]> git.ipfire.org Git - thirdparty/binutils-gdb.git/blame - bfd/elf64-ppc.c
AArch64: Fix the gdb build with musl libc
[thirdparty/binutils-gdb.git] / bfd / elf64-ppc.c
CommitLineData
5bd4f169 1/* PowerPC64-specific support for 64-bit ELF.
219d1afa 2 Copyright (C) 1999-2018 Free Software Foundation, Inc.
5bd4f169
AM
3 Written by Linus Nordberg, Swox AB <info@swox.com>,
4 based on elf32-ppc.c by Ian Lance Taylor.
32ca9640 5 Largely rewritten by Alan Modra.
5bd4f169 6
ae9a127f 7 This file is part of BFD, the Binary File Descriptor library.
5bd4f169 8
ae9a127f
NC
9 This program is free software; you can redistribute it and/or modify
10 it under the terms of the GNU General Public License as published by
cd123cb7 11 the Free Software Foundation; either version 3 of the License, or
ae9a127f 12 (at your option) any later version.
5bd4f169 13
ae9a127f
NC
14 This program is distributed in the hope that it will be useful,
15 but WITHOUT ANY WARRANTY; without even the implied warranty of
16 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
17 GNU General Public License for more details.
5bd4f169 18
4ce794b7
AM
19 You should have received a copy of the GNU General Public License along
20 with this program; if not, write to the Free Software Foundation, Inc.,
3e110533 21 51 Franklin Street - Fifth Floor, Boston, MA 02110-1301, USA. */
5bd4f169 22
cd123cb7 23
4ce794b7
AM
24/* The 64-bit PowerPC ELF ABI may be found at
25 http://www.linuxbase.org/spec/ELF/ppc64/PPC-elf64abi.txt, and
26 http://www.linuxbase.org/spec/ELF/ppc64/spec/book1.html */
5bd4f169 27
3db64b00 28#include "sysdep.h"
183e98be 29#include <stdarg.h>
5bd4f169 30#include "bfd.h"
5bd4f169
AM
31#include "bfdlink.h"
32#include "libbfd.h"
33#include "elf-bfd.h"
04c9666a 34#include "elf/ppc64.h"
5d1634d7 35#include "elf64-ppc.h"
58d180e8 36#include "dwarf2.h"
5bd4f169 37
805fc799 38static bfd_reloc_status_type ppc64_elf_ha_reloc
4ce794b7 39 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
2441e016
AM
40static bfd_reloc_status_type ppc64_elf_branch_reloc
41 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
805fc799 42static bfd_reloc_status_type ppc64_elf_brtaken_reloc
4ce794b7 43 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
805fc799 44static bfd_reloc_status_type ppc64_elf_sectoff_reloc
4ce794b7 45 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
805fc799 46static bfd_reloc_status_type ppc64_elf_sectoff_ha_reloc
4ce794b7 47 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
805fc799 48static bfd_reloc_status_type ppc64_elf_toc_reloc
4ce794b7 49 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
805fc799 50static bfd_reloc_status_type ppc64_elf_toc_ha_reloc
4ce794b7 51 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
805fc799 52static bfd_reloc_status_type ppc64_elf_toc64_reloc
4ce794b7 53 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
805fc799 54static bfd_reloc_status_type ppc64_elf_unhandled_reloc
4ce794b7 55 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
2441e016 56static bfd_vma opd_entry_value
aef36ac1 57 (asection *, bfd_vma, asection **, bfd_vma *, bfd_boolean);
5bd4f169 58
6d00b590 59#define TARGET_LITTLE_SYM powerpc_elf64_le_vec
ad8e1ba5 60#define TARGET_LITTLE_NAME "elf64-powerpcle"
6d00b590 61#define TARGET_BIG_SYM powerpc_elf64_vec
ad8e1ba5
AM
62#define TARGET_BIG_NAME "elf64-powerpc"
63#define ELF_ARCH bfd_arch_powerpc
ae95ffa6 64#define ELF_TARGET_ID PPC64_ELF_DATA
ad8e1ba5
AM
65#define ELF_MACHINE_CODE EM_PPC64
66#define ELF_MAXPAGESIZE 0x10000
702d1671
AM
67#define ELF_COMMONPAGESIZE 0x1000
68#define ELF_RELROPAGESIZE ELF_MAXPAGESIZE
ad8e1ba5
AM
69#define elf_info_to_howto ppc64_elf_info_to_howto
70
71#define elf_backend_want_got_sym 0
72#define elf_backend_want_plt_sym 0
73#define elf_backend_plt_alignment 3
74#define elf_backend_plt_not_loaded 1
ad8e1ba5 75#define elf_backend_got_header_size 8
5474d94f 76#define elf_backend_want_dynrelro 1
ad8e1ba5
AM
77#define elf_backend_can_gc_sections 1
78#define elf_backend_can_refcount 1
79#define elf_backend_rela_normal 1
64f52338 80#define elf_backend_dtrel_excludes_plt 1
6bfdb61b 81#define elf_backend_default_execstack 0
ad8e1ba5 82
e717da7e 83#define bfd_elf64_mkobject ppc64_elf_mkobject
ad8e1ba5 84#define bfd_elf64_bfd_reloc_type_lookup ppc64_elf_reloc_type_lookup
aa374f67 85#define bfd_elf64_bfd_reloc_name_lookup ppc64_elf_reloc_name_lookup
ee67d69a
AM
86#define bfd_elf64_bfd_merge_private_bfd_data ppc64_elf_merge_private_bfd_data
87#define bfd_elf64_bfd_print_private_bfd_data ppc64_elf_print_private_bfd_data
ad8e1ba5
AM
88#define bfd_elf64_new_section_hook ppc64_elf_new_section_hook
89#define bfd_elf64_bfd_link_hash_table_create ppc64_elf_link_hash_table_create
90e3cdf2 90#define bfd_elf64_get_synthetic_symtab ppc64_elf_get_synthetic_symtab
aa374f67 91#define bfd_elf64_bfd_link_just_syms ppc64_elf_link_just_syms
8c5b4e52 92#define bfd_elf64_bfd_gc_sections ppc64_elf_gc_sections
ad8e1ba5
AM
93
94#define elf_backend_object_p ppc64_elf_object_p
d37c89e5
AM
95#define elf_backend_grok_prstatus ppc64_elf_grok_prstatus
96#define elf_backend_grok_psinfo ppc64_elf_grok_psinfo
183e98be 97#define elf_backend_write_core_note ppc64_elf_write_core_note
9d19e4fd 98#define elf_backend_create_dynamic_sections _bfd_elf_create_dynamic_sections
ad8e1ba5 99#define elf_backend_copy_indirect_symbol ppc64_elf_copy_indirect_symbol
555cd476 100#define elf_backend_add_symbol_hook ppc64_elf_add_symbol_hook
f6c7c3e8 101#define elf_backend_check_directives ppc64_elf_before_check_relocs
e5034e59 102#define elf_backend_notice_as_needed ppc64_elf_notice_as_needed
8387904d 103#define elf_backend_archive_symbol_lookup ppc64_elf_archive_symbol_lookup
ad8e1ba5 104#define elf_backend_check_relocs ppc64_elf_check_relocs
c0e331c7 105#define elf_backend_relocs_compatible _bfd_elf_relocs_compatible
74f0fb50 106#define elf_backend_gc_keep ppc64_elf_gc_keep
64d03ab5 107#define elf_backend_gc_mark_dynamic_ref ppc64_elf_gc_mark_dynamic_ref
ad8e1ba5 108#define elf_backend_gc_mark_hook ppc64_elf_gc_mark_hook
ad8e1ba5
AM
109#define elf_backend_adjust_dynamic_symbol ppc64_elf_adjust_dynamic_symbol
110#define elf_backend_hide_symbol ppc64_elf_hide_symbol
9f296da3 111#define elf_backend_maybe_function_sym ppc64_elf_maybe_function_sym
ad8e1ba5
AM
112#define elf_backend_always_size_sections ppc64_elf_func_desc_adjust
113#define elf_backend_size_dynamic_sections ppc64_elf_size_dynamic_sections
a345bc8d 114#define elf_backend_hash_symbol ppc64_elf_hash_symbol
74541ad4 115#define elf_backend_init_index_section _bfd_elf_init_2_index_sections
60124e18 116#define elf_backend_action_discarded ppc64_elf_action_discarded
ad8e1ba5
AM
117#define elf_backend_relocate_section ppc64_elf_relocate_section
118#define elf_backend_finish_dynamic_symbol ppc64_elf_finish_dynamic_symbol
119#define elf_backend_reloc_type_class ppc64_elf_reloc_type_class
120#define elf_backend_finish_dynamic_sections ppc64_elf_finish_dynamic_sections
754021d0 121#define elf_backend_link_output_symbol_hook ppc64_elf_output_symbol_hook
29ef7005 122#define elf_backend_special_sections ppc64_elf_special_sections
6911b7dc 123#define elf_backend_merge_symbol_attribute ppc64_elf_merge_symbol_attribute
8c5b4e52 124#define elf_backend_merge_symbol ppc64_elf_merge_symbol
bce964aa 125#define elf_backend_get_reloc_section bfd_get_section_by_name
ad8e1ba5 126
5bd4f169
AM
127/* The name of the dynamic interpreter. This is put in the .interp
128 section. */
129#define ELF_DYNAMIC_INTERPRETER "/usr/lib/ld.so.1"
130
131/* The size in bytes of an entry in the procedure linkage table. */
b9e5796b 132#define PLT_ENTRY_SIZE(htab) (htab->opd_abi ? 24 : 8)
2d7ad24e 133#define LOCAL_PLT_ENTRY_SIZE(htab) (htab->opd_abi ? 16 : 8)
5bd4f169
AM
134
135/* The initial size of the plt reserved for the dynamic linker. */
b9e5796b 136#define PLT_INITIAL_ENTRY_SIZE(htab) (htab->opd_abi ? 24 : 16)
5bd4f169 137
a078d95a
AM
138/* Offsets to some stack save slots. */
139#define STK_LR 16
140#define STK_TOC(htab) (htab->opd_abi ? 40 : 24)
eb8d7fda 141/* This one is dodgy. ELFv2 does not have a linker word, so use the
a078d95a
AM
142 CR save slot. Used only by optimised __tls_get_addr call stub,
143 relying on __tls_get_addr_opt not saving CR.. */
144#define STK_LINKER(htab) (htab->opd_abi ? 32 : 8)
145
5bd4f169 146/* TOC base pointers offset from start of TOC. */
411e1bfb 147#define TOC_BASE_OFF 0x8000
a27e685f
AM
148/* TOC base alignment. */
149#define TOC_BASE_ALIGN 256
411e1bfb
AM
150
151/* Offset of tp and dtp pointers from start of TLS block. */
152#define TP_OFFSET 0x7000
153#define DTP_OFFSET 0x8000
5bd4f169 154
ad8e1ba5
AM
155/* .plt call stub instructions. The normal stub is like this, but
156 sometimes the .plt entry crosses a 64k boundary and we need to
71a39c98 157 insert an addi to adjust r11. */
a078d95a 158#define STD_R2_0R1 0xf8410000 /* std %r2,0+40(%r1) */
71a39c98
AM
159#define ADDIS_R11_R2 0x3d620000 /* addis %r11,%r2,xxx@ha */
160#define LD_R12_0R11 0xe98b0000 /* ld %r12,xxx+0@l(%r11) */
161#define MTCTR_R12 0x7d8903a6 /* mtctr %r12 */
162#define LD_R2_0R11 0xe84b0000 /* ld %r2,xxx+8@l(%r11) */
163#define LD_R11_0R11 0xe96b0000 /* ld %r11,xxx+16@l(%r11) */
5d1634d7
AM
164#define BCTR 0x4e800420 /* bctr */
165
07d6d2b8 166#define ADDI_R11_R11 0x396b0000 /* addi %r11,%r11,off@l */
05d0e962
AM
167#define ADDI_R12_R11 0x398b0000 /* addi %r12,%r11,off@l */
168#define ADDI_R12_R12 0x398c0000 /* addi %r12,%r12,off@l */
07d6d2b8
AM
169#define ADDIS_R2_R2 0x3c420000 /* addis %r2,%r2,off@ha */
170#define ADDI_R2_R2 0x38420000 /* addi %r2,%r2,off@l */
171
172#define XOR_R2_R12_R12 0x7d826278 /* xor %r2,%r12,%r12 */
173#define ADD_R11_R11_R2 0x7d6b1214 /* add %r11,%r11,%r2 */
174#define XOR_R11_R12_R12 0x7d8b6278 /* xor %r11,%r12,%r12 */
175#define ADD_R2_R2_R11 0x7c425a14 /* add %r2,%r2,%r11 */
176#define CMPLDI_R2_0 0x28220000 /* cmpldi %r2,0 */
177#define BNECTR 0x4ca20420 /* bnectr+ */
178#define BNECTR_P4 0x4ce20420 /* bnectr+ */
794e51c0 179
71a39c98 180#define LD_R12_0R2 0xe9820000 /* ld %r12,xxx+0(%r2) */
ac2df442 181#define LD_R11_0R2 0xe9620000 /* ld %r11,xxx+0(%r2) */
07d6d2b8 182#define LD_R2_0R2 0xe8420000 /* ld %r2,xxx+0(%r2) */
ac2df442 183
07d6d2b8
AM
184#define LD_R2_0R1 0xe8410000 /* ld %r2,0(%r1) */
185#define LD_R2_0R12 0xe84c0000 /* ld %r2,0(%r12) */
186#define ADD_R2_R2_R12 0x7c426214 /* add %r2,%r2,%r12 */
ad8e1ba5 187
07d6d2b8 188#define LIS_R2 0x3c400000 /* lis %r2,xxx@ha */
05d0e962 189#define LIS_R12 0x3d800000 /* lis %r12,xxx@ha */
006589cf
AM
190#define ADDIS_R2_R12 0x3c4c0000 /* addis %r2,%r12,xxx@ha */
191#define ADDIS_R12_R2 0x3d820000 /* addis %r12,%r2,xxx@ha */
05d0e962 192#define ADDIS_R12_R11 0x3d8b0000 /* addis %r12,%r11,xxx@ha */
a345bc8d 193#define ADDIS_R12_R12 0x3d8c0000 /* addis %r12,%r12,xxx@ha */
05d0e962
AM
194#define ORIS_R12_R12_0 0x658c0000 /* oris %r12,%r12,xxx@hi */
195#define ORI_R12_R12_0 0x618c0000 /* ori %r12,%r12,xxx@l */
07d6d2b8 196#define LD_R12_0R12 0xe98c0000 /* ld %r12,xxx@l(%r12) */
05d0e962
AM
197#define SLDI_R12_R12_32 0x799c07c6 /* sldi %r12,%r12,32 */
198#define LDX_R12_R11_R12 0x7d8b602a /* ldx %r12,%r11,%r12 */
199#define ADD_R12_R11_R12 0x7d8b6214 /* add %r12,%r11,%r12 */
a345bc8d 200
9e390558
AM
201/* __glink_PLTresolve stub instructions. We enter with the index in R0. */
202#define GLINK_PLTRESOLVE_SIZE(htab) \
407aa07c 203 (8u + (htab->opd_abi ? 11 * 4 : 14 * 4))
ee4bf8d2
AM
204 /* 0: */
205 /* .quad plt0-1f */
206 /* __glink: */
207#define MFLR_R12 0x7d8802a6 /* mflr %12 */
208#define BCL_20_31 0x429f0005 /* bcl 20,31,1f */
209 /* 1: */
210#define MFLR_R11 0x7d6802a6 /* mflr %11 */
71a39c98 211 /* ld %2,(0b-1b)(%11) */
ee4bf8d2 212#define MTLR_R12 0x7d8803a6 /* mtlr %12 */
71a39c98
AM
213#define ADD_R11_R2_R11 0x7d625a14 /* add %11,%2,%11 */
214 /* ld %12,0(%11) */
215 /* ld %2,8(%11) */
216 /* mtctr %12 */
217 /* ld %11,16(%11) */
ee4bf8d2 218 /* bctr */
b9e5796b
AM
219#define MFLR_R0 0x7c0802a6 /* mflr %r0 */
220#define MTLR_R0 0x7c0803a6 /* mtlr %r0 */
221#define SUB_R12_R12_R11 0x7d8b6050 /* subf %r12,%r11,%r12 */
222#define ADDI_R0_R12 0x380c0000 /* addi %r0,%r12,0 */
223#define SRDI_R0_R0_2 0x7800f082 /* rldicl %r0,%r0,62,2 */
5d1634d7
AM
224
225/* Pad with this. */
226#define NOP 0x60000000
227
721956f4
AM
228/* Some other nops. */
229#define CROR_151515 0x4def7b82
230#define CROR_313131 0x4ffffb82
231
cedb70c5 232/* .glink entries for the first 32k functions are two instructions. */
5d1634d7
AM
233#define LI_R0_0 0x38000000 /* li %r0,0 */
234#define B_DOT 0x48000000 /* b . */
235
236/* After that, we need two instructions to load the index, followed by
237 a branch. */
238#define LIS_R0_0 0x3c000000 /* lis %r0,0 */
10ed1bba 239#define ORI_R0_R0_0 0x60000000 /* ori %r0,%r0,0 */
41bd81ab 240
deb0e272
AM
241/* Instructions used by the save and restore reg functions. */
242#define STD_R0_0R1 0xf8010000 /* std %r0,0(%r1) */
243#define STD_R0_0R12 0xf80c0000 /* std %r0,0(%r12) */
244#define LD_R0_0R1 0xe8010000 /* ld %r0,0(%r1) */
245#define LD_R0_0R12 0xe80c0000 /* ld %r0,0(%r12) */
82bd7b59
AM
246#define STFD_FR0_0R1 0xd8010000 /* stfd %fr0,0(%r1) */
247#define LFD_FR0_0R1 0xc8010000 /* lfd %fr0,0(%r1) */
deb0e272
AM
248#define LI_R12_0 0x39800000 /* li %r12,0 */
249#define STVX_VR0_R12_R0 0x7c0c01ce /* stvx %v0,%r12,%r0 */
250#define LVX_VR0_R12_R0 0x7c0c00ce /* lvx %v0,%r12,%r0 */
251#define MTLR_R0 0x7c0803a6 /* mtlr %r0 */
82bd7b59
AM
252#define BLR 0x4e800020 /* blr */
253
41bd81ab
AM
254/* Since .opd is an array of descriptors and each entry will end up
255 with identical R_PPC64_RELATIVE relocs, there is really no need to
256 propagate .opd relocs; The dynamic linker should be taught to
1e2f5b6e 257 relocate .opd without reloc entries. */
41bd81ab
AM
258#ifndef NO_OPD_RELOCS
259#define NO_OPD_RELOCS 0
260#endif
810d4e75 261
a4b6fadd
AM
262#ifndef ARRAY_SIZE
263#define ARRAY_SIZE(a) (sizeof (a) / sizeof ((a)[0]))
264#endif
265
810d4e75
AM
266static inline int
267abiversion (bfd *abfd)
268{
269 return elf_elfheader (abfd)->e_flags & EF_PPC64_ABI;
270}
271
272static inline void
273set_abiversion (bfd *abfd, int ver)
274{
275 elf_elfheader (abfd)->e_flags &= ~EF_PPC64_ABI;
276 elf_elfheader (abfd)->e_flags |= ver & EF_PPC64_ABI;
277}
5bd4f169
AM
278\f
279/* Relocation HOWTO's. */
46807bf4
AM
280/* Like other ELF RELA targets that don't apply multiple
281 field-altering relocations to the same localation, src_mask is
282 always zero and pcrel_offset is the same as pc_relative.
283 PowerPC can always use a zero bitpos, even when the field is not at
284 the LSB. For example, a REL24 could use rightshift=2, bisize=24
285 and bitpos=2 which matches the ABI description, or as we do here,
286 rightshift=0, bitsize=26 and bitpos=0. */
287#define HOW(type, size, bitsize, mask, rightshift, pc_relative, \
288 complain, special_func) \
289 HOWTO (type, rightshift, size, bitsize, pc_relative, 0, \
290 complain_overflow_ ## complain, special_func, \
291 #type, FALSE, 0, mask, pc_relative)
292
04c9666a 293static reloc_howto_type *ppc64_elf_howto_table[(int) R_PPC64_max];
5bd4f169 294
f3185997
NC
295static reloc_howto_type ppc64_elf_howto_raw[] =
296{
5bd4f169 297 /* This reloc does nothing. */
46807bf4
AM
298 HOW (R_PPC64_NONE, 3, 0, 0, 0, FALSE, dont,
299 bfd_elf_generic_reloc),
5bd4f169
AM
300
301 /* A standard 32 bit relocation. */
46807bf4
AM
302 HOW (R_PPC64_ADDR32, 2, 32, 0xffffffff, 0, FALSE, bitfield,
303 bfd_elf_generic_reloc),
5bd4f169
AM
304
305 /* An absolute 26 bit branch; the lower two bits must be zero.
306 FIXME: we don't check that, we just clear them. */
46807bf4
AM
307 HOW (R_PPC64_ADDR24, 2, 26, 0x03fffffc, 0, FALSE, bitfield,
308 bfd_elf_generic_reloc),
5bd4f169
AM
309
310 /* A standard 16 bit relocation. */
46807bf4
AM
311 HOW (R_PPC64_ADDR16, 1, 16, 0xffff, 0, FALSE, bitfield,
312 bfd_elf_generic_reloc),
5bd4f169
AM
313
314 /* A 16 bit relocation without overflow. */
46807bf4
AM
315 HOW (R_PPC64_ADDR16_LO, 1, 16, 0xffff, 0, FALSE, dont,
316 bfd_elf_generic_reloc),
5bd4f169
AM
317
318 /* Bits 16-31 of an address. */
46807bf4
AM
319 HOW (R_PPC64_ADDR16_HI, 1, 16, 0xffff, 16, FALSE, signed,
320 bfd_elf_generic_reloc),
5bd4f169
AM
321
322 /* Bits 16-31 of an address, plus 1 if the contents of the low 16
323 bits, treated as a signed number, is negative. */
46807bf4
AM
324 HOW (R_PPC64_ADDR16_HA, 1, 16, 0xffff, 16, FALSE, signed,
325 ppc64_elf_ha_reloc),
5bd4f169
AM
326
327 /* An absolute 16 bit branch; the lower two bits must be zero.
328 FIXME: we don't check that, we just clear them. */
46807bf4
AM
329 HOW (R_PPC64_ADDR14, 2, 16, 0x0000fffc, 0, FALSE, signed,
330 ppc64_elf_branch_reloc),
5bd4f169
AM
331
332 /* An absolute 16 bit branch, for which bit 10 should be set to
333 indicate that the branch is expected to be taken. The lower two
334 bits must be zero. */
46807bf4
AM
335 HOW (R_PPC64_ADDR14_BRTAKEN, 2, 16, 0x0000fffc, 0, FALSE, signed,
336 ppc64_elf_brtaken_reloc),
5bd4f169
AM
337
338 /* An absolute 16 bit branch, for which bit 10 should be set to
339 indicate that the branch is not expected to be taken. The lower
340 two bits must be zero. */
46807bf4
AM
341 HOW (R_PPC64_ADDR14_BRNTAKEN, 2, 16, 0x0000fffc, 0, FALSE, signed,
342 ppc64_elf_brtaken_reloc),
5bd4f169
AM
343
344 /* A relative 26 bit branch; the lower two bits must be zero. */
46807bf4
AM
345 HOW (R_PPC64_REL24, 2, 26, 0x03fffffc, 0, TRUE, signed,
346 ppc64_elf_branch_reloc),
5bd4f169 347
05d0e962 348 /* A variant of R_PPC64_REL24, used when r2 is not the toc pointer. */
46807bf4
AM
349 HOW (R_PPC64_REL24_NOTOC, 2, 26, 0x03fffffc, 0, TRUE, signed,
350 ppc64_elf_branch_reloc),
05d0e962 351
5bd4f169 352 /* A relative 16 bit branch; the lower two bits must be zero. */
46807bf4
AM
353 HOW (R_PPC64_REL14, 2, 16, 0x0000fffc, 0, TRUE, signed,
354 ppc64_elf_branch_reloc),
5bd4f169
AM
355
356 /* A relative 16 bit branch. Bit 10 should be set to indicate that
357 the branch is expected to be taken. The lower two bits must be
358 zero. */
46807bf4
AM
359 HOW (R_PPC64_REL14_BRTAKEN, 2, 16, 0x0000fffc, 0, TRUE, signed,
360 ppc64_elf_brtaken_reloc),
5bd4f169
AM
361
362 /* A relative 16 bit branch. Bit 10 should be set to indicate that
363 the branch is not expected to be taken. The lower two bits must
364 be zero. */
46807bf4
AM
365 HOW (R_PPC64_REL14_BRNTAKEN, 2, 16, 0x0000fffc, 0, TRUE, signed,
366 ppc64_elf_brtaken_reloc),
5bd4f169
AM
367
368 /* Like R_PPC64_ADDR16, but referring to the GOT table entry for the
369 symbol. */
46807bf4
AM
370 HOW (R_PPC64_GOT16, 1, 16, 0xffff, 0, FALSE, signed,
371 ppc64_elf_unhandled_reloc),
5bd4f169
AM
372
373 /* Like R_PPC64_ADDR16_LO, but referring to the GOT table entry for
374 the symbol. */
46807bf4
AM
375 HOW (R_PPC64_GOT16_LO, 1, 16, 0xffff, 0, FALSE, dont,
376 ppc64_elf_unhandled_reloc),
5bd4f169
AM
377
378 /* Like R_PPC64_ADDR16_HI, but referring to the GOT table entry for
379 the symbol. */
46807bf4
AM
380 HOW (R_PPC64_GOT16_HI, 1, 16, 0xffff, 16, FALSE, signed,
381 ppc64_elf_unhandled_reloc),
5bd4f169
AM
382
383 /* Like R_PPC64_ADDR16_HA, but referring to the GOT table entry for
384 the symbol. */
46807bf4
AM
385 HOW (R_PPC64_GOT16_HA, 1, 16, 0xffff, 16, FALSE, signed,
386 ppc64_elf_unhandled_reloc),
5bd4f169
AM
387
388 /* This is used only by the dynamic linker. The symbol should exist
389 both in the object being run and in some shared library. The
390 dynamic linker copies the data addressed by the symbol from the
391 shared library into the object, because the object being
392 run has to have the data at some particular address. */
46807bf4
AM
393 HOW (R_PPC64_COPY, 0, 0, 0, 0, FALSE, dont,
394 ppc64_elf_unhandled_reloc),
5bd4f169
AM
395
396 /* Like R_PPC64_ADDR64, but used when setting global offset table
397 entries. */
46807bf4
AM
398 HOW (R_PPC64_GLOB_DAT, 4, 64, 0xffffffffffffffffULL, 0, FALSE, dont,
399 ppc64_elf_unhandled_reloc),
5bd4f169
AM
400
401 /* Created by the link editor. Marks a procedure linkage table
402 entry for a symbol. */
46807bf4
AM
403 HOW (R_PPC64_JMP_SLOT, 0, 0, 0, 0, FALSE, dont,
404 ppc64_elf_unhandled_reloc),
5bd4f169
AM
405
406 /* Used only by the dynamic linker. When the object is run, this
407 doubleword64 is set to the load address of the object, plus the
408 addend. */
46807bf4
AM
409 HOW (R_PPC64_RELATIVE, 4, 64, 0xffffffffffffffffULL, 0, FALSE, dont,
410 bfd_elf_generic_reloc),
5bd4f169
AM
411
412 /* Like R_PPC64_ADDR32, but may be unaligned. */
46807bf4
AM
413 HOW (R_PPC64_UADDR32, 2, 32, 0xffffffff, 0, FALSE, bitfield,
414 bfd_elf_generic_reloc),
5bd4f169
AM
415
416 /* Like R_PPC64_ADDR16, but may be unaligned. */
46807bf4
AM
417 HOW (R_PPC64_UADDR16, 1, 16, 0xffff, 0, FALSE, bitfield,
418 bfd_elf_generic_reloc),
5bd4f169
AM
419
420 /* 32-bit PC relative. */
46807bf4
AM
421 HOW (R_PPC64_REL32, 2, 32, 0xffffffff, 0, TRUE, signed,
422 bfd_elf_generic_reloc),
5bd4f169 423
10ed1bba 424 /* 32-bit relocation to the symbol's procedure linkage table. */
46807bf4
AM
425 HOW (R_PPC64_PLT32, 2, 32, 0xffffffff, 0, FALSE, bitfield,
426 ppc64_elf_unhandled_reloc),
5bd4f169
AM
427
428 /* 32-bit PC relative relocation to the symbol's procedure linkage table.
429 FIXME: R_PPC64_PLTREL32 not supported. */
46807bf4
AM
430 HOW (R_PPC64_PLTREL32, 2, 32, 0xffffffff, 0, TRUE, signed,
431 ppc64_elf_unhandled_reloc),
5bd4f169
AM
432
433 /* Like R_PPC64_ADDR16_LO, but referring to the PLT table entry for
434 the symbol. */
46807bf4
AM
435 HOW (R_PPC64_PLT16_LO, 1, 16, 0xffff, 0, FALSE, dont,
436 ppc64_elf_unhandled_reloc),
5bd4f169
AM
437
438 /* Like R_PPC64_ADDR16_HI, but referring to the PLT table entry for
439 the symbol. */
46807bf4
AM
440 HOW (R_PPC64_PLT16_HI, 1, 16, 0xffff, 16, FALSE, signed,
441 ppc64_elf_unhandled_reloc),
5bd4f169
AM
442
443 /* Like R_PPC64_ADDR16_HA, but referring to the PLT table entry for
444 the symbol. */
46807bf4
AM
445 HOW (R_PPC64_PLT16_HA, 1, 16, 0xffff, 16, FALSE, signed,
446 ppc64_elf_unhandled_reloc),
5bd4f169 447
c061c2d8 448 /* 16-bit section relative relocation. */
46807bf4
AM
449 HOW (R_PPC64_SECTOFF, 1, 16, 0xffff, 0, FALSE, signed,
450 ppc64_elf_sectoff_reloc),
5bd4f169 451
c061c2d8 452 /* Like R_PPC64_SECTOFF, but no overflow warning. */
46807bf4
AM
453 HOW (R_PPC64_SECTOFF_LO, 1, 16, 0xffff, 0, FALSE, dont,
454 ppc64_elf_sectoff_reloc),
5bd4f169
AM
455
456 /* 16-bit upper half section relative relocation. */
46807bf4
AM
457 HOW (R_PPC64_SECTOFF_HI, 1, 16, 0xffff, 16, FALSE, signed,
458 ppc64_elf_sectoff_reloc),
5bd4f169
AM
459
460 /* 16-bit upper half adjusted section relative relocation. */
46807bf4
AM
461 HOW (R_PPC64_SECTOFF_HA, 1, 16, 0xffff, 16, FALSE, signed,
462 ppc64_elf_sectoff_ha_reloc),
5bd4f169 463
04c9666a 464 /* Like R_PPC64_REL24 without touching the two least significant bits. */
46807bf4
AM
465 HOW (R_PPC64_REL30, 2, 30, 0xfffffffc, 2, TRUE, dont,
466 bfd_elf_generic_reloc),
5bd4f169
AM
467
468 /* Relocs in the 64-bit PowerPC ELF ABI, not in the 32-bit ABI. */
469
470 /* A standard 64-bit relocation. */
46807bf4
AM
471 HOW (R_PPC64_ADDR64, 4, 64, 0xffffffffffffffffULL, 0, FALSE, dont,
472 bfd_elf_generic_reloc),
5bd4f169
AM
473
474 /* The bits 32-47 of an address. */
46807bf4
AM
475 HOW (R_PPC64_ADDR16_HIGHER, 1, 16, 0xffff, 32, FALSE, dont,
476 bfd_elf_generic_reloc),
5bd4f169
AM
477
478 /* The bits 32-47 of an address, plus 1 if the contents of the low
479 16 bits, treated as a signed number, is negative. */
46807bf4
AM
480 HOW (R_PPC64_ADDR16_HIGHERA, 1, 16, 0xffff, 32, FALSE, dont,
481 ppc64_elf_ha_reloc),
5bd4f169
AM
482
483 /* The bits 48-63 of an address. */
46807bf4
AM
484 HOW (R_PPC64_ADDR16_HIGHEST, 1, 16, 0xffff, 48, FALSE, dont,
485 bfd_elf_generic_reloc),
5bd4f169
AM
486
487 /* The bits 48-63 of an address, plus 1 if the contents of the low
488 16 bits, treated as a signed number, is negative. */
46807bf4
AM
489 HOW (R_PPC64_ADDR16_HIGHESTA, 1, 16, 0xffff, 48, FALSE, dont,
490 ppc64_elf_ha_reloc),
5bd4f169
AM
491
492 /* Like ADDR64, but may be unaligned. */
46807bf4
AM
493 HOW (R_PPC64_UADDR64, 4, 64, 0xffffffffffffffffULL, 0, FALSE, dont,
494 bfd_elf_generic_reloc),
5bd4f169
AM
495
496 /* 64-bit relative relocation. */
46807bf4
AM
497 HOW (R_PPC64_REL64, 4, 64, 0xffffffffffffffffULL, 0, TRUE, dont,
498 bfd_elf_generic_reloc),
5bd4f169 499
cedb70c5 500 /* 64-bit relocation to the symbol's procedure linkage table. */
46807bf4
AM
501 HOW (R_PPC64_PLT64, 4, 64, 0xffffffffffffffffULL, 0, FALSE, dont,
502 ppc64_elf_unhandled_reloc),
5bd4f169
AM
503
504 /* 64-bit PC relative relocation to the symbol's procedure linkage
505 table. */
506 /* FIXME: R_PPC64_PLTREL64 not supported. */
46807bf4
AM
507 HOW (R_PPC64_PLTREL64, 4, 64, 0xffffffffffffffffULL, 0, TRUE, dont,
508 ppc64_elf_unhandled_reloc),
5bd4f169
AM
509
510 /* 16 bit TOC-relative relocation. */
5bd4f169 511 /* R_PPC64_TOC16 47 half16* S + A - .TOC. */
46807bf4
AM
512 HOW (R_PPC64_TOC16, 1, 16, 0xffff, 0, FALSE, signed,
513 ppc64_elf_toc_reloc),
5bd4f169
AM
514
515 /* 16 bit TOC-relative relocation without overflow. */
5bd4f169 516 /* R_PPC64_TOC16_LO 48 half16 #lo (S + A - .TOC.) */
46807bf4
AM
517 HOW (R_PPC64_TOC16_LO, 1, 16, 0xffff, 0, FALSE, dont,
518 ppc64_elf_toc_reloc),
5bd4f169
AM
519
520 /* 16 bit TOC-relative relocation, high 16 bits. */
5bd4f169 521 /* R_PPC64_TOC16_HI 49 half16 #hi (S + A - .TOC.) */
46807bf4
AM
522 HOW (R_PPC64_TOC16_HI, 1, 16, 0xffff, 16, FALSE, signed,
523 ppc64_elf_toc_reloc),
5bd4f169
AM
524
525 /* 16 bit TOC-relative relocation, high 16 bits, plus 1 if the
526 contents of the low 16 bits, treated as a signed number, is
527 negative. */
5bd4f169 528 /* R_PPC64_TOC16_HA 50 half16 #ha (S + A - .TOC.) */
46807bf4
AM
529 HOW (R_PPC64_TOC16_HA, 1, 16, 0xffff, 16, FALSE, signed,
530 ppc64_elf_toc_ha_reloc),
5bd4f169
AM
531
532 /* 64-bit relocation; insert value of TOC base (.TOC.). */
5bd4f169 533 /* R_PPC64_TOC 51 doubleword64 .TOC. */
46807bf4
AM
534 HOW (R_PPC64_TOC, 4, 64, 0xffffffffffffffffULL, 0, FALSE, dont,
535 ppc64_elf_toc64_reloc),
5bd4f169
AM
536
537 /* Like R_PPC64_GOT16, but also informs the link editor that the
538 value to relocate may (!) refer to a PLT entry which the link
539 editor (a) may replace with the symbol value. If the link editor
540 is unable to fully resolve the symbol, it may (b) create a PLT
541 entry and store the address to the new PLT entry in the GOT.
542 This permits lazy resolution of function symbols at run time.
543 The link editor may also skip all of this and just (c) emit a
544 R_PPC64_GLOB_DAT to tie the symbol to the GOT entry. */
545 /* FIXME: R_PPC64_PLTGOT16 not implemented. */
46807bf4
AM
546 HOW (R_PPC64_PLTGOT16, 1, 16, 0xffff, 0, FALSE,signed,
547 ppc64_elf_unhandled_reloc),
411e1bfb
AM
548
549 /* Like R_PPC64_PLTGOT16, but without overflow. */
550 /* FIXME: R_PPC64_PLTGOT16_LO not implemented. */
46807bf4
AM
551 HOW (R_PPC64_PLTGOT16_LO, 1, 16, 0xffff, 0, FALSE, dont,
552 ppc64_elf_unhandled_reloc),
411e1bfb
AM
553
554 /* Like R_PPC64_PLT_GOT16, but using bits 16-31 of the address. */
555 /* FIXME: R_PPC64_PLTGOT16_HI not implemented. */
46807bf4
AM
556 HOW (R_PPC64_PLTGOT16_HI, 1, 16, 0xffff, 16, FALSE, signed,
557 ppc64_elf_unhandled_reloc),
411e1bfb
AM
558
559 /* Like R_PPC64_PLT_GOT16, but using bits 16-31 of the address, plus
560 1 if the contents of the low 16 bits, treated as a signed number,
561 is negative. */
562 /* FIXME: R_PPC64_PLTGOT16_HA not implemented. */
46807bf4
AM
563 HOW (R_PPC64_PLTGOT16_HA, 1, 16, 0xffff, 16, FALSE, signed,
564 ppc64_elf_unhandled_reloc),
411e1bfb
AM
565
566 /* Like R_PPC64_ADDR16, but for instructions with a DS field. */
46807bf4
AM
567 HOW (R_PPC64_ADDR16_DS, 1, 16, 0xfffc, 0, FALSE, signed,
568 bfd_elf_generic_reloc),
411e1bfb
AM
569
570 /* Like R_PPC64_ADDR16_LO, but for instructions with a DS field. */
46807bf4
AM
571 HOW (R_PPC64_ADDR16_LO_DS, 1, 16, 0xfffc, 0, FALSE, dont,
572 bfd_elf_generic_reloc),
411e1bfb
AM
573
574 /* Like R_PPC64_GOT16, but for instructions with a DS field. */
46807bf4
AM
575 HOW (R_PPC64_GOT16_DS, 1, 16, 0xfffc, 0, FALSE, signed,
576 ppc64_elf_unhandled_reloc),
411e1bfb
AM
577
578 /* Like R_PPC64_GOT16_LO, but for instructions with a DS field. */
46807bf4
AM
579 HOW (R_PPC64_GOT16_LO_DS, 1, 16, 0xfffc, 0, FALSE, dont,
580 ppc64_elf_unhandled_reloc),
411e1bfb
AM
581
582 /* Like R_PPC64_PLT16_LO, but for instructions with a DS field. */
46807bf4
AM
583 HOW (R_PPC64_PLT16_LO_DS, 1, 16, 0xfffc, 0, FALSE, dont,
584 ppc64_elf_unhandled_reloc),
411e1bfb
AM
585
586 /* Like R_PPC64_SECTOFF, but for instructions with a DS field. */
46807bf4
AM
587 HOW (R_PPC64_SECTOFF_DS, 1, 16, 0xfffc, 0, FALSE, signed,
588 ppc64_elf_sectoff_reloc),
411e1bfb
AM
589
590 /* Like R_PPC64_SECTOFF_LO, but for instructions with a DS field. */
46807bf4
AM
591 HOW (R_PPC64_SECTOFF_LO_DS, 1, 16, 0xfffc, 0, FALSE, dont,
592 ppc64_elf_sectoff_reloc),
411e1bfb
AM
593
594 /* Like R_PPC64_TOC16, but for instructions with a DS field. */
46807bf4
AM
595 HOW (R_PPC64_TOC16_DS, 1, 16, 0xfffc, 0, FALSE, signed,
596 ppc64_elf_toc_reloc),
411e1bfb
AM
597
598 /* Like R_PPC64_TOC16_LO, but for instructions with a DS field. */
46807bf4
AM
599 HOW (R_PPC64_TOC16_LO_DS, 1, 16, 0xfffc, 0, FALSE, dont,
600 ppc64_elf_toc_reloc),
411e1bfb
AM
601
602 /* Like R_PPC64_PLTGOT16, but for instructions with a DS field. */
603 /* FIXME: R_PPC64_PLTGOT16_DS not implemented. */
46807bf4
AM
604 HOW (R_PPC64_PLTGOT16_DS, 1, 16, 0xfffc, 0, FALSE, signed,
605 ppc64_elf_unhandled_reloc),
411e1bfb
AM
606
607 /* Like R_PPC64_PLTGOT16_LO, but for instructions with a DS field. */
608 /* FIXME: R_PPC64_PLTGOT16_LO not implemented. */
46807bf4
AM
609 HOW (R_PPC64_PLTGOT16_LO_DS, 1, 16, 0xfffc, 0, FALSE, dont,
610 ppc64_elf_unhandled_reloc),
411e1bfb 611
727fc41e 612 /* Marker relocs for TLS. */
46807bf4
AM
613 HOW (R_PPC64_TLS, 2, 32, 0, 0, FALSE, dont,
614 bfd_elf_generic_reloc),
615
616 HOW (R_PPC64_TLSGD, 2, 32, 0, 0, FALSE, dont,
617 bfd_elf_generic_reloc),
618
619 HOW (R_PPC64_TLSLD, 2, 32, 0, 0, FALSE, dont,
620 bfd_elf_generic_reloc),
727fc41e 621
23cedd1d
AM
622 /* Marker reloc for optimizing r2 save in prologue rather than on
623 each plt call stub. */
46807bf4
AM
624 HOW (R_PPC64_TOCSAVE, 2, 32, 0, 0, FALSE, dont,
625 bfd_elf_generic_reloc),
3b421ab3 626
23cedd1d 627 /* Marker relocs on inline plt call instructions. */
46807bf4
AM
628 HOW (R_PPC64_PLTSEQ, 2, 32, 0, 0, FALSE, dont,
629 bfd_elf_generic_reloc),
630
631 HOW (R_PPC64_PLTCALL, 2, 32, 0, 0, FALSE, dont,
632 bfd_elf_generic_reloc),
23cedd1d 633
411e1bfb
AM
634 /* Computes the load module index of the load module that contains the
635 definition of its TLS sym. */
46807bf4
AM
636 HOW (R_PPC64_DTPMOD64, 4, 64, 0xffffffffffffffffULL, 0, FALSE, dont,
637 ppc64_elf_unhandled_reloc),
411e1bfb
AM
638
639 /* Computes a dtv-relative displacement, the difference between the value
640 of sym+add and the base address of the thread-local storage block that
641 contains the definition of sym, minus 0x8000. */
46807bf4
AM
642 HOW (R_PPC64_DTPREL64, 4, 64, 0xffffffffffffffffULL, 0, FALSE, dont,
643 ppc64_elf_unhandled_reloc),
411e1bfb
AM
644
645 /* A 16 bit dtprel reloc. */
46807bf4
AM
646 HOW (R_PPC64_DTPREL16, 1, 16, 0xffff, 0, FALSE, signed,
647 ppc64_elf_unhandled_reloc),
411e1bfb
AM
648
649 /* Like DTPREL16, but no overflow. */
46807bf4
AM
650 HOW (R_PPC64_DTPREL16_LO, 1, 16, 0xffff, 0, FALSE, dont,
651 ppc64_elf_unhandled_reloc),
411e1bfb
AM
652
653 /* Like DTPREL16_LO, but next higher group of 16 bits. */
46807bf4
AM
654 HOW (R_PPC64_DTPREL16_HI, 1, 16, 0xffff, 16, FALSE, signed,
655 ppc64_elf_unhandled_reloc),
411e1bfb
AM
656
657 /* Like DTPREL16_HI, but adjust for low 16 bits. */
46807bf4
AM
658 HOW (R_PPC64_DTPREL16_HA, 1, 16, 0xffff, 16, FALSE, signed,
659 ppc64_elf_unhandled_reloc),
411e1bfb
AM
660
661 /* Like DTPREL16_HI, but next higher group of 16 bits. */
46807bf4
AM
662 HOW (R_PPC64_DTPREL16_HIGHER, 1, 16, 0xffff, 32, FALSE, dont,
663 ppc64_elf_unhandled_reloc),
411e1bfb
AM
664
665 /* Like DTPREL16_HIGHER, but adjust for low 16 bits. */
46807bf4
AM
666 HOW (R_PPC64_DTPREL16_HIGHERA, 1, 16, 0xffff, 32, FALSE, dont,
667 ppc64_elf_unhandled_reloc),
411e1bfb
AM
668
669 /* Like DTPREL16_HIGHER, but next higher group of 16 bits. */
46807bf4
AM
670 HOW (R_PPC64_DTPREL16_HIGHEST, 1, 16, 0xffff, 48, FALSE, dont,
671 ppc64_elf_unhandled_reloc),
411e1bfb
AM
672
673 /* Like DTPREL16_HIGHEST, but adjust for low 16 bits. */
46807bf4
AM
674 HOW (R_PPC64_DTPREL16_HIGHESTA, 1, 16, 0xffff, 48, FALSE, dont,
675 ppc64_elf_unhandled_reloc),
411e1bfb
AM
676
677 /* Like DTPREL16, but for insns with a DS field. */
46807bf4
AM
678 HOW (R_PPC64_DTPREL16_DS, 1, 16, 0xfffc, 0, FALSE, signed,
679 ppc64_elf_unhandled_reloc),
411e1bfb
AM
680
681 /* Like DTPREL16_DS, but no overflow. */
46807bf4
AM
682 HOW (R_PPC64_DTPREL16_LO_DS, 1, 16, 0xfffc, 0, FALSE, dont,
683 ppc64_elf_unhandled_reloc),
411e1bfb
AM
684
685 /* Computes a tp-relative displacement, the difference between the value of
686 sym+add and the value of the thread pointer (r13). */
46807bf4
AM
687 HOW (R_PPC64_TPREL64, 4, 64, 0xffffffffffffffffULL, 0, FALSE, dont,
688 ppc64_elf_unhandled_reloc),
411e1bfb
AM
689
690 /* A 16 bit tprel reloc. */
46807bf4
AM
691 HOW (R_PPC64_TPREL16, 1, 16, 0xffff, 0, FALSE, signed,
692 ppc64_elf_unhandled_reloc),
411e1bfb
AM
693
694 /* Like TPREL16, but no overflow. */
46807bf4
AM
695 HOW (R_PPC64_TPREL16_LO, 1, 16, 0xffff, 0, FALSE, dont,
696 ppc64_elf_unhandled_reloc),
411e1bfb
AM
697
698 /* Like TPREL16_LO, but next higher group of 16 bits. */
46807bf4
AM
699 HOW (R_PPC64_TPREL16_HI, 1, 16, 0xffff, 16, FALSE, signed,
700 ppc64_elf_unhandled_reloc),
411e1bfb
AM
701
702 /* Like TPREL16_HI, but adjust for low 16 bits. */
46807bf4
AM
703 HOW (R_PPC64_TPREL16_HA, 1, 16, 0xffff, 16, FALSE, signed,
704 ppc64_elf_unhandled_reloc),
411e1bfb
AM
705
706 /* Like TPREL16_HI, but next higher group of 16 bits. */
46807bf4
AM
707 HOW (R_PPC64_TPREL16_HIGHER, 1, 16, 0xffff, 32, FALSE, dont,
708 ppc64_elf_unhandled_reloc),
411e1bfb
AM
709
710 /* Like TPREL16_HIGHER, but adjust for low 16 bits. */
46807bf4
AM
711 HOW (R_PPC64_TPREL16_HIGHERA, 1, 16, 0xffff, 32, FALSE, dont,
712 ppc64_elf_unhandled_reloc),
411e1bfb
AM
713
714 /* Like TPREL16_HIGHER, but next higher group of 16 bits. */
46807bf4
AM
715 HOW (R_PPC64_TPREL16_HIGHEST, 1, 16, 0xffff, 48, FALSE, dont,
716 ppc64_elf_unhandled_reloc),
411e1bfb
AM
717
718 /* Like TPREL16_HIGHEST, but adjust for low 16 bits. */
46807bf4
AM
719 HOW (R_PPC64_TPREL16_HIGHESTA, 1, 16, 0xffff, 48, FALSE, dont,
720 ppc64_elf_unhandled_reloc),
411e1bfb
AM
721
722 /* Like TPREL16, but for insns with a DS field. */
46807bf4
AM
723 HOW (R_PPC64_TPREL16_DS, 1, 16, 0xfffc, 0, FALSE, signed,
724 ppc64_elf_unhandled_reloc),
411e1bfb
AM
725
726 /* Like TPREL16_DS, but no overflow. */
46807bf4
AM
727 HOW (R_PPC64_TPREL16_LO_DS, 1, 16, 0xfffc, 0, FALSE, dont,
728 ppc64_elf_unhandled_reloc),
411e1bfb
AM
729
730 /* Allocates two contiguous entries in the GOT to hold a tls_index structure,
731 with values (sym+add)@dtpmod and (sym+add)@dtprel, and computes the offset
732 to the first entry relative to the TOC base (r2). */
46807bf4
AM
733 HOW (R_PPC64_GOT_TLSGD16, 1, 16, 0xffff, 0, FALSE, signed,
734 ppc64_elf_unhandled_reloc),
5bd4f169 735
411e1bfb 736 /* Like GOT_TLSGD16, but no overflow. */
46807bf4
AM
737 HOW (R_PPC64_GOT_TLSGD16_LO, 1, 16, 0xffff, 0, FALSE, dont,
738 ppc64_elf_unhandled_reloc),
5bd4f169 739
411e1bfb 740 /* Like GOT_TLSGD16_LO, but next higher group of 16 bits. */
46807bf4
AM
741 HOW (R_PPC64_GOT_TLSGD16_HI, 1, 16, 0xffff, 16, FALSE, signed,
742 ppc64_elf_unhandled_reloc),
5bd4f169 743
411e1bfb 744 /* Like GOT_TLSGD16_HI, but adjust for low 16 bits. */
46807bf4
AM
745 HOW (R_PPC64_GOT_TLSGD16_HA, 1, 16, 0xffff, 16, FALSE, signed,
746 ppc64_elf_unhandled_reloc),
5bd4f169 747
411e1bfb
AM
748 /* Allocates two contiguous entries in the GOT to hold a tls_index structure,
749 with values (sym+add)@dtpmod and zero, and computes the offset to the
750 first entry relative to the TOC base (r2). */
46807bf4
AM
751 HOW (R_PPC64_GOT_TLSLD16, 1, 16, 0xffff, 0, FALSE, signed,
752 ppc64_elf_unhandled_reloc),
5bd4f169 753
411e1bfb 754 /* Like GOT_TLSLD16, but no overflow. */
46807bf4
AM
755 HOW (R_PPC64_GOT_TLSLD16_LO, 1, 16, 0xffff, 0, FALSE, dont,
756 ppc64_elf_unhandled_reloc),
5bd4f169 757
411e1bfb 758 /* Like GOT_TLSLD16_LO, but next higher group of 16 bits. */
46807bf4
AM
759 HOW (R_PPC64_GOT_TLSLD16_HI, 1, 16, 0xffff, 16, FALSE, signed,
760 ppc64_elf_unhandled_reloc),
5bd4f169 761
411e1bfb 762 /* Like GOT_TLSLD16_HI, but adjust for low 16 bits. */
46807bf4
AM
763 HOW (R_PPC64_GOT_TLSLD16_HA, 1, 16, 0xffff, 16, FALSE, signed,
764 ppc64_elf_unhandled_reloc),
5bd4f169 765
411e1bfb
AM
766 /* Allocates an entry in the GOT with value (sym+add)@dtprel, and computes
767 the offset to the entry relative to the TOC base (r2). */
46807bf4
AM
768 HOW (R_PPC64_GOT_DTPREL16_DS, 1, 16, 0xfffc, 0, FALSE, signed,
769 ppc64_elf_unhandled_reloc),
5bd4f169 770
411e1bfb 771 /* Like GOT_DTPREL16_DS, but no overflow. */
46807bf4
AM
772 HOW (R_PPC64_GOT_DTPREL16_LO_DS, 1, 16, 0xfffc, 0, FALSE, dont,
773 ppc64_elf_unhandled_reloc),
5bd4f169 774
411e1bfb 775 /* Like GOT_DTPREL16_LO_DS, but next higher group of 16 bits. */
46807bf4
AM
776 HOW (R_PPC64_GOT_DTPREL16_HI, 1, 16, 0xffff, 16, FALSE, signed,
777 ppc64_elf_unhandled_reloc),
5bd4f169 778
411e1bfb 779 /* Like GOT_DTPREL16_HI, but adjust for low 16 bits. */
46807bf4
AM
780 HOW (R_PPC64_GOT_DTPREL16_HA, 1, 16, 0xffff, 16, FALSE, signed,
781 ppc64_elf_unhandled_reloc),
411e1bfb
AM
782
783 /* Allocates an entry in the GOT with value (sym+add)@tprel, and computes the
784 offset to the entry relative to the TOC base (r2). */
46807bf4
AM
785 HOW (R_PPC64_GOT_TPREL16_DS, 1, 16, 0xfffc, 0, FALSE, signed,
786 ppc64_elf_unhandled_reloc),
5bd4f169 787
411e1bfb 788 /* Like GOT_TPREL16_DS, but no overflow. */
46807bf4
AM
789 HOW (R_PPC64_GOT_TPREL16_LO_DS, 1, 16, 0xfffc, 0, FALSE, dont,
790 ppc64_elf_unhandled_reloc),
5bd4f169 791
411e1bfb 792 /* Like GOT_TPREL16_LO_DS, but next higher group of 16 bits. */
46807bf4
AM
793 HOW (R_PPC64_GOT_TPREL16_HI, 1, 16, 0xffff, 16, FALSE, signed,
794 ppc64_elf_unhandled_reloc),
5bd4f169 795
411e1bfb 796 /* Like GOT_TPREL16_HI, but adjust for low 16 bits. */
46807bf4
AM
797 HOW (R_PPC64_GOT_TPREL16_HA, 1, 16, 0xffff, 16, FALSE, signed,
798 ppc64_elf_unhandled_reloc),
799
800 HOW (R_PPC64_JMP_IREL, 0, 0, 0, 0, FALSE, dont,
801 ppc64_elf_unhandled_reloc),
802
803 HOW (R_PPC64_IRELATIVE, 4, 64, 0xffffffffffffffffULL, 0, FALSE, dont,
804 bfd_elf_generic_reloc),
e054468f 805
25f23106 806 /* A 16 bit relative relocation. */
46807bf4
AM
807 HOW (R_PPC64_REL16, 1, 16, 0xffff, 0, TRUE, signed,
808 bfd_elf_generic_reloc),
25f23106
AM
809
810 /* A 16 bit relative relocation without overflow. */
46807bf4
AM
811 HOW (R_PPC64_REL16_LO, 1, 16, 0xffff, 0, TRUE, dont,
812 bfd_elf_generic_reloc),
25f23106
AM
813
814 /* The high order 16 bits of a relative address. */
46807bf4
AM
815 HOW (R_PPC64_REL16_HI, 1, 16, 0xffff, 16, TRUE, signed,
816 bfd_elf_generic_reloc),
25f23106
AM
817
818 /* The high order 16 bits of a relative address, plus 1 if the contents of
819 the low 16 bits, treated as a signed number, is negative. */
46807bf4
AM
820 HOW (R_PPC64_REL16_HA, 1, 16, 0xffff, 16, TRUE, signed,
821 ppc64_elf_ha_reloc),
25f23106 822
4a969973
AM
823 HOW (R_PPC64_REL16_HIGH, 1, 16, 0xffff, 16, TRUE, dont,
824 bfd_elf_generic_reloc),
825
826 HOW (R_PPC64_REL16_HIGHA, 1, 16, 0xffff, 16, TRUE, dont,
827 ppc64_elf_ha_reloc),
828
829 HOW (R_PPC64_REL16_HIGHER, 1, 16, 0xffff, 32, TRUE, dont,
830 bfd_elf_generic_reloc),
831
832 HOW (R_PPC64_REL16_HIGHERA, 1, 16, 0xffff, 32, TRUE, dont,
833 ppc64_elf_ha_reloc),
834
835 HOW (R_PPC64_REL16_HIGHEST, 1, 16, 0xffff, 48, TRUE, dont,
836 bfd_elf_generic_reloc),
837
838 HOW (R_PPC64_REL16_HIGHESTA, 1, 16, 0xffff, 48, TRUE, dont,
839 ppc64_elf_ha_reloc),
840
a680de9a 841 /* Like R_PPC64_REL16_HA but for split field in addpcis. */
46807bf4
AM
842 HOW (R_PPC64_REL16DX_HA, 2, 16, 0x1fffc1, 16, TRUE, signed,
843 ppc64_elf_ha_reloc),
a680de9a 844
7ba71655 845 /* A split-field reloc for addpcis, non-relative (gas internal use only). */
46807bf4
AM
846 HOW (R_PPC64_16DX_HA, 2, 16, 0x1fffc1, 16, FALSE, signed,
847 ppc64_elf_ha_reloc),
7ba71655 848
f9c6b907 849 /* Like R_PPC64_ADDR16_HI, but no overflow. */
46807bf4
AM
850 HOW (R_PPC64_ADDR16_HIGH, 1, 16, 0xffff, 16, FALSE, dont,
851 bfd_elf_generic_reloc),
f9c6b907
AM
852
853 /* Like R_PPC64_ADDR16_HA, but no overflow. */
46807bf4
AM
854 HOW (R_PPC64_ADDR16_HIGHA, 1, 16, 0xffff, 16, FALSE, dont,
855 ppc64_elf_ha_reloc),
f9c6b907
AM
856
857 /* Like R_PPC64_DTPREL16_HI, but no overflow. */
46807bf4
AM
858 HOW (R_PPC64_DTPREL16_HIGH, 1, 16, 0xffff, 16, FALSE, dont,
859 ppc64_elf_unhandled_reloc),
f9c6b907
AM
860
861 /* Like R_PPC64_DTPREL16_HA, but no overflow. */
46807bf4
AM
862 HOW (R_PPC64_DTPREL16_HIGHA, 1, 16, 0xffff, 16, FALSE, dont,
863 ppc64_elf_unhandled_reloc),
f9c6b907
AM
864
865 /* Like R_PPC64_TPREL16_HI, but no overflow. */
46807bf4
AM
866 HOW (R_PPC64_TPREL16_HIGH, 1, 16, 0xffff, 16, FALSE, dont,
867 ppc64_elf_unhandled_reloc),
f9c6b907
AM
868
869 /* Like R_PPC64_TPREL16_HA, but no overflow. */
46807bf4
AM
870 HOW (R_PPC64_TPREL16_HIGHA, 1, 16, 0xffff, 16, FALSE, dont,
871 ppc64_elf_unhandled_reloc),
f9c6b907 872
006589cf 873 /* Marker reloc on ELFv2 large-model function entry. */
46807bf4
AM
874 HOW (R_PPC64_ENTRY, 2, 32, 0, 0, FALSE, dont,
875 bfd_elf_generic_reloc),
006589cf 876
45965137 877 /* Like ADDR64, but use local entry point of function. */
46807bf4
AM
878 HOW (R_PPC64_ADDR64_LOCAL, 4, 64, 0xffffffffffffffffULL, 0, FALSE, dont,
879 bfd_elf_generic_reloc),
45965137 880
5bd4f169 881 /* GNU extension to record C++ vtable hierarchy. */
46807bf4
AM
882 HOW (R_PPC64_GNU_VTINHERIT, 0, 0, 0, 0, FALSE, dont,
883 NULL),
5bd4f169
AM
884
885 /* GNU extension to record C++ vtable member usage. */
46807bf4
AM
886 HOW (R_PPC64_GNU_VTENTRY, 0, 0, 0, 0, FALSE, dont,
887 NULL),
5bd4f169
AM
888};
889
890\f
891/* Initialize the ppc64_elf_howto_table, so that linear accesses can
892 be done. */
893
894static void
4ce794b7 895ppc_howto_init (void)
5bd4f169
AM
896{
897 unsigned int i, type;
898
a4b6fadd 899 for (i = 0; i < ARRAY_SIZE (ppc64_elf_howto_raw); i++)
5bd4f169
AM
900 {
901 type = ppc64_elf_howto_raw[i].type;
a4b6fadd 902 BFD_ASSERT (type < ARRAY_SIZE (ppc64_elf_howto_table));
5bd4f169
AM
903 ppc64_elf_howto_table[type] = &ppc64_elf_howto_raw[i];
904 }
905}
906
907static reloc_howto_type *
f3185997 908ppc64_elf_reloc_type_lookup (bfd *abfd,
4ce794b7 909 bfd_reloc_code_real_type code)
5bd4f169 910{
411e1bfb 911 enum elf_ppc64_reloc_type r = R_PPC64_NONE;
5bd4f169
AM
912
913 if (!ppc64_elf_howto_table[R_PPC64_ADDR32])
914 /* Initialize howto table if needed. */
915 ppc_howto_init ();
916
4ce794b7 917 switch (code)
5bd4f169
AM
918 {
919 default:
f3185997 920 /* xgettext:c-format */
2cdcc330
AM
921 _bfd_error_handler (_("%pB: unsupported relocation type %#x"), abfd,
922 (int) code);
f3185997 923 bfd_set_error (bfd_error_bad_value);
4ce794b7 924 return NULL;
5bd4f169 925
411e1bfb
AM
926 case BFD_RELOC_NONE: r = R_PPC64_NONE;
927 break;
928 case BFD_RELOC_32: r = R_PPC64_ADDR32;
929 break;
930 case BFD_RELOC_PPC_BA26: r = R_PPC64_ADDR24;
931 break;
932 case BFD_RELOC_16: r = R_PPC64_ADDR16;
933 break;
934 case BFD_RELOC_LO16: r = R_PPC64_ADDR16_LO;
935 break;
936 case BFD_RELOC_HI16: r = R_PPC64_ADDR16_HI;
937 break;
f9c6b907
AM
938 case BFD_RELOC_PPC64_ADDR16_HIGH: r = R_PPC64_ADDR16_HIGH;
939 break;
411e1bfb 940 case BFD_RELOC_HI16_S: r = R_PPC64_ADDR16_HA;
5bd4f169 941 break;
f9c6b907
AM
942 case BFD_RELOC_PPC64_ADDR16_HIGHA: r = R_PPC64_ADDR16_HIGHA;
943 break;
411e1bfb 944 case BFD_RELOC_PPC_BA16: r = R_PPC64_ADDR14;
5bd4f169 945 break;
411e1bfb 946 case BFD_RELOC_PPC_BA16_BRTAKEN: r = R_PPC64_ADDR14_BRTAKEN;
5bd4f169 947 break;
411e1bfb 948 case BFD_RELOC_PPC_BA16_BRNTAKEN: r = R_PPC64_ADDR14_BRNTAKEN;
5bd4f169 949 break;
411e1bfb 950 case BFD_RELOC_PPC_B26: r = R_PPC64_REL24;
5bd4f169 951 break;
05d0e962
AM
952 case BFD_RELOC_PPC64_REL24_NOTOC: r = R_PPC64_REL24_NOTOC;
953 break;
411e1bfb 954 case BFD_RELOC_PPC_B16: r = R_PPC64_REL14;
5bd4f169 955 break;
411e1bfb 956 case BFD_RELOC_PPC_B16_BRTAKEN: r = R_PPC64_REL14_BRTAKEN;
5bd4f169 957 break;
411e1bfb 958 case BFD_RELOC_PPC_B16_BRNTAKEN: r = R_PPC64_REL14_BRNTAKEN;
5bd4f169 959 break;
411e1bfb 960 case BFD_RELOC_16_GOTOFF: r = R_PPC64_GOT16;
5bd4f169 961 break;
411e1bfb 962 case BFD_RELOC_LO16_GOTOFF: r = R_PPC64_GOT16_LO;
5bd4f169 963 break;
411e1bfb 964 case BFD_RELOC_HI16_GOTOFF: r = R_PPC64_GOT16_HI;
5bd4f169 965 break;
411e1bfb 966 case BFD_RELOC_HI16_S_GOTOFF: r = R_PPC64_GOT16_HA;
5bd4f169 967 break;
411e1bfb 968 case BFD_RELOC_PPC_COPY: r = R_PPC64_COPY;
5bd4f169 969 break;
411e1bfb 970 case BFD_RELOC_PPC_GLOB_DAT: r = R_PPC64_GLOB_DAT;
5bd4f169 971 break;
411e1bfb 972 case BFD_RELOC_32_PCREL: r = R_PPC64_REL32;
5bd4f169 973 break;
411e1bfb 974 case BFD_RELOC_32_PLTOFF: r = R_PPC64_PLT32;
5bd4f169 975 break;
411e1bfb 976 case BFD_RELOC_32_PLT_PCREL: r = R_PPC64_PLTREL32;
5bd4f169 977 break;
411e1bfb 978 case BFD_RELOC_LO16_PLTOFF: r = R_PPC64_PLT16_LO;
5bd4f169 979 break;
411e1bfb 980 case BFD_RELOC_HI16_PLTOFF: r = R_PPC64_PLT16_HI;
5bd4f169 981 break;
411e1bfb 982 case BFD_RELOC_HI16_S_PLTOFF: r = R_PPC64_PLT16_HA;
5bd4f169 983 break;
411e1bfb 984 case BFD_RELOC_16_BASEREL: r = R_PPC64_SECTOFF;
5bd4f169 985 break;
411e1bfb 986 case BFD_RELOC_LO16_BASEREL: r = R_PPC64_SECTOFF_LO;
5bd4f169 987 break;
411e1bfb 988 case BFD_RELOC_HI16_BASEREL: r = R_PPC64_SECTOFF_HI;
5bd4f169 989 break;
411e1bfb 990 case BFD_RELOC_HI16_S_BASEREL: r = R_PPC64_SECTOFF_HA;
5bd4f169 991 break;
411e1bfb 992 case BFD_RELOC_CTOR: r = R_PPC64_ADDR64;
5bd4f169 993 break;
411e1bfb 994 case BFD_RELOC_64: r = R_PPC64_ADDR64;
5bd4f169 995 break;
411e1bfb 996 case BFD_RELOC_PPC64_HIGHER: r = R_PPC64_ADDR16_HIGHER;
5bd4f169 997 break;
411e1bfb 998 case BFD_RELOC_PPC64_HIGHER_S: r = R_PPC64_ADDR16_HIGHERA;
5bd4f169 999 break;
411e1bfb 1000 case BFD_RELOC_PPC64_HIGHEST: r = R_PPC64_ADDR16_HIGHEST;
5bd4f169 1001 break;
411e1bfb 1002 case BFD_RELOC_PPC64_HIGHEST_S: r = R_PPC64_ADDR16_HIGHESTA;
5bd4f169 1003 break;
411e1bfb 1004 case BFD_RELOC_64_PCREL: r = R_PPC64_REL64;
5bd4f169 1005 break;
411e1bfb 1006 case BFD_RELOC_64_PLTOFF: r = R_PPC64_PLT64;
5bd4f169 1007 break;
411e1bfb 1008 case BFD_RELOC_64_PLT_PCREL: r = R_PPC64_PLTREL64;
5bd4f169 1009 break;
411e1bfb 1010 case BFD_RELOC_PPC_TOC16: r = R_PPC64_TOC16;
5bd4f169 1011 break;
411e1bfb 1012 case BFD_RELOC_PPC64_TOC16_LO: r = R_PPC64_TOC16_LO;
5bd4f169 1013 break;
411e1bfb 1014 case BFD_RELOC_PPC64_TOC16_HI: r = R_PPC64_TOC16_HI;
5bd4f169 1015 break;
411e1bfb 1016 case BFD_RELOC_PPC64_TOC16_HA: r = R_PPC64_TOC16_HA;
5bd4f169 1017 break;
411e1bfb 1018 case BFD_RELOC_PPC64_TOC: r = R_PPC64_TOC;
5bd4f169 1019 break;
411e1bfb 1020 case BFD_RELOC_PPC64_PLTGOT16: r = R_PPC64_PLTGOT16;
5bd4f169 1021 break;
411e1bfb 1022 case BFD_RELOC_PPC64_PLTGOT16_LO: r = R_PPC64_PLTGOT16_LO;
5bd4f169 1023 break;
411e1bfb 1024 case BFD_RELOC_PPC64_PLTGOT16_HI: r = R_PPC64_PLTGOT16_HI;
5bd4f169 1025 break;
411e1bfb 1026 case BFD_RELOC_PPC64_PLTGOT16_HA: r = R_PPC64_PLTGOT16_HA;
5bd4f169 1027 break;
411e1bfb 1028 case BFD_RELOC_PPC64_ADDR16_DS: r = R_PPC64_ADDR16_DS;
5bd4f169 1029 break;
411e1bfb 1030 case BFD_RELOC_PPC64_ADDR16_LO_DS: r = R_PPC64_ADDR16_LO_DS;
5bd4f169 1031 break;
411e1bfb 1032 case BFD_RELOC_PPC64_GOT16_DS: r = R_PPC64_GOT16_DS;
5bd4f169 1033 break;
411e1bfb 1034 case BFD_RELOC_PPC64_GOT16_LO_DS: r = R_PPC64_GOT16_LO_DS;
5bd4f169 1035 break;
411e1bfb 1036 case BFD_RELOC_PPC64_PLT16_LO_DS: r = R_PPC64_PLT16_LO_DS;
5bd4f169 1037 break;
411e1bfb 1038 case BFD_RELOC_PPC64_SECTOFF_DS: r = R_PPC64_SECTOFF_DS;
5bd4f169 1039 break;
411e1bfb 1040 case BFD_RELOC_PPC64_SECTOFF_LO_DS: r = R_PPC64_SECTOFF_LO_DS;
5bd4f169 1041 break;
411e1bfb 1042 case BFD_RELOC_PPC64_TOC16_DS: r = R_PPC64_TOC16_DS;
5bd4f169 1043 break;
411e1bfb 1044 case BFD_RELOC_PPC64_TOC16_LO_DS: r = R_PPC64_TOC16_LO_DS;
5bd4f169 1045 break;
411e1bfb 1046 case BFD_RELOC_PPC64_PLTGOT16_DS: r = R_PPC64_PLTGOT16_DS;
5bd4f169 1047 break;
411e1bfb 1048 case BFD_RELOC_PPC64_PLTGOT16_LO_DS: r = R_PPC64_PLTGOT16_LO_DS;
5bd4f169 1049 break;
411e1bfb 1050 case BFD_RELOC_PPC_TLS: r = R_PPC64_TLS;
5bd4f169 1051 break;
727fc41e
AM
1052 case BFD_RELOC_PPC_TLSGD: r = R_PPC64_TLSGD;
1053 break;
1054 case BFD_RELOC_PPC_TLSLD: r = R_PPC64_TLSLD;
1055 break;
411e1bfb 1056 case BFD_RELOC_PPC_DTPMOD: r = R_PPC64_DTPMOD64;
5bd4f169 1057 break;
411e1bfb 1058 case BFD_RELOC_PPC_TPREL16: r = R_PPC64_TPREL16;
5bd4f169 1059 break;
411e1bfb 1060 case BFD_RELOC_PPC_TPREL16_LO: r = R_PPC64_TPREL16_LO;
5bd4f169 1061 break;
411e1bfb 1062 case BFD_RELOC_PPC_TPREL16_HI: r = R_PPC64_TPREL16_HI;
5bd4f169 1063 break;
f9c6b907
AM
1064 case BFD_RELOC_PPC64_TPREL16_HIGH: r = R_PPC64_TPREL16_HIGH;
1065 break;
411e1bfb 1066 case BFD_RELOC_PPC_TPREL16_HA: r = R_PPC64_TPREL16_HA;
5bd4f169 1067 break;
f9c6b907
AM
1068 case BFD_RELOC_PPC64_TPREL16_HIGHA: r = R_PPC64_TPREL16_HIGHA;
1069 break;
411e1bfb 1070 case BFD_RELOC_PPC_TPREL: r = R_PPC64_TPREL64;
5bd4f169 1071 break;
411e1bfb
AM
1072 case BFD_RELOC_PPC_DTPREL16: r = R_PPC64_DTPREL16;
1073 break;
1074 case BFD_RELOC_PPC_DTPREL16_LO: r = R_PPC64_DTPREL16_LO;
1075 break;
1076 case BFD_RELOC_PPC_DTPREL16_HI: r = R_PPC64_DTPREL16_HI;
1077 break;
f9c6b907
AM
1078 case BFD_RELOC_PPC64_DTPREL16_HIGH: r = R_PPC64_DTPREL16_HIGH;
1079 break;
411e1bfb
AM
1080 case BFD_RELOC_PPC_DTPREL16_HA: r = R_PPC64_DTPREL16_HA;
1081 break;
f9c6b907
AM
1082 case BFD_RELOC_PPC64_DTPREL16_HIGHA: r = R_PPC64_DTPREL16_HIGHA;
1083 break;
411e1bfb
AM
1084 case BFD_RELOC_PPC_DTPREL: r = R_PPC64_DTPREL64;
1085 break;
1086 case BFD_RELOC_PPC_GOT_TLSGD16: r = R_PPC64_GOT_TLSGD16;
1087 break;
1088 case BFD_RELOC_PPC_GOT_TLSGD16_LO: r = R_PPC64_GOT_TLSGD16_LO;
1089 break;
1090 case BFD_RELOC_PPC_GOT_TLSGD16_HI: r = R_PPC64_GOT_TLSGD16_HI;
1091 break;
1092 case BFD_RELOC_PPC_GOT_TLSGD16_HA: r = R_PPC64_GOT_TLSGD16_HA;
1093 break;
1094 case BFD_RELOC_PPC_GOT_TLSLD16: r = R_PPC64_GOT_TLSLD16;
1095 break;
1096 case BFD_RELOC_PPC_GOT_TLSLD16_LO: r = R_PPC64_GOT_TLSLD16_LO;
1097 break;
1098 case BFD_RELOC_PPC_GOT_TLSLD16_HI: r = R_PPC64_GOT_TLSLD16_HI;
1099 break;
1100 case BFD_RELOC_PPC_GOT_TLSLD16_HA: r = R_PPC64_GOT_TLSLD16_HA;
1101 break;
1102 case BFD_RELOC_PPC_GOT_TPREL16: r = R_PPC64_GOT_TPREL16_DS;
1103 break;
1104 case BFD_RELOC_PPC_GOT_TPREL16_LO: r = R_PPC64_GOT_TPREL16_LO_DS;
1105 break;
1106 case BFD_RELOC_PPC_GOT_TPREL16_HI: r = R_PPC64_GOT_TPREL16_HI;
1107 break;
1108 case BFD_RELOC_PPC_GOT_TPREL16_HA: r = R_PPC64_GOT_TPREL16_HA;
1109 break;
1110 case BFD_RELOC_PPC_GOT_DTPREL16: r = R_PPC64_GOT_DTPREL16_DS;
1111 break;
1112 case BFD_RELOC_PPC_GOT_DTPREL16_LO: r = R_PPC64_GOT_DTPREL16_LO_DS;
1113 break;
1114 case BFD_RELOC_PPC_GOT_DTPREL16_HI: r = R_PPC64_GOT_DTPREL16_HI;
1115 break;
1116 case BFD_RELOC_PPC_GOT_DTPREL16_HA: r = R_PPC64_GOT_DTPREL16_HA;
1117 break;
1118 case BFD_RELOC_PPC64_TPREL16_DS: r = R_PPC64_TPREL16_DS;
1119 break;
1120 case BFD_RELOC_PPC64_TPREL16_LO_DS: r = R_PPC64_TPREL16_LO_DS;
1121 break;
1122 case BFD_RELOC_PPC64_TPREL16_HIGHER: r = R_PPC64_TPREL16_HIGHER;
1123 break;
1124 case BFD_RELOC_PPC64_TPREL16_HIGHERA: r = R_PPC64_TPREL16_HIGHERA;
1125 break;
1126 case BFD_RELOC_PPC64_TPREL16_HIGHEST: r = R_PPC64_TPREL16_HIGHEST;
1127 break;
1128 case BFD_RELOC_PPC64_TPREL16_HIGHESTA: r = R_PPC64_TPREL16_HIGHESTA;
1129 break;
1130 case BFD_RELOC_PPC64_DTPREL16_DS: r = R_PPC64_DTPREL16_DS;
1131 break;
1132 case BFD_RELOC_PPC64_DTPREL16_LO_DS: r = R_PPC64_DTPREL16_LO_DS;
1133 break;
1134 case BFD_RELOC_PPC64_DTPREL16_HIGHER: r = R_PPC64_DTPREL16_HIGHER;
1135 break;
1136 case BFD_RELOC_PPC64_DTPREL16_HIGHERA: r = R_PPC64_DTPREL16_HIGHERA;
1137 break;
1138 case BFD_RELOC_PPC64_DTPREL16_HIGHEST: r = R_PPC64_DTPREL16_HIGHEST;
1139 break;
1140 case BFD_RELOC_PPC64_DTPREL16_HIGHESTA: r = R_PPC64_DTPREL16_HIGHESTA;
1141 break;
25f23106
AM
1142 case BFD_RELOC_16_PCREL: r = R_PPC64_REL16;
1143 break;
1144 case BFD_RELOC_LO16_PCREL: r = R_PPC64_REL16_LO;
1145 break;
1146 case BFD_RELOC_HI16_PCREL: r = R_PPC64_REL16_HI;
1147 break;
1148 case BFD_RELOC_HI16_S_PCREL: r = R_PPC64_REL16_HA;
1149 break;
4a969973
AM
1150 case BFD_RELOC_PPC64_REL16_HIGH: r = R_PPC64_REL16_HIGH;
1151 break;
1152 case BFD_RELOC_PPC64_REL16_HIGHA: r = R_PPC64_REL16_HIGHA;
1153 break;
1154 case BFD_RELOC_PPC64_REL16_HIGHER: r = R_PPC64_REL16_HIGHER;
1155 break;
1156 case BFD_RELOC_PPC64_REL16_HIGHERA: r = R_PPC64_REL16_HIGHERA;
1157 break;
1158 case BFD_RELOC_PPC64_REL16_HIGHEST: r = R_PPC64_REL16_HIGHEST;
1159 break;
1160 case BFD_RELOC_PPC64_REL16_HIGHESTA: r = R_PPC64_REL16_HIGHESTA;
1161 break;
7ba71655
AM
1162 case BFD_RELOC_PPC_16DX_HA: r = R_PPC64_16DX_HA;
1163 break;
a680de9a
PB
1164 case BFD_RELOC_PPC_REL16DX_HA: r = R_PPC64_REL16DX_HA;
1165 break;
006589cf
AM
1166 case BFD_RELOC_PPC64_ENTRY: r = R_PPC64_ENTRY;
1167 break;
45965137
AM
1168 case BFD_RELOC_PPC64_ADDR64_LOCAL: r = R_PPC64_ADDR64_LOCAL;
1169 break;
411e1bfb
AM
1170 case BFD_RELOC_VTABLE_INHERIT: r = R_PPC64_GNU_VTINHERIT;
1171 break;
1172 case BFD_RELOC_VTABLE_ENTRY: r = R_PPC64_GNU_VTENTRY;
5bd4f169
AM
1173 break;
1174 }
1175
4ce794b7 1176 return ppc64_elf_howto_table[r];
5bd4f169
AM
1177};
1178
157090f7
AM
1179static reloc_howto_type *
1180ppc64_elf_reloc_name_lookup (bfd *abfd ATTRIBUTE_UNUSED,
1181 const char *r_name)
1182{
1183 unsigned int i;
1184
a4b6fadd 1185 for (i = 0; i < ARRAY_SIZE (ppc64_elf_howto_raw); i++)
157090f7
AM
1186 if (ppc64_elf_howto_raw[i].name != NULL
1187 && strcasecmp (ppc64_elf_howto_raw[i].name, r_name) == 0)
1188 return &ppc64_elf_howto_raw[i];
1189
1190 return NULL;
1191}
1192
5bd4f169
AM
1193/* Set the howto pointer for a PowerPC ELF reloc. */
1194
f3185997 1195static bfd_boolean
4aef7643 1196ppc64_elf_info_to_howto (bfd *abfd, arelent *cache_ptr,
4ce794b7 1197 Elf_Internal_Rela *dst)
5bd4f169 1198{
65f38f15
AM
1199 unsigned int type;
1200
ef60b7ff 1201 /* Initialize howto table if needed. */
5bd4f169 1202 if (!ppc64_elf_howto_table[R_PPC64_ADDR32])
5bd4f169
AM
1203 ppc_howto_init ();
1204
65f38f15 1205 type = ELF64_R_TYPE (dst->r_info);
a4b6fadd 1206 if (type >= ARRAY_SIZE (ppc64_elf_howto_table))
d0fb9a8d 1207 {
695344c0 1208 /* xgettext:c-format */
0aa13fee 1209 _bfd_error_handler (_("%pB: unsupported relocation type %#x"),
cf97bcb0 1210 abfd, type);
f3185997
NC
1211 bfd_set_error (bfd_error_bad_value);
1212 return FALSE;
d0fb9a8d 1213 }
65f38f15 1214 cache_ptr->howto = ppc64_elf_howto_table[type];
f3185997
NC
1215 if (cache_ptr->howto == NULL || cache_ptr->howto->name == NULL)
1216 {
1217 /* xgettext:c-format */
1218 _bfd_error_handler (_("%pB: unsupported relocation type %#x"),
1219 abfd, type);
1220 bfd_set_error (bfd_error_bad_value);
1221 return FALSE;
1222 }
2cdcc330 1223
f3185997 1224 return TRUE;
5bd4f169
AM
1225}
1226
04c9666a 1227/* Handle the R_PPC64_ADDR16_HA and similar relocs. */
5bd4f169
AM
1228
1229static bfd_reloc_status_type
4ce794b7
AM
1230ppc64_elf_ha_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
1231 void *data, asection *input_section,
1232 bfd *output_bfd, char **error_message)
5bd4f169 1233{
a680de9a
PB
1234 enum elf_ppc64_reloc_type r_type;
1235 long insn;
1236 bfd_size_type octets;
3de43e7b 1237 bfd_vma value;
a680de9a 1238
805fc799
AM
1239 /* If this is a relocatable link (output_bfd test tells us), just
1240 call the generic function. Any adjustment will be done at final
1241 link time. */
1242 if (output_bfd != NULL)
cedb70c5 1243 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
805fc799
AM
1244 input_section, output_bfd, error_message);
1245
1246 /* Adjust the addend for sign extension of the low 16 bits.
1247 We won't actually be using the low 16 bits, so trashing them
1248 doesn't matter. */
1249 reloc_entry->addend += 0x8000;
a680de9a
PB
1250 r_type = reloc_entry->howto->type;
1251 if (r_type != R_PPC64_REL16DX_HA)
1252 return bfd_reloc_continue;
1253
1254 value = 0;
1255 if (!bfd_is_com_section (symbol->section))
1256 value = symbol->value;
1257 value += (reloc_entry->addend
1258 + symbol->section->output_offset
1259 + symbol->section->output_section->vma);
1260 value -= (reloc_entry->address
1261 + input_section->output_offset
1262 + input_section->output_section->vma);
3de43e7b 1263 value = (bfd_signed_vma) value >> 16;
a680de9a
PB
1264
1265 octets = reloc_entry->address * bfd_octets_per_byte (abfd);
1266 insn = bfd_get_32 (abfd, (bfd_byte *) data + octets);
1267 insn &= ~0x1fffc1;
3de43e7b 1268 insn |= (value & 0xffc1) | ((value & 0x3e) << 15);
a680de9a 1269 bfd_put_32 (abfd, insn, (bfd_byte *) data + octets);
3de43e7b 1270 if (value + 0x8000 > 0xffff)
a680de9a
PB
1271 return bfd_reloc_overflow;
1272 return bfd_reloc_ok;
805fc799 1273}
5bd4f169 1274
2441e016
AM
1275static bfd_reloc_status_type
1276ppc64_elf_branch_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
1277 void *data, asection *input_section,
1278 bfd *output_bfd, char **error_message)
1279{
1280 if (output_bfd != NULL)
1281 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
1282 input_section, output_bfd, error_message);
1283
699733f6
AM
1284 if (strcmp (symbol->section->name, ".opd") == 0
1285 && (symbol->section->owner->flags & DYNAMIC) == 0)
2441e016
AM
1286 {
1287 bfd_vma dest = opd_entry_value (symbol->section,
1288 symbol->value + reloc_entry->addend,
aef36ac1 1289 NULL, NULL, FALSE);
2441e016
AM
1290 if (dest != (bfd_vma) -1)
1291 reloc_entry->addend = dest - (symbol->value
1292 + symbol->section->output_section->vma
1293 + symbol->section->output_offset);
1294 }
810d4e75
AM
1295 else
1296 {
1297 elf_symbol_type *elfsym = (elf_symbol_type *) symbol;
1298
1299 if (symbol->section->owner != abfd
9f284bf9 1300 && symbol->section->owner != NULL
810d4e75
AM
1301 && abiversion (symbol->section->owner) >= 2)
1302 {
1303 unsigned int i;
1304
1305 for (i = 0; i < symbol->section->owner->symcount; ++i)
1306 {
1307 asymbol *symdef = symbol->section->owner->outsymbols[i];
1308
1309 if (strcmp (symdef->name, symbol->name) == 0)
1310 {
1311 elfsym = (elf_symbol_type *) symdef;
1312 break;
1313 }
1314 }
1315 }
1316 reloc_entry->addend
1317 += PPC64_LOCAL_ENTRY_OFFSET (elfsym->internal_elf_sym.st_other);
1318 }
2441e016
AM
1319 return bfd_reloc_continue;
1320}
1321
805fc799 1322static bfd_reloc_status_type
4ce794b7
AM
1323ppc64_elf_brtaken_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
1324 void *data, asection *input_section,
1325 bfd *output_bfd, char **error_message)
805fc799
AM
1326{
1327 long insn;
04c9666a 1328 enum elf_ppc64_reloc_type r_type;
805fc799 1329 bfd_size_type octets;
794e51c0
AM
1330 /* Assume 'at' branch hints. */
1331 bfd_boolean is_isa_v2 = TRUE;
805fc799
AM
1332
1333 /* If this is a relocatable link (output_bfd test tells us), just
1334 call the generic function. Any adjustment will be done at final
1335 link time. */
5bd4f169 1336 if (output_bfd != NULL)
cedb70c5 1337 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
805fc799
AM
1338 input_section, output_bfd, error_message);
1339
1340 octets = reloc_entry->address * bfd_octets_per_byte (abfd);
1341 insn = bfd_get_32 (abfd, (bfd_byte *) data + octets);
1342 insn &= ~(0x01 << 21);
4ce794b7 1343 r_type = reloc_entry->howto->type;
805fc799
AM
1344 if (r_type == R_PPC64_ADDR14_BRTAKEN
1345 || r_type == R_PPC64_REL14_BRTAKEN)
cedb70c5 1346 insn |= 0x01 << 21; /* 'y' or 't' bit, lowest bit of BO field. */
805fc799 1347
794e51c0 1348 if (is_isa_v2)
5bd4f169 1349 {
805fc799
AM
1350 /* Set 'a' bit. This is 0b00010 in BO field for branch
1351 on CR(BI) insns (BO == 001at or 011at), and 0b01000
1352 for branch on CTR insns (BO == 1a00t or 1a01t). */
1353 if ((insn & (0x14 << 21)) == (0x04 << 21))
1354 insn |= 0x02 << 21;
1355 else if ((insn & (0x14 << 21)) == (0x10 << 21))
1356 insn |= 0x08 << 21;
1357 else
2441e016 1358 goto out;
5bd4f169 1359 }
805fc799
AM
1360 else
1361 {
1362 bfd_vma target = 0;
1363 bfd_vma from;
5bd4f169 1364
805fc799
AM
1365 if (!bfd_is_com_section (symbol->section))
1366 target = symbol->value;
1367 target += symbol->section->output_section->vma;
1368 target += symbol->section->output_offset;
1369 target += reloc_entry->addend;
5bd4f169 1370
805fc799
AM
1371 from = (reloc_entry->address
1372 + input_section->output_offset
1373 + input_section->output_section->vma);
5bd4f169 1374
805fc799
AM
1375 /* Invert 'y' bit if not the default. */
1376 if ((bfd_signed_vma) (target - from) < 0)
1377 insn ^= 0x01 << 21;
1378 }
4ce794b7 1379 bfd_put_32 (abfd, insn, (bfd_byte *) data + octets);
2441e016
AM
1380 out:
1381 return ppc64_elf_branch_reloc (abfd, reloc_entry, symbol, data,
1382 input_section, output_bfd, error_message);
805fc799 1383}
5bd4f169 1384
805fc799 1385static bfd_reloc_status_type
4ce794b7
AM
1386ppc64_elf_sectoff_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
1387 void *data, asection *input_section,
1388 bfd *output_bfd, char **error_message)
805fc799
AM
1389{
1390 /* If this is a relocatable link (output_bfd test tells us), just
1391 call the generic function. Any adjustment will be done at final
1392 link time. */
1393 if (output_bfd != NULL)
cedb70c5 1394 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
805fc799 1395 input_section, output_bfd, error_message);
5bd4f169 1396
805fc799
AM
1397 /* Subtract the symbol section base address. */
1398 reloc_entry->addend -= symbol->section->output_section->vma;
5bd4f169
AM
1399 return bfd_reloc_continue;
1400}
1401
805fc799 1402static bfd_reloc_status_type
4ce794b7
AM
1403ppc64_elf_sectoff_ha_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
1404 void *data, asection *input_section,
1405 bfd *output_bfd, char **error_message)
805fc799
AM
1406{
1407 /* If this is a relocatable link (output_bfd test tells us), just
1408 call the generic function. Any adjustment will be done at final
1409 link time. */
1410 if (output_bfd != NULL)
cedb70c5 1411 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
805fc799
AM
1412 input_section, output_bfd, error_message);
1413
1414 /* Subtract the symbol section base address. */
1415 reloc_entry->addend -= symbol->section->output_section->vma;
1416
1417 /* Adjust the addend for sign extension of the low 16 bits. */
1418 reloc_entry->addend += 0x8000;
1419 return bfd_reloc_continue;
1420}
1421
1422static bfd_reloc_status_type
4ce794b7
AM
1423ppc64_elf_toc_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
1424 void *data, asection *input_section,
1425 bfd *output_bfd, char **error_message)
805fc799
AM
1426{
1427 bfd_vma TOCstart;
1428
1429 /* If this is a relocatable link (output_bfd test tells us), just
1430 call the generic function. Any adjustment will be done at final
1431 link time. */
1432 if (output_bfd != NULL)
cedb70c5 1433 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
805fc799
AM
1434 input_section, output_bfd, error_message);
1435
1436 TOCstart = _bfd_get_gp_value (input_section->output_section->owner);
1437 if (TOCstart == 0)
1c865ab2 1438 TOCstart = ppc64_elf_set_toc (NULL, input_section->output_section->owner);
805fc799
AM
1439
1440 /* Subtract the TOC base address. */
1441 reloc_entry->addend -= TOCstart + TOC_BASE_OFF;
1442 return bfd_reloc_continue;
1443}
1444
1445static bfd_reloc_status_type
4ce794b7
AM
1446ppc64_elf_toc_ha_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
1447 void *data, asection *input_section,
1448 bfd *output_bfd, char **error_message)
805fc799
AM
1449{
1450 bfd_vma TOCstart;
1451
1452 /* If this is a relocatable link (output_bfd test tells us), just
1453 call the generic function. Any adjustment will be done at final
1454 link time. */
1455 if (output_bfd != NULL)
cedb70c5 1456 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
805fc799
AM
1457 input_section, output_bfd, error_message);
1458
1459 TOCstart = _bfd_get_gp_value (input_section->output_section->owner);
1460 if (TOCstart == 0)
1c865ab2 1461 TOCstart = ppc64_elf_set_toc (NULL, input_section->output_section->owner);
805fc799
AM
1462
1463 /* Subtract the TOC base address. */
1464 reloc_entry->addend -= TOCstart + TOC_BASE_OFF;
1465
1466 /* Adjust the addend for sign extension of the low 16 bits. */
1467 reloc_entry->addend += 0x8000;
1468 return bfd_reloc_continue;
1469}
1470
1471static bfd_reloc_status_type
4ce794b7
AM
1472ppc64_elf_toc64_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
1473 void *data, asection *input_section,
1474 bfd *output_bfd, char **error_message)
805fc799
AM
1475{
1476 bfd_vma TOCstart;
1477 bfd_size_type octets;
1478
1479 /* If this is a relocatable link (output_bfd test tells us), just
1480 call the generic function. Any adjustment will be done at final
1481 link time. */
1482 if (output_bfd != NULL)
cedb70c5 1483 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
805fc799
AM
1484 input_section, output_bfd, error_message);
1485
1486 TOCstart = _bfd_get_gp_value (input_section->output_section->owner);
1487 if (TOCstart == 0)
1c865ab2 1488 TOCstart = ppc64_elf_set_toc (NULL, input_section->output_section->owner);
805fc799
AM
1489
1490 octets = reloc_entry->address * bfd_octets_per_byte (abfd);
1491 bfd_put_64 (abfd, TOCstart + TOC_BASE_OFF, (bfd_byte *) data + octets);
1492 return bfd_reloc_ok;
1493}
1494
1495static bfd_reloc_status_type
4ce794b7
AM
1496ppc64_elf_unhandled_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
1497 void *data, asection *input_section,
1498 bfd *output_bfd, char **error_message)
805fc799
AM
1499{
1500 /* If this is a relocatable link (output_bfd test tells us), just
1501 call the generic function. Any adjustment will be done at final
1502 link time. */
1503 if (output_bfd != NULL)
cedb70c5 1504 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
805fc799
AM
1505 input_section, output_bfd, error_message);
1506
1507 if (error_message != NULL)
1508 {
1509 static char buf[60];
1510 sprintf (buf, "generic linker can't handle %s",
1511 reloc_entry->howto->name);
1512 *error_message = buf;
1513 }
1514 return bfd_reloc_dangerous;
1515}
1516
927be08e
AM
1517/* Track GOT entries needed for a given symbol. We might need more
1518 than one got entry per symbol. */
1519struct got_entry
1520{
1521 struct got_entry *next;
1522
1523 /* The symbol addend that we'll be placing in the GOT. */
1524 bfd_vma addend;
1525
1526 /* Unlike other ELF targets, we use separate GOT entries for the same
1527 symbol referenced from different input files. This is to support
1528 automatic multiple TOC/GOT sections, where the TOC base can vary
1529 from one input file to another. After partitioning into TOC groups
1530 we merge entries within the group.
1531
1532 Point to the BFD owning this GOT entry. */
1533 bfd *owner;
1534
1535 /* Zero for non-tls entries, or TLS_TLS and one of TLS_GD, TLS_LD,
1536 TLS_TPREL or TLS_DTPREL for tls entries. */
f961d9dd 1537 unsigned char tls_type;
927be08e
AM
1538
1539 /* Non-zero if got.ent points to real entry. */
f961d9dd 1540 unsigned char is_indirect;
927be08e
AM
1541
1542 /* Reference count until size_dynamic_sections, GOT offset thereafter. */
1543 union
2cdcc330
AM
1544 {
1545 bfd_signed_vma refcount;
1546 bfd_vma offset;
1547 struct got_entry *ent;
1548 } got;
927be08e
AM
1549};
1550
1551/* The same for PLT. */
1552struct plt_entry
1553{
1554 struct plt_entry *next;
1555
1556 bfd_vma addend;
1557
1558 union
2cdcc330
AM
1559 {
1560 bfd_signed_vma refcount;
1561 bfd_vma offset;
1562 } plt;
927be08e
AM
1563};
1564
e717da7e
AM
1565struct ppc64_elf_obj_tdata
1566{
1567 struct elf_obj_tdata elf;
1568
1569 /* Shortcuts to dynamic linker sections. */
1570 asection *got;
1571 asection *relgot;
1572
b3fac117
AM
1573 /* Used during garbage collection. We attach global symbols defined
1574 on removed .opd entries to this section so that the sym is removed. */
1575 asection *deleted_section;
81688140 1576
927be08e 1577 /* TLS local dynamic got entry handling. Support for multiple GOT
e717da7e 1578 sections means we potentially need one of these for each input bfd. */
927be08e 1579 struct got_entry tlsld_got;
8860955f 1580
2cdcc330
AM
1581 union
1582 {
729eabd5
AM
1583 /* A copy of relocs before they are modified for --emit-relocs. */
1584 Elf_Internal_Rela *relocs;
1585
1586 /* Section contents. */
1587 bfd_byte *contents;
1588 } opd;
d77c8a4b
AM
1589
1590 /* Nonzero if this bfd has small toc/got relocs, ie. that expect
1591 the reloc to be in the range -32768 to 32767. */
98528052
AM
1592 unsigned int has_small_toc_reloc : 1;
1593
560c8763
AM
1594 /* Set if toc/got ha relocs detected not using r2, or lo reloc
1595 instruction not one we handle. */
1596 unsigned int unexpected_toc_insn : 1;
e717da7e
AM
1597};
1598
1599#define ppc64_elf_tdata(bfd) \
1600 ((struct ppc64_elf_obj_tdata *) (bfd)->tdata.any)
1601
1602#define ppc64_tlsld_got(bfd) \
1603 (&ppc64_elf_tdata (bfd)->tlsld_got)
1604
0c8d6e5c
AM
1605#define is_ppc64_elf(bfd) \
1606 (bfd_get_flavour (bfd) == bfd_target_elf_flavour \
4dfe6ac6 1607 && elf_object_id (bfd) == PPC64_ELF_DATA)
0c8d6e5c 1608
e717da7e
AM
1609/* Override the generic function because we store some extras. */
1610
1611static bfd_boolean
1612ppc64_elf_mkobject (bfd *abfd)
1613{
0ffa91dd 1614 return bfd_elf_allocate_object (abfd, sizeof (struct ppc64_elf_obj_tdata),
4dfe6ac6 1615 PPC64_ELF_DATA);
e717da7e
AM
1616}
1617
feee612b 1618/* Fix bad default arch selected for a 64 bit input bfd when the
14b57c7c 1619 default is 32 bit. Also select arch based on apuinfo. */
feee612b 1620
b34976b6 1621static bfd_boolean
4ce794b7 1622ppc64_elf_object_p (bfd *abfd)
feee612b 1623{
14b57c7c
AM
1624 if (!abfd->arch_info->the_default)
1625 return TRUE;
1626
1627 if (abfd->arch_info->bits_per_word == 32)
feee612b
AM
1628 {
1629 Elf_Internal_Ehdr *i_ehdr = elf_elfheader (abfd);
1630
1631 if (i_ehdr->e_ident[EI_CLASS] == ELFCLASS64)
1632 {
1633 /* Relies on arch after 32 bit default being 64 bit default. */
1634 abfd->arch_info = abfd->arch_info->next;
1635 BFD_ASSERT (abfd->arch_info->bits_per_word == 64);
1636 }
1637 }
14b57c7c 1638 return _bfd_elf_ppc_set_arch (abfd);
feee612b
AM
1639}
1640
d37c89e5
AM
1641/* Support for core dump NOTE sections. */
1642
1643static bfd_boolean
1644ppc64_elf_grok_prstatus (bfd *abfd, Elf_Internal_Note *note)
1645{
eea6121a 1646 size_t offset, size;
d37c89e5
AM
1647
1648 if (note->descsz != 504)
1649 return FALSE;
1650
1651 /* pr_cursig */
228e534f 1652 elf_tdata (abfd)->core->signal = bfd_get_16 (abfd, note->descdata + 12);
d37c89e5
AM
1653
1654 /* pr_pid */
228e534f 1655 elf_tdata (abfd)->core->lwpid = bfd_get_32 (abfd, note->descdata + 32);
d37c89e5
AM
1656
1657 /* pr_reg */
1658 offset = 112;
eea6121a 1659 size = 384;
d37c89e5
AM
1660
1661 /* Make a ".reg/999" section. */
1662 return _bfd_elfcore_make_pseudosection (abfd, ".reg",
eea6121a 1663 size, note->descpos + offset);
d37c89e5
AM
1664}
1665
1666static bfd_boolean
1667ppc64_elf_grok_psinfo (bfd *abfd, Elf_Internal_Note *note)
1668{
1669 if (note->descsz != 136)
1670 return FALSE;
1671
228e534f 1672 elf_tdata (abfd)->core->pid
bc989cdc 1673 = bfd_get_32 (abfd, note->descdata + 24);
228e534f 1674 elf_tdata (abfd)->core->program
d37c89e5 1675 = _bfd_elfcore_strndup (abfd, note->descdata + 40, 16);
228e534f 1676 elf_tdata (abfd)->core->command
d37c89e5
AM
1677 = _bfd_elfcore_strndup (abfd, note->descdata + 56, 80);
1678
1679 return TRUE;
1680}
1681
183e98be
AM
1682static char *
1683ppc64_elf_write_core_note (bfd *abfd, char *buf, int *bufsiz, int note_type,
1684 ...)
1685{
1686 switch (note_type)
1687 {
1688 default:
1689 return NULL;
1690
1691 case NT_PRPSINFO:
1692 {
9ef6d1e3 1693 char data[136] ATTRIBUTE_NONSTRING;
183e98be
AM
1694 va_list ap;
1695
1696 va_start (ap, note_type);
75cd47ed 1697 memset (data, 0, sizeof (data));
183e98be 1698 strncpy (data + 40, va_arg (ap, const char *), 16);
be3e27bb 1699#if GCC_VERSION == 8000 || GCC_VERSION == 8001
95da9854 1700 DIAGNOSTIC_PUSH;
be3e27bb 1701 /* GCC 8.0 and 8.1 warn about 80 equals destination size with
95da9854
L
1702 -Wstringop-truncation:
1703 https://gcc.gnu.org/bugzilla/show_bug.cgi?id=85643
1704 */
95da9854
L
1705 DIAGNOSTIC_IGNORE_STRINGOP_TRUNCATION;
1706#endif
183e98be 1707 strncpy (data + 56, va_arg (ap, const char *), 80);
be3e27bb 1708#if GCC_VERSION == 8000 || GCC_VERSION == 8001
95da9854 1709 DIAGNOSTIC_POP;
fe75810f 1710#endif
183e98be
AM
1711 va_end (ap);
1712 return elfcore_write_note (abfd, buf, bufsiz,
1713 "CORE", note_type, data, sizeof (data));
1714 }
1715
1716 case NT_PRSTATUS:
1717 {
1718 char data[504];
1719 va_list ap;
1720 long pid;
1721 int cursig;
1722 const void *greg;
1723
1724 va_start (ap, note_type);
1725 memset (data, 0, 112);
1726 pid = va_arg (ap, long);
1727 bfd_put_32 (abfd, pid, data + 32);
1728 cursig = va_arg (ap, int);
1729 bfd_put_16 (abfd, cursig, data + 12);
1730 greg = va_arg (ap, const void *);
1731 memcpy (data + 112, greg, 384);
1732 memset (data + 496, 0, 8);
1733 va_end (ap);
1734 return elfcore_write_note (abfd, buf, bufsiz,
1735 "CORE", note_type, data, sizeof (data));
1736 }
1737 }
1738}
1739
5d35169e
AM
1740/* Add extra PPC sections. */
1741
2cdcc330 1742static const struct bfd_elf_special_section ppc64_elf_special_sections[] =
7f4d3958 1743{
07d6d2b8
AM
1744 { STRING_COMMA_LEN (".plt"), 0, SHT_NOBITS, 0 },
1745 { STRING_COMMA_LEN (".sbss"), -2, SHT_NOBITS, SHF_ALLOC + SHF_WRITE },
0112cd26 1746 { STRING_COMMA_LEN (".sdata"), -2, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE },
07d6d2b8
AM
1747 { STRING_COMMA_LEN (".toc"), 0, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE },
1748 { STRING_COMMA_LEN (".toc1"), 0, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE },
0112cd26 1749 { STRING_COMMA_LEN (".tocbss"), 0, SHT_NOBITS, SHF_ALLOC + SHF_WRITE },
07d6d2b8 1750 { NULL, 0, 0, 0, 0 }
5d35169e
AM
1751};
1752
7c8fe5c4
AM
1753enum _ppc64_sec_type {
1754 sec_normal = 0,
1755 sec_opd = 1,
1756 sec_toc = 2
1757};
1758
f0abc2a1
AM
1759struct _ppc64_elf_section_data
1760{
1761 struct bfd_elf_section_data elf;
411e1bfb 1762
f0abc2a1
AM
1763 union
1764 {
51aecdc5
AM
1765 /* An array with one entry for each opd function descriptor,
1766 and some spares since opd entries may be either 16 or 24 bytes. */
1767#define OPD_NDX(OFF) ((OFF) >> 4)
74f0fb50
AM
1768 struct _opd_sec_data
1769 {
1770 /* Points to the function code section for local opd entries. */
1771 asection **func_sec;
1772
1773 /* After editing .opd, adjust references to opd local syms. */
1774 long *adjust;
1775 } opd;
7c8fe5c4 1776
3a71aa26
AM
1777 /* An array for toc sections, indexed by offset/8. */
1778 struct _toc_sec_data
1779 {
1780 /* Specifies the relocation symbol index used at a given toc offset. */
1781 unsigned *symndx;
1782
1783 /* And the relocation addend. */
1784 bfd_vma *add;
1785 } toc;
7c8fe5c4
AM
1786 } u;
1787
1788 enum _ppc64_sec_type sec_type:2;
411e1bfb 1789
7c8fe5c4
AM
1790 /* Flag set when small branches are detected. Used to
1791 select suitable defaults for the stub group size. */
1792 unsigned int has_14bit_branch:1;
3e04d765
AM
1793
1794 /* Flag set when PLTCALL relocs are detected. */
1795 unsigned int has_pltcall:1;
f0abc2a1
AM
1796};
1797
1798#define ppc64_elf_section_data(sec) \
411e1bfb 1799 ((struct _ppc64_elf_section_data *) elf_section_data (sec))
f0abc2a1
AM
1800
1801static bfd_boolean
4ce794b7 1802ppc64_elf_new_section_hook (bfd *abfd, asection *sec)
f0abc2a1 1803{
f592407e
AM
1804 if (!sec->used_by_bfd)
1805 {
1806 struct _ppc64_elf_section_data *sdata;
1807 bfd_size_type amt = sizeof (*sdata);
f0abc2a1 1808
f592407e
AM
1809 sdata = bfd_zalloc (abfd, amt);
1810 if (sdata == NULL)
1811 return FALSE;
1812 sec->used_by_bfd = sdata;
1813 }
f0abc2a1
AM
1814
1815 return _bfd_elf_new_section_hook (abfd, sec);
1816}
4025353c 1817
74f0fb50 1818static struct _opd_sec_data *
4025353c
AM
1819get_opd_info (asection * sec)
1820{
1821 if (sec != NULL
1822 && ppc64_elf_section_data (sec) != NULL
7c8fe5c4 1823 && ppc64_elf_section_data (sec)->sec_type == sec_opd)
74f0fb50 1824 return &ppc64_elf_section_data (sec)->u.opd;
4025353c
AM
1825 return NULL;
1826}
90e3cdf2
JJ
1827\f
1828/* Parameters for the qsort hook. */
90e3cdf2 1829static bfd_boolean synthetic_relocatable;
cd285db5 1830static asection *synthetic_opd;
90e3cdf2 1831
699733f6 1832/* qsort comparison function for ppc64_elf_get_synthetic_symtab. */
90e3cdf2
JJ
1833
1834static int
1835compare_symbols (const void *ap, const void *bp)
1836{
2cdcc330
AM
1837 const asymbol *a = *(const asymbol **) ap;
1838 const asymbol *b = *(const asymbol **) bp;
90e3cdf2 1839
699733f6
AM
1840 /* Section symbols first. */
1841 if ((a->flags & BSF_SECTION_SYM) && !(b->flags & BSF_SECTION_SYM))
90e3cdf2 1842 return -1;
699733f6 1843 if (!(a->flags & BSF_SECTION_SYM) && (b->flags & BSF_SECTION_SYM))
90e3cdf2
JJ
1844 return 1;
1845
699733f6 1846 /* then .opd symbols. */
cd285db5
AM
1847 if (synthetic_opd != NULL)
1848 {
1849 if (strcmp (a->section->name, ".opd") == 0
1850 && strcmp (b->section->name, ".opd") != 0)
1851 return -1;
1852 if (strcmp (a->section->name, ".opd") != 0
1853 && strcmp (b->section->name, ".opd") == 0)
1854 return 1;
1855 }
90e3cdf2 1856
699733f6 1857 /* then other code symbols. */
2cdcc330
AM
1858 if (((a->section->flags & (SEC_CODE | SEC_ALLOC | SEC_THREAD_LOCAL))
1859 == (SEC_CODE | SEC_ALLOC))
1860 && ((b->section->flags & (SEC_CODE | SEC_ALLOC | SEC_THREAD_LOCAL))
1861 != (SEC_CODE | SEC_ALLOC)))
90e3cdf2
JJ
1862 return -1;
1863
2cdcc330
AM
1864 if (((a->section->flags & (SEC_CODE | SEC_ALLOC | SEC_THREAD_LOCAL))
1865 != (SEC_CODE | SEC_ALLOC))
1866 && ((b->section->flags & (SEC_CODE | SEC_ALLOC | SEC_THREAD_LOCAL))
1867 == (SEC_CODE | SEC_ALLOC)))
90e3cdf2
JJ
1868 return 1;
1869
1870 if (synthetic_relocatable)
1871 {
1872 if (a->section->id < b->section->id)
1873 return -1;
1874
1875 if (a->section->id > b->section->id)
1876 return 1;
1877 }
1878
1879 if (a->value + a->section->vma < b->value + b->section->vma)
1880 return -1;
1881
1882 if (a->value + a->section->vma > b->value + b->section->vma)
1883 return 1;
1884
4d35a0aa
AM
1885 /* For syms with the same value, prefer strong dynamic global function
1886 syms over other syms. */
1887 if ((a->flags & BSF_GLOBAL) != 0 && (b->flags & BSF_GLOBAL) == 0)
1888 return -1;
1889
1890 if ((a->flags & BSF_GLOBAL) == 0 && (b->flags & BSF_GLOBAL) != 0)
1891 return 1;
1892
1893 if ((a->flags & BSF_FUNCTION) != 0 && (b->flags & BSF_FUNCTION) == 0)
1894 return -1;
1895
1896 if ((a->flags & BSF_FUNCTION) == 0 && (b->flags & BSF_FUNCTION) != 0)
1897 return 1;
1898
1899 if ((a->flags & BSF_WEAK) == 0 && (b->flags & BSF_WEAK) != 0)
1900 return -1;
1901
1902 if ((a->flags & BSF_WEAK) != 0 && (b->flags & BSF_WEAK) == 0)
1903 return 1;
1904
1905 if ((a->flags & BSF_DYNAMIC) != 0 && (b->flags & BSF_DYNAMIC) == 0)
1906 return -1;
1907
1908 if ((a->flags & BSF_DYNAMIC) == 0 && (b->flags & BSF_DYNAMIC) != 0)
1909 return 1;
1910
aaed6f5b 1911 return a > b;
90e3cdf2
JJ
1912}
1913
699733f6 1914/* Search SYMS for a symbol of the given VALUE. */
90e3cdf2 1915
699733f6 1916static asymbol *
7292b3ac 1917sym_exists_at (asymbol **syms, long lo, long hi, unsigned int id, bfd_vma value)
90e3cdf2 1918{
699733f6 1919 long mid;
90e3cdf2 1920
7292b3ac 1921 if (id == (unsigned) -1)
699733f6
AM
1922 {
1923 while (lo < hi)
1924 {
1925 mid = (lo + hi) >> 1;
1926 if (syms[mid]->value + syms[mid]->section->vma < value)
1927 lo = mid + 1;
1928 else if (syms[mid]->value + syms[mid]->section->vma > value)
1929 hi = mid;
1930 else
1931 return syms[mid];
1932 }
1933 }
1934 else
1935 {
1936 while (lo < hi)
1937 {
1938 mid = (lo + hi) >> 1;
1939 if (syms[mid]->section->id < id)
1940 lo = mid + 1;
1941 else if (syms[mid]->section->id > id)
1942 hi = mid;
1943 else if (syms[mid]->value < value)
1944 lo = mid + 1;
1945 else if (syms[mid]->value > value)
1946 hi = mid;
1947 else
1948 return syms[mid];
1949 }
1950 }
1951 return NULL;
90e3cdf2
JJ
1952}
1953
468392fb
AM
1954static bfd_boolean
1955section_covers_vma (bfd *abfd ATTRIBUTE_UNUSED, asection *section, void *ptr)
1956{
1957 bfd_vma vma = *(bfd_vma *) ptr;
1958 return ((section->flags & SEC_ALLOC) != 0
1959 && section->vma <= vma
1960 && vma < section->vma + section->size);
1961}
1962
699733f6 1963/* Create synthetic symbols, effectively restoring "dot-symbol" function
c4b0b099
AM
1964 entry syms. Also generate @plt symbols for the glink branch table.
1965 Returns count of synthetic symbols in RET or -1 on error. */
90e3cdf2
JJ
1966
1967static long
a7535cf3
AM
1968ppc64_elf_get_synthetic_symtab (bfd *abfd,
1969 long static_count, asymbol **static_syms,
1970 long dyn_count, asymbol **dyn_syms,
c9727e01 1971 asymbol **ret)
90e3cdf2
JJ
1972{
1973 asymbol *s;
0ccf57bd 1974 size_t i, j, count;
90e3cdf2 1975 char *names;
0ccf57bd 1976 size_t symcount, codesecsym, codesecsymend, secsymend, opdsymend;
ee67d69a 1977 asection *opd = NULL;
90e3cdf2 1978 bfd_boolean relocatable = (abfd->flags & (EXEC_P | DYNAMIC)) == 0;
a7535cf3 1979 asymbol **syms;
ee67d69a 1980 int abi = abiversion (abfd);
90e3cdf2
JJ
1981
1982 *ret = NULL;
1983
ee67d69a
AM
1984 if (abi < 2)
1985 {
1986 opd = bfd_get_section_by_name (abfd, ".opd");
1987 if (opd == NULL && abi == 1)
1988 return 0;
1989 }
90e3cdf2 1990
a5259595
AM
1991 syms = NULL;
1992 codesecsym = 0;
1993 codesecsymend = 0;
1994 secsymend = 0;
1995 opdsymend = 0;
1996 symcount = 0;
1997 if (opd != NULL)
c9727e01 1998 {
a5259595
AM
1999 symcount = static_count;
2000 if (!relocatable)
2001 symcount += dyn_count;
2002 if (symcount == 0)
2003 return 0;
c9727e01 2004
a5259595
AM
2005 syms = bfd_malloc ((symcount + 1) * sizeof (*syms));
2006 if (syms == NULL)
2007 return -1;
90e3cdf2 2008
a5259595
AM
2009 if (!relocatable && static_count != 0 && dyn_count != 0)
2010 {
2011 /* Use both symbol tables. */
2012 memcpy (syms, static_syms, static_count * sizeof (*syms));
2013 memcpy (syms + static_count, dyn_syms,
2014 (dyn_count + 1) * sizeof (*syms));
2015 }
2016 else if (!relocatable && static_count == 0)
2017 memcpy (syms, dyn_syms, (symcount + 1) * sizeof (*syms));
2018 else
2019 memcpy (syms, static_syms, (symcount + 1) * sizeof (*syms));
90e3cdf2 2020
0ccf57bd
AM
2021 /* Trim uninteresting symbols. Interesting symbols are section,
2022 function, and notype symbols. */
2023 for (i = 0, j = 0; i < symcount; ++i)
2024 if ((syms[i]->flags & (BSF_FILE | BSF_OBJECT | BSF_THREAD_LOCAL
2025 | BSF_RELC | BSF_SRELC)) == 0)
2026 syms[j++] = syms[i];
2027 symcount = j;
2028
a5259595
AM
2029 synthetic_relocatable = relocatable;
2030 synthetic_opd = opd;
2031 qsort (syms, symcount, sizeof (*syms), compare_symbols);
90e3cdf2 2032
a5259595
AM
2033 if (!relocatable && symcount > 1)
2034 {
bfa5bd2a
PA
2035 /* Trim duplicate syms, since we may have merged the normal
2036 and dynamic symbols. Actually, we only care about syms
2037 that have different values, so trim any with the same
2038 value. Don't consider ifunc and ifunc resolver symbols
2039 duplicates however, because GDB wants to know whether a
2040 text symbol is an ifunc resolver. */
a5259595 2041 for (i = 1, j = 1; i < symcount; ++i)
bfa5bd2a
PA
2042 {
2043 const asymbol *s0 = syms[i - 1];
2044 const asymbol *s1 = syms[i];
2045
2046 if ((s0->value + s0->section->vma
2047 != s1->value + s1->section->vma)
2048 || ((s0->flags & BSF_GNU_INDIRECT_FUNCTION)
2049 != (s1->flags & BSF_GNU_INDIRECT_FUNCTION)))
2050 syms[j++] = syms[i];
2051 }
a5259595
AM
2052 symcount = j;
2053 }
699733f6 2054
a5259595
AM
2055 i = 0;
2056 /* Note that here and in compare_symbols we can't compare opd and
2057 sym->section directly. With separate debug info files, the
2058 symbols will be extracted from the debug file while abfd passed
2059 to this function is the real binary. */
0ccf57bd 2060 if (strcmp (syms[i]->section->name, ".opd") == 0)
a5259595
AM
2061 ++i;
2062 codesecsym = i;
2063
2064 for (; i < symcount; ++i)
2065 if (((syms[i]->section->flags & (SEC_CODE | SEC_ALLOC
2066 | SEC_THREAD_LOCAL))
2067 != (SEC_CODE | SEC_ALLOC))
2068 || (syms[i]->flags & BSF_SECTION_SYM) == 0)
2069 break;
2070 codesecsymend = i;
2071
2072 for (; i < symcount; ++i)
2073 if ((syms[i]->flags & BSF_SECTION_SYM) == 0)
2074 break;
2075 secsymend = i;
2076
2077 for (; i < symcount; ++i)
2078 if (strcmp (syms[i]->section->name, ".opd") != 0)
2079 break;
2080 opdsymend = i;
2081
2082 for (; i < symcount; ++i)
2cdcc330
AM
2083 if (((syms[i]->section->flags
2084 & (SEC_CODE | SEC_ALLOC | SEC_THREAD_LOCAL)))
a5259595
AM
2085 != (SEC_CODE | SEC_ALLOC))
2086 break;
2087 symcount = i;
2088 }
c9727e01 2089 count = 0;
90e3cdf2 2090
699733f6 2091 if (relocatable)
90e3cdf2 2092 {
699733f6
AM
2093 bfd_boolean (*slurp_relocs) (bfd *, asection *, asymbol **, bfd_boolean);
2094 arelent *r;
2095 size_t size;
0ccf57bd 2096 size_t relcount;
90e3cdf2 2097
468392fb
AM
2098 if (opdsymend == secsymend)
2099 goto done;
2100
699733f6 2101 slurp_relocs = get_elf_backend_data (abfd)->s->slurp_reloc_table;
90e3cdf2 2102 relcount = (opd->flags & SEC_RELOC) ? opd->reloc_count : 0;
7356fed5 2103 if (relcount == 0)
c9727e01 2104 goto done;
90e3cdf2 2105
7356fed5
AM
2106 if (!(*slurp_relocs) (abfd, opd, static_syms, FALSE))
2107 {
2108 count = -1;
2109 goto done;
2110 }
2111
699733f6 2112 size = 0;
595da8c5 2113 for (i = secsymend, r = opd->relocation; i < opdsymend; ++i)
699733f6
AM
2114 {
2115 asymbol *sym;
90e3cdf2 2116
595da8c5 2117 while (r < opd->relocation + relcount
699733f6
AM
2118 && r->address < syms[i]->value + opd->vma)
2119 ++r;
90e3cdf2 2120
595da8c5 2121 if (r == opd->relocation + relcount)
699733f6 2122 break;
90e3cdf2 2123
699733f6
AM
2124 if (r->address != syms[i]->value + opd->vma)
2125 continue;
90e3cdf2 2126
699733f6
AM
2127 if (r->howto->type != R_PPC64_ADDR64)
2128 continue;
90e3cdf2 2129
699733f6
AM
2130 sym = *r->sym_ptr_ptr;
2131 if (!sym_exists_at (syms, opdsymend, symcount,
2132 sym->section->id, sym->value + r->addend))
2133 {
2134 ++count;
2135 size += sizeof (asymbol);
2136 size += strlen (syms[i]->name) + 2;
2137 }
2138 }
90e3cdf2 2139
c4b0b099
AM
2140 if (size == 0)
2141 goto done;
699733f6
AM
2142 s = *ret = bfd_malloc (size);
2143 if (s == NULL)
2144 {
7356fed5 2145 count = -1;
c9727e01 2146 goto done;
699733f6 2147 }
90e3cdf2 2148
699733f6 2149 names = (char *) (s + count);
90e3cdf2 2150
595da8c5 2151 for (i = secsymend, r = opd->relocation; i < opdsymend; ++i)
90e3cdf2 2152 {
699733f6 2153 asymbol *sym;
90e3cdf2 2154
595da8c5 2155 while (r < opd->relocation + relcount
699733f6
AM
2156 && r->address < syms[i]->value + opd->vma)
2157 ++r;
90e3cdf2 2158
595da8c5 2159 if (r == opd->relocation + relcount)
699733f6
AM
2160 break;
2161
2162 if (r->address != syms[i]->value + opd->vma)
2163 continue;
2164
2165 if (r->howto->type != R_PPC64_ADDR64)
2166 continue;
90e3cdf2 2167
699733f6
AM
2168 sym = *r->sym_ptr_ptr;
2169 if (!sym_exists_at (syms, opdsymend, symcount,
2170 sym->section->id, sym->value + r->addend))
2171 {
2172 size_t len;
2173
2174 *s = *syms[i];
6ba2a415 2175 s->flags |= BSF_SYNTHETIC;
699733f6
AM
2176 s->section = sym->section;
2177 s->value = sym->value + r->addend;
2178 s->name = names;
2179 *names++ = '.';
2180 len = strlen (syms[i]->name);
2181 memcpy (names, syms[i]->name, len + 1);
2182 names += len + 1;
6f610d07
UW
2183 /* Have udata.p point back to the original symbol this
2184 synthetic symbol was derived from. */
2185 s->udata.p = syms[i];
699733f6
AM
2186 s++;
2187 }
2188 }
2189 }
2190 else
90e3cdf2 2191 {
468392fb 2192 bfd_boolean (*slurp_relocs) (bfd *, asection *, asymbol **, bfd_boolean);
ee67d69a 2193 bfd_byte *contents = NULL;
699733f6 2194 size_t size;
0ccf57bd 2195 size_t plt_count = 0;
468392fb
AM
2196 bfd_vma glink_vma = 0, resolv_vma = 0;
2197 asection *dynamic, *glink = NULL, *relplt = NULL;
2198 arelent *p;
90e3cdf2 2199
ee67d69a 2200 if (opd != NULL && !bfd_malloc_and_get_section (abfd, opd, &contents))
699733f6 2201 {
c4b0b099
AM
2202 free_contents_and_exit_err:
2203 count = -1;
ee67d69a 2204 free_contents_and_exit:
699733f6 2205 if (contents)
ee67d69a 2206 free (contents);
c9727e01 2207 goto done;
699733f6 2208 }
90e3cdf2 2209
699733f6
AM
2210 size = 0;
2211 for (i = secsymend; i < opdsymend; ++i)
2212 {
2213 bfd_vma ent;
90e3cdf2 2214
5ef11c02
AM
2215 /* Ignore bogus symbols. */
2216 if (syms[i]->value > opd->size - 8)
2217 continue;
2218
699733f6
AM
2219 ent = bfd_get_64 (abfd, contents + syms[i]->value);
2220 if (!sym_exists_at (syms, opdsymend, symcount, -1, ent))
2221 {
2222 ++count;
2223 size += sizeof (asymbol);
2224 size += strlen (syms[i]->name) + 2;
2225 }
2226 }
90e3cdf2 2227
468392fb 2228 /* Get start of .glink stubs from DT_PPC64_GLINK. */
066ee829
AM
2229 if (dyn_count != 0
2230 && (dynamic = bfd_get_section_by_name (abfd, ".dynamic")) != NULL)
468392fb
AM
2231 {
2232 bfd_byte *dynbuf, *extdyn, *extdynend;
2233 size_t extdynsize;
2234 void (*swap_dyn_in) (bfd *, const void *, Elf_Internal_Dyn *);
2235
2236 if (!bfd_malloc_and_get_section (abfd, dynamic, &dynbuf))
c4b0b099 2237 goto free_contents_and_exit_err;
468392fb
AM
2238
2239 extdynsize = get_elf_backend_data (abfd)->s->sizeof_dyn;
2240 swap_dyn_in = get_elf_backend_data (abfd)->s->swap_dyn_in;
2241
2242 extdyn = dynbuf;
2243 extdynend = extdyn + dynamic->size;
2244 for (; extdyn < extdynend; extdyn += extdynsize)
2245 {
2246 Elf_Internal_Dyn dyn;
2247 (*swap_dyn_in) (abfd, extdyn, &dyn);
2248
2249 if (dyn.d_tag == DT_NULL)
2250 break;
2251
2252 if (dyn.d_tag == DT_PPC64_GLINK)
2253 {
9e390558
AM
2254 /* The first glink stub starts at DT_PPC64_GLINK plus 32.
2255 See comment in ppc64_elf_finish_dynamic_sections. */
2256 glink_vma = dyn.d_un.d_val + 8 * 4;
468392fb
AM
2257 /* The .glink section usually does not survive the final
2258 link; search for the section (usually .text) where the
2259 glink stubs now reside. */
2260 glink = bfd_sections_find_if (abfd, section_covers_vma,
2261 &glink_vma);
2262 break;
2263 }
2264 }
2265
2266 free (dynbuf);
2267 }
2268
2269 if (glink != NULL)
2270 {
2271 /* Determine __glink trampoline by reading the relative branch
2272 from the first glink stub. */
2273 bfd_byte buf[4];
b9e5796b
AM
2274 unsigned int off = 0;
2275
2276 while (bfd_get_section_contents (abfd, glink, buf,
2277 glink_vma + off - glink->vma, 4))
468392fb
AM
2278 {
2279 unsigned int insn = bfd_get_32 (abfd, buf);
2280 insn ^= B_DOT;
2281 if ((insn & ~0x3fffffc) == 0)
b9e5796b 2282 {
2cdcc330
AM
2283 resolv_vma
2284 = glink_vma + off + (insn ^ 0x2000000) - 0x2000000;
b9e5796b
AM
2285 break;
2286 }
2287 off += 4;
2288 if (off > 4)
2289 break;
468392fb
AM
2290 }
2291
2292 if (resolv_vma)
2293 size += sizeof (asymbol) + sizeof ("__glink_PLTresolve");
468392fb 2294
066ee829
AM
2295 relplt = bfd_get_section_by_name (abfd, ".rela.plt");
2296 if (relplt != NULL)
2297 {
2298 slurp_relocs = get_elf_backend_data (abfd)->s->slurp_reloc_table;
2cdcc330 2299 if (!(*slurp_relocs) (abfd, relplt, dyn_syms, TRUE))
c4b0b099 2300 goto free_contents_and_exit_err;
68ffbac6 2301
066ee829
AM
2302 plt_count = relplt->size / sizeof (Elf64_External_Rela);
2303 size += plt_count * sizeof (asymbol);
468392fb 2304
066ee829
AM
2305 p = relplt->relocation;
2306 for (i = 0; i < plt_count; i++, p++)
e054468f
AM
2307 {
2308 size += strlen ((*p->sym_ptr_ptr)->name) + sizeof ("@plt");
2309 if (p->addend != 0)
2310 size += sizeof ("+0x") - 1 + 16;
2311 }
066ee829 2312 }
468392fb
AM
2313 }
2314
c4b0b099
AM
2315 if (size == 0)
2316 goto free_contents_and_exit;
699733f6
AM
2317 s = *ret = bfd_malloc (size);
2318 if (s == NULL)
c4b0b099 2319 goto free_contents_and_exit_err;
90e3cdf2 2320
468392fb 2321 names = (char *) (s + count + plt_count + (resolv_vma != 0));
90e3cdf2 2322
699733f6 2323 for (i = secsymend; i < opdsymend; ++i)
90e3cdf2 2324 {
699733f6 2325 bfd_vma ent;
90e3cdf2 2326
5ef11c02
AM
2327 if (syms[i]->value > opd->size - 8)
2328 continue;
2329
699733f6
AM
2330 ent = bfd_get_64 (abfd, contents + syms[i]->value);
2331 if (!sym_exists_at (syms, opdsymend, symcount, -1, ent))
90e3cdf2 2332 {
0ccf57bd 2333 size_t lo, hi;
699733f6 2334 size_t len;
c9727e01 2335 asection *sec = abfd->sections;
90e3cdf2 2336
699733f6
AM
2337 *s = *syms[i];
2338 lo = codesecsym;
2339 hi = codesecsymend;
2340 while (lo < hi)
2341 {
0ccf57bd 2342 size_t mid = (lo + hi) >> 1;
699733f6
AM
2343 if (syms[mid]->section->vma < ent)
2344 lo = mid + 1;
2345 else if (syms[mid]->section->vma > ent)
2346 hi = mid;
2347 else
c9727e01
AM
2348 {
2349 sec = syms[mid]->section;
2350 break;
2351 }
699733f6
AM
2352 }
2353
c9727e01 2354 if (lo >= hi && lo > codesecsym)
699733f6 2355 sec = syms[lo - 1]->section;
699733f6
AM
2356
2357 for (; sec != NULL; sec = sec->next)
2358 {
2359 if (sec->vma > ent)
2360 break;
63524580
JK
2361 /* SEC_LOAD may not be set if SEC is from a separate debug
2362 info file. */
2363 if ((sec->flags & SEC_ALLOC) == 0)
699733f6
AM
2364 break;
2365 if ((sec->flags & SEC_CODE) != 0)
2366 s->section = sec;
2367 }
6ba2a415 2368 s->flags |= BSF_SYNTHETIC;
699733f6
AM
2369 s->value = ent - s->section->vma;
2370 s->name = names;
2371 *names++ = '.';
2372 len = strlen (syms[i]->name);
2373 memcpy (names, syms[i]->name, len + 1);
2374 names += len + 1;
6f610d07
UW
2375 /* Have udata.p point back to the original symbol this
2376 synthetic symbol was derived from. */
2377 s->udata.p = syms[i];
699733f6 2378 s++;
90e3cdf2 2379 }
90e3cdf2 2380 }
699733f6 2381 free (contents);
468392fb
AM
2382
2383 if (glink != NULL && relplt != NULL)
2384 {
2385 if (resolv_vma)
2386 {
2387 /* Add a symbol for the main glink trampoline. */
86a4952b 2388 memset (s, 0, sizeof *s);
468392fb 2389 s->the_bfd = abfd;
6ba2a415 2390 s->flags = BSF_GLOBAL | BSF_SYNTHETIC;
468392fb
AM
2391 s->section = glink;
2392 s->value = resolv_vma - glink->vma;
2393 s->name = names;
2cdcc330
AM
2394 memcpy (names, "__glink_PLTresolve",
2395 sizeof ("__glink_PLTresolve"));
468392fb
AM
2396 names += sizeof ("__glink_PLTresolve");
2397 s++;
2398 count++;
2399 }
2400
2401 /* FIXME: It would be very much nicer to put sym@plt on the
2402 stub rather than on the glink branch table entry. The
2403 objdump disassembler would then use a sensible symbol
2404 name on plt calls. The difficulty in doing so is
2405 a) finding the stubs, and,
2406 b) matching stubs against plt entries, and,
2407 c) there can be multiple stubs for a given plt entry.
2408
2409 Solving (a) could be done by code scanning, but older
2410 ppc64 binaries used different stubs to current code.
2411 (b) is the tricky one since you need to known the toc
2412 pointer for at least one function that uses a pic stub to
2413 be able to calculate the plt address referenced.
2414 (c) means gdb would need to set multiple breakpoints (or
2415 find the glink branch itself) when setting breakpoints
2416 for pending shared library loads. */
2417 p = relplt->relocation;
2418 for (i = 0; i < plt_count; i++, p++)
2419 {
2420 size_t len;
2421
2422 *s = **p->sym_ptr_ptr;
2423 /* Undefined syms won't have BSF_LOCAL or BSF_GLOBAL set. Since
2424 we are defining a symbol, ensure one of them is set. */
2425 if ((s->flags & BSF_LOCAL) == 0)
2426 s->flags |= BSF_GLOBAL;
6ba2a415 2427 s->flags |= BSF_SYNTHETIC;
468392fb
AM
2428 s->section = glink;
2429 s->value = glink_vma - glink->vma;
2430 s->name = names;
2431 s->udata.p = NULL;
2432 len = strlen ((*p->sym_ptr_ptr)->name);
2433 memcpy (names, (*p->sym_ptr_ptr)->name, len);
2434 names += len;
e054468f
AM
2435 if (p->addend != 0)
2436 {
2437 memcpy (names, "+0x", sizeof ("+0x") - 1);
2438 names += sizeof ("+0x") - 1;
2439 bfd_sprintf_vma (abfd, names, p->addend);
2440 names += strlen (names);
2441 }
468392fb
AM
2442 memcpy (names, "@plt", sizeof ("@plt"));
2443 names += sizeof ("@plt");
2444 s++;
b9e5796b
AM
2445 if (abi < 2)
2446 {
2447 glink_vma += 8;
2448 if (i >= 0x8000)
2449 glink_vma += 4;
2450 }
2451 else
468392fb
AM
2452 glink_vma += 4;
2453 }
2454 count += plt_count;
2455 }
90e3cdf2
JJ
2456 }
2457
c9727e01 2458 done:
a7535cf3 2459 free (syms);
90e3cdf2
JJ
2460 return count;
2461}
5bd4f169 2462\f
65f38f15
AM
2463/* The following functions are specific to the ELF linker, while
2464 functions above are used generally. Those named ppc64_elf_* are
2465 called by the main ELF linker code. They appear in this file more
2466 or less in the order in which they are called. eg.
2467 ppc64_elf_check_relocs is called early in the link process,
2468 ppc64_elf_finish_dynamic_sections is one of the last functions
e86ce104
AM
2469 called.
2470
2471 PowerPC64-ELF uses a similar scheme to PowerPC64-XCOFF in that
2472 functions have both a function code symbol and a function descriptor
2473 symbol. A call to foo in a relocatable object file looks like:
2474
2475 . .text
2476 . x:
2477 . bl .foo
2478 . nop
2479
2480 The function definition in another object file might be:
2481
2482 . .section .opd
2483 . foo: .quad .foo
2484 . .quad .TOC.@tocbase
2485 . .quad 0
2486 .
2487 . .text
2488 . .foo: blr
2489
2490 When the linker resolves the call during a static link, the branch
2491 unsurprisingly just goes to .foo and the .opd information is unused.
2492 If the function definition is in a shared library, things are a little
2493 different: The call goes via a plt call stub, the opd information gets
2494 copied to the plt, and the linker patches the nop.
2495
2496 . x:
2497 . bl .foo_stub
2498 . ld 2,40(1)
2499 .
2500 .
2501 . .foo_stub:
71a39c98
AM
2502 . std 2,40(1) # in practice, the call stub
2503 . addis 11,2,Lfoo@toc@ha # is slightly optimized, but
2504 . addi 11,11,Lfoo@toc@l # this is the general idea
2505 . ld 12,0(11)
2506 . ld 2,8(11)
2507 . mtctr 12
2508 . ld 11,16(11)
e86ce104
AM
2509 . bctr
2510 .
2511 . .section .plt
2512 . Lfoo: reloc (R_PPC64_JMP_SLOT, foo)
2513
2514 The "reloc ()" notation is supposed to indicate that the linker emits
2515 an R_PPC64_JMP_SLOT reloc against foo. The dynamic linker does the opd
2516 copying.
2517
2518 What are the difficulties here? Well, firstly, the relocations
2519 examined by the linker in check_relocs are against the function code
2520 sym .foo, while the dynamic relocation in the plt is emitted against
2521 the function descriptor symbol, foo. Somewhere along the line, we need
2522 to carefully copy dynamic link information from one symbol to the other.
2523 Secondly, the generic part of the elf linker will make .foo a dynamic
2524 symbol as is normal for most other backends. We need foo dynamic
2525 instead, at least for an application final link. However, when
2526 creating a shared library containing foo, we need to have both symbols
2527 dynamic so that references to .foo are satisfied during the early
2528 stages of linking. Otherwise the linker might decide to pull in a
8387904d
AM
2529 definition from some other object, eg. a static library.
2530
2531 Update: As of August 2004, we support a new convention. Function
2532 calls may use the function descriptor symbol, ie. "bl foo". This
2533 behaves exactly as "bl .foo". */
65f38f15 2534
7c8bbca5
AM
2535/* Of those relocs that might be copied as dynamic relocs, this
2536 function selects those that must be copied when linking a shared
2537 library or PIE, even when the symbol is local. */
65f38f15 2538
1d483afe
AM
2539static int
2540must_be_dyn_reloc (struct bfd_link_info *info,
2541 enum elf_ppc64_reloc_type r_type)
2542{
2543 switch (r_type)
2544 {
2545 default:
7c8bbca5
AM
2546 /* Only relative relocs can be resolved when the object load
2547 address isn't fixed. DTPREL64 is excluded because the
2548 dynamic linker needs to differentiate global dynamic from
2549 local dynamic __tls_index pairs when PPC64_OPT_TLS is set. */
1d483afe
AM
2550 return 1;
2551
2552 case R_PPC64_REL32:
2553 case R_PPC64_REL64:
2554 case R_PPC64_REL30:
2555 return 0;
2556
2557 case R_PPC64_TPREL16:
2558 case R_PPC64_TPREL16_LO:
2559 case R_PPC64_TPREL16_HI:
2560 case R_PPC64_TPREL16_HA:
2561 case R_PPC64_TPREL16_DS:
2562 case R_PPC64_TPREL16_LO_DS:
f9c6b907
AM
2563 case R_PPC64_TPREL16_HIGH:
2564 case R_PPC64_TPREL16_HIGHA:
1d483afe
AM
2565 case R_PPC64_TPREL16_HIGHER:
2566 case R_PPC64_TPREL16_HIGHERA:
2567 case R_PPC64_TPREL16_HIGHEST:
2568 case R_PPC64_TPREL16_HIGHESTA:
2569 case R_PPC64_TPREL64:
7c8bbca5
AM
2570 /* These relocations are relative but in a shared library the
2571 linker doesn't know the thread pointer base. */
2572 return bfd_link_dll (info);
1d483afe
AM
2573 }
2574}
65f38f15 2575
f4656909
AM
2576/* If ELIMINATE_COPY_RELOCS is non-zero, the linker will try to avoid
2577 copying dynamic variables from a shared lib into an app's dynbss
2578 section, and instead use a dynamic relocation to point into the
5d35169e
AM
2579 shared lib. With code that gcc generates, it's vital that this be
2580 enabled; In the PowerPC64 ABI, the address of a function is actually
2581 the address of a function descriptor, which resides in the .opd
2582 section. gcc uses the descriptor directly rather than going via the
2583 GOT as some other ABI's do, which means that initialized function
2584 pointers must reference the descriptor. Thus, a function pointer
2585 initialized to the address of a function in a shared library will
2586 either require a copy reloc, or a dynamic reloc. Using a copy reloc
4cc11e76 2587 redefines the function descriptor symbol to point to the copy. This
5d35169e
AM
2588 presents a problem as a plt entry for that function is also
2589 initialized from the function descriptor symbol and the copy reloc
2590 may not be initialized first. */
a23b6845 2591#define ELIMINATE_COPY_RELOCS 1
f4656909 2592
721956f4 2593/* Section name for stubs is the associated section name plus this
29942be8
NC
2594 string. */
2595#define STUB_SUFFIX ".stub"
721956f4
AM
2596
2597/* Linker stubs.
2598 ppc_stub_long_branch:
2599 Used when a 14 bit branch (or even a 24 bit branch) can't reach its
2600 destination, but a 24 bit branch in a stub section will reach.
2601 . b dest
2602
2603 ppc_stub_plt_branch:
2604 Similar to the above, but a 24 bit branch in the stub section won't
2605 reach its destination.
71a39c98
AM
2606 . addis %r11,%r2,xxx@toc@ha
2607 . ld %r12,xxx@toc@l(%r11)
2608 . mtctr %r12
721956f4
AM
2609 . bctr
2610
2611 ppc_stub_plt_call:
2c66dc6c
AM
2612 Used to call a function in a shared library. If it so happens that
2613 the plt entry referenced crosses a 64k boundary, then an extra
71a39c98 2614 "addi %r11,%r11,xxx@toc@l" will be inserted before the "mtctr".
05d0e962 2615 ppc_stub_plt_call_r2save starts with "std %r2,40(%r1)".
71a39c98
AM
2616 . addis %r11,%r2,xxx@toc@ha
2617 . ld %r12,xxx+0@toc@l(%r11)
2618 . mtctr %r12
2619 . ld %r2,xxx+8@toc@l(%r11)
2620 . ld %r11,xxx+16@toc@l(%r11)
721956f4 2621 . bctr
ad8e1ba5
AM
2622
2623 ppc_stub_long_branch and ppc_stub_plt_branch may also have additional
2624 code to adjust the value and save r2 to support multiple toc sections.
2625 A ppc_stub_long_branch with an r2 offset looks like:
2626 . std %r2,40(%r1)
2627 . addis %r2,%r2,off@ha
2628 . addi %r2,%r2,off@l
2629 . b dest
2630
2631 A ppc_stub_plt_branch with an r2 offset looks like:
2632 . std %r2,40(%r1)
71a39c98
AM
2633 . addis %r11,%r2,xxx@toc@ha
2634 . ld %r12,xxx@toc@l(%r11)
ad8e1ba5
AM
2635 . addis %r2,%r2,off@ha
2636 . addi %r2,%r2,off@l
71a39c98 2637 . mtctr %r12
ad8e1ba5 2638 . bctr
ac2df442 2639
05d0e962
AM
2640 All of the above stubs are shown as their ELFv1 variants. ELFv2
2641 variants exist too, simpler for plt calls since a new toc pointer
2642 and static chain are not loaded by the stub. In addition, ELFv2
2643 has some more complex stubs to handle calls marked with NOTOC
2644 relocs from functions where r2 is not a valid toc pointer. These
2645 come in two flavours, the ones shown below, and _both variants that
2646 start with "std %r2,24(%r1)" to save r2 in the unlikely event that
2647 one call is from a function where r2 is used as the toc pointer but
2648 needs a toc adjusting stub for small-model multi-toc, and another
2649 call is from a function where r2 is not valid.
2650 ppc_stub_long_branch_notoc:
2651 . mflr %r12
2652 . bcl 20,31,1f
2653 . 1:
2654 . mflr %r11
2655 . mtlr %r12
2cdcc330
AM
2656 . addis %r12,%r11,dest-1b@ha
2657 . addi %r12,%r12,dest-1b@l
05d0e962
AM
2658 . b dest
2659
2660 ppc_stub_plt_branch_notoc:
2661 . mflr %r12
2662 . bcl 20,31,1f
2663 . 1:
2664 . mflr %r11
2665 . mtlr %r12
2666 . lis %r12,xxx-1b@highest
f891966f 2667 . ori %r12,%r12,xxx-1b@higher
05d0e962 2668 . sldi %r12,%r12,32
f891966f 2669 . oris %r12,%r12,xxx-1b@high
05d0e962
AM
2670 . ori %r12,%r12,xxx-1b@l
2671 . add %r12,%r11,%r12
2672 . mtctr %r12
2673 . bctr
2674
2675 ppc_stub_plt_call_notoc:
2676 . mflr %r12
2677 . bcl 20,31,1f
2678 . 1:
2679 . mflr %r11
2680 . mtlr %r12
2681 . lis %r12,xxx-1b@highest
f891966f 2682 . ori %r12,%r12,xxx-1b@higher
05d0e962 2683 . sldi %r12,%r12,32
f891966f 2684 . oris %r12,%r12,xxx-1b@high
05d0e962
AM
2685 . ori %r12,%r12,xxx-1b@l
2686 . ldx %r12,%r11,%r12
2687 . mtctr %r12
2688 . bctr
2689
2690 In cases where the high instructions would add zero, they are
2691 omitted and following instructions modified in some cases.
2692
2693 For a given stub group (a set of sections all using the same toc
2694 pointer value) there will be just one stub type used for any
2695 particular function symbol. For example, if printf is called from
2696 code with the tocsave optimization (ie. r2 saved in function
2697 prologue) and therefore calls use a ppc_stub_plt_call linkage stub,
2698 and from other code without the tocsave optimization requiring a
2699 ppc_stub_plt_call_r2save linkage stub, a single stub of the latter
2700 type will be created. Calls with the tocsave optimization will
2701 enter this stub after the instruction saving r2. A similar
2702 situation exists when calls are marked with R_PPC64_REL24_NOTOC
2703 relocations. These require a ppc_stub_plt_call_notoc linkage stub
2704 to call an external function like printf. If other calls to printf
2705 require a ppc_stub_plt_call linkage stub then a single
2706 ppc_stub_plt_call_notoc linkage stub will be used for both types of
2707 call. If other calls to printf require a ppc_stub_plt_call_r2save
2708 linkage stub then a single ppc_stub_plt_call_both linkage stub will
2709 be created and calls not requiring r2 to be saved will enter the
2710 stub after the r2 save instruction. There is an analogous
2711 hierarchy of long branch and plt branch stubs for local call
2712 linkage. */
721956f4 2713
2cdcc330
AM
2714enum ppc_stub_type
2715{
721956f4
AM
2716 ppc_stub_none,
2717 ppc_stub_long_branch,
ad8e1ba5 2718 ppc_stub_long_branch_r2off,
05d0e962
AM
2719 ppc_stub_long_branch_notoc,
2720 ppc_stub_long_branch_both, /* r2off and notoc variants both needed. */
721956f4 2721 ppc_stub_plt_branch,
ad8e1ba5 2722 ppc_stub_plt_branch_r2off,
05d0e962
AM
2723 ppc_stub_plt_branch_notoc,
2724 ppc_stub_plt_branch_both,
794e51c0 2725 ppc_stub_plt_call,
7341d5e2 2726 ppc_stub_plt_call_r2save,
05d0e962
AM
2727 ppc_stub_plt_call_notoc,
2728 ppc_stub_plt_call_both,
a4b6fadd
AM
2729 ppc_stub_global_entry,
2730 ppc_stub_save_res
721956f4
AM
2731};
2732
6f20ed8a
AM
2733/* Information on stub grouping. */
2734struct map_stub
2735{
2736 /* The stub section. */
2737 asection *stub_sec;
2738 /* This is the section to which stubs in the group will be attached. */
2739 asection *link_sec;
a4b6fadd
AM
2740 /* Next group. */
2741 struct map_stub *next;
2742 /* Whether to emit a copy of register save/restore functions in this
2743 group. */
2744 int needs_save_res;
df136d64
AM
2745 /* Current offset within stubs after the insn restoring lr in a
2746 _notoc or _both stub using bcl for pc-relative addressing, or
2747 after the insn restoring lr in a __tls_get_addr_opt plt stub. */
2748 unsigned int lr_restore;
2749 /* Accumulated size of EH info emitted to describe return address
2750 if stubs modify lr. Does not include 17 byte FDE header. */
2751 unsigned int eh_size;
2752 /* Offset in glink_eh_frame to the start of EH info for this group. */
2753 unsigned int eh_base;
6f20ed8a
AM
2754};
2755
2cdcc330
AM
2756struct ppc_stub_hash_entry
2757{
721956f4
AM
2758 /* Base hash table entry structure. */
2759 struct bfd_hash_entry root;
2760
ad8e1ba5
AM
2761 enum ppc_stub_type stub_type;
2762
6f20ed8a
AM
2763 /* Group information. */
2764 struct map_stub *group;
721956f4
AM
2765
2766 /* Offset within stub_sec of the beginning of this stub. */
2767 bfd_vma stub_offset;
2768
2769 /* Given the symbol's value and its section we can determine its final
2770 value when building the stubs (so the stub knows where to jump. */
2771 bfd_vma target_value;
2772 asection *target_section;
2773
721956f4
AM
2774 /* The symbol table entry, if any, that this was derived from. */
2775 struct ppc_link_hash_entry *h;
e054468f 2776 struct plt_entry *plt_ent;
721956f4 2777
2d7ad24e
AM
2778 /* Symbol type. */
2779 unsigned char symtype;
2780
6911b7dc
AM
2781 /* Symbol st_other. */
2782 unsigned char other;
721956f4
AM
2783};
2784
2cdcc330
AM
2785struct ppc_branch_hash_entry
2786{
721956f4
AM
2787 /* Base hash table entry structure. */
2788 struct bfd_hash_entry root;
2789
c456f082 2790 /* Offset within branch lookup table. */
721956f4
AM
2791 unsigned int offset;
2792
2793 /* Generation marker. */
2794 unsigned int iter;
2795};
65f38f15 2796
19e08130
AM
2797/* Used to track dynamic relocations for local symbols. */
2798struct ppc_dyn_relocs
2799{
2800 struct ppc_dyn_relocs *next;
2801
2802 /* The input section of the reloc. */
2803 asection *sec;
2804
2805 /* Total number of relocs copied for the input section. */
2806 unsigned int count : 31;
2807
2808 /* Whether this entry is for STT_GNU_IFUNC symbols. */
2809 unsigned int ifunc : 1;
2810};
2811
65f38f15
AM
2812struct ppc_link_hash_entry
2813{
2814 struct elf_link_hash_entry elf;
2815
2cdcc330
AM
2816 union
2817 {
b3fac117
AM
2818 /* A pointer to the most recently used stub hash entry against this
2819 symbol. */
2820 struct ppc_stub_hash_entry *stub_cache;
2821
2822 /* A pointer to the next symbol starting with a '.' */
2823 struct ppc_link_hash_entry *next_dot_sym;
2824 } u;
721956f4 2825
65f38f15 2826 /* Track dynamic relocs copied for this symbol. */
6061a67d 2827 struct elf_dyn_relocs *dyn_relocs;
e86ce104 2828
721956f4 2829 /* Link between function code and descriptor symbols. */
34814b9f 2830 struct ppc_link_hash_entry *oh;
721956f4 2831
e86ce104
AM
2832 /* Flag function code and descriptor symbols. */
2833 unsigned int is_func:1;
2834 unsigned int is_func_descriptor:1;
908b32fc 2835 unsigned int fake:1;
411e1bfb 2836
c5614fa4
AM
2837 /* Whether global opd/toc sym has been adjusted or not.
2838 After ppc64_elf_edit_opd/ppc64_elf_edit_toc has run, this flag
2839 should be set for all globals defined in any opd/toc section. */
754021d0
AM
2840 unsigned int adjust_done:1;
2841
a4b6fadd
AM
2842 /* Set if this is an out-of-line register save/restore function,
2843 with non-standard calling convention. */
2844 unsigned int save_res:1;
2845
8b5f1ed8
AM
2846 /* Set if a duplicate symbol with non-zero localentry is detected,
2847 even when the duplicate symbol does not provide a definition. */
2848 unsigned int non_zero_localentry:1;
2849
411e1bfb 2850 /* Contexts in which symbol is used in the GOT (or TOC).
37da22e5
AM
2851 Bits are or'd into the mask as the corresponding relocs are
2852 encountered during check_relocs, with TLS_TLS being set when any
2853 of the other TLS bits are set. tls_optimize clears bits when
2854 optimizing to indicate the corresponding GOT entry type is not
2855 needed. If set, TLS_TLS is never cleared. tls_optimize may also
2856 set TLS_TPRELGD when a GD reloc turns into a TPREL one. We use a
2857 separate flag rather than setting TPREL just for convenience in
2858 distinguishing the two cases.
2859 These flags are also kept for local symbols. */
2860#define TLS_TLS 1 /* Any TLS reloc. */
2861#define TLS_GD 2 /* GD reloc. */
2862#define TLS_LD 4 /* LD reloc. */
2863#define TLS_TPREL 8 /* TPREL reloc, => IE. */
2864#define TLS_DTPREL 16 /* DTPREL reloc, => LD. */
2865#define TLS_MARK 32 /* __tls_get_addr call marked. */
e7b938ca 2866#define TLS_TPRELGD 64 /* TPREL reloc resulting from GD->IE. */
37da22e5 2867#define TLS_EXPLICIT 128 /* Marks TOC section TLS relocs. */
f961d9dd 2868 unsigned char tls_mask;
37da22e5
AM
2869
2870 /* The above field is also used to mark function symbols. In which
2871 case TLS_TLS will be 0. */
2872#define PLT_IFUNC 2 /* STT_GNU_IFUNC. */
2d7ad24e 2873#define PLT_KEEP 4 /* inline plt call requires plt entry. */
37da22e5 2874#define NON_GOT 256 /* local symbol plt, not stored. */
65f38f15
AM
2875};
2876
2877/* ppc64 ELF linker hash table. */
2878
2879struct ppc_link_hash_table
2880{
2881 struct elf_link_hash_table elf;
2882
721956f4
AM
2883 /* The stub hash table. */
2884 struct bfd_hash_table stub_hash_table;
2885
2886 /* Another hash table for plt_branch stubs. */
2887 struct bfd_hash_table branch_hash_table;
2888
3b421ab3
AM
2889 /* Hash table for function prologue tocsave. */
2890 htab_t tocsave_htab;
2891
e7d1c40c
AM
2892 /* Various options and other info passed from the linker. */
2893 struct ppc64_elf_params *params;
721956f4 2894
6f20ed8a
AM
2895 /* The size of sec_info below. */
2896 unsigned int sec_info_arr_size;
2897
2898 /* Per-section array of extra section info. Done this way rather
2899 than as part of ppc64_elf_section_data so we have the info for
2900 non-ppc64 sections. */
2901 struct
2902 {
2903 /* Along with elf_gp, specifies the TOC pointer used by this section. */
ad8e1ba5 2904 bfd_vma toc_off;
6f20ed8a
AM
2905
2906 union
2907 {
2908 /* The section group that this section belongs to. */
2909 struct map_stub *group;
2910 /* A temp section list pointer. */
2911 asection *list;
2912 } u;
2913 } *sec_info;
721956f4 2914
a4b6fadd
AM
2915 /* Linked list of groups. */
2916 struct map_stub *group;
2917
ad8e1ba5
AM
2918 /* Temp used when calculating TOC pointers. */
2919 bfd_vma toc_curr;
bf102f86
AM
2920 bfd *toc_bfd;
2921 asection *toc_first_sec;
ad8e1ba5 2922
b3fac117
AM
2923 /* Used when adding symbols. */
2924 struct ppc_link_hash_entry *dot_syms;
2925
33e44f2e 2926 /* Shortcuts to get to dynamic linker sections. */
4ce794b7 2927 asection *glink;
9e390558 2928 asection *global_entry;
82bd7b59 2929 asection *sfpr;
2d7ad24e
AM
2930 asection *pltlocal;
2931 asection *relpltlocal;
4ce794b7
AM
2932 asection *brlt;
2933 asection *relbrlt;
58d180e8 2934 asection *glink_eh_frame;
ec338859 2935
8387904d
AM
2936 /* Shortcut to .__tls_get_addr and __tls_get_addr. */
2937 struct ppc_link_hash_entry *tls_get_addr;
2938 struct ppc_link_hash_entry *tls_get_addr_fd;
411e1bfb 2939
927be08e
AM
2940 /* The size of reliplt used by got entry relocs. */
2941 bfd_size_type got_reli_size;
2942
9b5ecbd0 2943 /* Statistics. */
7341d5e2 2944 unsigned long stub_count[ppc_stub_global_entry];
9b5ecbd0 2945
ee75fd95
AM
2946 /* Number of stubs against global syms. */
2947 unsigned long stub_globals;
2948
ee67d69a
AM
2949 /* Set if we're linking code with function descriptors. */
2950 unsigned int opd_abi:1;
2951
4c52953f 2952 /* Support for multiple toc sections. */
33c0ec9d 2953 unsigned int do_multi_toc:1;
4c52953f 2954 unsigned int multi_toc_needed:1;
927be08e 2955 unsigned int second_toc_pass:1;
67f0cbdb 2956 unsigned int do_toc_opt:1;
4c52953f 2957
9a23f96e
AM
2958 /* Set if tls optimization is enabled. */
2959 unsigned int do_tls_opt:1;
2960
3e04d765
AM
2961 /* Set if inline plt calls should be converted to direct calls. */
2962 unsigned int can_convert_all_inline_plt:1;
2963
5d1634d7 2964 /* Set on error. */
99877b66 2965 unsigned int stub_error:1;
721956f4 2966
8c5b4e52
AM
2967 /* Whether func_desc_adjust needs to be run over symbols. */
2968 unsigned int need_func_desc_adj:1;
721956f4 2969
82e66161
AM
2970 /* Whether there exist local gnu indirect function resolvers,
2971 referenced by dynamic relocations. */
2972 unsigned int local_ifunc_resolver:1;
2973 unsigned int maybe_local_ifunc_resolver:1;
2974
f378ab09
AM
2975 /* Whether plt calls for ELFv2 localentry:0 funcs have been optimized. */
2976 unsigned int has_plt_localentry0:1;
2977
721956f4
AM
2978 /* Incremented every time we size stubs. */
2979 unsigned int stub_iteration;
5d1634d7 2980
87d72d41
AM
2981 /* Small local sym cache. */
2982 struct sym_cache sym_cache;
65f38f15
AM
2983};
2984
4c52953f
AM
2985/* Rename some of the generic section flags to better document how they
2986 are used here. */
b0dddeec
AM
2987
2988/* Nonzero if this section has TLS related relocations. */
2989#define has_tls_reloc sec_flg0
2990
23cedd1d 2991/* Nonzero if this section has an old-style call to __tls_get_addr. */
b0dddeec
AM
2992#define has_tls_get_addr_call sec_flg1
2993
2994/* Nonzero if this section has any toc or got relocs. */
2995#define has_toc_reloc sec_flg2
2996
2997/* Nonzero if this section has a call to another section that uses
2998 the toc or got. */
d77c8a4b 2999#define makes_toc_func_call sec_flg3
b0dddeec
AM
3000
3001/* Recursion protection when determining above flag. */
d77c8a4b 3002#define call_check_in_progress sec_flg4
70cc837d 3003#define call_check_done sec_flg5
4c52953f 3004
65f38f15
AM
3005/* Get the ppc64 ELF linker hash table from a link_info structure. */
3006
3007#define ppc_hash_table(p) \
4dfe6ac6
NC
3008 (elf_hash_table_id ((struct elf_link_hash_table *) ((p)->hash)) \
3009 == PPC64_ELF_DATA ? ((struct ppc_link_hash_table *) ((p)->hash)) : NULL)
65f38f15 3010
721956f4
AM
3011#define ppc_stub_hash_lookup(table, string, create, copy) \
3012 ((struct ppc_stub_hash_entry *) \
3013 bfd_hash_lookup ((table), (string), (create), (copy)))
3014
3015#define ppc_branch_hash_lookup(table, string, create, copy) \
3016 ((struct ppc_branch_hash_entry *) \
3017 bfd_hash_lookup ((table), (string), (create), (copy)))
3018
3019/* Create an entry in the stub hash table. */
3020
3021static struct bfd_hash_entry *
4ce794b7
AM
3022stub_hash_newfunc (struct bfd_hash_entry *entry,
3023 struct bfd_hash_table *table,
3024 const char *string)
721956f4
AM
3025{
3026 /* Allocate the structure if it has not already been allocated by a
3027 subclass. */
3028 if (entry == NULL)
3029 {
3030 entry = bfd_hash_allocate (table, sizeof (struct ppc_stub_hash_entry));
3031 if (entry == NULL)
3032 return entry;
3033 }
3034
3035 /* Call the allocation method of the superclass. */
3036 entry = bfd_hash_newfunc (entry, table, string);
3037 if (entry != NULL)
3038 {
3039 struct ppc_stub_hash_entry *eh;
3040
3041 /* Initialize the local fields. */
3042 eh = (struct ppc_stub_hash_entry *) entry;
ad8e1ba5 3043 eh->stub_type = ppc_stub_none;
6f20ed8a 3044 eh->group = NULL;
721956f4
AM
3045 eh->stub_offset = 0;
3046 eh->target_value = 0;
3047 eh->target_section = NULL;
721956f4 3048 eh->h = NULL;
6911b7dc 3049 eh->plt_ent = NULL;
6911b7dc 3050 eh->other = 0;
721956f4
AM
3051 }
3052
3053 return entry;
3054}
3055
3056/* Create an entry in the branch hash table. */
3057
3058static struct bfd_hash_entry *
4ce794b7
AM
3059branch_hash_newfunc (struct bfd_hash_entry *entry,
3060 struct bfd_hash_table *table,
3061 const char *string)
721956f4
AM
3062{
3063 /* Allocate the structure if it has not already been allocated by a
3064 subclass. */
3065 if (entry == NULL)
3066 {
3067 entry = bfd_hash_allocate (table, sizeof (struct ppc_branch_hash_entry));
3068 if (entry == NULL)
3069 return entry;
3070 }
3071
3072 /* Call the allocation method of the superclass. */
3073 entry = bfd_hash_newfunc (entry, table, string);
3074 if (entry != NULL)
3075 {
3076 struct ppc_branch_hash_entry *eh;
3077
3078 /* Initialize the local fields. */
3079 eh = (struct ppc_branch_hash_entry *) entry;
3080 eh->offset = 0;
3081 eh->iter = 0;
3082 }
3083
3084 return entry;
3085}
3086
65f38f15
AM
3087/* Create an entry in a ppc64 ELF linker hash table. */
3088
3089static struct bfd_hash_entry *
4ce794b7
AM
3090link_hash_newfunc (struct bfd_hash_entry *entry,
3091 struct bfd_hash_table *table,
3092 const char *string)
65f38f15
AM
3093{
3094 /* Allocate the structure if it has not already been allocated by a
3095 subclass. */
3096 if (entry == NULL)
3097 {
3098 entry = bfd_hash_allocate (table, sizeof (struct ppc_link_hash_entry));
3099 if (entry == NULL)
3100 return entry;
3101 }
3102
3103 /* Call the allocation method of the superclass. */
3104 entry = _bfd_elf_link_hash_newfunc (entry, table, string);
3105 if (entry != NULL)
3106 {
3107 struct ppc_link_hash_entry *eh = (struct ppc_link_hash_entry *) entry;
3108
b3fac117 3109 memset (&eh->u.stub_cache, 0,
908b32fc 3110 (sizeof (struct ppc_link_hash_entry)
b3fac117
AM
3111 - offsetof (struct ppc_link_hash_entry, u.stub_cache)));
3112
3113 /* When making function calls, old ABI code references function entry
3114 points (dot symbols), while new ABI code references the function
3115 descriptor symbol. We need to make any combination of reference and
3116 definition work together, without breaking archive linking.
3117
3118 For a defined function "foo" and an undefined call to "bar":
3119 An old object defines "foo" and ".foo", references ".bar" (possibly
3120 "bar" too).
3121 A new object defines "foo" and references "bar".
3122
3123 A new object thus has no problem with its undefined symbols being
3124 satisfied by definitions in an old object. On the other hand, the
3125 old object won't have ".bar" satisfied by a new object.
3126
3127 Keep a list of newly added dot-symbols. */
3128
3129 if (string[0] == '.')
3130 {
3131 struct ppc_link_hash_table *htab;
3132
3133 htab = (struct ppc_link_hash_table *) table;
3134 eh->u.next_dot_sym = htab->dot_syms;
3135 htab->dot_syms = eh;
3136 }
65f38f15
AM
3137 }
3138
3139 return entry;
3140}
3141
2cdcc330
AM
3142struct tocsave_entry
3143{
3b421ab3
AM
3144 asection *sec;
3145 bfd_vma offset;
3146};
3147
3148static hashval_t
3149tocsave_htab_hash (const void *p)
3150{
3151 const struct tocsave_entry *e = (const struct tocsave_entry *) p;
4aef7643 3152 return ((bfd_vma) (intptr_t) e->sec ^ e->offset) >> 3;
3b421ab3
AM
3153}
3154
3155static int
3156tocsave_htab_eq (const void *p1, const void *p2)
3157{
3158 const struct tocsave_entry *e1 = (const struct tocsave_entry *) p1;
3159 const struct tocsave_entry *e2 = (const struct tocsave_entry *) p2;
3160 return e1->sec == e2->sec && e1->offset == e2->offset;
3161}
3162
68faa637
AM
3163/* Destroy a ppc64 ELF linker hash table. */
3164
3165static void
d495ab0d 3166ppc64_elf_link_hash_table_free (bfd *obfd)
68faa637 3167{
d495ab0d 3168 struct ppc_link_hash_table *htab;
68faa637 3169
d495ab0d 3170 htab = (struct ppc_link_hash_table *) obfd->link.hash;
68faa637
AM
3171 if (htab->tocsave_htab)
3172 htab_delete (htab->tocsave_htab);
d495ab0d
AM
3173 bfd_hash_table_free (&htab->branch_hash_table);
3174 bfd_hash_table_free (&htab->stub_hash_table);
3175 _bfd_elf_link_hash_table_free (obfd);
68faa637
AM
3176}
3177
65f38f15
AM
3178/* Create a ppc64 ELF linker hash table. */
3179
3180static struct bfd_link_hash_table *
4ce794b7 3181ppc64_elf_link_hash_table_create (bfd *abfd)
65f38f15
AM
3182{
3183 struct ppc_link_hash_table *htab;
3184 bfd_size_type amt = sizeof (struct ppc_link_hash_table);
3185
4ce794b7 3186 htab = bfd_zmalloc (amt);
65f38f15
AM
3187 if (htab == NULL)
3188 return NULL;
3189
66eb6687 3190 if (!_bfd_elf_link_hash_table_init (&htab->elf, abfd, link_hash_newfunc,
4dfe6ac6
NC
3191 sizeof (struct ppc_link_hash_entry),
3192 PPC64_ELF_DATA))
65f38f15 3193 {
e2d34d7d 3194 free (htab);
65f38f15
AM
3195 return NULL;
3196 }
3197
721956f4 3198 /* Init the stub hash table too. */
66eb6687
AM
3199 if (!bfd_hash_table_init (&htab->stub_hash_table, stub_hash_newfunc,
3200 sizeof (struct ppc_stub_hash_entry)))
2915c55b 3201 {
d495ab0d 3202 _bfd_elf_link_hash_table_free (abfd);
2915c55b
JK
3203 return NULL;
3204 }
721956f4
AM
3205
3206 /* And the branch hash table. */
66eb6687
AM
3207 if (!bfd_hash_table_init (&htab->branch_hash_table, branch_hash_newfunc,
3208 sizeof (struct ppc_branch_hash_entry)))
2915c55b
JK
3209 {
3210 bfd_hash_table_free (&htab->stub_hash_table);
d495ab0d 3211 _bfd_elf_link_hash_table_free (abfd);
2915c55b
JK
3212 return NULL;
3213 }
721956f4 3214
3b421ab3
AM
3215 htab->tocsave_htab = htab_try_create (1024,
3216 tocsave_htab_hash,
3217 tocsave_htab_eq,
3218 NULL);
3219 if (htab->tocsave_htab == NULL)
2915c55b 3220 {
d495ab0d 3221 ppc64_elf_link_hash_table_free (abfd);
2915c55b
JK
3222 return NULL;
3223 }
d495ab0d 3224 htab->elf.root.hash_table_free = ppc64_elf_link_hash_table_free;
3b421ab3 3225
3254fd24
AM
3226 /* Initializing two fields of the union is just cosmetic. We really
3227 only care about glist, but when compiled on a 32-bit host the
3228 bfd_vma fields are larger. Setting the bfd_vma to zero makes
3229 debugger inspection of these fields look nicer. */
a6aa5195
AM
3230 htab->elf.init_got_refcount.refcount = 0;
3231 htab->elf.init_got_refcount.glist = NULL;
3232 htab->elf.init_plt_refcount.refcount = 0;
3233 htab->elf.init_plt_refcount.glist = NULL;
3234 htab->elf.init_got_offset.offset = 0;
3235 htab->elf.init_got_offset.glist = NULL;
3236 htab->elf.init_plt_offset.offset = 0;
3237 htab->elf.init_plt_offset.glist = NULL;
3254fd24 3238
65f38f15
AM
3239 return &htab->elf.root;
3240}
3241
bfeb4a28
AM
3242/* Create sections for linker generated code. */
3243
3244static bfd_boolean
3245create_linkage_sections (bfd *dynobj, struct bfd_link_info *info)
3246{
3247 struct ppc_link_hash_table *htab;
3248 flagword flags;
3249
3250 htab = ppc_hash_table (info);
3251
bfeb4a28
AM
3252 flags = (SEC_ALLOC | SEC_LOAD | SEC_CODE | SEC_READONLY
3253 | SEC_HAS_CONTENTS | SEC_IN_MEMORY | SEC_LINKER_CREATED);
b32547cd
AM
3254 if (htab->params->save_restore_funcs)
3255 {
3256 /* Create .sfpr for code to save and restore fp regs. */
3257 htab->sfpr = bfd_make_section_anyway_with_flags (dynobj, ".sfpr",
3258 flags);
3259 if (htab->sfpr == NULL
2cdcc330 3260 || !bfd_set_section_alignment (dynobj, htab->sfpr, 2))
b32547cd
AM
3261 return FALSE;
3262 }
3263
3264 if (bfd_link_relocatable (info))
3265 return TRUE;
bfeb4a28
AM
3266
3267 /* Create .glink for lazy dynamic linking support. */
3268 htab->glink = bfd_make_section_anyway_with_flags (dynobj, ".glink",
3269 flags);
3270 if (htab->glink == NULL
2cdcc330 3271 || !bfd_set_section_alignment (dynobj, htab->glink, 3))
bfeb4a28
AM
3272 return FALSE;
3273
9e390558
AM
3274 /* The part of .glink used by global entry stubs, separate so that
3275 it can be aligned appropriately without affecting htab->glink. */
3276 htab->global_entry = bfd_make_section_anyway_with_flags (dynobj, ".glink",
3277 flags);
3278 if (htab->global_entry == NULL
2cdcc330 3279 || !bfd_set_section_alignment (dynobj, htab->global_entry, 2))
9e390558
AM
3280 return FALSE;
3281
bfeb4a28
AM
3282 if (!info->no_ld_generated_unwind_info)
3283 {
3284 flags = (SEC_ALLOC | SEC_LOAD | SEC_READONLY | SEC_HAS_CONTENTS
3285 | SEC_IN_MEMORY | SEC_LINKER_CREATED);
3286 htab->glink_eh_frame = bfd_make_section_anyway_with_flags (dynobj,
3287 ".eh_frame",
3288 flags);
3289 if (htab->glink_eh_frame == NULL
3290 || !bfd_set_section_alignment (dynobj, htab->glink_eh_frame, 2))
3291 return FALSE;
3292 }
3293
3294 flags = SEC_ALLOC | SEC_LINKER_CREATED;
33e44f2e
AM
3295 htab->elf.iplt = bfd_make_section_anyway_with_flags (dynobj, ".iplt", flags);
3296 if (htab->elf.iplt == NULL
2cdcc330 3297 || !bfd_set_section_alignment (dynobj, htab->elf.iplt, 3))
bfeb4a28
AM
3298 return FALSE;
3299
3300 flags = (SEC_ALLOC | SEC_LOAD | SEC_READONLY
3301 | SEC_HAS_CONTENTS | SEC_IN_MEMORY | SEC_LINKER_CREATED);
33e44f2e
AM
3302 htab->elf.irelplt
3303 = bfd_make_section_anyway_with_flags (dynobj, ".rela.iplt", flags);
3304 if (htab->elf.irelplt == NULL
2cdcc330 3305 || !bfd_set_section_alignment (dynobj, htab->elf.irelplt, 3))
bfeb4a28
AM
3306 return FALSE;
3307
3308 /* Create branch lookup table for plt_branch stubs. */
3309 flags = (SEC_ALLOC | SEC_LOAD
3310 | SEC_HAS_CONTENTS | SEC_IN_MEMORY | SEC_LINKER_CREATED);
3311 htab->brlt = bfd_make_section_anyway_with_flags (dynobj, ".branch_lt",
3312 flags);
3313 if (htab->brlt == NULL
2cdcc330 3314 || !bfd_set_section_alignment (dynobj, htab->brlt, 3))
bfeb4a28
AM
3315 return FALSE;
3316
2d7ad24e
AM
3317 /* Local plt entries, put in .branch_lt but a separate section for
3318 convenience. */
3319 htab->pltlocal = bfd_make_section_anyway_with_flags (dynobj, ".branch_lt",
3320 flags);
3321 if (htab->pltlocal == NULL
2cdcc330 3322 || !bfd_set_section_alignment (dynobj, htab->pltlocal, 3))
2d7ad24e
AM
3323 return FALSE;
3324
0e1862bb 3325 if (!bfd_link_pic (info))
bfeb4a28
AM
3326 return TRUE;
3327
3328 flags = (SEC_ALLOC | SEC_LOAD | SEC_READONLY
3329 | SEC_HAS_CONTENTS | SEC_IN_MEMORY | SEC_LINKER_CREATED);
2d7ad24e
AM
3330 htab->relbrlt
3331 = bfd_make_section_anyway_with_flags (dynobj, ".rela.branch_lt", flags);
bfeb4a28 3332 if (htab->relbrlt == NULL
2cdcc330 3333 || !bfd_set_section_alignment (dynobj, htab->relbrlt, 3))
bfeb4a28
AM
3334 return FALSE;
3335
2d7ad24e
AM
3336 htab->relpltlocal
3337 = bfd_make_section_anyway_with_flags (dynobj, ".rela.branch_lt", flags);
3338 if (htab->relpltlocal == NULL
2cdcc330 3339 || !bfd_set_section_alignment (dynobj, htab->relpltlocal, 3))
2d7ad24e
AM
3340 return FALSE;
3341
bfeb4a28
AM
3342 return TRUE;
3343}
3344
e717da7e
AM
3345/* Satisfy the ELF linker by filling in some fields in our fake bfd. */
3346
bfeb4a28 3347bfd_boolean
e7d1c40c
AM
3348ppc64_elf_init_stub_bfd (struct bfd_link_info *info,
3349 struct ppc64_elf_params *params)
e717da7e
AM
3350{
3351 struct ppc_link_hash_table *htab;
3352
e7d1c40c 3353 elf_elfheader (params->stub_bfd)->e_ident[EI_CLASS] = ELFCLASS64;
e717da7e
AM
3354
3355/* Always hook our dynamic sections into the first bfd, which is the
3356 linker created stub bfd. This ensures that the GOT header is at
3357 the start of the output TOC section. */
3358 htab = ppc_hash_table (info);
e7d1c40c
AM
3359 htab->elf.dynobj = params->stub_bfd;
3360 htab->params = params;
bfeb4a28 3361
bfeb4a28 3362 return create_linkage_sections (htab->elf.dynobj, info);
e717da7e
AM
3363}
3364
721956f4
AM
3365/* Build a name for an entry in the stub hash table. */
3366
3367static char *
4ce794b7
AM
3368ppc_stub_name (const asection *input_section,
3369 const asection *sym_sec,
3370 const struct ppc_link_hash_entry *h,
3371 const Elf_Internal_Rela *rel)
721956f4
AM
3372{
3373 char *stub_name;
bcaa2f82 3374 ssize_t len;
721956f4
AM
3375
3376 /* rel->r_addend is actually 64 bit, but who uses more than +/- 2^31
3377 offsets from a sym as a branch target? In fact, we could
3378 probably assume the addend is always zero. */
3379 BFD_ASSERT (((int) rel->r_addend & 0xffffffff) == rel->r_addend);
3380
3381 if (h)
3382 {
3383 len = 8 + 1 + strlen (h->elf.root.root.string) + 1 + 8 + 1;
3384 stub_name = bfd_malloc (len);
46de2a7c
AM
3385 if (stub_name == NULL)
3386 return stub_name;
3387
bcaa2f82
AM
3388 len = sprintf (stub_name, "%08x.%s+%x",
3389 input_section->id & 0xffffffff,
3390 h->elf.root.root.string,
3391 (int) rel->r_addend & 0xffffffff);
721956f4
AM
3392 }
3393 else
3394 {
ad8e1ba5 3395 len = 8 + 1 + 8 + 1 + 8 + 1 + 8 + 1;
721956f4 3396 stub_name = bfd_malloc (len);
46de2a7c
AM
3397 if (stub_name == NULL)
3398 return stub_name;
3399
bcaa2f82
AM
3400 len = sprintf (stub_name, "%08x.%x:%x+%x",
3401 input_section->id & 0xffffffff,
3402 sym_sec->id & 0xffffffff,
3403 (int) ELF64_R_SYM (rel->r_info) & 0xffffffff,
3404 (int) rel->r_addend & 0xffffffff);
721956f4 3405 }
bcaa2f82 3406 if (len > 2 && stub_name[len - 2] == '+' && stub_name[len - 1] == '0')
ee75fd95 3407 stub_name[len - 2] = 0;
721956f4
AM
3408 return stub_name;
3409}
3410
3411/* Look up an entry in the stub hash. Stub entries are cached because
3412 creating the stub name takes a bit of time. */
3413
3414static struct ppc_stub_hash_entry *
4ce794b7
AM
3415ppc_get_stub_entry (const asection *input_section,
3416 const asection *sym_sec,
039b3fef 3417 struct ppc_link_hash_entry *h,
4ce794b7
AM
3418 const Elf_Internal_Rela *rel,
3419 struct ppc_link_hash_table *htab)
721956f4
AM
3420{
3421 struct ppc_stub_hash_entry *stub_entry;
6f20ed8a 3422 struct map_stub *group;
721956f4
AM
3423
3424 /* If this input section is part of a group of sections sharing one
3425 stub section, then use the id of the first section in the group.
3426 Stub names need to include a section id, as there may well be
3427 more than one stub used to reach say, printf, and we need to
3428 distinguish between them. */
6f20ed8a 3429 group = htab->sec_info[input_section->id].u.group;
89d77b8a
AM
3430 if (group == NULL)
3431 return NULL;
721956f4 3432
b3fac117
AM
3433 if (h != NULL && h->u.stub_cache != NULL
3434 && h->u.stub_cache->h == h
6f20ed8a 3435 && h->u.stub_cache->group == group)
721956f4 3436 {
b3fac117 3437 stub_entry = h->u.stub_cache;
721956f4
AM
3438 }
3439 else
3440 {
3441 char *stub_name;
3442
6f20ed8a 3443 stub_name = ppc_stub_name (group->link_sec, sym_sec, h, rel);
721956f4
AM
3444 if (stub_name == NULL)
3445 return NULL;
3446
3447 stub_entry = ppc_stub_hash_lookup (&htab->stub_hash_table,
b34976b6 3448 stub_name, FALSE, FALSE);
721956f4 3449 if (h != NULL)
b3fac117 3450 h->u.stub_cache = stub_entry;
721956f4
AM
3451
3452 free (stub_name);
3453 }
3454
3455 return stub_entry;
3456}
3457
3458/* Add a new stub entry to the stub hash. Not all fields of the new
3459 stub entry are initialised. */
3460
3461static struct ppc_stub_hash_entry *
4ce794b7
AM
3462ppc_add_stub (const char *stub_name,
3463 asection *section,
25f53a85 3464 struct bfd_link_info *info)
721956f4 3465{
25f53a85 3466 struct ppc_link_hash_table *htab = ppc_hash_table (info);
6f20ed8a 3467 struct map_stub *group;
721956f4
AM
3468 asection *link_sec;
3469 asection *stub_sec;
3470 struct ppc_stub_hash_entry *stub_entry;
3471
6f20ed8a
AM
3472 group = htab->sec_info[section->id].u.group;
3473 link_sec = group->link_sec;
3474 stub_sec = group->stub_sec;
721956f4
AM
3475 if (stub_sec == NULL)
3476 {
6f20ed8a
AM
3477 size_t namelen;
3478 bfd_size_type len;
3479 char *s_name;
721956f4 3480
6f20ed8a
AM
3481 namelen = strlen (link_sec->name);
3482 len = namelen + sizeof (STUB_SUFFIX);
3483 s_name = bfd_alloc (htab->params->stub_bfd, len);
3484 if (s_name == NULL)
3485 return NULL;
721956f4 3486
6f20ed8a
AM
3487 memcpy (s_name, link_sec->name, namelen);
3488 memcpy (s_name + namelen, STUB_SUFFIX, sizeof (STUB_SUFFIX));
3489 stub_sec = (*htab->params->add_stub_section) (s_name, link_sec);
3490 if (stub_sec == NULL)
3491 return NULL;
3492 group->stub_sec = stub_sec;
721956f4
AM
3493 }
3494
3495 /* Enter this entry into the linker stub hash table. */
3496 stub_entry = ppc_stub_hash_lookup (&htab->stub_hash_table, stub_name,
b34976b6 3497 TRUE, FALSE);
721956f4
AM
3498 if (stub_entry == NULL)
3499 {
695344c0 3500 /* xgettext:c-format */
cf97bcb0
AM
3501 _bfd_error_handler (_("%pB: cannot create stub entry %s"),
3502 section->owner, stub_name);
721956f4
AM
3503 return NULL;
3504 }
3505
6f20ed8a 3506 stub_entry->group = group;
721956f4 3507 stub_entry->stub_offset = 0;
721956f4
AM
3508 return stub_entry;
3509}
3510
e717da7e
AM
3511/* Create .got and .rela.got sections in ABFD, and .got in dynobj if
3512 not already done. */
65f38f15 3513
b34976b6 3514static bfd_boolean
e717da7e 3515create_got_section (bfd *abfd, struct bfd_link_info *info)
65f38f15 3516{
e717da7e
AM
3517 asection *got, *relgot;
3518 flagword flags;
3519 struct ppc_link_hash_table *htab = ppc_hash_table (info);
65f38f15 3520
0c8d6e5c 3521 if (!is_ppc64_elf (abfd))
0ffa91dd 3522 return FALSE;
4dfe6ac6
NC
3523 if (htab == NULL)
3524 return FALSE;
0ffa91dd 3525
33e44f2e
AM
3526 if (!htab->elf.sgot
3527 && !_bfd_elf_create_got_section (htab->elf.dynobj, info))
3528 return FALSE;
e717da7e
AM
3529
3530 flags = (SEC_ALLOC | SEC_LOAD | SEC_HAS_CONTENTS | SEC_IN_MEMORY
3531 | SEC_LINKER_CREATED);
3532
c456f082 3533 got = bfd_make_section_anyway_with_flags (abfd, ".got", flags);
e717da7e 3534 if (!got
e717da7e
AM
3535 || !bfd_set_section_alignment (abfd, got, 3))
3536 return FALSE;
65f38f15 3537
c456f082
AM
3538 relgot = bfd_make_section_anyway_with_flags (abfd, ".rela.got",
3539 flags | SEC_READONLY);
e717da7e 3540 if (!relgot
2cdcc330 3541 || !bfd_set_section_alignment (abfd, relgot, 3))
b34976b6 3542 return FALSE;
e717da7e
AM
3543
3544 ppc64_elf_tdata (abfd)->got = got;
3545 ppc64_elf_tdata (abfd)->relgot = relgot;
b34976b6 3546 return TRUE;
65f38f15 3547}
5bd4f169 3548
b31867b6
AM
3549/* Follow indirect and warning symbol links. */
3550
3551static inline struct bfd_link_hash_entry *
3552follow_link (struct bfd_link_hash_entry *h)
3553{
3554 while (h->type == bfd_link_hash_indirect
3555 || h->type == bfd_link_hash_warning)
3556 h = h->u.i.link;
3557 return h;
3558}
3559
3560static inline struct elf_link_hash_entry *
3561elf_follow_link (struct elf_link_hash_entry *h)
3562{
3563 return (struct elf_link_hash_entry *) follow_link (&h->root);
3564}
3565
3566static inline struct ppc_link_hash_entry *
3567ppc_follow_link (struct ppc_link_hash_entry *h)
3568{
3569 return (struct ppc_link_hash_entry *) follow_link (&h->elf.root);
3570}
3571
40d16e0b
AM
3572/* Merge PLT info on FROM with that on TO. */
3573
3574static void
3575move_plt_plist (struct ppc_link_hash_entry *from,
3576 struct ppc_link_hash_entry *to)
3577{
3578 if (from->elf.plt.plist != NULL)
3579 {
3580 if (to->elf.plt.plist != NULL)
3581 {
3582 struct plt_entry **entp;
3583 struct plt_entry *ent;
3584
3585 for (entp = &from->elf.plt.plist; (ent = *entp) != NULL; )
3586 {
3587 struct plt_entry *dent;
3588
3589 for (dent = to->elf.plt.plist; dent != NULL; dent = dent->next)
3590 if (dent->addend == ent->addend)
3591 {
3592 dent->plt.refcount += ent->plt.refcount;
3593 *entp = ent->next;
3594 break;
3595 }
3596 if (dent == NULL)
3597 entp = &ent->next;
3598 }
3599 *entp = to->elf.plt.plist;
3600 }
3601
3602 to->elf.plt.plist = from->elf.plt.plist;
3603 from->elf.plt.plist = NULL;
3604 }
3605}
3606
65f38f15
AM
3607/* Copy the extra info we tack onto an elf_link_hash_entry. */
3608
3609static void
fcfa13d2
AM
3610ppc64_elf_copy_indirect_symbol (struct bfd_link_info *info,
3611 struct elf_link_hash_entry *dir,
3612 struct elf_link_hash_entry *ind)
65f38f15
AM
3613{
3614 struct ppc_link_hash_entry *edir, *eind;
3615
3616 edir = (struct ppc_link_hash_entry *) dir;
3617 eind = (struct ppc_link_hash_entry *) ind;
3618
c79d6685
AM
3619 edir->is_func |= eind->is_func;
3620 edir->is_func_descriptor |= eind->is_func_descriptor;
3621 edir->tls_mask |= eind->tls_mask;
3622 if (eind->oh != NULL)
3623 edir->oh = ppc_follow_link (eind->oh);
3624
474436e6 3625 if (edir->elf.versioned != versioned_hidden)
e81830c5
AM
3626 edir->elf.ref_dynamic |= eind->elf.ref_dynamic;
3627 edir->elf.ref_regular |= eind->elf.ref_regular;
3628 edir->elf.ref_regular_nonweak |= eind->elf.ref_regular_nonweak;
4a7e5234 3629 edir->elf.non_got_ref |= eind->elf.non_got_ref;
e81830c5
AM
3630 edir->elf.needs_plt |= eind->elf.needs_plt;
3631 edir->elf.pointer_equality_needed |= eind->elf.pointer_equality_needed;
c79d6685 3632
d311bc8b
AM
3633 /* If we were called to copy over info for a weak sym, don't copy
3634 dyn_relocs, plt/got info, or dynindx. We used to copy dyn_relocs
3635 in order to simplify readonly_dynrelocs and save a field in the
3636 symbol hash entry, but that means dyn_relocs can't be used in any
3637 tests about a specific symbol, or affect other symbol flags which
ab2477e1 3638 are then tested. */
d311bc8b 3639 if (eind->elf.root.type != bfd_link_hash_indirect)
ab2477e1 3640 return;
d311bc8b 3641
411e1bfb 3642 /* Copy over any dynamic relocs we may have on the indirect sym. */
bbd7ec4a 3643 if (eind->dyn_relocs != NULL)
65f38f15 3644 {
bbd7ec4a
AM
3645 if (edir->dyn_relocs != NULL)
3646 {
6061a67d
AM
3647 struct elf_dyn_relocs **pp;
3648 struct elf_dyn_relocs *p;
bbd7ec4a 3649
fcfa13d2 3650 /* Add reloc counts against the indirect sym to the direct sym
bbd7ec4a
AM
3651 list. Merge any entries against the same section. */
3652 for (pp = &eind->dyn_relocs; (p = *pp) != NULL; )
3653 {
6061a67d 3654 struct elf_dyn_relocs *q;
bbd7ec4a
AM
3655
3656 for (q = edir->dyn_relocs; q != NULL; q = q->next)
3657 if (q->sec == p->sec)
3658 {
3659 q->pc_count += p->pc_count;
3660 q->count += p->count;
3661 *pp = p->next;
3662 break;
3663 }
3664 if (q == NULL)
3665 pp = &p->next;
3666 }
3667 *pp = edir->dyn_relocs;
3668 }
3669
65f38f15
AM
3670 edir->dyn_relocs = eind->dyn_relocs;
3671 eind->dyn_relocs = NULL;
3672 }
65f38f15 3673
81848ca0
AM
3674 /* Copy over got entries that we may have already seen to the
3675 symbol which just became indirect. */
411e1bfb
AM
3676 if (eind->elf.got.glist != NULL)
3677 {
3678 if (edir->elf.got.glist != NULL)
3679 {
3680 struct got_entry **entp;
3681 struct got_entry *ent;
3682
3683 for (entp = &eind->elf.got.glist; (ent = *entp) != NULL; )
3684 {
3685 struct got_entry *dent;
3686
3687 for (dent = edir->elf.got.glist; dent != NULL; dent = dent->next)
3688 if (dent->addend == ent->addend
e717da7e 3689 && dent->owner == ent->owner
411e1bfb
AM
3690 && dent->tls_type == ent->tls_type)
3691 {
3692 dent->got.refcount += ent->got.refcount;
3693 *entp = ent->next;
3694 break;
3695 }
3696 if (dent == NULL)
3697 entp = &ent->next;
3698 }
3699 *entp = edir->elf.got.glist;
3700 }
3701
3702 edir->elf.got.glist = eind->elf.got.glist;
3703 eind->elf.got.glist = NULL;
3704 }
3705
3706 /* And plt entries. */
40d16e0b 3707 move_plt_plist (eind, edir);
411e1bfb 3708
fcfa13d2 3709 if (eind->elf.dynindx != -1)
411e1bfb 3710 {
fcfa13d2
AM
3711 if (edir->elf.dynindx != -1)
3712 _bfd_elf_strtab_delref (elf_hash_table (info)->dynstr,
3713 edir->elf.dynstr_index);
411e1bfb
AM
3714 edir->elf.dynindx = eind->elf.dynindx;
3715 edir->elf.dynstr_index = eind->elf.dynstr_index;
3716 eind->elf.dynindx = -1;
3717 eind->elf.dynstr_index = 0;
3718 }
411e1bfb
AM
3719}
3720
8387904d
AM
3721/* Find the function descriptor hash entry from the given function code
3722 hash entry FH. Link the entries via their OH fields. */
3723
3724static struct ppc_link_hash_entry *
b31867b6 3725lookup_fdh (struct ppc_link_hash_entry *fh, struct ppc_link_hash_table *htab)
8387904d
AM
3726{
3727 struct ppc_link_hash_entry *fdh = fh->oh;
3728
3729 if (fdh == NULL)
3730 {
3731 const char *fd_name = fh->elf.root.root.string + 1;
3732
3733 fdh = (struct ppc_link_hash_entry *)
3734 elf_link_hash_lookup (&htab->elf, fd_name, FALSE, FALSE, FALSE);
b31867b6
AM
3735 if (fdh == NULL)
3736 return fdh;
3737
3738 fdh->is_func_descriptor = 1;
3739 fdh->oh = fh;
3740 fh->is_func = 1;
3741 fh->oh = fdh;
8387904d
AM
3742 }
3743
8c5b4e52
AM
3744 fdh = ppc_follow_link (fdh);
3745 fdh->is_func_descriptor = 1;
3746 fdh->oh = fh;
3747 return fdh;
8387904d
AM
3748}
3749
8c5b4e52 3750/* Make a fake function descriptor sym for the undefined code sym FH. */
bb700d78
AM
3751
3752static struct ppc_link_hash_entry *
3753make_fdh (struct bfd_link_info *info,
908b32fc 3754 struct ppc_link_hash_entry *fh)
bb700d78 3755{
8c5b4e52
AM
3756 bfd *abfd = fh->elf.root.u.undef.abfd;
3757 struct bfd_link_hash_entry *bh = NULL;
bb700d78 3758 struct ppc_link_hash_entry *fdh;
8c5b4e52
AM
3759 flagword flags = (fh->elf.root.type == bfd_link_hash_undefweak
3760 ? BSF_WEAK
3761 : BSF_GLOBAL);
3762
3763 if (!_bfd_generic_link_add_one_symbol (info, abfd,
3764 fh->elf.root.root.string + 1,
3765 flags, bfd_und_section_ptr, 0,
3766 NULL, FALSE, FALSE, &bh))
bb700d78
AM
3767 return NULL;
3768
3769 fdh = (struct ppc_link_hash_entry *) bh;
3770 fdh->elf.non_elf = 0;
908b32fc
AM
3771 fdh->fake = 1;
3772 fdh->is_func_descriptor = 1;
3773 fdh->oh = fh;
3774 fh->is_func = 1;
3775 fh->oh = fdh;
bb700d78
AM
3776 return fdh;
3777}
3778
8387904d
AM
3779/* Fix function descriptor symbols defined in .opd sections to be
3780 function type. */
555cd476
AM
3781
3782static bfd_boolean
c16153ae 3783ppc64_elf_add_symbol_hook (bfd *ibfd,
e054468f 3784 struct bfd_link_info *info,
555cd476 3785 Elf_Internal_Sym *isym,
6911b7dc 3786 const char **name,
555cd476
AM
3787 flagword *flags ATTRIBUTE_UNUSED,
3788 asection **sec,
b53dfeb2 3789 bfd_vma *value)
555cd476 3790{
b53dfeb2 3791 if (*sec != NULL
f1885d1e 3792 && strcmp ((*sec)->name, ".opd") == 0)
b53dfeb2
AM
3793 {
3794 asection *code_sec;
3795
3796 if (!(ELF_ST_TYPE (isym->st_info) == STT_GNU_IFUNC
3797 || ELF_ST_TYPE (isym->st_info) == STT_FUNC))
3798 isym->st_info = ELF_ST_INFO (ELF_ST_BIND (isym->st_info), STT_FUNC);
3799
3800 /* If the symbol is a function defined in .opd, and the function
3801 code is in a discarded group, let it appear to be undefined. */
0e1862bb 3802 if (!bfd_link_relocatable (info)
b53dfeb2
AM
3803 && (*sec)->reloc_count != 0
3804 && opd_entry_value (*sec, *value, &code_sec, NULL,
3805 FALSE) != (bfd_vma) -1
3806 && discarded_section (code_sec))
3807 {
3808 *sec = bfd_und_section_ptr;
3809 isym->st_shndx = SHN_UNDEF;
3810 }
3811 }
dbd1e97e
AM
3812 else if (*sec != NULL
3813 && strcmp ((*sec)->name, ".toc") == 0
3814 && ELF_ST_TYPE (isym->st_info) == STT_OBJECT)
3815 {
3816 struct ppc_link_hash_table *htab = ppc_hash_table (info);
3817 if (htab != NULL)
3818 htab->params->object_in_toc = 1;
3819 }
433817dd 3820
6911b7dc
AM
3821 if ((STO_PPC64_LOCAL_MASK & isym->st_other) != 0)
3822 {
3823 if (abiversion (ibfd) == 0)
3824 set_abiversion (ibfd, 2);
3825 else if (abiversion (ibfd) == 1)
3826 {
cf97bcb0
AM
3827 _bfd_error_handler (_("symbol '%s' has invalid st_other"
3828 " for ABI version 1"), *name);
6911b7dc
AM
3829 bfd_set_error (bfd_error_bad_value);
3830 return FALSE;
3831 }
3832 }
3833
555cd476
AM
3834 return TRUE;
3835}
3836
6911b7dc
AM
3837/* Merge non-visibility st_other attributes: local entry point. */
3838
3839static void
3840ppc64_elf_merge_symbol_attribute (struct elf_link_hash_entry *h,
3841 const Elf_Internal_Sym *isym,
3842 bfd_boolean definition,
3843 bfd_boolean dynamic)
3844{
f378ab09 3845 if (definition && (!dynamic || !h->def_regular))
6911b7dc
AM
3846 h->other = ((isym->st_other & ~ELF_ST_VISIBILITY (-1))
3847 | ELF_ST_VISIBILITY (h->other));
3848}
3849
8c5b4e52
AM
3850/* Hook called on merging a symbol. We use this to clear "fake" since
3851 we now have a real symbol. */
3852
3853static bfd_boolean
3854ppc64_elf_merge_symbol (struct elf_link_hash_entry *h,
8b5f1ed8 3855 const Elf_Internal_Sym *isym,
8c5b4e52
AM
3856 asection **psec ATTRIBUTE_UNUSED,
3857 bfd_boolean newdef ATTRIBUTE_UNUSED,
3858 bfd_boolean olddef ATTRIBUTE_UNUSED,
3859 bfd *oldbfd ATTRIBUTE_UNUSED,
3860 const asection *oldsec ATTRIBUTE_UNUSED)
3861{
3862 ((struct ppc_link_hash_entry *) h)->fake = 0;
8b5f1ed8
AM
3863 if ((STO_PPC64_LOCAL_MASK & isym->st_other) != 0)
3864 ((struct ppc_link_hash_entry *) h)->non_zero_localentry = 1;
8c5b4e52
AM
3865 return TRUE;
3866}
3867
8387904d 3868/* This function makes an old ABI object reference to ".bar" cause the
908b32fc
AM
3869 inclusion of a new ABI object archive that defines "bar".
3870 NAME is a symbol defined in an archive. Return a symbol in the hash
3871 table that might be satisfied by the archive symbols. */
8387904d
AM
3872
3873static struct elf_link_hash_entry *
3874ppc64_elf_archive_symbol_lookup (bfd *abfd,
3875 struct bfd_link_info *info,
3876 const char *name)
3877{
3878 struct elf_link_hash_entry *h;
3879 char *dot_name;
3880 size_t len;
3881
3882 h = _bfd_elf_archive_symbol_lookup (abfd, info, name);
908b32fc
AM
3883 if (h != NULL
3884 /* Don't return this sym if it is a fake function descriptor
3885 created by add_symbol_adjust. */
8c5b4e52 3886 && !((struct ppc_link_hash_entry *) h)->fake)
8387904d
AM
3887 return h;
3888
3889 if (name[0] == '.')
3890 return h;
3891
3892 len = strlen (name);
3893 dot_name = bfd_alloc (abfd, len + 2);
3894 if (dot_name == NULL)
e99955cd 3895 return (struct elf_link_hash_entry *) -1;
8387904d
AM
3896 dot_name[0] = '.';
3897 memcpy (dot_name + 1, name, len + 1);
3898 h = _bfd_elf_archive_symbol_lookup (abfd, info, dot_name);
3899 bfd_release (abfd, dot_name);
3900 return h;
3901}
3902
3903/* This function satisfies all old ABI object references to ".bar" if a
99877b66
AM
3904 new ABI object defines "bar". Well, at least, undefined dot symbols
3905 are made weak. This stops later archive searches from including an
3906 object if we already have a function descriptor definition. It also
35b0ce59
AM
3907 prevents the linker complaining about undefined symbols.
3908 We also check and correct mismatched symbol visibility here. The
3909 most restrictive visibility of the function descriptor and the
3910 function entry symbol is used. */
8387904d
AM
3911
3912static bfd_boolean
b3fac117 3913add_symbol_adjust (struct ppc_link_hash_entry *eh, struct bfd_link_info *info)
8387904d 3914{
8387904d
AM
3915 struct ppc_link_hash_table *htab;
3916 struct ppc_link_hash_entry *fdh;
3917
b3fac117
AM
3918 if (eh->elf.root.type == bfd_link_hash_warning)
3919 eh = (struct ppc_link_hash_entry *) eh->elf.root.u.i.link;
8387904d 3920
8400d40d
AM
3921 if (eh->elf.root.type == bfd_link_hash_indirect)
3922 return TRUE;
3923
b3fac117
AM
3924 if (eh->elf.root.root.string[0] != '.')
3925 abort ();
8387904d 3926
b3fac117 3927 htab = ppc_hash_table (info);
4dfe6ac6
NC
3928 if (htab == NULL)
3929 return FALSE;
3930
b31867b6 3931 fdh = lookup_fdh (eh, htab);
8c5b4e52
AM
3932 if (fdh == NULL
3933 && !bfd_link_relocatable (info)
3934 && (eh->elf.root.type == bfd_link_hash_undefined
3935 || eh->elf.root.type == bfd_link_hash_undefweak)
3936 && eh->elf.ref_regular)
3937 {
3938 /* Make an undefined function descriptor sym, in order to
3939 pull in an --as-needed shared lib. Archives are handled
3940 elsewhere. */
3941 fdh = make_fdh (info, eh);
3942 if (fdh == NULL)
3943 return FALSE;
bb700d78 3944 }
8c5b4e52
AM
3945
3946 if (fdh != NULL)
8387904d 3947 {
35b0ce59
AM
3948 unsigned entry_vis = ELF_ST_VISIBILITY (eh->elf.other) - 1;
3949 unsigned descr_vis = ELF_ST_VISIBILITY (fdh->elf.other) - 1;
8c5b4e52
AM
3950
3951 /* Make both descriptor and entry symbol have the most
3952 constraining visibility of either symbol. */
35b0ce59
AM
3953 if (entry_vis < descr_vis)
3954 fdh->elf.other += entry_vis - descr_vis;
3955 else if (entry_vis > descr_vis)
3956 eh->elf.other += descr_vis - entry_vis;
3957
8c5b4e52
AM
3958 /* Propagate reference flags from entry symbol to function
3959 descriptor symbol. */
bc4e12de 3960 fdh->elf.root.non_ir_ref_regular |= eh->elf.root.non_ir_ref_regular;
4070765b 3961 fdh->elf.root.non_ir_ref_dynamic |= eh->elf.root.non_ir_ref_dynamic;
8c5b4e52
AM
3962 fdh->elf.ref_regular |= eh->elf.ref_regular;
3963 fdh->elf.ref_regular_nonweak |= eh->elf.ref_regular_nonweak;
3964
3965 if (!fdh->elf.forced_local
3966 && fdh->elf.dynindx == -1
3967 && fdh->elf.versioned != versioned_hidden
3968 && (bfd_link_dll (info)
3969 || fdh->elf.def_dynamic
3970 || fdh->elf.ref_dynamic)
3971 && (eh->elf.ref_regular
3972 || eh->elf.def_regular))
3973 {
2cdcc330 3974 if (!bfd_elf_link_record_dynamic_symbol (info, &fdh->elf))
8c5b4e52 3975 return FALSE;
35b0ce59 3976 }
8387904d 3977 }
99877b66 3978
8387904d
AM
3979 return TRUE;
3980}
3981
f6c7c3e8
AM
3982/* Set up opd section info and abiversion for IBFD, and process list
3983 of dot-symbols we made in link_hash_newfunc. */
b3fac117 3984
8387904d 3985static bfd_boolean
f6c7c3e8 3986ppc64_elf_before_check_relocs (bfd *ibfd, struct bfd_link_info *info)
8387904d 3987{
99877b66 3988 struct ppc_link_hash_table *htab;
b3fac117 3989 struct ppc_link_hash_entry **p, *eh;
459609d6 3990 asection *opd = bfd_get_section_by_name (ibfd, ".opd");
433817dd 3991
459609d6 3992 if (opd != NULL && opd->size != 0)
b3fac117 3993 {
b9399fcf
AM
3994 BFD_ASSERT (ppc64_elf_section_data (opd)->sec_type == sec_normal);
3995 ppc64_elf_section_data (opd)->sec_type = sec_opd;
3996
459609d6
AM
3997 if (abiversion (ibfd) == 0)
3998 set_abiversion (ibfd, 1);
8a2058b5 3999 else if (abiversion (ibfd) >= 2)
f6c7c3e8 4000 {
695344c0 4001 /* xgettext:c-format */
cf97bcb0
AM
4002 _bfd_error_handler (_("%pB .opd not allowed in ABI version %d"),
4003 ibfd, abiversion (ibfd));
459609d6
AM
4004 bfd_set_error (bfd_error_bad_value);
4005 return FALSE;
f6c7c3e8 4006 }
b9399fcf 4007 }
f6c7c3e8 4008
b9399fcf
AM
4009 if (is_ppc64_elf (info->output_bfd))
4010 {
4011 /* For input files without an explicit abiversion in e_flags
4012 we should have flagged any with symbol st_other bits set
4013 as ELFv1 and above flagged those with .opd as ELFv2.
4014 Set the output abiversion if not yet set, and for any input
4015 still ambiguous, take its abiversion from the output.
4016 Differences in ABI are reported later. */
4017 if (abiversion (info->output_bfd) == 0)
4018 set_abiversion (info->output_bfd, abiversion (ibfd));
4019 else if (abiversion (ibfd) == 0)
4020 set_abiversion (ibfd, abiversion (info->output_bfd));
b3fac117
AM
4021 }
4022
459609d6
AM
4023 htab = ppc_hash_table (info);
4024 if (htab == NULL)
b9399fcf 4025 return TRUE;
459609d6 4026
b9399fcf
AM
4027 if (opd != NULL && opd->size != 0
4028 && (ibfd->flags & DYNAMIC) == 0
4029 && (opd->flags & SEC_RELOC) != 0
4030 && opd->reloc_count != 0
4031 && !bfd_is_abs_section (opd->output_section)
4032 && info->gc_sections)
4033 {
4034 /* Garbage collection needs some extra help with .opd sections.
4035 We don't want to necessarily keep everything referenced by
4036 relocs in .opd, as that would keep all functions. Instead,
4037 if we reference an .opd symbol (a function descriptor), we
4038 want to keep the function code symbol's section. This is
4039 easy for global symbols, but for local syms we need to keep
4040 information about the associated function section. */
4041 bfd_size_type amt;
4042 asection **opd_sym_map;
4043 Elf_Internal_Shdr *symtab_hdr;
4044 Elf_Internal_Rela *relocs, *rel_end, *rel;
4045
4046 amt = OPD_NDX (opd->size) * sizeof (*opd_sym_map);
4047 opd_sym_map = bfd_zalloc (ibfd, amt);
4048 if (opd_sym_map == NULL)
4049 return FALSE;
4050 ppc64_elf_section_data (opd)->u.opd.func_sec = opd_sym_map;
4051 relocs = _bfd_elf_link_read_relocs (ibfd, opd, NULL, NULL,
4052 info->keep_memory);
4053 if (relocs == NULL)
4054 return FALSE;
4055 symtab_hdr = &elf_symtab_hdr (ibfd);
4056 rel_end = relocs + opd->reloc_count - 1;
4057 for (rel = relocs; rel < rel_end; rel++)
4058 {
4059 enum elf_ppc64_reloc_type r_type = ELF64_R_TYPE (rel->r_info);
4060 unsigned long r_symndx = ELF64_R_SYM (rel->r_info);
4061
4062 if (r_type == R_PPC64_ADDR64
4063 && ELF64_R_TYPE ((rel + 1)->r_info) == R_PPC64_TOC
4064 && r_symndx < symtab_hdr->sh_info)
4065 {
4066 Elf_Internal_Sym *isym;
4067 asection *s;
4068
4069 isym = bfd_sym_from_r_symndx (&htab->sym_cache, ibfd, r_symndx);
4070 if (isym == NULL)
4071 {
4072 if (elf_section_data (opd)->relocs != relocs)
4073 free (relocs);
4074 return FALSE;
4075 }
4076
4077 s = bfd_section_from_elf_index (ibfd, isym->st_shndx);
4078 if (s != NULL && s != opd)
4079 opd_sym_map[OPD_NDX (rel->r_offset)] = s;
4080 }
4081 }
4082 if (elf_section_data (opd)->relocs != relocs)
4083 free (relocs);
4084 }
459609d6
AM
4085
4086 p = &htab->dot_syms;
4087 while ((eh = *p) != NULL)
4088 {
4089 *p = NULL;
4090 if (&eh->elf == htab->elf.hgot)
4091 ;
4092 else if (htab->elf.hgot == NULL
4093 && strcmp (eh->elf.root.root.string, ".TOC.") == 0)
4094 htab->elf.hgot = &eh->elf;
8c5b4e52
AM
4095 else if (abiversion (ibfd) <= 1)
4096 {
4097 htab->need_func_desc_adj = 1;
4098 if (!add_symbol_adjust (eh, info))
4099 return FALSE;
4100 }
459609d6
AM
4101 p = &eh->u.next_dot_sym;
4102 }
b3fac117 4103 return TRUE;
8387904d
AM
4104}
4105
97fed1c9
JJ
4106/* Undo hash table changes when an --as-needed input file is determined
4107 not to be needed. */
4108
4109static bfd_boolean
e5034e59
AM
4110ppc64_elf_notice_as_needed (bfd *ibfd,
4111 struct bfd_link_info *info,
4112 enum notice_asneeded_action act)
97fed1c9 4113{
e5034e59
AM
4114 if (act == notice_not_needed)
4115 {
4116 struct ppc_link_hash_table *htab = ppc_hash_table (info);
4dfe6ac6 4117
e5034e59
AM
4118 if (htab == NULL)
4119 return FALSE;
4dfe6ac6 4120
e5034e59
AM
4121 htab->dot_syms = NULL;
4122 }
4123 return _bfd_elf_notice_as_needed (ibfd, info, act);
97fed1c9
JJ
4124}
4125
aa374f67
AM
4126/* If --just-symbols against a final linked binary, then assume we need
4127 toc adjusting stubs when calling functions defined there. */
4128
4129static void
4130ppc64_elf_link_just_syms (asection *sec, struct bfd_link_info *info)
4131{
4132 if ((sec->flags & SEC_CODE) != 0
4133 && (sec->owner->flags & (EXEC_P | DYNAMIC)) != 0
4134 && is_ppc64_elf (sec->owner))
4135 {
2c3f079f
AM
4136 if (abiversion (sec->owner) >= 2
4137 || bfd_get_section_by_name (sec->owner, ".opd") != NULL)
aa374f67
AM
4138 sec->has_toc_reloc = 1;
4139 }
4140 _bfd_elf_link_just_syms (sec, info);
4141}
4142
e054468f 4143static struct plt_entry **
4ce794b7
AM
4144update_local_sym_info (bfd *abfd, Elf_Internal_Shdr *symtab_hdr,
4145 unsigned long r_symndx, bfd_vma r_addend, int tls_type)
411e1bfb
AM
4146{
4147 struct got_entry **local_got_ents = elf_local_got_ents (abfd);
e054468f 4148 struct plt_entry **local_plt;
f961d9dd 4149 unsigned char *local_got_tls_masks;
411e1bfb
AM
4150
4151 if (local_got_ents == NULL)
4152 {
4153 bfd_size_type size = symtab_hdr->sh_info;
4154
e054468f
AM
4155 size *= (sizeof (*local_got_ents)
4156 + sizeof (*local_plt)
4157 + sizeof (*local_got_tls_masks));
4ce794b7 4158 local_got_ents = bfd_zalloc (abfd, size);
411e1bfb 4159 if (local_got_ents == NULL)
e054468f 4160 return NULL;
411e1bfb
AM
4161 elf_local_got_ents (abfd) = local_got_ents;
4162 }
4163
37da22e5 4164 if ((tls_type & (NON_GOT | TLS_EXPLICIT)) == 0)
411e1bfb
AM
4165 {
4166 struct got_entry *ent;
4167
4168 for (ent = local_got_ents[r_symndx]; ent != NULL; ent = ent->next)
e717da7e
AM
4169 if (ent->addend == r_addend
4170 && ent->owner == abfd
4171 && ent->tls_type == tls_type)
411e1bfb
AM
4172 break;
4173 if (ent == NULL)
4174 {
4175 bfd_size_type amt = sizeof (*ent);
4ce794b7 4176 ent = bfd_alloc (abfd, amt);
411e1bfb
AM
4177 if (ent == NULL)
4178 return FALSE;
4179 ent->next = local_got_ents[r_symndx];
4180 ent->addend = r_addend;
e717da7e 4181 ent->owner = abfd;
411e1bfb 4182 ent->tls_type = tls_type;
927be08e 4183 ent->is_indirect = FALSE;
411e1bfb
AM
4184 ent->got.refcount = 0;
4185 local_got_ents[r_symndx] = ent;
4186 }
4187 ent->got.refcount += 1;
4188 }
4189
e054468f 4190 local_plt = (struct plt_entry **) (local_got_ents + symtab_hdr->sh_info);
f961d9dd 4191 local_got_tls_masks = (unsigned char *) (local_plt + symtab_hdr->sh_info);
37da22e5 4192 local_got_tls_masks[r_symndx] |= tls_type & 0xff;
e054468f
AM
4193
4194 return local_plt + r_symndx;
65f38f15
AM
4195}
4196
411e1bfb 4197static bfd_boolean
e054468f 4198update_plt_info (bfd *abfd, struct plt_entry **plist, bfd_vma addend)
1e2f5b6e 4199{
411e1bfb 4200 struct plt_entry *ent;
1e2f5b6e 4201
e054468f 4202 for (ent = *plist; ent != NULL; ent = ent->next)
411e1bfb
AM
4203 if (ent->addend == addend)
4204 break;
4205 if (ent == NULL)
1e2f5b6e 4206 {
411e1bfb 4207 bfd_size_type amt = sizeof (*ent);
4ce794b7 4208 ent = bfd_alloc (abfd, amt);
411e1bfb
AM
4209 if (ent == NULL)
4210 return FALSE;
e054468f 4211 ent->next = *plist;
411e1bfb
AM
4212 ent->addend = addend;
4213 ent->plt.refcount = 0;
e054468f 4214 *plist = ent;
1e2f5b6e 4215 }
411e1bfb 4216 ent->plt.refcount += 1;
b34976b6 4217 return TRUE;
1e2f5b6e
AM
4218}
4219
e054468f
AM
4220static bfd_boolean
4221is_branch_reloc (enum elf_ppc64_reloc_type r_type)
4222{
4223 return (r_type == R_PPC64_REL24
05d0e962 4224 || r_type == R_PPC64_REL24_NOTOC
e054468f
AM
4225 || r_type == R_PPC64_REL14
4226 || r_type == R_PPC64_REL14_BRTAKEN
4227 || r_type == R_PPC64_REL14_BRNTAKEN
4228 || r_type == R_PPC64_ADDR24
4229 || r_type == R_PPC64_ADDR14
4230 || r_type == R_PPC64_ADDR14_BRTAKEN
23cedd1d
AM
4231 || r_type == R_PPC64_ADDR14_BRNTAKEN
4232 || r_type == R_PPC64_PLTCALL);
4233}
4234
4235/* Relocs on inline plt call sequence insns prior to the call. */
4236
4237static bfd_boolean
4238is_plt_seq_reloc (enum elf_ppc64_reloc_type r_type)
4239{
4240 return (r_type == R_PPC64_PLT16_HA
4241 || r_type == R_PPC64_PLT16_HI
4242 || r_type == R_PPC64_PLT16_LO
4243 || r_type == R_PPC64_PLT16_LO_DS
4244 || r_type == R_PPC64_PLTSEQ);
e054468f
AM
4245}
4246
5bd4f169 4247/* Look through the relocs for a section during the first phase, and
65f38f15 4248 calculate needed space in the global offset table, procedure
5d1634d7 4249 linkage table, and dynamic reloc sections. */
5bd4f169 4250
b34976b6 4251static bfd_boolean
4ce794b7
AM
4252ppc64_elf_check_relocs (bfd *abfd, struct bfd_link_info *info,
4253 asection *sec, const Elf_Internal_Rela *relocs)
5bd4f169 4254{
65f38f15 4255 struct ppc_link_hash_table *htab;
5bd4f169 4256 Elf_Internal_Shdr *symtab_hdr;
c7e2358a 4257 struct elf_link_hash_entry **sym_hashes;
5bd4f169
AM
4258 const Elf_Internal_Rela *rel;
4259 const Elf_Internal_Rela *rel_end;
5bd4f169 4260 asection *sreloc;
3a71aa26 4261 struct elf_link_hash_entry *tga, *dottga;
b9399fcf 4262 bfd_boolean is_opd;
5bd4f169 4263
0e1862bb 4264 if (bfd_link_relocatable (info))
b34976b6 4265 return TRUE;
5bd4f169 4266
680a3378
AM
4267 /* Don't do anything special with non-loaded, non-alloced sections.
4268 In particular, any relocs in such sections should not affect GOT
4269 and PLT reference counting (ie. we don't allow them to create GOT
4270 or PLT entries), there's no possibility or desire to optimize TLS
4271 relocs, and there's not much point in propagating relocs to shared
4272 libs that the dynamic linker won't relocate. */
4273 if ((sec->flags & SEC_ALLOC) == 0)
4274 return TRUE;
4275
0c8d6e5c 4276 BFD_ASSERT (is_ppc64_elf (abfd));
0ffa91dd 4277
65f38f15 4278 htab = ppc_hash_table (info);
4dfe6ac6
NC
4279 if (htab == NULL)
4280 return FALSE;
4281
3a71aa26
AM
4282 tga = elf_link_hash_lookup (&htab->elf, "__tls_get_addr",
4283 FALSE, FALSE, TRUE);
4284 dottga = elf_link_hash_lookup (&htab->elf, ".__tls_get_addr",
4285 FALSE, FALSE, TRUE);
0ffa91dd 4286 symtab_hdr = &elf_symtab_hdr (abfd);
5bd4f169 4287 sym_hashes = elf_sym_hashes (abfd);
5bd4f169 4288 sreloc = NULL;
b9399fcf 4289 is_opd = ppc64_elf_section_data (sec)->sec_type == sec_opd;
5bd4f169
AM
4290 rel_end = relocs + sec->reloc_count;
4291 for (rel = relocs; rel < rel_end; rel++)
4292 {
4293 unsigned long r_symndx;
4294 struct elf_link_hash_entry *h;
04c9666a 4295 enum elf_ppc64_reloc_type r_type;
727fc41e 4296 int tls_type;
7c8fe5c4 4297 struct _ppc64_elf_section_data *ppc64_sec;
cbf95972 4298 struct plt_entry **ifunc, **plt_list;
5bd4f169
AM
4299
4300 r_symndx = ELF64_R_SYM (rel->r_info);
4301 if (r_symndx < symtab_hdr->sh_info)
4302 h = NULL;
4303 else
973a3492
L
4304 {
4305 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
b31867b6 4306 h = elf_follow_link (h);
1c865ab2
AM
4307
4308 if (h == htab->elf.hgot)
4309 sec->has_toc_reloc = 1;
973a3492 4310 }
5bd4f169 4311
727fc41e 4312 tls_type = 0;
e054468f 4313 ifunc = NULL;
25f23106
AM
4314 if (h != NULL)
4315 {
4316 if (h->type == STT_GNU_IFUNC)
4317 {
4318 h->needs_plt = 1;
4319 ifunc = &h->plt.plist;
4320 }
4321 }
4322 else
4323 {
4324 Elf_Internal_Sym *isym = bfd_sym_from_r_symndx (&htab->sym_cache,
4325 abfd, r_symndx);
4326 if (isym == NULL)
4327 return FALSE;
4328
4329 if (ELF_ST_TYPE (isym->st_info) == STT_GNU_IFUNC)
4330 {
4331 ifunc = update_local_sym_info (abfd, symtab_hdr, r_symndx,
37da22e5
AM
4332 rel->r_addend,
4333 NON_GOT | PLT_IFUNC);
25f23106
AM
4334 if (ifunc == NULL)
4335 return FALSE;
4336 }
4337 }
727fc41e 4338
cbf95972 4339 r_type = ELF64_R_TYPE (rel->r_info);
a33d1f77 4340 switch (r_type)
5bd4f169 4341 {
727fc41e
AM
4342 case R_PPC64_TLSGD:
4343 case R_PPC64_TLSLD:
4344 /* These special tls relocs tie a call to __tls_get_addr with
4345 its parameter symbol. */
37da22e5
AM
4346 if (h != NULL)
4347 ((struct ppc_link_hash_entry *) h)->tls_mask |= TLS_TLS | TLS_MARK;
4348 else
4349 if (!update_local_sym_info (abfd, symtab_hdr, r_symndx,
4350 rel->r_addend,
4351 NON_GOT | TLS_TLS | TLS_MARK))
4352 return FALSE;
4353 sec->has_tls_reloc = 1;
727fc41e
AM
4354 break;
4355
411e1bfb
AM
4356 case R_PPC64_GOT_TLSLD16:
4357 case R_PPC64_GOT_TLSLD16_LO:
4358 case R_PPC64_GOT_TLSLD16_HI:
4359 case R_PPC64_GOT_TLSLD16_HA:
951fd09b 4360 tls_type = TLS_TLS | TLS_LD;
411e1bfb
AM
4361 goto dogottls;
4362
4363 case R_PPC64_GOT_TLSGD16:
4364 case R_PPC64_GOT_TLSGD16_LO:
4365 case R_PPC64_GOT_TLSGD16_HI:
4366 case R_PPC64_GOT_TLSGD16_HA:
951fd09b 4367 tls_type = TLS_TLS | TLS_GD;
411e1bfb
AM
4368 goto dogottls;
4369
4370 case R_PPC64_GOT_TPREL16_DS:
4371 case R_PPC64_GOT_TPREL16_LO_DS:
4372 case R_PPC64_GOT_TPREL16_HI:
4373 case R_PPC64_GOT_TPREL16_HA:
7c8bbca5 4374 if (bfd_link_dll (info))
411e1bfb
AM
4375 info->flags |= DF_STATIC_TLS;
4376 tls_type = TLS_TLS | TLS_TPREL;
4377 goto dogottls;
4378
4379 case R_PPC64_GOT_DTPREL16_DS:
4380 case R_PPC64_GOT_DTPREL16_LO_DS:
4381 case R_PPC64_GOT_DTPREL16_HI:
4382 case R_PPC64_GOT_DTPREL16_HA:
4383 tls_type = TLS_TLS | TLS_DTPREL;
4384 dogottls:
4385 sec->has_tls_reloc = 1;
1a0670f3 4386 /* Fall through */
411e1bfb 4387
5bd4f169 4388 case R_PPC64_GOT16:
5bd4f169 4389 case R_PPC64_GOT16_DS:
65f38f15
AM
4390 case R_PPC64_GOT16_HA:
4391 case R_PPC64_GOT16_HI:
4392 case R_PPC64_GOT16_LO:
5bd4f169 4393 case R_PPC64_GOT16_LO_DS:
65f38f15 4394 /* This symbol requires a global offset table entry. */
4c52953f 4395 sec->has_toc_reloc = 1;
33c0ec9d
AM
4396 if (r_type == R_PPC64_GOT_TLSLD16
4397 || r_type == R_PPC64_GOT_TLSGD16
4398 || r_type == R_PPC64_GOT_TPREL16_DS
4399 || r_type == R_PPC64_GOT_DTPREL16_DS
4400 || r_type == R_PPC64_GOT16
4401 || r_type == R_PPC64_GOT16_DS)
4402 {
4403 htab->do_multi_toc = 1;
d77c8a4b 4404 ppc64_elf_tdata (abfd)->has_small_toc_reloc = 1;
33c0ec9d
AM
4405 }
4406
e717da7e
AM
4407 if (ppc64_elf_tdata (abfd)->got == NULL
4408 && !create_got_section (abfd, info))
b34976b6 4409 return FALSE;
5bd4f169
AM
4410
4411 if (h != NULL)
4412 {
411e1bfb
AM
4413 struct ppc_link_hash_entry *eh;
4414 struct got_entry *ent;
65f38f15 4415
411e1bfb
AM
4416 eh = (struct ppc_link_hash_entry *) h;
4417 for (ent = eh->elf.got.glist; ent != NULL; ent = ent->next)
4418 if (ent->addend == rel->r_addend
e717da7e 4419 && ent->owner == abfd
411e1bfb
AM
4420 && ent->tls_type == tls_type)
4421 break;
4422 if (ent == NULL)
5bd4f169 4423 {
411e1bfb 4424 bfd_size_type amt = sizeof (*ent);
4ce794b7 4425 ent = bfd_alloc (abfd, amt);
411e1bfb 4426 if (ent == NULL)
b34976b6 4427 return FALSE;
411e1bfb
AM
4428 ent->next = eh->elf.got.glist;
4429 ent->addend = rel->r_addend;
e717da7e 4430 ent->owner = abfd;
411e1bfb 4431 ent->tls_type = tls_type;
927be08e 4432 ent->is_indirect = FALSE;
411e1bfb
AM
4433 ent->got.refcount = 0;
4434 eh->elf.got.glist = ent;
5bd4f169 4435 }
411e1bfb 4436 ent->got.refcount += 1;
e7b938ca 4437 eh->tls_mask |= tls_type;
5bd4f169 4438 }
411e1bfb
AM
4439 else
4440 /* This is a global offset table entry for a local symbol. */
4441 if (!update_local_sym_info (abfd, symtab_hdr, r_symndx,
4442 rel->r_addend, tls_type))
4443 return FALSE;
a345bc8d
AM
4444
4445 /* We may also need a plt entry if the symbol turns out to be
4446 an ifunc. */
0e1862bb 4447 if (h != NULL && !bfd_link_pic (info) && abiversion (abfd) != 1)
a345bc8d
AM
4448 {
4449 if (!update_plt_info (abfd, &h->plt.plist, rel->r_addend))
4450 return FALSE;
4451 }
5bd4f169
AM
4452 break;
4453
5bd4f169 4454 case R_PPC64_PLT16_HA:
65f38f15
AM
4455 case R_PPC64_PLT16_HI:
4456 case R_PPC64_PLT16_LO:
08be3224 4457 case R_PPC64_PLT16_LO_DS:
65f38f15
AM
4458 case R_PPC64_PLT32:
4459 case R_PPC64_PLT64:
cbf95972
AM
4460 /* This symbol requires a procedure linkage table entry. */
4461 plt_list = ifunc;
4462 if (h != NULL)
e054468f 4463 {
e054468f
AM
4464 h->needs_plt = 1;
4465 if (h->root.root.string[0] == '.'
4466 && h->root.root.string[1] != '\0')
4467 ((struct ppc_link_hash_entry *) h)->is_func = 1;
2d7ad24e 4468 ((struct ppc_link_hash_entry *) h)->tls_mask |= PLT_KEEP;
cbf95972
AM
4469 plt_list = &h->plt.plist;
4470 }
4471 if (plt_list == NULL)
2d7ad24e
AM
4472 plt_list = update_local_sym_info (abfd, symtab_hdr, r_symndx,
4473 rel->r_addend,
4474 NON_GOT | PLT_KEEP);
cbf95972
AM
4475 if (!update_plt_info (abfd, plt_list, rel->r_addend))
4476 return FALSE;
5bd4f169
AM
4477 break;
4478
4479 /* The following relocations don't need to propagate the
4480 relocation if linking a shared object since they are
4481 section relative. */
4482 case R_PPC64_SECTOFF:
4483 case R_PPC64_SECTOFF_LO:
4484 case R_PPC64_SECTOFF_HI:
4485 case R_PPC64_SECTOFF_HA:
4486 case R_PPC64_SECTOFF_DS:
4487 case R_PPC64_SECTOFF_LO_DS:
411e1bfb
AM
4488 case R_PPC64_DTPREL16:
4489 case R_PPC64_DTPREL16_LO:
4490 case R_PPC64_DTPREL16_HI:
4491 case R_PPC64_DTPREL16_HA:
4492 case R_PPC64_DTPREL16_DS:
4493 case R_PPC64_DTPREL16_LO_DS:
f9c6b907
AM
4494 case R_PPC64_DTPREL16_HIGH:
4495 case R_PPC64_DTPREL16_HIGHA:
411e1bfb
AM
4496 case R_PPC64_DTPREL16_HIGHER:
4497 case R_PPC64_DTPREL16_HIGHERA:
4498 case R_PPC64_DTPREL16_HIGHEST:
4499 case R_PPC64_DTPREL16_HIGHESTA:
5bd4f169
AM
4500 break;
4501
ad8e1ba5 4502 /* Nor do these. */
25f23106
AM
4503 case R_PPC64_REL16:
4504 case R_PPC64_REL16_LO:
4505 case R_PPC64_REL16_HI:
4506 case R_PPC64_REL16_HA:
4a969973
AM
4507 case R_PPC64_REL16_HIGH:
4508 case R_PPC64_REL16_HIGHA:
4509 case R_PPC64_REL16_HIGHER:
4510 case R_PPC64_REL16_HIGHERA:
4511 case R_PPC64_REL16_HIGHEST:
4512 case R_PPC64_REL16_HIGHESTA:
a680de9a 4513 case R_PPC64_REL16DX_HA:
25f23106
AM
4514 break;
4515
45965137
AM
4516 /* Not supported as a dynamic relocation. */
4517 case R_PPC64_ADDR64_LOCAL:
0e1862bb 4518 if (bfd_link_pic (info))
45965137
AM
4519 {
4520 if (!ppc64_elf_howto_table[R_PPC64_ADDR32])
4521 ppc_howto_init ();
695344c0 4522 /* xgettext:c-format */
174d0a74 4523 info->callbacks->einfo (_("%H: %s reloc unsupported "
cf97bcb0 4524 "in shared libraries and PIEs\n"),
45965137
AM
4525 abfd, sec, rel->r_offset,
4526 ppc64_elf_howto_table[r_type]->name);
4527 bfd_set_error (bfd_error_bad_value);
4528 return FALSE;
4529 }
4530 break;
4531
ad8e1ba5 4532 case R_PPC64_TOC16:
33c0ec9d
AM
4533 case R_PPC64_TOC16_DS:
4534 htab->do_multi_toc = 1;
d77c8a4b 4535 ppc64_elf_tdata (abfd)->has_small_toc_reloc = 1;
1a0670f3 4536 /* Fall through. */
ad8e1ba5
AM
4537 case R_PPC64_TOC16_LO:
4538 case R_PPC64_TOC16_HI:
4539 case R_PPC64_TOC16_HA:
ad8e1ba5 4540 case R_PPC64_TOC16_LO_DS:
4c52953f 4541 sec->has_toc_reloc = 1;
ad8e1ba5
AM
4542 break;
4543
006589cf
AM
4544 /* Marker reloc. */
4545 case R_PPC64_ENTRY:
4546 break;
4547
5bd4f169
AM
4548 /* This relocation describes the C++ object vtable hierarchy.
4549 Reconstruct it for later use during GC. */
4550 case R_PPC64_GNU_VTINHERIT:
c152c796 4551 if (!bfd_elf_gc_record_vtinherit (abfd, sec, h, rel->r_offset))
b34976b6 4552 return FALSE;
5bd4f169
AM
4553 break;
4554
4555 /* This relocation describes which C++ vtable entries are actually
4556 used. Record for later use during GC. */
4557 case R_PPC64_GNU_VTENTRY:
d17e0c6e
JB
4558 BFD_ASSERT (h != NULL);
4559 if (h != NULL
4560 && !bfd_elf_gc_record_vtentry (abfd, sec, h, rel->r_addend))
b34976b6 4561 return FALSE;
5bd4f169
AM
4562 break;
4563
721956f4
AM
4564 case R_PPC64_REL14:
4565 case R_PPC64_REL14_BRTAKEN:
4566 case R_PPC64_REL14_BRNTAKEN:
220c76dd
AM
4567 {
4568 asection *dest = NULL;
4569
4570 /* Heuristic: If jumping outside our section, chances are
4571 we are going to need a stub. */
4572 if (h != NULL)
4573 {
4574 /* If the sym is weak it may be overridden later, so
4575 don't assume we know where a weak sym lives. */
4576 if (h->root.type == bfd_link_hash_defined)
4577 dest = h->root.u.def.section;
4578 }
4579 else
87d72d41
AM
4580 {
4581 Elf_Internal_Sym *isym;
4582
4583 isym = bfd_sym_from_r_symndx (&htab->sym_cache,
4584 abfd, r_symndx);
4585 if (isym == NULL)
4586 return FALSE;
4587
4588 dest = bfd_section_from_elf_index (abfd, isym->st_shndx);
4589 }
4590
220c76dd 4591 if (dest != sec)
7c8fe5c4 4592 ppc64_elf_section_data (sec)->has_14bit_branch = 1;
220c76dd 4593 }
3e04d765
AM
4594 goto rel24;
4595
4596 case R_PPC64_PLTCALL:
4597 ppc64_elf_section_data (sec)->has_pltcall = 1;
721956f4
AM
4598 /* Fall through. */
4599
5d1634d7 4600 case R_PPC64_REL24:
05d0e962 4601 case R_PPC64_REL24_NOTOC:
3e04d765 4602 rel24:
cbf95972
AM
4603 plt_list = ifunc;
4604 if (h != NULL)
5d1634d7 4605 {
e054468f
AM
4606 h->needs_plt = 1;
4607 if (h->root.root.string[0] == '.'
4608 && h->root.root.string[1] != '\0')
4609 ((struct ppc_link_hash_entry *) h)->is_func = 1;
cbf95972 4610
3a71aa26 4611 if (h == tga || h == dottga)
cbf95972
AM
4612 {
4613 sec->has_tls_reloc = 1;
4614 if (rel != relocs
4615 && (ELF64_R_TYPE (rel[-1].r_info) == R_PPC64_TLSGD
4616 || ELF64_R_TYPE (rel[-1].r_info) == R_PPC64_TLSLD))
4617 /* We have a new-style __tls_get_addr call with
4618 a marker reloc. */
4619 ;
4620 else
4621 /* Mark this section as having an old-style call. */
4622 sec->has_tls_get_addr_call = 1;
4623 }
4624 plt_list = &h->plt.plist;
411e1bfb 4625 }
cbf95972
AM
4626
4627 /* We may need a .plt entry if the function this reloc
4628 refers to is in a shared lib. */
4629 if (plt_list
4630 && !update_plt_info (abfd, plt_list, rel->r_addend))
4631 return FALSE;
411e1bfb
AM
4632 break;
4633
cbf95972
AM
4634 case R_PPC64_ADDR14:
4635 case R_PPC64_ADDR14_BRNTAKEN:
4636 case R_PPC64_ADDR14_BRTAKEN:
4637 case R_PPC64_ADDR24:
4638 goto dodyn;
4639
411e1bfb
AM
4640 case R_PPC64_TPREL64:
4641 tls_type = TLS_EXPLICIT | TLS_TLS | TLS_TPREL;
7c8bbca5 4642 if (bfd_link_dll (info))
411e1bfb
AM
4643 info->flags |= DF_STATIC_TLS;
4644 goto dotlstoc;
4645
4646 case R_PPC64_DTPMOD64:
4647 if (rel + 1 < rel_end
4648 && rel[1].r_info == ELF64_R_INFO (r_symndx, R_PPC64_DTPREL64)
4649 && rel[1].r_offset == rel->r_offset + 8)
951fd09b 4650 tls_type = TLS_EXPLICIT | TLS_TLS | TLS_GD;
411e1bfb 4651 else
951fd09b 4652 tls_type = TLS_EXPLICIT | TLS_TLS | TLS_LD;
411e1bfb
AM
4653 goto dotlstoc;
4654
4655 case R_PPC64_DTPREL64:
4656 tls_type = TLS_EXPLICIT | TLS_TLS | TLS_DTPREL;
4657 if (rel != relocs
4658 && rel[-1].r_info == ELF64_R_INFO (r_symndx, R_PPC64_DTPMOD64)
4659 && rel[-1].r_offset == rel->r_offset - 8)
4660 /* This is the second reloc of a dtpmod, dtprel pair.
4661 Don't mark with TLS_DTPREL. */
4662 goto dodyn;
4663
4664 dotlstoc:
4665 sec->has_tls_reloc = 1;
4666 if (h != NULL)
4667 {
4668 struct ppc_link_hash_entry *eh;
4669 eh = (struct ppc_link_hash_entry *) h;
e7b938ca 4670 eh->tls_mask |= tls_type;
411e1bfb
AM
4671 }
4672 else
4673 if (!update_local_sym_info (abfd, symtab_hdr, r_symndx,
4674 rel->r_addend, tls_type))
4675 return FALSE;
4676
7c8fe5c4
AM
4677 ppc64_sec = ppc64_elf_section_data (sec);
4678 if (ppc64_sec->sec_type != sec_toc)
411e1bfb 4679 {
3a71aa26
AM
4680 bfd_size_type amt;
4681
e7b938ca 4682 /* One extra to simplify get_tls_mask. */
3a71aa26
AM
4683 amt = sec->size * sizeof (unsigned) / 8 + sizeof (unsigned);
4684 ppc64_sec->u.toc.symndx = bfd_zalloc (abfd, amt);
4685 if (ppc64_sec->u.toc.symndx == NULL)
4686 return FALSE;
4687 amt = sec->size * sizeof (bfd_vma) / 8;
4688 ppc64_sec->u.toc.add = bfd_zalloc (abfd, amt);
4689 if (ppc64_sec->u.toc.add == NULL)
411e1bfb 4690 return FALSE;
7c8fe5c4
AM
4691 BFD_ASSERT (ppc64_sec->sec_type == sec_normal);
4692 ppc64_sec->sec_type = sec_toc;
411e1bfb
AM
4693 }
4694 BFD_ASSERT (rel->r_offset % 8 == 0);
3a71aa26
AM
4695 ppc64_sec->u.toc.symndx[rel->r_offset / 8] = r_symndx;
4696 ppc64_sec->u.toc.add[rel->r_offset / 8] = rel->r_addend;
951fd09b
AM
4697
4698 /* Mark the second slot of a GD or LD entry.
4699 -1 to indicate GD and -2 to indicate LD. */
4700 if (tls_type == (TLS_EXPLICIT | TLS_TLS | TLS_GD))
3a71aa26 4701 ppc64_sec->u.toc.symndx[rel->r_offset / 8 + 1] = -1;
951fd09b 4702 else if (tls_type == (TLS_EXPLICIT | TLS_TLS | TLS_LD))
3a71aa26 4703 ppc64_sec->u.toc.symndx[rel->r_offset / 8 + 1] = -2;
411e1bfb
AM
4704 goto dodyn;
4705
4706 case R_PPC64_TPREL16:
4707 case R_PPC64_TPREL16_LO:
4708 case R_PPC64_TPREL16_HI:
4709 case R_PPC64_TPREL16_HA:
4710 case R_PPC64_TPREL16_DS:
4711 case R_PPC64_TPREL16_LO_DS:
f9c6b907
AM
4712 case R_PPC64_TPREL16_HIGH:
4713 case R_PPC64_TPREL16_HIGHA:
411e1bfb
AM
4714 case R_PPC64_TPREL16_HIGHER:
4715 case R_PPC64_TPREL16_HIGHERA:
4716 case R_PPC64_TPREL16_HIGHEST:
4717 case R_PPC64_TPREL16_HIGHESTA:
7c8bbca5
AM
4718 if (bfd_link_dll (info))
4719 info->flags |= DF_STATIC_TLS;
4720 goto dodyn;
5d1634d7 4721
e86ce104 4722 case R_PPC64_ADDR64:
b9399fcf 4723 if (is_opd
1e2f5b6e 4724 && rel + 1 < rel_end
4ce794b7 4725 && ELF64_R_TYPE ((rel + 1)->r_info) == R_PPC64_TOC)
1e2f5b6e 4726 {
8387904d 4727 if (h != NULL)
8c5b4e52 4728 ((struct ppc_link_hash_entry *) h)->is_func = 1;
1e2f5b6e 4729 }
e86ce104
AM
4730 /* Fall through. */
4731
65f38f15
AM
4732 case R_PPC64_ADDR16:
4733 case R_PPC64_ADDR16_DS:
4734 case R_PPC64_ADDR16_HA:
4735 case R_PPC64_ADDR16_HI:
f9c6b907
AM
4736 case R_PPC64_ADDR16_HIGH:
4737 case R_PPC64_ADDR16_HIGHA:
65f38f15
AM
4738 case R_PPC64_ADDR16_HIGHER:
4739 case R_PPC64_ADDR16_HIGHERA:
4740 case R_PPC64_ADDR16_HIGHEST:
4741 case R_PPC64_ADDR16_HIGHESTA:
4742 case R_PPC64_ADDR16_LO:
4743 case R_PPC64_ADDR16_LO_DS:
0e1862bb 4744 if (h != NULL && !bfd_link_pic (info) && abiversion (abfd) != 1
a345bc8d
AM
4745 && rel->r_addend == 0)
4746 {
4747 /* We may need a .plt entry if this reloc refers to a
4748 function in a shared lib. */
4749 if (!update_plt_info (abfd, &h->plt.plist, rel->r_addend))
4750 return FALSE;
4751 h->pointer_equality_needed = 1;
4752 }
4753 /* Fall through. */
4754
4755 case R_PPC64_REL30:
4756 case R_PPC64_REL32:
4757 case R_PPC64_REL64:
65f38f15 4758 case R_PPC64_ADDR32:
65f38f15
AM
4759 case R_PPC64_UADDR16:
4760 case R_PPC64_UADDR32:
4761 case R_PPC64_UADDR64:
5bd4f169 4762 case R_PPC64_TOC:
0e1862bb 4763 if (h != NULL && !bfd_link_pic (info))
81848ca0 4764 /* We may need a copy reloc. */
f5385ebf 4765 h->non_got_ref = 1;
81848ca0 4766
41bd81ab 4767 /* Don't propagate .opd relocs. */
b9399fcf 4768 if (NO_OPD_RELOCS && is_opd)
e86ce104 4769 break;
e86ce104 4770
65f38f15
AM
4771 /* If we are creating a shared library, and this is a reloc
4772 against a global symbol, or a non PC relative reloc
4773 against a local symbol, then we need to copy the reloc
4774 into the shared library. However, if we are linking with
4775 -Bsymbolic, we do not need to copy a reloc against a
4776 global symbol which is defined in an object we are
4777 including in the link (i.e., DEF_REGULAR is set). At
4778 this point we have not seen all the input files, so it is
4779 possible that DEF_REGULAR is not set now but will be set
4780 later (it is never cleared). In case of a weak definition,
4781 DEF_REGULAR may be cleared later by a strong definition in
4782 a shared library. We account for that possibility below by
f4656909 4783 storing information in the dyn_relocs field of the hash
65f38f15
AM
4784 table entry. A similar situation occurs when creating
4785 shared libraries and symbol visibility changes render the
4786 symbol local.
4787
4788 If on the other hand, we are creating an executable, we
4789 may need to keep relocations for symbols satisfied by a
4790 dynamic library if we manage to avoid copy relocs for the
4791 symbol. */
411e1bfb 4792 dodyn:
0e1862bb 4793 if ((bfd_link_pic (info)
1d483afe 4794 && (must_be_dyn_reloc (info, r_type)
65f38f15 4795 || (h != NULL
198f1157 4796 && (!SYMBOLIC_BIND (info, h)
65f38f15 4797 || h->root.type == bfd_link_hash_defweak
f5385ebf 4798 || !h->def_regular))))
f4656909 4799 || (ELIMINATE_COPY_RELOCS
0e1862bb 4800 && !bfd_link_pic (info)
65f38f15
AM
4801 && h != NULL
4802 && (h->root.type == bfd_link_hash_defweak
25f23106 4803 || !h->def_regular))
0e1862bb 4804 || (!bfd_link_pic (info)
25f23106 4805 && ifunc != NULL))
5bd4f169 4806 {
65f38f15
AM
4807 /* We must copy these reloc types into the output file.
4808 Create a reloc section in dynobj and make room for
4809 this reloc. */
5bd4f169
AM
4810 if (sreloc == NULL)
4811 {
83bac4b0
NC
4812 sreloc = _bfd_elf_make_dynamic_reloc_section
4813 (sec, htab->elf.dynobj, 3, abfd, /*rela?*/ TRUE);
65f38f15 4814
5bd4f169 4815 if (sreloc == NULL)
83bac4b0 4816 return FALSE;
5bd4f169
AM
4817 }
4818
65f38f15
AM
4819 /* If this is a global symbol, we count the number of
4820 relocations we need for this symbol. */
4821 if (h != NULL)
4822 {
19e08130
AM
4823 struct elf_dyn_relocs *p;
4824 struct elf_dyn_relocs **head;
4825
ec338859 4826 head = &((struct ppc_link_hash_entry *) h)->dyn_relocs;
19e08130
AM
4827 p = *head;
4828 if (p == NULL || p->sec != sec)
4829 {
4830 p = bfd_alloc (htab->elf.dynobj, sizeof *p);
4831 if (p == NULL)
4832 return FALSE;
4833 p->next = *head;
4834 *head = p;
4835 p->sec = sec;
4836 p->count = 0;
4837 p->pc_count = 0;
4838 }
4839 p->count += 1;
4840 if (!must_be_dyn_reloc (info, r_type))
4841 p->pc_count += 1;
65f38f15
AM
4842 }
4843 else
4844 {
ec338859
AM
4845 /* Track dynamic relocs needed for local syms too.
4846 We really need local syms available to do this
4847 easily. Oh well. */
19e08130
AM
4848 struct ppc_dyn_relocs *p;
4849 struct ppc_dyn_relocs **head;
4850 bfd_boolean is_ifunc;
ec338859 4851 asection *s;
6edfbbad 4852 void *vpp;
87d72d41 4853 Elf_Internal_Sym *isym;
6edfbbad 4854
87d72d41
AM
4855 isym = bfd_sym_from_r_symndx (&htab->sym_cache,
4856 abfd, r_symndx);
4857 if (isym == NULL)
b34976b6 4858 return FALSE;
ec338859 4859
87d72d41
AM
4860 s = bfd_section_from_elf_index (abfd, isym->st_shndx);
4861 if (s == NULL)
4862 s = sec;
4863
6edfbbad 4864 vpp = &elf_section_data (s)->local_dynrel;
19e08130
AM
4865 head = (struct ppc_dyn_relocs **) vpp;
4866 is_ifunc = ELF_ST_TYPE (isym->st_info) == STT_GNU_IFUNC;
4867 p = *head;
4868 if (p != NULL && p->sec == sec && p->ifunc != is_ifunc)
4869 p = p->next;
4870 if (p == NULL || p->sec != sec || p->ifunc != is_ifunc)
4871 {
4872 p = bfd_alloc (htab->elf.dynobj, sizeof *p);
4873 if (p == NULL)
4874 return FALSE;
4875 p->next = *head;
4876 *head = p;
4877 p->sec = sec;
4878 p->ifunc = is_ifunc;
4879 p->count = 0;
4880 }
4881 p->count += 1;
ec338859 4882 }
65f38f15 4883 }
5bd4f169 4884 break;
65f38f15
AM
4885
4886 default:
96e0dda4 4887 break;
5bd4f169
AM
4888 }
4889 }
4890
b34976b6 4891 return TRUE;
5bd4f169
AM
4892}
4893
ee67d69a
AM
4894/* Merge backend specific data from an object file to the output
4895 object file when linking. */
4896
4897static bfd_boolean
50e03d47 4898ppc64_elf_merge_private_bfd_data (bfd *ibfd, struct bfd_link_info *info)
ee67d69a 4899{
50e03d47 4900 bfd *obfd = info->output_bfd;
ee67d69a
AM
4901 unsigned long iflags, oflags;
4902
4903 if ((ibfd->flags & BFD_LINKER_CREATED) != 0)
4904 return TRUE;
4905
4906 if (!is_ppc64_elf (ibfd) || !is_ppc64_elf (obfd))
4907 return TRUE;
4908
50e03d47 4909 if (!_bfd_generic_verify_endian_match (ibfd, info))
ee67d69a
AM
4910 return FALSE;
4911
4912 iflags = elf_elfheader (ibfd)->e_flags;
4913 oflags = elf_elfheader (obfd)->e_flags;
4914
f6c7c3e8 4915 if (iflags & ~EF_PPC64_ABI)
ee67d69a 4916 {
4eca0228 4917 _bfd_error_handler
695344c0 4918 /* xgettext:c-format */
871b3ab2 4919 (_("%pB uses unknown e_flags 0x%lx"), ibfd, iflags);
ee67d69a
AM
4920 bfd_set_error (bfd_error_bad_value);
4921 return FALSE;
4922 }
f6c7c3e8 4923 else if (iflags != oflags && iflags != 0)
ee67d69a 4924 {
4eca0228 4925 _bfd_error_handler
695344c0 4926 /* xgettext:c-format */
871b3ab2 4927 (_("%pB: ABI version %ld is not compatible with ABI version %ld output"),
ee67d69a
AM
4928 ibfd, iflags, oflags);
4929 bfd_set_error (bfd_error_bad_value);
4930 return FALSE;
4931 }
4932
4a91d0ba
AM
4933 if (!_bfd_elf_ppc_merge_fp_attributes (ibfd, info))
4934 return FALSE;
005d79fd 4935
ee67d69a 4936 /* Merge Tag_compatibility attributes and any common GNU ones. */
8d2c8c3d 4937 return _bfd_elf_merge_object_attributes (ibfd, info);
ee67d69a
AM
4938}
4939
4940static bfd_boolean
4941ppc64_elf_print_private_bfd_data (bfd *abfd, void *ptr)
4942{
4943 /* Print normal ELF private data. */
4944 _bfd_elf_print_private_bfd_data (abfd, ptr);
4945
4946 if (elf_elfheader (abfd)->e_flags != 0)
4947 {
4948 FILE *file = ptr;
4949
ee67d69a
AM
4950 fprintf (file, _("private flags = 0x%lx:"),
4951 elf_elfheader (abfd)->e_flags);
4952
4953 if ((elf_elfheader (abfd)->e_flags & EF_PPC64_ABI) != 0)
4954 fprintf (file, _(" [abiv%ld]"),
4955 elf_elfheader (abfd)->e_flags & EF_PPC64_ABI);
4956 fputc ('\n', file);
4957 }
4958
4959 return TRUE;
4960}
4961
8387904d 4962/* OFFSET in OPD_SEC specifies a function descriptor. Return the address
b53dfeb2
AM
4963 of the code entry point, and its section, which must be in the same
4964 object as OPD_SEC. Returns (bfd_vma) -1 on error. */
8387904d
AM
4965
4966static bfd_vma
4967opd_entry_value (asection *opd_sec,
4968 bfd_vma offset,
4969 asection **code_sec,
aef36ac1
AM
4970 bfd_vma *code_off,
4971 bfd_boolean in_code_sec)
8387904d
AM
4972{
4973 bfd *opd_bfd = opd_sec->owner;
8860955f 4974 Elf_Internal_Rela *relocs;
8387904d 4975 Elf_Internal_Rela *lo, *hi, *look;
645ea6a9 4976 bfd_vma val;
8387904d 4977
9f296da3
AM
4978 /* No relocs implies we are linking a --just-symbols object, or looking
4979 at a final linked executable with addr2line or somesuch. */
4b85d634
AM
4980 if (opd_sec->reloc_count == 0)
4981 {
729eabd5 4982 bfd_byte *contents = ppc64_elf_tdata (opd_bfd)->opd.contents;
3b36f7e6 4983
729eabd5
AM
4984 if (contents == NULL)
4985 {
4986 if (!bfd_malloc_and_get_section (opd_bfd, opd_sec, &contents))
4987 return (bfd_vma) -1;
4988 ppc64_elf_tdata (opd_bfd)->opd.contents = contents;
4989 }
ee1e4ede 4990
dbb3fbbb 4991 /* PR 17512: file: 64b9dfbb. */
451dfd38 4992 if (offset + 7 >= opd_sec->size || offset + 7 < offset)
dbb3fbbb
NC
4993 return (bfd_vma) -1;
4994
729eabd5 4995 val = bfd_get_64 (opd_bfd, contents + offset);
aef36ac1
AM
4996 if (code_sec != NULL)
4997 {
4998 asection *sec, *likely = NULL;
ee1e4ede 4999
aef36ac1 5000 if (in_code_sec)
4b85d634 5001 {
aef36ac1
AM
5002 sec = *code_sec;
5003 if (sec->vma <= val
5004 && val < sec->vma + sec->size)
5005 likely = sec;
5006 else
5007 val = -1;
5008 }
5009 else
5010 for (sec = opd_bfd->sections; sec != NULL; sec = sec->next)
5011 if (sec->vma <= val
5012 && (sec->flags & SEC_LOAD) != 0
5013 && (sec->flags & SEC_ALLOC) != 0)
5014 likely = sec;
5015 if (likely != NULL)
5016 {
5017 *code_sec = likely;
5018 if (code_off != NULL)
5019 *code_off = val - likely->vma;
4b85d634
AM
5020 }
5021 }
aef36ac1 5022 return val;
4b85d634
AM
5023 }
5024
0c8d6e5c 5025 BFD_ASSERT (is_ppc64_elf (opd_bfd));
0ffa91dd 5026
729eabd5 5027 relocs = ppc64_elf_tdata (opd_bfd)->opd.relocs;
8860955f
AM
5028 if (relocs == NULL)
5029 relocs = _bfd_elf_link_read_relocs (opd_bfd, opd_sec, NULL, NULL, TRUE);
877a8638
NC
5030 /* PR 17512: file: df8e1fd6. */
5031 if (relocs == NULL)
5032 return (bfd_vma) -1;
645ea6a9 5033
8387904d 5034 /* Go find the opd reloc at the sym address. */
8860955f 5035 lo = relocs;
8387904d 5036 hi = lo + opd_sec->reloc_count - 1; /* ignore last reloc */
645ea6a9 5037 val = (bfd_vma) -1;
8387904d
AM
5038 while (lo < hi)
5039 {
5040 look = lo + (hi - lo) / 2;
5041 if (look->r_offset < offset)
5042 lo = look + 1;
5043 else if (look->r_offset > offset)
5044 hi = look;
5045 else
5046 {
0ffa91dd
NC
5047 Elf_Internal_Shdr *symtab_hdr = &elf_symtab_hdr (opd_bfd);
5048
8387904d
AM
5049 if (ELF64_R_TYPE (look->r_info) == R_PPC64_ADDR64
5050 && ELF64_R_TYPE ((look + 1)->r_info) == R_PPC64_TOC)
5051 {
5052 unsigned long symndx = ELF64_R_SYM (look->r_info);
b53dfeb2 5053 asection *sec = NULL;
8387904d 5054
b53dfeb2
AM
5055 if (symndx >= symtab_hdr->sh_info
5056 && elf_sym_hashes (opd_bfd) != NULL)
8387904d
AM
5057 {
5058 struct elf_link_hash_entry **sym_hashes;
5059 struct elf_link_hash_entry *rh;
5060
5061 sym_hashes = elf_sym_hashes (opd_bfd);
5062 rh = sym_hashes[symndx - symtab_hdr->sh_info];
128205bb
AM
5063 if (rh != NULL)
5064 {
5065 rh = elf_follow_link (rh);
bb854a36
AM
5066 if (rh->root.type != bfd_link_hash_defined
5067 && rh->root.type != bfd_link_hash_defweak)
5068 break;
5069 if (rh->root.u.def.section->owner == opd_bfd)
b53dfeb2 5070 {
bb854a36
AM
5071 val = rh->root.u.def.value;
5072 sec = rh->root.u.def.section;
b53dfeb2
AM
5073 }
5074 }
5075 }
5076
5077 if (sec == NULL)
5078 {
5079 Elf_Internal_Sym *sym;
5080
5081 if (symndx < symtab_hdr->sh_info)
5082 {
5083 sym = (Elf_Internal_Sym *) symtab_hdr->contents;
5084 if (sym == NULL)
5085 {
5086 size_t symcnt = symtab_hdr->sh_info;
5087 sym = bfd_elf_get_elf_syms (opd_bfd, symtab_hdr,
5088 symcnt, 0,
5089 NULL, NULL, NULL);
5090 if (sym == NULL)
5091 break;
5092 symtab_hdr->contents = (bfd_byte *) sym;
5093 }
5094 sym += symndx;
128205bb
AM
5095 }
5096 else
5097 {
b53dfeb2
AM
5098 sym = bfd_elf_get_elf_syms (opd_bfd, symtab_hdr,
5099 1, symndx,
5100 NULL, NULL, NULL);
128205bb
AM
5101 if (sym == NULL)
5102 break;
128205bb 5103 }
b53dfeb2
AM
5104 sec = bfd_section_from_elf_index (opd_bfd, sym->st_shndx);
5105 if (sec == NULL)
5106 break;
5107 BFD_ASSERT ((sec->flags & SEC_MERGE) == 0);
5108 val = sym->st_value;
8387904d 5109 }
b53dfeb2 5110
8387904d
AM
5111 val += look->r_addend;
5112 if (code_off != NULL)
5113 *code_off = val;
5114 if (code_sec != NULL)
aef36ac1
AM
5115 {
5116 if (in_code_sec && *code_sec != sec)
5117 return -1;
5118 else
5119 *code_sec = sec;
5120 }
b53dfeb2 5121 if (sec->output_section != NULL)
8387904d 5122 val += sec->output_section->vma + sec->output_offset;
8387904d
AM
5123 }
5124 break;
5125 }
5126 }
645ea6a9 5127
645ea6a9 5128 return val;
8387904d
AM
5129}
5130
aef36ac1
AM
5131/* If the ELF symbol SYM might be a function in SEC, return the
5132 function size and set *CODE_OFF to the function's entry point,
5133 otherwise return zero. */
9f296da3 5134
aef36ac1
AM
5135static bfd_size_type
5136ppc64_elf_maybe_function_sym (const asymbol *sym, asection *sec,
5137 bfd_vma *code_off)
9f296da3 5138{
aef36ac1
AM
5139 bfd_size_type size;
5140
5141 if ((sym->flags & (BSF_SECTION_SYM | BSF_FILE | BSF_OBJECT
5142 | BSF_THREAD_LOCAL | BSF_RELC | BSF_SRELC)) != 0)
5143 return 0;
5144
5145 size = 0;
5146 if (!(sym->flags & BSF_SYNTHETIC))
5147 size = ((elf_symbol_type *) sym)->internal_elf_sym.st_size;
5148
5149 if (strcmp (sym->section->name, ".opd") == 0)
9f296da3 5150 {
b07bca4e
AM
5151 struct _opd_sec_data *opd = get_opd_info (sym->section);
5152 bfd_vma symval = sym->value;
5153
5154 if (opd != NULL
5155 && opd->adjust != NULL
5156 && elf_section_data (sym->section)->relocs != NULL)
5157 {
5158 /* opd_entry_value will use cached relocs that have been
5159 adjusted, but with raw symbols. That means both local
5160 and global symbols need adjusting. */
5161 long adjust = opd->adjust[OPD_NDX (symval)];
5162 if (adjust == -1)
5163 return 0;
5164 symval += adjust;
5165 }
5166
5167 if (opd_entry_value (sym->section, symval,
aef36ac1
AM
5168 &sec, code_off, TRUE) == (bfd_vma) -1)
5169 return 0;
5170 /* An old ABI binary with dot-syms has a size of 24 on the .opd
5171 symbol. This size has nothing to do with the code size of the
5172 function, which is what we're supposed to return, but the
5173 code size isn't available without looking up the dot-sym.
5174 However, doing that would be a waste of time particularly
5175 since elf_find_function will look at the dot-sym anyway.
5176 Now, elf_find_function will keep the largest size of any
5177 function sym found at the code address of interest, so return
5178 1 here to avoid it incorrectly caching a larger function size
5179 for a small function. This does mean we return the wrong
5180 size for a new-ABI function of size 24, but all that does is
5181 disable caching for such functions. */
5182 if (size == 24)
5183 size = 1;
9f296da3 5184 }
aef36ac1
AM
5185 else
5186 {
5187 if (sym->section != sec)
5188 return 0;
5189 *code_off = sym->value;
5190 }
5191 if (size == 0)
5192 size = 1;
5193 return size;
9f296da3
AM
5194}
5195
f378ab09
AM
5196/* Return true if symbol is a strong function defined in an ELFv2
5197 object with st_other localentry bits of zero, ie. its local entry
5198 point coincides with its global entry point. */
5199
5200static bfd_boolean
5201is_elfv2_localentry0 (struct elf_link_hash_entry *h)
5202{
5203 return (h != NULL
5204 && h->type == STT_FUNC
5205 && h->root.type == bfd_link_hash_defined
5206 && (STO_PPC64_LOCAL_MASK & h->other) == 0
8b5f1ed8 5207 && !((struct ppc_link_hash_entry *) h)->non_zero_localentry
f378ab09
AM
5208 && is_ppc64_elf (h->root.u.def.section->owner)
5209 && abiversion (h->root.u.def.section->owner) >= 2);
5210}
5211
854b41e7
AM
5212/* Return true if symbol is defined in a regular object file. */
5213
5214static bfd_boolean
5215is_static_defined (struct elf_link_hash_entry *h)
5216{
5217 return ((h->root.type == bfd_link_hash_defined
5218 || h->root.type == bfd_link_hash_defweak)
5219 && h->root.u.def.section != NULL
5220 && h->root.u.def.section->output_section != NULL);
5221}
5222
b31867b6
AM
5223/* If FDH is a function descriptor symbol, return the associated code
5224 entry symbol if it is defined. Return NULL otherwise. */
5225
5226static struct ppc_link_hash_entry *
5227defined_code_entry (struct ppc_link_hash_entry *fdh)
5228{
5229 if (fdh->is_func_descriptor)
5230 {
5231 struct ppc_link_hash_entry *fh = ppc_follow_link (fdh->oh);
5232 if (fh->elf.root.type == bfd_link_hash_defined
5233 || fh->elf.root.type == bfd_link_hash_defweak)
5234 return fh;
5235 }
5236 return NULL;
5237}
5238
5239/* If FH is a function code entry symbol, return the associated
5240 function descriptor symbol if it is defined. Return NULL otherwise. */
5241
5242static struct ppc_link_hash_entry *
5243defined_func_desc (struct ppc_link_hash_entry *fh)
5244{
5245 if (fh->oh != NULL
5246 && fh->oh->is_func_descriptor)
5247 {
5248 struct ppc_link_hash_entry *fdh = ppc_follow_link (fh->oh);
5249 if (fdh->elf.root.type == bfd_link_hash_defined
5250 || fdh->elf.root.type == bfd_link_hash_defweak)
5251 return fdh;
5252 }
5253 return NULL;
5254}
5255
8c5b4e52
AM
5256static bfd_boolean func_desc_adjust (struct elf_link_hash_entry *, void *);
5257
5258/* Garbage collect sections, after first dealing with dot-symbols. */
5259
5260static bfd_boolean
5261ppc64_elf_gc_sections (bfd *abfd, struct bfd_link_info *info)
5262{
5263 struct ppc_link_hash_table *htab = ppc_hash_table (info);
5264
5265 if (htab != NULL && htab->need_func_desc_adj)
5266 {
5267 elf_link_hash_traverse (&htab->elf, func_desc_adjust, info);
5268 htab->need_func_desc_adj = 0;
5269 }
5270 return bfd_elf_gc_sections (abfd, info);
5271}
5272
74f0fb50
AM
5273/* Mark all our entry sym sections, both opd and code section. */
5274
5275static void
5276ppc64_elf_gc_keep (struct bfd_link_info *info)
5277{
5278 struct ppc_link_hash_table *htab = ppc_hash_table (info);
5279 struct bfd_sym_chain *sym;
5280
4dfe6ac6
NC
5281 if (htab == NULL)
5282 return;
5283
74f0fb50
AM
5284 for (sym = info->gc_sym_list; sym != NULL; sym = sym->next)
5285 {
b31867b6 5286 struct ppc_link_hash_entry *eh, *fh;
74f0fb50
AM
5287 asection *sec;
5288
5289 eh = (struct ppc_link_hash_entry *)
b31867b6 5290 elf_link_hash_lookup (&htab->elf, sym->name, FALSE, FALSE, TRUE);
74f0fb50
AM
5291 if (eh == NULL)
5292 continue;
5293 if (eh->elf.root.type != bfd_link_hash_defined
5294 && eh->elf.root.type != bfd_link_hash_defweak)
5295 continue;
5296
b31867b6
AM
5297 fh = defined_code_entry (eh);
5298 if (fh != NULL)
74f0fb50 5299 {
b31867b6 5300 sec = fh->elf.root.u.def.section;
74f0fb50
AM
5301 sec->flags |= SEC_KEEP;
5302 }
5303 else if (get_opd_info (eh->elf.root.u.def.section) != NULL
5304 && opd_entry_value (eh->elf.root.u.def.section,
5305 eh->elf.root.u.def.value,
aef36ac1 5306 &sec, NULL, FALSE) != (bfd_vma) -1)
74f0fb50
AM
5307 sec->flags |= SEC_KEEP;
5308
5309 sec = eh->elf.root.u.def.section;
5310 sec->flags |= SEC_KEEP;
5311 }
5312}
5313
64d03ab5
AM
5314/* Mark sections containing dynamically referenced symbols. When
5315 building shared libraries, we must assume that any visible symbol is
5316 referenced. */
5317
5318static bfd_boolean
5319ppc64_elf_gc_mark_dynamic_ref (struct elf_link_hash_entry *h, void *inf)
5320{
5321 struct bfd_link_info *info = (struct bfd_link_info *) inf;
5322 struct ppc_link_hash_entry *eh = (struct ppc_link_hash_entry *) h;
b31867b6 5323 struct ppc_link_hash_entry *fdh;
b407645f 5324 struct bfd_elf_dynamic_list *d = info->dynamic_list;
64d03ab5 5325
64d03ab5 5326 /* Dynamic linking info is on the func descriptor sym. */
b31867b6
AM
5327 fdh = defined_func_desc (eh);
5328 if (fdh != NULL)
5329 eh = fdh;
64d03ab5
AM
5330
5331 if ((eh->elf.root.type == bfd_link_hash_defined
5332 || eh->elf.root.type == bfd_link_hash_defweak)
87e79a65 5333 && ((eh->elf.ref_dynamic && !eh->elf.forced_local)
1c9177d9 5334 || ((eh->elf.def_regular || ELF_COMMON_DEF_P (&eh->elf))
64d03ab5 5335 && ELF_ST_VISIBILITY (eh->elf.other) != STV_INTERNAL
4c58e0d8 5336 && ELF_ST_VISIBILITY (eh->elf.other) != STV_HIDDEN
0e1862bb 5337 && (!bfd_link_executable (info)
e278ae05 5338 || info->gc_keep_exported
b407645f
AM
5339 || info->export_dynamic
5340 || (eh->elf.dynamic
5341 && d != NULL
2cdcc330
AM
5342 && (*d->match) (&d->head, NULL,
5343 eh->elf.root.root.string)))
e278ae05 5344 && (eh->elf.versioned >= versioned
4c58e0d8
AM
5345 || !bfd_hide_sym_by_version (info->version_info,
5346 eh->elf.root.root.string)))))
64d03ab5
AM
5347 {
5348 asection *code_sec;
b31867b6 5349 struct ppc_link_hash_entry *fh;
64d03ab5
AM
5350
5351 eh->elf.root.u.def.section->flags |= SEC_KEEP;
5352
5353 /* Function descriptor syms cause the associated
5354 function code sym section to be marked. */
b31867b6
AM
5355 fh = defined_code_entry (eh);
5356 if (fh != NULL)
5357 {
5358 code_sec = fh->elf.root.u.def.section;
5359 code_sec->flags |= SEC_KEEP;
5360 }
64d03ab5
AM
5361 else if (get_opd_info (eh->elf.root.u.def.section) != NULL
5362 && opd_entry_value (eh->elf.root.u.def.section,
5363 eh->elf.root.u.def.value,
aef36ac1 5364 &code_sec, NULL, FALSE) != (bfd_vma) -1)
64d03ab5
AM
5365 code_sec->flags |= SEC_KEEP;
5366 }
5367
5368 return TRUE;
5369}
5370
5bd4f169
AM
5371/* Return the section that should be marked against GC for a given
5372 relocation. */
5373
5374static asection *
4ce794b7 5375ppc64_elf_gc_mark_hook (asection *sec,
fb34365b 5376 struct bfd_link_info *info,
4ce794b7
AM
5377 Elf_Internal_Rela *rel,
5378 struct elf_link_hash_entry *h,
5379 Elf_Internal_Sym *sym)
5bd4f169 5380{
ccfa59ea
AM
5381 asection *rsec;
5382
ccfa59ea
AM
5383 /* Syms return NULL if we're marking .opd, so we avoid marking all
5384 function sections, as all functions are referenced in .opd. */
5385 rsec = NULL;
5386 if (get_opd_info (sec) != NULL)
5387 return rsec;
1e2f5b6e 5388
5bd4f169
AM
5389 if (h != NULL)
5390 {
04c9666a 5391 enum elf_ppc64_reloc_type r_type;
b31867b6 5392 struct ppc_link_hash_entry *eh, *fh, *fdh;
a33d1f77 5393
4ce794b7 5394 r_type = ELF64_R_TYPE (rel->r_info);
a33d1f77 5395 switch (r_type)
5bd4f169
AM
5396 {
5397 case R_PPC64_GNU_VTINHERIT:
5398 case R_PPC64_GNU_VTENTRY:
5399 break;
5400
5401 default:
5402 switch (h->root.type)
5403 {
5404 case bfd_link_hash_defined:
5405 case bfd_link_hash_defweak:
ccfa59ea 5406 eh = (struct ppc_link_hash_entry *) h;
b31867b6
AM
5407 fdh = defined_func_desc (eh);
5408 if (fdh != NULL)
8c5b4e52
AM
5409 {
5410 /* -mcall-aixdesc code references the dot-symbol on
5411 a call reloc. Mark the function descriptor too
5412 against garbage collection. */
5413 fdh->elf.mark = 1;
60d67dc8
AM
5414 if (fdh->elf.is_weakalias)
5415 weakdef (&fdh->elf)->mark = 1;
8c5b4e52
AM
5416 eh = fdh;
5417 }
1e2f5b6e
AM
5418
5419 /* Function descriptor syms cause the associated
5420 function code sym section to be marked. */
b31867b6
AM
5421 fh = defined_code_entry (eh);
5422 if (fh != NULL)
ccfa59ea
AM
5423 {
5424 /* They also mark their opd section. */
74f0fb50 5425 eh->elf.root.u.def.section->gc_mark = 1;
ccfa59ea 5426
b31867b6 5427 rsec = fh->elf.root.u.def.section;
ccfa59ea 5428 }
8387904d
AM
5429 else if (get_opd_info (eh->elf.root.u.def.section) != NULL
5430 && opd_entry_value (eh->elf.root.u.def.section,
5431 eh->elf.root.u.def.value,
aef36ac1 5432 &rsec, NULL, FALSE) != (bfd_vma) -1)
74f0fb50 5433 eh->elf.root.u.def.section->gc_mark = 1;
ccfa59ea 5434 else
1e2f5b6e
AM
5435 rsec = h->root.u.def.section;
5436 break;
5bd4f169
AM
5437
5438 case bfd_link_hash_common:
1e2f5b6e
AM
5439 rsec = h->root.u.c.p->section;
5440 break;
5bd4f169
AM
5441
5442 default:
fb34365b 5443 return _bfd_elf_gc_mark_hook (sec, info, rel, h, sym);
5bd4f169
AM
5444 }
5445 }
5446 }
5447 else
5448 {
74f0fb50 5449 struct _opd_sec_data *opd;
1e2f5b6e
AM
5450
5451 rsec = bfd_section_from_elf_index (sec->owner, sym->st_shndx);
74f0fb50
AM
5452 opd = get_opd_info (rsec);
5453 if (opd != NULL && opd->func_sec != NULL)
ccfa59ea 5454 {
74f0fb50 5455 rsec->gc_mark = 1;
ccfa59ea 5456
51aecdc5 5457 rsec = opd->func_sec[OPD_NDX (sym->st_value + rel->r_addend)];
ccfa59ea 5458 }
5bd4f169
AM
5459 }
5460
1e2f5b6e 5461 return rsec;
5bd4f169
AM
5462}
5463
deb0e272
AM
5464/* The maximum size of .sfpr. */
5465#define SFPR_MAX (218*4)
5466
5467struct sfpr_def_parms
5468{
699733f6
AM
5469 const char name[12];
5470 unsigned char lo, hi;
2cdcc330
AM
5471 bfd_byte *(*write_ent) (bfd *, bfd_byte *, int);
5472 bfd_byte *(*write_tail) (bfd *, bfd_byte *, int);
deb0e272
AM
5473};
5474
a4b6fadd
AM
5475/* Auto-generate _save*, _rest* functions in .sfpr.
5476 If STUB_SEC is non-null, define alias symbols in STUB_SEC
5477 instead. */
deb0e272 5478
4dfe6ac6 5479static bfd_boolean
a4b6fadd
AM
5480sfpr_define (struct bfd_link_info *info,
5481 const struct sfpr_def_parms *parm,
5482 asection *stub_sec)
deb0e272
AM
5483{
5484 struct ppc_link_hash_table *htab = ppc_hash_table (info);
5485 unsigned int i;
5486 size_t len = strlen (parm->name);
5487 bfd_boolean writing = FALSE;
699733f6 5488 char sym[16];
deb0e272 5489
4dfe6ac6
NC
5490 if (htab == NULL)
5491 return FALSE;
5492
deb0e272
AM
5493 memcpy (sym, parm->name, len);
5494 sym[len + 2] = 0;
5495
5496 for (i = parm->lo; i <= parm->hi; i++)
5497 {
a4b6fadd 5498 struct ppc_link_hash_entry *h;
deb0e272
AM
5499
5500 sym[len + 0] = i / 10 + '0';
5501 sym[len + 1] = i % 10 + '0';
a4b6fadd 5502 h = (struct ppc_link_hash_entry *)
b32547cd 5503 elf_link_hash_lookup (&htab->elf, sym, writing, TRUE, TRUE);
a4b6fadd 5504 if (stub_sec != NULL)
deb0e272 5505 {
a4b6fadd
AM
5506 if (h != NULL
5507 && h->elf.root.type == bfd_link_hash_defined
5508 && h->elf.root.u.def.section == htab->sfpr)
5509 {
5510 struct elf_link_hash_entry *s;
5511 char buf[32];
5512 sprintf (buf, "%08x.%s", stub_sec->id & 0xffffffff, sym);
5513 s = elf_link_hash_lookup (&htab->elf, buf, TRUE, TRUE, FALSE);
5514 if (s == NULL)
5515 return FALSE;
5516 if (s->root.type == bfd_link_hash_new
5517 || (s->root.type = bfd_link_hash_defined
5518 && s->root.u.def.section == stub_sec))
5519 {
5520 s->root.type = bfd_link_hash_defined;
5521 s->root.u.def.section = stub_sec;
7dda8d3c 5522 s->root.u.def.value = (stub_sec->size - htab->sfpr->size
a4b6fadd
AM
5523 + h->elf.root.u.def.value);
5524 s->ref_regular = 1;
5525 s->def_regular = 1;
5526 s->ref_regular_nonweak = 1;
5527 s->forced_local = 1;
5528 s->non_elf = 0;
5529 s->root.linker_def = 1;
5530 }
5531 }
5532 continue;
5533 }
5534 if (h != NULL)
5535 {
5536 h->save_res = 1;
5537 if (!h->elf.def_regular)
deb0e272 5538 {
a4b6fadd
AM
5539 h->elf.root.type = bfd_link_hash_defined;
5540 h->elf.root.u.def.section = htab->sfpr;
5541 h->elf.root.u.def.value = htab->sfpr->size;
5542 h->elf.type = STT_FUNC;
5543 h->elf.def_regular = 1;
b32547cd 5544 h->elf.non_elf = 0;
a4b6fadd
AM
5545 _bfd_elf_link_hash_hide_symbol (info, &h->elf, TRUE);
5546 writing = TRUE;
deb0e272 5547 if (htab->sfpr->contents == NULL)
a4b6fadd 5548 {
2cdcc330
AM
5549 htab->sfpr->contents
5550 = bfd_alloc (htab->elf.dynobj, SFPR_MAX);
a4b6fadd
AM
5551 if (htab->sfpr->contents == NULL)
5552 return FALSE;
5553 }
deb0e272
AM
5554 }
5555 }
5556 if (writing)
5557 {
5558 bfd_byte *p = htab->sfpr->contents + htab->sfpr->size;
5559 if (i != parm->hi)
5560 p = (*parm->write_ent) (htab->elf.dynobj, p, i);
5561 else
5562 p = (*parm->write_tail) (htab->elf.dynobj, p, i);
5563 htab->sfpr->size = p - htab->sfpr->contents;
5564 }
5565 }
5566
5567 return TRUE;
5568}
5569
5570static bfd_byte *
5571savegpr0 (bfd *abfd, bfd_byte *p, int r)
5572{
5573 bfd_put_32 (abfd, STD_R0_0R1 + (r << 21) + (1 << 16) - (32 - r) * 8, p);
5574 return p + 4;
5575}
5576
5577static bfd_byte *
5578savegpr0_tail (bfd *abfd, bfd_byte *p, int r)
5579{
5580 p = savegpr0 (abfd, p, r);
a078d95a 5581 bfd_put_32 (abfd, STD_R0_0R1 + STK_LR, p);
deb0e272
AM
5582 p = p + 4;
5583 bfd_put_32 (abfd, BLR, p);
5584 return p + 4;
5585}
5586
5587static bfd_byte *
5588restgpr0 (bfd *abfd, bfd_byte *p, int r)
5589{
5590 bfd_put_32 (abfd, LD_R0_0R1 + (r << 21) + (1 << 16) - (32 - r) * 8, p);
5591 return p + 4;
5592}
5593
5594static bfd_byte *
5595restgpr0_tail (bfd *abfd, bfd_byte *p, int r)
5596{
a078d95a 5597 bfd_put_32 (abfd, LD_R0_0R1 + STK_LR, p);
deb0e272
AM
5598 p = p + 4;
5599 p = restgpr0 (abfd, p, r);
5600 bfd_put_32 (abfd, MTLR_R0, p);
5601 p = p + 4;
5602 if (r == 29)
5603 {
5604 p = restgpr0 (abfd, p, 30);
5605 p = restgpr0 (abfd, p, 31);
5606 }
5607 bfd_put_32 (abfd, BLR, p);
5608 return p + 4;
5609}
5610
5611static bfd_byte *
5612savegpr1 (bfd *abfd, bfd_byte *p, int r)
5613{
5614 bfd_put_32 (abfd, STD_R0_0R12 + (r << 21) + (1 << 16) - (32 - r) * 8, p);
5615 return p + 4;
5616}
5617
5618static bfd_byte *
5619savegpr1_tail (bfd *abfd, bfd_byte *p, int r)
5620{
5621 p = savegpr1 (abfd, p, r);
5622 bfd_put_32 (abfd, BLR, p);
5623 return p + 4;
5624}
5625
5626static bfd_byte *
5627restgpr1 (bfd *abfd, bfd_byte *p, int r)
5628{
5629 bfd_put_32 (abfd, LD_R0_0R12 + (r << 21) + (1 << 16) - (32 - r) * 8, p);
5630 return p + 4;
5631}
5632
5633static bfd_byte *
5634restgpr1_tail (bfd *abfd, bfd_byte *p, int r)
5635{
5636 p = restgpr1 (abfd, p, r);
5637 bfd_put_32 (abfd, BLR, p);
5638 return p + 4;
5639}
5640
5641static bfd_byte *
5642savefpr (bfd *abfd, bfd_byte *p, int r)
5643{
5644 bfd_put_32 (abfd, STFD_FR0_0R1 + (r << 21) + (1 << 16) - (32 - r) * 8, p);
5645 return p + 4;
5646}
5647
5648static bfd_byte *
5649savefpr0_tail (bfd *abfd, bfd_byte *p, int r)
5650{
5651 p = savefpr (abfd, p, r);
a078d95a 5652 bfd_put_32 (abfd, STD_R0_0R1 + STK_LR, p);
deb0e272
AM
5653 p = p + 4;
5654 bfd_put_32 (abfd, BLR, p);
5655 return p + 4;
5656}
5657
5658static bfd_byte *
5659restfpr (bfd *abfd, bfd_byte *p, int r)
5660{
5661 bfd_put_32 (abfd, LFD_FR0_0R1 + (r << 21) + (1 << 16) - (32 - r) * 8, p);
5662 return p + 4;
5663}
5664
5665static bfd_byte *
5666restfpr0_tail (bfd *abfd, bfd_byte *p, int r)
5667{
a078d95a 5668 bfd_put_32 (abfd, LD_R0_0R1 + STK_LR, p);
deb0e272
AM
5669 p = p + 4;
5670 p = restfpr (abfd, p, r);
5671 bfd_put_32 (abfd, MTLR_R0, p);
5672 p = p + 4;
5673 if (r == 29)
5674 {
5675 p = restfpr (abfd, p, 30);
5676 p = restfpr (abfd, p, 31);
5677 }
5678 bfd_put_32 (abfd, BLR, p);
5679 return p + 4;
5680}
5681
5682static bfd_byte *
5683savefpr1_tail (bfd *abfd, bfd_byte *p, int r)
5684{
5685 p = savefpr (abfd, p, r);
5686 bfd_put_32 (abfd, BLR, p);
5687 return p + 4;
5688}
5689
5690static bfd_byte *
5691restfpr1_tail (bfd *abfd, bfd_byte *p, int r)
5692{
5693 p = restfpr (abfd, p, r);
5694 bfd_put_32 (abfd, BLR, p);
5695 return p + 4;
5696}
5697
5698static bfd_byte *
5699savevr (bfd *abfd, bfd_byte *p, int r)
5700{
5701 bfd_put_32 (abfd, LI_R12_0 + (1 << 16) - (32 - r) * 16, p);
5702 p = p + 4;
5703 bfd_put_32 (abfd, STVX_VR0_R12_R0 + (r << 21), p);
5704 return p + 4;
5705}
5706
5707static bfd_byte *
5708savevr_tail (bfd *abfd, bfd_byte *p, int r)
5709{
5710 p = savevr (abfd, p, r);
5711 bfd_put_32 (abfd, BLR, p);
5712 return p + 4;
5713}
5714
5715static bfd_byte *
5716restvr (bfd *abfd, bfd_byte *p, int r)
5717{
5718 bfd_put_32 (abfd, LI_R12_0 + (1 << 16) - (32 - r) * 16, p);
5719 p = p + 4;
5720 bfd_put_32 (abfd, LVX_VR0_R12_R0 + (r << 21), p);
5721 return p + 4;
5722}
5723
5724static bfd_byte *
5725restvr_tail (bfd *abfd, bfd_byte *p, int r)
5726{
5727 p = restvr (abfd, p, r);
5728 bfd_put_32 (abfd, BLR, p);
5729 return p + 4;
5730}
5731
e86ce104
AM
5732/* Called via elf_link_hash_traverse to transfer dynamic linking
5733 information on function code symbol entries to their corresponding
5734 function descriptor symbol entries. */
deb0e272 5735
b34976b6 5736static bfd_boolean
4ce794b7 5737func_desc_adjust (struct elf_link_hash_entry *h, void *inf)
5bd4f169 5738{
e86ce104 5739 struct bfd_link_info *info;
65f38f15 5740 struct ppc_link_hash_table *htab;
50bc7936
AM
5741 struct ppc_link_hash_entry *fh;
5742 struct ppc_link_hash_entry *fdh;
5743 bfd_boolean force_local;
5bd4f169 5744
50bc7936
AM
5745 fh = (struct ppc_link_hash_entry *) h;
5746 if (fh->elf.root.type == bfd_link_hash_indirect)
b34976b6 5747 return TRUE;
e86ce104 5748
8c5b4e52
AM
5749 if (!fh->is_func)
5750 return TRUE;
5751
5752 if (fh->elf.root.root.string[0] != '.'
5753 || fh->elf.root.root.string[1] == '\0')
5754 return TRUE;
5755
4ce794b7 5756 info = inf;
65f38f15 5757 htab = ppc_hash_table (info);
4dfe6ac6
NC
5758 if (htab == NULL)
5759 return FALSE;
5bd4f169 5760
8c5b4e52
AM
5761 /* Find the corresponding function descriptor symbol. */
5762 fdh = lookup_fdh (fh, htab);
5763
c09bdfe5
AM
5764 /* Resolve undefined references to dot-symbols as the value
5765 in the function descriptor, if we have one in a regular object.
5766 This is to satisfy cases like ".quad .foo". Calls to functions
5767 in dynamic objects are handled elsewhere. */
8c5b4e52
AM
5768 if ((fh->elf.root.type == bfd_link_hash_undefined
5769 || fh->elf.root.type == bfd_link_hash_undefweak)
5770 && (fdh->elf.root.type == bfd_link_hash_defined
5771 || fdh->elf.root.type == bfd_link_hash_defweak)
b31867b6
AM
5772 && get_opd_info (fdh->elf.root.u.def.section) != NULL
5773 && opd_entry_value (fdh->elf.root.u.def.section,
5774 fdh->elf.root.u.def.value,
c09bdfe5 5775 &fh->elf.root.u.def.section,
aef36ac1 5776 &fh->elf.root.u.def.value, FALSE) != (bfd_vma) -1)
c09bdfe5 5777 {
b31867b6 5778 fh->elf.root.type = fdh->elf.root.type;
f5385ebf 5779 fh->elf.forced_local = 1;
b31867b6
AM
5780 fh->elf.def_regular = fdh->elf.def_regular;
5781 fh->elf.def_dynamic = fdh->elf.def_dynamic;
c09bdfe5
AM
5782 }
5783
8c5b4e52
AM
5784 if (!fh->elf.dynamic)
5785 {
5786 struct plt_entry *ent;
5bd4f169 5787
8c5b4e52
AM
5788 for (ent = fh->elf.plt.plist; ent != NULL; ent = ent->next)
5789 if (ent->plt.refcount > 0)
5790 break;
5791 if (ent == NULL)
5792 return TRUE;
5793 }
5bd4f169 5794
8c5b4e52 5795 /* Create a descriptor as undefined if necessary. */
50bc7936 5796 if (fdh == NULL
0e1862bb 5797 && !bfd_link_executable (info)
50bc7936
AM
5798 && (fh->elf.root.type == bfd_link_hash_undefined
5799 || fh->elf.root.type == bfd_link_hash_undefweak))
5800 {
908b32fc 5801 fdh = make_fdh (info, fh);
bb700d78
AM
5802 if (fdh == NULL)
5803 return FALSE;
50bc7936 5804 }
648cca2c 5805
8c5b4e52 5806 /* We can't support overriding of symbols on a fake descriptor. */
908b32fc
AM
5807 if (fdh != NULL
5808 && fdh->fake
8c5b4e52
AM
5809 && (fh->elf.root.type == bfd_link_hash_defined
5810 || fh->elf.root.type == bfd_link_hash_defweak))
5811 _bfd_elf_link_hash_hide_symbol (info, &fdh->elf, TRUE);
908b32fc 5812
8c5b4e52
AM
5813 /* Transfer dynamic linking information to the function descriptor. */
5814 if (fdh != NULL)
5815 {
f5385ebf
AM
5816 fdh->elf.ref_regular |= fh->elf.ref_regular;
5817 fdh->elf.ref_dynamic |= fh->elf.ref_dynamic;
5818 fdh->elf.ref_regular_nonweak |= fh->elf.ref_regular_nonweak;
5819 fdh->elf.non_got_ref |= fh->elf.non_got_ref;
8c5b4e52
AM
5820 fdh->elf.dynamic |= fh->elf.dynamic;
5821 fdh->elf.needs_plt |= (fh->elf.needs_plt
5822 || fh->elf.type == STT_FUNC
5823 || fh->elf.type == STT_GNU_IFUNC);
5824 move_plt_plist (fh, fdh);
5825
5826 if (!fdh->elf.forced_local
5827 && fh->elf.dynindx != -1)
5828 if (!bfd_elf_link_record_dynamic_symbol (info, &fdh->elf))
5829 return FALSE;
e86ce104
AM
5830 }
5831
50bc7936
AM
5832 /* Now that the info is on the function descriptor, clear the
5833 function code sym info. Any function code syms for which we
5834 don't have a definition in a regular file, we force local.
5835 This prevents a shared library from exporting syms that have
5836 been imported from another library. Function code syms that
5837 are really in the library we must leave global to prevent the
5838 linker dragging in a definition from a static library. */
93f3fa99
AM
5839 force_local = (!fh->elf.def_regular
5840 || fdh == NULL
5841 || !fdh->elf.def_regular
5842 || fdh->elf.forced_local);
50bc7936
AM
5843 _bfd_elf_link_hash_hide_symbol (info, &fh->elf, force_local);
5844
b34976b6 5845 return TRUE;
e86ce104 5846}
40b8271b 5847
a4b6fadd
AM
5848static const struct sfpr_def_parms save_res_funcs[] =
5849 {
5850 { "_savegpr0_", 14, 31, savegpr0, savegpr0_tail },
5851 { "_restgpr0_", 14, 29, restgpr0, restgpr0_tail },
5852 { "_restgpr0_", 30, 31, restgpr0, restgpr0_tail },
5853 { "_savegpr1_", 14, 31, savegpr1, savegpr1_tail },
5854 { "_restgpr1_", 14, 31, restgpr1, restgpr1_tail },
5855 { "_savefpr_", 14, 31, savefpr, savefpr0_tail },
5856 { "_restfpr_", 14, 29, restfpr, restfpr0_tail },
5857 { "_restfpr_", 30, 31, restfpr, restfpr0_tail },
5858 { "._savef", 14, 31, savefpr, savefpr1_tail },
5859 { "._restf", 14, 31, restfpr, restfpr1_tail },
5860 { "_savevr_", 20, 31, savevr, savevr_tail },
5861 { "_restvr_", 20, 31, restvr, restvr_tail }
5862 };
5863
e86ce104 5864/* Called near the start of bfd_elf_size_dynamic_sections. We use
82bd7b59
AM
5865 this hook to a) provide some gcc support functions, and b) transfer
5866 dynamic linking information gathered so far on function code symbol
5867 entries, to their corresponding function descriptor symbol entries. */
deb0e272 5868
b34976b6 5869static bfd_boolean
4ce794b7
AM
5870ppc64_elf_func_desc_adjust (bfd *obfd ATTRIBUTE_UNUSED,
5871 struct bfd_link_info *info)
e86ce104
AM
5872{
5873 struct ppc_link_hash_table *htab;
5874
5875 htab = ppc_hash_table (info);
4dfe6ac6
NC
5876 if (htab == NULL)
5877 return FALSE;
5878
b32547cd
AM
5879 /* Provide any missing _save* and _rest* functions. */
5880 if (htab->sfpr != NULL)
5881 {
5882 unsigned int i;
5883
5884 htab->sfpr->size = 0;
5885 for (i = 0; i < ARRAY_SIZE (save_res_funcs); i++)
5886 if (!sfpr_define (info, &save_res_funcs[i], NULL))
5887 return FALSE;
5888 if (htab->sfpr->size == 0)
5889 htab->sfpr->flags |= SEC_EXCLUDE;
5890 }
5891
5892 if (bfd_link_relocatable (info))
5893 return TRUE;
5894
5895 if (htab->elf.hgot != NULL)
dba6fa9b
AM
5896 {
5897 _bfd_elf_link_hash_hide_symbol (info, htab->elf.hgot, TRUE);
5898 /* Make .TOC. defined so as to prevent it being made dynamic.
5899 The wrong value here is fixed later in ppc64_elf_set_toc. */
43417696
AM
5900 if (!htab->elf.hgot->def_regular
5901 || htab->elf.hgot->root.type != bfd_link_hash_defined)
5902 {
5903 htab->elf.hgot->root.type = bfd_link_hash_defined;
5904 htab->elf.hgot->root.u.def.value = 0;
5905 htab->elf.hgot->root.u.def.section = bfd_abs_section_ptr;
5906 htab->elf.hgot->def_regular = 1;
5907 htab->elf.hgot->root.linker_def = 1;
5908 }
dba6fa9b 5909 htab->elf.hgot->type = STT_OBJECT;
2cdcc330
AM
5910 htab->elf.hgot->other
5911 = (htab->elf.hgot->other & ~ELF_ST_VISIBILITY (-1)) | STV_HIDDEN;
dba6fa9b 5912 }
c66bb0ee 5913
8c5b4e52
AM
5914 if (htab->need_func_desc_adj)
5915 {
5916 elf_link_hash_traverse (&htab->elf, func_desc_adjust, info);
5917 htab->need_func_desc_adj = 0;
5918 }
805fc799 5919
b34976b6 5920 return TRUE;
e86ce104
AM
5921}
5922
98bbb1b8 5923/* Find dynamic relocs for H that apply to read-only sections. */
a345bc8d 5924
98bbb1b8 5925static asection *
a345bc8d
AM
5926readonly_dynrelocs (struct elf_link_hash_entry *h)
5927{
5928 struct ppc_link_hash_entry *eh;
5929 struct elf_dyn_relocs *p;
5930
5931 eh = (struct ppc_link_hash_entry *) h;
5932 for (p = eh->dyn_relocs; p != NULL; p = p->next)
5933 {
5934 asection *s = p->sec->output_section;
5935
5936 if (s != NULL && (s->flags & SEC_READONLY) != 0)
98bbb1b8 5937 return p->sec;
a345bc8d 5938 }
98bbb1b8 5939 return NULL;
a345bc8d
AM
5940}
5941
d311bc8b 5942/* Return true if we have dynamic relocs against H or any of its weak
ab2477e1
AM
5943 aliases, that apply to read-only sections. Cannot be used after
5944 size_dynamic_sections. */
d311bc8b
AM
5945
5946static bfd_boolean
5947alias_readonly_dynrelocs (struct elf_link_hash_entry *h)
5948{
5949 struct ppc_link_hash_entry *eh;
5950
5951 eh = (struct ppc_link_hash_entry *) h;
5952 do
5953 {
5954 if (readonly_dynrelocs (&eh->elf))
5955 return TRUE;
ab2477e1 5956 eh = (struct ppc_link_hash_entry *) eh->elf.u.alias;
2cdcc330
AM
5957 }
5958 while (eh != NULL && &eh->elf != h);
d311bc8b
AM
5959
5960 return FALSE;
5961}
8a2058b5 5962
8a9e8e72
AM
5963/* Return whether EH has pc-relative dynamic relocs. */
5964
5965static bfd_boolean
5966pc_dynrelocs (struct ppc_link_hash_entry *eh)
5967{
5968 struct elf_dyn_relocs *p;
5969
5970 for (p = eh->dyn_relocs; p != NULL; p = p->next)
5971 if (p->pc_count != 0)
5972 return TRUE;
5973 return FALSE;
5974}
5975
8a2058b5
AM
5976/* Return true if a global entry stub will be created for H. Valid
5977 for ELFv2 before plt entries have been allocated. */
5978
5979static bfd_boolean
5980global_entry_stub (struct elf_link_hash_entry *h)
5981{
5982 struct plt_entry *pent;
5983
5984 if (!h->pointer_equality_needed
5985 || h->def_regular)
5986 return FALSE;
5987
5988 for (pent = h->plt.plist; pent != NULL; pent = pent->next)
5989 if (pent->plt.refcount > 0
5990 && pent->addend == 0)
5991 return TRUE;
5992
5993 return FALSE;
5994}
5995
e86ce104
AM
5996/* Adjust a symbol defined by a dynamic object and referenced by a
5997 regular object. The current definition is in some section of the
5998 dynamic object, but we're not including those sections. We have to
5999 change the definition to something the rest of the link can
6000 understand. */
6001
b34976b6 6002static bfd_boolean
4ce794b7
AM
6003ppc64_elf_adjust_dynamic_symbol (struct bfd_link_info *info,
6004 struct elf_link_hash_entry *h)
e86ce104
AM
6005{
6006 struct ppc_link_hash_table *htab;
5474d94f 6007 asection *s, *srel;
e86ce104
AM
6008
6009 htab = ppc_hash_table (info);
4dfe6ac6
NC
6010 if (htab == NULL)
6011 return FALSE;
e86ce104
AM
6012
6013 /* Deal with function syms. */
6014 if (h->type == STT_FUNC
e054468f 6015 || h->type == STT_GNU_IFUNC
f5385ebf 6016 || h->needs_plt)
e86ce104 6017 {
529fe20e
AM
6018 bfd_boolean local = (((struct ppc_link_hash_entry *) h)->save_res
6019 || SYMBOL_CALLS_LOCAL (info, h)
6020 || UNDEFWEAK_NO_DYNAMIC_RELOC (info, h));
6021 /* Discard dyn_relocs when non-pic if we've decided that a
6022 function symbol is local and not an ifunc. We keep dynamic
6023 relocs for ifuncs when local rather than always emitting a
6024 plt call stub for them and defining the symbol on the call
6025 stub. We can't do that for ELFv1 anyway (a function symbol
6026 is defined on a descriptor, not code) and it can be faster at
6027 run-time due to not needing to bounce through a stub. The
6028 dyn_relocs for ifuncs will be applied even in a static
6029 executable. */
6030 if (!bfd_link_pic (info)
6031 && h->type != STT_GNU_IFUNC
6032 && local)
6033 ((struct ppc_link_hash_entry *) h)->dyn_relocs = NULL;
6034
e86ce104
AM
6035 /* Clear procedure linkage table information for any symbol that
6036 won't need a .plt entry. */
411e1bfb
AM
6037 struct plt_entry *ent;
6038 for (ent = h->plt.plist; ent != NULL; ent = ent->next)
6039 if (ent->plt.refcount > 0)
6040 break;
8387904d 6041 if (ent == NULL
2d7ad24e
AM
6042 || (h->type != STT_GNU_IFUNC
6043 && local
3e04d765
AM
6044 && (htab->can_convert_all_inline_plt
6045 || (((struct ppc_link_hash_entry *) h)->tls_mask
6046 & (TLS_TLS | PLT_KEEP)) != PLT_KEEP)))
40b8271b 6047 {
411e1bfb 6048 h->plt.plist = NULL;
f5385ebf 6049 h->needs_plt = 0;
d1eca1e4 6050 h->pointer_equality_needed = 0;
40b8271b 6051 }
8a2058b5 6052 else if (abiversion (info->output_bfd) >= 2)
a345bc8d 6053 {
d1eca1e4
AM
6054 /* Taking a function's address in a read/write section
6055 doesn't require us to define the function symbol in the
6056 executable on a global entry stub. A dynamic reloc can
8a2058b5
AM
6057 be used instead. The reason we prefer a few more dynamic
6058 relocs is that calling via a global entry stub costs a
6059 few more instructions, and pointer_equality_needed causes
6060 extra work in ld.so when resolving these symbols. */
529fe20e 6061 if (global_entry_stub (h))
d1eca1e4 6062 {
ab2477e1 6063 if (!readonly_dynrelocs (h))
529fe20e
AM
6064 {
6065 h->pointer_equality_needed = 0;
04383fd1
AM
6066 /* If we haven't seen a branch reloc and the symbol
6067 isn't an ifunc then we don't need a plt entry. */
529fe20e
AM
6068 if (!h->needs_plt)
6069 h->plt.plist = NULL;
6070 }
6071 else if (!bfd_link_pic (info))
6072 /* We are going to be defining the function symbol on the
6073 plt stub, so no dyn_relocs needed when non-pic. */
6074 ((struct ppc_link_hash_entry *) h)->dyn_relocs = NULL;
d1eca1e4
AM
6075 }
6076
3988aed5
AM
6077 /* ELFv2 function symbols can't have copy relocs. */
6078 return TRUE;
6079 }
6080 else if (!h->needs_plt
ab2477e1 6081 && !readonly_dynrelocs (h))
3988aed5 6082 {
04383fd1
AM
6083 /* If we haven't seen a branch reloc and the symbol isn't an
6084 ifunc then we don't need a plt entry. */
3988aed5
AM
6085 h->plt.plist = NULL;
6086 h->pointer_equality_needed = 0;
a345bc8d
AM
6087 return TRUE;
6088 }
5bd4f169 6089 }
bbd7ec4a 6090 else
411e1bfb 6091 h->plt.plist = NULL;
5bd4f169
AM
6092
6093 /* If this is a weak symbol, and there is a real definition, the
6094 processor independent code will have arranged for us to see the
6095 real definition first, and we can just use the same value. */
60d67dc8 6096 if (h->is_weakalias)
5bd4f169 6097 {
60d67dc8
AM
6098 struct elf_link_hash_entry *def = weakdef (h);
6099 BFD_ASSERT (def->root.type == bfd_link_hash_defined);
6100 h->root.u.def.section = def->root.u.def.section;
6101 h->root.u.def.value = def->root.u.def.value;
4a7e5234
AM
6102 if (def->root.u.def.section == htab->elf.sdynbss
6103 || def->root.u.def.section == htab->elf.sdynrelro)
6104 ((struct ppc_link_hash_entry *) h)->dyn_relocs = NULL;
b34976b6 6105 return TRUE;
5bd4f169
AM
6106 }
6107
5bd4f169
AM
6108 /* If we are creating a shared library, we must presume that the
6109 only references to the symbol are via the global offset table.
6110 For such cases we need not do anything here; the relocations will
6111 be handled correctly by relocate_section. */
0e1862bb 6112 if (bfd_link_pic (info))
b34976b6 6113 return TRUE;
5bd4f169 6114
65f38f15
AM
6115 /* If there are no references to this symbol that do not use the
6116 GOT, we don't need to generate a copy reloc. */
f5385ebf 6117 if (!h->non_got_ref)
b34976b6 6118 return TRUE;
65f38f15 6119
b186458a 6120 /* Don't generate a copy reloc for symbols defined in the executable. */
d93d1c80 6121 if (!h->def_dynamic || !h->ref_regular || h->def_regular
b186458a 6122
d93d1c80
AM
6123 /* If -z nocopyreloc was given, don't generate them either. */
6124 || info->nocopyreloc
a127494f 6125
dce2246a 6126 /* If we don't find any dynamic relocs in read-only sections, then
d93d1c80 6127 we'll be keeping the dynamic relocs and avoiding the copy reloc. */
d311bc8b 6128 || (ELIMINATE_COPY_RELOCS && !alias_readonly_dynrelocs (h))
65f38f15 6129
d93d1c80
AM
6130 /* Protected variables do not work with .dynbss. The copy in
6131 .dynbss won't be used by the shared library with the protected
6132 definition for the variable. Text relocations are preferable
6133 to an incorrect program. */
6134 || h->protected_def)
529fe20e 6135 return TRUE;
a127494f 6136
5d35169e 6137 if (h->plt.plist != NULL)
97b639ba
AM
6138 {
6139 /* We should never get here, but unfortunately there are versions
6140 of gcc out there that improperly (for this ABI) put initialized
6141 function pointers, vtable refs and suchlike in read-only
6142 sections. Allow them to proceed, but warn that this might
6143 break at runtime. */
25f53a85 6144 info->callbacks->einfo
c1c8c1ef 6145 (_("%P: copy reloc against `%pT' requires lazy plt linking; "
25f53a85 6146 "avoid setting LD_BIND_NOW=1 or upgrade gcc\n"),
97b639ba
AM
6147 h->root.root.string);
6148 }
5d35169e
AM
6149
6150 /* This is a reference to a symbol defined by a dynamic object which
6151 is not a function. */
6152
5bd4f169
AM
6153 /* We must allocate the symbol in our .dynbss section, which will
6154 become part of the .bss section of the executable. There will be
6155 an entry for this symbol in the .dynsym section. The dynamic
6156 object will contain position independent code, so all references
6157 from the dynamic object to this symbol will go through the global
6158 offset table. The dynamic linker will use the .dynsym entry to
6159 determine the address it must put in the global offset table, so
6160 both the dynamic object and the regular object will refer to the
6161 same memory location for the variable. */
5474d94f
AM
6162 if ((h->root.u.def.section->flags & SEC_READONLY) != 0)
6163 {
6164 s = htab->elf.sdynrelro;
6165 srel = htab->elf.sreldynrelro;
6166 }
6167 else
6168 {
6169 s = htab->elf.sdynbss;
6170 srel = htab->elf.srelbss;
6171 }
1d7e9d18 6172 if ((h->root.u.def.section->flags & SEC_ALLOC) != 0 && h->size != 0)
5bd4f169 6173 {
4a7e5234
AM
6174 /* We must generate a R_PPC64_COPY reloc to tell the dynamic
6175 linker to copy the initial value out of the dynamic object
6176 and into the runtime process image. */
5474d94f 6177 srel->size += sizeof (Elf64_External_Rela);
f5385ebf 6178 h->needs_copy = 1;
5bd4f169
AM
6179 }
6180
529fe20e
AM
6181 /* We no longer want dyn_relocs. */
6182 ((struct ppc_link_hash_entry *) h)->dyn_relocs = NULL;
6cabe1ea 6183 return _bfd_elf_adjust_dynamic_copy (info, h, s);
5bd4f169
AM
6184}
6185
e86ce104
AM
6186/* If given a function descriptor symbol, hide both the function code
6187 sym and the descriptor. */
6188static void
4ce794b7
AM
6189ppc64_elf_hide_symbol (struct bfd_link_info *info,
6190 struct elf_link_hash_entry *h,
6191 bfd_boolean force_local)
e86ce104 6192{
34814b9f 6193 struct ppc_link_hash_entry *eh;
e86ce104
AM
6194 _bfd_elf_link_hash_hide_symbol (info, h, force_local);
6195
34814b9f
AM
6196 eh = (struct ppc_link_hash_entry *) h;
6197 if (eh->is_func_descriptor)
e86ce104 6198 {
34814b9f 6199 struct ppc_link_hash_entry *fh = eh->oh;
e86ce104 6200
721956f4 6201 if (fh == NULL)
d1329ca3
AM
6202 {
6203 const char *p, *q;
b8ac2841 6204 struct elf_link_hash_table *htab = elf_hash_table (info);
d1329ca3
AM
6205 char save;
6206
6207 /* We aren't supposed to use alloca in BFD because on
6208 systems which do not have alloca the version in libiberty
6209 calls xmalloc, which might cause the program to crash
6210 when it runs out of memory. This function doesn't have a
6211 return status, so there's no way to gracefully return an
6212 error. So cheat. We know that string[-1] can be safely
34814b9f
AM
6213 accessed; It's either a string in an ELF string table,
6214 or allocated in an objalloc structure. */
d1329ca3 6215
34814b9f 6216 p = eh->elf.root.root.string - 1;
d1329ca3
AM
6217 save = *p;
6218 *(char *) p = '.';
34814b9f 6219 fh = (struct ppc_link_hash_entry *)
b8ac2841 6220 elf_link_hash_lookup (htab, p, FALSE, FALSE, FALSE);
d1329ca3
AM
6221 *(char *) p = save;
6222
6223 /* Unfortunately, if it so happens that the string we were
6224 looking for was allocated immediately before this string,
6225 then we overwrote the string terminator. That's the only
6226 reason the lookup should fail. */
6227 if (fh == NULL)
6228 {
34814b9f
AM
6229 q = eh->elf.root.root.string + strlen (eh->elf.root.root.string);
6230 while (q >= eh->elf.root.root.string && *q == *p)
d1329ca3 6231 --q, --p;
34814b9f
AM
6232 if (q < eh->elf.root.root.string && *p == '.')
6233 fh = (struct ppc_link_hash_entry *)
b8ac2841 6234 elf_link_hash_lookup (htab, p, FALSE, FALSE, FALSE);
d1329ca3
AM
6235 }
6236 if (fh != NULL)
6237 {
34814b9f
AM
6238 eh->oh = fh;
6239 fh->oh = eh;
d1329ca3
AM
6240 }
6241 }
e86ce104 6242 if (fh != NULL)
34814b9f 6243 _bfd_elf_link_hash_hide_symbol (info, &fh->elf, force_local);
e86ce104
AM
6244 }
6245}
6246
411e1bfb 6247static bfd_boolean
8843416a
AM
6248get_sym_h (struct elf_link_hash_entry **hp,
6249 Elf_Internal_Sym **symp,
6250 asection **symsecp,
f961d9dd 6251 unsigned char **tls_maskp,
8843416a
AM
6252 Elf_Internal_Sym **locsymsp,
6253 unsigned long r_symndx,
6254 bfd *ibfd)
411e1bfb 6255{
0ffa91dd 6256 Elf_Internal_Shdr *symtab_hdr = &elf_symtab_hdr (ibfd);
411e1bfb
AM
6257
6258 if (r_symndx >= symtab_hdr->sh_info)
6259 {
6260 struct elf_link_hash_entry **sym_hashes = elf_sym_hashes (ibfd);
6261 struct elf_link_hash_entry *h;
6262
6263 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
b31867b6 6264 h = elf_follow_link (h);
411e1bfb
AM
6265
6266 if (hp != NULL)
6267 *hp = h;
6268
6269 if (symp != NULL)
6270 *symp = NULL;
6271
6272 if (symsecp != NULL)
6273 {
6274 asection *symsec = NULL;
6275 if (h->root.type == bfd_link_hash_defined
6276 || h->root.type == bfd_link_hash_defweak)
6277 symsec = h->root.u.def.section;
6278 *symsecp = symsec;
6279 }
6280
e7b938ca 6281 if (tls_maskp != NULL)
411e1bfb
AM
6282 {
6283 struct ppc_link_hash_entry *eh;
6284
6285 eh = (struct ppc_link_hash_entry *) h;
e7b938ca 6286 *tls_maskp = &eh->tls_mask;
411e1bfb
AM
6287 }
6288 }
6289 else
6290 {
6291 Elf_Internal_Sym *sym;
6292 Elf_Internal_Sym *locsyms = *locsymsp;
6293
6294 if (locsyms == NULL)
6295 {
6296 locsyms = (Elf_Internal_Sym *) symtab_hdr->contents;
6297 if (locsyms == NULL)
6298 locsyms = bfd_elf_get_elf_syms (ibfd, symtab_hdr,
6299 symtab_hdr->sh_info,
6300 0, NULL, NULL, NULL);
6301 if (locsyms == NULL)
6302 return FALSE;
6303 *locsymsp = locsyms;
6304 }
6305 sym = locsyms + r_symndx;
6306
6307 if (hp != NULL)
6308 *hp = NULL;
6309
6310 if (symp != NULL)
6311 *symp = sym;
6312
6313 if (symsecp != NULL)
cb33740c 6314 *symsecp = bfd_section_from_elf_index (ibfd, sym->st_shndx);
411e1bfb 6315
e7b938ca 6316 if (tls_maskp != NULL)
411e1bfb
AM
6317 {
6318 struct got_entry **lgot_ents;
f961d9dd 6319 unsigned char *tls_mask;
411e1bfb 6320
e7b938ca 6321 tls_mask = NULL;
411e1bfb
AM
6322 lgot_ents = elf_local_got_ents (ibfd);
6323 if (lgot_ents != NULL)
6324 {
e054468f
AM
6325 struct plt_entry **local_plt = (struct plt_entry **)
6326 (lgot_ents + symtab_hdr->sh_info);
f961d9dd 6327 unsigned char *lgot_masks = (unsigned char *)
e054468f 6328 (local_plt + symtab_hdr->sh_info);
e7b938ca 6329 tls_mask = &lgot_masks[r_symndx];
411e1bfb 6330 }
e7b938ca 6331 *tls_maskp = tls_mask;
411e1bfb
AM
6332 }
6333 }
6334 return TRUE;
6335}
6336
e7b938ca 6337/* Returns TLS_MASKP for the given REL symbol. Function return is 0 on
951fd09b 6338 error, 2 on a toc GD type suitable for optimization, 3 on a toc LD
ad8e1ba5 6339 type suitable for optimization, and 1 otherwise. */
951fd09b
AM
6340
6341static int
f961d9dd 6342get_tls_mask (unsigned char **tls_maskp,
3a71aa26
AM
6343 unsigned long *toc_symndx,
6344 bfd_vma *toc_addend,
0d4792f7 6345 Elf_Internal_Sym **locsymsp,
3a71aa26
AM
6346 const Elf_Internal_Rela *rel,
6347 bfd *ibfd)
411e1bfb
AM
6348{
6349 unsigned long r_symndx;
0d4792f7 6350 int next_r;
411e1bfb
AM
6351 struct elf_link_hash_entry *h;
6352 Elf_Internal_Sym *sym;
6353 asection *sec;
6354 bfd_vma off;
6355
6356 r_symndx = ELF64_R_SYM (rel->r_info);
e7b938ca 6357 if (!get_sym_h (&h, &sym, &sec, tls_maskp, locsymsp, r_symndx, ibfd))
951fd09b 6358 return 0;
411e1bfb 6359
37da22e5
AM
6360 if ((*tls_maskp != NULL
6361 && (**tls_maskp & TLS_TLS) != 0
6362 && **tls_maskp != (TLS_TLS | TLS_MARK))
411e1bfb 6363 || sec == NULL
6bee8834 6364 || ppc64_elf_section_data (sec) == NULL
7c8fe5c4 6365 || ppc64_elf_section_data (sec)->sec_type != sec_toc)
951fd09b 6366 return 1;
411e1bfb
AM
6367
6368 /* Look inside a TOC section too. */
6369 if (h != NULL)
6370 {
6371 BFD_ASSERT (h->root.type == bfd_link_hash_defined);
6372 off = h->root.u.def.value;
6373 }
6374 else
6375 off = sym->st_value;
6376 off += rel->r_addend;
6377 BFD_ASSERT (off % 8 == 0);
3a71aa26
AM
6378 r_symndx = ppc64_elf_section_data (sec)->u.toc.symndx[off / 8];
6379 next_r = ppc64_elf_section_data (sec)->u.toc.symndx[off / 8 + 1];
0d4792f7
AM
6380 if (toc_symndx != NULL)
6381 *toc_symndx = r_symndx;
3a71aa26
AM
6382 if (toc_addend != NULL)
6383 *toc_addend = ppc64_elf_section_data (sec)->u.toc.add[off / 8];
6384 if (!get_sym_h (&h, &sym, &sec, tls_maskp, locsymsp, r_symndx, ibfd))
6385 return 0;
854b41e7 6386 if ((h == NULL || is_static_defined (h))
0d4792f7
AM
6387 && (next_r == -1 || next_r == -2))
6388 return 1 - next_r;
951fd09b 6389 return 1;
411e1bfb
AM
6390}
6391
3b421ab3
AM
6392/* Find (or create) an entry in the tocsave hash table. */
6393
6394static struct tocsave_entry *
6395tocsave_find (struct ppc_link_hash_table *htab,
6396 enum insert_option insert,
6397 Elf_Internal_Sym **local_syms,
6398 const Elf_Internal_Rela *irela,
6399 bfd *ibfd)
6400{
6401 unsigned long r_indx;
6402 struct elf_link_hash_entry *h;
6403 Elf_Internal_Sym *sym;
6404 struct tocsave_entry ent, *p;
6405 hashval_t hash;
6406 struct tocsave_entry **slot;
6407
6408 r_indx = ELF64_R_SYM (irela->r_info);
6409 if (!get_sym_h (&h, &sym, &ent.sec, NULL, local_syms, r_indx, ibfd))
6410 return NULL;
6411 if (ent.sec == NULL || ent.sec->output_section == NULL)
6412 {
4eca0228 6413 _bfd_error_handler
871b3ab2 6414 (_("%pB: undefined symbol on R_PPC64_TOCSAVE relocation"), ibfd);
3b421ab3
AM
6415 return NULL;
6416 }
6417
6418 if (h != NULL)
6419 ent.offset = h->root.u.def.value;
6420 else
6421 ent.offset = sym->st_value;
6422 ent.offset += irela->r_addend;
6423
6424 hash = tocsave_htab_hash (&ent);
6425 slot = ((struct tocsave_entry **)
6426 htab_find_slot_with_hash (htab->tocsave_htab, &ent, hash, insert));
6427 if (slot == NULL)
6428 return NULL;
6429
6430 if (*slot == NULL)
6431 {
6432 p = (struct tocsave_entry *) bfd_alloc (ibfd, sizeof (*p));
6433 if (p == NULL)
6434 return NULL;
6435 *p = ent;
6436 *slot = p;
6437 }
6438 return *slot;
6439}
6440
754021d0 6441/* Adjust all global syms defined in opd sections. In gcc generated
8387904d 6442 code for the old ABI, these will already have been done. */
754021d0
AM
6443
6444static bfd_boolean
6445adjust_opd_syms (struct elf_link_hash_entry *h, void *inf ATTRIBUTE_UNUSED)
6446{
6447 struct ppc_link_hash_entry *eh;
6448 asection *sym_sec;
74f0fb50 6449 struct _opd_sec_data *opd;
754021d0
AM
6450
6451 if (h->root.type == bfd_link_hash_indirect)
6452 return TRUE;
6453
754021d0
AM
6454 if (h->root.type != bfd_link_hash_defined
6455 && h->root.type != bfd_link_hash_defweak)
6456 return TRUE;
6457
6458 eh = (struct ppc_link_hash_entry *) h;
6459 if (eh->adjust_done)
6460 return TRUE;
6461
6462 sym_sec = eh->elf.root.u.def.section;
74f0fb50
AM
6463 opd = get_opd_info (sym_sec);
6464 if (opd != NULL && opd->adjust != NULL)
754021d0 6465 {
51aecdc5 6466 long adjust = opd->adjust[OPD_NDX (eh->elf.root.u.def.value)];
4025353c
AM
6467 if (adjust == -1)
6468 {
6469 /* This entry has been deleted. */
b3fac117 6470 asection *dsec = ppc64_elf_tdata (sym_sec->owner)->deleted_section;
81688140
AM
6471 if (dsec == NULL)
6472 {
6473 for (dsec = sym_sec->owner->sections; dsec; dsec = dsec->next)
dbaa2011 6474 if (discarded_section (dsec))
81688140 6475 {
b3fac117 6476 ppc64_elf_tdata (sym_sec->owner)->deleted_section = dsec;
81688140
AM
6477 break;
6478 }
6479 }
4025353c 6480 eh->elf.root.u.def.value = 0;
81688140 6481 eh->elf.root.u.def.section = dsec;
4025353c
AM
6482 }
6483 else
6484 eh->elf.root.u.def.value += adjust;
754021d0
AM
6485 eh->adjust_done = 1;
6486 }
6487 return TRUE;
6488}
6489
8c1d1bb8 6490/* Handles decrementing dynamic reloc counts for the reloc specified by
19e08130 6491 R_INFO in section SEC. If LOCAL_SYMS is NULL, then H and SYM
8c1d1bb8
AM
6492 have already been determined. */
6493
6494static bfd_boolean
6495dec_dynrel_count (bfd_vma r_info,
6496 asection *sec,
6497 struct bfd_link_info *info,
6498 Elf_Internal_Sym **local_syms,
6499 struct elf_link_hash_entry *h,
19e08130 6500 Elf_Internal_Sym *sym)
8c1d1bb8
AM
6501{
6502 enum elf_ppc64_reloc_type r_type;
19e08130 6503 asection *sym_sec = NULL;
8c1d1bb8
AM
6504
6505 /* Can this reloc be dynamic? This switch, and later tests here
6506 should be kept in sync with the code in check_relocs. */
6507 r_type = ELF64_R_TYPE (r_info);
6508 switch (r_type)
6509 {
6510 default:
6511 return TRUE;
6512
6513 case R_PPC64_TPREL16:
6514 case R_PPC64_TPREL16_LO:
6515 case R_PPC64_TPREL16_HI:
6516 case R_PPC64_TPREL16_HA:
6517 case R_PPC64_TPREL16_DS:
6518 case R_PPC64_TPREL16_LO_DS:
f9c6b907
AM
6519 case R_PPC64_TPREL16_HIGH:
6520 case R_PPC64_TPREL16_HIGHA:
8c1d1bb8
AM
6521 case R_PPC64_TPREL16_HIGHER:
6522 case R_PPC64_TPREL16_HIGHERA:
6523 case R_PPC64_TPREL16_HIGHEST:
6524 case R_PPC64_TPREL16_HIGHESTA:
8c1d1bb8
AM
6525 case R_PPC64_TPREL64:
6526 case R_PPC64_DTPMOD64:
6527 case R_PPC64_DTPREL64:
6528 case R_PPC64_ADDR64:
6529 case R_PPC64_REL30:
6530 case R_PPC64_REL32:
6531 case R_PPC64_REL64:
6532 case R_PPC64_ADDR14:
6533 case R_PPC64_ADDR14_BRNTAKEN:
6534 case R_PPC64_ADDR14_BRTAKEN:
6535 case R_PPC64_ADDR16:
6536 case R_PPC64_ADDR16_DS:
6537 case R_PPC64_ADDR16_HA:
6538 case R_PPC64_ADDR16_HI:
f9c6b907
AM
6539 case R_PPC64_ADDR16_HIGH:
6540 case R_PPC64_ADDR16_HIGHA:
8c1d1bb8
AM
6541 case R_PPC64_ADDR16_HIGHER:
6542 case R_PPC64_ADDR16_HIGHERA:
6543 case R_PPC64_ADDR16_HIGHEST:
6544 case R_PPC64_ADDR16_HIGHESTA:
6545 case R_PPC64_ADDR16_LO:
6546 case R_PPC64_ADDR16_LO_DS:
6547 case R_PPC64_ADDR24:
6548 case R_PPC64_ADDR32:
6549 case R_PPC64_UADDR16:
6550 case R_PPC64_UADDR32:
6551 case R_PPC64_UADDR64:
6552 case R_PPC64_TOC:
6553 break;
6554 }
6555
6556 if (local_syms != NULL)
6557 {
6558 unsigned long r_symndx;
8c1d1bb8
AM
6559 bfd *ibfd = sec->owner;
6560
6561 r_symndx = ELF64_R_SYM (r_info);
6562 if (!get_sym_h (&h, &sym, &sym_sec, NULL, local_syms, r_symndx, ibfd))
6563 return FALSE;
6564 }
6565
0e1862bb 6566 if ((bfd_link_pic (info)
1d483afe 6567 && (must_be_dyn_reloc (info, r_type)
8c1d1bb8 6568 || (h != NULL
198f1157 6569 && (!SYMBOLIC_BIND (info, h)
8c1d1bb8
AM
6570 || h->root.type == bfd_link_hash_defweak
6571 || !h->def_regular))))
6572 || (ELIMINATE_COPY_RELOCS
0e1862bb 6573 && !bfd_link_pic (info)
8c1d1bb8
AM
6574 && h != NULL
6575 && (h->root.type == bfd_link_hash_defweak
6576 || !h->def_regular)))
6577 ;
6578 else
6579 return TRUE;
6580
6581 if (h != NULL)
6edfbbad 6582 {
19e08130
AM
6583 struct elf_dyn_relocs *p;
6584 struct elf_dyn_relocs **pp;
6585 pp = &((struct ppc_link_hash_entry *) h)->dyn_relocs;
6586
6587 /* elf_gc_sweep may have already removed all dyn relocs associated
6588 with local syms for a given section. Also, symbol flags are
6589 changed by elf_gc_sweep_symbol, confusing the test above. Don't
6590 report a dynreloc miscount. */
6591 if (*pp == NULL && info->gc_sections)
6592 return TRUE;
6593
6594 while ((p = *pp) != NULL)
60124e18 6595 {
19e08130
AM
6596 if (p->sec == sec)
6597 {
6598 if (!must_be_dyn_reloc (info, r_type))
6599 p->pc_count -= 1;
6600 p->count -= 1;
6601 if (p->count == 0)
6602 *pp = p->next;
6603 return TRUE;
6604 }
6605 pp = &p->next;
60124e18 6606 }
6edfbbad 6607 }
19e08130
AM
6608 else
6609 {
6610 struct ppc_dyn_relocs *p;
6611 struct ppc_dyn_relocs **pp;
6612 void *vpp;
6613 bfd_boolean is_ifunc;
8c1d1bb8 6614
19e08130
AM
6615 if (local_syms == NULL)
6616 sym_sec = bfd_section_from_elf_index (sec->owner, sym->st_shndx);
6617 if (sym_sec == NULL)
6618 sym_sec = sec;
c57da1a7 6619
19e08130
AM
6620 vpp = &elf_section_data (sym_sec)->local_dynrel;
6621 pp = (struct ppc_dyn_relocs **) vpp;
6622
6623 if (*pp == NULL && info->gc_sections)
6624 return TRUE;
6625
6626 is_ifunc = ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC;
6627 while ((p = *pp) != NULL)
8c1d1bb8 6628 {
19e08130
AM
6629 if (p->sec == sec && p->ifunc == is_ifunc)
6630 {
6631 p->count -= 1;
6632 if (p->count == 0)
6633 *pp = p->next;
6634 return TRUE;
6635 }
6636 pp = &p->next;
8c1d1bb8 6637 }
8c1d1bb8
AM
6638 }
6639
695344c0 6640 /* xgettext:c-format */
cf97bcb0
AM
6641 _bfd_error_handler (_("dynreloc miscount for %pB, section %pA"),
6642 sec->owner, sec);
8c1d1bb8
AM
6643 bfd_set_error (bfd_error_bad_value);
6644 return FALSE;
6645}
6646
754021d0
AM
6647/* Remove unused Official Procedure Descriptor entries. Currently we
6648 only remove those associated with functions in discarded link-once
6649 sections, or weakly defined functions that have been overridden. It
6650 would be possible to remove many more entries for statically linked
6651 applications. */
6652
b34976b6 6653bfd_boolean
e7d1c40c 6654ppc64_elf_edit_opd (struct bfd_link_info *info)
1e2f5b6e
AM
6655{
6656 bfd *ibfd;
754021d0 6657 bfd_boolean some_edited = FALSE;
3f764659 6658 asection *need_pad = NULL;
e7d1c40c
AM
6659 struct ppc_link_hash_table *htab;
6660
6661 htab = ppc_hash_table (info);
6662 if (htab == NULL)
6663 return FALSE;
1e2f5b6e 6664
c72f2fb2 6665 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
1e2f5b6e
AM
6666 {
6667 asection *sec;
6668 Elf_Internal_Rela *relstart, *rel, *relend;
6669 Elf_Internal_Shdr *symtab_hdr;
6cdc0ccc 6670 Elf_Internal_Sym *local_syms;
74f0fb50 6671 struct _opd_sec_data *opd;
51aecdc5 6672 bfd_boolean need_edit, add_aux_fields, broken;
3f764659 6673 bfd_size_type cnt_16b = 0;
1e2f5b6e 6674
854b41e7
AM
6675 if (!is_ppc64_elf (ibfd))
6676 continue;
6677
1e2f5b6e 6678 sec = bfd_get_section_by_name (ibfd, ".opd");
46de2a7c 6679 if (sec == NULL || sec->size == 0)
1e2f5b6e
AM
6680 continue;
6681
dbaa2011 6682 if (sec->sec_info_type == SEC_INFO_TYPE_JUST_SYMS)
4b85d634
AM
6683 continue;
6684
1e2f5b6e
AM
6685 if (sec->output_section == bfd_abs_section_ptr)
6686 continue;
6687
6688 /* Look through the section relocs. */
6689 if ((sec->flags & SEC_RELOC) == 0 || sec->reloc_count == 0)
6690 continue;
6691
6cdc0ccc 6692 local_syms = NULL;
0ffa91dd 6693 symtab_hdr = &elf_symtab_hdr (ibfd);
1e2f5b6e
AM
6694
6695 /* Read the relocations. */
4ce794b7 6696 relstart = _bfd_elf_link_read_relocs (ibfd, sec, NULL, NULL,
45d6a902 6697 info->keep_memory);
1e2f5b6e 6698 if (relstart == NULL)
b34976b6 6699 return FALSE;
1e2f5b6e
AM
6700
6701 /* First run through the relocs to check they are sane, and to
6702 determine whether we need to edit this opd section. */
b34976b6 6703 need_edit = FALSE;
51aecdc5 6704 broken = FALSE;
3f764659 6705 need_pad = sec;
1e2f5b6e 6706 relend = relstart + sec->reloc_count;
50bc7936 6707 for (rel = relstart; rel < relend; )
1e2f5b6e 6708 {
04c9666a 6709 enum elf_ppc64_reloc_type r_type;
1e2f5b6e
AM
6710 unsigned long r_symndx;
6711 asection *sym_sec;
6712 struct elf_link_hash_entry *h;
6713 Elf_Internal_Sym *sym;
51aecdc5 6714 bfd_vma offset;
1e2f5b6e 6715
51aecdc5 6716 /* .opd contains an array of 16 or 24 byte entries. We're
1e2f5b6e
AM
6717 only interested in the reloc pointing to a function entry
6718 point. */
51aecdc5
AM
6719 offset = rel->r_offset;
6720 if (rel + 1 == relend
6721 || rel[1].r_offset != offset + 8)
1e2f5b6e
AM
6722 {
6723 /* If someone messes with .opd alignment then after a
6724 "ld -r" we might have padding in the middle of .opd.
6725 Also, there's nothing to prevent someone putting
6726 something silly in .opd with the assembler. No .opd
b34976b6 6727 optimization for them! */
3f764659 6728 broken_opd:
4eca0228 6729 _bfd_error_handler
871b3ab2 6730 (_("%pB: .opd is not a regular array of opd entries"), ibfd);
51aecdc5 6731 broken = TRUE;
1e2f5b6e
AM
6732 break;
6733 }
6734
50bc7936
AM
6735 if ((r_type = ELF64_R_TYPE (rel->r_info)) != R_PPC64_ADDR64
6736 || (r_type = ELF64_R_TYPE ((rel + 1)->r_info)) != R_PPC64_TOC)
6737 {
4eca0228 6738 _bfd_error_handler
695344c0 6739 /* xgettext:c-format */
871b3ab2 6740 (_("%pB: unexpected reloc type %u in .opd section"),
d003868e 6741 ibfd, r_type);
51aecdc5 6742 broken = TRUE;
50bc7936
AM
6743 break;
6744 }
6745
1e2f5b6e 6746 r_symndx = ELF64_R_SYM (rel->r_info);
411e1bfb
AM
6747 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms,
6748 r_symndx, ibfd))
50bc7936 6749 goto error_ret;
1e2f5b6e
AM
6750
6751 if (sym_sec == NULL || sym_sec->owner == NULL)
6752 {
411e1bfb
AM
6753 const char *sym_name;
6754 if (h != NULL)
6755 sym_name = h->root.root.string;
6756 else
26c61ae5
L
6757 sym_name = bfd_elf_sym_name (ibfd, symtab_hdr, sym,
6758 sym_sec);
411e1bfb 6759
4eca0228 6760 _bfd_error_handler
695344c0 6761 /* xgettext:c-format */
871b3ab2 6762 (_("%pB: undefined sym `%s' in .opd section"),
d003868e 6763 ibfd, sym_name);
51aecdc5 6764 broken = TRUE;
1e2f5b6e
AM
6765 break;
6766 }
6767
51020317
AM
6768 /* opd entries are always for functions defined in the
6769 current input bfd. If the symbol isn't defined in the
6770 input bfd, then we won't be using the function in this
6771 bfd; It must be defined in a linkonce section in another
6772 bfd, or is weak. It's also possible that we are
6773 discarding the function due to a linker script /DISCARD/,
6774 which we test for via the output_section. */
6775 if (sym_sec->owner != ibfd
6776 || sym_sec->output_section == bfd_abs_section_ptr)
b34976b6 6777 need_edit = TRUE;
1e2f5b6e 6778
50bc7936 6779 rel += 2;
51aecdc5
AM
6780 if (rel + 1 == relend
6781 || (rel + 2 < relend
6782 && ELF64_R_TYPE (rel[2].r_info) == R_PPC64_TOC))
6783 ++rel;
6784
6785 if (rel == relend)
3f764659
JJ
6786 {
6787 if (sec->size == offset + 24)
6788 {
6789 need_pad = NULL;
6790 break;
6791 }
51aecdc5 6792 if (sec->size == offset + 16)
3f764659
JJ
6793 {
6794 cnt_16b++;
6795 break;
6796 }
6797 goto broken_opd;
6798 }
3f764659
JJ
6799 else if (rel + 1 < relend
6800 && ELF64_R_TYPE (rel[0].r_info) == R_PPC64_ADDR64
6801 && ELF64_R_TYPE (rel[1].r_info) == R_PPC64_TOC)
6802 {
51aecdc5
AM
6803 if (rel[0].r_offset == offset + 16)
6804 cnt_16b++;
6805 else if (rel[0].r_offset != offset + 24)
6806 goto broken_opd;
3f764659
JJ
6807 }
6808 else
6809 goto broken_opd;
1e2f5b6e
AM
6810 }
6811
e7d1c40c 6812 add_aux_fields = htab->params->non_overlapping_opd && cnt_16b > 0;
3f764659 6813
51aecdc5 6814 if (!broken && (need_edit || add_aux_fields))
1e2f5b6e
AM
6815 {
6816 Elf_Internal_Rela *write_rel;
d4730f92 6817 Elf_Internal_Shdr *rel_hdr;
1e2f5b6e 6818 bfd_byte *rptr, *wptr;
983bddc8 6819 bfd_byte *new_contents;
74f0fb50
AM
6820 bfd_size_type amt;
6821
983bddc8 6822 new_contents = NULL;
51aecdc5 6823 amt = OPD_NDX (sec->size) * sizeof (long);
74f0fb50 6824 opd = &ppc64_elf_section_data (sec)->u.opd;
33c0ec9d 6825 opd->adjust = bfd_zalloc (sec->owner, amt);
74f0fb50
AM
6826 if (opd->adjust == NULL)
6827 return FALSE;
1e2f5b6e
AM
6828
6829 /* This seems a waste of time as input .opd sections are all
6830 zeros as generated by gcc, but I suppose there's no reason
6831 this will always be so. We might start putting something in
6832 the third word of .opd entries. */
6833 if ((sec->flags & SEC_IN_MEMORY) == 0)
6834 {
eea6121a
AM
6835 bfd_byte *loc;
6836 if (!bfd_malloc_and_get_section (ibfd, sec, &loc))
6cdc0ccc 6837 {
eea6121a
AM
6838 if (loc != NULL)
6839 free (loc);
50bc7936 6840 error_ret:
6cdc0ccc
AM
6841 if (local_syms != NULL
6842 && symtab_hdr->contents != (unsigned char *) local_syms)
6843 free (local_syms);
6cdc0ccc
AM
6844 if (elf_section_data (sec)->relocs != relstart)
6845 free (relstart);
b34976b6 6846 return FALSE;
6cdc0ccc 6847 }
1e2f5b6e
AM
6848 sec->contents = loc;
6849 sec->flags |= (SEC_IN_MEMORY | SEC_HAS_CONTENTS);
6850 }
6851
6852 elf_section_data (sec)->relocs = relstart;
6853
3f764659 6854 new_contents = sec->contents;
3f764659
JJ
6855 if (add_aux_fields)
6856 {
6857 new_contents = bfd_malloc (sec->size + cnt_16b * 8);
6858 if (new_contents == NULL)
6859 return FALSE;
51aecdc5 6860 need_pad = NULL;
3f764659 6861 }
b4f4e59f
AM
6862 wptr = new_contents;
6863 rptr = sec->contents;
1e2f5b6e 6864 write_rel = relstart;
51aecdc5 6865 for (rel = relstart; rel < relend; )
1e2f5b6e 6866 {
50bc7936
AM
6867 unsigned long r_symndx;
6868 asection *sym_sec;
6869 struct elf_link_hash_entry *h;
51aecdc5 6870 struct ppc_link_hash_entry *fdh = NULL;
50bc7936 6871 Elf_Internal_Sym *sym;
51aecdc5
AM
6872 long opd_ent_size;
6873 Elf_Internal_Rela *next_rel;
6874 bfd_boolean skip;
50bc7936
AM
6875
6876 r_symndx = ELF64_R_SYM (rel->r_info);
6877 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms,
d37c89e5 6878 r_symndx, ibfd))
50bc7936
AM
6879 goto error_ret;
6880
51aecdc5
AM
6881 next_rel = rel + 2;
6882 if (next_rel + 1 == relend
6883 || (next_rel + 2 < relend
6884 && ELF64_R_TYPE (next_rel[2].r_info) == R_PPC64_TOC))
6885 ++next_rel;
6886
6887 /* See if the .opd entry is full 24 byte or
6888 16 byte (with fd_aux entry overlapped with next
6889 fd_func). */
6890 opd_ent_size = 24;
6891 if (next_rel == relend)
1e2f5b6e 6892 {
51aecdc5 6893 if (sec->size == rel->r_offset + 16)
3f764659 6894 opd_ent_size = 16;
51aecdc5
AM
6895 }
6896 else if (next_rel->r_offset == rel->r_offset + 16)
6897 opd_ent_size = 16;
3f764659 6898
51aecdc5
AM
6899 if (h != NULL
6900 && h->root.root.string[0] == '.')
6901 {
8c5b4e52
AM
6902 fdh = ((struct ppc_link_hash_entry *) h)->oh;
6903 if (fdh != NULL)
6904 {
6905 fdh = ppc_follow_link (fdh);
6906 if (fdh->elf.root.type != bfd_link_hash_defined
6907 && fdh->elf.root.type != bfd_link_hash_defweak)
6908 fdh = NULL;
6909 }
51aecdc5 6910 }
1e2f5b6e 6911
51aecdc5
AM
6912 skip = (sym_sec->owner != ibfd
6913 || sym_sec->output_section == bfd_abs_section_ptr);
6914 if (skip)
6915 {
6916 if (fdh != NULL && sym_sec->owner == ibfd)
a4aa0fb7 6917 {
51aecdc5
AM
6918 /* Arrange for the function descriptor sym
6919 to be dropped. */
6920 fdh->elf.root.u.def.value = 0;
6921 fdh->elf.root.u.def.section = sym_sec;
a4aa0fb7 6922 }
51aecdc5 6923 opd->adjust[OPD_NDX (rel->r_offset)] = -1;
1e2f5b6e 6924
0e1862bb 6925 if (NO_OPD_RELOCS || bfd_link_relocatable (info))
51aecdc5
AM
6926 rel = next_rel;
6927 else
6928 while (1)
6929 {
6930 if (!dec_dynrel_count (rel->r_info, sec, info,
6931 NULL, h, sym))
6932 goto error_ret;
754021d0 6933
51aecdc5
AM
6934 if (++rel == next_rel)
6935 break;
1e2f5b6e 6936
51aecdc5
AM
6937 r_symndx = ELF64_R_SYM (rel->r_info);
6938 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms,
6939 r_symndx, ibfd))
6940 goto error_ret;
6941 }
50bc7936
AM
6942 }
6943 else
1e2f5b6e 6944 {
51aecdc5
AM
6945 /* We'll be keeping this opd entry. */
6946 long adjust;
6947
6948 if (fdh != NULL)
6949 {
6950 /* Redefine the function descriptor symbol to
6951 this location in the opd section. It is
6952 necessary to update the value here rather
6953 than using an array of adjustments as we do
6954 for local symbols, because various places
6955 in the generic ELF code use the value
6956 stored in u.def.value. */
6957 fdh->elf.root.u.def.value = wptr - new_contents;
6958 fdh->adjust_done = 1;
6959 }
6960
6961 /* Local syms are a bit tricky. We could
6962 tweak them as they can be cached, but
6963 we'd need to look through the local syms
6964 for the function descriptor sym which we
6965 don't have at the moment. So keep an
6966 array of adjustments. */
6967 adjust = (wptr - new_contents) - (rptr - sec->contents);
6968 opd->adjust[OPD_NDX (rel->r_offset)] = adjust;
6969
6970 if (wptr != rptr)
6971 memcpy (wptr, rptr, opd_ent_size);
6972 wptr += opd_ent_size;
6973 if (add_aux_fields && opd_ent_size == 16)
6974 {
6975 memset (wptr, '\0', 8);
6976 wptr += 8;
6977 }
6978
50bc7936 6979 /* We need to adjust any reloc offsets to point to the
51aecdc5
AM
6980 new opd entries. */
6981 for ( ; rel != next_rel; ++rel)
6982 {
6983 rel->r_offset += adjust;
6984 if (write_rel != rel)
6985 memcpy (write_rel, rel, sizeof (*rel));
6986 ++write_rel;
6987 }
1e2f5b6e 6988 }
51aecdc5
AM
6989
6990 rptr += opd_ent_size;
1e2f5b6e
AM
6991 }
6992
3f764659 6993 sec->size = wptr - new_contents;
1e2f5b6e 6994 sec->reloc_count = write_rel - relstart;
3f764659
JJ
6995 if (add_aux_fields)
6996 {
6997 free (sec->contents);
6998 sec->contents = new_contents;
6999 }
7000
05bf9422 7001 /* Fudge the header size too, as this is used later in
cdcf6e38 7002 elf_bfd_final_link if we are emitting relocs. */
d4730f92
BS
7003 rel_hdr = _bfd_elf_single_rel_hdr (sec);
7004 rel_hdr->sh_size = sec->reloc_count * rel_hdr->sh_entsize;
754021d0 7005 some_edited = TRUE;
1e2f5b6e 7006 }
6cdc0ccc 7007 else if (elf_section_data (sec)->relocs != relstart)
1e2f5b6e 7008 free (relstart);
6cdc0ccc 7009
411e1bfb
AM
7010 if (local_syms != NULL
7011 && symtab_hdr->contents != (unsigned char *) local_syms)
7012 {
7013 if (!info->keep_memory)
7014 free (local_syms);
7015 else
7016 symtab_hdr->contents = (unsigned char *) local_syms;
7017 }
7018 }
7019
754021d0
AM
7020 if (some_edited)
7021 elf_link_hash_traverse (elf_hash_table (info), adjust_opd_syms, NULL);
7022
3f764659
JJ
7023 /* If we are doing a final link and the last .opd entry is just 16 byte
7024 long, add a 8 byte padding after it. */
0e1862bb 7025 if (need_pad != NULL && !bfd_link_relocatable (info))
3f764659
JJ
7026 {
7027 bfd_byte *p;
7028
7029 if ((need_pad->flags & SEC_IN_MEMORY) == 0)
7030 {
7031 BFD_ASSERT (need_pad->size > 0);
7032
7033 p = bfd_malloc (need_pad->size + 8);
7034 if (p == NULL)
7035 return FALSE;
699733f6 7036
2cdcc330
AM
7037 if (!bfd_get_section_contents (need_pad->owner, need_pad,
7038 p, 0, need_pad->size))
3f764659
JJ
7039 return FALSE;
7040
7041 need_pad->contents = p;
7042 need_pad->flags |= (SEC_IN_MEMORY | SEC_HAS_CONTENTS);
7043 }
7044 else
7045 {
7046 p = bfd_realloc (need_pad->contents, need_pad->size + 8);
7047 if (p == NULL)
7048 return FALSE;
7049
7050 need_pad->contents = p;
7051 }
7052
7053 memset (need_pad->contents + need_pad->size, 0, 8);
7054 need_pad->size += 8;
7055 }
7056
411e1bfb
AM
7057 return TRUE;
7058}
7059
3e04d765
AM
7060/* Analyze inline PLT call relocations to see whether calls to locally
7061 defined functions can be converted to direct calls. */
7062
7063bfd_boolean
7064ppc64_elf_inline_plt (struct bfd_link_info *info)
7065{
7066 struct ppc_link_hash_table *htab;
7067 bfd *ibfd;
7068 asection *sec;
7069 bfd_vma low_vma, high_vma, limit;
7070
7071 htab = ppc_hash_table (info);
7072 if (htab == NULL)
7073 return FALSE;
7074
7075 /* A bl insn can reach -0x2000000 to 0x1fffffc. The limit is
7076 reduced somewhat to cater for possible stubs that might be added
7077 between the call and its destination. */
7078 if (htab->params->group_size < 0)
7079 {
7080 limit = -htab->params->group_size;
7081 if (limit == 1)
7082 limit = 0x1e00000;
7083 }
7084 else
7085 {
7086 limit = htab->params->group_size;
7087 if (limit == 1)
7088 limit = 0x1c00000;
7089 }
7090
7091 low_vma = -1;
7092 high_vma = 0;
7093 for (sec = info->output_bfd->sections; sec != NULL; sec = sec->next)
7094 if ((sec->flags & (SEC_ALLOC | SEC_CODE)) == (SEC_ALLOC | SEC_CODE))
7095 {
7096 if (low_vma > sec->vma)
7097 low_vma = sec->vma;
7098 if (high_vma < sec->vma + sec->size)
7099 high_vma = sec->vma + sec->size;
7100 }
7101
7102 /* If a "bl" can reach anywhere in local code sections, then we can
7103 convert all inline PLT sequences to direct calls when the symbol
7104 is local. */
7105 if (high_vma - low_vma < limit)
7106 {
7107 htab->can_convert_all_inline_plt = 1;
7108 return TRUE;
7109 }
7110
7111 /* Otherwise, go looking through relocs for cases where a direct
7112 call won't reach. Mark the symbol on any such reloc to disable
7113 the optimization and keep the PLT entry as it seems likely that
7114 this will be better than creating trampolines. Note that this
7115 will disable the optimization for all inline PLT calls to a
7116 particular symbol, not just those that won't reach. The
7117 difficulty in doing a more precise optimization is that the
7118 linker needs to make a decision depending on whether a
7119 particular R_PPC64_PLTCALL insn can be turned into a direct
7120 call, for each of the R_PPC64_PLTSEQ and R_PPC64_PLT16* insns in
7121 the sequence, and there is nothing that ties those relocs
7122 together except their symbol. */
7123
7124 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
7125 {
7126 Elf_Internal_Shdr *symtab_hdr;
7127 Elf_Internal_Sym *local_syms;
7128
7129 if (!is_ppc64_elf (ibfd))
7130 continue;
7131
7132 local_syms = NULL;
7133 symtab_hdr = &elf_symtab_hdr (ibfd);
7134
7135 for (sec = ibfd->sections; sec != NULL; sec = sec->next)
7136 if (ppc64_elf_section_data (sec)->has_pltcall
7137 && !bfd_is_abs_section (sec->output_section))
7138 {
7139 Elf_Internal_Rela *relstart, *rel, *relend;
7140
7141 /* Read the relocations. */
7142 relstart = _bfd_elf_link_read_relocs (ibfd, sec, NULL, NULL,
7143 info->keep_memory);
7144 if (relstart == NULL)
7145 return FALSE;
7146
7147 relend = relstart + sec->reloc_count;
7148 for (rel = relstart; rel < relend; )
7149 {
7150 enum elf_ppc64_reloc_type r_type;
7151 unsigned long r_symndx;
7152 asection *sym_sec;
7153 struct elf_link_hash_entry *h;
7154 Elf_Internal_Sym *sym;
7155 unsigned char *tls_maskp;
7156
7157 r_type = ELF64_R_TYPE (rel->r_info);
7158 if (r_type != R_PPC64_PLTCALL)
7159 continue;
7160
7161 r_symndx = ELF64_R_SYM (rel->r_info);
7162 if (!get_sym_h (&h, &sym, &sym_sec, &tls_maskp, &local_syms,
7163 r_symndx, ibfd))
7164 {
7165 if (elf_section_data (sec)->relocs != relstart)
7166 free (relstart);
7167 if (local_syms != NULL
2cdcc330 7168 && symtab_hdr->contents != (bfd_byte *) local_syms)
3e04d765
AM
7169 free (local_syms);
7170 return FALSE;
7171 }
7172
7173 if (sym_sec != NULL && sym_sec->output_section != NULL)
7174 {
7175 bfd_vma from, to;
7176 if (h != NULL)
7177 to = h->root.u.def.value;
7178 else
7179 to = sym->st_value;
7180 to += (rel->r_addend
7181 + sym_sec->output_offset
7182 + sym_sec->output_section->vma);
7183 from = (rel->r_offset
7184 + sec->output_offset
7185 + sec->output_section->vma);
7186 if (to - from + limit < 2 * limit)
7187 *tls_maskp &= ~PLT_KEEP;
7188 }
7189 }
7190 if (elf_section_data (sec)->relocs != relstart)
7191 free (relstart);
7192 }
7193
7194 if (local_syms != NULL
7195 && symtab_hdr->contents != (unsigned char *) local_syms)
7196 {
7197 if (!info->keep_memory)
7198 free (local_syms);
7199 else
7200 symtab_hdr->contents = (unsigned char *) local_syms;
7201 }
7202 }
7203
7204 return TRUE;
7205}
7206
e1918d23 7207/* Set htab->tls_get_addr and call the generic ELF tls_setup function. */
411e1bfb 7208
e1918d23 7209asection *
e7d1c40c 7210ppc64_elf_tls_setup (struct bfd_link_info *info)
411e1bfb 7211{
411e1bfb
AM
7212 struct ppc_link_hash_table *htab;
7213
411e1bfb 7214 htab = ppc_hash_table (info);
4dfe6ac6
NC
7215 if (htab == NULL)
7216 return NULL;
7217
ee67d69a
AM
7218 if (abiversion (info->output_bfd) == 1)
7219 htab->opd_abi = 1;
7220
e7d1c40c 7221 if (htab->params->no_multi_toc)
33c0ec9d
AM
7222 htab->do_multi_toc = 0;
7223 else if (!htab->do_multi_toc)
e7d1c40c 7224 htab->params->no_multi_toc = 1;
33c0ec9d 7225
8b5f1ed8
AM
7226 /* Default to --no-plt-localentry, as this option can cause problems
7227 with symbol interposition. For example, glibc libpthread.so and
7228 libc.so duplicate many pthread symbols, with a fallback
7229 implementation in libc.so. In some cases the fallback does more
7230 work than the pthread implementation. __pthread_condattr_destroy
7231 is one such symbol: the libpthread.so implementation is
7232 localentry:0 while the libc.so implementation is localentry:8.
7233 An app that "cleverly" uses dlopen to only load necessary
7234 libraries at runtime may omit loading libpthread.so when not
7235 running multi-threaded, which then results in the libc.so
7236 fallback symbols being used and ld.so complaining. Now there
7237 are workarounds in ld (see non_zero_localentry) to detect the
7238 pthread situation, but that may not be the only case where
7239 --plt-localentry can cause trouble. */
f378ab09 7240 if (htab->params->plt_localentry0 < 0)
8b5f1ed8 7241 htab->params->plt_localentry0 = 0;
d44c746a
AM
7242 if (htab->params->plt_localentry0
7243 && elf_link_hash_lookup (&htab->elf, "GLIBC_2.26",
7244 FALSE, FALSE, FALSE) == NULL)
cf97bcb0
AM
7245 _bfd_error_handler
7246 (_("warning: --plt-localentry is especially dangerous without "
7247 "ld.so support to detect ABI violations"));
f378ab09 7248
3a71aa26
AM
7249 htab->tls_get_addr = ((struct ppc_link_hash_entry *)
7250 elf_link_hash_lookup (&htab->elf, ".__tls_get_addr",
7251 FALSE, FALSE, TRUE));
a7f2871e
AM
7252 /* Move dynamic linking info to the function descriptor sym. */
7253 if (htab->tls_get_addr != NULL)
7254 func_desc_adjust (&htab->tls_get_addr->elf, info);
3a71aa26
AM
7255 htab->tls_get_addr_fd = ((struct ppc_link_hash_entry *)
7256 elf_link_hash_lookup (&htab->elf, "__tls_get_addr",
7257 FALSE, FALSE, TRUE));
7c9cf415 7258 if (htab->params->tls_get_addr_opt)
a7f2871e
AM
7259 {
7260 struct elf_link_hash_entry *opt, *opt_fd, *tga, *tga_fd;
7261
7262 opt = elf_link_hash_lookup (&htab->elf, ".__tls_get_addr_opt",
7263 FALSE, FALSE, TRUE);
7264 if (opt != NULL)
7265 func_desc_adjust (opt, info);
7266 opt_fd = elf_link_hash_lookup (&htab->elf, "__tls_get_addr_opt",
7267 FALSE, FALSE, TRUE);
7268 if (opt_fd != NULL
7269 && (opt_fd->root.type == bfd_link_hash_defined
7270 || opt_fd->root.type == bfd_link_hash_defweak))
7271 {
7272 /* If glibc supports an optimized __tls_get_addr call stub,
7273 signalled by the presence of __tls_get_addr_opt, and we'll
7274 be calling __tls_get_addr via a plt call stub, then
7275 make __tls_get_addr point to __tls_get_addr_opt. */
7276 tga_fd = &htab->tls_get_addr_fd->elf;
7277 if (htab->elf.dynamic_sections_created
7278 && tga_fd != NULL
7279 && (tga_fd->type == STT_FUNC
7280 || tga_fd->needs_plt)
7281 && !(SYMBOL_CALLS_LOCAL (info, tga_fd)
21d68fcd 7282 || UNDEFWEAK_NO_DYNAMIC_RELOC (info, tga_fd)))
a7f2871e
AM
7283 {
7284 struct plt_entry *ent;
7285
7286 for (ent = tga_fd->plt.plist; ent != NULL; ent = ent->next)
7287 if (ent->plt.refcount > 0)
7288 break;
7289 if (ent != NULL)
7290 {
7291 tga_fd->root.type = bfd_link_hash_indirect;
7292 tga_fd->root.u.i.link = &opt_fd->root;
7293 ppc64_elf_copy_indirect_symbol (info, opt_fd, tga_fd);
b531344c 7294 opt_fd->mark = 1;
a7f2871e
AM
7295 if (opt_fd->dynindx != -1)
7296 {
7297 /* Use __tls_get_addr_opt in dynamic relocations. */
7298 opt_fd->dynindx = -1;
7299 _bfd_elf_strtab_delref (elf_hash_table (info)->dynstr,
7300 opt_fd->dynstr_index);
7301 if (!bfd_elf_link_record_dynamic_symbol (info, opt_fd))
854b41e7 7302 return NULL;
a7f2871e 7303 }
2cdcc330
AM
7304 htab->tls_get_addr_fd
7305 = (struct ppc_link_hash_entry *) opt_fd;
a7f2871e
AM
7306 tga = &htab->tls_get_addr->elf;
7307 if (opt != NULL && tga != NULL)
7308 {
7309 tga->root.type = bfd_link_hash_indirect;
7310 tga->root.u.i.link = &opt->root;
7311 ppc64_elf_copy_indirect_symbol (info, opt, tga);
b531344c 7312 opt->mark = 1;
a7f2871e
AM
7313 _bfd_elf_link_hash_hide_symbol (info, opt,
7314 tga->forced_local);
7315 htab->tls_get_addr = (struct ppc_link_hash_entry *) opt;
7316 }
7317 htab->tls_get_addr_fd->oh = htab->tls_get_addr;
7318 htab->tls_get_addr_fd->is_func_descriptor = 1;
7319 if (htab->tls_get_addr != NULL)
7320 {
7321 htab->tls_get_addr->oh = htab->tls_get_addr_fd;
7322 htab->tls_get_addr->is_func = 1;
7323 }
7324 }
7325 }
7326 }
7c9cf415
AM
7327 else if (htab->params->tls_get_addr_opt < 0)
7328 htab->params->tls_get_addr_opt = 0;
a7f2871e 7329 }
33c0ec9d 7330 return _bfd_elf_tls_setup (info->output_bfd, info);
3a71aa26 7331}
8387904d 7332
3a71aa26
AM
7333/* Return TRUE iff REL is a branch reloc with a global symbol matching
7334 HASH1 or HASH2. */
8387904d 7335
3a71aa26
AM
7336static bfd_boolean
7337branch_reloc_hash_match (const bfd *ibfd,
7338 const Elf_Internal_Rela *rel,
7339 const struct ppc_link_hash_entry *hash1,
7340 const struct ppc_link_hash_entry *hash2)
7341{
7342 Elf_Internal_Shdr *symtab_hdr = &elf_symtab_hdr (ibfd);
7343 enum elf_ppc64_reloc_type r_type = ELF64_R_TYPE (rel->r_info);
7344 unsigned int r_symndx = ELF64_R_SYM (rel->r_info);
7345
e054468f 7346 if (r_symndx >= symtab_hdr->sh_info && is_branch_reloc (r_type))
8387904d 7347 {
3a71aa26
AM
7348 struct elf_link_hash_entry **sym_hashes = elf_sym_hashes (ibfd);
7349 struct elf_link_hash_entry *h;
8387904d 7350
3a71aa26 7351 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
b31867b6 7352 h = elf_follow_link (h);
3a71aa26
AM
7353 if (h == &hash1->elf || h == &hash2->elf)
7354 return TRUE;
a48ebf4d 7355 }
3a71aa26 7356 return FALSE;
951fd09b 7357}
411e1bfb 7358
951fd09b
AM
7359/* Run through all the TLS relocs looking for optimization
7360 opportunities. The linker has been hacked (see ppc64elf.em) to do
7361 a preliminary section layout so that we know the TLS segment
7362 offsets. We can't optimize earlier because some optimizations need
7363 to know the tp offset, and we need to optimize before allocating
7364 dynamic relocations. */
7365
7366bfd_boolean
33c0ec9d 7367ppc64_elf_tls_optimize (struct bfd_link_info *info)
951fd09b
AM
7368{
7369 bfd *ibfd;
7370 asection *sec;
7371 struct ppc_link_hash_table *htab;
663a1470 7372 unsigned char *toc_ref;
102890f0 7373 int pass;
951fd09b 7374
3cbc1e5e 7375 if (!bfd_link_executable (info))
411e1bfb
AM
7376 return TRUE;
7377
951fd09b 7378 htab = ppc_hash_table (info);
4dfe6ac6
NC
7379 if (htab == NULL)
7380 return FALSE;
7381
663a1470
AM
7382 /* Make two passes over the relocs. On the first pass, mark toc
7383 entries involved with tls relocs, and check that tls relocs
7384 involved in setting up a tls_get_addr call are indeed followed by
7385 such a call. If they are not, we can't do any tls optimization.
7386 On the second pass twiddle tls_mask flags to notify
7387 relocate_section that optimization can be done, and adjust got
7388 and plt refcounts. */
7389 toc_ref = NULL;
7390 for (pass = 0; pass < 2; ++pass)
c72f2fb2 7391 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
663a1470
AM
7392 {
7393 Elf_Internal_Sym *locsyms = NULL;
7394 asection *toc = bfd_get_section_by_name (ibfd, ".toc");
7395
102890f0
AM
7396 for (sec = ibfd->sections; sec != NULL; sec = sec->next)
7397 if (sec->has_tls_reloc && !bfd_is_abs_section (sec->output_section))
7398 {
7399 Elf_Internal_Rela *relstart, *rel, *relend;
663a1470 7400 bfd_boolean found_tls_get_addr_arg = 0;
411e1bfb 7401
102890f0
AM
7402 /* Read the relocations. */
7403 relstart = _bfd_elf_link_read_relocs (ibfd, sec, NULL, NULL,
7404 info->keep_memory);
7405 if (relstart == NULL)
2915c55b
JK
7406 {
7407 free (toc_ref);
7408 return FALSE;
7409 }
411e1bfb 7410
102890f0
AM
7411 relend = relstart + sec->reloc_count;
7412 for (rel = relstart; rel < relend; rel++)
7413 {
7414 enum elf_ppc64_reloc_type r_type;
7415 unsigned long r_symndx;
7416 struct elf_link_hash_entry *h;
7417 Elf_Internal_Sym *sym;
7418 asection *sym_sec;
f961d9dd
AM
7419 unsigned char *tls_mask;
7420 unsigned char tls_set, tls_clear, tls_type = 0;
102890f0
AM
7421 bfd_vma value;
7422 bfd_boolean ok_tprel, is_local;
7423 long toc_ref_index = 0;
7424 int expecting_tls_get_addr = 0;
663a1470 7425 bfd_boolean ret = FALSE;
411e1bfb 7426
102890f0
AM
7427 r_symndx = ELF64_R_SYM (rel->r_info);
7428 if (!get_sym_h (&h, &sym, &sym_sec, &tls_mask, &locsyms,
7429 r_symndx, ibfd))
7430 {
7431 err_free_rel:
7432 if (elf_section_data (sec)->relocs != relstart)
7433 free (relstart);
7434 if (toc_ref != NULL)
7435 free (toc_ref);
7436 if (locsyms != NULL
0ffa91dd 7437 && (elf_symtab_hdr (ibfd).contents
102890f0
AM
7438 != (unsigned char *) locsyms))
7439 free (locsyms);
663a1470 7440 return ret;
102890f0 7441 }
411e1bfb 7442
102890f0
AM
7443 if (h != NULL)
7444 {
766bc656
AM
7445 if (h->root.type == bfd_link_hash_defined
7446 || h->root.type == bfd_link_hash_defweak)
7447 value = h->root.u.def.value;
7448 else if (h->root.type == bfd_link_hash_undefweak)
7449 value = 0;
7450 else
663a1470
AM
7451 {
7452 found_tls_get_addr_arg = 0;
7453 continue;
7454 }
102890f0
AM
7455 }
7456 else
7457 /* Symbols referenced by TLS relocs must be of type
7458 STT_TLS. So no need for .opd local sym adjust. */
7459 value = sym->st_value;
7460
7461 ok_tprel = FALSE;
7462 is_local = FALSE;
7463 if (h == NULL
7464 || !h->def_dynamic)
7465 {
7466 is_local = TRUE;
766bc656
AM
7467 if (h != NULL
7468 && h->root.type == bfd_link_hash_undefweak)
7469 ok_tprel = TRUE;
c27b8c2a
AM
7470 else if (sym_sec != NULL
7471 && sym_sec->output_section != NULL)
766bc656
AM
7472 {
7473 value += sym_sec->output_offset;
7474 value += sym_sec->output_section->vma;
7475 value -= htab->elf.tls_sec->vma;
7476 ok_tprel = (value + TP_OFFSET + ((bfd_vma) 1 << 31)
7477 < (bfd_vma) 1 << 32);
7478 }
102890f0 7479 }
951fd09b 7480
102890f0 7481 r_type = ELF64_R_TYPE (rel->r_info);
663a1470
AM
7482 /* If this section has old-style __tls_get_addr calls
7483 without marker relocs, then check that each
7484 __tls_get_addr call reloc is preceded by a reloc
7485 that conceivably belongs to the __tls_get_addr arg
7486 setup insn. If we don't find matching arg setup
7487 relocs, don't do any tls optimization. */
7488 if (pass == 0
7489 && sec->has_tls_get_addr_call
7490 && h != NULL
7491 && (h == &htab->tls_get_addr->elf
7492 || h == &htab->tls_get_addr_fd->elf)
7493 && !found_tls_get_addr_arg
7494 && is_branch_reloc (r_type))
7495 {
25f53a85 7496 info->callbacks->minfo (_("%H __tls_get_addr lost arg, "
663a1470
AM
7497 "TLS optimization disabled\n"),
7498 ibfd, sec, rel->r_offset);
7499 ret = TRUE;
7500 goto err_free_rel;
7501 }
7502
7503 found_tls_get_addr_arg = 0;
102890f0
AM
7504 switch (r_type)
7505 {
7506 case R_PPC64_GOT_TLSLD16:
7507 case R_PPC64_GOT_TLSLD16_LO:
7508 expecting_tls_get_addr = 1;
663a1470 7509 found_tls_get_addr_arg = 1;
1a0670f3 7510 /* Fall through. */
102890f0
AM
7511
7512 case R_PPC64_GOT_TLSLD16_HI:
7513 case R_PPC64_GOT_TLSLD16_HA:
7514 /* These relocs should never be against a symbol
7515 defined in a shared lib. Leave them alone if
7516 that turns out to be the case. */
7517 if (!is_local)
7518 continue;
411e1bfb 7519
102890f0 7520 /* LD -> LE */
411e1bfb 7521 tls_set = 0;
102890f0
AM
7522 tls_clear = TLS_LD;
7523 tls_type = TLS_TLS | TLS_LD;
7524 break;
411e1bfb 7525
102890f0
AM
7526 case R_PPC64_GOT_TLSGD16:
7527 case R_PPC64_GOT_TLSGD16_LO:
7528 expecting_tls_get_addr = 1;
663a1470 7529 found_tls_get_addr_arg = 1;
1a0670f3 7530 /* Fall through. */
102890f0
AM
7531
7532 case R_PPC64_GOT_TLSGD16_HI:
7533 case R_PPC64_GOT_TLSGD16_HA:
7534 if (ok_tprel)
7535 /* GD -> LE */
411e1bfb 7536 tls_set = 0;
102890f0
AM
7537 else
7538 /* GD -> IE */
7539 tls_set = TLS_TLS | TLS_TPRELGD;
7540 tls_clear = TLS_GD;
7541 tls_type = TLS_TLS | TLS_GD;
7542 break;
7543
7544 case R_PPC64_GOT_TPREL16_DS:
7545 case R_PPC64_GOT_TPREL16_LO_DS:
7546 case R_PPC64_GOT_TPREL16_HI:
7547 case R_PPC64_GOT_TPREL16_HA:
7548 if (ok_tprel)
7549 {
7550 /* IE -> LE */
7551 tls_set = 0;
7552 tls_clear = TLS_TPREL;
7553 tls_type = TLS_TLS | TLS_TPREL;
7554 break;
7555 }
411e1bfb
AM
7556 continue;
7557
727fc41e
AM
7558 case R_PPC64_TLSGD:
7559 case R_PPC64_TLSLD:
23cedd1d
AM
7560 if (rel + 1 < relend
7561 && is_plt_seq_reloc (ELF64_R_TYPE (rel[1].r_info)))
7562 {
7563 if (pass != 0
2cdcc330
AM
7564 && (ELF64_R_TYPE (rel[1].r_info)
7565 != R_PPC64_PLTSEQ))
23cedd1d
AM
7566 {
7567 r_symndx = ELF64_R_SYM (rel[1].r_info);
7568 if (!get_sym_h (&h, NULL, NULL, NULL, &locsyms,
2cdcc330 7569 r_symndx, ibfd))
23cedd1d
AM
7570 goto err_free_rel;
7571 if (h != NULL)
7572 {
7573 struct plt_entry *ent = NULL;
7574
7575 for (ent = h->plt.plist;
7576 ent != NULL;
7577 ent = ent->next)
7578 if (ent->addend == rel[1].r_addend)
7579 break;
7580
7581 if (ent != NULL
7582 && ent->plt.refcount > 0)
7583 ent->plt.refcount -= 1;
7584 }
7585 }
7586 continue;
7587 }
663a1470 7588 found_tls_get_addr_arg = 1;
1a0670f3 7589 /* Fall through. */
663a1470
AM
7590
7591 case R_PPC64_TLS:
7592 case R_PPC64_TOC16:
7593 case R_PPC64_TOC16_LO:
102890f0
AM
7594 if (sym_sec == NULL || sym_sec != toc)
7595 continue;
7596
7597 /* Mark this toc entry as referenced by a TLS
7598 code sequence. We can do that now in the
7599 case of R_PPC64_TLS, and after checking for
7600 tls_get_addr for the TOC16 relocs. */
7601 if (toc_ref == NULL)
2cdcc330
AM
7602 toc_ref
7603 = bfd_zmalloc (toc->output_section->rawsize / 8);
663a1470
AM
7604 if (toc_ref == NULL)
7605 goto err_free_rel;
7606
102890f0
AM
7607 if (h != NULL)
7608 value = h->root.u.def.value;
7609 else
7610 value = sym->st_value;
7611 value += rel->r_addend;
73242275
AM
7612 if (value % 8 != 0)
7613 continue;
7614 BFD_ASSERT (value < toc->size
7615 && toc->output_offset % 8 == 0);
663a1470 7616 toc_ref_index = (value + toc->output_offset) / 8;
727fc41e
AM
7617 if (r_type == R_PPC64_TLS
7618 || r_type == R_PPC64_TLSGD
7619 || r_type == R_PPC64_TLSLD)
102890f0
AM
7620 {
7621 toc_ref[toc_ref_index] = 1;
7622 continue;
7623 }
7624
7625 if (pass != 0 && toc_ref[toc_ref_index] == 0)
7626 continue;
7627
7628 tls_set = 0;
7629 tls_clear = 0;
7630 expecting_tls_get_addr = 2;
7631 break;
7632
7633 case R_PPC64_TPREL64:
7634 if (pass == 0
7635 || sec != toc
7636 || toc_ref == NULL
663a1470 7637 || !toc_ref[(rel->r_offset + toc->output_offset) / 8])
102890f0
AM
7638 continue;
7639 if (ok_tprel)
7640 {
7641 /* IE -> LE */
7642 tls_set = TLS_EXPLICIT;
7643 tls_clear = TLS_TPREL;
7644 break;
7645 }
7646 continue;
7647
7648 case R_PPC64_DTPMOD64:
7649 if (pass == 0
7650 || sec != toc
7651 || toc_ref == NULL
663a1470 7652 || !toc_ref[(rel->r_offset + toc->output_offset) / 8])
102890f0
AM
7653 continue;
7654 if (rel + 1 < relend
7655 && (rel[1].r_info
7656 == ELF64_R_INFO (r_symndx, R_PPC64_DTPREL64))
7657 && rel[1].r_offset == rel->r_offset + 8)
7658 {
7659 if (ok_tprel)
7660 /* GD -> LE */
7661 tls_set = TLS_EXPLICIT | TLS_GD;
7662 else
7663 /* GD -> IE */
7664 tls_set = TLS_EXPLICIT | TLS_GD | TLS_TPRELGD;
7665 tls_clear = TLS_GD;
7666 }
7667 else
7668 {
7669 if (!is_local)
7670 continue;
7671
7672 /* LD -> LE */
7673 tls_set = TLS_EXPLICIT;
7674 tls_clear = TLS_LD;
7675 }
7676 break;
7677
7678 default:
7679 continue;
7680 }
7681
7682 if (pass == 0)
7683 {
727fc41e
AM
7684 if (!expecting_tls_get_addr
7685 || !sec->has_tls_get_addr_call)
102890f0
AM
7686 continue;
7687
3a71aa26
AM
7688 if (rel + 1 < relend
7689 && branch_reloc_hash_match (ibfd, rel + 1,
7690 htab->tls_get_addr,
7691 htab->tls_get_addr_fd))
102890f0 7692 {
3a71aa26 7693 if (expecting_tls_get_addr == 2)
102890f0 7694 {
3a71aa26 7695 /* Check for toc tls entries. */
f961d9dd 7696 unsigned char *toc_tls;
3a71aa26
AM
7697 int retval;
7698
7699 retval = get_tls_mask (&toc_tls, NULL, NULL,
7700 &locsyms,
7701 rel, ibfd);
7702 if (retval == 0)
7703 goto err_free_rel;
663a1470
AM
7704 if (toc_tls != NULL)
7705 {
37da22e5
AM
7706 if ((*toc_tls & TLS_TLS) != 0
7707 && ((*toc_tls & (TLS_GD | TLS_LD)) != 0))
663a1470
AM
7708 found_tls_get_addr_arg = 1;
7709 if (retval > 1)
7710 toc_ref[toc_ref_index] = 1;
7711 }
102890f0 7712 }
3a71aa26 7713 continue;
102890f0
AM
7714 }
7715
102890f0
AM
7716 /* Uh oh, we didn't find the expected call. We
7717 could just mark this symbol to exclude it
7718 from tls optimization but it's safer to skip
663a1470 7719 the entire optimization. */
695344c0 7720 /* xgettext:c-format */
25f53a85 7721 info->callbacks->minfo (_("%H arg lost __tls_get_addr, "
663a1470
AM
7722 "TLS optimization disabled\n"),
7723 ibfd, sec, rel->r_offset);
7724 ret = TRUE;
7725 goto err_free_rel;
102890f0
AM
7726 }
7727
37da22e5
AM
7728 /* If we don't have old-style __tls_get_addr calls
7729 without TLSGD/TLSLD marker relocs, and we haven't
7730 found a new-style __tls_get_addr call with a
7731 marker for this symbol, then we either have a
7732 broken object file or an -mlongcall style
7733 indirect call to __tls_get_addr without a marker.
7734 Disable optimization in this case. */
7735 if ((tls_clear & (TLS_GD | TLS_LD)) != 0
7736 && (tls_set & TLS_EXPLICIT) == 0
7737 && !sec->has_tls_get_addr_call
7738 && ((*tls_mask & (TLS_TLS | TLS_MARK))
7739 != (TLS_TLS | TLS_MARK)))
7740 continue;
7741
23cedd1d 7742 if (expecting_tls_get_addr)
102890f0 7743 {
23cedd1d
AM
7744 struct plt_entry *ent = NULL;
7745
7746 if (htab->tls_get_addr != NULL)
7747 for (ent = htab->tls_get_addr->elf.plt.plist;
7748 ent != NULL;
7749 ent = ent->next)
7750 if (ent->addend == 0)
102890f0 7751 break;
411e1bfb 7752
23cedd1d
AM
7753 if (ent == NULL && htab->tls_get_addr_fd != NULL)
7754 for (ent = htab->tls_get_addr_fd->elf.plt.plist;
7755 ent != NULL;
7756 ent = ent->next)
7757 if (ent->addend == 0)
102890f0 7758 break;
23cedd1d
AM
7759
7760 if (ent != NULL
7761 && ent->plt.refcount > 0)
7762 ent->plt.refcount -= 1;
102890f0 7763 }
411e1bfb 7764
102890f0 7765 if (tls_clear == 0)
30038c59
AM
7766 continue;
7767
102890f0
AM
7768 if ((tls_set & TLS_EXPLICIT) == 0)
7769 {
7770 struct got_entry *ent;
411e1bfb 7771
102890f0
AM
7772 /* Adjust got entry for this reloc. */
7773 if (h != NULL)
7774 ent = h->got.glist;
7775 else
7776 ent = elf_local_got_ents (ibfd)[r_symndx];
411e1bfb 7777
102890f0
AM
7778 for (; ent != NULL; ent = ent->next)
7779 if (ent->addend == rel->r_addend
7780 && ent->owner == ibfd
7781 && ent->tls_type == tls_type)
7782 break;
7783 if (ent == NULL)
7784 abort ();
411e1bfb 7785
102890f0
AM
7786 if (tls_set == 0)
7787 {
7788 /* We managed to get rid of a got entry. */
7789 if (ent->got.refcount > 0)
7790 ent->got.refcount -= 1;
7791 }
7792 }
7793 else
7794 {
7795 /* If we got rid of a DTPMOD/DTPREL reloc pair then
7796 we'll lose one or two dyn relocs. */
7797 if (!dec_dynrel_count (rel->r_info, sec, info,
19e08130 7798 NULL, h, sym))
102890f0 7799 return FALSE;
411e1bfb 7800
102890f0
AM
7801 if (tls_set == (TLS_EXPLICIT | TLS_GD))
7802 {
7803 if (!dec_dynrel_count ((rel + 1)->r_info, sec, info,
19e08130 7804 NULL, h, sym))
102890f0
AM
7805 return FALSE;
7806 }
7807 }
411e1bfb 7808
102890f0
AM
7809 *tls_mask |= tls_set;
7810 *tls_mask &= ~tls_clear;
7811 }
8c1d1bb8 7812
102890f0
AM
7813 if (elf_section_data (sec)->relocs != relstart)
7814 free (relstart);
7815 }
411e1bfb 7816
663a1470
AM
7817 if (locsyms != NULL
7818 && (elf_symtab_hdr (ibfd).contents != (unsigned char *) locsyms))
7819 {
7820 if (!info->keep_memory)
7821 free (locsyms);
7822 else
7823 elf_symtab_hdr (ibfd).contents = (unsigned char *) locsyms;
7824 }
7825 }
411e1bfb 7826
663a1470
AM
7827 if (toc_ref != NULL)
7828 free (toc_ref);
9a23f96e 7829 htab->do_tls_opt = 1;
b34976b6 7830 return TRUE;
1e2f5b6e 7831}
b34976b6 7832
c5614fa4
AM
7833/* Called via elf_link_hash_traverse from ppc64_elf_edit_toc to adjust
7834 the values of any global symbols in a toc section that has been
7835 edited. Globals in toc sections should be a rarity, so this function
7836 sets a flag if any are found in toc sections other than the one just
de194d85 7837 edited, so that further hash table traversals can be avoided. */
c5614fa4
AM
7838
7839struct adjust_toc_info
7840{
7841 asection *toc;
7842 unsigned long *skip;
7843 bfd_boolean global_toc_syms;
7844};
7845
ba761f19
AM
7846enum toc_skip_enum { ref_from_discarded = 1, can_optimize = 2 };
7847
c5614fa4
AM
7848static bfd_boolean
7849adjust_toc_syms (struct elf_link_hash_entry *h, void *inf)
7850{
7851 struct ppc_link_hash_entry *eh;
7852 struct adjust_toc_info *toc_inf = (struct adjust_toc_info *) inf;
854b41e7 7853 unsigned long i;
c5614fa4 7854
c5614fa4
AM
7855 if (h->root.type != bfd_link_hash_defined
7856 && h->root.type != bfd_link_hash_defweak)
7857 return TRUE;
7858
7859 eh = (struct ppc_link_hash_entry *) h;
7860 if (eh->adjust_done)
7861 return TRUE;
7862
7863 if (eh->elf.root.u.def.section == toc_inf->toc)
7864 {
854b41e7
AM
7865 if (eh->elf.root.u.def.value > toc_inf->toc->rawsize)
7866 i = toc_inf->toc->rawsize >> 3;
c5614fa4 7867 else
854b41e7
AM
7868 i = eh->elf.root.u.def.value >> 3;
7869
ba761f19 7870 if ((toc_inf->skip[i] & (ref_from_discarded | can_optimize)) != 0)
c5614fa4 7871 {
4eca0228 7872 _bfd_error_handler
854b41e7
AM
7873 (_("%s defined on removed toc entry"), eh->elf.root.root.string);
7874 do
7875 ++i;
ba761f19 7876 while ((toc_inf->skip[i] & (ref_from_discarded | can_optimize)) != 0);
854b41e7 7877 eh->elf.root.u.def.value = (bfd_vma) i << 3;
c5614fa4 7878 }
854b41e7
AM
7879
7880 eh->elf.root.u.def.value -= toc_inf->skip[i];
c5614fa4
AM
7881 eh->adjust_done = 1;
7882 }
7883 else if (strcmp (eh->elf.root.u.def.section->name, ".toc") == 0)
7884 toc_inf->global_toc_syms = TRUE;
7885
7886 return TRUE;
7887}
7888
39eeab25
AM
7889/* Return TRUE iff INSN with a relocation of R_TYPE is one we expect
7890 on a _LO variety toc/got reloc. */
560c8763
AM
7891
7892static bfd_boolean
39eeab25 7893ok_lo_toc_insn (unsigned int insn, enum elf_ppc64_reloc_type r_type)
560c8763 7894{
39eeab25
AM
7895 return ((insn & (0x3f << 26)) == 12u << 26 /* addic */
7896 || (insn & (0x3f << 26)) == 14u << 26 /* addi */
560c8763
AM
7897 || (insn & (0x3f << 26)) == 32u << 26 /* lwz */
7898 || (insn & (0x3f << 26)) == 34u << 26 /* lbz */
7899 || (insn & (0x3f << 26)) == 36u << 26 /* stw */
7900 || (insn & (0x3f << 26)) == 38u << 26 /* stb */
7901 || (insn & (0x3f << 26)) == 40u << 26 /* lhz */
7902 || (insn & (0x3f << 26)) == 42u << 26 /* lha */
7903 || (insn & (0x3f << 26)) == 44u << 26 /* sth */
7904 || (insn & (0x3f << 26)) == 46u << 26 /* lmw */
7905 || (insn & (0x3f << 26)) == 47u << 26 /* stmw */
7906 || (insn & (0x3f << 26)) == 48u << 26 /* lfs */
7907 || (insn & (0x3f << 26)) == 50u << 26 /* lfd */
7908 || (insn & (0x3f << 26)) == 52u << 26 /* stfs */
7909 || (insn & (0x3f << 26)) == 54u << 26 /* stfd */
39eeab25
AM
7910 || (insn & (0x3f << 26)) == 56u << 26 /* lq,lfq */
7911 || ((insn & (0x3f << 26)) == 57u << 26 /* lxsd,lxssp,lfdp */
7912 /* Exclude lfqu by testing reloc. If relocs are ever
7913 defined for the reduced D field in psq_lu then those
7914 will need testing too. */
7915 && r_type != R_PPC64_TOC16_LO && r_type != R_PPC64_GOT16_LO)
7916 || ((insn & (0x3f << 26)) == 58u << 26 /* ld,lwa */
7917 && (insn & 1) == 0)
7918 || (insn & (0x3f << 26)) == 60u << 26 /* stfq */
7919 || ((insn & (0x3f << 26)) == 61u << 26 /* lxv,stx{v,sd,ssp},stfdp */
7920 /* Exclude stfqu. psq_stu as above for psq_lu. */
7921 && r_type != R_PPC64_TOC16_LO && r_type != R_PPC64_GOT16_LO)
7922 || ((insn & (0x3f << 26)) == 62u << 26 /* std,stq */
7923 && (insn & 1) == 0));
560c8763
AM
7924}
7925
c5614fa4
AM
7926/* Examine all relocs referencing .toc sections in order to remove
7927 unused .toc entries. */
7928
7929bfd_boolean
33c0ec9d 7930ppc64_elf_edit_toc (struct bfd_link_info *info)
c5614fa4
AM
7931{
7932 bfd *ibfd;
7933 struct adjust_toc_info toc_inf;
67f0cbdb 7934 struct ppc_link_hash_table *htab = ppc_hash_table (info);
c5614fa4 7935
67f0cbdb 7936 htab->do_toc_opt = 1;
c5614fa4 7937 toc_inf.global_toc_syms = TRUE;
c72f2fb2 7938 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
c5614fa4
AM
7939 {
7940 asection *toc, *sec;
7941 Elf_Internal_Shdr *symtab_hdr;
7942 Elf_Internal_Sym *local_syms;
425b145b 7943 Elf_Internal_Rela *relstart, *rel, *toc_relocs;
c5614fa4
AM
7944 unsigned long *skip, *drop;
7945 unsigned char *used;
7946 unsigned char *keep, last, some_unused;
7947
854b41e7
AM
7948 if (!is_ppc64_elf (ibfd))
7949 continue;
7950
c5614fa4
AM
7951 toc = bfd_get_section_by_name (ibfd, ".toc");
7952 if (toc == NULL
92b7a70f 7953 || toc->size == 0
dbaa2011
AM
7954 || toc->sec_info_type == SEC_INFO_TYPE_JUST_SYMS
7955 || discarded_section (toc))
c5614fa4
AM
7956 continue;
7957
425b145b 7958 toc_relocs = NULL;
c5614fa4 7959 local_syms = NULL;
0ffa91dd 7960 symtab_hdr = &elf_symtab_hdr (ibfd);
c5614fa4
AM
7961
7962 /* Look at sections dropped from the final link. */
7963 skip = NULL;
7964 relstart = NULL;
7965 for (sec = ibfd->sections; sec != NULL; sec = sec->next)
7966 {
7967 if (sec->reloc_count == 0
dbaa2011 7968 || !discarded_section (sec)
c5614fa4
AM
7969 || get_opd_info (sec)
7970 || (sec->flags & SEC_ALLOC) == 0
7971 || (sec->flags & SEC_DEBUGGING) != 0)
7972 continue;
7973
7974 relstart = _bfd_elf_link_read_relocs (ibfd, sec, NULL, NULL, FALSE);
7975 if (relstart == NULL)
7976 goto error_ret;
7977
7978 /* Run through the relocs to see which toc entries might be
7979 unused. */
7980 for (rel = relstart; rel < relstart + sec->reloc_count; ++rel)
7981 {
7982 enum elf_ppc64_reloc_type r_type;
7983 unsigned long r_symndx;
7984 asection *sym_sec;
7985 struct elf_link_hash_entry *h;
7986 Elf_Internal_Sym *sym;
7987 bfd_vma val;
7988
7989 r_type = ELF64_R_TYPE (rel->r_info);
7990 switch (r_type)
7991 {
7992 default:
7993 continue;
7994
7995 case R_PPC64_TOC16:
7996 case R_PPC64_TOC16_LO:
7997 case R_PPC64_TOC16_HI:
7998 case R_PPC64_TOC16_HA:
7999 case R_PPC64_TOC16_DS:
8000 case R_PPC64_TOC16_LO_DS:
8001 break;
8002 }
8003
8004 r_symndx = ELF64_R_SYM (rel->r_info);
8005 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms,
8006 r_symndx, ibfd))
8007 goto error_ret;
8008
8009 if (sym_sec != toc)
8010 continue;
8011
8012 if (h != NULL)
8013 val = h->root.u.def.value;
8014 else
8015 val = sym->st_value;
8016 val += rel->r_addend;
8017
8018 if (val >= toc->size)
8019 continue;
8020
8021 /* Anything in the toc ought to be aligned to 8 bytes.
8022 If not, don't mark as unused. */
8023 if (val & 7)
8024 continue;
8025
8026 if (skip == NULL)
8027 {
854b41e7 8028 skip = bfd_zmalloc (sizeof (*skip) * (toc->size + 15) / 8);
c5614fa4
AM
8029 if (skip == NULL)
8030 goto error_ret;
8031 }
8032
ba761f19 8033 skip[val >> 3] = ref_from_discarded;
c5614fa4
AM
8034 }
8035
8036 if (elf_section_data (sec)->relocs != relstart)
8037 free (relstart);
8038 }
8039
ba761f19
AM
8040 /* For largetoc loads of address constants, we can convert
8041 . addis rx,2,addr@got@ha
8042 . ld ry,addr@got@l(rx)
8043 to
8044 . addis rx,2,addr@toc@ha
8045 . addi ry,rx,addr@toc@l
8046 when addr is within 2G of the toc pointer. This then means
8047 that the word storing "addr" in the toc is no longer needed. */
68ffbac6 8048
ba761f19
AM
8049 if (!ppc64_elf_tdata (ibfd)->has_small_toc_reloc
8050 && toc->output_section->rawsize < (bfd_vma) 1 << 31
8051 && toc->reloc_count != 0)
8052 {
8053 /* Read toc relocs. */
425b145b
AM
8054 toc_relocs = _bfd_elf_link_read_relocs (ibfd, toc, NULL, NULL,
8055 info->keep_memory);
8056 if (toc_relocs == NULL)
ba761f19
AM
8057 goto error_ret;
8058
425b145b 8059 for (rel = toc_relocs; rel < toc_relocs + toc->reloc_count; ++rel)
ba761f19
AM
8060 {
8061 enum elf_ppc64_reloc_type r_type;
8062 unsigned long r_symndx;
8063 asection *sym_sec;
8064 struct elf_link_hash_entry *h;
8065 Elf_Internal_Sym *sym;
8066 bfd_vma val, addr;
8067
8068 r_type = ELF64_R_TYPE (rel->r_info);
8069 if (r_type != R_PPC64_ADDR64)
8070 continue;
8071
8072 r_symndx = ELF64_R_SYM (rel->r_info);
8073 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms,
8074 r_symndx, ibfd))
8075 goto error_ret;
8076
425b145b 8077 if (sym_sec == NULL
c27b8c2a 8078 || sym_sec->output_section == NULL
dbaa2011 8079 || discarded_section (sym_sec))
425b145b
AM
8080 continue;
8081
afe397ea 8082 if (!SYMBOL_REFERENCES_LOCAL (info, h))
ba761f19
AM
8083 continue;
8084
8085 if (h != NULL)
bddc25c9
AM
8086 {
8087 if (h->type == STT_GNU_IFUNC)
8088 continue;
8089 val = h->root.u.def.value;
8090 }
ba761f19 8091 else
bddc25c9
AM
8092 {
8093 if (ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC)
8094 continue;
8095 val = sym->st_value;
8096 }
ba761f19
AM
8097 val += rel->r_addend;
8098 val += sym_sec->output_section->vma + sym_sec->output_offset;
8099
8100 /* We don't yet know the exact toc pointer value, but we
8101 know it will be somewhere in the toc section. Don't
8102 optimize if the difference from any possible toc
8103 pointer is outside [ff..f80008000, 7fff7fff]. */
8104 addr = toc->output_section->vma + TOC_BASE_OFF;
8105 if (val - addr + (bfd_vma) 0x80008000 >= (bfd_vma) 1 << 32)
8106 continue;
8107
8108 addr = toc->output_section->vma + toc->output_section->rawsize;
8109 if (val - addr + (bfd_vma) 0x80008000 >= (bfd_vma) 1 << 32)
8110 continue;
8111
8112 if (skip == NULL)
8113 {
8114 skip = bfd_zmalloc (sizeof (*skip) * (toc->size + 15) / 8);
8115 if (skip == NULL)
8116 goto error_ret;
8117 }
8118
8119 skip[rel->r_offset >> 3]
425b145b 8120 |= can_optimize | ((rel - toc_relocs) << 2);
ba761f19 8121 }
ba761f19
AM
8122 }
8123
c5614fa4
AM
8124 if (skip == NULL)
8125 continue;
8126
8127 used = bfd_zmalloc (sizeof (*used) * (toc->size + 7) / 8);
8128 if (used == NULL)
8129 {
8130 error_ret:
8131 if (local_syms != NULL
8132 && symtab_hdr->contents != (unsigned char *) local_syms)
8133 free (local_syms);
8134 if (sec != NULL
8135 && relstart != NULL
8136 && elf_section_data (sec)->relocs != relstart)
8137 free (relstart);
425b145b
AM
8138 if (toc_relocs != NULL
8139 && elf_section_data (toc)->relocs != toc_relocs)
8140 free (toc_relocs);
c5614fa4
AM
8141 if (skip != NULL)
8142 free (skip);
8143 return FALSE;
8144 }
8145
30038c59
AM
8146 /* Now check all kept sections that might reference the toc.
8147 Check the toc itself last. */
8148 for (sec = (ibfd->sections == toc && toc->next ? toc->next
8149 : ibfd->sections);
c5614fa4 8150 sec != NULL;
c5614fa4 8151 sec = (sec == toc ? NULL
c5614fa4 8152 : sec->next == NULL ? toc
30038c59 8153 : sec->next == toc && toc->next ? toc->next
c5614fa4
AM
8154 : sec->next))
8155 {
8156 int repeat;
8157
8158 if (sec->reloc_count == 0
dbaa2011 8159 || discarded_section (sec)
c5614fa4
AM
8160 || get_opd_info (sec)
8161 || (sec->flags & SEC_ALLOC) == 0
8162 || (sec->flags & SEC_DEBUGGING) != 0)
8163 continue;
8164
854b41e7
AM
8165 relstart = _bfd_elf_link_read_relocs (ibfd, sec, NULL, NULL,
8166 info->keep_memory);
c5614fa4 8167 if (relstart == NULL)
2915c55b
JK
8168 {
8169 free (used);
8170 goto error_ret;
8171 }
c5614fa4
AM
8172
8173 /* Mark toc entries referenced as used. */
c5614fa4 8174 do
d4f1ee75
AM
8175 {
8176 repeat = 0;
8177 for (rel = relstart; rel < relstart + sec->reloc_count; ++rel)
8178 {
8179 enum elf_ppc64_reloc_type r_type;
8180 unsigned long r_symndx;
8181 asection *sym_sec;
8182 struct elf_link_hash_entry *h;
8183 Elf_Internal_Sym *sym;
8184 bfd_vma val;
8185 enum {no_check, check_lo, check_ha} insn_check;
98528052 8186
d4f1ee75
AM
8187 r_type = ELF64_R_TYPE (rel->r_info);
8188 switch (r_type)
8189 {
8190 default:
8191 insn_check = no_check;
8192 break;
98528052 8193
d4f1ee75
AM
8194 case R_PPC64_GOT_TLSLD16_HA:
8195 case R_PPC64_GOT_TLSGD16_HA:
8196 case R_PPC64_GOT_TPREL16_HA:
8197 case R_PPC64_GOT_DTPREL16_HA:
8198 case R_PPC64_GOT16_HA:
8199 case R_PPC64_TOC16_HA:
8200 insn_check = check_ha;
8201 break;
98528052 8202
d4f1ee75
AM
8203 case R_PPC64_GOT_TLSLD16_LO:
8204 case R_PPC64_GOT_TLSGD16_LO:
8205 case R_PPC64_GOT_TPREL16_LO_DS:
8206 case R_PPC64_GOT_DTPREL16_LO_DS:
8207 case R_PPC64_GOT16_LO:
8208 case R_PPC64_GOT16_LO_DS:
8209 case R_PPC64_TOC16_LO:
8210 case R_PPC64_TOC16_LO_DS:
8211 insn_check = check_lo;
8212 break;
8213 }
560c8763 8214
d4f1ee75
AM
8215 if (insn_check != no_check)
8216 {
8217 bfd_vma off = rel->r_offset & ~3;
8218 unsigned char buf[4];
8219 unsigned int insn;
c5614fa4 8220
d4f1ee75
AM
8221 if (!bfd_get_section_contents (ibfd, sec, buf, off, 4))
8222 {
8223 free (used);
8224 goto error_ret;
8225 }
8226 insn = bfd_get_32 (ibfd, buf);
8227 if (insn_check == check_lo
39eeab25 8228 ? !ok_lo_toc_insn (insn, r_type)
d4f1ee75
AM
8229 : ((insn & ((0x3f << 26) | 0x1f << 16))
8230 != ((15u << 26) | (2 << 16)) /* addis rt,2,imm */))
8231 {
8232 char str[12];
8233
8234 ppc64_elf_tdata (ibfd)->unexpected_toc_insn = 1;
8235 sprintf (str, "%#08x", insn);
8236 info->callbacks->einfo
695344c0 8237 /* xgettext:c-format */
174d0a74 8238 (_("%H: toc optimization is not supported for"
cf97bcb0 8239 " %s instruction\n"),
d4f1ee75
AM
8240 ibfd, sec, rel->r_offset & ~3, str);
8241 }
8242 }
c5614fa4 8243
d4f1ee75
AM
8244 switch (r_type)
8245 {
8246 case R_PPC64_TOC16:
8247 case R_PPC64_TOC16_LO:
8248 case R_PPC64_TOC16_HI:
8249 case R_PPC64_TOC16_HA:
8250 case R_PPC64_TOC16_DS:
8251 case R_PPC64_TOC16_LO_DS:
8252 /* In case we're taking addresses of toc entries. */
8253 case R_PPC64_ADDR64:
8254 break;
c5614fa4 8255
d4f1ee75
AM
8256 default:
8257 continue;
8258 }
c5614fa4 8259
d4f1ee75
AM
8260 r_symndx = ELF64_R_SYM (rel->r_info);
8261 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms,
8262 r_symndx, ibfd))
8263 {
8264 free (used);
8265 goto error_ret;
8266 }
c5614fa4 8267
d4f1ee75
AM
8268 if (sym_sec != toc)
8269 continue;
c5614fa4 8270
d4f1ee75
AM
8271 if (h != NULL)
8272 val = h->root.u.def.value;
8273 else
8274 val = sym->st_value;
8275 val += rel->r_addend;
ba761f19 8276
d4f1ee75
AM
8277 if (val >= toc->size)
8278 continue;
ba761f19 8279
d4f1ee75
AM
8280 if ((skip[val >> 3] & can_optimize) != 0)
8281 {
8282 bfd_vma off;
8283 unsigned char opc;
8284
8285 switch (r_type)
8286 {
8287 case R_PPC64_TOC16_HA:
ba761f19 8288 break;
ba761f19 8289
d4f1ee75
AM
8290 case R_PPC64_TOC16_LO_DS:
8291 off = rel->r_offset;
8292 off += (bfd_big_endian (ibfd) ? -2 : 3);
8293 if (!bfd_get_section_contents (ibfd, sec, &opc,
8294 off, 1))
8295 {
8296 free (used);
8297 goto error_ret;
8298 }
8299 if ((opc & (0x3f << 2)) == (58u << 2))
8300 break;
1a0670f3 8301 /* Fall through. */
ba761f19 8302
d4f1ee75
AM
8303 default:
8304 /* Wrong sort of reloc, or not a ld. We may
8305 as well clear ref_from_discarded too. */
8306 skip[val >> 3] = 0;
8307 }
8308 }
8309
8310 if (sec != toc)
8311 used[val >> 3] = 1;
8312 /* For the toc section, we only mark as used if this
8313 entry itself isn't unused. */
8314 else if ((used[rel->r_offset >> 3]
8315 || !(skip[rel->r_offset >> 3] & ref_from_discarded))
8316 && !used[val >> 3])
8317 {
8318 /* Do all the relocs again, to catch reference
8319 chains. */
8320 repeat = 1;
8321 used[val >> 3] = 1;
8322 }
8323 }
8324 }
c5614fa4 8325 while (repeat);
854b41e7
AM
8326
8327 if (elf_section_data (sec)->relocs != relstart)
8328 free (relstart);
c5614fa4
AM
8329 }
8330
8331 /* Merge the used and skip arrays. Assume that TOC
8332 doublewords not appearing as either used or unused belong
de194d85 8333 to an entry more than one doubleword in size. */
c5614fa4
AM
8334 for (drop = skip, keep = used, last = 0, some_unused = 0;
8335 drop < skip + (toc->size + 7) / 8;
8336 ++drop, ++keep)
8337 {
8338 if (*keep)
8339 {
ba761f19
AM
8340 *drop &= ~ref_from_discarded;
8341 if ((*drop & can_optimize) != 0)
8342 some_unused = 1;
c5614fa4
AM
8343 last = 0;
8344 }
b140b010 8345 else if ((*drop & ref_from_discarded) != 0)
c5614fa4
AM
8346 {
8347 some_unused = 1;
ba761f19 8348 last = ref_from_discarded;
c5614fa4
AM
8349 }
8350 else
8351 *drop = last;
8352 }
8353
8354 free (used);
8355
8356 if (some_unused)
8357 {
8358 bfd_byte *contents, *src;
8359 unsigned long off;
d62b3684 8360 Elf_Internal_Sym *sym;
ba761f19 8361 bfd_boolean local_toc_syms = FALSE;
c5614fa4
AM
8362
8363 /* Shuffle the toc contents, and at the same time convert the
8364 skip array from booleans into offsets. */
8365 if (!bfd_malloc_and_get_section (ibfd, toc, &contents))
8366 goto error_ret;
8367
8368 elf_section_data (toc)->this_hdr.contents = contents;
8369
8370 for (src = contents, off = 0, drop = skip;
8371 src < contents + toc->size;
8372 src += 8, ++drop)
8373 {
ba761f19
AM
8374 if ((*drop & (can_optimize | ref_from_discarded)) != 0)
8375 off += 8;
c5614fa4
AM
8376 else if (off != 0)
8377 {
8378 *drop = off;
8379 memcpy (src - off, src, 8);
8380 }
8381 }
854b41e7 8382 *drop = off;
c5614fa4
AM
8383 toc->rawsize = toc->size;
8384 toc->size = src - contents - off;
8385
ba761f19
AM
8386 /* Adjust addends for relocs against the toc section sym,
8387 and optimize any accesses we can. */
c5614fa4
AM
8388 for (sec = ibfd->sections; sec != NULL; sec = sec->next)
8389 {
8390 if (sec->reloc_count == 0
dbaa2011 8391 || discarded_section (sec))
c5614fa4
AM
8392 continue;
8393
8394 relstart = _bfd_elf_link_read_relocs (ibfd, sec, NULL, NULL,
854b41e7 8395 info->keep_memory);
c5614fa4
AM
8396 if (relstart == NULL)
8397 goto error_ret;
8398
8399 for (rel = relstart; rel < relstart + sec->reloc_count; ++rel)
8400 {
8401 enum elf_ppc64_reloc_type r_type;
8402 unsigned long r_symndx;
8403 asection *sym_sec;
8404 struct elf_link_hash_entry *h;
854b41e7 8405 bfd_vma val;
c5614fa4
AM
8406
8407 r_type = ELF64_R_TYPE (rel->r_info);
8408 switch (r_type)
8409 {
8410 default:
8411 continue;
8412
8413 case R_PPC64_TOC16:
8414 case R_PPC64_TOC16_LO:
8415 case R_PPC64_TOC16_HI:
8416 case R_PPC64_TOC16_HA:
8417 case R_PPC64_TOC16_DS:
8418 case R_PPC64_TOC16_LO_DS:
8419 case R_PPC64_ADDR64:
8420 break;
8421 }
8422
8423 r_symndx = ELF64_R_SYM (rel->r_info);
8424 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms,
8425 r_symndx, ibfd))
8426 goto error_ret;
8427
ba761f19 8428 if (sym_sec != toc)
c5614fa4
AM
8429 continue;
8430
ba761f19
AM
8431 if (h != NULL)
8432 val = h->root.u.def.value;
8433 else
8434 {
8435 val = sym->st_value;
8436 if (val != 0)
8437 local_toc_syms = TRUE;
8438 }
8439
8440 val += rel->r_addend;
854b41e7
AM
8441
8442 if (val > toc->rawsize)
8443 val = toc->rawsize;
ba761f19
AM
8444 else if ((skip[val >> 3] & ref_from_discarded) != 0)
8445 continue;
8446 else if ((skip[val >> 3] & can_optimize) != 0)
8447 {
8448 Elf_Internal_Rela *tocrel
425b145b 8449 = toc_relocs + (skip[val >> 3] >> 2);
ba761f19
AM
8450 unsigned long tsym = ELF64_R_SYM (tocrel->r_info);
8451
8452 switch (r_type)
8453 {
8454 case R_PPC64_TOC16_HA:
8455 rel->r_info = ELF64_R_INFO (tsym, R_PPC64_TOC16_HA);
8456 break;
8457
8458 case R_PPC64_TOC16_LO_DS:
8459 rel->r_info = ELF64_R_INFO (tsym, R_PPC64_LO_DS_OPT);
8460 break;
8461
8462 default:
28942f62
AM
8463 if (!ppc64_elf_howto_table[R_PPC64_ADDR32])
8464 ppc_howto_init ();
b140b010 8465 info->callbacks->einfo
695344c0 8466 /* xgettext:c-format */
174d0a74 8467 (_("%H: %s references "
b140b010
AM
8468 "optimized away TOC entry\n"),
8469 ibfd, sec, rel->r_offset,
8470 ppc64_elf_howto_table[r_type]->name);
8471 bfd_set_error (bfd_error_bad_value);
8472 goto error_ret;
ba761f19
AM
8473 }
8474 rel->r_addend = tocrel->r_addend;
8475 elf_section_data (sec)->relocs = relstart;
8476 continue;
8477 }
8478
8479 if (h != NULL || sym->st_value != 0)
8480 continue;
854b41e7
AM
8481
8482 rel->r_addend -= skip[val >> 3];
8483 elf_section_data (sec)->relocs = relstart;
c5614fa4 8484 }
854b41e7
AM
8485
8486 if (elf_section_data (sec)->relocs != relstart)
8487 free (relstart);
c5614fa4
AM
8488 }
8489
8490 /* We shouldn't have local or global symbols defined in the TOC,
8491 but handle them anyway. */
df22d223
AM
8492 if (local_syms != NULL)
8493 for (sym = local_syms;
8494 sym < local_syms + symtab_hdr->sh_info;
8495 ++sym)
8496 if (sym->st_value != 0
8497 && bfd_section_from_elf_index (ibfd, sym->st_shndx) == toc)
8498 {
8499 unsigned long i;
854b41e7 8500
df22d223
AM
8501 if (sym->st_value > toc->rawsize)
8502 i = toc->rawsize >> 3;
8503 else
8504 i = sym->st_value >> 3;
854b41e7 8505
df22d223
AM
8506 if ((skip[i] & (ref_from_discarded | can_optimize)) != 0)
8507 {
8508 if (local_toc_syms)
4eca0228 8509 _bfd_error_handler
df22d223
AM
8510 (_("%s defined on removed toc entry"),
8511 bfd_elf_sym_name (ibfd, symtab_hdr, sym, NULL));
8512 do
8513 ++i;
8514 while ((skip[i] & (ref_from_discarded | can_optimize)));
8515 sym->st_value = (bfd_vma) i << 3;
8516 }
d62b3684 8517
df22d223
AM
8518 sym->st_value -= skip[i];
8519 symtab_hdr->contents = (unsigned char *) local_syms;
8520 }
c5614fa4 8521
854b41e7 8522 /* Adjust any global syms defined in this toc input section. */
c5614fa4
AM
8523 if (toc_inf.global_toc_syms)
8524 {
8525 toc_inf.toc = toc;
8526 toc_inf.skip = skip;
8527 toc_inf.global_toc_syms = FALSE;
8528 elf_link_hash_traverse (elf_hash_table (info), adjust_toc_syms,
8529 &toc_inf);
8530 }
854b41e7
AM
8531
8532 if (toc->reloc_count != 0)
8533 {
d4730f92 8534 Elf_Internal_Shdr *rel_hdr;
854b41e7
AM
8535 Elf_Internal_Rela *wrel;
8536 bfd_size_type sz;
8537
854b41e7 8538 /* Remove unused toc relocs, and adjust those we keep. */
28be611c
AM
8539 if (toc_relocs == NULL)
8540 toc_relocs = _bfd_elf_link_read_relocs (ibfd, toc, NULL, NULL,
8541 info->keep_memory);
8542 if (toc_relocs == NULL)
8543 goto error_ret;
8544
425b145b
AM
8545 wrel = toc_relocs;
8546 for (rel = toc_relocs; rel < toc_relocs + toc->reloc_count; ++rel)
ba761f19
AM
8547 if ((skip[rel->r_offset >> 3]
8548 & (ref_from_discarded | can_optimize)) == 0)
854b41e7
AM
8549 {
8550 wrel->r_offset = rel->r_offset - skip[rel->r_offset >> 3];
8551 wrel->r_info = rel->r_info;
8552 wrel->r_addend = rel->r_addend;
8553 ++wrel;
8554 }
8555 else if (!dec_dynrel_count (rel->r_info, toc, info,
8556 &local_syms, NULL, NULL))
8557 goto error_ret;
8558
425b145b
AM
8559 elf_section_data (toc)->relocs = toc_relocs;
8560 toc->reloc_count = wrel - toc_relocs;
d4730f92
BS
8561 rel_hdr = _bfd_elf_single_rel_hdr (toc);
8562 sz = rel_hdr->sh_entsize;
8563 rel_hdr->sh_size = toc->reloc_count * sz;
854b41e7 8564 }
c5614fa4 8565 }
28be611c
AM
8566 else if (toc_relocs != NULL
8567 && elf_section_data (toc)->relocs != toc_relocs)
425b145b 8568 free (toc_relocs);
c5614fa4
AM
8569
8570 if (local_syms != NULL
8571 && symtab_hdr->contents != (unsigned char *) local_syms)
8572 {
8573 if (!info->keep_memory)
8574 free (local_syms);
8575 else
8576 symtab_hdr->contents = (unsigned char *) local_syms;
8577 }
8578 free (skip);
8579 }
8580
8581 return TRUE;
8582}
8583
1bbe0902
AM
8584/* Return true iff input section I references the TOC using
8585 instructions limited to +/-32k offsets. */
8586
8587bfd_boolean
8588ppc64_elf_has_small_toc_reloc (asection *i)
8589{
8590 return (is_ppc64_elf (i->owner)
8591 && ppc64_elf_tdata (i->owner)->has_small_toc_reloc);
8592}
8593
927be08e
AM
8594/* Allocate space for one GOT entry. */
8595
8596static void
8597allocate_got (struct elf_link_hash_entry *h,
8598 struct bfd_link_info *info,
8599 struct got_entry *gent)
8600{
8601 struct ppc_link_hash_table *htab = ppc_hash_table (info);
927be08e
AM
8602 struct ppc_link_hash_entry *eh = (struct ppc_link_hash_entry *) h;
8603 int entsize = (gent->tls_type & eh->tls_mask & (TLS_GD | TLS_LD)
8604 ? 16 : 8);
8605 int rentsize = (gent->tls_type & eh->tls_mask & TLS_GD
8606 ? 2 : 1) * sizeof (Elf64_External_Rela);
8607 asection *got = ppc64_elf_tdata (gent->owner)->got;
8608
8609 gent->got.offset = got->size;
8610 got->size += entsize;
8611
19e08130 8612 if (h->type == STT_GNU_IFUNC)
927be08e 8613 {
33e44f2e 8614 htab->elf.irelplt->size += rentsize;
19e08130 8615 htab->got_reli_size += rentsize;
927be08e 8616 }
f15d0b54
AM
8617 else if (((bfd_link_pic (info)
8618 && !((gent->tls_type & TLS_TPREL) != 0
8619 && bfd_link_executable (info)
8620 && SYMBOL_REFERENCES_LOCAL (info, h)))
f0158f44
AM
8621 || (htab->elf.dynamic_sections_created
8622 && h->dynindx != -1
8623 && !SYMBOL_REFERENCES_LOCAL (info, h)))
21d68fcd 8624 && !UNDEFWEAK_NO_DYNAMIC_RELOC (info, h))
927be08e 8625 {
19e08130 8626 asection *relgot = ppc64_elf_tdata (gent->owner)->relgot;
927be08e 8627 relgot->size += rentsize;
927be08e
AM
8628 }
8629}
8630
7865406b
AM
8631/* This function merges got entries in the same toc group. */
8632
8633static void
8634merge_got_entries (struct got_entry **pent)
8635{
8636 struct got_entry *ent, *ent2;
8637
8638 for (ent = *pent; ent != NULL; ent = ent->next)
8639 if (!ent->is_indirect)
8640 for (ent2 = ent->next; ent2 != NULL; ent2 = ent2->next)
8641 if (!ent2->is_indirect
8642 && ent2->addend == ent->addend
8643 && ent2->tls_type == ent->tls_type
8644 && elf_gp (ent2->owner) == elf_gp (ent->owner))
8645 {
8646 ent2->is_indirect = TRUE;
8647 ent2->got.ent = ent;
8648 }
8649}
8650
46434633 8651/* If H is undefined, make it dynamic if that makes sense. */
f0158f44
AM
8652
8653static bfd_boolean
46434633
AM
8654ensure_undef_dynamic (struct bfd_link_info *info,
8655 struct elf_link_hash_entry *h)
f0158f44
AM
8656{
8657 struct elf_link_hash_table *htab = elf_hash_table (info);
8658
8659 if (htab->dynamic_sections_created
46434633
AM
8660 && ((info->dynamic_undefined_weak != 0
8661 && h->root.type == bfd_link_hash_undefweak)
8662 || h->root.type == bfd_link_hash_undefined)
f0158f44
AM
8663 && h->dynindx == -1
8664 && !h->forced_local
8665 && ELF_ST_VISIBILITY (h->other) == STV_DEFAULT)
8666 return bfd_elf_link_record_dynamic_symbol (info, h);
8667 return TRUE;
8668}
8669
65f38f15
AM
8670/* Allocate space in .plt, .got and associated reloc sections for
8671 dynamic relocs. */
5bd4f169 8672
b34976b6 8673static bfd_boolean
4ce794b7 8674allocate_dynrelocs (struct elf_link_hash_entry *h, void *inf)
5bd4f169 8675{
65f38f15
AM
8676 struct bfd_link_info *info;
8677 struct ppc_link_hash_table *htab;
5bd4f169 8678 asection *s;
65f38f15 8679 struct ppc_link_hash_entry *eh;
0b8bcf0d 8680 struct got_entry **pgent, *gent;
5bd4f169 8681
e92d460e 8682 if (h->root.type == bfd_link_hash_indirect)
b34976b6 8683 return TRUE;
5bd4f169 8684
65f38f15
AM
8685 info = (struct bfd_link_info *) inf;
8686 htab = ppc_hash_table (info);
4dfe6ac6
NC
8687 if (htab == NULL)
8688 return FALSE;
5bd4f169 8689
951fd09b
AM
8690 eh = (struct ppc_link_hash_entry *) h;
8691 /* Run through the TLS GD got entries first if we're changing them
8692 to TPREL. */
37da22e5 8693 if ((eh->tls_mask & (TLS_TLS | TLS_TPRELGD)) == (TLS_TLS | TLS_TPRELGD))
951fd09b
AM
8694 for (gent = h->got.glist; gent != NULL; gent = gent->next)
8695 if (gent->got.refcount > 0
8696 && (gent->tls_type & TLS_GD) != 0)
8697 {
8698 /* This was a GD entry that has been converted to TPREL. If
8699 there happens to be a TPREL entry we can use that one. */
8700 struct got_entry *ent;
8701 for (ent = h->got.glist; ent != NULL; ent = ent->next)
8702 if (ent->got.refcount > 0
8703 && (ent->tls_type & TLS_TPREL) != 0
e717da7e
AM
8704 && ent->addend == gent->addend
8705 && ent->owner == gent->owner)
951fd09b
AM
8706 {
8707 gent->got.refcount = 0;
8708 break;
8709 }
8710
8711 /* If not, then we'll be using our own TPREL entry. */
8712 if (gent->got.refcount != 0)
8713 gent->tls_type = TLS_TLS | TLS_TPREL;
8714 }
8715
7865406b
AM
8716 /* Remove any list entry that won't generate a word in the GOT before
8717 we call merge_got_entries. Otherwise we risk merging to empty
8718 entries. */
0b8bcf0d
AM
8719 pgent = &h->got.glist;
8720 while ((gent = *pgent) != NULL)
411e1bfb 8721 if (gent->got.refcount > 0)
7865406b
AM
8722 {
8723 if ((gent->tls_type & TLS_LD) != 0
8724 && !h->def_dynamic)
8725 {
8726 ppc64_tlsld_got (gent->owner)->got.refcount += 1;
8727 *pgent = gent->next;
8728 }
8729 else
8730 pgent = &gent->next;
8731 }
8732 else
8733 *pgent = gent->next;
8734
8735 if (!htab->do_multi_toc)
8736 merge_got_entries (&h->got.glist);
8737
8738 for (gent = h->got.glist; gent != NULL; gent = gent->next)
8739 if (!gent->is_indirect)
411e1bfb 8740 {
46434633
AM
8741 /* Make sure this symbol is output as a dynamic symbol. */
8742 if (!ensure_undef_dynamic (info, h))
f0158f44 8743 return FALSE;
65f38f15 8744
0c8d6e5c 8745 if (!is_ppc64_elf (gent->owner))
927be08e 8746 abort ();
0ffa91dd 8747
927be08e 8748 allocate_got (h, info, gent);
411e1bfb 8749 }
65f38f15 8750
954b63d4
AM
8751 /* If no dynamic sections we can't have dynamic relocs, except for
8752 IFUNCs which are handled even in static executables. */
8a2058b5
AM
8753 if (!htab->elf.dynamic_sections_created
8754 && h->type != STT_GNU_IFUNC)
8755 eh->dyn_relocs = NULL;
8756
529fe20e
AM
8757 /* Discard relocs on undefined symbols that must be local. */
8758 else if (h->root.type == bfd_link_hash_undefined
8759 && ELF_ST_VISIBILITY (h->other) != STV_DEFAULT)
8760 eh->dyn_relocs = NULL;
8761
954b63d4
AM
8762 /* Also discard relocs on undefined weak syms with non-default
8763 visibility, or when dynamic_undefined_weak says so. */
21d68fcd 8764 else if (UNDEFWEAK_NO_DYNAMIC_RELOC (info, h))
954b63d4
AM
8765 eh->dyn_relocs = NULL;
8766
8a2058b5 8767 if (eh->dyn_relocs != NULL)
65f38f15 8768 {
8a2058b5
AM
8769 struct elf_dyn_relocs *p, **pp;
8770
57e7d118
AM
8771 /* In the shared -Bsymbolic case, discard space allocated for
8772 dynamic pc-relative relocs against symbols which turn out to
8773 be defined in regular objects. For the normal shared case,
8774 discard space for relocs that have become local due to symbol
8775 visibility changes. */
8776
8777 if (bfd_link_pic (info))
65f38f15 8778 {
57e7d118
AM
8779 /* Relocs that use pc_count are those that appear on a call
8780 insn, or certain REL relocs (see must_be_dyn_reloc) that
8781 can be generated via assembly. We want calls to
8782 protected symbols to resolve directly to the function
8783 rather than going via the plt. If people want function
8784 pointer comparisons to work as expected then they should
8785 avoid writing weird assembly. */
8786 if (SYMBOL_CALLS_LOCAL (info, h))
8787 {
57e7d118
AM
8788 for (pp = &eh->dyn_relocs; (p = *pp) != NULL; )
8789 {
8790 p->count -= p->pc_count;
8791 p->pc_count = 0;
8792 if (p->count == 0)
8793 *pp = p->next;
8794 else
8795 pp = &p->next;
8796 }
8797 }
65f38f15 8798
954b63d4 8799 if (eh->dyn_relocs != NULL)
5bd4f169 8800 {
46434633
AM
8801 /* Make sure this symbol is output as a dynamic symbol. */
8802 if (!ensure_undef_dynamic (info, h))
f0158f44 8803 return FALSE;
5bd4f169 8804 }
65f38f15 8805 }
529fe20e 8806 else if (ELIMINATE_COPY_RELOCS && h->type != STT_GNU_IFUNC)
57e7d118 8807 {
8a2058b5 8808 /* For the non-pic case, discard space for relocs against
57e7d118
AM
8809 symbols which turn out to need copy relocs or are not
8810 dynamic. */
529fe20e
AM
8811 if (h->dynamic_adjusted
8812 && !h->def_regular
8813 && !ELF_COMMON_DEF_P (h))
f0158f44 8814 {
46434633
AM
8815 /* Make sure this symbol is output as a dynamic symbol. */
8816 if (!ensure_undef_dynamic (info, h))
f0158f44 8817 return FALSE;
dfbb6ac9 8818
f0158f44
AM
8819 if (h->dynindx == -1)
8820 eh->dyn_relocs = NULL;
8821 }
8822 else
8a2058b5 8823 eh->dyn_relocs = NULL;
57e7d118
AM
8824 }
8825
8826 /* Finally, allocate space. */
8827 for (p = eh->dyn_relocs; p != NULL; p = p->next)
8828 {
8829 asection *sreloc = elf_section_data (p->sec)->sreloc;
8830 if (eh->elf.type == STT_GNU_IFUNC)
8831 sreloc = htab->elf.irelplt;
8832 sreloc->size += p->count * sizeof (Elf64_External_Rela);
dfbb6ac9 8833 }
65f38f15 8834 }
57e7d118 8835
2d7ad24e
AM
8836 /* We might need a PLT entry when the symbol
8837 a) is dynamic, or
8838 b) is an ifunc, or
8839 c) has plt16 relocs and has been processed by adjust_dynamic_symbol, or
8840 d) has plt16 relocs and we are linking statically. */
8841 if ((htab->elf.dynamic_sections_created && h->dynindx != -1)
8842 || h->type == STT_GNU_IFUNC
8843 || (h->needs_plt && h->dynamic_adjusted)
8844 || (h->needs_plt
8845 && h->def_regular
8846 && !htab->elf.dynamic_sections_created
3e04d765 8847 && !htab->can_convert_all_inline_plt
2d7ad24e
AM
8848 && (((struct ppc_link_hash_entry *) h)->tls_mask
8849 & (TLS_TLS | PLT_KEEP)) == PLT_KEEP))
65f38f15 8850 {
57e7d118
AM
8851 struct plt_entry *pent;
8852 bfd_boolean doneone = FALSE;
8853 for (pent = h->plt.plist; pent != NULL; pent = pent->next)
8854 if (pent->plt.refcount > 0)
8855 {
8856 if (!htab->elf.dynamic_sections_created
8857 || h->dynindx == -1)
8858 {
2d7ad24e
AM
8859 if (h->type == STT_GNU_IFUNC)
8860 {
8861 s = htab->elf.iplt;
8862 pent->plt.offset = s->size;
8863 s->size += PLT_ENTRY_SIZE (htab);
8864 s = htab->elf.irelplt;
8865 }
8866 else
8867 {
8868 s = htab->pltlocal;
8869 pent->plt.offset = s->size;
8870 s->size += LOCAL_PLT_ENTRY_SIZE (htab);
8871 s = bfd_link_pic (info) ? htab->relpltlocal : NULL;
8872 }
57e7d118
AM
8873 }
8874 else
8875 {
8876 /* If this is the first .plt entry, make room for the special
8877 first entry. */
8878 s = htab->elf.splt;
8879 if (s->size == 0)
8880 s->size += PLT_INITIAL_ENTRY_SIZE (htab);
65f38f15 8881
57e7d118 8882 pent->plt.offset = s->size;
65f38f15 8883
57e7d118
AM
8884 /* Make room for this entry. */
8885 s->size += PLT_ENTRY_SIZE (htab);
65f38f15 8886
57e7d118
AM
8887 /* Make room for the .glink code. */
8888 s = htab->glink;
8889 if (s->size == 0)
9e390558 8890 s->size += GLINK_PLTRESOLVE_SIZE (htab);
57e7d118
AM
8891 if (htab->opd_abi)
8892 {
8893 /* We need bigger stubs past index 32767. */
9e390558 8894 if (s->size >= GLINK_PLTRESOLVE_SIZE (htab) + 32768*2*4)
57e7d118
AM
8895 s->size += 4;
8896 s->size += 2*4;
8897 }
8898 else
8899 s->size += 4;
65f38f15 8900
57e7d118
AM
8901 /* We also need to make an entry in the .rela.plt section. */
8902 s = htab->elf.srelplt;
8903 }
2d7ad24e
AM
8904 if (s != NULL)
8905 s->size += sizeof (Elf64_External_Rela);
57e7d118
AM
8906 doneone = TRUE;
8907 }
8908 else
8909 pent->plt.offset = (bfd_vma) -1;
8910 if (!doneone)
8911 {
8912 h->plt.plist = NULL;
8913 h->needs_plt = 0;
8914 }
65f38f15 8915 }
57e7d118 8916 else
65f38f15 8917 {
57e7d118
AM
8918 h->plt.plist = NULL;
8919 h->needs_plt = 0;
65f38f15
AM
8920 }
8921
b34976b6 8922 return TRUE;
65f38f15
AM
8923}
8924
9e390558
AM
8925#define PPC_LO(v) ((v) & 0xffff)
8926#define PPC_HI(v) (((v) >> 16) & 0xffff)
8927#define PPC_HA(v) PPC_HI ((v) + 0x8000)
8928
a345bc8d
AM
8929/* Called via elf_link_hash_traverse from ppc64_elf_size_dynamic_sections
8930 to set up space for global entry stubs. These are put in glink,
8931 after the branch table. */
65f38f15 8932
b34976b6 8933static bfd_boolean
a345bc8d 8934size_global_entry_stubs (struct elf_link_hash_entry *h, void *inf)
65f38f15 8935{
a345bc8d
AM
8936 struct bfd_link_info *info;
8937 struct ppc_link_hash_table *htab;
8938 struct plt_entry *pent;
9e390558 8939 asection *s, *plt;
65f38f15 8940
a345bc8d
AM
8941 if (h->root.type == bfd_link_hash_indirect)
8942 return TRUE;
65f38f15 8943
a345bc8d
AM
8944 if (!h->pointer_equality_needed)
8945 return TRUE;
65f38f15 8946
a345bc8d
AM
8947 if (h->def_regular)
8948 return TRUE;
65f38f15 8949
a345bc8d
AM
8950 info = inf;
8951 htab = ppc_hash_table (info);
8952 if (htab == NULL)
8953 return FALSE;
8954
9e390558
AM
8955 s = htab->global_entry;
8956 plt = htab->elf.splt;
a345bc8d
AM
8957 for (pent = h->plt.plist; pent != NULL; pent = pent->next)
8958 if (pent->plt.offset != (bfd_vma) -1
8959 && pent->addend == 0)
8960 {
afe397ea
AM
8961 /* For ELFv2, if this symbol is not defined in a regular file
8962 and we are not generating a shared library or pie, then we
8963 need to define the symbol in the executable on a call stub.
8964 This is to avoid text relocations. */
9e390558
AM
8965 bfd_vma off, stub_align, stub_off, stub_size;
8966 unsigned int align_power;
8967
8968 stub_size = 16;
8969 stub_off = s->size;
8970 if (htab->params->plt_stub_align >= 0)
8971 align_power = htab->params->plt_stub_align;
8972 else
8973 align_power = -htab->params->plt_stub_align;
8974 /* Setting section alignment is delayed until we know it is
8975 non-empty. Otherwise the .text output section will be
8976 aligned at least to plt_stub_align even when no global
8977 entry stubs are needed. */
8978 if (s->alignment_power < align_power)
8979 s->alignment_power = align_power;
8980 stub_align = (bfd_vma) 1 << align_power;
8981 if (htab->params->plt_stub_align >= 0
8982 || ((((stub_off + stub_size - 1) & -stub_align)
8983 - (stub_off & -stub_align))
8984 > ((stub_size - 1) & -stub_align)))
8985 stub_off = (stub_off + stub_align - 1) & -stub_align;
8986 off = pent->plt.offset + plt->output_offset + plt->output_section->vma;
8987 off -= stub_off + s->output_offset + s->output_section->vma;
8988 /* Note that for --plt-stub-align negative we have a possible
8989 dependency between stub offset and size. Break that
8990 dependency by assuming the max stub size when calculating
8991 the stub offset. */
8992 if (PPC_HA (off) == 0)
8993 stub_size -= 4;
8a2058b5 8994 h->root.type = bfd_link_hash_defined;
afe397ea 8995 h->root.u.def.section = s;
9e390558
AM
8996 h->root.u.def.value = stub_off;
8997 s->size = stub_off + stub_size;
a345bc8d
AM
8998 break;
8999 }
9000 return TRUE;
9001}
9002
9003/* Set DF_TEXTREL if we find any dynamic relocs that apply to
9004 read-only sections. */
9005
9006static bfd_boolean
98bbb1b8 9007maybe_set_textrel (struct elf_link_hash_entry *h, void *inf)
a345bc8d 9008{
98bbb1b8
AM
9009 asection *sec;
9010
a345bc8d
AM
9011 if (h->root.type == bfd_link_hash_indirect)
9012 return TRUE;
9013
98bbb1b8
AM
9014 sec = readonly_dynrelocs (h);
9015 if (sec != NULL)
a345bc8d 9016 {
98bbb1b8
AM
9017 struct bfd_link_info *info = (struct bfd_link_info *) inf;
9018
9019 info->flags |= DF_TEXTREL;
2cdcc330
AM
9020 info->callbacks->minfo (_("%pB: dynamic relocation against `%pT'"
9021 " in read-only section `%pA'\n"),
9022 sec->owner, h->root.root.string, sec);
a345bc8d
AM
9023
9024 /* Not an error, just cut short the traversal. */
9025 return FALSE;
65f38f15 9026 }
b34976b6 9027 return TRUE;
65f38f15
AM
9028}
9029
9030/* Set the sizes of the dynamic sections. */
9031
b34976b6 9032static bfd_boolean
ee67d69a 9033ppc64_elf_size_dynamic_sections (bfd *output_bfd,
4ce794b7 9034 struct bfd_link_info *info)
65f38f15
AM
9035{
9036 struct ppc_link_hash_table *htab;
9037 bfd *dynobj;
9038 asection *s;
b34976b6 9039 bfd_boolean relocs;
65f38f15 9040 bfd *ibfd;
7865406b 9041 struct got_entry *first_tlsld;
65f38f15
AM
9042
9043 htab = ppc_hash_table (info);
4dfe6ac6
NC
9044 if (htab == NULL)
9045 return FALSE;
9046
65f38f15
AM
9047 dynobj = htab->elf.dynobj;
9048 if (dynobj == NULL)
9049 abort ();
9050
9051 if (htab->elf.dynamic_sections_created)
9052 {
9053 /* Set the contents of the .interp section to the interpreter. */
9b8b325a 9054 if (bfd_link_executable (info) && !info->nointerp)
65f38f15 9055 {
3d4d4302 9056 s = bfd_get_linker_section (dynobj, ".interp");
65f38f15
AM
9057 if (s == NULL)
9058 abort ();
eea6121a 9059 s->size = sizeof ELF_DYNAMIC_INTERPRETER;
65f38f15
AM
9060 s->contents = (unsigned char *) ELF_DYNAMIC_INTERPRETER;
9061 }
9062 }
9063
9064 /* Set up .got offsets for local syms, and space for local dynamic
9065 relocs. */
c72f2fb2 9066 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
65f38f15 9067 {
411e1bfb
AM
9068 struct got_entry **lgot_ents;
9069 struct got_entry **end_lgot_ents;
e054468f
AM
9070 struct plt_entry **local_plt;
9071 struct plt_entry **end_local_plt;
f961d9dd 9072 unsigned char *lgot_masks;
65f38f15
AM
9073 bfd_size_type locsymcount;
9074 Elf_Internal_Shdr *symtab_hdr;
65f38f15 9075
0c8d6e5c 9076 if (!is_ppc64_elf (ibfd))
65f38f15
AM
9077 continue;
9078
9079 for (s = ibfd->sections; s != NULL; s = s->next)
9080 {
19e08130 9081 struct ppc_dyn_relocs *p;
65f38f15 9082
6edfbbad 9083 for (p = elf_section_data (s)->local_dynrel; p != NULL; p = p->next)
65f38f15 9084 {
ec338859
AM
9085 if (!bfd_is_abs_section (p->sec)
9086 && bfd_is_abs_section (p->sec->output_section))
9087 {
9088 /* Input section has been discarded, either because
9089 it is a copy of a linkonce section or due to
9090 linker script /DISCARD/, so we'll be discarding
9091 the relocs too. */
9092 }
248866a8 9093 else if (p->count != 0)
ec338859 9094 {
19e08130
AM
9095 asection *srel = elf_section_data (p->sec)->sreloc;
9096 if (p->ifunc)
33e44f2e 9097 srel = htab->elf.irelplt;
eea6121a 9098 srel->size += p->count * sizeof (Elf64_External_Rela);
248866a8
AM
9099 if ((p->sec->output_section->flags & SEC_READONLY) != 0)
9100 info->flags |= DF_TEXTREL;
ec338859 9101 }
65f38f15
AM
9102 }
9103 }
9104
411e1bfb
AM
9105 lgot_ents = elf_local_got_ents (ibfd);
9106 if (!lgot_ents)
65f38f15
AM
9107 continue;
9108
0ffa91dd 9109 symtab_hdr = &elf_symtab_hdr (ibfd);
65f38f15 9110 locsymcount = symtab_hdr->sh_info;
411e1bfb 9111 end_lgot_ents = lgot_ents + locsymcount;
e054468f
AM
9112 local_plt = (struct plt_entry **) end_lgot_ents;
9113 end_local_plt = local_plt + locsymcount;
f961d9dd 9114 lgot_masks = (unsigned char *) end_local_plt;
e717da7e 9115 s = ppc64_elf_tdata (ibfd)->got;
e7b938ca 9116 for (; lgot_ents < end_lgot_ents; ++lgot_ents, ++lgot_masks)
65f38f15 9117 {
0b8bcf0d 9118 struct got_entry **pent, *ent;
411e1bfb 9119
0b8bcf0d
AM
9120 pent = lgot_ents;
9121 while ((ent = *pent) != NULL)
411e1bfb
AM
9122 if (ent->got.refcount > 0)
9123 {
e7b938ca 9124 if ((ent->tls_type & *lgot_masks & TLS_LD) != 0)
411e1bfb 9125 {
927be08e 9126 ppc64_tlsld_got (ibfd)->got.refcount += 1;
0b8bcf0d 9127 *pent = ent->next;
411e1bfb
AM
9128 }
9129 else
9130 {
19e08130
AM
9131 unsigned int ent_size = 8;
9132 unsigned int rel_size = sizeof (Elf64_External_Rela);
9133
eea6121a 9134 ent->got.offset = s->size;
e7b938ca 9135 if ((ent->tls_type & *lgot_masks & TLS_GD) != 0)
927be08e 9136 {
19e08130
AM
9137 ent_size *= 2;
9138 rel_size *= 2;
9139 }
9140 s->size += ent_size;
37da22e5 9141 if ((*lgot_masks & (TLS_TLS | PLT_IFUNC)) == PLT_IFUNC)
19e08130 9142 {
33e44f2e 9143 htab->elf.irelplt->size += rel_size;
19e08130
AM
9144 htab->got_reli_size += rel_size;
9145 }
f15d0b54
AM
9146 else if (bfd_link_pic (info)
9147 && !((ent->tls_type & TLS_TPREL) != 0
9148 && bfd_link_executable (info)))
19e08130
AM
9149 {
9150 asection *srel = ppc64_elf_tdata (ibfd)->relgot;
9151 srel->size += rel_size;
927be08e 9152 }
0b8bcf0d 9153 pent = &ent->next;
411e1bfb
AM
9154 }
9155 }
9156 else
0b8bcf0d 9157 *pent = ent->next;
65f38f15 9158 }
e054468f 9159
2d7ad24e
AM
9160 /* Allocate space for plt calls to local syms. */
9161 lgot_masks = (unsigned char *) end_local_plt;
9162 for (; local_plt < end_local_plt; ++local_plt, ++lgot_masks)
e054468f
AM
9163 {
9164 struct plt_entry *ent;
9165
9166 for (ent = *local_plt; ent != NULL; ent = ent->next)
9167 if (ent->plt.refcount > 0)
9168 {
2d7ad24e
AM
9169 if ((*lgot_masks & (TLS_TLS | PLT_IFUNC)) == PLT_IFUNC)
9170 {
9171 s = htab->elf.iplt;
9172 ent->plt.offset = s->size;
9173 s->size += PLT_ENTRY_SIZE (htab);
9174 htab->elf.irelplt->size += sizeof (Elf64_External_Rela);
9175 }
3e04d765
AM
9176 else if (htab->can_convert_all_inline_plt
9177 || (*lgot_masks & (TLS_TLS | PLT_KEEP)) != PLT_KEEP)
2d7ad24e
AM
9178 ent->plt.offset = (bfd_vma) -1;
9179 else
9180 {
9181 s = htab->pltlocal;
9182 ent->plt.offset = s->size;
9183 s->size += LOCAL_PLT_ENTRY_SIZE (htab);
9184 if (bfd_link_pic (info))
9185 htab->relpltlocal->size += sizeof (Elf64_External_Rela);
9186 }
e054468f
AM
9187 }
9188 else
9189 ent->plt.offset = (bfd_vma) -1;
9190 }
65f38f15
AM
9191 }
9192
9193 /* Allocate global sym .plt and .got entries, and space for global
9194 sym dynamic relocs. */
4ce794b7 9195 elf_link_hash_traverse (&htab->elf, allocate_dynrelocs, info);
a345bc8d 9196
0e1862bb 9197 if (!htab->opd_abi && !bfd_link_pic (info))
a345bc8d 9198 elf_link_hash_traverse (&htab->elf, size_global_entry_stubs, info);
65f38f15 9199
7865406b 9200 first_tlsld = NULL;
c72f2fb2 9201 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
102890f0 9202 {
7865406b
AM
9203 struct got_entry *ent;
9204
0c8d6e5c 9205 if (!is_ppc64_elf (ibfd))
102890f0
AM
9206 continue;
9207
7865406b
AM
9208 ent = ppc64_tlsld_got (ibfd);
9209 if (ent->got.refcount > 0)
102890f0 9210 {
7865406b 9211 if (!htab->do_multi_toc && first_tlsld != NULL)
102890f0 9212 {
7865406b
AM
9213 ent->is_indirect = TRUE;
9214 ent->got.ent = first_tlsld;
9215 }
9216 else
9217 {
9218 if (first_tlsld == NULL)
9219 first_tlsld = ent;
9220 s = ppc64_elf_tdata (ibfd)->got;
9221 ent->got.offset = s->size;
9222 ent->owner = ibfd;
9223 s->size += 16;
0e1862bb 9224 if (bfd_link_pic (info))
7865406b
AM
9225 {
9226 asection *srel = ppc64_elf_tdata (ibfd)->relgot;
9227 srel->size += sizeof (Elf64_External_Rela);
9228 }
102890f0
AM
9229 }
9230 }
9231 else
7865406b 9232 ent->got.offset = (bfd_vma) -1;
102890f0
AM
9233 }
9234
65f38f15
AM
9235 /* We now have determined the sizes of the various dynamic sections.
9236 Allocate memory for them. */
b34976b6 9237 relocs = FALSE;
65f38f15
AM
9238 for (s = dynobj->sections; s != NULL; s = s->next)
9239 {
9240 if ((s->flags & SEC_LINKER_CREATED) == 0)
9241 continue;
9242
4ce794b7 9243 if (s == htab->brlt || s == htab->relbrlt)
721956f4
AM
9244 /* These haven't been allocated yet; don't strip. */
9245 continue;
33e44f2e
AM
9246 else if (s == htab->elf.sgot
9247 || s == htab->elf.splt
9248 || s == htab->elf.iplt
2d7ad24e 9249 || s == htab->pltlocal
c456f082 9250 || s == htab->glink
9e390558 9251 || s == htab->global_entry
5474d94f
AM
9252 || s == htab->elf.sdynbss
9253 || s == htab->elf.sdynrelro)
65f38f15
AM
9254 {
9255 /* Strip this section if we don't need it; see the
9256 comment below. */
5bd4f169 9257 }
58d180e8
AM
9258 else if (s == htab->glink_eh_frame)
9259 {
9260 if (!bfd_is_abs_section (s->output_section))
9261 /* Not sized yet. */
9262 continue;
9263 }
70cc837d 9264 else if (CONST_STRNEQ (s->name, ".rela"))
5bd4f169 9265 {
c456f082 9266 if (s->size != 0)
5bd4f169 9267 {
33e44f2e 9268 if (s != htab->elf.srelplt)
b34976b6 9269 relocs = TRUE;
5bd4f169
AM
9270
9271 /* We use the reloc_count field as a counter if we need
9272 to copy relocs into the output file. */
9273 s->reloc_count = 0;
9274 }
9275 }
65f38f15 9276 else
5bd4f169
AM
9277 {
9278 /* It's not one of our sections, so don't allocate space. */
9279 continue;
9280 }
9281
eea6121a 9282 if (s->size == 0)
5bd4f169 9283 {
c456f082
AM
9284 /* If we don't need this section, strip it from the
9285 output file. This is mostly to handle .rela.bss and
9286 .rela.plt. We must create both sections in
9287 create_dynamic_sections, because they must be created
9288 before the linker maps input sections to output
9289 sections. The linker does that before
9290 adjust_dynamic_symbol is called, and it is that
9291 function which decides whether anything needs to go
9292 into these sections. */
8423293d 9293 s->flags |= SEC_EXCLUDE;
5bd4f169
AM
9294 continue;
9295 }
9296
06bcf541
AM
9297 if (bfd_is_abs_section (s->output_section))
9298 _bfd_error_handler (_("warning: discarding dynamic section %s"),
9299 s->name);
9300
c456f082 9301 if ((s->flags & SEC_HAS_CONTENTS) == 0)
5f333394
AM
9302 continue;
9303
65f38f15
AM
9304 /* Allocate memory for the section contents. We use bfd_zalloc
9305 here in case unused entries are not reclaimed before the
9306 section's contents are written out. This should not happen,
411e1bfb
AM
9307 but this way if it does we get a R_PPC64_NONE reloc in .rela
9308 sections instead of garbage.
9309 We also rely on the section contents being zero when writing
5474d94f 9310 the GOT and .dynrelro. */
eea6121a 9311 s->contents = bfd_zalloc (dynobj, s->size);
65f38f15 9312 if (s->contents == NULL)
b34976b6 9313 return FALSE;
5bd4f169
AM
9314 }
9315
c72f2fb2 9316 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
e717da7e 9317 {
0c8d6e5c 9318 if (!is_ppc64_elf (ibfd))
7b53ace3
AM
9319 continue;
9320
e717da7e 9321 s = ppc64_elf_tdata (ibfd)->got;
33e44f2e 9322 if (s != NULL && s != htab->elf.sgot)
e717da7e 9323 {
eea6121a 9324 if (s->size == 0)
8423293d 9325 s->flags |= SEC_EXCLUDE;
e717da7e
AM
9326 else
9327 {
eea6121a 9328 s->contents = bfd_zalloc (ibfd, s->size);
e717da7e
AM
9329 if (s->contents == NULL)
9330 return FALSE;
9331 }
9332 }
9333 s = ppc64_elf_tdata (ibfd)->relgot;
9334 if (s != NULL)
9335 {
eea6121a 9336 if (s->size == 0)
8423293d 9337 s->flags |= SEC_EXCLUDE;
e717da7e
AM
9338 else
9339 {
eea6121a 9340 s->contents = bfd_zalloc (ibfd, s->size);
e717da7e
AM
9341 if (s->contents == NULL)
9342 return FALSE;
9343 relocs = TRUE;
9344 s->reloc_count = 0;
9345 }
9346 }
9347 }
9348
e86ce104 9349 if (htab->elf.dynamic_sections_created)
5bd4f169 9350 {
e8910a83
AM
9351 bfd_boolean tls_opt;
9352
5bd4f169
AM
9353 /* Add some entries to the .dynamic section. We fill in the
9354 values later, in ppc64_elf_finish_dynamic_sections, but we
9355 must add the entries now so that we get the correct size for
9356 the .dynamic section. The DT_DEBUG entry is filled in by the
9357 dynamic linker and used by the debugger. */
dc810e39 9358#define add_dynamic_entry(TAG, VAL) \
5a580b3a 9359 _bfd_elf_add_dynamic_entry (info, TAG, VAL)
dc810e39 9360
0e1862bb 9361 if (bfd_link_executable (info))
5bd4f169 9362 {
dc810e39 9363 if (!add_dynamic_entry (DT_DEBUG, 0))
b34976b6 9364 return FALSE;
5bd4f169
AM
9365 }
9366
33e44f2e 9367 if (htab->elf.splt != NULL && htab->elf.splt->size != 0)
5bd4f169 9368 {
dc810e39
AM
9369 if (!add_dynamic_entry (DT_PLTGOT, 0)
9370 || !add_dynamic_entry (DT_PLTRELSZ, 0)
9371 || !add_dynamic_entry (DT_PLTREL, DT_RELA)
5d1634d7
AM
9372 || !add_dynamic_entry (DT_JMPREL, 0)
9373 || !add_dynamic_entry (DT_PPC64_GLINK, 0))
b34976b6 9374 return FALSE;
5bd4f169
AM
9375 }
9376
ee67d69a 9377 if (NO_OPD_RELOCS && abiversion (output_bfd) <= 1)
19397422
AM
9378 {
9379 if (!add_dynamic_entry (DT_PPC64_OPD, 0)
9380 || !add_dynamic_entry (DT_PPC64_OPDSZ, 0))
b34976b6 9381 return FALSE;
19397422
AM
9382 }
9383
7c9cf415 9384 tls_opt = (htab->params->tls_get_addr_opt
e8910a83
AM
9385 && htab->tls_get_addr_fd != NULL
9386 && htab->tls_get_addr_fd->elf.plt.plist != NULL);
9387 if (tls_opt || !htab->opd_abi)
9388 {
9389 if (!add_dynamic_entry (DT_PPC64_OPT, tls_opt ? PPC64_OPT_TLS : 0))
9390 return FALSE;
9391 }
a7f2871e 9392
5bd4f169
AM
9393 if (relocs)
9394 {
dc810e39
AM
9395 if (!add_dynamic_entry (DT_RELA, 0)
9396 || !add_dynamic_entry (DT_RELASZ, 0)
9397 || !add_dynamic_entry (DT_RELAENT, sizeof (Elf64_External_Rela)))
b34976b6 9398 return FALSE;
5bd4f169 9399
65f38f15
AM
9400 /* If any dynamic relocs apply to a read-only section,
9401 then we need a DT_TEXTREL entry. */
248866a8 9402 if ((info->flags & DF_TEXTREL) == 0)
a345bc8d 9403 elf_link_hash_traverse (&htab->elf, maybe_set_textrel, info);
5bd4f169 9404
65f38f15 9405 if ((info->flags & DF_TEXTREL) != 0)
5bd4f169 9406 {
65f38f15 9407 if (!add_dynamic_entry (DT_TEXTREL, 0))
b34976b6 9408 return FALSE;
5bd4f169 9409 }
5bd4f169 9410 }
5bd4f169 9411 }
65f38f15 9412#undef add_dynamic_entry
5bd4f169 9413
b34976b6 9414 return TRUE;
5bd4f169
AM
9415}
9416
a345bc8d
AM
9417/* Return TRUE if symbol should be hashed in the `.gnu.hash' section. */
9418
9419static bfd_boolean
9420ppc64_elf_hash_symbol (struct elf_link_hash_entry *h)
9421{
9422 if (h->plt.plist != NULL
9423 && !h->def_regular
9424 && !h->pointer_equality_needed)
9425 return FALSE;
9426
9427 return _bfd_elf_hash_symbol (h);
9428}
9429
721956f4 9430/* Determine the type of stub needed, if any, for a call. */
5bd4f169 9431
4ce794b7
AM
9432static inline enum ppc_stub_type
9433ppc_type_of_stub (asection *input_sec,
9434 const Elf_Internal_Rela *rel,
9435 struct ppc_link_hash_entry **hash,
e054468f 9436 struct plt_entry **plt_ent,
6911b7dc
AM
9437 bfd_vma destination,
9438 unsigned long local_off)
5bd4f169 9439{
721956f4
AM
9440 struct ppc_link_hash_entry *h = *hash;
9441 bfd_vma location;
9442 bfd_vma branch_offset;
9443 bfd_vma max_branch_offset;
4ce794b7 9444 enum elf_ppc64_reloc_type r_type;
5bd4f169 9445
721956f4
AM
9446 if (h != NULL)
9447 {
e054468f 9448 struct plt_entry *ent;
7fe2b9a6 9449 struct ppc_link_hash_entry *fdh = h;
b31867b6
AM
9450 if (h->oh != NULL
9451 && h->oh->is_func_descriptor)
7b8f6675
AM
9452 {
9453 fdh = ppc_follow_link (h->oh);
9454 *hash = fdh;
9455 }
8387904d 9456
e054468f
AM
9457 for (ent = fdh->elf.plt.plist; ent != NULL; ent = ent->next)
9458 if (ent->addend == rel->r_addend
9459 && ent->plt.offset != (bfd_vma) -1)
9460 {
e054468f
AM
9461 *plt_ent = ent;
9462 return ppc_stub_plt_call;
9463 }
5bd4f169 9464
7fe2b9a6
AM
9465 /* Here, we know we don't have a plt entry. If we don't have a
9466 either a defined function descriptor or a defined entry symbol
9467 in a regular object file, then it is pointless trying to make
9468 any other type of stub. */
854b41e7
AM
9469 if (!is_static_defined (&fdh->elf)
9470 && !is_static_defined (&h->elf))
721956f4 9471 return ppc_stub_none;
5d1634d7 9472 }
e054468f
AM
9473 else if (elf_local_got_ents (input_sec->owner) != NULL)
9474 {
9475 Elf_Internal_Shdr *symtab_hdr = &elf_symtab_hdr (input_sec->owner);
9476 struct plt_entry **local_plt = (struct plt_entry **)
9477 elf_local_got_ents (input_sec->owner) + symtab_hdr->sh_info;
9478 unsigned long r_symndx = ELF64_R_SYM (rel->r_info);
9479
9480 if (local_plt[r_symndx] != NULL)
9481 {
9482 struct plt_entry *ent;
9483
9484 for (ent = local_plt[r_symndx]; ent != NULL; ent = ent->next)
9485 if (ent->addend == rel->r_addend
9486 && ent->plt.offset != (bfd_vma) -1)
9487 {
9488 *plt_ent = ent;
9489 return ppc_stub_plt_call;
9490 }
9491 }
9492 }
5d1634d7 9493
721956f4
AM
9494 /* Determine where the call point is. */
9495 location = (input_sec->output_offset
9496 + input_sec->output_section->vma
9497 + rel->r_offset);
5d1634d7 9498
721956f4
AM
9499 branch_offset = destination - location;
9500 r_type = ELF64_R_TYPE (rel->r_info);
5d1634d7 9501
721956f4
AM
9502 /* Determine if a long branch stub is needed. */
9503 max_branch_offset = 1 << 25;
23cedd1d
AM
9504 if (r_type == R_PPC64_REL14
9505 || r_type == R_PPC64_REL14_BRTAKEN
9506 || r_type == R_PPC64_REL14_BRNTAKEN)
721956f4 9507 max_branch_offset = 1 << 15;
5d1634d7 9508
6911b7dc 9509 if (branch_offset + max_branch_offset >= 2 * max_branch_offset - local_off)
721956f4
AM
9510 /* We need a stub. Figure out whether a long_branch or plt_branch
9511 is needed later. */
9512 return ppc_stub_long_branch;
5d1634d7 9513
721956f4 9514 return ppc_stub_none;
5d1634d7
AM
9515}
9516
f891966f
AM
9517/* Gets the address of a label (1:) in r11 and builds an offset in r12,
9518 then adds it to r11 (LOAD false) or loads r12 from r11+r12 (LOAD true).
9519 . mflr %r12
9520 . bcl 20,31,1f
9521 .1: mflr %r11
9522 . mtlr %r12
05d0e962 9523 . lis %r12,xxx-1b@highest
f891966f 9524 . ori %r12,%r12,xxx-1b@higher
05d0e962 9525 . sldi %r12,%r12,32
f891966f 9526 . oris %r12,%r12,xxx-1b@high
05d0e962 9527 . ori %r12,%r12,xxx-1b@l
f891966f 9528 . add/ldx %r12,%r11,%r12 */
05d0e962
AM
9529
9530static bfd_byte *
9531build_offset (bfd *abfd, bfd_byte *p, bfd_vma off, bfd_boolean load)
9532{
f891966f
AM
9533 bfd_put_32 (abfd, MFLR_R12, p);
9534 p += 4;
9535 bfd_put_32 (abfd, BCL_20_31, p);
9536 p += 4;
9537 bfd_put_32 (abfd, MFLR_R11, p);
9538 p += 4;
9539 bfd_put_32 (abfd, MTLR_R12, p);
9540 p += 4;
05d0e962
AM
9541 if (off + 0x8000 < 0x10000)
9542 {
9543 if (load)
9544 bfd_put_32 (abfd, LD_R12_0R11 + PPC_LO (off), p);
9545 else
9546 bfd_put_32 (abfd, ADDI_R12_R11 + PPC_LO (off), p);
9547 p += 4;
9548 }
9549 else if (off + 0x80008000ULL < 0x100000000ULL)
9550 {
9551 bfd_put_32 (abfd, ADDIS_R12_R11 + PPC_HA (off), p);
9552 p += 4;
9553 if (load)
9554 bfd_put_32 (abfd, LD_R12_0R12 + PPC_LO (off), p);
9555 else
9556 bfd_put_32 (abfd, ADDI_R12_R12 + PPC_LO (off), p);
9557 p += 4;
9558 }
9559 else
9560 {
9561 if (off + 0x800000000000ULL < 0x1000000000000ULL)
9562 {
9563 bfd_put_32 (abfd, LI_R12_0 + ((off >> 32) & 0xffff), p);
9564 p += 4;
9565 }
9566 else
9567 {
9568 bfd_put_32 (abfd, LIS_R12 + ((off >> 48) & 0xffff), p);
9569 p += 4;
9570 if (((off >> 32) & 0xffff) != 0)
9571 {
9572 bfd_put_32 (abfd, ORI_R12_R12_0 + ((off >> 32) & 0xffff), p);
9573 p += 4;
9574 }
9575 }
9576 if (((off >> 32) & 0xffffffffULL) != 0)
9577 {
9578 bfd_put_32 (abfd, SLDI_R12_R12_32, p);
9579 p += 4;
9580 }
9581 if (PPC_HI (off) != 0)
9582 {
9583 bfd_put_32 (abfd, ORIS_R12_R12_0 + PPC_HI (off), p);
9584 p += 4;
9585 }
9586 if (PPC_LO (off) != 0)
9587 {
9588 bfd_put_32 (abfd, ORI_R12_R12_0 + PPC_LO (off), p);
9589 p += 4;
9590 }
9591 if (load)
9592 bfd_put_32 (abfd, LDX_R12_R11_R12, p);
9593 else
9594 bfd_put_32 (abfd, ADD_R12_R11_R12, p);
9595 p += 4;
9596 }
9597 return p;
9598}
9599
9600static unsigned int
9601size_offset (bfd_vma off)
9602{
9603 unsigned int size;
9604 if (off + 0x8000 < 0x10000)
9605 size = 4;
9606 else if (off + 0x80008000ULL < 0x100000000ULL)
9607 size = 8;
9608 else
9609 {
9610 if (off + 0x800000000000ULL < 0x1000000000000ULL)
9611 size = 4;
9612 else
9613 {
9614 size = 4;
9615 if (((off >> 32) & 0xffff) != 0)
9616 size += 4;
9617 }
9618 if (((off >> 32) & 0xffffffffULL) != 0)
9619 size += 4;
9620 if (PPC_HI (off) != 0)
9621 size += 4;
9622 if (PPC_LO (off) != 0)
9623 size += 4;
9624 size += 4;
9625 }
f891966f 9626 return size + 16;
05d0e962
AM
9627}
9628
3d58e1fc
AM
9629static unsigned int
9630num_relocs_for_offset (bfd_vma off)
9631{
9632 unsigned int num_rel;
9633 if (off + 0x8000 < 0x10000)
9634 num_rel = 1;
9635 else if (off + 0x80008000ULL < 0x100000000ULL)
9636 num_rel = 2;
9637 else
9638 {
9639 num_rel = 1;
9640 if (off + 0x800000000000ULL >= 0x1000000000000ULL
9641 && ((off >> 32) & 0xffff) != 0)
9642 num_rel += 1;
9643 if (PPC_HI (off) != 0)
9644 num_rel += 1;
9645 if (PPC_LO (off) != 0)
9646 num_rel += 1;
9647 }
9648 return num_rel;
9649}
9650
9651static Elf_Internal_Rela *
9652emit_relocs_for_offset (struct bfd_link_info *info, Elf_Internal_Rela *r,
9653 bfd_vma roff, bfd_vma targ, bfd_vma off)
9654{
9655 bfd_vma relative_targ = targ - (roff - 8);
9656 if (bfd_big_endian (info->output_bfd))
9657 roff += 2;
9658 r->r_offset = roff;
9659 r->r_addend = relative_targ + roff;
9660 if (off + 0x8000 < 0x10000)
9661 r->r_info = ELF64_R_INFO (0, R_PPC64_REL16);
9662 else if (off + 0x80008000ULL < 0x100000000ULL)
9663 {
9664 r->r_info = ELF64_R_INFO (0, R_PPC64_REL16_HA);
9665 ++r;
9666 roff += 4;
9667 r->r_offset = roff;
9668 r->r_info = ELF64_R_INFO (0, R_PPC64_REL16_LO);
9669 r->r_addend = relative_targ + roff;
9670 }
9671 else
9672 {
9673 if (off + 0x800000000000ULL < 0x1000000000000ULL)
9674 r->r_info = ELF64_R_INFO (0, R_PPC64_REL16_HIGHER);
9675 else
9676 {
9677 r->r_info = ELF64_R_INFO (0, R_PPC64_REL16_HIGHEST);
9678 if (((off >> 32) & 0xffff) != 0)
9679 {
9680 ++r;
9681 roff += 4;
9682 r->r_offset = roff;
9683 r->r_info = ELF64_R_INFO (0, R_PPC64_REL16_HIGHER);
9684 r->r_addend = relative_targ + roff;
9685 }
9686 }
9687 if (((off >> 32) & 0xffffffffULL) != 0)
9688 roff += 4;
9689 if (PPC_HI (off) != 0)
9690 {
9691 ++r;
9692 roff += 4;
9693 r->r_offset = roff;
9694 r->r_info = ELF64_R_INFO (0, R_PPC64_REL16_HIGH);
9695 r->r_addend = relative_targ + roff;
9696 }
9697 if (PPC_LO (off) != 0)
9698 {
9699 ++r;
9700 roff += 4;
9701 r->r_offset = roff;
9702 r->r_info = ELF64_R_INFO (0, R_PPC64_REL16_LO);
9703 r->r_addend = relative_targ + roff;
9704 }
9705 }
9706 return r;
9707}
9708
df136d64
AM
9709/* Emit .eh_frame opcode to advance pc by DELTA. */
9710
9711static bfd_byte *
9712eh_advance (bfd *abfd, bfd_byte *eh, unsigned int delta)
9713{
9714 delta /= 4;
9715 if (delta < 64)
9716 *eh++ = DW_CFA_advance_loc + delta;
9717 else if (delta < 256)
9718 {
9719 *eh++ = DW_CFA_advance_loc1;
9720 *eh++ = delta;
9721 }
9722 else if (delta < 65536)
9723 {
9724 *eh++ = DW_CFA_advance_loc2;
9725 bfd_put_16 (abfd, delta, eh);
9726 eh += 2;
9727 }
9728 else
9729 {
9730 *eh++ = DW_CFA_advance_loc4;
9731 bfd_put_32 (abfd, delta, eh);
9732 eh += 4;
9733 }
9734 return eh;
9735}
9736
9737/* Size of required .eh_frame opcode to advance pc by DELTA. */
9738
9739static unsigned int
9740eh_advance_size (unsigned int delta)
9741{
9742 if (delta < 64 * 4)
9743 /* DW_CFA_advance_loc+[1..63]. */
9744 return 1;
9745 if (delta < 256 * 4)
9746 /* DW_CFA_advance_loc1, byte. */
9747 return 2;
9748 if (delta < 65536 * 4)
9749 /* DW_CFA_advance_loc2, 2 bytes. */
9750 return 3;
9751 /* DW_CFA_advance_loc4, 4 bytes. */
9752 return 5;
9753}
9754
794e51c0
AM
9755/* With power7 weakly ordered memory model, it is possible for ld.so
9756 to update a plt entry in one thread and have another thread see a
9757 stale zero toc entry. To avoid this we need some sort of acquire
9758 barrier in the call stub. One solution is to make the load of the
9759 toc word seem to appear to depend on the load of the function entry
9760 word. Another solution is to test for r2 being zero, and branch to
9761 the appropriate glink entry if so.
9762
9763 . fake dep barrier compare
71a39c98
AM
9764 . ld 12,xxx(2) ld 12,xxx(2)
9765 . mtctr 12 mtctr 12
9766 . xor 11,12,12 ld 2,xxx+8(2)
794e51c0
AM
9767 . add 2,2,11 cmpldi 2,0
9768 . ld 2,xxx+8(2) bnectr+
9769 . bctr b <glink_entry>
9770
9771 The solution involving the compare turns out to be faster, so
9772 that's what we use unless the branch won't reach. */
9773
9774#define ALWAYS_USE_FAKE_DEP 0
9775#define ALWAYS_EMIT_R2SAVE 0
5d1634d7 9776
794e51c0
AM
9777static inline unsigned int
9778plt_stub_size (struct ppc_link_hash_table *htab,
9779 struct ppc_stub_hash_entry *stub_entry,
9780 bfd_vma off)
9781{
05d0e962 9782 unsigned size;
b9e5796b 9783
05d0e962
AM
9784 if (stub_entry->stub_type >= ppc_stub_plt_call_notoc)
9785 {
f891966f 9786 size = 8 + size_offset (off - 8);
05d0e962
AM
9787 if (stub_entry->stub_type > ppc_stub_plt_call_notoc)
9788 size += 4;
9789 return size;
9790 }
9791
9792 size = 12;
b9e5796b
AM
9793 if (ALWAYS_EMIT_R2SAVE
9794 || stub_entry->stub_type == ppc_stub_plt_call_r2save)
9795 size += 4;
9796 if (PPC_HA (off) != 0)
794e51c0 9797 size += 4;
b9e5796b
AM
9798 if (htab->opd_abi)
9799 {
9800 size += 4;
e7d1c40c 9801 if (htab->params->plt_static_chain)
b9e5796b 9802 size += 4;
bd4d2eaa
AM
9803 if (htab->params->plt_thread_safe
9804 && htab->elf.dynamic_sections_created
9805 && stub_entry->h != NULL
9806 && stub_entry->h->elf.dynindx != -1)
b9e5796b 9807 size += 8;
e7d1c40c 9808 if (PPC_HA (off + 8 + 8 * htab->params->plt_static_chain) != PPC_HA (off))
b9e5796b
AM
9809 size += 4;
9810 }
794e51c0
AM
9811 if (stub_entry->h != NULL
9812 && (stub_entry->h == htab->tls_get_addr_fd
9813 || stub_entry->h == htab->tls_get_addr)
7c9cf415 9814 && htab->params->tls_get_addr_opt)
f378ab09
AM
9815 {
9816 size += 7 * 4;
e81b4c93 9817 if (stub_entry->stub_type == ppc_stub_plt_call_r2save)
407aa07c 9818 size += 6 * 4;
f378ab09 9819 }
794e51c0
AM
9820 return size;
9821}
9822
2420fff6
AM
9823/* Depending on the sign of plt_stub_align:
9824 If positive, return the padding to align to a 2**plt_stub_align
9825 boundary.
9826 If negative, if this stub would cross fewer 2**plt_stub_align
9827 boundaries if we align, then return the padding needed to do so. */
9828
794e51c0
AM
9829static inline unsigned int
9830plt_stub_pad (struct ppc_link_hash_table *htab,
9831 struct ppc_stub_hash_entry *stub_entry,
9832 bfd_vma plt_off)
9833{
2420fff6 9834 int stub_align;
1aa42141 9835 unsigned stub_size;
6f20ed8a 9836 bfd_vma stub_off = stub_entry->group->stub_sec->size;
794e51c0 9837
2420fff6
AM
9838 if (htab->params->plt_stub_align >= 0)
9839 {
9840 stub_align = 1 << htab->params->plt_stub_align;
9841 if ((stub_off & (stub_align - 1)) != 0)
9842 return stub_align - (stub_off & (stub_align - 1));
9843 return 0;
9844 }
9845
9846 stub_align = 1 << -htab->params->plt_stub_align;
1aa42141 9847 stub_size = plt_stub_size (htab, stub_entry, plt_off);
794e51c0 9848 if (((stub_off + stub_size - 1) & -stub_align) - (stub_off & -stub_align)
e05fa0ba 9849 > ((stub_size - 1) & -stub_align))
794e51c0
AM
9850 return stub_align - (stub_off & (stub_align - 1));
9851 return 0;
9852}
9853
9854/* Build a .plt call stub. */
9855
9856static inline bfd_byte *
9857build_plt_stub (struct ppc_link_hash_table *htab,
9858 struct ppc_stub_hash_entry *stub_entry,
9859 bfd_byte *p, bfd_vma offset, Elf_Internal_Rela *r)
9860{
e7d1c40c 9861 bfd *obfd = htab->params->stub_bfd;
b9e5796b 9862 bfd_boolean plt_load_toc = htab->opd_abi;
e7d1c40c 9863 bfd_boolean plt_static_chain = htab->params->plt_static_chain;
bd4d2eaa
AM
9864 bfd_boolean plt_thread_safe = (htab->params->plt_thread_safe
9865 && htab->elf.dynamic_sections_created
9866 && stub_entry->h != NULL
9867 && stub_entry->h->elf.dynindx != -1);
794e51c0
AM
9868 bfd_boolean use_fake_dep = plt_thread_safe;
9869 bfd_vma cmp_branch_off = 0;
9870
9871 if (!ALWAYS_USE_FAKE_DEP
b9e5796b 9872 && plt_load_toc
794e51c0 9873 && plt_thread_safe
bd4d2eaa
AM
9874 && !((stub_entry->h == htab->tls_get_addr_fd
9875 || stub_entry->h == htab->tls_get_addr)
7c9cf415 9876 && htab->params->tls_get_addr_opt))
794e51c0
AM
9877 {
9878 bfd_vma pltoff = stub_entry->plt_ent->plt.offset & ~1;
b9e5796b
AM
9879 bfd_vma pltindex = ((pltoff - PLT_INITIAL_ENTRY_SIZE (htab))
9880 / PLT_ENTRY_SIZE (htab));
9e390558 9881 bfd_vma glinkoff = GLINK_PLTRESOLVE_SIZE (htab) + pltindex * 8;
794e51c0
AM
9882 bfd_vma to, from;
9883
68d62958
AM
9884 if (pltindex > 32768)
9885 glinkoff += (pltindex - 32768) * 4;
794e51c0
AM
9886 to = (glinkoff
9887 + htab->glink->output_offset
9888 + htab->glink->output_section->vma);
6f20ed8a 9889 from = (p - stub_entry->group->stub_sec->contents
794e51c0
AM
9890 + 4 * (ALWAYS_EMIT_R2SAVE
9891 || stub_entry->stub_type == ppc_stub_plt_call_r2save)
9892 + 4 * (PPC_HA (offset) != 0)
9893 + 4 * (PPC_HA (offset + 8 + 8 * plt_static_chain)
9894 != PPC_HA (offset))
9895 + 4 * (plt_static_chain != 0)
9896 + 20
6f20ed8a
AM
9897 + stub_entry->group->stub_sec->output_offset
9898 + stub_entry->group->stub_sec->output_section->vma);
794e51c0
AM
9899 cmp_branch_off = to - from;
9900 use_fake_dep = cmp_branch_off + (1 << 25) >= (1 << 26);
9901 }
9902
ac2df442
AM
9903 if (PPC_HA (offset) != 0)
9904 {
176a0d42
AM
9905 if (r != NULL)
9906 {
794e51c0
AM
9907 if (ALWAYS_EMIT_R2SAVE
9908 || stub_entry->stub_type == ppc_stub_plt_call_r2save)
9909 r[0].r_offset += 4;
176a0d42 9910 r[0].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_HA);
3b421ab3 9911 r[1].r_offset = r[0].r_offset + 4;
176a0d42
AM
9912 r[1].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_LO_DS);
9913 r[1].r_addend = r[0].r_addend;
b9e5796b 9914 if (plt_load_toc)
176a0d42 9915 {
b9e5796b 9916 if (PPC_HA (offset + 8 + 8 * plt_static_chain) != PPC_HA (offset))
c7131b65 9917 {
b9e5796b
AM
9918 r[2].r_offset = r[1].r_offset + 4;
9919 r[2].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_LO);
9920 r[2].r_addend = r[0].r_addend;
9921 }
9922 else
9923 {
9924 r[2].r_offset = r[1].r_offset + 8 + 8 * use_fake_dep;
9925 r[2].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_LO_DS);
9926 r[2].r_addend = r[0].r_addend + 8;
9927 if (plt_static_chain)
9928 {
9929 r[3].r_offset = r[2].r_offset + 4;
9930 r[3].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_LO_DS);
9931 r[3].r_addend = r[0].r_addend + 16;
9932 }
c7131b65 9933 }
176a0d42
AM
9934 }
9935 }
794e51c0
AM
9936 if (ALWAYS_EMIT_R2SAVE
9937 || stub_entry->stub_type == ppc_stub_plt_call_r2save)
a078d95a 9938 bfd_put_32 (obfd, STD_R2_0R1 + STK_TOC (htab), p), p += 4;
397998fc
AM
9939 if (plt_load_toc)
9940 {
9941 bfd_put_32 (obfd, ADDIS_R11_R2 | PPC_HA (offset), p), p += 4;
9942 bfd_put_32 (obfd, LD_R12_0R11 | PPC_LO (offset), p), p += 4;
9943 }
9944 else
9945 {
9946 bfd_put_32 (obfd, ADDIS_R12_R2 | PPC_HA (offset), p), p += 4;
9947 bfd_put_32 (obfd, LD_R12_0R12 | PPC_LO (offset), p), p += 4;
9948 }
b9e5796b
AM
9949 if (plt_load_toc
9950 && PPC_HA (offset + 8 + 8 * plt_static_chain) != PPC_HA (offset))
ac2df442 9951 {
71a39c98 9952 bfd_put_32 (obfd, ADDI_R11_R11 | PPC_LO (offset), p), p += 4;
ac2df442
AM
9953 offset = 0;
9954 }
71a39c98 9955 bfd_put_32 (obfd, MTCTR_R12, p), p += 4;
b9e5796b 9956 if (plt_load_toc)
794e51c0 9957 {
b9e5796b
AM
9958 if (use_fake_dep)
9959 {
9960 bfd_put_32 (obfd, XOR_R2_R12_R12, p), p += 4;
9961 bfd_put_32 (obfd, ADD_R11_R11_R2, p), p += 4;
9962 }
9963 bfd_put_32 (obfd, LD_R2_0R11 | PPC_LO (offset + 8), p), p += 4;
9964 if (plt_static_chain)
9965 bfd_put_32 (obfd, LD_R11_0R11 | PPC_LO (offset + 16), p), p += 4;
794e51c0 9966 }
ac2df442
AM
9967 }
9968 else
9969 {
176a0d42
AM
9970 if (r != NULL)
9971 {
794e51c0
AM
9972 if (ALWAYS_EMIT_R2SAVE
9973 || stub_entry->stub_type == ppc_stub_plt_call_r2save)
9974 r[0].r_offset += 4;
176a0d42 9975 r[0].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_DS);
b9e5796b 9976 if (plt_load_toc)
176a0d42 9977 {
b9e5796b 9978 if (PPC_HA (offset + 8 + 8 * plt_static_chain) != PPC_HA (offset))
c7131b65 9979 {
b9e5796b
AM
9980 r[1].r_offset = r[0].r_offset + 4;
9981 r[1].r_info = ELF64_R_INFO (0, R_PPC64_TOC16);
9982 r[1].r_addend = r[0].r_addend;
9983 }
9984 else
9985 {
9986 r[1].r_offset = r[0].r_offset + 8 + 8 * use_fake_dep;
9987 r[1].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_DS);
9988 r[1].r_addend = r[0].r_addend + 8 + 8 * plt_static_chain;
9989 if (plt_static_chain)
9990 {
9991 r[2].r_offset = r[1].r_offset + 4;
9992 r[2].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_DS);
9993 r[2].r_addend = r[0].r_addend + 8;
9994 }
c7131b65 9995 }
176a0d42
AM
9996 }
9997 }
794e51c0
AM
9998 if (ALWAYS_EMIT_R2SAVE
9999 || stub_entry->stub_type == ppc_stub_plt_call_r2save)
a078d95a 10000 bfd_put_32 (obfd, STD_R2_0R1 + STK_TOC (htab), p), p += 4;
71a39c98 10001 bfd_put_32 (obfd, LD_R12_0R2 | PPC_LO (offset), p), p += 4;
b9e5796b
AM
10002 if (plt_load_toc
10003 && PPC_HA (offset + 8 + 8 * plt_static_chain) != PPC_HA (offset))
ac2df442
AM
10004 {
10005 bfd_put_32 (obfd, ADDI_R2_R2 | PPC_LO (offset), p), p += 4;
10006 offset = 0;
10007 }
71a39c98 10008 bfd_put_32 (obfd, MTCTR_R12, p), p += 4;
b9e5796b 10009 if (plt_load_toc)
794e51c0 10010 {
b9e5796b
AM
10011 if (use_fake_dep)
10012 {
10013 bfd_put_32 (obfd, XOR_R11_R12_R12, p), p += 4;
10014 bfd_put_32 (obfd, ADD_R2_R2_R11, p), p += 4;
10015 }
10016 if (plt_static_chain)
10017 bfd_put_32 (obfd, LD_R11_0R2 | PPC_LO (offset + 16), p), p += 4;
10018 bfd_put_32 (obfd, LD_R2_0R2 | PPC_LO (offset + 8), p), p += 4;
794e51c0 10019 }
ac2df442 10020 }
b9e5796b 10021 if (plt_load_toc && plt_thread_safe && !use_fake_dep)
794e51c0
AM
10022 {
10023 bfd_put_32 (obfd, CMPLDI_R2_0, p), p += 4;
10024 bfd_put_32 (obfd, BNECTR_P4, p), p += 4;
22aa0c7e 10025 bfd_put_32 (obfd, B_DOT | (cmp_branch_off & 0x3fffffc), p), p += 4;
794e51c0
AM
10026 }
10027 else
407aa07c 10028 bfd_put_32 (obfd, BCTR, p), p += 4;
5d1634d7
AM
10029 return p;
10030}
10031
a7f2871e
AM
10032/* Build a special .plt call stub for __tls_get_addr. */
10033
10034#define LD_R11_0R3 0xe9630000
10035#define LD_R12_0R3 0xe9830000
10036#define MR_R0_R3 0x7c601b78
10037#define CMPDI_R11_0 0x2c2b0000
10038#define ADD_R3_R12_R13 0x7c6c6a14
10039#define BEQLR 0x4d820020
10040#define MR_R3_R0 0x7c030378
a7f2871e
AM
10041#define STD_R11_0R1 0xf9610000
10042#define BCTRL 0x4e800421
10043#define LD_R11_0R1 0xe9610000
a7f2871e
AM
10044#define MTLR_R11 0x7d6803a6
10045
10046static inline bfd_byte *
794e51c0
AM
10047build_tls_get_addr_stub (struct ppc_link_hash_table *htab,
10048 struct ppc_stub_hash_entry *stub_entry,
10049 bfd_byte *p, bfd_vma offset, Elf_Internal_Rela *r)
a7f2871e 10050{
e7d1c40c 10051 bfd *obfd = htab->params->stub_bfd;
df136d64 10052 bfd_byte *loc = p;
794e51c0 10053
a7f2871e
AM
10054 bfd_put_32 (obfd, LD_R11_0R3 + 0, p), p += 4;
10055 bfd_put_32 (obfd, LD_R12_0R3 + 8, p), p += 4;
10056 bfd_put_32 (obfd, MR_R0_R3, p), p += 4;
10057 bfd_put_32 (obfd, CMPDI_R11_0, p), p += 4;
10058 bfd_put_32 (obfd, ADD_R3_R12_R13, p), p += 4;
10059 bfd_put_32 (obfd, BEQLR, p), p += 4;
10060 bfd_put_32 (obfd, MR_R3_R0, p), p += 4;
f378ab09
AM
10061 if (r != NULL)
10062 r[0].r_offset += 7 * 4;
e81b4c93 10063 if (stub_entry->stub_type != ppc_stub_plt_call_r2save)
f378ab09
AM
10064 return build_plt_stub (htab, stub_entry, p, offset, r);
10065
a7f2871e 10066 bfd_put_32 (obfd, MFLR_R11, p), p += 4;
a078d95a 10067 bfd_put_32 (obfd, STD_R11_0R1 + STK_LINKER (htab), p), p += 4;
a7f2871e
AM
10068
10069 if (r != NULL)
f378ab09 10070 r[0].r_offset += 2 * 4;
794e51c0 10071 p = build_plt_stub (htab, stub_entry, p, offset, r);
407aa07c 10072 bfd_put_32 (obfd, BCTRL, p - 4);
a7f2871e 10073
a078d95a 10074 bfd_put_32 (obfd, LD_R2_0R1 + STK_TOC (htab), p), p += 4;
bd4d2eaa 10075 bfd_put_32 (obfd, LD_R11_0R1 + STK_LINKER (htab), p), p += 4;
a7f2871e
AM
10076 bfd_put_32 (obfd, MTLR_R11, p), p += 4;
10077 bfd_put_32 (obfd, BLR, p), p += 4;
10078
df136d64
AM
10079 if (htab->glink_eh_frame != NULL
10080 && htab->glink_eh_frame->size != 0)
10081 {
10082 bfd_byte *base, *eh;
10083 unsigned int lr_used, delta;
10084
10085 base = htab->glink_eh_frame->contents + stub_entry->group->eh_base + 17;
10086 eh = base + stub_entry->group->eh_size;
10087 lr_used = stub_entry->stub_offset + (p - 20 - loc);
10088 delta = lr_used - stub_entry->group->lr_restore;
10089 stub_entry->group->lr_restore = lr_used + 16;
10090 eh = eh_advance (htab->elf.dynobj, eh, delta);
10091 *eh++ = DW_CFA_offset_extended_sf;
10092 *eh++ = 65;
10093 *eh++ = -(STK_LINKER (htab) / 8) & 0x7f;
10094 *eh++ = DW_CFA_advance_loc + 4;
10095 *eh++ = DW_CFA_restore_extended;
10096 *eh++ = 65;
10097 stub_entry->group->eh_size = eh - base;
10098 }
a7f2871e
AM
10099 return p;
10100}
10101
176a0d42
AM
10102static Elf_Internal_Rela *
10103get_relocs (asection *sec, int count)
10104{
10105 Elf_Internal_Rela *relocs;
10106 struct bfd_elf_section_data *elfsec_data;
10107
10108 elfsec_data = elf_section_data (sec);
10109 relocs = elfsec_data->relocs;
10110 if (relocs == NULL)
10111 {
10112 bfd_size_type relsize;
10113 relsize = sec->reloc_count * sizeof (*relocs);
10114 relocs = bfd_alloc (sec->owner, relsize);
10115 if (relocs == NULL)
10116 return NULL;
10117 elfsec_data->relocs = relocs;
d4730f92
BS
10118 elfsec_data->rela.hdr = bfd_zalloc (sec->owner,
10119 sizeof (Elf_Internal_Shdr));
10120 if (elfsec_data->rela.hdr == NULL)
10121 return NULL;
10122 elfsec_data->rela.hdr->sh_size = (sec->reloc_count
10123 * sizeof (Elf64_External_Rela));
10124 elfsec_data->rela.hdr->sh_entsize = sizeof (Elf64_External_Rela);
176a0d42
AM
10125 sec->reloc_count = 0;
10126 }
10127 relocs += sec->reloc_count;
10128 sec->reloc_count += count;
10129 return relocs;
10130}
10131
3d58e1fc
AM
10132/* Convert the relocs R[0] thru R[-NUM_REL+1], which are all no-symbol
10133 forms, to the equivalent relocs against the global symbol given by
10134 STUB_ENTRY->H. */
10135
10136static bfd_boolean
10137use_global_in_relocs (struct ppc_link_hash_table *htab,
10138 struct ppc_stub_hash_entry *stub_entry,
10139 Elf_Internal_Rela *r, unsigned int num_rel)
10140{
10141 struct elf_link_hash_entry **hashes;
10142 unsigned long symndx;
10143 struct ppc_link_hash_entry *h;
10144 bfd_vma symval;
10145
10146 /* Relocs are always against symbols in their own object file. Fake
10147 up global sym hashes for the stub bfd (which has no symbols). */
10148 hashes = elf_sym_hashes (htab->params->stub_bfd);
10149 if (hashes == NULL)
10150 {
10151 bfd_size_type hsize;
10152
10153 /* When called the first time, stub_globals will contain the
10154 total number of symbols seen during stub sizing. After
10155 allocating, stub_globals is used as an index to fill the
10156 hashes array. */
10157 hsize = (htab->stub_globals + 1) * sizeof (*hashes);
10158 hashes = bfd_zalloc (htab->params->stub_bfd, hsize);
10159 if (hashes == NULL)
10160 return FALSE;
10161 elf_sym_hashes (htab->params->stub_bfd) = hashes;
10162 htab->stub_globals = 1;
10163 }
10164 symndx = htab->stub_globals++;
10165 h = stub_entry->h;
10166 hashes[symndx] = &h->elf;
10167 if (h->oh != NULL && h->oh->is_func)
10168 h = ppc_follow_link (h->oh);
10169 BFD_ASSERT (h->elf.root.type == bfd_link_hash_defined
10170 || h->elf.root.type == bfd_link_hash_defweak);
10171 symval = (h->elf.root.u.def.value
10172 + h->elf.root.u.def.section->output_offset
10173 + h->elf.root.u.def.section->output_section->vma);
10174 while (num_rel-- != 0)
10175 {
10176 r->r_info = ELF64_R_INFO (symndx, ELF64_R_TYPE (r->r_info));
10177 if (h->elf.root.u.def.section != stub_entry->target_section)
10178 {
10179 /* H is an opd symbol. The addend must be zero, and the
10180 branch reloc is the only one we can convert. */
10181 r->r_addend = 0;
10182 break;
10183 }
10184 else
10185 r->r_addend -= symval;
10186 --r;
10187 }
10188 return TRUE;
10189}
10190
aa374f67 10191static bfd_vma
25f53a85 10192get_r2off (struct bfd_link_info *info,
aa374f67
AM
10193 struct ppc_stub_hash_entry *stub_entry)
10194{
25f53a85 10195 struct ppc_link_hash_table *htab = ppc_hash_table (info);
6f20ed8a 10196 bfd_vma r2off = htab->sec_info[stub_entry->target_section->id].toc_off;
aa374f67
AM
10197
10198 if (r2off == 0)
10199 {
10200 /* Support linking -R objects. Get the toc pointer from the
10201 opd entry. */
10202 char buf[8];
b9e5796b
AM
10203 if (!htab->opd_abi)
10204 return r2off;
aa374f67
AM
10205 asection *opd = stub_entry->h->elf.root.u.def.section;
10206 bfd_vma opd_off = stub_entry->h->elf.root.u.def.value;
10207
10208 if (strcmp (opd->name, ".opd") != 0
10209 || opd->reloc_count != 0)
10210 {
2cdcc330
AM
10211 info->callbacks->einfo
10212 (_("%P: cannot find opd entry toc for `%pT'\n"),
10213 stub_entry->h->elf.root.root.string);
aa374f67 10214 bfd_set_error (bfd_error_bad_value);
a7c49797 10215 return (bfd_vma) -1;
aa374f67
AM
10216 }
10217 if (!bfd_get_section_contents (opd->owner, opd, buf, opd_off + 8, 8))
a7c49797 10218 return (bfd_vma) -1;
aa374f67 10219 r2off = bfd_get_64 (opd->owner, buf);
25f53a85 10220 r2off -= elf_gp (info->output_bfd);
aa374f67 10221 }
6f20ed8a 10222 r2off -= htab->sec_info[stub_entry->group->link_sec->id].toc_off;
aa374f67
AM
10223 return r2off;
10224}
10225
b34976b6 10226static bfd_boolean
4ce794b7 10227ppc_build_one_stub (struct bfd_hash_entry *gen_entry, void *in_arg)
5d1634d7 10228{
721956f4
AM
10229 struct ppc_stub_hash_entry *stub_entry;
10230 struct ppc_branch_hash_entry *br_entry;
5d1634d7
AM
10231 struct bfd_link_info *info;
10232 struct ppc_link_hash_table *htab;
721956f4 10233 bfd_byte *loc;
3d58e1fc 10234 bfd_byte *p, *relp;
1aa42141 10235 bfd_vma targ, off;
176a0d42 10236 Elf_Internal_Rela *r;
e054468f 10237 asection *plt;
3d58e1fc 10238 int num_rel;
5d1634d7 10239
721956f4
AM
10240 /* Massage our args to the form they really have. */
10241 stub_entry = (struct ppc_stub_hash_entry *) gen_entry;
4ce794b7 10242 info = in_arg;
5d1634d7 10243
5d1634d7 10244 htab = ppc_hash_table (info);
4dfe6ac6
NC
10245 if (htab == NULL)
10246 return FALSE;
5d1634d7 10247
1aa42141 10248 BFD_ASSERT (stub_entry->stub_offset >= stub_entry->group->stub_sec->size);
6f20ed8a 10249 loc = stub_entry->group->stub_sec->contents + stub_entry->stub_offset;
721956f4 10250
4ce794b7 10251 htab->stub_count[stub_entry->stub_type - 1] += 1;
721956f4 10252 switch (stub_entry->stub_type)
5d1634d7 10253 {
721956f4 10254 case ppc_stub_long_branch:
ad8e1ba5 10255 case ppc_stub_long_branch_r2off:
721956f4 10256 /* Branches are relative. This is where we are going to. */
1aa42141 10257 targ = (stub_entry->target_value
6911b7dc
AM
10258 + stub_entry->target_section->output_offset
10259 + stub_entry->target_section->output_section->vma);
1aa42141 10260 targ += PPC64_LOCAL_ENTRY_OFFSET (stub_entry->other);
5d1634d7 10261
721956f4 10262 /* And this is where we are coming from. */
1aa42141
AM
10263 off = (stub_entry->stub_offset
10264 + stub_entry->group->stub_sec->output_offset
10265 + stub_entry->group->stub_sec->output_section->vma);
10266 off = targ - off;
e86ce104 10267
9e390558 10268 p = loc;
ac2df442 10269 if (stub_entry->stub_type == ppc_stub_long_branch_r2off)
ad8e1ba5 10270 {
25f53a85 10271 bfd_vma r2off = get_r2off (info, stub_entry);
ad8e1ba5 10272
a7c49797 10273 if (r2off == (bfd_vma) -1)
aa374f67
AM
10274 {
10275 htab->stub_error = TRUE;
10276 return FALSE;
10277 }
9e390558
AM
10278 bfd_put_32 (htab->params->stub_bfd, STD_R2_0R1 + STK_TOC (htab), p);
10279 p += 4;
ac2df442
AM
10280 if (PPC_HA (r2off) != 0)
10281 {
e7d1c40c 10282 bfd_put_32 (htab->params->stub_bfd,
9e390558
AM
10283 ADDIS_R2_R2 | PPC_HA (r2off), p);
10284 p += 4;
a7c49797
AM
10285 }
10286 if (PPC_LO (r2off) != 0)
10287 {
10288 bfd_put_32 (htab->params->stub_bfd,
9e390558
AM
10289 ADDI_R2_R2 | PPC_LO (r2off), p);
10290 p += 4;
ac2df442 10291 }
9e390558 10292 off -= p - loc;
ad8e1ba5 10293 }
9e390558
AM
10294 bfd_put_32 (htab->params->stub_bfd, B_DOT | (off & 0x3fffffc), p);
10295 p += 4;
ad8e1ba5 10296
5c3dead3
AM
10297 if (off + (1 << 25) >= (bfd_vma) (1 << 26))
10298 {
cf97bcb0
AM
10299 _bfd_error_handler
10300 (_("long branch stub `%s' offset overflow"),
bc30df16 10301 stub_entry->root.string);
5c3dead3
AM
10302 htab->stub_error = TRUE;
10303 return FALSE;
10304 }
ee75fd95
AM
10305
10306 if (info->emitrelocations)
10307 {
6f20ed8a 10308 r = get_relocs (stub_entry->group->stub_sec, 1);
176a0d42
AM
10309 if (r == NULL)
10310 return FALSE;
9e390558 10311 r->r_offset = p - 4 - stub_entry->group->stub_sec->contents;
ee75fd95 10312 r->r_info = ELF64_R_INFO (0, R_PPC64_REL24);
1aa42141 10313 r->r_addend = targ;
3d58e1fc
AM
10314 if (stub_entry->h != NULL
10315 && !use_global_in_relocs (htab, stub_entry, r, 1))
10316 return FALSE;
ee75fd95 10317 }
721956f4 10318 break;
e86ce104 10319
721956f4 10320 case ppc_stub_plt_branch:
ad8e1ba5 10321 case ppc_stub_plt_branch_r2off:
721956f4
AM
10322 br_entry = ppc_branch_hash_lookup (&htab->branch_hash_table,
10323 stub_entry->root.string + 9,
b34976b6 10324 FALSE, FALSE);
721956f4
AM
10325 if (br_entry == NULL)
10326 {
cf97bcb0
AM
10327 _bfd_error_handler (_("can't find branch stub `%s'"),
10328 stub_entry->root.string);
b34976b6
AM
10329 htab->stub_error = TRUE;
10330 return FALSE;
721956f4
AM
10331 }
10332
1aa42141 10333 targ = (stub_entry->target_value
176a0d42
AM
10334 + stub_entry->target_section->output_offset
10335 + stub_entry->target_section->output_section->vma);
6911b7dc 10336 if (stub_entry->stub_type != ppc_stub_plt_branch_r2off)
1aa42141 10337 targ += PPC64_LOCAL_ENTRY_OFFSET (stub_entry->other);
721956f4 10338
1aa42141 10339 bfd_put_64 (htab->brlt->owner, targ,
4ce794b7 10340 htab->brlt->contents + br_entry->offset);
721956f4 10341
f94498ff 10342 if (br_entry->iter == htab->stub_iteration)
721956f4 10343 {
f94498ff 10344 br_entry->iter = 0;
84f5d08e 10345
f94498ff 10346 if (htab->relbrlt != NULL)
84f5d08e 10347 {
f94498ff
AM
10348 /* Create a reloc for the branch lookup table entry. */
10349 Elf_Internal_Rela rela;
10350 bfd_byte *rl;
10351
10352 rela.r_offset = (br_entry->offset
10353 + htab->brlt->output_offset
10354 + htab->brlt->output_section->vma);
10355 rela.r_info = ELF64_R_INFO (0, R_PPC64_RELATIVE);
1aa42141 10356 rela.r_addend = targ;
f94498ff
AM
10357
10358 rl = htab->relbrlt->contents;
10359 rl += (htab->relbrlt->reloc_count++
10360 * sizeof (Elf64_External_Rela));
10361 bfd_elf64_swap_reloca_out (htab->relbrlt->owner, &rela, rl);
10362 }
10363 else if (info->emitrelocations)
10364 {
176a0d42
AM
10365 r = get_relocs (htab->brlt, 1);
10366 if (r == NULL)
10367 return FALSE;
10368 /* brlt, being SEC_LINKER_CREATED does not go through the
10369 normal reloc processing. Symbols and offsets are not
10370 translated from input file to output file form, so
10371 set up the offset per the output file. */
f94498ff
AM
10372 r->r_offset = (br_entry->offset
10373 + htab->brlt->output_offset
10374 + htab->brlt->output_section->vma);
10375 r->r_info = ELF64_R_INFO (0, R_PPC64_RELATIVE);
1aa42141 10376 r->r_addend = targ;
84f5d08e 10377 }
84f5d08e 10378 }
721956f4 10379
1aa42141 10380 targ = (br_entry->offset
176a0d42
AM
10381 + htab->brlt->output_offset
10382 + htab->brlt->output_section->vma);
10383
1aa42141
AM
10384 off = (elf_gp (info->output_bfd)
10385 + htab->sec_info[stub_entry->group->link_sec->id].toc_off);
10386 off = targ - off;
721956f4 10387
ad8e1ba5 10388 if (off + 0x80008000 > 0xffffffff || (off & 7) != 0)
5d1634d7 10389 {
25f53a85 10390 info->callbacks->einfo
c1c8c1ef 10391 (_("%P: linkage table error against `%pT'\n"),
721956f4 10392 stub_entry->root.string);
5d1634d7 10393 bfd_set_error (bfd_error_bad_value);
b34976b6
AM
10394 htab->stub_error = TRUE;
10395 return FALSE;
5d1634d7 10396 }
41bd81ab 10397
176a0d42
AM
10398 if (info->emitrelocations)
10399 {
6f20ed8a 10400 r = get_relocs (stub_entry->group->stub_sec, 1 + (PPC_HA (off) != 0));
176a0d42
AM
10401 if (r == NULL)
10402 return FALSE;
6f20ed8a 10403 r[0].r_offset = loc - stub_entry->group->stub_sec->contents;
7cfbafbc
AM
10404 if (bfd_big_endian (info->output_bfd))
10405 r[0].r_offset += 2;
00f412ee 10406 if (stub_entry->stub_type == ppc_stub_plt_branch_r2off)
176a0d42
AM
10407 r[0].r_offset += 4;
10408 r[0].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_DS);
1aa42141 10409 r[0].r_addend = targ;
176a0d42
AM
10410 if (PPC_HA (off) != 0)
10411 {
10412 r[0].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_HA);
10413 r[1].r_offset = r[0].r_offset + 4;
10414 r[1].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_LO_DS);
10415 r[1].r_addend = r[0].r_addend;
10416 }
10417 }
10418
9e390558 10419 p = loc;
00f412ee 10420 if (stub_entry->stub_type != ppc_stub_plt_branch_r2off)
ad8e1ba5 10421 {
176a0d42 10422 if (PPC_HA (off) != 0)
ac2df442 10423 {
e7d1c40c 10424 bfd_put_32 (htab->params->stub_bfd,
9e390558
AM
10425 ADDIS_R12_R2 | PPC_HA (off), p);
10426 p += 4;
e7d1c40c 10427 bfd_put_32 (htab->params->stub_bfd,
9e390558 10428 LD_R12_0R12 | PPC_LO (off), p);
ac2df442
AM
10429 }
10430 else
9e390558
AM
10431 bfd_put_32 (htab->params->stub_bfd,
10432 LD_R12_0R2 | PPC_LO (off), p);
ad8e1ba5
AM
10433 }
10434 else
10435 {
25f53a85 10436 bfd_vma r2off = get_r2off (info, stub_entry);
aa374f67 10437
a7c49797 10438 if (r2off == (bfd_vma) -1)
aa374f67
AM
10439 {
10440 htab->stub_error = TRUE;
10441 return FALSE;
10442 }
ad8e1ba5 10443
9e390558
AM
10444 bfd_put_32 (htab->params->stub_bfd, STD_R2_0R1 + STK_TOC (htab), p);
10445 p += 4;
176a0d42 10446 if (PPC_HA (off) != 0)
ac2df442 10447 {
e7d1c40c 10448 bfd_put_32 (htab->params->stub_bfd,
9e390558
AM
10449 ADDIS_R12_R2 | PPC_HA (off), p);
10450 p += 4;
e7d1c40c 10451 bfd_put_32 (htab->params->stub_bfd,
9e390558 10452 LD_R12_0R12 | PPC_LO (off), p);
ac2df442
AM
10453 }
10454 else
9e390558 10455 bfd_put_32 (htab->params->stub_bfd, LD_R12_0R2 | PPC_LO (off), p);
ac2df442
AM
10456
10457 if (PPC_HA (r2off) != 0)
10458 {
9e390558 10459 p += 4;
e7d1c40c 10460 bfd_put_32 (htab->params->stub_bfd,
9e390558 10461 ADDIS_R2_R2 | PPC_HA (r2off), p);
00f412ee
AM
10462 }
10463 if (PPC_LO (r2off) != 0)
10464 {
9e390558 10465 p += 4;
e7d1c40c 10466 bfd_put_32 (htab->params->stub_bfd,
9e390558 10467 ADDI_R2_R2 | PPC_LO (r2off), p);
ac2df442 10468 }
ad8e1ba5 10469 }
9e390558
AM
10470 p += 4;
10471 bfd_put_32 (htab->params->stub_bfd, MTCTR_R12, p);
10472 p += 4;
407aa07c
AM
10473 bfd_put_32 (htab->params->stub_bfd, BCTR, p);
10474 p += 4;
721956f4 10475 break;
5d1634d7 10476
05d0e962
AM
10477 case ppc_stub_long_branch_notoc:
10478 case ppc_stub_long_branch_both:
10479 case ppc_stub_plt_branch_notoc:
10480 case ppc_stub_plt_branch_both:
10481 case ppc_stub_plt_call_notoc:
10482 case ppc_stub_plt_call_both:
10483 p = loc;
f891966f 10484 off = (stub_entry->stub_offset
05d0e962
AM
10485 + stub_entry->group->stub_sec->output_offset
10486 + stub_entry->group->stub_sec->output_section->vma);
10487 if (stub_entry->stub_type == ppc_stub_long_branch_both
10488 || stub_entry->stub_type == ppc_stub_plt_branch_both
10489 || stub_entry->stub_type == ppc_stub_plt_call_both)
10490 {
10491 off += 4;
10492 bfd_put_32 (htab->params->stub_bfd, STD_R2_0R1 + STK_TOC (htab), p);
10493 p += 4;
10494 }
10495 if (stub_entry->stub_type >= ppc_stub_plt_call_notoc)
10496 {
10497 targ = stub_entry->plt_ent->plt.offset & ~1;
10498 if (targ >= (bfd_vma) -2)
10499 abort ();
10500
10501 plt = htab->elf.splt;
10502 if (!htab->elf.dynamic_sections_created
10503 || stub_entry->h == NULL
10504 || stub_entry->h->elf.dynindx == -1)
10505 {
10506 if (stub_entry->symtype == STT_GNU_IFUNC)
10507 plt = htab->elf.iplt;
10508 else
10509 plt = htab->pltlocal;
10510 }
10511 targ += plt->output_offset + plt->output_section->vma;
10512 }
10513 else
10514 targ = (stub_entry->target_value
10515 + stub_entry->target_section->output_offset
10516 + stub_entry->target_section->output_section->vma);
10517 off = targ - off;
f891966f 10518
3d58e1fc
AM
10519 relp = p;
10520 num_rel = 0;
f891966f
AM
10521 /* The notoc stubs calculate their target (either a PLT entry or
10522 the global entry point of a function) relative to the PC
10523 returned by the "bcl" two instructions past the start of the
10524 sequence emitted by build_offset. The offset is therefore 8
10525 less than calculated from the start of the sequence. */
10526 off -= 8;
05d0e962
AM
10527 p = build_offset (htab->params->stub_bfd, p, off,
10528 stub_entry->stub_type >= ppc_stub_plt_call_notoc);
f891966f 10529 if (stub_entry->stub_type <= ppc_stub_long_branch_both)
05d0e962 10530 {
f891966f 10531 bfd_vma from;
3d58e1fc 10532 num_rel = 1;
f891966f
AM
10533 from = (stub_entry->stub_offset
10534 + stub_entry->group->stub_sec->output_offset
10535 + stub_entry->group->stub_sec->output_section->vma
10536 + (p - loc));
05d0e962 10537 bfd_put_32 (htab->params->stub_bfd,
f891966f 10538 B_DOT | ((targ - from) & 0x3fffffc), p);
05d0e962
AM
10539 }
10540 else
10541 {
10542 bfd_put_32 (htab->params->stub_bfd, MTCTR_R12, p);
10543 p += 4;
10544 bfd_put_32 (htab->params->stub_bfd, BCTR, p);
10545 }
10546 p += 4;
df136d64 10547
3d58e1fc
AM
10548 if (info->emitrelocations)
10549 {
10550 bfd_vma roff;
10551 num_rel += num_relocs_for_offset (off);
10552 r = get_relocs (stub_entry->group->stub_sec, num_rel);
10553 if (r == NULL)
10554 return FALSE;
10555 roff = relp + 16 - stub_entry->group->stub_sec->contents;
10556 r = emit_relocs_for_offset (info, r, roff, targ, off);
10557 if (stub_entry->stub_type == ppc_stub_long_branch_notoc
10558 || stub_entry->stub_type == ppc_stub_long_branch_both)
10559 {
10560 ++r;
10561 roff = p - 4 - stub_entry->group->stub_sec->contents;
10562 r->r_offset = roff;
10563 r->r_info = ELF64_R_INFO (0, R_PPC64_REL24);
10564 r->r_addend = targ;
10565 if (stub_entry->h != NULL
10566 && !use_global_in_relocs (htab, stub_entry, r, num_rel))
10567 return FALSE;
10568 }
10569 }
10570
df136d64
AM
10571 if (htab->glink_eh_frame != NULL
10572 && htab->glink_eh_frame->size != 0)
10573 {
10574 bfd_byte *base, *eh;
10575 unsigned int lr_used, delta;
10576
10577 base = (htab->glink_eh_frame->contents
10578 + stub_entry->group->eh_base + 17);
10579 eh = base + stub_entry->group->eh_size;
10580 lr_used = stub_entry->stub_offset + 8;
10581 if (stub_entry->stub_type == ppc_stub_long_branch_both
10582 || stub_entry->stub_type == ppc_stub_plt_branch_both
10583 || stub_entry->stub_type == ppc_stub_plt_call_both)
10584 lr_used += 4;
10585 delta = lr_used - stub_entry->group->lr_restore;
10586 stub_entry->group->lr_restore = lr_used + 8;
10587 eh = eh_advance (htab->elf.dynobj, eh, delta);
10588 *eh++ = DW_CFA_register;
10589 *eh++ = 65;
10590 *eh++ = 12;
10591 *eh++ = DW_CFA_advance_loc + 2;
10592 *eh++ = DW_CFA_restore_extended;
10593 *eh++ = 65;
10594 stub_entry->group->eh_size = eh - base;
10595 }
05d0e962
AM
10596 break;
10597
721956f4 10598 case ppc_stub_plt_call:
794e51c0 10599 case ppc_stub_plt_call_r2save:
e054468f 10600 if (stub_entry->h != NULL
b31867b6
AM
10601 && stub_entry->h->is_func_descriptor
10602 && stub_entry->h->oh != NULL)
c862ae31 10603 {
b31867b6
AM
10604 struct ppc_link_hash_entry *fh = ppc_follow_link (stub_entry->h->oh);
10605
10606 /* If the old-ABI "dot-symbol" is undefined make it weak so
6f20ed8a 10607 we don't get a link error from RELOC_FOR_GLOBAL_SYMBOL. */
8c5b4e52
AM
10608 if (fh->elf.root.type == bfd_link_hash_undefined
10609 && (stub_entry->h->elf.root.type == bfd_link_hash_defined
10610 || stub_entry->h->elf.root.type == bfd_link_hash_defweak))
b31867b6 10611 fh->elf.root.type = bfd_link_hash_undefweak;
c862ae31
AM
10612 }
10613
721956f4 10614 /* Now build the stub. */
1aa42141
AM
10615 targ = stub_entry->plt_ent->plt.offset & ~1;
10616 if (targ >= (bfd_vma) -2)
721956f4
AM
10617 abort ();
10618
33e44f2e 10619 plt = htab->elf.splt;
25f23106
AM
10620 if (!htab->elf.dynamic_sections_created
10621 || stub_entry->h == NULL
10622 || stub_entry->h->elf.dynindx == -1)
2d7ad24e
AM
10623 {
10624 if (stub_entry->symtype == STT_GNU_IFUNC)
10625 plt = htab->elf.iplt;
10626 else
10627 plt = htab->pltlocal;
10628 }
1aa42141 10629 targ += plt->output_offset + plt->output_section->vma;
e054468f 10630
1aa42141
AM
10631 off = (elf_gp (info->output_bfd)
10632 + htab->sec_info[stub_entry->group->link_sec->id].toc_off);
10633 off = targ - off;
721956f4 10634
ad8e1ba5 10635 if (off + 0x80008000 > 0xffffffff || (off & 7) != 0)
721956f4 10636 {
25f53a85 10637 info->callbacks->einfo
695344c0 10638 /* xgettext:c-format */
c1c8c1ef 10639 (_("%P: linkage table error against `%pT'\n"),
e054468f
AM
10640 stub_entry->h != NULL
10641 ? stub_entry->h->elf.root.root.string
10642 : "<local sym>");
721956f4 10643 bfd_set_error (bfd_error_bad_value);
b34976b6
AM
10644 htab->stub_error = TRUE;
10645 return FALSE;
721956f4
AM
10646 }
10647
176a0d42
AM
10648 r = NULL;
10649 if (info->emitrelocations)
10650 {
6f20ed8a 10651 r = get_relocs (stub_entry->group->stub_sec,
3ba720c7
AM
10652 ((PPC_HA (off) != 0)
10653 + (htab->opd_abi
e7d1c40c 10654 ? 2 + (htab->params->plt_static_chain
3ba720c7
AM
10655 && PPC_HA (off + 16) == PPC_HA (off))
10656 : 1)));
176a0d42
AM
10657 if (r == NULL)
10658 return FALSE;
6f20ed8a 10659 r[0].r_offset = loc - stub_entry->group->stub_sec->contents;
7cfbafbc
AM
10660 if (bfd_big_endian (info->output_bfd))
10661 r[0].r_offset += 2;
1aa42141 10662 r[0].r_addend = targ;
176a0d42 10663 }
a7f2871e
AM
10664 if (stub_entry->h != NULL
10665 && (stub_entry->h == htab->tls_get_addr_fd
10666 || stub_entry->h == htab->tls_get_addr)
7c9cf415 10667 && htab->params->tls_get_addr_opt)
794e51c0 10668 p = build_tls_get_addr_stub (htab, stub_entry, loc, off, r);
a7f2871e 10669 else
794e51c0 10670 p = build_plt_stub (htab, stub_entry, loc, off, r);
721956f4
AM
10671 break;
10672
a4b6fadd
AM
10673 case ppc_stub_save_res:
10674 return TRUE;
10675
721956f4
AM
10676 default:
10677 BFD_FAIL ();
b34976b6 10678 return FALSE;
721956f4
AM
10679 }
10680
1aa42141 10681 stub_entry->group->stub_sec->size = stub_entry->stub_offset + (p - loc);
97b639ba 10682
e7d1c40c 10683 if (htab->params->emit_stub_syms)
97b639ba
AM
10684 {
10685 struct elf_link_hash_entry *h;
ee75fd95
AM
10686 size_t len1, len2;
10687 char *name;
10688 const char *const stub_str[] = { "long_branch",
05d0e962
AM
10689 "long_branch",
10690 "long_branch",
3f6ff479
AM
10691 "long_branch",
10692 "plt_branch",
ee75fd95 10693 "plt_branch",
05d0e962
AM
10694 "plt_branch",
10695 "plt_branch",
10696 "plt_call",
10697 "plt_call",
794e51c0 10698 "plt_call",
ee75fd95
AM
10699 "plt_call" };
10700
10701 len1 = strlen (stub_str[stub_entry->stub_type - 1]);
10702 len2 = strlen (stub_entry->root.string);
10703 name = bfd_malloc (len1 + len2 + 2);
10704 if (name == NULL)
10705 return FALSE;
10706 memcpy (name, stub_entry->root.string, 9);
10707 memcpy (name + 9, stub_str[stub_entry->stub_type - 1], len1);
10708 memcpy (name + len1 + 9, stub_entry->root.string + 8, len2 - 8 + 1);
10709 h = elf_link_hash_lookup (&htab->elf, name, TRUE, FALSE, FALSE);
97b639ba
AM
10710 if (h == NULL)
10711 return FALSE;
10712 if (h->root.type == bfd_link_hash_new)
10713 {
10714 h->root.type = bfd_link_hash_defined;
6f20ed8a 10715 h->root.u.def.section = stub_entry->group->stub_sec;
97b639ba 10716 h->root.u.def.value = stub_entry->stub_offset;
f5385ebf
AM
10717 h->ref_regular = 1;
10718 h->def_regular = 1;
10719 h->ref_regular_nonweak = 1;
10720 h->forced_local = 1;
10721 h->non_elf = 0;
2ec55de3 10722 h->root.linker_def = 1;
97b639ba
AM
10723 }
10724 }
10725
b34976b6 10726 return TRUE;
721956f4
AM
10727}
10728
10729/* As above, but don't actually build the stub. Just bump offset so
10730 we know stub section sizes, and select plt_branch stubs where
10731 long_branch stubs won't do. */
10732
b34976b6 10733static bfd_boolean
4ce794b7 10734ppc_size_one_stub (struct bfd_hash_entry *gen_entry, void *in_arg)
721956f4
AM
10735{
10736 struct ppc_stub_hash_entry *stub_entry;
63bc6f6c 10737 struct bfd_link_info *info;
721956f4 10738 struct ppc_link_hash_table *htab;
f891966f
AM
10739 asection *plt;
10740 bfd_vma targ, off, r2off;
10741 unsigned int size, extra, lr_used, delta;
721956f4
AM
10742
10743 /* Massage our args to the form they really have. */
10744 stub_entry = (struct ppc_stub_hash_entry *) gen_entry;
63bc6f6c
AM
10745 info = in_arg;
10746
10747 htab = ppc_hash_table (info);
4dfe6ac6
NC
10748 if (htab == NULL)
10749 return FALSE;
721956f4 10750
1aa42141
AM
10751 /* Make a note of the offset within the stubs for this entry. */
10752 stub_entry->stub_offset = stub_entry->group->stub_sec->size;
10753
a4b6fadd
AM
10754 if (stub_entry->h != NULL
10755 && stub_entry->h->save_res
10756 && stub_entry->h->elf.root.type == bfd_link_hash_defined
10757 && stub_entry->h->elf.root.u.def.section == htab->sfpr)
10758 {
10759 /* Don't make stubs to out-of-line register save/restore
10760 functions. Instead, emit copies of the functions. */
10761 stub_entry->group->needs_save_res = 1;
10762 stub_entry->stub_type = ppc_stub_save_res;
10763 return TRUE;
10764 }
10765
f891966f 10766 switch (stub_entry->stub_type)
721956f4 10767 {
f891966f
AM
10768 case ppc_stub_plt_branch:
10769 case ppc_stub_plt_branch_r2off:
10770 /* Reset the stub type from the plt branch variant in case we now
10771 can reach with a shorter stub. */
10772 stub_entry->stub_type += ppc_stub_long_branch - ppc_stub_plt_branch;
10773 /* Fall through. */
10774 case ppc_stub_long_branch:
10775 case ppc_stub_long_branch_r2off:
1aa42141
AM
10776 targ = (stub_entry->target_value
10777 + stub_entry->target_section->output_offset
10778 + stub_entry->target_section->output_section->vma);
f891966f 10779 targ += PPC64_LOCAL_ENTRY_OFFSET (stub_entry->other);
1aa42141
AM
10780 off = (stub_entry->stub_offset
10781 + stub_entry->group->stub_sec->output_offset
10782 + stub_entry->group->stub_sec->output_section->vma);
721956f4 10783
ad8e1ba5 10784 size = 4;
f891966f 10785 r2off = 0;
ad8e1ba5
AM
10786 if (stub_entry->stub_type == ppc_stub_long_branch_r2off)
10787 {
25f53a85 10788 r2off = get_r2off (info, stub_entry);
a7c49797 10789 if (r2off == (bfd_vma) -1)
aa374f67
AM
10790 {
10791 htab->stub_error = TRUE;
10792 return FALSE;
10793 }
a7c49797 10794 size = 8;
ac2df442 10795 if (PPC_HA (r2off) != 0)
a7c49797
AM
10796 size += 4;
10797 if (PPC_LO (r2off) != 0)
10798 size += 4;
1aa42141 10799 off += size - 4;
ad8e1ba5 10800 }
1aa42141 10801 off = targ - off;
ad8e1ba5 10802
f891966f
AM
10803 /* If the branch offset is too big, use a ppc_stub_plt_branch.
10804 Do the same for -R objects without function descriptors. */
10805 if ((stub_entry->stub_type == ppc_stub_long_branch_r2off
10806 && r2off == 0
10807 && htab->sec_info[stub_entry->target_section->id].toc_off == 0)
10808 || off + (1 << 25) >= (bfd_vma) (1 << 26))
721956f4 10809 {
f891966f 10810 struct ppc_branch_hash_entry *br_entry;
df136d64 10811
f891966f
AM
10812 br_entry = ppc_branch_hash_lookup (&htab->branch_hash_table,
10813 stub_entry->root.string + 9,
10814 TRUE, FALSE);
10815 if (br_entry == NULL)
721956f4 10816 {
f891966f
AM
10817 _bfd_error_handler (_("can't build branch stub `%s'"),
10818 stub_entry->root.string);
10819 htab->stub_error = TRUE;
10820 return FALSE;
721956f4
AM
10821 }
10822
f891966f 10823 if (br_entry->iter != htab->stub_iteration)
721956f4 10824 {
f891966f
AM
10825 br_entry->iter = htab->stub_iteration;
10826 br_entry->offset = htab->brlt->size;
10827 htab->brlt->size += 8;
63bc6f6c 10828
f891966f
AM
10829 if (htab->relbrlt != NULL)
10830 htab->relbrlt->size += sizeof (Elf64_External_Rela);
10831 else if (info->emitrelocations)
84f5d08e 10832 {
f891966f
AM
10833 htab->brlt->reloc_count += 1;
10834 htab->brlt->flags |= SEC_RELOC;
05d0e962 10835 }
f891966f 10836 }
ac2df442 10837
f891966f
AM
10838 targ = (br_entry->offset
10839 + htab->brlt->output_offset
10840 + htab->brlt->output_section->vma);
10841 off = (elf_gp (info->output_bfd)
10842 + htab->sec_info[stub_entry->group->link_sec->id].toc_off);
10843 off = targ - off;
176a0d42 10844
f891966f
AM
10845 if (info->emitrelocations)
10846 {
10847 stub_entry->group->stub_sec->reloc_count
10848 += 1 + (PPC_HA (off) != 0);
10849 stub_entry->group->stub_sec->flags |= SEC_RELOC;
10850 }
05d0e962 10851
f891966f
AM
10852 stub_entry->stub_type += ppc_stub_plt_branch - ppc_stub_long_branch;
10853 if (stub_entry->stub_type != ppc_stub_plt_branch_r2off)
10854 {
10855 size = 12;
10856 if (PPC_HA (off) != 0)
10857 size = 16;
ac2df442 10858 }
f891966f 10859 else
ac2df442 10860 {
f891966f
AM
10861 size = 16;
10862 if (PPC_HA (off) != 0)
10863 size += 4;
10864
10865 if (PPC_HA (r2off) != 0)
10866 size += 4;
10867 if (PPC_LO (r2off) != 0)
10868 size += 4;
ac2df442 10869 }
721956f4 10870 }
f891966f
AM
10871 else if (info->emitrelocations)
10872 {
10873 stub_entry->group->stub_sec->reloc_count += 1;
10874 stub_entry->group->stub_sec->flags |= SEC_RELOC;
10875 }
10876 break;
10877
10878 case ppc_stub_plt_branch_notoc:
10879 case ppc_stub_plt_branch_both:
10880 stub_entry->stub_type += ppc_stub_long_branch - ppc_stub_plt_branch;
10881 /* Fall through. */
10882 case ppc_stub_long_branch_notoc:
10883 case ppc_stub_long_branch_both:
10884 off = (stub_entry->stub_offset
10885 + stub_entry->group->stub_sec->output_offset
10886 + stub_entry->group->stub_sec->output_section->vma);
10887 size = 0;
10888 if (stub_entry->stub_type == ppc_stub_long_branch_both)
10889 size = 4;
10890 off += size;
10891 targ = (stub_entry->target_value
10892 + stub_entry->target_section->output_offset
10893 + stub_entry->target_section->output_section->vma);
10894 off = targ - off;
10895
3d58e1fc
AM
10896 if (info->emitrelocations)
10897 {
10898 stub_entry->group->stub_sec->reloc_count
10899 += num_relocs_for_offset (off);
10900 stub_entry->group->stub_sec->flags |= SEC_RELOC;
10901 }
10902
f891966f
AM
10903 extra = size_offset (off - 8);
10904 /* Include branch insn plus those in the offset sequence. */
10905 size += 4 + extra;
10906 /* The branch insn is at the end, or "extra" bytes along. So
10907 its offset will be "extra" bytes less that that already
10908 calculated. */
10909 off -= extra;
10910
10911 /* After the bcl, lr has been modified so we need to emit
10912 .eh_frame info saying the return address is in r12. */
10913 lr_used = stub_entry->stub_offset + 8;
10914 if (stub_entry->stub_type == ppc_stub_long_branch_both)
10915 lr_used += 4;
10916 /* The eh_frame info will consist of a DW_CFA_advance_loc or
10917 variant, DW_CFA_register, 65, 12, DW_CFA_advance_loc+2,
10918 DW_CFA_restore_extended 65. */
10919 delta = lr_used - stub_entry->group->lr_restore;
10920 stub_entry->group->eh_size += eh_advance_size (delta) + 6;
10921 stub_entry->group->lr_restore = lr_used + 8;
10922
10923 /* If the branch can't reach, use a plt_branch. */
10924 if (off + (1 << 25) >= (bfd_vma) (1 << 26))
10925 {
10926 stub_entry->stub_type += (ppc_stub_plt_branch_notoc
10927 - ppc_stub_long_branch_notoc);
10928 size += 4;
10929 }
3d58e1fc
AM
10930 else if (info->emitrelocations)
10931 stub_entry->group->stub_sec->reloc_count +=1;
f891966f
AM
10932 break;
10933
10934 case ppc_stub_plt_call_notoc:
10935 case ppc_stub_plt_call_both:
10936 off = (stub_entry->stub_offset
10937 + stub_entry->group->stub_sec->output_offset
10938 + stub_entry->group->stub_sec->output_section->vma);
10939 if (stub_entry->stub_type == ppc_stub_plt_call_both)
10940 off += 4;
10941 targ = stub_entry->plt_ent->plt.offset & ~1;
10942 if (targ >= (bfd_vma) -2)
10943 abort ();
10944
10945 plt = htab->elf.splt;
10946 if (!htab->elf.dynamic_sections_created
10947 || stub_entry->h == NULL
10948 || stub_entry->h->elf.dynindx == -1)
10949 {
10950 if (stub_entry->symtype == STT_GNU_IFUNC)
10951 plt = htab->elf.iplt;
10952 else
10953 plt = htab->pltlocal;
10954 }
10955 targ += plt->output_offset + plt->output_section->vma;
10956 off = targ - off;
10957
10958 if (htab->params->plt_stub_align != 0)
10959 {
10960 unsigned pad = plt_stub_pad (htab, stub_entry, off);
10961
10962 stub_entry->group->stub_sec->size += pad;
10963 stub_entry->stub_offset = stub_entry->group->stub_sec->size;
10964 off -= pad;
10965 }
10966
3d58e1fc
AM
10967 if (info->emitrelocations)
10968 {
10969 stub_entry->group->stub_sec->reloc_count
10970 += num_relocs_for_offset (off - 8);
10971 stub_entry->group->stub_sec->flags |= SEC_RELOC;
10972 }
10973
f891966f
AM
10974 size = plt_stub_size (htab, stub_entry, off);
10975
10976 /* After the bcl, lr has been modified so we need to emit
10977 .eh_frame info saying the return address is in r12. */
10978 lr_used = stub_entry->stub_offset + 8;
10979 if (stub_entry->stub_type == ppc_stub_plt_call_both)
10980 lr_used += 4;
10981 /* The eh_frame info will consist of a DW_CFA_advance_loc or
10982 variant, DW_CFA_register, 65, 12, DW_CFA_advance_loc+2,
10983 DW_CFA_restore_extended 65. */
10984 delta = lr_used - stub_entry->group->lr_restore;
10985 stub_entry->group->eh_size += eh_advance_size (delta) + 6;
10986 stub_entry->group->lr_restore = lr_used + 8;
10987 break;
10988
10989 case ppc_stub_plt_call:
10990 case ppc_stub_plt_call_r2save:
10991 targ = stub_entry->plt_ent->plt.offset & ~(bfd_vma) 1;
10992 if (targ >= (bfd_vma) -2)
10993 abort ();
10994 plt = htab->elf.splt;
10995 if (!htab->elf.dynamic_sections_created
10996 || stub_entry->h == NULL
10997 || stub_entry->h->elf.dynindx == -1)
10998 {
10999 if (stub_entry->symtype == STT_GNU_IFUNC)
11000 plt = htab->elf.iplt;
11001 else
11002 plt = htab->pltlocal;
11003 }
11004 targ += plt->output_offset + plt->output_section->vma;
11005
11006 off = (elf_gp (info->output_bfd)
11007 + htab->sec_info[stub_entry->group->link_sec->id].toc_off);
11008 off = targ - off;
11009
11010 if (htab->params->plt_stub_align != 0)
11011 {
11012 unsigned pad = plt_stub_pad (htab, stub_entry, off);
11013
11014 stub_entry->group->stub_sec->size += pad;
11015 stub_entry->stub_offset = stub_entry->group->stub_sec->size;
11016 }
11017
11018 if (info->emitrelocations)
11019 {
11020 stub_entry->group->stub_sec->reloc_count
11021 += ((PPC_HA (off) != 0)
11022 + (htab->opd_abi
11023 ? 2 + (htab->params->plt_static_chain
11024 && PPC_HA (off + 16) == PPC_HA (off))
11025 : 1));
11026 stub_entry->group->stub_sec->flags |= SEC_RELOC;
11027 }
11028
11029 size = plt_stub_size (htab, stub_entry, off);
11030
11031 if (stub_entry->h != NULL
11032 && (stub_entry->h == htab->tls_get_addr_fd
11033 || stub_entry->h == htab->tls_get_addr)
11034 && htab->params->tls_get_addr_opt
11035 && stub_entry->stub_type == ppc_stub_plt_call_r2save)
11036 {
11037 /* After the bctrl, lr has been modified so we need to
11038 emit .eh_frame info saying the return address is
11039 on the stack. In fact we put the EH info specifying
11040 that the return address is on the stack *at* the
11041 call rather than after it, because the EH info for a
11042 call needs to be specified by that point.
11043 See libgcc/unwind-dw2.c execute_cfa_program. */
11044 lr_used = stub_entry->stub_offset + size - 20;
11045 /* The eh_frame info will consist of a DW_CFA_advance_loc
11046 or variant, DW_CFA_offset_externed_sf, 65, -stackoff,
11047 DW_CFA_advance_loc+4, DW_CFA_restore_extended, 65. */
11048 delta = lr_used - stub_entry->group->lr_restore;
11049 stub_entry->group->eh_size += eh_advance_size (delta) + 6;
11050 stub_entry->group->lr_restore = size - 4;
11051 }
11052 break;
11053
11054 default:
11055 BFD_FAIL ();
11056 return FALSE;
721956f4
AM
11057 }
11058
6f20ed8a 11059 stub_entry->group->stub_sec->size += size;
b34976b6 11060 return TRUE;
721956f4
AM
11061}
11062
11063/* Set up various things so that we can make a list of input sections
11064 for each output section included in the link. Returns -1 on error,
cedb70c5 11065 0 when no stubs will be needed, and 1 on success. */
721956f4
AM
11066
11067int
e7d1c40c 11068ppc64_elf_setup_section_lists (struct bfd_link_info *info)
721956f4 11069{
6f20ed8a 11070 unsigned int id;
721956f4
AM
11071 bfd_size_type amt;
11072 struct ppc_link_hash_table *htab = ppc_hash_table (info);
11073
4dfe6ac6
NC
11074 if (htab == NULL)
11075 return -1;
4c52953f 11076
7cf7fcc8 11077 htab->sec_info_arr_size = _bfd_section_id;
6f20ed8a
AM
11078 amt = sizeof (*htab->sec_info) * (htab->sec_info_arr_size);
11079 htab->sec_info = bfd_zmalloc (amt);
11080 if (htab->sec_info == NULL)
721956f4
AM
11081 return -1;
11082
3d6f9012
AM
11083 /* Set toc_off for com, und, abs and ind sections. */
11084 for (id = 0; id < 3; id++)
6f20ed8a 11085 htab->sec_info[id].toc_off = TOC_BASE_OFF;
734b6cf9 11086
721956f4
AM
11087 return 1;
11088}
11089
927be08e
AM
11090/* Set up for first pass at multitoc partitioning. */
11091
11092void
11093ppc64_elf_start_multitoc_partition (struct bfd_link_info *info)
11094{
11095 struct ppc_link_hash_table *htab = ppc_hash_table (info);
11096
1c865ab2 11097 htab->toc_curr = ppc64_elf_set_toc (info, info->output_bfd);
927be08e
AM
11098 htab->toc_bfd = NULL;
11099 htab->toc_first_sec = NULL;
11100}
11101
e717da7e
AM
11102/* The linker repeatedly calls this function for each TOC input section
11103 and linker generated GOT section. Group input bfds such that the toc
927be08e 11104 within a group is less than 64k in size. */
ad8e1ba5 11105
927be08e 11106bfd_boolean
4ce794b7 11107ppc64_elf_next_toc_section (struct bfd_link_info *info, asection *isec)
ad8e1ba5
AM
11108{
11109 struct ppc_link_hash_table *htab = ppc_hash_table (info);
d77c8a4b 11110 bfd_vma addr, off, limit;
ad8e1ba5 11111
4dfe6ac6
NC
11112 if (htab == NULL)
11113 return FALSE;
11114
927be08e 11115 if (!htab->second_toc_pass)
4c52953f 11116 {
927be08e 11117 /* Keep track of the first .toc or .got section for this input bfd. */
a4fd3de5
AM
11118 bfd_boolean new_bfd = htab->toc_bfd != isec->owner;
11119
11120 if (new_bfd)
bf102f86
AM
11121 {
11122 htab->toc_bfd = isec->owner;
11123 htab->toc_first_sec = isec;
11124 }
927be08e 11125
bf102f86
AM
11126 addr = isec->output_offset + isec->output_section->vma;
11127 off = addr - htab->toc_curr;
d77c8a4b
AM
11128 limit = 0x80008000;
11129 if (ppc64_elf_tdata (isec->owner)->has_small_toc_reloc)
11130 limit = 0x10000;
11131 if (off + isec->size > limit)
bf102f86
AM
11132 {
11133 addr = (htab->toc_first_sec->output_offset
11134 + htab->toc_first_sec->output_section->vma);
11135 htab->toc_curr = addr;
a27e685f 11136 htab->toc_curr &= -TOC_BASE_ALIGN;
bf102f86 11137 }
99877b66 11138
927be08e
AM
11139 /* toc_curr is the base address of this toc group. Set elf_gp
11140 for the input section to be the offset relative to the
11141 output toc base plus 0x8000. Making the input elf_gp an
11142 offset allows us to move the toc as a whole without
11143 recalculating input elf_gp. */
06bcf541 11144 off = htab->toc_curr - elf_gp (info->output_bfd);
927be08e
AM
11145 off += TOC_BASE_OFF;
11146
11147 /* Die if someone uses a linker script that doesn't keep input
11148 file .toc and .got together. */
a4fd3de5
AM
11149 if (new_bfd
11150 && elf_gp (isec->owner) != 0
927be08e
AM
11151 && elf_gp (isec->owner) != off)
11152 return FALSE;
11153
11154 elf_gp (isec->owner) = off;
11155 return TRUE;
4c52953f 11156 }
927be08e
AM
11157
11158 /* During the second pass toc_first_sec points to the start of
11159 a toc group, and toc_curr is used to track the old elf_gp.
11160 We use toc_bfd to ensure we only look at each bfd once. */
11161 if (htab->toc_bfd == isec->owner)
11162 return TRUE;
11163 htab->toc_bfd = isec->owner;
11164
11165 if (htab->toc_first_sec == NULL
11166 || htab->toc_curr != elf_gp (isec->owner))
11167 {
11168 htab->toc_curr = elf_gp (isec->owner);
11169 htab->toc_first_sec = isec;
11170 }
11171 addr = (htab->toc_first_sec->output_offset
11172 + htab->toc_first_sec->output_section->vma);
06bcf541 11173 off = addr - elf_gp (info->output_bfd) + TOC_BASE_OFF;
927be08e
AM
11174 elf_gp (isec->owner) = off;
11175
11176 return TRUE;
ad8e1ba5
AM
11177}
11178
927be08e
AM
11179/* Called via elf_link_hash_traverse to merge GOT entries for global
11180 symbol H. */
11181
11182static bfd_boolean
11183merge_global_got (struct elf_link_hash_entry *h, void *inf ATTRIBUTE_UNUSED)
11184{
11185 if (h->root.type == bfd_link_hash_indirect)
11186 return TRUE;
11187
927be08e
AM
11188 merge_got_entries (&h->got.glist);
11189
11190 return TRUE;
11191}
11192
11193/* Called via elf_link_hash_traverse to allocate GOT entries for global
11194 symbol H. */
11195
11196static bfd_boolean
11197reallocate_got (struct elf_link_hash_entry *h, void *inf)
11198{
11199 struct got_entry *gent;
11200
11201 if (h->root.type == bfd_link_hash_indirect)
11202 return TRUE;
11203
927be08e
AM
11204 for (gent = h->got.glist; gent != NULL; gent = gent->next)
11205 if (!gent->is_indirect)
11206 allocate_got (h, (struct bfd_link_info *) inf, gent);
11207 return TRUE;
11208}
11209
11210/* Called on the first multitoc pass after the last call to
11211 ppc64_elf_next_toc_section. This function removes duplicate GOT
11212 entries. */
11213
11214bfd_boolean
11215ppc64_elf_layout_multitoc (struct bfd_link_info *info)
ad8e1ba5
AM
11216{
11217 struct ppc_link_hash_table *htab = ppc_hash_table (info);
927be08e
AM
11218 struct bfd *ibfd, *ibfd2;
11219 bfd_boolean done_something;
11220
11221 htab->multi_toc_needed = htab->toc_curr != elf_gp (info->output_bfd);
ad8e1ba5 11222
7865406b
AM
11223 if (!htab->do_multi_toc)
11224 return FALSE;
11225
d0fae19d 11226 /* Merge global sym got entries within a toc group. */
927be08e
AM
11227 elf_link_hash_traverse (&htab->elf, merge_global_got, info);
11228
11229 /* And tlsld_got. */
c72f2fb2 11230 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
927be08e
AM
11231 {
11232 struct got_entry *ent, *ent2;
11233
11234 if (!is_ppc64_elf (ibfd))
11235 continue;
11236
11237 ent = ppc64_tlsld_got (ibfd);
11238 if (!ent->is_indirect
11239 && ent->got.offset != (bfd_vma) -1)
11240 {
c72f2fb2 11241 for (ibfd2 = ibfd->link.next; ibfd2 != NULL; ibfd2 = ibfd2->link.next)
927be08e
AM
11242 {
11243 if (!is_ppc64_elf (ibfd2))
11244 continue;
11245
11246 ent2 = ppc64_tlsld_got (ibfd2);
11247 if (!ent2->is_indirect
11248 && ent2->got.offset != (bfd_vma) -1
11249 && elf_gp (ibfd2) == elf_gp (ibfd))
11250 {
11251 ent2->is_indirect = TRUE;
11252 ent2->got.ent = ent;
11253 }
11254 }
11255 }
11256 }
11257
11258 /* Zap sizes of got sections. */
33e44f2e
AM
11259 htab->elf.irelplt->rawsize = htab->elf.irelplt->size;
11260 htab->elf.irelplt->size -= htab->got_reli_size;
927be08e
AM
11261 htab->got_reli_size = 0;
11262
c72f2fb2 11263 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
927be08e
AM
11264 {
11265 asection *got, *relgot;
11266
11267 if (!is_ppc64_elf (ibfd))
11268 continue;
11269
11270 got = ppc64_elf_tdata (ibfd)->got;
11271 if (got != NULL)
11272 {
11273 got->rawsize = got->size;
11274 got->size = 0;
11275 relgot = ppc64_elf_tdata (ibfd)->relgot;
11276 relgot->rawsize = relgot->size;
11277 relgot->size = 0;
11278 }
11279 }
11280
11281 /* Now reallocate the got, local syms first. We don't need to
11282 allocate section contents again since we never increase size. */
c72f2fb2 11283 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
927be08e
AM
11284 {
11285 struct got_entry **lgot_ents;
11286 struct got_entry **end_lgot_ents;
11287 struct plt_entry **local_plt;
11288 struct plt_entry **end_local_plt;
f961d9dd 11289 unsigned char *lgot_masks;
927be08e
AM
11290 bfd_size_type locsymcount;
11291 Elf_Internal_Shdr *symtab_hdr;
19e08130 11292 asection *s;
927be08e
AM
11293
11294 if (!is_ppc64_elf (ibfd))
11295 continue;
11296
11297 lgot_ents = elf_local_got_ents (ibfd);
11298 if (!lgot_ents)
11299 continue;
11300
11301 symtab_hdr = &elf_symtab_hdr (ibfd);
11302 locsymcount = symtab_hdr->sh_info;
11303 end_lgot_ents = lgot_ents + locsymcount;
11304 local_plt = (struct plt_entry **) end_lgot_ents;
11305 end_local_plt = local_plt + locsymcount;
f961d9dd 11306 lgot_masks = (unsigned char *) end_local_plt;
927be08e 11307 s = ppc64_elf_tdata (ibfd)->got;
927be08e
AM
11308 for (; lgot_ents < end_lgot_ents; ++lgot_ents, ++lgot_masks)
11309 {
11310 struct got_entry *ent;
11311
11312 for (ent = *lgot_ents; ent != NULL; ent = ent->next)
d0fae19d 11313 {
19e08130
AM
11314 unsigned int ent_size = 8;
11315 unsigned int rel_size = sizeof (Elf64_External_Rela);
11316
d0fae19d
AM
11317 ent->got.offset = s->size;
11318 if ((ent->tls_type & *lgot_masks & TLS_GD) != 0)
d0fae19d 11319 {
19e08130
AM
11320 ent_size *= 2;
11321 rel_size *= 2;
11322 }
11323 s->size += ent_size;
37da22e5 11324 if ((*lgot_masks & (TLS_TLS | PLT_IFUNC)) == PLT_IFUNC)
19e08130 11325 {
33e44f2e 11326 htab->elf.irelplt->size += rel_size;
19e08130
AM
11327 htab->got_reli_size += rel_size;
11328 }
6a3858a6
AM
11329 else if (bfd_link_pic (info)
11330 && !((ent->tls_type & TLS_TPREL) != 0
11331 && bfd_link_executable (info)))
19e08130
AM
11332 {
11333 asection *srel = ppc64_elf_tdata (ibfd)->relgot;
11334 srel->size += rel_size;
d0fae19d
AM
11335 }
11336 }
927be08e
AM
11337 }
11338 }
11339
11340 elf_link_hash_traverse (&htab->elf, reallocate_got, info);
11341
c72f2fb2 11342 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
927be08e
AM
11343 {
11344 struct got_entry *ent;
11345
11346 if (!is_ppc64_elf (ibfd))
11347 continue;
11348
11349 ent = ppc64_tlsld_got (ibfd);
11350 if (!ent->is_indirect
11351 && ent->got.offset != (bfd_vma) -1)
11352 {
11353 asection *s = ppc64_elf_tdata (ibfd)->got;
11354 ent->got.offset = s->size;
11355 s->size += 16;
0e1862bb 11356 if (bfd_link_pic (info))
927be08e
AM
11357 {
11358 asection *srel = ppc64_elf_tdata (ibfd)->relgot;
11359 srel->size += sizeof (Elf64_External_Rela);
11360 }
11361 }
11362 }
11363
33e44f2e 11364 done_something = htab->elf.irelplt->rawsize != htab->elf.irelplt->size;
927be08e 11365 if (!done_something)
c72f2fb2 11366 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
927be08e
AM
11367 {
11368 asection *got;
11369
11370 if (!is_ppc64_elf (ibfd))
11371 continue;
11372
11373 got = ppc64_elf_tdata (ibfd)->got;
11374 if (got != NULL)
11375 {
11376 done_something = got->rawsize != got->size;
11377 if (done_something)
11378 break;
11379 }
11380 }
11381
11382 if (done_something)
e7d1c40c 11383 (*htab->params->layout_sections_again) ();
927be08e
AM
11384
11385 /* Set up for second pass over toc sections to recalculate elf_gp
11386 on input sections. */
11387 htab->toc_bfd = NULL;
11388 htab->toc_first_sec = NULL;
11389 htab->second_toc_pass = TRUE;
11390 return done_something;
11391}
11392
11393/* Called after second pass of multitoc partitioning. */
11394
11395void
11396ppc64_elf_finish_multitoc_partition (struct bfd_link_info *info)
11397{
11398 struct ppc_link_hash_table *htab = ppc_hash_table (info);
11399
11400 /* After the second pass, toc_curr tracks the TOC offset used
11401 for code sections below in ppc64_elf_next_input_section. */
3d6f9012 11402 htab->toc_curr = TOC_BASE_OFF;
ad8e1ba5
AM
11403}
11404
9b5ecbd0
AM
11405/* No toc references were found in ISEC. If the code in ISEC makes no
11406 calls, then there's no need to use toc adjusting stubs when branching
11407 into ISEC. Actually, indirect calls from ISEC are OK as they will
4c52953f
AM
11408 load r2. Returns -1 on error, 0 for no stub needed, 1 for stub
11409 needed, and 2 if a cyclical call-graph was found but no other reason
11410 for a stub was detected. If called from the top level, a return of
11411 2 means the same as a return of 0. */
9b5ecbd0
AM
11412
11413static int
4ce794b7 11414toc_adjusting_stub_needed (struct bfd_link_info *info, asection *isec)
9b5ecbd0 11415{
9b5ecbd0 11416 int ret;
70cc837d
AM
11417
11418 /* Mark this section as checked. */
11419 isec->call_check_done = 1;
9b5ecbd0 11420
772119ce
AM
11421 /* We know none of our code bearing sections will need toc stubs. */
11422 if ((isec->flags & SEC_LINKER_CREATED) != 0)
11423 return 0;
11424
eea6121a 11425 if (isec->size == 0)
082c50f8
AM
11426 return 0;
11427
4c52953f
AM
11428 if (isec->output_section == NULL)
11429 return 0;
11430
4c52953f 11431 ret = 0;
70cc837d 11432 if (isec->reloc_count != 0)
9b5ecbd0 11433 {
70cc837d
AM
11434 Elf_Internal_Rela *relstart, *rel;
11435 Elf_Internal_Sym *local_syms;
11436 struct ppc_link_hash_table *htab;
2917689a 11437
70cc837d
AM
11438 relstart = _bfd_elf_link_read_relocs (isec->owner, isec, NULL, NULL,
11439 info->keep_memory);
11440 if (relstart == NULL)
11441 return -1;
90aecf7a 11442
70cc837d
AM
11443 /* Look for branches to outside of this section. */
11444 local_syms = NULL;
11445 htab = ppc_hash_table (info);
11446 if (htab == NULL)
11447 return -1;
4c52953f 11448
70cc837d 11449 for (rel = relstart; rel < relstart + isec->reloc_count; ++rel)
4c52953f 11450 {
70cc837d
AM
11451 enum elf_ppc64_reloc_type r_type;
11452 unsigned long r_symndx;
11453 struct elf_link_hash_entry *h;
11454 struct ppc_link_hash_entry *eh;
11455 Elf_Internal_Sym *sym;
11456 asection *sym_sec;
11457 struct _opd_sec_data *opd;
11458 bfd_vma sym_value;
11459 bfd_vma dest;
11460
11461 r_type = ELF64_R_TYPE (rel->r_info);
11462 if (r_type != R_PPC64_REL24
05d0e962 11463 && r_type != R_PPC64_REL24_NOTOC
70cc837d
AM
11464 && r_type != R_PPC64_REL14
11465 && r_type != R_PPC64_REL14_BRTAKEN
23cedd1d
AM
11466 && r_type != R_PPC64_REL14_BRNTAKEN
11467 && r_type != R_PPC64_PLTCALL)
70cc837d 11468 continue;
4c52953f 11469
70cc837d
AM
11470 r_symndx = ELF64_R_SYM (rel->r_info);
11471 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms, r_symndx,
11472 isec->owner))
4c52953f 11473 {
70cc837d
AM
11474 ret = -1;
11475 break;
11476 }
4c52953f 11477
70cc837d
AM
11478 /* Calls to dynamic lib functions go through a plt call stub
11479 that uses r2. */
11480 eh = (struct ppc_link_hash_entry *) h;
11481 if (eh != NULL
11482 && (eh->elf.plt.plist != NULL
11483 || (eh->oh != NULL
11484 && ppc_follow_link (eh->oh)->elf.plt.plist != NULL)))
11485 {
11486 ret = 1;
11487 break;
4c52953f
AM
11488 }
11489
70cc837d
AM
11490 if (sym_sec == NULL)
11491 /* Ignore other undefined symbols. */
4c52953f 11492 continue;
4c52953f 11493
70cc837d
AM
11494 /* Assume branches to other sections not included in the
11495 link need stubs too, to cover -R and absolute syms. */
11496 if (sym_sec->output_section == NULL)
11497 {
11498 ret = 1;
11499 break;
11500 }
4c52953f 11501
70cc837d
AM
11502 if (h == NULL)
11503 sym_value = sym->st_value;
11504 else
11505 {
11506 if (h->root.type != bfd_link_hash_defined
11507 && h->root.type != bfd_link_hash_defweak)
11508 abort ();
11509 sym_value = h->root.u.def.value;
11510 }
11511 sym_value += rel->r_addend;
4c52953f 11512
70cc837d
AM
11513 /* If this branch reloc uses an opd sym, find the code section. */
11514 opd = get_opd_info (sym_sec);
11515 if (opd != NULL)
11516 {
11517 if (h == NULL && opd->adjust != NULL)
11518 {
11519 long adjust;
4c52953f 11520
92a9c616 11521 adjust = opd->adjust[OPD_NDX (sym_value)];
70cc837d
AM
11522 if (adjust == -1)
11523 /* Assume deleted functions won't ever be called. */
11524 continue;
11525 sym_value += adjust;
11526 }
4c52953f 11527
aef36ac1
AM
11528 dest = opd_entry_value (sym_sec, sym_value,
11529 &sym_sec, NULL, FALSE);
70cc837d
AM
11530 if (dest == (bfd_vma) -1)
11531 continue;
11532 }
11533 else
11534 dest = (sym_value
11535 + sym_sec->output_offset
11536 + sym_sec->output_section->vma);
4c52953f 11537
70cc837d
AM
11538 /* Ignore branch to self. */
11539 if (sym_sec == isec)
11540 continue;
4c52953f 11541
70cc837d
AM
11542 /* If the called function uses the toc, we need a stub. */
11543 if (sym_sec->has_toc_reloc
11544 || sym_sec->makes_toc_func_call)
4c52953f 11545 {
70cc837d 11546 ret = 1;
4c52953f
AM
11547 break;
11548 }
70cc837d
AM
11549
11550 /* Assume any branch that needs a long branch stub might in fact
11551 need a plt_branch stub. A plt_branch stub uses r2. */
11552 else if (dest - (isec->output_offset
11553 + isec->output_section->vma
6911b7dc
AM
11554 + rel->r_offset) + (1 << 25)
11555 >= (2u << 25) - PPC64_LOCAL_ENTRY_OFFSET (h
11556 ? h->other
11557 : sym->st_other))
4c52953f 11558 {
70cc837d
AM
11559 ret = 1;
11560 break;
11561 }
11562
11563 /* If calling back to a section in the process of being
11564 tested, we can't say for sure that no toc adjusting stubs
11565 are needed, so don't return zero. */
11566 else if (sym_sec->call_check_in_progress)
11567 ret = 2;
11568
11569 /* Branches to another section that itself doesn't have any TOC
11570 references are OK. Recursively call ourselves to check. */
11571 else if (!sym_sec->call_check_done)
11572 {
11573 int recur;
11574
11575 /* Mark current section as indeterminate, so that other
11576 sections that call back to current won't be marked as
11577 known. */
11578 isec->call_check_in_progress = 1;
11579 recur = toc_adjusting_stub_needed (info, sym_sec);
11580 isec->call_check_in_progress = 0;
11581
4c52953f
AM
11582 if (recur != 0)
11583 {
70cc837d
AM
11584 ret = recur;
11585 if (recur != 2)
11586 break;
4c52953f
AM
11587 }
11588 }
4c52953f 11589 }
70cc837d
AM
11590
11591 if (local_syms != NULL
11592 && (elf_symtab_hdr (isec->owner).contents
11593 != (unsigned char *) local_syms))
11594 free (local_syms);
11595 if (elf_section_data (isec)->relocs != relstart)
11596 free (relstart);
9b5ecbd0
AM
11597 }
11598
70cc837d
AM
11599 if ((ret & 1) == 0
11600 && isec->map_head.s != NULL
11601 && (strcmp (isec->output_section->name, ".init") == 0
11602 || strcmp (isec->output_section->name, ".fini") == 0))
11603 {
11604 if (isec->map_head.s->has_toc_reloc
11605 || isec->map_head.s->makes_toc_func_call)
11606 ret = 1;
11607 else if (!isec->map_head.s->call_check_done)
11608 {
11609 int recur;
11610 isec->call_check_in_progress = 1;
11611 recur = toc_adjusting_stub_needed (info, isec->map_head.s);
11612 isec->call_check_in_progress = 0;
11613 if (recur != 0)
11614 ret = recur;
11615 }
11616 }
11617
11618 if (ret == 1)
11619 isec->makes_toc_func_call = 1;
4c52953f 11620
9b5ecbd0
AM
11621 return ret;
11622}
11623
721956f4
AM
11624/* The linker repeatedly calls this function for each input section,
11625 in the order that input sections are linked into output sections.
11626 Build lists of input sections to determine groupings between which
11627 we may insert linker stubs. */
11628
9b5ecbd0 11629bfd_boolean
4ce794b7 11630ppc64_elf_next_input_section (struct bfd_link_info *info, asection *isec)
721956f4
AM
11631{
11632 struct ppc_link_hash_table *htab = ppc_hash_table (info);
11633
4dfe6ac6
NC
11634 if (htab == NULL)
11635 return FALSE;
11636
734b6cf9 11637 if ((isec->output_section->flags & SEC_CODE) != 0
6f20ed8a 11638 && isec->output_section->id < htab->sec_info_arr_size)
721956f4 11639 {
3d6f9012
AM
11640 /* This happens to make the list in reverse order,
11641 which is what we want. */
6f20ed8a
AM
11642 htab->sec_info[isec->id].u.list
11643 = htab->sec_info[isec->output_section->id].u.list;
11644 htab->sec_info[isec->output_section->id].u.list = isec;
721956f4 11645 }
ad8e1ba5 11646
4c52953f 11647 if (htab->multi_toc_needed)
9b5ecbd0 11648 {
8b974ba3
AM
11649 /* Analyse sections that aren't already flagged as needing a
11650 valid toc pointer. Exclude .fixup for the linux kernel.
11651 .fixup contains branches, but only back to the function that
11652 hit an exception. */
11653 if (!(isec->has_toc_reloc
11654 || (isec->flags & SEC_CODE) == 0
11655 || strcmp (isec->name, ".fixup") == 0
11656 || isec->call_check_done))
11657 {
11658 if (toc_adjusting_stub_needed (info, isec) < 0)
6683a28d 11659 return FALSE;
8b974ba3
AM
11660 }
11661 /* Make all sections use the TOC assigned for this object file.
11662 This will be wrong for pasted sections; We fix that in
11663 check_pasted_section(). */
11664 if (elf_gp (isec->owner) != 0)
11665 htab->toc_curr = elf_gp (isec->owner);
11666 }
11667
6f20ed8a 11668 htab->sec_info[isec->id].toc_off = htab->toc_curr;
9b5ecbd0 11669 return TRUE;
721956f4
AM
11670}
11671
70cc837d
AM
11672/* Check that all .init and .fini sections use the same toc, if they
11673 have toc relocs. */
11674
11675static bfd_boolean
11676check_pasted_section (struct bfd_link_info *info, const char *name)
11677{
11678 asection *o = bfd_get_section_by_name (info->output_bfd, name);
11679
11680 if (o != NULL)
11681 {
11682 struct ppc_link_hash_table *htab = ppc_hash_table (info);
11683 bfd_vma toc_off = 0;
11684 asection *i;
11685
11686 for (i = o->map_head.s; i != NULL; i = i->map_head.s)
11687 if (i->has_toc_reloc)
11688 {
11689 if (toc_off == 0)
6f20ed8a
AM
11690 toc_off = htab->sec_info[i->id].toc_off;
11691 else if (toc_off != htab->sec_info[i->id].toc_off)
70cc837d
AM
11692 return FALSE;
11693 }
6683a28d
AM
11694
11695 if (toc_off == 0)
11696 for (i = o->map_head.s; i != NULL; i = i->map_head.s)
11697 if (i->makes_toc_func_call)
11698 {
6f20ed8a 11699 toc_off = htab->sec_info[i->id].toc_off;
6683a28d
AM
11700 break;
11701 }
11702
70cc837d
AM
11703 /* Make sure the whole pasted function uses the same toc offset. */
11704 if (toc_off != 0)
11705 for (i = o->map_head.s; i != NULL; i = i->map_head.s)
6f20ed8a 11706 htab->sec_info[i->id].toc_off = toc_off;
70cc837d
AM
11707 }
11708 return TRUE;
11709}
11710
11711bfd_boolean
11712ppc64_elf_check_init_fini (struct bfd_link_info *info)
11713{
11714 return (check_pasted_section (info, ".init")
11715 & check_pasted_section (info, ".fini"));
11716}
11717
721956f4
AM
11718/* See whether we can group stub sections together. Grouping stub
11719 sections may result in fewer stubs. More importantly, we need to
11720 put all .init* and .fini* stubs at the beginning of the .init or
11721 .fini output sections respectively, because glibc splits the
11722 _init and _fini functions into multiple parts. Putting a stub in
11723 the middle of a function is not a good idea. */
11724
6f20ed8a
AM
11725static bfd_boolean
11726group_sections (struct bfd_link_info *info,
4ce794b7
AM
11727 bfd_size_type stub_group_size,
11728 bfd_boolean stubs_always_before_branch)
721956f4 11729{
6f20ed8a
AM
11730 struct ppc_link_hash_table *htab;
11731 asection *osec;
7c8fe5c4
AM
11732 bfd_boolean suppress_size_errors;
11733
6f20ed8a
AM
11734 htab = ppc_hash_table (info);
11735 if (htab == NULL)
11736 return FALSE;
11737
7c8fe5c4 11738 suppress_size_errors = FALSE;
7c8fe5c4
AM
11739 if (stub_group_size == 1)
11740 {
11741 /* Default values. */
11742 if (stubs_always_before_branch)
09f92717 11743 stub_group_size = 0x1e00000;
7c8fe5c4 11744 else
09f92717 11745 stub_group_size = 0x1c00000;
7c8fe5c4
AM
11746 suppress_size_errors = TRUE;
11747 }
11748
6f20ed8a 11749 for (osec = info->output_bfd->sections; osec != NULL; osec = osec->next)
721956f4 11750 {
6f20ed8a
AM
11751 asection *tail;
11752
11753 if (osec->id >= htab->sec_info_arr_size)
11754 continue;
11755
11756 tail = htab->sec_info[osec->id].u.list;
734b6cf9 11757 while (tail != NULL)
721956f4 11758 {
734b6cf9
AM
11759 asection *curr;
11760 asection *prev;
11761 bfd_size_type total;
11762 bfd_boolean big_sec;
11763 bfd_vma curr_toc;
6f20ed8a 11764 struct map_stub *group;
09f92717 11765 bfd_size_type group_size;
734b6cf9
AM
11766
11767 curr = tail;
eea6121a 11768 total = tail->size;
09f92717
AM
11769 group_size = (ppc64_elf_section_data (tail) != NULL
11770 && ppc64_elf_section_data (tail)->has_14bit_branch
11771 ? stub_group_size >> 10 : stub_group_size);
11772
11773 big_sec = total > group_size;
7c8fe5c4 11774 if (big_sec && !suppress_size_errors)
695344c0 11775 /* xgettext:c-format */
871b3ab2 11776 _bfd_error_handler (_("%pB section %pA exceeds stub group size"),
4eca0228 11777 tail->owner, tail);
6f20ed8a 11778 curr_toc = htab->sec_info[tail->id].toc_off;
734b6cf9 11779
6f20ed8a 11780 while ((prev = htab->sec_info[curr->id].u.list) != NULL
734b6cf9 11781 && ((total += curr->output_offset - prev->output_offset)
6bee8834
AM
11782 < (ppc64_elf_section_data (prev) != NULL
11783 && ppc64_elf_section_data (prev)->has_14bit_branch
09f92717 11784 ? (group_size = stub_group_size >> 10) : group_size))
6f20ed8a 11785 && htab->sec_info[prev->id].toc_off == curr_toc)
734b6cf9
AM
11786 curr = prev;
11787
11788 /* OK, the size from the start of CURR to the end is less
09f92717 11789 than group_size and thus can be handled by one stub
734b6cf9 11790 section. (or the tail section is itself larger than
09f92717
AM
11791 group_size, in which case we may be toast.) We should
11792 really be keeping track of the total size of stubs added
11793 here, as stubs contribute to the final output section
11794 size. That's a little tricky, and this way will only
11795 break if stubs added make the total size more than 2^25,
11796 ie. for the default stub_group_size, if stubs total more
11797 than 2097152 bytes, or nearly 75000 plt call stubs. */
6f20ed8a
AM
11798 group = bfd_alloc (curr->owner, sizeof (*group));
11799 if (group == NULL)
11800 return FALSE;
11801 group->link_sec = curr;
11802 group->stub_sec = NULL;
a4b6fadd 11803 group->needs_save_res = 0;
df136d64
AM
11804 group->lr_restore = 0;
11805 group->eh_size = 0;
11806 group->eh_base = 0;
a4b6fadd
AM
11807 group->next = htab->group;
11808 htab->group = group;
734b6cf9 11809 do
721956f4 11810 {
6f20ed8a 11811 prev = htab->sec_info[tail->id].u.list;
734b6cf9 11812 /* Set up this stub group. */
6f20ed8a 11813 htab->sec_info[tail->id].u.group = group;
721956f4 11814 }
734b6cf9
AM
11815 while (tail != curr && (tail = prev) != NULL);
11816
09f92717 11817 /* But wait, there's more! Input sections up to group_size
734b6cf9
AM
11818 bytes before the stub section can be handled by it too.
11819 Don't do this if we have a really large section after the
11820 stubs, as adding more stubs increases the chance that
11821 branches may not reach into the stub section. */
11822 if (!stubs_always_before_branch && !big_sec)
11823 {
11824 total = 0;
11825 while (prev != NULL
11826 && ((total += tail->output_offset - prev->output_offset)
6bee8834
AM
11827 < (ppc64_elf_section_data (prev) != NULL
11828 && ppc64_elf_section_data (prev)->has_14bit_branch
2cdcc330
AM
11829 ? (group_size = stub_group_size >> 10)
11830 : group_size))
6f20ed8a 11831 && htab->sec_info[prev->id].toc_off == curr_toc)
734b6cf9
AM
11832 {
11833 tail = prev;
6f20ed8a
AM
11834 prev = htab->sec_info[tail->id].u.list;
11835 htab->sec_info[tail->id].u.group = group;
734b6cf9
AM
11836 }
11837 }
11838 tail = prev;
721956f4
AM
11839 }
11840 }
6f20ed8a 11841 return TRUE;
721956f4
AM
11842}
11843
58d180e8
AM
11844static const unsigned char glink_eh_frame_cie[] =
11845{
11846 0, 0, 0, 16, /* length. */
11847 0, 0, 0, 0, /* id. */
11848 1, /* CIE version. */
11849 'z', 'R', 0, /* Augmentation string. */
11850 4, /* Code alignment. */
11851 0x78, /* Data alignment. */
11852 65, /* RA reg. */
11853 1, /* Augmentation size. */
11854 DW_EH_PE_pcrel | DW_EH_PE_sdata4, /* FDE encoding. */
2e0ce1c8 11855 DW_CFA_def_cfa, 1, 0 /* def_cfa: r1 offset 0. */
58d180e8
AM
11856};
11857
d969d15f
AM
11858/* Stripping output sections is normally done before dynamic section
11859 symbols have been allocated. This function is called later, and
11860 handles cases like htab->brlt which is mapped to its own output
11861 section. */
11862
11863static void
11864maybe_strip_output (struct bfd_link_info *info, asection *isec)
11865{
11866 if (isec->size == 0
11867 && isec->output_section->size == 0
53d8967a 11868 && !(isec->output_section->flags & SEC_KEEP)
d969d15f
AM
11869 && !bfd_section_removed_from_list (info->output_bfd,
11870 isec->output_section)
11871 && elf_section_data (isec->output_section)->dynindx == 0)
11872 {
11873 isec->output_section->flags |= SEC_EXCLUDE;
11874 bfd_section_list_remove (info->output_bfd, isec->output_section);
11875 info->output_bfd->section_count--;
11876 }
11877}
11878
721956f4
AM
11879/* Determine and set the size of the stub section for a final link.
11880
11881 The basic idea here is to examine all the relocations looking for
11882 PC-relative calls to a target that is unreachable with a "bl"
11883 instruction. */
11884
b34976b6 11885bfd_boolean
e7d1c40c 11886ppc64_elf_size_stubs (struct bfd_link_info *info)
721956f4
AM
11887{
11888 bfd_size_type stub_group_size;
b34976b6 11889 bfd_boolean stubs_always_before_branch;
721956f4
AM
11890 struct ppc_link_hash_table *htab = ppc_hash_table (info);
11891
4dfe6ac6
NC
11892 if (htab == NULL)
11893 return FALSE;
11894
0e1862bb 11895 if (htab->params->plt_thread_safe == -1 && !bfd_link_executable (info))
e7d1c40c 11896 htab->params->plt_thread_safe = 1;
b9e5796b 11897 if (!htab->opd_abi)
e7d1c40c
AM
11898 htab->params->plt_thread_safe = 0;
11899 else if (htab->params->plt_thread_safe == -1)
794e51c0 11900 {
e2458743 11901 static const char *const thread_starter[] =
794e51c0
AM
11902 {
11903 "pthread_create",
11904 /* libstdc++ */
11905 "_ZNSt6thread15_M_start_threadESt10shared_ptrINS_10_Impl_baseEE",
11906 /* librt */
11907 "aio_init", "aio_read", "aio_write", "aio_fsync", "lio_listio",
11908 "mq_notify", "create_timer",
11909 /* libanl */
11910 "getaddrinfo_a",
11911 /* libgomp */
2300b5a1 11912 "GOMP_parallel",
794e51c0 11913 "GOMP_parallel_start",
2300b5a1 11914 "GOMP_parallel_loop_static",
794e51c0 11915 "GOMP_parallel_loop_static_start",
2300b5a1 11916 "GOMP_parallel_loop_dynamic",
794e51c0 11917 "GOMP_parallel_loop_dynamic_start",
2300b5a1 11918 "GOMP_parallel_loop_guided",
794e51c0 11919 "GOMP_parallel_loop_guided_start",
2300b5a1 11920 "GOMP_parallel_loop_runtime",
794e51c0 11921 "GOMP_parallel_loop_runtime_start",
2300b5a1 11922 "GOMP_parallel_sections",
68ffbac6 11923 "GOMP_parallel_sections_start",
f9dffbf0
AM
11924 /* libgo */
11925 "__go_go",
794e51c0
AM
11926 };
11927 unsigned i;
11928
a4b6fadd 11929 for (i = 0; i < ARRAY_SIZE (thread_starter); i++)
794e51c0
AM
11930 {
11931 struct elf_link_hash_entry *h;
11932 h = elf_link_hash_lookup (&htab->elf, thread_starter[i],
11933 FALSE, FALSE, TRUE);
e7d1c40c
AM
11934 htab->params->plt_thread_safe = h != NULL && h->ref_regular;
11935 if (htab->params->plt_thread_safe)
794e51c0
AM
11936 break;
11937 }
11938 }
e7d1c40c
AM
11939 stubs_always_before_branch = htab->params->group_size < 0;
11940 if (htab->params->group_size < 0)
11941 stub_group_size = -htab->params->group_size;
721956f4 11942 else
e7d1c40c 11943 stub_group_size = htab->params->group_size;
721956f4 11944
6f20ed8a
AM
11945 if (!group_sections (info, stub_group_size, stubs_always_before_branch))
11946 return FALSE;
721956f4 11947
c9301e31
AM
11948#define STUB_SHRINK_ITER 20
11949 /* Loop until no stubs added. After iteration 20 of this loop we may
11950 exit on a stub section shrinking. This is to break out of a
11951 pathological case where adding stubs on one iteration decreases
11952 section gaps (perhaps due to alignment), which then requires
11953 fewer or smaller stubs on the next iteration. */
11954
721956f4
AM
11955 while (1)
11956 {
11957 bfd *input_bfd;
11958 unsigned int bfd_indx;
a4b6fadd 11959 struct map_stub *group;
721956f4
AM
11960
11961 htab->stub_iteration += 1;
721956f4
AM
11962
11963 for (input_bfd = info->input_bfds, bfd_indx = 0;
11964 input_bfd != NULL;
c72f2fb2 11965 input_bfd = input_bfd->link.next, bfd_indx++)
721956f4
AM
11966 {
11967 Elf_Internal_Shdr *symtab_hdr;
11968 asection *section;
6cdc0ccc 11969 Elf_Internal_Sym *local_syms = NULL;
721956f4 11970
0c8d6e5c 11971 if (!is_ppc64_elf (input_bfd))
67f93c31
AM
11972 continue;
11973
721956f4 11974 /* We'll need the symbol table in a second. */
0ffa91dd 11975 symtab_hdr = &elf_symtab_hdr (input_bfd);
721956f4
AM
11976 if (symtab_hdr->sh_info == 0)
11977 continue;
11978
721956f4
AM
11979 /* Walk over each section attached to the input bfd. */
11980 for (section = input_bfd->sections;
11981 section != NULL;
11982 section = section->next)
11983 {
721956f4 11984 Elf_Internal_Rela *internal_relocs, *irelaend, *irela;
721956f4
AM
11985
11986 /* If there aren't any relocs, then there's nothing more
11987 to do. */
11988 if ((section->flags & SEC_RELOC) == 0
12c0f757
AM
11989 || (section->flags & SEC_ALLOC) == 0
11990 || (section->flags & SEC_LOAD) == 0
11991 || (section->flags & SEC_CODE) == 0
721956f4
AM
11992 || section->reloc_count == 0)
11993 continue;
11994
11995 /* If this section is a link-once section that will be
11996 discarded, then don't create any stubs. */
11997 if (section->output_section == NULL
927be08e 11998 || section->output_section->owner != info->output_bfd)
721956f4
AM
11999 continue;
12000
1e2f5b6e
AM
12001 /* Get the relocs. */
12002 internal_relocs
4ce794b7 12003 = _bfd_elf_link_read_relocs (input_bfd, section, NULL, NULL,
45d6a902 12004 info->keep_memory);
721956f4 12005 if (internal_relocs == NULL)
1e2f5b6e 12006 goto error_ret_free_local;
721956f4
AM
12007
12008 /* Now examine each relocation. */
12009 irela = internal_relocs;
12010 irelaend = irela + section->reloc_count;
12011 for (; irela < irelaend; irela++)
12012 {
4ce794b7
AM
12013 enum elf_ppc64_reloc_type r_type;
12014 unsigned int r_indx;
721956f4
AM
12015 enum ppc_stub_type stub_type;
12016 struct ppc_stub_hash_entry *stub_entry;
8387904d 12017 asection *sym_sec, *code_sec;
e054468f 12018 bfd_vma sym_value, code_value;
721956f4 12019 bfd_vma destination;
6911b7dc 12020 unsigned long local_off;
8843416a 12021 bfd_boolean ok_dest;
721956f4 12022 struct ppc_link_hash_entry *hash;
8387904d 12023 struct ppc_link_hash_entry *fdh;
411e1bfb
AM
12024 struct elf_link_hash_entry *h;
12025 Elf_Internal_Sym *sym;
721956f4
AM
12026 char *stub_name;
12027 const asection *id_sec;
74f0fb50 12028 struct _opd_sec_data *opd;
e054468f 12029 struct plt_entry *plt_ent;
721956f4
AM
12030
12031 r_type = ELF64_R_TYPE (irela->r_info);
12032 r_indx = ELF64_R_SYM (irela->r_info);
12033
4ce794b7 12034 if (r_type >= R_PPC64_max)
721956f4
AM
12035 {
12036 bfd_set_error (bfd_error_bad_value);
6cdc0ccc 12037 goto error_ret_free_internal;
721956f4
AM
12038 }
12039
12040 /* Only look for stubs on branch instructions. */
4ce794b7 12041 if (r_type != R_PPC64_REL24
05d0e962 12042 && r_type != R_PPC64_REL24_NOTOC
4ce794b7
AM
12043 && r_type != R_PPC64_REL14
12044 && r_type != R_PPC64_REL14_BRTAKEN
12045 && r_type != R_PPC64_REL14_BRNTAKEN)
721956f4
AM
12046 continue;
12047
12048 /* Now determine the call target, its name, value,
12049 section. */
411e1bfb
AM
12050 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms,
12051 r_indx, input_bfd))
12052 goto error_ret_free_internal;
12053 hash = (struct ppc_link_hash_entry *) h;
12054
8843416a 12055 ok_dest = FALSE;
8387904d 12056 fdh = NULL;
7fe2b9a6 12057 sym_value = 0;
411e1bfb 12058 if (hash == NULL)
721956f4 12059 {
411e1bfb 12060 sym_value = sym->st_value;
c27b8c2a
AM
12061 if (sym_sec != NULL
12062 && sym_sec->output_section != NULL)
12063 ok_dest = TRUE;
721956f4 12064 }
7fe2b9a6
AM
12065 else if (hash->elf.root.type == bfd_link_hash_defined
12066 || hash->elf.root.type == bfd_link_hash_defweak)
12067 {
12068 sym_value = hash->elf.root.u.def.value;
12069 if (sym_sec->output_section != NULL)
12070 ok_dest = TRUE;
12071 }
12072 else if (hash->elf.root.type == bfd_link_hash_undefweak
12073 || hash->elf.root.type == bfd_link_hash_undefined)
721956f4 12074 {
99877b66 12075 /* Recognise an old ABI func code entry sym, and
7fe2b9a6
AM
12076 use the func descriptor sym instead if it is
12077 defined. */
ceb1f1ef 12078 if (hash->elf.root.root.string[0] == '.'
8c5b4e52 12079 && hash->oh != NULL)
8387904d 12080 {
8c5b4e52 12081 fdh = ppc_follow_link (hash->oh);
8387904d
AM
12082 if (fdh->elf.root.type == bfd_link_hash_defined
12083 || fdh->elf.root.type == bfd_link_hash_defweak)
12084 {
12085 sym_sec = fdh->elf.root.u.def.section;
12086 sym_value = fdh->elf.root.u.def.value;
12087 if (sym_sec->output_section != NULL)
12088 ok_dest = TRUE;
12089 }
99877b66
AM
12090 else
12091 fdh = NULL;
8387904d 12092 }
7fe2b9a6
AM
12093 }
12094 else
12095 {
12096 bfd_set_error (bfd_error_bad_value);
12097 goto error_ret_free_internal;
721956f4
AM
12098 }
12099
8843416a 12100 destination = 0;
6911b7dc 12101 local_off = 0;
8843416a
AM
12102 if (ok_dest)
12103 {
12104 sym_value += irela->r_addend;
12105 destination = (sym_value
12106 + sym_sec->output_offset
12107 + sym_sec->output_section->vma);
6911b7dc
AM
12108 local_off = PPC64_LOCAL_ENTRY_OFFSET (hash
12109 ? hash->elf.other
12110 : sym->st_other);
8843416a
AM
12111 }
12112
8387904d 12113 code_sec = sym_sec;
e054468f 12114 code_value = sym_value;
74f0fb50
AM
12115 opd = get_opd_info (sym_sec);
12116 if (opd != NULL)
8387904d
AM
12117 {
12118 bfd_vma dest;
12119
74f0fb50 12120 if (hash == NULL && opd->adjust != NULL)
8387904d 12121 {
51aecdc5 12122 long adjust = opd->adjust[OPD_NDX (sym_value)];
8387904d
AM
12123 if (adjust == -1)
12124 continue;
e054468f 12125 code_value += adjust;
8387904d
AM
12126 sym_value += adjust;
12127 }
12128 dest = opd_entry_value (sym_sec, sym_value,
aef36ac1 12129 &code_sec, &code_value, FALSE);
8387904d
AM
12130 if (dest != (bfd_vma) -1)
12131 {
12132 destination = dest;
12133 if (fdh != NULL)
12134 {
12135 /* Fixup old ABI sym to point at code
12136 entry. */
99877b66 12137 hash->elf.root.type = bfd_link_hash_defweak;
8387904d 12138 hash->elf.root.u.def.section = code_sec;
e054468f 12139 hash->elf.root.u.def.value = code_value;
8387904d
AM
12140 }
12141 }
12142 }
12143
721956f4 12144 /* Determine what (if any) linker stub is needed. */
e054468f 12145 plt_ent = NULL;
721956f4 12146 stub_type = ppc_type_of_stub (section, irela, &hash,
6911b7dc
AM
12147 &plt_ent, destination,
12148 local_off);
ad8e1ba5 12149
05d0e962
AM
12150 if (r_type == R_PPC64_REL24_NOTOC)
12151 {
12152 if (stub_type == ppc_stub_plt_call)
12153 stub_type = ppc_stub_plt_call_notoc;
12154 else if (stub_type == ppc_stub_long_branch
12155 || (code_sec != NULL
12156 && code_sec->output_section != NULL
12157 && (((hash ? hash->elf.other : sym->st_other)
12158 & STO_PPC64_LOCAL_MASK)
12159 != 1 << STO_PPC64_LOCAL_BIT)))
12160 stub_type = ppc_stub_long_branch_notoc;
12161 }
12162 else if (stub_type != ppc_stub_plt_call)
ad8e1ba5
AM
12163 {
12164 /* Check whether we need a TOC adjusting stub.
12165 Since the linker pastes together pieces from
12166 different object files when creating the
12167 _init and _fini functions, it may be that a
12168 call to what looks like a local sym is in
12169 fact a call needing a TOC adjustment. */
33cb30a1
AM
12170 if ((code_sec != NULL
12171 && code_sec->output_section != NULL
12172 && (htab->sec_info[code_sec->id].toc_off
12173 != htab->sec_info[section->id].toc_off)
12174 && (code_sec->has_toc_reloc
12175 || code_sec->makes_toc_func_call))
12176 || (((hash ? hash->elf.other : sym->st_other)
12177 & STO_PPC64_LOCAL_MASK)
12178 == 1 << STO_PPC64_LOCAL_BIT))
ad8e1ba5
AM
12179 stub_type = ppc_stub_long_branch_r2off;
12180 }
12181
721956f4
AM
12182 if (stub_type == ppc_stub_none)
12183 continue;
12184
411e1bfb
AM
12185 /* __tls_get_addr calls might be eliminated. */
12186 if (stub_type != ppc_stub_plt_call
05d0e962 12187 && stub_type != ppc_stub_plt_call_notoc
411e1bfb 12188 && hash != NULL
8387904d
AM
12189 && (hash == htab->tls_get_addr
12190 || hash == htab->tls_get_addr_fd)
411e1bfb
AM
12191 && section->has_tls_reloc
12192 && irela != internal_relocs)
12193 {
12194 /* Get tls info. */
f961d9dd 12195 unsigned char *tls_mask;
411e1bfb 12196
3a71aa26 12197 if (!get_tls_mask (&tls_mask, NULL, NULL, &local_syms,
411e1bfb
AM
12198 irela - 1, input_bfd))
12199 goto error_ret_free_internal;
37da22e5 12200 if ((*tls_mask & TLS_TLS) != 0)
411e1bfb
AM
12201 continue;
12202 }
12203
f378ab09 12204 if (stub_type == ppc_stub_plt_call)
794e51c0 12205 {
6e1816be
AM
12206 if (!htab->opd_abi
12207 && htab->params->plt_localentry0 != 0
12208 && is_elfv2_localentry0 (&hash->elf))
12209 htab->has_plt_localentry0 = 1;
12210 else if (irela + 1 < irelaend
12211 && irela[1].r_offset == irela->r_offset + 4
12212 && (ELF64_R_TYPE (irela[1].r_info)
12213 == R_PPC64_TOCSAVE))
f378ab09
AM
12214 {
12215 if (!tocsave_find (htab, INSERT,
12216 &local_syms, irela + 1, input_bfd))
12217 goto error_ret_free_internal;
12218 }
f378ab09
AM
12219 else
12220 stub_type = ppc_stub_plt_call_r2save;
794e51c0 12221 }
3b421ab3 12222
721956f4 12223 /* Support for grouping stub sections. */
6f20ed8a 12224 id_sec = htab->sec_info[section->id].u.group->link_sec;
721956f4
AM
12225
12226 /* Get the name of this stub. */
12227 stub_name = ppc_stub_name (id_sec, sym_sec, hash, irela);
12228 if (!stub_name)
12229 goto error_ret_free_internal;
12230
12231 stub_entry = ppc_stub_hash_lookup (&htab->stub_hash_table,
b34976b6 12232 stub_name, FALSE, FALSE);
721956f4
AM
12233 if (stub_entry != NULL)
12234 {
05d0e962
AM
12235 enum ppc_stub_type old_type;
12236 /* A stub has already been created, but it may
12237 not be the required type. We shouldn't be
12238 transitioning from plt_call to long_branch
12239 stubs or vice versa, but we might be
12240 upgrading from plt_call to plt_call_r2save or
12241 from long_branch to long_branch_r2off. */
721956f4 12242 free (stub_name);
05d0e962
AM
12243 old_type = stub_entry->stub_type;
12244 switch (old_type)
12245 {
12246 default:
12247 abort ();
12248
12249 case ppc_stub_save_res:
12250 continue;
12251
12252 case ppc_stub_plt_call:
12253 case ppc_stub_plt_call_r2save:
12254 case ppc_stub_plt_call_notoc:
12255 case ppc_stub_plt_call_both:
12256 if (stub_type == ppc_stub_plt_call)
12257 continue;
12258 else if (stub_type == ppc_stub_plt_call_r2save)
12259 {
12260 if (old_type == ppc_stub_plt_call_notoc)
12261 stub_type = ppc_stub_plt_call_both;
12262 }
12263 else if (stub_type == ppc_stub_plt_call_notoc)
12264 {
12265 if (old_type == ppc_stub_plt_call_r2save)
12266 stub_type = ppc_stub_plt_call_both;
12267 }
12268 else
12269 abort ();
12270 break;
12271
12272 case ppc_stub_plt_branch:
12273 case ppc_stub_plt_branch_r2off:
12274 case ppc_stub_plt_branch_notoc:
12275 case ppc_stub_plt_branch_both:
12276 old_type += (ppc_stub_long_branch
12277 - ppc_stub_plt_branch);
12278 /* Fall through. */
12279 case ppc_stub_long_branch:
12280 case ppc_stub_long_branch_r2off:
12281 case ppc_stub_long_branch_notoc:
12282 case ppc_stub_long_branch_both:
12283 if (stub_type == ppc_stub_long_branch)
12284 continue;
12285 else if (stub_type == ppc_stub_long_branch_r2off)
12286 {
12287 if (old_type == ppc_stub_long_branch_notoc)
12288 stub_type = ppc_stub_long_branch_both;
12289 }
12290 else if (stub_type == ppc_stub_long_branch_notoc)
12291 {
12292 if (old_type == ppc_stub_long_branch_r2off)
12293 stub_type = ppc_stub_long_branch_both;
12294 }
12295 else
12296 abort ();
12297 break;
12298 }
12299 if (old_type < stub_type)
794e51c0 12300 stub_entry->stub_type = stub_type;
721956f4
AM
12301 continue;
12302 }
12303
25f53a85 12304 stub_entry = ppc_add_stub (stub_name, section, info);
721956f4
AM
12305 if (stub_entry == NULL)
12306 {
12307 free (stub_name);
6cdc0ccc
AM
12308 error_ret_free_internal:
12309 if (elf_section_data (section)->relocs == NULL)
12310 free (internal_relocs);
12311 error_ret_free_local:
12312 if (local_syms != NULL
12313 && (symtab_hdr->contents
12314 != (unsigned char *) local_syms))
12315 free (local_syms);
b34976b6 12316 return FALSE;
721956f4
AM
12317 }
12318
ad8e1ba5 12319 stub_entry->stub_type = stub_type;
05d0e962
AM
12320 if (stub_type >= ppc_stub_plt_call
12321 && stub_type <= ppc_stub_plt_call_both)
e054468f 12322 {
05d0e962
AM
12323 stub_entry->target_value = sym_value;
12324 stub_entry->target_section = sym_sec;
e054468f
AM
12325 }
12326 else
12327 {
05d0e962
AM
12328 stub_entry->target_value = code_value;
12329 stub_entry->target_section = code_sec;
e054468f 12330 }
721956f4 12331 stub_entry->h = hash;
e054468f 12332 stub_entry->plt_ent = plt_ent;
2d7ad24e
AM
12333 stub_entry->symtype
12334 = hash ? hash->elf.type : ELF_ST_TYPE (sym->st_info);
6911b7dc 12335 stub_entry->other = hash ? hash->elf.other : sym->st_other;
ee75fd95 12336
3d58e1fc
AM
12337 if (hash != NULL
12338 && (hash->elf.root.type == bfd_link_hash_defined
12339 || hash->elf.root.type == bfd_link_hash_defweak))
ee75fd95 12340 htab->stub_globals += 1;
721956f4
AM
12341 }
12342
12343 /* We're done with the internal relocs, free them. */
6cdc0ccc 12344 if (elf_section_data (section)->relocs != internal_relocs)
1e2f5b6e 12345 free (internal_relocs);
721956f4 12346 }
6cdc0ccc
AM
12347
12348 if (local_syms != NULL
12349 && symtab_hdr->contents != (unsigned char *) local_syms)
12350 {
12351 if (!info->keep_memory)
12352 free (local_syms);
12353 else
12354 symtab_hdr->contents = (unsigned char *) local_syms;
12355 }
721956f4
AM
12356 }
12357
5c3dead3 12358 /* We may have added some stubs. Find out the new size of the
721956f4 12359 stub sections. */
d4aaa2a0 12360 for (group = htab->group; group != NULL; group = group->next)
df136d64
AM
12361 {
12362 group->lr_restore = 0;
12363 group->eh_size = 0;
12364 if (group->stub_sec != NULL)
12365 {
12366 asection *stub_sec = group->stub_sec;
12367
12368 if (htab->stub_iteration <= STUB_SHRINK_ITER
12369 || stub_sec->rawsize < stub_sec->size)
12370 /* Past STUB_SHRINK_ITER, rawsize is the max size seen. */
12371 stub_sec->rawsize = stub_sec->size;
12372 stub_sec->size = 0;
12373 stub_sec->reloc_count = 0;
12374 stub_sec->flags &= ~SEC_RELOC;
12375 }
12376 }
eea6121a 12377
ba21f564
AM
12378 if (htab->stub_iteration <= STUB_SHRINK_ITER
12379 || htab->brlt->rawsize < htab->brlt->size)
12380 htab->brlt->rawsize = htab->brlt->size;
eea6121a 12381 htab->brlt->size = 0;
84f5d08e
AM
12382 htab->brlt->reloc_count = 0;
12383 htab->brlt->flags &= ~SEC_RELOC;
ee75fd95 12384 if (htab->relbrlt != NULL)
eea6121a 12385 htab->relbrlt->size = 0;
721956f4 12386
63bc6f6c 12387 bfd_hash_traverse (&htab->stub_hash_table, ppc_size_one_stub, info);
721956f4 12388
a4b6fadd
AM
12389 for (group = htab->group; group != NULL; group = group->next)
12390 if (group->needs_save_res)
12391 group->stub_sec->size += htab->sfpr->size;
12392
176a0d42
AM
12393 if (info->emitrelocations
12394 && htab->glink != NULL && htab->glink->size != 0)
12395 {
12396 htab->glink->reloc_count = 1;
12397 htab->glink->flags |= SEC_RELOC;
12398 }
12399
58d180e8
AM
12400 if (htab->glink_eh_frame != NULL
12401 && !bfd_is_abs_section (htab->glink_eh_frame->output_section)
2d0d44d5 12402 && htab->glink_eh_frame->output_section->size > 8)
58d180e8 12403 {
2e0ce1c8 12404 size_t size = 0, align = 4;
58d180e8 12405
d4aaa2a0 12406 for (group = htab->group; group != NULL; group = group->next)
df136d64
AM
12407 if (group->eh_size != 0)
12408 size += (group->eh_size + 17 + align - 1) & -align;
58d180e8 12409 if (htab->glink != NULL && htab->glink->size != 0)
2e0ce1c8 12410 size += (24 + align - 1) & -align;
58d180e8 12411 if (size != 0)
2e0ce1c8
AM
12412 size += (sizeof (glink_eh_frame_cie) + align - 1) & -align;
12413 align = 1ul << htab->glink_eh_frame->output_section->alignment_power;
12414 size = (size + align - 1) & -align;
58d180e8
AM
12415 htab->glink_eh_frame->rawsize = htab->glink_eh_frame->size;
12416 htab->glink_eh_frame->size = size;
12417 }
12418
e7d1c40c 12419 if (htab->params->plt_stub_align != 0)
d4aaa2a0
AM
12420 for (group = htab->group; group != NULL; group = group->next)
12421 if (group->stub_sec != NULL)
691d2e9a
AM
12422 {
12423 int align = abs (htab->params->plt_stub_align);
12424 group->stub_sec->size
12425 = (group->stub_sec->size + (1 << align) - 1) & -(1 << align);
12426 }
d4aaa2a0
AM
12427
12428 for (group = htab->group; group != NULL; group = group->next)
12429 if (group->stub_sec != NULL
12430 && group->stub_sec->rawsize != group->stub_sec->size
c9301e31 12431 && (htab->stub_iteration <= STUB_SHRINK_ITER
d4aaa2a0 12432 || group->stub_sec->rawsize < group->stub_sec->size))
5c3dead3
AM
12433 break;
12434
d4aaa2a0 12435 if (group == NULL
ba21f564
AM
12436 && (htab->brlt->rawsize == htab->brlt->size
12437 || (htab->stub_iteration > STUB_SHRINK_ITER
12438 && htab->brlt->rawsize > htab->brlt->size))
58d180e8
AM
12439 && (htab->glink_eh_frame == NULL
12440 || htab->glink_eh_frame->rawsize == htab->glink_eh_frame->size))
5c3dead3
AM
12441 break;
12442
721956f4 12443 /* Ask the linker to do its stuff. */
e7d1c40c 12444 (*htab->params->layout_sections_again) ();
721956f4
AM
12445 }
12446
da44f4e5
AM
12447 if (htab->glink_eh_frame != NULL
12448 && htab->glink_eh_frame->size != 0)
12449 {
12450 bfd_vma val;
12451 bfd_byte *p, *last_fde;
12452 size_t last_fde_len, size, align, pad;
d4aaa2a0 12453 struct map_stub *group;
da44f4e5 12454
df136d64
AM
12455 /* It is necessary to at least have a rough outline of the
12456 linker generated CIEs and FDEs written before
12457 bfd_elf_discard_info is run, in order for these FDEs to be
12458 indexed in .eh_frame_hdr. */
da44f4e5
AM
12459 p = bfd_zalloc (htab->glink_eh_frame->owner, htab->glink_eh_frame->size);
12460 if (p == NULL)
12461 return FALSE;
12462 htab->glink_eh_frame->contents = p;
12463 last_fde = p;
2e0ce1c8 12464 align = 4;
da44f4e5
AM
12465
12466 memcpy (p, glink_eh_frame_cie, sizeof (glink_eh_frame_cie));
12467 /* CIE length (rewrite in case little-endian). */
2e0ce1c8 12468 last_fde_len = ((sizeof (glink_eh_frame_cie) + align - 1) & -align) - 4;
da44f4e5 12469 bfd_put_32 (htab->elf.dynobj, last_fde_len, p);
2e0ce1c8 12470 p += last_fde_len + 4;
da44f4e5 12471
d4aaa2a0 12472 for (group = htab->group; group != NULL; group = group->next)
df136d64 12473 if (group->eh_size != 0)
da44f4e5 12474 {
df136d64 12475 group->eh_base = p - htab->glink_eh_frame->contents;
da44f4e5 12476 last_fde = p;
df136d64 12477 last_fde_len = ((group->eh_size + 17 + align - 1) & -align) - 4;
da44f4e5 12478 /* FDE length. */
2e0ce1c8 12479 bfd_put_32 (htab->elf.dynobj, last_fde_len, p);
da44f4e5
AM
12480 p += 4;
12481 /* CIE pointer. */
12482 val = p - htab->glink_eh_frame->contents;
12483 bfd_put_32 (htab->elf.dynobj, val, p);
12484 p += 4;
12485 /* Offset to stub section, written later. */
12486 p += 4;
12487 /* stub section size. */
d4aaa2a0 12488 bfd_put_32 (htab->elf.dynobj, group->stub_sec->size, p);
da44f4e5
AM
12489 p += 4;
12490 /* Augmentation. */
12491 p += 1;
df136d64
AM
12492 /* Make sure we don't have all nops. This is enough for
12493 elf-eh-frame.c to detect the last non-nop opcode. */
12494 p[group->eh_size - 1] = DW_CFA_advance_loc + 1;
d4aaa2a0 12495 p = last_fde + last_fde_len + 4;
da44f4e5
AM
12496 }
12497 if (htab->glink != NULL && htab->glink->size != 0)
12498 {
12499 last_fde = p;
2e0ce1c8 12500 last_fde_len = ((24 + align - 1) & -align) - 4;
da44f4e5 12501 /* FDE length. */
2e0ce1c8 12502 bfd_put_32 (htab->elf.dynobj, last_fde_len, p);
da44f4e5
AM
12503 p += 4;
12504 /* CIE pointer. */
12505 val = p - htab->glink_eh_frame->contents;
12506 bfd_put_32 (htab->elf.dynobj, val, p);
12507 p += 4;
12508 /* Offset to .glink, written later. */
12509 p += 4;
12510 /* .glink size. */
12511 bfd_put_32 (htab->elf.dynobj, htab->glink->size - 8, p);
12512 p += 4;
12513 /* Augmentation. */
12514 p += 1;
12515
12516 *p++ = DW_CFA_advance_loc + 1;
12517 *p++ = DW_CFA_register;
12518 *p++ = 65;
9f08fa5c 12519 *p++ = htab->opd_abi ? 12 : 0;
15a3a14f 12520 *p++ = DW_CFA_advance_loc + (htab->opd_abi ? 5 : 7);
da44f4e5
AM
12521 *p++ = DW_CFA_restore_extended;
12522 *p++ = 65;
2e0ce1c8 12523 p += ((24 + align - 1) & -align) - 24;
da44f4e5
AM
12524 }
12525 /* Subsume any padding into the last FDE if user .eh_frame
12526 sections are aligned more than glink_eh_frame. Otherwise any
12527 zero padding will be seen as a terminator. */
2e0ce1c8 12528 align = 1ul << htab->glink_eh_frame->output_section->alignment_power;
da44f4e5 12529 size = p - htab->glink_eh_frame->contents;
2e0ce1c8 12530 pad = ((size + align - 1) & -align) - size;
da44f4e5
AM
12531 htab->glink_eh_frame->size = size + pad;
12532 bfd_put_32 (htab->elf.dynobj, last_fde_len + pad, last_fde);
12533 }
12534
d969d15f
AM
12535 maybe_strip_output (info, htab->brlt);
12536 if (htab->glink_eh_frame != NULL)
12537 maybe_strip_output (info, htab->glink_eh_frame);
721956f4 12538
b34976b6 12539 return TRUE;
721956f4
AM
12540}
12541
12542/* Called after we have determined section placement. If sections
805fc799 12543 move, we'll be called again. Provide a value for TOCstart. */
721956f4 12544
805fc799 12545bfd_vma
1c865ab2 12546ppc64_elf_set_toc (struct bfd_link_info *info, bfd *obfd)
721956f4 12547{
805fc799 12548 asection *s;
a27e685f 12549 bfd_vma TOCstart, adjust;
721956f4 12550
43417696
AM
12551 if (info != NULL)
12552 {
12553 struct elf_link_hash_entry *h;
12554 struct elf_link_hash_table *htab = elf_hash_table (info);
12555
12556 if (is_elf_hash_table (htab)
12557 && htab->hgot != NULL)
12558 h = htab->hgot;
12559 else
12560 {
12561 h = elf_link_hash_lookup (htab, ".TOC.", FALSE, FALSE, TRUE);
12562 if (is_elf_hash_table (htab))
12563 htab->hgot = h;
12564 }
12565 if (h != NULL
12566 && h->root.type == bfd_link_hash_defined
12567 && !h->root.linker_def
12568 && (!is_elf_hash_table (htab)
12569 || h->def_regular))
12570 {
12571 TOCstart = (h->root.u.def.value - TOC_BASE_OFF
12572 + h->root.u.def.section->output_offset
12573 + h->root.u.def.section->output_section->vma);
12574 _bfd_set_gp_value (obfd, TOCstart);
12575 return TOCstart;
12576 }
12577 }
12578
805fc799
AM
12579 /* The TOC consists of sections .got, .toc, .tocbss, .plt in that
12580 order. The TOC starts where the first of these sections starts. */
12581 s = bfd_get_section_by_name (obfd, ".got");
e054468f 12582 if (s == NULL || (s->flags & SEC_EXCLUDE) != 0)
805fc799 12583 s = bfd_get_section_by_name (obfd, ".toc");
e054468f 12584 if (s == NULL || (s->flags & SEC_EXCLUDE) != 0)
805fc799 12585 s = bfd_get_section_by_name (obfd, ".tocbss");
e054468f 12586 if (s == NULL || (s->flags & SEC_EXCLUDE) != 0)
805fc799 12587 s = bfd_get_section_by_name (obfd, ".plt");
e054468f 12588 if (s == NULL || (s->flags & SEC_EXCLUDE) != 0)
805fc799
AM
12589 {
12590 /* This may happen for
12591 o references to TOC base (SYM@toc / TOC[tc0]) without a
12592 .toc directive
12593 o bad linker script
12594 o --gc-sections and empty TOC sections
12595
12596 FIXME: Warn user? */
12597
12598 /* Look for a likely section. We probably won't even be
12599 using TOCstart. */
12600 for (s = obfd->sections; s != NULL; s = s->next)
e054468f
AM
12601 if ((s->flags & (SEC_ALLOC | SEC_SMALL_DATA | SEC_READONLY
12602 | SEC_EXCLUDE))
805fc799
AM
12603 == (SEC_ALLOC | SEC_SMALL_DATA))
12604 break;
721956f4 12605 if (s == NULL)
805fc799 12606 for (s = obfd->sections; s != NULL; s = s->next)
e054468f 12607 if ((s->flags & (SEC_ALLOC | SEC_SMALL_DATA | SEC_EXCLUDE))
805fc799
AM
12608 == (SEC_ALLOC | SEC_SMALL_DATA))
12609 break;
721956f4 12610 if (s == NULL)
805fc799 12611 for (s = obfd->sections; s != NULL; s = s->next)
e054468f
AM
12612 if ((s->flags & (SEC_ALLOC | SEC_READONLY | SEC_EXCLUDE))
12613 == SEC_ALLOC)
805fc799 12614 break;
721956f4 12615 if (s == NULL)
805fc799 12616 for (s = obfd->sections; s != NULL; s = s->next)
e054468f 12617 if ((s->flags & (SEC_ALLOC | SEC_EXCLUDE)) == SEC_ALLOC)
805fc799
AM
12618 break;
12619 }
721956f4 12620
805fc799
AM
12621 TOCstart = 0;
12622 if (s != NULL)
12623 TOCstart = s->output_section->vma + s->output_offset;
721956f4 12624
a27e685f
AM
12625 /* Force alignment. */
12626 adjust = TOCstart & (TOC_BASE_ALIGN - 1);
12627 TOCstart -= adjust;
1c865ab2
AM
12628 _bfd_set_gp_value (obfd, TOCstart);
12629
810d4e75 12630 if (info != NULL && s != NULL)
1c865ab2
AM
12631 {
12632 struct ppc_link_hash_table *htab = ppc_hash_table (info);
12633
810d4e75
AM
12634 if (htab != NULL)
12635 {
12636 if (htab->elf.hgot != NULL)
12637 {
a27e685f 12638 htab->elf.hgot->root.u.def.value = TOC_BASE_OFF - adjust;
810d4e75
AM
12639 htab->elf.hgot->root.u.def.section = s;
12640 }
12641 }
12642 else
1c865ab2 12643 {
810d4e75
AM
12644 struct bfd_link_hash_entry *bh = NULL;
12645 _bfd_generic_link_add_one_symbol (info, obfd, ".TOC.", BSF_GLOBAL,
a27e685f
AM
12646 s, TOC_BASE_OFF - adjust,
12647 NULL, FALSE, FALSE, &bh);
1c865ab2
AM
12648 }
12649 }
805fc799 12650 return TOCstart;
721956f4
AM
12651}
12652
a345bc8d 12653/* Called via elf_link_hash_traverse from ppc64_elf_build_stubs to
49c09209 12654 write out any global entry stubs, and PLT relocations. */
a345bc8d
AM
12655
12656static bfd_boolean
49c09209 12657build_global_entry_stubs_and_plt (struct elf_link_hash_entry *h, void *inf)
a345bc8d
AM
12658{
12659 struct bfd_link_info *info;
12660 struct ppc_link_hash_table *htab;
49c09209 12661 struct plt_entry *ent;
a345bc8d
AM
12662 asection *s;
12663
12664 if (h->root.type == bfd_link_hash_indirect)
12665 return TRUE;
12666
49c09209
AM
12667 info = inf;
12668 htab = ppc_hash_table (info);
12669 if (htab == NULL)
12670 return FALSE;
12671
12672 for (ent = h->plt.plist; ent != NULL; ent = ent->next)
12673 if (ent->plt.offset != (bfd_vma) -1)
12674 {
12675 /* This symbol has an entry in the procedure linkage
12676 table. Set it up. */
12677 Elf_Internal_Rela rela;
2d7ad24e 12678 asection *plt, *relplt;
49c09209
AM
12679 bfd_byte *loc;
12680
12681 if (!htab->elf.dynamic_sections_created
12682 || h->dynindx == -1)
12683 {
12684 if (!(h->def_regular
12685 && (h->root.type == bfd_link_hash_defined
12686 || h->root.type == bfd_link_hash_defweak)))
12687 continue;
2d7ad24e
AM
12688 if (h->type == STT_GNU_IFUNC)
12689 {
12690 plt = htab->elf.iplt;
12691 relplt = htab->elf.irelplt;
12692 htab->local_ifunc_resolver = 1;
12693 if (htab->opd_abi)
12694 rela.r_info = ELF64_R_INFO (0, R_PPC64_JMP_IREL);
12695 else
12696 rela.r_info = ELF64_R_INFO (0, R_PPC64_IRELATIVE);
12697 }
49c09209 12698 else
2d7ad24e
AM
12699 {
12700 plt = htab->pltlocal;
12701 if (bfd_link_pic (info))
12702 {
12703 relplt = htab->relpltlocal;
12704 if (htab->opd_abi)
12705 rela.r_info = ELF64_R_INFO (0, R_PPC64_JMP_SLOT);
12706 else
12707 rela.r_info = ELF64_R_INFO (0, R_PPC64_RELATIVE);
12708 }
12709 else
12710 relplt = NULL;
12711 }
49c09209
AM
12712 rela.r_addend = (h->root.u.def.value
12713 + h->root.u.def.section->output_offset
12714 + h->root.u.def.section->output_section->vma
12715 + ent->addend);
2d7ad24e
AM
12716
12717 if (relplt == NULL)
12718 {
12719 loc = plt->contents + ent->plt.offset;
12720 bfd_put_64 (info->output_bfd, rela.r_addend, loc);
12721 if (htab->opd_abi)
12722 {
12723 bfd_vma toc = elf_gp (info->output_bfd);
12724 toc += htab->sec_info[h->root.u.def.section->id].toc_off;
12725 bfd_put_64 (info->output_bfd, toc, loc + 8);
12726 }
12727 }
12728 else
12729 {
12730 rela.r_offset = (plt->output_section->vma
12731 + plt->output_offset
12732 + ent->plt.offset);
12733 loc = relplt->contents + (relplt->reloc_count++
12734 * sizeof (Elf64_External_Rela));
12735 bfd_elf64_swap_reloca_out (info->output_bfd, &rela, loc);
12736 }
49c09209
AM
12737 }
12738 else
12739 {
12740 rela.r_offset = (htab->elf.splt->output_section->vma
12741 + htab->elf.splt->output_offset
12742 + ent->plt.offset);
12743 rela.r_info = ELF64_R_INFO (h->dynindx, R_PPC64_JMP_SLOT);
12744 rela.r_addend = ent->addend;
12745 loc = (htab->elf.srelplt->contents
12746 + ((ent->plt.offset - PLT_INITIAL_ENTRY_SIZE (htab))
12747 / PLT_ENTRY_SIZE (htab) * sizeof (Elf64_External_Rela)));
12748 if (h->type == STT_GNU_IFUNC && is_static_defined (h))
12749 htab->maybe_local_ifunc_resolver = 1;
2d7ad24e 12750 bfd_elf64_swap_reloca_out (info->output_bfd, &rela, loc);
49c09209 12751 }
49c09209
AM
12752 }
12753
a345bc8d
AM
12754 if (!h->pointer_equality_needed)
12755 return TRUE;
12756
12757 if (h->def_regular)
12758 return TRUE;
12759
9e390558 12760 s = htab->global_entry;
49c09209
AM
12761 if (s == NULL || s->size == 0)
12762 return TRUE;
12763
12764 for (ent = h->plt.plist; ent != NULL; ent = ent->next)
12765 if (ent->plt.offset != (bfd_vma) -1
12766 && ent->addend == 0)
a345bc8d
AM
12767 {
12768 bfd_byte *p;
12769 asection *plt;
12770 bfd_vma off;
12771
a345bc8d 12772 p = s->contents + h->root.u.def.value;
33e44f2e 12773 plt = htab->elf.splt;
a345bc8d
AM
12774 if (!htab->elf.dynamic_sections_created
12775 || h->dynindx == -1)
2d7ad24e
AM
12776 {
12777 if (h->type == STT_GNU_IFUNC)
12778 plt = htab->elf.iplt;
12779 else
12780 plt = htab->pltlocal;
12781 }
49c09209 12782 off = ent->plt.offset + plt->output_offset + plt->output_section->vma;
a345bc8d
AM
12783 off -= h->root.u.def.value + s->output_offset + s->output_section->vma;
12784
12785 if (off + 0x80008000 > 0xffffffff || (off & 3) != 0)
12786 {
12787 info->callbacks->einfo
c1c8c1ef 12788 (_("%P: linkage table error against `%pT'\n"),
a345bc8d
AM
12789 h->root.root.string);
12790 bfd_set_error (bfd_error_bad_value);
12791 htab->stub_error = TRUE;
12792 }
12793
7341d5e2
AM
12794 htab->stub_count[ppc_stub_global_entry - 1] += 1;
12795 if (htab->params->emit_stub_syms)
12796 {
12797 size_t len = strlen (h->root.root.string);
12798 char *name = bfd_malloc (sizeof "12345678.global_entry." + len);
12799
12800 if (name == NULL)
12801 return FALSE;
12802
12803 sprintf (name, "%08x.global_entry.%s", s->id, h->root.root.string);
12804 h = elf_link_hash_lookup (&htab->elf, name, TRUE, FALSE, FALSE);
12805 if (h == NULL)
12806 return FALSE;
12807 if (h->root.type == bfd_link_hash_new)
12808 {
12809 h->root.type = bfd_link_hash_defined;
12810 h->root.u.def.section = s;
12811 h->root.u.def.value = p - s->contents;
12812 h->ref_regular = 1;
12813 h->def_regular = 1;
12814 h->ref_regular_nonweak = 1;
12815 h->forced_local = 1;
12816 h->non_elf = 0;
2ec55de3 12817 h->root.linker_def = 1;
7341d5e2
AM
12818 }
12819 }
12820
a345bc8d
AM
12821 if (PPC_HA (off) != 0)
12822 {
12823 bfd_put_32 (s->owner, ADDIS_R12_R12 | PPC_HA (off), p);
12824 p += 4;
12825 }
12826 bfd_put_32 (s->owner, LD_R12_0R12 | PPC_LO (off), p);
12827 p += 4;
12828 bfd_put_32 (s->owner, MTCTR_R12, p);
12829 p += 4;
407aa07c 12830 bfd_put_32 (s->owner, BCTR, p);
a345bc8d
AM
12831 break;
12832 }
12833 return TRUE;
12834}
12835
49c09209
AM
12836/* Write PLT relocs for locals. */
12837
12838static bfd_boolean
12839write_plt_relocs_for_local_syms (struct bfd_link_info *info)
12840{
12841 struct ppc_link_hash_table *htab = ppc_hash_table (info);
12842 bfd *ibfd;
12843
12844 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
12845 {
12846 struct got_entry **lgot_ents, **end_lgot_ents;
12847 struct plt_entry **local_plt, **lplt, **end_local_plt;
12848 Elf_Internal_Shdr *symtab_hdr;
12849 bfd_size_type locsymcount;
12850 Elf_Internal_Sym *local_syms = NULL;
12851 struct plt_entry *ent;
12852
12853 if (!is_ppc64_elf (ibfd))
12854 continue;
12855
12856 lgot_ents = elf_local_got_ents (ibfd);
12857 if (!lgot_ents)
12858 continue;
12859
12860 symtab_hdr = &elf_symtab_hdr (ibfd);
12861 locsymcount = symtab_hdr->sh_info;
12862 end_lgot_ents = lgot_ents + locsymcount;
12863 local_plt = (struct plt_entry **) end_lgot_ents;
12864 end_local_plt = local_plt + locsymcount;
12865 for (lplt = local_plt; lplt < end_local_plt; ++lplt)
12866 for (ent = *lplt; ent != NULL; ent = ent->next)
12867 if (ent->plt.offset != (bfd_vma) -1)
12868 {
12869 Elf_Internal_Sym *sym;
12870 asection *sym_sec;
12871 asection *plt, *relplt;
12872 bfd_byte *loc;
12873 bfd_vma val;
49c09209
AM
12874
12875 if (!get_sym_h (NULL, &sym, &sym_sec, NULL, &local_syms,
12876 lplt - local_plt, ibfd))
12877 {
12878 if (local_syms != NULL
12879 && symtab_hdr->contents != (unsigned char *) local_syms)
12880 free (local_syms);
12881 return FALSE;
12882 }
12883
12884 val = sym->st_value + ent->addend;
ba85c15d
AM
12885 if (ELF_ST_TYPE (sym->st_info) != STT_GNU_IFUNC)
12886 val += PPC64_LOCAL_ENTRY_OFFSET (sym->st_other);
49c09209
AM
12887 if (sym_sec != NULL && sym_sec->output_section != NULL)
12888 val += sym_sec->output_offset + sym_sec->output_section->vma;
12889
2d7ad24e
AM
12890 if (ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC)
12891 {
12892 htab->local_ifunc_resolver = 1;
12893 plt = htab->elf.iplt;
12894 relplt = htab->elf.irelplt;
12895 }
12896 else
12897 {
12898 plt = htab->pltlocal;
12899 relplt = bfd_link_pic (info) ? htab->relpltlocal : NULL;
12900 }
49c09209 12901
2d7ad24e
AM
12902 if (relplt == NULL)
12903 {
12904 loc = plt->contents + ent->plt.offset;
12905 bfd_put_64 (info->output_bfd, val, loc);
12906 if (htab->opd_abi)
12907 {
12908 bfd_vma toc = elf_gp (ibfd);
12909 bfd_put_64 (info->output_bfd, toc, loc + 8);
12910 }
12911 }
49c09209 12912 else
2d7ad24e
AM
12913 {
12914 Elf_Internal_Rela rela;
12915 rela.r_offset = (ent->plt.offset
12916 + plt->output_offset
12917 + plt->output_section->vma);
12918 if (ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC)
12919 {
12920 if (htab->opd_abi)
12921 rela.r_info = ELF64_R_INFO (0, R_PPC64_JMP_IREL);
12922 else
12923 rela.r_info = ELF64_R_INFO (0, R_PPC64_IRELATIVE);
12924 }
12925 else
12926 {
12927 if (htab->opd_abi)
12928 rela.r_info = ELF64_R_INFO (0, R_PPC64_JMP_SLOT);
12929 else
12930 rela.r_info = ELF64_R_INFO (0, R_PPC64_RELATIVE);
12931 }
12932 rela.r_addend = val;
12933 loc = relplt->contents + (relplt->reloc_count++
12934 * sizeof (Elf64_External_Rela));
12935 bfd_elf64_swap_reloca_out (info->output_bfd, &rela, loc);
12936 }
49c09209
AM
12937 }
12938
12939 if (local_syms != NULL
12940 && symtab_hdr->contents != (unsigned char *) local_syms)
12941 {
12942 if (!info->keep_memory)
12943 free (local_syms);
12944 else
12945 symtab_hdr->contents = (unsigned char *) local_syms;
12946 }
12947 }
12948 return TRUE;
12949}
12950
721956f4
AM
12951/* Build all the stubs associated with the current output file.
12952 The stubs are kept in a hash table attached to the main linker
12953 hash table. This function is called via gldelf64ppc_finish. */
12954
b34976b6 12955bfd_boolean
e7d1c40c 12956ppc64_elf_build_stubs (struct bfd_link_info *info,
4ce794b7 12957 char **stats)
5d1634d7
AM
12958{
12959 struct ppc_link_hash_table *htab = ppc_hash_table (info);
a4b6fadd 12960 struct map_stub *group;
721956f4 12961 asection *stub_sec;
5d1634d7 12962 bfd_byte *p;
e717da7e 12963 int stub_sec_count = 0;
5d1634d7 12964
4dfe6ac6
NC
12965 if (htab == NULL)
12966 return FALSE;
12967
eea6121a 12968 /* Allocate memory to hold the linker stubs. */
d4aaa2a0 12969 for (group = htab->group; group != NULL; group = group->next)
df136d64
AM
12970 {
12971 group->eh_size = 0;
12972 group->lr_restore = 0;
12973 if ((stub_sec = group->stub_sec) != NULL
12974 && stub_sec->size != 0)
12975 {
12976 stub_sec->contents = bfd_zalloc (htab->params->stub_bfd,
12977 stub_sec->size);
12978 if (stub_sec->contents == NULL)
12979 return FALSE;
12980 stub_sec->size = 0;
12981 }
12982 }
5d1634d7 12983
23eb7e01 12984 if (htab->glink != NULL && htab->glink->size != 0)
5d1634d7 12985 {
9f951329 12986 unsigned int indx;
ad8e1ba5 12987 bfd_vma plt0;
9f951329 12988
721956f4 12989 /* Build the .glink plt call stub. */
e7d1c40c 12990 if (htab->params->emit_stub_syms)
97b639ba
AM
12991 {
12992 struct elf_link_hash_entry *h;
468392fb
AM
12993 h = elf_link_hash_lookup (&htab->elf, "__glink_PLTresolve",
12994 TRUE, FALSE, FALSE);
97b639ba
AM
12995 if (h == NULL)
12996 return FALSE;
12997 if (h->root.type == bfd_link_hash_new)
12998 {
12999 h->root.type = bfd_link_hash_defined;
13000 h->root.u.def.section = htab->glink;
ee4bf8d2 13001 h->root.u.def.value = 8;
f5385ebf
AM
13002 h->ref_regular = 1;
13003 h->def_regular = 1;
13004 h->ref_regular_nonweak = 1;
13005 h->forced_local = 1;
13006 h->non_elf = 0;
2ec55de3 13007 h->root.linker_def = 1;
97b639ba
AM
13008 }
13009 }
33e44f2e
AM
13010 plt0 = (htab->elf.splt->output_section->vma
13011 + htab->elf.splt->output_offset
13012 - 16);
176a0d42
AM
13013 if (info->emitrelocations)
13014 {
13015 Elf_Internal_Rela *r = get_relocs (htab->glink, 1);
13016 if (r == NULL)
13017 return FALSE;
13018 r->r_offset = (htab->glink->output_offset
13019 + htab->glink->output_section->vma);
13020 r->r_info = ELF64_R_INFO (0, R_PPC64_REL64);
13021 r->r_addend = plt0;
13022 }
4ce794b7 13023 p = htab->glink->contents;
176a0d42 13024 plt0 -= htab->glink->output_section->vma + htab->glink->output_offset;
ee4bf8d2
AM
13025 bfd_put_64 (htab->glink->owner, plt0, p);
13026 p += 8;
b9e5796b
AM
13027 if (htab->opd_abi)
13028 {
13029 bfd_put_32 (htab->glink->owner, MFLR_R12, p);
13030 p += 4;
13031 bfd_put_32 (htab->glink->owner, BCL_20_31, p);
13032 p += 4;
13033 bfd_put_32 (htab->glink->owner, MFLR_R11, p);
13034 p += 4;
13035 bfd_put_32 (htab->glink->owner, LD_R2_0R11 | (-16 & 0xfffc), p);
13036 p += 4;
13037 bfd_put_32 (htab->glink->owner, MTLR_R12, p);
13038 p += 4;
13039 bfd_put_32 (htab->glink->owner, ADD_R11_R2_R11, p);
13040 p += 4;
13041 bfd_put_32 (htab->glink->owner, LD_R12_0R11, p);
13042 p += 4;
13043 bfd_put_32 (htab->glink->owner, LD_R2_0R11 | 8, p);
13044 p += 4;
13045 bfd_put_32 (htab->glink->owner, MTCTR_R12, p);
13046 p += 4;
13047 bfd_put_32 (htab->glink->owner, LD_R11_0R11 | 16, p);
13048 p += 4;
13049 }
13050 else
13051 {
13052 bfd_put_32 (htab->glink->owner, MFLR_R0, p);
13053 p += 4;
13054 bfd_put_32 (htab->glink->owner, BCL_20_31, p);
13055 p += 4;
13056 bfd_put_32 (htab->glink->owner, MFLR_R11, p);
13057 p += 4;
f378ab09
AM
13058 bfd_put_32 (htab->glink->owner, STD_R2_0R1 + 24, p);
13059 p += 4;
b9e5796b
AM
13060 bfd_put_32 (htab->glink->owner, LD_R2_0R11 | (-16 & 0xfffc), p);
13061 p += 4;
13062 bfd_put_32 (htab->glink->owner, MTLR_R0, p);
13063 p += 4;
13064 bfd_put_32 (htab->glink->owner, SUB_R12_R12_R11, p);
13065 p += 4;
13066 bfd_put_32 (htab->glink->owner, ADD_R11_R2_R11, p);
13067 p += 4;
13068 bfd_put_32 (htab->glink->owner, ADDI_R0_R12 | (-48 & 0xffff), p);
13069 p += 4;
13070 bfd_put_32 (htab->glink->owner, LD_R12_0R11, p);
13071 p += 4;
13072 bfd_put_32 (htab->glink->owner, SRDI_R0_R0_2, p);
13073 p += 4;
13074 bfd_put_32 (htab->glink->owner, MTCTR_R12, p);
13075 p += 4;
13076 bfd_put_32 (htab->glink->owner, LD_R11_0R11 | 8, p);
13077 p += 4;
13078 }
407aa07c
AM
13079 bfd_put_32 (htab->glink->owner, BCTR, p);
13080 p += 4;
c75bc4f7 13081 BFD_ASSERT (p == htab->glink->contents + GLINK_PLTRESOLVE_SIZE (htab));
ad8e1ba5 13082
9f951329
AM
13083 /* Build the .glink lazy link call stubs. */
13084 indx = 0;
9e390558 13085 while (p < htab->glink->contents + htab->glink->size)
9f951329 13086 {
b9e5796b 13087 if (htab->opd_abi)
9f951329 13088 {
b9e5796b
AM
13089 if (indx < 0x8000)
13090 {
13091 bfd_put_32 (htab->glink->owner, LI_R0_0 | indx, p);
13092 p += 4;
13093 }
13094 else
13095 {
13096 bfd_put_32 (htab->glink->owner, LIS_R0_0 | PPC_HI (indx), p);
13097 p += 4;
13098 bfd_put_32 (htab->glink->owner, ORI_R0_R0_0 | PPC_LO (indx),
13099 p);
13100 p += 4;
13101 }
9f951329 13102 }
4ce794b7 13103 bfd_put_32 (htab->glink->owner,
ee4bf8d2 13104 B_DOT | ((htab->glink->contents - p + 8) & 0x3fffffc), p);
a16d5acb 13105 indx++;
9f951329
AM
13106 p += 4;
13107 }
5d1634d7 13108 }
5d1634d7 13109
49c09209
AM
13110 /* Build .glink global entry stubs, and PLT relocs for globals. */
13111 elf_link_hash_traverse (&htab->elf, build_global_entry_stubs_and_plt, info);
13112
13113 if (!write_plt_relocs_for_local_syms (info))
13114 return FALSE;
9e390558 13115
7341d5e2 13116 if (htab->brlt != NULL && htab->brlt->size != 0)
721956f4 13117 {
4ce794b7 13118 htab->brlt->contents = bfd_zalloc (htab->brlt->owner,
eea6121a 13119 htab->brlt->size);
4ce794b7 13120 if (htab->brlt->contents == NULL)
b34976b6 13121 return FALSE;
721956f4 13122 }
ee75fd95 13123 if (htab->relbrlt != NULL && htab->relbrlt->size != 0)
63bc6f6c
AM
13124 {
13125 htab->relbrlt->contents = bfd_zalloc (htab->relbrlt->owner,
eea6121a 13126 htab->relbrlt->size);
63bc6f6c
AM
13127 if (htab->relbrlt->contents == NULL)
13128 return FALSE;
13129 }
5d1634d7 13130
721956f4
AM
13131 /* Build the stubs as directed by the stub hash table. */
13132 bfd_hash_traverse (&htab->stub_hash_table, ppc_build_one_stub, info);
5d1634d7 13133
a4b6fadd
AM
13134 for (group = htab->group; group != NULL; group = group->next)
13135 if (group->needs_save_res)
7dda8d3c 13136 group->stub_sec->size += htab->sfpr->size;
a4b6fadd 13137
aa8a7074
AM
13138 if (htab->relbrlt != NULL)
13139 htab->relbrlt->reloc_count = 0;
13140
e7d1c40c 13141 if (htab->params->plt_stub_align != 0)
d4aaa2a0
AM
13142 for (group = htab->group; group != NULL; group = group->next)
13143 if ((stub_sec = group->stub_sec) != NULL)
691d2e9a
AM
13144 {
13145 int align = abs (htab->params->plt_stub_align);
13146 stub_sec->size = (stub_sec->size + (1 << align) - 1) & -(1 << align);
13147 }
794e51c0 13148
7dda8d3c
AM
13149 for (group = htab->group; group != NULL; group = group->next)
13150 if (group->needs_save_res)
13151 {
13152 stub_sec = group->stub_sec;
13153 memcpy (stub_sec->contents + stub_sec->size - htab->sfpr->size,
13154 htab->sfpr->contents, htab->sfpr->size);
13155 if (htab->params->emit_stub_syms)
13156 {
13157 unsigned int i;
13158
13159 for (i = 0; i < ARRAY_SIZE (save_res_funcs); i++)
13160 if (!sfpr_define (info, &save_res_funcs[i], stub_sec))
13161 return FALSE;
13162 }
13163 }
13164
df136d64
AM
13165 if (htab->glink_eh_frame != NULL
13166 && htab->glink_eh_frame->size != 0)
13167 {
13168 bfd_vma val;
13169 size_t align = 4;
13170
13171 p = htab->glink_eh_frame->contents;
13172 p += (sizeof (glink_eh_frame_cie) + align - 1) & -align;
13173
13174 for (group = htab->group; group != NULL; group = group->next)
13175 if (group->eh_size != 0)
13176 {
13177 /* Offset to stub section. */
13178 val = (group->stub_sec->output_section->vma
13179 + group->stub_sec->output_offset);
13180 val -= (htab->glink_eh_frame->output_section->vma
13181 + htab->glink_eh_frame->output_offset
13182 + (p + 8 - htab->glink_eh_frame->contents));
13183 if (val + 0x80000000 > 0xffffffff)
13184 {
13185 _bfd_error_handler
13186 (_("%s offset too large for .eh_frame sdata4 encoding"),
13187 group->stub_sec->name);
13188 return FALSE;
13189 }
13190 bfd_put_32 (htab->elf.dynobj, val, p + 8);
13191 p += (group->eh_size + 17 + 3) & -4;
13192 }
13193 if (htab->glink != NULL && htab->glink->size != 0)
13194 {
13195 /* Offset to .glink. */
13196 val = (htab->glink->output_section->vma
13197 + htab->glink->output_offset
13198 + 8);
13199 val -= (htab->glink_eh_frame->output_section->vma
13200 + htab->glink_eh_frame->output_offset
13201 + (p + 8 - htab->glink_eh_frame->contents));
13202 if (val + 0x80000000 > 0xffffffff)
13203 {
13204 _bfd_error_handler
13205 (_("%s offset too large for .eh_frame sdata4 encoding"),
13206 htab->glink->name);
13207 return FALSE;
13208 }
13209 bfd_put_32 (htab->elf.dynobj, val, p + 8);
13210 p += (24 + align - 1) & -align;
13211 }
13212 }
13213
d4aaa2a0
AM
13214 for (group = htab->group; group != NULL; group = group->next)
13215 if ((stub_sec = group->stub_sec) != NULL)
e717da7e
AM
13216 {
13217 stub_sec_count += 1;
c9301e31
AM
13218 if (stub_sec->rawsize != stub_sec->size
13219 && (htab->stub_iteration <= STUB_SHRINK_ITER
13220 || stub_sec->rawsize < stub_sec->size))
e717da7e
AM
13221 break;
13222 }
5d1634d7 13223
25516cc5 13224 if (group != NULL)
5d1634d7 13225 {
b34976b6 13226 htab->stub_error = TRUE;
cf97bcb0 13227 _bfd_error_handler (_("stubs don't match calculated size"));
5d1634d7 13228 }
721956f4 13229
d2a300cf
AM
13230 if (htab->stub_error)
13231 return FALSE;
13232
13233 if (stats != NULL)
13234 {
db84fff3 13235 size_t len;
d2a300cf
AM
13236 *stats = bfd_malloc (500);
13237 if (*stats == NULL)
13238 return FALSE;
13239
db84fff3
AM
13240 len = sprintf (*stats,
13241 ngettext ("linker stubs in %u group\n",
13242 "linker stubs in %u groups\n",
13243 stub_sec_count),
13244 stub_sec_count);
05d0e962
AM
13245 sprintf (*stats + len, _(" branch %lu\n"
13246 " branch toc adj %lu\n"
13247 " branch notoc %lu\n"
13248 " branch both %lu\n"
13249 " long branch %lu\n"
13250 " long toc adj %lu\n"
13251 " long notoc %lu\n"
13252 " long both %lu\n"
13253 " plt call %lu\n"
13254 " plt call save %lu\n"
13255 " plt call notoc %lu\n"
13256 " plt call both %lu\n"
13257 " global entry %lu"),
4ce794b7
AM
13258 htab->stub_count[ppc_stub_long_branch - 1],
13259 htab->stub_count[ppc_stub_long_branch_r2off - 1],
05d0e962
AM
13260 htab->stub_count[ppc_stub_long_branch_notoc - 1],
13261 htab->stub_count[ppc_stub_long_branch_both - 1],
4ce794b7
AM
13262 htab->stub_count[ppc_stub_plt_branch - 1],
13263 htab->stub_count[ppc_stub_plt_branch_r2off - 1],
05d0e962
AM
13264 htab->stub_count[ppc_stub_plt_branch_notoc - 1],
13265 htab->stub_count[ppc_stub_plt_branch_both - 1],
794e51c0 13266 htab->stub_count[ppc_stub_plt_call - 1],
7341d5e2 13267 htab->stub_count[ppc_stub_plt_call_r2save - 1],
05d0e962
AM
13268 htab->stub_count[ppc_stub_plt_call_notoc - 1],
13269 htab->stub_count[ppc_stub_plt_call_both - 1],
7341d5e2 13270 htab->stub_count[ppc_stub_global_entry - 1]);
d2a300cf
AM
13271 }
13272 return TRUE;
5bd4f169
AM
13273}
13274
60124e18
AM
13275/* What to do when ld finds relocations against symbols defined in
13276 discarded sections. */
13277
13278static unsigned int
13279ppc64_elf_action_discarded (asection *sec)
13280{
13281 if (strcmp (".opd", sec->name) == 0)
13282 return 0;
13283
13284 if (strcmp (".toc", sec->name) == 0)
13285 return 0;
13286
bce50a28
JJ
13287 if (strcmp (".toc1", sec->name) == 0)
13288 return 0;
13289
60124e18
AM
13290 return _bfd_elf_default_action_discarded (sec);
13291}
13292
5bd4f169
AM
13293/* The RELOCATE_SECTION function is called by the ELF backend linker
13294 to handle the relocations for a section.
13295
13296 The relocs are always passed as Rela structures; if the section
13297 actually uses Rel structures, the r_addend field will always be
13298 zero.
13299
13300 This function is responsible for adjust the section contents as
13301 necessary, and (if using Rela relocs and generating a
1049f94e 13302 relocatable output file) adjusting the reloc addend as
5bd4f169
AM
13303 necessary.
13304
13305 This function does not have to worry about setting the reloc
13306 address or the reloc symbol index.
13307
13308 LOCAL_SYMS is a pointer to the swapped in local symbols.
13309
13310 LOCAL_SECTIONS is an array giving the section in the input file
13311 corresponding to the st_shndx field of each local symbol.
13312
13313 The global hash table entry for the global symbols can be found
13314 via elf_sym_hashes (input_bfd).
13315
1049f94e 13316 When generating relocatable output, this function must handle
5bd4f169
AM
13317 STB_LOCAL/STT_SECTION symbols specially. The output symbol is
13318 going to be the section symbol corresponding to the output
13319 section, which means that the addend must be adjusted
13320 accordingly. */
13321
b34976b6 13322static bfd_boolean
4ce794b7
AM
13323ppc64_elf_relocate_section (bfd *output_bfd,
13324 struct bfd_link_info *info,
13325 bfd *input_bfd,
13326 asection *input_section,
13327 bfd_byte *contents,
13328 Elf_Internal_Rela *relocs,
13329 Elf_Internal_Sym *local_syms,
13330 asection **local_sections)
5bd4f169 13331{
65f38f15 13332 struct ppc_link_hash_table *htab;
5bd4f169
AM
13333 Elf_Internal_Shdr *symtab_hdr;
13334 struct elf_link_hash_entry **sym_hashes;
5bd4f169 13335 Elf_Internal_Rela *rel;
c316a17c 13336 Elf_Internal_Rela *wrel;
5bd4f169 13337 Elf_Internal_Rela *relend;
411e1bfb
AM
13338 Elf_Internal_Rela outrel;
13339 bfd_byte *loc;
411e1bfb 13340 struct got_entry **local_got_ents;
5bd4f169 13341 bfd_vma TOCstart;
b34976b6
AM
13342 bfd_boolean ret = TRUE;
13343 bfd_boolean is_opd;
794e51c0
AM
13344 /* Assume 'at' branch hints. */
13345 bfd_boolean is_isa_v2 = TRUE;
95f0d0d2 13346 bfd_vma d_offset = (bfd_big_endian (input_bfd) ? 2 : 0);
5bd4f169 13347
65f38f15 13348 /* Initialize howto table if needed. */
5bd4f169 13349 if (!ppc64_elf_howto_table[R_PPC64_ADDR32])
5bd4f169
AM
13350 ppc_howto_init ();
13351
65f38f15 13352 htab = ppc_hash_table (info);
4dfe6ac6
NC
13353 if (htab == NULL)
13354 return FALSE;
ee75fd95
AM
13355
13356 /* Don't relocate stub sections. */
e7d1c40c 13357 if (input_section->owner == htab->params->stub_bfd)
ee75fd95
AM
13358 return TRUE;
13359
0c8d6e5c 13360 BFD_ASSERT (is_ppc64_elf (input_bfd));
0ffa91dd 13361
411e1bfb 13362 local_got_ents = elf_local_got_ents (input_bfd);
5bd4f169 13363 TOCstart = elf_gp (output_bfd);
0ffa91dd 13364 symtab_hdr = &elf_symtab_hdr (input_bfd);
5bd4f169 13365 sym_hashes = elf_sym_hashes (input_bfd);
7c8fe5c4 13366 is_opd = ppc64_elf_section_data (input_section)->sec_type == sec_opd;
65f38f15 13367
c316a17c 13368 rel = wrel = relocs;
5bd4f169 13369 relend = relocs + input_section->reloc_count;
c316a17c 13370 for (; rel < relend; wrel++, rel++)
5bd4f169 13371 {
04c9666a 13372 enum elf_ppc64_reloc_type r_type;
31c76678 13373 bfd_vma addend;
5bd4f169
AM
13374 bfd_reloc_status_type r;
13375 Elf_Internal_Sym *sym;
13376 asection *sec;
039b3fef
AM
13377 struct elf_link_hash_entry *h_elf;
13378 struct ppc_link_hash_entry *h;
13379 struct ppc_link_hash_entry *fdh;
5bd4f169 13380 const char *sym_name;
0d4792f7 13381 unsigned long r_symndx, toc_symndx;
3a71aa26 13382 bfd_vma toc_addend;
f961d9dd
AM
13383 unsigned char tls_mask, tls_gd, tls_type;
13384 unsigned char sym_type;
5bd4f169 13385 bfd_vma relocation;
23cedd1d 13386 bfd_boolean unresolved_reloc, save_unresolved_reloc;
b34976b6 13387 bfd_boolean warned;
bc30df16 13388 enum { DEST_NORMAL, DEST_OPD, DEST_STUB } reloc_dest;
67f0cbdb 13389 unsigned int insn;
e11840f9 13390 unsigned int mask;
721956f4
AM
13391 struct ppc_stub_hash_entry *stub_entry;
13392 bfd_vma max_br_offset;
13393 bfd_vma from;
c316a17c 13394 Elf_Internal_Rela orig_rel;
b80eed39
AM
13395 reloc_howto_type *howto;
13396 struct reloc_howto_struct alt_howto;
5bd4f169 13397
c316a17c
AM
13398 again:
13399 orig_rel = *rel;
13400
4ce794b7 13401 r_type = ELF64_R_TYPE (rel->r_info);
5bd4f169 13402 r_symndx = ELF64_R_SYM (rel->r_info);
ee87f2da
AM
13403
13404 /* For old style R_PPC64_TOC relocs with a zero symbol, use the
13405 symbol of the previous ADDR64 reloc. The symbol gives us the
13406 proper TOC base to use. */
13407 if (rel->r_info == ELF64_R_INFO (0, R_PPC64_TOC)
c316a17c
AM
13408 && wrel != relocs
13409 && ELF64_R_TYPE (wrel[-1].r_info) == R_PPC64_ADDR64
ee87f2da 13410 && is_opd)
c316a17c 13411 r_symndx = ELF64_R_SYM (wrel[-1].r_info);
ee87f2da 13412
4ce794b7
AM
13413 sym = NULL;
13414 sec = NULL;
039b3fef 13415 h_elf = NULL;
4ce794b7 13416 sym_name = NULL;
b34976b6
AM
13417 unresolved_reloc = FALSE;
13418 warned = FALSE;
65f38f15 13419
0b13192e 13420 if (r_symndx < symtab_hdr->sh_info)
5bd4f169
AM
13421 {
13422 /* It's a local symbol. */
74f0fb50 13423 struct _opd_sec_data *opd;
4025353c 13424
5bd4f169
AM
13425 sym = local_syms + r_symndx;
13426 sec = local_sections[r_symndx];
26c61ae5 13427 sym_name = bfd_elf_sym_name (input_bfd, symtab_hdr, sym, sec);
0d4792f7 13428 sym_type = ELF64_ST_TYPE (sym->st_info);
8517fae7 13429 relocation = _bfd_elf_rela_local_sym (output_bfd, sym, &sec, rel);
74f0fb50
AM
13430 opd = get_opd_info (sec);
13431 if (opd != NULL && opd->adjust != NULL)
1e2f5b6e 13432 {
51aecdc5
AM
13433 long adjust = opd->adjust[OPD_NDX (sym->st_value
13434 + rel->r_addend)];
4025353c
AM
13435 if (adjust == -1)
13436 relocation = 0;
13437 else
4cc603a5
AM
13438 {
13439 /* If this is a relocation against the opd section sym
13440 and we have edited .opd, adjust the reloc addend so
13441 that ld -r and ld --emit-relocs output is correct.
13442 If it is a reloc against some other .opd symbol,
13443 then the symbol value will be adjusted later. */
13444 if (ELF_ST_TYPE (sym->st_info) == STT_SECTION)
13445 rel->r_addend += adjust;
13446 else
13447 relocation += adjust;
13448 }
1e2f5b6e 13449 }
5bd4f169
AM
13450 }
13451 else
13452 {
62d887d4
L
13453 bfd_boolean ignored;
13454
b2a8e766
AM
13455 RELOC_FOR_GLOBAL_SYMBOL (info, input_bfd, input_section, rel,
13456 r_symndx, symtab_hdr, sym_hashes,
039b3fef 13457 h_elf, sec, relocation,
62d887d4 13458 unresolved_reloc, warned, ignored);
039b3fef
AM
13459 sym_name = h_elf->root.root.string;
13460 sym_type = h_elf->type;
b69fdb4e
AM
13461 if (sec != NULL
13462 && sec->owner == output_bfd
13463 && strcmp (sec->name, ".opd") == 0)
13464 {
13465 /* This is a symbol defined in a linker script. All
13466 such are defined in output sections, even those
13467 defined by simple assignment from a symbol defined in
13468 an input section. Transfer the symbol to an
13469 appropriate input .opd section, so that a branch to
13470 this symbol will be mapped to the location specified
13471 by the opd entry. */
13472 struct bfd_link_order *lo;
13473 for (lo = sec->map_head.link_order; lo != NULL; lo = lo->next)
13474 if (lo->type == bfd_indirect_link_order)
13475 {
13476 asection *isec = lo->u.indirect.section;
13477 if (h_elf->root.u.def.value >= isec->output_offset
13478 && h_elf->root.u.def.value < (isec->output_offset
13479 + isec->size))
13480 {
13481 h_elf->root.u.def.value -= isec->output_offset;
13482 h_elf->root.u.def.section = isec;
13483 sec = isec;
13484 break;
13485 }
13486 }
13487 }
5bd4f169 13488 }
039b3fef 13489 h = (struct ppc_link_hash_entry *) h_elf;
5bd4f169 13490
dbaa2011 13491 if (sec != NULL && discarded_section (sec))
c316a17c
AM
13492 {
13493 _bfd_clear_contents (ppc64_elf_howto_table[r_type],
13494 input_bfd, input_section,
0930cb30 13495 contents, rel->r_offset);
c316a17c
AM
13496 wrel->r_offset = rel->r_offset;
13497 wrel->r_info = 0;
13498 wrel->r_addend = 0;
13499
13500 /* For ld -r, remove relocations in debug sections against
dcd2b8a0 13501 symbols defined in discarded sections. Not done for
c316a17c
AM
13502 non-debug to preserve relocs in .eh_frame which the
13503 eh_frame editing code expects to be present. */
13504 if (bfd_link_relocatable (info)
13505 && (input_section->flags & SEC_DEBUGGING))
13506 wrel--;
13507
13508 continue;
13509 }
ab96bf03 13510
0e1862bb 13511 if (bfd_link_relocatable (info))
c316a17c 13512 goto copy_reloc;
ab96bf03 13513
f40da81b
AM
13514 if (h != NULL && &h->elf == htab->elf.hgot)
13515 {
6f20ed8a 13516 relocation = TOCstart + htab->sec_info[input_section->id].toc_off;
f40da81b
AM
13517 sec = bfd_abs_section_ptr;
13518 unresolved_reloc = FALSE;
13519 }
13520
951fd09b
AM
13521 /* TLS optimizations. Replace instruction sequences and relocs
13522 based on information we collected in tls_optimize. We edit
13523 RELOCS so that --emit-relocs will output something sensible
13524 for the final instruction stream. */
13525 tls_mask = 0;
13526 tls_gd = 0;
0d4792f7 13527 toc_symndx = 0;
727fc41e
AM
13528 if (h != NULL)
13529 tls_mask = h->tls_mask;
13530 else if (local_got_ents != NULL)
411e1bfb 13531 {
e054468f
AM
13532 struct plt_entry **local_plt = (struct plt_entry **)
13533 (local_got_ents + symtab_hdr->sh_info);
f961d9dd 13534 unsigned char *lgot_masks = (unsigned char *)
e054468f 13535 (local_plt + symtab_hdr->sh_info);
727fc41e
AM
13536 tls_mask = lgot_masks[r_symndx];
13537 }
37da22e5 13538 if (((tls_mask & TLS_TLS) == 0 || tls_mask == (TLS_TLS | TLS_MARK))
727fc41e
AM
13539 && (r_type == R_PPC64_TLS
13540 || r_type == R_PPC64_TLSGD
13541 || r_type == R_PPC64_TLSLD))
13542 {
13543 /* Check for toc tls entries. */
f961d9dd 13544 unsigned char *toc_tls;
0d4792f7 13545
727fc41e
AM
13546 if (!get_tls_mask (&toc_tls, &toc_symndx, &toc_addend,
13547 &local_syms, rel, input_bfd))
13548 return FALSE;
0d4792f7 13549
727fc41e
AM
13550 if (toc_tls)
13551 tls_mask = *toc_tls;
0d4792f7
AM
13552 }
13553
13554 /* Check that tls relocs are used with tls syms, and non-tls
13555 relocs are used with non-tls syms. */
cf35638d 13556 if (r_symndx != STN_UNDEF
0d4792f7
AM
13557 && r_type != R_PPC64_NONE
13558 && (h == NULL
039b3fef
AM
13559 || h->elf.root.type == bfd_link_hash_defined
13560 || h->elf.root.type == bfd_link_hash_defweak)
1d483afe
AM
13561 && (IS_PPC64_TLS_RELOC (r_type)
13562 != (sym_type == STT_TLS
13563 || (sym_type == STT_SECTION
13564 && (sec->flags & SEC_THREAD_LOCAL) != 0))))
0d4792f7 13565 {
37da22e5 13566 if ((tls_mask & TLS_TLS) != 0
727fc41e
AM
13567 && (r_type == R_PPC64_TLS
13568 || r_type == R_PPC64_TLSGD
13569 || r_type == R_PPC64_TLSLD))
0d4792f7
AM
13570 /* R_PPC64_TLS is OK against a symbol in the TOC. */
13571 ;
13572 else
25f53a85 13573 info->callbacks->einfo
1d483afe 13574 (!IS_PPC64_TLS_RELOC (r_type)
695344c0 13575 /* xgettext:c-format */
c1c8c1ef 13576 ? _("%H: %s used with TLS symbol `%pT'\n")
695344c0 13577 /* xgettext:c-format */
c1c8c1ef 13578 : _("%H: %s used with non-TLS symbol `%pT'\n"),
25f53a85 13579 input_bfd, input_section, rel->r_offset,
0d4792f7
AM
13580 ppc64_elf_howto_table[r_type]->name,
13581 sym_name);
411e1bfb
AM
13582 }
13583
13584 /* Ensure reloc mapping code below stays sane. */
13585 if (R_PPC64_TOC16_LO_DS != R_PPC64_TOC16_DS + 1
13586 || R_PPC64_TOC16_LO != R_PPC64_TOC16 + 1
13587 || (R_PPC64_GOT_TLSLD16 & 3) != (R_PPC64_GOT_TLSGD16 & 3)
13588 || (R_PPC64_GOT_TLSLD16_LO & 3) != (R_PPC64_GOT_TLSGD16_LO & 3)
13589 || (R_PPC64_GOT_TLSLD16_HI & 3) != (R_PPC64_GOT_TLSGD16_HI & 3)
13590 || (R_PPC64_GOT_TLSLD16_HA & 3) != (R_PPC64_GOT_TLSGD16_HA & 3)
13591 || (R_PPC64_GOT_TLSLD16 & 3) != (R_PPC64_GOT_TPREL16_DS & 3)
13592 || (R_PPC64_GOT_TLSLD16_LO & 3) != (R_PPC64_GOT_TPREL16_LO_DS & 3)
13593 || (R_PPC64_GOT_TLSLD16_HI & 3) != (R_PPC64_GOT_TPREL16_HI & 3)
13594 || (R_PPC64_GOT_TLSLD16_HA & 3) != (R_PPC64_GOT_TPREL16_HA & 3))
13595 abort ();
0d4792f7 13596
411e1bfb
AM
13597 switch (r_type)
13598 {
13599 default:
411e1bfb
AM
13600 break;
13601
ba761f19 13602 case R_PPC64_LO_DS_OPT:
95f0d0d2 13603 insn = bfd_get_32 (input_bfd, contents + rel->r_offset - d_offset);
ba761f19
AM
13604 if ((insn & (0x3f << 26)) != 58u << 26)
13605 abort ();
13606 insn += (14u << 26) - (58u << 26);
95f0d0d2 13607 bfd_put_32 (input_bfd, insn, contents + rel->r_offset - d_offset);
ba761f19
AM
13608 r_type = R_PPC64_TOC16_LO;
13609 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
13610 break;
13611
411e1bfb
AM
13612 case R_PPC64_TOC16:
13613 case R_PPC64_TOC16_LO:
13614 case R_PPC64_TOC16_DS:
13615 case R_PPC64_TOC16_LO_DS:
411e1bfb
AM
13616 {
13617 /* Check for toc tls entries. */
f961d9dd 13618 unsigned char *toc_tls;
951fd09b 13619 int retval;
411e1bfb 13620
3a71aa26
AM
13621 retval = get_tls_mask (&toc_tls, &toc_symndx, &toc_addend,
13622 &local_syms, rel, input_bfd);
951fd09b 13623 if (retval == 0)
411e1bfb
AM
13624 return FALSE;
13625
13626 if (toc_tls)
13627 {
951fd09b 13628 tls_mask = *toc_tls;
411e1bfb
AM
13629 if (r_type == R_PPC64_TOC16_DS
13630 || r_type == R_PPC64_TOC16_LO_DS)
81407a69 13631 {
37da22e5 13632 if ((tls_mask & TLS_TLS) != 0
81407a69
AM
13633 && (tls_mask & (TLS_DTPREL | TLS_TPREL)) == 0)
13634 goto toctprel;
13635 }
411e1bfb 13636 else
951fd09b
AM
13637 {
13638 /* If we found a GD reloc pair, then we might be
13639 doing a GD->IE transition. */
13640 if (retval == 2)
13641 {
13642 tls_gd = TLS_TPRELGD;
37da22e5
AM
13643 if ((tls_mask & TLS_TLS) != 0
13644 && (tls_mask & TLS_GD) == 0)
102890f0 13645 goto tls_ldgd_opt;
951fd09b
AM
13646 }
13647 else if (retval == 3)
13648 {
37da22e5
AM
13649 if ((tls_mask & TLS_TLS) != 0
13650 && (tls_mask & TLS_LD) == 0)
102890f0 13651 goto tls_ldgd_opt;
951fd09b
AM
13652 }
13653 }
411e1bfb
AM
13654 }
13655 }
13656 break;
13657
9d6ded02
AM
13658 case R_PPC64_GOT_TPREL16_HI:
13659 case R_PPC64_GOT_TPREL16_HA:
37da22e5 13660 if ((tls_mask & TLS_TLS) != 0
9d6ded02
AM
13661 && (tls_mask & TLS_TPREL) == 0)
13662 {
13663 rel->r_offset -= d_offset;
95f0d0d2 13664 bfd_put_32 (input_bfd, NOP, contents + rel->r_offset);
9d6ded02
AM
13665 r_type = R_PPC64_NONE;
13666 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
13667 }
13668 break;
13669
411e1bfb
AM
13670 case R_PPC64_GOT_TPREL16_DS:
13671 case R_PPC64_GOT_TPREL16_LO_DS:
37da22e5 13672 if ((tls_mask & TLS_TLS) != 0
951fd09b 13673 && (tls_mask & TLS_TPREL) == 0)
411e1bfb 13674 {
81407a69 13675 toctprel:
95f0d0d2 13676 insn = bfd_get_32 (input_bfd,
c316a17c 13677 contents + rel->r_offset - d_offset);
411e1bfb
AM
13678 insn &= 31 << 21;
13679 insn |= 0x3c0d0000; /* addis 0,13,0 */
95f0d0d2 13680 bfd_put_32 (input_bfd, insn,
c316a17c 13681 contents + rel->r_offset - d_offset);
411e1bfb 13682 r_type = R_PPC64_TPREL16_HA;
0d4792f7
AM
13683 if (toc_symndx != 0)
13684 {
13685 rel->r_info = ELF64_R_INFO (toc_symndx, r_type);
3a71aa26 13686 rel->r_addend = toc_addend;
0d4792f7
AM
13687 /* We changed the symbol. Start over in order to
13688 get h, sym, sec etc. right. */
c316a17c 13689 goto again;
0d4792f7
AM
13690 }
13691 else
13692 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
411e1bfb
AM
13693 }
13694 break;
13695
13696 case R_PPC64_TLS:
37da22e5 13697 if ((tls_mask & TLS_TLS) != 0
951fd09b 13698 && (tls_mask & TLS_TPREL) == 0)
411e1bfb 13699 {
95f0d0d2 13700 insn = bfd_get_32 (input_bfd, contents + rel->r_offset);
2d0f3896
AM
13701 insn = _bfd_elf_ppc_at_tls_transform (insn, 13);
13702 if (insn == 0)
411e1bfb 13703 abort ();
95f0d0d2 13704 bfd_put_32 (input_bfd, insn, contents + rel->r_offset);
411e1bfb 13705 /* Was PPC64_TLS which sits on insn boundary, now
4fe5ca5b
GM
13706 PPC64_TPREL16_LO which is at low-order half-word. */
13707 rel->r_offset += d_offset;
0d4792f7
AM
13708 r_type = R_PPC64_TPREL16_LO;
13709 if (toc_symndx != 0)
13710 {
13711 rel->r_info = ELF64_R_INFO (toc_symndx, r_type);
3a71aa26 13712 rel->r_addend = toc_addend;
0d4792f7
AM
13713 /* We changed the symbol. Start over in order to
13714 get h, sym, sec etc. right. */
c316a17c 13715 goto again;
0d4792f7
AM
13716 }
13717 else
13718 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
411e1bfb
AM
13719 }
13720 break;
13721
411e1bfb
AM
13722 case R_PPC64_GOT_TLSGD16_HI:
13723 case R_PPC64_GOT_TLSGD16_HA:
951fd09b 13724 tls_gd = TLS_TPRELGD;
37da22e5 13725 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_GD) == 0)
951fd09b
AM
13726 goto tls_gdld_hi;
13727 break;
13728
411e1bfb
AM
13729 case R_PPC64_GOT_TLSLD16_HI:
13730 case R_PPC64_GOT_TLSLD16_HA:
37da22e5 13731 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_LD) == 0)
411e1bfb 13732 {
951fd09b
AM
13733 tls_gdld_hi:
13734 if ((tls_mask & tls_gd) != 0)
13735 r_type = (((r_type - (R_PPC64_GOT_TLSGD16 & 3)) & 3)
13736 + R_PPC64_GOT_TPREL16_DS);
13737 else
411e1bfb 13738 {
4fe5ca5b 13739 rel->r_offset -= d_offset;
95f0d0d2 13740 bfd_put_32 (input_bfd, NOP, contents + rel->r_offset);
951fd09b 13741 r_type = R_PPC64_NONE;
411e1bfb 13742 }
951fd09b 13743 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
411e1bfb
AM
13744 }
13745 break;
13746
951fd09b
AM
13747 case R_PPC64_GOT_TLSGD16:
13748 case R_PPC64_GOT_TLSGD16_LO:
13749 tls_gd = TLS_TPRELGD;
37da22e5 13750 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_GD) == 0)
102890f0 13751 goto tls_ldgd_opt;
951fd09b 13752 break;
411e1bfb 13753
951fd09b
AM
13754 case R_PPC64_GOT_TLSLD16:
13755 case R_PPC64_GOT_TLSLD16_LO:
37da22e5 13756 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_LD) == 0)
951fd09b 13757 {
b9f04fe0 13758 unsigned int insn1, insn2;
102890f0
AM
13759 bfd_vma offset;
13760
13761 tls_ldgd_opt:
727fc41e
AM
13762 offset = (bfd_vma) -1;
13763 /* If not using the newer R_PPC64_TLSGD/LD to mark
13764 __tls_get_addr calls, we must trust that the call
13765 stays with its arg setup insns, ie. that the next
13766 reloc is the __tls_get_addr call associated with
13767 the current reloc. Edit both insns. */
13768 if (input_section->has_tls_get_addr_call
13769 && rel + 1 < relend
13770 && branch_reloc_hash_match (input_bfd, rel + 1,
13771 htab->tls_get_addr,
13772 htab->tls_get_addr_fd))
13773 offset = rel[1].r_offset;
b86ac8e3
AM
13774 /* We read the low GOT_TLS (or TOC16) insn because we
13775 need to keep the destination reg. It may be
13776 something other than the usual r3, and moved to r3
13777 before the call by intervening code. */
95f0d0d2 13778 insn1 = bfd_get_32 (input_bfd,
b86ac8e3 13779 contents + rel->r_offset - d_offset);
102890f0 13780 if ((tls_mask & tls_gd) != 0)
411e1bfb 13781 {
102890f0 13782 /* IE */
b86ac8e3 13783 insn1 &= (0x1f << 21) | (0x1f << 16);
102890f0
AM
13784 insn1 |= 58 << 26; /* ld */
13785 insn2 = 0x7c636a14; /* add 3,3,13 */
727fc41e 13786 if (offset != (bfd_vma) -1)
f58d5a2d 13787 rel[1].r_info = ELF64_R_INFO (STN_UNDEF, R_PPC64_NONE);
102890f0
AM
13788 if ((tls_mask & TLS_EXPLICIT) == 0)
13789 r_type = (((r_type - (R_PPC64_GOT_TLSGD16 & 3)) & 3)
13790 + R_PPC64_GOT_TPREL16_DS);
411e1bfb 13791 else
102890f0
AM
13792 r_type += R_PPC64_TOC16_DS - R_PPC64_TOC16;
13793 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
13794 }
13795 else
13796 {
13797 /* LE */
b86ac8e3
AM
13798 insn1 &= 0x1f << 21;
13799 insn1 |= 0x3c0d0000; /* addis r,13,0 */
102890f0
AM
13800 insn2 = 0x38630000; /* addi 3,3,0 */
13801 if (tls_gd == 0)
951fd09b 13802 {
102890f0 13803 /* Was an LD reloc. */
1d483afe
AM
13804 if (toc_symndx)
13805 sec = local_sections[toc_symndx];
13806 for (r_symndx = 0;
13807 r_symndx < symtab_hdr->sh_info;
13808 r_symndx++)
13809 if (local_sections[r_symndx] == sec)
13810 break;
13811 if (r_symndx >= symtab_hdr->sh_info)
cf35638d 13812 r_symndx = STN_UNDEF;
102890f0 13813 rel->r_addend = htab->elf.tls_sec->vma + DTP_OFFSET;
cf35638d 13814 if (r_symndx != STN_UNDEF)
1d483afe
AM
13815 rel->r_addend -= (local_syms[r_symndx].st_value
13816 + sec->output_offset
13817 + sec->output_section->vma);
951fd09b 13818 }
102890f0 13819 else if (toc_symndx != 0)
3a71aa26
AM
13820 {
13821 r_symndx = toc_symndx;
13822 rel->r_addend = toc_addend;
13823 }
102890f0
AM
13824 r_type = R_PPC64_TPREL16_HA;
13825 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
727fc41e
AM
13826 if (offset != (bfd_vma) -1)
13827 {
13828 rel[1].r_info = ELF64_R_INFO (r_symndx,
13829 R_PPC64_TPREL16_LO);
13830 rel[1].r_offset = offset + d_offset;
13831 rel[1].r_addend = rel->r_addend;
13832 }
102890f0 13833 }
95f0d0d2 13834 bfd_put_32 (input_bfd, insn1,
3a71aa26 13835 contents + rel->r_offset - d_offset);
727fc41e 13836 if (offset != (bfd_vma) -1)
b9f04fe0 13837 bfd_put_32 (input_bfd, insn2, contents + offset);
727fc41e
AM
13838 if ((tls_mask & tls_gd) == 0
13839 && (tls_gd == 0 || toc_symndx != 0))
13840 {
13841 /* We changed the symbol. Start over in order
13842 to get h, sym, sec etc. right. */
c316a17c 13843 goto again;
727fc41e
AM
13844 }
13845 }
13846 break;
13847
13848 case R_PPC64_TLSGD:
37da22e5 13849 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_GD) == 0
675e2809 13850 && rel + 1 < relend)
727fc41e 13851 {
b9f04fe0 13852 unsigned int insn2;
727fc41e
AM
13853 bfd_vma offset = rel->r_offset;
13854
23cedd1d
AM
13855 if (is_plt_seq_reloc (ELF64_R_TYPE (rel[1].r_info)))
13856 {
13857 bfd_put_32 (output_bfd, NOP, contents + offset);
13858 rel[1].r_info = ELF64_R_INFO (STN_UNDEF, R_PPC64_NONE);
13859 break;
13860 }
13861
13862 if (ELF64_R_TYPE (rel[1].r_info) == R_PPC64_PLTCALL)
13863 bfd_put_32 (output_bfd, NOP, contents + offset + 4);
13864
727fc41e
AM
13865 if ((tls_mask & TLS_TPRELGD) != 0)
13866 {
13867 /* IE */
13868 r_type = R_PPC64_NONE;
13869 insn2 = 0x7c636a14; /* add 3,3,13 */
13870 }
13871 else
13872 {
13873 /* LE */
13874 if (toc_symndx != 0)
13875 {
13876 r_symndx = toc_symndx;
13877 rel->r_addend = toc_addend;
13878 }
13879 r_type = R_PPC64_TPREL16_LO;
13880 rel->r_offset = offset + d_offset;
13881 insn2 = 0x38630000; /* addi 3,3,0 */
13882 }
13883 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
13884 /* Zap the reloc on the _tls_get_addr call too. */
13885 BFD_ASSERT (offset == rel[1].r_offset);
f58d5a2d 13886 rel[1].r_info = ELF64_R_INFO (STN_UNDEF, R_PPC64_NONE);
95f0d0d2 13887 bfd_put_32 (input_bfd, insn2, contents + offset);
727fc41e 13888 if ((tls_mask & TLS_TPRELGD) == 0 && toc_symndx != 0)
c316a17c 13889 goto again;
411e1bfb 13890 }
411e1bfb
AM
13891 break;
13892
727fc41e 13893 case R_PPC64_TLSLD:
37da22e5 13894 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_LD) == 0
675e2809 13895 && rel + 1 < relend)
727fc41e 13896 {
b9f04fe0 13897 unsigned int insn2;
727fc41e
AM
13898 bfd_vma offset = rel->r_offset;
13899
23cedd1d
AM
13900 if (is_plt_seq_reloc (ELF64_R_TYPE (rel[1].r_info)))
13901 {
13902 bfd_put_32 (output_bfd, NOP, contents + offset);
13903 rel[1].r_info = ELF64_R_INFO (STN_UNDEF, R_PPC64_NONE);
13904 break;
13905 }
13906
13907 if (ELF64_R_TYPE (rel[1].r_info) == R_PPC64_PLTCALL)
13908 bfd_put_32 (output_bfd, NOP, contents + offset + 4);
13909
727fc41e
AM
13910 if (toc_symndx)
13911 sec = local_sections[toc_symndx];
13912 for (r_symndx = 0;
13913 r_symndx < symtab_hdr->sh_info;
13914 r_symndx++)
13915 if (local_sections[r_symndx] == sec)
13916 break;
13917 if (r_symndx >= symtab_hdr->sh_info)
cf35638d 13918 r_symndx = STN_UNDEF;
727fc41e 13919 rel->r_addend = htab->elf.tls_sec->vma + DTP_OFFSET;
cf35638d 13920 if (r_symndx != STN_UNDEF)
727fc41e
AM
13921 rel->r_addend -= (local_syms[r_symndx].st_value
13922 + sec->output_offset
13923 + sec->output_section->vma);
13924
13925 r_type = R_PPC64_TPREL16_LO;
13926 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
13927 rel->r_offset = offset + d_offset;
13928 /* Zap the reloc on the _tls_get_addr call too. */
13929 BFD_ASSERT (offset == rel[1].r_offset);
f58d5a2d 13930 rel[1].r_info = ELF64_R_INFO (STN_UNDEF, R_PPC64_NONE);
727fc41e 13931 insn2 = 0x38630000; /* addi 3,3,0 */
95f0d0d2 13932 bfd_put_32 (input_bfd, insn2, contents + offset);
c316a17c 13933 goto again;
727fc41e
AM
13934 }
13935 break;
13936
411e1bfb 13937 case R_PPC64_DTPMOD64:
951fd09b
AM
13938 if (rel + 1 < relend
13939 && rel[1].r_info == ELF64_R_INFO (r_symndx, R_PPC64_DTPREL64)
13940 && rel[1].r_offset == rel->r_offset + 8)
411e1bfb 13941 {
951fd09b
AM
13942 if ((tls_mask & TLS_GD) == 0)
13943 {
13944 rel[1].r_info = ELF64_R_INFO (r_symndx, R_PPC64_NONE);
13945 if ((tls_mask & TLS_TPRELGD) != 0)
13946 r_type = R_PPC64_TPREL64;
13947 else
13948 {
4ce794b7 13949 bfd_put_64 (output_bfd, 1, contents + rel->r_offset);
951fd09b
AM
13950 r_type = R_PPC64_NONE;
13951 }
13952 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
13953 }
13954 }
13955 else
13956 {
13957 if ((tls_mask & TLS_LD) == 0)
411e1bfb 13958 {
4ce794b7 13959 bfd_put_64 (output_bfd, 1, contents + rel->r_offset);
411e1bfb 13960 r_type = R_PPC64_NONE;
951fd09b 13961 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
411e1bfb 13962 }
411e1bfb
AM
13963 }
13964 break;
13965
13966 case R_PPC64_TPREL64:
951fd09b 13967 if ((tls_mask & TLS_TPREL) == 0)
411e1bfb
AM
13968 {
13969 r_type = R_PPC64_NONE;
13970 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
13971 }
13972 break;
52a82034 13973
006589cf
AM
13974 case R_PPC64_ENTRY:
13975 relocation = TOCstart + htab->sec_info[input_section->id].toc_off;
13976 if (!bfd_link_pic (info)
13977 && !info->traditional_format
13978 && relocation + 0x80008000 <= 0xffffffff)
13979 {
13980 unsigned int insn1, insn2;
13981
13982 insn1 = bfd_get_32 (input_bfd, contents + rel->r_offset);
13983 insn2 = bfd_get_32 (input_bfd, contents + rel->r_offset + 4);
13984 if ((insn1 & ~0xfffc) == LD_R2_0R12
13985 && insn2 == ADD_R2_R2_R12)
13986 {
95f0d0d2 13987 bfd_put_32 (input_bfd,
006589cf
AM
13988 LIS_R2 + PPC_HA (relocation),
13989 contents + rel->r_offset);
95f0d0d2 13990 bfd_put_32 (input_bfd,
006589cf
AM
13991 ADDI_R2_R2 + PPC_LO (relocation),
13992 contents + rel->r_offset + 4);
13993 }
13994 }
13995 else
13996 {
13997 relocation -= (rel->r_offset
13998 + input_section->output_offset
13999 + input_section->output_section->vma);
14000 if (relocation + 0x80008000 <= 0xffffffff)
14001 {
14002 unsigned int insn1, insn2;
14003
14004 insn1 = bfd_get_32 (input_bfd, contents + rel->r_offset);
14005 insn2 = bfd_get_32 (input_bfd, contents + rel->r_offset + 4);
14006 if ((insn1 & ~0xfffc) == LD_R2_0R12
14007 && insn2 == ADD_R2_R2_R12)
14008 {
95f0d0d2 14009 bfd_put_32 (input_bfd,
006589cf
AM
14010 ADDIS_R2_R12 + PPC_HA (relocation),
14011 contents + rel->r_offset);
95f0d0d2 14012 bfd_put_32 (input_bfd,
006589cf
AM
14013 ADDI_R2_R2 + PPC_LO (relocation),
14014 contents + rel->r_offset + 4);
14015 }
14016 }
14017 }
14018 break;
14019
52a82034
AM
14020 case R_PPC64_REL16_HA:
14021 /* If we are generating a non-PIC executable, edit
14022 . 0: addis 2,12,.TOC.-0b@ha
14023 . addi 2,2,.TOC.-0b@l
14024 used by ELFv2 global entry points to set up r2, to
14025 . lis 2,.TOC.@ha
14026 . addi 2,2,.TOC.@l
14027 if .TOC. is in range. */
0e1862bb 14028 if (!bfd_link_pic (info)
810d4e75 14029 && !info->traditional_format
006589cf 14030 && !htab->opd_abi
4f038ee5 14031 && rel->r_addend == d_offset
52a82034
AM
14032 && h != NULL && &h->elf == htab->elf.hgot
14033 && rel + 1 < relend
14034 && rel[1].r_info == ELF64_R_INFO (r_symndx, R_PPC64_REL16_LO)
14035 && rel[1].r_offset == rel->r_offset + 4
14036 && rel[1].r_addend == rel->r_addend + 4
14037 && relocation + 0x80008000 <= 0xffffffff)
14038 {
14039 unsigned int insn1, insn2;
14040 bfd_vma offset = rel->r_offset - d_offset;
95f0d0d2
AM
14041 insn1 = bfd_get_32 (input_bfd, contents + offset);
14042 insn2 = bfd_get_32 (input_bfd, contents + offset + 4);
006589cf
AM
14043 if ((insn1 & 0xffff0000) == ADDIS_R2_R12
14044 && (insn2 & 0xffff0000) == ADDI_R2_R2)
52a82034
AM
14045 {
14046 r_type = R_PPC64_ADDR16_HA;
14047 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
14048 rel->r_addend -= d_offset;
14049 rel[1].r_info = ELF64_R_INFO (r_symndx, R_PPC64_ADDR16_LO);
14050 rel[1].r_addend -= d_offset + 4;
95f0d0d2 14051 bfd_put_32 (input_bfd, LIS_R2, contents + offset);
52a82034
AM
14052 }
14053 }
14054 break;
411e1bfb
AM
14055 }
14056
14057 /* Handle other relocations that tweak non-addend part of insn. */
86c76c7b 14058 insn = 0;
b25116a9
AM
14059 max_br_offset = 1 << 25;
14060 addend = rel->r_addend;
bc30df16 14061 reloc_dest = DEST_NORMAL;
65f38f15 14062 switch (r_type)
5bd4f169
AM
14063 {
14064 default:
65f38f15 14065 break;
5bd4f169 14066
3b421ab3
AM
14067 case R_PPC64_TOCSAVE:
14068 if (relocation + addend == (rel->r_offset
14069 + input_section->output_offset
14070 + input_section->output_section->vma)
14071 && tocsave_find (htab, NO_INSERT,
14072 &local_syms, rel, input_bfd))
14073 {
14074 insn = bfd_get_32 (input_bfd, contents + rel->r_offset);
14075 if (insn == NOP
14076 || insn == CROR_151515 || insn == CROR_313131)
a078d95a
AM
14077 bfd_put_32 (input_bfd,
14078 STD_R2_0R1 + STK_TOC (htab),
3b421ab3
AM
14079 contents + rel->r_offset);
14080 }
14081 break;
14082
65f38f15
AM
14083 /* Branch taken prediction relocations. */
14084 case R_PPC64_ADDR14_BRTAKEN:
14085 case R_PPC64_REL14_BRTAKEN:
cedb70c5 14086 insn = 0x01 << 21; /* 'y' or 't' bit, lowest bit of BO field. */
1a0670f3 14087 /* Fall through. */
65f38f15 14088
86c76c7b 14089 /* Branch not taken prediction relocations. */
65f38f15
AM
14090 case R_PPC64_ADDR14_BRNTAKEN:
14091 case R_PPC64_REL14_BRNTAKEN:
95f0d0d2 14092 insn |= bfd_get_32 (input_bfd,
411e1bfb 14093 contents + rel->r_offset) & ~(0x01 << 21);
1a0670f3 14094 /* Fall through. */
86c76c7b 14095
b25116a9
AM
14096 case R_PPC64_REL14:
14097 max_br_offset = 1 << 15;
1a0670f3 14098 /* Fall through. */
5bd4f169 14099
65f38f15 14100 case R_PPC64_REL24:
05d0e962 14101 case R_PPC64_REL24_NOTOC:
23cedd1d 14102 case R_PPC64_PLTCALL:
ad8e1ba5
AM
14103 /* Calls to functions with a different TOC, such as calls to
14104 shared objects, need to alter the TOC pointer. This is
14105 done using a linkage stub. A REL24 branching to these
14106 linkage stubs needs to be followed by a nop, as the nop
14107 will be replaced with an instruction to restore the TOC
14108 base pointer. */
8387904d 14109 fdh = h;
b31867b6
AM
14110 if (h != NULL
14111 && h->oh != NULL
14112 && h->oh->is_func_descriptor)
14113 fdh = ppc_follow_link (h->oh);
31c76678
DK
14114 stub_entry = ppc_get_stub_entry (input_section, sec, fdh, &orig_rel,
14115 htab);
23cedd1d
AM
14116 if (r_type == R_PPC64_PLTCALL
14117 && stub_entry != NULL
05d0e962
AM
14118 && stub_entry->stub_type >= ppc_stub_plt_call
14119 && stub_entry->stub_type <= ppc_stub_plt_call_both)
23cedd1d
AM
14120 stub_entry = NULL;
14121
6abec6bc 14122 if (stub_entry != NULL
d0abeec8
AM
14123 && ((stub_entry->stub_type >= ppc_stub_plt_call
14124 && stub_entry->stub_type <= ppc_stub_plt_call_both)
ad8e1ba5 14125 || stub_entry->stub_type == ppc_stub_plt_branch_r2off
05d0e962
AM
14126 || stub_entry->stub_type == ppc_stub_plt_branch_both
14127 || stub_entry->stub_type == ppc_stub_long_branch_r2off
14128 || stub_entry->stub_type == ppc_stub_long_branch_both))
41bd81ab 14129 {
b25116a9 14130 bfd_boolean can_plt_call = FALSE;
721956f4 14131
6e1816be
AM
14132 if (stub_entry->stub_type == ppc_stub_plt_call
14133 && !htab->opd_abi
14134 && htab->params->plt_localentry0 != 0
14135 && is_elfv2_localentry0 (&h->elf))
14136 {
14137 /* The function doesn't use or change r2. */
14138 can_plt_call = TRUE;
14139 }
05d0e962
AM
14140 else if (r_type == R_PPC64_REL24_NOTOC)
14141 {
14142 /* NOTOC calls don't need to restore r2. */
14143 can_plt_call = TRUE;
14144 }
6e1816be 14145
f378ab09 14146 /* All of these stubs may modify r2, so there must be a
ba8ca3e7
AM
14147 branch and link followed by a nop. The nop is
14148 replaced by an insn to restore r2. */
6e1816be 14149 else if (rel->r_offset + 8 <= input_section->size)
41bd81ab 14150 {
ba8ca3e7
AM
14151 unsigned long br;
14152
14153 br = bfd_get_32 (input_bfd,
14154 contents + rel->r_offset);
14155 if ((br & 1) != 0)
41bd81ab 14156 {
ba8ca3e7
AM
14157 unsigned long nop;
14158
14159 nop = bfd_get_32 (input_bfd,
14160 contents + rel->r_offset + 4);
23cedd1d
AM
14161 if (nop == LD_R2_0R1 + STK_TOC (htab))
14162 can_plt_call = TRUE;
14163 else if (nop == NOP
14164 || nop == CROR_151515
14165 || nop == CROR_313131)
a7f2871e 14166 {
ba8ca3e7
AM
14167 if (h != NULL
14168 && (h == htab->tls_get_addr_fd
14169 || h == htab->tls_get_addr)
7c9cf415 14170 && htab->params->tls_get_addr_opt)
ba8ca3e7
AM
14171 {
14172 /* Special stub used, leave nop alone. */
14173 }
14174 else
a078d95a
AM
14175 bfd_put_32 (input_bfd,
14176 LD_R2_0R1 + STK_TOC (htab),
ba8ca3e7
AM
14177 contents + rel->r_offset + 4);
14178 can_plt_call = TRUE;
a7f2871e 14179 }
41bd81ab 14180 }
5bd4f169 14181 }
721956f4 14182
ba8ca3e7 14183 if (!can_plt_call && h != NULL)
721956f4 14184 {
ba8ca3e7
AM
14185 const char *name = h->elf.root.root.string;
14186
14187 if (*name == '.')
14188 ++name;
14189
14190 if (strncmp (name, "__libc_start_main", 17) == 0
14191 && (name[17] == 0 || name[17] == '@'))
6ab189d5 14192 {
ba8ca3e7
AM
14193 /* Allow crt1 branch to go via a toc adjusting
14194 stub. Other calls that never return could do
14195 the same, if we could detect such. */
b25116a9 14196 can_plt_call = TRUE;
6ab189d5 14197 }
ba8ca3e7
AM
14198 }
14199
14200 if (!can_plt_call)
14201 {
14202 /* g++ as of 20130507 emits self-calls without a
14203 following nop. This is arguably wrong since we
14204 have conflicting information. On the one hand a
14205 global symbol and on the other a local call
14206 sequence, but don't error for this special case.
14207 It isn't possible to cheaply verify we have
14208 exactly such a call. Allow all calls to the same
14209 section. */
14210 asection *code_sec = sec;
14211
14212 if (get_opd_info (sec) != NULL)
ad8e1ba5 14213 {
ba8ca3e7
AM
14214 bfd_vma off = (relocation + addend
14215 - sec->output_section->vma
14216 - sec->output_offset);
bc30df16 14217
ba8ca3e7 14218 opd_entry_value (sec, off, &code_sec, NULL, FALSE);
ad8e1ba5 14219 }
ba8ca3e7
AM
14220 if (code_sec == input_section)
14221 can_plt_call = TRUE;
14222 }
14223
14224 if (!can_plt_call)
14225 {
05d0e962
AM
14226 if (stub_entry->stub_type >= ppc_stub_plt_call
14227 && stub_entry->stub_type <= ppc_stub_plt_call_both)
4805fc55 14228 info->callbacks->einfo
695344c0 14229 /* xgettext:c-format */
c1c8c1ef 14230 (_("%H: call to `%pT' lacks nop, can't restore toc; "
f53ad3cf 14231 "(plt call stub)\n"),
4805fc55
AM
14232 input_bfd, input_section, rel->r_offset, sym_name);
14233 else
14234 info->callbacks->einfo
695344c0 14235 /* xgettext:c-format */
c1c8c1ef 14236 (_("%H: call to `%pT' lacks nop, can't restore toc; "
f53ad3cf 14237 "(toc save/adjust stub)\n"),
4805fc55 14238 input_bfd, input_section, rel->r_offset, sym_name);
ba8ca3e7
AM
14239
14240 bfd_set_error (bfd_error_bad_value);
14241 ret = FALSE;
721956f4
AM
14242 }
14243
b25116a9 14244 if (can_plt_call
05d0e962
AM
14245 && stub_entry->stub_type >= ppc_stub_plt_call
14246 && stub_entry->stub_type <= ppc_stub_plt_call_both)
b25116a9
AM
14247 unresolved_reloc = FALSE;
14248 }
14249
6abec6bc
AM
14250 if ((stub_entry == NULL
14251 || stub_entry->stub_type == ppc_stub_long_branch
14252 || stub_entry->stub_type == ppc_stub_plt_branch)
8387904d
AM
14253 && get_opd_info (sec) != NULL)
14254 {
14255 /* The branch destination is the value of the opd entry. */
4cc603a5
AM
14256 bfd_vma off = (relocation + addend
14257 - sec->output_section->vma
14258 - sec->output_offset);
aef36ac1 14259 bfd_vma dest = opd_entry_value (sec, off, NULL, NULL, FALSE);
8387904d
AM
14260 if (dest != (bfd_vma) -1)
14261 {
14262 relocation = dest;
14263 addend = 0;
bc30df16 14264 reloc_dest = DEST_OPD;
8387904d
AM
14265 }
14266 }
14267
b25116a9
AM
14268 /* If the branch is out of reach we ought to have a long
14269 branch stub. */
14270 from = (rel->r_offset
14271 + input_section->output_offset
14272 + input_section->output_section->vma);
14273
6911b7dc
AM
14274 relocation += PPC64_LOCAL_ENTRY_OFFSET (fdh
14275 ? fdh->elf.other
14276 : sym->st_other);
14277
6abec6bc
AM
14278 if (stub_entry != NULL
14279 && (stub_entry->stub_type == ppc_stub_long_branch
14280 || stub_entry->stub_type == ppc_stub_plt_branch)
14281 && (r_type == R_PPC64_ADDR14_BRTAKEN
14282 || r_type == R_PPC64_ADDR14_BRNTAKEN
14283 || (relocation + addend - from + max_br_offset
14284 < 2 * max_br_offset)))
14285 /* Don't use the stub if this branch is in range. */
14286 stub_entry = NULL;
b25116a9 14287
05d0e962
AM
14288 if (stub_entry != NULL
14289 && (stub_entry->stub_type == ppc_stub_long_branch_notoc
14290 || stub_entry->stub_type == ppc_stub_long_branch_both
14291 || stub_entry->stub_type == ppc_stub_plt_branch_notoc
14292 || stub_entry->stub_type == ppc_stub_plt_branch_both)
14293 && (r_type != R_PPC64_REL24_NOTOC
14294 || ((fdh ? fdh->elf.other : sym->st_other)
14295 & STO_PPC64_LOCAL_MASK) == 1 << STO_PPC64_LOCAL_BIT)
14296 && (relocation + addend - from + max_br_offset
14297 < 2 * max_br_offset))
14298 stub_entry = NULL;
14299
14300 if (stub_entry != NULL
14301 && (stub_entry->stub_type == ppc_stub_long_branch_r2off
14302 || stub_entry->stub_type == ppc_stub_long_branch_both
14303 || stub_entry->stub_type == ppc_stub_plt_branch_r2off
14304 || stub_entry->stub_type == ppc_stub_plt_branch_both)
14305 && r_type == R_PPC64_REL24_NOTOC
14306 && (relocation + addend - from + max_br_offset
14307 < 2 * max_br_offset))
14308 stub_entry = NULL;
14309
b25116a9
AM
14310 if (stub_entry != NULL)
14311 {
14312 /* Munge up the value and addend so that we call the stub
14313 rather than the procedure directly. */
a4b6fadd
AM
14314 asection *stub_sec = stub_entry->group->stub_sec;
14315
14316 if (stub_entry->stub_type == ppc_stub_save_res)
14317 relocation += (stub_sec->output_offset
14318 + stub_sec->output_section->vma
14319 + stub_sec->size - htab->sfpr->size
14320 - htab->sfpr->output_offset
14321 - htab->sfpr->output_section->vma);
14322 else
14323 relocation = (stub_entry->stub_offset
14324 + stub_sec->output_offset
14325 + stub_sec->output_section->vma);
b25116a9 14326 addend = 0;
bc30df16 14327 reloc_dest = DEST_STUB;
3b421ab3 14328
05d0e962
AM
14329 if (((stub_entry->stub_type == ppc_stub_plt_call
14330 && ALWAYS_EMIT_R2SAVE)
14331 || stub_entry->stub_type == ppc_stub_plt_call_r2save
14332 || stub_entry->stub_type == ppc_stub_plt_call_both)
e81b4c93
AM
14333 && !(h != NULL
14334 && (h == htab->tls_get_addr_fd
14335 || h == htab->tls_get_addr)
14336 && htab->params->tls_get_addr_opt)
3b421ab3
AM
14337 && rel + 1 < relend
14338 && rel[1].r_offset == rel->r_offset + 4
14339 && ELF64_R_TYPE (rel[1].r_info) == R_PPC64_TOCSAVE)
14340 relocation += 4;
05d0e962
AM
14341 else if ((stub_entry->stub_type == ppc_stub_long_branch_both
14342 || stub_entry->stub_type == ppc_stub_plt_branch_both
14343 || stub_entry->stub_type == ppc_stub_plt_call_both)
14344 && r_type == R_PPC64_REL24_NOTOC)
14345 relocation += 4;
b25116a9
AM
14346 }
14347
14348 if (insn != 0)
14349 {
794e51c0 14350 if (is_isa_v2)
721956f4 14351 {
b25116a9
AM
14352 /* Set 'a' bit. This is 0b00010 in BO field for branch
14353 on CR(BI) insns (BO == 001at or 011at), and 0b01000
14354 for branch on CTR insns (BO == 1a00t or 1a01t). */
14355 if ((insn & (0x14 << 21)) == (0x04 << 21))
14356 insn |= 0x02 << 21;
14357 else if ((insn & (0x14 << 21)) == (0x10 << 21))
14358 insn |= 0x08 << 21;
14359 else
14360 break;
14361 }
14362 else
14363 {
14364 /* Invert 'y' bit if not the default. */
4cc603a5 14365 if ((bfd_signed_vma) (relocation + addend - from) < 0)
b25116a9 14366 insn ^= 0x01 << 21;
721956f4 14367 }
b25116a9 14368
95f0d0d2 14369 bfd_put_32 (input_bfd, insn, contents + rel->r_offset);
5bd4f169 14370 }
e86ce104 14371
06da1e8e
AM
14372 /* NOP out calls to undefined weak functions.
14373 We can thus call a weak function without first
14374 checking whether the function is defined. */
b25116a9 14375 else if (h != NULL
039b3fef 14376 && h->elf.root.type == bfd_link_hash_undefweak
766bc656 14377 && h->elf.dynindx == -1
05d0e962
AM
14378 && (r_type == R_PPC64_REL24
14379 || r_type == R_PPC64_REL24_NOTOC)
b25116a9 14380 && relocation == 0
4cc603a5 14381 && addend == 0)
e86ce104 14382 {
95f0d0d2 14383 bfd_put_32 (input_bfd, NOP, contents + rel->r_offset);
c316a17c 14384 goto copy_reloc;
e86ce104 14385 }
65f38f15
AM
14386 break;
14387 }
5bd4f169 14388
65f38f15 14389 /* Set `addend'. */
411e1bfb 14390 tls_type = 0;
23cedd1d 14391 save_unresolved_reloc = unresolved_reloc;
65f38f15
AM
14392 switch (r_type)
14393 {
14394 default:
cf97bcb0
AM
14395 /* xgettext:c-format */
14396 _bfd_error_handler (_("%pB: %s unsupported"),
14397 input_bfd, ppc64_elf_howto_table[r_type]->name);
5bd4f169 14398
65f38f15 14399 bfd_set_error (bfd_error_bad_value);
b34976b6 14400 ret = FALSE;
c316a17c 14401 goto copy_reloc;
5bd4f169 14402
65f38f15 14403 case R_PPC64_NONE:
411e1bfb 14404 case R_PPC64_TLS:
727fc41e
AM
14405 case R_PPC64_TLSGD:
14406 case R_PPC64_TLSLD:
3b421ab3 14407 case R_PPC64_TOCSAVE:
04c9666a
AM
14408 case R_PPC64_GNU_VTINHERIT:
14409 case R_PPC64_GNU_VTENTRY:
006589cf 14410 case R_PPC64_ENTRY:
c316a17c 14411 goto copy_reloc;
5bd4f169
AM
14412
14413 /* GOT16 relocations. Like an ADDR16 using the symbol's
14414 address in the GOT as relocation value instead of the
411e1bfb 14415 symbol's value itself. Also, create a GOT entry for the
5bd4f169 14416 symbol and put the symbol value there. */
411e1bfb
AM
14417 case R_PPC64_GOT_TLSGD16:
14418 case R_PPC64_GOT_TLSGD16_LO:
14419 case R_PPC64_GOT_TLSGD16_HI:
14420 case R_PPC64_GOT_TLSGD16_HA:
951fd09b 14421 tls_type = TLS_TLS | TLS_GD;
411e1bfb
AM
14422 goto dogot;
14423
14424 case R_PPC64_GOT_TLSLD16:
14425 case R_PPC64_GOT_TLSLD16_LO:
14426 case R_PPC64_GOT_TLSLD16_HI:
14427 case R_PPC64_GOT_TLSLD16_HA:
951fd09b 14428 tls_type = TLS_TLS | TLS_LD;
411e1bfb
AM
14429 goto dogot;
14430
14431 case R_PPC64_GOT_TPREL16_DS:
14432 case R_PPC64_GOT_TPREL16_LO_DS:
14433 case R_PPC64_GOT_TPREL16_HI:
14434 case R_PPC64_GOT_TPREL16_HA:
14435 tls_type = TLS_TLS | TLS_TPREL;
14436 goto dogot;
14437
14438 case R_PPC64_GOT_DTPREL16_DS:
14439 case R_PPC64_GOT_DTPREL16_LO_DS:
14440 case R_PPC64_GOT_DTPREL16_HI:
14441 case R_PPC64_GOT_DTPREL16_HA:
14442 tls_type = TLS_TLS | TLS_DTPREL;
14443 goto dogot;
14444
65f38f15
AM
14445 case R_PPC64_GOT16:
14446 case R_PPC64_GOT16_LO:
14447 case R_PPC64_GOT16_HI:
14448 case R_PPC64_GOT16_HA:
14449 case R_PPC64_GOT16_DS:
14450 case R_PPC64_GOT16_LO_DS:
411e1bfb 14451 dogot:
5bd4f169
AM
14452 {
14453 /* Relocation is to the entry for this symbol in the global
14454 offset table. */
e717da7e 14455 asection *got;
d881513a 14456 bfd_vma *offp;
5bd4f169 14457 bfd_vma off;
d881513a 14458 unsigned long indx = 0;
927be08e 14459 struct got_entry *ent;
65f38f15 14460
d881513a
AM
14461 if (tls_type == (TLS_TLS | TLS_LD)
14462 && (h == NULL
f5385ebf 14463 || !h->elf.def_dynamic))
927be08e 14464 ent = ppc64_tlsld_got (input_bfd);
411e1bfb 14465 else
5bd4f169 14466 {
d881513a
AM
14467 if (h != NULL)
14468 {
f0158f44
AM
14469 if (!htab->elf.dynamic_sections_created
14470 || h->elf.dynindx == -1
14471 || SYMBOL_REFERENCES_LOCAL (info, &h->elf)
21d68fcd 14472 || UNDEFWEAK_NO_DYNAMIC_RELOC (info, &h->elf))
d881513a
AM
14473 /* This is actually a static link, or it is a
14474 -Bsymbolic link and the symbol is defined
14475 locally, or the symbol was forced to be local
14476 because of a version file. */
14477 ;
14478 else
14479 {
039b3fef 14480 indx = h->elf.dynindx;
d881513a
AM
14481 unresolved_reloc = FALSE;
14482 }
039b3fef 14483 ent = h->elf.got.glist;
d881513a 14484 }
411e1bfb 14485 else
5bd4f169 14486 {
d881513a
AM
14487 if (local_got_ents == NULL)
14488 abort ();
14489 ent = local_got_ents[r_symndx];
5bd4f169 14490 }
d881513a
AM
14491
14492 for (; ent != NULL; ent = ent->next)
31c76678 14493 if (ent->addend == orig_rel.r_addend
e717da7e 14494 && ent->owner == input_bfd
d881513a
AM
14495 && ent->tls_type == tls_type)
14496 break;
5bd4f169 14497 }
411e1bfb 14498
927be08e
AM
14499 if (ent == NULL)
14500 abort ();
14501 if (ent->is_indirect)
14502 ent = ent->got.ent;
14503 offp = &ent->got.offset;
14504 got = ppc64_elf_tdata (ent->owner)->got;
e717da7e
AM
14505 if (got == NULL)
14506 abort ();
14507
411e1bfb
AM
14508 /* The offset must always be a multiple of 8. We use the
14509 least significant bit to record whether we have already
14510 processed this entry. */
d881513a 14511 off = *offp;
411e1bfb
AM
14512 if ((off & 1) != 0)
14513 off &= ~1;
5bd4f169
AM
14514 else
14515 {
411e1bfb
AM
14516 /* Generate relocs for the dynamic linker, except in
14517 the case of TLSLD where we'll use one entry per
14518 module. */
25f23106
AM
14519 asection *relgot;
14520 bfd_boolean ifunc;
e717da7e 14521
d881513a 14522 *offp = off | 1;
25f23106
AM
14523 relgot = NULL;
14524 ifunc = (h != NULL
14525 ? h->elf.type == STT_GNU_IFUNC
14526 : ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC);
19e08130 14527 if (ifunc)
82e66161
AM
14528 {
14529 relgot = htab->elf.irelplt;
14530 if (indx == 0)
14531 htab->local_ifunc_resolver = 1;
14532 else if (is_static_defined (&h->elf))
14533 htab->maybe_local_ifunc_resolver = 1;
14534 }
f0158f44
AM
14535 else if (indx != 0
14536 || (bfd_link_pic (info)
14537 && (h == NULL
21d68fcd 14538 || !UNDEFWEAK_NO_DYNAMIC_RELOC (info, &h->elf)
f0158f44 14539 || (tls_type == (TLS_TLS | TLS_LD)
f15d0b54
AM
14540 && !h->elf.def_dynamic))
14541 && !(tls_type == (TLS_TLS | TLS_TPREL)
14542 && bfd_link_executable (info)
14543 && SYMBOL_REFERENCES_LOCAL (info, &h->elf))))
19e08130 14544 relgot = ppc64_elf_tdata (ent->owner)->relgot;
25f23106 14545 if (relgot != NULL)
5bd4f169 14546 {
e717da7e
AM
14547 outrel.r_offset = (got->output_section->vma
14548 + got->output_offset
411e1bfb 14549 + off);
4cc603a5 14550 outrel.r_addend = addend;
d881513a 14551 if (tls_type & (TLS_LD | TLS_GD))
5bd4f169 14552 {
411e1bfb 14553 outrel.r_addend = 0;
e515b051 14554 outrel.r_info = ELF64_R_INFO (indx, R_PPC64_DTPMOD64);
d881513a
AM
14555 if (tls_type == (TLS_TLS | TLS_GD))
14556 {
e717da7e
AM
14557 loc = relgot->contents;
14558 loc += (relgot->reloc_count++
d881513a
AM
14559 * sizeof (Elf64_External_Rela));
14560 bfd_elf64_swap_reloca_out (output_bfd,
14561 &outrel, loc);
e515b051 14562 outrel.r_offset += 8;
4cc603a5 14563 outrel.r_addend = addend;
d881513a
AM
14564 outrel.r_info
14565 = ELF64_R_INFO (indx, R_PPC64_DTPREL64);
d881513a 14566 }
411e1bfb 14567 }
951fd09b 14568 else if (tls_type == (TLS_TLS | TLS_DTPREL))
411e1bfb 14569 outrel.r_info = ELF64_R_INFO (indx, R_PPC64_DTPREL64);
951fd09b 14570 else if (tls_type == (TLS_TLS | TLS_TPREL))
411e1bfb 14571 outrel.r_info = ELF64_R_INFO (indx, R_PPC64_TPREL64);
25f23106
AM
14572 else if (indx != 0)
14573 outrel.r_info = ELF64_R_INFO (indx, R_PPC64_GLOB_DAT);
14574 else
81407a69 14575 {
25f23106
AM
14576 if (ifunc)
14577 outrel.r_info = ELF64_R_INFO (0, R_PPC64_IRELATIVE);
14578 else
14579 outrel.r_info = ELF64_R_INFO (0, R_PPC64_RELATIVE);
81407a69
AM
14580
14581 /* Write the .got section contents for the sake
14582 of prelink. */
e717da7e 14583 loc = got->contents + off;
23fbd6fa
JJ
14584 bfd_put_64 (output_bfd, outrel.r_addend + relocation,
14585 loc);
81407a69 14586 }
81407a69
AM
14587
14588 if (indx == 0 && tls_type != (TLS_TLS | TLS_LD))
e515b051
AM
14589 {
14590 outrel.r_addend += relocation;
14591 if (tls_type & (TLS_GD | TLS_DTPREL | TLS_TPREL))
989f9879
AM
14592 {
14593 if (htab->elf.tls_sec == NULL)
14594 outrel.r_addend = 0;
14595 else
14596 outrel.r_addend -= htab->elf.tls_sec->vma;
14597 }
e515b051 14598 }
e717da7e
AM
14599 loc = relgot->contents;
14600 loc += (relgot->reloc_count++
411e1bfb
AM
14601 * sizeof (Elf64_External_Rela));
14602 bfd_elf64_swap_reloca_out (output_bfd, &outrel, loc);
14603 }
14604
ad8e1ba5 14605 /* Init the .got section contents here if we're not
81407a69 14606 emitting a reloc. */
d881513a 14607 else
411e1bfb 14608 {
4cc603a5 14609 relocation += addend;
f0158f44 14610 if (tls_type != 0)
411e1bfb 14611 {
989f9879
AM
14612 if (htab->elf.tls_sec == NULL)
14613 relocation = 0;
14614 else
14615 {
f0158f44
AM
14616 if (tls_type & TLS_LD)
14617 relocation = 0;
14618 else
14619 relocation -= htab->elf.tls_sec->vma + DTP_OFFSET;
676ee2b5 14620 if (tls_type & TLS_TPREL)
989f9879
AM
14621 relocation += DTP_OFFSET - TP_OFFSET;
14622 }
5bd4f169 14623
f0158f44 14624 if (tls_type & (TLS_GD | TLS_LD))
7b609f53
AM
14625 {
14626 bfd_put_64 (output_bfd, relocation,
e717da7e 14627 got->contents + off + 8);
676ee2b5 14628 relocation = 1;
7b609f53 14629 }
411e1bfb
AM
14630 }
14631 bfd_put_64 (output_bfd, relocation,
e717da7e 14632 got->contents + off);
5bd4f169
AM
14633 }
14634 }
14635
65f38f15
AM
14636 if (off >= (bfd_vma) -2)
14637 abort ();
14638
bf102f86 14639 relocation = got->output_section->vma + got->output_offset + off;
6f20ed8a 14640 addend = -(TOCstart + htab->sec_info[input_section->id].toc_off);
5bd4f169 14641 }
65f38f15
AM
14642 break;
14643
14644 case R_PPC64_PLT16_HA:
14645 case R_PPC64_PLT16_HI:
14646 case R_PPC64_PLT16_LO:
08be3224 14647 case R_PPC64_PLT16_LO_DS:
65f38f15
AM
14648 case R_PPC64_PLT32:
14649 case R_PPC64_PLT64:
23cedd1d
AM
14650 case R_PPC64_PLTSEQ:
14651 case R_PPC64_PLTCALL:
65f38f15
AM
14652 /* Relocation is to the entry for this symbol in the
14653 procedure linkage table. */
23cedd1d 14654 unresolved_reloc = TRUE;
cbf95972
AM
14655 {
14656 struct plt_entry **plt_list = NULL;
14657 if (h != NULL)
14658 plt_list = &h->elf.plt.plist;
14659 else if (local_got_ents != NULL)
14660 {
14661 struct plt_entry **local_plt = (struct plt_entry **)
14662 (local_got_ents + symtab_hdr->sh_info);
2d7ad24e 14663 plt_list = local_plt + r_symndx;
cbf95972
AM
14664 }
14665 if (plt_list)
14666 {
14667 struct plt_entry *ent;
65f38f15 14668
cbf95972
AM
14669 for (ent = *plt_list; ent != NULL; ent = ent->next)
14670 if (ent->plt.offset != (bfd_vma) -1
14671 && ent->addend == orig_rel.r_addend)
14672 {
14673 asection *plt;
08be3224 14674 bfd_vma got;
cbf95972
AM
14675
14676 plt = htab->elf.splt;
14677 if (!htab->elf.dynamic_sections_created
14678 || h == NULL
14679 || h->elf.dynindx == -1)
2d7ad24e
AM
14680 {
14681 if (h != NULL
14682 ? h->elf.type == STT_GNU_IFUNC
14683 : ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC)
14684 plt = htab->elf.iplt;
14685 else
14686 plt = htab->pltlocal;
14687 }
14688 relocation = (plt->output_section->vma
14689 + plt->output_offset
14690 + ent->plt.offset);
08be3224 14691 if (r_type == R_PPC64_PLT16_HA
2cdcc330
AM
14692 || r_type == R_PPC64_PLT16_HI
14693 || r_type == R_PPC64_PLT16_LO
14694 || r_type == R_PPC64_PLT16_LO_DS)
08be3224
AM
14695 {
14696 got = (elf_gp (output_bfd)
14697 + htab->sec_info[input_section->id].toc_off);
14698 relocation -= got;
14699 }
cbf95972
AM
14700 addend = 0;
14701 unresolved_reloc = FALSE;
14702 break;
14703 }
14704 }
14705 }
65f38f15 14706 break;
5bd4f169 14707
0b13192e
AM
14708 case R_PPC64_TOC:
14709 /* Relocation value is TOC base. */
14710 relocation = TOCstart;
cf35638d 14711 if (r_symndx == STN_UNDEF)
6f20ed8a 14712 relocation += htab->sec_info[input_section->id].toc_off;
8517fae7
AM
14713 else if (unresolved_reloc)
14714 ;
6f20ed8a
AM
14715 else if (sec != NULL && sec->id < htab->sec_info_arr_size)
14716 relocation += htab->sec_info[sec->id].toc_off;
0b13192e
AM
14717 else
14718 unresolved_reloc = TRUE;
ab96bf03 14719 goto dodyn;
0b13192e 14720
5bd4f169
AM
14721 /* TOC16 relocs. We want the offset relative to the TOC base,
14722 which is the address of the start of the TOC plus 0x8000.
14723 The TOC consists of sections .got, .toc, .tocbss, and .plt,
14724 in this order. */
65f38f15
AM
14725 case R_PPC64_TOC16:
14726 case R_PPC64_TOC16_LO:
14727 case R_PPC64_TOC16_HI:
14728 case R_PPC64_TOC16_DS:
14729 case R_PPC64_TOC16_LO_DS:
14730 case R_PPC64_TOC16_HA:
6f20ed8a 14731 addend -= TOCstart + htab->sec_info[input_section->id].toc_off;
5bd4f169
AM
14732 break;
14733
14734 /* Relocate against the beginning of the section. */
65f38f15
AM
14735 case R_PPC64_SECTOFF:
14736 case R_PPC64_SECTOFF_LO:
14737 case R_PPC64_SECTOFF_HI:
14738 case R_PPC64_SECTOFF_DS:
14739 case R_PPC64_SECTOFF_LO_DS:
14740 case R_PPC64_SECTOFF_HA:
4ce794b7 14741 if (sec != NULL)
65f38f15 14742 addend -= sec->output_section->vma;
5bd4f169
AM
14743 break;
14744
25f23106
AM
14745 case R_PPC64_REL16:
14746 case R_PPC64_REL16_LO:
14747 case R_PPC64_REL16_HI:
14748 case R_PPC64_REL16_HA:
4a969973
AM
14749 case R_PPC64_REL16_HIGH:
14750 case R_PPC64_REL16_HIGHA:
14751 case R_PPC64_REL16_HIGHER:
14752 case R_PPC64_REL16_HIGHERA:
14753 case R_PPC64_REL16_HIGHEST:
14754 case R_PPC64_REL16_HIGHESTA:
a680de9a 14755 case R_PPC64_REL16DX_HA:
25f23106
AM
14756 break;
14757
721956f4
AM
14758 case R_PPC64_REL14:
14759 case R_PPC64_REL14_BRNTAKEN:
14760 case R_PPC64_REL14_BRTAKEN:
5d1634d7 14761 case R_PPC64_REL24:
05d0e962 14762 case R_PPC64_REL24_NOTOC:
5d1634d7
AM
14763 break;
14764
411e1bfb
AM
14765 case R_PPC64_TPREL16:
14766 case R_PPC64_TPREL16_LO:
14767 case R_PPC64_TPREL16_HI:
14768 case R_PPC64_TPREL16_HA:
14769 case R_PPC64_TPREL16_DS:
14770 case R_PPC64_TPREL16_LO_DS:
f9c6b907
AM
14771 case R_PPC64_TPREL16_HIGH:
14772 case R_PPC64_TPREL16_HIGHA:
411e1bfb
AM
14773 case R_PPC64_TPREL16_HIGHER:
14774 case R_PPC64_TPREL16_HIGHERA:
14775 case R_PPC64_TPREL16_HIGHEST:
14776 case R_PPC64_TPREL16_HIGHESTA:
766bc656
AM
14777 if (h != NULL
14778 && h->elf.root.type == bfd_link_hash_undefweak
14779 && h->elf.dynindx == -1)
14780 {
14781 /* Make this relocation against an undefined weak symbol
14782 resolve to zero. This is really just a tweak, since
14783 code using weak externs ought to check that they are
14784 defined before using them. */
14785 bfd_byte *p = contents + rel->r_offset - d_offset;
14786
95f0d0d2 14787 insn = bfd_get_32 (input_bfd, p);
766bc656
AM
14788 insn = _bfd_elf_ppc_at_tprel_transform (insn, 13);
14789 if (insn != 0)
95f0d0d2 14790 bfd_put_32 (input_bfd, insn, p);
766bc656
AM
14791 break;
14792 }
989f9879
AM
14793 if (htab->elf.tls_sec != NULL)
14794 addend -= htab->elf.tls_sec->vma + TP_OFFSET;
7c8bbca5
AM
14795 /* The TPREL16 relocs shouldn't really be used in shared
14796 libs or with non-local symbols as that will result in
14797 DT_TEXTREL being set, but support them anyway. */
14798 goto dodyn;
411e1bfb
AM
14799
14800 case R_PPC64_DTPREL16:
14801 case R_PPC64_DTPREL16_LO:
14802 case R_PPC64_DTPREL16_HI:
14803 case R_PPC64_DTPREL16_HA:
14804 case R_PPC64_DTPREL16_DS:
14805 case R_PPC64_DTPREL16_LO_DS:
f9c6b907
AM
14806 case R_PPC64_DTPREL16_HIGH:
14807 case R_PPC64_DTPREL16_HIGHA:
411e1bfb
AM
14808 case R_PPC64_DTPREL16_HIGHER:
14809 case R_PPC64_DTPREL16_HIGHERA:
14810 case R_PPC64_DTPREL16_HIGHEST:
14811 case R_PPC64_DTPREL16_HIGHESTA:
989f9879
AM
14812 if (htab->elf.tls_sec != NULL)
14813 addend -= htab->elf.tls_sec->vma + DTP_OFFSET;
411e1bfb
AM
14814 break;
14815
45965137
AM
14816 case R_PPC64_ADDR64_LOCAL:
14817 addend += PPC64_LOCAL_ENTRY_OFFSET (h != NULL
14818 ? h->elf.other
14819 : sym->st_other);
14820 break;
14821
e515b051
AM
14822 case R_PPC64_DTPMOD64:
14823 relocation = 1;
14824 addend = 0;
14825 goto dodyn;
14826
411e1bfb 14827 case R_PPC64_TPREL64:
989f9879
AM
14828 if (htab->elf.tls_sec != NULL)
14829 addend -= htab->elf.tls_sec->vma + TP_OFFSET;
411e1bfb
AM
14830 goto dodyn;
14831
14832 case R_PPC64_DTPREL64:
989f9879
AM
14833 if (htab->elf.tls_sec != NULL)
14834 addend -= htab->elf.tls_sec->vma + DTP_OFFSET;
1a0670f3 14835 /* Fall through. */
411e1bfb 14836
65f38f15
AM
14837 /* Relocations that may need to be propagated if this is a
14838 dynamic object. */
04c9666a 14839 case R_PPC64_REL30:
65f38f15
AM
14840 case R_PPC64_REL32:
14841 case R_PPC64_REL64:
14842 case R_PPC64_ADDR14:
14843 case R_PPC64_ADDR14_BRNTAKEN:
14844 case R_PPC64_ADDR14_BRTAKEN:
14845 case R_PPC64_ADDR16:
14846 case R_PPC64_ADDR16_DS:
14847 case R_PPC64_ADDR16_HA:
14848 case R_PPC64_ADDR16_HI:
f9c6b907
AM
14849 case R_PPC64_ADDR16_HIGH:
14850 case R_PPC64_ADDR16_HIGHA:
65f38f15
AM
14851 case R_PPC64_ADDR16_HIGHER:
14852 case R_PPC64_ADDR16_HIGHERA:
14853 case R_PPC64_ADDR16_HIGHEST:
14854 case R_PPC64_ADDR16_HIGHESTA:
14855 case R_PPC64_ADDR16_LO:
14856 case R_PPC64_ADDR16_LO_DS:
14857 case R_PPC64_ADDR24:
65f38f15
AM
14858 case R_PPC64_ADDR32:
14859 case R_PPC64_ADDR64:
14860 case R_PPC64_UADDR16:
14861 case R_PPC64_UADDR32:
14862 case R_PPC64_UADDR64:
411e1bfb 14863 dodyn:
5d1634d7 14864 if ((input_section->flags & SEC_ALLOC) == 0)
ec338859
AM
14865 break;
14866
41bd81ab
AM
14867 if (NO_OPD_RELOCS && is_opd)
14868 break;
14869
8a9e8e72 14870 if (bfd_link_pic (info)
b1b07054
AM
14871 ? ((h == NULL
14872 || h->dyn_relocs != NULL)
14873 && ((h != NULL && pc_dynrelocs (h))
14874 || must_be_dyn_reloc (info, r_type)))
8a9e8e72
AM
14875 : (h != NULL
14876 ? h->dyn_relocs != NULL
d311bc8b 14877 : ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC))
65f38f15 14878 {
b34976b6 14879 bfd_boolean skip, relocate;
65f38f15 14880 asection *sreloc;
1cf1f670 14881 bfd_vma out_off;
82e66161 14882 long indx = 0;
65f38f15
AM
14883
14884 /* When generating a dynamic object, these relocations
14885 are copied into the output file to be resolved at run
14886 time. */
14887
b34976b6
AM
14888 skip = FALSE;
14889 relocate = FALSE;
65f38f15 14890
1cf1f670
AM
14891 out_off = _bfd_elf_section_offset (output_bfd, info,
14892 input_section, rel->r_offset);
14893 if (out_off == (bfd_vma) -1)
b34976b6 14894 skip = TRUE;
1cf1f670 14895 else if (out_off == (bfd_vma) -2)
b34976b6 14896 skip = TRUE, relocate = TRUE;
1cf1f670
AM
14897 out_off += (input_section->output_section->vma
14898 + input_section->output_offset);
14899 outrel.r_offset = out_off;
411e1bfb 14900 outrel.r_addend = rel->r_addend;
65f38f15 14901
1cf1f670
AM
14902 /* Optimize unaligned reloc use. */
14903 if ((r_type == R_PPC64_ADDR64 && (out_off & 7) != 0)
14904 || (r_type == R_PPC64_UADDR64 && (out_off & 7) == 0))
14905 r_type ^= R_PPC64_ADDR64 ^ R_PPC64_UADDR64;
14906 else if ((r_type == R_PPC64_ADDR32 && (out_off & 3) != 0)
14907 || (r_type == R_PPC64_UADDR32 && (out_off & 3) == 0))
14908 r_type ^= R_PPC64_ADDR32 ^ R_PPC64_UADDR32;
14909 else if ((r_type == R_PPC64_ADDR16 && (out_off & 1) != 0)
14910 || (r_type == R_PPC64_UADDR16 && (out_off & 1) == 0))
14911 r_type ^= R_PPC64_ADDR16 ^ R_PPC64_UADDR16;
14912
65f38f15 14913 if (skip)
0bb2d96a 14914 memset (&outrel, 0, sizeof outrel);
afe397ea 14915 else if (!SYMBOL_REFERENCES_LOCAL (info, &h->elf)
0b13192e
AM
14916 && !is_opd
14917 && r_type != R_PPC64_TOC)
14acf4dc 14918 {
82e66161
AM
14919 indx = h->elf.dynindx;
14920 BFD_ASSERT (indx != -1);
14921 outrel.r_info = ELF64_R_INFO (indx, r_type);
14acf4dc 14922 }
65f38f15
AM
14923 else
14924 {
41bd81ab
AM
14925 /* This symbol is local, or marked to become local,
14926 or this is an opd section reloc which must point
14927 at a local function. */
65f38f15 14928 outrel.r_addend += relocation;
e86ce104 14929 if (r_type == R_PPC64_ADDR64 || r_type == R_PPC64_TOC)
65f38f15 14930 {
3fad3c7c 14931 if (is_opd && h != NULL)
afbe61cf
AM
14932 {
14933 /* Lie about opd entries. This case occurs
14934 when building shared libraries and we
14935 reference a function in another shared
3fad3c7c
AM
14936 lib. The same thing happens for a weak
14937 definition in an application that's
14938 overridden by a strong definition in a
14939 shared lib. (I believe this is a generic
14940 bug in binutils handling of weak syms.)
14941 In these cases we won't use the opd
1e2f5b6e 14942 entry in this lib. */
b34976b6 14943 unresolved_reloc = FALSE;
afbe61cf 14944 }
25f23106
AM
14945 if (!is_opd
14946 && r_type == R_PPC64_ADDR64
14947 && (h != NULL
14948 ? h->elf.type == STT_GNU_IFUNC
14949 : ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC))
14950 outrel.r_info = ELF64_R_INFO (0, R_PPC64_IRELATIVE);
14951 else
14952 {
14953 outrel.r_info = ELF64_R_INFO (0, R_PPC64_RELATIVE);
81407a69 14954
25f23106
AM
14955 /* We need to relocate .opd contents for ld.so.
14956 Prelink also wants simple and consistent rules
14957 for relocs. This make all RELATIVE relocs have
14958 *r_offset equal to r_addend. */
14959 relocate = TRUE;
14960 }
65f38f15
AM
14961 }
14962 else
14963 {
25f23106
AM
14964 if (h != NULL
14965 ? h->elf.type == STT_GNU_IFUNC
14966 : ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC)
14967 {
25f53a85 14968 info->callbacks->einfo
695344c0 14969 /* xgettext:c-format */
174d0a74 14970 (_("%H: %s for indirect "
c1c8c1ef 14971 "function `%pT' unsupported\n"),
25f53a85 14972 input_bfd, input_section, rel->r_offset,
25f23106
AM
14973 ppc64_elf_howto_table[r_type]->name,
14974 sym_name);
14975 ret = FALSE;
14976 }
cf35638d 14977 else if (r_symndx == STN_UNDEF || bfd_is_abs_section (sec))
65f38f15
AM
14978 ;
14979 else if (sec == NULL || sec->owner == NULL)
14980 {
14981 bfd_set_error (bfd_error_bad_value);
b34976b6 14982 return FALSE;
65f38f15
AM
14983 }
14984 else
14985 {
14986 asection *osec;
14987
14988 osec = sec->output_section;
14989 indx = elf_section_data (osec)->dynindx;
14990
74541ad4
AM
14991 if (indx == 0)
14992 {
14993 if ((osec->flags & SEC_READONLY) == 0
14994 && htab->elf.data_index_section != NULL)
14995 osec = htab->elf.data_index_section;
14996 else
14997 osec = htab->elf.text_index_section;
14998 indx = elf_section_data (osec)->dynindx;
14999 }
15000 BFD_ASSERT (indx != 0);
15001
65f38f15
AM
15002 /* We are turning this relocation into one
15003 against a section symbol, so subtract out
15004 the output section's address but not the
15005 offset of the input section in the output
15006 section. */
15007 outrel.r_addend -= osec->vma;
15008 }
15009
15010 outrel.r_info = ELF64_R_INFO (indx, r_type);
15011 }
15012 }
15013
15014 sreloc = elf_section_data (input_section)->sreloc;
19e08130
AM
15015 if (h != NULL
15016 ? h->elf.type == STT_GNU_IFUNC
15017 : ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC)
82e66161
AM
15018 {
15019 sreloc = htab->elf.irelplt;
15020 if (indx == 0)
15021 htab->local_ifunc_resolver = 1;
15022 else if (is_static_defined (&h->elf))
15023 htab->maybe_local_ifunc_resolver = 1;
15024 }
65f38f15
AM
15025 if (sreloc == NULL)
15026 abort ();
15027
dfbb6ac9
AM
15028 if (sreloc->reloc_count * sizeof (Elf64_External_Rela)
15029 >= sreloc->size)
15030 abort ();
947216bf
AM
15031 loc = sreloc->contents;
15032 loc += sreloc->reloc_count++ * sizeof (Elf64_External_Rela);
65f38f15
AM
15033 bfd_elf64_swap_reloca_out (output_bfd, &outrel, loc);
15034
15035 /* If this reloc is against an external symbol, it will
15036 be computed at runtime, so there's no need to do
81407a69
AM
15037 anything now. However, for the sake of prelink ensure
15038 that the section contents are a known value. */
2cdcc330 15039 if (!relocate)
81407a69
AM
15040 {
15041 unresolved_reloc = FALSE;
15042 /* The value chosen here is quite arbitrary as ld.so
15043 ignores section contents except for the special
15044 case of .opd where the contents might be accessed
15045 before relocation. Choose zero, as that won't
15046 cause reloc overflow. */
15047 relocation = 0;
15048 addend = 0;
15049 /* Use *r_offset == r_addend for R_PPC64_ADDR64 relocs
15050 to improve backward compatibility with older
15051 versions of ld. */
15052 if (r_type == R_PPC64_ADDR64)
15053 addend = outrel.r_addend;
15054 /* Adjust pc_relative relocs to have zero in *r_offset. */
4ce794b7 15055 else if (ppc64_elf_howto_table[r_type]->pc_relative)
f0158f44 15056 addend = outrel.r_offset;
81407a69 15057 }
65f38f15 15058 }
5bd4f169
AM
15059 break;
15060
65f38f15
AM
15061 case R_PPC64_COPY:
15062 case R_PPC64_GLOB_DAT:
15063 case R_PPC64_JMP_SLOT:
25f23106 15064 case R_PPC64_JMP_IREL:
65f38f15
AM
15065 case R_PPC64_RELATIVE:
15066 /* We shouldn't ever see these dynamic relocs in relocatable
15067 files. */
ae9a127f 15068 /* Fall through. */
65f38f15
AM
15069
15070 case R_PPC64_PLTGOT16:
15071 case R_PPC64_PLTGOT16_DS:
15072 case R_PPC64_PLTGOT16_HA:
15073 case R_PPC64_PLTGOT16_HI:
15074 case R_PPC64_PLTGOT16_LO:
15075 case R_PPC64_PLTGOT16_LO_DS:
15076 case R_PPC64_PLTREL32:
15077 case R_PPC64_PLTREL64:
15078 /* These ones haven't been implemented yet. */
15079
25f53a85 15080 info->callbacks->einfo
695344c0 15081 /* xgettext:c-format */
c1c8c1ef 15082 (_("%P: %pB: %s is not supported for `%pT'\n"),
d003868e 15083 input_bfd,
4ce794b7 15084 ppc64_elf_howto_table[r_type]->name, sym_name);
5bd4f169
AM
15085
15086 bfd_set_error (bfd_error_invalid_operation);
b34976b6 15087 ret = FALSE;
c316a17c 15088 goto copy_reloc;
65f38f15 15089 }
5bd4f169 15090
67f0cbdb
AM
15091 /* Multi-instruction sequences that access the TOC can be
15092 optimized, eg. addis ra,r2,0; addi rb,ra,x;
07d6d2b8 15093 to nop; addi rb,r2,x; */
67f0cbdb
AM
15094 switch (r_type)
15095 {
15096 default:
15097 break;
15098
15099 case R_PPC64_GOT_TLSLD16_HI:
15100 case R_PPC64_GOT_TLSGD16_HI:
15101 case R_PPC64_GOT_TPREL16_HI:
15102 case R_PPC64_GOT_DTPREL16_HI:
15103 case R_PPC64_GOT16_HI:
15104 case R_PPC64_TOC16_HI:
15105 /* These relocs would only be useful if building up an
15106 offset to later add to r2, perhaps in an indexed
15107 addressing mode instruction. Don't try to optimize.
15108 Unfortunately, the possibility of someone building up an
15109 offset like this or even with the HA relocs, means that
15110 we need to check the high insn when optimizing the low
15111 insn. */
15112 break;
15113
23cedd1d
AM
15114 case R_PPC64_PLTCALL:
15115 if (unresolved_reloc)
15116 {
15117 /* No plt entry. Make this into a direct call. */
15118 bfd_byte *p = contents + rel->r_offset;
15119 insn = bfd_get_32 (input_bfd, p);
15120 insn &= 1;
15121 bfd_put_32 (input_bfd, B_DOT | insn, p);
15122 bfd_put_32 (input_bfd, NOP, p + 4);
15123 unresolved_reloc = save_unresolved_reloc;
15124 r_type = R_PPC64_REL24;
15125 }
15126 break;
15127
15128 case R_PPC64_PLTSEQ:
15129 if (unresolved_reloc)
15130 {
15131 unresolved_reloc = FALSE;
15132 goto nop_it;
15133 }
15134 break;
15135
15136 case R_PPC64_PLT16_HA:
15137 if (unresolved_reloc)
15138 {
15139 unresolved_reloc = FALSE;
15140 goto nop_it;
15141 }
15142 /* Fall through. */
67f0cbdb
AM
15143 case R_PPC64_GOT_TLSLD16_HA:
15144 case R_PPC64_GOT_TLSGD16_HA:
15145 case R_PPC64_GOT_TPREL16_HA:
15146 case R_PPC64_GOT_DTPREL16_HA:
15147 case R_PPC64_GOT16_HA:
15148 case R_PPC64_TOC16_HA:
98528052 15149 if (htab->do_toc_opt && relocation + addend + 0x8000 < 0x10000
560c8763 15150 && !ppc64_elf_tdata (input_bfd)->unexpected_toc_insn)
98528052 15151 {
23cedd1d
AM
15152 bfd_byte *p;
15153 nop_it:
15154 p = contents + (rel->r_offset & ~3);
98528052 15155 bfd_put_32 (input_bfd, NOP, p);
d830549d 15156 goto copy_reloc;
98528052 15157 }
67f0cbdb
AM
15158 break;
15159
23cedd1d
AM
15160 case R_PPC64_PLT16_LO:
15161 case R_PPC64_PLT16_LO_DS:
15162 if (unresolved_reloc)
15163 {
15164 unresolved_reloc = FALSE;
15165 goto nop_it;
15166 }
15167 /* Fall through. */
67f0cbdb
AM
15168 case R_PPC64_GOT_TLSLD16_LO:
15169 case R_PPC64_GOT_TLSGD16_LO:
15170 case R_PPC64_GOT_TPREL16_LO_DS:
15171 case R_PPC64_GOT_DTPREL16_LO_DS:
15172 case R_PPC64_GOT16_LO:
15173 case R_PPC64_GOT16_LO_DS:
15174 case R_PPC64_TOC16_LO:
15175 case R_PPC64_TOC16_LO_DS:
98528052 15176 if (htab->do_toc_opt && relocation + addend + 0x8000 < 0x10000
560c8763 15177 && !ppc64_elf_tdata (input_bfd)->unexpected_toc_insn)
67f0cbdb
AM
15178 {
15179 bfd_byte *p = contents + (rel->r_offset & ~3);
15180 insn = bfd_get_32 (input_bfd, p);
560c8763
AM
15181 if ((insn & (0x3f << 26)) == 12u << 26 /* addic */)
15182 {
15183 /* Transform addic to addi when we change reg. */
15184 insn &= ~((0x3f << 26) | (0x1f << 16));
15185 insn |= (14u << 26) | (2 << 16);
15186 }
15187 else
67f0cbdb 15188 {
98528052
AM
15189 insn &= ~(0x1f << 16);
15190 insn |= 2 << 16;
67f0cbdb 15191 }
560c8763 15192 bfd_put_32 (input_bfd, insn, p);
67f0cbdb
AM
15193 }
15194 break;
9a23f96e
AM
15195
15196 case R_PPC64_TPREL16_HA:
15197 if (htab->do_tls_opt && relocation + addend + 0x8000 < 0x10000)
15198 {
15199 bfd_byte *p = contents + (rel->r_offset & ~3);
15200 insn = bfd_get_32 (input_bfd, p);
15201 if ((insn & ((0x3f << 26) | 0x1f << 16))
15202 != ((15u << 26) | (13 << 16)) /* addis rt,13,imm */)
15203 /* xgettext:c-format */
15204 info->callbacks->minfo
15205 (_("%H: warning: %s unexpected insn %#x.\n"),
d830549d
AM
15206 input_bfd, input_section, rel->r_offset,
15207 ppc64_elf_howto_table[r_type]->name, insn);
9a23f96e 15208 else
d830549d
AM
15209 {
15210 bfd_put_32 (input_bfd, NOP, p);
15211 goto copy_reloc;
15212 }
9a23f96e
AM
15213 }
15214 break;
15215
15216 case R_PPC64_TPREL16_LO:
15217 case R_PPC64_TPREL16_LO_DS:
15218 if (htab->do_tls_opt && relocation + addend + 0x8000 < 0x10000)
15219 {
15220 bfd_byte *p = contents + (rel->r_offset & ~3);
15221 insn = bfd_get_32 (input_bfd, p);
15222 insn &= ~(0x1f << 16);
15223 insn |= 13 << 16;
15224 bfd_put_32 (input_bfd, insn, p);
15225 }
15226 break;
67f0cbdb
AM
15227 }
15228
65f38f15
AM
15229 /* Do any further special processing. */
15230 switch (r_type)
15231 {
15232 default:
15233 break;
15234
25f23106 15235 case R_PPC64_REL16_HA:
4a969973
AM
15236 case R_PPC64_REL16_HIGHA:
15237 case R_PPC64_REL16_HIGHERA:
15238 case R_PPC64_REL16_HIGHESTA:
a680de9a 15239 case R_PPC64_REL16DX_HA:
f9c6b907
AM
15240 case R_PPC64_ADDR16_HA:
15241 case R_PPC64_ADDR16_HIGHA:
65f38f15
AM
15242 case R_PPC64_ADDR16_HIGHERA:
15243 case R_PPC64_ADDR16_HIGHESTA:
65f38f15
AM
15244 case R_PPC64_TOC16_HA:
15245 case R_PPC64_SECTOFF_HA:
411e1bfb 15246 case R_PPC64_TPREL16_HA:
f9c6b907 15247 case R_PPC64_TPREL16_HIGHA:
411e1bfb 15248 case R_PPC64_TPREL16_HIGHERA:
411e1bfb 15249 case R_PPC64_TPREL16_HIGHESTA:
f9c6b907
AM
15250 case R_PPC64_DTPREL16_HA:
15251 case R_PPC64_DTPREL16_HIGHA:
411e1bfb 15252 case R_PPC64_DTPREL16_HIGHERA:
411e1bfb 15253 case R_PPC64_DTPREL16_HIGHESTA:
65f38f15
AM
15254 /* It's just possible that this symbol is a weak symbol
15255 that's not actually defined anywhere. In that case,
15256 'sec' would be NULL, and we should leave the symbol
15257 alone (it will be set to zero elsewhere in the link). */
5c5f6e17
AM
15258 if (sec == NULL)
15259 break;
1a0670f3 15260 /* Fall through. */
5c5f6e17
AM
15261
15262 case R_PPC64_GOT16_HA:
15263 case R_PPC64_PLTGOT16_HA:
15264 case R_PPC64_PLT16_HA:
15265 case R_PPC64_GOT_TLSGD16_HA:
15266 case R_PPC64_GOT_TLSLD16_HA:
15267 case R_PPC64_GOT_TPREL16_HA:
15268 case R_PPC64_GOT_DTPREL16_HA:
15269 /* Add 0x10000 if sign bit in 0:15 is set.
15270 Bits 0:15 are not used. */
15271 addend += 0x8000;
65f38f15
AM
15272 break;
15273
15274 case R_PPC64_ADDR16_DS:
15275 case R_PPC64_ADDR16_LO_DS:
15276 case R_PPC64_GOT16_DS:
15277 case R_PPC64_GOT16_LO_DS:
15278 case R_PPC64_PLT16_LO_DS:
15279 case R_PPC64_SECTOFF_DS:
15280 case R_PPC64_SECTOFF_LO_DS:
15281 case R_PPC64_TOC16_DS:
15282 case R_PPC64_TOC16_LO_DS:
15283 case R_PPC64_PLTGOT16_DS:
15284 case R_PPC64_PLTGOT16_LO_DS:
411e1bfb
AM
15285 case R_PPC64_GOT_TPREL16_DS:
15286 case R_PPC64_GOT_TPREL16_LO_DS:
15287 case R_PPC64_GOT_DTPREL16_DS:
15288 case R_PPC64_GOT_DTPREL16_LO_DS:
15289 case R_PPC64_TPREL16_DS:
15290 case R_PPC64_TPREL16_LO_DS:
15291 case R_PPC64_DTPREL16_DS:
15292 case R_PPC64_DTPREL16_LO_DS:
adadcc0c
AM
15293 insn = bfd_get_32 (input_bfd, contents + (rel->r_offset & ~3));
15294 mask = 3;
a680de9a
PB
15295 /* If this reloc is against an lq, lxv, or stxv insn, then
15296 the value must be a multiple of 16. This is somewhat of
15297 a hack, but the "correct" way to do this by defining _DQ
15298 forms of all the _DS relocs bloats all reloc switches in
15299 this file. It doesn't make much sense to use these
15300 relocs in data, so testing the insn should be safe. */
15301 if ((insn & (0x3f << 26)) == (56u << 26)
15302 || ((insn & (0x3f << 26)) == (61u << 26) && (insn & 3) == 1))
adadcc0c 15303 mask = 15;
a680de9a
PB
15304 relocation += addend;
15305 addend = insn & (mask ^ 3);
15306 if ((relocation & mask) != 0)
65f38f15 15307 {
a680de9a 15308 relocation ^= relocation & mask;
25f53a85 15309 info->callbacks->einfo
695344c0 15310 /* xgettext:c-format */
174d0a74 15311 (_("%H: error: %s not a multiple of %u\n"),
25f53a85 15312 input_bfd, input_section, rel->r_offset,
d830549d 15313 ppc64_elf_howto_table[r_type]->name,
adadcc0c 15314 mask + 1);
65f38f15 15315 bfd_set_error (bfd_error_bad_value);
b34976b6 15316 ret = FALSE;
c316a17c 15317 goto copy_reloc;
65f38f15
AM
15318 }
15319 break;
5bd4f169
AM
15320 }
15321
239e1f3a
AM
15322 /* Dynamic relocs are not propagated for SEC_DEBUGGING sections
15323 because such sections are not SEC_ALLOC and thus ld.so will
15324 not process them. */
d830549d 15325 howto = ppc64_elf_howto_table[(int) r_type];
65f38f15 15326 if (unresolved_reloc
239e1f3a 15327 && !((input_section->flags & SEC_DEBUGGING) != 0
1d5316ab
AM
15328 && h->elf.def_dynamic)
15329 && _bfd_elf_section_offset (output_bfd, info, input_section,
15330 rel->r_offset) != (bfd_vma) -1)
9c07fe7c 15331 {
25f53a85 15332 info->callbacks->einfo
695344c0 15333 /* xgettext:c-format */
c1c8c1ef 15334 (_("%H: unresolvable %s against `%pT'\n"),
25f53a85 15335 input_bfd, input_section, rel->r_offset,
b80eed39 15336 howto->name,
039b3fef 15337 h->elf.root.root.string);
b34976b6 15338 ret = FALSE;
9c07fe7c 15339 }
5bd4f169 15340
b80eed39
AM
15341 /* 16-bit fields in insns mostly have signed values, but a
15342 few insns have 16-bit unsigned values. Really, we should
15343 have different reloc types. */
15344 if (howto->complain_on_overflow != complain_overflow_dont
15345 && howto->dst_mask == 0xffff
15346 && (input_section->flags & SEC_CODE) != 0)
15347 {
15348 enum complain_overflow complain = complain_overflow_signed;
15349
15350 insn = bfd_get_32 (input_bfd, contents + (rel->r_offset & ~3));
a47622ac
AM
15351 if ((insn & (0x3f << 26)) == 10u << 26 /* cmpli */)
15352 complain = complain_overflow_bitfield;
15353 else if (howto->rightshift == 0
15354 ? ((insn & (0x3f << 26)) == 28u << 26 /* andi */
15355 || (insn & (0x3f << 26)) == 24u << 26 /* ori */
15356 || (insn & (0x3f << 26)) == 26u << 26 /* xori */)
15357 : ((insn & (0x3f << 26)) == 29u << 26 /* andis */
15358 || (insn & (0x3f << 26)) == 25u << 26 /* oris */
15359 || (insn & (0x3f << 26)) == 27u << 26 /* xoris */))
b80eed39
AM
15360 complain = complain_overflow_unsigned;
15361 if (howto->complain_on_overflow != complain)
15362 {
15363 alt_howto = *howto;
15364 alt_howto.complain_on_overflow = complain;
15365 howto = &alt_howto;
15366 }
15367 }
15368
a680de9a
PB
15369 if (r_type == R_PPC64_REL16DX_HA)
15370 {
15371 /* Split field reloc isn't handled by _bfd_final_link_relocate. */
15372 if (rel->r_offset + 4 > input_section->size)
15373 r = bfd_reloc_outofrange;
15374 else
15375 {
15376 relocation += addend;
15377 relocation -= (rel->r_offset
15378 + input_section->output_offset
15379 + input_section->output_section->vma);
3de43e7b 15380 relocation = (bfd_signed_vma) relocation >> 16;
a680de9a
PB
15381 insn = bfd_get_32 (input_bfd, contents + rel->r_offset);
15382 insn &= ~0x1fffc1;
3de43e7b 15383 insn |= (relocation & 0xffc1) | ((relocation & 0x3e) << 15);
a680de9a
PB
15384 bfd_put_32 (input_bfd, insn, contents + rel->r_offset);
15385 r = bfd_reloc_ok;
3de43e7b 15386 if (relocation + 0x8000 > 0xffff)
a680de9a
PB
15387 r = bfd_reloc_overflow;
15388 }
15389 }
15390 else
15391 r = _bfd_final_link_relocate (howto, input_bfd, input_section, contents,
15392 rel->r_offset, relocation, addend);
5bd4f169 15393
ef60b7ff 15394 if (r != bfd_reloc_ok)
5bd4f169 15395 {
bc30df16 15396 char *more_info = NULL;
b80eed39 15397 const char *reloc_name = howto->name;
bc30df16
AM
15398
15399 if (reloc_dest != DEST_NORMAL)
15400 {
15401 more_info = bfd_malloc (strlen (reloc_name) + 8);
15402 if (more_info != NULL)
15403 {
15404 strcpy (more_info, reloc_name);
15405 strcat (more_info, (reloc_dest == DEST_OPD
15406 ? " (OPD)" : " (stub)"));
15407 reloc_name = more_info;
15408 }
15409 }
15410
cd27b276 15411 if (r == bfd_reloc_overflow)
5bd4f169 15412 {
8131c122
AM
15413 /* On code like "if (foo) foo();" don't report overflow
15414 on a branch to zero when foo is undefined. */
15415 if (!warned
15416 && (reloc_dest == DEST_STUB
15417 || !(h != NULL
15418 && (h->elf.root.type == bfd_link_hash_undefweak
15419 || h->elf.root.type == bfd_link_hash_undefined)
15420 && is_branch_reloc (r_type))))
1a72702b
AM
15421 info->callbacks->reloc_overflow (info, &h->elf.root,
15422 sym_name, reloc_name,
15423 orig_rel.r_addend,
15424 input_bfd, input_section,
15425 rel->r_offset);
ef60b7ff
AM
15426 }
15427 else
15428 {
25f53a85 15429 info->callbacks->einfo
695344c0 15430 /* xgettext:c-format */
c1c8c1ef 15431 (_("%H: %s against `%pT': error %d\n"),
25f53a85 15432 input_bfd, input_section, rel->r_offset,
bc30df16 15433 reloc_name, sym_name, (int) r);
b34976b6 15434 ret = FALSE;
ef60b7ff 15435 }
bc30df16
AM
15436 if (more_info != NULL)
15437 free (more_info);
5bd4f169 15438 }
c316a17c
AM
15439 copy_reloc:
15440 if (wrel != rel)
15441 *wrel = *rel;
15442 }
15443
15444 if (wrel != rel)
15445 {
15446 Elf_Internal_Shdr *rel_hdr;
15447 size_t deleted = rel - wrel;
15448
15449 rel_hdr = _bfd_elf_single_rel_hdr (input_section->output_section);
15450 rel_hdr->sh_size -= rel_hdr->sh_entsize * deleted;
15451 if (rel_hdr->sh_size == 0)
15452 {
15453 /* It is too late to remove an empty reloc section. Leave
15454 one NONE reloc.
15455 ??? What is wrong with an empty section??? */
15456 rel_hdr->sh_size = rel_hdr->sh_entsize;
15457 deleted -= 1;
15458 }
15459 rel_hdr = _bfd_elf_single_rel_hdr (input_section);
15460 rel_hdr->sh_size -= rel_hdr->sh_entsize * deleted;
15461 input_section->reloc_count -= deleted;
5bd4f169
AM
15462 }
15463
645ea6a9
AM
15464 /* If we're emitting relocations, then shortly after this function
15465 returns, reloc offsets and addends for this section will be
15466 adjusted. Worse, reloc symbol indices will be for the output
8860955f
AM
15467 file rather than the input. Save a copy of the relocs for
15468 opd_entry_value. */
0e1862bb 15469 if (is_opd && (info->emitrelocations || bfd_link_relocatable (info)))
8860955f
AM
15470 {
15471 bfd_size_type amt;
15472 amt = input_section->reloc_count * sizeof (Elf_Internal_Rela);
15473 rel = bfd_alloc (input_bfd, amt);
729eabd5
AM
15474 BFD_ASSERT (ppc64_elf_tdata (input_bfd)->opd.relocs == NULL);
15475 ppc64_elf_tdata (input_bfd)->opd.relocs = rel;
8860955f
AM
15476 if (rel == NULL)
15477 return FALSE;
15478 memcpy (rel, relocs, amt);
15479 }
5bd4f169
AM
15480 return ret;
15481}
15482
754021d0
AM
15483/* Adjust the value of any local symbols in opd sections. */
15484
6e0b88f1 15485static int
754021d0
AM
15486ppc64_elf_output_symbol_hook (struct bfd_link_info *info,
15487 const char *name ATTRIBUTE_UNUSED,
15488 Elf_Internal_Sym *elfsym,
15489 asection *input_sec,
15490 struct elf_link_hash_entry *h)
15491{
74f0fb50
AM
15492 struct _opd_sec_data *opd;
15493 long adjust;
754021d0
AM
15494 bfd_vma value;
15495
4025353c 15496 if (h != NULL)
6e0b88f1 15497 return 1;
4025353c 15498
74f0fb50
AM
15499 opd = get_opd_info (input_sec);
15500 if (opd == NULL || opd->adjust == NULL)
6e0b88f1 15501 return 1;
754021d0
AM
15502
15503 value = elfsym->st_value - input_sec->output_offset;
0e1862bb 15504 if (!bfd_link_relocatable (info))
754021d0
AM
15505 value -= input_sec->output_section->vma;
15506
51aecdc5 15507 adjust = opd->adjust[OPD_NDX (value)];
4025353c 15508 if (adjust == -1)
6e0b88f1
AM
15509 return 2;
15510
15511 elfsym->st_value += adjust;
15512 return 1;
754021d0
AM
15513}
15514
5bd4f169
AM
15515/* Finish up dynamic symbol handling. We set the contents of various
15516 dynamic sections here. */
15517
b34976b6 15518static bfd_boolean
4ce794b7
AM
15519ppc64_elf_finish_dynamic_symbol (bfd *output_bfd,
15520 struct bfd_link_info *info,
15521 struct elf_link_hash_entry *h,
4aef7643 15522 Elf_Internal_Sym *sym)
5bd4f169 15523{
65f38f15 15524 struct ppc_link_hash_table *htab;
8387904d 15525 struct plt_entry *ent;
5bd4f169 15526
65f38f15 15527 htab = ppc_hash_table (info);
4dfe6ac6
NC
15528 if (htab == NULL)
15529 return FALSE;
5bd4f169 15530
49c09209
AM
15531 if (!htab->opd_abi && !h->def_regular)
15532 for (ent = h->plt.plist; ent != NULL; ent = ent->next)
15533 if (ent->plt.offset != (bfd_vma) -1)
15534 {
15535 /* Mark the symbol as undefined, rather than as
15536 defined in glink. Leave the value if there were
15537 any relocations where pointer equality matters
15538 (this is a clue for the dynamic linker, to make
15539 function pointer comparisons work between an
15540 application and shared library), otherwise set it
15541 to zero. */
15542 sym->st_shndx = SHN_UNDEF;
15543 if (!h->pointer_equality_needed)
15544 sym->st_value = 0;
15545 else if (!h->ref_regular_nonweak)
15546 {
15547 /* This breaks function pointer comparisons, but
15548 that is better than breaking tests for a NULL
15549 function pointer. */
15550 sym->st_value = 0;
15551 }
15552 break;
15553 }
5bd4f169 15554
f5385ebf 15555 if (h->needs_copy)
5bd4f169 15556 {
65f38f15 15557 /* This symbol needs a copy reloc. Set it up. */
49c09209 15558 Elf_Internal_Rela rela;
5474d94f 15559 asection *srel;
49c09209 15560 bfd_byte *loc;
5bd4f169 15561
65f38f15
AM
15562 if (h->dynindx == -1
15563 || (h->root.type != bfd_link_hash_defined
15564 && h->root.type != bfd_link_hash_defweak)
5474d94f
AM
15565 || htab->elf.srelbss == NULL
15566 || htab->elf.sreldynrelro == NULL)
65f38f15 15567 abort ();
5bd4f169
AM
15568
15569 rela.r_offset = (h->root.u.def.value
15570 + h->root.u.def.section->output_section->vma
15571 + h->root.u.def.section->output_offset);
15572 rela.r_info = ELF64_R_INFO (h->dynindx, R_PPC64_COPY);
15573 rela.r_addend = 0;
afbf7e8e 15574 if (h->root.u.def.section == htab->elf.sdynrelro)
5474d94f
AM
15575 srel = htab->elf.sreldynrelro;
15576 else
15577 srel = htab->elf.srelbss;
15578 loc = srel->contents;
15579 loc += srel->reloc_count++ * sizeof (Elf64_External_Rela);
65f38f15 15580 bfd_elf64_swap_reloca_out (output_bfd, &rela, loc);
5bd4f169
AM
15581 }
15582
b34976b6 15583 return TRUE;
5bd4f169
AM
15584}
15585
65f38f15
AM
15586/* Used to decide how to sort relocs in an optimal manner for the
15587 dynamic linker, before writing them out. */
15588
15589static enum elf_reloc_type_class
7e612e98
AM
15590ppc64_elf_reloc_type_class (const struct bfd_link_info *info,
15591 const asection *rel_sec,
15592 const Elf_Internal_Rela *rela)
65f38f15 15593{
04c9666a 15594 enum elf_ppc64_reloc_type r_type;
7e612e98
AM
15595 struct ppc_link_hash_table *htab = ppc_hash_table (info);
15596
33e44f2e 15597 if (rel_sec == htab->elf.irelplt)
7e612e98 15598 return reloc_class_ifunc;
a33d1f77 15599
4ce794b7 15600 r_type = ELF64_R_TYPE (rela->r_info);
a33d1f77 15601 switch (r_type)
65f38f15
AM
15602 {
15603 case R_PPC64_RELATIVE:
15604 return reloc_class_relative;
15605 case R_PPC64_JMP_SLOT:
15606 return reloc_class_plt;
15607 case R_PPC64_COPY:
15608 return reloc_class_copy;
15609 default:
15610 return reloc_class_normal;
15611 }
15612}
15613
5bd4f169
AM
15614/* Finish up the dynamic sections. */
15615
b34976b6 15616static bfd_boolean
4ce794b7
AM
15617ppc64_elf_finish_dynamic_sections (bfd *output_bfd,
15618 struct bfd_link_info *info)
5bd4f169 15619{
65f38f15
AM
15620 struct ppc_link_hash_table *htab;
15621 bfd *dynobj;
5bd4f169 15622 asection *sdyn;
5bd4f169 15623
65f38f15 15624 htab = ppc_hash_table (info);
4dfe6ac6
NC
15625 if (htab == NULL)
15626 return FALSE;
15627
65f38f15 15628 dynobj = htab->elf.dynobj;
3d4d4302 15629 sdyn = bfd_get_linker_section (dynobj, ".dynamic");
5bd4f169 15630
65f38f15 15631 if (htab->elf.dynamic_sections_created)
5bd4f169 15632 {
5bd4f169
AM
15633 Elf64_External_Dyn *dyncon, *dynconend;
15634
33e44f2e 15635 if (sdyn == NULL || htab->elf.sgot == NULL)
65f38f15 15636 abort ();
5bd4f169
AM
15637
15638 dyncon = (Elf64_External_Dyn *) sdyn->contents;
eea6121a 15639 dynconend = (Elf64_External_Dyn *) (sdyn->contents + sdyn->size);
5bd4f169
AM
15640 for (; dyncon < dynconend; dyncon++)
15641 {
15642 Elf_Internal_Dyn dyn;
19397422 15643 asection *s;
5bd4f169
AM
15644
15645 bfd_elf64_swap_dyn_in (dynobj, dyncon, &dyn);
15646
15647 switch (dyn.d_tag)
15648 {
65f38f15
AM
15649 default:
15650 continue;
5bd4f169 15651
5d1634d7 15652 case DT_PPC64_GLINK:
4ce794b7 15653 s = htab->glink;
6348e046 15654 dyn.d_un.d_ptr = s->output_section->vma + s->output_offset;
ad8e1ba5
AM
15655 /* We stupidly defined DT_PPC64_GLINK to be the start
15656 of glink rather than the first entry point, which is
15657 what ld.so needs, and now have a bigger stub to
15658 support automatic multiple TOCs. */
9e390558 15659 dyn.d_un.d_ptr += GLINK_PLTRESOLVE_SIZE (htab) - 8 * 4;
5d1634d7
AM
15660 break;
15661
19397422
AM
15662 case DT_PPC64_OPD:
15663 s = bfd_get_section_by_name (output_bfd, ".opd");
6348e046
AM
15664 if (s == NULL)
15665 continue;
15666 dyn.d_un.d_ptr = s->vma;
19397422
AM
15667 break;
15668
e8910a83
AM
15669 case DT_PPC64_OPT:
15670 if (htab->do_multi_toc && htab->multi_toc_needed)
15671 dyn.d_un.d_val |= PPC64_OPT_MULTI_TOC;
f378ab09
AM
15672 if (htab->has_plt_localentry0)
15673 dyn.d_un.d_val |= PPC64_OPT_LOCALENTRY;
e8910a83
AM
15674 break;
15675
19397422
AM
15676 case DT_PPC64_OPDSZ:
15677 s = bfd_get_section_by_name (output_bfd, ".opd");
6348e046
AM
15678 if (s == NULL)
15679 continue;
eea6121a 15680 dyn.d_un.d_val = s->size;
19397422
AM
15681 break;
15682
65f38f15 15683 case DT_PLTGOT:
33e44f2e 15684 s = htab->elf.splt;
6348e046 15685 dyn.d_un.d_ptr = s->output_section->vma + s->output_offset;
65f38f15
AM
15686 break;
15687
15688 case DT_JMPREL:
33e44f2e 15689 s = htab->elf.srelplt;
6348e046 15690 dyn.d_un.d_ptr = s->output_section->vma + s->output_offset;
65f38f15 15691 break;
5bd4f169 15692
65f38f15 15693 case DT_PLTRELSZ:
33e44f2e 15694 dyn.d_un.d_val = htab->elf.srelplt->size;
5d1634d7 15695 break;
82e66161
AM
15696
15697 case DT_TEXTREL:
15698 if (htab->local_ifunc_resolver)
15699 info->callbacks->einfo
15700 (_("%X%P: text relocations and GNU indirect "
15701 "functions will result in a segfault at runtime\n"));
15702 else if (htab->maybe_local_ifunc_resolver)
15703 info->callbacks->einfo
15704 (_("%P: warning: text relocations and GNU indirect "
15705 "functions may result in a segfault at runtime\n"));
15706 continue;
5bd4f169 15707 }
5bd4f169 15708
65f38f15 15709 bfd_elf64_swap_dyn_out (output_bfd, &dyn, dyncon);
5bd4f169 15710 }
5bd4f169
AM
15711 }
15712
6528b6eb
AM
15713 if (htab->elf.sgot != NULL && htab->elf.sgot->size != 0
15714 && htab->elf.sgot->output_section != bfd_abs_section_ptr)
5d1634d7
AM
15715 {
15716 /* Fill in the first entry in the global offset table.
15717 We use it to hold the link-time TOCbase. */
15718 bfd_put_64 (output_bfd,
60ee0d4a 15719 elf_gp (output_bfd) + TOC_BASE_OFF,
33e44f2e 15720 htab->elf.sgot->contents);
5d1634d7
AM
15721
15722 /* Set .got entry size. */
2cdcc330
AM
15723 elf_section_data (htab->elf.sgot->output_section)->this_hdr.sh_entsize
15724 = 8;
5d1634d7
AM
15725 }
15726
6528b6eb
AM
15727 if (htab->elf.splt != NULL && htab->elf.splt->size != 0
15728 && htab->elf.splt->output_section != bfd_abs_section_ptr)
5d1634d7
AM
15729 {
15730 /* Set .plt entry size. */
33e44f2e 15731 elf_section_data (htab->elf.splt->output_section)->this_hdr.sh_entsize
b9e5796b 15732 = PLT_ENTRY_SIZE (htab);
5d1634d7
AM
15733 }
15734
84f5d08e
AM
15735 /* brlt is SEC_LINKER_CREATED, so we need to write out relocs for
15736 brlt ourselves if emitrelocations. */
15737 if (htab->brlt != NULL
15738 && htab->brlt->reloc_count != 0
15739 && !_bfd_elf_link_output_relocs (output_bfd,
15740 htab->brlt,
d4730f92 15741 elf_section_data (htab->brlt)->rela.hdr,
84f5d08e
AM
15742 elf_section_data (htab->brlt)->relocs,
15743 NULL))
15744 return FALSE;
15745
176a0d42
AM
15746 if (htab->glink != NULL
15747 && htab->glink->reloc_count != 0
15748 && !_bfd_elf_link_output_relocs (output_bfd,
15749 htab->glink,
d4730f92 15750 elf_section_data (htab->glink)->rela.hdr,
176a0d42
AM
15751 elf_section_data (htab->glink)->relocs,
15752 NULL))
15753 return FALSE;
15754
da44f4e5 15755
df136d64
AM
15756 if (htab->glink_eh_frame != NULL
15757 && htab->glink_eh_frame->size != 0
15758 && htab->glink_eh_frame->sec_info_type == SEC_INFO_TYPE_EH_FRAME
15759 && !_bfd_elf_write_section_eh_frame (output_bfd, info,
15760 htab->glink_eh_frame,
15761 htab->glink_eh_frame->contents))
15762 return FALSE;
58d180e8 15763
e717da7e 15764 /* We need to handle writing out multiple GOT sections ourselves,
7b53ace3
AM
15765 since we didn't add them to DYNOBJ. We know dynobj is the first
15766 bfd. */
c72f2fb2 15767 while ((dynobj = dynobj->link.next) != NULL)
e717da7e
AM
15768 {
15769 asection *s;
7b53ace3 15770
0c8d6e5c 15771 if (!is_ppc64_elf (dynobj))
7b53ace3
AM
15772 continue;
15773
e717da7e
AM
15774 s = ppc64_elf_tdata (dynobj)->got;
15775 if (s != NULL
eea6121a 15776 && s->size != 0
e717da7e
AM
15777 && s->output_section != bfd_abs_section_ptr
15778 && !bfd_set_section_contents (output_bfd, s->output_section,
15779 s->contents, s->output_offset,
eea6121a 15780 s->size))
e717da7e
AM
15781 return FALSE;
15782 s = ppc64_elf_tdata (dynobj)->relgot;
15783 if (s != NULL
eea6121a 15784 && s->size != 0
e717da7e
AM
15785 && s->output_section != bfd_abs_section_ptr
15786 && !bfd_set_section_contents (output_bfd, s->output_section,
15787 s->contents, s->output_offset,
eea6121a 15788 s->size))
e717da7e
AM
15789 return FALSE;
15790 }
f6c52c13 15791
b34976b6 15792 return TRUE;
5bd4f169
AM
15793}
15794
5bd4f169 15795#include "elf64-target.h"
7b8e7dad
AM
15796
15797/* FreeBSD support */
15798
15799#undef TARGET_LITTLE_SYM
15800#undef TARGET_LITTLE_NAME
15801
15802#undef TARGET_BIG_SYM
6d00b590 15803#define TARGET_BIG_SYM powerpc_elf64_fbsd_vec
7b8e7dad
AM
15804#undef TARGET_BIG_NAME
15805#define TARGET_BIG_NAME "elf64-powerpc-freebsd"
15806
15807#undef ELF_OSABI
15808#define ELF_OSABI ELFOSABI_FREEBSD
15809
15810#undef elf64_bed
15811#define elf64_bed elf64_powerpc_fbsd_bed
15812
15813#include "elf64-target.h"