]> git.ipfire.org Git - thirdparty/binutils-gdb.git/blame - bfd/elf64-ppc.c
Automatic date update in version.in
[thirdparty/binutils-gdb.git] / bfd / elf64-ppc.c
CommitLineData
5bd4f169 1/* PowerPC64-specific support for 64-bit ELF.
82704155 2 Copyright (C) 1999-2019 Free Software Foundation, Inc.
5bd4f169
AM
3 Written by Linus Nordberg, Swox AB <info@swox.com>,
4 based on elf32-ppc.c by Ian Lance Taylor.
32ca9640 5 Largely rewritten by Alan Modra.
5bd4f169 6
ae9a127f 7 This file is part of BFD, the Binary File Descriptor library.
5bd4f169 8
ae9a127f
NC
9 This program is free software; you can redistribute it and/or modify
10 it under the terms of the GNU General Public License as published by
cd123cb7 11 the Free Software Foundation; either version 3 of the License, or
ae9a127f 12 (at your option) any later version.
5bd4f169 13
ae9a127f
NC
14 This program is distributed in the hope that it will be useful,
15 but WITHOUT ANY WARRANTY; without even the implied warranty of
16 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
17 GNU General Public License for more details.
5bd4f169 18
4ce794b7
AM
19 You should have received a copy of the GNU General Public License along
20 with this program; if not, write to the Free Software Foundation, Inc.,
3e110533 21 51 Franklin Street - Fifth Floor, Boston, MA 02110-1301, USA. */
5bd4f169 22
cd123cb7 23
4ce794b7
AM
24/* The 64-bit PowerPC ELF ABI may be found at
25 http://www.linuxbase.org/spec/ELF/ppc64/PPC-elf64abi.txt, and
26 http://www.linuxbase.org/spec/ELF/ppc64/spec/book1.html */
5bd4f169 27
3db64b00 28#include "sysdep.h"
183e98be 29#include <stdarg.h>
5bd4f169 30#include "bfd.h"
5bd4f169
AM
31#include "bfdlink.h"
32#include "libbfd.h"
33#include "elf-bfd.h"
04c9666a 34#include "elf/ppc64.h"
5d1634d7 35#include "elf64-ppc.h"
58d180e8 36#include "dwarf2.h"
5bd4f169 37
805fc799 38static bfd_reloc_status_type ppc64_elf_ha_reloc
4ce794b7 39 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
2441e016
AM
40static bfd_reloc_status_type ppc64_elf_branch_reloc
41 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
805fc799 42static bfd_reloc_status_type ppc64_elf_brtaken_reloc
4ce794b7 43 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
805fc799 44static bfd_reloc_status_type ppc64_elf_sectoff_reloc
4ce794b7 45 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
805fc799 46static bfd_reloc_status_type ppc64_elf_sectoff_ha_reloc
4ce794b7 47 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
805fc799 48static bfd_reloc_status_type ppc64_elf_toc_reloc
4ce794b7 49 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
805fc799 50static bfd_reloc_status_type ppc64_elf_toc_ha_reloc
4ce794b7 51 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
805fc799 52static bfd_reloc_status_type ppc64_elf_toc64_reloc
4ce794b7 53 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
5663e321
AM
54static bfd_reloc_status_type ppc64_elf_prefix_reloc
55 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
805fc799 56static bfd_reloc_status_type ppc64_elf_unhandled_reloc
4ce794b7 57 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
2441e016 58static bfd_vma opd_entry_value
aef36ac1 59 (asection *, bfd_vma, asection **, bfd_vma *, bfd_boolean);
5bd4f169 60
6d00b590 61#define TARGET_LITTLE_SYM powerpc_elf64_le_vec
ad8e1ba5 62#define TARGET_LITTLE_NAME "elf64-powerpcle"
6d00b590 63#define TARGET_BIG_SYM powerpc_elf64_vec
ad8e1ba5
AM
64#define TARGET_BIG_NAME "elf64-powerpc"
65#define ELF_ARCH bfd_arch_powerpc
ae95ffa6 66#define ELF_TARGET_ID PPC64_ELF_DATA
ad8e1ba5
AM
67#define ELF_MACHINE_CODE EM_PPC64
68#define ELF_MAXPAGESIZE 0x10000
702d1671
AM
69#define ELF_COMMONPAGESIZE 0x1000
70#define ELF_RELROPAGESIZE ELF_MAXPAGESIZE
ad8e1ba5
AM
71#define elf_info_to_howto ppc64_elf_info_to_howto
72
73#define elf_backend_want_got_sym 0
74#define elf_backend_want_plt_sym 0
75#define elf_backend_plt_alignment 3
76#define elf_backend_plt_not_loaded 1
ad8e1ba5 77#define elf_backend_got_header_size 8
5474d94f 78#define elf_backend_want_dynrelro 1
ad8e1ba5
AM
79#define elf_backend_can_gc_sections 1
80#define elf_backend_can_refcount 1
81#define elf_backend_rela_normal 1
64f52338 82#define elf_backend_dtrel_excludes_plt 1
6bfdb61b 83#define elf_backend_default_execstack 0
ad8e1ba5 84
e717da7e 85#define bfd_elf64_mkobject ppc64_elf_mkobject
ad8e1ba5 86#define bfd_elf64_bfd_reloc_type_lookup ppc64_elf_reloc_type_lookup
aa374f67 87#define bfd_elf64_bfd_reloc_name_lookup ppc64_elf_reloc_name_lookup
ee67d69a
AM
88#define bfd_elf64_bfd_merge_private_bfd_data ppc64_elf_merge_private_bfd_data
89#define bfd_elf64_bfd_print_private_bfd_data ppc64_elf_print_private_bfd_data
ad8e1ba5
AM
90#define bfd_elf64_new_section_hook ppc64_elf_new_section_hook
91#define bfd_elf64_bfd_link_hash_table_create ppc64_elf_link_hash_table_create
90e3cdf2 92#define bfd_elf64_get_synthetic_symtab ppc64_elf_get_synthetic_symtab
aa374f67 93#define bfd_elf64_bfd_link_just_syms ppc64_elf_link_just_syms
8c5b4e52 94#define bfd_elf64_bfd_gc_sections ppc64_elf_gc_sections
ad8e1ba5
AM
95
96#define elf_backend_object_p ppc64_elf_object_p
d37c89e5
AM
97#define elf_backend_grok_prstatus ppc64_elf_grok_prstatus
98#define elf_backend_grok_psinfo ppc64_elf_grok_psinfo
183e98be 99#define elf_backend_write_core_note ppc64_elf_write_core_note
9d19e4fd 100#define elf_backend_create_dynamic_sections _bfd_elf_create_dynamic_sections
ad8e1ba5 101#define elf_backend_copy_indirect_symbol ppc64_elf_copy_indirect_symbol
555cd476 102#define elf_backend_add_symbol_hook ppc64_elf_add_symbol_hook
f6c7c3e8 103#define elf_backend_check_directives ppc64_elf_before_check_relocs
e5034e59 104#define elf_backend_notice_as_needed ppc64_elf_notice_as_needed
8387904d 105#define elf_backend_archive_symbol_lookup ppc64_elf_archive_symbol_lookup
ad8e1ba5 106#define elf_backend_check_relocs ppc64_elf_check_relocs
c0e331c7 107#define elf_backend_relocs_compatible _bfd_elf_relocs_compatible
74f0fb50 108#define elf_backend_gc_keep ppc64_elf_gc_keep
64d03ab5 109#define elf_backend_gc_mark_dynamic_ref ppc64_elf_gc_mark_dynamic_ref
ad8e1ba5 110#define elf_backend_gc_mark_hook ppc64_elf_gc_mark_hook
ad8e1ba5
AM
111#define elf_backend_adjust_dynamic_symbol ppc64_elf_adjust_dynamic_symbol
112#define elf_backend_hide_symbol ppc64_elf_hide_symbol
9f296da3 113#define elf_backend_maybe_function_sym ppc64_elf_maybe_function_sym
ad8e1ba5
AM
114#define elf_backend_always_size_sections ppc64_elf_func_desc_adjust
115#define elf_backend_size_dynamic_sections ppc64_elf_size_dynamic_sections
a345bc8d 116#define elf_backend_hash_symbol ppc64_elf_hash_symbol
74541ad4 117#define elf_backend_init_index_section _bfd_elf_init_2_index_sections
60124e18 118#define elf_backend_action_discarded ppc64_elf_action_discarded
ad8e1ba5
AM
119#define elf_backend_relocate_section ppc64_elf_relocate_section
120#define elf_backend_finish_dynamic_symbol ppc64_elf_finish_dynamic_symbol
121#define elf_backend_reloc_type_class ppc64_elf_reloc_type_class
122#define elf_backend_finish_dynamic_sections ppc64_elf_finish_dynamic_sections
754021d0 123#define elf_backend_link_output_symbol_hook ppc64_elf_output_symbol_hook
29ef7005 124#define elf_backend_special_sections ppc64_elf_special_sections
6911b7dc 125#define elf_backend_merge_symbol_attribute ppc64_elf_merge_symbol_attribute
8c5b4e52 126#define elf_backend_merge_symbol ppc64_elf_merge_symbol
bce964aa 127#define elf_backend_get_reloc_section bfd_get_section_by_name
ad8e1ba5 128
5bd4f169
AM
129/* The name of the dynamic interpreter. This is put in the .interp
130 section. */
131#define ELF_DYNAMIC_INTERPRETER "/usr/lib/ld.so.1"
132
133/* The size in bytes of an entry in the procedure linkage table. */
b9e5796b 134#define PLT_ENTRY_SIZE(htab) (htab->opd_abi ? 24 : 8)
2d7ad24e 135#define LOCAL_PLT_ENTRY_SIZE(htab) (htab->opd_abi ? 16 : 8)
5bd4f169
AM
136
137/* The initial size of the plt reserved for the dynamic linker. */
b9e5796b 138#define PLT_INITIAL_ENTRY_SIZE(htab) (htab->opd_abi ? 24 : 16)
5bd4f169 139
a078d95a
AM
140/* Offsets to some stack save slots. */
141#define STK_LR 16
142#define STK_TOC(htab) (htab->opd_abi ? 40 : 24)
eb8d7fda 143/* This one is dodgy. ELFv2 does not have a linker word, so use the
a078d95a
AM
144 CR save slot. Used only by optimised __tls_get_addr call stub,
145 relying on __tls_get_addr_opt not saving CR.. */
146#define STK_LINKER(htab) (htab->opd_abi ? 32 : 8)
147
5bd4f169 148/* TOC base pointers offset from start of TOC. */
411e1bfb 149#define TOC_BASE_OFF 0x8000
a27e685f
AM
150/* TOC base alignment. */
151#define TOC_BASE_ALIGN 256
411e1bfb
AM
152
153/* Offset of tp and dtp pointers from start of TLS block. */
154#define TP_OFFSET 0x7000
155#define DTP_OFFSET 0x8000
5bd4f169 156
ad8e1ba5
AM
157/* .plt call stub instructions. The normal stub is like this, but
158 sometimes the .plt entry crosses a 64k boundary and we need to
71a39c98 159 insert an addi to adjust r11. */
a078d95a 160#define STD_R2_0R1 0xf8410000 /* std %r2,0+40(%r1) */
71a39c98
AM
161#define ADDIS_R11_R2 0x3d620000 /* addis %r11,%r2,xxx@ha */
162#define LD_R12_0R11 0xe98b0000 /* ld %r12,xxx+0@l(%r11) */
163#define MTCTR_R12 0x7d8903a6 /* mtctr %r12 */
164#define LD_R2_0R11 0xe84b0000 /* ld %r2,xxx+8@l(%r11) */
165#define LD_R11_0R11 0xe96b0000 /* ld %r11,xxx+16@l(%r11) */
5d1634d7
AM
166#define BCTR 0x4e800420 /* bctr */
167
07d6d2b8 168#define ADDI_R11_R11 0x396b0000 /* addi %r11,%r11,off@l */
05d0e962
AM
169#define ADDI_R12_R11 0x398b0000 /* addi %r12,%r11,off@l */
170#define ADDI_R12_R12 0x398c0000 /* addi %r12,%r12,off@l */
07d6d2b8
AM
171#define ADDIS_R2_R2 0x3c420000 /* addis %r2,%r2,off@ha */
172#define ADDI_R2_R2 0x38420000 /* addi %r2,%r2,off@l */
173
174#define XOR_R2_R12_R12 0x7d826278 /* xor %r2,%r12,%r12 */
175#define ADD_R11_R11_R2 0x7d6b1214 /* add %r11,%r11,%r2 */
176#define XOR_R11_R12_R12 0x7d8b6278 /* xor %r11,%r12,%r12 */
177#define ADD_R2_R2_R11 0x7c425a14 /* add %r2,%r2,%r11 */
178#define CMPLDI_R2_0 0x28220000 /* cmpldi %r2,0 */
179#define BNECTR 0x4ca20420 /* bnectr+ */
180#define BNECTR_P4 0x4ce20420 /* bnectr+ */
794e51c0 181
71a39c98 182#define LD_R12_0R2 0xe9820000 /* ld %r12,xxx+0(%r2) */
ac2df442 183#define LD_R11_0R2 0xe9620000 /* ld %r11,xxx+0(%r2) */
07d6d2b8 184#define LD_R2_0R2 0xe8420000 /* ld %r2,xxx+0(%r2) */
ac2df442 185
07d6d2b8
AM
186#define LD_R2_0R1 0xe8410000 /* ld %r2,0(%r1) */
187#define LD_R2_0R12 0xe84c0000 /* ld %r2,0(%r12) */
188#define ADD_R2_R2_R12 0x7c426214 /* add %r2,%r2,%r12 */
ad8e1ba5 189
04bdff6a 190#define LI_R11_0 0x39600000 /* li %r11,0 */
07d6d2b8 191#define LIS_R2 0x3c400000 /* lis %r2,xxx@ha */
04bdff6a 192#define LIS_R11 0x3d600000 /* lis %r11,xxx@ha */
05d0e962 193#define LIS_R12 0x3d800000 /* lis %r12,xxx@ha */
006589cf
AM
194#define ADDIS_R2_R12 0x3c4c0000 /* addis %r2,%r12,xxx@ha */
195#define ADDIS_R12_R2 0x3d820000 /* addis %r12,%r2,xxx@ha */
05d0e962 196#define ADDIS_R12_R11 0x3d8b0000 /* addis %r12,%r11,xxx@ha */
a345bc8d 197#define ADDIS_R12_R12 0x3d8c0000 /* addis %r12,%r12,xxx@ha */
05d0e962 198#define ORIS_R12_R12_0 0x658c0000 /* oris %r12,%r12,xxx@hi */
04bdff6a 199#define ORI_R11_R11_0 0x616b0000 /* ori %r11,%r11,xxx@l */
05d0e962 200#define ORI_R12_R12_0 0x618c0000 /* ori %r12,%r12,xxx@l */
07d6d2b8 201#define LD_R12_0R12 0xe98c0000 /* ld %r12,xxx@l(%r12) */
04bdff6a 202#define SLDI_R11_R11_34 0x796b1746 /* sldi %r11,%r11,34 */
05d0e962
AM
203#define SLDI_R12_R12_32 0x799c07c6 /* sldi %r12,%r12,32 */
204#define LDX_R12_R11_R12 0x7d8b602a /* ldx %r12,%r11,%r12 */
205#define ADD_R12_R11_R12 0x7d8b6214 /* add %r12,%r11,%r12 */
04bdff6a
AM
206#define PADDI_R12_PC 0x0610000039800000ULL
207#define PLD_R12_PC 0x04100000e5800000ULL
5663e321 208#define PNOP 0x0700000000000000ULL
a345bc8d 209
9e390558
AM
210/* __glink_PLTresolve stub instructions. We enter with the index in R0. */
211#define GLINK_PLTRESOLVE_SIZE(htab) \
407aa07c 212 (8u + (htab->opd_abi ? 11 * 4 : 14 * 4))
ee4bf8d2
AM
213 /* 0: */
214 /* .quad plt0-1f */
215 /* __glink: */
216#define MFLR_R12 0x7d8802a6 /* mflr %12 */
217#define BCL_20_31 0x429f0005 /* bcl 20,31,1f */
218 /* 1: */
219#define MFLR_R11 0x7d6802a6 /* mflr %11 */
71a39c98 220 /* ld %2,(0b-1b)(%11) */
ee4bf8d2 221#define MTLR_R12 0x7d8803a6 /* mtlr %12 */
71a39c98
AM
222#define ADD_R11_R2_R11 0x7d625a14 /* add %11,%2,%11 */
223 /* ld %12,0(%11) */
224 /* ld %2,8(%11) */
225 /* mtctr %12 */
226 /* ld %11,16(%11) */
ee4bf8d2 227 /* bctr */
b9e5796b
AM
228#define MFLR_R0 0x7c0802a6 /* mflr %r0 */
229#define MTLR_R0 0x7c0803a6 /* mtlr %r0 */
230#define SUB_R12_R12_R11 0x7d8b6050 /* subf %r12,%r11,%r12 */
231#define ADDI_R0_R12 0x380c0000 /* addi %r0,%r12,0 */
232#define SRDI_R0_R0_2 0x7800f082 /* rldicl %r0,%r0,62,2 */
5d1634d7
AM
233
234/* Pad with this. */
235#define NOP 0x60000000
236
721956f4
AM
237/* Some other nops. */
238#define CROR_151515 0x4def7b82
239#define CROR_313131 0x4ffffb82
240
cedb70c5 241/* .glink entries for the first 32k functions are two instructions. */
5d1634d7
AM
242#define LI_R0_0 0x38000000 /* li %r0,0 */
243#define B_DOT 0x48000000 /* b . */
244
245/* After that, we need two instructions to load the index, followed by
246 a branch. */
247#define LIS_R0_0 0x3c000000 /* lis %r0,0 */
10ed1bba 248#define ORI_R0_R0_0 0x60000000 /* ori %r0,%r0,0 */
41bd81ab 249
deb0e272
AM
250/* Instructions used by the save and restore reg functions. */
251#define STD_R0_0R1 0xf8010000 /* std %r0,0(%r1) */
252#define STD_R0_0R12 0xf80c0000 /* std %r0,0(%r12) */
253#define LD_R0_0R1 0xe8010000 /* ld %r0,0(%r1) */
254#define LD_R0_0R12 0xe80c0000 /* ld %r0,0(%r12) */
82bd7b59
AM
255#define STFD_FR0_0R1 0xd8010000 /* stfd %fr0,0(%r1) */
256#define LFD_FR0_0R1 0xc8010000 /* lfd %fr0,0(%r1) */
deb0e272
AM
257#define LI_R12_0 0x39800000 /* li %r12,0 */
258#define STVX_VR0_R12_R0 0x7c0c01ce /* stvx %v0,%r12,%r0 */
259#define LVX_VR0_R12_R0 0x7c0c00ce /* lvx %v0,%r12,%r0 */
260#define MTLR_R0 0x7c0803a6 /* mtlr %r0 */
82bd7b59
AM
261#define BLR 0x4e800020 /* blr */
262
41bd81ab
AM
263/* Since .opd is an array of descriptors and each entry will end up
264 with identical R_PPC64_RELATIVE relocs, there is really no need to
265 propagate .opd relocs; The dynamic linker should be taught to
1e2f5b6e 266 relocate .opd without reloc entries. */
41bd81ab
AM
267#ifndef NO_OPD_RELOCS
268#define NO_OPD_RELOCS 0
269#endif
810d4e75 270
a4b6fadd
AM
271#ifndef ARRAY_SIZE
272#define ARRAY_SIZE(a) (sizeof (a) / sizeof ((a)[0]))
273#endif
274
810d4e75
AM
275static inline int
276abiversion (bfd *abfd)
277{
278 return elf_elfheader (abfd)->e_flags & EF_PPC64_ABI;
279}
280
281static inline void
282set_abiversion (bfd *abfd, int ver)
283{
284 elf_elfheader (abfd)->e_flags &= ~EF_PPC64_ABI;
285 elf_elfheader (abfd)->e_flags |= ver & EF_PPC64_ABI;
286}
5bd4f169
AM
287\f
288/* Relocation HOWTO's. */
46807bf4
AM
289/* Like other ELF RELA targets that don't apply multiple
290 field-altering relocations to the same localation, src_mask is
291 always zero and pcrel_offset is the same as pc_relative.
292 PowerPC can always use a zero bitpos, even when the field is not at
293 the LSB. For example, a REL24 could use rightshift=2, bisize=24
294 and bitpos=2 which matches the ABI description, or as we do here,
295 rightshift=0, bitsize=26 and bitpos=0. */
296#define HOW(type, size, bitsize, mask, rightshift, pc_relative, \
297 complain, special_func) \
298 HOWTO (type, rightshift, size, bitsize, pc_relative, 0, \
299 complain_overflow_ ## complain, special_func, \
300 #type, FALSE, 0, mask, pc_relative)
301
04c9666a 302static reloc_howto_type *ppc64_elf_howto_table[(int) R_PPC64_max];
5bd4f169 303
f3185997
NC
304static reloc_howto_type ppc64_elf_howto_raw[] =
305{
5bd4f169 306 /* This reloc does nothing. */
46807bf4
AM
307 HOW (R_PPC64_NONE, 3, 0, 0, 0, FALSE, dont,
308 bfd_elf_generic_reloc),
5bd4f169
AM
309
310 /* A standard 32 bit relocation. */
46807bf4
AM
311 HOW (R_PPC64_ADDR32, 2, 32, 0xffffffff, 0, FALSE, bitfield,
312 bfd_elf_generic_reloc),
5bd4f169
AM
313
314 /* An absolute 26 bit branch; the lower two bits must be zero.
315 FIXME: we don't check that, we just clear them. */
46807bf4
AM
316 HOW (R_PPC64_ADDR24, 2, 26, 0x03fffffc, 0, FALSE, bitfield,
317 bfd_elf_generic_reloc),
5bd4f169
AM
318
319 /* A standard 16 bit relocation. */
46807bf4
AM
320 HOW (R_PPC64_ADDR16, 1, 16, 0xffff, 0, FALSE, bitfield,
321 bfd_elf_generic_reloc),
5bd4f169
AM
322
323 /* A 16 bit relocation without overflow. */
46807bf4
AM
324 HOW (R_PPC64_ADDR16_LO, 1, 16, 0xffff, 0, FALSE, dont,
325 bfd_elf_generic_reloc),
5bd4f169
AM
326
327 /* Bits 16-31 of an address. */
46807bf4
AM
328 HOW (R_PPC64_ADDR16_HI, 1, 16, 0xffff, 16, FALSE, signed,
329 bfd_elf_generic_reloc),
5bd4f169
AM
330
331 /* Bits 16-31 of an address, plus 1 if the contents of the low 16
332 bits, treated as a signed number, is negative. */
46807bf4
AM
333 HOW (R_PPC64_ADDR16_HA, 1, 16, 0xffff, 16, FALSE, signed,
334 ppc64_elf_ha_reloc),
5bd4f169
AM
335
336 /* An absolute 16 bit branch; the lower two bits must be zero.
337 FIXME: we don't check that, we just clear them. */
46807bf4
AM
338 HOW (R_PPC64_ADDR14, 2, 16, 0x0000fffc, 0, FALSE, signed,
339 ppc64_elf_branch_reloc),
5bd4f169
AM
340
341 /* An absolute 16 bit branch, for which bit 10 should be set to
342 indicate that the branch is expected to be taken. The lower two
343 bits must be zero. */
46807bf4
AM
344 HOW (R_PPC64_ADDR14_BRTAKEN, 2, 16, 0x0000fffc, 0, FALSE, signed,
345 ppc64_elf_brtaken_reloc),
5bd4f169
AM
346
347 /* An absolute 16 bit branch, for which bit 10 should be set to
348 indicate that the branch is not expected to be taken. The lower
349 two bits must be zero. */
46807bf4
AM
350 HOW (R_PPC64_ADDR14_BRNTAKEN, 2, 16, 0x0000fffc, 0, FALSE, signed,
351 ppc64_elf_brtaken_reloc),
5bd4f169
AM
352
353 /* A relative 26 bit branch; the lower two bits must be zero. */
46807bf4
AM
354 HOW (R_PPC64_REL24, 2, 26, 0x03fffffc, 0, TRUE, signed,
355 ppc64_elf_branch_reloc),
5bd4f169 356
05d0e962 357 /* A variant of R_PPC64_REL24, used when r2 is not the toc pointer. */
46807bf4
AM
358 HOW (R_PPC64_REL24_NOTOC, 2, 26, 0x03fffffc, 0, TRUE, signed,
359 ppc64_elf_branch_reloc),
05d0e962 360
5bd4f169 361 /* A relative 16 bit branch; the lower two bits must be zero. */
46807bf4
AM
362 HOW (R_PPC64_REL14, 2, 16, 0x0000fffc, 0, TRUE, signed,
363 ppc64_elf_branch_reloc),
5bd4f169
AM
364
365 /* A relative 16 bit branch. Bit 10 should be set to indicate that
366 the branch is expected to be taken. The lower two bits must be
367 zero. */
46807bf4
AM
368 HOW (R_PPC64_REL14_BRTAKEN, 2, 16, 0x0000fffc, 0, TRUE, signed,
369 ppc64_elf_brtaken_reloc),
5bd4f169
AM
370
371 /* A relative 16 bit branch. Bit 10 should be set to indicate that
372 the branch is not expected to be taken. The lower two bits must
373 be zero. */
46807bf4
AM
374 HOW (R_PPC64_REL14_BRNTAKEN, 2, 16, 0x0000fffc, 0, TRUE, signed,
375 ppc64_elf_brtaken_reloc),
5bd4f169
AM
376
377 /* Like R_PPC64_ADDR16, but referring to the GOT table entry for the
378 symbol. */
46807bf4
AM
379 HOW (R_PPC64_GOT16, 1, 16, 0xffff, 0, FALSE, signed,
380 ppc64_elf_unhandled_reloc),
5bd4f169
AM
381
382 /* Like R_PPC64_ADDR16_LO, but referring to the GOT table entry for
383 the symbol. */
46807bf4
AM
384 HOW (R_PPC64_GOT16_LO, 1, 16, 0xffff, 0, FALSE, dont,
385 ppc64_elf_unhandled_reloc),
5bd4f169
AM
386
387 /* Like R_PPC64_ADDR16_HI, but referring to the GOT table entry for
388 the symbol. */
46807bf4
AM
389 HOW (R_PPC64_GOT16_HI, 1, 16, 0xffff, 16, FALSE, signed,
390 ppc64_elf_unhandled_reloc),
5bd4f169
AM
391
392 /* Like R_PPC64_ADDR16_HA, but referring to the GOT table entry for
393 the symbol. */
46807bf4
AM
394 HOW (R_PPC64_GOT16_HA, 1, 16, 0xffff, 16, FALSE, signed,
395 ppc64_elf_unhandled_reloc),
5bd4f169
AM
396
397 /* This is used only by the dynamic linker. The symbol should exist
398 both in the object being run and in some shared library. The
399 dynamic linker copies the data addressed by the symbol from the
400 shared library into the object, because the object being
401 run has to have the data at some particular address. */
46807bf4
AM
402 HOW (R_PPC64_COPY, 0, 0, 0, 0, FALSE, dont,
403 ppc64_elf_unhandled_reloc),
5bd4f169
AM
404
405 /* Like R_PPC64_ADDR64, but used when setting global offset table
406 entries. */
46807bf4
AM
407 HOW (R_PPC64_GLOB_DAT, 4, 64, 0xffffffffffffffffULL, 0, FALSE, dont,
408 ppc64_elf_unhandled_reloc),
5bd4f169
AM
409
410 /* Created by the link editor. Marks a procedure linkage table
411 entry for a symbol. */
46807bf4
AM
412 HOW (R_PPC64_JMP_SLOT, 0, 0, 0, 0, FALSE, dont,
413 ppc64_elf_unhandled_reloc),
5bd4f169
AM
414
415 /* Used only by the dynamic linker. When the object is run, this
416 doubleword64 is set to the load address of the object, plus the
417 addend. */
46807bf4
AM
418 HOW (R_PPC64_RELATIVE, 4, 64, 0xffffffffffffffffULL, 0, FALSE, dont,
419 bfd_elf_generic_reloc),
5bd4f169
AM
420
421 /* Like R_PPC64_ADDR32, but may be unaligned. */
46807bf4
AM
422 HOW (R_PPC64_UADDR32, 2, 32, 0xffffffff, 0, FALSE, bitfield,
423 bfd_elf_generic_reloc),
5bd4f169
AM
424
425 /* Like R_PPC64_ADDR16, but may be unaligned. */
46807bf4
AM
426 HOW (R_PPC64_UADDR16, 1, 16, 0xffff, 0, FALSE, bitfield,
427 bfd_elf_generic_reloc),
5bd4f169
AM
428
429 /* 32-bit PC relative. */
46807bf4
AM
430 HOW (R_PPC64_REL32, 2, 32, 0xffffffff, 0, TRUE, signed,
431 bfd_elf_generic_reloc),
5bd4f169 432
10ed1bba 433 /* 32-bit relocation to the symbol's procedure linkage table. */
46807bf4
AM
434 HOW (R_PPC64_PLT32, 2, 32, 0xffffffff, 0, FALSE, bitfield,
435 ppc64_elf_unhandled_reloc),
5bd4f169
AM
436
437 /* 32-bit PC relative relocation to the symbol's procedure linkage table.
438 FIXME: R_PPC64_PLTREL32 not supported. */
46807bf4
AM
439 HOW (R_PPC64_PLTREL32, 2, 32, 0xffffffff, 0, TRUE, signed,
440 ppc64_elf_unhandled_reloc),
5bd4f169
AM
441
442 /* Like R_PPC64_ADDR16_LO, but referring to the PLT table entry for
443 the symbol. */
46807bf4
AM
444 HOW (R_PPC64_PLT16_LO, 1, 16, 0xffff, 0, FALSE, dont,
445 ppc64_elf_unhandled_reloc),
5bd4f169
AM
446
447 /* Like R_PPC64_ADDR16_HI, but referring to the PLT table entry for
448 the symbol. */
46807bf4
AM
449 HOW (R_PPC64_PLT16_HI, 1, 16, 0xffff, 16, FALSE, signed,
450 ppc64_elf_unhandled_reloc),
5bd4f169
AM
451
452 /* Like R_PPC64_ADDR16_HA, but referring to the PLT table entry for
453 the symbol. */
46807bf4
AM
454 HOW (R_PPC64_PLT16_HA, 1, 16, 0xffff, 16, FALSE, signed,
455 ppc64_elf_unhandled_reloc),
5bd4f169 456
c061c2d8 457 /* 16-bit section relative relocation. */
46807bf4
AM
458 HOW (R_PPC64_SECTOFF, 1, 16, 0xffff, 0, FALSE, signed,
459 ppc64_elf_sectoff_reloc),
5bd4f169 460
c061c2d8 461 /* Like R_PPC64_SECTOFF, but no overflow warning. */
46807bf4
AM
462 HOW (R_PPC64_SECTOFF_LO, 1, 16, 0xffff, 0, FALSE, dont,
463 ppc64_elf_sectoff_reloc),
5bd4f169
AM
464
465 /* 16-bit upper half section relative relocation. */
46807bf4
AM
466 HOW (R_PPC64_SECTOFF_HI, 1, 16, 0xffff, 16, FALSE, signed,
467 ppc64_elf_sectoff_reloc),
5bd4f169
AM
468
469 /* 16-bit upper half adjusted section relative relocation. */
46807bf4
AM
470 HOW (R_PPC64_SECTOFF_HA, 1, 16, 0xffff, 16, FALSE, signed,
471 ppc64_elf_sectoff_ha_reloc),
5bd4f169 472
04c9666a 473 /* Like R_PPC64_REL24 without touching the two least significant bits. */
46807bf4
AM
474 HOW (R_PPC64_REL30, 2, 30, 0xfffffffc, 2, TRUE, dont,
475 bfd_elf_generic_reloc),
5bd4f169
AM
476
477 /* Relocs in the 64-bit PowerPC ELF ABI, not in the 32-bit ABI. */
478
479 /* A standard 64-bit relocation. */
46807bf4
AM
480 HOW (R_PPC64_ADDR64, 4, 64, 0xffffffffffffffffULL, 0, FALSE, dont,
481 bfd_elf_generic_reloc),
5bd4f169
AM
482
483 /* The bits 32-47 of an address. */
46807bf4
AM
484 HOW (R_PPC64_ADDR16_HIGHER, 1, 16, 0xffff, 32, FALSE, dont,
485 bfd_elf_generic_reloc),
5bd4f169
AM
486
487 /* The bits 32-47 of an address, plus 1 if the contents of the low
488 16 bits, treated as a signed number, is negative. */
46807bf4
AM
489 HOW (R_PPC64_ADDR16_HIGHERA, 1, 16, 0xffff, 32, FALSE, dont,
490 ppc64_elf_ha_reloc),
5bd4f169
AM
491
492 /* The bits 48-63 of an address. */
46807bf4
AM
493 HOW (R_PPC64_ADDR16_HIGHEST, 1, 16, 0xffff, 48, FALSE, dont,
494 bfd_elf_generic_reloc),
5bd4f169
AM
495
496 /* The bits 48-63 of an address, plus 1 if the contents of the low
497 16 bits, treated as a signed number, is negative. */
46807bf4
AM
498 HOW (R_PPC64_ADDR16_HIGHESTA, 1, 16, 0xffff, 48, FALSE, dont,
499 ppc64_elf_ha_reloc),
5bd4f169
AM
500
501 /* Like ADDR64, but may be unaligned. */
46807bf4
AM
502 HOW (R_PPC64_UADDR64, 4, 64, 0xffffffffffffffffULL, 0, FALSE, dont,
503 bfd_elf_generic_reloc),
5bd4f169
AM
504
505 /* 64-bit relative relocation. */
46807bf4
AM
506 HOW (R_PPC64_REL64, 4, 64, 0xffffffffffffffffULL, 0, TRUE, dont,
507 bfd_elf_generic_reloc),
5bd4f169 508
cedb70c5 509 /* 64-bit relocation to the symbol's procedure linkage table. */
46807bf4
AM
510 HOW (R_PPC64_PLT64, 4, 64, 0xffffffffffffffffULL, 0, FALSE, dont,
511 ppc64_elf_unhandled_reloc),
5bd4f169
AM
512
513 /* 64-bit PC relative relocation to the symbol's procedure linkage
514 table. */
515 /* FIXME: R_PPC64_PLTREL64 not supported. */
46807bf4
AM
516 HOW (R_PPC64_PLTREL64, 4, 64, 0xffffffffffffffffULL, 0, TRUE, dont,
517 ppc64_elf_unhandled_reloc),
5bd4f169
AM
518
519 /* 16 bit TOC-relative relocation. */
5bd4f169 520 /* R_PPC64_TOC16 47 half16* S + A - .TOC. */
46807bf4
AM
521 HOW (R_PPC64_TOC16, 1, 16, 0xffff, 0, FALSE, signed,
522 ppc64_elf_toc_reloc),
5bd4f169
AM
523
524 /* 16 bit TOC-relative relocation without overflow. */
5bd4f169 525 /* R_PPC64_TOC16_LO 48 half16 #lo (S + A - .TOC.) */
46807bf4
AM
526 HOW (R_PPC64_TOC16_LO, 1, 16, 0xffff, 0, FALSE, dont,
527 ppc64_elf_toc_reloc),
5bd4f169
AM
528
529 /* 16 bit TOC-relative relocation, high 16 bits. */
5bd4f169 530 /* R_PPC64_TOC16_HI 49 half16 #hi (S + A - .TOC.) */
46807bf4
AM
531 HOW (R_PPC64_TOC16_HI, 1, 16, 0xffff, 16, FALSE, signed,
532 ppc64_elf_toc_reloc),
5bd4f169
AM
533
534 /* 16 bit TOC-relative relocation, high 16 bits, plus 1 if the
535 contents of the low 16 bits, treated as a signed number, is
536 negative. */
5bd4f169 537 /* R_PPC64_TOC16_HA 50 half16 #ha (S + A - .TOC.) */
46807bf4
AM
538 HOW (R_PPC64_TOC16_HA, 1, 16, 0xffff, 16, FALSE, signed,
539 ppc64_elf_toc_ha_reloc),
5bd4f169
AM
540
541 /* 64-bit relocation; insert value of TOC base (.TOC.). */
5bd4f169 542 /* R_PPC64_TOC 51 doubleword64 .TOC. */
46807bf4
AM
543 HOW (R_PPC64_TOC, 4, 64, 0xffffffffffffffffULL, 0, FALSE, dont,
544 ppc64_elf_toc64_reloc),
5bd4f169
AM
545
546 /* Like R_PPC64_GOT16, but also informs the link editor that the
547 value to relocate may (!) refer to a PLT entry which the link
548 editor (a) may replace with the symbol value. If the link editor
549 is unable to fully resolve the symbol, it may (b) create a PLT
550 entry and store the address to the new PLT entry in the GOT.
551 This permits lazy resolution of function symbols at run time.
552 The link editor may also skip all of this and just (c) emit a
553 R_PPC64_GLOB_DAT to tie the symbol to the GOT entry. */
554 /* FIXME: R_PPC64_PLTGOT16 not implemented. */
46807bf4
AM
555 HOW (R_PPC64_PLTGOT16, 1, 16, 0xffff, 0, FALSE,signed,
556 ppc64_elf_unhandled_reloc),
411e1bfb
AM
557
558 /* Like R_PPC64_PLTGOT16, but without overflow. */
559 /* FIXME: R_PPC64_PLTGOT16_LO not implemented. */
46807bf4
AM
560 HOW (R_PPC64_PLTGOT16_LO, 1, 16, 0xffff, 0, FALSE, dont,
561 ppc64_elf_unhandled_reloc),
411e1bfb
AM
562
563 /* Like R_PPC64_PLT_GOT16, but using bits 16-31 of the address. */
564 /* FIXME: R_PPC64_PLTGOT16_HI not implemented. */
46807bf4
AM
565 HOW (R_PPC64_PLTGOT16_HI, 1, 16, 0xffff, 16, FALSE, signed,
566 ppc64_elf_unhandled_reloc),
411e1bfb
AM
567
568 /* Like R_PPC64_PLT_GOT16, but using bits 16-31 of the address, plus
569 1 if the contents of the low 16 bits, treated as a signed number,
570 is negative. */
571 /* FIXME: R_PPC64_PLTGOT16_HA not implemented. */
46807bf4
AM
572 HOW (R_PPC64_PLTGOT16_HA, 1, 16, 0xffff, 16, FALSE, signed,
573 ppc64_elf_unhandled_reloc),
411e1bfb
AM
574
575 /* Like R_PPC64_ADDR16, but for instructions with a DS field. */
46807bf4
AM
576 HOW (R_PPC64_ADDR16_DS, 1, 16, 0xfffc, 0, FALSE, signed,
577 bfd_elf_generic_reloc),
411e1bfb
AM
578
579 /* Like R_PPC64_ADDR16_LO, but for instructions with a DS field. */
46807bf4
AM
580 HOW (R_PPC64_ADDR16_LO_DS, 1, 16, 0xfffc, 0, FALSE, dont,
581 bfd_elf_generic_reloc),
411e1bfb
AM
582
583 /* Like R_PPC64_GOT16, but for instructions with a DS field. */
46807bf4
AM
584 HOW (R_PPC64_GOT16_DS, 1, 16, 0xfffc, 0, FALSE, signed,
585 ppc64_elf_unhandled_reloc),
411e1bfb
AM
586
587 /* Like R_PPC64_GOT16_LO, but for instructions with a DS field. */
46807bf4
AM
588 HOW (R_PPC64_GOT16_LO_DS, 1, 16, 0xfffc, 0, FALSE, dont,
589 ppc64_elf_unhandled_reloc),
411e1bfb
AM
590
591 /* Like R_PPC64_PLT16_LO, but for instructions with a DS field. */
46807bf4
AM
592 HOW (R_PPC64_PLT16_LO_DS, 1, 16, 0xfffc, 0, FALSE, dont,
593 ppc64_elf_unhandled_reloc),
411e1bfb
AM
594
595 /* Like R_PPC64_SECTOFF, but for instructions with a DS field. */
46807bf4
AM
596 HOW (R_PPC64_SECTOFF_DS, 1, 16, 0xfffc, 0, FALSE, signed,
597 ppc64_elf_sectoff_reloc),
411e1bfb
AM
598
599 /* Like R_PPC64_SECTOFF_LO, but for instructions with a DS field. */
46807bf4
AM
600 HOW (R_PPC64_SECTOFF_LO_DS, 1, 16, 0xfffc, 0, FALSE, dont,
601 ppc64_elf_sectoff_reloc),
411e1bfb
AM
602
603 /* Like R_PPC64_TOC16, but for instructions with a DS field. */
46807bf4
AM
604 HOW (R_PPC64_TOC16_DS, 1, 16, 0xfffc, 0, FALSE, signed,
605 ppc64_elf_toc_reloc),
411e1bfb
AM
606
607 /* Like R_PPC64_TOC16_LO, but for instructions with a DS field. */
46807bf4
AM
608 HOW (R_PPC64_TOC16_LO_DS, 1, 16, 0xfffc, 0, FALSE, dont,
609 ppc64_elf_toc_reloc),
411e1bfb
AM
610
611 /* Like R_PPC64_PLTGOT16, but for instructions with a DS field. */
612 /* FIXME: R_PPC64_PLTGOT16_DS not implemented. */
46807bf4
AM
613 HOW (R_PPC64_PLTGOT16_DS, 1, 16, 0xfffc, 0, FALSE, signed,
614 ppc64_elf_unhandled_reloc),
411e1bfb
AM
615
616 /* Like R_PPC64_PLTGOT16_LO, but for instructions with a DS field. */
617 /* FIXME: R_PPC64_PLTGOT16_LO not implemented. */
46807bf4
AM
618 HOW (R_PPC64_PLTGOT16_LO_DS, 1, 16, 0xfffc, 0, FALSE, dont,
619 ppc64_elf_unhandled_reloc),
411e1bfb 620
727fc41e 621 /* Marker relocs for TLS. */
46807bf4
AM
622 HOW (R_PPC64_TLS, 2, 32, 0, 0, FALSE, dont,
623 bfd_elf_generic_reloc),
624
625 HOW (R_PPC64_TLSGD, 2, 32, 0, 0, FALSE, dont,
626 bfd_elf_generic_reloc),
627
628 HOW (R_PPC64_TLSLD, 2, 32, 0, 0, FALSE, dont,
629 bfd_elf_generic_reloc),
727fc41e 630
23cedd1d
AM
631 /* Marker reloc for optimizing r2 save in prologue rather than on
632 each plt call stub. */
46807bf4
AM
633 HOW (R_PPC64_TOCSAVE, 2, 32, 0, 0, FALSE, dont,
634 bfd_elf_generic_reloc),
3b421ab3 635
23cedd1d 636 /* Marker relocs on inline plt call instructions. */
46807bf4
AM
637 HOW (R_PPC64_PLTSEQ, 2, 32, 0, 0, FALSE, dont,
638 bfd_elf_generic_reloc),
639
640 HOW (R_PPC64_PLTCALL, 2, 32, 0, 0, FALSE, dont,
641 bfd_elf_generic_reloc),
23cedd1d 642
411e1bfb
AM
643 /* Computes the load module index of the load module that contains the
644 definition of its TLS sym. */
46807bf4
AM
645 HOW (R_PPC64_DTPMOD64, 4, 64, 0xffffffffffffffffULL, 0, FALSE, dont,
646 ppc64_elf_unhandled_reloc),
411e1bfb
AM
647
648 /* Computes a dtv-relative displacement, the difference between the value
649 of sym+add and the base address of the thread-local storage block that
650 contains the definition of sym, minus 0x8000. */
46807bf4
AM
651 HOW (R_PPC64_DTPREL64, 4, 64, 0xffffffffffffffffULL, 0, FALSE, dont,
652 ppc64_elf_unhandled_reloc),
411e1bfb
AM
653
654 /* A 16 bit dtprel reloc. */
46807bf4
AM
655 HOW (R_PPC64_DTPREL16, 1, 16, 0xffff, 0, FALSE, signed,
656 ppc64_elf_unhandled_reloc),
411e1bfb
AM
657
658 /* Like DTPREL16, but no overflow. */
46807bf4
AM
659 HOW (R_PPC64_DTPREL16_LO, 1, 16, 0xffff, 0, FALSE, dont,
660 ppc64_elf_unhandled_reloc),
411e1bfb
AM
661
662 /* Like DTPREL16_LO, but next higher group of 16 bits. */
46807bf4
AM
663 HOW (R_PPC64_DTPREL16_HI, 1, 16, 0xffff, 16, FALSE, signed,
664 ppc64_elf_unhandled_reloc),
411e1bfb
AM
665
666 /* Like DTPREL16_HI, but adjust for low 16 bits. */
46807bf4
AM
667 HOW (R_PPC64_DTPREL16_HA, 1, 16, 0xffff, 16, FALSE, signed,
668 ppc64_elf_unhandled_reloc),
411e1bfb
AM
669
670 /* Like DTPREL16_HI, but next higher group of 16 bits. */
46807bf4
AM
671 HOW (R_PPC64_DTPREL16_HIGHER, 1, 16, 0xffff, 32, FALSE, dont,
672 ppc64_elf_unhandled_reloc),
411e1bfb
AM
673
674 /* Like DTPREL16_HIGHER, but adjust for low 16 bits. */
46807bf4
AM
675 HOW (R_PPC64_DTPREL16_HIGHERA, 1, 16, 0xffff, 32, FALSE, dont,
676 ppc64_elf_unhandled_reloc),
411e1bfb
AM
677
678 /* Like DTPREL16_HIGHER, but next higher group of 16 bits. */
46807bf4
AM
679 HOW (R_PPC64_DTPREL16_HIGHEST, 1, 16, 0xffff, 48, FALSE, dont,
680 ppc64_elf_unhandled_reloc),
411e1bfb
AM
681
682 /* Like DTPREL16_HIGHEST, but adjust for low 16 bits. */
46807bf4
AM
683 HOW (R_PPC64_DTPREL16_HIGHESTA, 1, 16, 0xffff, 48, FALSE, dont,
684 ppc64_elf_unhandled_reloc),
411e1bfb
AM
685
686 /* Like DTPREL16, but for insns with a DS field. */
46807bf4
AM
687 HOW (R_PPC64_DTPREL16_DS, 1, 16, 0xfffc, 0, FALSE, signed,
688 ppc64_elf_unhandled_reloc),
411e1bfb
AM
689
690 /* Like DTPREL16_DS, but no overflow. */
46807bf4
AM
691 HOW (R_PPC64_DTPREL16_LO_DS, 1, 16, 0xfffc, 0, FALSE, dont,
692 ppc64_elf_unhandled_reloc),
411e1bfb
AM
693
694 /* Computes a tp-relative displacement, the difference between the value of
695 sym+add and the value of the thread pointer (r13). */
46807bf4
AM
696 HOW (R_PPC64_TPREL64, 4, 64, 0xffffffffffffffffULL, 0, FALSE, dont,
697 ppc64_elf_unhandled_reloc),
411e1bfb
AM
698
699 /* A 16 bit tprel reloc. */
46807bf4
AM
700 HOW (R_PPC64_TPREL16, 1, 16, 0xffff, 0, FALSE, signed,
701 ppc64_elf_unhandled_reloc),
411e1bfb
AM
702
703 /* Like TPREL16, but no overflow. */
46807bf4
AM
704 HOW (R_PPC64_TPREL16_LO, 1, 16, 0xffff, 0, FALSE, dont,
705 ppc64_elf_unhandled_reloc),
411e1bfb
AM
706
707 /* Like TPREL16_LO, but next higher group of 16 bits. */
46807bf4
AM
708 HOW (R_PPC64_TPREL16_HI, 1, 16, 0xffff, 16, FALSE, signed,
709 ppc64_elf_unhandled_reloc),
411e1bfb
AM
710
711 /* Like TPREL16_HI, but adjust for low 16 bits. */
46807bf4
AM
712 HOW (R_PPC64_TPREL16_HA, 1, 16, 0xffff, 16, FALSE, signed,
713 ppc64_elf_unhandled_reloc),
411e1bfb
AM
714
715 /* Like TPREL16_HI, but next higher group of 16 bits. */
46807bf4
AM
716 HOW (R_PPC64_TPREL16_HIGHER, 1, 16, 0xffff, 32, FALSE, dont,
717 ppc64_elf_unhandled_reloc),
411e1bfb
AM
718
719 /* Like TPREL16_HIGHER, but adjust for low 16 bits. */
46807bf4
AM
720 HOW (R_PPC64_TPREL16_HIGHERA, 1, 16, 0xffff, 32, FALSE, dont,
721 ppc64_elf_unhandled_reloc),
411e1bfb
AM
722
723 /* Like TPREL16_HIGHER, but next higher group of 16 bits. */
46807bf4
AM
724 HOW (R_PPC64_TPREL16_HIGHEST, 1, 16, 0xffff, 48, FALSE, dont,
725 ppc64_elf_unhandled_reloc),
411e1bfb
AM
726
727 /* Like TPREL16_HIGHEST, but adjust for low 16 bits. */
46807bf4
AM
728 HOW (R_PPC64_TPREL16_HIGHESTA, 1, 16, 0xffff, 48, FALSE, dont,
729 ppc64_elf_unhandled_reloc),
411e1bfb
AM
730
731 /* Like TPREL16, but for insns with a DS field. */
46807bf4
AM
732 HOW (R_PPC64_TPREL16_DS, 1, 16, 0xfffc, 0, FALSE, signed,
733 ppc64_elf_unhandled_reloc),
411e1bfb
AM
734
735 /* Like TPREL16_DS, but no overflow. */
46807bf4
AM
736 HOW (R_PPC64_TPREL16_LO_DS, 1, 16, 0xfffc, 0, FALSE, dont,
737 ppc64_elf_unhandled_reloc),
411e1bfb
AM
738
739 /* Allocates two contiguous entries in the GOT to hold a tls_index structure,
740 with values (sym+add)@dtpmod and (sym+add)@dtprel, and computes the offset
741 to the first entry relative to the TOC base (r2). */
46807bf4
AM
742 HOW (R_PPC64_GOT_TLSGD16, 1, 16, 0xffff, 0, FALSE, signed,
743 ppc64_elf_unhandled_reloc),
5bd4f169 744
411e1bfb 745 /* Like GOT_TLSGD16, but no overflow. */
46807bf4
AM
746 HOW (R_PPC64_GOT_TLSGD16_LO, 1, 16, 0xffff, 0, FALSE, dont,
747 ppc64_elf_unhandled_reloc),
5bd4f169 748
411e1bfb 749 /* Like GOT_TLSGD16_LO, but next higher group of 16 bits. */
46807bf4
AM
750 HOW (R_PPC64_GOT_TLSGD16_HI, 1, 16, 0xffff, 16, FALSE, signed,
751 ppc64_elf_unhandled_reloc),
5bd4f169 752
411e1bfb 753 /* Like GOT_TLSGD16_HI, but adjust for low 16 bits. */
46807bf4
AM
754 HOW (R_PPC64_GOT_TLSGD16_HA, 1, 16, 0xffff, 16, FALSE, signed,
755 ppc64_elf_unhandled_reloc),
5bd4f169 756
411e1bfb
AM
757 /* Allocates two contiguous entries in the GOT to hold a tls_index structure,
758 with values (sym+add)@dtpmod and zero, and computes the offset to the
759 first entry relative to the TOC base (r2). */
46807bf4
AM
760 HOW (R_PPC64_GOT_TLSLD16, 1, 16, 0xffff, 0, FALSE, signed,
761 ppc64_elf_unhandled_reloc),
5bd4f169 762
411e1bfb 763 /* Like GOT_TLSLD16, but no overflow. */
46807bf4
AM
764 HOW (R_PPC64_GOT_TLSLD16_LO, 1, 16, 0xffff, 0, FALSE, dont,
765 ppc64_elf_unhandled_reloc),
5bd4f169 766
411e1bfb 767 /* Like GOT_TLSLD16_LO, but next higher group of 16 bits. */
46807bf4
AM
768 HOW (R_PPC64_GOT_TLSLD16_HI, 1, 16, 0xffff, 16, FALSE, signed,
769 ppc64_elf_unhandled_reloc),
5bd4f169 770
411e1bfb 771 /* Like GOT_TLSLD16_HI, but adjust for low 16 bits. */
46807bf4
AM
772 HOW (R_PPC64_GOT_TLSLD16_HA, 1, 16, 0xffff, 16, FALSE, signed,
773 ppc64_elf_unhandled_reloc),
5bd4f169 774
411e1bfb
AM
775 /* Allocates an entry in the GOT with value (sym+add)@dtprel, and computes
776 the offset to the entry relative to the TOC base (r2). */
46807bf4
AM
777 HOW (R_PPC64_GOT_DTPREL16_DS, 1, 16, 0xfffc, 0, FALSE, signed,
778 ppc64_elf_unhandled_reloc),
5bd4f169 779
411e1bfb 780 /* Like GOT_DTPREL16_DS, but no overflow. */
46807bf4
AM
781 HOW (R_PPC64_GOT_DTPREL16_LO_DS, 1, 16, 0xfffc, 0, FALSE, dont,
782 ppc64_elf_unhandled_reloc),
5bd4f169 783
411e1bfb 784 /* Like GOT_DTPREL16_LO_DS, but next higher group of 16 bits. */
46807bf4
AM
785 HOW (R_PPC64_GOT_DTPREL16_HI, 1, 16, 0xffff, 16, FALSE, signed,
786 ppc64_elf_unhandled_reloc),
5bd4f169 787
411e1bfb 788 /* Like GOT_DTPREL16_HI, but adjust for low 16 bits. */
46807bf4
AM
789 HOW (R_PPC64_GOT_DTPREL16_HA, 1, 16, 0xffff, 16, FALSE, signed,
790 ppc64_elf_unhandled_reloc),
411e1bfb
AM
791
792 /* Allocates an entry in the GOT with value (sym+add)@tprel, and computes the
793 offset to the entry relative to the TOC base (r2). */
46807bf4
AM
794 HOW (R_PPC64_GOT_TPREL16_DS, 1, 16, 0xfffc, 0, FALSE, signed,
795 ppc64_elf_unhandled_reloc),
5bd4f169 796
411e1bfb 797 /* Like GOT_TPREL16_DS, but no overflow. */
46807bf4
AM
798 HOW (R_PPC64_GOT_TPREL16_LO_DS, 1, 16, 0xfffc, 0, FALSE, dont,
799 ppc64_elf_unhandled_reloc),
5bd4f169 800
411e1bfb 801 /* Like GOT_TPREL16_LO_DS, but next higher group of 16 bits. */
46807bf4
AM
802 HOW (R_PPC64_GOT_TPREL16_HI, 1, 16, 0xffff, 16, FALSE, signed,
803 ppc64_elf_unhandled_reloc),
5bd4f169 804
411e1bfb 805 /* Like GOT_TPREL16_HI, but adjust for low 16 bits. */
46807bf4
AM
806 HOW (R_PPC64_GOT_TPREL16_HA, 1, 16, 0xffff, 16, FALSE, signed,
807 ppc64_elf_unhandled_reloc),
808
809 HOW (R_PPC64_JMP_IREL, 0, 0, 0, 0, FALSE, dont,
810 ppc64_elf_unhandled_reloc),
811
812 HOW (R_PPC64_IRELATIVE, 4, 64, 0xffffffffffffffffULL, 0, FALSE, dont,
813 bfd_elf_generic_reloc),
e054468f 814
25f23106 815 /* A 16 bit relative relocation. */
46807bf4
AM
816 HOW (R_PPC64_REL16, 1, 16, 0xffff, 0, TRUE, signed,
817 bfd_elf_generic_reloc),
25f23106
AM
818
819 /* A 16 bit relative relocation without overflow. */
46807bf4
AM
820 HOW (R_PPC64_REL16_LO, 1, 16, 0xffff, 0, TRUE, dont,
821 bfd_elf_generic_reloc),
25f23106
AM
822
823 /* The high order 16 bits of a relative address. */
46807bf4
AM
824 HOW (R_PPC64_REL16_HI, 1, 16, 0xffff, 16, TRUE, signed,
825 bfd_elf_generic_reloc),
25f23106
AM
826
827 /* The high order 16 bits of a relative address, plus 1 if the contents of
828 the low 16 bits, treated as a signed number, is negative. */
46807bf4
AM
829 HOW (R_PPC64_REL16_HA, 1, 16, 0xffff, 16, TRUE, signed,
830 ppc64_elf_ha_reloc),
25f23106 831
4a969973
AM
832 HOW (R_PPC64_REL16_HIGH, 1, 16, 0xffff, 16, TRUE, dont,
833 bfd_elf_generic_reloc),
834
835 HOW (R_PPC64_REL16_HIGHA, 1, 16, 0xffff, 16, TRUE, dont,
836 ppc64_elf_ha_reloc),
837
838 HOW (R_PPC64_REL16_HIGHER, 1, 16, 0xffff, 32, TRUE, dont,
839 bfd_elf_generic_reloc),
840
841 HOW (R_PPC64_REL16_HIGHERA, 1, 16, 0xffff, 32, TRUE, dont,
842 ppc64_elf_ha_reloc),
843
844 HOW (R_PPC64_REL16_HIGHEST, 1, 16, 0xffff, 48, TRUE, dont,
845 bfd_elf_generic_reloc),
846
847 HOW (R_PPC64_REL16_HIGHESTA, 1, 16, 0xffff, 48, TRUE, dont,
848 ppc64_elf_ha_reloc),
849
a680de9a 850 /* Like R_PPC64_REL16_HA but for split field in addpcis. */
46807bf4
AM
851 HOW (R_PPC64_REL16DX_HA, 2, 16, 0x1fffc1, 16, TRUE, signed,
852 ppc64_elf_ha_reloc),
a680de9a 853
7ba71655 854 /* A split-field reloc for addpcis, non-relative (gas internal use only). */
46807bf4
AM
855 HOW (R_PPC64_16DX_HA, 2, 16, 0x1fffc1, 16, FALSE, signed,
856 ppc64_elf_ha_reloc),
7ba71655 857
f9c6b907 858 /* Like R_PPC64_ADDR16_HI, but no overflow. */
46807bf4
AM
859 HOW (R_PPC64_ADDR16_HIGH, 1, 16, 0xffff, 16, FALSE, dont,
860 bfd_elf_generic_reloc),
f9c6b907
AM
861
862 /* Like R_PPC64_ADDR16_HA, but no overflow. */
46807bf4
AM
863 HOW (R_PPC64_ADDR16_HIGHA, 1, 16, 0xffff, 16, FALSE, dont,
864 ppc64_elf_ha_reloc),
f9c6b907
AM
865
866 /* Like R_PPC64_DTPREL16_HI, but no overflow. */
46807bf4
AM
867 HOW (R_PPC64_DTPREL16_HIGH, 1, 16, 0xffff, 16, FALSE, dont,
868 ppc64_elf_unhandled_reloc),
f9c6b907
AM
869
870 /* Like R_PPC64_DTPREL16_HA, but no overflow. */
46807bf4
AM
871 HOW (R_PPC64_DTPREL16_HIGHA, 1, 16, 0xffff, 16, FALSE, dont,
872 ppc64_elf_unhandled_reloc),
f9c6b907
AM
873
874 /* Like R_PPC64_TPREL16_HI, but no overflow. */
46807bf4
AM
875 HOW (R_PPC64_TPREL16_HIGH, 1, 16, 0xffff, 16, FALSE, dont,
876 ppc64_elf_unhandled_reloc),
f9c6b907
AM
877
878 /* Like R_PPC64_TPREL16_HA, but no overflow. */
46807bf4
AM
879 HOW (R_PPC64_TPREL16_HIGHA, 1, 16, 0xffff, 16, FALSE, dont,
880 ppc64_elf_unhandled_reloc),
f9c6b907 881
006589cf 882 /* Marker reloc on ELFv2 large-model function entry. */
46807bf4
AM
883 HOW (R_PPC64_ENTRY, 2, 32, 0, 0, FALSE, dont,
884 bfd_elf_generic_reloc),
006589cf 885
45965137 886 /* Like ADDR64, but use local entry point of function. */
46807bf4
AM
887 HOW (R_PPC64_ADDR64_LOCAL, 4, 64, 0xffffffffffffffffULL, 0, FALSE, dont,
888 bfd_elf_generic_reloc),
45965137 889
5663e321
AM
890 HOW (R_PPC64_PLTSEQ_NOTOC, 2, 32, 0, 0, FALSE, dont,
891 bfd_elf_generic_reloc),
892
893 HOW (R_PPC64_PLTCALL_NOTOC, 2, 32, 0, 0, FALSE, dont,
894 bfd_elf_generic_reloc),
895
896 HOW (R_PPC64_PCREL_OPT, 2, 32, 0, 0, FALSE, dont,
897 bfd_elf_generic_reloc),
898
899 HOW (R_PPC64_D34, 4, 34, 0x3ffff0000ffffULL, 0, FALSE, signed,
900 ppc64_elf_prefix_reloc),
901
902 HOW (R_PPC64_D34_LO, 4, 34, 0x3ffff0000ffffULL, 0, FALSE, dont,
903 ppc64_elf_prefix_reloc),
904
905 HOW (R_PPC64_D34_HI30, 4, 34, 0x3ffff0000ffffULL, 34, FALSE, dont,
906 ppc64_elf_prefix_reloc),
907
908 HOW (R_PPC64_D34_HA30, 4, 34, 0x3ffff0000ffffULL, 34, FALSE, dont,
909 ppc64_elf_prefix_reloc),
910
911 HOW (R_PPC64_PCREL34, 4, 34, 0x3ffff0000ffffULL, 0, TRUE, signed,
912 ppc64_elf_prefix_reloc),
913
914 HOW (R_PPC64_GOT_PCREL34, 4, 34, 0x3ffff0000ffffULL, 0, TRUE, signed,
915 ppc64_elf_unhandled_reloc),
916
917 HOW (R_PPC64_PLT_PCREL34, 4, 34, 0x3ffff0000ffffULL, 0, TRUE, signed,
918 ppc64_elf_unhandled_reloc),
919
920 HOW (R_PPC64_PLT_PCREL34_NOTOC, 4, 34, 0x3ffff0000ffffULL, 0, TRUE, signed,
921 ppc64_elf_unhandled_reloc),
922
923 HOW (R_PPC64_ADDR16_HIGHER34, 1, 16, 0xffff, 34, FALSE, dont,
924 bfd_elf_generic_reloc),
925
926 HOW (R_PPC64_ADDR16_HIGHERA34, 1, 16, 0xffff, 34, FALSE, dont,
927 ppc64_elf_ha_reloc),
928
929 HOW (R_PPC64_ADDR16_HIGHEST34, 1, 16, 0xffff, 50, FALSE, dont,
930 bfd_elf_generic_reloc),
931
932 HOW (R_PPC64_ADDR16_HIGHESTA34, 1, 16, 0xffff, 50, FALSE, dont,
933 ppc64_elf_ha_reloc),
934
935 HOW (R_PPC64_REL16_HIGHER34, 1, 16, 0xffff, 34, TRUE, dont,
936 bfd_elf_generic_reloc),
937
938 HOW (R_PPC64_REL16_HIGHERA34, 1, 16, 0xffff, 34, TRUE, dont,
939 ppc64_elf_ha_reloc),
940
941 HOW (R_PPC64_REL16_HIGHEST34, 1, 16, 0xffff, 50, TRUE, dont,
942 bfd_elf_generic_reloc),
943
944 HOW (R_PPC64_REL16_HIGHESTA34, 1, 16, 0xffff, 50, TRUE, dont,
945 ppc64_elf_ha_reloc),
946
947 HOW (R_PPC64_D28, 4, 28, 0xfff0000ffffULL, 0, FALSE, signed,
948 ppc64_elf_prefix_reloc),
949
950 HOW (R_PPC64_PCREL28, 4, 28, 0xfff0000ffffULL, 0, TRUE, signed,
951 ppc64_elf_prefix_reloc),
952
5bd4f169 953 /* GNU extension to record C++ vtable hierarchy. */
46807bf4
AM
954 HOW (R_PPC64_GNU_VTINHERIT, 0, 0, 0, 0, FALSE, dont,
955 NULL),
5bd4f169
AM
956
957 /* GNU extension to record C++ vtable member usage. */
46807bf4
AM
958 HOW (R_PPC64_GNU_VTENTRY, 0, 0, 0, 0, FALSE, dont,
959 NULL),
5bd4f169
AM
960};
961
962\f
963/* Initialize the ppc64_elf_howto_table, so that linear accesses can
964 be done. */
965
966static void
4ce794b7 967ppc_howto_init (void)
5bd4f169
AM
968{
969 unsigned int i, type;
970
a4b6fadd 971 for (i = 0; i < ARRAY_SIZE (ppc64_elf_howto_raw); i++)
5bd4f169
AM
972 {
973 type = ppc64_elf_howto_raw[i].type;
a4b6fadd 974 BFD_ASSERT (type < ARRAY_SIZE (ppc64_elf_howto_table));
5bd4f169
AM
975 ppc64_elf_howto_table[type] = &ppc64_elf_howto_raw[i];
976 }
977}
978
979static reloc_howto_type *
f3185997 980ppc64_elf_reloc_type_lookup (bfd *abfd,
4ce794b7 981 bfd_reloc_code_real_type code)
5bd4f169 982{
411e1bfb 983 enum elf_ppc64_reloc_type r = R_PPC64_NONE;
5bd4f169
AM
984
985 if (!ppc64_elf_howto_table[R_PPC64_ADDR32])
986 /* Initialize howto table if needed. */
987 ppc_howto_init ();
988
4ce794b7 989 switch (code)
5bd4f169
AM
990 {
991 default:
f3185997 992 /* xgettext:c-format */
2cdcc330
AM
993 _bfd_error_handler (_("%pB: unsupported relocation type %#x"), abfd,
994 (int) code);
f3185997 995 bfd_set_error (bfd_error_bad_value);
4ce794b7 996 return NULL;
5bd4f169 997
411e1bfb
AM
998 case BFD_RELOC_NONE: r = R_PPC64_NONE;
999 break;
1000 case BFD_RELOC_32: r = R_PPC64_ADDR32;
1001 break;
1002 case BFD_RELOC_PPC_BA26: r = R_PPC64_ADDR24;
1003 break;
1004 case BFD_RELOC_16: r = R_PPC64_ADDR16;
1005 break;
1006 case BFD_RELOC_LO16: r = R_PPC64_ADDR16_LO;
1007 break;
1008 case BFD_RELOC_HI16: r = R_PPC64_ADDR16_HI;
1009 break;
f9c6b907
AM
1010 case BFD_RELOC_PPC64_ADDR16_HIGH: r = R_PPC64_ADDR16_HIGH;
1011 break;
411e1bfb 1012 case BFD_RELOC_HI16_S: r = R_PPC64_ADDR16_HA;
5bd4f169 1013 break;
f9c6b907
AM
1014 case BFD_RELOC_PPC64_ADDR16_HIGHA: r = R_PPC64_ADDR16_HIGHA;
1015 break;
411e1bfb 1016 case BFD_RELOC_PPC_BA16: r = R_PPC64_ADDR14;
5bd4f169 1017 break;
411e1bfb 1018 case BFD_RELOC_PPC_BA16_BRTAKEN: r = R_PPC64_ADDR14_BRTAKEN;
5bd4f169 1019 break;
411e1bfb 1020 case BFD_RELOC_PPC_BA16_BRNTAKEN: r = R_PPC64_ADDR14_BRNTAKEN;
5bd4f169 1021 break;
411e1bfb 1022 case BFD_RELOC_PPC_B26: r = R_PPC64_REL24;
5bd4f169 1023 break;
05d0e962
AM
1024 case BFD_RELOC_PPC64_REL24_NOTOC: r = R_PPC64_REL24_NOTOC;
1025 break;
411e1bfb 1026 case BFD_RELOC_PPC_B16: r = R_PPC64_REL14;
5bd4f169 1027 break;
411e1bfb 1028 case BFD_RELOC_PPC_B16_BRTAKEN: r = R_PPC64_REL14_BRTAKEN;
5bd4f169 1029 break;
411e1bfb 1030 case BFD_RELOC_PPC_B16_BRNTAKEN: r = R_PPC64_REL14_BRNTAKEN;
5bd4f169 1031 break;
411e1bfb 1032 case BFD_RELOC_16_GOTOFF: r = R_PPC64_GOT16;
5bd4f169 1033 break;
411e1bfb 1034 case BFD_RELOC_LO16_GOTOFF: r = R_PPC64_GOT16_LO;
5bd4f169 1035 break;
411e1bfb 1036 case BFD_RELOC_HI16_GOTOFF: r = R_PPC64_GOT16_HI;
5bd4f169 1037 break;
411e1bfb 1038 case BFD_RELOC_HI16_S_GOTOFF: r = R_PPC64_GOT16_HA;
5bd4f169 1039 break;
411e1bfb 1040 case BFD_RELOC_PPC_COPY: r = R_PPC64_COPY;
5bd4f169 1041 break;
411e1bfb 1042 case BFD_RELOC_PPC_GLOB_DAT: r = R_PPC64_GLOB_DAT;
5bd4f169 1043 break;
411e1bfb 1044 case BFD_RELOC_32_PCREL: r = R_PPC64_REL32;
5bd4f169 1045 break;
411e1bfb 1046 case BFD_RELOC_32_PLTOFF: r = R_PPC64_PLT32;
5bd4f169 1047 break;
411e1bfb 1048 case BFD_RELOC_32_PLT_PCREL: r = R_PPC64_PLTREL32;
5bd4f169 1049 break;
411e1bfb 1050 case BFD_RELOC_LO16_PLTOFF: r = R_PPC64_PLT16_LO;
5bd4f169 1051 break;
411e1bfb 1052 case BFD_RELOC_HI16_PLTOFF: r = R_PPC64_PLT16_HI;
5bd4f169 1053 break;
411e1bfb 1054 case BFD_RELOC_HI16_S_PLTOFF: r = R_PPC64_PLT16_HA;
5bd4f169 1055 break;
411e1bfb 1056 case BFD_RELOC_16_BASEREL: r = R_PPC64_SECTOFF;
5bd4f169 1057 break;
411e1bfb 1058 case BFD_RELOC_LO16_BASEREL: r = R_PPC64_SECTOFF_LO;
5bd4f169 1059 break;
411e1bfb 1060 case BFD_RELOC_HI16_BASEREL: r = R_PPC64_SECTOFF_HI;
5bd4f169 1061 break;
411e1bfb 1062 case BFD_RELOC_HI16_S_BASEREL: r = R_PPC64_SECTOFF_HA;
5bd4f169 1063 break;
411e1bfb 1064 case BFD_RELOC_CTOR: r = R_PPC64_ADDR64;
5bd4f169 1065 break;
411e1bfb 1066 case BFD_RELOC_64: r = R_PPC64_ADDR64;
5bd4f169 1067 break;
411e1bfb 1068 case BFD_RELOC_PPC64_HIGHER: r = R_PPC64_ADDR16_HIGHER;
5bd4f169 1069 break;
411e1bfb 1070 case BFD_RELOC_PPC64_HIGHER_S: r = R_PPC64_ADDR16_HIGHERA;
5bd4f169 1071 break;
411e1bfb 1072 case BFD_RELOC_PPC64_HIGHEST: r = R_PPC64_ADDR16_HIGHEST;
5bd4f169 1073 break;
411e1bfb 1074 case BFD_RELOC_PPC64_HIGHEST_S: r = R_PPC64_ADDR16_HIGHESTA;
5bd4f169 1075 break;
411e1bfb 1076 case BFD_RELOC_64_PCREL: r = R_PPC64_REL64;
5bd4f169 1077 break;
411e1bfb 1078 case BFD_RELOC_64_PLTOFF: r = R_PPC64_PLT64;
5bd4f169 1079 break;
411e1bfb 1080 case BFD_RELOC_64_PLT_PCREL: r = R_PPC64_PLTREL64;
5bd4f169 1081 break;
411e1bfb 1082 case BFD_RELOC_PPC_TOC16: r = R_PPC64_TOC16;
5bd4f169 1083 break;
411e1bfb 1084 case BFD_RELOC_PPC64_TOC16_LO: r = R_PPC64_TOC16_LO;
5bd4f169 1085 break;
411e1bfb 1086 case BFD_RELOC_PPC64_TOC16_HI: r = R_PPC64_TOC16_HI;
5bd4f169 1087 break;
411e1bfb 1088 case BFD_RELOC_PPC64_TOC16_HA: r = R_PPC64_TOC16_HA;
5bd4f169 1089 break;
411e1bfb 1090 case BFD_RELOC_PPC64_TOC: r = R_PPC64_TOC;
5bd4f169 1091 break;
411e1bfb 1092 case BFD_RELOC_PPC64_PLTGOT16: r = R_PPC64_PLTGOT16;
5bd4f169 1093 break;
411e1bfb 1094 case BFD_RELOC_PPC64_PLTGOT16_LO: r = R_PPC64_PLTGOT16_LO;
5bd4f169 1095 break;
411e1bfb 1096 case BFD_RELOC_PPC64_PLTGOT16_HI: r = R_PPC64_PLTGOT16_HI;
5bd4f169 1097 break;
411e1bfb 1098 case BFD_RELOC_PPC64_PLTGOT16_HA: r = R_PPC64_PLTGOT16_HA;
5bd4f169 1099 break;
411e1bfb 1100 case BFD_RELOC_PPC64_ADDR16_DS: r = R_PPC64_ADDR16_DS;
5bd4f169 1101 break;
411e1bfb 1102 case BFD_RELOC_PPC64_ADDR16_LO_DS: r = R_PPC64_ADDR16_LO_DS;
5bd4f169 1103 break;
411e1bfb 1104 case BFD_RELOC_PPC64_GOT16_DS: r = R_PPC64_GOT16_DS;
5bd4f169 1105 break;
411e1bfb 1106 case BFD_RELOC_PPC64_GOT16_LO_DS: r = R_PPC64_GOT16_LO_DS;
5bd4f169 1107 break;
411e1bfb 1108 case BFD_RELOC_PPC64_PLT16_LO_DS: r = R_PPC64_PLT16_LO_DS;
5bd4f169 1109 break;
411e1bfb 1110 case BFD_RELOC_PPC64_SECTOFF_DS: r = R_PPC64_SECTOFF_DS;
5bd4f169 1111 break;
411e1bfb 1112 case BFD_RELOC_PPC64_SECTOFF_LO_DS: r = R_PPC64_SECTOFF_LO_DS;
5bd4f169 1113 break;
411e1bfb 1114 case BFD_RELOC_PPC64_TOC16_DS: r = R_PPC64_TOC16_DS;
5bd4f169 1115 break;
411e1bfb 1116 case BFD_RELOC_PPC64_TOC16_LO_DS: r = R_PPC64_TOC16_LO_DS;
5bd4f169 1117 break;
411e1bfb 1118 case BFD_RELOC_PPC64_PLTGOT16_DS: r = R_PPC64_PLTGOT16_DS;
5bd4f169 1119 break;
411e1bfb 1120 case BFD_RELOC_PPC64_PLTGOT16_LO_DS: r = R_PPC64_PLTGOT16_LO_DS;
5bd4f169 1121 break;
411e1bfb 1122 case BFD_RELOC_PPC_TLS: r = R_PPC64_TLS;
5bd4f169 1123 break;
727fc41e
AM
1124 case BFD_RELOC_PPC_TLSGD: r = R_PPC64_TLSGD;
1125 break;
1126 case BFD_RELOC_PPC_TLSLD: r = R_PPC64_TLSLD;
1127 break;
411e1bfb 1128 case BFD_RELOC_PPC_DTPMOD: r = R_PPC64_DTPMOD64;
5bd4f169 1129 break;
411e1bfb 1130 case BFD_RELOC_PPC_TPREL16: r = R_PPC64_TPREL16;
5bd4f169 1131 break;
411e1bfb 1132 case BFD_RELOC_PPC_TPREL16_LO: r = R_PPC64_TPREL16_LO;
5bd4f169 1133 break;
411e1bfb 1134 case BFD_RELOC_PPC_TPREL16_HI: r = R_PPC64_TPREL16_HI;
5bd4f169 1135 break;
f9c6b907
AM
1136 case BFD_RELOC_PPC64_TPREL16_HIGH: r = R_PPC64_TPREL16_HIGH;
1137 break;
411e1bfb 1138 case BFD_RELOC_PPC_TPREL16_HA: r = R_PPC64_TPREL16_HA;
5bd4f169 1139 break;
f9c6b907
AM
1140 case BFD_RELOC_PPC64_TPREL16_HIGHA: r = R_PPC64_TPREL16_HIGHA;
1141 break;
411e1bfb 1142 case BFD_RELOC_PPC_TPREL: r = R_PPC64_TPREL64;
5bd4f169 1143 break;
411e1bfb
AM
1144 case BFD_RELOC_PPC_DTPREL16: r = R_PPC64_DTPREL16;
1145 break;
1146 case BFD_RELOC_PPC_DTPREL16_LO: r = R_PPC64_DTPREL16_LO;
1147 break;
1148 case BFD_RELOC_PPC_DTPREL16_HI: r = R_PPC64_DTPREL16_HI;
1149 break;
f9c6b907
AM
1150 case BFD_RELOC_PPC64_DTPREL16_HIGH: r = R_PPC64_DTPREL16_HIGH;
1151 break;
411e1bfb
AM
1152 case BFD_RELOC_PPC_DTPREL16_HA: r = R_PPC64_DTPREL16_HA;
1153 break;
f9c6b907
AM
1154 case BFD_RELOC_PPC64_DTPREL16_HIGHA: r = R_PPC64_DTPREL16_HIGHA;
1155 break;
411e1bfb
AM
1156 case BFD_RELOC_PPC_DTPREL: r = R_PPC64_DTPREL64;
1157 break;
1158 case BFD_RELOC_PPC_GOT_TLSGD16: r = R_PPC64_GOT_TLSGD16;
1159 break;
1160 case BFD_RELOC_PPC_GOT_TLSGD16_LO: r = R_PPC64_GOT_TLSGD16_LO;
1161 break;
1162 case BFD_RELOC_PPC_GOT_TLSGD16_HI: r = R_PPC64_GOT_TLSGD16_HI;
1163 break;
1164 case BFD_RELOC_PPC_GOT_TLSGD16_HA: r = R_PPC64_GOT_TLSGD16_HA;
1165 break;
1166 case BFD_RELOC_PPC_GOT_TLSLD16: r = R_PPC64_GOT_TLSLD16;
1167 break;
1168 case BFD_RELOC_PPC_GOT_TLSLD16_LO: r = R_PPC64_GOT_TLSLD16_LO;
1169 break;
1170 case BFD_RELOC_PPC_GOT_TLSLD16_HI: r = R_PPC64_GOT_TLSLD16_HI;
1171 break;
1172 case BFD_RELOC_PPC_GOT_TLSLD16_HA: r = R_PPC64_GOT_TLSLD16_HA;
1173 break;
1174 case BFD_RELOC_PPC_GOT_TPREL16: r = R_PPC64_GOT_TPREL16_DS;
1175 break;
1176 case BFD_RELOC_PPC_GOT_TPREL16_LO: r = R_PPC64_GOT_TPREL16_LO_DS;
1177 break;
1178 case BFD_RELOC_PPC_GOT_TPREL16_HI: r = R_PPC64_GOT_TPREL16_HI;
1179 break;
1180 case BFD_RELOC_PPC_GOT_TPREL16_HA: r = R_PPC64_GOT_TPREL16_HA;
1181 break;
1182 case BFD_RELOC_PPC_GOT_DTPREL16: r = R_PPC64_GOT_DTPREL16_DS;
1183 break;
1184 case BFD_RELOC_PPC_GOT_DTPREL16_LO: r = R_PPC64_GOT_DTPREL16_LO_DS;
1185 break;
1186 case BFD_RELOC_PPC_GOT_DTPREL16_HI: r = R_PPC64_GOT_DTPREL16_HI;
1187 break;
1188 case BFD_RELOC_PPC_GOT_DTPREL16_HA: r = R_PPC64_GOT_DTPREL16_HA;
1189 break;
1190 case BFD_RELOC_PPC64_TPREL16_DS: r = R_PPC64_TPREL16_DS;
1191 break;
1192 case BFD_RELOC_PPC64_TPREL16_LO_DS: r = R_PPC64_TPREL16_LO_DS;
1193 break;
1194 case BFD_RELOC_PPC64_TPREL16_HIGHER: r = R_PPC64_TPREL16_HIGHER;
1195 break;
1196 case BFD_RELOC_PPC64_TPREL16_HIGHERA: r = R_PPC64_TPREL16_HIGHERA;
1197 break;
1198 case BFD_RELOC_PPC64_TPREL16_HIGHEST: r = R_PPC64_TPREL16_HIGHEST;
1199 break;
1200 case BFD_RELOC_PPC64_TPREL16_HIGHESTA: r = R_PPC64_TPREL16_HIGHESTA;
1201 break;
1202 case BFD_RELOC_PPC64_DTPREL16_DS: r = R_PPC64_DTPREL16_DS;
1203 break;
1204 case BFD_RELOC_PPC64_DTPREL16_LO_DS: r = R_PPC64_DTPREL16_LO_DS;
1205 break;
1206 case BFD_RELOC_PPC64_DTPREL16_HIGHER: r = R_PPC64_DTPREL16_HIGHER;
1207 break;
1208 case BFD_RELOC_PPC64_DTPREL16_HIGHERA: r = R_PPC64_DTPREL16_HIGHERA;
1209 break;
1210 case BFD_RELOC_PPC64_DTPREL16_HIGHEST: r = R_PPC64_DTPREL16_HIGHEST;
1211 break;
1212 case BFD_RELOC_PPC64_DTPREL16_HIGHESTA: r = R_PPC64_DTPREL16_HIGHESTA;
1213 break;
25f23106
AM
1214 case BFD_RELOC_16_PCREL: r = R_PPC64_REL16;
1215 break;
1216 case BFD_RELOC_LO16_PCREL: r = R_PPC64_REL16_LO;
1217 break;
1218 case BFD_RELOC_HI16_PCREL: r = R_PPC64_REL16_HI;
1219 break;
1220 case BFD_RELOC_HI16_S_PCREL: r = R_PPC64_REL16_HA;
1221 break;
4a969973
AM
1222 case BFD_RELOC_PPC64_REL16_HIGH: r = R_PPC64_REL16_HIGH;
1223 break;
1224 case BFD_RELOC_PPC64_REL16_HIGHA: r = R_PPC64_REL16_HIGHA;
1225 break;
1226 case BFD_RELOC_PPC64_REL16_HIGHER: r = R_PPC64_REL16_HIGHER;
1227 break;
1228 case BFD_RELOC_PPC64_REL16_HIGHERA: r = R_PPC64_REL16_HIGHERA;
1229 break;
1230 case BFD_RELOC_PPC64_REL16_HIGHEST: r = R_PPC64_REL16_HIGHEST;
1231 break;
1232 case BFD_RELOC_PPC64_REL16_HIGHESTA: r = R_PPC64_REL16_HIGHESTA;
1233 break;
7ba71655
AM
1234 case BFD_RELOC_PPC_16DX_HA: r = R_PPC64_16DX_HA;
1235 break;
a680de9a
PB
1236 case BFD_RELOC_PPC_REL16DX_HA: r = R_PPC64_REL16DX_HA;
1237 break;
006589cf
AM
1238 case BFD_RELOC_PPC64_ENTRY: r = R_PPC64_ENTRY;
1239 break;
45965137
AM
1240 case BFD_RELOC_PPC64_ADDR64_LOCAL: r = R_PPC64_ADDR64_LOCAL;
1241 break;
5663e321
AM
1242 case BFD_RELOC_PPC64_D34: r = R_PPC64_D34;
1243 break;
1244 case BFD_RELOC_PPC64_D34_LO: r = R_PPC64_D34_LO;
1245 break;
1246 case BFD_RELOC_PPC64_D34_HI30: r = R_PPC64_D34_HI30;
1247 break;
1248 case BFD_RELOC_PPC64_D34_HA30: r = R_PPC64_D34_HA30;
1249 break;
1250 case BFD_RELOC_PPC64_PCREL34: r = R_PPC64_PCREL34;
1251 break;
1252 case BFD_RELOC_PPC64_GOT_PCREL34: r = R_PPC64_GOT_PCREL34;
1253 break;
1254 case BFD_RELOC_PPC64_PLT_PCREL34: r = R_PPC64_PLT_PCREL34;
1255 break;
1256 case BFD_RELOC_PPC64_ADDR16_HIGHER34: r = R_PPC64_ADDR16_HIGHER34;
1257 break;
1258 case BFD_RELOC_PPC64_ADDR16_HIGHERA34: r = R_PPC64_ADDR16_HIGHERA34;
1259 break;
1260 case BFD_RELOC_PPC64_ADDR16_HIGHEST34: r = R_PPC64_ADDR16_HIGHEST34;
1261 break;
1262 case BFD_RELOC_PPC64_ADDR16_HIGHESTA34: r = R_PPC64_ADDR16_HIGHESTA34;
1263 break;
1264 case BFD_RELOC_PPC64_REL16_HIGHER34: r = R_PPC64_REL16_HIGHER34;
1265 break;
1266 case BFD_RELOC_PPC64_REL16_HIGHERA34: r = R_PPC64_REL16_HIGHERA34;
1267 break;
1268 case BFD_RELOC_PPC64_REL16_HIGHEST34: r = R_PPC64_REL16_HIGHEST34;
1269 break;
1270 case BFD_RELOC_PPC64_REL16_HIGHESTA34: r = R_PPC64_REL16_HIGHESTA34;
1271 break;
1272 case BFD_RELOC_PPC64_D28: r = R_PPC64_D28;
1273 break;
1274 case BFD_RELOC_PPC64_PCREL28: r = R_PPC64_PCREL28;
1275 break;
411e1bfb
AM
1276 case BFD_RELOC_VTABLE_INHERIT: r = R_PPC64_GNU_VTINHERIT;
1277 break;
1278 case BFD_RELOC_VTABLE_ENTRY: r = R_PPC64_GNU_VTENTRY;
5bd4f169
AM
1279 break;
1280 }
1281
4ce794b7 1282 return ppc64_elf_howto_table[r];
5bd4f169
AM
1283};
1284
157090f7
AM
1285static reloc_howto_type *
1286ppc64_elf_reloc_name_lookup (bfd *abfd ATTRIBUTE_UNUSED,
1287 const char *r_name)
1288{
1289 unsigned int i;
1290
a4b6fadd 1291 for (i = 0; i < ARRAY_SIZE (ppc64_elf_howto_raw); i++)
157090f7
AM
1292 if (ppc64_elf_howto_raw[i].name != NULL
1293 && strcasecmp (ppc64_elf_howto_raw[i].name, r_name) == 0)
1294 return &ppc64_elf_howto_raw[i];
1295
1296 return NULL;
1297}
1298
5bd4f169
AM
1299/* Set the howto pointer for a PowerPC ELF reloc. */
1300
f3185997 1301static bfd_boolean
4aef7643 1302ppc64_elf_info_to_howto (bfd *abfd, arelent *cache_ptr,
4ce794b7 1303 Elf_Internal_Rela *dst)
5bd4f169 1304{
65f38f15
AM
1305 unsigned int type;
1306
ef60b7ff 1307 /* Initialize howto table if needed. */
5bd4f169 1308 if (!ppc64_elf_howto_table[R_PPC64_ADDR32])
5bd4f169
AM
1309 ppc_howto_init ();
1310
65f38f15 1311 type = ELF64_R_TYPE (dst->r_info);
a4b6fadd 1312 if (type >= ARRAY_SIZE (ppc64_elf_howto_table))
d0fb9a8d 1313 {
695344c0 1314 /* xgettext:c-format */
0aa13fee 1315 _bfd_error_handler (_("%pB: unsupported relocation type %#x"),
cf97bcb0 1316 abfd, type);
f3185997
NC
1317 bfd_set_error (bfd_error_bad_value);
1318 return FALSE;
d0fb9a8d 1319 }
65f38f15 1320 cache_ptr->howto = ppc64_elf_howto_table[type];
f3185997
NC
1321 if (cache_ptr->howto == NULL || cache_ptr->howto->name == NULL)
1322 {
1323 /* xgettext:c-format */
1324 _bfd_error_handler (_("%pB: unsupported relocation type %#x"),
1325 abfd, type);
1326 bfd_set_error (bfd_error_bad_value);
1327 return FALSE;
1328 }
2cdcc330 1329
f3185997 1330 return TRUE;
5bd4f169
AM
1331}
1332
04c9666a 1333/* Handle the R_PPC64_ADDR16_HA and similar relocs. */
5bd4f169
AM
1334
1335static bfd_reloc_status_type
4ce794b7
AM
1336ppc64_elf_ha_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
1337 void *data, asection *input_section,
1338 bfd *output_bfd, char **error_message)
5bd4f169 1339{
a680de9a
PB
1340 enum elf_ppc64_reloc_type r_type;
1341 long insn;
1342 bfd_size_type octets;
3de43e7b 1343 bfd_vma value;
a680de9a 1344
805fc799
AM
1345 /* If this is a relocatable link (output_bfd test tells us), just
1346 call the generic function. Any adjustment will be done at final
1347 link time. */
1348 if (output_bfd != NULL)
cedb70c5 1349 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
805fc799
AM
1350 input_section, output_bfd, error_message);
1351
5663e321
AM
1352 /* Adjust the addend for sign extension of the low 16 (or 34) bits.
1353 We won't actually be using the low bits, so trashing them
805fc799 1354 doesn't matter. */
a680de9a 1355 r_type = reloc_entry->howto->type;
5663e321
AM
1356 if (r_type == R_PPC64_ADDR16_HIGHERA34
1357 || r_type == R_PPC64_ADDR16_HIGHESTA34
1358 || r_type == R_PPC64_REL16_HIGHERA34
1359 || r_type == R_PPC64_REL16_HIGHESTA34)
1360 reloc_entry->addend += 1ULL << 33;
1361 else
1362 reloc_entry->addend += 1U << 15;
a680de9a
PB
1363 if (r_type != R_PPC64_REL16DX_HA)
1364 return bfd_reloc_continue;
1365
1366 value = 0;
1367 if (!bfd_is_com_section (symbol->section))
1368 value = symbol->value;
1369 value += (reloc_entry->addend
1370 + symbol->section->output_offset
1371 + symbol->section->output_section->vma);
1372 value -= (reloc_entry->address
1373 + input_section->output_offset
1374 + input_section->output_section->vma);
3de43e7b 1375 value = (bfd_signed_vma) value >> 16;
a680de9a
PB
1376
1377 octets = reloc_entry->address * bfd_octets_per_byte (abfd);
1378 insn = bfd_get_32 (abfd, (bfd_byte *) data + octets);
1379 insn &= ~0x1fffc1;
3de43e7b 1380 insn |= (value & 0xffc1) | ((value & 0x3e) << 15);
a680de9a 1381 bfd_put_32 (abfd, insn, (bfd_byte *) data + octets);
3de43e7b 1382 if (value + 0x8000 > 0xffff)
a680de9a
PB
1383 return bfd_reloc_overflow;
1384 return bfd_reloc_ok;
805fc799 1385}
5bd4f169 1386
2441e016
AM
1387static bfd_reloc_status_type
1388ppc64_elf_branch_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
1389 void *data, asection *input_section,
1390 bfd *output_bfd, char **error_message)
1391{
1392 if (output_bfd != NULL)
1393 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
1394 input_section, output_bfd, error_message);
1395
699733f6
AM
1396 if (strcmp (symbol->section->name, ".opd") == 0
1397 && (symbol->section->owner->flags & DYNAMIC) == 0)
2441e016
AM
1398 {
1399 bfd_vma dest = opd_entry_value (symbol->section,
1400 symbol->value + reloc_entry->addend,
aef36ac1 1401 NULL, NULL, FALSE);
2441e016
AM
1402 if (dest != (bfd_vma) -1)
1403 reloc_entry->addend = dest - (symbol->value
1404 + symbol->section->output_section->vma
1405 + symbol->section->output_offset);
1406 }
810d4e75
AM
1407 else
1408 {
1409 elf_symbol_type *elfsym = (elf_symbol_type *) symbol;
1410
1411 if (symbol->section->owner != abfd
9f284bf9 1412 && symbol->section->owner != NULL
810d4e75
AM
1413 && abiversion (symbol->section->owner) >= 2)
1414 {
1415 unsigned int i;
1416
1417 for (i = 0; i < symbol->section->owner->symcount; ++i)
1418 {
1419 asymbol *symdef = symbol->section->owner->outsymbols[i];
1420
1421 if (strcmp (symdef->name, symbol->name) == 0)
1422 {
1423 elfsym = (elf_symbol_type *) symdef;
1424 break;
1425 }
1426 }
1427 }
1428 reloc_entry->addend
1429 += PPC64_LOCAL_ENTRY_OFFSET (elfsym->internal_elf_sym.st_other);
1430 }
2441e016
AM
1431 return bfd_reloc_continue;
1432}
1433
805fc799 1434static bfd_reloc_status_type
4ce794b7
AM
1435ppc64_elf_brtaken_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
1436 void *data, asection *input_section,
1437 bfd *output_bfd, char **error_message)
805fc799
AM
1438{
1439 long insn;
04c9666a 1440 enum elf_ppc64_reloc_type r_type;
805fc799 1441 bfd_size_type octets;
794e51c0
AM
1442 /* Assume 'at' branch hints. */
1443 bfd_boolean is_isa_v2 = TRUE;
805fc799
AM
1444
1445 /* If this is a relocatable link (output_bfd test tells us), just
1446 call the generic function. Any adjustment will be done at final
1447 link time. */
5bd4f169 1448 if (output_bfd != NULL)
cedb70c5 1449 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
805fc799
AM
1450 input_section, output_bfd, error_message);
1451
1452 octets = reloc_entry->address * bfd_octets_per_byte (abfd);
1453 insn = bfd_get_32 (abfd, (bfd_byte *) data + octets);
1454 insn &= ~(0x01 << 21);
4ce794b7 1455 r_type = reloc_entry->howto->type;
805fc799
AM
1456 if (r_type == R_PPC64_ADDR14_BRTAKEN
1457 || r_type == R_PPC64_REL14_BRTAKEN)
cedb70c5 1458 insn |= 0x01 << 21; /* 'y' or 't' bit, lowest bit of BO field. */
805fc799 1459
794e51c0 1460 if (is_isa_v2)
5bd4f169 1461 {
805fc799
AM
1462 /* Set 'a' bit. This is 0b00010 in BO field for branch
1463 on CR(BI) insns (BO == 001at or 011at), and 0b01000
1464 for branch on CTR insns (BO == 1a00t or 1a01t). */
1465 if ((insn & (0x14 << 21)) == (0x04 << 21))
1466 insn |= 0x02 << 21;
1467 else if ((insn & (0x14 << 21)) == (0x10 << 21))
1468 insn |= 0x08 << 21;
1469 else
2441e016 1470 goto out;
5bd4f169 1471 }
805fc799
AM
1472 else
1473 {
1474 bfd_vma target = 0;
1475 bfd_vma from;
5bd4f169 1476
805fc799
AM
1477 if (!bfd_is_com_section (symbol->section))
1478 target = symbol->value;
1479 target += symbol->section->output_section->vma;
1480 target += symbol->section->output_offset;
1481 target += reloc_entry->addend;
5bd4f169 1482
805fc799
AM
1483 from = (reloc_entry->address
1484 + input_section->output_offset
1485 + input_section->output_section->vma);
5bd4f169 1486
805fc799
AM
1487 /* Invert 'y' bit if not the default. */
1488 if ((bfd_signed_vma) (target - from) < 0)
1489 insn ^= 0x01 << 21;
1490 }
4ce794b7 1491 bfd_put_32 (abfd, insn, (bfd_byte *) data + octets);
2441e016
AM
1492 out:
1493 return ppc64_elf_branch_reloc (abfd, reloc_entry, symbol, data,
1494 input_section, output_bfd, error_message);
805fc799 1495}
5bd4f169 1496
805fc799 1497static bfd_reloc_status_type
4ce794b7
AM
1498ppc64_elf_sectoff_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
1499 void *data, asection *input_section,
1500 bfd *output_bfd, char **error_message)
805fc799
AM
1501{
1502 /* If this is a relocatable link (output_bfd test tells us), just
1503 call the generic function. Any adjustment will be done at final
1504 link time. */
1505 if (output_bfd != NULL)
cedb70c5 1506 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
805fc799 1507 input_section, output_bfd, error_message);
5bd4f169 1508
805fc799
AM
1509 /* Subtract the symbol section base address. */
1510 reloc_entry->addend -= symbol->section->output_section->vma;
5bd4f169
AM
1511 return bfd_reloc_continue;
1512}
1513
805fc799 1514static bfd_reloc_status_type
4ce794b7
AM
1515ppc64_elf_sectoff_ha_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
1516 void *data, asection *input_section,
1517 bfd *output_bfd, char **error_message)
805fc799
AM
1518{
1519 /* If this is a relocatable link (output_bfd test tells us), just
1520 call the generic function. Any adjustment will be done at final
1521 link time. */
1522 if (output_bfd != NULL)
cedb70c5 1523 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
805fc799
AM
1524 input_section, output_bfd, error_message);
1525
1526 /* Subtract the symbol section base address. */
1527 reloc_entry->addend -= symbol->section->output_section->vma;
1528
1529 /* Adjust the addend for sign extension of the low 16 bits. */
1530 reloc_entry->addend += 0x8000;
1531 return bfd_reloc_continue;
1532}
1533
1534static bfd_reloc_status_type
4ce794b7
AM
1535ppc64_elf_toc_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
1536 void *data, asection *input_section,
1537 bfd *output_bfd, char **error_message)
805fc799
AM
1538{
1539 bfd_vma TOCstart;
1540
1541 /* If this is a relocatable link (output_bfd test tells us), just
1542 call the generic function. Any adjustment will be done at final
1543 link time. */
1544 if (output_bfd != NULL)
cedb70c5 1545 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
805fc799
AM
1546 input_section, output_bfd, error_message);
1547
1548 TOCstart = _bfd_get_gp_value (input_section->output_section->owner);
1549 if (TOCstart == 0)
1c865ab2 1550 TOCstart = ppc64_elf_set_toc (NULL, input_section->output_section->owner);
805fc799
AM
1551
1552 /* Subtract the TOC base address. */
1553 reloc_entry->addend -= TOCstart + TOC_BASE_OFF;
1554 return bfd_reloc_continue;
1555}
1556
1557static bfd_reloc_status_type
4ce794b7
AM
1558ppc64_elf_toc_ha_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
1559 void *data, asection *input_section,
1560 bfd *output_bfd, char **error_message)
805fc799
AM
1561{
1562 bfd_vma TOCstart;
1563
1564 /* If this is a relocatable link (output_bfd test tells us), just
1565 call the generic function. Any adjustment will be done at final
1566 link time. */
1567 if (output_bfd != NULL)
cedb70c5 1568 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
805fc799
AM
1569 input_section, output_bfd, error_message);
1570
1571 TOCstart = _bfd_get_gp_value (input_section->output_section->owner);
1572 if (TOCstart == 0)
1c865ab2 1573 TOCstart = ppc64_elf_set_toc (NULL, input_section->output_section->owner);
805fc799
AM
1574
1575 /* Subtract the TOC base address. */
1576 reloc_entry->addend -= TOCstart + TOC_BASE_OFF;
1577
1578 /* Adjust the addend for sign extension of the low 16 bits. */
1579 reloc_entry->addend += 0x8000;
1580 return bfd_reloc_continue;
1581}
1582
1583static bfd_reloc_status_type
4ce794b7
AM
1584ppc64_elf_toc64_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
1585 void *data, asection *input_section,
1586 bfd *output_bfd, char **error_message)
805fc799
AM
1587{
1588 bfd_vma TOCstart;
1589 bfd_size_type octets;
1590
1591 /* If this is a relocatable link (output_bfd test tells us), just
1592 call the generic function. Any adjustment will be done at final
1593 link time. */
1594 if (output_bfd != NULL)
cedb70c5 1595 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
805fc799
AM
1596 input_section, output_bfd, error_message);
1597
1598 TOCstart = _bfd_get_gp_value (input_section->output_section->owner);
1599 if (TOCstart == 0)
1c865ab2 1600 TOCstart = ppc64_elf_set_toc (NULL, input_section->output_section->owner);
805fc799
AM
1601
1602 octets = reloc_entry->address * bfd_octets_per_byte (abfd);
1603 bfd_put_64 (abfd, TOCstart + TOC_BASE_OFF, (bfd_byte *) data + octets);
1604 return bfd_reloc_ok;
1605}
1606
5663e321
AM
1607static bfd_reloc_status_type
1608ppc64_elf_prefix_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
1609 void *data, asection *input_section,
1610 bfd *output_bfd, char **error_message)
1611{
1612 uint64_t insn;
1613 bfd_vma targ;
1614
1615 if (output_bfd != NULL)
1616 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
1617 input_section, output_bfd, error_message);
1618
1619 insn = bfd_get_32 (abfd, (bfd_byte *) data + reloc_entry->address);
1620 insn <<= 32;
1621 insn |= bfd_get_32 (abfd, (bfd_byte *) data + reloc_entry->address + 4);
1622
1623 targ = (symbol->section->output_section->vma
1624 + symbol->section->output_offset
1625 + reloc_entry->addend);
1626 if (!bfd_is_com_section (symbol->section))
1627 targ += symbol->value;
1628 if (reloc_entry->howto->type == R_PPC64_D34_HA30)
1629 targ += 1ULL << 33;
1630 if (reloc_entry->howto->pc_relative)
1631 {
1632 bfd_vma from = (reloc_entry->address
1633 + input_section->output_offset
1634 + input_section->output_section->vma);
1635 targ -=from;
1636 }
1637 targ >>= reloc_entry->howto->rightshift;
1638 insn &= ~reloc_entry->howto->dst_mask;
1639 insn |= ((targ << 16) | (targ & 0xffff)) & reloc_entry->howto->dst_mask;
1640 bfd_put_32 (abfd, insn >> 32, (bfd_byte *) data + reloc_entry->address);
1641 bfd_put_32 (abfd, insn, (bfd_byte *) data + reloc_entry->address + 4);
1642 if (reloc_entry->howto->complain_on_overflow == complain_overflow_signed
1643 && (targ + (1ULL << (reloc_entry->howto->bitsize - 1))
1644 >= 1ULL << reloc_entry->howto->bitsize))
1645 return bfd_reloc_overflow;
1646 return bfd_reloc_ok;
1647}
1648
805fc799 1649static bfd_reloc_status_type
4ce794b7
AM
1650ppc64_elf_unhandled_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
1651 void *data, asection *input_section,
1652 bfd *output_bfd, char **error_message)
805fc799
AM
1653{
1654 /* If this is a relocatable link (output_bfd test tells us), just
1655 call the generic function. Any adjustment will be done at final
1656 link time. */
1657 if (output_bfd != NULL)
cedb70c5 1658 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
805fc799
AM
1659 input_section, output_bfd, error_message);
1660
1661 if (error_message != NULL)
1662 {
1663 static char buf[60];
1664 sprintf (buf, "generic linker can't handle %s",
1665 reloc_entry->howto->name);
1666 *error_message = buf;
1667 }
1668 return bfd_reloc_dangerous;
1669}
1670
927be08e
AM
1671/* Track GOT entries needed for a given symbol. We might need more
1672 than one got entry per symbol. */
1673struct got_entry
1674{
1675 struct got_entry *next;
1676
1677 /* The symbol addend that we'll be placing in the GOT. */
1678 bfd_vma addend;
1679
1680 /* Unlike other ELF targets, we use separate GOT entries for the same
1681 symbol referenced from different input files. This is to support
1682 automatic multiple TOC/GOT sections, where the TOC base can vary
1683 from one input file to another. After partitioning into TOC groups
1684 we merge entries within the group.
1685
1686 Point to the BFD owning this GOT entry. */
1687 bfd *owner;
1688
1689 /* Zero for non-tls entries, or TLS_TLS and one of TLS_GD, TLS_LD,
1690 TLS_TPREL or TLS_DTPREL for tls entries. */
f961d9dd 1691 unsigned char tls_type;
927be08e
AM
1692
1693 /* Non-zero if got.ent points to real entry. */
f961d9dd 1694 unsigned char is_indirect;
927be08e
AM
1695
1696 /* Reference count until size_dynamic_sections, GOT offset thereafter. */
1697 union
2cdcc330
AM
1698 {
1699 bfd_signed_vma refcount;
1700 bfd_vma offset;
1701 struct got_entry *ent;
1702 } got;
927be08e
AM
1703};
1704
1705/* The same for PLT. */
1706struct plt_entry
1707{
1708 struct plt_entry *next;
1709
1710 bfd_vma addend;
1711
1712 union
2cdcc330
AM
1713 {
1714 bfd_signed_vma refcount;
1715 bfd_vma offset;
1716 } plt;
927be08e
AM
1717};
1718
e717da7e
AM
1719struct ppc64_elf_obj_tdata
1720{
1721 struct elf_obj_tdata elf;
1722
1723 /* Shortcuts to dynamic linker sections. */
1724 asection *got;
1725 asection *relgot;
1726
b3fac117
AM
1727 /* Used during garbage collection. We attach global symbols defined
1728 on removed .opd entries to this section so that the sym is removed. */
1729 asection *deleted_section;
81688140 1730
927be08e 1731 /* TLS local dynamic got entry handling. Support for multiple GOT
e717da7e 1732 sections means we potentially need one of these for each input bfd. */
927be08e 1733 struct got_entry tlsld_got;
8860955f 1734
2cdcc330
AM
1735 union
1736 {
729eabd5
AM
1737 /* A copy of relocs before they are modified for --emit-relocs. */
1738 Elf_Internal_Rela *relocs;
1739
1740 /* Section contents. */
1741 bfd_byte *contents;
1742 } opd;
d77c8a4b
AM
1743
1744 /* Nonzero if this bfd has small toc/got relocs, ie. that expect
1745 the reloc to be in the range -32768 to 32767. */
98528052
AM
1746 unsigned int has_small_toc_reloc : 1;
1747
560c8763
AM
1748 /* Set if toc/got ha relocs detected not using r2, or lo reloc
1749 instruction not one we handle. */
1750 unsigned int unexpected_toc_insn : 1;
066f4018
AM
1751
1752 /* Set if got relocs that can be optimised are present in this file. */
1753 unsigned int has_gotrel : 1;
e717da7e
AM
1754};
1755
1756#define ppc64_elf_tdata(bfd) \
1757 ((struct ppc64_elf_obj_tdata *) (bfd)->tdata.any)
1758
1759#define ppc64_tlsld_got(bfd) \
1760 (&ppc64_elf_tdata (bfd)->tlsld_got)
1761
0c8d6e5c
AM
1762#define is_ppc64_elf(bfd) \
1763 (bfd_get_flavour (bfd) == bfd_target_elf_flavour \
4dfe6ac6 1764 && elf_object_id (bfd) == PPC64_ELF_DATA)
0c8d6e5c 1765
e717da7e
AM
1766/* Override the generic function because we store some extras. */
1767
1768static bfd_boolean
1769ppc64_elf_mkobject (bfd *abfd)
1770{
0ffa91dd 1771 return bfd_elf_allocate_object (abfd, sizeof (struct ppc64_elf_obj_tdata),
4dfe6ac6 1772 PPC64_ELF_DATA);
e717da7e
AM
1773}
1774
feee612b 1775/* Fix bad default arch selected for a 64 bit input bfd when the
14b57c7c 1776 default is 32 bit. Also select arch based on apuinfo. */
feee612b 1777
b34976b6 1778static bfd_boolean
4ce794b7 1779ppc64_elf_object_p (bfd *abfd)
feee612b 1780{
14b57c7c
AM
1781 if (!abfd->arch_info->the_default)
1782 return TRUE;
1783
1784 if (abfd->arch_info->bits_per_word == 32)
feee612b
AM
1785 {
1786 Elf_Internal_Ehdr *i_ehdr = elf_elfheader (abfd);
1787
1788 if (i_ehdr->e_ident[EI_CLASS] == ELFCLASS64)
1789 {
1790 /* Relies on arch after 32 bit default being 64 bit default. */
1791 abfd->arch_info = abfd->arch_info->next;
1792 BFD_ASSERT (abfd->arch_info->bits_per_word == 64);
1793 }
1794 }
14b57c7c 1795 return _bfd_elf_ppc_set_arch (abfd);
feee612b
AM
1796}
1797
d37c89e5
AM
1798/* Support for core dump NOTE sections. */
1799
1800static bfd_boolean
1801ppc64_elf_grok_prstatus (bfd *abfd, Elf_Internal_Note *note)
1802{
eea6121a 1803 size_t offset, size;
d37c89e5
AM
1804
1805 if (note->descsz != 504)
1806 return FALSE;
1807
1808 /* pr_cursig */
228e534f 1809 elf_tdata (abfd)->core->signal = bfd_get_16 (abfd, note->descdata + 12);
d37c89e5
AM
1810
1811 /* pr_pid */
228e534f 1812 elf_tdata (abfd)->core->lwpid = bfd_get_32 (abfd, note->descdata + 32);
d37c89e5
AM
1813
1814 /* pr_reg */
1815 offset = 112;
eea6121a 1816 size = 384;
d37c89e5
AM
1817
1818 /* Make a ".reg/999" section. */
1819 return _bfd_elfcore_make_pseudosection (abfd, ".reg",
eea6121a 1820 size, note->descpos + offset);
d37c89e5
AM
1821}
1822
1823static bfd_boolean
1824ppc64_elf_grok_psinfo (bfd *abfd, Elf_Internal_Note *note)
1825{
1826 if (note->descsz != 136)
1827 return FALSE;
1828
228e534f 1829 elf_tdata (abfd)->core->pid
bc989cdc 1830 = bfd_get_32 (abfd, note->descdata + 24);
228e534f 1831 elf_tdata (abfd)->core->program
d37c89e5 1832 = _bfd_elfcore_strndup (abfd, note->descdata + 40, 16);
228e534f 1833 elf_tdata (abfd)->core->command
d37c89e5
AM
1834 = _bfd_elfcore_strndup (abfd, note->descdata + 56, 80);
1835
1836 return TRUE;
1837}
1838
183e98be
AM
1839static char *
1840ppc64_elf_write_core_note (bfd *abfd, char *buf, int *bufsiz, int note_type,
1841 ...)
1842{
1843 switch (note_type)
1844 {
1845 default:
1846 return NULL;
1847
1848 case NT_PRPSINFO:
1849 {
9ef6d1e3 1850 char data[136] ATTRIBUTE_NONSTRING;
183e98be
AM
1851 va_list ap;
1852
1853 va_start (ap, note_type);
75cd47ed 1854 memset (data, 0, sizeof (data));
183e98be 1855 strncpy (data + 40, va_arg (ap, const char *), 16);
be3e27bb 1856#if GCC_VERSION == 8000 || GCC_VERSION == 8001
95da9854 1857 DIAGNOSTIC_PUSH;
be3e27bb 1858 /* GCC 8.0 and 8.1 warn about 80 equals destination size with
95da9854
L
1859 -Wstringop-truncation:
1860 https://gcc.gnu.org/bugzilla/show_bug.cgi?id=85643
1861 */
95da9854
L
1862 DIAGNOSTIC_IGNORE_STRINGOP_TRUNCATION;
1863#endif
183e98be 1864 strncpy (data + 56, va_arg (ap, const char *), 80);
be3e27bb 1865#if GCC_VERSION == 8000 || GCC_VERSION == 8001
95da9854 1866 DIAGNOSTIC_POP;
fe75810f 1867#endif
183e98be
AM
1868 va_end (ap);
1869 return elfcore_write_note (abfd, buf, bufsiz,
1870 "CORE", note_type, data, sizeof (data));
1871 }
1872
1873 case NT_PRSTATUS:
1874 {
1875 char data[504];
1876 va_list ap;
1877 long pid;
1878 int cursig;
1879 const void *greg;
1880
1881 va_start (ap, note_type);
1882 memset (data, 0, 112);
1883 pid = va_arg (ap, long);
1884 bfd_put_32 (abfd, pid, data + 32);
1885 cursig = va_arg (ap, int);
1886 bfd_put_16 (abfd, cursig, data + 12);
1887 greg = va_arg (ap, const void *);
1888 memcpy (data + 112, greg, 384);
1889 memset (data + 496, 0, 8);
1890 va_end (ap);
1891 return elfcore_write_note (abfd, buf, bufsiz,
1892 "CORE", note_type, data, sizeof (data));
1893 }
1894 }
1895}
1896
5d35169e
AM
1897/* Add extra PPC sections. */
1898
2cdcc330 1899static const struct bfd_elf_special_section ppc64_elf_special_sections[] =
7f4d3958 1900{
07d6d2b8
AM
1901 { STRING_COMMA_LEN (".plt"), 0, SHT_NOBITS, 0 },
1902 { STRING_COMMA_LEN (".sbss"), -2, SHT_NOBITS, SHF_ALLOC + SHF_WRITE },
0112cd26 1903 { STRING_COMMA_LEN (".sdata"), -2, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE },
07d6d2b8
AM
1904 { STRING_COMMA_LEN (".toc"), 0, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE },
1905 { STRING_COMMA_LEN (".toc1"), 0, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE },
0112cd26 1906 { STRING_COMMA_LEN (".tocbss"), 0, SHT_NOBITS, SHF_ALLOC + SHF_WRITE },
07d6d2b8 1907 { NULL, 0, 0, 0, 0 }
5d35169e
AM
1908};
1909
7c8fe5c4
AM
1910enum _ppc64_sec_type {
1911 sec_normal = 0,
1912 sec_opd = 1,
1913 sec_toc = 2
1914};
1915
f0abc2a1
AM
1916struct _ppc64_elf_section_data
1917{
1918 struct bfd_elf_section_data elf;
411e1bfb 1919
f0abc2a1
AM
1920 union
1921 {
51aecdc5
AM
1922 /* An array with one entry for each opd function descriptor,
1923 and some spares since opd entries may be either 16 or 24 bytes. */
1924#define OPD_NDX(OFF) ((OFF) >> 4)
74f0fb50
AM
1925 struct _opd_sec_data
1926 {
1927 /* Points to the function code section for local opd entries. */
1928 asection **func_sec;
1929
1930 /* After editing .opd, adjust references to opd local syms. */
1931 long *adjust;
1932 } opd;
7c8fe5c4 1933
3a71aa26
AM
1934 /* An array for toc sections, indexed by offset/8. */
1935 struct _toc_sec_data
1936 {
1937 /* Specifies the relocation symbol index used at a given toc offset. */
1938 unsigned *symndx;
1939
1940 /* And the relocation addend. */
1941 bfd_vma *add;
1942 } toc;
7c8fe5c4
AM
1943 } u;
1944
1945 enum _ppc64_sec_type sec_type:2;
411e1bfb 1946
7c8fe5c4
AM
1947 /* Flag set when small branches are detected. Used to
1948 select suitable defaults for the stub group size. */
1949 unsigned int has_14bit_branch:1;
3e04d765
AM
1950
1951 /* Flag set when PLTCALL relocs are detected. */
1952 unsigned int has_pltcall:1;
066f4018
AM
1953
1954 /* Flag set when section has GOT relocations that can be optimised. */
1955 unsigned int has_gotrel:1;
f0abc2a1
AM
1956};
1957
1958#define ppc64_elf_section_data(sec) \
411e1bfb 1959 ((struct _ppc64_elf_section_data *) elf_section_data (sec))
f0abc2a1
AM
1960
1961static bfd_boolean
4ce794b7 1962ppc64_elf_new_section_hook (bfd *abfd, asection *sec)
f0abc2a1 1963{
f592407e
AM
1964 if (!sec->used_by_bfd)
1965 {
1966 struct _ppc64_elf_section_data *sdata;
1967 bfd_size_type amt = sizeof (*sdata);
f0abc2a1 1968
f592407e
AM
1969 sdata = bfd_zalloc (abfd, amt);
1970 if (sdata == NULL)
1971 return FALSE;
1972 sec->used_by_bfd = sdata;
1973 }
f0abc2a1
AM
1974
1975 return _bfd_elf_new_section_hook (abfd, sec);
1976}
4025353c 1977
74f0fb50 1978static struct _opd_sec_data *
4025353c
AM
1979get_opd_info (asection * sec)
1980{
1981 if (sec != NULL
1982 && ppc64_elf_section_data (sec) != NULL
7c8fe5c4 1983 && ppc64_elf_section_data (sec)->sec_type == sec_opd)
74f0fb50 1984 return &ppc64_elf_section_data (sec)->u.opd;
4025353c
AM
1985 return NULL;
1986}
90e3cdf2
JJ
1987\f
1988/* Parameters for the qsort hook. */
90e3cdf2 1989static bfd_boolean synthetic_relocatable;
cd285db5 1990static asection *synthetic_opd;
90e3cdf2 1991
699733f6 1992/* qsort comparison function for ppc64_elf_get_synthetic_symtab. */
90e3cdf2
JJ
1993
1994static int
1995compare_symbols (const void *ap, const void *bp)
1996{
2cdcc330
AM
1997 const asymbol *a = *(const asymbol **) ap;
1998 const asymbol *b = *(const asymbol **) bp;
90e3cdf2 1999
699733f6
AM
2000 /* Section symbols first. */
2001 if ((a->flags & BSF_SECTION_SYM) && !(b->flags & BSF_SECTION_SYM))
90e3cdf2 2002 return -1;
699733f6 2003 if (!(a->flags & BSF_SECTION_SYM) && (b->flags & BSF_SECTION_SYM))
90e3cdf2
JJ
2004 return 1;
2005
699733f6 2006 /* then .opd symbols. */
cd285db5
AM
2007 if (synthetic_opd != NULL)
2008 {
2009 if (strcmp (a->section->name, ".opd") == 0
2010 && strcmp (b->section->name, ".opd") != 0)
2011 return -1;
2012 if (strcmp (a->section->name, ".opd") != 0
2013 && strcmp (b->section->name, ".opd") == 0)
2014 return 1;
2015 }
90e3cdf2 2016
699733f6 2017 /* then other code symbols. */
2cdcc330
AM
2018 if (((a->section->flags & (SEC_CODE | SEC_ALLOC | SEC_THREAD_LOCAL))
2019 == (SEC_CODE | SEC_ALLOC))
2020 && ((b->section->flags & (SEC_CODE | SEC_ALLOC | SEC_THREAD_LOCAL))
2021 != (SEC_CODE | SEC_ALLOC)))
90e3cdf2
JJ
2022 return -1;
2023
2cdcc330
AM
2024 if (((a->section->flags & (SEC_CODE | SEC_ALLOC | SEC_THREAD_LOCAL))
2025 != (SEC_CODE | SEC_ALLOC))
2026 && ((b->section->flags & (SEC_CODE | SEC_ALLOC | SEC_THREAD_LOCAL))
2027 == (SEC_CODE | SEC_ALLOC)))
90e3cdf2
JJ
2028 return 1;
2029
2030 if (synthetic_relocatable)
2031 {
2032 if (a->section->id < b->section->id)
2033 return -1;
2034
2035 if (a->section->id > b->section->id)
2036 return 1;
2037 }
2038
2039 if (a->value + a->section->vma < b->value + b->section->vma)
2040 return -1;
2041
2042 if (a->value + a->section->vma > b->value + b->section->vma)
2043 return 1;
2044
4d35a0aa
AM
2045 /* For syms with the same value, prefer strong dynamic global function
2046 syms over other syms. */
2047 if ((a->flags & BSF_GLOBAL) != 0 && (b->flags & BSF_GLOBAL) == 0)
2048 return -1;
2049
2050 if ((a->flags & BSF_GLOBAL) == 0 && (b->flags & BSF_GLOBAL) != 0)
2051 return 1;
2052
2053 if ((a->flags & BSF_FUNCTION) != 0 && (b->flags & BSF_FUNCTION) == 0)
2054 return -1;
2055
2056 if ((a->flags & BSF_FUNCTION) == 0 && (b->flags & BSF_FUNCTION) != 0)
2057 return 1;
2058
2059 if ((a->flags & BSF_WEAK) == 0 && (b->flags & BSF_WEAK) != 0)
2060 return -1;
2061
2062 if ((a->flags & BSF_WEAK) != 0 && (b->flags & BSF_WEAK) == 0)
2063 return 1;
2064
2065 if ((a->flags & BSF_DYNAMIC) != 0 && (b->flags & BSF_DYNAMIC) == 0)
2066 return -1;
2067
2068 if ((a->flags & BSF_DYNAMIC) == 0 && (b->flags & BSF_DYNAMIC) != 0)
2069 return 1;
2070
aaed6f5b 2071 return a > b;
90e3cdf2
JJ
2072}
2073
699733f6 2074/* Search SYMS for a symbol of the given VALUE. */
90e3cdf2 2075
699733f6 2076static asymbol *
7292b3ac 2077sym_exists_at (asymbol **syms, long lo, long hi, unsigned int id, bfd_vma value)
90e3cdf2 2078{
699733f6 2079 long mid;
90e3cdf2 2080
7292b3ac 2081 if (id == (unsigned) -1)
699733f6
AM
2082 {
2083 while (lo < hi)
2084 {
2085 mid = (lo + hi) >> 1;
2086 if (syms[mid]->value + syms[mid]->section->vma < value)
2087 lo = mid + 1;
2088 else if (syms[mid]->value + syms[mid]->section->vma > value)
2089 hi = mid;
2090 else
2091 return syms[mid];
2092 }
2093 }
2094 else
2095 {
2096 while (lo < hi)
2097 {
2098 mid = (lo + hi) >> 1;
2099 if (syms[mid]->section->id < id)
2100 lo = mid + 1;
2101 else if (syms[mid]->section->id > id)
2102 hi = mid;
2103 else if (syms[mid]->value < value)
2104 lo = mid + 1;
2105 else if (syms[mid]->value > value)
2106 hi = mid;
2107 else
2108 return syms[mid];
2109 }
2110 }
2111 return NULL;
90e3cdf2
JJ
2112}
2113
468392fb
AM
2114static bfd_boolean
2115section_covers_vma (bfd *abfd ATTRIBUTE_UNUSED, asection *section, void *ptr)
2116{
2117 bfd_vma vma = *(bfd_vma *) ptr;
2118 return ((section->flags & SEC_ALLOC) != 0
2119 && section->vma <= vma
2120 && vma < section->vma + section->size);
2121}
2122
699733f6 2123/* Create synthetic symbols, effectively restoring "dot-symbol" function
c4b0b099
AM
2124 entry syms. Also generate @plt symbols for the glink branch table.
2125 Returns count of synthetic symbols in RET or -1 on error. */
90e3cdf2
JJ
2126
2127static long
a7535cf3
AM
2128ppc64_elf_get_synthetic_symtab (bfd *abfd,
2129 long static_count, asymbol **static_syms,
2130 long dyn_count, asymbol **dyn_syms,
c9727e01 2131 asymbol **ret)
90e3cdf2
JJ
2132{
2133 asymbol *s;
0ccf57bd 2134 size_t i, j, count;
90e3cdf2 2135 char *names;
0ccf57bd 2136 size_t symcount, codesecsym, codesecsymend, secsymend, opdsymend;
ee67d69a 2137 asection *opd = NULL;
90e3cdf2 2138 bfd_boolean relocatable = (abfd->flags & (EXEC_P | DYNAMIC)) == 0;
a7535cf3 2139 asymbol **syms;
ee67d69a 2140 int abi = abiversion (abfd);
90e3cdf2
JJ
2141
2142 *ret = NULL;
2143
ee67d69a
AM
2144 if (abi < 2)
2145 {
2146 opd = bfd_get_section_by_name (abfd, ".opd");
2147 if (opd == NULL && abi == 1)
2148 return 0;
2149 }
90e3cdf2 2150
a5259595
AM
2151 syms = NULL;
2152 codesecsym = 0;
2153 codesecsymend = 0;
2154 secsymend = 0;
2155 opdsymend = 0;
2156 symcount = 0;
2157 if (opd != NULL)
c9727e01 2158 {
a5259595
AM
2159 symcount = static_count;
2160 if (!relocatable)
2161 symcount += dyn_count;
2162 if (symcount == 0)
2163 return 0;
c9727e01 2164
a5259595
AM
2165 syms = bfd_malloc ((symcount + 1) * sizeof (*syms));
2166 if (syms == NULL)
2167 return -1;
90e3cdf2 2168
a5259595
AM
2169 if (!relocatable && static_count != 0 && dyn_count != 0)
2170 {
2171 /* Use both symbol tables. */
2172 memcpy (syms, static_syms, static_count * sizeof (*syms));
2173 memcpy (syms + static_count, dyn_syms,
2174 (dyn_count + 1) * sizeof (*syms));
2175 }
2176 else if (!relocatable && static_count == 0)
2177 memcpy (syms, dyn_syms, (symcount + 1) * sizeof (*syms));
2178 else
2179 memcpy (syms, static_syms, (symcount + 1) * sizeof (*syms));
90e3cdf2 2180
0ccf57bd
AM
2181 /* Trim uninteresting symbols. Interesting symbols are section,
2182 function, and notype symbols. */
2183 for (i = 0, j = 0; i < symcount; ++i)
2184 if ((syms[i]->flags & (BSF_FILE | BSF_OBJECT | BSF_THREAD_LOCAL
2185 | BSF_RELC | BSF_SRELC)) == 0)
2186 syms[j++] = syms[i];
2187 symcount = j;
2188
a5259595
AM
2189 synthetic_relocatable = relocatable;
2190 synthetic_opd = opd;
2191 qsort (syms, symcount, sizeof (*syms), compare_symbols);
90e3cdf2 2192
a5259595
AM
2193 if (!relocatable && symcount > 1)
2194 {
bfa5bd2a
PA
2195 /* Trim duplicate syms, since we may have merged the normal
2196 and dynamic symbols. Actually, we only care about syms
2197 that have different values, so trim any with the same
2198 value. Don't consider ifunc and ifunc resolver symbols
2199 duplicates however, because GDB wants to know whether a
2200 text symbol is an ifunc resolver. */
a5259595 2201 for (i = 1, j = 1; i < symcount; ++i)
bfa5bd2a
PA
2202 {
2203 const asymbol *s0 = syms[i - 1];
2204 const asymbol *s1 = syms[i];
2205
2206 if ((s0->value + s0->section->vma
2207 != s1->value + s1->section->vma)
2208 || ((s0->flags & BSF_GNU_INDIRECT_FUNCTION)
2209 != (s1->flags & BSF_GNU_INDIRECT_FUNCTION)))
2210 syms[j++] = syms[i];
2211 }
a5259595
AM
2212 symcount = j;
2213 }
699733f6 2214
a5259595
AM
2215 i = 0;
2216 /* Note that here and in compare_symbols we can't compare opd and
2217 sym->section directly. With separate debug info files, the
2218 symbols will be extracted from the debug file while abfd passed
2219 to this function is the real binary. */
0ccf57bd 2220 if (strcmp (syms[i]->section->name, ".opd") == 0)
a5259595
AM
2221 ++i;
2222 codesecsym = i;
2223
2224 for (; i < symcount; ++i)
2225 if (((syms[i]->section->flags & (SEC_CODE | SEC_ALLOC
2226 | SEC_THREAD_LOCAL))
2227 != (SEC_CODE | SEC_ALLOC))
2228 || (syms[i]->flags & BSF_SECTION_SYM) == 0)
2229 break;
2230 codesecsymend = i;
2231
2232 for (; i < symcount; ++i)
2233 if ((syms[i]->flags & BSF_SECTION_SYM) == 0)
2234 break;
2235 secsymend = i;
2236
2237 for (; i < symcount; ++i)
2238 if (strcmp (syms[i]->section->name, ".opd") != 0)
2239 break;
2240 opdsymend = i;
2241
2242 for (; i < symcount; ++i)
2cdcc330
AM
2243 if (((syms[i]->section->flags
2244 & (SEC_CODE | SEC_ALLOC | SEC_THREAD_LOCAL)))
a5259595
AM
2245 != (SEC_CODE | SEC_ALLOC))
2246 break;
2247 symcount = i;
2248 }
c9727e01 2249 count = 0;
90e3cdf2 2250
699733f6 2251 if (relocatable)
90e3cdf2 2252 {
699733f6
AM
2253 bfd_boolean (*slurp_relocs) (bfd *, asection *, asymbol **, bfd_boolean);
2254 arelent *r;
2255 size_t size;
0ccf57bd 2256 size_t relcount;
90e3cdf2 2257
468392fb
AM
2258 if (opdsymend == secsymend)
2259 goto done;
2260
699733f6 2261 slurp_relocs = get_elf_backend_data (abfd)->s->slurp_reloc_table;
90e3cdf2 2262 relcount = (opd->flags & SEC_RELOC) ? opd->reloc_count : 0;
7356fed5 2263 if (relcount == 0)
c9727e01 2264 goto done;
90e3cdf2 2265
7356fed5
AM
2266 if (!(*slurp_relocs) (abfd, opd, static_syms, FALSE))
2267 {
2268 count = -1;
2269 goto done;
2270 }
2271
699733f6 2272 size = 0;
595da8c5 2273 for (i = secsymend, r = opd->relocation; i < opdsymend; ++i)
699733f6
AM
2274 {
2275 asymbol *sym;
90e3cdf2 2276
595da8c5 2277 while (r < opd->relocation + relcount
699733f6
AM
2278 && r->address < syms[i]->value + opd->vma)
2279 ++r;
90e3cdf2 2280
595da8c5 2281 if (r == opd->relocation + relcount)
699733f6 2282 break;
90e3cdf2 2283
699733f6
AM
2284 if (r->address != syms[i]->value + opd->vma)
2285 continue;
90e3cdf2 2286
699733f6
AM
2287 if (r->howto->type != R_PPC64_ADDR64)
2288 continue;
90e3cdf2 2289
699733f6
AM
2290 sym = *r->sym_ptr_ptr;
2291 if (!sym_exists_at (syms, opdsymend, symcount,
2292 sym->section->id, sym->value + r->addend))
2293 {
2294 ++count;
2295 size += sizeof (asymbol);
2296 size += strlen (syms[i]->name) + 2;
2297 }
2298 }
90e3cdf2 2299
c4b0b099
AM
2300 if (size == 0)
2301 goto done;
699733f6
AM
2302 s = *ret = bfd_malloc (size);
2303 if (s == NULL)
2304 {
7356fed5 2305 count = -1;
c9727e01 2306 goto done;
699733f6 2307 }
90e3cdf2 2308
699733f6 2309 names = (char *) (s + count);
90e3cdf2 2310
595da8c5 2311 for (i = secsymend, r = opd->relocation; i < opdsymend; ++i)
90e3cdf2 2312 {
699733f6 2313 asymbol *sym;
90e3cdf2 2314
595da8c5 2315 while (r < opd->relocation + relcount
699733f6
AM
2316 && r->address < syms[i]->value + opd->vma)
2317 ++r;
90e3cdf2 2318
595da8c5 2319 if (r == opd->relocation + relcount)
699733f6
AM
2320 break;
2321
2322 if (r->address != syms[i]->value + opd->vma)
2323 continue;
2324
2325 if (r->howto->type != R_PPC64_ADDR64)
2326 continue;
90e3cdf2 2327
699733f6
AM
2328 sym = *r->sym_ptr_ptr;
2329 if (!sym_exists_at (syms, opdsymend, symcount,
2330 sym->section->id, sym->value + r->addend))
2331 {
2332 size_t len;
2333
2334 *s = *syms[i];
6ba2a415 2335 s->flags |= BSF_SYNTHETIC;
699733f6
AM
2336 s->section = sym->section;
2337 s->value = sym->value + r->addend;
2338 s->name = names;
2339 *names++ = '.';
2340 len = strlen (syms[i]->name);
2341 memcpy (names, syms[i]->name, len + 1);
2342 names += len + 1;
6f610d07
UW
2343 /* Have udata.p point back to the original symbol this
2344 synthetic symbol was derived from. */
2345 s->udata.p = syms[i];
699733f6
AM
2346 s++;
2347 }
2348 }
2349 }
2350 else
90e3cdf2 2351 {
468392fb 2352 bfd_boolean (*slurp_relocs) (bfd *, asection *, asymbol **, bfd_boolean);
ee67d69a 2353 bfd_byte *contents = NULL;
699733f6 2354 size_t size;
0ccf57bd 2355 size_t plt_count = 0;
468392fb
AM
2356 bfd_vma glink_vma = 0, resolv_vma = 0;
2357 asection *dynamic, *glink = NULL, *relplt = NULL;
2358 arelent *p;
90e3cdf2 2359
ee67d69a 2360 if (opd != NULL && !bfd_malloc_and_get_section (abfd, opd, &contents))
699733f6 2361 {
c4b0b099
AM
2362 free_contents_and_exit_err:
2363 count = -1;
ee67d69a 2364 free_contents_and_exit:
699733f6 2365 if (contents)
ee67d69a 2366 free (contents);
c9727e01 2367 goto done;
699733f6 2368 }
90e3cdf2 2369
699733f6
AM
2370 size = 0;
2371 for (i = secsymend; i < opdsymend; ++i)
2372 {
2373 bfd_vma ent;
90e3cdf2 2374
5ef11c02
AM
2375 /* Ignore bogus symbols. */
2376 if (syms[i]->value > opd->size - 8)
2377 continue;
2378
699733f6
AM
2379 ent = bfd_get_64 (abfd, contents + syms[i]->value);
2380 if (!sym_exists_at (syms, opdsymend, symcount, -1, ent))
2381 {
2382 ++count;
2383 size += sizeof (asymbol);
2384 size += strlen (syms[i]->name) + 2;
2385 }
2386 }
90e3cdf2 2387
468392fb 2388 /* Get start of .glink stubs from DT_PPC64_GLINK. */
066ee829
AM
2389 if (dyn_count != 0
2390 && (dynamic = bfd_get_section_by_name (abfd, ".dynamic")) != NULL)
468392fb
AM
2391 {
2392 bfd_byte *dynbuf, *extdyn, *extdynend;
2393 size_t extdynsize;
2394 void (*swap_dyn_in) (bfd *, const void *, Elf_Internal_Dyn *);
2395
2396 if (!bfd_malloc_and_get_section (abfd, dynamic, &dynbuf))
c4b0b099 2397 goto free_contents_and_exit_err;
468392fb
AM
2398
2399 extdynsize = get_elf_backend_data (abfd)->s->sizeof_dyn;
2400 swap_dyn_in = get_elf_backend_data (abfd)->s->swap_dyn_in;
2401
2402 extdyn = dynbuf;
2403 extdynend = extdyn + dynamic->size;
2404 for (; extdyn < extdynend; extdyn += extdynsize)
2405 {
2406 Elf_Internal_Dyn dyn;
2407 (*swap_dyn_in) (abfd, extdyn, &dyn);
2408
2409 if (dyn.d_tag == DT_NULL)
2410 break;
2411
2412 if (dyn.d_tag == DT_PPC64_GLINK)
2413 {
9e390558
AM
2414 /* The first glink stub starts at DT_PPC64_GLINK plus 32.
2415 See comment in ppc64_elf_finish_dynamic_sections. */
2416 glink_vma = dyn.d_un.d_val + 8 * 4;
468392fb
AM
2417 /* The .glink section usually does not survive the final
2418 link; search for the section (usually .text) where the
2419 glink stubs now reside. */
2420 glink = bfd_sections_find_if (abfd, section_covers_vma,
2421 &glink_vma);
2422 break;
2423 }
2424 }
2425
2426 free (dynbuf);
2427 }
2428
2429 if (glink != NULL)
2430 {
2431 /* Determine __glink trampoline by reading the relative branch
2432 from the first glink stub. */
2433 bfd_byte buf[4];
b9e5796b
AM
2434 unsigned int off = 0;
2435
2436 while (bfd_get_section_contents (abfd, glink, buf,
2437 glink_vma + off - glink->vma, 4))
468392fb
AM
2438 {
2439 unsigned int insn = bfd_get_32 (abfd, buf);
2440 insn ^= B_DOT;
2441 if ((insn & ~0x3fffffc) == 0)
b9e5796b 2442 {
2cdcc330
AM
2443 resolv_vma
2444 = glink_vma + off + (insn ^ 0x2000000) - 0x2000000;
b9e5796b
AM
2445 break;
2446 }
2447 off += 4;
2448 if (off > 4)
2449 break;
468392fb
AM
2450 }
2451
2452 if (resolv_vma)
2453 size += sizeof (asymbol) + sizeof ("__glink_PLTresolve");
468392fb 2454
066ee829
AM
2455 relplt = bfd_get_section_by_name (abfd, ".rela.plt");
2456 if (relplt != NULL)
2457 {
2458 slurp_relocs = get_elf_backend_data (abfd)->s->slurp_reloc_table;
2cdcc330 2459 if (!(*slurp_relocs) (abfd, relplt, dyn_syms, TRUE))
c4b0b099 2460 goto free_contents_and_exit_err;
68ffbac6 2461
066ee829
AM
2462 plt_count = relplt->size / sizeof (Elf64_External_Rela);
2463 size += plt_count * sizeof (asymbol);
468392fb 2464
066ee829
AM
2465 p = relplt->relocation;
2466 for (i = 0; i < plt_count; i++, p++)
e054468f
AM
2467 {
2468 size += strlen ((*p->sym_ptr_ptr)->name) + sizeof ("@plt");
2469 if (p->addend != 0)
2470 size += sizeof ("+0x") - 1 + 16;
2471 }
066ee829 2472 }
468392fb
AM
2473 }
2474
c4b0b099
AM
2475 if (size == 0)
2476 goto free_contents_and_exit;
699733f6
AM
2477 s = *ret = bfd_malloc (size);
2478 if (s == NULL)
c4b0b099 2479 goto free_contents_and_exit_err;
90e3cdf2 2480
468392fb 2481 names = (char *) (s + count + plt_count + (resolv_vma != 0));
90e3cdf2 2482
699733f6 2483 for (i = secsymend; i < opdsymend; ++i)
90e3cdf2 2484 {
699733f6 2485 bfd_vma ent;
90e3cdf2 2486
5ef11c02
AM
2487 if (syms[i]->value > opd->size - 8)
2488 continue;
2489
699733f6
AM
2490 ent = bfd_get_64 (abfd, contents + syms[i]->value);
2491 if (!sym_exists_at (syms, opdsymend, symcount, -1, ent))
90e3cdf2 2492 {
0ccf57bd 2493 size_t lo, hi;
699733f6 2494 size_t len;
c9727e01 2495 asection *sec = abfd->sections;
90e3cdf2 2496
699733f6
AM
2497 *s = *syms[i];
2498 lo = codesecsym;
2499 hi = codesecsymend;
2500 while (lo < hi)
2501 {
0ccf57bd 2502 size_t mid = (lo + hi) >> 1;
699733f6
AM
2503 if (syms[mid]->section->vma < ent)
2504 lo = mid + 1;
2505 else if (syms[mid]->section->vma > ent)
2506 hi = mid;
2507 else
c9727e01
AM
2508 {
2509 sec = syms[mid]->section;
2510 break;
2511 }
699733f6
AM
2512 }
2513
c9727e01 2514 if (lo >= hi && lo > codesecsym)
699733f6 2515 sec = syms[lo - 1]->section;
699733f6
AM
2516
2517 for (; sec != NULL; sec = sec->next)
2518 {
2519 if (sec->vma > ent)
2520 break;
63524580
JK
2521 /* SEC_LOAD may not be set if SEC is from a separate debug
2522 info file. */
2523 if ((sec->flags & SEC_ALLOC) == 0)
699733f6
AM
2524 break;
2525 if ((sec->flags & SEC_CODE) != 0)
2526 s->section = sec;
2527 }
6ba2a415 2528 s->flags |= BSF_SYNTHETIC;
699733f6
AM
2529 s->value = ent - s->section->vma;
2530 s->name = names;
2531 *names++ = '.';
2532 len = strlen (syms[i]->name);
2533 memcpy (names, syms[i]->name, len + 1);
2534 names += len + 1;
6f610d07
UW
2535 /* Have udata.p point back to the original symbol this
2536 synthetic symbol was derived from. */
2537 s->udata.p = syms[i];
699733f6 2538 s++;
90e3cdf2 2539 }
90e3cdf2 2540 }
699733f6 2541 free (contents);
468392fb
AM
2542
2543 if (glink != NULL && relplt != NULL)
2544 {
2545 if (resolv_vma)
2546 {
2547 /* Add a symbol for the main glink trampoline. */
86a4952b 2548 memset (s, 0, sizeof *s);
468392fb 2549 s->the_bfd = abfd;
6ba2a415 2550 s->flags = BSF_GLOBAL | BSF_SYNTHETIC;
468392fb
AM
2551 s->section = glink;
2552 s->value = resolv_vma - glink->vma;
2553 s->name = names;
2cdcc330
AM
2554 memcpy (names, "__glink_PLTresolve",
2555 sizeof ("__glink_PLTresolve"));
468392fb
AM
2556 names += sizeof ("__glink_PLTresolve");
2557 s++;
2558 count++;
2559 }
2560
2561 /* FIXME: It would be very much nicer to put sym@plt on the
2562 stub rather than on the glink branch table entry. The
2563 objdump disassembler would then use a sensible symbol
2564 name on plt calls. The difficulty in doing so is
2565 a) finding the stubs, and,
2566 b) matching stubs against plt entries, and,
2567 c) there can be multiple stubs for a given plt entry.
2568
2569 Solving (a) could be done by code scanning, but older
2570 ppc64 binaries used different stubs to current code.
2571 (b) is the tricky one since you need to known the toc
2572 pointer for at least one function that uses a pic stub to
2573 be able to calculate the plt address referenced.
2574 (c) means gdb would need to set multiple breakpoints (or
2575 find the glink branch itself) when setting breakpoints
2576 for pending shared library loads. */
2577 p = relplt->relocation;
2578 for (i = 0; i < plt_count; i++, p++)
2579 {
2580 size_t len;
2581
2582 *s = **p->sym_ptr_ptr;
2583 /* Undefined syms won't have BSF_LOCAL or BSF_GLOBAL set. Since
2584 we are defining a symbol, ensure one of them is set. */
2585 if ((s->flags & BSF_LOCAL) == 0)
2586 s->flags |= BSF_GLOBAL;
6ba2a415 2587 s->flags |= BSF_SYNTHETIC;
468392fb
AM
2588 s->section = glink;
2589 s->value = glink_vma - glink->vma;
2590 s->name = names;
2591 s->udata.p = NULL;
2592 len = strlen ((*p->sym_ptr_ptr)->name);
2593 memcpy (names, (*p->sym_ptr_ptr)->name, len);
2594 names += len;
e054468f
AM
2595 if (p->addend != 0)
2596 {
2597 memcpy (names, "+0x", sizeof ("+0x") - 1);
2598 names += sizeof ("+0x") - 1;
2599 bfd_sprintf_vma (abfd, names, p->addend);
2600 names += strlen (names);
2601 }
468392fb
AM
2602 memcpy (names, "@plt", sizeof ("@plt"));
2603 names += sizeof ("@plt");
2604 s++;
b9e5796b
AM
2605 if (abi < 2)
2606 {
2607 glink_vma += 8;
2608 if (i >= 0x8000)
2609 glink_vma += 4;
2610 }
2611 else
468392fb
AM
2612 glink_vma += 4;
2613 }
2614 count += plt_count;
2615 }
90e3cdf2
JJ
2616 }
2617
c9727e01 2618 done:
a7535cf3 2619 free (syms);
90e3cdf2
JJ
2620 return count;
2621}
5bd4f169 2622\f
65f38f15
AM
2623/* The following functions are specific to the ELF linker, while
2624 functions above are used generally. Those named ppc64_elf_* are
2625 called by the main ELF linker code. They appear in this file more
2626 or less in the order in which they are called. eg.
2627 ppc64_elf_check_relocs is called early in the link process,
2628 ppc64_elf_finish_dynamic_sections is one of the last functions
e86ce104
AM
2629 called.
2630
2631 PowerPC64-ELF uses a similar scheme to PowerPC64-XCOFF in that
2632 functions have both a function code symbol and a function descriptor
2633 symbol. A call to foo in a relocatable object file looks like:
2634
2635 . .text
2636 . x:
2637 . bl .foo
2638 . nop
2639
2640 The function definition in another object file might be:
2641
2642 . .section .opd
2643 . foo: .quad .foo
2644 . .quad .TOC.@tocbase
2645 . .quad 0
2646 .
2647 . .text
2648 . .foo: blr
2649
2650 When the linker resolves the call during a static link, the branch
2651 unsurprisingly just goes to .foo and the .opd information is unused.
2652 If the function definition is in a shared library, things are a little
2653 different: The call goes via a plt call stub, the opd information gets
2654 copied to the plt, and the linker patches the nop.
2655
2656 . x:
2657 . bl .foo_stub
2658 . ld 2,40(1)
2659 .
2660 .
2661 . .foo_stub:
71a39c98
AM
2662 . std 2,40(1) # in practice, the call stub
2663 . addis 11,2,Lfoo@toc@ha # is slightly optimized, but
2664 . addi 11,11,Lfoo@toc@l # this is the general idea
2665 . ld 12,0(11)
2666 . ld 2,8(11)
2667 . mtctr 12
2668 . ld 11,16(11)
e86ce104
AM
2669 . bctr
2670 .
2671 . .section .plt
2672 . Lfoo: reloc (R_PPC64_JMP_SLOT, foo)
2673
2674 The "reloc ()" notation is supposed to indicate that the linker emits
2675 an R_PPC64_JMP_SLOT reloc against foo. The dynamic linker does the opd
2676 copying.
2677
2678 What are the difficulties here? Well, firstly, the relocations
2679 examined by the linker in check_relocs are against the function code
2680 sym .foo, while the dynamic relocation in the plt is emitted against
2681 the function descriptor symbol, foo. Somewhere along the line, we need
2682 to carefully copy dynamic link information from one symbol to the other.
2683 Secondly, the generic part of the elf linker will make .foo a dynamic
2684 symbol as is normal for most other backends. We need foo dynamic
2685 instead, at least for an application final link. However, when
2686 creating a shared library containing foo, we need to have both symbols
2687 dynamic so that references to .foo are satisfied during the early
2688 stages of linking. Otherwise the linker might decide to pull in a
8387904d
AM
2689 definition from some other object, eg. a static library.
2690
2691 Update: As of August 2004, we support a new convention. Function
2692 calls may use the function descriptor symbol, ie. "bl foo". This
2693 behaves exactly as "bl .foo". */
65f38f15 2694
7c8bbca5
AM
2695/* Of those relocs that might be copied as dynamic relocs, this
2696 function selects those that must be copied when linking a shared
2697 library or PIE, even when the symbol is local. */
65f38f15 2698
1d483afe
AM
2699static int
2700must_be_dyn_reloc (struct bfd_link_info *info,
2701 enum elf_ppc64_reloc_type r_type)
2702{
2703 switch (r_type)
2704 {
2705 default:
7c8bbca5
AM
2706 /* Only relative relocs can be resolved when the object load
2707 address isn't fixed. DTPREL64 is excluded because the
2708 dynamic linker needs to differentiate global dynamic from
2709 local dynamic __tls_index pairs when PPC64_OPT_TLS is set. */
1d483afe
AM
2710 return 1;
2711
2712 case R_PPC64_REL32:
2713 case R_PPC64_REL64:
2714 case R_PPC64_REL30:
2715 return 0;
2716
2717 case R_PPC64_TPREL16:
2718 case R_PPC64_TPREL16_LO:
2719 case R_PPC64_TPREL16_HI:
2720 case R_PPC64_TPREL16_HA:
2721 case R_PPC64_TPREL16_DS:
2722 case R_PPC64_TPREL16_LO_DS:
f9c6b907
AM
2723 case R_PPC64_TPREL16_HIGH:
2724 case R_PPC64_TPREL16_HIGHA:
1d483afe
AM
2725 case R_PPC64_TPREL16_HIGHER:
2726 case R_PPC64_TPREL16_HIGHERA:
2727 case R_PPC64_TPREL16_HIGHEST:
2728 case R_PPC64_TPREL16_HIGHESTA:
2729 case R_PPC64_TPREL64:
7c8bbca5
AM
2730 /* These relocations are relative but in a shared library the
2731 linker doesn't know the thread pointer base. */
2732 return bfd_link_dll (info);
1d483afe
AM
2733 }
2734}
65f38f15 2735
f4656909
AM
2736/* If ELIMINATE_COPY_RELOCS is non-zero, the linker will try to avoid
2737 copying dynamic variables from a shared lib into an app's dynbss
2738 section, and instead use a dynamic relocation to point into the
5d35169e
AM
2739 shared lib. With code that gcc generates, it's vital that this be
2740 enabled; In the PowerPC64 ABI, the address of a function is actually
2741 the address of a function descriptor, which resides in the .opd
2742 section. gcc uses the descriptor directly rather than going via the
2743 GOT as some other ABI's do, which means that initialized function
2744 pointers must reference the descriptor. Thus, a function pointer
2745 initialized to the address of a function in a shared library will
2746 either require a copy reloc, or a dynamic reloc. Using a copy reloc
4cc11e76 2747 redefines the function descriptor symbol to point to the copy. This
5d35169e
AM
2748 presents a problem as a plt entry for that function is also
2749 initialized from the function descriptor symbol and the copy reloc
2750 may not be initialized first. */
a23b6845 2751#define ELIMINATE_COPY_RELOCS 1
f4656909 2752
721956f4 2753/* Section name for stubs is the associated section name plus this
29942be8
NC
2754 string. */
2755#define STUB_SUFFIX ".stub"
721956f4
AM
2756
2757/* Linker stubs.
2758 ppc_stub_long_branch:
2759 Used when a 14 bit branch (or even a 24 bit branch) can't reach its
2760 destination, but a 24 bit branch in a stub section will reach.
2761 . b dest
2762
2763 ppc_stub_plt_branch:
2764 Similar to the above, but a 24 bit branch in the stub section won't
2765 reach its destination.
71a39c98
AM
2766 . addis %r11,%r2,xxx@toc@ha
2767 . ld %r12,xxx@toc@l(%r11)
2768 . mtctr %r12
721956f4
AM
2769 . bctr
2770
2771 ppc_stub_plt_call:
2c66dc6c
AM
2772 Used to call a function in a shared library. If it so happens that
2773 the plt entry referenced crosses a 64k boundary, then an extra
71a39c98 2774 "addi %r11,%r11,xxx@toc@l" will be inserted before the "mtctr".
05d0e962 2775 ppc_stub_plt_call_r2save starts with "std %r2,40(%r1)".
71a39c98
AM
2776 . addis %r11,%r2,xxx@toc@ha
2777 . ld %r12,xxx+0@toc@l(%r11)
2778 . mtctr %r12
2779 . ld %r2,xxx+8@toc@l(%r11)
2780 . ld %r11,xxx+16@toc@l(%r11)
721956f4 2781 . bctr
ad8e1ba5
AM
2782
2783 ppc_stub_long_branch and ppc_stub_plt_branch may also have additional
2784 code to adjust the value and save r2 to support multiple toc sections.
2785 A ppc_stub_long_branch with an r2 offset looks like:
2786 . std %r2,40(%r1)
2787 . addis %r2,%r2,off@ha
2788 . addi %r2,%r2,off@l
2789 . b dest
2790
2791 A ppc_stub_plt_branch with an r2 offset looks like:
2792 . std %r2,40(%r1)
71a39c98
AM
2793 . addis %r11,%r2,xxx@toc@ha
2794 . ld %r12,xxx@toc@l(%r11)
ad8e1ba5
AM
2795 . addis %r2,%r2,off@ha
2796 . addi %r2,%r2,off@l
71a39c98 2797 . mtctr %r12
ad8e1ba5 2798 . bctr
ac2df442 2799
05d0e962
AM
2800 All of the above stubs are shown as their ELFv1 variants. ELFv2
2801 variants exist too, simpler for plt calls since a new toc pointer
2802 and static chain are not loaded by the stub. In addition, ELFv2
2803 has some more complex stubs to handle calls marked with NOTOC
2804 relocs from functions where r2 is not a valid toc pointer. These
2805 come in two flavours, the ones shown below, and _both variants that
2806 start with "std %r2,24(%r1)" to save r2 in the unlikely event that
2807 one call is from a function where r2 is used as the toc pointer but
2808 needs a toc adjusting stub for small-model multi-toc, and another
2809 call is from a function where r2 is not valid.
2810 ppc_stub_long_branch_notoc:
2811 . mflr %r12
2812 . bcl 20,31,1f
2813 . 1:
2814 . mflr %r11
2815 . mtlr %r12
2cdcc330
AM
2816 . addis %r12,%r11,dest-1b@ha
2817 . addi %r12,%r12,dest-1b@l
05d0e962
AM
2818 . b dest
2819
2820 ppc_stub_plt_branch_notoc:
2821 . mflr %r12
2822 . bcl 20,31,1f
2823 . 1:
2824 . mflr %r11
2825 . mtlr %r12
2826 . lis %r12,xxx-1b@highest
f891966f 2827 . ori %r12,%r12,xxx-1b@higher
05d0e962 2828 . sldi %r12,%r12,32
f891966f 2829 . oris %r12,%r12,xxx-1b@high
05d0e962
AM
2830 . ori %r12,%r12,xxx-1b@l
2831 . add %r12,%r11,%r12
2832 . mtctr %r12
2833 . bctr
2834
2835 ppc_stub_plt_call_notoc:
2836 . mflr %r12
2837 . bcl 20,31,1f
2838 . 1:
2839 . mflr %r11
2840 . mtlr %r12
2841 . lis %r12,xxx-1b@highest
f891966f 2842 . ori %r12,%r12,xxx-1b@higher
05d0e962 2843 . sldi %r12,%r12,32
f891966f 2844 . oris %r12,%r12,xxx-1b@high
05d0e962
AM
2845 . ori %r12,%r12,xxx-1b@l
2846 . ldx %r12,%r11,%r12
2847 . mtctr %r12
2848 . bctr
2849
04bdff6a
AM
2850 There are also ELFv1 powerxx variants of these stubs.
2851 ppc_stub_long_branch_notoc:
2852 . paddi %r12,dest@pcrel
2853 . b dest
2854 ppc_stub_plt_branch_notoc:
2855 . lis %r11,(dest-1f)@highesta34
2856 . ori %r11,%r11,(dest-1f)@highera34
2857 . sldi %r11,%r11,34
2858 . 1: paddi %r12,dest@pcrel
2859 . add %r12,%r11,%r12
2860 . mtctr %r12
2861 . bctr
2862 ppc_stub_plt_call_notoc:
2863 . lis %r11,(xxx-1f)@highesta34
2864 . ori %r11,%r11,(xxx-1f)@highera34
2865 . sldi %r11,%r11,34
2866 . 1: paddi %r12,xxx@pcrel
2867 . ldx %r12,%r11,%r12
2868 . mtctr %r12
2869 . bctr
2870
05d0e962
AM
2871 In cases where the high instructions would add zero, they are
2872 omitted and following instructions modified in some cases.
04bdff6a
AM
2873 For example, a powerxx ppc_stub_plt_call_notoc might simplify down
2874 to
2875 . pld %r12,xxx@pcrel
2876 . mtctr %r12
2877 . bctr
05d0e962
AM
2878
2879 For a given stub group (a set of sections all using the same toc
2880 pointer value) there will be just one stub type used for any
2881 particular function symbol. For example, if printf is called from
2882 code with the tocsave optimization (ie. r2 saved in function
2883 prologue) and therefore calls use a ppc_stub_plt_call linkage stub,
2884 and from other code without the tocsave optimization requiring a
2885 ppc_stub_plt_call_r2save linkage stub, a single stub of the latter
2886 type will be created. Calls with the tocsave optimization will
2887 enter this stub after the instruction saving r2. A similar
2888 situation exists when calls are marked with R_PPC64_REL24_NOTOC
2889 relocations. These require a ppc_stub_plt_call_notoc linkage stub
2890 to call an external function like printf. If other calls to printf
2891 require a ppc_stub_plt_call linkage stub then a single
2892 ppc_stub_plt_call_notoc linkage stub will be used for both types of
2893 call. If other calls to printf require a ppc_stub_plt_call_r2save
2894 linkage stub then a single ppc_stub_plt_call_both linkage stub will
2895 be created and calls not requiring r2 to be saved will enter the
2896 stub after the r2 save instruction. There is an analogous
2897 hierarchy of long branch and plt branch stubs for local call
2898 linkage. */
721956f4 2899
2cdcc330
AM
2900enum ppc_stub_type
2901{
721956f4
AM
2902 ppc_stub_none,
2903 ppc_stub_long_branch,
ad8e1ba5 2904 ppc_stub_long_branch_r2off,
05d0e962
AM
2905 ppc_stub_long_branch_notoc,
2906 ppc_stub_long_branch_both, /* r2off and notoc variants both needed. */
721956f4 2907 ppc_stub_plt_branch,
ad8e1ba5 2908 ppc_stub_plt_branch_r2off,
05d0e962
AM
2909 ppc_stub_plt_branch_notoc,
2910 ppc_stub_plt_branch_both,
794e51c0 2911 ppc_stub_plt_call,
7341d5e2 2912 ppc_stub_plt_call_r2save,
05d0e962
AM
2913 ppc_stub_plt_call_notoc,
2914 ppc_stub_plt_call_both,
a4b6fadd
AM
2915 ppc_stub_global_entry,
2916 ppc_stub_save_res
721956f4
AM
2917};
2918
6f20ed8a
AM
2919/* Information on stub grouping. */
2920struct map_stub
2921{
2922 /* The stub section. */
2923 asection *stub_sec;
2924 /* This is the section to which stubs in the group will be attached. */
2925 asection *link_sec;
a4b6fadd
AM
2926 /* Next group. */
2927 struct map_stub *next;
2928 /* Whether to emit a copy of register save/restore functions in this
2929 group. */
2930 int needs_save_res;
df136d64
AM
2931 /* Current offset within stubs after the insn restoring lr in a
2932 _notoc or _both stub using bcl for pc-relative addressing, or
2933 after the insn restoring lr in a __tls_get_addr_opt plt stub. */
2934 unsigned int lr_restore;
2935 /* Accumulated size of EH info emitted to describe return address
2936 if stubs modify lr. Does not include 17 byte FDE header. */
2937 unsigned int eh_size;
2938 /* Offset in glink_eh_frame to the start of EH info for this group. */
2939 unsigned int eh_base;
6f20ed8a
AM
2940};
2941
2cdcc330
AM
2942struct ppc_stub_hash_entry
2943{
721956f4
AM
2944 /* Base hash table entry structure. */
2945 struct bfd_hash_entry root;
2946
ad8e1ba5
AM
2947 enum ppc_stub_type stub_type;
2948
6f20ed8a
AM
2949 /* Group information. */
2950 struct map_stub *group;
721956f4
AM
2951
2952 /* Offset within stub_sec of the beginning of this stub. */
2953 bfd_vma stub_offset;
2954
2955 /* Given the symbol's value and its section we can determine its final
2956 value when building the stubs (so the stub knows where to jump. */
2957 bfd_vma target_value;
2958 asection *target_section;
2959
721956f4
AM
2960 /* The symbol table entry, if any, that this was derived from. */
2961 struct ppc_link_hash_entry *h;
e054468f 2962 struct plt_entry *plt_ent;
721956f4 2963
2d7ad24e
AM
2964 /* Symbol type. */
2965 unsigned char symtype;
2966
6911b7dc
AM
2967 /* Symbol st_other. */
2968 unsigned char other;
721956f4
AM
2969};
2970
2cdcc330
AM
2971struct ppc_branch_hash_entry
2972{
721956f4
AM
2973 /* Base hash table entry structure. */
2974 struct bfd_hash_entry root;
2975
c456f082 2976 /* Offset within branch lookup table. */
721956f4
AM
2977 unsigned int offset;
2978
2979 /* Generation marker. */
2980 unsigned int iter;
2981};
65f38f15 2982
19e08130
AM
2983/* Used to track dynamic relocations for local symbols. */
2984struct ppc_dyn_relocs
2985{
2986 struct ppc_dyn_relocs *next;
2987
2988 /* The input section of the reloc. */
2989 asection *sec;
2990
2991 /* Total number of relocs copied for the input section. */
2992 unsigned int count : 31;
2993
2994 /* Whether this entry is for STT_GNU_IFUNC symbols. */
2995 unsigned int ifunc : 1;
2996};
2997
65f38f15
AM
2998struct ppc_link_hash_entry
2999{
3000 struct elf_link_hash_entry elf;
3001
2cdcc330
AM
3002 union
3003 {
b3fac117
AM
3004 /* A pointer to the most recently used stub hash entry against this
3005 symbol. */
3006 struct ppc_stub_hash_entry *stub_cache;
3007
3008 /* A pointer to the next symbol starting with a '.' */
3009 struct ppc_link_hash_entry *next_dot_sym;
3010 } u;
721956f4 3011
65f38f15 3012 /* Track dynamic relocs copied for this symbol. */
6061a67d 3013 struct elf_dyn_relocs *dyn_relocs;
e86ce104 3014
721956f4 3015 /* Link between function code and descriptor symbols. */
34814b9f 3016 struct ppc_link_hash_entry *oh;
721956f4 3017
e86ce104
AM
3018 /* Flag function code and descriptor symbols. */
3019 unsigned int is_func:1;
3020 unsigned int is_func_descriptor:1;
908b32fc 3021 unsigned int fake:1;
411e1bfb 3022
c5614fa4
AM
3023 /* Whether global opd/toc sym has been adjusted or not.
3024 After ppc64_elf_edit_opd/ppc64_elf_edit_toc has run, this flag
3025 should be set for all globals defined in any opd/toc section. */
754021d0
AM
3026 unsigned int adjust_done:1;
3027
a4b6fadd
AM
3028 /* Set if this is an out-of-line register save/restore function,
3029 with non-standard calling convention. */
3030 unsigned int save_res:1;
3031
8b5f1ed8
AM
3032 /* Set if a duplicate symbol with non-zero localentry is detected,
3033 even when the duplicate symbol does not provide a definition. */
3034 unsigned int non_zero_localentry:1;
3035
411e1bfb 3036 /* Contexts in which symbol is used in the GOT (or TOC).
37da22e5
AM
3037 Bits are or'd into the mask as the corresponding relocs are
3038 encountered during check_relocs, with TLS_TLS being set when any
3039 of the other TLS bits are set. tls_optimize clears bits when
3040 optimizing to indicate the corresponding GOT entry type is not
3041 needed. If set, TLS_TLS is never cleared. tls_optimize may also
3042 set TLS_TPRELGD when a GD reloc turns into a TPREL one. We use a
3043 separate flag rather than setting TPREL just for convenience in
3044 distinguishing the two cases.
3045 These flags are also kept for local symbols. */
3046#define TLS_TLS 1 /* Any TLS reloc. */
3047#define TLS_GD 2 /* GD reloc. */
3048#define TLS_LD 4 /* LD reloc. */
3049#define TLS_TPREL 8 /* TPREL reloc, => IE. */
3050#define TLS_DTPREL 16 /* DTPREL reloc, => LD. */
3051#define TLS_MARK 32 /* __tls_get_addr call marked. */
e7b938ca 3052#define TLS_TPRELGD 64 /* TPREL reloc resulting from GD->IE. */
37da22e5 3053#define TLS_EXPLICIT 128 /* Marks TOC section TLS relocs. */
f961d9dd 3054 unsigned char tls_mask;
37da22e5
AM
3055
3056 /* The above field is also used to mark function symbols. In which
3057 case TLS_TLS will be 0. */
3058#define PLT_IFUNC 2 /* STT_GNU_IFUNC. */
2d7ad24e 3059#define PLT_KEEP 4 /* inline plt call requires plt entry. */
37da22e5 3060#define NON_GOT 256 /* local symbol plt, not stored. */
65f38f15
AM
3061};
3062
3063/* ppc64 ELF linker hash table. */
3064
3065struct ppc_link_hash_table
3066{
3067 struct elf_link_hash_table elf;
3068
721956f4
AM
3069 /* The stub hash table. */
3070 struct bfd_hash_table stub_hash_table;
3071
3072 /* Another hash table for plt_branch stubs. */
3073 struct bfd_hash_table branch_hash_table;
3074
3b421ab3
AM
3075 /* Hash table for function prologue tocsave. */
3076 htab_t tocsave_htab;
3077
e7d1c40c
AM
3078 /* Various options and other info passed from the linker. */
3079 struct ppc64_elf_params *params;
721956f4 3080
6f20ed8a
AM
3081 /* The size of sec_info below. */
3082 unsigned int sec_info_arr_size;
3083
3084 /* Per-section array of extra section info. Done this way rather
3085 than as part of ppc64_elf_section_data so we have the info for
3086 non-ppc64 sections. */
3087 struct
3088 {
3089 /* Along with elf_gp, specifies the TOC pointer used by this section. */
ad8e1ba5 3090 bfd_vma toc_off;
6f20ed8a
AM
3091
3092 union
3093 {
3094 /* The section group that this section belongs to. */
3095 struct map_stub *group;
3096 /* A temp section list pointer. */
3097 asection *list;
3098 } u;
3099 } *sec_info;
721956f4 3100
a4b6fadd
AM
3101 /* Linked list of groups. */
3102 struct map_stub *group;
3103
ad8e1ba5
AM
3104 /* Temp used when calculating TOC pointers. */
3105 bfd_vma toc_curr;
bf102f86
AM
3106 bfd *toc_bfd;
3107 asection *toc_first_sec;
ad8e1ba5 3108
b3fac117
AM
3109 /* Used when adding symbols. */
3110 struct ppc_link_hash_entry *dot_syms;
3111
33e44f2e 3112 /* Shortcuts to get to dynamic linker sections. */
4ce794b7 3113 asection *glink;
9e390558 3114 asection *global_entry;
82bd7b59 3115 asection *sfpr;
2d7ad24e
AM
3116 asection *pltlocal;
3117 asection *relpltlocal;
4ce794b7
AM
3118 asection *brlt;
3119 asection *relbrlt;
58d180e8 3120 asection *glink_eh_frame;
ec338859 3121
8387904d
AM
3122 /* Shortcut to .__tls_get_addr and __tls_get_addr. */
3123 struct ppc_link_hash_entry *tls_get_addr;
3124 struct ppc_link_hash_entry *tls_get_addr_fd;
411e1bfb 3125
927be08e
AM
3126 /* The size of reliplt used by got entry relocs. */
3127 bfd_size_type got_reli_size;
3128
9b5ecbd0 3129 /* Statistics. */
7341d5e2 3130 unsigned long stub_count[ppc_stub_global_entry];
9b5ecbd0 3131
ee75fd95
AM
3132 /* Number of stubs against global syms. */
3133 unsigned long stub_globals;
3134
ee67d69a
AM
3135 /* Set if we're linking code with function descriptors. */
3136 unsigned int opd_abi:1;
3137
4c52953f 3138 /* Support for multiple toc sections. */
33c0ec9d 3139 unsigned int do_multi_toc:1;
4c52953f 3140 unsigned int multi_toc_needed:1;
927be08e 3141 unsigned int second_toc_pass:1;
67f0cbdb 3142 unsigned int do_toc_opt:1;
4c52953f 3143
9a23f96e
AM
3144 /* Set if tls optimization is enabled. */
3145 unsigned int do_tls_opt:1;
3146
3e04d765
AM
3147 /* Set if inline plt calls should be converted to direct calls. */
3148 unsigned int can_convert_all_inline_plt:1;
3149
5d1634d7 3150 /* Set on error. */
99877b66 3151 unsigned int stub_error:1;
721956f4 3152
8c5b4e52
AM
3153 /* Whether func_desc_adjust needs to be run over symbols. */
3154 unsigned int need_func_desc_adj:1;
721956f4 3155
82e66161
AM
3156 /* Whether there exist local gnu indirect function resolvers,
3157 referenced by dynamic relocations. */
3158 unsigned int local_ifunc_resolver:1;
3159 unsigned int maybe_local_ifunc_resolver:1;
3160
f378ab09
AM
3161 /* Whether plt calls for ELFv2 localentry:0 funcs have been optimized. */
3162 unsigned int has_plt_localentry0:1;
3163
5663e321
AM
3164 /* Whether calls are made via the PLT from NOTOC functions. */
3165 unsigned int notoc_plt:1;
3166
04bdff6a
AM
3167 /* Whether to use powerxx instructions in linkage stubs. */
3168 unsigned int powerxx_stubs:1;
3169
721956f4
AM
3170 /* Incremented every time we size stubs. */
3171 unsigned int stub_iteration;
5d1634d7 3172
87d72d41
AM
3173 /* Small local sym cache. */
3174 struct sym_cache sym_cache;
65f38f15
AM
3175};
3176
4c52953f
AM
3177/* Rename some of the generic section flags to better document how they
3178 are used here. */
b0dddeec
AM
3179
3180/* Nonzero if this section has TLS related relocations. */
3181#define has_tls_reloc sec_flg0
3182
23cedd1d 3183/* Nonzero if this section has an old-style call to __tls_get_addr. */
b0dddeec
AM
3184#define has_tls_get_addr_call sec_flg1
3185
3186/* Nonzero if this section has any toc or got relocs. */
3187#define has_toc_reloc sec_flg2
3188
3189/* Nonzero if this section has a call to another section that uses
3190 the toc or got. */
d77c8a4b 3191#define makes_toc_func_call sec_flg3
b0dddeec
AM
3192
3193/* Recursion protection when determining above flag. */
d77c8a4b 3194#define call_check_in_progress sec_flg4
70cc837d 3195#define call_check_done sec_flg5
4c52953f 3196
65f38f15
AM
3197/* Get the ppc64 ELF linker hash table from a link_info structure. */
3198
3199#define ppc_hash_table(p) \
4dfe6ac6
NC
3200 (elf_hash_table_id ((struct elf_link_hash_table *) ((p)->hash)) \
3201 == PPC64_ELF_DATA ? ((struct ppc_link_hash_table *) ((p)->hash)) : NULL)
65f38f15 3202
721956f4
AM
3203#define ppc_stub_hash_lookup(table, string, create, copy) \
3204 ((struct ppc_stub_hash_entry *) \
3205 bfd_hash_lookup ((table), (string), (create), (copy)))
3206
3207#define ppc_branch_hash_lookup(table, string, create, copy) \
3208 ((struct ppc_branch_hash_entry *) \
3209 bfd_hash_lookup ((table), (string), (create), (copy)))
3210
3211/* Create an entry in the stub hash table. */
3212
3213static struct bfd_hash_entry *
4ce794b7
AM
3214stub_hash_newfunc (struct bfd_hash_entry *entry,
3215 struct bfd_hash_table *table,
3216 const char *string)
721956f4
AM
3217{
3218 /* Allocate the structure if it has not already been allocated by a
3219 subclass. */
3220 if (entry == NULL)
3221 {
3222 entry = bfd_hash_allocate (table, sizeof (struct ppc_stub_hash_entry));
3223 if (entry == NULL)
3224 return entry;
3225 }
3226
3227 /* Call the allocation method of the superclass. */
3228 entry = bfd_hash_newfunc (entry, table, string);
3229 if (entry != NULL)
3230 {
3231 struct ppc_stub_hash_entry *eh;
3232
3233 /* Initialize the local fields. */
3234 eh = (struct ppc_stub_hash_entry *) entry;
ad8e1ba5 3235 eh->stub_type = ppc_stub_none;
6f20ed8a 3236 eh->group = NULL;
721956f4
AM
3237 eh->stub_offset = 0;
3238 eh->target_value = 0;
3239 eh->target_section = NULL;
721956f4 3240 eh->h = NULL;
6911b7dc 3241 eh->plt_ent = NULL;
6911b7dc 3242 eh->other = 0;
721956f4
AM
3243 }
3244
3245 return entry;
3246}
3247
3248/* Create an entry in the branch hash table. */
3249
3250static struct bfd_hash_entry *
4ce794b7
AM
3251branch_hash_newfunc (struct bfd_hash_entry *entry,
3252 struct bfd_hash_table *table,
3253 const char *string)
721956f4
AM
3254{
3255 /* Allocate the structure if it has not already been allocated by a
3256 subclass. */
3257 if (entry == NULL)
3258 {
3259 entry = bfd_hash_allocate (table, sizeof (struct ppc_branch_hash_entry));
3260 if (entry == NULL)
3261 return entry;
3262 }
3263
3264 /* Call the allocation method of the superclass. */
3265 entry = bfd_hash_newfunc (entry, table, string);
3266 if (entry != NULL)
3267 {
3268 struct ppc_branch_hash_entry *eh;
3269
3270 /* Initialize the local fields. */
3271 eh = (struct ppc_branch_hash_entry *) entry;
3272 eh->offset = 0;
3273 eh->iter = 0;
3274 }
3275
3276 return entry;
3277}
3278
65f38f15
AM
3279/* Create an entry in a ppc64 ELF linker hash table. */
3280
3281static struct bfd_hash_entry *
4ce794b7
AM
3282link_hash_newfunc (struct bfd_hash_entry *entry,
3283 struct bfd_hash_table *table,
3284 const char *string)
65f38f15
AM
3285{
3286 /* Allocate the structure if it has not already been allocated by a
3287 subclass. */
3288 if (entry == NULL)
3289 {
3290 entry = bfd_hash_allocate (table, sizeof (struct ppc_link_hash_entry));
3291 if (entry == NULL)
3292 return entry;
3293 }
3294
3295 /* Call the allocation method of the superclass. */
3296 entry = _bfd_elf_link_hash_newfunc (entry, table, string);
3297 if (entry != NULL)
3298 {
3299 struct ppc_link_hash_entry *eh = (struct ppc_link_hash_entry *) entry;
3300
b3fac117 3301 memset (&eh->u.stub_cache, 0,
908b32fc 3302 (sizeof (struct ppc_link_hash_entry)
b3fac117
AM
3303 - offsetof (struct ppc_link_hash_entry, u.stub_cache)));
3304
3305 /* When making function calls, old ABI code references function entry
3306 points (dot symbols), while new ABI code references the function
3307 descriptor symbol. We need to make any combination of reference and
3308 definition work together, without breaking archive linking.
3309
3310 For a defined function "foo" and an undefined call to "bar":
3311 An old object defines "foo" and ".foo", references ".bar" (possibly
3312 "bar" too).
3313 A new object defines "foo" and references "bar".
3314
3315 A new object thus has no problem with its undefined symbols being
3316 satisfied by definitions in an old object. On the other hand, the
3317 old object won't have ".bar" satisfied by a new object.
3318
3319 Keep a list of newly added dot-symbols. */
3320
3321 if (string[0] == '.')
3322 {
3323 struct ppc_link_hash_table *htab;
3324
3325 htab = (struct ppc_link_hash_table *) table;
3326 eh->u.next_dot_sym = htab->dot_syms;
3327 htab->dot_syms = eh;
3328 }
65f38f15
AM
3329 }
3330
3331 return entry;
3332}
3333
2cdcc330
AM
3334struct tocsave_entry
3335{
3b421ab3
AM
3336 asection *sec;
3337 bfd_vma offset;
3338};
3339
3340static hashval_t
3341tocsave_htab_hash (const void *p)
3342{
3343 const struct tocsave_entry *e = (const struct tocsave_entry *) p;
4aef7643 3344 return ((bfd_vma) (intptr_t) e->sec ^ e->offset) >> 3;
3b421ab3
AM
3345}
3346
3347static int
3348tocsave_htab_eq (const void *p1, const void *p2)
3349{
3350 const struct tocsave_entry *e1 = (const struct tocsave_entry *) p1;
3351 const struct tocsave_entry *e2 = (const struct tocsave_entry *) p2;
3352 return e1->sec == e2->sec && e1->offset == e2->offset;
3353}
3354
68faa637
AM
3355/* Destroy a ppc64 ELF linker hash table. */
3356
3357static void
d495ab0d 3358ppc64_elf_link_hash_table_free (bfd *obfd)
68faa637 3359{
d495ab0d 3360 struct ppc_link_hash_table *htab;
68faa637 3361
d495ab0d 3362 htab = (struct ppc_link_hash_table *) obfd->link.hash;
68faa637
AM
3363 if (htab->tocsave_htab)
3364 htab_delete (htab->tocsave_htab);
d495ab0d
AM
3365 bfd_hash_table_free (&htab->branch_hash_table);
3366 bfd_hash_table_free (&htab->stub_hash_table);
3367 _bfd_elf_link_hash_table_free (obfd);
68faa637
AM
3368}
3369
65f38f15
AM
3370/* Create a ppc64 ELF linker hash table. */
3371
3372static struct bfd_link_hash_table *
4ce794b7 3373ppc64_elf_link_hash_table_create (bfd *abfd)
65f38f15
AM
3374{
3375 struct ppc_link_hash_table *htab;
3376 bfd_size_type amt = sizeof (struct ppc_link_hash_table);
3377
4ce794b7 3378 htab = bfd_zmalloc (amt);
65f38f15
AM
3379 if (htab == NULL)
3380 return NULL;
3381
66eb6687 3382 if (!_bfd_elf_link_hash_table_init (&htab->elf, abfd, link_hash_newfunc,
4dfe6ac6
NC
3383 sizeof (struct ppc_link_hash_entry),
3384 PPC64_ELF_DATA))
65f38f15 3385 {
e2d34d7d 3386 free (htab);
65f38f15
AM
3387 return NULL;
3388 }
3389
721956f4 3390 /* Init the stub hash table too. */
66eb6687
AM
3391 if (!bfd_hash_table_init (&htab->stub_hash_table, stub_hash_newfunc,
3392 sizeof (struct ppc_stub_hash_entry)))
2915c55b 3393 {
d495ab0d 3394 _bfd_elf_link_hash_table_free (abfd);
2915c55b
JK
3395 return NULL;
3396 }
721956f4
AM
3397
3398 /* And the branch hash table. */
66eb6687
AM
3399 if (!bfd_hash_table_init (&htab->branch_hash_table, branch_hash_newfunc,
3400 sizeof (struct ppc_branch_hash_entry)))
2915c55b
JK
3401 {
3402 bfd_hash_table_free (&htab->stub_hash_table);
d495ab0d 3403 _bfd_elf_link_hash_table_free (abfd);
2915c55b
JK
3404 return NULL;
3405 }
721956f4 3406
3b421ab3
AM
3407 htab->tocsave_htab = htab_try_create (1024,
3408 tocsave_htab_hash,
3409 tocsave_htab_eq,
3410 NULL);
3411 if (htab->tocsave_htab == NULL)
2915c55b 3412 {
d495ab0d 3413 ppc64_elf_link_hash_table_free (abfd);
2915c55b
JK
3414 return NULL;
3415 }
d495ab0d 3416 htab->elf.root.hash_table_free = ppc64_elf_link_hash_table_free;
3b421ab3 3417
3254fd24
AM
3418 /* Initializing two fields of the union is just cosmetic. We really
3419 only care about glist, but when compiled on a 32-bit host the
3420 bfd_vma fields are larger. Setting the bfd_vma to zero makes
3421 debugger inspection of these fields look nicer. */
a6aa5195
AM
3422 htab->elf.init_got_refcount.refcount = 0;
3423 htab->elf.init_got_refcount.glist = NULL;
3424 htab->elf.init_plt_refcount.refcount = 0;
3425 htab->elf.init_plt_refcount.glist = NULL;
3426 htab->elf.init_got_offset.offset = 0;
3427 htab->elf.init_got_offset.glist = NULL;
3428 htab->elf.init_plt_offset.offset = 0;
3429 htab->elf.init_plt_offset.glist = NULL;
3254fd24 3430
65f38f15
AM
3431 return &htab->elf.root;
3432}
3433
bfeb4a28
AM
3434/* Create sections for linker generated code. */
3435
3436static bfd_boolean
3437create_linkage_sections (bfd *dynobj, struct bfd_link_info *info)
3438{
3439 struct ppc_link_hash_table *htab;
3440 flagword flags;
3441
3442 htab = ppc_hash_table (info);
3443
bfeb4a28
AM
3444 flags = (SEC_ALLOC | SEC_LOAD | SEC_CODE | SEC_READONLY
3445 | SEC_HAS_CONTENTS | SEC_IN_MEMORY | SEC_LINKER_CREATED);
b32547cd
AM
3446 if (htab->params->save_restore_funcs)
3447 {
3448 /* Create .sfpr for code to save and restore fp regs. */
3449 htab->sfpr = bfd_make_section_anyway_with_flags (dynobj, ".sfpr",
3450 flags);
3451 if (htab->sfpr == NULL
2cdcc330 3452 || !bfd_set_section_alignment (dynobj, htab->sfpr, 2))
b32547cd
AM
3453 return FALSE;
3454 }
3455
3456 if (bfd_link_relocatable (info))
3457 return TRUE;
bfeb4a28
AM
3458
3459 /* Create .glink for lazy dynamic linking support. */
3460 htab->glink = bfd_make_section_anyway_with_flags (dynobj, ".glink",
3461 flags);
3462 if (htab->glink == NULL
2cdcc330 3463 || !bfd_set_section_alignment (dynobj, htab->glink, 3))
bfeb4a28
AM
3464 return FALSE;
3465
9e390558
AM
3466 /* The part of .glink used by global entry stubs, separate so that
3467 it can be aligned appropriately without affecting htab->glink. */
3468 htab->global_entry = bfd_make_section_anyway_with_flags (dynobj, ".glink",
3469 flags);
3470 if (htab->global_entry == NULL
2cdcc330 3471 || !bfd_set_section_alignment (dynobj, htab->global_entry, 2))
9e390558
AM
3472 return FALSE;
3473
bfeb4a28
AM
3474 if (!info->no_ld_generated_unwind_info)
3475 {
3476 flags = (SEC_ALLOC | SEC_LOAD | SEC_READONLY | SEC_HAS_CONTENTS
3477 | SEC_IN_MEMORY | SEC_LINKER_CREATED);
3478 htab->glink_eh_frame = bfd_make_section_anyway_with_flags (dynobj,
3479 ".eh_frame",
3480 flags);
3481 if (htab->glink_eh_frame == NULL
3482 || !bfd_set_section_alignment (dynobj, htab->glink_eh_frame, 2))
3483 return FALSE;
3484 }
3485
3486 flags = SEC_ALLOC | SEC_LINKER_CREATED;
33e44f2e
AM
3487 htab->elf.iplt = bfd_make_section_anyway_with_flags (dynobj, ".iplt", flags);
3488 if (htab->elf.iplt == NULL
2cdcc330 3489 || !bfd_set_section_alignment (dynobj, htab->elf.iplt, 3))
bfeb4a28
AM
3490 return FALSE;
3491
3492 flags = (SEC_ALLOC | SEC_LOAD | SEC_READONLY
3493 | SEC_HAS_CONTENTS | SEC_IN_MEMORY | SEC_LINKER_CREATED);
33e44f2e
AM
3494 htab->elf.irelplt
3495 = bfd_make_section_anyway_with_flags (dynobj, ".rela.iplt", flags);
3496 if (htab->elf.irelplt == NULL
2cdcc330 3497 || !bfd_set_section_alignment (dynobj, htab->elf.irelplt, 3))
bfeb4a28
AM
3498 return FALSE;
3499
3500 /* Create branch lookup table for plt_branch stubs. */
3501 flags = (SEC_ALLOC | SEC_LOAD
3502 | SEC_HAS_CONTENTS | SEC_IN_MEMORY | SEC_LINKER_CREATED);
3503 htab->brlt = bfd_make_section_anyway_with_flags (dynobj, ".branch_lt",
3504 flags);
3505 if (htab->brlt == NULL
2cdcc330 3506 || !bfd_set_section_alignment (dynobj, htab->brlt, 3))
bfeb4a28
AM
3507 return FALSE;
3508
2d7ad24e
AM
3509 /* Local plt entries, put in .branch_lt but a separate section for
3510 convenience. */
3511 htab->pltlocal = bfd_make_section_anyway_with_flags (dynobj, ".branch_lt",
3512 flags);
3513 if (htab->pltlocal == NULL
2cdcc330 3514 || !bfd_set_section_alignment (dynobj, htab->pltlocal, 3))
2d7ad24e
AM
3515 return FALSE;
3516
0e1862bb 3517 if (!bfd_link_pic (info))
bfeb4a28
AM
3518 return TRUE;
3519
3520 flags = (SEC_ALLOC | SEC_LOAD | SEC_READONLY
3521 | SEC_HAS_CONTENTS | SEC_IN_MEMORY | SEC_LINKER_CREATED);
2d7ad24e
AM
3522 htab->relbrlt
3523 = bfd_make_section_anyway_with_flags (dynobj, ".rela.branch_lt", flags);
bfeb4a28 3524 if (htab->relbrlt == NULL
2cdcc330 3525 || !bfd_set_section_alignment (dynobj, htab->relbrlt, 3))
bfeb4a28
AM
3526 return FALSE;
3527
2d7ad24e
AM
3528 htab->relpltlocal
3529 = bfd_make_section_anyway_with_flags (dynobj, ".rela.branch_lt", flags);
3530 if (htab->relpltlocal == NULL
2cdcc330 3531 || !bfd_set_section_alignment (dynobj, htab->relpltlocal, 3))
2d7ad24e
AM
3532 return FALSE;
3533
bfeb4a28
AM
3534 return TRUE;
3535}
3536
e717da7e
AM
3537/* Satisfy the ELF linker by filling in some fields in our fake bfd. */
3538
bfeb4a28 3539bfd_boolean
e7d1c40c
AM
3540ppc64_elf_init_stub_bfd (struct bfd_link_info *info,
3541 struct ppc64_elf_params *params)
e717da7e
AM
3542{
3543 struct ppc_link_hash_table *htab;
3544
e7d1c40c 3545 elf_elfheader (params->stub_bfd)->e_ident[EI_CLASS] = ELFCLASS64;
e717da7e
AM
3546
3547/* Always hook our dynamic sections into the first bfd, which is the
3548 linker created stub bfd. This ensures that the GOT header is at
3549 the start of the output TOC section. */
3550 htab = ppc_hash_table (info);
e7d1c40c
AM
3551 htab->elf.dynobj = params->stub_bfd;
3552 htab->params = params;
bfeb4a28 3553
bfeb4a28 3554 return create_linkage_sections (htab->elf.dynobj, info);
e717da7e
AM
3555}
3556
721956f4
AM
3557/* Build a name for an entry in the stub hash table. */
3558
3559static char *
4ce794b7
AM
3560ppc_stub_name (const asection *input_section,
3561 const asection *sym_sec,
3562 const struct ppc_link_hash_entry *h,
3563 const Elf_Internal_Rela *rel)
721956f4
AM
3564{
3565 char *stub_name;
bcaa2f82 3566 ssize_t len;
721956f4
AM
3567
3568 /* rel->r_addend is actually 64 bit, but who uses more than +/- 2^31
3569 offsets from a sym as a branch target? In fact, we could
3570 probably assume the addend is always zero. */
3571 BFD_ASSERT (((int) rel->r_addend & 0xffffffff) == rel->r_addend);
3572
3573 if (h)
3574 {
3575 len = 8 + 1 + strlen (h->elf.root.root.string) + 1 + 8 + 1;
3576 stub_name = bfd_malloc (len);
46de2a7c
AM
3577 if (stub_name == NULL)
3578 return stub_name;
3579
bcaa2f82
AM
3580 len = sprintf (stub_name, "%08x.%s+%x",
3581 input_section->id & 0xffffffff,
3582 h->elf.root.root.string,
3583 (int) rel->r_addend & 0xffffffff);
721956f4
AM
3584 }
3585 else
3586 {
ad8e1ba5 3587 len = 8 + 1 + 8 + 1 + 8 + 1 + 8 + 1;
721956f4 3588 stub_name = bfd_malloc (len);
46de2a7c
AM
3589 if (stub_name == NULL)
3590 return stub_name;
3591
bcaa2f82
AM
3592 len = sprintf (stub_name, "%08x.%x:%x+%x",
3593 input_section->id & 0xffffffff,
3594 sym_sec->id & 0xffffffff,
3595 (int) ELF64_R_SYM (rel->r_info) & 0xffffffff,
3596 (int) rel->r_addend & 0xffffffff);
721956f4 3597 }
bcaa2f82 3598 if (len > 2 && stub_name[len - 2] == '+' && stub_name[len - 1] == '0')
ee75fd95 3599 stub_name[len - 2] = 0;
721956f4
AM
3600 return stub_name;
3601}
3602
3603/* Look up an entry in the stub hash. Stub entries are cached because
3604 creating the stub name takes a bit of time. */
3605
3606static struct ppc_stub_hash_entry *
4ce794b7
AM
3607ppc_get_stub_entry (const asection *input_section,
3608 const asection *sym_sec,
039b3fef 3609 struct ppc_link_hash_entry *h,
4ce794b7
AM
3610 const Elf_Internal_Rela *rel,
3611 struct ppc_link_hash_table *htab)
721956f4
AM
3612{
3613 struct ppc_stub_hash_entry *stub_entry;
6f20ed8a 3614 struct map_stub *group;
721956f4
AM
3615
3616 /* If this input section is part of a group of sections sharing one
3617 stub section, then use the id of the first section in the group.
3618 Stub names need to include a section id, as there may well be
3619 more than one stub used to reach say, printf, and we need to
3620 distinguish between them. */
6f20ed8a 3621 group = htab->sec_info[input_section->id].u.group;
89d77b8a
AM
3622 if (group == NULL)
3623 return NULL;
721956f4 3624
b3fac117
AM
3625 if (h != NULL && h->u.stub_cache != NULL
3626 && h->u.stub_cache->h == h
6f20ed8a 3627 && h->u.stub_cache->group == group)
721956f4 3628 {
b3fac117 3629 stub_entry = h->u.stub_cache;
721956f4
AM
3630 }
3631 else
3632 {
3633 char *stub_name;
3634
6f20ed8a 3635 stub_name = ppc_stub_name (group->link_sec, sym_sec, h, rel);
721956f4
AM
3636 if (stub_name == NULL)
3637 return NULL;
3638
3639 stub_entry = ppc_stub_hash_lookup (&htab->stub_hash_table,
b34976b6 3640 stub_name, FALSE, FALSE);
721956f4 3641 if (h != NULL)
b3fac117 3642 h->u.stub_cache = stub_entry;
721956f4
AM
3643
3644 free (stub_name);
3645 }
3646
3647 return stub_entry;
3648}
3649
3650/* Add a new stub entry to the stub hash. Not all fields of the new
3651 stub entry are initialised. */
3652
3653static struct ppc_stub_hash_entry *
4ce794b7
AM
3654ppc_add_stub (const char *stub_name,
3655 asection *section,
25f53a85 3656 struct bfd_link_info *info)
721956f4 3657{
25f53a85 3658 struct ppc_link_hash_table *htab = ppc_hash_table (info);
6f20ed8a 3659 struct map_stub *group;
721956f4
AM
3660 asection *link_sec;
3661 asection *stub_sec;
3662 struct ppc_stub_hash_entry *stub_entry;
3663
6f20ed8a
AM
3664 group = htab->sec_info[section->id].u.group;
3665 link_sec = group->link_sec;
3666 stub_sec = group->stub_sec;
721956f4
AM
3667 if (stub_sec == NULL)
3668 {
6f20ed8a
AM
3669 size_t namelen;
3670 bfd_size_type len;
3671 char *s_name;
721956f4 3672
6f20ed8a
AM
3673 namelen = strlen (link_sec->name);
3674 len = namelen + sizeof (STUB_SUFFIX);
3675 s_name = bfd_alloc (htab->params->stub_bfd, len);
3676 if (s_name == NULL)
3677 return NULL;
721956f4 3678
6f20ed8a
AM
3679 memcpy (s_name, link_sec->name, namelen);
3680 memcpy (s_name + namelen, STUB_SUFFIX, sizeof (STUB_SUFFIX));
3681 stub_sec = (*htab->params->add_stub_section) (s_name, link_sec);
3682 if (stub_sec == NULL)
3683 return NULL;
3684 group->stub_sec = stub_sec;
721956f4
AM
3685 }
3686
3687 /* Enter this entry into the linker stub hash table. */
3688 stub_entry = ppc_stub_hash_lookup (&htab->stub_hash_table, stub_name,
b34976b6 3689 TRUE, FALSE);
721956f4
AM
3690 if (stub_entry == NULL)
3691 {
695344c0 3692 /* xgettext:c-format */
cf97bcb0
AM
3693 _bfd_error_handler (_("%pB: cannot create stub entry %s"),
3694 section->owner, stub_name);
721956f4
AM
3695 return NULL;
3696 }
3697
6f20ed8a 3698 stub_entry->group = group;
721956f4 3699 stub_entry->stub_offset = 0;
721956f4
AM
3700 return stub_entry;
3701}
3702
e717da7e
AM
3703/* Create .got and .rela.got sections in ABFD, and .got in dynobj if
3704 not already done. */
65f38f15 3705
b34976b6 3706static bfd_boolean
e717da7e 3707create_got_section (bfd *abfd, struct bfd_link_info *info)
65f38f15 3708{
e717da7e
AM
3709 asection *got, *relgot;
3710 flagword flags;
3711 struct ppc_link_hash_table *htab = ppc_hash_table (info);
65f38f15 3712
0c8d6e5c 3713 if (!is_ppc64_elf (abfd))
0ffa91dd 3714 return FALSE;
4dfe6ac6
NC
3715 if (htab == NULL)
3716 return FALSE;
0ffa91dd 3717
33e44f2e
AM
3718 if (!htab->elf.sgot
3719 && !_bfd_elf_create_got_section (htab->elf.dynobj, info))
3720 return FALSE;
e717da7e
AM
3721
3722 flags = (SEC_ALLOC | SEC_LOAD | SEC_HAS_CONTENTS | SEC_IN_MEMORY
3723 | SEC_LINKER_CREATED);
3724
c456f082 3725 got = bfd_make_section_anyway_with_flags (abfd, ".got", flags);
e717da7e 3726 if (!got
e717da7e
AM
3727 || !bfd_set_section_alignment (abfd, got, 3))
3728 return FALSE;
65f38f15 3729
c456f082
AM
3730 relgot = bfd_make_section_anyway_with_flags (abfd, ".rela.got",
3731 flags | SEC_READONLY);
e717da7e 3732 if (!relgot
2cdcc330 3733 || !bfd_set_section_alignment (abfd, relgot, 3))
b34976b6 3734 return FALSE;
e717da7e
AM
3735
3736 ppc64_elf_tdata (abfd)->got = got;
3737 ppc64_elf_tdata (abfd)->relgot = relgot;
b34976b6 3738 return TRUE;
65f38f15 3739}
5bd4f169 3740
b31867b6
AM
3741/* Follow indirect and warning symbol links. */
3742
3743static inline struct bfd_link_hash_entry *
3744follow_link (struct bfd_link_hash_entry *h)
3745{
3746 while (h->type == bfd_link_hash_indirect
3747 || h->type == bfd_link_hash_warning)
3748 h = h->u.i.link;
3749 return h;
3750}
3751
3752static inline struct elf_link_hash_entry *
3753elf_follow_link (struct elf_link_hash_entry *h)
3754{
3755 return (struct elf_link_hash_entry *) follow_link (&h->root);
3756}
3757
3758static inline struct ppc_link_hash_entry *
3759ppc_follow_link (struct ppc_link_hash_entry *h)
3760{
3761 return (struct ppc_link_hash_entry *) follow_link (&h->elf.root);
3762}
3763
40d16e0b
AM
3764/* Merge PLT info on FROM with that on TO. */
3765
3766static void
3767move_plt_plist (struct ppc_link_hash_entry *from,
3768 struct ppc_link_hash_entry *to)
3769{
3770 if (from->elf.plt.plist != NULL)
3771 {
3772 if (to->elf.plt.plist != NULL)
3773 {
3774 struct plt_entry **entp;
3775 struct plt_entry *ent;
3776
3777 for (entp = &from->elf.plt.plist; (ent = *entp) != NULL; )
3778 {
3779 struct plt_entry *dent;
3780
3781 for (dent = to->elf.plt.plist; dent != NULL; dent = dent->next)
3782 if (dent->addend == ent->addend)
3783 {
3784 dent->plt.refcount += ent->plt.refcount;
3785 *entp = ent->next;
3786 break;
3787 }
3788 if (dent == NULL)
3789 entp = &ent->next;
3790 }
3791 *entp = to->elf.plt.plist;
3792 }
3793
3794 to->elf.plt.plist = from->elf.plt.plist;
3795 from->elf.plt.plist = NULL;
3796 }
3797}
3798
65f38f15
AM
3799/* Copy the extra info we tack onto an elf_link_hash_entry. */
3800
3801static void
fcfa13d2
AM
3802ppc64_elf_copy_indirect_symbol (struct bfd_link_info *info,
3803 struct elf_link_hash_entry *dir,
3804 struct elf_link_hash_entry *ind)
65f38f15
AM
3805{
3806 struct ppc_link_hash_entry *edir, *eind;
3807
3808 edir = (struct ppc_link_hash_entry *) dir;
3809 eind = (struct ppc_link_hash_entry *) ind;
3810
c79d6685
AM
3811 edir->is_func |= eind->is_func;
3812 edir->is_func_descriptor |= eind->is_func_descriptor;
3813 edir->tls_mask |= eind->tls_mask;
3814 if (eind->oh != NULL)
3815 edir->oh = ppc_follow_link (eind->oh);
3816
474436e6 3817 if (edir->elf.versioned != versioned_hidden)
e81830c5
AM
3818 edir->elf.ref_dynamic |= eind->elf.ref_dynamic;
3819 edir->elf.ref_regular |= eind->elf.ref_regular;
3820 edir->elf.ref_regular_nonweak |= eind->elf.ref_regular_nonweak;
4a7e5234 3821 edir->elf.non_got_ref |= eind->elf.non_got_ref;
e81830c5
AM
3822 edir->elf.needs_plt |= eind->elf.needs_plt;
3823 edir->elf.pointer_equality_needed |= eind->elf.pointer_equality_needed;
c79d6685 3824
d311bc8b
AM
3825 /* If we were called to copy over info for a weak sym, don't copy
3826 dyn_relocs, plt/got info, or dynindx. We used to copy dyn_relocs
3827 in order to simplify readonly_dynrelocs and save a field in the
3828 symbol hash entry, but that means dyn_relocs can't be used in any
3829 tests about a specific symbol, or affect other symbol flags which
ab2477e1 3830 are then tested. */
d311bc8b 3831 if (eind->elf.root.type != bfd_link_hash_indirect)
ab2477e1 3832 return;
d311bc8b 3833
411e1bfb 3834 /* Copy over any dynamic relocs we may have on the indirect sym. */
bbd7ec4a 3835 if (eind->dyn_relocs != NULL)
65f38f15 3836 {
bbd7ec4a
AM
3837 if (edir->dyn_relocs != NULL)
3838 {
6061a67d
AM
3839 struct elf_dyn_relocs **pp;
3840 struct elf_dyn_relocs *p;
bbd7ec4a 3841
fcfa13d2 3842 /* Add reloc counts against the indirect sym to the direct sym
bbd7ec4a
AM
3843 list. Merge any entries against the same section. */
3844 for (pp = &eind->dyn_relocs; (p = *pp) != NULL; )
3845 {
6061a67d 3846 struct elf_dyn_relocs *q;
bbd7ec4a
AM
3847
3848 for (q = edir->dyn_relocs; q != NULL; q = q->next)
3849 if (q->sec == p->sec)
3850 {
3851 q->pc_count += p->pc_count;
3852 q->count += p->count;
3853 *pp = p->next;
3854 break;
3855 }
3856 if (q == NULL)
3857 pp = &p->next;
3858 }
3859 *pp = edir->dyn_relocs;
3860 }
3861
65f38f15
AM
3862 edir->dyn_relocs = eind->dyn_relocs;
3863 eind->dyn_relocs = NULL;
3864 }
65f38f15 3865
81848ca0
AM
3866 /* Copy over got entries that we may have already seen to the
3867 symbol which just became indirect. */
411e1bfb
AM
3868 if (eind->elf.got.glist != NULL)
3869 {
3870 if (edir->elf.got.glist != NULL)
3871 {
3872 struct got_entry **entp;
3873 struct got_entry *ent;
3874
3875 for (entp = &eind->elf.got.glist; (ent = *entp) != NULL; )
3876 {
3877 struct got_entry *dent;
3878
3879 for (dent = edir->elf.got.glist; dent != NULL; dent = dent->next)
3880 if (dent->addend == ent->addend
e717da7e 3881 && dent->owner == ent->owner
411e1bfb
AM
3882 && dent->tls_type == ent->tls_type)
3883 {
3884 dent->got.refcount += ent->got.refcount;
3885 *entp = ent->next;
3886 break;
3887 }
3888 if (dent == NULL)
3889 entp = &ent->next;
3890 }
3891 *entp = edir->elf.got.glist;
3892 }
3893
3894 edir->elf.got.glist = eind->elf.got.glist;
3895 eind->elf.got.glist = NULL;
3896 }
3897
3898 /* And plt entries. */
40d16e0b 3899 move_plt_plist (eind, edir);
411e1bfb 3900
fcfa13d2 3901 if (eind->elf.dynindx != -1)
411e1bfb 3902 {
fcfa13d2
AM
3903 if (edir->elf.dynindx != -1)
3904 _bfd_elf_strtab_delref (elf_hash_table (info)->dynstr,
3905 edir->elf.dynstr_index);
411e1bfb
AM
3906 edir->elf.dynindx = eind->elf.dynindx;
3907 edir->elf.dynstr_index = eind->elf.dynstr_index;
3908 eind->elf.dynindx = -1;
3909 eind->elf.dynstr_index = 0;
3910 }
411e1bfb
AM
3911}
3912
8387904d
AM
3913/* Find the function descriptor hash entry from the given function code
3914 hash entry FH. Link the entries via their OH fields. */
3915
3916static struct ppc_link_hash_entry *
b31867b6 3917lookup_fdh (struct ppc_link_hash_entry *fh, struct ppc_link_hash_table *htab)
8387904d
AM
3918{
3919 struct ppc_link_hash_entry *fdh = fh->oh;
3920
3921 if (fdh == NULL)
3922 {
3923 const char *fd_name = fh->elf.root.root.string + 1;
3924
3925 fdh = (struct ppc_link_hash_entry *)
3926 elf_link_hash_lookup (&htab->elf, fd_name, FALSE, FALSE, FALSE);
b31867b6
AM
3927 if (fdh == NULL)
3928 return fdh;
3929
3930 fdh->is_func_descriptor = 1;
3931 fdh->oh = fh;
3932 fh->is_func = 1;
3933 fh->oh = fdh;
8387904d
AM
3934 }
3935
8c5b4e52
AM
3936 fdh = ppc_follow_link (fdh);
3937 fdh->is_func_descriptor = 1;
3938 fdh->oh = fh;
3939 return fdh;
8387904d
AM
3940}
3941
8c5b4e52 3942/* Make a fake function descriptor sym for the undefined code sym FH. */
bb700d78
AM
3943
3944static struct ppc_link_hash_entry *
3945make_fdh (struct bfd_link_info *info,
908b32fc 3946 struct ppc_link_hash_entry *fh)
bb700d78 3947{
8c5b4e52
AM
3948 bfd *abfd = fh->elf.root.u.undef.abfd;
3949 struct bfd_link_hash_entry *bh = NULL;
bb700d78 3950 struct ppc_link_hash_entry *fdh;
8c5b4e52
AM
3951 flagword flags = (fh->elf.root.type == bfd_link_hash_undefweak
3952 ? BSF_WEAK
3953 : BSF_GLOBAL);
3954
3955 if (!_bfd_generic_link_add_one_symbol (info, abfd,
3956 fh->elf.root.root.string + 1,
3957 flags, bfd_und_section_ptr, 0,
3958 NULL, FALSE, FALSE, &bh))
bb700d78
AM
3959 return NULL;
3960
3961 fdh = (struct ppc_link_hash_entry *) bh;
3962 fdh->elf.non_elf = 0;
908b32fc
AM
3963 fdh->fake = 1;
3964 fdh->is_func_descriptor = 1;
3965 fdh->oh = fh;
3966 fh->is_func = 1;
3967 fh->oh = fdh;
bb700d78
AM
3968 return fdh;
3969}
3970
8387904d
AM
3971/* Fix function descriptor symbols defined in .opd sections to be
3972 function type. */
555cd476
AM
3973
3974static bfd_boolean
c16153ae 3975ppc64_elf_add_symbol_hook (bfd *ibfd,
e054468f 3976 struct bfd_link_info *info,
555cd476 3977 Elf_Internal_Sym *isym,
6911b7dc 3978 const char **name,
555cd476
AM
3979 flagword *flags ATTRIBUTE_UNUSED,
3980 asection **sec,
b53dfeb2 3981 bfd_vma *value)
555cd476 3982{
b53dfeb2 3983 if (*sec != NULL
f1885d1e 3984 && strcmp ((*sec)->name, ".opd") == 0)
b53dfeb2
AM
3985 {
3986 asection *code_sec;
3987
3988 if (!(ELF_ST_TYPE (isym->st_info) == STT_GNU_IFUNC
3989 || ELF_ST_TYPE (isym->st_info) == STT_FUNC))
3990 isym->st_info = ELF_ST_INFO (ELF_ST_BIND (isym->st_info), STT_FUNC);
3991
3992 /* If the symbol is a function defined in .opd, and the function
3993 code is in a discarded group, let it appear to be undefined. */
0e1862bb 3994 if (!bfd_link_relocatable (info)
b53dfeb2
AM
3995 && (*sec)->reloc_count != 0
3996 && opd_entry_value (*sec, *value, &code_sec, NULL,
3997 FALSE) != (bfd_vma) -1
3998 && discarded_section (code_sec))
3999 {
4000 *sec = bfd_und_section_ptr;
4001 isym->st_shndx = SHN_UNDEF;
4002 }
4003 }
dbd1e97e
AM
4004 else if (*sec != NULL
4005 && strcmp ((*sec)->name, ".toc") == 0
4006 && ELF_ST_TYPE (isym->st_info) == STT_OBJECT)
4007 {
4008 struct ppc_link_hash_table *htab = ppc_hash_table (info);
4009 if (htab != NULL)
4010 htab->params->object_in_toc = 1;
4011 }
433817dd 4012
6911b7dc
AM
4013 if ((STO_PPC64_LOCAL_MASK & isym->st_other) != 0)
4014 {
4015 if (abiversion (ibfd) == 0)
4016 set_abiversion (ibfd, 2);
4017 else if (abiversion (ibfd) == 1)
4018 {
cf97bcb0
AM
4019 _bfd_error_handler (_("symbol '%s' has invalid st_other"
4020 " for ABI version 1"), *name);
6911b7dc
AM
4021 bfd_set_error (bfd_error_bad_value);
4022 return FALSE;
4023 }
4024 }
4025
555cd476
AM
4026 return TRUE;
4027}
4028
6911b7dc
AM
4029/* Merge non-visibility st_other attributes: local entry point. */
4030
4031static void
4032ppc64_elf_merge_symbol_attribute (struct elf_link_hash_entry *h,
4033 const Elf_Internal_Sym *isym,
4034 bfd_boolean definition,
4035 bfd_boolean dynamic)
4036{
f378ab09 4037 if (definition && (!dynamic || !h->def_regular))
6911b7dc
AM
4038 h->other = ((isym->st_other & ~ELF_ST_VISIBILITY (-1))
4039 | ELF_ST_VISIBILITY (h->other));
4040}
4041
8c5b4e52
AM
4042/* Hook called on merging a symbol. We use this to clear "fake" since
4043 we now have a real symbol. */
4044
4045static bfd_boolean
4046ppc64_elf_merge_symbol (struct elf_link_hash_entry *h,
8b5f1ed8 4047 const Elf_Internal_Sym *isym,
8c5b4e52
AM
4048 asection **psec ATTRIBUTE_UNUSED,
4049 bfd_boolean newdef ATTRIBUTE_UNUSED,
4050 bfd_boolean olddef ATTRIBUTE_UNUSED,
4051 bfd *oldbfd ATTRIBUTE_UNUSED,
4052 const asection *oldsec ATTRIBUTE_UNUSED)
4053{
4054 ((struct ppc_link_hash_entry *) h)->fake = 0;
8b5f1ed8
AM
4055 if ((STO_PPC64_LOCAL_MASK & isym->st_other) != 0)
4056 ((struct ppc_link_hash_entry *) h)->non_zero_localentry = 1;
8c5b4e52
AM
4057 return TRUE;
4058}
4059
8387904d 4060/* This function makes an old ABI object reference to ".bar" cause the
908b32fc
AM
4061 inclusion of a new ABI object archive that defines "bar".
4062 NAME is a symbol defined in an archive. Return a symbol in the hash
4063 table that might be satisfied by the archive symbols. */
8387904d
AM
4064
4065static struct elf_link_hash_entry *
4066ppc64_elf_archive_symbol_lookup (bfd *abfd,
4067 struct bfd_link_info *info,
4068 const char *name)
4069{
4070 struct elf_link_hash_entry *h;
4071 char *dot_name;
4072 size_t len;
4073
4074 h = _bfd_elf_archive_symbol_lookup (abfd, info, name);
908b32fc
AM
4075 if (h != NULL
4076 /* Don't return this sym if it is a fake function descriptor
4077 created by add_symbol_adjust. */
8c5b4e52 4078 && !((struct ppc_link_hash_entry *) h)->fake)
8387904d
AM
4079 return h;
4080
4081 if (name[0] == '.')
4082 return h;
4083
4084 len = strlen (name);
4085 dot_name = bfd_alloc (abfd, len + 2);
4086 if (dot_name == NULL)
e99955cd 4087 return (struct elf_link_hash_entry *) -1;
8387904d
AM
4088 dot_name[0] = '.';
4089 memcpy (dot_name + 1, name, len + 1);
4090 h = _bfd_elf_archive_symbol_lookup (abfd, info, dot_name);
4091 bfd_release (abfd, dot_name);
4092 return h;
4093}
4094
4095/* This function satisfies all old ABI object references to ".bar" if a
99877b66
AM
4096 new ABI object defines "bar". Well, at least, undefined dot symbols
4097 are made weak. This stops later archive searches from including an
4098 object if we already have a function descriptor definition. It also
35b0ce59
AM
4099 prevents the linker complaining about undefined symbols.
4100 We also check and correct mismatched symbol visibility here. The
4101 most restrictive visibility of the function descriptor and the
4102 function entry symbol is used. */
8387904d
AM
4103
4104static bfd_boolean
b3fac117 4105add_symbol_adjust (struct ppc_link_hash_entry *eh, struct bfd_link_info *info)
8387904d 4106{
8387904d
AM
4107 struct ppc_link_hash_table *htab;
4108 struct ppc_link_hash_entry *fdh;
4109
b3fac117
AM
4110 if (eh->elf.root.type == bfd_link_hash_warning)
4111 eh = (struct ppc_link_hash_entry *) eh->elf.root.u.i.link;
8387904d 4112
8400d40d
AM
4113 if (eh->elf.root.type == bfd_link_hash_indirect)
4114 return TRUE;
4115
b3fac117
AM
4116 if (eh->elf.root.root.string[0] != '.')
4117 abort ();
8387904d 4118
b3fac117 4119 htab = ppc_hash_table (info);
4dfe6ac6
NC
4120 if (htab == NULL)
4121 return FALSE;
4122
b31867b6 4123 fdh = lookup_fdh (eh, htab);
8c5b4e52
AM
4124 if (fdh == NULL
4125 && !bfd_link_relocatable (info)
4126 && (eh->elf.root.type == bfd_link_hash_undefined
4127 || eh->elf.root.type == bfd_link_hash_undefweak)
4128 && eh->elf.ref_regular)
4129 {
4130 /* Make an undefined function descriptor sym, in order to
4131 pull in an --as-needed shared lib. Archives are handled
4132 elsewhere. */
4133 fdh = make_fdh (info, eh);
4134 if (fdh == NULL)
4135 return FALSE;
bb700d78 4136 }
8c5b4e52
AM
4137
4138 if (fdh != NULL)
8387904d 4139 {
35b0ce59
AM
4140 unsigned entry_vis = ELF_ST_VISIBILITY (eh->elf.other) - 1;
4141 unsigned descr_vis = ELF_ST_VISIBILITY (fdh->elf.other) - 1;
8c5b4e52
AM
4142
4143 /* Make both descriptor and entry symbol have the most
4144 constraining visibility of either symbol. */
35b0ce59
AM
4145 if (entry_vis < descr_vis)
4146 fdh->elf.other += entry_vis - descr_vis;
4147 else if (entry_vis > descr_vis)
4148 eh->elf.other += descr_vis - entry_vis;
4149
8c5b4e52
AM
4150 /* Propagate reference flags from entry symbol to function
4151 descriptor symbol. */
bc4e12de 4152 fdh->elf.root.non_ir_ref_regular |= eh->elf.root.non_ir_ref_regular;
4070765b 4153 fdh->elf.root.non_ir_ref_dynamic |= eh->elf.root.non_ir_ref_dynamic;
8c5b4e52
AM
4154 fdh->elf.ref_regular |= eh->elf.ref_regular;
4155 fdh->elf.ref_regular_nonweak |= eh->elf.ref_regular_nonweak;
4156
4157 if (!fdh->elf.forced_local
4158 && fdh->elf.dynindx == -1
4159 && fdh->elf.versioned != versioned_hidden
4160 && (bfd_link_dll (info)
4161 || fdh->elf.def_dynamic
4162 || fdh->elf.ref_dynamic)
4163 && (eh->elf.ref_regular
4164 || eh->elf.def_regular))
4165 {
2cdcc330 4166 if (!bfd_elf_link_record_dynamic_symbol (info, &fdh->elf))
8c5b4e52 4167 return FALSE;
35b0ce59 4168 }
8387904d 4169 }
99877b66 4170
8387904d
AM
4171 return TRUE;
4172}
4173
f6c7c3e8
AM
4174/* Set up opd section info and abiversion for IBFD, and process list
4175 of dot-symbols we made in link_hash_newfunc. */
b3fac117 4176
8387904d 4177static bfd_boolean
f6c7c3e8 4178ppc64_elf_before_check_relocs (bfd *ibfd, struct bfd_link_info *info)
8387904d 4179{
99877b66 4180 struct ppc_link_hash_table *htab;
b3fac117 4181 struct ppc_link_hash_entry **p, *eh;
459609d6 4182 asection *opd = bfd_get_section_by_name (ibfd, ".opd");
433817dd 4183
459609d6 4184 if (opd != NULL && opd->size != 0)
b3fac117 4185 {
b9399fcf
AM
4186 BFD_ASSERT (ppc64_elf_section_data (opd)->sec_type == sec_normal);
4187 ppc64_elf_section_data (opd)->sec_type = sec_opd;
4188
459609d6
AM
4189 if (abiversion (ibfd) == 0)
4190 set_abiversion (ibfd, 1);
8a2058b5 4191 else if (abiversion (ibfd) >= 2)
f6c7c3e8 4192 {
695344c0 4193 /* xgettext:c-format */
cf97bcb0
AM
4194 _bfd_error_handler (_("%pB .opd not allowed in ABI version %d"),
4195 ibfd, abiversion (ibfd));
459609d6
AM
4196 bfd_set_error (bfd_error_bad_value);
4197 return FALSE;
f6c7c3e8 4198 }
b9399fcf 4199 }
f6c7c3e8 4200
b9399fcf
AM
4201 if (is_ppc64_elf (info->output_bfd))
4202 {
4203 /* For input files without an explicit abiversion in e_flags
4204 we should have flagged any with symbol st_other bits set
4205 as ELFv1 and above flagged those with .opd as ELFv2.
4206 Set the output abiversion if not yet set, and for any input
4207 still ambiguous, take its abiversion from the output.
4208 Differences in ABI are reported later. */
4209 if (abiversion (info->output_bfd) == 0)
4210 set_abiversion (info->output_bfd, abiversion (ibfd));
4211 else if (abiversion (ibfd) == 0)
4212 set_abiversion (ibfd, abiversion (info->output_bfd));
b3fac117
AM
4213 }
4214
459609d6
AM
4215 htab = ppc_hash_table (info);
4216 if (htab == NULL)
b9399fcf 4217 return TRUE;
459609d6 4218
b9399fcf
AM
4219 if (opd != NULL && opd->size != 0
4220 && (ibfd->flags & DYNAMIC) == 0
4221 && (opd->flags & SEC_RELOC) != 0
4222 && opd->reloc_count != 0
4223 && !bfd_is_abs_section (opd->output_section)
4224 && info->gc_sections)
4225 {
4226 /* Garbage collection needs some extra help with .opd sections.
4227 We don't want to necessarily keep everything referenced by
4228 relocs in .opd, as that would keep all functions. Instead,
4229 if we reference an .opd symbol (a function descriptor), we
4230 want to keep the function code symbol's section. This is
4231 easy for global symbols, but for local syms we need to keep
4232 information about the associated function section. */
4233 bfd_size_type amt;
4234 asection **opd_sym_map;
4235 Elf_Internal_Shdr *symtab_hdr;
4236 Elf_Internal_Rela *relocs, *rel_end, *rel;
4237
4238 amt = OPD_NDX (opd->size) * sizeof (*opd_sym_map);
4239 opd_sym_map = bfd_zalloc (ibfd, amt);
4240 if (opd_sym_map == NULL)
4241 return FALSE;
4242 ppc64_elf_section_data (opd)->u.opd.func_sec = opd_sym_map;
4243 relocs = _bfd_elf_link_read_relocs (ibfd, opd, NULL, NULL,
4244 info->keep_memory);
4245 if (relocs == NULL)
4246 return FALSE;
4247 symtab_hdr = &elf_symtab_hdr (ibfd);
4248 rel_end = relocs + opd->reloc_count - 1;
4249 for (rel = relocs; rel < rel_end; rel++)
4250 {
4251 enum elf_ppc64_reloc_type r_type = ELF64_R_TYPE (rel->r_info);
4252 unsigned long r_symndx = ELF64_R_SYM (rel->r_info);
4253
4254 if (r_type == R_PPC64_ADDR64
4255 && ELF64_R_TYPE ((rel + 1)->r_info) == R_PPC64_TOC
4256 && r_symndx < symtab_hdr->sh_info)
4257 {
4258 Elf_Internal_Sym *isym;
4259 asection *s;
4260
4261 isym = bfd_sym_from_r_symndx (&htab->sym_cache, ibfd, r_symndx);
4262 if (isym == NULL)
4263 {
4264 if (elf_section_data (opd)->relocs != relocs)
4265 free (relocs);
4266 return FALSE;
4267 }
4268
4269 s = bfd_section_from_elf_index (ibfd, isym->st_shndx);
4270 if (s != NULL && s != opd)
4271 opd_sym_map[OPD_NDX (rel->r_offset)] = s;
4272 }
4273 }
4274 if (elf_section_data (opd)->relocs != relocs)
4275 free (relocs);
4276 }
459609d6
AM
4277
4278 p = &htab->dot_syms;
4279 while ((eh = *p) != NULL)
4280 {
4281 *p = NULL;
4282 if (&eh->elf == htab->elf.hgot)
4283 ;
4284 else if (htab->elf.hgot == NULL
4285 && strcmp (eh->elf.root.root.string, ".TOC.") == 0)
4286 htab->elf.hgot = &eh->elf;
8c5b4e52
AM
4287 else if (abiversion (ibfd) <= 1)
4288 {
4289 htab->need_func_desc_adj = 1;
4290 if (!add_symbol_adjust (eh, info))
4291 return FALSE;
4292 }
459609d6
AM
4293 p = &eh->u.next_dot_sym;
4294 }
b3fac117 4295 return TRUE;
8387904d
AM
4296}
4297
97fed1c9
JJ
4298/* Undo hash table changes when an --as-needed input file is determined
4299 not to be needed. */
4300
4301static bfd_boolean
e5034e59
AM
4302ppc64_elf_notice_as_needed (bfd *ibfd,
4303 struct bfd_link_info *info,
4304 enum notice_asneeded_action act)
97fed1c9 4305{
e5034e59
AM
4306 if (act == notice_not_needed)
4307 {
4308 struct ppc_link_hash_table *htab = ppc_hash_table (info);
4dfe6ac6 4309
e5034e59
AM
4310 if (htab == NULL)
4311 return FALSE;
4dfe6ac6 4312
e5034e59
AM
4313 htab->dot_syms = NULL;
4314 }
4315 return _bfd_elf_notice_as_needed (ibfd, info, act);
97fed1c9
JJ
4316}
4317
aa374f67
AM
4318/* If --just-symbols against a final linked binary, then assume we need
4319 toc adjusting stubs when calling functions defined there. */
4320
4321static void
4322ppc64_elf_link_just_syms (asection *sec, struct bfd_link_info *info)
4323{
4324 if ((sec->flags & SEC_CODE) != 0
4325 && (sec->owner->flags & (EXEC_P | DYNAMIC)) != 0
4326 && is_ppc64_elf (sec->owner))
4327 {
2c3f079f
AM
4328 if (abiversion (sec->owner) >= 2
4329 || bfd_get_section_by_name (sec->owner, ".opd") != NULL)
aa374f67
AM
4330 sec->has_toc_reloc = 1;
4331 }
4332 _bfd_elf_link_just_syms (sec, info);
4333}
4334
e054468f 4335static struct plt_entry **
4ce794b7
AM
4336update_local_sym_info (bfd *abfd, Elf_Internal_Shdr *symtab_hdr,
4337 unsigned long r_symndx, bfd_vma r_addend, int tls_type)
411e1bfb
AM
4338{
4339 struct got_entry **local_got_ents = elf_local_got_ents (abfd);
e054468f 4340 struct plt_entry **local_plt;
f961d9dd 4341 unsigned char *local_got_tls_masks;
411e1bfb
AM
4342
4343 if (local_got_ents == NULL)
4344 {
4345 bfd_size_type size = symtab_hdr->sh_info;
4346
e054468f
AM
4347 size *= (sizeof (*local_got_ents)
4348 + sizeof (*local_plt)
4349 + sizeof (*local_got_tls_masks));
4ce794b7 4350 local_got_ents = bfd_zalloc (abfd, size);
411e1bfb 4351 if (local_got_ents == NULL)
e054468f 4352 return NULL;
411e1bfb
AM
4353 elf_local_got_ents (abfd) = local_got_ents;
4354 }
4355
37da22e5 4356 if ((tls_type & (NON_GOT | TLS_EXPLICIT)) == 0)
411e1bfb
AM
4357 {
4358 struct got_entry *ent;
4359
4360 for (ent = local_got_ents[r_symndx]; ent != NULL; ent = ent->next)
e717da7e
AM
4361 if (ent->addend == r_addend
4362 && ent->owner == abfd
4363 && ent->tls_type == tls_type)
411e1bfb
AM
4364 break;
4365 if (ent == NULL)
4366 {
4367 bfd_size_type amt = sizeof (*ent);
4ce794b7 4368 ent = bfd_alloc (abfd, amt);
411e1bfb
AM
4369 if (ent == NULL)
4370 return FALSE;
4371 ent->next = local_got_ents[r_symndx];
4372 ent->addend = r_addend;
e717da7e 4373 ent->owner = abfd;
411e1bfb 4374 ent->tls_type = tls_type;
927be08e 4375 ent->is_indirect = FALSE;
411e1bfb
AM
4376 ent->got.refcount = 0;
4377 local_got_ents[r_symndx] = ent;
4378 }
4379 ent->got.refcount += 1;
4380 }
4381
e054468f 4382 local_plt = (struct plt_entry **) (local_got_ents + symtab_hdr->sh_info);
f961d9dd 4383 local_got_tls_masks = (unsigned char *) (local_plt + symtab_hdr->sh_info);
37da22e5 4384 local_got_tls_masks[r_symndx] |= tls_type & 0xff;
e054468f
AM
4385
4386 return local_plt + r_symndx;
65f38f15
AM
4387}
4388
411e1bfb 4389static bfd_boolean
e054468f 4390update_plt_info (bfd *abfd, struct plt_entry **plist, bfd_vma addend)
1e2f5b6e 4391{
411e1bfb 4392 struct plt_entry *ent;
1e2f5b6e 4393
e054468f 4394 for (ent = *plist; ent != NULL; ent = ent->next)
411e1bfb
AM
4395 if (ent->addend == addend)
4396 break;
4397 if (ent == NULL)
1e2f5b6e 4398 {
411e1bfb 4399 bfd_size_type amt = sizeof (*ent);
4ce794b7 4400 ent = bfd_alloc (abfd, amt);
411e1bfb
AM
4401 if (ent == NULL)
4402 return FALSE;
e054468f 4403 ent->next = *plist;
411e1bfb
AM
4404 ent->addend = addend;
4405 ent->plt.refcount = 0;
e054468f 4406 *plist = ent;
1e2f5b6e 4407 }
411e1bfb 4408 ent->plt.refcount += 1;
b34976b6 4409 return TRUE;
1e2f5b6e
AM
4410}
4411
e054468f
AM
4412static bfd_boolean
4413is_branch_reloc (enum elf_ppc64_reloc_type r_type)
4414{
4415 return (r_type == R_PPC64_REL24
05d0e962 4416 || r_type == R_PPC64_REL24_NOTOC
e054468f
AM
4417 || r_type == R_PPC64_REL14
4418 || r_type == R_PPC64_REL14_BRTAKEN
4419 || r_type == R_PPC64_REL14_BRNTAKEN
4420 || r_type == R_PPC64_ADDR24
4421 || r_type == R_PPC64_ADDR14
4422 || r_type == R_PPC64_ADDR14_BRTAKEN
23cedd1d 4423 || r_type == R_PPC64_ADDR14_BRNTAKEN
5663e321
AM
4424 || r_type == R_PPC64_PLTCALL
4425 || r_type == R_PPC64_PLTCALL_NOTOC);
23cedd1d
AM
4426}
4427
4428/* Relocs on inline plt call sequence insns prior to the call. */
4429
4430static bfd_boolean
4431is_plt_seq_reloc (enum elf_ppc64_reloc_type r_type)
4432{
4433 return (r_type == R_PPC64_PLT16_HA
4434 || r_type == R_PPC64_PLT16_HI
4435 || r_type == R_PPC64_PLT16_LO
4436 || r_type == R_PPC64_PLT16_LO_DS
5663e321
AM
4437 || r_type == R_PPC64_PLT_PCREL34
4438 || r_type == R_PPC64_PLT_PCREL34_NOTOC
4439 || r_type == R_PPC64_PLTSEQ
4440 || r_type == R_PPC64_PLTSEQ_NOTOC);
e054468f
AM
4441}
4442
5bd4f169 4443/* Look through the relocs for a section during the first phase, and
65f38f15 4444 calculate needed space in the global offset table, procedure
5d1634d7 4445 linkage table, and dynamic reloc sections. */
5bd4f169 4446
b34976b6 4447static bfd_boolean
4ce794b7
AM
4448ppc64_elf_check_relocs (bfd *abfd, struct bfd_link_info *info,
4449 asection *sec, const Elf_Internal_Rela *relocs)
5bd4f169 4450{
65f38f15 4451 struct ppc_link_hash_table *htab;
5bd4f169 4452 Elf_Internal_Shdr *symtab_hdr;
c7e2358a 4453 struct elf_link_hash_entry **sym_hashes;
5bd4f169
AM
4454 const Elf_Internal_Rela *rel;
4455 const Elf_Internal_Rela *rel_end;
5bd4f169 4456 asection *sreloc;
3a71aa26 4457 struct elf_link_hash_entry *tga, *dottga;
b9399fcf 4458 bfd_boolean is_opd;
5bd4f169 4459
0e1862bb 4460 if (bfd_link_relocatable (info))
b34976b6 4461 return TRUE;
5bd4f169 4462
680a3378
AM
4463 /* Don't do anything special with non-loaded, non-alloced sections.
4464 In particular, any relocs in such sections should not affect GOT
4465 and PLT reference counting (ie. we don't allow them to create GOT
4466 or PLT entries), there's no possibility or desire to optimize TLS
4467 relocs, and there's not much point in propagating relocs to shared
4468 libs that the dynamic linker won't relocate. */
4469 if ((sec->flags & SEC_ALLOC) == 0)
4470 return TRUE;
4471
0c8d6e5c 4472 BFD_ASSERT (is_ppc64_elf (abfd));
0ffa91dd 4473
65f38f15 4474 htab = ppc_hash_table (info);
4dfe6ac6
NC
4475 if (htab == NULL)
4476 return FALSE;
4477
3a71aa26
AM
4478 tga = elf_link_hash_lookup (&htab->elf, "__tls_get_addr",
4479 FALSE, FALSE, TRUE);
4480 dottga = elf_link_hash_lookup (&htab->elf, ".__tls_get_addr",
4481 FALSE, FALSE, TRUE);
0ffa91dd 4482 symtab_hdr = &elf_symtab_hdr (abfd);
5bd4f169 4483 sym_hashes = elf_sym_hashes (abfd);
5bd4f169 4484 sreloc = NULL;
b9399fcf 4485 is_opd = ppc64_elf_section_data (sec)->sec_type == sec_opd;
5bd4f169
AM
4486 rel_end = relocs + sec->reloc_count;
4487 for (rel = relocs; rel < rel_end; rel++)
4488 {
4489 unsigned long r_symndx;
4490 struct elf_link_hash_entry *h;
04c9666a 4491 enum elf_ppc64_reloc_type r_type;
727fc41e 4492 int tls_type;
7c8fe5c4 4493 struct _ppc64_elf_section_data *ppc64_sec;
cbf95972 4494 struct plt_entry **ifunc, **plt_list;
5663e321 4495 bfd_vma sym_addend;
5bd4f169
AM
4496
4497 r_symndx = ELF64_R_SYM (rel->r_info);
4498 if (r_symndx < symtab_hdr->sh_info)
4499 h = NULL;
4500 else
973a3492
L
4501 {
4502 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
b31867b6 4503 h = elf_follow_link (h);
1c865ab2
AM
4504
4505 if (h == htab->elf.hgot)
4506 sec->has_toc_reloc = 1;
973a3492 4507 }
5bd4f169 4508
727fc41e 4509 tls_type = 0;
e054468f 4510 ifunc = NULL;
5663e321
AM
4511 r_type = ELF64_R_TYPE (rel->r_info);
4512 switch (r_type)
4513 {
04bdff6a
AM
4514 case R_PPC64_D34:
4515 case R_PPC64_D34_LO:
4516 case R_PPC64_D34_HI30:
4517 case R_PPC64_D34_HA30:
4518 case R_PPC64_D28:
4519 htab->powerxx_stubs = 1;
4520 /* Fall through. */
5663e321
AM
4521 default:
4522 /* Somewhat foolishly, because the ABIs don't specifically
4523 allow it, ppc64 gas and ld support GOT and PLT relocs
4524 with non-zero addends where the addend results in
4525 sym+addend being stored in the GOT or PLT entry. This
4526 can't be supported for pcrel relocs because the addend is
4527 used to specify the pcrel offset. */
4528 sym_addend = rel->r_addend;
4529 break;
04bdff6a
AM
4530
4531 case R_PPC64_PCREL34:
5663e321
AM
4532 case R_PPC64_GOT_PCREL34:
4533 case R_PPC64_PLT_PCREL34:
4534 case R_PPC64_PLT_PCREL34_NOTOC:
04bdff6a
AM
4535 case R_PPC64_PCREL28:
4536 htab->powerxx_stubs = 1;
5663e321
AM
4537 sym_addend = 0;
4538 break;
4539 }
25f23106
AM
4540 if (h != NULL)
4541 {
4542 if (h->type == STT_GNU_IFUNC)
4543 {
4544 h->needs_plt = 1;
4545 ifunc = &h->plt.plist;
4546 }
4547 }
4548 else
4549 {
4550 Elf_Internal_Sym *isym = bfd_sym_from_r_symndx (&htab->sym_cache,
4551 abfd, r_symndx);
4552 if (isym == NULL)
4553 return FALSE;
4554
4555 if (ELF_ST_TYPE (isym->st_info) == STT_GNU_IFUNC)
4556 {
4557 ifunc = update_local_sym_info (abfd, symtab_hdr, r_symndx,
5663e321 4558 sym_addend,
37da22e5 4559 NON_GOT | PLT_IFUNC);
25f23106
AM
4560 if (ifunc == NULL)
4561 return FALSE;
4562 }
4563 }
727fc41e 4564
a33d1f77 4565 switch (r_type)
5bd4f169 4566 {
727fc41e
AM
4567 case R_PPC64_TLSGD:
4568 case R_PPC64_TLSLD:
4569 /* These special tls relocs tie a call to __tls_get_addr with
4570 its parameter symbol. */
37da22e5
AM
4571 if (h != NULL)
4572 ((struct ppc_link_hash_entry *) h)->tls_mask |= TLS_TLS | TLS_MARK;
4573 else
4574 if (!update_local_sym_info (abfd, symtab_hdr, r_symndx,
5663e321 4575 sym_addend,
37da22e5
AM
4576 NON_GOT | TLS_TLS | TLS_MARK))
4577 return FALSE;
4578 sec->has_tls_reloc = 1;
727fc41e
AM
4579 break;
4580
411e1bfb
AM
4581 case R_PPC64_GOT_TLSLD16:
4582 case R_PPC64_GOT_TLSLD16_LO:
4583 case R_PPC64_GOT_TLSLD16_HI:
4584 case R_PPC64_GOT_TLSLD16_HA:
951fd09b 4585 tls_type = TLS_TLS | TLS_LD;
411e1bfb
AM
4586 goto dogottls;
4587
4588 case R_PPC64_GOT_TLSGD16:
4589 case R_PPC64_GOT_TLSGD16_LO:
4590 case R_PPC64_GOT_TLSGD16_HI:
4591 case R_PPC64_GOT_TLSGD16_HA:
951fd09b 4592 tls_type = TLS_TLS | TLS_GD;
411e1bfb
AM
4593 goto dogottls;
4594
4595 case R_PPC64_GOT_TPREL16_DS:
4596 case R_PPC64_GOT_TPREL16_LO_DS:
4597 case R_PPC64_GOT_TPREL16_HI:
4598 case R_PPC64_GOT_TPREL16_HA:
7c8bbca5 4599 if (bfd_link_dll (info))
411e1bfb
AM
4600 info->flags |= DF_STATIC_TLS;
4601 tls_type = TLS_TLS | TLS_TPREL;
4602 goto dogottls;
4603
4604 case R_PPC64_GOT_DTPREL16_DS:
4605 case R_PPC64_GOT_DTPREL16_LO_DS:
4606 case R_PPC64_GOT_DTPREL16_HI:
4607 case R_PPC64_GOT_DTPREL16_HA:
4608 tls_type = TLS_TLS | TLS_DTPREL;
4609 dogottls:
4610 sec->has_tls_reloc = 1;
066f4018 4611 goto dogot;
411e1bfb 4612
5bd4f169 4613 case R_PPC64_GOT16_DS:
65f38f15 4614 case R_PPC64_GOT16_HA:
066f4018 4615 case R_PPC64_GOT16_LO_DS:
4a421c53 4616 case R_PPC64_GOT_PCREL34:
066f4018
AM
4617 ppc64_elf_tdata (abfd)->has_gotrel = 1;
4618 ppc64_elf_section_data (sec)->has_gotrel = 1;
4619 /* Fall through. */
4620
4621 case R_PPC64_GOT16:
65f38f15
AM
4622 case R_PPC64_GOT16_HI:
4623 case R_PPC64_GOT16_LO:
066f4018 4624 dogot:
65f38f15 4625 /* This symbol requires a global offset table entry. */
4c52953f 4626 sec->has_toc_reloc = 1;
33c0ec9d
AM
4627 if (r_type == R_PPC64_GOT_TLSLD16
4628 || r_type == R_PPC64_GOT_TLSGD16
4629 || r_type == R_PPC64_GOT_TPREL16_DS
4630 || r_type == R_PPC64_GOT_DTPREL16_DS
4631 || r_type == R_PPC64_GOT16
4632 || r_type == R_PPC64_GOT16_DS)
4633 {
4634 htab->do_multi_toc = 1;
d77c8a4b 4635 ppc64_elf_tdata (abfd)->has_small_toc_reloc = 1;
33c0ec9d
AM
4636 }
4637
e717da7e
AM
4638 if (ppc64_elf_tdata (abfd)->got == NULL
4639 && !create_got_section (abfd, info))
b34976b6 4640 return FALSE;
5bd4f169
AM
4641
4642 if (h != NULL)
4643 {
411e1bfb
AM
4644 struct ppc_link_hash_entry *eh;
4645 struct got_entry *ent;
65f38f15 4646
411e1bfb
AM
4647 eh = (struct ppc_link_hash_entry *) h;
4648 for (ent = eh->elf.got.glist; ent != NULL; ent = ent->next)
5663e321 4649 if (ent->addend == sym_addend
e717da7e 4650 && ent->owner == abfd
411e1bfb
AM
4651 && ent->tls_type == tls_type)
4652 break;
4653 if (ent == NULL)
5bd4f169 4654 {
411e1bfb 4655 bfd_size_type amt = sizeof (*ent);
4ce794b7 4656 ent = bfd_alloc (abfd, amt);
411e1bfb 4657 if (ent == NULL)
b34976b6 4658 return FALSE;
411e1bfb 4659 ent->next = eh->elf.got.glist;
5663e321 4660 ent->addend = sym_addend;
e717da7e 4661 ent->owner = abfd;
411e1bfb 4662 ent->tls_type = tls_type;
927be08e 4663 ent->is_indirect = FALSE;
411e1bfb
AM
4664 ent->got.refcount = 0;
4665 eh->elf.got.glist = ent;
5bd4f169 4666 }
411e1bfb 4667 ent->got.refcount += 1;
e7b938ca 4668 eh->tls_mask |= tls_type;
5bd4f169 4669 }
411e1bfb
AM
4670 else
4671 /* This is a global offset table entry for a local symbol. */
4672 if (!update_local_sym_info (abfd, symtab_hdr, r_symndx,
5663e321 4673 sym_addend, tls_type))
411e1bfb 4674 return FALSE;
a345bc8d
AM
4675
4676 /* We may also need a plt entry if the symbol turns out to be
4677 an ifunc. */
0e1862bb 4678 if (h != NULL && !bfd_link_pic (info) && abiversion (abfd) != 1)
a345bc8d 4679 {
5663e321 4680 if (!update_plt_info (abfd, &h->plt.plist, sym_addend))
a345bc8d
AM
4681 return FALSE;
4682 }
5bd4f169
AM
4683 break;
4684
5bd4f169 4685 case R_PPC64_PLT16_HA:
65f38f15
AM
4686 case R_PPC64_PLT16_HI:
4687 case R_PPC64_PLT16_LO:
08be3224 4688 case R_PPC64_PLT16_LO_DS:
5663e321
AM
4689 case R_PPC64_PLT_PCREL34:
4690 case R_PPC64_PLT_PCREL34_NOTOC:
65f38f15
AM
4691 case R_PPC64_PLT32:
4692 case R_PPC64_PLT64:
cbf95972
AM
4693 /* This symbol requires a procedure linkage table entry. */
4694 plt_list = ifunc;
4695 if (h != NULL)
e054468f 4696 {
e054468f
AM
4697 h->needs_plt = 1;
4698 if (h->root.root.string[0] == '.'
4699 && h->root.root.string[1] != '\0')
4700 ((struct ppc_link_hash_entry *) h)->is_func = 1;
2d7ad24e 4701 ((struct ppc_link_hash_entry *) h)->tls_mask |= PLT_KEEP;
cbf95972
AM
4702 plt_list = &h->plt.plist;
4703 }
4704 if (plt_list == NULL)
2d7ad24e 4705 plt_list = update_local_sym_info (abfd, symtab_hdr, r_symndx,
5663e321 4706 sym_addend,
2d7ad24e 4707 NON_GOT | PLT_KEEP);
5663e321 4708 if (!update_plt_info (abfd, plt_list, sym_addend))
cbf95972 4709 return FALSE;
5bd4f169
AM
4710 break;
4711
4712 /* The following relocations don't need to propagate the
4713 relocation if linking a shared object since they are
4714 section relative. */
4715 case R_PPC64_SECTOFF:
4716 case R_PPC64_SECTOFF_LO:
4717 case R_PPC64_SECTOFF_HI:
4718 case R_PPC64_SECTOFF_HA:
4719 case R_PPC64_SECTOFF_DS:
4720 case R_PPC64_SECTOFF_LO_DS:
411e1bfb
AM
4721 case R_PPC64_DTPREL16:
4722 case R_PPC64_DTPREL16_LO:
4723 case R_PPC64_DTPREL16_HI:
4724 case R_PPC64_DTPREL16_HA:
4725 case R_PPC64_DTPREL16_DS:
4726 case R_PPC64_DTPREL16_LO_DS:
f9c6b907
AM
4727 case R_PPC64_DTPREL16_HIGH:
4728 case R_PPC64_DTPREL16_HIGHA:
411e1bfb
AM
4729 case R_PPC64_DTPREL16_HIGHER:
4730 case R_PPC64_DTPREL16_HIGHERA:
4731 case R_PPC64_DTPREL16_HIGHEST:
4732 case R_PPC64_DTPREL16_HIGHESTA:
5bd4f169
AM
4733 break;
4734
ad8e1ba5 4735 /* Nor do these. */
25f23106
AM
4736 case R_PPC64_REL16:
4737 case R_PPC64_REL16_LO:
4738 case R_PPC64_REL16_HI:
4739 case R_PPC64_REL16_HA:
4a969973
AM
4740 case R_PPC64_REL16_HIGH:
4741 case R_PPC64_REL16_HIGHA:
4742 case R_PPC64_REL16_HIGHER:
4743 case R_PPC64_REL16_HIGHERA:
4744 case R_PPC64_REL16_HIGHEST:
4745 case R_PPC64_REL16_HIGHESTA:
5663e321
AM
4746 case R_PPC64_REL16_HIGHER34:
4747 case R_PPC64_REL16_HIGHERA34:
4748 case R_PPC64_REL16_HIGHEST34:
4749 case R_PPC64_REL16_HIGHESTA34:
a680de9a 4750 case R_PPC64_REL16DX_HA:
25f23106
AM
4751 break;
4752
45965137
AM
4753 /* Not supported as a dynamic relocation. */
4754 case R_PPC64_ADDR64_LOCAL:
0e1862bb 4755 if (bfd_link_pic (info))
45965137
AM
4756 {
4757 if (!ppc64_elf_howto_table[R_PPC64_ADDR32])
4758 ppc_howto_init ();
695344c0 4759 /* xgettext:c-format */
174d0a74 4760 info->callbacks->einfo (_("%H: %s reloc unsupported "
cf97bcb0 4761 "in shared libraries and PIEs\n"),
45965137
AM
4762 abfd, sec, rel->r_offset,
4763 ppc64_elf_howto_table[r_type]->name);
4764 bfd_set_error (bfd_error_bad_value);
4765 return FALSE;
4766 }
4767 break;
4768
ad8e1ba5 4769 case R_PPC64_TOC16:
33c0ec9d
AM
4770 case R_PPC64_TOC16_DS:
4771 htab->do_multi_toc = 1;
d77c8a4b 4772 ppc64_elf_tdata (abfd)->has_small_toc_reloc = 1;
1a0670f3 4773 /* Fall through. */
ad8e1ba5
AM
4774 case R_PPC64_TOC16_LO:
4775 case R_PPC64_TOC16_HI:
4776 case R_PPC64_TOC16_HA:
ad8e1ba5 4777 case R_PPC64_TOC16_LO_DS:
4c52953f 4778 sec->has_toc_reloc = 1;
ad8e1ba5
AM
4779 break;
4780
006589cf
AM
4781 /* Marker reloc. */
4782 case R_PPC64_ENTRY:
4783 break;
4784
5bd4f169
AM
4785 /* This relocation describes the C++ object vtable hierarchy.
4786 Reconstruct it for later use during GC. */
4787 case R_PPC64_GNU_VTINHERIT:
c152c796 4788 if (!bfd_elf_gc_record_vtinherit (abfd, sec, h, rel->r_offset))
b34976b6 4789 return FALSE;
5bd4f169
AM
4790 break;
4791
4792 /* This relocation describes which C++ vtable entries are actually
4793 used. Record for later use during GC. */
4794 case R_PPC64_GNU_VTENTRY:
a0ea3a14 4795 if (!bfd_elf_gc_record_vtentry (abfd, sec, h, rel->r_addend))
b34976b6 4796 return FALSE;
5bd4f169
AM
4797 break;
4798
721956f4
AM
4799 case R_PPC64_REL14:
4800 case R_PPC64_REL14_BRTAKEN:
4801 case R_PPC64_REL14_BRNTAKEN:
220c76dd
AM
4802 {
4803 asection *dest = NULL;
4804
4805 /* Heuristic: If jumping outside our section, chances are
4806 we are going to need a stub. */
4807 if (h != NULL)
4808 {
4809 /* If the sym is weak it may be overridden later, so
4810 don't assume we know where a weak sym lives. */
4811 if (h->root.type == bfd_link_hash_defined)
4812 dest = h->root.u.def.section;
4813 }
4814 else
87d72d41
AM
4815 {
4816 Elf_Internal_Sym *isym;
4817
4818 isym = bfd_sym_from_r_symndx (&htab->sym_cache,
4819 abfd, r_symndx);
4820 if (isym == NULL)
4821 return FALSE;
4822
4823 dest = bfd_section_from_elf_index (abfd, isym->st_shndx);
4824 }
4825
220c76dd 4826 if (dest != sec)
7c8fe5c4 4827 ppc64_elf_section_data (sec)->has_14bit_branch = 1;
220c76dd 4828 }
3e04d765
AM
4829 goto rel24;
4830
4831 case R_PPC64_PLTCALL:
5663e321 4832 case R_PPC64_PLTCALL_NOTOC:
3e04d765 4833 ppc64_elf_section_data (sec)->has_pltcall = 1;
721956f4
AM
4834 /* Fall through. */
4835
5d1634d7 4836 case R_PPC64_REL24:
05d0e962 4837 case R_PPC64_REL24_NOTOC:
3e04d765 4838 rel24:
cbf95972
AM
4839 plt_list = ifunc;
4840 if (h != NULL)
5d1634d7 4841 {
e054468f
AM
4842 h->needs_plt = 1;
4843 if (h->root.root.string[0] == '.'
4844 && h->root.root.string[1] != '\0')
4845 ((struct ppc_link_hash_entry *) h)->is_func = 1;
cbf95972 4846
3a71aa26 4847 if (h == tga || h == dottga)
cbf95972
AM
4848 {
4849 sec->has_tls_reloc = 1;
4850 if (rel != relocs
4851 && (ELF64_R_TYPE (rel[-1].r_info) == R_PPC64_TLSGD
4852 || ELF64_R_TYPE (rel[-1].r_info) == R_PPC64_TLSLD))
4853 /* We have a new-style __tls_get_addr call with
4854 a marker reloc. */
4855 ;
4856 else
4857 /* Mark this section as having an old-style call. */
4858 sec->has_tls_get_addr_call = 1;
4859 }
4860 plt_list = &h->plt.plist;
411e1bfb 4861 }
cbf95972
AM
4862
4863 /* We may need a .plt entry if the function this reloc
4864 refers to is in a shared lib. */
4865 if (plt_list
5663e321 4866 && !update_plt_info (abfd, plt_list, sym_addend))
cbf95972 4867 return FALSE;
411e1bfb
AM
4868 break;
4869
cbf95972
AM
4870 case R_PPC64_ADDR14:
4871 case R_PPC64_ADDR14_BRNTAKEN:
4872 case R_PPC64_ADDR14_BRTAKEN:
4873 case R_PPC64_ADDR24:
4874 goto dodyn;
4875
411e1bfb
AM
4876 case R_PPC64_TPREL64:
4877 tls_type = TLS_EXPLICIT | TLS_TLS | TLS_TPREL;
7c8bbca5 4878 if (bfd_link_dll (info))
411e1bfb
AM
4879 info->flags |= DF_STATIC_TLS;
4880 goto dotlstoc;
4881
4882 case R_PPC64_DTPMOD64:
4883 if (rel + 1 < rel_end
4884 && rel[1].r_info == ELF64_R_INFO (r_symndx, R_PPC64_DTPREL64)
4885 && rel[1].r_offset == rel->r_offset + 8)
951fd09b 4886 tls_type = TLS_EXPLICIT | TLS_TLS | TLS_GD;
411e1bfb 4887 else
951fd09b 4888 tls_type = TLS_EXPLICIT | TLS_TLS | TLS_LD;
411e1bfb
AM
4889 goto dotlstoc;
4890
4891 case R_PPC64_DTPREL64:
4892 tls_type = TLS_EXPLICIT | TLS_TLS | TLS_DTPREL;
4893 if (rel != relocs
4894 && rel[-1].r_info == ELF64_R_INFO (r_symndx, R_PPC64_DTPMOD64)
4895 && rel[-1].r_offset == rel->r_offset - 8)
4896 /* This is the second reloc of a dtpmod, dtprel pair.
4897 Don't mark with TLS_DTPREL. */
4898 goto dodyn;
4899
4900 dotlstoc:
4901 sec->has_tls_reloc = 1;
4902 if (h != NULL)
4903 {
4904 struct ppc_link_hash_entry *eh;
4905 eh = (struct ppc_link_hash_entry *) h;
e7b938ca 4906 eh->tls_mask |= tls_type;
411e1bfb
AM
4907 }
4908 else
4909 if (!update_local_sym_info (abfd, symtab_hdr, r_symndx,
5663e321 4910 sym_addend, tls_type))
411e1bfb
AM
4911 return FALSE;
4912
7c8fe5c4
AM
4913 ppc64_sec = ppc64_elf_section_data (sec);
4914 if (ppc64_sec->sec_type != sec_toc)
411e1bfb 4915 {
3a71aa26
AM
4916 bfd_size_type amt;
4917
e7b938ca 4918 /* One extra to simplify get_tls_mask. */
3a71aa26
AM
4919 amt = sec->size * sizeof (unsigned) / 8 + sizeof (unsigned);
4920 ppc64_sec->u.toc.symndx = bfd_zalloc (abfd, amt);
4921 if (ppc64_sec->u.toc.symndx == NULL)
4922 return FALSE;
4923 amt = sec->size * sizeof (bfd_vma) / 8;
4924 ppc64_sec->u.toc.add = bfd_zalloc (abfd, amt);
4925 if (ppc64_sec->u.toc.add == NULL)
411e1bfb 4926 return FALSE;
7c8fe5c4
AM
4927 BFD_ASSERT (ppc64_sec->sec_type == sec_normal);
4928 ppc64_sec->sec_type = sec_toc;
411e1bfb
AM
4929 }
4930 BFD_ASSERT (rel->r_offset % 8 == 0);
3a71aa26 4931 ppc64_sec->u.toc.symndx[rel->r_offset / 8] = r_symndx;
5663e321 4932 ppc64_sec->u.toc.add[rel->r_offset / 8] = sym_addend;
951fd09b
AM
4933
4934 /* Mark the second slot of a GD or LD entry.
4935 -1 to indicate GD and -2 to indicate LD. */
4936 if (tls_type == (TLS_EXPLICIT | TLS_TLS | TLS_GD))
3a71aa26 4937 ppc64_sec->u.toc.symndx[rel->r_offset / 8 + 1] = -1;
951fd09b 4938 else if (tls_type == (TLS_EXPLICIT | TLS_TLS | TLS_LD))
3a71aa26 4939 ppc64_sec->u.toc.symndx[rel->r_offset / 8 + 1] = -2;
411e1bfb
AM
4940 goto dodyn;
4941
4942 case R_PPC64_TPREL16:
4943 case R_PPC64_TPREL16_LO:
4944 case R_PPC64_TPREL16_HI:
4945 case R_PPC64_TPREL16_HA:
4946 case R_PPC64_TPREL16_DS:
4947 case R_PPC64_TPREL16_LO_DS:
f9c6b907
AM
4948 case R_PPC64_TPREL16_HIGH:
4949 case R_PPC64_TPREL16_HIGHA:
411e1bfb
AM
4950 case R_PPC64_TPREL16_HIGHER:
4951 case R_PPC64_TPREL16_HIGHERA:
4952 case R_PPC64_TPREL16_HIGHEST:
4953 case R_PPC64_TPREL16_HIGHESTA:
7c8bbca5
AM
4954 if (bfd_link_dll (info))
4955 info->flags |= DF_STATIC_TLS;
4956 goto dodyn;
5d1634d7 4957
e86ce104 4958 case R_PPC64_ADDR64:
b9399fcf 4959 if (is_opd
1e2f5b6e 4960 && rel + 1 < rel_end
4ce794b7 4961 && ELF64_R_TYPE ((rel + 1)->r_info) == R_PPC64_TOC)
1e2f5b6e 4962 {
8387904d 4963 if (h != NULL)
8c5b4e52 4964 ((struct ppc_link_hash_entry *) h)->is_func = 1;
1e2f5b6e 4965 }
e86ce104
AM
4966 /* Fall through. */
4967
65f38f15
AM
4968 case R_PPC64_ADDR16:
4969 case R_PPC64_ADDR16_DS:
4970 case R_PPC64_ADDR16_HA:
4971 case R_PPC64_ADDR16_HI:
f9c6b907
AM
4972 case R_PPC64_ADDR16_HIGH:
4973 case R_PPC64_ADDR16_HIGHA:
65f38f15
AM
4974 case R_PPC64_ADDR16_HIGHER:
4975 case R_PPC64_ADDR16_HIGHERA:
4976 case R_PPC64_ADDR16_HIGHEST:
4977 case R_PPC64_ADDR16_HIGHESTA:
4978 case R_PPC64_ADDR16_LO:
4979 case R_PPC64_ADDR16_LO_DS:
5663e321
AM
4980 case R_PPC64_D34:
4981 case R_PPC64_D34_LO:
4982 case R_PPC64_D34_HI30:
4983 case R_PPC64_D34_HA30:
4984 case R_PPC64_ADDR16_HIGHER34:
4985 case R_PPC64_ADDR16_HIGHERA34:
4986 case R_PPC64_ADDR16_HIGHEST34:
4987 case R_PPC64_ADDR16_HIGHESTA34:
4988 case R_PPC64_D28:
0e1862bb 4989 if (h != NULL && !bfd_link_pic (info) && abiversion (abfd) != 1
a345bc8d
AM
4990 && rel->r_addend == 0)
4991 {
4992 /* We may need a .plt entry if this reloc refers to a
4993 function in a shared lib. */
5663e321 4994 if (!update_plt_info (abfd, &h->plt.plist, 0))
a345bc8d
AM
4995 return FALSE;
4996 h->pointer_equality_needed = 1;
4997 }
4998 /* Fall through. */
4999
5000 case R_PPC64_REL30:
5001 case R_PPC64_REL32:
5002 case R_PPC64_REL64:
65f38f15 5003 case R_PPC64_ADDR32:
65f38f15
AM
5004 case R_PPC64_UADDR16:
5005 case R_PPC64_UADDR32:
5006 case R_PPC64_UADDR64:
5bd4f169 5007 case R_PPC64_TOC:
0e1862bb 5008 if (h != NULL && !bfd_link_pic (info))
81848ca0 5009 /* We may need a copy reloc. */
f5385ebf 5010 h->non_got_ref = 1;
81848ca0 5011
41bd81ab 5012 /* Don't propagate .opd relocs. */
b9399fcf 5013 if (NO_OPD_RELOCS && is_opd)
e86ce104 5014 break;
e86ce104 5015
65f38f15
AM
5016 /* If we are creating a shared library, and this is a reloc
5017 against a global symbol, or a non PC relative reloc
5018 against a local symbol, then we need to copy the reloc
5019 into the shared library. However, if we are linking with
5020 -Bsymbolic, we do not need to copy a reloc against a
5021 global symbol which is defined in an object we are
5022 including in the link (i.e., DEF_REGULAR is set). At
5023 this point we have not seen all the input files, so it is
5024 possible that DEF_REGULAR is not set now but will be set
5025 later (it is never cleared). In case of a weak definition,
5026 DEF_REGULAR may be cleared later by a strong definition in
5027 a shared library. We account for that possibility below by
f4656909 5028 storing information in the dyn_relocs field of the hash
65f38f15
AM
5029 table entry. A similar situation occurs when creating
5030 shared libraries and symbol visibility changes render the
5031 symbol local.
5032
5033 If on the other hand, we are creating an executable, we
5034 may need to keep relocations for symbols satisfied by a
5035 dynamic library if we manage to avoid copy relocs for the
5036 symbol. */
411e1bfb 5037 dodyn:
0e1862bb 5038 if ((bfd_link_pic (info)
1d483afe 5039 && (must_be_dyn_reloc (info, r_type)
65f38f15 5040 || (h != NULL
198f1157 5041 && (!SYMBOLIC_BIND (info, h)
65f38f15 5042 || h->root.type == bfd_link_hash_defweak
f5385ebf 5043 || !h->def_regular))))
f4656909 5044 || (ELIMINATE_COPY_RELOCS
0e1862bb 5045 && !bfd_link_pic (info)
65f38f15
AM
5046 && h != NULL
5047 && (h->root.type == bfd_link_hash_defweak
25f23106 5048 || !h->def_regular))
0e1862bb 5049 || (!bfd_link_pic (info)
25f23106 5050 && ifunc != NULL))
5bd4f169 5051 {
65f38f15
AM
5052 /* We must copy these reloc types into the output file.
5053 Create a reloc section in dynobj and make room for
5054 this reloc. */
5bd4f169
AM
5055 if (sreloc == NULL)
5056 {
83bac4b0
NC
5057 sreloc = _bfd_elf_make_dynamic_reloc_section
5058 (sec, htab->elf.dynobj, 3, abfd, /*rela?*/ TRUE);
65f38f15 5059
5bd4f169 5060 if (sreloc == NULL)
83bac4b0 5061 return FALSE;
5bd4f169
AM
5062 }
5063
65f38f15
AM
5064 /* If this is a global symbol, we count the number of
5065 relocations we need for this symbol. */
5066 if (h != NULL)
5067 {
19e08130
AM
5068 struct elf_dyn_relocs *p;
5069 struct elf_dyn_relocs **head;
5070
ec338859 5071 head = &((struct ppc_link_hash_entry *) h)->dyn_relocs;
19e08130
AM
5072 p = *head;
5073 if (p == NULL || p->sec != sec)
5074 {
5075 p = bfd_alloc (htab->elf.dynobj, sizeof *p);
5076 if (p == NULL)
5077 return FALSE;
5078 p->next = *head;
5079 *head = p;
5080 p->sec = sec;
5081 p->count = 0;
5082 p->pc_count = 0;
5083 }
5084 p->count += 1;
5085 if (!must_be_dyn_reloc (info, r_type))
5086 p->pc_count += 1;
65f38f15
AM
5087 }
5088 else
5089 {
ec338859
AM
5090 /* Track dynamic relocs needed for local syms too.
5091 We really need local syms available to do this
5092 easily. Oh well. */
19e08130
AM
5093 struct ppc_dyn_relocs *p;
5094 struct ppc_dyn_relocs **head;
5095 bfd_boolean is_ifunc;
ec338859 5096 asection *s;
6edfbbad 5097 void *vpp;
87d72d41 5098 Elf_Internal_Sym *isym;
6edfbbad 5099
87d72d41
AM
5100 isym = bfd_sym_from_r_symndx (&htab->sym_cache,
5101 abfd, r_symndx);
5102 if (isym == NULL)
b34976b6 5103 return FALSE;
ec338859 5104
87d72d41
AM
5105 s = bfd_section_from_elf_index (abfd, isym->st_shndx);
5106 if (s == NULL)
5107 s = sec;
5108
6edfbbad 5109 vpp = &elf_section_data (s)->local_dynrel;
19e08130
AM
5110 head = (struct ppc_dyn_relocs **) vpp;
5111 is_ifunc = ELF_ST_TYPE (isym->st_info) == STT_GNU_IFUNC;
5112 p = *head;
5113 if (p != NULL && p->sec == sec && p->ifunc != is_ifunc)
5114 p = p->next;
5115 if (p == NULL || p->sec != sec || p->ifunc != is_ifunc)
5116 {
5117 p = bfd_alloc (htab->elf.dynobj, sizeof *p);
5118 if (p == NULL)
5119 return FALSE;
5120 p->next = *head;
5121 *head = p;
5122 p->sec = sec;
5123 p->ifunc = is_ifunc;
5124 p->count = 0;
5125 }
5126 p->count += 1;
ec338859 5127 }
65f38f15 5128 }
5bd4f169 5129 break;
65f38f15
AM
5130
5131 default:
96e0dda4 5132 break;
5bd4f169
AM
5133 }
5134 }
5135
b34976b6 5136 return TRUE;
5bd4f169
AM
5137}
5138
ee67d69a
AM
5139/* Merge backend specific data from an object file to the output
5140 object file when linking. */
5141
5142static bfd_boolean
50e03d47 5143ppc64_elf_merge_private_bfd_data (bfd *ibfd, struct bfd_link_info *info)
ee67d69a 5144{
50e03d47 5145 bfd *obfd = info->output_bfd;
ee67d69a
AM
5146 unsigned long iflags, oflags;
5147
5148 if ((ibfd->flags & BFD_LINKER_CREATED) != 0)
5149 return TRUE;
5150
5151 if (!is_ppc64_elf (ibfd) || !is_ppc64_elf (obfd))
5152 return TRUE;
5153
50e03d47 5154 if (!_bfd_generic_verify_endian_match (ibfd, info))
ee67d69a
AM
5155 return FALSE;
5156
5157 iflags = elf_elfheader (ibfd)->e_flags;
5158 oflags = elf_elfheader (obfd)->e_flags;
5159
f6c7c3e8 5160 if (iflags & ~EF_PPC64_ABI)
ee67d69a 5161 {
4eca0228 5162 _bfd_error_handler
695344c0 5163 /* xgettext:c-format */
871b3ab2 5164 (_("%pB uses unknown e_flags 0x%lx"), ibfd, iflags);
ee67d69a
AM
5165 bfd_set_error (bfd_error_bad_value);
5166 return FALSE;
5167 }
f6c7c3e8 5168 else if (iflags != oflags && iflags != 0)
ee67d69a 5169 {
4eca0228 5170 _bfd_error_handler
695344c0 5171 /* xgettext:c-format */
871b3ab2 5172 (_("%pB: ABI version %ld is not compatible with ABI version %ld output"),
ee67d69a
AM
5173 ibfd, iflags, oflags);
5174 bfd_set_error (bfd_error_bad_value);
5175 return FALSE;
5176 }
5177
4a91d0ba
AM
5178 if (!_bfd_elf_ppc_merge_fp_attributes (ibfd, info))
5179 return FALSE;
005d79fd 5180
ee67d69a 5181 /* Merge Tag_compatibility attributes and any common GNU ones. */
8d2c8c3d 5182 return _bfd_elf_merge_object_attributes (ibfd, info);
ee67d69a
AM
5183}
5184
5185static bfd_boolean
5186ppc64_elf_print_private_bfd_data (bfd *abfd, void *ptr)
5187{
5188 /* Print normal ELF private data. */
5189 _bfd_elf_print_private_bfd_data (abfd, ptr);
5190
5191 if (elf_elfheader (abfd)->e_flags != 0)
5192 {
5193 FILE *file = ptr;
5194
ee67d69a
AM
5195 fprintf (file, _("private flags = 0x%lx:"),
5196 elf_elfheader (abfd)->e_flags);
5197
5198 if ((elf_elfheader (abfd)->e_flags & EF_PPC64_ABI) != 0)
5199 fprintf (file, _(" [abiv%ld]"),
5200 elf_elfheader (abfd)->e_flags & EF_PPC64_ABI);
5201 fputc ('\n', file);
5202 }
5203
5204 return TRUE;
5205}
5206
8387904d 5207/* OFFSET in OPD_SEC specifies a function descriptor. Return the address
b53dfeb2
AM
5208 of the code entry point, and its section, which must be in the same
5209 object as OPD_SEC. Returns (bfd_vma) -1 on error. */
8387904d
AM
5210
5211static bfd_vma
5212opd_entry_value (asection *opd_sec,
5213 bfd_vma offset,
5214 asection **code_sec,
aef36ac1
AM
5215 bfd_vma *code_off,
5216 bfd_boolean in_code_sec)
8387904d
AM
5217{
5218 bfd *opd_bfd = opd_sec->owner;
8860955f 5219 Elf_Internal_Rela *relocs;
8387904d 5220 Elf_Internal_Rela *lo, *hi, *look;
645ea6a9 5221 bfd_vma val;
8387904d 5222
9f296da3
AM
5223 /* No relocs implies we are linking a --just-symbols object, or looking
5224 at a final linked executable with addr2line or somesuch. */
4b85d634
AM
5225 if (opd_sec->reloc_count == 0)
5226 {
729eabd5 5227 bfd_byte *contents = ppc64_elf_tdata (opd_bfd)->opd.contents;
3b36f7e6 5228
729eabd5
AM
5229 if (contents == NULL)
5230 {
5231 if (!bfd_malloc_and_get_section (opd_bfd, opd_sec, &contents))
5232 return (bfd_vma) -1;
5233 ppc64_elf_tdata (opd_bfd)->opd.contents = contents;
5234 }
ee1e4ede 5235
dbb3fbbb 5236 /* PR 17512: file: 64b9dfbb. */
451dfd38 5237 if (offset + 7 >= opd_sec->size || offset + 7 < offset)
dbb3fbbb
NC
5238 return (bfd_vma) -1;
5239
729eabd5 5240 val = bfd_get_64 (opd_bfd, contents + offset);
aef36ac1
AM
5241 if (code_sec != NULL)
5242 {
5243 asection *sec, *likely = NULL;
ee1e4ede 5244
aef36ac1 5245 if (in_code_sec)
4b85d634 5246 {
aef36ac1
AM
5247 sec = *code_sec;
5248 if (sec->vma <= val
5249 && val < sec->vma + sec->size)
5250 likely = sec;
5251 else
5252 val = -1;
5253 }
5254 else
5255 for (sec = opd_bfd->sections; sec != NULL; sec = sec->next)
5256 if (sec->vma <= val
5257 && (sec->flags & SEC_LOAD) != 0
5258 && (sec->flags & SEC_ALLOC) != 0)
5259 likely = sec;
5260 if (likely != NULL)
5261 {
5262 *code_sec = likely;
5263 if (code_off != NULL)
5264 *code_off = val - likely->vma;
4b85d634
AM
5265 }
5266 }
aef36ac1 5267 return val;
4b85d634
AM
5268 }
5269
0c8d6e5c 5270 BFD_ASSERT (is_ppc64_elf (opd_bfd));
0ffa91dd 5271
729eabd5 5272 relocs = ppc64_elf_tdata (opd_bfd)->opd.relocs;
8860955f
AM
5273 if (relocs == NULL)
5274 relocs = _bfd_elf_link_read_relocs (opd_bfd, opd_sec, NULL, NULL, TRUE);
877a8638
NC
5275 /* PR 17512: file: df8e1fd6. */
5276 if (relocs == NULL)
5277 return (bfd_vma) -1;
645ea6a9 5278
8387904d 5279 /* Go find the opd reloc at the sym address. */
8860955f 5280 lo = relocs;
8387904d 5281 hi = lo + opd_sec->reloc_count - 1; /* ignore last reloc */
645ea6a9 5282 val = (bfd_vma) -1;
8387904d
AM
5283 while (lo < hi)
5284 {
5285 look = lo + (hi - lo) / 2;
5286 if (look->r_offset < offset)
5287 lo = look + 1;
5288 else if (look->r_offset > offset)
5289 hi = look;
5290 else
5291 {
0ffa91dd
NC
5292 Elf_Internal_Shdr *symtab_hdr = &elf_symtab_hdr (opd_bfd);
5293
8387904d
AM
5294 if (ELF64_R_TYPE (look->r_info) == R_PPC64_ADDR64
5295 && ELF64_R_TYPE ((look + 1)->r_info) == R_PPC64_TOC)
5296 {
5297 unsigned long symndx = ELF64_R_SYM (look->r_info);
b53dfeb2 5298 asection *sec = NULL;
8387904d 5299
b53dfeb2
AM
5300 if (symndx >= symtab_hdr->sh_info
5301 && elf_sym_hashes (opd_bfd) != NULL)
8387904d
AM
5302 {
5303 struct elf_link_hash_entry **sym_hashes;
5304 struct elf_link_hash_entry *rh;
5305
5306 sym_hashes = elf_sym_hashes (opd_bfd);
5307 rh = sym_hashes[symndx - symtab_hdr->sh_info];
128205bb
AM
5308 if (rh != NULL)
5309 {
5310 rh = elf_follow_link (rh);
bb854a36
AM
5311 if (rh->root.type != bfd_link_hash_defined
5312 && rh->root.type != bfd_link_hash_defweak)
5313 break;
5314 if (rh->root.u.def.section->owner == opd_bfd)
b53dfeb2 5315 {
bb854a36
AM
5316 val = rh->root.u.def.value;
5317 sec = rh->root.u.def.section;
b53dfeb2
AM
5318 }
5319 }
5320 }
5321
5322 if (sec == NULL)
5323 {
5324 Elf_Internal_Sym *sym;
5325
5326 if (symndx < symtab_hdr->sh_info)
5327 {
5328 sym = (Elf_Internal_Sym *) symtab_hdr->contents;
5329 if (sym == NULL)
5330 {
5331 size_t symcnt = symtab_hdr->sh_info;
5332 sym = bfd_elf_get_elf_syms (opd_bfd, symtab_hdr,
5333 symcnt, 0,
5334 NULL, NULL, NULL);
5335 if (sym == NULL)
5336 break;
5337 symtab_hdr->contents = (bfd_byte *) sym;
5338 }
5339 sym += symndx;
128205bb
AM
5340 }
5341 else
5342 {
b53dfeb2
AM
5343 sym = bfd_elf_get_elf_syms (opd_bfd, symtab_hdr,
5344 1, symndx,
5345 NULL, NULL, NULL);
128205bb
AM
5346 if (sym == NULL)
5347 break;
128205bb 5348 }
b53dfeb2
AM
5349 sec = bfd_section_from_elf_index (opd_bfd, sym->st_shndx);
5350 if (sec == NULL)
5351 break;
5352 BFD_ASSERT ((sec->flags & SEC_MERGE) == 0);
5353 val = sym->st_value;
8387904d 5354 }
b53dfeb2 5355
8387904d
AM
5356 val += look->r_addend;
5357 if (code_off != NULL)
5358 *code_off = val;
5359 if (code_sec != NULL)
aef36ac1
AM
5360 {
5361 if (in_code_sec && *code_sec != sec)
5362 return -1;
5363 else
5364 *code_sec = sec;
5365 }
b53dfeb2 5366 if (sec->output_section != NULL)
8387904d 5367 val += sec->output_section->vma + sec->output_offset;
8387904d
AM
5368 }
5369 break;
5370 }
5371 }
645ea6a9 5372
645ea6a9 5373 return val;
8387904d
AM
5374}
5375
aef36ac1
AM
5376/* If the ELF symbol SYM might be a function in SEC, return the
5377 function size and set *CODE_OFF to the function's entry point,
5378 otherwise return zero. */
9f296da3 5379
aef36ac1
AM
5380static bfd_size_type
5381ppc64_elf_maybe_function_sym (const asymbol *sym, asection *sec,
5382 bfd_vma *code_off)
9f296da3 5383{
aef36ac1
AM
5384 bfd_size_type size;
5385
5386 if ((sym->flags & (BSF_SECTION_SYM | BSF_FILE | BSF_OBJECT
5387 | BSF_THREAD_LOCAL | BSF_RELC | BSF_SRELC)) != 0)
5388 return 0;
5389
5390 size = 0;
5391 if (!(sym->flags & BSF_SYNTHETIC))
5392 size = ((elf_symbol_type *) sym)->internal_elf_sym.st_size;
5393
5394 if (strcmp (sym->section->name, ".opd") == 0)
9f296da3 5395 {
b07bca4e
AM
5396 struct _opd_sec_data *opd = get_opd_info (sym->section);
5397 bfd_vma symval = sym->value;
5398
5399 if (opd != NULL
5400 && opd->adjust != NULL
5401 && elf_section_data (sym->section)->relocs != NULL)
5402 {
5403 /* opd_entry_value will use cached relocs that have been
5404 adjusted, but with raw symbols. That means both local
5405 and global symbols need adjusting. */
5406 long adjust = opd->adjust[OPD_NDX (symval)];
5407 if (adjust == -1)
5408 return 0;
5409 symval += adjust;
5410 }
5411
5412 if (opd_entry_value (sym->section, symval,
aef36ac1
AM
5413 &sec, code_off, TRUE) == (bfd_vma) -1)
5414 return 0;
5415 /* An old ABI binary with dot-syms has a size of 24 on the .opd
5416 symbol. This size has nothing to do with the code size of the
5417 function, which is what we're supposed to return, but the
5418 code size isn't available without looking up the dot-sym.
5419 However, doing that would be a waste of time particularly
5420 since elf_find_function will look at the dot-sym anyway.
5421 Now, elf_find_function will keep the largest size of any
5422 function sym found at the code address of interest, so return
5423 1 here to avoid it incorrectly caching a larger function size
5424 for a small function. This does mean we return the wrong
5425 size for a new-ABI function of size 24, but all that does is
5426 disable caching for such functions. */
5427 if (size == 24)
5428 size = 1;
9f296da3 5429 }
aef36ac1
AM
5430 else
5431 {
5432 if (sym->section != sec)
5433 return 0;
5434 *code_off = sym->value;
5435 }
5436 if (size == 0)
5437 size = 1;
5438 return size;
9f296da3
AM
5439}
5440
f378ab09
AM
5441/* Return true if symbol is a strong function defined in an ELFv2
5442 object with st_other localentry bits of zero, ie. its local entry
5443 point coincides with its global entry point. */
5444
5445static bfd_boolean
5446is_elfv2_localentry0 (struct elf_link_hash_entry *h)
5447{
5448 return (h != NULL
5449 && h->type == STT_FUNC
5450 && h->root.type == bfd_link_hash_defined
5451 && (STO_PPC64_LOCAL_MASK & h->other) == 0
8b5f1ed8 5452 && !((struct ppc_link_hash_entry *) h)->non_zero_localentry
f378ab09
AM
5453 && is_ppc64_elf (h->root.u.def.section->owner)
5454 && abiversion (h->root.u.def.section->owner) >= 2);
5455}
5456
854b41e7
AM
5457/* Return true if symbol is defined in a regular object file. */
5458
5459static bfd_boolean
5460is_static_defined (struct elf_link_hash_entry *h)
5461{
5462 return ((h->root.type == bfd_link_hash_defined
5463 || h->root.type == bfd_link_hash_defweak)
5464 && h->root.u.def.section != NULL
5465 && h->root.u.def.section->output_section != NULL);
5466}
5467
b31867b6
AM
5468/* If FDH is a function descriptor symbol, return the associated code
5469 entry symbol if it is defined. Return NULL otherwise. */
5470
5471static struct ppc_link_hash_entry *
5472defined_code_entry (struct ppc_link_hash_entry *fdh)
5473{
5474 if (fdh->is_func_descriptor)
5475 {
5476 struct ppc_link_hash_entry *fh = ppc_follow_link (fdh->oh);
5477 if (fh->elf.root.type == bfd_link_hash_defined
5478 || fh->elf.root.type == bfd_link_hash_defweak)
5479 return fh;
5480 }
5481 return NULL;
5482}
5483
5484/* If FH is a function code entry symbol, return the associated
5485 function descriptor symbol if it is defined. Return NULL otherwise. */
5486
5487static struct ppc_link_hash_entry *
5488defined_func_desc (struct ppc_link_hash_entry *fh)
5489{
5490 if (fh->oh != NULL
5491 && fh->oh->is_func_descriptor)
5492 {
5493 struct ppc_link_hash_entry *fdh = ppc_follow_link (fh->oh);
5494 if (fdh->elf.root.type == bfd_link_hash_defined
5495 || fdh->elf.root.type == bfd_link_hash_defweak)
5496 return fdh;
5497 }
5498 return NULL;
5499}
5500
8c5b4e52
AM
5501static bfd_boolean func_desc_adjust (struct elf_link_hash_entry *, void *);
5502
5503/* Garbage collect sections, after first dealing with dot-symbols. */
5504
5505static bfd_boolean
5506ppc64_elf_gc_sections (bfd *abfd, struct bfd_link_info *info)
5507{
5508 struct ppc_link_hash_table *htab = ppc_hash_table (info);
5509
5510 if (htab != NULL && htab->need_func_desc_adj)
5511 {
5512 elf_link_hash_traverse (&htab->elf, func_desc_adjust, info);
5513 htab->need_func_desc_adj = 0;
5514 }
5515 return bfd_elf_gc_sections (abfd, info);
5516}
5517
74f0fb50
AM
5518/* Mark all our entry sym sections, both opd and code section. */
5519
5520static void
5521ppc64_elf_gc_keep (struct bfd_link_info *info)
5522{
5523 struct ppc_link_hash_table *htab = ppc_hash_table (info);
5524 struct bfd_sym_chain *sym;
5525
4dfe6ac6
NC
5526 if (htab == NULL)
5527 return;
5528
74f0fb50
AM
5529 for (sym = info->gc_sym_list; sym != NULL; sym = sym->next)
5530 {
b31867b6 5531 struct ppc_link_hash_entry *eh, *fh;
74f0fb50
AM
5532 asection *sec;
5533
5534 eh = (struct ppc_link_hash_entry *)
b31867b6 5535 elf_link_hash_lookup (&htab->elf, sym->name, FALSE, FALSE, TRUE);
74f0fb50
AM
5536 if (eh == NULL)
5537 continue;
5538 if (eh->elf.root.type != bfd_link_hash_defined
5539 && eh->elf.root.type != bfd_link_hash_defweak)
5540 continue;
5541
b31867b6
AM
5542 fh = defined_code_entry (eh);
5543 if (fh != NULL)
74f0fb50 5544 {
b31867b6 5545 sec = fh->elf.root.u.def.section;
74f0fb50
AM
5546 sec->flags |= SEC_KEEP;
5547 }
5548 else if (get_opd_info (eh->elf.root.u.def.section) != NULL
5549 && opd_entry_value (eh->elf.root.u.def.section,
5550 eh->elf.root.u.def.value,
aef36ac1 5551 &sec, NULL, FALSE) != (bfd_vma) -1)
74f0fb50
AM
5552 sec->flags |= SEC_KEEP;
5553
5554 sec = eh->elf.root.u.def.section;
5555 sec->flags |= SEC_KEEP;
5556 }
5557}
5558
64d03ab5
AM
5559/* Mark sections containing dynamically referenced symbols. When
5560 building shared libraries, we must assume that any visible symbol is
5561 referenced. */
5562
5563static bfd_boolean
5564ppc64_elf_gc_mark_dynamic_ref (struct elf_link_hash_entry *h, void *inf)
5565{
5566 struct bfd_link_info *info = (struct bfd_link_info *) inf;
5567 struct ppc_link_hash_entry *eh = (struct ppc_link_hash_entry *) h;
b31867b6 5568 struct ppc_link_hash_entry *fdh;
b407645f 5569 struct bfd_elf_dynamic_list *d = info->dynamic_list;
64d03ab5 5570
64d03ab5 5571 /* Dynamic linking info is on the func descriptor sym. */
b31867b6
AM
5572 fdh = defined_func_desc (eh);
5573 if (fdh != NULL)
5574 eh = fdh;
64d03ab5
AM
5575
5576 if ((eh->elf.root.type == bfd_link_hash_defined
5577 || eh->elf.root.type == bfd_link_hash_defweak)
87e79a65 5578 && ((eh->elf.ref_dynamic && !eh->elf.forced_local)
1c9177d9 5579 || ((eh->elf.def_regular || ELF_COMMON_DEF_P (&eh->elf))
64d03ab5 5580 && ELF_ST_VISIBILITY (eh->elf.other) != STV_INTERNAL
4c58e0d8 5581 && ELF_ST_VISIBILITY (eh->elf.other) != STV_HIDDEN
0e1862bb 5582 && (!bfd_link_executable (info)
e278ae05 5583 || info->gc_keep_exported
b407645f
AM
5584 || info->export_dynamic
5585 || (eh->elf.dynamic
5586 && d != NULL
2cdcc330
AM
5587 && (*d->match) (&d->head, NULL,
5588 eh->elf.root.root.string)))
e278ae05 5589 && (eh->elf.versioned >= versioned
4c58e0d8
AM
5590 || !bfd_hide_sym_by_version (info->version_info,
5591 eh->elf.root.root.string)))))
64d03ab5
AM
5592 {
5593 asection *code_sec;
b31867b6 5594 struct ppc_link_hash_entry *fh;
64d03ab5
AM
5595
5596 eh->elf.root.u.def.section->flags |= SEC_KEEP;
5597
5598 /* Function descriptor syms cause the associated
5599 function code sym section to be marked. */
b31867b6
AM
5600 fh = defined_code_entry (eh);
5601 if (fh != NULL)
5602 {
5603 code_sec = fh->elf.root.u.def.section;
5604 code_sec->flags |= SEC_KEEP;
5605 }
64d03ab5
AM
5606 else if (get_opd_info (eh->elf.root.u.def.section) != NULL
5607 && opd_entry_value (eh->elf.root.u.def.section,
5608 eh->elf.root.u.def.value,
aef36ac1 5609 &code_sec, NULL, FALSE) != (bfd_vma) -1)
64d03ab5
AM
5610 code_sec->flags |= SEC_KEEP;
5611 }
5612
5613 return TRUE;
5614}
5615
5bd4f169
AM
5616/* Return the section that should be marked against GC for a given
5617 relocation. */
5618
5619static asection *
4ce794b7 5620ppc64_elf_gc_mark_hook (asection *sec,
fb34365b 5621 struct bfd_link_info *info,
4ce794b7
AM
5622 Elf_Internal_Rela *rel,
5623 struct elf_link_hash_entry *h,
5624 Elf_Internal_Sym *sym)
5bd4f169 5625{
ccfa59ea
AM
5626 asection *rsec;
5627
ccfa59ea
AM
5628 /* Syms return NULL if we're marking .opd, so we avoid marking all
5629 function sections, as all functions are referenced in .opd. */
5630 rsec = NULL;
5631 if (get_opd_info (sec) != NULL)
5632 return rsec;
1e2f5b6e 5633
5bd4f169
AM
5634 if (h != NULL)
5635 {
04c9666a 5636 enum elf_ppc64_reloc_type r_type;
b31867b6 5637 struct ppc_link_hash_entry *eh, *fh, *fdh;
a33d1f77 5638
4ce794b7 5639 r_type = ELF64_R_TYPE (rel->r_info);
a33d1f77 5640 switch (r_type)
5bd4f169
AM
5641 {
5642 case R_PPC64_GNU_VTINHERIT:
5643 case R_PPC64_GNU_VTENTRY:
5644 break;
5645
5646 default:
5647 switch (h->root.type)
5648 {
5649 case bfd_link_hash_defined:
5650 case bfd_link_hash_defweak:
ccfa59ea 5651 eh = (struct ppc_link_hash_entry *) h;
b31867b6
AM
5652 fdh = defined_func_desc (eh);
5653 if (fdh != NULL)
8c5b4e52
AM
5654 {
5655 /* -mcall-aixdesc code references the dot-symbol on
5656 a call reloc. Mark the function descriptor too
5657 against garbage collection. */
5658 fdh->elf.mark = 1;
60d67dc8
AM
5659 if (fdh->elf.is_weakalias)
5660 weakdef (&fdh->elf)->mark = 1;
8c5b4e52
AM
5661 eh = fdh;
5662 }
1e2f5b6e
AM
5663
5664 /* Function descriptor syms cause the associated
5665 function code sym section to be marked. */
b31867b6
AM
5666 fh = defined_code_entry (eh);
5667 if (fh != NULL)
ccfa59ea
AM
5668 {
5669 /* They also mark their opd section. */
74f0fb50 5670 eh->elf.root.u.def.section->gc_mark = 1;
ccfa59ea 5671
b31867b6 5672 rsec = fh->elf.root.u.def.section;
ccfa59ea 5673 }
8387904d
AM
5674 else if (get_opd_info (eh->elf.root.u.def.section) != NULL
5675 && opd_entry_value (eh->elf.root.u.def.section,
5676 eh->elf.root.u.def.value,
aef36ac1 5677 &rsec, NULL, FALSE) != (bfd_vma) -1)
74f0fb50 5678 eh->elf.root.u.def.section->gc_mark = 1;
ccfa59ea 5679 else
1e2f5b6e
AM
5680 rsec = h->root.u.def.section;
5681 break;
5bd4f169
AM
5682
5683 case bfd_link_hash_common:
1e2f5b6e
AM
5684 rsec = h->root.u.c.p->section;
5685 break;
5bd4f169
AM
5686
5687 default:
fb34365b 5688 return _bfd_elf_gc_mark_hook (sec, info, rel, h, sym);
5bd4f169
AM
5689 }
5690 }
5691 }
5692 else
5693 {
74f0fb50 5694 struct _opd_sec_data *opd;
1e2f5b6e
AM
5695
5696 rsec = bfd_section_from_elf_index (sec->owner, sym->st_shndx);
74f0fb50
AM
5697 opd = get_opd_info (rsec);
5698 if (opd != NULL && opd->func_sec != NULL)
ccfa59ea 5699 {
74f0fb50 5700 rsec->gc_mark = 1;
ccfa59ea 5701
51aecdc5 5702 rsec = opd->func_sec[OPD_NDX (sym->st_value + rel->r_addend)];
ccfa59ea 5703 }
5bd4f169
AM
5704 }
5705
1e2f5b6e 5706 return rsec;
5bd4f169
AM
5707}
5708
deb0e272
AM
5709/* The maximum size of .sfpr. */
5710#define SFPR_MAX (218*4)
5711
5712struct sfpr_def_parms
5713{
699733f6
AM
5714 const char name[12];
5715 unsigned char lo, hi;
2cdcc330
AM
5716 bfd_byte *(*write_ent) (bfd *, bfd_byte *, int);
5717 bfd_byte *(*write_tail) (bfd *, bfd_byte *, int);
deb0e272
AM
5718};
5719
a4b6fadd
AM
5720/* Auto-generate _save*, _rest* functions in .sfpr.
5721 If STUB_SEC is non-null, define alias symbols in STUB_SEC
5722 instead. */
deb0e272 5723
4dfe6ac6 5724static bfd_boolean
a4b6fadd
AM
5725sfpr_define (struct bfd_link_info *info,
5726 const struct sfpr_def_parms *parm,
5727 asection *stub_sec)
deb0e272
AM
5728{
5729 struct ppc_link_hash_table *htab = ppc_hash_table (info);
5730 unsigned int i;
5731 size_t len = strlen (parm->name);
5732 bfd_boolean writing = FALSE;
699733f6 5733 char sym[16];
deb0e272 5734
4dfe6ac6
NC
5735 if (htab == NULL)
5736 return FALSE;
5737
deb0e272
AM
5738 memcpy (sym, parm->name, len);
5739 sym[len + 2] = 0;
5740
5741 for (i = parm->lo; i <= parm->hi; i++)
5742 {
a4b6fadd 5743 struct ppc_link_hash_entry *h;
deb0e272
AM
5744
5745 sym[len + 0] = i / 10 + '0';
5746 sym[len + 1] = i % 10 + '0';
a4b6fadd 5747 h = (struct ppc_link_hash_entry *)
b32547cd 5748 elf_link_hash_lookup (&htab->elf, sym, writing, TRUE, TRUE);
a4b6fadd 5749 if (stub_sec != NULL)
deb0e272 5750 {
a4b6fadd
AM
5751 if (h != NULL
5752 && h->elf.root.type == bfd_link_hash_defined
5753 && h->elf.root.u.def.section == htab->sfpr)
5754 {
5755 struct elf_link_hash_entry *s;
5756 char buf[32];
5757 sprintf (buf, "%08x.%s", stub_sec->id & 0xffffffff, sym);
5758 s = elf_link_hash_lookup (&htab->elf, buf, TRUE, TRUE, FALSE);
5759 if (s == NULL)
5760 return FALSE;
5761 if (s->root.type == bfd_link_hash_new
5762 || (s->root.type = bfd_link_hash_defined
5763 && s->root.u.def.section == stub_sec))
5764 {
5765 s->root.type = bfd_link_hash_defined;
5766 s->root.u.def.section = stub_sec;
7dda8d3c 5767 s->root.u.def.value = (stub_sec->size - htab->sfpr->size
a4b6fadd
AM
5768 + h->elf.root.u.def.value);
5769 s->ref_regular = 1;
5770 s->def_regular = 1;
5771 s->ref_regular_nonweak = 1;
5772 s->forced_local = 1;
5773 s->non_elf = 0;
5774 s->root.linker_def = 1;
5775 }
5776 }
5777 continue;
5778 }
5779 if (h != NULL)
5780 {
5781 h->save_res = 1;
5782 if (!h->elf.def_regular)
deb0e272 5783 {
a4b6fadd
AM
5784 h->elf.root.type = bfd_link_hash_defined;
5785 h->elf.root.u.def.section = htab->sfpr;
5786 h->elf.root.u.def.value = htab->sfpr->size;
5787 h->elf.type = STT_FUNC;
5788 h->elf.def_regular = 1;
b32547cd 5789 h->elf.non_elf = 0;
a4b6fadd
AM
5790 _bfd_elf_link_hash_hide_symbol (info, &h->elf, TRUE);
5791 writing = TRUE;
deb0e272 5792 if (htab->sfpr->contents == NULL)
a4b6fadd 5793 {
2cdcc330
AM
5794 htab->sfpr->contents
5795 = bfd_alloc (htab->elf.dynobj, SFPR_MAX);
a4b6fadd
AM
5796 if (htab->sfpr->contents == NULL)
5797 return FALSE;
5798 }
deb0e272
AM
5799 }
5800 }
5801 if (writing)
5802 {
5803 bfd_byte *p = htab->sfpr->contents + htab->sfpr->size;
5804 if (i != parm->hi)
5805 p = (*parm->write_ent) (htab->elf.dynobj, p, i);
5806 else
5807 p = (*parm->write_tail) (htab->elf.dynobj, p, i);
5808 htab->sfpr->size = p - htab->sfpr->contents;
5809 }
5810 }
5811
5812 return TRUE;
5813}
5814
5815static bfd_byte *
5816savegpr0 (bfd *abfd, bfd_byte *p, int r)
5817{
5818 bfd_put_32 (abfd, STD_R0_0R1 + (r << 21) + (1 << 16) - (32 - r) * 8, p);
5819 return p + 4;
5820}
5821
5822static bfd_byte *
5823savegpr0_tail (bfd *abfd, bfd_byte *p, int r)
5824{
5825 p = savegpr0 (abfd, p, r);
a078d95a 5826 bfd_put_32 (abfd, STD_R0_0R1 + STK_LR, p);
deb0e272
AM
5827 p = p + 4;
5828 bfd_put_32 (abfd, BLR, p);
5829 return p + 4;
5830}
5831
5832static bfd_byte *
5833restgpr0 (bfd *abfd, bfd_byte *p, int r)
5834{
5835 bfd_put_32 (abfd, LD_R0_0R1 + (r << 21) + (1 << 16) - (32 - r) * 8, p);
5836 return p + 4;
5837}
5838
5839static bfd_byte *
5840restgpr0_tail (bfd *abfd, bfd_byte *p, int r)
5841{
a078d95a 5842 bfd_put_32 (abfd, LD_R0_0R1 + STK_LR, p);
deb0e272
AM
5843 p = p + 4;
5844 p = restgpr0 (abfd, p, r);
5845 bfd_put_32 (abfd, MTLR_R0, p);
5846 p = p + 4;
5847 if (r == 29)
5848 {
5849 p = restgpr0 (abfd, p, 30);
5850 p = restgpr0 (abfd, p, 31);
5851 }
5852 bfd_put_32 (abfd, BLR, p);
5853 return p + 4;
5854}
5855
5856static bfd_byte *
5857savegpr1 (bfd *abfd, bfd_byte *p, int r)
5858{
5859 bfd_put_32 (abfd, STD_R0_0R12 + (r << 21) + (1 << 16) - (32 - r) * 8, p);
5860 return p + 4;
5861}
5862
5863static bfd_byte *
5864savegpr1_tail (bfd *abfd, bfd_byte *p, int r)
5865{
5866 p = savegpr1 (abfd, p, r);
5867 bfd_put_32 (abfd, BLR, p);
5868 return p + 4;
5869}
5870
5871static bfd_byte *
5872restgpr1 (bfd *abfd, bfd_byte *p, int r)
5873{
5874 bfd_put_32 (abfd, LD_R0_0R12 + (r << 21) + (1 << 16) - (32 - r) * 8, p);
5875 return p + 4;
5876}
5877
5878static bfd_byte *
5879restgpr1_tail (bfd *abfd, bfd_byte *p, int r)
5880{
5881 p = restgpr1 (abfd, p, r);
5882 bfd_put_32 (abfd, BLR, p);
5883 return p + 4;
5884}
5885
5886static bfd_byte *
5887savefpr (bfd *abfd, bfd_byte *p, int r)
5888{
5889 bfd_put_32 (abfd, STFD_FR0_0R1 + (r << 21) + (1 << 16) - (32 - r) * 8, p);
5890 return p + 4;
5891}
5892
5893static bfd_byte *
5894savefpr0_tail (bfd *abfd, bfd_byte *p, int r)
5895{
5896 p = savefpr (abfd, p, r);
a078d95a 5897 bfd_put_32 (abfd, STD_R0_0R1 + STK_LR, p);
deb0e272
AM
5898 p = p + 4;
5899 bfd_put_32 (abfd, BLR, p);
5900 return p + 4;
5901}
5902
5903static bfd_byte *
5904restfpr (bfd *abfd, bfd_byte *p, int r)
5905{
5906 bfd_put_32 (abfd, LFD_FR0_0R1 + (r << 21) + (1 << 16) - (32 - r) * 8, p);
5907 return p + 4;
5908}
5909
5910static bfd_byte *
5911restfpr0_tail (bfd *abfd, bfd_byte *p, int r)
5912{
a078d95a 5913 bfd_put_32 (abfd, LD_R0_0R1 + STK_LR, p);
deb0e272
AM
5914 p = p + 4;
5915 p = restfpr (abfd, p, r);
5916 bfd_put_32 (abfd, MTLR_R0, p);
5917 p = p + 4;
5918 if (r == 29)
5919 {
5920 p = restfpr (abfd, p, 30);
5921 p = restfpr (abfd, p, 31);
5922 }
5923 bfd_put_32 (abfd, BLR, p);
5924 return p + 4;
5925}
5926
5927static bfd_byte *
5928savefpr1_tail (bfd *abfd, bfd_byte *p, int r)
5929{
5930 p = savefpr (abfd, p, r);
5931 bfd_put_32 (abfd, BLR, p);
5932 return p + 4;
5933}
5934
5935static bfd_byte *
5936restfpr1_tail (bfd *abfd, bfd_byte *p, int r)
5937{
5938 p = restfpr (abfd, p, r);
5939 bfd_put_32 (abfd, BLR, p);
5940 return p + 4;
5941}
5942
5943static bfd_byte *
5944savevr (bfd *abfd, bfd_byte *p, int r)
5945{
5946 bfd_put_32 (abfd, LI_R12_0 + (1 << 16) - (32 - r) * 16, p);
5947 p = p + 4;
5948 bfd_put_32 (abfd, STVX_VR0_R12_R0 + (r << 21), p);
5949 return p + 4;
5950}
5951
5952static bfd_byte *
5953savevr_tail (bfd *abfd, bfd_byte *p, int r)
5954{
5955 p = savevr (abfd, p, r);
5956 bfd_put_32 (abfd, BLR, p);
5957 return p + 4;
5958}
5959
5960static bfd_byte *
5961restvr (bfd *abfd, bfd_byte *p, int r)
5962{
5963 bfd_put_32 (abfd, LI_R12_0 + (1 << 16) - (32 - r) * 16, p);
5964 p = p + 4;
5965 bfd_put_32 (abfd, LVX_VR0_R12_R0 + (r << 21), p);
5966 return p + 4;
5967}
5968
5969static bfd_byte *
5970restvr_tail (bfd *abfd, bfd_byte *p, int r)
5971{
5972 p = restvr (abfd, p, r);
5973 bfd_put_32 (abfd, BLR, p);
5974 return p + 4;
5975}
5976
e86ce104
AM
5977/* Called via elf_link_hash_traverse to transfer dynamic linking
5978 information on function code symbol entries to their corresponding
5979 function descriptor symbol entries. */
deb0e272 5980
b34976b6 5981static bfd_boolean
4ce794b7 5982func_desc_adjust (struct elf_link_hash_entry *h, void *inf)
5bd4f169 5983{
e86ce104 5984 struct bfd_link_info *info;
65f38f15 5985 struct ppc_link_hash_table *htab;
50bc7936
AM
5986 struct ppc_link_hash_entry *fh;
5987 struct ppc_link_hash_entry *fdh;
5988 bfd_boolean force_local;
5bd4f169 5989
50bc7936
AM
5990 fh = (struct ppc_link_hash_entry *) h;
5991 if (fh->elf.root.type == bfd_link_hash_indirect)
b34976b6 5992 return TRUE;
e86ce104 5993
8c5b4e52
AM
5994 if (!fh->is_func)
5995 return TRUE;
5996
5997 if (fh->elf.root.root.string[0] != '.'
5998 || fh->elf.root.root.string[1] == '\0')
5999 return TRUE;
6000
4ce794b7 6001 info = inf;
65f38f15 6002 htab = ppc_hash_table (info);
4dfe6ac6
NC
6003 if (htab == NULL)
6004 return FALSE;
5bd4f169 6005
8c5b4e52
AM
6006 /* Find the corresponding function descriptor symbol. */
6007 fdh = lookup_fdh (fh, htab);
6008
c09bdfe5
AM
6009 /* Resolve undefined references to dot-symbols as the value
6010 in the function descriptor, if we have one in a regular object.
6011 This is to satisfy cases like ".quad .foo". Calls to functions
6012 in dynamic objects are handled elsewhere. */
8c5b4e52
AM
6013 if ((fh->elf.root.type == bfd_link_hash_undefined
6014 || fh->elf.root.type == bfd_link_hash_undefweak)
6015 && (fdh->elf.root.type == bfd_link_hash_defined
6016 || fdh->elf.root.type == bfd_link_hash_defweak)
b31867b6
AM
6017 && get_opd_info (fdh->elf.root.u.def.section) != NULL
6018 && opd_entry_value (fdh->elf.root.u.def.section,
6019 fdh->elf.root.u.def.value,
c09bdfe5 6020 &fh->elf.root.u.def.section,
aef36ac1 6021 &fh->elf.root.u.def.value, FALSE) != (bfd_vma) -1)
c09bdfe5 6022 {
b31867b6 6023 fh->elf.root.type = fdh->elf.root.type;
f5385ebf 6024 fh->elf.forced_local = 1;
b31867b6
AM
6025 fh->elf.def_regular = fdh->elf.def_regular;
6026 fh->elf.def_dynamic = fdh->elf.def_dynamic;
c09bdfe5
AM
6027 }
6028
8c5b4e52
AM
6029 if (!fh->elf.dynamic)
6030 {
6031 struct plt_entry *ent;
5bd4f169 6032
8c5b4e52
AM
6033 for (ent = fh->elf.plt.plist; ent != NULL; ent = ent->next)
6034 if (ent->plt.refcount > 0)
6035 break;
6036 if (ent == NULL)
6037 return TRUE;
6038 }
5bd4f169 6039
8c5b4e52 6040 /* Create a descriptor as undefined if necessary. */
50bc7936 6041 if (fdh == NULL
0e1862bb 6042 && !bfd_link_executable (info)
50bc7936
AM
6043 && (fh->elf.root.type == bfd_link_hash_undefined
6044 || fh->elf.root.type == bfd_link_hash_undefweak))
6045 {
908b32fc 6046 fdh = make_fdh (info, fh);
bb700d78
AM
6047 if (fdh == NULL)
6048 return FALSE;
50bc7936 6049 }
648cca2c 6050
8c5b4e52 6051 /* We can't support overriding of symbols on a fake descriptor. */
908b32fc
AM
6052 if (fdh != NULL
6053 && fdh->fake
8c5b4e52
AM
6054 && (fh->elf.root.type == bfd_link_hash_defined
6055 || fh->elf.root.type == bfd_link_hash_defweak))
6056 _bfd_elf_link_hash_hide_symbol (info, &fdh->elf, TRUE);
908b32fc 6057
8c5b4e52
AM
6058 /* Transfer dynamic linking information to the function descriptor. */
6059 if (fdh != NULL)
6060 {
f5385ebf
AM
6061 fdh->elf.ref_regular |= fh->elf.ref_regular;
6062 fdh->elf.ref_dynamic |= fh->elf.ref_dynamic;
6063 fdh->elf.ref_regular_nonweak |= fh->elf.ref_regular_nonweak;
6064 fdh->elf.non_got_ref |= fh->elf.non_got_ref;
8c5b4e52
AM
6065 fdh->elf.dynamic |= fh->elf.dynamic;
6066 fdh->elf.needs_plt |= (fh->elf.needs_plt
6067 || fh->elf.type == STT_FUNC
6068 || fh->elf.type == STT_GNU_IFUNC);
6069 move_plt_plist (fh, fdh);
6070
6071 if (!fdh->elf.forced_local
6072 && fh->elf.dynindx != -1)
6073 if (!bfd_elf_link_record_dynamic_symbol (info, &fdh->elf))
6074 return FALSE;
e86ce104
AM
6075 }
6076
50bc7936
AM
6077 /* Now that the info is on the function descriptor, clear the
6078 function code sym info. Any function code syms for which we
6079 don't have a definition in a regular file, we force local.
6080 This prevents a shared library from exporting syms that have
6081 been imported from another library. Function code syms that
6082 are really in the library we must leave global to prevent the
6083 linker dragging in a definition from a static library. */
93f3fa99
AM
6084 force_local = (!fh->elf.def_regular
6085 || fdh == NULL
6086 || !fdh->elf.def_regular
6087 || fdh->elf.forced_local);
50bc7936
AM
6088 _bfd_elf_link_hash_hide_symbol (info, &fh->elf, force_local);
6089
b34976b6 6090 return TRUE;
e86ce104 6091}
40b8271b 6092
a4b6fadd
AM
6093static const struct sfpr_def_parms save_res_funcs[] =
6094 {
6095 { "_savegpr0_", 14, 31, savegpr0, savegpr0_tail },
6096 { "_restgpr0_", 14, 29, restgpr0, restgpr0_tail },
6097 { "_restgpr0_", 30, 31, restgpr0, restgpr0_tail },
6098 { "_savegpr1_", 14, 31, savegpr1, savegpr1_tail },
6099 { "_restgpr1_", 14, 31, restgpr1, restgpr1_tail },
6100 { "_savefpr_", 14, 31, savefpr, savefpr0_tail },
6101 { "_restfpr_", 14, 29, restfpr, restfpr0_tail },
6102 { "_restfpr_", 30, 31, restfpr, restfpr0_tail },
6103 { "._savef", 14, 31, savefpr, savefpr1_tail },
6104 { "._restf", 14, 31, restfpr, restfpr1_tail },
6105 { "_savevr_", 20, 31, savevr, savevr_tail },
6106 { "_restvr_", 20, 31, restvr, restvr_tail }
6107 };
6108
e86ce104 6109/* Called near the start of bfd_elf_size_dynamic_sections. We use
82bd7b59
AM
6110 this hook to a) provide some gcc support functions, and b) transfer
6111 dynamic linking information gathered so far on function code symbol
6112 entries, to their corresponding function descriptor symbol entries. */
deb0e272 6113
b34976b6 6114static bfd_boolean
4ce794b7
AM
6115ppc64_elf_func_desc_adjust (bfd *obfd ATTRIBUTE_UNUSED,
6116 struct bfd_link_info *info)
e86ce104
AM
6117{
6118 struct ppc_link_hash_table *htab;
6119
6120 htab = ppc_hash_table (info);
4dfe6ac6
NC
6121 if (htab == NULL)
6122 return FALSE;
6123
b32547cd
AM
6124 /* Provide any missing _save* and _rest* functions. */
6125 if (htab->sfpr != NULL)
6126 {
6127 unsigned int i;
6128
6129 htab->sfpr->size = 0;
6130 for (i = 0; i < ARRAY_SIZE (save_res_funcs); i++)
6131 if (!sfpr_define (info, &save_res_funcs[i], NULL))
6132 return FALSE;
6133 if (htab->sfpr->size == 0)
6134 htab->sfpr->flags |= SEC_EXCLUDE;
6135 }
6136
6137 if (bfd_link_relocatable (info))
6138 return TRUE;
6139
6140 if (htab->elf.hgot != NULL)
dba6fa9b
AM
6141 {
6142 _bfd_elf_link_hash_hide_symbol (info, htab->elf.hgot, TRUE);
6143 /* Make .TOC. defined so as to prevent it being made dynamic.
6144 The wrong value here is fixed later in ppc64_elf_set_toc. */
43417696
AM
6145 if (!htab->elf.hgot->def_regular
6146 || htab->elf.hgot->root.type != bfd_link_hash_defined)
6147 {
6148 htab->elf.hgot->root.type = bfd_link_hash_defined;
6149 htab->elf.hgot->root.u.def.value = 0;
6150 htab->elf.hgot->root.u.def.section = bfd_abs_section_ptr;
6151 htab->elf.hgot->def_regular = 1;
6152 htab->elf.hgot->root.linker_def = 1;
6153 }
dba6fa9b 6154 htab->elf.hgot->type = STT_OBJECT;
2cdcc330
AM
6155 htab->elf.hgot->other
6156 = (htab->elf.hgot->other & ~ELF_ST_VISIBILITY (-1)) | STV_HIDDEN;
dba6fa9b 6157 }
c66bb0ee 6158
8c5b4e52
AM
6159 if (htab->need_func_desc_adj)
6160 {
6161 elf_link_hash_traverse (&htab->elf, func_desc_adjust, info);
6162 htab->need_func_desc_adj = 0;
6163 }
805fc799 6164
b34976b6 6165 return TRUE;
e86ce104
AM
6166}
6167
98bbb1b8 6168/* Find dynamic relocs for H that apply to read-only sections. */
a345bc8d 6169
98bbb1b8 6170static asection *
a345bc8d
AM
6171readonly_dynrelocs (struct elf_link_hash_entry *h)
6172{
6173 struct ppc_link_hash_entry *eh;
6174 struct elf_dyn_relocs *p;
6175
6176 eh = (struct ppc_link_hash_entry *) h;
6177 for (p = eh->dyn_relocs; p != NULL; p = p->next)
6178 {
6179 asection *s = p->sec->output_section;
6180
6181 if (s != NULL && (s->flags & SEC_READONLY) != 0)
98bbb1b8 6182 return p->sec;
a345bc8d 6183 }
98bbb1b8 6184 return NULL;
a345bc8d
AM
6185}
6186
d311bc8b 6187/* Return true if we have dynamic relocs against H or any of its weak
ab2477e1
AM
6188 aliases, that apply to read-only sections. Cannot be used after
6189 size_dynamic_sections. */
d311bc8b
AM
6190
6191static bfd_boolean
6192alias_readonly_dynrelocs (struct elf_link_hash_entry *h)
6193{
6194 struct ppc_link_hash_entry *eh;
6195
6196 eh = (struct ppc_link_hash_entry *) h;
6197 do
6198 {
6199 if (readonly_dynrelocs (&eh->elf))
6200 return TRUE;
ab2477e1 6201 eh = (struct ppc_link_hash_entry *) eh->elf.u.alias;
2cdcc330
AM
6202 }
6203 while (eh != NULL && &eh->elf != h);
d311bc8b
AM
6204
6205 return FALSE;
6206}
8a2058b5 6207
8a9e8e72
AM
6208/* Return whether EH has pc-relative dynamic relocs. */
6209
6210static bfd_boolean
6211pc_dynrelocs (struct ppc_link_hash_entry *eh)
6212{
6213 struct elf_dyn_relocs *p;
6214
6215 for (p = eh->dyn_relocs; p != NULL; p = p->next)
6216 if (p->pc_count != 0)
6217 return TRUE;
6218 return FALSE;
6219}
6220
8a2058b5
AM
6221/* Return true if a global entry stub will be created for H. Valid
6222 for ELFv2 before plt entries have been allocated. */
6223
6224static bfd_boolean
6225global_entry_stub (struct elf_link_hash_entry *h)
6226{
6227 struct plt_entry *pent;
6228
6229 if (!h->pointer_equality_needed
6230 || h->def_regular)
6231 return FALSE;
6232
6233 for (pent = h->plt.plist; pent != NULL; pent = pent->next)
6234 if (pent->plt.refcount > 0
6235 && pent->addend == 0)
6236 return TRUE;
6237
6238 return FALSE;
6239}
6240
e86ce104
AM
6241/* Adjust a symbol defined by a dynamic object and referenced by a
6242 regular object. The current definition is in some section of the
6243 dynamic object, but we're not including those sections. We have to
6244 change the definition to something the rest of the link can
6245 understand. */
6246
b34976b6 6247static bfd_boolean
4ce794b7
AM
6248ppc64_elf_adjust_dynamic_symbol (struct bfd_link_info *info,
6249 struct elf_link_hash_entry *h)
e86ce104
AM
6250{
6251 struct ppc_link_hash_table *htab;
5474d94f 6252 asection *s, *srel;
e86ce104
AM
6253
6254 htab = ppc_hash_table (info);
4dfe6ac6
NC
6255 if (htab == NULL)
6256 return FALSE;
e86ce104
AM
6257
6258 /* Deal with function syms. */
6259 if (h->type == STT_FUNC
e054468f 6260 || h->type == STT_GNU_IFUNC
f5385ebf 6261 || h->needs_plt)
e86ce104 6262 {
529fe20e
AM
6263 bfd_boolean local = (((struct ppc_link_hash_entry *) h)->save_res
6264 || SYMBOL_CALLS_LOCAL (info, h)
6265 || UNDEFWEAK_NO_DYNAMIC_RELOC (info, h));
6266 /* Discard dyn_relocs when non-pic if we've decided that a
6267 function symbol is local and not an ifunc. We keep dynamic
6268 relocs for ifuncs when local rather than always emitting a
6269 plt call stub for them and defining the symbol on the call
6270 stub. We can't do that for ELFv1 anyway (a function symbol
6271 is defined on a descriptor, not code) and it can be faster at
6272 run-time due to not needing to bounce through a stub. The
6273 dyn_relocs for ifuncs will be applied even in a static
6274 executable. */
6275 if (!bfd_link_pic (info)
6276 && h->type != STT_GNU_IFUNC
6277 && local)
6278 ((struct ppc_link_hash_entry *) h)->dyn_relocs = NULL;
6279
e86ce104
AM
6280 /* Clear procedure linkage table information for any symbol that
6281 won't need a .plt entry. */
411e1bfb
AM
6282 struct plt_entry *ent;
6283 for (ent = h->plt.plist; ent != NULL; ent = ent->next)
6284 if (ent->plt.refcount > 0)
6285 break;
8387904d 6286 if (ent == NULL
2d7ad24e
AM
6287 || (h->type != STT_GNU_IFUNC
6288 && local
3e04d765
AM
6289 && (htab->can_convert_all_inline_plt
6290 || (((struct ppc_link_hash_entry *) h)->tls_mask
6291 & (TLS_TLS | PLT_KEEP)) != PLT_KEEP)))
40b8271b 6292 {
411e1bfb 6293 h->plt.plist = NULL;
f5385ebf 6294 h->needs_plt = 0;
d1eca1e4 6295 h->pointer_equality_needed = 0;
40b8271b 6296 }
8a2058b5 6297 else if (abiversion (info->output_bfd) >= 2)
a345bc8d 6298 {
d1eca1e4
AM
6299 /* Taking a function's address in a read/write section
6300 doesn't require us to define the function symbol in the
6301 executable on a global entry stub. A dynamic reloc can
8a2058b5
AM
6302 be used instead. The reason we prefer a few more dynamic
6303 relocs is that calling via a global entry stub costs a
6304 few more instructions, and pointer_equality_needed causes
6305 extra work in ld.so when resolving these symbols. */
529fe20e 6306 if (global_entry_stub (h))
d1eca1e4 6307 {
ab2477e1 6308 if (!readonly_dynrelocs (h))
529fe20e
AM
6309 {
6310 h->pointer_equality_needed = 0;
04383fd1
AM
6311 /* If we haven't seen a branch reloc and the symbol
6312 isn't an ifunc then we don't need a plt entry. */
529fe20e
AM
6313 if (!h->needs_plt)
6314 h->plt.plist = NULL;
6315 }
6316 else if (!bfd_link_pic (info))
6317 /* We are going to be defining the function symbol on the
6318 plt stub, so no dyn_relocs needed when non-pic. */
6319 ((struct ppc_link_hash_entry *) h)->dyn_relocs = NULL;
d1eca1e4
AM
6320 }
6321
3988aed5
AM
6322 /* ELFv2 function symbols can't have copy relocs. */
6323 return TRUE;
6324 }
6325 else if (!h->needs_plt
ab2477e1 6326 && !readonly_dynrelocs (h))
3988aed5 6327 {
04383fd1
AM
6328 /* If we haven't seen a branch reloc and the symbol isn't an
6329 ifunc then we don't need a plt entry. */
3988aed5
AM
6330 h->plt.plist = NULL;
6331 h->pointer_equality_needed = 0;
a345bc8d
AM
6332 return TRUE;
6333 }
5bd4f169 6334 }
bbd7ec4a 6335 else
411e1bfb 6336 h->plt.plist = NULL;
5bd4f169
AM
6337
6338 /* If this is a weak symbol, and there is a real definition, the
6339 processor independent code will have arranged for us to see the
6340 real definition first, and we can just use the same value. */
60d67dc8 6341 if (h->is_weakalias)
5bd4f169 6342 {
60d67dc8
AM
6343 struct elf_link_hash_entry *def = weakdef (h);
6344 BFD_ASSERT (def->root.type == bfd_link_hash_defined);
6345 h->root.u.def.section = def->root.u.def.section;
6346 h->root.u.def.value = def->root.u.def.value;
4a7e5234
AM
6347 if (def->root.u.def.section == htab->elf.sdynbss
6348 || def->root.u.def.section == htab->elf.sdynrelro)
6349 ((struct ppc_link_hash_entry *) h)->dyn_relocs = NULL;
b34976b6 6350 return TRUE;
5bd4f169
AM
6351 }
6352
5bd4f169
AM
6353 /* If we are creating a shared library, we must presume that the
6354 only references to the symbol are via the global offset table.
6355 For such cases we need not do anything here; the relocations will
6356 be handled correctly by relocate_section. */
0e1862bb 6357 if (bfd_link_pic (info))
b34976b6 6358 return TRUE;
5bd4f169 6359
65f38f15
AM
6360 /* If there are no references to this symbol that do not use the
6361 GOT, we don't need to generate a copy reloc. */
f5385ebf 6362 if (!h->non_got_ref)
b34976b6 6363 return TRUE;
65f38f15 6364
b186458a 6365 /* Don't generate a copy reloc for symbols defined in the executable. */
d93d1c80 6366 if (!h->def_dynamic || !h->ref_regular || h->def_regular
b186458a 6367
d93d1c80
AM
6368 /* If -z nocopyreloc was given, don't generate them either. */
6369 || info->nocopyreloc
a127494f 6370
dce2246a 6371 /* If we don't find any dynamic relocs in read-only sections, then
d93d1c80 6372 we'll be keeping the dynamic relocs and avoiding the copy reloc. */
d311bc8b 6373 || (ELIMINATE_COPY_RELOCS && !alias_readonly_dynrelocs (h))
65f38f15 6374
d93d1c80
AM
6375 /* Protected variables do not work with .dynbss. The copy in
6376 .dynbss won't be used by the shared library with the protected
6377 definition for the variable. Text relocations are preferable
6378 to an incorrect program. */
6379 || h->protected_def)
529fe20e 6380 return TRUE;
a127494f 6381
5d35169e 6382 if (h->plt.plist != NULL)
97b639ba
AM
6383 {
6384 /* We should never get here, but unfortunately there are versions
6385 of gcc out there that improperly (for this ABI) put initialized
6386 function pointers, vtable refs and suchlike in read-only
6387 sections. Allow them to proceed, but warn that this might
6388 break at runtime. */
25f53a85 6389 info->callbacks->einfo
c1c8c1ef 6390 (_("%P: copy reloc against `%pT' requires lazy plt linking; "
25f53a85 6391 "avoid setting LD_BIND_NOW=1 or upgrade gcc\n"),
97b639ba
AM
6392 h->root.root.string);
6393 }
5d35169e
AM
6394
6395 /* This is a reference to a symbol defined by a dynamic object which
6396 is not a function. */
6397
5bd4f169
AM
6398 /* We must allocate the symbol in our .dynbss section, which will
6399 become part of the .bss section of the executable. There will be
6400 an entry for this symbol in the .dynsym section. The dynamic
6401 object will contain position independent code, so all references
6402 from the dynamic object to this symbol will go through the global
6403 offset table. The dynamic linker will use the .dynsym entry to
6404 determine the address it must put in the global offset table, so
6405 both the dynamic object and the regular object will refer to the
6406 same memory location for the variable. */
5474d94f
AM
6407 if ((h->root.u.def.section->flags & SEC_READONLY) != 0)
6408 {
6409 s = htab->elf.sdynrelro;
6410 srel = htab->elf.sreldynrelro;
6411 }
6412 else
6413 {
6414 s = htab->elf.sdynbss;
6415 srel = htab->elf.srelbss;
6416 }
1d7e9d18 6417 if ((h->root.u.def.section->flags & SEC_ALLOC) != 0 && h->size != 0)
5bd4f169 6418 {
4a7e5234
AM
6419 /* We must generate a R_PPC64_COPY reloc to tell the dynamic
6420 linker to copy the initial value out of the dynamic object
6421 and into the runtime process image. */
5474d94f 6422 srel->size += sizeof (Elf64_External_Rela);
f5385ebf 6423 h->needs_copy = 1;
5bd4f169
AM
6424 }
6425
529fe20e
AM
6426 /* We no longer want dyn_relocs. */
6427 ((struct ppc_link_hash_entry *) h)->dyn_relocs = NULL;
6cabe1ea 6428 return _bfd_elf_adjust_dynamic_copy (info, h, s);
5bd4f169
AM
6429}
6430
e86ce104
AM
6431/* If given a function descriptor symbol, hide both the function code
6432 sym and the descriptor. */
6433static void
4ce794b7
AM
6434ppc64_elf_hide_symbol (struct bfd_link_info *info,
6435 struct elf_link_hash_entry *h,
6436 bfd_boolean force_local)
e86ce104 6437{
34814b9f 6438 struct ppc_link_hash_entry *eh;
e86ce104
AM
6439 _bfd_elf_link_hash_hide_symbol (info, h, force_local);
6440
87469ba2
AM
6441 if (ppc_hash_table (info) == NULL)
6442 return;
6443
34814b9f
AM
6444 eh = (struct ppc_link_hash_entry *) h;
6445 if (eh->is_func_descriptor)
e86ce104 6446 {
34814b9f 6447 struct ppc_link_hash_entry *fh = eh->oh;
e86ce104 6448
721956f4 6449 if (fh == NULL)
d1329ca3
AM
6450 {
6451 const char *p, *q;
b8ac2841 6452 struct elf_link_hash_table *htab = elf_hash_table (info);
d1329ca3
AM
6453 char save;
6454
6455 /* We aren't supposed to use alloca in BFD because on
6456 systems which do not have alloca the version in libiberty
6457 calls xmalloc, which might cause the program to crash
6458 when it runs out of memory. This function doesn't have a
6459 return status, so there's no way to gracefully return an
6460 error. So cheat. We know that string[-1] can be safely
34814b9f
AM
6461 accessed; It's either a string in an ELF string table,
6462 or allocated in an objalloc structure. */
d1329ca3 6463
34814b9f 6464 p = eh->elf.root.root.string - 1;
d1329ca3
AM
6465 save = *p;
6466 *(char *) p = '.';
34814b9f 6467 fh = (struct ppc_link_hash_entry *)
b8ac2841 6468 elf_link_hash_lookup (htab, p, FALSE, FALSE, FALSE);
d1329ca3
AM
6469 *(char *) p = save;
6470
6471 /* Unfortunately, if it so happens that the string we were
6472 looking for was allocated immediately before this string,
6473 then we overwrote the string terminator. That's the only
6474 reason the lookup should fail. */
6475 if (fh == NULL)
6476 {
34814b9f
AM
6477 q = eh->elf.root.root.string + strlen (eh->elf.root.root.string);
6478 while (q >= eh->elf.root.root.string && *q == *p)
d1329ca3 6479 --q, --p;
34814b9f
AM
6480 if (q < eh->elf.root.root.string && *p == '.')
6481 fh = (struct ppc_link_hash_entry *)
b8ac2841 6482 elf_link_hash_lookup (htab, p, FALSE, FALSE, FALSE);
d1329ca3
AM
6483 }
6484 if (fh != NULL)
6485 {
34814b9f
AM
6486 eh->oh = fh;
6487 fh->oh = eh;
d1329ca3
AM
6488 }
6489 }
e86ce104 6490 if (fh != NULL)
34814b9f 6491 _bfd_elf_link_hash_hide_symbol (info, &fh->elf, force_local);
e86ce104
AM
6492 }
6493}
6494
411e1bfb 6495static bfd_boolean
8843416a
AM
6496get_sym_h (struct elf_link_hash_entry **hp,
6497 Elf_Internal_Sym **symp,
6498 asection **symsecp,
f961d9dd 6499 unsigned char **tls_maskp,
8843416a
AM
6500 Elf_Internal_Sym **locsymsp,
6501 unsigned long r_symndx,
6502 bfd *ibfd)
411e1bfb 6503{
0ffa91dd 6504 Elf_Internal_Shdr *symtab_hdr = &elf_symtab_hdr (ibfd);
411e1bfb
AM
6505
6506 if (r_symndx >= symtab_hdr->sh_info)
6507 {
6508 struct elf_link_hash_entry **sym_hashes = elf_sym_hashes (ibfd);
6509 struct elf_link_hash_entry *h;
6510
6511 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
b31867b6 6512 h = elf_follow_link (h);
411e1bfb
AM
6513
6514 if (hp != NULL)
6515 *hp = h;
6516
6517 if (symp != NULL)
6518 *symp = NULL;
6519
6520 if (symsecp != NULL)
6521 {
6522 asection *symsec = NULL;
6523 if (h->root.type == bfd_link_hash_defined
6524 || h->root.type == bfd_link_hash_defweak)
6525 symsec = h->root.u.def.section;
6526 *symsecp = symsec;
6527 }
6528
e7b938ca 6529 if (tls_maskp != NULL)
411e1bfb
AM
6530 {
6531 struct ppc_link_hash_entry *eh;
6532
6533 eh = (struct ppc_link_hash_entry *) h;
e7b938ca 6534 *tls_maskp = &eh->tls_mask;
411e1bfb
AM
6535 }
6536 }
6537 else
6538 {
6539 Elf_Internal_Sym *sym;
6540 Elf_Internal_Sym *locsyms = *locsymsp;
6541
6542 if (locsyms == NULL)
6543 {
6544 locsyms = (Elf_Internal_Sym *) symtab_hdr->contents;
6545 if (locsyms == NULL)
6546 locsyms = bfd_elf_get_elf_syms (ibfd, symtab_hdr,
6547 symtab_hdr->sh_info,
6548 0, NULL, NULL, NULL);
6549 if (locsyms == NULL)
6550 return FALSE;
6551 *locsymsp = locsyms;
6552 }
6553 sym = locsyms + r_symndx;
6554
6555 if (hp != NULL)
6556 *hp = NULL;
6557
6558 if (symp != NULL)
6559 *symp = sym;
6560
6561 if (symsecp != NULL)
cb33740c 6562 *symsecp = bfd_section_from_elf_index (ibfd, sym->st_shndx);
411e1bfb 6563
e7b938ca 6564 if (tls_maskp != NULL)
411e1bfb
AM
6565 {
6566 struct got_entry **lgot_ents;
f961d9dd 6567 unsigned char *tls_mask;
411e1bfb 6568
e7b938ca 6569 tls_mask = NULL;
411e1bfb
AM
6570 lgot_ents = elf_local_got_ents (ibfd);
6571 if (lgot_ents != NULL)
6572 {
e054468f
AM
6573 struct plt_entry **local_plt = (struct plt_entry **)
6574 (lgot_ents + symtab_hdr->sh_info);
f961d9dd 6575 unsigned char *lgot_masks = (unsigned char *)
e054468f 6576 (local_plt + symtab_hdr->sh_info);
e7b938ca 6577 tls_mask = &lgot_masks[r_symndx];
411e1bfb 6578 }
e7b938ca 6579 *tls_maskp = tls_mask;
411e1bfb
AM
6580 }
6581 }
6582 return TRUE;
6583}
6584
e7b938ca 6585/* Returns TLS_MASKP for the given REL symbol. Function return is 0 on
951fd09b 6586 error, 2 on a toc GD type suitable for optimization, 3 on a toc LD
ad8e1ba5 6587 type suitable for optimization, and 1 otherwise. */
951fd09b
AM
6588
6589static int
f961d9dd 6590get_tls_mask (unsigned char **tls_maskp,
3a71aa26
AM
6591 unsigned long *toc_symndx,
6592 bfd_vma *toc_addend,
0d4792f7 6593 Elf_Internal_Sym **locsymsp,
3a71aa26
AM
6594 const Elf_Internal_Rela *rel,
6595 bfd *ibfd)
411e1bfb
AM
6596{
6597 unsigned long r_symndx;
0d4792f7 6598 int next_r;
411e1bfb
AM
6599 struct elf_link_hash_entry *h;
6600 Elf_Internal_Sym *sym;
6601 asection *sec;
6602 bfd_vma off;
6603
6604 r_symndx = ELF64_R_SYM (rel->r_info);
e7b938ca 6605 if (!get_sym_h (&h, &sym, &sec, tls_maskp, locsymsp, r_symndx, ibfd))
951fd09b 6606 return 0;
411e1bfb 6607
37da22e5
AM
6608 if ((*tls_maskp != NULL
6609 && (**tls_maskp & TLS_TLS) != 0
6610 && **tls_maskp != (TLS_TLS | TLS_MARK))
411e1bfb 6611 || sec == NULL
6bee8834 6612 || ppc64_elf_section_data (sec) == NULL
7c8fe5c4 6613 || ppc64_elf_section_data (sec)->sec_type != sec_toc)
951fd09b 6614 return 1;
411e1bfb
AM
6615
6616 /* Look inside a TOC section too. */
6617 if (h != NULL)
6618 {
6619 BFD_ASSERT (h->root.type == bfd_link_hash_defined);
6620 off = h->root.u.def.value;
6621 }
6622 else
6623 off = sym->st_value;
6624 off += rel->r_addend;
6625 BFD_ASSERT (off % 8 == 0);
3a71aa26
AM
6626 r_symndx = ppc64_elf_section_data (sec)->u.toc.symndx[off / 8];
6627 next_r = ppc64_elf_section_data (sec)->u.toc.symndx[off / 8 + 1];
0d4792f7
AM
6628 if (toc_symndx != NULL)
6629 *toc_symndx = r_symndx;
3a71aa26
AM
6630 if (toc_addend != NULL)
6631 *toc_addend = ppc64_elf_section_data (sec)->u.toc.add[off / 8];
6632 if (!get_sym_h (&h, &sym, &sec, tls_maskp, locsymsp, r_symndx, ibfd))
6633 return 0;
854b41e7 6634 if ((h == NULL || is_static_defined (h))
0d4792f7
AM
6635 && (next_r == -1 || next_r == -2))
6636 return 1 - next_r;
951fd09b 6637 return 1;
411e1bfb
AM
6638}
6639
3b421ab3
AM
6640/* Find (or create) an entry in the tocsave hash table. */
6641
6642static struct tocsave_entry *
6643tocsave_find (struct ppc_link_hash_table *htab,
6644 enum insert_option insert,
6645 Elf_Internal_Sym **local_syms,
6646 const Elf_Internal_Rela *irela,
6647 bfd *ibfd)
6648{
6649 unsigned long r_indx;
6650 struct elf_link_hash_entry *h;
6651 Elf_Internal_Sym *sym;
6652 struct tocsave_entry ent, *p;
6653 hashval_t hash;
6654 struct tocsave_entry **slot;
6655
6656 r_indx = ELF64_R_SYM (irela->r_info);
6657 if (!get_sym_h (&h, &sym, &ent.sec, NULL, local_syms, r_indx, ibfd))
6658 return NULL;
6659 if (ent.sec == NULL || ent.sec->output_section == NULL)
6660 {
4eca0228 6661 _bfd_error_handler
871b3ab2 6662 (_("%pB: undefined symbol on R_PPC64_TOCSAVE relocation"), ibfd);
3b421ab3
AM
6663 return NULL;
6664 }
6665
6666 if (h != NULL)
6667 ent.offset = h->root.u.def.value;
6668 else
6669 ent.offset = sym->st_value;
6670 ent.offset += irela->r_addend;
6671
6672 hash = tocsave_htab_hash (&ent);
6673 slot = ((struct tocsave_entry **)
6674 htab_find_slot_with_hash (htab->tocsave_htab, &ent, hash, insert));
6675 if (slot == NULL)
6676 return NULL;
6677
6678 if (*slot == NULL)
6679 {
6680 p = (struct tocsave_entry *) bfd_alloc (ibfd, sizeof (*p));
6681 if (p == NULL)
6682 return NULL;
6683 *p = ent;
6684 *slot = p;
6685 }
6686 return *slot;
6687}
6688
754021d0 6689/* Adjust all global syms defined in opd sections. In gcc generated
8387904d 6690 code for the old ABI, these will already have been done. */
754021d0
AM
6691
6692static bfd_boolean
6693adjust_opd_syms (struct elf_link_hash_entry *h, void *inf ATTRIBUTE_UNUSED)
6694{
6695 struct ppc_link_hash_entry *eh;
6696 asection *sym_sec;
74f0fb50 6697 struct _opd_sec_data *opd;
754021d0
AM
6698
6699 if (h->root.type == bfd_link_hash_indirect)
6700 return TRUE;
6701
754021d0
AM
6702 if (h->root.type != bfd_link_hash_defined
6703 && h->root.type != bfd_link_hash_defweak)
6704 return TRUE;
6705
6706 eh = (struct ppc_link_hash_entry *) h;
6707 if (eh->adjust_done)
6708 return TRUE;
6709
6710 sym_sec = eh->elf.root.u.def.section;
74f0fb50
AM
6711 opd = get_opd_info (sym_sec);
6712 if (opd != NULL && opd->adjust != NULL)
754021d0 6713 {
51aecdc5 6714 long adjust = opd->adjust[OPD_NDX (eh->elf.root.u.def.value)];
4025353c
AM
6715 if (adjust == -1)
6716 {
6717 /* This entry has been deleted. */
b3fac117 6718 asection *dsec = ppc64_elf_tdata (sym_sec->owner)->deleted_section;
81688140
AM
6719 if (dsec == NULL)
6720 {
6721 for (dsec = sym_sec->owner->sections; dsec; dsec = dsec->next)
dbaa2011 6722 if (discarded_section (dsec))
81688140 6723 {
b3fac117 6724 ppc64_elf_tdata (sym_sec->owner)->deleted_section = dsec;
81688140
AM
6725 break;
6726 }
6727 }
4025353c 6728 eh->elf.root.u.def.value = 0;
81688140 6729 eh->elf.root.u.def.section = dsec;
4025353c
AM
6730 }
6731 else
6732 eh->elf.root.u.def.value += adjust;
754021d0
AM
6733 eh->adjust_done = 1;
6734 }
6735 return TRUE;
6736}
6737
8c1d1bb8 6738/* Handles decrementing dynamic reloc counts for the reloc specified by
19e08130 6739 R_INFO in section SEC. If LOCAL_SYMS is NULL, then H and SYM
8c1d1bb8
AM
6740 have already been determined. */
6741
6742static bfd_boolean
6743dec_dynrel_count (bfd_vma r_info,
6744 asection *sec,
6745 struct bfd_link_info *info,
6746 Elf_Internal_Sym **local_syms,
6747 struct elf_link_hash_entry *h,
19e08130 6748 Elf_Internal_Sym *sym)
8c1d1bb8
AM
6749{
6750 enum elf_ppc64_reloc_type r_type;
19e08130 6751 asection *sym_sec = NULL;
8c1d1bb8
AM
6752
6753 /* Can this reloc be dynamic? This switch, and later tests here
6754 should be kept in sync with the code in check_relocs. */
6755 r_type = ELF64_R_TYPE (r_info);
6756 switch (r_type)
6757 {
6758 default:
6759 return TRUE;
6760
6761 case R_PPC64_TPREL16:
6762 case R_PPC64_TPREL16_LO:
6763 case R_PPC64_TPREL16_HI:
6764 case R_PPC64_TPREL16_HA:
6765 case R_PPC64_TPREL16_DS:
6766 case R_PPC64_TPREL16_LO_DS:
f9c6b907
AM
6767 case R_PPC64_TPREL16_HIGH:
6768 case R_PPC64_TPREL16_HIGHA:
8c1d1bb8
AM
6769 case R_PPC64_TPREL16_HIGHER:
6770 case R_PPC64_TPREL16_HIGHERA:
6771 case R_PPC64_TPREL16_HIGHEST:
6772 case R_PPC64_TPREL16_HIGHESTA:
8c1d1bb8
AM
6773 case R_PPC64_TPREL64:
6774 case R_PPC64_DTPMOD64:
6775 case R_PPC64_DTPREL64:
6776 case R_PPC64_ADDR64:
6777 case R_PPC64_REL30:
6778 case R_PPC64_REL32:
6779 case R_PPC64_REL64:
6780 case R_PPC64_ADDR14:
6781 case R_PPC64_ADDR14_BRNTAKEN:
6782 case R_PPC64_ADDR14_BRTAKEN:
6783 case R_PPC64_ADDR16:
6784 case R_PPC64_ADDR16_DS:
6785 case R_PPC64_ADDR16_HA:
6786 case R_PPC64_ADDR16_HI:
f9c6b907
AM
6787 case R_PPC64_ADDR16_HIGH:
6788 case R_PPC64_ADDR16_HIGHA:
8c1d1bb8
AM
6789 case R_PPC64_ADDR16_HIGHER:
6790 case R_PPC64_ADDR16_HIGHERA:
6791 case R_PPC64_ADDR16_HIGHEST:
6792 case R_PPC64_ADDR16_HIGHESTA:
6793 case R_PPC64_ADDR16_LO:
6794 case R_PPC64_ADDR16_LO_DS:
6795 case R_PPC64_ADDR24:
6796 case R_PPC64_ADDR32:
6797 case R_PPC64_UADDR16:
6798 case R_PPC64_UADDR32:
6799 case R_PPC64_UADDR64:
6800 case R_PPC64_TOC:
5663e321
AM
6801 case R_PPC64_D34:
6802 case R_PPC64_D34_LO:
6803 case R_PPC64_D34_HI30:
6804 case R_PPC64_D34_HA30:
6805 case R_PPC64_ADDR16_HIGHER34:
6806 case R_PPC64_ADDR16_HIGHERA34:
6807 case R_PPC64_ADDR16_HIGHEST34:
6808 case R_PPC64_ADDR16_HIGHESTA34:
6809 case R_PPC64_D28:
8c1d1bb8
AM
6810 break;
6811 }
6812
6813 if (local_syms != NULL)
6814 {
6815 unsigned long r_symndx;
8c1d1bb8
AM
6816 bfd *ibfd = sec->owner;
6817
6818 r_symndx = ELF64_R_SYM (r_info);
6819 if (!get_sym_h (&h, &sym, &sym_sec, NULL, local_syms, r_symndx, ibfd))
6820 return FALSE;
6821 }
6822
0e1862bb 6823 if ((bfd_link_pic (info)
1d483afe 6824 && (must_be_dyn_reloc (info, r_type)
8c1d1bb8 6825 || (h != NULL
198f1157 6826 && (!SYMBOLIC_BIND (info, h)
8c1d1bb8
AM
6827 || h->root.type == bfd_link_hash_defweak
6828 || !h->def_regular))))
6829 || (ELIMINATE_COPY_RELOCS
0e1862bb 6830 && !bfd_link_pic (info)
8c1d1bb8
AM
6831 && h != NULL
6832 && (h->root.type == bfd_link_hash_defweak
6833 || !h->def_regular)))
6834 ;
6835 else
6836 return TRUE;
6837
6838 if (h != NULL)
6edfbbad 6839 {
19e08130
AM
6840 struct elf_dyn_relocs *p;
6841 struct elf_dyn_relocs **pp;
6842 pp = &((struct ppc_link_hash_entry *) h)->dyn_relocs;
6843
6844 /* elf_gc_sweep may have already removed all dyn relocs associated
6845 with local syms for a given section. Also, symbol flags are
6846 changed by elf_gc_sweep_symbol, confusing the test above. Don't
6847 report a dynreloc miscount. */
6848 if (*pp == NULL && info->gc_sections)
6849 return TRUE;
6850
6851 while ((p = *pp) != NULL)
60124e18 6852 {
19e08130
AM
6853 if (p->sec == sec)
6854 {
6855 if (!must_be_dyn_reloc (info, r_type))
6856 p->pc_count -= 1;
6857 p->count -= 1;
6858 if (p->count == 0)
6859 *pp = p->next;
6860 return TRUE;
6861 }
6862 pp = &p->next;
60124e18 6863 }
6edfbbad 6864 }
19e08130
AM
6865 else
6866 {
6867 struct ppc_dyn_relocs *p;
6868 struct ppc_dyn_relocs **pp;
6869 void *vpp;
6870 bfd_boolean is_ifunc;
8c1d1bb8 6871
19e08130
AM
6872 if (local_syms == NULL)
6873 sym_sec = bfd_section_from_elf_index (sec->owner, sym->st_shndx);
6874 if (sym_sec == NULL)
6875 sym_sec = sec;
c57da1a7 6876
19e08130
AM
6877 vpp = &elf_section_data (sym_sec)->local_dynrel;
6878 pp = (struct ppc_dyn_relocs **) vpp;
6879
6880 if (*pp == NULL && info->gc_sections)
6881 return TRUE;
6882
6883 is_ifunc = ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC;
6884 while ((p = *pp) != NULL)
8c1d1bb8 6885 {
19e08130
AM
6886 if (p->sec == sec && p->ifunc == is_ifunc)
6887 {
6888 p->count -= 1;
6889 if (p->count == 0)
6890 *pp = p->next;
6891 return TRUE;
6892 }
6893 pp = &p->next;
8c1d1bb8 6894 }
8c1d1bb8
AM
6895 }
6896
695344c0 6897 /* xgettext:c-format */
cf97bcb0
AM
6898 _bfd_error_handler (_("dynreloc miscount for %pB, section %pA"),
6899 sec->owner, sec);
8c1d1bb8
AM
6900 bfd_set_error (bfd_error_bad_value);
6901 return FALSE;
6902}
6903
754021d0
AM
6904/* Remove unused Official Procedure Descriptor entries. Currently we
6905 only remove those associated with functions in discarded link-once
6906 sections, or weakly defined functions that have been overridden. It
6907 would be possible to remove many more entries for statically linked
6908 applications. */
6909
b34976b6 6910bfd_boolean
e7d1c40c 6911ppc64_elf_edit_opd (struct bfd_link_info *info)
1e2f5b6e
AM
6912{
6913 bfd *ibfd;
754021d0 6914 bfd_boolean some_edited = FALSE;
3f764659 6915 asection *need_pad = NULL;
e7d1c40c
AM
6916 struct ppc_link_hash_table *htab;
6917
6918 htab = ppc_hash_table (info);
6919 if (htab == NULL)
6920 return FALSE;
1e2f5b6e 6921
c72f2fb2 6922 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
1e2f5b6e
AM
6923 {
6924 asection *sec;
6925 Elf_Internal_Rela *relstart, *rel, *relend;
6926 Elf_Internal_Shdr *symtab_hdr;
6cdc0ccc 6927 Elf_Internal_Sym *local_syms;
74f0fb50 6928 struct _opd_sec_data *opd;
51aecdc5 6929 bfd_boolean need_edit, add_aux_fields, broken;
3f764659 6930 bfd_size_type cnt_16b = 0;
1e2f5b6e 6931
854b41e7
AM
6932 if (!is_ppc64_elf (ibfd))
6933 continue;
6934
1e2f5b6e 6935 sec = bfd_get_section_by_name (ibfd, ".opd");
46de2a7c 6936 if (sec == NULL || sec->size == 0)
1e2f5b6e
AM
6937 continue;
6938
dbaa2011 6939 if (sec->sec_info_type == SEC_INFO_TYPE_JUST_SYMS)
4b85d634
AM
6940 continue;
6941
1e2f5b6e
AM
6942 if (sec->output_section == bfd_abs_section_ptr)
6943 continue;
6944
6945 /* Look through the section relocs. */
6946 if ((sec->flags & SEC_RELOC) == 0 || sec->reloc_count == 0)
6947 continue;
6948
6cdc0ccc 6949 local_syms = NULL;
0ffa91dd 6950 symtab_hdr = &elf_symtab_hdr (ibfd);
1e2f5b6e
AM
6951
6952 /* Read the relocations. */
4ce794b7 6953 relstart = _bfd_elf_link_read_relocs (ibfd, sec, NULL, NULL,
45d6a902 6954 info->keep_memory);
1e2f5b6e 6955 if (relstart == NULL)
b34976b6 6956 return FALSE;
1e2f5b6e
AM
6957
6958 /* First run through the relocs to check they are sane, and to
6959 determine whether we need to edit this opd section. */
b34976b6 6960 need_edit = FALSE;
51aecdc5 6961 broken = FALSE;
3f764659 6962 need_pad = sec;
1e2f5b6e 6963 relend = relstart + sec->reloc_count;
50bc7936 6964 for (rel = relstart; rel < relend; )
1e2f5b6e 6965 {
04c9666a 6966 enum elf_ppc64_reloc_type r_type;
1e2f5b6e
AM
6967 unsigned long r_symndx;
6968 asection *sym_sec;
6969 struct elf_link_hash_entry *h;
6970 Elf_Internal_Sym *sym;
51aecdc5 6971 bfd_vma offset;
1e2f5b6e 6972
51aecdc5 6973 /* .opd contains an array of 16 or 24 byte entries. We're
1e2f5b6e
AM
6974 only interested in the reloc pointing to a function entry
6975 point. */
51aecdc5
AM
6976 offset = rel->r_offset;
6977 if (rel + 1 == relend
6978 || rel[1].r_offset != offset + 8)
1e2f5b6e
AM
6979 {
6980 /* If someone messes with .opd alignment then after a
6981 "ld -r" we might have padding in the middle of .opd.
6982 Also, there's nothing to prevent someone putting
6983 something silly in .opd with the assembler. No .opd
b34976b6 6984 optimization for them! */
3f764659 6985 broken_opd:
4eca0228 6986 _bfd_error_handler
871b3ab2 6987 (_("%pB: .opd is not a regular array of opd entries"), ibfd);
51aecdc5 6988 broken = TRUE;
1e2f5b6e
AM
6989 break;
6990 }
6991
50bc7936
AM
6992 if ((r_type = ELF64_R_TYPE (rel->r_info)) != R_PPC64_ADDR64
6993 || (r_type = ELF64_R_TYPE ((rel + 1)->r_info)) != R_PPC64_TOC)
6994 {
4eca0228 6995 _bfd_error_handler
695344c0 6996 /* xgettext:c-format */
871b3ab2 6997 (_("%pB: unexpected reloc type %u in .opd section"),
d003868e 6998 ibfd, r_type);
51aecdc5 6999 broken = TRUE;
50bc7936
AM
7000 break;
7001 }
7002
1e2f5b6e 7003 r_symndx = ELF64_R_SYM (rel->r_info);
411e1bfb
AM
7004 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms,
7005 r_symndx, ibfd))
50bc7936 7006 goto error_ret;
1e2f5b6e
AM
7007
7008 if (sym_sec == NULL || sym_sec->owner == NULL)
7009 {
411e1bfb
AM
7010 const char *sym_name;
7011 if (h != NULL)
7012 sym_name = h->root.root.string;
7013 else
26c61ae5
L
7014 sym_name = bfd_elf_sym_name (ibfd, symtab_hdr, sym,
7015 sym_sec);
411e1bfb 7016
4eca0228 7017 _bfd_error_handler
695344c0 7018 /* xgettext:c-format */
871b3ab2 7019 (_("%pB: undefined sym `%s' in .opd section"),
d003868e 7020 ibfd, sym_name);
51aecdc5 7021 broken = TRUE;
1e2f5b6e
AM
7022 break;
7023 }
7024
51020317
AM
7025 /* opd entries are always for functions defined in the
7026 current input bfd. If the symbol isn't defined in the
7027 input bfd, then we won't be using the function in this
7028 bfd; It must be defined in a linkonce section in another
7029 bfd, or is weak. It's also possible that we are
7030 discarding the function due to a linker script /DISCARD/,
7031 which we test for via the output_section. */
7032 if (sym_sec->owner != ibfd
7033 || sym_sec->output_section == bfd_abs_section_ptr)
b34976b6 7034 need_edit = TRUE;
1e2f5b6e 7035
50bc7936 7036 rel += 2;
51aecdc5
AM
7037 if (rel + 1 == relend
7038 || (rel + 2 < relend
7039 && ELF64_R_TYPE (rel[2].r_info) == R_PPC64_TOC))
7040 ++rel;
7041
7042 if (rel == relend)
3f764659
JJ
7043 {
7044 if (sec->size == offset + 24)
7045 {
7046 need_pad = NULL;
7047 break;
7048 }
51aecdc5 7049 if (sec->size == offset + 16)
3f764659
JJ
7050 {
7051 cnt_16b++;
7052 break;
7053 }
7054 goto broken_opd;
7055 }
3f764659
JJ
7056 else if (rel + 1 < relend
7057 && ELF64_R_TYPE (rel[0].r_info) == R_PPC64_ADDR64
7058 && ELF64_R_TYPE (rel[1].r_info) == R_PPC64_TOC)
7059 {
51aecdc5
AM
7060 if (rel[0].r_offset == offset + 16)
7061 cnt_16b++;
7062 else if (rel[0].r_offset != offset + 24)
7063 goto broken_opd;
3f764659
JJ
7064 }
7065 else
7066 goto broken_opd;
1e2f5b6e
AM
7067 }
7068
e7d1c40c 7069 add_aux_fields = htab->params->non_overlapping_opd && cnt_16b > 0;
3f764659 7070
51aecdc5 7071 if (!broken && (need_edit || add_aux_fields))
1e2f5b6e
AM
7072 {
7073 Elf_Internal_Rela *write_rel;
d4730f92 7074 Elf_Internal_Shdr *rel_hdr;
1e2f5b6e 7075 bfd_byte *rptr, *wptr;
983bddc8 7076 bfd_byte *new_contents;
74f0fb50
AM
7077 bfd_size_type amt;
7078
983bddc8 7079 new_contents = NULL;
51aecdc5 7080 amt = OPD_NDX (sec->size) * sizeof (long);
74f0fb50 7081 opd = &ppc64_elf_section_data (sec)->u.opd;
33c0ec9d 7082 opd->adjust = bfd_zalloc (sec->owner, amt);
74f0fb50
AM
7083 if (opd->adjust == NULL)
7084 return FALSE;
1e2f5b6e
AM
7085
7086 /* This seems a waste of time as input .opd sections are all
7087 zeros as generated by gcc, but I suppose there's no reason
7088 this will always be so. We might start putting something in
7089 the third word of .opd entries. */
7090 if ((sec->flags & SEC_IN_MEMORY) == 0)
7091 {
eea6121a
AM
7092 bfd_byte *loc;
7093 if (!bfd_malloc_and_get_section (ibfd, sec, &loc))
6cdc0ccc 7094 {
eea6121a
AM
7095 if (loc != NULL)
7096 free (loc);
50bc7936 7097 error_ret:
6cdc0ccc
AM
7098 if (local_syms != NULL
7099 && symtab_hdr->contents != (unsigned char *) local_syms)
7100 free (local_syms);
6cdc0ccc
AM
7101 if (elf_section_data (sec)->relocs != relstart)
7102 free (relstart);
b34976b6 7103 return FALSE;
6cdc0ccc 7104 }
1e2f5b6e
AM
7105 sec->contents = loc;
7106 sec->flags |= (SEC_IN_MEMORY | SEC_HAS_CONTENTS);
7107 }
7108
7109 elf_section_data (sec)->relocs = relstart;
7110
3f764659 7111 new_contents = sec->contents;
3f764659
JJ
7112 if (add_aux_fields)
7113 {
7114 new_contents = bfd_malloc (sec->size + cnt_16b * 8);
7115 if (new_contents == NULL)
7116 return FALSE;
51aecdc5 7117 need_pad = NULL;
3f764659 7118 }
b4f4e59f
AM
7119 wptr = new_contents;
7120 rptr = sec->contents;
1e2f5b6e 7121 write_rel = relstart;
51aecdc5 7122 for (rel = relstart; rel < relend; )
1e2f5b6e 7123 {
50bc7936
AM
7124 unsigned long r_symndx;
7125 asection *sym_sec;
7126 struct elf_link_hash_entry *h;
51aecdc5 7127 struct ppc_link_hash_entry *fdh = NULL;
50bc7936 7128 Elf_Internal_Sym *sym;
51aecdc5
AM
7129 long opd_ent_size;
7130 Elf_Internal_Rela *next_rel;
7131 bfd_boolean skip;
50bc7936
AM
7132
7133 r_symndx = ELF64_R_SYM (rel->r_info);
7134 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms,
d37c89e5 7135 r_symndx, ibfd))
50bc7936
AM
7136 goto error_ret;
7137
51aecdc5
AM
7138 next_rel = rel + 2;
7139 if (next_rel + 1 == relend
7140 || (next_rel + 2 < relend
7141 && ELF64_R_TYPE (next_rel[2].r_info) == R_PPC64_TOC))
7142 ++next_rel;
7143
7144 /* See if the .opd entry is full 24 byte or
7145 16 byte (with fd_aux entry overlapped with next
7146 fd_func). */
7147 opd_ent_size = 24;
7148 if (next_rel == relend)
1e2f5b6e 7149 {
51aecdc5 7150 if (sec->size == rel->r_offset + 16)
3f764659 7151 opd_ent_size = 16;
51aecdc5
AM
7152 }
7153 else if (next_rel->r_offset == rel->r_offset + 16)
7154 opd_ent_size = 16;
3f764659 7155
51aecdc5
AM
7156 if (h != NULL
7157 && h->root.root.string[0] == '.')
7158 {
8c5b4e52
AM
7159 fdh = ((struct ppc_link_hash_entry *) h)->oh;
7160 if (fdh != NULL)
7161 {
7162 fdh = ppc_follow_link (fdh);
7163 if (fdh->elf.root.type != bfd_link_hash_defined
7164 && fdh->elf.root.type != bfd_link_hash_defweak)
7165 fdh = NULL;
7166 }
51aecdc5 7167 }
1e2f5b6e 7168
51aecdc5
AM
7169 skip = (sym_sec->owner != ibfd
7170 || sym_sec->output_section == bfd_abs_section_ptr);
7171 if (skip)
7172 {
7173 if (fdh != NULL && sym_sec->owner == ibfd)
a4aa0fb7 7174 {
51aecdc5
AM
7175 /* Arrange for the function descriptor sym
7176 to be dropped. */
7177 fdh->elf.root.u.def.value = 0;
7178 fdh->elf.root.u.def.section = sym_sec;
a4aa0fb7 7179 }
51aecdc5 7180 opd->adjust[OPD_NDX (rel->r_offset)] = -1;
1e2f5b6e 7181
0e1862bb 7182 if (NO_OPD_RELOCS || bfd_link_relocatable (info))
51aecdc5
AM
7183 rel = next_rel;
7184 else
7185 while (1)
7186 {
7187 if (!dec_dynrel_count (rel->r_info, sec, info,
7188 NULL, h, sym))
7189 goto error_ret;
754021d0 7190
51aecdc5
AM
7191 if (++rel == next_rel)
7192 break;
1e2f5b6e 7193
51aecdc5
AM
7194 r_symndx = ELF64_R_SYM (rel->r_info);
7195 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms,
7196 r_symndx, ibfd))
7197 goto error_ret;
7198 }
50bc7936
AM
7199 }
7200 else
1e2f5b6e 7201 {
51aecdc5
AM
7202 /* We'll be keeping this opd entry. */
7203 long adjust;
7204
7205 if (fdh != NULL)
7206 {
7207 /* Redefine the function descriptor symbol to
7208 this location in the opd section. It is
7209 necessary to update the value here rather
7210 than using an array of adjustments as we do
7211 for local symbols, because various places
7212 in the generic ELF code use the value
7213 stored in u.def.value. */
7214 fdh->elf.root.u.def.value = wptr - new_contents;
7215 fdh->adjust_done = 1;
7216 }
7217
7218 /* Local syms are a bit tricky. We could
7219 tweak them as they can be cached, but
7220 we'd need to look through the local syms
7221 for the function descriptor sym which we
7222 don't have at the moment. So keep an
7223 array of adjustments. */
7224 adjust = (wptr - new_contents) - (rptr - sec->contents);
7225 opd->adjust[OPD_NDX (rel->r_offset)] = adjust;
7226
7227 if (wptr != rptr)
7228 memcpy (wptr, rptr, opd_ent_size);
7229 wptr += opd_ent_size;
7230 if (add_aux_fields && opd_ent_size == 16)
7231 {
7232 memset (wptr, '\0', 8);
7233 wptr += 8;
7234 }
7235
50bc7936 7236 /* We need to adjust any reloc offsets to point to the
51aecdc5
AM
7237 new opd entries. */
7238 for ( ; rel != next_rel; ++rel)
7239 {
7240 rel->r_offset += adjust;
7241 if (write_rel != rel)
7242 memcpy (write_rel, rel, sizeof (*rel));
7243 ++write_rel;
7244 }
1e2f5b6e 7245 }
51aecdc5
AM
7246
7247 rptr += opd_ent_size;
1e2f5b6e
AM
7248 }
7249
3f764659 7250 sec->size = wptr - new_contents;
1e2f5b6e 7251 sec->reloc_count = write_rel - relstart;
3f764659
JJ
7252 if (add_aux_fields)
7253 {
7254 free (sec->contents);
7255 sec->contents = new_contents;
7256 }
7257
05bf9422 7258 /* Fudge the header size too, as this is used later in
cdcf6e38 7259 elf_bfd_final_link if we are emitting relocs. */
d4730f92
BS
7260 rel_hdr = _bfd_elf_single_rel_hdr (sec);
7261 rel_hdr->sh_size = sec->reloc_count * rel_hdr->sh_entsize;
754021d0 7262 some_edited = TRUE;
1e2f5b6e 7263 }
6cdc0ccc 7264 else if (elf_section_data (sec)->relocs != relstart)
1e2f5b6e 7265 free (relstart);
6cdc0ccc 7266
411e1bfb
AM
7267 if (local_syms != NULL
7268 && symtab_hdr->contents != (unsigned char *) local_syms)
7269 {
7270 if (!info->keep_memory)
7271 free (local_syms);
7272 else
7273 symtab_hdr->contents = (unsigned char *) local_syms;
7274 }
7275 }
7276
754021d0
AM
7277 if (some_edited)
7278 elf_link_hash_traverse (elf_hash_table (info), adjust_opd_syms, NULL);
7279
3f764659
JJ
7280 /* If we are doing a final link and the last .opd entry is just 16 byte
7281 long, add a 8 byte padding after it. */
0e1862bb 7282 if (need_pad != NULL && !bfd_link_relocatable (info))
3f764659
JJ
7283 {
7284 bfd_byte *p;
7285
7286 if ((need_pad->flags & SEC_IN_MEMORY) == 0)
7287 {
7288 BFD_ASSERT (need_pad->size > 0);
7289
7290 p = bfd_malloc (need_pad->size + 8);
7291 if (p == NULL)
7292 return FALSE;
699733f6 7293
2cdcc330
AM
7294 if (!bfd_get_section_contents (need_pad->owner, need_pad,
7295 p, 0, need_pad->size))
3f764659
JJ
7296 return FALSE;
7297
7298 need_pad->contents = p;
7299 need_pad->flags |= (SEC_IN_MEMORY | SEC_HAS_CONTENTS);
7300 }
7301 else
7302 {
7303 p = bfd_realloc (need_pad->contents, need_pad->size + 8);
7304 if (p == NULL)
7305 return FALSE;
7306
7307 need_pad->contents = p;
7308 }
7309
7310 memset (need_pad->contents + need_pad->size, 0, 8);
7311 need_pad->size += 8;
7312 }
7313
411e1bfb
AM
7314 return TRUE;
7315}
7316
3e04d765
AM
7317/* Analyze inline PLT call relocations to see whether calls to locally
7318 defined functions can be converted to direct calls. */
7319
7320bfd_boolean
7321ppc64_elf_inline_plt (struct bfd_link_info *info)
7322{
7323 struct ppc_link_hash_table *htab;
7324 bfd *ibfd;
7325 asection *sec;
7326 bfd_vma low_vma, high_vma, limit;
7327
7328 htab = ppc_hash_table (info);
7329 if (htab == NULL)
7330 return FALSE;
7331
7332 /* A bl insn can reach -0x2000000 to 0x1fffffc. The limit is
7333 reduced somewhat to cater for possible stubs that might be added
7334 between the call and its destination. */
7335 if (htab->params->group_size < 0)
7336 {
7337 limit = -htab->params->group_size;
7338 if (limit == 1)
7339 limit = 0x1e00000;
7340 }
7341 else
7342 {
7343 limit = htab->params->group_size;
7344 if (limit == 1)
7345 limit = 0x1c00000;
7346 }
7347
7348 low_vma = -1;
7349 high_vma = 0;
7350 for (sec = info->output_bfd->sections; sec != NULL; sec = sec->next)
7351 if ((sec->flags & (SEC_ALLOC | SEC_CODE)) == (SEC_ALLOC | SEC_CODE))
7352 {
7353 if (low_vma > sec->vma)
7354 low_vma = sec->vma;
7355 if (high_vma < sec->vma + sec->size)
7356 high_vma = sec->vma + sec->size;
7357 }
7358
7359 /* If a "bl" can reach anywhere in local code sections, then we can
7360 convert all inline PLT sequences to direct calls when the symbol
7361 is local. */
7362 if (high_vma - low_vma < limit)
7363 {
7364 htab->can_convert_all_inline_plt = 1;
7365 return TRUE;
7366 }
7367
7368 /* Otherwise, go looking through relocs for cases where a direct
7369 call won't reach. Mark the symbol on any such reloc to disable
7370 the optimization and keep the PLT entry as it seems likely that
7371 this will be better than creating trampolines. Note that this
7372 will disable the optimization for all inline PLT calls to a
7373 particular symbol, not just those that won't reach. The
7374 difficulty in doing a more precise optimization is that the
7375 linker needs to make a decision depending on whether a
7376 particular R_PPC64_PLTCALL insn can be turned into a direct
7377 call, for each of the R_PPC64_PLTSEQ and R_PPC64_PLT16* insns in
7378 the sequence, and there is nothing that ties those relocs
7379 together except their symbol. */
7380
7381 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
7382 {
7383 Elf_Internal_Shdr *symtab_hdr;
7384 Elf_Internal_Sym *local_syms;
7385
7386 if (!is_ppc64_elf (ibfd))
7387 continue;
7388
7389 local_syms = NULL;
7390 symtab_hdr = &elf_symtab_hdr (ibfd);
7391
7392 for (sec = ibfd->sections; sec != NULL; sec = sec->next)
7393 if (ppc64_elf_section_data (sec)->has_pltcall
7394 && !bfd_is_abs_section (sec->output_section))
7395 {
7396 Elf_Internal_Rela *relstart, *rel, *relend;
7397
7398 /* Read the relocations. */
7399 relstart = _bfd_elf_link_read_relocs (ibfd, sec, NULL, NULL,
7400 info->keep_memory);
7401 if (relstart == NULL)
7402 return FALSE;
7403
7404 relend = relstart + sec->reloc_count;
7405 for (rel = relstart; rel < relend; )
7406 {
7407 enum elf_ppc64_reloc_type r_type;
7408 unsigned long r_symndx;
7409 asection *sym_sec;
7410 struct elf_link_hash_entry *h;
7411 Elf_Internal_Sym *sym;
7412 unsigned char *tls_maskp;
7413
7414 r_type = ELF64_R_TYPE (rel->r_info);
5663e321
AM
7415 if (r_type != R_PPC64_PLTCALL
7416 && r_type != R_PPC64_PLTCALL_NOTOC)
3e04d765
AM
7417 continue;
7418
7419 r_symndx = ELF64_R_SYM (rel->r_info);
7420 if (!get_sym_h (&h, &sym, &sym_sec, &tls_maskp, &local_syms,
7421 r_symndx, ibfd))
7422 {
7423 if (elf_section_data (sec)->relocs != relstart)
7424 free (relstart);
7425 if (local_syms != NULL
2cdcc330 7426 && symtab_hdr->contents != (bfd_byte *) local_syms)
3e04d765
AM
7427 free (local_syms);
7428 return FALSE;
7429 }
7430
7431 if (sym_sec != NULL && sym_sec->output_section != NULL)
7432 {
7433 bfd_vma from, to;
7434 if (h != NULL)
7435 to = h->root.u.def.value;
7436 else
7437 to = sym->st_value;
7438 to += (rel->r_addend
7439 + sym_sec->output_offset
7440 + sym_sec->output_section->vma);
7441 from = (rel->r_offset
7442 + sec->output_offset
7443 + sec->output_section->vma);
5663e321
AM
7444 if (to - from + limit < 2 * limit
7445 && !(r_type == R_PPC64_PLTCALL_NOTOC
7446 && (((h ? h->other : sym->st_other)
7447 & STO_PPC64_LOCAL_MASK)
7448 != 1 << STO_PPC64_LOCAL_BIT)))
3e04d765
AM
7449 *tls_maskp &= ~PLT_KEEP;
7450 }
7451 }
7452 if (elf_section_data (sec)->relocs != relstart)
7453 free (relstart);
7454 }
7455
7456 if (local_syms != NULL
7457 && symtab_hdr->contents != (unsigned char *) local_syms)
7458 {
7459 if (!info->keep_memory)
7460 free (local_syms);
7461 else
7462 symtab_hdr->contents = (unsigned char *) local_syms;
7463 }
7464 }
7465
7466 return TRUE;
7467}
7468
e1918d23 7469/* Set htab->tls_get_addr and call the generic ELF tls_setup function. */
411e1bfb 7470
e1918d23 7471asection *
e7d1c40c 7472ppc64_elf_tls_setup (struct bfd_link_info *info)
411e1bfb 7473{
411e1bfb
AM
7474 struct ppc_link_hash_table *htab;
7475
411e1bfb 7476 htab = ppc_hash_table (info);
4dfe6ac6
NC
7477 if (htab == NULL)
7478 return NULL;
7479
ee67d69a
AM
7480 if (abiversion (info->output_bfd) == 1)
7481 htab->opd_abi = 1;
7482
e7d1c40c 7483 if (htab->params->no_multi_toc)
33c0ec9d
AM
7484 htab->do_multi_toc = 0;
7485 else if (!htab->do_multi_toc)
e7d1c40c 7486 htab->params->no_multi_toc = 1;
33c0ec9d 7487
8b5f1ed8
AM
7488 /* Default to --no-plt-localentry, as this option can cause problems
7489 with symbol interposition. For example, glibc libpthread.so and
7490 libc.so duplicate many pthread symbols, with a fallback
7491 implementation in libc.so. In some cases the fallback does more
7492 work than the pthread implementation. __pthread_condattr_destroy
7493 is one such symbol: the libpthread.so implementation is
7494 localentry:0 while the libc.so implementation is localentry:8.
7495 An app that "cleverly" uses dlopen to only load necessary
7496 libraries at runtime may omit loading libpthread.so when not
7497 running multi-threaded, which then results in the libc.so
7498 fallback symbols being used and ld.so complaining. Now there
7499 are workarounds in ld (see non_zero_localentry) to detect the
7500 pthread situation, but that may not be the only case where
7501 --plt-localentry can cause trouble. */
f378ab09 7502 if (htab->params->plt_localentry0 < 0)
8b5f1ed8 7503 htab->params->plt_localentry0 = 0;
d44c746a
AM
7504 if (htab->params->plt_localentry0
7505 && elf_link_hash_lookup (&htab->elf, "GLIBC_2.26",
7506 FALSE, FALSE, FALSE) == NULL)
cf97bcb0
AM
7507 _bfd_error_handler
7508 (_("warning: --plt-localentry is especially dangerous without "
7509 "ld.so support to detect ABI violations"));
f378ab09 7510
3a71aa26
AM
7511 htab->tls_get_addr = ((struct ppc_link_hash_entry *)
7512 elf_link_hash_lookup (&htab->elf, ".__tls_get_addr",
7513 FALSE, FALSE, TRUE));
a7f2871e
AM
7514 /* Move dynamic linking info to the function descriptor sym. */
7515 if (htab->tls_get_addr != NULL)
7516 func_desc_adjust (&htab->tls_get_addr->elf, info);
3a71aa26
AM
7517 htab->tls_get_addr_fd = ((struct ppc_link_hash_entry *)
7518 elf_link_hash_lookup (&htab->elf, "__tls_get_addr",
7519 FALSE, FALSE, TRUE));
7c9cf415 7520 if (htab->params->tls_get_addr_opt)
a7f2871e
AM
7521 {
7522 struct elf_link_hash_entry *opt, *opt_fd, *tga, *tga_fd;
7523
7524 opt = elf_link_hash_lookup (&htab->elf, ".__tls_get_addr_opt",
7525 FALSE, FALSE, TRUE);
7526 if (opt != NULL)
7527 func_desc_adjust (opt, info);
7528 opt_fd = elf_link_hash_lookup (&htab->elf, "__tls_get_addr_opt",
7529 FALSE, FALSE, TRUE);
7530 if (opt_fd != NULL
7531 && (opt_fd->root.type == bfd_link_hash_defined
7532 || opt_fd->root.type == bfd_link_hash_defweak))
7533 {
7534 /* If glibc supports an optimized __tls_get_addr call stub,
7535 signalled by the presence of __tls_get_addr_opt, and we'll
7536 be calling __tls_get_addr via a plt call stub, then
7537 make __tls_get_addr point to __tls_get_addr_opt. */
7538 tga_fd = &htab->tls_get_addr_fd->elf;
7539 if (htab->elf.dynamic_sections_created
7540 && tga_fd != NULL
7541 && (tga_fd->type == STT_FUNC
7542 || tga_fd->needs_plt)
7543 && !(SYMBOL_CALLS_LOCAL (info, tga_fd)
21d68fcd 7544 || UNDEFWEAK_NO_DYNAMIC_RELOC (info, tga_fd)))
a7f2871e
AM
7545 {
7546 struct plt_entry *ent;
7547
7548 for (ent = tga_fd->plt.plist; ent != NULL; ent = ent->next)
7549 if (ent->plt.refcount > 0)
7550 break;
7551 if (ent != NULL)
7552 {
7553 tga_fd->root.type = bfd_link_hash_indirect;
7554 tga_fd->root.u.i.link = &opt_fd->root;
7555 ppc64_elf_copy_indirect_symbol (info, opt_fd, tga_fd);
b531344c 7556 opt_fd->mark = 1;
a7f2871e
AM
7557 if (opt_fd->dynindx != -1)
7558 {
7559 /* Use __tls_get_addr_opt in dynamic relocations. */
7560 opt_fd->dynindx = -1;
7561 _bfd_elf_strtab_delref (elf_hash_table (info)->dynstr,
7562 opt_fd->dynstr_index);
7563 if (!bfd_elf_link_record_dynamic_symbol (info, opt_fd))
854b41e7 7564 return NULL;
a7f2871e 7565 }
2cdcc330
AM
7566 htab->tls_get_addr_fd
7567 = (struct ppc_link_hash_entry *) opt_fd;
a7f2871e
AM
7568 tga = &htab->tls_get_addr->elf;
7569 if (opt != NULL && tga != NULL)
7570 {
7571 tga->root.type = bfd_link_hash_indirect;
7572 tga->root.u.i.link = &opt->root;
7573 ppc64_elf_copy_indirect_symbol (info, opt, tga);
b531344c 7574 opt->mark = 1;
a7f2871e
AM
7575 _bfd_elf_link_hash_hide_symbol (info, opt,
7576 tga->forced_local);
7577 htab->tls_get_addr = (struct ppc_link_hash_entry *) opt;
7578 }
7579 htab->tls_get_addr_fd->oh = htab->tls_get_addr;
7580 htab->tls_get_addr_fd->is_func_descriptor = 1;
7581 if (htab->tls_get_addr != NULL)
7582 {
7583 htab->tls_get_addr->oh = htab->tls_get_addr_fd;
7584 htab->tls_get_addr->is_func = 1;
7585 }
7586 }
7587 }
7588 }
7c9cf415
AM
7589 else if (htab->params->tls_get_addr_opt < 0)
7590 htab->params->tls_get_addr_opt = 0;
a7f2871e 7591 }
33c0ec9d 7592 return _bfd_elf_tls_setup (info->output_bfd, info);
3a71aa26 7593}
8387904d 7594
3a71aa26
AM
7595/* Return TRUE iff REL is a branch reloc with a global symbol matching
7596 HASH1 or HASH2. */
8387904d 7597
3a71aa26
AM
7598static bfd_boolean
7599branch_reloc_hash_match (const bfd *ibfd,
7600 const Elf_Internal_Rela *rel,
7601 const struct ppc_link_hash_entry *hash1,
7602 const struct ppc_link_hash_entry *hash2)
7603{
7604 Elf_Internal_Shdr *symtab_hdr = &elf_symtab_hdr (ibfd);
7605 enum elf_ppc64_reloc_type r_type = ELF64_R_TYPE (rel->r_info);
7606 unsigned int r_symndx = ELF64_R_SYM (rel->r_info);
7607
e054468f 7608 if (r_symndx >= symtab_hdr->sh_info && is_branch_reloc (r_type))
8387904d 7609 {
3a71aa26
AM
7610 struct elf_link_hash_entry **sym_hashes = elf_sym_hashes (ibfd);
7611 struct elf_link_hash_entry *h;
8387904d 7612
3a71aa26 7613 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
b31867b6 7614 h = elf_follow_link (h);
3a71aa26
AM
7615 if (h == &hash1->elf || h == &hash2->elf)
7616 return TRUE;
a48ebf4d 7617 }
3a71aa26 7618 return FALSE;
951fd09b 7619}
411e1bfb 7620
951fd09b
AM
7621/* Run through all the TLS relocs looking for optimization
7622 opportunities. The linker has been hacked (see ppc64elf.em) to do
7623 a preliminary section layout so that we know the TLS segment
7624 offsets. We can't optimize earlier because some optimizations need
7625 to know the tp offset, and we need to optimize before allocating
7626 dynamic relocations. */
7627
7628bfd_boolean
33c0ec9d 7629ppc64_elf_tls_optimize (struct bfd_link_info *info)
951fd09b
AM
7630{
7631 bfd *ibfd;
7632 asection *sec;
7633 struct ppc_link_hash_table *htab;
663a1470 7634 unsigned char *toc_ref;
102890f0 7635 int pass;
951fd09b 7636
3cbc1e5e 7637 if (!bfd_link_executable (info))
411e1bfb
AM
7638 return TRUE;
7639
951fd09b 7640 htab = ppc_hash_table (info);
4dfe6ac6
NC
7641 if (htab == NULL)
7642 return FALSE;
7643
663a1470
AM
7644 /* Make two passes over the relocs. On the first pass, mark toc
7645 entries involved with tls relocs, and check that tls relocs
7646 involved in setting up a tls_get_addr call are indeed followed by
7647 such a call. If they are not, we can't do any tls optimization.
7648 On the second pass twiddle tls_mask flags to notify
7649 relocate_section that optimization can be done, and adjust got
7650 and plt refcounts. */
7651 toc_ref = NULL;
7652 for (pass = 0; pass < 2; ++pass)
c72f2fb2 7653 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
663a1470
AM
7654 {
7655 Elf_Internal_Sym *locsyms = NULL;
7656 asection *toc = bfd_get_section_by_name (ibfd, ".toc");
7657
102890f0
AM
7658 for (sec = ibfd->sections; sec != NULL; sec = sec->next)
7659 if (sec->has_tls_reloc && !bfd_is_abs_section (sec->output_section))
7660 {
7661 Elf_Internal_Rela *relstart, *rel, *relend;
663a1470 7662 bfd_boolean found_tls_get_addr_arg = 0;
411e1bfb 7663
102890f0
AM
7664 /* Read the relocations. */
7665 relstart = _bfd_elf_link_read_relocs (ibfd, sec, NULL, NULL,
7666 info->keep_memory);
7667 if (relstart == NULL)
2915c55b
JK
7668 {
7669 free (toc_ref);
7670 return FALSE;
7671 }
411e1bfb 7672
102890f0
AM
7673 relend = relstart + sec->reloc_count;
7674 for (rel = relstart; rel < relend; rel++)
7675 {
7676 enum elf_ppc64_reloc_type r_type;
7677 unsigned long r_symndx;
7678 struct elf_link_hash_entry *h;
7679 Elf_Internal_Sym *sym;
7680 asection *sym_sec;
f961d9dd
AM
7681 unsigned char *tls_mask;
7682 unsigned char tls_set, tls_clear, tls_type = 0;
102890f0
AM
7683 bfd_vma value;
7684 bfd_boolean ok_tprel, is_local;
7685 long toc_ref_index = 0;
7686 int expecting_tls_get_addr = 0;
663a1470 7687 bfd_boolean ret = FALSE;
411e1bfb 7688
102890f0
AM
7689 r_symndx = ELF64_R_SYM (rel->r_info);
7690 if (!get_sym_h (&h, &sym, &sym_sec, &tls_mask, &locsyms,
7691 r_symndx, ibfd))
7692 {
7693 err_free_rel:
7694 if (elf_section_data (sec)->relocs != relstart)
7695 free (relstart);
7696 if (toc_ref != NULL)
7697 free (toc_ref);
7698 if (locsyms != NULL
0ffa91dd 7699 && (elf_symtab_hdr (ibfd).contents
102890f0
AM
7700 != (unsigned char *) locsyms))
7701 free (locsyms);
663a1470 7702 return ret;
102890f0 7703 }
411e1bfb 7704
102890f0
AM
7705 if (h != NULL)
7706 {
766bc656
AM
7707 if (h->root.type == bfd_link_hash_defined
7708 || h->root.type == bfd_link_hash_defweak)
7709 value = h->root.u.def.value;
7710 else if (h->root.type == bfd_link_hash_undefweak)
7711 value = 0;
7712 else
663a1470
AM
7713 {
7714 found_tls_get_addr_arg = 0;
7715 continue;
7716 }
102890f0
AM
7717 }
7718 else
7719 /* Symbols referenced by TLS relocs must be of type
7720 STT_TLS. So no need for .opd local sym adjust. */
7721 value = sym->st_value;
7722
7723 ok_tprel = FALSE;
7724 is_local = FALSE;
7725 if (h == NULL
7726 || !h->def_dynamic)
7727 {
7728 is_local = TRUE;
766bc656
AM
7729 if (h != NULL
7730 && h->root.type == bfd_link_hash_undefweak)
7731 ok_tprel = TRUE;
c27b8c2a
AM
7732 else if (sym_sec != NULL
7733 && sym_sec->output_section != NULL)
766bc656
AM
7734 {
7735 value += sym_sec->output_offset;
7736 value += sym_sec->output_section->vma;
7737 value -= htab->elf.tls_sec->vma;
7738 ok_tprel = (value + TP_OFFSET + ((bfd_vma) 1 << 31)
7739 < (bfd_vma) 1 << 32);
7740 }
102890f0 7741 }
951fd09b 7742
102890f0 7743 r_type = ELF64_R_TYPE (rel->r_info);
663a1470
AM
7744 /* If this section has old-style __tls_get_addr calls
7745 without marker relocs, then check that each
7746 __tls_get_addr call reloc is preceded by a reloc
7747 that conceivably belongs to the __tls_get_addr arg
7748 setup insn. If we don't find matching arg setup
7749 relocs, don't do any tls optimization. */
7750 if (pass == 0
7751 && sec->has_tls_get_addr_call
7752 && h != NULL
7753 && (h == &htab->tls_get_addr->elf
7754 || h == &htab->tls_get_addr_fd->elf)
7755 && !found_tls_get_addr_arg
7756 && is_branch_reloc (r_type))
7757 {
25f53a85 7758 info->callbacks->minfo (_("%H __tls_get_addr lost arg, "
663a1470
AM
7759 "TLS optimization disabled\n"),
7760 ibfd, sec, rel->r_offset);
7761 ret = TRUE;
7762 goto err_free_rel;
7763 }
7764
7765 found_tls_get_addr_arg = 0;
102890f0
AM
7766 switch (r_type)
7767 {
7768 case R_PPC64_GOT_TLSLD16:
7769 case R_PPC64_GOT_TLSLD16_LO:
7770 expecting_tls_get_addr = 1;
663a1470 7771 found_tls_get_addr_arg = 1;
1a0670f3 7772 /* Fall through. */
102890f0
AM
7773
7774 case R_PPC64_GOT_TLSLD16_HI:
7775 case R_PPC64_GOT_TLSLD16_HA:
7776 /* These relocs should never be against a symbol
7777 defined in a shared lib. Leave them alone if
7778 that turns out to be the case. */
7779 if (!is_local)
7780 continue;
411e1bfb 7781
102890f0 7782 /* LD -> LE */
411e1bfb 7783 tls_set = 0;
102890f0
AM
7784 tls_clear = TLS_LD;
7785 tls_type = TLS_TLS | TLS_LD;
7786 break;
411e1bfb 7787
102890f0
AM
7788 case R_PPC64_GOT_TLSGD16:
7789 case R_PPC64_GOT_TLSGD16_LO:
7790 expecting_tls_get_addr = 1;
663a1470 7791 found_tls_get_addr_arg = 1;
1a0670f3 7792 /* Fall through. */
102890f0
AM
7793
7794 case R_PPC64_GOT_TLSGD16_HI:
7795 case R_PPC64_GOT_TLSGD16_HA:
7796 if (ok_tprel)
7797 /* GD -> LE */
411e1bfb 7798 tls_set = 0;
102890f0
AM
7799 else
7800 /* GD -> IE */
7801 tls_set = TLS_TLS | TLS_TPRELGD;
7802 tls_clear = TLS_GD;
7803 tls_type = TLS_TLS | TLS_GD;
7804 break;
7805
7806 case R_PPC64_GOT_TPREL16_DS:
7807 case R_PPC64_GOT_TPREL16_LO_DS:
7808 case R_PPC64_GOT_TPREL16_HI:
7809 case R_PPC64_GOT_TPREL16_HA:
7810 if (ok_tprel)
7811 {
7812 /* IE -> LE */
7813 tls_set = 0;
7814 tls_clear = TLS_TPREL;
7815 tls_type = TLS_TLS | TLS_TPREL;
7816 break;
7817 }
411e1bfb
AM
7818 continue;
7819
727fc41e
AM
7820 case R_PPC64_TLSGD:
7821 case R_PPC64_TLSLD:
23cedd1d
AM
7822 if (rel + 1 < relend
7823 && is_plt_seq_reloc (ELF64_R_TYPE (rel[1].r_info)))
7824 {
7825 if (pass != 0
2cdcc330 7826 && (ELF64_R_TYPE (rel[1].r_info)
5663e321
AM
7827 != R_PPC64_PLTSEQ)
7828 && (ELF64_R_TYPE (rel[1].r_info)
7829 != R_PPC64_PLTSEQ_NOTOC))
23cedd1d
AM
7830 {
7831 r_symndx = ELF64_R_SYM (rel[1].r_info);
7832 if (!get_sym_h (&h, NULL, NULL, NULL, &locsyms,
2cdcc330 7833 r_symndx, ibfd))
23cedd1d
AM
7834 goto err_free_rel;
7835 if (h != NULL)
7836 {
7837 struct plt_entry *ent = NULL;
7838
7839 for (ent = h->plt.plist;
7840 ent != NULL;
7841 ent = ent->next)
7842 if (ent->addend == rel[1].r_addend)
7843 break;
7844
7845 if (ent != NULL
7846 && ent->plt.refcount > 0)
7847 ent->plt.refcount -= 1;
7848 }
7849 }
7850 continue;
7851 }
663a1470 7852 found_tls_get_addr_arg = 1;
1a0670f3 7853 /* Fall through. */
663a1470
AM
7854
7855 case R_PPC64_TLS:
7856 case R_PPC64_TOC16:
7857 case R_PPC64_TOC16_LO:
102890f0
AM
7858 if (sym_sec == NULL || sym_sec != toc)
7859 continue;
7860
7861 /* Mark this toc entry as referenced by a TLS
7862 code sequence. We can do that now in the
7863 case of R_PPC64_TLS, and after checking for
7864 tls_get_addr for the TOC16 relocs. */
7865 if (toc_ref == NULL)
2cdcc330
AM
7866 toc_ref
7867 = bfd_zmalloc (toc->output_section->rawsize / 8);
663a1470
AM
7868 if (toc_ref == NULL)
7869 goto err_free_rel;
7870
102890f0
AM
7871 if (h != NULL)
7872 value = h->root.u.def.value;
7873 else
7874 value = sym->st_value;
7875 value += rel->r_addend;
73242275
AM
7876 if (value % 8 != 0)
7877 continue;
7878 BFD_ASSERT (value < toc->size
7879 && toc->output_offset % 8 == 0);
663a1470 7880 toc_ref_index = (value + toc->output_offset) / 8;
727fc41e
AM
7881 if (r_type == R_PPC64_TLS
7882 || r_type == R_PPC64_TLSGD
7883 || r_type == R_PPC64_TLSLD)
102890f0
AM
7884 {
7885 toc_ref[toc_ref_index] = 1;
7886 continue;
7887 }
7888
7889 if (pass != 0 && toc_ref[toc_ref_index] == 0)
7890 continue;
7891
7892 tls_set = 0;
7893 tls_clear = 0;
7894 expecting_tls_get_addr = 2;
7895 break;
7896
7897 case R_PPC64_TPREL64:
7898 if (pass == 0
7899 || sec != toc
7900 || toc_ref == NULL
663a1470 7901 || !toc_ref[(rel->r_offset + toc->output_offset) / 8])
102890f0
AM
7902 continue;
7903 if (ok_tprel)
7904 {
7905 /* IE -> LE */
7906 tls_set = TLS_EXPLICIT;
7907 tls_clear = TLS_TPREL;
7908 break;
7909 }
7910 continue;
7911
7912 case R_PPC64_DTPMOD64:
7913 if (pass == 0
7914 || sec != toc
7915 || toc_ref == NULL
663a1470 7916 || !toc_ref[(rel->r_offset + toc->output_offset) / 8])
102890f0
AM
7917 continue;
7918 if (rel + 1 < relend
7919 && (rel[1].r_info
7920 == ELF64_R_INFO (r_symndx, R_PPC64_DTPREL64))
7921 && rel[1].r_offset == rel->r_offset + 8)
7922 {
7923 if (ok_tprel)
7924 /* GD -> LE */
7925 tls_set = TLS_EXPLICIT | TLS_GD;
7926 else
7927 /* GD -> IE */
7928 tls_set = TLS_EXPLICIT | TLS_GD | TLS_TPRELGD;
7929 tls_clear = TLS_GD;
7930 }
7931 else
7932 {
7933 if (!is_local)
7934 continue;
7935
7936 /* LD -> LE */
7937 tls_set = TLS_EXPLICIT;
7938 tls_clear = TLS_LD;
7939 }
7940 break;
7941
7942 default:
7943 continue;
7944 }
7945
7946 if (pass == 0)
7947 {
727fc41e
AM
7948 if (!expecting_tls_get_addr
7949 || !sec->has_tls_get_addr_call)
102890f0
AM
7950 continue;
7951
3a71aa26
AM
7952 if (rel + 1 < relend
7953 && branch_reloc_hash_match (ibfd, rel + 1,
7954 htab->tls_get_addr,
7955 htab->tls_get_addr_fd))
102890f0 7956 {
3a71aa26 7957 if (expecting_tls_get_addr == 2)
102890f0 7958 {
3a71aa26 7959 /* Check for toc tls entries. */
f961d9dd 7960 unsigned char *toc_tls;
3a71aa26
AM
7961 int retval;
7962
7963 retval = get_tls_mask (&toc_tls, NULL, NULL,
7964 &locsyms,
7965 rel, ibfd);
7966 if (retval == 0)
7967 goto err_free_rel;
663a1470
AM
7968 if (toc_tls != NULL)
7969 {
37da22e5
AM
7970 if ((*toc_tls & TLS_TLS) != 0
7971 && ((*toc_tls & (TLS_GD | TLS_LD)) != 0))
663a1470
AM
7972 found_tls_get_addr_arg = 1;
7973 if (retval > 1)
7974 toc_ref[toc_ref_index] = 1;
7975 }
102890f0 7976 }
3a71aa26 7977 continue;
102890f0
AM
7978 }
7979
102890f0
AM
7980 /* Uh oh, we didn't find the expected call. We
7981 could just mark this symbol to exclude it
7982 from tls optimization but it's safer to skip
663a1470 7983 the entire optimization. */
695344c0 7984 /* xgettext:c-format */
25f53a85 7985 info->callbacks->minfo (_("%H arg lost __tls_get_addr, "
663a1470
AM
7986 "TLS optimization disabled\n"),
7987 ibfd, sec, rel->r_offset);
7988 ret = TRUE;
7989 goto err_free_rel;
102890f0
AM
7990 }
7991
37da22e5
AM
7992 /* If we don't have old-style __tls_get_addr calls
7993 without TLSGD/TLSLD marker relocs, and we haven't
7994 found a new-style __tls_get_addr call with a
7995 marker for this symbol, then we either have a
7996 broken object file or an -mlongcall style
7997 indirect call to __tls_get_addr without a marker.
7998 Disable optimization in this case. */
7999 if ((tls_clear & (TLS_GD | TLS_LD)) != 0
8000 && (tls_set & TLS_EXPLICIT) == 0
8001 && !sec->has_tls_get_addr_call
8002 && ((*tls_mask & (TLS_TLS | TLS_MARK))
8003 != (TLS_TLS | TLS_MARK)))
8004 continue;
8005
23cedd1d 8006 if (expecting_tls_get_addr)
102890f0 8007 {
23cedd1d
AM
8008 struct plt_entry *ent = NULL;
8009
8010 if (htab->tls_get_addr != NULL)
8011 for (ent = htab->tls_get_addr->elf.plt.plist;
8012 ent != NULL;
8013 ent = ent->next)
8014 if (ent->addend == 0)
102890f0 8015 break;
411e1bfb 8016
23cedd1d
AM
8017 if (ent == NULL && htab->tls_get_addr_fd != NULL)
8018 for (ent = htab->tls_get_addr_fd->elf.plt.plist;
8019 ent != NULL;
8020 ent = ent->next)
8021 if (ent->addend == 0)
102890f0 8022 break;
23cedd1d
AM
8023
8024 if (ent != NULL
8025 && ent->plt.refcount > 0)
8026 ent->plt.refcount -= 1;
102890f0 8027 }
411e1bfb 8028
102890f0 8029 if (tls_clear == 0)
30038c59
AM
8030 continue;
8031
102890f0
AM
8032 if ((tls_set & TLS_EXPLICIT) == 0)
8033 {
8034 struct got_entry *ent;
411e1bfb 8035
102890f0
AM
8036 /* Adjust got entry for this reloc. */
8037 if (h != NULL)
8038 ent = h->got.glist;
8039 else
8040 ent = elf_local_got_ents (ibfd)[r_symndx];
411e1bfb 8041
102890f0
AM
8042 for (; ent != NULL; ent = ent->next)
8043 if (ent->addend == rel->r_addend
8044 && ent->owner == ibfd
8045 && ent->tls_type == tls_type)
8046 break;
8047 if (ent == NULL)
8048 abort ();
411e1bfb 8049
102890f0
AM
8050 if (tls_set == 0)
8051 {
8052 /* We managed to get rid of a got entry. */
8053 if (ent->got.refcount > 0)
8054 ent->got.refcount -= 1;
8055 }
8056 }
8057 else
8058 {
8059 /* If we got rid of a DTPMOD/DTPREL reloc pair then
8060 we'll lose one or two dyn relocs. */
8061 if (!dec_dynrel_count (rel->r_info, sec, info,
19e08130 8062 NULL, h, sym))
102890f0 8063 return FALSE;
411e1bfb 8064
102890f0
AM
8065 if (tls_set == (TLS_EXPLICIT | TLS_GD))
8066 {
8067 if (!dec_dynrel_count ((rel + 1)->r_info, sec, info,
19e08130 8068 NULL, h, sym))
102890f0
AM
8069 return FALSE;
8070 }
8071 }
411e1bfb 8072
102890f0
AM
8073 *tls_mask |= tls_set;
8074 *tls_mask &= ~tls_clear;
8075 }
8c1d1bb8 8076
102890f0
AM
8077 if (elf_section_data (sec)->relocs != relstart)
8078 free (relstart);
8079 }
411e1bfb 8080
663a1470
AM
8081 if (locsyms != NULL
8082 && (elf_symtab_hdr (ibfd).contents != (unsigned char *) locsyms))
8083 {
8084 if (!info->keep_memory)
8085 free (locsyms);
8086 else
8087 elf_symtab_hdr (ibfd).contents = (unsigned char *) locsyms;
8088 }
8089 }
411e1bfb 8090
663a1470
AM
8091 if (toc_ref != NULL)
8092 free (toc_ref);
9a23f96e 8093 htab->do_tls_opt = 1;
b34976b6 8094 return TRUE;
1e2f5b6e 8095}
b34976b6 8096
c5614fa4
AM
8097/* Called via elf_link_hash_traverse from ppc64_elf_edit_toc to adjust
8098 the values of any global symbols in a toc section that has been
8099 edited. Globals in toc sections should be a rarity, so this function
8100 sets a flag if any are found in toc sections other than the one just
de194d85 8101 edited, so that further hash table traversals can be avoided. */
c5614fa4
AM
8102
8103struct adjust_toc_info
8104{
8105 asection *toc;
8106 unsigned long *skip;
8107 bfd_boolean global_toc_syms;
8108};
8109
ba761f19
AM
8110enum toc_skip_enum { ref_from_discarded = 1, can_optimize = 2 };
8111
c5614fa4
AM
8112static bfd_boolean
8113adjust_toc_syms (struct elf_link_hash_entry *h, void *inf)
8114{
8115 struct ppc_link_hash_entry *eh;
8116 struct adjust_toc_info *toc_inf = (struct adjust_toc_info *) inf;
854b41e7 8117 unsigned long i;
c5614fa4 8118
c5614fa4
AM
8119 if (h->root.type != bfd_link_hash_defined
8120 && h->root.type != bfd_link_hash_defweak)
8121 return TRUE;
8122
8123 eh = (struct ppc_link_hash_entry *) h;
8124 if (eh->adjust_done)
8125 return TRUE;
8126
8127 if (eh->elf.root.u.def.section == toc_inf->toc)
8128 {
854b41e7
AM
8129 if (eh->elf.root.u.def.value > toc_inf->toc->rawsize)
8130 i = toc_inf->toc->rawsize >> 3;
c5614fa4 8131 else
854b41e7
AM
8132 i = eh->elf.root.u.def.value >> 3;
8133
ba761f19 8134 if ((toc_inf->skip[i] & (ref_from_discarded | can_optimize)) != 0)
c5614fa4 8135 {
4eca0228 8136 _bfd_error_handler
854b41e7
AM
8137 (_("%s defined on removed toc entry"), eh->elf.root.root.string);
8138 do
8139 ++i;
ba761f19 8140 while ((toc_inf->skip[i] & (ref_from_discarded | can_optimize)) != 0);
854b41e7 8141 eh->elf.root.u.def.value = (bfd_vma) i << 3;
c5614fa4 8142 }
854b41e7
AM
8143
8144 eh->elf.root.u.def.value -= toc_inf->skip[i];
c5614fa4
AM
8145 eh->adjust_done = 1;
8146 }
8147 else if (strcmp (eh->elf.root.u.def.section->name, ".toc") == 0)
8148 toc_inf->global_toc_syms = TRUE;
8149
8150 return TRUE;
8151}
8152
39eeab25
AM
8153/* Return TRUE iff INSN with a relocation of R_TYPE is one we expect
8154 on a _LO variety toc/got reloc. */
560c8763
AM
8155
8156static bfd_boolean
39eeab25 8157ok_lo_toc_insn (unsigned int insn, enum elf_ppc64_reloc_type r_type)
560c8763 8158{
39eeab25
AM
8159 return ((insn & (0x3f << 26)) == 12u << 26 /* addic */
8160 || (insn & (0x3f << 26)) == 14u << 26 /* addi */
560c8763
AM
8161 || (insn & (0x3f << 26)) == 32u << 26 /* lwz */
8162 || (insn & (0x3f << 26)) == 34u << 26 /* lbz */
8163 || (insn & (0x3f << 26)) == 36u << 26 /* stw */
8164 || (insn & (0x3f << 26)) == 38u << 26 /* stb */
8165 || (insn & (0x3f << 26)) == 40u << 26 /* lhz */
8166 || (insn & (0x3f << 26)) == 42u << 26 /* lha */
8167 || (insn & (0x3f << 26)) == 44u << 26 /* sth */
8168 || (insn & (0x3f << 26)) == 46u << 26 /* lmw */
8169 || (insn & (0x3f << 26)) == 47u << 26 /* stmw */
8170 || (insn & (0x3f << 26)) == 48u << 26 /* lfs */
8171 || (insn & (0x3f << 26)) == 50u << 26 /* lfd */
8172 || (insn & (0x3f << 26)) == 52u << 26 /* stfs */
8173 || (insn & (0x3f << 26)) == 54u << 26 /* stfd */
39eeab25
AM
8174 || (insn & (0x3f << 26)) == 56u << 26 /* lq,lfq */
8175 || ((insn & (0x3f << 26)) == 57u << 26 /* lxsd,lxssp,lfdp */
8176 /* Exclude lfqu by testing reloc. If relocs are ever
8177 defined for the reduced D field in psq_lu then those
8178 will need testing too. */
8179 && r_type != R_PPC64_TOC16_LO && r_type != R_PPC64_GOT16_LO)
8180 || ((insn & (0x3f << 26)) == 58u << 26 /* ld,lwa */
8181 && (insn & 1) == 0)
8182 || (insn & (0x3f << 26)) == 60u << 26 /* stfq */
8183 || ((insn & (0x3f << 26)) == 61u << 26 /* lxv,stx{v,sd,ssp},stfdp */
8184 /* Exclude stfqu. psq_stu as above for psq_lu. */
8185 && r_type != R_PPC64_TOC16_LO && r_type != R_PPC64_GOT16_LO)
8186 || ((insn & (0x3f << 26)) == 62u << 26 /* std,stq */
8187 && (insn & 1) == 0));
560c8763
AM
8188}
8189
4a421c53
AM
8190/* PCREL_OPT in one instance flags to the linker that a pair of insns:
8191 pld ra,symbol@got@pcrel
8192 load/store rt,0(ra)
8193 or
8194 paddi ra,symbol@pcrel
8195 load/store rt,0(ra)
8196 may be translated to
8197 pload/pstore rt,symbol@pcrel
8198 nop.
8199 This function returns true if the optimization is possible, placing
8200 the prefix insn in *PINSN1 and a NOP in *PINSN2.
8201
8202 On entry to this function, the linker has already determined that
8203 the pld can be replaced with paddi: *PINSN1 is that paddi insn,
8204 while *PINSN2 is the second instruction. */
8205
8206static bfd_boolean
8207xlate_pcrel_opt (uint64_t *pinsn1, uint64_t *pinsn2)
8208{
8209 uint32_t insn2 = *pinsn2 >> 32;
8210 uint64_t i1new;
8211
8212 /* Check that regs match. */
8213 if (((insn2 >> 16) & 31) != ((*pinsn1 >> 21) & 31))
8214 return FALSE;
8215
8216 switch ((insn2 >> 26) & 63)
8217 {
8218 default:
8219 return FALSE;
8220
8221 case 32: /* lwz */
8222 case 34: /* lbz */
8223 case 36: /* stw */
8224 case 38: /* stb */
8225 case 40: /* lhz */
8226 case 42: /* lha */
8227 case 44: /* sth */
8228 case 48: /* lfs */
8229 case 50: /* lfd */
8230 case 52: /* stfs */
8231 case 54: /* stfd */
8232 /* These are the PMLS cases, where we just need to tack a prefix
8233 on the insn. Check that the D field is zero. */
8234 if ((insn2 & 0xffff) != 0)
8235 return FALSE;
8236 i1new = ((1ULL << 58) | (2ULL << 56) | (1ULL << 52)
8237 | (insn2 & ((63ULL << 26) | (31ULL << 21))));
8238 break;
8239
8240 case 58: /* lwa, ld */
8241 if ((insn2 & 0xfffd) != 0)
8242 return FALSE;
8243 i1new = ((1ULL << 58) | (1ULL << 52)
8244 | (insn2 & 2 ? 41ULL << 26 : 57ULL << 26)
8245 | (insn2 & (31ULL << 21)));
8246 break;
8247
8248 case 57: /* lxsd, lxssp */
8249 if ((insn2 & 0xfffc) != 0 || (insn2 & 3) < 2)
8250 return FALSE;
8251 i1new = ((1ULL << 58) | (1ULL << 52)
8252 | ((40ULL | (insn2 & 3)) << 26)
8253 | (insn2 & (31ULL << 21)));
8254 break;
8255
8256 case 61: /* stxsd, stxssp, lxv, stxv */
8257 if ((insn2 & 3) == 0)
8258 return FALSE;
8259 else if ((insn2 & 3) >= 2)
8260 {
8261 if ((insn2 & 0xfffc) != 0)
8262 return FALSE;
8263 i1new = ((1ULL << 58) | (1ULL << 52)
8264 | ((44ULL | (insn2 & 3)) << 26)
8265 | (insn2 & (31ULL << 21)));
8266 }
8267 else
8268 {
8269 if ((insn2 & 0xfff0) != 0)
8270 return FALSE;
8271 i1new = ((1ULL << 58) | (1ULL << 52)
8272 | ((50ULL | (insn2 & 4) | ((insn2 & 8) >> 3)) << 26)
8273 | (insn2 & (31ULL << 21)));
8274 }
8275 break;
8276
8277 case 56: /* lq */
8278 if ((insn2 & 0xffff) != 0)
8279 return FALSE;
8280 i1new = ((1ULL << 58) | (1ULL << 52)
8281 | (insn2 & ((63ULL << 26) | (31ULL << 21))));
8282 break;
8283
8284 case 62: /* std, stq */
8285 if ((insn2 & 0xfffd) != 0)
8286 return FALSE;
8287 i1new = ((1ULL << 58) | (1ULL << 52)
8288 | ((insn2 & 2) == 0 ? 61ULL << 26 : 60ULL << 26)
8289 | (insn2 & (31ULL << 21)));
8290 break;
8291 }
8292
8293 *pinsn1 = i1new;
8294 *pinsn2 = (uint64_t) NOP << 32;
8295 return TRUE;
8296}
8297
c5614fa4
AM
8298/* Examine all relocs referencing .toc sections in order to remove
8299 unused .toc entries. */
8300
8301bfd_boolean
33c0ec9d 8302ppc64_elf_edit_toc (struct bfd_link_info *info)
c5614fa4
AM
8303{
8304 bfd *ibfd;
8305 struct adjust_toc_info toc_inf;
67f0cbdb 8306 struct ppc_link_hash_table *htab = ppc_hash_table (info);
c5614fa4 8307
67f0cbdb 8308 htab->do_toc_opt = 1;
c5614fa4 8309 toc_inf.global_toc_syms = TRUE;
c72f2fb2 8310 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
c5614fa4
AM
8311 {
8312 asection *toc, *sec;
8313 Elf_Internal_Shdr *symtab_hdr;
8314 Elf_Internal_Sym *local_syms;
425b145b 8315 Elf_Internal_Rela *relstart, *rel, *toc_relocs;
c5614fa4
AM
8316 unsigned long *skip, *drop;
8317 unsigned char *used;
8318 unsigned char *keep, last, some_unused;
8319
854b41e7
AM
8320 if (!is_ppc64_elf (ibfd))
8321 continue;
8322
c5614fa4
AM
8323 toc = bfd_get_section_by_name (ibfd, ".toc");
8324 if (toc == NULL
92b7a70f 8325 || toc->size == 0
dbaa2011
AM
8326 || toc->sec_info_type == SEC_INFO_TYPE_JUST_SYMS
8327 || discarded_section (toc))
c5614fa4
AM
8328 continue;
8329
425b145b 8330 toc_relocs = NULL;
c5614fa4 8331 local_syms = NULL;
0ffa91dd 8332 symtab_hdr = &elf_symtab_hdr (ibfd);
c5614fa4
AM
8333
8334 /* Look at sections dropped from the final link. */
8335 skip = NULL;
8336 relstart = NULL;
8337 for (sec = ibfd->sections; sec != NULL; sec = sec->next)
8338 {
8339 if (sec->reloc_count == 0
dbaa2011 8340 || !discarded_section (sec)
c5614fa4
AM
8341 || get_opd_info (sec)
8342 || (sec->flags & SEC_ALLOC) == 0
8343 || (sec->flags & SEC_DEBUGGING) != 0)
8344 continue;
8345
8346 relstart = _bfd_elf_link_read_relocs (ibfd, sec, NULL, NULL, FALSE);
8347 if (relstart == NULL)
8348 goto error_ret;
8349
8350 /* Run through the relocs to see which toc entries might be
8351 unused. */
8352 for (rel = relstart; rel < relstart + sec->reloc_count; ++rel)
8353 {
8354 enum elf_ppc64_reloc_type r_type;
8355 unsigned long r_symndx;
8356 asection *sym_sec;
8357 struct elf_link_hash_entry *h;
8358 Elf_Internal_Sym *sym;
8359 bfd_vma val;
8360
8361 r_type = ELF64_R_TYPE (rel->r_info);
8362 switch (r_type)
8363 {
8364 default:
8365 continue;
8366
8367 case R_PPC64_TOC16:
8368 case R_PPC64_TOC16_LO:
8369 case R_PPC64_TOC16_HI:
8370 case R_PPC64_TOC16_HA:
8371 case R_PPC64_TOC16_DS:
8372 case R_PPC64_TOC16_LO_DS:
8373 break;
8374 }
8375
8376 r_symndx = ELF64_R_SYM (rel->r_info);
8377 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms,
8378 r_symndx, ibfd))
8379 goto error_ret;
8380
8381 if (sym_sec != toc)
8382 continue;
8383
8384 if (h != NULL)
8385 val = h->root.u.def.value;
8386 else
8387 val = sym->st_value;
8388 val += rel->r_addend;
8389
8390 if (val >= toc->size)
8391 continue;
8392
8393 /* Anything in the toc ought to be aligned to 8 bytes.
8394 If not, don't mark as unused. */
8395 if (val & 7)
8396 continue;
8397
8398 if (skip == NULL)
8399 {
854b41e7 8400 skip = bfd_zmalloc (sizeof (*skip) * (toc->size + 15) / 8);
c5614fa4
AM
8401 if (skip == NULL)
8402 goto error_ret;
8403 }
8404
ba761f19 8405 skip[val >> 3] = ref_from_discarded;
c5614fa4
AM
8406 }
8407
8408 if (elf_section_data (sec)->relocs != relstart)
8409 free (relstart);
8410 }
8411
ba761f19
AM
8412 /* For largetoc loads of address constants, we can convert
8413 . addis rx,2,addr@got@ha
8414 . ld ry,addr@got@l(rx)
8415 to
8416 . addis rx,2,addr@toc@ha
8417 . addi ry,rx,addr@toc@l
8418 when addr is within 2G of the toc pointer. This then means
8419 that the word storing "addr" in the toc is no longer needed. */
68ffbac6 8420
ba761f19
AM
8421 if (!ppc64_elf_tdata (ibfd)->has_small_toc_reloc
8422 && toc->output_section->rawsize < (bfd_vma) 1 << 31
8423 && toc->reloc_count != 0)
8424 {
8425 /* Read toc relocs. */
425b145b
AM
8426 toc_relocs = _bfd_elf_link_read_relocs (ibfd, toc, NULL, NULL,
8427 info->keep_memory);
8428 if (toc_relocs == NULL)
ba761f19
AM
8429 goto error_ret;
8430
425b145b 8431 for (rel = toc_relocs; rel < toc_relocs + toc->reloc_count; ++rel)
ba761f19
AM
8432 {
8433 enum elf_ppc64_reloc_type r_type;
8434 unsigned long r_symndx;
8435 asection *sym_sec;
8436 struct elf_link_hash_entry *h;
8437 Elf_Internal_Sym *sym;
8438 bfd_vma val, addr;
8439
8440 r_type = ELF64_R_TYPE (rel->r_info);
8441 if (r_type != R_PPC64_ADDR64)
8442 continue;
8443
8444 r_symndx = ELF64_R_SYM (rel->r_info);
8445 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms,
8446 r_symndx, ibfd))
8447 goto error_ret;
8448
425b145b 8449 if (sym_sec == NULL
c27b8c2a 8450 || sym_sec->output_section == NULL
dbaa2011 8451 || discarded_section (sym_sec))
425b145b
AM
8452 continue;
8453
afe397ea 8454 if (!SYMBOL_REFERENCES_LOCAL (info, h))
ba761f19
AM
8455 continue;
8456
8457 if (h != NULL)
bddc25c9
AM
8458 {
8459 if (h->type == STT_GNU_IFUNC)
8460 continue;
8461 val = h->root.u.def.value;
8462 }
ba761f19 8463 else
bddc25c9
AM
8464 {
8465 if (ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC)
8466 continue;
8467 val = sym->st_value;
8468 }
ba761f19
AM
8469 val += rel->r_addend;
8470 val += sym_sec->output_section->vma + sym_sec->output_offset;
8471
8472 /* We don't yet know the exact toc pointer value, but we
8473 know it will be somewhere in the toc section. Don't
8474 optimize if the difference from any possible toc
8475 pointer is outside [ff..f80008000, 7fff7fff]. */
8476 addr = toc->output_section->vma + TOC_BASE_OFF;
8477 if (val - addr + (bfd_vma) 0x80008000 >= (bfd_vma) 1 << 32)
8478 continue;
8479
8480 addr = toc->output_section->vma + toc->output_section->rawsize;
8481 if (val - addr + (bfd_vma) 0x80008000 >= (bfd_vma) 1 << 32)
8482 continue;
8483
8484 if (skip == NULL)
8485 {
8486 skip = bfd_zmalloc (sizeof (*skip) * (toc->size + 15) / 8);
8487 if (skip == NULL)
8488 goto error_ret;
8489 }
8490
8491 skip[rel->r_offset >> 3]
425b145b 8492 |= can_optimize | ((rel - toc_relocs) << 2);
ba761f19 8493 }
ba761f19
AM
8494 }
8495
c5614fa4
AM
8496 if (skip == NULL)
8497 continue;
8498
8499 used = bfd_zmalloc (sizeof (*used) * (toc->size + 7) / 8);
8500 if (used == NULL)
8501 {
8502 error_ret:
8503 if (local_syms != NULL
8504 && symtab_hdr->contents != (unsigned char *) local_syms)
8505 free (local_syms);
8506 if (sec != NULL
8507 && relstart != NULL
8508 && elf_section_data (sec)->relocs != relstart)
8509 free (relstart);
425b145b
AM
8510 if (toc_relocs != NULL
8511 && elf_section_data (toc)->relocs != toc_relocs)
8512 free (toc_relocs);
c5614fa4
AM
8513 if (skip != NULL)
8514 free (skip);
8515 return FALSE;
8516 }
8517
30038c59
AM
8518 /* Now check all kept sections that might reference the toc.
8519 Check the toc itself last. */
8520 for (sec = (ibfd->sections == toc && toc->next ? toc->next
8521 : ibfd->sections);
c5614fa4 8522 sec != NULL;
c5614fa4 8523 sec = (sec == toc ? NULL
c5614fa4 8524 : sec->next == NULL ? toc
30038c59 8525 : sec->next == toc && toc->next ? toc->next
c5614fa4
AM
8526 : sec->next))
8527 {
8528 int repeat;
8529
8530 if (sec->reloc_count == 0
dbaa2011 8531 || discarded_section (sec)
c5614fa4
AM
8532 || get_opd_info (sec)
8533 || (sec->flags & SEC_ALLOC) == 0
8534 || (sec->flags & SEC_DEBUGGING) != 0)
8535 continue;
8536
854b41e7
AM
8537 relstart = _bfd_elf_link_read_relocs (ibfd, sec, NULL, NULL,
8538 info->keep_memory);
c5614fa4 8539 if (relstart == NULL)
2915c55b
JK
8540 {
8541 free (used);
8542 goto error_ret;
8543 }
c5614fa4
AM
8544
8545 /* Mark toc entries referenced as used. */
c5614fa4 8546 do
d4f1ee75
AM
8547 {
8548 repeat = 0;
8549 for (rel = relstart; rel < relstart + sec->reloc_count; ++rel)
8550 {
8551 enum elf_ppc64_reloc_type r_type;
8552 unsigned long r_symndx;
8553 asection *sym_sec;
8554 struct elf_link_hash_entry *h;
8555 Elf_Internal_Sym *sym;
8556 bfd_vma val;
8557 enum {no_check, check_lo, check_ha} insn_check;
98528052 8558
d4f1ee75
AM
8559 r_type = ELF64_R_TYPE (rel->r_info);
8560 switch (r_type)
8561 {
8562 default:
8563 insn_check = no_check;
8564 break;
98528052 8565
d4f1ee75
AM
8566 case R_PPC64_GOT_TLSLD16_HA:
8567 case R_PPC64_GOT_TLSGD16_HA:
8568 case R_PPC64_GOT_TPREL16_HA:
8569 case R_PPC64_GOT_DTPREL16_HA:
8570 case R_PPC64_GOT16_HA:
8571 case R_PPC64_TOC16_HA:
8572 insn_check = check_ha;
8573 break;
98528052 8574
d4f1ee75
AM
8575 case R_PPC64_GOT_TLSLD16_LO:
8576 case R_PPC64_GOT_TLSGD16_LO:
8577 case R_PPC64_GOT_TPREL16_LO_DS:
8578 case R_PPC64_GOT_DTPREL16_LO_DS:
8579 case R_PPC64_GOT16_LO:
8580 case R_PPC64_GOT16_LO_DS:
8581 case R_PPC64_TOC16_LO:
8582 case R_PPC64_TOC16_LO_DS:
8583 insn_check = check_lo;
8584 break;
8585 }
560c8763 8586
d4f1ee75
AM
8587 if (insn_check != no_check)
8588 {
8589 bfd_vma off = rel->r_offset & ~3;
8590 unsigned char buf[4];
8591 unsigned int insn;
c5614fa4 8592
d4f1ee75
AM
8593 if (!bfd_get_section_contents (ibfd, sec, buf, off, 4))
8594 {
8595 free (used);
8596 goto error_ret;
8597 }
8598 insn = bfd_get_32 (ibfd, buf);
8599 if (insn_check == check_lo
39eeab25 8600 ? !ok_lo_toc_insn (insn, r_type)
d4f1ee75
AM
8601 : ((insn & ((0x3f << 26) | 0x1f << 16))
8602 != ((15u << 26) | (2 << 16)) /* addis rt,2,imm */))
8603 {
8604 char str[12];
8605
8606 ppc64_elf_tdata (ibfd)->unexpected_toc_insn = 1;
8607 sprintf (str, "%#08x", insn);
8608 info->callbacks->einfo
695344c0 8609 /* xgettext:c-format */
174d0a74 8610 (_("%H: toc optimization is not supported for"
cf97bcb0 8611 " %s instruction\n"),
d4f1ee75
AM
8612 ibfd, sec, rel->r_offset & ~3, str);
8613 }
8614 }
c5614fa4 8615
d4f1ee75
AM
8616 switch (r_type)
8617 {
8618 case R_PPC64_TOC16:
8619 case R_PPC64_TOC16_LO:
8620 case R_PPC64_TOC16_HI:
8621 case R_PPC64_TOC16_HA:
8622 case R_PPC64_TOC16_DS:
8623 case R_PPC64_TOC16_LO_DS:
8624 /* In case we're taking addresses of toc entries. */
8625 case R_PPC64_ADDR64:
8626 break;
c5614fa4 8627
d4f1ee75
AM
8628 default:
8629 continue;
8630 }
c5614fa4 8631
d4f1ee75
AM
8632 r_symndx = ELF64_R_SYM (rel->r_info);
8633 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms,
8634 r_symndx, ibfd))
8635 {
8636 free (used);
8637 goto error_ret;
8638 }
c5614fa4 8639
d4f1ee75
AM
8640 if (sym_sec != toc)
8641 continue;
c5614fa4 8642
d4f1ee75
AM
8643 if (h != NULL)
8644 val = h->root.u.def.value;
8645 else
8646 val = sym->st_value;
8647 val += rel->r_addend;
ba761f19 8648
d4f1ee75
AM
8649 if (val >= toc->size)
8650 continue;
ba761f19 8651
d4f1ee75
AM
8652 if ((skip[val >> 3] & can_optimize) != 0)
8653 {
8654 bfd_vma off;
8655 unsigned char opc;
8656
8657 switch (r_type)
8658 {
8659 case R_PPC64_TOC16_HA:
ba761f19 8660 break;
ba761f19 8661
d4f1ee75
AM
8662 case R_PPC64_TOC16_LO_DS:
8663 off = rel->r_offset;
8664 off += (bfd_big_endian (ibfd) ? -2 : 3);
8665 if (!bfd_get_section_contents (ibfd, sec, &opc,
8666 off, 1))
8667 {
8668 free (used);
8669 goto error_ret;
8670 }
8671 if ((opc & (0x3f << 2)) == (58u << 2))
8672 break;
1a0670f3 8673 /* Fall through. */
ba761f19 8674
d4f1ee75
AM
8675 default:
8676 /* Wrong sort of reloc, or not a ld. We may
8677 as well clear ref_from_discarded too. */
8678 skip[val >> 3] = 0;
8679 }
8680 }
8681
8682 if (sec != toc)
8683 used[val >> 3] = 1;
8684 /* For the toc section, we only mark as used if this
8685 entry itself isn't unused. */
8686 else if ((used[rel->r_offset >> 3]
8687 || !(skip[rel->r_offset >> 3] & ref_from_discarded))
8688 && !used[val >> 3])
8689 {
8690 /* Do all the relocs again, to catch reference
8691 chains. */
8692 repeat = 1;
8693 used[val >> 3] = 1;
8694 }
8695 }
8696 }
c5614fa4 8697 while (repeat);
854b41e7
AM
8698
8699 if (elf_section_data (sec)->relocs != relstart)
8700 free (relstart);
c5614fa4
AM
8701 }
8702
8703 /* Merge the used and skip arrays. Assume that TOC
8704 doublewords not appearing as either used or unused belong
de194d85 8705 to an entry more than one doubleword in size. */
c5614fa4
AM
8706 for (drop = skip, keep = used, last = 0, some_unused = 0;
8707 drop < skip + (toc->size + 7) / 8;
8708 ++drop, ++keep)
8709 {
8710 if (*keep)
8711 {
ba761f19
AM
8712 *drop &= ~ref_from_discarded;
8713 if ((*drop & can_optimize) != 0)
8714 some_unused = 1;
c5614fa4
AM
8715 last = 0;
8716 }
b140b010 8717 else if ((*drop & ref_from_discarded) != 0)
c5614fa4
AM
8718 {
8719 some_unused = 1;
ba761f19 8720 last = ref_from_discarded;
c5614fa4
AM
8721 }
8722 else
8723 *drop = last;
8724 }
8725
8726 free (used);
8727
8728 if (some_unused)
8729 {
8730 bfd_byte *contents, *src;
8731 unsigned long off;
d62b3684 8732 Elf_Internal_Sym *sym;
ba761f19 8733 bfd_boolean local_toc_syms = FALSE;
c5614fa4
AM
8734
8735 /* Shuffle the toc contents, and at the same time convert the
8736 skip array from booleans into offsets. */
8737 if (!bfd_malloc_and_get_section (ibfd, toc, &contents))
8738 goto error_ret;
8739
8740 elf_section_data (toc)->this_hdr.contents = contents;
8741
8742 for (src = contents, off = 0, drop = skip;
8743 src < contents + toc->size;
8744 src += 8, ++drop)
8745 {
ba761f19
AM
8746 if ((*drop & (can_optimize | ref_from_discarded)) != 0)
8747 off += 8;
c5614fa4
AM
8748 else if (off != 0)
8749 {
8750 *drop = off;
8751 memcpy (src - off, src, 8);
8752 }
8753 }
854b41e7 8754 *drop = off;
c5614fa4
AM
8755 toc->rawsize = toc->size;
8756 toc->size = src - contents - off;
8757
ba761f19
AM
8758 /* Adjust addends for relocs against the toc section sym,
8759 and optimize any accesses we can. */
c5614fa4
AM
8760 for (sec = ibfd->sections; sec != NULL; sec = sec->next)
8761 {
8762 if (sec->reloc_count == 0
dbaa2011 8763 || discarded_section (sec))
c5614fa4
AM
8764 continue;
8765
8766 relstart = _bfd_elf_link_read_relocs (ibfd, sec, NULL, NULL,
854b41e7 8767 info->keep_memory);
c5614fa4
AM
8768 if (relstart == NULL)
8769 goto error_ret;
8770
8771 for (rel = relstart; rel < relstart + sec->reloc_count; ++rel)
8772 {
8773 enum elf_ppc64_reloc_type r_type;
8774 unsigned long r_symndx;
8775 asection *sym_sec;
8776 struct elf_link_hash_entry *h;
854b41e7 8777 bfd_vma val;
c5614fa4
AM
8778
8779 r_type = ELF64_R_TYPE (rel->r_info);
8780 switch (r_type)
8781 {
8782 default:
8783 continue;
8784
8785 case R_PPC64_TOC16:
8786 case R_PPC64_TOC16_LO:
8787 case R_PPC64_TOC16_HI:
8788 case R_PPC64_TOC16_HA:
8789 case R_PPC64_TOC16_DS:
8790 case R_PPC64_TOC16_LO_DS:
8791 case R_PPC64_ADDR64:
8792 break;
8793 }
8794
8795 r_symndx = ELF64_R_SYM (rel->r_info);
8796 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms,
8797 r_symndx, ibfd))
8798 goto error_ret;
8799
ba761f19 8800 if (sym_sec != toc)
c5614fa4
AM
8801 continue;
8802
ba761f19
AM
8803 if (h != NULL)
8804 val = h->root.u.def.value;
8805 else
8806 {
8807 val = sym->st_value;
8808 if (val != 0)
8809 local_toc_syms = TRUE;
8810 }
8811
8812 val += rel->r_addend;
854b41e7
AM
8813
8814 if (val > toc->rawsize)
8815 val = toc->rawsize;
ba761f19
AM
8816 else if ((skip[val >> 3] & ref_from_discarded) != 0)
8817 continue;
8818 else if ((skip[val >> 3] & can_optimize) != 0)
8819 {
8820 Elf_Internal_Rela *tocrel
425b145b 8821 = toc_relocs + (skip[val >> 3] >> 2);
ba761f19
AM
8822 unsigned long tsym = ELF64_R_SYM (tocrel->r_info);
8823
8824 switch (r_type)
8825 {
8826 case R_PPC64_TOC16_HA:
8827 rel->r_info = ELF64_R_INFO (tsym, R_PPC64_TOC16_HA);
8828 break;
8829
8830 case R_PPC64_TOC16_LO_DS:
8831 rel->r_info = ELF64_R_INFO (tsym, R_PPC64_LO_DS_OPT);
8832 break;
8833
8834 default:
28942f62
AM
8835 if (!ppc64_elf_howto_table[R_PPC64_ADDR32])
8836 ppc_howto_init ();
b140b010 8837 info->callbacks->einfo
695344c0 8838 /* xgettext:c-format */
174d0a74 8839 (_("%H: %s references "
b140b010
AM
8840 "optimized away TOC entry\n"),
8841 ibfd, sec, rel->r_offset,
8842 ppc64_elf_howto_table[r_type]->name);
8843 bfd_set_error (bfd_error_bad_value);
8844 goto error_ret;
ba761f19
AM
8845 }
8846 rel->r_addend = tocrel->r_addend;
8847 elf_section_data (sec)->relocs = relstart;
8848 continue;
8849 }
8850
8851 if (h != NULL || sym->st_value != 0)
8852 continue;
854b41e7
AM
8853
8854 rel->r_addend -= skip[val >> 3];
8855 elf_section_data (sec)->relocs = relstart;
c5614fa4 8856 }
854b41e7
AM
8857
8858 if (elf_section_data (sec)->relocs != relstart)
8859 free (relstart);
c5614fa4
AM
8860 }
8861
8862 /* We shouldn't have local or global symbols defined in the TOC,
8863 but handle them anyway. */
df22d223
AM
8864 if (local_syms != NULL)
8865 for (sym = local_syms;
8866 sym < local_syms + symtab_hdr->sh_info;
8867 ++sym)
8868 if (sym->st_value != 0
8869 && bfd_section_from_elf_index (ibfd, sym->st_shndx) == toc)
8870 {
8871 unsigned long i;
854b41e7 8872
df22d223
AM
8873 if (sym->st_value > toc->rawsize)
8874 i = toc->rawsize >> 3;
8875 else
8876 i = sym->st_value >> 3;
854b41e7 8877
df22d223
AM
8878 if ((skip[i] & (ref_from_discarded | can_optimize)) != 0)
8879 {
8880 if (local_toc_syms)
4eca0228 8881 _bfd_error_handler
df22d223
AM
8882 (_("%s defined on removed toc entry"),
8883 bfd_elf_sym_name (ibfd, symtab_hdr, sym, NULL));
8884 do
8885 ++i;
8886 while ((skip[i] & (ref_from_discarded | can_optimize)));
8887 sym->st_value = (bfd_vma) i << 3;
8888 }
d62b3684 8889
df22d223
AM
8890 sym->st_value -= skip[i];
8891 symtab_hdr->contents = (unsigned char *) local_syms;
8892 }
c5614fa4 8893
854b41e7 8894 /* Adjust any global syms defined in this toc input section. */
c5614fa4
AM
8895 if (toc_inf.global_toc_syms)
8896 {
8897 toc_inf.toc = toc;
8898 toc_inf.skip = skip;
8899 toc_inf.global_toc_syms = FALSE;
8900 elf_link_hash_traverse (elf_hash_table (info), adjust_toc_syms,
8901 &toc_inf);
8902 }
854b41e7
AM
8903
8904 if (toc->reloc_count != 0)
8905 {
d4730f92 8906 Elf_Internal_Shdr *rel_hdr;
854b41e7
AM
8907 Elf_Internal_Rela *wrel;
8908 bfd_size_type sz;
8909
854b41e7 8910 /* Remove unused toc relocs, and adjust those we keep. */
28be611c
AM
8911 if (toc_relocs == NULL)
8912 toc_relocs = _bfd_elf_link_read_relocs (ibfd, toc, NULL, NULL,
8913 info->keep_memory);
8914 if (toc_relocs == NULL)
8915 goto error_ret;
8916
425b145b
AM
8917 wrel = toc_relocs;
8918 for (rel = toc_relocs; rel < toc_relocs + toc->reloc_count; ++rel)
ba761f19
AM
8919 if ((skip[rel->r_offset >> 3]
8920 & (ref_from_discarded | can_optimize)) == 0)
854b41e7
AM
8921 {
8922 wrel->r_offset = rel->r_offset - skip[rel->r_offset >> 3];
8923 wrel->r_info = rel->r_info;
8924 wrel->r_addend = rel->r_addend;
8925 ++wrel;
8926 }
8927 else if (!dec_dynrel_count (rel->r_info, toc, info,
8928 &local_syms, NULL, NULL))
8929 goto error_ret;
8930
425b145b
AM
8931 elf_section_data (toc)->relocs = toc_relocs;
8932 toc->reloc_count = wrel - toc_relocs;
d4730f92
BS
8933 rel_hdr = _bfd_elf_single_rel_hdr (toc);
8934 sz = rel_hdr->sh_entsize;
8935 rel_hdr->sh_size = toc->reloc_count * sz;
854b41e7 8936 }
c5614fa4 8937 }
28be611c
AM
8938 else if (toc_relocs != NULL
8939 && elf_section_data (toc)->relocs != toc_relocs)
425b145b 8940 free (toc_relocs);
c5614fa4
AM
8941
8942 if (local_syms != NULL
8943 && symtab_hdr->contents != (unsigned char *) local_syms)
8944 {
8945 if (!info->keep_memory)
8946 free (local_syms);
8947 else
8948 symtab_hdr->contents = (unsigned char *) local_syms;
8949 }
8950 free (skip);
8951 }
8952
066f4018 8953 /* Look for cases where we can change an indirect GOT access to
4a421c53
AM
8954 a GOT relative or PC relative access, possibly reducing the
8955 number of GOT entries. */
066f4018
AM
8956 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
8957 {
8958 asection *sec;
8959 Elf_Internal_Shdr *symtab_hdr;
8960 Elf_Internal_Sym *local_syms;
8961 Elf_Internal_Rela *relstart, *rel;
8962 bfd_vma got;
8963
8964 if (!is_ppc64_elf (ibfd))
8965 continue;
8966
8967 if (!ppc64_elf_tdata (ibfd)->has_gotrel)
8968 continue;
8969
8970 sec = ppc64_elf_tdata (ibfd)->got;
8971 got = sec->output_section->vma + sec->output_offset + 0x8000;
8972
8973 local_syms = NULL;
8974 symtab_hdr = &elf_symtab_hdr (ibfd);
8975
8976 for (sec = ibfd->sections; sec != NULL; sec = sec->next)
8977 {
8978 if (sec->reloc_count == 0
8979 || !ppc64_elf_section_data (sec)->has_gotrel
8980 || discarded_section (sec))
8981 continue;
8982
8983 relstart = _bfd_elf_link_read_relocs (ibfd, sec, NULL, NULL,
8984 info->keep_memory);
8985 if (relstart == NULL)
8986 {
8987 got_error_ret:
8988 if (local_syms != NULL
8989 && symtab_hdr->contents != (unsigned char *) local_syms)
8990 free (local_syms);
8991 if (sec != NULL
8992 && relstart != NULL
8993 && elf_section_data (sec)->relocs != relstart)
8994 free (relstart);
8995 return FALSE;
8996 }
8997
8998 for (rel = relstart; rel < relstart + sec->reloc_count; ++rel)
8999 {
9000 enum elf_ppc64_reloc_type r_type;
9001 unsigned long r_symndx;
9002 Elf_Internal_Sym *sym;
9003 asection *sym_sec;
9004 struct elf_link_hash_entry *h;
9005 struct got_entry *ent;
4a421c53
AM
9006 bfd_vma sym_addend, val, pc;
9007 unsigned char buf[8];
066f4018
AM
9008 unsigned int insn;
9009
9010 r_type = ELF64_R_TYPE (rel->r_info);
9011 switch (r_type)
9012 {
9013 default:
9014 continue;
9015
9016 case R_PPC64_GOT16_DS:
9017 case R_PPC64_GOT16_HA:
9018 case R_PPC64_GOT16_LO_DS:
4a421c53
AM
9019 sym_addend = rel->r_addend;
9020 break;
9021
9022 case R_PPC64_GOT_PCREL34:
9023 sym_addend = 0;
066f4018
AM
9024 break;
9025 }
9026
9027 r_symndx = ELF64_R_SYM (rel->r_info);
9028 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms,
9029 r_symndx, ibfd))
9030 goto got_error_ret;
9031
9032 if (!SYMBOL_REFERENCES_LOCAL (info, h))
9033 continue;
9034
9035 if (h != NULL)
9036 val = h->root.u.def.value;
9037 else
9038 val = sym->st_value;
4a421c53 9039 val += sym_addend;
066f4018
AM
9040 val += sym_sec->output_section->vma + sym_sec->output_offset;
9041
9042 switch (r_type)
9043 {
9044 default:
9045 continue;
9046
9047 case R_PPC64_GOT16_DS:
9048 if (val - got + 0x8000 >= 0x10000)
9049 continue;
9050 if (!bfd_get_section_contents (ibfd, sec, buf,
9051 rel->r_offset & ~3, 4))
9052 goto got_error_ret;
9053 insn = bfd_get_32 (ibfd, buf);
9054 if ((insn & (0x3f << 26 | 0x3)) != 58u << 26 /* ld */)
9055 continue;
9056 break;
9057
9058 case R_PPC64_GOT16_HA:
9059 if (val - got + 0x80008000ULL >= 0x100000000ULL)
9060 continue;
9061
9062 if (!bfd_get_section_contents (ibfd, sec, buf,
9063 rel->r_offset & ~3, 4))
9064 goto got_error_ret;
9065 insn = bfd_get_32 (ibfd, buf);
9066 if (((insn & ((0x3f << 26) | 0x1f << 16))
9067 != ((15u << 26) | (2 << 16)) /* addis rt,2,imm */))
9068 continue;
9069 break;
9070
9071 case R_PPC64_GOT16_LO_DS:
9072 if (val - got + 0x80008000ULL >= 0x100000000ULL)
9073 continue;
9074 if (!bfd_get_section_contents (ibfd, sec, buf,
9075 rel->r_offset & ~3, 4))
9076 goto got_error_ret;
9077 insn = bfd_get_32 (ibfd, buf);
9078 if ((insn & (0x3f << 26 | 0x3)) != 58u << 26 /* ld */)
9079 continue;
9080 break;
4a421c53
AM
9081
9082 case R_PPC64_GOT_PCREL34:
9083 pc = rel->r_offset;
9084 pc += sec->output_section->vma + sec->output_offset;
9085 if (val - pc + (1ULL << 33) >= 1ULL << 34)
9086 continue;
9087 if (!bfd_get_section_contents (ibfd, sec, buf,
9088 rel->r_offset & ~3, 8))
9089 goto got_error_ret;
9090 insn = bfd_get_32 (ibfd, buf);
9091 if ((insn & (-1u << 18)) != ((1u << 26) | (1u << 20)))
9092 continue;
9093 insn = bfd_get_32 (ibfd, buf + 4);
9094 if ((insn & (0x3f << 26)) != 57u << 26)
9095 continue;
9096 break;
066f4018
AM
9097 }
9098
9099 if (h != NULL)
9100 ent = h->got.glist;
9101 else
9102 {
9103 struct got_entry **local_got_ents = elf_local_got_ents (ibfd);
9104 ent = local_got_ents[r_symndx];
9105 }
9106 for (; ent != NULL; ent = ent->next)
4a421c53 9107 if (ent->addend == sym_addend
066f4018
AM
9108 && ent->owner == ibfd
9109 && ent->tls_type == 0)
9110 break;
9111 BFD_ASSERT (ent && ent->got.refcount > 0);
9112 ent->got.refcount -= 1;
9113 }
9114
9115 if (elf_section_data (sec)->relocs != relstart)
9116 free (relstart);
9117 }
9118
9119 if (local_syms != NULL
9120 && symtab_hdr->contents != (unsigned char *) local_syms)
9121 {
9122 if (!info->keep_memory)
9123 free (local_syms);
9124 else
9125 symtab_hdr->contents = (unsigned char *) local_syms;
9126 }
9127 }
9128
c5614fa4
AM
9129 return TRUE;
9130}
9131
1bbe0902
AM
9132/* Return true iff input section I references the TOC using
9133 instructions limited to +/-32k offsets. */
9134
9135bfd_boolean
9136ppc64_elf_has_small_toc_reloc (asection *i)
9137{
9138 return (is_ppc64_elf (i->owner)
9139 && ppc64_elf_tdata (i->owner)->has_small_toc_reloc);
9140}
9141
927be08e
AM
9142/* Allocate space for one GOT entry. */
9143
9144static void
9145allocate_got (struct elf_link_hash_entry *h,
9146 struct bfd_link_info *info,
9147 struct got_entry *gent)
9148{
9149 struct ppc_link_hash_table *htab = ppc_hash_table (info);
927be08e
AM
9150 struct ppc_link_hash_entry *eh = (struct ppc_link_hash_entry *) h;
9151 int entsize = (gent->tls_type & eh->tls_mask & (TLS_GD | TLS_LD)
9152 ? 16 : 8);
9153 int rentsize = (gent->tls_type & eh->tls_mask & TLS_GD
9154 ? 2 : 1) * sizeof (Elf64_External_Rela);
9155 asection *got = ppc64_elf_tdata (gent->owner)->got;
9156
9157 gent->got.offset = got->size;
9158 got->size += entsize;
9159
19e08130 9160 if (h->type == STT_GNU_IFUNC)
927be08e 9161 {
33e44f2e 9162 htab->elf.irelplt->size += rentsize;
19e08130 9163 htab->got_reli_size += rentsize;
927be08e 9164 }
f15d0b54
AM
9165 else if (((bfd_link_pic (info)
9166 && !((gent->tls_type & TLS_TPREL) != 0
9167 && bfd_link_executable (info)
9168 && SYMBOL_REFERENCES_LOCAL (info, h)))
f0158f44
AM
9169 || (htab->elf.dynamic_sections_created
9170 && h->dynindx != -1
9171 && !SYMBOL_REFERENCES_LOCAL (info, h)))
21d68fcd 9172 && !UNDEFWEAK_NO_DYNAMIC_RELOC (info, h))
927be08e 9173 {
19e08130 9174 asection *relgot = ppc64_elf_tdata (gent->owner)->relgot;
927be08e 9175 relgot->size += rentsize;
927be08e
AM
9176 }
9177}
9178
7865406b
AM
9179/* This function merges got entries in the same toc group. */
9180
9181static void
9182merge_got_entries (struct got_entry **pent)
9183{
9184 struct got_entry *ent, *ent2;
9185
9186 for (ent = *pent; ent != NULL; ent = ent->next)
9187 if (!ent->is_indirect)
9188 for (ent2 = ent->next; ent2 != NULL; ent2 = ent2->next)
9189 if (!ent2->is_indirect
9190 && ent2->addend == ent->addend
9191 && ent2->tls_type == ent->tls_type
9192 && elf_gp (ent2->owner) == elf_gp (ent->owner))
9193 {
9194 ent2->is_indirect = TRUE;
9195 ent2->got.ent = ent;
9196 }
9197}
9198
46434633 9199/* If H is undefined, make it dynamic if that makes sense. */
f0158f44
AM
9200
9201static bfd_boolean
46434633
AM
9202ensure_undef_dynamic (struct bfd_link_info *info,
9203 struct elf_link_hash_entry *h)
f0158f44
AM
9204{
9205 struct elf_link_hash_table *htab = elf_hash_table (info);
9206
9207 if (htab->dynamic_sections_created
46434633
AM
9208 && ((info->dynamic_undefined_weak != 0
9209 && h->root.type == bfd_link_hash_undefweak)
9210 || h->root.type == bfd_link_hash_undefined)
f0158f44
AM
9211 && h->dynindx == -1
9212 && !h->forced_local
9213 && ELF_ST_VISIBILITY (h->other) == STV_DEFAULT)
9214 return bfd_elf_link_record_dynamic_symbol (info, h);
9215 return TRUE;
9216}
9217
65f38f15
AM
9218/* Allocate space in .plt, .got and associated reloc sections for
9219 dynamic relocs. */
5bd4f169 9220
b34976b6 9221static bfd_boolean
4ce794b7 9222allocate_dynrelocs (struct elf_link_hash_entry *h, void *inf)
5bd4f169 9223{
65f38f15
AM
9224 struct bfd_link_info *info;
9225 struct ppc_link_hash_table *htab;
5bd4f169 9226 asection *s;
65f38f15 9227 struct ppc_link_hash_entry *eh;
0b8bcf0d 9228 struct got_entry **pgent, *gent;
5bd4f169 9229
e92d460e 9230 if (h->root.type == bfd_link_hash_indirect)
b34976b6 9231 return TRUE;
5bd4f169 9232
65f38f15
AM
9233 info = (struct bfd_link_info *) inf;
9234 htab = ppc_hash_table (info);
4dfe6ac6
NC
9235 if (htab == NULL)
9236 return FALSE;
5bd4f169 9237
951fd09b
AM
9238 eh = (struct ppc_link_hash_entry *) h;
9239 /* Run through the TLS GD got entries first if we're changing them
9240 to TPREL. */
37da22e5 9241 if ((eh->tls_mask & (TLS_TLS | TLS_TPRELGD)) == (TLS_TLS | TLS_TPRELGD))
951fd09b
AM
9242 for (gent = h->got.glist; gent != NULL; gent = gent->next)
9243 if (gent->got.refcount > 0
9244 && (gent->tls_type & TLS_GD) != 0)
9245 {
9246 /* This was a GD entry that has been converted to TPREL. If
9247 there happens to be a TPREL entry we can use that one. */
9248 struct got_entry *ent;
9249 for (ent = h->got.glist; ent != NULL; ent = ent->next)
9250 if (ent->got.refcount > 0
9251 && (ent->tls_type & TLS_TPREL) != 0
e717da7e
AM
9252 && ent->addend == gent->addend
9253 && ent->owner == gent->owner)
951fd09b
AM
9254 {
9255 gent->got.refcount = 0;
9256 break;
9257 }
9258
9259 /* If not, then we'll be using our own TPREL entry. */
9260 if (gent->got.refcount != 0)
9261 gent->tls_type = TLS_TLS | TLS_TPREL;
9262 }
9263
7865406b
AM
9264 /* Remove any list entry that won't generate a word in the GOT before
9265 we call merge_got_entries. Otherwise we risk merging to empty
9266 entries. */
0b8bcf0d
AM
9267 pgent = &h->got.glist;
9268 while ((gent = *pgent) != NULL)
411e1bfb 9269 if (gent->got.refcount > 0)
7865406b
AM
9270 {
9271 if ((gent->tls_type & TLS_LD) != 0
9272 && !h->def_dynamic)
9273 {
9274 ppc64_tlsld_got (gent->owner)->got.refcount += 1;
9275 *pgent = gent->next;
9276 }
9277 else
9278 pgent = &gent->next;
9279 }
9280 else
9281 *pgent = gent->next;
9282
9283 if (!htab->do_multi_toc)
9284 merge_got_entries (&h->got.glist);
9285
9286 for (gent = h->got.glist; gent != NULL; gent = gent->next)
9287 if (!gent->is_indirect)
411e1bfb 9288 {
46434633
AM
9289 /* Make sure this symbol is output as a dynamic symbol. */
9290 if (!ensure_undef_dynamic (info, h))
f0158f44 9291 return FALSE;
65f38f15 9292
0c8d6e5c 9293 if (!is_ppc64_elf (gent->owner))
927be08e 9294 abort ();
0ffa91dd 9295
927be08e 9296 allocate_got (h, info, gent);
411e1bfb 9297 }
65f38f15 9298
954b63d4
AM
9299 /* If no dynamic sections we can't have dynamic relocs, except for
9300 IFUNCs which are handled even in static executables. */
8a2058b5
AM
9301 if (!htab->elf.dynamic_sections_created
9302 && h->type != STT_GNU_IFUNC)
9303 eh->dyn_relocs = NULL;
9304
529fe20e
AM
9305 /* Discard relocs on undefined symbols that must be local. */
9306 else if (h->root.type == bfd_link_hash_undefined
9307 && ELF_ST_VISIBILITY (h->other) != STV_DEFAULT)
9308 eh->dyn_relocs = NULL;
9309
954b63d4
AM
9310 /* Also discard relocs on undefined weak syms with non-default
9311 visibility, or when dynamic_undefined_weak says so. */
21d68fcd 9312 else if (UNDEFWEAK_NO_DYNAMIC_RELOC (info, h))
954b63d4
AM
9313 eh->dyn_relocs = NULL;
9314
8a2058b5 9315 if (eh->dyn_relocs != NULL)
65f38f15 9316 {
8a2058b5
AM
9317 struct elf_dyn_relocs *p, **pp;
9318
57e7d118
AM
9319 /* In the shared -Bsymbolic case, discard space allocated for
9320 dynamic pc-relative relocs against symbols which turn out to
9321 be defined in regular objects. For the normal shared case,
9322 discard space for relocs that have become local due to symbol
9323 visibility changes. */
9324
9325 if (bfd_link_pic (info))
65f38f15 9326 {
57e7d118
AM
9327 /* Relocs that use pc_count are those that appear on a call
9328 insn, or certain REL relocs (see must_be_dyn_reloc) that
9329 can be generated via assembly. We want calls to
9330 protected symbols to resolve directly to the function
9331 rather than going via the plt. If people want function
9332 pointer comparisons to work as expected then they should
9333 avoid writing weird assembly. */
9334 if (SYMBOL_CALLS_LOCAL (info, h))
9335 {
57e7d118
AM
9336 for (pp = &eh->dyn_relocs; (p = *pp) != NULL; )
9337 {
9338 p->count -= p->pc_count;
9339 p->pc_count = 0;
9340 if (p->count == 0)
9341 *pp = p->next;
9342 else
9343 pp = &p->next;
9344 }
9345 }
65f38f15 9346
954b63d4 9347 if (eh->dyn_relocs != NULL)
5bd4f169 9348 {
46434633
AM
9349 /* Make sure this symbol is output as a dynamic symbol. */
9350 if (!ensure_undef_dynamic (info, h))
f0158f44 9351 return FALSE;
5bd4f169 9352 }
65f38f15 9353 }
529fe20e 9354 else if (ELIMINATE_COPY_RELOCS && h->type != STT_GNU_IFUNC)
57e7d118 9355 {
8a2058b5 9356 /* For the non-pic case, discard space for relocs against
57e7d118
AM
9357 symbols which turn out to need copy relocs or are not
9358 dynamic. */
529fe20e
AM
9359 if (h->dynamic_adjusted
9360 && !h->def_regular
9361 && !ELF_COMMON_DEF_P (h))
f0158f44 9362 {
46434633
AM
9363 /* Make sure this symbol is output as a dynamic symbol. */
9364 if (!ensure_undef_dynamic (info, h))
f0158f44 9365 return FALSE;
dfbb6ac9 9366
f0158f44
AM
9367 if (h->dynindx == -1)
9368 eh->dyn_relocs = NULL;
9369 }
9370 else
8a2058b5 9371 eh->dyn_relocs = NULL;
57e7d118
AM
9372 }
9373
9374 /* Finally, allocate space. */
9375 for (p = eh->dyn_relocs; p != NULL; p = p->next)
9376 {
9377 asection *sreloc = elf_section_data (p->sec)->sreloc;
9378 if (eh->elf.type == STT_GNU_IFUNC)
9379 sreloc = htab->elf.irelplt;
9380 sreloc->size += p->count * sizeof (Elf64_External_Rela);
dfbb6ac9 9381 }
65f38f15 9382 }
57e7d118 9383
2d7ad24e
AM
9384 /* We might need a PLT entry when the symbol
9385 a) is dynamic, or
9386 b) is an ifunc, or
9387 c) has plt16 relocs and has been processed by adjust_dynamic_symbol, or
9388 d) has plt16 relocs and we are linking statically. */
9389 if ((htab->elf.dynamic_sections_created && h->dynindx != -1)
9390 || h->type == STT_GNU_IFUNC
9391 || (h->needs_plt && h->dynamic_adjusted)
9392 || (h->needs_plt
9393 && h->def_regular
9394 && !htab->elf.dynamic_sections_created
3e04d765 9395 && !htab->can_convert_all_inline_plt
2d7ad24e
AM
9396 && (((struct ppc_link_hash_entry *) h)->tls_mask
9397 & (TLS_TLS | PLT_KEEP)) == PLT_KEEP))
65f38f15 9398 {
57e7d118
AM
9399 struct plt_entry *pent;
9400 bfd_boolean doneone = FALSE;
9401 for (pent = h->plt.plist; pent != NULL; pent = pent->next)
9402 if (pent->plt.refcount > 0)
9403 {
9404 if (!htab->elf.dynamic_sections_created
9405 || h->dynindx == -1)
9406 {
2d7ad24e
AM
9407 if (h->type == STT_GNU_IFUNC)
9408 {
9409 s = htab->elf.iplt;
9410 pent->plt.offset = s->size;
9411 s->size += PLT_ENTRY_SIZE (htab);
9412 s = htab->elf.irelplt;
9413 }
9414 else
9415 {
9416 s = htab->pltlocal;
9417 pent->plt.offset = s->size;
9418 s->size += LOCAL_PLT_ENTRY_SIZE (htab);
9419 s = bfd_link_pic (info) ? htab->relpltlocal : NULL;
9420 }
57e7d118
AM
9421 }
9422 else
9423 {
9424 /* If this is the first .plt entry, make room for the special
9425 first entry. */
9426 s = htab->elf.splt;
9427 if (s->size == 0)
9428 s->size += PLT_INITIAL_ENTRY_SIZE (htab);
65f38f15 9429
57e7d118 9430 pent->plt.offset = s->size;
65f38f15 9431
57e7d118
AM
9432 /* Make room for this entry. */
9433 s->size += PLT_ENTRY_SIZE (htab);
65f38f15 9434
57e7d118
AM
9435 /* Make room for the .glink code. */
9436 s = htab->glink;
9437 if (s->size == 0)
9e390558 9438 s->size += GLINK_PLTRESOLVE_SIZE (htab);
57e7d118
AM
9439 if (htab->opd_abi)
9440 {
9441 /* We need bigger stubs past index 32767. */
9e390558 9442 if (s->size >= GLINK_PLTRESOLVE_SIZE (htab) + 32768*2*4)
57e7d118
AM
9443 s->size += 4;
9444 s->size += 2*4;
9445 }
9446 else
9447 s->size += 4;
65f38f15 9448
57e7d118
AM
9449 /* We also need to make an entry in the .rela.plt section. */
9450 s = htab->elf.srelplt;
9451 }
2d7ad24e
AM
9452 if (s != NULL)
9453 s->size += sizeof (Elf64_External_Rela);
57e7d118
AM
9454 doneone = TRUE;
9455 }
9456 else
9457 pent->plt.offset = (bfd_vma) -1;
9458 if (!doneone)
9459 {
9460 h->plt.plist = NULL;
9461 h->needs_plt = 0;
9462 }
65f38f15 9463 }
57e7d118 9464 else
65f38f15 9465 {
57e7d118
AM
9466 h->plt.plist = NULL;
9467 h->needs_plt = 0;
65f38f15
AM
9468 }
9469
b34976b6 9470 return TRUE;
65f38f15
AM
9471}
9472
9e390558
AM
9473#define PPC_LO(v) ((v) & 0xffff)
9474#define PPC_HI(v) (((v) >> 16) & 0xffff)
9475#define PPC_HA(v) PPC_HI ((v) + 0x8000)
04bdff6a
AM
9476#define D34(v) \
9477 ((((v) & 0x3ffff0000ULL) << 16) | (v & 0xffff))
9478#define HA34(v) ((v + (1ULL << 33)) >> 34)
9e390558 9479
a345bc8d
AM
9480/* Called via elf_link_hash_traverse from ppc64_elf_size_dynamic_sections
9481 to set up space for global entry stubs. These are put in glink,
9482 after the branch table. */
65f38f15 9483
b34976b6 9484static bfd_boolean
a345bc8d 9485size_global_entry_stubs (struct elf_link_hash_entry *h, void *inf)
65f38f15 9486{
a345bc8d
AM
9487 struct bfd_link_info *info;
9488 struct ppc_link_hash_table *htab;
9489 struct plt_entry *pent;
9e390558 9490 asection *s, *plt;
65f38f15 9491
a345bc8d
AM
9492 if (h->root.type == bfd_link_hash_indirect)
9493 return TRUE;
65f38f15 9494
a345bc8d
AM
9495 if (!h->pointer_equality_needed)
9496 return TRUE;
65f38f15 9497
a345bc8d
AM
9498 if (h->def_regular)
9499 return TRUE;
65f38f15 9500
a345bc8d
AM
9501 info = inf;
9502 htab = ppc_hash_table (info);
9503 if (htab == NULL)
9504 return FALSE;
9505
9e390558
AM
9506 s = htab->global_entry;
9507 plt = htab->elf.splt;
a345bc8d
AM
9508 for (pent = h->plt.plist; pent != NULL; pent = pent->next)
9509 if (pent->plt.offset != (bfd_vma) -1
9510 && pent->addend == 0)
9511 {
afe397ea
AM
9512 /* For ELFv2, if this symbol is not defined in a regular file
9513 and we are not generating a shared library or pie, then we
9514 need to define the symbol in the executable on a call stub.
9515 This is to avoid text relocations. */
9e390558
AM
9516 bfd_vma off, stub_align, stub_off, stub_size;
9517 unsigned int align_power;
9518
9519 stub_size = 16;
9520 stub_off = s->size;
9521 if (htab->params->plt_stub_align >= 0)
9522 align_power = htab->params->plt_stub_align;
9523 else
9524 align_power = -htab->params->plt_stub_align;
9525 /* Setting section alignment is delayed until we know it is
9526 non-empty. Otherwise the .text output section will be
9527 aligned at least to plt_stub_align even when no global
9528 entry stubs are needed. */
9529 if (s->alignment_power < align_power)
9530 s->alignment_power = align_power;
9531 stub_align = (bfd_vma) 1 << align_power;
9532 if (htab->params->plt_stub_align >= 0
9533 || ((((stub_off + stub_size - 1) & -stub_align)
9534 - (stub_off & -stub_align))
9535 > ((stub_size - 1) & -stub_align)))
9536 stub_off = (stub_off + stub_align - 1) & -stub_align;
9537 off = pent->plt.offset + plt->output_offset + plt->output_section->vma;
9538 off -= stub_off + s->output_offset + s->output_section->vma;
9539 /* Note that for --plt-stub-align negative we have a possible
9540 dependency between stub offset and size. Break that
9541 dependency by assuming the max stub size when calculating
9542 the stub offset. */
9543 if (PPC_HA (off) == 0)
9544 stub_size -= 4;
8a2058b5 9545 h->root.type = bfd_link_hash_defined;
afe397ea 9546 h->root.u.def.section = s;
9e390558
AM
9547 h->root.u.def.value = stub_off;
9548 s->size = stub_off + stub_size;
a345bc8d
AM
9549 break;
9550 }
9551 return TRUE;
9552}
9553
9554/* Set DF_TEXTREL if we find any dynamic relocs that apply to
9555 read-only sections. */
9556
9557static bfd_boolean
98bbb1b8 9558maybe_set_textrel (struct elf_link_hash_entry *h, void *inf)
a345bc8d 9559{
98bbb1b8
AM
9560 asection *sec;
9561
a345bc8d
AM
9562 if (h->root.type == bfd_link_hash_indirect)
9563 return TRUE;
9564
98bbb1b8
AM
9565 sec = readonly_dynrelocs (h);
9566 if (sec != NULL)
a345bc8d 9567 {
98bbb1b8
AM
9568 struct bfd_link_info *info = (struct bfd_link_info *) inf;
9569
9570 info->flags |= DF_TEXTREL;
2cdcc330
AM
9571 info->callbacks->minfo (_("%pB: dynamic relocation against `%pT'"
9572 " in read-only section `%pA'\n"),
9573 sec->owner, h->root.root.string, sec);
a345bc8d
AM
9574
9575 /* Not an error, just cut short the traversal. */
9576 return FALSE;
65f38f15 9577 }
b34976b6 9578 return TRUE;
65f38f15
AM
9579}
9580
9581/* Set the sizes of the dynamic sections. */
9582
b34976b6 9583static bfd_boolean
ee67d69a 9584ppc64_elf_size_dynamic_sections (bfd *output_bfd,
4ce794b7 9585 struct bfd_link_info *info)
65f38f15
AM
9586{
9587 struct ppc_link_hash_table *htab;
9588 bfd *dynobj;
9589 asection *s;
b34976b6 9590 bfd_boolean relocs;
65f38f15 9591 bfd *ibfd;
7865406b 9592 struct got_entry *first_tlsld;
65f38f15
AM
9593
9594 htab = ppc_hash_table (info);
4dfe6ac6
NC
9595 if (htab == NULL)
9596 return FALSE;
9597
65f38f15
AM
9598 dynobj = htab->elf.dynobj;
9599 if (dynobj == NULL)
9600 abort ();
9601
9602 if (htab->elf.dynamic_sections_created)
9603 {
9604 /* Set the contents of the .interp section to the interpreter. */
9b8b325a 9605 if (bfd_link_executable (info) && !info->nointerp)
65f38f15 9606 {
3d4d4302 9607 s = bfd_get_linker_section (dynobj, ".interp");
65f38f15
AM
9608 if (s == NULL)
9609 abort ();
eea6121a 9610 s->size = sizeof ELF_DYNAMIC_INTERPRETER;
65f38f15
AM
9611 s->contents = (unsigned char *) ELF_DYNAMIC_INTERPRETER;
9612 }
9613 }
9614
9615 /* Set up .got offsets for local syms, and space for local dynamic
9616 relocs. */
c72f2fb2 9617 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
65f38f15 9618 {
411e1bfb
AM
9619 struct got_entry **lgot_ents;
9620 struct got_entry **end_lgot_ents;
e054468f
AM
9621 struct plt_entry **local_plt;
9622 struct plt_entry **end_local_plt;
f961d9dd 9623 unsigned char *lgot_masks;
65f38f15
AM
9624 bfd_size_type locsymcount;
9625 Elf_Internal_Shdr *symtab_hdr;
65f38f15 9626
0c8d6e5c 9627 if (!is_ppc64_elf (ibfd))
65f38f15
AM
9628 continue;
9629
9630 for (s = ibfd->sections; s != NULL; s = s->next)
9631 {
19e08130 9632 struct ppc_dyn_relocs *p;
65f38f15 9633
6edfbbad 9634 for (p = elf_section_data (s)->local_dynrel; p != NULL; p = p->next)
65f38f15 9635 {
ec338859
AM
9636 if (!bfd_is_abs_section (p->sec)
9637 && bfd_is_abs_section (p->sec->output_section))
9638 {
9639 /* Input section has been discarded, either because
9640 it is a copy of a linkonce section or due to
9641 linker script /DISCARD/, so we'll be discarding
9642 the relocs too. */
9643 }
248866a8 9644 else if (p->count != 0)
ec338859 9645 {
19e08130
AM
9646 asection *srel = elf_section_data (p->sec)->sreloc;
9647 if (p->ifunc)
33e44f2e 9648 srel = htab->elf.irelplt;
eea6121a 9649 srel->size += p->count * sizeof (Elf64_External_Rela);
248866a8
AM
9650 if ((p->sec->output_section->flags & SEC_READONLY) != 0)
9651 info->flags |= DF_TEXTREL;
ec338859 9652 }
65f38f15
AM
9653 }
9654 }
9655
411e1bfb
AM
9656 lgot_ents = elf_local_got_ents (ibfd);
9657 if (!lgot_ents)
65f38f15
AM
9658 continue;
9659
0ffa91dd 9660 symtab_hdr = &elf_symtab_hdr (ibfd);
65f38f15 9661 locsymcount = symtab_hdr->sh_info;
411e1bfb 9662 end_lgot_ents = lgot_ents + locsymcount;
e054468f
AM
9663 local_plt = (struct plt_entry **) end_lgot_ents;
9664 end_local_plt = local_plt + locsymcount;
f961d9dd 9665 lgot_masks = (unsigned char *) end_local_plt;
e717da7e 9666 s = ppc64_elf_tdata (ibfd)->got;
e7b938ca 9667 for (; lgot_ents < end_lgot_ents; ++lgot_ents, ++lgot_masks)
65f38f15 9668 {
0b8bcf0d 9669 struct got_entry **pent, *ent;
411e1bfb 9670
0b8bcf0d
AM
9671 pent = lgot_ents;
9672 while ((ent = *pent) != NULL)
411e1bfb
AM
9673 if (ent->got.refcount > 0)
9674 {
e7b938ca 9675 if ((ent->tls_type & *lgot_masks & TLS_LD) != 0)
411e1bfb 9676 {
927be08e 9677 ppc64_tlsld_got (ibfd)->got.refcount += 1;
0b8bcf0d 9678 *pent = ent->next;
411e1bfb
AM
9679 }
9680 else
9681 {
19e08130
AM
9682 unsigned int ent_size = 8;
9683 unsigned int rel_size = sizeof (Elf64_External_Rela);
9684
eea6121a 9685 ent->got.offset = s->size;
e7b938ca 9686 if ((ent->tls_type & *lgot_masks & TLS_GD) != 0)
927be08e 9687 {
19e08130
AM
9688 ent_size *= 2;
9689 rel_size *= 2;
9690 }
9691 s->size += ent_size;
37da22e5 9692 if ((*lgot_masks & (TLS_TLS | PLT_IFUNC)) == PLT_IFUNC)
19e08130 9693 {
33e44f2e 9694 htab->elf.irelplt->size += rel_size;
19e08130
AM
9695 htab->got_reli_size += rel_size;
9696 }
f15d0b54
AM
9697 else if (bfd_link_pic (info)
9698 && !((ent->tls_type & TLS_TPREL) != 0
9699 && bfd_link_executable (info)))
19e08130
AM
9700 {
9701 asection *srel = ppc64_elf_tdata (ibfd)->relgot;
9702 srel->size += rel_size;
927be08e 9703 }
0b8bcf0d 9704 pent = &ent->next;
411e1bfb
AM
9705 }
9706 }
9707 else
0b8bcf0d 9708 *pent = ent->next;
65f38f15 9709 }
e054468f 9710
2d7ad24e
AM
9711 /* Allocate space for plt calls to local syms. */
9712 lgot_masks = (unsigned char *) end_local_plt;
9713 for (; local_plt < end_local_plt; ++local_plt, ++lgot_masks)
e054468f
AM
9714 {
9715 struct plt_entry *ent;
9716
9717 for (ent = *local_plt; ent != NULL; ent = ent->next)
9718 if (ent->plt.refcount > 0)
9719 {
2d7ad24e
AM
9720 if ((*lgot_masks & (TLS_TLS | PLT_IFUNC)) == PLT_IFUNC)
9721 {
9722 s = htab->elf.iplt;
9723 ent->plt.offset = s->size;
9724 s->size += PLT_ENTRY_SIZE (htab);
9725 htab->elf.irelplt->size += sizeof (Elf64_External_Rela);
9726 }
3e04d765
AM
9727 else if (htab->can_convert_all_inline_plt
9728 || (*lgot_masks & (TLS_TLS | PLT_KEEP)) != PLT_KEEP)
2d7ad24e
AM
9729 ent->plt.offset = (bfd_vma) -1;
9730 else
9731 {
9732 s = htab->pltlocal;
9733 ent->plt.offset = s->size;
9734 s->size += LOCAL_PLT_ENTRY_SIZE (htab);
9735 if (bfd_link_pic (info))
9736 htab->relpltlocal->size += sizeof (Elf64_External_Rela);
9737 }
e054468f
AM
9738 }
9739 else
9740 ent->plt.offset = (bfd_vma) -1;
9741 }
65f38f15
AM
9742 }
9743
9744 /* Allocate global sym .plt and .got entries, and space for global
9745 sym dynamic relocs. */
4ce794b7 9746 elf_link_hash_traverse (&htab->elf, allocate_dynrelocs, info);
a345bc8d 9747
0e1862bb 9748 if (!htab->opd_abi && !bfd_link_pic (info))
a345bc8d 9749 elf_link_hash_traverse (&htab->elf, size_global_entry_stubs, info);
65f38f15 9750
7865406b 9751 first_tlsld = NULL;
c72f2fb2 9752 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
102890f0 9753 {
7865406b
AM
9754 struct got_entry *ent;
9755
0c8d6e5c 9756 if (!is_ppc64_elf (ibfd))
102890f0
AM
9757 continue;
9758
7865406b
AM
9759 ent = ppc64_tlsld_got (ibfd);
9760 if (ent->got.refcount > 0)
102890f0 9761 {
7865406b 9762 if (!htab->do_multi_toc && first_tlsld != NULL)
102890f0 9763 {
7865406b
AM
9764 ent->is_indirect = TRUE;
9765 ent->got.ent = first_tlsld;
9766 }
9767 else
9768 {
9769 if (first_tlsld == NULL)
9770 first_tlsld = ent;
9771 s = ppc64_elf_tdata (ibfd)->got;
9772 ent->got.offset = s->size;
9773 ent->owner = ibfd;
9774 s->size += 16;
0e1862bb 9775 if (bfd_link_pic (info))
7865406b
AM
9776 {
9777 asection *srel = ppc64_elf_tdata (ibfd)->relgot;
9778 srel->size += sizeof (Elf64_External_Rela);
9779 }
102890f0
AM
9780 }
9781 }
9782 else
7865406b 9783 ent->got.offset = (bfd_vma) -1;
102890f0
AM
9784 }
9785
65f38f15
AM
9786 /* We now have determined the sizes of the various dynamic sections.
9787 Allocate memory for them. */
b34976b6 9788 relocs = FALSE;
65f38f15
AM
9789 for (s = dynobj->sections; s != NULL; s = s->next)
9790 {
9791 if ((s->flags & SEC_LINKER_CREATED) == 0)
9792 continue;
9793
4ce794b7 9794 if (s == htab->brlt || s == htab->relbrlt)
721956f4
AM
9795 /* These haven't been allocated yet; don't strip. */
9796 continue;
33e44f2e
AM
9797 else if (s == htab->elf.sgot
9798 || s == htab->elf.splt
9799 || s == htab->elf.iplt
2d7ad24e 9800 || s == htab->pltlocal
c456f082 9801 || s == htab->glink
9e390558 9802 || s == htab->global_entry
5474d94f
AM
9803 || s == htab->elf.sdynbss
9804 || s == htab->elf.sdynrelro)
65f38f15
AM
9805 {
9806 /* Strip this section if we don't need it; see the
9807 comment below. */
5bd4f169 9808 }
58d180e8
AM
9809 else if (s == htab->glink_eh_frame)
9810 {
9811 if (!bfd_is_abs_section (s->output_section))
9812 /* Not sized yet. */
9813 continue;
9814 }
70cc837d 9815 else if (CONST_STRNEQ (s->name, ".rela"))
5bd4f169 9816 {
c456f082 9817 if (s->size != 0)
5bd4f169 9818 {
33e44f2e 9819 if (s != htab->elf.srelplt)
b34976b6 9820 relocs = TRUE;
5bd4f169
AM
9821
9822 /* We use the reloc_count field as a counter if we need
9823 to copy relocs into the output file. */
9824 s->reloc_count = 0;
9825 }
9826 }
65f38f15 9827 else
5bd4f169
AM
9828 {
9829 /* It's not one of our sections, so don't allocate space. */
9830 continue;
9831 }
9832
eea6121a 9833 if (s->size == 0)
5bd4f169 9834 {
c456f082
AM
9835 /* If we don't need this section, strip it from the
9836 output file. This is mostly to handle .rela.bss and
9837 .rela.plt. We must create both sections in
9838 create_dynamic_sections, because they must be created
9839 before the linker maps input sections to output
9840 sections. The linker does that before
9841 adjust_dynamic_symbol is called, and it is that
9842 function which decides whether anything needs to go
9843 into these sections. */
8423293d 9844 s->flags |= SEC_EXCLUDE;
5bd4f169
AM
9845 continue;
9846 }
9847
06bcf541
AM
9848 if (bfd_is_abs_section (s->output_section))
9849 _bfd_error_handler (_("warning: discarding dynamic section %s"),
9850 s->name);
9851
c456f082 9852 if ((s->flags & SEC_HAS_CONTENTS) == 0)
5f333394
AM
9853 continue;
9854
65f38f15
AM
9855 /* Allocate memory for the section contents. We use bfd_zalloc
9856 here in case unused entries are not reclaimed before the
9857 section's contents are written out. This should not happen,
411e1bfb
AM
9858 but this way if it does we get a R_PPC64_NONE reloc in .rela
9859 sections instead of garbage.
9860 We also rely on the section contents being zero when writing
5474d94f 9861 the GOT and .dynrelro. */
eea6121a 9862 s->contents = bfd_zalloc (dynobj, s->size);
65f38f15 9863 if (s->contents == NULL)
b34976b6 9864 return FALSE;
5bd4f169
AM
9865 }
9866
c72f2fb2 9867 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
e717da7e 9868 {
0c8d6e5c 9869 if (!is_ppc64_elf (ibfd))
7b53ace3
AM
9870 continue;
9871
e717da7e 9872 s = ppc64_elf_tdata (ibfd)->got;
33e44f2e 9873 if (s != NULL && s != htab->elf.sgot)
e717da7e 9874 {
eea6121a 9875 if (s->size == 0)
8423293d 9876 s->flags |= SEC_EXCLUDE;
e717da7e
AM
9877 else
9878 {
eea6121a 9879 s->contents = bfd_zalloc (ibfd, s->size);
e717da7e
AM
9880 if (s->contents == NULL)
9881 return FALSE;
9882 }
9883 }
9884 s = ppc64_elf_tdata (ibfd)->relgot;
9885 if (s != NULL)
9886 {
eea6121a 9887 if (s->size == 0)
8423293d 9888 s->flags |= SEC_EXCLUDE;
e717da7e
AM
9889 else
9890 {
eea6121a 9891 s->contents = bfd_zalloc (ibfd, s->size);
e717da7e
AM
9892 if (s->contents == NULL)
9893 return FALSE;
9894 relocs = TRUE;
9895 s->reloc_count = 0;
9896 }
9897 }
9898 }
9899
e86ce104 9900 if (htab->elf.dynamic_sections_created)
5bd4f169 9901 {
e8910a83
AM
9902 bfd_boolean tls_opt;
9903
5bd4f169
AM
9904 /* Add some entries to the .dynamic section. We fill in the
9905 values later, in ppc64_elf_finish_dynamic_sections, but we
9906 must add the entries now so that we get the correct size for
9907 the .dynamic section. The DT_DEBUG entry is filled in by the
9908 dynamic linker and used by the debugger. */
dc810e39 9909#define add_dynamic_entry(TAG, VAL) \
5a580b3a 9910 _bfd_elf_add_dynamic_entry (info, TAG, VAL)
dc810e39 9911
0e1862bb 9912 if (bfd_link_executable (info))
5bd4f169 9913 {
dc810e39 9914 if (!add_dynamic_entry (DT_DEBUG, 0))
b34976b6 9915 return FALSE;
5bd4f169
AM
9916 }
9917
33e44f2e 9918 if (htab->elf.splt != NULL && htab->elf.splt->size != 0)
5bd4f169 9919 {
dc810e39
AM
9920 if (!add_dynamic_entry (DT_PLTGOT, 0)
9921 || !add_dynamic_entry (DT_PLTRELSZ, 0)
9922 || !add_dynamic_entry (DT_PLTREL, DT_RELA)
5d1634d7
AM
9923 || !add_dynamic_entry (DT_JMPREL, 0)
9924 || !add_dynamic_entry (DT_PPC64_GLINK, 0))
b34976b6 9925 return FALSE;
5bd4f169
AM
9926 }
9927
ee67d69a 9928 if (NO_OPD_RELOCS && abiversion (output_bfd) <= 1)
19397422
AM
9929 {
9930 if (!add_dynamic_entry (DT_PPC64_OPD, 0)
9931 || !add_dynamic_entry (DT_PPC64_OPDSZ, 0))
b34976b6 9932 return FALSE;
19397422
AM
9933 }
9934
7c9cf415 9935 tls_opt = (htab->params->tls_get_addr_opt
e8910a83
AM
9936 && htab->tls_get_addr_fd != NULL
9937 && htab->tls_get_addr_fd->elf.plt.plist != NULL);
9938 if (tls_opt || !htab->opd_abi)
9939 {
9940 if (!add_dynamic_entry (DT_PPC64_OPT, tls_opt ? PPC64_OPT_TLS : 0))
9941 return FALSE;
9942 }
a7f2871e 9943
5bd4f169
AM
9944 if (relocs)
9945 {
dc810e39
AM
9946 if (!add_dynamic_entry (DT_RELA, 0)
9947 || !add_dynamic_entry (DT_RELASZ, 0)
9948 || !add_dynamic_entry (DT_RELAENT, sizeof (Elf64_External_Rela)))
b34976b6 9949 return FALSE;
5bd4f169 9950
65f38f15
AM
9951 /* If any dynamic relocs apply to a read-only section,
9952 then we need a DT_TEXTREL entry. */
248866a8 9953 if ((info->flags & DF_TEXTREL) == 0)
a345bc8d 9954 elf_link_hash_traverse (&htab->elf, maybe_set_textrel, info);
5bd4f169 9955
65f38f15 9956 if ((info->flags & DF_TEXTREL) != 0)
5bd4f169 9957 {
65f38f15 9958 if (!add_dynamic_entry (DT_TEXTREL, 0))
b34976b6 9959 return FALSE;
5bd4f169 9960 }
5bd4f169 9961 }
5bd4f169 9962 }
65f38f15 9963#undef add_dynamic_entry
5bd4f169 9964
b34976b6 9965 return TRUE;
5bd4f169
AM
9966}
9967
a345bc8d
AM
9968/* Return TRUE if symbol should be hashed in the `.gnu.hash' section. */
9969
9970static bfd_boolean
9971ppc64_elf_hash_symbol (struct elf_link_hash_entry *h)
9972{
9973 if (h->plt.plist != NULL
9974 && !h->def_regular
9975 && !h->pointer_equality_needed)
9976 return FALSE;
9977
9978 return _bfd_elf_hash_symbol (h);
9979}
9980
721956f4 9981/* Determine the type of stub needed, if any, for a call. */
5bd4f169 9982
4ce794b7
AM
9983static inline enum ppc_stub_type
9984ppc_type_of_stub (asection *input_sec,
9985 const Elf_Internal_Rela *rel,
9986 struct ppc_link_hash_entry **hash,
e054468f 9987 struct plt_entry **plt_ent,
6911b7dc
AM
9988 bfd_vma destination,
9989 unsigned long local_off)
5bd4f169 9990{
721956f4
AM
9991 struct ppc_link_hash_entry *h = *hash;
9992 bfd_vma location;
9993 bfd_vma branch_offset;
9994 bfd_vma max_branch_offset;
4ce794b7 9995 enum elf_ppc64_reloc_type r_type;
5bd4f169 9996
721956f4
AM
9997 if (h != NULL)
9998 {
e054468f 9999 struct plt_entry *ent;
7fe2b9a6 10000 struct ppc_link_hash_entry *fdh = h;
b31867b6
AM
10001 if (h->oh != NULL
10002 && h->oh->is_func_descriptor)
7b8f6675
AM
10003 {
10004 fdh = ppc_follow_link (h->oh);
10005 *hash = fdh;
10006 }
8387904d 10007
e054468f
AM
10008 for (ent = fdh->elf.plt.plist; ent != NULL; ent = ent->next)
10009 if (ent->addend == rel->r_addend
10010 && ent->plt.offset != (bfd_vma) -1)
10011 {
e054468f
AM
10012 *plt_ent = ent;
10013 return ppc_stub_plt_call;
10014 }
5bd4f169 10015
7fe2b9a6
AM
10016 /* Here, we know we don't have a plt entry. If we don't have a
10017 either a defined function descriptor or a defined entry symbol
10018 in a regular object file, then it is pointless trying to make
10019 any other type of stub. */
854b41e7
AM
10020 if (!is_static_defined (&fdh->elf)
10021 && !is_static_defined (&h->elf))
721956f4 10022 return ppc_stub_none;
5d1634d7 10023 }
e054468f
AM
10024 else if (elf_local_got_ents (input_sec->owner) != NULL)
10025 {
10026 Elf_Internal_Shdr *symtab_hdr = &elf_symtab_hdr (input_sec->owner);
10027 struct plt_entry **local_plt = (struct plt_entry **)
10028 elf_local_got_ents (input_sec->owner) + symtab_hdr->sh_info;
10029 unsigned long r_symndx = ELF64_R_SYM (rel->r_info);
10030
10031 if (local_plt[r_symndx] != NULL)
10032 {
10033 struct plt_entry *ent;
10034
10035 for (ent = local_plt[r_symndx]; ent != NULL; ent = ent->next)
10036 if (ent->addend == rel->r_addend
10037 && ent->plt.offset != (bfd_vma) -1)
10038 {
10039 *plt_ent = ent;
10040 return ppc_stub_plt_call;
10041 }
10042 }
10043 }
5d1634d7 10044
721956f4
AM
10045 /* Determine where the call point is. */
10046 location = (input_sec->output_offset
10047 + input_sec->output_section->vma
10048 + rel->r_offset);
5d1634d7 10049
721956f4
AM
10050 branch_offset = destination - location;
10051 r_type = ELF64_R_TYPE (rel->r_info);
5d1634d7 10052
721956f4
AM
10053 /* Determine if a long branch stub is needed. */
10054 max_branch_offset = 1 << 25;
23cedd1d
AM
10055 if (r_type == R_PPC64_REL14
10056 || r_type == R_PPC64_REL14_BRTAKEN
10057 || r_type == R_PPC64_REL14_BRNTAKEN)
721956f4 10058 max_branch_offset = 1 << 15;
5d1634d7 10059
6911b7dc 10060 if (branch_offset + max_branch_offset >= 2 * max_branch_offset - local_off)
721956f4
AM
10061 /* We need a stub. Figure out whether a long_branch or plt_branch
10062 is needed later. */
10063 return ppc_stub_long_branch;
5d1634d7 10064
721956f4 10065 return ppc_stub_none;
5d1634d7
AM
10066}
10067
f891966f
AM
10068/* Gets the address of a label (1:) in r11 and builds an offset in r12,
10069 then adds it to r11 (LOAD false) or loads r12 from r11+r12 (LOAD true).
10070 . mflr %r12
10071 . bcl 20,31,1f
10072 .1: mflr %r11
10073 . mtlr %r12
05d0e962 10074 . lis %r12,xxx-1b@highest
f891966f 10075 . ori %r12,%r12,xxx-1b@higher
05d0e962 10076 . sldi %r12,%r12,32
f891966f 10077 . oris %r12,%r12,xxx-1b@high
05d0e962 10078 . ori %r12,%r12,xxx-1b@l
f891966f 10079 . add/ldx %r12,%r11,%r12 */
05d0e962
AM
10080
10081static bfd_byte *
10082build_offset (bfd *abfd, bfd_byte *p, bfd_vma off, bfd_boolean load)
10083{
f891966f
AM
10084 bfd_put_32 (abfd, MFLR_R12, p);
10085 p += 4;
10086 bfd_put_32 (abfd, BCL_20_31, p);
10087 p += 4;
10088 bfd_put_32 (abfd, MFLR_R11, p);
10089 p += 4;
10090 bfd_put_32 (abfd, MTLR_R12, p);
10091 p += 4;
05d0e962
AM
10092 if (off + 0x8000 < 0x10000)
10093 {
10094 if (load)
10095 bfd_put_32 (abfd, LD_R12_0R11 + PPC_LO (off), p);
10096 else
10097 bfd_put_32 (abfd, ADDI_R12_R11 + PPC_LO (off), p);
10098 p += 4;
10099 }
10100 else if (off + 0x80008000ULL < 0x100000000ULL)
10101 {
10102 bfd_put_32 (abfd, ADDIS_R12_R11 + PPC_HA (off), p);
10103 p += 4;
10104 if (load)
10105 bfd_put_32 (abfd, LD_R12_0R12 + PPC_LO (off), p);
10106 else
10107 bfd_put_32 (abfd, ADDI_R12_R12 + PPC_LO (off), p);
10108 p += 4;
10109 }
10110 else
10111 {
10112 if (off + 0x800000000000ULL < 0x1000000000000ULL)
10113 {
10114 bfd_put_32 (abfd, LI_R12_0 + ((off >> 32) & 0xffff), p);
10115 p += 4;
10116 }
10117 else
10118 {
10119 bfd_put_32 (abfd, LIS_R12 + ((off >> 48) & 0xffff), p);
10120 p += 4;
10121 if (((off >> 32) & 0xffff) != 0)
10122 {
10123 bfd_put_32 (abfd, ORI_R12_R12_0 + ((off >> 32) & 0xffff), p);
10124 p += 4;
10125 }
10126 }
10127 if (((off >> 32) & 0xffffffffULL) != 0)
10128 {
10129 bfd_put_32 (abfd, SLDI_R12_R12_32, p);
10130 p += 4;
10131 }
10132 if (PPC_HI (off) != 0)
10133 {
10134 bfd_put_32 (abfd, ORIS_R12_R12_0 + PPC_HI (off), p);
10135 p += 4;
10136 }
10137 if (PPC_LO (off) != 0)
10138 {
10139 bfd_put_32 (abfd, ORI_R12_R12_0 + PPC_LO (off), p);
10140 p += 4;
10141 }
10142 if (load)
10143 bfd_put_32 (abfd, LDX_R12_R11_R12, p);
10144 else
10145 bfd_put_32 (abfd, ADD_R12_R11_R12, p);
10146 p += 4;
10147 }
10148 return p;
10149}
10150
10151static unsigned int
10152size_offset (bfd_vma off)
10153{
10154 unsigned int size;
10155 if (off + 0x8000 < 0x10000)
10156 size = 4;
10157 else if (off + 0x80008000ULL < 0x100000000ULL)
10158 size = 8;
10159 else
10160 {
10161 if (off + 0x800000000000ULL < 0x1000000000000ULL)
10162 size = 4;
10163 else
10164 {
10165 size = 4;
10166 if (((off >> 32) & 0xffff) != 0)
10167 size += 4;
10168 }
10169 if (((off >> 32) & 0xffffffffULL) != 0)
10170 size += 4;
10171 if (PPC_HI (off) != 0)
10172 size += 4;
10173 if (PPC_LO (off) != 0)
10174 size += 4;
10175 size += 4;
10176 }
f891966f 10177 return size + 16;
05d0e962
AM
10178}
10179
3d58e1fc
AM
10180static unsigned int
10181num_relocs_for_offset (bfd_vma off)
10182{
10183 unsigned int num_rel;
10184 if (off + 0x8000 < 0x10000)
10185 num_rel = 1;
10186 else if (off + 0x80008000ULL < 0x100000000ULL)
10187 num_rel = 2;
10188 else
10189 {
10190 num_rel = 1;
10191 if (off + 0x800000000000ULL >= 0x1000000000000ULL
10192 && ((off >> 32) & 0xffff) != 0)
10193 num_rel += 1;
10194 if (PPC_HI (off) != 0)
10195 num_rel += 1;
10196 if (PPC_LO (off) != 0)
10197 num_rel += 1;
10198 }
10199 return num_rel;
10200}
10201
10202static Elf_Internal_Rela *
10203emit_relocs_for_offset (struct bfd_link_info *info, Elf_Internal_Rela *r,
10204 bfd_vma roff, bfd_vma targ, bfd_vma off)
10205{
10206 bfd_vma relative_targ = targ - (roff - 8);
10207 if (bfd_big_endian (info->output_bfd))
10208 roff += 2;
10209 r->r_offset = roff;
10210 r->r_addend = relative_targ + roff;
10211 if (off + 0x8000 < 0x10000)
10212 r->r_info = ELF64_R_INFO (0, R_PPC64_REL16);
10213 else if (off + 0x80008000ULL < 0x100000000ULL)
10214 {
10215 r->r_info = ELF64_R_INFO (0, R_PPC64_REL16_HA);
10216 ++r;
10217 roff += 4;
10218 r->r_offset = roff;
10219 r->r_info = ELF64_R_INFO (0, R_PPC64_REL16_LO);
10220 r->r_addend = relative_targ + roff;
10221 }
10222 else
10223 {
10224 if (off + 0x800000000000ULL < 0x1000000000000ULL)
10225 r->r_info = ELF64_R_INFO (0, R_PPC64_REL16_HIGHER);
10226 else
10227 {
10228 r->r_info = ELF64_R_INFO (0, R_PPC64_REL16_HIGHEST);
10229 if (((off >> 32) & 0xffff) != 0)
10230 {
10231 ++r;
10232 roff += 4;
10233 r->r_offset = roff;
10234 r->r_info = ELF64_R_INFO (0, R_PPC64_REL16_HIGHER);
10235 r->r_addend = relative_targ + roff;
10236 }
10237 }
10238 if (((off >> 32) & 0xffffffffULL) != 0)
10239 roff += 4;
10240 if (PPC_HI (off) != 0)
10241 {
10242 ++r;
10243 roff += 4;
10244 r->r_offset = roff;
10245 r->r_info = ELF64_R_INFO (0, R_PPC64_REL16_HIGH);
10246 r->r_addend = relative_targ + roff;
10247 }
10248 if (PPC_LO (off) != 0)
10249 {
10250 ++r;
10251 roff += 4;
10252 r->r_offset = roff;
10253 r->r_info = ELF64_R_INFO (0, R_PPC64_REL16_LO);
10254 r->r_addend = relative_targ + roff;
10255 }
10256 }
10257 return r;
10258}
10259
04bdff6a
AM
10260static bfd_byte *
10261build_powerxx_offset (bfd *abfd, bfd_byte *p, bfd_vma off, int odd,
10262 bfd_boolean load)
10263{
10264 uint64_t insn;
10265 if (off - odd + (1ULL << 33) < 1ULL << 34)
10266 {
10267 off -= odd;
10268 if (odd)
10269 {
10270 bfd_put_32 (abfd, NOP, p);
10271 p += 4;
10272 }
10273 if (load)
10274 insn = PLD_R12_PC;
10275 else
10276 insn = PADDI_R12_PC;
10277 insn |= D34 (off);
10278 bfd_put_32 (abfd, insn >> 32, p);
10279 p += 4;
10280 bfd_put_32 (abfd, insn, p);
10281 }
10282 /* The minimum value for paddi is -0x200000000. The minimum value
10283 for li is -0x8000, which when shifted by 34 and added gives a
10284 minimum value of -0x2000200000000. The maximum value is
10285 0x1ffffffff+0x7fff<<34 which is 0x2000200000000-1. */
10286 else if (off - (8 - odd) + (0x20002ULL << 32) < 0x40004ULL << 32)
10287 {
10288 off -= 8 - odd;
10289 bfd_put_32 (abfd, LI_R11_0 | (HA34 (off) & 0xffff), p);
10290 p += 4;
10291 if (!odd)
10292 {
10293 bfd_put_32 (abfd, SLDI_R11_R11_34, p);
10294 p += 4;
10295 }
10296 insn = PADDI_R12_PC | D34 (off);
10297 bfd_put_32 (abfd, insn >> 32, p);
10298 p += 4;
10299 bfd_put_32 (abfd, insn, p);
10300 p += 4;
10301 if (odd)
10302 {
10303 bfd_put_32 (abfd, SLDI_R11_R11_34, p);
10304 p += 4;
10305 }
10306 if (load)
10307 bfd_put_32 (abfd, LDX_R12_R11_R12, p);
10308 else
10309 bfd_put_32 (abfd, ADD_R12_R11_R12, p);
10310 }
10311 else
10312 {
10313 off -= odd + 8;
10314 bfd_put_32 (abfd, LIS_R11 | ((HA34 (off) >> 16) & 0x3fff), p);
10315 p += 4;
10316 bfd_put_32 (abfd, ORI_R11_R11_0 | (HA34 (off) & 0xffff), p);
10317 p += 4;
10318 if (odd)
10319 {
10320 bfd_put_32 (abfd, SLDI_R11_R11_34, p);
10321 p += 4;
10322 }
10323 insn = PADDI_R12_PC | D34 (off);
10324 bfd_put_32 (abfd, insn >> 32, p);
10325 p += 4;
10326 bfd_put_32 (abfd, insn, p);
10327 p += 4;
10328 if (!odd)
10329 {
10330 bfd_put_32 (abfd, SLDI_R11_R11_34, p);
10331 p += 4;
10332 }
10333 if (load)
10334 bfd_put_32 (abfd, LDX_R12_R11_R12, p);
10335 else
10336 bfd_put_32 (abfd, ADD_R12_R11_R12, p);
10337 }
10338 p += 4;
10339 return p;
10340}
10341
10342static unsigned int
10343size_powerxx_offset (bfd_vma off, int odd)
10344{
10345 if (off - odd + (1ULL << 33) < 1ULL << 34)
10346 return odd + 8;
10347 else if (off - (8 - odd) + (0x20002ULL << 32) < 0x40004ULL << 32)
10348 return 20;
10349 else
10350 return 24;
10351}
10352
10353static unsigned int
10354num_relocs_for_powerxx_offset (bfd_vma off, int odd)
10355{
10356 if (off - odd + (1ULL << 33) < 1ULL << 34)
10357 return 1;
10358 else if (off - (8 - odd) + (0x20002ULL << 32) < 0x40004ULL << 32)
10359 return 2;
10360 else
10361 return 3;
10362}
10363
10364static Elf_Internal_Rela *
10365emit_relocs_for_powerxx_offset (struct bfd_link_info *info,
10366 Elf_Internal_Rela *r, bfd_vma roff,
10367 bfd_vma targ, bfd_vma off, int odd)
10368{
10369 if (off - odd + (1ULL << 33) < 1ULL << 34)
10370 roff += odd;
10371 else if (off - (8 - odd) + (0x20002ULL << 32) < 0x40004ULL << 32)
10372 {
10373 int d_offset = bfd_big_endian (info->output_bfd) ? 2 : 0;
10374 r->r_offset = roff + d_offset;
10375 r->r_addend = targ + 8 - odd - d_offset;
10376 r->r_info = ELF64_R_INFO (0, R_PPC64_REL16_HIGHERA34);
10377 ++r;
10378 roff += 8 - odd;
10379 }
10380 else
10381 {
10382 int d_offset = bfd_big_endian (info->output_bfd) ? 2 : 0;
10383 r->r_offset = roff + d_offset;
10384 r->r_addend = targ + 8 + odd - d_offset;
10385 r->r_info = ELF64_R_INFO (0, R_PPC64_REL16_HIGHESTA34);
10386 ++r;
10387 roff += 4;
10388 r->r_offset = roff + d_offset;
10389 r->r_addend = targ + 4 + odd - d_offset;
10390 r->r_info = ELF64_R_INFO (0, R_PPC64_REL16_HIGHERA34);
10391 ++r;
10392 roff += 4 + odd;
10393 }
10394 r->r_offset = roff;
10395 r->r_addend = targ;
10396 r->r_info = ELF64_R_INFO (0, R_PPC64_PCREL34);
10397 return r;
10398}
10399
df136d64
AM
10400/* Emit .eh_frame opcode to advance pc by DELTA. */
10401
10402static bfd_byte *
10403eh_advance (bfd *abfd, bfd_byte *eh, unsigned int delta)
10404{
10405 delta /= 4;
10406 if (delta < 64)
10407 *eh++ = DW_CFA_advance_loc + delta;
10408 else if (delta < 256)
10409 {
10410 *eh++ = DW_CFA_advance_loc1;
10411 *eh++ = delta;
10412 }
10413 else if (delta < 65536)
10414 {
10415 *eh++ = DW_CFA_advance_loc2;
10416 bfd_put_16 (abfd, delta, eh);
10417 eh += 2;
10418 }
10419 else
10420 {
10421 *eh++ = DW_CFA_advance_loc4;
10422 bfd_put_32 (abfd, delta, eh);
10423 eh += 4;
10424 }
10425 return eh;
10426}
10427
10428/* Size of required .eh_frame opcode to advance pc by DELTA. */
10429
10430static unsigned int
10431eh_advance_size (unsigned int delta)
10432{
10433 if (delta < 64 * 4)
10434 /* DW_CFA_advance_loc+[1..63]. */
10435 return 1;
10436 if (delta < 256 * 4)
10437 /* DW_CFA_advance_loc1, byte. */
10438 return 2;
10439 if (delta < 65536 * 4)
10440 /* DW_CFA_advance_loc2, 2 bytes. */
10441 return 3;
10442 /* DW_CFA_advance_loc4, 4 bytes. */
10443 return 5;
10444}
10445
794e51c0
AM
10446/* With power7 weakly ordered memory model, it is possible for ld.so
10447 to update a plt entry in one thread and have another thread see a
10448 stale zero toc entry. To avoid this we need some sort of acquire
10449 barrier in the call stub. One solution is to make the load of the
10450 toc word seem to appear to depend on the load of the function entry
10451 word. Another solution is to test for r2 being zero, and branch to
10452 the appropriate glink entry if so.
10453
10454 . fake dep barrier compare
71a39c98
AM
10455 . ld 12,xxx(2) ld 12,xxx(2)
10456 . mtctr 12 mtctr 12
10457 . xor 11,12,12 ld 2,xxx+8(2)
794e51c0
AM
10458 . add 2,2,11 cmpldi 2,0
10459 . ld 2,xxx+8(2) bnectr+
10460 . bctr b <glink_entry>
10461
10462 The solution involving the compare turns out to be faster, so
10463 that's what we use unless the branch won't reach. */
10464
10465#define ALWAYS_USE_FAKE_DEP 0
10466#define ALWAYS_EMIT_R2SAVE 0
5d1634d7 10467
794e51c0
AM
10468static inline unsigned int
10469plt_stub_size (struct ppc_link_hash_table *htab,
10470 struct ppc_stub_hash_entry *stub_entry,
10471 bfd_vma off)
10472{
05d0e962 10473 unsigned size;
b9e5796b 10474
05d0e962
AM
10475 if (stub_entry->stub_type >= ppc_stub_plt_call_notoc)
10476 {
04bdff6a
AM
10477 if (htab->powerxx_stubs)
10478 {
10479 bfd_vma start = (stub_entry->stub_offset
10480 + stub_entry->group->stub_sec->output_offset
10481 + stub_entry->group->stub_sec->output_section->vma);
10482 if (stub_entry->stub_type > ppc_stub_plt_call_notoc)
10483 start += 4;
10484 size = 8 + size_powerxx_offset (off, start & 4);
10485 }
10486 else
10487 size = 8 + size_offset (off - 8);
05d0e962
AM
10488 if (stub_entry->stub_type > ppc_stub_plt_call_notoc)
10489 size += 4;
10490 return size;
10491 }
10492
10493 size = 12;
b9e5796b
AM
10494 if (ALWAYS_EMIT_R2SAVE
10495 || stub_entry->stub_type == ppc_stub_plt_call_r2save)
10496 size += 4;
10497 if (PPC_HA (off) != 0)
794e51c0 10498 size += 4;
b9e5796b
AM
10499 if (htab->opd_abi)
10500 {
10501 size += 4;
e7d1c40c 10502 if (htab->params->plt_static_chain)
b9e5796b 10503 size += 4;
bd4d2eaa
AM
10504 if (htab->params->plt_thread_safe
10505 && htab->elf.dynamic_sections_created
10506 && stub_entry->h != NULL
10507 && stub_entry->h->elf.dynindx != -1)
b9e5796b 10508 size += 8;
e7d1c40c 10509 if (PPC_HA (off + 8 + 8 * htab->params->plt_static_chain) != PPC_HA (off))
b9e5796b
AM
10510 size += 4;
10511 }
794e51c0
AM
10512 if (stub_entry->h != NULL
10513 && (stub_entry->h == htab->tls_get_addr_fd
10514 || stub_entry->h == htab->tls_get_addr)
7c9cf415 10515 && htab->params->tls_get_addr_opt)
f378ab09
AM
10516 {
10517 size += 7 * 4;
e81b4c93 10518 if (stub_entry->stub_type == ppc_stub_plt_call_r2save)
407aa07c 10519 size += 6 * 4;
f378ab09 10520 }
794e51c0
AM
10521 return size;
10522}
10523
2420fff6
AM
10524/* Depending on the sign of plt_stub_align:
10525 If positive, return the padding to align to a 2**plt_stub_align
10526 boundary.
10527 If negative, if this stub would cross fewer 2**plt_stub_align
10528 boundaries if we align, then return the padding needed to do so. */
10529
794e51c0
AM
10530static inline unsigned int
10531plt_stub_pad (struct ppc_link_hash_table *htab,
10532 struct ppc_stub_hash_entry *stub_entry,
10533 bfd_vma plt_off)
10534{
2420fff6 10535 int stub_align;
1aa42141 10536 unsigned stub_size;
6f20ed8a 10537 bfd_vma stub_off = stub_entry->group->stub_sec->size;
794e51c0 10538
2420fff6
AM
10539 if (htab->params->plt_stub_align >= 0)
10540 {
10541 stub_align = 1 << htab->params->plt_stub_align;
10542 if ((stub_off & (stub_align - 1)) != 0)
10543 return stub_align - (stub_off & (stub_align - 1));
10544 return 0;
10545 }
10546
10547 stub_align = 1 << -htab->params->plt_stub_align;
1aa42141 10548 stub_size = plt_stub_size (htab, stub_entry, plt_off);
794e51c0 10549 if (((stub_off + stub_size - 1) & -stub_align) - (stub_off & -stub_align)
e05fa0ba 10550 > ((stub_size - 1) & -stub_align))
794e51c0
AM
10551 return stub_align - (stub_off & (stub_align - 1));
10552 return 0;
10553}
10554
10555/* Build a .plt call stub. */
10556
10557static inline bfd_byte *
10558build_plt_stub (struct ppc_link_hash_table *htab,
10559 struct ppc_stub_hash_entry *stub_entry,
10560 bfd_byte *p, bfd_vma offset, Elf_Internal_Rela *r)
10561{
e7d1c40c 10562 bfd *obfd = htab->params->stub_bfd;
b9e5796b 10563 bfd_boolean plt_load_toc = htab->opd_abi;
e7d1c40c 10564 bfd_boolean plt_static_chain = htab->params->plt_static_chain;
bd4d2eaa
AM
10565 bfd_boolean plt_thread_safe = (htab->params->plt_thread_safe
10566 && htab->elf.dynamic_sections_created
10567 && stub_entry->h != NULL
10568 && stub_entry->h->elf.dynindx != -1);
794e51c0
AM
10569 bfd_boolean use_fake_dep = plt_thread_safe;
10570 bfd_vma cmp_branch_off = 0;
10571
10572 if (!ALWAYS_USE_FAKE_DEP
b9e5796b 10573 && plt_load_toc
794e51c0 10574 && plt_thread_safe
bd4d2eaa
AM
10575 && !((stub_entry->h == htab->tls_get_addr_fd
10576 || stub_entry->h == htab->tls_get_addr)
7c9cf415 10577 && htab->params->tls_get_addr_opt))
794e51c0
AM
10578 {
10579 bfd_vma pltoff = stub_entry->plt_ent->plt.offset & ~1;
b9e5796b
AM
10580 bfd_vma pltindex = ((pltoff - PLT_INITIAL_ENTRY_SIZE (htab))
10581 / PLT_ENTRY_SIZE (htab));
9e390558 10582 bfd_vma glinkoff = GLINK_PLTRESOLVE_SIZE (htab) + pltindex * 8;
794e51c0
AM
10583 bfd_vma to, from;
10584
68d62958
AM
10585 if (pltindex > 32768)
10586 glinkoff += (pltindex - 32768) * 4;
794e51c0
AM
10587 to = (glinkoff
10588 + htab->glink->output_offset
10589 + htab->glink->output_section->vma);
6f20ed8a 10590 from = (p - stub_entry->group->stub_sec->contents
794e51c0
AM
10591 + 4 * (ALWAYS_EMIT_R2SAVE
10592 || stub_entry->stub_type == ppc_stub_plt_call_r2save)
10593 + 4 * (PPC_HA (offset) != 0)
10594 + 4 * (PPC_HA (offset + 8 + 8 * plt_static_chain)
10595 != PPC_HA (offset))
10596 + 4 * (plt_static_chain != 0)
10597 + 20
6f20ed8a
AM
10598 + stub_entry->group->stub_sec->output_offset
10599 + stub_entry->group->stub_sec->output_section->vma);
794e51c0
AM
10600 cmp_branch_off = to - from;
10601 use_fake_dep = cmp_branch_off + (1 << 25) >= (1 << 26);
10602 }
10603
ac2df442
AM
10604 if (PPC_HA (offset) != 0)
10605 {
176a0d42
AM
10606 if (r != NULL)
10607 {
794e51c0
AM
10608 if (ALWAYS_EMIT_R2SAVE
10609 || stub_entry->stub_type == ppc_stub_plt_call_r2save)
10610 r[0].r_offset += 4;
176a0d42 10611 r[0].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_HA);
3b421ab3 10612 r[1].r_offset = r[0].r_offset + 4;
176a0d42
AM
10613 r[1].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_LO_DS);
10614 r[1].r_addend = r[0].r_addend;
b9e5796b 10615 if (plt_load_toc)
176a0d42 10616 {
b9e5796b 10617 if (PPC_HA (offset + 8 + 8 * plt_static_chain) != PPC_HA (offset))
c7131b65 10618 {
b9e5796b
AM
10619 r[2].r_offset = r[1].r_offset + 4;
10620 r[2].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_LO);
10621 r[2].r_addend = r[0].r_addend;
10622 }
10623 else
10624 {
10625 r[2].r_offset = r[1].r_offset + 8 + 8 * use_fake_dep;
10626 r[2].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_LO_DS);
10627 r[2].r_addend = r[0].r_addend + 8;
10628 if (plt_static_chain)
10629 {
10630 r[3].r_offset = r[2].r_offset + 4;
10631 r[3].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_LO_DS);
10632 r[3].r_addend = r[0].r_addend + 16;
10633 }
c7131b65 10634 }
176a0d42
AM
10635 }
10636 }
794e51c0
AM
10637 if (ALWAYS_EMIT_R2SAVE
10638 || stub_entry->stub_type == ppc_stub_plt_call_r2save)
a078d95a 10639 bfd_put_32 (obfd, STD_R2_0R1 + STK_TOC (htab), p), p += 4;
397998fc
AM
10640 if (plt_load_toc)
10641 {
10642 bfd_put_32 (obfd, ADDIS_R11_R2 | PPC_HA (offset), p), p += 4;
10643 bfd_put_32 (obfd, LD_R12_0R11 | PPC_LO (offset), p), p += 4;
10644 }
10645 else
10646 {
10647 bfd_put_32 (obfd, ADDIS_R12_R2 | PPC_HA (offset), p), p += 4;
10648 bfd_put_32 (obfd, LD_R12_0R12 | PPC_LO (offset), p), p += 4;
10649 }
b9e5796b
AM
10650 if (plt_load_toc
10651 && PPC_HA (offset + 8 + 8 * plt_static_chain) != PPC_HA (offset))
ac2df442 10652 {
71a39c98 10653 bfd_put_32 (obfd, ADDI_R11_R11 | PPC_LO (offset), p), p += 4;
ac2df442
AM
10654 offset = 0;
10655 }
71a39c98 10656 bfd_put_32 (obfd, MTCTR_R12, p), p += 4;
b9e5796b 10657 if (plt_load_toc)
794e51c0 10658 {
b9e5796b
AM
10659 if (use_fake_dep)
10660 {
10661 bfd_put_32 (obfd, XOR_R2_R12_R12, p), p += 4;
10662 bfd_put_32 (obfd, ADD_R11_R11_R2, p), p += 4;
10663 }
10664 bfd_put_32 (obfd, LD_R2_0R11 | PPC_LO (offset + 8), p), p += 4;
10665 if (plt_static_chain)
10666 bfd_put_32 (obfd, LD_R11_0R11 | PPC_LO (offset + 16), p), p += 4;
794e51c0 10667 }
ac2df442
AM
10668 }
10669 else
10670 {
176a0d42
AM
10671 if (r != NULL)
10672 {
794e51c0
AM
10673 if (ALWAYS_EMIT_R2SAVE
10674 || stub_entry->stub_type == ppc_stub_plt_call_r2save)
10675 r[0].r_offset += 4;
176a0d42 10676 r[0].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_DS);
b9e5796b 10677 if (plt_load_toc)
176a0d42 10678 {
b9e5796b 10679 if (PPC_HA (offset + 8 + 8 * plt_static_chain) != PPC_HA (offset))
c7131b65 10680 {
b9e5796b
AM
10681 r[1].r_offset = r[0].r_offset + 4;
10682 r[1].r_info = ELF64_R_INFO (0, R_PPC64_TOC16);
10683 r[1].r_addend = r[0].r_addend;
10684 }
10685 else
10686 {
10687 r[1].r_offset = r[0].r_offset + 8 + 8 * use_fake_dep;
10688 r[1].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_DS);
10689 r[1].r_addend = r[0].r_addend + 8 + 8 * plt_static_chain;
10690 if (plt_static_chain)
10691 {
10692 r[2].r_offset = r[1].r_offset + 4;
10693 r[2].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_DS);
10694 r[2].r_addend = r[0].r_addend + 8;
10695 }
c7131b65 10696 }
176a0d42
AM
10697 }
10698 }
794e51c0
AM
10699 if (ALWAYS_EMIT_R2SAVE
10700 || stub_entry->stub_type == ppc_stub_plt_call_r2save)
a078d95a 10701 bfd_put_32 (obfd, STD_R2_0R1 + STK_TOC (htab), p), p += 4;
71a39c98 10702 bfd_put_32 (obfd, LD_R12_0R2 | PPC_LO (offset), p), p += 4;
b9e5796b
AM
10703 if (plt_load_toc
10704 && PPC_HA (offset + 8 + 8 * plt_static_chain) != PPC_HA (offset))
ac2df442
AM
10705 {
10706 bfd_put_32 (obfd, ADDI_R2_R2 | PPC_LO (offset), p), p += 4;
10707 offset = 0;
10708 }
71a39c98 10709 bfd_put_32 (obfd, MTCTR_R12, p), p += 4;
b9e5796b 10710 if (plt_load_toc)
794e51c0 10711 {
b9e5796b
AM
10712 if (use_fake_dep)
10713 {
10714 bfd_put_32 (obfd, XOR_R11_R12_R12, p), p += 4;
10715 bfd_put_32 (obfd, ADD_R2_R2_R11, p), p += 4;
10716 }
10717 if (plt_static_chain)
10718 bfd_put_32 (obfd, LD_R11_0R2 | PPC_LO (offset + 16), p), p += 4;
10719 bfd_put_32 (obfd, LD_R2_0R2 | PPC_LO (offset + 8), p), p += 4;
794e51c0 10720 }
ac2df442 10721 }
b9e5796b 10722 if (plt_load_toc && plt_thread_safe && !use_fake_dep)
794e51c0
AM
10723 {
10724 bfd_put_32 (obfd, CMPLDI_R2_0, p), p += 4;
10725 bfd_put_32 (obfd, BNECTR_P4, p), p += 4;
22aa0c7e 10726 bfd_put_32 (obfd, B_DOT | (cmp_branch_off & 0x3fffffc), p), p += 4;
794e51c0
AM
10727 }
10728 else
407aa07c 10729 bfd_put_32 (obfd, BCTR, p), p += 4;
5d1634d7
AM
10730 return p;
10731}
10732
a7f2871e
AM
10733/* Build a special .plt call stub for __tls_get_addr. */
10734
10735#define LD_R11_0R3 0xe9630000
10736#define LD_R12_0R3 0xe9830000
10737#define MR_R0_R3 0x7c601b78
10738#define CMPDI_R11_0 0x2c2b0000
10739#define ADD_R3_R12_R13 0x7c6c6a14
10740#define BEQLR 0x4d820020
10741#define MR_R3_R0 0x7c030378
a7f2871e
AM
10742#define STD_R11_0R1 0xf9610000
10743#define BCTRL 0x4e800421
10744#define LD_R11_0R1 0xe9610000
a7f2871e
AM
10745#define MTLR_R11 0x7d6803a6
10746
10747static inline bfd_byte *
794e51c0
AM
10748build_tls_get_addr_stub (struct ppc_link_hash_table *htab,
10749 struct ppc_stub_hash_entry *stub_entry,
10750 bfd_byte *p, bfd_vma offset, Elf_Internal_Rela *r)
a7f2871e 10751{
e7d1c40c 10752 bfd *obfd = htab->params->stub_bfd;
df136d64 10753 bfd_byte *loc = p;
794e51c0 10754
a7f2871e
AM
10755 bfd_put_32 (obfd, LD_R11_0R3 + 0, p), p += 4;
10756 bfd_put_32 (obfd, LD_R12_0R3 + 8, p), p += 4;
10757 bfd_put_32 (obfd, MR_R0_R3, p), p += 4;
10758 bfd_put_32 (obfd, CMPDI_R11_0, p), p += 4;
10759 bfd_put_32 (obfd, ADD_R3_R12_R13, p), p += 4;
10760 bfd_put_32 (obfd, BEQLR, p), p += 4;
10761 bfd_put_32 (obfd, MR_R3_R0, p), p += 4;
f378ab09
AM
10762 if (r != NULL)
10763 r[0].r_offset += 7 * 4;
e81b4c93 10764 if (stub_entry->stub_type != ppc_stub_plt_call_r2save)
f378ab09
AM
10765 return build_plt_stub (htab, stub_entry, p, offset, r);
10766
a7f2871e 10767 bfd_put_32 (obfd, MFLR_R11, p), p += 4;
a078d95a 10768 bfd_put_32 (obfd, STD_R11_0R1 + STK_LINKER (htab), p), p += 4;
a7f2871e
AM
10769
10770 if (r != NULL)
f378ab09 10771 r[0].r_offset += 2 * 4;
794e51c0 10772 p = build_plt_stub (htab, stub_entry, p, offset, r);
407aa07c 10773 bfd_put_32 (obfd, BCTRL, p - 4);
a7f2871e 10774
a078d95a 10775 bfd_put_32 (obfd, LD_R2_0R1 + STK_TOC (htab), p), p += 4;
bd4d2eaa 10776 bfd_put_32 (obfd, LD_R11_0R1 + STK_LINKER (htab), p), p += 4;
a7f2871e
AM
10777 bfd_put_32 (obfd, MTLR_R11, p), p += 4;
10778 bfd_put_32 (obfd, BLR, p), p += 4;
10779
df136d64
AM
10780 if (htab->glink_eh_frame != NULL
10781 && htab->glink_eh_frame->size != 0)
10782 {
10783 bfd_byte *base, *eh;
10784 unsigned int lr_used, delta;
10785
10786 base = htab->glink_eh_frame->contents + stub_entry->group->eh_base + 17;
10787 eh = base + stub_entry->group->eh_size;
10788 lr_used = stub_entry->stub_offset + (p - 20 - loc);
10789 delta = lr_used - stub_entry->group->lr_restore;
10790 stub_entry->group->lr_restore = lr_used + 16;
10791 eh = eh_advance (htab->elf.dynobj, eh, delta);
10792 *eh++ = DW_CFA_offset_extended_sf;
10793 *eh++ = 65;
10794 *eh++ = -(STK_LINKER (htab) / 8) & 0x7f;
10795 *eh++ = DW_CFA_advance_loc + 4;
10796 *eh++ = DW_CFA_restore_extended;
10797 *eh++ = 65;
10798 stub_entry->group->eh_size = eh - base;
10799 }
a7f2871e
AM
10800 return p;
10801}
10802
176a0d42
AM
10803static Elf_Internal_Rela *
10804get_relocs (asection *sec, int count)
10805{
10806 Elf_Internal_Rela *relocs;
10807 struct bfd_elf_section_data *elfsec_data;
10808
10809 elfsec_data = elf_section_data (sec);
10810 relocs = elfsec_data->relocs;
10811 if (relocs == NULL)
10812 {
10813 bfd_size_type relsize;
10814 relsize = sec->reloc_count * sizeof (*relocs);
10815 relocs = bfd_alloc (sec->owner, relsize);
10816 if (relocs == NULL)
10817 return NULL;
10818 elfsec_data->relocs = relocs;
d4730f92
BS
10819 elfsec_data->rela.hdr = bfd_zalloc (sec->owner,
10820 sizeof (Elf_Internal_Shdr));
10821 if (elfsec_data->rela.hdr == NULL)
10822 return NULL;
10823 elfsec_data->rela.hdr->sh_size = (sec->reloc_count
10824 * sizeof (Elf64_External_Rela));
10825 elfsec_data->rela.hdr->sh_entsize = sizeof (Elf64_External_Rela);
176a0d42
AM
10826 sec->reloc_count = 0;
10827 }
10828 relocs += sec->reloc_count;
10829 sec->reloc_count += count;
10830 return relocs;
10831}
10832
3d58e1fc
AM
10833/* Convert the relocs R[0] thru R[-NUM_REL+1], which are all no-symbol
10834 forms, to the equivalent relocs against the global symbol given by
10835 STUB_ENTRY->H. */
10836
10837static bfd_boolean
10838use_global_in_relocs (struct ppc_link_hash_table *htab,
10839 struct ppc_stub_hash_entry *stub_entry,
10840 Elf_Internal_Rela *r, unsigned int num_rel)
10841{
10842 struct elf_link_hash_entry **hashes;
10843 unsigned long symndx;
10844 struct ppc_link_hash_entry *h;
10845 bfd_vma symval;
10846
10847 /* Relocs are always against symbols in their own object file. Fake
10848 up global sym hashes for the stub bfd (which has no symbols). */
10849 hashes = elf_sym_hashes (htab->params->stub_bfd);
10850 if (hashes == NULL)
10851 {
10852 bfd_size_type hsize;
10853
10854 /* When called the first time, stub_globals will contain the
10855 total number of symbols seen during stub sizing. After
10856 allocating, stub_globals is used as an index to fill the
10857 hashes array. */
10858 hsize = (htab->stub_globals + 1) * sizeof (*hashes);
10859 hashes = bfd_zalloc (htab->params->stub_bfd, hsize);
10860 if (hashes == NULL)
10861 return FALSE;
10862 elf_sym_hashes (htab->params->stub_bfd) = hashes;
10863 htab->stub_globals = 1;
10864 }
10865 symndx = htab->stub_globals++;
10866 h = stub_entry->h;
10867 hashes[symndx] = &h->elf;
10868 if (h->oh != NULL && h->oh->is_func)
10869 h = ppc_follow_link (h->oh);
10870 BFD_ASSERT (h->elf.root.type == bfd_link_hash_defined
10871 || h->elf.root.type == bfd_link_hash_defweak);
10872 symval = (h->elf.root.u.def.value
10873 + h->elf.root.u.def.section->output_offset
10874 + h->elf.root.u.def.section->output_section->vma);
10875 while (num_rel-- != 0)
10876 {
10877 r->r_info = ELF64_R_INFO (symndx, ELF64_R_TYPE (r->r_info));
10878 if (h->elf.root.u.def.section != stub_entry->target_section)
10879 {
10880 /* H is an opd symbol. The addend must be zero, and the
10881 branch reloc is the only one we can convert. */
10882 r->r_addend = 0;
10883 break;
10884 }
10885 else
10886 r->r_addend -= symval;
10887 --r;
10888 }
10889 return TRUE;
10890}
10891
aa374f67 10892static bfd_vma
25f53a85 10893get_r2off (struct bfd_link_info *info,
aa374f67
AM
10894 struct ppc_stub_hash_entry *stub_entry)
10895{
25f53a85 10896 struct ppc_link_hash_table *htab = ppc_hash_table (info);
6f20ed8a 10897 bfd_vma r2off = htab->sec_info[stub_entry->target_section->id].toc_off;
aa374f67
AM
10898
10899 if (r2off == 0)
10900 {
10901 /* Support linking -R objects. Get the toc pointer from the
10902 opd entry. */
10903 char buf[8];
b9e5796b
AM
10904 if (!htab->opd_abi)
10905 return r2off;
aa374f67
AM
10906 asection *opd = stub_entry->h->elf.root.u.def.section;
10907 bfd_vma opd_off = stub_entry->h->elf.root.u.def.value;
10908
10909 if (strcmp (opd->name, ".opd") != 0
10910 || opd->reloc_count != 0)
10911 {
2cdcc330
AM
10912 info->callbacks->einfo
10913 (_("%P: cannot find opd entry toc for `%pT'\n"),
10914 stub_entry->h->elf.root.root.string);
aa374f67 10915 bfd_set_error (bfd_error_bad_value);
a7c49797 10916 return (bfd_vma) -1;
aa374f67
AM
10917 }
10918 if (!bfd_get_section_contents (opd->owner, opd, buf, opd_off + 8, 8))
a7c49797 10919 return (bfd_vma) -1;
aa374f67 10920 r2off = bfd_get_64 (opd->owner, buf);
25f53a85 10921 r2off -= elf_gp (info->output_bfd);
aa374f67 10922 }
6f20ed8a 10923 r2off -= htab->sec_info[stub_entry->group->link_sec->id].toc_off;
aa374f67
AM
10924 return r2off;
10925}
10926
b34976b6 10927static bfd_boolean
4ce794b7 10928ppc_build_one_stub (struct bfd_hash_entry *gen_entry, void *in_arg)
5d1634d7 10929{
721956f4
AM
10930 struct ppc_stub_hash_entry *stub_entry;
10931 struct ppc_branch_hash_entry *br_entry;
5d1634d7
AM
10932 struct bfd_link_info *info;
10933 struct ppc_link_hash_table *htab;
721956f4 10934 bfd_byte *loc;
3d58e1fc 10935 bfd_byte *p, *relp;
1aa42141 10936 bfd_vma targ, off;
176a0d42 10937 Elf_Internal_Rela *r;
e054468f 10938 asection *plt;
3d58e1fc 10939 int num_rel;
04bdff6a 10940 int odd;
5d1634d7 10941
721956f4
AM
10942 /* Massage our args to the form they really have. */
10943 stub_entry = (struct ppc_stub_hash_entry *) gen_entry;
4ce794b7 10944 info = in_arg;
5d1634d7 10945
5d1634d7 10946 htab = ppc_hash_table (info);
4dfe6ac6
NC
10947 if (htab == NULL)
10948 return FALSE;
5d1634d7 10949
1aa42141 10950 BFD_ASSERT (stub_entry->stub_offset >= stub_entry->group->stub_sec->size);
6f20ed8a 10951 loc = stub_entry->group->stub_sec->contents + stub_entry->stub_offset;
721956f4 10952
4ce794b7 10953 htab->stub_count[stub_entry->stub_type - 1] += 1;
721956f4 10954 switch (stub_entry->stub_type)
5d1634d7 10955 {
721956f4 10956 case ppc_stub_long_branch:
ad8e1ba5 10957 case ppc_stub_long_branch_r2off:
721956f4 10958 /* Branches are relative. This is where we are going to. */
1aa42141 10959 targ = (stub_entry->target_value
6911b7dc
AM
10960 + stub_entry->target_section->output_offset
10961 + stub_entry->target_section->output_section->vma);
1aa42141 10962 targ += PPC64_LOCAL_ENTRY_OFFSET (stub_entry->other);
5d1634d7 10963
721956f4 10964 /* And this is where we are coming from. */
1aa42141
AM
10965 off = (stub_entry->stub_offset
10966 + stub_entry->group->stub_sec->output_offset
10967 + stub_entry->group->stub_sec->output_section->vma);
10968 off = targ - off;
e86ce104 10969
9e390558 10970 p = loc;
ac2df442 10971 if (stub_entry->stub_type == ppc_stub_long_branch_r2off)
ad8e1ba5 10972 {
25f53a85 10973 bfd_vma r2off = get_r2off (info, stub_entry);
ad8e1ba5 10974
a7c49797 10975 if (r2off == (bfd_vma) -1)
aa374f67
AM
10976 {
10977 htab->stub_error = TRUE;
10978 return FALSE;
10979 }
9e390558
AM
10980 bfd_put_32 (htab->params->stub_bfd, STD_R2_0R1 + STK_TOC (htab), p);
10981 p += 4;
ac2df442
AM
10982 if (PPC_HA (r2off) != 0)
10983 {
e7d1c40c 10984 bfd_put_32 (htab->params->stub_bfd,
9e390558
AM
10985 ADDIS_R2_R2 | PPC_HA (r2off), p);
10986 p += 4;
a7c49797
AM
10987 }
10988 if (PPC_LO (r2off) != 0)
10989 {
10990 bfd_put_32 (htab->params->stub_bfd,
9e390558
AM
10991 ADDI_R2_R2 | PPC_LO (r2off), p);
10992 p += 4;
ac2df442 10993 }
9e390558 10994 off -= p - loc;
ad8e1ba5 10995 }
9e390558
AM
10996 bfd_put_32 (htab->params->stub_bfd, B_DOT | (off & 0x3fffffc), p);
10997 p += 4;
ad8e1ba5 10998
5c3dead3
AM
10999 if (off + (1 << 25) >= (bfd_vma) (1 << 26))
11000 {
cf97bcb0
AM
11001 _bfd_error_handler
11002 (_("long branch stub `%s' offset overflow"),
bc30df16 11003 stub_entry->root.string);
5c3dead3
AM
11004 htab->stub_error = TRUE;
11005 return FALSE;
11006 }
ee75fd95
AM
11007
11008 if (info->emitrelocations)
11009 {
6f20ed8a 11010 r = get_relocs (stub_entry->group->stub_sec, 1);
176a0d42
AM
11011 if (r == NULL)
11012 return FALSE;
9e390558 11013 r->r_offset = p - 4 - stub_entry->group->stub_sec->contents;
ee75fd95 11014 r->r_info = ELF64_R_INFO (0, R_PPC64_REL24);
1aa42141 11015 r->r_addend = targ;
3d58e1fc
AM
11016 if (stub_entry->h != NULL
11017 && !use_global_in_relocs (htab, stub_entry, r, 1))
11018 return FALSE;
ee75fd95 11019 }
721956f4 11020 break;
e86ce104 11021
721956f4 11022 case ppc_stub_plt_branch:
ad8e1ba5 11023 case ppc_stub_plt_branch_r2off:
721956f4
AM
11024 br_entry = ppc_branch_hash_lookup (&htab->branch_hash_table,
11025 stub_entry->root.string + 9,
b34976b6 11026 FALSE, FALSE);
721956f4
AM
11027 if (br_entry == NULL)
11028 {
cf97bcb0
AM
11029 _bfd_error_handler (_("can't find branch stub `%s'"),
11030 stub_entry->root.string);
b34976b6
AM
11031 htab->stub_error = TRUE;
11032 return FALSE;
721956f4
AM
11033 }
11034
1aa42141 11035 targ = (stub_entry->target_value
176a0d42
AM
11036 + stub_entry->target_section->output_offset
11037 + stub_entry->target_section->output_section->vma);
6911b7dc 11038 if (stub_entry->stub_type != ppc_stub_plt_branch_r2off)
1aa42141 11039 targ += PPC64_LOCAL_ENTRY_OFFSET (stub_entry->other);
721956f4 11040
1aa42141 11041 bfd_put_64 (htab->brlt->owner, targ,
4ce794b7 11042 htab->brlt->contents + br_entry->offset);
721956f4 11043
f94498ff 11044 if (br_entry->iter == htab->stub_iteration)
721956f4 11045 {
f94498ff 11046 br_entry->iter = 0;
84f5d08e 11047
f94498ff 11048 if (htab->relbrlt != NULL)
84f5d08e 11049 {
f94498ff
AM
11050 /* Create a reloc for the branch lookup table entry. */
11051 Elf_Internal_Rela rela;
11052 bfd_byte *rl;
11053
11054 rela.r_offset = (br_entry->offset
11055 + htab->brlt->output_offset
11056 + htab->brlt->output_section->vma);
11057 rela.r_info = ELF64_R_INFO (0, R_PPC64_RELATIVE);
1aa42141 11058 rela.r_addend = targ;
f94498ff
AM
11059
11060 rl = htab->relbrlt->contents;
11061 rl += (htab->relbrlt->reloc_count++
11062 * sizeof (Elf64_External_Rela));
11063 bfd_elf64_swap_reloca_out (htab->relbrlt->owner, &rela, rl);
11064 }
11065 else if (info->emitrelocations)
11066 {
176a0d42
AM
11067 r = get_relocs (htab->brlt, 1);
11068 if (r == NULL)
11069 return FALSE;
11070 /* brlt, being SEC_LINKER_CREATED does not go through the
11071 normal reloc processing. Symbols and offsets are not
11072 translated from input file to output file form, so
11073 set up the offset per the output file. */
f94498ff
AM
11074 r->r_offset = (br_entry->offset
11075 + htab->brlt->output_offset
11076 + htab->brlt->output_section->vma);
11077 r->r_info = ELF64_R_INFO (0, R_PPC64_RELATIVE);
1aa42141 11078 r->r_addend = targ;
84f5d08e 11079 }
84f5d08e 11080 }
721956f4 11081
1aa42141 11082 targ = (br_entry->offset
176a0d42
AM
11083 + htab->brlt->output_offset
11084 + htab->brlt->output_section->vma);
11085
1aa42141
AM
11086 off = (elf_gp (info->output_bfd)
11087 + htab->sec_info[stub_entry->group->link_sec->id].toc_off);
11088 off = targ - off;
721956f4 11089
ad8e1ba5 11090 if (off + 0x80008000 > 0xffffffff || (off & 7) != 0)
5d1634d7 11091 {
25f53a85 11092 info->callbacks->einfo
c1c8c1ef 11093 (_("%P: linkage table error against `%pT'\n"),
721956f4 11094 stub_entry->root.string);
5d1634d7 11095 bfd_set_error (bfd_error_bad_value);
b34976b6
AM
11096 htab->stub_error = TRUE;
11097 return FALSE;
5d1634d7 11098 }
41bd81ab 11099
176a0d42
AM
11100 if (info->emitrelocations)
11101 {
6f20ed8a 11102 r = get_relocs (stub_entry->group->stub_sec, 1 + (PPC_HA (off) != 0));
176a0d42
AM
11103 if (r == NULL)
11104 return FALSE;
6f20ed8a 11105 r[0].r_offset = loc - stub_entry->group->stub_sec->contents;
7cfbafbc
AM
11106 if (bfd_big_endian (info->output_bfd))
11107 r[0].r_offset += 2;
00f412ee 11108 if (stub_entry->stub_type == ppc_stub_plt_branch_r2off)
176a0d42
AM
11109 r[0].r_offset += 4;
11110 r[0].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_DS);
1aa42141 11111 r[0].r_addend = targ;
176a0d42
AM
11112 if (PPC_HA (off) != 0)
11113 {
11114 r[0].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_HA);
11115 r[1].r_offset = r[0].r_offset + 4;
11116 r[1].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_LO_DS);
11117 r[1].r_addend = r[0].r_addend;
11118 }
11119 }
11120
9e390558 11121 p = loc;
00f412ee 11122 if (stub_entry->stub_type != ppc_stub_plt_branch_r2off)
ad8e1ba5 11123 {
176a0d42 11124 if (PPC_HA (off) != 0)
ac2df442 11125 {
e7d1c40c 11126 bfd_put_32 (htab->params->stub_bfd,
9e390558
AM
11127 ADDIS_R12_R2 | PPC_HA (off), p);
11128 p += 4;
e7d1c40c 11129 bfd_put_32 (htab->params->stub_bfd,
9e390558 11130 LD_R12_0R12 | PPC_LO (off), p);
ac2df442
AM
11131 }
11132 else
9e390558
AM
11133 bfd_put_32 (htab->params->stub_bfd,
11134 LD_R12_0R2 | PPC_LO (off), p);
ad8e1ba5
AM
11135 }
11136 else
11137 {
25f53a85 11138 bfd_vma r2off = get_r2off (info, stub_entry);
aa374f67 11139
a7c49797 11140 if (r2off == (bfd_vma) -1)
aa374f67
AM
11141 {
11142 htab->stub_error = TRUE;
11143 return FALSE;
11144 }
ad8e1ba5 11145
9e390558
AM
11146 bfd_put_32 (htab->params->stub_bfd, STD_R2_0R1 + STK_TOC (htab), p);
11147 p += 4;
176a0d42 11148 if (PPC_HA (off) != 0)
ac2df442 11149 {
e7d1c40c 11150 bfd_put_32 (htab->params->stub_bfd,
9e390558
AM
11151 ADDIS_R12_R2 | PPC_HA (off), p);
11152 p += 4;
e7d1c40c 11153 bfd_put_32 (htab->params->stub_bfd,
9e390558 11154 LD_R12_0R12 | PPC_LO (off), p);
ac2df442
AM
11155 }
11156 else
9e390558 11157 bfd_put_32 (htab->params->stub_bfd, LD_R12_0R2 | PPC_LO (off), p);
ac2df442
AM
11158
11159 if (PPC_HA (r2off) != 0)
11160 {
9e390558 11161 p += 4;
e7d1c40c 11162 bfd_put_32 (htab->params->stub_bfd,
9e390558 11163 ADDIS_R2_R2 | PPC_HA (r2off), p);
00f412ee
AM
11164 }
11165 if (PPC_LO (r2off) != 0)
11166 {
9e390558 11167 p += 4;
e7d1c40c 11168 bfd_put_32 (htab->params->stub_bfd,
9e390558 11169 ADDI_R2_R2 | PPC_LO (r2off), p);
ac2df442 11170 }
ad8e1ba5 11171 }
9e390558
AM
11172 p += 4;
11173 bfd_put_32 (htab->params->stub_bfd, MTCTR_R12, p);
11174 p += 4;
407aa07c
AM
11175 bfd_put_32 (htab->params->stub_bfd, BCTR, p);
11176 p += 4;
721956f4 11177 break;
5d1634d7 11178
05d0e962
AM
11179 case ppc_stub_long_branch_notoc:
11180 case ppc_stub_long_branch_both:
11181 case ppc_stub_plt_branch_notoc:
11182 case ppc_stub_plt_branch_both:
11183 case ppc_stub_plt_call_notoc:
11184 case ppc_stub_plt_call_both:
11185 p = loc;
f891966f 11186 off = (stub_entry->stub_offset
05d0e962
AM
11187 + stub_entry->group->stub_sec->output_offset
11188 + stub_entry->group->stub_sec->output_section->vma);
11189 if (stub_entry->stub_type == ppc_stub_long_branch_both
11190 || stub_entry->stub_type == ppc_stub_plt_branch_both
11191 || stub_entry->stub_type == ppc_stub_plt_call_both)
11192 {
11193 off += 4;
11194 bfd_put_32 (htab->params->stub_bfd, STD_R2_0R1 + STK_TOC (htab), p);
11195 p += 4;
11196 }
11197 if (stub_entry->stub_type >= ppc_stub_plt_call_notoc)
11198 {
11199 targ = stub_entry->plt_ent->plt.offset & ~1;
11200 if (targ >= (bfd_vma) -2)
11201 abort ();
11202
11203 plt = htab->elf.splt;
11204 if (!htab->elf.dynamic_sections_created
11205 || stub_entry->h == NULL
11206 || stub_entry->h->elf.dynindx == -1)
11207 {
11208 if (stub_entry->symtype == STT_GNU_IFUNC)
11209 plt = htab->elf.iplt;
11210 else
11211 plt = htab->pltlocal;
11212 }
11213 targ += plt->output_offset + plt->output_section->vma;
11214 }
11215 else
11216 targ = (stub_entry->target_value
11217 + stub_entry->target_section->output_offset
11218 + stub_entry->target_section->output_section->vma);
04bdff6a 11219 odd = off & 4;
05d0e962 11220 off = targ - off;
f891966f 11221
3d58e1fc
AM
11222 relp = p;
11223 num_rel = 0;
04bdff6a
AM
11224 if (htab->powerxx_stubs)
11225 {
11226 bfd_boolean load = stub_entry->stub_type >= ppc_stub_plt_call_notoc;
11227 p = build_powerxx_offset (htab->params->stub_bfd, p, off, odd, load);
11228 }
11229 else
11230 {
11231 /* The notoc stubs calculate their target (either a PLT entry or
11232 the global entry point of a function) relative to the PC
11233 returned by the "bcl" two instructions past the start of the
11234 sequence emitted by build_offset. The offset is therefore 8
11235 less than calculated from the start of the sequence. */
11236 off -= 8;
11237 p = build_offset (htab->params->stub_bfd, p, off,
11238 stub_entry->stub_type >= ppc_stub_plt_call_notoc);
11239 }
11240
f891966f 11241 if (stub_entry->stub_type <= ppc_stub_long_branch_both)
05d0e962 11242 {
f891966f 11243 bfd_vma from;
3d58e1fc 11244 num_rel = 1;
f891966f
AM
11245 from = (stub_entry->stub_offset
11246 + stub_entry->group->stub_sec->output_offset
11247 + stub_entry->group->stub_sec->output_section->vma
11248 + (p - loc));
05d0e962 11249 bfd_put_32 (htab->params->stub_bfd,
f891966f 11250 B_DOT | ((targ - from) & 0x3fffffc), p);
05d0e962
AM
11251 }
11252 else
11253 {
11254 bfd_put_32 (htab->params->stub_bfd, MTCTR_R12, p);
11255 p += 4;
11256 bfd_put_32 (htab->params->stub_bfd, BCTR, p);
11257 }
11258 p += 4;
df136d64 11259
3d58e1fc
AM
11260 if (info->emitrelocations)
11261 {
04bdff6a
AM
11262 bfd_vma roff = relp - stub_entry->group->stub_sec->contents;
11263 if (htab->powerxx_stubs)
11264 num_rel += num_relocs_for_powerxx_offset (off, odd);
11265 else
11266 {
11267 num_rel += num_relocs_for_offset (off);
11268 roff += 16;
11269 }
3d58e1fc
AM
11270 r = get_relocs (stub_entry->group->stub_sec, num_rel);
11271 if (r == NULL)
11272 return FALSE;
04bdff6a
AM
11273 if (htab->powerxx_stubs)
11274 r = emit_relocs_for_powerxx_offset (info, r, roff, targ, off, odd);
11275 else
11276 r = emit_relocs_for_offset (info, r, roff, targ, off);
3d58e1fc
AM
11277 if (stub_entry->stub_type == ppc_stub_long_branch_notoc
11278 || stub_entry->stub_type == ppc_stub_long_branch_both)
11279 {
11280 ++r;
11281 roff = p - 4 - stub_entry->group->stub_sec->contents;
11282 r->r_offset = roff;
11283 r->r_info = ELF64_R_INFO (0, R_PPC64_REL24);
11284 r->r_addend = targ;
11285 if (stub_entry->h != NULL
11286 && !use_global_in_relocs (htab, stub_entry, r, num_rel))
11287 return FALSE;
11288 }
11289 }
11290
04bdff6a
AM
11291 if (!htab->powerxx_stubs
11292 && htab->glink_eh_frame != NULL
11293 && htab->glink_eh_frame->size != 0)
df136d64
AM
11294 {
11295 bfd_byte *base, *eh;
11296 unsigned int lr_used, delta;
11297
11298 base = (htab->glink_eh_frame->contents
11299 + stub_entry->group->eh_base + 17);
11300 eh = base + stub_entry->group->eh_size;
11301 lr_used = stub_entry->stub_offset + 8;
11302 if (stub_entry->stub_type == ppc_stub_long_branch_both
11303 || stub_entry->stub_type == ppc_stub_plt_branch_both
11304 || stub_entry->stub_type == ppc_stub_plt_call_both)
11305 lr_used += 4;
11306 delta = lr_used - stub_entry->group->lr_restore;
11307 stub_entry->group->lr_restore = lr_used + 8;
11308 eh = eh_advance (htab->elf.dynobj, eh, delta);
11309 *eh++ = DW_CFA_register;
11310 *eh++ = 65;
11311 *eh++ = 12;
11312 *eh++ = DW_CFA_advance_loc + 2;
11313 *eh++ = DW_CFA_restore_extended;
11314 *eh++ = 65;
11315 stub_entry->group->eh_size = eh - base;
11316 }
05d0e962
AM
11317 break;
11318
721956f4 11319 case ppc_stub_plt_call:
794e51c0 11320 case ppc_stub_plt_call_r2save:
e054468f 11321 if (stub_entry->h != NULL
b31867b6
AM
11322 && stub_entry->h->is_func_descriptor
11323 && stub_entry->h->oh != NULL)
c862ae31 11324 {
b31867b6
AM
11325 struct ppc_link_hash_entry *fh = ppc_follow_link (stub_entry->h->oh);
11326
11327 /* If the old-ABI "dot-symbol" is undefined make it weak so
6f20ed8a 11328 we don't get a link error from RELOC_FOR_GLOBAL_SYMBOL. */
8c5b4e52
AM
11329 if (fh->elf.root.type == bfd_link_hash_undefined
11330 && (stub_entry->h->elf.root.type == bfd_link_hash_defined
11331 || stub_entry->h->elf.root.type == bfd_link_hash_defweak))
b31867b6 11332 fh->elf.root.type = bfd_link_hash_undefweak;
c862ae31
AM
11333 }
11334
721956f4 11335 /* Now build the stub. */
1aa42141
AM
11336 targ = stub_entry->plt_ent->plt.offset & ~1;
11337 if (targ >= (bfd_vma) -2)
721956f4
AM
11338 abort ();
11339
33e44f2e 11340 plt = htab->elf.splt;
25f23106
AM
11341 if (!htab->elf.dynamic_sections_created
11342 || stub_entry->h == NULL
11343 || stub_entry->h->elf.dynindx == -1)
2d7ad24e
AM
11344 {
11345 if (stub_entry->symtype == STT_GNU_IFUNC)
11346 plt = htab->elf.iplt;
11347 else
11348 plt = htab->pltlocal;
11349 }
1aa42141 11350 targ += plt->output_offset + plt->output_section->vma;
e054468f 11351
1aa42141
AM
11352 off = (elf_gp (info->output_bfd)
11353 + htab->sec_info[stub_entry->group->link_sec->id].toc_off);
11354 off = targ - off;
721956f4 11355
ad8e1ba5 11356 if (off + 0x80008000 > 0xffffffff || (off & 7) != 0)
721956f4 11357 {
25f53a85 11358 info->callbacks->einfo
695344c0 11359 /* xgettext:c-format */
c1c8c1ef 11360 (_("%P: linkage table error against `%pT'\n"),
e054468f
AM
11361 stub_entry->h != NULL
11362 ? stub_entry->h->elf.root.root.string
11363 : "<local sym>");
721956f4 11364 bfd_set_error (bfd_error_bad_value);
b34976b6
AM
11365 htab->stub_error = TRUE;
11366 return FALSE;
721956f4
AM
11367 }
11368
176a0d42
AM
11369 r = NULL;
11370 if (info->emitrelocations)
11371 {
6f20ed8a 11372 r = get_relocs (stub_entry->group->stub_sec,
3ba720c7
AM
11373 ((PPC_HA (off) != 0)
11374 + (htab->opd_abi
e7d1c40c 11375 ? 2 + (htab->params->plt_static_chain
3ba720c7
AM
11376 && PPC_HA (off + 16) == PPC_HA (off))
11377 : 1)));
176a0d42
AM
11378 if (r == NULL)
11379 return FALSE;
6f20ed8a 11380 r[0].r_offset = loc - stub_entry->group->stub_sec->contents;
7cfbafbc
AM
11381 if (bfd_big_endian (info->output_bfd))
11382 r[0].r_offset += 2;
1aa42141 11383 r[0].r_addend = targ;
176a0d42 11384 }
a7f2871e
AM
11385 if (stub_entry->h != NULL
11386 && (stub_entry->h == htab->tls_get_addr_fd
11387 || stub_entry->h == htab->tls_get_addr)
7c9cf415 11388 && htab->params->tls_get_addr_opt)
794e51c0 11389 p = build_tls_get_addr_stub (htab, stub_entry, loc, off, r);
a7f2871e 11390 else
794e51c0 11391 p = build_plt_stub (htab, stub_entry, loc, off, r);
721956f4
AM
11392 break;
11393
a4b6fadd
AM
11394 case ppc_stub_save_res:
11395 return TRUE;
11396
721956f4
AM
11397 default:
11398 BFD_FAIL ();
b34976b6 11399 return FALSE;
721956f4
AM
11400 }
11401
1aa42141 11402 stub_entry->group->stub_sec->size = stub_entry->stub_offset + (p - loc);
97b639ba 11403
e7d1c40c 11404 if (htab->params->emit_stub_syms)
97b639ba
AM
11405 {
11406 struct elf_link_hash_entry *h;
ee75fd95
AM
11407 size_t len1, len2;
11408 char *name;
11409 const char *const stub_str[] = { "long_branch",
05d0e962
AM
11410 "long_branch",
11411 "long_branch",
3f6ff479
AM
11412 "long_branch",
11413 "plt_branch",
ee75fd95 11414 "plt_branch",
05d0e962
AM
11415 "plt_branch",
11416 "plt_branch",
11417 "plt_call",
11418 "plt_call",
794e51c0 11419 "plt_call",
ee75fd95
AM
11420 "plt_call" };
11421
11422 len1 = strlen (stub_str[stub_entry->stub_type - 1]);
11423 len2 = strlen (stub_entry->root.string);
11424 name = bfd_malloc (len1 + len2 + 2);
11425 if (name == NULL)
11426 return FALSE;
11427 memcpy (name, stub_entry->root.string, 9);
11428 memcpy (name + 9, stub_str[stub_entry->stub_type - 1], len1);
11429 memcpy (name + len1 + 9, stub_entry->root.string + 8, len2 - 8 + 1);
11430 h = elf_link_hash_lookup (&htab->elf, name, TRUE, FALSE, FALSE);
97b639ba
AM
11431 if (h == NULL)
11432 return FALSE;
11433 if (h->root.type == bfd_link_hash_new)
11434 {
11435 h->root.type = bfd_link_hash_defined;
6f20ed8a 11436 h->root.u.def.section = stub_entry->group->stub_sec;
97b639ba 11437 h->root.u.def.value = stub_entry->stub_offset;
f5385ebf
AM
11438 h->ref_regular = 1;
11439 h->def_regular = 1;
11440 h->ref_regular_nonweak = 1;
11441 h->forced_local = 1;
11442 h->non_elf = 0;
2ec55de3 11443 h->root.linker_def = 1;
97b639ba
AM
11444 }
11445 }
11446
b34976b6 11447 return TRUE;
721956f4
AM
11448}
11449
11450/* As above, but don't actually build the stub. Just bump offset so
11451 we know stub section sizes, and select plt_branch stubs where
11452 long_branch stubs won't do. */
11453
b34976b6 11454static bfd_boolean
4ce794b7 11455ppc_size_one_stub (struct bfd_hash_entry *gen_entry, void *in_arg)
721956f4
AM
11456{
11457 struct ppc_stub_hash_entry *stub_entry;
63bc6f6c 11458 struct bfd_link_info *info;
721956f4 11459 struct ppc_link_hash_table *htab;
f891966f
AM
11460 asection *plt;
11461 bfd_vma targ, off, r2off;
04bdff6a 11462 unsigned int size, extra, lr_used, delta, odd;
721956f4
AM
11463
11464 /* Massage our args to the form they really have. */
11465 stub_entry = (struct ppc_stub_hash_entry *) gen_entry;
63bc6f6c
AM
11466 info = in_arg;
11467
11468 htab = ppc_hash_table (info);
4dfe6ac6
NC
11469 if (htab == NULL)
11470 return FALSE;
721956f4 11471
1aa42141
AM
11472 /* Make a note of the offset within the stubs for this entry. */
11473 stub_entry->stub_offset = stub_entry->group->stub_sec->size;
11474
a4b6fadd
AM
11475 if (stub_entry->h != NULL
11476 && stub_entry->h->save_res
11477 && stub_entry->h->elf.root.type == bfd_link_hash_defined
11478 && stub_entry->h->elf.root.u.def.section == htab->sfpr)
11479 {
11480 /* Don't make stubs to out-of-line register save/restore
11481 functions. Instead, emit copies of the functions. */
11482 stub_entry->group->needs_save_res = 1;
11483 stub_entry->stub_type = ppc_stub_save_res;
11484 return TRUE;
11485 }
11486
f891966f 11487 switch (stub_entry->stub_type)
721956f4 11488 {
f891966f
AM
11489 case ppc_stub_plt_branch:
11490 case ppc_stub_plt_branch_r2off:
11491 /* Reset the stub type from the plt branch variant in case we now
11492 can reach with a shorter stub. */
11493 stub_entry->stub_type += ppc_stub_long_branch - ppc_stub_plt_branch;
11494 /* Fall through. */
11495 case ppc_stub_long_branch:
11496 case ppc_stub_long_branch_r2off:
1aa42141
AM
11497 targ = (stub_entry->target_value
11498 + stub_entry->target_section->output_offset
11499 + stub_entry->target_section->output_section->vma);
f891966f 11500 targ += PPC64_LOCAL_ENTRY_OFFSET (stub_entry->other);
1aa42141
AM
11501 off = (stub_entry->stub_offset
11502 + stub_entry->group->stub_sec->output_offset
11503 + stub_entry->group->stub_sec->output_section->vma);
721956f4 11504
ad8e1ba5 11505 size = 4;
f891966f 11506 r2off = 0;
ad8e1ba5
AM
11507 if (stub_entry->stub_type == ppc_stub_long_branch_r2off)
11508 {
25f53a85 11509 r2off = get_r2off (info, stub_entry);
a7c49797 11510 if (r2off == (bfd_vma) -1)
aa374f67
AM
11511 {
11512 htab->stub_error = TRUE;
11513 return FALSE;
11514 }
a7c49797 11515 size = 8;
ac2df442 11516 if (PPC_HA (r2off) != 0)
a7c49797
AM
11517 size += 4;
11518 if (PPC_LO (r2off) != 0)
11519 size += 4;
1aa42141 11520 off += size - 4;
ad8e1ba5 11521 }
1aa42141 11522 off = targ - off;
ad8e1ba5 11523
f891966f
AM
11524 /* If the branch offset is too big, use a ppc_stub_plt_branch.
11525 Do the same for -R objects without function descriptors. */
11526 if ((stub_entry->stub_type == ppc_stub_long_branch_r2off
11527 && r2off == 0
11528 && htab->sec_info[stub_entry->target_section->id].toc_off == 0)
11529 || off + (1 << 25) >= (bfd_vma) (1 << 26))
721956f4 11530 {
f891966f 11531 struct ppc_branch_hash_entry *br_entry;
df136d64 11532
f891966f
AM
11533 br_entry = ppc_branch_hash_lookup (&htab->branch_hash_table,
11534 stub_entry->root.string + 9,
11535 TRUE, FALSE);
11536 if (br_entry == NULL)
721956f4 11537 {
f891966f
AM
11538 _bfd_error_handler (_("can't build branch stub `%s'"),
11539 stub_entry->root.string);
11540 htab->stub_error = TRUE;
11541 return FALSE;
721956f4
AM
11542 }
11543
f891966f 11544 if (br_entry->iter != htab->stub_iteration)
721956f4 11545 {
f891966f
AM
11546 br_entry->iter = htab->stub_iteration;
11547 br_entry->offset = htab->brlt->size;
11548 htab->brlt->size += 8;
63bc6f6c 11549
f891966f
AM
11550 if (htab->relbrlt != NULL)
11551 htab->relbrlt->size += sizeof (Elf64_External_Rela);
11552 else if (info->emitrelocations)
84f5d08e 11553 {
f891966f
AM
11554 htab->brlt->reloc_count += 1;
11555 htab->brlt->flags |= SEC_RELOC;
05d0e962 11556 }
f891966f 11557 }
ac2df442 11558
f891966f
AM
11559 targ = (br_entry->offset
11560 + htab->brlt->output_offset
11561 + htab->brlt->output_section->vma);
11562 off = (elf_gp (info->output_bfd)
11563 + htab->sec_info[stub_entry->group->link_sec->id].toc_off);
11564 off = targ - off;
176a0d42 11565
f891966f
AM
11566 if (info->emitrelocations)
11567 {
11568 stub_entry->group->stub_sec->reloc_count
11569 += 1 + (PPC_HA (off) != 0);
11570 stub_entry->group->stub_sec->flags |= SEC_RELOC;
11571 }
05d0e962 11572
f891966f
AM
11573 stub_entry->stub_type += ppc_stub_plt_branch - ppc_stub_long_branch;
11574 if (stub_entry->stub_type != ppc_stub_plt_branch_r2off)
11575 {
11576 size = 12;
11577 if (PPC_HA (off) != 0)
11578 size = 16;
ac2df442 11579 }
f891966f 11580 else
ac2df442 11581 {
f891966f
AM
11582 size = 16;
11583 if (PPC_HA (off) != 0)
11584 size += 4;
11585
11586 if (PPC_HA (r2off) != 0)
11587 size += 4;
11588 if (PPC_LO (r2off) != 0)
11589 size += 4;
ac2df442 11590 }
721956f4 11591 }
f891966f
AM
11592 else if (info->emitrelocations)
11593 {
11594 stub_entry->group->stub_sec->reloc_count += 1;
11595 stub_entry->group->stub_sec->flags |= SEC_RELOC;
11596 }
11597 break;
11598
11599 case ppc_stub_plt_branch_notoc:
11600 case ppc_stub_plt_branch_both:
11601 stub_entry->stub_type += ppc_stub_long_branch - ppc_stub_plt_branch;
11602 /* Fall through. */
11603 case ppc_stub_long_branch_notoc:
11604 case ppc_stub_long_branch_both:
11605 off = (stub_entry->stub_offset
11606 + stub_entry->group->stub_sec->output_offset
11607 + stub_entry->group->stub_sec->output_section->vma);
11608 size = 0;
11609 if (stub_entry->stub_type == ppc_stub_long_branch_both)
11610 size = 4;
11611 off += size;
11612 targ = (stub_entry->target_value
11613 + stub_entry->target_section->output_offset
11614 + stub_entry->target_section->output_section->vma);
04bdff6a 11615 odd = off & 4;
f891966f
AM
11616 off = targ - off;
11617
3d58e1fc
AM
11618 if (info->emitrelocations)
11619 {
04bdff6a
AM
11620 unsigned int num_rel;
11621 if (htab->powerxx_stubs)
11622 num_rel = num_relocs_for_powerxx_offset (off, odd);
11623 else
11624 num_rel = num_relocs_for_offset (off - 8);
11625 stub_entry->group->stub_sec->reloc_count += num_rel;
3d58e1fc
AM
11626 stub_entry->group->stub_sec->flags |= SEC_RELOC;
11627 }
11628
04bdff6a
AM
11629 if (htab->powerxx_stubs)
11630 extra = size_powerxx_offset (off, odd);
11631 else
11632 extra = size_offset (off - 8);
f891966f
AM
11633 /* Include branch insn plus those in the offset sequence. */
11634 size += 4 + extra;
11635 /* The branch insn is at the end, or "extra" bytes along. So
11636 its offset will be "extra" bytes less that that already
11637 calculated. */
11638 off -= extra;
11639
04bdff6a
AM
11640 if (!htab->powerxx_stubs)
11641 {
11642 /* After the bcl, lr has been modified so we need to emit
11643 .eh_frame info saying the return address is in r12. */
11644 lr_used = stub_entry->stub_offset + 8;
11645 if (stub_entry->stub_type == ppc_stub_long_branch_both)
11646 lr_used += 4;
11647 /* The eh_frame info will consist of a DW_CFA_advance_loc or
11648 variant, DW_CFA_register, 65, 12, DW_CFA_advance_loc+2,
11649 DW_CFA_restore_extended 65. */
11650 delta = lr_used - stub_entry->group->lr_restore;
11651 stub_entry->group->eh_size += eh_advance_size (delta) + 6;
11652 stub_entry->group->lr_restore = lr_used + 8;
11653 }
f891966f
AM
11654
11655 /* If the branch can't reach, use a plt_branch. */
11656 if (off + (1 << 25) >= (bfd_vma) (1 << 26))
11657 {
11658 stub_entry->stub_type += (ppc_stub_plt_branch_notoc
11659 - ppc_stub_long_branch_notoc);
11660 size += 4;
11661 }
3d58e1fc
AM
11662 else if (info->emitrelocations)
11663 stub_entry->group->stub_sec->reloc_count +=1;
f891966f
AM
11664 break;
11665
11666 case ppc_stub_plt_call_notoc:
11667 case ppc_stub_plt_call_both:
11668 off = (stub_entry->stub_offset
11669 + stub_entry->group->stub_sec->output_offset
11670 + stub_entry->group->stub_sec->output_section->vma);
11671 if (stub_entry->stub_type == ppc_stub_plt_call_both)
11672 off += 4;
11673 targ = stub_entry->plt_ent->plt.offset & ~1;
11674 if (targ >= (bfd_vma) -2)
11675 abort ();
11676
11677 plt = htab->elf.splt;
11678 if (!htab->elf.dynamic_sections_created
11679 || stub_entry->h == NULL
11680 || stub_entry->h->elf.dynindx == -1)
11681 {
11682 if (stub_entry->symtype == STT_GNU_IFUNC)
11683 plt = htab->elf.iplt;
11684 else
11685 plt = htab->pltlocal;
11686 }
11687 targ += plt->output_offset + plt->output_section->vma;
04bdff6a 11688 odd = off & 4;
f891966f
AM
11689 off = targ - off;
11690
11691 if (htab->params->plt_stub_align != 0)
11692 {
11693 unsigned pad = plt_stub_pad (htab, stub_entry, off);
11694
11695 stub_entry->group->stub_sec->size += pad;
11696 stub_entry->stub_offset = stub_entry->group->stub_sec->size;
11697 off -= pad;
11698 }
11699
3d58e1fc
AM
11700 if (info->emitrelocations)
11701 {
04bdff6a
AM
11702 unsigned int num_rel;
11703 if (htab->powerxx_stubs)
11704 num_rel = num_relocs_for_powerxx_offset (off, odd);
11705 else
11706 num_rel = num_relocs_for_offset (off - 8);
11707 stub_entry->group->stub_sec->reloc_count += num_rel;
3d58e1fc
AM
11708 stub_entry->group->stub_sec->flags |= SEC_RELOC;
11709 }
11710
f891966f
AM
11711 size = plt_stub_size (htab, stub_entry, off);
11712
04bdff6a
AM
11713 if (!htab->powerxx_stubs)
11714 {
11715 /* After the bcl, lr has been modified so we need to emit
11716 .eh_frame info saying the return address is in r12. */
11717 lr_used = stub_entry->stub_offset + 8;
11718 if (stub_entry->stub_type == ppc_stub_plt_call_both)
11719 lr_used += 4;
11720 /* The eh_frame info will consist of a DW_CFA_advance_loc or
11721 variant, DW_CFA_register, 65, 12, DW_CFA_advance_loc+2,
11722 DW_CFA_restore_extended 65. */
11723 delta = lr_used - stub_entry->group->lr_restore;
11724 stub_entry->group->eh_size += eh_advance_size (delta) + 6;
11725 stub_entry->group->lr_restore = lr_used + 8;
11726 }
f891966f
AM
11727 break;
11728
11729 case ppc_stub_plt_call:
11730 case ppc_stub_plt_call_r2save:
11731 targ = stub_entry->plt_ent->plt.offset & ~(bfd_vma) 1;
11732 if (targ >= (bfd_vma) -2)
11733 abort ();
11734 plt = htab->elf.splt;
11735 if (!htab->elf.dynamic_sections_created
11736 || stub_entry->h == NULL
11737 || stub_entry->h->elf.dynindx == -1)
11738 {
11739 if (stub_entry->symtype == STT_GNU_IFUNC)
11740 plt = htab->elf.iplt;
11741 else
11742 plt = htab->pltlocal;
11743 }
11744 targ += plt->output_offset + plt->output_section->vma;
11745
11746 off = (elf_gp (info->output_bfd)
11747 + htab->sec_info[stub_entry->group->link_sec->id].toc_off);
11748 off = targ - off;
11749
11750 if (htab->params->plt_stub_align != 0)
11751 {
11752 unsigned pad = plt_stub_pad (htab, stub_entry, off);
11753
11754 stub_entry->group->stub_sec->size += pad;
11755 stub_entry->stub_offset = stub_entry->group->stub_sec->size;
11756 }
11757
11758 if (info->emitrelocations)
11759 {
11760 stub_entry->group->stub_sec->reloc_count
11761 += ((PPC_HA (off) != 0)
11762 + (htab->opd_abi
11763 ? 2 + (htab->params->plt_static_chain
11764 && PPC_HA (off + 16) == PPC_HA (off))
11765 : 1));
11766 stub_entry->group->stub_sec->flags |= SEC_RELOC;
11767 }
11768
11769 size = plt_stub_size (htab, stub_entry, off);
11770
11771 if (stub_entry->h != NULL
11772 && (stub_entry->h == htab->tls_get_addr_fd
11773 || stub_entry->h == htab->tls_get_addr)
11774 && htab->params->tls_get_addr_opt
11775 && stub_entry->stub_type == ppc_stub_plt_call_r2save)
11776 {
11777 /* After the bctrl, lr has been modified so we need to
11778 emit .eh_frame info saying the return address is
11779 on the stack. In fact we put the EH info specifying
11780 that the return address is on the stack *at* the
11781 call rather than after it, because the EH info for a
11782 call needs to be specified by that point.
11783 See libgcc/unwind-dw2.c execute_cfa_program. */
11784 lr_used = stub_entry->stub_offset + size - 20;
11785 /* The eh_frame info will consist of a DW_CFA_advance_loc
11786 or variant, DW_CFA_offset_externed_sf, 65, -stackoff,
11787 DW_CFA_advance_loc+4, DW_CFA_restore_extended, 65. */
11788 delta = lr_used - stub_entry->group->lr_restore;
11789 stub_entry->group->eh_size += eh_advance_size (delta) + 6;
11790 stub_entry->group->lr_restore = size - 4;
11791 }
11792 break;
11793
11794 default:
11795 BFD_FAIL ();
11796 return FALSE;
721956f4
AM
11797 }
11798
6f20ed8a 11799 stub_entry->group->stub_sec->size += size;
b34976b6 11800 return TRUE;
721956f4
AM
11801}
11802
11803/* Set up various things so that we can make a list of input sections
11804 for each output section included in the link. Returns -1 on error,
cedb70c5 11805 0 when no stubs will be needed, and 1 on success. */
721956f4
AM
11806
11807int
e7d1c40c 11808ppc64_elf_setup_section_lists (struct bfd_link_info *info)
721956f4 11809{
6f20ed8a 11810 unsigned int id;
721956f4
AM
11811 bfd_size_type amt;
11812 struct ppc_link_hash_table *htab = ppc_hash_table (info);
11813
4dfe6ac6
NC
11814 if (htab == NULL)
11815 return -1;
4c52953f 11816
7cf7fcc8 11817 htab->sec_info_arr_size = _bfd_section_id;
6f20ed8a
AM
11818 amt = sizeof (*htab->sec_info) * (htab->sec_info_arr_size);
11819 htab->sec_info = bfd_zmalloc (amt);
11820 if (htab->sec_info == NULL)
721956f4
AM
11821 return -1;
11822
3d6f9012
AM
11823 /* Set toc_off for com, und, abs and ind sections. */
11824 for (id = 0; id < 3; id++)
6f20ed8a 11825 htab->sec_info[id].toc_off = TOC_BASE_OFF;
734b6cf9 11826
721956f4
AM
11827 return 1;
11828}
11829
927be08e
AM
11830/* Set up for first pass at multitoc partitioning. */
11831
11832void
11833ppc64_elf_start_multitoc_partition (struct bfd_link_info *info)
11834{
11835 struct ppc_link_hash_table *htab = ppc_hash_table (info);
11836
1c865ab2 11837 htab->toc_curr = ppc64_elf_set_toc (info, info->output_bfd);
927be08e
AM
11838 htab->toc_bfd = NULL;
11839 htab->toc_first_sec = NULL;
11840}
11841
e717da7e
AM
11842/* The linker repeatedly calls this function for each TOC input section
11843 and linker generated GOT section. Group input bfds such that the toc
927be08e 11844 within a group is less than 64k in size. */
ad8e1ba5 11845
927be08e 11846bfd_boolean
4ce794b7 11847ppc64_elf_next_toc_section (struct bfd_link_info *info, asection *isec)
ad8e1ba5
AM
11848{
11849 struct ppc_link_hash_table *htab = ppc_hash_table (info);
d77c8a4b 11850 bfd_vma addr, off, limit;
ad8e1ba5 11851
4dfe6ac6
NC
11852 if (htab == NULL)
11853 return FALSE;
11854
927be08e 11855 if (!htab->second_toc_pass)
4c52953f 11856 {
927be08e 11857 /* Keep track of the first .toc or .got section for this input bfd. */
a4fd3de5
AM
11858 bfd_boolean new_bfd = htab->toc_bfd != isec->owner;
11859
11860 if (new_bfd)
bf102f86
AM
11861 {
11862 htab->toc_bfd = isec->owner;
11863 htab->toc_first_sec = isec;
11864 }
927be08e 11865
bf102f86
AM
11866 addr = isec->output_offset + isec->output_section->vma;
11867 off = addr - htab->toc_curr;
d77c8a4b
AM
11868 limit = 0x80008000;
11869 if (ppc64_elf_tdata (isec->owner)->has_small_toc_reloc)
11870 limit = 0x10000;
11871 if (off + isec->size > limit)
bf102f86
AM
11872 {
11873 addr = (htab->toc_first_sec->output_offset
11874 + htab->toc_first_sec->output_section->vma);
11875 htab->toc_curr = addr;
a27e685f 11876 htab->toc_curr &= -TOC_BASE_ALIGN;
bf102f86 11877 }
99877b66 11878
927be08e
AM
11879 /* toc_curr is the base address of this toc group. Set elf_gp
11880 for the input section to be the offset relative to the
11881 output toc base plus 0x8000. Making the input elf_gp an
11882 offset allows us to move the toc as a whole without
11883 recalculating input elf_gp. */
06bcf541 11884 off = htab->toc_curr - elf_gp (info->output_bfd);
927be08e
AM
11885 off += TOC_BASE_OFF;
11886
11887 /* Die if someone uses a linker script that doesn't keep input
11888 file .toc and .got together. */
a4fd3de5
AM
11889 if (new_bfd
11890 && elf_gp (isec->owner) != 0
927be08e
AM
11891 && elf_gp (isec->owner) != off)
11892 return FALSE;
11893
11894 elf_gp (isec->owner) = off;
11895 return TRUE;
4c52953f 11896 }
927be08e
AM
11897
11898 /* During the second pass toc_first_sec points to the start of
11899 a toc group, and toc_curr is used to track the old elf_gp.
11900 We use toc_bfd to ensure we only look at each bfd once. */
11901 if (htab->toc_bfd == isec->owner)
11902 return TRUE;
11903 htab->toc_bfd = isec->owner;
11904
11905 if (htab->toc_first_sec == NULL
11906 || htab->toc_curr != elf_gp (isec->owner))
11907 {
11908 htab->toc_curr = elf_gp (isec->owner);
11909 htab->toc_first_sec = isec;
11910 }
11911 addr = (htab->toc_first_sec->output_offset
11912 + htab->toc_first_sec->output_section->vma);
06bcf541 11913 off = addr - elf_gp (info->output_bfd) + TOC_BASE_OFF;
927be08e
AM
11914 elf_gp (isec->owner) = off;
11915
11916 return TRUE;
ad8e1ba5
AM
11917}
11918
927be08e
AM
11919/* Called via elf_link_hash_traverse to merge GOT entries for global
11920 symbol H. */
11921
11922static bfd_boolean
11923merge_global_got (struct elf_link_hash_entry *h, void *inf ATTRIBUTE_UNUSED)
11924{
11925 if (h->root.type == bfd_link_hash_indirect)
11926 return TRUE;
11927
927be08e
AM
11928 merge_got_entries (&h->got.glist);
11929
11930 return TRUE;
11931}
11932
11933/* Called via elf_link_hash_traverse to allocate GOT entries for global
11934 symbol H. */
11935
11936static bfd_boolean
11937reallocate_got (struct elf_link_hash_entry *h, void *inf)
11938{
11939 struct got_entry *gent;
11940
11941 if (h->root.type == bfd_link_hash_indirect)
11942 return TRUE;
11943
927be08e
AM
11944 for (gent = h->got.glist; gent != NULL; gent = gent->next)
11945 if (!gent->is_indirect)
11946 allocate_got (h, (struct bfd_link_info *) inf, gent);
11947 return TRUE;
11948}
11949
11950/* Called on the first multitoc pass after the last call to
11951 ppc64_elf_next_toc_section. This function removes duplicate GOT
11952 entries. */
11953
11954bfd_boolean
11955ppc64_elf_layout_multitoc (struct bfd_link_info *info)
ad8e1ba5
AM
11956{
11957 struct ppc_link_hash_table *htab = ppc_hash_table (info);
927be08e
AM
11958 struct bfd *ibfd, *ibfd2;
11959 bfd_boolean done_something;
11960
11961 htab->multi_toc_needed = htab->toc_curr != elf_gp (info->output_bfd);
ad8e1ba5 11962
7865406b
AM
11963 if (!htab->do_multi_toc)
11964 return FALSE;
11965
d0fae19d 11966 /* Merge global sym got entries within a toc group. */
927be08e
AM
11967 elf_link_hash_traverse (&htab->elf, merge_global_got, info);
11968
11969 /* And tlsld_got. */
c72f2fb2 11970 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
927be08e
AM
11971 {
11972 struct got_entry *ent, *ent2;
11973
11974 if (!is_ppc64_elf (ibfd))
11975 continue;
11976
11977 ent = ppc64_tlsld_got (ibfd);
11978 if (!ent->is_indirect
11979 && ent->got.offset != (bfd_vma) -1)
11980 {
c72f2fb2 11981 for (ibfd2 = ibfd->link.next; ibfd2 != NULL; ibfd2 = ibfd2->link.next)
927be08e
AM
11982 {
11983 if (!is_ppc64_elf (ibfd2))
11984 continue;
11985
11986 ent2 = ppc64_tlsld_got (ibfd2);
11987 if (!ent2->is_indirect
11988 && ent2->got.offset != (bfd_vma) -1
11989 && elf_gp (ibfd2) == elf_gp (ibfd))
11990 {
11991 ent2->is_indirect = TRUE;
11992 ent2->got.ent = ent;
11993 }
11994 }
11995 }
11996 }
11997
11998 /* Zap sizes of got sections. */
33e44f2e
AM
11999 htab->elf.irelplt->rawsize = htab->elf.irelplt->size;
12000 htab->elf.irelplt->size -= htab->got_reli_size;
927be08e
AM
12001 htab->got_reli_size = 0;
12002
c72f2fb2 12003 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
927be08e
AM
12004 {
12005 asection *got, *relgot;
12006
12007 if (!is_ppc64_elf (ibfd))
12008 continue;
12009
12010 got = ppc64_elf_tdata (ibfd)->got;
12011 if (got != NULL)
12012 {
12013 got->rawsize = got->size;
12014 got->size = 0;
12015 relgot = ppc64_elf_tdata (ibfd)->relgot;
12016 relgot->rawsize = relgot->size;
12017 relgot->size = 0;
12018 }
12019 }
12020
12021 /* Now reallocate the got, local syms first. We don't need to
12022 allocate section contents again since we never increase size. */
c72f2fb2 12023 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
927be08e
AM
12024 {
12025 struct got_entry **lgot_ents;
12026 struct got_entry **end_lgot_ents;
12027 struct plt_entry **local_plt;
12028 struct plt_entry **end_local_plt;
f961d9dd 12029 unsigned char *lgot_masks;
927be08e
AM
12030 bfd_size_type locsymcount;
12031 Elf_Internal_Shdr *symtab_hdr;
19e08130 12032 asection *s;
927be08e
AM
12033
12034 if (!is_ppc64_elf (ibfd))
12035 continue;
12036
12037 lgot_ents = elf_local_got_ents (ibfd);
12038 if (!lgot_ents)
12039 continue;
12040
12041 symtab_hdr = &elf_symtab_hdr (ibfd);
12042 locsymcount = symtab_hdr->sh_info;
12043 end_lgot_ents = lgot_ents + locsymcount;
12044 local_plt = (struct plt_entry **) end_lgot_ents;
12045 end_local_plt = local_plt + locsymcount;
f961d9dd 12046 lgot_masks = (unsigned char *) end_local_plt;
927be08e 12047 s = ppc64_elf_tdata (ibfd)->got;
927be08e
AM
12048 for (; lgot_ents < end_lgot_ents; ++lgot_ents, ++lgot_masks)
12049 {
12050 struct got_entry *ent;
12051
12052 for (ent = *lgot_ents; ent != NULL; ent = ent->next)
d0fae19d 12053 {
19e08130
AM
12054 unsigned int ent_size = 8;
12055 unsigned int rel_size = sizeof (Elf64_External_Rela);
12056
d0fae19d
AM
12057 ent->got.offset = s->size;
12058 if ((ent->tls_type & *lgot_masks & TLS_GD) != 0)
d0fae19d 12059 {
19e08130
AM
12060 ent_size *= 2;
12061 rel_size *= 2;
12062 }
12063 s->size += ent_size;
37da22e5 12064 if ((*lgot_masks & (TLS_TLS | PLT_IFUNC)) == PLT_IFUNC)
19e08130 12065 {
33e44f2e 12066 htab->elf.irelplt->size += rel_size;
19e08130
AM
12067 htab->got_reli_size += rel_size;
12068 }
6a3858a6
AM
12069 else if (bfd_link_pic (info)
12070 && !((ent->tls_type & TLS_TPREL) != 0
12071 && bfd_link_executable (info)))
19e08130
AM
12072 {
12073 asection *srel = ppc64_elf_tdata (ibfd)->relgot;
12074 srel->size += rel_size;
d0fae19d
AM
12075 }
12076 }
927be08e
AM
12077 }
12078 }
12079
12080 elf_link_hash_traverse (&htab->elf, reallocate_got, info);
12081
c72f2fb2 12082 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
927be08e
AM
12083 {
12084 struct got_entry *ent;
12085
12086 if (!is_ppc64_elf (ibfd))
12087 continue;
12088
12089 ent = ppc64_tlsld_got (ibfd);
12090 if (!ent->is_indirect
12091 && ent->got.offset != (bfd_vma) -1)
12092 {
12093 asection *s = ppc64_elf_tdata (ibfd)->got;
12094 ent->got.offset = s->size;
12095 s->size += 16;
0e1862bb 12096 if (bfd_link_pic (info))
927be08e
AM
12097 {
12098 asection *srel = ppc64_elf_tdata (ibfd)->relgot;
12099 srel->size += sizeof (Elf64_External_Rela);
12100 }
12101 }
12102 }
12103
33e44f2e 12104 done_something = htab->elf.irelplt->rawsize != htab->elf.irelplt->size;
927be08e 12105 if (!done_something)
c72f2fb2 12106 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
927be08e
AM
12107 {
12108 asection *got;
12109
12110 if (!is_ppc64_elf (ibfd))
12111 continue;
12112
12113 got = ppc64_elf_tdata (ibfd)->got;
12114 if (got != NULL)
12115 {
12116 done_something = got->rawsize != got->size;
12117 if (done_something)
12118 break;
12119 }
12120 }
12121
12122 if (done_something)
e7d1c40c 12123 (*htab->params->layout_sections_again) ();
927be08e
AM
12124
12125 /* Set up for second pass over toc sections to recalculate elf_gp
12126 on input sections. */
12127 htab->toc_bfd = NULL;
12128 htab->toc_first_sec = NULL;
12129 htab->second_toc_pass = TRUE;
12130 return done_something;
12131}
12132
12133/* Called after second pass of multitoc partitioning. */
12134
12135void
12136ppc64_elf_finish_multitoc_partition (struct bfd_link_info *info)
12137{
12138 struct ppc_link_hash_table *htab = ppc_hash_table (info);
12139
12140 /* After the second pass, toc_curr tracks the TOC offset used
12141 for code sections below in ppc64_elf_next_input_section. */
3d6f9012 12142 htab->toc_curr = TOC_BASE_OFF;
ad8e1ba5
AM
12143}
12144
9b5ecbd0
AM
12145/* No toc references were found in ISEC. If the code in ISEC makes no
12146 calls, then there's no need to use toc adjusting stubs when branching
12147 into ISEC. Actually, indirect calls from ISEC are OK as they will
4c52953f
AM
12148 load r2. Returns -1 on error, 0 for no stub needed, 1 for stub
12149 needed, and 2 if a cyclical call-graph was found but no other reason
12150 for a stub was detected. If called from the top level, a return of
12151 2 means the same as a return of 0. */
9b5ecbd0
AM
12152
12153static int
4ce794b7 12154toc_adjusting_stub_needed (struct bfd_link_info *info, asection *isec)
9b5ecbd0 12155{
9b5ecbd0 12156 int ret;
70cc837d
AM
12157
12158 /* Mark this section as checked. */
12159 isec->call_check_done = 1;
9b5ecbd0 12160
772119ce
AM
12161 /* We know none of our code bearing sections will need toc stubs. */
12162 if ((isec->flags & SEC_LINKER_CREATED) != 0)
12163 return 0;
12164
eea6121a 12165 if (isec->size == 0)
082c50f8
AM
12166 return 0;
12167
4c52953f
AM
12168 if (isec->output_section == NULL)
12169 return 0;
12170
4c52953f 12171 ret = 0;
70cc837d 12172 if (isec->reloc_count != 0)
9b5ecbd0 12173 {
70cc837d
AM
12174 Elf_Internal_Rela *relstart, *rel;
12175 Elf_Internal_Sym *local_syms;
12176 struct ppc_link_hash_table *htab;
2917689a 12177
70cc837d
AM
12178 relstart = _bfd_elf_link_read_relocs (isec->owner, isec, NULL, NULL,
12179 info->keep_memory);
12180 if (relstart == NULL)
12181 return -1;
90aecf7a 12182
70cc837d
AM
12183 /* Look for branches to outside of this section. */
12184 local_syms = NULL;
12185 htab = ppc_hash_table (info);
12186 if (htab == NULL)
12187 return -1;
4c52953f 12188
70cc837d 12189 for (rel = relstart; rel < relstart + isec->reloc_count; ++rel)
4c52953f 12190 {
70cc837d
AM
12191 enum elf_ppc64_reloc_type r_type;
12192 unsigned long r_symndx;
12193 struct elf_link_hash_entry *h;
12194 struct ppc_link_hash_entry *eh;
12195 Elf_Internal_Sym *sym;
12196 asection *sym_sec;
12197 struct _opd_sec_data *opd;
12198 bfd_vma sym_value;
12199 bfd_vma dest;
12200
12201 r_type = ELF64_R_TYPE (rel->r_info);
12202 if (r_type != R_PPC64_REL24
05d0e962 12203 && r_type != R_PPC64_REL24_NOTOC
70cc837d
AM
12204 && r_type != R_PPC64_REL14
12205 && r_type != R_PPC64_REL14_BRTAKEN
23cedd1d 12206 && r_type != R_PPC64_REL14_BRNTAKEN
5663e321
AM
12207 && r_type != R_PPC64_PLTCALL
12208 && r_type != R_PPC64_PLTCALL_NOTOC)
70cc837d 12209 continue;
4c52953f 12210
70cc837d
AM
12211 r_symndx = ELF64_R_SYM (rel->r_info);
12212 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms, r_symndx,
12213 isec->owner))
4c52953f 12214 {
70cc837d
AM
12215 ret = -1;
12216 break;
12217 }
4c52953f 12218
70cc837d
AM
12219 /* Calls to dynamic lib functions go through a plt call stub
12220 that uses r2. */
12221 eh = (struct ppc_link_hash_entry *) h;
12222 if (eh != NULL
12223 && (eh->elf.plt.plist != NULL
12224 || (eh->oh != NULL
12225 && ppc_follow_link (eh->oh)->elf.plt.plist != NULL)))
12226 {
12227 ret = 1;
12228 break;
4c52953f
AM
12229 }
12230
70cc837d
AM
12231 if (sym_sec == NULL)
12232 /* Ignore other undefined symbols. */
4c52953f 12233 continue;
4c52953f 12234
70cc837d
AM
12235 /* Assume branches to other sections not included in the
12236 link need stubs too, to cover -R and absolute syms. */
12237 if (sym_sec->output_section == NULL)
12238 {
12239 ret = 1;
12240 break;
12241 }
4c52953f 12242
70cc837d
AM
12243 if (h == NULL)
12244 sym_value = sym->st_value;
12245 else
12246 {
12247 if (h->root.type != bfd_link_hash_defined
12248 && h->root.type != bfd_link_hash_defweak)
12249 abort ();
12250 sym_value = h->root.u.def.value;
12251 }
12252 sym_value += rel->r_addend;
4c52953f 12253
70cc837d
AM
12254 /* If this branch reloc uses an opd sym, find the code section. */
12255 opd = get_opd_info (sym_sec);
12256 if (opd != NULL)
12257 {
12258 if (h == NULL && opd->adjust != NULL)
12259 {
12260 long adjust;
4c52953f 12261
92a9c616 12262 adjust = opd->adjust[OPD_NDX (sym_value)];
70cc837d
AM
12263 if (adjust == -1)
12264 /* Assume deleted functions won't ever be called. */
12265 continue;
12266 sym_value += adjust;
12267 }
4c52953f 12268
aef36ac1
AM
12269 dest = opd_entry_value (sym_sec, sym_value,
12270 &sym_sec, NULL, FALSE);
70cc837d
AM
12271 if (dest == (bfd_vma) -1)
12272 continue;
12273 }
12274 else
12275 dest = (sym_value
12276 + sym_sec->output_offset
12277 + sym_sec->output_section->vma);
4c52953f 12278
70cc837d
AM
12279 /* Ignore branch to self. */
12280 if (sym_sec == isec)
12281 continue;
4c52953f 12282
70cc837d
AM
12283 /* If the called function uses the toc, we need a stub. */
12284 if (sym_sec->has_toc_reloc
12285 || sym_sec->makes_toc_func_call)
4c52953f 12286 {
70cc837d 12287 ret = 1;
4c52953f
AM
12288 break;
12289 }
70cc837d
AM
12290
12291 /* Assume any branch that needs a long branch stub might in fact
12292 need a plt_branch stub. A plt_branch stub uses r2. */
12293 else if (dest - (isec->output_offset
12294 + isec->output_section->vma
6911b7dc
AM
12295 + rel->r_offset) + (1 << 25)
12296 >= (2u << 25) - PPC64_LOCAL_ENTRY_OFFSET (h
12297 ? h->other
12298 : sym->st_other))
4c52953f 12299 {
70cc837d
AM
12300 ret = 1;
12301 break;
12302 }
12303
12304 /* If calling back to a section in the process of being
12305 tested, we can't say for sure that no toc adjusting stubs
12306 are needed, so don't return zero. */
12307 else if (sym_sec->call_check_in_progress)
12308 ret = 2;
12309
12310 /* Branches to another section that itself doesn't have any TOC
12311 references are OK. Recursively call ourselves to check. */
12312 else if (!sym_sec->call_check_done)
12313 {
12314 int recur;
12315
12316 /* Mark current section as indeterminate, so that other
12317 sections that call back to current won't be marked as
12318 known. */
12319 isec->call_check_in_progress = 1;
12320 recur = toc_adjusting_stub_needed (info, sym_sec);
12321 isec->call_check_in_progress = 0;
12322
4c52953f
AM
12323 if (recur != 0)
12324 {
70cc837d
AM
12325 ret = recur;
12326 if (recur != 2)
12327 break;
4c52953f
AM
12328 }
12329 }
4c52953f 12330 }
70cc837d
AM
12331
12332 if (local_syms != NULL
12333 && (elf_symtab_hdr (isec->owner).contents
12334 != (unsigned char *) local_syms))
12335 free (local_syms);
12336 if (elf_section_data (isec)->relocs != relstart)
12337 free (relstart);
9b5ecbd0
AM
12338 }
12339
70cc837d
AM
12340 if ((ret & 1) == 0
12341 && isec->map_head.s != NULL
12342 && (strcmp (isec->output_section->name, ".init") == 0
12343 || strcmp (isec->output_section->name, ".fini") == 0))
12344 {
12345 if (isec->map_head.s->has_toc_reloc
12346 || isec->map_head.s->makes_toc_func_call)
12347 ret = 1;
12348 else if (!isec->map_head.s->call_check_done)
12349 {
12350 int recur;
12351 isec->call_check_in_progress = 1;
12352 recur = toc_adjusting_stub_needed (info, isec->map_head.s);
12353 isec->call_check_in_progress = 0;
12354 if (recur != 0)
12355 ret = recur;
12356 }
12357 }
12358
12359 if (ret == 1)
12360 isec->makes_toc_func_call = 1;
4c52953f 12361
9b5ecbd0
AM
12362 return ret;
12363}
12364
721956f4
AM
12365/* The linker repeatedly calls this function for each input section,
12366 in the order that input sections are linked into output sections.
12367 Build lists of input sections to determine groupings between which
12368 we may insert linker stubs. */
12369
9b5ecbd0 12370bfd_boolean
4ce794b7 12371ppc64_elf_next_input_section (struct bfd_link_info *info, asection *isec)
721956f4
AM
12372{
12373 struct ppc_link_hash_table *htab = ppc_hash_table (info);
12374
4dfe6ac6
NC
12375 if (htab == NULL)
12376 return FALSE;
12377
734b6cf9 12378 if ((isec->output_section->flags & SEC_CODE) != 0
6f20ed8a 12379 && isec->output_section->id < htab->sec_info_arr_size)
721956f4 12380 {
3d6f9012
AM
12381 /* This happens to make the list in reverse order,
12382 which is what we want. */
6f20ed8a
AM
12383 htab->sec_info[isec->id].u.list
12384 = htab->sec_info[isec->output_section->id].u.list;
12385 htab->sec_info[isec->output_section->id].u.list = isec;
721956f4 12386 }
ad8e1ba5 12387
4c52953f 12388 if (htab->multi_toc_needed)
9b5ecbd0 12389 {
8b974ba3
AM
12390 /* Analyse sections that aren't already flagged as needing a
12391 valid toc pointer. Exclude .fixup for the linux kernel.
12392 .fixup contains branches, but only back to the function that
12393 hit an exception. */
12394 if (!(isec->has_toc_reloc
12395 || (isec->flags & SEC_CODE) == 0
12396 || strcmp (isec->name, ".fixup") == 0
12397 || isec->call_check_done))
12398 {
12399 if (toc_adjusting_stub_needed (info, isec) < 0)
6683a28d 12400 return FALSE;
8b974ba3
AM
12401 }
12402 /* Make all sections use the TOC assigned for this object file.
12403 This will be wrong for pasted sections; We fix that in
12404 check_pasted_section(). */
12405 if (elf_gp (isec->owner) != 0)
12406 htab->toc_curr = elf_gp (isec->owner);
12407 }
12408
6f20ed8a 12409 htab->sec_info[isec->id].toc_off = htab->toc_curr;
9b5ecbd0 12410 return TRUE;
721956f4
AM
12411}
12412
70cc837d
AM
12413/* Check that all .init and .fini sections use the same toc, if they
12414 have toc relocs. */
12415
12416static bfd_boolean
12417check_pasted_section (struct bfd_link_info *info, const char *name)
12418{
12419 asection *o = bfd_get_section_by_name (info->output_bfd, name);
12420
12421 if (o != NULL)
12422 {
12423 struct ppc_link_hash_table *htab = ppc_hash_table (info);
12424 bfd_vma toc_off = 0;
12425 asection *i;
12426
12427 for (i = o->map_head.s; i != NULL; i = i->map_head.s)
12428 if (i->has_toc_reloc)
12429 {
12430 if (toc_off == 0)
6f20ed8a
AM
12431 toc_off = htab->sec_info[i->id].toc_off;
12432 else if (toc_off != htab->sec_info[i->id].toc_off)
70cc837d
AM
12433 return FALSE;
12434 }
6683a28d
AM
12435
12436 if (toc_off == 0)
12437 for (i = o->map_head.s; i != NULL; i = i->map_head.s)
12438 if (i->makes_toc_func_call)
12439 {
6f20ed8a 12440 toc_off = htab->sec_info[i->id].toc_off;
6683a28d
AM
12441 break;
12442 }
12443
70cc837d
AM
12444 /* Make sure the whole pasted function uses the same toc offset. */
12445 if (toc_off != 0)
12446 for (i = o->map_head.s; i != NULL; i = i->map_head.s)
6f20ed8a 12447 htab->sec_info[i->id].toc_off = toc_off;
70cc837d
AM
12448 }
12449 return TRUE;
12450}
12451
12452bfd_boolean
12453ppc64_elf_check_init_fini (struct bfd_link_info *info)
12454{
12455 return (check_pasted_section (info, ".init")
12456 & check_pasted_section (info, ".fini"));
12457}
12458
721956f4
AM
12459/* See whether we can group stub sections together. Grouping stub
12460 sections may result in fewer stubs. More importantly, we need to
12461 put all .init* and .fini* stubs at the beginning of the .init or
12462 .fini output sections respectively, because glibc splits the
12463 _init and _fini functions into multiple parts. Putting a stub in
12464 the middle of a function is not a good idea. */
12465
6f20ed8a
AM
12466static bfd_boolean
12467group_sections (struct bfd_link_info *info,
4ce794b7
AM
12468 bfd_size_type stub_group_size,
12469 bfd_boolean stubs_always_before_branch)
721956f4 12470{
6f20ed8a
AM
12471 struct ppc_link_hash_table *htab;
12472 asection *osec;
7c8fe5c4
AM
12473 bfd_boolean suppress_size_errors;
12474
6f20ed8a
AM
12475 htab = ppc_hash_table (info);
12476 if (htab == NULL)
12477 return FALSE;
12478
7c8fe5c4 12479 suppress_size_errors = FALSE;
7c8fe5c4
AM
12480 if (stub_group_size == 1)
12481 {
12482 /* Default values. */
12483 if (stubs_always_before_branch)
09f92717 12484 stub_group_size = 0x1e00000;
7c8fe5c4 12485 else
09f92717 12486 stub_group_size = 0x1c00000;
7c8fe5c4
AM
12487 suppress_size_errors = TRUE;
12488 }
12489
6f20ed8a 12490 for (osec = info->output_bfd->sections; osec != NULL; osec = osec->next)
721956f4 12491 {
6f20ed8a
AM
12492 asection *tail;
12493
12494 if (osec->id >= htab->sec_info_arr_size)
12495 continue;
12496
12497 tail = htab->sec_info[osec->id].u.list;
734b6cf9 12498 while (tail != NULL)
721956f4 12499 {
734b6cf9
AM
12500 asection *curr;
12501 asection *prev;
12502 bfd_size_type total;
12503 bfd_boolean big_sec;
12504 bfd_vma curr_toc;
6f20ed8a 12505 struct map_stub *group;
09f92717 12506 bfd_size_type group_size;
734b6cf9
AM
12507
12508 curr = tail;
eea6121a 12509 total = tail->size;
09f92717
AM
12510 group_size = (ppc64_elf_section_data (tail) != NULL
12511 && ppc64_elf_section_data (tail)->has_14bit_branch
12512 ? stub_group_size >> 10 : stub_group_size);
12513
12514 big_sec = total > group_size;
7c8fe5c4 12515 if (big_sec && !suppress_size_errors)
695344c0 12516 /* xgettext:c-format */
871b3ab2 12517 _bfd_error_handler (_("%pB section %pA exceeds stub group size"),
4eca0228 12518 tail->owner, tail);
6f20ed8a 12519 curr_toc = htab->sec_info[tail->id].toc_off;
734b6cf9 12520
6f20ed8a 12521 while ((prev = htab->sec_info[curr->id].u.list) != NULL
734b6cf9 12522 && ((total += curr->output_offset - prev->output_offset)
6bee8834
AM
12523 < (ppc64_elf_section_data (prev) != NULL
12524 && ppc64_elf_section_data (prev)->has_14bit_branch
09f92717 12525 ? (group_size = stub_group_size >> 10) : group_size))
6f20ed8a 12526 && htab->sec_info[prev->id].toc_off == curr_toc)
734b6cf9
AM
12527 curr = prev;
12528
12529 /* OK, the size from the start of CURR to the end is less
09f92717 12530 than group_size and thus can be handled by one stub
734b6cf9 12531 section. (or the tail section is itself larger than
09f92717
AM
12532 group_size, in which case we may be toast.) We should
12533 really be keeping track of the total size of stubs added
12534 here, as stubs contribute to the final output section
12535 size. That's a little tricky, and this way will only
12536 break if stubs added make the total size more than 2^25,
12537 ie. for the default stub_group_size, if stubs total more
12538 than 2097152 bytes, or nearly 75000 plt call stubs. */
6f20ed8a
AM
12539 group = bfd_alloc (curr->owner, sizeof (*group));
12540 if (group == NULL)
12541 return FALSE;
12542 group->link_sec = curr;
12543 group->stub_sec = NULL;
a4b6fadd 12544 group->needs_save_res = 0;
df136d64
AM
12545 group->lr_restore = 0;
12546 group->eh_size = 0;
12547 group->eh_base = 0;
a4b6fadd
AM
12548 group->next = htab->group;
12549 htab->group = group;
734b6cf9 12550 do
721956f4 12551 {
6f20ed8a 12552 prev = htab->sec_info[tail->id].u.list;
734b6cf9 12553 /* Set up this stub group. */
6f20ed8a 12554 htab->sec_info[tail->id].u.group = group;
721956f4 12555 }
734b6cf9
AM
12556 while (tail != curr && (tail = prev) != NULL);
12557
09f92717 12558 /* But wait, there's more! Input sections up to group_size
734b6cf9
AM
12559 bytes before the stub section can be handled by it too.
12560 Don't do this if we have a really large section after the
12561 stubs, as adding more stubs increases the chance that
12562 branches may not reach into the stub section. */
12563 if (!stubs_always_before_branch && !big_sec)
12564 {
12565 total = 0;
12566 while (prev != NULL
12567 && ((total += tail->output_offset - prev->output_offset)
6bee8834
AM
12568 < (ppc64_elf_section_data (prev) != NULL
12569 && ppc64_elf_section_data (prev)->has_14bit_branch
2cdcc330
AM
12570 ? (group_size = stub_group_size >> 10)
12571 : group_size))
6f20ed8a 12572 && htab->sec_info[prev->id].toc_off == curr_toc)
734b6cf9
AM
12573 {
12574 tail = prev;
6f20ed8a
AM
12575 prev = htab->sec_info[tail->id].u.list;
12576 htab->sec_info[tail->id].u.group = group;
734b6cf9
AM
12577 }
12578 }
12579 tail = prev;
721956f4
AM
12580 }
12581 }
6f20ed8a 12582 return TRUE;
721956f4
AM
12583}
12584
58d180e8
AM
12585static const unsigned char glink_eh_frame_cie[] =
12586{
12587 0, 0, 0, 16, /* length. */
12588 0, 0, 0, 0, /* id. */
12589 1, /* CIE version. */
12590 'z', 'R', 0, /* Augmentation string. */
12591 4, /* Code alignment. */
12592 0x78, /* Data alignment. */
12593 65, /* RA reg. */
12594 1, /* Augmentation size. */
12595 DW_EH_PE_pcrel | DW_EH_PE_sdata4, /* FDE encoding. */
2e0ce1c8 12596 DW_CFA_def_cfa, 1, 0 /* def_cfa: r1 offset 0. */
58d180e8
AM
12597};
12598
d969d15f
AM
12599/* Stripping output sections is normally done before dynamic section
12600 symbols have been allocated. This function is called later, and
12601 handles cases like htab->brlt which is mapped to its own output
12602 section. */
12603
12604static void
12605maybe_strip_output (struct bfd_link_info *info, asection *isec)
12606{
12607 if (isec->size == 0
12608 && isec->output_section->size == 0
53d8967a 12609 && !(isec->output_section->flags & SEC_KEEP)
d969d15f
AM
12610 && !bfd_section_removed_from_list (info->output_bfd,
12611 isec->output_section)
12612 && elf_section_data (isec->output_section)->dynindx == 0)
12613 {
12614 isec->output_section->flags |= SEC_EXCLUDE;
12615 bfd_section_list_remove (info->output_bfd, isec->output_section);
12616 info->output_bfd->section_count--;
12617 }
12618}
12619
721956f4
AM
12620/* Determine and set the size of the stub section for a final link.
12621
12622 The basic idea here is to examine all the relocations looking for
12623 PC-relative calls to a target that is unreachable with a "bl"
12624 instruction. */
12625
b34976b6 12626bfd_boolean
e7d1c40c 12627ppc64_elf_size_stubs (struct bfd_link_info *info)
721956f4
AM
12628{
12629 bfd_size_type stub_group_size;
b34976b6 12630 bfd_boolean stubs_always_before_branch;
721956f4
AM
12631 struct ppc_link_hash_table *htab = ppc_hash_table (info);
12632
4dfe6ac6
NC
12633 if (htab == NULL)
12634 return FALSE;
12635
0e1862bb 12636 if (htab->params->plt_thread_safe == -1 && !bfd_link_executable (info))
e7d1c40c 12637 htab->params->plt_thread_safe = 1;
b9e5796b 12638 if (!htab->opd_abi)
e7d1c40c
AM
12639 htab->params->plt_thread_safe = 0;
12640 else if (htab->params->plt_thread_safe == -1)
794e51c0 12641 {
e2458743 12642 static const char *const thread_starter[] =
794e51c0
AM
12643 {
12644 "pthread_create",
12645 /* libstdc++ */
12646 "_ZNSt6thread15_M_start_threadESt10shared_ptrINS_10_Impl_baseEE",
12647 /* librt */
12648 "aio_init", "aio_read", "aio_write", "aio_fsync", "lio_listio",
12649 "mq_notify", "create_timer",
12650 /* libanl */
12651 "getaddrinfo_a",
12652 /* libgomp */
2300b5a1 12653 "GOMP_parallel",
794e51c0 12654 "GOMP_parallel_start",
2300b5a1 12655 "GOMP_parallel_loop_static",
794e51c0 12656 "GOMP_parallel_loop_static_start",
2300b5a1 12657 "GOMP_parallel_loop_dynamic",
794e51c0 12658 "GOMP_parallel_loop_dynamic_start",
2300b5a1 12659 "GOMP_parallel_loop_guided",
794e51c0 12660 "GOMP_parallel_loop_guided_start",
2300b5a1 12661 "GOMP_parallel_loop_runtime",
794e51c0 12662 "GOMP_parallel_loop_runtime_start",
2300b5a1 12663 "GOMP_parallel_sections",
68ffbac6 12664 "GOMP_parallel_sections_start",
f9dffbf0
AM
12665 /* libgo */
12666 "__go_go",
794e51c0
AM
12667 };
12668 unsigned i;
12669
a4b6fadd 12670 for (i = 0; i < ARRAY_SIZE (thread_starter); i++)
794e51c0
AM
12671 {
12672 struct elf_link_hash_entry *h;
12673 h = elf_link_hash_lookup (&htab->elf, thread_starter[i],
12674 FALSE, FALSE, TRUE);
e7d1c40c
AM
12675 htab->params->plt_thread_safe = h != NULL && h->ref_regular;
12676 if (htab->params->plt_thread_safe)
794e51c0
AM
12677 break;
12678 }
12679 }
e7d1c40c
AM
12680 stubs_always_before_branch = htab->params->group_size < 0;
12681 if (htab->params->group_size < 0)
12682 stub_group_size = -htab->params->group_size;
721956f4 12683 else
e7d1c40c 12684 stub_group_size = htab->params->group_size;
721956f4 12685
6f20ed8a
AM
12686 if (!group_sections (info, stub_group_size, stubs_always_before_branch))
12687 return FALSE;
721956f4 12688
c9301e31
AM
12689#define STUB_SHRINK_ITER 20
12690 /* Loop until no stubs added. After iteration 20 of this loop we may
12691 exit on a stub section shrinking. This is to break out of a
12692 pathological case where adding stubs on one iteration decreases
12693 section gaps (perhaps due to alignment), which then requires
12694 fewer or smaller stubs on the next iteration. */
12695
721956f4
AM
12696 while (1)
12697 {
12698 bfd *input_bfd;
12699 unsigned int bfd_indx;
a4b6fadd 12700 struct map_stub *group;
721956f4
AM
12701
12702 htab->stub_iteration += 1;
721956f4
AM
12703
12704 for (input_bfd = info->input_bfds, bfd_indx = 0;
12705 input_bfd != NULL;
c72f2fb2 12706 input_bfd = input_bfd->link.next, bfd_indx++)
721956f4
AM
12707 {
12708 Elf_Internal_Shdr *symtab_hdr;
12709 asection *section;
6cdc0ccc 12710 Elf_Internal_Sym *local_syms = NULL;
721956f4 12711
0c8d6e5c 12712 if (!is_ppc64_elf (input_bfd))
67f93c31
AM
12713 continue;
12714
721956f4 12715 /* We'll need the symbol table in a second. */
0ffa91dd 12716 symtab_hdr = &elf_symtab_hdr (input_bfd);
721956f4
AM
12717 if (symtab_hdr->sh_info == 0)
12718 continue;
12719
721956f4
AM
12720 /* Walk over each section attached to the input bfd. */
12721 for (section = input_bfd->sections;
12722 section != NULL;
12723 section = section->next)
12724 {
721956f4 12725 Elf_Internal_Rela *internal_relocs, *irelaend, *irela;
721956f4
AM
12726
12727 /* If there aren't any relocs, then there's nothing more
12728 to do. */
12729 if ((section->flags & SEC_RELOC) == 0
12c0f757
AM
12730 || (section->flags & SEC_ALLOC) == 0
12731 || (section->flags & SEC_LOAD) == 0
12732 || (section->flags & SEC_CODE) == 0
721956f4
AM
12733 || section->reloc_count == 0)
12734 continue;
12735
12736 /* If this section is a link-once section that will be
12737 discarded, then don't create any stubs. */
12738 if (section->output_section == NULL
927be08e 12739 || section->output_section->owner != info->output_bfd)
721956f4
AM
12740 continue;
12741
1e2f5b6e
AM
12742 /* Get the relocs. */
12743 internal_relocs
4ce794b7 12744 = _bfd_elf_link_read_relocs (input_bfd, section, NULL, NULL,
45d6a902 12745 info->keep_memory);
721956f4 12746 if (internal_relocs == NULL)
1e2f5b6e 12747 goto error_ret_free_local;
721956f4
AM
12748
12749 /* Now examine each relocation. */
12750 irela = internal_relocs;
12751 irelaend = irela + section->reloc_count;
12752 for (; irela < irelaend; irela++)
12753 {
4ce794b7
AM
12754 enum elf_ppc64_reloc_type r_type;
12755 unsigned int r_indx;
721956f4
AM
12756 enum ppc_stub_type stub_type;
12757 struct ppc_stub_hash_entry *stub_entry;
8387904d 12758 asection *sym_sec, *code_sec;
e054468f 12759 bfd_vma sym_value, code_value;
721956f4 12760 bfd_vma destination;
6911b7dc 12761 unsigned long local_off;
8843416a 12762 bfd_boolean ok_dest;
721956f4 12763 struct ppc_link_hash_entry *hash;
8387904d 12764 struct ppc_link_hash_entry *fdh;
411e1bfb
AM
12765 struct elf_link_hash_entry *h;
12766 Elf_Internal_Sym *sym;
721956f4
AM
12767 char *stub_name;
12768 const asection *id_sec;
74f0fb50 12769 struct _opd_sec_data *opd;
e054468f 12770 struct plt_entry *plt_ent;
721956f4
AM
12771
12772 r_type = ELF64_R_TYPE (irela->r_info);
12773 r_indx = ELF64_R_SYM (irela->r_info);
12774
4ce794b7 12775 if (r_type >= R_PPC64_max)
721956f4
AM
12776 {
12777 bfd_set_error (bfd_error_bad_value);
6cdc0ccc 12778 goto error_ret_free_internal;
721956f4
AM
12779 }
12780
12781 /* Only look for stubs on branch instructions. */
4ce794b7 12782 if (r_type != R_PPC64_REL24
05d0e962 12783 && r_type != R_PPC64_REL24_NOTOC
4ce794b7
AM
12784 && r_type != R_PPC64_REL14
12785 && r_type != R_PPC64_REL14_BRTAKEN
12786 && r_type != R_PPC64_REL14_BRNTAKEN)
721956f4
AM
12787 continue;
12788
12789 /* Now determine the call target, its name, value,
12790 section. */
411e1bfb
AM
12791 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms,
12792 r_indx, input_bfd))
12793 goto error_ret_free_internal;
12794 hash = (struct ppc_link_hash_entry *) h;
12795
8843416a 12796 ok_dest = FALSE;
8387904d 12797 fdh = NULL;
7fe2b9a6 12798 sym_value = 0;
411e1bfb 12799 if (hash == NULL)
721956f4 12800 {
411e1bfb 12801 sym_value = sym->st_value;
c27b8c2a
AM
12802 if (sym_sec != NULL
12803 && sym_sec->output_section != NULL)
12804 ok_dest = TRUE;
721956f4 12805 }
7fe2b9a6
AM
12806 else if (hash->elf.root.type == bfd_link_hash_defined
12807 || hash->elf.root.type == bfd_link_hash_defweak)
12808 {
12809 sym_value = hash->elf.root.u.def.value;
12810 if (sym_sec->output_section != NULL)
12811 ok_dest = TRUE;
12812 }
12813 else if (hash->elf.root.type == bfd_link_hash_undefweak
12814 || hash->elf.root.type == bfd_link_hash_undefined)
721956f4 12815 {
99877b66 12816 /* Recognise an old ABI func code entry sym, and
7fe2b9a6
AM
12817 use the func descriptor sym instead if it is
12818 defined. */
ceb1f1ef 12819 if (hash->elf.root.root.string[0] == '.'
8c5b4e52 12820 && hash->oh != NULL)
8387904d 12821 {
8c5b4e52 12822 fdh = ppc_follow_link (hash->oh);
8387904d
AM
12823 if (fdh->elf.root.type == bfd_link_hash_defined
12824 || fdh->elf.root.type == bfd_link_hash_defweak)
12825 {
12826 sym_sec = fdh->elf.root.u.def.section;
12827 sym_value = fdh->elf.root.u.def.value;
12828 if (sym_sec->output_section != NULL)
12829 ok_dest = TRUE;
12830 }
99877b66
AM
12831 else
12832 fdh = NULL;
8387904d 12833 }
7fe2b9a6
AM
12834 }
12835 else
12836 {
12837 bfd_set_error (bfd_error_bad_value);
12838 goto error_ret_free_internal;
721956f4
AM
12839 }
12840
8843416a 12841 destination = 0;
6911b7dc 12842 local_off = 0;
8843416a
AM
12843 if (ok_dest)
12844 {
12845 sym_value += irela->r_addend;
12846 destination = (sym_value
12847 + sym_sec->output_offset
12848 + sym_sec->output_section->vma);
6911b7dc
AM
12849 local_off = PPC64_LOCAL_ENTRY_OFFSET (hash
12850 ? hash->elf.other
12851 : sym->st_other);
8843416a
AM
12852 }
12853
8387904d 12854 code_sec = sym_sec;
e054468f 12855 code_value = sym_value;
74f0fb50
AM
12856 opd = get_opd_info (sym_sec);
12857 if (opd != NULL)
8387904d
AM
12858 {
12859 bfd_vma dest;
12860
74f0fb50 12861 if (hash == NULL && opd->adjust != NULL)
8387904d 12862 {
51aecdc5 12863 long adjust = opd->adjust[OPD_NDX (sym_value)];
8387904d
AM
12864 if (adjust == -1)
12865 continue;
e054468f 12866 code_value += adjust;
8387904d
AM
12867 sym_value += adjust;
12868 }
12869 dest = opd_entry_value (sym_sec, sym_value,
aef36ac1 12870 &code_sec, &code_value, FALSE);
8387904d
AM
12871 if (dest != (bfd_vma) -1)
12872 {
12873 destination = dest;
12874 if (fdh != NULL)
12875 {
12876 /* Fixup old ABI sym to point at code
12877 entry. */
99877b66 12878 hash->elf.root.type = bfd_link_hash_defweak;
8387904d 12879 hash->elf.root.u.def.section = code_sec;
e054468f 12880 hash->elf.root.u.def.value = code_value;
8387904d
AM
12881 }
12882 }
12883 }
12884
721956f4 12885 /* Determine what (if any) linker stub is needed. */
e054468f 12886 plt_ent = NULL;
721956f4 12887 stub_type = ppc_type_of_stub (section, irela, &hash,
6911b7dc
AM
12888 &plt_ent, destination,
12889 local_off);
ad8e1ba5 12890
05d0e962
AM
12891 if (r_type == R_PPC64_REL24_NOTOC)
12892 {
12893 if (stub_type == ppc_stub_plt_call)
12894 stub_type = ppc_stub_plt_call_notoc;
12895 else if (stub_type == ppc_stub_long_branch
12896 || (code_sec != NULL
12897 && code_sec->output_section != NULL
12898 && (((hash ? hash->elf.other : sym->st_other)
12899 & STO_PPC64_LOCAL_MASK)
12900 != 1 << STO_PPC64_LOCAL_BIT)))
12901 stub_type = ppc_stub_long_branch_notoc;
12902 }
12903 else if (stub_type != ppc_stub_plt_call)
ad8e1ba5
AM
12904 {
12905 /* Check whether we need a TOC adjusting stub.
12906 Since the linker pastes together pieces from
12907 different object files when creating the
12908 _init and _fini functions, it may be that a
12909 call to what looks like a local sym is in
12910 fact a call needing a TOC adjustment. */
33cb30a1
AM
12911 if ((code_sec != NULL
12912 && code_sec->output_section != NULL
12913 && (htab->sec_info[code_sec->id].toc_off
12914 != htab->sec_info[section->id].toc_off)
12915 && (code_sec->has_toc_reloc
12916 || code_sec->makes_toc_func_call))
12917 || (((hash ? hash->elf.other : sym->st_other)
12918 & STO_PPC64_LOCAL_MASK)
12919 == 1 << STO_PPC64_LOCAL_BIT))
ad8e1ba5
AM
12920 stub_type = ppc_stub_long_branch_r2off;
12921 }
12922
721956f4
AM
12923 if (stub_type == ppc_stub_none)
12924 continue;
12925
411e1bfb
AM
12926 /* __tls_get_addr calls might be eliminated. */
12927 if (stub_type != ppc_stub_plt_call
05d0e962 12928 && stub_type != ppc_stub_plt_call_notoc
411e1bfb 12929 && hash != NULL
8387904d
AM
12930 && (hash == htab->tls_get_addr
12931 || hash == htab->tls_get_addr_fd)
411e1bfb
AM
12932 && section->has_tls_reloc
12933 && irela != internal_relocs)
12934 {
12935 /* Get tls info. */
f961d9dd 12936 unsigned char *tls_mask;
411e1bfb 12937
3a71aa26 12938 if (!get_tls_mask (&tls_mask, NULL, NULL, &local_syms,
411e1bfb
AM
12939 irela - 1, input_bfd))
12940 goto error_ret_free_internal;
37da22e5 12941 if ((*tls_mask & TLS_TLS) != 0)
411e1bfb
AM
12942 continue;
12943 }
12944
f378ab09 12945 if (stub_type == ppc_stub_plt_call)
794e51c0 12946 {
6e1816be
AM
12947 if (!htab->opd_abi
12948 && htab->params->plt_localentry0 != 0
12949 && is_elfv2_localentry0 (&hash->elf))
12950 htab->has_plt_localentry0 = 1;
12951 else if (irela + 1 < irelaend
12952 && irela[1].r_offset == irela->r_offset + 4
12953 && (ELF64_R_TYPE (irela[1].r_info)
12954 == R_PPC64_TOCSAVE))
f378ab09
AM
12955 {
12956 if (!tocsave_find (htab, INSERT,
12957 &local_syms, irela + 1, input_bfd))
12958 goto error_ret_free_internal;
12959 }
f378ab09
AM
12960 else
12961 stub_type = ppc_stub_plt_call_r2save;
794e51c0 12962 }
3b421ab3 12963
721956f4 12964 /* Support for grouping stub sections. */
6f20ed8a 12965 id_sec = htab->sec_info[section->id].u.group->link_sec;
721956f4
AM
12966
12967 /* Get the name of this stub. */
12968 stub_name = ppc_stub_name (id_sec, sym_sec, hash, irela);
12969 if (!stub_name)
12970 goto error_ret_free_internal;
12971
12972 stub_entry = ppc_stub_hash_lookup (&htab->stub_hash_table,
b34976b6 12973 stub_name, FALSE, FALSE);
721956f4
AM
12974 if (stub_entry != NULL)
12975 {
05d0e962
AM
12976 enum ppc_stub_type old_type;
12977 /* A stub has already been created, but it may
12978 not be the required type. We shouldn't be
12979 transitioning from plt_call to long_branch
12980 stubs or vice versa, but we might be
12981 upgrading from plt_call to plt_call_r2save or
12982 from long_branch to long_branch_r2off. */
721956f4 12983 free (stub_name);
05d0e962
AM
12984 old_type = stub_entry->stub_type;
12985 switch (old_type)
12986 {
12987 default:
12988 abort ();
12989
12990 case ppc_stub_save_res:
12991 continue;
12992
12993 case ppc_stub_plt_call:
12994 case ppc_stub_plt_call_r2save:
12995 case ppc_stub_plt_call_notoc:
12996 case ppc_stub_plt_call_both:
12997 if (stub_type == ppc_stub_plt_call)
12998 continue;
12999 else if (stub_type == ppc_stub_plt_call_r2save)
13000 {
13001 if (old_type == ppc_stub_plt_call_notoc)
13002 stub_type = ppc_stub_plt_call_both;
13003 }
13004 else if (stub_type == ppc_stub_plt_call_notoc)
13005 {
13006 if (old_type == ppc_stub_plt_call_r2save)
13007 stub_type = ppc_stub_plt_call_both;
13008 }
13009 else
13010 abort ();
13011 break;
13012
13013 case ppc_stub_plt_branch:
13014 case ppc_stub_plt_branch_r2off:
13015 case ppc_stub_plt_branch_notoc:
13016 case ppc_stub_plt_branch_both:
13017 old_type += (ppc_stub_long_branch
13018 - ppc_stub_plt_branch);
13019 /* Fall through. */
13020 case ppc_stub_long_branch:
13021 case ppc_stub_long_branch_r2off:
13022 case ppc_stub_long_branch_notoc:
13023 case ppc_stub_long_branch_both:
13024 if (stub_type == ppc_stub_long_branch)
13025 continue;
13026 else if (stub_type == ppc_stub_long_branch_r2off)
13027 {
13028 if (old_type == ppc_stub_long_branch_notoc)
13029 stub_type = ppc_stub_long_branch_both;
13030 }
13031 else if (stub_type == ppc_stub_long_branch_notoc)
13032 {
13033 if (old_type == ppc_stub_long_branch_r2off)
13034 stub_type = ppc_stub_long_branch_both;
13035 }
13036 else
13037 abort ();
13038 break;
13039 }
13040 if (old_type < stub_type)
794e51c0 13041 stub_entry->stub_type = stub_type;
721956f4
AM
13042 continue;
13043 }
13044
25f53a85 13045 stub_entry = ppc_add_stub (stub_name, section, info);
721956f4
AM
13046 if (stub_entry == NULL)
13047 {
13048 free (stub_name);
6cdc0ccc
AM
13049 error_ret_free_internal:
13050 if (elf_section_data (section)->relocs == NULL)
13051 free (internal_relocs);
13052 error_ret_free_local:
13053 if (local_syms != NULL
13054 && (symtab_hdr->contents
13055 != (unsigned char *) local_syms))
13056 free (local_syms);
b34976b6 13057 return FALSE;
721956f4
AM
13058 }
13059
ad8e1ba5 13060 stub_entry->stub_type = stub_type;
05d0e962
AM
13061 if (stub_type >= ppc_stub_plt_call
13062 && stub_type <= ppc_stub_plt_call_both)
e054468f 13063 {
05d0e962
AM
13064 stub_entry->target_value = sym_value;
13065 stub_entry->target_section = sym_sec;
e054468f
AM
13066 }
13067 else
13068 {
05d0e962
AM
13069 stub_entry->target_value = code_value;
13070 stub_entry->target_section = code_sec;
e054468f 13071 }
721956f4 13072 stub_entry->h = hash;
e054468f 13073 stub_entry->plt_ent = plt_ent;
2d7ad24e
AM
13074 stub_entry->symtype
13075 = hash ? hash->elf.type : ELF_ST_TYPE (sym->st_info);
6911b7dc 13076 stub_entry->other = hash ? hash->elf.other : sym->st_other;
ee75fd95 13077
3d58e1fc
AM
13078 if (hash != NULL
13079 && (hash->elf.root.type == bfd_link_hash_defined
13080 || hash->elf.root.type == bfd_link_hash_defweak))
ee75fd95 13081 htab->stub_globals += 1;
721956f4
AM
13082 }
13083
13084 /* We're done with the internal relocs, free them. */
6cdc0ccc 13085 if (elf_section_data (section)->relocs != internal_relocs)
1e2f5b6e 13086 free (internal_relocs);
721956f4 13087 }
6cdc0ccc
AM
13088
13089 if (local_syms != NULL
13090 && symtab_hdr->contents != (unsigned char *) local_syms)
13091 {
13092 if (!info->keep_memory)
13093 free (local_syms);
13094 else
13095 symtab_hdr->contents = (unsigned char *) local_syms;
13096 }
721956f4
AM
13097 }
13098
5c3dead3 13099 /* We may have added some stubs. Find out the new size of the
721956f4 13100 stub sections. */
d4aaa2a0 13101 for (group = htab->group; group != NULL; group = group->next)
df136d64
AM
13102 {
13103 group->lr_restore = 0;
13104 group->eh_size = 0;
13105 if (group->stub_sec != NULL)
13106 {
13107 asection *stub_sec = group->stub_sec;
13108
13109 if (htab->stub_iteration <= STUB_SHRINK_ITER
13110 || stub_sec->rawsize < stub_sec->size)
13111 /* Past STUB_SHRINK_ITER, rawsize is the max size seen. */
13112 stub_sec->rawsize = stub_sec->size;
13113 stub_sec->size = 0;
13114 stub_sec->reloc_count = 0;
13115 stub_sec->flags &= ~SEC_RELOC;
13116 }
13117 }
eea6121a 13118
ba21f564
AM
13119 if (htab->stub_iteration <= STUB_SHRINK_ITER
13120 || htab->brlt->rawsize < htab->brlt->size)
13121 htab->brlt->rawsize = htab->brlt->size;
eea6121a 13122 htab->brlt->size = 0;
84f5d08e
AM
13123 htab->brlt->reloc_count = 0;
13124 htab->brlt->flags &= ~SEC_RELOC;
ee75fd95 13125 if (htab->relbrlt != NULL)
eea6121a 13126 htab->relbrlt->size = 0;
721956f4 13127
63bc6f6c 13128 bfd_hash_traverse (&htab->stub_hash_table, ppc_size_one_stub, info);
721956f4 13129
a4b6fadd
AM
13130 for (group = htab->group; group != NULL; group = group->next)
13131 if (group->needs_save_res)
13132 group->stub_sec->size += htab->sfpr->size;
13133
176a0d42
AM
13134 if (info->emitrelocations
13135 && htab->glink != NULL && htab->glink->size != 0)
13136 {
13137 htab->glink->reloc_count = 1;
13138 htab->glink->flags |= SEC_RELOC;
13139 }
13140
58d180e8
AM
13141 if (htab->glink_eh_frame != NULL
13142 && !bfd_is_abs_section (htab->glink_eh_frame->output_section)
2d0d44d5 13143 && htab->glink_eh_frame->output_section->size > 8)
58d180e8 13144 {
2e0ce1c8 13145 size_t size = 0, align = 4;
58d180e8 13146
d4aaa2a0 13147 for (group = htab->group; group != NULL; group = group->next)
df136d64
AM
13148 if (group->eh_size != 0)
13149 size += (group->eh_size + 17 + align - 1) & -align;
58d180e8 13150 if (htab->glink != NULL && htab->glink->size != 0)
2e0ce1c8 13151 size += (24 + align - 1) & -align;
58d180e8 13152 if (size != 0)
2e0ce1c8
AM
13153 size += (sizeof (glink_eh_frame_cie) + align - 1) & -align;
13154 align = 1ul << htab->glink_eh_frame->output_section->alignment_power;
13155 size = (size + align - 1) & -align;
58d180e8
AM
13156 htab->glink_eh_frame->rawsize = htab->glink_eh_frame->size;
13157 htab->glink_eh_frame->size = size;
13158 }
13159
e7d1c40c 13160 if (htab->params->plt_stub_align != 0)
d4aaa2a0
AM
13161 for (group = htab->group; group != NULL; group = group->next)
13162 if (group->stub_sec != NULL)
691d2e9a
AM
13163 {
13164 int align = abs (htab->params->plt_stub_align);
13165 group->stub_sec->size
13166 = (group->stub_sec->size + (1 << align) - 1) & -(1 << align);
13167 }
d4aaa2a0
AM
13168
13169 for (group = htab->group; group != NULL; group = group->next)
13170 if (group->stub_sec != NULL
13171 && group->stub_sec->rawsize != group->stub_sec->size
c9301e31 13172 && (htab->stub_iteration <= STUB_SHRINK_ITER
d4aaa2a0 13173 || group->stub_sec->rawsize < group->stub_sec->size))
5c3dead3
AM
13174 break;
13175
d4aaa2a0 13176 if (group == NULL
ba21f564
AM
13177 && (htab->brlt->rawsize == htab->brlt->size
13178 || (htab->stub_iteration > STUB_SHRINK_ITER
13179 && htab->brlt->rawsize > htab->brlt->size))
58d180e8
AM
13180 && (htab->glink_eh_frame == NULL
13181 || htab->glink_eh_frame->rawsize == htab->glink_eh_frame->size))
5c3dead3
AM
13182 break;
13183
721956f4 13184 /* Ask the linker to do its stuff. */
e7d1c40c 13185 (*htab->params->layout_sections_again) ();
721956f4
AM
13186 }
13187
da44f4e5
AM
13188 if (htab->glink_eh_frame != NULL
13189 && htab->glink_eh_frame->size != 0)
13190 {
13191 bfd_vma val;
13192 bfd_byte *p, *last_fde;
13193 size_t last_fde_len, size, align, pad;
d4aaa2a0 13194 struct map_stub *group;
da44f4e5 13195
df136d64
AM
13196 /* It is necessary to at least have a rough outline of the
13197 linker generated CIEs and FDEs written before
13198 bfd_elf_discard_info is run, in order for these FDEs to be
13199 indexed in .eh_frame_hdr. */
da44f4e5
AM
13200 p = bfd_zalloc (htab->glink_eh_frame->owner, htab->glink_eh_frame->size);
13201 if (p == NULL)
13202 return FALSE;
13203 htab->glink_eh_frame->contents = p;
13204 last_fde = p;
2e0ce1c8 13205 align = 4;
da44f4e5
AM
13206
13207 memcpy (p, glink_eh_frame_cie, sizeof (glink_eh_frame_cie));
13208 /* CIE length (rewrite in case little-endian). */
2e0ce1c8 13209 last_fde_len = ((sizeof (glink_eh_frame_cie) + align - 1) & -align) - 4;
da44f4e5 13210 bfd_put_32 (htab->elf.dynobj, last_fde_len, p);
2e0ce1c8 13211 p += last_fde_len + 4;
da44f4e5 13212
d4aaa2a0 13213 for (group = htab->group; group != NULL; group = group->next)
df136d64 13214 if (group->eh_size != 0)
da44f4e5 13215 {
df136d64 13216 group->eh_base = p - htab->glink_eh_frame->contents;
da44f4e5 13217 last_fde = p;
df136d64 13218 last_fde_len = ((group->eh_size + 17 + align - 1) & -align) - 4;
da44f4e5 13219 /* FDE length. */
2e0ce1c8 13220 bfd_put_32 (htab->elf.dynobj, last_fde_len, p);
da44f4e5
AM
13221 p += 4;
13222 /* CIE pointer. */
13223 val = p - htab->glink_eh_frame->contents;
13224 bfd_put_32 (htab->elf.dynobj, val, p);
13225 p += 4;
13226 /* Offset to stub section, written later. */
13227 p += 4;
13228 /* stub section size. */
d4aaa2a0 13229 bfd_put_32 (htab->elf.dynobj, group->stub_sec->size, p);
da44f4e5
AM
13230 p += 4;
13231 /* Augmentation. */
13232 p += 1;
df136d64
AM
13233 /* Make sure we don't have all nops. This is enough for
13234 elf-eh-frame.c to detect the last non-nop opcode. */
13235 p[group->eh_size - 1] = DW_CFA_advance_loc + 1;
d4aaa2a0 13236 p = last_fde + last_fde_len + 4;
da44f4e5
AM
13237 }
13238 if (htab->glink != NULL && htab->glink->size != 0)
13239 {
13240 last_fde = p;
2e0ce1c8 13241 last_fde_len = ((24 + align - 1) & -align) - 4;
da44f4e5 13242 /* FDE length. */
2e0ce1c8 13243 bfd_put_32 (htab->elf.dynobj, last_fde_len, p);
da44f4e5
AM
13244 p += 4;
13245 /* CIE pointer. */
13246 val = p - htab->glink_eh_frame->contents;
13247 bfd_put_32 (htab->elf.dynobj, val, p);
13248 p += 4;
13249 /* Offset to .glink, written later. */
13250 p += 4;
13251 /* .glink size. */
13252 bfd_put_32 (htab->elf.dynobj, htab->glink->size - 8, p);
13253 p += 4;
13254 /* Augmentation. */
13255 p += 1;
13256
13257 *p++ = DW_CFA_advance_loc + 1;
13258 *p++ = DW_CFA_register;
13259 *p++ = 65;
9f08fa5c 13260 *p++ = htab->opd_abi ? 12 : 0;
15a3a14f 13261 *p++ = DW_CFA_advance_loc + (htab->opd_abi ? 5 : 7);
da44f4e5
AM
13262 *p++ = DW_CFA_restore_extended;
13263 *p++ = 65;
2e0ce1c8 13264 p += ((24 + align - 1) & -align) - 24;
da44f4e5
AM
13265 }
13266 /* Subsume any padding into the last FDE if user .eh_frame
13267 sections are aligned more than glink_eh_frame. Otherwise any
13268 zero padding will be seen as a terminator. */
2e0ce1c8 13269 align = 1ul << htab->glink_eh_frame->output_section->alignment_power;
da44f4e5 13270 size = p - htab->glink_eh_frame->contents;
2e0ce1c8 13271 pad = ((size + align - 1) & -align) - size;
da44f4e5
AM
13272 htab->glink_eh_frame->size = size + pad;
13273 bfd_put_32 (htab->elf.dynobj, last_fde_len + pad, last_fde);
13274 }
13275
d969d15f
AM
13276 maybe_strip_output (info, htab->brlt);
13277 if (htab->glink_eh_frame != NULL)
13278 maybe_strip_output (info, htab->glink_eh_frame);
721956f4 13279
b34976b6 13280 return TRUE;
721956f4
AM
13281}
13282
13283/* Called after we have determined section placement. If sections
805fc799 13284 move, we'll be called again. Provide a value for TOCstart. */
721956f4 13285
805fc799 13286bfd_vma
1c865ab2 13287ppc64_elf_set_toc (struct bfd_link_info *info, bfd *obfd)
721956f4 13288{
805fc799 13289 asection *s;
a27e685f 13290 bfd_vma TOCstart, adjust;
721956f4 13291
43417696
AM
13292 if (info != NULL)
13293 {
13294 struct elf_link_hash_entry *h;
13295 struct elf_link_hash_table *htab = elf_hash_table (info);
13296
13297 if (is_elf_hash_table (htab)
13298 && htab->hgot != NULL)
13299 h = htab->hgot;
13300 else
13301 {
13302 h = elf_link_hash_lookup (htab, ".TOC.", FALSE, FALSE, TRUE);
13303 if (is_elf_hash_table (htab))
13304 htab->hgot = h;
13305 }
13306 if (h != NULL
13307 && h->root.type == bfd_link_hash_defined
13308 && !h->root.linker_def
13309 && (!is_elf_hash_table (htab)
13310 || h->def_regular))
13311 {
13312 TOCstart = (h->root.u.def.value - TOC_BASE_OFF
13313 + h->root.u.def.section->output_offset
13314 + h->root.u.def.section->output_section->vma);
13315 _bfd_set_gp_value (obfd, TOCstart);
13316 return TOCstart;
13317 }
13318 }
13319
805fc799
AM
13320 /* The TOC consists of sections .got, .toc, .tocbss, .plt in that
13321 order. The TOC starts where the first of these sections starts. */
13322 s = bfd_get_section_by_name (obfd, ".got");
e054468f 13323 if (s == NULL || (s->flags & SEC_EXCLUDE) != 0)
805fc799 13324 s = bfd_get_section_by_name (obfd, ".toc");
e054468f 13325 if (s == NULL || (s->flags & SEC_EXCLUDE) != 0)
805fc799 13326 s = bfd_get_section_by_name (obfd, ".tocbss");
e054468f 13327 if (s == NULL || (s->flags & SEC_EXCLUDE) != 0)
805fc799 13328 s = bfd_get_section_by_name (obfd, ".plt");
e054468f 13329 if (s == NULL || (s->flags & SEC_EXCLUDE) != 0)
805fc799
AM
13330 {
13331 /* This may happen for
13332 o references to TOC base (SYM@toc / TOC[tc0]) without a
13333 .toc directive
13334 o bad linker script
13335 o --gc-sections and empty TOC sections
13336
13337 FIXME: Warn user? */
13338
13339 /* Look for a likely section. We probably won't even be
13340 using TOCstart. */
13341 for (s = obfd->sections; s != NULL; s = s->next)
e054468f
AM
13342 if ((s->flags & (SEC_ALLOC | SEC_SMALL_DATA | SEC_READONLY
13343 | SEC_EXCLUDE))
805fc799
AM
13344 == (SEC_ALLOC | SEC_SMALL_DATA))
13345 break;
721956f4 13346 if (s == NULL)
805fc799 13347 for (s = obfd->sections; s != NULL; s = s->next)
e054468f 13348 if ((s->flags & (SEC_ALLOC | SEC_SMALL_DATA | SEC_EXCLUDE))
805fc799
AM
13349 == (SEC_ALLOC | SEC_SMALL_DATA))
13350 break;
721956f4 13351 if (s == NULL)
805fc799 13352 for (s = obfd->sections; s != NULL; s = s->next)
e054468f
AM
13353 if ((s->flags & (SEC_ALLOC | SEC_READONLY | SEC_EXCLUDE))
13354 == SEC_ALLOC)
805fc799 13355 break;
721956f4 13356 if (s == NULL)
805fc799 13357 for (s = obfd->sections; s != NULL; s = s->next)
e054468f 13358 if ((s->flags & (SEC_ALLOC | SEC_EXCLUDE)) == SEC_ALLOC)
805fc799
AM
13359 break;
13360 }
721956f4 13361
805fc799
AM
13362 TOCstart = 0;
13363 if (s != NULL)
13364 TOCstart = s->output_section->vma + s->output_offset;
721956f4 13365
a27e685f
AM
13366 /* Force alignment. */
13367 adjust = TOCstart & (TOC_BASE_ALIGN - 1);
13368 TOCstart -= adjust;
1c865ab2
AM
13369 _bfd_set_gp_value (obfd, TOCstart);
13370
810d4e75 13371 if (info != NULL && s != NULL)
1c865ab2
AM
13372 {
13373 struct ppc_link_hash_table *htab = ppc_hash_table (info);
13374
810d4e75
AM
13375 if (htab != NULL)
13376 {
13377 if (htab->elf.hgot != NULL)
13378 {
a27e685f 13379 htab->elf.hgot->root.u.def.value = TOC_BASE_OFF - adjust;
810d4e75
AM
13380 htab->elf.hgot->root.u.def.section = s;
13381 }
13382 }
13383 else
1c865ab2 13384 {
810d4e75
AM
13385 struct bfd_link_hash_entry *bh = NULL;
13386 _bfd_generic_link_add_one_symbol (info, obfd, ".TOC.", BSF_GLOBAL,
a27e685f
AM
13387 s, TOC_BASE_OFF - adjust,
13388 NULL, FALSE, FALSE, &bh);
1c865ab2
AM
13389 }
13390 }
805fc799 13391 return TOCstart;
721956f4
AM
13392}
13393
a345bc8d 13394/* Called via elf_link_hash_traverse from ppc64_elf_build_stubs to
49c09209 13395 write out any global entry stubs, and PLT relocations. */
a345bc8d
AM
13396
13397static bfd_boolean
49c09209 13398build_global_entry_stubs_and_plt (struct elf_link_hash_entry *h, void *inf)
a345bc8d
AM
13399{
13400 struct bfd_link_info *info;
13401 struct ppc_link_hash_table *htab;
49c09209 13402 struct plt_entry *ent;
a345bc8d
AM
13403 asection *s;
13404
13405 if (h->root.type == bfd_link_hash_indirect)
13406 return TRUE;
13407
49c09209
AM
13408 info = inf;
13409 htab = ppc_hash_table (info);
13410 if (htab == NULL)
13411 return FALSE;
13412
13413 for (ent = h->plt.plist; ent != NULL; ent = ent->next)
13414 if (ent->plt.offset != (bfd_vma) -1)
13415 {
13416 /* This symbol has an entry in the procedure linkage
13417 table. Set it up. */
13418 Elf_Internal_Rela rela;
2d7ad24e 13419 asection *plt, *relplt;
49c09209
AM
13420 bfd_byte *loc;
13421
13422 if (!htab->elf.dynamic_sections_created
13423 || h->dynindx == -1)
13424 {
13425 if (!(h->def_regular
13426 && (h->root.type == bfd_link_hash_defined
13427 || h->root.type == bfd_link_hash_defweak)))
13428 continue;
2d7ad24e
AM
13429 if (h->type == STT_GNU_IFUNC)
13430 {
13431 plt = htab->elf.iplt;
13432 relplt = htab->elf.irelplt;
13433 htab->local_ifunc_resolver = 1;
13434 if (htab->opd_abi)
13435 rela.r_info = ELF64_R_INFO (0, R_PPC64_JMP_IREL);
13436 else
13437 rela.r_info = ELF64_R_INFO (0, R_PPC64_IRELATIVE);
13438 }
49c09209 13439 else
2d7ad24e
AM
13440 {
13441 plt = htab->pltlocal;
13442 if (bfd_link_pic (info))
13443 {
13444 relplt = htab->relpltlocal;
13445 if (htab->opd_abi)
13446 rela.r_info = ELF64_R_INFO (0, R_PPC64_JMP_SLOT);
13447 else
13448 rela.r_info = ELF64_R_INFO (0, R_PPC64_RELATIVE);
13449 }
13450 else
13451 relplt = NULL;
13452 }
49c09209
AM
13453 rela.r_addend = (h->root.u.def.value
13454 + h->root.u.def.section->output_offset
13455 + h->root.u.def.section->output_section->vma
13456 + ent->addend);
2d7ad24e
AM
13457
13458 if (relplt == NULL)
13459 {
13460 loc = plt->contents + ent->plt.offset;
13461 bfd_put_64 (info->output_bfd, rela.r_addend, loc);
13462 if (htab->opd_abi)
13463 {
13464 bfd_vma toc = elf_gp (info->output_bfd);
13465 toc += htab->sec_info[h->root.u.def.section->id].toc_off;
13466 bfd_put_64 (info->output_bfd, toc, loc + 8);
13467 }
13468 }
13469 else
13470 {
13471 rela.r_offset = (plt->output_section->vma
13472 + plt->output_offset
13473 + ent->plt.offset);
13474 loc = relplt->contents + (relplt->reloc_count++
13475 * sizeof (Elf64_External_Rela));
13476 bfd_elf64_swap_reloca_out (info->output_bfd, &rela, loc);
13477 }
49c09209
AM
13478 }
13479 else
13480 {
13481 rela.r_offset = (htab->elf.splt->output_section->vma
13482 + htab->elf.splt->output_offset
13483 + ent->plt.offset);
13484 rela.r_info = ELF64_R_INFO (h->dynindx, R_PPC64_JMP_SLOT);
13485 rela.r_addend = ent->addend;
13486 loc = (htab->elf.srelplt->contents
13487 + ((ent->plt.offset - PLT_INITIAL_ENTRY_SIZE (htab))
13488 / PLT_ENTRY_SIZE (htab) * sizeof (Elf64_External_Rela)));
13489 if (h->type == STT_GNU_IFUNC && is_static_defined (h))
13490 htab->maybe_local_ifunc_resolver = 1;
2d7ad24e 13491 bfd_elf64_swap_reloca_out (info->output_bfd, &rela, loc);
49c09209 13492 }
49c09209
AM
13493 }
13494
a345bc8d
AM
13495 if (!h->pointer_equality_needed)
13496 return TRUE;
13497
13498 if (h->def_regular)
13499 return TRUE;
13500
9e390558 13501 s = htab->global_entry;
49c09209
AM
13502 if (s == NULL || s->size == 0)
13503 return TRUE;
13504
13505 for (ent = h->plt.plist; ent != NULL; ent = ent->next)
13506 if (ent->plt.offset != (bfd_vma) -1
13507 && ent->addend == 0)
a345bc8d
AM
13508 {
13509 bfd_byte *p;
13510 asection *plt;
13511 bfd_vma off;
13512
a345bc8d 13513 p = s->contents + h->root.u.def.value;
33e44f2e 13514 plt = htab->elf.splt;
a345bc8d
AM
13515 if (!htab->elf.dynamic_sections_created
13516 || h->dynindx == -1)
2d7ad24e
AM
13517 {
13518 if (h->type == STT_GNU_IFUNC)
13519 plt = htab->elf.iplt;
13520 else
13521 plt = htab->pltlocal;
13522 }
49c09209 13523 off = ent->plt.offset + plt->output_offset + plt->output_section->vma;
a345bc8d
AM
13524 off -= h->root.u.def.value + s->output_offset + s->output_section->vma;
13525
13526 if (off + 0x80008000 > 0xffffffff || (off & 3) != 0)
13527 {
13528 info->callbacks->einfo
c1c8c1ef 13529 (_("%P: linkage table error against `%pT'\n"),
a345bc8d
AM
13530 h->root.root.string);
13531 bfd_set_error (bfd_error_bad_value);
13532 htab->stub_error = TRUE;
13533 }
13534
7341d5e2
AM
13535 htab->stub_count[ppc_stub_global_entry - 1] += 1;
13536 if (htab->params->emit_stub_syms)
13537 {
13538 size_t len = strlen (h->root.root.string);
13539 char *name = bfd_malloc (sizeof "12345678.global_entry." + len);
13540
13541 if (name == NULL)
13542 return FALSE;
13543
13544 sprintf (name, "%08x.global_entry.%s", s->id, h->root.root.string);
13545 h = elf_link_hash_lookup (&htab->elf, name, TRUE, FALSE, FALSE);
13546 if (h == NULL)
13547 return FALSE;
13548 if (h->root.type == bfd_link_hash_new)
13549 {
13550 h->root.type = bfd_link_hash_defined;
13551 h->root.u.def.section = s;
13552 h->root.u.def.value = p - s->contents;
13553 h->ref_regular = 1;
13554 h->def_regular = 1;
13555 h->ref_regular_nonweak = 1;
13556 h->forced_local = 1;
13557 h->non_elf = 0;
2ec55de3 13558 h->root.linker_def = 1;
7341d5e2
AM
13559 }
13560 }
13561
a345bc8d
AM
13562 if (PPC_HA (off) != 0)
13563 {
13564 bfd_put_32 (s->owner, ADDIS_R12_R12 | PPC_HA (off), p);
13565 p += 4;
13566 }
13567 bfd_put_32 (s->owner, LD_R12_0R12 | PPC_LO (off), p);
13568 p += 4;
13569 bfd_put_32 (s->owner, MTCTR_R12, p);
13570 p += 4;
407aa07c 13571 bfd_put_32 (s->owner, BCTR, p);
a345bc8d
AM
13572 break;
13573 }
13574 return TRUE;
13575}
13576
49c09209
AM
13577/* Write PLT relocs for locals. */
13578
13579static bfd_boolean
13580write_plt_relocs_for_local_syms (struct bfd_link_info *info)
13581{
13582 struct ppc_link_hash_table *htab = ppc_hash_table (info);
13583 bfd *ibfd;
13584
13585 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
13586 {
13587 struct got_entry **lgot_ents, **end_lgot_ents;
13588 struct plt_entry **local_plt, **lplt, **end_local_plt;
13589 Elf_Internal_Shdr *symtab_hdr;
13590 bfd_size_type locsymcount;
13591 Elf_Internal_Sym *local_syms = NULL;
13592 struct plt_entry *ent;
13593
13594 if (!is_ppc64_elf (ibfd))
13595 continue;
13596
13597 lgot_ents = elf_local_got_ents (ibfd);
13598 if (!lgot_ents)
13599 continue;
13600
13601 symtab_hdr = &elf_symtab_hdr (ibfd);
13602 locsymcount = symtab_hdr->sh_info;
13603 end_lgot_ents = lgot_ents + locsymcount;
13604 local_plt = (struct plt_entry **) end_lgot_ents;
13605 end_local_plt = local_plt + locsymcount;
13606 for (lplt = local_plt; lplt < end_local_plt; ++lplt)
13607 for (ent = *lplt; ent != NULL; ent = ent->next)
13608 if (ent->plt.offset != (bfd_vma) -1)
13609 {
13610 Elf_Internal_Sym *sym;
13611 asection *sym_sec;
13612 asection *plt, *relplt;
13613 bfd_byte *loc;
13614 bfd_vma val;
49c09209
AM
13615
13616 if (!get_sym_h (NULL, &sym, &sym_sec, NULL, &local_syms,
13617 lplt - local_plt, ibfd))
13618 {
13619 if (local_syms != NULL
13620 && symtab_hdr->contents != (unsigned char *) local_syms)
13621 free (local_syms);
13622 return FALSE;
13623 }
13624
13625 val = sym->st_value + ent->addend;
ba85c15d
AM
13626 if (ELF_ST_TYPE (sym->st_info) != STT_GNU_IFUNC)
13627 val += PPC64_LOCAL_ENTRY_OFFSET (sym->st_other);
49c09209
AM
13628 if (sym_sec != NULL && sym_sec->output_section != NULL)
13629 val += sym_sec->output_offset + sym_sec->output_section->vma;
13630
2d7ad24e
AM
13631 if (ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC)
13632 {
13633 htab->local_ifunc_resolver = 1;
13634 plt = htab->elf.iplt;
13635 relplt = htab->elf.irelplt;
13636 }
13637 else
13638 {
13639 plt = htab->pltlocal;
13640 relplt = bfd_link_pic (info) ? htab->relpltlocal : NULL;
13641 }
49c09209 13642
2d7ad24e
AM
13643 if (relplt == NULL)
13644 {
13645 loc = plt->contents + ent->plt.offset;
13646 bfd_put_64 (info->output_bfd, val, loc);
13647 if (htab->opd_abi)
13648 {
13649 bfd_vma toc = elf_gp (ibfd);
13650 bfd_put_64 (info->output_bfd, toc, loc + 8);
13651 }
13652 }
49c09209 13653 else
2d7ad24e
AM
13654 {
13655 Elf_Internal_Rela rela;
13656 rela.r_offset = (ent->plt.offset
13657 + plt->output_offset
13658 + plt->output_section->vma);
13659 if (ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC)
13660 {
13661 if (htab->opd_abi)
13662 rela.r_info = ELF64_R_INFO (0, R_PPC64_JMP_IREL);
13663 else
13664 rela.r_info = ELF64_R_INFO (0, R_PPC64_IRELATIVE);
13665 }
13666 else
13667 {
13668 if (htab->opd_abi)
13669 rela.r_info = ELF64_R_INFO (0, R_PPC64_JMP_SLOT);
13670 else
13671 rela.r_info = ELF64_R_INFO (0, R_PPC64_RELATIVE);
13672 }
13673 rela.r_addend = val;
13674 loc = relplt->contents + (relplt->reloc_count++
13675 * sizeof (Elf64_External_Rela));
13676 bfd_elf64_swap_reloca_out (info->output_bfd, &rela, loc);
13677 }
49c09209
AM
13678 }
13679
13680 if (local_syms != NULL
13681 && symtab_hdr->contents != (unsigned char *) local_syms)
13682 {
13683 if (!info->keep_memory)
13684 free (local_syms);
13685 else
13686 symtab_hdr->contents = (unsigned char *) local_syms;
13687 }
13688 }
13689 return TRUE;
13690}
13691
721956f4
AM
13692/* Build all the stubs associated with the current output file.
13693 The stubs are kept in a hash table attached to the main linker
13694 hash table. This function is called via gldelf64ppc_finish. */
13695
b34976b6 13696bfd_boolean
e7d1c40c 13697ppc64_elf_build_stubs (struct bfd_link_info *info,
4ce794b7 13698 char **stats)
5d1634d7
AM
13699{
13700 struct ppc_link_hash_table *htab = ppc_hash_table (info);
a4b6fadd 13701 struct map_stub *group;
721956f4 13702 asection *stub_sec;
5d1634d7 13703 bfd_byte *p;
e717da7e 13704 int stub_sec_count = 0;
5d1634d7 13705
4dfe6ac6
NC
13706 if (htab == NULL)
13707 return FALSE;
13708
eea6121a 13709 /* Allocate memory to hold the linker stubs. */
d4aaa2a0 13710 for (group = htab->group; group != NULL; group = group->next)
df136d64
AM
13711 {
13712 group->eh_size = 0;
13713 group->lr_restore = 0;
13714 if ((stub_sec = group->stub_sec) != NULL
13715 && stub_sec->size != 0)
13716 {
13717 stub_sec->contents = bfd_zalloc (htab->params->stub_bfd,
13718 stub_sec->size);
13719 if (stub_sec->contents == NULL)
13720 return FALSE;
13721 stub_sec->size = 0;
13722 }
13723 }
5d1634d7 13724
23eb7e01 13725 if (htab->glink != NULL && htab->glink->size != 0)
5d1634d7 13726 {
9f951329 13727 unsigned int indx;
ad8e1ba5 13728 bfd_vma plt0;
9f951329 13729
721956f4 13730 /* Build the .glink plt call stub. */
e7d1c40c 13731 if (htab->params->emit_stub_syms)
97b639ba
AM
13732 {
13733 struct elf_link_hash_entry *h;
468392fb
AM
13734 h = elf_link_hash_lookup (&htab->elf, "__glink_PLTresolve",
13735 TRUE, FALSE, FALSE);
97b639ba
AM
13736 if (h == NULL)
13737 return FALSE;
13738 if (h->root.type == bfd_link_hash_new)
13739 {
13740 h->root.type = bfd_link_hash_defined;
13741 h->root.u.def.section = htab->glink;
ee4bf8d2 13742 h->root.u.def.value = 8;
f5385ebf
AM
13743 h->ref_regular = 1;
13744 h->def_regular = 1;
13745 h->ref_regular_nonweak = 1;
13746 h->forced_local = 1;
13747 h->non_elf = 0;
2ec55de3 13748 h->root.linker_def = 1;
97b639ba
AM
13749 }
13750 }
33e44f2e
AM
13751 plt0 = (htab->elf.splt->output_section->vma
13752 + htab->elf.splt->output_offset
13753 - 16);
176a0d42
AM
13754 if (info->emitrelocations)
13755 {
13756 Elf_Internal_Rela *r = get_relocs (htab->glink, 1);
13757 if (r == NULL)
13758 return FALSE;
13759 r->r_offset = (htab->glink->output_offset
13760 + htab->glink->output_section->vma);
13761 r->r_info = ELF64_R_INFO (0, R_PPC64_REL64);
13762 r->r_addend = plt0;
13763 }
4ce794b7 13764 p = htab->glink->contents;
176a0d42 13765 plt0 -= htab->glink->output_section->vma + htab->glink->output_offset;
ee4bf8d2
AM
13766 bfd_put_64 (htab->glink->owner, plt0, p);
13767 p += 8;
b9e5796b
AM
13768 if (htab->opd_abi)
13769 {
13770 bfd_put_32 (htab->glink->owner, MFLR_R12, p);
13771 p += 4;
13772 bfd_put_32 (htab->glink->owner, BCL_20_31, p);
13773 p += 4;
13774 bfd_put_32 (htab->glink->owner, MFLR_R11, p);
13775 p += 4;
13776 bfd_put_32 (htab->glink->owner, LD_R2_0R11 | (-16 & 0xfffc), p);
13777 p += 4;
13778 bfd_put_32 (htab->glink->owner, MTLR_R12, p);
13779 p += 4;
13780 bfd_put_32 (htab->glink->owner, ADD_R11_R2_R11, p);
13781 p += 4;
13782 bfd_put_32 (htab->glink->owner, LD_R12_0R11, p);
13783 p += 4;
13784 bfd_put_32 (htab->glink->owner, LD_R2_0R11 | 8, p);
13785 p += 4;
13786 bfd_put_32 (htab->glink->owner, MTCTR_R12, p);
13787 p += 4;
13788 bfd_put_32 (htab->glink->owner, LD_R11_0R11 | 16, p);
13789 p += 4;
13790 }
13791 else
13792 {
13793 bfd_put_32 (htab->glink->owner, MFLR_R0, p);
13794 p += 4;
13795 bfd_put_32 (htab->glink->owner, BCL_20_31, p);
13796 p += 4;
13797 bfd_put_32 (htab->glink->owner, MFLR_R11, p);
13798 p += 4;
f378ab09
AM
13799 bfd_put_32 (htab->glink->owner, STD_R2_0R1 + 24, p);
13800 p += 4;
b9e5796b
AM
13801 bfd_put_32 (htab->glink->owner, LD_R2_0R11 | (-16 & 0xfffc), p);
13802 p += 4;
13803 bfd_put_32 (htab->glink->owner, MTLR_R0, p);
13804 p += 4;
13805 bfd_put_32 (htab->glink->owner, SUB_R12_R12_R11, p);
13806 p += 4;
13807 bfd_put_32 (htab->glink->owner, ADD_R11_R2_R11, p);
13808 p += 4;
13809 bfd_put_32 (htab->glink->owner, ADDI_R0_R12 | (-48 & 0xffff), p);
13810 p += 4;
13811 bfd_put_32 (htab->glink->owner, LD_R12_0R11, p);
13812 p += 4;
13813 bfd_put_32 (htab->glink->owner, SRDI_R0_R0_2, p);
13814 p += 4;
13815 bfd_put_32 (htab->glink->owner, MTCTR_R12, p);
13816 p += 4;
13817 bfd_put_32 (htab->glink->owner, LD_R11_0R11 | 8, p);
13818 p += 4;
13819 }
407aa07c
AM
13820 bfd_put_32 (htab->glink->owner, BCTR, p);
13821 p += 4;
c75bc4f7 13822 BFD_ASSERT (p == htab->glink->contents + GLINK_PLTRESOLVE_SIZE (htab));
ad8e1ba5 13823
9f951329
AM
13824 /* Build the .glink lazy link call stubs. */
13825 indx = 0;
9e390558 13826 while (p < htab->glink->contents + htab->glink->size)
9f951329 13827 {
b9e5796b 13828 if (htab->opd_abi)
9f951329 13829 {
b9e5796b
AM
13830 if (indx < 0x8000)
13831 {
13832 bfd_put_32 (htab->glink->owner, LI_R0_0 | indx, p);
13833 p += 4;
13834 }
13835 else
13836 {
13837 bfd_put_32 (htab->glink->owner, LIS_R0_0 | PPC_HI (indx), p);
13838 p += 4;
13839 bfd_put_32 (htab->glink->owner, ORI_R0_R0_0 | PPC_LO (indx),
13840 p);
13841 p += 4;
13842 }
9f951329 13843 }
4ce794b7 13844 bfd_put_32 (htab->glink->owner,
ee4bf8d2 13845 B_DOT | ((htab->glink->contents - p + 8) & 0x3fffffc), p);
a16d5acb 13846 indx++;
9f951329
AM
13847 p += 4;
13848 }
5d1634d7 13849 }
5d1634d7 13850
49c09209
AM
13851 /* Build .glink global entry stubs, and PLT relocs for globals. */
13852 elf_link_hash_traverse (&htab->elf, build_global_entry_stubs_and_plt, info);
13853
13854 if (!write_plt_relocs_for_local_syms (info))
13855 return FALSE;
9e390558 13856
7341d5e2 13857 if (htab->brlt != NULL && htab->brlt->size != 0)
721956f4 13858 {
4ce794b7 13859 htab->brlt->contents = bfd_zalloc (htab->brlt->owner,
eea6121a 13860 htab->brlt->size);
4ce794b7 13861 if (htab->brlt->contents == NULL)
b34976b6 13862 return FALSE;
721956f4 13863 }
ee75fd95 13864 if (htab->relbrlt != NULL && htab->relbrlt->size != 0)
63bc6f6c
AM
13865 {
13866 htab->relbrlt->contents = bfd_zalloc (htab->relbrlt->owner,
eea6121a 13867 htab->relbrlt->size);
63bc6f6c
AM
13868 if (htab->relbrlt->contents == NULL)
13869 return FALSE;
13870 }
5d1634d7 13871
721956f4
AM
13872 /* Build the stubs as directed by the stub hash table. */
13873 bfd_hash_traverse (&htab->stub_hash_table, ppc_build_one_stub, info);
5d1634d7 13874
a4b6fadd
AM
13875 for (group = htab->group; group != NULL; group = group->next)
13876 if (group->needs_save_res)
7dda8d3c 13877 group->stub_sec->size += htab->sfpr->size;
a4b6fadd 13878
aa8a7074
AM
13879 if (htab->relbrlt != NULL)
13880 htab->relbrlt->reloc_count = 0;
13881
e7d1c40c 13882 if (htab->params->plt_stub_align != 0)
d4aaa2a0
AM
13883 for (group = htab->group; group != NULL; group = group->next)
13884 if ((stub_sec = group->stub_sec) != NULL)
691d2e9a
AM
13885 {
13886 int align = abs (htab->params->plt_stub_align);
13887 stub_sec->size = (stub_sec->size + (1 << align) - 1) & -(1 << align);
13888 }
794e51c0 13889
7dda8d3c
AM
13890 for (group = htab->group; group != NULL; group = group->next)
13891 if (group->needs_save_res)
13892 {
13893 stub_sec = group->stub_sec;
13894 memcpy (stub_sec->contents + stub_sec->size - htab->sfpr->size,
13895 htab->sfpr->contents, htab->sfpr->size);
13896 if (htab->params->emit_stub_syms)
13897 {
13898 unsigned int i;
13899
13900 for (i = 0; i < ARRAY_SIZE (save_res_funcs); i++)
13901 if (!sfpr_define (info, &save_res_funcs[i], stub_sec))
13902 return FALSE;
13903 }
13904 }
13905
df136d64
AM
13906 if (htab->glink_eh_frame != NULL
13907 && htab->glink_eh_frame->size != 0)
13908 {
13909 bfd_vma val;
13910 size_t align = 4;
13911
13912 p = htab->glink_eh_frame->contents;
13913 p += (sizeof (glink_eh_frame_cie) + align - 1) & -align;
13914
13915 for (group = htab->group; group != NULL; group = group->next)
13916 if (group->eh_size != 0)
13917 {
13918 /* Offset to stub section. */
13919 val = (group->stub_sec->output_section->vma
13920 + group->stub_sec->output_offset);
13921 val -= (htab->glink_eh_frame->output_section->vma
13922 + htab->glink_eh_frame->output_offset
13923 + (p + 8 - htab->glink_eh_frame->contents));
13924 if (val + 0x80000000 > 0xffffffff)
13925 {
13926 _bfd_error_handler
13927 (_("%s offset too large for .eh_frame sdata4 encoding"),
13928 group->stub_sec->name);
13929 return FALSE;
13930 }
13931 bfd_put_32 (htab->elf.dynobj, val, p + 8);
13932 p += (group->eh_size + 17 + 3) & -4;
13933 }
13934 if (htab->glink != NULL && htab->glink->size != 0)
13935 {
13936 /* Offset to .glink. */
13937 val = (htab->glink->output_section->vma
13938 + htab->glink->output_offset
13939 + 8);
13940 val -= (htab->glink_eh_frame->output_section->vma
13941 + htab->glink_eh_frame->output_offset
13942 + (p + 8 - htab->glink_eh_frame->contents));
13943 if (val + 0x80000000 > 0xffffffff)
13944 {
13945 _bfd_error_handler
13946 (_("%s offset too large for .eh_frame sdata4 encoding"),
13947 htab->glink->name);
13948 return FALSE;
13949 }
13950 bfd_put_32 (htab->elf.dynobj, val, p + 8);
13951 p += (24 + align - 1) & -align;
13952 }
13953 }
13954
d4aaa2a0
AM
13955 for (group = htab->group; group != NULL; group = group->next)
13956 if ((stub_sec = group->stub_sec) != NULL)
e717da7e
AM
13957 {
13958 stub_sec_count += 1;
c9301e31
AM
13959 if (stub_sec->rawsize != stub_sec->size
13960 && (htab->stub_iteration <= STUB_SHRINK_ITER
13961 || stub_sec->rawsize < stub_sec->size))
e717da7e
AM
13962 break;
13963 }
5d1634d7 13964
25516cc5 13965 if (group != NULL)
5d1634d7 13966 {
b34976b6 13967 htab->stub_error = TRUE;
cf97bcb0 13968 _bfd_error_handler (_("stubs don't match calculated size"));
5d1634d7 13969 }
721956f4 13970
d2a300cf
AM
13971 if (htab->stub_error)
13972 return FALSE;
13973
13974 if (stats != NULL)
13975 {
db84fff3 13976 size_t len;
d2a300cf
AM
13977 *stats = bfd_malloc (500);
13978 if (*stats == NULL)
13979 return FALSE;
13980
db84fff3
AM
13981 len = sprintf (*stats,
13982 ngettext ("linker stubs in %u group\n",
13983 "linker stubs in %u groups\n",
13984 stub_sec_count),
13985 stub_sec_count);
05d0e962
AM
13986 sprintf (*stats + len, _(" branch %lu\n"
13987 " branch toc adj %lu\n"
13988 " branch notoc %lu\n"
13989 " branch both %lu\n"
13990 " long branch %lu\n"
13991 " long toc adj %lu\n"
13992 " long notoc %lu\n"
13993 " long both %lu\n"
13994 " plt call %lu\n"
13995 " plt call save %lu\n"
13996 " plt call notoc %lu\n"
13997 " plt call both %lu\n"
13998 " global entry %lu"),
4ce794b7
AM
13999 htab->stub_count[ppc_stub_long_branch - 1],
14000 htab->stub_count[ppc_stub_long_branch_r2off - 1],
05d0e962
AM
14001 htab->stub_count[ppc_stub_long_branch_notoc - 1],
14002 htab->stub_count[ppc_stub_long_branch_both - 1],
4ce794b7
AM
14003 htab->stub_count[ppc_stub_plt_branch - 1],
14004 htab->stub_count[ppc_stub_plt_branch_r2off - 1],
05d0e962
AM
14005 htab->stub_count[ppc_stub_plt_branch_notoc - 1],
14006 htab->stub_count[ppc_stub_plt_branch_both - 1],
794e51c0 14007 htab->stub_count[ppc_stub_plt_call - 1],
7341d5e2 14008 htab->stub_count[ppc_stub_plt_call_r2save - 1],
05d0e962
AM
14009 htab->stub_count[ppc_stub_plt_call_notoc - 1],
14010 htab->stub_count[ppc_stub_plt_call_both - 1],
7341d5e2 14011 htab->stub_count[ppc_stub_global_entry - 1]);
d2a300cf
AM
14012 }
14013 return TRUE;
5bd4f169
AM
14014}
14015
60124e18
AM
14016/* What to do when ld finds relocations against symbols defined in
14017 discarded sections. */
14018
14019static unsigned int
14020ppc64_elf_action_discarded (asection *sec)
14021{
14022 if (strcmp (".opd", sec->name) == 0)
14023 return 0;
14024
14025 if (strcmp (".toc", sec->name) == 0)
14026 return 0;
14027
bce50a28
JJ
14028 if (strcmp (".toc1", sec->name) == 0)
14029 return 0;
14030
60124e18
AM
14031 return _bfd_elf_default_action_discarded (sec);
14032}
14033
5bd4f169
AM
14034/* The RELOCATE_SECTION function is called by the ELF backend linker
14035 to handle the relocations for a section.
14036
14037 The relocs are always passed as Rela structures; if the section
14038 actually uses Rel structures, the r_addend field will always be
14039 zero.
14040
14041 This function is responsible for adjust the section contents as
14042 necessary, and (if using Rela relocs and generating a
1049f94e 14043 relocatable output file) adjusting the reloc addend as
5bd4f169
AM
14044 necessary.
14045
14046 This function does not have to worry about setting the reloc
14047 address or the reloc symbol index.
14048
14049 LOCAL_SYMS is a pointer to the swapped in local symbols.
14050
14051 LOCAL_SECTIONS is an array giving the section in the input file
14052 corresponding to the st_shndx field of each local symbol.
14053
14054 The global hash table entry for the global symbols can be found
14055 via elf_sym_hashes (input_bfd).
14056
1049f94e 14057 When generating relocatable output, this function must handle
5bd4f169
AM
14058 STB_LOCAL/STT_SECTION symbols specially. The output symbol is
14059 going to be the section symbol corresponding to the output
14060 section, which means that the addend must be adjusted
14061 accordingly. */
14062
b34976b6 14063static bfd_boolean
4ce794b7
AM
14064ppc64_elf_relocate_section (bfd *output_bfd,
14065 struct bfd_link_info *info,
14066 bfd *input_bfd,
14067 asection *input_section,
14068 bfd_byte *contents,
14069 Elf_Internal_Rela *relocs,
14070 Elf_Internal_Sym *local_syms,
14071 asection **local_sections)
5bd4f169 14072{
65f38f15 14073 struct ppc_link_hash_table *htab;
5bd4f169
AM
14074 Elf_Internal_Shdr *symtab_hdr;
14075 struct elf_link_hash_entry **sym_hashes;
5bd4f169 14076 Elf_Internal_Rela *rel;
c316a17c 14077 Elf_Internal_Rela *wrel;
5bd4f169 14078 Elf_Internal_Rela *relend;
411e1bfb
AM
14079 Elf_Internal_Rela outrel;
14080 bfd_byte *loc;
411e1bfb 14081 struct got_entry **local_got_ents;
5bd4f169 14082 bfd_vma TOCstart;
b34976b6
AM
14083 bfd_boolean ret = TRUE;
14084 bfd_boolean is_opd;
794e51c0
AM
14085 /* Assume 'at' branch hints. */
14086 bfd_boolean is_isa_v2 = TRUE;
95f0d0d2 14087 bfd_vma d_offset = (bfd_big_endian (input_bfd) ? 2 : 0);
5bd4f169 14088
65f38f15 14089 /* Initialize howto table if needed. */
5bd4f169 14090 if (!ppc64_elf_howto_table[R_PPC64_ADDR32])
5bd4f169
AM
14091 ppc_howto_init ();
14092
65f38f15 14093 htab = ppc_hash_table (info);
4dfe6ac6
NC
14094 if (htab == NULL)
14095 return FALSE;
ee75fd95
AM
14096
14097 /* Don't relocate stub sections. */
e7d1c40c 14098 if (input_section->owner == htab->params->stub_bfd)
ee75fd95
AM
14099 return TRUE;
14100
7af5d5c4
AM
14101 if (!is_ppc64_elf (input_bfd))
14102 {
14103 bfd_set_error (bfd_error_wrong_format);
14104 return FALSE;
14105 }
0ffa91dd 14106
411e1bfb 14107 local_got_ents = elf_local_got_ents (input_bfd);
5bd4f169 14108 TOCstart = elf_gp (output_bfd);
0ffa91dd 14109 symtab_hdr = &elf_symtab_hdr (input_bfd);
5bd4f169 14110 sym_hashes = elf_sym_hashes (input_bfd);
7c8fe5c4 14111 is_opd = ppc64_elf_section_data (input_section)->sec_type == sec_opd;
65f38f15 14112
c316a17c 14113 rel = wrel = relocs;
5bd4f169 14114 relend = relocs + input_section->reloc_count;
c316a17c 14115 for (; rel < relend; wrel++, rel++)
5bd4f169 14116 {
04c9666a 14117 enum elf_ppc64_reloc_type r_type;
31c76678 14118 bfd_vma addend;
5bd4f169
AM
14119 bfd_reloc_status_type r;
14120 Elf_Internal_Sym *sym;
14121 asection *sec;
039b3fef
AM
14122 struct elf_link_hash_entry *h_elf;
14123 struct ppc_link_hash_entry *h;
14124 struct ppc_link_hash_entry *fdh;
5bd4f169 14125 const char *sym_name;
0d4792f7 14126 unsigned long r_symndx, toc_symndx;
3a71aa26 14127 bfd_vma toc_addend;
f961d9dd
AM
14128 unsigned char tls_mask, tls_gd, tls_type;
14129 unsigned char sym_type;
5bd4f169 14130 bfd_vma relocation;
23cedd1d 14131 bfd_boolean unresolved_reloc, save_unresolved_reloc;
b34976b6 14132 bfd_boolean warned;
bc30df16 14133 enum { DEST_NORMAL, DEST_OPD, DEST_STUB } reloc_dest;
67f0cbdb 14134 unsigned int insn;
e11840f9 14135 unsigned int mask;
721956f4
AM
14136 struct ppc_stub_hash_entry *stub_entry;
14137 bfd_vma max_br_offset;
14138 bfd_vma from;
c316a17c 14139 Elf_Internal_Rela orig_rel;
b80eed39
AM
14140 reloc_howto_type *howto;
14141 struct reloc_howto_struct alt_howto;
4a421c53
AM
14142 uint64_t pinsn;
14143 bfd_vma offset;
5bd4f169 14144
c316a17c
AM
14145 again:
14146 orig_rel = *rel;
14147
4ce794b7 14148 r_type = ELF64_R_TYPE (rel->r_info);
5bd4f169 14149 r_symndx = ELF64_R_SYM (rel->r_info);
ee87f2da
AM
14150
14151 /* For old style R_PPC64_TOC relocs with a zero symbol, use the
14152 symbol of the previous ADDR64 reloc. The symbol gives us the
14153 proper TOC base to use. */
14154 if (rel->r_info == ELF64_R_INFO (0, R_PPC64_TOC)
c316a17c
AM
14155 && wrel != relocs
14156 && ELF64_R_TYPE (wrel[-1].r_info) == R_PPC64_ADDR64
ee87f2da 14157 && is_opd)
c316a17c 14158 r_symndx = ELF64_R_SYM (wrel[-1].r_info);
ee87f2da 14159
4ce794b7
AM
14160 sym = NULL;
14161 sec = NULL;
039b3fef 14162 h_elf = NULL;
4ce794b7 14163 sym_name = NULL;
b34976b6
AM
14164 unresolved_reloc = FALSE;
14165 warned = FALSE;
65f38f15 14166
0b13192e 14167 if (r_symndx < symtab_hdr->sh_info)
5bd4f169
AM
14168 {
14169 /* It's a local symbol. */
74f0fb50 14170 struct _opd_sec_data *opd;
4025353c 14171
5bd4f169
AM
14172 sym = local_syms + r_symndx;
14173 sec = local_sections[r_symndx];
26c61ae5 14174 sym_name = bfd_elf_sym_name (input_bfd, symtab_hdr, sym, sec);
0d4792f7 14175 sym_type = ELF64_ST_TYPE (sym->st_info);
8517fae7 14176 relocation = _bfd_elf_rela_local_sym (output_bfd, sym, &sec, rel);
74f0fb50
AM
14177 opd = get_opd_info (sec);
14178 if (opd != NULL && opd->adjust != NULL)
1e2f5b6e 14179 {
51aecdc5
AM
14180 long adjust = opd->adjust[OPD_NDX (sym->st_value
14181 + rel->r_addend)];
4025353c
AM
14182 if (adjust == -1)
14183 relocation = 0;
14184 else
4cc603a5
AM
14185 {
14186 /* If this is a relocation against the opd section sym
14187 and we have edited .opd, adjust the reloc addend so
14188 that ld -r and ld --emit-relocs output is correct.
14189 If it is a reloc against some other .opd symbol,
14190 then the symbol value will be adjusted later. */
14191 if (ELF_ST_TYPE (sym->st_info) == STT_SECTION)
14192 rel->r_addend += adjust;
14193 else
14194 relocation += adjust;
14195 }
1e2f5b6e 14196 }
5bd4f169
AM
14197 }
14198 else
14199 {
62d887d4
L
14200 bfd_boolean ignored;
14201
b2a8e766
AM
14202 RELOC_FOR_GLOBAL_SYMBOL (info, input_bfd, input_section, rel,
14203 r_symndx, symtab_hdr, sym_hashes,
039b3fef 14204 h_elf, sec, relocation,
62d887d4 14205 unresolved_reloc, warned, ignored);
039b3fef
AM
14206 sym_name = h_elf->root.root.string;
14207 sym_type = h_elf->type;
b69fdb4e
AM
14208 if (sec != NULL
14209 && sec->owner == output_bfd
14210 && strcmp (sec->name, ".opd") == 0)
14211 {
14212 /* This is a symbol defined in a linker script. All
14213 such are defined in output sections, even those
14214 defined by simple assignment from a symbol defined in
14215 an input section. Transfer the symbol to an
14216 appropriate input .opd section, so that a branch to
14217 this symbol will be mapped to the location specified
14218 by the opd entry. */
14219 struct bfd_link_order *lo;
14220 for (lo = sec->map_head.link_order; lo != NULL; lo = lo->next)
14221 if (lo->type == bfd_indirect_link_order)
14222 {
14223 asection *isec = lo->u.indirect.section;
14224 if (h_elf->root.u.def.value >= isec->output_offset
14225 && h_elf->root.u.def.value < (isec->output_offset
14226 + isec->size))
14227 {
14228 h_elf->root.u.def.value -= isec->output_offset;
14229 h_elf->root.u.def.section = isec;
14230 sec = isec;
14231 break;
14232 }
14233 }
14234 }
5bd4f169 14235 }
039b3fef 14236 h = (struct ppc_link_hash_entry *) h_elf;
5bd4f169 14237
dbaa2011 14238 if (sec != NULL && discarded_section (sec))
c316a17c
AM
14239 {
14240 _bfd_clear_contents (ppc64_elf_howto_table[r_type],
14241 input_bfd, input_section,
0930cb30 14242 contents, rel->r_offset);
c316a17c
AM
14243 wrel->r_offset = rel->r_offset;
14244 wrel->r_info = 0;
14245 wrel->r_addend = 0;
14246
14247 /* For ld -r, remove relocations in debug sections against
dcd2b8a0 14248 symbols defined in discarded sections. Not done for
c316a17c
AM
14249 non-debug to preserve relocs in .eh_frame which the
14250 eh_frame editing code expects to be present. */
14251 if (bfd_link_relocatable (info)
14252 && (input_section->flags & SEC_DEBUGGING))
14253 wrel--;
14254
14255 continue;
14256 }
ab96bf03 14257
0e1862bb 14258 if (bfd_link_relocatable (info))
c316a17c 14259 goto copy_reloc;
ab96bf03 14260
f40da81b
AM
14261 if (h != NULL && &h->elf == htab->elf.hgot)
14262 {
6f20ed8a 14263 relocation = TOCstart + htab->sec_info[input_section->id].toc_off;
f40da81b
AM
14264 sec = bfd_abs_section_ptr;
14265 unresolved_reloc = FALSE;
14266 }
14267
951fd09b
AM
14268 /* TLS optimizations. Replace instruction sequences and relocs
14269 based on information we collected in tls_optimize. We edit
14270 RELOCS so that --emit-relocs will output something sensible
14271 for the final instruction stream. */
14272 tls_mask = 0;
14273 tls_gd = 0;
0d4792f7 14274 toc_symndx = 0;
727fc41e
AM
14275 if (h != NULL)
14276 tls_mask = h->tls_mask;
14277 else if (local_got_ents != NULL)
411e1bfb 14278 {
e054468f
AM
14279 struct plt_entry **local_plt = (struct plt_entry **)
14280 (local_got_ents + symtab_hdr->sh_info);
f961d9dd 14281 unsigned char *lgot_masks = (unsigned char *)
e054468f 14282 (local_plt + symtab_hdr->sh_info);
727fc41e
AM
14283 tls_mask = lgot_masks[r_symndx];
14284 }
37da22e5 14285 if (((tls_mask & TLS_TLS) == 0 || tls_mask == (TLS_TLS | TLS_MARK))
727fc41e
AM
14286 && (r_type == R_PPC64_TLS
14287 || r_type == R_PPC64_TLSGD
14288 || r_type == R_PPC64_TLSLD))
14289 {
14290 /* Check for toc tls entries. */
f961d9dd 14291 unsigned char *toc_tls;
0d4792f7 14292
727fc41e
AM
14293 if (!get_tls_mask (&toc_tls, &toc_symndx, &toc_addend,
14294 &local_syms, rel, input_bfd))
14295 return FALSE;
0d4792f7 14296
727fc41e
AM
14297 if (toc_tls)
14298 tls_mask = *toc_tls;
0d4792f7
AM
14299 }
14300
14301 /* Check that tls relocs are used with tls syms, and non-tls
14302 relocs are used with non-tls syms. */
cf35638d 14303 if (r_symndx != STN_UNDEF
0d4792f7
AM
14304 && r_type != R_PPC64_NONE
14305 && (h == NULL
039b3fef
AM
14306 || h->elf.root.type == bfd_link_hash_defined
14307 || h->elf.root.type == bfd_link_hash_defweak)
1d483afe
AM
14308 && (IS_PPC64_TLS_RELOC (r_type)
14309 != (sym_type == STT_TLS
14310 || (sym_type == STT_SECTION
14311 && (sec->flags & SEC_THREAD_LOCAL) != 0))))
0d4792f7 14312 {
37da22e5 14313 if ((tls_mask & TLS_TLS) != 0
727fc41e
AM
14314 && (r_type == R_PPC64_TLS
14315 || r_type == R_PPC64_TLSGD
14316 || r_type == R_PPC64_TLSLD))
0d4792f7
AM
14317 /* R_PPC64_TLS is OK against a symbol in the TOC. */
14318 ;
14319 else
25f53a85 14320 info->callbacks->einfo
1d483afe 14321 (!IS_PPC64_TLS_RELOC (r_type)
695344c0 14322 /* xgettext:c-format */
c1c8c1ef 14323 ? _("%H: %s used with TLS symbol `%pT'\n")
695344c0 14324 /* xgettext:c-format */
c1c8c1ef 14325 : _("%H: %s used with non-TLS symbol `%pT'\n"),
25f53a85 14326 input_bfd, input_section, rel->r_offset,
0d4792f7
AM
14327 ppc64_elf_howto_table[r_type]->name,
14328 sym_name);
411e1bfb
AM
14329 }
14330
14331 /* Ensure reloc mapping code below stays sane. */
14332 if (R_PPC64_TOC16_LO_DS != R_PPC64_TOC16_DS + 1
14333 || R_PPC64_TOC16_LO != R_PPC64_TOC16 + 1
14334 || (R_PPC64_GOT_TLSLD16 & 3) != (R_PPC64_GOT_TLSGD16 & 3)
14335 || (R_PPC64_GOT_TLSLD16_LO & 3) != (R_PPC64_GOT_TLSGD16_LO & 3)
14336 || (R_PPC64_GOT_TLSLD16_HI & 3) != (R_PPC64_GOT_TLSGD16_HI & 3)
14337 || (R_PPC64_GOT_TLSLD16_HA & 3) != (R_PPC64_GOT_TLSGD16_HA & 3)
14338 || (R_PPC64_GOT_TLSLD16 & 3) != (R_PPC64_GOT_TPREL16_DS & 3)
14339 || (R_PPC64_GOT_TLSLD16_LO & 3) != (R_PPC64_GOT_TPREL16_LO_DS & 3)
14340 || (R_PPC64_GOT_TLSLD16_HI & 3) != (R_PPC64_GOT_TPREL16_HI & 3)
14341 || (R_PPC64_GOT_TLSLD16_HA & 3) != (R_PPC64_GOT_TPREL16_HA & 3))
14342 abort ();
0d4792f7 14343
411e1bfb
AM
14344 switch (r_type)
14345 {
14346 default:
411e1bfb
AM
14347 break;
14348
ba761f19 14349 case R_PPC64_LO_DS_OPT:
95f0d0d2 14350 insn = bfd_get_32 (input_bfd, contents + rel->r_offset - d_offset);
ba761f19
AM
14351 if ((insn & (0x3f << 26)) != 58u << 26)
14352 abort ();
14353 insn += (14u << 26) - (58u << 26);
95f0d0d2 14354 bfd_put_32 (input_bfd, insn, contents + rel->r_offset - d_offset);
ba761f19
AM
14355 r_type = R_PPC64_TOC16_LO;
14356 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
14357 break;
14358
411e1bfb
AM
14359 case R_PPC64_TOC16:
14360 case R_PPC64_TOC16_LO:
14361 case R_PPC64_TOC16_DS:
14362 case R_PPC64_TOC16_LO_DS:
411e1bfb
AM
14363 {
14364 /* Check for toc tls entries. */
f961d9dd 14365 unsigned char *toc_tls;
951fd09b 14366 int retval;
411e1bfb 14367
3a71aa26
AM
14368 retval = get_tls_mask (&toc_tls, &toc_symndx, &toc_addend,
14369 &local_syms, rel, input_bfd);
951fd09b 14370 if (retval == 0)
411e1bfb
AM
14371 return FALSE;
14372
14373 if (toc_tls)
14374 {
951fd09b 14375 tls_mask = *toc_tls;
411e1bfb
AM
14376 if (r_type == R_PPC64_TOC16_DS
14377 || r_type == R_PPC64_TOC16_LO_DS)
81407a69 14378 {
37da22e5 14379 if ((tls_mask & TLS_TLS) != 0
81407a69
AM
14380 && (tls_mask & (TLS_DTPREL | TLS_TPREL)) == 0)
14381 goto toctprel;
14382 }
411e1bfb 14383 else
951fd09b
AM
14384 {
14385 /* If we found a GD reloc pair, then we might be
14386 doing a GD->IE transition. */
14387 if (retval == 2)
14388 {
14389 tls_gd = TLS_TPRELGD;
37da22e5
AM
14390 if ((tls_mask & TLS_TLS) != 0
14391 && (tls_mask & TLS_GD) == 0)
102890f0 14392 goto tls_ldgd_opt;
951fd09b
AM
14393 }
14394 else if (retval == 3)
14395 {
37da22e5
AM
14396 if ((tls_mask & TLS_TLS) != 0
14397 && (tls_mask & TLS_LD) == 0)
102890f0 14398 goto tls_ldgd_opt;
951fd09b
AM
14399 }
14400 }
411e1bfb
AM
14401 }
14402 }
14403 break;
14404
9d6ded02
AM
14405 case R_PPC64_GOT_TPREL16_HI:
14406 case R_PPC64_GOT_TPREL16_HA:
37da22e5 14407 if ((tls_mask & TLS_TLS) != 0
9d6ded02
AM
14408 && (tls_mask & TLS_TPREL) == 0)
14409 {
14410 rel->r_offset -= d_offset;
95f0d0d2 14411 bfd_put_32 (input_bfd, NOP, contents + rel->r_offset);
9d6ded02
AM
14412 r_type = R_PPC64_NONE;
14413 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
14414 }
14415 break;
14416
411e1bfb
AM
14417 case R_PPC64_GOT_TPREL16_DS:
14418 case R_PPC64_GOT_TPREL16_LO_DS:
37da22e5 14419 if ((tls_mask & TLS_TLS) != 0
951fd09b 14420 && (tls_mask & TLS_TPREL) == 0)
411e1bfb 14421 {
81407a69 14422 toctprel:
95f0d0d2 14423 insn = bfd_get_32 (input_bfd,
c316a17c 14424 contents + rel->r_offset - d_offset);
411e1bfb
AM
14425 insn &= 31 << 21;
14426 insn |= 0x3c0d0000; /* addis 0,13,0 */
95f0d0d2 14427 bfd_put_32 (input_bfd, insn,
c316a17c 14428 contents + rel->r_offset - d_offset);
411e1bfb 14429 r_type = R_PPC64_TPREL16_HA;
0d4792f7
AM
14430 if (toc_symndx != 0)
14431 {
14432 rel->r_info = ELF64_R_INFO (toc_symndx, r_type);
3a71aa26 14433 rel->r_addend = toc_addend;
0d4792f7
AM
14434 /* We changed the symbol. Start over in order to
14435 get h, sym, sec etc. right. */
c316a17c 14436 goto again;
0d4792f7
AM
14437 }
14438 else
14439 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
411e1bfb
AM
14440 }
14441 break;
14442
14443 case R_PPC64_TLS:
37da22e5 14444 if ((tls_mask & TLS_TLS) != 0
951fd09b 14445 && (tls_mask & TLS_TPREL) == 0)
411e1bfb 14446 {
95f0d0d2 14447 insn = bfd_get_32 (input_bfd, contents + rel->r_offset);
2d0f3896
AM
14448 insn = _bfd_elf_ppc_at_tls_transform (insn, 13);
14449 if (insn == 0)
411e1bfb 14450 abort ();
95f0d0d2 14451 bfd_put_32 (input_bfd, insn, contents + rel->r_offset);
411e1bfb 14452 /* Was PPC64_TLS which sits on insn boundary, now
4fe5ca5b
GM
14453 PPC64_TPREL16_LO which is at low-order half-word. */
14454 rel->r_offset += d_offset;
0d4792f7
AM
14455 r_type = R_PPC64_TPREL16_LO;
14456 if (toc_symndx != 0)
14457 {
14458 rel->r_info = ELF64_R_INFO (toc_symndx, r_type);
3a71aa26 14459 rel->r_addend = toc_addend;
0d4792f7
AM
14460 /* We changed the symbol. Start over in order to
14461 get h, sym, sec etc. right. */
c316a17c 14462 goto again;
0d4792f7
AM
14463 }
14464 else
14465 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
411e1bfb
AM
14466 }
14467 break;
14468
411e1bfb
AM
14469 case R_PPC64_GOT_TLSGD16_HI:
14470 case R_PPC64_GOT_TLSGD16_HA:
951fd09b 14471 tls_gd = TLS_TPRELGD;
37da22e5 14472 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_GD) == 0)
951fd09b
AM
14473 goto tls_gdld_hi;
14474 break;
14475
411e1bfb
AM
14476 case R_PPC64_GOT_TLSLD16_HI:
14477 case R_PPC64_GOT_TLSLD16_HA:
37da22e5 14478 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_LD) == 0)
411e1bfb 14479 {
951fd09b
AM
14480 tls_gdld_hi:
14481 if ((tls_mask & tls_gd) != 0)
14482 r_type = (((r_type - (R_PPC64_GOT_TLSGD16 & 3)) & 3)
14483 + R_PPC64_GOT_TPREL16_DS);
14484 else
411e1bfb 14485 {
4fe5ca5b 14486 rel->r_offset -= d_offset;
95f0d0d2 14487 bfd_put_32 (input_bfd, NOP, contents + rel->r_offset);
951fd09b 14488 r_type = R_PPC64_NONE;
411e1bfb 14489 }
951fd09b 14490 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
411e1bfb
AM
14491 }
14492 break;
14493
951fd09b
AM
14494 case R_PPC64_GOT_TLSGD16:
14495 case R_PPC64_GOT_TLSGD16_LO:
14496 tls_gd = TLS_TPRELGD;
37da22e5 14497 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_GD) == 0)
102890f0 14498 goto tls_ldgd_opt;
951fd09b 14499 break;
411e1bfb 14500
951fd09b
AM
14501 case R_PPC64_GOT_TLSLD16:
14502 case R_PPC64_GOT_TLSLD16_LO:
37da22e5 14503 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_LD) == 0)
951fd09b 14504 {
b9f04fe0 14505 unsigned int insn1, insn2;
102890f0
AM
14506
14507 tls_ldgd_opt:
727fc41e
AM
14508 offset = (bfd_vma) -1;
14509 /* If not using the newer R_PPC64_TLSGD/LD to mark
14510 __tls_get_addr calls, we must trust that the call
14511 stays with its arg setup insns, ie. that the next
14512 reloc is the __tls_get_addr call associated with
14513 the current reloc. Edit both insns. */
14514 if (input_section->has_tls_get_addr_call
14515 && rel + 1 < relend
14516 && branch_reloc_hash_match (input_bfd, rel + 1,
14517 htab->tls_get_addr,
14518 htab->tls_get_addr_fd))
14519 offset = rel[1].r_offset;
b86ac8e3
AM
14520 /* We read the low GOT_TLS (or TOC16) insn because we
14521 need to keep the destination reg. It may be
14522 something other than the usual r3, and moved to r3
14523 before the call by intervening code. */
95f0d0d2 14524 insn1 = bfd_get_32 (input_bfd,
b86ac8e3 14525 contents + rel->r_offset - d_offset);
102890f0 14526 if ((tls_mask & tls_gd) != 0)
411e1bfb 14527 {
102890f0 14528 /* IE */
b86ac8e3 14529 insn1 &= (0x1f << 21) | (0x1f << 16);
102890f0
AM
14530 insn1 |= 58 << 26; /* ld */
14531 insn2 = 0x7c636a14; /* add 3,3,13 */
727fc41e 14532 if (offset != (bfd_vma) -1)
f58d5a2d 14533 rel[1].r_info = ELF64_R_INFO (STN_UNDEF, R_PPC64_NONE);
102890f0
AM
14534 if ((tls_mask & TLS_EXPLICIT) == 0)
14535 r_type = (((r_type - (R_PPC64_GOT_TLSGD16 & 3)) & 3)
14536 + R_PPC64_GOT_TPREL16_DS);
411e1bfb 14537 else
102890f0
AM
14538 r_type += R_PPC64_TOC16_DS - R_PPC64_TOC16;
14539 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
14540 }
14541 else
14542 {
14543 /* LE */
b86ac8e3
AM
14544 insn1 &= 0x1f << 21;
14545 insn1 |= 0x3c0d0000; /* addis r,13,0 */
102890f0
AM
14546 insn2 = 0x38630000; /* addi 3,3,0 */
14547 if (tls_gd == 0)
951fd09b 14548 {
102890f0 14549 /* Was an LD reloc. */
1d483afe
AM
14550 if (toc_symndx)
14551 sec = local_sections[toc_symndx];
14552 for (r_symndx = 0;
14553 r_symndx < symtab_hdr->sh_info;
14554 r_symndx++)
14555 if (local_sections[r_symndx] == sec)
14556 break;
14557 if (r_symndx >= symtab_hdr->sh_info)
cf35638d 14558 r_symndx = STN_UNDEF;
102890f0 14559 rel->r_addend = htab->elf.tls_sec->vma + DTP_OFFSET;
cf35638d 14560 if (r_symndx != STN_UNDEF)
1d483afe
AM
14561 rel->r_addend -= (local_syms[r_symndx].st_value
14562 + sec->output_offset
14563 + sec->output_section->vma);
951fd09b 14564 }
102890f0 14565 else if (toc_symndx != 0)
3a71aa26
AM
14566 {
14567 r_symndx = toc_symndx;
14568 rel->r_addend = toc_addend;
14569 }
102890f0
AM
14570 r_type = R_PPC64_TPREL16_HA;
14571 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
727fc41e
AM
14572 if (offset != (bfd_vma) -1)
14573 {
14574 rel[1].r_info = ELF64_R_INFO (r_symndx,
14575 R_PPC64_TPREL16_LO);
14576 rel[1].r_offset = offset + d_offset;
14577 rel[1].r_addend = rel->r_addend;
14578 }
102890f0 14579 }
95f0d0d2 14580 bfd_put_32 (input_bfd, insn1,
3a71aa26 14581 contents + rel->r_offset - d_offset);
727fc41e 14582 if (offset != (bfd_vma) -1)
c96e0573
AM
14583 {
14584 bfd_put_32 (input_bfd, insn2, contents + offset);
14585 if (offset + 8 <= input_section->size)
14586 {
14587 insn2 = bfd_get_32 (input_bfd, contents + offset + 4);
14588 if (insn2 == LD_R2_0R1 + STK_TOC (htab))
14589 bfd_put_32 (input_bfd, NOP, contents + offset + 4);
14590 }
14591 }
727fc41e
AM
14592 if ((tls_mask & tls_gd) == 0
14593 && (tls_gd == 0 || toc_symndx != 0))
14594 {
14595 /* We changed the symbol. Start over in order
14596 to get h, sym, sec etc. right. */
c316a17c 14597 goto again;
727fc41e
AM
14598 }
14599 }
14600 break;
14601
14602 case R_PPC64_TLSGD:
37da22e5 14603 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_GD) == 0
675e2809 14604 && rel + 1 < relend)
727fc41e 14605 {
b9f04fe0 14606 unsigned int insn2;
5663e321 14607 enum elf_ppc64_reloc_type r_type1 = ELF64_R_TYPE (rel[1].r_info);
727fc41e 14608
4a421c53 14609 offset = rel->r_offset;
5663e321 14610 if (is_plt_seq_reloc (r_type1))
23cedd1d
AM
14611 {
14612 bfd_put_32 (output_bfd, NOP, contents + offset);
5663e321
AM
14613 if (r_type1 == R_PPC64_PLT_PCREL34
14614 || r_type1 == R_PPC64_PLT_PCREL34_NOTOC)
14615 bfd_put_32 (output_bfd, NOP, contents + offset + 4);
23cedd1d
AM
14616 rel[1].r_info = ELF64_R_INFO (STN_UNDEF, R_PPC64_NONE);
14617 break;
14618 }
14619
14620 if (ELF64_R_TYPE (rel[1].r_info) == R_PPC64_PLTCALL)
14621 bfd_put_32 (output_bfd, NOP, contents + offset + 4);
14622
727fc41e
AM
14623 if ((tls_mask & TLS_TPRELGD) != 0)
14624 {
14625 /* IE */
14626 r_type = R_PPC64_NONE;
14627 insn2 = 0x7c636a14; /* add 3,3,13 */
14628 }
14629 else
14630 {
14631 /* LE */
14632 if (toc_symndx != 0)
14633 {
14634 r_symndx = toc_symndx;
14635 rel->r_addend = toc_addend;
14636 }
14637 r_type = R_PPC64_TPREL16_LO;
14638 rel->r_offset = offset + d_offset;
14639 insn2 = 0x38630000; /* addi 3,3,0 */
14640 }
14641 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
14642 /* Zap the reloc on the _tls_get_addr call too. */
14643 BFD_ASSERT (offset == rel[1].r_offset);
f58d5a2d 14644 rel[1].r_info = ELF64_R_INFO (STN_UNDEF, R_PPC64_NONE);
95f0d0d2 14645 bfd_put_32 (input_bfd, insn2, contents + offset);
727fc41e 14646 if ((tls_mask & TLS_TPRELGD) == 0 && toc_symndx != 0)
c316a17c 14647 goto again;
411e1bfb 14648 }
411e1bfb
AM
14649 break;
14650
727fc41e 14651 case R_PPC64_TLSLD:
37da22e5 14652 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_LD) == 0
675e2809 14653 && rel + 1 < relend)
727fc41e 14654 {
b9f04fe0 14655 unsigned int insn2;
5663e321 14656 enum elf_ppc64_reloc_type r_type1 = ELF64_R_TYPE (rel[1].r_info);
727fc41e 14657
4a421c53 14658 offset = rel->r_offset;
5663e321 14659 if (is_plt_seq_reloc (r_type1))
23cedd1d
AM
14660 {
14661 bfd_put_32 (output_bfd, NOP, contents + offset);
5663e321
AM
14662 if (r_type1 == R_PPC64_PLT_PCREL34
14663 || r_type1 == R_PPC64_PLT_PCREL34_NOTOC)
14664 bfd_put_32 (output_bfd, NOP, contents + offset + 4);
23cedd1d
AM
14665 rel[1].r_info = ELF64_R_INFO (STN_UNDEF, R_PPC64_NONE);
14666 break;
14667 }
14668
14669 if (ELF64_R_TYPE (rel[1].r_info) == R_PPC64_PLTCALL)
14670 bfd_put_32 (output_bfd, NOP, contents + offset + 4);
14671
727fc41e
AM
14672 if (toc_symndx)
14673 sec = local_sections[toc_symndx];
14674 for (r_symndx = 0;
14675 r_symndx < symtab_hdr->sh_info;
14676 r_symndx++)
14677 if (local_sections[r_symndx] == sec)
14678 break;
14679 if (r_symndx >= symtab_hdr->sh_info)
cf35638d 14680 r_symndx = STN_UNDEF;
727fc41e 14681 rel->r_addend = htab->elf.tls_sec->vma + DTP_OFFSET;
cf35638d 14682 if (r_symndx != STN_UNDEF)
727fc41e
AM
14683 rel->r_addend -= (local_syms[r_symndx].st_value
14684 + sec->output_offset
14685 + sec->output_section->vma);
14686
14687 r_type = R_PPC64_TPREL16_LO;
14688 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
14689 rel->r_offset = offset + d_offset;
14690 /* Zap the reloc on the _tls_get_addr call too. */
14691 BFD_ASSERT (offset == rel[1].r_offset);
f58d5a2d 14692 rel[1].r_info = ELF64_R_INFO (STN_UNDEF, R_PPC64_NONE);
727fc41e 14693 insn2 = 0x38630000; /* addi 3,3,0 */
95f0d0d2 14694 bfd_put_32 (input_bfd, insn2, contents + offset);
c316a17c 14695 goto again;
727fc41e
AM
14696 }
14697 break;
14698
411e1bfb 14699 case R_PPC64_DTPMOD64:
951fd09b
AM
14700 if (rel + 1 < relend
14701 && rel[1].r_info == ELF64_R_INFO (r_symndx, R_PPC64_DTPREL64)
14702 && rel[1].r_offset == rel->r_offset + 8)
411e1bfb 14703 {
951fd09b
AM
14704 if ((tls_mask & TLS_GD) == 0)
14705 {
14706 rel[1].r_info = ELF64_R_INFO (r_symndx, R_PPC64_NONE);
14707 if ((tls_mask & TLS_TPRELGD) != 0)
14708 r_type = R_PPC64_TPREL64;
14709 else
14710 {
4ce794b7 14711 bfd_put_64 (output_bfd, 1, contents + rel->r_offset);
951fd09b
AM
14712 r_type = R_PPC64_NONE;
14713 }
14714 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
14715 }
14716 }
14717 else
14718 {
14719 if ((tls_mask & TLS_LD) == 0)
411e1bfb 14720 {
4ce794b7 14721 bfd_put_64 (output_bfd, 1, contents + rel->r_offset);
411e1bfb 14722 r_type = R_PPC64_NONE;
951fd09b 14723 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
411e1bfb 14724 }
411e1bfb
AM
14725 }
14726 break;
14727
14728 case R_PPC64_TPREL64:
951fd09b 14729 if ((tls_mask & TLS_TPREL) == 0)
411e1bfb
AM
14730 {
14731 r_type = R_PPC64_NONE;
14732 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
14733 }
14734 break;
52a82034 14735
006589cf
AM
14736 case R_PPC64_ENTRY:
14737 relocation = TOCstart + htab->sec_info[input_section->id].toc_off;
14738 if (!bfd_link_pic (info)
14739 && !info->traditional_format
14740 && relocation + 0x80008000 <= 0xffffffff)
14741 {
14742 unsigned int insn1, insn2;
14743
14744 insn1 = bfd_get_32 (input_bfd, contents + rel->r_offset);
14745 insn2 = bfd_get_32 (input_bfd, contents + rel->r_offset + 4);
14746 if ((insn1 & ~0xfffc) == LD_R2_0R12
14747 && insn2 == ADD_R2_R2_R12)
14748 {
95f0d0d2 14749 bfd_put_32 (input_bfd,
006589cf
AM
14750 LIS_R2 + PPC_HA (relocation),
14751 contents + rel->r_offset);
95f0d0d2 14752 bfd_put_32 (input_bfd,
006589cf
AM
14753 ADDI_R2_R2 + PPC_LO (relocation),
14754 contents + rel->r_offset + 4);
14755 }
14756 }
14757 else
14758 {
14759 relocation -= (rel->r_offset
14760 + input_section->output_offset
14761 + input_section->output_section->vma);
14762 if (relocation + 0x80008000 <= 0xffffffff)
14763 {
14764 unsigned int insn1, insn2;
14765
14766 insn1 = bfd_get_32 (input_bfd, contents + rel->r_offset);
14767 insn2 = bfd_get_32 (input_bfd, contents + rel->r_offset + 4);
14768 if ((insn1 & ~0xfffc) == LD_R2_0R12
14769 && insn2 == ADD_R2_R2_R12)
14770 {
95f0d0d2 14771 bfd_put_32 (input_bfd,
006589cf
AM
14772 ADDIS_R2_R12 + PPC_HA (relocation),
14773 contents + rel->r_offset);
95f0d0d2 14774 bfd_put_32 (input_bfd,
006589cf
AM
14775 ADDI_R2_R2 + PPC_LO (relocation),
14776 contents + rel->r_offset + 4);
14777 }
14778 }
14779 }
14780 break;
14781
52a82034
AM
14782 case R_PPC64_REL16_HA:
14783 /* If we are generating a non-PIC executable, edit
14784 . 0: addis 2,12,.TOC.-0b@ha
14785 . addi 2,2,.TOC.-0b@l
14786 used by ELFv2 global entry points to set up r2, to
14787 . lis 2,.TOC.@ha
14788 . addi 2,2,.TOC.@l
14789 if .TOC. is in range. */
0e1862bb 14790 if (!bfd_link_pic (info)
810d4e75 14791 && !info->traditional_format
006589cf 14792 && !htab->opd_abi
4f038ee5 14793 && rel->r_addend == d_offset
52a82034
AM
14794 && h != NULL && &h->elf == htab->elf.hgot
14795 && rel + 1 < relend
14796 && rel[1].r_info == ELF64_R_INFO (r_symndx, R_PPC64_REL16_LO)
14797 && rel[1].r_offset == rel->r_offset + 4
14798 && rel[1].r_addend == rel->r_addend + 4
14799 && relocation + 0x80008000 <= 0xffffffff)
14800 {
14801 unsigned int insn1, insn2;
4a421c53 14802 offset = rel->r_offset - d_offset;
95f0d0d2
AM
14803 insn1 = bfd_get_32 (input_bfd, contents + offset);
14804 insn2 = bfd_get_32 (input_bfd, contents + offset + 4);
006589cf
AM
14805 if ((insn1 & 0xffff0000) == ADDIS_R2_R12
14806 && (insn2 & 0xffff0000) == ADDI_R2_R2)
52a82034
AM
14807 {
14808 r_type = R_PPC64_ADDR16_HA;
14809 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
14810 rel->r_addend -= d_offset;
14811 rel[1].r_info = ELF64_R_INFO (r_symndx, R_PPC64_ADDR16_LO);
14812 rel[1].r_addend -= d_offset + 4;
95f0d0d2 14813 bfd_put_32 (input_bfd, LIS_R2, contents + offset);
52a82034
AM
14814 }
14815 }
14816 break;
411e1bfb
AM
14817 }
14818
14819 /* Handle other relocations that tweak non-addend part of insn. */
86c76c7b 14820 insn = 0;
b25116a9
AM
14821 max_br_offset = 1 << 25;
14822 addend = rel->r_addend;
bc30df16 14823 reloc_dest = DEST_NORMAL;
65f38f15 14824 switch (r_type)
5bd4f169
AM
14825 {
14826 default:
65f38f15 14827 break;
5bd4f169 14828
3b421ab3
AM
14829 case R_PPC64_TOCSAVE:
14830 if (relocation + addend == (rel->r_offset
14831 + input_section->output_offset
14832 + input_section->output_section->vma)
14833 && tocsave_find (htab, NO_INSERT,
14834 &local_syms, rel, input_bfd))
14835 {
14836 insn = bfd_get_32 (input_bfd, contents + rel->r_offset);
14837 if (insn == NOP
14838 || insn == CROR_151515 || insn == CROR_313131)
a078d95a
AM
14839 bfd_put_32 (input_bfd,
14840 STD_R2_0R1 + STK_TOC (htab),
3b421ab3
AM
14841 contents + rel->r_offset);
14842 }
14843 break;
14844
65f38f15
AM
14845 /* Branch taken prediction relocations. */
14846 case R_PPC64_ADDR14_BRTAKEN:
14847 case R_PPC64_REL14_BRTAKEN:
cedb70c5 14848 insn = 0x01 << 21; /* 'y' or 't' bit, lowest bit of BO field. */
1a0670f3 14849 /* Fall through. */
65f38f15 14850
86c76c7b 14851 /* Branch not taken prediction relocations. */
65f38f15
AM
14852 case R_PPC64_ADDR14_BRNTAKEN:
14853 case R_PPC64_REL14_BRNTAKEN:
95f0d0d2 14854 insn |= bfd_get_32 (input_bfd,
411e1bfb 14855 contents + rel->r_offset) & ~(0x01 << 21);
1a0670f3 14856 /* Fall through. */
86c76c7b 14857
b25116a9
AM
14858 case R_PPC64_REL14:
14859 max_br_offset = 1 << 15;
1a0670f3 14860 /* Fall through. */
5bd4f169 14861
65f38f15 14862 case R_PPC64_REL24:
05d0e962 14863 case R_PPC64_REL24_NOTOC:
23cedd1d 14864 case R_PPC64_PLTCALL:
5663e321 14865 case R_PPC64_PLTCALL_NOTOC:
ad8e1ba5
AM
14866 /* Calls to functions with a different TOC, such as calls to
14867 shared objects, need to alter the TOC pointer. This is
14868 done using a linkage stub. A REL24 branching to these
14869 linkage stubs needs to be followed by a nop, as the nop
14870 will be replaced with an instruction to restore the TOC
14871 base pointer. */
8387904d 14872 fdh = h;
b31867b6
AM
14873 if (h != NULL
14874 && h->oh != NULL
14875 && h->oh->is_func_descriptor)
14876 fdh = ppc_follow_link (h->oh);
31c76678
DK
14877 stub_entry = ppc_get_stub_entry (input_section, sec, fdh, &orig_rel,
14878 htab);
5663e321
AM
14879 if ((r_type == R_PPC64_PLTCALL
14880 || r_type == R_PPC64_PLTCALL_NOTOC)
23cedd1d 14881 && stub_entry != NULL
05d0e962
AM
14882 && stub_entry->stub_type >= ppc_stub_plt_call
14883 && stub_entry->stub_type <= ppc_stub_plt_call_both)
23cedd1d
AM
14884 stub_entry = NULL;
14885
6abec6bc 14886 if (stub_entry != NULL
d0abeec8
AM
14887 && ((stub_entry->stub_type >= ppc_stub_plt_call
14888 && stub_entry->stub_type <= ppc_stub_plt_call_both)
ad8e1ba5 14889 || stub_entry->stub_type == ppc_stub_plt_branch_r2off
05d0e962
AM
14890 || stub_entry->stub_type == ppc_stub_plt_branch_both
14891 || stub_entry->stub_type == ppc_stub_long_branch_r2off
14892 || stub_entry->stub_type == ppc_stub_long_branch_both))
41bd81ab 14893 {
b25116a9 14894 bfd_boolean can_plt_call = FALSE;
721956f4 14895
6e1816be
AM
14896 if (stub_entry->stub_type == ppc_stub_plt_call
14897 && !htab->opd_abi
14898 && htab->params->plt_localentry0 != 0
14899 && is_elfv2_localentry0 (&h->elf))
14900 {
14901 /* The function doesn't use or change r2. */
14902 can_plt_call = TRUE;
14903 }
05d0e962
AM
14904 else if (r_type == R_PPC64_REL24_NOTOC)
14905 {
14906 /* NOTOC calls don't need to restore r2. */
14907 can_plt_call = TRUE;
14908 }
6e1816be 14909
f378ab09 14910 /* All of these stubs may modify r2, so there must be a
ba8ca3e7
AM
14911 branch and link followed by a nop. The nop is
14912 replaced by an insn to restore r2. */
6e1816be 14913 else if (rel->r_offset + 8 <= input_section->size)
41bd81ab 14914 {
ba8ca3e7
AM
14915 unsigned long br;
14916
14917 br = bfd_get_32 (input_bfd,
14918 contents + rel->r_offset);
14919 if ((br & 1) != 0)
41bd81ab 14920 {
ba8ca3e7
AM
14921 unsigned long nop;
14922
14923 nop = bfd_get_32 (input_bfd,
14924 contents + rel->r_offset + 4);
23cedd1d
AM
14925 if (nop == LD_R2_0R1 + STK_TOC (htab))
14926 can_plt_call = TRUE;
14927 else if (nop == NOP
14928 || nop == CROR_151515
14929 || nop == CROR_313131)
a7f2871e 14930 {
ba8ca3e7
AM
14931 if (h != NULL
14932 && (h == htab->tls_get_addr_fd
14933 || h == htab->tls_get_addr)
7c9cf415 14934 && htab->params->tls_get_addr_opt)
ba8ca3e7
AM
14935 {
14936 /* Special stub used, leave nop alone. */
14937 }
14938 else
a078d95a
AM
14939 bfd_put_32 (input_bfd,
14940 LD_R2_0R1 + STK_TOC (htab),
ba8ca3e7
AM
14941 contents + rel->r_offset + 4);
14942 can_plt_call = TRUE;
a7f2871e 14943 }
41bd81ab 14944 }
5bd4f169 14945 }
721956f4 14946
ba8ca3e7 14947 if (!can_plt_call && h != NULL)
721956f4 14948 {
ba8ca3e7
AM
14949 const char *name = h->elf.root.root.string;
14950
14951 if (*name == '.')
14952 ++name;
14953
14954 if (strncmp (name, "__libc_start_main", 17) == 0
14955 && (name[17] == 0 || name[17] == '@'))
6ab189d5 14956 {
ba8ca3e7
AM
14957 /* Allow crt1 branch to go via a toc adjusting
14958 stub. Other calls that never return could do
14959 the same, if we could detect such. */
b25116a9 14960 can_plt_call = TRUE;
6ab189d5 14961 }
ba8ca3e7
AM
14962 }
14963
14964 if (!can_plt_call)
14965 {
14966 /* g++ as of 20130507 emits self-calls without a
14967 following nop. This is arguably wrong since we
14968 have conflicting information. On the one hand a
14969 global symbol and on the other a local call
14970 sequence, but don't error for this special case.
14971 It isn't possible to cheaply verify we have
14972 exactly such a call. Allow all calls to the same
14973 section. */
14974 asection *code_sec = sec;
14975
14976 if (get_opd_info (sec) != NULL)
ad8e1ba5 14977 {
ba8ca3e7
AM
14978 bfd_vma off = (relocation + addend
14979 - sec->output_section->vma
14980 - sec->output_offset);
bc30df16 14981
ba8ca3e7 14982 opd_entry_value (sec, off, &code_sec, NULL, FALSE);
ad8e1ba5 14983 }
ba8ca3e7
AM
14984 if (code_sec == input_section)
14985 can_plt_call = TRUE;
14986 }
14987
14988 if (!can_plt_call)
14989 {
05d0e962
AM
14990 if (stub_entry->stub_type >= ppc_stub_plt_call
14991 && stub_entry->stub_type <= ppc_stub_plt_call_both)
4805fc55 14992 info->callbacks->einfo
695344c0 14993 /* xgettext:c-format */
c1c8c1ef 14994 (_("%H: call to `%pT' lacks nop, can't restore toc; "
f53ad3cf 14995 "(plt call stub)\n"),
4805fc55
AM
14996 input_bfd, input_section, rel->r_offset, sym_name);
14997 else
14998 info->callbacks->einfo
695344c0 14999 /* xgettext:c-format */
c1c8c1ef 15000 (_("%H: call to `%pT' lacks nop, can't restore toc; "
f53ad3cf 15001 "(toc save/adjust stub)\n"),
4805fc55 15002 input_bfd, input_section, rel->r_offset, sym_name);
ba8ca3e7
AM
15003
15004 bfd_set_error (bfd_error_bad_value);
15005 ret = FALSE;
721956f4
AM
15006 }
15007
b25116a9 15008 if (can_plt_call
05d0e962
AM
15009 && stub_entry->stub_type >= ppc_stub_plt_call
15010 && stub_entry->stub_type <= ppc_stub_plt_call_both)
b25116a9
AM
15011 unresolved_reloc = FALSE;
15012 }
15013
6abec6bc
AM
15014 if ((stub_entry == NULL
15015 || stub_entry->stub_type == ppc_stub_long_branch
15016 || stub_entry->stub_type == ppc_stub_plt_branch)
8387904d
AM
15017 && get_opd_info (sec) != NULL)
15018 {
15019 /* The branch destination is the value of the opd entry. */
4cc603a5
AM
15020 bfd_vma off = (relocation + addend
15021 - sec->output_section->vma
15022 - sec->output_offset);
aef36ac1 15023 bfd_vma dest = opd_entry_value (sec, off, NULL, NULL, FALSE);
8387904d
AM
15024 if (dest != (bfd_vma) -1)
15025 {
15026 relocation = dest;
15027 addend = 0;
bc30df16 15028 reloc_dest = DEST_OPD;
8387904d
AM
15029 }
15030 }
15031
b25116a9
AM
15032 /* If the branch is out of reach we ought to have a long
15033 branch stub. */
15034 from = (rel->r_offset
15035 + input_section->output_offset
15036 + input_section->output_section->vma);
15037
6911b7dc
AM
15038 relocation += PPC64_LOCAL_ENTRY_OFFSET (fdh
15039 ? fdh->elf.other
15040 : sym->st_other);
15041
6abec6bc
AM
15042 if (stub_entry != NULL
15043 && (stub_entry->stub_type == ppc_stub_long_branch
15044 || stub_entry->stub_type == ppc_stub_plt_branch)
15045 && (r_type == R_PPC64_ADDR14_BRTAKEN
15046 || r_type == R_PPC64_ADDR14_BRNTAKEN
15047 || (relocation + addend - from + max_br_offset
15048 < 2 * max_br_offset)))
15049 /* Don't use the stub if this branch is in range. */
15050 stub_entry = NULL;
b25116a9 15051
05d0e962
AM
15052 if (stub_entry != NULL
15053 && (stub_entry->stub_type == ppc_stub_long_branch_notoc
15054 || stub_entry->stub_type == ppc_stub_long_branch_both
15055 || stub_entry->stub_type == ppc_stub_plt_branch_notoc
15056 || stub_entry->stub_type == ppc_stub_plt_branch_both)
15057 && (r_type != R_PPC64_REL24_NOTOC
15058 || ((fdh ? fdh->elf.other : sym->st_other)
15059 & STO_PPC64_LOCAL_MASK) == 1 << STO_PPC64_LOCAL_BIT)
15060 && (relocation + addend - from + max_br_offset
15061 < 2 * max_br_offset))
15062 stub_entry = NULL;
15063
15064 if (stub_entry != NULL
15065 && (stub_entry->stub_type == ppc_stub_long_branch_r2off
15066 || stub_entry->stub_type == ppc_stub_long_branch_both
15067 || stub_entry->stub_type == ppc_stub_plt_branch_r2off
15068 || stub_entry->stub_type == ppc_stub_plt_branch_both)
15069 && r_type == R_PPC64_REL24_NOTOC
15070 && (relocation + addend - from + max_br_offset
15071 < 2 * max_br_offset))
15072 stub_entry = NULL;
15073
b25116a9
AM
15074 if (stub_entry != NULL)
15075 {
15076 /* Munge up the value and addend so that we call the stub
15077 rather than the procedure directly. */
a4b6fadd
AM
15078 asection *stub_sec = stub_entry->group->stub_sec;
15079
15080 if (stub_entry->stub_type == ppc_stub_save_res)
15081 relocation += (stub_sec->output_offset
15082 + stub_sec->output_section->vma
15083 + stub_sec->size - htab->sfpr->size
15084 - htab->sfpr->output_offset
15085 - htab->sfpr->output_section->vma);
15086 else
15087 relocation = (stub_entry->stub_offset
15088 + stub_sec->output_offset
15089 + stub_sec->output_section->vma);
b25116a9 15090 addend = 0;
bc30df16 15091 reloc_dest = DEST_STUB;
3b421ab3 15092
05d0e962
AM
15093 if (((stub_entry->stub_type == ppc_stub_plt_call
15094 && ALWAYS_EMIT_R2SAVE)
15095 || stub_entry->stub_type == ppc_stub_plt_call_r2save
15096 || stub_entry->stub_type == ppc_stub_plt_call_both)
e81b4c93
AM
15097 && !(h != NULL
15098 && (h == htab->tls_get_addr_fd
15099 || h == htab->tls_get_addr)
15100 && htab->params->tls_get_addr_opt)
3b421ab3
AM
15101 && rel + 1 < relend
15102 && rel[1].r_offset == rel->r_offset + 4
15103 && ELF64_R_TYPE (rel[1].r_info) == R_PPC64_TOCSAVE)
15104 relocation += 4;
05d0e962
AM
15105 else if ((stub_entry->stub_type == ppc_stub_long_branch_both
15106 || stub_entry->stub_type == ppc_stub_plt_branch_both
15107 || stub_entry->stub_type == ppc_stub_plt_call_both)
15108 && r_type == R_PPC64_REL24_NOTOC)
15109 relocation += 4;
5663e321
AM
15110
15111 if (r_type == R_PPC64_REL24_NOTOC
15112 && (stub_entry->stub_type == ppc_stub_plt_call_notoc
15113 || stub_entry->stub_type == ppc_stub_plt_call_both))
15114 htab->notoc_plt = 1;
b25116a9
AM
15115 }
15116
15117 if (insn != 0)
15118 {
794e51c0 15119 if (is_isa_v2)
721956f4 15120 {
b25116a9
AM
15121 /* Set 'a' bit. This is 0b00010 in BO field for branch
15122 on CR(BI) insns (BO == 001at or 011at), and 0b01000
15123 for branch on CTR insns (BO == 1a00t or 1a01t). */
15124 if ((insn & (0x14 << 21)) == (0x04 << 21))
15125 insn |= 0x02 << 21;
15126 else if ((insn & (0x14 << 21)) == (0x10 << 21))
15127 insn |= 0x08 << 21;
15128 else
15129 break;
15130 }
15131 else
15132 {
15133 /* Invert 'y' bit if not the default. */
4cc603a5 15134 if ((bfd_signed_vma) (relocation + addend - from) < 0)
b25116a9 15135 insn ^= 0x01 << 21;
721956f4 15136 }
b25116a9 15137
95f0d0d2 15138 bfd_put_32 (input_bfd, insn, contents + rel->r_offset);
5bd4f169 15139 }
e86ce104 15140
06da1e8e
AM
15141 /* NOP out calls to undefined weak functions.
15142 We can thus call a weak function without first
15143 checking whether the function is defined. */
b25116a9 15144 else if (h != NULL
039b3fef 15145 && h->elf.root.type == bfd_link_hash_undefweak
766bc656 15146 && h->elf.dynindx == -1
05d0e962
AM
15147 && (r_type == R_PPC64_REL24
15148 || r_type == R_PPC64_REL24_NOTOC)
b25116a9 15149 && relocation == 0
4cc603a5 15150 && addend == 0)
e86ce104 15151 {
95f0d0d2 15152 bfd_put_32 (input_bfd, NOP, contents + rel->r_offset);
c316a17c 15153 goto copy_reloc;
e86ce104 15154 }
65f38f15 15155 break;
066f4018
AM
15156
15157 case R_PPC64_GOT16_DS:
15158 from = TOCstart + htab->sec_info[input_section->id].toc_off;
15159 if (relocation + addend - from + 0x8000 < 0x10000
15160 && SYMBOL_REFERENCES_LOCAL (info, &h->elf))
15161 {
15162 insn = bfd_get_32 (input_bfd, contents + (rel->r_offset & ~3));
15163 if ((insn & (0x3f << 26 | 0x3)) == 58u << 26 /* ld */)
15164 {
15165 insn += (14u << 26) - (58u << 26);
15166 bfd_put_32 (input_bfd, insn, contents + (rel->r_offset & ~3));
15167 r_type = R_PPC64_TOC16;
15168 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
15169 }
15170 }
15171 break;
15172
15173 case R_PPC64_GOT16_LO_DS:
15174 case R_PPC64_GOT16_HA:
15175 from = TOCstart + htab->sec_info[input_section->id].toc_off;
15176 if (relocation + addend - from + 0x80008000ULL < 0x100000000ULL
15177 && SYMBOL_REFERENCES_LOCAL (info, &h->elf))
15178 {
15179 insn = bfd_get_32 (input_bfd, contents + (rel->r_offset & ~3));
15180 if ((insn & (0x3f << 26 | 0x3)) == 58u << 26 /* ld */)
15181 {
15182 insn += (14u << 26) - (58u << 26);
15183 bfd_put_32 (input_bfd, insn, contents + (rel->r_offset & ~3));
15184 r_type = R_PPC64_TOC16_LO;
15185 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
15186 }
15187 else if ((insn & (0x3f << 26)) == 15u << 26 /* addis */)
15188 {
15189 r_type = R_PPC64_TOC16_HA;
15190 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
15191 }
15192 }
15193 break;
4a421c53
AM
15194
15195 case R_PPC64_GOT_PCREL34:
15196 from = (rel->r_offset
15197 + input_section->output_section->vma
15198 + input_section->output_offset);
15199 if (relocation - from + (1ULL << 33) < 1ULL << 34
15200 && SYMBOL_REFERENCES_LOCAL (info, &h->elf))
15201 {
15202 offset = rel->r_offset;
15203 pinsn = bfd_get_32 (input_bfd, contents + offset);
15204 pinsn <<= 32;
15205 pinsn |= bfd_get_32 (input_bfd, contents + offset + 4);
15206 if ((pinsn & ((-1ULL << 50) | (63ULL << 26)))
15207 == ((1ULL << 58) | (1ULL << 52) | (57ULL << 26) /* pld */))
15208 {
15209 /* Replace with paddi. */
15210 pinsn += (2ULL << 56) + (14ULL << 26) - (57ULL << 26);
15211 r_type = R_PPC64_PCREL34;
15212 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
15213 bfd_put_32 (input_bfd, pinsn >> 32, contents + offset);
15214 bfd_put_32 (input_bfd, pinsn, contents + offset + 4);
15215 goto pcrelopt;
15216 }
15217 }
15218 break;
15219
15220 case R_PPC64_PCREL34:
15221 if (SYMBOL_REFERENCES_LOCAL (info, &h->elf))
15222 {
15223 offset = rel->r_offset;
15224 pinsn = bfd_get_32 (input_bfd, contents + offset);
15225 pinsn <<= 32;
15226 pinsn |= bfd_get_32 (input_bfd, contents + offset + 4);
15227 if ((pinsn & ((-1ULL << 50) | (63ULL << 26)))
15228 == ((1ULL << 58) | (2ULL << 56) | (1ULL << 52)
15229 | (14ULL << 26) /* paddi */))
15230 {
15231 pcrelopt:
15232 if (rel + 1 < relend
15233 && rel[1].r_offset == offset
15234 && rel[1].r_info == ELF64_R_INFO (0, R_PPC64_PCREL_OPT))
15235 {
15236 bfd_vma off2 = rel[1].r_addend;
15237 if (off2 == 0)
15238 /* zero means next insn. */
15239 off2 = 8;
15240 off2 += offset;
15241 if (off2 + 4 <= input_section->size)
15242 {
15243 uint64_t pinsn2;
15244 pinsn2 = bfd_get_32 (input_bfd, contents + off2);
15245 pinsn2 <<= 32;
15246 if ((pinsn2 & (63ULL << 58)) == 1ULL << 58)
15247 break;
15248 if (xlate_pcrel_opt (&pinsn, &pinsn2))
15249 {
15250 bfd_put_32 (input_bfd, pinsn >> 32,
15251 contents + offset);
15252 bfd_put_32 (input_bfd, pinsn,
15253 contents + offset + 4);
15254 bfd_put_32 (input_bfd, pinsn2 >> 32,
15255 contents + off2);
15256 }
15257 }
15258 }
15259 }
15260 }
15261 break;
65f38f15 15262 }
5bd4f169 15263
65f38f15 15264 /* Set `addend'. */
411e1bfb 15265 tls_type = 0;
23cedd1d 15266 save_unresolved_reloc = unresolved_reloc;
65f38f15
AM
15267 switch (r_type)
15268 {
15269 default:
cf97bcb0
AM
15270 /* xgettext:c-format */
15271 _bfd_error_handler (_("%pB: %s unsupported"),
15272 input_bfd, ppc64_elf_howto_table[r_type]->name);
5bd4f169 15273
65f38f15 15274 bfd_set_error (bfd_error_bad_value);
b34976b6 15275 ret = FALSE;
c316a17c 15276 goto copy_reloc;
5bd4f169 15277
65f38f15 15278 case R_PPC64_NONE:
411e1bfb 15279 case R_PPC64_TLS:
727fc41e
AM
15280 case R_PPC64_TLSGD:
15281 case R_PPC64_TLSLD:
3b421ab3 15282 case R_PPC64_TOCSAVE:
04c9666a
AM
15283 case R_PPC64_GNU_VTINHERIT:
15284 case R_PPC64_GNU_VTENTRY:
006589cf 15285 case R_PPC64_ENTRY:
4a421c53 15286 case R_PPC64_PCREL_OPT:
c316a17c 15287 goto copy_reloc;
5bd4f169
AM
15288
15289 /* GOT16 relocations. Like an ADDR16 using the symbol's
15290 address in the GOT as relocation value instead of the
411e1bfb 15291 symbol's value itself. Also, create a GOT entry for the
5bd4f169 15292 symbol and put the symbol value there. */
411e1bfb
AM
15293 case R_PPC64_GOT_TLSGD16:
15294 case R_PPC64_GOT_TLSGD16_LO:
15295 case R_PPC64_GOT_TLSGD16_HI:
15296 case R_PPC64_GOT_TLSGD16_HA:
951fd09b 15297 tls_type = TLS_TLS | TLS_GD;
411e1bfb
AM
15298 goto dogot;
15299
15300 case R_PPC64_GOT_TLSLD16:
15301 case R_PPC64_GOT_TLSLD16_LO:
15302 case R_PPC64_GOT_TLSLD16_HI:
15303 case R_PPC64_GOT_TLSLD16_HA:
951fd09b 15304 tls_type = TLS_TLS | TLS_LD;
411e1bfb
AM
15305 goto dogot;
15306
15307 case R_PPC64_GOT_TPREL16_DS:
15308 case R_PPC64_GOT_TPREL16_LO_DS:
15309 case R_PPC64_GOT_TPREL16_HI:
15310 case R_PPC64_GOT_TPREL16_HA:
15311 tls_type = TLS_TLS | TLS_TPREL;
15312 goto dogot;
15313
15314 case R_PPC64_GOT_DTPREL16_DS:
15315 case R_PPC64_GOT_DTPREL16_LO_DS:
15316 case R_PPC64_GOT_DTPREL16_HI:
15317 case R_PPC64_GOT_DTPREL16_HA:
15318 tls_type = TLS_TLS | TLS_DTPREL;
15319 goto dogot;
15320
65f38f15
AM
15321 case R_PPC64_GOT16:
15322 case R_PPC64_GOT16_LO:
15323 case R_PPC64_GOT16_HI:
15324 case R_PPC64_GOT16_HA:
15325 case R_PPC64_GOT16_DS:
15326 case R_PPC64_GOT16_LO_DS:
5663e321 15327 case R_PPC64_GOT_PCREL34:
411e1bfb 15328 dogot:
5bd4f169
AM
15329 {
15330 /* Relocation is to the entry for this symbol in the global
15331 offset table. */
e717da7e 15332 asection *got;
d881513a 15333 bfd_vma *offp;
5bd4f169 15334 bfd_vma off;
d881513a 15335 unsigned long indx = 0;
927be08e 15336 struct got_entry *ent;
5663e321
AM
15337 bfd_vma sym_addend = orig_rel.r_addend;
15338
15339 if (r_type == R_PPC64_GOT_PCREL34)
15340 sym_addend = 0;
65f38f15 15341
d881513a
AM
15342 if (tls_type == (TLS_TLS | TLS_LD)
15343 && (h == NULL
f5385ebf 15344 || !h->elf.def_dynamic))
927be08e 15345 ent = ppc64_tlsld_got (input_bfd);
411e1bfb 15346 else
5bd4f169 15347 {
d881513a
AM
15348 if (h != NULL)
15349 {
f0158f44
AM
15350 if (!htab->elf.dynamic_sections_created
15351 || h->elf.dynindx == -1
15352 || SYMBOL_REFERENCES_LOCAL (info, &h->elf)
21d68fcd 15353 || UNDEFWEAK_NO_DYNAMIC_RELOC (info, &h->elf))
d881513a
AM
15354 /* This is actually a static link, or it is a
15355 -Bsymbolic link and the symbol is defined
15356 locally, or the symbol was forced to be local
15357 because of a version file. */
15358 ;
15359 else
15360 {
039b3fef 15361 indx = h->elf.dynindx;
d881513a
AM
15362 unresolved_reloc = FALSE;
15363 }
039b3fef 15364 ent = h->elf.got.glist;
d881513a 15365 }
411e1bfb 15366 else
5bd4f169 15367 {
d881513a
AM
15368 if (local_got_ents == NULL)
15369 abort ();
15370 ent = local_got_ents[r_symndx];
5bd4f169 15371 }
d881513a
AM
15372
15373 for (; ent != NULL; ent = ent->next)
5663e321 15374 if (ent->addend == sym_addend
e717da7e 15375 && ent->owner == input_bfd
d881513a
AM
15376 && ent->tls_type == tls_type)
15377 break;
5bd4f169 15378 }
411e1bfb 15379
927be08e
AM
15380 if (ent == NULL)
15381 abort ();
15382 if (ent->is_indirect)
15383 ent = ent->got.ent;
15384 offp = &ent->got.offset;
15385 got = ppc64_elf_tdata (ent->owner)->got;
e717da7e
AM
15386 if (got == NULL)
15387 abort ();
15388
411e1bfb
AM
15389 /* The offset must always be a multiple of 8. We use the
15390 least significant bit to record whether we have already
15391 processed this entry. */
d881513a 15392 off = *offp;
411e1bfb
AM
15393 if ((off & 1) != 0)
15394 off &= ~1;
5bd4f169
AM
15395 else
15396 {
411e1bfb
AM
15397 /* Generate relocs for the dynamic linker, except in
15398 the case of TLSLD where we'll use one entry per
15399 module. */
25f23106
AM
15400 asection *relgot;
15401 bfd_boolean ifunc;
e717da7e 15402
d881513a 15403 *offp = off | 1;
25f23106
AM
15404 relgot = NULL;
15405 ifunc = (h != NULL
15406 ? h->elf.type == STT_GNU_IFUNC
15407 : ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC);
19e08130 15408 if (ifunc)
82e66161
AM
15409 {
15410 relgot = htab->elf.irelplt;
15411 if (indx == 0)
15412 htab->local_ifunc_resolver = 1;
15413 else if (is_static_defined (&h->elf))
15414 htab->maybe_local_ifunc_resolver = 1;
15415 }
f0158f44
AM
15416 else if (indx != 0
15417 || (bfd_link_pic (info)
15418 && (h == NULL
21d68fcd 15419 || !UNDEFWEAK_NO_DYNAMIC_RELOC (info, &h->elf)
f0158f44 15420 || (tls_type == (TLS_TLS | TLS_LD)
f15d0b54
AM
15421 && !h->elf.def_dynamic))
15422 && !(tls_type == (TLS_TLS | TLS_TPREL)
15423 && bfd_link_executable (info)
15424 && SYMBOL_REFERENCES_LOCAL (info, &h->elf))))
19e08130 15425 relgot = ppc64_elf_tdata (ent->owner)->relgot;
25f23106 15426 if (relgot != NULL)
5bd4f169 15427 {
e717da7e
AM
15428 outrel.r_offset = (got->output_section->vma
15429 + got->output_offset
411e1bfb 15430 + off);
5663e321 15431 outrel.r_addend = sym_addend;
d881513a 15432 if (tls_type & (TLS_LD | TLS_GD))
5bd4f169 15433 {
411e1bfb 15434 outrel.r_addend = 0;
e515b051 15435 outrel.r_info = ELF64_R_INFO (indx, R_PPC64_DTPMOD64);
d881513a
AM
15436 if (tls_type == (TLS_TLS | TLS_GD))
15437 {
e717da7e
AM
15438 loc = relgot->contents;
15439 loc += (relgot->reloc_count++
d881513a
AM
15440 * sizeof (Elf64_External_Rela));
15441 bfd_elf64_swap_reloca_out (output_bfd,
15442 &outrel, loc);
e515b051 15443 outrel.r_offset += 8;
5663e321 15444 outrel.r_addend = sym_addend;
d881513a
AM
15445 outrel.r_info
15446 = ELF64_R_INFO (indx, R_PPC64_DTPREL64);
d881513a 15447 }
411e1bfb 15448 }
951fd09b 15449 else if (tls_type == (TLS_TLS | TLS_DTPREL))
411e1bfb 15450 outrel.r_info = ELF64_R_INFO (indx, R_PPC64_DTPREL64);
951fd09b 15451 else if (tls_type == (TLS_TLS | TLS_TPREL))
411e1bfb 15452 outrel.r_info = ELF64_R_INFO (indx, R_PPC64_TPREL64);
25f23106
AM
15453 else if (indx != 0)
15454 outrel.r_info = ELF64_R_INFO (indx, R_PPC64_GLOB_DAT);
15455 else
81407a69 15456 {
25f23106
AM
15457 if (ifunc)
15458 outrel.r_info = ELF64_R_INFO (0, R_PPC64_IRELATIVE);
15459 else
15460 outrel.r_info = ELF64_R_INFO (0, R_PPC64_RELATIVE);
81407a69
AM
15461
15462 /* Write the .got section contents for the sake
15463 of prelink. */
e717da7e 15464 loc = got->contents + off;
23fbd6fa
JJ
15465 bfd_put_64 (output_bfd, outrel.r_addend + relocation,
15466 loc);
81407a69 15467 }
81407a69
AM
15468
15469 if (indx == 0 && tls_type != (TLS_TLS | TLS_LD))
e515b051
AM
15470 {
15471 outrel.r_addend += relocation;
15472 if (tls_type & (TLS_GD | TLS_DTPREL | TLS_TPREL))
989f9879
AM
15473 {
15474 if (htab->elf.tls_sec == NULL)
15475 outrel.r_addend = 0;
15476 else
15477 outrel.r_addend -= htab->elf.tls_sec->vma;
15478 }
e515b051 15479 }
e717da7e
AM
15480 loc = relgot->contents;
15481 loc += (relgot->reloc_count++
411e1bfb
AM
15482 * sizeof (Elf64_External_Rela));
15483 bfd_elf64_swap_reloca_out (output_bfd, &outrel, loc);
15484 }
15485
ad8e1ba5 15486 /* Init the .got section contents here if we're not
81407a69 15487 emitting a reloc. */
d881513a 15488 else
411e1bfb 15489 {
5663e321 15490 relocation += sym_addend;
f0158f44 15491 if (tls_type != 0)
411e1bfb 15492 {
989f9879
AM
15493 if (htab->elf.tls_sec == NULL)
15494 relocation = 0;
15495 else
15496 {
f0158f44
AM
15497 if (tls_type & TLS_LD)
15498 relocation = 0;
15499 else
15500 relocation -= htab->elf.tls_sec->vma + DTP_OFFSET;
676ee2b5 15501 if (tls_type & TLS_TPREL)
989f9879
AM
15502 relocation += DTP_OFFSET - TP_OFFSET;
15503 }
5bd4f169 15504
f0158f44 15505 if (tls_type & (TLS_GD | TLS_LD))
7b609f53
AM
15506 {
15507 bfd_put_64 (output_bfd, relocation,
e717da7e 15508 got->contents + off + 8);
676ee2b5 15509 relocation = 1;
7b609f53 15510 }
411e1bfb
AM
15511 }
15512 bfd_put_64 (output_bfd, relocation,
e717da7e 15513 got->contents + off);
5bd4f169
AM
15514 }
15515 }
15516
65f38f15
AM
15517 if (off >= (bfd_vma) -2)
15518 abort ();
15519
bf102f86 15520 relocation = got->output_section->vma + got->output_offset + off;
5663e321
AM
15521 if (r_type != R_PPC64_GOT_PCREL34)
15522 addend = -(TOCstart + htab->sec_info[input_section->id].toc_off);
5bd4f169 15523 }
65f38f15
AM
15524 break;
15525
15526 case R_PPC64_PLT16_HA:
15527 case R_PPC64_PLT16_HI:
15528 case R_PPC64_PLT16_LO:
08be3224 15529 case R_PPC64_PLT16_LO_DS:
5663e321
AM
15530 case R_PPC64_PLT_PCREL34:
15531 case R_PPC64_PLT_PCREL34_NOTOC:
65f38f15
AM
15532 case R_PPC64_PLT32:
15533 case R_PPC64_PLT64:
23cedd1d 15534 case R_PPC64_PLTSEQ:
5663e321 15535 case R_PPC64_PLTSEQ_NOTOC:
23cedd1d 15536 case R_PPC64_PLTCALL:
5663e321 15537 case R_PPC64_PLTCALL_NOTOC:
65f38f15
AM
15538 /* Relocation is to the entry for this symbol in the
15539 procedure linkage table. */
23cedd1d 15540 unresolved_reloc = TRUE;
cbf95972
AM
15541 {
15542 struct plt_entry **plt_list = NULL;
15543 if (h != NULL)
15544 plt_list = &h->elf.plt.plist;
15545 else if (local_got_ents != NULL)
15546 {
15547 struct plt_entry **local_plt = (struct plt_entry **)
15548 (local_got_ents + symtab_hdr->sh_info);
2d7ad24e 15549 plt_list = local_plt + r_symndx;
cbf95972
AM
15550 }
15551 if (plt_list)
15552 {
15553 struct plt_entry *ent;
5663e321
AM
15554 bfd_vma sym_addend = orig_rel.r_addend;
15555
15556 if (r_type == R_PPC64_PLT_PCREL34
15557 || r_type == R_PPC64_PLT_PCREL34_NOTOC)
15558 sym_addend = 0;
65f38f15 15559
cbf95972
AM
15560 for (ent = *plt_list; ent != NULL; ent = ent->next)
15561 if (ent->plt.offset != (bfd_vma) -1
5663e321 15562 && ent->addend == sym_addend)
cbf95972
AM
15563 {
15564 asection *plt;
08be3224 15565 bfd_vma got;
cbf95972
AM
15566
15567 plt = htab->elf.splt;
15568 if (!htab->elf.dynamic_sections_created
15569 || h == NULL
15570 || h->elf.dynindx == -1)
2d7ad24e
AM
15571 {
15572 if (h != NULL
15573 ? h->elf.type == STT_GNU_IFUNC
15574 : ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC)
15575 plt = htab->elf.iplt;
15576 else
15577 plt = htab->pltlocal;
15578 }
15579 relocation = (plt->output_section->vma
15580 + plt->output_offset
15581 + ent->plt.offset);
08be3224 15582 if (r_type == R_PPC64_PLT16_HA
2cdcc330
AM
15583 || r_type == R_PPC64_PLT16_HI
15584 || r_type == R_PPC64_PLT16_LO
15585 || r_type == R_PPC64_PLT16_LO_DS)
08be3224
AM
15586 {
15587 got = (elf_gp (output_bfd)
15588 + htab->sec_info[input_section->id].toc_off);
15589 relocation -= got;
15590 }
5663e321
AM
15591 if (r_type != R_PPC64_PLT_PCREL34
15592 && r_type != R_PPC64_PLT_PCREL34_NOTOC)
15593 addend = 0;
cbf95972
AM
15594 unresolved_reloc = FALSE;
15595 break;
15596 }
15597 }
15598 }
65f38f15 15599 break;
5bd4f169 15600
0b13192e
AM
15601 case R_PPC64_TOC:
15602 /* Relocation value is TOC base. */
15603 relocation = TOCstart;
cf35638d 15604 if (r_symndx == STN_UNDEF)
6f20ed8a 15605 relocation += htab->sec_info[input_section->id].toc_off;
8517fae7
AM
15606 else if (unresolved_reloc)
15607 ;
6f20ed8a
AM
15608 else if (sec != NULL && sec->id < htab->sec_info_arr_size)
15609 relocation += htab->sec_info[sec->id].toc_off;
0b13192e
AM
15610 else
15611 unresolved_reloc = TRUE;
ab96bf03 15612 goto dodyn;
0b13192e 15613
5bd4f169
AM
15614 /* TOC16 relocs. We want the offset relative to the TOC base,
15615 which is the address of the start of the TOC plus 0x8000.
15616 The TOC consists of sections .got, .toc, .tocbss, and .plt,
15617 in this order. */
65f38f15
AM
15618 case R_PPC64_TOC16:
15619 case R_PPC64_TOC16_LO:
15620 case R_PPC64_TOC16_HI:
15621 case R_PPC64_TOC16_DS:
15622 case R_PPC64_TOC16_LO_DS:
15623 case R_PPC64_TOC16_HA:
6f20ed8a 15624 addend -= TOCstart + htab->sec_info[input_section->id].toc_off;
5bd4f169
AM
15625 break;
15626
15627 /* Relocate against the beginning of the section. */
65f38f15
AM
15628 case R_PPC64_SECTOFF:
15629 case R_PPC64_SECTOFF_LO:
15630 case R_PPC64_SECTOFF_HI:
15631 case R_PPC64_SECTOFF_DS:
15632 case R_PPC64_SECTOFF_LO_DS:
15633 case R_PPC64_SECTOFF_HA:
4ce794b7 15634 if (sec != NULL)
65f38f15 15635 addend -= sec->output_section->vma;
5bd4f169
AM
15636 break;
15637
25f23106
AM
15638 case R_PPC64_REL16:
15639 case R_PPC64_REL16_LO:
15640 case R_PPC64_REL16_HI:
15641 case R_PPC64_REL16_HA:
4a969973
AM
15642 case R_PPC64_REL16_HIGH:
15643 case R_PPC64_REL16_HIGHA:
15644 case R_PPC64_REL16_HIGHER:
15645 case R_PPC64_REL16_HIGHERA:
15646 case R_PPC64_REL16_HIGHEST:
15647 case R_PPC64_REL16_HIGHESTA:
5663e321
AM
15648 case R_PPC64_REL16_HIGHER34:
15649 case R_PPC64_REL16_HIGHERA34:
15650 case R_PPC64_REL16_HIGHEST34:
15651 case R_PPC64_REL16_HIGHESTA34:
a680de9a 15652 case R_PPC64_REL16DX_HA:
721956f4
AM
15653 case R_PPC64_REL14:
15654 case R_PPC64_REL14_BRNTAKEN:
15655 case R_PPC64_REL14_BRTAKEN:
5d1634d7 15656 case R_PPC64_REL24:
05d0e962 15657 case R_PPC64_REL24_NOTOC:
5663e321
AM
15658 case R_PPC64_PCREL34:
15659 case R_PPC64_PCREL28:
5d1634d7
AM
15660 break;
15661
411e1bfb
AM
15662 case R_PPC64_TPREL16:
15663 case R_PPC64_TPREL16_LO:
15664 case R_PPC64_TPREL16_HI:
15665 case R_PPC64_TPREL16_HA:
15666 case R_PPC64_TPREL16_DS:
15667 case R_PPC64_TPREL16_LO_DS:
f9c6b907
AM
15668 case R_PPC64_TPREL16_HIGH:
15669 case R_PPC64_TPREL16_HIGHA:
411e1bfb
AM
15670 case R_PPC64_TPREL16_HIGHER:
15671 case R_PPC64_TPREL16_HIGHERA:
15672 case R_PPC64_TPREL16_HIGHEST:
15673 case R_PPC64_TPREL16_HIGHESTA:
766bc656
AM
15674 if (h != NULL
15675 && h->elf.root.type == bfd_link_hash_undefweak
15676 && h->elf.dynindx == -1)
15677 {
15678 /* Make this relocation against an undefined weak symbol
15679 resolve to zero. This is really just a tweak, since
15680 code using weak externs ought to check that they are
15681 defined before using them. */
15682 bfd_byte *p = contents + rel->r_offset - d_offset;
15683
95f0d0d2 15684 insn = bfd_get_32 (input_bfd, p);
766bc656
AM
15685 insn = _bfd_elf_ppc_at_tprel_transform (insn, 13);
15686 if (insn != 0)
95f0d0d2 15687 bfd_put_32 (input_bfd, insn, p);
766bc656
AM
15688 break;
15689 }
989f9879
AM
15690 if (htab->elf.tls_sec != NULL)
15691 addend -= htab->elf.tls_sec->vma + TP_OFFSET;
7c8bbca5
AM
15692 /* The TPREL16 relocs shouldn't really be used in shared
15693 libs or with non-local symbols as that will result in
15694 DT_TEXTREL being set, but support them anyway. */
15695 goto dodyn;
411e1bfb
AM
15696
15697 case R_PPC64_DTPREL16:
15698 case R_PPC64_DTPREL16_LO:
15699 case R_PPC64_DTPREL16_HI:
15700 case R_PPC64_DTPREL16_HA:
15701 case R_PPC64_DTPREL16_DS:
15702 case R_PPC64_DTPREL16_LO_DS:
f9c6b907
AM
15703 case R_PPC64_DTPREL16_HIGH:
15704 case R_PPC64_DTPREL16_HIGHA:
411e1bfb
AM
15705 case R_PPC64_DTPREL16_HIGHER:
15706 case R_PPC64_DTPREL16_HIGHERA:
15707 case R_PPC64_DTPREL16_HIGHEST:
15708 case R_PPC64_DTPREL16_HIGHESTA:
989f9879
AM
15709 if (htab->elf.tls_sec != NULL)
15710 addend -= htab->elf.tls_sec->vma + DTP_OFFSET;
411e1bfb
AM
15711 break;
15712
45965137
AM
15713 case R_PPC64_ADDR64_LOCAL:
15714 addend += PPC64_LOCAL_ENTRY_OFFSET (h != NULL
15715 ? h->elf.other
15716 : sym->st_other);
15717 break;
15718
e515b051
AM
15719 case R_PPC64_DTPMOD64:
15720 relocation = 1;
15721 addend = 0;
15722 goto dodyn;
15723
411e1bfb 15724 case R_PPC64_TPREL64:
989f9879
AM
15725 if (htab->elf.tls_sec != NULL)
15726 addend -= htab->elf.tls_sec->vma + TP_OFFSET;
411e1bfb
AM
15727 goto dodyn;
15728
15729 case R_PPC64_DTPREL64:
989f9879
AM
15730 if (htab->elf.tls_sec != NULL)
15731 addend -= htab->elf.tls_sec->vma + DTP_OFFSET;
1a0670f3 15732 /* Fall through. */
411e1bfb 15733
65f38f15
AM
15734 /* Relocations that may need to be propagated if this is a
15735 dynamic object. */
04c9666a 15736 case R_PPC64_REL30:
65f38f15
AM
15737 case R_PPC64_REL32:
15738 case R_PPC64_REL64:
15739 case R_PPC64_ADDR14:
15740 case R_PPC64_ADDR14_BRNTAKEN:
15741 case R_PPC64_ADDR14_BRTAKEN:
15742 case R_PPC64_ADDR16:
15743 case R_PPC64_ADDR16_DS:
15744 case R_PPC64_ADDR16_HA:
15745 case R_PPC64_ADDR16_HI:
f9c6b907
AM
15746 case R_PPC64_ADDR16_HIGH:
15747 case R_PPC64_ADDR16_HIGHA:
65f38f15
AM
15748 case R_PPC64_ADDR16_HIGHER:
15749 case R_PPC64_ADDR16_HIGHERA:
15750 case R_PPC64_ADDR16_HIGHEST:
15751 case R_PPC64_ADDR16_HIGHESTA:
15752 case R_PPC64_ADDR16_LO:
15753 case R_PPC64_ADDR16_LO_DS:
5663e321
AM
15754 case R_PPC64_ADDR16_HIGHER34:
15755 case R_PPC64_ADDR16_HIGHERA34:
15756 case R_PPC64_ADDR16_HIGHEST34:
15757 case R_PPC64_ADDR16_HIGHESTA34:
65f38f15 15758 case R_PPC64_ADDR24:
65f38f15
AM
15759 case R_PPC64_ADDR32:
15760 case R_PPC64_ADDR64:
15761 case R_PPC64_UADDR16:
15762 case R_PPC64_UADDR32:
15763 case R_PPC64_UADDR64:
5663e321
AM
15764 case R_PPC64_D34:
15765 case R_PPC64_D34_LO:
15766 case R_PPC64_D34_HI30:
15767 case R_PPC64_D34_HA30:
15768 case R_PPC64_D28:
411e1bfb 15769 dodyn:
5d1634d7 15770 if ((input_section->flags & SEC_ALLOC) == 0)
ec338859
AM
15771 break;
15772
41bd81ab
AM
15773 if (NO_OPD_RELOCS && is_opd)
15774 break;
15775
8a9e8e72 15776 if (bfd_link_pic (info)
b1b07054
AM
15777 ? ((h == NULL
15778 || h->dyn_relocs != NULL)
15779 && ((h != NULL && pc_dynrelocs (h))
15780 || must_be_dyn_reloc (info, r_type)))
8a9e8e72
AM
15781 : (h != NULL
15782 ? h->dyn_relocs != NULL
d311bc8b 15783 : ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC))
65f38f15 15784 {
b34976b6 15785 bfd_boolean skip, relocate;
65f38f15 15786 asection *sreloc;
1cf1f670 15787 bfd_vma out_off;
82e66161 15788 long indx = 0;
65f38f15
AM
15789
15790 /* When generating a dynamic object, these relocations
15791 are copied into the output file to be resolved at run
15792 time. */
15793
b34976b6
AM
15794 skip = FALSE;
15795 relocate = FALSE;
65f38f15 15796
1cf1f670
AM
15797 out_off = _bfd_elf_section_offset (output_bfd, info,
15798 input_section, rel->r_offset);
15799 if (out_off == (bfd_vma) -1)
b34976b6 15800 skip = TRUE;
1cf1f670 15801 else if (out_off == (bfd_vma) -2)
b34976b6 15802 skip = TRUE, relocate = TRUE;
1cf1f670
AM
15803 out_off += (input_section->output_section->vma
15804 + input_section->output_offset);
15805 outrel.r_offset = out_off;
411e1bfb 15806 outrel.r_addend = rel->r_addend;
65f38f15 15807
1cf1f670
AM
15808 /* Optimize unaligned reloc use. */
15809 if ((r_type == R_PPC64_ADDR64 && (out_off & 7) != 0)
15810 || (r_type == R_PPC64_UADDR64 && (out_off & 7) == 0))
15811 r_type ^= R_PPC64_ADDR64 ^ R_PPC64_UADDR64;
15812 else if ((r_type == R_PPC64_ADDR32 && (out_off & 3) != 0)
15813 || (r_type == R_PPC64_UADDR32 && (out_off & 3) == 0))
15814 r_type ^= R_PPC64_ADDR32 ^ R_PPC64_UADDR32;
15815 else if ((r_type == R_PPC64_ADDR16 && (out_off & 1) != 0)
15816 || (r_type == R_PPC64_UADDR16 && (out_off & 1) == 0))
15817 r_type ^= R_PPC64_ADDR16 ^ R_PPC64_UADDR16;
15818
65f38f15 15819 if (skip)
0bb2d96a 15820 memset (&outrel, 0, sizeof outrel);
afe397ea 15821 else if (!SYMBOL_REFERENCES_LOCAL (info, &h->elf)
0b13192e
AM
15822 && !is_opd
15823 && r_type != R_PPC64_TOC)
14acf4dc 15824 {
82e66161
AM
15825 indx = h->elf.dynindx;
15826 BFD_ASSERT (indx != -1);
15827 outrel.r_info = ELF64_R_INFO (indx, r_type);
14acf4dc 15828 }
65f38f15
AM
15829 else
15830 {
41bd81ab
AM
15831 /* This symbol is local, or marked to become local,
15832 or this is an opd section reloc which must point
15833 at a local function. */
65f38f15 15834 outrel.r_addend += relocation;
e86ce104 15835 if (r_type == R_PPC64_ADDR64 || r_type == R_PPC64_TOC)
65f38f15 15836 {
3fad3c7c 15837 if (is_opd && h != NULL)
afbe61cf
AM
15838 {
15839 /* Lie about opd entries. This case occurs
15840 when building shared libraries and we
15841 reference a function in another shared
3fad3c7c
AM
15842 lib. The same thing happens for a weak
15843 definition in an application that's
15844 overridden by a strong definition in a
15845 shared lib. (I believe this is a generic
15846 bug in binutils handling of weak syms.)
15847 In these cases we won't use the opd
1e2f5b6e 15848 entry in this lib. */
b34976b6 15849 unresolved_reloc = FALSE;
afbe61cf 15850 }
25f23106
AM
15851 if (!is_opd
15852 && r_type == R_PPC64_ADDR64
15853 && (h != NULL
15854 ? h->elf.type == STT_GNU_IFUNC
15855 : ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC))
15856 outrel.r_info = ELF64_R_INFO (0, R_PPC64_IRELATIVE);
15857 else
15858 {
15859 outrel.r_info = ELF64_R_INFO (0, R_PPC64_RELATIVE);
81407a69 15860
25f23106
AM
15861 /* We need to relocate .opd contents for ld.so.
15862 Prelink also wants simple and consistent rules
15863 for relocs. This make all RELATIVE relocs have
15864 *r_offset equal to r_addend. */
15865 relocate = TRUE;
15866 }
65f38f15
AM
15867 }
15868 else
15869 {
25f23106
AM
15870 if (h != NULL
15871 ? h->elf.type == STT_GNU_IFUNC
15872 : ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC)
15873 {
25f53a85 15874 info->callbacks->einfo
695344c0 15875 /* xgettext:c-format */
174d0a74 15876 (_("%H: %s for indirect "
c1c8c1ef 15877 "function `%pT' unsupported\n"),
25f53a85 15878 input_bfd, input_section, rel->r_offset,
25f23106
AM
15879 ppc64_elf_howto_table[r_type]->name,
15880 sym_name);
15881 ret = FALSE;
15882 }
cf35638d 15883 else if (r_symndx == STN_UNDEF || bfd_is_abs_section (sec))
65f38f15
AM
15884 ;
15885 else if (sec == NULL || sec->owner == NULL)
15886 {
15887 bfd_set_error (bfd_error_bad_value);
b34976b6 15888 return FALSE;
65f38f15
AM
15889 }
15890 else
15891 {
15892 asection *osec;
15893
15894 osec = sec->output_section;
15895 indx = elf_section_data (osec)->dynindx;
15896
74541ad4
AM
15897 if (indx == 0)
15898 {
15899 if ((osec->flags & SEC_READONLY) == 0
15900 && htab->elf.data_index_section != NULL)
15901 osec = htab->elf.data_index_section;
15902 else
15903 osec = htab->elf.text_index_section;
15904 indx = elf_section_data (osec)->dynindx;
15905 }
15906 BFD_ASSERT (indx != 0);
15907
65f38f15
AM
15908 /* We are turning this relocation into one
15909 against a section symbol, so subtract out
15910 the output section's address but not the
15911 offset of the input section in the output
15912 section. */
15913 outrel.r_addend -= osec->vma;
15914 }
15915
15916 outrel.r_info = ELF64_R_INFO (indx, r_type);
15917 }
15918 }
15919
15920 sreloc = elf_section_data (input_section)->sreloc;
19e08130
AM
15921 if (h != NULL
15922 ? h->elf.type == STT_GNU_IFUNC
15923 : ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC)
82e66161
AM
15924 {
15925 sreloc = htab->elf.irelplt;
15926 if (indx == 0)
15927 htab->local_ifunc_resolver = 1;
15928 else if (is_static_defined (&h->elf))
15929 htab->maybe_local_ifunc_resolver = 1;
15930 }
65f38f15
AM
15931 if (sreloc == NULL)
15932 abort ();
15933
dfbb6ac9
AM
15934 if (sreloc->reloc_count * sizeof (Elf64_External_Rela)
15935 >= sreloc->size)
15936 abort ();
947216bf
AM
15937 loc = sreloc->contents;
15938 loc += sreloc->reloc_count++ * sizeof (Elf64_External_Rela);
65f38f15
AM
15939 bfd_elf64_swap_reloca_out (output_bfd, &outrel, loc);
15940
15941 /* If this reloc is against an external symbol, it will
15942 be computed at runtime, so there's no need to do
81407a69
AM
15943 anything now. However, for the sake of prelink ensure
15944 that the section contents are a known value. */
2cdcc330 15945 if (!relocate)
81407a69
AM
15946 {
15947 unresolved_reloc = FALSE;
15948 /* The value chosen here is quite arbitrary as ld.so
15949 ignores section contents except for the special
15950 case of .opd where the contents might be accessed
15951 before relocation. Choose zero, as that won't
15952 cause reloc overflow. */
15953 relocation = 0;
15954 addend = 0;
15955 /* Use *r_offset == r_addend for R_PPC64_ADDR64 relocs
15956 to improve backward compatibility with older
15957 versions of ld. */
15958 if (r_type == R_PPC64_ADDR64)
15959 addend = outrel.r_addend;
15960 /* Adjust pc_relative relocs to have zero in *r_offset. */
4ce794b7 15961 else if (ppc64_elf_howto_table[r_type]->pc_relative)
f0158f44 15962 addend = outrel.r_offset;
81407a69 15963 }
65f38f15 15964 }
5bd4f169
AM
15965 break;
15966
65f38f15
AM
15967 case R_PPC64_COPY:
15968 case R_PPC64_GLOB_DAT:
15969 case R_PPC64_JMP_SLOT:
25f23106 15970 case R_PPC64_JMP_IREL:
65f38f15
AM
15971 case R_PPC64_RELATIVE:
15972 /* We shouldn't ever see these dynamic relocs in relocatable
15973 files. */
ae9a127f 15974 /* Fall through. */
65f38f15
AM
15975
15976 case R_PPC64_PLTGOT16:
15977 case R_PPC64_PLTGOT16_DS:
15978 case R_PPC64_PLTGOT16_HA:
15979 case R_PPC64_PLTGOT16_HI:
15980 case R_PPC64_PLTGOT16_LO:
15981 case R_PPC64_PLTGOT16_LO_DS:
15982 case R_PPC64_PLTREL32:
15983 case R_PPC64_PLTREL64:
15984 /* These ones haven't been implemented yet. */
15985
25f53a85 15986 info->callbacks->einfo
695344c0 15987 /* xgettext:c-format */
c1c8c1ef 15988 (_("%P: %pB: %s is not supported for `%pT'\n"),
d003868e 15989 input_bfd,
4ce794b7 15990 ppc64_elf_howto_table[r_type]->name, sym_name);
5bd4f169
AM
15991
15992 bfd_set_error (bfd_error_invalid_operation);
b34976b6 15993 ret = FALSE;
c316a17c 15994 goto copy_reloc;
65f38f15 15995 }
5bd4f169 15996
67f0cbdb
AM
15997 /* Multi-instruction sequences that access the TOC can be
15998 optimized, eg. addis ra,r2,0; addi rb,ra,x;
07d6d2b8 15999 to nop; addi rb,r2,x; */
67f0cbdb
AM
16000 switch (r_type)
16001 {
16002 default:
16003 break;
16004
16005 case R_PPC64_GOT_TLSLD16_HI:
16006 case R_PPC64_GOT_TLSGD16_HI:
16007 case R_PPC64_GOT_TPREL16_HI:
16008 case R_PPC64_GOT_DTPREL16_HI:
16009 case R_PPC64_GOT16_HI:
16010 case R_PPC64_TOC16_HI:
16011 /* These relocs would only be useful if building up an
16012 offset to later add to r2, perhaps in an indexed
16013 addressing mode instruction. Don't try to optimize.
16014 Unfortunately, the possibility of someone building up an
16015 offset like this or even with the HA relocs, means that
16016 we need to check the high insn when optimizing the low
16017 insn. */
16018 break;
16019
5663e321
AM
16020 case R_PPC64_PLTCALL_NOTOC:
16021 if (!unresolved_reloc)
16022 htab->notoc_plt = 1;
16023 /* Fall through. */
23cedd1d
AM
16024 case R_PPC64_PLTCALL:
16025 if (unresolved_reloc)
16026 {
16027 /* No plt entry. Make this into a direct call. */
16028 bfd_byte *p = contents + rel->r_offset;
16029 insn = bfd_get_32 (input_bfd, p);
16030 insn &= 1;
16031 bfd_put_32 (input_bfd, B_DOT | insn, p);
5663e321
AM
16032 if (r_type == R_PPC64_PLTCALL)
16033 bfd_put_32 (input_bfd, NOP, p + 4);
23cedd1d
AM
16034 unresolved_reloc = save_unresolved_reloc;
16035 r_type = R_PPC64_REL24;
16036 }
16037 break;
16038
5663e321 16039 case R_PPC64_PLTSEQ_NOTOC:
23cedd1d
AM
16040 case R_PPC64_PLTSEQ:
16041 if (unresolved_reloc)
16042 {
16043 unresolved_reloc = FALSE;
16044 goto nop_it;
16045 }
16046 break;
16047
5663e321
AM
16048 case R_PPC64_PLT_PCREL34_NOTOC:
16049 if (!unresolved_reloc)
16050 htab->notoc_plt = 1;
16051 /* Fall through. */
16052 case R_PPC64_PLT_PCREL34:
16053 if (unresolved_reloc)
16054 {
16055 bfd_byte *p = contents + rel->r_offset;
16056 bfd_put_32 (input_bfd, PNOP >> 32, p);
16057 bfd_put_32 (input_bfd, PNOP, p + 4);
16058 unresolved_reloc = FALSE;
16059 goto copy_reloc;
16060 }
16061 break;
16062
23cedd1d
AM
16063 case R_PPC64_PLT16_HA:
16064 if (unresolved_reloc)
16065 {
16066 unresolved_reloc = FALSE;
16067 goto nop_it;
16068 }
16069 /* Fall through. */
67f0cbdb
AM
16070 case R_PPC64_GOT_TLSLD16_HA:
16071 case R_PPC64_GOT_TLSGD16_HA:
16072 case R_PPC64_GOT_TPREL16_HA:
16073 case R_PPC64_GOT_DTPREL16_HA:
16074 case R_PPC64_GOT16_HA:
16075 case R_PPC64_TOC16_HA:
98528052 16076 if (htab->do_toc_opt && relocation + addend + 0x8000 < 0x10000
560c8763 16077 && !ppc64_elf_tdata (input_bfd)->unexpected_toc_insn)
98528052 16078 {
23cedd1d
AM
16079 bfd_byte *p;
16080 nop_it:
16081 p = contents + (rel->r_offset & ~3);
98528052 16082 bfd_put_32 (input_bfd, NOP, p);
d830549d 16083 goto copy_reloc;
98528052 16084 }
67f0cbdb
AM
16085 break;
16086
23cedd1d
AM
16087 case R_PPC64_PLT16_LO:
16088 case R_PPC64_PLT16_LO_DS:
16089 if (unresolved_reloc)
16090 {
16091 unresolved_reloc = FALSE;
16092 goto nop_it;
16093 }
16094 /* Fall through. */
67f0cbdb
AM
16095 case R_PPC64_GOT_TLSLD16_LO:
16096 case R_PPC64_GOT_TLSGD16_LO:
16097 case R_PPC64_GOT_TPREL16_LO_DS:
16098 case R_PPC64_GOT_DTPREL16_LO_DS:
16099 case R_PPC64_GOT16_LO:
16100 case R_PPC64_GOT16_LO_DS:
16101 case R_PPC64_TOC16_LO:
16102 case R_PPC64_TOC16_LO_DS:
98528052 16103 if (htab->do_toc_opt && relocation + addend + 0x8000 < 0x10000
560c8763 16104 && !ppc64_elf_tdata (input_bfd)->unexpected_toc_insn)
67f0cbdb
AM
16105 {
16106 bfd_byte *p = contents + (rel->r_offset & ~3);
16107 insn = bfd_get_32 (input_bfd, p);
560c8763
AM
16108 if ((insn & (0x3f << 26)) == 12u << 26 /* addic */)
16109 {
16110 /* Transform addic to addi when we change reg. */
16111 insn &= ~((0x3f << 26) | (0x1f << 16));
16112 insn |= (14u << 26) | (2 << 16);
16113 }
16114 else
67f0cbdb 16115 {
98528052
AM
16116 insn &= ~(0x1f << 16);
16117 insn |= 2 << 16;
67f0cbdb 16118 }
560c8763 16119 bfd_put_32 (input_bfd, insn, p);
67f0cbdb
AM
16120 }
16121 break;
9a23f96e
AM
16122
16123 case R_PPC64_TPREL16_HA:
16124 if (htab->do_tls_opt && relocation + addend + 0x8000 < 0x10000)
16125 {
16126 bfd_byte *p = contents + (rel->r_offset & ~3);
16127 insn = bfd_get_32 (input_bfd, p);
16128 if ((insn & ((0x3f << 26) | 0x1f << 16))
16129 != ((15u << 26) | (13 << 16)) /* addis rt,13,imm */)
16130 /* xgettext:c-format */
16131 info->callbacks->minfo
16132 (_("%H: warning: %s unexpected insn %#x.\n"),
d830549d
AM
16133 input_bfd, input_section, rel->r_offset,
16134 ppc64_elf_howto_table[r_type]->name, insn);
9a23f96e 16135 else
d830549d
AM
16136 {
16137 bfd_put_32 (input_bfd, NOP, p);
16138 goto copy_reloc;
16139 }
9a23f96e
AM
16140 }
16141 break;
16142
16143 case R_PPC64_TPREL16_LO:
16144 case R_PPC64_TPREL16_LO_DS:
16145 if (htab->do_tls_opt && relocation + addend + 0x8000 < 0x10000)
16146 {
16147 bfd_byte *p = contents + (rel->r_offset & ~3);
16148 insn = bfd_get_32 (input_bfd, p);
16149 insn &= ~(0x1f << 16);
16150 insn |= 13 << 16;
16151 bfd_put_32 (input_bfd, insn, p);
16152 }
16153 break;
67f0cbdb
AM
16154 }
16155
65f38f15
AM
16156 /* Do any further special processing. */
16157 switch (r_type)
16158 {
16159 default:
16160 break;
16161
25f23106 16162 case R_PPC64_REL16_HA:
4a969973
AM
16163 case R_PPC64_REL16_HIGHA:
16164 case R_PPC64_REL16_HIGHERA:
16165 case R_PPC64_REL16_HIGHESTA:
a680de9a 16166 case R_PPC64_REL16DX_HA:
f9c6b907
AM
16167 case R_PPC64_ADDR16_HA:
16168 case R_PPC64_ADDR16_HIGHA:
65f38f15
AM
16169 case R_PPC64_ADDR16_HIGHERA:
16170 case R_PPC64_ADDR16_HIGHESTA:
65f38f15
AM
16171 case R_PPC64_TOC16_HA:
16172 case R_PPC64_SECTOFF_HA:
411e1bfb 16173 case R_PPC64_TPREL16_HA:
f9c6b907 16174 case R_PPC64_TPREL16_HIGHA:
411e1bfb 16175 case R_PPC64_TPREL16_HIGHERA:
411e1bfb 16176 case R_PPC64_TPREL16_HIGHESTA:
f9c6b907
AM
16177 case R_PPC64_DTPREL16_HA:
16178 case R_PPC64_DTPREL16_HIGHA:
411e1bfb 16179 case R_PPC64_DTPREL16_HIGHERA:
411e1bfb 16180 case R_PPC64_DTPREL16_HIGHESTA:
65f38f15
AM
16181 /* It's just possible that this symbol is a weak symbol
16182 that's not actually defined anywhere. In that case,
16183 'sec' would be NULL, and we should leave the symbol
16184 alone (it will be set to zero elsewhere in the link). */
5c5f6e17
AM
16185 if (sec == NULL)
16186 break;
1a0670f3 16187 /* Fall through. */
5c5f6e17
AM
16188
16189 case R_PPC64_GOT16_HA:
16190 case R_PPC64_PLTGOT16_HA:
16191 case R_PPC64_PLT16_HA:
16192 case R_PPC64_GOT_TLSGD16_HA:
16193 case R_PPC64_GOT_TLSLD16_HA:
16194 case R_PPC64_GOT_TPREL16_HA:
16195 case R_PPC64_GOT_DTPREL16_HA:
16196 /* Add 0x10000 if sign bit in 0:15 is set.
16197 Bits 0:15 are not used. */
16198 addend += 0x8000;
65f38f15
AM
16199 break;
16200
5663e321
AM
16201 case R_PPC64_D34_HA30:
16202 case R_PPC64_ADDR16_HIGHERA34:
16203 case R_PPC64_ADDR16_HIGHESTA34:
16204 case R_PPC64_REL16_HIGHERA34:
16205 case R_PPC64_REL16_HIGHESTA34:
16206 if (sec != NULL)
16207 addend += 1ULL << 33;
16208 break;
16209
65f38f15
AM
16210 case R_PPC64_ADDR16_DS:
16211 case R_PPC64_ADDR16_LO_DS:
16212 case R_PPC64_GOT16_DS:
16213 case R_PPC64_GOT16_LO_DS:
16214 case R_PPC64_PLT16_LO_DS:
16215 case R_PPC64_SECTOFF_DS:
16216 case R_PPC64_SECTOFF_LO_DS:
16217 case R_PPC64_TOC16_DS:
16218 case R_PPC64_TOC16_LO_DS:
16219 case R_PPC64_PLTGOT16_DS:
16220 case R_PPC64_PLTGOT16_LO_DS:
411e1bfb
AM
16221 case R_PPC64_GOT_TPREL16_DS:
16222 case R_PPC64_GOT_TPREL16_LO_DS:
16223 case R_PPC64_GOT_DTPREL16_DS:
16224 case R_PPC64_GOT_DTPREL16_LO_DS:
16225 case R_PPC64_TPREL16_DS:
16226 case R_PPC64_TPREL16_LO_DS:
16227 case R_PPC64_DTPREL16_DS:
16228 case R_PPC64_DTPREL16_LO_DS:
adadcc0c
AM
16229 insn = bfd_get_32 (input_bfd, contents + (rel->r_offset & ~3));
16230 mask = 3;
a680de9a
PB
16231 /* If this reloc is against an lq, lxv, or stxv insn, then
16232 the value must be a multiple of 16. This is somewhat of
16233 a hack, but the "correct" way to do this by defining _DQ
16234 forms of all the _DS relocs bloats all reloc switches in
16235 this file. It doesn't make much sense to use these
16236 relocs in data, so testing the insn should be safe. */
16237 if ((insn & (0x3f << 26)) == (56u << 26)
16238 || ((insn & (0x3f << 26)) == (61u << 26) && (insn & 3) == 1))
adadcc0c 16239 mask = 15;
a680de9a
PB
16240 relocation += addend;
16241 addend = insn & (mask ^ 3);
16242 if ((relocation & mask) != 0)
65f38f15 16243 {
a680de9a 16244 relocation ^= relocation & mask;
25f53a85 16245 info->callbacks->einfo
695344c0 16246 /* xgettext:c-format */
174d0a74 16247 (_("%H: error: %s not a multiple of %u\n"),
25f53a85 16248 input_bfd, input_section, rel->r_offset,
d830549d 16249 ppc64_elf_howto_table[r_type]->name,
adadcc0c 16250 mask + 1);
65f38f15 16251 bfd_set_error (bfd_error_bad_value);
b34976b6 16252 ret = FALSE;
c316a17c 16253 goto copy_reloc;
65f38f15
AM
16254 }
16255 break;
5bd4f169
AM
16256 }
16257
239e1f3a
AM
16258 /* Dynamic relocs are not propagated for SEC_DEBUGGING sections
16259 because such sections are not SEC_ALLOC and thus ld.so will
16260 not process them. */
d830549d 16261 howto = ppc64_elf_howto_table[(int) r_type];
65f38f15 16262 if (unresolved_reloc
239e1f3a 16263 && !((input_section->flags & SEC_DEBUGGING) != 0
1d5316ab
AM
16264 && h->elf.def_dynamic)
16265 && _bfd_elf_section_offset (output_bfd, info, input_section,
16266 rel->r_offset) != (bfd_vma) -1)
9c07fe7c 16267 {
25f53a85 16268 info->callbacks->einfo
695344c0 16269 /* xgettext:c-format */
c1c8c1ef 16270 (_("%H: unresolvable %s against `%pT'\n"),
25f53a85 16271 input_bfd, input_section, rel->r_offset,
b80eed39 16272 howto->name,
039b3fef 16273 h->elf.root.root.string);
b34976b6 16274 ret = FALSE;
9c07fe7c 16275 }
5bd4f169 16276
b80eed39
AM
16277 /* 16-bit fields in insns mostly have signed values, but a
16278 few insns have 16-bit unsigned values. Really, we should
16279 have different reloc types. */
16280 if (howto->complain_on_overflow != complain_overflow_dont
16281 && howto->dst_mask == 0xffff
16282 && (input_section->flags & SEC_CODE) != 0)
16283 {
16284 enum complain_overflow complain = complain_overflow_signed;
16285
16286 insn = bfd_get_32 (input_bfd, contents + (rel->r_offset & ~3));
a47622ac
AM
16287 if ((insn & (0x3f << 26)) == 10u << 26 /* cmpli */)
16288 complain = complain_overflow_bitfield;
16289 else if (howto->rightshift == 0
16290 ? ((insn & (0x3f << 26)) == 28u << 26 /* andi */
16291 || (insn & (0x3f << 26)) == 24u << 26 /* ori */
16292 || (insn & (0x3f << 26)) == 26u << 26 /* xori */)
16293 : ((insn & (0x3f << 26)) == 29u << 26 /* andis */
16294 || (insn & (0x3f << 26)) == 25u << 26 /* oris */
16295 || (insn & (0x3f << 26)) == 27u << 26 /* xoris */))
b80eed39
AM
16296 complain = complain_overflow_unsigned;
16297 if (howto->complain_on_overflow != complain)
16298 {
16299 alt_howto = *howto;
16300 alt_howto.complain_on_overflow = complain;
16301 howto = &alt_howto;
16302 }
16303 }
16304
5663e321 16305 switch (r_type)
a680de9a 16306 {
5663e321
AM
16307 /* Split field relocs aren't handled by _bfd_final_link_relocate. */
16308 case R_PPC64_D34:
16309 case R_PPC64_D34_LO:
16310 case R_PPC64_D34_HI30:
16311 case R_PPC64_D34_HA30:
16312 case R_PPC64_PCREL34:
16313 case R_PPC64_GOT_PCREL34:
16314 case R_PPC64_PLT_PCREL34:
16315 case R_PPC64_PLT_PCREL34_NOTOC:
16316 case R_PPC64_D28:
16317 case R_PPC64_PCREL28:
16318 if (rel->r_offset + 8 > input_section->size)
16319 r = bfd_reloc_outofrange;
16320 else
16321 {
5663e321
AM
16322 relocation += addend;
16323 if (howto->pc_relative)
16324 relocation -= (rel->r_offset
16325 + input_section->output_offset
16326 + input_section->output_section->vma);
16327 relocation >>= howto->rightshift;
16328
16329 pinsn = bfd_get_32 (input_bfd, contents + rel->r_offset);
16330 pinsn <<= 32;
16331 pinsn |= bfd_get_32 (input_bfd, contents + rel->r_offset + 4);
16332
16333 pinsn &= ~howto->dst_mask;
16334 pinsn |= (((relocation << 16) | (relocation & 0xffff))
16335 & howto->dst_mask);
16336 bfd_put_32 (input_bfd, pinsn >> 32, contents + rel->r_offset);
16337 bfd_put_32 (input_bfd, pinsn, contents + rel->r_offset + 4);
16338 r = bfd_reloc_ok;
16339 if (howto->complain_on_overflow == complain_overflow_signed
16340 && (relocation + (1ULL << (howto->bitsize - 1))
16341 >= 1ULL << howto->bitsize))
16342 r = bfd_reloc_overflow;
16343 }
16344 break;
16345
16346 case R_PPC64_REL16DX_HA:
a680de9a
PB
16347 if (rel->r_offset + 4 > input_section->size)
16348 r = bfd_reloc_outofrange;
16349 else
16350 {
16351 relocation += addend;
16352 relocation -= (rel->r_offset
16353 + input_section->output_offset
16354 + input_section->output_section->vma);
3de43e7b 16355 relocation = (bfd_signed_vma) relocation >> 16;
a680de9a
PB
16356 insn = bfd_get_32 (input_bfd, contents + rel->r_offset);
16357 insn &= ~0x1fffc1;
3de43e7b 16358 insn |= (relocation & 0xffc1) | ((relocation & 0x3e) << 15);
a680de9a
PB
16359 bfd_put_32 (input_bfd, insn, contents + rel->r_offset);
16360 r = bfd_reloc_ok;
3de43e7b 16361 if (relocation + 0x8000 > 0xffff)
a680de9a
PB
16362 r = bfd_reloc_overflow;
16363 }
5663e321
AM
16364 break;
16365
16366 default:
16367 r = _bfd_final_link_relocate (howto, input_bfd, input_section,
16368 contents, rel->r_offset,
16369 relocation, addend);
a680de9a 16370 }
5bd4f169 16371
ef60b7ff 16372 if (r != bfd_reloc_ok)
5bd4f169 16373 {
bc30df16 16374 char *more_info = NULL;
b80eed39 16375 const char *reloc_name = howto->name;
bc30df16
AM
16376
16377 if (reloc_dest != DEST_NORMAL)
16378 {
16379 more_info = bfd_malloc (strlen (reloc_name) + 8);
16380 if (more_info != NULL)
16381 {
16382 strcpy (more_info, reloc_name);
16383 strcat (more_info, (reloc_dest == DEST_OPD
16384 ? " (OPD)" : " (stub)"));
16385 reloc_name = more_info;
16386 }
16387 }
16388
cd27b276 16389 if (r == bfd_reloc_overflow)
5bd4f169 16390 {
8131c122
AM
16391 /* On code like "if (foo) foo();" don't report overflow
16392 on a branch to zero when foo is undefined. */
16393 if (!warned
16394 && (reloc_dest == DEST_STUB
16395 || !(h != NULL
16396 && (h->elf.root.type == bfd_link_hash_undefweak
16397 || h->elf.root.type == bfd_link_hash_undefined)
16398 && is_branch_reloc (r_type))))
1a72702b
AM
16399 info->callbacks->reloc_overflow (info, &h->elf.root,
16400 sym_name, reloc_name,
16401 orig_rel.r_addend,
16402 input_bfd, input_section,
16403 rel->r_offset);
ef60b7ff
AM
16404 }
16405 else
16406 {
25f53a85 16407 info->callbacks->einfo
695344c0 16408 /* xgettext:c-format */
c1c8c1ef 16409 (_("%H: %s against `%pT': error %d\n"),
25f53a85 16410 input_bfd, input_section, rel->r_offset,
bc30df16 16411 reloc_name, sym_name, (int) r);
b34976b6 16412 ret = FALSE;
ef60b7ff 16413 }
bc30df16
AM
16414 if (more_info != NULL)
16415 free (more_info);
5bd4f169 16416 }
c316a17c
AM
16417 copy_reloc:
16418 if (wrel != rel)
16419 *wrel = *rel;
16420 }
16421
16422 if (wrel != rel)
16423 {
16424 Elf_Internal_Shdr *rel_hdr;
16425 size_t deleted = rel - wrel;
16426
16427 rel_hdr = _bfd_elf_single_rel_hdr (input_section->output_section);
16428 rel_hdr->sh_size -= rel_hdr->sh_entsize * deleted;
16429 if (rel_hdr->sh_size == 0)
16430 {
16431 /* It is too late to remove an empty reloc section. Leave
16432 one NONE reloc.
16433 ??? What is wrong with an empty section??? */
16434 rel_hdr->sh_size = rel_hdr->sh_entsize;
16435 deleted -= 1;
16436 }
16437 rel_hdr = _bfd_elf_single_rel_hdr (input_section);
16438 rel_hdr->sh_size -= rel_hdr->sh_entsize * deleted;
16439 input_section->reloc_count -= deleted;
5bd4f169
AM
16440 }
16441
645ea6a9
AM
16442 /* If we're emitting relocations, then shortly after this function
16443 returns, reloc offsets and addends for this section will be
16444 adjusted. Worse, reloc symbol indices will be for the output
8860955f
AM
16445 file rather than the input. Save a copy of the relocs for
16446 opd_entry_value. */
0e1862bb 16447 if (is_opd && (info->emitrelocations || bfd_link_relocatable (info)))
8860955f
AM
16448 {
16449 bfd_size_type amt;
16450 amt = input_section->reloc_count * sizeof (Elf_Internal_Rela);
16451 rel = bfd_alloc (input_bfd, amt);
729eabd5
AM
16452 BFD_ASSERT (ppc64_elf_tdata (input_bfd)->opd.relocs == NULL);
16453 ppc64_elf_tdata (input_bfd)->opd.relocs = rel;
8860955f
AM
16454 if (rel == NULL)
16455 return FALSE;
16456 memcpy (rel, relocs, amt);
16457 }
5bd4f169
AM
16458 return ret;
16459}
16460
754021d0
AM
16461/* Adjust the value of any local symbols in opd sections. */
16462
6e0b88f1 16463static int
754021d0
AM
16464ppc64_elf_output_symbol_hook (struct bfd_link_info *info,
16465 const char *name ATTRIBUTE_UNUSED,
16466 Elf_Internal_Sym *elfsym,
16467 asection *input_sec,
16468 struct elf_link_hash_entry *h)
16469{
74f0fb50
AM
16470 struct _opd_sec_data *opd;
16471 long adjust;
754021d0
AM
16472 bfd_vma value;
16473
4025353c 16474 if (h != NULL)
6e0b88f1 16475 return 1;
4025353c 16476
74f0fb50
AM
16477 opd = get_opd_info (input_sec);
16478 if (opd == NULL || opd->adjust == NULL)
6e0b88f1 16479 return 1;
754021d0
AM
16480
16481 value = elfsym->st_value - input_sec->output_offset;
0e1862bb 16482 if (!bfd_link_relocatable (info))
754021d0
AM
16483 value -= input_sec->output_section->vma;
16484
51aecdc5 16485 adjust = opd->adjust[OPD_NDX (value)];
4025353c 16486 if (adjust == -1)
6e0b88f1
AM
16487 return 2;
16488
16489 elfsym->st_value += adjust;
16490 return 1;
754021d0
AM
16491}
16492
5bd4f169
AM
16493/* Finish up dynamic symbol handling. We set the contents of various
16494 dynamic sections here. */
16495
b34976b6 16496static bfd_boolean
4ce794b7
AM
16497ppc64_elf_finish_dynamic_symbol (bfd *output_bfd,
16498 struct bfd_link_info *info,
16499 struct elf_link_hash_entry *h,
4aef7643 16500 Elf_Internal_Sym *sym)
5bd4f169 16501{
65f38f15 16502 struct ppc_link_hash_table *htab;
8387904d 16503 struct plt_entry *ent;
5bd4f169 16504
65f38f15 16505 htab = ppc_hash_table (info);
4dfe6ac6
NC
16506 if (htab == NULL)
16507 return FALSE;
5bd4f169 16508
49c09209
AM
16509 if (!htab->opd_abi && !h->def_regular)
16510 for (ent = h->plt.plist; ent != NULL; ent = ent->next)
16511 if (ent->plt.offset != (bfd_vma) -1)
16512 {
16513 /* Mark the symbol as undefined, rather than as
16514 defined in glink. Leave the value if there were
16515 any relocations where pointer equality matters
16516 (this is a clue for the dynamic linker, to make
16517 function pointer comparisons work between an
16518 application and shared library), otherwise set it
16519 to zero. */
16520 sym->st_shndx = SHN_UNDEF;
16521 if (!h->pointer_equality_needed)
16522 sym->st_value = 0;
16523 else if (!h->ref_regular_nonweak)
16524 {
16525 /* This breaks function pointer comparisons, but
16526 that is better than breaking tests for a NULL
16527 function pointer. */
16528 sym->st_value = 0;
16529 }
16530 break;
16531 }
5bd4f169 16532
f5385ebf 16533 if (h->needs_copy)
5bd4f169 16534 {
65f38f15 16535 /* This symbol needs a copy reloc. Set it up. */
49c09209 16536 Elf_Internal_Rela rela;
5474d94f 16537 asection *srel;
49c09209 16538 bfd_byte *loc;
5bd4f169 16539
65f38f15
AM
16540 if (h->dynindx == -1
16541 || (h->root.type != bfd_link_hash_defined
16542 && h->root.type != bfd_link_hash_defweak)
5474d94f
AM
16543 || htab->elf.srelbss == NULL
16544 || htab->elf.sreldynrelro == NULL)
65f38f15 16545 abort ();
5bd4f169
AM
16546
16547 rela.r_offset = (h->root.u.def.value
16548 + h->root.u.def.section->output_section->vma
16549 + h->root.u.def.section->output_offset);
16550 rela.r_info = ELF64_R_INFO (h->dynindx, R_PPC64_COPY);
16551 rela.r_addend = 0;
afbf7e8e 16552 if (h->root.u.def.section == htab->elf.sdynrelro)
5474d94f
AM
16553 srel = htab->elf.sreldynrelro;
16554 else
16555 srel = htab->elf.srelbss;
16556 loc = srel->contents;
16557 loc += srel->reloc_count++ * sizeof (Elf64_External_Rela);
65f38f15 16558 bfd_elf64_swap_reloca_out (output_bfd, &rela, loc);
5bd4f169
AM
16559 }
16560
b34976b6 16561 return TRUE;
5bd4f169
AM
16562}
16563
65f38f15
AM
16564/* Used to decide how to sort relocs in an optimal manner for the
16565 dynamic linker, before writing them out. */
16566
16567static enum elf_reloc_type_class
7e612e98
AM
16568ppc64_elf_reloc_type_class (const struct bfd_link_info *info,
16569 const asection *rel_sec,
16570 const Elf_Internal_Rela *rela)
65f38f15 16571{
04c9666a 16572 enum elf_ppc64_reloc_type r_type;
7e612e98
AM
16573 struct ppc_link_hash_table *htab = ppc_hash_table (info);
16574
33e44f2e 16575 if (rel_sec == htab->elf.irelplt)
7e612e98 16576 return reloc_class_ifunc;
a33d1f77 16577
4ce794b7 16578 r_type = ELF64_R_TYPE (rela->r_info);
a33d1f77 16579 switch (r_type)
65f38f15
AM
16580 {
16581 case R_PPC64_RELATIVE:
16582 return reloc_class_relative;
16583 case R_PPC64_JMP_SLOT:
16584 return reloc_class_plt;
16585 case R_PPC64_COPY:
16586 return reloc_class_copy;
16587 default:
16588 return reloc_class_normal;
16589 }
16590}
16591
5bd4f169
AM
16592/* Finish up the dynamic sections. */
16593
b34976b6 16594static bfd_boolean
4ce794b7
AM
16595ppc64_elf_finish_dynamic_sections (bfd *output_bfd,
16596 struct bfd_link_info *info)
5bd4f169 16597{
65f38f15
AM
16598 struct ppc_link_hash_table *htab;
16599 bfd *dynobj;
5bd4f169 16600 asection *sdyn;
5bd4f169 16601
65f38f15 16602 htab = ppc_hash_table (info);
4dfe6ac6
NC
16603 if (htab == NULL)
16604 return FALSE;
16605
65f38f15 16606 dynobj = htab->elf.dynobj;
3d4d4302 16607 sdyn = bfd_get_linker_section (dynobj, ".dynamic");
5bd4f169 16608
65f38f15 16609 if (htab->elf.dynamic_sections_created)
5bd4f169 16610 {
5bd4f169
AM
16611 Elf64_External_Dyn *dyncon, *dynconend;
16612
33e44f2e 16613 if (sdyn == NULL || htab->elf.sgot == NULL)
65f38f15 16614 abort ();
5bd4f169
AM
16615
16616 dyncon = (Elf64_External_Dyn *) sdyn->contents;
eea6121a 16617 dynconend = (Elf64_External_Dyn *) (sdyn->contents + sdyn->size);
5bd4f169
AM
16618 for (; dyncon < dynconend; dyncon++)
16619 {
16620 Elf_Internal_Dyn dyn;
19397422 16621 asection *s;
5bd4f169
AM
16622
16623 bfd_elf64_swap_dyn_in (dynobj, dyncon, &dyn);
16624
16625 switch (dyn.d_tag)
16626 {
65f38f15
AM
16627 default:
16628 continue;
5bd4f169 16629
5d1634d7 16630 case DT_PPC64_GLINK:
4ce794b7 16631 s = htab->glink;
6348e046 16632 dyn.d_un.d_ptr = s->output_section->vma + s->output_offset;
ad8e1ba5
AM
16633 /* We stupidly defined DT_PPC64_GLINK to be the start
16634 of glink rather than the first entry point, which is
16635 what ld.so needs, and now have a bigger stub to
16636 support automatic multiple TOCs. */
9e390558 16637 dyn.d_un.d_ptr += GLINK_PLTRESOLVE_SIZE (htab) - 8 * 4;
5d1634d7
AM
16638 break;
16639
19397422
AM
16640 case DT_PPC64_OPD:
16641 s = bfd_get_section_by_name (output_bfd, ".opd");
6348e046
AM
16642 if (s == NULL)
16643 continue;
16644 dyn.d_un.d_ptr = s->vma;
19397422
AM
16645 break;
16646
e8910a83 16647 case DT_PPC64_OPT:
5663e321
AM
16648 if ((htab->do_multi_toc && htab->multi_toc_needed)
16649 || htab->notoc_plt)
e8910a83 16650 dyn.d_un.d_val |= PPC64_OPT_MULTI_TOC;
f378ab09
AM
16651 if (htab->has_plt_localentry0)
16652 dyn.d_un.d_val |= PPC64_OPT_LOCALENTRY;
e8910a83
AM
16653 break;
16654
19397422
AM
16655 case DT_PPC64_OPDSZ:
16656 s = bfd_get_section_by_name (output_bfd, ".opd");
6348e046
AM
16657 if (s == NULL)
16658 continue;
eea6121a 16659 dyn.d_un.d_val = s->size;
19397422
AM
16660 break;
16661
65f38f15 16662 case DT_PLTGOT:
33e44f2e 16663 s = htab->elf.splt;
6348e046 16664 dyn.d_un.d_ptr = s->output_section->vma + s->output_offset;
65f38f15
AM
16665 break;
16666
16667 case DT_JMPREL:
33e44f2e 16668 s = htab->elf.srelplt;
6348e046 16669 dyn.d_un.d_ptr = s->output_section->vma + s->output_offset;
65f38f15 16670 break;
5bd4f169 16671
65f38f15 16672 case DT_PLTRELSZ:
33e44f2e 16673 dyn.d_un.d_val = htab->elf.srelplt->size;
5d1634d7 16674 break;
82e66161
AM
16675
16676 case DT_TEXTREL:
16677 if (htab->local_ifunc_resolver)
16678 info->callbacks->einfo
16679 (_("%X%P: text relocations and GNU indirect "
16680 "functions will result in a segfault at runtime\n"));
16681 else if (htab->maybe_local_ifunc_resolver)
16682 info->callbacks->einfo
16683 (_("%P: warning: text relocations and GNU indirect "
16684 "functions may result in a segfault at runtime\n"));
16685 continue;
5bd4f169 16686 }
5bd4f169 16687
65f38f15 16688 bfd_elf64_swap_dyn_out (output_bfd, &dyn, dyncon);
5bd4f169 16689 }
5bd4f169
AM
16690 }
16691
6528b6eb
AM
16692 if (htab->elf.sgot != NULL && htab->elf.sgot->size != 0
16693 && htab->elf.sgot->output_section != bfd_abs_section_ptr)
5d1634d7
AM
16694 {
16695 /* Fill in the first entry in the global offset table.
16696 We use it to hold the link-time TOCbase. */
16697 bfd_put_64 (output_bfd,
60ee0d4a 16698 elf_gp (output_bfd) + TOC_BASE_OFF,
33e44f2e 16699 htab->elf.sgot->contents);
5d1634d7
AM
16700
16701 /* Set .got entry size. */
2cdcc330
AM
16702 elf_section_data (htab->elf.sgot->output_section)->this_hdr.sh_entsize
16703 = 8;
5d1634d7
AM
16704 }
16705
6528b6eb
AM
16706 if (htab->elf.splt != NULL && htab->elf.splt->size != 0
16707 && htab->elf.splt->output_section != bfd_abs_section_ptr)
5d1634d7
AM
16708 {
16709 /* Set .plt entry size. */
33e44f2e 16710 elf_section_data (htab->elf.splt->output_section)->this_hdr.sh_entsize
b9e5796b 16711 = PLT_ENTRY_SIZE (htab);
5d1634d7
AM
16712 }
16713
84f5d08e
AM
16714 /* brlt is SEC_LINKER_CREATED, so we need to write out relocs for
16715 brlt ourselves if emitrelocations. */
16716 if (htab->brlt != NULL
16717 && htab->brlt->reloc_count != 0
16718 && !_bfd_elf_link_output_relocs (output_bfd,
16719 htab->brlt,
d4730f92 16720 elf_section_data (htab->brlt)->rela.hdr,
84f5d08e
AM
16721 elf_section_data (htab->brlt)->relocs,
16722 NULL))
16723 return FALSE;
16724
176a0d42
AM
16725 if (htab->glink != NULL
16726 && htab->glink->reloc_count != 0
16727 && !_bfd_elf_link_output_relocs (output_bfd,
16728 htab->glink,
d4730f92 16729 elf_section_data (htab->glink)->rela.hdr,
176a0d42
AM
16730 elf_section_data (htab->glink)->relocs,
16731 NULL))
16732 return FALSE;
16733
da44f4e5 16734
df136d64
AM
16735 if (htab->glink_eh_frame != NULL
16736 && htab->glink_eh_frame->size != 0
16737 && htab->glink_eh_frame->sec_info_type == SEC_INFO_TYPE_EH_FRAME
16738 && !_bfd_elf_write_section_eh_frame (output_bfd, info,
16739 htab->glink_eh_frame,
16740 htab->glink_eh_frame->contents))
16741 return FALSE;
58d180e8 16742
e717da7e 16743 /* We need to handle writing out multiple GOT sections ourselves,
7b53ace3
AM
16744 since we didn't add them to DYNOBJ. We know dynobj is the first
16745 bfd. */
c72f2fb2 16746 while ((dynobj = dynobj->link.next) != NULL)
e717da7e
AM
16747 {
16748 asection *s;
7b53ace3 16749
0c8d6e5c 16750 if (!is_ppc64_elf (dynobj))
7b53ace3
AM
16751 continue;
16752
e717da7e
AM
16753 s = ppc64_elf_tdata (dynobj)->got;
16754 if (s != NULL
eea6121a 16755 && s->size != 0
e717da7e
AM
16756 && s->output_section != bfd_abs_section_ptr
16757 && !bfd_set_section_contents (output_bfd, s->output_section,
16758 s->contents, s->output_offset,
eea6121a 16759 s->size))
e717da7e
AM
16760 return FALSE;
16761 s = ppc64_elf_tdata (dynobj)->relgot;
16762 if (s != NULL
eea6121a 16763 && s->size != 0
e717da7e
AM
16764 && s->output_section != bfd_abs_section_ptr
16765 && !bfd_set_section_contents (output_bfd, s->output_section,
16766 s->contents, s->output_offset,
eea6121a 16767 s->size))
e717da7e
AM
16768 return FALSE;
16769 }
f6c52c13 16770
b34976b6 16771 return TRUE;
5bd4f169
AM
16772}
16773
5bd4f169 16774#include "elf64-target.h"
7b8e7dad
AM
16775
16776/* FreeBSD support */
16777
16778#undef TARGET_LITTLE_SYM
16779#undef TARGET_LITTLE_NAME
16780
16781#undef TARGET_BIG_SYM
6d00b590 16782#define TARGET_BIG_SYM powerpc_elf64_fbsd_vec
7b8e7dad
AM
16783#undef TARGET_BIG_NAME
16784#define TARGET_BIG_NAME "elf64-powerpc-freebsd"
16785
16786#undef ELF_OSABI
16787#define ELF_OSABI ELFOSABI_FREEBSD
16788
16789#undef elf64_bed
16790#define elf64_bed elf64_powerpc_fbsd_bed
16791
16792#include "elf64-target.h"