSF_DYNAMIC) == 0 && (b->flags & BSF_DYNAMIC) != 0)
3252 return 1;
3253
aaed6f5b 3254 return a > b;
90e3cdf2
JJ
3255}
3256
699733f6 3257/* Search SYMS for a symbol of the given VALUE. */
90e3cdf2 3258
699733f6 3259static asymbol *
7292b3ac 3260sym_exists_at (asymbol **syms, long lo, long hi, unsigned int id, bfd_vma value)
90e3cdf2 3261{
699733f6 3262 long mid;
90e3cdf2 3263
7292b3ac 3264 if (id == (unsigned) -1)
699733f6
AM
3265 {
3266 while (lo < hi)
3267 {
3268 mid = (lo + hi) >> 1;
3269 if (syms[mid]->value + syms[mid]->section->vma < value)
3270 lo = mid + 1;
3271 else if (syms[mid]->value + syms[mid]->section->vma > value)
3272 hi = mid;
3273 else
3274 return syms[mid];
3275 }
3276 }
3277 else
3278 {
3279 while (lo < hi)
3280 {
3281 mid = (lo + hi) >> 1;
3282 if (syms[mid]->section->id < id)
3283 lo = mid + 1;
3284 else if (syms[mid]->section->id > id)
3285 hi = mid;
3286 else if (syms[mid]->value < value)
3287 lo = mid + 1;
3288 else if (syms[mid]->value > value)
3289 hi = mid;
3290 else
3291 return syms[mid];
3292 }
3293 }
3294 return NULL;
90e3cdf2
JJ
3295}
3296
468392fb
AM
3297static bfd_boolean
3298section_covers_vma (bfd *abfd ATTRIBUTE_UNUSED, asection *section, void *ptr)
3299{
3300 bfd_vma vma = *(bfd_vma *) ptr;
3301 return ((section->flags & SEC_ALLOC) != 0
3302 && section->vma <= vma
3303 && vma < section->vma + section->size);
3304}
3305
699733f6 3306/* Create synthetic symbols, effectively restoring "dot-symbol" function
c4b0b099
AM
3307 entry syms. Also generate @plt symbols for the glink branch table.
3308 Returns count of synthetic symbols in RET or -1 on error. */
90e3cdf2
JJ
3309
3310static long
a7535cf3
AM
3311ppc64_elf_get_synthetic_symtab (bfd *abfd,
3312 long static_count, asymbol **static_syms,
3313 long dyn_count, asymbol **dyn_syms,
c9727e01 3314 asymbol **ret)
90e3cdf2
JJ
3315{
3316 asymbol *s;
0ccf57bd 3317 size_t i, j, count;
90e3cdf2 3318 char *names;
0ccf57bd 3319 size_t symcount, codesecsym, codesecsymend, secsymend, opdsymend;
ee67d69a 3320 asection *opd = NULL;
90e3cdf2 3321 bfd_boolean relocatable = (abfd->flags & (EXEC_P | DYNAMIC)) == 0;
a7535cf3 3322 asymbol **syms;
ee67d69a 3323 int abi = abiversion (abfd);
90e3cdf2
JJ
3324
3325 *ret = NULL;
3326
ee67d69a
AM
3327 if (abi < 2)
3328 {
3329 opd = bfd_get_section_by_name (abfd, ".opd");
3330 if (opd == NULL && abi == 1)
3331 return 0;
3332 }
90e3cdf2 3333
a5259595
AM
3334 syms = NULL;
3335 codesecsym = 0;
3336 codesecsymend = 0;
3337 secsymend = 0;
3338 opdsymend = 0;
3339 symcount = 0;
3340 if (opd != NULL)
c9727e01 3341 {
a5259595
AM
3342 symcount = static_count;
3343 if (!relocatable)
3344 symcount += dyn_count;
3345 if (symcount == 0)
3346 return 0;
c9727e01 3347
a5259595
AM
3348 syms = bfd_malloc ((symcount + 1) * sizeof (*syms));
3349 if (syms == NULL)
3350 return -1;
90e3cdf2 3351
a5259595
AM
3352 if (!relocatable && static_count != 0 && dyn_count != 0)
3353 {
3354 /* Use both symbol tables. */
3355 memcpy (syms, static_syms, static_count * sizeof (*syms));
3356 memcpy (syms + static_count, dyn_syms,
3357 (dyn_count + 1) * sizeof (*syms));
3358 }
3359 else if (!relocatable && static_count == 0)
3360 memcpy (syms, dyn_syms, (symcount + 1) * sizeof (*syms));
3361 else
3362 memcpy (syms, static_syms, (symcount + 1) * sizeof (*syms));
90e3cdf2 3363
0ccf57bd
AM
3364 /* Trim uninteresting symbols. Interesting symbols are section,
3365 function, and notype symbols. */
3366 for (i = 0, j = 0; i < symcount; ++i)
3367 if ((syms[i]->flags & (BSF_FILE | BSF_OBJECT | BSF_THREAD_LOCAL
3368 | BSF_RELC | BSF_SRELC)) == 0)
3369 syms[j++] = syms[i];
3370 symcount = j;
3371
a5259595
AM
3372 synthetic_relocatable = relocatable;
3373 synthetic_opd = opd;
3374 qsort (syms, symcount, sizeof (*syms), compare_symbols);
90e3cdf2 3375
a5259595
AM
3376 if (!relocatable && symcount > 1)
3377 {
bfa5bd2a
PA
3378 /* Trim duplicate syms, since we may have merged the normal
3379 and dynamic symbols. Actually, we only care about syms
3380 that have different values, so trim any with the same
3381 value. Don't consider ifunc and ifunc resolver symbols
3382 duplicates however, because GDB wants to know whether a
3383 text symbol is an ifunc resolver. */
a5259595 3384 for (i = 1, j = 1; i < symcount; ++i)
bfa5bd2a
PA
3385 {
3386 const asymbol *s0 = syms[i - 1];
3387 const asymbol *s1 = syms[i];
3388
3389 if ((s0->value + s0->section->vma
3390 != s1->value + s1->section->vma)
3391 || ((s0->flags & BSF_GNU_INDIRECT_FUNCTION)
3392 != (s1->flags & BSF_GNU_INDIRECT_FUNCTION)))
3393 syms[j++] = syms[i];
3394 }
a5259595
AM
3395 symcount = j;
3396 }
699733f6 3397
a5259595
AM
3398 i = 0;
3399 /* Note that here and in compare_symbols we can't compare opd and
3400 sym->section directly. With separate debug info files, the
3401 symbols will be extracted from the debug file while abfd passed
3402 to this function is the real binary. */
0ccf57bd 3403 if (strcmp (syms[i]->section->name, ".opd") == 0)
a5259595
AM
3404 ++i;
3405 codesecsym = i;
3406
3407 for (; i < symcount; ++i)
3408 if (((syms[i]->section->flags & (SEC_CODE | SEC_ALLOC
3409 | SEC_THREAD_LOCAL))
3410 != (SEC_CODE | SEC_ALLOC))
3411 || (syms[i]->flags & BSF_SECTION_SYM) == 0)
3412 break;
3413 codesecsymend = i;
3414
3415 for (; i < symcount; ++i)
3416 if ((syms[i]->flags & BSF_SECTION_SYM) == 0)
3417 break;
3418 secsymend = i;
3419
3420 for (; i < symcount; ++i)
3421 if (strcmp (syms[i]->section->name, ".opd") != 0)
3422 break;
3423 opdsymend = i;
3424
3425 for (; i < symcount; ++i)
3426 if ((syms[i]->section->flags & (SEC_CODE | SEC_ALLOC | SEC_THREAD_LOCAL))
3427 != (SEC_CODE | SEC_ALLOC))
3428 break;
3429 symcount = i;
3430 }
c9727e01 3431 count = 0;
90e3cdf2 3432
699733f6 3433 if (relocatable)
90e3cdf2 3434 {
699733f6
AM
3435 bfd_boolean (*slurp_relocs) (bfd *, asection *, asymbol **, bfd_boolean);
3436 arelent *r;
3437 size_t size;
0ccf57bd 3438 size_t relcount;
90e3cdf2 3439
468392fb
AM
3440 if (opdsymend == secsymend)
3441 goto done;
3442
699733f6 3443 slurp_relocs = get_elf_backend_data (abfd)->s->slurp_reloc_table;
90e3cdf2 3444 relcount = (opd->flags & SEC_RELOC) ? opd->reloc_count : 0;
7356fed5 3445 if (relcount == 0)
c9727e01 3446 goto done;
90e3cdf2 3447
7356fed5
AM
3448 if (!(*slurp_relocs) (abfd, opd, static_syms, FALSE))
3449 {
3450 count = -1;
3451 goto done;
3452 }
3453
699733f6 3454 size = 0;
595da8c5 3455 for (i = secsymend, r = opd->relocation; i < opdsymend; ++i)
699733f6
AM
3456 {
3457 asymbol *sym;
90e3cdf2 3458
595da8c5 3459 while (r < opd->relocation + relcount
699733f6
AM
3460 && r->address < syms[i]->value + opd->vma)
3461 ++r;
90e3cdf2 3462
595da8c5 3463 if (r == opd->relocation + relcount)
699733f6 3464 break;
90e3cdf2 3465
699733f6
AM
3466 if (r->address != syms[i]->value + opd->vma)
3467 continue;
90e3cdf2 3468
699733f6
AM
3469 if (r->howto->type != R_PPC64_ADDR64)
3470 continue;
90e3cdf2 3471
699733f6
AM
3472 sym = *r->sym_ptr_ptr;
3473 if (!sym_exists_at (syms, opdsymend, symcount,
3474 sym->section->id, sym->value + r->addend))
3475 {
3476 ++count;
3477 size += sizeof (asymbol);
3478 size += strlen (syms[i]->name) + 2;
3479 }
3480 }
90e3cdf2 3481
c4b0b099
AM
3482 if (size == 0)
3483 goto done;
699733f6
AM
3484 s = *ret = bfd_malloc (size);
3485 if (s == NULL)
3486 {
7356fed5 3487 count = -1;
c9727e01 3488 goto done;
699733f6 3489 }
90e3cdf2 3490
699733f6 3491 names = (char *) (s + count);
90e3cdf2 3492
595da8c5 3493 for (i = secsymend, r = opd->relocation; i < opdsymend; ++i)
90e3cdf2 3494 {
699733f6 3495 asymbol *sym;
90e3cdf2 3496
595da8c5 3497 while (r < opd->relocation + relcount
699733f6
AM
3498 && r->address < syms[i]->value + opd->vma)
3499 ++r;
90e3cdf2 3500
595da8c5 3501 if (r == opd->relocation + relcount)
699733f6
AM
3502 break;
3503
3504 if (r->address != syms[i]->value + opd->vma)
3505 continue;
3506
3507 if (r->howto->type != R_PPC64_ADDR64)
3508 continue;
90e3cdf2 3509
699733f6
AM
3510 sym = *r->sym_ptr_ptr;
3511 if (!sym_exists_at (syms, opdsymend, symcount,
3512 sym->section->id, sym->value + r->addend))
3513 {
3514 size_t len;
3515
3516 *s = *syms[i];
6ba2a415 3517 s->flags |= BSF_SYNTHETIC;
699733f6
AM
3518 s->section = sym->section;
3519 s->value = sym->value + r->addend;
3520 s->name = names;
3521 *names++ = '.';
3522 len = strlen (syms[i]->name);
3523 memcpy (names, syms[i]->name, len + 1);
3524 names += len + 1;
6f610d07
UW
3525 /* Have udata.p point back to the original symbol this
3526 synthetic symbol was derived from. */
3527 s->udata.p = syms[i];
699733f6
AM
3528 s++;
3529 }
3530 }
3531 }
3532 else
90e3cdf2 3533 {
468392fb 3534 bfd_boolean (*slurp_relocs) (bfd *, asection *, asymbol **, bfd_boolean);
ee67d69a 3535 bfd_byte *contents = NULL;
699733f6 3536 size_t size;
0ccf57bd 3537 size_t plt_count = 0;
468392fb
AM
3538 bfd_vma glink_vma = 0, resolv_vma = 0;
3539 asection *dynamic, *glink = NULL, *relplt = NULL;
3540 arelent *p;
90e3cdf2 3541
ee67d69a 3542 if (opd != NULL && !bfd_malloc_and_get_section (abfd, opd, &contents))
699733f6 3543 {
c4b0b099
AM
3544 free_contents_and_exit_err:
3545 count = -1;
ee67d69a 3546 free_contents_and_exit:
699733f6 3547 if (contents)
ee67d69a 3548 free (contents);
c9727e01 3549 goto done;
699733f6 3550 }
90e3cdf2 3551
699733f6
AM
3552 size = 0;
3553 for (i = secsymend; i < opdsymend; ++i)
3554 {
3555 bfd_vma ent;
90e3cdf2 3556
5ef11c02
AM
3557 /* Ignore bogus symbols. */
3558 if (syms[i]->value > opd->size - 8)
3559 continue;
3560
699733f6
AM
3561 ent = bfd_get_64 (abfd, contents + syms[i]->value);
3562 if (!sym_exists_at (syms, opdsymend, symcount, -1, ent))
3563 {
3564 ++count;
3565 size += sizeof (asymbol);
3566 size += strlen (syms[i]->name) + 2;
3567 }
3568 }
90e3cdf2 3569
468392fb 3570 /* Get start of .glink stubs from DT_PPC64_GLINK. */
066ee829
AM
3571 if (dyn_count != 0
3572 && (dynamic = bfd_get_section_by_name (abfd, ".dynamic")) != NULL)
468392fb
AM
3573 {
3574 bfd_byte *dynbuf, *extdyn, *extdynend;
3575 size_t extdynsize;
3576 void (*swap_dyn_in) (bfd *, const void *, Elf_Internal_Dyn *);
3577
3578 if (!bfd_malloc_and_get_section (abfd, dynamic, &dynbuf))
c4b0b099 3579 goto free_contents_and_exit_err;
468392fb
AM
3580
3581 extdynsize = get_elf_backend_data (abfd)->s->sizeof_dyn;
3582 swap_dyn_in = get_elf_backend_data (abfd)->s->swap_dyn_in;
3583
3584 extdyn = dynbuf;
3585 extdynend = extdyn + dynamic->size;
3586 for (; extdyn < extdynend; extdyn += extdynsize)
3587 {
3588 Elf_Internal_Dyn dyn;
3589 (*swap_dyn_in) (abfd, extdyn, &dyn);
3590
3591 if (dyn.d_tag == DT_NULL)
3592 break;
3593
3594 if (dyn.d_tag == DT_PPC64_GLINK)
3595 {
9e390558
AM
3596 /* The first glink stub starts at DT_PPC64_GLINK plus 32.
3597 See comment in ppc64_elf_finish_dynamic_sections. */
3598 glink_vma = dyn.d_un.d_val + 8 * 4;
468392fb
AM
3599 /* The .glink section usually does not survive the final
3600 link; search for the section (usually .text) where the
3601 glink stubs now reside. */
3602 glink = bfd_sections_find_if (abfd, section_covers_vma,
3603 &glink_vma);
3604 break;
3605 }
3606 }
3607
3608 free (dynbuf);
3609 }
3610
3611 if (glink != NULL)
3612 {
3613 /* Determine __glink trampoline by reading the relative branch
3614 from the first glink stub. */
3615 bfd_byte buf[4];
b9e5796b
AM
3616 unsigned int off = 0;
3617
3618 while (bfd_get_section_contents (abfd, glink, buf,
3619 glink_vma + off - glink->vma, 4))
468392fb
AM
3620 {
3621 unsigned int insn = bfd_get_32 (abfd, buf);
3622 insn ^= B_DOT;
3623 if ((insn & ~0x3fffffc) == 0)
b9e5796b
AM
3624 {
3625 resolv_vma = glink_vma + off + (insn ^ 0x2000000) - 0x2000000;
3626 break;
3627 }
3628 off += 4;
3629 if (off > 4)
3630 break;
468392fb
AM
3631 }
3632
3633 if (resolv_vma)
3634 size += sizeof (asymbol) + sizeof ("__glink_PLTresolve");
468392fb 3635
066ee829
AM
3636 relplt = bfd_get_section_by_name (abfd, ".rela.plt");
3637 if (relplt != NULL)
3638 {
3639 slurp_relocs = get_elf_backend_data (abfd)->s->slurp_reloc_table;
3640 if (! (*slurp_relocs) (abfd, relplt, dyn_syms, TRUE))
c4b0b099 3641 goto free_contents_and_exit_err;
68ffbac6 3642
066ee829
AM
3643 plt_count = relplt->size / sizeof (Elf64_External_Rela);
3644 size += plt_count * sizeof (asymbol);
468392fb 3645
066ee829
AM
3646 p = relplt->relocation;
3647 for (i = 0; i < plt_count; i++, p++)
e054468f
AM
3648 {
3649 size += strlen ((*p->sym_ptr_ptr)->name) + sizeof ("@plt");
3650 if (p->addend != 0)
3651 size += sizeof ("+0x") - 1 + 16;
3652 }
066ee829 3653 }
468392fb
AM
3654 }
3655
c4b0b099
AM
3656 if (size == 0)
3657 goto free_contents_and_exit;
699733f6
AM
3658 s = *ret = bfd_malloc (size);
3659 if (s == NULL)
c4b0b099 3660 goto free_contents_and_exit_err;
90e3cdf2 3661
468392fb 3662 names = (char *) (s + count + plt_count + (resolv_vma != 0));
90e3cdf2 3663
699733f6 3664 for (i = secsymend; i < opdsymend; ++i)
90e3cdf2 3665 {
699733f6 3666 bfd_vma ent;
90e3cdf2 3667
5ef11c02
AM
3668 if (syms[i]->value > opd->size - 8)
3669 continue;
3670
699733f6
AM
3671 ent = bfd_get_64 (abfd, contents + syms[i]->value);
3672 if (!sym_exists_at (syms, opdsymend, symcount, -1, ent))
90e3cdf2 3673 {
0ccf57bd 3674 size_t lo, hi;
699733f6 3675 size_t len;
c9727e01 3676 asection *sec = abfd->sections;
90e3cdf2 3677
699733f6
AM
3678 *s = *syms[i];
3679 lo = codesecsym;
3680 hi = codesecsymend;
3681 while (lo < hi)
3682 {
0ccf57bd 3683 size_t mid = (lo + hi) >> 1;
699733f6
AM
3684 if (syms[mid]->section->vma < ent)
3685 lo = mid + 1;
3686 else if (syms[mid]->section->vma > ent)
3687 hi = mid;
3688 else
c9727e01
AM
3689 {
3690 sec = syms[mid]->section;
3691 break;
3692 }
699733f6
AM
3693 }
3694
c9727e01 3695 if (lo >= hi && lo > codesecsym)
699733f6 3696 sec = syms[lo - 1]->section;
699733f6
AM
3697
3698 for (; sec != NULL; sec = sec->next)
3699 {
3700 if (sec->vma > ent)
3701 break;
63524580
JK
3702 /* SEC_LOAD may not be set if SEC is from a separate debug
3703 info file. */
3704 if ((sec->flags & SEC_ALLOC) == 0)
699733f6
AM
3705 break;
3706 if ((sec->flags & SEC_CODE) != 0)
3707 s->section = sec;
3708 }
6ba2a415 3709 s->flags |= BSF_SYNTHETIC;
699733f6
AM
3710 s->value = ent - s->section->vma;
3711 s->name = names;
3712 *names++ = '.';
3713 len = strlen (syms[i]->name);
3714 memcpy (names, syms[i]->name, len + 1);
3715 names += len + 1;
6f610d07
UW
3716 /* Have udata.p point back to the original symbol this
3717 synthetic symbol was derived from. */
3718 s->udata.p = syms[i];
699733f6 3719 s++;
90e3cdf2 3720 }
90e3cdf2 3721 }
699733f6 3722 free (contents);
468392fb
AM
3723
3724 if (glink != NULL && relplt != NULL)
3725 {
3726 if (resolv_vma)
3727 {
3728 /* Add a symbol for the main glink trampoline. */
86a4952b 3729 memset (s, 0, sizeof *s);
468392fb 3730 s->the_bfd = abfd;
6ba2a415 3731 s->flags = BSF_GLOBAL | BSF_SYNTHETIC;
468392fb
AM
3732 s->section = glink;
3733 s->value = resolv_vma - glink->vma;
3734 s->name = names;
3735 memcpy (names, "__glink_PLTresolve", sizeof ("__glink_PLTresolve"));
3736 names += sizeof ("__glink_PLTresolve");
3737 s++;
3738 count++;
3739 }
3740
3741 /* FIXME: It would be very much nicer to put sym@plt on the
3742 stub rather than on the glink branch table entry. The
3743 objdump disassembler would then use a sensible symbol
3744 name on plt calls. The difficulty in doing so is
3745 a) finding the stubs, and,
3746 b) matching stubs against plt entries, and,
3747 c) there can be multiple stubs for a given plt entry.
3748
3749 Solving (a) could be done by code scanning, but older
3750 ppc64 binaries used different stubs to current code.
3751 (b) is the tricky one since you need to known the toc
3752 pointer for at least one function that uses a pic stub to
3753 be able to calculate the plt address referenced.
3754 (c) means gdb would need to set multiple breakpoints (or
3755 find the glink branch itself) when setting breakpoints
3756 for pending shared library loads. */
3757 p = relplt->relocation;
3758 for (i = 0; i < plt_count; i++, p++)
3759 {
3760 size_t len;
3761
3762 *s = **p->sym_ptr_ptr;
3763 /* Undefined syms won't have BSF_LOCAL or BSF_GLOBAL set. Since
3764 we are defining a symbol, ensure one of them is set. */
3765 if ((s->flags & BSF_LOCAL) == 0)
3766 s->flags |= BSF_GLOBAL;
6ba2a415 3767 s->flags |= BSF_SYNTHETIC;
468392fb
AM
3768 s->section = glink;
3769 s->value = glink_vma - glink->vma;
3770 s->name = names;
3771 s->udata.p = NULL;
3772 len = strlen ((*p->sym_ptr_ptr)->name);
3773 memcpy (names, (*p->sym_ptr_ptr)->name, len);
3774 names += len;
e054468f
AM
3775 if (p->addend != 0)
3776 {
3777 memcpy (names, "+0x", sizeof ("+0x") - 1);
3778 names += sizeof ("+0x") - 1;
3779 bfd_sprintf_vma (abfd, names, p->addend);
3780 names += strlen (names);
3781 }
468392fb
AM
3782 memcpy (names, "@plt", sizeof ("@plt"));
3783 names += sizeof ("@plt");
3784 s++;
b9e5796b
AM
3785 if (abi < 2)
3786 {
3787 glink_vma += 8;
3788 if (i >= 0x8000)
3789 glink_vma += 4;
3790 }
3791 else
468392fb
AM
3792 glink_vma += 4;
3793 }
3794 count += plt_count;
3795 }
90e3cdf2
JJ
3796 }
3797
c9727e01 3798 done:
a7535cf3 3799 free (syms);
90e3cdf2
JJ
3800 return count;
3801}
5bd4f169 3802\f
65f38f15
AM
3803/* The following functions are specific to the ELF linker, while
3804 functions above are used generally. Those named ppc64_elf_* are
3805 called by the main ELF linker code. They appear in this file more
3806 or less in the order in which they are called. eg.
3807 ppc64_elf_check_relocs is called early in the link process,
3808 ppc64_elf_finish_dynamic_sections is one of the last functions
e86ce104
AM
3809 called.
3810
3811 PowerPC64-ELF uses a similar scheme to PowerPC64-XCOFF in that
3812 functions have both a function code symbol and a function descriptor
3813 symbol. A call to foo in a relocatable object file looks like:
3814
3815 . .text
3816 . x:
3817 . bl .foo
3818 . nop
3819
3820 The function definition in another object file might be:
3821
3822 . .section .opd
3823 . foo: .quad .foo
3824 . .quad .TOC.@tocbase
3825 . .quad 0
3826 .
3827 . .text
3828 . .foo: blr
3829
3830 When the linker resolves the call during a static link, the branch
3831 unsurprisingly just goes to .foo and the .opd information is unused.
3832 If the function definition is in a shared library, things are a little
3833 different: The call goes via a plt call stub, the opd information gets
3834 copied to the plt, and the linker patches the nop.
3835
3836 . x:
3837 . bl .foo_stub
3838 . ld 2,40(1)
3839 .
3840 .
3841 . .foo_stub:
71a39c98
AM
3842 . std 2,40(1) # in practice, the call stub
3843 . addis 11,2,Lfoo@toc@ha # is slightly optimized, but
3844 . addi 11,11,Lfoo@toc@l # this is the general idea
3845 . ld 12,0(11)
3846 . ld 2,8(11)
3847 . mtctr 12
3848 . ld 11,16(11)
e86ce104
AM
3849 . bctr
3850 .
3851 . .section .plt
3852 . Lfoo: reloc (R_PPC64_JMP_SLOT, foo)
3853
3854 The "reloc ()" notation is supposed to indicate that the linker emits
3855 an R_PPC64_JMP_SLOT reloc against foo. The dynamic linker does the opd
3856 copying.
3857
3858 What are the difficulties here? Well, firstly, the relocations
3859 examined by the linker in check_relocs are against the function code
3860 sym .foo, while the dynamic relocation in the plt is emitted against
3861 the function descriptor symbol, foo. Somewhere along the line, we need
3862 to carefully copy dynamic link information from one symbol to the other.
3863 Secondly, the generic part of the elf linker will make .foo a dynamic
3864 symbol as is normal for most other backends. We need foo dynamic
3865 instead, at least for an application final link. However, when
3866 creating a shared library containing foo, we need to have both symbols
3867 dynamic so that references to .foo are satisfied during the early
3868 stages of linking. Otherwise the linker might decide to pull in a
8387904d
AM
3869 definition from some other object, eg. a static library.
3870
3871 Update: As of August 2004, we support a new convention. Function
3872 calls may use the function descriptor symbol, ie. "bl foo". This
3873 behaves exactly as "bl .foo". */
65f38f15 3874
7c8bbca5
AM
3875/* Of those relocs that might be copied as dynamic relocs, this
3876 function selects those that must be copied when linking a shared
3877 library or PIE, even when the symbol is local. */
65f38f15 3878
1d483afe
AM
3879static int
3880must_be_dyn_reloc (struct bfd_link_info *info,
3881 enum elf_ppc64_reloc_type r_type)
3882{
3883 switch (r_type)
3884 {
3885 default:
7c8bbca5
AM
3886 /* Only relative relocs can be resolved when the object load
3887 address isn't fixed. DTPREL64 is excluded because the
3888 dynamic linker needs to differentiate global dynamic from
3889 local dynamic __tls_index pairs when PPC64_OPT_TLS is set. */
1d483afe
AM
3890 return 1;
3891
3892 case R_PPC64_REL32:
3893 case R_PPC64_REL64:
3894 case R_PPC64_REL30:
3895 return 0;
3896
3897 case R_PPC64_TPREL16:
3898 case R_PPC64_TPREL16_LO:
3899 case R_PPC64_TPREL16_HI:
3900 case R_PPC64_TPREL16_HA:
3901 case R_PPC64_TPREL16_DS:
3902 case R_PPC64_TPREL16_LO_DS:
f9c6b907
AM
3903 case R_PPC64_TPREL16_HIGH:
3904 case R_PPC64_TPREL16_HIGHA:
1d483afe
AM
3905 case R_PPC64_TPREL16_HIGHER:
3906 case R_PPC64_TPREL16_HIGHERA:
3907 case R_PPC64_TPREL16_HIGHEST:
3908 case R_PPC64_TPREL16_HIGHESTA:
3909 case R_PPC64_TPREL64:
7c8bbca5
AM
3910 /* These relocations are relative but in a shared library the
3911 linker doesn't know the thread pointer base. */
3912 return bfd_link_dll (info);
1d483afe
AM
3913 }
3914}
65f38f15 3915
f4656909
AM
3916/* If ELIMINATE_COPY_RELOCS is non-zero, the linker will try to avoid
3917 copying dynamic variables from a shared lib into an app's dynbss
3918 section, and instead use a dynamic relocation to point into the
5d35169e
AM
3919 shared lib. With code that gcc generates, it's vital that this be
3920 enabled; In the PowerPC64 ABI, the address of a function is actually
3921 the address of a function descriptor, which resides in the .opd
3922 section. gcc uses the descriptor directly rather than going via the
3923 GOT as some other ABI's do, which means that initialized function
3924 pointers must reference the descriptor. Thus, a function pointer
3925 initialized to the address of a function in a shared library will
3926 either require a copy reloc, or a dynamic reloc. Using a copy reloc
4cc11e76 3927 redefines the function descriptor symbol to point to the copy. This
5d35169e
AM
3928 presents a problem as a plt entry for that function is also
3929 initialized from the function descriptor symbol and the copy reloc
3930 may not be initialized first. */
a23b6845 3931#define ELIMINATE_COPY_RELOCS 1
f4656909 3932
721956f4 3933/* Section name for stubs is the associated section name plus this
29942be8
NC
3934 string. */
3935#define STUB_SUFFIX ".stub"
721956f4
AM
3936
3937/* Linker stubs.
3938 ppc_stub_long_branch:
3939 Used when a 14 bit branch (or even a 24 bit branch) can't reach its
3940 destination, but a 24 bit branch in a stub section will reach.
3941 . b dest
3942
3943 ppc_stub_plt_branch:
3944 Similar to the above, but a 24 bit branch in the stub section won't
3945 reach its destination.
71a39c98
AM
3946 . addis %r11,%r2,xxx@toc@ha
3947 . ld %r12,xxx@toc@l(%r11)
3948 . mtctr %r12
721956f4
AM
3949 . bctr
3950
3951 ppc_stub_plt_call:
2c66dc6c
AM
3952 Used to call a function in a shared library. If it so happens that
3953 the plt entry referenced crosses a 64k boundary, then an extra
71a39c98 3954 "addi %r11,%r11,xxx@toc@l" will be inserted before the "mtctr".
721956f4 3955 . std %r2,40(%r1)
71a39c98
AM
3956 . addis %r11,%r2,xxx@toc@ha
3957 . ld %r12,xxx+0@toc@l(%r11)
3958 . mtctr %r12
3959 . ld %r2,xxx+8@toc@l(%r11)
3960 . ld %r11,xxx+16@toc@l(%r11)
721956f4 3961 . bctr
ad8e1ba5
AM
3962
3963 ppc_stub_long_branch and ppc_stub_plt_branch may also have additional
3964 code to adjust the value and save r2 to support multiple toc sections.
3965 A ppc_stub_long_branch with an r2 offset looks like:
3966 . std %r2,40(%r1)
3967 . addis %r2,%r2,off@ha
3968 . addi %r2,%r2,off@l
3969 . b dest
3970
3971 A ppc_stub_plt_branch with an r2 offset looks like:
3972 . std %r2,40(%r1)
71a39c98
AM
3973 . addis %r11,%r2,xxx@toc@ha
3974 . ld %r12,xxx@toc@l(%r11)
ad8e1ba5
AM
3975 . addis %r2,%r2,off@ha
3976 . addi %r2,%r2,off@l
71a39c98 3977 . mtctr %r12
ad8e1ba5 3978 . bctr
ac2df442
AM
3979
3980 In cases where the "addis" instruction would add zero, the "addis" is
3981 omitted and following instructions modified slightly in some cases.
721956f4
AM
3982*/
3983
3984enum ppc_stub_type {
3985 ppc_stub_none,
3986 ppc_stub_long_branch,
ad8e1ba5 3987 ppc_stub_long_branch_r2off,
721956f4 3988 ppc_stub_plt_branch,
ad8e1ba5 3989 ppc_stub_plt_branch_r2off,
794e51c0 3990 ppc_stub_plt_call,
7341d5e2 3991 ppc_stub_plt_call_r2save,
a4b6fadd
AM
3992 ppc_stub_global_entry,
3993 ppc_stub_save_res
721956f4
AM
3994};
3995
6f20ed8a
AM
3996/* Information on stub grouping. */
3997struct map_stub
3998{
3999 /* The stub section. */
4000 asection *stub_sec;
4001 /* This is the section to which stubs in the group will be attached. */
4002 asection *link_sec;
a4b6fadd
AM
4003 /* Next group. */
4004 struct map_stub *next;
4005 /* Whether to emit a copy of register save/restore functions in this
4006 group. */
4007 int needs_save_res;
d4aaa2a0
AM
4008 /* The offset of the __tls_get_addr_opt plt stub bctrl in this group,
4009 or -1u if no such stub with bctrl exists. */
4010 unsigned int tls_get_addr_opt_bctrl;
6f20ed8a
AM
4011};
4012
721956f4
AM
4013struct ppc_stub_hash_entry {
4014
4015 /* Base hash table entry structure. */
4016 struct bfd_hash_entry root;
4017
ad8e1ba5
AM
4018 enum ppc_stub_type stub_type;
4019
6f20ed8a
AM
4020 /* Group information. */
4021 struct map_stub *group;
721956f4
AM
4022
4023 /* Offset within stub_sec of the beginning of this stub. */
4024 bfd_vma stub_offset;
4025
4026 /* Given the symbol's value and its section we can determine its final
4027 value when building the stubs (so the stub knows where to jump. */
4028 bfd_vma target_value;
4029 asection *target_section;
4030
721956f4
AM
4031 /* The symbol table entry, if any, that this was derived from. */
4032 struct ppc_link_hash_entry *h;
e054468f 4033 struct plt_entry *plt_ent;
721956f4 4034
2d7ad24e
AM
4035 /* Symbol type. */
4036 unsigned char symtype;
4037
6911b7dc
AM
4038 /* Symbol st_other. */
4039 unsigned char other;
721956f4
AM
4040};
4041
4042struct ppc_branch_hash_entry {
4043
4044 /* Base hash table entry structure. */
4045 struct bfd_hash_entry root;
4046
c456f082 4047 /* Offset within branch lookup table. */
721956f4
AM
4048 unsigned int offset;
4049
4050 /* Generation marker. */
4051 unsigned int iter;
4052};
65f38f15 4053
19e08130
AM
4054/* Used to track dynamic relocations for local symbols. */
4055struct ppc_dyn_relocs
4056{
4057 struct ppc_dyn_relocs *next;
4058
4059 /* The input section of the reloc. */
4060 asection *sec;
4061
4062 /* Total number of relocs copied for the input section. */
4063 unsigned int count : 31;
4064
4065 /* Whether this entry is for STT_GNU_IFUNC symbols. */
4066 unsigned int ifunc : 1;
4067};
4068
65f38f15
AM
4069struct ppc_link_hash_entry
4070{
4071 struct elf_link_hash_entry elf;
4072
b3fac117
AM
4073 union {
4074 /* A pointer to the most recently used stub hash entry against this
4075 symbol. */
4076 struct ppc_stub_hash_entry *stub_cache;
4077
4078 /* A pointer to the next symbol starting with a '.' */
4079 struct ppc_link_hash_entry *next_dot_sym;
4080 } u;
721956f4 4081
65f38f15 4082 /* Track dynamic relocs copied for this symbol. */
6061a67d 4083 struct elf_dyn_relocs *dyn_relocs;
e86ce104 4084
721956f4 4085 /* Link between function code and descriptor symbols. */
34814b9f 4086 struct ppc_link_hash_entry *oh;
721956f4 4087
e86ce104
AM
4088 /* Flag function code and descriptor symbols. */
4089 unsigned int is_func:1;
4090 unsigned int is_func_descriptor:1;
908b32fc 4091 unsigned int fake:1;
411e1bfb 4092
c5614fa4
AM
4093 /* Whether global opd/toc sym has been adjusted or not.
4094 After ppc64_elf_edit_opd/ppc64_elf_edit_toc has run, this flag
4095 should be set for all globals defined in any opd/toc section. */
754021d0
AM
4096 unsigned int adjust_done:1;
4097
a4b6fadd
AM
4098 /* Set if this is an out-of-line register save/restore function,
4099 with non-standard calling convention. */
4100 unsigned int save_res:1;
4101
8b5f1ed8
AM
4102 /* Set if a duplicate symbol with non-zero localentry is detected,
4103 even when the duplicate symbol does not provide a definition. */
4104 unsigned int non_zero_localentry:1;
4105
411e1bfb 4106 /* Contexts in which symbol is used in the GOT (or TOC).
37da22e5
AM
4107 Bits are or'd into the mask as the corresponding relocs are
4108 encountered during check_relocs, with TLS_TLS being set when any
4109 of the other TLS bits are set. tls_optimize clears bits when
4110 optimizing to indicate the corresponding GOT entry type is not
4111 needed. If set, TLS_TLS is never cleared. tls_optimize may also
4112 set TLS_TPRELGD when a GD reloc turns into a TPREL one. We use a
4113 separate flag rather than setting TPREL just for convenience in
4114 distinguishing the two cases.
4115 These flags are also kept for local symbols. */
4116#define TLS_TLS 1 /* Any TLS reloc. */
4117#define TLS_GD 2 /* GD reloc. */
4118#define TLS_LD 4 /* LD reloc. */
4119#define TLS_TPREL 8 /* TPREL reloc, => IE. */
4120#define TLS_DTPREL 16 /* DTPREL reloc, => LD. */
4121#define TLS_MARK 32 /* __tls_get_addr call marked. */
e7b938ca 4122#define TLS_TPRELGD 64 /* TPREL reloc resulting from GD->IE. */
37da22e5 4123#define TLS_EXPLICIT 128 /* Marks TOC section TLS relocs. */
f961d9dd 4124 unsigned char tls_mask;
37da22e5
AM
4125
4126 /* The above field is also used to mark function symbols. In which
4127 case TLS_TLS will be 0. */
4128#define PLT_IFUNC 2 /* STT_GNU_IFUNC. */
2d7ad24e 4129#define PLT_KEEP 4 /* inline plt call requires plt entry. */
37da22e5 4130#define NON_GOT 256 /* local symbol plt, not stored. */
65f38f15
AM
4131};
4132
4133/* ppc64 ELF linker hash table. */
4134
4135struct ppc_link_hash_table
4136{
4137 struct elf_link_hash_table elf;
4138
721956f4
AM
4139 /* The stub hash table. */
4140 struct bfd_hash_table stub_hash_table;
4141
4142 /* Another hash table for plt_branch stubs. */
4143 struct bfd_hash_table branch_hash_table;
4144
3b421ab3
AM
4145 /* Hash table for function prologue tocsave. */
4146 htab_t tocsave_htab;
4147
e7d1c40c
AM
4148 /* Various options and other info passed from the linker. */
4149 struct ppc64_elf_params *params;
721956f4 4150
6f20ed8a
AM
4151 /* The size of sec_info below. */
4152 unsigned int sec_info_arr_size;
4153
4154 /* Per-section array of extra section info. Done this way rather
4155 than as part of ppc64_elf_section_data so we have the info for
4156 non-ppc64 sections. */
4157 struct
4158 {
4159 /* Along with elf_gp, specifies the TOC pointer used by this section. */
ad8e1ba5 4160 bfd_vma toc_off;
6f20ed8a
AM
4161
4162 union
4163 {
4164 /* The section group that this section belongs to. */
4165 struct map_stub *group;
4166 /* A temp section list pointer. */
4167 asection *list;
4168 } u;
4169 } *sec_info;
721956f4 4170
a4b6fadd
AM
4171 /* Linked list of groups. */
4172 struct map_stub *group;
4173
ad8e1ba5
AM
4174 /* Temp used when calculating TOC pointers. */
4175 bfd_vma toc_curr;
bf102f86
AM
4176 bfd *toc_bfd;
4177 asection *toc_first_sec;
ad8e1ba5 4178
b3fac117
AM
4179 /* Used when adding symbols. */
4180 struct ppc_link_hash_entry *dot_syms;
4181
33e44f2e 4182 /* Shortcuts to get to dynamic linker sections. */
4ce794b7 4183 asection *glink;
9e390558 4184 asection *global_entry;
82bd7b59 4185 asection *sfpr;
2d7ad24e
AM
4186 asection *pltlocal;
4187 asection *relpltlocal;
4ce794b7
AM
4188 asection *brlt;
4189 asection *relbrlt;
58d180e8 4190 asection *glink_eh_frame;
ec338859 4191
8387904d
AM
4192 /* Shortcut to .__tls_get_addr and __tls_get_addr. */
4193 struct ppc_link_hash_entry *tls_get_addr;
4194 struct ppc_link_hash_entry *tls_get_addr_fd;
411e1bfb 4195
927be08e
AM
4196 /* The size of reliplt used by got entry relocs. */
4197 bfd_size_type got_reli_size;
4198
9b5ecbd0 4199 /* Statistics. */
7341d5e2 4200 unsigned long stub_count[ppc_stub_global_entry];
9b5ecbd0 4201
ee75fd95
AM
4202 /* Number of stubs against global syms. */
4203 unsigned long stub_globals;
4204
ee67d69a
AM
4205 /* Set if we're linking code with function descriptors. */
4206 unsigned int opd_abi:1;
4207
4c52953f 4208 /* Support for multiple toc sections. */
33c0ec9d 4209 unsigned int do_multi_toc:1;
4c52953f 4210 unsigned int multi_toc_needed:1;
927be08e 4211 unsigned int second_toc_pass:1;
67f0cbdb 4212 unsigned int do_toc_opt:1;
4c52953f 4213
9a23f96e
AM
4214 /* Set if tls optimization is enabled. */
4215 unsigned int do_tls_opt:1;
4216
3e04d765
AM
4217 /* Set if inline plt calls should be converted to direct calls. */
4218 unsigned int can_convert_all_inline_plt:1;
4219
5d1634d7 4220 /* Set on error. */
99877b66 4221 unsigned int stub_error:1;
721956f4 4222
8c5b4e52
AM
4223 /* Whether func_desc_adjust needs to be run over symbols. */
4224 unsigned int need_func_desc_adj:1;
721956f4 4225
82e66161
AM
4226 /* Whether there exist local gnu indirect function resolvers,
4227 referenced by dynamic relocations. */
4228 unsigned int local_ifunc_resolver:1;
4229 unsigned int maybe_local_ifunc_resolver:1;
4230
f378ab09
AM
4231 /* Whether plt calls for ELFv2 localentry:0 funcs have been optimized. */
4232 unsigned int has_plt_localentry0:1;
4233
721956f4
AM
4234 /* Incremented every time we size stubs. */
4235 unsigned int stub_iteration;
5d1634d7 4236
87d72d41
AM
4237 /* Small local sym cache. */
4238 struct sym_cache sym_cache;
65f38f15
AM
4239};
4240
4c52953f
AM
4241/* Rename some of the generic section flags to better document how they
4242 are used here. */
b0dddeec
AM
4243
4244/* Nonzero if this section has TLS related relocations. */
4245#define has_tls_reloc sec_flg0
4246
23cedd1d 4247/* Nonzero if this section has an old-style call to __tls_get_addr. */
b0dddeec
AM
4248#define has_tls_get_addr_call sec_flg1
4249
4250/* Nonzero if this section has any toc or got relocs. */
4251#define has_toc_reloc sec_flg2
4252
4253/* Nonzero if this section has a call to another section that uses
4254 the toc or got. */
d77c8a4b 4255#define makes_toc_func_call sec_flg3
b0dddeec
AM
4256
4257/* Recursion protection when determining above flag. */
d77c8a4b 4258#define call_check_in_progress sec_flg4
70cc837d 4259#define call_check_done sec_flg5
4c52953f 4260
65f38f15
AM
4261/* Get the ppc64 ELF linker hash table from a link_info structure. */
4262
4263#define ppc_hash_table(p) \
4dfe6ac6
NC
4264 (elf_hash_table_id ((struct elf_link_hash_table *) ((p)->hash)) \
4265 == PPC64_ELF_DATA ? ((struct ppc_link_hash_table *) ((p)->hash)) : NULL)
65f38f15 4266
721956f4
AM
4267#define ppc_stub_hash_lookup(table, string, create, copy) \
4268 ((struct ppc_stub_hash_entry *) \
4269 bfd_hash_lookup ((table), (string), (create), (copy)))
4270
4271#define ppc_branch_hash_lookup(table, string, create, copy) \
4272 ((struct ppc_branch_hash_entry *) \
4273 bfd_hash_lookup ((table), (string), (create), (copy)))
4274
4275/* Create an entry in the stub hash table. */
4276
4277static struct bfd_hash_entry *
4ce794b7
AM
4278stub_hash_newfunc (struct bfd_hash_entry *entry,
4279 struct bfd_hash_table *table,
4280 const char *string)
721956f4
AM
4281{
4282 /* Allocate the structure if it has not already been allocated by a
4283 subclass. */
4284 if (entry == NULL)
4285 {
4286 entry = bfd_hash_allocate (table, sizeof (struct ppc_stub_hash_entry));
4287 if (entry == NULL)
4288 return entry;
4289 }
4290
4291 /* Call the allocation method of the superclass. */
4292 entry = bfd_hash_newfunc (entry, table, string);
4293 if (entry != NULL)
4294 {
4295 struct ppc_stub_hash_entry *eh;
4296
4297 /* Initialize the local fields. */
4298 eh = (struct ppc_stub_hash_entry *) entry;
ad8e1ba5 4299 eh->stub_type = ppc_stub_none;
6f20ed8a 4300 eh->group = NULL;
721956f4
AM
4301 eh->stub_offset = 0;
4302 eh->target_value = 0;
4303 eh->target_section = NULL;
721956f4 4304 eh->h = NULL;
6911b7dc 4305 eh->plt_ent = NULL;
6911b7dc 4306 eh->other = 0;
721956f4
AM
4307 }
4308
4309 return entry;
4310}
4311
4312/* Create an entry in the branch hash table. */
4313
4314static struct bfd_hash_entry *
4ce794b7
AM
4315branch_hash_newfunc (struct bfd_hash_entry *entry,
4316 struct bfd_hash_table *table,
4317 const char *string)
721956f4
AM
4318{
4319 /* Allocate the structure if it has not already been allocated by a
4320 subclass. */
4321 if (entry == NULL)
4322 {
4323 entry = bfd_hash_allocate (table, sizeof (struct ppc_branch_hash_entry));
4324 if (entry == NULL)
4325 return entry;
4326 }
4327
4328 /* Call the allocation method of the superclass. */
4329 entry = bfd_hash_newfunc (entry, table, string);
4330 if (entry != NULL)
4331 {
4332 struct ppc_branch_hash_entry *eh;
4333
4334 /* Initialize the local fields. */
4335 eh = (struct ppc_branch_hash_entry *) entry;
4336 eh->offset = 0;
4337 eh->iter = 0;
4338 }
4339
4340 return entry;
4341}
4342
65f38f15
AM
4343/* Create an entry in a ppc64 ELF linker hash table. */
4344
4345static struct bfd_hash_entry *
4ce794b7
AM
4346link_hash_newfunc (struct bfd_hash_entry *entry,
4347 struct bfd_hash_table *table,
4348 const char *string)
65f38f15
AM
4349{
4350 /* Allocate the structure if it has not already been allocated by a
4351 subclass. */
4352 if (entry == NULL)
4353 {
4354 entry = bfd_hash_allocate (table, sizeof (struct ppc_link_hash_entry));
4355 if (entry == NULL)
4356 return entry;
4357 }
4358
4359 /* Call the allocation method of the superclass. */
4360 entry = _bfd_elf_link_hash_newfunc (entry, table, string);
4361 if (entry != NULL)
4362 {
4363 struct ppc_link_hash_entry *eh = (struct ppc_link_hash_entry *) entry;
4364
b3fac117 4365 memset (&eh->u.stub_cache, 0,
908b32fc 4366 (sizeof (struct ppc_link_hash_entry)
b3fac117
AM
4367 - offsetof (struct ppc_link_hash_entry, u.stub_cache)));
4368
4369 /* When making function calls, old ABI code references function entry
4370 points (dot symbols), while new ABI code references the function
4371 descriptor symbol. We need to make any combination of reference and
4372 definition work together, without breaking archive linking.
4373
4374 For a defined function "foo" and an undefined call to "bar":
4375 An old object defines "foo" and ".foo", references ".bar" (possibly
4376 "bar" too).
4377 A new object defines "foo" and references "bar".
4378
4379 A new object thus has no problem with its undefined symbols being
4380 satisfied by definitions in an old object. On the other hand, the
4381 old object won't have ".bar" satisfied by a new object.
4382
4383 Keep a list of newly added dot-symbols. */
4384
4385 if (string[0] == '.')
4386 {
4387 struct ppc_link_hash_table *htab;
4388
4389 htab = (struct ppc_link_hash_table *) table;
4390 eh->u.next_dot_sym = htab->dot_syms;
4391 htab->dot_syms = eh;
4392 }
65f38f15
AM
4393 }
4394
4395 return entry;
4396}
4397
3b421ab3
AM
4398struct tocsave_entry {
4399 asection *sec;
4400 bfd_vma offset;
4401};
4402
4403static hashval_t
4404tocsave_htab_hash (const void *p)
4405{
4406 const struct tocsave_entry *e = (const struct tocsave_entry *) p;
4aef7643 4407 return ((bfd_vma) (intptr_t) e->sec ^ e->offset) >> 3;
3b421ab3
AM
4408}
4409
4410static int
4411tocsave_htab_eq (const void *p1, const void *p2)
4412{
4413 const struct tocsave_entry *e1 = (const struct tocsave_entry *) p1;
4414 const struct tocsave_entry *e2 = (const struct tocsave_entry *) p2;
4415 return e1->sec == e2->sec && e1->offset == e2->offset;
4416}
4417
68faa637
AM
4418/* Destroy a ppc64 ELF linker hash table. */
4419
4420static void
d495ab0d 4421ppc64_elf_link_hash_table_free (bfd *obfd)
68faa637 4422{
d495ab0d 4423 struct ppc_link_hash_table *htab;
68faa637 4424
d495ab0d 4425 htab = (struct ppc_link_hash_table *) obfd->link.hash;
68faa637
AM
4426 if (htab->tocsave_htab)
4427 htab_delete (htab->tocsave_htab);
d495ab0d
AM
4428 bfd_hash_table_free (&htab->branch_hash_table);
4429 bfd_hash_table_free (&htab->stub_hash_table);
4430 _bfd_elf_link_hash_table_free (obfd);
68faa637
AM
4431}
4432
65f38f15
AM
4433/* Create a ppc64 ELF linker hash table. */
4434
4435static struct bfd_link_hash_table *
4ce794b7 4436ppc64_elf_link_hash_table_create (bfd *abfd)
65f38f15
AM
4437{
4438 struct ppc_link_hash_table *htab;
4439 bfd_size_type amt = sizeof (struct ppc_link_hash_table);
4440
4ce794b7 4441 htab = bfd_zmalloc (amt);
65f38f15
AM
4442 if (htab == NULL)
4443 return NULL;
4444
66eb6687 4445 if (!_bfd_elf_link_hash_table_init (&htab->elf, abfd, link_hash_newfunc,
4dfe6ac6
NC
4446 sizeof (struct ppc_link_hash_entry),
4447 PPC64_ELF_DATA))
65f38f15 4448 {
e2d34d7d 4449 free (htab);
65f38f15
AM
4450 return NULL;
4451 }
4452
721956f4 4453 /* Init the stub hash table too. */
66eb6687
AM
4454 if (!bfd_hash_table_init (&htab->stub_hash_table, stub_hash_newfunc,
4455 sizeof (struct ppc_stub_hash_entry)))
2915c55b 4456 {
d495ab0d 4457 _bfd_elf_link_hash_table_free (abfd);
2915c55b
JK
4458 return NULL;
4459 }
721956f4
AM
4460
4461 /* And the branch hash table. */
66eb6687
AM
4462 if (!bfd_hash_table_init (&htab->branch_hash_table, branch_hash_newfunc,
4463 sizeof (struct ppc_branch_hash_entry)))
2915c55b
JK
4464 {
4465 bfd_hash_table_free (&htab->stub_hash_table);
d495ab0d 4466 _bfd_elf_link_hash_table_free (abfd);
2915c55b
JK
4467 return NULL;
4468 }
721956f4 4469
3b421ab3
AM
4470 htab->tocsave_htab = htab_try_create (1024,
4471 tocsave_htab_hash,
4472 tocsave_htab_eq,
4473 NULL);
4474 if (htab->tocsave_htab == NULL)
2915c55b 4475 {
d495ab0d 4476 ppc64_elf_link_hash_table_free (abfd);
2915c55b
JK
4477 return NULL;
4478 }
d495ab0d 4479 htab->elf.root.hash_table_free = ppc64_elf_link_hash_table_free;
3b421ab3 4480
3254fd24
AM
4481 /* Initializing two fields of the union is just cosmetic. We really
4482 only care about glist, but when compiled on a 32-bit host the
4483 bfd_vma fields are larger. Setting the bfd_vma to zero makes
4484 debugger inspection of these fields look nicer. */
a6aa5195
AM
4485 htab->elf.init_got_refcount.refcount = 0;
4486 htab->elf.init_got_refcount.glist = NULL;
4487 htab->elf.init_plt_refcount.refcount = 0;
4488 htab->elf.init_plt_refcount.glist = NULL;
4489 htab->elf.init_got_offset.offset = 0;
4490 htab->elf.init_got_offset.glist = NULL;
4491 htab->elf.init_plt_offset.offset = 0;
4492 htab->elf.init_plt_offset.glist = NULL;
3254fd24 4493
65f38f15
AM
4494 return &htab->elf.root;
4495}
4496
bfeb4a28
AM
4497/* Create sections for linker generated code. */
4498
4499static bfd_boolean
4500create_linkage_sections (bfd *dynobj, struct bfd_link_info *info)
4501{
4502 struct ppc_link_hash_table *htab;
4503 flagword flags;
4504
4505 htab = ppc_hash_table (info);
4506
bfeb4a28
AM
4507 flags = (SEC_ALLOC | SEC_LOAD | SEC_CODE | SEC_READONLY
4508 | SEC_HAS_CONTENTS | SEC_IN_MEMORY | SEC_LINKER_CREATED);
b32547cd
AM
4509 if (htab->params->save_restore_funcs)
4510 {
4511 /* Create .sfpr for code to save and restore fp regs. */
4512 htab->sfpr = bfd_make_section_anyway_with_flags (dynobj, ".sfpr",
4513 flags);
4514 if (htab->sfpr == NULL
4515 || ! bfd_set_section_alignment (dynobj, htab->sfpr, 2))
4516 return FALSE;
4517 }
4518
4519 if (bfd_link_relocatable (info))
4520 return TRUE;
bfeb4a28
AM
4521
4522 /* Create .glink for lazy dynamic linking support. */
4523 htab->glink = bfd_make_section_anyway_with_flags (dynobj, ".glink",
4524 flags);
4525 if (htab->glink == NULL
4526 || ! bfd_set_section_alignment (dynobj, htab->glink, 3))
4527 return FALSE;
4528
9e390558
AM
4529 /* The part of .glink used by global entry stubs, separate so that
4530 it can be aligned appropriately without affecting htab->glink. */
4531 htab->global_entry = bfd_make_section_anyway_with_flags (dynobj, ".glink",
4532 flags);
4533 if (htab->global_entry == NULL
4534 || ! bfd_set_section_alignment (dynobj, htab->global_entry, 2))
4535 return FALSE;
4536
bfeb4a28
AM
4537 if (!info->no_ld_generated_unwind_info)
4538 {
4539 flags = (SEC_ALLOC | SEC_LOAD | SEC_READONLY | SEC_HAS_CONTENTS
4540 | SEC_IN_MEMORY | SEC_LINKER_CREATED);
4541 htab->glink_eh_frame = bfd_make_section_anyway_with_flags (dynobj,
4542 ".eh_frame",
4543 flags);
4544 if (htab->glink_eh_frame == NULL
4545 || !bfd_set_section_alignment (dynobj, htab->glink_eh_frame, 2))
4546 return FALSE;
4547 }
4548
4549 flags = SEC_ALLOC | SEC_LINKER_CREATED;
33e44f2e
AM
4550 htab->elf.iplt = bfd_make_section_anyway_with_flags (dynobj, ".iplt", flags);
4551 if (htab->elf.iplt == NULL
4552 || ! bfd_set_section_alignment (dynobj, htab->elf.iplt, 3))
bfeb4a28
AM
4553 return FALSE;
4554
4555 flags = (SEC_ALLOC | SEC_LOAD | SEC_READONLY
4556 | SEC_HAS_CONTENTS | SEC_IN_MEMORY | SEC_LINKER_CREATED);
33e44f2e
AM
4557 htab->elf.irelplt
4558 = bfd_make_section_anyway_with_flags (dynobj, ".rela.iplt", flags);
4559 if (htab->elf.irelplt == NULL
4560 || ! bfd_set_section_alignment (dynobj, htab->elf.irelplt, 3))
bfeb4a28
AM
4561 return FALSE;
4562
4563 /* Create branch lookup table for plt_branch stubs. */
4564 flags = (SEC_ALLOC | SEC_LOAD
4565 | SEC_HAS_CONTENTS | SEC_IN_MEMORY | SEC_LINKER_CREATED);
4566 htab->brlt = bfd_make_section_anyway_with_flags (dynobj, ".branch_lt",
4567 flags);
4568 if (htab->brlt == NULL
4569 || ! bfd_set_section_alignment (dynobj, htab->brlt, 3))
4570 return FALSE;
4571
2d7ad24e
AM
4572 /* Local plt entries, put in .branch_lt but a separate section for
4573 convenience. */
4574 htab->pltlocal = bfd_make_section_anyway_with_flags (dynobj, ".branch_lt",
4575 flags);
4576 if (htab->pltlocal == NULL
4577 || ! bfd_set_section_alignment (dynobj, htab->pltlocal, 3))
4578 return FALSE;
4579
0e1862bb 4580 if (!bfd_link_pic (info))
bfeb4a28
AM
4581 return TRUE;
4582
4583 flags = (SEC_ALLOC | SEC_LOAD | SEC_READONLY
4584 | SEC_HAS_CONTENTS | SEC_IN_MEMORY | SEC_LINKER_CREATED);
2d7ad24e
AM
4585 htab->relbrlt
4586 = bfd_make_section_anyway_with_flags (dynobj, ".rela.branch_lt", flags);
bfeb4a28
AM
4587 if (htab->relbrlt == NULL
4588 || ! bfd_set_section_alignment (dynobj, htab->relbrlt, 3))
4589 return FALSE;
4590
2d7ad24e
AM
4591 htab->relpltlocal
4592 = bfd_make_section_anyway_with_flags (dynobj, ".rela.branch_lt", flags);
4593 if (htab->relpltlocal == NULL
4594 || ! bfd_set_section_alignment (dynobj, htab->relpltlocal, 3))
4595 return FALSE;
4596
bfeb4a28
AM
4597 return TRUE;
4598}
4599
e717da7e
AM
4600/* Satisfy the ELF linker by filling in some fields in our fake bfd. */
4601
bfeb4a28 4602bfd_boolean
e7d1c40c
AM
4603ppc64_elf_init_stub_bfd (struct bfd_link_info *info,
4604 struct ppc64_elf_params *params)
e717da7e
AM
4605{
4606 struct ppc_link_hash_table *htab;
4607
e7d1c40c 4608 elf_elfheader (params->stub_bfd)->e_ident[EI_CLASS] = ELFCLASS64;
e717da7e
AM
4609
4610/* Always hook our dynamic sections into the first bfd, which is the
4611 linker created stub bfd. This ensures that the GOT header is at
4612 the start of the output TOC section. */
4613 htab = ppc_hash_table (info);
e7d1c40c
AM
4614 htab->elf.dynobj = params->stub_bfd;
4615 htab->params = params;
bfeb4a28 4616
bfeb4a28 4617 return create_linkage_sections (htab->elf.dynobj, info);
e717da7e
AM
4618}
4619
721956f4
AM
4620/* Build a name for an entry in the stub hash table. */
4621
4622static char *
4ce794b7
AM
4623ppc_stub_name (const asection *input_section,
4624 const asection *sym_sec,
4625 const struct ppc_link_hash_entry *h,
4626 const Elf_Internal_Rela *rel)
721956f4
AM
4627{
4628 char *stub_name;
bcaa2f82 4629 ssize_t len;
721956f4
AM
4630
4631 /* rel->r_addend is actually 64 bit, but who uses more than +/- 2^31
4632 offsets from a sym as a branch target? In fact, we could
4633 probably assume the addend is always zero. */
4634 BFD_ASSERT (((int) rel->r_addend & 0xffffffff) == rel->r_addend);
4635
4636 if (h)
4637 {
4638 len = 8 + 1 + strlen (h->elf.root.root.string) + 1 + 8 + 1;
4639 stub_name = bfd_malloc (len);
46de2a7c
AM
4640 if (stub_name == NULL)
4641 return stub_name;
4642
bcaa2f82
AM
4643 len = sprintf (stub_name, "%08x.%s+%x",
4644 input_section->id & 0xffffffff,
4645 h->elf.root.root.string,
4646 (int) rel->r_addend & 0xffffffff);
721956f4
AM
4647 }
4648 else
4649 {
ad8e1ba5 4650 len = 8 + 1 + 8 + 1 + 8 + 1 + 8 + 1;
721956f4 4651 stub_name = bfd_malloc (len);
46de2a7c
AM
4652 if (stub_name == NULL)
4653 return stub_name;
4654
bcaa2f82
AM
4655 len = sprintf (stub_name, "%08x.%x:%x+%x",
4656 input_section->id & 0xffffffff,
4657 sym_sec->id & 0xffffffff,
4658 (int) ELF64_R_SYM (rel->r_info) & 0xffffffff,
4659 (int) rel->r_addend & 0xffffffff);
721956f4 4660 }
bcaa2f82 4661 if (len > 2 && stub_name[len - 2] == '+' && stub_name[len - 1] == '0')
ee75fd95 4662 stub_name[len - 2] = 0;
721956f4
AM
4663 return stub_name;
4664}
4665
4666/* Look up an entry in the stub hash. Stub entries are cached because
4667 creating the stub name takes a bit of time. */
4668
4669static struct ppc_stub_hash_entry *
4ce794b7
AM
4670ppc_get_stub_entry (const asection *input_section,
4671 const asection *sym_sec,
039b3fef 4672 struct ppc_link_hash_entry *h,
4ce794b7
AM
4673 const Elf_Internal_Rela *rel,
4674 struct ppc_link_hash_table *htab)
721956f4
AM
4675{
4676 struct ppc_stub_hash_entry *stub_entry;
6f20ed8a 4677 struct map_stub *group;
721956f4
AM
4678
4679 /* If this input section is part of a group of sections sharing one
4680 stub section, then use the id of the first section in the group.
4681 Stub names need to include a section id, as there may well be
4682 more than one stub used to reach say, printf, and we need to
4683 distinguish between them. */
6f20ed8a 4684 group = htab->sec_info[input_section->id].u.group;
89d77b8a
AM
4685 if (group == NULL)
4686 return NULL;
721956f4 4687
b3fac117
AM
4688 if (h != NULL && h->u.stub_cache != NULL
4689 && h->u.stub_cache->h == h
6f20ed8a 4690 && h->u.stub_cache->group == group)
721956f4 4691 {
b3fac117 4692 stub_entry = h->u.stub_cache;
721956f4
AM
4693 }
4694 else
4695 {
4696 char *stub_name;
4697
6f20ed8a 4698 stub_name = ppc_stub_name (group->link_sec, sym_sec, h, rel);
721956f4
AM
4699 if (stub_name == NULL)
4700 return NULL;
4701
4702 stub_entry = ppc_stub_hash_lookup (&htab->stub_hash_table,
b34976b6 4703 stub_name, FALSE, FALSE);
721956f4 4704 if (h != NULL)
b3fac117 4705 h->u.stub_cache = stub_entry;
721956f4
AM
4706
4707 free (stub_name);
4708 }
4709
4710 return stub_entry;
4711}
4712
4713/* Add a new stub entry to the stub hash. Not all fields of the new
4714 stub entry are initialised. */
4715
4716static struct ppc_stub_hash_entry *
4ce794b7
AM
4717ppc_add_stub (const char *stub_name,
4718 asection *section,
25f53a85 4719 struct bfd_link_info *info)
721956f4 4720{
25f53a85 4721 struct ppc_link_hash_table *htab = ppc_hash_table (info);
6f20ed8a 4722 struct map_stub *group;
721956f4
AM
4723 asection *link_sec;
4724 asection *stub_sec;
4725 struct ppc_stub_hash_entry *stub_entry;
4726
6f20ed8a
AM
4727 group = htab->sec_info[section->id].u.group;
4728 link_sec = group->link_sec;
4729 stub_sec = group->stub_sec;
721956f4
AM
4730 if (stub_sec == NULL)
4731 {
6f20ed8a
AM
4732 size_t namelen;
4733 bfd_size_type len;
4734 char *s_name;
721956f4 4735
6f20ed8a
AM
4736 namelen = strlen (link_sec->name);
4737 len = namelen + sizeof (STUB_SUFFIX);
4738 s_name = bfd_alloc (htab->params->stub_bfd, len);
4739 if (s_name == NULL)
4740 return NULL;
721956f4 4741
6f20ed8a
AM
4742 memcpy (s_name, link_sec->name, namelen);
4743 memcpy (s_name + namelen, STUB_SUFFIX, sizeof (STUB_SUFFIX));
4744 stub_sec = (*htab->params->add_stub_section) (s_name, link_sec);
4745 if (stub_sec == NULL)
4746 return NULL;
4747 group->stub_sec = stub_sec;
721956f4
AM
4748 }
4749
4750 /* Enter this entry into the linker stub hash table. */
4751 stub_entry = ppc_stub_hash_lookup (&htab->stub_hash_table, stub_name,
b34976b6 4752 TRUE, FALSE);
721956f4
AM
4753 if (stub_entry == NULL)
4754 {
695344c0 4755 /* xgettext:c-format */
cf97bcb0
AM
4756 _bfd_error_handler (_("%pB: cannot create stub entry %s"),
4757 section->owner, stub_name);
721956f4
AM
4758 return NULL;
4759 }
4760
6f20ed8a 4761 stub_entry->group = group;
721956f4 4762 stub_entry->stub_offset = 0;
721956f4
AM
4763 return stub_entry;
4764}
4765
e717da7e
AM
4766/* Create .got and .rela.got sections in ABFD, and .got in dynobj if
4767 not already done. */
65f38f15 4768
b34976b6 4769static bfd_boolean
e717da7e 4770create_got_section (bfd *abfd, struct bfd_link_info *info)
65f38f15 4771{
e717da7e
AM
4772 asection *got, *relgot;
4773 flagword flags;
4774 struct ppc_link_hash_table *htab = ppc_hash_table (info);
65f38f15 4775
0c8d6e5c 4776 if (!is_ppc64_elf (abfd))
0ffa91dd 4777 return FALSE;
4dfe6ac6
NC
4778 if (htab == NULL)
4779 return FALSE;
0ffa91dd 4780
33e44f2e
AM
4781 if (!htab->elf.sgot
4782 && !_bfd_elf_create_got_section (htab->elf.dynobj, info))
4783 return FALSE;
e717da7e
AM
4784
4785 flags = (SEC_ALLOC | SEC_LOAD | SEC_HAS_CONTENTS | SEC_IN_MEMORY
4786 | SEC_LINKER_CREATED);
4787
c456f082 4788 got = bfd_make_section_anyway_with_flags (abfd, ".got", flags);
e717da7e 4789 if (!got
e717da7e
AM
4790 || !bfd_set_section_alignment (abfd, got, 3))
4791 return FALSE;
65f38f15 4792
c456f082
AM
4793 relgot = bfd_make_section_anyway_with_flags (abfd, ".rela.got",
4794 flags | SEC_READONLY);
e717da7e 4795 if (!relgot
e717da7e 4796 || ! bfd_set_section_alignment (abfd, relgot, 3))
b34976b6 4797 return FALSE;
e717da7e
AM
4798
4799 ppc64_elf_tdata (abfd)->got = got;
4800 ppc64_elf_tdata (abfd)->relgot = relgot;
b34976b6 4801 return TRUE;
65f38f15 4802}
5bd4f169 4803
b31867b6
AM
4804/* Follow indirect and warning symbol links. */
4805
4806static inline struct bfd_link_hash_entry *
4807follow_link (struct bfd_link_hash_entry *h)
4808{
4809 while (h->type == bfd_link_hash_indirect
4810 || h->type == bfd_link_hash_warning)
4811 h = h->u.i.link;
4812 return h;
4813}
4814
4815static inline struct elf_link_hash_entry *
4816elf_follow_link (struct elf_link_hash_entry *h)
4817{
4818 return (struct elf_link_hash_entry *) follow_link (&h->root);
4819}
4820
4821static inline struct ppc_link_hash_entry *
4822ppc_follow_link (struct ppc_link_hash_entry *h)
4823{
4824 return (struct ppc_link_hash_entry *) follow_link (&h->elf.root);
4825}
4826
40d16e0b
AM
4827/* Merge PLT info on FROM with that on TO. */
4828
4829static void
4830move_plt_plist (struct ppc_link_hash_entry *from,
4831 struct ppc_link_hash_entry *to)
4832{
4833 if (from->elf.plt.plist != NULL)
4834 {
4835 if (to->elf.plt.plist != NULL)
4836 {
4837 struct plt_entry **entp;
4838 struct plt_entry *ent;
4839
4840 for (entp = &from->elf.plt.plist; (ent = *entp) != NULL; )
4841 {
4842 struct plt_entry *dent;
4843
4844 for (dent = to->elf.plt.plist; dent != NULL; dent = dent->next)
4845 if (dent->addend == ent->addend)
4846 {
4847 dent->plt.refcount += ent->plt.refcount;
4848 *entp = ent->next;
4849 break;
4850 }
4851 if (dent == NULL)
4852 entp = &ent->next;
4853 }
4854 *entp = to->elf.plt.plist;
4855 }
4856
4857 to->elf.plt.plist = from->elf.plt.plist;
4858 from->elf.plt.plist = NULL;
4859 }
4860}
4861
65f38f15
AM
4862/* Copy the extra info we tack onto an elf_link_hash_entry. */
4863
4864static void
fcfa13d2
AM
4865ppc64_elf_copy_indirect_symbol (struct bfd_link_info *info,
4866 struct elf_link_hash_entry *dir,
4867 struct elf_link_hash_entry *ind)
65f38f15
AM
4868{
4869 struct ppc_link_hash_entry *edir, *eind;
4870
4871 edir = (struct ppc_link_hash_entry *) dir;
4872 eind = (struct ppc_link_hash_entry *) ind;
4873
c79d6685
AM
4874 edir->is_func |= eind->is_func;
4875 edir->is_func_descriptor |= eind->is_func_descriptor;
4876 edir->tls_mask |= eind->tls_mask;
4877 if (eind->oh != NULL)
4878 edir->oh = ppc_follow_link (eind->oh);
4879
474436e6 4880 if (edir->elf.versioned != versioned_hidden)
e81830c5
AM
4881 edir->elf.ref_dynamic |= eind->elf.ref_dynamic;
4882 edir->elf.ref_regular |= eind->elf.ref_regular;
4883 edir->elf.ref_regular_nonweak |= eind->elf.ref_regular_nonweak;
4a7e5234 4884 edir->elf.non_got_ref |= eind->elf.non_got_ref;
e81830c5
AM
4885 edir->elf.needs_plt |= eind->elf.needs_plt;
4886 edir->elf.pointer_equality_needed |= eind->elf.pointer_equality_needed;
c79d6685 4887
d311bc8b
AM
4888 /* If we were called to copy over info for a weak sym, don't copy
4889 dyn_relocs, plt/got info, or dynindx. We used to copy dyn_relocs
4890 in order to simplify readonly_dynrelocs and save a field in the
4891 symbol hash entry, but that means dyn_relocs can't be used in any
4892 tests about a specific symbol, or affect other symbol flags which
ab2477e1 4893 are then tested. */
d311bc8b 4894 if (eind->elf.root.type != bfd_link_hash_indirect)
ab2477e1 4895 return;
d311bc8b 4896
411e1bfb 4897 /* Copy over any dynamic relocs we may have on the indirect sym. */
bbd7ec4a 4898 if (eind->dyn_relocs != NULL)
65f38f15 4899 {
bbd7ec4a
AM
4900 if (edir->dyn_relocs != NULL)
4901 {
6061a67d
AM
4902 struct elf_dyn_relocs **pp;
4903 struct elf_dyn_relocs *p;
bbd7ec4a 4904
fcfa13d2 4905 /* Add reloc counts against the indirect sym to the direct sym
bbd7ec4a
AM
4906 list. Merge any entries against the same section. */
4907 for (pp = &eind->dyn_relocs; (p = *pp) != NULL; )
4908 {
6061a67d 4909 struct elf_dyn_relocs *q;
bbd7ec4a
AM
4910
4911 for (q = edir->dyn_relocs; q != NULL; q = q->next)
4912 if (q->sec == p->sec)
4913 {
4914 q->pc_count += p->pc_count;
4915 q->count += p->count;
4916 *pp = p->next;
4917 break;
4918 }
4919 if (q == NULL)
4920 pp = &p->next;
4921 }
4922 *pp = edir->dyn_relocs;
4923 }
4924
65f38f15
AM
4925 edir->dyn_relocs = eind->dyn_relocs;
4926 eind->dyn_relocs = NULL;
4927 }
65f38f15 4928
81848ca0
AM
4929 /* Copy over got entries that we may have already seen to the
4930 symbol which just became indirect. */
411e1bfb
AM
4931 if (eind->elf.got.glist != NULL)
4932 {
4933 if (edir->elf.got.glist != NULL)
4934 {
4935 struct got_entry **entp;
4936 struct got_entry *ent;
4937
4938 for (entp = &eind->elf.got.glist; (ent = *entp) != NULL; )
4939 {
4940 struct got_entry *dent;
4941
4942 for (dent = edir->elf.got.glist; dent != NULL; dent = dent->next)
4943 if (dent->addend == ent->addend
e717da7e 4944 && dent->owner == ent->owner
411e1bfb
AM
4945 && dent->tls_type == ent->tls_type)
4946 {
4947 dent->got.refcount += ent->got.refcount;
4948 *entp = ent->next;
4949 break;
4950 }
4951 if (dent == NULL)
4952 entp = &ent->next;
4953 }
4954 *entp = edir->elf.got.glist;
4955 }
4956
4957 edir->elf.got.glist = eind->elf.got.glist;
4958 eind->elf.got.glist = NULL;
4959 }
4960
4961 /* And plt entries. */
40d16e0b 4962 move_plt_plist (eind, edir);
411e1bfb 4963
fcfa13d2 4964 if (eind->elf.dynindx != -1)
411e1bfb 4965 {
fcfa13d2
AM
4966 if (edir->elf.dynindx != -1)
4967 _bfd_elf_strtab_delref (elf_hash_table (info)->dynstr,
4968 edir->elf.dynstr_index);
411e1bfb
AM
4969 edir->elf.dynindx = eind->elf.dynindx;
4970 edir->elf.dynstr_index = eind->elf.dynstr_index;
4971 eind->elf.dynindx = -1;
4972 eind->elf.dynstr_index = 0;
4973 }
411e1bfb
AM
4974}
4975
8387904d
AM
4976/* Find the function descriptor hash entry from the given function code
4977 hash entry FH. Link the entries via their OH fields. */
4978
4979static struct ppc_link_hash_entry *
b31867b6 4980lookup_fdh (struct ppc_link_hash_entry *fh, struct ppc_link_hash_table *htab)
8387904d
AM
4981{
4982 struct ppc_link_hash_entry *fdh = fh->oh;
4983
4984 if (fdh == NULL)
4985 {
4986 const char *fd_name = fh->elf.root.root.string + 1;
4987
4988 fdh = (struct ppc_link_hash_entry *)
4989 elf_link_hash_lookup (&htab->elf, fd_name, FALSE, FALSE, FALSE);
b31867b6
AM
4990 if (fdh == NULL)
4991 return fdh;
4992
4993 fdh->is_func_descriptor = 1;
4994 fdh->oh = fh;
4995 fh->is_func = 1;
4996 fh->oh = fdh;
8387904d
AM
4997 }
4998
8c5b4e52
AM
4999 fdh = ppc_follow_link (fdh);
5000 fdh->is_func_descriptor = 1;
5001 fdh->oh = fh;
5002 return fdh;
8387904d
AM
5003}
5004
8c5b4e52 5005/* Make a fake function descriptor sym for the undefined code sym FH. */
bb700d78
AM
5006
5007static struct ppc_link_hash_entry *
5008make_fdh (struct bfd_link_info *info,
908b32fc 5009 struct ppc_link_hash_entry *fh)
bb700d78 5010{
8c5b4e52
AM
5011 bfd *abfd = fh->elf.root.u.undef.abfd;
5012 struct bfd_link_hash_entry *bh = NULL;
bb700d78 5013 struct ppc_link_hash_entry *fdh;
8c5b4e52
AM
5014 flagword flags = (fh->elf.root.type == bfd_link_hash_undefweak
5015 ? BSF_WEAK
5016 : BSF_GLOBAL);
5017
5018 if (!_bfd_generic_link_add_one_symbol (info, abfd,
5019 fh->elf.root.root.string + 1,
5020 flags, bfd_und_section_ptr, 0,
5021 NULL, FALSE, FALSE, &bh))
bb700d78
AM
5022 return NULL;
5023
5024 fdh = (struct ppc_link_hash_entry *) bh;
5025 fdh->elf.non_elf = 0;
908b32fc
AM
5026 fdh->fake = 1;
5027 fdh->is_func_descriptor = 1;
5028 fdh->oh = fh;
5029 fh->is_func = 1;
5030 fh->oh = fdh;
bb700d78
AM
5031 return fdh;
5032}
5033
8387904d
AM
5034/* Fix function descriptor symbols defined in .opd sections to be
5035 function type. */
555cd476
AM
5036
5037static bfd_boolean
c16153ae 5038ppc64_elf_add_symbol_hook (bfd *ibfd,
e054468f 5039 struct bfd_link_info *info,
555cd476 5040 Elf_Internal_Sym *isym,
6911b7dc 5041 const char **name,
555cd476
AM
5042 flagword *flags ATTRIBUTE_UNUSED,
5043 asection **sec,
b53dfeb2 5044 bfd_vma *value)
555cd476 5045{
b53dfeb2 5046 if (*sec != NULL
f1885d1e 5047 && strcmp ((*sec)->name, ".opd") == 0)
b53dfeb2
AM
5048 {
5049 asection *code_sec;
5050
5051 if (!(ELF_ST_TYPE (isym->st_info) == STT_GNU_IFUNC
5052 || ELF_ST_TYPE (isym->st_info) == STT_FUNC))
5053 isym->st_info = ELF_ST_INFO (ELF_ST_BIND (isym->st_info), STT_FUNC);
5054
5055 /* If the symbol is a function defined in .opd, and the function
5056 code is in a discarded group, let it appear to be undefined. */
0e1862bb 5057 if (!bfd_link_relocatable (info)
b53dfeb2
AM
5058 && (*sec)->reloc_count != 0
5059 && opd_entry_value (*sec, *value, &code_sec, NULL,
5060 FALSE) != (bfd_vma) -1
5061 && discarded_section (code_sec))
5062 {
5063 *sec = bfd_und_section_ptr;
5064 isym->st_shndx = SHN_UNDEF;
5065 }
5066 }
dbd1e97e
AM
5067 else if (*sec != NULL
5068 && strcmp ((*sec)->name, ".toc") == 0
5069 && ELF_ST_TYPE (isym->st_info) == STT_OBJECT)
5070 {
5071 struct ppc_link_hash_table *htab = ppc_hash_table (info);
5072 if (htab != NULL)
5073 htab->params->object_in_toc = 1;
5074 }
433817dd 5075
6911b7dc
AM
5076 if ((STO_PPC64_LOCAL_MASK & isym->st_other) != 0)
5077 {
5078 if (abiversion (ibfd) == 0)
5079 set_abiversion (ibfd, 2);
5080 else if (abiversion (ibfd) == 1)
5081 {
cf97bcb0
AM
5082 _bfd_error_handler (_("symbol '%s' has invalid st_other"
5083 " for ABI version 1"), *name);
6911b7dc
AM
5084 bfd_set_error (bfd_error_bad_value);
5085 return FALSE;
5086 }
5087 }
5088
555cd476
AM
5089 return TRUE;
5090}
5091
6911b7dc
AM
5092/* Merge non-visibility st_other attributes: local entry point. */
5093
5094static void
5095ppc64_elf_merge_symbol_attribute (struct elf_link_hash_entry *h,
5096 const Elf_Internal_Sym *isym,
5097 bfd_boolean definition,
5098 bfd_boolean dynamic)
5099{
f378ab09 5100 if (definition && (!dynamic || !h->def_regular))
6911b7dc
AM
5101 h->other = ((isym->st_other & ~ELF_ST_VISIBILITY (-1))
5102 | ELF_ST_VISIBILITY (h->other));
5103}
5104
8c5b4e52
AM
5105/* Hook called on merging a symbol. We use this to clear "fake" since
5106 we now have a real symbol. */
5107
5108static bfd_boolean
5109ppc64_elf_merge_symbol (struct elf_link_hash_entry *h,
8b5f1ed8 5110 const Elf_Internal_Sym *isym,
8c5b4e52
AM
5111 asection **psec ATTRIBUTE_UNUSED,
5112 bfd_boolean newdef ATTRIBUTE_UNUSED,
5113 bfd_boolean olddef ATTRIBUTE_UNUSED,
5114 bfd *oldbfd ATTRIBUTE_UNUSED,
5115 const asection *oldsec ATTRIBUTE_UNUSED)
5116{
5117 ((struct ppc_link_hash_entry *) h)->fake = 0;
8b5f1ed8
AM
5118 if ((STO_PPC64_LOCAL_MASK & isym->st_other) != 0)
5119 ((struct ppc_link_hash_entry *) h)->non_zero_localentry = 1;
8c5b4e52
AM
5120 return TRUE;
5121}
5122
8387904d 5123/* This function makes an old ABI object reference to ".bar" cause the
908b32fc
AM
5124 inclusion of a new ABI object archive that defines "bar".
5125 NAME is a symbol defined in an archive. Return a symbol in the hash
5126 table that might be satisfied by the archive symbols. */
8387904d
AM
5127
5128static struct elf_link_hash_entry *
5129ppc64_elf_archive_symbol_lookup (bfd *abfd,
5130 struct bfd_link_info *info,
5131 const char *name)
5132{
5133 struct elf_link_hash_entry *h;
5134 char *dot_name;
5135 size_t len;
5136
5137 h = _bfd_elf_archive_symbol_lookup (abfd, info, name);
908b32fc
AM
5138 if (h != NULL
5139 /* Don't return this sym if it is a fake function descriptor
5140 created by add_symbol_adjust. */
8c5b4e52 5141 && !((struct ppc_link_hash_entry *) h)->fake)
8387904d
AM
5142 return h;
5143
5144 if (name[0] == '.')
5145 return h;
5146
5147 len = strlen (name);
5148 dot_name = bfd_alloc (abfd, len + 2);
5149 if (dot_name == NULL)
e99955cd 5150 return (struct elf_link_hash_entry *) -1;
8387904d
AM
5151 dot_name[0] = '.';
5152 memcpy (dot_name + 1, name, len + 1);
5153 h = _bfd_elf_archive_symbol_lookup (abfd, info, dot_name);
5154 bfd_release (abfd, dot_name);
5155 return h;
5156}
5157
5158/* This function satisfies all old ABI object references to ".bar" if a
99877b66
AM
5159 new ABI object defines "bar". Well, at least, undefined dot symbols
5160 are made weak. This stops later archive searches from including an
5161 object if we already have a function descriptor definition. It also
35b0ce59
AM
5162 prevents the linker complaining about undefined symbols.
5163 We also check and correct mismatched symbol visibility here. The
5164 most restrictive visibility of the function descriptor and the
5165 function entry symbol is used. */
8387904d
AM
5166
5167static bfd_boolean
b3fac117 5168add_symbol_adjust (struct ppc_link_hash_entry *eh, struct bfd_link_info *info)
8387904d 5169{
8387904d
AM
5170 struct ppc_link_hash_table *htab;
5171 struct ppc_link_hash_entry *fdh;
5172
b3fac117
AM
5173 if (eh->elf.root.type == bfd_link_hash_warning)
5174 eh = (struct ppc_link_hash_entry *) eh->elf.root.u.i.link;
8387904d 5175
8400d40d
AM
5176 if (eh->elf.root.type == bfd_link_hash_indirect)
5177 return TRUE;
5178
b3fac117
AM
5179 if (eh->elf.root.root.string[0] != '.')
5180 abort ();
8387904d 5181
b3fac117 5182 htab = ppc_hash_table (info);
4dfe6ac6
NC
5183 if (htab == NULL)
5184 return FALSE;
5185
b31867b6 5186 fdh = lookup_fdh (eh, htab);
8c5b4e52
AM
5187 if (fdh == NULL
5188 && !bfd_link_relocatable (info)
5189 && (eh->elf.root.type == bfd_link_hash_undefined
5190 || eh->elf.root.type == bfd_link_hash_undefweak)
5191 && eh->elf.ref_regular)
5192 {
5193 /* Make an undefined function descriptor sym, in order to
5194 pull in an --as-needed shared lib. Archives are handled
5195 elsewhere. */
5196 fdh = make_fdh (info, eh);
5197 if (fdh == NULL)
5198 return FALSE;
bb700d78 5199 }
8c5b4e52
AM
5200
5201 if (fdh != NULL)
8387904d 5202 {
35b0ce59
AM
5203 unsigned entry_vis = ELF_ST_VISIBILITY (eh->elf.other) - 1;
5204 unsigned descr_vis = ELF_ST_VISIBILITY (fdh->elf.other) - 1;
8c5b4e52
AM
5205
5206 /* Make both descriptor and entry symbol have the most
5207 constraining visibility of either symbol. */
35b0ce59
AM
5208 if (entry_vis < descr_vis)
5209 fdh->elf.other += entry_vis - descr_vis;
5210 else if (entry_vis > descr_vis)
5211 eh->elf.other += descr_vis - entry_vis;
5212
8c5b4e52
AM
5213 /* Propagate reference flags from entry symbol to function
5214 descriptor symbol. */
bc4e12de 5215 fdh->elf.root.non_ir_ref_regular |= eh->elf.root.non_ir_ref_regular;
4070765b 5216 fdh->elf.root.non_ir_ref_dynamic |= eh->elf.root.non_ir_ref_dynamic;
8c5b4e52
AM
5217 fdh->elf.ref_regular |= eh->elf.ref_regular;
5218 fdh->elf.ref_regular_nonweak |= eh->elf.ref_regular_nonweak;
5219
5220 if (!fdh->elf.forced_local
5221 && fdh->elf.dynindx == -1
5222 && fdh->elf.versioned != versioned_hidden
5223 && (bfd_link_dll (info)
5224 || fdh->elf.def_dynamic
5225 || fdh->elf.ref_dynamic)
5226 && (eh->elf.ref_regular
5227 || eh->elf.def_regular))
5228 {
5229 if (! bfd_elf_link_record_dynamic_symbol (info, &fdh->elf))
5230 return FALSE;
35b0ce59 5231 }
8387904d 5232 }
99877b66 5233
8387904d
AM
5234 return TRUE;
5235}
5236
f6c7c3e8
AM
5237/* Set up opd section info and abiversion for IBFD, and process list
5238 of dot-symbols we made in link_hash_newfunc. */
b3fac117 5239
8387904d 5240static bfd_boolean
f6c7c3e8 5241ppc64_elf_before_check_relocs (bfd *ibfd, struct bfd_link_info *info)
8387904d 5242{
99877b66 5243 struct ppc_link_hash_table *htab;
b3fac117 5244 struct ppc_link_hash_entry **p, *eh;
459609d6 5245 asection *opd = bfd_get_section_by_name (ibfd, ".opd");
433817dd 5246
459609d6 5247 if (opd != NULL && opd->size != 0)
b3fac117 5248 {
b9399fcf
AM
5249 BFD_ASSERT (ppc64_elf_section_data (opd)->sec_type == sec_normal);
5250 ppc64_elf_section_data (opd)->sec_type = sec_opd;
5251
459609d6
AM
5252 if (abiversion (ibfd) == 0)
5253 set_abiversion (ibfd, 1);
8a2058b5 5254 else if (abiversion (ibfd) >= 2)
f6c7c3e8 5255 {
695344c0 5256 /* xgettext:c-format */
cf97bcb0
AM
5257 _bfd_error_handler (_("%pB .opd not allowed in ABI version %d"),
5258 ibfd, abiversion (ibfd));
459609d6
AM
5259 bfd_set_error (bfd_error_bad_value);
5260 return FALSE;
f6c7c3e8 5261 }
b9399fcf 5262 }
f6c7c3e8 5263
b9399fcf
AM
5264 if (is_ppc64_elf (info->output_bfd))
5265 {
5266 /* For input files without an explicit abiversion in e_flags
5267 we should have flagged any with symbol st_other bits set
5268 as ELFv1 and above flagged those with .opd as ELFv2.
5269 Set the output abiversion if not yet set, and for any input
5270 still ambiguous, take its abiversion from the output.
5271 Differences in ABI are reported later. */
5272 if (abiversion (info->output_bfd) == 0)
5273 set_abiversion (info->output_bfd, abiversion (ibfd));
5274 else if (abiversion (ibfd) == 0)
5275 set_abiversion (ibfd, abiversion (info->output_bfd));
b3fac117
AM
5276 }
5277
459609d6
AM
5278 htab = ppc_hash_table (info);
5279 if (htab == NULL)
b9399fcf 5280 return TRUE;
459609d6 5281
b9399fcf
AM
5282 if (opd != NULL && opd->size != 0
5283 && (ibfd->flags & DYNAMIC) == 0
5284 && (opd->flags & SEC_RELOC) != 0
5285 && opd->reloc_count != 0
5286 && !bfd_is_abs_section (opd->output_section)
5287 && info->gc_sections)
5288 {
5289 /* Garbage collection needs some extra help with .opd sections.
5290 We don't want to necessarily keep everything referenced by
5291 relocs in .opd, as that would keep all functions. Instead,
5292 if we reference an .opd symbol (a function descriptor), we
5293 want to keep the function code symbol's section. This is
5294 easy for global symbols, but for local syms we need to keep
5295 information about the associated function section. */
5296 bfd_size_type amt;
5297 asection **opd_sym_map;
5298 Elf_Internal_Shdr *symtab_hdr;
5299 Elf_Internal_Rela *relocs, *rel_end, *rel;
5300
5301 amt = OPD_NDX (opd->size) * sizeof (*opd_sym_map);
5302 opd_sym_map = bfd_zalloc (ibfd, amt);
5303 if (opd_sym_map == NULL)
5304 return FALSE;
5305 ppc64_elf_section_data (opd)->u.opd.func_sec = opd_sym_map;
5306 relocs = _bfd_elf_link_read_relocs (ibfd, opd, NULL, NULL,
5307 info->keep_memory);
5308 if (relocs == NULL)
5309 return FALSE;
5310 symtab_hdr = &elf_symtab_hdr (ibfd);
5311 rel_end = relocs + opd->reloc_count - 1;
5312 for (rel = relocs; rel < rel_end; rel++)
5313 {
5314 enum elf_ppc64_reloc_type r_type = ELF64_R_TYPE (rel->r_info);
5315 unsigned long r_symndx = ELF64_R_SYM (rel->r_info);
5316
5317 if (r_type == R_PPC64_ADDR64
5318 && ELF64_R_TYPE ((rel + 1)->r_info) == R_PPC64_TOC
5319 && r_symndx < symtab_hdr->sh_info)
5320 {
5321 Elf_Internal_Sym *isym;
5322 asection *s;
5323
5324 isym = bfd_sym_from_r_symndx (&htab->sym_cache, ibfd, r_symndx);
5325 if (isym == NULL)
5326 {
5327 if (elf_section_data (opd)->relocs != relocs)
5328 free (relocs);
5329 return FALSE;
5330 }
5331
5332 s = bfd_section_from_elf_index (ibfd, isym->st_shndx);
5333 if (s != NULL && s != opd)
5334 opd_sym_map[OPD_NDX (rel->r_offset)] = s;
5335 }
5336 }
5337 if (elf_section_data (opd)->relocs != relocs)
5338 free (relocs);
5339 }
459609d6
AM
5340
5341 p = &htab->dot_syms;
5342 while ((eh = *p) != NULL)
5343 {
5344 *p = NULL;
5345 if (&eh->elf == htab->elf.hgot)
5346 ;
5347 else if (htab->elf.hgot == NULL
5348 && strcmp (eh->elf.root.root.string, ".TOC.") == 0)
5349 htab->elf.hgot = &eh->elf;
8c5b4e52
AM
5350 else if (abiversion (ibfd) <= 1)
5351 {
5352 htab->need_func_desc_adj = 1;
5353 if (!add_symbol_adjust (eh, info))
5354 return FALSE;
5355 }
459609d6
AM
5356 p = &eh->u.next_dot_sym;
5357 }
b3fac117 5358 return TRUE;
8387904d
AM
5359}
5360
97fed1c9
JJ
5361/* Undo hash table changes when an --as-needed input file is determined
5362 not to be needed. */
5363
5364static bfd_boolean
e5034e59
AM
5365ppc64_elf_notice_as_needed (bfd *ibfd,
5366 struct bfd_link_info *info,
5367 enum notice_asneeded_action act)
97fed1c9 5368{
e5034e59
AM
5369 if (act == notice_not_needed)
5370 {
5371 struct ppc_link_hash_table *htab = ppc_hash_table (info);
4dfe6ac6 5372
e5034e59
AM
5373 if (htab == NULL)
5374 return FALSE;
4dfe6ac6 5375
e5034e59
AM
5376 htab->dot_syms = NULL;
5377 }
5378 return _bfd_elf_notice_as_needed (ibfd, info, act);
97fed1c9
JJ
5379}
5380
aa374f67
AM
5381/* If --just-symbols against a final linked binary, then assume we need
5382 toc adjusting stubs when calling functions defined there. */
5383
5384static void
5385ppc64_elf_link_just_syms (asection *sec, struct bfd_link_info *info)
5386{
5387 if ((sec->flags & SEC_CODE) != 0
5388 && (sec->owner->flags & (EXEC_P | DYNAMIC)) != 0
5389 && is_ppc64_elf (sec->owner))
5390 {
2c3f079f
AM
5391 if (abiversion (sec->owner) >= 2
5392 || bfd_get_section_by_name (sec->owner, ".opd") != NULL)
aa374f67
AM
5393 sec->has_toc_reloc = 1;
5394 }
5395 _bfd_elf_link_just_syms (sec, info);
5396}
5397
e054468f 5398static struct plt_entry **
4ce794b7
AM
5399update_local_sym_info (bfd *abfd, Elf_Internal_Shdr *symtab_hdr,
5400 unsigned long r_symndx, bfd_vma r_addend, int tls_type)
411e1bfb
AM
5401{
5402 struct got_entry **local_got_ents = elf_local_got_ents (abfd);
e054468f 5403 struct plt_entry **local_plt;
f961d9dd 5404 unsigned char *local_got_tls_masks;
411e1bfb
AM
5405
5406 if (local_got_ents == NULL)
5407 {
5408 bfd_size_type size = symtab_hdr->sh_info;
5409
e054468f
AM
5410 size *= (sizeof (*local_got_ents)
5411 + sizeof (*local_plt)
5412 + sizeof (*local_got_tls_masks));
4ce794b7 5413 local_got_ents = bfd_zalloc (abfd, size);
411e1bfb 5414 if (local_got_ents == NULL)
e054468f 5415 return NULL;
411e1bfb
AM
5416 elf_local_got_ents (abfd) = local_got_ents;
5417 }
5418
37da22e5 5419 if ((tls_type & (NON_GOT | TLS_EXPLICIT)) == 0)
411e1bfb
AM
5420 {
5421 struct got_entry *ent;
5422
5423 for (ent = local_got_ents[r_symndx]; ent != NULL; ent = ent->next)
e717da7e
AM
5424 if (ent->addend == r_addend
5425 && ent->owner == abfd
5426 && ent->tls_type == tls_type)
411e1bfb
AM
5427 break;
5428 if (ent == NULL)
5429 {
5430 bfd_size_type amt = sizeof (*ent);
4ce794b7 5431 ent = bfd_alloc (abfd, amt);
411e1bfb
AM
5432 if (ent == NULL)
5433 return FALSE;
5434 ent->next = local_got_ents[r_symndx];
5435 ent->addend = r_addend;
e717da7e 5436 ent->owner = abfd;
411e1bfb 5437 ent->tls_type = tls_type;
927be08e 5438 ent->is_indirect = FALSE;
411e1bfb
AM
5439 ent->got.refcount = 0;
5440 local_got_ents[r_symndx] = ent;
5441 }
5442 ent->got.refcount += 1;
5443 }
5444
e054468f 5445 local_plt = (struct plt_entry **) (local_got_ents + symtab_hdr->sh_info);
f961d9dd 5446 local_got_tls_masks = (unsigned char *) (local_plt + symtab_hdr->sh_info);
37da22e5 5447 local_got_tls_masks[r_symndx] |= tls_type & 0xff;
e054468f
AM
5448
5449 return local_plt + r_symndx;
65f38f15
AM
5450}
5451
411e1bfb 5452static bfd_boolean
e054468f 5453update_plt_info (bfd *abfd, struct plt_entry **plist, bfd_vma addend)
1e2f5b6e 5454{
411e1bfb 5455 struct plt_entry *ent;
1e2f5b6e 5456
e054468f 5457 for (ent = *plist; ent != NULL; ent = ent->next)
411e1bfb
AM
5458 if (ent->addend == addend)
5459 break;
5460 if (ent == NULL)
1e2f5b6e 5461 {
411e1bfb 5462 bfd_size_type amt = sizeof (*ent);
4ce794b7 5463 ent = bfd_alloc (abfd, amt);
411e1bfb
AM
5464 if (ent == NULL)
5465 return FALSE;
e054468f 5466 ent->next = *plist;
411e1bfb
AM
5467 ent->addend = addend;
5468 ent->plt.refcount = 0;
e054468f 5469 *plist = ent;
1e2f5b6e 5470 }
411e1bfb 5471 ent->plt.refcount += 1;
b34976b6 5472 return TRUE;
1e2f5b6e
AM
5473}
5474
e054468f
AM
5475static bfd_boolean
5476is_branch_reloc (enum elf_ppc64_reloc_type r_type)
5477{
5478 return (r_type == R_PPC64_REL24
5479 || r_type == R_PPC64_REL14
5480 || r_type == R_PPC64_REL14_BRTAKEN
5481 || r_type == R_PPC64_REL14_BRNTAKEN
5482 || r_type == R_PPC64_ADDR24
5483 || r_type == R_PPC64_ADDR14
5484 || r_type == R_PPC64_ADDR14_BRTAKEN
23cedd1d
AM
5485 || r_type == R_PPC64_ADDR14_BRNTAKEN
5486 || r_type == R_PPC64_PLTCALL);
5487}
5488
5489/* Relocs on inline plt call sequence insns prior to the call. */
5490
5491static bfd_boolean
5492is_plt_seq_reloc (enum elf_ppc64_reloc_type r_type)
5493{
5494 return (r_type == R_PPC64_PLT16_HA
5495 || r_type == R_PPC64_PLT16_HI
5496 || r_type == R_PPC64_PLT16_LO
5497 || r_type == R_PPC64_PLT16_LO_DS
5498 || r_type == R_PPC64_PLTSEQ);
e054468f
AM
5499}
5500
5bd4f169 5501/* Look through the relocs for a section during the first phase, and
65f38f15 5502 calculate needed space in the global offset table, procedure
5d1634d7 5503 linkage table, and dynamic reloc sections. */
5bd4f169 5504
b34976b6 5505static bfd_boolean
4ce794b7
AM
5506ppc64_elf_check_relocs (bfd *abfd, struct bfd_link_info *info,
5507 asection *sec, const Elf_Internal_Rela *relocs)
5bd4f169 5508{
65f38f15 5509 struct ppc_link_hash_table *htab;
5bd4f169 5510 Elf_Internal_Shdr *symtab_hdr;
c7e2358a 5511 struct elf_link_hash_entry **sym_hashes;
5bd4f169
AM
5512 const Elf_Internal_Rela *rel;
5513 const Elf_Internal_Rela *rel_end;
5bd4f169 5514 asection *sreloc;
3a71aa26 5515 struct elf_link_hash_entry *tga, *dottga;
b9399fcf 5516 bfd_boolean is_opd;
5bd4f169 5517
0e1862bb 5518 if (bfd_link_relocatable (info))
b34976b6 5519 return TRUE;
5bd4f169 5520
680a3378
AM
5521 /* Don't do anything special with non-loaded, non-alloced sections.
5522 In particular, any relocs in such sections should not affect GOT
5523 and PLT reference counting (ie. we don't allow them to create GOT
5524 or PLT entries), there's no possibility or desire to optimize TLS
5525 relocs, and there's not much point in propagating relocs to shared
5526 libs that the dynamic linker won't relocate. */
5527 if ((sec->flags & SEC_ALLOC) == 0)
5528 return TRUE;
5529
0c8d6e5c 5530 BFD_ASSERT (is_ppc64_elf (abfd));
0ffa91dd 5531
65f38f15 5532 htab = ppc_hash_table (info);
4dfe6ac6
NC
5533 if (htab == NULL)
5534 return FALSE;
5535
3a71aa26
AM
5536 tga = elf_link_hash_lookup (&htab->elf, "__tls_get_addr",
5537 FALSE, FALSE, TRUE);
5538 dottga = elf_link_hash_lookup (&htab->elf, ".__tls_get_addr",
5539 FALSE, FALSE, TRUE);
0ffa91dd 5540 symtab_hdr = &elf_symtab_hdr (abfd);
5bd4f169 5541 sym_hashes = elf_sym_hashes (abfd);
5bd4f169 5542 sreloc = NULL;
b9399fcf 5543 is_opd = ppc64_elf_section_data (sec)->sec_type == sec_opd;
5bd4f169
AM
5544 rel_end = relocs + sec->reloc_count;
5545 for (rel = relocs; rel < rel_end; rel++)
5546 {
5547 unsigned long r_symndx;
5548 struct elf_link_hash_entry *h;
04c9666a 5549 enum elf_ppc64_reloc_type r_type;
727fc41e 5550 int tls_type;
7c8fe5c4 5551 struct _ppc64_elf_section_data *ppc64_sec;
cbf95972 5552 struct plt_entry **ifunc, **plt_list;
5bd4f169
AM
5553
5554 r_symndx = ELF64_R_SYM (rel->r_info);
5555 if (r_symndx < symtab_hdr->sh_info)
5556 h = NULL;
5557 else
973a3492
L
5558 {
5559 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
b31867b6 5560 h = elf_follow_link (h);
1c865ab2
AM
5561
5562 if (h == htab->elf.hgot)
5563 sec->has_toc_reloc = 1;
973a3492 5564 }
5bd4f169 5565
727fc41e 5566 tls_type = 0;
e054468f 5567 ifunc = NULL;
25f23106
AM
5568 if (h != NULL)
5569 {
5570 if (h->type == STT_GNU_IFUNC)
5571 {
5572 h->needs_plt = 1;
5573 ifunc = &h->plt.plist;
5574 }
5575 }
5576 else
5577 {
5578 Elf_Internal_Sym *isym = bfd_sym_from_r_symndx (&htab->sym_cache,
5579 abfd, r_symndx);
5580 if (isym == NULL)
5581 return FALSE;
5582
5583 if (ELF_ST_TYPE (isym->st_info) == STT_GNU_IFUNC)
5584 {
5585 ifunc = update_local_sym_info (abfd, symtab_hdr, r_symndx,
37da22e5
AM
5586 rel->r_addend,
5587 NON_GOT | PLT_IFUNC);
25f23106
AM
5588 if (ifunc == NULL)
5589 return FALSE;
5590 }
5591 }
727fc41e 5592
cbf95972 5593 r_type = ELF64_R_TYPE (rel->r_info);
a33d1f77 5594 switch (r_type)
5bd4f169 5595 {
727fc41e
AM
5596 case R_PPC64_TLSGD:
5597 case R_PPC64_TLSLD:
5598 /* These special tls relocs tie a call to __tls_get_addr with
5599 its parameter symbol. */
37da22e5
AM
5600 if (h != NULL)
5601 ((struct ppc_link_hash_entry *) h)->tls_mask |= TLS_TLS | TLS_MARK;
5602 else
5603 if (!update_local_sym_info (abfd, symtab_hdr, r_symndx,
5604 rel->r_addend,
5605 NON_GOT | TLS_TLS | TLS_MARK))
5606 return FALSE;
5607 sec->has_tls_reloc = 1;
727fc41e
AM
5608 break;
5609
411e1bfb
AM
5610 case R_PPC64_GOT_TLSLD16:
5611 case R_PPC64_GOT_TLSLD16_LO:
5612 case R_PPC64_GOT_TLSLD16_HI:
5613 case R_PPC64_GOT_TLSLD16_HA:
951fd09b 5614 tls_type = TLS_TLS | TLS_LD;
411e1bfb
AM
5615 goto dogottls;
5616
5617 case R_PPC64_GOT_TLSGD16:
5618 case R_PPC64_GOT_TLSGD16_LO:
5619 case R_PPC64_GOT_TLSGD16_HI:
5620 case R_PPC64_GOT_TLSGD16_HA:
951fd09b 5621 tls_type = TLS_TLS | TLS_GD;
411e1bfb
AM
5622 goto dogottls;
5623
5624 case R_PPC64_GOT_TPREL16_DS:
5625 case R_PPC64_GOT_TPREL16_LO_DS:
5626 case R_PPC64_GOT_TPREL16_HI:
5627 case R_PPC64_GOT_TPREL16_HA:
7c8bbca5 5628 if (bfd_link_dll (info))
411e1bfb
AM
5629 info->flags |= DF_STATIC_TLS;
5630 tls_type = TLS_TLS | TLS_TPREL;
5631 goto dogottls;
5632
5633 case R_PPC64_GOT_DTPREL16_DS:
5634 case R_PPC64_GOT_DTPREL16_LO_DS:
5635 case R_PPC64_GOT_DTPREL16_HI:
5636 case R_PPC64_GOT_DTPREL16_HA:
5637 tls_type = TLS_TLS | TLS_DTPREL;
5638 dogottls:
5639 sec->has_tls_reloc = 1;
1a0670f3 5640 /* Fall through */
411e1bfb 5641
5bd4f169 5642 case R_PPC64_GOT16:
5bd4f169 5643 case R_PPC64_GOT16_DS:
65f38f15
AM
5644 case R_PPC64_GOT16_HA:
5645 case R_PPC64_GOT16_HI:
5646 case R_PPC64_GOT16_LO:
5bd4f169 5647 case R_PPC64_GOT16_LO_DS:
65f38f15 5648 /* This symbol requires a global offset table entry. */
4c52953f 5649 sec->has_toc_reloc = 1;
33c0ec9d
AM
5650 if (r_type == R_PPC64_GOT_TLSLD16
5651 || r_type == R_PPC64_GOT_TLSGD16
5652 || r_type == R_PPC64_GOT_TPREL16_DS
5653 || r_type == R_PPC64_GOT_DTPREL16_DS
5654 || r_type == R_PPC64_GOT16
5655 || r_type == R_PPC64_GOT16_DS)
5656 {
5657 htab->do_multi_toc = 1;
d77c8a4b 5658 ppc64_elf_tdata (abfd)->has_small_toc_reloc = 1;
33c0ec9d
AM
5659 }
5660
e717da7e
AM
5661 if (ppc64_elf_tdata (abfd)->got == NULL
5662 && !create_got_section (abfd, info))
b34976b6 5663 return FALSE;
5bd4f169
AM
5664
5665 if (h != NULL)
5666 {
411e1bfb
AM
5667 struct ppc_link_hash_entry *eh;
5668 struct got_entry *ent;
65f38f15 5669
411e1bfb
AM
5670 eh = (struct ppc_link_hash_entry *) h;
5671 for (ent = eh->elf.got.glist; ent != NULL; ent = ent->next)
5672 if (ent->addend == rel->r_addend
e717da7e 5673 && ent->owner == abfd
411e1bfb
AM
5674 && ent->tls_type == tls_type)
5675 break;
5676 if (ent == NULL)
5bd4f169 5677 {
411e1bfb 5678 bfd_size_type amt = sizeof (*ent);
4ce794b7 5679 ent = bfd_alloc (abfd, amt);
411e1bfb 5680 if (ent == NULL)
b34976b6 5681 return FALSE;
411e1bfb
AM
5682 ent->next = eh->elf.got.glist;
5683 ent->addend = rel->r_addend;
e717da7e 5684 ent->owner = abfd;
411e1bfb 5685 ent->tls_type = tls_type;
927be08e 5686 ent->is_indirect = FALSE;
411e1bfb
AM
5687 ent->got.refcount = 0;
5688 eh->elf.got.glist = ent;
5bd4f169 5689 }
411e1bfb 5690 ent->got.refcount += 1;
e7b938ca 5691 eh->tls_mask |= tls_type;
5bd4f169 5692 }
411e1bfb
AM
5693 else
5694 /* This is a global offset table entry for a local symbol. */
5695 if (!update_local_sym_info (abfd, symtab_hdr, r_symndx,
5696 rel->r_addend, tls_type))
5697 return FALSE;
a345bc8d
AM
5698
5699 /* We may also need a plt entry if the symbol turns out to be
5700 an ifunc. */
0e1862bb 5701 if (h != NULL && !bfd_link_pic (info) && abiversion (abfd) != 1)
a345bc8d
AM
5702 {
5703 if (!update_plt_info (abfd, &h->plt.plist, rel->r_addend))
5704 return FALSE;
5705 }
5bd4f169
AM
5706 break;
5707
5bd4f169 5708 case R_PPC64_PLT16_HA:
65f38f15
AM
5709 case R_PPC64_PLT16_HI:
5710 case R_PPC64_PLT16_LO:
08be3224 5711 case R_PPC64_PLT16_LO_DS:
65f38f15
AM
5712 case R_PPC64_PLT32:
5713 case R_PPC64_PLT64:
cbf95972
AM
5714 /* This symbol requires a procedure linkage table entry. */
5715 plt_list = ifunc;
5716 if (h != NULL)
e054468f 5717 {
e054468f
AM
5718 h->needs_plt = 1;
5719 if (h->root.root.string[0] == '.'
5720 && h->root.root.string[1] != '\0')
5721 ((struct ppc_link_hash_entry *) h)->is_func = 1;
2d7ad24e 5722 ((struct ppc_link_hash_entry *) h)->tls_mask |= PLT_KEEP;
cbf95972
AM
5723 plt_list = &h->plt.plist;
5724 }
5725 if (plt_list == NULL)
2d7ad24e
AM
5726 plt_list = update_local_sym_info (abfd, symtab_hdr, r_symndx,
5727 rel->r_addend,
5728 NON_GOT | PLT_KEEP);
cbf95972
AM
5729 if (!update_plt_info (abfd, plt_list, rel->r_addend))
5730 return FALSE;
5bd4f169
AM
5731 break;
5732
5733 /* The following relocations don't need to propagate the
5734 relocation if linking a shared object since they are
5735 section relative. */
5736 case R_PPC64_SECTOFF:
5737 case R_PPC64_SECTOFF_LO:
5738 case R_PPC64_SECTOFF_HI:
5739 case R_PPC64_SECTOFF_HA:
5740 case R_PPC64_SECTOFF_DS:
5741 case R_PPC64_SECTOFF_LO_DS:
411e1bfb
AM
5742 case R_PPC64_DTPREL16:
5743 case R_PPC64_DTPREL16_LO:
5744 case R_PPC64_DTPREL16_HI:
5745 case R_PPC64_DTPREL16_HA:
5746 case R_PPC64_DTPREL16_DS:
5747 case R_PPC64_DTPREL16_LO_DS:
f9c6b907
AM
5748 case R_PPC64_DTPREL16_HIGH:
5749 case R_PPC64_DTPREL16_HIGHA:
411e1bfb
AM
5750 case R_PPC64_DTPREL16_HIGHER:
5751 case R_PPC64_DTPREL16_HIGHERA:
5752 case R_PPC64_DTPREL16_HIGHEST:
5753 case R_PPC64_DTPREL16_HIGHESTA:
5bd4f169
AM
5754 break;
5755
ad8e1ba5 5756 /* Nor do these. */
25f23106
AM
5757 case R_PPC64_REL16:
5758 case R_PPC64_REL16_LO:
5759 case R_PPC64_REL16_HI:
5760 case R_PPC64_REL16_HA:
a680de9a 5761 case R_PPC64_REL16DX_HA:
25f23106
AM
5762 break;
5763
45965137
AM
5764 /* Not supported as a dynamic relocation. */
5765 case R_PPC64_ADDR64_LOCAL:
0e1862bb 5766 if (bfd_link_pic (info))
45965137
AM
5767 {
5768 if (!ppc64_elf_howto_table[R_PPC64_ADDR32])
5769 ppc_howto_init ();
695344c0 5770 /* xgettext:c-format */
174d0a74 5771 info->callbacks->einfo (_("%H: %s reloc unsupported "
cf97bcb0 5772 "in shared libraries and PIEs\n"),
45965137
AM
5773 abfd, sec, rel->r_offset,
5774 ppc64_elf_howto_table[r_type]->name);
5775 bfd_set_error (bfd_error_bad_value);
5776 return FALSE;
5777 }
5778 break;
5779
ad8e1ba5 5780 case R_PPC64_TOC16:
33c0ec9d
AM
5781 case R_PPC64_TOC16_DS:
5782 htab->do_multi_toc = 1;
d77c8a4b 5783 ppc64_elf_tdata (abfd)->has_small_toc_reloc = 1;
1a0670f3 5784 /* Fall through. */
ad8e1ba5
AM
5785 case R_PPC64_TOC16_LO:
5786 case R_PPC64_TOC16_HI:
5787 case R_PPC64_TOC16_HA:
ad8e1ba5 5788 case R_PPC64_TOC16_LO_DS:
4c52953f 5789 sec->has_toc_reloc = 1;
ad8e1ba5
AM
5790 break;
5791
006589cf
AM
5792 /* Marker reloc. */
5793 case R_PPC64_ENTRY:
5794 break;
5795
5bd4f169
AM
5796 /* This relocation describes the C++ object vtable hierarchy.
5797 Reconstruct it for later use during GC. */
5798 case R_PPC64_GNU_VTINHERIT:
c152c796 5799 if (!bfd_elf_gc_record_vtinherit (abfd, sec, h, rel->r_offset))
b34976b6 5800 return FALSE;
5bd4f169
AM
5801 break;
5802
5803 /* This relocation describes which C++ vtable entries are actually
5804 used. Record for later use during GC. */
5805 case R_PPC64_GNU_VTENTRY:
d17e0c6e
JB
5806 BFD_ASSERT (h != NULL);
5807 if (h != NULL
5808 && !bfd_elf_gc_record_vtentry (abfd, sec, h, rel->r_addend))
b34976b6 5809 return FALSE;
5bd4f169
AM
5810 break;
5811
721956f4
AM
5812 case R_PPC64_REL14:
5813 case R_PPC64_REL14_BRTAKEN:
5814 case R_PPC64_REL14_BRNTAKEN:
220c76dd
AM
5815 {
5816 asection *dest = NULL;
5817
5818 /* Heuristic: If jumping outside our section, chances are
5819 we are going to need a stub. */
5820 if (h != NULL)
5821 {
5822 /* If the sym is weak it may be overridden later, so
5823 don't assume we know where a weak sym lives. */
5824 if (h->root.type == bfd_link_hash_defined)
5825 dest = h->root.u.def.section;
5826 }
5827 else
87d72d41
AM
5828 {
5829 Elf_Internal_Sym *isym;
5830
5831 isym = bfd_sym_from_r_symndx (&htab->sym_cache,
5832 abfd, r_symndx);
5833 if (isym == NULL)
5834 return FALSE;
5835
5836 dest = bfd_section_from_elf_index (abfd, isym->st_shndx);
5837 }
5838
220c76dd 5839 if (dest != sec)
7c8fe5c4 5840 ppc64_elf_section_data (sec)->has_14bit_branch = 1;
220c76dd 5841 }
3e04d765
AM
5842 goto rel24;
5843
5844 case R_PPC64_PLTCALL:
5845 ppc64_elf_section_data (sec)->has_pltcall = 1;
721956f4
AM
5846 /* Fall through. */
5847
5d1634d7 5848 case R_PPC64_REL24:
3e04d765 5849 rel24:
cbf95972
AM
5850 plt_list = ifunc;
5851 if (h != NULL)
5d1634d7 5852 {
e054468f
AM
5853 h->needs_plt = 1;
5854 if (h->root.root.string[0] == '.'
5855 && h->root.root.string[1] != '\0')
5856 ((struct ppc_link_hash_entry *) h)->is_func = 1;
cbf95972 5857
3a71aa26 5858 if (h == tga || h == dottga)
cbf95972
AM
5859 {
5860 sec->has_tls_reloc = 1;
5861 if (rel != relocs
5862 && (ELF64_R_TYPE (rel[-1].r_info) == R_PPC64_TLSGD
5863 || ELF64_R_TYPE (rel[-1].r_info) == R_PPC64_TLSLD))
5864 /* We have a new-style __tls_get_addr call with
5865 a marker reloc. */
5866 ;
5867 else
5868 /* Mark this section as having an old-style call. */
5869 sec->has_tls_get_addr_call = 1;
5870 }
5871 plt_list = &h->plt.plist;
411e1bfb 5872 }
cbf95972
AM
5873
5874 /* We may need a .plt entry if the function this reloc
5875 refers to is in a shared lib. */
5876 if (plt_list
5877 && !update_plt_info (abfd, plt_list, rel->r_addend))
5878 return FALSE;
411e1bfb
AM
5879 break;
5880
cbf95972
AM
5881 case R_PPC64_ADDR14:
5882 case R_PPC64_ADDR14_BRNTAKEN:
5883 case R_PPC64_ADDR14_BRTAKEN:
5884 case R_PPC64_ADDR24:
5885 goto dodyn;
5886
411e1bfb
AM
5887 case R_PPC64_TPREL64:
5888 tls_type = TLS_EXPLICIT | TLS_TLS | TLS_TPREL;
7c8bbca5 5889 if (bfd_link_dll (info))
411e1bfb
AM
5890 info->flags |= DF_STATIC_TLS;
5891 goto dotlstoc;
5892
5893 case R_PPC64_DTPMOD64:
5894 if (rel + 1 < rel_end
5895 && rel[1].r_info == ELF64_R_INFO (r_symndx, R_PPC64_DTPREL64)
5896 && rel[1].r_offset == rel->r_offset + 8)
951fd09b 5897 tls_type = TLS_EXPLICIT | TLS_TLS | TLS_GD;
411e1bfb 5898 else
951fd09b 5899 tls_type = TLS_EXPLICIT | TLS_TLS | TLS_LD;
411e1bfb
AM
5900 goto dotlstoc;
5901
5902 case R_PPC64_DTPREL64:
5903 tls_type = TLS_EXPLICIT | TLS_TLS | TLS_DTPREL;
5904 if (rel != relocs
5905 && rel[-1].r_info == ELF64_R_INFO (r_symndx, R_PPC64_DTPMOD64)
5906 && rel[-1].r_offset == rel->r_offset - 8)
5907 /* This is the second reloc of a dtpmod, dtprel pair.
5908 Don't mark with TLS_DTPREL. */
5909 goto dodyn;
5910
5911 dotlstoc:
5912 sec->has_tls_reloc = 1;
5913 if (h != NULL)
5914 {
5915 struct ppc_link_hash_entry *eh;
5916 eh = (struct ppc_link_hash_entry *) h;
e7b938ca 5917 eh->tls_mask |= tls_type;
411e1bfb
AM
5918 }
5919 else
5920 if (!update_local_sym_info (abfd, symtab_hdr, r_symndx,
5921 rel->r_addend, tls_type))
5922 return FALSE;
5923
7c8fe5c4
AM
5924 ppc64_sec = ppc64_elf_section_data (sec);
5925 if (ppc64_sec->sec_type != sec_toc)
411e1bfb 5926 {
3a71aa26
AM
5927 bfd_size_type amt;
5928
e7b938ca 5929 /* One extra to simplify get_tls_mask. */
3a71aa26
AM
5930 amt = sec->size * sizeof (unsigned) / 8 + sizeof (unsigned);
5931 ppc64_sec->u.toc.symndx = bfd_zalloc (abfd, amt);
5932 if (ppc64_sec->u.toc.symndx == NULL)
5933 return FALSE;
5934 amt = sec->size * sizeof (bfd_vma) / 8;
5935 ppc64_sec->u.toc.add = bfd_zalloc (abfd, amt);
5936 if (ppc64_sec->u.toc.add == NULL)
411e1bfb 5937 return FALSE;
7c8fe5c4
AM
5938 BFD_ASSERT (ppc64_sec->sec_type == sec_normal);
5939 ppc64_sec->sec_type = sec_toc;
411e1bfb
AM
5940 }
5941 BFD_ASSERT (rel->r_offset % 8 == 0);
3a71aa26
AM
5942 ppc64_sec->u.toc.symndx[rel->r_offset / 8] = r_symndx;
5943 ppc64_sec->u.toc.add[rel->r_offset / 8] = rel->r_addend;
951fd09b
AM
5944
5945 /* Mark the second slot of a GD or LD entry.
5946 -1 to indicate GD and -2 to indicate LD. */
5947 if (tls_type == (TLS_EXPLICIT | TLS_TLS | TLS_GD))
3a71aa26 5948 ppc64_sec->u.toc.symndx[rel->r_offset / 8 + 1] = -1;
951fd09b 5949 else if (tls_type == (TLS_EXPLICIT | TLS_TLS | TLS_LD))
3a71aa26 5950 ppc64_sec->u.toc.symndx[rel->r_offset / 8 + 1] = -2;
411e1bfb
AM
5951 goto dodyn;
5952
5953 case R_PPC64_TPREL16:
5954 case R_PPC64_TPREL16_LO:
5955 case R_PPC64_TPREL16_HI:
5956 case R_PPC64_TPREL16_HA:
5957 case R_PPC64_TPREL16_DS:
5958 case R_PPC64_TPREL16_LO_DS:
f9c6b907
AM
5959 case R_PPC64_TPREL16_HIGH:
5960 case R_PPC64_TPREL16_HIGHA:
411e1bfb
AM
5961 case R_PPC64_TPREL16_HIGHER:
5962 case R_PPC64_TPREL16_HIGHERA:
5963 case R_PPC64_TPREL16_HIGHEST:
5964 case R_PPC64_TPREL16_HIGHESTA:
7c8bbca5
AM
5965 if (bfd_link_dll (info))
5966 info->flags |= DF_STATIC_TLS;
5967 goto dodyn;
5d1634d7 5968
e86ce104 5969 case R_PPC64_ADDR64:
b9399fcf 5970 if (is_opd
1e2f5b6e 5971 && rel + 1 < rel_end
4ce794b7 5972 && ELF64_R_TYPE ((rel + 1)->r_info) == R_PPC64_TOC)
1e2f5b6e 5973 {
8387904d 5974 if (h != NULL)
8c5b4e52 5975 ((struct ppc_link_hash_entry *) h)->is_func = 1;
1e2f5b6e 5976 }
e86ce104
AM
5977 /* Fall through. */
5978
65f38f15
AM
5979 case R_PPC64_ADDR16:
5980 case R_PPC64_ADDR16_DS:
5981 case R_PPC64_ADDR16_HA:
5982 case R_PPC64_ADDR16_HI:
f9c6b907
AM
5983 case R_PPC64_ADDR16_HIGH:
5984 case R_PPC64_ADDR16_HIGHA:
65f38f15
AM
5985 case R_PPC64_ADDR16_HIGHER:
5986 case R_PPC64_ADDR16_HIGHERA:
5987 case R_PPC64_ADDR16_HIGHEST:
5988 case R_PPC64_ADDR16_HIGHESTA:
5989 case R_PPC64_ADDR16_LO:
5990 case R_PPC64_ADDR16_LO_DS:
0e1862bb 5991 if (h != NULL && !bfd_link_pic (info) && abiversion (abfd) != 1
a345bc8d
AM
5992 && rel->r_addend == 0)
5993 {
5994 /* We may need a .plt entry if this reloc refers to a
5995 function in a shared lib. */
5996 if (!update_plt_info (abfd, &h->plt.plist, rel->r_addend))
5997 return FALSE;
5998 h->pointer_equality_needed = 1;
5999 }
6000 /* Fall through. */
6001
6002 case R_PPC64_REL30:
6003 case R_PPC64_REL32:
6004 case R_PPC64_REL64:
65f38f15 6005 case R_PPC64_ADDR32:
65f38f15
AM
6006 case R_PPC64_UADDR16:
6007 case R_PPC64_UADDR32:
6008 case R_PPC64_UADDR64:
5bd4f169 6009 case R_PPC64_TOC:
0e1862bb 6010 if (h != NULL && !bfd_link_pic (info))
81848ca0 6011 /* We may need a copy reloc. */
f5385ebf 6012 h->non_got_ref = 1;
81848ca0 6013
41bd81ab 6014 /* Don't propagate .opd relocs. */
b9399fcf 6015 if (NO_OPD_RELOCS && is_opd)
e86ce104 6016 break;
e86ce104 6017
65f38f15
AM
6018 /* If we are creating a shared library, and this is a reloc
6019 against a global symbol, or a non PC relative reloc
6020 against a local symbol, then we need to copy the reloc
6021 into the shared library. However, if we are linking with
6022 -Bsymbolic, we do not need to copy a reloc against a
6023 global symbol which is defined in an object we are
6024 including in the link (i.e., DEF_REGULAR is set). At
6025 this point we have not seen all the input files, so it is
6026 possible that DEF_REGULAR is not set now but will be set
6027 later (it is never cleared). In case of a weak definition,
6028 DEF_REGULAR may be cleared later by a strong definition in
6029 a shared library. We account for that possibility below by
f4656909 6030 storing information in the dyn_relocs field of the hash
65f38f15
AM
6031 table entry. A similar situation occurs when creating
6032 shared libraries and symbol visibility changes render the
6033 symbol local.
6034
6035 If on the other hand, we are creating an executable, we
6036 may need to keep relocations for symbols satisfied by a
6037 dynamic library if we manage to avoid copy relocs for the
6038 symbol. */
411e1bfb 6039 dodyn:
0e1862bb 6040 if ((bfd_link_pic (info)
1d483afe 6041 && (must_be_dyn_reloc (info, r_type)
65f38f15 6042 || (h != NULL
198f1157 6043 && (!SYMBOLIC_BIND (info, h)
65f38f15 6044 || h->root.type == bfd_link_hash_defweak
f5385ebf 6045 || !h->def_regular))))
f4656909 6046 || (ELIMINATE_COPY_RELOCS
0e1862bb 6047 && !bfd_link_pic (info)
65f38f15
AM
6048 && h != NULL
6049 && (h->root.type == bfd_link_hash_defweak
25f23106 6050 || !h->def_regular))
0e1862bb 6051 || (!bfd_link_pic (info)
25f23106 6052 && ifunc != NULL))
5bd4f169 6053 {
65f38f15
AM
6054 /* We must copy these reloc types into the output file.
6055 Create a reloc section in dynobj and make room for
6056 this reloc. */
5bd4f169
AM
6057 if (sreloc == NULL)
6058 {
83bac4b0
NC
6059 sreloc = _bfd_elf_make_dynamic_reloc_section
6060 (sec, htab->elf.dynobj, 3, abfd, /*rela?*/ TRUE);
65f38f15 6061
5bd4f169 6062 if (sreloc == NULL)
83bac4b0 6063 return FALSE;
5bd4f169
AM
6064 }
6065
65f38f15
AM
6066 /* If this is a global symbol, we count the number of
6067 relocations we need for this symbol. */
6068 if (h != NULL)
6069 {
19e08130
AM
6070 struct elf_dyn_relocs *p;
6071 struct elf_dyn_relocs **head;
6072
ec338859 6073 head = &((struct ppc_link_hash_entry *) h)->dyn_relocs;
19e08130
AM
6074 p = *head;
6075 if (p == NULL || p->sec != sec)
6076 {
6077 p = bfd_alloc (htab->elf.dynobj, sizeof *p);
6078 if (p == NULL)
6079 return FALSE;
6080 p->next = *head;
6081 *head = p;
6082 p->sec = sec;
6083 p->count = 0;
6084 p->pc_count = 0;
6085 }
6086 p->count += 1;
6087 if (!must_be_dyn_reloc (info, r_type))
6088 p->pc_count += 1;
65f38f15
AM
6089 }
6090 else
6091 {
ec338859
AM
6092 /* Track dynamic relocs needed for local syms too.
6093 We really need local syms available to do this
6094 easily. Oh well. */
19e08130
AM
6095 struct ppc_dyn_relocs *p;
6096 struct ppc_dyn_relocs **head;
6097 bfd_boolean is_ifunc;
ec338859 6098 asection *s;
6edfbbad 6099 void *vpp;
87d72d41 6100 Elf_Internal_Sym *isym;
6edfbbad 6101
87d72d41
AM
6102 isym = bfd_sym_from_r_symndx (&htab->sym_cache,
6103 abfd, r_symndx);
6104 if (isym == NULL)
b34976b6 6105 return FALSE;
ec338859 6106
87d72d41
AM
6107 s = bfd_section_from_elf_index (abfd, isym->st_shndx);
6108 if (s == NULL)
6109 s = sec;
6110
6edfbbad 6111 vpp = &elf_section_data (s)->local_dynrel;
19e08130
AM
6112 head = (struct ppc_dyn_relocs **) vpp;
6113 is_ifunc = ELF_ST_TYPE (isym->st_info) == STT_GNU_IFUNC;
6114 p = *head;
6115 if (p != NULL && p->sec == sec && p->ifunc != is_ifunc)
6116 p = p->next;
6117 if (p == NULL || p->sec != sec || p->ifunc != is_ifunc)
6118 {
6119 p = bfd_alloc (htab->elf.dynobj, sizeof *p);
6120 if (p == NULL)
6121 return FALSE;
6122 p->next = *head;
6123 *head = p;
6124 p->sec = sec;
6125 p->ifunc = is_ifunc;
6126 p->count = 0;
6127 }
6128 p->count += 1;
ec338859 6129 }
65f38f15 6130 }
5bd4f169 6131 break;
65f38f15
AM
6132
6133 default:
96e0dda4 6134 break;
5bd4f169
AM
6135 }
6136 }
6137
b34976b6 6138 return TRUE;
5bd4f169
AM
6139}
6140
ee67d69a
AM
6141/* Merge backend specific data from an object file to the output
6142 object file when linking. */
6143
6144static bfd_boolean
50e03d47 6145ppc64_elf_merge_private_bfd_data (bfd *ibfd, struct bfd_link_info *info)
ee67d69a 6146{
50e03d47 6147 bfd *obfd = info->output_bfd;
ee67d69a
AM
6148 unsigned long iflags, oflags;
6149
6150 if ((ibfd->flags & BFD_LINKER_CREATED) != 0)
6151 return TRUE;
6152
6153 if (!is_ppc64_elf (ibfd) || !is_ppc64_elf (obfd))
6154 return TRUE;
6155
50e03d47 6156 if (!_bfd_generic_verify_endian_match (ibfd, info))
ee67d69a
AM
6157 return FALSE;
6158
6159 iflags = elf_elfheader (ibfd)->e_flags;
6160 oflags = elf_elfheader (obfd)->e_flags;
6161
f6c7c3e8 6162 if (iflags & ~EF_PPC64_ABI)
ee67d69a 6163 {
4eca0228 6164 _bfd_error_handler
695344c0 6165 /* xgettext:c-format */
871b3ab2 6166 (_("%pB uses unknown e_flags 0x%lx"), ibfd, iflags);
ee67d69a
AM
6167 bfd_set_error (bfd_error_bad_value);
6168 return FALSE;
6169 }
f6c7c3e8 6170 else if (iflags != oflags && iflags != 0)
ee67d69a 6171 {
4eca0228 6172 _bfd_error_handler
695344c0 6173 /* xgettext:c-format */
871b3ab2 6174 (_("%pB: ABI version %ld is not compatible with ABI version %ld output"),
ee67d69a
AM
6175 ibfd, iflags, oflags);
6176 bfd_set_error (bfd_error_bad_value);
6177 return FALSE;
6178 }
6179
50e03d47 6180 _bfd_elf_ppc_merge_fp_attributes (ibfd, info);
005d79fd 6181
ee67d69a 6182 /* Merge Tag_compatibility attributes and any common GNU ones. */
50e03d47 6183 _bfd_elf_merge_object_attributes (ibfd, info);
ee67d69a
AM
6184
6185 return TRUE;
6186}
6187
6188static bfd_boolean
6189ppc64_elf_print_private_bfd_data (bfd *abfd, void *ptr)
6190{
6191 /* Print normal ELF private data. */
6192 _bfd_elf_print_private_bfd_data (abfd, ptr);
6193
6194 if (elf_elfheader (abfd)->e_flags != 0)
6195 {
6196 FILE *file = ptr;
6197
ee67d69a
AM
6198 fprintf (file, _("private flags = 0x%lx:"),
6199 elf_elfheader (abfd)->e_flags);
6200
6201 if ((elf_elfheader (abfd)->e_flags & EF_PPC64_ABI) != 0)
6202 fprintf (file, _(" [abiv%ld]"),
6203 elf_elfheader (abfd)->e_flags & EF_PPC64_ABI);
6204 fputc ('\n', file);
6205 }
6206
6207 return TRUE;
6208}
6209
8387904d 6210/* OFFSET in OPD_SEC specifies a function descriptor. Return the address
b53dfeb2
AM
6211 of the code entry point, and its section, which must be in the same
6212 object as OPD_SEC. Returns (bfd_vma) -1 on error. */
8387904d
AM
6213
6214static bfd_vma
6215opd_entry_value (asection *opd_sec,
6216 bfd_vma offset,
6217 asection **code_sec,
aef36ac1
AM
6218 bfd_vma *code_off,
6219 bfd_boolean in_code_sec)
8387904d
AM
6220{
6221 bfd *opd_bfd = opd_sec->owner;
8860955f 6222 Elf_Internal_Rela *relocs;
8387904d 6223 Elf_Internal_Rela *lo, *hi, *look;
645ea6a9 6224 bfd_vma val;
8387904d 6225
9f296da3
AM
6226 /* No relocs implies we are linking a --just-symbols object, or looking
6227 at a final linked executable with addr2line or somesuch. */
4b85d634
AM
6228 if (opd_sec->reloc_count == 0)
6229 {
729eabd5 6230 bfd_byte *contents = ppc64_elf_tdata (opd_bfd)->opd.contents;
3b36f7e6 6231
729eabd5
AM
6232 if (contents == NULL)
6233 {
6234 if (!bfd_malloc_and_get_section (opd_bfd, opd_sec, &contents))
6235 return (bfd_vma) -1;
6236 ppc64_elf_tdata (opd_bfd)->opd.contents = contents;
6237 }
ee1e4ede 6238
dbb3fbbb 6239 /* PR 17512: file: 64b9dfbb. */
451dfd38 6240 if (offset + 7 >= opd_sec->size || offset + 7 < offset)
dbb3fbbb
NC
6241 return (bfd_vma) -1;
6242
729eabd5 6243 val = bfd_get_64 (opd_bfd, contents + offset);
aef36ac1
AM
6244 if (code_sec != NULL)
6245 {
6246 asection *sec, *likely = NULL;
ee1e4ede 6247
aef36ac1 6248 if (in_code_sec)
4b85d634 6249 {
aef36ac1
AM
6250 sec = *code_sec;
6251 if (sec->vma <= val
6252 && val < sec->vma + sec->size)
6253 likely = sec;
6254 else
6255 val = -1;
6256 }
6257 else
6258 for (sec = opd_bfd->sections; sec != NULL; sec = sec->next)
6259 if (sec->vma <= val
6260 && (sec->flags & SEC_LOAD) != 0
6261 && (sec->flags & SEC_ALLOC) != 0)
6262 likely = sec;
6263 if (likely != NULL)
6264 {
6265 *code_sec = likely;
6266 if (code_off != NULL)
6267 *code_off = val - likely->vma;
4b85d634
AM
6268 }
6269 }
aef36ac1 6270 return val;
4b85d634
AM
6271 }
6272
0c8d6e5c 6273 BFD_ASSERT (is_ppc64_elf (opd_bfd));
0ffa91dd 6274
729eabd5 6275 relocs = ppc64_elf_tdata (opd_bfd)->opd.relocs;
8860955f
AM
6276 if (relocs == NULL)
6277 relocs = _bfd_elf_link_read_relocs (opd_bfd, opd_sec, NULL, NULL, TRUE);
877a8638
NC
6278 /* PR 17512: file: df8e1fd6. */
6279 if (relocs == NULL)
6280 return (bfd_vma) -1;
645ea6a9 6281
8387904d 6282 /* Go find the opd reloc at the sym address. */
8860955f 6283 lo = relocs;
8387904d 6284 hi = lo + opd_sec->reloc_count - 1; /* ignore last reloc */
645ea6a9 6285 val = (bfd_vma) -1;
8387904d
AM
6286 while (lo < hi)
6287 {
6288 look = lo + (hi - lo) / 2;
6289 if (look->r_offset < offset)
6290 lo = look + 1;
6291 else if (look->r_offset > offset)
6292 hi = look;
6293 else
6294 {
0ffa91dd
NC
6295 Elf_Internal_Shdr *symtab_hdr = &elf_symtab_hdr (opd_bfd);
6296
8387904d
AM
6297 if (ELF64_R_TYPE (look->r_info) == R_PPC64_ADDR64
6298 && ELF64_R_TYPE ((look + 1)->r_info) == R_PPC64_TOC)
6299 {
6300 unsigned long symndx = ELF64_R_SYM (look->r_info);
b53dfeb2 6301 asection *sec = NULL;
8387904d 6302
b53dfeb2
AM
6303 if (symndx >= symtab_hdr->sh_info
6304 && elf_sym_hashes (opd_bfd) != NULL)
8387904d
AM
6305 {
6306 struct elf_link_hash_entry **sym_hashes;
6307 struct elf_link_hash_entry *rh;
6308
6309 sym_hashes = elf_sym_hashes (opd_bfd);
6310 rh = sym_hashes[symndx - symtab_hdr->sh_info];
128205bb
AM
6311 if (rh != NULL)
6312 {
6313 rh = elf_follow_link (rh);
bb854a36
AM
6314 if (rh->root.type != bfd_link_hash_defined
6315 && rh->root.type != bfd_link_hash_defweak)
6316 break;
6317 if (rh->root.u.def.section->owner == opd_bfd)
b53dfeb2 6318 {
bb854a36
AM
6319 val = rh->root.u.def.value;
6320 sec = rh->root.u.def.section;
b53dfeb2
AM
6321 }
6322 }
6323 }
6324
6325 if (sec == NULL)
6326 {
6327 Elf_Internal_Sym *sym;
6328
6329 if (symndx < symtab_hdr->sh_info)
6330 {
6331 sym = (Elf_Internal_Sym *) symtab_hdr->contents;
6332 if (sym == NULL)
6333 {
6334 size_t symcnt = symtab_hdr->sh_info;
6335 sym = bfd_elf_get_elf_syms (opd_bfd, symtab_hdr,
6336 symcnt, 0,
6337 NULL, NULL, NULL);
6338 if (sym == NULL)
6339 break;
6340 symtab_hdr->contents = (bfd_byte *) sym;
6341 }
6342 sym += symndx;
128205bb
AM
6343 }
6344 else
6345 {
b53dfeb2
AM
6346 sym = bfd_elf_get_elf_syms (opd_bfd, symtab_hdr,
6347 1, symndx,
6348 NULL, NULL, NULL);
128205bb
AM
6349 if (sym == NULL)
6350 break;
128205bb 6351 }
b53dfeb2
AM
6352 sec = bfd_section_from_elf_index (opd_bfd, sym->st_shndx);
6353 if (sec == NULL)
6354 break;
6355 BFD_ASSERT ((sec->flags & SEC_MERGE) == 0);
6356 val = sym->st_value;
8387904d 6357 }
b53dfeb2 6358
8387904d
AM
6359 val += look->r_addend;
6360 if (code_off != NULL)
6361 *code_off = val;
6362 if (code_sec != NULL)
aef36ac1
AM
6363 {
6364 if (in_code_sec && *code_sec != sec)
6365 return -1;
6366 else
6367 *code_sec = sec;
6368 }
b53dfeb2 6369 if (sec->output_section != NULL)
8387904d 6370 val += sec->output_section->vma + sec->output_offset;
8387904d
AM
6371 }
6372 break;
6373 }
6374 }
645ea6a9 6375
645ea6a9 6376 return val;
8387904d
AM
6377}
6378
aef36ac1
AM
6379/* If the ELF symbol SYM might be a function in SEC, return the
6380 function size and set *CODE_OFF to the function's entry point,
6381 otherwise return zero. */
9f296da3 6382
aef36ac1
AM
6383static bfd_size_type
6384ppc64_elf_maybe_function_sym (const asymbol *sym, asection *sec,
6385 bfd_vma *code_off)
9f296da3 6386{
aef36ac1
AM
6387 bfd_size_type size;
6388
6389 if ((sym->flags & (BSF_SECTION_SYM | BSF_FILE | BSF_OBJECT
6390 | BSF_THREAD_LOCAL | BSF_RELC | BSF_SRELC)) != 0)
6391 return 0;
6392
6393 size = 0;
6394 if (!(sym->flags & BSF_SYNTHETIC))
6395 size = ((elf_symbol_type *) sym)->internal_elf_sym.st_size;
6396
6397 if (strcmp (sym->section->name, ".opd") == 0)
9f296da3 6398 {
b07bca4e
AM
6399 struct _opd_sec_data *opd = get_opd_info (sym->section);
6400 bfd_vma symval = sym->value;
6401
6402 if (opd != NULL
6403 && opd->adjust != NULL
6404 && elf_section_data (sym->section)->relocs != NULL)
6405 {
6406 /* opd_entry_value will use cached relocs that have been
6407 adjusted, but with raw symbols. That means both local
6408 and global symbols need adjusting. */
6409 long adjust = opd->adjust[OPD_NDX (symval)];
6410 if (adjust == -1)
6411 return 0;
6412 symval += adjust;
6413 }
6414
6415 if (opd_entry_value (sym->section, symval,
aef36ac1
AM
6416 &sec, code_off, TRUE) == (bfd_vma) -1)
6417 return 0;
6418 /* An old ABI binary with dot-syms has a size of 24 on the .opd
6419 symbol. This size has nothing to do with the code size of the
6420 function, which is what we're supposed to return, but the
6421 code size isn't available without looking up the dot-sym.
6422 However, doing that would be a waste of time particularly
6423 since elf_find_function will look at the dot-sym anyway.
6424 Now, elf_find_function will keep the largest size of any
6425 function sym found at the code address of interest, so return
6426 1 here to avoid it incorrectly caching a larger function size
6427 for a small function. This does mean we return the wrong
6428 size for a new-ABI function of size 24, but all that does is
6429 disable caching for such functions. */
6430 if (size == 24)
6431 size = 1;
9f296da3 6432 }
aef36ac1
AM
6433 else
6434 {
6435 if (sym->section != sec)
6436 return 0;
6437 *code_off = sym->value;
6438 }
6439 if (size == 0)
6440 size = 1;
6441 return size;
9f296da3
AM
6442}
6443
f378ab09
AM
6444/* Return true if symbol is a strong function defined in an ELFv2
6445 object with st_other localentry bits of zero, ie. its local entry
6446 point coincides with its global entry point. */
6447
6448static bfd_boolean
6449is_elfv2_localentry0 (struct elf_link_hash_entry *h)
6450{
6451 return (h != NULL
6452 && h->type == STT_FUNC
6453 && h->root.type == bfd_link_hash_defined
6454 && (STO_PPC64_LOCAL_MASK & h->other) == 0
8b5f1ed8 6455 && !((struct ppc_link_hash_entry *) h)->non_zero_localentry
f378ab09
AM
6456 && is_ppc64_elf (h->root.u.def.section->owner)
6457 && abiversion (h->root.u.def.section->owner) >= 2);
6458}
6459
854b41e7
AM
6460/* Return true if symbol is defined in a regular object file. */
6461
6462static bfd_boolean
6463is_static_defined (struct elf_link_hash_entry *h)
6464{
6465 return ((h->root.type == bfd_link_hash_defined
6466 || h->root.type == bfd_link_hash_defweak)
6467 && h->root.u.def.section != NULL
6468 && h->root.u.def.section->output_section != NULL);
6469}
6470
b31867b6
AM
6471/* If FDH is a function descriptor symbol, return the associated code
6472 entry symbol if it is defined. Return NULL otherwise. */
6473
6474static struct ppc_link_hash_entry *
6475defined_code_entry (struct ppc_link_hash_entry *fdh)
6476{
6477 if (fdh->is_func_descriptor)
6478 {
6479 struct ppc_link_hash_entry *fh = ppc_follow_link (fdh->oh);
6480 if (fh->elf.root.type == bfd_link_hash_defined
6481 || fh->elf.root.type == bfd_link_hash_defweak)
6482 return fh;
6483 }
6484 return NULL;
6485}
6486
6487/* If FH is a function code entry symbol, return the associated
6488 function descriptor symbol if it is defined. Return NULL otherwise. */
6489
6490static struct ppc_link_hash_entry *
6491defined_func_desc (struct ppc_link_hash_entry *fh)
6492{
6493 if (fh->oh != NULL
6494 && fh->oh->is_func_descriptor)
6495 {
6496 struct ppc_link_hash_entry *fdh = ppc_follow_link (fh->oh);
6497 if (fdh->elf.root.type == bfd_link_hash_defined
6498 || fdh->elf.root.type == bfd_link_hash_defweak)
6499 return fdh;
6500 }
6501 return NULL;
6502}
6503
8c5b4e52
AM
6504static bfd_boolean func_desc_adjust (struct elf_link_hash_entry *, void *);
6505
6506/* Garbage collect sections, after first dealing with dot-symbols. */
6507
6508static bfd_boolean
6509ppc64_elf_gc_sections (bfd *abfd, struct bfd_link_info *info)
6510{
6511 struct ppc_link_hash_table *htab = ppc_hash_table (info);
6512
6513 if (htab != NULL && htab->need_func_desc_adj)
6514 {
6515 elf_link_hash_traverse (&htab->elf, func_desc_adjust, info);
6516 htab->need_func_desc_adj = 0;
6517 }
6518 return bfd_elf_gc_sections (abfd, info);
6519}
6520
74f0fb50
AM
6521/* Mark all our entry sym sections, both opd and code section. */
6522
6523static void
6524ppc64_elf_gc_keep (struct bfd_link_info *info)
6525{
6526 struct ppc_link_hash_table *htab = ppc_hash_table (info);
6527 struct bfd_sym_chain *sym;
6528
4dfe6ac6
NC
6529 if (htab == NULL)
6530 return;
6531
74f0fb50
AM
6532 for (sym = info->gc_sym_list; sym != NULL; sym = sym->next)
6533 {
b31867b6 6534 struct ppc_link_hash_entry *eh, *fh;
74f0fb50
AM
6535 asection *sec;
6536
6537 eh = (struct ppc_link_hash_entry *)
b31867b6 6538 elf_link_hash_lookup (&htab->elf, sym->name, FALSE, FALSE, TRUE);
74f0fb50
AM
6539 if (eh == NULL)
6540 continue;
6541 if (eh->elf.root.type != bfd_link_hash_defined
6542 && eh->elf.root.type != bfd_link_hash_defweak)
6543 continue;
6544
b31867b6
AM
6545 fh = defined_code_entry (eh);
6546 if (fh != NULL)
74f0fb50 6547 {
b31867b6 6548 sec = fh->elf.root.u.def.section;
74f0fb50
AM
6549 sec->flags |= SEC_KEEP;
6550 }
6551 else if (get_opd_info (eh->elf.root.u.def.section) != NULL
6552 && opd_entry_value (eh->elf.root.u.def.section,
6553 eh->elf.root.u.def.value,
aef36ac1 6554 &sec, NULL, FALSE) != (bfd_vma) -1)
74f0fb50
AM
6555 sec->flags |= SEC_KEEP;
6556
6557 sec = eh->elf.root.u.def.section;
6558 sec->flags |= SEC_KEEP;
6559 }
6560}
6561
64d03ab5
AM
6562/* Mark sections containing dynamically referenced symbols. When
6563 building shared libraries, we must assume that any visible symbol is
6564 referenced. */
6565
6566static bfd_boolean
6567ppc64_elf_gc_mark_dynamic_ref (struct elf_link_hash_entry *h, void *inf)
6568{
6569 struct bfd_link_info *info = (struct bfd_link_info *) inf;
6570 struct ppc_link_hash_entry *eh = (struct ppc_link_hash_entry *) h;
b31867b6 6571 struct ppc_link_hash_entry *fdh;
b407645f 6572 struct bfd_elf_dynamic_list *d = info->dynamic_list;
64d03ab5 6573
64d03ab5 6574 /* Dynamic linking info is on the func descriptor sym. */
b31867b6
AM
6575 fdh = defined_func_desc (eh);
6576 if (fdh != NULL)
6577 eh = fdh;
64d03ab5
AM
6578
6579 if ((eh->elf.root.type == bfd_link_hash_defined
6580 || eh->elf.root.type == bfd_link_hash_defweak)
87e79a65 6581 && ((eh->elf.ref_dynamic && !eh->elf.forced_local)
1c9177d9 6582 || ((eh->elf.def_regular || ELF_COMMON_DEF_P (&eh->elf))
64d03ab5 6583 && ELF_ST_VISIBILITY (eh->elf.other) != STV_INTERNAL
4c58e0d8 6584 && ELF_ST_VISIBILITY (eh->elf.other) != STV_HIDDEN
0e1862bb 6585 && (!bfd_link_executable (info)
e278ae05 6586 || info->gc_keep_exported
b407645f
AM
6587 || info->export_dynamic
6588 || (eh->elf.dynamic
6589 && d != NULL
6590 && (*d->match) (&d->head, NULL, eh->elf.root.root.string)))
e278ae05 6591 && (eh->elf.versioned >= versioned
4c58e0d8
AM
6592 || !bfd_hide_sym_by_version (info->version_info,
6593 eh->elf.root.root.string)))))
64d03ab5
AM
6594 {
6595 asection *code_sec;
b31867b6 6596 struct ppc_link_hash_entry *fh;
64d03ab5
AM
6597
6598 eh->elf.root.u.def.section->flags |= SEC_KEEP;
6599
6600 /* Function descriptor syms cause the associated
6601 function code sym section to be marked. */
b31867b6
AM
6602 fh = defined_code_entry (eh);
6603 if (fh != NULL)
6604 {
6605 code_sec = fh->elf.root.u.def.section;
6606 code_sec->flags |= SEC_KEEP;
6607 }
64d03ab5
AM
6608 else if (get_opd_info (eh->elf.root.u.def.section) != NULL
6609 && opd_entry_value (eh->elf.root.u.def.section,
6610 eh->elf.root.u.def.value,
aef36ac1 6611 &code_sec, NULL, FALSE) != (bfd_vma) -1)
64d03ab5
AM
6612 code_sec->flags |= SEC_KEEP;
6613 }
6614
6615 return TRUE;
6616}
6617
5bd4f169
AM
6618/* Return the section that should be marked against GC for a given
6619 relocation. */
6620
6621static asection *
4ce794b7 6622ppc64_elf_gc_mark_hook (asection *sec,
fb34365b 6623 struct bfd_link_info *info,
4ce794b7
AM
6624 Elf_Internal_Rela *rel,
6625 struct elf_link_hash_entry *h,
6626 Elf_Internal_Sym *sym)
5bd4f169 6627{
ccfa59ea
AM
6628 asection *rsec;
6629
ccfa59ea
AM
6630 /* Syms return NULL if we're marking .opd, so we avoid marking all
6631 function sections, as all functions are referenced in .opd. */
6632 rsec = NULL;
6633 if (get_opd_info (sec) != NULL)
6634 return rsec;
1e2f5b6e 6635
5bd4f169
AM
6636 if (h != NULL)
6637 {
04c9666a 6638 enum elf_ppc64_reloc_type r_type;
b31867b6 6639 struct ppc_link_hash_entry *eh, *fh, *fdh;
a33d1f77 6640
4ce794b7 6641 r_type = ELF64_R_TYPE (rel->r_info);
a33d1f77 6642 switch (r_type)
5bd4f169
AM
6643 {
6644 case R_PPC64_GNU_VTINHERIT:
6645 case R_PPC64_GNU_VTENTRY:
6646 break;
6647
6648 default:
6649 switch (h->root.type)
6650 {
6651 case bfd_link_hash_defined:
6652 case bfd_link_hash_defweak:
ccfa59ea 6653 eh = (struct ppc_link_hash_entry *) h;
b31867b6
AM
6654 fdh = defined_func_desc (eh);
6655 if (fdh != NULL)
8c5b4e52
AM
6656 {
6657 /* -mcall-aixdesc code references the dot-symbol on
6658 a call reloc. Mark the function descriptor too
6659 against garbage collection. */
6660 fdh->elf.mark = 1;
60d67dc8
AM
6661 if (fdh->elf.is_weakalias)
6662 weakdef (&fdh->elf)->mark = 1;
8c5b4e52
AM
6663 eh = fdh;
6664 }
1e2f5b6e
AM
6665
6666 /* Function descriptor syms cause the associated
6667 function code sym section to be marked. */
b31867b6
AM
6668 fh = defined_code_entry (eh);
6669 if (fh != NULL)
ccfa59ea
AM
6670 {
6671 /* They also mark their opd section. */
74f0fb50 6672 eh->elf.root.u.def.section->gc_mark = 1;
ccfa59ea 6673
b31867b6 6674 rsec = fh->elf.root.u.def.section;
ccfa59ea 6675 }
8387904d
AM
6676 else if (get_opd_info (eh->elf.root.u.def.section) != NULL
6677 && opd_entry_value (eh->elf.root.u.def.section,
6678 eh->elf.root.u.def.value,
aef36ac1 6679 &rsec, NULL, FALSE) != (bfd_vma) -1)
74f0fb50 6680 eh->elf.root.u.def.section->gc_mark = 1;
ccfa59ea 6681 else
1e2f5b6e
AM
6682 rsec = h->root.u.def.section;
6683 break;
5bd4f169
AM
6684
6685 case bfd_link_hash_common:
1e2f5b6e
AM
6686 rsec = h->root.u.c.p->section;
6687 break;
5bd4f169
AM
6688
6689 default:
fb34365b 6690 return _bfd_elf_gc_mark_hook (sec, info, rel, h, sym);
5bd4f169
AM
6691 }
6692 }
6693 }
6694 else
6695 {
74f0fb50 6696 struct _opd_sec_data *opd;
1e2f5b6e
AM
6697
6698 rsec = bfd_section_from_elf_index (sec->owner, sym->st_shndx);
74f0fb50
AM
6699 opd = get_opd_info (rsec);
6700 if (opd != NULL && opd->func_sec != NULL)
ccfa59ea 6701 {
74f0fb50 6702 rsec->gc_mark = 1;
ccfa59ea 6703
51aecdc5 6704 rsec = opd->func_sec[OPD_NDX (sym->st_value + rel->r_addend)];
ccfa59ea 6705 }
5bd4f169
AM
6706 }
6707
1e2f5b6e 6708 return rsec;
5bd4f169
AM
6709}
6710
deb0e272
AM
6711/* The maximum size of .sfpr. */
6712#define SFPR_MAX (218*4)
6713
6714struct sfpr_def_parms
6715{
699733f6
AM
6716 const char name[12];
6717 unsigned char lo, hi;
deb0e272
AM
6718 bfd_byte * (*write_ent) (bfd *, bfd_byte *, int);
6719 bfd_byte * (*write_tail) (bfd *, bfd_byte *, int);
6720};
6721
a4b6fadd
AM
6722/* Auto-generate _save*, _rest* functions in .sfpr.
6723 If STUB_SEC is non-null, define alias symbols in STUB_SEC
6724 instead. */
deb0e272 6725
4dfe6ac6 6726static bfd_boolean
a4b6fadd
AM
6727sfpr_define (struct bfd_link_info *info,
6728 const struct sfpr_def_parms *parm,
6729 asection *stub_sec)
deb0e272
AM
6730{
6731 struct ppc_link_hash_table *htab = ppc_hash_table (info);
6732 unsigned int i;
6733 size_t len = strlen (parm->name);
6734 bfd_boolean writing = FALSE;
699733f6 6735 char sym[16];
deb0e272 6736
4dfe6ac6
NC
6737 if (htab == NULL)
6738 return FALSE;
6739
deb0e272
AM
6740 memcpy (sym, parm->name, len);
6741 sym[len + 2] = 0;
6742
6743 for (i = parm->lo; i <= parm->hi; i++)
6744 {
a4b6fadd 6745 struct ppc_link_hash_entry *h;
deb0e272
AM
6746
6747 sym[len + 0] = i / 10 + '0';
6748 sym[len + 1] = i % 10 + '0';
a4b6fadd 6749 h = (struct ppc_link_hash_entry *)
b32547cd 6750 elf_link_hash_lookup (&htab->elf, sym, writing, TRUE, TRUE);
a4b6fadd 6751 if (stub_sec != NULL)
deb0e272 6752 {
a4b6fadd
AM
6753 if (h != NULL
6754 && h->elf.root.type == bfd_link_hash_defined
6755 && h->elf.root.u.def.section == htab->sfpr)
6756 {
6757 struct elf_link_hash_entry *s;
6758 char buf[32];
6759 sprintf (buf, "%08x.%s", stub_sec->id & 0xffffffff, sym);
6760 s = elf_link_hash_lookup (&htab->elf, buf, TRUE, TRUE, FALSE);
6761 if (s == NULL)
6762 return FALSE;
6763 if (s->root.type == bfd_link_hash_new
6764 || (s->root.type = bfd_link_hash_defined
6765 && s->root.u.def.section == stub_sec))
6766 {
6767 s->root.type = bfd_link_hash_defined;
6768 s->root.u.def.section = stub_sec;
7dda8d3c 6769 s->root.u.def.value = (stub_sec->size - htab->sfpr->size
a4b6fadd
AM
6770 + h->elf.root.u.def.value);
6771 s->ref_regular = 1;
6772 s->def_regular = 1;
6773 s->ref_regular_nonweak = 1;
6774 s->forced_local = 1;
6775 s->non_elf = 0;
6776 s->root.linker_def = 1;
6777 }
6778 }
6779 continue;
6780 }
6781 if (h != NULL)
6782 {
6783 h->save_res = 1;
6784 if (!h->elf.def_regular)
deb0e272 6785 {
a4b6fadd
AM
6786 h->elf.root.type = bfd_link_hash_defined;
6787 h->elf.root.u.def.section = htab->sfpr;
6788 h->elf.root.u.def.value = htab->sfpr->size;
6789 h->elf.type = STT_FUNC;
6790 h->elf.def_regular = 1;
b32547cd 6791 h->elf.non_elf = 0;
a4b6fadd
AM
6792 _bfd_elf_link_hash_hide_symbol (info, &h->elf, TRUE);
6793 writing = TRUE;
deb0e272 6794 if (htab->sfpr->contents == NULL)
a4b6fadd
AM
6795 {
6796 htab->sfpr->contents = bfd_alloc (htab->elf.dynobj, SFPR_MAX);
6797 if (htab->sfpr->contents == NULL)
6798 return FALSE;
6799 }
deb0e272
AM
6800 }
6801 }
6802 if (writing)
6803 {
6804 bfd_byte *p = htab->sfpr->contents + htab->sfpr->size;
6805 if (i != parm->hi)
6806 p = (*parm->write_ent) (htab->elf.dynobj, p, i);
6807 else
6808 p = (*parm->write_tail) (htab->elf.dynobj, p, i);
6809 htab->sfpr->size = p - htab->sfpr->contents;
6810 }
6811 }
6812
6813 return TRUE;
6814}
6815
6816static bfd_byte *
6817savegpr0 (bfd *abfd, bfd_byte *p, int r)
6818{
6819 bfd_put_32 (abfd, STD_R0_0R1 + (r << 21) + (1 << 16) - (32 - r) * 8, p);
6820 return p + 4;
6821}
6822
6823static bfd_byte *
6824savegpr0_tail (bfd *abfd, bfd_byte *p, int r)
6825{
6826 p = savegpr0 (abfd, p, r);
a078d95a 6827 bfd_put_32 (abfd, STD_R0_0R1 + STK_LR, p);
deb0e272
AM
6828 p = p + 4;
6829 bfd_put_32 (abfd, BLR, p);
6830 return p + 4;
6831}
6832
6833static bfd_byte *
6834restgpr0 (bfd *abfd, bfd_byte *p, int r)
6835{
6836 bfd_put_32 (abfd, LD_R0_0R1 + (r << 21) + (1 << 16) - (32 - r) * 8, p);
6837 return p + 4;
6838}
6839
6840static bfd_byte *
6841restgpr0_tail (bfd *abfd, bfd_byte *p, int r)
6842{
a078d95a 6843 bfd_put_32 (abfd, LD_R0_0R1 + STK_LR, p);
deb0e272
AM
6844 p = p + 4;
6845 p = restgpr0 (abfd, p, r);
6846 bfd_put_32 (abfd, MTLR_R0, p);
6847 p = p + 4;
6848 if (r == 29)
6849 {
6850 p = restgpr0 (abfd, p, 30);
6851 p = restgpr0 (abfd, p, 31);
6852 }
6853 bfd_put_32 (abfd, BLR, p);
6854 return p + 4;
6855}
6856
6857static bfd_byte *
6858savegpr1 (bfd *abfd, bfd_byte *p, int r)
6859{
6860 bfd_put_32 (abfd, STD_R0_0R12 + (r << 21) + (1 << 16) - (32 - r) * 8, p);
6861 return p + 4;
6862}
6863
6864static bfd_byte *
6865savegpr1_tail (bfd *abfd, bfd_byte *p, int r)
6866{
6867 p = savegpr1 (abfd, p, r);
6868 bfd_put_32 (abfd, BLR, p);
6869 return p + 4;
6870}
6871
6872static bfd_byte *
6873restgpr1 (bfd *abfd, bfd_byte *p, int r)
6874{
6875 bfd_put_32 (abfd, LD_R0_0R12 + (r << 21) + (1 << 16) - (32 - r) * 8, p);
6876 return p + 4;
6877}
6878
6879static bfd_byte *
6880restgpr1_tail (bfd *abfd, bfd_byte *p, int r)
6881{
6882 p = restgpr1 (abfd, p, r);
6883 bfd_put_32 (abfd, BLR, p);
6884 return p + 4;
6885}
6886
6887static bfd_byte *
6888savefpr (bfd *abfd, bfd_byte *p, int r)
6889{
6890 bfd_put_32 (abfd, STFD_FR0_0R1 + (r << 21) + (1 << 16) - (32 - r) * 8, p);
6891 return p + 4;
6892}
6893
6894static bfd_byte *
6895savefpr0_tail (bfd *abfd, bfd_byte *p, int r)
6896{
6897 p = savefpr (abfd, p, r);
a078d95a 6898 bfd_put_32 (abfd, STD_R0_0R1 + STK_LR, p);
deb0e272
AM
6899 p = p + 4;
6900 bfd_put_32 (abfd, BLR, p);
6901 return p + 4;
6902}
6903
6904static bfd_byte *
6905restfpr (bfd *abfd, bfd_byte *p, int r)
6906{
6907 bfd_put_32 (abfd, LFD_FR0_0R1 + (r << 21) + (1 << 16) - (32 - r) * 8, p);
6908 return p + 4;
6909}
6910
6911static bfd_byte *
6912restfpr0_tail (bfd *abfd, bfd_byte *p, int r)
6913{
a078d95a 6914 bfd_put_32 (abfd, LD_R0_0R1 + STK_LR, p);
deb0e272
AM
6915 p = p + 4;
6916 p = restfpr (abfd, p, r);
6917 bfd_put_32 (abfd, MTLR_R0, p);
6918 p = p + 4;
6919 if (r == 29)
6920 {
6921 p = restfpr (abfd, p, 30);
6922 p = restfpr (abfd, p, 31);
6923 }
6924 bfd_put_32 (abfd, BLR, p);
6925 return p + 4;
6926}
6927
6928static bfd_byte *
6929savefpr1_tail (bfd *abfd, bfd_byte *p, int r)
6930{
6931 p = savefpr (abfd, p, r);
6932 bfd_put_32 (abfd, BLR, p);
6933 return p + 4;
6934}
6935
6936static bfd_byte *
6937restfpr1_tail (bfd *abfd, bfd_byte *p, int r)
6938{
6939 p = restfpr (abfd, p, r);
6940 bfd_put_32 (abfd, BLR, p);
6941 return p + 4;
6942}
6943
6944static bfd_byte *
6945savevr (bfd *abfd, bfd_byte *p, int r)
6946{
6947 bfd_put_32 (abfd, LI_R12_0 + (1 << 16) - (32 - r) * 16, p);
6948 p = p + 4;
6949 bfd_put_32 (abfd, STVX_VR0_R12_R0 + (r << 21), p);
6950 return p + 4;
6951}
6952
6953static bfd_byte *
6954savevr_tail (bfd *abfd, bfd_byte *p, int r)
6955{
6956 p = savevr (abfd, p, r);
6957 bfd_put_32 (abfd, BLR, p);
6958 return p + 4;
6959}
6960
6961static bfd_byte *
6962restvr (bfd *abfd, bfd_byte *p, int r)
6963{
6964 bfd_put_32 (abfd, LI_R12_0 + (1 << 16) - (32 - r) * 16, p);
6965 p = p + 4;
6966 bfd_put_32 (abfd, LVX_VR0_R12_R0 + (r << 21), p);
6967 return p + 4;
6968}
6969
6970static bfd_byte *
6971restvr_tail (bfd *abfd, bfd_byte *p, int r)
6972{
6973 p = restvr (abfd, p, r);
6974 bfd_put_32 (abfd, BLR, p);
6975 return p + 4;
6976}
6977
e86ce104
AM
6978/* Called via elf_link_hash_traverse to transfer dynamic linking
6979 information on function code symbol entries to their corresponding
6980 function descriptor symbol entries. */
deb0e272 6981
b34976b6 6982static bfd_boolean
4ce794b7 6983func_desc_adjust (struct elf_link_hash_entry *h, void *inf)
5bd4f169 6984{
e86ce104 6985 struct bfd_link_info *info;
65f38f15 6986 struct ppc_link_hash_table *htab;
50bc7936
AM
6987 struct ppc_link_hash_entry *fh;
6988 struct ppc_link_hash_entry *fdh;
6989 bfd_boolean force_local;
5bd4f169 6990
50bc7936
AM
6991 fh = (struct ppc_link_hash_entry *) h;
6992 if (fh->elf.root.type == bfd_link_hash_indirect)
b34976b6 6993 return TRUE;
e86ce104 6994
8c5b4e52
AM
6995 if (!fh->is_func)
6996 return TRUE;
6997
6998 if (fh->elf.root.root.string[0] != '.'
6999 || fh->elf.root.root.string[1] == '\0')
7000 return TRUE;
7001
4ce794b7 7002 info = inf;
65f38f15 7003 htab = ppc_hash_table (info);
4dfe6ac6
NC
7004 if (htab == NULL)
7005 return FALSE;
5bd4f169 7006
8c5b4e52
AM
7007 /* Find the corresponding function descriptor symbol. */
7008 fdh = lookup_fdh (fh, htab);
7009
c09bdfe5
AM
7010 /* Resolve undefined references to dot-symbols as the value
7011 in the function descriptor, if we have one in a regular object.
7012 This is to satisfy cases like ".quad .foo". Calls to functions
7013 in dynamic objects are handled elsewhere. */
8c5b4e52
AM
7014 if ((fh->elf.root.type == bfd_link_hash_undefined
7015 || fh->elf.root.type == bfd_link_hash_undefweak)
7016 && (fdh->elf.root.type == bfd_link_hash_defined
7017 || fdh->elf.root.type == bfd_link_hash_defweak)
b31867b6
AM
7018 && get_opd_info (fdh->elf.root.u.def.section) != NULL
7019 && opd_entry_value (fdh->elf.root.u.def.section,
7020 fdh->elf.root.u.def.value,
c09bdfe5 7021 &fh->elf.root.u.def.section,
aef36ac1 7022 &fh->elf.root.u.def.value, FALSE) != (bfd_vma) -1)
c09bdfe5 7023 {
b31867b6 7024 fh->elf.root.type = fdh->elf.root.type;
f5385ebf 7025 fh->elf.forced_local = 1;
b31867b6
AM
7026 fh->elf.def_regular = fdh->elf.def_regular;
7027 fh->elf.def_dynamic = fdh->elf.def_dynamic;
c09bdfe5
AM
7028 }
7029
8c5b4e52
AM
7030 if (!fh->elf.dynamic)
7031 {
7032 struct plt_entry *ent;
5bd4f169 7033
8c5b4e52
AM
7034 for (ent = fh->elf.plt.plist; ent != NULL; ent = ent->next)
7035 if (ent->plt.refcount > 0)
7036 break;
7037 if (ent == NULL)
7038 return TRUE;
7039 }
5bd4f169 7040
8c5b4e52 7041 /* Create a descriptor as undefined if necessary. */
50bc7936 7042 if (fdh == NULL
0e1862bb 7043 && !bfd_link_executable (info)
50bc7936
AM
7044 && (fh->elf.root.type == bfd_link_hash_undefined
7045 || fh->elf.root.type == bfd_link_hash_undefweak))
7046 {
908b32fc 7047 fdh = make_fdh (info, fh);
bb700d78
AM
7048 if (fdh == NULL)
7049 return FALSE;
50bc7936 7050 }
648cca2c 7051
8c5b4e52 7052 /* We can't support overriding of symbols on a fake descriptor. */
908b32fc
AM
7053 if (fdh != NULL
7054 && fdh->fake
8c5b4e52
AM
7055 && (fh->elf.root.type == bfd_link_hash_defined
7056 || fh->elf.root.type == bfd_link_hash_defweak))
7057 _bfd_elf_link_hash_hide_symbol (info, &fdh->elf, TRUE);
908b32fc 7058
8c5b4e52
AM
7059 /* Transfer dynamic linking information to the function descriptor. */
7060 if (fdh != NULL)
7061 {
f5385ebf
AM
7062 fdh->elf.ref_regular |= fh->elf.ref_regular;
7063 fdh->elf.ref_dynamic |= fh->elf.ref_dynamic;
7064 fdh->elf.ref_regular_nonweak |= fh->elf.ref_regular_nonweak;
7065 fdh->elf.non_got_ref |= fh->elf.non_got_ref;
8c5b4e52
AM
7066 fdh->elf.dynamic |= fh->elf.dynamic;
7067 fdh->elf.needs_plt |= (fh->elf.needs_plt
7068 || fh->elf.type == STT_FUNC
7069 || fh->elf.type == STT_GNU_IFUNC);
7070 move_plt_plist (fh, fdh);
7071
7072 if (!fdh->elf.forced_local
7073 && fh->elf.dynindx != -1)
7074 if (!bfd_elf_link_record_dynamic_symbol (info, &fdh->elf))
7075 return FALSE;
e86ce104
AM
7076 }
7077
50bc7936
AM
7078 /* Now that the info is on the function descriptor, clear the
7079 function code sym info. Any function code syms for which we
7080 don't have a definition in a regular file, we force local.
7081 This prevents a shared library from exporting syms that have
7082 been imported from another library. Function code syms that
7083 are really in the library we must leave global to prevent the
7084 linker dragging in a definition from a static library. */
93f3fa99
AM
7085 force_local = (!fh->elf.def_regular
7086 || fdh == NULL
7087 || !fdh->elf.def_regular
7088 || fdh->elf.forced_local);
50bc7936
AM
7089 _bfd_elf_link_hash_hide_symbol (info, &fh->elf, force_local);
7090
b34976b6 7091 return TRUE;
e86ce104 7092}
40b8271b 7093
a4b6fadd
AM
7094static const struct sfpr_def_parms save_res_funcs[] =
7095 {
7096 { "_savegpr0_", 14, 31, savegpr0, savegpr0_tail },
7097 { "_restgpr0_", 14, 29, restgpr0, restgpr0_tail },
7098 { "_restgpr0_", 30, 31, restgpr0, restgpr0_tail },
7099 { "_savegpr1_", 14, 31, savegpr1, savegpr1_tail },
7100 { "_restgpr1_", 14, 31, restgpr1, restgpr1_tail },
7101 { "_savefpr_", 14, 31, savefpr, savefpr0_tail },
7102 { "_restfpr_", 14, 29, restfpr, restfpr0_tail },
7103 { "_restfpr_", 30, 31, restfpr, restfpr0_tail },
7104 { "._savef", 14, 31, savefpr, savefpr1_tail },
7105 { "._restf", 14, 31, restfpr, restfpr1_tail },
7106 { "_savevr_", 20, 31, savevr, savevr_tail },
7107 { "_restvr_", 20, 31, restvr, restvr_tail }
7108 };
7109
e86ce104 7110/* Called near the start of bfd_elf_size_dynamic_sections. We use
82bd7b59
AM
7111 this hook to a) provide some gcc support functions, and b) transfer
7112 dynamic linking information gathered so far on function code symbol
7113 entries, to their corresponding function descriptor symbol entries. */
deb0e272 7114
b34976b6 7115static bfd_boolean
4ce794b7
AM
7116ppc64_elf_func_desc_adjust (bfd *obfd ATTRIBUTE_UNUSED,
7117 struct bfd_link_info *info)
e86ce104
AM
7118{
7119 struct ppc_link_hash_table *htab;
7120
7121 htab = ppc_hash_table (info);
4dfe6ac6
NC
7122 if (htab == NULL)
7123 return FALSE;
7124
b32547cd
AM
7125 /* Provide any missing _save* and _rest* functions. */
7126 if (htab->sfpr != NULL)
7127 {
7128 unsigned int i;
7129
7130 htab->sfpr->size = 0;
7131 for (i = 0; i < ARRAY_SIZE (save_res_funcs); i++)
7132 if (!sfpr_define (info, &save_res_funcs[i], NULL))
7133 return FALSE;
7134 if (htab->sfpr->size == 0)
7135 htab->sfpr->flags |= SEC_EXCLUDE;
7136 }
7137
7138 if (bfd_link_relocatable (info))
7139 return TRUE;
7140
7141 if (htab->elf.hgot != NULL)
dba6fa9b
AM
7142 {
7143 _bfd_elf_link_hash_hide_symbol (info, htab->elf.hgot, TRUE);
7144 /* Make .TOC. defined so as to prevent it being made dynamic.
7145 The wrong value here is fixed later in ppc64_elf_set_toc. */
43417696
AM
7146 if (!htab->elf.hgot->def_regular
7147 || htab->elf.hgot->root.type != bfd_link_hash_defined)
7148 {
7149 htab->elf.hgot->root.type = bfd_link_hash_defined;
7150 htab->elf.hgot->root.u.def.value = 0;
7151 htab->elf.hgot->root.u.def.section = bfd_abs_section_ptr;
7152 htab->elf.hgot->def_regular = 1;
7153 htab->elf.hgot->root.linker_def = 1;
7154 }
dba6fa9b 7155 htab->elf.hgot->type = STT_OBJECT;
dba6fa9b
AM
7156 htab->elf.hgot->other = ((htab->elf.hgot->other & ~ELF_ST_VISIBILITY (-1))
7157 | STV_HIDDEN);
7158 }
c66bb0ee 7159
8c5b4e52
AM
7160 if (htab->need_func_desc_adj)
7161 {
7162 elf_link_hash_traverse (&htab->elf, func_desc_adjust, info);
7163 htab->need_func_desc_adj = 0;
7164 }
805fc799 7165
b34976b6 7166 return TRUE;
e86ce104
AM
7167}
7168
98bbb1b8 7169/* Find dynamic relocs for H that apply to read-only sections. */
a345bc8d 7170
98bbb1b8 7171static asection *
a345bc8d
AM
7172readonly_dynrelocs (struct elf_link_hash_entry *h)
7173{
7174 struct ppc_link_hash_entry *eh;
7175 struct elf_dyn_relocs *p;
7176
7177 eh = (struct ppc_link_hash_entry *) h;
7178 for (p = eh->dyn_relocs; p != NULL; p = p->next)
7179 {
7180 asection *s = p->sec->output_section;
7181
7182 if (s != NULL && (s->flags & SEC_READONLY) != 0)
98bbb1b8 7183 return p->sec;
a345bc8d 7184 }
98bbb1b8 7185 return NULL;
a345bc8d
AM
7186}
7187
d311bc8b 7188/* Return true if we have dynamic relocs against H or any of its weak
ab2477e1
AM
7189 aliases, that apply to read-only sections. Cannot be used after
7190 size_dynamic_sections. */
d311bc8b
AM
7191
7192static bfd_boolean
7193alias_readonly_dynrelocs (struct elf_link_hash_entry *h)
7194{
7195 struct ppc_link_hash_entry *eh;
7196
7197 eh = (struct ppc_link_hash_entry *) h;
7198 do
7199 {
7200 if (readonly_dynrelocs (&eh->elf))
7201 return TRUE;
ab2477e1 7202 eh = (struct ppc_link_hash_entry *) eh->elf.u.alias;
d311bc8b
AM
7203 } while (eh != NULL && &eh->elf != h);
7204
7205 return FALSE;
7206}
8a2058b5 7207
8a9e8e72
AM
7208/* Return whether EH has pc-relative dynamic relocs. */
7209
7210static bfd_boolean
7211pc_dynrelocs (struct ppc_link_hash_entry *eh)
7212{
7213 struct elf_dyn_relocs *p;
7214
7215 for (p = eh->dyn_relocs; p != NULL; p = p->next)
7216 if (p->pc_count != 0)
7217 return TRUE;
7218 return FALSE;
7219}
7220
8a2058b5
AM
7221/* Return true if a global entry stub will be created for H. Valid
7222 for ELFv2 before plt entries have been allocated. */
7223
7224static bfd_boolean
7225global_entry_stub (struct elf_link_hash_entry *h)
7226{
7227 struct plt_entry *pent;
7228
7229 if (!h->pointer_equality_needed
7230 || h->def_regular)
7231 return FALSE;
7232
7233 for (pent = h->plt.plist; pent != NULL; pent = pent->next)
7234 if (pent->plt.refcount > 0
7235 && pent->addend == 0)
7236 return TRUE;
7237
7238 return FALSE;
7239}
7240
e86ce104
AM
7241/* Adjust a symbol defined by a dynamic object and referenced by a
7242 regular object. The current definition is in some section of the
7243 dynamic object, but we're not including those sections. We have to
7244 change the definition to something the rest of the link can
7245 understand. */
7246
b34976b6 7247static bfd_boolean
4ce794b7
AM
7248ppc64_elf_adjust_dynamic_symbol (struct bfd_link_info *info,
7249 struct elf_link_hash_entry *h)
e86ce104
AM
7250{
7251 struct ppc_link_hash_table *htab;
5474d94f 7252 asection *s, *srel;
e86ce104
AM
7253
7254 htab = ppc_hash_table (info);
4dfe6ac6
NC
7255 if (htab == NULL)
7256 return FALSE;
e86ce104
AM
7257
7258 /* Deal with function syms. */
7259 if (h->type == STT_FUNC
e054468f 7260 || h->type == STT_GNU_IFUNC
f5385ebf 7261 || h->needs_plt)
e86ce104 7262 {
529fe20e
AM
7263 bfd_boolean local = (((struct ppc_link_hash_entry *) h)->save_res
7264 || SYMBOL_CALLS_LOCAL (info, h)
7265 || UNDEFWEAK_NO_DYNAMIC_RELOC (info, h));
7266 /* Discard dyn_relocs when non-pic if we've decided that a
7267 function symbol is local and not an ifunc. We keep dynamic
7268 relocs for ifuncs when local rather than always emitting a
7269 plt call stub for them and defining the symbol on the call
7270 stub. We can't do that for ELFv1 anyway (a function symbol
7271 is defined on a descriptor, not code) and it can be faster at
7272 run-time due to not needing to bounce through a stub. The
7273 dyn_relocs for ifuncs will be applied even in a static
7274 executable. */
7275 if (!bfd_link_pic (info)
7276 && h->type != STT_GNU_IFUNC
7277 && local)
7278 ((struct ppc_link_hash_entry *) h)->dyn_relocs = NULL;
7279
e86ce104
AM
7280 /* Clear procedure linkage table information for any symbol that
7281 won't need a .plt entry. */
411e1bfb
AM
7282 struct plt_entry *ent;
7283 for (ent = h->plt.plist; ent != NULL; ent = ent->next)
7284 if (ent->plt.refcount > 0)
7285 break;
8387904d 7286 if (ent == NULL
2d7ad24e
AM
7287 || (h->type != STT_GNU_IFUNC
7288 && local
3e04d765
AM
7289 && (htab->can_convert_all_inline_plt
7290 || (((struct ppc_link_hash_entry *) h)->tls_mask
7291 & (TLS_TLS | PLT_KEEP)) != PLT_KEEP)))
40b8271b 7292 {
411e1bfb 7293 h->plt.plist = NULL;
f5385ebf 7294 h->needs_plt = 0;
d1eca1e4 7295 h->pointer_equality_needed = 0;
40b8271b 7296 }
8a2058b5 7297 else if (abiversion (info->output_bfd) >= 2)
a345bc8d 7298 {
d1eca1e4
AM
7299 /* Taking a function's address in a read/write section
7300 doesn't require us to define the function symbol in the
7301 executable on a global entry stub. A dynamic reloc can
8a2058b5
AM
7302 be used instead. The reason we prefer a few more dynamic
7303 relocs is that calling via a global entry stub costs a
7304 few more instructions, and pointer_equality_needed causes
7305 extra work in ld.so when resolving these symbols. */
529fe20e 7306 if (global_entry_stub (h))
d1eca1e4 7307 {
ab2477e1 7308 if (!readonly_dynrelocs (h))
529fe20e
AM
7309 {
7310 h->pointer_equality_needed = 0;
04383fd1
AM
7311 /* If we haven't seen a branch reloc and the symbol
7312 isn't an ifunc then we don't need a plt entry. */
529fe20e
AM
7313 if (!h->needs_plt)
7314 h->plt.plist = NULL;
7315 }
7316 else if (!bfd_link_pic (info))
7317 /* We are going to be defining the function symbol on the
7318 plt stub, so no dyn_relocs needed when non-pic. */
7319 ((struct ppc_link_hash_entry *) h)->dyn_relocs = NULL;
d1eca1e4
AM
7320 }
7321
3988aed5
AM
7322 /* ELFv2 function symbols can't have copy relocs. */
7323 return TRUE;
7324 }
7325 else if (!h->needs_plt
ab2477e1 7326 && !readonly_dynrelocs (h))
3988aed5 7327 {
04383fd1
AM
7328 /* If we haven't seen a branch reloc and the symbol isn't an
7329 ifunc then we don't need a plt entry. */
3988aed5
AM
7330 h->plt.plist = NULL;
7331 h->pointer_equality_needed = 0;
a345bc8d
AM
7332 return TRUE;
7333 }
5bd4f169 7334 }
bbd7ec4a 7335 else
411e1bfb 7336 h->plt.plist = NULL;
5bd4f169
AM
7337
7338 /* If this is a weak symbol, and there is a real definition, the
7339 processor independent code will have arranged for us to see the
7340 real definition first, and we can just use the same value. */
60d67dc8 7341 if (h->is_weakalias)
5bd4f169 7342 {
60d67dc8
AM
7343 struct elf_link_hash_entry *def = weakdef (h);
7344 BFD_ASSERT (def->root.type == bfd_link_hash_defined);
7345 h->root.u.def.section = def->root.u.def.section;
7346 h->root.u.def.value = def->root.u.def.value;
4a7e5234
AM
7347 if (def->root.u.def.section == htab->elf.sdynbss
7348 || def->root.u.def.section == htab->elf.sdynrelro)
7349 ((struct ppc_link_hash_entry *) h)->dyn_relocs = NULL;
b34976b6 7350 return TRUE;
5bd4f169
AM
7351 }
7352
5bd4f169
AM
7353 /* If we are creating a shared library, we must presume that the
7354 only references to the symbol are via the global offset table.
7355 For such cases we need not do anything here; the relocations will
7356 be handled correctly by relocate_section. */
0e1862bb 7357 if (bfd_link_pic (info))
b34976b6 7358 return TRUE;
5bd4f169 7359
65f38f15
AM
7360 /* If there are no references to this symbol that do not use the
7361 GOT, we don't need to generate a copy reloc. */
f5385ebf 7362 if (!h->non_got_ref)
b34976b6 7363 return TRUE;
65f38f15 7364
b186458a 7365 /* Don't generate a copy reloc for symbols defined in the executable. */
d93d1c80 7366 if (!h->def_dynamic || !h->ref_regular || h->def_regular
b186458a 7367
d93d1c80
AM
7368 /* If -z nocopyreloc was given, don't generate them either. */
7369 || info->nocopyreloc
a127494f 7370
dce2246a 7371 /* If we don't find any dynamic relocs in read-only sections, then
d93d1c80 7372 we'll be keeping the dynamic relocs and avoiding the copy reloc. */
d311bc8b 7373 || (ELIMINATE_COPY_RELOCS && !alias_readonly_dynrelocs (h))
65f38f15 7374
d93d1c80
AM
7375 /* Protected variables do not work with .dynbss. The copy in
7376 .dynbss won't be used by the shared library with the protected
7377 definition for the variable. Text relocations are preferable
7378 to an incorrect program. */
7379 || h->protected_def)
529fe20e 7380 return TRUE;
a127494f 7381
5d35169e 7382 if (h->plt.plist != NULL)
97b639ba
AM
7383 {
7384 /* We should never get here, but unfortunately there are versions
7385 of gcc out there that improperly (for this ABI) put initialized
7386 function pointers, vtable refs and suchlike in read-only
7387 sections. Allow them to proceed, but warn that this might
7388 break at runtime. */
25f53a85 7389 info->callbacks->einfo
c1c8c1ef 7390 (_("%P: copy reloc against `%pT' requires lazy plt linking; "
25f53a85 7391 "avoid setting LD_BIND_NOW=1 or upgrade gcc\n"),
97b639ba
AM
7392 h->root.root.string);
7393 }
5d35169e
AM
7394
7395 /* This is a reference to a symbol defined by a dynamic object which
7396 is not a function. */
7397
5bd4f169
AM
7398 /* We must allocate the symbol in our .dynbss section, which will
7399 become part of the .bss section of the executable. There will be
7400 an entry for this symbol in the .dynsym section. The dynamic
7401 object will contain position independent code, so all references
7402 from the dynamic object to this symbol will go through the global
7403 offset table. The dynamic linker will use the .dynsym entry to
7404 determine the address it must put in the global offset table, so
7405 both the dynamic object and the regular object will refer to the
7406 same memory location for the variable. */
5474d94f
AM
7407 if ((h->root.u.def.section->flags & SEC_READONLY) != 0)
7408 {
7409 s = htab->elf.sdynrelro;
7410 srel = htab->elf.sreldynrelro;
7411 }
7412 else
7413 {
7414 s = htab->elf.sdynbss;
7415 srel = htab->elf.srelbss;
7416 }
1d7e9d18 7417 if ((h->root.u.def.section->flags & SEC_ALLOC) != 0 && h->size != 0)
5bd4f169 7418 {
4a7e5234
AM
7419 /* We must generate a R_PPC64_COPY reloc to tell the dynamic
7420 linker to copy the initial value out of the dynamic object
7421 and into the runtime process image. */
5474d94f 7422 srel->size += sizeof (Elf64_External_Rela);
f5385ebf 7423 h->needs_copy = 1;
5bd4f169
AM
7424 }
7425
529fe20e
AM
7426 /* We no longer want dyn_relocs. */
7427 ((struct ppc_link_hash_entry *) h)->dyn_relocs = NULL;
6cabe1ea 7428 return _bfd_elf_adjust_dynamic_copy (info, h, s);
5bd4f169
AM
7429}
7430
e86ce104
AM
7431/* If given a function descriptor symbol, hide both the function code
7432 sym and the descriptor. */
7433static void
4ce794b7
AM
7434ppc64_elf_hide_symbol (struct bfd_link_info *info,
7435 struct elf_link_hash_entry *h,
7436 bfd_boolean force_local)
e86ce104 7437{
34814b9f 7438 struct ppc_link_hash_entry *eh;
e86ce104
AM
7439 _bfd_elf_link_hash_hide_symbol (info, h, force_local);
7440
34814b9f
AM
7441 eh = (struct ppc_link_hash_entry *) h;
7442 if (eh->is_func_descriptor)
e86ce104 7443 {
34814b9f 7444 struct ppc_link_hash_entry *fh = eh->oh;
e86ce104 7445
721956f4 7446 if (fh == NULL)
d1329ca3
AM
7447 {
7448 const char *p, *q;
b8ac2841 7449 struct elf_link_hash_table *htab = elf_hash_table (info);
d1329ca3
AM
7450 char save;
7451
7452 /* We aren't supposed to use alloca in BFD because on
7453 systems which do not have alloca the version in libiberty
7454 calls xmalloc, which might cause the program to crash
7455 when it runs out of memory. This function doesn't have a
7456 return status, so there's no way to gracefully return an
7457 error. So cheat. We know that string[-1] can be safely
34814b9f
AM
7458 accessed; It's either a string in an ELF string table,
7459 or allocated in an objalloc structure. */
d1329ca3 7460
34814b9f 7461 p = eh->elf.root.root.string - 1;
d1329ca3
AM
7462 save = *p;
7463 *(char *) p = '.';
34814b9f 7464 fh = (struct ppc_link_hash_entry *)
b8ac2841 7465 elf_link_hash_lookup (htab, p, FALSE, FALSE, FALSE);
d1329ca3
AM
7466 *(char *) p = save;
7467
7468 /* Unfortunately, if it so happens that the string we were
7469 looking for was allocated immediately before this string,
7470 then we overwrote the string terminator. That's the only
7471 reason the lookup should fail. */
7472 if (fh == NULL)
7473 {
34814b9f
AM
7474 q = eh->elf.root.root.string + strlen (eh->elf.root.root.string);
7475 while (q >= eh->elf.root.root.string && *q == *p)
d1329ca3 7476 --q, --p;
34814b9f
AM
7477 if (q < eh->elf.root.root.string && *p == '.')
7478 fh = (struct ppc_link_hash_entry *)
b8ac2841 7479 elf_link_hash_lookup (htab, p, FALSE, FALSE, FALSE);
d1329ca3
AM
7480 }
7481 if (fh != NULL)
7482 {
34814b9f
AM
7483 eh->oh = fh;
7484 fh->oh = eh;
d1329ca3
AM
7485 }
7486 }
e86ce104 7487 if (fh != NULL)
34814b9f 7488 _bfd_elf_link_hash_hide_symbol (info, &fh->elf, force_local);
e86ce104
AM
7489 }
7490}
7491
411e1bfb 7492static bfd_boolean
8843416a
AM
7493get_sym_h (struct elf_link_hash_entry **hp,
7494 Elf_Internal_Sym **symp,
7495 asection **symsecp,
f961d9dd 7496 unsigned char **tls_maskp,
8843416a
AM
7497 Elf_Internal_Sym **locsymsp,
7498 unsigned long r_symndx,
7499 bfd *ibfd)
411e1bfb 7500{
0ffa91dd 7501 Elf_Internal_Shdr *symtab_hdr = &elf_symtab_hdr (ibfd);
411e1bfb
AM
7502
7503 if (r_symndx >= symtab_hdr->sh_info)
7504 {
7505 struct elf_link_hash_entry **sym_hashes = elf_sym_hashes (ibfd);
7506 struct elf_link_hash_entry *h;
7507
7508 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
b31867b6 7509 h = elf_follow_link (h);
411e1bfb
AM
7510
7511 if (hp != NULL)
7512 *hp = h;
7513
7514 if (symp != NULL)
7515 *symp = NULL;
7516
7517 if (symsecp != NULL)
7518 {
7519 asection *symsec = NULL;
7520 if (h->root.type == bfd_link_hash_defined
7521 || h->root.type == bfd_link_hash_defweak)
7522 symsec = h->root.u.def.section;
7523 *symsecp = symsec;
7524 }
7525
e7b938ca 7526 if (tls_maskp != NULL)
411e1bfb
AM
7527 {
7528 struct ppc_link_hash_entry *eh;
7529
7530 eh = (struct ppc_link_hash_entry *) h;
e7b938ca 7531 *tls_maskp = &eh->tls_mask;
411e1bfb
AM
7532 }
7533 }
7534 else
7535 {
7536 Elf_Internal_Sym *sym;
7537 Elf_Internal_Sym *locsyms = *locsymsp;
7538
7539 if (locsyms == NULL)
7540 {
7541 locsyms = (Elf_Internal_Sym *) symtab_hdr->contents;
7542 if (locsyms == NULL)
7543 locsyms = bfd_elf_get_elf_syms (ibfd, symtab_hdr,
7544 symtab_hdr->sh_info,
7545 0, NULL, NULL, NULL);
7546 if (locsyms == NULL)
7547 return FALSE;
7548 *locsymsp = locsyms;
7549 }
7550 sym = locsyms + r_symndx;
7551
7552 if (hp != NULL)
7553 *hp = NULL;
7554
7555 if (symp != NULL)
7556 *symp = sym;
7557
7558 if (symsecp != NULL)
cb33740c 7559 *symsecp = bfd_section_from_elf_index (ibfd, sym->st_shndx);
411e1bfb 7560
e7b938ca 7561 if (tls_maskp != NULL)
411e1bfb
AM
7562 {
7563 struct got_entry **lgot_ents;
f961d9dd 7564 unsigned char *tls_mask;
411e1bfb 7565
e7b938ca 7566 tls_mask = NULL;
411e1bfb
AM
7567 lgot_ents = elf_local_got_ents (ibfd);
7568 if (lgot_ents != NULL)
7569 {
e054468f
AM
7570 struct plt_entry **local_plt = (struct plt_entry **)
7571 (lgot_ents + symtab_hdr->sh_info);
f961d9dd 7572 unsigned char *lgot_masks = (unsigned char *)
e054468f 7573 (local_plt + symtab_hdr->sh_info);
e7b938ca 7574 tls_mask = &lgot_masks[r_symndx];
411e1bfb 7575 }
e7b938ca 7576 *tls_maskp = tls_mask;
411e1bfb
AM
7577 }
7578 }
7579 return TRUE;
7580}
7581
e7b938ca 7582/* Returns TLS_MASKP for the given REL symbol. Function return is 0 on
951fd09b 7583 error, 2 on a toc GD type suitable for optimization, 3 on a toc LD
ad8e1ba5 7584 type suitable for optimization, and 1 otherwise. */
951fd09b
AM
7585
7586static int
f961d9dd 7587get_tls_mask (unsigned char **tls_maskp,
3a71aa26
AM
7588 unsigned long *toc_symndx,
7589 bfd_vma *toc_addend,
0d4792f7 7590 Elf_Internal_Sym **locsymsp,
3a71aa26
AM
7591 const Elf_Internal_Rela *rel,
7592 bfd *ibfd)
411e1bfb
AM
7593{
7594 unsigned long r_symndx;
0d4792f7 7595 int next_r;
411e1bfb
AM
7596 struct elf_link_hash_entry *h;
7597 Elf_Internal_Sym *sym;
7598 asection *sec;
7599 bfd_vma off;
7600
7601 r_symndx = ELF64_R_SYM (rel->r_info);
e7b938ca 7602 if (!get_sym_h (&h, &sym, &sec, tls_maskp, locsymsp, r_symndx, ibfd))
951fd09b 7603 return 0;
411e1bfb 7604
37da22e5
AM
7605 if ((*tls_maskp != NULL
7606 && (**tls_maskp & TLS_TLS) != 0
7607 && **tls_maskp != (TLS_TLS | TLS_MARK))
411e1bfb 7608 || sec == NULL
6bee8834 7609 || ppc64_elf_section_data (sec) == NULL
7c8fe5c4 7610 || ppc64_elf_section_data (sec)->sec_type != sec_toc)
951fd09b 7611 return 1;
411e1bfb
AM
7612
7613 /* Look inside a TOC section too. */
7614 if (h != NULL)
7615 {
7616 BFD_ASSERT (h->root.type == bfd_link_hash_defined);
7617 off = h->root.u.def.value;
7618 }
7619 else
7620 off = sym->st_value;
7621 off += rel->r_addend;
7622 BFD_ASSERT (off % 8 == 0);
3a71aa26
AM
7623 r_symndx = ppc64_elf_section_data (sec)->u.toc.symndx[off / 8];
7624 next_r = ppc64_elf_section_data (sec)->u.toc.symndx[off / 8 + 1];
0d4792f7
AM
7625 if (toc_symndx != NULL)
7626 *toc_symndx = r_symndx;
3a71aa26
AM
7627 if (toc_addend != NULL)
7628 *toc_addend = ppc64_elf_section_data (sec)->u.toc.add[off / 8];
7629 if (!get_sym_h (&h, &sym, &sec, tls_maskp, locsymsp, r_symndx, ibfd))
7630 return 0;
854b41e7 7631 if ((h == NULL || is_static_defined (h))
0d4792f7
AM
7632 && (next_r == -1 || next_r == -2))
7633 return 1 - next_r;
951fd09b 7634 return 1;
411e1bfb
AM
7635}
7636
3b421ab3
AM
7637/* Find (or create) an entry in the tocsave hash table. */
7638
7639static struct tocsave_entry *
7640tocsave_find (struct ppc_link_hash_table *htab,
7641 enum insert_option insert,
7642 Elf_Internal_Sym **local_syms,
7643 const Elf_Internal_Rela *irela,
7644 bfd *ibfd)
7645{
7646 unsigned long r_indx;
7647 struct elf_link_hash_entry *h;
7648 Elf_Internal_Sym *sym;
7649 struct tocsave_entry ent, *p;
7650 hashval_t hash;
7651 struct tocsave_entry **slot;
7652
7653 r_indx = ELF64_R_SYM (irela->r_info);
7654 if (!get_sym_h (&h, &sym, &ent.sec, NULL, local_syms, r_indx, ibfd))
7655 return NULL;
7656 if (ent.sec == NULL || ent.sec->output_section == NULL)
7657 {
4eca0228 7658 _bfd_error_handler
871b3ab2 7659 (_("%pB: undefined symbol on R_PPC64_TOCSAVE relocation"), ibfd);
3b421ab3
AM
7660 return NULL;
7661 }
7662
7663 if (h != NULL)
7664 ent.offset = h->root.u.def.value;
7665 else
7666 ent.offset = sym->st_value;
7667 ent.offset += irela->r_addend;
7668
7669 hash = tocsave_htab_hash (&ent);
7670 slot = ((struct tocsave_entry **)
7671 htab_find_slot_with_hash (htab->tocsave_htab, &ent, hash, insert));
7672 if (slot == NULL)
7673 return NULL;
7674
7675 if (*slot == NULL)
7676 {
7677 p = (struct tocsave_entry *) bfd_alloc (ibfd, sizeof (*p));
7678 if (p == NULL)
7679 return NULL;
7680 *p = ent;
7681 *slot = p;
7682 }
7683 return *slot;
7684}
7685
754021d0 7686/* Adjust all global syms defined in opd sections. In gcc generated
8387904d 7687 code for the old ABI, these will already have been done. */
754021d0
AM
7688
7689static bfd_boolean
7690adjust_opd_syms (struct elf_link_hash_entry *h, void *inf ATTRIBUTE_UNUSED)
7691{
7692 struct ppc_link_hash_entry *eh;
7693 asection *sym_sec;
74f0fb50 7694 struct _opd_sec_data *opd;
754021d0
AM
7695
7696 if (h->root.type == bfd_link_hash_indirect)
7697 return TRUE;
7698
754021d0
AM
7699 if (h->root.type != bfd_link_hash_defined
7700 && h->root.type != bfd_link_hash_defweak)
7701 return TRUE;
7702
7703 eh = (struct ppc_link_hash_entry *) h;
7704 if (eh->adjust_done)
7705 return TRUE;
7706
7707 sym_sec = eh->elf.root.u.def.section;
74f0fb50
AM
7708 opd = get_opd_info (sym_sec);
7709 if (opd != NULL && opd->adjust != NULL)
754021d0 7710 {
51aecdc5 7711 long adjust = opd->adjust[OPD_NDX (eh->elf.root.u.def.value)];
4025353c
AM
7712 if (adjust == -1)
7713 {
7714 /* This entry has been deleted. */
b3fac117 7715 asection *dsec = ppc64_elf_tdata (sym_sec->owner)->deleted_section;
81688140
AM
7716 if (dsec == NULL)
7717 {
7718 for (dsec = sym_sec->owner->sections; dsec; dsec = dsec->next)
dbaa2011 7719 if (discarded_section (dsec))
81688140 7720 {
b3fac117 7721 ppc64_elf_tdata (sym_sec->owner)->deleted_section = dsec;
81688140
AM
7722 break;
7723 }
7724 }
4025353c 7725 eh->elf.root.u.def.value = 0;
81688140 7726 eh->elf.root.u.def.section = dsec;
4025353c
AM
7727 }
7728 else
7729 eh->elf.root.u.def.value += adjust;
754021d0
AM
7730 eh->adjust_done = 1;
7731 }
7732 return TRUE;
7733}
7734
8c1d1bb8 7735/* Handles decrementing dynamic reloc counts for the reloc specified by
19e08130 7736 R_INFO in section SEC. If LOCAL_SYMS is NULL, then H and SYM
8c1d1bb8
AM
7737 have already been determined. */
7738
7739static bfd_boolean
7740dec_dynrel_count (bfd_vma r_info,
7741 asection *sec,
7742 struct bfd_link_info *info,
7743 Elf_Internal_Sym **local_syms,
7744 struct elf_link_hash_entry *h,
19e08130 7745 Elf_Internal_Sym *sym)
8c1d1bb8
AM
7746{
7747 enum elf_ppc64_reloc_type r_type;
19e08130 7748 asection *sym_sec = NULL;
8c1d1bb8
AM
7749
7750 /* Can this reloc be dynamic? This switch, and later tests here
7751 should be kept in sync with the code in check_relocs. */
7752 r_type = ELF64_R_TYPE (r_info);
7753 switch (r_type)
7754 {
7755 default:
7756 return TRUE;
7757
7758 case R_PPC64_TPREL16:
7759 case R_PPC64_TPREL16_LO:
7760 case R_PPC64_TPREL16_HI:
7761 case R_PPC64_TPREL16_HA:
7762 case R_PPC64_TPREL16_DS:
7763 case R_PPC64_TPREL16_LO_DS:
f9c6b907
AM
7764 case R_PPC64_TPREL16_HIGH:
7765 case R_PPC64_TPREL16_HIGHA:
8c1d1bb8
AM
7766 case R_PPC64_TPREL16_HIGHER:
7767 case R_PPC64_TPREL16_HIGHERA:
7768 case R_PPC64_TPREL16_HIGHEST:
7769 case R_PPC64_TPREL16_HIGHESTA:
8c1d1bb8
AM
7770 case R_PPC64_TPREL64:
7771 case R_PPC64_DTPMOD64:
7772 case R_PPC64_DTPREL64:
7773 case R_PPC64_ADDR64:
7774 case R_PPC64_REL30:
7775 case R_PPC64_REL32:
7776 case R_PPC64_REL64:
7777 case R_PPC64_ADDR14:
7778 case R_PPC64_ADDR14_BRNTAKEN:
7779 case R_PPC64_ADDR14_BRTAKEN:
7780 case R_PPC64_ADDR16:
7781 case R_PPC64_ADDR16_DS:
7782 case R_PPC64_ADDR16_HA:
7783 case R_PPC64_ADDR16_HI:
f9c6b907
AM
7784 case R_PPC64_ADDR16_HIGH:
7785 case R_PPC64_ADDR16_HIGHA:
8c1d1bb8
AM
7786 case R_PPC64_ADDR16_HIGHER:
7787 case R_PPC64_ADDR16_HIGHERA:
7788 case R_PPC64_ADDR16_HIGHEST:
7789 case R_PPC64_ADDR16_HIGHESTA:
7790 case R_PPC64_ADDR16_LO:
7791 case R_PPC64_ADDR16_LO_DS:
7792 case R_PPC64_ADDR24:
7793 case R_PPC64_ADDR32:
7794 case R_PPC64_UADDR16:
7795 case R_PPC64_UADDR32:
7796 case R_PPC64_UADDR64:
7797 case R_PPC64_TOC:
7798 break;
7799 }
7800
7801 if (local_syms != NULL)
7802 {
7803 unsigned long r_symndx;
8c1d1bb8
AM
7804 bfd *ibfd = sec->owner;
7805
7806 r_symndx = ELF64_R_SYM (r_info);
7807 if (!get_sym_h (&h, &sym, &sym_sec, NULL, local_syms, r_symndx, ibfd))
7808 return FALSE;
7809 }
7810
0e1862bb 7811 if ((bfd_link_pic (info)
1d483afe 7812 && (must_be_dyn_reloc (info, r_type)
8c1d1bb8 7813 || (h != NULL
198f1157 7814 && (!SYMBOLIC_BIND (info, h)
8c1d1bb8
AM
7815 || h->root.type == bfd_link_hash_defweak
7816 || !h->def_regular))))
7817 || (ELIMINATE_COPY_RELOCS
0e1862bb 7818 && !bfd_link_pic (info)
8c1d1bb8
AM
7819 && h != NULL
7820 && (h->root.type == bfd_link_hash_defweak
7821 || !h->def_regular)))
7822 ;
7823 else
7824 return TRUE;
7825
7826 if (h != NULL)
6edfbbad 7827 {
19e08130
AM
7828 struct elf_dyn_relocs *p;
7829 struct elf_dyn_relocs **pp;
7830 pp = &((struct ppc_link_hash_entry *) h)->dyn_relocs;
7831
7832 /* elf_gc_sweep may have already removed all dyn relocs associated
7833 with local syms for a given section. Also, symbol flags are
7834 changed by elf_gc_sweep_symbol, confusing the test above. Don't
7835 report a dynreloc miscount. */
7836 if (*pp == NULL && info->gc_sections)
7837 return TRUE;
7838
7839 while ((p = *pp) != NULL)
60124e18 7840 {
19e08130
AM
7841 if (p->sec == sec)
7842 {
7843 if (!must_be_dyn_reloc (info, r_type))
7844 p->pc_count -= 1;
7845 p->count -= 1;
7846 if (p->count == 0)
7847 *pp = p->next;
7848 return TRUE;
7849 }
7850 pp = &p->next;
60124e18 7851 }
6edfbbad 7852 }
19e08130
AM
7853 else
7854 {
7855 struct ppc_dyn_relocs *p;
7856 struct ppc_dyn_relocs **pp;
7857 void *vpp;
7858 bfd_boolean is_ifunc;
8c1d1bb8 7859
19e08130
AM
7860 if (local_syms == NULL)
7861 sym_sec = bfd_section_from_elf_index (sec->owner, sym->st_shndx);
7862 if (sym_sec == NULL)
7863 sym_sec = sec;
c57da1a7 7864
19e08130
AM
7865 vpp = &elf_section_data (sym_sec)->local_dynrel;
7866 pp = (struct ppc_dyn_relocs **) vpp;
7867
7868 if (*pp == NULL && info->gc_sections)
7869 return TRUE;
7870
7871 is_ifunc = ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC;
7872 while ((p = *pp) != NULL)
8c1d1bb8 7873 {
19e08130
AM
7874 if (p->sec == sec && p->ifunc == is_ifunc)
7875 {
7876 p->count -= 1;
7877 if (p->count == 0)
7878 *pp = p->next;
7879 return TRUE;
7880 }
7881 pp = &p->next;
8c1d1bb8 7882 }
8c1d1bb8
AM
7883 }
7884
695344c0 7885 /* xgettext:c-format */
cf97bcb0
AM
7886 _bfd_error_handler (_("dynreloc miscount for %pB, section %pA"),
7887 sec->owner, sec);
8c1d1bb8
AM
7888 bfd_set_error (bfd_error_bad_value);
7889 return FALSE;
7890}
7891
754021d0
AM
7892/* Remove unused Official Procedure Descriptor entries. Currently we
7893 only remove those associated with functions in discarded link-once
7894 sections, or weakly defined functions that have been overridden. It
7895 would be possible to remove many more entries for statically linked
7896 applications. */
7897
b34976b6 7898bfd_boolean
e7d1c40c 7899ppc64_elf_edit_opd (struct bfd_link_info *info)
1e2f5b6e
AM
7900{
7901 bfd *ibfd;
754021d0 7902 bfd_boolean some_edited = FALSE;
3f764659 7903 asection *need_pad = NULL;
e7d1c40c
AM
7904 struct ppc_link_hash_table *htab;
7905
7906 htab = ppc_hash_table (info);
7907 if (htab == NULL)
7908 return FALSE;
1e2f5b6e 7909
c72f2fb2 7910 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
1e2f5b6e
AM
7911 {
7912 asection *sec;
7913 Elf_Internal_Rela *relstart, *rel, *relend;
7914 Elf_Internal_Shdr *symtab_hdr;
6cdc0ccc 7915 Elf_Internal_Sym *local_syms;
74f0fb50 7916 struct _opd_sec_data *opd;
51aecdc5 7917 bfd_boolean need_edit, add_aux_fields, broken;
3f764659 7918 bfd_size_type cnt_16b = 0;
1e2f5b6e 7919
854b41e7
AM
7920 if (!is_ppc64_elf (ibfd))
7921 continue;
7922
1e2f5b6e 7923 sec = bfd_get_section_by_name (ibfd, ".opd");
46de2a7c 7924 if (sec == NULL || sec->size == 0)
1e2f5b6e
AM
7925 continue;
7926
dbaa2011 7927 if (sec->sec_info_type == SEC_INFO_TYPE_JUST_SYMS)
4b85d634
AM
7928 continue;
7929
1e2f5b6e
AM
7930 if (sec->output_section == bfd_abs_section_ptr)
7931 continue;
7932
7933 /* Look through the section relocs. */
7934 if ((sec->flags & SEC_RELOC) == 0 || sec->reloc_count == 0)
7935 continue;
7936
6cdc0ccc 7937 local_syms = NULL;
0ffa91dd 7938 symtab_hdr = &elf_symtab_hdr (ibfd);
1e2f5b6e
AM
7939
7940 /* Read the relocations. */
4ce794b7 7941 relstart = _bfd_elf_link_read_relocs (ibfd, sec, NULL, NULL,
45d6a902 7942 info->keep_memory);
1e2f5b6e 7943 if (relstart == NULL)
b34976b6 7944 return FALSE;
1e2f5b6e
AM
7945
7946 /* First run through the relocs to check they are sane, and to
7947 determine whether we need to edit this opd section. */
b34976b6 7948 need_edit = FALSE;
51aecdc5 7949 broken = FALSE;
3f764659 7950 need_pad = sec;
1e2f5b6e 7951 relend = relstart + sec->reloc_count;
50bc7936 7952 for (rel = relstart; rel < relend; )
1e2f5b6e 7953 {
04c9666a 7954 enum elf_ppc64_reloc_type r_type;
1e2f5b6e
AM
7955 unsigned long r_symndx;
7956 asection *sym_sec;
7957 struct elf_link_hash_entry *h;
7958 Elf_Internal_Sym *sym;
51aecdc5 7959 bfd_vma offset;
1e2f5b6e 7960
51aecdc5 7961 /* .opd contains an array of 16 or 24 byte entries. We're
1e2f5b6e
AM
7962 only interested in the reloc pointing to a function entry
7963 point. */
51aecdc5
AM
7964 offset = rel->r_offset;
7965 if (rel + 1 == relend
7966 || rel[1].r_offset != offset + 8)
1e2f5b6e
AM
7967 {
7968 /* If someone messes with .opd alignment then after a
7969 "ld -r" we might have padding in the middle of .opd.
7970 Also, there's nothing to prevent someone putting
7971 something silly in .opd with the assembler. No .opd
b34976b6 7972 optimization for them! */
3f764659 7973 broken_opd:
4eca0228 7974 _bfd_error_handler
871b3ab2 7975 (_("%pB: .opd is not a regular array of opd entries"), ibfd);
51aecdc5 7976 broken = TRUE;
1e2f5b6e
AM
7977 break;
7978 }
7979
50bc7936
AM
7980 if ((r_type = ELF64_R_TYPE (rel->r_info)) != R_PPC64_ADDR64
7981 || (r_type = ELF64_R_TYPE ((rel + 1)->r_info)) != R_PPC64_TOC)
7982 {
4eca0228 7983 _bfd_error_handler
695344c0 7984 /* xgettext:c-format */
871b3ab2 7985 (_("%pB: unexpected reloc type %u in .opd section"),
d003868e 7986 ibfd, r_type);
51aecdc5 7987 broken = TRUE;
50bc7936
AM
7988 break;
7989 }
7990
1e2f5b6e 7991 r_symndx = ELF64_R_SYM (rel->r_info);
411e1bfb
AM
7992 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms,
7993 r_symndx, ibfd))
50bc7936 7994 goto error_ret;
1e2f5b6e
AM
7995
7996 if (sym_sec == NULL || sym_sec->owner == NULL)
7997 {
411e1bfb
AM
7998 const char *sym_name;
7999 if (h != NULL)
8000 sym_name = h->root.root.string;
8001 else
26c61ae5
L
8002 sym_name = bfd_elf_sym_name (ibfd, symtab_hdr, sym,
8003 sym_sec);
411e1bfb 8004
4eca0228 8005 _bfd_error_handler
695344c0 8006 /* xgettext:c-format */
871b3ab2 8007 (_("%pB: undefined sym `%s' in .opd section"),
d003868e 8008 ibfd, sym_name);
51aecdc5 8009 broken = TRUE;
1e2f5b6e
AM
8010 break;
8011 }
8012
51020317
AM
8013 /* opd entries are always for functions defined in the
8014 current input bfd. If the symbol isn't defined in the
8015 input bfd, then we won't be using the function in this
8016 bfd; It must be defined in a linkonce section in another
8017 bfd, or is weak. It's also possible that we are
8018 discarding the function due to a linker script /DISCARD/,
8019 which we test for via the output_section. */
8020 if (sym_sec->owner != ibfd
8021 || sym_sec->output_section == bfd_abs_section_ptr)
b34976b6 8022 need_edit = TRUE;
1e2f5b6e 8023
50bc7936 8024 rel += 2;
51aecdc5
AM
8025 if (rel + 1 == relend
8026 || (rel + 2 < relend
8027 && ELF64_R_TYPE (rel[2].r_info) == R_PPC64_TOC))
8028 ++rel;
8029
8030 if (rel == relend)
3f764659
JJ
8031 {
8032 if (sec->size == offset + 24)
8033 {
8034 need_pad = NULL;
8035 break;
8036 }
51aecdc5 8037 if (sec->size == offset + 16)
3f764659
JJ
8038 {
8039 cnt_16b++;
8040 break;
8041 }
8042 goto broken_opd;
8043 }
3f764659
JJ
8044 else if (rel + 1 < relend
8045 && ELF64_R_TYPE (rel[0].r_info) == R_PPC64_ADDR64
8046 && ELF64_R_TYPE (rel[1].r_info) == R_PPC64_TOC)
8047 {
51aecdc5
AM
8048 if (rel[0].r_offset == offset + 16)
8049 cnt_16b++;
8050 else if (rel[0].r_offset != offset + 24)
8051 goto broken_opd;
3f764659
JJ
8052 }
8053 else
8054 goto broken_opd;
1e2f5b6e
AM
8055 }
8056
e7d1c40c 8057 add_aux_fields = htab->params->non_overlapping_opd && cnt_16b > 0;
3f764659 8058
51aecdc5 8059 if (!broken && (need_edit || add_aux_fields))
1e2f5b6e
AM
8060 {
8061 Elf_Internal_Rela *write_rel;
d4730f92 8062 Elf_Internal_Shdr *rel_hdr;
1e2f5b6e 8063 bfd_byte *rptr, *wptr;
983bddc8 8064 bfd_byte *new_contents;
74f0fb50
AM
8065 bfd_size_type amt;
8066
983bddc8 8067 new_contents = NULL;
51aecdc5 8068 amt = OPD_NDX (sec->size) * sizeof (long);
74f0fb50 8069 opd = &ppc64_elf_section_data (sec)->u.opd;
33c0ec9d 8070 opd->adjust = bfd_zalloc (sec->owner, amt);
74f0fb50
AM
8071 if (opd->adjust == NULL)
8072 return FALSE;
1e2f5b6e
AM
8073
8074 /* This seems a waste of time as input .opd sections are all
8075 zeros as generated by gcc, but I suppose there's no reason
8076 this will always be so. We might start putting something in
8077 the third word of .opd entries. */
8078 if ((sec->flags & SEC_IN_MEMORY) == 0)
8079 {
eea6121a
AM
8080 bfd_byte *loc;
8081 if (!bfd_malloc_and_get_section (ibfd, sec, &loc))
6cdc0ccc 8082 {
eea6121a
AM
8083 if (loc != NULL)
8084 free (loc);
50bc7936 8085 error_ret:
6cdc0ccc
AM
8086 if (local_syms != NULL
8087 && symtab_hdr->contents != (unsigned char *) local_syms)
8088 free (local_syms);
6cdc0ccc
AM
8089 if (elf_section_data (sec)->relocs != relstart)
8090 free (relstart);
b34976b6 8091 return FALSE;
6cdc0ccc 8092 }
1e2f5b6e
AM
8093 sec->contents = loc;
8094 sec->flags |= (SEC_IN_MEMORY | SEC_HAS_CONTENTS);
8095 }
8096
8097 elf_section_data (sec)->relocs = relstart;
8098
3f764659 8099 new_contents = sec->contents;
3f764659
JJ
8100 if (add_aux_fields)
8101 {
8102 new_contents = bfd_malloc (sec->size + cnt_16b * 8);
8103 if (new_contents == NULL)
8104 return FALSE;
51aecdc5 8105 need_pad = NULL;
3f764659 8106 }
b4f4e59f
AM
8107 wptr = new_contents;
8108 rptr = sec->contents;
1e2f5b6e 8109 write_rel = relstart;
51aecdc5 8110 for (rel = relstart; rel < relend; )
1e2f5b6e 8111 {
50bc7936
AM
8112 unsigned long r_symndx;
8113 asection *sym_sec;
8114 struct elf_link_hash_entry *h;
51aecdc5 8115 struct ppc_link_hash_entry *fdh = NULL;
50bc7936 8116 Elf_Internal_Sym *sym;
51aecdc5
AM
8117 long opd_ent_size;
8118 Elf_Internal_Rela *next_rel;
8119 bfd_boolean skip;
50bc7936
AM
8120
8121 r_symndx = ELF64_R_SYM (rel->r_info);
8122 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms,
d37c89e5 8123 r_symndx, ibfd))
50bc7936
AM
8124 goto error_ret;
8125
51aecdc5
AM
8126 next_rel = rel + 2;
8127 if (next_rel + 1 == relend
8128 || (next_rel + 2 < relend
8129 && ELF64_R_TYPE (next_rel[2].r_info) == R_PPC64_TOC))
8130 ++next_rel;
8131
8132 /* See if the .opd entry is full 24 byte or
8133 16 byte (with fd_aux entry overlapped with next
8134 fd_func). */
8135 opd_ent_size = 24;
8136 if (next_rel == relend)
1e2f5b6e 8137 {
51aecdc5 8138 if (sec->size == rel->r_offset + 16)
3f764659 8139 opd_ent_size = 16;
51aecdc5
AM
8140 }
8141 else if (next_rel->r_offset == rel->r_offset + 16)
8142 opd_ent_size = 16;
3f764659 8143
51aecdc5
AM
8144 if (h != NULL
8145 && h->root.root.string[0] == '.')
8146 {
8c5b4e52
AM
8147 fdh = ((struct ppc_link_hash_entry *) h)->oh;
8148 if (fdh != NULL)
8149 {
8150 fdh = ppc_follow_link (fdh);
8151 if (fdh->elf.root.type != bfd_link_hash_defined
8152 && fdh->elf.root.type != bfd_link_hash_defweak)
8153 fdh = NULL;
8154 }
51aecdc5 8155 }
1e2f5b6e 8156
51aecdc5
AM
8157 skip = (sym_sec->owner != ibfd
8158 || sym_sec->output_section == bfd_abs_section_ptr);
8159 if (skip)
8160 {
8161 if (fdh != NULL && sym_sec->owner == ibfd)
a4aa0fb7 8162 {
51aecdc5
AM
8163 /* Arrange for the function descriptor sym
8164 to be dropped. */
8165 fdh->elf.root.u.def.value = 0;
8166 fdh->elf.root.u.def.section = sym_sec;
a4aa0fb7 8167 }
51aecdc5 8168 opd->adjust[OPD_NDX (rel->r_offset)] = -1;
1e2f5b6e 8169
0e1862bb 8170 if (NO_OPD_RELOCS || bfd_link_relocatable (info))
51aecdc5
AM
8171 rel = next_rel;
8172 else
8173 while (1)
8174 {
8175 if (!dec_dynrel_count (rel->r_info, sec, info,
8176 NULL, h, sym))
8177 goto error_ret;
754021d0 8178
51aecdc5
AM
8179 if (++rel == next_rel)
8180 break;
1e2f5b6e 8181
51aecdc5
AM
8182 r_symndx = ELF64_R_SYM (rel->r_info);
8183 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms,
8184 r_symndx, ibfd))
8185 goto error_ret;
8186 }
50bc7936
AM
8187 }
8188 else
1e2f5b6e 8189 {
51aecdc5
AM
8190 /* We'll be keeping this opd entry. */
8191 long adjust;
8192
8193 if (fdh != NULL)
8194 {
8195 /* Redefine the function descriptor symbol to
8196 this location in the opd section. It is
8197 necessary to update the value here rather
8198 than using an array of adjustments as we do
8199 for local symbols, because various places
8200 in the generic ELF code use the value
8201 stored in u.def.value. */
8202 fdh->elf.root.u.def.value = wptr - new_contents;
8203 fdh->adjust_done = 1;
8204 }
8205
8206 /* Local syms are a bit tricky. We could
8207 tweak them as they can be cached, but
8208 we'd need to look through the local syms
8209 for the function descriptor sym which we
8210 don't have at the moment. So keep an
8211 array of adjustments. */
8212 adjust = (wptr - new_contents) - (rptr - sec->contents);
8213 opd->adjust[OPD_NDX (rel->r_offset)] = adjust;
8214
8215 if (wptr != rptr)
8216 memcpy (wptr, rptr, opd_ent_size);
8217 wptr += opd_ent_size;
8218 if (add_aux_fields && opd_ent_size == 16)
8219 {
8220 memset (wptr, '\0', 8);
8221 wptr += 8;
8222 }
8223
50bc7936 8224 /* We need to adjust any reloc offsets to point to the
51aecdc5
AM
8225 new opd entries. */
8226 for ( ; rel != next_rel; ++rel)
8227 {
8228 rel->r_offset += adjust;
8229 if (write_rel != rel)
8230 memcpy (write_rel, rel, sizeof (*rel));
8231 ++write_rel;
8232 }
1e2f5b6e 8233 }
51aecdc5
AM
8234
8235 rptr += opd_ent_size;
1e2f5b6e
AM
8236 }
8237
3f764659 8238 sec->size = wptr - new_contents;
1e2f5b6e 8239 sec->reloc_count = write_rel - relstart;
3f764659
JJ
8240 if (add_aux_fields)
8241 {
8242 free (sec->contents);
8243 sec->contents = new_contents;
8244 }
8245
05bf9422 8246 /* Fudge the header size too, as this is used later in
cdcf6e38 8247 elf_bfd_final_link if we are emitting relocs. */
d4730f92
BS
8248 rel_hdr = _bfd_elf_single_rel_hdr (sec);
8249 rel_hdr->sh_size = sec->reloc_count * rel_hdr->sh_entsize;
754021d0 8250 some_edited = TRUE;
1e2f5b6e 8251 }
6cdc0ccc 8252 else if (elf_section_data (sec)->relocs != relstart)
1e2f5b6e 8253 free (relstart);
6cdc0ccc 8254
411e1bfb
AM
8255 if (local_syms != NULL
8256 && symtab_hdr->contents != (unsigned char *) local_syms)
8257 {
8258 if (!info->keep_memory)
8259 free (local_syms);
8260 else
8261 symtab_hdr->contents = (unsigned char *) local_syms;
8262 }
8263 }
8264
754021d0
AM
8265 if (some_edited)
8266 elf_link_hash_traverse (elf_hash_table (info), adjust_opd_syms, NULL);
8267
3f764659
JJ
8268 /* If we are doing a final link and the last .opd entry is just 16 byte
8269 long, add a 8 byte padding after it. */
0e1862bb 8270 if (need_pad != NULL && !bfd_link_relocatable (info))
3f764659
JJ
8271 {
8272 bfd_byte *p;
8273
8274 if ((need_pad->flags & SEC_IN_MEMORY) == 0)
8275 {
8276 BFD_ASSERT (need_pad->size > 0);
8277
8278 p = bfd_malloc (need_pad->size + 8);
8279 if (p == NULL)
8280 return FALSE;
699733f6 8281
3f764659
JJ
8282 if (! bfd_get_section_contents (need_pad->owner, need_pad,
8283 p, 0, need_pad->size))
8284 return FALSE;
8285
8286 need_pad->contents = p;
8287 need_pad->flags |= (SEC_IN_MEMORY | SEC_HAS_CONTENTS);
8288 }
8289 else
8290 {
8291 p = bfd_realloc (need_pad->contents, need_pad->size + 8);
8292 if (p == NULL)
8293 return FALSE;
8294
8295 need_pad->contents = p;
8296 }
8297
8298 memset (need_pad->contents + need_pad->size, 0, 8);
8299 need_pad->size += 8;
8300 }
8301
411e1bfb
AM
8302 return TRUE;
8303}
8304
3e04d765
AM
8305/* Analyze inline PLT call relocations to see whether calls to locally
8306 defined functions can be converted to direct calls. */
8307
8308bfd_boolean
8309ppc64_elf_inline_plt (struct bfd_link_info *info)
8310{
8311 struct ppc_link_hash_table *htab;
8312 bfd *ibfd;
8313 asection *sec;
8314 bfd_vma low_vma, high_vma, limit;
8315
8316 htab = ppc_hash_table (info);
8317 if (htab == NULL)
8318 return FALSE;
8319
8320 /* A bl insn can reach -0x2000000 to 0x1fffffc. The limit is
8321 reduced somewhat to cater for possible stubs that might be added
8322 between the call and its destination. */
8323 if (htab->params->group_size < 0)
8324 {
8325 limit = -htab->params->group_size;
8326 if (limit == 1)
8327 limit = 0x1e00000;
8328 }
8329 else
8330 {
8331 limit = htab->params->group_size;
8332 if (limit == 1)
8333 limit = 0x1c00000;
8334 }
8335
8336 low_vma = -1;
8337 high_vma = 0;
8338 for (sec = info->output_bfd->sections; sec != NULL; sec = sec->next)
8339 if ((sec->flags & (SEC_ALLOC | SEC_CODE)) == (SEC_ALLOC | SEC_CODE))
8340 {
8341 if (low_vma > sec->vma)
8342 low_vma = sec->vma;
8343 if (high_vma < sec->vma + sec->size)
8344 high_vma = sec->vma + sec->size;
8345 }
8346
8347 /* If a "bl" can reach anywhere in local code sections, then we can
8348 convert all inline PLT sequences to direct calls when the symbol
8349 is local. */
8350 if (high_vma - low_vma < limit)
8351 {
8352 htab->can_convert_all_inline_plt = 1;
8353 return TRUE;
8354 }
8355
8356 /* Otherwise, go looking through relocs for cases where a direct
8357 call won't reach. Mark the symbol on any such reloc to disable
8358 the optimization and keep the PLT entry as it seems likely that
8359 this will be better than creating trampolines. Note that this
8360 will disable the optimization for all inline PLT calls to a
8361 particular symbol, not just those that won't reach. The
8362 difficulty in doing a more precise optimization is that the
8363 linker needs to make a decision depending on whether a
8364 particular R_PPC64_PLTCALL insn can be turned into a direct
8365 call, for each of the R_PPC64_PLTSEQ and R_PPC64_PLT16* insns in
8366 the sequence, and there is nothing that ties those relocs
8367 together except their symbol. */
8368
8369 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
8370 {
8371 Elf_Internal_Shdr *symtab_hdr;
8372 Elf_Internal_Sym *local_syms;
8373
8374 if (!is_ppc64_elf (ibfd))
8375 continue;
8376
8377 local_syms = NULL;
8378 symtab_hdr = &elf_symtab_hdr (ibfd);
8379
8380 for (sec = ibfd->sections; sec != NULL; sec = sec->next)
8381 if (ppc64_elf_section_data (sec)->has_pltcall
8382 && !bfd_is_abs_section (sec->output_section))
8383 {
8384 Elf_Internal_Rela *relstart, *rel, *relend;
8385
8386 /* Read the relocations. */
8387 relstart = _bfd_elf_link_read_relocs (ibfd, sec, NULL, NULL,
8388 info->keep_memory);
8389 if (relstart == NULL)
8390 return FALSE;
8391
8392 relend = relstart + sec->reloc_count;
8393 for (rel = relstart; rel < relend; )
8394 {
8395 enum elf_ppc64_reloc_type r_type;
8396 unsigned long r_symndx;
8397 asection *sym_sec;
8398 struct elf_link_hash_entry *h;
8399 Elf_Internal_Sym *sym;
8400 unsigned char *tls_maskp;
8401
8402 r_type = ELF64_R_TYPE (rel->r_info);
8403 if (r_type != R_PPC64_PLTCALL)
8404 continue;
8405
8406 r_symndx = ELF64_R_SYM (rel->r_info);
8407 if (!get_sym_h (&h, &sym, &sym_sec, &tls_maskp, &local_syms,
8408 r_symndx, ibfd))
8409 {
8410 if (elf_section_data (sec)->relocs != relstart)
8411 free (relstart);
8412 if (local_syms != NULL
8413 && symtab_hdr->contents != (unsigned char *) local_syms)
8414 free (local_syms);
8415 return FALSE;
8416 }
8417
8418 if (sym_sec != NULL && sym_sec->output_section != NULL)
8419 {
8420 bfd_vma from, to;
8421 if (h != NULL)
8422 to = h->root.u.def.value;
8423 else
8424 to = sym->st_value;
8425 to += (rel->r_addend
8426 + sym_sec->output_offset
8427 + sym_sec->output_section->vma);
8428 from = (rel->r_offset
8429 + sec->output_offset
8430 + sec->output_section->vma);
8431 if (to - from + limit < 2 * limit)
8432 *tls_maskp &= ~PLT_KEEP;
8433 }
8434 }
8435 if (elf_section_data (sec)->relocs != relstart)
8436 free (relstart);
8437 }
8438
8439 if (local_syms != NULL
8440 && symtab_hdr->contents != (unsigned char *) local_syms)
8441 {
8442 if (!info->keep_memory)
8443 free (local_syms);
8444 else
8445 symtab_hdr->contents = (unsigned char *) local_syms;
8446 }
8447 }
8448
8449 return TRUE;
8450}
8451
e1918d23 8452/* Set htab->tls_get_addr and call the generic ELF tls_setup function. */
411e1bfb 8453
e1918d23 8454asection *
e7d1c40c 8455ppc64_elf_tls_setup (struct bfd_link_info *info)
411e1bfb 8456{
411e1bfb
AM
8457 struct ppc_link_hash_table *htab;
8458
411e1bfb 8459 htab = ppc_hash_table (info);
4dfe6ac6
NC
8460 if (htab == NULL)
8461 return NULL;
8462
ee67d69a
AM
8463 if (abiversion (info->output_bfd) == 1)
8464 htab->opd_abi = 1;
8465
e7d1c40c 8466 if (htab->params->no_multi_toc)
33c0ec9d
AM
8467 htab->do_multi_toc = 0;
8468 else if (!htab->do_multi_toc)
e7d1c40c 8469 htab->params->no_multi_toc = 1;
33c0ec9d 8470
8b5f1ed8
AM
8471 /* Default to --no-plt-localentry, as this option can cause problems
8472 with symbol interposition. For example, glibc libpthread.so and
8473 libc.so duplicate many pthread symbols, with a fallback
8474 implementation in libc.so. In some cases the fallback does more
8475 work than the pthread implementation. __pthread_condattr_destroy
8476 is one such symbol: the libpthread.so implementation is
8477 localentry:0 while the libc.so implementation is localentry:8.
8478 An app that "cleverly" uses dlopen to only load necessary
8479 libraries at runtime may omit loading libpthread.so when not
8480 running multi-threaded, which then results in the libc.so
8481 fallback symbols being used and ld.so complaining. Now there
8482 are workarounds in ld (see non_zero_localentry) to detect the
8483 pthread situation, but that may not be the only case where
8484 --plt-localentry can cause trouble. */
f378ab09 8485 if (htab->params->plt_localentry0 < 0)
8b5f1ed8 8486 htab->params->plt_localentry0 = 0;
d44c746a
AM
8487 if (htab->params->plt_localentry0
8488 && elf_link_hash_lookup (&htab->elf, "GLIBC_2.26",
8489 FALSE, FALSE, FALSE) == NULL)
cf97bcb0
AM
8490 _bfd_error_handler
8491 (_("warning: --plt-localentry is especially dangerous without "
8492 "ld.so support to detect ABI violations"));
f378ab09 8493
3a71aa26
AM
8494 htab->tls_get_addr = ((struct ppc_link_hash_entry *)
8495 elf_link_hash_lookup (&htab->elf, ".__tls_get_addr",
8496 FALSE, FALSE, TRUE));
a7f2871e
AM
8497 /* Move dynamic linking info to the function descriptor sym. */
8498 if (htab->tls_get_addr != NULL)
8499 func_desc_adjust (&htab->tls_get_addr->elf, info);
3a71aa26
AM
8500 htab->tls_get_addr_fd = ((struct ppc_link_hash_entry *)
8501 elf_link_hash_lookup (&htab->elf, "__tls_get_addr",
8502 FALSE, FALSE, TRUE));
7c9cf415 8503 if (htab->params->tls_get_addr_opt)
a7f2871e
AM
8504 {
8505 struct elf_link_hash_entry *opt, *opt_fd, *tga, *tga_fd;
8506
8507 opt = elf_link_hash_lookup (&htab->elf, ".__tls_get_addr_opt",
8508 FALSE, FALSE, TRUE);
8509 if (opt != NULL)
8510 func_desc_adjust (opt, info);
8511 opt_fd = elf_link_hash_lookup (&htab->elf, "__tls_get_addr_opt",
8512 FALSE, FALSE, TRUE);
8513 if (opt_fd != NULL
8514 && (opt_fd->root.type == bfd_link_hash_defined
8515 || opt_fd->root.type == bfd_link_hash_defweak))
8516 {
8517 /* If glibc supports an optimized __tls_get_addr call stub,
8518 signalled by the presence of __tls_get_addr_opt, and we'll
8519 be calling __tls_get_addr via a plt call stub, then
8520 make __tls_get_addr point to __tls_get_addr_opt. */
8521 tga_fd = &htab->tls_get_addr_fd->elf;
8522 if (htab->elf.dynamic_sections_created
8523 && tga_fd != NULL
8524 && (tga_fd->type == STT_FUNC
8525 || tga_fd->needs_plt)
8526 && !(SYMBOL_CALLS_LOCAL (info, tga_fd)
21d68fcd 8527 || UNDEFWEAK_NO_DYNAMIC_RELOC (info, tga_fd)))
a7f2871e
AM
8528 {
8529 struct plt_entry *ent;
8530
8531 for (ent = tga_fd->plt.plist; ent != NULL; ent = ent->next)
8532 if (ent->plt.refcount > 0)
8533 break;
8534 if (ent != NULL)
8535 {
8536 tga_fd->root.type = bfd_link_hash_indirect;
8537 tga_fd->root.u.i.link = &opt_fd->root;
8538 ppc64_elf_copy_indirect_symbol (info, opt_fd, tga_fd);
b531344c 8539 opt_fd->mark = 1;
a7f2871e
AM
8540 if (opt_fd->dynindx != -1)
8541 {
8542 /* Use __tls_get_addr_opt in dynamic relocations. */
8543 opt_fd->dynindx = -1;
8544 _bfd_elf_strtab_delref (elf_hash_table (info)->dynstr,
8545 opt_fd->dynstr_index);
8546 if (!bfd_elf_link_record_dynamic_symbol (info, opt_fd))
854b41e7 8547 return NULL;
a7f2871e
AM
8548 }
8549 htab->tls_get_addr_fd = (struct ppc_link_hash_entry *) opt_fd;
8550 tga = &htab->tls_get_addr->elf;
8551 if (opt != NULL && tga != NULL)
8552 {
8553 tga->root.type = bfd_link_hash_indirect;
8554 tga->root.u.i.link = &opt->root;
8555 ppc64_elf_copy_indirect_symbol (info, opt, tga);
b531344c 8556 opt->mark = 1;
a7f2871e
AM
8557 _bfd_elf_link_hash_hide_symbol (info, opt,
8558 tga->forced_local);
8559 htab->tls_get_addr = (struct ppc_link_hash_entry *) opt;
8560 }
8561 htab->tls_get_addr_fd->oh = htab->tls_get_addr;
8562 htab->tls_get_addr_fd->is_func_descriptor = 1;
8563 if (htab->tls_get_addr != NULL)
8564 {
8565 htab->tls_get_addr->oh = htab->tls_get_addr_fd;
8566 htab->tls_get_addr->is_func = 1;
8567 }
8568 }
8569 }
8570 }
7c9cf415
AM
8571 else if (htab->params->tls_get_addr_opt < 0)
8572 htab->params->tls_get_addr_opt = 0;
a7f2871e 8573 }
33c0ec9d 8574 return _bfd_elf_tls_setup (info->output_bfd, info);
3a71aa26 8575}
8387904d 8576
3a71aa26
AM
8577/* Return TRUE iff REL is a branch reloc with a global symbol matching
8578 HASH1 or HASH2. */
8387904d 8579
3a71aa26
AM
8580static bfd_boolean
8581branch_reloc_hash_match (const bfd *ibfd,
8582 const Elf_Internal_Rela *rel,
8583 const struct ppc_link_hash_entry *hash1,
8584 const struct ppc_link_hash_entry *hash2)
8585{
8586 Elf_Internal_Shdr *symtab_hdr = &elf_symtab_hdr (ibfd);
8587 enum elf_ppc64_reloc_type r_type = ELF64_R_TYPE (rel->r_info);
8588 unsigned int r_symndx = ELF64_R_SYM (rel->r_info);
8589
e054468f 8590 if (r_symndx >= symtab_hdr->sh_info && is_branch_reloc (r_type))
8387904d 8591 {
3a71aa26
AM
8592 struct elf_link_hash_entry **sym_hashes = elf_sym_hashes (ibfd);
8593 struct elf_link_hash_entry *h;
8387904d 8594
3a71aa26 8595 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
b31867b6 8596 h = elf_follow_link (h);
3a71aa26
AM
8597 if (h == &hash1->elf || h == &hash2->elf)
8598 return TRUE;
a48ebf4d 8599 }
3a71aa26 8600 return FALSE;
951fd09b 8601}
411e1bfb 8602
951fd09b
AM
8603/* Run through all the TLS relocs looking for optimization
8604 opportunities. The linker has been hacked (see ppc64elf.em) to do
8605 a preliminary section layout so that we know the TLS segment
8606 offsets. We can't optimize earlier because some optimizations need
8607 to know the tp offset, and we need to optimize before allocating
8608 dynamic relocations. */
8609
8610bfd_boolean
33c0ec9d 8611ppc64_elf_tls_optimize (struct bfd_link_info *info)
951fd09b
AM
8612{
8613 bfd *ibfd;
8614 asection *sec;
8615 struct ppc_link_hash_table *htab;
663a1470 8616 unsigned char *toc_ref;
102890f0 8617 int pass;
951fd09b 8618
3cbc1e5e 8619 if (!bfd_link_executable (info))
411e1bfb
AM
8620 return TRUE;
8621
951fd09b 8622 htab = ppc_hash_table (info);
4dfe6ac6
NC
8623 if (htab == NULL)
8624 return FALSE;
8625
663a1470
AM
8626 /* Make two passes over the relocs. On the first pass, mark toc
8627 entries involved with tls relocs, and check that tls relocs
8628 involved in setting up a tls_get_addr call are indeed followed by
8629 such a call. If they are not, we can't do any tls optimization.
8630 On the second pass twiddle tls_mask flags to notify
8631 relocate_section that optimization can be done, and adjust got
8632 and plt refcounts. */
8633 toc_ref = NULL;
8634 for (pass = 0; pass < 2; ++pass)
c72f2fb2 8635 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
663a1470
AM
8636 {
8637 Elf_Internal_Sym *locsyms = NULL;
8638 asection *toc = bfd_get_section_by_name (ibfd, ".toc");
8639
102890f0
AM
8640 for (sec = ibfd->sections; sec != NULL; sec = sec->next)
8641 if (sec->has_tls_reloc && !bfd_is_abs_section (sec->output_section))
8642 {
8643 Elf_Internal_Rela *relstart, *rel, *relend;
663a1470 8644 bfd_boolean found_tls_get_addr_arg = 0;
411e1bfb 8645
102890f0
AM
8646 /* Read the relocations. */
8647 relstart = _bfd_elf_link_read_relocs (ibfd, sec, NULL, NULL,
8648 info->keep_memory);
8649 if (relstart == NULL)
2915c55b
JK
8650 {
8651 free (toc_ref);
8652 return FALSE;
8653 }
411e1bfb 8654
102890f0
AM
8655 relend = relstart + sec->reloc_count;
8656 for (rel = relstart; rel < relend; rel++)
8657 {
8658 enum elf_ppc64_reloc_type r_type;
8659 unsigned long r_symndx;
8660 struct elf_link_hash_entry *h;
8661 Elf_Internal_Sym *sym;
8662 asection *sym_sec;
f961d9dd
AM
8663 unsigned char *tls_mask;
8664 unsigned char tls_set, tls_clear, tls_type = 0;
102890f0
AM
8665 bfd_vma value;
8666 bfd_boolean ok_tprel, is_local;
8667 long toc_ref_index = 0;
8668 int expecting_tls_get_addr = 0;
663a1470 8669 bfd_boolean ret = FALSE;
411e1bfb 8670
102890f0
AM
8671 r_symndx = ELF64_R_SYM (rel->r_info);
8672 if (!get_sym_h (&h, &sym, &sym_sec, &tls_mask, &locsyms,
8673 r_symndx, ibfd))
8674 {
8675 err_free_rel:
8676 if (elf_section_data (sec)->relocs != relstart)
8677 free (relstart);
8678 if (toc_ref != NULL)
8679 free (toc_ref);
8680 if (locsyms != NULL
0ffa91dd 8681 && (elf_symtab_hdr (ibfd).contents
102890f0
AM
8682 != (unsigned char *) locsyms))
8683 free (locsyms);
663a1470 8684 return ret;
102890f0 8685 }
411e1bfb 8686
102890f0
AM
8687 if (h != NULL)
8688 {
766bc656
AM
8689 if (h->root.type == bfd_link_hash_defined
8690 || h->root.type == bfd_link_hash_defweak)
8691 value = h->root.u.def.value;
8692 else if (h->root.type == bfd_link_hash_undefweak)
8693 value = 0;
8694 else
663a1470
AM
8695 {
8696 found_tls_get_addr_arg = 0;
8697 continue;
8698 }
102890f0
AM
8699 }
8700 else
8701 /* Symbols referenced by TLS relocs must be of type
8702 STT_TLS. So no need for .opd local sym adjust. */
8703 value = sym->st_value;
8704
8705 ok_tprel = FALSE;
8706 is_local = FALSE;
8707 if (h == NULL
8708 || !h->def_dynamic)
8709 {
8710 is_local = TRUE;
766bc656
AM
8711 if (h != NULL
8712 && h->root.type == bfd_link_hash_undefweak)
8713 ok_tprel = TRUE;
c27b8c2a
AM
8714 else if (sym_sec != NULL
8715 && sym_sec->output_section != NULL)
766bc656
AM
8716 {
8717 value += sym_sec->output_offset;
8718 value += sym_sec->output_section->vma;
8719 value -= htab->elf.tls_sec->vma;
8720 ok_tprel = (value + TP_OFFSET + ((bfd_vma) 1 << 31)
8721 < (bfd_vma) 1 << 32);
8722 }
102890f0 8723 }
951fd09b 8724
102890f0 8725 r_type = ELF64_R_TYPE (rel->r_info);
663a1470
AM
8726 /* If this section has old-style __tls_get_addr calls
8727 without marker relocs, then check that each
8728 __tls_get_addr call reloc is preceded by a reloc
8729 that conceivably belongs to the __tls_get_addr arg
8730 setup insn. If we don't find matching arg setup
8731 relocs, don't do any tls optimization. */
8732 if (pass == 0
8733 && sec->has_tls_get_addr_call
8734 && h != NULL
8735 && (h == &htab->tls_get_addr->elf
8736 || h == &htab->tls_get_addr_fd->elf)
8737 && !found_tls_get_addr_arg
8738 && is_branch_reloc (r_type))
8739 {
25f53a85 8740 info->callbacks->minfo (_("%H __tls_get_addr lost arg, "
663a1470
AM
8741 "TLS optimization disabled\n"),
8742 ibfd, sec, rel->r_offset);
8743 ret = TRUE;
8744 goto err_free_rel;
8745 }
8746
8747 found_tls_get_addr_arg = 0;
102890f0
AM
8748 switch (r_type)
8749 {
8750 case R_PPC64_GOT_TLSLD16:
8751 case R_PPC64_GOT_TLSLD16_LO:
8752 expecting_tls_get_addr = 1;
663a1470 8753 found_tls_get_addr_arg = 1;
1a0670f3 8754 /* Fall through. */
102890f0
AM
8755
8756 case R_PPC64_GOT_TLSLD16_HI:
8757 case R_PPC64_GOT_TLSLD16_HA:
8758 /* These relocs should never be against a symbol
8759 defined in a shared lib. Leave them alone if
8760 that turns out to be the case. */
8761 if (!is_local)
8762 continue;
411e1bfb 8763
102890f0 8764 /* LD -> LE */
411e1bfb 8765 tls_set = 0;
102890f0
AM
8766 tls_clear = TLS_LD;
8767 tls_type = TLS_TLS | TLS_LD;
8768 break;
411e1bfb 8769
102890f0
AM
8770 case R_PPC64_GOT_TLSGD16:
8771 case R_PPC64_GOT_TLSGD16_LO:
8772 expecting_tls_get_addr = 1;
663a1470 8773 found_tls_get_addr_arg = 1;
1a0670f3 8774 /* Fall through. */
102890f0
AM
8775
8776 case R_PPC64_GOT_TLSGD16_HI:
8777 case R_PPC64_GOT_TLSGD16_HA:
8778 if (ok_tprel)
8779 /* GD -> LE */
411e1bfb 8780 tls_set = 0;
102890f0
AM
8781 else
8782 /* GD -> IE */
8783 tls_set = TLS_TLS | TLS_TPRELGD;
8784 tls_clear = TLS_GD;
8785 tls_type = TLS_TLS | TLS_GD;
8786 break;
8787
8788 case R_PPC64_GOT_TPREL16_DS:
8789 case R_PPC64_GOT_TPREL16_LO_DS:
8790 case R_PPC64_GOT_TPREL16_HI:
8791 case R_PPC64_GOT_TPREL16_HA:
8792 if (ok_tprel)
8793 {
8794 /* IE -> LE */
8795 tls_set = 0;
8796 tls_clear = TLS_TPREL;
8797 tls_type = TLS_TLS | TLS_TPREL;
8798 break;
8799 }
411e1bfb
AM
8800 continue;
8801
727fc41e
AM
8802 case R_PPC64_TLSGD:
8803 case R_PPC64_TLSLD:
23cedd1d
AM
8804 if (rel + 1 < relend
8805 && is_plt_seq_reloc (ELF64_R_TYPE (rel[1].r_info)))
8806 {
8807 if (pass != 0
8808 && ELF64_R_TYPE (rel[1].r_info) != R_PPC64_PLTSEQ)
8809 {
8810 r_symndx = ELF64_R_SYM (rel[1].r_info);
8811 if (!get_sym_h (&h, NULL, NULL, NULL, &locsyms,
8812 r_symndx, ibfd))
8813 goto err_free_rel;
8814 if (h != NULL)
8815 {
8816 struct plt_entry *ent = NULL;
8817
8818 for (ent = h->plt.plist;
8819 ent != NULL;
8820 ent = ent->next)
8821 if (ent->addend == rel[1].r_addend)
8822 break;
8823
8824 if (ent != NULL
8825 && ent->plt.refcount > 0)
8826 ent->plt.refcount -= 1;
8827 }
8828 }
8829 continue;
8830 }
663a1470 8831 found_tls_get_addr_arg = 1;
1a0670f3 8832 /* Fall through. */
663a1470
AM
8833
8834 case R_PPC64_TLS:
8835 case R_PPC64_TOC16:
8836 case R_PPC64_TOC16_LO:
102890f0
AM
8837 if (sym_sec == NULL || sym_sec != toc)
8838 continue;
8839
8840 /* Mark this toc entry as referenced by a TLS
8841 code sequence. We can do that now in the
8842 case of R_PPC64_TLS, and after checking for
8843 tls_get_addr for the TOC16 relocs. */
8844 if (toc_ref == NULL)
663a1470
AM
8845 toc_ref = bfd_zmalloc (toc->output_section->rawsize / 8);
8846 if (toc_ref == NULL)
8847 goto err_free_rel;
8848
102890f0
AM
8849 if (h != NULL)
8850 value = h->root.u.def.value;
8851 else
8852 value = sym->st_value;
8853 value += rel->r_addend;
73242275
AM
8854 if (value % 8 != 0)
8855 continue;
8856 BFD_ASSERT (value < toc->size
8857 && toc->output_offset % 8 == 0);
663a1470 8858 toc_ref_index = (value + toc->output_offset) / 8;
727fc41e
AM
8859 if (r_type == R_PPC64_TLS
8860 || r_type == R_PPC64_TLSGD
8861 || r_type == R_PPC64_TLSLD)
102890f0
AM
8862 {
8863 toc_ref[toc_ref_index] = 1;
8864 continue;
8865 }
8866
8867 if (pass != 0 && toc_ref[toc_ref_index] == 0)
8868 continue;
8869
8870 tls_set = 0;
8871 tls_clear = 0;
8872 expecting_tls_get_addr = 2;
8873 break;
8874
8875 case R_PPC64_TPREL64:
8876 if (pass == 0
8877 || sec != toc
8878 || toc_ref == NULL
663a1470 8879 || !toc_ref[(rel->r_offset + toc->output_offset) / 8])
102890f0
AM
8880 continue;
8881 if (ok_tprel)
8882 {
8883 /* IE -> LE */
8884 tls_set = TLS_EXPLICIT;
8885 tls_clear = TLS_TPREL;
8886 break;
8887 }
8888 continue;
8889
8890 case R_PPC64_DTPMOD64:
8891 if (pass == 0
8892 || sec != toc
8893 || toc_ref == NULL
663a1470 8894 || !toc_ref[(rel->r_offset + toc->output_offset) / 8])
102890f0
AM
8895 continue;
8896 if (rel + 1 < relend
8897 && (rel[1].r_info
8898 == ELF64_R_INFO (r_symndx, R_PPC64_DTPREL64))
8899 && rel[1].r_offset == rel->r_offset + 8)
8900 {
8901 if (ok_tprel)
8902 /* GD -> LE */
8903 tls_set = TLS_EXPLICIT | TLS_GD;
8904 else
8905 /* GD -> IE */
8906 tls_set = TLS_EXPLICIT | TLS_GD | TLS_TPRELGD;
8907 tls_clear = TLS_GD;
8908 }
8909 else
8910 {
8911 if (!is_local)
8912 continue;
8913
8914 /* LD -> LE */
8915 tls_set = TLS_EXPLICIT;
8916 tls_clear = TLS_LD;
8917 }
8918 break;
8919
8920 default:
8921 continue;
8922 }
8923
8924 if (pass == 0)
8925 {
727fc41e
AM
8926 if (!expecting_tls_get_addr
8927 || !sec->has_tls_get_addr_call)
102890f0
AM
8928 continue;
8929
3a71aa26
AM
8930 if (rel + 1 < relend
8931 && branch_reloc_hash_match (ibfd, rel + 1,
8932 htab->tls_get_addr,
8933 htab->tls_get_addr_fd))
102890f0 8934 {
3a71aa26 8935 if (expecting_tls_get_addr == 2)
102890f0 8936 {
3a71aa26 8937 /* Check for toc tls entries. */
f961d9dd 8938 unsigned char *toc_tls;
3a71aa26
AM
8939 int retval;
8940
8941 retval = get_tls_mask (&toc_tls, NULL, NULL,
8942 &locsyms,
8943 rel, ibfd);
8944 if (retval == 0)
8945 goto err_free_rel;
663a1470
AM
8946 if (toc_tls != NULL)
8947 {
37da22e5
AM
8948 if ((*toc_tls & TLS_TLS) != 0
8949 && ((*toc_tls & (TLS_GD | TLS_LD)) != 0))
663a1470
AM
8950 found_tls_get_addr_arg = 1;
8951 if (retval > 1)
8952 toc_ref[toc_ref_index] = 1;
8953 }
102890f0 8954 }
3a71aa26 8955 continue;
102890f0
AM
8956 }
8957
102890f0
AM
8958 /* Uh oh, we didn't find the expected call. We
8959 could just mark this symbol to exclude it
8960 from tls optimization but it's safer to skip
663a1470 8961 the entire optimization. */
695344c0 8962 /* xgettext:c-format */
25f53a85 8963 info->callbacks->minfo (_("%H arg lost __tls_get_addr, "
663a1470
AM
8964 "TLS optimization disabled\n"),
8965 ibfd, sec, rel->r_offset);
8966 ret = TRUE;
8967 goto err_free_rel;
102890f0
AM
8968 }
8969
37da22e5
AM
8970 /* If we don't have old-style __tls_get_addr calls
8971 without TLSGD/TLSLD marker relocs, and we haven't
8972 found a new-style __tls_get_addr call with a
8973 marker for this symbol, then we either have a
8974 broken object file or an -mlongcall style
8975 indirect call to __tls_get_addr without a marker.
8976 Disable optimization in this case. */
8977 if ((tls_clear & (TLS_GD | TLS_LD)) != 0
8978 && (tls_set & TLS_EXPLICIT) == 0
8979 && !sec->has_tls_get_addr_call
8980 && ((*tls_mask & (TLS_TLS | TLS_MARK))
8981 != (TLS_TLS | TLS_MARK)))
8982 continue;
8983
23cedd1d 8984 if (expecting_tls_get_addr)
102890f0 8985 {
23cedd1d
AM
8986 struct plt_entry *ent = NULL;
8987
8988 if (htab->tls_get_addr != NULL)
8989 for (ent = htab->tls_get_addr->elf.plt.plist;
8990 ent != NULL;
8991 ent = ent->next)
8992 if (ent->addend == 0)
102890f0 8993 break;
411e1bfb 8994
23cedd1d
AM
8995 if (ent == NULL && htab->tls_get_addr_fd != NULL)
8996 for (ent = htab->tls_get_addr_fd->elf.plt.plist;
8997 ent != NULL;
8998 ent = ent->next)
8999 if (ent->addend == 0)
102890f0 9000 break;
23cedd1d
AM
9001
9002 if (ent != NULL
9003 && ent->plt.refcount > 0)
9004 ent->plt.refcount -= 1;
102890f0 9005 }
411e1bfb 9006
102890f0 9007 if (tls_clear == 0)
30038c59
AM
9008 continue;
9009
102890f0
AM
9010 if ((tls_set & TLS_EXPLICIT) == 0)
9011 {
9012 struct got_entry *ent;
411e1bfb 9013
102890f0
AM
9014 /* Adjust got entry for this reloc. */
9015 if (h != NULL)
9016 ent = h->got.glist;
9017 else
9018 ent = elf_local_got_ents (ibfd)[r_symndx];
411e1bfb 9019
102890f0
AM
9020 for (; ent != NULL; ent = ent->next)
9021 if (ent->addend == rel->r_addend
9022 && ent->owner == ibfd
9023 && ent->tls_type == tls_type)
9024 break;
9025 if (ent == NULL)
9026 abort ();
411e1bfb 9027
102890f0
AM
9028 if (tls_set == 0)
9029 {
9030 /* We managed to get rid of a got entry. */
9031 if (ent->got.refcount > 0)
9032 ent->got.refcount -= 1;
9033 }
9034 }
9035 else
9036 {
9037 /* If we got rid of a DTPMOD/DTPREL reloc pair then
9038 we'll lose one or two dyn relocs. */
9039 if (!dec_dynrel_count (rel->r_info, sec, info,
19e08130 9040 NULL, h, sym))
102890f0 9041 return FALSE;
411e1bfb 9042
102890f0
AM
9043 if (tls_set == (TLS_EXPLICIT | TLS_GD))
9044 {
9045 if (!dec_dynrel_count ((rel + 1)->r_info, sec, info,
19e08130 9046 NULL, h, sym))
102890f0
AM
9047 return FALSE;
9048 }
9049 }
411e1bfb 9050
102890f0
AM
9051 *tls_mask |= tls_set;
9052 *tls_mask &= ~tls_clear;
9053 }
8c1d1bb8 9054
102890f0
AM
9055 if (elf_section_data (sec)->relocs != relstart)
9056 free (relstart);
9057 }
411e1bfb 9058
663a1470
AM
9059 if (locsyms != NULL
9060 && (elf_symtab_hdr (ibfd).contents != (unsigned char *) locsyms))
9061 {
9062 if (!info->keep_memory)
9063 free (locsyms);
9064 else
9065 elf_symtab_hdr (ibfd).contents = (unsigned char *) locsyms;
9066 }
9067 }
411e1bfb 9068
663a1470
AM
9069 if (toc_ref != NULL)
9070 free (toc_ref);
9a23f96e 9071 htab->do_tls_opt = 1;
b34976b6 9072 return TRUE;
1e2f5b6e 9073}
b34976b6 9074
c5614fa4
AM
9075/* Called via elf_link_hash_traverse from ppc64_elf_edit_toc to adjust
9076 the values of any global symbols in a toc section that has been
9077 edited. Globals in toc sections should be a rarity, so this function
9078 sets a flag if any are found in toc sections other than the one just
de194d85 9079 edited, so that further hash table traversals can be avoided. */
c5614fa4
AM
9080
9081struct adjust_toc_info
9082{
9083 asection *toc;
9084 unsigned long *skip;
9085 bfd_boolean global_toc_syms;
9086};
9087
ba761f19
AM
9088enum toc_skip_enum { ref_from_discarded = 1, can_optimize = 2 };
9089
c5614fa4
AM
9090static bfd_boolean
9091adjust_toc_syms (struct elf_link_hash_entry *h, void *inf)
9092{
9093 struct ppc_link_hash_entry *eh;
9094 struct adjust_toc_info *toc_inf = (struct adjust_toc_info *) inf;
854b41e7 9095 unsigned long i;
c5614fa4 9096
c5614fa4
AM
9097 if (h->root.type != bfd_link_hash_defined
9098 && h->root.type != bfd_link_hash_defweak)
9099 return TRUE;
9100
9101 eh = (struct ppc_link_hash_entry *) h;
9102 if (eh->adjust_done)
9103 return TRUE;
9104
9105 if (eh->elf.root.u.def.section == toc_inf->toc)
9106 {
854b41e7
AM
9107 if (eh->elf.root.u.def.value > toc_inf->toc->rawsize)
9108 i = toc_inf->toc->rawsize >> 3;
c5614fa4 9109 else
854b41e7
AM
9110 i = eh->elf.root.u.def.value >> 3;
9111
ba761f19 9112 if ((toc_inf->skip[i] & (ref_from_discarded | can_optimize)) != 0)
c5614fa4 9113 {
4eca0228 9114 _bfd_error_handler
854b41e7
AM
9115 (_("%s defined on removed toc entry"), eh->elf.root.root.string);
9116 do
9117 ++i;
ba761f19 9118 while ((toc_inf->skip[i] & (ref_from_discarded | can_optimize)) != 0);
854b41e7 9119 eh->elf.root.u.def.value = (bfd_vma) i << 3;
c5614fa4 9120 }
854b41e7
AM
9121
9122 eh->elf.root.u.def.value -= toc_inf->skip[i];
c5614fa4
AM
9123 eh->adjust_done = 1;
9124 }
9125 else if (strcmp (eh->elf.root.u.def.section->name, ".toc") == 0)
9126 toc_inf->global_toc_syms = TRUE;
9127
9128 return TRUE;
9129}
9130
39eeab25
AM
9131/* Return TRUE iff INSN with a relocation of R_TYPE is one we expect
9132 on a _LO variety toc/got reloc. */
560c8763
AM
9133
9134static bfd_boolean
39eeab25 9135ok_lo_toc_insn (unsigned int insn, enum elf_ppc64_reloc_type r_type)
560c8763 9136{
39eeab25
AM
9137 return ((insn & (0x3f << 26)) == 12u << 26 /* addic */
9138 || (insn & (0x3f << 26)) == 14u << 26 /* addi */
560c8763
AM
9139 || (insn & (0x3f << 26)) == 32u << 26 /* lwz */
9140 || (insn & (0x3f << 26)) == 34u << 26 /* lbz */
9141 || (insn & (0x3f << 26)) == 36u << 26 /* stw */
9142 || (insn & (0x3f << 26)) == 38u << 26 /* stb */
9143 || (insn & (0x3f << 26)) == 40u << 26 /* lhz */
9144 || (insn & (0x3f << 26)) == 42u << 26 /* lha */
9145 || (insn & (0x3f << 26)) == 44u << 26 /* sth */
9146 || (insn & (0x3f << 26)) == 46u << 26 /* lmw */
9147 || (insn & (0x3f << 26)) == 47u << 26 /* stmw */
9148 || (insn & (0x3f << 26)) == 48u << 26 /* lfs */
9149 || (insn & (0x3f << 26)) == 50u << 26 /* lfd */
9150 || (insn & (0x3f << 26)) == 52u << 26 /* stfs */
9151 || (insn & (0x3f << 26)) == 54u << 26 /* stfd */
39eeab25
AM
9152 || (insn & (0x3f << 26)) == 56u << 26 /* lq,lfq */
9153 || ((insn & (0x3f << 26)) == 57u << 26 /* lxsd,lxssp,lfdp */
9154 /* Exclude lfqu by testing reloc. If relocs are ever
9155 defined for the reduced D field in psq_lu then those
9156 will need testing too. */
9157 && r_type != R_PPC64_TOC16_LO && r_type != R_PPC64_GOT16_LO)
9158 || ((insn & (0x3f << 26)) == 58u << 26 /* ld,lwa */
9159 && (insn & 1) == 0)
9160 || (insn & (0x3f << 26)) == 60u << 26 /* stfq */
9161 || ((insn & (0x3f << 26)) == 61u << 26 /* lxv,stx{v,sd,ssp},stfdp */
9162 /* Exclude stfqu. psq_stu as above for psq_lu. */
9163 && r_type != R_PPC64_TOC16_LO && r_type != R_PPC64_GOT16_LO)
9164 || ((insn & (0x3f << 26)) == 62u << 26 /* std,stq */
9165 && (insn & 1) == 0));
560c8763
AM
9166}
9167
c5614fa4
AM
9168/* Examine all relocs referencing .toc sections in order to remove
9169 unused .toc entries. */
9170
9171bfd_boolean
33c0ec9d 9172ppc64_elf_edit_toc (struct bfd_link_info *info)
c5614fa4
AM
9173{
9174 bfd *ibfd;
9175 struct adjust_toc_info toc_inf;
67f0cbdb 9176 struct ppc_link_hash_table *htab = ppc_hash_table (info);
c5614fa4 9177
67f0cbdb 9178 htab->do_toc_opt = 1;
c5614fa4 9179 toc_inf.global_toc_syms = TRUE;
c72f2fb2 9180 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
c5614fa4
AM
9181 {
9182 asection *toc, *sec;
9183 Elf_Internal_Shdr *symtab_hdr;
9184 Elf_Internal_Sym *local_syms;
425b145b 9185 Elf_Internal_Rela *relstart, *rel, *toc_relocs;
c5614fa4
AM
9186 unsigned long *skip, *drop;
9187 unsigned char *used;
9188 unsigned char *keep, last, some_unused;
9189
854b41e7
AM
9190 if (!is_ppc64_elf (ibfd))
9191 continue;
9192
c5614fa4
AM
9193 toc = bfd_get_section_by_name (ibfd, ".toc");
9194 if (toc == NULL
92b7a70f 9195 || toc->size == 0
dbaa2011
AM
9196 || toc->sec_info_type == SEC_INFO_TYPE_JUST_SYMS
9197 || discarded_section (toc))
c5614fa4
AM
9198 continue;
9199
425b145b 9200 toc_relocs = NULL;
c5614fa4 9201 local_syms = NULL;
0ffa91dd 9202 symtab_hdr = &elf_symtab_hdr (ibfd);
c5614fa4
AM
9203
9204 /* Look at sections dropped from the final link. */
9205 skip = NULL;
9206 relstart = NULL;
9207 for (sec = ibfd->sections; sec != NULL; sec = sec->next)
9208 {
9209 if (sec->reloc_count == 0
dbaa2011 9210 || !discarded_section (sec)
c5614fa4
AM
9211 || get_opd_info (sec)
9212 || (sec->flags & SEC_ALLOC) == 0
9213 || (sec->flags & SEC_DEBUGGING) != 0)
9214 continue;
9215
9216 relstart = _bfd_elf_link_read_relocs (ibfd, sec, NULL, NULL, FALSE);
9217 if (relstart == NULL)
9218 goto error_ret;
9219
9220 /* Run through the relocs to see which toc entries might be
9221 unused. */
9222 for (rel = relstart; rel < relstart + sec->reloc_count; ++rel)
9223 {
9224 enum elf_ppc64_reloc_type r_type;
9225 unsigned long r_symndx;
9226 asection *sym_sec;
9227 struct elf_link_hash_entry *h;
9228 Elf_Internal_Sym *sym;
9229 bfd_vma val;
9230
9231 r_type = ELF64_R_TYPE (rel->r_info);
9232 switch (r_type)
9233 {
9234 default:
9235 continue;
9236
9237 case R_PPC64_TOC16:
9238 case R_PPC64_TOC16_LO:
9239 case R_PPC64_TOC16_HI:
9240 case R_PPC64_TOC16_HA:
9241 case R_PPC64_TOC16_DS:
9242 case R_PPC64_TOC16_LO_DS:
9243 break;
9244 }
9245
9246 r_symndx = ELF64_R_SYM (rel->r_info);
9247 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms,
9248 r_symndx, ibfd))
9249 goto error_ret;
9250
9251 if (sym_sec != toc)
9252 continue;
9253
9254 if (h != NULL)
9255 val = h->root.u.def.value;
9256 else
9257 val = sym->st_value;
9258 val += rel->r_addend;
9259
9260 if (val >= toc->size)
9261 continue;
9262
9263 /* Anything in the toc ought to be aligned to 8 bytes.
9264 If not, don't mark as unused. */
9265 if (val & 7)
9266 continue;
9267
9268 if (skip == NULL)
9269 {
854b41e7 9270 skip = bfd_zmalloc (sizeof (*skip) * (toc->size + 15) / 8);
c5614fa4
AM
9271 if (skip == NULL)
9272 goto error_ret;
9273 }
9274
ba761f19 9275 skip[val >> 3] = ref_from_discarded;
c5614fa4
AM
9276 }
9277
9278 if (elf_section_data (sec)->relocs != relstart)
9279 free (relstart);
9280 }
9281
ba761f19
AM
9282 /* For largetoc loads of address constants, we can convert
9283 . addis rx,2,addr@got@ha
9284 . ld ry,addr@got@l(rx)
9285 to
9286 . addis rx,2,addr@toc@ha
9287 . addi ry,rx,addr@toc@l
9288 when addr is within 2G of the toc pointer. This then means
9289 that the word storing "addr" in the toc is no longer needed. */
68ffbac6 9290
ba761f19
AM
9291 if (!ppc64_elf_tdata (ibfd)->has_small_toc_reloc
9292 && toc->output_section->rawsize < (bfd_vma) 1 << 31
9293 && toc->reloc_count != 0)
9294 {
9295 /* Read toc relocs. */
425b145b
AM
9296 toc_relocs = _bfd_elf_link_read_relocs (ibfd, toc, NULL, NULL,
9297 info->keep_memory);
9298 if (toc_relocs == NULL)
ba761f19
AM
9299 goto error_ret;
9300
425b145b 9301 for (rel = toc_relocs; rel < toc_relocs + toc->reloc_count; ++rel)
ba761f19
AM
9302 {
9303 enum elf_ppc64_reloc_type r_type;
9304 unsigned long r_symndx;
9305 asection *sym_sec;
9306 struct elf_link_hash_entry *h;
9307 Elf_Internal_Sym *sym;
9308 bfd_vma val, addr;
9309
9310 r_type = ELF64_R_TYPE (rel->r_info);
9311 if (r_type != R_PPC64_ADDR64)
9312 continue;
9313
9314 r_symndx = ELF64_R_SYM (rel->r_info);
9315 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms,
9316 r_symndx, ibfd))
9317 goto error_ret;
9318
425b145b 9319 if (sym_sec == NULL
c27b8c2a 9320 || sym_sec->output_section == NULL
dbaa2011 9321 || discarded_section (sym_sec))
425b145b
AM
9322 continue;
9323
afe397ea 9324 if (!SYMBOL_REFERENCES_LOCAL (info, h))
ba761f19
AM
9325 continue;
9326
9327 if (h != NULL)
bddc25c9
AM
9328 {
9329 if (h->type == STT_GNU_IFUNC)
9330 continue;
9331 val = h->root.u.def.value;
9332 }
ba761f19 9333 else
bddc25c9
AM
9334 {
9335 if (ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC)
9336 continue;
9337 val = sym->st_value;
9338 }
ba761f19
AM
9339 val += rel->r_addend;
9340 val += sym_sec->output_section->vma + sym_sec->output_offset;
9341
9342 /* We don't yet know the exact toc pointer value, but we
9343 know it will be somewhere in the toc section. Don't
9344 optimize if the difference from any possible toc
9345 pointer is outside [ff..f80008000, 7fff7fff]. */
9346 addr = toc->output_section->vma + TOC_BASE_OFF;
9347 if (val - addr + (bfd_vma) 0x80008000 >= (bfd_vma) 1 << 32)
9348 continue;
9349
9350 addr = toc->output_section->vma + toc->output_section->rawsize;
9351 if (val - addr + (bfd_vma) 0x80008000 >= (bfd_vma) 1 << 32)
9352 continue;
9353
9354 if (skip == NULL)
9355 {
9356 skip = bfd_zmalloc (sizeof (*skip) * (toc->size + 15) / 8);
9357 if (skip == NULL)
9358 goto error_ret;
9359 }
9360
9361 skip[rel->r_offset >> 3]
425b145b 9362 |= can_optimize | ((rel - toc_relocs) << 2);
ba761f19 9363 }
ba761f19
AM
9364 }
9365
c5614fa4
AM
9366 if (skip == NULL)
9367 continue;
9368
9369 used = bfd_zmalloc (sizeof (*used) * (toc->size + 7) / 8);
9370 if (used == NULL)
9371 {
9372 error_ret:
9373 if (local_syms != NULL
9374 && symtab_hdr->contents != (unsigned char *) local_syms)
9375 free (local_syms);
9376 if (sec != NULL
9377 && relstart != NULL
9378 && elf_section_data (sec)->relocs != relstart)
9379 free (relstart);
425b145b
AM
9380 if (toc_relocs != NULL
9381 && elf_section_data (toc)->relocs != toc_relocs)
9382 free (toc_relocs);
c5614fa4
AM
9383 if (skip != NULL)
9384 free (skip);
9385 return FALSE;
9386 }
9387
30038c59
AM
9388 /* Now check all kept sections that might reference the toc.
9389 Check the toc itself last. */
9390 for (sec = (ibfd->sections == toc && toc->next ? toc->next
9391 : ibfd->sections);
c5614fa4 9392 sec != NULL;
c5614fa4 9393 sec = (sec == toc ? NULL
c5614fa4 9394 : sec->next == NULL ? toc
30038c59 9395 : sec->next == toc && toc->next ? toc->next
c5614fa4
AM
9396 : sec->next))
9397 {
9398 int repeat;
9399
9400 if (sec->reloc_count == 0
dbaa2011 9401 || discarded_section (sec)
c5614fa4
AM
9402 || get_opd_info (sec)
9403 || (sec->flags & SEC_ALLOC) == 0
9404 || (sec->flags & SEC_DEBUGGING) != 0)
9405 continue;
9406
854b41e7
AM
9407 relstart = _bfd_elf_link_read_relocs (ibfd, sec, NULL, NULL,
9408 info->keep_memory);
c5614fa4 9409 if (relstart == NULL)
2915c55b
JK
9410 {
9411 free (used);
9412 goto error_ret;
9413 }
c5614fa4
AM
9414
9415 /* Mark toc entries referenced as used. */
c5614fa4 9416 do
d4f1ee75
AM
9417 {
9418 repeat = 0;
9419 for (rel = relstart; rel < relstart + sec->reloc_count; ++rel)
9420 {
9421 enum elf_ppc64_reloc_type r_type;
9422 unsigned long r_symndx;
9423 asection *sym_sec;
9424 struct elf_link_hash_entry *h;
9425 Elf_Internal_Sym *sym;
9426 bfd_vma val;
9427 enum {no_check, check_lo, check_ha} insn_check;
98528052 9428
d4f1ee75
AM
9429 r_type = ELF64_R_TYPE (rel->r_info);
9430 switch (r_type)
9431 {
9432 default:
9433 insn_check = no_check;
9434 break;
98528052 9435
d4f1ee75
AM
9436 case R_PPC64_GOT_TLSLD16_HA:
9437 case R_PPC64_GOT_TLSGD16_HA:
9438 case R_PPC64_GOT_TPREL16_HA:
9439 case R_PPC64_GOT_DTPREL16_HA:
9440 case R_PPC64_GOT16_HA:
9441 case R_PPC64_TOC16_HA:
9442 insn_check = check_ha;
9443 break;
98528052 9444
d4f1ee75
AM
9445 case R_PPC64_GOT_TLSLD16_LO:
9446 case R_PPC64_GOT_TLSGD16_LO:
9447 case R_PPC64_GOT_TPREL16_LO_DS:
9448 case R_PPC64_GOT_DTPREL16_LO_DS:
9449 case R_PPC64_GOT16_LO:
9450 case R_PPC64_GOT16_LO_DS:
9451 case R_PPC64_TOC16_LO:
9452 case R_PPC64_TOC16_LO_DS:
9453 insn_check = check_lo;
9454 break;
9455 }
560c8763 9456
d4f1ee75
AM
9457 if (insn_check != no_check)
9458 {
9459 bfd_vma off = rel->r_offset & ~3;
9460 unsigned char buf[4];
9461 unsigned int insn;
c5614fa4 9462
d4f1ee75
AM
9463 if (!bfd_get_section_contents (ibfd, sec, buf, off, 4))
9464 {
9465 free (used);
9466 goto error_ret;
9467 }
9468 insn = bfd_get_32 (ibfd, buf);
9469 if (insn_check == check_lo
39eeab25 9470 ? !ok_lo_toc_insn (insn, r_type)
d4f1ee75
AM
9471 : ((insn & ((0x3f << 26) | 0x1f << 16))
9472 != ((15u << 26) | (2 << 16)) /* addis rt,2,imm */))
9473 {
9474 char str[12];
9475
9476 ppc64_elf_tdata (ibfd)->unexpected_toc_insn = 1;
9477 sprintf (str, "%#08x", insn);
9478 info->callbacks->einfo
695344c0 9479 /* xgettext:c-format */
174d0a74 9480 (_("%H: toc optimization is not supported for"
cf97bcb0 9481 " %s instruction\n"),
d4f1ee75
AM
9482 ibfd, sec, rel->r_offset & ~3, str);
9483 }
9484 }
c5614fa4 9485
d4f1ee75
AM
9486 switch (r_type)
9487 {
9488 case R_PPC64_TOC16:
9489 case R_PPC64_TOC16_LO:
9490 case R_PPC64_TOC16_HI:
9491 case R_PPC64_TOC16_HA:
9492 case R_PPC64_TOC16_DS:
9493 case R_PPC64_TOC16_LO_DS:
9494 /* In case we're taking addresses of toc entries. */
9495 case R_PPC64_ADDR64:
9496 break;
c5614fa4 9497
d4f1ee75
AM
9498 default:
9499 continue;
9500 }
c5614fa4 9501
d4f1ee75
AM
9502 r_symndx = ELF64_R_SYM (rel->r_info);
9503 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms,
9504 r_symndx, ibfd))
9505 {
9506 free (used);
9507 goto error_ret;
9508 }
c5614fa4 9509
d4f1ee75
AM
9510 if (sym_sec != toc)
9511 continue;
c5614fa4 9512
d4f1ee75
AM
9513 if (h != NULL)
9514 val = h->root.u.def.value;
9515 else
9516 val = sym->st_value;
9517 val += rel->r_addend;
ba761f19 9518
d4f1ee75
AM
9519 if (val >= toc->size)
9520 continue;
ba761f19 9521
d4f1ee75
AM
9522 if ((skip[val >> 3] & can_optimize) != 0)
9523 {
9524 bfd_vma off;
9525 unsigned char opc;
9526
9527 switch (r_type)
9528 {
9529 case R_PPC64_TOC16_HA:
ba761f19 9530 break;
ba761f19 9531
d4f1ee75
AM
9532 case R_PPC64_TOC16_LO_DS:
9533 off = rel->r_offset;
9534 off += (bfd_big_endian (ibfd) ? -2 : 3);
9535 if (!bfd_get_section_contents (ibfd, sec, &opc,
9536 off, 1))
9537 {
9538 free (used);
9539 goto error_ret;
9540 }
9541 if ((opc & (0x3f << 2)) == (58u << 2))
9542 break;
1a0670f3 9543 /* Fall through. */
ba761f19 9544
d4f1ee75
AM
9545 default:
9546 /* Wrong sort of reloc, or not a ld. We may
9547 as well clear ref_from_discarded too. */
9548 skip[val >> 3] = 0;
9549 }
9550 }
9551
9552 if (sec != toc)
9553 used[val >> 3] = 1;
9554 /* For the toc section, we only mark as used if this
9555 entry itself isn't unused. */
9556 else if ((used[rel->r_offset >> 3]
9557 || !(skip[rel->r_offset >> 3] & ref_from_discarded))
9558 && !used[val >> 3])
9559 {
9560 /* Do all the relocs again, to catch reference
9561 chains. */
9562 repeat = 1;
9563 used[val >> 3] = 1;
9564 }
9565 }
9566 }
c5614fa4 9567 while (repeat);
854b41e7
AM
9568
9569 if (elf_section_data (sec)->relocs != relstart)
9570 free (relstart);
c5614fa4
AM
9571 }
9572
9573 /* Merge the used and skip arrays. Assume that TOC
9574 doublewords not appearing as either used or unused belong
de194d85 9575 to an entry more than one doubleword in size. */
c5614fa4
AM
9576 for (drop = skip, keep = used, last = 0, some_unused = 0;
9577 drop < skip + (toc->size + 7) / 8;
9578 ++drop, ++keep)
9579 {
9580 if (*keep)
9581 {
ba761f19
AM
9582 *drop &= ~ref_from_discarded;
9583 if ((*drop & can_optimize) != 0)
9584 some_unused = 1;
c5614fa4
AM
9585 last = 0;
9586 }
b140b010 9587 else if ((*drop & ref_from_discarded) != 0)
c5614fa4
AM
9588 {
9589 some_unused = 1;
ba761f19 9590 last = ref_from_discarded;
c5614fa4
AM
9591 }
9592 else
9593 *drop = last;
9594 }
9595
9596 free (used);
9597
9598 if (some_unused)
9599 {
9600 bfd_byte *contents, *src;
9601 unsigned long off;
d62b3684 9602 Elf_Internal_Sym *sym;
ba761f19 9603 bfd_boolean local_toc_syms = FALSE;
c5614fa4
AM
9604
9605 /* Shuffle the toc contents, and at the same time convert the
9606 skip array from booleans into offsets. */
9607 if (!bfd_malloc_and_get_section (ibfd, toc, &contents))
9608 goto error_ret;
9609
9610 elf_section_data (toc)->this_hdr.contents = contents;
9611
9612 for (src = contents, off = 0, drop = skip;
9613 src < contents + toc->size;
9614 src += 8, ++drop)
9615 {
ba761f19
AM
9616 if ((*drop & (can_optimize | ref_from_discarded)) != 0)
9617 off += 8;
c5614fa4
AM
9618 else if (off != 0)
9619 {
9620 *drop = off;
9621 memcpy (src - off, src, 8);
9622 }
9623 }
854b41e7 9624 *drop = off;
c5614fa4
AM
9625 toc->rawsize = toc->size;
9626 toc->size = src - contents - off;
9627
ba761f19
AM
9628 /* Adjust addends for relocs against the toc section sym,
9629 and optimize any accesses we can. */
c5614fa4
AM
9630 for (sec = ibfd->sections; sec != NULL; sec = sec->next)
9631 {
9632 if (sec->reloc_count == 0
dbaa2011 9633 || discarded_section (sec))
c5614fa4
AM
9634 continue;
9635
9636 relstart = _bfd_elf_link_read_relocs (ibfd, sec, NULL, NULL,
854b41e7 9637 info->keep_memory);
c5614fa4
AM
9638 if (relstart == NULL)
9639 goto error_ret;
9640
9641 for (rel = relstart; rel < relstart + sec->reloc_count; ++rel)
9642 {
9643 enum elf_ppc64_reloc_type r_type;
9644 unsigned long r_symndx;
9645 asection *sym_sec;
9646 struct elf_link_hash_entry *h;
854b41e7 9647 bfd_vma val;
c5614fa4
AM
9648
9649 r_type = ELF64_R_TYPE (rel->r_info);
9650 switch (r_type)
9651 {
9652 default:
9653 continue;
9654
9655 case R_PPC64_TOC16:
9656 case R_PPC64_TOC16_LO:
9657 case R_PPC64_TOC16_HI:
9658 case R_PPC64_TOC16_HA:
9659 case R_PPC64_TOC16_DS:
9660 case R_PPC64_TOC16_LO_DS:
9661 case R_PPC64_ADDR64:
9662 break;
9663 }
9664
9665 r_symndx = ELF64_R_SYM (rel->r_info);
9666 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms,
9667 r_symndx, ibfd))
9668 goto error_ret;
9669
ba761f19 9670 if (sym_sec != toc)
c5614fa4
AM
9671 continue;
9672
ba761f19
AM
9673 if (h != NULL)
9674 val = h->root.u.def.value;
9675 else
9676 {
9677 val = sym->st_value;
9678 if (val != 0)
9679 local_toc_syms = TRUE;
9680 }
9681
9682 val += rel->r_addend;
854b41e7
AM
9683
9684 if (val > toc->rawsize)
9685 val = toc->rawsize;
ba761f19
AM
9686 else if ((skip[val >> 3] & ref_from_discarded) != 0)
9687 continue;
9688 else if ((skip[val >> 3] & can_optimize) != 0)
9689 {
9690 Elf_Internal_Rela *tocrel
425b145b 9691 = toc_relocs + (skip[val >> 3] >> 2);
ba761f19
AM
9692 unsigned long tsym = ELF64_R_SYM (tocrel->r_info);
9693
9694 switch (r_type)
9695 {
9696 case R_PPC64_TOC16_HA:
9697 rel->r_info = ELF64_R_INFO (tsym, R_PPC64_TOC16_HA);
9698 break;
9699
9700 case R_PPC64_TOC16_LO_DS:
9701 rel->r_info = ELF64_R_INFO (tsym, R_PPC64_LO_DS_OPT);
9702 break;
9703
9704 default:
28942f62
AM
9705 if (!ppc64_elf_howto_table[R_PPC64_ADDR32])
9706 ppc_howto_init ();
b140b010 9707 info->callbacks->einfo
695344c0 9708 /* xgettext:c-format */
174d0a74 9709 (_("%H: %s references "
b140b010
AM
9710 "optimized away TOC entry\n"),
9711 ibfd, sec, rel->r_offset,
9712 ppc64_elf_howto_table[r_type]->name);
9713 bfd_set_error (bfd_error_bad_value);
9714 goto error_ret;
ba761f19
AM
9715 }
9716 rel->r_addend = tocrel->r_addend;
9717 elf_section_data (sec)->relocs = relstart;
9718 continue;
9719 }
9720
9721 if (h != NULL || sym->st_value != 0)
9722 continue;
854b41e7
AM
9723
9724 rel->r_addend -= skip[val >> 3];
9725 elf_section_data (sec)->relocs = relstart;
c5614fa4 9726 }
854b41e7
AM
9727
9728 if (elf_section_data (sec)->relocs != relstart)
9729 free (relstart);
c5614fa4
AM
9730 }
9731
9732 /* We shouldn't have local or global symbols defined in the TOC,
9733 but handle them anyway. */
df22d223
AM
9734 if (local_syms != NULL)
9735 for (sym = local_syms;
9736 sym < local_syms + symtab_hdr->sh_info;
9737 ++sym)
9738 if (sym->st_value != 0
9739 && bfd_section_from_elf_index (ibfd, sym->st_shndx) == toc)
9740 {
9741 unsigned long i;
854b41e7 9742
df22d223
AM
9743 if (sym->st_value > toc->rawsize)
9744 i = toc->rawsize >> 3;
9745 else
9746 i = sym->st_value >> 3;
854b41e7 9747
df22d223
AM
9748 if ((skip[i] & (ref_from_discarded | can_optimize)) != 0)
9749 {
9750 if (local_toc_syms)
4eca0228 9751 _bfd_error_handler
df22d223
AM
9752 (_("%s defined on removed toc entry"),
9753 bfd_elf_sym_name (ibfd, symtab_hdr, sym, NULL));
9754 do
9755 ++i;
9756 while ((skip[i] & (ref_from_discarded | can_optimize)));
9757 sym->st_value = (bfd_vma) i << 3;
9758 }
d62b3684 9759
df22d223
AM
9760 sym->st_value -= skip[i];
9761 symtab_hdr->contents = (unsigned char *) local_syms;
9762 }
c5614fa4 9763
854b41e7 9764 /* Adjust any global syms defined in this toc input section. */
c5614fa4
AM
9765 if (toc_inf.global_toc_syms)
9766 {
9767 toc_inf.toc = toc;
9768 toc_inf.skip = skip;
9769 toc_inf.global_toc_syms = FALSE;
9770 elf_link_hash_traverse (elf_hash_table (info), adjust_toc_syms,
9771 &toc_inf);
9772 }
854b41e7
AM
9773
9774 if (toc->reloc_count != 0)
9775 {
d4730f92 9776 Elf_Internal_Shdr *rel_hdr;
854b41e7
AM
9777 Elf_Internal_Rela *wrel;
9778 bfd_size_type sz;
9779
854b41e7 9780 /* Remove unused toc relocs, and adjust those we keep. */
28be611c
AM
9781 if (toc_relocs == NULL)
9782 toc_relocs = _bfd_elf_link_read_relocs (ibfd, toc, NULL, NULL,
9783 info->keep_memory);
9784 if (toc_relocs == NULL)
9785 goto error_ret;
9786
425b145b
AM
9787 wrel = toc_relocs;
9788 for (rel = toc_relocs; rel < toc_relocs + toc->reloc_count; ++rel)
ba761f19
AM
9789 if ((skip[rel->r_offset >> 3]
9790 & (ref_from_discarded | can_optimize)) == 0)
854b41e7
AM
9791 {
9792 wrel->r_offset = rel->r_offset - skip[rel->r_offset >> 3];
9793 wrel->r_info = rel->r_info;
9794 wrel->r_addend = rel->r_addend;
9795 ++wrel;
9796 }
9797 else if (!dec_dynrel_count (rel->r_info, toc, info,
9798 &local_syms, NULL, NULL))
9799 goto error_ret;
9800
425b145b
AM
9801 elf_section_data (toc)->relocs = toc_relocs;
9802 toc->reloc_count = wrel - toc_relocs;
d4730f92
BS
9803 rel_hdr = _bfd_elf_single_rel_hdr (toc);
9804 sz = rel_hdr->sh_entsize;
9805 rel_hdr->sh_size = toc->reloc_count * sz;
854b41e7 9806 }
c5614fa4 9807 }
28be611c
AM
9808 else if (toc_relocs != NULL
9809 && elf_section_data (toc)->relocs != toc_relocs)
425b145b 9810 free (toc_relocs);
c5614fa4
AM
9811
9812 if (local_syms != NULL
9813 && symtab_hdr->contents != (unsigned char *) local_syms)
9814 {
9815 if (!info->keep_memory)
9816 free (local_syms);
9817 else
9818 symtab_hdr->contents = (unsigned char *) local_syms;
9819 }
9820 free (skip);
9821 }
9822
9823 return TRUE;
9824}
9825
1bbe0902
AM
9826/* Return true iff input section I references the TOC using
9827 instructions limited to +/-32k offsets. */
9828
9829bfd_boolean
9830ppc64_elf_has_small_toc_reloc (asection *i)
9831{
9832 return (is_ppc64_elf (i->owner)
9833 && ppc64_elf_tdata (i->owner)->has_small_toc_reloc);
9834}
9835
927be08e
AM
9836/* Allocate space for one GOT entry. */
9837
9838static void
9839allocate_got (struct elf_link_hash_entry *h,
9840 struct bfd_link_info *info,
9841 struct got_entry *gent)
9842{
9843 struct ppc_link_hash_table *htab = ppc_hash_table (info);
927be08e
AM
9844 struct ppc_link_hash_entry *eh = (struct ppc_link_hash_entry *) h;
9845 int entsize = (gent->tls_type & eh->tls_mask & (TLS_GD | TLS_LD)
9846 ? 16 : 8);
9847 int rentsize = (gent->tls_type & eh->tls_mask & TLS_GD
9848 ? 2 : 1) * sizeof (Elf64_External_Rela);
9849 asection *got = ppc64_elf_tdata (gent->owner)->got;
9850
9851 gent->got.offset = got->size;
9852 got->size += entsize;
9853
19e08130 9854 if (h->type == STT_GNU_IFUNC)
927be08e 9855 {
33e44f2e 9856 htab->elf.irelplt->size += rentsize;
19e08130 9857 htab->got_reli_size += rentsize;
927be08e 9858 }
f15d0b54
AM
9859 else if (((bfd_link_pic (info)
9860 && !((gent->tls_type & TLS_TPREL) != 0
9861 && bfd_link_executable (info)
9862 && SYMBOL_REFERENCES_LOCAL (info, h)))
f0158f44
AM
9863 || (htab->elf.dynamic_sections_created
9864 && h->dynindx != -1
9865 && !SYMBOL_REFERENCES_LOCAL (info, h)))
21d68fcd 9866 && !UNDEFWEAK_NO_DYNAMIC_RELOC (info, h))
927be08e 9867 {
19e08130 9868 asection *relgot = ppc64_elf_tdata (gent->owner)->relgot;
927be08e 9869 relgot->size += rentsize;
927be08e
AM
9870 }
9871}
9872
7865406b
AM
9873/* This function merges got entries in the same toc group. */
9874
9875static void
9876merge_got_entries (struct got_entry **pent)
9877{
9878 struct got_entry *ent, *ent2;
9879
9880 for (ent = *pent; ent != NULL; ent = ent->next)
9881 if (!ent->is_indirect)
9882 for (ent2 = ent->next; ent2 != NULL; ent2 = ent2->next)
9883 if (!ent2->is_indirect
9884 && ent2->addend == ent->addend
9885 && ent2->tls_type == ent->tls_type
9886 && elf_gp (ent2->owner) == elf_gp (ent->owner))
9887 {
9888 ent2->is_indirect = TRUE;
9889 ent2->got.ent = ent;
9890 }
9891}
9892
46434633 9893/* If H is undefined, make it dynamic if that makes sense. */
f0158f44
AM
9894
9895static bfd_boolean
46434633
AM
9896ensure_undef_dynamic (struct bfd_link_info *info,
9897 struct elf_link_hash_entry *h)
f0158f44
AM
9898{
9899 struct elf_link_hash_table *htab = elf_hash_table (info);
9900
9901 if (htab->dynamic_sections_created
46434633
AM
9902 && ((info->dynamic_undefined_weak != 0
9903 && h->root.type == bfd_link_hash_undefweak)
9904 || h->root.type == bfd_link_hash_undefined)
f0158f44
AM
9905 && h->dynindx == -1
9906 && !h->forced_local
9907 && ELF_ST_VISIBILITY (h->other) == STV_DEFAULT)
9908 return bfd_elf_link_record_dynamic_symbol (info, h);
9909 return TRUE;
9910}
9911
65f38f15
AM
9912/* Allocate space in .plt, .got and associated reloc sections for
9913 dynamic relocs. */
5bd4f169 9914
b34976b6 9915static bfd_boolean
4ce794b7 9916allocate_dynrelocs (struct elf_link_hash_entry *h, void *inf)
5bd4f169 9917{
65f38f15
AM
9918 struct bfd_link_info *info;
9919 struct ppc_link_hash_table *htab;
5bd4f169 9920 asection *s;
65f38f15 9921 struct ppc_link_hash_entry *eh;
0b8bcf0d 9922 struct got_entry **pgent, *gent;
5bd4f169 9923
e92d460e 9924 if (h->root.type == bfd_link_hash_indirect)
b34976b6 9925 return TRUE;
5bd4f169 9926
65f38f15
AM
9927 info = (struct bfd_link_info *) inf;
9928 htab = ppc_hash_table (info);
4dfe6ac6
NC
9929 if (htab == NULL)
9930 return FALSE;
5bd4f169 9931
951fd09b
AM
9932 eh = (struct ppc_link_hash_entry *) h;
9933 /* Run through the TLS GD got entries first if we're changing them
9934 to TPREL. */
37da22e5 9935 if ((eh->tls_mask & (TLS_TLS | TLS_TPRELGD)) == (TLS_TLS | TLS_TPRELGD))
951fd09b
AM
9936 for (gent = h->got.glist; gent != NULL; gent = gent->next)
9937 if (gent->got.refcount > 0
9938 && (gent->tls_type & TLS_GD) != 0)
9939 {
9940 /* This was a GD entry that has been converted to TPREL. If
9941 there happens to be a TPREL entry we can use that one. */
9942 struct got_entry *ent;
9943 for (ent = h->got.glist; ent != NULL; ent = ent->next)
9944 if (ent->got.refcount > 0
9945 && (ent->tls_type & TLS_TPREL) != 0
e717da7e
AM
9946 && ent->addend == gent->addend
9947 && ent->owner == gent->owner)
951fd09b
AM
9948 {
9949 gent->got.refcount = 0;
9950 break;
9951 }
9952
9953 /* If not, then we'll be using our own TPREL entry. */
9954 if (gent->got.refcount != 0)
9955 gent->tls_type = TLS_TLS | TLS_TPREL;
9956 }
9957
7865406b
AM
9958 /* Remove any list entry that won't generate a word in the GOT before
9959 we call merge_got_entries. Otherwise we risk merging to empty
9960 entries. */
0b8bcf0d
AM
9961 pgent = &h->got.glist;
9962 while ((gent = *pgent) != NULL)
411e1bfb 9963 if (gent->got.refcount > 0)
7865406b
AM
9964 {
9965 if ((gent->tls_type & TLS_LD) != 0
9966 && !h->def_dynamic)
9967 {
9968 ppc64_tlsld_got (gent->owner)->got.refcount += 1;
9969 *pgent = gent->next;
9970 }
9971 else
9972 pgent = &gent->next;
9973 }
9974 else
9975 *pgent = gent->next;
9976
9977 if (!htab->do_multi_toc)
9978 merge_got_entries (&h->got.glist);
9979
9980 for (gent = h->got.glist; gent != NULL; gent = gent->next)
9981 if (!gent->is_indirect)
411e1bfb 9982 {
46434633
AM
9983 /* Make sure this symbol is output as a dynamic symbol. */
9984 if (!ensure_undef_dynamic (info, h))
f0158f44 9985 return FALSE;
65f38f15 9986
0c8d6e5c 9987 if (!is_ppc64_elf (gent->owner))
927be08e 9988 abort ();
0ffa91dd 9989
927be08e 9990 allocate_got (h, info, gent);
411e1bfb 9991 }
65f38f15 9992
954b63d4
AM
9993 /* If no dynamic sections we can't have dynamic relocs, except for
9994 IFUNCs which are handled even in static executables. */
8a2058b5
AM
9995 if (!htab->elf.dynamic_sections_created
9996 && h->type != STT_GNU_IFUNC)
9997 eh->dyn_relocs = NULL;
9998
529fe20e
AM
9999 /* Discard relocs on undefined symbols that must be local. */
10000 else if (h->root.type == bfd_link_hash_undefined
10001 && ELF_ST_VISIBILITY (h->other) != STV_DEFAULT)
10002 eh->dyn_relocs = NULL;
10003
954b63d4
AM
10004 /* Also discard relocs on undefined weak syms with non-default
10005 visibility, or when dynamic_undefined_weak says so. */
21d68fcd 10006 else if (UNDEFWEAK_NO_DYNAMIC_RELOC (info, h))
954b63d4
AM
10007 eh->dyn_relocs = NULL;
10008
8a2058b5 10009 if (eh->dyn_relocs != NULL)
65f38f15 10010 {
8a2058b5
AM
10011 struct elf_dyn_relocs *p, **pp;
10012
57e7d118
AM
10013 /* In the shared -Bsymbolic case, discard space allocated for
10014 dynamic pc-relative relocs against symbols which turn out to
10015 be defined in regular objects. For the normal shared case,
10016 discard space for relocs that have become local due to symbol
10017 visibility changes. */
10018
10019 if (bfd_link_pic (info))
65f38f15 10020 {
57e7d118
AM
10021 /* Relocs that use pc_count are those that appear on a call
10022 insn, or certain REL relocs (see must_be_dyn_reloc) that
10023 can be generated via assembly. We want calls to
10024 protected symbols to resolve directly to the function
10025 rather than going via the plt. If people want function
10026 pointer comparisons to work as expected then they should
10027 avoid writing weird assembly. */
10028 if (SYMBOL_CALLS_LOCAL (info, h))
10029 {
57e7d118
AM
10030 for (pp = &eh->dyn_relocs; (p = *pp) != NULL; )
10031 {
10032 p->count -= p->pc_count;
10033 p->pc_count = 0;
10034 if (p->count == 0)
10035 *pp = p->next;
10036 else
10037 pp = &p->next;
10038 }
10039 }
65f38f15 10040
954b63d4 10041 if (eh->dyn_relocs != NULL)
5bd4f169 10042 {
46434633
AM
10043 /* Make sure this symbol is output as a dynamic symbol. */
10044 if (!ensure_undef_dynamic (info, h))
f0158f44 10045 return FALSE;
5bd4f169 10046 }
65f38f15 10047 }
529fe20e 10048 else if (ELIMINATE_COPY_RELOCS && h->type != STT_GNU_IFUNC)
57e7d118 10049 {
8a2058b5 10050 /* For the non-pic case, discard space for relocs against
57e7d118
AM
10051 symbols which turn out to need copy relocs or are not
10052 dynamic. */
529fe20e
AM
10053 if (h->dynamic_adjusted
10054 && !h->def_regular
10055 && !ELF_COMMON_DEF_P (h))
f0158f44 10056 {
46434633
AM
10057 /* Make sure this symbol is output as a dynamic symbol. */
10058 if (!ensure_undef_dynamic (info, h))
f0158f44 10059 return FALSE;
dfbb6ac9 10060
f0158f44
AM
10061 if (h->dynindx == -1)
10062 eh->dyn_relocs = NULL;
10063 }
10064 else
8a2058b5 10065 eh->dyn_relocs = NULL;
57e7d118
AM
10066 }
10067
10068 /* Finally, allocate space. */
10069 for (p = eh->dyn_relocs; p != NULL; p = p->next)
10070 {
10071 asection *sreloc = elf_section_data (p->sec)->sreloc;
10072 if (eh->elf.type == STT_GNU_IFUNC)
10073 sreloc = htab->elf.irelplt;
10074 sreloc->size += p->count * sizeof (Elf64_External_Rela);
dfbb6ac9 10075 }
65f38f15 10076 }
57e7d118 10077
2d7ad24e
AM
10078 /* We might need a PLT entry when the symbol
10079 a) is dynamic, or
10080 b) is an ifunc, or
10081 c) has plt16 relocs and has been processed by adjust_dynamic_symbol, or
10082 d) has plt16 relocs and we are linking statically. */
10083 if ((htab->elf.dynamic_sections_created && h->dynindx != -1)
10084 || h->type == STT_GNU_IFUNC
10085 || (h->needs_plt && h->dynamic_adjusted)
10086 || (h->needs_plt
10087 && h->def_regular
10088 && !htab->elf.dynamic_sections_created
3e04d765 10089 && !htab->can_convert_all_inline_plt
2d7ad24e
AM
10090 && (((struct ppc_link_hash_entry *) h)->tls_mask
10091 & (TLS_TLS | PLT_KEEP)) == PLT_KEEP))
65f38f15 10092 {
57e7d118
AM
10093 struct plt_entry *pent;
10094 bfd_boolean doneone = FALSE;
10095 for (pent = h->plt.plist; pent != NULL; pent = pent->next)
10096 if (pent->plt.refcount > 0)
10097 {
10098 if (!htab->elf.dynamic_sections_created
10099 || h->dynindx == -1)
10100 {
2d7ad24e
AM
10101 if (h->type == STT_GNU_IFUNC)
10102 {
10103 s = htab->elf.iplt;
10104 pent->plt.offset = s->size;
10105 s->size += PLT_ENTRY_SIZE (htab);
10106 s = htab->elf.irelplt;
10107 }
10108 else
10109 {
10110 s = htab->pltlocal;
10111 pent->plt.offset = s->size;
10112 s->size += LOCAL_PLT_ENTRY_SIZE (htab);
10113 s = bfd_link_pic (info) ? htab->relpltlocal : NULL;
10114 }
57e7d118
AM
10115 }
10116 else
10117 {
10118 /* If this is the first .plt entry, make room for the special
10119 first entry. */
10120 s = htab->elf.splt;
10121 if (s->size == 0)
10122 s->size += PLT_INITIAL_ENTRY_SIZE (htab);
65f38f15 10123
57e7d118 10124 pent->plt.offset = s->size;
65f38f15 10125
57e7d118
AM
10126 /* Make room for this entry. */
10127 s->size += PLT_ENTRY_SIZE (htab);
65f38f15 10128
57e7d118
AM
10129 /* Make room for the .glink code. */
10130 s = htab->glink;
10131 if (s->size == 0)
9e390558 10132 s->size += GLINK_PLTRESOLVE_SIZE (htab);
57e7d118
AM
10133 if (htab->opd_abi)
10134 {
10135 /* We need bigger stubs past index 32767. */
9e390558 10136 if (s->size >= GLINK_PLTRESOLVE_SIZE (htab) + 32768*2*4)
57e7d118
AM
10137 s->size += 4;
10138 s->size += 2*4;
10139 }
10140 else
10141 s->size += 4;
65f38f15 10142
57e7d118
AM
10143 /* We also need to make an entry in the .rela.plt section. */
10144 s = htab->elf.srelplt;
10145 }
2d7ad24e
AM
10146 if (s != NULL)
10147 s->size += sizeof (Elf64_External_Rela);
57e7d118
AM
10148 doneone = TRUE;
10149 }
10150 else
10151 pent->plt.offset = (bfd_vma) -1;
10152 if (!doneone)
10153 {
10154 h->plt.plist = NULL;
10155 h->needs_plt = 0;
10156 }
65f38f15 10157 }
57e7d118 10158 else
65f38f15 10159 {
57e7d118
AM
10160 h->plt.plist = NULL;
10161 h->needs_plt = 0;
65f38f15
AM
10162 }
10163
b34976b6 10164 return TRUE;
65f38f15
AM
10165}
10166
9e390558
AM
10167#define PPC_LO(v) ((v) & 0xffff)
10168#define PPC_HI(v) (((v) >> 16) & 0xffff)
10169#define PPC_HA(v) PPC_HI ((v) + 0x8000)
10170
a345bc8d
AM
10171/* Called via elf_link_hash_traverse from ppc64_elf_size_dynamic_sections
10172 to set up space for global entry stubs. These are put in glink,
10173 after the branch table. */
65f38f15 10174
b34976b6 10175static bfd_boolean
a345bc8d 10176size_global_entry_stubs (struct elf_link_hash_entry *h, void *inf)
65f38f15 10177{
a345bc8d
AM
10178 struct bfd_link_info *info;
10179 struct ppc_link_hash_table *htab;
10180 struct plt_entry *pent;
9e390558 10181 asection *s, *plt;
65f38f15 10182
a345bc8d
AM
10183 if (h->root.type == bfd_link_hash_indirect)
10184 return TRUE;
65f38f15 10185
a345bc8d
AM
10186 if (!h->pointer_equality_needed)
10187 return TRUE;
65f38f15 10188
a345bc8d
AM
10189 if (h->def_regular)
10190 return TRUE;
65f38f15 10191
a345bc8d
AM
10192 info = inf;
10193 htab = ppc_hash_table (info);
10194 if (htab == NULL)
10195 return FALSE;
10196
9e390558
AM
10197 s = htab->global_entry;
10198 plt = htab->elf.splt;
a345bc8d
AM
10199 for (pent = h->plt.plist; pent != NULL; pent = pent->next)
10200 if (pent->plt.offset != (bfd_vma) -1
10201 && pent->addend == 0)
10202 {
afe397ea
AM
10203 /* For ELFv2, if this symbol is not defined in a regular file
10204 and we are not generating a shared library or pie, then we
10205 need to define the symbol in the executable on a call stub.
10206 This is to avoid text relocations. */
9e390558
AM
10207 bfd_vma off, stub_align, stub_off, stub_size;
10208 unsigned int align_power;
10209
10210 stub_size = 16;
10211 stub_off = s->size;
10212 if (htab->params->plt_stub_align >= 0)
10213 align_power = htab->params->plt_stub_align;
10214 else
10215 align_power = -htab->params->plt_stub_align;
10216 /* Setting section alignment is delayed until we know it is
10217 non-empty. Otherwise the .text output section will be
10218 aligned at least to plt_stub_align even when no global
10219 entry stubs are needed. */
10220 if (s->alignment_power < align_power)
10221 s->alignment_power = align_power;
10222 stub_align = (bfd_vma) 1 << align_power;
10223 if (htab->params->plt_stub_align >= 0
10224 || ((((stub_off + stub_size - 1) & -stub_align)
10225 - (stub_off & -stub_align))
10226 > ((stub_size - 1) & -stub_align)))
10227 stub_off = (stub_off + stub_align - 1) & -stub_align;
10228 off = pent->plt.offset + plt->output_offset + plt->output_section->vma;
10229 off -= stub_off + s->output_offset + s->output_section->vma;
10230 /* Note that for --plt-stub-align negative we have a possible
10231 dependency between stub offset and size. Break that
10232 dependency by assuming the max stub size when calculating
10233 the stub offset. */
10234 if (PPC_HA (off) == 0)
10235 stub_size -= 4;
8a2058b5 10236 h->root.type = bfd_link_hash_defined;
afe397ea 10237 h->root.u.def.section = s;
9e390558
AM
10238 h->root.u.def.value = stub_off;
10239 s->size = stub_off + stub_size;
a345bc8d
AM
10240 break;
10241 }
10242 return TRUE;
10243}
10244
10245/* Set DF_TEXTREL if we find any dynamic relocs that apply to
10246 read-only sections. */
10247
10248static bfd_boolean
98bbb1b8 10249maybe_set_textrel (struct elf_link_hash_entry *h, void *inf)
a345bc8d 10250{
98bbb1b8
AM
10251 asection *sec;
10252
a345bc8d
AM
10253 if (h->root.type == bfd_link_hash_indirect)
10254 return TRUE;
10255
98bbb1b8
AM
10256 sec = readonly_dynrelocs (h);
10257 if (sec != NULL)
a345bc8d 10258 {
98bbb1b8
AM
10259 struct bfd_link_info *info = (struct bfd_link_info *) inf;
10260
10261 info->flags |= DF_TEXTREL;
10262 info->callbacks->minfo
c1c8c1ef 10263 (_("%pB: dynamic relocation against `%pT' in read-only section `%pA'\n"),
63c1f59d 10264 sec->owner, h->root.root.string, sec);
a345bc8d
AM
10265
10266 /* Not an error, just cut short the traversal. */
10267 return FALSE;
65f38f15 10268 }
b34976b6 10269 return TRUE;
65f38f15
AM
10270}
10271
10272/* Set the sizes of the dynamic sections. */
10273
b34976b6 10274static bfd_boolean
ee67d69a 10275ppc64_elf_size_dynamic_sections (bfd *output_bfd,
4ce794b7 10276 struct bfd_link_info *info)
65f38f15
AM
10277{
10278 struct ppc_link_hash_table *htab;
10279 bfd *dynobj;
10280 asection *s;
b34976b6 10281 bfd_boolean relocs;
65f38f15 10282 bfd *ibfd;
7865406b 10283 struct got_entry *first_tlsld;
65f38f15
AM
10284
10285 htab = ppc_hash_table (info);
4dfe6ac6
NC
10286 if (htab == NULL)
10287 return FALSE;
10288
65f38f15
AM
10289 dynobj = htab->elf.dynobj;
10290 if (dynobj == NULL)
10291 abort ();
10292
10293 if (htab->elf.dynamic_sections_created)
10294 {
10295 /* Set the contents of the .interp section to the interpreter. */
9b8b325a 10296 if (bfd_link_executable (info) && !info->nointerp)
65f38f15 10297 {
3d4d4302 10298 s = bfd_get_linker_section (dynobj, ".interp");
65f38f15
AM
10299 if (s == NULL)
10300 abort ();
eea6121a 10301 s->size = sizeof ELF_DYNAMIC_INTERPRETER;
65f38f15
AM
10302 s->contents = (unsigned char *) ELF_DYNAMIC_INTERPRETER;
10303 }
10304 }
10305
10306 /* Set up .got offsets for local syms, and space for local dynamic
10307 relocs. */
c72f2fb2 10308 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
65f38f15 10309 {
411e1bfb
AM
10310 struct got_entry **lgot_ents;
10311 struct got_entry **end_lgot_ents;
e054468f
AM
10312 struct plt_entry **local_plt;
10313 struct plt_entry **end_local_plt;
f961d9dd 10314 unsigned char *lgot_masks;
65f38f15
AM
10315 bfd_size_type locsymcount;
10316 Elf_Internal_Shdr *symtab_hdr;
65f38f15 10317
0c8d6e5c 10318 if (!is_ppc64_elf (ibfd))
65f38f15
AM
10319 continue;
10320
10321 for (s = ibfd->sections; s != NULL; s = s->next)
10322 {
19e08130 10323 struct ppc_dyn_relocs *p;
65f38f15 10324
6edfbbad 10325 for (p = elf_section_data (s)->local_dynrel; p != NULL; p = p->next)
65f38f15 10326 {
ec338859
AM
10327 if (!bfd_is_abs_section (p->sec)
10328 && bfd_is_abs_section (p->sec->output_section))
10329 {
10330 /* Input section has been discarded, either because
10331 it is a copy of a linkonce section or due to
10332 linker script /DISCARD/, so we'll be discarding
10333 the relocs too. */
10334 }
248866a8 10335 else if (p->count != 0)
ec338859 10336 {
19e08130
AM
10337 asection *srel = elf_section_data (p->sec)->sreloc;
10338 if (p->ifunc)
33e44f2e 10339 srel = htab->elf.irelplt;
eea6121a 10340 srel->size += p->count * sizeof (Elf64_External_Rela);
248866a8
AM
10341 if ((p->sec->output_section->flags & SEC_READONLY) != 0)
10342 info->flags |= DF_TEXTREL;
ec338859 10343 }
65f38f15
AM
10344 }
10345 }
10346
411e1bfb
AM
10347 lgot_ents = elf_local_got_ents (ibfd);
10348 if (!lgot_ents)
65f38f15
AM
10349 continue;
10350
0ffa91dd 10351 symtab_hdr = &elf_symtab_hdr (ibfd);
65f38f15 10352 locsymcount = symtab_hdr->sh_info;
411e1bfb 10353 end_lgot_ents = lgot_ents + locsymcount;
e054468f
AM
10354 local_plt = (struct plt_entry **) end_lgot_ents;
10355 end_local_plt = local_plt + locsymcount;
f961d9dd 10356 lgot_masks = (unsigned char *) end_local_plt;
e717da7e 10357 s = ppc64_elf_tdata (ibfd)->got;
e7b938ca 10358 for (; lgot_ents < end_lgot_ents; ++lgot_ents, ++lgot_masks)
65f38f15 10359 {
0b8bcf0d 10360 struct got_entry **pent, *ent;
411e1bfb 10361
0b8bcf0d
AM
10362 pent = lgot_ents;
10363 while ((ent = *pent) != NULL)
411e1bfb
AM
10364 if (ent->got.refcount > 0)
10365 {
e7b938ca 10366 if ((ent->tls_type & *lgot_masks & TLS_LD) != 0)
411e1bfb 10367 {
927be08e 10368 ppc64_tlsld_got (ibfd)->got.refcount += 1;
0b8bcf0d 10369 *pent = ent->next;
411e1bfb
AM
10370 }
10371 else
10372 {
19e08130
AM
10373 unsigned int ent_size = 8;
10374 unsigned int rel_size = sizeof (Elf64_External_Rela);
10375
eea6121a 10376 ent->got.offset = s->size;
e7b938ca 10377 if ((ent->tls_type & *lgot_masks & TLS_GD) != 0)
927be08e 10378 {
19e08130
AM
10379 ent_size *= 2;
10380 rel_size *= 2;
10381 }
10382 s->size += ent_size;
37da22e5 10383 if ((*lgot_masks & (TLS_TLS | PLT_IFUNC)) == PLT_IFUNC)
19e08130 10384 {
33e44f2e 10385 htab->elf.irelplt->size += rel_size;
19e08130
AM
10386 htab->got_reli_size += rel_size;
10387 }
f15d0b54
AM
10388 else if (bfd_link_pic (info)
10389 && !((ent->tls_type & TLS_TPREL) != 0
10390 && bfd_link_executable (info)))
19e08130
AM
10391 {
10392 asection *srel = ppc64_elf_tdata (ibfd)->relgot;
10393 srel->size += rel_size;
927be08e 10394 }
0b8bcf0d 10395 pent = &ent->next;
411e1bfb
AM
10396 }
10397 }
10398 else
0b8bcf0d 10399 *pent = ent->next;
65f38f15 10400 }
e054468f 10401
2d7ad24e
AM
10402 /* Allocate space for plt calls to local syms. */
10403 lgot_masks = (unsigned char *) end_local_plt;
10404 for (; local_plt < end_local_plt; ++local_plt, ++lgot_masks)
e054468f
AM
10405 {
10406 struct plt_entry *ent;
10407
10408 for (ent = *local_plt; ent != NULL; ent = ent->next)
10409 if (ent->plt.refcount > 0)
10410 {
2d7ad24e
AM
10411 if ((*lgot_masks & (TLS_TLS | PLT_IFUNC)) == PLT_IFUNC)
10412 {
10413 s = htab->elf.iplt;
10414 ent->plt.offset = s->size;
10415 s->size += PLT_ENTRY_SIZE (htab);
10416 htab->elf.irelplt->size += sizeof (Elf64_External_Rela);
10417 }
3e04d765
AM
10418 else if (htab->can_convert_all_inline_plt
10419 || (*lgot_masks & (TLS_TLS | PLT_KEEP)) != PLT_KEEP)
2d7ad24e
AM
10420 ent->plt.offset = (bfd_vma) -1;
10421 else
10422 {
10423 s = htab->pltlocal;
10424 ent->plt.offset = s->size;
10425 s->size += LOCAL_PLT_ENTRY_SIZE (htab);
10426 if (bfd_link_pic (info))
10427 htab->relpltlocal->size += sizeof (Elf64_External_Rela);
10428 }
e054468f
AM
10429 }
10430 else
10431 ent->plt.offset = (bfd_vma) -1;
10432 }
65f38f15
AM
10433 }
10434
10435 /* Allocate global sym .plt and .got entries, and space for global
10436 sym dynamic relocs. */
4ce794b7 10437 elf_link_hash_traverse (&htab->elf, allocate_dynrelocs, info);
a345bc8d 10438
0e1862bb 10439 if (!htab->opd_abi && !bfd_link_pic (info))
a345bc8d 10440 elf_link_hash_traverse (&htab->elf, size_global_entry_stubs, info);
65f38f15 10441
7865406b 10442 first_tlsld = NULL;
c72f2fb2 10443 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
102890f0 10444 {
7865406b
AM
10445 struct got_entry *ent;
10446
0c8d6e5c 10447 if (!is_ppc64_elf (ibfd))
102890f0
AM
10448 continue;
10449
7865406b
AM
10450 ent = ppc64_tlsld_got (ibfd);
10451 if (ent->got.refcount > 0)
102890f0 10452 {
7865406b 10453 if (!htab->do_multi_toc && first_tlsld != NULL)
102890f0 10454 {
7865406b
AM
10455 ent->is_indirect = TRUE;
10456 ent->got.ent = first_tlsld;
10457 }
10458 else
10459 {
10460 if (first_tlsld == NULL)
10461 first_tlsld = ent;
10462 s = ppc64_elf_tdata (ibfd)->got;
10463 ent->got.offset = s->size;
10464 ent->owner = ibfd;
10465 s->size += 16;
0e1862bb 10466 if (bfd_link_pic (info))
7865406b
AM
10467 {
10468 asection *srel = ppc64_elf_tdata (ibfd)->relgot;
10469 srel->size += sizeof (Elf64_External_Rela);
10470 }
102890f0
AM
10471 }
10472 }
10473 else
7865406b 10474 ent->got.offset = (bfd_vma) -1;
102890f0
AM
10475 }
10476
65f38f15
AM
10477 /* We now have determined the sizes of the various dynamic sections.
10478 Allocate memory for them. */
b34976b6 10479 relocs = FALSE;
65f38f15
AM
10480 for (s = dynobj->sections; s != NULL; s = s->next)
10481 {
10482 if ((s->flags & SEC_LINKER_CREATED) == 0)
10483 continue;
10484
4ce794b7 10485 if (s == htab->brlt || s == htab->relbrlt)
721956f4
AM
10486 /* These haven't been allocated yet; don't strip. */
10487 continue;
33e44f2e
AM
10488 else if (s == htab->elf.sgot
10489 || s == htab->elf.splt
10490 || s == htab->elf.iplt
2d7ad24e 10491 || s == htab->pltlocal
c456f082 10492 || s == htab->glink
9e390558 10493 || s == htab->global_entry
5474d94f
AM
10494 || s == htab->elf.sdynbss
10495 || s == htab->elf.sdynrelro)
65f38f15
AM
10496 {
10497 /* Strip this section if we don't need it; see the
10498 comment below. */
5bd4f169 10499 }
58d180e8
AM
10500 else if (s == htab->glink_eh_frame)
10501 {
10502 if (!bfd_is_abs_section (s->output_section))
10503 /* Not sized yet. */
10504 continue;
10505 }
70cc837d 10506 else if (CONST_STRNEQ (s->name, ".rela"))
5bd4f169 10507 {
c456f082 10508 if (s->size != 0)
5bd4f169 10509 {
33e44f2e 10510 if (s != htab->elf.srelplt)
b34976b6 10511 relocs = TRUE;
5bd4f169
AM
10512
10513 /* We use the reloc_count field as a counter if we need
10514 to copy relocs into the output file. */
10515 s->reloc_count = 0;
10516 }
10517 }
65f38f15 10518 else
5bd4f169
AM
10519 {
10520 /* It's not one of our sections, so don't allocate space. */
10521 continue;
10522 }
10523
eea6121a 10524 if (s->size == 0)
5bd4f169 10525 {
c456f082
AM
10526 /* If we don't need this section, strip it from the
10527 output file. This is mostly to handle .rela.bss and
10528 .rela.plt. We must create both sections in
10529 create_dynamic_sections, because they must be created
10530 before the linker maps input sections to output
10531 sections. The linker does that before
10532 adjust_dynamic_symbol is called, and it is that
10533 function which decides whether anything needs to go
10534 into these sections. */
8423293d 10535 s->flags |= SEC_EXCLUDE;
5bd4f169
AM
10536 continue;
10537 }
10538
06bcf541
AM
10539 if (bfd_is_abs_section (s->output_section))
10540 _bfd_error_handler (_("warning: discarding dynamic section %s"),
10541 s->name);
10542
c456f082 10543 if ((s->flags & SEC_HAS_CONTENTS) == 0)
5f333394
AM
10544 continue;
10545
65f38f15
AM
10546 /* Allocate memory for the section contents. We use bfd_zalloc
10547 here in case unused entries are not reclaimed before the
10548 section's contents are written out. This should not happen,
411e1bfb
AM
10549 but this way if it does we get a R_PPC64_NONE reloc in .rela
10550 sections instead of garbage.
10551 We also rely on the section contents being zero when writing
5474d94f 10552 the GOT and .dynrelro. */
eea6121a 10553 s->contents = bfd_zalloc (dynobj, s->size);
65f38f15 10554 if (s->contents == NULL)
b34976b6 10555 return FALSE;
5bd4f169
AM
10556 }
10557
c72f2fb2 10558 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
e717da7e 10559 {
0c8d6e5c 10560 if (!is_ppc64_elf (ibfd))
7b53ace3
AM
10561 continue;
10562
e717da7e 10563 s = ppc64_elf_tdata (ibfd)->got;
33e44f2e 10564 if (s != NULL && s != htab->elf.sgot)
e717da7e 10565 {
eea6121a 10566 if (s->size == 0)
8423293d 10567 s->flags |= SEC_EXCLUDE;
e717da7e
AM
10568 else
10569 {
eea6121a 10570 s->contents = bfd_zalloc (ibfd, s->size);
e717da7e
AM
10571 if (s->contents == NULL)
10572 return FALSE;
10573 }
10574 }
10575 s = ppc64_elf_tdata (ibfd)->relgot;
10576 if (s != NULL)
10577 {
eea6121a 10578 if (s->size == 0)
8423293d 10579 s->flags |= SEC_EXCLUDE;
e717da7e
AM
10580 else
10581 {
eea6121a 10582 s->contents = bfd_zalloc (ibfd, s->size);
e717da7e
AM
10583 if (s->contents == NULL)
10584 return FALSE;
10585 relocs = TRUE;
10586 s->reloc_count = 0;
10587 }
10588 }
10589 }
10590
e86ce104 10591 if (htab->elf.dynamic_sections_created)
5bd4f169 10592 {
e8910a83
AM
10593 bfd_boolean tls_opt;
10594
5bd4f169
AM
10595 /* Add some entries to the .dynamic section. We fill in the
10596 values later, in ppc64_elf_finish_dynamic_sections, but we
10597 must add the entries now so that we get the correct size for
10598 the .dynamic section. The DT_DEBUG entry is filled in by the
10599 dynamic linker and used by the debugger. */
dc810e39 10600#define add_dynamic_entry(TAG, VAL) \
5a580b3a 10601 _bfd_elf_add_dynamic_entry (info, TAG, VAL)
dc810e39 10602
0e1862bb 10603 if (bfd_link_executable (info))
5bd4f169 10604 {
dc810e39 10605 if (!add_dynamic_entry (DT_DEBUG, 0))
b34976b6 10606 return FALSE;
5bd4f169
AM
10607 }
10608
33e44f2e 10609 if (htab->elf.splt != NULL && htab->elf.splt->size != 0)
5bd4f169 10610 {
dc810e39
AM
10611 if (!add_dynamic_entry (DT_PLTGOT, 0)
10612 || !add_dynamic_entry (DT_PLTRELSZ, 0)
10613 || !add_dynamic_entry (DT_PLTREL, DT_RELA)
5d1634d7
AM
10614 || !add_dynamic_entry (DT_JMPREL, 0)
10615 || !add_dynamic_entry (DT_PPC64_GLINK, 0))
b34976b6 10616 return FALSE;
5bd4f169
AM
10617 }
10618
ee67d69a 10619 if (NO_OPD_RELOCS && abiversion (output_bfd) <= 1)
19397422
AM
10620 {
10621 if (!add_dynamic_entry (DT_PPC64_OPD, 0)
10622 || !add_dynamic_entry (DT_PPC64_OPDSZ, 0))
b34976b6 10623 return FALSE;
19397422
AM
10624 }
10625
7c9cf415 10626 tls_opt = (htab->params->tls_get_addr_opt
e8910a83
AM
10627 && htab->tls_get_addr_fd != NULL
10628 && htab->tls_get_addr_fd->elf.plt.plist != NULL);
10629 if (tls_opt || !htab->opd_abi)
10630 {
10631 if (!add_dynamic_entry (DT_PPC64_OPT, tls_opt ? PPC64_OPT_TLS : 0))
10632 return FALSE;
10633 }
a7f2871e 10634
5bd4f169
AM
10635 if (relocs)
10636 {
dc810e39
AM
10637 if (!add_dynamic_entry (DT_RELA, 0)
10638 || !add_dynamic_entry (DT_RELASZ, 0)
10639 || !add_dynamic_entry (DT_RELAENT, sizeof (Elf64_External_Rela)))
b34976b6 10640 return FALSE;
5bd4f169 10641
65f38f15
AM
10642 /* If any dynamic relocs apply to a read-only section,
10643 then we need a DT_TEXTREL entry. */
248866a8 10644 if ((info->flags & DF_TEXTREL) == 0)
a345bc8d 10645 elf_link_hash_traverse (&htab->elf, maybe_set_textrel, info);
5bd4f169 10646
65f38f15 10647 if ((info->flags & DF_TEXTREL) != 0)
5bd4f169 10648 {
65f38f15 10649 if (!add_dynamic_entry (DT_TEXTREL, 0))
b34976b6 10650 return FALSE;
5bd4f169 10651 }
5bd4f169 10652 }
5bd4f169 10653 }
65f38f15 10654#undef add_dynamic_entry
5bd4f169 10655
b34976b6 10656 return TRUE;
5bd4f169
AM
10657}
10658
a345bc8d
AM
10659/* Return TRUE if symbol should be hashed in the `.gnu.hash' section. */
10660
10661static bfd_boolean
10662ppc64_elf_hash_symbol (struct elf_link_hash_entry *h)
10663{
10664 if (h->plt.plist != NULL
10665 && !h->def_regular
10666 && !h->pointer_equality_needed)
10667 return FALSE;
10668
10669 return _bfd_elf_hash_symbol (h);
10670}
10671
721956f4 10672/* Determine the type of stub needed, if any, for a call. */
5bd4f169 10673
4ce794b7
AM
10674static inline enum ppc_stub_type
10675ppc_type_of_stub (asection *input_sec,
10676 const Elf_Internal_Rela *rel,
10677 struct ppc_link_hash_entry **hash,
e054468f 10678 struct plt_entry **plt_ent,
6911b7dc
AM
10679 bfd_vma destination,
10680 unsigned long local_off)
5bd4f169 10681{
721956f4
AM
10682 struct ppc_link_hash_entry *h = *hash;
10683 bfd_vma location;
10684 bfd_vma branch_offset;
10685 bfd_vma max_branch_offset;
4ce794b7 10686 enum elf_ppc64_reloc_type r_type;
5bd4f169 10687
721956f4
AM
10688 if (h != NULL)
10689 {
e054468f 10690 struct plt_entry *ent;
7fe2b9a6 10691 struct ppc_link_hash_entry *fdh = h;
b31867b6
AM
10692 if (h->oh != NULL
10693 && h->oh->is_func_descriptor)
7b8f6675
AM
10694 {
10695 fdh = ppc_follow_link (h->oh);
10696 *hash = fdh;
10697 }
8387904d 10698
e054468f
AM
10699 for (ent = fdh->elf.plt.plist; ent != NULL; ent = ent->next)
10700 if (ent->addend == rel->r_addend
10701 && ent->plt.offset != (bfd_vma) -1)
10702 {
e054468f
AM
10703 *plt_ent = ent;
10704 return ppc_stub_plt_call;
10705 }
5bd4f169 10706
7fe2b9a6
AM
10707 /* Here, we know we don't have a plt entry. If we don't have a
10708 either a defined function descriptor or a defined entry symbol
10709 in a regular object file, then it is pointless trying to make
10710 any other type of stub. */
854b41e7
AM
10711 if (!is_static_defined (&fdh->elf)
10712 && !is_static_defined (&h->elf))
721956f4 10713 return ppc_stub_none;
5d1634d7 10714 }
e054468f
AM
10715 else if (elf_local_got_ents (input_sec->owner) != NULL)
10716 {
10717 Elf_Internal_Shdr *symtab_hdr = &elf_symtab_hdr (input_sec->owner);
10718 struct plt_entry **local_plt = (struct plt_entry **)
10719 elf_local_got_ents (input_sec->owner) + symtab_hdr->sh_info;
10720 unsigned long r_symndx = ELF64_R_SYM (rel->r_info);
10721
10722 if (local_plt[r_symndx] != NULL)
10723 {
10724 struct plt_entry *ent;
10725
10726 for (ent = local_plt[r_symndx]; ent != NULL; ent = ent->next)
10727 if (ent->addend == rel->r_addend
10728 && ent->plt.offset != (bfd_vma) -1)
10729 {
10730 *plt_ent = ent;
10731 return ppc_stub_plt_call;
10732 }
10733 }
10734 }
5d1634d7 10735
721956f4
AM
10736 /* Determine where the call point is. */
10737 location = (input_sec->output_offset
10738 + input_sec->output_section->vma
10739 + rel->r_offset);
5d1634d7 10740
721956f4
AM
10741 branch_offset = destination - location;
10742 r_type = ELF64_R_TYPE (rel->r_info);
5d1634d7 10743
721956f4
AM
10744 /* Determine if a long branch stub is needed. */
10745 max_branch_offset = 1 << 25;
23cedd1d
AM
10746 if (r_type == R_PPC64_REL14
10747 || r_type == R_PPC64_REL14_BRTAKEN
10748 || r_type == R_PPC64_REL14_BRNTAKEN)
721956f4 10749 max_branch_offset = 1 << 15;
5d1634d7 10750
6911b7dc 10751 if (branch_offset + max_branch_offset >= 2 * max_branch_offset - local_off)
721956f4
AM
10752 /* We need a stub. Figure out whether a long_branch or plt_branch
10753 is needed later. */
10754 return ppc_stub_long_branch;
5d1634d7 10755
721956f4 10756 return ppc_stub_none;
5d1634d7
AM
10757}
10758
794e51c0
AM
10759/* With power7 weakly ordered memory model, it is possible for ld.so
10760 to update a plt entry in one thread and have another thread see a
10761 stale zero toc entry. To avoid this we need some sort of acquire
10762 barrier in the call stub. One solution is to make the load of the
10763 toc word seem to appear to depend on the load of the function entry
10764 word. Another solution is to test for r2 being zero, and branch to
10765 the appropriate glink entry if so.
10766
10767 . fake dep barrier compare
71a39c98
AM
10768 . ld 12,xxx(2) ld 12,xxx(2)
10769 . mtctr 12 mtctr 12
10770 . xor 11,12,12 ld 2,xxx+8(2)
794e51c0
AM
10771 . add 2,2,11 cmpldi 2,0
10772 . ld 2,xxx+8(2) bnectr+
10773 . bctr b <glink_entry>
10774
10775 The solution involving the compare turns out to be faster, so
10776 that's what we use unless the branch won't reach. */
10777
10778#define ALWAYS_USE_FAKE_DEP 0
10779#define ALWAYS_EMIT_R2SAVE 0
5d1634d7 10780
794e51c0
AM
10781static inline unsigned int
10782plt_stub_size (struct ppc_link_hash_table *htab,
10783 struct ppc_stub_hash_entry *stub_entry,
10784 bfd_vma off)
10785{
b9e5796b
AM
10786 unsigned size = 12;
10787
10788 if (ALWAYS_EMIT_R2SAVE
10789 || stub_entry->stub_type == ppc_stub_plt_call_r2save)
10790 size += 4;
10791 if (PPC_HA (off) != 0)
794e51c0 10792 size += 4;
b9e5796b
AM
10793 if (htab->opd_abi)
10794 {
10795 size += 4;
e7d1c40c 10796 if (htab->params->plt_static_chain)
b9e5796b 10797 size += 4;
bd4d2eaa
AM
10798 if (htab->params->plt_thread_safe
10799 && htab->elf.dynamic_sections_created
10800 && stub_entry->h != NULL
10801 && stub_entry->h->elf.dynindx != -1)
b9e5796b 10802 size += 8;
e7d1c40c 10803 if (PPC_HA (off + 8 + 8 * htab->params->plt_static_chain) != PPC_HA (off))
b9e5796b
AM
10804 size += 4;
10805 }
794e51c0
AM
10806 if (stub_entry->h != NULL
10807 && (stub_entry->h == htab->tls_get_addr_fd
10808 || stub_entry->h == htab->tls_get_addr)
7c9cf415 10809 && htab->params->tls_get_addr_opt)
f378ab09
AM
10810 {
10811 size += 7 * 4;
10812 if (ALWAYS_EMIT_R2SAVE
10813 || stub_entry->stub_type == ppc_stub_plt_call_r2save)
407aa07c 10814 size += 6 * 4;
f378ab09 10815 }
794e51c0
AM
10816 return size;
10817}
10818
2420fff6
AM
10819/* Depending on the sign of plt_stub_align:
10820 If positive, return the padding to align to a 2**plt_stub_align
10821 boundary.
10822 If negative, if this stub would cross fewer 2**plt_stub_align
10823 boundaries if we align, then return the padding needed to do so. */
10824
794e51c0
AM
10825static inline unsigned int
10826plt_stub_pad (struct ppc_link_hash_table *htab,
10827 struct ppc_stub_hash_entry *stub_entry,
10828 bfd_vma plt_off)
10829{
2420fff6 10830 int stub_align;
794e51c0 10831 unsigned stub_size = plt_stub_size (htab, stub_entry, plt_off);
6f20ed8a 10832 bfd_vma stub_off = stub_entry->group->stub_sec->size;
794e51c0 10833
2420fff6
AM
10834 if (htab->params->plt_stub_align >= 0)
10835 {
10836 stub_align = 1 << htab->params->plt_stub_align;
10837 if ((stub_off & (stub_align - 1)) != 0)
10838 return stub_align - (stub_off & (stub_align - 1));
10839 return 0;
10840 }
10841
10842 stub_align = 1 << -htab->params->plt_stub_align;
794e51c0 10843 if (((stub_off + stub_size - 1) & -stub_align) - (stub_off & -stub_align)
e05fa0ba 10844 > ((stub_size - 1) & -stub_align))
794e51c0
AM
10845 return stub_align - (stub_off & (stub_align - 1));
10846 return 0;
10847}
10848
10849/* Build a .plt call stub. */
10850
10851static inline bfd_byte *
10852build_plt_stub (struct ppc_link_hash_table *htab,
10853 struct ppc_stub_hash_entry *stub_entry,
10854 bfd_byte *p, bfd_vma offset, Elf_Internal_Rela *r)
10855{
e7d1c40c 10856 bfd *obfd = htab->params->stub_bfd;
b9e5796b 10857 bfd_boolean plt_load_toc = htab->opd_abi;
e7d1c40c 10858 bfd_boolean plt_static_chain = htab->params->plt_static_chain;
bd4d2eaa
AM
10859 bfd_boolean plt_thread_safe = (htab->params->plt_thread_safe
10860 && htab->elf.dynamic_sections_created
10861 && stub_entry->h != NULL
10862 && stub_entry->h->elf.dynindx != -1);
794e51c0
AM
10863 bfd_boolean use_fake_dep = plt_thread_safe;
10864 bfd_vma cmp_branch_off = 0;
10865
10866 if (!ALWAYS_USE_FAKE_DEP
b9e5796b 10867 && plt_load_toc
794e51c0 10868 && plt_thread_safe
bd4d2eaa
AM
10869 && !((stub_entry->h == htab->tls_get_addr_fd
10870 || stub_entry->h == htab->tls_get_addr)
7c9cf415 10871 && htab->params->tls_get_addr_opt))
794e51c0
AM
10872 {
10873 bfd_vma pltoff = stub_entry->plt_ent->plt.offset & ~1;
b9e5796b
AM
10874 bfd_vma pltindex = ((pltoff - PLT_INITIAL_ENTRY_SIZE (htab))
10875 / PLT_ENTRY_SIZE (htab));
9e390558 10876 bfd_vma glinkoff = GLINK_PLTRESOLVE_SIZE (htab) + pltindex * 8;
794e51c0
AM
10877 bfd_vma to, from;
10878
68d62958
AM
10879 if (pltindex > 32768)
10880 glinkoff += (pltindex - 32768) * 4;
794e51c0
AM
10881 to = (glinkoff
10882 + htab->glink->output_offset
10883 + htab->glink->output_section->vma);
6f20ed8a 10884 from = (p - stub_entry->group->stub_sec->contents
794e51c0
AM
10885 + 4 * (ALWAYS_EMIT_R2SAVE
10886 || stub_entry->stub_type == ppc_stub_plt_call_r2save)
10887 + 4 * (PPC_HA (offset) != 0)
10888 + 4 * (PPC_HA (offset + 8 + 8 * plt_static_chain)
10889 != PPC_HA (offset))
10890 + 4 * (plt_static_chain != 0)
10891 + 20
6f20ed8a
AM
10892 + stub_entry->group->stub_sec->output_offset
10893 + stub_entry->group->stub_sec->output_section->vma);
794e51c0
AM
10894 cmp_branch_off = to - from;
10895 use_fake_dep = cmp_branch_off + (1 << 25) >= (1 << 26);
10896 }
10897
ac2df442
AM
10898 if (PPC_HA (offset) != 0)
10899 {
176a0d42
AM
10900 if (r != NULL)
10901 {
794e51c0
AM
10902 if (ALWAYS_EMIT_R2SAVE
10903 || stub_entry->stub_type == ppc_stub_plt_call_r2save)
10904 r[0].r_offset += 4;
176a0d42 10905 r[0].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_HA);
3b421ab3 10906 r[1].r_offset = r[0].r_offset + 4;
176a0d42
AM
10907 r[1].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_LO_DS);
10908 r[1].r_addend = r[0].r_addend;
b9e5796b 10909 if (plt_load_toc)
176a0d42 10910 {
b9e5796b 10911 if (PPC_HA (offset + 8 + 8 * plt_static_chain) != PPC_HA (offset))
c7131b65 10912 {
b9e5796b
AM
10913 r[2].r_offset = r[1].r_offset + 4;
10914 r[2].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_LO);
10915 r[2].r_addend = r[0].r_addend;
10916 }
10917 else
10918 {
10919 r[2].r_offset = r[1].r_offset + 8 + 8 * use_fake_dep;
10920 r[2].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_LO_DS);
10921 r[2].r_addend = r[0].r_addend + 8;
10922 if (plt_static_chain)
10923 {
10924 r[3].r_offset = r[2].r_offset + 4;
10925 r[3].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_LO_DS);
10926 r[3].r_addend = r[0].r_addend + 16;
10927 }
c7131b65 10928 }
176a0d42
AM
10929 }
10930 }
794e51c0
AM
10931 if (ALWAYS_EMIT_R2SAVE
10932 || stub_entry->stub_type == ppc_stub_plt_call_r2save)
a078d95a 10933 bfd_put_32 (obfd, STD_R2_0R1 + STK_TOC (htab), p), p += 4;
397998fc
AM
10934 if (plt_load_toc)
10935 {
10936 bfd_put_32 (obfd, ADDIS_R11_R2 | PPC_HA (offset), p), p += 4;
10937 bfd_put_32 (obfd, LD_R12_0R11 | PPC_LO (offset), p), p += 4;
10938 }
10939 else
10940 {
10941 bfd_put_32 (obfd, ADDIS_R12_R2 | PPC_HA (offset), p), p += 4;
10942 bfd_put_32 (obfd, LD_R12_0R12 | PPC_LO (offset), p), p += 4;
10943 }
b9e5796b
AM
10944 if (plt_load_toc
10945 && PPC_HA (offset + 8 + 8 * plt_static_chain) != PPC_HA (offset))
ac2df442 10946 {
71a39c98 10947 bfd_put_32 (obfd, ADDI_R11_R11 | PPC_LO (offset), p), p += 4;
ac2df442
AM
10948 offset = 0;
10949 }
71a39c98 10950 bfd_put_32 (obfd, MTCTR_R12, p), p += 4;
b9e5796b 10951 if (plt_load_toc)
794e51c0 10952 {
b9e5796b
AM
10953 if (use_fake_dep)
10954 {
10955 bfd_put_32 (obfd, XOR_R2_R12_R12, p), p += 4;
10956 bfd_put_32 (obfd, ADD_R11_R11_R2, p), p += 4;
10957 }
10958 bfd_put_32 (obfd, LD_R2_0R11 | PPC_LO (offset + 8), p), p += 4;
10959 if (plt_static_chain)
10960 bfd_put_32 (obfd, LD_R11_0R11 | PPC_LO (offset + 16), p), p += 4;
794e51c0 10961 }
ac2df442
AM
10962 }
10963 else
10964 {
176a0d42
AM
10965 if (r != NULL)
10966 {
794e51c0
AM
10967 if (ALWAYS_EMIT_R2SAVE
10968 || stub_entry->stub_type == ppc_stub_plt_call_r2save)
10969 r[0].r_offset += 4;
176a0d42 10970 r[0].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_DS);
b9e5796b 10971 if (plt_load_toc)
176a0d42 10972 {
b9e5796b 10973 if (PPC_HA (offset + 8 + 8 * plt_static_chain) != PPC_HA (offset))
c7131b65 10974 {
b9e5796b
AM
10975 r[1].r_offset = r[0].r_offset + 4;
10976 r[1].r_info = ELF64_R_INFO (0, R_PPC64_TOC16);
10977 r[1].r_addend = r[0].r_addend;
10978 }
10979 else
10980 {
10981 r[1].r_offset = r[0].r_offset + 8 + 8 * use_fake_dep;
10982 r[1].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_DS);
10983 r[1].r_addend = r[0].r_addend + 8 + 8 * plt_static_chain;
10984 if (plt_static_chain)
10985 {
10986 r[2].r_offset = r[1].r_offset + 4;
10987 r[2].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_DS);
10988 r[2].r_addend = r[0].r_addend + 8;
10989 }
c7131b65 10990 }
176a0d42
AM
10991 }
10992 }
794e51c0
AM
10993 if (ALWAYS_EMIT_R2SAVE
10994 || stub_entry->stub_type == ppc_stub_plt_call_r2save)
a078d95a 10995 bfd_put_32 (obfd, STD_R2_0R1 + STK_TOC (htab), p), p += 4;
71a39c98 10996 bfd_put_32 (obfd, LD_R12_0R2 | PPC_LO (offset), p), p += 4;
b9e5796b
AM
10997 if (plt_load_toc
10998 && PPC_HA (offset + 8 + 8 * plt_static_chain) != PPC_HA (offset))
ac2df442
AM
10999 {
11000 bfd_put_32 (obfd, ADDI_R2_R2 | PPC_LO (offset), p), p += 4;
11001 offset = 0;
11002 }
71a39c98 11003 bfd_put_32 (obfd, MTCTR_R12, p), p += 4;
b9e5796b 11004 if (plt_load_toc)
794e51c0 11005 {
b9e5796b
AM
11006 if (use_fake_dep)
11007 {
11008 bfd_put_32 (obfd, XOR_R11_R12_R12, p), p += 4;
11009 bfd_put_32 (obfd, ADD_R2_R2_R11, p), p += 4;
11010 }
11011 if (plt_static_chain)
11012 bfd_put_32 (obfd, LD_R11_0R2 | PPC_LO (offset + 16), p), p += 4;
11013 bfd_put_32 (obfd, LD_R2_0R2 | PPC_LO (offset + 8), p), p += 4;
794e51c0 11014 }
ac2df442 11015 }
b9e5796b 11016 if (plt_load_toc && plt_thread_safe && !use_fake_dep)
794e51c0
AM
11017 {
11018 bfd_put_32 (obfd, CMPLDI_R2_0, p), p += 4;
11019 bfd_put_32 (obfd, BNECTR_P4, p), p += 4;
22aa0c7e 11020 bfd_put_32 (obfd, B_DOT | (cmp_branch_off & 0x3fffffc), p), p += 4;
794e51c0
AM
11021 }
11022 else
407aa07c 11023 bfd_put_32 (obfd, BCTR, p), p += 4;
5d1634d7
AM
11024 return p;
11025}
11026
a7f2871e
AM
11027/* Build a special .plt call stub for __tls_get_addr. */
11028
11029#define LD_R11_0R3 0xe9630000
11030#define LD_R12_0R3 0xe9830000
11031#define MR_R0_R3 0x7c601b78
11032#define CMPDI_R11_0 0x2c2b0000
11033#define ADD_R3_R12_R13 0x7c6c6a14
11034#define BEQLR 0x4d820020
11035#define MR_R3_R0 0x7c030378
a7f2871e
AM
11036#define STD_R11_0R1 0xf9610000
11037#define BCTRL 0x4e800421
11038#define LD_R11_0R1 0xe9610000
a7f2871e
AM
11039#define MTLR_R11 0x7d6803a6
11040
11041static inline bfd_byte *
794e51c0
AM
11042build_tls_get_addr_stub (struct ppc_link_hash_table *htab,
11043 struct ppc_stub_hash_entry *stub_entry,
11044 bfd_byte *p, bfd_vma offset, Elf_Internal_Rela *r)
a7f2871e 11045{
e7d1c40c 11046 bfd *obfd = htab->params->stub_bfd;
794e51c0 11047
a7f2871e
AM
11048 bfd_put_32 (obfd, LD_R11_0R3 + 0, p), p += 4;
11049 bfd_put_32 (obfd, LD_R12_0R3 + 8, p), p += 4;
11050 bfd_put_32 (obfd, MR_R0_R3, p), p += 4;
11051 bfd_put_32 (obfd, CMPDI_R11_0, p), p += 4;
11052 bfd_put_32 (obfd, ADD_R3_R12_R13, p), p += 4;
11053 bfd_put_32 (obfd, BEQLR, p), p += 4;
11054 bfd_put_32 (obfd, MR_R3_R0, p), p += 4;
f378ab09
AM
11055 if (r != NULL)
11056 r[0].r_offset += 7 * 4;
11057 if (!ALWAYS_EMIT_R2SAVE
11058 && stub_entry->stub_type != ppc_stub_plt_call_r2save)
11059 return build_plt_stub (htab, stub_entry, p, offset, r);
11060
a7f2871e 11061 bfd_put_32 (obfd, MFLR_R11, p), p += 4;
a078d95a 11062 bfd_put_32 (obfd, STD_R11_0R1 + STK_LINKER (htab), p), p += 4;
a7f2871e
AM
11063
11064 if (r != NULL)
f378ab09 11065 r[0].r_offset += 2 * 4;
794e51c0 11066 p = build_plt_stub (htab, stub_entry, p, offset, r);
407aa07c 11067 bfd_put_32 (obfd, BCTRL, p - 4);
a7f2871e 11068
a078d95a 11069 bfd_put_32 (obfd, LD_R2_0R1 + STK_TOC (htab), p), p += 4;
bd4d2eaa 11070 bfd_put_32 (obfd, LD_R11_0R1 + STK_LINKER (htab), p), p += 4;
a7f2871e
AM
11071 bfd_put_32 (obfd, MTLR_R11, p), p += 4;
11072 bfd_put_32 (obfd, BLR, p), p += 4;
11073
11074 return p;
11075}
11076
176a0d42
AM
11077static Elf_Internal_Rela *
11078get_relocs (asection *sec, int count)
11079{
11080 Elf_Internal_Rela *relocs;
11081 struct bfd_elf_section_data *elfsec_data;
11082
11083 elfsec_data = elf_section_data (sec);
11084 relocs = elfsec_data->relocs;
11085 if (relocs == NULL)
11086 {
11087 bfd_size_type relsize;
11088 relsize = sec->reloc_count * sizeof (*relocs);
11089 relocs = bfd_alloc (sec->owner, relsize);
11090 if (relocs == NULL)
11091 return NULL;
11092 elfsec_data->relocs = relocs;
d4730f92
BS
11093 elfsec_data->rela.hdr = bfd_zalloc (sec->owner,
11094 sizeof (Elf_Internal_Shdr));
11095 if (elfsec_data->rela.hdr == NULL)
11096 return NULL;
11097 elfsec_data->rela.hdr->sh_size = (sec->reloc_count
11098 * sizeof (Elf64_External_Rela));
11099 elfsec_data->rela.hdr->sh_entsize = sizeof (Elf64_External_Rela);
176a0d42
AM
11100 sec->reloc_count = 0;
11101 }
11102 relocs += sec->reloc_count;
11103 sec->reloc_count += count;
11104 return relocs;
11105}
11106
aa374f67 11107static bfd_vma
25f53a85 11108get_r2off (struct bfd_link_info *info,
aa374f67
AM
11109 struct ppc_stub_hash_entry *stub_entry)
11110{
25f53a85 11111 struct ppc_link_hash_table *htab = ppc_hash_table (info);
6f20ed8a 11112 bfd_vma r2off = htab->sec_info[stub_entry->target_section->id].toc_off;
aa374f67
AM
11113
11114 if (r2off == 0)
11115 {
11116 /* Support linking -R objects. Get the toc pointer from the
11117 opd entry. */
11118 char buf[8];
b9e5796b
AM
11119 if (!htab->opd_abi)
11120 return r2off;
aa374f67
AM
11121 asection *opd = stub_entry->h->elf.root.u.def.section;
11122 bfd_vma opd_off = stub_entry->h->elf.root.u.def.value;
11123
11124 if (strcmp (opd->name, ".opd") != 0
11125 || opd->reloc_count != 0)
11126 {
c1c8c1ef 11127 info->callbacks->einfo (_("%P: cannot find opd entry toc for `%pT'\n"),
25f53a85 11128 stub_entry->h->elf.root.root.string);
aa374f67 11129 bfd_set_error (bfd_error_bad_value);
a7c49797 11130 return (bfd_vma) -1;
aa374f67
AM
11131 }
11132 if (!bfd_get_section_contents (opd->owner, opd, buf, opd_off + 8, 8))
a7c49797 11133 return (bfd_vma) -1;
aa374f67 11134 r2off = bfd_get_64 (opd->owner, buf);
25f53a85 11135 r2off -= elf_gp (info->output_bfd);
aa374f67 11136 }
6f20ed8a 11137 r2off -= htab->sec_info[stub_entry->group->link_sec->id].toc_off;
aa374f67
AM
11138 return r2off;
11139}
11140
b34976b6 11141static bfd_boolean
4ce794b7 11142ppc_build_one_stub (struct bfd_hash_entry *gen_entry, void *in_arg)
5d1634d7 11143{
721956f4
AM
11144 struct ppc_stub_hash_entry *stub_entry;
11145 struct ppc_branch_hash_entry *br_entry;
5d1634d7
AM
11146 struct bfd_link_info *info;
11147 struct ppc_link_hash_table *htab;
721956f4
AM
11148 bfd_byte *loc;
11149 bfd_byte *p;
ee75fd95 11150 bfd_vma dest, off;
176a0d42 11151 Elf_Internal_Rela *r;
e054468f 11152 asection *plt;
5d1634d7 11153
721956f4
AM
11154 /* Massage our args to the form they really have. */
11155 stub_entry = (struct ppc_stub_hash_entry *) gen_entry;
4ce794b7 11156 info = in_arg;
5d1634d7 11157
5d1634d7 11158 htab = ppc_hash_table (info);
4dfe6ac6
NC
11159 if (htab == NULL)
11160 return FALSE;
5d1634d7 11161
721956f4 11162 /* Make a note of the offset within the stubs for this entry. */
6f20ed8a
AM
11163 stub_entry->stub_offset = stub_entry->group->stub_sec->size;
11164 loc = stub_entry->group->stub_sec->contents + stub_entry->stub_offset;
721956f4 11165
4ce794b7 11166 htab->stub_count[stub_entry->stub_type - 1] += 1;
721956f4 11167 switch (stub_entry->stub_type)
5d1634d7 11168 {
721956f4 11169 case ppc_stub_long_branch:
ad8e1ba5 11170 case ppc_stub_long_branch_r2off:
721956f4 11171 /* Branches are relative. This is where we are going to. */
6911b7dc
AM
11172 dest = (stub_entry->target_value
11173 + stub_entry->target_section->output_offset
11174 + stub_entry->target_section->output_section->vma);
11175 dest += PPC64_LOCAL_ENTRY_OFFSET (stub_entry->other);
11176 off = dest;
5d1634d7 11177
721956f4
AM
11178 /* And this is where we are coming from. */
11179 off -= (stub_entry->stub_offset
6f20ed8a
AM
11180 + stub_entry->group->stub_sec->output_offset
11181 + stub_entry->group->stub_sec->output_section->vma);
e86ce104 11182
9e390558 11183 p = loc;
ac2df442 11184 if (stub_entry->stub_type == ppc_stub_long_branch_r2off)
ad8e1ba5 11185 {
25f53a85 11186 bfd_vma r2off = get_r2off (info, stub_entry);
ad8e1ba5 11187
a7c49797 11188 if (r2off == (bfd_vma) -1)
aa374f67
AM
11189 {
11190 htab->stub_error = TRUE;
11191 return FALSE;
11192 }
9e390558
AM
11193 bfd_put_32 (htab->params->stub_bfd, STD_R2_0R1 + STK_TOC (htab), p);
11194 p += 4;
ac2df442
AM
11195 if (PPC_HA (r2off) != 0)
11196 {
e7d1c40c 11197 bfd_put_32 (htab->params->stub_bfd,
9e390558
AM
11198 ADDIS_R2_R2 | PPC_HA (r2off), p);
11199 p += 4;
a7c49797
AM
11200 }
11201 if (PPC_LO (r2off) != 0)
11202 {
11203 bfd_put_32 (htab->params->stub_bfd,
9e390558
AM
11204 ADDI_R2_R2 | PPC_LO (r2off), p);
11205 p += 4;
ac2df442 11206 }
9e390558 11207 off -= p - loc;
ad8e1ba5 11208 }
9e390558
AM
11209 bfd_put_32 (htab->params->stub_bfd, B_DOT | (off & 0x3fffffc), p);
11210 p += 4;
ad8e1ba5 11211
5c3dead3
AM
11212 if (off + (1 << 25) >= (bfd_vma) (1 << 26))
11213 {
cf97bcb0
AM
11214 _bfd_error_handler
11215 (_("long branch stub `%s' offset overflow"),
bc30df16 11216 stub_entry->root.string);
5c3dead3
AM
11217 htab->stub_error = TRUE;
11218 return FALSE;
11219 }
ee75fd95
AM
11220
11221 if (info->emitrelocations)
11222 {
6f20ed8a 11223 r = get_relocs (stub_entry->group->stub_sec, 1);
176a0d42
AM
11224 if (r == NULL)
11225 return FALSE;
9e390558 11226 r->r_offset = p - 4 - stub_entry->group->stub_sec->contents;
ee75fd95
AM
11227 r->r_info = ELF64_R_INFO (0, R_PPC64_REL24);
11228 r->r_addend = dest;
11229 if (stub_entry->h != NULL)
11230 {
11231 struct elf_link_hash_entry **hashes;
11232 unsigned long symndx;
11233 struct ppc_link_hash_entry *h;
11234
e7d1c40c 11235 hashes = elf_sym_hashes (htab->params->stub_bfd);
ee75fd95
AM
11236 if (hashes == NULL)
11237 {
11238 bfd_size_type hsize;
11239
11240 hsize = (htab->stub_globals + 1) * sizeof (*hashes);
e7d1c40c 11241 hashes = bfd_zalloc (htab->params->stub_bfd, hsize);
ee75fd95
AM
11242 if (hashes == NULL)
11243 return FALSE;
e7d1c40c 11244 elf_sym_hashes (htab->params->stub_bfd) = hashes;
ee75fd95
AM
11245 htab->stub_globals = 1;
11246 }
11247 symndx = htab->stub_globals++;
11248 h = stub_entry->h;
11249 hashes[symndx] = &h->elf;
11250 r->r_info = ELF64_R_INFO (symndx, R_PPC64_REL24);
11251 if (h->oh != NULL && h->oh->is_func)
b31867b6 11252 h = ppc_follow_link (h->oh);
ee75fd95
AM
11253 if (h->elf.root.u.def.section != stub_entry->target_section)
11254 /* H is an opd symbol. The addend must be zero. */
11255 r->r_addend = 0;
11256 else
11257 {
11258 off = (h->elf.root.u.def.value
11259 + h->elf.root.u.def.section->output_offset
11260 + h->elf.root.u.def.section->output_section->vma);
11261 r->r_addend -= off;
11262 }
11263 }
11264 }
721956f4 11265 break;
e86ce104 11266
721956f4 11267 case ppc_stub_plt_branch:
ad8e1ba5 11268 case ppc_stub_plt_branch_r2off:
721956f4
AM
11269 br_entry = ppc_branch_hash_lookup (&htab->branch_hash_table,
11270 stub_entry->root.string + 9,
b34976b6 11271 FALSE, FALSE);
721956f4
AM
11272 if (br_entry == NULL)
11273 {
cf97bcb0
AM
11274 _bfd_error_handler (_("can't find branch stub `%s'"),
11275 stub_entry->root.string);
b34976b6
AM
11276 htab->stub_error = TRUE;
11277 return FALSE;
721956f4
AM
11278 }
11279
176a0d42
AM
11280 dest = (stub_entry->target_value
11281 + stub_entry->target_section->output_offset
11282 + stub_entry->target_section->output_section->vma);
6911b7dc
AM
11283 if (stub_entry->stub_type != ppc_stub_plt_branch_r2off)
11284 dest += PPC64_LOCAL_ENTRY_OFFSET (stub_entry->other);
721956f4 11285
176a0d42 11286 bfd_put_64 (htab->brlt->owner, dest,
4ce794b7 11287 htab->brlt->contents + br_entry->offset);
721956f4 11288
f94498ff 11289 if (br_entry->iter == htab->stub_iteration)
721956f4 11290 {
f94498ff 11291 br_entry->iter = 0;
84f5d08e 11292
f94498ff 11293 if (htab->relbrlt != NULL)
84f5d08e 11294 {
f94498ff
AM
11295 /* Create a reloc for the branch lookup table entry. */
11296 Elf_Internal_Rela rela;
11297 bfd_byte *rl;
11298
11299 rela.r_offset = (br_entry->offset
11300 + htab->brlt->output_offset
11301 + htab->brlt->output_section->vma);
11302 rela.r_info = ELF64_R_INFO (0, R_PPC64_RELATIVE);
176a0d42 11303 rela.r_addend = dest;
f94498ff
AM
11304
11305 rl = htab->relbrlt->contents;
11306 rl += (htab->relbrlt->reloc_count++
11307 * sizeof (Elf64_External_Rela));
11308 bfd_elf64_swap_reloca_out (htab->relbrlt->owner, &rela, rl);
11309 }
11310 else if (info->emitrelocations)
11311 {
176a0d42
AM
11312 r = get_relocs (htab->brlt, 1);
11313 if (r == NULL)
11314 return FALSE;
11315 /* brlt, being SEC_LINKER_CREATED does not go through the
11316 normal reloc processing. Symbols and offsets are not
11317 translated from input file to output file form, so
11318 set up the offset per the output file. */
f94498ff
AM
11319 r->r_offset = (br_entry->offset
11320 + htab->brlt->output_offset
11321 + htab->brlt->output_section->vma);
11322 r->r_info = ELF64_R_INFO (0, R_PPC64_RELATIVE);
176a0d42 11323 r->r_addend = dest;
84f5d08e 11324 }
84f5d08e 11325 }
721956f4 11326
176a0d42
AM
11327 dest = (br_entry->offset
11328 + htab->brlt->output_offset
11329 + htab->brlt->output_section->vma);
11330
11331 off = (dest
06bcf541 11332 - elf_gp (info->output_bfd)
6f20ed8a 11333 - htab->sec_info[stub_entry->group->link_sec->id].toc_off);
721956f4 11334
ad8e1ba5 11335 if (off + 0x80008000 > 0xffffffff || (off & 7) != 0)
5d1634d7 11336 {
25f53a85 11337 info->callbacks->einfo
c1c8c1ef 11338 (_("%P: linkage table error against `%pT'\n"),
721956f4 11339 stub_entry->root.string);
5d1634d7 11340 bfd_set_error (bfd_error_bad_value);
b34976b6
AM
11341 htab->stub_error = TRUE;
11342 return FALSE;
5d1634d7 11343 }
41bd81ab 11344
176a0d42
AM
11345 if (info->emitrelocations)
11346 {
6f20ed8a 11347 r = get_relocs (stub_entry->group->stub_sec, 1 + (PPC_HA (off) != 0));
176a0d42
AM
11348 if (r == NULL)
11349 return FALSE;
6f20ed8a 11350 r[0].r_offset = loc - stub_entry->group->stub_sec->contents;
7cfbafbc
AM
11351 if (bfd_big_endian (info->output_bfd))
11352 r[0].r_offset += 2;
00f412ee 11353 if (stub_entry->stub_type == ppc_stub_plt_branch_r2off)
176a0d42
AM
11354 r[0].r_offset += 4;
11355 r[0].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_DS);
11356 r[0].r_addend = dest;
11357 if (PPC_HA (off) != 0)
11358 {
11359 r[0].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_HA);
11360 r[1].r_offset = r[0].r_offset + 4;
11361 r[1].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_LO_DS);
11362 r[1].r_addend = r[0].r_addend;
11363 }
11364 }
11365
9e390558 11366 p = loc;
00f412ee 11367 if (stub_entry->stub_type != ppc_stub_plt_branch_r2off)
ad8e1ba5 11368 {
176a0d42 11369 if (PPC_HA (off) != 0)
ac2df442 11370 {
e7d1c40c 11371 bfd_put_32 (htab->params->stub_bfd,
9e390558
AM
11372 ADDIS_R12_R2 | PPC_HA (off), p);
11373 p += 4;
e7d1c40c 11374 bfd_put_32 (htab->params->stub_bfd,
9e390558 11375 LD_R12_0R12 | PPC_LO (off), p);
ac2df442
AM
11376 }
11377 else
9e390558
AM
11378 bfd_put_32 (htab->params->stub_bfd,
11379 LD_R12_0R2 | PPC_LO (off), p);
ad8e1ba5
AM
11380 }
11381 else
11382 {
25f53a85 11383 bfd_vma r2off = get_r2off (info, stub_entry);
aa374f67 11384
a7c49797 11385 if (r2off == (bfd_vma) -1)
aa374f67
AM
11386 {
11387 htab->stub_error = TRUE;
11388 return FALSE;
11389 }
ad8e1ba5 11390
9e390558
AM
11391 bfd_put_32 (htab->params->stub_bfd, STD_R2_0R1 + STK_TOC (htab), p);
11392 p += 4;
176a0d42 11393 if (PPC_HA (off) != 0)
ac2df442 11394 {
e7d1c40c 11395 bfd_put_32 (htab->params->stub_bfd,
9e390558
AM
11396 ADDIS_R12_R2 | PPC_HA (off), p);
11397 p += 4;
e7d1c40c 11398 bfd_put_32 (htab->params->stub_bfd,
9e390558 11399 LD_R12_0R12 | PPC_LO (off), p);
ac2df442
AM
11400 }
11401 else
9e390558 11402 bfd_put_32 (htab->params->stub_bfd, LD_R12_0R2 | PPC_LO (off), p);
ac2df442
AM
11403
11404 if (PPC_HA (r2off) != 0)
11405 {
9e390558 11406 p += 4;
e7d1c40c 11407 bfd_put_32 (htab->params->stub_bfd,
9e390558 11408 ADDIS_R2_R2 | PPC_HA (r2off), p);
00f412ee
AM
11409 }
11410 if (PPC_LO (r2off) != 0)
11411 {
9e390558 11412 p += 4;
e7d1c40c 11413 bfd_put_32 (htab->params->stub_bfd,
9e390558 11414 ADDI_R2_R2 | PPC_LO (r2off), p);
ac2df442 11415 }
ad8e1ba5 11416 }
9e390558
AM
11417 p += 4;
11418 bfd_put_32 (htab->params->stub_bfd, MTCTR_R12, p);
11419 p += 4;
407aa07c
AM
11420 bfd_put_32 (htab->params->stub_bfd, BCTR, p);
11421 p += 4;
721956f4 11422 break;
5d1634d7 11423
721956f4 11424 case ppc_stub_plt_call:
794e51c0 11425 case ppc_stub_plt_call_r2save:
e054468f 11426 if (stub_entry->h != NULL
b31867b6
AM
11427 && stub_entry->h->is_func_descriptor
11428 && stub_entry->h->oh != NULL)
c862ae31 11429 {
b31867b6
AM
11430 struct ppc_link_hash_entry *fh = ppc_follow_link (stub_entry->h->oh);
11431
11432 /* If the old-ABI "dot-symbol" is undefined make it weak so
6f20ed8a 11433 we don't get a link error from RELOC_FOR_GLOBAL_SYMBOL. */
8c5b4e52
AM
11434 if (fh->elf.root.type == bfd_link_hash_undefined
11435 && (stub_entry->h->elf.root.type == bfd_link_hash_defined
11436 || stub_entry->h->elf.root.type == bfd_link_hash_defweak))
b31867b6 11437 fh->elf.root.type = bfd_link_hash_undefweak;
c862ae31
AM
11438 }
11439
721956f4 11440 /* Now build the stub. */
e054468f 11441 dest = stub_entry->plt_ent->plt.offset & ~1;
176a0d42 11442 if (dest >= (bfd_vma) -2)
721956f4
AM
11443 abort ();
11444
33e44f2e 11445 plt = htab->elf.splt;
25f23106
AM
11446 if (!htab->elf.dynamic_sections_created
11447 || stub_entry->h == NULL
11448 || stub_entry->h->elf.dynindx == -1)
2d7ad24e
AM
11449 {
11450 if (stub_entry->symtype == STT_GNU_IFUNC)
11451 plt = htab->elf.iplt;
11452 else
11453 plt = htab->pltlocal;
11454 }
e054468f
AM
11455
11456 dest += plt->output_offset + plt->output_section->vma;
11457
176a0d42 11458 off = (dest
06bcf541 11459 - elf_gp (info->output_bfd)
6f20ed8a 11460 - htab->sec_info[stub_entry->group->link_sec->id].toc_off);
721956f4 11461
ad8e1ba5 11462 if (off + 0x80008000 > 0xffffffff || (off & 7) != 0)
721956f4 11463 {
25f53a85 11464 info->callbacks->einfo
695344c0 11465 /* xgettext:c-format */
c1c8c1ef 11466 (_("%P: linkage table error against `%pT'\n"),
e054468f
AM
11467 stub_entry->h != NULL
11468 ? stub_entry->h->elf.root.root.string
11469 : "<local sym>");
721956f4 11470 bfd_set_error (bfd_error_bad_value);
b34976b6
AM
11471 htab->stub_error = TRUE;
11472 return FALSE;
721956f4
AM
11473 }
11474
e7d1c40c 11475 if (htab->params->plt_stub_align != 0)
794e51c0
AM
11476 {
11477 unsigned pad = plt_stub_pad (htab, stub_entry, off);
11478
6f20ed8a
AM
11479 stub_entry->group->stub_sec->size += pad;
11480 stub_entry->stub_offset = stub_entry->group->stub_sec->size;
794e51c0
AM
11481 loc += pad;
11482 }
11483
176a0d42
AM
11484 r = NULL;
11485 if (info->emitrelocations)
11486 {
6f20ed8a 11487 r = get_relocs (stub_entry->group->stub_sec,
3ba720c7
AM
11488 ((PPC_HA (off) != 0)
11489 + (htab->opd_abi
e7d1c40c 11490 ? 2 + (htab->params->plt_static_chain
3ba720c7
AM
11491 && PPC_HA (off + 16) == PPC_HA (off))
11492 : 1)));
176a0d42
AM
11493 if (r == NULL)
11494 return FALSE;
6f20ed8a 11495 r[0].r_offset = loc - stub_entry->group->stub_sec->contents;
7cfbafbc
AM
11496 if (bfd_big_endian (info->output_bfd))
11497 r[0].r_offset += 2;
176a0d42
AM
11498 r[0].r_addend = dest;
11499 }
a7f2871e
AM
11500 if (stub_entry->h != NULL
11501 && (stub_entry->h == htab->tls_get_addr_fd
11502 || stub_entry->h == htab->tls_get_addr)
7c9cf415 11503 && htab->params->tls_get_addr_opt)
794e51c0 11504 p = build_tls_get_addr_stub (htab, stub_entry, loc, off, r);
a7f2871e 11505 else
794e51c0 11506 p = build_plt_stub (htab, stub_entry, loc, off, r);
721956f4
AM
11507 break;
11508
a4b6fadd
AM
11509 case ppc_stub_save_res:
11510 return TRUE;
11511
721956f4
AM
11512 default:
11513 BFD_FAIL ();
b34976b6 11514 return FALSE;
721956f4
AM
11515 }
11516
9e390558 11517 stub_entry->group->stub_sec->size += p - loc;
97b639ba 11518
e7d1c40c 11519 if (htab->params->emit_stub_syms)
97b639ba
AM
11520 {
11521 struct elf_link_hash_entry *h;
ee75fd95
AM
11522 size_t len1, len2;
11523 char *name;
11524 const char *const stub_str[] = { "long_branch",
11525 "long_branch_r2off",
11526 "plt_branch",
11527 "plt_branch_r2off",
794e51c0 11528 "plt_call",
ee75fd95
AM
11529 "plt_call" };
11530
11531 len1 = strlen (stub_str[stub_entry->stub_type - 1]);
11532 len2 = strlen (stub_entry->root.string);
11533 name = bfd_malloc (len1 + len2 + 2);
11534 if (name == NULL)
11535 return FALSE;
11536 memcpy (name, stub_entry->root.string, 9);
11537 memcpy (name + 9, stub_str[stub_entry->stub_type - 1], len1);
11538 memcpy (name + len1 + 9, stub_entry->root.string + 8, len2 - 8 + 1);
11539 h = elf_link_hash_lookup (&htab->elf, name, TRUE, FALSE, FALSE);
97b639ba
AM
11540 if (h == NULL)
11541 return FALSE;
11542 if (h->root.type == bfd_link_hash_new)
11543 {
11544 h->root.type = bfd_link_hash_defined;
6f20ed8a 11545 h->root.u.def.section = stub_entry->group->stub_sec;
97b639ba 11546 h->root.u.def.value = stub_entry->stub_offset;
f5385ebf
AM
11547 h->ref_regular = 1;
11548 h->def_regular = 1;
11549 h->ref_regular_nonweak = 1;
11550 h->forced_local = 1;
11551 h->non_elf = 0;
2ec55de3 11552 h->root.linker_def = 1;
97b639ba
AM
11553 }
11554 }
11555
b34976b6 11556 return TRUE;
721956f4
AM
11557}
11558
11559/* As above, but don't actually build the stub. Just bump offset so
11560 we know stub section sizes, and select plt_branch stubs where
11561 long_branch stubs won't do. */
11562
b34976b6 11563static bfd_boolean
4ce794b7 11564ppc_size_one_stub (struct bfd_hash_entry *gen_entry, void *in_arg)
721956f4
AM
11565{
11566 struct ppc_stub_hash_entry *stub_entry;
63bc6f6c 11567 struct bfd_link_info *info;
721956f4
AM
11568 struct ppc_link_hash_table *htab;
11569 bfd_vma off;
11570 int size;
11571
11572 /* Massage our args to the form they really have. */
11573 stub_entry = (struct ppc_stub_hash_entry *) gen_entry;
63bc6f6c
AM
11574 info = in_arg;
11575
11576 htab = ppc_hash_table (info);
4dfe6ac6
NC
11577 if (htab == NULL)
11578 return FALSE;
721956f4 11579
a4b6fadd
AM
11580 if (stub_entry->h != NULL
11581 && stub_entry->h->save_res
11582 && stub_entry->h->elf.root.type == bfd_link_hash_defined
11583 && stub_entry->h->elf.root.u.def.section == htab->sfpr)
11584 {
11585 /* Don't make stubs to out-of-line register save/restore
11586 functions. Instead, emit copies of the functions. */
11587 stub_entry->group->needs_save_res = 1;
11588 stub_entry->stub_type = ppc_stub_save_res;
11589 return TRUE;
11590 }
11591
794e51c0
AM
11592 if (stub_entry->stub_type == ppc_stub_plt_call
11593 || stub_entry->stub_type == ppc_stub_plt_call_r2save)
721956f4 11594 {
e054468f
AM
11595 asection *plt;
11596 off = stub_entry->plt_ent->plt.offset & ~(bfd_vma) 1;
58ac9f71 11597 if (off >= (bfd_vma) -2)
411e1bfb 11598 abort ();
33e44f2e 11599 plt = htab->elf.splt;
25f23106
AM
11600 if (!htab->elf.dynamic_sections_created
11601 || stub_entry->h == NULL
11602 || stub_entry->h->elf.dynindx == -1)
2d7ad24e
AM
11603 {
11604 if (stub_entry->symtype == STT_GNU_IFUNC)
11605 plt = htab->elf.iplt;
11606 else
11607 plt = htab->pltlocal;
11608 }
e054468f
AM
11609 off += (plt->output_offset
11610 + plt->output_section->vma
06bcf541 11611 - elf_gp (info->output_bfd)
6f20ed8a 11612 - htab->sec_info[stub_entry->group->link_sec->id].toc_off);
721956f4 11613
794e51c0 11614 size = plt_stub_size (htab, stub_entry, off);
d4aaa2a0
AM
11615 if (stub_entry->h != NULL
11616 && (stub_entry->h == htab->tls_get_addr_fd
11617 || stub_entry->h == htab->tls_get_addr)
11618 && htab->params->tls_get_addr_opt
11619 && (ALWAYS_EMIT_R2SAVE
11620 || stub_entry->stub_type == ppc_stub_plt_call_r2save))
11621 stub_entry->group->tls_get_addr_opt_bctrl
11622 = stub_entry->group->stub_sec->size + size - 5 * 4;
11623
e7d1c40c 11624 if (htab->params->plt_stub_align)
794e51c0 11625 size += plt_stub_pad (htab, stub_entry, off);
176a0d42
AM
11626 if (info->emitrelocations)
11627 {
6f20ed8a 11628 stub_entry->group->stub_sec->reloc_count
b9e5796b
AM
11629 += ((PPC_HA (off) != 0)
11630 + (htab->opd_abi
e7d1c40c 11631 ? 2 + (htab->params->plt_static_chain
b9e5796b
AM
11632 && PPC_HA (off + 16) == PPC_HA (off))
11633 : 1));
6f20ed8a 11634 stub_entry->group->stub_sec->flags |= SEC_RELOC;
176a0d42 11635 }
721956f4
AM
11636 }
11637 else
11638 {
ad8e1ba5
AM
11639 /* ppc_stub_long_branch or ppc_stub_plt_branch, or their r2off
11640 variants. */
ac2df442 11641 bfd_vma r2off = 0;
6911b7dc 11642 bfd_vma local_off = 0;
ac2df442 11643
721956f4
AM
11644 off = (stub_entry->target_value
11645 + stub_entry->target_section->output_offset
11646 + stub_entry->target_section->output_section->vma);
6f20ed8a
AM
11647 off -= (stub_entry->group->stub_sec->size
11648 + stub_entry->group->stub_sec->output_offset
11649 + stub_entry->group->stub_sec->output_section->vma);
721956f4 11650
ad8e1ba5
AM
11651 /* Reset the stub type from the plt variant in case we now
11652 can reach with a shorter stub. */
11653 if (stub_entry->stub_type >= ppc_stub_plt_branch)
11654 stub_entry->stub_type += ppc_stub_long_branch - ppc_stub_plt_branch;
11655
11656 size = 4;
11657 if (stub_entry->stub_type == ppc_stub_long_branch_r2off)
11658 {
25f53a85 11659 r2off = get_r2off (info, stub_entry);
a7c49797 11660 if (r2off == (bfd_vma) -1)
aa374f67
AM
11661 {
11662 htab->stub_error = TRUE;
11663 return FALSE;
11664 }
a7c49797 11665 size = 8;
ac2df442 11666 if (PPC_HA (r2off) != 0)
a7c49797
AM
11667 size += 4;
11668 if (PPC_LO (r2off) != 0)
11669 size += 4;
ac2df442 11670 off -= size - 4;
ad8e1ba5
AM
11671 }
11672
6911b7dc
AM
11673 local_off = PPC64_LOCAL_ENTRY_OFFSET (stub_entry->other);
11674
6a3858a6 11675 /* If the branch offset is too big, use a ppc_stub_plt_branch.
b9e5796b
AM
11676 Do the same for -R objects without function descriptors. */
11677 if (off + (1 << 25) >= (bfd_vma) (1 << 26) - local_off
11678 || (stub_entry->stub_type == ppc_stub_long_branch_r2off
a7c49797
AM
11679 && r2off == 0
11680 && htab->sec_info[stub_entry->target_section->id].toc_off == 0))
721956f4
AM
11681 {
11682 struct ppc_branch_hash_entry *br_entry;
11683
11684 br_entry = ppc_branch_hash_lookup (&htab->branch_hash_table,
11685 stub_entry->root.string + 9,
b34976b6 11686 TRUE, FALSE);
721956f4
AM
11687 if (br_entry == NULL)
11688 {
cf97bcb0
AM
11689 _bfd_error_handler (_("can't build branch stub `%s'"),
11690 stub_entry->root.string);
b34976b6
AM
11691 htab->stub_error = TRUE;
11692 return FALSE;
721956f4
AM
11693 }
11694
11695 if (br_entry->iter != htab->stub_iteration)
11696 {
11697 br_entry->iter = htab->stub_iteration;
eea6121a
AM
11698 br_entry->offset = htab->brlt->size;
11699 htab->brlt->size += 8;
63bc6f6c 11700
ee75fd95 11701 if (htab->relbrlt != NULL)
eea6121a 11702 htab->relbrlt->size += sizeof (Elf64_External_Rela);
84f5d08e
AM
11703 else if (info->emitrelocations)
11704 {
11705 htab->brlt->reloc_count += 1;
11706 htab->brlt->flags |= SEC_RELOC;
11707 }
721956f4 11708 }
ad8e1ba5
AM
11709
11710 stub_entry->stub_type += ppc_stub_plt_branch - ppc_stub_long_branch;
ac2df442
AM
11711 off = (br_entry->offset
11712 + htab->brlt->output_offset
11713 + htab->brlt->output_section->vma
06bcf541 11714 - elf_gp (info->output_bfd)
6f20ed8a 11715 - htab->sec_info[stub_entry->group->link_sec->id].toc_off);
ac2df442 11716
176a0d42
AM
11717 if (info->emitrelocations)
11718 {
6f20ed8a
AM
11719 stub_entry->group->stub_sec->reloc_count
11720 += 1 + (PPC_HA (off) != 0);
11721 stub_entry->group->stub_sec->flags |= SEC_RELOC;
176a0d42
AM
11722 }
11723
00f412ee 11724 if (stub_entry->stub_type != ppc_stub_plt_branch_r2off)
ac2df442
AM
11725 {
11726 size = 12;
176a0d42 11727 if (PPC_HA (off) != 0)
ac2df442
AM
11728 size = 16;
11729 }
11730 else
11731 {
00f412ee 11732 size = 16;
176a0d42 11733 if (PPC_HA (off) != 0)
ac2df442
AM
11734 size += 4;
11735
11736 if (PPC_HA (r2off) != 0)
11737 size += 4;
00f412ee
AM
11738 if (PPC_LO (r2off) != 0)
11739 size += 4;
ac2df442 11740 }
721956f4 11741 }
84f5d08e
AM
11742 else if (info->emitrelocations)
11743 {
6f20ed8a
AM
11744 stub_entry->group->stub_sec->reloc_count += 1;
11745 stub_entry->group->stub_sec->flags |= SEC_RELOC;
84f5d08e 11746 }
721956f4
AM
11747 }
11748
6f20ed8a 11749 stub_entry->group->stub_sec->size += size;
b34976b6 11750 return TRUE;
721956f4
AM
11751}
11752
11753/* Set up various things so that we can make a list of input sections
11754 for each output section included in the link. Returns -1 on error,
cedb70c5 11755 0 when no stubs will be needed, and 1 on success. */
721956f4
AM
11756
11757int
e7d1c40c 11758ppc64_elf_setup_section_lists (struct bfd_link_info *info)
721956f4 11759{
6f20ed8a 11760 unsigned int id;
721956f4
AM
11761 bfd_size_type amt;
11762 struct ppc_link_hash_table *htab = ppc_hash_table (info);
11763
4dfe6ac6
NC
11764 if (htab == NULL)
11765 return -1;
4c52953f 11766
7cf7fcc8 11767 htab->sec_info_arr_size = _bfd_section_id;
6f20ed8a
AM
11768 amt = sizeof (*htab->sec_info) * (htab->sec_info_arr_size);
11769 htab->sec_info = bfd_zmalloc (amt);
11770 if (htab->sec_info == NULL)
721956f4
AM
11771 return -1;
11772
3d6f9012
AM
11773 /* Set toc_off for com, und, abs and ind sections. */
11774 for (id = 0; id < 3; id++)
6f20ed8a 11775 htab->sec_info[id].toc_off = TOC_BASE_OFF;
734b6cf9 11776
721956f4
AM
11777 return 1;
11778}
11779
927be08e
AM
11780/* Set up for first pass at multitoc partitioning. */
11781
11782void
11783ppc64_elf_start_multitoc_partition (struct bfd_link_info *info)
11784{
11785 struct ppc_link_hash_table *htab = ppc_hash_table (info);
11786
1c865ab2 11787 htab->toc_curr = ppc64_elf_set_toc (info, info->output_bfd);
927be08e
AM
11788 htab->toc_bfd = NULL;
11789 htab->toc_first_sec = NULL;
11790}
11791
e717da7e
AM
11792/* The linker repeatedly calls this function for each TOC input section
11793 and linker generated GOT section. Group input bfds such that the toc
927be08e 11794 within a group is less than 64k in size. */
ad8e1ba5 11795
927be08e 11796bfd_boolean
4ce794b7 11797ppc64_elf_next_toc_section (struct bfd_link_info *info, asection *isec)
ad8e1ba5
AM
11798{
11799 struct ppc_link_hash_table *htab = ppc_hash_table (info);
d77c8a4b 11800 bfd_vma addr, off, limit;
ad8e1ba5 11801
4dfe6ac6
NC
11802 if (htab == NULL)
11803 return FALSE;
11804
927be08e 11805 if (!htab->second_toc_pass)
4c52953f 11806 {
927be08e 11807 /* Keep track of the first .toc or .got section for this input bfd. */
a4fd3de5
AM
11808 bfd_boolean new_bfd = htab->toc_bfd != isec->owner;
11809
11810 if (new_bfd)
bf102f86
AM
11811 {
11812 htab->toc_bfd = isec->owner;
11813 htab->toc_first_sec = isec;
11814 }
927be08e 11815
bf102f86
AM
11816 addr = isec->output_offset + isec->output_section->vma;
11817 off = addr - htab->toc_curr;
d77c8a4b
AM
11818 limit = 0x80008000;
11819 if (ppc64_elf_tdata (isec->owner)->has_small_toc_reloc)
11820 limit = 0x10000;
11821 if (off + isec->size > limit)
bf102f86
AM
11822 {
11823 addr = (htab->toc_first_sec->output_offset
11824 + htab->toc_first_sec->output_section->vma);
11825 htab->toc_curr = addr;
a27e685f 11826 htab->toc_curr &= -TOC_BASE_ALIGN;
bf102f86 11827 }
99877b66 11828
927be08e
AM
11829 /* toc_curr is the base address of this toc group. Set elf_gp
11830 for the input section to be the offset relative to the
11831 output toc base plus 0x8000. Making the input elf_gp an
11832 offset allows us to move the toc as a whole without
11833 recalculating input elf_gp. */
06bcf541 11834 off = htab->toc_curr - elf_gp (info->output_bfd);
927be08e
AM
11835 off += TOC_BASE_OFF;
11836
11837 /* Die if someone uses a linker script that doesn't keep input
11838 file .toc and .got together. */
a4fd3de5
AM
11839 if (new_bfd
11840 && elf_gp (isec->owner) != 0
927be08e
AM
11841 && elf_gp (isec->owner) != off)
11842 return FALSE;
11843
11844 elf_gp (isec->owner) = off;
11845 return TRUE;
4c52953f 11846 }
927be08e
AM
11847
11848 /* During the second pass toc_first_sec points to the start of
11849 a toc group, and toc_curr is used to track the old elf_gp.
11850 We use toc_bfd to ensure we only look at each bfd once. */
11851 if (htab->toc_bfd == isec->owner)
11852 return TRUE;
11853 htab->toc_bfd = isec->owner;
11854
11855 if (htab->toc_first_sec == NULL
11856 || htab->toc_curr != elf_gp (isec->owner))
11857 {
11858 htab->toc_curr = elf_gp (isec->owner);
11859 htab->toc_first_sec = isec;
11860 }
11861 addr = (htab->toc_first_sec->output_offset
11862 + htab->toc_first_sec->output_section->vma);
06bcf541 11863 off = addr - elf_gp (info->output_bfd) + TOC_BASE_OFF;
927be08e
AM
11864 elf_gp (isec->owner) = off;
11865
11866 return TRUE;
ad8e1ba5
AM
11867}
11868
927be08e
AM
11869/* Called via elf_link_hash_traverse to merge GOT entries for global
11870 symbol H. */
11871
11872static bfd_boolean
11873merge_global_got (struct elf_link_hash_entry *h, void *inf ATTRIBUTE_UNUSED)
11874{
11875 if (h->root.type == bfd_link_hash_indirect)
11876 return TRUE;
11877
927be08e
AM
11878 merge_got_entries (&h->got.glist);
11879
11880 return TRUE;
11881}
11882
11883/* Called via elf_link_hash_traverse to allocate GOT entries for global
11884 symbol H. */
11885
11886static bfd_boolean
11887reallocate_got (struct elf_link_hash_entry *h, void *inf)
11888{
11889 struct got_entry *gent;
11890
11891 if (h->root.type == bfd_link_hash_indirect)
11892 return TRUE;
11893
927be08e
AM
11894 for (gent = h->got.glist; gent != NULL; gent = gent->next)
11895 if (!gent->is_indirect)
11896 allocate_got (h, (struct bfd_link_info *) inf, gent);
11897 return TRUE;
11898}
11899
11900/* Called on the first multitoc pass after the last call to
11901 ppc64_elf_next_toc_section. This function removes duplicate GOT
11902 entries. */
11903
11904bfd_boolean
11905ppc64_elf_layout_multitoc (struct bfd_link_info *info)
ad8e1ba5
AM
11906{
11907 struct ppc_link_hash_table *htab = ppc_hash_table (info);
927be08e
AM
11908 struct bfd *ibfd, *ibfd2;
11909 bfd_boolean done_something;
11910
11911 htab->multi_toc_needed = htab->toc_curr != elf_gp (info->output_bfd);
ad8e1ba5 11912
7865406b
AM
11913 if (!htab->do_multi_toc)
11914 return FALSE;
11915
d0fae19d 11916 /* Merge global sym got entries within a toc group. */
927be08e
AM
11917 elf_link_hash_traverse (&htab->elf, merge_global_got, info);
11918
11919 /* And tlsld_got. */
c72f2fb2 11920 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
927be08e
AM
11921 {
11922 struct got_entry *ent, *ent2;
11923
11924 if (!is_ppc64_elf (ibfd))
11925 continue;
11926
11927 ent = ppc64_tlsld_got (ibfd);
11928 if (!ent->is_indirect
11929 && ent->got.offset != (bfd_vma) -1)
11930 {
c72f2fb2 11931 for (ibfd2 = ibfd->link.next; ibfd2 != NULL; ibfd2 = ibfd2->link.next)
927be08e
AM
11932 {
11933 if (!is_ppc64_elf (ibfd2))
11934 continue;
11935
11936 ent2 = ppc64_tlsld_got (ibfd2);
11937 if (!ent2->is_indirect
11938 && ent2->got.offset != (bfd_vma) -1
11939 && elf_gp (ibfd2) == elf_gp (ibfd))
11940 {
11941 ent2->is_indirect = TRUE;
11942 ent2->got.ent = ent;
11943 }
11944 }
11945 }
11946 }
11947
11948 /* Zap sizes of got sections. */
33e44f2e
AM
11949 htab->elf.irelplt->rawsize = htab->elf.irelplt->size;
11950 htab->elf.irelplt->size -= htab->got_reli_size;
927be08e
AM
11951 htab->got_reli_size = 0;
11952
c72f2fb2 11953 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
927be08e
AM
11954 {
11955 asection *got, *relgot;
11956
11957 if (!is_ppc64_elf (ibfd))
11958 continue;
11959
11960 got = ppc64_elf_tdata (ibfd)->got;
11961 if (got != NULL)
11962 {
11963 got->rawsize = got->size;
11964 got->size = 0;
11965 relgot = ppc64_elf_tdata (ibfd)->relgot;
11966 relgot->rawsize = relgot->size;
11967 relgot->size = 0;
11968 }
11969 }
11970
11971 /* Now reallocate the got, local syms first. We don't need to
11972 allocate section contents again since we never increase size. */
c72f2fb2 11973 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
927be08e
AM
11974 {
11975 struct got_entry **lgot_ents;
11976 struct got_entry **end_lgot_ents;
11977 struct plt_entry **local_plt;
11978 struct plt_entry **end_local_plt;
f961d9dd 11979 unsigned char *lgot_masks;
927be08e
AM
11980 bfd_size_type locsymcount;
11981 Elf_Internal_Shdr *symtab_hdr;
19e08130 11982 asection *s;
927be08e
AM
11983
11984 if (!is_ppc64_elf (ibfd))
11985 continue;
11986
11987 lgot_ents = elf_local_got_ents (ibfd);
11988 if (!lgot_ents)
11989 continue;
11990
11991 symtab_hdr = &elf_symtab_hdr (ibfd);
11992 locsymcount = symtab_hdr->sh_info;
11993 end_lgot_ents = lgot_ents + locsymcount;
11994 local_plt = (struct plt_entry **) end_lgot_ents;
11995 end_local_plt = local_plt + locsymcount;
f961d9dd 11996 lgot_masks = (unsigned char *) end_local_plt;
927be08e 11997 s = ppc64_elf_tdata (ibfd)->got;
927be08e
AM
11998 for (; lgot_ents < end_lgot_ents; ++lgot_ents, ++lgot_masks)
11999 {
12000 struct got_entry *ent;
12001
12002 for (ent = *lgot_ents; ent != NULL; ent = ent->next)
d0fae19d 12003 {
19e08130
AM
12004 unsigned int ent_size = 8;
12005 unsigned int rel_size = sizeof (Elf64_External_Rela);
12006
d0fae19d
AM
12007 ent->got.offset = s->size;
12008 if ((ent->tls_type & *lgot_masks & TLS_GD) != 0)
d0fae19d 12009 {
19e08130
AM
12010 ent_size *= 2;
12011 rel_size *= 2;
12012 }
12013 s->size += ent_size;
37da22e5 12014 if ((*lgot_masks & (TLS_TLS | PLT_IFUNC)) == PLT_IFUNC)
19e08130 12015 {
33e44f2e 12016 htab->elf.irelplt->size += rel_size;
19e08130
AM
12017 htab->got_reli_size += rel_size;
12018 }
6a3858a6
AM
12019 else if (bfd_link_pic (info)
12020 && !((ent->tls_type & TLS_TPREL) != 0
12021 && bfd_link_executable (info)))
19e08130
AM
12022 {
12023 asection *srel = ppc64_elf_tdata (ibfd)->relgot;
12024 srel->size += rel_size;
d0fae19d
AM
12025 }
12026 }
927be08e
AM
12027 }
12028 }
12029
12030 elf_link_hash_traverse (&htab->elf, reallocate_got, info);
12031
c72f2fb2 12032 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
927be08e
AM
12033 {
12034 struct got_entry *ent;
12035
12036 if (!is_ppc64_elf (ibfd))
12037 continue;
12038
12039 ent = ppc64_tlsld_got (ibfd);
12040 if (!ent->is_indirect
12041 && ent->got.offset != (bfd_vma) -1)
12042 {
12043 asection *s = ppc64_elf_tdata (ibfd)->got;
12044 ent->got.offset = s->size;
12045 s->size += 16;
0e1862bb 12046 if (bfd_link_pic (info))
927be08e
AM
12047 {
12048 asection *srel = ppc64_elf_tdata (ibfd)->relgot;
12049 srel->size += sizeof (Elf64_External_Rela);
12050 }
12051 }
12052 }
12053
33e44f2e 12054 done_something = htab->elf.irelplt->rawsize != htab->elf.irelplt->size;
927be08e 12055 if (!done_something)
c72f2fb2 12056 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
927be08e
AM
12057 {
12058 asection *got;
12059
12060 if (!is_ppc64_elf (ibfd))
12061 continue;
12062
12063 got = ppc64_elf_tdata (ibfd)->got;
12064 if (got != NULL)
12065 {
12066 done_something = got->rawsize != got->size;
12067 if (done_something)
12068 break;
12069 }
12070 }
12071
12072 if (done_something)
e7d1c40c 12073 (*htab->params->layout_sections_again) ();
927be08e
AM
12074
12075 /* Set up for second pass over toc sections to recalculate elf_gp
12076 on input sections. */
12077 htab->toc_bfd = NULL;
12078 htab->toc_first_sec = NULL;
12079 htab->second_toc_pass = TRUE;
12080 return done_something;
12081}
12082
12083/* Called after second pass of multitoc partitioning. */
12084
12085void
12086ppc64_elf_finish_multitoc_partition (struct bfd_link_info *info)
12087{
12088 struct ppc_link_hash_table *htab = ppc_hash_table (info);
12089
12090 /* After the second pass, toc_curr tracks the TOC offset used
12091 for code sections below in ppc64_elf_next_input_section. */
3d6f9012 12092 htab->toc_curr = TOC_BASE_OFF;
ad8e1ba5
AM
12093}
12094
9b5ecbd0
AM
12095/* No toc references were found in ISEC. If the code in ISEC makes no
12096 calls, then there's no need to use toc adjusting stubs when branching
12097 into ISEC. Actually, indirect calls from ISEC are OK as they will
4c52953f
AM
12098 load r2. Returns -1 on error, 0 for no stub needed, 1 for stub
12099 needed, and 2 if a cyclical call-graph was found but no other reason
12100 for a stub was detected. If called from the top level, a return of
12101 2 means the same as a return of 0. */
9b5ecbd0
AM
12102
12103static int
4ce794b7 12104toc_adjusting_stub_needed (struct bfd_link_info *info, asection *isec)
9b5ecbd0 12105{
9b5ecbd0 12106 int ret;
70cc837d
AM
12107
12108 /* Mark this section as checked. */
12109 isec->call_check_done = 1;
9b5ecbd0 12110
772119ce
AM
12111 /* We know none of our code bearing sections will need toc stubs. */
12112 if ((isec->flags & SEC_LINKER_CREATED) != 0)
12113 return 0;
12114
eea6121a 12115 if (isec->size == 0)
082c50f8
AM
12116 return 0;
12117
4c52953f
AM
12118 if (isec->output_section == NULL)
12119 return 0;
12120
4c52953f 12121 ret = 0;
70cc837d 12122 if (isec->reloc_count != 0)
9b5ecbd0 12123 {
70cc837d
AM
12124 Elf_Internal_Rela *relstart, *rel;
12125 Elf_Internal_Sym *local_syms;
12126 struct ppc_link_hash_table *htab;
2917689a 12127
70cc837d
AM
12128 relstart = _bfd_elf_link_read_relocs (isec->owner, isec, NULL, NULL,
12129 info->keep_memory);
12130 if (relstart == NULL)
12131 return -1;
90aecf7a 12132
70cc837d
AM
12133 /* Look for branches to outside of this section. */
12134 local_syms = NULL;
12135 htab = ppc_hash_table (info);
12136 if (htab == NULL)
12137 return -1;
4c52953f 12138
70cc837d 12139 for (rel = relstart; rel < relstart + isec->reloc_count; ++rel)
4c52953f 12140 {
70cc837d
AM
12141 enum elf_ppc64_reloc_type r_type;
12142 unsigned long r_symndx;
12143 struct elf_link_hash_entry *h;
12144 struct ppc_link_hash_entry *eh;
12145 Elf_Internal_Sym *sym;
12146 asection *sym_sec;
12147 struct _opd_sec_data *opd;
12148 bfd_vma sym_value;
12149 bfd_vma dest;
12150
12151 r_type = ELF64_R_TYPE (rel->r_info);
12152 if (r_type != R_PPC64_REL24
12153 && r_type != R_PPC64_REL14
12154 && r_type != R_PPC64_REL14_BRTAKEN
23cedd1d
AM
12155 && r_type != R_PPC64_REL14_BRNTAKEN
12156 && r_type != R_PPC64_PLTCALL)
70cc837d 12157 continue;
4c52953f 12158
70cc837d
AM
12159 r_symndx = ELF64_R_SYM (rel->r_info);
12160 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms, r_symndx,
12161 isec->owner))
4c52953f 12162 {
70cc837d
AM
12163 ret = -1;
12164 break;
12165 }
4c52953f 12166
70cc837d
AM
12167 /* Calls to dynamic lib functions go through a plt call stub
12168 that uses r2. */
12169 eh = (struct ppc_link_hash_entry *) h;
12170 if (eh != NULL
12171 && (eh->elf.plt.plist != NULL
12172 || (eh->oh != NULL
12173 && ppc_follow_link (eh->oh)->elf.plt.plist != NULL)))
12174 {
12175 ret = 1;
12176 break;
4c52953f
AM
12177 }
12178
70cc837d
AM
12179 if (sym_sec == NULL)
12180 /* Ignore other undefined symbols. */
4c52953f 12181 continue;
4c52953f 12182
70cc837d
AM
12183 /* Assume branches to other sections not included in the
12184 link need stubs too, to cover -R and absolute syms. */
12185 if (sym_sec->output_section == NULL)
12186 {
12187 ret = 1;
12188 break;
12189 }
4c52953f 12190
70cc837d
AM
12191 if (h == NULL)
12192 sym_value = sym->st_value;
12193 else
12194 {
12195 if (h->root.type != bfd_link_hash_defined
12196 && h->root.type != bfd_link_hash_defweak)
12197 abort ();
12198 sym_value = h->root.u.def.value;
12199 }
12200 sym_value += rel->r_addend;
4c52953f 12201
70cc837d
AM
12202 /* If this branch reloc uses an opd sym, find the code section. */
12203 opd = get_opd_info (sym_sec);
12204 if (opd != NULL)
12205 {
12206 if (h == NULL && opd->adjust != NULL)
12207 {
12208 long adjust;
4c52953f 12209
92a9c616 12210 adjust = opd->adjust[OPD_NDX (sym_value)];
70cc837d
AM
12211 if (adjust == -1)
12212 /* Assume deleted functions won't ever be called. */
12213 continue;
12214 sym_value += adjust;
12215 }
4c52953f 12216
aef36ac1
AM
12217 dest = opd_entry_value (sym_sec, sym_value,
12218 &sym_sec, NULL, FALSE);
70cc837d
AM
12219 if (dest == (bfd_vma) -1)
12220 continue;
12221 }
12222 else
12223 dest = (sym_value
12224 + sym_sec->output_offset
12225 + sym_sec->output_section->vma);
4c52953f 12226
70cc837d
AM
12227 /* Ignore branch to self. */
12228 if (sym_sec == isec)
12229 continue;
4c52953f 12230
70cc837d
AM
12231 /* If the called function uses the toc, we need a stub. */
12232 if (sym_sec->has_toc_reloc
12233 || sym_sec->makes_toc_func_call)
4c52953f 12234 {
70cc837d 12235 ret = 1;
4c52953f
AM
12236 break;
12237 }
70cc837d
AM
12238
12239 /* Assume any branch that needs a long branch stub might in fact
12240 need a plt_branch stub. A plt_branch stub uses r2. */
12241 else if (dest - (isec->output_offset
12242 + isec->output_section->vma
6911b7dc
AM
12243 + rel->r_offset) + (1 << 25)
12244 >= (2u << 25) - PPC64_LOCAL_ENTRY_OFFSET (h
12245 ? h->other
12246 : sym->st_other))
4c52953f 12247 {
70cc837d
AM
12248 ret = 1;
12249 break;
12250 }
12251
12252 /* If calling back to a section in the process of being
12253 tested, we can't say for sure that no toc adjusting stubs
12254 are needed, so don't return zero. */
12255 else if (sym_sec->call_check_in_progress)
12256 ret = 2;
12257
12258 /* Branches to another section that itself doesn't have any TOC
12259 references are OK. Recursively call ourselves to check. */
12260 else if (!sym_sec->call_check_done)
12261 {
12262 int recur;
12263
12264 /* Mark current section as indeterminate, so that other
12265 sections that call back to current won't be marked as
12266 known. */
12267 isec->call_check_in_progress = 1;
12268 recur = toc_adjusting_stub_needed (info, sym_sec);
12269 isec->call_check_in_progress = 0;
12270
4c52953f
AM
12271 if (recur != 0)
12272 {
70cc837d
AM
12273 ret = recur;
12274 if (recur != 2)
12275 break;
4c52953f
AM
12276 }
12277 }
4c52953f 12278 }
70cc837d
AM
12279
12280 if (local_syms != NULL
12281 && (elf_symtab_hdr (isec->owner).contents
12282 != (unsigned char *) local_syms))
12283 free (local_syms);
12284 if (elf_section_data (isec)->relocs != relstart)
12285 free (relstart);
9b5ecbd0
AM
12286 }
12287
70cc837d
AM
12288 if ((ret & 1) == 0
12289 && isec->map_head.s != NULL
12290 && (strcmp (isec->output_section->name, ".init") == 0
12291 || strcmp (isec->output_section->name, ".fini") == 0))
12292 {
12293 if (isec->map_head.s->has_toc_reloc
12294 || isec->map_head.s->makes_toc_func_call)
12295 ret = 1;
12296 else if (!isec->map_head.s->call_check_done)
12297 {
12298 int recur;
12299 isec->call_check_in_progress = 1;
12300 recur = toc_adjusting_stub_needed (info, isec->map_head.s);
12301 isec->call_check_in_progress = 0;
12302 if (recur != 0)
12303 ret = recur;
12304 }
12305 }
12306
12307 if (ret == 1)
12308 isec->makes_toc_func_call = 1;
4c52953f 12309
9b5ecbd0
AM
12310 return ret;
12311}
12312
721956f4
AM
12313/* The linker repeatedly calls this function for each input section,
12314 in the order that input sections are linked into output sections.
12315 Build lists of input sections to determine groupings between which
12316 we may insert linker stubs. */
12317
9b5ecbd0 12318bfd_boolean
4ce794b7 12319ppc64_elf_next_input_section (struct bfd_link_info *info, asection *isec)
721956f4
AM
12320{
12321 struct ppc_link_hash_table *htab = ppc_hash_table (info);
12322
4dfe6ac6
NC
12323 if (htab == NULL)
12324 return FALSE;
12325
734b6cf9 12326 if ((isec->output_section->flags & SEC_CODE) != 0
6f20ed8a 12327 && isec->output_section->id < htab->sec_info_arr_size)
721956f4 12328 {
3d6f9012
AM
12329 /* This happens to make the list in reverse order,
12330 which is what we want. */
6f20ed8a
AM
12331 htab->sec_info[isec->id].u.list
12332 = htab->sec_info[isec->output_section->id].u.list;
12333 htab->sec_info[isec->output_section->id].u.list = isec;
721956f4 12334 }
ad8e1ba5 12335
4c52953f 12336 if (htab->multi_toc_needed)
9b5ecbd0 12337 {
8b974ba3
AM
12338 /* Analyse sections that aren't already flagged as needing a
12339 valid toc pointer. Exclude .fixup for the linux kernel.
12340 .fixup contains branches, but only back to the function that
12341 hit an exception. */
12342 if (!(isec->has_toc_reloc
12343 || (isec->flags & SEC_CODE) == 0
12344 || strcmp (isec->name, ".fixup") == 0
12345 || isec->call_check_done))
12346 {
12347 if (toc_adjusting_stub_needed (info, isec) < 0)
6683a28d 12348 return FALSE;
8b974ba3
AM
12349 }
12350 /* Make all sections use the TOC assigned for this object file.
12351 This will be wrong for pasted sections; We fix that in
12352 check_pasted_section(). */
12353 if (elf_gp (isec->owner) != 0)
12354 htab->toc_curr = elf_gp (isec->owner);
12355 }
12356
6f20ed8a 12357 htab->sec_info[isec->id].toc_off = htab->toc_curr;
9b5ecbd0 12358 return TRUE;
721956f4
AM
12359}
12360
70cc837d
AM
12361/* Check that all .init and .fini sections use the same toc, if they
12362 have toc relocs. */
12363
12364static bfd_boolean
12365check_pasted_section (struct bfd_link_info *info, const char *name)
12366{
12367 asection *o = bfd_get_section_by_name (info->output_bfd, name);
12368
12369 if (o != NULL)
12370 {
12371 struct ppc_link_hash_table *htab = ppc_hash_table (info);
12372 bfd_vma toc_off = 0;
12373 asection *i;
12374
12375 for (i = o->map_head.s; i != NULL; i = i->map_head.s)
12376 if (i->has_toc_reloc)
12377 {
12378 if (toc_off == 0)
6f20ed8a
AM
12379 toc_off = htab->sec_info[i->id].toc_off;
12380 else if (toc_off != htab->sec_info[i->id].toc_off)
70cc837d
AM
12381 return FALSE;
12382 }
6683a28d
AM
12383
12384 if (toc_off == 0)
12385 for (i = o->map_head.s; i != NULL; i = i->map_head.s)
12386 if (i->makes_toc_func_call)
12387 {
6f20ed8a 12388 toc_off = htab->sec_info[i->id].toc_off;
6683a28d
AM
12389 break;
12390 }
12391
70cc837d
AM
12392 /* Make sure the whole pasted function uses the same toc offset. */
12393 if (toc_off != 0)
12394 for (i = o->map_head.s; i != NULL; i = i->map_head.s)
6f20ed8a 12395 htab->sec_info[i->id].toc_off = toc_off;
70cc837d
AM
12396 }
12397 return TRUE;
12398}
12399
12400bfd_boolean
12401ppc64_elf_check_init_fini (struct bfd_link_info *info)
12402{
12403 return (check_pasted_section (info, ".init")
12404 & check_pasted_section (info, ".fini"));
12405}
12406
721956f4
AM
12407/* See whether we can group stub sections together. Grouping stub
12408 sections may result in fewer stubs. More importantly, we need to
12409 put all .init* and .fini* stubs at the beginning of the .init or
12410 .fini output sections respectively, because glibc splits the
12411 _init and _fini functions into multiple parts. Putting a stub in
12412 the middle of a function is not a good idea. */
12413
6f20ed8a
AM
12414static bfd_boolean
12415group_sections (struct bfd_link_info *info,
4ce794b7
AM
12416 bfd_size_type stub_group_size,
12417 bfd_boolean stubs_always_before_branch)
721956f4 12418{
6f20ed8a
AM
12419 struct ppc_link_hash_table *htab;
12420 asection *osec;
7c8fe5c4
AM
12421 bfd_boolean suppress_size_errors;
12422
6f20ed8a
AM
12423 htab = ppc_hash_table (info);
12424 if (htab == NULL)
12425 return FALSE;
12426
7c8fe5c4 12427 suppress_size_errors = FALSE;
7c8fe5c4
AM
12428 if (stub_group_size == 1)
12429 {
12430 /* Default values. */
12431 if (stubs_always_before_branch)
09f92717 12432 stub_group_size = 0x1e00000;
7c8fe5c4 12433 else
09f92717 12434 stub_group_size = 0x1c00000;
7c8fe5c4
AM
12435 suppress_size_errors = TRUE;
12436 }
12437
6f20ed8a 12438 for (osec = info->output_bfd->sections; osec != NULL; osec = osec->next)
721956f4 12439 {
6f20ed8a
AM
12440 asection *tail;
12441
12442 if (osec->id >= htab->sec_info_arr_size)
12443 continue;
12444
12445 tail = htab->sec_info[osec->id].u.list;
734b6cf9 12446 while (tail != NULL)
721956f4 12447 {
734b6cf9
AM
12448 asection *curr;
12449 asection *prev;
12450 bfd_size_type total;
12451 bfd_boolean big_sec;
12452 bfd_vma curr_toc;
6f20ed8a 12453 struct map_stub *group;
09f92717 12454 bfd_size_type group_size;
734b6cf9
AM
12455
12456 curr = tail;
eea6121a 12457 total = tail->size;
09f92717
AM
12458 group_size = (ppc64_elf_section_data (tail) != NULL
12459 && ppc64_elf_section_data (tail)->has_14bit_branch
12460 ? stub_group_size >> 10 : stub_group_size);
12461
12462 big_sec = total > group_size;
7c8fe5c4 12463 if (big_sec && !suppress_size_errors)
695344c0 12464 /* xgettext:c-format */
871b3ab2 12465 _bfd_error_handler (_("%pB section %pA exceeds stub group size"),
4eca0228 12466 tail->owner, tail);
6f20ed8a 12467 curr_toc = htab->sec_info[tail->id].toc_off;
734b6cf9 12468
6f20ed8a 12469 while ((prev = htab->sec_info[curr->id].u.list) != NULL
734b6cf9 12470 && ((total += curr->output_offset - prev->output_offset)
6bee8834
AM
12471 < (ppc64_elf_section_data (prev) != NULL
12472 && ppc64_elf_section_data (prev)->has_14bit_branch
09f92717 12473 ? (group_size = stub_group_size >> 10) : group_size))
6f20ed8a 12474 && htab->sec_info[prev->id].toc_off == curr_toc)
734b6cf9
AM
12475 curr = prev;
12476
12477 /* OK, the size from the start of CURR to the end is less
09f92717 12478 than group_size and thus can be handled by one stub
734b6cf9 12479 section. (or the tail section is itself larger than
09f92717
AM
12480 group_size, in which case we may be toast.) We should
12481 really be keeping track of the total size of stubs added
12482 here, as stubs contribute to the final output section
12483 size. That's a little tricky, and this way will only
12484 break if stubs added make the total size more than 2^25,
12485 ie. for the default stub_group_size, if stubs total more
12486 than 2097152 bytes, or nearly 75000 plt call stubs. */
6f20ed8a
AM
12487 group = bfd_alloc (curr->owner, sizeof (*group));
12488 if (group == NULL)
12489 return FALSE;
12490 group->link_sec = curr;
12491 group->stub_sec = NULL;
a4b6fadd 12492 group->needs_save_res = 0;
d4aaa2a0 12493 group->tls_get_addr_opt_bctrl = -1u;
a4b6fadd
AM
12494 group->next = htab->group;
12495 htab->group = group;
734b6cf9 12496 do
721956f4 12497 {
6f20ed8a 12498 prev = htab->sec_info[tail->id].u.list;
734b6cf9 12499 /* Set up this stub group. */
6f20ed8a 12500 htab->sec_info[tail->id].u.group = group;
721956f4 12501 }
734b6cf9
AM
12502 while (tail != curr && (tail = prev) != NULL);
12503
09f92717 12504 /* But wait, there's more! Input sections up to group_size
734b6cf9
AM
12505 bytes before the stub section can be handled by it too.
12506 Don't do this if we have a really large section after the
12507 stubs, as adding more stubs increases the chance that
12508 branches may not reach into the stub section. */
12509 if (!stubs_always_before_branch && !big_sec)
12510 {
12511 total = 0;
12512 while (prev != NULL
12513 && ((total += tail->output_offset - prev->output_offset)
6bee8834
AM
12514 < (ppc64_elf_section_data (prev) != NULL
12515 && ppc64_elf_section_data (prev)->has_14bit_branch
09f92717 12516 ? (group_size = stub_group_size >> 10) : group_size))
6f20ed8a 12517 && htab->sec_info[prev->id].toc_off == curr_toc)
734b6cf9
AM
12518 {
12519 tail = prev;
6f20ed8a
AM
12520 prev = htab->sec_info[tail->id].u.list;
12521 htab->sec_info[tail->id].u.group = group;
734b6cf9
AM
12522 }
12523 }
12524 tail = prev;
721956f4
AM
12525 }
12526 }
6f20ed8a 12527 return TRUE;
721956f4
AM
12528}
12529
58d180e8
AM
12530static const unsigned char glink_eh_frame_cie[] =
12531{
12532 0, 0, 0, 16, /* length. */
12533 0, 0, 0, 0, /* id. */
12534 1, /* CIE version. */
12535 'z', 'R', 0, /* Augmentation string. */
12536 4, /* Code alignment. */
12537 0x78, /* Data alignment. */
12538 65, /* RA reg. */
12539 1, /* Augmentation size. */
12540 DW_EH_PE_pcrel | DW_EH_PE_sdata4, /* FDE encoding. */
2e0ce1c8 12541 DW_CFA_def_cfa, 1, 0 /* def_cfa: r1 offset 0. */
58d180e8
AM
12542};
12543
d4aaa2a0
AM
12544static size_t
12545stub_eh_frame_size (struct map_stub *group, size_t align)
12546{
12547 size_t this_size = 17;
12548 if (group->tls_get_addr_opt_bctrl != -1u)
12549 {
12550 unsigned int to_bctrl = group->tls_get_addr_opt_bctrl / 4;
12551 if (to_bctrl < 64)
12552 this_size += 1;
12553 else if (to_bctrl < 256)
12554 this_size += 2;
12555 else if (to_bctrl < 65536)
12556 this_size += 3;
12557 else
12558 this_size += 5;
12559 this_size += 6;
12560 }
12561 this_size = (this_size + align - 1) & -align;
12562 return this_size;
12563}
12564
d969d15f
AM
12565/* Stripping output sections is normally done before dynamic section
12566 symbols have been allocated. This function is called later, and
12567 handles cases like htab->brlt which is mapped to its own output
12568 section. */
12569
12570static void
12571maybe_strip_output (struct bfd_link_info *info, asection *isec)
12572{
12573 if (isec->size == 0
12574 && isec->output_section->size == 0
53d8967a 12575 && !(isec->output_section->flags & SEC_KEEP)
d969d15f
AM
12576 && !bfd_section_removed_from_list (info->output_bfd,
12577 isec->output_section)
12578 && elf_section_data (isec->output_section)->dynindx == 0)
12579 {
12580 isec->output_section->flags |= SEC_EXCLUDE;
12581 bfd_section_list_remove (info->output_bfd, isec->output_section);
12582 info->output_bfd->section_count--;
12583 }
12584}
12585
721956f4
AM
12586/* Determine and set the size of the stub section for a final link.
12587
12588 The basic idea here is to examine all the relocations looking for
12589 PC-relative calls to a target that is unreachable with a "bl"
12590 instruction. */
12591
b34976b6 12592bfd_boolean
e7d1c40c 12593ppc64_elf_size_stubs (struct bfd_link_info *info)
721956f4
AM
12594{
12595 bfd_size_type stub_group_size;
b34976b6 12596 bfd_boolean stubs_always_before_branch;
721956f4
AM
12597 struct ppc_link_hash_table *htab = ppc_hash_table (info);
12598
4dfe6ac6
NC
12599 if (htab == NULL)
12600 return FALSE;
12601
0e1862bb 12602 if (htab->params->plt_thread_safe == -1 && !bfd_link_executable (info))
e7d1c40c 12603 htab->params->plt_thread_safe = 1;
b9e5796b 12604 if (!htab->opd_abi)
e7d1c40c
AM
12605 htab->params->plt_thread_safe = 0;
12606 else if (htab->params->plt_thread_safe == -1)
794e51c0 12607 {
e2458743 12608 static const char *const thread_starter[] =
794e51c0
AM
12609 {
12610 "pthread_create",
12611 /* libstdc++ */
12612 "_ZNSt6thread15_M_start_threadESt10shared_ptrINS_10_Impl_baseEE",
12613 /* librt */
12614 "aio_init", "aio_read", "aio_write", "aio_fsync", "lio_listio",
12615 "mq_notify", "create_timer",
12616 /* libanl */
12617 "getaddrinfo_a",
12618 /* libgomp */
2300b5a1 12619 "GOMP_parallel",
794e51c0 12620 "GOMP_parallel_start",
2300b5a1 12621 "GOMP_parallel_loop_static",
794e51c0 12622 "GOMP_parallel_loop_static_start",
2300b5a1 12623 "GOMP_parallel_loop_dynamic",
794e51c0 12624 "GOMP_parallel_loop_dynamic_start",
2300b5a1 12625 "GOMP_parallel_loop_guided",
794e51c0 12626 "GOMP_parallel_loop_guided_start",
2300b5a1 12627 "GOMP_parallel_loop_runtime",
794e51c0 12628 "GOMP_parallel_loop_runtime_start",
2300b5a1 12629 "GOMP_parallel_sections",
68ffbac6 12630 "GOMP_parallel_sections_start",
f9dffbf0
AM
12631 /* libgo */
12632 "__go_go",
794e51c0
AM
12633 };
12634 unsigned i;
12635
a4b6fadd 12636 for (i = 0; i < ARRAY_SIZE (thread_starter); i++)
794e51c0
AM
12637 {
12638 struct elf_link_hash_entry *h;
12639 h = elf_link_hash_lookup (&htab->elf, thread_starter[i],
12640 FALSE, FALSE, TRUE);
e7d1c40c
AM
12641 htab->params->plt_thread_safe = h != NULL && h->ref_regular;
12642 if (htab->params->plt_thread_safe)
794e51c0
AM
12643 break;
12644 }
12645 }
e7d1c40c
AM
12646 stubs_always_before_branch = htab->params->group_size < 0;
12647 if (htab->params->group_size < 0)
12648 stub_group_size = -htab->params->group_size;
721956f4 12649 else
e7d1c40c 12650 stub_group_size = htab->params->group_size;
721956f4 12651
6f20ed8a
AM
12652 if (!group_sections (info, stub_group_size, stubs_always_before_branch))
12653 return FALSE;
721956f4 12654
c9301e31
AM
12655#define STUB_SHRINK_ITER 20
12656 /* Loop until no stubs added. After iteration 20 of this loop we may
12657 exit on a stub section shrinking. This is to break out of a
12658 pathological case where adding stubs on one iteration decreases
12659 section gaps (perhaps due to alignment), which then requires
12660 fewer or smaller stubs on the next iteration. */
12661
721956f4
AM
12662 while (1)
12663 {
12664 bfd *input_bfd;
12665 unsigned int bfd_indx;
a4b6fadd 12666 struct map_stub *group;
721956f4
AM
12667
12668 htab->stub_iteration += 1;
721956f4
AM
12669
12670 for (input_bfd = info->input_bfds, bfd_indx = 0;
12671 input_bfd != NULL;
c72f2fb2 12672 input_bfd = input_bfd->link.next, bfd_indx++)
721956f4
AM
12673 {
12674 Elf_Internal_Shdr *symtab_hdr;
12675 asection *section;
6cdc0ccc 12676 Elf_Internal_Sym *local_syms = NULL;
721956f4 12677
0c8d6e5c 12678 if (!is_ppc64_elf (input_bfd))
67f93c31
AM
12679 continue;
12680
721956f4 12681 /* We'll need the symbol table in a second. */
0ffa91dd 12682 symtab_hdr = &elf_symtab_hdr (input_bfd);
721956f4
AM
12683 if (symtab_hdr->sh_info == 0)
12684 continue;
12685
721956f4
AM
12686 /* Walk over each section attached to the input bfd. */
12687 for (section = input_bfd->sections;
12688 section != NULL;
12689 section = section->next)
12690 {
721956f4 12691 Elf_Internal_Rela *internal_relocs, *irelaend, *irela;
721956f4
AM
12692
12693 /* If there aren't any relocs, then there's nothing more
12694 to do. */
12695 if ((section->flags & SEC_RELOC) == 0
12c0f757
AM
12696 || (section->flags & SEC_ALLOC) == 0
12697 || (section->flags & SEC_LOAD) == 0
12698 || (section->flags & SEC_CODE) == 0
721956f4
AM
12699 || section->reloc_count == 0)
12700 continue;
12701
12702 /* If this section is a link-once section that will be
12703 discarded, then don't create any stubs. */
12704 if (section->output_section == NULL
927be08e 12705 || section->output_section->owner != info->output_bfd)
721956f4
AM
12706 continue;
12707
1e2f5b6e
AM
12708 /* Get the relocs. */
12709 internal_relocs
4ce794b7 12710 = _bfd_elf_link_read_relocs (input_bfd, section, NULL, NULL,
45d6a902 12711 info->keep_memory);
721956f4 12712 if (internal_relocs == NULL)
1e2f5b6e 12713 goto error_ret_free_local;
721956f4
AM
12714
12715 /* Now examine each relocation. */
12716 irela = internal_relocs;
12717 irelaend = irela + section->reloc_count;
12718 for (; irela < irelaend; irela++)
12719 {
4ce794b7
AM
12720 enum elf_ppc64_reloc_type r_type;
12721 unsigned int r_indx;
721956f4
AM
12722 enum ppc_stub_type stub_type;
12723 struct ppc_stub_hash_entry *stub_entry;
8387904d 12724 asection *sym_sec, *code_sec;
e054468f 12725 bfd_vma sym_value, code_value;
721956f4 12726 bfd_vma destination;
6911b7dc 12727 unsigned long local_off;
8843416a 12728 bfd_boolean ok_dest;
721956f4 12729 struct ppc_link_hash_entry *hash;
8387904d 12730 struct ppc_link_hash_entry *fdh;
411e1bfb
AM
12731 struct elf_link_hash_entry *h;
12732 Elf_Internal_Sym *sym;
721956f4
AM
12733 char *stub_name;
12734 const asection *id_sec;
74f0fb50 12735 struct _opd_sec_data *opd;
e054468f 12736 struct plt_entry *plt_ent;
721956f4
AM
12737
12738 r_type = ELF64_R_TYPE (irela->r_info);
12739 r_indx = ELF64_R_SYM (irela->r_info);
12740
4ce794b7 12741 if (r_type >= R_PPC64_max)
721956f4
AM
12742 {
12743 bfd_set_error (bfd_error_bad_value);
6cdc0ccc 12744 goto error_ret_free_internal;
721956f4
AM
12745 }
12746
12747 /* Only look for stubs on branch instructions. */
4ce794b7
AM
12748 if (r_type != R_PPC64_REL24
12749 && r_type != R_PPC64_REL14
12750 && r_type != R_PPC64_REL14_BRTAKEN
12751 && r_type != R_PPC64_REL14_BRNTAKEN)
721956f4
AM
12752 continue;
12753
12754 /* Now determine the call target, its name, value,
12755 section. */
411e1bfb
AM
12756 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms,
12757 r_indx, input_bfd))
12758 goto error_ret_free_internal;
12759 hash = (struct ppc_link_hash_entry *) h;
12760
8843416a 12761 ok_dest = FALSE;
8387904d 12762 fdh = NULL;
7fe2b9a6 12763 sym_value = 0;
411e1bfb 12764 if (hash == NULL)
721956f4 12765 {
411e1bfb 12766 sym_value = sym->st_value;
c27b8c2a
AM
12767 if (sym_sec != NULL
12768 && sym_sec->output_section != NULL)
12769 ok_dest = TRUE;
721956f4 12770 }
7fe2b9a6
AM
12771 else if (hash->elf.root.type == bfd_link_hash_defined
12772 || hash->elf.root.type == bfd_link_hash_defweak)
12773 {
12774 sym_value = hash->elf.root.u.def.value;
12775 if (sym_sec->output_section != NULL)
12776 ok_dest = TRUE;
12777 }
12778 else if (hash->elf.root.type == bfd_link_hash_undefweak
12779 || hash->elf.root.type == bfd_link_hash_undefined)
721956f4 12780 {
99877b66 12781 /* Recognise an old ABI func code entry sym, and
7fe2b9a6
AM
12782 use the func descriptor sym instead if it is
12783 defined. */
ceb1f1ef 12784 if (hash->elf.root.root.string[0] == '.'
8c5b4e52 12785 && hash->oh != NULL)
8387904d 12786 {
8c5b4e52 12787 fdh = ppc_follow_link (hash->oh);
8387904d
AM
12788 if (fdh->elf.root.type == bfd_link_hash_defined
12789 || fdh->elf.root.type == bfd_link_hash_defweak)
12790 {
12791 sym_sec = fdh->elf.root.u.def.section;
12792 sym_value = fdh->elf.root.u.def.value;
12793 if (sym_sec->output_section != NULL)
12794 ok_dest = TRUE;
12795 }
99877b66
AM
12796 else
12797 fdh = NULL;
8387904d 12798 }
7fe2b9a6
AM
12799 }
12800 else
12801 {
12802 bfd_set_error (bfd_error_bad_value);
12803 goto error_ret_free_internal;
721956f4
AM
12804 }
12805
8843416a 12806 destination = 0;
6911b7dc 12807 local_off = 0;
8843416a
AM
12808 if (ok_dest)
12809 {
12810 sym_value += irela->r_addend;
12811 destination = (sym_value
12812 + sym_sec->output_offset
12813 + sym_sec->output_section->vma);
6911b7dc
AM
12814 local_off = PPC64_LOCAL_ENTRY_OFFSET (hash
12815 ? hash->elf.other
12816 : sym->st_other);
8843416a
AM
12817 }
12818
8387904d 12819 code_sec = sym_sec;
e054468f 12820 code_value = sym_value;
74f0fb50
AM
12821 opd = get_opd_info (sym_sec);
12822 if (opd != NULL)
8387904d
AM
12823 {
12824 bfd_vma dest;
12825
74f0fb50 12826 if (hash == NULL && opd->adjust != NULL)
8387904d 12827 {
51aecdc5 12828 long adjust = opd->adjust[OPD_NDX (sym_value)];
8387904d
AM
12829 if (adjust == -1)
12830 continue;
e054468f 12831 code_value += adjust;
8387904d
AM
12832 sym_value += adjust;
12833 }
12834 dest = opd_entry_value (sym_sec, sym_value,
aef36ac1 12835 &code_sec, &code_value, FALSE);
8387904d
AM
12836 if (dest != (bfd_vma) -1)
12837 {
12838 destination = dest;
12839 if (fdh != NULL)
12840 {
12841 /* Fixup old ABI sym to point at code
12842 entry. */
99877b66 12843 hash->elf.root.type = bfd_link_hash_defweak;
8387904d 12844 hash->elf.root.u.def.section = code_sec;
e054468f 12845 hash->elf.root.u.def.value = code_value;
8387904d
AM
12846 }
12847 }
12848 }
12849
721956f4 12850 /* Determine what (if any) linker stub is needed. */
e054468f 12851 plt_ent = NULL;
721956f4 12852 stub_type = ppc_type_of_stub (section, irela, &hash,
6911b7dc
AM
12853 &plt_ent, destination,
12854 local_off);
ad8e1ba5
AM
12855
12856 if (stub_type != ppc_stub_plt_call)
12857 {
12858 /* Check whether we need a TOC adjusting stub.
12859 Since the linker pastes together pieces from
12860 different object files when creating the
12861 _init and _fini functions, it may be that a
12862 call to what looks like a local sym is in
12863 fact a call needing a TOC adjustment. */
8387904d
AM
12864 if (code_sec != NULL
12865 && code_sec->output_section != NULL
6f20ed8a
AM
12866 && (htab->sec_info[code_sec->id].toc_off
12867 != htab->sec_info[section->id].toc_off)
4c52953f
AM
12868 && (code_sec->has_toc_reloc
12869 || code_sec->makes_toc_func_call))
ad8e1ba5
AM
12870 stub_type = ppc_stub_long_branch_r2off;
12871 }
12872
721956f4
AM
12873 if (stub_type == ppc_stub_none)
12874 continue;
12875
411e1bfb
AM
12876 /* __tls_get_addr calls might be eliminated. */
12877 if (stub_type != ppc_stub_plt_call
12878 && hash != NULL
8387904d
AM
12879 && (hash == htab->tls_get_addr
12880 || hash == htab->tls_get_addr_fd)
411e1bfb
AM
12881 && section->has_tls_reloc
12882 && irela != internal_relocs)
12883 {
12884 /* Get tls info. */
f961d9dd 12885 unsigned char *tls_mask;
411e1bfb 12886
3a71aa26 12887 if (!get_tls_mask (&tls_mask, NULL, NULL, &local_syms,
411e1bfb
AM
12888 irela - 1, input_bfd))
12889 goto error_ret_free_internal;
37da22e5 12890 if ((*tls_mask & TLS_TLS) != 0)
411e1bfb
AM
12891 continue;
12892 }
12893
f378ab09 12894 if (stub_type == ppc_stub_plt_call)
794e51c0 12895 {
6e1816be
AM
12896 if (!htab->opd_abi
12897 && htab->params->plt_localentry0 != 0
12898 && is_elfv2_localentry0 (&hash->elf))
12899 htab->has_plt_localentry0 = 1;
12900 else if (irela + 1 < irelaend
12901 && irela[1].r_offset == irela->r_offset + 4
12902 && (ELF64_R_TYPE (irela[1].r_info)
12903 == R_PPC64_TOCSAVE))
f378ab09
AM
12904 {
12905 if (!tocsave_find (htab, INSERT,
12906 &local_syms, irela + 1, input_bfd))
12907 goto error_ret_free_internal;
12908 }
f378ab09
AM
12909 else
12910 stub_type = ppc_stub_plt_call_r2save;
794e51c0 12911 }
3b421ab3 12912
721956f4 12913 /* Support for grouping stub sections. */
6f20ed8a 12914 id_sec = htab->sec_info[section->id].u.group->link_sec;
721956f4
AM
12915
12916 /* Get the name of this stub. */
12917 stub_name = ppc_stub_name (id_sec, sym_sec, hash, irela);
12918 if (!stub_name)
12919 goto error_ret_free_internal;
12920
12921 stub_entry = ppc_stub_hash_lookup (&htab->stub_hash_table,
b34976b6 12922 stub_name, FALSE, FALSE);
721956f4
AM
12923 if (stub_entry != NULL)
12924 {
12925 /* The proper stub has already been created. */
12926 free (stub_name);
794e51c0
AM
12927 if (stub_type == ppc_stub_plt_call_r2save)
12928 stub_entry->stub_type = stub_type;
721956f4
AM
12929 continue;
12930 }
12931
25f53a85 12932 stub_entry = ppc_add_stub (stub_name, section, info);
721956f4
AM
12933 if (stub_entry == NULL)
12934 {
12935 free (stub_name);
6cdc0ccc
AM
12936 error_ret_free_internal:
12937 if (elf_section_data (section)->relocs == NULL)
12938 free (internal_relocs);
12939 error_ret_free_local:
12940 if (local_syms != NULL
12941 && (symtab_hdr->contents
12942 != (unsigned char *) local_syms))
12943 free (local_syms);
b34976b6 12944 return FALSE;
721956f4
AM
12945 }
12946
ad8e1ba5 12947 stub_entry->stub_type = stub_type;
794e51c0
AM
12948 if (stub_type != ppc_stub_plt_call
12949 && stub_type != ppc_stub_plt_call_r2save)
e054468f
AM
12950 {
12951 stub_entry->target_value = code_value;
12952 stub_entry->target_section = code_sec;
12953 }
12954 else
12955 {
12956 stub_entry->target_value = sym_value;
12957 stub_entry->target_section = sym_sec;
12958 }
721956f4 12959 stub_entry->h = hash;
e054468f 12960 stub_entry->plt_ent = plt_ent;
2d7ad24e
AM
12961 stub_entry->symtype
12962 = hash ? hash->elf.type : ELF_ST_TYPE (sym->st_info);
6911b7dc 12963 stub_entry->other = hash ? hash->elf.other : sym->st_other;
ee75fd95
AM
12964
12965 if (stub_entry->h != NULL)
12966 htab->stub_globals += 1;
721956f4
AM
12967 }
12968
12969 /* We're done with the internal relocs, free them. */
6cdc0ccc 12970 if (elf_section_data (section)->relocs != internal_relocs)
1e2f5b6e 12971 free (internal_relocs);
721956f4 12972 }
6cdc0ccc
AM
12973
12974 if (local_syms != NULL
12975 && symtab_hdr->contents != (unsigned char *) local_syms)
12976 {
12977 if (!info->keep_memory)
12978 free (local_syms);
12979 else
12980 symtab_hdr->contents = (unsigned char *) local_syms;
12981 }
721956f4
AM
12982 }
12983
5c3dead3 12984 /* We may have added some stubs. Find out the new size of the
721956f4 12985 stub sections. */
d4aaa2a0
AM
12986 for (group = htab->group; group != NULL; group = group->next)
12987 if (group->stub_sec != NULL)
ee75fd95 12988 {
d4aaa2a0
AM
12989 asection *stub_sec = group->stub_sec;
12990
ea3d7d1c
AM
12991 if (htab->stub_iteration <= STUB_SHRINK_ITER
12992 || stub_sec->rawsize < stub_sec->size)
12993 /* Past STUB_SHRINK_ITER, rawsize is the max size seen. */
12994 stub_sec->rawsize = stub_sec->size;
ee75fd95
AM
12995 stub_sec->size = 0;
12996 stub_sec->reloc_count = 0;
84f5d08e 12997 stub_sec->flags &= ~SEC_RELOC;
ee75fd95 12998 }
eea6121a 12999
ba21f564
AM
13000 if (htab->stub_iteration <= STUB_SHRINK_ITER
13001 || htab->brlt->rawsize < htab->brlt->size)
13002 htab->brlt->rawsize = htab->brlt->size;
eea6121a 13003 htab->brlt->size = 0;
84f5d08e
AM
13004 htab->brlt->reloc_count = 0;
13005 htab->brlt->flags &= ~SEC_RELOC;
ee75fd95 13006 if (htab->relbrlt != NULL)
eea6121a 13007 htab->relbrlt->size = 0;
721956f4 13008
63bc6f6c 13009 bfd_hash_traverse (&htab->stub_hash_table, ppc_size_one_stub, info);
721956f4 13010
a4b6fadd
AM
13011 for (group = htab->group; group != NULL; group = group->next)
13012 if (group->needs_save_res)
13013 group->stub_sec->size += htab->sfpr->size;
13014
176a0d42
AM
13015 if (info->emitrelocations
13016 && htab->glink != NULL && htab->glink->size != 0)
13017 {
13018 htab->glink->reloc_count = 1;
13019 htab->glink->flags |= SEC_RELOC;
13020 }
13021
58d180e8
AM
13022 if (htab->glink_eh_frame != NULL
13023 && !bfd_is_abs_section (htab->glink_eh_frame->output_section)
2d0d44d5 13024 && htab->glink_eh_frame->output_section->size > 8)
58d180e8 13025 {
2e0ce1c8 13026 size_t size = 0, align = 4;
58d180e8 13027
d4aaa2a0
AM
13028 for (group = htab->group; group != NULL; group = group->next)
13029 if (group->stub_sec != NULL)
13030 size += stub_eh_frame_size (group, align);
58d180e8 13031 if (htab->glink != NULL && htab->glink->size != 0)
2e0ce1c8 13032 size += (24 + align - 1) & -align;
58d180e8 13033 if (size != 0)
2e0ce1c8
AM
13034 size += (sizeof (glink_eh_frame_cie) + align - 1) & -align;
13035 align = 1ul << htab->glink_eh_frame->output_section->alignment_power;
13036 size = (size + align - 1) & -align;
58d180e8
AM
13037 htab->glink_eh_frame->rawsize = htab->glink_eh_frame->size;
13038 htab->glink_eh_frame->size = size;
13039 }
13040
e7d1c40c 13041 if (htab->params->plt_stub_align != 0)
d4aaa2a0
AM
13042 for (group = htab->group; group != NULL; group = group->next)
13043 if (group->stub_sec != NULL)
691d2e9a
AM
13044 {
13045 int align = abs (htab->params->plt_stub_align);
13046 group->stub_sec->size
13047 = (group->stub_sec->size + (1 << align) - 1) & -(1 << align);
13048 }
d4aaa2a0
AM
13049
13050 for (group = htab->group; group != NULL; group = group->next)
13051 if (group->stub_sec != NULL
13052 && group->stub_sec->rawsize != group->stub_sec->size
c9301e31 13053 && (htab->stub_iteration <= STUB_SHRINK_ITER
d4aaa2a0 13054 || group->stub_sec->rawsize < group->stub_sec->size))
5c3dead3
AM
13055 break;
13056
d4aaa2a0 13057 if (group == NULL
ba21f564
AM
13058 && (htab->brlt->rawsize == htab->brlt->size
13059 || (htab->stub_iteration > STUB_SHRINK_ITER
13060 && htab->brlt->rawsize > htab->brlt->size))
58d180e8
AM
13061 && (htab->glink_eh_frame == NULL
13062 || htab->glink_eh_frame->rawsize == htab->glink_eh_frame->size))
5c3dead3
AM
13063 break;
13064
721956f4 13065 /* Ask the linker to do its stuff. */
e7d1c40c 13066 (*htab->params->layout_sections_again) ();
721956f4
AM
13067 }
13068
da44f4e5
AM
13069 if (htab->glink_eh_frame != NULL
13070 && htab->glink_eh_frame->size != 0)
13071 {
13072 bfd_vma val;
13073 bfd_byte *p, *last_fde;
13074 size_t last_fde_len, size, align, pad;
d4aaa2a0 13075 struct map_stub *group;
da44f4e5
AM
13076
13077 p = bfd_zalloc (htab->glink_eh_frame->owner, htab->glink_eh_frame->size);
13078 if (p == NULL)
13079 return FALSE;
13080 htab->glink_eh_frame->contents = p;
13081 last_fde = p;
2e0ce1c8 13082 align = 4;
da44f4e5
AM
13083
13084 memcpy (p, glink_eh_frame_cie, sizeof (glink_eh_frame_cie));
13085 /* CIE length (rewrite in case little-endian). */
2e0ce1c8 13086 last_fde_len = ((sizeof (glink_eh_frame_cie) + align - 1) & -align) - 4;
da44f4e5 13087 bfd_put_32 (htab->elf.dynobj, last_fde_len, p);
2e0ce1c8 13088 p += last_fde_len + 4;
da44f4e5 13089
d4aaa2a0
AM
13090 for (group = htab->group; group != NULL; group = group->next)
13091 if (group->stub_sec != NULL)
da44f4e5
AM
13092 {
13093 last_fde = p;
d4aaa2a0 13094 last_fde_len = stub_eh_frame_size (group, align) - 4;
da44f4e5 13095 /* FDE length. */
2e0ce1c8 13096 bfd_put_32 (htab->elf.dynobj, last_fde_len, p);
da44f4e5
AM
13097 p += 4;
13098 /* CIE pointer. */
13099 val = p - htab->glink_eh_frame->contents;
13100 bfd_put_32 (htab->elf.dynobj, val, p);
13101 p += 4;
13102 /* Offset to stub section, written later. */
13103 p += 4;
13104 /* stub section size. */
d4aaa2a0 13105 bfd_put_32 (htab->elf.dynobj, group->stub_sec->size, p);
da44f4e5
AM
13106 p += 4;
13107 /* Augmentation. */
13108 p += 1;
d4aaa2a0
AM
13109 if (group->tls_get_addr_opt_bctrl != -1u)
13110 {
13111 unsigned int to_bctrl = group->tls_get_addr_opt_bctrl / 4;
13112
13113 /* This FDE needs more than just the default.
13114 Describe __tls_get_addr_opt stub LR. */
13115 if (to_bctrl < 64)
13116 *p++ = DW_CFA_advance_loc + to_bctrl;
13117 else if (to_bctrl < 256)
13118 {
13119 *p++ = DW_CFA_advance_loc1;
13120 *p++ = to_bctrl;
13121 }
13122 else if (to_bctrl < 65536)
13123 {
13124 *p++ = DW_CFA_advance_loc2;
13125 bfd_put_16 (htab->elf.dynobj, to_bctrl, p);
13126 p += 2;
13127 }
13128 else
13129 {
13130 *p++ = DW_CFA_advance_loc4;
13131 bfd_put_32 (htab->elf.dynobj, to_bctrl, p);
13132 p += 4;
13133 }
13134 *p++ = DW_CFA_offset_extended_sf;
13135 *p++ = 65;
13136 *p++ = -(STK_LINKER (htab) / 8) & 0x7f;
13137 *p++ = DW_CFA_advance_loc + 4;
13138 *p++ = DW_CFA_restore_extended;
13139 *p++ = 65;
13140 }
da44f4e5 13141 /* Pad. */
d4aaa2a0 13142 p = last_fde + last_fde_len + 4;
da44f4e5
AM
13143 }
13144 if (htab->glink != NULL && htab->glink->size != 0)
13145 {
13146 last_fde = p;
2e0ce1c8 13147 last_fde_len = ((24 + align - 1) & -align) - 4;
da44f4e5 13148 /* FDE length. */
2e0ce1c8 13149 bfd_put_32 (htab->elf.dynobj, last_fde_len, p);
da44f4e5
AM
13150 p += 4;
13151 /* CIE pointer. */
13152 val = p - htab->glink_eh_frame->contents;
13153 bfd_put_32 (htab->elf.dynobj, val, p);
13154 p += 4;
13155 /* Offset to .glink, written later. */
13156 p += 4;
13157 /* .glink size. */
13158 bfd_put_32 (htab->elf.dynobj, htab->glink->size - 8, p);
13159 p += 4;
13160 /* Augmentation. */
13161 p += 1;
13162
13163 *p++ = DW_CFA_advance_loc + 1;
13164 *p++ = DW_CFA_register;
13165 *p++ = 65;
9f08fa5c 13166 *p++ = htab->opd_abi ? 12 : 0;
15a3a14f 13167 *p++ = DW_CFA_advance_loc + (htab->opd_abi ? 5 : 7);
da44f4e5
AM
13168 *p++ = DW_CFA_restore_extended;
13169 *p++ = 65;
2e0ce1c8 13170 p += ((24 + align - 1) & -align) - 24;
da44f4e5
AM
13171 }
13172 /* Subsume any padding into the last FDE if user .eh_frame
13173 sections are aligned more than glink_eh_frame. Otherwise any
13174 zero padding will be seen as a terminator. */
2e0ce1c8 13175 align = 1ul << htab->glink_eh_frame->output_section->alignment_power;
da44f4e5 13176 size = p - htab->glink_eh_frame->contents;
2e0ce1c8 13177 pad = ((size + align - 1) & -align) - size;
da44f4e5
AM
13178 htab->glink_eh_frame->size = size + pad;
13179 bfd_put_32 (htab->elf.dynobj, last_fde_len + pad, last_fde);
13180 }
13181
d969d15f
AM
13182 maybe_strip_output (info, htab->brlt);
13183 if (htab->glink_eh_frame != NULL)
13184 maybe_strip_output (info, htab->glink_eh_frame);
721956f4 13185
b34976b6 13186 return TRUE;
721956f4
AM
13187}
13188
13189/* Called after we have determined section placement. If sections
805fc799 13190 move, we'll be called again. Provide a value for TOCstart. */
721956f4 13191
805fc799 13192bfd_vma
1c865ab2 13193ppc64_elf_set_toc (struct bfd_link_info *info, bfd *obfd)
721956f4 13194{
805fc799 13195 asection *s;
a27e685f 13196 bfd_vma TOCstart, adjust;
721956f4 13197
43417696
AM
13198 if (info != NULL)
13199 {
13200 struct elf_link_hash_entry *h;
13201 struct elf_link_hash_table *htab = elf_hash_table (info);
13202
13203 if (is_elf_hash_table (htab)
13204 && htab->hgot != NULL)
13205 h = htab->hgot;
13206 else
13207 {
13208 h = elf_link_hash_lookup (htab, ".TOC.", FALSE, FALSE, TRUE);
13209 if (is_elf_hash_table (htab))
13210 htab->hgot = h;
13211 }
13212 if (h != NULL
13213 && h->root.type == bfd_link_hash_defined
13214 && !h->root.linker_def
13215 && (!is_elf_hash_table (htab)
13216 || h->def_regular))
13217 {
13218 TOCstart = (h->root.u.def.value - TOC_BASE_OFF
13219 + h->root.u.def.section->output_offset
13220 + h->root.u.def.section->output_section->vma);
13221 _bfd_set_gp_value (obfd, TOCstart);
13222 return TOCstart;
13223 }
13224 }
13225
805fc799
AM
13226 /* The TOC consists of sections .got, .toc, .tocbss, .plt in that
13227 order. The TOC starts where the first of these sections starts. */
13228 s = bfd_get_section_by_name (obfd, ".got");
e054468f 13229 if (s == NULL || (s->flags & SEC_EXCLUDE) != 0)
805fc799 13230 s = bfd_get_section_by_name (obfd, ".toc");
e054468f 13231 if (s == NULL || (s->flags & SEC_EXCLUDE) != 0)
805fc799 13232 s = bfd_get_section_by_name (obfd, ".tocbss");
e054468f 13233 if (s == NULL || (s->flags & SEC_EXCLUDE) != 0)
805fc799 13234 s = bfd_get_section_by_name (obfd, ".plt");
e054468f 13235 if (s == NULL || (s->flags & SEC_EXCLUDE) != 0)
805fc799
AM
13236 {
13237 /* This may happen for
13238 o references to TOC base (SYM@toc / TOC[tc0]) without a
13239 .toc directive
13240 o bad linker script
13241 o --gc-sections and empty TOC sections
13242
13243 FIXME: Warn user? */
13244
13245 /* Look for a likely section. We probably won't even be
13246 using TOCstart. */
13247 for (s = obfd->sections; s != NULL; s = s->next)
e054468f
AM
13248 if ((s->flags & (SEC_ALLOC | SEC_SMALL_DATA | SEC_READONLY
13249 | SEC_EXCLUDE))
805fc799
AM
13250 == (SEC_ALLOC | SEC_SMALL_DATA))
13251 break;
721956f4 13252 if (s == NULL)
805fc799 13253 for (s = obfd->sections; s != NULL; s = s->next)
e054468f 13254 if ((s->flags & (SEC_ALLOC | SEC_SMALL_DATA | SEC_EXCLUDE))
805fc799
AM
13255 == (SEC_ALLOC | SEC_SMALL_DATA))
13256 break;
721956f4 13257 if (s == NULL)
805fc799 13258 for (s = obfd->sections; s != NULL; s = s->next)
e054468f
AM
13259 if ((s->flags & (SEC_ALLOC | SEC_READONLY | SEC_EXCLUDE))
13260 == SEC_ALLOC)
805fc799 13261 break;
721956f4 13262 if (s == NULL)
805fc799 13263 for (s = obfd->sections; s != NULL; s = s->next)
e054468f 13264 if ((s->flags & (SEC_ALLOC | SEC_EXCLUDE)) == SEC_ALLOC)
805fc799
AM
13265 break;
13266 }
721956f4 13267
805fc799
AM
13268 TOCstart = 0;
13269 if (s != NULL)
13270 TOCstart = s->output_section->vma + s->output_offset;
721956f4 13271
a27e685f
AM
13272 /* Force alignment. */
13273 adjust = TOCstart & (TOC_BASE_ALIGN - 1);
13274 TOCstart -= adjust;
1c865ab2
AM
13275 _bfd_set_gp_value (obfd, TOCstart);
13276
810d4e75 13277 if (info != NULL && s != NULL)
1c865ab2
AM
13278 {
13279 struct ppc_link_hash_table *htab = ppc_hash_table (info);
13280
810d4e75
AM
13281 if (htab != NULL)
13282 {
13283 if (htab->elf.hgot != NULL)
13284 {
a27e685f 13285 htab->elf.hgot->root.u.def.value = TOC_BASE_OFF - adjust;
810d4e75
AM
13286 htab->elf.hgot->root.u.def.section = s;
13287 }
13288 }
13289 else
1c865ab2 13290 {
810d4e75
AM
13291 struct bfd_link_hash_entry *bh = NULL;
13292 _bfd_generic_link_add_one_symbol (info, obfd, ".TOC.", BSF_GLOBAL,
a27e685f
AM
13293 s, TOC_BASE_OFF - adjust,
13294 NULL, FALSE, FALSE, &bh);
1c865ab2
AM
13295 }
13296 }
805fc799 13297 return TOCstart;
721956f4
AM
13298}
13299
a345bc8d 13300/* Called via elf_link_hash_traverse from ppc64_elf_build_stubs to
49c09209 13301 write out any global entry stubs, and PLT relocations. */
a345bc8d
AM
13302
13303static bfd_boolean
49c09209 13304build_global_entry_stubs_and_plt (struct elf_link_hash_entry *h, void *inf)
a345bc8d
AM
13305{
13306 struct bfd_link_info *info;
13307 struct ppc_link_hash_table *htab;
49c09209 13308 struct plt_entry *ent;
a345bc8d
AM
13309 asection *s;
13310
13311 if (h->root.type == bfd_link_hash_indirect)
13312 return TRUE;
13313
49c09209
AM
13314 info = inf;
13315 htab = ppc_hash_table (info);
13316 if (htab == NULL)
13317 return FALSE;
13318
13319 for (ent = h->plt.plist; ent != NULL; ent = ent->next)
13320 if (ent->plt.offset != (bfd_vma) -1)
13321 {
13322 /* This symbol has an entry in the procedure linkage
13323 table. Set it up. */
13324 Elf_Internal_Rela rela;
2d7ad24e 13325 asection *plt, *relplt;
49c09209
AM
13326 bfd_byte *loc;
13327
13328 if (!htab->elf.dynamic_sections_created
13329 || h->dynindx == -1)
13330 {
13331 if (!(h->def_regular
13332 && (h->root.type == bfd_link_hash_defined
13333 || h->root.type == bfd_link_hash_defweak)))
13334 continue;
2d7ad24e
AM
13335 if (h->type == STT_GNU_IFUNC)
13336 {
13337 plt = htab->elf.iplt;
13338 relplt = htab->elf.irelplt;
13339 htab->local_ifunc_resolver = 1;
13340 if (htab->opd_abi)
13341 rela.r_info = ELF64_R_INFO (0, R_PPC64_JMP_IREL);
13342 else
13343 rela.r_info = ELF64_R_INFO (0, R_PPC64_IRELATIVE);
13344 }
49c09209 13345 else
2d7ad24e
AM
13346 {
13347 plt = htab->pltlocal;
13348 if (bfd_link_pic (info))
13349 {
13350 relplt = htab->relpltlocal;
13351 if (htab->opd_abi)
13352 rela.r_info = ELF64_R_INFO (0, R_PPC64_JMP_SLOT);
13353 else
13354 rela.r_info = ELF64_R_INFO (0, R_PPC64_RELATIVE);
13355 }
13356 else
13357 relplt = NULL;
13358 }
49c09209
AM
13359 rela.r_addend = (h->root.u.def.value
13360 + h->root.u.def.section->output_offset
13361 + h->root.u.def.section->output_section->vma
13362 + ent->addend);
2d7ad24e
AM
13363
13364 if (relplt == NULL)
13365 {
13366 loc = plt->contents + ent->plt.offset;
13367 bfd_put_64 (info->output_bfd, rela.r_addend, loc);
13368 if (htab->opd_abi)
13369 {
13370 bfd_vma toc = elf_gp (info->output_bfd);
13371 toc += htab->sec_info[h->root.u.def.section->id].toc_off;
13372 bfd_put_64 (info->output_bfd, toc, loc + 8);
13373 }
13374 }
13375 else
13376 {
13377 rela.r_offset = (plt->output_section->vma
13378 + plt->output_offset
13379 + ent->plt.offset);
13380 loc = relplt->contents + (relplt->reloc_count++
13381 * sizeof (Elf64_External_Rela));
13382 bfd_elf64_swap_reloca_out (info->output_bfd, &rela, loc);
13383 }
49c09209
AM
13384 }
13385 else
13386 {
13387 rela.r_offset = (htab->elf.splt->output_section->vma
13388 + htab->elf.splt->output_offset
13389 + ent->plt.offset);
13390 rela.r_info = ELF64_R_INFO (h->dynindx, R_PPC64_JMP_SLOT);
13391 rela.r_addend = ent->addend;
13392 loc = (htab->elf.srelplt->contents
13393 + ((ent->plt.offset - PLT_INITIAL_ENTRY_SIZE (htab))
13394 / PLT_ENTRY_SIZE (htab) * sizeof (Elf64_External_Rela)));
13395 if (h->type == STT_GNU_IFUNC && is_static_defined (h))
13396 htab->maybe_local_ifunc_resolver = 1;
2d7ad24e 13397 bfd_elf64_swap_reloca_out (info->output_bfd, &rela, loc);
49c09209 13398 }
49c09209
AM
13399 }
13400
a345bc8d
AM
13401 if (!h->pointer_equality_needed)
13402 return TRUE;
13403
13404 if (h->def_regular)
13405 return TRUE;
13406
9e390558 13407 s = htab->global_entry;
49c09209
AM
13408 if (s == NULL || s->size == 0)
13409 return TRUE;
13410
13411 for (ent = h->plt.plist; ent != NULL; ent = ent->next)
13412 if (ent->plt.offset != (bfd_vma) -1
13413 && ent->addend == 0)
a345bc8d
AM
13414 {
13415 bfd_byte *p;
13416 asection *plt;
13417 bfd_vma off;
13418
a345bc8d 13419 p = s->contents + h->root.u.def.value;
33e44f2e 13420 plt = htab->elf.splt;
a345bc8d
AM
13421 if (!htab->elf.dynamic_sections_created
13422 || h->dynindx == -1)
2d7ad24e
AM
13423 {
13424 if (h->type == STT_GNU_IFUNC)
13425 plt = htab->elf.iplt;
13426 else
13427 plt = htab->pltlocal;
13428 }
49c09209 13429 off = ent->plt.offset + plt->output_offset + plt->output_section->vma;
a345bc8d
AM
13430 off -= h->root.u.def.value + s->output_offset + s->output_section->vma;
13431
13432 if (off + 0x80008000 > 0xffffffff || (off & 3) != 0)
13433 {
13434 info->callbacks->einfo
c1c8c1ef 13435 (_("%P: linkage table error against `%pT'\n"),
a345bc8d
AM
13436 h->root.root.string);
13437 bfd_set_error (bfd_error_bad_value);
13438 htab->stub_error = TRUE;
13439 }
13440
7341d5e2
AM
13441 htab->stub_count[ppc_stub_global_entry - 1] += 1;
13442 if (htab->params->emit_stub_syms)
13443 {
13444 size_t len = strlen (h->root.root.string);
13445 char *name = bfd_malloc (sizeof "12345678.global_entry." + len);
13446
13447 if (name == NULL)
13448 return FALSE;
13449
13450 sprintf (name, "%08x.global_entry.%s", s->id, h->root.root.string);
13451 h = elf_link_hash_lookup (&htab->elf, name, TRUE, FALSE, FALSE);
13452 if (h == NULL)
13453 return FALSE;
13454 if (h->root.type == bfd_link_hash_new)
13455 {
13456 h->root.type = bfd_link_hash_defined;
13457 h->root.u.def.section = s;
13458 h->root.u.def.value = p - s->contents;
13459 h->ref_regular = 1;
13460 h->def_regular = 1;
13461 h->ref_regular_nonweak = 1;
13462 h->forced_local = 1;
13463 h->non_elf = 0;
2ec55de3 13464 h->root.linker_def = 1;
7341d5e2
AM
13465 }
13466 }
13467
a345bc8d
AM
13468 if (PPC_HA (off) != 0)
13469 {
13470 bfd_put_32 (s->owner, ADDIS_R12_R12 | PPC_HA (off), p);
13471 p += 4;
13472 }
13473 bfd_put_32 (s->owner, LD_R12_0R12 | PPC_LO (off), p);
13474 p += 4;
13475 bfd_put_32 (s->owner, MTCTR_R12, p);
13476 p += 4;
407aa07c 13477 bfd_put_32 (s->owner, BCTR, p);
a345bc8d
AM
13478 break;
13479 }
13480 return TRUE;
13481}
13482
49c09209
AM
13483/* Write PLT relocs for locals. */
13484
13485static bfd_boolean
13486write_plt_relocs_for_local_syms (struct bfd_link_info *info)
13487{
13488 struct ppc_link_hash_table *htab = ppc_hash_table (info);
13489 bfd *ibfd;
13490
13491 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
13492 {
13493 struct got_entry **lgot_ents, **end_lgot_ents;
13494 struct plt_entry **local_plt, **lplt, **end_local_plt;
13495 Elf_Internal_Shdr *symtab_hdr;
13496 bfd_size_type locsymcount;
13497 Elf_Internal_Sym *local_syms = NULL;
13498 struct plt_entry *ent;
13499
13500 if (!is_ppc64_elf (ibfd))
13501 continue;
13502
13503 lgot_ents = elf_local_got_ents (ibfd);
13504 if (!lgot_ents)
13505 continue;
13506
13507 symtab_hdr = &elf_symtab_hdr (ibfd);
13508 locsymcount = symtab_hdr->sh_info;
13509 end_lgot_ents = lgot_ents + locsymcount;
13510 local_plt = (struct plt_entry **) end_lgot_ents;
13511 end_local_plt = local_plt + locsymcount;
13512 for (lplt = local_plt; lplt < end_local_plt; ++lplt)
13513 for (ent = *lplt; ent != NULL; ent = ent->next)
13514 if (ent->plt.offset != (bfd_vma) -1)
13515 {
13516 Elf_Internal_Sym *sym;
13517 asection *sym_sec;
13518 asection *plt, *relplt;
13519 bfd_byte *loc;
13520 bfd_vma val;
49c09209
AM
13521
13522 if (!get_sym_h (NULL, &sym, &sym_sec, NULL, &local_syms,
13523 lplt - local_plt, ibfd))
13524 {
13525 if (local_syms != NULL
13526 && symtab_hdr->contents != (unsigned char *) local_syms)
13527 free (local_syms);
13528 return FALSE;
13529 }
13530
13531 val = sym->st_value + ent->addend;
13532 val += PPC64_LOCAL_ENTRY_OFFSET (sym->st_other);
13533 if (sym_sec != NULL && sym_sec->output_section != NULL)
13534 val += sym_sec->output_offset + sym_sec->output_section->vma;
13535
2d7ad24e
AM
13536 if (ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC)
13537 {
13538 htab->local_ifunc_resolver = 1;
13539 plt = htab->elf.iplt;
13540 relplt = htab->elf.irelplt;
13541 }
13542 else
13543 {
13544 plt = htab->pltlocal;
13545 relplt = bfd_link_pic (info) ? htab->relpltlocal : NULL;
13546 }
49c09209 13547
2d7ad24e
AM
13548 if (relplt == NULL)
13549 {
13550 loc = plt->contents + ent->plt.offset;
13551 bfd_put_64 (info->output_bfd, val, loc);
13552 if (htab->opd_abi)
13553 {
13554 bfd_vma toc = elf_gp (ibfd);
13555 bfd_put_64 (info->output_bfd, toc, loc + 8);
13556 }
13557 }
49c09209 13558 else
2d7ad24e
AM
13559 {
13560 Elf_Internal_Rela rela;
13561 rela.r_offset = (ent->plt.offset
13562 + plt->output_offset
13563 + plt->output_section->vma);
13564 if (ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC)
13565 {
13566 if (htab->opd_abi)
13567 rela.r_info = ELF64_R_INFO (0, R_PPC64_JMP_IREL);
13568 else
13569 rela.r_info = ELF64_R_INFO (0, R_PPC64_IRELATIVE);
13570 }
13571 else
13572 {
13573 if (htab->opd_abi)
13574 rela.r_info = ELF64_R_INFO (0, R_PPC64_JMP_SLOT);
13575 else
13576 rela.r_info = ELF64_R_INFO (0, R_PPC64_RELATIVE);
13577 }
13578 rela.r_addend = val;
13579 loc = relplt->contents + (relplt->reloc_count++
13580 * sizeof (Elf64_External_Rela));
13581 bfd_elf64_swap_reloca_out (info->output_bfd, &rela, loc);
13582 }
49c09209
AM
13583 }
13584
13585 if (local_syms != NULL
13586 && symtab_hdr->contents != (unsigned char *) local_syms)
13587 {
13588 if (!info->keep_memory)
13589 free (local_syms);
13590 else
13591 symtab_hdr->contents = (unsigned char *) local_syms;
13592 }
13593 }
13594 return TRUE;
13595}
13596
721956f4
AM
13597/* Build all the stubs associated with the current output file.
13598 The stubs are kept in a hash table attached to the main linker
13599 hash table. This function is called via gldelf64ppc_finish. */
13600
b34976b6 13601bfd_boolean
e7d1c40c 13602ppc64_elf_build_stubs (struct bfd_link_info *info,
4ce794b7 13603 char **stats)
5d1634d7
AM
13604{
13605 struct ppc_link_hash_table *htab = ppc_hash_table (info);
a4b6fadd 13606 struct map_stub *group;
721956f4 13607 asection *stub_sec;
5d1634d7 13608 bfd_byte *p;
e717da7e 13609 int stub_sec_count = 0;
5d1634d7 13610
4dfe6ac6
NC
13611 if (htab == NULL)
13612 return FALSE;
13613
eea6121a 13614 /* Allocate memory to hold the linker stubs. */
d4aaa2a0
AM
13615 for (group = htab->group; group != NULL; group = group->next)
13616 if ((stub_sec = group->stub_sec) != NULL
eea6121a 13617 && stub_sec->size != 0)
e717da7e 13618 {
e7d1c40c 13619 stub_sec->contents = bfd_zalloc (htab->params->stub_bfd, stub_sec->size);
eea6121a
AM
13620 if (stub_sec->contents == NULL)
13621 return FALSE;
eea6121a 13622 stub_sec->size = 0;
e717da7e 13623 }
5d1634d7 13624
23eb7e01 13625 if (htab->glink != NULL && htab->glink->size != 0)
5d1634d7 13626 {
9f951329 13627 unsigned int indx;
ad8e1ba5 13628 bfd_vma plt0;
9f951329 13629
721956f4 13630 /* Build the .glink plt call stub. */
e7d1c40c 13631 if (htab->params->emit_stub_syms)
97b639ba
AM
13632 {
13633 struct elf_link_hash_entry *h;
468392fb
AM
13634 h = elf_link_hash_lookup (&htab->elf, "__glink_PLTresolve",
13635 TRUE, FALSE, FALSE);
97b639ba
AM
13636 if (h == NULL)
13637 return FALSE;
13638 if (h->root.type == bfd_link_hash_new)
13639 {
13640 h->root.type = bfd_link_hash_defined;
13641 h->root.u.def.section = htab->glink;
ee4bf8d2 13642 h->root.u.def.value = 8;
f5385ebf
AM
13643 h->ref_regular = 1;
13644 h->def_regular = 1;
13645 h->ref_regular_nonweak = 1;
13646 h->forced_local = 1;
13647 h->non_elf = 0;
2ec55de3 13648 h->root.linker_def = 1;
97b639ba
AM
13649 }
13650 }
33e44f2e
AM
13651 plt0 = (htab->elf.splt->output_section->vma
13652 + htab->elf.splt->output_offset
13653 - 16);
176a0d42
AM
13654 if (info->emitrelocations)
13655 {
13656 Elf_Internal_Rela *r = get_relocs (htab->glink, 1);
13657 if (r == NULL)
13658 return FALSE;
13659 r->r_offset = (htab->glink->output_offset
13660 + htab->glink->output_section->vma);
13661 r->r_info = ELF64_R_INFO (0, R_PPC64_REL64);
13662 r->r_addend = plt0;
13663 }
4ce794b7 13664 p = htab->glink->contents;
176a0d42 13665 plt0 -= htab->glink->output_section->vma + htab->glink->output_offset;
ee4bf8d2
AM
13666 bfd_put_64 (htab->glink->owner, plt0, p);
13667 p += 8;
b9e5796b
AM
13668 if (htab->opd_abi)
13669 {
13670 bfd_put_32 (htab->glink->owner, MFLR_R12, p);
13671 p += 4;
13672 bfd_put_32 (htab->glink->owner, BCL_20_31, p);
13673 p += 4;
13674 bfd_put_32 (htab->glink->owner, MFLR_R11, p);
13675 p += 4;
13676 bfd_put_32 (htab->glink->owner, LD_R2_0R11 | (-16 & 0xfffc), p);
13677 p += 4;
13678 bfd_put_32 (htab->glink->owner, MTLR_R12, p);
13679 p += 4;
13680 bfd_put_32 (htab->glink->owner, ADD_R11_R2_R11, p);
13681 p += 4;
13682 bfd_put_32 (htab->glink->owner, LD_R12_0R11, p);
13683 p += 4;
13684 bfd_put_32 (htab->glink->owner, LD_R2_0R11 | 8, p);
13685 p += 4;
13686 bfd_put_32 (htab->glink->owner, MTCTR_R12, p);
13687 p += 4;
13688 bfd_put_32 (htab->glink->owner, LD_R11_0R11 | 16, p);
13689 p += 4;
13690 }
13691 else
13692 {
13693 bfd_put_32 (htab->glink->owner, MFLR_R0, p);
13694 p += 4;
13695 bfd_put_32 (htab->glink->owner, BCL_20_31, p);
13696 p += 4;
13697 bfd_put_32 (htab->glink->owner, MFLR_R11, p);
13698 p += 4;
f378ab09
AM
13699 bfd_put_32 (htab->glink->owner, STD_R2_0R1 + 24, p);
13700 p += 4;
b9e5796b
AM
13701 bfd_put_32 (htab->glink->owner, LD_R2_0R11 | (-16 & 0xfffc), p);
13702 p += 4;
13703 bfd_put_32 (htab->glink->owner, MTLR_R0, p);
13704 p += 4;
13705 bfd_put_32 (htab->glink->owner, SUB_R12_R12_R11, p);
13706 p += 4;
13707 bfd_put_32 (htab->glink->owner, ADD_R11_R2_R11, p);
13708 p += 4;
13709 bfd_put_32 (htab->glink->owner, ADDI_R0_R12 | (-48 & 0xffff), p);
13710 p += 4;
13711 bfd_put_32 (htab->glink->owner, LD_R12_0R11, p);
13712 p += 4;
13713 bfd_put_32 (htab->glink->owner, SRDI_R0_R0_2, p);
13714 p += 4;
13715 bfd_put_32 (htab->glink->owner, MTCTR_R12, p);
13716 p += 4;
13717 bfd_put_32 (htab->glink->owner, LD_R11_0R11 | 8, p);
13718 p += 4;
13719 }
407aa07c
AM
13720 bfd_put_32 (htab->glink->owner, BCTR, p);
13721 p += 4;
c75bc4f7 13722 BFD_ASSERT (p == htab->glink->contents + GLINK_PLTRESOLVE_SIZE (htab));
ad8e1ba5 13723
9f951329
AM
13724 /* Build the .glink lazy link call stubs. */
13725 indx = 0;
9e390558 13726 while (p < htab->glink->contents + htab->glink->size)
9f951329 13727 {
b9e5796b 13728 if (htab->opd_abi)
9f951329 13729 {
b9e5796b
AM
13730 if (indx < 0x8000)
13731 {
13732 bfd_put_32 (htab->glink->owner, LI_R0_0 | indx, p);
13733 p += 4;
13734 }
13735 else
13736 {
13737 bfd_put_32 (htab->glink->owner, LIS_R0_0 | PPC_HI (indx), p);
13738 p += 4;
13739 bfd_put_32 (htab->glink->owner, ORI_R0_R0_0 | PPC_LO (indx),
13740 p);
13741 p += 4;
13742 }
9f951329 13743 }
4ce794b7 13744 bfd_put_32 (htab->glink->owner,
ee4bf8d2 13745 B_DOT | ((htab->glink->contents - p + 8) & 0x3fffffc), p);
a16d5acb 13746 indx++;
9f951329
AM
13747 p += 4;
13748 }
5d1634d7 13749 }
5d1634d7 13750
49c09209
AM
13751 /* Build .glink global entry stubs, and PLT relocs for globals. */
13752 elf_link_hash_traverse (&htab->elf, build_global_entry_stubs_and_plt, info);
13753
13754 if (!write_plt_relocs_for_local_syms (info))
13755 return FALSE;
9e390558 13756
7341d5e2 13757 if (htab->brlt != NULL && htab->brlt->size != 0)
721956f4 13758 {
4ce794b7 13759 htab->brlt->contents = bfd_zalloc (htab->brlt->owner,
eea6121a 13760 htab->brlt->size);
4ce794b7 13761 if (htab->brlt->contents == NULL)
b34976b6 13762 return FALSE;
721956f4 13763 }
ee75fd95 13764 if (htab->relbrlt != NULL && htab->relbrlt->size != 0)
63bc6f6c
AM
13765 {
13766 htab->relbrlt->contents = bfd_zalloc (htab->relbrlt->owner,
eea6121a 13767 htab->relbrlt->size);
63bc6f6c
AM
13768 if (htab->relbrlt->contents == NULL)
13769 return FALSE;
13770 }
5d1634d7 13771
721956f4
AM
13772 /* Build the stubs as directed by the stub hash table. */
13773 bfd_hash_traverse (&htab->stub_hash_table, ppc_build_one_stub, info);
5d1634d7 13774
a4b6fadd
AM
13775 for (group = htab->group; group != NULL; group = group->next)
13776 if (group->needs_save_res)
7dda8d3c 13777 group->stub_sec->size += htab->sfpr->size;
a4b6fadd 13778
aa8a7074
AM
13779 if (htab->relbrlt != NULL)
13780 htab->relbrlt->reloc_count = 0;
13781
e7d1c40c 13782 if (htab->params->plt_stub_align != 0)
d4aaa2a0
AM
13783 for (group = htab->group; group != NULL; group = group->next)
13784 if ((stub_sec = group->stub_sec) != NULL)
691d2e9a
AM
13785 {
13786 int align = abs (htab->params->plt_stub_align);
13787 stub_sec->size = (stub_sec->size + (1 << align) - 1) & -(1 << align);
13788 }
794e51c0 13789
7dda8d3c
AM
13790 for (group = htab->group; group != NULL; group = group->next)
13791 if (group->needs_save_res)
13792 {
13793 stub_sec = group->stub_sec;
13794 memcpy (stub_sec->contents + stub_sec->size - htab->sfpr->size,
13795 htab->sfpr->contents, htab->sfpr->size);
13796 if (htab->params->emit_stub_syms)
13797 {
13798 unsigned int i;
13799
13800 for (i = 0; i < ARRAY_SIZE (save_res_funcs); i++)
13801 if (!sfpr_define (info, &save_res_funcs[i], stub_sec))
13802 return FALSE;
13803 }
13804 }
13805
d4aaa2a0
AM
13806 for (group = htab->group; group != NULL; group = group->next)
13807 if ((stub_sec = group->stub_sec) != NULL)
e717da7e
AM
13808 {
13809 stub_sec_count += 1;
c9301e31
AM
13810 if (stub_sec->rawsize != stub_sec->size
13811 && (htab->stub_iteration <= STUB_SHRINK_ITER
13812 || stub_sec->rawsize < stub_sec->size))
e717da7e
AM
13813 break;
13814 }
5d1634d7 13815
25516cc5 13816 if (group != NULL)
5d1634d7 13817 {
b34976b6 13818 htab->stub_error = TRUE;
cf97bcb0 13819 _bfd_error_handler (_("stubs don't match calculated size"));
5d1634d7 13820 }
721956f4 13821
d2a300cf
AM
13822 if (htab->stub_error)
13823 return FALSE;
13824
13825 if (stats != NULL)
13826 {
db84fff3 13827 size_t len;
d2a300cf
AM
13828 *stats = bfd_malloc (500);
13829 if (*stats == NULL)
13830 return FALSE;
13831
db84fff3
AM
13832 len = sprintf (*stats,
13833 ngettext ("linker stubs in %u group\n",
13834 "linker stubs in %u groups\n",
13835 stub_sec_count),
13836 stub_sec_count);
13837 sprintf (*stats + len, _(" branch %lu\n"
13838 " toc adjust %lu\n"
13839 " long branch %lu\n"
13840 " long toc adj %lu\n"
13841 " plt call %lu\n"
13842 " plt call toc %lu\n"
13843 " global entry %lu"),
4ce794b7
AM
13844 htab->stub_count[ppc_stub_long_branch - 1],
13845 htab->stub_count[ppc_stub_long_branch_r2off - 1],
13846 htab->stub_count[ppc_stub_plt_branch - 1],
13847 htab->stub_count[ppc_stub_plt_branch_r2off - 1],
794e51c0 13848 htab->stub_count[ppc_stub_plt_call - 1],
7341d5e2
AM
13849 htab->stub_count[ppc_stub_plt_call_r2save - 1],
13850 htab->stub_count[ppc_stub_global_entry - 1]);
d2a300cf
AM
13851 }
13852 return TRUE;
5bd4f169
AM
13853}
13854
60124e18
AM
13855/* What to do when ld finds relocations against symbols defined in
13856 discarded sections. */
13857
13858static unsigned int
13859ppc64_elf_action_discarded (asection *sec)
13860{
13861 if (strcmp (".opd", sec->name) == 0)
13862 return 0;
13863
13864 if (strcmp (".toc", sec->name) == 0)
13865 return 0;
13866
bce50a28
JJ
13867 if (strcmp (".toc1", sec->name) == 0)
13868 return 0;
13869
60124e18
AM
13870 return _bfd_elf_default_action_discarded (sec);
13871}
13872
5bd4f169
AM
13873/* The RELOCATE_SECTION function is called by the ELF backend linker
13874 to handle the relocations for a section.
13875
13876 The relocs are always passed as Rela structures; if the section
13877 actually uses Rel structures, the r_addend field will always be
13878 zero.
13879
13880 This function is responsible for adjust the section contents as
13881 necessary, and (if using Rela relocs and generating a
1049f94e 13882 relocatable output file) adjusting the reloc addend as
5bd4f169
AM
13883 necessary.
13884
13885 This function does not have to worry about setting the reloc
13886 address or the reloc symbol index.
13887
13888 LOCAL_SYMS is a pointer to the swapped in local symbols.
13889
13890 LOCAL_SECTIONS is an array giving the section in the input file
13891 corresponding to the st_shndx field of each local symbol.
13892
13893 The global hash table entry for the global symbols can be found
13894 via elf_sym_hashes (input_bfd).
13895
1049f94e 13896 When generating relocatable output, this function must handle
5bd4f169
AM
13897 STB_LOCAL/STT_SECTION symbols specially. The output symbol is
13898 going to be the section symbol corresponding to the output
13899 section, which means that the addend must be adjusted
13900 accordingly. */
13901
b34976b6 13902static bfd_boolean
4ce794b7
AM
13903ppc64_elf_relocate_section (bfd *output_bfd,
13904 struct bfd_link_info *info,
13905 bfd *input_bfd,
13906 asection *input_section,
13907 bfd_byte *contents,
13908 Elf_Internal_Rela *relocs,
13909 Elf_Internal_Sym *local_syms,
13910 asection **local_sections)
5bd4f169 13911{
65f38f15 13912 struct ppc_link_hash_table *htab;
5bd4f169
AM
13913 Elf_Internal_Shdr *symtab_hdr;
13914 struct elf_link_hash_entry **sym_hashes;
5bd4f169 13915 Elf_Internal_Rela *rel;
c316a17c 13916 Elf_Internal_Rela *wrel;
5bd4f169 13917 Elf_Internal_Rela *relend;
411e1bfb
AM
13918 Elf_Internal_Rela outrel;
13919 bfd_byte *loc;
411e1bfb 13920 struct got_entry **local_got_ents;
5bd4f169 13921 bfd_vma TOCstart;
b34976b6
AM
13922 bfd_boolean ret = TRUE;
13923 bfd_boolean is_opd;
794e51c0
AM
13924 /* Assume 'at' branch hints. */
13925 bfd_boolean is_isa_v2 = TRUE;
95f0d0d2 13926 bfd_vma d_offset = (bfd_big_endian (input_bfd) ? 2 : 0);
5bd4f169 13927
65f38f15 13928 /* Initialize howto table if needed. */
5bd4f169 13929 if (!ppc64_elf_howto_table[R_PPC64_ADDR32])
5bd4f169
AM
13930 ppc_howto_init ();
13931
65f38f15 13932 htab = ppc_hash_table (info);
4dfe6ac6
NC
13933 if (htab == NULL)
13934 return FALSE;
ee75fd95
AM
13935
13936 /* Don't relocate stub sections. */
e7d1c40c 13937 if (input_section->owner == htab->params->stub_bfd)
ee75fd95
AM
13938 return TRUE;
13939
0c8d6e5c 13940 BFD_ASSERT (is_ppc64_elf (input_bfd));
0ffa91dd 13941
411e1bfb 13942 local_got_ents = elf_local_got_ents (input_bfd);
5bd4f169 13943 TOCstart = elf_gp (output_bfd);
0ffa91dd 13944 symtab_hdr = &elf_symtab_hdr (input_bfd);
5bd4f169 13945 sym_hashes = elf_sym_hashes (input_bfd);
7c8fe5c4 13946 is_opd = ppc64_elf_section_data (input_section)->sec_type == sec_opd;
65f38f15 13947
c316a17c 13948 rel = wrel = relocs;
5bd4f169 13949 relend = relocs + input_section->reloc_count;
c316a17c 13950 for (; rel < relend; wrel++, rel++)
5bd4f169 13951 {
04c9666a 13952 enum elf_ppc64_reloc_type r_type;
31c76678 13953 bfd_vma addend;
5bd4f169
AM
13954 bfd_reloc_status_type r;
13955 Elf_Internal_Sym *sym;
13956 asection *sec;
039b3fef
AM
13957 struct elf_link_hash_entry *h_elf;
13958 struct ppc_link_hash_entry *h;
13959 struct ppc_link_hash_entry *fdh;
5bd4f169 13960 const char *sym_name;
0d4792f7 13961 unsigned long r_symndx, toc_symndx;
3a71aa26 13962 bfd_vma toc_addend;
f961d9dd
AM
13963 unsigned char tls_mask, tls_gd, tls_type;
13964 unsigned char sym_type;
5bd4f169 13965 bfd_vma relocation;
23cedd1d 13966 bfd_boolean unresolved_reloc, save_unresolved_reloc;
b34976b6 13967 bfd_boolean warned;
bc30df16 13968 enum { DEST_NORMAL, DEST_OPD, DEST_STUB } reloc_dest;
67f0cbdb 13969 unsigned int insn;
e11840f9 13970 unsigned int mask;
721956f4
AM
13971 struct ppc_stub_hash_entry *stub_entry;
13972 bfd_vma max_br_offset;
13973 bfd_vma from;
c316a17c 13974 Elf_Internal_Rela orig_rel;
b80eed39
AM
13975 reloc_howto_type *howto;
13976 struct reloc_howto_struct alt_howto;
5bd4f169 13977
c316a17c
AM
13978 again:
13979 orig_rel = *rel;
13980
4ce794b7 13981 r_type = ELF64_R_TYPE (rel->r_info);
5bd4f169 13982 r_symndx = ELF64_R_SYM (rel->r_info);
ee87f2da
AM
13983
13984 /* For old style R_PPC64_TOC relocs with a zero symbol, use the
13985 symbol of the previous ADDR64 reloc. The symbol gives us the
13986 proper TOC base to use. */
13987 if (rel->r_info == ELF64_R_INFO (0, R_PPC64_TOC)
c316a17c
AM
13988 && wrel != relocs
13989 && ELF64_R_TYPE (wrel[-1].r_info) == R_PPC64_ADDR64
ee87f2da 13990 && is_opd)
c316a17c 13991 r_symndx = ELF64_R_SYM (wrel[-1].r_info);
ee87f2da 13992
4ce794b7
AM
13993 sym = NULL;
13994 sec = NULL;
039b3fef 13995 h_elf = NULL;
4ce794b7 13996 sym_name = NULL;
b34976b6
AM
13997 unresolved_reloc = FALSE;
13998 warned = FALSE;
65f38f15 13999
0b13192e 14000 if (r_symndx < symtab_hdr->sh_info)
5bd4f169
AM
14001 {
14002 /* It's a local symbol. */
74f0fb50 14003 struct _opd_sec_data *opd;
4025353c 14004
5bd4f169
AM
14005 sym = local_syms + r_symndx;
14006 sec = local_sections[r_symndx];
26c61ae5 14007 sym_name = bfd_elf_sym_name (input_bfd, symtab_hdr, sym, sec);
0d4792f7 14008 sym_type = ELF64_ST_TYPE (sym->st_info);
8517fae7 14009 relocation = _bfd_elf_rela_local_sym (output_bfd, sym, &sec, rel);
74f0fb50
AM
14010 opd = get_opd_info (sec);
14011 if (opd != NULL && opd->adjust != NULL)
1e2f5b6e 14012 {
51aecdc5
AM
14013 long adjust = opd->adjust[OPD_NDX (sym->st_value
14014 + rel->r_addend)];
4025353c
AM
14015 if (adjust == -1)
14016 relocation = 0;
14017 else
4cc603a5
AM
14018 {
14019 /* If this is a relocation against the opd section sym
14020 and we have edited .opd, adjust the reloc addend so
14021 that ld -r and ld --emit-relocs output is correct.
14022 If it is a reloc against some other .opd symbol,
14023 then the symbol value will be adjusted later. */
14024 if (ELF_ST_TYPE (sym->st_info) == STT_SECTION)
14025 rel->r_addend += adjust;
14026 else
14027 relocation += adjust;
14028 }
1e2f5b6e 14029 }
5bd4f169
AM
14030 }
14031 else
14032 {
62d887d4
L
14033 bfd_boolean ignored;
14034
b2a8e766
AM
14035 RELOC_FOR_GLOBAL_SYMBOL (info, input_bfd, input_section, rel,
14036 r_symndx, symtab_hdr, sym_hashes,
039b3fef 14037 h_elf, sec, relocation,
62d887d4 14038 unresolved_reloc, warned, ignored);
039b3fef
AM
14039 sym_name = h_elf->root.root.string;
14040 sym_type = h_elf->type;
b69fdb4e
AM
14041 if (sec != NULL
14042 && sec->owner == output_bfd
14043 && strcmp (sec->name, ".opd") == 0)
14044 {
14045 /* This is a symbol defined in a linker script. All
14046 such are defined in output sections, even those
14047 defined by simple assignment from a symbol defined in
14048 an input section. Transfer the symbol to an
14049 appropriate input .opd section, so that a branch to
14050 this symbol will be mapped to the location specified
14051 by the opd entry. */
14052 struct bfd_link_order *lo;
14053 for (lo = sec->map_head.link_order; lo != NULL; lo = lo->next)
14054 if (lo->type == bfd_indirect_link_order)
14055 {
14056 asection *isec = lo->u.indirect.section;
14057 if (h_elf->root.u.def.value >= isec->output_offset
14058 && h_elf->root.u.def.value < (isec->output_offset
14059 + isec->size))
14060 {
14061 h_elf->root.u.def.value -= isec->output_offset;
14062 h_elf->root.u.def.section = isec;
14063 sec = isec;
14064 break;
14065 }
14066 }
14067 }
5bd4f169 14068 }
039b3fef 14069 h = (struct ppc_link_hash_entry *) h_elf;
5bd4f169 14070
dbaa2011 14071 if (sec != NULL && discarded_section (sec))
c316a17c
AM
14072 {
14073 _bfd_clear_contents (ppc64_elf_howto_table[r_type],
14074 input_bfd, input_section,
14075 contents + rel->r_offset);
14076 wrel->r_offset = rel->r_offset;
14077 wrel->r_info = 0;
14078 wrel->r_addend = 0;
14079
14080 /* For ld -r, remove relocations in debug sections against
dcd2b8a0 14081 symbols defined in discarded sections. Not done for
c316a17c
AM
14082 non-debug to preserve relocs in .eh_frame which the
14083 eh_frame editing code expects to be present. */
14084 if (bfd_link_relocatable (info)
14085 && (input_section->flags & SEC_DEBUGGING))
14086 wrel--;
14087
14088 continue;
14089 }
ab96bf03 14090
0e1862bb 14091 if (bfd_link_relocatable (info))
c316a17c 14092 goto copy_reloc;
ab96bf03 14093
f40da81b
AM
14094 if (h != NULL && &h->elf == htab->elf.hgot)
14095 {
6f20ed8a 14096 relocation = TOCstart + htab->sec_info[input_section->id].toc_off;
f40da81b
AM
14097 sec = bfd_abs_section_ptr;
14098 unresolved_reloc = FALSE;
14099 }
14100
951fd09b
AM
14101 /* TLS optimizations. Replace instruction sequences and relocs
14102 based on information we collected in tls_optimize. We edit
14103 RELOCS so that --emit-relocs will output something sensible
14104 for the final instruction stream. */
14105 tls_mask = 0;
14106 tls_gd = 0;
0d4792f7 14107 toc_symndx = 0;
727fc41e
AM
14108 if (h != NULL)
14109 tls_mask = h->tls_mask;
14110 else if (local_got_ents != NULL)
411e1bfb 14111 {
e054468f
AM
14112 struct plt_entry **local_plt = (struct plt_entry **)
14113 (local_got_ents + symtab_hdr->sh_info);
f961d9dd 14114 unsigned char *lgot_masks = (unsigned char *)
e054468f 14115 (local_plt + symtab_hdr->sh_info);
727fc41e
AM
14116 tls_mask = lgot_masks[r_symndx];
14117 }
37da22e5 14118 if (((tls_mask & TLS_TLS) == 0 || tls_mask == (TLS_TLS | TLS_MARK))
727fc41e
AM
14119 && (r_type == R_PPC64_TLS
14120 || r_type == R_PPC64_TLSGD
14121 || r_type == R_PPC64_TLSLD))
14122 {
14123 /* Check for toc tls entries. */
f961d9dd 14124 unsigned char *toc_tls;
0d4792f7 14125
727fc41e
AM
14126 if (!get_tls_mask (&toc_tls, &toc_symndx, &toc_addend,
14127 &local_syms, rel, input_bfd))
14128 return FALSE;
0d4792f7 14129
727fc41e
AM
14130 if (toc_tls)
14131 tls_mask = *toc_tls;
0d4792f7
AM
14132 }
14133
14134 /* Check that tls relocs are used with tls syms, and non-tls
14135 relocs are used with non-tls syms. */
cf35638d 14136 if (r_symndx != STN_UNDEF
0d4792f7
AM
14137 && r_type != R_PPC64_NONE
14138 && (h == NULL
039b3fef
AM
14139 || h->elf.root.type == bfd_link_hash_defined
14140 || h->elf.root.type == bfd_link_hash_defweak)
1d483afe
AM
14141 && (IS_PPC64_TLS_RELOC (r_type)
14142 != (sym_type == STT_TLS
14143 || (sym_type == STT_SECTION
14144 && (sec->flags & SEC_THREAD_LOCAL) != 0))))
0d4792f7 14145 {
37da22e5 14146 if ((tls_mask & TLS_TLS) != 0
727fc41e
AM
14147 && (r_type == R_PPC64_TLS
14148 || r_type == R_PPC64_TLSGD
14149 || r_type == R_PPC64_TLSLD))
0d4792f7
AM
14150 /* R_PPC64_TLS is OK against a symbol in the TOC. */
14151 ;
14152 else
25f53a85 14153 info->callbacks->einfo
1d483afe 14154 (!IS_PPC64_TLS_RELOC (r_type)
695344c0 14155 /* xgettext:c-format */
c1c8c1ef 14156 ? _("%H: %s used with TLS symbol `%pT'\n")
695344c0 14157 /* xgettext:c-format */
c1c8c1ef 14158 : _("%H: %s used with non-TLS symbol `%pT'\n"),
25f53a85 14159 input_bfd, input_section, rel->r_offset,
0d4792f7
AM
14160 ppc64_elf_howto_table[r_type]->name,
14161 sym_name);
411e1bfb
AM
14162 }
14163
14164 /* Ensure reloc mapping code below stays sane. */
14165 if (R_PPC64_TOC16_LO_DS != R_PPC64_TOC16_DS + 1
14166 || R_PPC64_TOC16_LO != R_PPC64_TOC16 + 1
14167 || (R_PPC64_GOT_TLSLD16 & 3) != (R_PPC64_GOT_TLSGD16 & 3)
14168 || (R_PPC64_GOT_TLSLD16_LO & 3) != (R_PPC64_GOT_TLSGD16_LO & 3)
14169 || (R_PPC64_GOT_TLSLD16_HI & 3) != (R_PPC64_GOT_TLSGD16_HI & 3)
14170 || (R_PPC64_GOT_TLSLD16_HA & 3) != (R_PPC64_GOT_TLSGD16_HA & 3)
14171 || (R_PPC64_GOT_TLSLD16 & 3) != (R_PPC64_GOT_TPREL16_DS & 3)
14172 || (R_PPC64_GOT_TLSLD16_LO & 3) != (R_PPC64_GOT_TPREL16_LO_DS & 3)
14173 || (R_PPC64_GOT_TLSLD16_HI & 3) != (R_PPC64_GOT_TPREL16_HI & 3)
14174 || (R_PPC64_GOT_TLSLD16_HA & 3) != (R_PPC64_GOT_TPREL16_HA & 3))
14175 abort ();
0d4792f7 14176
411e1bfb
AM
14177 switch (r_type)
14178 {
14179 default:
411e1bfb
AM
14180 break;
14181
ba761f19 14182 case R_PPC64_LO_DS_OPT:
95f0d0d2 14183 insn = bfd_get_32 (input_bfd, contents + rel->r_offset - d_offset);
ba761f19
AM
14184 if ((insn & (0x3f << 26)) != 58u << 26)
14185 abort ();
14186 insn += (14u << 26) - (58u << 26);
95f0d0d2 14187 bfd_put_32 (input_bfd, insn, contents + rel->r_offset - d_offset);
ba761f19
AM
14188 r_type = R_PPC64_TOC16_LO;
14189 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
14190 break;
14191
411e1bfb
AM
14192 case R_PPC64_TOC16:
14193 case R_PPC64_TOC16_LO:
14194 case R_PPC64_TOC16_DS:
14195 case R_PPC64_TOC16_LO_DS:
411e1bfb
AM
14196 {
14197 /* Check for toc tls entries. */
f961d9dd 14198 unsigned char *toc_tls;
951fd09b 14199 int retval;
411e1bfb 14200
3a71aa26
AM
14201 retval = get_tls_mask (&toc_tls, &toc_symndx, &toc_addend,
14202 &local_syms, rel, input_bfd);
951fd09b 14203 if (retval == 0)
411e1bfb
AM
14204 return FALSE;
14205
14206 if (toc_tls)
14207 {
951fd09b 14208 tls_mask = *toc_tls;
411e1bfb
AM
14209 if (r_type == R_PPC64_TOC16_DS
14210 || r_type == R_PPC64_TOC16_LO_DS)
81407a69 14211 {
37da22e5 14212 if ((tls_mask & TLS_TLS) != 0
81407a69
AM
14213 && (tls_mask & (TLS_DTPREL | TLS_TPREL)) == 0)
14214 goto toctprel;
14215 }
411e1bfb 14216 else
951fd09b
AM
14217 {
14218 /* If we found a GD reloc pair, then we might be
14219 doing a GD->IE transition. */
14220 if (retval == 2)
14221 {
14222 tls_gd = TLS_TPRELGD;
37da22e5
AM
14223 if ((tls_mask & TLS_TLS) != 0
14224 && (tls_mask & TLS_GD) == 0)
102890f0 14225 goto tls_ldgd_opt;
951fd09b
AM
14226 }
14227 else if (retval == 3)
14228 {
37da22e5
AM
14229 if ((tls_mask & TLS_TLS) != 0
14230 && (tls_mask & TLS_LD) == 0)
102890f0 14231 goto tls_ldgd_opt;
951fd09b
AM
14232 }
14233 }
411e1bfb
AM
14234 }
14235 }
14236 break;
14237
9d6ded02
AM
14238 case R_PPC64_GOT_TPREL16_HI:
14239 case R_PPC64_GOT_TPREL16_HA:
37da22e5 14240 if ((tls_mask & TLS_TLS) != 0
9d6ded02
AM
14241 && (tls_mask & TLS_TPREL) == 0)
14242 {
14243 rel->r_offset -= d_offset;
95f0d0d2 14244 bfd_put_32 (input_bfd, NOP, contents + rel->r_offset);
9d6ded02
AM
14245 r_type = R_PPC64_NONE;
14246 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
14247 }
14248 break;
14249
411e1bfb
AM
14250 case R_PPC64_GOT_TPREL16_DS:
14251 case R_PPC64_GOT_TPREL16_LO_DS:
37da22e5 14252 if ((tls_mask & TLS_TLS) != 0
951fd09b 14253 && (tls_mask & TLS_TPREL) == 0)
411e1bfb 14254 {
81407a69 14255 toctprel:
95f0d0d2 14256 insn = bfd_get_32 (input_bfd,
c316a17c 14257 contents + rel->r_offset - d_offset);
411e1bfb
AM
14258 insn &= 31 << 21;
14259 insn |= 0x3c0d0000; /* addis 0,13,0 */
95f0d0d2 14260 bfd_put_32 (input_bfd, insn,
c316a17c 14261 contents + rel->r_offset - d_offset);
411e1bfb 14262 r_type = R_PPC64_TPREL16_HA;
0d4792f7
AM
14263 if (toc_symndx != 0)
14264 {
14265 rel->r_info = ELF64_R_INFO (toc_symndx, r_type);
3a71aa26 14266 rel->r_addend = toc_addend;
0d4792f7
AM
14267 /* We changed the symbol. Start over in order to
14268 get h, sym, sec etc. right. */
c316a17c 14269 goto again;
0d4792f7
AM
14270 }
14271 else
14272 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
411e1bfb
AM
14273 }
14274 break;
14275
14276 case R_PPC64_TLS:
37da22e5 14277 if ((tls_mask & TLS_TLS) != 0
951fd09b 14278 && (tls_mask & TLS_TPREL) == 0)
411e1bfb 14279 {
95f0d0d2 14280 insn = bfd_get_32 (input_bfd, contents + rel->r_offset);
2d0f3896
AM
14281 insn = _bfd_elf_ppc_at_tls_transform (insn, 13);
14282 if (insn == 0)
411e1bfb 14283 abort ();
95f0d0d2 14284 bfd_put_32 (input_bfd, insn, contents + rel->r_offset);
411e1bfb 14285 /* Was PPC64_TLS which sits on insn boundary, now
4fe5ca5b
GM
14286 PPC64_TPREL16_LO which is at low-order half-word. */
14287 rel->r_offset += d_offset;
0d4792f7
AM
14288 r_type = R_PPC64_TPREL16_LO;
14289 if (toc_symndx != 0)
14290 {
14291 rel->r_info = ELF64_R_INFO (toc_symndx, r_type);
3a71aa26 14292 rel->r_addend = toc_addend;
0d4792f7
AM
14293 /* We changed the symbol. Start over in order to
14294 get h, sym, sec etc. right. */
c316a17c 14295 goto again;
0d4792f7
AM
14296 }
14297 else
14298 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
411e1bfb
AM
14299 }
14300 break;
14301
411e1bfb
AM
14302 case R_PPC64_GOT_TLSGD16_HI:
14303 case R_PPC64_GOT_TLSGD16_HA:
951fd09b 14304 tls_gd = TLS_TPRELGD;
37da22e5 14305 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_GD) == 0)
951fd09b
AM
14306 goto tls_gdld_hi;
14307 break;
14308
411e1bfb
AM
14309 case R_PPC64_GOT_TLSLD16_HI:
14310 case R_PPC64_GOT_TLSLD16_HA:
37da22e5 14311 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_LD) == 0)
411e1bfb 14312 {
951fd09b
AM
14313 tls_gdld_hi:
14314 if ((tls_mask & tls_gd) != 0)
14315 r_type = (((r_type - (R_PPC64_GOT_TLSGD16 & 3)) & 3)
14316 + R_PPC64_GOT_TPREL16_DS);
14317 else
411e1bfb 14318 {
4fe5ca5b 14319 rel->r_offset -= d_offset;
95f0d0d2 14320 bfd_put_32 (input_bfd, NOP, contents + rel->r_offset);
951fd09b 14321 r_type = R_PPC64_NONE;
411e1bfb 14322 }
951fd09b 14323 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
411e1bfb
AM
14324 }
14325 break;
14326
951fd09b
AM
14327 case R_PPC64_GOT_TLSGD16:
14328 case R_PPC64_GOT_TLSGD16_LO:
14329 tls_gd = TLS_TPRELGD;
37da22e5 14330 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_GD) == 0)
102890f0 14331 goto tls_ldgd_opt;
951fd09b 14332 break;
411e1bfb 14333
951fd09b
AM
14334 case R_PPC64_GOT_TLSLD16:
14335 case R_PPC64_GOT_TLSLD16_LO:
37da22e5 14336 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_LD) == 0)
951fd09b 14337 {
b9f04fe0 14338 unsigned int insn1, insn2;
102890f0
AM
14339 bfd_vma offset;
14340
14341 tls_ldgd_opt:
727fc41e
AM
14342 offset = (bfd_vma) -1;
14343 /* If not using the newer R_PPC64_TLSGD/LD to mark
14344 __tls_get_addr calls, we must trust that the call
14345 stays with its arg setup insns, ie. that the next
14346 reloc is the __tls_get_addr call associated with
14347 the current reloc. Edit both insns. */
14348 if (input_section->has_tls_get_addr_call
14349 && rel + 1 < relend
14350 && branch_reloc_hash_match (input_bfd, rel + 1,
14351 htab->tls_get_addr,
14352 htab->tls_get_addr_fd))
14353 offset = rel[1].r_offset;
b86ac8e3
AM
14354 /* We read the low GOT_TLS (or TOC16) insn because we
14355 need to keep the destination reg. It may be
14356 something other than the usual r3, and moved to r3
14357 before the call by intervening code. */
95f0d0d2 14358 insn1 = bfd_get_32 (input_bfd,
b86ac8e3 14359 contents + rel->r_offset - d_offset);
102890f0 14360 if ((tls_mask & tls_gd) != 0)
411e1bfb 14361 {
102890f0 14362 /* IE */
b86ac8e3 14363 insn1 &= (0x1f << 21) | (0x1f << 16);
102890f0
AM
14364 insn1 |= 58 << 26; /* ld */
14365 insn2 = 0x7c636a14; /* add 3,3,13 */
727fc41e 14366 if (offset != (bfd_vma) -1)
f58d5a2d 14367 rel[1].r_info = ELF64_R_INFO (STN_UNDEF, R_PPC64_NONE);
102890f0
AM
14368 if ((tls_mask & TLS_EXPLICIT) == 0)
14369 r_type = (((r_type - (R_PPC64_GOT_TLSGD16 & 3)) & 3)
14370 + R_PPC64_GOT_TPREL16_DS);
411e1bfb 14371 else
102890f0
AM
14372 r_type += R_PPC64_TOC16_DS - R_PPC64_TOC16;
14373 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
14374 }
14375 else
14376 {
14377 /* LE */
b86ac8e3
AM
14378 insn1 &= 0x1f << 21;
14379 insn1 |= 0x3c0d0000; /* addis r,13,0 */
102890f0
AM
14380 insn2 = 0x38630000; /* addi 3,3,0 */
14381 if (tls_gd == 0)
951fd09b 14382 {
102890f0 14383 /* Was an LD reloc. */
1d483afe
AM
14384 if (toc_symndx)
14385 sec = local_sections[toc_symndx];
14386 for (r_symndx = 0;
14387 r_symndx < symtab_hdr->sh_info;
14388 r_symndx++)
14389 if (local_sections[r_symndx] == sec)
14390 break;
14391 if (r_symndx >= symtab_hdr->sh_info)
cf35638d 14392 r_symndx = STN_UNDEF;
102890f0 14393 rel->r_addend = htab->elf.tls_sec->vma + DTP_OFFSET;
cf35638d 14394 if (r_symndx != STN_UNDEF)
1d483afe
AM
14395 rel->r_addend -= (local_syms[r_symndx].st_value
14396 + sec->output_offset
14397 + sec->output_section->vma);
951fd09b 14398 }
102890f0 14399 else if (toc_symndx != 0)
3a71aa26
AM
14400 {
14401 r_symndx = toc_symndx;
14402 rel->r_addend = toc_addend;
14403 }
102890f0
AM
14404 r_type = R_PPC64_TPREL16_HA;
14405 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
727fc41e
AM
14406 if (offset != (bfd_vma) -1)
14407 {
14408 rel[1].r_info = ELF64_R_INFO (r_symndx,
14409 R_PPC64_TPREL16_LO);
14410 rel[1].r_offset = offset + d_offset;
14411 rel[1].r_addend = rel->r_addend;
14412 }
102890f0 14413 }
95f0d0d2 14414 bfd_put_32 (input_bfd, insn1,
3a71aa26 14415 contents + rel->r_offset - d_offset);
727fc41e 14416 if (offset != (bfd_vma) -1)
b9f04fe0 14417 bfd_put_32 (input_bfd, insn2, contents + offset);
727fc41e
AM
14418 if ((tls_mask & tls_gd) == 0
14419 && (tls_gd == 0 || toc_symndx != 0))
14420 {
14421 /* We changed the symbol. Start over in order
14422 to get h, sym, sec etc. right. */
c316a17c 14423 goto again;
727fc41e
AM
14424 }
14425 }
14426 break;
14427
14428 case R_PPC64_TLSGD:
37da22e5 14429 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_GD) == 0
675e2809 14430 && rel + 1 < relend)
727fc41e 14431 {
b9f04fe0 14432 unsigned int insn2;
727fc41e
AM
14433 bfd_vma offset = rel->r_offset;
14434
23cedd1d
AM
14435 if (is_plt_seq_reloc (ELF64_R_TYPE (rel[1].r_info)))
14436 {
14437 bfd_put_32 (output_bfd, NOP, contents + offset);
14438 rel[1].r_info = ELF64_R_INFO (STN_UNDEF, R_PPC64_NONE);
14439 break;
14440 }
14441
14442 if (ELF64_R_TYPE (rel[1].r_info) == R_PPC64_PLTCALL)
14443 bfd_put_32 (output_bfd, NOP, contents + offset + 4);
14444
727fc41e
AM
14445 if ((tls_mask & TLS_TPRELGD) != 0)
14446 {
14447 /* IE */
14448 r_type = R_PPC64_NONE;
14449 insn2 = 0x7c636a14; /* add 3,3,13 */
14450 }
14451 else
14452 {
14453 /* LE */
14454 if (toc_symndx != 0)
14455 {
14456 r_symndx = toc_symndx;
14457 rel->r_addend = toc_addend;
14458 }
14459 r_type = R_PPC64_TPREL16_LO;
14460 rel->r_offset = offset + d_offset;
14461 insn2 = 0x38630000; /* addi 3,3,0 */
14462 }
14463 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
14464 /* Zap the reloc on the _tls_get_addr call too. */
14465 BFD_ASSERT (offset == rel[1].r_offset);
f58d5a2d 14466 rel[1].r_info = ELF64_R_INFO (STN_UNDEF, R_PPC64_NONE);
95f0d0d2 14467 bfd_put_32 (input_bfd, insn2, contents + offset);
727fc41e 14468 if ((tls_mask & TLS_TPRELGD) == 0 && toc_symndx != 0)
c316a17c 14469 goto again;
411e1bfb 14470 }
411e1bfb
AM
14471 break;
14472
727fc41e 14473 case R_PPC64_TLSLD:
37da22e5 14474 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_LD) == 0
675e2809 14475 && rel + 1 < relend)
727fc41e 14476 {
b9f04fe0 14477 unsigned int insn2;
727fc41e
AM
14478 bfd_vma offset = rel->r_offset;
14479
23cedd1d
AM
14480 if (is_plt_seq_reloc (ELF64_R_TYPE (rel[1].r_info)))
14481 {
14482 bfd_put_32 (output_bfd, NOP, contents + offset);
14483 rel[1].r_info = ELF64_R_INFO (STN_UNDEF, R_PPC64_NONE);
14484 break;
14485 }
14486
14487 if (ELF64_R_TYPE (rel[1].r_info) == R_PPC64_PLTCALL)
14488 bfd_put_32 (output_bfd, NOP, contents + offset + 4);
14489
727fc41e
AM
14490 if (toc_symndx)
14491 sec = local_sections[toc_symndx];
14492 for (r_symndx = 0;
14493 r_symndx < symtab_hdr->sh_info;
14494 r_symndx++)
14495 if (local_sections[r_symndx] == sec)
14496 break;
14497 if (r_symndx >= symtab_hdr->sh_info)
cf35638d 14498 r_symndx = STN_UNDEF;
727fc41e 14499 rel->r_addend = htab->elf.tls_sec->vma + DTP_OFFSET;
cf35638d 14500 if (r_symndx != STN_UNDEF)
727fc41e
AM
14501 rel->r_addend -= (local_syms[r_symndx].st_value
14502 + sec->output_offset
14503 + sec->output_section->vma);
14504
14505 r_type = R_PPC64_TPREL16_LO;
14506 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
14507 rel->r_offset = offset + d_offset;
14508 /* Zap the reloc on the _tls_get_addr call too. */
14509 BFD_ASSERT (offset == rel[1].r_offset);
f58d5a2d 14510 rel[1].r_info = ELF64_R_INFO (STN_UNDEF, R_PPC64_NONE);
727fc41e 14511 insn2 = 0x38630000; /* addi 3,3,0 */
95f0d0d2 14512 bfd_put_32 (input_bfd, insn2, contents + offset);
c316a17c 14513 goto again;
727fc41e
AM
14514 }
14515 break;
14516
411e1bfb 14517 case R_PPC64_DTPMOD64:
951fd09b
AM
14518 if (rel + 1 < relend
14519 && rel[1].r_info == ELF64_R_INFO (r_symndx, R_PPC64_DTPREL64)
14520 && rel[1].r_offset == rel->r_offset + 8)
411e1bfb 14521 {
951fd09b
AM
14522 if ((tls_mask & TLS_GD) == 0)
14523 {
14524 rel[1].r_info = ELF64_R_INFO (r_symndx, R_PPC64_NONE);
14525 if ((tls_mask & TLS_TPRELGD) != 0)
14526 r_type = R_PPC64_TPREL64;
14527 else
14528 {
4ce794b7 14529 bfd_put_64 (output_bfd, 1, contents + rel->r_offset);
951fd09b
AM
14530 r_type = R_PPC64_NONE;
14531 }
14532 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
14533 }
14534 }
14535 else
14536 {
14537 if ((tls_mask & TLS_LD) == 0)
411e1bfb 14538 {
4ce794b7 14539 bfd_put_64 (output_bfd, 1, contents + rel->r_offset);
411e1bfb 14540 r_type = R_PPC64_NONE;
951fd09b 14541 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
411e1bfb 14542 }
411e1bfb
AM
14543 }
14544 break;
14545
14546 case R_PPC64_TPREL64:
951fd09b 14547 if ((tls_mask & TLS_TPREL) == 0)
411e1bfb
AM
14548 {
14549 r_type = R_PPC64_NONE;
14550 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
14551 }
14552 break;
52a82034 14553
006589cf
AM
14554 case R_PPC64_ENTRY:
14555 relocation = TOCstart + htab->sec_info[input_section->id].toc_off;
14556 if (!bfd_link_pic (info)
14557 && !info->traditional_format
14558 && relocation + 0x80008000 <= 0xffffffff)
14559 {
14560 unsigned int insn1, insn2;
14561
14562 insn1 = bfd_get_32 (input_bfd, contents + rel->r_offset);
14563 insn2 = bfd_get_32 (input_bfd, contents + rel->r_offset + 4);
14564 if ((insn1 & ~0xfffc) == LD_R2_0R12
14565 && insn2 == ADD_R2_R2_R12)
14566 {
95f0d0d2 14567 bfd_put_32 (input_bfd,
006589cf
AM
14568 LIS_R2 + PPC_HA (relocation),
14569 contents + rel->r_offset);
95f0d0d2 14570 bfd_put_32 (input_bfd,
006589cf
AM
14571 ADDI_R2_R2 + PPC_LO (relocation),
14572 contents + rel->r_offset + 4);
14573 }
14574 }
14575 else
14576 {
14577 relocation -= (rel->r_offset
14578 + input_section->output_offset
14579 + input_section->output_section->vma);
14580 if (relocation + 0x80008000 <= 0xffffffff)
14581 {
14582 unsigned int insn1, insn2;
14583
14584 insn1 = bfd_get_32 (input_bfd, contents + rel->r_offset);
14585 insn2 = bfd_get_32 (input_bfd, contents + rel->r_offset + 4);
14586 if ((insn1 & ~0xfffc) == LD_R2_0R12
14587 && insn2 == ADD_R2_R2_R12)
14588 {
95f0d0d2 14589 bfd_put_32 (input_bfd,
006589cf
AM
14590 ADDIS_R2_R12 + PPC_HA (relocation),
14591 contents + rel->r_offset);
95f0d0d2 14592 bfd_put_32 (input_bfd,
006589cf
AM
14593 ADDI_R2_R2 + PPC_LO (relocation),
14594 contents + rel->r_offset + 4);
14595 }
14596 }
14597 }
14598 break;
14599
52a82034
AM
14600 case R_PPC64_REL16_HA:
14601 /* If we are generating a non-PIC executable, edit
14602 . 0: addis 2,12,.TOC.-0b@ha
14603 . addi 2,2,.TOC.-0b@l
14604 used by ELFv2 global entry points to set up r2, to
14605 . lis 2,.TOC.@ha
14606 . addi 2,2,.TOC.@l
14607 if .TOC. is in range. */
0e1862bb 14608 if (!bfd_link_pic (info)
810d4e75 14609 && !info->traditional_format
006589cf 14610 && !htab->opd_abi
4f038ee5 14611 && rel->r_addend == d_offset
52a82034
AM
14612 && h != NULL && &h->elf == htab->elf.hgot
14613 && rel + 1 < relend
14614 && rel[1].r_info == ELF64_R_INFO (r_symndx, R_PPC64_REL16_LO)
14615 && rel[1].r_offset == rel->r_offset + 4
14616 && rel[1].r_addend == rel->r_addend + 4
14617 && relocation + 0x80008000 <= 0xffffffff)
14618 {
14619 unsigned int insn1, insn2;
14620 bfd_vma offset = rel->r_offset - d_offset;
95f0d0d2
AM
14621 insn1 = bfd_get_32 (input_bfd, contents + offset);
14622 insn2 = bfd_get_32 (input_bfd, contents + offset + 4);
006589cf
AM
14623 if ((insn1 & 0xffff0000) == ADDIS_R2_R12
14624 && (insn2 & 0xffff0000) == ADDI_R2_R2)
52a82034
AM
14625 {
14626 r_type = R_PPC64_ADDR16_HA;
14627 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
14628 rel->r_addend -= d_offset;
14629 rel[1].r_info = ELF64_R_INFO (r_symndx, R_PPC64_ADDR16_LO);
14630 rel[1].r_addend -= d_offset + 4;
95f0d0d2 14631 bfd_put_32 (input_bfd, LIS_R2, contents + offset);
52a82034
AM
14632 }
14633 }
14634 break;
411e1bfb
AM
14635 }
14636
14637 /* Handle other relocations that tweak non-addend part of insn. */
86c76c7b 14638 insn = 0;
b25116a9
AM
14639 max_br_offset = 1 << 25;
14640 addend = rel->r_addend;
bc30df16 14641 reloc_dest = DEST_NORMAL;
65f38f15 14642 switch (r_type)
5bd4f169
AM
14643 {
14644 default:
65f38f15 14645 break;
5bd4f169 14646
3b421ab3
AM
14647 case R_PPC64_TOCSAVE:
14648 if (relocation + addend == (rel->r_offset
14649 + input_section->output_offset
14650 + input_section->output_section->vma)
14651 && tocsave_find (htab, NO_INSERT,
14652 &local_syms, rel, input_bfd))
14653 {
14654 insn = bfd_get_32 (input_bfd, contents + rel->r_offset);
14655 if (insn == NOP
14656 || insn == CROR_151515 || insn == CROR_313131)
a078d95a
AM
14657 bfd_put_32 (input_bfd,
14658 STD_R2_0R1 + STK_TOC (htab),
3b421ab3
AM
14659 contents + rel->r_offset);
14660 }
14661 break;
14662
65f38f15
AM
14663 /* Branch taken prediction relocations. */
14664 case R_PPC64_ADDR14_BRTAKEN:
14665 case R_PPC64_REL14_BRTAKEN:
cedb70c5 14666 insn = 0x01 << 21; /* 'y' or 't' bit, lowest bit of BO field. */
1a0670f3 14667 /* Fall through. */
65f38f15 14668
86c76c7b 14669 /* Branch not taken prediction relocations. */
65f38f15
AM
14670 case R_PPC64_ADDR14_BRNTAKEN:
14671 case R_PPC64_REL14_BRNTAKEN:
95f0d0d2 14672 insn |= bfd_get_32 (input_bfd,
411e1bfb 14673 contents + rel->r_offset) & ~(0x01 << 21);
1a0670f3 14674 /* Fall through. */
86c76c7b 14675
b25116a9
AM
14676 case R_PPC64_REL14:
14677 max_br_offset = 1 << 15;
1a0670f3 14678 /* Fall through. */
5bd4f169 14679
65f38f15 14680 case R_PPC64_REL24:
23cedd1d 14681 case R_PPC64_PLTCALL:
ad8e1ba5
AM
14682 /* Calls to functions with a different TOC, such as calls to
14683 shared objects, need to alter the TOC pointer. This is
14684 done using a linkage stub. A REL24 branching to these
14685 linkage stubs needs to be followed by a nop, as the nop
14686 will be replaced with an instruction to restore the TOC
14687 base pointer. */
8387904d 14688 fdh = h;
b31867b6
AM
14689 if (h != NULL
14690 && h->oh != NULL
14691 && h->oh->is_func_descriptor)
14692 fdh = ppc_follow_link (h->oh);
31c76678
DK
14693 stub_entry = ppc_get_stub_entry (input_section, sec, fdh, &orig_rel,
14694 htab);
23cedd1d
AM
14695 if (r_type == R_PPC64_PLTCALL
14696 && stub_entry != NULL
14697 && (stub_entry->stub_type == ppc_stub_plt_call
14698 || stub_entry->stub_type == ppc_stub_plt_call_r2save))
14699 stub_entry = NULL;
14700
6abec6bc 14701 if (stub_entry != NULL
ad8e1ba5 14702 && (stub_entry->stub_type == ppc_stub_plt_call
794e51c0 14703 || stub_entry->stub_type == ppc_stub_plt_call_r2save
ad8e1ba5
AM
14704 || stub_entry->stub_type == ppc_stub_plt_branch_r2off
14705 || stub_entry->stub_type == ppc_stub_long_branch_r2off))
41bd81ab 14706 {
b25116a9 14707 bfd_boolean can_plt_call = FALSE;
721956f4 14708
6e1816be
AM
14709 if (stub_entry->stub_type == ppc_stub_plt_call
14710 && !htab->opd_abi
14711 && htab->params->plt_localentry0 != 0
14712 && is_elfv2_localentry0 (&h->elf))
14713 {
14714 /* The function doesn't use or change r2. */
14715 can_plt_call = TRUE;
14716 }
14717
f378ab09 14718 /* All of these stubs may modify r2, so there must be a
ba8ca3e7
AM
14719 branch and link followed by a nop. The nop is
14720 replaced by an insn to restore r2. */
6e1816be 14721 else if (rel->r_offset + 8 <= input_section->size)
41bd81ab 14722 {
ba8ca3e7
AM
14723 unsigned long br;
14724
14725 br = bfd_get_32 (input_bfd,
14726 contents + rel->r_offset);
14727 if ((br & 1) != 0)
41bd81ab 14728 {
ba8ca3e7
AM
14729 unsigned long nop;
14730
14731 nop = bfd_get_32 (input_bfd,
14732 contents + rel->r_offset + 4);
23cedd1d
AM
14733 if (nop == LD_R2_0R1 + STK_TOC (htab))
14734 can_plt_call = TRUE;
14735 else if (nop == NOP
14736 || nop == CROR_151515
14737 || nop == CROR_313131)
a7f2871e 14738 {
ba8ca3e7
AM
14739 if (h != NULL
14740 && (h == htab->tls_get_addr_fd
14741 || h == htab->tls_get_addr)
7c9cf415 14742 && htab->params->tls_get_addr_opt)
ba8ca3e7
AM
14743 {
14744 /* Special stub used, leave nop alone. */
14745 }
14746 else
a078d95a
AM
14747 bfd_put_32 (input_bfd,
14748 LD_R2_0R1 + STK_TOC (htab),
ba8ca3e7
AM
14749 contents + rel->r_offset + 4);
14750 can_plt_call = TRUE;
a7f2871e 14751 }
41bd81ab 14752 }
5bd4f169 14753 }
721956f4 14754
ba8ca3e7 14755 if (!can_plt_call && h != NULL)
721956f4 14756 {
ba8ca3e7
AM
14757 const char *name = h->elf.root.root.string;
14758
14759 if (*name == '.')
14760 ++name;
14761
14762 if (strncmp (name, "__libc_start_main", 17) == 0
14763 && (name[17] == 0 || name[17] == '@'))
6ab189d5 14764 {
ba8ca3e7
AM
14765 /* Allow crt1 branch to go via a toc adjusting
14766 stub. Other calls that never return could do
14767 the same, if we could detect such. */
b25116a9 14768 can_plt_call = TRUE;
6ab189d5 14769 }
ba8ca3e7
AM
14770 }
14771
14772 if (!can_plt_call)
14773 {
14774 /* g++ as of 20130507 emits self-calls without a
14775 following nop. This is arguably wrong since we
14776 have conflicting information. On the one hand a
14777 global symbol and on the other a local call
14778 sequence, but don't error for this special case.
14779 It isn't possible to cheaply verify we have
14780 exactly such a call. Allow all calls to the same
14781 section. */
14782 asection *code_sec = sec;
14783
14784 if (get_opd_info (sec) != NULL)
ad8e1ba5 14785 {
ba8ca3e7
AM
14786 bfd_vma off = (relocation + addend
14787 - sec->output_section->vma
14788 - sec->output_offset);
bc30df16 14789
ba8ca3e7 14790 opd_entry_value (sec, off, &code_sec, NULL, FALSE);
ad8e1ba5 14791 }
ba8ca3e7
AM
14792 if (code_sec == input_section)
14793 can_plt_call = TRUE;
14794 }
14795
14796 if (!can_plt_call)
14797 {
4805fc55
AM
14798 if (stub_entry->stub_type == ppc_stub_plt_call
14799 || stub_entry->stub_type == ppc_stub_plt_call_r2save)
14800 info->callbacks->einfo
695344c0 14801 /* xgettext:c-format */
c1c8c1ef 14802 (_("%H: call to `%pT' lacks nop, can't restore toc; "
4805fc55
AM
14803 "recompile with -fPIC\n"),
14804 input_bfd, input_section, rel->r_offset, sym_name);
14805 else
14806 info->callbacks->einfo
695344c0 14807 /* xgettext:c-format */
c1c8c1ef 14808 (_("%H: call to `%pT' lacks nop, can't restore toc; "
4805fc55
AM
14809 "(-mcmodel=small toc adjust stub)\n"),
14810 input_bfd, input_section, rel->r_offset, sym_name);
ba8ca3e7
AM
14811
14812 bfd_set_error (bfd_error_bad_value);
14813 ret = FALSE;
721956f4
AM
14814 }
14815
b25116a9 14816 if (can_plt_call
794e51c0
AM
14817 && (stub_entry->stub_type == ppc_stub_plt_call
14818 || stub_entry->stub_type == ppc_stub_plt_call_r2save))
b25116a9
AM
14819 unresolved_reloc = FALSE;
14820 }
14821
6abec6bc
AM
14822 if ((stub_entry == NULL
14823 || stub_entry->stub_type == ppc_stub_long_branch
14824 || stub_entry->stub_type == ppc_stub_plt_branch)
8387904d
AM
14825 && get_opd_info (sec) != NULL)
14826 {
14827 /* The branch destination is the value of the opd entry. */
4cc603a5
AM
14828 bfd_vma off = (relocation + addend
14829 - sec->output_section->vma
14830 - sec->output_offset);
aef36ac1 14831 bfd_vma dest = opd_entry_value (sec, off, NULL, NULL, FALSE);
8387904d
AM
14832 if (dest != (bfd_vma) -1)
14833 {
14834 relocation = dest;
14835 addend = 0;
bc30df16 14836 reloc_dest = DEST_OPD;
8387904d
AM
14837 }
14838 }
14839
b25116a9
AM
14840 /* If the branch is out of reach we ought to have a long
14841 branch stub. */
14842 from = (rel->r_offset
14843 + input_section->output_offset
14844 + input_section->output_section->vma);
14845
6911b7dc
AM
14846 relocation += PPC64_LOCAL_ENTRY_OFFSET (fdh
14847 ? fdh->elf.other
14848 : sym->st_other);
14849
6abec6bc
AM
14850 if (stub_entry != NULL
14851 && (stub_entry->stub_type == ppc_stub_long_branch
14852 || stub_entry->stub_type == ppc_stub_plt_branch)
14853 && (r_type == R_PPC64_ADDR14_BRTAKEN
14854 || r_type == R_PPC64_ADDR14_BRNTAKEN
14855 || (relocation + addend - from + max_br_offset
14856 < 2 * max_br_offset)))
14857 /* Don't use the stub if this branch is in range. */
14858 stub_entry = NULL;
b25116a9
AM
14859
14860 if (stub_entry != NULL)
14861 {
14862 /* Munge up the value and addend so that we call the stub
14863 rather than the procedure directly. */
a4b6fadd
AM
14864 asection *stub_sec = stub_entry->group->stub_sec;
14865
14866 if (stub_entry->stub_type == ppc_stub_save_res)
14867 relocation += (stub_sec->output_offset
14868 + stub_sec->output_section->vma
14869 + stub_sec->size - htab->sfpr->size
14870 - htab->sfpr->output_offset
14871 - htab->sfpr->output_section->vma);
14872 else
14873 relocation = (stub_entry->stub_offset
14874 + stub_sec->output_offset
14875 + stub_sec->output_section->vma);
b25116a9 14876 addend = 0;
bc30df16 14877 reloc_dest = DEST_STUB;
3b421ab3 14878
954b63d4 14879 if ((stub_entry->stub_type == ppc_stub_plt_call
794e51c0
AM
14880 || stub_entry->stub_type == ppc_stub_plt_call_r2save)
14881 && (ALWAYS_EMIT_R2SAVE
14882 || stub_entry->stub_type == ppc_stub_plt_call_r2save)
3b421ab3
AM
14883 && rel + 1 < relend
14884 && rel[1].r_offset == rel->r_offset + 4
14885 && ELF64_R_TYPE (rel[1].r_info) == R_PPC64_TOCSAVE)
14886 relocation += 4;
b25116a9
AM
14887 }
14888
14889 if (insn != 0)
14890 {
794e51c0 14891 if (is_isa_v2)
721956f4 14892 {
b25116a9
AM
14893 /* Set 'a' bit. This is 0b00010 in BO field for branch
14894 on CR(BI) insns (BO == 001at or 011at), and 0b01000
14895 for branch on CTR insns (BO == 1a00t or 1a01t). */
14896 if ((insn & (0x14 << 21)) == (0x04 << 21))
14897 insn |= 0x02 << 21;
14898 else if ((insn & (0x14 << 21)) == (0x10 << 21))
14899 insn |= 0x08 << 21;
14900 else
14901 break;
14902 }
14903 else
14904 {
14905 /* Invert 'y' bit if not the default. */
4cc603a5 14906 if ((bfd_signed_vma) (relocation + addend - from) < 0)
b25116a9 14907 insn ^= 0x01 << 21;
721956f4 14908 }
b25116a9 14909
95f0d0d2 14910 bfd_put_32 (input_bfd, insn, contents + rel->r_offset);
5bd4f169 14911 }
e86ce104 14912
06da1e8e
AM
14913 /* NOP out calls to undefined weak functions.
14914 We can thus call a weak function without first
14915 checking whether the function is defined. */
b25116a9 14916 else if (h != NULL
039b3fef 14917 && h->elf.root.type == bfd_link_hash_undefweak
766bc656 14918 && h->elf.dynindx == -1
b25116a9
AM
14919 && r_type == R_PPC64_REL24
14920 && relocation == 0
4cc603a5 14921 && addend == 0)
e86ce104 14922 {
95f0d0d2 14923 bfd_put_32 (input_bfd, NOP, contents + rel->r_offset);
c316a17c 14924 goto copy_reloc;
e86ce104 14925 }
65f38f15
AM
14926 break;
14927 }
5bd4f169 14928
65f38f15 14929 /* Set `addend'. */
411e1bfb 14930 tls_type = 0;
23cedd1d 14931 save_unresolved_reloc = unresolved_reloc;
65f38f15
AM
14932 switch (r_type)
14933 {
14934 default:
cf97bcb0
AM
14935 /* xgettext:c-format */
14936 _bfd_error_handler (_("%pB: %s unsupported"),
14937 input_bfd, ppc64_elf_howto_table[r_type]->name);
5bd4f169 14938
65f38f15 14939 bfd_set_error (bfd_error_bad_value);
b34976b6 14940 ret = FALSE;
c316a17c 14941 goto copy_reloc;
5bd4f169 14942
65f38f15 14943 case R_PPC64_NONE:
411e1bfb 14944 case R_PPC64_TLS:
727fc41e
AM
14945 case R_PPC64_TLSGD:
14946 case R_PPC64_TLSLD:
3b421ab3 14947 case R_PPC64_TOCSAVE:
04c9666a
AM
14948 case R_PPC64_GNU_VTINHERIT:
14949 case R_PPC64_GNU_VTENTRY:
006589cf 14950 case R_PPC64_ENTRY:
c316a17c 14951 goto copy_reloc;
5bd4f169
AM
14952
14953 /* GOT16 relocations. Like an ADDR16 using the symbol's
14954 address in the GOT as relocation value instead of the
411e1bfb 14955 symbol's value itself. Also, create a GOT entry for the
5bd4f169 14956 symbol and put the symbol value there. */
411e1bfb
AM
14957 case R_PPC64_GOT_TLSGD16:
14958 case R_PPC64_GOT_TLSGD16_LO:
14959 case R_PPC64_GOT_TLSGD16_HI:
14960 case R_PPC64_GOT_TLSGD16_HA:
951fd09b 14961 tls_type = TLS_TLS | TLS_GD;
411e1bfb
AM
14962 goto dogot;
14963
14964 case R_PPC64_GOT_TLSLD16:
14965 case R_PPC64_GOT_TLSLD16_LO:
14966 case R_PPC64_GOT_TLSLD16_HI:
14967 case R_PPC64_GOT_TLSLD16_HA:
951fd09b 14968 tls_type = TLS_TLS | TLS_LD;
411e1bfb
AM
14969 goto dogot;
14970
14971 case R_PPC64_GOT_TPREL16_DS:
14972 case R_PPC64_GOT_TPREL16_LO_DS:
14973 case R_PPC64_GOT_TPREL16_HI:
14974 case R_PPC64_GOT_TPREL16_HA:
14975 tls_type = TLS_TLS | TLS_TPREL;
14976 goto dogot;
14977
14978 case R_PPC64_GOT_DTPREL16_DS:
14979 case R_PPC64_GOT_DTPREL16_LO_DS:
14980 case R_PPC64_GOT_DTPREL16_HI:
14981 case R_PPC64_GOT_DTPREL16_HA:
14982 tls_type = TLS_TLS | TLS_DTPREL;
14983 goto dogot;
14984
65f38f15
AM
14985 case R_PPC64_GOT16:
14986 case R_PPC64_GOT16_LO:
14987 case R_PPC64_GOT16_HI:
14988 case R_PPC64_GOT16_HA:
14989 case R_PPC64_GOT16_DS:
14990 case R_PPC64_GOT16_LO_DS:
411e1bfb 14991 dogot:
5bd4f169
AM
14992 {
14993 /* Relocation is to the entry for this symbol in the global
14994 offset table. */
e717da7e 14995 asection *got;
d881513a 14996 bfd_vma *offp;
5bd4f169 14997 bfd_vma off;
d881513a 14998 unsigned long indx = 0;
927be08e 14999 struct got_entry *ent;
65f38f15 15000
d881513a
AM
15001 if (tls_type == (TLS_TLS | TLS_LD)
15002 && (h == NULL
f5385ebf 15003 || !h->elf.def_dynamic))
927be08e 15004 ent = ppc64_tlsld_got (input_bfd);
411e1bfb 15005 else
5bd4f169 15006 {
d881513a
AM
15007 if (h != NULL)
15008 {
f0158f44
AM
15009 if (!htab->elf.dynamic_sections_created
15010 || h->elf.dynindx == -1
15011 || SYMBOL_REFERENCES_LOCAL (info, &h->elf)
21d68fcd 15012 || UNDEFWEAK_NO_DYNAMIC_RELOC (info, &h->elf))
d881513a
AM
15013 /* This is actually a static link, or it is a
15014 -Bsymbolic link and the symbol is defined
15015 locally, or the symbol was forced to be local
15016 because of a version file. */
15017 ;
15018 else
15019 {
039b3fef 15020 indx = h->elf.dynindx;
d881513a
AM
15021 unresolved_reloc = FALSE;
15022 }
039b3fef 15023 ent = h->elf.got.glist;
d881513a 15024 }
411e1bfb 15025 else
5bd4f169 15026 {
d881513a
AM
15027 if (local_got_ents == NULL)
15028 abort ();
15029 ent = local_got_ents[r_symndx];
5bd4f169 15030 }
d881513a
AM
15031
15032 for (; ent != NULL; ent = ent->next)
31c76678 15033 if (ent->addend == orig_rel.r_addend
e717da7e 15034 && ent->owner == input_bfd
d881513a
AM
15035 && ent->tls_type == tls_type)
15036 break;
5bd4f169 15037 }
411e1bfb 15038
927be08e
AM
15039 if (ent == NULL)
15040 abort ();
15041 if (ent->is_indirect)
15042 ent = ent->got.ent;
15043 offp = &ent->got.offset;
15044 got = ppc64_elf_tdata (ent->owner)->got;
e717da7e
AM
15045 if (got == NULL)
15046 abort ();
15047
411e1bfb
AM
15048 /* The offset must always be a multiple of 8. We use the
15049 least significant bit to record whether we have already
15050 processed this entry. */
d881513a 15051 off = *offp;
411e1bfb
AM
15052 if ((off & 1) != 0)
15053 off &= ~1;
5bd4f169
AM
15054 else
15055 {
411e1bfb
AM
15056 /* Generate relocs for the dynamic linker, except in
15057 the case of TLSLD where we'll use one entry per
15058 module. */
25f23106
AM
15059 asection *relgot;
15060 bfd_boolean ifunc;
e717da7e 15061
d881513a 15062 *offp = off | 1;
25f23106
AM
15063 relgot = NULL;
15064 ifunc = (h != NULL
15065 ? h->elf.type == STT_GNU_IFUNC
15066 : ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC);
19e08130 15067 if (ifunc)
82e66161
AM
15068 {
15069 relgot = htab->elf.irelplt;
15070 if (indx == 0)
15071 htab->local_ifunc_resolver = 1;
15072 else if (is_static_defined (&h->elf))
15073 htab->maybe_local_ifunc_resolver = 1;
15074 }
f0158f44
AM
15075 else if (indx != 0
15076 || (bfd_link_pic (info)
15077 && (h == NULL
21d68fcd 15078 || !UNDEFWEAK_NO_DYNAMIC_RELOC (info, &h->elf)
f0158f44 15079 || (tls_type == (TLS_TLS | TLS_LD)
f15d0b54
AM
15080 && !h->elf.def_dynamic))
15081 && !(tls_type == (TLS_TLS | TLS_TPREL)
15082 && bfd_link_executable (info)
15083 && SYMBOL_REFERENCES_LOCAL (info, &h->elf))))
19e08130 15084 relgot = ppc64_elf_tdata (ent->owner)->relgot;
25f23106 15085 if (relgot != NULL)
5bd4f169 15086 {
e717da7e
AM
15087 outrel.r_offset = (got->output_section->vma
15088 + got->output_offset
411e1bfb 15089 + off);
4cc603a5 15090 outrel.r_addend = addend;
d881513a 15091 if (tls_type & (TLS_LD | TLS_GD))
5bd4f169 15092 {
411e1bfb 15093 outrel.r_addend = 0;
e515b051 15094 outrel.r_info = ELF64_R_INFO (indx, R_PPC64_DTPMOD64);
d881513a
AM
15095 if (tls_type == (TLS_TLS | TLS_GD))
15096 {
e717da7e
AM
15097 loc = relgot->contents;
15098 loc += (relgot->reloc_count++
d881513a
AM
15099 * sizeof (Elf64_External_Rela));
15100 bfd_elf64_swap_reloca_out (output_bfd,
15101 &outrel, loc);
e515b051 15102 outrel.r_offset += 8;
4cc603a5 15103 outrel.r_addend = addend;
d881513a
AM
15104 outrel.r_info
15105 = ELF64_R_INFO (indx, R_PPC64_DTPREL64);
d881513a 15106 }
411e1bfb 15107 }
951fd09b 15108 else if (tls_type == (TLS_TLS | TLS_DTPREL))
411e1bfb 15109 outrel.r_info = ELF64_R_INFO (indx, R_PPC64_DTPREL64);
951fd09b 15110 else if (tls_type == (TLS_TLS | TLS_TPREL))
411e1bfb 15111 outrel.r_info = ELF64_R_INFO (indx, R_PPC64_TPREL64);
25f23106
AM
15112 else if (indx != 0)
15113 outrel.r_info = ELF64_R_INFO (indx, R_PPC64_GLOB_DAT);
15114 else
81407a69 15115 {
25f23106
AM
15116 if (ifunc)
15117 outrel.r_info = ELF64_R_INFO (0, R_PPC64_IRELATIVE);
15118 else
15119 outrel.r_info = ELF64_R_INFO (0, R_PPC64_RELATIVE);
81407a69
AM
15120
15121 /* Write the .got section contents for the sake
15122 of prelink. */
e717da7e 15123 loc = got->contents + off;
23fbd6fa
JJ
15124 bfd_put_64 (output_bfd, outrel.r_addend + relocation,
15125 loc);
81407a69 15126 }
81407a69
AM
15127
15128 if (indx == 0 && tls_type != (TLS_TLS | TLS_LD))
e515b051
AM
15129 {
15130 outrel.r_addend += relocation;
15131 if (tls_type & (TLS_GD | TLS_DTPREL | TLS_TPREL))
989f9879
AM
15132 {
15133 if (htab->elf.tls_sec == NULL)
15134 outrel.r_addend = 0;
15135 else
15136 outrel.r_addend -= htab->elf.tls_sec->vma;
15137 }
e515b051 15138 }
e717da7e
AM
15139 loc = relgot->contents;
15140 loc += (relgot->reloc_count++
411e1bfb
AM
15141 * sizeof (Elf64_External_Rela));
15142 bfd_elf64_swap_reloca_out (output_bfd, &outrel, loc);
15143 }
15144
ad8e1ba5 15145 /* Init the .got section contents here if we're not
81407a69 15146 emitting a reloc. */
d881513a 15147 else
411e1bfb 15148 {
4cc603a5 15149 relocation += addend;
f0158f44 15150 if (tls_type != 0)
411e1bfb 15151 {
989f9879
AM
15152 if (htab->elf.tls_sec == NULL)
15153 relocation = 0;
15154 else
15155 {
f0158f44
AM
15156 if (tls_type & TLS_LD)
15157 relocation = 0;
15158 else
15159 relocation -= htab->elf.tls_sec->vma + DTP_OFFSET;
676ee2b5 15160 if (tls_type & TLS_TPREL)
989f9879
AM
15161 relocation += DTP_OFFSET - TP_OFFSET;
15162 }
5bd4f169 15163
f0158f44 15164 if (tls_type & (TLS_GD | TLS_LD))
7b609f53
AM
15165 {
15166 bfd_put_64 (output_bfd, relocation,
e717da7e 15167 got->contents + off + 8);
676ee2b5 15168 relocation = 1;
7b609f53 15169 }
411e1bfb
AM
15170 }
15171 bfd_put_64 (output_bfd, relocation,
e717da7e 15172 got->contents + off);
5bd4f169
AM
15173 }
15174 }
15175
65f38f15
AM
15176 if (off >= (bfd_vma) -2)
15177 abort ();
15178
bf102f86 15179 relocation = got->output_section->vma + got->output_offset + off;
6f20ed8a 15180 addend = -(TOCstart + htab->sec_info[input_section->id].toc_off);
5bd4f169 15181 }
65f38f15
AM
15182 break;
15183
15184 case R_PPC64_PLT16_HA:
15185 case R_PPC64_PLT16_HI:
15186 case R_PPC64_PLT16_LO:
08be3224 15187 case R_PPC64_PLT16_LO_DS:
65f38f15
AM
15188 case R_PPC64_PLT32:
15189 case R_PPC64_PLT64:
23cedd1d
AM
15190 case R_PPC64_PLTSEQ:
15191 case R_PPC64_PLTCALL:
65f38f15
AM
15192 /* Relocation is to the entry for this symbol in the
15193 procedure linkage table. */
23cedd1d 15194 unresolved_reloc = TRUE;
cbf95972
AM
15195 {
15196 struct plt_entry **plt_list = NULL;
15197 if (h != NULL)
15198 plt_list = &h->elf.plt.plist;
15199 else if (local_got_ents != NULL)
15200 {
15201 struct plt_entry **local_plt = (struct plt_entry **)
15202 (local_got_ents + symtab_hdr->sh_info);
2d7ad24e 15203 plt_list = local_plt + r_symndx;
cbf95972
AM
15204 }
15205 if (plt_list)
15206 {
15207 struct plt_entry *ent;
65f38f15 15208
cbf95972
AM
15209 for (ent = *plt_list; ent != NULL; ent = ent->next)
15210 if (ent->plt.offset != (bfd_vma) -1
15211 && ent->addend == orig_rel.r_addend)
15212 {
15213 asection *plt;
08be3224 15214 bfd_vma got;
cbf95972
AM
15215
15216 plt = htab->elf.splt;
15217 if (!htab->elf.dynamic_sections_created
15218 || h == NULL
15219 || h->elf.dynindx == -1)
2d7ad24e
AM
15220 {
15221 if (h != NULL
15222 ? h->elf.type == STT_GNU_IFUNC
15223 : ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC)
15224 plt = htab->elf.iplt;
15225 else
15226 plt = htab->pltlocal;
15227 }
15228 relocation = (plt->output_section->vma
15229 + plt->output_offset
15230 + ent->plt.offset);
08be3224
AM
15231 if (r_type == R_PPC64_PLT16_HA
15232 || r_type ==R_PPC64_PLT16_HI
15233 || r_type ==R_PPC64_PLT16_LO
15234 || r_type ==R_PPC64_PLT16_LO_DS)
15235 {
15236 got = (elf_gp (output_bfd)
15237 + htab->sec_info[input_section->id].toc_off);
15238 relocation -= got;
15239 }
cbf95972
AM
15240 addend = 0;
15241 unresolved_reloc = FALSE;
15242 break;
15243 }
15244 }
15245 }
65f38f15 15246 break;
5bd4f169 15247
0b13192e
AM
15248 case R_PPC64_TOC:
15249 /* Relocation value is TOC base. */
15250 relocation = TOCstart;
cf35638d 15251 if (r_symndx == STN_UNDEF)
6f20ed8a 15252 relocation += htab->sec_info[input_section->id].toc_off;
8517fae7
AM
15253 else if (unresolved_reloc)
15254 ;
6f20ed8a
AM
15255 else if (sec != NULL && sec->id < htab->sec_info_arr_size)
15256 relocation += htab->sec_info[sec->id].toc_off;
0b13192e
AM
15257 else
15258 unresolved_reloc = TRUE;
ab96bf03 15259 goto dodyn;
0b13192e 15260
5bd4f169
AM
15261 /* TOC16 relocs. We want the offset relative to the TOC base,
15262 which is the address of the start of the TOC plus 0x8000.
15263 The TOC consists of sections .got, .toc, .tocbss, and .plt,
15264 in this order. */
65f38f15
AM
15265 case R_PPC64_TOC16:
15266 case R_PPC64_TOC16_LO:
15267 case R_PPC64_TOC16_HI:
15268 case R_PPC64_TOC16_DS:
15269 case R_PPC64_TOC16_LO_DS:
15270 case R_PPC64_TOC16_HA:
6f20ed8a 15271 addend -= TOCstart + htab->sec_info[input_section->id].toc_off;
5bd4f169
AM
15272 break;
15273
15274 /* Relocate against the beginning of the section. */
65f38f15
AM
15275 case R_PPC64_SECTOFF:
15276 case R_PPC64_SECTOFF_LO:
15277 case R_PPC64_SECTOFF_HI:
15278 case R_PPC64_SECTOFF_DS:
15279 case R_PPC64_SECTOFF_LO_DS:
15280 case R_PPC64_SECTOFF_HA:
4ce794b7 15281 if (sec != NULL)
65f38f15 15282 addend -= sec->output_section->vma;
5bd4f169
AM
15283 break;
15284
25f23106
AM
15285 case R_PPC64_REL16:
15286 case R_PPC64_REL16_LO:
15287 case R_PPC64_REL16_HI:
15288 case R_PPC64_REL16_HA:
a680de9a 15289 case R_PPC64_REL16DX_HA:
25f23106
AM
15290 break;
15291
721956f4
AM
15292 case R_PPC64_REL14:
15293 case R_PPC64_REL14_BRNTAKEN:
15294 case R_PPC64_REL14_BRTAKEN:
5d1634d7
AM
15295 case R_PPC64_REL24:
15296 break;
15297
411e1bfb
AM
15298 case R_PPC64_TPREL16:
15299 case R_PPC64_TPREL16_LO:
15300 case R_PPC64_TPREL16_HI:
15301 case R_PPC64_TPREL16_HA:
15302 case R_PPC64_TPREL16_DS:
15303 case R_PPC64_TPREL16_LO_DS:
f9c6b907
AM
15304 case R_PPC64_TPREL16_HIGH:
15305 case R_PPC64_TPREL16_HIGHA:
411e1bfb
AM
15306 case R_PPC64_TPREL16_HIGHER:
15307 case R_PPC64_TPREL16_HIGHERA:
15308 case R_PPC64_TPREL16_HIGHEST:
15309 case R_PPC64_TPREL16_HIGHESTA:
766bc656
AM
15310 if (h != NULL
15311 && h->elf.root.type == bfd_link_hash_undefweak
15312 && h->elf.dynindx == -1)
15313 {
15314 /* Make this relocation against an undefined weak symbol
15315 resolve to zero. This is really just a tweak, since
15316 code using weak externs ought to check that they are
15317 defined before using them. */
15318 bfd_byte *p = contents + rel->r_offset - d_offset;
15319
95f0d0d2 15320 insn = bfd_get_32 (input_bfd, p);
766bc656
AM
15321 insn = _bfd_elf_ppc_at_tprel_transform (insn, 13);
15322 if (insn != 0)
95f0d0d2 15323 bfd_put_32 (input_bfd, insn, p);
766bc656
AM
15324 break;
15325 }
989f9879
AM
15326 if (htab->elf.tls_sec != NULL)
15327 addend -= htab->elf.tls_sec->vma + TP_OFFSET;
7c8bbca5
AM
15328 /* The TPREL16 relocs shouldn't really be used in shared
15329 libs or with non-local symbols as that will result in
15330 DT_TEXTREL being set, but support them anyway. */
15331 goto dodyn;
411e1bfb
AM
15332
15333 case R_PPC64_DTPREL16:
15334 case R_PPC64_DTPREL16_LO:
15335 case R_PPC64_DTPREL16_HI:
15336 case R_PPC64_DTPREL16_HA:
15337 case R_PPC64_DTPREL16_DS:
15338 case R_PPC64_DTPREL16_LO_DS:
f9c6b907
AM
15339 case R_PPC64_DTPREL16_HIGH:
15340 case R_PPC64_DTPREL16_HIGHA:
411e1bfb
AM
15341 case R_PPC64_DTPREL16_HIGHER:
15342 case R_PPC64_DTPREL16_HIGHERA:
15343 case R_PPC64_DTPREL16_HIGHEST:
15344 case R_PPC64_DTPREL16_HIGHESTA:
989f9879
AM
15345 if (htab->elf.tls_sec != NULL)
15346 addend -= htab->elf.tls_sec->vma + DTP_OFFSET;
411e1bfb
AM
15347 break;
15348
45965137
AM
15349 case R_PPC64_ADDR64_LOCAL:
15350 addend += PPC64_LOCAL_ENTRY_OFFSET (h != NULL
15351 ? h->elf.other
15352 : sym->st_other);
15353 break;
15354
e515b051
AM
15355 case R_PPC64_DTPMOD64:
15356 relocation = 1;
15357 addend = 0;
15358 goto dodyn;
15359
411e1bfb 15360 case R_PPC64_TPREL64:
989f9879
AM
15361 if (htab->elf.tls_sec != NULL)
15362 addend -= htab->elf.tls_sec->vma + TP_OFFSET;
411e1bfb
AM
15363 goto dodyn;
15364
15365 case R_PPC64_DTPREL64:
989f9879
AM
15366 if (htab->elf.tls_sec != NULL)
15367 addend -= htab->elf.tls_sec->vma + DTP_OFFSET;
1a0670f3 15368 /* Fall through. */
411e1bfb 15369
65f38f15
AM
15370 /* Relocations that may need to be propagated if this is a
15371 dynamic object. */
04c9666a 15372 case R_PPC64_REL30:
65f38f15
AM
15373 case R_PPC64_REL32:
15374 case R_PPC64_REL64:
15375 case R_PPC64_ADDR14:
15376 case R_PPC64_ADDR14_BRNTAKEN:
15377 case R_PPC64_ADDR14_BRTAKEN:
15378 case R_PPC64_ADDR16:
15379 case R_PPC64_ADDR16_DS:
15380 case R_PPC64_ADDR16_HA:
15381 case R_PPC64_ADDR16_HI:
f9c6b907
AM
15382 case R_PPC64_ADDR16_HIGH:
15383 case R_PPC64_ADDR16_HIGHA:
65f38f15
AM
15384 case R_PPC64_ADDR16_HIGHER:
15385 case R_PPC64_ADDR16_HIGHERA:
15386 case R_PPC64_ADDR16_HIGHEST:
15387 case R_PPC64_ADDR16_HIGHESTA:
15388 case R_PPC64_ADDR16_LO:
15389 case R_PPC64_ADDR16_LO_DS:
15390 case R_PPC64_ADDR24:
65f38f15
AM
15391 case R_PPC64_ADDR32:
15392 case R_PPC64_ADDR64:
15393 case R_PPC64_UADDR16:
15394 case R_PPC64_UADDR32:
15395 case R_PPC64_UADDR64:
411e1bfb 15396 dodyn:
5d1634d7 15397 if ((input_section->flags & SEC_ALLOC) == 0)
ec338859
AM
15398 break;
15399
41bd81ab
AM
15400 if (NO_OPD_RELOCS && is_opd)
15401 break;
15402
8a9e8e72 15403 if (bfd_link_pic (info)
b1b07054
AM
15404 ? ((h == NULL
15405 || h->dyn_relocs != NULL)
15406 && ((h != NULL && pc_dynrelocs (h))
15407 || must_be_dyn_reloc (info, r_type)))
8a9e8e72
AM
15408 : (h != NULL
15409 ? h->dyn_relocs != NULL
d311bc8b 15410 : ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC))
65f38f15 15411 {
b34976b6 15412 bfd_boolean skip, relocate;
65f38f15 15413 asection *sreloc;
1cf1f670 15414 bfd_vma out_off;
82e66161 15415 long indx = 0;
65f38f15
AM
15416
15417 /* When generating a dynamic object, these relocations
15418 are copied into the output file to be resolved at run
15419 time. */
15420
b34976b6
AM
15421 skip = FALSE;
15422 relocate = FALSE;
65f38f15 15423
1cf1f670
AM
15424 out_off = _bfd_elf_section_offset (output_bfd, info,
15425 input_section, rel->r_offset);
15426 if (out_off == (bfd_vma) -1)
b34976b6 15427 skip = TRUE;
1cf1f670 15428 else if (out_off == (bfd_vma) -2)
b34976b6 15429 skip = TRUE, relocate = TRUE;
1cf1f670
AM
15430 out_off += (input_section->output_section->vma
15431 + input_section->output_offset);
15432 outrel.r_offset = out_off;
411e1bfb 15433 outrel.r_addend = rel->r_addend;
65f38f15 15434
1cf1f670
AM
15435 /* Optimize unaligned reloc use. */
15436 if ((r_type == R_PPC64_ADDR64 && (out_off & 7) != 0)
15437 || (r_type == R_PPC64_UADDR64 && (out_off & 7) == 0))
15438 r_type ^= R_PPC64_ADDR64 ^ R_PPC64_UADDR64;
15439 else if ((r_type == R_PPC64_ADDR32 && (out_off & 3) != 0)
15440 || (r_type == R_PPC64_UADDR32 && (out_off & 3) == 0))
15441 r_type ^= R_PPC64_ADDR32 ^ R_PPC64_UADDR32;
15442 else if ((r_type == R_PPC64_ADDR16 && (out_off & 1) != 0)
15443 || (r_type == R_PPC64_UADDR16 && (out_off & 1) == 0))
15444 r_type ^= R_PPC64_ADDR16 ^ R_PPC64_UADDR16;
15445
65f38f15 15446 if (skip)
0bb2d96a 15447 memset (&outrel, 0, sizeof outrel);
afe397ea 15448 else if (!SYMBOL_REFERENCES_LOCAL (info, &h->elf)
0b13192e
AM
15449 && !is_opd
15450 && r_type != R_PPC64_TOC)
14acf4dc 15451 {
82e66161
AM
15452 indx = h->elf.dynindx;
15453 BFD_ASSERT (indx != -1);
15454 outrel.r_info = ELF64_R_INFO (indx, r_type);
14acf4dc 15455 }
65f38f15
AM
15456 else
15457 {
41bd81ab
AM
15458 /* This symbol is local, or marked to become local,
15459 or this is an opd section reloc which must point
15460 at a local function. */
65f38f15 15461 outrel.r_addend += relocation;
e86ce104 15462 if (r_type == R_PPC64_ADDR64 || r_type == R_PPC64_TOC)
65f38f15 15463 {
3fad3c7c 15464 if (is_opd && h != NULL)
afbe61cf
AM
15465 {
15466 /* Lie about opd entries. This case occurs
15467 when building shared libraries and we
15468 reference a function in another shared
3fad3c7c
AM
15469 lib. The same thing happens for a weak
15470 definition in an application that's
15471 overridden by a strong definition in a
15472 shared lib. (I believe this is a generic
15473 bug in binutils handling of weak syms.)
15474 In these cases we won't use the opd
1e2f5b6e 15475 entry in this lib. */
b34976b6 15476 unresolved_reloc = FALSE;
afbe61cf 15477 }
25f23106
AM
15478 if (!is_opd
15479 && r_type == R_PPC64_ADDR64
15480 && (h != NULL
15481 ? h->elf.type == STT_GNU_IFUNC
15482 : ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC))
15483 outrel.r_info = ELF64_R_INFO (0, R_PPC64_IRELATIVE);
15484 else
15485 {
15486 outrel.r_info = ELF64_R_INFO (0, R_PPC64_RELATIVE);
81407a69 15487
25f23106
AM
15488 /* We need to relocate .opd contents for ld.so.
15489 Prelink also wants simple and consistent rules
15490 for relocs. This make all RELATIVE relocs have
15491 *r_offset equal to r_addend. */
15492 relocate = TRUE;
15493 }
65f38f15
AM
15494 }
15495 else
15496 {
25f23106
AM
15497 if (h != NULL
15498 ? h->elf.type == STT_GNU_IFUNC
15499 : ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC)
15500 {
25f53a85 15501 info->callbacks->einfo
695344c0 15502 /* xgettext:c-format */
174d0a74 15503 (_("%H: %s for indirect "
c1c8c1ef 15504 "function `%pT' unsupported\n"),
25f53a85 15505 input_bfd, input_section, rel->r_offset,
25f23106
AM
15506 ppc64_elf_howto_table[r_type]->name,
15507 sym_name);
15508 ret = FALSE;
15509 }
cf35638d 15510 else if (r_symndx == STN_UNDEF || bfd_is_abs_section (sec))
65f38f15
AM
15511 ;
15512 else if (sec == NULL || sec->owner == NULL)
15513 {
15514 bfd_set_error (bfd_error_bad_value);
b34976b6 15515 return FALSE;
65f38f15
AM
15516 }
15517 else
15518 {
15519 asection *osec;
15520
15521 osec = sec->output_section;
15522 indx = elf_section_data (osec)->dynindx;
15523
74541ad4
AM
15524 if (indx == 0)
15525 {
15526 if ((osec->flags & SEC_READONLY) == 0
15527 && htab->elf.data_index_section != NULL)
15528 osec = htab->elf.data_index_section;
15529 else
15530 osec = htab->elf.text_index_section;
15531 indx = elf_section_data (osec)->dynindx;
15532 }
15533 BFD_ASSERT (indx != 0);
15534
65f38f15
AM
15535 /* We are turning this relocation into one
15536 against a section symbol, so subtract out
15537 the output section's address but not the
15538 offset of the input section in the output
15539 section. */
15540 outrel.r_addend -= osec->vma;
15541 }
15542
15543 outrel.r_info = ELF64_R_INFO (indx, r_type);
15544 }
15545 }
15546
15547 sreloc = elf_section_data (input_section)->sreloc;
19e08130
AM
15548 if (h != NULL
15549 ? h->elf.type == STT_GNU_IFUNC
15550 : ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC)
82e66161
AM
15551 {
15552 sreloc = htab->elf.irelplt;
15553 if (indx == 0)
15554 htab->local_ifunc_resolver = 1;
15555 else if (is_static_defined (&h->elf))
15556 htab->maybe_local_ifunc_resolver = 1;
15557 }
65f38f15
AM
15558 if (sreloc == NULL)
15559 abort ();
15560
dfbb6ac9
AM
15561 if (sreloc->reloc_count * sizeof (Elf64_External_Rela)
15562 >= sreloc->size)
15563 abort ();
947216bf
AM
15564 loc = sreloc->contents;
15565 loc += sreloc->reloc_count++ * sizeof (Elf64_External_Rela);
65f38f15
AM
15566 bfd_elf64_swap_reloca_out (output_bfd, &outrel, loc);
15567
15568 /* If this reloc is against an external symbol, it will
15569 be computed at runtime, so there's no need to do
81407a69
AM
15570 anything now. However, for the sake of prelink ensure
15571 that the section contents are a known value. */
65f38f15 15572 if (! relocate)
81407a69
AM
15573 {
15574 unresolved_reloc = FALSE;
15575 /* The value chosen here is quite arbitrary as ld.so
15576 ignores section contents except for the special
15577 case of .opd where the contents might be accessed
15578 before relocation. Choose zero, as that won't
15579 cause reloc overflow. */
15580 relocation = 0;
15581 addend = 0;
15582 /* Use *r_offset == r_addend for R_PPC64_ADDR64 relocs
15583 to improve backward compatibility with older
15584 versions of ld. */
15585 if (r_type == R_PPC64_ADDR64)
15586 addend = outrel.r_addend;
15587 /* Adjust pc_relative relocs to have zero in *r_offset. */
4ce794b7 15588 else if (ppc64_elf_howto_table[r_type]->pc_relative)
f0158f44 15589 addend = outrel.r_offset;
81407a69 15590 }
65f38f15 15591 }
5bd4f169
AM
15592 break;
15593
65f38f15
AM
15594 case R_PPC64_COPY:
15595 case R_PPC64_GLOB_DAT:
15596 case R_PPC64_JMP_SLOT:
25f23106 15597 case R_PPC64_JMP_IREL:
65f38f15
AM
15598 case R_PPC64_RELATIVE:
15599 /* We shouldn't ever see these dynamic relocs in relocatable
15600 files. */
ae9a127f 15601 /* Fall through. */
65f38f15
AM
15602
15603 case R_PPC64_PLTGOT16:
15604 case R_PPC64_PLTGOT16_DS:
15605 case R_PPC64_PLTGOT16_HA:
15606 case R_PPC64_PLTGOT16_HI:
15607 case R_PPC64_PLTGOT16_LO:
15608 case R_PPC64_PLTGOT16_LO_DS:
15609 case R_PPC64_PLTREL32:
15610 case R_PPC64_PLTREL64:
15611 /* These ones haven't been implemented yet. */
15612
25f53a85 15613 info->callbacks->einfo
695344c0 15614 /* xgettext:c-format */
c1c8c1ef 15615 (_("%P: %pB: %s is not supported for `%pT'\n"),
d003868e 15616 input_bfd,
4ce794b7 15617 ppc64_elf_howto_table[r_type]->name, sym_name);
5bd4f169
AM
15618
15619 bfd_set_error (bfd_error_invalid_operation);
b34976b6 15620 ret = FALSE;
c316a17c 15621 goto copy_reloc;
65f38f15 15622 }
5bd4f169 15623
67f0cbdb
AM
15624 /* Multi-instruction sequences that access the TOC can be
15625 optimized, eg. addis ra,r2,0; addi rb,ra,x;
07d6d2b8 15626 to nop; addi rb,r2,x; */
67f0cbdb
AM
15627 switch (r_type)
15628 {
15629 default:
15630 break;
15631
15632 case R_PPC64_GOT_TLSLD16_HI:
15633 case R_PPC64_GOT_TLSGD16_HI:
15634 case R_PPC64_GOT_TPREL16_HI:
15635 case R_PPC64_GOT_DTPREL16_HI:
15636 case R_PPC64_GOT16_HI:
15637 case R_PPC64_TOC16_HI:
15638 /* These relocs would only be useful if building up an
15639 offset to later add to r2, perhaps in an indexed
15640 addressing mode instruction. Don't try to optimize.
15641 Unfortunately, the possibility of someone building up an
15642 offset like this or even with the HA relocs, means that
15643 we need to check the high insn when optimizing the low
15644 insn. */
15645 break;
15646
23cedd1d
AM
15647 case R_PPC64_PLTCALL:
15648 if (unresolved_reloc)
15649 {
15650 /* No plt entry. Make this into a direct call. */
15651 bfd_byte *p = contents + rel->r_offset;
15652 insn = bfd_get_32 (input_bfd, p);
15653 insn &= 1;
15654 bfd_put_32 (input_bfd, B_DOT | insn, p);
15655 bfd_put_32 (input_bfd, NOP, p + 4);
15656 unresolved_reloc = save_unresolved_reloc;
15657 r_type = R_PPC64_REL24;
15658 }
15659 break;
15660
15661 case R_PPC64_PLTSEQ:
15662 if (unresolved_reloc)
15663 {
15664 unresolved_reloc = FALSE;
15665 goto nop_it;
15666 }
15667 break;
15668
15669 case R_PPC64_PLT16_HA:
15670 if (unresolved_reloc)
15671 {
15672 unresolved_reloc = FALSE;
15673 goto nop_it;
15674 }
15675 /* Fall through. */
67f0cbdb
AM
15676 case R_PPC64_GOT_TLSLD16_HA:
15677 case R_PPC64_GOT_TLSGD16_HA:
15678 case R_PPC64_GOT_TPREL16_HA:
15679 case R_PPC64_GOT_DTPREL16_HA:
15680 case R_PPC64_GOT16_HA:
15681 case R_PPC64_TOC16_HA:
98528052 15682 if (htab->do_toc_opt && relocation + addend + 0x8000 < 0x10000
560c8763 15683 && !ppc64_elf_tdata (input_bfd)->unexpected_toc_insn)
98528052 15684 {
23cedd1d
AM
15685 bfd_byte *p;
15686 nop_it:
15687 p = contents + (rel->r_offset & ~3);
98528052 15688 bfd_put_32 (input_bfd, NOP, p);
d830549d 15689 goto copy_reloc;
98528052 15690 }
67f0cbdb
AM
15691 break;
15692
23cedd1d
AM
15693 case R_PPC64_PLT16_LO:
15694 case R_PPC64_PLT16_LO_DS:
15695 if (unresolved_reloc)
15696 {
15697 unresolved_reloc = FALSE;
15698 goto nop_it;
15699 }
15700 /* Fall through. */
67f0cbdb
AM
15701 case R_PPC64_GOT_TLSLD16_LO:
15702 case R_PPC64_GOT_TLSGD16_LO:
15703 case R_PPC64_GOT_TPREL16_LO_DS:
15704 case R_PPC64_GOT_DTPREL16_LO_DS:
15705 case R_PPC64_GOT16_LO:
15706 case R_PPC64_GOT16_LO_DS:
15707 case R_PPC64_TOC16_LO:
15708 case R_PPC64_TOC16_LO_DS:
98528052 15709 if (htab->do_toc_opt && relocation + addend + 0x8000 < 0x10000
560c8763 15710 && !ppc64_elf_tdata (input_bfd)->unexpected_toc_insn)
67f0cbdb
AM
15711 {
15712 bfd_byte *p = contents + (rel->r_offset & ~3);
15713 insn = bfd_get_32 (input_bfd, p);
560c8763
AM
15714 if ((insn & (0x3f << 26)) == 12u << 26 /* addic */)
15715 {
15716 /* Transform addic to addi when we change reg. */
15717 insn &= ~((0x3f << 26) | (0x1f << 16));
15718 insn |= (14u << 26) | (2 << 16);
15719 }
15720 else
67f0cbdb 15721 {
98528052
AM
15722 insn &= ~(0x1f << 16);
15723 insn |= 2 << 16;
67f0cbdb 15724 }
560c8763 15725 bfd_put_32 (input_bfd, insn, p);
67f0cbdb
AM
15726 }
15727 break;
9a23f96e
AM
15728
15729 case R_PPC64_TPREL16_HA:
15730 if (htab->do_tls_opt && relocation + addend + 0x8000 < 0x10000)
15731 {
15732 bfd_byte *p = contents + (rel->r_offset & ~3);
15733 insn = bfd_get_32 (input_bfd, p);
15734 if ((insn & ((0x3f << 26) | 0x1f << 16))
15735 != ((15u << 26) | (13 << 16)) /* addis rt,13,imm */)
15736 /* xgettext:c-format */
15737 info->callbacks->minfo
15738 (_("%H: warning: %s unexpected insn %#x.\n"),
d830549d
AM
15739 input_bfd, input_section, rel->r_offset,
15740 ppc64_elf_howto_table[r_type]->name, insn);
9a23f96e 15741 else
d830549d
AM
15742 {
15743 bfd_put_32 (input_bfd, NOP, p);
15744 goto copy_reloc;
15745 }
9a23f96e
AM
15746 }
15747 break;
15748
15749 case R_PPC64_TPREL16_LO:
15750 case R_PPC64_TPREL16_LO_DS:
15751 if (htab->do_tls_opt && relocation + addend + 0x8000 < 0x10000)
15752 {
15753 bfd_byte *p = contents + (rel->r_offset & ~3);
15754 insn = bfd_get_32 (input_bfd, p);
15755 insn &= ~(0x1f << 16);
15756 insn |= 13 << 16;
15757 bfd_put_32 (input_bfd, insn, p);
15758 }
15759 break;
67f0cbdb
AM
15760 }
15761
65f38f15
AM
15762 /* Do any further special processing. */
15763 switch (r_type)
15764 {
15765 default:
15766 break;
15767
25f23106 15768 case R_PPC64_REL16_HA:
a680de9a 15769 case R_PPC64_REL16DX_HA:
f9c6b907
AM
15770 case R_PPC64_ADDR16_HA:
15771 case R_PPC64_ADDR16_HIGHA:
65f38f15
AM
15772 case R_PPC64_ADDR16_HIGHERA:
15773 case R_PPC64_ADDR16_HIGHESTA:
65f38f15
AM
15774 case R_PPC64_TOC16_HA:
15775 case R_PPC64_SECTOFF_HA:
411e1bfb 15776 case R_PPC64_TPREL16_HA:
f9c6b907 15777 case R_PPC64_TPREL16_HIGHA:
411e1bfb 15778 case R_PPC64_TPREL16_HIGHERA:
411e1bfb 15779 case R_PPC64_TPREL16_HIGHESTA:
f9c6b907
AM
15780 case R_PPC64_DTPREL16_HA:
15781 case R_PPC64_DTPREL16_HIGHA:
411e1bfb 15782 case R_PPC64_DTPREL16_HIGHERA:
411e1bfb 15783 case R_PPC64_DTPREL16_HIGHESTA:
65f38f15
AM
15784 /* It's just possible that this symbol is a weak symbol
15785 that's not actually defined anywhere. In that case,
15786 'sec' would be NULL, and we should leave the symbol
15787 alone (it will be set to zero elsewhere in the link). */
5c5f6e17
AM
15788 if (sec == NULL)
15789 break;
1a0670f3 15790 /* Fall through. */
5c5f6e17
AM
15791
15792 case R_PPC64_GOT16_HA:
15793 case R_PPC64_PLTGOT16_HA:
15794 case R_PPC64_PLT16_HA:
15795 case R_PPC64_GOT_TLSGD16_HA:
15796 case R_PPC64_GOT_TLSLD16_HA:
15797 case R_PPC64_GOT_TPREL16_HA:
15798 case R_PPC64_GOT_DTPREL16_HA:
15799 /* Add 0x10000 if sign bit in 0:15 is set.
15800 Bits 0:15 are not used. */
15801 addend += 0x8000;
65f38f15
AM
15802 break;
15803
15804 case R_PPC64_ADDR16_DS:
15805 case R_PPC64_ADDR16_LO_DS:
15806 case R_PPC64_GOT16_DS:
15807 case R_PPC64_GOT16_LO_DS:
15808 case R_PPC64_PLT16_LO_DS:
15809 case R_PPC64_SECTOFF_DS:
15810 case R_PPC64_SECTOFF_LO_DS:
15811 case R_PPC64_TOC16_DS:
15812 case R_PPC64_TOC16_LO_DS:
15813 case R_PPC64_PLTGOT16_DS:
15814 case R_PPC64_PLTGOT16_LO_DS:
411e1bfb
AM
15815 case R_PPC64_GOT_TPREL16_DS:
15816 case R_PPC64_GOT_TPREL16_LO_DS:
15817 case R_PPC64_GOT_DTPREL16_DS:
15818 case R_PPC64_GOT_DTPREL16_LO_DS:
15819 case R_PPC64_TPREL16_DS:
15820 case R_PPC64_TPREL16_LO_DS:
15821 case R_PPC64_DTPREL16_DS:
15822 case R_PPC64_DTPREL16_LO_DS:
adadcc0c
AM
15823 insn = bfd_get_32 (input_bfd, contents + (rel->r_offset & ~3));
15824 mask = 3;
a680de9a
PB
15825 /* If this reloc is against an lq, lxv, or stxv insn, then
15826 the value must be a multiple of 16. This is somewhat of
15827 a hack, but the "correct" way to do this by defining _DQ
15828 forms of all the _DS relocs bloats all reloc switches in
15829 this file. It doesn't make much sense to use these
15830 relocs in data, so testing the insn should be safe. */
15831 if ((insn & (0x3f << 26)) == (56u << 26)
15832 || ((insn & (0x3f << 26)) == (61u << 26) && (insn & 3) == 1))
adadcc0c 15833 mask = 15;
a680de9a
PB
15834 relocation += addend;
15835 addend = insn & (mask ^ 3);
15836 if ((relocation & mask) != 0)
65f38f15 15837 {
a680de9a 15838 relocation ^= relocation & mask;
25f53a85 15839 info->callbacks->einfo
695344c0 15840 /* xgettext:c-format */
174d0a74 15841 (_("%H: error: %s not a multiple of %u\n"),
25f53a85 15842 input_bfd, input_section, rel->r_offset,
d830549d 15843 ppc64_elf_howto_table[r_type]->name,
adadcc0c 15844 mask + 1);
65f38f15 15845 bfd_set_error (bfd_error_bad_value);
b34976b6 15846 ret = FALSE;
c316a17c 15847 goto copy_reloc;
65f38f15
AM
15848 }
15849 break;
5bd4f169
AM
15850 }
15851
239e1f3a
AM
15852 /* Dynamic relocs are not propagated for SEC_DEBUGGING sections
15853 because such sections are not SEC_ALLOC and thus ld.so will
15854 not process them. */
d830549d 15855 howto = ppc64_elf_howto_table[(int) r_type];
65f38f15 15856 if (unresolved_reloc
239e1f3a 15857 && !((input_section->flags & SEC_DEBUGGING) != 0
1d5316ab
AM
15858 && h->elf.def_dynamic)
15859 && _bfd_elf_section_offset (output_bfd, info, input_section,
15860 rel->r_offset) != (bfd_vma) -1)
9c07fe7c 15861 {
25f53a85 15862 info->callbacks->einfo
695344c0 15863 /* xgettext:c-format */
c1c8c1ef 15864 (_("%H: unresolvable %s against `%pT'\n"),
25f53a85 15865 input_bfd, input_section, rel->r_offset,
b80eed39 15866 howto->name,
039b3fef 15867 h->elf.root.root.string);
b34976b6 15868 ret = FALSE;
9c07fe7c 15869 }
5bd4f169 15870
b80eed39
AM
15871 /* 16-bit fields in insns mostly have signed values, but a
15872 few insns have 16-bit unsigned values. Really, we should
15873 have different reloc types. */
15874 if (howto->complain_on_overflow != complain_overflow_dont
15875 && howto->dst_mask == 0xffff
15876 && (input_section->flags & SEC_CODE) != 0)
15877 {
15878 enum complain_overflow complain = complain_overflow_signed;
15879
15880 insn = bfd_get_32 (input_bfd, contents + (rel->r_offset & ~3));
a47622ac
AM
15881 if ((insn & (0x3f << 26)) == 10u << 26 /* cmpli */)
15882 complain = complain_overflow_bitfield;
15883 else if (howto->rightshift == 0
15884 ? ((insn & (0x3f << 26)) == 28u << 26 /* andi */
15885 || (insn & (0x3f << 26)) == 24u << 26 /* ori */
15886 || (insn & (0x3f << 26)) == 26u << 26 /* xori */)
15887 : ((insn & (0x3f << 26)) == 29u << 26 /* andis */
15888 || (insn & (0x3f << 26)) == 25u << 26 /* oris */
15889 || (insn & (0x3f << 26)) == 27u << 26 /* xoris */))
b80eed39
AM
15890 complain = complain_overflow_unsigned;
15891 if (howto->complain_on_overflow != complain)
15892 {
15893 alt_howto = *howto;
15894 alt_howto.complain_on_overflow = complain;
15895 howto = &alt_howto;
15896 }
15897 }
15898
a680de9a
PB
15899 if (r_type == R_PPC64_REL16DX_HA)
15900 {
15901 /* Split field reloc isn't handled by _bfd_final_link_relocate. */
15902 if (rel->r_offset + 4 > input_section->size)
15903 r = bfd_reloc_outofrange;
15904 else
15905 {
15906 relocation += addend;
15907 relocation -= (rel->r_offset
15908 + input_section->output_offset
15909 + input_section->output_section->vma);
3de43e7b 15910 relocation = (bfd_signed_vma) relocation >> 16;
a680de9a
PB
15911 insn = bfd_get_32 (input_bfd, contents + rel->r_offset);
15912 insn &= ~0x1fffc1;
3de43e7b 15913 insn |= (relocation & 0xffc1) | ((relocation & 0x3e) << 15);
a680de9a
PB
15914 bfd_put_32 (input_bfd, insn, contents + rel->r_offset);
15915 r = bfd_reloc_ok;
3de43e7b 15916 if (relocation + 0x8000 > 0xffff)
a680de9a
PB
15917 r = bfd_reloc_overflow;
15918 }
15919 }
15920 else
15921 r = _bfd_final_link_relocate (howto, input_bfd, input_section, contents,
15922 rel->r_offset, relocation, addend);
5bd4f169 15923
ef60b7ff 15924 if (r != bfd_reloc_ok)
5bd4f169 15925 {
bc30df16 15926 char *more_info = NULL;
b80eed39 15927 const char *reloc_name = howto->name;
bc30df16
AM
15928
15929 if (reloc_dest != DEST_NORMAL)
15930 {
15931 more_info = bfd_malloc (strlen (reloc_name) + 8);
15932 if (more_info != NULL)
15933 {
15934 strcpy (more_info, reloc_name);
15935 strcat (more_info, (reloc_dest == DEST_OPD
15936 ? " (OPD)" : " (stub)"));
15937 reloc_name = more_info;
15938 }
15939 }
15940
cd27b276 15941 if (r == bfd_reloc_overflow)
5bd4f169 15942 {
8131c122
AM
15943 /* On code like "if (foo) foo();" don't report overflow
15944 on a branch to zero when foo is undefined. */
15945 if (!warned
15946 && (reloc_dest == DEST_STUB
15947 || !(h != NULL
15948 && (h->elf.root.type == bfd_link_hash_undefweak
15949 || h->elf.root.type == bfd_link_hash_undefined)
15950 && is_branch_reloc (r_type))))
1a72702b
AM
15951 info->callbacks->reloc_overflow (info, &h->elf.root,
15952 sym_name, reloc_name,
15953 orig_rel.r_addend,
15954 input_bfd, input_section,
15955 rel->r_offset);
ef60b7ff
AM
15956 }
15957 else
15958 {
25f53a85 15959 info->callbacks->einfo
695344c0 15960 /* xgettext:c-format */
c1c8c1ef 15961 (_("%H: %s against `%pT': error %d\n"),
25f53a85 15962 input_bfd, input_section, rel->r_offset,
bc30df16 15963 reloc_name, sym_name, (int) r);
b34976b6 15964 ret = FALSE;
ef60b7ff 15965 }
bc30df16
AM
15966 if (more_info != NULL)
15967 free (more_info);
5bd4f169 15968 }
c316a17c
AM
15969 copy_reloc:
15970 if (wrel != rel)
15971 *wrel = *rel;
15972 }
15973
15974 if (wrel != rel)
15975 {
15976 Elf_Internal_Shdr *rel_hdr;
15977 size_t deleted = rel - wrel;
15978
15979 rel_hdr = _bfd_elf_single_rel_hdr (input_section->output_section);
15980 rel_hdr->sh_size -= rel_hdr->sh_entsize * deleted;
15981 if (rel_hdr->sh_size == 0)
15982 {
15983 /* It is too late to remove an empty reloc section. Leave
15984 one NONE reloc.
15985 ??? What is wrong with an empty section??? */
15986 rel_hdr->sh_size = rel_hdr->sh_entsize;
15987 deleted -= 1;
15988 }
15989 rel_hdr = _bfd_elf_single_rel_hdr (input_section);
15990 rel_hdr->sh_size -= rel_hdr->sh_entsize * deleted;
15991 input_section->reloc_count -= deleted;
5bd4f169
AM
15992 }
15993
645ea6a9
AM
15994 /* If we're emitting relocations, then shortly after this function
15995 returns, reloc offsets and addends for this section will be
15996 adjusted. Worse, reloc symbol indices will be for the output
8860955f
AM
15997 file rather than the input. Save a copy of the relocs for
15998 opd_entry_value. */
0e1862bb 15999 if (is_opd && (info->emitrelocations || bfd_link_relocatable (info)))
8860955f
AM
16000 {
16001 bfd_size_type amt;
16002 amt = input_section->reloc_count * sizeof (Elf_Internal_Rela);
16003 rel = bfd_alloc (input_bfd, amt);
729eabd5
AM
16004 BFD_ASSERT (ppc64_elf_tdata (input_bfd)->opd.relocs == NULL);
16005 ppc64_elf_tdata (input_bfd)->opd.relocs = rel;
8860955f
AM
16006 if (rel == NULL)
16007 return FALSE;
16008 memcpy (rel, relocs, amt);
16009 }
5bd4f169
AM
16010 return ret;
16011}
16012
754021d0
AM
16013/* Adjust the value of any local symbols in opd sections. */
16014
6e0b88f1 16015static int
754021d0
AM
16016ppc64_elf_output_symbol_hook (struct bfd_link_info *info,
16017 const char *name ATTRIBUTE_UNUSED,
16018 Elf_Internal_Sym *elfsym,
16019 asection *input_sec,
16020 struct elf_link_hash_entry *h)
16021{
74f0fb50
AM
16022 struct _opd_sec_data *opd;
16023 long adjust;
754021d0
AM
16024 bfd_vma value;
16025
4025353c 16026 if (h != NULL)
6e0b88f1 16027 return 1;
4025353c 16028
74f0fb50
AM
16029 opd = get_opd_info (input_sec);
16030 if (opd == NULL || opd->adjust == NULL)
6e0b88f1 16031 return 1;
754021d0
AM
16032
16033 value = elfsym->st_value - input_sec->output_offset;
0e1862bb 16034 if (!bfd_link_relocatable (info))
754021d0
AM
16035 value -= input_sec->output_section->vma;
16036
51aecdc5 16037 adjust = opd->adjust[OPD_NDX (value)];
4025353c 16038 if (adjust == -1)
6e0b88f1
AM
16039 return 2;
16040
16041 elfsym->st_value += adjust;
16042 return 1;
754021d0
AM
16043}
16044
5bd4f169
AM
16045/* Finish up dynamic symbol handling. We set the contents of various
16046 dynamic sections here. */
16047
b34976b6 16048static bfd_boolean
4ce794b7
AM
16049ppc64_elf_finish_dynamic_symbol (bfd *output_bfd,
16050 struct bfd_link_info *info,
16051 struct elf_link_hash_entry *h,
4aef7643 16052 Elf_Internal_Sym *sym)
5bd4f169 16053{
65f38f15 16054 struct ppc_link_hash_table *htab;
8387904d 16055 struct plt_entry *ent;
5bd4f169 16056
65f38f15 16057 htab = ppc_hash_table (info);
4dfe6ac6
NC
16058 if (htab == NULL)
16059 return FALSE;
5bd4f169 16060
49c09209
AM
16061 if (!htab->opd_abi && !h->def_regular)
16062 for (ent = h->plt.plist; ent != NULL; ent = ent->next)
16063 if (ent->plt.offset != (bfd_vma) -1)
16064 {
16065 /* Mark the symbol as undefined, rather than as
16066 defined in glink. Leave the value if there were
16067 any relocations where pointer equality matters
16068 (this is a clue for the dynamic linker, to make
16069 function pointer comparisons work between an
16070 application and shared library), otherwise set it
16071 to zero. */
16072 sym->st_shndx = SHN_UNDEF;
16073 if (!h->pointer_equality_needed)
16074 sym->st_value = 0;
16075 else if (!h->ref_regular_nonweak)
16076 {
16077 /* This breaks function pointer comparisons, but
16078 that is better than breaking tests for a NULL
16079 function pointer. */
16080 sym->st_value = 0;
16081 }
16082 break;
16083 }
5bd4f169 16084
f5385ebf 16085 if (h->needs_copy)
5bd4f169 16086 {
65f38f15 16087 /* This symbol needs a copy reloc. Set it up. */
49c09209 16088 Elf_Internal_Rela rela;
5474d94f 16089 asection *srel;
49c09209 16090 bfd_byte *loc;
5bd4f169 16091
65f38f15
AM
16092 if (h->dynindx == -1
16093 || (h->root.type != bfd_link_hash_defined
16094 && h->root.type != bfd_link_hash_defweak)
5474d94f
AM
16095 || htab->elf.srelbss == NULL
16096 || htab->elf.sreldynrelro == NULL)
65f38f15 16097 abort ();
5bd4f169
AM
16098
16099 rela.r_offset = (h->root.u.def.value
16100 + h->root.u.def.section->output_section->vma
16101 + h->root.u.def.section->output_offset);
16102 rela.r_info = ELF64_R_INFO (h->dynindx, R_PPC64_COPY);
16103 rela.r_addend = 0;
afbf7e8e 16104 if (h->root.u.def.section == htab->elf.sdynrelro)
5474d94f
AM
16105 srel = htab->elf.sreldynrelro;
16106 else
16107 srel = htab->elf.srelbss;
16108 loc = srel->contents;
16109 loc += srel->reloc_count++ * sizeof (Elf64_External_Rela);
65f38f15 16110 bfd_elf64_swap_reloca_out (output_bfd, &rela, loc);
5bd4f169
AM
16111 }
16112
b34976b6 16113 return TRUE;
5bd4f169
AM
16114}
16115
65f38f15
AM
16116/* Used to decide how to sort relocs in an optimal manner for the
16117 dynamic linker, before writing them out. */
16118
16119static enum elf_reloc_type_class
7e612e98
AM
16120ppc64_elf_reloc_type_class (const struct bfd_link_info *info,
16121 const asection *rel_sec,
16122 const Elf_Internal_Rela *rela)
65f38f15 16123{
04c9666a 16124 enum elf_ppc64_reloc_type r_type;
7e612e98
AM
16125 struct ppc_link_hash_table *htab = ppc_hash_table (info);
16126
33e44f2e 16127 if (rel_sec == htab->elf.irelplt)
7e612e98 16128 return reloc_class_ifunc;
a33d1f77 16129
4ce794b7 16130 r_type = ELF64_R_TYPE (rela->r_info);
a33d1f77 16131 switch (r_type)
65f38f15
AM
16132 {
16133 case R_PPC64_RELATIVE:
16134 return reloc_class_relative;
16135 case R_PPC64_JMP_SLOT:
16136 return reloc_class_plt;
16137 case R_PPC64_COPY:
16138 return reloc_class_copy;
16139 default:
16140 return reloc_class_normal;
16141 }
16142}
16143
5bd4f169
AM
16144/* Finish up the dynamic sections. */
16145
b34976b6 16146static bfd_boolean
4ce794b7
AM
16147ppc64_elf_finish_dynamic_sections (bfd *output_bfd,
16148 struct bfd_link_info *info)
5bd4f169 16149{
65f38f15
AM
16150 struct ppc_link_hash_table *htab;
16151 bfd *dynobj;
5bd4f169 16152 asection *sdyn;
5bd4f169 16153
65f38f15 16154 htab = ppc_hash_table (info);
4dfe6ac6
NC
16155 if (htab == NULL)
16156 return FALSE;
16157
65f38f15 16158 dynobj = htab->elf.dynobj;
3d4d4302 16159 sdyn = bfd_get_linker_section (dynobj, ".dynamic");
5bd4f169 16160
65f38f15 16161 if (htab->elf.dynamic_sections_created)
5bd4f169 16162 {
5bd4f169
AM
16163 Elf64_External_Dyn *dyncon, *dynconend;
16164
33e44f2e 16165 if (sdyn == NULL || htab->elf.sgot == NULL)
65f38f15 16166 abort ();
5bd4f169
AM
16167
16168 dyncon = (Elf64_External_Dyn *) sdyn->contents;
eea6121a 16169 dynconend = (Elf64_External_Dyn *) (sdyn->contents + sdyn->size);
5bd4f169
AM
16170 for (; dyncon < dynconend; dyncon++)
16171 {
16172 Elf_Internal_Dyn dyn;
19397422 16173 asection *s;
5bd4f169
AM
16174
16175 bfd_elf64_swap_dyn_in (dynobj, dyncon, &dyn);
16176
16177 switch (dyn.d_tag)
16178 {
65f38f15
AM
16179 default:
16180 continue;
5bd4f169 16181
5d1634d7 16182 case DT_PPC64_GLINK:
4ce794b7 16183 s = htab->glink;
6348e046 16184 dyn.d_un.d_ptr = s->output_section->vma + s->output_offset;
ad8e1ba5
AM
16185 /* We stupidly defined DT_PPC64_GLINK to be the start
16186 of glink rather than the first entry point, which is
16187 what ld.so needs, and now have a bigger stub to
16188 support automatic multiple TOCs. */
9e390558 16189 dyn.d_un.d_ptr += GLINK_PLTRESOLVE_SIZE (htab) - 8 * 4;
5d1634d7
AM
16190 break;
16191
19397422
AM
16192 case DT_PPC64_OPD:
16193 s = bfd_get_section_by_name (output_bfd, ".opd");
6348e046
AM
16194 if (s == NULL)
16195 continue;
16196 dyn.d_un.d_ptr = s->vma;
19397422
AM
16197 break;
16198
e8910a83
AM
16199 case DT_PPC64_OPT:
16200 if (htab->do_multi_toc && htab->multi_toc_needed)
16201 dyn.d_un.d_val |= PPC64_OPT_MULTI_TOC;
f378ab09
AM
16202 if (htab->has_plt_localentry0)
16203 dyn.d_un.d_val |= PPC64_OPT_LOCALENTRY;
e8910a83
AM
16204 break;
16205
19397422
AM
16206 case DT_PPC64_OPDSZ:
16207 s = bfd_get_section_by_name (output_bfd, ".opd");
6348e046
AM
16208 if (s == NULL)
16209 continue;
eea6121a 16210 dyn.d_un.d_val = s->size;
19397422
AM
16211 break;
16212
65f38f15 16213 case DT_PLTGOT:
33e44f2e 16214 s = htab->elf.splt;
6348e046 16215 dyn.d_un.d_ptr = s->output_section->vma + s->output_offset;
65f38f15
AM
16216 break;
16217
16218 case DT_JMPREL:
33e44f2e 16219 s = htab->elf.srelplt;
6348e046 16220 dyn.d_un.d_ptr = s->output_section->vma + s->output_offset;
65f38f15 16221 break;
5bd4f169 16222
65f38f15 16223 case DT_PLTRELSZ:
33e44f2e 16224 dyn.d_un.d_val = htab->elf.srelplt->size;
5d1634d7 16225 break;
82e66161
AM
16226
16227 case DT_TEXTREL:
16228 if (htab->local_ifunc_resolver)
16229 info->callbacks->einfo
16230 (_("%X%P: text relocations and GNU indirect "
16231 "functions will result in a segfault at runtime\n"));
16232 else if (htab->maybe_local_ifunc_resolver)
16233 info->callbacks->einfo
16234 (_("%P: warning: text relocations and GNU indirect "
16235 "functions may result in a segfault at runtime\n"));
16236 continue;
5bd4f169 16237 }
5bd4f169 16238
65f38f15 16239 bfd_elf64_swap_dyn_out (output_bfd, &dyn, dyncon);
5bd4f169 16240 }
5bd4f169
AM
16241 }
16242
6528b6eb
AM
16243 if (htab->elf.sgot != NULL && htab->elf.sgot->size != 0
16244 && htab->elf.sgot->output_section != bfd_abs_section_ptr)
5d1634d7
AM
16245 {
16246 /* Fill in the first entry in the global offset table.
16247 We use it to hold the link-time TOCbase. */
16248 bfd_put_64 (output_bfd,
60ee0d4a 16249 elf_gp (output_bfd) + TOC_BASE_OFF,
33e44f2e 16250 htab->elf.sgot->contents);
5d1634d7
AM
16251
16252 /* Set .got entry size. */
33e44f2e 16253 elf_section_data (htab->elf.sgot->output_section)->this_hdr.sh_entsize = 8;
5d1634d7
AM
16254 }
16255
6528b6eb
AM
16256 if (htab->elf.splt != NULL && htab->elf.splt->size != 0
16257 && htab->elf.splt->output_section != bfd_abs_section_ptr)
5d1634d7
AM
16258 {
16259 /* Set .plt entry size. */
33e44f2e 16260 elf_section_data (htab->elf.splt->output_section)->this_hdr.sh_entsize
b9e5796b 16261 = PLT_ENTRY_SIZE (htab);
5d1634d7
AM
16262 }
16263
84f5d08e
AM
16264 /* brlt is SEC_LINKER_CREATED, so we need to write out relocs for
16265 brlt ourselves if emitrelocations. */
16266 if (htab->brlt != NULL
16267 && htab->brlt->reloc_count != 0
16268 && !_bfd_elf_link_output_relocs (output_bfd,
16269 htab->brlt,
d4730f92 16270 elf_section_data (htab->brlt)->rela.hdr,
84f5d08e
AM
16271 elf_section_data (htab->brlt)->relocs,
16272 NULL))
16273 return FALSE;
16274
176a0d42
AM
16275 if (htab->glink != NULL
16276 && htab->glink->reloc_count != 0
16277 && !_bfd_elf_link_output_relocs (output_bfd,
16278 htab->glink,
d4730f92 16279 elf_section_data (htab->glink)->rela.hdr,
176a0d42
AM
16280 elf_section_data (htab->glink)->relocs,
16281 NULL))
16282 return FALSE;
16283
58d180e8 16284 if (htab->glink_eh_frame != NULL
da44f4e5
AM
16285 && htab->glink_eh_frame->size != 0)
16286 {
16287 bfd_vma val;
16288 bfd_byte *p;
d4aaa2a0 16289 struct map_stub *group;
2e0ce1c8 16290 size_t align = 4;
da44f4e5 16291
2e0ce1c8
AM
16292 p = htab->glink_eh_frame->contents;
16293 p += (sizeof (glink_eh_frame_cie) + align - 1) & -align;
d4aaa2a0
AM
16294
16295 for (group = htab->group; group != NULL; group = group->next)
16296 if (group->stub_sec != NULL)
da44f4e5 16297 {
da44f4e5 16298 /* Offset to stub section. */
d4aaa2a0
AM
16299 val = (group->stub_sec->output_section->vma
16300 + group->stub_sec->output_offset);
da44f4e5
AM
16301 val -= (htab->glink_eh_frame->output_section->vma
16302 + htab->glink_eh_frame->output_offset
d4aaa2a0 16303 + (p + 8 - htab->glink_eh_frame->contents));
da44f4e5
AM
16304 if (val + 0x80000000 > 0xffffffff)
16305 {
cf97bcb0
AM
16306 _bfd_error_handler
16307 (_("%s offset too large for .eh_frame sdata4 encoding"),
d4aaa2a0 16308 group->stub_sec->name);
da44f4e5
AM
16309 return FALSE;
16310 }
d4aaa2a0
AM
16311 bfd_put_32 (dynobj, val, p + 8);
16312 p += stub_eh_frame_size (group, align);
da44f4e5
AM
16313 }
16314 if (htab->glink != NULL && htab->glink->size != 0)
16315 {
da44f4e5
AM
16316 /* Offset to .glink. */
16317 val = (htab->glink->output_section->vma
16318 + htab->glink->output_offset
16319 + 8);
16320 val -= (htab->glink_eh_frame->output_section->vma
16321 + htab->glink_eh_frame->output_offset
d4aaa2a0 16322 + (p + 8 - htab->glink_eh_frame->contents));
da44f4e5
AM
16323 if (val + 0x80000000 > 0xffffffff)
16324 {
cf97bcb0
AM
16325 _bfd_error_handler
16326 (_("%s offset too large for .eh_frame sdata4 encoding"),
da44f4e5
AM
16327 htab->glink->name);
16328 return FALSE;
16329 }
d4aaa2a0
AM
16330 bfd_put_32 (dynobj, val, p + 8);
16331 p += (24 + align - 1) & -align;
da44f4e5
AM
16332 }
16333
16334 if (htab->glink_eh_frame->sec_info_type == SEC_INFO_TYPE_EH_FRAME
16335 && !_bfd_elf_write_section_eh_frame (output_bfd, info,
16336 htab->glink_eh_frame,
16337 htab->glink_eh_frame->contents))
16338 return FALSE;
16339 }
58d180e8 16340
e717da7e 16341 /* We need to handle writing out multiple GOT sections ourselves,
7b53ace3
AM
16342 since we didn't add them to DYNOBJ. We know dynobj is the first
16343 bfd. */
c72f2fb2 16344 while ((dynobj = dynobj->link.next) != NULL)
e717da7e
AM
16345 {
16346 asection *s;
7b53ace3 16347
0c8d6e5c 16348 if (!is_ppc64_elf (dynobj))
7b53ace3
AM
16349 continue;
16350
e717da7e
AM
16351 s = ppc64_elf_tdata (dynobj)->got;
16352 if (s != NULL
eea6121a 16353 && s->size != 0
e717da7e
AM
16354 && s->output_section != bfd_abs_section_ptr
16355 && !bfd_set_section_contents (output_bfd, s->output_section,
16356 s->contents, s->output_offset,
eea6121a 16357 s->size))
e717da7e
AM
16358 return FALSE;
16359 s = ppc64_elf_tdata (dynobj)->relgot;
16360 if (s != NULL
eea6121a 16361 && s->size != 0
e717da7e
AM
16362 && s->output_section != bfd_abs_section_ptr
16363 && !bfd_set_section_contents (output_bfd, s->output_section,
16364 s->contents, s->output_offset,
eea6121a 16365 s->size))
e717da7e
AM
16366 return FALSE;
16367 }
f6c52c13 16368
b34976b6 16369 return TRUE;
5bd4f169
AM
16370}
16371
5bd4f169 16372#include "elf64-target.h"
7b8e7dad
AM
16373
16374/* FreeBSD support */
16375
16376#undef TARGET_LITTLE_SYM
16377#undef TARGET_LITTLE_NAME
16378
16379#undef TARGET_BIG_SYM
6d00b590 16380#define TARGET_BIG_SYM powerpc_elf64_fbsd_vec
7b8e7dad
AM
16381#undef TARGET_BIG_NAME
16382#define TARGET_BIG_NAME "elf64-powerpc-freebsd"
16383
16384#undef ELF_OSABI
16385#define ELF_OSABI ELFOSABI_FREEBSD
16386
16387#undef elf64_bed
16388#define elf64_bed elf64_powerpc_fbsd_bed
16389
16390#include "elf64-target.h"
This page took 2.596062 seconds and 4 git commands to generate.