PowerPC64 higher REL16 relocations
[deliverable/binutils-gdb.git] / bfd / elf64-ppc.c
CommitLineData
5bd4f169 1/* PowerPC64-specific support for 64-bit ELF.
219d1afa 2 Copyright (C) 1999-2018 Free Software Foundation, Inc.
5bd4f169
AM
3 Written by Linus Nordberg, Swox AB <info@swox.com>,
4 based on elf32-ppc.c by Ian Lance Taylor.
32ca9640 5 Largely rewritten by Alan Modra.
5bd4f169 6
ae9a127f 7 This file is part of BFD, the Binary File Descriptor library.
5bd4f169 8
ae9a127f
NC
9 This program is free software; you can redistribute it and/or modify
10 it under the terms of the GNU General Public License as published by
cd123cb7 11 the Free Software Foundation; either version 3 of the License, or
ae9a127f 12 (at your option) any later version.
5bd4f169 13
ae9a127f
NC
14 This program is distributed in the hope that it will be useful,
15 but WITHOUT ANY WARRANTY; without even the implied warranty of
16 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
17 GNU General Public License for more details.
5bd4f169 18
4ce794b7
AM
19 You should have received a copy of the GNU General Public License along
20 with this program; if not, write to the Free Software Foundation, Inc.,
3e110533 21 51 Franklin Street - Fifth Floor, Boston, MA 02110-1301, USA. */
5bd4f169 22
cd123cb7 23
4ce794b7
AM
24/* The 64-bit PowerPC ELF ABI may be found at
25 http://www.linuxbase.org/spec/ELF/ppc64/PPC-elf64abi.txt, and
26 http://www.linuxbase.org/spec/ELF/ppc64/spec/book1.html */
5bd4f169 27
3db64b00 28#include "sysdep.h"
183e98be 29#include <stdarg.h>
5bd4f169 30#include "bfd.h"
5bd4f169
AM
31#include "bfdlink.h"
32#include "libbfd.h"
33#include "elf-bfd.h"
04c9666a 34#include "elf/ppc64.h"
5d1634d7 35#include "elf64-ppc.h"
58d180e8 36#include "dwarf2.h"
5bd4f169 37
805fc799 38static bfd_reloc_status_type ppc64_elf_ha_reloc
4ce794b7 39 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
2441e016
AM
40static bfd_reloc_status_type ppc64_elf_branch_reloc
41 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
805fc799 42static bfd_reloc_status_type ppc64_elf_brtaken_reloc
4ce794b7 43 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
805fc799 44static bfd_reloc_status_type ppc64_elf_sectoff_reloc
4ce794b7 45 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
805fc799 46static bfd_reloc_status_type ppc64_elf_sectoff_ha_reloc
4ce794b7 47 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
805fc799 48static bfd_reloc_status_type ppc64_elf_toc_reloc
4ce794b7 49 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
805fc799 50static bfd_reloc_status_type ppc64_elf_toc_ha_reloc
4ce794b7 51 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
805fc799 52static bfd_reloc_status_type ppc64_elf_toc64_reloc
4ce794b7 53 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
805fc799 54static bfd_reloc_status_type ppc64_elf_unhandled_reloc
4ce794b7 55 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
2441e016 56static bfd_vma opd_entry_value
aef36ac1 57 (asection *, bfd_vma, asection **, bfd_vma *, bfd_boolean);
5bd4f169 58
6d00b590 59#define TARGET_LITTLE_SYM powerpc_elf64_le_vec
ad8e1ba5 60#define TARGET_LITTLE_NAME "elf64-powerpcle"
6d00b590 61#define TARGET_BIG_SYM powerpc_elf64_vec
ad8e1ba5
AM
62#define TARGET_BIG_NAME "elf64-powerpc"
63#define ELF_ARCH bfd_arch_powerpc
ae95ffa6 64#define ELF_TARGET_ID PPC64_ELF_DATA
ad8e1ba5
AM
65#define ELF_MACHINE_CODE EM_PPC64
66#define ELF_MAXPAGESIZE 0x10000
702d1671
AM
67#define ELF_COMMONPAGESIZE 0x1000
68#define ELF_RELROPAGESIZE ELF_MAXPAGESIZE
ad8e1ba5
AM
69#define elf_info_to_howto ppc64_elf_info_to_howto
70
71#define elf_backend_want_got_sym 0
72#define elf_backend_want_plt_sym 0
73#define elf_backend_plt_alignment 3
74#define elf_backend_plt_not_loaded 1
ad8e1ba5 75#define elf_backend_got_header_size 8
5474d94f 76#define elf_backend_want_dynrelro 1
ad8e1ba5
AM
77#define elf_backend_can_gc_sections 1
78#define elf_backend_can_refcount 1
79#define elf_backend_rela_normal 1
64f52338 80#define elf_backend_dtrel_excludes_plt 1
6bfdb61b 81#define elf_backend_default_execstack 0
ad8e1ba5 82
e717da7e 83#define bfd_elf64_mkobject ppc64_elf_mkobject
ad8e1ba5 84#define bfd_elf64_bfd_reloc_type_lookup ppc64_elf_reloc_type_lookup
aa374f67 85#define bfd_elf64_bfd_reloc_name_lookup ppc64_elf_reloc_name_lookup
ee67d69a
AM
86#define bfd_elf64_bfd_merge_private_bfd_data ppc64_elf_merge_private_bfd_data
87#define bfd_elf64_bfd_print_private_bfd_data ppc64_elf_print_private_bfd_data
ad8e1ba5
AM
88#define bfd_elf64_new_section_hook ppc64_elf_new_section_hook
89#define bfd_elf64_bfd_link_hash_table_create ppc64_elf_link_hash_table_create
90e3cdf2 90#define bfd_elf64_get_synthetic_symtab ppc64_elf_get_synthetic_symtab
aa374f67 91#define bfd_elf64_bfd_link_just_syms ppc64_elf_link_just_syms
8c5b4e52 92#define bfd_elf64_bfd_gc_sections ppc64_elf_gc_sections
ad8e1ba5
AM
93
94#define elf_backend_object_p ppc64_elf_object_p
d37c89e5
AM
95#define elf_backend_grok_prstatus ppc64_elf_grok_prstatus
96#define elf_backend_grok_psinfo ppc64_elf_grok_psinfo
183e98be 97#define elf_backend_write_core_note ppc64_elf_write_core_note
9d19e4fd 98#define elf_backend_create_dynamic_sections _bfd_elf_create_dynamic_sections
ad8e1ba5 99#define elf_backend_copy_indirect_symbol ppc64_elf_copy_indirect_symbol
555cd476 100#define elf_backend_add_symbol_hook ppc64_elf_add_symbol_hook
f6c7c3e8 101#define elf_backend_check_directives ppc64_elf_before_check_relocs
e5034e59 102#define elf_backend_notice_as_needed ppc64_elf_notice_as_needed
8387904d 103#define elf_backend_archive_symbol_lookup ppc64_elf_archive_symbol_lookup
ad8e1ba5 104#define elf_backend_check_relocs ppc64_elf_check_relocs
c0e331c7 105#define elf_backend_relocs_compatible _bfd_elf_relocs_compatible
74f0fb50 106#define elf_backend_gc_keep ppc64_elf_gc_keep
64d03ab5 107#define elf_backend_gc_mark_dynamic_ref ppc64_elf_gc_mark_dynamic_ref
ad8e1ba5 108#define elf_backend_gc_mark_hook ppc64_elf_gc_mark_hook
ad8e1ba5
AM
109#define elf_backend_adjust_dynamic_symbol ppc64_elf_adjust_dynamic_symbol
110#define elf_backend_hide_symbol ppc64_elf_hide_symbol
9f296da3 111#define elf_backend_maybe_function_sym ppc64_elf_maybe_function_sym
ad8e1ba5
AM
112#define elf_backend_always_size_sections ppc64_elf_func_desc_adjust
113#define elf_backend_size_dynamic_sections ppc64_elf_size_dynamic_sections
a345bc8d 114#define elf_backend_hash_symbol ppc64_elf_hash_symbol
74541ad4 115#define elf_backend_init_index_section _bfd_elf_init_2_index_sections
60124e18 116#define elf_backend_action_discarded ppc64_elf_action_discarded
ad8e1ba5
AM
117#define elf_backend_relocate_section ppc64_elf_relocate_section
118#define elf_backend_finish_dynamic_symbol ppc64_elf_finish_dynamic_symbol
119#define elf_backend_reloc_type_class ppc64_elf_reloc_type_class
120#define elf_backend_finish_dynamic_sections ppc64_elf_finish_dynamic_sections
754021d0 121#define elf_backend_link_output_symbol_hook ppc64_elf_output_symbol_hook
29ef7005 122#define elf_backend_special_sections ppc64_elf_special_sections
6911b7dc 123#define elf_backend_merge_symbol_attribute ppc64_elf_merge_symbol_attribute
8c5b4e52 124#define elf_backend_merge_symbol ppc64_elf_merge_symbol
bce964aa 125#define elf_backend_get_reloc_section bfd_get_section_by_name
ad8e1ba5 126
5bd4f169
AM
127/* The name of the dynamic interpreter. This is put in the .interp
128 section. */
129#define ELF_DYNAMIC_INTERPRETER "/usr/lib/ld.so.1"
130
131/* The size in bytes of an entry in the procedure linkage table. */
b9e5796b 132#define PLT_ENTRY_SIZE(htab) (htab->opd_abi ? 24 : 8)
2d7ad24e 133#define LOCAL_PLT_ENTRY_SIZE(htab) (htab->opd_abi ? 16 : 8)
5bd4f169
AM
134
135/* The initial size of the plt reserved for the dynamic linker. */
b9e5796b 136#define PLT_INITIAL_ENTRY_SIZE(htab) (htab->opd_abi ? 24 : 16)
5bd4f169 137
a078d95a
AM
138/* Offsets to some stack save slots. */
139#define STK_LR 16
140#define STK_TOC(htab) (htab->opd_abi ? 40 : 24)
eb8d7fda 141/* This one is dodgy. ELFv2 does not have a linker word, so use the
a078d95a
AM
142 CR save slot. Used only by optimised __tls_get_addr call stub,
143 relying on __tls_get_addr_opt not saving CR.. */
144#define STK_LINKER(htab) (htab->opd_abi ? 32 : 8)
145
5bd4f169 146/* TOC base pointers offset from start of TOC. */
411e1bfb 147#define TOC_BASE_OFF 0x8000
a27e685f
AM
148/* TOC base alignment. */
149#define TOC_BASE_ALIGN 256
411e1bfb
AM
150
151/* Offset of tp and dtp pointers from start of TLS block. */
152#define TP_OFFSET 0x7000
153#define DTP_OFFSET 0x8000
5bd4f169 154
ad8e1ba5
AM
155/* .plt call stub instructions. The normal stub is like this, but
156 sometimes the .plt entry crosses a 64k boundary and we need to
71a39c98 157 insert an addi to adjust r11. */
a078d95a 158#define STD_R2_0R1 0xf8410000 /* std %r2,0+40(%r1) */
71a39c98
AM
159#define ADDIS_R11_R2 0x3d620000 /* addis %r11,%r2,xxx@ha */
160#define LD_R12_0R11 0xe98b0000 /* ld %r12,xxx+0@l(%r11) */
161#define MTCTR_R12 0x7d8903a6 /* mtctr %r12 */
162#define LD_R2_0R11 0xe84b0000 /* ld %r2,xxx+8@l(%r11) */
163#define LD_R11_0R11 0xe96b0000 /* ld %r11,xxx+16@l(%r11) */
5d1634d7
AM
164#define BCTR 0x4e800420 /* bctr */
165
07d6d2b8 166#define ADDI_R11_R11 0x396b0000 /* addi %r11,%r11,off@l */
05d0e962
AM
167#define ADDI_R12_R11 0x398b0000 /* addi %r12,%r11,off@l */
168#define ADDI_R12_R12 0x398c0000 /* addi %r12,%r12,off@l */
07d6d2b8
AM
169#define ADDIS_R2_R2 0x3c420000 /* addis %r2,%r2,off@ha */
170#define ADDI_R2_R2 0x38420000 /* addi %r2,%r2,off@l */
171
172#define XOR_R2_R12_R12 0x7d826278 /* xor %r2,%r12,%r12 */
173#define ADD_R11_R11_R2 0x7d6b1214 /* add %r11,%r11,%r2 */
174#define XOR_R11_R12_R12 0x7d8b6278 /* xor %r11,%r12,%r12 */
175#define ADD_R2_R2_R11 0x7c425a14 /* add %r2,%r2,%r11 */
176#define CMPLDI_R2_0 0x28220000 /* cmpldi %r2,0 */
177#define BNECTR 0x4ca20420 /* bnectr+ */
178#define BNECTR_P4 0x4ce20420 /* bnectr+ */
794e51c0 179
71a39c98 180#define LD_R12_0R2 0xe9820000 /* ld %r12,xxx+0(%r2) */
ac2df442 181#define LD_R11_0R2 0xe9620000 /* ld %r11,xxx+0(%r2) */
07d6d2b8 182#define LD_R2_0R2 0xe8420000 /* ld %r2,xxx+0(%r2) */
ac2df442 183
07d6d2b8
AM
184#define LD_R2_0R1 0xe8410000 /* ld %r2,0(%r1) */
185#define LD_R2_0R12 0xe84c0000 /* ld %r2,0(%r12) */
186#define ADD_R2_R2_R12 0x7c426214 /* add %r2,%r2,%r12 */
ad8e1ba5 187
07d6d2b8 188#define LIS_R2 0x3c400000 /* lis %r2,xxx@ha */
05d0e962 189#define LIS_R12 0x3d800000 /* lis %r12,xxx@ha */
006589cf
AM
190#define ADDIS_R2_R12 0x3c4c0000 /* addis %r2,%r12,xxx@ha */
191#define ADDIS_R12_R2 0x3d820000 /* addis %r12,%r2,xxx@ha */
05d0e962 192#define ADDIS_R12_R11 0x3d8b0000 /* addis %r12,%r11,xxx@ha */
a345bc8d 193#define ADDIS_R12_R12 0x3d8c0000 /* addis %r12,%r12,xxx@ha */
05d0e962
AM
194#define ORIS_R12_R12_0 0x658c0000 /* oris %r12,%r12,xxx@hi */
195#define ORI_R12_R12_0 0x618c0000 /* ori %r12,%r12,xxx@l */
07d6d2b8 196#define LD_R12_0R12 0xe98c0000 /* ld %r12,xxx@l(%r12) */
05d0e962
AM
197#define SLDI_R12_R12_32 0x799c07c6 /* sldi %r12,%r12,32 */
198#define LDX_R12_R11_R12 0x7d8b602a /* ldx %r12,%r11,%r12 */
199#define ADD_R12_R11_R12 0x7d8b6214 /* add %r12,%r11,%r12 */
a345bc8d 200
9e390558
AM
201/* __glink_PLTresolve stub instructions. We enter with the index in R0. */
202#define GLINK_PLTRESOLVE_SIZE(htab) \
407aa07c 203 (8u + (htab->opd_abi ? 11 * 4 : 14 * 4))
ee4bf8d2
AM
204 /* 0: */
205 /* .quad plt0-1f */
206 /* __glink: */
207#define MFLR_R12 0x7d8802a6 /* mflr %12 */
208#define BCL_20_31 0x429f0005 /* bcl 20,31,1f */
209 /* 1: */
210#define MFLR_R11 0x7d6802a6 /* mflr %11 */
71a39c98 211 /* ld %2,(0b-1b)(%11) */
ee4bf8d2 212#define MTLR_R12 0x7d8803a6 /* mtlr %12 */
71a39c98
AM
213#define ADD_R11_R2_R11 0x7d625a14 /* add %11,%2,%11 */
214 /* ld %12,0(%11) */
215 /* ld %2,8(%11) */
216 /* mtctr %12 */
217 /* ld %11,16(%11) */
ee4bf8d2 218 /* bctr */
b9e5796b
AM
219#define MFLR_R0 0x7c0802a6 /* mflr %r0 */
220#define MTLR_R0 0x7c0803a6 /* mtlr %r0 */
221#define SUB_R12_R12_R11 0x7d8b6050 /* subf %r12,%r11,%r12 */
222#define ADDI_R0_R12 0x380c0000 /* addi %r0,%r12,0 */
223#define SRDI_R0_R0_2 0x7800f082 /* rldicl %r0,%r0,62,2 */
5d1634d7
AM
224
225/* Pad with this. */
226#define NOP 0x60000000
227
721956f4
AM
228/* Some other nops. */
229#define CROR_151515 0x4def7b82
230#define CROR_313131 0x4ffffb82
231
cedb70c5 232/* .glink entries for the first 32k functions are two instructions. */
5d1634d7
AM
233#define LI_R0_0 0x38000000 /* li %r0,0 */
234#define B_DOT 0x48000000 /* b . */
235
236/* After that, we need two instructions to load the index, followed by
237 a branch. */
238#define LIS_R0_0 0x3c000000 /* lis %r0,0 */
10ed1bba 239#define ORI_R0_R0_0 0x60000000 /* ori %r0,%r0,0 */
41bd81ab 240
deb0e272
AM
241/* Instructions used by the save and restore reg functions. */
242#define STD_R0_0R1 0xf8010000 /* std %r0,0(%r1) */
243#define STD_R0_0R12 0xf80c0000 /* std %r0,0(%r12) */
244#define LD_R0_0R1 0xe8010000 /* ld %r0,0(%r1) */
245#define LD_R0_0R12 0xe80c0000 /* ld %r0,0(%r12) */
82bd7b59
AM
246#define STFD_FR0_0R1 0xd8010000 /* stfd %fr0,0(%r1) */
247#define LFD_FR0_0R1 0xc8010000 /* lfd %fr0,0(%r1) */
deb0e272
AM
248#define LI_R12_0 0x39800000 /* li %r12,0 */
249#define STVX_VR0_R12_R0 0x7c0c01ce /* stvx %v0,%r12,%r0 */
250#define LVX_VR0_R12_R0 0x7c0c00ce /* lvx %v0,%r12,%r0 */
251#define MTLR_R0 0x7c0803a6 /* mtlr %r0 */
82bd7b59
AM
252#define BLR 0x4e800020 /* blr */
253
41bd81ab
AM
254/* Since .opd is an array of descriptors and each entry will end up
255 with identical R_PPC64_RELATIVE relocs, there is really no need to
256 propagate .opd relocs; The dynamic linker should be taught to
1e2f5b6e 257 relocate .opd without reloc entries. */
41bd81ab
AM
258#ifndef NO_OPD_RELOCS
259#define NO_OPD_RELOCS 0
260#endif
810d4e75 261
a4b6fadd
AM
262#ifndef ARRAY_SIZE
263#define ARRAY_SIZE(a) (sizeof (a) / sizeof ((a)[0]))
264#endif
265
810d4e75
AM
266static inline int
267abiversion (bfd *abfd)
268{
269 return elf_elfheader (abfd)->e_flags & EF_PPC64_ABI;
270}
271
272static inline void
273set_abiversion (bfd *abfd, int ver)
274{
275 elf_elfheader (abfd)->e_flags &= ~EF_PPC64_ABI;
276 elf_elfheader (abfd)->e_flags |= ver & EF_PPC64_ABI;
277}
5bd4f169
AM
278\f
279/* Relocation HOWTO's. */
46807bf4
AM
280/* Like other ELF RELA targets that don't apply multiple
281 field-altering relocations to the same localation, src_mask is
282 always zero and pcrel_offset is the same as pc_relative.
283 PowerPC can always use a zero bitpos, even when the field is not at
284 the LSB. For example, a REL24 could use rightshift=2, bisize=24
285 and bitpos=2 which matches the ABI description, or as we do here,
286 rightshift=0, bitsize=26 and bitpos=0. */
287#define HOW(type, size, bitsize, mask, rightshift, pc_relative, \
288 complain, special_func) \
289 HOWTO (type, rightshift, size, bitsize, pc_relative, 0, \
290 complain_overflow_ ## complain, special_func, \
291 #type, FALSE, 0, mask, pc_relative)
292
04c9666a 293static reloc_howto_type *ppc64_elf_howto_table[(int) R_PPC64_max];
5bd4f169 294
f3185997
NC
295static reloc_howto_type ppc64_elf_howto_raw[] =
296{
5bd4f169 297 /* This reloc does nothing. */
46807bf4
AM
298 HOW (R_PPC64_NONE, 3, 0, 0, 0, FALSE, dont,
299 bfd_elf_generic_reloc),
5bd4f169
AM
300
301 /* A standard 32 bit relocation. */
46807bf4
AM
302 HOW (R_PPC64_ADDR32, 2, 32, 0xffffffff, 0, FALSE, bitfield,
303 bfd_elf_generic_reloc),
5bd4f169
AM
304
305 /* An absolute 26 bit branch; the lower two bits must be zero.
306 FIXME: we don't check that, we just clear them. */
46807bf4
AM
307 HOW (R_PPC64_ADDR24, 2, 26, 0x03fffffc, 0, FALSE, bitfield,
308 bfd_elf_generic_reloc),
5bd4f169
AM
309
310 /* A standard 16 bit relocation. */
46807bf4
AM
311 HOW (R_PPC64_ADDR16, 1, 16, 0xffff, 0, FALSE, bitfield,
312 bfd_elf_generic_reloc),
5bd4f169
AM
313
314 /* A 16 bit relocation without overflow. */
46807bf4
AM
315 HOW (R_PPC64_ADDR16_LO, 1, 16, 0xffff, 0, FALSE, dont,
316 bfd_elf_generic_reloc),
5bd4f169
AM
317
318 /* Bits 16-31 of an address. */
46807bf4
AM
319 HOW (R_PPC64_ADDR16_HI, 1, 16, 0xffff, 16, FALSE, signed,
320 bfd_elf_generic_reloc),
5bd4f169
AM
321
322 /* Bits 16-31 of an address, plus 1 if the contents of the low 16
323 bits, treated as a signed number, is negative. */
46807bf4
AM
324 HOW (R_PPC64_ADDR16_HA, 1, 16, 0xffff, 16, FALSE, signed,
325 ppc64_elf_ha_reloc),
5bd4f169
AM
326
327 /* An absolute 16 bit branch; the lower two bits must be zero.
328 FIXME: we don't check that, we just clear them. */
46807bf4
AM
329 HOW (R_PPC64_ADDR14, 2, 16, 0x0000fffc, 0, FALSE, signed,
330 ppc64_elf_branch_reloc),
5bd4f169
AM
331
332 /* An absolute 16 bit branch, for which bit 10 should be set to
333 indicate that the branch is expected to be taken. The lower two
334 bits must be zero. */
46807bf4
AM
335 HOW (R_PPC64_ADDR14_BRTAKEN, 2, 16, 0x0000fffc, 0, FALSE, signed,
336 ppc64_elf_brtaken_reloc),
5bd4f169
AM
337
338 /* An absolute 16 bit branch, for which bit 10 should be set to
339 indicate that the branch is not expected to be taken. The lower
340 two bits must be zero. */
46807bf4
AM
341 HOW (R_PPC64_ADDR14_BRNTAKEN, 2, 16, 0x0000fffc, 0, FALSE, signed,
342 ppc64_elf_brtaken_reloc),
5bd4f169
AM
343
344 /* A relative 26 bit branch; the lower two bits must be zero. */
46807bf4
AM
345 HOW (R_PPC64_REL24, 2, 26, 0x03fffffc, 0, TRUE, signed,
346 ppc64_elf_branch_reloc),
5bd4f169 347
05d0e962 348 /* A variant of R_PPC64_REL24, used when r2 is not the toc pointer. */
46807bf4
AM
349 HOW (R_PPC64_REL24_NOTOC, 2, 26, 0x03fffffc, 0, TRUE, signed,
350 ppc64_elf_branch_reloc),
05d0e962 351
5bd4f169 352 /* A relative 16 bit branch; the lower two bits must be zero. */
46807bf4
AM
353 HOW (R_PPC64_REL14, 2, 16, 0x0000fffc, 0, TRUE, signed,
354 ppc64_elf_branch_reloc),
5bd4f169
AM
355
356 /* A relative 16 bit branch. Bit 10 should be set to indicate that
357 the branch is expected to be taken. The lower two bits must be
358 zero. */
46807bf4
AM
359 HOW (R_PPC64_REL14_BRTAKEN, 2, 16, 0x0000fffc, 0, TRUE, signed,
360 ppc64_elf_brtaken_reloc),
5bd4f169
AM
361
362 /* A relative 16 bit branch. Bit 10 should be set to indicate that
363 the branch is not expected to be taken. The lower two bits must
364 be zero. */
46807bf4
AM
365 HOW (R_PPC64_REL14_BRNTAKEN, 2, 16, 0x0000fffc, 0, TRUE, signed,
366 ppc64_elf_brtaken_reloc),
5bd4f169
AM
367
368 /* Like R_PPC64_ADDR16, but referring to the GOT table entry for the
369 symbol. */
46807bf4
AM
370 HOW (R_PPC64_GOT16, 1, 16, 0xffff, 0, FALSE, signed,
371 ppc64_elf_unhandled_reloc),
5bd4f169
AM
372
373 /* Like R_PPC64_ADDR16_LO, but referring to the GOT table entry for
374 the symbol. */
46807bf4
AM
375 HOW (R_PPC64_GOT16_LO, 1, 16, 0xffff, 0, FALSE, dont,
376 ppc64_elf_unhandled_reloc),
5bd4f169
AM
377
378 /* Like R_PPC64_ADDR16_HI, but referring to the GOT table entry for
379 the symbol. */
46807bf4
AM
380 HOW (R_PPC64_GOT16_HI, 1, 16, 0xffff, 16, FALSE, signed,
381 ppc64_elf_unhandled_reloc),
5bd4f169
AM
382
383 /* Like R_PPC64_ADDR16_HA, but referring to the GOT table entry for
384 the symbol. */
46807bf4
AM
385 HOW (R_PPC64_GOT16_HA, 1, 16, 0xffff, 16, FALSE, signed,
386 ppc64_elf_unhandled_reloc),
5bd4f169
AM
387
388 /* This is used only by the dynamic linker. The symbol should exist
389 both in the object being run and in some shared library. The
390 dynamic linker copies the data addressed by the symbol from the
391 shared library into the object, because the object being
392 run has to have the data at some particular address. */
46807bf4
AM
393 HOW (R_PPC64_COPY, 0, 0, 0, 0, FALSE, dont,
394 ppc64_elf_unhandled_reloc),
5bd4f169
AM
395
396 /* Like R_PPC64_ADDR64, but used when setting global offset table
397 entries. */
46807bf4
AM
398 HOW (R_PPC64_GLOB_DAT, 4, 64, 0xffffffffffffffffULL, 0, FALSE, dont,
399 ppc64_elf_unhandled_reloc),
5bd4f169
AM
400
401 /* Created by the link editor. Marks a procedure linkage table
402 entry for a symbol. */
46807bf4
AM
403 HOW (R_PPC64_JMP_SLOT, 0, 0, 0, 0, FALSE, dont,
404 ppc64_elf_unhandled_reloc),
5bd4f169
AM
405
406 /* Used only by the dynamic linker. When the object is run, this
407 doubleword64 is set to the load address of the object, plus the
408 addend. */
46807bf4
AM
409 HOW (R_PPC64_RELATIVE, 4, 64, 0xffffffffffffffffULL, 0, FALSE, dont,
410 bfd_elf_generic_reloc),
5bd4f169
AM
411
412 /* Like R_PPC64_ADDR32, but may be unaligned. */
46807bf4
AM
413 HOW (R_PPC64_UADDR32, 2, 32, 0xffffffff, 0, FALSE, bitfield,
414 bfd_elf_generic_reloc),
5bd4f169
AM
415
416 /* Like R_PPC64_ADDR16, but may be unaligned. */
46807bf4
AM
417 HOW (R_PPC64_UADDR16, 1, 16, 0xffff, 0, FALSE, bitfield,
418 bfd_elf_generic_reloc),
5bd4f169
AM
419
420 /* 32-bit PC relative. */
46807bf4
AM
421 HOW (R_PPC64_REL32, 2, 32, 0xffffffff, 0, TRUE, signed,
422 bfd_elf_generic_reloc),
5bd4f169 423
10ed1bba 424 /* 32-bit relocation to the symbol's procedure linkage table. */
46807bf4
AM
425 HOW (R_PPC64_PLT32, 2, 32, 0xffffffff, 0, FALSE, bitfield,
426 ppc64_elf_unhandled_reloc),
5bd4f169
AM
427
428 /* 32-bit PC relative relocation to the symbol's procedure linkage table.
429 FIXME: R_PPC64_PLTREL32 not supported. */
46807bf4
AM
430 HOW (R_PPC64_PLTREL32, 2, 32, 0xffffffff, 0, TRUE, signed,
431 ppc64_elf_unhandled_reloc),
5bd4f169
AM
432
433 /* Like R_PPC64_ADDR16_LO, but referring to the PLT table entry for
434 the symbol. */
46807bf4
AM
435 HOW (R_PPC64_PLT16_LO, 1, 16, 0xffff, 0, FALSE, dont,
436 ppc64_elf_unhandled_reloc),
5bd4f169
AM
437
438 /* Like R_PPC64_ADDR16_HI, but referring to the PLT table entry for
439 the symbol. */
46807bf4
AM
440 HOW (R_PPC64_PLT16_HI, 1, 16, 0xffff, 16, FALSE, signed,
441 ppc64_elf_unhandled_reloc),
5bd4f169
AM
442
443 /* Like R_PPC64_ADDR16_HA, but referring to the PLT table entry for
444 the symbol. */
46807bf4
AM
445 HOW (R_PPC64_PLT16_HA, 1, 16, 0xffff, 16, FALSE, signed,
446 ppc64_elf_unhandled_reloc),
5bd4f169 447
c061c2d8 448 /* 16-bit section relative relocation. */
46807bf4
AM
449 HOW (R_PPC64_SECTOFF, 1, 16, 0xffff, 0, FALSE, signed,
450 ppc64_elf_sectoff_reloc),
5bd4f169 451
c061c2d8 452 /* Like R_PPC64_SECTOFF, but no overflow warning. */
46807bf4
AM
453 HOW (R_PPC64_SECTOFF_LO, 1, 16, 0xffff, 0, FALSE, dont,
454 ppc64_elf_sectoff_reloc),
5bd4f169
AM
455
456 /* 16-bit upper half section relative relocation. */
46807bf4
AM
457 HOW (R_PPC64_SECTOFF_HI, 1, 16, 0xffff, 16, FALSE, signed,
458 ppc64_elf_sectoff_reloc),
5bd4f169
AM
459
460 /* 16-bit upper half adjusted section relative relocation. */
46807bf4
AM
461 HOW (R_PPC64_SECTOFF_HA, 1, 16, 0xffff, 16, FALSE, signed,
462 ppc64_elf_sectoff_ha_reloc),
5bd4f169 463
04c9666a 464 /* Like R_PPC64_REL24 without touching the two least significant bits. */
46807bf4
AM
465 HOW (R_PPC64_REL30, 2, 30, 0xfffffffc, 2, TRUE, dont,
466 bfd_elf_generic_reloc),
5bd4f169
AM
467
468 /* Relocs in the 64-bit PowerPC ELF ABI, not in the 32-bit ABI. */
469
470 /* A standard 64-bit relocation. */
46807bf4
AM
471 HOW (R_PPC64_ADDR64, 4, 64, 0xffffffffffffffffULL, 0, FALSE, dont,
472 bfd_elf_generic_reloc),
5bd4f169
AM
473
474 /* The bits 32-47 of an address. */
46807bf4
AM
475 HOW (R_PPC64_ADDR16_HIGHER, 1, 16, 0xffff, 32, FALSE, dont,
476 bfd_elf_generic_reloc),
5bd4f169
AM
477
478 /* The bits 32-47 of an address, plus 1 if the contents of the low
479 16 bits, treated as a signed number, is negative. */
46807bf4
AM
480 HOW (R_PPC64_ADDR16_HIGHERA, 1, 16, 0xffff, 32, FALSE, dont,
481 ppc64_elf_ha_reloc),
5bd4f169
AM
482
483 /* The bits 48-63 of an address. */
46807bf4
AM
484 HOW (R_PPC64_ADDR16_HIGHEST, 1, 16, 0xffff, 48, FALSE, dont,
485 bfd_elf_generic_reloc),
5bd4f169
AM
486
487 /* The bits 48-63 of an address, plus 1 if the contents of the low
488 16 bits, treated as a signed number, is negative. */
46807bf4
AM
489 HOW (R_PPC64_ADDR16_HIGHESTA, 1, 16, 0xffff, 48, FALSE, dont,
490 ppc64_elf_ha_reloc),
5bd4f169
AM
491
492 /* Like ADDR64, but may be unaligned. */
46807bf4
AM
493 HOW (R_PPC64_UADDR64, 4, 64, 0xffffffffffffffffULL, 0, FALSE, dont,
494 bfd_elf_generic_reloc),
5bd4f169
AM
495
496 /* 64-bit relative relocation. */
46807bf4
AM
497 HOW (R_PPC64_REL64, 4, 64, 0xffffffffffffffffULL, 0, TRUE, dont,
498 bfd_elf_generic_reloc),
5bd4f169 499
cedb70c5 500 /* 64-bit relocation to the symbol's procedure linkage table. */
46807bf4
AM
501 HOW (R_PPC64_PLT64, 4, 64, 0xffffffffffffffffULL, 0, FALSE, dont,
502 ppc64_elf_unhandled_reloc),
5bd4f169
AM
503
504 /* 64-bit PC relative relocation to the symbol's procedure linkage
505 table. */
506 /* FIXME: R_PPC64_PLTREL64 not supported. */
46807bf4
AM
507 HOW (R_PPC64_PLTREL64, 4, 64, 0xffffffffffffffffULL, 0, TRUE, dont,
508 ppc64_elf_unhandled_reloc),
5bd4f169
AM
509
510 /* 16 bit TOC-relative relocation. */
5bd4f169 511 /* R_PPC64_TOC16 47 half16* S + A - .TOC. */
46807bf4
AM
512 HOW (R_PPC64_TOC16, 1, 16, 0xffff, 0, FALSE, signed,
513 ppc64_elf_toc_reloc),
5bd4f169
AM
514
515 /* 16 bit TOC-relative relocation without overflow. */
5bd4f169 516 /* R_PPC64_TOC16_LO 48 half16 #lo (S + A - .TOC.) */
46807bf4
AM
517 HOW (R_PPC64_TOC16_LO, 1, 16, 0xffff, 0, FALSE, dont,
518 ppc64_elf_toc_reloc),
5bd4f169
AM
519
520 /* 16 bit TOC-relative relocation, high 16 bits. */
5bd4f169 521 /* R_PPC64_TOC16_HI 49 half16 #hi (S + A - .TOC.) */
46807bf4
AM
522 HOW (R_PPC64_TOC16_HI, 1, 16, 0xffff, 16, FALSE, signed,
523 ppc64_elf_toc_reloc),
5bd4f169
AM
524
525 /* 16 bit TOC-relative relocation, high 16 bits, plus 1 if the
526 contents of the low 16 bits, treated as a signed number, is
527 negative. */
5bd4f169 528 /* R_PPC64_TOC16_HA 50 half16 #ha (S + A - .TOC.) */
46807bf4
AM
529 HOW (R_PPC64_TOC16_HA, 1, 16, 0xffff, 16, FALSE, signed,
530 ppc64_elf_toc_ha_reloc),
5bd4f169
AM
531
532 /* 64-bit relocation; insert value of TOC base (.TOC.). */
5bd4f169 533 /* R_PPC64_TOC 51 doubleword64 .TOC. */
46807bf4
AM
534 HOW (R_PPC64_TOC, 4, 64, 0xffffffffffffffffULL, 0, FALSE, dont,
535 ppc64_elf_toc64_reloc),
5bd4f169
AM
536
537 /* Like R_PPC64_GOT16, but also informs the link editor that the
538 value to relocate may (!) refer to a PLT entry which the link
539 editor (a) may replace with the symbol value. If the link editor
540 is unable to fully resolve the symbol, it may (b) create a PLT
541 entry and store the address to the new PLT entry in the GOT.
542 This permits lazy resolution of function symbols at run time.
543 The link editor may also skip all of this and just (c) emit a
544 R_PPC64_GLOB_DAT to tie the symbol to the GOT entry. */
545 /* FIXME: R_PPC64_PLTGOT16 not implemented. */
46807bf4
AM
546 HOW (R_PPC64_PLTGOT16, 1, 16, 0xffff, 0, FALSE,signed,
547 ppc64_elf_unhandled_reloc),
411e1bfb
AM
548
549 /* Like R_PPC64_PLTGOT16, but without overflow. */
550 /* FIXME: R_PPC64_PLTGOT16_LO not implemented. */
46807bf4
AM
551 HOW (R_PPC64_PLTGOT16_LO, 1, 16, 0xffff, 0, FALSE, dont,
552 ppc64_elf_unhandled_reloc),
411e1bfb
AM
553
554 /* Like R_PPC64_PLT_GOT16, but using bits 16-31 of the address. */
555 /* FIXME: R_PPC64_PLTGOT16_HI not implemented. */
46807bf4
AM
556 HOW (R_PPC64_PLTGOT16_HI, 1, 16, 0xffff, 16, FALSE, signed,
557 ppc64_elf_unhandled_reloc),
411e1bfb
AM
558
559 /* Like R_PPC64_PLT_GOT16, but using bits 16-31 of the address, plus
560 1 if the contents of the low 16 bits, treated as a signed number,
561 is negative. */
562 /* FIXME: R_PPC64_PLTGOT16_HA not implemented. */
46807bf4
AM
563 HOW (R_PPC64_PLTGOT16_HA, 1, 16, 0xffff, 16, FALSE, signed,
564 ppc64_elf_unhandled_reloc),
411e1bfb
AM
565
566 /* Like R_PPC64_ADDR16, but for instructions with a DS field. */
46807bf4
AM
567 HOW (R_PPC64_ADDR16_DS, 1, 16, 0xfffc, 0, FALSE, signed,
568 bfd_elf_generic_reloc),
411e1bfb
AM
569
570 /* Like R_PPC64_ADDR16_LO, but for instructions with a DS field. */
46807bf4
AM
571 HOW (R_PPC64_ADDR16_LO_DS, 1, 16, 0xfffc, 0, FALSE, dont,
572 bfd_elf_generic_reloc),
411e1bfb
AM
573
574 /* Like R_PPC64_GOT16, but for instructions with a DS field. */
46807bf4
AM
575 HOW (R_PPC64_GOT16_DS, 1, 16, 0xfffc, 0, FALSE, signed,
576 ppc64_elf_unhandled_reloc),
411e1bfb
AM
577
578 /* Like R_PPC64_GOT16_LO, but for instructions with a DS field. */
46807bf4
AM
579 HOW (R_PPC64_GOT16_LO_DS, 1, 16, 0xfffc, 0, FALSE, dont,
580 ppc64_elf_unhandled_reloc),
411e1bfb
AM
581
582 /* Like R_PPC64_PLT16_LO, but for instructions with a DS field. */
46807bf4
AM
583 HOW (R_PPC64_PLT16_LO_DS, 1, 16, 0xfffc, 0, FALSE, dont,
584 ppc64_elf_unhandled_reloc),
411e1bfb
AM
585
586 /* Like R_PPC64_SECTOFF, but for instructions with a DS field. */
46807bf4
AM
587 HOW (R_PPC64_SECTOFF_DS, 1, 16, 0xfffc, 0, FALSE, signed,
588 ppc64_elf_sectoff_reloc),
411e1bfb
AM
589
590 /* Like R_PPC64_SECTOFF_LO, but for instructions with a DS field. */
46807bf4
AM
591 HOW (R_PPC64_SECTOFF_LO_DS, 1, 16, 0xfffc, 0, FALSE, dont,
592 ppc64_elf_sectoff_reloc),
411e1bfb
AM
593
594 /* Like R_PPC64_TOC16, but for instructions with a DS field. */
46807bf4
AM
595 HOW (R_PPC64_TOC16_DS, 1, 16, 0xfffc, 0, FALSE, signed,
596 ppc64_elf_toc_reloc),
411e1bfb
AM
597
598 /* Like R_PPC64_TOC16_LO, but for instructions with a DS field. */
46807bf4
AM
599 HOW (R_PPC64_TOC16_LO_DS, 1, 16, 0xfffc, 0, FALSE, dont,
600 ppc64_elf_toc_reloc),
411e1bfb
AM
601
602 /* Like R_PPC64_PLTGOT16, but for instructions with a DS field. */
603 /* FIXME: R_PPC64_PLTGOT16_DS not implemented. */
46807bf4
AM
604 HOW (R_PPC64_PLTGOT16_DS, 1, 16, 0xfffc, 0, FALSE, signed,
605 ppc64_elf_unhandled_reloc),
411e1bfb
AM
606
607 /* Like R_PPC64_PLTGOT16_LO, but for instructions with a DS field. */
608 /* FIXME: R_PPC64_PLTGOT16_LO not implemented. */
46807bf4
AM
609 HOW (R_PPC64_PLTGOT16_LO_DS, 1, 16, 0xfffc, 0, FALSE, dont,
610 ppc64_elf_unhandled_reloc),
411e1bfb 611
727fc41e 612 /* Marker relocs for TLS. */
46807bf4
AM
613 HOW (R_PPC64_TLS, 2, 32, 0, 0, FALSE, dont,
614 bfd_elf_generic_reloc),
615
616 HOW (R_PPC64_TLSGD, 2, 32, 0, 0, FALSE, dont,
617 bfd_elf_generic_reloc),
618
619 HOW (R_PPC64_TLSLD, 2, 32, 0, 0, FALSE, dont,
620 bfd_elf_generic_reloc),
727fc41e 621
23cedd1d
AM
622 /* Marker reloc for optimizing r2 save in prologue rather than on
623 each plt call stub. */
46807bf4
AM
624 HOW (R_PPC64_TOCSAVE, 2, 32, 0, 0, FALSE, dont,
625 bfd_elf_generic_reloc),
3b421ab3 626
23cedd1d 627 /* Marker relocs on inline plt call instructions. */
46807bf4
AM
628 HOW (R_PPC64_PLTSEQ, 2, 32, 0, 0, FALSE, dont,
629 bfd_elf_generic_reloc),
630
631 HOW (R_PPC64_PLTCALL, 2, 32, 0, 0, FALSE, dont,
632 bfd_elf_generic_reloc),
23cedd1d 633
411e1bfb
AM
634 /* Computes the load module index of the load module that contains the
635 definition of its TLS sym. */
46807bf4
AM
636 HOW (R_PPC64_DTPMOD64, 4, 64, 0xffffffffffffffffULL, 0, FALSE, dont,
637 ppc64_elf_unhandled_reloc),
411e1bfb
AM
638
639 /* Computes a dtv-relative displacement, the difference between the value
640 of sym+add and the base address of the thread-local storage block that
641 contains the definition of sym, minus 0x8000. */
46807bf4
AM
642 HOW (R_PPC64_DTPREL64, 4, 64, 0xffffffffffffffffULL, 0, FALSE, dont,
643 ppc64_elf_unhandled_reloc),
411e1bfb
AM
644
645 /* A 16 bit dtprel reloc. */
46807bf4
AM
646 HOW (R_PPC64_DTPREL16, 1, 16, 0xffff, 0, FALSE, signed,
647 ppc64_elf_unhandled_reloc),
411e1bfb
AM
648
649 /* Like DTPREL16, but no overflow. */
46807bf4
AM
650 HOW (R_PPC64_DTPREL16_LO, 1, 16, 0xffff, 0, FALSE, dont,
651 ppc64_elf_unhandled_reloc),
411e1bfb
AM
652
653 /* Like DTPREL16_LO, but next higher group of 16 bits. */
46807bf4
AM
654 HOW (R_PPC64_DTPREL16_HI, 1, 16, 0xffff, 16, FALSE, signed,
655 ppc64_elf_unhandled_reloc),
411e1bfb
AM
656
657 /* Like DTPREL16_HI, but adjust for low 16 bits. */
46807bf4
AM
658 HOW (R_PPC64_DTPREL16_HA, 1, 16, 0xffff, 16, FALSE, signed,
659 ppc64_elf_unhandled_reloc),
411e1bfb
AM
660
661 /* Like DTPREL16_HI, but next higher group of 16 bits. */
46807bf4
AM
662 HOW (R_PPC64_DTPREL16_HIGHER, 1, 16, 0xffff, 32, FALSE, dont,
663 ppc64_elf_unhandled_reloc),
411e1bfb
AM
664
665 /* Like DTPREL16_HIGHER, but adjust for low 16 bits. */
46807bf4
AM
666 HOW (R_PPC64_DTPREL16_HIGHERA, 1, 16, 0xffff, 32, FALSE, dont,
667 ppc64_elf_unhandled_reloc),
411e1bfb
AM
668
669 /* Like DTPREL16_HIGHER, but next higher group of 16 bits. */
46807bf4
AM
670 HOW (R_PPC64_DTPREL16_HIGHEST, 1, 16, 0xffff, 48, FALSE, dont,
671 ppc64_elf_unhandled_reloc),
411e1bfb
AM
672
673 /* Like DTPREL16_HIGHEST, but adjust for low 16 bits. */
46807bf4
AM
674 HOW (R_PPC64_DTPREL16_HIGHESTA, 1, 16, 0xffff, 48, FALSE, dont,
675 ppc64_elf_unhandled_reloc),
411e1bfb
AM
676
677 /* Like DTPREL16, but for insns with a DS field. */
46807bf4
AM
678 HOW (R_PPC64_DTPREL16_DS, 1, 16, 0xfffc, 0, FALSE, signed,
679 ppc64_elf_unhandled_reloc),
411e1bfb
AM
680
681 /* Like DTPREL16_DS, but no overflow. */
46807bf4
AM
682 HOW (R_PPC64_DTPREL16_LO_DS, 1, 16, 0xfffc, 0, FALSE, dont,
683 ppc64_elf_unhandled_reloc),
411e1bfb
AM
684
685 /* Computes a tp-relative displacement, the difference between the value of
686 sym+add and the value of the thread pointer (r13). */
46807bf4
AM
687 HOW (R_PPC64_TPREL64, 4, 64, 0xffffffffffffffffULL, 0, FALSE, dont,
688 ppc64_elf_unhandled_reloc),
411e1bfb
AM
689
690 /* A 16 bit tprel reloc. */
46807bf4
AM
691 HOW (R_PPC64_TPREL16, 1, 16, 0xffff, 0, FALSE, signed,
692 ppc64_elf_unhandled_reloc),
411e1bfb
AM
693
694 /* Like TPREL16, but no overflow. */
46807bf4
AM
695 HOW (R_PPC64_TPREL16_LO, 1, 16, 0xffff, 0, FALSE, dont,
696 ppc64_elf_unhandled_reloc),
411e1bfb
AM
697
698 /* Like TPREL16_LO, but next higher group of 16 bits. */
46807bf4
AM
699 HOW (R_PPC64_TPREL16_HI, 1, 16, 0xffff, 16, FALSE, signed,
700 ppc64_elf_unhandled_reloc),
411e1bfb
AM
701
702 /* Like TPREL16_HI, but adjust for low 16 bits. */
46807bf4
AM
703 HOW (R_PPC64_TPREL16_HA, 1, 16, 0xffff, 16, FALSE, signed,
704 ppc64_elf_unhandled_reloc),
411e1bfb
AM
705
706 /* Like TPREL16_HI, but next higher group of 16 bits. */
46807bf4
AM
707 HOW (R_PPC64_TPREL16_HIGHER, 1, 16, 0xffff, 32, FALSE, dont,
708 ppc64_elf_unhandled_reloc),
411e1bfb
AM
709
710 /* Like TPREL16_HIGHER, but adjust for low 16 bits. */
46807bf4
AM
711 HOW (R_PPC64_TPREL16_HIGHERA, 1, 16, 0xffff, 32, FALSE, dont,
712 ppc64_elf_unhandled_reloc),
411e1bfb
AM
713
714 /* Like TPREL16_HIGHER, but next higher group of 16 bits. */
46807bf4
AM
715 HOW (R_PPC64_TPREL16_HIGHEST, 1, 16, 0xffff, 48, FALSE, dont,
716 ppc64_elf_unhandled_reloc),
411e1bfb
AM
717
718 /* Like TPREL16_HIGHEST, but adjust for low 16 bits. */
46807bf4
AM
719 HOW (R_PPC64_TPREL16_HIGHESTA, 1, 16, 0xffff, 48, FALSE, dont,
720 ppc64_elf_unhandled_reloc),
411e1bfb
AM
721
722 /* Like TPREL16, but for insns with a DS field. */
46807bf4
AM
723 HOW (R_PPC64_TPREL16_DS, 1, 16, 0xfffc, 0, FALSE, signed,
724 ppc64_elf_unhandled_reloc),
411e1bfb
AM
725
726 /* Like TPREL16_DS, but no overflow. */
46807bf4
AM
727 HOW (R_PPC64_TPREL16_LO_DS, 1, 16, 0xfffc, 0, FALSE, dont,
728 ppc64_elf_unhandled_reloc),
411e1bfb
AM
729
730 /* Allocates two contiguous entries in the GOT to hold a tls_index structure,
731 with values (sym+add)@dtpmod and (sym+add)@dtprel, and computes the offset
732 to the first entry relative to the TOC base (r2). */
46807bf4
AM
733 HOW (R_PPC64_GOT_TLSGD16, 1, 16, 0xffff, 0, FALSE, signed,
734 ppc64_elf_unhandled_reloc),
5bd4f169 735
411e1bfb 736 /* Like GOT_TLSGD16, but no overflow. */
46807bf4
AM
737 HOW (R_PPC64_GOT_TLSGD16_LO, 1, 16, 0xffff, 0, FALSE, dont,
738 ppc64_elf_unhandled_reloc),
5bd4f169 739
411e1bfb 740 /* Like GOT_TLSGD16_LO, but next higher group of 16 bits. */
46807bf4
AM
741 HOW (R_PPC64_GOT_TLSGD16_HI, 1, 16, 0xffff, 16, FALSE, signed,
742 ppc64_elf_unhandled_reloc),
5bd4f169 743
411e1bfb 744 /* Like GOT_TLSGD16_HI, but adjust for low 16 bits. */
46807bf4
AM
745 HOW (R_PPC64_GOT_TLSGD16_HA, 1, 16, 0xffff, 16, FALSE, signed,
746 ppc64_elf_unhandled_reloc),
5bd4f169 747
411e1bfb
AM
748 /* Allocates two contiguous entries in the GOT to hold a tls_index structure,
749 with values (sym+add)@dtpmod and zero, and computes the offset to the
750 first entry relative to the TOC base (r2). */
46807bf4
AM
751 HOW (R_PPC64_GOT_TLSLD16, 1, 16, 0xffff, 0, FALSE, signed,
752 ppc64_elf_unhandled_reloc),
5bd4f169 753
411e1bfb 754 /* Like GOT_TLSLD16, but no overflow. */
46807bf4
AM
755 HOW (R_PPC64_GOT_TLSLD16_LO, 1, 16, 0xffff, 0, FALSE, dont,
756 ppc64_elf_unhandled_reloc),
5bd4f169 757
411e1bfb 758 /* Like GOT_TLSLD16_LO, but next higher group of 16 bits. */
46807bf4
AM
759 HOW (R_PPC64_GOT_TLSLD16_HI, 1, 16, 0xffff, 16, FALSE, signed,
760 ppc64_elf_unhandled_reloc),
5bd4f169 761
411e1bfb 762 /* Like GOT_TLSLD16_HI, but adjust for low 16 bits. */
46807bf4
AM
763 HOW (R_PPC64_GOT_TLSLD16_HA, 1, 16, 0xffff, 16, FALSE, signed,
764 ppc64_elf_unhandled_reloc),
5bd4f169 765
411e1bfb
AM
766 /* Allocates an entry in the GOT with value (sym+add)@dtprel, and computes
767 the offset to the entry relative to the TOC base (r2). */
46807bf4
AM
768 HOW (R_PPC64_GOT_DTPREL16_DS, 1, 16, 0xfffc, 0, FALSE, signed,
769 ppc64_elf_unhandled_reloc),
5bd4f169 770
411e1bfb 771 /* Like GOT_DTPREL16_DS, but no overflow. */
46807bf4
AM
772 HOW (R_PPC64_GOT_DTPREL16_LO_DS, 1, 16, 0xfffc, 0, FALSE, dont,
773 ppc64_elf_unhandled_reloc),
5bd4f169 774
411e1bfb 775 /* Like GOT_DTPREL16_LO_DS, but next higher group of 16 bits. */
46807bf4
AM
776 HOW (R_PPC64_GOT_DTPREL16_HI, 1, 16, 0xffff, 16, FALSE, signed,
777 ppc64_elf_unhandled_reloc),
5bd4f169 778
411e1bfb 779 /* Like GOT_DTPREL16_HI, but adjust for low 16 bits. */
46807bf4
AM
780 HOW (R_PPC64_GOT_DTPREL16_HA, 1, 16, 0xffff, 16, FALSE, signed,
781 ppc64_elf_unhandled_reloc),
411e1bfb
AM
782
783 /* Allocates an entry in the GOT with value (sym+add)@tprel, and computes the
784 offset to the entry relative to the TOC base (r2). */
46807bf4
AM
785 HOW (R_PPC64_GOT_TPREL16_DS, 1, 16, 0xfffc, 0, FALSE, signed,
786 ppc64_elf_unhandled_reloc),
5bd4f169 787
411e1bfb 788 /* Like GOT_TPREL16_DS, but no overflow. */
46807bf4
AM
789 HOW (R_PPC64_GOT_TPREL16_LO_DS, 1, 16, 0xfffc, 0, FALSE, dont,
790 ppc64_elf_unhandled_reloc),
5bd4f169 791
411e1bfb 792 /* Like GOT_TPREL16_LO_DS, but next higher group of 16 bits. */
46807bf4
AM
793 HOW (R_PPC64_GOT_TPREL16_HI, 1, 16, 0xffff, 16, FALSE, signed,
794 ppc64_elf_unhandled_reloc),
5bd4f169 795
411e1bfb 796 /* Like GOT_TPREL16_HI, but adjust for low 16 bits. */
46807bf4
AM
797 HOW (R_PPC64_GOT_TPREL16_HA, 1, 16, 0xffff, 16, FALSE, signed,
798 ppc64_elf_unhandled_reloc),
799
800 HOW (R_PPC64_JMP_IREL, 0, 0, 0, 0, FALSE, dont,
801 ppc64_elf_unhandled_reloc),
802
803 HOW (R_PPC64_IRELATIVE, 4, 64, 0xffffffffffffffffULL, 0, FALSE, dont,
804 bfd_elf_generic_reloc),
e054468f 805
25f23106 806 /* A 16 bit relative relocation. */
46807bf4
AM
807 HOW (R_PPC64_REL16, 1, 16, 0xffff, 0, TRUE, signed,
808 bfd_elf_generic_reloc),
25f23106
AM
809
810 /* A 16 bit relative relocation without overflow. */
46807bf4
AM
811 HOW (R_PPC64_REL16_LO, 1, 16, 0xffff, 0, TRUE, dont,
812 bfd_elf_generic_reloc),
25f23106
AM
813
814 /* The high order 16 bits of a relative address. */
46807bf4
AM
815 HOW (R_PPC64_REL16_HI, 1, 16, 0xffff, 16, TRUE, signed,
816 bfd_elf_generic_reloc),
25f23106
AM
817
818 /* The high order 16 bits of a relative address, plus 1 if the contents of
819 the low 16 bits, treated as a signed number, is negative. */
46807bf4
AM
820 HOW (R_PPC64_REL16_HA, 1, 16, 0xffff, 16, TRUE, signed,
821 ppc64_elf_ha_reloc),
25f23106 822
4a969973
AM
823 HOW (R_PPC64_REL16_HIGH, 1, 16, 0xffff, 16, TRUE, dont,
824 bfd_elf_generic_reloc),
825
826 HOW (R_PPC64_REL16_HIGHA, 1, 16, 0xffff, 16, TRUE, dont,
827 ppc64_elf_ha_reloc),
828
829 HOW (R_PPC64_REL16_HIGHER, 1, 16, 0xffff, 32, TRUE, dont,
830 bfd_elf_generic_reloc),
831
832 HOW (R_PPC64_REL16_HIGHERA, 1, 16, 0xffff, 32, TRUE, dont,
833 ppc64_elf_ha_reloc),
834
835 HOW (R_PPC64_REL16_HIGHEST, 1, 16, 0xffff, 48, TRUE, dont,
836 bfd_elf_generic_reloc),
837
838 HOW (R_PPC64_REL16_HIGHESTA, 1, 16, 0xffff, 48, TRUE, dont,
839 ppc64_elf_ha_reloc),
840
a680de9a 841 /* Like R_PPC64_REL16_HA but for split field in addpcis. */
46807bf4
AM
842 HOW (R_PPC64_REL16DX_HA, 2, 16, 0x1fffc1, 16, TRUE, signed,
843 ppc64_elf_ha_reloc),
a680de9a 844
7ba71655 845 /* A split-field reloc for addpcis, non-relative (gas internal use only). */
46807bf4
AM
846 HOW (R_PPC64_16DX_HA, 2, 16, 0x1fffc1, 16, FALSE, signed,
847 ppc64_elf_ha_reloc),
7ba71655 848
f9c6b907 849 /* Like R_PPC64_ADDR16_HI, but no overflow. */
46807bf4
AM
850 HOW (R_PPC64_ADDR16_HIGH, 1, 16, 0xffff, 16, FALSE, dont,
851 bfd_elf_generic_reloc),
f9c6b907
AM
852
853 /* Like R_PPC64_ADDR16_HA, but no overflow. */
46807bf4
AM
854 HOW (R_PPC64_ADDR16_HIGHA, 1, 16, 0xffff, 16, FALSE, dont,
855 ppc64_elf_ha_reloc),
f9c6b907
AM
856
857 /* Like R_PPC64_DTPREL16_HI, but no overflow. */
46807bf4
AM
858 HOW (R_PPC64_DTPREL16_HIGH, 1, 16, 0xffff, 16, FALSE, dont,
859 ppc64_elf_unhandled_reloc),
f9c6b907
AM
860
861 /* Like R_PPC64_DTPREL16_HA, but no overflow. */
46807bf4
AM
862 HOW (R_PPC64_DTPREL16_HIGHA, 1, 16, 0xffff, 16, FALSE, dont,
863 ppc64_elf_unhandled_reloc),
f9c6b907
AM
864
865 /* Like R_PPC64_TPREL16_HI, but no overflow. */
46807bf4
AM
866 HOW (R_PPC64_TPREL16_HIGH, 1, 16, 0xffff, 16, FALSE, dont,
867 ppc64_elf_unhandled_reloc),
f9c6b907
AM
868
869 /* Like R_PPC64_TPREL16_HA, but no overflow. */
46807bf4
AM
870 HOW (R_PPC64_TPREL16_HIGHA, 1, 16, 0xffff, 16, FALSE, dont,
871 ppc64_elf_unhandled_reloc),
f9c6b907 872
006589cf 873 /* Marker reloc on ELFv2 large-model function entry. */
46807bf4
AM
874 HOW (R_PPC64_ENTRY, 2, 32, 0, 0, FALSE, dont,
875 bfd_elf_generic_reloc),
006589cf 876
45965137 877 /* Like ADDR64, but use local entry point of function. */
46807bf4
AM
878 HOW (R_PPC64_ADDR64_LOCAL, 4, 64, 0xffffffffffffffffULL, 0, FALSE, dont,
879 bfd_elf_generic_reloc),
45965137 880
5bd4f169 881 /* GNU extension to record C++ vtable hierarchy. */
46807bf4
AM
882 HOW (R_PPC64_GNU_VTINHERIT, 0, 0, 0, 0, FALSE, dont,
883 NULL),
5bd4f169
AM
884
885 /* GNU extension to record C++ vtable member usage. */
46807bf4
AM
886 HOW (R_PPC64_GNU_VTENTRY, 0, 0, 0, 0, FALSE, dont,
887 NULL),
5bd4f169
AM
888};
889
890\f
891/* Initialize the ppc64_elf_howto_table, so that linear accesses can
892 be done. */
893
894static void
4ce794b7 895ppc_howto_init (void)
5bd4f169
AM
896{
897 unsigned int i, type;
898
a4b6fadd 899 for (i = 0; i < ARRAY_SIZE (ppc64_elf_howto_raw); i++)
5bd4f169
AM
900 {
901 type = ppc64_elf_howto_raw[i].type;
a4b6fadd 902 BFD_ASSERT (type < ARRAY_SIZE (ppc64_elf_howto_table));
5bd4f169
AM
903 ppc64_elf_howto_table[type] = &ppc64_elf_howto_raw[i];
904 }
905}
906
907static reloc_howto_type *
f3185997 908ppc64_elf_reloc_type_lookup (bfd *abfd,
4ce794b7 909 bfd_reloc_code_real_type code)
5bd4f169 910{
411e1bfb 911 enum elf_ppc64_reloc_type r = R_PPC64_NONE;
5bd4f169
AM
912
913 if (!ppc64_elf_howto_table[R_PPC64_ADDR32])
914 /* Initialize howto table if needed. */
915 ppc_howto_init ();
916
4ce794b7 917 switch (code)
5bd4f169
AM
918 {
919 default:
f3185997 920 /* xgettext:c-format */
2cdcc330
AM
921 _bfd_error_handler (_("%pB: unsupported relocation type %#x"), abfd,
922 (int) code);
f3185997 923 bfd_set_error (bfd_error_bad_value);
4ce794b7 924 return NULL;
5bd4f169 925
411e1bfb
AM
926 case BFD_RELOC_NONE: r = R_PPC64_NONE;
927 break;
928 case BFD_RELOC_32: r = R_PPC64_ADDR32;
929 break;
930 case BFD_RELOC_PPC_BA26: r = R_PPC64_ADDR24;
931 break;
932 case BFD_RELOC_16: r = R_PPC64_ADDR16;
933 break;
934 case BFD_RELOC_LO16: r = R_PPC64_ADDR16_LO;
935 break;
936 case BFD_RELOC_HI16: r = R_PPC64_ADDR16_HI;
937 break;
f9c6b907
AM
938 case BFD_RELOC_PPC64_ADDR16_HIGH: r = R_PPC64_ADDR16_HIGH;
939 break;
411e1bfb 940 case BFD_RELOC_HI16_S: r = R_PPC64_ADDR16_HA;
5bd4f169 941 break;
f9c6b907
AM
942 case BFD_RELOC_PPC64_ADDR16_HIGHA: r = R_PPC64_ADDR16_HIGHA;
943 break;
411e1bfb 944 case BFD_RELOC_PPC_BA16: r = R_PPC64_ADDR14;
5bd4f169 945 break;
411e1bfb 946 case BFD_RELOC_PPC_BA16_BRTAKEN: r = R_PPC64_ADDR14_BRTAKEN;
5bd4f169 947 break;
411e1bfb 948 case BFD_RELOC_PPC_BA16_BRNTAKEN: r = R_PPC64_ADDR14_BRNTAKEN;
5bd4f169 949 break;
411e1bfb 950 case BFD_RELOC_PPC_B26: r = R_PPC64_REL24;
5bd4f169 951 break;
05d0e962
AM
952 case BFD_RELOC_PPC64_REL24_NOTOC: r = R_PPC64_REL24_NOTOC;
953 break;
411e1bfb 954 case BFD_RELOC_PPC_B16: r = R_PPC64_REL14;
5bd4f169 955 break;
411e1bfb 956 case BFD_RELOC_PPC_B16_BRTAKEN: r = R_PPC64_REL14_BRTAKEN;
5bd4f169 957 break;
411e1bfb 958 case BFD_RELOC_PPC_B16_BRNTAKEN: r = R_PPC64_REL14_BRNTAKEN;
5bd4f169 959 break;
411e1bfb 960 case BFD_RELOC_16_GOTOFF: r = R_PPC64_GOT16;
5bd4f169 961 break;
411e1bfb 962 case BFD_RELOC_LO16_GOTOFF: r = R_PPC64_GOT16_LO;
5bd4f169 963 break;
411e1bfb 964 case BFD_RELOC_HI16_GOTOFF: r = R_PPC64_GOT16_HI;
5bd4f169 965 break;
411e1bfb 966 case BFD_RELOC_HI16_S_GOTOFF: r = R_PPC64_GOT16_HA;
5bd4f169 967 break;
411e1bfb 968 case BFD_RELOC_PPC_COPY: r = R_PPC64_COPY;
5bd4f169 969 break;
411e1bfb 970 case BFD_RELOC_PPC_GLOB_DAT: r = R_PPC64_GLOB_DAT;
5bd4f169 971 break;
411e1bfb 972 case BFD_RELOC_32_PCREL: r = R_PPC64_REL32;
5bd4f169 973 break;
411e1bfb 974 case BFD_RELOC_32_PLTOFF: r = R_PPC64_PLT32;
5bd4f169 975 break;
411e1bfb 976 case BFD_RELOC_32_PLT_PCREL: r = R_PPC64_PLTREL32;
5bd4f169 977 break;
411e1bfb 978 case BFD_RELOC_LO16_PLTOFF: r = R_PPC64_PLT16_LO;
5bd4f169 979 break;
411e1bfb 980 case BFD_RELOC_HI16_PLTOFF: r = R_PPC64_PLT16_HI;
5bd4f169 981 break;
411e1bfb 982 case BFD_RELOC_HI16_S_PLTOFF: r = R_PPC64_PLT16_HA;
5bd4f169 983 break;
411e1bfb 984 case BFD_RELOC_16_BASEREL: r = R_PPC64_SECTOFF;
5bd4f169 985 break;
411e1bfb 986 case BFD_RELOC_LO16_BASEREL: r = R_PPC64_SECTOFF_LO;
5bd4f169 987 break;
411e1bfb 988 case BFD_RELOC_HI16_BASEREL: r = R_PPC64_SECTOFF_HI;
5bd4f169 989 break;
411e1bfb 990 case BFD_RELOC_HI16_S_BASEREL: r = R_PPC64_SECTOFF_HA;
5bd4f169 991 break;
411e1bfb 992 case BFD_RELOC_CTOR: r = R_PPC64_ADDR64;
5bd4f169 993 break;
411e1bfb 994 case BFD_RELOC_64: r = R_PPC64_ADDR64;
5bd4f169 995 break;
411e1bfb 996 case BFD_RELOC_PPC64_HIGHER: r = R_PPC64_ADDR16_HIGHER;
5bd4f169 997 break;
411e1bfb 998 case BFD_RELOC_PPC64_HIGHER_S: r = R_PPC64_ADDR16_HIGHERA;
5bd4f169 999 break;
411e1bfb 1000 case BFD_RELOC_PPC64_HIGHEST: r = R_PPC64_ADDR16_HIGHEST;
5bd4f169 1001 break;
411e1bfb 1002 case BFD_RELOC_PPC64_HIGHEST_S: r = R_PPC64_ADDR16_HIGHESTA;
5bd4f169 1003 break;
411e1bfb 1004 case BFD_RELOC_64_PCREL: r = R_PPC64_REL64;
5bd4f169 1005 break;
411e1bfb 1006 case BFD_RELOC_64_PLTOFF: r = R_PPC64_PLT64;
5bd4f169 1007 break;
411e1bfb 1008 case BFD_RELOC_64_PLT_PCREL: r = R_PPC64_PLTREL64;
5bd4f169 1009 break;
411e1bfb 1010 case BFD_RELOC_PPC_TOC16: r = R_PPC64_TOC16;
5bd4f169 1011 break;
411e1bfb 1012 case BFD_RELOC_PPC64_TOC16_LO: r = R_PPC64_TOC16_LO;
5bd4f169 1013 break;
411e1bfb 1014 case BFD_RELOC_PPC64_TOC16_HI: r = R_PPC64_TOC16_HI;
5bd4f169 1015 break;
411e1bfb 1016 case BFD_RELOC_PPC64_TOC16_HA: r = R_PPC64_TOC16_HA;
5bd4f169 1017 break;
411e1bfb 1018 case BFD_RELOC_PPC64_TOC: r = R_PPC64_TOC;
5bd4f169 1019 break;
411e1bfb 1020 case BFD_RELOC_PPC64_PLTGOT16: r = R_PPC64_PLTGOT16;
5bd4f169 1021 break;
411e1bfb 1022 case BFD_RELOC_PPC64_PLTGOT16_LO: r = R_PPC64_PLTGOT16_LO;
5bd4f169 1023 break;
411e1bfb 1024 case BFD_RELOC_PPC64_PLTGOT16_HI: r = R_PPC64_PLTGOT16_HI;
5bd4f169 1025 break;
411e1bfb 1026 case BFD_RELOC_PPC64_PLTGOT16_HA: r = R_PPC64_PLTGOT16_HA;
5bd4f169 1027 break;
411e1bfb 1028 case BFD_RELOC_PPC64_ADDR16_DS: r = R_PPC64_ADDR16_DS;
5bd4f169 1029 break;
411e1bfb 1030 case BFD_RELOC_PPC64_ADDR16_LO_DS: r = R_PPC64_ADDR16_LO_DS;
5bd4f169 1031 break;
411e1bfb 1032 case BFD_RELOC_PPC64_GOT16_DS: r = R_PPC64_GOT16_DS;
5bd4f169 1033 break;
411e1bfb 1034 case BFD_RELOC_PPC64_GOT16_LO_DS: r = R_PPC64_GOT16_LO_DS;
5bd4f169 1035 break;
411e1bfb 1036 case BFD_RELOC_PPC64_PLT16_LO_DS: r = R_PPC64_PLT16_LO_DS;
5bd4f169 1037 break;
411e1bfb 1038 case BFD_RELOC_PPC64_SECTOFF_DS: r = R_PPC64_SECTOFF_DS;
5bd4f169 1039 break;
411e1bfb 1040 case BFD_RELOC_PPC64_SECTOFF_LO_DS: r = R_PPC64_SECTOFF_LO_DS;
5bd4f169 1041 break;
411e1bfb 1042 case BFD_RELOC_PPC64_TOC16_DS: r = R_PPC64_TOC16_DS;
5bd4f169 1043 break;
411e1bfb 1044 case BFD_RELOC_PPC64_TOC16_LO_DS: r = R_PPC64_TOC16_LO_DS;
5bd4f169 1045 break;
411e1bfb 1046 case BFD_RELOC_PPC64_PLTGOT16_DS: r = R_PPC64_PLTGOT16_DS;
5bd4f169 1047 break;
411e1bfb 1048 case BFD_RELOC_PPC64_PLTGOT16_LO_DS: r = R_PPC64_PLTGOT16_LO_DS;
5bd4f169 1049 break;
411e1bfb 1050 case BFD_RELOC_PPC_TLS: r = R_PPC64_TLS;
5bd4f169 1051 break;
727fc41e
AM
1052 case BFD_RELOC_PPC_TLSGD: r = R_PPC64_TLSGD;
1053 break;
1054 case BFD_RELOC_PPC_TLSLD: r = R_PPC64_TLSLD;
1055 break;
411e1bfb 1056 case BFD_RELOC_PPC_DTPMOD: r = R_PPC64_DTPMOD64;
5bd4f169 1057 break;
411e1bfb 1058 case BFD_RELOC_PPC_TPREL16: r = R_PPC64_TPREL16;
5bd4f169 1059 break;
411e1bfb 1060 case BFD_RELOC_PPC_TPREL16_LO: r = R_PPC64_TPREL16_LO;
5bd4f169 1061 break;
411e1bfb 1062 case BFD_RELOC_PPC_TPREL16_HI: r = R_PPC64_TPREL16_HI;
5bd4f169 1063 break;
f9c6b907
AM
1064 case BFD_RELOC_PPC64_TPREL16_HIGH: r = R_PPC64_TPREL16_HIGH;
1065 break;
411e1bfb 1066 case BFD_RELOC_PPC_TPREL16_HA: r = R_PPC64_TPREL16_HA;
5bd4f169 1067 break;
f9c6b907
AM
1068 case BFD_RELOC_PPC64_TPREL16_HIGHA: r = R_PPC64_TPREL16_HIGHA;
1069 break;
411e1bfb 1070 case BFD_RELOC_PPC_TPREL: r = R_PPC64_TPREL64;
5bd4f169 1071 break;
411e1bfb
AM
1072 case BFD_RELOC_PPC_DTPREL16: r = R_PPC64_DTPREL16;
1073 break;
1074 case BFD_RELOC_PPC_DTPREL16_LO: r = R_PPC64_DTPREL16_LO;
1075 break;
1076 case BFD_RELOC_PPC_DTPREL16_HI: r = R_PPC64_DTPREL16_HI;
1077 break;
f9c6b907
AM
1078 case BFD_RELOC_PPC64_DTPREL16_HIGH: r = R_PPC64_DTPREL16_HIGH;
1079 break;
411e1bfb
AM
1080 case BFD_RELOC_PPC_DTPREL16_HA: r = R_PPC64_DTPREL16_HA;
1081 break;
f9c6b907
AM
1082 case BFD_RELOC_PPC64_DTPREL16_HIGHA: r = R_PPC64_DTPREL16_HIGHA;
1083 break;
411e1bfb
AM
1084 case BFD_RELOC_PPC_DTPREL: r = R_PPC64_DTPREL64;
1085 break;
1086 case BFD_RELOC_PPC_GOT_TLSGD16: r = R_PPC64_GOT_TLSGD16;
1087 break;
1088 case BFD_RELOC_PPC_GOT_TLSGD16_LO: r = R_PPC64_GOT_TLSGD16_LO;
1089 break;
1090 case BFD_RELOC_PPC_GOT_TLSGD16_HI: r = R_PPC64_GOT_TLSGD16_HI;
1091 break;
1092 case BFD_RELOC_PPC_GOT_TLSGD16_HA: r = R_PPC64_GOT_TLSGD16_HA;
1093 break;
1094 case BFD_RELOC_PPC_GOT_TLSLD16: r = R_PPC64_GOT_TLSLD16;
1095 break;
1096 case BFD_RELOC_PPC_GOT_TLSLD16_LO: r = R_PPC64_GOT_TLSLD16_LO;
1097 break;
1098 case BFD_RELOC_PPC_GOT_TLSLD16_HI: r = R_PPC64_GOT_TLSLD16_HI;
1099 break;
1100 case BFD_RELOC_PPC_GOT_TLSLD16_HA: r = R_PPC64_GOT_TLSLD16_HA;
1101 break;
1102 case BFD_RELOC_PPC_GOT_TPREL16: r = R_PPC64_GOT_TPREL16_DS;
1103 break;
1104 case BFD_RELOC_PPC_GOT_TPREL16_LO: r = R_PPC64_GOT_TPREL16_LO_DS;
1105 break;
1106 case BFD_RELOC_PPC_GOT_TPREL16_HI: r = R_PPC64_GOT_TPREL16_HI;
1107 break;
1108 case BFD_RELOC_PPC_GOT_TPREL16_HA: r = R_PPC64_GOT_TPREL16_HA;
1109 break;
1110 case BFD_RELOC_PPC_GOT_DTPREL16: r = R_PPC64_GOT_DTPREL16_DS;
1111 break;
1112 case BFD_RELOC_PPC_GOT_DTPREL16_LO: r = R_PPC64_GOT_DTPREL16_LO_DS;
1113 break;
1114 case BFD_RELOC_PPC_GOT_DTPREL16_HI: r = R_PPC64_GOT_DTPREL16_HI;
1115 break;
1116 case BFD_RELOC_PPC_GOT_DTPREL16_HA: r = R_PPC64_GOT_DTPREL16_HA;
1117 break;
1118 case BFD_RELOC_PPC64_TPREL16_DS: r = R_PPC64_TPREL16_DS;
1119 break;
1120 case BFD_RELOC_PPC64_TPREL16_LO_DS: r = R_PPC64_TPREL16_LO_DS;
1121 break;
1122 case BFD_RELOC_PPC64_TPREL16_HIGHER: r = R_PPC64_TPREL16_HIGHER;
1123 break;
1124 case BFD_RELOC_PPC64_TPREL16_HIGHERA: r = R_PPC64_TPREL16_HIGHERA;
1125 break;
1126 case BFD_RELOC_PPC64_TPREL16_HIGHEST: r = R_PPC64_TPREL16_HIGHEST;
1127 break;
1128 case BFD_RELOC_PPC64_TPREL16_HIGHESTA: r = R_PPC64_TPREL16_HIGHESTA;
1129 break;
1130 case BFD_RELOC_PPC64_DTPREL16_DS: r = R_PPC64_DTPREL16_DS;
1131 break;
1132 case BFD_RELOC_PPC64_DTPREL16_LO_DS: r = R_PPC64_DTPREL16_LO_DS;
1133 break;
1134 case BFD_RELOC_PPC64_DTPREL16_HIGHER: r = R_PPC64_DTPREL16_HIGHER;
1135 break;
1136 case BFD_RELOC_PPC64_DTPREL16_HIGHERA: r = R_PPC64_DTPREL16_HIGHERA;
1137 break;
1138 case BFD_RELOC_PPC64_DTPREL16_HIGHEST: r = R_PPC64_DTPREL16_HIGHEST;
1139 break;
1140 case BFD_RELOC_PPC64_DTPREL16_HIGHESTA: r = R_PPC64_DTPREL16_HIGHESTA;
1141 break;
25f23106
AM
1142 case BFD_RELOC_16_PCREL: r = R_PPC64_REL16;
1143 break;
1144 case BFD_RELOC_LO16_PCREL: r = R_PPC64_REL16_LO;
1145 break;
1146 case BFD_RELOC_HI16_PCREL: r = R_PPC64_REL16_HI;
1147 break;
1148 case BFD_RELOC_HI16_S_PCREL: r = R_PPC64_REL16_HA;
1149 break;
4a969973
AM
1150 case BFD_RELOC_PPC64_REL16_HIGH: r = R_PPC64_REL16_HIGH;
1151 break;
1152 case BFD_RELOC_PPC64_REL16_HIGHA: r = R_PPC64_REL16_HIGHA;
1153 break;
1154 case BFD_RELOC_PPC64_REL16_HIGHER: r = R_PPC64_REL16_HIGHER;
1155 break;
1156 case BFD_RELOC_PPC64_REL16_HIGHERA: r = R_PPC64_REL16_HIGHERA;
1157 break;
1158 case BFD_RELOC_PPC64_REL16_HIGHEST: r = R_PPC64_REL16_HIGHEST;
1159 break;
1160 case BFD_RELOC_PPC64_REL16_HIGHESTA: r = R_PPC64_REL16_HIGHESTA;
1161 break;
7ba71655
AM
1162 case BFD_RELOC_PPC_16DX_HA: r = R_PPC64_16DX_HA;
1163 break;
a680de9a
PB
1164 case BFD_RELOC_PPC_REL16DX_HA: r = R_PPC64_REL16DX_HA;
1165 break;
006589cf
AM
1166 case BFD_RELOC_PPC64_ENTRY: r = R_PPC64_ENTRY;
1167 break;
45965137
AM
1168 case BFD_RELOC_PPC64_ADDR64_LOCAL: r = R_PPC64_ADDR64_LOCAL;
1169 break;
411e1bfb
AM
1170 case BFD_RELOC_VTABLE_INHERIT: r = R_PPC64_GNU_VTINHERIT;
1171 break;
1172 case BFD_RELOC_VTABLE_ENTRY: r = R_PPC64_GNU_VTENTRY;
5bd4f169
AM
1173 break;
1174 }
1175
4ce794b7 1176 return ppc64_elf_howto_table[r];
5bd4f169
AM
1177};
1178
157090f7
AM
1179static reloc_howto_type *
1180ppc64_elf_reloc_name_lookup (bfd *abfd ATTRIBUTE_UNUSED,
1181 const char *r_name)
1182{
1183 unsigned int i;
1184
a4b6fadd 1185 for (i = 0; i < ARRAY_SIZE (ppc64_elf_howto_raw); i++)
157090f7
AM
1186 if (ppc64_elf_howto_raw[i].name != NULL
1187 && strcasecmp (ppc64_elf_howto_raw[i].name, r_name) == 0)
1188 return &ppc64_elf_howto_raw[i];
1189
1190 return NULL;
1191}
1192
5bd4f169
AM
1193/* Set the howto pointer for a PowerPC ELF reloc. */
1194
f3185997 1195static bfd_boolean
4aef7643 1196ppc64_elf_info_to_howto (bfd *abfd, arelent *cache_ptr,
4ce794b7 1197 Elf_Internal_Rela *dst)
5bd4f169 1198{
65f38f15
AM
1199 unsigned int type;
1200
ef60b7ff 1201 /* Initialize howto table if needed. */
5bd4f169 1202 if (!ppc64_elf_howto_table[R_PPC64_ADDR32])
5bd4f169
AM
1203 ppc_howto_init ();
1204
65f38f15 1205 type = ELF64_R_TYPE (dst->r_info);
a4b6fadd 1206 if (type >= ARRAY_SIZE (ppc64_elf_howto_table))
d0fb9a8d 1207 {
695344c0 1208 /* xgettext:c-format */
0aa13fee 1209 _bfd_error_handler (_("%pB: unsupported relocation type %#x"),
cf97bcb0 1210 abfd, type);
f3185997
NC
1211 bfd_set_error (bfd_error_bad_value);
1212 return FALSE;
d0fb9a8d 1213 }
65f38f15 1214 cache_ptr->howto = ppc64_elf_howto_table[type];
f3185997
NC
1215 if (cache_ptr->howto == NULL || cache_ptr->howto->name == NULL)
1216 {
1217 /* xgettext:c-format */
1218 _bfd_error_handler (_("%pB: unsupported relocation type %#x"),
1219 abfd, type);
1220 bfd_set_error (bfd_error_bad_value);
1221 return FALSE;
1222 }
2cdcc330 1223
f3185997 1224 return TRUE;
5bd4f169
AM
1225}
1226
04c9666a 1227/* Handle the R_PPC64_ADDR16_HA and similar relocs. */
5bd4f169
AM
1228
1229static bfd_reloc_status_type
4ce794b7
AM
1230ppc64_elf_ha_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
1231 void *data, asection *input_section,
1232 bfd *output_bfd, char **error_message)
5bd4f169 1233{
a680de9a
PB
1234 enum elf_ppc64_reloc_type r_type;
1235 long insn;
1236 bfd_size_type octets;
3de43e7b 1237 bfd_vma value;
a680de9a 1238
805fc799
AM
1239 /* If this is a relocatable link (output_bfd test tells us), just
1240 call the generic function. Any adjustment will be done at final
1241 link time. */
1242 if (output_bfd != NULL)
cedb70c5 1243 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
805fc799
AM
1244 input_section, output_bfd, error_message);
1245
1246 /* Adjust the addend for sign extension of the low 16 bits.
1247 We won't actually be using the low 16 bits, so trashing them
1248 doesn't matter. */
1249 reloc_entry->addend += 0x8000;
a680de9a
PB
1250 r_type = reloc_entry->howto->type;
1251 if (r_type != R_PPC64_REL16DX_HA)
1252 return bfd_reloc_continue;
1253
1254 value = 0;
1255 if (!bfd_is_com_section (symbol->section))
1256 value = symbol->value;
1257 value += (reloc_entry->addend
1258 + symbol->section->output_offset
1259 + symbol->section->output_section->vma);
1260 value -= (reloc_entry->address
1261 + input_section->output_offset
1262 + input_section->output_section->vma);
3de43e7b 1263 value = (bfd_signed_vma) value >> 16;
a680de9a
PB
1264
1265 octets = reloc_entry->address * bfd_octets_per_byte (abfd);
1266 insn = bfd_get_32 (abfd, (bfd_byte *) data + octets);
1267 insn &= ~0x1fffc1;
3de43e7b 1268 insn |= (value & 0xffc1) | ((value & 0x3e) << 15);
a680de9a 1269 bfd_put_32 (abfd, insn, (bfd_byte *) data + octets);
3de43e7b 1270 if (value + 0x8000 > 0xffff)
a680de9a
PB
1271 return bfd_reloc_overflow;
1272 return bfd_reloc_ok;
805fc799 1273}
5bd4f169 1274
2441e016
AM
1275static bfd_reloc_status_type
1276ppc64_elf_branch_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
1277 void *data, asection *input_section,
1278 bfd *output_bfd, char **error_message)
1279{
1280 if (output_bfd != NULL)
1281 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
1282 input_section, output_bfd, error_message);
1283
699733f6
AM
1284 if (strcmp (symbol->section->name, ".opd") == 0
1285 && (symbol->section->owner->flags & DYNAMIC) == 0)
2441e016
AM
1286 {
1287 bfd_vma dest = opd_entry_value (symbol->section,
1288 symbol->value + reloc_entry->addend,
aef36ac1 1289 NULL, NULL, FALSE);
2441e016
AM
1290 if (dest != (bfd_vma) -1)
1291 reloc_entry->addend = dest - (symbol->value
1292 + symbol->section->output_section->vma
1293 + symbol->section->output_offset);
1294 }
810d4e75
AM
1295 else
1296 {
1297 elf_symbol_type *elfsym = (elf_symbol_type *) symbol;
1298
1299 if (symbol->section->owner != abfd
9f284bf9 1300 && symbol->section->owner != NULL
810d4e75
AM
1301 && abiversion (symbol->section->owner) >= 2)
1302 {
1303 unsigned int i;
1304
1305 for (i = 0; i < symbol->section->owner->symcount; ++i)
1306 {
1307 asymbol *symdef = symbol->section->owner->outsymbols[i];
1308
1309 if (strcmp (symdef->name, symbol->name) == 0)
1310 {
1311 elfsym = (elf_symbol_type *) symdef;
1312 break;
1313 }
1314 }
1315 }
1316 reloc_entry->addend
1317 += PPC64_LOCAL_ENTRY_OFFSET (elfsym->internal_elf_sym.st_other);
1318 }
2441e016
AM
1319 return bfd_reloc_continue;
1320}
1321
805fc799 1322static bfd_reloc_status_type
4ce794b7
AM
1323ppc64_elf_brtaken_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
1324 void *data, asection *input_section,
1325 bfd *output_bfd, char **error_message)
805fc799
AM
1326{
1327 long insn;
04c9666a 1328 enum elf_ppc64_reloc_type r_type;
805fc799 1329 bfd_size_type octets;
794e51c0
AM
1330 /* Assume 'at' branch hints. */
1331 bfd_boolean is_isa_v2 = TRUE;
805fc799
AM
1332
1333 /* If this is a relocatable link (output_bfd test tells us), just
1334 call the generic function. Any adjustment will be done at final
1335 link time. */
5bd4f169 1336 if (output_bfd != NULL)
cedb70c5 1337 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
805fc799
AM
1338 input_section, output_bfd, error_message);
1339
1340 octets = reloc_entry->address * bfd_octets_per_byte (abfd);
1341 insn = bfd_get_32 (abfd, (bfd_byte *) data + octets);
1342 insn &= ~(0x01 << 21);
4ce794b7 1343 r_type = reloc_entry->howto->type;
805fc799
AM
1344 if (r_type == R_PPC64_ADDR14_BRTAKEN
1345 || r_type == R_PPC64_REL14_BRTAKEN)
cedb70c5 1346 insn |= 0x01 << 21; /* 'y' or 't' bit, lowest bit of BO field. */
805fc799 1347
794e51c0 1348 if (is_isa_v2)
5bd4f169 1349 {
805fc799
AM
1350 /* Set 'a' bit. This is 0b00010 in BO field for branch
1351 on CR(BI) insns (BO == 001at or 011at), and 0b01000
1352 for branch on CTR insns (BO == 1a00t or 1a01t). */
1353 if ((insn & (0x14 << 21)) == (0x04 << 21))
1354 insn |= 0x02 << 21;
1355 else if ((insn & (0x14 << 21)) == (0x10 << 21))
1356 insn |= 0x08 << 21;
1357 else
2441e016 1358 goto out;
5bd4f169 1359 }
805fc799
AM
1360 else
1361 {
1362 bfd_vma target = 0;
1363 bfd_vma from;
5bd4f169 1364
805fc799
AM
1365 if (!bfd_is_com_section (symbol->section))
1366 target = symbol->value;
1367 target += symbol->section->output_section->vma;
1368 target += symbol->section->output_offset;
1369 target += reloc_entry->addend;
5bd4f169 1370
805fc799
AM
1371 from = (reloc_entry->address
1372 + input_section->output_offset
1373 + input_section->output_section->vma);
5bd4f169 1374
805fc799
AM
1375 /* Invert 'y' bit if not the default. */
1376 if ((bfd_signed_vma) (target - from) < 0)
1377 insn ^= 0x01 << 21;
1378 }
4ce794b7 1379 bfd_put_32 (abfd, insn, (bfd_byte *) data + octets);
2441e016
AM
1380 out:
1381 return ppc64_elf_branch_reloc (abfd, reloc_entry, symbol, data,
1382 input_section, output_bfd, error_message);
805fc799 1383}
5bd4f169 1384
805fc799 1385static bfd_reloc_status_type
4ce794b7
AM
1386ppc64_elf_sectoff_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
1387 void *data, asection *input_section,
1388 bfd *output_bfd, char **error_message)
805fc799
AM
1389{
1390 /* If this is a relocatable link (output_bfd test tells us), just
1391 call the generic function. Any adjustment will be done at final
1392 link time. */
1393 if (output_bfd != NULL)
cedb70c5 1394 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
805fc799 1395 input_section, output_bfd, error_message);
5bd4f169 1396
805fc799
AM
1397 /* Subtract the symbol section base address. */
1398 reloc_entry->addend -= symbol->section->output_section->vma;
5bd4f169
AM
1399 return bfd_reloc_continue;
1400}
1401
805fc799 1402static bfd_reloc_status_type
4ce794b7
AM
1403ppc64_elf_sectoff_ha_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
1404 void *data, asection *input_section,
1405 bfd *output_bfd, char **error_message)
805fc799
AM
1406{
1407 /* If this is a relocatable link (output_bfd test tells us), just
1408 call the generic function. Any adjustment will be done at final
1409 link time. */
1410 if (output_bfd != NULL)
cedb70c5 1411 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
805fc799
AM
1412 input_section, output_bfd, error_message);
1413
1414 /* Subtract the symbol section base address. */
1415 reloc_entry->addend -= symbol->section->output_section->vma;
1416
1417 /* Adjust the addend for sign extension of the low 16 bits. */
1418 reloc_entry->addend += 0x8000;
1419 return bfd_reloc_continue;
1420}
1421
1422static bfd_reloc_status_type
4ce794b7
AM
1423ppc64_elf_toc_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
1424 void *data, asection *input_section,
1425 bfd *output_bfd, char **error_message)
805fc799
AM
1426{
1427 bfd_vma TOCstart;
1428
1429 /* If this is a relocatable link (output_bfd test tells us), just
1430 call the generic function. Any adjustment will be done at final
1431 link time. */
1432 if (output_bfd != NULL)
cedb70c5 1433 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
805fc799
AM
1434 input_section, output_bfd, error_message);
1435
1436 TOCstart = _bfd_get_gp_value (input_section->output_section->owner);
1437 if (TOCstart == 0)
1c865ab2 1438 TOCstart = ppc64_elf_set_toc (NULL, input_section->output_section->owner);
805fc799
AM
1439
1440 /* Subtract the TOC base address. */
1441 reloc_entry->addend -= TOCstart + TOC_BASE_OFF;
1442 return bfd_reloc_continue;
1443}
1444
1445static bfd_reloc_status_type
4ce794b7
AM
1446ppc64_elf_toc_ha_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
1447 void *data, asection *input_section,
1448 bfd *output_bfd, char **error_message)
805fc799
AM
1449{
1450 bfd_vma TOCstart;
1451
1452 /* If this is a relocatable link (output_bfd test tells us), just
1453 call the generic function. Any adjustment will be done at final
1454 link time. */
1455 if (output_bfd != NULL)
cedb70c5 1456 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
805fc799
AM
1457 input_section, output_bfd, error_message);
1458
1459 TOCstart = _bfd_get_gp_value (input_section->output_section->owner);
1460 if (TOCstart == 0)
1c865ab2 1461 TOCstart = ppc64_elf_set_toc (NULL, input_section->output_section->owner);
805fc799
AM
1462
1463 /* Subtract the TOC base address. */
1464 reloc_entry->addend -= TOCstart + TOC_BASE_OFF;
1465
1466 /* Adjust the addend for sign extension of the low 16 bits. */
1467 reloc_entry->addend += 0x8000;
1468 return bfd_reloc_continue;
1469}
1470
1471static bfd_reloc_status_type
4ce794b7
AM
1472ppc64_elf_toc64_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
1473 void *data, asection *input_section,
1474 bfd *output_bfd, char **error_message)
805fc799
AM
1475{
1476 bfd_vma TOCstart;
1477 bfd_size_type octets;
1478
1479 /* If this is a relocatable link (output_bfd test tells us), just
1480 call the generic function. Any adjustment will be done at final
1481 link time. */
1482 if (output_bfd != NULL)
cedb70c5 1483 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
805fc799
AM
1484 input_section, output_bfd, error_message);
1485
1486 TOCstart = _bfd_get_gp_value (input_section->output_section->owner);
1487 if (TOCstart == 0)
1c865ab2 1488 TOCstart = ppc64_elf_set_toc (NULL, input_section->output_section->owner);
805fc799
AM
1489
1490 octets = reloc_entry->address * bfd_octets_per_byte (abfd);
1491 bfd_put_64 (abfd, TOCstart + TOC_BASE_OFF, (bfd_byte *) data + octets);
1492 return bfd_reloc_ok;
1493}
1494
1495static bfd_reloc_status_type
4ce794b7
AM
1496ppc64_elf_unhandled_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
1497 void *data, asection *input_section,
1498 bfd *output_bfd, char **error_message)
805fc799
AM
1499{
1500 /* If this is a relocatable link (output_bfd test tells us), just
1501 call the generic function. Any adjustment will be done at final
1502 link time. */
1503 if (output_bfd != NULL)
cedb70c5 1504 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
805fc799
AM
1505 input_section, output_bfd, error_message);
1506
1507 if (error_message != NULL)
1508 {
1509 static char buf[60];
1510 sprintf (buf, "generic linker can't handle %s",
1511 reloc_entry->howto->name);
1512 *error_message = buf;
1513 }
1514 return bfd_reloc_dangerous;
1515}
1516
927be08e
AM
1517/* Track GOT entries needed for a given symbol. We might need more
1518 than one got entry per symbol. */
1519struct got_entry
1520{
1521 struct got_entry *next;
1522
1523 /* The symbol addend that we'll be placing in the GOT. */
1524 bfd_vma addend;
1525
1526 /* Unlike other ELF targets, we use separate GOT entries for the same
1527 symbol referenced from different input files. This is to support
1528 automatic multiple TOC/GOT sections, where the TOC base can vary
1529 from one input file to another. After partitioning into TOC groups
1530 we merge entries within the group.
1531
1532 Point to the BFD owning this GOT entry. */
1533 bfd *owner;
1534
1535 /* Zero for non-tls entries, or TLS_TLS and one of TLS_GD, TLS_LD,
1536 TLS_TPREL or TLS_DTPREL for tls entries. */
f961d9dd 1537 unsigned char tls_type;
927be08e
AM
1538
1539 /* Non-zero if got.ent points to real entry. */
f961d9dd 1540 unsigned char is_indirect;
927be08e
AM
1541
1542 /* Reference count until size_dynamic_sections, GOT offset thereafter. */
1543 union
2cdcc330
AM
1544 {
1545 bfd_signed_vma refcount;
1546 bfd_vma offset;
1547 struct got_entry *ent;
1548 } got;
927be08e
AM
1549};
1550
1551/* The same for PLT. */
1552struct plt_entry
1553{
1554 struct plt_entry *next;
1555
1556 bfd_vma addend;
1557
1558 union
2cdcc330
AM
1559 {
1560 bfd_signed_vma refcount;
1561 bfd_vma offset;
1562 } plt;
927be08e
AM
1563};
1564
e717da7e
AM
1565struct ppc64_elf_obj_tdata
1566{
1567 struct elf_obj_tdata elf;
1568
1569 /* Shortcuts to dynamic linker sections. */
1570 asection *got;
1571 asection *relgot;
1572
b3fac117
AM
1573 /* Used during garbage collection. We attach global symbols defined
1574 on removed .opd entries to this section so that the sym is removed. */
1575 asection *deleted_section;
81688140 1576
927be08e 1577 /* TLS local dynamic got entry handling. Support for multiple GOT
e717da7e 1578 sections means we potentially need one of these for each input bfd. */
927be08e 1579 struct got_entry tlsld_got;
8860955f 1580
2cdcc330
AM
1581 union
1582 {
729eabd5
AM
1583 /* A copy of relocs before they are modified for --emit-relocs. */
1584 Elf_Internal_Rela *relocs;
1585
1586 /* Section contents. */
1587 bfd_byte *contents;
1588 } opd;
d77c8a4b
AM
1589
1590 /* Nonzero if this bfd has small toc/got relocs, ie. that expect
1591 the reloc to be in the range -32768 to 32767. */
98528052
AM
1592 unsigned int has_small_toc_reloc : 1;
1593
560c8763
AM
1594 /* Set if toc/got ha relocs detected not using r2, or lo reloc
1595 instruction not one we handle. */
1596 unsigned int unexpected_toc_insn : 1;
e717da7e
AM
1597};
1598
1599#define ppc64_elf_tdata(bfd) \
1600 ((struct ppc64_elf_obj_tdata *) (bfd)->tdata.any)
1601
1602#define ppc64_tlsld_got(bfd) \
1603 (&ppc64_elf_tdata (bfd)->tlsld_got)
1604
0c8d6e5c
AM
1605#define is_ppc64_elf(bfd) \
1606 (bfd_get_flavour (bfd) == bfd_target_elf_flavour \
4dfe6ac6 1607 && elf_object_id (bfd) == PPC64_ELF_DATA)
0c8d6e5c 1608
e717da7e
AM
1609/* Override the generic function because we store some extras. */
1610
1611static bfd_boolean
1612ppc64_elf_mkobject (bfd *abfd)
1613{
0ffa91dd 1614 return bfd_elf_allocate_object (abfd, sizeof (struct ppc64_elf_obj_tdata),
4dfe6ac6 1615 PPC64_ELF_DATA);
e717da7e
AM
1616}
1617
feee612b 1618/* Fix bad default arch selected for a 64 bit input bfd when the
14b57c7c 1619 default is 32 bit. Also select arch based on apuinfo. */
feee612b 1620
b34976b6 1621static bfd_boolean
4ce794b7 1622ppc64_elf_object_p (bfd *abfd)
feee612b 1623{
14b57c7c
AM
1624 if (!abfd->arch_info->the_default)
1625 return TRUE;
1626
1627 if (abfd->arch_info->bits_per_word == 32)
feee612b
AM
1628 {
1629 Elf_Internal_Ehdr *i_ehdr = elf_elfheader (abfd);
1630
1631 if (i_ehdr->e_ident[EI_CLASS] == ELFCLASS64)
1632 {
1633 /* Relies on arch after 32 bit default being 64 bit default. */
1634 abfd->arch_info = abfd->arch_info->next;
1635 BFD_ASSERT (abfd->arch_info->bits_per_word == 64);
1636 }
1637 }
14b57c7c 1638 return _bfd_elf_ppc_set_arch (abfd);
feee612b
AM
1639}
1640
d37c89e5
AM
1641/* Support for core dump NOTE sections. */
1642
1643static bfd_boolean
1644ppc64_elf_grok_prstatus (bfd *abfd, Elf_Internal_Note *note)
1645{
eea6121a 1646 size_t offset, size;
d37c89e5
AM
1647
1648 if (note->descsz != 504)
1649 return FALSE;
1650
1651 /* pr_cursig */
228e534f 1652 elf_tdata (abfd)->core->signal = bfd_get_16 (abfd, note->descdata + 12);
d37c89e5
AM
1653
1654 /* pr_pid */
228e534f 1655 elf_tdata (abfd)->core->lwpid = bfd_get_32 (abfd, note->descdata + 32);
d37c89e5
AM
1656
1657 /* pr_reg */
1658 offset = 112;
eea6121a 1659 size = 384;
d37c89e5
AM
1660
1661 /* Make a ".reg/999" section. */
1662 return _bfd_elfcore_make_pseudosection (abfd, ".reg",
eea6121a 1663 size, note->descpos + offset);
d37c89e5
AM
1664}
1665
1666static bfd_boolean
1667ppc64_elf_grok_psinfo (bfd *abfd, Elf_Internal_Note *note)
1668{
1669 if (note->descsz != 136)
1670 return FALSE;
1671
228e534f 1672 elf_tdata (abfd)->core->pid
bc989cdc 1673 = bfd_get_32 (abfd, note->descdata + 24);
228e534f 1674 elf_tdata (abfd)->core->program
d37c89e5 1675 = _bfd_elfcore_strndup (abfd, note->descdata + 40, 16);
228e534f 1676 elf_tdata (abfd)->core->command
d37c89e5
AM
1677 = _bfd_elfcore_strndup (abfd, note->descdata + 56, 80);
1678
1679 return TRUE;
1680}
1681
183e98be
AM
1682static char *
1683ppc64_elf_write_core_note (bfd *abfd, char *buf, int *bufsiz, int note_type,
1684 ...)
1685{
1686 switch (note_type)
1687 {
1688 default:
1689 return NULL;
1690
1691 case NT_PRPSINFO:
1692 {
9ef6d1e3 1693 char data[136] ATTRIBUTE_NONSTRING;
183e98be
AM
1694 va_list ap;
1695
1696 va_start (ap, note_type);
75cd47ed 1697 memset (data, 0, sizeof (data));
183e98be 1698 strncpy (data + 40, va_arg (ap, const char *), 16);
be3e27bb 1699#if GCC_VERSION == 8000 || GCC_VERSION == 8001
95da9854 1700 DIAGNOSTIC_PUSH;
be3e27bb 1701 /* GCC 8.0 and 8.1 warn about 80 equals destination size with
95da9854
L
1702 -Wstringop-truncation:
1703 https://gcc.gnu.org/bugzilla/show_bug.cgi?id=85643
1704 */
95da9854
L
1705 DIAGNOSTIC_IGNORE_STRINGOP_TRUNCATION;
1706#endif
183e98be 1707 strncpy (data + 56, va_arg (ap, const char *), 80);
be3e27bb 1708#if GCC_VERSION == 8000 || GCC_VERSION == 8001
95da9854 1709 DIAGNOSTIC_POP;
fe75810f 1710#endif
183e98be
AM
1711 va_end (ap);
1712 return elfcore_write_note (abfd, buf, bufsiz,
1713 "CORE", note_type, data, sizeof (data));
1714 }
1715
1716 case NT_PRSTATUS:
1717 {
1718 char data[504];
1719 va_list ap;
1720 long pid;
1721 int cursig;
1722 const void *greg;
1723
1724 va_start (ap, note_type);
1725 memset (data, 0, 112);
1726 pid = va_arg (ap, long);
1727 bfd_put_32 (abfd, pid, data + 32);
1728 cursig = va_arg (ap, int);
1729 bfd_put_16 (abfd, cursig, data + 12);
1730 greg = va_arg (ap, const void *);
1731 memcpy (data + 112, greg, 384);
1732 memset (data + 496, 0, 8);
1733 va_end (ap);
1734 return elfcore_write_note (abfd, buf, bufsiz,
1735 "CORE", note_type, data, sizeof (data));
1736 }
1737 }
1738}
1739
5d35169e
AM
1740/* Add extra PPC sections. */
1741
2cdcc330 1742static const struct bfd_elf_special_section ppc64_elf_special_sections[] =
7f4d3958 1743{
07d6d2b8
AM
1744 { STRING_COMMA_LEN (".plt"), 0, SHT_NOBITS, 0 },
1745 { STRING_COMMA_LEN (".sbss"), -2, SHT_NOBITS, SHF_ALLOC + SHF_WRITE },
0112cd26 1746 { STRING_COMMA_LEN (".sdata"), -2, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE },
07d6d2b8
AM
1747 { STRING_COMMA_LEN (".toc"), 0, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE },
1748 { STRING_COMMA_LEN (".toc1"), 0, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE },
0112cd26 1749 { STRING_COMMA_LEN (".tocbss"), 0, SHT_NOBITS, SHF_ALLOC + SHF_WRITE },
07d6d2b8 1750 { NULL, 0, 0, 0, 0 }
5d35169e
AM
1751};
1752
7c8fe5c4
AM
1753enum _ppc64_sec_type {
1754 sec_normal = 0,
1755 sec_opd = 1,
1756 sec_toc = 2
1757};
1758
f0abc2a1
AM
1759struct _ppc64_elf_section_data
1760{
1761 struct bfd_elf_section_data elf;
411e1bfb 1762
f0abc2a1
AM
1763 union
1764 {
51aecdc5
AM
1765 /* An array with one entry for each opd function descriptor,
1766 and some spares since opd entries may be either 16 or 24 bytes. */
1767#define OPD_NDX(OFF) ((OFF) >> 4)
74f0fb50
AM
1768 struct _opd_sec_data
1769 {
1770 /* Points to the function code section for local opd entries. */
1771 asection **func_sec;
1772
1773 /* After editing .opd, adjust references to opd local syms. */
1774 long *adjust;
1775 } opd;
7c8fe5c4 1776
3a71aa26
AM
1777 /* An array for toc sections, indexed by offset/8. */
1778 struct _toc_sec_data
1779 {
1780 /* Specifies the relocation symbol index used at a given toc offset. */
1781 unsigned *symndx;
1782
1783 /* And the relocation addend. */
1784 bfd_vma *add;
1785 } toc;
7c8fe5c4
AM
1786 } u;
1787
1788 enum _ppc64_sec_type sec_type:2;
411e1bfb 1789
7c8fe5c4
AM
1790 /* Flag set when small branches are detected. Used to
1791 select suitable defaults for the stub group size. */
1792 unsigned int has_14bit_branch:1;
3e04d765
AM
1793
1794 /* Flag set when PLTCALL relocs are detected. */
1795 unsigned int has_pltcall:1;
f0abc2a1
AM
1796};
1797
1798#define ppc64_elf_section_data(sec) \
411e1bfb 1799 ((struct _ppc64_elf_section_data *) elf_section_data (sec))
f0abc2a1
AM
1800
1801static bfd_boolean
4ce794b7 1802ppc64_elf_new_section_hook (bfd *abfd, asection *sec)
f0abc2a1 1803{
f592407e
AM
1804 if (!sec->used_by_bfd)
1805 {
1806 struct _ppc64_elf_section_data *sdata;
1807 bfd_size_type amt = sizeof (*sdata);
f0abc2a1 1808
f592407e
AM
1809 sdata = bfd_zalloc (abfd, amt);
1810 if (sdata == NULL)
1811 return FALSE;
1812 sec->used_by_bfd = sdata;
1813 }
f0abc2a1
AM
1814
1815 return _bfd_elf_new_section_hook (abfd, sec);
1816}
4025353c 1817
74f0fb50 1818static struct _opd_sec_data *
4025353c
AM
1819get_opd_info (asection * sec)
1820{
1821 if (sec != NULL
1822 && ppc64_elf_section_data (sec) != NULL
7c8fe5c4 1823 && ppc64_elf_section_data (sec)->sec_type == sec_opd)
74f0fb50 1824 return &ppc64_elf_section_data (sec)->u.opd;
4025353c
AM
1825 return NULL;
1826}
90e3cdf2
JJ
1827\f
1828/* Parameters for the qsort hook. */
90e3cdf2 1829static bfd_boolean synthetic_relocatable;
cd285db5 1830static asection *synthetic_opd;
90e3cdf2 1831
699733f6 1832/* qsort comparison function for ppc64_elf_get_synthetic_symtab. */
90e3cdf2
JJ
1833
1834static int
1835compare_symbols (const void *ap, const void *bp)
1836{
2cdcc330
AM
1837 const asymbol *a = *(const asymbol **) ap;
1838 const asymbol *b = *(const asymbol **) bp;
90e3cdf2 1839
699733f6
AM
1840 /* Section symbols first. */
1841 if ((a->flags & BSF_SECTION_SYM) && !(b->flags & BSF_SECTION_SYM))
90e3cdf2 1842 return -1;
699733f6 1843 if (!(a->flags & BSF_SECTION_SYM) && (b->flags & BSF_SECTION_SYM))
90e3cdf2
JJ
1844 return 1;
1845
699733f6 1846 /* then .opd symbols. */
cd285db5
AM
1847 if (synthetic_opd != NULL)
1848 {
1849 if (strcmp (a->section->name, ".opd") == 0
1850 && strcmp (b->section->name, ".opd") != 0)
1851 return -1;
1852 if (strcmp (a->section->name, ".opd") != 0
1853 && strcmp (b->section->name, ".opd") == 0)
1854 return 1;
1855 }
90e3cdf2 1856
699733f6 1857 /* then other code symbols. */
2cdcc330
AM
1858 if (((a->section->flags & (SEC_CODE | SEC_ALLOC | SEC_THREAD_LOCAL))
1859 == (SEC_CODE | SEC_ALLOC))
1860 && ((b->section->flags & (SEC_CODE | SEC_ALLOC | SEC_THREAD_LOCAL))
1861 != (SEC_CODE | SEC_ALLOC)))
90e3cdf2
JJ
1862 return -1;
1863
2cdcc330
AM
1864 if (((a->section->flags & (SEC_CODE | SEC_ALLOC | SEC_THREAD_LOCAL))
1865 != (SEC_CODE | SEC_ALLOC))
1866 && ((b->section->flags & (SEC_CODE | SEC_ALLOC | SEC_THREAD_LOCAL))
1867 == (SEC_CODE | SEC_ALLOC)))
90e3cdf2
JJ
1868 return 1;
1869
1870 if (synthetic_relocatable)
1871 {
1872 if (a->section->id < b->section->id)
1873 return -1;
1874
1875 if (a->section->id > b->section->id)
1876 return 1;
1877 }
1878
1879 if (a->value + a->section->vma < b->value + b->section->vma)
1880 return -1;
1881
1882 if (a->value + a->section->vma > b->value + b->section->vma)
1883 return 1;
1884
4d35a0aa
AM
1885 /* For syms with the same value, prefer strong dynamic global function
1886 syms over other syms. */
1887 if ((a->flags & BSF_GLOBAL) != 0 && (b->flags & BSF_GLOBAL) == 0)
1888 return -1;
1889
1890 if ((a->flags & BSF_GLOBAL) == 0 && (b->flags & BSF_GLOBAL) != 0)
1891 return 1;
1892
1893 if ((a->flags & BSF_FUNCTION) != 0 && (b->flags & BSF_FUNCTION) == 0)
1894 return -1;
1895
1896 if ((a->flags & BSF_FUNCTION) == 0 && (b->flags & BSF_FUNCTION) != 0)
1897 return 1;
1898
1899 if ((a->flags & BSF_WEAK) == 0 && (b->flags & BSF_WEAK) != 0)
1900 return -1;
1901
1902 if ((a->flags & BSF_WEAK) != 0 && (b->flags & BSF_WEAK) == 0)
1903 return 1;
1904
1905 if ((a->flags & BSF_DYNAMIC) != 0 && (b->flags & BSF_DYNAMIC) == 0)
1906 return -1;
1907
1908 if ((a->flags & BSF_DYNAMIC) == 0 && (b->flags & BSF_DYNAMIC) != 0)
1909 return 1;
1910
aaed6f5b 1911 return a > b;
90e3cdf2
JJ
1912}
1913
699733f6 1914/* Search SYMS for a symbol of the given VALUE. */
90e3cdf2 1915
699733f6 1916static asymbol *
7292b3ac 1917sym_exists_at (asymbol **syms, long lo, long hi, unsigned int id, bfd_vma value)
90e3cdf2 1918{
699733f6 1919 long mid;
90e3cdf2 1920
7292b3ac 1921 if (id == (unsigned) -1)
699733f6
AM
1922 {
1923 while (lo < hi)
1924 {
1925 mid = (lo + hi) >> 1;
1926 if (syms[mid]->value + syms[mid]->section->vma < value)
1927 lo = mid + 1;
1928 else if (syms[mid]->value + syms[mid]->section->vma > value)
1929 hi = mid;
1930 else
1931 return syms[mid];
1932 }
1933 }
1934 else
1935 {
1936 while (lo < hi)
1937 {
1938 mid = (lo + hi) >> 1;
1939 if (syms[mid]->section->id < id)
1940 lo = mid + 1;
1941 else if (syms[mid]->section->id > id)
1942 hi = mid;
1943 else if (syms[mid]->value < value)
1944 lo = mid + 1;
1945 else if (syms[mid]->value > value)
1946 hi = mid;
1947 else
1948 return syms[mid];
1949 }
1950 }
1951 return NULL;
90e3cdf2
JJ
1952}
1953
468392fb
AM
1954static bfd_boolean
1955section_covers_vma (bfd *abfd ATTRIBUTE_UNUSED, asection *section, void *ptr)
1956{
1957 bfd_vma vma = *(bfd_vma *) ptr;
1958 return ((section->flags & SEC_ALLOC) != 0
1959 && section->vma <= vma
1960 && vma < section->vma + section->size);
1961}
1962
699733f6 1963/* Create synthetic symbols, effectively restoring "dot-symbol" function
c4b0b099
AM
1964 entry syms. Also generate @plt symbols for the glink branch table.
1965 Returns count of synthetic symbols in RET or -1 on error. */
90e3cdf2
JJ
1966
1967static long
a7535cf3
AM
1968ppc64_elf_get_synthetic_symtab (bfd *abfd,
1969 long static_count, asymbol **static_syms,
1970 long dyn_count, asymbol **dyn_syms,
c9727e01 1971 asymbol **ret)
90e3cdf2
JJ
1972{
1973 asymbol *s;
0ccf57bd 1974 size_t i, j, count;
90e3cdf2 1975 char *names;
0ccf57bd 1976 size_t symcount, codesecsym, codesecsymend, secsymend, opdsymend;
ee67d69a 1977 asection *opd = NULL;
90e3cdf2 1978 bfd_boolean relocatable = (abfd->flags & (EXEC_P | DYNAMIC)) == 0;
a7535cf3 1979 asymbol **syms;
ee67d69a 1980 int abi = abiversion (abfd);
90e3cdf2
JJ
1981
1982 *ret = NULL;
1983
ee67d69a
AM
1984 if (abi < 2)
1985 {
1986 opd = bfd_get_section_by_name (abfd, ".opd");
1987 if (opd == NULL && abi == 1)
1988 return 0;
1989 }
90e3cdf2 1990
a5259595
AM
1991 syms = NULL;
1992 codesecsym = 0;
1993 codesecsymend = 0;
1994 secsymend = 0;
1995 opdsymend = 0;
1996 symcount = 0;
1997 if (opd != NULL)
c9727e01 1998 {
a5259595
AM
1999 symcount = static_count;
2000 if (!relocatable)
2001 symcount += dyn_count;
2002 if (symcount == 0)
2003 return 0;
c9727e01 2004
a5259595
AM
2005 syms = bfd_malloc ((symcount + 1) * sizeof (*syms));
2006 if (syms == NULL)
2007 return -1;
90e3cdf2 2008
a5259595
AM
2009 if (!relocatable && static_count != 0 && dyn_count != 0)
2010 {
2011 /* Use both symbol tables. */
2012 memcpy (syms, static_syms, static_count * sizeof (*syms));
2013 memcpy (syms + static_count, dyn_syms,
2014 (dyn_count + 1) * sizeof (*syms));
2015 }
2016 else if (!relocatable && static_count == 0)
2017 memcpy (syms, dyn_syms, (symcount + 1) * sizeof (*syms));
2018 else
2019 memcpy (syms, static_syms, (symcount + 1) * sizeof (*syms));
90e3cdf2 2020
0ccf57bd
AM
2021 /* Trim uninteresting symbols. Interesting symbols are section,
2022 function, and notype symbols. */
2023 for (i = 0, j = 0; i < symcount; ++i)
2024 if ((syms[i]->flags & (BSF_FILE | BSF_OBJECT | BSF_THREAD_LOCAL
2025 | BSF_RELC | BSF_SRELC)) == 0)
2026 syms[j++] = syms[i];
2027 symcount = j;
2028
a5259595
AM
2029 synthetic_relocatable = relocatable;
2030 synthetic_opd = opd;
2031 qsort (syms, symcount, sizeof (*syms), compare_symbols);
90e3cdf2 2032
a5259595
AM
2033 if (!relocatable && symcount > 1)
2034 {
bfa5bd2a
PA
2035 /* Trim duplicate syms, since we may have merged the normal
2036 and dynamic symbols. Actually, we only care about syms
2037 that have different values, so trim any with the same
2038 value. Don't consider ifunc and ifunc resolver symbols
2039 duplicates however, because GDB wants to know whether a
2040 text symbol is an ifunc resolver. */
a5259595 2041 for (i = 1, j = 1; i < symcount; ++i)
bfa5bd2a
PA
2042 {
2043 const asymbol *s0 = syms[i - 1];
2044 const asymbol *s1 = syms[i];
2045
2046 if ((s0->value + s0->section->vma
2047 != s1->value + s1->section->vma)
2048 || ((s0->flags & BSF_GNU_INDIRECT_FUNCTION)
2049 != (s1->flags & BSF_GNU_INDIRECT_FUNCTION)))
2050 syms[j++] = syms[i];
2051 }
a5259595
AM
2052 symcount = j;
2053 }
699733f6 2054
a5259595
AM
2055 i = 0;
2056 /* Note that here and in compare_symbols we can't compare opd and
2057 sym->section directly. With separate debug info files, the
2058 symbols will be extracted from the debug file while abfd passed
2059 to this function is the real binary. */
0ccf57bd 2060 if (strcmp (syms[i]->section->name, ".opd") == 0)
a5259595
AM
2061 ++i;
2062 codesecsym = i;
2063
2064 for (; i < symcount; ++i)
2065 if (((syms[i]->section->flags & (SEC_CODE | SEC_ALLOC
2066 | SEC_THREAD_LOCAL))
2067 != (SEC_CODE | SEC_ALLOC))
2068 || (syms[i]->flags & BSF_SECTION_SYM) == 0)
2069 break;
2070 codesecsymend = i;
2071
2072 for (; i < symcount; ++i)
2073 if ((syms[i]->flags & BSF_SECTION_SYM) == 0)
2074 break;
2075 secsymend = i;
2076
2077 for (; i < symcount; ++i)
2078 if (strcmp (syms[i]->section->name, ".opd") != 0)
2079 break;
2080 opdsymend = i;
2081
2082 for (; i < symcount; ++i)
2cdcc330
AM
2083 if (((syms[i]->section->flags
2084 & (SEC_CODE | SEC_ALLOC | SEC_THREAD_LOCAL)))
a5259595
AM
2085 != (SEC_CODE | SEC_ALLOC))
2086 break;
2087 symcount = i;
2088 }
c9727e01 2089 count = 0;
90e3cdf2 2090
699733f6 2091 if (relocatable)
90e3cdf2 2092 {
699733f6
AM
2093 bfd_boolean (*slurp_relocs) (bfd *, asection *, asymbol **, bfd_boolean);
2094 arelent *r;
2095 size_t size;
0ccf57bd 2096 size_t relcount;
90e3cdf2 2097
468392fb
AM
2098 if (opdsymend == secsymend)
2099 goto done;
2100
699733f6 2101 slurp_relocs = get_elf_backend_data (abfd)->s->slurp_reloc_table;
90e3cdf2 2102 relcount = (opd->flags & SEC_RELOC) ? opd->reloc_count : 0;
7356fed5 2103 if (relcount == 0)
c9727e01 2104 goto done;
90e3cdf2 2105
7356fed5
AM
2106 if (!(*slurp_relocs) (abfd, opd, static_syms, FALSE))
2107 {
2108 count = -1;
2109 goto done;
2110 }
2111
699733f6 2112 size = 0;
595da8c5 2113 for (i = secsymend, r = opd->relocation; i < opdsymend; ++i)
699733f6
AM
2114 {
2115 asymbol *sym;
90e3cdf2 2116
595da8c5 2117 while (r < opd->relocation + relcount
699733f6
AM
2118 && r->address < syms[i]->value + opd->vma)
2119 ++r;
90e3cdf2 2120
595da8c5 2121 if (r == opd->relocation + relcount)
699733f6 2122 break;
90e3cdf2 2123
699733f6
AM
2124 if (r->address != syms[i]->value + opd->vma)
2125 continue;
90e3cdf2 2126
699733f6
AM
2127 if (r->howto->type != R_PPC64_ADDR64)
2128 continue;
90e3cdf2 2129
699733f6
AM
2130 sym = *r->sym_ptr_ptr;
2131 if (!sym_exists_at (syms, opdsymend, symcount,
2132 sym->section->id, sym->value + r->addend))
2133 {
2134 ++count;
2135 size += sizeof (asymbol);
2136 size += strlen (syms[i]->name) + 2;
2137 }
2138 }
90e3cdf2 2139
c4b0b099
AM
2140 if (size == 0)
2141 goto done;
699733f6
AM
2142 s = *ret = bfd_malloc (size);
2143 if (s == NULL)
2144 {
7356fed5 2145 count = -1;
c9727e01 2146 goto done;
699733f6 2147 }
90e3cdf2 2148
699733f6 2149 names = (char *) (s + count);
90e3cdf2 2150
595da8c5 2151 for (i = secsymend, r = opd->relocation; i < opdsymend; ++i)
90e3cdf2 2152 {
699733f6 2153 asymbol *sym;
90e3cdf2 2154
595da8c5 2155 while (r < opd->relocation + relcount
699733f6
AM
2156 && r->address < syms[i]->value + opd->vma)
2157 ++r;
90e3cdf2 2158
595da8c5 2159 if (r == opd->relocation + relcount)
699733f6
AM
2160 break;
2161
2162 if (r->address != syms[i]->value + opd->vma)
2163 continue;
2164
2165 if (r->howto->type != R_PPC64_ADDR64)
2166 continue;
90e3cdf2 2167
699733f6
AM
2168 sym = *r->sym_ptr_ptr;
2169 if (!sym_exists_at (syms, opdsymend, symcount,
2170 sym->section->id, sym->value + r->addend))
2171 {
2172 size_t len;
2173
2174 *s = *syms[i];
6ba2a415 2175 s->flags |= BSF_SYNTHETIC;
699733f6
AM
2176 s->section = sym->section;
2177 s->value = sym->value + r->addend;
2178 s->name = names;
2179 *names++ = '.';
2180 len = strlen (syms[i]->name);
2181 memcpy (names, syms[i]->name, len + 1);
2182 names += len + 1;
6f610d07
UW
2183 /* Have udata.p point back to the original symbol this
2184 synthetic symbol was derived from. */
2185 s->udata.p = syms[i];
699733f6
AM
2186 s++;
2187 }
2188 }
2189 }
2190 else
90e3cdf2 2191 {
468392fb 2192 bfd_boolean (*slurp_relocs) (bfd *, asection *, asymbol **, bfd_boolean);
ee67d69a 2193 bfd_byte *contents = NULL;
699733f6 2194 size_t size;
0ccf57bd 2195 size_t plt_count = 0;
468392fb
AM
2196 bfd_vma glink_vma = 0, resolv_vma = 0;
2197 asection *dynamic, *glink = NULL, *relplt = NULL;
2198 arelent *p;
90e3cdf2 2199
ee67d69a 2200 if (opd != NULL && !bfd_malloc_and_get_section (abfd, opd, &contents))
699733f6 2201 {
c4b0b099
AM
2202 free_contents_and_exit_err:
2203 count = -1;
ee67d69a 2204 free_contents_and_exit:
699733f6 2205 if (contents)
ee67d69a 2206 free (contents);
c9727e01 2207 goto done;
699733f6 2208 }
90e3cdf2 2209
699733f6
AM
2210 size = 0;
2211 for (i = secsymend; i < opdsymend; ++i)
2212 {
2213 bfd_vma ent;
90e3cdf2 2214
5ef11c02
AM
2215 /* Ignore bogus symbols. */
2216 if (syms[i]->value > opd->size - 8)
2217 continue;
2218
699733f6
AM
2219 ent = bfd_get_64 (abfd, contents + syms[i]->value);
2220 if (!sym_exists_at (syms, opdsymend, symcount, -1, ent))
2221 {
2222 ++count;
2223 size += sizeof (asymbol);
2224 size += strlen (syms[i]->name) + 2;
2225 }
2226 }
90e3cdf2 2227
468392fb 2228 /* Get start of .glink stubs from DT_PPC64_GLINK. */
066ee829
AM
2229 if (dyn_count != 0
2230 && (dynamic = bfd_get_section_by_name (abfd, ".dynamic")) != NULL)
468392fb
AM
2231 {
2232 bfd_byte *dynbuf, *extdyn, *extdynend;
2233 size_t extdynsize;
2234 void (*swap_dyn_in) (bfd *, const void *, Elf_Internal_Dyn *);
2235
2236 if (!bfd_malloc_and_get_section (abfd, dynamic, &dynbuf))
c4b0b099 2237 goto free_contents_and_exit_err;
468392fb
AM
2238
2239 extdynsize = get_elf_backend_data (abfd)->s->sizeof_dyn;
2240 swap_dyn_in = get_elf_backend_data (abfd)->s->swap_dyn_in;
2241
2242 extdyn = dynbuf;
2243 extdynend = extdyn + dynamic->size;
2244 for (; extdyn < extdynend; extdyn += extdynsize)
2245 {
2246 Elf_Internal_Dyn dyn;
2247 (*swap_dyn_in) (abfd, extdyn, &dyn);
2248
2249 if (dyn.d_tag == DT_NULL)
2250 break;
2251
2252 if (dyn.d_tag == DT_PPC64_GLINK)
2253 {
9e390558
AM
2254 /* The first glink stub starts at DT_PPC64_GLINK plus 32.
2255 See comment in ppc64_elf_finish_dynamic_sections. */
2256 glink_vma = dyn.d_un.d_val + 8 * 4;
468392fb
AM
2257 /* The .glink section usually does not survive the final
2258 link; search for the section (usually .text) where the
2259 glink stubs now reside. */
2260 glink = bfd_sections_find_if (abfd, section_covers_vma,
2261 &glink_vma);
2262 break;
2263 }
2264 }
2265
2266 free (dynbuf);
2267 }
2268
2269 if (glink != NULL)
2270 {
2271 /* Determine __glink trampoline by reading the relative branch
2272 from the first glink stub. */
2273 bfd_byte buf[4];
b9e5796b
AM
2274 unsigned int off = 0;
2275
2276 while (bfd_get_section_contents (abfd, glink, buf,
2277 glink_vma + off - glink->vma, 4))
468392fb
AM
2278 {
2279 unsigned int insn = bfd_get_32 (abfd, buf);
2280 insn ^= B_DOT;
2281 if ((insn & ~0x3fffffc) == 0)
b9e5796b 2282 {
2cdcc330
AM
2283 resolv_vma
2284 = glink_vma + off + (insn ^ 0x2000000) - 0x2000000;
b9e5796b
AM
2285 break;
2286 }
2287 off += 4;
2288 if (off > 4)
2289 break;
468392fb
AM
2290 }
2291
2292 if (resolv_vma)
2293 size += sizeof (asymbol) + sizeof ("__glink_PLTresolve");
468392fb 2294
066ee829
AM
2295 relplt = bfd_get_section_by_name (abfd, ".rela.plt");
2296 if (relplt != NULL)
2297 {
2298 slurp_relocs = get_elf_backend_data (abfd)->s->slurp_reloc_table;
2cdcc330 2299 if (!(*slurp_relocs) (abfd, relplt, dyn_syms, TRUE))
c4b0b099 2300 goto free_contents_and_exit_err;
68ffbac6 2301
066ee829
AM
2302 plt_count = relplt->size / sizeof (Elf64_External_Rela);
2303 size += plt_count * sizeof (asymbol);
468392fb 2304
066ee829
AM
2305 p = relplt->relocation;
2306 for (i = 0; i < plt_count; i++, p++)
e054468f
AM
2307 {
2308 size += strlen ((*p->sym_ptr_ptr)->name) + sizeof ("@plt");
2309 if (p->addend != 0)
2310 size += sizeof ("+0x") - 1 + 16;
2311 }
066ee829 2312 }
468392fb
AM
2313 }
2314
c4b0b099
AM
2315 if (size == 0)
2316 goto free_contents_and_exit;
699733f6
AM
2317 s = *ret = bfd_malloc (size);
2318 if (s == NULL)
c4b0b099 2319 goto free_contents_and_exit_err;
90e3cdf2 2320
468392fb 2321 names = (char *) (s + count + plt_count + (resolv_vma != 0));
90e3cdf2 2322
699733f6 2323 for (i = secsymend; i < opdsymend; ++i)
90e3cdf2 2324 {
699733f6 2325 bfd_vma ent;
90e3cdf2 2326
5ef11c02
AM
2327 if (syms[i]->value > opd->size - 8)
2328 continue;
2329
699733f6
AM
2330 ent = bfd_get_64 (abfd, contents + syms[i]->value);
2331 if (!sym_exists_at (syms, opdsymend, symcount, -1, ent))
90e3cdf2 2332 {
0ccf57bd 2333 size_t lo, hi;
699733f6 2334 size_t len;
c9727e01 2335 asection *sec = abfd->sections;
90e3cdf2 2336
699733f6
AM
2337 *s = *syms[i];
2338 lo = codesecsym;
2339 hi = codesecsymend;
2340 while (lo < hi)
2341 {
0ccf57bd 2342 size_t mid = (lo + hi) >> 1;
699733f6
AM
2343 if (syms[mid]->section->vma < ent)
2344 lo = mid + 1;
2345 else if (syms[mid]->section->vma > ent)
2346 hi = mid;
2347 else
c9727e01
AM
2348 {
2349 sec = syms[mid]->section;
2350 break;
2351 }
699733f6
AM
2352 }
2353
c9727e01 2354 if (lo >= hi && lo > codesecsym)
699733f6 2355 sec = syms[lo - 1]->section;
699733f6
AM
2356
2357 for (; sec != NULL; sec = sec->next)
2358 {
2359 if (sec->vma > ent)
2360 break;
63524580
JK
2361 /* SEC_LOAD may not be set if SEC is from a separate debug
2362 info file. */
2363 if ((sec->flags & SEC_ALLOC) == 0)
699733f6
AM
2364 break;
2365 if ((sec->flags & SEC_CODE) != 0)
2366 s->section = sec;
2367 }
6ba2a415 2368 s->flags |= BSF_SYNTHETIC;
699733f6
AM
2369 s->value = ent - s->section->vma;
2370 s->name = names;
2371 *names++ = '.';
2372 len = strlen (syms[i]->name);
2373 memcpy (names, syms[i]->name, len + 1);
2374 names += len + 1;
6f610d07
UW
2375 /* Have udata.p point back to the original symbol this
2376 synthetic symbol was derived from. */
2377 s->udata.p = syms[i];
699733f6 2378 s++;
90e3cdf2 2379 }
90e3cdf2 2380 }
699733f6 2381 free (contents);
468392fb
AM
2382
2383 if (glink != NULL && relplt != NULL)
2384 {
2385 if (resolv_vma)
2386 {
2387 /* Add a symbol for the main glink trampoline. */
86a4952b 2388 memset (s, 0, sizeof *s);
468392fb 2389 s->the_bfd = abfd;
6ba2a415 2390 s->flags = BSF_GLOBAL | BSF_SYNTHETIC;
468392fb
AM
2391 s->section = glink;
2392 s->value = resolv_vma - glink->vma;
2393 s->name = names;
2cdcc330
AM
2394 memcpy (names, "__glink_PLTresolve",
2395 sizeof ("__glink_PLTresolve"));
468392fb
AM
2396 names += sizeof ("__glink_PLTresolve");
2397 s++;
2398 count++;
2399 }
2400
2401 /* FIXME: It would be very much nicer to put sym@plt on the
2402 stub rather than on the glink branch table entry. The
2403 objdump disassembler would then use a sensible symbol
2404 name on plt calls. The difficulty in doing so is
2405 a) finding the stubs, and,
2406 b) matching stubs against plt entries, and,
2407 c) there can be multiple stubs for a given plt entry.
2408
2409 Solving (a) could be done by code scanning, but older
2410 ppc64 binaries used different stubs to current code.
2411 (b) is the tricky one since you need to known the toc
2412 pointer for at least one function that uses a pic stub to
2413 be able to calculate the plt address referenced.
2414 (c) means gdb would need to set multiple breakpoints (or
2415 find the glink branch itself) when setting breakpoints
2416 for pending shared library loads. */
2417 p = relplt->relocation;
2418 for (i = 0; i < plt_count; i++, p++)
2419 {
2420 size_t len;
2421
2422 *s = **p->sym_ptr_ptr;
2423 /* Undefined syms won't have BSF_LOCAL or BSF_GLOBAL set. Since
2424 we are defining a symbol, ensure one of them is set. */
2425 if ((s->flags & BSF_LOCAL) == 0)
2426 s->flags |= BSF_GLOBAL;
6ba2a415 2427 s->flags |= BSF_SYNTHETIC;
468392fb
AM
2428 s->section = glink;
2429 s->value = glink_vma - glink->vma;
2430 s->name = names;
2431 s->udata.p = NULL;
2432 len = strlen ((*p->sym_ptr_ptr)->name);
2433 memcpy (names, (*p->sym_ptr_ptr)->name, len);
2434 names += len;
e054468f
AM
2435 if (p->addend != 0)
2436 {
2437 memcpy (names, "+0x", sizeof ("+0x") - 1);
2438 names += sizeof ("+0x") - 1;
2439 bfd_sprintf_vma (abfd, names, p->addend);
2440 names += strlen (names);
2441 }
468392fb
AM
2442 memcpy (names, "@plt", sizeof ("@plt"));
2443 names += sizeof ("@plt");
2444 s++;
b9e5796b
AM
2445 if (abi < 2)
2446 {
2447 glink_vma += 8;
2448 if (i >= 0x8000)
2449 glink_vma += 4;
2450 }
2451 else
468392fb
AM
2452 glink_vma += 4;
2453 }
2454 count += plt_count;
2455 }
90e3cdf2
JJ
2456 }
2457
c9727e01 2458 done:
a7535cf3 2459 free (syms);
90e3cdf2
JJ
2460 return count;
2461}
5bd4f169 2462\f
65f38f15
AM
2463/* The following functions are specific to the ELF linker, while
2464 functions above are used generally. Those named ppc64_elf_* are
2465 called by the main ELF linker code. They appear in this file more
2466 or less in the order in which they are called. eg.
2467 ppc64_elf_check_relocs is called early in the link process,
2468 ppc64_elf_finish_dynamic_sections is one of the last functions
e86ce104
AM
2469 called.
2470
2471 PowerPC64-ELF uses a similar scheme to PowerPC64-XCOFF in that
2472 functions have both a function code symbol and a function descriptor
2473 symbol. A call to foo in a relocatable object file looks like:
2474
2475 . .text
2476 . x:
2477 . bl .foo
2478 . nop
2479
2480 The function definition in another object file might be:
2481
2482 . .section .opd
2483 . foo: .quad .foo
2484 . .quad .TOC.@tocbase
2485 . .quad 0
2486 .
2487 . .text
2488 . .foo: blr
2489
2490 When the linker resolves the call during a static link, the branch
2491 unsurprisingly just goes to .foo and the .opd information is unused.
2492 If the function definition is in a shared library, things are a little
2493 different: The call goes via a plt call stub, the opd information gets
2494 copied to the plt, and the linker patches the nop.
2495
2496 . x:
2497 . bl .foo_stub
2498 . ld 2,40(1)
2499 .
2500 .
2501 . .foo_stub:
71a39c98
AM
2502 . std 2,40(1) # in practice, the call stub
2503 . addis 11,2,Lfoo@toc@ha # is slightly optimized, but
2504 . addi 11,11,Lfoo@toc@l # this is the general idea
2505 . ld 12,0(11)
2506 . ld 2,8(11)
2507 . mtctr 12
2508 . ld 11,16(11)
e86ce104
AM
2509 . bctr
2510 .
2511 . .section .plt
2512 . Lfoo: reloc (R_PPC64_JMP_SLOT, foo)
2513
2514 The "reloc ()" notation is supposed to indicate that the linker emits
2515 an R_PPC64_JMP_SLOT reloc against foo. The dynamic linker does the opd
2516 copying.
2517
2518 What are the difficulties here? Well, firstly, the relocations
2519 examined by the linker in check_relocs are against the function code
2520 sym .foo, while the dynamic relocation in the plt is emitted against
2521 the function descriptor symbol, foo. Somewhere along the line, we need
2522 to carefully copy dynamic link information from one symbol to the other.
2523 Secondly, the generic part of the elf linker will make .foo a dynamic
2524 symbol as is normal for most other backends. We need foo dynamic
2525 instead, at least for an application final link. However, when
2526 creating a shared library containing foo, we need to have both symbols
2527 dynamic so that references to .foo are satisfied during the early
2528 stages of linking. Otherwise the linker might decide to pull in a
8387904d
AM
2529 definition from some other object, eg. a static library.
2530
2531 Update: As of August 2004, we support a new convention. Function
2532 calls may use the function descriptor symbol, ie. "bl foo". This
2533 behaves exactly as "bl .foo". */
65f38f15 2534
7c8bbca5
AM
2535/* Of those relocs that might be copied as dynamic relocs, this
2536 function selects those that must be copied when linking a shared
2537 library or PIE, even when the symbol is local. */
65f38f15 2538
1d483afe
AM
2539static int
2540must_be_dyn_reloc (struct bfd_link_info *info,
2541 enum elf_ppc64_reloc_type r_type)
2542{
2543 switch (r_type)
2544 {
2545 default:
7c8bbca5
AM
2546 /* Only relative relocs can be resolved when the object load
2547 address isn't fixed. DTPREL64 is excluded because the
2548 dynamic linker needs to differentiate global dynamic from
2549 local dynamic __tls_index pairs when PPC64_OPT_TLS is set. */
1d483afe
AM
2550 return 1;
2551
2552 case R_PPC64_REL32:
2553 case R_PPC64_REL64:
2554 case R_PPC64_REL30:
2555 return 0;
2556
2557 case R_PPC64_TPREL16:
2558 case R_PPC64_TPREL16_LO:
2559 case R_PPC64_TPREL16_HI:
2560 case R_PPC64_TPREL16_HA:
2561 case R_PPC64_TPREL16_DS:
2562 case R_PPC64_TPREL16_LO_DS:
f9c6b907
AM
2563 case R_PPC64_TPREL16_HIGH:
2564 case R_PPC64_TPREL16_HIGHA:
1d483afe
AM
2565 case R_PPC64_TPREL16_HIGHER:
2566 case R_PPC64_TPREL16_HIGHERA:
2567 case R_PPC64_TPREL16_HIGHEST:
2568 case R_PPC64_TPREL16_HIGHESTA:
2569 case R_PPC64_TPREL64:
7c8bbca5
AM
2570 /* These relocations are relative but in a shared library the
2571 linker doesn't know the thread pointer base. */
2572 return bfd_link_dll (info);
1d483afe
AM
2573 }
2574}
65f38f15 2575
f4656909
AM
2576/* If ELIMINATE_COPY_RELOCS is non-zero, the linker will try to avoid
2577 copying dynamic variables from a shared lib into an app's dynbss
2578 section, and instead use a dynamic relocation to point into the
5d35169e
AM
2579 shared lib. With code that gcc generates, it's vital that this be
2580 enabled; In the PowerPC64 ABI, the address of a function is actually
2581 the address of a function descriptor, which resides in the .opd
2582 section. gcc uses the descriptor directly rather than going via the
2583 GOT as some other ABI's do, which means that initialized function
2584 pointers must reference the descriptor. Thus, a function pointer
2585 initialized to the address of a function in a shared library will
2586 either require a copy reloc, or a dynamic reloc. Using a copy reloc
4cc11e76 2587 redefines the function descriptor symbol to point to the copy. This
5d35169e
AM
2588 presents a problem as a plt entry for that function is also
2589 initialized from the function descriptor symbol and the copy reloc
2590 may not be initialized first. */
a23b6845 2591#define ELIMINATE_COPY_RELOCS 1
f4656909 2592
721956f4 2593/* Section name for stubs is the associated section name plus this
29942be8
NC
2594 string. */
2595#define STUB_SUFFIX ".stub"
721956f4
AM
2596
2597/* Linker stubs.
2598 ppc_stub_long_branch:
2599 Used when a 14 bit branch (or even a 24 bit branch) can't reach its
2600 destination, but a 24 bit branch in a stub section will reach.
2601 . b dest
2602
2603 ppc_stub_plt_branch:
2604 Similar to the above, but a 24 bit branch in the stub section won't
2605 reach its destination.
71a39c98
AM
2606 . addis %r11,%r2,xxx@toc@ha
2607 . ld %r12,xxx@toc@l(%r11)
2608 . mtctr %r12
721956f4
AM
2609 . bctr
2610
2611 ppc_stub_plt_call:
2c66dc6c
AM
2612 Used to call a function in a shared library. If it so happens that
2613 the plt entry referenced crosses a 64k boundary, then an extra
71a39c98 2614 "addi %r11,%r11,xxx@toc@l" will be inserted before the "mtctr".
05d0e962 2615 ppc_stub_plt_call_r2save starts with "std %r2,40(%r1)".
71a39c98
AM
2616 . addis %r11,%r2,xxx@toc@ha
2617 . ld %r12,xxx+0@toc@l(%r11)
2618 . mtctr %r12
2619 . ld %r2,xxx+8@toc@l(%r11)
2620 . ld %r11,xxx+16@toc@l(%r11)
721956f4 2621 . bctr
ad8e1ba5
AM
2622
2623 ppc_stub_long_branch and ppc_stub_plt_branch may also have additional
2624 code to adjust the value and save r2 to support multiple toc sections.
2625 A ppc_stub_long_branch with an r2 offset looks like:
2626 . std %r2,40(%r1)
2627 . addis %r2,%r2,off@ha
2628 . addi %r2,%r2,off@l
2629 . b dest
2630
2631 A ppc_stub_plt_branch with an r2 offset looks like:
2632 . std %r2,40(%r1)
71a39c98
AM
2633 . addis %r11,%r2,xxx@toc@ha
2634 . ld %r12,xxx@toc@l(%r11)
ad8e1ba5
AM
2635 . addis %r2,%r2,off@ha
2636 . addi %r2,%r2,off@l
71a39c98 2637 . mtctr %r12
ad8e1ba5 2638 . bctr
ac2df442 2639
05d0e962
AM
2640 All of the above stubs are shown as their ELFv1 variants. ELFv2
2641 variants exist too, simpler for plt calls since a new toc pointer
2642 and static chain are not loaded by the stub. In addition, ELFv2
2643 has some more complex stubs to handle calls marked with NOTOC
2644 relocs from functions where r2 is not a valid toc pointer. These
2645 come in two flavours, the ones shown below, and _both variants that
2646 start with "std %r2,24(%r1)" to save r2 in the unlikely event that
2647 one call is from a function where r2 is used as the toc pointer but
2648 needs a toc adjusting stub for small-model multi-toc, and another
2649 call is from a function where r2 is not valid.
2650 ppc_stub_long_branch_notoc:
2651 . mflr %r12
2652 . bcl 20,31,1f
2653 . 1:
2654 . mflr %r11
2655 . mtlr %r12
2cdcc330
AM
2656 . addis %r12,%r11,dest-1b@ha
2657 . addi %r12,%r12,dest-1b@l
05d0e962
AM
2658 . b dest
2659
2660 ppc_stub_plt_branch_notoc:
2661 . mflr %r12
2662 . bcl 20,31,1f
2663 . 1:
2664 . mflr %r11
2665 . mtlr %r12
2666 . lis %r12,xxx-1b@highest
f891966f 2667 . ori %r12,%r12,xxx-1b@higher
05d0e962 2668 . sldi %r12,%r12,32
f891966f 2669 . oris %r12,%r12,xxx-1b@high
05d0e962
AM
2670 . ori %r12,%r12,xxx-1b@l
2671 . add %r12,%r11,%r12
2672 . mtctr %r12
2673 . bctr
2674
2675 ppc_stub_plt_call_notoc:
2676 . mflr %r12
2677 . bcl 20,31,1f
2678 . 1:
2679 . mflr %r11
2680 . mtlr %r12
2681 . lis %r12,xxx-1b@highest
f891966f 2682 . ori %r12,%r12,xxx-1b@higher
05d0e962 2683 . sldi %r12,%r12,32
f891966f 2684 . oris %r12,%r12,xxx-1b@high
05d0e962
AM
2685 . ori %r12,%r12,xxx-1b@l
2686 . ldx %r12,%r11,%r12
2687 . mtctr %r12
2688 . bctr
2689
2690 In cases where the high instructions would add zero, they are
2691 omitted and following instructions modified in some cases.
2692
2693 For a given stub group (a set of sections all using the same toc
2694 pointer value) there will be just one stub type used for any
2695 particular function symbol. For example, if printf is called from
2696 code with the tocsave optimization (ie. r2 saved in function
2697 prologue) and therefore calls use a ppc_stub_plt_call linkage stub,
2698 and from other code without the tocsave optimization requiring a
2699 ppc_stub_plt_call_r2save linkage stub, a single stub of the latter
2700 type will be created. Calls with the tocsave optimization will
2701 enter this stub after the instruction saving r2. A similar
2702 situation exists when calls are marked with R_PPC64_REL24_NOTOC
2703 relocations. These require a ppc_stub_plt_call_notoc linkage stub
2704 to call an external function like printf. If other calls to printf
2705 require a ppc_stub_plt_call linkage stub then a single
2706 ppc_stub_plt_call_notoc linkage stub will be used for both types of
2707 call. If other calls to printf require a ppc_stub_plt_call_r2save
2708 linkage stub then a single ppc_stub_plt_call_both linkage stub will
2709 be created and calls not requiring r2 to be saved will enter the
2710 stub after the r2 save instruction. There is an analogous
2711 hierarchy of long branch and plt branch stubs for local call
2712 linkage. */
721956f4 2713
2cdcc330
AM
2714enum ppc_stub_type
2715{
721956f4
AM
2716 ppc_stub_none,
2717 ppc_stub_long_branch,
ad8e1ba5 2718 ppc_stub_long_branch_r2off,
05d0e962
AM
2719 ppc_stub_long_branch_notoc,
2720 ppc_stub_long_branch_both, /* r2off and notoc variants both needed. */
721956f4 2721 ppc_stub_plt_branch,
ad8e1ba5 2722 ppc_stub_plt_branch_r2off,
05d0e962
AM
2723 ppc_stub_plt_branch_notoc,
2724 ppc_stub_plt_branch_both,
794e51c0 2725 ppc_stub_plt_call,
7341d5e2 2726 ppc_stub_plt_call_r2save,
05d0e962
AM
2727 ppc_stub_plt_call_notoc,
2728 ppc_stub_plt_call_both,
a4b6fadd
AM
2729 ppc_stub_global_entry,
2730 ppc_stub_save_res
721956f4
AM
2731};
2732
6f20ed8a
AM
2733/* Information on stub grouping. */
2734struct map_stub
2735{
2736 /* The stub section. */
2737 asection *stub_sec;
2738 /* This is the section to which stubs in the group will be attached. */
2739 asection *link_sec;
a4b6fadd
AM
2740 /* Next group. */
2741 struct map_stub *next;
2742 /* Whether to emit a copy of register save/restore functions in this
2743 group. */
2744 int needs_save_res;
df136d64
AM
2745 /* Current offset within stubs after the insn restoring lr in a
2746 _notoc or _both stub using bcl for pc-relative addressing, or
2747 after the insn restoring lr in a __tls_get_addr_opt plt stub. */
2748 unsigned int lr_restore;
2749 /* Accumulated size of EH info emitted to describe return address
2750 if stubs modify lr. Does not include 17 byte FDE header. */
2751 unsigned int eh_size;
2752 /* Offset in glink_eh_frame to the start of EH info for this group. */
2753 unsigned int eh_base;
6f20ed8a
AM
2754};
2755
2cdcc330
AM
2756struct ppc_stub_hash_entry
2757{
721956f4
AM
2758 /* Base hash table entry structure. */
2759 struct bfd_hash_entry root;
2760
ad8e1ba5
AM
2761 enum ppc_stub_type stub_type;
2762
6f20ed8a
AM
2763 /* Group information. */
2764 struct map_stub *group;
721956f4
AM
2765
2766 /* Offset within stub_sec of the beginning of this stub. */
2767 bfd_vma stub_offset;
2768
2769 /* Given the symbol's value and its section we can determine its final
2770 value when building the stubs (so the stub knows where to jump. */
2771 bfd_vma target_value;
2772 asection *target_section;
2773
721956f4
AM
2774 /* The symbol table entry, if any, that this was derived from. */
2775 struct ppc_link_hash_entry *h;
e054468f 2776 struct plt_entry *plt_ent;
721956f4 2777
2d7ad24e
AM
2778 /* Symbol type. */
2779 unsigned char symtype;
2780
6911b7dc
AM
2781 /* Symbol st_other. */
2782 unsigned char other;
721956f4
AM
2783};
2784
2cdcc330
AM
2785struct ppc_branch_hash_entry
2786{
721956f4
AM
2787 /* Base hash table entry structure. */
2788 struct bfd_hash_entry root;
2789
c456f082 2790 /* Offset within branch lookup table. */
721956f4
AM
2791 unsigned int offset;
2792
2793 /* Generation marker. */
2794 unsigned int iter;
2795};
65f38f15 2796
19e08130
AM
2797/* Used to track dynamic relocations for local symbols. */
2798struct ppc_dyn_relocs
2799{
2800 struct ppc_dyn_relocs *next;
2801
2802 /* The input section of the reloc. */
2803 asection *sec;
2804
2805 /* Total number of relocs copied for the input section. */
2806 unsigned int count : 31;
2807
2808 /* Whether this entry is for STT_GNU_IFUNC symbols. */
2809 unsigned int ifunc : 1;
2810};
2811
65f38f15
AM
2812struct ppc_link_hash_entry
2813{
2814 struct elf_link_hash_entry elf;
2815
2cdcc330
AM
2816 union
2817 {
b3fac117
AM
2818 /* A pointer to the most recently used stub hash entry against this
2819 symbol. */
2820 struct ppc_stub_hash_entry *stub_cache;
2821
2822 /* A pointer to the next symbol starting with a '.' */
2823 struct ppc_link_hash_entry *next_dot_sym;
2824 } u;
721956f4 2825
65f38f15 2826 /* Track dynamic relocs copied for this symbol. */
6061a67d 2827 struct elf_dyn_relocs *dyn_relocs;
e86ce104 2828
721956f4 2829 /* Link between function code and descriptor symbols. */
34814b9f 2830 struct ppc_link_hash_entry *oh;
721956f4 2831
e86ce104
AM
2832 /* Flag function code and descriptor symbols. */
2833 unsigned int is_func:1;
2834 unsigned int is_func_descriptor:1;
908b32fc 2835 unsigned int fake:1;
411e1bfb 2836
c5614fa4
AM
2837 /* Whether global opd/toc sym has been adjusted or not.
2838 After ppc64_elf_edit_opd/ppc64_elf_edit_toc has run, this flag
2839 should be set for all globals defined in any opd/toc section. */
754021d0
AM
2840 unsigned int adjust_done:1;
2841
a4b6fadd
AM
2842 /* Set if this is an out-of-line register save/restore function,
2843 with non-standard calling convention. */
2844 unsigned int save_res:1;
2845
8b5f1ed8
AM
2846 /* Set if a duplicate symbol with non-zero localentry is detected,
2847 even when the duplicate symbol does not provide a definition. */
2848 unsigned int non_zero_localentry:1;
2849
411e1bfb 2850 /* Contexts in which symbol is used in the GOT (or TOC).
37da22e5
AM
2851 Bits are or'd into the mask as the corresponding relocs are
2852 encountered during check_relocs, with TLS_TLS being set when any
2853 of the other TLS bits are set. tls_optimize clears bits when
2854 optimizing to indicate the corresponding GOT entry type is not
2855 needed. If set, TLS_TLS is never cleared. tls_optimize may also
2856 set TLS_TPRELGD when a GD reloc turns into a TPREL one. We use a
2857 separate flag rather than setting TPREL just for convenience in
2858 distinguishing the two cases.
2859 These flags are also kept for local symbols. */
2860#define TLS_TLS 1 /* Any TLS reloc. */
2861#define TLS_GD 2 /* GD reloc. */
2862#define TLS_LD 4 /* LD reloc. */
2863#define TLS_TPREL 8 /* TPREL reloc, => IE. */
2864#define TLS_DTPREL 16 /* DTPREL reloc, => LD. */
2865#define TLS_MARK 32 /* __tls_get_addr call marked. */
e7b938ca 2866#define TLS_TPRELGD 64 /* TPREL reloc resulting from GD->IE. */
37da22e5 2867#define TLS_EXPLICIT 128 /* Marks TOC section TLS relocs. */
f961d9dd 2868 unsigned char tls_mask;
37da22e5
AM
2869
2870 /* The above field is also used to mark function symbols. In which
2871 case TLS_TLS will be 0. */
2872#define PLT_IFUNC 2 /* STT_GNU_IFUNC. */
2d7ad24e 2873#define PLT_KEEP 4 /* inline plt call requires plt entry. */
37da22e5 2874#define NON_GOT 256 /* local symbol plt, not stored. */
65f38f15
AM
2875};
2876
2877/* ppc64 ELF linker hash table. */
2878
2879struct ppc_link_hash_table
2880{
2881 struct elf_link_hash_table elf;
2882
721956f4
AM
2883 /* The stub hash table. */
2884 struct bfd_hash_table stub_hash_table;
2885
2886 /* Another hash table for plt_branch stubs. */
2887 struct bfd_hash_table branch_hash_table;
2888
3b421ab3
AM
2889 /* Hash table for function prologue tocsave. */
2890 htab_t tocsave_htab;
2891
e7d1c40c
AM
2892 /* Various options and other info passed from the linker. */
2893 struct ppc64_elf_params *params;
721956f4 2894
6f20ed8a
AM
2895 /* The size of sec_info below. */
2896 unsigned int sec_info_arr_size;
2897
2898 /* Per-section array of extra section info. Done this way rather
2899 than as part of ppc64_elf_section_data so we have the info for
2900 non-ppc64 sections. */
2901 struct
2902 {
2903 /* Along with elf_gp, specifies the TOC pointer used by this section. */
ad8e1ba5 2904 bfd_vma toc_off;
6f20ed8a
AM
2905
2906 union
2907 {
2908 /* The section group that this section belongs to. */
2909 struct map_stub *group;
2910 /* A temp section list pointer. */
2911 asection *list;
2912 } u;
2913 } *sec_info;
721956f4 2914
a4b6fadd
AM
2915 /* Linked list of groups. */
2916 struct map_stub *group;
2917
ad8e1ba5
AM
2918 /* Temp used when calculating TOC pointers. */
2919 bfd_vma toc_curr;
bf102f86
AM
2920 bfd *toc_bfd;
2921 asection *toc_first_sec;
ad8e1ba5 2922
b3fac117
AM
2923 /* Used when adding symbols. */
2924 struct ppc_link_hash_entry *dot_syms;
2925
33e44f2e 2926 /* Shortcuts to get to dynamic linker sections. */
4ce794b7 2927 asection *glink;
9e390558 2928 asection *global_entry;
82bd7b59 2929 asection *sfpr;
2d7ad24e
AM
2930 asection *pltlocal;
2931 asection *relpltlocal;
4ce794b7
AM
2932 asection *brlt;
2933 asection *relbrlt;
58d180e8 2934 asection *glink_eh_frame;
ec338859 2935
8387904d
AM
2936 /* Shortcut to .__tls_get_addr and __tls_get_addr. */
2937 struct ppc_link_hash_entry *tls_get_addr;
2938 struct ppc_link_hash_entry *tls_get_addr_fd;
411e1bfb 2939
927be08e
AM
2940 /* The size of reliplt used by got entry relocs. */
2941 bfd_size_type got_reli_size;
2942
9b5ecbd0 2943 /* Statistics. */
7341d5e2 2944 unsigned long stub_count[ppc_stub_global_entry];
9b5ecbd0 2945
ee75fd95
AM
2946 /* Number of stubs against global syms. */
2947 unsigned long stub_globals;
2948
ee67d69a
AM
2949 /* Set if we're linking code with function descriptors. */
2950 unsigned int opd_abi:1;
2951
4c52953f 2952 /* Support for multiple toc sections. */
33c0ec9d 2953 unsigned int do_multi_toc:1;
4c52953f 2954 unsigned int multi_toc_needed:1;
927be08e 2955 unsigned int second_toc_pass:1;
67f0cbdb 2956 unsigned int do_toc_opt:1;
4c52953f 2957
9a23f96e
AM
2958 /* Set if tls optimization is enabled. */
2959 unsigned int do_tls_opt:1;
2960
3e04d765
AM
2961 /* Set if inline plt calls should be converted to direct calls. */
2962 unsigned int can_convert_all_inline_plt:1;
2963
5d1634d7 2964 /* Set on error. */
99877b66 2965 unsigned int stub_error:1;
721956f4 2966
8c5b4e52
AM
2967 /* Whether func_desc_adjust needs to be run over symbols. */
2968 unsigned int need_func_desc_adj:1;
721956f4 2969
82e66161
AM
2970 /* Whether there exist local gnu indirect function resolvers,
2971 referenced by dynamic relocations. */
2972 unsigned int local_ifunc_resolver:1;
2973 unsigned int maybe_local_ifunc_resolver:1;
2974
f378ab09
AM
2975 /* Whether plt calls for ELFv2 localentry:0 funcs have been optimized. */
2976 unsigned int has_plt_localentry0:1;
2977
721956f4
AM
2978 /* Incremented every time we size stubs. */
2979 unsigned int stub_iteration;
5d1634d7 2980
87d72d41
AM
2981 /* Small local sym cache. */
2982 struct sym_cache sym_cache;
65f38f15
AM
2983};
2984
4c52953f
AM
2985/* Rename some of the generic section flags to better document how they
2986 are used here. */
b0dddeec
AM
2987
2988/* Nonzero if this section has TLS related relocations. */
2989#define has_tls_reloc sec_flg0
2990
23cedd1d 2991/* Nonzero if this section has an old-style call to __tls_get_addr. */
b0dddeec
AM
2992#define has_tls_get_addr_call sec_flg1
2993
2994/* Nonzero if this section has any toc or got relocs. */
2995#define has_toc_reloc sec_flg2
2996
2997/* Nonzero if this section has a call to another section that uses
2998 the toc or got. */
d77c8a4b 2999#define makes_toc_func_call sec_flg3
b0dddeec
AM
3000
3001/* Recursion protection when determining above flag. */
d77c8a4b 3002#define call_check_in_progress sec_flg4
70cc837d 3003#define call_check_done sec_flg5
4c52953f 3004
65f38f15
AM
3005/* Get the ppc64 ELF linker hash table from a link_info structure. */
3006
3007#define ppc_hash_table(p) \
4dfe6ac6
NC
3008 (elf_hash_table_id ((struct elf_link_hash_table *) ((p)->hash)) \
3009 == PPC64_ELF_DATA ? ((struct ppc_link_hash_table *) ((p)->hash)) : NULL)
65f38f15 3010
721956f4
AM
3011#define ppc_stub_hash_lookup(table, string, create, copy) \
3012 ((struct ppc_stub_hash_entry *) \
3013 bfd_hash_lookup ((table), (string), (create), (copy)))
3014
3015#define ppc_branch_hash_lookup(table, string, create, copy) \
3016 ((struct ppc_branch_hash_entry *) \
3017 bfd_hash_lookup ((table), (string), (create), (copy)))
3018
3019/* Create an entry in the stub hash table. */
3020
3021static struct bfd_hash_entry *
4ce794b7
AM
3022stub_hash_newfunc (struct bfd_hash_entry *entry,
3023 struct bfd_hash_table *table,
3024 const char *string)
721956f4
AM
3025{
3026 /* Allocate the structure if it has not already been allocated by a
3027 subclass. */
3028 if (entry == NULL)
3029 {
3030 entry = bfd_hash_allocate (table, sizeof (struct ppc_stub_hash_entry));
3031 if (entry == NULL)
3032 return entry;
3033 }
3034
3035 /* Call the allocation method of the superclass. */
3036 entry = bfd_hash_newfunc (entry, table, string);
3037 if (entry != NULL)
3038 {
3039 struct ppc_stub_hash_entry *eh;
3040
3041 /* Initialize the local fields. */
3042 eh = (struct ppc_stub_hash_entry *) entry;
ad8e1ba5 3043 eh->stub_type = ppc_stub_none;
6f20ed8a 3044 eh->group = NULL;
721956f4
AM
3045 eh->stub_offset = 0;
3046 eh->target_value = 0;
3047 eh->target_section = NULL;
721956f4 3048 eh->h = NULL;
6911b7dc 3049 eh->plt_ent = NULL;
6911b7dc 3050 eh->other = 0;
721956f4
AM
3051 }
3052
3053 return entry;
3054}
3055
3056/* Create an entry in the branch hash table. */
3057
3058static struct bfd_hash_entry *
4ce794b7
AM
3059branch_hash_newfunc (struct bfd_hash_entry *entry,
3060 struct bfd_hash_table *table,
3061 const char *string)
721956f4
AM
3062{
3063 /* Allocate the structure if it has not already been allocated by a
3064 subclass. */
3065 if (entry == NULL)
3066 {
3067 entry = bfd_hash_allocate (table, sizeof (struct ppc_branch_hash_entry));
3068 if (entry == NULL)
3069 return entry;
3070 }
3071
3072 /* Call the allocation method of the superclass. */
3073 entry = bfd_hash_newfunc (entry, table, string);
3074 if (entry != NULL)
3075 {
3076 struct ppc_branch_hash_entry *eh;
3077
3078 /* Initialize the local fields. */
3079 eh = (struct ppc_branch_hash_entry *) entry;
3080 eh->offset = 0;
3081 eh->iter = 0;
3082 }
3083
3084 return entry;
3085}
3086
65f38f15
AM
3087/* Create an entry in a ppc64 ELF linker hash table. */
3088
3089static struct bfd_hash_entry *
4ce794b7
AM
3090link_hash_newfunc (struct bfd_hash_entry *entry,
3091 struct bfd_hash_table *table,
3092 const char *string)
65f38f15
AM
3093{
3094 /* Allocate the structure if it has not already been allocated by a
3095 subclass. */
3096 if (entry == NULL)
3097 {
3098 entry = bfd_hash_allocate (table, sizeof (struct ppc_link_hash_entry));
3099 if (entry == NULL)
3100 return entry;
3101 }
3102
3103 /* Call the allocation method of the superclass. */
3104 entry = _bfd_elf_link_hash_newfunc (entry, table, string);
3105 if (entry != NULL)
3106 {
3107 struct ppc_link_hash_entry *eh = (struct ppc_link_hash_entry *) entry;
3108
b3fac117 3109 memset (&eh->u.stub_cache, 0,
908b32fc 3110 (sizeof (struct ppc_link_hash_entry)
b3fac117
AM
3111 - offsetof (struct ppc_link_hash_entry, u.stub_cache)));
3112
3113 /* When making function calls, old ABI code references function entry
3114 points (dot symbols), while new ABI code references the function
3115 descriptor symbol. We need to make any combination of reference and
3116 definition work together, without breaking archive linking.
3117
3118 For a defined function "foo" and an undefined call to "bar":
3119 An old object defines "foo" and ".foo", references ".bar" (possibly
3120 "bar" too).
3121 A new object defines "foo" and references "bar".
3122
3123 A new object thus has no problem with its undefined symbols being
3124 satisfied by definitions in an old object. On the other hand, the
3125 old object won't have ".bar" satisfied by a new object.
3126
3127 Keep a list of newly added dot-symbols. */
3128
3129 if (string[0] == '.')
3130 {
3131 struct ppc_link_hash_table *htab;
3132
3133 htab = (struct ppc_link_hash_table *) table;
3134 eh->u.next_dot_sym = htab->dot_syms;
3135 htab->dot_syms = eh;
3136 }
65f38f15
AM
3137 }
3138
3139 return entry;
3140}
3141
2cdcc330
AM
3142struct tocsave_entry
3143{
3b421ab3
AM
3144 asection *sec;
3145 bfd_vma offset;
3146};
3147
3148static hashval_t
3149tocsave_htab_hash (const void *p)
3150{
3151 const struct tocsave_entry *e = (const struct tocsave_entry *) p;
4aef7643 3152 return ((bfd_vma) (intptr_t) e->sec ^ e->offset) >> 3;
3b421ab3
AM
3153}
3154
3155static int
3156tocsave_htab_eq (const void *p1, const void *p2)
3157{
3158 const struct tocsave_entry *e1 = (const struct tocsave_entry *) p1;
3159 const struct tocsave_entry *e2 = (const struct tocsave_entry *) p2;
3160 return e1->sec == e2->sec && e1->offset == e2->offset;
3161}
3162
68faa637
AM
3163/* Destroy a ppc64 ELF linker hash table. */
3164
3165static void
d495ab0d 3166ppc64_elf_link_hash_table_free (bfd *obfd)
68faa637 3167{
d495ab0d 3168 struct ppc_link_hash_table *htab;
68faa637 3169
d495ab0d 3170 htab = (struct ppc_link_hash_table *) obfd->link.hash;
68faa637
AM
3171 if (htab->tocsave_htab)
3172 htab_delete (htab->tocsave_htab);
d495ab0d
AM
3173 bfd_hash_table_free (&htab->branch_hash_table);
3174 bfd_hash_table_free (&htab->stub_hash_table);
3175 _bfd_elf_link_hash_table_free (obfd);
68faa637
AM
3176}
3177
65f38f15
AM
3178/* Create a ppc64 ELF linker hash table. */
3179
3180static struct bfd_link_hash_table *
4ce794b7 3181ppc64_elf_link_hash_table_create (bfd *abfd)
65f38f15
AM
3182{
3183 struct ppc_link_hash_table *htab;
3184 bfd_size_type amt = sizeof (struct ppc_link_hash_table);
3185
4ce794b7 3186 htab = bfd_zmalloc (amt);
65f38f15
AM
3187 if (htab == NULL)
3188 return NULL;
3189
66eb6687 3190 if (!_bfd_elf_link_hash_table_init (&htab->elf, abfd, link_hash_newfunc,
4dfe6ac6
NC
3191 sizeof (struct ppc_link_hash_entry),
3192 PPC64_ELF_DATA))
65f38f15 3193 {
e2d34d7d 3194 free (htab);
65f38f15
AM
3195 return NULL;
3196 }
3197
721956f4 3198 /* Init the stub hash table too. */
66eb6687
AM
3199 if (!bfd_hash_table_init (&htab->stub_hash_table, stub_hash_newfunc,
3200 sizeof (struct ppc_stub_hash_entry)))
2915c55b 3201 {
d495ab0d 3202 _bfd_elf_link_hash_table_free (abfd);
2915c55b
JK
3203 return NULL;
3204 }
721956f4
AM
3205
3206 /* And the branch hash table. */
66eb6687
AM
3207 if (!bfd_hash_table_init (&htab->branch_hash_table, branch_hash_newfunc,
3208 sizeof (struct ppc_branch_hash_entry)))
2915c55b
JK
3209 {
3210 bfd_hash_table_free (&htab->stub_hash_table);
d495ab0d 3211 _bfd_elf_link_hash_table_free (abfd);
2915c55b
JK
3212 return NULL;
3213 }
721956f4 3214
3b421ab3
AM
3215 htab->tocsave_htab = htab_try_create (1024,
3216 tocsave_htab_hash,
3217 tocsave_htab_eq,
3218 NULL);
3219 if (htab->tocsave_htab == NULL)
2915c55b 3220 {
d495ab0d 3221 ppc64_elf_link_hash_table_free (abfd);
2915c55b
JK
3222 return NULL;
3223 }
d495ab0d 3224 htab->elf.root.hash_table_free = ppc64_elf_link_hash_table_free;
3b421ab3 3225
3254fd24
AM
3226 /* Initializing two fields of the union is just cosmetic. We really
3227 only care about glist, but when compiled on a 32-bit host the
3228 bfd_vma fields are larger. Setting the bfd_vma to zero makes
3229 debugger inspection of these fields look nicer. */
a6aa5195
AM
3230 htab->elf.init_got_refcount.refcount = 0;
3231 htab->elf.init_got_refcount.glist = NULL;
3232 htab->elf.init_plt_refcount.refcount = 0;
3233 htab->elf.init_plt_refcount.glist = NULL;
3234 htab->elf.init_got_offset.offset = 0;
3235 htab->elf.init_got_offset.glist = NULL;
3236 htab->elf.init_plt_offset.offset = 0;
3237 htab->elf.init_plt_offset.glist = NULL;
3254fd24 3238
65f38f15
AM
3239 return &htab->elf.root;
3240}
3241
bfeb4a28
AM
3242/* Create sections for linker generated code. */
3243
3244static bfd_boolean
3245create_linkage_sections (bfd *dynobj, struct bfd_link_info *info)
3246{
3247 struct ppc_link_hash_table *htab;
3248 flagword flags;
3249
3250 htab = ppc_hash_table (info);
3251
bfeb4a28
AM
3252 flags = (SEC_ALLOC | SEC_LOAD | SEC_CODE | SEC_READONLY
3253 | SEC_HAS_CONTENTS | SEC_IN_MEMORY | SEC_LINKER_CREATED);
b32547cd
AM
3254 if (htab->params->save_restore_funcs)
3255 {
3256 /* Create .sfpr for code to save and restore fp regs. */
3257 htab->sfpr = bfd_make_section_anyway_with_flags (dynobj, ".sfpr",
3258 flags);
3259 if (htab->sfpr == NULL
2cdcc330 3260 || !bfd_set_section_alignment (dynobj, htab->sfpr, 2))
b32547cd
AM
3261 return FALSE;
3262 }
3263
3264 if (bfd_link_relocatable (info))
3265 return TRUE;
bfeb4a28
AM
3266
3267 /* Create .glink for lazy dynamic linking support. */
3268 htab->glink = bfd_make_section_anyway_with_flags (dynobj, ".glink",
3269 flags);
3270 if (htab->glink == NULL
2cdcc330 3271 || !bfd_set_section_alignment (dynobj, htab->glink, 3))
bfeb4a28
AM
3272 return FALSE;
3273
9e390558
AM
3274 /* The part of .glink used by global entry stubs, separate so that
3275 it can be aligned appropriately without affecting htab->glink. */
3276 htab->global_entry = bfd_make_section_anyway_with_flags (dynobj, ".glink",
3277 flags);
3278 if (htab->global_entry == NULL
2cdcc330 3279 || !bfd_set_section_alignment (dynobj, htab->global_entry, 2))
9e390558
AM
3280 return FALSE;
3281
bfeb4a28
AM
3282 if (!info->no_ld_generated_unwind_info)
3283 {
3284 flags = (SEC_ALLOC | SEC_LOAD | SEC_READONLY | SEC_HAS_CONTENTS
3285 | SEC_IN_MEMORY | SEC_LINKER_CREATED);
3286 htab->glink_eh_frame = bfd_make_section_anyway_with_flags (dynobj,
3287 ".eh_frame",
3288 flags);
3289 if (htab->glink_eh_frame == NULL
3290 || !bfd_set_section_alignment (dynobj, htab->glink_eh_frame, 2))
3291 return FALSE;
3292 }
3293
3294 flags = SEC_ALLOC | SEC_LINKER_CREATED;
33e44f2e
AM
3295 htab->elf.iplt = bfd_make_section_anyway_with_flags (dynobj, ".iplt", flags);
3296 if (htab->elf.iplt == NULL
2cdcc330 3297 || !bfd_set_section_alignment (dynobj, htab->elf.iplt, 3))
bfeb4a28
AM
3298 return FALSE;
3299
3300 flags = (SEC_ALLOC | SEC_LOAD | SEC_READONLY
3301 | SEC_HAS_CONTENTS | SEC_IN_MEMORY | SEC_LINKER_CREATED);
33e44f2e
AM
3302 htab->elf.irelplt
3303 = bfd_make_section_anyway_with_flags (dynobj, ".rela.iplt", flags);
3304 if (htab->elf.irelplt == NULL
2cdcc330 3305 || !bfd_set_section_alignment (dynobj, htab->elf.irelplt, 3))
bfeb4a28
AM
3306 return FALSE;
3307
3308 /* Create branch lookup table for plt_branch stubs. */
3309 flags = (SEC_ALLOC | SEC_LOAD
3310 | SEC_HAS_CONTENTS | SEC_IN_MEMORY | SEC_LINKER_CREATED);
3311 htab->brlt = bfd_make_section_anyway_with_flags (dynobj, ".branch_lt",
3312 flags);
3313 if (htab->brlt == NULL
2cdcc330 3314 || !bfd_set_section_alignment (dynobj, htab->brlt, 3))
bfeb4a28
AM
3315 return FALSE;
3316
2d7ad24e
AM
3317 /* Local plt entries, put in .branch_lt but a separate section for
3318 convenience. */
3319 htab->pltlocal = bfd_make_section_anyway_with_flags (dynobj, ".branch_lt",
3320 flags);
3321 if (htab->pltlocal == NULL
2cdcc330 3322 || !bfd_set_section_alignment (dynobj, htab->pltlocal, 3))
2d7ad24e
AM
3323 return FALSE;
3324
0e1862bb 3325 if (!bfd_link_pic (info))
bfeb4a28
AM
3326 return TRUE;
3327
3328 flags = (SEC_ALLOC | SEC_LOAD | SEC_READONLY
3329 | SEC_HAS_CONTENTS | SEC_IN_MEMORY | SEC_LINKER_CREATED);
2d7ad24e
AM
3330 htab->relbrlt
3331 = bfd_make_section_anyway_with_flags (dynobj, ".rela.branch_lt", flags);
bfeb4a28 3332 if (htab->relbrlt == NULL
2cdcc330 3333 || !bfd_set_section_alignment (dynobj, htab->relbrlt, 3))
bfeb4a28
AM
3334 return FALSE;
3335
2d7ad24e
AM
3336 htab->relpltlocal
3337 = bfd_make_section_anyway_with_flags (dynobj, ".rela.branch_lt", flags);
3338 if (htab->relpltlocal == NULL
2cdcc330 3339 || !bfd_set_section_alignment (dynobj, htab->relpltlocal, 3))
2d7ad24e
AM
3340 return FALSE;
3341
bfeb4a28
AM
3342 return TRUE;
3343}
3344
e717da7e
AM
3345/* Satisfy the ELF linker by filling in some fields in our fake bfd. */
3346
bfeb4a28 3347bfd_boolean
e7d1c40c
AM
3348ppc64_elf_init_stub_bfd (struct bfd_link_info *info,
3349 struct ppc64_elf_params *params)
e717da7e
AM
3350{
3351 struct ppc_link_hash_table *htab;
3352
e7d1c40c 3353 elf_elfheader (params->stub_bfd)->e_ident[EI_CLASS] = ELFCLASS64;
e717da7e
AM
3354
3355/* Always hook our dynamic sections into the first bfd, which is the
3356 linker created stub bfd. This ensures that the GOT header is at
3357 the start of the output TOC section. */
3358 htab = ppc_hash_table (info);
e7d1c40c
AM
3359 htab->elf.dynobj = params->stub_bfd;
3360 htab->params = params;
bfeb4a28 3361
bfeb4a28 3362 return create_linkage_sections (htab->elf.dynobj, info);
e717da7e
AM
3363}
3364
721956f4
AM
3365/* Build a name for an entry in the stub hash table. */
3366
3367static char *
4ce794b7
AM
3368ppc_stub_name (const asection *input_section,
3369 const asection *sym_sec,
3370 const struct ppc_link_hash_entry *h,
3371 const Elf_Internal_Rela *rel)
721956f4
AM
3372{
3373 char *stub_name;
bcaa2f82 3374 ssize_t len;
721956f4
AM
3375
3376 /* rel->r_addend is actually 64 bit, but who uses more than +/- 2^31
3377 offsets from a sym as a branch target? In fact, we could
3378 probably assume the addend is always zero. */
3379 BFD_ASSERT (((int) rel->r_addend & 0xffffffff) == rel->r_addend);
3380
3381 if (h)
3382 {
3383 len = 8 + 1 + strlen (h->elf.root.root.string) + 1 + 8 + 1;
3384 stub_name = bfd_malloc (len);
46de2a7c
AM
3385 if (stub_name == NULL)
3386 return stub_name;
3387
bcaa2f82
AM
3388 len = sprintf (stub_name, "%08x.%s+%x",
3389 input_section->id & 0xffffffff,
3390 h->elf.root.root.string,
3391 (int) rel->r_addend & 0xffffffff);
721956f4
AM
3392 }
3393 else
3394 {
ad8e1ba5 3395 len = 8 + 1 + 8 + 1 + 8 + 1 + 8 + 1;
721956f4 3396 stub_name = bfd_malloc (len);
46de2a7c
AM
3397 if (stub_name == NULL)
3398 return stub_name;
3399
bcaa2f82
AM
3400 len = sprintf (stub_name, "%08x.%x:%x+%x",
3401 input_section->id & 0xffffffff,
3402 sym_sec->id & 0xffffffff,
3403 (int) ELF64_R_SYM (rel->r_info) & 0xffffffff,
3404 (int) rel->r_addend & 0xffffffff);
721956f4 3405 }
bcaa2f82 3406 if (len > 2 && stub_name[len - 2] == '+' && stub_name[len - 1] == '0')
ee75fd95 3407 stub_name[len - 2] = 0;
721956f4
AM
3408 return stub_name;
3409}
3410
3411/* Look up an entry in the stub hash. Stub entries are cached because
3412 creating the stub name takes a bit of time. */
3413
3414static struct ppc_stub_hash_entry *
4ce794b7
AM
3415ppc_get_stub_entry (const asection *input_section,
3416 const asection *sym_sec,
039b3fef 3417 struct ppc_link_hash_entry *h,
4ce794b7
AM
3418 const Elf_Internal_Rela *rel,
3419 struct ppc_link_hash_table *htab)
721956f4
AM
3420{
3421 struct ppc_stub_hash_entry *stub_entry;
6f20ed8a 3422 struct map_stub *group;
721956f4
AM
3423
3424 /* If this input section is part of a group of sections sharing one
3425 stub section, then use the id of the first section in the group.
3426 Stub names need to include a section id, as there may well be
3427 more than one stub used to reach say, printf, and we need to
3428 distinguish between them. */
6f20ed8a 3429 group = htab->sec_info[input_section->id].u.group;
89d77b8a
AM
3430 if (group == NULL)
3431 return NULL;
721956f4 3432
b3fac117
AM
3433 if (h != NULL && h->u.stub_cache != NULL
3434 && h->u.stub_cache->h == h
6f20ed8a 3435 && h->u.stub_cache->group == group)
721956f4 3436 {
b3fac117 3437 stub_entry = h->u.stub_cache;
721956f4
AM
3438 }
3439 else
3440 {
3441 char *stub_name;
3442
6f20ed8a 3443 stub_name = ppc_stub_name (group->link_sec, sym_sec, h, rel);
721956f4
AM
3444 if (stub_name == NULL)
3445 return NULL;
3446
3447 stub_entry = ppc_stub_hash_lookup (&htab->stub_hash_table,
b34976b6 3448 stub_name, FALSE, FALSE);
721956f4 3449 if (h != NULL)
b3fac117 3450 h->u.stub_cache = stub_entry;
721956f4
AM
3451
3452 free (stub_name);
3453 }
3454
3455 return stub_entry;
3456}
3457
3458/* Add a new stub entry to the stub hash. Not all fields of the new
3459 stub entry are initialised. */
3460
3461static struct ppc_stub_hash_entry *
4ce794b7
AM
3462ppc_add_stub (const char *stub_name,
3463 asection *section,
25f53a85 3464 struct bfd_link_info *info)
721956f4 3465{
25f53a85 3466 struct ppc_link_hash_table *htab = ppc_hash_table (info);
6f20ed8a 3467 struct map_stub *group;
721956f4
AM
3468 asection *link_sec;
3469 asection *stub_sec;
3470 struct ppc_stub_hash_entry *stub_entry;
3471
6f20ed8a
AM
3472 group = htab->sec_info[section->id].u.group;
3473 link_sec = group->link_sec;
3474 stub_sec = group->stub_sec;
721956f4
AM
3475 if (stub_sec == NULL)
3476 {
6f20ed8a
AM
3477 size_t namelen;
3478 bfd_size_type len;
3479 char *s_name;
721956f4 3480
6f20ed8a
AM
3481 namelen = strlen (link_sec->name);
3482 len = namelen + sizeof (STUB_SUFFIX);
3483 s_name = bfd_alloc (htab->params->stub_bfd, len);
3484 if (s_name == NULL)
3485 return NULL;
721956f4 3486
6f20ed8a
AM
3487 memcpy (s_name, link_sec->name, namelen);
3488 memcpy (s_name + namelen, STUB_SUFFIX, sizeof (STUB_SUFFIX));
3489 stub_sec = (*htab->params->add_stub_section) (s_name, link_sec);
3490 if (stub_sec == NULL)
3491 return NULL;
3492 group->stub_sec = stub_sec;
721956f4
AM
3493 }
3494
3495 /* Enter this entry into the linker stub hash table. */
3496 stub_entry = ppc_stub_hash_lookup (&htab->stub_hash_table, stub_name,
b34976b6 3497 TRUE, FALSE);
721956f4
AM
3498 if (stub_entry == NULL)
3499 {
695344c0 3500 /* xgettext:c-format */
cf97bcb0
AM
3501 _bfd_error_handler (_("%pB: cannot create stub entry %s"),
3502 section->owner, stub_name);
721956f4
AM
3503 return NULL;
3504 }
3505
6f20ed8a 3506 stub_entry->group = group;
721956f4 3507 stub_entry->stub_offset = 0;
721956f4
AM
3508 return stub_entry;
3509}
3510
e717da7e
AM
3511/* Create .got and .rela.got sections in ABFD, and .got in dynobj if
3512 not already done. */
65f38f15 3513
b34976b6 3514static bfd_boolean
e717da7e 3515create_got_section (bfd *abfd, struct bfd_link_info *info)
65f38f15 3516{
e717da7e
AM
3517 asection *got, *relgot;
3518 flagword flags;
3519 struct ppc_link_hash_table *htab = ppc_hash_table (info);
65f38f15 3520
0c8d6e5c 3521 if (!is_ppc64_elf (abfd))
0ffa91dd 3522 return FALSE;
4dfe6ac6
NC
3523 if (htab == NULL)
3524 return FALSE;
0ffa91dd 3525
33e44f2e
AM
3526 if (!htab->elf.sgot
3527 && !_bfd_elf_create_got_section (htab->elf.dynobj, info))
3528 return FALSE;
e717da7e
AM
3529
3530 flags = (SEC_ALLOC | SEC_LOAD | SEC_HAS_CONTENTS | SEC_IN_MEMORY
3531 | SEC_LINKER_CREATED);
3532
c456f082 3533 got = bfd_make_section_anyway_with_flags (abfd, ".got", flags);
e717da7e 3534 if (!got
e717da7e
AM
3535 || !bfd_set_section_alignment (abfd, got, 3))
3536 return FALSE;
65f38f15 3537
c456f082
AM
3538 relgot = bfd_make_section_anyway_with_flags (abfd, ".rela.got",
3539 flags | SEC_READONLY);
e717da7e 3540 if (!relgot
2cdcc330 3541 || !bfd_set_section_alignment (abfd, relgot, 3))
b34976b6 3542 return FALSE;
e717da7e
AM
3543
3544 ppc64_elf_tdata (abfd)->got = got;
3545 ppc64_elf_tdata (abfd)->relgot = relgot;
b34976b6 3546 return TRUE;
65f38f15 3547}
5bd4f169 3548
b31867b6
AM
3549/* Follow indirect and warning symbol links. */
3550
3551static inline struct bfd_link_hash_entry *
3552follow_link (struct bfd_link_hash_entry *h)
3553{
3554 while (h->type == bfd_link_hash_indirect
3555 || h->type == bfd_link_hash_warning)
3556 h = h->u.i.link;
3557 return h;
3558}
3559
3560static inline struct elf_link_hash_entry *
3561elf_follow_link (struct elf_link_hash_entry *h)
3562{
3563 return (struct elf_link_hash_entry *) follow_link (&h->root);
3564}
3565
3566static inline struct ppc_link_hash_entry *
3567ppc_follow_link (struct ppc_link_hash_entry *h)
3568{
3569 return (struct ppc_link_hash_entry *) follow_link (&h->elf.root);
3570}
3571
40d16e0b
AM
3572/* Merge PLT info on FROM with that on TO. */
3573
3574static void
3575move_plt_plist (struct ppc_link_hash_entry *from,
3576 struct ppc_link_hash_entry *to)
3577{
3578 if (from->elf.plt.plist != NULL)
3579 {
3580 if (to->elf.plt.plist != NULL)
3581 {
3582 struct plt_entry **entp;
3583 struct plt_entry *ent;
3584
3585 for (entp = &from->elf.plt.plist; (ent = *entp) != NULL; )
3586 {
3587 struct plt_entry *dent;
3588
3589 for (dent = to->elf.plt.plist; dent != NULL; dent = dent->next)
3590 if (dent->addend == ent->addend)
3591 {
3592 dent->plt.refcount += ent->plt.refcount;
3593 *entp = ent->next;
3594 break;
3595 }
3596 if (dent == NULL)
3597 entp = &ent->next;
3598 }
3599 *entp = to->elf.plt.plist;
3600 }
3601
3602 to->elf.plt.plist = from->elf.plt.plist;
3603 from->elf.plt.plist = NULL;
3604 }
3605}
3606
65f38f15
AM
3607/* Copy the extra info we tack onto an elf_link_hash_entry. */
3608
3609static void
fcfa13d2
AM
3610ppc64_elf_copy_indirect_symbol (struct bfd_link_info *info,
3611 struct elf_link_hash_entry *dir,
3612 struct elf_link_hash_entry *ind)
65f38f15
AM
3613{
3614 struct ppc_link_hash_entry *edir, *eind;
3615
3616 edir = (struct ppc_link_hash_entry *) dir;
3617 eind = (struct ppc_link_hash_entry *) ind;
3618
c79d6685
AM
3619 edir->is_func |= eind->is_func;
3620 edir->is_func_descriptor |= eind->is_func_descriptor;
3621 edir->tls_mask |= eind->tls_mask;
3622 if (eind->oh != NULL)
3623 edir->oh = ppc_follow_link (eind->oh);
3624
474436e6 3625 if (edir->elf.versioned != versioned_hidden)
e81830c5
AM
3626 edir->elf.ref_dynamic |= eind->elf.ref_dynamic;
3627 edir->elf.ref_regular |= eind->elf.ref_regular;
3628 edir->elf.ref_regular_nonweak |= eind->elf.ref_regular_nonweak;
4a7e5234 3629 edir->elf.non_got_ref |= eind->elf.non_got_ref;
e81830c5
AM
3630 edir->elf.needs_plt |= eind->elf.needs_plt;
3631 edir->elf.pointer_equality_needed |= eind->elf.pointer_equality_needed;
c79d6685 3632
d311bc8b
AM
3633 /* If we were called to copy over info for a weak sym, don't copy
3634 dyn_relocs, plt/got info, or dynindx. We used to copy dyn_relocs
3635 in order to simplify readonly_dynrelocs and save a field in the
3636 symbol hash entry, but that means dyn_relocs can't be used in any
3637 tests about a specific symbol, or affect other symbol flags which
ab2477e1 3638 are then tested. */
d311bc8b 3639 if (eind->elf.root.type != bfd_link_hash_indirect)
ab2477e1 3640 return;
d311bc8b 3641
411e1bfb 3642 /* Copy over any dynamic relocs we may have on the indirect sym. */
bbd7ec4a 3643 if (eind->dyn_relocs != NULL)
65f38f15 3644 {
bbd7ec4a
AM
3645 if (edir->dyn_relocs != NULL)
3646 {
6061a67d
AM
3647 struct elf_dyn_relocs **pp;
3648 struct elf_dyn_relocs *p;
bbd7ec4a 3649
fcfa13d2 3650 /* Add reloc counts against the indirect sym to the direct sym
bbd7ec4a
AM
3651 list. Merge any entries against the same section. */
3652 for (pp = &eind->dyn_relocs; (p = *pp) != NULL; )
3653 {
6061a67d 3654 struct elf_dyn_relocs *q;
bbd7ec4a
AM
3655
3656 for (q = edir->dyn_relocs; q != NULL; q = q->next)
3657 if (q->sec == p->sec)
3658 {
3659 q->pc_count += p->pc_count;
3660 q->count += p->count;
3661 *pp = p->next;
3662 break;
3663 }
3664 if (q == NULL)
3665 pp = &p->next;
3666 }
3667 *pp = edir->dyn_relocs;
3668 }
3669
65f38f15
AM
3670 edir->dyn_relocs = eind->dyn_relocs;
3671 eind->dyn_relocs = NULL;
3672 }
65f38f15 3673
81848ca0
AM
3674 /* Copy over got entries that we may have already seen to the
3675 symbol which just became indirect. */
411e1bfb
AM
3676 if (eind->elf.got.glist != NULL)
3677 {
3678 if (edir->elf.got.glist != NULL)
3679 {
3680 struct got_entry **entp;
3681 struct got_entry *ent;
3682
3683 for (entp = &eind->elf.got.glist; (ent = *entp) != NULL; )
3684 {
3685 struct got_entry *dent;
3686
3687 for (dent = edir->elf.got.glist; dent != NULL; dent = dent->next)
3688 if (dent->addend == ent->addend
e717da7e 3689 && dent->owner == ent->owner
411e1bfb
AM
3690 && dent->tls_type == ent->tls_type)
3691 {
3692 dent->got.refcount += ent->got.refcount;
3693 *entp = ent->next;
3694 break;
3695 }
3696 if (dent == NULL)
3697 entp = &ent->next;
3698 }
3699 *entp = edir->elf.got.glist;
3700 }
3701
3702 edir->elf.got.glist = eind->elf.got.glist;
3703 eind->elf.got.glist = NULL;
3704 }
3705
3706 /* And plt entries. */
40d16e0b 3707 move_plt_plist (eind, edir);
411e1bfb 3708
fcfa13d2 3709 if (eind->elf.dynindx != -1)
411e1bfb 3710 {
fcfa13d2
AM
3711 if (edir->elf.dynindx != -1)
3712 _bfd_elf_strtab_delref (elf_hash_table (info)->dynstr,
3713 edir->elf.dynstr_index);
411e1bfb
AM
3714 edir->elf.dynindx = eind->elf.dynindx;
3715 edir->elf.dynstr_index = eind->elf.dynstr_index;
3716 eind->elf.dynindx = -1;
3717 eind->elf.dynstr_index = 0;
3718 }
411e1bfb
AM
3719}
3720
8387904d
AM
3721/* Find the function descriptor hash entry from the given function code
3722 hash entry FH. Link the entries via their OH fields. */
3723
3724static struct ppc_link_hash_entry *
b31867b6 3725lookup_fdh (struct ppc_link_hash_entry *fh, struct ppc_link_hash_table *htab)
8387904d
AM
3726{
3727 struct ppc_link_hash_entry *fdh = fh->oh;
3728
3729 if (fdh == NULL)
3730 {
3731 const char *fd_name = fh->elf.root.root.string + 1;
3732
3733 fdh = (struct ppc_link_hash_entry *)
3734 elf_link_hash_lookup (&htab->elf, fd_name, FALSE, FALSE, FALSE);
b31867b6
AM
3735 if (fdh == NULL)
3736 return fdh;
3737
3738 fdh->is_func_descriptor = 1;
3739 fdh->oh = fh;
3740 fh->is_func = 1;
3741 fh->oh = fdh;
8387904d
AM
3742 }
3743
8c5b4e52
AM
3744 fdh = ppc_follow_link (fdh);
3745 fdh->is_func_descriptor = 1;
3746 fdh->oh = fh;
3747 return fdh;
8387904d
AM
3748}
3749
8c5b4e52 3750/* Make a fake function descriptor sym for the undefined code sym FH. */
bb700d78
AM
3751
3752static struct ppc_link_hash_entry *
3753make_fdh (struct bfd_link_info *info,
908b32fc 3754 struct ppc_link_hash_entry *fh)
bb700d78 3755{
8c5b4e52
AM
3756 bfd *abfd = fh->elf.root.u.undef.abfd;
3757 struct bfd_link_hash_entry *bh = NULL;
bb700d78 3758 struct ppc_link_hash_entry *fdh;
8c5b4e52
AM
3759 flagword flags = (fh->elf.root.type == bfd_link_hash_undefweak
3760 ? BSF_WEAK
3761 : BSF_GLOBAL);
3762
3763 if (!_bfd_generic_link_add_one_symbol (info, abfd,
3764 fh->elf.root.root.string + 1,
3765 flags, bfd_und_section_ptr, 0,
3766 NULL, FALSE, FALSE, &bh))
bb700d78
AM
3767 return NULL;
3768
3769 fdh = (struct ppc_link_hash_entry *) bh;
3770 fdh->elf.non_elf = 0;
908b32fc
AM
3771 fdh->fake = 1;
3772 fdh->is_func_descriptor = 1;
3773 fdh->oh = fh;
3774 fh->is_func = 1;
3775 fh->oh = fdh;
bb700d78
AM
3776 return fdh;
3777}
3778
8387904d
AM
3779/* Fix function descriptor symbols defined in .opd sections to be
3780 function type. */
555cd476
AM
3781
3782static bfd_boolean
c16153ae 3783ppc64_elf_add_symbol_hook (bfd *ibfd,
e054468f 3784 struct bfd_link_info *info,
555cd476 3785 Elf_Internal_Sym *isym,
6911b7dc 3786 const char **name,
555cd476
AM
3787 flagword *flags ATTRIBUTE_UNUSED,
3788 asection **sec,
b53dfeb2 3789 bfd_vma *value)
555cd476 3790{
b53dfeb2 3791 if (*sec != NULL
f1885d1e 3792 && strcmp ((*sec)->name, ".opd") == 0)
b53dfeb2
AM
3793 {
3794 asection *code_sec;
3795
3796 if (!(ELF_ST_TYPE (isym->st_info) == STT_GNU_IFUNC
3797 || ELF_ST_TYPE (isym->st_info) == STT_FUNC))
3798 isym->st_info = ELF_ST_INFO (ELF_ST_BIND (isym->st_info), STT_FUNC);
3799
3800 /* If the symbol is a function defined in .opd, and the function
3801 code is in a discarded group, let it appear to be undefined. */
0e1862bb 3802 if (!bfd_link_relocatable (info)
b53dfeb2
AM
3803 && (*sec)->reloc_count != 0
3804 && opd_entry_value (*sec, *value, &code_sec, NULL,
3805 FALSE) != (bfd_vma) -1
3806 && discarded_section (code_sec))
3807 {
3808 *sec = bfd_und_section_ptr;
3809 isym->st_shndx = SHN_UNDEF;
3810 }
3811 }
dbd1e97e
AM
3812 else if (*sec != NULL
3813 && strcmp ((*sec)->name, ".toc") == 0
3814 && ELF_ST_TYPE (isym->st_info) == STT_OBJECT)
3815 {
3816 struct ppc_link_hash_table *htab = ppc_hash_table (info);
3817 if (htab != NULL)
3818 htab->params->object_in_toc = 1;
3819 }
433817dd 3820
6911b7dc
AM
3821 if ((STO_PPC64_LOCAL_MASK & isym->st_other) != 0)
3822 {
3823 if (abiversion (ibfd) == 0)
3824 set_abiversion (ibfd, 2);
3825 else if (abiversion (ibfd) == 1)
3826 {
cf97bcb0
AM
3827 _bfd_error_handler (_("symbol '%s' has invalid st_other"
3828 " for ABI version 1"), *name);
6911b7dc
AM
3829 bfd_set_error (bfd_error_bad_value);
3830 return FALSE;
3831 }
3832 }
3833
555cd476
AM
3834 return TRUE;
3835}
3836
6911b7dc
AM
3837/* Merge non-visibility st_other attributes: local entry point. */
3838
3839static void
3840ppc64_elf_merge_symbol_attribute (struct elf_link_hash_entry *h,
3841 const Elf_Internal_Sym *isym,
3842 bfd_boolean definition,
3843 bfd_boolean dynamic)
3844{
f378ab09 3845 if (definition && (!dynamic || !h->def_regular))
6911b7dc
AM
3846 h->other = ((isym->st_other & ~ELF_ST_VISIBILITY (-1))
3847 | ELF_ST_VISIBILITY (h->other));
3848}
3849
8c5b4e52
AM
3850/* Hook called on merging a symbol. We use this to clear "fake" since
3851 we now have a real symbol. */
3852
3853static bfd_boolean
3854ppc64_elf_merge_symbol (struct elf_link_hash_entry *h,
8b5f1ed8 3855 const Elf_Internal_Sym *isym,
8c5b4e52
AM
3856 asection **psec ATTRIBUTE_UNUSED,
3857 bfd_boolean newdef ATTRIBUTE_UNUSED,
3858 bfd_boolean olddef ATTRIBUTE_UNUSED,
3859 bfd *oldbfd ATTRIBUTE_UNUSED,
3860 const asection *oldsec ATTRIBUTE_UNUSED)
3861{
3862 ((struct ppc_link_hash_entry *) h)->fake = 0;
8b5f1ed8
AM
3863 if ((STO_PPC64_LOCAL_MASK & isym->st_other) != 0)
3864 ((struct ppc_link_hash_entry *) h)->non_zero_localentry = 1;
8c5b4e52
AM
3865 return TRUE;
3866}
3867
8387904d 3868/* This function makes an old ABI object reference to ".bar" cause the
908b32fc
AM
3869 inclusion of a new ABI object archive that defines "bar".
3870 NAME is a symbol defined in an archive. Return a symbol in the hash
3871 table that might be satisfied by the archive symbols. */
8387904d
AM
3872
3873static struct elf_link_hash_entry *
3874ppc64_elf_archive_symbol_lookup (bfd *abfd,
3875 struct bfd_link_info *info,
3876 const char *name)
3877{
3878 struct elf_link_hash_entry *h;
3879 char *dot_name;
3880 size_t len;
3881
3882 h = _bfd_elf_archive_symbol_lookup (abfd, info, name);
908b32fc
AM
3883 if (h != NULL
3884 /* Don't return this sym if it is a fake function descriptor
3885 created by add_symbol_adjust. */
8c5b4e52 3886 && !((struct ppc_link_hash_entry *) h)->fake)
8387904d
AM
3887 return h;
3888
3889 if (name[0] == '.')
3890 return h;
3891
3892 len = strlen (name);
3893 dot_name = bfd_alloc (abfd, len + 2);
3894 if (dot_name == NULL)
e99955cd 3895 return (struct elf_link_hash_entry *) -1;
8387904d
AM
3896 dot_name[0] = '.';
3897 memcpy (dot_name + 1, name, len + 1);
3898 h = _bfd_elf_archive_symbol_lookup (abfd, info, dot_name);
3899 bfd_release (abfd, dot_name);
3900 return h;
3901}
3902
3903/* This function satisfies all old ABI object references to ".bar" if a
99877b66
AM
3904 new ABI object defines "bar". Well, at least, undefined dot symbols
3905 are made weak. This stops later archive searches from including an
3906 object if we already have a function descriptor definition. It also
35b0ce59
AM
3907 prevents the linker complaining about undefined symbols.
3908 We also check and correct mismatched symbol visibility here. The
3909 most restrictive visibility of the function descriptor and the
3910 function entry symbol is used. */
8387904d
AM
3911
3912static bfd_boolean
b3fac117 3913add_symbol_adjust (struct ppc_link_hash_entry *eh, struct bfd_link_info *info)
8387904d 3914{
8387904d
AM
3915 struct ppc_link_hash_table *htab;
3916 struct ppc_link_hash_entry *fdh;
3917
b3fac117
AM
3918 if (eh->elf.root.type == bfd_link_hash_warning)
3919 eh = (struct ppc_link_hash_entry *) eh->elf.root.u.i.link;
8387904d 3920
8400d40d
AM
3921 if (eh->elf.root.type == bfd_link_hash_indirect)
3922 return TRUE;
3923
b3fac117
AM
3924 if (eh->elf.root.root.string[0] != '.')
3925 abort ();
8387904d 3926
b3fac117 3927 htab = ppc_hash_table (info);
4dfe6ac6
NC
3928 if (htab == NULL)
3929 return FALSE;
3930
b31867b6 3931 fdh = lookup_fdh (eh, htab);
8c5b4e52
AM
3932 if (fdh == NULL
3933 && !bfd_link_relocatable (info)
3934 && (eh->elf.root.type == bfd_link_hash_undefined
3935 || eh->elf.root.type == bfd_link_hash_undefweak)
3936 && eh->elf.ref_regular)
3937 {
3938 /* Make an undefined function descriptor sym, in order to
3939 pull in an --as-needed shared lib. Archives are handled
3940 elsewhere. */
3941 fdh = make_fdh (info, eh);
3942 if (fdh == NULL)
3943 return FALSE;
bb700d78 3944 }
8c5b4e52
AM
3945
3946 if (fdh != NULL)
8387904d 3947 {
35b0ce59
AM
3948 unsigned entry_vis = ELF_ST_VISIBILITY (eh->elf.other) - 1;
3949 unsigned descr_vis = ELF_ST_VISIBILITY (fdh->elf.other) - 1;
8c5b4e52
AM
3950
3951 /* Make both descriptor and entry symbol have the most
3952 constraining visibility of either symbol. */
35b0ce59
AM
3953 if (entry_vis < descr_vis)
3954 fdh->elf.other += entry_vis - descr_vis;
3955 else if (entry_vis > descr_vis)
3956 eh->elf.other += descr_vis - entry_vis;
3957
8c5b4e52
AM
3958 /* Propagate reference flags from entry symbol to function
3959 descriptor symbol. */
bc4e12de 3960 fdh->elf.root.non_ir_ref_regular |= eh->elf.root.non_ir_ref_regular;
4070765b 3961 fdh->elf.root.non_ir_ref_dynamic |= eh->elf.root.non_ir_ref_dynamic;
8c5b4e52
AM
3962 fdh->elf.ref_regular |= eh->elf.ref_regular;
3963 fdh->elf.ref_regular_nonweak |= eh->elf.ref_regular_nonweak;
3964
3965 if (!fdh->elf.forced_local
3966 && fdh->elf.dynindx == -1
3967 && fdh->elf.versioned != versioned_hidden
3968 && (bfd_link_dll (info)
3969 || fdh->elf.def_dynamic
3970 || fdh->elf.ref_dynamic)
3971 && (eh->elf.ref_regular
3972 || eh->elf.def_regular))
3973 {
2cdcc330 3974 if (!bfd_elf_link_record_dynamic_symbol (info, &fdh->elf))
8c5b4e52 3975 return FALSE;
35b0ce59 3976 }
8387904d 3977 }
99877b66 3978
8387904d
AM
3979 return TRUE;
3980}
3981
f6c7c3e8
AM
3982/* Set up opd section info and abiversion for IBFD, and process list
3983 of dot-symbols we made in link_hash_newfunc. */
b3fac117 3984
8387904d 3985static bfd_boolean
f6c7c3e8 3986ppc64_elf_before_check_relocs (bfd *ibfd, struct bfd_link_info *info)
8387904d 3987{
99877b66 3988 struct ppc_link_hash_table *htab;
b3fac117 3989 struct ppc_link_hash_entry **p, *eh;
459609d6 3990 asection *opd = bfd_get_section_by_name (ibfd, ".opd");
433817dd 3991
459609d6 3992 if (opd != NULL && opd->size != 0)
b3fac117 3993 {
b9399fcf
AM
3994 BFD_ASSERT (ppc64_elf_section_data (opd)->sec_type == sec_normal);
3995 ppc64_elf_section_data (opd)->sec_type = sec_opd;
3996
459609d6
AM
3997 if (abiversion (ibfd) == 0)
3998 set_abiversion (ibfd, 1);
8a2058b5 3999 else if (abiversion (ibfd) >= 2)
f6c7c3e8 4000 {
695344c0 4001 /* xgettext:c-format */
cf97bcb0
AM
4002 _bfd_error_handler (_("%pB .opd not allowed in ABI version %d"),
4003 ibfd, abiversion (ibfd));
459609d6
AM
4004 bfd_set_error (bfd_error_bad_value);
4005 return FALSE;
f6c7c3e8 4006 }
b9399fcf 4007 }
f6c7c3e8 4008
b9399fcf
AM
4009 if (is_ppc64_elf (info->output_bfd))
4010 {
4011 /* For input files without an explicit abiversion in e_flags
4012 we should have flagged any with symbol st_other bits set
4013 as ELFv1 and above flagged those with .opd as ELFv2.
4014 Set the output abiversion if not yet set, and for any input
4015 still ambiguous, take its abiversion from the output.
4016 Differences in ABI are reported later. */
4017 if (abiversion (info->output_bfd) == 0)
4018 set_abiversion (info->output_bfd, abiversion (ibfd));
4019 else if (abiversion (ibfd) == 0)
4020 set_abiversion (ibfd, abiversion (info->output_bfd));
b3fac117
AM
4021 }
4022
459609d6
AM
4023 htab = ppc_hash_table (info);
4024 if (htab == NULL)
b9399fcf 4025 return TRUE;
459609d6 4026
b9399fcf
AM
4027 if (opd != NULL && opd->size != 0
4028 && (ibfd->flags & DYNAMIC) == 0
4029 && (opd->flags & SEC_RELOC) != 0
4030 && opd->reloc_count != 0
4031 && !bfd_is_abs_section (opd->output_section)
4032 && info->gc_sections)
4033 {
4034 /* Garbage collection needs some extra help with .opd sections.
4035 We don't want to necessarily keep everything referenced by
4036 relocs in .opd, as that would keep all functions. Instead,
4037 if we reference an .opd symbol (a function descriptor), we
4038 want to keep the function code symbol's section. This is
4039 easy for global symbols, but for local syms we need to keep
4040 information about the associated function section. */
4041 bfd_size_type amt;
4042 asection **opd_sym_map;
4043 Elf_Internal_Shdr *symtab_hdr;
4044 Elf_Internal_Rela *relocs, *rel_end, *rel;
4045
4046 amt = OPD_NDX (opd->size) * sizeof (*opd_sym_map);
4047 opd_sym_map = bfd_zalloc (ibfd, amt);
4048 if (opd_sym_map == NULL)
4049 return FALSE;
4050 ppc64_elf_section_data (opd)->u.opd.func_sec = opd_sym_map;
4051 relocs = _bfd_elf_link_read_relocs (ibfd, opd, NULL, NULL,
4052 info->keep_memory);
4053 if (relocs == NULL)
4054 return FALSE;
4055 symtab_hdr = &elf_symtab_hdr (ibfd);
4056 rel_end = relocs + opd->reloc_count - 1;
4057 for (rel = relocs; rel < rel_end; rel++)
4058 {
4059 enum elf_ppc64_reloc_type r_type = ELF64_R_TYPE (rel->r_info);
4060 unsigned long r_symndx = ELF64_R_SYM (rel->r_info);
4061
4062 if (r_type == R_PPC64_ADDR64
4063 && ELF64_R_TYPE ((rel + 1)->r_info) == R_PPC64_TOC
4064 && r_symndx < symtab_hdr->sh_info)
4065 {
4066 Elf_Internal_Sym *isym;
4067 asection *s;
4068
4069 isym = bfd_sym_from_r_symndx (&htab->sym_cache, ibfd, r_symndx);
4070 if (isym == NULL)
4071 {
4072 if (elf_section_data (opd)->relocs != relocs)
4073 free (relocs);
4074 return FALSE;
4075 }
4076
4077 s = bfd_section_from_elf_index (ibfd, isym->st_shndx);
4078 if (s != NULL && s != opd)
4079 opd_sym_map[OPD_NDX (rel->r_offset)] = s;
4080 }
4081 }
4082 if (elf_section_data (opd)->relocs != relocs)
4083 free (relocs);
4084 }
459609d6
AM
4085
4086 p = &htab->dot_syms;
4087 while ((eh = *p) != NULL)
4088 {
4089 *p = NULL;
4090 if (&eh->elf == htab->elf.hgot)
4091 ;
4092 else if (htab->elf.hgot == NULL
4093 && strcmp (eh->elf.root.root.string, ".TOC.") == 0)
4094 htab->elf.hgot = &eh->elf;
8c5b4e52
AM
4095 else if (abiversion (ibfd) <= 1)
4096 {
4097 htab->need_func_desc_adj = 1;
4098 if (!add_symbol_adjust (eh, info))
4099 return FALSE;
4100 }
459609d6
AM
4101 p = &eh->u.next_dot_sym;
4102 }
b3fac117 4103 return TRUE;
8387904d
AM
4104}
4105
97fed1c9
JJ
4106/* Undo hash table changes when an --as-needed input file is determined
4107 not to be needed. */
4108
4109static bfd_boolean
e5034e59
AM
4110ppc64_elf_notice_as_needed (bfd *ibfd,
4111 struct bfd_link_info *info,
4112 enum notice_asneeded_action act)
97fed1c9 4113{
e5034e59
AM
4114 if (act == notice_not_needed)
4115 {
4116 struct ppc_link_hash_table *htab = ppc_hash_table (info);
4dfe6ac6 4117
e5034e59
AM
4118 if (htab == NULL)
4119 return FALSE;
4dfe6ac6 4120
e5034e59
AM
4121 htab->dot_syms = NULL;
4122 }
4123 return _bfd_elf_notice_as_needed (ibfd, info, act);
97fed1c9
JJ
4124}
4125
aa374f67
AM
4126/* If --just-symbols against a final linked binary, then assume we need
4127 toc adjusting stubs when calling functions defined there. */
4128
4129static void
4130ppc64_elf_link_just_syms (asection *sec, struct bfd_link_info *info)
4131{
4132 if ((sec->flags & SEC_CODE) != 0
4133 && (sec->owner->flags & (EXEC_P | DYNAMIC)) != 0
4134 && is_ppc64_elf (sec->owner))
4135 {
2c3f079f
AM
4136 if (abiversion (sec->owner) >= 2
4137 || bfd_get_section_by_name (sec->owner, ".opd") != NULL)
aa374f67
AM
4138 sec->has_toc_reloc = 1;
4139 }
4140 _bfd_elf_link_just_syms (sec, info);
4141}
4142
e054468f 4143static struct plt_entry **
4ce794b7
AM
4144update_local_sym_info (bfd *abfd, Elf_Internal_Shdr *symtab_hdr,
4145 unsigned long r_symndx, bfd_vma r_addend, int tls_type)
411e1bfb
AM
4146{
4147 struct got_entry **local_got_ents = elf_local_got_ents (abfd);
e054468f 4148 struct plt_entry **local_plt;
f961d9dd 4149 unsigned char *local_got_tls_masks;
411e1bfb
AM
4150
4151 if (local_got_ents == NULL)
4152 {
4153 bfd_size_type size = symtab_hdr->sh_info;
4154
e054468f
AM
4155 size *= (sizeof (*local_got_ents)
4156 + sizeof (*local_plt)
4157 + sizeof (*local_got_tls_masks));
4ce794b7 4158 local_got_ents = bfd_zalloc (abfd, size);
411e1bfb 4159 if (local_got_ents == NULL)
e054468f 4160 return NULL;
411e1bfb
AM
4161 elf_local_got_ents (abfd) = local_got_ents;
4162 }
4163
37da22e5 4164 if ((tls_type & (NON_GOT | TLS_EXPLICIT)) == 0)
411e1bfb
AM
4165 {
4166 struct got_entry *ent;
4167
4168 for (ent = local_got_ents[r_symndx]; ent != NULL; ent = ent->next)
e717da7e
AM
4169 if (ent->addend == r_addend
4170 && ent->owner == abfd
4171 && ent->tls_type == tls_type)
411e1bfb
AM
4172 break;
4173 if (ent == NULL)
4174 {
4175 bfd_size_type amt = sizeof (*ent);
4ce794b7 4176 ent = bfd_alloc (abfd, amt);
411e1bfb
AM
4177 if (ent == NULL)
4178 return FALSE;
4179 ent->next = local_got_ents[r_symndx];
4180 ent->addend = r_addend;
e717da7e 4181 ent->owner = abfd;
411e1bfb 4182 ent->tls_type = tls_type;
927be08e 4183 ent->is_indirect = FALSE;
411e1bfb
AM
4184 ent->got.refcount = 0;
4185 local_got_ents[r_symndx] = ent;
4186 }
4187 ent->got.refcount += 1;
4188 }
4189
e054468f 4190 local_plt = (struct plt_entry **) (local_got_ents + symtab_hdr->sh_info);
f961d9dd 4191 local_got_tls_masks = (unsigned char *) (local_plt + symtab_hdr->sh_info);
37da22e5 4192 local_got_tls_masks[r_symndx] |= tls_type & 0xff;
e054468f
AM
4193
4194 return local_plt + r_symndx;
65f38f15
AM
4195}
4196
411e1bfb 4197static bfd_boolean
e054468f 4198update_plt_info (bfd *abfd, struct plt_entry **plist, bfd_vma addend)
1e2f5b6e 4199{
411e1bfb 4200 struct plt_entry *ent;
1e2f5b6e 4201
e054468f 4202 for (ent = *plist; ent != NULL; ent = ent->next)
411e1bfb
AM
4203 if (ent->addend == addend)
4204 break;
4205 if (ent == NULL)
1e2f5b6e 4206 {
411e1bfb 4207 bfd_size_type amt = sizeof (*ent);
4ce794b7 4208 ent = bfd_alloc (abfd, amt);
411e1bfb
AM
4209 if (ent == NULL)
4210 return FALSE;
e054468f 4211 ent->next = *plist;
411e1bfb
AM
4212 ent->addend = addend;
4213 ent->plt.refcount = 0;
e054468f 4214 *plist = ent;
1e2f5b6e 4215 }
411e1bfb 4216 ent->plt.refcount += 1;
b34976b6 4217 return TRUE;
1e2f5b6e
AM
4218}
4219
e054468f
AM
4220static bfd_boolean
4221is_branch_reloc (enum elf_ppc64_reloc_type r_type)
4222{
4223 return (r_type == R_PPC64_REL24
05d0e962 4224 || r_type == R_PPC64_REL24_NOTOC
e054468f
AM
4225 || r_type == R_PPC64_REL14
4226 || r_type == R_PPC64_REL14_BRTAKEN
4227 || r_type == R_PPC64_REL14_BRNTAKEN
4228 || r_type == R_PPC64_ADDR24
4229 || r_type == R_PPC64_ADDR14
4230 || r_type == R_PPC64_ADDR14_BRTAKEN
23cedd1d
AM
4231 || r_type == R_PPC64_ADDR14_BRNTAKEN
4232 || r_type == R_PPC64_PLTCALL);
4233}
4234
4235/* Relocs on inline plt call sequence insns prior to the call. */
4236
4237static bfd_boolean
4238is_plt_seq_reloc (enum elf_ppc64_reloc_type r_type)
4239{
4240 return (r_type == R_PPC64_PLT16_HA
4241 || r_type == R_PPC64_PLT16_HI
4242 || r_type == R_PPC64_PLT16_LO
4243 || r_type == R_PPC64_PLT16_LO_DS
4244 || r_type == R_PPC64_PLTSEQ);
e054468f
AM
4245}
4246
5bd4f169 4247/* Look through the relocs for a section during the first phase, and
65f38f15 4248 calculate needed space in the global offset table, procedure
5d1634d7 4249 linkage table, and dynamic reloc sections. */
5bd4f169 4250
b34976b6 4251static bfd_boolean
4ce794b7
AM
4252ppc64_elf_check_relocs (bfd *abfd, struct bfd_link_info *info,
4253 asection *sec, const Elf_Internal_Rela *relocs)
5bd4f169 4254{
65f38f15 4255 struct ppc_link_hash_table *htab;
5bd4f169 4256 Elf_Internal_Shdr *symtab_hdr;
c7e2358a 4257 struct elf_link_hash_entry **sym_hashes;
5bd4f169
AM
4258 const Elf_Internal_Rela *rel;
4259 const Elf_Internal_Rela *rel_end;
5bd4f169 4260 asection *sreloc;
3a71aa26 4261 struct elf_link_hash_entry *tga, *dottga;
b9399fcf 4262 bfd_boolean is_opd;
5bd4f169 4263
0e1862bb 4264 if (bfd_link_relocatable (info))
b34976b6 4265 return TRUE;
5bd4f169 4266
680a3378
AM
4267 /* Don't do anything special with non-loaded, non-alloced sections.
4268 In particular, any relocs in such sections should not affect GOT
4269 and PLT reference counting (ie. we don't allow them to create GOT
4270 or PLT entries), there's no possibility or desire to optimize TLS
4271 relocs, and there's not much point in propagating relocs to shared
4272 libs that the dynamic linker won't relocate. */
4273 if ((sec->flags & SEC_ALLOC) == 0)
4274 return TRUE;
4275
0c8d6e5c 4276 BFD_ASSERT (is_ppc64_elf (abfd));
0ffa91dd 4277
65f38f15 4278 htab = ppc_hash_table (info);
4dfe6ac6
NC
4279 if (htab == NULL)
4280 return FALSE;
4281
3a71aa26
AM
4282 tga = elf_link_hash_lookup (&htab->elf, "__tls_get_addr",
4283 FALSE, FALSE, TRUE);
4284 dottga = elf_link_hash_lookup (&htab->elf, ".__tls_get_addr",
4285 FALSE, FALSE, TRUE);
0ffa91dd 4286 symtab_hdr = &elf_symtab_hdr (abfd);
5bd4f169 4287 sym_hashes = elf_sym_hashes (abfd);
5bd4f169 4288 sreloc = NULL;
b9399fcf 4289 is_opd = ppc64_elf_section_data (sec)->sec_type == sec_opd;
5bd4f169
AM
4290 rel_end = relocs + sec->reloc_count;
4291 for (rel = relocs; rel < rel_end; rel++)
4292 {
4293 unsigned long r_symndx;
4294 struct elf_link_hash_entry *h;
04c9666a 4295 enum elf_ppc64_reloc_type r_type;
727fc41e 4296 int tls_type;
7c8fe5c4 4297 struct _ppc64_elf_section_data *ppc64_sec;
cbf95972 4298 struct plt_entry **ifunc, **plt_list;
5bd4f169
AM
4299
4300 r_symndx = ELF64_R_SYM (rel->r_info);
4301 if (r_symndx < symtab_hdr->sh_info)
4302 h = NULL;
4303 else
973a3492
L
4304 {
4305 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
b31867b6 4306 h = elf_follow_link (h);
1c865ab2
AM
4307
4308 if (h == htab->elf.hgot)
4309 sec->has_toc_reloc = 1;
973a3492 4310 }
5bd4f169 4311
727fc41e 4312 tls_type = 0;
e054468f 4313 ifunc = NULL;
25f23106
AM
4314 if (h != NULL)
4315 {
4316 if (h->type == STT_GNU_IFUNC)
4317 {
4318 h->needs_plt = 1;
4319 ifunc = &h->plt.plist;
4320 }
4321 }
4322 else
4323 {
4324 Elf_Internal_Sym *isym = bfd_sym_from_r_symndx (&htab->sym_cache,
4325 abfd, r_symndx);
4326 if (isym == NULL)
4327 return FALSE;
4328
4329 if (ELF_ST_TYPE (isym->st_info) == STT_GNU_IFUNC)
4330 {
4331 ifunc = update_local_sym_info (abfd, symtab_hdr, r_symndx,
37da22e5
AM
4332 rel->r_addend,
4333 NON_GOT | PLT_IFUNC);
25f23106
AM
4334 if (ifunc == NULL)
4335 return FALSE;
4336 }
4337 }
727fc41e 4338
cbf95972 4339 r_type = ELF64_R_TYPE (rel->r_info);
a33d1f77 4340 switch (r_type)
5bd4f169 4341 {
727fc41e
AM
4342 case R_PPC64_TLSGD:
4343 case R_PPC64_TLSLD:
4344 /* These special tls relocs tie a call to __tls_get_addr with
4345 its parameter symbol. */
37da22e5
AM
4346 if (h != NULL)
4347 ((struct ppc_link_hash_entry *) h)->tls_mask |= TLS_TLS | TLS_MARK;
4348 else
4349 if (!update_local_sym_info (abfd, symtab_hdr, r_symndx,
4350 rel->r_addend,
4351 NON_GOT | TLS_TLS | TLS_MARK))
4352 return FALSE;
4353 sec->has_tls_reloc = 1;
727fc41e
AM
4354 break;
4355
411e1bfb
AM
4356 case R_PPC64_GOT_TLSLD16:
4357 case R_PPC64_GOT_TLSLD16_LO:
4358 case R_PPC64_GOT_TLSLD16_HI:
4359 case R_PPC64_GOT_TLSLD16_HA:
951fd09b 4360 tls_type = TLS_TLS | TLS_LD;
411e1bfb
AM
4361 goto dogottls;
4362
4363 case R_PPC64_GOT_TLSGD16:
4364 case R_PPC64_GOT_TLSGD16_LO:
4365 case R_PPC64_GOT_TLSGD16_HI:
4366 case R_PPC64_GOT_TLSGD16_HA:
951fd09b 4367 tls_type = TLS_TLS | TLS_GD;
411e1bfb
AM
4368 goto dogottls;
4369
4370 case R_PPC64_GOT_TPREL16_DS:
4371 case R_PPC64_GOT_TPREL16_LO_DS:
4372 case R_PPC64_GOT_TPREL16_HI:
4373 case R_PPC64_GOT_TPREL16_HA:
7c8bbca5 4374 if (bfd_link_dll (info))
411e1bfb
AM
4375 info->flags |= DF_STATIC_TLS;
4376 tls_type = TLS_TLS | TLS_TPREL;
4377 goto dogottls;
4378
4379 case R_PPC64_GOT_DTPREL16_DS:
4380 case R_PPC64_GOT_DTPREL16_LO_DS:
4381 case R_PPC64_GOT_DTPREL16_HI:
4382 case R_PPC64_GOT_DTPREL16_HA:
4383 tls_type = TLS_TLS | TLS_DTPREL;
4384 dogottls:
4385 sec->has_tls_reloc = 1;
1a0670f3 4386 /* Fall through */
411e1bfb 4387
5bd4f169 4388 case R_PPC64_GOT16:
5bd4f169 4389 case R_PPC64_GOT16_DS:
65f38f15
AM
4390 case R_PPC64_GOT16_HA:
4391 case R_PPC64_GOT16_HI:
4392 case R_PPC64_GOT16_LO:
5bd4f169 4393 case R_PPC64_GOT16_LO_DS:
65f38f15 4394 /* This symbol requires a global offset table entry. */
4c52953f 4395 sec->has_toc_reloc = 1;
33c0ec9d
AM
4396 if (r_type == R_PPC64_GOT_TLSLD16
4397 || r_type == R_PPC64_GOT_TLSGD16
4398 || r_type == R_PPC64_GOT_TPREL16_DS
4399 || r_type == R_PPC64_GOT_DTPREL16_DS
4400 || r_type == R_PPC64_GOT16
4401 || r_type == R_PPC64_GOT16_DS)
4402 {
4403 htab->do_multi_toc = 1;
d77c8a4b 4404 ppc64_elf_tdata (abfd)->has_small_toc_reloc = 1;
33c0ec9d
AM
4405 }
4406
e717da7e
AM
4407 if (ppc64_elf_tdata (abfd)->got == NULL
4408 && !create_got_section (abfd, info))
b34976b6 4409 return FALSE;
5bd4f169
AM
4410
4411 if (h != NULL)
4412 {
411e1bfb
AM
4413 struct ppc_link_hash_entry *eh;
4414 struct got_entry *ent;
65f38f15 4415
411e1bfb
AM
4416 eh = (struct ppc_link_hash_entry *) h;
4417 for (ent = eh->elf.got.glist; ent != NULL; ent = ent->next)
4418 if (ent->addend == rel->r_addend
e717da7e 4419 && ent->owner == abfd
411e1bfb
AM
4420 && ent->tls_type == tls_type)
4421 break;
4422 if (ent == NULL)
5bd4f169 4423 {
411e1bfb 4424 bfd_size_type amt = sizeof (*ent);
4ce794b7 4425 ent = bfd_alloc (abfd, amt);
411e1bfb 4426 if (ent == NULL)
b34976b6 4427 return FALSE;
411e1bfb
AM
4428 ent->next = eh->elf.got.glist;
4429 ent->addend = rel->r_addend;
e717da7e 4430 ent->owner = abfd;
411e1bfb 4431 ent->tls_type = tls_type;
927be08e 4432 ent->is_indirect = FALSE;
411e1bfb
AM
4433 ent->got.refcount = 0;
4434 eh->elf.got.glist = ent;
5bd4f169 4435 }
411e1bfb 4436 ent->got.refcount += 1;
e7b938ca 4437 eh->tls_mask |= tls_type;
5bd4f169 4438 }
411e1bfb
AM
4439 else
4440 /* This is a global offset table entry for a local symbol. */
4441 if (!update_local_sym_info (abfd, symtab_hdr, r_symndx,
4442 rel->r_addend, tls_type))
4443 return FALSE;
a345bc8d
AM
4444
4445 /* We may also need a plt entry if the symbol turns out to be
4446 an ifunc. */
0e1862bb 4447 if (h != NULL && !bfd_link_pic (info) && abiversion (abfd) != 1)
a345bc8d
AM
4448 {
4449 if (!update_plt_info (abfd, &h->plt.plist, rel->r_addend))
4450 return FALSE;
4451 }
5bd4f169
AM
4452 break;
4453
5bd4f169 4454 case R_PPC64_PLT16_HA:
65f38f15
AM
4455 case R_PPC64_PLT16_HI:
4456 case R_PPC64_PLT16_LO:
08be3224 4457 case R_PPC64_PLT16_LO_DS:
65f38f15
AM
4458 case R_PPC64_PLT32:
4459 case R_PPC64_PLT64:
cbf95972
AM
4460 /* This symbol requires a procedure linkage table entry. */
4461 plt_list = ifunc;
4462 if (h != NULL)
e054468f 4463 {
e054468f
AM
4464 h->needs_plt = 1;
4465 if (h->root.root.string[0] == '.'
4466 && h->root.root.string[1] != '\0')
4467 ((struct ppc_link_hash_entry *) h)->is_func = 1;
2d7ad24e 4468 ((struct ppc_link_hash_entry *) h)->tls_mask |= PLT_KEEP;
cbf95972
AM
4469 plt_list = &h->plt.plist;
4470 }
4471 if (plt_list == NULL)
2d7ad24e
AM
4472 plt_list = update_local_sym_info (abfd, symtab_hdr, r_symndx,
4473 rel->r_addend,
4474 NON_GOT | PLT_KEEP);
cbf95972
AM
4475 if (!update_plt_info (abfd, plt_list, rel->r_addend))
4476 return FALSE;
5bd4f169
AM
4477 break;
4478
4479 /* The following relocations don't need to propagate the
4480 relocation if linking a shared object since they are
4481 section relative. */
4482 case R_PPC64_SECTOFF:
4483 case R_PPC64_SECTOFF_LO:
4484 case R_PPC64_SECTOFF_HI:
4485 case R_PPC64_SECTOFF_HA:
4486 case R_PPC64_SECTOFF_DS:
4487 case R_PPC64_SECTOFF_LO_DS:
411e1bfb
AM
4488 case R_PPC64_DTPREL16:
4489 case R_PPC64_DTPREL16_LO:
4490 case R_PPC64_DTPREL16_HI:
4491 case R_PPC64_DTPREL16_HA:
4492 case R_PPC64_DTPREL16_DS:
4493 case R_PPC64_DTPREL16_LO_DS:
f9c6b907
AM
4494 case R_PPC64_DTPREL16_HIGH:
4495 case R_PPC64_DTPREL16_HIGHA:
411e1bfb
AM
4496 case R_PPC64_DTPREL16_HIGHER:
4497 case R_PPC64_DTPREL16_HIGHERA:
4498 case R_PPC64_DTPREL16_HIGHEST:
4499 case R_PPC64_DTPREL16_HIGHESTA:
5bd4f169
AM
4500 break;
4501
ad8e1ba5 4502 /* Nor do these. */
25f23106
AM
4503 case R_PPC64_REL16:
4504 case R_PPC64_REL16_LO:
4505 case R_PPC64_REL16_HI:
4506 case R_PPC64_REL16_HA:
4a969973
AM
4507 case R_PPC64_REL16_HIGH:
4508 case R_PPC64_REL16_HIGHA:
4509 case R_PPC64_REL16_HIGHER:
4510 case R_PPC64_REL16_HIGHERA:
4511 case R_PPC64_REL16_HIGHEST:
4512 case R_PPC64_REL16_HIGHESTA:
a680de9a 4513 case R_PPC64_REL16DX_HA:
25f23106
AM
4514 break;
4515
45965137
AM
4516 /* Not supported as a dynamic relocation. */
4517 case R_PPC64_ADDR64_LOCAL:
0e1862bb 4518 if (bfd_link_pic (info))
45965137
AM
4519 {
4520 if (!ppc64_elf_howto_table[R_PPC64_ADDR32])
4521 ppc_howto_init ();
695344c0 4522 /* xgettext:c-format */
174d0a74 4523 info->callbacks->einfo (_("%H: %s reloc unsupported "
cf97bcb0 4524 "in shared libraries and PIEs\n"),
45965137
AM
4525 abfd, sec, rel->r_offset,
4526 ppc64_elf_howto_table[r_type]->name);
4527 bfd_set_error (bfd_error_bad_value);
4528 return FALSE;
4529 }
4530 break;
4531
ad8e1ba5 4532 case R_PPC64_TOC16:
33c0ec9d
AM
4533 case R_PPC64_TOC16_DS:
4534 htab->do_multi_toc = 1;
d77c8a4b 4535 ppc64_elf_tdata (abfd)->has_small_toc_reloc = 1;
1a0670f3 4536 /* Fall through. */
ad8e1ba5
AM
4537 case R_PPC64_TOC16_LO:
4538 case R_PPC64_TOC16_HI:
4539 case R_PPC64_TOC16_HA:
ad8e1ba5 4540 case R_PPC64_TOC16_LO_DS:
4c52953f 4541 sec->has_toc_reloc = 1;
ad8e1ba5
AM
4542 break;
4543
006589cf
AM
4544 /* Marker reloc. */
4545 case R_PPC64_ENTRY:
4546 break;
4547
5bd4f169
AM
4548 /* This relocation describes the C++ object vtable hierarchy.
4549 Reconstruct it for later use during GC. */
4550 case R_PPC64_GNU_VTINHERIT:
c152c796 4551 if (!bfd_elf_gc_record_vtinherit (abfd, sec, h, rel->r_offset))
b34976b6 4552 return FALSE;
5bd4f169
AM
4553 break;
4554
4555 /* This relocation describes which C++ vtable entries are actually
4556 used. Record for later use during GC. */
4557 case R_PPC64_GNU_VTENTRY:
d17e0c6e
JB
4558 BFD_ASSERT (h != NULL);
4559 if (h != NULL
4560 && !bfd_elf_gc_record_vtentry (abfd, sec, h, rel->r_addend))
b34976b6 4561 return FALSE;
5bd4f169
AM
4562 break;
4563
721956f4
AM
4564 case R_PPC64_REL14:
4565 case R_PPC64_REL14_BRTAKEN:
4566 case R_PPC64_REL14_BRNTAKEN:
220c76dd
AM
4567 {
4568 asection *dest = NULL;
4569
4570 /* Heuristic: If jumping outside our section, chances are
4571 we are going to need a stub. */
4572 if (h != NULL)
4573 {
4574 /* If the sym is weak it may be overridden later, so
4575 don't assume we know where a weak sym lives. */
4576 if (h->root.type == bfd_link_hash_defined)
4577 dest = h->root.u.def.section;
4578 }
4579 else
87d72d41
AM
4580 {
4581 Elf_Internal_Sym *isym;
4582
4583 isym = bfd_sym_from_r_symndx (&htab->sym_cache,
4584 abfd, r_symndx);
4585 if (isym == NULL)
4586 return FALSE;
4587
4588 dest = bfd_section_from_elf_index (abfd, isym->st_shndx);
4589 }
4590
220c76dd 4591 if (dest != sec)
7c8fe5c4 4592 ppc64_elf_section_data (sec)->has_14bit_branch = 1;
220c76dd 4593 }
3e04d765
AM
4594 goto rel24;
4595
4596 case R_PPC64_PLTCALL:
4597 ppc64_elf_section_data (sec)->has_pltcall = 1;
721956f4
AM
4598 /* Fall through. */
4599
5d1634d7 4600 case R_PPC64_REL24:
05d0e962 4601 case R_PPC64_REL24_NOTOC:
3e04d765 4602 rel24:
cbf95972
AM
4603 plt_list = ifunc;
4604 if (h != NULL)
5d1634d7 4605 {
e054468f
AM
4606 h->needs_plt = 1;
4607 if (h->root.root.string[0] == '.'
4608 && h->root.root.string[1] != '\0')
4609 ((struct ppc_link_hash_entry *) h)->is_func = 1;
cbf95972 4610
3a71aa26 4611 if (h == tga || h == dottga)
cbf95972
AM
4612 {
4613 sec->has_tls_reloc = 1;
4614 if (rel != relocs
4615 && (ELF64_R_TYPE (rel[-1].r_info) == R_PPC64_TLSGD
4616 || ELF64_R_TYPE (rel[-1].r_info) == R_PPC64_TLSLD))
4617 /* We have a new-style __tls_get_addr call with
4618 a marker reloc. */
4619 ;
4620 else
4621 /* Mark this section as having an old-style call. */
4622 sec->has_tls_get_addr_call = 1;
4623 }
4624 plt_list = &h->plt.plist;
411e1bfb 4625 }
cbf95972
AM
4626
4627 /* We may need a .plt entry if the function this reloc
4628 refers to is in a shared lib. */
4629 if (plt_list
4630 && !update_plt_info (abfd, plt_list, rel->r_addend))
4631 return FALSE;
411e1bfb
AM
4632 break;
4633
cbf95972
AM
4634 case R_PPC64_ADDR14:
4635 case R_PPC64_ADDR14_BRNTAKEN:
4636 case R_PPC64_ADDR14_BRTAKEN:
4637 case R_PPC64_ADDR24:
4638 goto dodyn;
4639
411e1bfb
AM
4640 case R_PPC64_TPREL64:
4641 tls_type = TLS_EXPLICIT | TLS_TLS | TLS_TPREL;
7c8bbca5 4642 if (bfd_link_dll (info))
411e1bfb
AM
4643 info->flags |= DF_STATIC_TLS;
4644 goto dotlstoc;
4645
4646 case R_PPC64_DTPMOD64:
4647 if (rel + 1 < rel_end
4648 && rel[1].r_info == ELF64_R_INFO (r_symndx, R_PPC64_DTPREL64)
4649 && rel[1].r_offset == rel->r_offset + 8)
951fd09b 4650 tls_type = TLS_EXPLICIT | TLS_TLS | TLS_GD;
411e1bfb 4651 else
951fd09b 4652 tls_type = TLS_EXPLICIT | TLS_TLS | TLS_LD;
411e1bfb
AM
4653 goto dotlstoc;
4654
4655 case R_PPC64_DTPREL64:
4656 tls_type = TLS_EXPLICIT | TLS_TLS | TLS_DTPREL;
4657 if (rel != relocs
4658 && rel[-1].r_info == ELF64_R_INFO (r_symndx, R_PPC64_DTPMOD64)
4659 && rel[-1].r_offset == rel->r_offset - 8)
4660 /* This is the second reloc of a dtpmod, dtprel pair.
4661 Don't mark with TLS_DTPREL. */
4662 goto dodyn;
4663
4664 dotlstoc:
4665 sec->has_tls_reloc = 1;
4666 if (h != NULL)
4667 {
4668 struct ppc_link_hash_entry *eh;
4669 eh = (struct ppc_link_hash_entry *) h;
e7b938ca 4670 eh->tls_mask |= tls_type;
411e1bfb
AM
4671 }
4672 else
4673 if (!update_local_sym_info (abfd, symtab_hdr, r_symndx,
4674 rel->r_addend, tls_type))
4675 return FALSE;
4676
7c8fe5c4
AM
4677 ppc64_sec = ppc64_elf_section_data (sec);
4678 if (ppc64_sec->sec_type != sec_toc)
411e1bfb 4679 {
3a71aa26
AM
4680 bfd_size_type amt;
4681
e7b938ca 4682 /* One extra to simplify get_tls_mask. */
3a71aa26
AM
4683 amt = sec->size * sizeof (unsigned) / 8 + sizeof (unsigned);
4684 ppc64_sec->u.toc.symndx = bfd_zalloc (abfd, amt);
4685 if (ppc64_sec->u.toc.symndx == NULL)
4686 return FALSE;
4687 amt = sec->size * sizeof (bfd_vma) / 8;
4688 ppc64_sec->u.toc.add = bfd_zalloc (abfd, amt);
4689 if (ppc64_sec->u.toc.add == NULL)
411e1bfb 4690 return FALSE;
7c8fe5c4
AM
4691 BFD_ASSERT (ppc64_sec->sec_type == sec_normal);
4692 ppc64_sec->sec_type = sec_toc;
411e1bfb
AM
4693 }
4694 BFD_ASSERT (rel->r_offset % 8 == 0);
3a71aa26
AM
4695 ppc64_sec->u.toc.symndx[rel->r_offset / 8] = r_symndx;
4696 ppc64_sec->u.toc.add[rel->r_offset / 8] = rel->r_addend;
951fd09b
AM
4697
4698 /* Mark the second slot of a GD or LD entry.
4699 -1 to indicate GD and -2 to indicate LD. */
4700 if (tls_type == (TLS_EXPLICIT | TLS_TLS | TLS_GD))
3a71aa26 4701 ppc64_sec->u.toc.symndx[rel->r_offset / 8 + 1] = -1;
951fd09b 4702 else if (tls_type == (TLS_EXPLICIT | TLS_TLS | TLS_LD))
3a71aa26 4703 ppc64_sec->u.toc.symndx[rel->r_offset / 8 + 1] = -2;
411e1bfb
AM
4704 goto dodyn;
4705
4706 case R_PPC64_TPREL16:
4707 case R_PPC64_TPREL16_LO:
4708 case R_PPC64_TPREL16_HI:
4709 case R_PPC64_TPREL16_HA:
4710 case R_PPC64_TPREL16_DS:
4711 case R_PPC64_TPREL16_LO_DS:
f9c6b907
AM
4712 case R_PPC64_TPREL16_HIGH:
4713 case R_PPC64_TPREL16_HIGHA:
411e1bfb
AM
4714 case R_PPC64_TPREL16_HIGHER:
4715 case R_PPC64_TPREL16_HIGHERA:
4716 case R_PPC64_TPREL16_HIGHEST:
4717 case R_PPC64_TPREL16_HIGHESTA:
7c8bbca5
AM
4718 if (bfd_link_dll (info))
4719 info->flags |= DF_STATIC_TLS;
4720 goto dodyn;
5d1634d7 4721
e86ce104 4722 case R_PPC64_ADDR64:
b9399fcf 4723 if (is_opd
1e2f5b6e 4724 && rel + 1 < rel_end
4ce794b7 4725 && ELF64_R_TYPE ((rel + 1)->r_info) == R_PPC64_TOC)
1e2f5b6e 4726 {
8387904d 4727 if (h != NULL)
8c5b4e52 4728 ((struct ppc_link_hash_entry *) h)->is_func = 1;
1e2f5b6e 4729 }
e86ce104
AM
4730 /* Fall through. */
4731
65f38f15
AM
4732 case R_PPC64_ADDR16:
4733 case R_PPC64_ADDR16_DS:
4734 case R_PPC64_ADDR16_HA:
4735 case R_PPC64_ADDR16_HI:
f9c6b907
AM
4736 case R_PPC64_ADDR16_HIGH:
4737 case R_PPC64_ADDR16_HIGHA:
65f38f15
AM
4738 case R_PPC64_ADDR16_HIGHER:
4739 case R_PPC64_ADDR16_HIGHERA:
4740 case R_PPC64_ADDR16_HIGHEST:
4741 case R_PPC64_ADDR16_HIGHESTA:
4742 case R_PPC64_ADDR16_LO:
4743 case R_PPC64_ADDR16_LO_DS:
0e1862bb 4744 if (h != NULL && !bfd_link_pic (info) && abiversion (abfd) != 1
a345bc8d
AM
4745 && rel->r_addend == 0)
4746 {
4747 /* We may need a .plt entry if this reloc refers to a
4748 function in a shared lib. */
4749 if (!update_plt_info (abfd, &h->plt.plist, rel->r_addend))
4750 return FALSE;
4751 h->pointer_equality_needed = 1;
4752 }
4753 /* Fall through. */
4754
4755 case R_PPC64_REL30:
4756 case R_PPC64_REL32:
4757 case R_PPC64_REL64:
65f38f15 4758 case R_PPC64_ADDR32:
65f38f15
AM
4759 case R_PPC64_UADDR16:
4760 case R_PPC64_UADDR32:
4761 case R_PPC64_UADDR64:
5bd4f169 4762 case R_PPC64_TOC:
0e1862bb 4763 if (h != NULL && !bfd_link_pic (info))
81848ca0 4764 /* We may need a copy reloc. */
f5385ebf 4765 h->non_got_ref = 1;
81848ca0 4766
41bd81ab 4767 /* Don't propagate .opd relocs. */
b9399fcf 4768 if (NO_OPD_RELOCS && is_opd)
e86ce104 4769 break;
e86ce104 4770
65f38f15
AM
4771 /* If we are creating a shared library, and this is a reloc
4772 against a global symbol, or a non PC relative reloc
4773 against a local symbol, then we need to copy the reloc
4774 into the shared library. However, if we are linking with
4775 -Bsymbolic, we do not need to copy a reloc against a
4776 global symbol which is defined in an object we are
4777 including in the link (i.e., DEF_REGULAR is set). At
4778 this point we have not seen all the input files, so it is
4779 possible that DEF_REGULAR is not set now but will be set
4780 later (it is never cleared). In case of a weak definition,
4781 DEF_REGULAR may be cleared later by a strong definition in
4782 a shared library. We account for that possibility below by
f4656909 4783 storing information in the dyn_relocs field of the hash
65f38f15
AM
4784 table entry. A similar situation occurs when creating
4785 shared libraries and symbol visibility changes render the
4786 symbol local.
4787
4788 If on the other hand, we are creating an executable, we
4789 may need to keep relocations for symbols satisfied by a
4790 dynamic library if we manage to avoid copy relocs for the
4791 symbol. */
411e1bfb 4792 dodyn:
0e1862bb 4793 if ((bfd_link_pic (info)
1d483afe 4794 && (must_be_dyn_reloc (info, r_type)
65f38f15 4795 || (h != NULL
198f1157 4796 && (!SYMBOLIC_BIND (info, h)
65f38f15 4797 || h->root.type == bfd_link_hash_defweak
f5385ebf 4798 || !h->def_regular))))
f4656909 4799 || (ELIMINATE_COPY_RELOCS
0e1862bb 4800 && !bfd_link_pic (info)
65f38f15
AM
4801 && h != NULL
4802 && (h->root.type == bfd_link_hash_defweak
25f23106 4803 || !h->def_regular))
0e1862bb 4804 || (!bfd_link_pic (info)
25f23106 4805 && ifunc != NULL))
5bd4f169 4806 {
65f38f15
AM
4807 /* We must copy these reloc types into the output file.
4808 Create a reloc section in dynobj and make room for
4809 this reloc. */
5bd4f169
AM
4810 if (sreloc == NULL)
4811 {
83bac4b0
NC
4812 sreloc = _bfd_elf_make_dynamic_reloc_section
4813 (sec, htab->elf.dynobj, 3, abfd, /*rela?*/ TRUE);
65f38f15 4814
5bd4f169 4815 if (sreloc == NULL)
83bac4b0 4816 return FALSE;
5bd4f169
AM
4817 }
4818
65f38f15
AM
4819 /* If this is a global symbol, we count the number of
4820 relocations we need for this symbol. */
4821 if (h != NULL)
4822 {
19e08130
AM
4823 struct elf_dyn_relocs *p;
4824 struct elf_dyn_relocs **head;
4825
ec338859 4826 head = &((struct ppc_link_hash_entry *) h)->dyn_relocs;
19e08130
AM
4827 p = *head;
4828 if (p == NULL || p->sec != sec)
4829 {
4830 p = bfd_alloc (htab->elf.dynobj, sizeof *p);
4831 if (p == NULL)
4832 return FALSE;
4833 p->next = *head;
4834 *head = p;
4835 p->sec = sec;
4836 p->count = 0;
4837 p->pc_count = 0;
4838 }
4839 p->count += 1;
4840 if (!must_be_dyn_reloc (info, r_type))
4841 p->pc_count += 1;
65f38f15
AM
4842 }
4843 else
4844 {
ec338859
AM
4845 /* Track dynamic relocs needed for local syms too.
4846 We really need local syms available to do this
4847 easily. Oh well. */
19e08130
AM
4848 struct ppc_dyn_relocs *p;
4849 struct ppc_dyn_relocs **head;
4850 bfd_boolean is_ifunc;
ec338859 4851 asection *s;
6edfbbad 4852 void *vpp;
87d72d41 4853 Elf_Internal_Sym *isym;
6edfbbad 4854
87d72d41
AM
4855 isym = bfd_sym_from_r_symndx (&htab->sym_cache,
4856 abfd, r_symndx);
4857 if (isym == NULL)
b34976b6 4858 return FALSE;
ec338859 4859
87d72d41
AM
4860 s = bfd_section_from_elf_index (abfd, isym->st_shndx);
4861 if (s == NULL)
4862 s = sec;
4863
6edfbbad 4864 vpp = &elf_section_data (s)->local_dynrel;
19e08130
AM
4865 head = (struct ppc_dyn_relocs **) vpp;
4866 is_ifunc = ELF_ST_TYPE (isym->st_info) == STT_GNU_IFUNC;
4867 p = *head;
4868 if (p != NULL && p->sec == sec && p->ifunc != is_ifunc)
4869 p = p->next;
4870 if (p == NULL || p->sec != sec || p->ifunc != is_ifunc)
4871 {
4872 p = bfd_alloc (htab->elf.dynobj, sizeof *p);
4873 if (p == NULL)
4874 return FALSE;
4875 p->next = *head;
4876 *head = p;
4877 p->sec = sec;
4878 p->ifunc = is_ifunc;
4879 p->count = 0;
4880 }
4881 p->count += 1;
ec338859 4882 }
65f38f15 4883 }
5bd4f169 4884 break;
65f38f15
AM
4885
4886 default:
96e0dda4 4887 break;
5bd4f169
AM
4888 }
4889 }
4890
b34976b6 4891 return TRUE;
5bd4f169
AM
4892}
4893
ee67d69a
AM
4894/* Merge backend specific data from an object file to the output
4895 object file when linking. */
4896
4897static bfd_boolean
50e03d47 4898ppc64_elf_merge_private_bfd_data (bfd *ibfd, struct bfd_link_info *info)
ee67d69a 4899{
50e03d47 4900 bfd *obfd = info->output_bfd;
ee67d69a
AM
4901 unsigned long iflags, oflags;
4902
4903 if ((ibfd->flags & BFD_LINKER_CREATED) != 0)
4904 return TRUE;
4905
4906 if (!is_ppc64_elf (ibfd) || !is_ppc64_elf (obfd))
4907 return TRUE;
4908
50e03d47 4909 if (!_bfd_generic_verify_endian_match (ibfd, info))
ee67d69a
AM
4910 return FALSE;
4911
4912 iflags = elf_elfheader (ibfd)->e_flags;
4913 oflags = elf_elfheader (obfd)->e_flags;
4914
f6c7c3e8 4915 if (iflags & ~EF_PPC64_ABI)
ee67d69a 4916 {
4eca0228 4917 _bfd_error_handler
695344c0 4918 /* xgettext:c-format */
871b3ab2 4919 (_("%pB uses unknown e_flags 0x%lx"), ibfd, iflags);
ee67d69a
AM
4920 bfd_set_error (bfd_error_bad_value);
4921 return FALSE;
4922 }
f6c7c3e8 4923 else if (iflags != oflags && iflags != 0)
ee67d69a 4924 {
4eca0228 4925 _bfd_error_handler
695344c0 4926 /* xgettext:c-format */
871b3ab2 4927 (_("%pB: ABI version %ld is not compatible with ABI version %ld output"),
ee67d69a
AM
4928 ibfd, iflags, oflags);
4929 bfd_set_error (bfd_error_bad_value);
4930 return FALSE;
4931 }
4932
4a91d0ba
AM
4933 if (!_bfd_elf_ppc_merge_fp_attributes (ibfd, info))
4934 return FALSE;
005d79fd 4935
ee67d69a 4936 /* Merge Tag_compatibility attributes and any common GNU ones. */
8d2c8c3d 4937 return _bfd_elf_merge_object_attributes (ibfd, info);
ee67d69a
AM
4938}
4939
4940static bfd_boolean
4941ppc64_elf_print_private_bfd_data (bfd *abfd, void *ptr)
4942{
4943 /* Print normal ELF private data. */
4944 _bfd_elf_print_private_bfd_data (abfd, ptr);
4945
4946 if (elf_elfheader (abfd)->e_flags != 0)
4947 {
4948 FILE *file = ptr;
4949
ee67d69a
AM
4950 fprintf (file, _("private flags = 0x%lx:"),
4951 elf_elfheader (abfd)->e_flags);
4952
4953 if ((elf_elfheader (abfd)->e_flags & EF_PPC64_ABI) != 0)
4954 fprintf (file, _(" [abiv%ld]"),
4955 elf_elfheader (abfd)->e_flags & EF_PPC64_ABI);
4956 fputc ('\n', file);
4957 }
4958
4959 return TRUE;
4960}
4961
8387904d 4962/* OFFSET in OPD_SEC specifies a function descriptor. Return the address
b53dfeb2
AM
4963 of the code entry point, and its section, which must be in the same
4964 object as OPD_SEC. Returns (bfd_vma) -1 on error. */
8387904d
AM
4965
4966static bfd_vma
4967opd_entry_value (asection *opd_sec,
4968 bfd_vma offset,
4969 asection **code_sec,
aef36ac1
AM
4970 bfd_vma *code_off,
4971 bfd_boolean in_code_sec)
8387904d
AM
4972{
4973 bfd *opd_bfd = opd_sec->owner;
8860955f 4974 Elf_Internal_Rela *relocs;
8387904d 4975 Elf_Internal_Rela *lo, *hi, *look;
645ea6a9 4976 bfd_vma val;
8387904d 4977
9f296da3
AM
4978 /* No relocs implies we are linking a --just-symbols object, or looking
4979 at a final linked executable with addr2line or somesuch. */
4b85d634
AM
4980 if (opd_sec->reloc_count == 0)
4981 {
729eabd5 4982 bfd_byte *contents = ppc64_elf_tdata (opd_bfd)->opd.contents;
3b36f7e6 4983
729eabd5
AM
4984 if (contents == NULL)
4985 {
4986 if (!bfd_malloc_and_get_section (opd_bfd, opd_sec, &contents))
4987 return (bfd_vma) -1;
4988 ppc64_elf_tdata (opd_bfd)->opd.contents = contents;
4989 }
ee1e4ede 4990
dbb3fbbb 4991 /* PR 17512: file: 64b9dfbb. */
451dfd38 4992 if (offset + 7 >= opd_sec->size || offset + 7 < offset)
dbb3fbbb
NC
4993 return (bfd_vma) -1;
4994
729eabd5 4995 val = bfd_get_64 (opd_bfd, contents + offset);
aef36ac1
AM
4996 if (code_sec != NULL)
4997 {
4998 asection *sec, *likely = NULL;
ee1e4ede 4999
aef36ac1 5000 if (in_code_sec)
4b85d634 5001 {
aef36ac1
AM
5002 sec = *code_sec;
5003 if (sec->vma <= val
5004 && val < sec->vma + sec->size)
5005 likely = sec;
5006 else
5007 val = -1;
5008 }
5009 else
5010 for (sec = opd_bfd->sections; sec != NULL; sec = sec->next)
5011 if (sec->vma <= val
5012 && (sec->flags & SEC_LOAD) != 0
5013 && (sec->flags & SEC_ALLOC) != 0)
5014 likely = sec;
5015 if (likely != NULL)
5016 {
5017 *code_sec = likely;
5018 if (code_off != NULL)
5019 *code_off = val - likely->vma;
4b85d634
AM
5020 }
5021 }
aef36ac1 5022 return val;
4b85d634
AM
5023 }
5024
0c8d6e5c 5025 BFD_ASSERT (is_ppc64_elf (opd_bfd));
0ffa91dd 5026
729eabd5 5027 relocs = ppc64_elf_tdata (opd_bfd)->opd.relocs;
8860955f
AM
5028 if (relocs == NULL)
5029 relocs = _bfd_elf_link_read_relocs (opd_bfd, opd_sec, NULL, NULL, TRUE);
877a8638
NC
5030 /* PR 17512: file: df8e1fd6. */
5031 if (relocs == NULL)
5032 return (bfd_vma) -1;
645ea6a9 5033
8387904d 5034 /* Go find the opd reloc at the sym address. */
8860955f 5035 lo = relocs;
8387904d 5036 hi = lo + opd_sec->reloc_count - 1; /* ignore last reloc */
645ea6a9 5037 val = (bfd_vma) -1;
8387904d
AM
5038 while (lo < hi)
5039 {
5040 look = lo + (hi - lo) / 2;
5041 if (look->r_offset < offset)
5042 lo = look + 1;
5043 else if (look->r_offset > offset)
5044 hi = look;
5045 else
5046 {
0ffa91dd
NC
5047 Elf_Internal_Shdr *symtab_hdr = &elf_symtab_hdr (opd_bfd);
5048
8387904d
AM
5049 if (ELF64_R_TYPE (look->r_info) == R_PPC64_ADDR64
5050 && ELF64_R_TYPE ((look + 1)->r_info) == R_PPC64_TOC)
5051 {
5052 unsigned long symndx = ELF64_R_SYM (look->r_info);
b53dfeb2 5053 asection *sec = NULL;
8387904d 5054
b53dfeb2
AM
5055 if (symndx >= symtab_hdr->sh_info
5056 && elf_sym_hashes (opd_bfd) != NULL)
8387904d
AM
5057 {
5058 struct elf_link_hash_entry **sym_hashes;
5059 struct elf_link_hash_entry *rh;
5060
5061 sym_hashes = elf_sym_hashes (opd_bfd);
5062 rh = sym_hashes[symndx - symtab_hdr->sh_info];
128205bb
AM
5063 if (rh != NULL)
5064 {
5065 rh = elf_follow_link (rh);
bb854a36
AM
5066 if (rh->root.type != bfd_link_hash_defined
5067 && rh->root.type != bfd_link_hash_defweak)
5068 break;
5069 if (rh->root.u.def.section->owner == opd_bfd)
b53dfeb2 5070 {
bb854a36
AM
5071 val = rh->root.u.def.value;
5072 sec = rh->root.u.def.section;
b53dfeb2
AM
5073 }
5074 }
5075 }
5076
5077 if (sec == NULL)
5078 {
5079 Elf_Internal_Sym *sym;
5080
5081 if (symndx < symtab_hdr->sh_info)
5082 {
5083 sym = (Elf_Internal_Sym *) symtab_hdr->contents;
5084 if (sym == NULL)
5085 {
5086 size_t symcnt = symtab_hdr->sh_info;
5087 sym = bfd_elf_get_elf_syms (opd_bfd, symtab_hdr,
5088 symcnt, 0,
5089 NULL, NULL, NULL);
5090 if (sym == NULL)
5091 break;
5092 symtab_hdr->contents = (bfd_byte *) sym;
5093 }
5094 sym += symndx;
128205bb
AM
5095 }
5096 else
5097 {
b53dfeb2
AM
5098 sym = bfd_elf_get_elf_syms (opd_bfd, symtab_hdr,
5099 1, symndx,
5100 NULL, NULL, NULL);
128205bb
AM
5101 if (sym == NULL)
5102 break;
128205bb 5103 }
b53dfeb2
AM
5104 sec = bfd_section_from_elf_index (opd_bfd, sym->st_shndx);
5105 if (sec == NULL)
5106 break;
5107 BFD_ASSERT ((sec->flags & SEC_MERGE) == 0);
5108 val = sym->st_value;
8387904d 5109 }
b53dfeb2 5110
8387904d
AM
5111 val += look->r_addend;
5112 if (code_off != NULL)
5113 *code_off = val;
5114 if (code_sec != NULL)
aef36ac1
AM
5115 {
5116 if (in_code_sec && *code_sec != sec)
5117 return -1;
5118 else
5119 *code_sec = sec;
5120 }
b53dfeb2 5121 if (sec->output_section != NULL)
8387904d 5122 val += sec->output_section->vma + sec->output_offset;
8387904d
AM
5123 }
5124 break;
5125 }
5126 }
645ea6a9 5127
645ea6a9 5128 return val;
8387904d
AM
5129}
5130
aef36ac1
AM
5131/* If the ELF symbol SYM might be a function in SEC, return the
5132 function size and set *CODE_OFF to the function's entry point,
5133 otherwise return zero. */
9f296da3 5134
aef36ac1
AM
5135static bfd_size_type
5136ppc64_elf_maybe_function_sym (const asymbol *sym, asection *sec,
5137 bfd_vma *code_off)
9f296da3 5138{
aef36ac1
AM
5139 bfd_size_type size;
5140
5141 if ((sym->flags & (BSF_SECTION_SYM | BSF_FILE | BSF_OBJECT
5142 | BSF_THREAD_LOCAL | BSF_RELC | BSF_SRELC)) != 0)
5143 return 0;
5144
5145 size = 0;
5146 if (!(sym->flags & BSF_SYNTHETIC))
5147 size = ((elf_symbol_type *) sym)->internal_elf_sym.st_size;
5148
5149 if (strcmp (sym->section->name, ".opd") == 0)
9f296da3 5150 {
b07bca4e
AM
5151 struct _opd_sec_data *opd = get_opd_info (sym->section);
5152 bfd_vma symval = sym->value;
5153
5154 if (opd != NULL
5155 && opd->adjust != NULL
5156 && elf_section_data (sym->section)->relocs != NULL)
5157 {
5158 /* opd_entry_value will use cached relocs that have been
5159 adjusted, but with raw symbols. That means both local
5160 and global symbols need adjusting. */
5161 long adjust = opd->adjust[OPD_NDX (symval)];
5162 if (adjust == -1)
5163 return 0;
5164 symval += adjust;
5165 }
5166
5167 if (opd_entry_value (sym->section, symval,
aef36ac1
AM
5168 &sec, code_off, TRUE) == (bfd_vma) -1)
5169 return 0;
5170 /* An old ABI binary with dot-syms has a size of 24 on the .opd
5171 symbol. This size has nothing to do with the code size of the
5172 function, which is what we're supposed to return, but the
5173 code size isn't available without looking up the dot-sym.
5174 However, doing that would be a waste of time particularly
5175 since elf_find_function will look at the dot-sym anyway.
5176 Now, elf_find_function will keep the largest size of any
5177 function sym found at the code address of interest, so return
5178 1 here to avoid it incorrectly caching a larger function size
5179 for a small function. This does mean we return the wrong
5180 size for a new-ABI function of size 24, but all that does is
5181 disable caching for such functions. */
5182 if (size == 24)
5183 size = 1;
9f296da3 5184 }
aef36ac1
AM
5185 else
5186 {
5187 if (sym->section != sec)
5188 return 0;
5189 *code_off = sym->value;
5190 }
5191 if (size == 0)
5192 size = 1;
5193 return size;
9f296da3
AM
5194}
5195
f378ab09
AM
5196/* Return true if symbol is a strong function defined in an ELFv2
5197 object with st_other localentry bits of zero, ie. its local entry
5198 point coincides with its global entry point. */
5199
5200static bfd_boolean
5201is_elfv2_localentry0 (struct elf_link_hash_entry *h)
5202{
5203 return (h != NULL
5204 && h->type == STT_FUNC
5205 && h->root.type == bfd_link_hash_defined
5206 && (STO_PPC64_LOCAL_MASK & h->other) == 0
8b5f1ed8 5207 && !((struct ppc_link_hash_entry *) h)->non_zero_localentry
f378ab09
AM
5208 && is_ppc64_elf (h->root.u.def.section->owner)
5209 && abiversion (h->root.u.def.section->owner) >= 2);
5210}
5211
854b41e7
AM
5212/* Return true if symbol is defined in a regular object file. */
5213
5214static bfd_boolean
5215is_static_defined (struct elf_link_hash_entry *h)
5216{
5217 return ((h->root.type == bfd_link_hash_defined
5218 || h->root.type == bfd_link_hash_defweak)
5219 && h->root.u.def.section != NULL
5220 && h->root.u.def.section->output_section != NULL);
5221}
5222
b31867b6
AM
5223/* If FDH is a function descriptor symbol, return the associated code
5224 entry symbol if it is defined. Return NULL otherwise. */
5225
5226static struct ppc_link_hash_entry *
5227defined_code_entry (struct ppc_link_hash_entry *fdh)
5228{
5229 if (fdh->is_func_descriptor)
5230 {
5231 struct ppc_link_hash_entry *fh = ppc_follow_link (fdh->oh);
5232 if (fh->elf.root.type == bfd_link_hash_defined
5233 || fh->elf.root.type == bfd_link_hash_defweak)
5234 return fh;
5235 }
5236 return NULL;
5237}
5238
5239/* If FH is a function code entry symbol, return the associated
5240 function descriptor symbol if it is defined. Return NULL otherwise. */
5241
5242static struct ppc_link_hash_entry *
5243defined_func_desc (struct ppc_link_hash_entry *fh)
5244{
5245 if (fh->oh != NULL
5246 && fh->oh->is_func_descriptor)
5247 {
5248 struct ppc_link_hash_entry *fdh = ppc_follow_link (fh->oh);
5249 if (fdh->elf.root.type == bfd_link_hash_defined
5250 || fdh->elf.root.type == bfd_link_hash_defweak)
5251 return fdh;
5252 }
5253 return NULL;
5254}
5255
8c5b4e52
AM
5256static bfd_boolean func_desc_adjust (struct elf_link_hash_entry *, void *);
5257
5258/* Garbage collect sections, after first dealing with dot-symbols. */
5259
5260static bfd_boolean
5261ppc64_elf_gc_sections (bfd *abfd, struct bfd_link_info *info)
5262{
5263 struct ppc_link_hash_table *htab = ppc_hash_table (info);
5264
5265 if (htab != NULL && htab->need_func_desc_adj)
5266 {
5267 elf_link_hash_traverse (&htab->elf, func_desc_adjust, info);
5268 htab->need_func_desc_adj = 0;
5269 }
5270 return bfd_elf_gc_sections (abfd, info);
5271}
5272
74f0fb50
AM
5273/* Mark all our entry sym sections, both opd and code section. */
5274
5275static void
5276ppc64_elf_gc_keep (struct bfd_link_info *info)
5277{
5278 struct ppc_link_hash_table *htab = ppc_hash_table (info);
5279 struct bfd_sym_chain *sym;
5280
4dfe6ac6
NC
5281 if (htab == NULL)
5282 return;
5283
74f0fb50
AM
5284 for (sym = info->gc_sym_list; sym != NULL; sym = sym->next)
5285 {
b31867b6 5286 struct ppc_link_hash_entry *eh, *fh;
74f0fb50
AM
5287 asection *sec;
5288
5289 eh = (struct ppc_link_hash_entry *)
b31867b6 5290 elf_link_hash_lookup (&htab->elf, sym->name, FALSE, FALSE, TRUE);
74f0fb50
AM
5291 if (eh == NULL)
5292 continue;
5293 if (eh->elf.root.type != bfd_link_hash_defined
5294 && eh->elf.root.type != bfd_link_hash_defweak)
5295 continue;
5296
b31867b6
AM
5297 fh = defined_code_entry (eh);
5298 if (fh != NULL)
74f0fb50 5299 {
b31867b6 5300 sec = fh->elf.root.u.def.section;
74f0fb50
AM
5301 sec->flags |= SEC_KEEP;
5302 }
5303 else if (get_opd_info (eh->elf.root.u.def.section) != NULL
5304 && opd_entry_value (eh->elf.root.u.def.section,
5305 eh->elf.root.u.def.value,
aef36ac1 5306 &sec, NULL, FALSE) != (bfd_vma) -1)
74f0fb50
AM
5307 sec->flags |= SEC_KEEP;
5308
5309 sec = eh->elf.root.u.def.section;
5310 sec->flags |= SEC_KEEP;
5311 }
5312}
5313
64d03ab5
AM
5314/* Mark sections containing dynamically referenced symbols. When
5315 building shared libraries, we must assume that any visible symbol is
5316 referenced. */
5317
5318static bfd_boolean
5319ppc64_elf_gc_mark_dynamic_ref (struct elf_link_hash_entry *h, void *inf)
5320{
5321 struct bfd_link_info *info = (struct bfd_link_info *) inf;
5322 struct ppc_link_hash_entry *eh = (struct ppc_link_hash_entry *) h;
b31867b6 5323 struct ppc_link_hash_entry *fdh;
b407645f 5324 struct bfd_elf_dynamic_list *d = info->dynamic_list;
64d03ab5 5325
64d03ab5 5326 /* Dynamic linking info is on the func descriptor sym. */
b31867b6
AM
5327 fdh = defined_func_desc (eh);
5328 if (fdh != NULL)
5329 eh = fdh;
64d03ab5
AM
5330
5331 if ((eh->elf.root.type == bfd_link_hash_defined
5332 || eh->elf.root.type == bfd_link_hash_defweak)
87e79a65 5333 && ((eh->elf.ref_dynamic && !eh->elf.forced_local)
1c9177d9 5334 || ((eh->elf.def_regular || ELF_COMMON_DEF_P (&eh->elf))
64d03ab5 5335 && ELF_ST_VISIBILITY (eh->elf.other) != STV_INTERNAL
4c58e0d8 5336 && ELF_ST_VISIBILITY (eh->elf.other) != STV_HIDDEN
0e1862bb 5337 && (!bfd_link_executable (info)
e278ae05 5338 || info->gc_keep_exported
b407645f
AM
5339 || info->export_dynamic
5340 || (eh->elf.dynamic
5341 && d != NULL
2cdcc330
AM
5342 && (*d->match) (&d->head, NULL,
5343 eh->elf.root.root.string)))
e278ae05 5344 && (eh->elf.versioned >= versioned
4c58e0d8
AM
5345 || !bfd_hide_sym_by_version (info->version_info,
5346 eh->elf.root.root.string)))))
64d03ab5
AM
5347 {
5348 asection *code_sec;
b31867b6 5349 struct ppc_link_hash_entry *fh;
64d03ab5
AM
5350
5351 eh->elf.root.u.def.section->flags |= SEC_KEEP;
5352
5353 /* Function descriptor syms cause the associated
5354 function code sym section to be marked. */
b31867b6
AM
5355 fh = defined_code_entry (eh);
5356 if (fh != NULL)
5357 {
5358 code_sec = fh->elf.root.u.def.section;
5359 code_sec->flags |= SEC_KEEP;
5360 }
64d03ab5
AM
5361 else if (get_opd_info (eh->elf.root.u.def.section) != NULL
5362 && opd_entry_value (eh->elf.root.u.def.section,
5363 eh->elf.root.u.def.value,
aef36ac1 5364 &code_sec, NULL, FALSE) != (bfd_vma) -1)
64d03ab5
AM
5365 code_sec->flags |= SEC_KEEP;
5366 }
5367
5368 return TRUE;
5369}
5370
5bd4f169
AM
5371/* Return the section that should be marked against GC for a given
5372 relocation. */
5373
5374static asection *
4ce794b7 5375ppc64_elf_gc_mark_hook (asection *sec,
fb34365b 5376 struct bfd_link_info *info,
4ce794b7
AM
5377 Elf_Internal_Rela *rel,
5378 struct elf_link_hash_entry *h,
5379 Elf_Internal_Sym *sym)
5bd4f169 5380{
ccfa59ea
AM
5381 asection *rsec;
5382
ccfa59ea
AM
5383 /* Syms return NULL if we're marking .opd, so we avoid marking all
5384 function sections, as all functions are referenced in .opd. */
5385 rsec = NULL;
5386 if (get_opd_info (sec) != NULL)
5387 return rsec;
1e2f5b6e 5388
5bd4f169
AM
5389 if (h != NULL)
5390 {
04c9666a 5391 enum elf_ppc64_reloc_type r_type;
b31867b6 5392 struct ppc_link_hash_entry *eh, *fh, *fdh;
a33d1f77 5393
4ce794b7 5394 r_type = ELF64_R_TYPE (rel->r_info);
a33d1f77 5395 switch (r_type)
5bd4f169
AM
5396 {
5397 case R_PPC64_GNU_VTINHERIT:
5398 case R_PPC64_GNU_VTENTRY:
5399 break;
5400
5401 default:
5402 switch (h->root.type)
5403 {
5404 case bfd_link_hash_defined:
5405 case bfd_link_hash_defweak:
ccfa59ea 5406 eh = (struct ppc_link_hash_entry *) h;
b31867b6
AM
5407 fdh = defined_func_desc (eh);
5408 if (fdh != NULL)
8c5b4e52
AM
5409 {
5410 /* -mcall-aixdesc code references the dot-symbol on
5411 a call reloc. Mark the function descriptor too
5412 against garbage collection. */
5413 fdh->elf.mark = 1;
60d67dc8
AM
5414 if (fdh->elf.is_weakalias)
5415 weakdef (&fdh->elf)->mark = 1;
8c5b4e52
AM
5416 eh = fdh;
5417 }
1e2f5b6e
AM
5418
5419 /* Function descriptor syms cause the associated
5420 function code sym section to be marked. */
b31867b6
AM
5421 fh = defined_code_entry (eh);
5422 if (fh != NULL)
ccfa59ea
AM
5423 {
5424 /* They also mark their opd section. */
74f0fb50 5425 eh->elf.root.u.def.section->gc_mark = 1;
ccfa59ea 5426
b31867b6 5427 rsec = fh->elf.root.u.def.section;
ccfa59ea 5428 }
8387904d
AM
5429 else if (get_opd_info (eh->elf.root.u.def.section) != NULL
5430 && opd_entry_value (eh->elf.root.u.def.section,
5431 eh->elf.root.u.def.value,
aef36ac1 5432 &rsec, NULL, FALSE) != (bfd_vma) -1)
74f0fb50 5433 eh->elf.root.u.def.section->gc_mark = 1;
ccfa59ea 5434 else
1e2f5b6e
AM
5435 rsec = h->root.u.def.section;
5436 break;
5bd4f169
AM
5437
5438 case bfd_link_hash_common:
1e2f5b6e
AM
5439 rsec = h->root.u.c.p->section;
5440 break;
5bd4f169
AM
5441
5442 default:
fb34365b 5443 return _bfd_elf_gc_mark_hook (sec, info, rel, h, sym);
5bd4f169
AM
5444 }
5445 }
5446 }
5447 else
5448 {
74f0fb50 5449 struct _opd_sec_data *opd;
1e2f5b6e
AM
5450
5451 rsec = bfd_section_from_elf_index (sec->owner, sym->st_shndx);
74f0fb50
AM
5452 opd = get_opd_info (rsec);
5453 if (opd != NULL && opd->func_sec != NULL)
ccfa59ea 5454 {
74f0fb50 5455 rsec->gc_mark = 1;
ccfa59ea 5456
51aecdc5 5457 rsec = opd->func_sec[OPD_NDX (sym->st_value + rel->r_addend)];
ccfa59ea 5458 }
5bd4f169
AM
5459 }
5460
1e2f5b6e 5461 return rsec;
5bd4f169
AM
5462}
5463
deb0e272
AM
5464/* The maximum size of .sfpr. */
5465#define SFPR_MAX (218*4)
5466
5467struct sfpr_def_parms
5468{
699733f6
AM
5469 const char name[12];
5470 unsigned char lo, hi;
2cdcc330
AM
5471 bfd_byte *(*write_ent) (bfd *, bfd_byte *, int);
5472 bfd_byte *(*write_tail) (bfd *, bfd_byte *, int);
deb0e272
AM
5473};
5474
a4b6fadd
AM
5475/* Auto-generate _save*, _rest* functions in .sfpr.
5476 If STUB_SEC is non-null, define alias symbols in STUB_SEC
5477 instead. */
deb0e272 5478
4dfe6ac6 5479static bfd_boolean
a4b6fadd
AM
5480sfpr_define (struct bfd_link_info *info,
5481 const struct sfpr_def_parms *parm,
5482 asection *stub_sec)
deb0e272
AM
5483{
5484 struct ppc_link_hash_table *htab = ppc_hash_table (info);
5485 unsigned int i;
5486 size_t len = strlen (parm->name);
5487 bfd_boolean writing = FALSE;
699733f6 5488 char sym[16];
deb0e272 5489
4dfe6ac6
NC
5490 if (htab == NULL)
5491 return FALSE;
5492
deb0e272
AM
5493 memcpy (sym, parm->name, len);
5494 sym[len + 2] = 0;
5495
5496 for (i = parm->lo; i <= parm->hi; i++)
5497 {
a4b6fadd 5498 struct ppc_link_hash_entry *h;
deb0e272
AM
5499
5500 sym[len + 0] = i / 10 + '0';
5501 sym[len + 1] = i % 10 + '0';
a4b6fadd 5502 h = (struct ppc_link_hash_entry *)
b32547cd 5503 elf_link_hash_lookup (&htab->elf, sym, writing, TRUE, TRUE);
a4b6fadd 5504 if (stub_sec != NULL)
deb0e272 5505 {
a4b6fadd
AM
5506 if (h != NULL
5507 && h->elf.root.type == bfd_link_hash_defined
5508 && h->elf.root.u.def.section == htab->sfpr)
5509 {
5510 struct elf_link_hash_entry *s;
5511 char buf[32];
5512 sprintf (buf, "%08x.%s", stub_sec->id & 0xffffffff, sym);
5513 s = elf_link_hash_lookup (&htab->elf, buf, TRUE, TRUE, FALSE);
5514 if (s == NULL)
5515 return FALSE;
5516 if (s->root.type == bfd_link_hash_new
5517 || (s->root.type = bfd_link_hash_defined
5518 && s->root.u.def.section == stub_sec))
5519 {
5520 s->root.type = bfd_link_hash_defined;
5521 s->root.u.def.section = stub_sec;
7dda8d3c 5522 s->root.u.def.value = (stub_sec->size - htab->sfpr->size
a4b6fadd
AM
5523 + h->elf.root.u.def.value);
5524 s->ref_regular = 1;
5525 s->def_regular = 1;
5526 s->ref_regular_nonweak = 1;
5527 s->forced_local = 1;
5528 s->non_elf = 0;
5529 s->root.linker_def = 1;
5530 }
5531 }
5532 continue;
5533 }
5534 if (h != NULL)
5535 {
5536 h->save_res = 1;
5537 if (!h->elf.def_regular)
deb0e272 5538 {
a4b6fadd
AM
5539 h->elf.root.type = bfd_link_hash_defined;
5540 h->elf.root.u.def.section = htab->sfpr;
5541 h->elf.root.u.def.value = htab->sfpr->size;
5542 h->elf.type = STT_FUNC;
5543 h->elf.def_regular = 1;
b32547cd 5544 h->elf.non_elf = 0;
a4b6fadd
AM
5545 _bfd_elf_link_hash_hide_symbol (info, &h->elf, TRUE);
5546 writing = TRUE;
deb0e272 5547 if (htab->sfpr->contents == NULL)
a4b6fadd 5548 {
2cdcc330
AM
5549 htab->sfpr->contents
5550 = bfd_alloc (htab->elf.dynobj, SFPR_MAX);
a4b6fadd
AM
5551 if (htab->sfpr->contents == NULL)
5552 return FALSE;
5553 }
deb0e272
AM
5554 }
5555 }
5556 if (writing)
5557 {
5558 bfd_byte *p = htab->sfpr->contents + htab->sfpr->size;
5559 if (i != parm->hi)
5560 p = (*parm->write_ent) (htab->elf.dynobj, p, i);
5561 else
5562 p = (*parm->write_tail) (htab->elf.dynobj, p, i);
5563 htab->sfpr->size = p - htab->sfpr->contents;
5564 }
5565 }
5566
5567 return TRUE;
5568}
5569
5570static bfd_byte *
5571savegpr0 (bfd *abfd, bfd_byte *p, int r)
5572{
5573 bfd_put_32 (abfd, STD_R0_0R1 + (r << 21) + (1 << 16) - (32 - r) * 8, p);
5574 return p + 4;
5575}
5576
5577static bfd_byte *
5578savegpr0_tail (bfd *abfd, bfd_byte *p, int r)
5579{
5580 p = savegpr0 (abfd, p, r);
a078d95a 5581 bfd_put_32 (abfd, STD_R0_0R1 + STK_LR, p);
deb0e272
AM
5582 p = p + 4;
5583 bfd_put_32 (abfd, BLR, p);
5584 return p + 4;
5585}
5586
5587static bfd_byte *
5588restgpr0 (bfd *abfd, bfd_byte *p, int r)
5589{
5590 bfd_put_32 (abfd, LD_R0_0R1 + (r << 21) + (1 << 16) - (32 - r) * 8, p);
5591 return p + 4;
5592}
5593
5594static bfd_byte *
5595restgpr0_tail (bfd *abfd, bfd_byte *p, int r)
5596{
a078d95a 5597 bfd_put_32 (abfd, LD_R0_0R1 + STK_LR, p);
deb0e272
AM
5598 p = p + 4;
5599 p = restgpr0 (abfd, p, r);
5600 bfd_put_32 (abfd, MTLR_R0, p);
5601 p = p + 4;
5602 if (r == 29)
5603 {
5604 p = restgpr0 (abfd, p, 30);
5605 p = restgpr0 (abfd, p, 31);
5606 }
5607 bfd_put_32 (abfd, BLR, p);
5608 return p + 4;
5609}
5610
5611static bfd_byte *
5612savegpr1 (bfd *abfd, bfd_byte *p, int r)
5613{
5614 bfd_put_32 (abfd, STD_R0_0R12 + (r << 21) + (1 << 16) - (32 - r) * 8, p);
5615 return p + 4;
5616}
5617
5618static bfd_byte *
5619savegpr1_tail (bfd *abfd, bfd_byte *p, int r)
5620{
5621 p = savegpr1 (abfd, p, r);
5622 bfd_put_32 (abfd, BLR, p);
5623 return p + 4;
5624}
5625
5626static bfd_byte *
5627restgpr1 (bfd *abfd, bfd_byte *p, int r)
5628{
5629 bfd_put_32 (abfd, LD_R0_0R12 + (r << 21) + (1 << 16) - (32 - r) * 8, p);
5630 return p + 4;
5631}
5632
5633static bfd_byte *
5634restgpr1_tail (bfd *abfd, bfd_byte *p, int r)
5635{
5636 p = restgpr1 (abfd, p, r);
5637 bfd_put_32 (abfd, BLR, p);
5638 return p + 4;
5639}
5640
5641static bfd_byte *
5642savefpr (bfd *abfd, bfd_byte *p, int r)
5643{
5644 bfd_put_32 (abfd, STFD_FR0_0R1 + (r << 21) + (1 << 16) - (32 - r) * 8, p);
5645 return p + 4;
5646}
5647
5648static bfd_byte *
5649savefpr0_tail (bfd *abfd, bfd_byte *p, int r)
5650{
5651 p = savefpr (abfd, p, r);
a078d95a 5652 bfd_put_32 (abfd, STD_R0_0R1 + STK_LR, p);
deb0e272
AM
5653 p = p + 4;
5654 bfd_put_32 (abfd, BLR, p);
5655 return p + 4;
5656}
5657
5658static bfd_byte *
5659restfpr (bfd *abfd, bfd_byte *p, int r)
5660{
5661 bfd_put_32 (abfd, LFD_FR0_0R1 + (r << 21) + (1 << 16) - (32 - r) * 8, p);
5662 return p + 4;
5663}
5664
5665static bfd_byte *
5666restfpr0_tail (bfd *abfd, bfd_byte *p, int r)
5667{
a078d95a 5668 bfd_put_32 (abfd, LD_R0_0R1 + STK_LR, p);
deb0e272
AM
5669 p = p + 4;
5670 p = restfpr (abfd, p, r);
5671 bfd_put_32 (abfd, MTLR_R0, p);
5672 p = p + 4;
5673 if (r == 29)
5674 {
5675 p = restfpr (abfd, p, 30);
5676 p = restfpr (abfd, p, 31);
5677 }
5678 bfd_put_32 (abfd, BLR, p);
5679 return p + 4;
5680}
5681
5682static bfd_byte *
5683savefpr1_tail (bfd *abfd, bfd_byte *p, int r)
5684{
5685 p = savefpr (abfd, p, r);
5686 bfd_put_32 (abfd, BLR, p);
5687 return p + 4;
5688}
5689
5690static bfd_byte *
5691restfpr1_tail (bfd *abfd, bfd_byte *p, int r)
5692{
5693 p = restfpr (abfd, p, r);
5694 bfd_put_32 (abfd, BLR, p);
5695 return p + 4;
5696}
5697
5698static bfd_byte *
5699savevr (bfd *abfd, bfd_byte *p, int r)
5700{
5701 bfd_put_32 (abfd, LI_R12_0 + (1 << 16) - (32 - r) * 16, p);
5702 p = p + 4;
5703 bfd_put_32 (abfd, STVX_VR0_R12_R0 + (r << 21), p);
5704 return p + 4;
5705}
5706
5707static bfd_byte *
5708savevr_tail (bfd *abfd, bfd_byte *p, int r)
5709{
5710 p = savevr (abfd, p, r);
5711 bfd_put_32 (abfd, BLR, p);
5712 return p + 4;
5713}
5714
5715static bfd_byte *
5716restvr (bfd *abfd, bfd_byte *p, int r)
5717{
5718 bfd_put_32 (abfd, LI_R12_0 + (1 << 16) - (32 - r) * 16, p);
5719 p = p + 4;
5720 bfd_put_32 (abfd, LVX_VR0_R12_R0 + (r << 21), p);
5721 return p + 4;
5722}
5723
5724static bfd_byte *
5725restvr_tail (bfd *abfd, bfd_byte *p, int r)
5726{
5727 p = restvr (abfd, p, r);
5728 bfd_put_32 (abfd, BLR, p);
5729 return p + 4;
5730}
5731
e86ce104
AM
5732/* Called via elf_link_hash_traverse to transfer dynamic linking
5733 information on function code symbol entries to their corresponding
5734 function descriptor symbol entries. */
deb0e272 5735
b34976b6 5736static bfd_boolean
4ce794b7 5737func_desc_adjust (struct elf_link_hash_entry *h, void *inf)
5bd4f169 5738{
e86ce104 5739 struct bfd_link_info *info;
65f38f15 5740 struct ppc_link_hash_table *htab;
50bc7936
AM
5741 struct ppc_link_hash_entry *fh;
5742 struct ppc_link_hash_entry *fdh;
5743 bfd_boolean force_local;
5bd4f169 5744
50bc7936
AM
5745 fh = (struct ppc_link_hash_entry *) h;
5746 if (fh->elf.root.type == bfd_link_hash_indirect)
b34976b6 5747 return TRUE;
e86ce104 5748
8c5b4e52
AM
5749 if (!fh->is_func)
5750 return TRUE;
5751
5752 if (fh->elf.root.root.string[0] != '.'
5753 || fh->elf.root.root.string[1] == '\0')
5754 return TRUE;
5755
4ce794b7 5756 info = inf;
65f38f15 5757 htab = ppc_hash_table (info);
4dfe6ac6
NC
5758 if (htab == NULL)
5759 return FALSE;
5bd4f169 5760
8c5b4e52
AM
5761 /* Find the corresponding function descriptor symbol. */
5762 fdh = lookup_fdh (fh, htab);
5763
c09bdfe5
AM
5764 /* Resolve undefined references to dot-symbols as the value
5765 in the function descriptor, if we have one in a regular object.
5766 This is to satisfy cases like ".quad .foo". Calls to functions
5767 in dynamic objects are handled elsewhere. */
8c5b4e52
AM
5768 if ((fh->elf.root.type == bfd_link_hash_undefined
5769 || fh->elf.root.type == bfd_link_hash_undefweak)
5770 && (fdh->elf.root.type == bfd_link_hash_defined
5771 || fdh->elf.root.type == bfd_link_hash_defweak)
b31867b6
AM
5772 && get_opd_info (fdh->elf.root.u.def.section) != NULL
5773 && opd_entry_value (fdh->elf.root.u.def.section,
5774 fdh->elf.root.u.def.value,
c09bdfe5 5775 &fh->elf.root.u.def.section,
aef36ac1 5776 &fh->elf.root.u.def.value, FALSE) != (bfd_vma) -1)
c09bdfe5 5777 {
b31867b6 5778 fh->elf.root.type = fdh->elf.root.type;
f5385ebf 5779 fh->elf.forced_local = 1;
b31867b6
AM
5780 fh->elf.def_regular = fdh->elf.def_regular;
5781 fh->elf.def_dynamic = fdh->elf.def_dynamic;
c09bdfe5
AM
5782 }
5783
8c5b4e52
AM
5784 if (!fh->elf.dynamic)
5785 {
5786 struct plt_entry *ent;
5bd4f169 5787
8c5b4e52
AM
5788 for (ent = fh->elf.plt.plist; ent != NULL; ent = ent->next)
5789 if (ent->plt.refcount > 0)
5790 break;
5791 if (ent == NULL)
5792 return TRUE;
5793 }
5bd4f169 5794
8c5b4e52 5795 /* Create a descriptor as undefined if necessary. */
50bc7936 5796 if (fdh == NULL
0e1862bb 5797 && !bfd_link_executable (info)
50bc7936
AM
5798 && (fh->elf.root.type == bfd_link_hash_undefined
5799 || fh->elf.root.type == bfd_link_hash_undefweak))
5800 {
908b32fc 5801 fdh = make_fdh (info, fh);
bb700d78
AM
5802 if (fdh == NULL)
5803 return FALSE;
50bc7936 5804 }
648cca2c 5805
8c5b4e52 5806 /* We can't support overriding of symbols on a fake descriptor. */
908b32fc
AM
5807 if (fdh != NULL
5808 && fdh->fake
8c5b4e52
AM
5809 && (fh->elf.root.type == bfd_link_hash_defined
5810 || fh->elf.root.type == bfd_link_hash_defweak))
5811 _bfd_elf_link_hash_hide_symbol (info, &fdh->elf, TRUE);
908b32fc 5812
8c5b4e52
AM
5813 /* Transfer dynamic linking information to the function descriptor. */
5814 if (fdh != NULL)
5815 {
f5385ebf
AM
5816 fdh->elf.ref_regular |= fh->elf.ref_regular;
5817 fdh->elf.ref_dynamic |= fh->elf.ref_dynamic;
5818 fdh->elf.ref_regular_nonweak |= fh->elf.ref_regular_nonweak;
5819 fdh->elf.non_got_ref |= fh->elf.non_got_ref;
8c5b4e52
AM
5820 fdh->elf.dynamic |= fh->elf.dynamic;
5821 fdh->elf.needs_plt |= (fh->elf.needs_plt
5822 || fh->elf.type == STT_FUNC
5823 || fh->elf.type == STT_GNU_IFUNC);
5824 move_plt_plist (fh, fdh);
5825
5826 if (!fdh->elf.forced_local
5827 && fh->elf.dynindx != -1)
5828 if (!bfd_elf_link_record_dynamic_symbol (info, &fdh->elf))
5829 return FALSE;
e86ce104
AM
5830 }
5831
50bc7936
AM
5832 /* Now that the info is on the function descriptor, clear the
5833 function code sym info. Any function code syms for which we
5834 don't have a definition in a regular file, we force local.
5835 This prevents a shared library from exporting syms that have
5836 been imported from another library. Function code syms that
5837 are really in the library we must leave global to prevent the
5838 linker dragging in a definition from a static library. */
93f3fa99
AM
5839 force_local = (!fh->elf.def_regular
5840 || fdh == NULL
5841 || !fdh->elf.def_regular
5842 || fdh->elf.forced_local);
50bc7936
AM
5843 _bfd_elf_link_hash_hide_symbol (info, &fh->elf, force_local);
5844
b34976b6 5845 return TRUE;
e86ce104 5846}
40b8271b 5847
a4b6fadd
AM
5848static const struct sfpr_def_parms save_res_funcs[] =
5849 {
5850 { "_savegpr0_", 14, 31, savegpr0, savegpr0_tail },
5851 { "_restgpr0_", 14, 29, restgpr0, restgpr0_tail },
5852 { "_restgpr0_", 30, 31, restgpr0, restgpr0_tail },
5853 { "_savegpr1_", 14, 31, savegpr1, savegpr1_tail },
5854 { "_restgpr1_", 14, 31, restgpr1, restgpr1_tail },
5855 { "_savefpr_", 14, 31, savefpr, savefpr0_tail },
5856 { "_restfpr_", 14, 29, restfpr, restfpr0_tail },
5857 { "_restfpr_", 30, 31, restfpr, restfpr0_tail },
5858 { "._savef", 14, 31, savefpr, savefpr1_tail },
5859 { "._restf", 14, 31, restfpr, restfpr1_tail },
5860 { "_savevr_", 20, 31, savevr, savevr_tail },
5861 { "_restvr_", 20, 31, restvr, restvr_tail }
5862 };
5863
e86ce104 5864/* Called near the start of bfd_elf_size_dynamic_sections. We use
82bd7b59
AM
5865 this hook to a) provide some gcc support functions, and b) transfer
5866 dynamic linking information gathered so far on function code symbol
5867 entries, to their corresponding function descriptor symbol entries. */
deb0e272 5868
b34976b6 5869static bfd_boolean
4ce794b7
AM
5870ppc64_elf_func_desc_adjust (bfd *obfd ATTRIBUTE_UNUSED,
5871 struct bfd_link_info *info)
e86ce104
AM
5872{
5873 struct ppc_link_hash_table *htab;
5874
5875 htab = ppc_hash_table (info);
4dfe6ac6
NC
5876 if (htab == NULL)
5877 return FALSE;
5878
b32547cd
AM
5879 /* Provide any missing _save* and _rest* functions. */
5880 if (htab->sfpr != NULL)
5881 {
5882 unsigned int i;
5883
5884 htab->sfpr->size = 0;
5885 for (i = 0; i < ARRAY_SIZE (save_res_funcs); i++)
5886 if (!sfpr_define (info, &save_res_funcs[i], NULL))
5887 return FALSE;
5888 if (htab->sfpr->size == 0)
5889 htab->sfpr->flags |= SEC_EXCLUDE;
5890 }
5891
5892 if (bfd_link_relocatable (info))
5893 return TRUE;
5894
5895 if (htab->elf.hgot != NULL)
dba6fa9b
AM
5896 {
5897 _bfd_elf_link_hash_hide_symbol (info, htab->elf.hgot, TRUE);
5898 /* Make .TOC. defined so as to prevent it being made dynamic.
5899 The wrong value here is fixed later in ppc64_elf_set_toc. */
43417696
AM
5900 if (!htab->elf.hgot->def_regular
5901 || htab->elf.hgot->root.type != bfd_link_hash_defined)
5902 {
5903 htab->elf.hgot->root.type = bfd_link_hash_defined;
5904 htab->elf.hgot->root.u.def.value = 0;
5905 htab->elf.hgot->root.u.def.section = bfd_abs_section_ptr;
5906 htab->elf.hgot->def_regular = 1;
5907 htab->elf.hgot->root.linker_def = 1;
5908 }
dba6fa9b 5909 htab->elf.hgot->type = STT_OBJECT;
2cdcc330
AM
5910 htab->elf.hgot->other
5911 = (htab->elf.hgot->other & ~ELF_ST_VISIBILITY (-1)) | STV_HIDDEN;
dba6fa9b 5912 }
c66bb0ee 5913
8c5b4e52
AM
5914 if (htab->need_func_desc_adj)
5915 {
5916 elf_link_hash_traverse (&htab->elf, func_desc_adjust, info);
5917 htab->need_func_desc_adj = 0;
5918 }
805fc799 5919
b34976b6 5920 return TRUE;
e86ce104
AM
5921}
5922
98bbb1b8 5923/* Find dynamic relocs for H that apply to read-only sections. */
a345bc8d 5924
98bbb1b8 5925static asection *
a345bc8d
AM
5926readonly_dynrelocs (struct elf_link_hash_entry *h)
5927{
5928 struct ppc_link_hash_entry *eh;
5929 struct elf_dyn_relocs *p;
5930
5931 eh = (struct ppc_link_hash_entry *) h;
5932 for (p = eh->dyn_relocs; p != NULL; p = p->next)
5933 {
5934 asection *s = p->sec->output_section;
5935
5936 if (s != NULL && (s->flags & SEC_READONLY) != 0)
98bbb1b8 5937 return p->sec;
a345bc8d 5938 }
98bbb1b8 5939 return NULL;
a345bc8d
AM
5940}
5941
d311bc8b 5942/* Return true if we have dynamic relocs against H or any of its weak
ab2477e1
AM
5943 aliases, that apply to read-only sections. Cannot be used after
5944 size_dynamic_sections. */
d311bc8b
AM
5945
5946static bfd_boolean
5947alias_readonly_dynrelocs (struct elf_link_hash_entry *h)
5948{
5949 struct ppc_link_hash_entry *eh;
5950
5951 eh = (struct ppc_link_hash_entry *) h;
5952 do
5953 {
5954 if (readonly_dynrelocs (&eh->elf))
5955 return TRUE;
ab2477e1 5956 eh = (struct ppc_link_hash_entry *) eh->elf.u.alias;
2cdcc330
AM
5957 }
5958 while (eh != NULL && &eh->elf != h);
d311bc8b
AM
5959
5960 return FALSE;
5961}
8a2058b5 5962
8a9e8e72
AM
5963/* Return whether EH has pc-relative dynamic relocs. */
5964
5965static bfd_boolean
5966pc_dynrelocs (struct ppc_link_hash_entry *eh)
5967{
5968 struct elf_dyn_relocs *p;
5969
5970 for (p = eh->dyn_relocs; p != NULL; p = p->next)
5971 if (p->pc_count != 0)
5972 return TRUE;
5973 return FALSE;
5974}
5975
8a2058b5
AM
5976/* Return true if a global entry stub will be created for H. Valid
5977 for ELFv2 before plt entries have been allocated. */
5978
5979static bfd_boolean
5980global_entry_stub (struct elf_link_hash_entry *h)
5981{
5982 struct plt_entry *pent;
5983
5984 if (!h->pointer_equality_needed
5985 || h->def_regular)
5986 return FALSE;
5987
5988 for (pent = h->plt.plist; pent != NULL; pent = pent->next)
5989 if (pent->plt.refcount > 0
5990 && pent->addend == 0)
5991 return TRUE;
5992
5993 return FALSE;
5994}
5995
e86ce104
AM
5996/* Adjust a symbol defined by a dynamic object and referenced by a
5997 regular object. The current definition is in some section of the
5998 dynamic object, but we're not including those sections. We have to
5999 change the definition to something the rest of the link can
6000 understand. */
6001
b34976b6 6002static bfd_boolean
4ce794b7
AM
6003ppc64_elf_adjust_dynamic_symbol (struct bfd_link_info *info,
6004 struct elf_link_hash_entry *h)
e86ce104
AM
6005{
6006 struct ppc_link_hash_table *htab;
5474d94f 6007 asection *s, *srel;
e86ce104
AM
6008
6009 htab = ppc_hash_table (info);
4dfe6ac6
NC
6010 if (htab == NULL)
6011 return FALSE;
e86ce104
AM
6012
6013 /* Deal with function syms. */
6014 if (h->type == STT_FUNC
e054468f 6015 || h->type == STT_GNU_IFUNC
f5385ebf 6016 || h->needs_plt)
e86ce104 6017 {
529fe20e
AM
6018 bfd_boolean local = (((struct ppc_link_hash_entry *) h)->save_res
6019 || SYMBOL_CALLS_LOCAL (info, h)
6020 || UNDEFWEAK_NO_DYNAMIC_RELOC (info, h));
6021 /* Discard dyn_relocs when non-pic if we've decided that a
6022 function symbol is local and not an ifunc. We keep dynamic
6023 relocs for ifuncs when local rather than always emitting a
6024 plt call stub for them and defining the symbol on the call
6025 stub. We can't do that for ELFv1 anyway (a function symbol
6026 is defined on a descriptor, not code) and it can be faster at
6027 run-time due to not needing to bounce through a stub. The
6028 dyn_relocs for ifuncs will be applied even in a static
6029 executable. */
6030 if (!bfd_link_pic (info)
6031 && h->type != STT_GNU_IFUNC
6032 && local)
6033 ((struct ppc_link_hash_entry *) h)->dyn_relocs = NULL;
6034
e86ce104
AM
6035 /* Clear procedure linkage table information for any symbol that
6036 won't need a .plt entry. */
411e1bfb
AM
6037 struct plt_entry *ent;
6038 for (ent = h->plt.plist; ent != NULL; ent = ent->next)
6039 if (ent->plt.refcount > 0)
6040 break;
8387904d 6041 if (ent == NULL
2d7ad24e
AM
6042 || (h->type != STT_GNU_IFUNC
6043 && local
3e04d765
AM
6044 && (htab->can_convert_all_inline_plt
6045 || (((struct ppc_link_hash_entry *) h)->tls_mask
6046 & (TLS_TLS | PLT_KEEP)) != PLT_KEEP)))
40b8271b 6047 {
411e1bfb 6048 h->plt.plist = NULL;
f5385ebf 6049 h->needs_plt = 0;
d1eca1e4 6050 h->pointer_equality_needed = 0;
40b8271b 6051 }
8a2058b5 6052 else if (abiversion (info->output_bfd) >= 2)
a345bc8d 6053 {
d1eca1e4
AM
6054 /* Taking a function's address in a read/write section
6055 doesn't require us to define the function symbol in the
6056 executable on a global entry stub. A dynamic reloc can
8a2058b5
AM
6057 be used instead. The reason we prefer a few more dynamic
6058 relocs is that calling via a global entry stub costs a
6059 few more instructions, and pointer_equality_needed causes
6060 extra work in ld.so when resolving these symbols. */
529fe20e 6061 if (global_entry_stub (h))
d1eca1e4 6062 {
ab2477e1 6063 if (!readonly_dynrelocs (h))
529fe20e
AM
6064 {
6065 h->pointer_equality_needed = 0;
04383fd1
AM
6066 /* If we haven't seen a branch reloc and the symbol
6067 isn't an ifunc then we don't need a plt entry. */
529fe20e
AM
6068 if (!h->needs_plt)
6069 h->plt.plist = NULL;
6070 }
6071 else if (!bfd_link_pic (info))
6072 /* We are going to be defining the function symbol on the
6073 plt stub, so no dyn_relocs needed when non-pic. */
6074 ((struct ppc_link_hash_entry *) h)->dyn_relocs = NULL;
d1eca1e4
AM
6075 }
6076
3988aed5
AM
6077 /* ELFv2 function symbols can't have copy relocs. */
6078 return TRUE;
6079 }
6080 else if (!h->needs_plt
ab2477e1 6081 && !readonly_dynrelocs (h))
3988aed5 6082 {
04383fd1
AM
6083 /* If we haven't seen a branch reloc and the symbol isn't an
6084 ifunc then we don't need a plt entry. */
3988aed5
AM
6085 h->plt.plist = NULL;
6086 h->pointer_equality_needed = 0;
a345bc8d
AM
6087 return TRUE;
6088 }
5bd4f169 6089 }
bbd7ec4a 6090 else
411e1bfb 6091 h->plt.plist = NULL;
5bd4f169
AM
6092
6093 /* If this is a weak symbol, and there is a real definition, the
6094 processor independent code will have arranged for us to see the
6095 real definition first, and we can just use the same value. */
60d67dc8 6096 if (h->is_weakalias)
5bd4f169 6097 {
60d67dc8
AM
6098 struct elf_link_hash_entry *def = weakdef (h);
6099 BFD_ASSERT (def->root.type == bfd_link_hash_defined);
6100 h->root.u.def.section = def->root.u.def.section;
6101 h->root.u.def.value = def->root.u.def.value;
4a7e5234
AM
6102 if (def->root.u.def.section == htab->elf.sdynbss
6103 || def->root.u.def.section == htab->elf.sdynrelro)
6104 ((struct ppc_link_hash_entry *) h)->dyn_relocs = NULL;
b34976b6 6105 return TRUE;
5bd4f169
AM
6106 }
6107
5bd4f169
AM
6108 /* If we are creating a shared library, we must presume that the
6109 only references to the symbol are via the global offset table.
6110 For such cases we need not do anything here; the relocations will
6111 be handled correctly by relocate_section. */
0e1862bb 6112 if (bfd_link_pic (info))
b34976b6 6113 return TRUE;
5bd4f169 6114
65f38f15
AM
6115 /* If there are no references to this symbol that do not use the
6116 GOT, we don't need to generate a copy reloc. */
f5385ebf 6117 if (!h->non_got_ref)
b34976b6 6118 return TRUE;
65f38f15 6119
b186458a 6120 /* Don't generate a copy reloc for symbols defined in the executable. */
d93d1c80 6121 if (!h->def_dynamic || !h->ref_regular || h->def_regular
b186458a 6122
d93d1c80
AM
6123 /* If -z nocopyreloc was given, don't generate them either. */
6124 || info->nocopyreloc
a127494f 6125
dce2246a 6126 /* If we don't find any dynamic relocs in read-only sections, then
d93d1c80 6127 we'll be keeping the dynamic relocs and avoiding the copy reloc. */
d311bc8b 6128 || (ELIMINATE_COPY_RELOCS && !alias_readonly_dynrelocs (h))
65f38f15 6129
d93d1c80
AM
6130 /* Protected variables do not work with .dynbss. The copy in
6131 .dynbss won't be used by the shared library with the protected
6132 definition for the variable. Text relocations are preferable
6133 to an incorrect program. */
6134 || h->protected_def)
529fe20e 6135 return TRUE;
a127494f 6136
5d35169e 6137 if (h->plt.plist != NULL)
97b639ba
AM
6138 {
6139 /* We should never get here, but unfortunately there are versions
6140 of gcc out there that improperly (for this ABI) put initialized
6141 function pointers, vtable refs and suchlike in read-only
6142 sections. Allow them to proceed, but warn that this might
6143 break at runtime. */
25f53a85 6144 info->callbacks->einfo
c1c8c1ef 6145 (_("%P: copy reloc against `%pT' requires lazy plt linking; "
25f53a85 6146 "avoid setting LD_BIND_NOW=1 or upgrade gcc\n"),
97b639ba
AM
6147 h->root.root.string);
6148 }
5d35169e
AM
6149
6150 /* This is a reference to a symbol defined by a dynamic object which
6151 is not a function. */
6152
5bd4f169
AM
6153 /* We must allocate the symbol in our .dynbss section, which will
6154 become part of the .bss section of the executable. There will be
6155 an entry for this symbol in the .dynsym section. The dynamic
6156 object will contain position independent code, so all references
6157 from the dynamic object to this symbol will go through the global
6158 offset table. The dynamic linker will use the .dynsym entry to
6159 determine the address it must put in the global offset table, so
6160 both the dynamic object and the regular object will refer to the
6161 same memory location for the variable. */
5474d94f
AM
6162 if ((h->root.u.def.section->flags & SEC_READONLY) != 0)
6163 {
6164 s = htab->elf.sdynrelro;
6165 srel = htab->elf.sreldynrelro;
6166 }
6167 else
6168 {
6169 s = htab->elf.sdynbss;
6170 srel = htab->elf.srelbss;
6171 }
1d7e9d18 6172 if ((h->root.u.def.section->flags & SEC_ALLOC) != 0 && h->size != 0)
5bd4f169 6173 {
4a7e5234
AM
6174 /* We must generate a R_PPC64_COPY reloc to tell the dynamic
6175 linker to copy the initial value out of the dynamic object
6176 and into the runtime process image. */
5474d94f 6177 srel->size += sizeof (Elf64_External_Rela);
f5385ebf 6178 h->needs_copy = 1;
5bd4f169
AM
6179 }
6180
529fe20e
AM
6181 /* We no longer want dyn_relocs. */
6182 ((struct ppc_link_hash_entry *) h)->dyn_relocs = NULL;
6cabe1ea 6183 return _bfd_elf_adjust_dynamic_copy (info, h, s);
5bd4f169
AM
6184}
6185
e86ce104
AM
6186/* If given a function descriptor symbol, hide both the function code
6187 sym and the descriptor. */
6188static void
4ce794b7
AM
6189ppc64_elf_hide_symbol (struct bfd_link_info *info,
6190 struct elf_link_hash_entry *h,
6191 bfd_boolean force_local)
e86ce104 6192{
34814b9f 6193 struct ppc_link_hash_entry *eh;
e86ce104
AM
6194 _bfd_elf_link_hash_hide_symbol (info, h, force_local);
6195
34814b9f
AM
6196 eh = (struct ppc_link_hash_entry *) h;
6197 if (eh->is_func_descriptor)
e86ce104 6198 {
34814b9f 6199 struct ppc_link_hash_entry *fh = eh->oh;
e86ce104 6200
721956f4 6201 if (fh == NULL)
d1329ca3
AM
6202 {
6203 const char *p, *q;
b8ac2841 6204 struct elf_link_hash_table *htab = elf_hash_table (info);
d1329ca3
AM
6205 char save;
6206
6207 /* We aren't supposed to use alloca in BFD because on
6208 systems which do not have alloca the version in libiberty
6209 calls xmalloc, which might cause the program to crash
6210 when it runs out of memory. This function doesn't have a
6211 return status, so there's no way to gracefully return an
6212 error. So cheat. We know that string[-1] can be safely
34814b9f
AM
6213 accessed; It's either a string in an ELF string table,
6214 or allocated in an objalloc structure. */
d1329ca3 6215
34814b9f 6216 p = eh->elf.root.root.string - 1;
d1329ca3
AM
6217 save = *p;
6218 *(char *) p = '.';
34814b9f 6219 fh = (struct ppc_link_hash_entry *)
b8ac2841 6220 elf_link_hash_lookup (htab, p, FALSE, FALSE, FALSE);
d1329ca3
AM
6221 *(char *) p = save;
6222
6223 /* Unfortunately, if it so happens that the string we were
6224 looking for was allocated immediately before this string,
6225 then we overwrote the string terminator. That's the only
6226 reason the lookup should fail. */
6227 if (fh == NULL)
6228 {
34814b9f
AM
6229 q = eh->elf.root.root.string + strlen (eh->elf.root.root.string);
6230 while (q >= eh->elf.root.root.string && *q == *p)
d1329ca3 6231 --q, --p;
34814b9f
AM
6232 if (q < eh->elf.root.root.string && *p == '.')
6233 fh = (struct ppc_link_hash_entry *)
b8ac2841 6234 elf_link_hash_lookup (htab, p, FALSE, FALSE, FALSE);
d1329ca3
AM
6235 }
6236 if (fh != NULL)
6237 {
34814b9f
AM
6238 eh->oh = fh;
6239 fh->oh = eh;
d1329ca3
AM
6240 }
6241 }
e86ce104 6242 if (fh != NULL)
34814b9f 6243 _bfd_elf_link_hash_hide_symbol (info, &fh->elf, force_local);
e86ce104
AM
6244 }
6245}
6246
411e1bfb 6247static bfd_boolean
8843416a
AM
6248get_sym_h (struct elf_link_hash_entry **hp,
6249 Elf_Internal_Sym **symp,
6250 asection **symsecp,
f961d9dd 6251 unsigned char **tls_maskp,
8843416a
AM
6252 Elf_Internal_Sym **locsymsp,
6253 unsigned long r_symndx,
6254 bfd *ibfd)
411e1bfb 6255{
0ffa91dd 6256 Elf_Internal_Shdr *symtab_hdr = &elf_symtab_hdr (ibfd);
411e1bfb
AM
6257
6258 if (r_symndx >= symtab_hdr->sh_info)
6259 {
6260 struct elf_link_hash_entry **sym_hashes = elf_sym_hashes (ibfd);
6261 struct elf_link_hash_entry *h;
6262
6263 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
b31867b6 6264 h = elf_follow_link (h);
411e1bfb
AM
6265
6266 if (hp != NULL)
6267 *hp = h;
6268
6269 if (symp != NULL)
6270 *symp = NULL;
6271
6272 if (symsecp != NULL)
6273 {
6274 asection *symsec = NULL;
6275 if (h->root.type == bfd_link_hash_defined
6276 || h->root.type == bfd_link_hash_defweak)
6277 symsec = h->root.u.def.section;
6278 *symsecp = symsec;
6279 }
6280
e7b938ca 6281 if (tls_maskp != NULL)
411e1bfb
AM
6282 {
6283 struct ppc_link_hash_entry *eh;
6284
6285 eh = (struct ppc_link_hash_entry *) h;
e7b938ca 6286 *tls_maskp = &eh->tls_mask;
411e1bfb
AM
6287 }
6288 }
6289 else
6290 {
6291 Elf_Internal_Sym *sym;
6292 Elf_Internal_Sym *locsyms = *locsymsp;
6293
6294 if (locsyms == NULL)
6295 {
6296 locsyms = (Elf_Internal_Sym *) symtab_hdr->contents;
6297 if (locsyms == NULL)
6298 locsyms = bfd_elf_get_elf_syms (ibfd, symtab_hdr,
6299 symtab_hdr->sh_info,
6300 0, NULL, NULL, NULL);
6301 if (locsyms == NULL)
6302 return FALSE;
6303 *locsymsp = locsyms;
6304 }
6305 sym = locsyms + r_symndx;
6306
6307 if (hp != NULL)
6308 *hp = NULL;
6309
6310 if (symp != NULL)
6311 *symp = sym;
6312
6313 if (symsecp != NULL)
cb33740c 6314 *symsecp = bfd_section_from_elf_index (ibfd, sym->st_shndx);
411e1bfb 6315
e7b938ca 6316 if (tls_maskp != NULL)
411e1bfb
AM
6317 {
6318 struct got_entry **lgot_ents;
f961d9dd 6319 unsigned char *tls_mask;
411e1bfb 6320
e7b938ca 6321 tls_mask = NULL;
411e1bfb
AM
6322 lgot_ents = elf_local_got_ents (ibfd);
6323 if (lgot_ents != NULL)
6324 {
e054468f
AM
6325 struct plt_entry **local_plt = (struct plt_entry **)
6326 (lgot_ents + symtab_hdr->sh_info);
f961d9dd 6327 unsigned char *lgot_masks = (unsigned char *)
e054468f 6328 (local_plt + symtab_hdr->sh_info);
e7b938ca 6329 tls_mask = &lgot_masks[r_symndx];
411e1bfb 6330 }
e7b938ca 6331 *tls_maskp = tls_mask;
411e1bfb
AM
6332 }
6333 }
6334 return TRUE;
6335}
6336
e7b938ca 6337/* Returns TLS_MASKP for the given REL symbol. Function return is 0 on
951fd09b 6338 error, 2 on a toc GD type suitable for optimization, 3 on a toc LD
ad8e1ba5 6339 type suitable for optimization, and 1 otherwise. */
951fd09b
AM
6340
6341static int
f961d9dd 6342get_tls_mask (unsigned char **tls_maskp,
3a71aa26
AM
6343 unsigned long *toc_symndx,
6344 bfd_vma *toc_addend,
0d4792f7 6345 Elf_Internal_Sym **locsymsp,
3a71aa26
AM
6346 const Elf_Internal_Rela *rel,
6347 bfd *ibfd)
411e1bfb
AM
6348{
6349 unsigned long r_symndx;
0d4792f7 6350 int next_r;
411e1bfb
AM
6351 struct elf_link_hash_entry *h;
6352 Elf_Internal_Sym *sym;
6353 asection *sec;
6354 bfd_vma off;
6355
6356 r_symndx = ELF64_R_SYM (rel->r_info);
e7b938ca 6357 if (!get_sym_h (&h, &sym, &sec, tls_maskp, locsymsp, r_symndx, ibfd))
951fd09b 6358 return 0;
411e1bfb 6359
37da22e5
AM
6360 if ((*tls_maskp != NULL
6361 && (**tls_maskp & TLS_TLS) != 0
6362 && **tls_maskp != (TLS_TLS | TLS_MARK))
411e1bfb 6363 || sec == NULL
6bee8834 6364 || ppc64_elf_section_data (sec) == NULL
7c8fe5c4 6365 || ppc64_elf_section_data (sec)->sec_type != sec_toc)
951fd09b 6366 return 1;
411e1bfb
AM
6367
6368 /* Look inside a TOC section too. */
6369 if (h != NULL)
6370 {
6371 BFD_ASSERT (h->root.type == bfd_link_hash_defined);
6372 off = h->root.u.def.value;
6373 }
6374 else
6375 off = sym->st_value;
6376 off += rel->r_addend;
6377 BFD_ASSERT (off % 8 == 0);
3a71aa26
AM
6378 r_symndx = ppc64_elf_section_data (sec)->u.toc.symndx[off / 8];
6379 next_r = ppc64_elf_section_data (sec)->u.toc.symndx[off / 8 + 1];
0d4792f7
AM
6380 if (toc_symndx != NULL)
6381 *toc_symndx = r_symndx;
3a71aa26
AM
6382 if (toc_addend != NULL)
6383 *toc_addend = ppc64_elf_section_data (sec)->u.toc.add[off / 8];
6384 if (!get_sym_h (&h, &sym, &sec, tls_maskp, locsymsp, r_symndx, ibfd))
6385 return 0;
854b41e7 6386 if ((h == NULL || is_static_defined (h))
0d4792f7
AM
6387 && (next_r == -1 || next_r == -2))
6388 return 1 - next_r;
951fd09b 6389 return 1;
411e1bfb
AM
6390}
6391
3b421ab3
AM
6392/* Find (or create) an entry in the tocsave hash table. */
6393
6394static struct tocsave_entry *
6395tocsave_find (struct ppc_link_hash_table *htab,
6396 enum insert_option insert,
6397 Elf_Internal_Sym **local_syms,
6398 const Elf_Internal_Rela *irela,
6399 bfd *ibfd)
6400{
6401 unsigned long r_indx;
6402 struct elf_link_hash_entry *h;
6403 Elf_Internal_Sym *sym;
6404 struct tocsave_entry ent, *p;
6405 hashval_t hash;
6406 struct tocsave_entry **slot;
6407
6408 r_indx = ELF64_R_SYM (irela->r_info);
6409 if (!get_sym_h (&h, &sym, &ent.sec, NULL, local_syms, r_indx, ibfd))
6410 return NULL;
6411 if (ent.sec == NULL || ent.sec->output_section == NULL)
6412 {
4eca0228 6413 _bfd_error_handler
871b3ab2 6414 (_("%pB: undefined symbol on R_PPC64_TOCSAVE relocation"), ibfd);
3b421ab3
AM
6415 return NULL;
6416 }
6417
6418 if (h != NULL)
6419 ent.offset = h->root.u.def.value;
6420 else
6421 ent.offset = sym->st_value;
6422 ent.offset += irela->r_addend;
6423
6424 hash = tocsave_htab_hash (&ent);
6425 slot = ((struct tocsave_entry **)
6426 htab_find_slot_with_hash (htab->tocsave_htab, &ent, hash, insert));
6427 if (slot == NULL)
6428 return NULL;
6429
6430 if (*slot == NULL)
6431 {
6432 p = (struct tocsave_entry *) bfd_alloc (ibfd, sizeof (*p));
6433 if (p == NULL)
6434 return NULL;
6435 *p = ent;
6436 *slot = p;
6437 }
6438 return *slot;
6439}
6440
754021d0 6441/* Adjust all global syms defined in opd sections. In gcc generated
8387904d 6442 code for the old ABI, these will already have been done. */
754021d0
AM
6443
6444static bfd_boolean
6445adjust_opd_syms (struct elf_link_hash_entry *h, void *inf ATTRIBUTE_UNUSED)
6446{
6447 struct ppc_link_hash_entry *eh;
6448 asection *sym_sec;
74f0fb50 6449 struct _opd_sec_data *opd;
754021d0
AM
6450
6451 if (h->root.type == bfd_link_hash_indirect)
6452 return TRUE;
6453
754021d0
AM
6454 if (h->root.type != bfd_link_hash_defined
6455 && h->root.type != bfd_link_hash_defweak)
6456 return TRUE;
6457
6458 eh = (struct ppc_link_hash_entry *) h;
6459 if (eh->adjust_done)
6460 return TRUE;
6461
6462 sym_sec = eh->elf.root.u.def.section;
74f0fb50
AM
6463 opd = get_opd_info (sym_sec);
6464 if (opd != NULL && opd->adjust != NULL)
754021d0 6465 {
51aecdc5 6466 long adjust = opd->adjust[OPD_NDX (eh->elf.root.u.def.value)];
4025353c
AM
6467 if (adjust == -1)
6468 {
6469 /* This entry has been deleted. */
b3fac117 6470 asection *dsec = ppc64_elf_tdata (sym_sec->owner)->deleted_section;
81688140
AM
6471 if (dsec == NULL)
6472 {
6473 for (dsec = sym_sec->owner->sections; dsec; dsec = dsec->next)
dbaa2011 6474 if (discarded_section (dsec))
81688140 6475 {
b3fac117 6476 ppc64_elf_tdata (sym_sec->owner)->deleted_section = dsec;
81688140
AM
6477 break;
6478 }
6479 }
4025353c 6480 eh->elf.root.u.def.value = 0;
81688140 6481 eh->elf.root.u.def.section = dsec;
4025353c
AM
6482 }
6483 else
6484 eh->elf.root.u.def.value += adjust;
754021d0
AM
6485 eh->adjust_done = 1;
6486 }
6487 return TRUE;
6488}
6489
8c1d1bb8 6490/* Handles decrementing dynamic reloc counts for the reloc specified by
19e08130 6491 R_INFO in section SEC. If LOCAL_SYMS is NULL, then H and SYM
8c1d1bb8
AM
6492 have already been determined. */
6493
6494static bfd_boolean
6495dec_dynrel_count (bfd_vma r_info,
6496 asection *sec,
6497 struct bfd_link_info *info,
6498 Elf_Internal_Sym **local_syms,
6499 struct elf_link_hash_entry *h,
19e08130 6500 Elf_Internal_Sym *sym)
8c1d1bb8
AM
6501{
6502 enum elf_ppc64_reloc_type r_type;
19e08130 6503 asection *sym_sec = NULL;
8c1d1bb8
AM
6504
6505 /* Can this reloc be dynamic? This switch, and later tests here
6506 should be kept in sync with the code in check_relocs. */
6507 r_type = ELF64_R_TYPE (r_info);
6508 switch (r_type)
6509 {
6510 default:
6511 return TRUE;
6512
6513 case R_PPC64_TPREL16:
6514 case R_PPC64_TPREL16_LO:
6515 case R_PPC64_TPREL16_HI:
6516 case R_PPC64_TPREL16_HA:
6517 case R_PPC64_TPREL16_DS:
6518 case R_PPC64_TPREL16_LO_DS:
f9c6b907
AM
6519 case R_PPC64_TPREL16_HIGH:
6520 case R_PPC64_TPREL16_HIGHA:
8c1d1bb8
AM
6521 case R_PPC64_TPREL16_HIGHER:
6522 case R_PPC64_TPREL16_HIGHERA:
6523 case R_PPC64_TPREL16_HIGHEST:
6524 case R_PPC64_TPREL16_HIGHESTA:
8c1d1bb8
AM
6525 case R_PPC64_TPREL64:
6526 case R_PPC64_DTPMOD64:
6527 case R_PPC64_DTPREL64:
6528 case R_PPC64_ADDR64:
6529 case R_PPC64_REL30:
6530 case R_PPC64_REL32:
6531 case R_PPC64_REL64:
6532 case R_PPC64_ADDR14:
6533 case R_PPC64_ADDR14_BRNTAKEN:
6534 case R_PPC64_ADDR14_BRTAKEN:
6535 case R_PPC64_ADDR16:
6536 case R_PPC64_ADDR16_DS:
6537 case R_PPC64_ADDR16_HA:
6538 case R_PPC64_ADDR16_HI:
f9c6b907
AM
6539 case R_PPC64_ADDR16_HIGH:
6540 case R_PPC64_ADDR16_HIGHA:
8c1d1bb8
AM
6541 case R_PPC64_ADDR16_HIGHER:
6542 case R_PPC64_ADDR16_HIGHERA:
6543 case R_PPC64_ADDR16_HIGHEST:
6544 case R_PPC64_ADDR16_HIGHESTA:
6545 case R_PPC64_ADDR16_LO:
6546 case R_PPC64_ADDR16_LO_DS:
6547 case R_PPC64_ADDR24:
6548 case R_PPC64_ADDR32:
6549 case R_PPC64_UADDR16:
6550 case R_PPC64_UADDR32:
6551 case R_PPC64_UADDR64:
6552 case R_PPC64_TOC:
6553 break;
6554 }
6555
6556 if (local_syms != NULL)
6557 {
6558 unsigned long r_symndx;
8c1d1bb8
AM
6559 bfd *ibfd = sec->owner;
6560
6561 r_symndx = ELF64_R_SYM (r_info);
6562 if (!get_sym_h (&h, &sym, &sym_sec, NULL, local_syms, r_symndx, ibfd))
6563 return FALSE;
6564 }
6565
0e1862bb 6566 if ((bfd_link_pic (info)
1d483afe 6567 && (must_be_dyn_reloc (info, r_type)
8c1d1bb8 6568 || (h != NULL
198f1157 6569 && (!SYMBOLIC_BIND (info, h)
8c1d1bb8
AM
6570 || h->root.type == bfd_link_hash_defweak
6571 || !h->def_regular))))
6572 || (ELIMINATE_COPY_RELOCS
0e1862bb 6573 && !bfd_link_pic (info)
8c1d1bb8
AM
6574 && h != NULL
6575 && (h->root.type == bfd_link_hash_defweak
6576 || !h->def_regular)))
6577 ;
6578 else
6579 return TRUE;
6580
6581 if (h != NULL)
6edfbbad 6582 {
19e08130
AM
6583 struct elf_dyn_relocs *p;
6584 struct elf_dyn_relocs **pp;
6585 pp = &((struct ppc_link_hash_entry *) h)->dyn_relocs;
6586
6587 /* elf_gc_sweep may have already removed all dyn relocs associated
6588 with local syms for a given section. Also, symbol flags are
6589 changed by elf_gc_sweep_symbol, confusing the test above. Don't
6590 report a dynreloc miscount. */
6591 if (*pp == NULL && info->gc_sections)
6592 return TRUE;
6593
6594 while ((p = *pp) != NULL)
60124e18 6595 {
19e08130
AM
6596 if (p->sec == sec)
6597 {
6598 if (!must_be_dyn_reloc (info, r_type))
6599 p->pc_count -= 1;
6600 p->count -= 1;
6601 if (p->count == 0)
6602 *pp = p->next;
6603 return TRUE;
6604 }
6605 pp = &p->next;
60124e18 6606 }
6edfbbad 6607 }
19e08130
AM
6608 else
6609 {
6610 struct ppc_dyn_relocs *p;
6611 struct ppc_dyn_relocs **pp;
6612 void *vpp;
6613 bfd_boolean is_ifunc;
8c1d1bb8 6614
19e08130
AM
6615 if (local_syms == NULL)
6616 sym_sec = bfd_section_from_elf_index (sec->owner, sym->st_shndx);
6617 if (sym_sec == NULL)
6618 sym_sec = sec;
c57da1a7 6619
19e08130
AM
6620 vpp = &elf_section_data (sym_sec)->local_dynrel;
6621 pp = (struct ppc_dyn_relocs **) vpp;
6622
6623 if (*pp == NULL && info->gc_sections)
6624 return TRUE;
6625
6626 is_ifunc = ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC;
6627 while ((p = *pp) != NULL)
8c1d1bb8 6628 {
19e08130
AM
6629 if (p->sec == sec && p->ifunc == is_ifunc)
6630 {
6631 p->count -= 1;
6632 if (p->count == 0)
6633 *pp = p->next;
6634 return TRUE;
6635 }
6636 pp = &p->next;
8c1d1bb8 6637 }
8c1d1bb8
AM
6638 }
6639
695344c0 6640 /* xgettext:c-format */
cf97bcb0
AM
6641 _bfd_error_handler (_("dynreloc miscount for %pB, section %pA"),
6642 sec->owner, sec);
8c1d1bb8
AM
6643 bfd_set_error (bfd_error_bad_value);
6644 return FALSE;
6645}
6646
754021d0
AM
6647/* Remove unused Official Procedure Descriptor entries. Currently we
6648 only remove those associated with functions in discarded link-once
6649 sections, or weakly defined functions that have been overridden. It
6650 would be possible to remove many more entries for statically linked
6651 applications. */
6652
b34976b6 6653bfd_boolean
e7d1c40c 6654ppc64_elf_edit_opd (struct bfd_link_info *info)
1e2f5b6e
AM
6655{
6656 bfd *ibfd;
754021d0 6657 bfd_boolean some_edited = FALSE;
3f764659 6658 asection *need_pad = NULL;
e7d1c40c
AM
6659 struct ppc_link_hash_table *htab;
6660
6661 htab = ppc_hash_table (info);
6662 if (htab == NULL)
6663 return FALSE;
1e2f5b6e 6664
c72f2fb2 6665 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
1e2f5b6e
AM
6666 {
6667 asection *sec;
6668 Elf_Internal_Rela *relstart, *rel, *relend;
6669 Elf_Internal_Shdr *symtab_hdr;
6cdc0ccc 6670 Elf_Internal_Sym *local_syms;
74f0fb50 6671 struct _opd_sec_data *opd;
51aecdc5 6672 bfd_boolean need_edit, add_aux_fields, broken;
3f764659 6673 bfd_size_type cnt_16b = 0;
1e2f5b6e 6674
854b41e7
AM
6675 if (!is_ppc64_elf (ibfd))
6676 continue;
6677
1e2f5b6e 6678 sec = bfd_get_section_by_name (ibfd, ".opd");
46de2a7c 6679 if (sec == NULL || sec->size == 0)
1e2f5b6e
AM
6680 continue;
6681
dbaa2011 6682 if (sec->sec_info_type == SEC_INFO_TYPE_JUST_SYMS)
4b85d634
AM
6683 continue;
6684
1e2f5b6e
AM
6685 if (sec->output_section == bfd_abs_section_ptr)
6686 continue;
6687
6688 /* Look through the section relocs. */
6689 if ((sec->flags & SEC_RELOC) == 0 || sec->reloc_count == 0)
6690 continue;
6691
6cdc0ccc 6692 local_syms = NULL;
0ffa91dd 6693 symtab_hdr = &elf_symtab_hdr (ibfd);
1e2f5b6e
AM
6694
6695 /* Read the relocations. */
4ce794b7 6696 relstart = _bfd_elf_link_read_relocs (ibfd, sec, NULL, NULL,
45d6a902 6697 info->keep_memory);
1e2f5b6e 6698 if (relstart == NULL)
b34976b6 6699 return FALSE;
1e2f5b6e
AM
6700
6701 /* First run through the relocs to check they are sane, and to
6702 determine whether we need to edit this opd section. */
b34976b6 6703 need_edit = FALSE;
51aecdc5 6704 broken = FALSE;
3f764659 6705 need_pad = sec;
1e2f5b6e 6706 relend = relstart + sec->reloc_count;
50bc7936 6707 for (rel = relstart; rel < relend; )
1e2f5b6e 6708 {
04c9666a 6709 enum elf_ppc64_reloc_type r_type;
1e2f5b6e
AM
6710 unsigned long r_symndx;
6711 asection *sym_sec;
6712 struct elf_link_hash_entry *h;
6713 Elf_Internal_Sym *sym;
51aecdc5 6714 bfd_vma offset;
1e2f5b6e 6715
51aecdc5 6716 /* .opd contains an array of 16 or 24 byte entries. We're
1e2f5b6e
AM
6717 only interested in the reloc pointing to a function entry
6718 point. */
51aecdc5
AM
6719 offset = rel->r_offset;
6720 if (rel + 1 == relend
6721 || rel[1].r_offset != offset + 8)
1e2f5b6e
AM
6722 {
6723 /* If someone messes with .opd alignment then after a
6724 "ld -r" we might have padding in the middle of .opd.
6725 Also, there's nothing to prevent someone putting
6726 something silly in .opd with the assembler. No .opd
b34976b6 6727 optimization for them! */
3f764659 6728 broken_opd:
4eca0228 6729 _bfd_error_handler
871b3ab2 6730 (_("%pB: .opd is not a regular array of opd entries"), ibfd);
51aecdc5 6731 broken = TRUE;
1e2f5b6e
AM
6732 break;
6733 }
6734
50bc7936
AM
6735 if ((r_type = ELF64_R_TYPE (rel->r_info)) != R_PPC64_ADDR64
6736 || (r_type = ELF64_R_TYPE ((rel + 1)->r_info)) != R_PPC64_TOC)
6737 {
4eca0228 6738 _bfd_error_handler
695344c0 6739 /* xgettext:c-format */
871b3ab2 6740 (_("%pB: unexpected reloc type %u in .opd section"),
d003868e 6741 ibfd, r_type);
51aecdc5 6742 broken = TRUE;
50bc7936
AM
6743 break;
6744 }
6745
1e2f5b6e 6746 r_symndx = ELF64_R_SYM (rel->r_info);
411e1bfb
AM
6747 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms,
6748 r_symndx, ibfd))
50bc7936 6749 goto error_ret;
1e2f5b6e
AM
6750
6751 if (sym_sec == NULL || sym_sec->owner == NULL)
6752 {
411e1bfb
AM
6753 const char *sym_name;
6754 if (h != NULL)
6755 sym_name = h->root.root.string;
6756 else
26c61ae5
L
6757 sym_name = bfd_elf_sym_name (ibfd, symtab_hdr, sym,
6758 sym_sec);
411e1bfb 6759
4eca0228 6760 _bfd_error_handler
695344c0 6761 /* xgettext:c-format */
871b3ab2 6762 (_("%pB: undefined sym `%s' in .opd section"),
d003868e 6763 ibfd, sym_name);
51aecdc5 6764 broken = TRUE;
1e2f5b6e
AM
6765 break;
6766 }
6767
51020317
AM
6768 /* opd entries are always for functions defined in the
6769 current input bfd. If the symbol isn't defined in the
6770 input bfd, then we won't be using the function in this
6771 bfd; It must be defined in a linkonce section in another
6772 bfd, or is weak. It's also possible that we are
6773 discarding the function due to a linker script /DISCARD/,
6774 which we test for via the output_section. */
6775 if (sym_sec->owner != ibfd
6776 || sym_sec->output_section == bfd_abs_section_ptr)
b34976b6 6777 need_edit = TRUE;
1e2f5b6e 6778
50bc7936 6779 rel += 2;
51aecdc5
AM
6780 if (rel + 1 == relend
6781 || (rel + 2 < relend
6782 && ELF64_R_TYPE (rel[2].r_info) == R_PPC64_TOC))
6783 ++rel;
6784
6785 if (rel == relend)
3f764659
JJ
6786 {
6787 if (sec->size == offset + 24)
6788 {
6789 need_pad = NULL;
6790 break;
6791 }
51aecdc5 6792 if (sec->size == offset + 16)
3f764659
JJ
6793 {
6794 cnt_16b++;
6795 break;
6796 }
6797 goto broken_opd;
6798 }
3f764659
JJ
6799 else if (rel + 1 < relend
6800 && ELF64_R_TYPE (rel[0].r_info) == R_PPC64_ADDR64
6801 && ELF64_R_TYPE (rel[1].r_info) == R_PPC64_TOC)
6802 {
51aecdc5
AM
6803 if (rel[0].r_offset == offset + 16)
6804 cnt_16b++;
6805 else if (rel[0].r_offset != offset + 24)
6806 goto broken_opd;
3f764659
JJ
6807 }
6808 else
6809 goto broken_opd;
1e2f5b6e
AM
6810 }
6811
e7d1c40c 6812 add_aux_fields = htab->params->non_overlapping_opd && cnt_16b > 0;
3f764659 6813
51aecdc5 6814 if (!broken && (need_edit || add_aux_fields))
1e2f5b6e
AM
6815 {
6816 Elf_Internal_Rela *write_rel;
d4730f92 6817 Elf_Internal_Shdr *rel_hdr;
1e2f5b6e 6818 bfd_byte *rptr, *wptr;
983bddc8 6819 bfd_byte *new_contents;
74f0fb50
AM
6820 bfd_size_type amt;
6821
983bddc8 6822 new_contents = NULL;
51aecdc5 6823 amt = OPD_NDX (sec->size) * sizeof (long);
74f0fb50 6824 opd = &ppc64_elf_section_data (sec)->u.opd;
33c0ec9d 6825 opd->adjust = bfd_zalloc (sec->owner, amt);
74f0fb50
AM
6826 if (opd->adjust == NULL)
6827 return FALSE;
1e2f5b6e
AM
6828
6829 /* This seems a waste of time as input .opd sections are all
6830 zeros as generated by gcc, but I suppose there's no reason
6831 this will always be so. We might start putting something in
6832 the third word of .opd entries. */
6833 if ((sec->flags & SEC_IN_MEMORY) == 0)
6834 {
eea6121a
AM
6835 bfd_byte *loc;
6836 if (!bfd_malloc_and_get_section (ibfd, sec, &loc))
6cdc0ccc 6837 {
eea6121a
AM
6838 if (loc != NULL)
6839 free (loc);
50bc7936 6840 error_ret:
6cdc0ccc
AM
6841 if (local_syms != NULL
6842 && symtab_hdr->contents != (unsigned char *) local_syms)
6843 free (local_syms);
6cdc0ccc
AM
6844 if (elf_section_data (sec)->relocs != relstart)
6845 free (relstart);
b34976b6 6846 return FALSE;
6cdc0ccc 6847 }
1e2f5b6e
AM
6848 sec->contents = loc;
6849 sec->flags |= (SEC_IN_MEMORY | SEC_HAS_CONTENTS);
6850 }
6851
6852 elf_section_data (sec)->relocs = relstart;
6853
3f764659 6854 new_contents = sec->contents;
3f764659
JJ
6855 if (add_aux_fields)
6856 {
6857 new_contents = bfd_malloc (sec->size + cnt_16b * 8);
6858 if (new_contents == NULL)
6859 return FALSE;
51aecdc5 6860 need_pad = NULL;
3f764659 6861 }
b4f4e59f
AM
6862 wptr = new_contents;
6863 rptr = sec->contents;
1e2f5b6e 6864 write_rel = relstart;
51aecdc5 6865 for (rel = relstart; rel < relend; )
1e2f5b6e 6866 {
50bc7936
AM
6867 unsigned long r_symndx;
6868 asection *sym_sec;
6869 struct elf_link_hash_entry *h;
51aecdc5 6870 struct ppc_link_hash_entry *fdh = NULL;
50bc7936 6871 Elf_Internal_Sym *sym;
51aecdc5
AM
6872 long opd_ent_size;
6873 Elf_Internal_Rela *next_rel;
6874 bfd_boolean skip;
50bc7936
AM
6875
6876 r_symndx = ELF64_R_SYM (rel->r_info);
6877 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms,
d37c89e5 6878 r_symndx, ibfd))
50bc7936
AM
6879 goto error_ret;
6880
51aecdc5
AM
6881 next_rel = rel + 2;
6882 if (next_rel + 1 == relend
6883 || (next_rel + 2 < relend
6884 && ELF64_R_TYPE (next_rel[2].r_info) == R_PPC64_TOC))
6885 ++next_rel;
6886
6887 /* See if the .opd entry is full 24 byte or
6888 16 byte (with fd_aux entry overlapped with next
6889 fd_func). */
6890 opd_ent_size = 24;
6891 if (next_rel == relend)
1e2f5b6e 6892 {
51aecdc5 6893 if (sec->size == rel->r_offset + 16)
3f764659 6894 opd_ent_size = 16;
51aecdc5
AM
6895 }
6896 else if (next_rel->r_offset == rel->r_offset + 16)
6897 opd_ent_size = 16;
3f764659 6898
51aecdc5
AM
6899 if (h != NULL
6900 && h->root.root.string[0] == '.')
6901 {
8c5b4e52
AM
6902 fdh = ((struct ppc_link_hash_entry *) h)->oh;
6903 if (fdh != NULL)
6904 {
6905 fdh = ppc_follow_link (fdh);
6906 if (fdh->elf.root.type != bfd_link_hash_defined
6907 && fdh->elf.root.type != bfd_link_hash_defweak)
6908 fdh = NULL;
6909 }
51aecdc5 6910 }
1e2f5b6e 6911
51aecdc5
AM
6912 skip = (sym_sec->owner != ibfd
6913 || sym_sec->output_section == bfd_abs_section_ptr);
6914 if (skip)
6915 {
6916 if (fdh != NULL && sym_sec->owner == ibfd)
a4aa0fb7 6917 {
51aecdc5
AM
6918 /* Arrange for the function descriptor sym
6919 to be dropped. */
6920 fdh->elf.root.u.def.value = 0;
6921 fdh->elf.root.u.def.section = sym_sec;
a4aa0fb7 6922 }
51aecdc5 6923 opd->adjust[OPD_NDX (rel->r_offset)] = -1;
1e2f5b6e 6924
0e1862bb 6925 if (NO_OPD_RELOCS || bfd_link_relocatable (info))
51aecdc5
AM
6926 rel = next_rel;
6927 else
6928 while (1)
6929 {
6930 if (!dec_dynrel_count (rel->r_info, sec, info,
6931 NULL, h, sym))
6932 goto error_ret;
754021d0 6933
51aecdc5
AM
6934 if (++rel == next_rel)
6935 break;
1e2f5b6e 6936
51aecdc5
AM
6937 r_symndx = ELF64_R_SYM (rel->r_info);
6938 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms,
6939 r_symndx, ibfd))
6940 goto error_ret;
6941 }
50bc7936
AM
6942 }
6943 else
1e2f5b6e 6944 {
51aecdc5
AM
6945 /* We'll be keeping this opd entry. */
6946 long adjust;
6947
6948 if (fdh != NULL)
6949 {
6950 /* Redefine the function descriptor symbol to
6951 this location in the opd section. It is
6952 necessary to update the value here rather
6953 than using an array of adjustments as we do
6954 for local symbols, because various places
6955 in the generic ELF code use the value
6956 stored in u.def.value. */
6957 fdh->elf.root.u.def.value = wptr - new_contents;
6958 fdh->adjust_done = 1;
6959 }
6960
6961 /* Local syms are a bit tricky. We could
6962 tweak them as they can be cached, but
6963 we'd need to look through the local syms
6964 for the function descriptor sym which we
6965 don't have at the moment. So keep an
6966 array of adjustments. */
6967 adjust = (wptr - new_contents) - (rptr - sec->contents);
6968 opd->adjust[OPD_NDX (rel->r_offset)] = adjust;
6969
6970 if (wptr != rptr)
6971 memcpy (wptr, rptr, opd_ent_size);
6972 wptr += opd_ent_size;
6973 if (add_aux_fields && opd_ent_size == 16)
6974 {
6975 memset (wptr, '\0', 8);
6976 wptr += 8;
6977 }
6978
50bc7936 6979 /* We need to adjust any reloc offsets to point to the
51aecdc5
AM
6980 new opd entries. */
6981 for ( ; rel != next_rel; ++rel)
6982 {
6983 rel->r_offset += adjust;
6984 if (write_rel != rel)
6985 memcpy (write_rel, rel, sizeof (*rel));
6986 ++write_rel;
6987 }
1e2f5b6e 6988 }
51aecdc5
AM
6989
6990 rptr += opd_ent_size;
1e2f5b6e
AM
6991 }
6992
3f764659 6993 sec->size = wptr - new_contents;
1e2f5b6e 6994 sec->reloc_count = write_rel - relstart;
3f764659
JJ
6995 if (add_aux_fields)
6996 {
6997 free (sec->contents);
6998 sec->contents = new_contents;
6999 }
7000
05bf9422 7001 /* Fudge the header size too, as this is used later in
cdcf6e38 7002 elf_bfd_final_link if we are emitting relocs. */
d4730f92
BS
7003 rel_hdr = _bfd_elf_single_rel_hdr (sec);
7004 rel_hdr->sh_size = sec->reloc_count * rel_hdr->sh_entsize;
754021d0 7005 some_edited = TRUE;
1e2f5b6e 7006 }
6cdc0ccc 7007 else if (elf_section_data (sec)->relocs != relstart)
1e2f5b6e 7008 free (relstart);
6cdc0ccc 7009
411e1bfb
AM
7010 if (local_syms != NULL
7011 && symtab_hdr->contents != (unsigned char *) local_syms)
7012 {
7013 if (!info->keep_memory)
7014 free (local_syms);
7015 else
7016 symtab_hdr->contents = (unsigned char *) local_syms;
7017 }
7018 }
7019
754021d0
AM
7020 if (some_edited)
7021 elf_link_hash_traverse (elf_hash_table (info), adjust_opd_syms, NULL);
7022
3f764659
JJ
7023 /* If we are doing a final link and the last .opd entry is just 16 byte
7024 long, add a 8 byte padding after it. */
0e1862bb 7025 if (need_pad != NULL && !bfd_link_relocatable (info))
3f764659
JJ
7026 {
7027 bfd_byte *p;
7028
7029 if ((need_pad->flags & SEC_IN_MEMORY) == 0)
7030 {
7031 BFD_ASSERT (need_pad->size > 0);
7032
7033 p = bfd_malloc (need_pad->size + 8);
7034 if (p == NULL)
7035 return FALSE;
699733f6 7036
2cdcc330
AM
7037 if (!bfd_get_section_contents (need_pad->owner, need_pad,
7038 p, 0, need_pad->size))
3f764659
JJ
7039 return FALSE;
7040
7041 need_pad->contents = p;
7042 need_pad->flags |= (SEC_IN_MEMORY | SEC_HAS_CONTENTS);
7043 }
7044 else
7045 {
7046 p = bfd_realloc (need_pad->contents, need_pad->size + 8);
7047 if (p == NULL)
7048 return FALSE;
7049
7050 need_pad->contents = p;
7051 }
7052
7053 memset (need_pad->contents + need_pad->size, 0, 8);
7054 need_pad->size += 8;
7055 }
7056
411e1bfb
AM
7057 return TRUE;
7058}
7059
3e04d765
AM
7060/* Analyze inline PLT call relocations to see whether calls to locally
7061 defined functions can be converted to direct calls. */
7062
7063bfd_boolean
7064ppc64_elf_inline_plt (struct bfd_link_info *info)
7065{
7066 struct ppc_link_hash_table *htab;
7067 bfd *ibfd;
7068 asection *sec;
7069 bfd_vma low_vma, high_vma, limit;
7070
7071 htab = ppc_hash_table (info);
7072 if (htab == NULL)
7073 return FALSE;
7074
7075 /* A bl insn can reach -0x2000000 to 0x1fffffc. The limit is
7076 reduced somewhat to cater for possible stubs that might be added
7077 between the call and its destination. */
7078 if (htab->params->group_size < 0)
7079 {
7080 limit = -htab->params->group_size;
7081 if (limit == 1)
7082 limit = 0x1e00000;
7083 }
7084 else
7085 {
7086 limit = htab->params->group_size;
7087 if (limit == 1)
7088 limit = 0x1c00000;
7089 }
7090
7091 low_vma = -1;
7092 high_vma = 0;
7093 for (sec = info->output_bfd->sections; sec != NULL; sec = sec->next)
7094 if ((sec->flags & (SEC_ALLOC | SEC_CODE)) == (SEC_ALLOC | SEC_CODE))
7095 {
7096 if (low_vma > sec->vma)
7097 low_vma = sec->vma;
7098 if (high_vma < sec->vma + sec->size)
7099 high_vma = sec->vma + sec->size;
7100 }
7101
7102 /* If a "bl" can reach anywhere in local code sections, then we can
7103 convert all inline PLT sequences to direct calls when the symbol
7104 is local. */
7105 if (high_vma - low_vma < limit)
7106 {
7107 htab->can_convert_all_inline_plt = 1;
7108 return TRUE;
7109 }
7110
7111 /* Otherwise, go looking through relocs for cases where a direct
7112 call won't reach. Mark the symbol on any such reloc to disable
7113 the optimization and keep the PLT entry as it seems likely that
7114 this will be better than creating trampolines. Note that this
7115 will disable the optimization for all inline PLT calls to a
7116 particular symbol, not just those that won't reach. The
7117 difficulty in doing a more precise optimization is that the
7118 linker needs to make a decision depending on whether a
7119 particular R_PPC64_PLTCALL insn can be turned into a direct
7120 call, for each of the R_PPC64_PLTSEQ and R_PPC64_PLT16* insns in
7121 the sequence, and there is nothing that ties those relocs
7122 together except their symbol. */
7123
7124 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
7125 {
7126 Elf_Internal_Shdr *symtab_hdr;
7127 Elf_Internal_Sym *local_syms;
7128
7129 if (!is_ppc64_elf (ibfd))
7130 continue;
7131
7132 local_syms = NULL;
7133 symtab_hdr = &elf_symtab_hdr (ibfd);
7134
7135 for (sec = ibfd->sections; sec != NULL; sec = sec->next)
7136 if (ppc64_elf_section_data (sec)->has_pltcall
7137 && !bfd_is_abs_section (sec->output_section))
7138 {
7139 Elf_Internal_Rela *relstart, *rel, *relend;
7140
7141 /* Read the relocations. */
7142 relstart = _bfd_elf_link_read_relocs (ibfd, sec, NULL, NULL,
7143 info->keep_memory);
7144 if (relstart == NULL)
7145 return FALSE;
7146
7147 relend = relstart + sec->reloc_count;
7148 for (rel = relstart; rel < relend; )
7149 {
7150 enum elf_ppc64_reloc_type r_type;
7151 unsigned long r_symndx;
7152 asection *sym_sec;
7153 struct elf_link_hash_entry *h;
7154 Elf_Internal_Sym *sym;
7155 unsigned char *tls_maskp;
7156
7157 r_type = ELF64_R_TYPE (rel->r_info);
7158 if (r_type != R_PPC64_PLTCALL)
7159 continue;
7160
7161 r_symndx = ELF64_R_SYM (rel->r_info);
7162 if (!get_sym_h (&h, &sym, &sym_sec, &tls_maskp, &local_syms,
7163 r_symndx, ibfd))
7164 {
7165 if (elf_section_data (sec)->relocs != relstart)
7166 free (relstart);
7167 if (local_syms != NULL
2cdcc330 7168 && symtab_hdr->contents != (bfd_byte *) local_syms)
3e04d765
AM
7169 free (local_syms);
7170 return FALSE;
7171 }
7172
7173 if (sym_sec != NULL && sym_sec->output_section != NULL)
7174 {
7175 bfd_vma from, to;
7176 if (h != NULL)
7177 to = h->root.u.def.value;
7178 else
7179 to = sym->st_value;
7180 to += (rel->r_addend
7181 + sym_sec->output_offset
7182 + sym_sec->output_section->vma);
7183 from = (rel->r_offset
7184 + sec->output_offset
7185 + sec->output_section->vma);
7186 if (to - from + limit < 2 * limit)
7187 *tls_maskp &= ~PLT_KEEP;
7188 }
7189 }
7190 if (elf_section_data (sec)->relocs != relstart)
7191 free (relstart);
7192 }
7193
7194 if (local_syms != NULL
7195 && symtab_hdr->contents != (unsigned char *) local_syms)
7196 {
7197 if (!info->keep_memory)
7198 free (local_syms);
7199 else
7200 symtab_hdr->contents = (unsigned char *) local_syms;
7201 }
7202 }
7203
7204 return TRUE;
7205}
7206
e1918d23 7207/* Set htab->tls_get_addr and call the generic ELF tls_setup function. */
411e1bfb 7208
e1918d23 7209asection *
e7d1c40c 7210ppc64_elf_tls_setup (struct bfd_link_info *info)
411e1bfb 7211{
411e1bfb
AM
7212 struct ppc_link_hash_table *htab;
7213
411e1bfb 7214 htab = ppc_hash_table (info);
4dfe6ac6
NC
7215 if (htab == NULL)
7216 return NULL;
7217
ee67d69a
AM
7218 if (abiversion (info->output_bfd) == 1)
7219 htab->opd_abi = 1;
7220
e7d1c40c 7221 if (htab->params->no_multi_toc)
33c0ec9d
AM
7222 htab->do_multi_toc = 0;
7223 else if (!htab->do_multi_toc)
e7d1c40c 7224 htab->params->no_multi_toc = 1;
33c0ec9d 7225
8b5f1ed8
AM
7226 /* Default to --no-plt-localentry, as this option can cause problems
7227 with symbol interposition. For example, glibc libpthread.so and
7228 libc.so duplicate many pthread symbols, with a fallback
7229 implementation in libc.so. In some cases the fallback does more
7230 work than the pthread implementation. __pthread_condattr_destroy
7231 is one such symbol: the libpthread.so implementation is
7232 localentry:0 while the libc.so implementation is localentry:8.
7233 An app that "cleverly" uses dlopen to only load necessary
7234 libraries at runtime may omit loading libpthread.so when not
7235 running multi-threaded, which then results in the libc.so
7236 fallback symbols being used and ld.so complaining. Now there
7237 are workarounds in ld (see non_zero_localentry) to detect the
7238 pthread situation, but that may not be the only case where
7239 --plt-localentry can cause trouble. */
f378ab09 7240 if (htab->params->plt_localentry0 < 0)
8b5f1ed8 7241 htab->params->plt_localentry0 = 0;
d44c746a
AM
7242 if (htab->params->plt_localentry0
7243 && elf_link_hash_lookup (&htab->elf, "GLIBC_2.26",
7244 FALSE, FALSE, FALSE) == NULL)
cf97bcb0
AM
7245 _bfd_error_handler
7246 (_("warning: --plt-localentry is especially dangerous without "
7247 "ld.so support to detect ABI violations"));
f378ab09 7248
3a71aa26
AM
7249 htab->tls_get_addr = ((struct ppc_link_hash_entry *)
7250 elf_link_hash_lookup (&htab->elf, ".__tls_get_addr",
7251 FALSE, FALSE, TRUE));
a7f2871e
AM
7252 /* Move dynamic linking info to the function descriptor sym. */
7253 if (htab->tls_get_addr != NULL)
7254 func_desc_adjust (&htab->tls_get_addr->elf, info);
3a71aa26
AM
7255 htab->tls_get_addr_fd = ((struct ppc_link_hash_entry *)
7256 elf_link_hash_lookup (&htab->elf, "__tls_get_addr",
7257 FALSE, FALSE, TRUE));
7c9cf415 7258 if (htab->params->tls_get_addr_opt)
a7f2871e
AM
7259 {
7260 struct elf_link_hash_entry *opt, *opt_fd, *tga, *tga_fd;
7261
7262 opt = elf_link_hash_lookup (&htab->elf, ".__tls_get_addr_opt",
7263 FALSE, FALSE, TRUE);
7264 if (opt != NULL)
7265 func_desc_adjust (opt, info);
7266 opt_fd = elf_link_hash_lookup (&htab->elf, "__tls_get_addr_opt",
7267 FALSE, FALSE, TRUE);
7268 if (opt_fd != NULL
7269 && (opt_fd->root.type == bfd_link_hash_defined
7270 || opt_fd->root.type == bfd_link_hash_defweak))
7271 {
7272 /* If glibc supports an optimized __tls_get_addr call stub,
7273 signalled by the presence of __tls_get_addr_opt, and we'll
7274 be calling __tls_get_addr via a plt call stub, then
7275 make __tls_get_addr point to __tls_get_addr_opt. */
7276 tga_fd = &htab->tls_get_addr_fd->elf;
7277 if (htab->elf.dynamic_sections_created
7278 && tga_fd != NULL
7279 && (tga_fd->type == STT_FUNC
7280 || tga_fd->needs_plt)
7281 && !(SYMBOL_CALLS_LOCAL (info, tga_fd)
21d68fcd 7282 || UNDEFWEAK_NO_DYNAMIC_RELOC (info, tga_fd)))
a7f2871e
AM
7283 {
7284 struct plt_entry *ent;
7285
7286 for (ent = tga_fd->plt.plist; ent != NULL; ent = ent->next)
7287 if (ent->plt.refcount > 0)
7288 break;
7289 if (ent != NULL)
7290 {
7291 tga_fd->root.type = bfd_link_hash_indirect;
7292 tga_fd->root.u.i.link = &opt_fd->root;
7293 ppc64_elf_copy_indirect_symbol (info, opt_fd, tga_fd);
b531344c 7294 opt_fd->mark = 1;
a7f2871e
AM
7295 if (opt_fd->dynindx != -1)
7296 {
7297 /* Use __tls_get_addr_opt in dynamic relocations. */
7298 opt_fd->dynindx = -1;
7299 _bfd_elf_strtab_delref (elf_hash_table (info)->dynstr,
7300 opt_fd->dynstr_index);
7301 if (!bfd_elf_link_record_dynamic_symbol (info, opt_fd))
854b41e7 7302 return NULL;
a7f2871e 7303 }
2cdcc330
AM
7304 htab->tls_get_addr_fd
7305 = (struct ppc_link_hash_entry *) opt_fd;
a7f2871e
AM
7306 tga = &htab->tls_get_addr->elf;
7307 if (opt != NULL && tga != NULL)
7308 {
7309 tga->root.type = bfd_link_hash_indirect;
7310 tga->root.u.i.link = &opt->root;
7311 ppc64_elf_copy_indirect_symbol (info, opt, tga);
b531344c 7312 opt->mark = 1;
a7f2871e
AM
7313 _bfd_elf_link_hash_hide_symbol (info, opt,
7314 tga->forced_local);
7315 htab->tls_get_addr = (struct ppc_link_hash_entry *) opt;
7316 }
7317 htab->tls_get_addr_fd->oh = htab->tls_get_addr;
7318 htab->tls_get_addr_fd->is_func_descriptor = 1;
7319 if (htab->tls_get_addr != NULL)
7320 {
7321 htab->tls_get_addr->oh = htab->tls_get_addr_fd;
7322 htab->tls_get_addr->is_func = 1;
7323 }
7324 }
7325 }
7326 }
7c9cf415
AM
7327 else if (htab->params->tls_get_addr_opt < 0)
7328 htab->params->tls_get_addr_opt = 0;
a7f2871e 7329 }
33c0ec9d 7330 return _bfd_elf_tls_setup (info->output_bfd, info);
3a71aa26 7331}
8387904d 7332
3a71aa26
AM
7333/* Return TRUE iff REL is a branch reloc with a global symbol matching
7334 HASH1 or HASH2. */
8387904d 7335
3a71aa26
AM
7336static bfd_boolean
7337branch_reloc_hash_match (const bfd *ibfd,
7338 const Elf_Internal_Rela *rel,
7339 const struct ppc_link_hash_entry *hash1,
7340 const struct ppc_link_hash_entry *hash2)
7341{
7342 Elf_Internal_Shdr *symtab_hdr = &elf_symtab_hdr (ibfd);
7343 enum elf_ppc64_reloc_type r_type = ELF64_R_TYPE (rel->r_info);
7344 unsigned int r_symndx = ELF64_R_SYM (rel->r_info);
7345
e054468f 7346 if (r_symndx >= symtab_hdr->sh_info && is_branch_reloc (r_type))
8387904d 7347 {
3a71aa26
AM
7348 struct elf_link_hash_entry **sym_hashes = elf_sym_hashes (ibfd);
7349 struct elf_link_hash_entry *h;
8387904d 7350
3a71aa26 7351 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
b31867b6 7352 h = elf_follow_link (h);
3a71aa26
AM
7353 if (h == &hash1->elf || h == &hash2->elf)
7354 return TRUE;
a48ebf4d 7355 }
3a71aa26 7356 return FALSE;
951fd09b 7357}
411e1bfb 7358
951fd09b
AM
7359/* Run through all the TLS relocs looking for optimization
7360 opportunities. The linker has been hacked (see ppc64elf.em) to do
7361 a preliminary section layout so that we know the TLS segment
7362 offsets. We can't optimize earlier because some optimizations need
7363 to know the tp offset, and we need to optimize before allocating
7364 dynamic relocations. */
7365
7366bfd_boolean
33c0ec9d 7367ppc64_elf_tls_optimize (struct bfd_link_info *info)
951fd09b
AM
7368{
7369 bfd *ibfd;
7370 asection *sec;
7371 struct ppc_link_hash_table *htab;
663a1470 7372 unsigned char *toc_ref;
102890f0 7373 int pass;
951fd09b 7374
3cbc1e5e 7375 if (!bfd_link_executable (info))
411e1bfb
AM
7376 return TRUE;
7377
951fd09b 7378 htab = ppc_hash_table (info);
4dfe6ac6
NC
7379 if (htab == NULL)
7380 return FALSE;
7381
663a1470
AM
7382 /* Make two passes over the relocs. On the first pass, mark toc
7383 entries involved with tls relocs, and check that tls relocs
7384 involved in setting up a tls_get_addr call are indeed followed by
7385 such a call. If they are not, we can't do any tls optimization.
7386 On the second pass twiddle tls_mask flags to notify
7387 relocate_section that optimization can be done, and adjust got
7388 and plt refcounts. */
7389 toc_ref = NULL;
7390 for (pass = 0; pass < 2; ++pass)
c72f2fb2 7391 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
663a1470
AM
7392 {
7393 Elf_Internal_Sym *locsyms = NULL;
7394 asection *toc = bfd_get_section_by_name (ibfd, ".toc");
7395
102890f0
AM
7396 for (sec = ibfd->sections; sec != NULL; sec = sec->next)
7397 if (sec->has_tls_reloc && !bfd_is_abs_section (sec->output_section))
7398 {
7399 Elf_Internal_Rela *relstart, *rel, *relend;
663a1470 7400 bfd_boolean found_tls_get_addr_arg = 0;
411e1bfb 7401
102890f0
AM
7402 /* Read the relocations. */
7403 relstart = _bfd_elf_link_read_relocs (ibfd, sec, NULL, NULL,
7404 info->keep_memory);
7405 if (relstart == NULL)
2915c55b
JK
7406 {
7407 free (toc_ref);
7408 return FALSE;
7409 }
411e1bfb 7410
102890f0
AM
7411 relend = relstart + sec->reloc_count;
7412 for (rel = relstart; rel < relend; rel++)
7413 {
7414 enum elf_ppc64_reloc_type r_type;
7415 unsigned long r_symndx;
7416 struct elf_link_hash_entry *h;
7417 Elf_Internal_Sym *sym;
7418 asection *sym_sec;
f961d9dd
AM
7419 unsigned char *tls_mask;
7420 unsigned char tls_set, tls_clear, tls_type = 0;
102890f0
AM
7421 bfd_vma value;
7422 bfd_boolean ok_tprel, is_local;
7423 long toc_ref_index = 0;
7424 int expecting_tls_get_addr = 0;
663a1470 7425 bfd_boolean ret = FALSE;
411e1bfb 7426
102890f0
AM
7427 r_symndx = ELF64_R_SYM (rel->r_info);
7428 if (!get_sym_h (&h, &sym, &sym_sec, &tls_mask, &locsyms,
7429 r_symndx, ibfd))
7430 {
7431 err_free_rel:
7432 if (elf_section_data (sec)->relocs != relstart)
7433 free (relstart);
7434 if (toc_ref != NULL)
7435 free (toc_ref);
7436 if (locsyms != NULL
0ffa91dd 7437 && (elf_symtab_hdr (ibfd).contents
102890f0
AM
7438 != (unsigned char *) locsyms))
7439 free (locsyms);
663a1470 7440 return ret;
102890f0 7441 }
411e1bfb 7442
102890f0
AM
7443 if (h != NULL)
7444 {
766bc656
AM
7445 if (h->root.type == bfd_link_hash_defined
7446 || h->root.type == bfd_link_hash_defweak)
7447 value = h->root.u.def.value;
7448 else if (h->root.type == bfd_link_hash_undefweak)
7449 value = 0;
7450 else
663a1470
AM
7451 {
7452 found_tls_get_addr_arg = 0;
7453 continue;
7454 }
102890f0
AM
7455 }
7456 else
7457 /* Symbols referenced by TLS relocs must be of type
7458 STT_TLS. So no need for .opd local sym adjust. */
7459 value = sym->st_value;
7460
7461 ok_tprel = FALSE;
7462 is_local = FALSE;
7463 if (h == NULL
7464 || !h->def_dynamic)
7465 {
7466 is_local = TRUE;
766bc656
AM
7467 if (h != NULL
7468 && h->root.type == bfd_link_hash_undefweak)
7469 ok_tprel = TRUE;
c27b8c2a
AM
7470 else if (sym_sec != NULL
7471 && sym_sec->output_section != NULL)
766bc656
AM
7472 {
7473 value += sym_sec->output_offset;
7474 value += sym_sec->output_section->vma;
7475 value -= htab->elf.tls_sec->vma;
7476 ok_tprel = (value + TP_OFFSET + ((bfd_vma) 1 << 31)
7477 < (bfd_vma) 1 << 32);
7478 }
102890f0 7479 }
951fd09b 7480
102890f0 7481 r_type = ELF64_R_TYPE (rel->r_info);
663a1470
AM
7482 /* If this section has old-style __tls_get_addr calls
7483 without marker relocs, then check that each
7484 __tls_get_addr call reloc is preceded by a reloc
7485 that conceivably belongs to the __tls_get_addr arg
7486 setup insn. If we don't find matching arg setup
7487 relocs, don't do any tls optimization. */
7488 if (pass == 0
7489 && sec->has_tls_get_addr_call
7490 && h != NULL
7491 && (h == &htab->tls_get_addr->elf
7492 || h == &htab->tls_get_addr_fd->elf)
7493 && !found_tls_get_addr_arg
7494 && is_branch_reloc (r_type))
7495 {
25f53a85 7496 info->callbacks->minfo (_("%H __tls_get_addr lost arg, "
663a1470
AM
7497 "TLS optimization disabled\n"),
7498 ibfd, sec, rel->r_offset);
7499 ret = TRUE;
7500 goto err_free_rel;
7501 }
7502
7503 found_tls_get_addr_arg = 0;
102890f0
AM
7504 switch (r_type)
7505 {
7506 case R_PPC64_GOT_TLSLD16:
7507 case R_PPC64_GOT_TLSLD16_LO:
7508 expecting_tls_get_addr = 1;
663a1470 7509 found_tls_get_addr_arg = 1;
1a0670f3 7510 /* Fall through. */
102890f0
AM
7511
7512 case R_PPC64_GOT_TLSLD16_HI:
7513 case R_PPC64_GOT_TLSLD16_HA:
7514 /* These relocs should never be against a symbol
7515 defined in a shared lib. Leave them alone if
7516 that turns out to be the case. */
7517 if (!is_local)
7518 continue;
411e1bfb 7519
102890f0 7520 /* LD -> LE */
411e1bfb 7521 tls_set = 0;
102890f0
AM
7522 tls_clear = TLS_LD;
7523 tls_type = TLS_TLS | TLS_LD;
7524 break;
411e1bfb 7525
102890f0
AM
7526 case R_PPC64_GOT_TLSGD16:
7527 case R_PPC64_GOT_TLSGD16_LO:
7528 expecting_tls_get_addr = 1;
663a1470 7529 found_tls_get_addr_arg = 1;
1a0670f3 7530 /* Fall through. */
102890f0
AM
7531
7532 case R_PPC64_GOT_TLSGD16_HI:
7533 case R_PPC64_GOT_TLSGD16_HA:
7534 if (ok_tprel)
7535 /* GD -> LE */
411e1bfb 7536 tls_set = 0;
102890f0
AM
7537 else
7538 /* GD -> IE */
7539 tls_set = TLS_TLS | TLS_TPRELGD;
7540 tls_clear = TLS_GD;
7541 tls_type = TLS_TLS | TLS_GD;
7542 break;
7543
7544 case R_PPC64_GOT_TPREL16_DS:
7545 case R_PPC64_GOT_TPREL16_LO_DS:
7546 case R_PPC64_GOT_TPREL16_HI:
7547 case R_PPC64_GOT_TPREL16_HA:
7548 if (ok_tprel)
7549 {
7550 /* IE -> LE */
7551 tls_set = 0;
7552 tls_clear = TLS_TPREL;
7553 tls_type = TLS_TLS | TLS_TPREL;
7554 break;
7555 }
411e1bfb
AM
7556 continue;
7557
727fc41e
AM
7558 case R_PPC64_TLSGD:
7559 case R_PPC64_TLSLD:
23cedd1d
AM
7560 if (rel + 1 < relend
7561 && is_plt_seq_reloc (ELF64_R_TYPE (rel[1].r_info)))
7562 {
7563 if (pass != 0
2cdcc330
AM
7564 && (ELF64_R_TYPE (rel[1].r_info)
7565 != R_PPC64_PLTSEQ))
23cedd1d
AM
7566 {
7567 r_symndx = ELF64_R_SYM (rel[1].r_info);
7568 if (!get_sym_h (&h, NULL, NULL, NULL, &locsyms,
2cdcc330 7569 r_symndx, ibfd))
23cedd1d
AM
7570 goto err_free_rel;
7571 if (h != NULL)
7572 {
7573 struct plt_entry *ent = NULL;
7574
7575 for (ent = h->plt.plist;
7576 ent != NULL;
7577 ent = ent->next)
7578 if (ent->addend == rel[1].r_addend)
7579 break;
7580
7581 if (ent != NULL
7582 && ent->plt.refcount > 0)
7583 ent->plt.refcount -= 1;
7584 }
7585 }
7586 continue;
7587 }
663a1470 7588 found_tls_get_addr_arg = 1;
1a0670f3 7589 /* Fall through. */
663a1470
AM
7590
7591 case R_PPC64_TLS:
7592 case R_PPC64_TOC16:
7593 case R_PPC64_TOC16_LO:
102890f0
AM
7594 if (sym_sec == NULL || sym_sec != toc)
7595 continue;
7596
7597 /* Mark this toc entry as referenced by a TLS
7598 code sequence. We can do that now in the
7599 case of R_PPC64_TLS, and after checking for
7600 tls_get_addr for the TOC16 relocs. */
7601 if (toc_ref == NULL)
2cdcc330
AM
7602 toc_ref
7603 = bfd_zmalloc (toc->output_section->rawsize / 8);
663a1470
AM
7604 if (toc_ref == NULL)
7605 goto err_free_rel;
7606
102890f0
AM
7607 if (h != NULL)
7608 value = h->root.u.def.value;
7609 else
7610 value = sym->st_value;
7611 value += rel->r_addend;
73242275
AM
7612 if (value % 8 != 0)
7613 continue;
7614 BFD_ASSERT (value < toc->size
7615 && toc->output_offset % 8 == 0);
663a1470 7616 toc_ref_index = (value + toc->output_offset) / 8;
727fc41e
AM
7617 if (r_type == R_PPC64_TLS
7618 || r_type == R_PPC64_TLSGD
7619 || r_type == R_PPC64_TLSLD)
102890f0
AM
7620 {
7621 toc_ref[toc_ref_index] = 1;
7622 continue;
7623 }
7624
7625 if (pass != 0 && toc_ref[toc_ref_index] == 0)
7626 continue;
7627
7628 tls_set = 0;
7629 tls_clear = 0;
7630 expecting_tls_get_addr = 2;
7631 break;
7632
7633 case R_PPC64_TPREL64:
7634 if (pass == 0
7635 || sec != toc
7636 || toc_ref == NULL
663a1470 7637 || !toc_ref[(rel->r_offset + toc->output_offset) / 8])
102890f0
AM
7638 continue;
7639 if (ok_tprel)
7640 {
7641 /* IE -> LE */
7642 tls_set = TLS_EXPLICIT;
7643 tls_clear = TLS_TPREL;
7644 break;
7645 }
7646 continue;
7647
7648 case R_PPC64_DTPMOD64:
7649 if (pass == 0
7650 || sec != toc
7651 || toc_ref == NULL
663a1470 7652 || !toc_ref[(rel->r_offset + toc->output_offset) / 8])
102890f0
AM
7653 continue;
7654 if (rel + 1 < relend
7655 && (rel[1].r_info
7656 == ELF64_R_INFO (r_symndx, R_PPC64_DTPREL64))
7657 && rel[1].r_offset == rel->r_offset + 8)
7658 {
7659 if (ok_tprel)
7660 /* GD -> LE */
7661 tls_set = TLS_EXPLICIT | TLS_GD;
7662 else
7663 /* GD -> IE */
7664 tls_set = TLS_EXPLICIT | TLS_GD | TLS_TPRELGD;
7665 tls_clear = TLS_GD;
7666 }
7667 else
7668 {
7669 if (!is_local)
7670 continue;
7671
7672 /* LD -> LE */
7673 tls_set = TLS_EXPLICIT;
7674 tls_clear = TLS_LD;
7675 }
7676 break;
7677
7678 default:
7679 continue;
7680 }
7681
7682 if (pass == 0)
7683 {
727fc41e
AM
7684 if (!expecting_tls_get_addr
7685 || !sec->has_tls_get_addr_call)
102890f0
AM
7686 continue;
7687
3a71aa26
AM
7688 if (rel + 1 < relend
7689 && branch_reloc_hash_match (ibfd, rel + 1,
7690 htab->tls_get_addr,
7691 htab->tls_get_addr_fd))
102890f0 7692 {
3a71aa26 7693 if (expecting_tls_get_addr == 2)
102890f0 7694 {
3a71aa26 7695 /* Check for toc tls entries. */
f961d9dd 7696 unsigned char *toc_tls;
3a71aa26
AM
7697 int retval;
7698
7699 retval = get_tls_mask (&toc_tls, NULL, NULL,
7700 &locsyms,
7701 rel, ibfd);
7702 if (retval == 0)
7703 goto err_free_rel;
663a1470
AM
7704 if (toc_tls != NULL)
7705 {
37da22e5
AM
7706 if ((*toc_tls & TLS_TLS) != 0
7707 && ((*toc_tls & (TLS_GD | TLS_LD)) != 0))
663a1470
AM
7708 found_tls_get_addr_arg = 1;
7709 if (retval > 1)
7710 toc_ref[toc_ref_index] = 1;
7711 }
102890f0 7712 }
3a71aa26 7713 continue;
102890f0
AM
7714 }
7715
102890f0
AM
7716 /* Uh oh, we didn't find the expected call. We
7717 could just mark this symbol to exclude it
7718 from tls optimization but it's safer to skip
663a1470 7719 the entire optimization. */
695344c0 7720 /* xgettext:c-format */
25f53a85 7721 info->callbacks->minfo (_("%H arg lost __tls_get_addr, "
663a1470
AM
7722 "TLS optimization disabled\n"),
7723 ibfd, sec, rel->r_offset);
7724 ret = TRUE;
7725 goto err_free_rel;
102890f0
AM
7726 }
7727
37da22e5
AM
7728 /* If we don't have old-style __tls_get_addr calls
7729 without TLSGD/TLSLD marker relocs, and we haven't
7730 found a new-style __tls_get_addr call with a
7731 marker for this symbol, then we either have a
7732 broken object file or an -mlongcall style
7733 indirect call to __tls_get_addr without a marker.
7734 Disable optimization in this case. */
7735 if ((tls_clear & (TLS_GD | TLS_LD)) != 0
7736 && (tls_set & TLS_EXPLICIT) == 0
7737 && !sec->has_tls_get_addr_call
7738 && ((*tls_mask & (TLS_TLS | TLS_MARK))
7739 != (TLS_TLS | TLS_MARK)))
7740 continue;
7741
23cedd1d 7742 if (expecting_tls_get_addr)
102890f0 7743 {
23cedd1d
AM
7744 struct plt_entry *ent = NULL;
7745
7746 if (htab->tls_get_addr != NULL)
7747 for (ent = htab->tls_get_addr->elf.plt.plist;
7748 ent != NULL;
7749 ent = ent->next)
7750 if (ent->addend == 0)
102890f0 7751 break;
411e1bfb 7752
23cedd1d
AM
7753 if (ent == NULL && htab->tls_get_addr_fd != NULL)
7754 for (ent = htab->tls_get_addr_fd->elf.plt.plist;
7755 ent != NULL;
7756 ent = ent->next)
7757 if (ent->addend == 0)
102890f0 7758 break;
23cedd1d
AM
7759
7760 if (ent != NULL
7761 && ent->plt.refcount > 0)
7762 ent->plt.refcount -= 1;
102890f0 7763 }
411e1bfb 7764
102890f0 7765 if (tls_clear == 0)
30038c59
AM
7766 continue;
7767
102890f0
AM
7768 if ((tls_set & TLS_EXPLICIT) == 0)
7769 {
7770 struct got_entry *ent;
411e1bfb 7771
102890f0
AM
7772 /* Adjust got entry for this reloc. */
7773 if (h != NULL)
7774 ent = h->got.glist;
7775 else
7776 ent = elf_local_got_ents (ibfd)[r_symndx];
411e1bfb 7777
102890f0
AM
7778 for (; ent != NULL; ent = ent->next)
7779 if (ent->addend == rel->r_addend
7780 && ent->owner == ibfd
7781 && ent->tls_type == tls_type)
7782 break;
7783 if (ent == NULL)
7784 abort ();
411e1bfb 7785
102890f0
AM
7786 if (tls_set == 0)
7787 {
7788 /* We managed to get rid of a got entry. */
7789 if (ent->got.refcount > 0)
7790 ent->got.refcount -= 1;
7791 }
7792 }
7793 else
7794 {
7795 /* If we got rid of a DTPMOD/DTPREL reloc pair then
7796 we'll lose one or two dyn relocs. */
7797 if (!dec_dynrel_count (rel->r_info, sec, info,
19e08130 7798 NULL, h, sym))
102890f0 7799 return FALSE;
411e1bfb 7800
102890f0
AM
7801 if (tls_set == (TLS_EXPLICIT | TLS_GD))
7802 {
7803 if (!dec_dynrel_count ((rel + 1)->r_info, sec, info,
19e08130 7804 NULL, h, sym))
102890f0
AM
7805 return FALSE;
7806 }
7807 }
411e1bfb 7808
102890f0
AM
7809 *tls_mask |= tls_set;
7810 *tls_mask &= ~tls_clear;
7811 }
8c1d1bb8 7812
102890f0
AM
7813 if (elf_section_data (sec)->relocs != relstart)
7814 free (relstart);
7815 }
411e1bfb 7816
663a1470
AM
7817 if (locsyms != NULL
7818 && (elf_symtab_hdr (ibfd).contents != (unsigned char *) locsyms))
7819 {
7820 if (!info->keep_memory)
7821 free (locsyms);
7822 else
7823 elf_symtab_hdr (ibfd).contents = (unsigned char *) locsyms;
7824 }
7825 }
411e1bfb 7826
663a1470
AM
7827 if (toc_ref != NULL)
7828 free (toc_ref);
9a23f96e 7829 htab->do_tls_opt = 1;
b34976b6 7830 return TRUE;
1e2f5b6e 7831}
b34976b6 7832
c5614fa4
AM
7833/* Called via elf_link_hash_traverse from ppc64_elf_edit_toc to adjust
7834 the values of any global symbols in a toc section that has been
7835 edited. Globals in toc sections should be a rarity, so this function
7836 sets a flag if any are found in toc sections other than the one just
de194d85 7837 edited, so that further hash table traversals can be avoided. */
c5614fa4
AM
7838
7839struct adjust_toc_info
7840{
7841 asection *toc;
7842 unsigned long *skip;
7843 bfd_boolean global_toc_syms;
7844};
7845
ba761f19
AM
7846enum toc_skip_enum { ref_from_discarded = 1, can_optimize = 2 };
7847
c5614fa4
AM
7848static bfd_boolean
7849adjust_toc_syms (struct elf_link_hash_entry *h, void *inf)
7850{
7851 struct ppc_link_hash_entry *eh;
7852 struct adjust_toc_info *toc_inf = (struct adjust_toc_info *) inf;
854b41e7 7853 unsigned long i;
c5614fa4 7854
c5614fa4
AM
7855 if (h->root.type != bfd_link_hash_defined
7856 && h->root.type != bfd_link_hash_defweak)
7857 return TRUE;
7858
7859 eh = (struct ppc_link_hash_entry *) h;
7860 if (eh->adjust_done)
7861 return TRUE;
7862
7863 if (eh->elf.root.u.def.section == toc_inf->toc)
7864 {
854b41e7
AM
7865 if (eh->elf.root.u.def.value > toc_inf->toc->rawsize)
7866 i = toc_inf->toc->rawsize >> 3;
c5614fa4 7867 else
854b41e7
AM
7868 i = eh->elf.root.u.def.value >> 3;
7869
ba761f19 7870 if ((toc_inf->skip[i] & (ref_from_discarded | can_optimize)) != 0)
c5614fa4 7871 {
4eca0228 7872 _bfd_error_handler
854b41e7
AM
7873 (_("%s defined on removed toc entry"), eh->elf.root.root.string);
7874 do
7875 ++i;
ba761f19 7876 while ((toc_inf->skip[i] & (ref_from_discarded | can_optimize)) != 0);
854b41e7 7877 eh->elf.root.u.def.value = (bfd_vma) i << 3;
c5614fa4 7878 }
854b41e7
AM
7879
7880 eh->elf.root.u.def.value -= toc_inf->skip[i];
c5614fa4
AM
7881 eh->adjust_done = 1;
7882 }
7883 else if (strcmp (eh->elf.root.u.def.section->name, ".toc") == 0)
7884 toc_inf->global_toc_syms = TRUE;
7885
7886 return TRUE;
7887}
7888
39eeab25
AM
7889/* Return TRUE iff INSN with a relocation of R_TYPE is one we expect
7890 on a _LO variety toc/got reloc. */
560c8763
AM
7891
7892static bfd_boolean
39eeab25 7893ok_lo_toc_insn (unsigned int insn, enum elf_ppc64_reloc_type r_type)
560c8763 7894{
39eeab25
AM
7895 return ((insn & (0x3f << 26)) == 12u << 26 /* addic */
7896 || (insn & (0x3f << 26)) == 14u << 26 /* addi */
560c8763
AM
7897 || (insn & (0x3f << 26)) == 32u << 26 /* lwz */
7898 || (insn & (0x3f << 26)) == 34u << 26 /* lbz */
7899 || (insn & (0x3f << 26)) == 36u << 26 /* stw */
7900 || (insn & (0x3f << 26)) == 38u << 26 /* stb */
7901 || (insn & (0x3f << 26)) == 40u << 26 /* lhz */
7902 || (insn & (0x3f << 26)) == 42u << 26 /* lha */
7903 || (insn & (0x3f << 26)) == 44u << 26 /* sth */
7904 || (insn & (0x3f << 26)) == 46u << 26 /* lmw */
7905 || (insn & (0x3f << 26)) == 47u << 26 /* stmw */
7906 || (insn & (0x3f << 26)) == 48u << 26 /* lfs */
7907 || (insn & (0x3f << 26)) == 50u << 26 /* lfd */
7908 || (insn & (0x3f << 26)) == 52u << 26 /* stfs */
7909 || (insn & (0x3f << 26)) == 54u << 26 /* stfd */
39eeab25
AM
7910 || (insn & (0x3f << 26)) == 56u << 26 /* lq,lfq */
7911 || ((insn & (0x3f << 26)) == 57u << 26 /* lxsd,lxssp,lfdp */
7912 /* Exclude lfqu by testing reloc. If relocs are ever
7913 defined for the reduced D field in psq_lu then those
7914 will need testing too. */
7915 && r_type != R_PPC64_TOC16_LO && r_type != R_PPC64_GOT16_LO)
7916 || ((insn & (0x3f << 26)) == 58u << 26 /* ld,lwa */
7917 && (insn & 1) == 0)
7918 || (insn & (0x3f << 26)) == 60u << 26 /* stfq */
7919 || ((insn & (0x3f << 26)) == 61u << 26 /* lxv,stx{v,sd,ssp},stfdp */
7920 /* Exclude stfqu. psq_stu as above for psq_lu. */
7921 && r_type != R_PPC64_TOC16_LO && r_type != R_PPC64_GOT16_LO)
7922 || ((insn & (0x3f << 26)) == 62u << 26 /* std,stq */
7923 && (insn & 1) == 0));
560c8763
AM
7924}
7925
c5614fa4
AM
7926/* Examine all relocs referencing .toc sections in order to remove
7927 unused .toc entries. */
7928
7929bfd_boolean
33c0ec9d 7930ppc64_elf_edit_toc (struct bfd_link_info *info)
c5614fa4
AM
7931{
7932 bfd *ibfd;
7933 struct adjust_toc_info toc_inf;
67f0cbdb 7934 struct ppc_link_hash_table *htab = ppc_hash_table (info);
c5614fa4 7935
67f0cbdb 7936 htab->do_toc_opt = 1;
c5614fa4 7937 toc_inf.global_toc_syms = TRUE;
c72f2fb2 7938 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
c5614fa4
AM
7939 {
7940 asection *toc, *sec;
7941 Elf_Internal_Shdr *symtab_hdr;
7942 Elf_Internal_Sym *local_syms;
425b145b 7943 Elf_Internal_Rela *relstart, *rel, *toc_relocs;
c5614fa4
AM
7944 unsigned long *skip, *drop;
7945 unsigned char *used;
7946 unsigned char *keep, last, some_unused;
7947
854b41e7
AM
7948 if (!is_ppc64_elf (ibfd))
7949 continue;
7950
c5614fa4
AM
7951 toc = bfd_get_section_by_name (ibfd, ".toc");
7952 if (toc == NULL
92b7a70f 7953 || toc->size == 0
dbaa2011
AM
7954 || toc->sec_info_type == SEC_INFO_TYPE_JUST_SYMS
7955 || discarded_section (toc))
c5614fa4
AM
7956 continue;
7957
425b145b 7958 toc_relocs = NULL;
c5614fa4 7959 local_syms = NULL;
0ffa91dd 7960 symtab_hdr = &elf_symtab_hdr (ibfd);
c5614fa4
AM
7961
7962 /* Look at sections dropped from the final link. */
7963 skip = NULL;
7964 relstart = NULL;
7965 for (sec = ibfd->sections; sec != NULL; sec = sec->next)
7966 {
7967 if (sec->reloc_count == 0
dbaa2011 7968 || !discarded_section (sec)
c5614fa4
AM
7969 || get_opd_info (sec)
7970 || (sec->flags & SEC_ALLOC) == 0
7971 || (sec->flags & SEC_DEBUGGING) != 0)
7972 continue;
7973
7974 relstart = _bfd_elf_link_read_relocs (ibfd, sec, NULL, NULL, FALSE);
7975 if (relstart == NULL)
7976 goto error_ret;
7977
7978 /* Run through the relocs to see which toc entries might be
7979 unused. */
7980 for (rel = relstart; rel < relstart + sec->reloc_count; ++rel)
7981 {
7982 enum elf_ppc64_reloc_type r_type;
7983 unsigned long r_symndx;
7984 asection *sym_sec;
7985 struct elf_link_hash_entry *h;
7986 Elf_Internal_Sym *sym;
7987 bfd_vma val;
7988
7989 r_type = ELF64_R_TYPE (rel->r_info);
7990 switch (r_type)
7991 {
7992 default:
7993 continue;
7994
7995 case R_PPC64_TOC16:
7996 case R_PPC64_TOC16_LO:
7997 case R_PPC64_TOC16_HI:
7998 case R_PPC64_TOC16_HA:
7999 case R_PPC64_TOC16_DS:
8000 case R_PPC64_TOC16_LO_DS:
8001 break;
8002 }
8003
8004 r_symndx = ELF64_R_SYM (rel->r_info);
8005 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms,
8006 r_symndx, ibfd))
8007 goto error_ret;
8008
8009 if (sym_sec != toc)
8010 continue;
8011
8012 if (h != NULL)
8013 val = h->root.u.def.value;
8014 else
8015 val = sym->st_value;
8016 val += rel->r_addend;
8017
8018 if (val >= toc->size)
8019 continue;
8020
8021 /* Anything in the toc ought to be aligned to 8 bytes.
8022 If not, don't mark as unused. */
8023 if (val & 7)
8024 continue;
8025
8026 if (skip == NULL)
8027 {
854b41e7 8028 skip = bfd_zmalloc (sizeof (*skip) * (toc->size + 15) / 8);
c5614fa4
AM
8029 if (skip == NULL)
8030 goto error_ret;
8031 }
8032
ba761f19 8033 skip[val >> 3] = ref_from_discarded;
c5614fa4
AM
8034 }
8035
8036 if (elf_section_data (sec)->relocs != relstart)
8037 free (relstart);
8038 }
8039
ba761f19
AM
8040 /* For largetoc loads of address constants, we can convert
8041 . addis rx,2,addr@got@ha
8042 . ld ry,addr@got@l(rx)
8043 to
8044 . addis rx,2,addr@toc@ha
8045 . addi ry,rx,addr@toc@l
8046 when addr is within 2G of the toc pointer. This then means
8047 that the word storing "addr" in the toc is no longer needed. */
68ffbac6 8048
ba761f19
AM
8049 if (!ppc64_elf_tdata (ibfd)->has_small_toc_reloc
8050 && toc->output_section->rawsize < (bfd_vma) 1 << 31
8051 && toc->reloc_count != 0)
8052 {
8053 /* Read toc relocs. */
425b145b
AM
8054 toc_relocs = _bfd_elf_link_read_relocs (ibfd, toc, NULL, NULL,
8055 info->keep_memory);
8056 if (toc_relocs == NULL)
ba761f19
AM
8057 goto error_ret;
8058
425b145b 8059 for (rel = toc_relocs; rel < toc_relocs + toc->reloc_count; ++rel)
ba761f19
AM
8060 {
8061 enum elf_ppc64_reloc_type r_type;
8062 unsigned long r_symndx;
8063 asection *sym_sec;
8064 struct elf_link_hash_entry *h;
8065 Elf_Internal_Sym *sym;
8066 bfd_vma val, addr;
8067
8068 r_type = ELF64_R_TYPE (rel->r_info);
8069 if (r_type != R_PPC64_ADDR64)
8070 continue;
8071
8072 r_symndx = ELF64_R_SYM (rel->r_info);
8073 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms,
8074 r_symndx, ibfd))
8075 goto error_ret;
8076
425b145b 8077 if (sym_sec == NULL
c27b8c2a 8078 || sym_sec->output_section == NULL
dbaa2011 8079 || discarded_section (sym_sec))
425b145b
AM
8080 continue;
8081
afe397ea 8082 if (!SYMBOL_REFERENCES_LOCAL (info, h))
ba761f19
AM
8083 continue;
8084
8085 if (h != NULL)
bddc25c9
AM
8086 {
8087 if (h->type == STT_GNU_IFUNC)
8088 continue;
8089 val = h->root.u.def.value;
8090 }
ba761f19 8091 else
bddc25c9
AM
8092 {
8093 if (ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC)
8094 continue;
8095 val = sym->st_value;
8096 }
ba761f19
AM
8097 val += rel->r_addend;
8098 val += sym_sec->output_section->vma + sym_sec->output_offset;
8099
8100 /* We don't yet know the exact toc pointer value, but we
8101 know it will be somewhere in the toc section. Don't
8102 optimize if the difference from any possible toc
8103 pointer is outside [ff..f80008000, 7fff7fff]. */
8104 addr = toc->output_section->vma + TOC_BASE_OFF;
8105 if (val - addr + (bfd_vma) 0x80008000 >= (bfd_vma) 1 << 32)
8106 continue;
8107
8108 addr = toc->output_section->vma + toc->output_section->rawsize;
8109 if (val - addr + (bfd_vma) 0x80008000 >= (bfd_vma) 1 << 32)
8110 continue;
8111
8112 if (skip == NULL)
8113 {
8114 skip = bfd_zmalloc (sizeof (*skip) * (toc->size + 15) / 8);
8115 if (skip == NULL)
8116 goto error_ret;
8117 }
8118
8119 skip[rel->r_offset >> 3]
425b145b 8120 |= can_optimize | ((rel - toc_relocs) << 2);
ba761f19 8121 }
ba761f19
AM
8122 }
8123
c5614fa4
AM
8124 if (skip == NULL)
8125 continue;
8126
8127 used = bfd_zmalloc (sizeof (*used) * (toc->size + 7) / 8);
8128 if (used == NULL)
8129 {
8130 error_ret:
8131 if (local_syms != NULL
8132 && symtab_hdr->contents != (unsigned char *) local_syms)
8133 free (local_syms);
8134 if (sec != NULL
8135 && relstart != NULL
8136 && elf_section_data (sec)->relocs != relstart)
8137 free (relstart);
425b145b
AM
8138 if (toc_relocs != NULL
8139 && elf_section_data (toc)->relocs != toc_relocs)
8140 free (toc_relocs);
c5614fa4
AM
8141 if (skip != NULL)
8142 free (skip);
8143 return FALSE;
8144 }
8145
30038c59
AM
8146 /* Now check all kept sections that might reference the toc.
8147 Check the toc itself last. */
8148 for (sec = (ibfd->sections == toc && toc->next ? toc->next
8149 : ibfd->sections);
c5614fa4 8150 sec != NULL;
c5614fa4 8151 sec = (sec == toc ? NULL
c5614fa4 8152 : sec->next == NULL ? toc
30038c59 8153 : sec->next == toc && toc->next ? toc->next
c5614fa4
AM
8154 : sec->next))
8155 {
8156 int repeat;
8157
8158 if (sec->reloc_count == 0
dbaa2011 8159 || discarded_section (sec)
c5614fa4
AM
8160 || get_opd_info (sec)
8161 || (sec->flags & SEC_ALLOC) == 0
8162 || (sec->flags & SEC_DEBUGGING) != 0)
8163 continue;
8164
854b41e7
AM
8165 relstart = _bfd_elf_link_read_relocs (ibfd, sec, NULL, NULL,
8166 info->keep_memory);
c5614fa4 8167 if (relstart == NULL)
2915c55b
JK
8168 {
8169 free (used);
8170 goto error_ret;
8171 }
c5614fa4
AM
8172
8173 /* Mark toc entries referenced as used. */
c5614fa4 8174 do
d4f1ee75
AM
8175 {
8176 repeat = 0;
8177 for (rel = relstart; rel < relstart + sec->reloc_count; ++rel)
8178 {
8179 enum elf_ppc64_reloc_type r_type;
8180 unsigned long r_symndx;
8181 asection *sym_sec;
8182 struct elf_link_hash_entry *h;
8183 Elf_Internal_Sym *sym;
8184 bfd_vma val;
8185 enum {no_check, check_lo, check_ha} insn_check;
98528052 8186
d4f1ee75
AM
8187 r_type = ELF64_R_TYPE (rel->r_info);
8188 switch (r_type)
8189 {
8190 default:
8191 insn_check = no_check;
8192 break;
98528052 8193
d4f1ee75
AM
8194 case R_PPC64_GOT_TLSLD16_HA:
8195 case R_PPC64_GOT_TLSGD16_HA:
8196 case R_PPC64_GOT_TPREL16_HA:
8197 case R_PPC64_GOT_DTPREL16_HA:
8198 case R_PPC64_GOT16_HA:
8199 case R_PPC64_TOC16_HA:
8200 insn_check = check_ha;
8201 break;
98528052 8202
d4f1ee75
AM
8203 case R_PPC64_GOT_TLSLD16_LO:
8204 case R_PPC64_GOT_TLSGD16_LO:
8205 case R_PPC64_GOT_TPREL16_LO_DS:
8206 case R_PPC64_GOT_DTPREL16_LO_DS:
8207 case R_PPC64_GOT16_LO:
8208 case R_PPC64_GOT16_LO_DS:
8209 case R_PPC64_TOC16_LO:
8210 case R_PPC64_TOC16_LO_DS:
8211 insn_check = check_lo;
8212 break;
8213 }
560c8763 8214
d4f1ee75
AM
8215 if (insn_check != no_check)
8216 {
8217 bfd_vma off = rel->r_offset & ~3;
8218 unsigned char buf[4];
8219 unsigned int insn;
c5614fa4 8220
d4f1ee75
AM
8221 if (!bfd_get_section_contents (ibfd, sec, buf, off, 4))
8222 {
8223 free (used);
8224 goto error_ret;
8225 }
8226 insn = bfd_get_32 (ibfd, buf);
8227 if (insn_check == check_lo
39eeab25 8228 ? !ok_lo_toc_insn (insn, r_type)
d4f1ee75
AM
8229 : ((insn & ((0x3f << 26) | 0x1f << 16))
8230 != ((15u << 26) | (2 << 16)) /* addis rt,2,imm */))
8231 {
8232 char str[12];
8233
8234 ppc64_elf_tdata (ibfd)->unexpected_toc_insn = 1;
8235 sprintf (str, "%#08x", insn);
8236 info->callbacks->einfo
695344c0 8237 /* xgettext:c-format */
174d0a74 8238 (_("%H: toc optimization is not supported for"
cf97bcb0 8239 " %s instruction\n"),
d4f1ee75
AM
8240 ibfd, sec, rel->r_offset & ~3, str);
8241 }
8242 }
c5614fa4 8243
d4f1ee75
AM
8244 switch (r_type)
8245 {
8246 case R_PPC64_TOC16:
8247 case R_PPC64_TOC16_LO:
8248 case R_PPC64_TOC16_HI:
8249 case R_PPC64_TOC16_HA:
8250 case R_PPC64_TOC16_DS:
8251 case R_PPC64_TOC16_LO_DS:
8252 /* In case we're taking addresses of toc entries. */
8253 case R_PPC64_ADDR64:
8254 break;
c5614fa4 8255
d4f1ee75
AM
8256 default:
8257 continue;
8258 }
c5614fa4 8259
d4f1ee75
AM
8260 r_symndx = ELF64_R_SYM (rel->r_info);
8261 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms,
8262 r_symndx, ibfd))
8263 {
8264 free (used);
8265 goto error_ret;
8266 }
c5614fa4 8267
d4f1ee75
AM
8268 if (sym_sec != toc)
8269 continue;
c5614fa4 8270
d4f1ee75
AM
8271 if (h != NULL)
8272 val = h->root.u.def.value;
8273 else
8274 val = sym->st_value;
8275 val += rel->r_addend;
ba761f19 8276
d4f1ee75
AM
8277 if (val >= toc->size)
8278 continue;
ba761f19 8279
d4f1ee75
AM
8280 if ((skip[val >> 3] & can_optimize) != 0)
8281 {
8282 bfd_vma off;
8283 unsigned char opc;
8284
8285 switch (r_type)
8286 {
8287 case R_PPC64_TOC16_HA:
ba761f19 8288 break;
ba761f19 8289
d4f1ee75
AM
8290 case R_PPC64_TOC16_LO_DS:
8291 off = rel->r_offset;
8292 off += (bfd_big_endian (ibfd) ? -2 : 3);
8293 if (!bfd_get_section_contents (ibfd, sec, &opc,
8294 off, 1))
8295 {
8296 free (used);
8297 goto error_ret;
8298 }
8299 if ((opc & (0x3f << 2)) == (58u << 2))
8300 break;
1a0670f3 8301 /* Fall through. */
ba761f19 8302
d4f1ee75
AM
8303 default:
8304 /* Wrong sort of reloc, or not a ld. We may
8305 as well clear ref_from_discarded too. */
8306 skip[val >> 3] = 0;
8307 }
8308 }
8309
8310 if (sec != toc)
8311 used[val >> 3] = 1;
8312 /* For the toc section, we only mark as used if this
8313 entry itself isn't unused. */
8314 else if ((used[rel->r_offset >> 3]
8315 || !(skip[rel->r_offset >> 3] & ref_from_discarded))
8316 && !used[val >> 3])
8317 {
8318 /* Do all the relocs again, to catch reference
8319 chains. */
8320 repeat = 1;
8321 used[val >> 3] = 1;
8322 }
8323 }
8324 }
c5614fa4 8325 while (repeat);
854b41e7
AM
8326
8327 if (elf_section_data (sec)->relocs != relstart)
8328 free (relstart);
c5614fa4
AM
8329 }
8330
8331 /* Merge the used and skip arrays. Assume that TOC
8332 doublewords not appearing as either used or unused belong
de194d85 8333 to an entry more than one doubleword in size. */
c5614fa4
AM
8334 for (drop = skip, keep = used, last = 0, some_unused = 0;
8335 drop < skip + (toc->size + 7) / 8;
8336 ++drop, ++keep)
8337 {
8338 if (*keep)
8339 {
ba761f19
AM
8340 *drop &= ~ref_from_discarded;
8341 if ((*drop & can_optimize) != 0)
8342 some_unused = 1;
c5614fa4
AM
8343 last = 0;
8344 }
b140b010 8345 else if ((*drop & ref_from_discarded) != 0)
c5614fa4
AM
8346 {
8347 some_unused = 1;
ba761f19 8348 last = ref_from_discarded;
c5614fa4
AM
8349 }
8350 else
8351 *drop = last;
8352 }
8353
8354 free (used);
8355
8356 if (some_unused)
8357 {
8358 bfd_byte *contents, *src;
8359 unsigned long off;
d62b3684 8360 Elf_Internal_Sym *sym;
ba761f19 8361 bfd_boolean local_toc_syms = FALSE;
c5614fa4
AM
8362
8363 /* Shuffle the toc contents, and at the same time convert the
8364 skip array from booleans into offsets. */
8365 if (!bfd_malloc_and_get_section (ibfd, toc, &contents))
8366 goto error_ret;
8367
8368 elf_section_data (toc)->this_hdr.contents = contents;
8369
8370 for (src = contents, off = 0, drop = skip;
8371 src < contents + toc->size;
8372 src += 8, ++drop)
8373 {
ba761f19
AM
8374 if ((*drop & (can_optimize | ref_from_discarded)) != 0)
8375 off += 8;
c5614fa4
AM
8376 else if (off != 0)
8377 {
8378 *drop = off;
8379 memcpy (src - off, src, 8);
8380 }
8381 }
854b41e7 8382 *drop = off;
c5614fa4
AM
8383 toc->rawsize = toc->size;
8384 toc->size = src - contents - off;
8385
ba761f19
AM
8386 /* Adjust addends for relocs against the toc section sym,
8387 and optimize any accesses we can. */
c5614fa4
AM
8388 for (sec = ibfd->sections; sec != NULL; sec = sec->next)
8389 {
8390 if (sec->reloc_count == 0
dbaa2011 8391 || discarded_section (sec))
c5614fa4
AM
8392 continue;
8393
8394 relstart = _bfd_elf_link_read_relocs (ibfd, sec, NULL, NULL,
854b41e7 8395 info->keep_memory);
c5614fa4
AM
8396 if (relstart == NULL)
8397 goto error_ret;
8398
8399 for (rel = relstart; rel < relstart + sec->reloc_count; ++rel)
8400 {
8401 enum elf_ppc64_reloc_type r_type;
8402 unsigned long r_symndx;
8403 asection *sym_sec;
8404 struct elf_link_hash_entry *h;
854b41e7 8405 bfd_vma val;
c5614fa4
AM
8406
8407 r_type = ELF64_R_TYPE (rel->r_info);
8408 switch (r_type)
8409 {
8410 default:
8411 continue;
8412
8413 case R_PPC64_TOC16:
8414 case R_PPC64_TOC16_LO:
8415 case R_PPC64_TOC16_HI:
8416 case R_PPC64_TOC16_HA:
8417 case R_PPC64_TOC16_DS:
8418 case R_PPC64_TOC16_LO_DS:
8419 case R_PPC64_ADDR64:
8420 break;
8421 }
8422
8423 r_symndx = ELF64_R_SYM (rel->r_info);
8424 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms,
8425 r_symndx, ibfd))
8426 goto error_ret;
8427
ba761f19 8428 if (sym_sec != toc)
c5614fa4
AM
8429 continue;
8430
ba761f19
AM
8431 if (h != NULL)
8432 val = h->root.u.def.value;
8433 else
8434 {
8435 val = sym->st_value;
8436 if (val != 0)
8437 local_toc_syms = TRUE;
8438 }
8439
8440 val += rel->r_addend;
854b41e7
AM
8441
8442 if (val > toc->rawsize)
8443 val = toc->rawsize;
ba761f19
AM
8444 else if ((skip[val >> 3] & ref_from_discarded) != 0)
8445 continue;
8446 else if ((skip[val >> 3] & can_optimize) != 0)
8447 {
8448 Elf_Internal_Rela *tocrel
425b145b 8449 = toc_relocs + (skip[val >> 3] >> 2);
ba761f19
AM
8450 unsigned long tsym = ELF64_R_SYM (tocrel->r_info);
8451
8452 switch (r_type)
8453 {
8454 case R_PPC64_TOC16_HA:
8455 rel->r_info = ELF64_R_INFO (tsym, R_PPC64_TOC16_HA);
8456 break;
8457
8458 case R_PPC64_TOC16_LO_DS:
8459 rel->r_info = ELF64_R_INFO (tsym, R_PPC64_LO_DS_OPT);
8460 break;
8461
8462 default:
28942f62
AM
8463 if (!ppc64_elf_howto_table[R_PPC64_ADDR32])
8464 ppc_howto_init ();
b140b010 8465 info->callbacks->einfo
695344c0 8466 /* xgettext:c-format */
174d0a74 8467 (_("%H: %s references "
b140b010
AM
8468 "optimized away TOC entry\n"),
8469 ibfd, sec, rel->r_offset,
8470 ppc64_elf_howto_table[r_type]->name);
8471 bfd_set_error (bfd_error_bad_value);
8472 goto error_ret;
ba761f19
AM
8473 }
8474 rel->r_addend = tocrel->r_addend;
8475 elf_section_data (sec)->relocs = relstart;
8476 continue;
8477 }
8478
8479 if (h != NULL || sym->st_value != 0)
8480 continue;
854b41e7
AM
8481
8482 rel->r_addend -= skip[val >> 3];
8483 elf_section_data (sec)->relocs = relstart;
c5614fa4 8484 }
854b41e7
AM
8485
8486 if (elf_section_data (sec)->relocs != relstart)
8487 free (relstart);
c5614fa4
AM
8488 }
8489
8490 /* We shouldn't have local or global symbols defined in the TOC,
8491 but handle them anyway. */
df22d223
AM
8492 if (local_syms != NULL)
8493 for (sym = local_syms;
8494 sym < local_syms + symtab_hdr->sh_info;
8495 ++sym)
8496 if (sym->st_value != 0
8497 && bfd_section_from_elf_index (ibfd, sym->st_shndx) == toc)
8498 {
8499 unsigned long i;
854b41e7 8500
df22d223
AM
8501 if (sym->st_value > toc->rawsize)
8502 i = toc->rawsize >> 3;
8503 else
8504 i = sym->st_value >> 3;
854b41e7 8505
df22d223
AM
8506 if ((skip[i] & (ref_from_discarded | can_optimize)) != 0)
8507 {
8508 if (local_toc_syms)
4eca0228 8509 _bfd_error_handler
df22d223
AM
8510 (_("%s defined on removed toc entry"),
8511 bfd_elf_sym_name (ibfd, symtab_hdr, sym, NULL));
8512 do
8513 ++i;
8514 while ((skip[i] & (ref_from_discarded | can_optimize)));
8515 sym->st_value = (bfd_vma) i << 3;
8516 }
d62b3684 8517
df22d223
AM
8518 sym->st_value -= skip[i];
8519 symtab_hdr->contents = (unsigned char *) local_syms;
8520 }
c5614fa4 8521
854b41e7 8522 /* Adjust any global syms defined in this toc input section. */
c5614fa4
AM
8523 if (toc_inf.global_toc_syms)
8524 {
8525 toc_inf.toc = toc;
8526 toc_inf.skip = skip;
8527 toc_inf.global_toc_syms = FALSE;
8528 elf_link_hash_traverse (elf_hash_table (info), adjust_toc_syms,
8529 &toc_inf);
8530 }
854b41e7
AM
8531
8532 if (toc->reloc_count != 0)
8533 {
d4730f92 8534 Elf_Internal_Shdr *rel_hdr;
854b41e7
AM
8535 Elf_Internal_Rela *wrel;
8536 bfd_size_type sz;
8537
854b41e7 8538 /* Remove unused toc relocs, and adjust those we keep. */
28be611c
AM
8539 if (toc_relocs == NULL)
8540 toc_relocs = _bfd_elf_link_read_relocs (ibfd, toc, NULL, NULL,
8541 info->keep_memory);
8542 if (toc_relocs == NULL)
8543 goto error_ret;
8544
425b145b
AM
8545 wrel = toc_relocs;
8546 for (rel = toc_relocs; rel < toc_relocs + toc->reloc_count; ++rel)
ba761f19
AM
8547 if ((skip[rel->r_offset >> 3]
8548 & (ref_from_discarded | can_optimize)) == 0)
854b41e7
AM
8549 {
8550 wrel->r_offset = rel->r_offset - skip[rel->r_offset >> 3];
8551 wrel->r_info = rel->r_info;
8552 wrel->r_addend = rel->r_addend;
8553 ++wrel;
8554 }
8555 else if (!dec_dynrel_count (rel->r_info, toc, info,
8556 &local_syms, NULL, NULL))
8557 goto error_ret;
8558
425b145b
AM
8559 elf_section_data (toc)->relocs = toc_relocs;
8560 toc->reloc_count = wrel - toc_relocs;
d4730f92
BS
8561 rel_hdr = _bfd_elf_single_rel_hdr (toc);
8562 sz = rel_hdr->sh_entsize;
8563 rel_hdr->sh_size = toc->reloc_count * sz;
854b41e7 8564 }
c5614fa4 8565 }
28be611c
AM
8566 else if (toc_relocs != NULL
8567 && elf_section_data (toc)->relocs != toc_relocs)
425b145b 8568 free (toc_relocs);
c5614fa4
AM
8569
8570 if (local_syms != NULL
8571 && symtab_hdr->contents != (unsigned char *) local_syms)
8572 {
8573 if (!info->keep_memory)
8574 free (local_syms);
8575 else
8576 symtab_hdr->contents = (unsigned char *) local_syms;
8577 }
8578 free (skip);
8579 }
8580
8581 return TRUE;
8582}
8583
1bbe0902
AM
8584/* Return true iff input section I references the TOC using
8585 instructions limited to +/-32k offsets. */
8586
8587bfd_boolean
8588ppc64_elf_has_small_toc_reloc (asection *i)
8589{
8590 return (is_ppc64_elf (i->owner)
8591 && ppc64_elf_tdata (i->owner)->has_small_toc_reloc);
8592}
8593
927be08e
AM
8594/* Allocate space for one GOT entry. */
8595
8596static void
8597allocate_got (struct elf_link_hash_entry *h,
8598 struct bfd_link_info *info,
8599 struct got_entry *gent)
8600{
8601 struct ppc_link_hash_table *htab = ppc_hash_table (info);
927be08e
AM
8602 struct ppc_link_hash_entry *eh = (struct ppc_link_hash_entry *) h;
8603 int entsize = (gent->tls_type & eh->tls_mask & (TLS_GD | TLS_LD)
8604 ? 16 : 8);
8605 int rentsize = (gent->tls_type & eh->tls_mask & TLS_GD
8606 ? 2 : 1) * sizeof (Elf64_External_Rela);
8607 asection *got = ppc64_elf_tdata (gent->owner)->got;
8608
8609 gent->got.offset = got->size;
8610 got->size += entsize;
8611
19e08130 8612 if (h->type == STT_GNU_IFUNC)
927be08e 8613 {
33e44f2e 8614 htab->elf.irelplt->size += rentsize;
19e08130 8615 htab->got_reli_size += rentsize;
927be08e 8616 }
f15d0b54
AM
8617 else if (((bfd_link_pic (info)
8618 && !((gent->tls_type & TLS_TPREL) != 0
8619 && bfd_link_executable (info)
8620 && SYMBOL_REFERENCES_LOCAL (info, h)))
f0158f44
AM
8621 || (htab->elf.dynamic_sections_created
8622 && h->dynindx != -1
8623 && !SYMBOL_REFERENCES_LOCAL (info, h)))
21d68fcd 8624 && !UNDEFWEAK_NO_DYNAMIC_RELOC (info, h))
927be08e 8625 {
19e08130 8626 asection *relgot = ppc64_elf_tdata (gent->owner)->relgot;
927be08e 8627 relgot->size += rentsize;
927be08e
AM
8628 }
8629}
8630
7865406b
AM
8631/* This function merges got entries in the same toc group. */
8632
8633static void
8634merge_got_entries (struct got_entry **pent)
8635{
8636 struct got_entry *ent, *ent2;
8637
8638 for (ent = *pent; ent != NULL; ent = ent->next)
8639 if (!ent->is_indirect)
8640 for (ent2 = ent->next; ent2 != NULL; ent2 = ent2->next)
8641 if (!ent2->is_indirect
8642 && ent2->addend == ent->addend
8643 && ent2->tls_type == ent->tls_type
8644 && elf_gp (ent2->owner) == elf_gp (ent->owner))
8645 {
8646 ent2->is_indirect = TRUE;
8647 ent2->got.ent = ent;
8648 }
8649}
8650
46434633 8651/* If H is undefined, make it dynamic if that makes sense. */
f0158f44
AM
8652
8653static bfd_boolean
46434633
AM
8654ensure_undef_dynamic (struct bfd_link_info *info,
8655 struct elf_link_hash_entry *h)
f0158f44
AM
8656{
8657 struct elf_link_hash_table *htab = elf_hash_table (info);
8658
8659 if (htab->dynamic_sections_created
46434633
AM
8660 && ((info->dynamic_undefined_weak != 0
8661 && h->root.type == bfd_link_hash_undefweak)
8662 || h->root.type == bfd_link_hash_undefined)
f0158f44
AM
8663 && h->dynindx == -1
8664 && !h->forced_local
8665 && ELF_ST_VISIBILITY (h->other) == STV_DEFAULT)
8666 return bfd_elf_link_record_dynamic_symbol (info, h);
8667 return TRUE;
8668}
8669
65f38f15
AM
8670/* Allocate space in .plt, .got and associated reloc sections for
8671 dynamic relocs. */
5bd4f169 8672
b34976b6 8673static bfd_boolean
4ce794b7 8674allocate_dynrelocs (struct elf_link_hash_entry *h, void *inf)
5bd4f169 8675{
65f38f15
AM
8676 struct bfd_link_info *info;
8677 struct ppc_link_hash_table *htab;
5bd4f169 8678 asection *s;
65f38f15 8679 struct ppc_link_hash_entry *eh;
0b8bcf0d 8680 struct got_entry **pgent, *gent;
5bd4f169 8681
e92d460e 8682 if (h->root.type == bfd_link_hash_indirect)
b34976b6 8683 return TRUE;
5bd4f169 8684
65f38f15
AM
8685 info = (struct bfd_link_info *) inf;
8686 htab = ppc_hash_table (info);
4dfe6ac6
NC
8687 if (htab == NULL)
8688 return FALSE;
5bd4f169 8689
951fd09b
AM
8690 eh = (struct ppc_link_hash_entry *) h;
8691 /* Run through the TLS GD got entries first if we're changing them
8692 to TPREL. */
37da22e5 8693 if ((eh->tls_mask & (TLS_TLS | TLS_TPRELGD)) == (TLS_TLS | TLS_TPRELGD))
951fd09b
AM
8694 for (gent = h->got.glist; gent != NULL; gent = gent->next)
8695 if (gent->got.refcount > 0
8696 && (gent->tls_type & TLS_GD) != 0)
8697 {
8698 /* This was a GD entry that has been converted to TPREL. If
8699 there happens to be a TPREL entry we can use that one. */
8700 struct got_entry *ent;
8701 for (ent = h->got.glist; ent != NULL; ent = ent->next)
8702 if (ent->got.refcount > 0
8703 && (ent->tls_type & TLS_TPREL) != 0
e717da7e
AM
8704 && ent->addend == gent->addend
8705 && ent->owner == gent->owner)
951fd09b
AM
8706 {
8707 gent->got.refcount = 0;
8708 break;
8709 }
8710
8711 /* If not, then we'll be using our own TPREL entry. */
8712 if (gent->got.refcount != 0)
8713 gent->tls_type = TLS_TLS | TLS_TPREL;
8714 }
8715
7865406b
AM
8716 /* Remove any list entry that won't generate a word in the GOT before
8717 we call merge_got_entries. Otherwise we risk merging to empty
8718 entries. */
0b8bcf0d
AM
8719 pgent = &h->got.glist;
8720 while ((gent = *pgent) != NULL)
411e1bfb 8721 if (gent->got.refcount > 0)
7865406b
AM
8722 {
8723 if ((gent->tls_type & TLS_LD) != 0
8724 && !h->def_dynamic)
8725 {
8726 ppc64_tlsld_got (gent->owner)->got.refcount += 1;
8727 *pgent = gent->next;
8728 }
8729 else
8730 pgent = &gent->next;
8731 }
8732 else
8733 *pgent = gent->next;
8734
8735 if (!htab->do_multi_toc)
8736 merge_got_entries (&h->got.glist);
8737
8738 for (gent = h->got.glist; gent != NULL; gent = gent->next)
8739 if (!gent->is_indirect)
411e1bfb 8740 {
46434633
AM
8741 /* Make sure this symbol is output as a dynamic symbol. */
8742 if (!ensure_undef_dynamic (info, h))
f0158f44 8743 return FALSE;
65f38f15 8744
0c8d6e5c 8745 if (!is_ppc64_elf (gent->owner))
927be08e 8746 abort ();
0ffa91dd 8747
927be08e 8748 allocate_got (h, info, gent);
411e1bfb 8749 }
65f38f15 8750
954b63d4
AM
8751 /* If no dynamic sections we can't have dynamic relocs, except for
8752 IFUNCs which are handled even in static executables. */
8a2058b5
AM
8753 if (!htab->elf.dynamic_sections_created
8754 && h->type != STT_GNU_IFUNC)
8755 eh->dyn_relocs = NULL;
8756
529fe20e
AM
8757 /* Discard relocs on undefined symbols that must be local. */
8758 else if (h->root.type == bfd_link_hash_undefined
8759 && ELF_ST_VISIBILITY (h->other) != STV_DEFAULT)
8760 eh->dyn_relocs = NULL;
8761
954b63d4
AM
8762 /* Also discard relocs on undefined weak syms with non-default
8763 visibility, or when dynamic_undefined_weak says so. */
21d68fcd 8764 else if (UNDEFWEAK_NO_DYNAMIC_RELOC (info, h))
954b63d4
AM
8765 eh->dyn_relocs = NULL;
8766
8a2058b5 8767 if (eh->dyn_relocs != NULL)
65f38f15 8768 {
8a2058b5
AM
8769 struct elf_dyn_relocs *p, **pp;
8770
57e7d118
AM
8771 /* In the shared -Bsymbolic case, discard space allocated for
8772 dynamic pc-relative relocs against symbols which turn out to
8773 be defined in regular objects. For the normal shared case,
8774 discard space for relocs that have become local due to symbol
8775 visibility changes. */
8776
8777 if (bfd_link_pic (info))
65f38f15 8778 {
57e7d118
AM
8779 /* Relocs that use pc_count are those that appear on a call
8780 insn, or certain REL relocs (see must_be_dyn_reloc) that
8781 can be generated via assembly. We want calls to
8782 protected symbols to resolve directly to the function
8783 rather than going via the plt. If people want function
8784 pointer comparisons to work as expected then they should
8785 avoid writing weird assembly. */
8786 if (SYMBOL_CALLS_LOCAL (info, h))
8787 {
57e7d118
AM
8788 for (pp = &eh->dyn_relocs; (p = *pp) != NULL; )
8789 {
8790 p->count -= p->pc_count;
8791 p->pc_count = 0;
8792 if (p->count == 0)
8793 *pp = p->next;
8794 else
8795 pp = &p->next;
8796 }
8797 }
65f38f15 8798
954b63d4 8799 if (eh->dyn_relocs != NULL)
5bd4f169 8800 {
46434633
AM
8801 /* Make sure this symbol is output as a dynamic symbol. */
8802 if (!ensure_undef_dynamic (info, h))
f0158f44 8803 return FALSE;
5bd4f169 8804 }
65f38f15 8805 }
529fe20e 8806 else if (ELIMINATE_COPY_RELOCS && h->type != STT_GNU_IFUNC)
57e7d118 8807 {
8a2058b5 8808 /* For the non-pic case, discard space for relocs against
57e7d118
AM
8809 symbols which turn out to need copy relocs or are not
8810 dynamic. */
529fe20e
AM
8811 if (h->dynamic_adjusted
8812 && !h->def_regular
8813 && !ELF_COMMON_DEF_P (h))
f0158f44 8814 {
46434633
AM
8815 /* Make sure this symbol is output as a dynamic symbol. */
8816 if (!ensure_undef_dynamic (info, h))
f0158f44 8817 return FALSE;
dfbb6ac9 8818
f0158f44
AM
8819 if (h->dynindx == -1)
8820 eh->dyn_relocs = NULL;
8821 }
8822 else
8a2058b5 8823 eh->dyn_relocs = NULL;
57e7d118
AM
8824 }
8825
8826 /* Finally, allocate space. */
8827 for (p = eh->dyn_relocs; p != NULL; p = p->next)
8828 {
8829 asection *sreloc = elf_section_data (p->sec)->sreloc;
8830 if (eh->elf.type == STT_GNU_IFUNC)
8831 sreloc = htab->elf.irelplt;
8832 sreloc->size += p->count * sizeof (Elf64_External_Rela);
dfbb6ac9 8833 }
65f38f15 8834 }
57e7d118 8835
2d7ad24e
AM
8836 /* We might need a PLT entry when the symbol
8837 a) is dynamic, or
8838 b) is an ifunc, or
8839 c) has plt16 relocs and has been processed by adjust_dynamic_symbol, or
8840 d) has plt16 relocs and we are linking statically. */
8841 if ((htab->elf.dynamic_sections_created && h->dynindx != -1)
8842 || h->type == STT_GNU_IFUNC
8843 || (h->needs_plt && h->dynamic_adjusted)
8844 || (h->needs_plt
8845 && h->def_regular
8846 && !htab->elf.dynamic_sections_created
3e04d765 8847 && !htab->can_convert_all_inline_plt
2d7ad24e
AM
8848 && (((struct ppc_link_hash_entry *) h)->tls_mask
8849 & (TLS_TLS | PLT_KEEP)) == PLT_KEEP))
65f38f15 8850 {
57e7d118
AM
8851 struct plt_entry *pent;
8852 bfd_boolean doneone = FALSE;
8853 for (pent = h->plt.plist; pent != NULL; pent = pent->next)
8854 if (pent->plt.refcount > 0)
8855 {
8856 if (!htab->elf.dynamic_sections_created
8857 || h->dynindx == -1)
8858 {
2d7ad24e
AM
8859 if (h->type == STT_GNU_IFUNC)
8860 {
8861 s = htab->elf.iplt;
8862 pent->plt.offset = s->size;
8863 s->size += PLT_ENTRY_SIZE (htab);
8864 s = htab->elf.irelplt;
8865 }
8866 else
8867 {
8868 s = htab->pltlocal;
8869 pent->plt.offset = s->size;
8870 s->size += LOCAL_PLT_ENTRY_SIZE (htab);
8871 s = bfd_link_pic (info) ? htab->relpltlocal : NULL;
8872 }
57e7d118
AM
8873 }
8874 else
8875 {
8876 /* If this is the first .plt entry, make room for the special
8877 first entry. */
8878 s = htab->elf.splt;
8879 if (s->size == 0)
8880 s->size += PLT_INITIAL_ENTRY_SIZE (htab);
65f38f15 8881
57e7d118 8882 pent->plt.offset = s->size;
65f38f15 8883
57e7d118
AM
8884 /* Make room for this entry. */
8885 s->size += PLT_ENTRY_SIZE (htab);
65f38f15 8886
57e7d118
AM
8887 /* Make room for the .glink code. */
8888 s = htab->glink;
8889 if (s->size == 0)
9e390558 8890 s->size += GLINK_PLTRESOLVE_SIZE (htab);
57e7d118
AM
8891 if (htab->opd_abi)
8892 {
8893 /* We need bigger stubs past index 32767. */
9e390558 8894 if (s->size >= GLINK_PLTRESOLVE_SIZE (htab) + 32768*2*4)
57e7d118
AM
8895 s->size += 4;
8896 s->size += 2*4;
8897 }
8898 else
8899 s->size += 4;
65f38f15 8900
57e7d118
AM
8901 /* We also need to make an entry in the .rela.plt section. */
8902 s = htab->elf.srelplt;
8903 }
2d7ad24e
AM
8904 if (s != NULL)
8905 s->size += sizeof (Elf64_External_Rela);
57e7d118
AM
8906 doneone = TRUE;
8907 }
8908 else
8909 pent->plt.offset = (bfd_vma) -1;
8910 if (!doneone)
8911 {
8912 h->plt.plist = NULL;
8913 h->needs_plt = 0;
8914 }
65f38f15 8915 }
57e7d118 8916 else
65f38f15 8917 {
57e7d118
AM
8918 h->plt.plist = NULL;
8919 h->needs_plt = 0;
65f38f15
AM
8920 }
8921
b34976b6 8922 return TRUE;
65f38f15
AM
8923}
8924
9e390558
AM
8925#define PPC_LO(v) ((v) & 0xffff)
8926#define PPC_HI(v) (((v) >> 16) & 0xffff)
8927#define PPC_HA(v) PPC_HI ((v) + 0x8000)
8928
a345bc8d
AM
8929/* Called via elf_link_hash_traverse from ppc64_elf_size_dynamic_sections
8930 to set up space for global entry stubs. These are put in glink,
8931 after the branch table. */
65f38f15 8932
b34976b6 8933static bfd_boolean
a345bc8d 8934size_global_entry_stubs (struct elf_link_hash_entry *h, void *inf)
65f38f15 8935{
a345bc8d
AM
8936 struct bfd_link_info *info;
8937 struct ppc_link_hash_table *htab;
8938 struct plt_entry *pent;
9e390558 8939 asection *s, *plt;
65f38f15 8940
a345bc8d
AM
8941 if (h->root.type == bfd_link_hash_indirect)
8942 return TRUE;
65f38f15 8943
a345bc8d
AM
8944 if (!h->pointer_equality_needed)
8945 return TRUE;
65f38f15 8946
a345bc8d
AM
8947 if (h->def_regular)
8948 return TRUE;
65f38f15 8949
a345bc8d
AM
8950 info = inf;
8951 htab = ppc_hash_table (info);
8952 if (htab == NULL)
8953 return FALSE;
8954
9e390558
AM
8955 s = htab->global_entry;
8956 plt = htab->elf.splt;
a345bc8d
AM
8957 for (pent = h->plt.plist; pent != NULL; pent = pent->next)
8958 if (pent->plt.offset != (bfd_vma) -1
8959 && pent->addend == 0)
8960 {
afe397ea
AM
8961 /* For ELFv2, if this symbol is not defined in a regular file
8962 and we are not generating a shared library or pie, then we
8963 need to define the symbol in the executable on a call stub.
8964 This is to avoid text relocations. */
9e390558
AM
8965 bfd_vma off, stub_align, stub_off, stub_size;
8966 unsigned int align_power;
8967
8968 stub_size = 16;
8969 stub_off = s->size;
8970 if (htab->params->plt_stub_align >= 0)
8971 align_power = htab->params->plt_stub_align;
8972 else
8973 align_power = -htab->params->plt_stub_align;
8974 /* Setting section alignment is delayed until we know it is
8975 non-empty. Otherwise the .text output section will be
8976 aligned at least to plt_stub_align even when no global
8977 entry stubs are needed. */
8978 if (s->alignment_power < align_power)
8979 s->alignment_power = align_power;
8980 stub_align = (bfd_vma) 1 << align_power;
8981 if (htab->params->plt_stub_align >= 0
8982 || ((((stub_off + stub_size - 1) & -stub_align)
8983 - (stub_off & -stub_align))
8984 > ((stub_size - 1) & -stub_align)))
8985 stub_off = (stub_off + stub_align - 1) & -stub_align;
8986 off = pent->plt.offset + plt->output_offset + plt->output_section->vma;
8987 off -= stub_off + s->output_offset + s->output_section->vma;
8988 /* Note that for --plt-stub-align negative we have a possible
8989 dependency between stub offset and size. Break that
8990 dependency by assuming the max stub size when calculating
8991 the stub offset. */
8992 if (PPC_HA (off) == 0)
8993 stub_size -= 4;
8a2058b5 8994 h->root.type = bfd_link_hash_defined;
afe397ea 8995 h->root.u.def.section = s;
9e390558
AM
8996 h->root.u.def.value = stub_off;
8997 s->size = stub_off + stub_size;
a345bc8d
AM
8998 break;
8999 }
9000 return TRUE;
9001}
9002
9003/* Set DF_TEXTREL if we find any dynamic relocs that apply to
9004 read-only sections. */
9005
9006static bfd_boolean
98bbb1b8 9007maybe_set_textrel (struct elf_link_hash_entry *h, void *inf)
a345bc8d 9008{
98bbb1b8
AM
9009 asection *sec;
9010
a345bc8d
AM
9011 if (h->root.type == bfd_link_hash_indirect)
9012 return TRUE;
9013
98bbb1b8
AM
9014 sec = readonly_dynrelocs (h);
9015 if (sec != NULL)
a345bc8d 9016 {
98bbb1b8
AM
9017 struct bfd_link_info *info = (struct bfd_link_info *) inf;
9018
9019 info->flags |= DF_TEXTREL;
2cdcc330
AM
9020 info->callbacks->minfo (_("%pB: dynamic relocation against `%pT'"
9021 " in read-only section `%pA'\n"),
9022 sec->owner, h->root.root.string, sec);
a345bc8d
AM
9023
9024 /* Not an error, just cut short the traversal. */
9025 return FALSE;
65f38f15 9026 }
b34976b6 9027 return TRUE;
65f38f15
AM
9028}
9029
9030/* Set the sizes of the dynamic sections. */
9031
b34976b6 9032static bfd_boolean
ee67d69a 9033ppc64_elf_size_dynamic_sections (bfd *output_bfd,
4ce794b7 9034 struct bfd_link_info *info)
65f38f15
AM
9035{
9036 struct ppc_link_hash_table *htab;
9037 bfd *dynobj;
9038 asection *s;
b34976b6 9039 bfd_boolean relocs;
65f38f15 9040 bfd *ibfd;
7865406b 9041 struct got_entry *first_tlsld;
65f38f15
AM
9042
9043 htab = ppc_hash_table (info);
4dfe6ac6
NC
9044 if (htab == NULL)
9045 return FALSE;
9046
65f38f15
AM
9047 dynobj = htab->elf.dynobj;
9048 if (dynobj == NULL)
9049 abort ();
9050
9051 if (htab->elf.dynamic_sections_created)
9052 {
9053 /* Set the contents of the .interp section to the interpreter. */
9b8b325a 9054 if (bfd_link_executable (info) && !info->nointerp)
65f38f15 9055 {
3d4d4302 9056 s = bfd_get_linker_section (dynobj, ".interp");
65f38f15
AM
9057 if (s == NULL)
9058 abort ();
eea6121a 9059 s->size = sizeof ELF_DYNAMIC_INTERPRETER;
65f38f15
AM
9060 s->contents = (unsigned char *) ELF_DYNAMIC_INTERPRETER;
9061 }
9062 }
9063
9064 /* Set up .got offsets for local syms, and space for local dynamic
9065 relocs. */
c72f2fb2 9066 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
65f38f15 9067 {
411e1bfb
AM
9068 struct got_entry **lgot_ents;
9069 struct got_entry **end_lgot_ents;
e054468f
AM
9070 struct plt_entry **local_plt;
9071 struct plt_entry **end_local_plt;
f961d9dd 9072 unsigned char *lgot_masks;
65f38f15
AM
9073 bfd_size_type locsymcount;
9074 Elf_Internal_Shdr *symtab_hdr;
65f38f15 9075
0c8d6e5c 9076 if (!is_ppc64_elf (ibfd))
65f38f15
AM
9077 continue;
9078
9079 for (s = ibfd->sections; s != NULL; s = s->next)
9080 {
19e08130 9081 struct ppc_dyn_relocs *p;
65f38f15 9082
6edfbbad 9083 for (p = elf_section_data (s)->local_dynrel; p != NULL; p = p->next)
65f38f15 9084 {
ec338859
AM
9085 if (!bfd_is_abs_section (p->sec)
9086 && bfd_is_abs_section (p->sec->output_section))
9087 {
9088 /* Input section has been discarded, either because
9089 it is a copy of a linkonce section or due to
9090 linker script /DISCARD/, so we'll be discarding
9091 the relocs too. */
9092 }
248866a8 9093 else if (p->count != 0)
ec338859 9094 {
19e08130
AM
9095 asection *srel = elf_section_data (p->sec)->sreloc;
9096 if (p->ifunc)
33e44f2e 9097 srel = htab->elf.irelplt;
eea6121a 9098 srel->size += p->count * sizeof (Elf64_External_Rela);
248866a8
AM
9099 if ((p->sec->output_section->flags & SEC_READONLY) != 0)
9100 info->flags |= DF_TEXTREL;
ec338859 9101 }
65f38f15
AM
9102 }
9103 }
9104
411e1bfb
AM
9105 lgot_ents = elf_local_got_ents (ibfd);
9106 if (!lgot_ents)
65f38f15
AM
9107 continue;
9108
0ffa91dd 9109 symtab_hdr = &elf_symtab_hdr (ibfd);
65f38f15 9110 locsymcount = symtab_hdr->sh_info;
411e1bfb 9111 end_lgot_ents = lgot_ents + locsymcount;
e054468f
AM
9112 local_plt = (struct plt_entry **) end_lgot_ents;
9113 end_local_plt = local_plt + locsymcount;
f961d9dd 9114 lgot_masks = (unsigned char *) end_local_plt;
e717da7e 9115 s = ppc64_elf_tdata (ibfd)->got;
e7b938ca 9116 for (; lgot_ents < end_lgot_ents; ++lgot_ents, ++lgot_masks)
65f38f15 9117 {
0b8bcf0d 9118 struct got_entry **pent, *ent;
411e1bfb 9119
0b8bcf0d
AM
9120 pent = lgot_ents;
9121 while ((ent = *pent) != NULL)
411e1bfb
AM
9122 if (ent->got.refcount > 0)
9123 {
e7b938ca 9124 if ((ent->tls_type & *lgot_masks & TLS_LD) != 0)
411e1bfb 9125 {
927be08e 9126 ppc64_tlsld_got (ibfd)->got.refcount += 1;
0b8bcf0d 9127 *pent = ent->next;
411e1bfb
AM
9128 }
9129 else
9130 {
19e08130
AM
9131 unsigned int ent_size = 8;
9132 unsigned int rel_size = sizeof (Elf64_External_Rela);
9133
eea6121a 9134 ent->got.offset = s->size;
e7b938ca 9135 if ((ent->tls_type & *lgot_masks & TLS_GD) != 0)
927be08e 9136 {
19e08130
AM
9137 ent_size *= 2;
9138 rel_size *= 2;
9139 }
9140 s->size += ent_size;
37da22e5 9141 if ((*lgot_masks & (TLS_TLS | PLT_IFUNC)) == PLT_IFUNC)
19e08130 9142 {
33e44f2e 9143 htab->elf.irelplt->size += rel_size;
19e08130
AM
9144 htab->got_reli_size += rel_size;
9145 }
f15d0b54
AM
9146 else if (bfd_link_pic (info)
9147 && !((ent->tls_type & TLS_TPREL) != 0
9148 && bfd_link_executable (info)))
19e08130
AM
9149 {
9150 asection *srel = ppc64_elf_tdata (ibfd)->relgot;
9151 srel->size += rel_size;
927be08e 9152 }
0b8bcf0d 9153 pent = &ent->next;
411e1bfb
AM
9154 }
9155 }
9156 else
0b8bcf0d 9157 *pent = ent->next;
65f38f15 9158 }
e054468f 9159
2d7ad24e
AM
9160 /* Allocate space for plt calls to local syms. */
9161 lgot_masks = (unsigned char *) end_local_plt;
9162 for (; local_plt < end_local_plt; ++local_plt, ++lgot_masks)
e054468f
AM
9163 {
9164 struct plt_entry *ent;
9165
9166 for (ent = *local_plt; ent != NULL; ent = ent->next)
9167 if (ent->plt.refcount > 0)
9168 {
2d7ad24e
AM
9169 if ((*lgot_masks & (TLS_TLS | PLT_IFUNC)) == PLT_IFUNC)
9170 {
9171 s = htab->elf.iplt;
9172 ent->plt.offset = s->size;
9173 s->size += PLT_ENTRY_SIZE (htab);
9174 htab->elf.irelplt->size += sizeof (Elf64_External_Rela);
9175 }
3e04d765
AM
9176 else if (htab->can_convert_all_inline_plt
9177 || (*lgot_masks & (TLS_TLS | PLT_KEEP)) != PLT_KEEP)
2d7ad24e
AM
9178 ent->plt.offset = (bfd_vma) -1;
9179 else
9180 {
9181 s = htab->pltlocal;
9182 ent->plt.offset = s->size;
9183 s->size += LOCAL_PLT_ENTRY_SIZE (htab);
9184 if (bfd_link_pic (info))
9185 htab->relpltlocal->size += sizeof (Elf64_External_Rela);
9186 }
e054468f
AM
9187 }
9188 else
9189 ent->plt.offset = (bfd_vma) -1;
9190 }
65f38f15
AM
9191 }
9192
9193 /* Allocate global sym .plt and .got entries, and space for global
9194 sym dynamic relocs. */
4ce794b7 9195 elf_link_hash_traverse (&htab->elf, allocate_dynrelocs, info);
a345bc8d 9196
0e1862bb 9197 if (!htab->opd_abi && !bfd_link_pic (info))
a345bc8d 9198 elf_link_hash_traverse (&htab->elf, size_global_entry_stubs, info);
65f38f15 9199
7865406b 9200 first_tlsld = NULL;
c72f2fb2 9201 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
102890f0 9202 {
7865406b
AM
9203 struct got_entry *ent;
9204
0c8d6e5c 9205 if (!is_ppc64_elf (ibfd))
102890f0
AM
9206 continue;
9207
7865406b
AM
9208 ent = ppc64_tlsld_got (ibfd);
9209 if (ent->got.refcount > 0)
102890f0 9210 {
7865406b 9211 if (!htab->do_multi_toc && first_tlsld != NULL)
102890f0 9212 {
7865406b
AM
9213 ent->is_indirect = TRUE;
9214 ent->got.ent = first_tlsld;
9215 }
9216 else
9217 {
9218 if (first_tlsld == NULL)
9219 first_tlsld = ent;
9220 s = ppc64_elf_tdata (ibfd)->got;
9221 ent->got.offset = s->size;
9222 ent->owner = ibfd;
9223 s->size += 16;
0e1862bb 9224 if (bfd_link_pic (info))
7865406b
AM
9225 {
9226 asection *srel = ppc64_elf_tdata (ibfd)->relgot;
9227 srel->size += sizeof (Elf64_External_Rela);
9228 }
102890f0
AM
9229 }
9230 }
9231 else
7865406b 9232 ent->got.offset = (bfd_vma) -1;
102890f0
AM
9233 }
9234
65f38f15
AM
9235 /* We now have determined the sizes of the various dynamic sections.
9236 Allocate memory for them. */
b34976b6 9237 relocs = FALSE;
65f38f15
AM
9238 for (s = dynobj->sections; s != NULL; s = s->next)
9239 {
9240 if ((s->flags & SEC_LINKER_CREATED) == 0)
9241 continue;
9242
4ce794b7 9243 if (s == htab->brlt || s == htab->relbrlt)
721956f4
AM
9244 /* These haven't been allocated yet; don't strip. */
9245 continue;
33e44f2e
AM
9246 else if (s == htab->elf.sgot
9247 || s == htab->elf.splt
9248 || s == htab->elf.iplt
2d7ad24e 9249 || s == htab->pltlocal
c456f082 9250 || s == htab->glink
9e390558 9251 || s == htab->global_entry
5474d94f
AM
9252 || s == htab->elf.sdynbss
9253 || s == htab->elf.sdynrelro)
65f38f15
AM
9254 {
9255 /* Strip this section if we don't need it; see the
9256 comment below. */
5bd4f169 9257 }
58d180e8
AM
9258 else if (s == htab->glink_eh_frame)
9259 {
9260 if (!bfd_is_abs_section (s->output_section))
9261 /* Not sized yet. */
9262 continue;
9263 }
70cc837d 9264 else if (CONST_STRNEQ (s->name, ".rela"))
5bd4f169 9265 {
c456f082 9266 if (s->size != 0)
5bd4f169 9267 {
33e44f2e 9268 if (s != htab->elf.srelplt)
b34976b6 9269 relocs = TRUE;
5bd4f169
AM
9270
9271 /* We use the reloc_count field as a counter if we need
9272 to copy relocs into the output file. */
9273 s->reloc_count = 0;
9274 }
9275 }
65f38f15 9276 else
5bd4f169
AM
9277 {
9278 /* It's not one of our sections, so don't allocate space. */
9279 continue;
9280 }
9281
eea6121a 9282 if (s->size == 0)
5bd4f169 9283 {
c456f082
AM
9284 /* If we don't need this section, strip it from the
9285 output file. This is mostly to handle .rela.bss and
9286 .rela.plt. We must create both sections in
9287 create_dynamic_sections, because they must be created
9288 before the linker maps input sections to output
9289 sections. The linker does that before
9290 adjust_dynamic_symbol is called, and it is that
9291 function which decides whether anything needs to go
9292 into these sections. */
8423293d 9293 s->flags |= SEC_EXCLUDE;
5bd4f169
AM
9294 continue;
9295 }
9296
06bcf541
AM
9297 if (bfd_is_abs_section (s->output_section))
9298 _bfd_error_handler (_("warning: discarding dynamic section %s"),
9299 s->name);
9300
c456f082 9301 if ((s->flags & SEC_HAS_CONTENTS) == 0)
5f333394
AM
9302 continue;
9303
65f38f15
AM
9304 /* Allocate memory for the section contents. We use bfd_zalloc
9305 here in case unused entries are not reclaimed before the
9306 section's contents are written out. This should not happen,
411e1bfb
AM
9307 but this way if it does we get a R_PPC64_NONE reloc in .rela
9308 sections instead of garbage.
9309 We also rely on the section contents being zero when writing
5474d94f 9310 the GOT and .dynrelro. */
eea6121a 9311 s->contents = bfd_zalloc (dynobj, s->size);
65f38f15 9312 if (s->contents == NULL)
b34976b6 9313 return FALSE;
5bd4f169
AM
9314 }
9315
c72f2fb2 9316 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
e717da7e 9317 {
0c8d6e5c 9318 if (!is_ppc64_elf (ibfd))
7b53ace3
AM
9319 continue;
9320
e717da7e 9321 s = ppc64_elf_tdata (ibfd)->got;
33e44f2e 9322 if (s != NULL && s != htab->elf.sgot)
e717da7e 9323 {
eea6121a 9324 if (s->size == 0)
8423293d 9325 s->flags |= SEC_EXCLUDE;
e717da7e
AM
9326 else
9327 {
eea6121a 9328 s->contents = bfd_zalloc (ibfd, s->size);
e717da7e
AM
9329 if (s->contents == NULL)
9330 return FALSE;
9331 }
9332 }
9333 s = ppc64_elf_tdata (ibfd)->relgot;
9334 if (s != NULL)
9335 {
eea6121a 9336 if (s->size == 0)
8423293d 9337 s->flags |= SEC_EXCLUDE;
e717da7e
AM
9338 else
9339 {
eea6121a 9340 s->contents = bfd_zalloc (ibfd, s->size);
e717da7e
AM
9341 if (s->contents == NULL)
9342 return FALSE;
9343 relocs = TRUE;
9344 s->reloc_count = 0;
9345 }
9346 }
9347 }
9348
e86ce104 9349 if (htab->elf.dynamic_sections_created)
5bd4f169 9350 {
e8910a83
AM
9351 bfd_boolean tls_opt;
9352
5bd4f169
AM
9353 /* Add some entries to the .dynamic section. We fill in the
9354 values later, in ppc64_elf_finish_dynamic_sections, but we
9355 must add the entries now so that we get the correct size for
9356 the .dynamic section. The DT_DEBUG entry is filled in by the
9357 dynamic linker and used by the debugger. */
dc810e39 9358#define add_dynamic_entry(TAG, VAL) \
5a580b3a 9359 _bfd_elf_add_dynamic_entry (info, TAG, VAL)
dc810e39 9360
0e1862bb 9361 if (bfd_link_executable (info))
5bd4f169 9362 {
dc810e39 9363 if (!add_dynamic_entry (DT_DEBUG, 0))
b34976b6 9364 return FALSE;
5bd4f169
AM
9365 }
9366
33e44f2e 9367 if (htab->elf.splt != NULL && htab->elf.splt->size != 0)
5bd4f169 9368 {
dc810e39
AM
9369 if (!add_dynamic_entry (DT_PLTGOT, 0)
9370 || !add_dynamic_entry (DT_PLTRELSZ, 0)
9371 || !add_dynamic_entry (DT_PLTREL, DT_RELA)
5d1634d7
AM
9372 || !add_dynamic_entry (DT_JMPREL, 0)
9373 || !add_dynamic_entry (DT_PPC64_GLINK, 0))
b34976b6 9374 return FALSE;
5bd4f169
AM
9375 }
9376
ee67d69a 9377 if (NO_OPD_RELOCS && abiversion (output_bfd) <= 1)
19397422
AM
9378 {
9379 if (!add_dynamic_entry (DT_PPC64_OPD, 0)
9380 || !add_dynamic_entry (DT_PPC64_OPDSZ, 0))
b34976b6 9381 return FALSE;
19397422
AM
9382 }
9383
7c9cf415 9384 tls_opt = (htab->params->tls_get_addr_opt
e8910a83
AM
9385 && htab->tls_get_addr_fd != NULL
9386 && htab->tls_get_addr_fd->elf.plt.plist != NULL);
9387 if (tls_opt || !htab->opd_abi)
9388 {
9389 if (!add_dynamic_entry (DT_PPC64_OPT, tls_opt ? PPC64_OPT_TLS : 0))
9390 return FALSE;
9391 }
a7f2871e 9392
5bd4f169
AM
9393 if (relocs)
9394 {
dc810e39
AM
9395 if (!add_dynamic_entry (DT_RELA, 0)
9396 || !add_dynamic_entry (DT_RELASZ, 0)
9397 || !add_dynamic_entry (DT_RELAENT, sizeof (Elf64_External_Rela)))
b34976b6 9398 return FALSE;
5bd4f169 9399
65f38f15
AM
9400 /* If any dynamic relocs apply to a read-only section,
9401 then we need a DT_TEXTREL entry. */
248866a8 9402 if ((info->flags & DF_TEXTREL) == 0)
a345bc8d 9403 elf_link_hash_traverse (&htab->elf, maybe_set_textrel, info);
5bd4f169 9404
65f38f15 9405 if ((info->flags & DF_TEXTREL) != 0)
5bd4f169 9406 {
65f38f15 9407 if (!add_dynamic_entry (DT_TEXTREL, 0))
b34976b6 9408 return FALSE;
5bd4f169 9409 }
5bd4f169 9410 }
5bd4f169 9411 }
65f38f15 9412#undef add_dynamic_entry
5bd4f169 9413
b34976b6 9414 return TRUE;
5bd4f169
AM
9415}
9416
a345bc8d
AM
9417/* Return TRUE if symbol should be hashed in the `.gnu.hash' section. */
9418
9419static bfd_boolean
9420ppc64_elf_hash_symbol (struct elf_link_hash_entry *h)
9421{
9422 if (h->plt.plist != NULL
9423 && !h->def_regular
9424 && !h->pointer_equality_needed)
9425 return FALSE;
9426
9427 return _bfd_elf_hash_symbol (h);
9428}
9429
721956f4 9430/* Determine the type of stub needed, if any, for a call. */
5bd4f169 9431
4ce794b7
AM
9432static inline enum ppc_stub_type
9433ppc_type_of_stub (asection *input_sec,
9434 const Elf_Internal_Rela *rel,
9435 struct ppc_link_hash_entry **hash,
e054468f 9436 struct plt_entry **plt_ent,
6911b7dc
AM
9437 bfd_vma destination,
9438 unsigned long local_off)
5bd4f169 9439{
721956f4
AM
9440 struct ppc_link_hash_entry *h = *hash;
9441 bfd_vma location;
9442 bfd_vma branch_offset;
9443 bfd_vma max_branch_offset;
4ce794b7 9444 enum elf_ppc64_reloc_type r_type;
5bd4f169 9445
721956f4
AM
9446 if (h != NULL)
9447 {
e054468f 9448 struct plt_entry *ent;
7fe2b9a6 9449 struct ppc_link_hash_entry *fdh = h;
b31867b6
AM
9450 if (h->oh != NULL
9451 && h->oh->is_func_descriptor)
7b8f6675
AM
9452 {
9453 fdh = ppc_follow_link (h->oh);
9454 *hash = fdh;
9455 }
8387904d 9456
e054468f
AM
9457 for (ent = fdh->elf.plt.plist; ent != NULL; ent = ent->next)
9458 if (ent->addend == rel->r_addend
9459 && ent->plt.offset != (bfd_vma) -1)
9460 {
e054468f
AM
9461 *plt_ent = ent;
9462 return ppc_stub_plt_call;
9463 }
5bd4f169 9464
7fe2b9a6
AM
9465 /* Here, we know we don't have a plt entry. If we don't have a
9466 either a defined function descriptor or a defined entry symbol
9467 in a regular object file, then it is pointless trying to make
9468 any other type of stub. */
854b41e7
AM
9469 if (!is_static_defined (&fdh->elf)
9470 && !is_static_defined (&h->elf))
721956f4 9471 return ppc_stub_none;
5d1634d7 9472 }
e054468f
AM
9473 else if (elf_local_got_ents (input_sec->owner) != NULL)
9474 {
9475 Elf_Internal_Shdr *symtab_hdr = &elf_symtab_hdr (input_sec->owner);
9476 struct plt_entry **local_plt = (struct plt_entry **)
9477 elf_local_got_ents (input_sec->owner) + symtab_hdr->sh_info;
9478 unsigned long r_symndx = ELF64_R_SYM (rel->r_info);
9479
9480 if (local_plt[r_symndx] != NULL)
9481 {
9482 struct plt_entry *ent;
9483
9484 for (ent = local_plt[r_symndx]; ent != NULL; ent = ent->next)
9485 if (ent->addend == rel->r_addend
9486 && ent->plt.offset != (bfd_vma) -1)
9487 {
9488 *plt_ent = ent;
9489 return ppc_stub_plt_call;
9490 }
9491 }
9492 }
5d1634d7 9493
721956f4
AM
9494 /* Determine where the call point is. */
9495 location = (input_sec->output_offset
9496 + input_sec->output_section->vma
9497 + rel->r_offset);
5d1634d7 9498
721956f4
AM
9499 branch_offset = destination - location;
9500 r_type = ELF64_R_TYPE (rel->r_info);
5d1634d7 9501
721956f4
AM
9502 /* Determine if a long branch stub is needed. */
9503 max_branch_offset = 1 << 25;
23cedd1d
AM
9504 if (r_type == R_PPC64_REL14
9505 || r_type == R_PPC64_REL14_BRTAKEN
9506 || r_type == R_PPC64_REL14_BRNTAKEN)
721956f4 9507 max_branch_offset = 1 << 15;
5d1634d7 9508
6911b7dc 9509 if (branch_offset + max_branch_offset >= 2 * max_branch_offset - local_off)
721956f4
AM
9510 /* We need a stub. Figure out whether a long_branch or plt_branch
9511 is needed later. */
9512 return ppc_stub_long_branch;
5d1634d7 9513
721956f4 9514 return ppc_stub_none;
5d1634d7
AM
9515}
9516
f891966f
AM
9517/* Gets the address of a label (1:) in r11 and builds an offset in r12,
9518 then adds it to r11 (LOAD false) or loads r12 from r11+r12 (LOAD true).
9519 . mflr %r12
9520 . bcl 20,31,1f
9521 .1: mflr %r11
9522 . mtlr %r12
05d0e962 9523 . lis %r12,xxx-1b@highest
f891966f 9524 . ori %r12,%r12,xxx-1b@higher
05d0e962 9525 . sldi %r12,%r12,32
f891966f 9526 . oris %r12,%r12,xxx-1b@high
05d0e962 9527 . ori %r12,%r12,xxx-1b@l
f891966f 9528 . add/ldx %r12,%r11,%r12 */
05d0e962
AM
9529
9530static bfd_byte *
9531build_offset (bfd *abfd, bfd_byte *p, bfd_vma off, bfd_boolean load)
9532{
f891966f
AM
9533 bfd_put_32 (abfd, MFLR_R12, p);
9534 p += 4;
9535 bfd_put_32 (abfd, BCL_20_31, p);
9536 p += 4;
9537 bfd_put_32 (abfd, MFLR_R11, p);
9538 p += 4;
9539 bfd_put_32 (abfd, MTLR_R12, p);
9540 p += 4;
05d0e962
AM
9541 if (off + 0x8000 < 0x10000)
9542 {
9543 if (load)
9544 bfd_put_32 (abfd, LD_R12_0R11 + PPC_LO (off), p);
9545 else
9546 bfd_put_32 (abfd, ADDI_R12_R11 + PPC_LO (off), p);
9547 p += 4;
9548 }
9549 else if (off + 0x80008000ULL < 0x100000000ULL)
9550 {
9551 bfd_put_32 (abfd, ADDIS_R12_R11 + PPC_HA (off), p);
9552 p += 4;
9553 if (load)
9554 bfd_put_32 (abfd, LD_R12_0R12 + PPC_LO (off), p);
9555 else
9556 bfd_put_32 (abfd, ADDI_R12_R12 + PPC_LO (off), p);
9557 p += 4;
9558 }
9559 else
9560 {
9561 if (off + 0x800000000000ULL < 0x1000000000000ULL)
9562 {
9563 bfd_put_32 (abfd, LI_R12_0 + ((off >> 32) & 0xffff), p);
9564 p += 4;
9565 }
9566 else
9567 {
9568 bfd_put_32 (abfd, LIS_R12 + ((off >> 48) & 0xffff), p);
9569 p += 4;
9570 if (((off >> 32) & 0xffff) != 0)
9571 {
9572 bfd_put_32 (abfd, ORI_R12_R12_0 + ((off >> 32) & 0xffff), p);
9573 p += 4;
9574 }
9575 }
9576 if (((off >> 32) & 0xffffffffULL) != 0)
9577 {
9578 bfd_put_32 (abfd, SLDI_R12_R12_32, p);
9579 p += 4;
9580 }
9581 if (PPC_HI (off) != 0)
9582 {
9583 bfd_put_32 (abfd, ORIS_R12_R12_0 + PPC_HI (off), p);
9584 p += 4;
9585 }
9586 if (PPC_LO (off) != 0)
9587 {
9588 bfd_put_32 (abfd, ORI_R12_R12_0 + PPC_LO (off), p);
9589 p += 4;
9590 }
9591 if (load)
9592 bfd_put_32 (abfd, LDX_R12_R11_R12, p);
9593 else
9594 bfd_put_32 (abfd, ADD_R12_R11_R12, p);
9595 p += 4;
9596 }
9597 return p;
9598}
9599
9600static unsigned int
9601size_offset (bfd_vma off)
9602{
9603 unsigned int size;
9604 if (off + 0x8000 < 0x10000)
9605 size = 4;
9606 else if (off + 0x80008000ULL < 0x100000000ULL)
9607 size = 8;
9608 else
9609 {
9610 if (off + 0x800000000000ULL < 0x1000000000000ULL)
9611 size = 4;
9612 else
9613 {
9614 size = 4;
9615 if (((off >> 32) & 0xffff) != 0)
9616 size += 4;
9617 }
9618 if (((off >> 32) & 0xffffffffULL) != 0)
9619 size += 4;
9620 if (PPC_HI (off) != 0)
9621 size += 4;
9622 if (PPC_LO (off) != 0)
9623 size += 4;
9624 size += 4;
9625 }
f891966f 9626 return size + 16;
05d0e962
AM
9627}
9628
df136d64
AM
9629/* Emit .eh_frame opcode to advance pc by DELTA. */
9630
9631static bfd_byte *
9632eh_advance (bfd *abfd, bfd_byte *eh, unsigned int delta)
9633{
9634 delta /= 4;
9635 if (delta < 64)
9636 *eh++ = DW_CFA_advance_loc + delta;
9637 else if (delta < 256)
9638 {
9639 *eh++ = DW_CFA_advance_loc1;
9640 *eh++ = delta;
9641 }
9642 else if (delta < 65536)
9643 {
9644 *eh++ = DW_CFA_advance_loc2;
9645 bfd_put_16 (abfd, delta, eh);
9646 eh += 2;
9647 }
9648 else
9649 {
9650 *eh++ = DW_CFA_advance_loc4;
9651 bfd_put_32 (abfd, delta, eh);
9652 eh += 4;
9653 }
9654 return eh;
9655}
9656
9657/* Size of required .eh_frame opcode to advance pc by DELTA. */
9658
9659static unsigned int
9660eh_advance_size (unsigned int delta)
9661{
9662 if (delta < 64 * 4)
9663 /* DW_CFA_advance_loc+[1..63]. */
9664 return 1;
9665 if (delta < 256 * 4)
9666 /* DW_CFA_advance_loc1, byte. */
9667 return 2;
9668 if (delta < 65536 * 4)
9669 /* DW_CFA_advance_loc2, 2 bytes. */
9670 return 3;
9671 /* DW_CFA_advance_loc4, 4 bytes. */
9672 return 5;
9673}
9674
794e51c0
AM
9675/* With power7 weakly ordered memory model, it is possible for ld.so
9676 to update a plt entry in one thread and have another thread see a
9677 stale zero toc entry. To avoid this we need some sort of acquire
9678 barrier in the call stub. One solution is to make the load of the
9679 toc word seem to appear to depend on the load of the function entry
9680 word. Another solution is to test for r2 being zero, and branch to
9681 the appropriate glink entry if so.
9682
9683 . fake dep barrier compare
71a39c98
AM
9684 . ld 12,xxx(2) ld 12,xxx(2)
9685 . mtctr 12 mtctr 12
9686 . xor 11,12,12 ld 2,xxx+8(2)
794e51c0
AM
9687 . add 2,2,11 cmpldi 2,0
9688 . ld 2,xxx+8(2) bnectr+
9689 . bctr b <glink_entry>
9690
9691 The solution involving the compare turns out to be faster, so
9692 that's what we use unless the branch won't reach. */
9693
9694#define ALWAYS_USE_FAKE_DEP 0
9695#define ALWAYS_EMIT_R2SAVE 0
5d1634d7 9696
794e51c0
AM
9697static inline unsigned int
9698plt_stub_size (struct ppc_link_hash_table *htab,
9699 struct ppc_stub_hash_entry *stub_entry,
9700 bfd_vma off)
9701{
05d0e962 9702 unsigned size;
b9e5796b 9703
05d0e962
AM
9704 if (stub_entry->stub_type >= ppc_stub_plt_call_notoc)
9705 {
f891966f 9706 size = 8 + size_offset (off - 8);
05d0e962
AM
9707 if (stub_entry->stub_type > ppc_stub_plt_call_notoc)
9708 size += 4;
9709 return size;
9710 }
9711
9712 size = 12;
b9e5796b
AM
9713 if (ALWAYS_EMIT_R2SAVE
9714 || stub_entry->stub_type == ppc_stub_plt_call_r2save)
9715 size += 4;
9716 if (PPC_HA (off) != 0)
794e51c0 9717 size += 4;
b9e5796b
AM
9718 if (htab->opd_abi)
9719 {
9720 size += 4;
e7d1c40c 9721 if (htab->params->plt_static_chain)
b9e5796b 9722 size += 4;
bd4d2eaa
AM
9723 if (htab->params->plt_thread_safe
9724 && htab->elf.dynamic_sections_created
9725 && stub_entry->h != NULL
9726 && stub_entry->h->elf.dynindx != -1)
b9e5796b 9727 size += 8;
e7d1c40c 9728 if (PPC_HA (off + 8 + 8 * htab->params->plt_static_chain) != PPC_HA (off))
b9e5796b
AM
9729 size += 4;
9730 }
794e51c0
AM
9731 if (stub_entry->h != NULL
9732 && (stub_entry->h == htab->tls_get_addr_fd
9733 || stub_entry->h == htab->tls_get_addr)
7c9cf415 9734 && htab->params->tls_get_addr_opt)
f378ab09
AM
9735 {
9736 size += 7 * 4;
e81b4c93 9737 if (stub_entry->stub_type == ppc_stub_plt_call_r2save)
407aa07c 9738 size += 6 * 4;
f378ab09 9739 }
794e51c0
AM
9740 return size;
9741}
9742
2420fff6
AM
9743/* Depending on the sign of plt_stub_align:
9744 If positive, return the padding to align to a 2**plt_stub_align
9745 boundary.
9746 If negative, if this stub would cross fewer 2**plt_stub_align
9747 boundaries if we align, then return the padding needed to do so. */
9748
794e51c0
AM
9749static inline unsigned int
9750plt_stub_pad (struct ppc_link_hash_table *htab,
9751 struct ppc_stub_hash_entry *stub_entry,
9752 bfd_vma plt_off)
9753{
2420fff6 9754 int stub_align;
1aa42141 9755 unsigned stub_size;
6f20ed8a 9756 bfd_vma stub_off = stub_entry->group->stub_sec->size;
794e51c0 9757
2420fff6
AM
9758 if (htab->params->plt_stub_align >= 0)
9759 {
9760 stub_align = 1 << htab->params->plt_stub_align;
9761 if ((stub_off & (stub_align - 1)) != 0)
9762 return stub_align - (stub_off & (stub_align - 1));
9763 return 0;
9764 }
9765
9766 stub_align = 1 << -htab->params->plt_stub_align;
1aa42141 9767 stub_size = plt_stub_size (htab, stub_entry, plt_off);
794e51c0 9768 if (((stub_off + stub_size - 1) & -stub_align) - (stub_off & -stub_align)
e05fa0ba 9769 > ((stub_size - 1) & -stub_align))
794e51c0
AM
9770 return stub_align - (stub_off & (stub_align - 1));
9771 return 0;
9772}
9773
9774/* Build a .plt call stub. */
9775
9776static inline bfd_byte *
9777build_plt_stub (struct ppc_link_hash_table *htab,
9778 struct ppc_stub_hash_entry *stub_entry,
9779 bfd_byte *p, bfd_vma offset, Elf_Internal_Rela *r)
9780{
e7d1c40c 9781 bfd *obfd = htab->params->stub_bfd;
b9e5796b 9782 bfd_boolean plt_load_toc = htab->opd_abi;
e7d1c40c 9783 bfd_boolean plt_static_chain = htab->params->plt_static_chain;
bd4d2eaa
AM
9784 bfd_boolean plt_thread_safe = (htab->params->plt_thread_safe
9785 && htab->elf.dynamic_sections_created
9786 && stub_entry->h != NULL
9787 && stub_entry->h->elf.dynindx != -1);
794e51c0
AM
9788 bfd_boolean use_fake_dep = plt_thread_safe;
9789 bfd_vma cmp_branch_off = 0;
9790
9791 if (!ALWAYS_USE_FAKE_DEP
b9e5796b 9792 && plt_load_toc
794e51c0 9793 && plt_thread_safe
bd4d2eaa
AM
9794 && !((stub_entry->h == htab->tls_get_addr_fd
9795 || stub_entry->h == htab->tls_get_addr)
7c9cf415 9796 && htab->params->tls_get_addr_opt))
794e51c0
AM
9797 {
9798 bfd_vma pltoff = stub_entry->plt_ent->plt.offset & ~1;
b9e5796b
AM
9799 bfd_vma pltindex = ((pltoff - PLT_INITIAL_ENTRY_SIZE (htab))
9800 / PLT_ENTRY_SIZE (htab));
9e390558 9801 bfd_vma glinkoff = GLINK_PLTRESOLVE_SIZE (htab) + pltindex * 8;
794e51c0
AM
9802 bfd_vma to, from;
9803
68d62958
AM
9804 if (pltindex > 32768)
9805 glinkoff += (pltindex - 32768) * 4;
794e51c0
AM
9806 to = (glinkoff
9807 + htab->glink->output_offset
9808 + htab->glink->output_section->vma);
6f20ed8a 9809 from = (p - stub_entry->group->stub_sec->contents
794e51c0
AM
9810 + 4 * (ALWAYS_EMIT_R2SAVE
9811 || stub_entry->stub_type == ppc_stub_plt_call_r2save)
9812 + 4 * (PPC_HA (offset) != 0)
9813 + 4 * (PPC_HA (offset + 8 + 8 * plt_static_chain)
9814 != PPC_HA (offset))
9815 + 4 * (plt_static_chain != 0)
9816 + 20
6f20ed8a
AM
9817 + stub_entry->group->stub_sec->output_offset
9818 + stub_entry->group->stub_sec->output_section->vma);
794e51c0
AM
9819 cmp_branch_off = to - from;
9820 use_fake_dep = cmp_branch_off + (1 << 25) >= (1 << 26);
9821 }
9822
ac2df442
AM
9823 if (PPC_HA (offset) != 0)
9824 {
176a0d42
AM
9825 if (r != NULL)
9826 {
794e51c0
AM
9827 if (ALWAYS_EMIT_R2SAVE
9828 || stub_entry->stub_type == ppc_stub_plt_call_r2save)
9829 r[0].r_offset += 4;
176a0d42 9830 r[0].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_HA);
3b421ab3 9831 r[1].r_offset = r[0].r_offset + 4;
176a0d42
AM
9832 r[1].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_LO_DS);
9833 r[1].r_addend = r[0].r_addend;
b9e5796b 9834 if (plt_load_toc)
176a0d42 9835 {
b9e5796b 9836 if (PPC_HA (offset + 8 + 8 * plt_static_chain) != PPC_HA (offset))
c7131b65 9837 {
b9e5796b
AM
9838 r[2].r_offset = r[1].r_offset + 4;
9839 r[2].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_LO);
9840 r[2].r_addend = r[0].r_addend;
9841 }
9842 else
9843 {
9844 r[2].r_offset = r[1].r_offset + 8 + 8 * use_fake_dep;
9845 r[2].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_LO_DS);
9846 r[2].r_addend = r[0].r_addend + 8;
9847 if (plt_static_chain)
9848 {
9849 r[3].r_offset = r[2].r_offset + 4;
9850 r[3].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_LO_DS);
9851 r[3].r_addend = r[0].r_addend + 16;
9852 }
c7131b65 9853 }
176a0d42
AM
9854 }
9855 }
794e51c0
AM
9856 if (ALWAYS_EMIT_R2SAVE
9857 || stub_entry->stub_type == ppc_stub_plt_call_r2save)
a078d95a 9858 bfd_put_32 (obfd, STD_R2_0R1 + STK_TOC (htab), p), p += 4;
397998fc
AM
9859 if (plt_load_toc)
9860 {
9861 bfd_put_32 (obfd, ADDIS_R11_R2 | PPC_HA (offset), p), p += 4;
9862 bfd_put_32 (obfd, LD_R12_0R11 | PPC_LO (offset), p), p += 4;
9863 }
9864 else
9865 {
9866 bfd_put_32 (obfd, ADDIS_R12_R2 | PPC_HA (offset), p), p += 4;
9867 bfd_put_32 (obfd, LD_R12_0R12 | PPC_LO (offset), p), p += 4;
9868 }
b9e5796b
AM
9869 if (plt_load_toc
9870 && PPC_HA (offset + 8 + 8 * plt_static_chain) != PPC_HA (offset))
ac2df442 9871 {
71a39c98 9872 bfd_put_32 (obfd, ADDI_R11_R11 | PPC_LO (offset), p), p += 4;
ac2df442
AM
9873 offset = 0;
9874 }
71a39c98 9875 bfd_put_32 (obfd, MTCTR_R12, p), p += 4;
b9e5796b 9876 if (plt_load_toc)
794e51c0 9877 {
b9e5796b
AM
9878 if (use_fake_dep)
9879 {
9880 bfd_put_32 (obfd, XOR_R2_R12_R12, p), p += 4;
9881 bfd_put_32 (obfd, ADD_R11_R11_R2, p), p += 4;
9882 }
9883 bfd_put_32 (obfd, LD_R2_0R11 | PPC_LO (offset + 8), p), p += 4;
9884 if (plt_static_chain)
9885 bfd_put_32 (obfd, LD_R11_0R11 | PPC_LO (offset + 16), p), p += 4;
794e51c0 9886 }
ac2df442
AM
9887 }
9888 else
9889 {
176a0d42
AM
9890 if (r != NULL)
9891 {
794e51c0
AM
9892 if (ALWAYS_EMIT_R2SAVE
9893 || stub_entry->stub_type == ppc_stub_plt_call_r2save)
9894 r[0].r_offset += 4;
176a0d42 9895 r[0].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_DS);
b9e5796b 9896 if (plt_load_toc)
176a0d42 9897 {
b9e5796b 9898 if (PPC_HA (offset + 8 + 8 * plt_static_chain) != PPC_HA (offset))
c7131b65 9899 {
b9e5796b
AM
9900 r[1].r_offset = r[0].r_offset + 4;
9901 r[1].r_info = ELF64_R_INFO (0, R_PPC64_TOC16);
9902 r[1].r_addend = r[0].r_addend;
9903 }
9904 else
9905 {
9906 r[1].r_offset = r[0].r_offset + 8 + 8 * use_fake_dep;
9907 r[1].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_DS);
9908 r[1].r_addend = r[0].r_addend + 8 + 8 * plt_static_chain;
9909 if (plt_static_chain)
9910 {
9911 r[2].r_offset = r[1].r_offset + 4;
9912 r[2].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_DS);
9913 r[2].r_addend = r[0].r_addend + 8;
9914 }
c7131b65 9915 }
176a0d42
AM
9916 }
9917 }
794e51c0
AM
9918 if (ALWAYS_EMIT_R2SAVE
9919 || stub_entry->stub_type == ppc_stub_plt_call_r2save)
a078d95a 9920 bfd_put_32 (obfd, STD_R2_0R1 + STK_TOC (htab), p), p += 4;
71a39c98 9921 bfd_put_32 (obfd, LD_R12_0R2 | PPC_LO (offset), p), p += 4;
b9e5796b
AM
9922 if (plt_load_toc
9923 && PPC_HA (offset + 8 + 8 * plt_static_chain) != PPC_HA (offset))
ac2df442
AM
9924 {
9925 bfd_put_32 (obfd, ADDI_R2_R2 | PPC_LO (offset), p), p += 4;
9926 offset = 0;
9927 }
71a39c98 9928 bfd_put_32 (obfd, MTCTR_R12, p), p += 4;
b9e5796b 9929 if (plt_load_toc)
794e51c0 9930 {
b9e5796b
AM
9931 if (use_fake_dep)
9932 {
9933 bfd_put_32 (obfd, XOR_R11_R12_R12, p), p += 4;
9934 bfd_put_32 (obfd, ADD_R2_R2_R11, p), p += 4;
9935 }
9936 if (plt_static_chain)
9937 bfd_put_32 (obfd, LD_R11_0R2 | PPC_LO (offset + 16), p), p += 4;
9938 bfd_put_32 (obfd, LD_R2_0R2 | PPC_LO (offset + 8), p), p += 4;
794e51c0 9939 }
ac2df442 9940 }
b9e5796b 9941 if (plt_load_toc && plt_thread_safe && !use_fake_dep)
794e51c0
AM
9942 {
9943 bfd_put_32 (obfd, CMPLDI_R2_0, p), p += 4;
9944 bfd_put_32 (obfd, BNECTR_P4, p), p += 4;
22aa0c7e 9945 bfd_put_32 (obfd, B_DOT | (cmp_branch_off & 0x3fffffc), p), p += 4;
794e51c0
AM
9946 }
9947 else
407aa07c 9948 bfd_put_32 (obfd, BCTR, p), p += 4;
5d1634d7
AM
9949 return p;
9950}
9951
a7f2871e
AM
9952/* Build a special .plt call stub for __tls_get_addr. */
9953
9954#define LD_R11_0R3 0xe9630000
9955#define LD_R12_0R3 0xe9830000
9956#define MR_R0_R3 0x7c601b78
9957#define CMPDI_R11_0 0x2c2b0000
9958#define ADD_R3_R12_R13 0x7c6c6a14
9959#define BEQLR 0x4d820020
9960#define MR_R3_R0 0x7c030378
a7f2871e
AM
9961#define STD_R11_0R1 0xf9610000
9962#define BCTRL 0x4e800421
9963#define LD_R11_0R1 0xe9610000
a7f2871e
AM
9964#define MTLR_R11 0x7d6803a6
9965
9966static inline bfd_byte *
794e51c0
AM
9967build_tls_get_addr_stub (struct ppc_link_hash_table *htab,
9968 struct ppc_stub_hash_entry *stub_entry,
9969 bfd_byte *p, bfd_vma offset, Elf_Internal_Rela *r)
a7f2871e 9970{
e7d1c40c 9971 bfd *obfd = htab->params->stub_bfd;
df136d64 9972 bfd_byte *loc = p;
794e51c0 9973
a7f2871e
AM
9974 bfd_put_32 (obfd, LD_R11_0R3 + 0, p), p += 4;
9975 bfd_put_32 (obfd, LD_R12_0R3 + 8, p), p += 4;
9976 bfd_put_32 (obfd, MR_R0_R3, p), p += 4;
9977 bfd_put_32 (obfd, CMPDI_R11_0, p), p += 4;
9978 bfd_put_32 (obfd, ADD_R3_R12_R13, p), p += 4;
9979 bfd_put_32 (obfd, BEQLR, p), p += 4;
9980 bfd_put_32 (obfd, MR_R3_R0, p), p += 4;
f378ab09
AM
9981 if (r != NULL)
9982 r[0].r_offset += 7 * 4;
e81b4c93 9983 if (stub_entry->stub_type != ppc_stub_plt_call_r2save)
f378ab09
AM
9984 return build_plt_stub (htab, stub_entry, p, offset, r);
9985
a7f2871e 9986 bfd_put_32 (obfd, MFLR_R11, p), p += 4;
a078d95a 9987 bfd_put_32 (obfd, STD_R11_0R1 + STK_LINKER (htab), p), p += 4;
a7f2871e
AM
9988
9989 if (r != NULL)
f378ab09 9990 r[0].r_offset += 2 * 4;
794e51c0 9991 p = build_plt_stub (htab, stub_entry, p, offset, r);
407aa07c 9992 bfd_put_32 (obfd, BCTRL, p - 4);
a7f2871e 9993
a078d95a 9994 bfd_put_32 (obfd, LD_R2_0R1 + STK_TOC (htab), p), p += 4;
bd4d2eaa 9995 bfd_put_32 (obfd, LD_R11_0R1 + STK_LINKER (htab), p), p += 4;
a7f2871e
AM
9996 bfd_put_32 (obfd, MTLR_R11, p), p += 4;
9997 bfd_put_32 (obfd, BLR, p), p += 4;
9998
df136d64
AM
9999 if (htab->glink_eh_frame != NULL
10000 && htab->glink_eh_frame->size != 0)
10001 {
10002 bfd_byte *base, *eh;
10003 unsigned int lr_used, delta;
10004
10005 base = htab->glink_eh_frame->contents + stub_entry->group->eh_base + 17;
10006 eh = base + stub_entry->group->eh_size;
10007 lr_used = stub_entry->stub_offset + (p - 20 - loc);
10008 delta = lr_used - stub_entry->group->lr_restore;
10009 stub_entry->group->lr_restore = lr_used + 16;
10010 eh = eh_advance (htab->elf.dynobj, eh, delta);
10011 *eh++ = DW_CFA_offset_extended_sf;
10012 *eh++ = 65;
10013 *eh++ = -(STK_LINKER (htab) / 8) & 0x7f;
10014 *eh++ = DW_CFA_advance_loc + 4;
10015 *eh++ = DW_CFA_restore_extended;
10016 *eh++ = 65;
10017 stub_entry->group->eh_size = eh - base;
10018 }
a7f2871e
AM
10019 return p;
10020}
10021
176a0d42
AM
10022static Elf_Internal_Rela *
10023get_relocs (asection *sec, int count)
10024{
10025 Elf_Internal_Rela *relocs;
10026 struct bfd_elf_section_data *elfsec_data;
10027
10028 elfsec_data = elf_section_data (sec);
10029 relocs = elfsec_data->relocs;
10030 if (relocs == NULL)
10031 {
10032 bfd_size_type relsize;
10033 relsize = sec->reloc_count * sizeof (*relocs);
10034 relocs = bfd_alloc (sec->owner, relsize);
10035 if (relocs == NULL)
10036 return NULL;
10037 elfsec_data->relocs = relocs;
d4730f92
BS
10038 elfsec_data->rela.hdr = bfd_zalloc (sec->owner,
10039 sizeof (Elf_Internal_Shdr));
10040 if (elfsec_data->rela.hdr == NULL)
10041 return NULL;
10042 elfsec_data->rela.hdr->sh_size = (sec->reloc_count
10043 * sizeof (Elf64_External_Rela));
10044 elfsec_data->rela.hdr->sh_entsize = sizeof (Elf64_External_Rela);
176a0d42
AM
10045 sec->reloc_count = 0;
10046 }
10047 relocs += sec->reloc_count;
10048 sec->reloc_count += count;
10049 return relocs;
10050}
10051
aa374f67 10052static bfd_vma
25f53a85 10053get_r2off (struct bfd_link_info *info,
aa374f67
AM
10054 struct ppc_stub_hash_entry *stub_entry)
10055{
25f53a85 10056 struct ppc_link_hash_table *htab = ppc_hash_table (info);
6f20ed8a 10057 bfd_vma r2off = htab->sec_info[stub_entry->target_section->id].toc_off;
aa374f67
AM
10058
10059 if (r2off == 0)
10060 {
10061 /* Support linking -R objects. Get the toc pointer from the
10062 opd entry. */
10063 char buf[8];
b9e5796b
AM
10064 if (!htab->opd_abi)
10065 return r2off;
aa374f67
AM
10066 asection *opd = stub_entry->h->elf.root.u.def.section;
10067 bfd_vma opd_off = stub_entry->h->elf.root.u.def.value;
10068
10069 if (strcmp (opd->name, ".opd") != 0
10070 || opd->reloc_count != 0)
10071 {
2cdcc330
AM
10072 info->callbacks->einfo
10073 (_("%P: cannot find opd entry toc for `%pT'\n"),
10074 stub_entry->h->elf.root.root.string);
aa374f67 10075 bfd_set_error (bfd_error_bad_value);
a7c49797 10076 return (bfd_vma) -1;
aa374f67
AM
10077 }
10078 if (!bfd_get_section_contents (opd->owner, opd, buf, opd_off + 8, 8))
a7c49797 10079 return (bfd_vma) -1;
aa374f67 10080 r2off = bfd_get_64 (opd->owner, buf);
25f53a85 10081 r2off -= elf_gp (info->output_bfd);
aa374f67 10082 }
6f20ed8a 10083 r2off -= htab->sec_info[stub_entry->group->link_sec->id].toc_off;
aa374f67
AM
10084 return r2off;
10085}
10086
b34976b6 10087static bfd_boolean
4ce794b7 10088ppc_build_one_stub (struct bfd_hash_entry *gen_entry, void *in_arg)
5d1634d7 10089{
721956f4
AM
10090 struct ppc_stub_hash_entry *stub_entry;
10091 struct ppc_branch_hash_entry *br_entry;
5d1634d7
AM
10092 struct bfd_link_info *info;
10093 struct ppc_link_hash_table *htab;
721956f4
AM
10094 bfd_byte *loc;
10095 bfd_byte *p;
1aa42141 10096 bfd_vma targ, off;
176a0d42 10097 Elf_Internal_Rela *r;
e054468f 10098 asection *plt;
5d1634d7 10099
721956f4
AM
10100 /* Massage our args to the form they really have. */
10101 stub_entry = (struct ppc_stub_hash_entry *) gen_entry;
4ce794b7 10102 info = in_arg;
5d1634d7 10103
5d1634d7 10104 htab = ppc_hash_table (info);
4dfe6ac6
NC
10105 if (htab == NULL)
10106 return FALSE;
5d1634d7 10107
1aa42141 10108 BFD_ASSERT (stub_entry->stub_offset >= stub_entry->group->stub_sec->size);
6f20ed8a 10109 loc = stub_entry->group->stub_sec->contents + stub_entry->stub_offset;
721956f4 10110
4ce794b7 10111 htab->stub_count[stub_entry->stub_type - 1] += 1;
721956f4 10112 switch (stub_entry->stub_type)
5d1634d7 10113 {
721956f4 10114 case ppc_stub_long_branch:
ad8e1ba5 10115 case ppc_stub_long_branch_r2off:
721956f4 10116 /* Branches are relative. This is where we are going to. */
1aa42141 10117 targ = (stub_entry->target_value
6911b7dc
AM
10118 + stub_entry->target_section->output_offset
10119 + stub_entry->target_section->output_section->vma);
1aa42141 10120 targ += PPC64_LOCAL_ENTRY_OFFSET (stub_entry->other);
5d1634d7 10121
721956f4 10122 /* And this is where we are coming from. */
1aa42141
AM
10123 off = (stub_entry->stub_offset
10124 + stub_entry->group->stub_sec->output_offset
10125 + stub_entry->group->stub_sec->output_section->vma);
10126 off = targ - off;
e86ce104 10127
9e390558 10128 p = loc;
ac2df442 10129 if (stub_entry->stub_type == ppc_stub_long_branch_r2off)
ad8e1ba5 10130 {
25f53a85 10131 bfd_vma r2off = get_r2off (info, stub_entry);
ad8e1ba5 10132
a7c49797 10133 if (r2off == (bfd_vma) -1)
aa374f67
AM
10134 {
10135 htab->stub_error = TRUE;
10136 return FALSE;
10137 }
9e390558
AM
10138 bfd_put_32 (htab->params->stub_bfd, STD_R2_0R1 + STK_TOC (htab), p);
10139 p += 4;
ac2df442
AM
10140 if (PPC_HA (r2off) != 0)
10141 {
e7d1c40c 10142 bfd_put_32 (htab->params->stub_bfd,
9e390558
AM
10143 ADDIS_R2_R2 | PPC_HA (r2off), p);
10144 p += 4;
a7c49797
AM
10145 }
10146 if (PPC_LO (r2off) != 0)
10147 {
10148 bfd_put_32 (htab->params->stub_bfd,
9e390558
AM
10149 ADDI_R2_R2 | PPC_LO (r2off), p);
10150 p += 4;
ac2df442 10151 }
9e390558 10152 off -= p - loc;
ad8e1ba5 10153 }
9e390558
AM
10154 bfd_put_32 (htab->params->stub_bfd, B_DOT | (off & 0x3fffffc), p);
10155 p += 4;
ad8e1ba5 10156
5c3dead3
AM
10157 if (off + (1 << 25) >= (bfd_vma) (1 << 26))
10158 {
cf97bcb0
AM
10159 _bfd_error_handler
10160 (_("long branch stub `%s' offset overflow"),
bc30df16 10161 stub_entry->root.string);
5c3dead3
AM
10162 htab->stub_error = TRUE;
10163 return FALSE;
10164 }
ee75fd95
AM
10165
10166 if (info->emitrelocations)
10167 {
6f20ed8a 10168 r = get_relocs (stub_entry->group->stub_sec, 1);
176a0d42
AM
10169 if (r == NULL)
10170 return FALSE;
9e390558 10171 r->r_offset = p - 4 - stub_entry->group->stub_sec->contents;
ee75fd95 10172 r->r_info = ELF64_R_INFO (0, R_PPC64_REL24);
1aa42141 10173 r->r_addend = targ;
ee75fd95
AM
10174 if (stub_entry->h != NULL)
10175 {
10176 struct elf_link_hash_entry **hashes;
10177 unsigned long symndx;
10178 struct ppc_link_hash_entry *h;
10179
e7d1c40c 10180 hashes = elf_sym_hashes (htab->params->stub_bfd);
ee75fd95
AM
10181 if (hashes == NULL)
10182 {
10183 bfd_size_type hsize;
10184
10185 hsize = (htab->stub_globals + 1) * sizeof (*hashes);
e7d1c40c 10186 hashes = bfd_zalloc (htab->params->stub_bfd, hsize);
ee75fd95
AM
10187 if (hashes == NULL)
10188 return FALSE;
e7d1c40c 10189 elf_sym_hashes (htab->params->stub_bfd) = hashes;
ee75fd95
AM
10190 htab->stub_globals = 1;
10191 }
10192 symndx = htab->stub_globals++;
10193 h = stub_entry->h;
10194 hashes[symndx] = &h->elf;
10195 r->r_info = ELF64_R_INFO (symndx, R_PPC64_REL24);
10196 if (h->oh != NULL && h->oh->is_func)
b31867b6 10197 h = ppc_follow_link (h->oh);
ee75fd95
AM
10198 if (h->elf.root.u.def.section != stub_entry->target_section)
10199 /* H is an opd symbol. The addend must be zero. */
10200 r->r_addend = 0;
10201 else
10202 {
10203 off = (h->elf.root.u.def.value
10204 + h->elf.root.u.def.section->output_offset
10205 + h->elf.root.u.def.section->output_section->vma);
10206 r->r_addend -= off;
10207 }
10208 }
10209 }
721956f4 10210 break;
e86ce104 10211
721956f4 10212 case ppc_stub_plt_branch:
ad8e1ba5 10213 case ppc_stub_plt_branch_r2off:
721956f4
AM
10214 br_entry = ppc_branch_hash_lookup (&htab->branch_hash_table,
10215 stub_entry->root.string + 9,
b34976b6 10216 FALSE, FALSE);
721956f4
AM
10217 if (br_entry == NULL)
10218 {
cf97bcb0
AM
10219 _bfd_error_handler (_("can't find branch stub `%s'"),
10220 stub_entry->root.string);
b34976b6
AM
10221 htab->stub_error = TRUE;
10222 return FALSE;
721956f4
AM
10223 }
10224
1aa42141 10225 targ = (stub_entry->target_value
176a0d42
AM
10226 + stub_entry->target_section->output_offset
10227 + stub_entry->target_section->output_section->vma);
6911b7dc 10228 if (stub_entry->stub_type != ppc_stub_plt_branch_r2off)
1aa42141 10229 targ += PPC64_LOCAL_ENTRY_OFFSET (stub_entry->other);
721956f4 10230
1aa42141 10231 bfd_put_64 (htab->brlt->owner, targ,
4ce794b7 10232 htab->brlt->contents + br_entry->offset);
721956f4 10233
f94498ff 10234 if (br_entry->iter == htab->stub_iteration)
721956f4 10235 {
f94498ff 10236 br_entry->iter = 0;
84f5d08e 10237
f94498ff 10238 if (htab->relbrlt != NULL)
84f5d08e 10239 {
f94498ff
AM
10240 /* Create a reloc for the branch lookup table entry. */
10241 Elf_Internal_Rela rela;
10242 bfd_byte *rl;
10243
10244 rela.r_offset = (br_entry->offset
10245 + htab->brlt->output_offset
10246 + htab->brlt->output_section->vma);
10247 rela.r_info = ELF64_R_INFO (0, R_PPC64_RELATIVE);
1aa42141 10248 rela.r_addend = targ;
f94498ff
AM
10249
10250 rl = htab->relbrlt->contents;
10251 rl += (htab->relbrlt->reloc_count++
10252 * sizeof (Elf64_External_Rela));
10253 bfd_elf64_swap_reloca_out (htab->relbrlt->owner, &rela, rl);
10254 }
10255 else if (info->emitrelocations)
10256 {
176a0d42
AM
10257 r = get_relocs (htab->brlt, 1);
10258 if (r == NULL)
10259 return FALSE;
10260 /* brlt, being SEC_LINKER_CREATED does not go through the
10261 normal reloc processing. Symbols and offsets are not
10262 translated from input file to output file form, so
10263 set up the offset per the output file. */
f94498ff
AM
10264 r->r_offset = (br_entry->offset
10265 + htab->brlt->output_offset
10266 + htab->brlt->output_section->vma);
10267 r->r_info = ELF64_R_INFO (0, R_PPC64_RELATIVE);
1aa42141 10268 r->r_addend = targ;
84f5d08e 10269 }
84f5d08e 10270 }
721956f4 10271
1aa42141 10272 targ = (br_entry->offset
176a0d42
AM
10273 + htab->brlt->output_offset
10274 + htab->brlt->output_section->vma);
10275
1aa42141
AM
10276 off = (elf_gp (info->output_bfd)
10277 + htab->sec_info[stub_entry->group->link_sec->id].toc_off);
10278 off = targ - off;
721956f4 10279
ad8e1ba5 10280 if (off + 0x80008000 > 0xffffffff || (off & 7) != 0)
5d1634d7 10281 {
25f53a85 10282 info->callbacks->einfo
c1c8c1ef 10283 (_("%P: linkage table error against `%pT'\n"),
721956f4 10284 stub_entry->root.string);
5d1634d7 10285 bfd_set_error (bfd_error_bad_value);
b34976b6
AM
10286 htab->stub_error = TRUE;
10287 return FALSE;
5d1634d7 10288 }
41bd81ab 10289
176a0d42
AM
10290 if (info->emitrelocations)
10291 {
6f20ed8a 10292 r = get_relocs (stub_entry->group->stub_sec, 1 + (PPC_HA (off) != 0));
176a0d42
AM
10293 if (r == NULL)
10294 return FALSE;
6f20ed8a 10295 r[0].r_offset = loc - stub_entry->group->stub_sec->contents;
7cfbafbc
AM
10296 if (bfd_big_endian (info->output_bfd))
10297 r[0].r_offset += 2;
00f412ee 10298 if (stub_entry->stub_type == ppc_stub_plt_branch_r2off)
176a0d42
AM
10299 r[0].r_offset += 4;
10300 r[0].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_DS);
1aa42141 10301 r[0].r_addend = targ;
176a0d42
AM
10302 if (PPC_HA (off) != 0)
10303 {
10304 r[0].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_HA);
10305 r[1].r_offset = r[0].r_offset + 4;
10306 r[1].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_LO_DS);
10307 r[1].r_addend = r[0].r_addend;
10308 }
10309 }
10310
9e390558 10311 p = loc;
00f412ee 10312 if (stub_entry->stub_type != ppc_stub_plt_branch_r2off)
ad8e1ba5 10313 {
176a0d42 10314 if (PPC_HA (off) != 0)
ac2df442 10315 {
e7d1c40c 10316 bfd_put_32 (htab->params->stub_bfd,
9e390558
AM
10317 ADDIS_R12_R2 | PPC_HA (off), p);
10318 p += 4;
e7d1c40c 10319 bfd_put_32 (htab->params->stub_bfd,
9e390558 10320 LD_R12_0R12 | PPC_LO (off), p);
ac2df442
AM
10321 }
10322 else
9e390558
AM
10323 bfd_put_32 (htab->params->stub_bfd,
10324 LD_R12_0R2 | PPC_LO (off), p);
ad8e1ba5
AM
10325 }
10326 else
10327 {
25f53a85 10328 bfd_vma r2off = get_r2off (info, stub_entry);
aa374f67 10329
a7c49797 10330 if (r2off == (bfd_vma) -1)
aa374f67
AM
10331 {
10332 htab->stub_error = TRUE;
10333 return FALSE;
10334 }
ad8e1ba5 10335
9e390558
AM
10336 bfd_put_32 (htab->params->stub_bfd, STD_R2_0R1 + STK_TOC (htab), p);
10337 p += 4;
176a0d42 10338 if (PPC_HA (off) != 0)
ac2df442 10339 {
e7d1c40c 10340 bfd_put_32 (htab->params->stub_bfd,
9e390558
AM
10341 ADDIS_R12_R2 | PPC_HA (off), p);
10342 p += 4;
e7d1c40c 10343 bfd_put_32 (htab->params->stub_bfd,
9e390558 10344 LD_R12_0R12 | PPC_LO (off), p);
ac2df442
AM
10345 }
10346 else
9e390558 10347 bfd_put_32 (htab->params->stub_bfd, LD_R12_0R2 | PPC_LO (off), p);
ac2df442
AM
10348
10349 if (PPC_HA (r2off) != 0)
10350 {
9e390558 10351 p += 4;
e7d1c40c 10352 bfd_put_32 (htab->params->stub_bfd,
9e390558 10353 ADDIS_R2_R2 | PPC_HA (r2off), p);
00f412ee
AM
10354 }
10355 if (PPC_LO (r2off) != 0)
10356 {
9e390558 10357 p += 4;
e7d1c40c 10358 bfd_put_32 (htab->params->stub_bfd,
9e390558 10359 ADDI_R2_R2 | PPC_LO (r2off), p);
ac2df442 10360 }
ad8e1ba5 10361 }
9e390558
AM
10362 p += 4;
10363 bfd_put_32 (htab->params->stub_bfd, MTCTR_R12, p);
10364 p += 4;
407aa07c
AM
10365 bfd_put_32 (htab->params->stub_bfd, BCTR, p);
10366 p += 4;
721956f4 10367 break;
5d1634d7 10368
05d0e962
AM
10369 case ppc_stub_long_branch_notoc:
10370 case ppc_stub_long_branch_both:
10371 case ppc_stub_plt_branch_notoc:
10372 case ppc_stub_plt_branch_both:
10373 case ppc_stub_plt_call_notoc:
10374 case ppc_stub_plt_call_both:
10375 p = loc;
f891966f 10376 off = (stub_entry->stub_offset
05d0e962
AM
10377 + stub_entry->group->stub_sec->output_offset
10378 + stub_entry->group->stub_sec->output_section->vma);
10379 if (stub_entry->stub_type == ppc_stub_long_branch_both
10380 || stub_entry->stub_type == ppc_stub_plt_branch_both
10381 || stub_entry->stub_type == ppc_stub_plt_call_both)
10382 {
10383 off += 4;
10384 bfd_put_32 (htab->params->stub_bfd, STD_R2_0R1 + STK_TOC (htab), p);
10385 p += 4;
10386 }
10387 if (stub_entry->stub_type >= ppc_stub_plt_call_notoc)
10388 {
10389 targ = stub_entry->plt_ent->plt.offset & ~1;
10390 if (targ >= (bfd_vma) -2)
10391 abort ();
10392
10393 plt = htab->elf.splt;
10394 if (!htab->elf.dynamic_sections_created
10395 || stub_entry->h == NULL
10396 || stub_entry->h->elf.dynindx == -1)
10397 {
10398 if (stub_entry->symtype == STT_GNU_IFUNC)
10399 plt = htab->elf.iplt;
10400 else
10401 plt = htab->pltlocal;
10402 }
10403 targ += plt->output_offset + plt->output_section->vma;
10404 }
10405 else
10406 targ = (stub_entry->target_value
10407 + stub_entry->target_section->output_offset
10408 + stub_entry->target_section->output_section->vma);
10409 off = targ - off;
f891966f
AM
10410
10411 /* The notoc stubs calculate their target (either a PLT entry or
10412 the global entry point of a function) relative to the PC
10413 returned by the "bcl" two instructions past the start of the
10414 sequence emitted by build_offset. The offset is therefore 8
10415 less than calculated from the start of the sequence. */
10416 off -= 8;
05d0e962
AM
10417 p = build_offset (htab->params->stub_bfd, p, off,
10418 stub_entry->stub_type >= ppc_stub_plt_call_notoc);
f891966f 10419 if (stub_entry->stub_type <= ppc_stub_long_branch_both)
05d0e962 10420 {
f891966f
AM
10421 bfd_vma from;
10422 from = (stub_entry->stub_offset
10423 + stub_entry->group->stub_sec->output_offset
10424 + stub_entry->group->stub_sec->output_section->vma
10425 + (p - loc));
05d0e962 10426 bfd_put_32 (htab->params->stub_bfd,
f891966f 10427 B_DOT | ((targ - from) & 0x3fffffc), p);
05d0e962
AM
10428 }
10429 else
10430 {
10431 bfd_put_32 (htab->params->stub_bfd, MTCTR_R12, p);
10432 p += 4;
10433 bfd_put_32 (htab->params->stub_bfd, BCTR, p);
10434 }
10435 p += 4;
df136d64
AM
10436
10437 if (htab->glink_eh_frame != NULL
10438 && htab->glink_eh_frame->size != 0)
10439 {
10440 bfd_byte *base, *eh;
10441 unsigned int lr_used, delta;
10442
10443 base = (htab->glink_eh_frame->contents
10444 + stub_entry->group->eh_base + 17);
10445 eh = base + stub_entry->group->eh_size;
10446 lr_used = stub_entry->stub_offset + 8;
10447 if (stub_entry->stub_type == ppc_stub_long_branch_both
10448 || stub_entry->stub_type == ppc_stub_plt_branch_both
10449 || stub_entry->stub_type == ppc_stub_plt_call_both)
10450 lr_used += 4;
10451 delta = lr_used - stub_entry->group->lr_restore;
10452 stub_entry->group->lr_restore = lr_used + 8;
10453 eh = eh_advance (htab->elf.dynobj, eh, delta);
10454 *eh++ = DW_CFA_register;
10455 *eh++ = 65;
10456 *eh++ = 12;
10457 *eh++ = DW_CFA_advance_loc + 2;
10458 *eh++ = DW_CFA_restore_extended;
10459 *eh++ = 65;
10460 stub_entry->group->eh_size = eh - base;
10461 }
05d0e962
AM
10462 break;
10463
721956f4 10464 case ppc_stub_plt_call:
794e51c0 10465 case ppc_stub_plt_call_r2save:
e054468f 10466 if (stub_entry->h != NULL
b31867b6
AM
10467 && stub_entry->h->is_func_descriptor
10468 && stub_entry->h->oh != NULL)
c862ae31 10469 {
b31867b6
AM
10470 struct ppc_link_hash_entry *fh = ppc_follow_link (stub_entry->h->oh);
10471
10472 /* If the old-ABI "dot-symbol" is undefined make it weak so
6f20ed8a 10473 we don't get a link error from RELOC_FOR_GLOBAL_SYMBOL. */
8c5b4e52
AM
10474 if (fh->elf.root.type == bfd_link_hash_undefined
10475 && (stub_entry->h->elf.root.type == bfd_link_hash_defined
10476 || stub_entry->h->elf.root.type == bfd_link_hash_defweak))
b31867b6 10477 fh->elf.root.type = bfd_link_hash_undefweak;
c862ae31
AM
10478 }
10479
721956f4 10480 /* Now build the stub. */
1aa42141
AM
10481 targ = stub_entry->plt_ent->plt.offset & ~1;
10482 if (targ >= (bfd_vma) -2)
721956f4
AM
10483 abort ();
10484
33e44f2e 10485 plt = htab->elf.splt;
25f23106
AM
10486 if (!htab->elf.dynamic_sections_created
10487 || stub_entry->h == NULL
10488 || stub_entry->h->elf.dynindx == -1)
2d7ad24e
AM
10489 {
10490 if (stub_entry->symtype == STT_GNU_IFUNC)
10491 plt = htab->elf.iplt;
10492 else
10493 plt = htab->pltlocal;
10494 }
1aa42141 10495 targ += plt->output_offset + plt->output_section->vma;
e054468f 10496
1aa42141
AM
10497 off = (elf_gp (info->output_bfd)
10498 + htab->sec_info[stub_entry->group->link_sec->id].toc_off);
10499 off = targ - off;
721956f4 10500
ad8e1ba5 10501 if (off + 0x80008000 > 0xffffffff || (off & 7) != 0)
721956f4 10502 {
25f53a85 10503 info->callbacks->einfo
695344c0 10504 /* xgettext:c-format */
c1c8c1ef 10505 (_("%P: linkage table error against `%pT'\n"),
e054468f
AM
10506 stub_entry->h != NULL
10507 ? stub_entry->h->elf.root.root.string
10508 : "<local sym>");
721956f4 10509 bfd_set_error (bfd_error_bad_value);
b34976b6
AM
10510 htab->stub_error = TRUE;
10511 return FALSE;
721956f4
AM
10512 }
10513
176a0d42
AM
10514 r = NULL;
10515 if (info->emitrelocations)
10516 {
6f20ed8a 10517 r = get_relocs (stub_entry->group->stub_sec,
3ba720c7
AM
10518 ((PPC_HA (off) != 0)
10519 + (htab->opd_abi
e7d1c40c 10520 ? 2 + (htab->params->plt_static_chain
3ba720c7
AM
10521 && PPC_HA (off + 16) == PPC_HA (off))
10522 : 1)));
176a0d42
AM
10523 if (r == NULL)
10524 return FALSE;
6f20ed8a 10525 r[0].r_offset = loc - stub_entry->group->stub_sec->contents;
7cfbafbc
AM
10526 if (bfd_big_endian (info->output_bfd))
10527 r[0].r_offset += 2;
1aa42141 10528 r[0].r_addend = targ;
176a0d42 10529 }
a7f2871e
AM
10530 if (stub_entry->h != NULL
10531 && (stub_entry->h == htab->tls_get_addr_fd
10532 || stub_entry->h == htab->tls_get_addr)
7c9cf415 10533 && htab->params->tls_get_addr_opt)
794e51c0 10534 p = build_tls_get_addr_stub (htab, stub_entry, loc, off, r);
a7f2871e 10535 else
794e51c0 10536 p = build_plt_stub (htab, stub_entry, loc, off, r);
721956f4
AM
10537 break;
10538
a4b6fadd
AM
10539 case ppc_stub_save_res:
10540 return TRUE;
10541
721956f4
AM
10542 default:
10543 BFD_FAIL ();
b34976b6 10544 return FALSE;
721956f4
AM
10545 }
10546
1aa42141 10547 stub_entry->group->stub_sec->size = stub_entry->stub_offset + (p - loc);
97b639ba 10548
e7d1c40c 10549 if (htab->params->emit_stub_syms)
97b639ba
AM
10550 {
10551 struct elf_link_hash_entry *h;
ee75fd95
AM
10552 size_t len1, len2;
10553 char *name;
10554 const char *const stub_str[] = { "long_branch",
05d0e962
AM
10555 "long_branch",
10556 "long_branch",
3f6ff479
AM
10557 "long_branch",
10558 "plt_branch",
ee75fd95 10559 "plt_branch",
05d0e962
AM
10560 "plt_branch",
10561 "plt_branch",
10562 "plt_call",
10563 "plt_call",
794e51c0 10564 "plt_call",
ee75fd95
AM
10565 "plt_call" };
10566
10567 len1 = strlen (stub_str[stub_entry->stub_type - 1]);
10568 len2 = strlen (stub_entry->root.string);
10569 name = bfd_malloc (len1 + len2 + 2);
10570 if (name == NULL)
10571 return FALSE;
10572 memcpy (name, stub_entry->root.string, 9);
10573 memcpy (name + 9, stub_str[stub_entry->stub_type - 1], len1);
10574 memcpy (name + len1 + 9, stub_entry->root.string + 8, len2 - 8 + 1);
10575 h = elf_link_hash_lookup (&htab->elf, name, TRUE, FALSE, FALSE);
97b639ba
AM
10576 if (h == NULL)
10577 return FALSE;
10578 if (h->root.type == bfd_link_hash_new)
10579 {
10580 h->root.type = bfd_link_hash_defined;
6f20ed8a 10581 h->root.u.def.section = stub_entry->group->stub_sec;
97b639ba 10582 h->root.u.def.value = stub_entry->stub_offset;
f5385ebf
AM
10583 h->ref_regular = 1;
10584 h->def_regular = 1;
10585 h->ref_regular_nonweak = 1;
10586 h->forced_local = 1;
10587 h->non_elf = 0;
2ec55de3 10588 h->root.linker_def = 1;
97b639ba
AM
10589 }
10590 }
10591
b34976b6 10592 return TRUE;
721956f4
AM
10593}
10594
10595/* As above, but don't actually build the stub. Just bump offset so
10596 we know stub section sizes, and select plt_branch stubs where
10597 long_branch stubs won't do. */
10598
b34976b6 10599static bfd_boolean
4ce794b7 10600ppc_size_one_stub (struct bfd_hash_entry *gen_entry, void *in_arg)
721956f4
AM
10601{
10602 struct ppc_stub_hash_entry *stub_entry;
63bc6f6c 10603 struct bfd_link_info *info;
721956f4 10604 struct ppc_link_hash_table *htab;
f891966f
AM
10605 asection *plt;
10606 bfd_vma targ, off, r2off;
10607 unsigned int size, extra, lr_used, delta;
721956f4
AM
10608
10609 /* Massage our args to the form they really have. */
10610 stub_entry = (struct ppc_stub_hash_entry *) gen_entry;
63bc6f6c
AM
10611 info = in_arg;
10612
10613 htab = ppc_hash_table (info);
4dfe6ac6
NC
10614 if (htab == NULL)
10615 return FALSE;
721956f4 10616
1aa42141
AM
10617 /* Make a note of the offset within the stubs for this entry. */
10618 stub_entry->stub_offset = stub_entry->group->stub_sec->size;
10619
a4b6fadd
AM
10620 if (stub_entry->h != NULL
10621 && stub_entry->h->save_res
10622 && stub_entry->h->elf.root.type == bfd_link_hash_defined
10623 && stub_entry->h->elf.root.u.def.section == htab->sfpr)
10624 {
10625 /* Don't make stubs to out-of-line register save/restore
10626 functions. Instead, emit copies of the functions. */
10627 stub_entry->group->needs_save_res = 1;
10628 stub_entry->stub_type = ppc_stub_save_res;
10629 return TRUE;
10630 }
10631
f891966f 10632 switch (stub_entry->stub_type)
721956f4 10633 {
f891966f
AM
10634 case ppc_stub_plt_branch:
10635 case ppc_stub_plt_branch_r2off:
10636 /* Reset the stub type from the plt branch variant in case we now
10637 can reach with a shorter stub. */
10638 stub_entry->stub_type += ppc_stub_long_branch - ppc_stub_plt_branch;
10639 /* Fall through. */
10640 case ppc_stub_long_branch:
10641 case ppc_stub_long_branch_r2off:
1aa42141
AM
10642 targ = (stub_entry->target_value
10643 + stub_entry->target_section->output_offset
10644 + stub_entry->target_section->output_section->vma);
f891966f 10645 targ += PPC64_LOCAL_ENTRY_OFFSET (stub_entry->other);
1aa42141
AM
10646 off = (stub_entry->stub_offset
10647 + stub_entry->group->stub_sec->output_offset
10648 + stub_entry->group->stub_sec->output_section->vma);
721956f4 10649
ad8e1ba5 10650 size = 4;
f891966f 10651 r2off = 0;
ad8e1ba5
AM
10652 if (stub_entry->stub_type == ppc_stub_long_branch_r2off)
10653 {
25f53a85 10654 r2off = get_r2off (info, stub_entry);
a7c49797 10655 if (r2off == (bfd_vma) -1)
aa374f67
AM
10656 {
10657 htab->stub_error = TRUE;
10658 return FALSE;
10659 }
a7c49797 10660 size = 8;
ac2df442 10661 if (PPC_HA (r2off) != 0)
a7c49797
AM
10662 size += 4;
10663 if (PPC_LO (r2off) != 0)
10664 size += 4;
1aa42141 10665 off += size - 4;
ad8e1ba5 10666 }
1aa42141 10667 off = targ - off;
ad8e1ba5 10668
f891966f
AM
10669 /* If the branch offset is too big, use a ppc_stub_plt_branch.
10670 Do the same for -R objects without function descriptors. */
10671 if ((stub_entry->stub_type == ppc_stub_long_branch_r2off
10672 && r2off == 0
10673 && htab->sec_info[stub_entry->target_section->id].toc_off == 0)
10674 || off + (1 << 25) >= (bfd_vma) (1 << 26))
721956f4 10675 {
f891966f 10676 struct ppc_branch_hash_entry *br_entry;
df136d64 10677
f891966f
AM
10678 br_entry = ppc_branch_hash_lookup (&htab->branch_hash_table,
10679 stub_entry->root.string + 9,
10680 TRUE, FALSE);
10681 if (br_entry == NULL)
721956f4 10682 {
f891966f
AM
10683 _bfd_error_handler (_("can't build branch stub `%s'"),
10684 stub_entry->root.string);
10685 htab->stub_error = TRUE;
10686 return FALSE;
721956f4
AM
10687 }
10688
f891966f 10689 if (br_entry->iter != htab->stub_iteration)
721956f4 10690 {
f891966f
AM
10691 br_entry->iter = htab->stub_iteration;
10692 br_entry->offset = htab->brlt->size;
10693 htab->brlt->size += 8;
63bc6f6c 10694
f891966f
AM
10695 if (htab->relbrlt != NULL)
10696 htab->relbrlt->size += sizeof (Elf64_External_Rela);
10697 else if (info->emitrelocations)
84f5d08e 10698 {
f891966f
AM
10699 htab->brlt->reloc_count += 1;
10700 htab->brlt->flags |= SEC_RELOC;
05d0e962 10701 }
f891966f 10702 }
ac2df442 10703
f891966f
AM
10704 targ = (br_entry->offset
10705 + htab->brlt->output_offset
10706 + htab->brlt->output_section->vma);
10707 off = (elf_gp (info->output_bfd)
10708 + htab->sec_info[stub_entry->group->link_sec->id].toc_off);
10709 off = targ - off;
176a0d42 10710
f891966f
AM
10711 if (info->emitrelocations)
10712 {
10713 stub_entry->group->stub_sec->reloc_count
10714 += 1 + (PPC_HA (off) != 0);
10715 stub_entry->group->stub_sec->flags |= SEC_RELOC;
10716 }
05d0e962 10717
f891966f
AM
10718 stub_entry->stub_type += ppc_stub_plt_branch - ppc_stub_long_branch;
10719 if (stub_entry->stub_type != ppc_stub_plt_branch_r2off)
10720 {
10721 size = 12;
10722 if (PPC_HA (off) != 0)
10723 size = 16;
ac2df442 10724 }
f891966f 10725 else
ac2df442 10726 {
f891966f
AM
10727 size = 16;
10728 if (PPC_HA (off) != 0)
10729 size += 4;
10730
10731 if (PPC_HA (r2off) != 0)
10732 size += 4;
10733 if (PPC_LO (r2off) != 0)
10734 size += 4;
ac2df442 10735 }
721956f4 10736 }
f891966f
AM
10737 else if (info->emitrelocations)
10738 {
10739 stub_entry->group->stub_sec->reloc_count += 1;
10740 stub_entry->group->stub_sec->flags |= SEC_RELOC;
10741 }
10742 break;
10743
10744 case ppc_stub_plt_branch_notoc:
10745 case ppc_stub_plt_branch_both:
10746 stub_entry->stub_type += ppc_stub_long_branch - ppc_stub_plt_branch;
10747 /* Fall through. */
10748 case ppc_stub_long_branch_notoc:
10749 case ppc_stub_long_branch_both:
10750 off = (stub_entry->stub_offset
10751 + stub_entry->group->stub_sec->output_offset
10752 + stub_entry->group->stub_sec->output_section->vma);
10753 size = 0;
10754 if (stub_entry->stub_type == ppc_stub_long_branch_both)
10755 size = 4;
10756 off += size;
10757 targ = (stub_entry->target_value
10758 + stub_entry->target_section->output_offset
10759 + stub_entry->target_section->output_section->vma);
10760 off = targ - off;
10761
10762 extra = size_offset (off - 8);
10763 /* Include branch insn plus those in the offset sequence. */
10764 size += 4 + extra;
10765 /* The branch insn is at the end, or "extra" bytes along. So
10766 its offset will be "extra" bytes less that that already
10767 calculated. */
10768 off -= extra;
10769
10770 /* After the bcl, lr has been modified so we need to emit
10771 .eh_frame info saying the return address is in r12. */
10772 lr_used = stub_entry->stub_offset + 8;
10773 if (stub_entry->stub_type == ppc_stub_long_branch_both)
10774 lr_used += 4;
10775 /* The eh_frame info will consist of a DW_CFA_advance_loc or
10776 variant, DW_CFA_register, 65, 12, DW_CFA_advance_loc+2,
10777 DW_CFA_restore_extended 65. */
10778 delta = lr_used - stub_entry->group->lr_restore;
10779 stub_entry->group->eh_size += eh_advance_size (delta) + 6;
10780 stub_entry->group->lr_restore = lr_used + 8;
10781
10782 /* If the branch can't reach, use a plt_branch. */
10783 if (off + (1 << 25) >= (bfd_vma) (1 << 26))
10784 {
10785 stub_entry->stub_type += (ppc_stub_plt_branch_notoc
10786 - ppc_stub_long_branch_notoc);
10787 size += 4;
10788 }
10789 break;
10790
10791 case ppc_stub_plt_call_notoc:
10792 case ppc_stub_plt_call_both:
10793 off = (stub_entry->stub_offset
10794 + stub_entry->group->stub_sec->output_offset
10795 + stub_entry->group->stub_sec->output_section->vma);
10796 if (stub_entry->stub_type == ppc_stub_plt_call_both)
10797 off += 4;
10798 targ = stub_entry->plt_ent->plt.offset & ~1;
10799 if (targ >= (bfd_vma) -2)
10800 abort ();
10801
10802 plt = htab->elf.splt;
10803 if (!htab->elf.dynamic_sections_created
10804 || stub_entry->h == NULL
10805 || stub_entry->h->elf.dynindx == -1)
10806 {
10807 if (stub_entry->symtype == STT_GNU_IFUNC)
10808 plt = htab->elf.iplt;
10809 else
10810 plt = htab->pltlocal;
10811 }
10812 targ += plt->output_offset + plt->output_section->vma;
10813 off = targ - off;
10814
10815 if (htab->params->plt_stub_align != 0)
10816 {
10817 unsigned pad = plt_stub_pad (htab, stub_entry, off);
10818
10819 stub_entry->group->stub_sec->size += pad;
10820 stub_entry->stub_offset = stub_entry->group->stub_sec->size;
10821 off -= pad;
10822 }
10823
10824 size = plt_stub_size (htab, stub_entry, off);
10825
10826 /* After the bcl, lr has been modified so we need to emit
10827 .eh_frame info saying the return address is in r12. */
10828 lr_used = stub_entry->stub_offset + 8;
10829 if (stub_entry->stub_type == ppc_stub_plt_call_both)
10830 lr_used += 4;
10831 /* The eh_frame info will consist of a DW_CFA_advance_loc or
10832 variant, DW_CFA_register, 65, 12, DW_CFA_advance_loc+2,
10833 DW_CFA_restore_extended 65. */
10834 delta = lr_used - stub_entry->group->lr_restore;
10835 stub_entry->group->eh_size += eh_advance_size (delta) + 6;
10836 stub_entry->group->lr_restore = lr_used + 8;
10837 break;
10838
10839 case ppc_stub_plt_call:
10840 case ppc_stub_plt_call_r2save:
10841 targ = stub_entry->plt_ent->plt.offset & ~(bfd_vma) 1;
10842 if (targ >= (bfd_vma) -2)
10843 abort ();
10844 plt = htab->elf.splt;
10845 if (!htab->elf.dynamic_sections_created
10846 || stub_entry->h == NULL
10847 || stub_entry->h->elf.dynindx == -1)
10848 {
10849 if (stub_entry->symtype == STT_GNU_IFUNC)
10850 plt = htab->elf.iplt;
10851 else
10852 plt = htab->pltlocal;
10853 }
10854 targ += plt->output_offset + plt->output_section->vma;
10855
10856 off = (elf_gp (info->output_bfd)
10857 + htab->sec_info[stub_entry->group->link_sec->id].toc_off);
10858 off = targ - off;
10859
10860 if (htab->params->plt_stub_align != 0)
10861 {
10862 unsigned pad = plt_stub_pad (htab, stub_entry, off);
10863
10864 stub_entry->group->stub_sec->size += pad;
10865 stub_entry->stub_offset = stub_entry->group->stub_sec->size;
10866 }
10867
10868 if (info->emitrelocations)
10869 {
10870 stub_entry->group->stub_sec->reloc_count
10871 += ((PPC_HA (off) != 0)
10872 + (htab->opd_abi
10873 ? 2 + (htab->params->plt_static_chain
10874 && PPC_HA (off + 16) == PPC_HA (off))
10875 : 1));
10876 stub_entry->group->stub_sec->flags |= SEC_RELOC;
10877 }
10878
10879 size = plt_stub_size (htab, stub_entry, off);
10880
10881 if (stub_entry->h != NULL
10882 && (stub_entry->h == htab->tls_get_addr_fd
10883 || stub_entry->h == htab->tls_get_addr)
10884 && htab->params->tls_get_addr_opt
10885 && stub_entry->stub_type == ppc_stub_plt_call_r2save)
10886 {
10887 /* After the bctrl, lr has been modified so we need to
10888 emit .eh_frame info saying the return address is
10889 on the stack. In fact we put the EH info specifying
10890 that the return address is on the stack *at* the
10891 call rather than after it, because the EH info for a
10892 call needs to be specified by that point.
10893 See libgcc/unwind-dw2.c execute_cfa_program. */
10894 lr_used = stub_entry->stub_offset + size - 20;
10895 /* The eh_frame info will consist of a DW_CFA_advance_loc
10896 or variant, DW_CFA_offset_externed_sf, 65, -stackoff,
10897 DW_CFA_advance_loc+4, DW_CFA_restore_extended, 65. */
10898 delta = lr_used - stub_entry->group->lr_restore;
10899 stub_entry->group->eh_size += eh_advance_size (delta) + 6;
10900 stub_entry->group->lr_restore = size - 4;
10901 }
10902 break;
10903
10904 default:
10905 BFD_FAIL ();
10906 return FALSE;
721956f4
AM
10907 }
10908
6f20ed8a 10909 stub_entry->group->stub_sec->size += size;
b34976b6 10910 return TRUE;
721956f4
AM
10911}
10912
10913/* Set up various things so that we can make a list of input sections
10914 for each output section included in the link. Returns -1 on error,
cedb70c5 10915 0 when no stubs will be needed, and 1 on success. */
721956f4
AM
10916
10917int
e7d1c40c 10918ppc64_elf_setup_section_lists (struct bfd_link_info *info)
721956f4 10919{
6f20ed8a 10920 unsigned int id;
721956f4
AM
10921 bfd_size_type amt;
10922 struct ppc_link_hash_table *htab = ppc_hash_table (info);
10923
4dfe6ac6
NC
10924 if (htab == NULL)
10925 return -1;
4c52953f 10926
7cf7fcc8 10927 htab->sec_info_arr_size = _bfd_section_id;
6f20ed8a
AM
10928 amt = sizeof (*htab->sec_info) * (htab->sec_info_arr_size);
10929 htab->sec_info = bfd_zmalloc (amt);
10930 if (htab->sec_info == NULL)
721956f4
AM
10931 return -1;
10932
3d6f9012
AM
10933 /* Set toc_off for com, und, abs and ind sections. */
10934 for (id = 0; id < 3; id++)
6f20ed8a 10935 htab->sec_info[id].toc_off = TOC_BASE_OFF;
734b6cf9 10936
721956f4
AM
10937 return 1;
10938}
10939
927be08e
AM
10940/* Set up for first pass at multitoc partitioning. */
10941
10942void
10943ppc64_elf_start_multitoc_partition (struct bfd_link_info *info)
10944{
10945 struct ppc_link_hash_table *htab = ppc_hash_table (info);
10946
1c865ab2 10947 htab->toc_curr = ppc64_elf_set_toc (info, info->output_bfd);
927be08e
AM
10948 htab->toc_bfd = NULL;
10949 htab->toc_first_sec = NULL;
10950}
10951
e717da7e
AM
10952/* The linker repeatedly calls this function for each TOC input section
10953 and linker generated GOT section. Group input bfds such that the toc
927be08e 10954 within a group is less than 64k in size. */
ad8e1ba5 10955
927be08e 10956bfd_boolean
4ce794b7 10957ppc64_elf_next_toc_section (struct bfd_link_info *info, asection *isec)
ad8e1ba5
AM
10958{
10959 struct ppc_link_hash_table *htab = ppc_hash_table (info);
d77c8a4b 10960 bfd_vma addr, off, limit;
ad8e1ba5 10961
4dfe6ac6
NC
10962 if (htab == NULL)
10963 return FALSE;
10964
927be08e 10965 if (!htab->second_toc_pass)
4c52953f 10966 {
927be08e 10967 /* Keep track of the first .toc or .got section for this input bfd. */
a4fd3de5
AM
10968 bfd_boolean new_bfd = htab->toc_bfd != isec->owner;
10969
10970 if (new_bfd)
bf102f86
AM
10971 {
10972 htab->toc_bfd = isec->owner;
10973 htab->toc_first_sec = isec;
10974 }
927be08e 10975
bf102f86
AM
10976 addr = isec->output_offset + isec->output_section->vma;
10977 off = addr - htab->toc_curr;
d77c8a4b
AM
10978 limit = 0x80008000;
10979 if (ppc64_elf_tdata (isec->owner)->has_small_toc_reloc)
10980 limit = 0x10000;
10981 if (off + isec->size > limit)
bf102f86
AM
10982 {
10983 addr = (htab->toc_first_sec->output_offset
10984 + htab->toc_first_sec->output_section->vma);
10985 htab->toc_curr = addr;
a27e685f 10986 htab->toc_curr &= -TOC_BASE_ALIGN;
bf102f86 10987 }
99877b66 10988
927be08e
AM
10989 /* toc_curr is the base address of this toc group. Set elf_gp
10990 for the input section to be the offset relative to the
10991 output toc base plus 0x8000. Making the input elf_gp an
10992 offset allows us to move the toc as a whole without
10993 recalculating input elf_gp. */
06bcf541 10994 off = htab->toc_curr - elf_gp (info->output_bfd);
927be08e
AM
10995 off += TOC_BASE_OFF;
10996
10997 /* Die if someone uses a linker script that doesn't keep input
10998 file .toc and .got together. */
a4fd3de5
AM
10999 if (new_bfd
11000 && elf_gp (isec->owner) != 0
927be08e
AM
11001 && elf_gp (isec->owner) != off)
11002 return FALSE;
11003
11004 elf_gp (isec->owner) = off;
11005 return TRUE;
4c52953f 11006 }
927be08e
AM
11007
11008 /* During the second pass toc_first_sec points to the start of
11009 a toc group, and toc_curr is used to track the old elf_gp.
11010 We use toc_bfd to ensure we only look at each bfd once. */
11011 if (htab->toc_bfd == isec->owner)
11012 return TRUE;
11013 htab->toc_bfd = isec->owner;
11014
11015 if (htab->toc_first_sec == NULL
11016 || htab->toc_curr != elf_gp (isec->owner))
11017 {
11018 htab->toc_curr = elf_gp (isec->owner);
11019 htab->toc_first_sec = isec;
11020 }
11021 addr = (htab->toc_first_sec->output_offset
11022 + htab->toc_first_sec->output_section->vma);
06bcf541 11023 off = addr - elf_gp (info->output_bfd) + TOC_BASE_OFF;
927be08e
AM
11024 elf_gp (isec->owner) = off;
11025
11026 return TRUE;
ad8e1ba5
AM
11027}
11028
927be08e
AM
11029/* Called via elf_link_hash_traverse to merge GOT entries for global
11030 symbol H. */
11031
11032static bfd_boolean
11033merge_global_got (struct elf_link_hash_entry *h, void *inf ATTRIBUTE_UNUSED)
11034{
11035 if (h->root.type == bfd_link_hash_indirect)
11036 return TRUE;
11037
927be08e
AM
11038 merge_got_entries (&h->got.glist);
11039
11040 return TRUE;
11041}
11042
11043/* Called via elf_link_hash_traverse to allocate GOT entries for global
11044 symbol H. */
11045
11046static bfd_boolean
11047reallocate_got (struct elf_link_hash_entry *h, void *inf)
11048{
11049 struct got_entry *gent;
11050
11051 if (h->root.type == bfd_link_hash_indirect)
11052 return TRUE;
11053
927be08e
AM
11054 for (gent = h->got.glist; gent != NULL; gent = gent->next)
11055 if (!gent->is_indirect)
11056 allocate_got (h, (struct bfd_link_info *) inf, gent);
11057 return TRUE;
11058}
11059
11060/* Called on the first multitoc pass after the last call to
11061 ppc64_elf_next_toc_section. This function removes duplicate GOT
11062 entries. */
11063
11064bfd_boolean
11065ppc64_elf_layout_multitoc (struct bfd_link_info *info)
ad8e1ba5
AM
11066{
11067 struct ppc_link_hash_table *htab = ppc_hash_table (info);
927be08e
AM
11068 struct bfd *ibfd, *ibfd2;
11069 bfd_boolean done_something;
11070
11071 htab->multi_toc_needed = htab->toc_curr != elf_gp (info->output_bfd);
ad8e1ba5 11072
7865406b
AM
11073 if (!htab->do_multi_toc)
11074 return FALSE;
11075
d0fae19d 11076 /* Merge global sym got entries within a toc group. */
927be08e
AM
11077 elf_link_hash_traverse (&htab->elf, merge_global_got, info);
11078
11079 /* And tlsld_got. */
c72f2fb2 11080 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
927be08e
AM
11081 {
11082 struct got_entry *ent, *ent2;
11083
11084 if (!is_ppc64_elf (ibfd))
11085 continue;
11086
11087 ent = ppc64_tlsld_got (ibfd);
11088 if (!ent->is_indirect
11089 && ent->got.offset != (bfd_vma) -1)
11090 {
c72f2fb2 11091 for (ibfd2 = ibfd->link.next; ibfd2 != NULL; ibfd2 = ibfd2->link.next)
927be08e
AM
11092 {
11093 if (!is_ppc64_elf (ibfd2))
11094 continue;
11095
11096 ent2 = ppc64_tlsld_got (ibfd2);
11097 if (!ent2->is_indirect
11098 && ent2->got.offset != (bfd_vma) -1
11099 && elf_gp (ibfd2) == elf_gp (ibfd))
11100 {
11101 ent2->is_indirect = TRUE;
11102 ent2->got.ent = ent;
11103 }
11104 }
11105 }
11106 }
11107
11108 /* Zap sizes of got sections. */
33e44f2e
AM
11109 htab->elf.irelplt->rawsize = htab->elf.irelplt->size;
11110 htab->elf.irelplt->size -= htab->got_reli_size;
927be08e
AM
11111 htab->got_reli_size = 0;
11112
c72f2fb2 11113 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
927be08e
AM
11114 {
11115 asection *got, *relgot;
11116
11117 if (!is_ppc64_elf (ibfd))
11118 continue;
11119
11120 got = ppc64_elf_tdata (ibfd)->got;
11121 if (got != NULL)
11122 {
11123 got->rawsize = got->size;
11124 got->size = 0;
11125 relgot = ppc64_elf_tdata (ibfd)->relgot;
11126 relgot->rawsize = relgot->size;
11127 relgot->size = 0;
11128 }
11129 }
11130
11131 /* Now reallocate the got, local syms first. We don't need to
11132 allocate section contents again since we never increase size. */
c72f2fb2 11133 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
927be08e
AM
11134 {
11135 struct got_entry **lgot_ents;
11136 struct got_entry **end_lgot_ents;
11137 struct plt_entry **local_plt;
11138 struct plt_entry **end_local_plt;
f961d9dd 11139 unsigned char *lgot_masks;
927be08e
AM
11140 bfd_size_type locsymcount;
11141 Elf_Internal_Shdr *symtab_hdr;
19e08130 11142 asection *s;
927be08e
AM
11143
11144 if (!is_ppc64_elf (ibfd))
11145 continue;
11146
11147 lgot_ents = elf_local_got_ents (ibfd);
11148 if (!lgot_ents)
11149 continue;
11150
11151 symtab_hdr = &elf_symtab_hdr (ibfd);
11152 locsymcount = symtab_hdr->sh_info;
11153 end_lgot_ents = lgot_ents + locsymcount;
11154 local_plt = (struct plt_entry **) end_lgot_ents;
11155 end_local_plt = local_plt + locsymcount;
f961d9dd 11156 lgot_masks = (unsigned char *) end_local_plt;
927be08e 11157 s = ppc64_elf_tdata (ibfd)->got;
927be08e
AM
11158 for (; lgot_ents < end_lgot_ents; ++lgot_ents, ++lgot_masks)
11159 {
11160 struct got_entry *ent;
11161
11162 for (ent = *lgot_ents; ent != NULL; ent = ent->next)
d0fae19d 11163 {
19e08130
AM
11164 unsigned int ent_size = 8;
11165 unsigned int rel_size = sizeof (Elf64_External_Rela);
11166
d0fae19d
AM
11167 ent->got.offset = s->size;
11168 if ((ent->tls_type & *lgot_masks & TLS_GD) != 0)
d0fae19d 11169 {
19e08130
AM
11170 ent_size *= 2;
11171 rel_size *= 2;
11172 }
11173 s->size += ent_size;
37da22e5 11174 if ((*lgot_masks & (TLS_TLS | PLT_IFUNC)) == PLT_IFUNC)
19e08130 11175 {
33e44f2e 11176 htab->elf.irelplt->size += rel_size;
19e08130
AM
11177 htab->got_reli_size += rel_size;
11178 }
6a3858a6
AM
11179 else if (bfd_link_pic (info)
11180 && !((ent->tls_type & TLS_TPREL) != 0
11181 && bfd_link_executable (info)))
19e08130
AM
11182 {
11183 asection *srel = ppc64_elf_tdata (ibfd)->relgot;
11184 srel->size += rel_size;
d0fae19d
AM
11185 }
11186 }
927be08e
AM
11187 }
11188 }
11189
11190 elf_link_hash_traverse (&htab->elf, reallocate_got, info);
11191
c72f2fb2 11192 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
927be08e
AM
11193 {
11194 struct got_entry *ent;
11195
11196 if (!is_ppc64_elf (ibfd))
11197 continue;
11198
11199 ent = ppc64_tlsld_got (ibfd);
11200 if (!ent->is_indirect
11201 && ent->got.offset != (bfd_vma) -1)
11202 {
11203 asection *s = ppc64_elf_tdata (ibfd)->got;
11204 ent->got.offset = s->size;
11205 s->size += 16;
0e1862bb 11206 if (bfd_link_pic (info))
927be08e
AM
11207 {
11208 asection *srel = ppc64_elf_tdata (ibfd)->relgot;
11209 srel->size += sizeof (Elf64_External_Rela);
11210 }
11211 }
11212 }
11213
33e44f2e 11214 done_something = htab->elf.irelplt->rawsize != htab->elf.irelplt->size;
927be08e 11215 if (!done_something)
c72f2fb2 11216 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
927be08e
AM
11217 {
11218 asection *got;
11219
11220 if (!is_ppc64_elf (ibfd))
11221 continue;
11222
11223 got = ppc64_elf_tdata (ibfd)->got;
11224 if (got != NULL)
11225 {
11226 done_something = got->rawsize != got->size;
11227 if (done_something)
11228 break;
11229 }
11230 }
11231
11232 if (done_something)
e7d1c40c 11233 (*htab->params->layout_sections_again) ();
927be08e
AM
11234
11235 /* Set up for second pass over toc sections to recalculate elf_gp
11236 on input sections. */
11237 htab->toc_bfd = NULL;
11238 htab->toc_first_sec = NULL;
11239 htab->second_toc_pass = TRUE;
11240 return done_something;
11241}
11242
11243/* Called after second pass of multitoc partitioning. */
11244
11245void
11246ppc64_elf_finish_multitoc_partition (struct bfd_link_info *info)
11247{
11248 struct ppc_link_hash_table *htab = ppc_hash_table (info);
11249
11250 /* After the second pass, toc_curr tracks the TOC offset used
11251 for code sections below in ppc64_elf_next_input_section. */
3d6f9012 11252 htab->toc_curr = TOC_BASE_OFF;
ad8e1ba5
AM
11253}
11254
9b5ecbd0
AM
11255/* No toc references were found in ISEC. If the code in ISEC makes no
11256 calls, then there's no need to use toc adjusting stubs when branching
11257 into ISEC. Actually, indirect calls from ISEC are OK as they will
4c52953f
AM
11258 load r2. Returns -1 on error, 0 for no stub needed, 1 for stub
11259 needed, and 2 if a cyclical call-graph was found but no other reason
11260 for a stub was detected. If called from the top level, a return of
11261 2 means the same as a return of 0. */
9b5ecbd0
AM
11262
11263static int
4ce794b7 11264toc_adjusting_stub_needed (struct bfd_link_info *info, asection *isec)
9b5ecbd0 11265{
9b5ecbd0 11266 int ret;
70cc837d
AM
11267
11268 /* Mark this section as checked. */
11269 isec->call_check_done = 1;
9b5ecbd0 11270
772119ce
AM
11271 /* We know none of our code bearing sections will need toc stubs. */
11272 if ((isec->flags & SEC_LINKER_CREATED) != 0)
11273 return 0;
11274
eea6121a 11275 if (isec->size == 0)
082c50f8
AM
11276 return 0;
11277
4c52953f
AM
11278 if (isec->output_section == NULL)
11279 return 0;
11280
4c52953f 11281 ret = 0;
70cc837d 11282 if (isec->reloc_count != 0)
9b5ecbd0 11283 {
70cc837d
AM
11284 Elf_Internal_Rela *relstart, *rel;
11285 Elf_Internal_Sym *local_syms;
11286 struct ppc_link_hash_table *htab;
2917689a 11287
70cc837d
AM
11288 relstart = _bfd_elf_link_read_relocs (isec->owner, isec, NULL, NULL,
11289 info->keep_memory);
11290 if (relstart == NULL)
11291 return -1;
90aecf7a 11292
70cc837d
AM
11293 /* Look for branches to outside of this section. */
11294 local_syms = NULL;
11295 htab = ppc_hash_table (info);
11296 if (htab == NULL)
11297 return -1;
4c52953f 11298
70cc837d 11299 for (rel = relstart; rel < relstart + isec->reloc_count; ++rel)
4c52953f 11300 {
70cc837d
AM
11301 enum elf_ppc64_reloc_type r_type;
11302 unsigned long r_symndx;
11303 struct elf_link_hash_entry *h;
11304 struct ppc_link_hash_entry *eh;
11305 Elf_Internal_Sym *sym;
11306 asection *sym_sec;
11307 struct _opd_sec_data *opd;
11308 bfd_vma sym_value;
11309 bfd_vma dest;
11310
11311 r_type = ELF64_R_TYPE (rel->r_info);
11312 if (r_type != R_PPC64_REL24
05d0e962 11313 && r_type != R_PPC64_REL24_NOTOC
70cc837d
AM
11314 && r_type != R_PPC64_REL14
11315 && r_type != R_PPC64_REL14_BRTAKEN
23cedd1d
AM
11316 && r_type != R_PPC64_REL14_BRNTAKEN
11317 && r_type != R_PPC64_PLTCALL)
70cc837d 11318 continue;
4c52953f 11319
70cc837d
AM
11320 r_symndx = ELF64_R_SYM (rel->r_info);
11321 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms, r_symndx,
11322 isec->owner))
4c52953f 11323 {
70cc837d
AM
11324 ret = -1;
11325 break;
11326 }
4c52953f 11327
70cc837d
AM
11328 /* Calls to dynamic lib functions go through a plt call stub
11329 that uses r2. */
11330 eh = (struct ppc_link_hash_entry *) h;
11331 if (eh != NULL
11332 && (eh->elf.plt.plist != NULL
11333 || (eh->oh != NULL
11334 && ppc_follow_link (eh->oh)->elf.plt.plist != NULL)))
11335 {
11336 ret = 1;
11337 break;
4c52953f
AM
11338 }
11339
70cc837d
AM
11340 if (sym_sec == NULL)
11341 /* Ignore other undefined symbols. */
4c52953f 11342 continue;
4c52953f 11343
70cc837d
AM
11344 /* Assume branches to other sections not included in the
11345 link need stubs too, to cover -R and absolute syms. */
11346 if (sym_sec->output_section == NULL)
11347 {
11348 ret = 1;
11349 break;
11350 }
4c52953f 11351
70cc837d
AM
11352 if (h == NULL)
11353 sym_value = sym->st_value;
11354 else
11355 {
11356 if (h->root.type != bfd_link_hash_defined
11357 && h->root.type != bfd_link_hash_defweak)
11358 abort ();
11359 sym_value = h->root.u.def.value;
11360 }
11361 sym_value += rel->r_addend;
4c52953f 11362
70cc837d
AM
11363 /* If this branch reloc uses an opd sym, find the code section. */
11364 opd = get_opd_info (sym_sec);
11365 if (opd != NULL)
11366 {
11367 if (h == NULL && opd->adjust != NULL)
11368 {
11369 long adjust;
4c52953f 11370
92a9c616 11371 adjust = opd->adjust[OPD_NDX (sym_value)];
70cc837d
AM
11372 if (adjust == -1)
11373 /* Assume deleted functions won't ever be called. */
11374 continue;
11375 sym_value += adjust;
11376 }
4c52953f 11377
aef36ac1
AM
11378 dest = opd_entry_value (sym_sec, sym_value,
11379 &sym_sec, NULL, FALSE);
70cc837d
AM
11380 if (dest == (bfd_vma) -1)
11381 continue;
11382 }
11383 else
11384 dest = (sym_value
11385 + sym_sec->output_offset
11386 + sym_sec->output_section->vma);
4c52953f 11387
70cc837d
AM
11388 /* Ignore branch to self. */
11389 if (sym_sec == isec)
11390 continue;
4c52953f 11391
70cc837d
AM
11392 /* If the called function uses the toc, we need a stub. */
11393 if (sym_sec->has_toc_reloc
11394 || sym_sec->makes_toc_func_call)
4c52953f 11395 {
70cc837d 11396 ret = 1;
4c52953f
AM
11397 break;
11398 }
70cc837d
AM
11399
11400 /* Assume any branch that needs a long branch stub might in fact
11401 need a plt_branch stub. A plt_branch stub uses r2. */
11402 else if (dest - (isec->output_offset
11403 + isec->output_section->vma
6911b7dc
AM
11404 + rel->r_offset) + (1 << 25)
11405 >= (2u << 25) - PPC64_LOCAL_ENTRY_OFFSET (h
11406 ? h->other
11407 : sym->st_other))
4c52953f 11408 {
70cc837d
AM
11409 ret = 1;
11410 break;
11411 }
11412
11413 /* If calling back to a section in the process of being
11414 tested, we can't say for sure that no toc adjusting stubs
11415 are needed, so don't return zero. */
11416 else if (sym_sec->call_check_in_progress)
11417 ret = 2;
11418
11419 /* Branches to another section that itself doesn't have any TOC
11420 references are OK. Recursively call ourselves to check. */
11421 else if (!sym_sec->call_check_done)
11422 {
11423 int recur;
11424
11425 /* Mark current section as indeterminate, so that other
11426 sections that call back to current won't be marked as
11427 known. */
11428 isec->call_check_in_progress = 1;
11429 recur = toc_adjusting_stub_needed (info, sym_sec);
11430 isec->call_check_in_progress = 0;
11431
4c52953f
AM
11432 if (recur != 0)
11433 {
70cc837d
AM
11434 ret = recur;
11435 if (recur != 2)
11436 break;
4c52953f
AM
11437 }
11438 }
4c52953f 11439 }
70cc837d
AM
11440
11441 if (local_syms != NULL
11442 && (elf_symtab_hdr (isec->owner).contents
11443 != (unsigned char *) local_syms))
11444 free (local_syms);
11445 if (elf_section_data (isec)->relocs != relstart)
11446 free (relstart);
9b5ecbd0
AM
11447 }
11448
70cc837d
AM
11449 if ((ret & 1) == 0
11450 && isec->map_head.s != NULL
11451 && (strcmp (isec->output_section->name, ".init") == 0
11452 || strcmp (isec->output_section->name, ".fini") == 0))
11453 {
11454 if (isec->map_head.s->has_toc_reloc
11455 || isec->map_head.s->makes_toc_func_call)
11456 ret = 1;
11457 else if (!isec->map_head.s->call_check_done)
11458 {
11459 int recur;
11460 isec->call_check_in_progress = 1;
11461 recur = toc_adjusting_stub_needed (info, isec->map_head.s);
11462 isec->call_check_in_progress = 0;
11463 if (recur != 0)
11464 ret = recur;
11465 }
11466 }
11467
11468 if (ret == 1)
11469 isec->makes_toc_func_call = 1;
4c52953f 11470
9b5ecbd0
AM
11471 return ret;
11472}
11473
721956f4
AM
11474/* The linker repeatedly calls this function for each input section,
11475 in the order that input sections are linked into output sections.
11476 Build lists of input sections to determine groupings between which
11477 we may insert linker stubs. */
11478
9b5ecbd0 11479bfd_boolean
4ce794b7 11480ppc64_elf_next_input_section (struct bfd_link_info *info, asection *isec)
721956f4
AM
11481{
11482 struct ppc_link_hash_table *htab = ppc_hash_table (info);
11483
4dfe6ac6
NC
11484 if (htab == NULL)
11485 return FALSE;
11486
734b6cf9 11487 if ((isec->output_section->flags & SEC_CODE) != 0
6f20ed8a 11488 && isec->output_section->id < htab->sec_info_arr_size)
721956f4 11489 {
3d6f9012
AM
11490 /* This happens to make the list in reverse order,
11491 which is what we want. */
6f20ed8a
AM
11492 htab->sec_info[isec->id].u.list
11493 = htab->sec_info[isec->output_section->id].u.list;
11494 htab->sec_info[isec->output_section->id].u.list = isec;
721956f4 11495 }
ad8e1ba5 11496
4c52953f 11497 if (htab->multi_toc_needed)
9b5ecbd0 11498 {
8b974ba3
AM
11499 /* Analyse sections that aren't already flagged as needing a
11500 valid toc pointer. Exclude .fixup for the linux kernel.
11501 .fixup contains branches, but only back to the function that
11502 hit an exception. */
11503 if (!(isec->has_toc_reloc
11504 || (isec->flags & SEC_CODE) == 0
11505 || strcmp (isec->name, ".fixup") == 0
11506 || isec->call_check_done))
11507 {
11508 if (toc_adjusting_stub_needed (info, isec) < 0)
6683a28d 11509 return FALSE;
8b974ba3
AM
11510 }
11511 /* Make all sections use the TOC assigned for this object file.
11512 This will be wrong for pasted sections; We fix that in
11513 check_pasted_section(). */
11514 if (elf_gp (isec->owner) != 0)
11515 htab->toc_curr = elf_gp (isec->owner);
11516 }
11517
6f20ed8a 11518 htab->sec_info[isec->id].toc_off = htab->toc_curr;
9b5ecbd0 11519 return TRUE;
721956f4
AM
11520}
11521
70cc837d
AM
11522/* Check that all .init and .fini sections use the same toc, if they
11523 have toc relocs. */
11524
11525static bfd_boolean
11526check_pasted_section (struct bfd_link_info *info, const char *name)
11527{
11528 asection *o = bfd_get_section_by_name (info->output_bfd, name);
11529
11530 if (o != NULL)
11531 {
11532 struct ppc_link_hash_table *htab = ppc_hash_table (info);
11533 bfd_vma toc_off = 0;
11534 asection *i;
11535
11536 for (i = o->map_head.s; i != NULL; i = i->map_head.s)
11537 if (i->has_toc_reloc)
11538 {
11539 if (toc_off == 0)
6f20ed8a
AM
11540 toc_off = htab->sec_info[i->id].toc_off;
11541 else if (toc_off != htab->sec_info[i->id].toc_off)
70cc837d
AM
11542 return FALSE;
11543 }
6683a28d
AM
11544
11545 if (toc_off == 0)
11546 for (i = o->map_head.s; i != NULL; i = i->map_head.s)
11547 if (i->makes_toc_func_call)
11548 {
6f20ed8a 11549 toc_off = htab->sec_info[i->id].toc_off;
6683a28d
AM
11550 break;
11551 }
11552
70cc837d
AM
11553 /* Make sure the whole pasted function uses the same toc offset. */
11554 if (toc_off != 0)
11555 for (i = o->map_head.s; i != NULL; i = i->map_head.s)
6f20ed8a 11556 htab->sec_info[i->id].toc_off = toc_off;
70cc837d
AM
11557 }
11558 return TRUE;
11559}
11560
11561bfd_boolean
11562ppc64_elf_check_init_fini (struct bfd_link_info *info)
11563{
11564 return (check_pasted_section (info, ".init")
11565 & check_pasted_section (info, ".fini"));
11566}
11567
721956f4
AM
11568/* See whether we can group stub sections together. Grouping stub
11569 sections may result in fewer stubs. More importantly, we need to
11570 put all .init* and .fini* stubs at the beginning of the .init or
11571 .fini output sections respectively, because glibc splits the
11572 _init and _fini functions into multiple parts. Putting a stub in
11573 the middle of a function is not a good idea. */
11574
6f20ed8a
AM
11575static bfd_boolean
11576group_sections (struct bfd_link_info *info,
4ce794b7
AM
11577 bfd_size_type stub_group_size,
11578 bfd_boolean stubs_always_before_branch)
721956f4 11579{
6f20ed8a
AM
11580 struct ppc_link_hash_table *htab;
11581 asection *osec;
7c8fe5c4
AM
11582 bfd_boolean suppress_size_errors;
11583
6f20ed8a
AM
11584 htab = ppc_hash_table (info);
11585 if (htab == NULL)
11586 return FALSE;
11587
7c8fe5c4 11588 suppress_size_errors = FALSE;
7c8fe5c4
AM
11589 if (stub_group_size == 1)
11590 {
11591 /* Default values. */
11592 if (stubs_always_before_branch)
09f92717 11593 stub_group_size = 0x1e00000;
7c8fe5c4 11594 else
09f92717 11595 stub_group_size = 0x1c00000;
7c8fe5c4
AM
11596 suppress_size_errors = TRUE;
11597 }
11598
6f20ed8a 11599 for (osec = info->output_bfd->sections; osec != NULL; osec = osec->next)
721956f4 11600 {
6f20ed8a
AM
11601 asection *tail;
11602
11603 if (osec->id >= htab->sec_info_arr_size)
11604 continue;
11605
11606 tail = htab->sec_info[osec->id].u.list;
734b6cf9 11607 while (tail != NULL)
721956f4 11608 {
734b6cf9
AM
11609 asection *curr;
11610 asection *prev;
11611 bfd_size_type total;
11612 bfd_boolean big_sec;
11613 bfd_vma curr_toc;
6f20ed8a 11614 struct map_stub *group;
09f92717 11615 bfd_size_type group_size;
734b6cf9
AM
11616
11617 curr = tail;
eea6121a 11618 total = tail->size;
09f92717
AM
11619 group_size = (ppc64_elf_section_data (tail) != NULL
11620 && ppc64_elf_section_data (tail)->has_14bit_branch
11621 ? stub_group_size >> 10 : stub_group_size);
11622
11623 big_sec = total > group_size;
7c8fe5c4 11624 if (big_sec && !suppress_size_errors)
695344c0 11625 /* xgettext:c-format */
871b3ab2 11626 _bfd_error_handler (_("%pB section %pA exceeds stub group size"),
4eca0228 11627 tail->owner, tail);
6f20ed8a 11628 curr_toc = htab->sec_info[tail->id].toc_off;
734b6cf9 11629
6f20ed8a 11630 while ((prev = htab->sec_info[curr->id].u.list) != NULL
734b6cf9 11631 && ((total += curr->output_offset - prev->output_offset)
6bee8834
AM
11632 < (ppc64_elf_section_data (prev) != NULL
11633 && ppc64_elf_section_data (prev)->has_14bit_branch
09f92717 11634 ? (group_size = stub_group_size >> 10) : group_size))
6f20ed8a 11635 && htab->sec_info[prev->id].toc_off == curr_toc)
734b6cf9
AM
11636 curr = prev;
11637
11638 /* OK, the size from the start of CURR to the end is less
09f92717 11639 than group_size and thus can be handled by one stub
734b6cf9 11640 section. (or the tail section is itself larger than
09f92717
AM
11641 group_size, in which case we may be toast.) We should
11642 really be keeping track of the total size of stubs added
11643 here, as stubs contribute to the final output section
11644 size. That's a little tricky, and this way will only
11645 break if stubs added make the total size more than 2^25,
11646 ie. for the default stub_group_size, if stubs total more
11647 than 2097152 bytes, or nearly 75000 plt call stubs. */
6f20ed8a
AM
11648 group = bfd_alloc (curr->owner, sizeof (*group));
11649 if (group == NULL)
11650 return FALSE;
11651 group->link_sec = curr;
11652 group->stub_sec = NULL;
a4b6fadd 11653 group->needs_save_res = 0;
df136d64
AM
11654 group->lr_restore = 0;
11655 group->eh_size = 0;
11656 group->eh_base = 0;
a4b6fadd
AM
11657 group->next = htab->group;
11658 htab->group = group;
734b6cf9 11659 do
721956f4 11660 {
6f20ed8a 11661 prev = htab->sec_info[tail->id].u.list;
734b6cf9 11662 /* Set up this stub group. */
6f20ed8a 11663 htab->sec_info[tail->id].u.group = group;
721956f4 11664 }
734b6cf9
AM
11665 while (tail != curr && (tail = prev) != NULL);
11666
09f92717 11667 /* But wait, there's more! Input sections up to group_size
734b6cf9
AM
11668 bytes before the stub section can be handled by it too.
11669 Don't do this if we have a really large section after the
11670 stubs, as adding more stubs increases the chance that
11671 branches may not reach into the stub section. */
11672 if (!stubs_always_before_branch && !big_sec)
11673 {
11674 total = 0;
11675 while (prev != NULL
11676 && ((total += tail->output_offset - prev->output_offset)
6bee8834
AM
11677 < (ppc64_elf_section_data (prev) != NULL
11678 && ppc64_elf_section_data (prev)->has_14bit_branch
2cdcc330
AM
11679 ? (group_size = stub_group_size >> 10)
11680 : group_size))
6f20ed8a 11681 && htab->sec_info[prev->id].toc_off == curr_toc)
734b6cf9
AM
11682 {
11683 tail = prev;
6f20ed8a
AM
11684 prev = htab->sec_info[tail->id].u.list;
11685 htab->sec_info[tail->id].u.group = group;
734b6cf9
AM
11686 }
11687 }
11688 tail = prev;
721956f4
AM
11689 }
11690 }
6f20ed8a 11691 return TRUE;
721956f4
AM
11692}
11693
58d180e8
AM
11694static const unsigned char glink_eh_frame_cie[] =
11695{
11696 0, 0, 0, 16, /* length. */
11697 0, 0, 0, 0, /* id. */
11698 1, /* CIE version. */
11699 'z', 'R', 0, /* Augmentation string. */
11700 4, /* Code alignment. */
11701 0x78, /* Data alignment. */
11702 65, /* RA reg. */
11703 1, /* Augmentation size. */
11704 DW_EH_PE_pcrel | DW_EH_PE_sdata4, /* FDE encoding. */
2e0ce1c8 11705 DW_CFA_def_cfa, 1, 0 /* def_cfa: r1 offset 0. */
58d180e8
AM
11706};
11707
d969d15f
AM
11708/* Stripping output sections is normally done before dynamic section
11709 symbols have been allocated. This function is called later, and
11710 handles cases like htab->brlt which is mapped to its own output
11711 section. */
11712
11713static void
11714maybe_strip_output (struct bfd_link_info *info, asection *isec)
11715{
11716 if (isec->size == 0
11717 && isec->output_section->size == 0
53d8967a 11718 && !(isec->output_section->flags & SEC_KEEP)
d969d15f
AM
11719 && !bfd_section_removed_from_list (info->output_bfd,
11720 isec->output_section)
11721 && elf_section_data (isec->output_section)->dynindx == 0)
11722 {
11723 isec->output_section->flags |= SEC_EXCLUDE;
11724 bfd_section_list_remove (info->output_bfd, isec->output_section);
11725 info->output_bfd->section_count--;
11726 }
11727}
11728
721956f4
AM
11729/* Determine and set the size of the stub section for a final link.
11730
11731 The basic idea here is to examine all the relocations looking for
11732 PC-relative calls to a target that is unreachable with a "bl"
11733 instruction. */
11734
b34976b6 11735bfd_boolean
e7d1c40c 11736ppc64_elf_size_stubs (struct bfd_link_info *info)
721956f4
AM
11737{
11738 bfd_size_type stub_group_size;
b34976b6 11739 bfd_boolean stubs_always_before_branch;
721956f4
AM
11740 struct ppc_link_hash_table *htab = ppc_hash_table (info);
11741
4dfe6ac6
NC
11742 if (htab == NULL)
11743 return FALSE;
11744
0e1862bb 11745 if (htab->params->plt_thread_safe == -1 && !bfd_link_executable (info))
e7d1c40c 11746 htab->params->plt_thread_safe = 1;
b9e5796b 11747 if (!htab->opd_abi)
e7d1c40c
AM
11748 htab->params->plt_thread_safe = 0;
11749 else if (htab->params->plt_thread_safe == -1)
794e51c0 11750 {
e2458743 11751 static const char *const thread_starter[] =
794e51c0
AM
11752 {
11753 "pthread_create",
11754 /* libstdc++ */
11755 "_ZNSt6thread15_M_start_threadESt10shared_ptrINS_10_Impl_baseEE",
11756 /* librt */
11757 "aio_init", "aio_read", "aio_write", "aio_fsync", "lio_listio",
11758 "mq_notify", "create_timer",
11759 /* libanl */
11760 "getaddrinfo_a",
11761 /* libgomp */
2300b5a1 11762 "GOMP_parallel",
794e51c0 11763 "GOMP_parallel_start",
2300b5a1 11764 "GOMP_parallel_loop_static",
794e51c0 11765 "GOMP_parallel_loop_static_start",
2300b5a1 11766 "GOMP_parallel_loop_dynamic",
794e51c0 11767 "GOMP_parallel_loop_dynamic_start",
2300b5a1 11768 "GOMP_parallel_loop_guided",
794e51c0 11769 "GOMP_parallel_loop_guided_start",
2300b5a1 11770 "GOMP_parallel_loop_runtime",
794e51c0 11771 "GOMP_parallel_loop_runtime_start",
2300b5a1 11772 "GOMP_parallel_sections",
68ffbac6 11773 "GOMP_parallel_sections_start",
f9dffbf0
AM
11774 /* libgo */
11775 "__go_go",
794e51c0
AM
11776 };
11777 unsigned i;
11778
a4b6fadd 11779 for (i = 0; i < ARRAY_SIZE (thread_starter); i++)
794e51c0
AM
11780 {
11781 struct elf_link_hash_entry *h;
11782 h = elf_link_hash_lookup (&htab->elf, thread_starter[i],
11783 FALSE, FALSE, TRUE);
e7d1c40c
AM
11784 htab->params->plt_thread_safe = h != NULL && h->ref_regular;
11785 if (htab->params->plt_thread_safe)
794e51c0
AM
11786 break;
11787 }
11788 }
e7d1c40c
AM
11789 stubs_always_before_branch = htab->params->group_size < 0;
11790 if (htab->params->group_size < 0)
11791 stub_group_size = -htab->params->group_size;
721956f4 11792 else
e7d1c40c 11793 stub_group_size = htab->params->group_size;
721956f4 11794
6f20ed8a
AM
11795 if (!group_sections (info, stub_group_size, stubs_always_before_branch))
11796 return FALSE;
721956f4 11797
c9301e31
AM
11798#define STUB_SHRINK_ITER 20
11799 /* Loop until no stubs added. After iteration 20 of this loop we may
11800 exit on a stub section shrinking. This is to break out of a
11801 pathological case where adding stubs on one iteration decreases
11802 section gaps (perhaps due to alignment), which then requires
11803 fewer or smaller stubs on the next iteration. */
11804
721956f4
AM
11805 while (1)
11806 {
11807 bfd *input_bfd;
11808 unsigned int bfd_indx;
a4b6fadd 11809 struct map_stub *group;
721956f4
AM
11810
11811 htab->stub_iteration += 1;
721956f4
AM
11812
11813 for (input_bfd = info->input_bfds, bfd_indx = 0;
11814 input_bfd != NULL;
c72f2fb2 11815 input_bfd = input_bfd->link.next, bfd_indx++)
721956f4
AM
11816 {
11817 Elf_Internal_Shdr *symtab_hdr;
11818 asection *section;
6cdc0ccc 11819 Elf_Internal_Sym *local_syms = NULL;
721956f4 11820
0c8d6e5c 11821 if (!is_ppc64_elf (input_bfd))
67f93c31
AM
11822 continue;
11823
721956f4 11824 /* We'll need the symbol table in a second. */
0ffa91dd 11825 symtab_hdr = &elf_symtab_hdr (input_bfd);
721956f4
AM
11826 if (symtab_hdr->sh_info == 0)
11827 continue;
11828
721956f4
AM
11829 /* Walk over each section attached to the input bfd. */
11830 for (section = input_bfd->sections;
11831 section != NULL;
11832 section = section->next)
11833 {
721956f4 11834 Elf_Internal_Rela *internal_relocs, *irelaend, *irela;
721956f4
AM
11835
11836 /* If there aren't any relocs, then there's nothing more
11837 to do. */
11838 if ((section->flags & SEC_RELOC) == 0
12c0f757
AM
11839 || (section->flags & SEC_ALLOC) == 0
11840 || (section->flags & SEC_LOAD) == 0
11841 || (section->flags & SEC_CODE) == 0
721956f4
AM
11842 || section->reloc_count == 0)
11843 continue;
11844
11845 /* If this section is a link-once section that will be
11846 discarded, then don't create any stubs. */
11847 if (section->output_section == NULL
927be08e 11848 || section->output_section->owner != info->output_bfd)
721956f4
AM
11849 continue;
11850
1e2f5b6e
AM
11851 /* Get the relocs. */
11852 internal_relocs
4ce794b7 11853 = _bfd_elf_link_read_relocs (input_bfd, section, NULL, NULL,
45d6a902 11854 info->keep_memory);
721956f4 11855 if (internal_relocs == NULL)
1e2f5b6e 11856 goto error_ret_free_local;
721956f4
AM
11857
11858 /* Now examine each relocation. */
11859 irela = internal_relocs;
11860 irelaend = irela + section->reloc_count;
11861 for (; irela < irelaend; irela++)
11862 {
4ce794b7
AM
11863 enum elf_ppc64_reloc_type r_type;
11864 unsigned int r_indx;
721956f4
AM
11865 enum ppc_stub_type stub_type;
11866 struct ppc_stub_hash_entry *stub_entry;
8387904d 11867 asection *sym_sec, *code_sec;
e054468f 11868 bfd_vma sym_value, code_value;
721956f4 11869 bfd_vma destination;
6911b7dc 11870 unsigned long local_off;
8843416a 11871 bfd_boolean ok_dest;
721956f4 11872 struct ppc_link_hash_entry *hash;
8387904d 11873 struct ppc_link_hash_entry *fdh;
411e1bfb
AM
11874 struct elf_link_hash_entry *h;
11875 Elf_Internal_Sym *sym;
721956f4
AM
11876 char *stub_name;
11877 const asection *id_sec;
74f0fb50 11878 struct _opd_sec_data *opd;
e054468f 11879 struct plt_entry *plt_ent;
721956f4
AM
11880
11881 r_type = ELF64_R_TYPE (irela->r_info);
11882 r_indx = ELF64_R_SYM (irela->r_info);
11883
4ce794b7 11884 if (r_type >= R_PPC64_max)
721956f4
AM
11885 {
11886 bfd_set_error (bfd_error_bad_value);
6cdc0ccc 11887 goto error_ret_free_internal;
721956f4
AM
11888 }
11889
11890 /* Only look for stubs on branch instructions. */
4ce794b7 11891 if (r_type != R_PPC64_REL24
05d0e962 11892 && r_type != R_PPC64_REL24_NOTOC
4ce794b7
AM
11893 && r_type != R_PPC64_REL14
11894 && r_type != R_PPC64_REL14_BRTAKEN
11895 && r_type != R_PPC64_REL14_BRNTAKEN)
721956f4
AM
11896 continue;
11897
11898 /* Now determine the call target, its name, value,
11899 section. */
411e1bfb
AM
11900 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms,
11901 r_indx, input_bfd))
11902 goto error_ret_free_internal;
11903 hash = (struct ppc_link_hash_entry *) h;
11904
8843416a 11905 ok_dest = FALSE;
8387904d 11906 fdh = NULL;
7fe2b9a6 11907 sym_value = 0;
411e1bfb 11908 if (hash == NULL)
721956f4 11909 {
411e1bfb 11910 sym_value = sym->st_value;
c27b8c2a
AM
11911 if (sym_sec != NULL
11912 && sym_sec->output_section != NULL)
11913 ok_dest = TRUE;
721956f4 11914 }
7fe2b9a6
AM
11915 else if (hash->elf.root.type == bfd_link_hash_defined
11916 || hash->elf.root.type == bfd_link_hash_defweak)
11917 {
11918 sym_value = hash->elf.root.u.def.value;
11919 if (sym_sec->output_section != NULL)
11920 ok_dest = TRUE;
11921 }
11922 else if (hash->elf.root.type == bfd_link_hash_undefweak
11923 || hash->elf.root.type == bfd_link_hash_undefined)
721956f4 11924 {
99877b66 11925 /* Recognise an old ABI func code entry sym, and
7fe2b9a6
AM
11926 use the func descriptor sym instead if it is
11927 defined. */
ceb1f1ef 11928 if (hash->elf.root.root.string[0] == '.'
8c5b4e52 11929 && hash->oh != NULL)
8387904d 11930 {
8c5b4e52 11931 fdh = ppc_follow_link (hash->oh);
8387904d
AM
11932 if (fdh->elf.root.type == bfd_link_hash_defined
11933 || fdh->elf.root.type == bfd_link_hash_defweak)
11934 {
11935 sym_sec = fdh->elf.root.u.def.section;
11936 sym_value = fdh->elf.root.u.def.value;
11937 if (sym_sec->output_section != NULL)
11938 ok_dest = TRUE;
11939 }
99877b66
AM
11940 else
11941 fdh = NULL;
8387904d 11942 }
7fe2b9a6
AM
11943 }
11944 else
11945 {
11946 bfd_set_error (bfd_error_bad_value);
11947 goto error_ret_free_internal;
721956f4
AM
11948 }
11949
8843416a 11950 destination = 0;
6911b7dc 11951 local_off = 0;
8843416a
AM
11952 if (ok_dest)
11953 {
11954 sym_value += irela->r_addend;
11955 destination = (sym_value
11956 + sym_sec->output_offset
11957 + sym_sec->output_section->vma);
6911b7dc
AM
11958 local_off = PPC64_LOCAL_ENTRY_OFFSET (hash
11959 ? hash->elf.other
11960 : sym->st_other);
8843416a
AM
11961 }
11962
8387904d 11963 code_sec = sym_sec;
e054468f 11964 code_value = sym_value;
74f0fb50
AM
11965 opd = get_opd_info (sym_sec);
11966 if (opd != NULL)
8387904d
AM
11967 {
11968 bfd_vma dest;
11969
74f0fb50 11970 if (hash == NULL && opd->adjust != NULL)
8387904d 11971 {
51aecdc5 11972 long adjust = opd->adjust[OPD_NDX (sym_value)];
8387904d
AM
11973 if (adjust == -1)
11974 continue;
e054468f 11975 code_value += adjust;
8387904d
AM
11976 sym_value += adjust;
11977 }
11978 dest = opd_entry_value (sym_sec, sym_value,
aef36ac1 11979 &code_sec, &code_value, FALSE);
8387904d
AM
11980 if (dest != (bfd_vma) -1)
11981 {
11982 destination = dest;
11983 if (fdh != NULL)
11984 {
11985 /* Fixup old ABI sym to point at code
11986 entry. */
99877b66 11987 hash->elf.root.type = bfd_link_hash_defweak;
8387904d 11988 hash->elf.root.u.def.section = code_sec;
e054468f 11989 hash->elf.root.u.def.value = code_value;
8387904d
AM
11990 }
11991 }
11992 }
11993
721956f4 11994 /* Determine what (if any) linker stub is needed. */
e054468f 11995 plt_ent = NULL;
721956f4 11996 stub_type = ppc_type_of_stub (section, irela, &hash,
6911b7dc
AM
11997 &plt_ent, destination,
11998 local_off);
ad8e1ba5 11999
05d0e962
AM
12000 if (r_type == R_PPC64_REL24_NOTOC)
12001 {
12002 if (stub_type == ppc_stub_plt_call)
12003 stub_type = ppc_stub_plt_call_notoc;
12004 else if (stub_type == ppc_stub_long_branch
12005 || (code_sec != NULL
12006 && code_sec->output_section != NULL
12007 && (((hash ? hash->elf.other : sym->st_other)
12008 & STO_PPC64_LOCAL_MASK)
12009 != 1 << STO_PPC64_LOCAL_BIT)))
12010 stub_type = ppc_stub_long_branch_notoc;
12011 }
12012 else if (stub_type != ppc_stub_plt_call)
ad8e1ba5
AM
12013 {
12014 /* Check whether we need a TOC adjusting stub.
12015 Since the linker pastes together pieces from
12016 different object files when creating the
12017 _init and _fini functions, it may be that a
12018 call to what looks like a local sym is in
12019 fact a call needing a TOC adjustment. */
33cb30a1
AM
12020 if ((code_sec != NULL
12021 && code_sec->output_section != NULL
12022 && (htab->sec_info[code_sec->id].toc_off
12023 != htab->sec_info[section->id].toc_off)
12024 && (code_sec->has_toc_reloc
12025 || code_sec->makes_toc_func_call))
12026 || (((hash ? hash->elf.other : sym->st_other)
12027 & STO_PPC64_LOCAL_MASK)
12028 == 1 << STO_PPC64_LOCAL_BIT))
ad8e1ba5
AM
12029 stub_type = ppc_stub_long_branch_r2off;
12030 }
12031
721956f4
AM
12032 if (stub_type == ppc_stub_none)
12033 continue;
12034
411e1bfb
AM
12035 /* __tls_get_addr calls might be eliminated. */
12036 if (stub_type != ppc_stub_plt_call
05d0e962 12037 && stub_type != ppc_stub_plt_call_notoc
411e1bfb 12038 && hash != NULL
8387904d
AM
12039 && (hash == htab->tls_get_addr
12040 || hash == htab->tls_get_addr_fd)
411e1bfb
AM
12041 && section->has_tls_reloc
12042 && irela != internal_relocs)
12043 {
12044 /* Get tls info. */
f961d9dd 12045 unsigned char *tls_mask;
411e1bfb 12046
3a71aa26 12047 if (!get_tls_mask (&tls_mask, NULL, NULL, &local_syms,
411e1bfb
AM
12048 irela - 1, input_bfd))
12049 goto error_ret_free_internal;
37da22e5 12050 if ((*tls_mask & TLS_TLS) != 0)
411e1bfb
AM
12051 continue;
12052 }
12053
f378ab09 12054 if (stub_type == ppc_stub_plt_call)
794e51c0 12055 {
6e1816be
AM
12056 if (!htab->opd_abi
12057 && htab->params->plt_localentry0 != 0
12058 && is_elfv2_localentry0 (&hash->elf))
12059 htab->has_plt_localentry0 = 1;
12060 else if (irela + 1 < irelaend
12061 && irela[1].r_offset == irela->r_offset + 4
12062 && (ELF64_R_TYPE (irela[1].r_info)
12063 == R_PPC64_TOCSAVE))
f378ab09
AM
12064 {
12065 if (!tocsave_find (htab, INSERT,
12066 &local_syms, irela + 1, input_bfd))
12067 goto error_ret_free_internal;
12068 }
f378ab09
AM
12069 else
12070 stub_type = ppc_stub_plt_call_r2save;
794e51c0 12071 }
3b421ab3 12072
721956f4 12073 /* Support for grouping stub sections. */
6f20ed8a 12074 id_sec = htab->sec_info[section->id].u.group->link_sec;
721956f4
AM
12075
12076 /* Get the name of this stub. */
12077 stub_name = ppc_stub_name (id_sec, sym_sec, hash, irela);
12078 if (!stub_name)
12079 goto error_ret_free_internal;
12080
12081 stub_entry = ppc_stub_hash_lookup (&htab->stub_hash_table,
b34976b6 12082 stub_name, FALSE, FALSE);
721956f4
AM
12083 if (stub_entry != NULL)
12084 {
05d0e962
AM
12085 enum ppc_stub_type old_type;
12086 /* A stub has already been created, but it may
12087 not be the required type. We shouldn't be
12088 transitioning from plt_call to long_branch
12089 stubs or vice versa, but we might be
12090 upgrading from plt_call to plt_call_r2save or
12091 from long_branch to long_branch_r2off. */
721956f4 12092 free (stub_name);
05d0e962
AM
12093 old_type = stub_entry->stub_type;
12094 switch (old_type)
12095 {
12096 default:
12097 abort ();
12098
12099 case ppc_stub_save_res:
12100 continue;
12101
12102 case ppc_stub_plt_call:
12103 case ppc_stub_plt_call_r2save:
12104 case ppc_stub_plt_call_notoc:
12105 case ppc_stub_plt_call_both:
12106 if (stub_type == ppc_stub_plt_call)
12107 continue;
12108 else if (stub_type == ppc_stub_plt_call_r2save)
12109 {
12110 if (old_type == ppc_stub_plt_call_notoc)
12111 stub_type = ppc_stub_plt_call_both;
12112 }
12113 else if (stub_type == ppc_stub_plt_call_notoc)
12114 {
12115 if (old_type == ppc_stub_plt_call_r2save)
12116 stub_type = ppc_stub_plt_call_both;
12117 }
12118 else
12119 abort ();
12120 break;
12121
12122 case ppc_stub_plt_branch:
12123 case ppc_stub_plt_branch_r2off:
12124 case ppc_stub_plt_branch_notoc:
12125 case ppc_stub_plt_branch_both:
12126 old_type += (ppc_stub_long_branch
12127 - ppc_stub_plt_branch);
12128 /* Fall through. */
12129 case ppc_stub_long_branch:
12130 case ppc_stub_long_branch_r2off:
12131 case ppc_stub_long_branch_notoc:
12132 case ppc_stub_long_branch_both:
12133 if (stub_type == ppc_stub_long_branch)
12134 continue;
12135 else if (stub_type == ppc_stub_long_branch_r2off)
12136 {
12137 if (old_type == ppc_stub_long_branch_notoc)
12138 stub_type = ppc_stub_long_branch_both;
12139 }
12140 else if (stub_type == ppc_stub_long_branch_notoc)
12141 {
12142 if (old_type == ppc_stub_long_branch_r2off)
12143 stub_type = ppc_stub_long_branch_both;
12144 }
12145 else
12146 abort ();
12147 break;
12148 }
12149 if (old_type < stub_type)
794e51c0 12150 stub_entry->stub_type = stub_type;
721956f4
AM
12151 continue;
12152 }
12153
25f53a85 12154 stub_entry = ppc_add_stub (stub_name, section, info);
721956f4
AM
12155 if (stub_entry == NULL)
12156 {
12157 free (stub_name);
6cdc0ccc
AM
12158 error_ret_free_internal:
12159 if (elf_section_data (section)->relocs == NULL)
12160 free (internal_relocs);
12161 error_ret_free_local:
12162 if (local_syms != NULL
12163 && (symtab_hdr->contents
12164 != (unsigned char *) local_syms))
12165 free (local_syms);
b34976b6 12166 return FALSE;
721956f4
AM
12167 }
12168
ad8e1ba5 12169 stub_entry->stub_type = stub_type;
05d0e962
AM
12170 if (stub_type >= ppc_stub_plt_call
12171 && stub_type <= ppc_stub_plt_call_both)
e054468f 12172 {
05d0e962
AM
12173 stub_entry->target_value = sym_value;
12174 stub_entry->target_section = sym_sec;
e054468f
AM
12175 }
12176 else
12177 {
05d0e962
AM
12178 stub_entry->target_value = code_value;
12179 stub_entry->target_section = code_sec;
e054468f 12180 }
721956f4 12181 stub_entry->h = hash;
e054468f 12182 stub_entry->plt_ent = plt_ent;
2d7ad24e
AM
12183 stub_entry->symtype
12184 = hash ? hash->elf.type : ELF_ST_TYPE (sym->st_info);
6911b7dc 12185 stub_entry->other = hash ? hash->elf.other : sym->st_other;
ee75fd95
AM
12186
12187 if (stub_entry->h != NULL)
12188 htab->stub_globals += 1;
721956f4
AM
12189 }
12190
12191 /* We're done with the internal relocs, free them. */
6cdc0ccc 12192 if (elf_section_data (section)->relocs != internal_relocs)
1e2f5b6e 12193 free (internal_relocs);
721956f4 12194 }
6cdc0ccc
AM
12195
12196 if (local_syms != NULL
12197 && symtab_hdr->contents != (unsigned char *) local_syms)
12198 {
12199 if (!info->keep_memory)
12200 free (local_syms);
12201 else
12202 symtab_hdr->contents = (unsigned char *) local_syms;
12203 }
721956f4
AM
12204 }
12205
5c3dead3 12206 /* We may have added some stubs. Find out the new size of the
721956f4 12207 stub sections. */
d4aaa2a0 12208 for (group = htab->group; group != NULL; group = group->next)
df136d64
AM
12209 {
12210 group->lr_restore = 0;
12211 group->eh_size = 0;
12212 if (group->stub_sec != NULL)
12213 {
12214 asection *stub_sec = group->stub_sec;
12215
12216 if (htab->stub_iteration <= STUB_SHRINK_ITER
12217 || stub_sec->rawsize < stub_sec->size)
12218 /* Past STUB_SHRINK_ITER, rawsize is the max size seen. */
12219 stub_sec->rawsize = stub_sec->size;
12220 stub_sec->size = 0;
12221 stub_sec->reloc_count = 0;
12222 stub_sec->flags &= ~SEC_RELOC;
12223 }
12224 }
eea6121a 12225
ba21f564
AM
12226 if (htab->stub_iteration <= STUB_SHRINK_ITER
12227 || htab->brlt->rawsize < htab->brlt->size)
12228 htab->brlt->rawsize = htab->brlt->size;
eea6121a 12229 htab->brlt->size = 0;
84f5d08e
AM
12230 htab->brlt->reloc_count = 0;
12231 htab->brlt->flags &= ~SEC_RELOC;
ee75fd95 12232 if (htab->relbrlt != NULL)
eea6121a 12233 htab->relbrlt->size = 0;
721956f4 12234
63bc6f6c 12235 bfd_hash_traverse (&htab->stub_hash_table, ppc_size_one_stub, info);
721956f4 12236
a4b6fadd
AM
12237 for (group = htab->group; group != NULL; group = group->next)
12238 if (group->needs_save_res)
12239 group->stub_sec->size += htab->sfpr->size;
12240
176a0d42
AM
12241 if (info->emitrelocations
12242 && htab->glink != NULL && htab->glink->size != 0)
12243 {
12244 htab->glink->reloc_count = 1;
12245 htab->glink->flags |= SEC_RELOC;
12246 }
12247
58d180e8
AM
12248 if (htab->glink_eh_frame != NULL
12249 && !bfd_is_abs_section (htab->glink_eh_frame->output_section)
2d0d44d5 12250 && htab->glink_eh_frame->output_section->size > 8)
58d180e8 12251 {
2e0ce1c8 12252 size_t size = 0, align = 4;
58d180e8 12253
d4aaa2a0 12254 for (group = htab->group; group != NULL; group = group->next)
df136d64
AM
12255 if (group->eh_size != 0)
12256 size += (group->eh_size + 17 + align - 1) & -align;
58d180e8 12257 if (htab->glink != NULL && htab->glink->size != 0)
2e0ce1c8 12258 size += (24 + align - 1) & -align;
58d180e8 12259 if (size != 0)
2e0ce1c8
AM
12260 size += (sizeof (glink_eh_frame_cie) + align - 1) & -align;
12261 align = 1ul << htab->glink_eh_frame->output_section->alignment_power;
12262 size = (size + align - 1) & -align;
58d180e8
AM
12263 htab->glink_eh_frame->rawsize = htab->glink_eh_frame->size;
12264 htab->glink_eh_frame->size = size;
12265 }
12266
e7d1c40c 12267 if (htab->params->plt_stub_align != 0)
d4aaa2a0
AM
12268 for (group = htab->group; group != NULL; group = group->next)
12269 if (group->stub_sec != NULL)
691d2e9a
AM
12270 {
12271 int align = abs (htab->params->plt_stub_align);
12272 group->stub_sec->size
12273 = (group->stub_sec->size + (1 << align) - 1) & -(1 << align);
12274 }
d4aaa2a0
AM
12275
12276 for (group = htab->group; group != NULL; group = group->next)
12277 if (group->stub_sec != NULL
12278 && group->stub_sec->rawsize != group->stub_sec->size
c9301e31 12279 && (htab->stub_iteration <= STUB_SHRINK_ITER
d4aaa2a0 12280 || group->stub_sec->rawsize < group->stub_sec->size))
5c3dead3
AM
12281 break;
12282
d4aaa2a0 12283 if (group == NULL
ba21f564
AM
12284 && (htab->brlt->rawsize == htab->brlt->size
12285 || (htab->stub_iteration > STUB_SHRINK_ITER
12286 && htab->brlt->rawsize > htab->brlt->size))
58d180e8
AM
12287 && (htab->glink_eh_frame == NULL
12288 || htab->glink_eh_frame->rawsize == htab->glink_eh_frame->size))
5c3dead3
AM
12289 break;
12290
721956f4 12291 /* Ask the linker to do its stuff. */
e7d1c40c 12292 (*htab->params->layout_sections_again) ();
721956f4
AM
12293 }
12294
da44f4e5
AM
12295 if (htab->glink_eh_frame != NULL
12296 && htab->glink_eh_frame->size != 0)
12297 {
12298 bfd_vma val;
12299 bfd_byte *p, *last_fde;
12300 size_t last_fde_len, size, align, pad;
d4aaa2a0 12301 struct map_stub *group;
da44f4e5 12302
df136d64
AM
12303 /* It is necessary to at least have a rough outline of the
12304 linker generated CIEs and FDEs written before
12305 bfd_elf_discard_info is run, in order for these FDEs to be
12306 indexed in .eh_frame_hdr. */
da44f4e5
AM
12307 p = bfd_zalloc (htab->glink_eh_frame->owner, htab->glink_eh_frame->size);
12308 if (p == NULL)
12309 return FALSE;
12310 htab->glink_eh_frame->contents = p;
12311 last_fde = p;
2e0ce1c8 12312 align = 4;
da44f4e5
AM
12313
12314 memcpy (p, glink_eh_frame_cie, sizeof (glink_eh_frame_cie));
12315 /* CIE length (rewrite in case little-endian). */
2e0ce1c8 12316 last_fde_len = ((sizeof (glink_eh_frame_cie) + align - 1) & -align) - 4;
da44f4e5 12317 bfd_put_32 (htab->elf.dynobj, last_fde_len, p);
2e0ce1c8 12318 p += last_fde_len + 4;
da44f4e5 12319
d4aaa2a0 12320 for (group = htab->group; group != NULL; group = group->next)
df136d64 12321 if (group->eh_size != 0)
da44f4e5 12322 {
df136d64 12323 group->eh_base = p - htab->glink_eh_frame->contents;
da44f4e5 12324 last_fde = p;
df136d64 12325 last_fde_len = ((group->eh_size + 17 + align - 1) & -align) - 4;
da44f4e5 12326 /* FDE length. */
2e0ce1c8 12327 bfd_put_32 (htab->elf.dynobj, last_fde_len, p);
da44f4e5
AM
12328 p += 4;
12329 /* CIE pointer. */
12330 val = p - htab->glink_eh_frame->contents;
12331 bfd_put_32 (htab->elf.dynobj, val, p);
12332 p += 4;
12333 /* Offset to stub section, written later. */
12334 p += 4;
12335 /* stub section size. */
d4aaa2a0 12336 bfd_put_32 (htab->elf.dynobj, group->stub_sec->size, p);
da44f4e5
AM
12337 p += 4;
12338 /* Augmentation. */
12339 p += 1;
df136d64
AM
12340 /* Make sure we don't have all nops. This is enough for
12341 elf-eh-frame.c to detect the last non-nop opcode. */
12342 p[group->eh_size - 1] = DW_CFA_advance_loc + 1;
d4aaa2a0 12343 p = last_fde + last_fde_len + 4;
da44f4e5
AM
12344 }
12345 if (htab->glink != NULL && htab->glink->size != 0)
12346 {
12347 last_fde = p;
2e0ce1c8 12348 last_fde_len = ((24 + align - 1) & -align) - 4;
da44f4e5 12349 /* FDE length. */
2e0ce1c8 12350 bfd_put_32 (htab->elf.dynobj, last_fde_len, p);
da44f4e5
AM
12351 p += 4;
12352 /* CIE pointer. */
12353 val = p - htab->glink_eh_frame->contents;
12354 bfd_put_32 (htab->elf.dynobj, val, p);
12355 p += 4;
12356 /* Offset to .glink, written later. */
12357 p += 4;
12358 /* .glink size. */
12359 bfd_put_32 (htab->elf.dynobj, htab->glink->size - 8, p);
12360 p += 4;
12361 /* Augmentation. */
12362 p += 1;
12363
12364 *p++ = DW_CFA_advance_loc + 1;
12365 *p++ = DW_CFA_register;
12366 *p++ = 65;
9f08fa5c 12367 *p++ = htab->opd_abi ? 12 : 0;
15a3a14f 12368 *p++ = DW_CFA_advance_loc + (htab->opd_abi ? 5 : 7);
da44f4e5
AM
12369 *p++ = DW_CFA_restore_extended;
12370 *p++ = 65;
2e0ce1c8 12371 p += ((24 + align - 1) & -align) - 24;
da44f4e5
AM
12372 }
12373 /* Subsume any padding into the last FDE if user .eh_frame
12374 sections are aligned more than glink_eh_frame. Otherwise any
12375 zero padding will be seen as a terminator. */
2e0ce1c8 12376 align = 1ul << htab->glink_eh_frame->output_section->alignment_power;
da44f4e5 12377 size = p - htab->glink_eh_frame->contents;
2e0ce1c8 12378 pad = ((size + align - 1) & -align) - size;
da44f4e5
AM
12379 htab->glink_eh_frame->size = size + pad;
12380 bfd_put_32 (htab->elf.dynobj, last_fde_len + pad, last_fde);
12381 }
12382
d969d15f
AM
12383 maybe_strip_output (info, htab->brlt);
12384 if (htab->glink_eh_frame != NULL)
12385 maybe_strip_output (info, htab->glink_eh_frame);
721956f4 12386
b34976b6 12387 return TRUE;
721956f4
AM
12388}
12389
12390/* Called after we have determined section placement. If sections
805fc799 12391 move, we'll be called again. Provide a value for TOCstart. */
721956f4 12392
805fc799 12393bfd_vma
1c865ab2 12394ppc64_elf_set_toc (struct bfd_link_info *info, bfd *obfd)
721956f4 12395{
805fc799 12396 asection *s;
a27e685f 12397 bfd_vma TOCstart, adjust;
721956f4 12398
43417696
AM
12399 if (info != NULL)
12400 {
12401 struct elf_link_hash_entry *h;
12402 struct elf_link_hash_table *htab = elf_hash_table (info);
12403
12404 if (is_elf_hash_table (htab)
12405 && htab->hgot != NULL)
12406 h = htab->hgot;
12407 else
12408 {
12409 h = elf_link_hash_lookup (htab, ".TOC.", FALSE, FALSE, TRUE);
12410 if (is_elf_hash_table (htab))
12411 htab->hgot = h;
12412 }
12413 if (h != NULL
12414 && h->root.type == bfd_link_hash_defined
12415 && !h->root.linker_def
12416 && (!is_elf_hash_table (htab)
12417 || h->def_regular))
12418 {
12419 TOCstart = (h->root.u.def.value - TOC_BASE_OFF
12420 + h->root.u.def.section->output_offset
12421 + h->root.u.def.section->output_section->vma);
12422 _bfd_set_gp_value (obfd, TOCstart);
12423 return TOCstart;
12424 }
12425 }
12426
805fc799
AM
12427 /* The TOC consists of sections .got, .toc, .tocbss, .plt in that
12428 order. The TOC starts where the first of these sections starts. */
12429 s = bfd_get_section_by_name (obfd, ".got");
e054468f 12430 if (s == NULL || (s->flags & SEC_EXCLUDE) != 0)
805fc799 12431 s = bfd_get_section_by_name (obfd, ".toc");
e054468f 12432 if (s == NULL || (s->flags & SEC_EXCLUDE) != 0)
805fc799 12433 s = bfd_get_section_by_name (obfd, ".tocbss");
e054468f 12434 if (s == NULL || (s->flags & SEC_EXCLUDE) != 0)
805fc799 12435 s = bfd_get_section_by_name (obfd, ".plt");
e054468f 12436 if (s == NULL || (s->flags & SEC_EXCLUDE) != 0)
805fc799
AM
12437 {
12438 /* This may happen for
12439 o references to TOC base (SYM@toc / TOC[tc0]) without a
12440 .toc directive
12441 o bad linker script
12442 o --gc-sections and empty TOC sections
12443
12444 FIXME: Warn user? */
12445
12446 /* Look for a likely section. We probably won't even be
12447 using TOCstart. */
12448 for (s = obfd->sections; s != NULL; s = s->next)
e054468f
AM
12449 if ((s->flags & (SEC_ALLOC | SEC_SMALL_DATA | SEC_READONLY
12450 | SEC_EXCLUDE))
805fc799
AM
12451 == (SEC_ALLOC | SEC_SMALL_DATA))
12452 break;
721956f4 12453 if (s == NULL)
805fc799 12454 for (s = obfd->sections; s != NULL; s = s->next)
e054468f 12455 if ((s->flags & (SEC_ALLOC | SEC_SMALL_DATA | SEC_EXCLUDE))
805fc799
AM
12456 == (SEC_ALLOC | SEC_SMALL_DATA))
12457 break;
721956f4 12458 if (s == NULL)
805fc799 12459 for (s = obfd->sections; s != NULL; s = s->next)
e054468f
AM
12460 if ((s->flags & (SEC_ALLOC | SEC_READONLY | SEC_EXCLUDE))
12461 == SEC_ALLOC)
805fc799 12462 break;
721956f4 12463 if (s == NULL)
805fc799 12464 for (s = obfd->sections; s != NULL; s = s->next)
e054468f 12465 if ((s->flags & (SEC_ALLOC | SEC_EXCLUDE)) == SEC_ALLOC)
805fc799
AM
12466 break;
12467 }
721956f4 12468
805fc799
AM
12469 TOCstart = 0;
12470 if (s != NULL)
12471 TOCstart = s->output_section->vma + s->output_offset;
721956f4 12472
a27e685f
AM
12473 /* Force alignment. */
12474 adjust = TOCstart & (TOC_BASE_ALIGN - 1);
12475 TOCstart -= adjust;
1c865ab2
AM
12476 _bfd_set_gp_value (obfd, TOCstart);
12477
810d4e75 12478 if (info != NULL && s != NULL)
1c865ab2
AM
12479 {
12480 struct ppc_link_hash_table *htab = ppc_hash_table (info);
12481
810d4e75
AM
12482 if (htab != NULL)
12483 {
12484 if (htab->elf.hgot != NULL)
12485 {
a27e685f 12486 htab->elf.hgot->root.u.def.value = TOC_BASE_OFF - adjust;
810d4e75
AM
12487 htab->elf.hgot->root.u.def.section = s;
12488 }
12489 }
12490 else
1c865ab2 12491 {
810d4e75
AM
12492 struct bfd_link_hash_entry *bh = NULL;
12493 _bfd_generic_link_add_one_symbol (info, obfd, ".TOC.", BSF_GLOBAL,
a27e685f
AM
12494 s, TOC_BASE_OFF - adjust,
12495 NULL, FALSE, FALSE, &bh);
1c865ab2
AM
12496 }
12497 }
805fc799 12498 return TOCstart;
721956f4
AM
12499}
12500
a345bc8d 12501/* Called via elf_link_hash_traverse from ppc64_elf_build_stubs to
49c09209 12502 write out any global entry stubs, and PLT relocations. */
a345bc8d
AM
12503
12504static bfd_boolean
49c09209 12505build_global_entry_stubs_and_plt (struct elf_link_hash_entry *h, void *inf)
a345bc8d
AM
12506{
12507 struct bfd_link_info *info;
12508 struct ppc_link_hash_table *htab;
49c09209 12509 struct plt_entry *ent;
a345bc8d
AM
12510 asection *s;
12511
12512 if (h->root.type == bfd_link_hash_indirect)
12513 return TRUE;
12514
49c09209
AM
12515 info = inf;
12516 htab = ppc_hash_table (info);
12517 if (htab == NULL)
12518 return FALSE;
12519
12520 for (ent = h->plt.plist; ent != NULL; ent = ent->next)
12521 if (ent->plt.offset != (bfd_vma) -1)
12522 {
12523 /* This symbol has an entry in the procedure linkage
12524 table. Set it up. */
12525 Elf_Internal_Rela rela;
2d7ad24e 12526 asection *plt, *relplt;
49c09209
AM
12527 bfd_byte *loc;
12528
12529 if (!htab->elf.dynamic_sections_created
12530 || h->dynindx == -1)
12531 {
12532 if (!(h->def_regular
12533 && (h->root.type == bfd_link_hash_defined
12534 || h->root.type == bfd_link_hash_defweak)))
12535 continue;
2d7ad24e
AM
12536 if (h->type == STT_GNU_IFUNC)
12537 {
12538 plt = htab->elf.iplt;
12539 relplt = htab->elf.irelplt;
12540 htab->local_ifunc_resolver = 1;
12541 if (htab->opd_abi)
12542 rela.r_info = ELF64_R_INFO (0, R_PPC64_JMP_IREL);
12543 else
12544 rela.r_info = ELF64_R_INFO (0, R_PPC64_IRELATIVE);
12545 }
49c09209 12546 else
2d7ad24e
AM
12547 {
12548 plt = htab->pltlocal;
12549 if (bfd_link_pic (info))
12550 {
12551 relplt = htab->relpltlocal;
12552 if (htab->opd_abi)
12553 rela.r_info = ELF64_R_INFO (0, R_PPC64_JMP_SLOT);
12554 else
12555 rela.r_info = ELF64_R_INFO (0, R_PPC64_RELATIVE);
12556 }
12557 else
12558 relplt = NULL;
12559 }
49c09209
AM
12560 rela.r_addend = (h->root.u.def.value
12561 + h->root.u.def.section->output_offset
12562 + h->root.u.def.section->output_section->vma
12563 + ent->addend);
2d7ad24e
AM
12564
12565 if (relplt == NULL)
12566 {
12567 loc = plt->contents + ent->plt.offset;
12568 bfd_put_64 (info->output_bfd, rela.r_addend, loc);
12569 if (htab->opd_abi)
12570 {
12571 bfd_vma toc = elf_gp (info->output_bfd);
12572 toc += htab->sec_info[h->root.u.def.section->id].toc_off;
12573 bfd_put_64 (info->output_bfd, toc, loc + 8);
12574 }
12575 }
12576 else
12577 {
12578 rela.r_offset = (plt->output_section->vma
12579 + plt->output_offset
12580 + ent->plt.offset);
12581 loc = relplt->contents + (relplt->reloc_count++
12582 * sizeof (Elf64_External_Rela));
12583 bfd_elf64_swap_reloca_out (info->output_bfd, &rela, loc);
12584 }
49c09209
AM
12585 }
12586 else
12587 {
12588 rela.r_offset = (htab->elf.splt->output_section->vma
12589 + htab->elf.splt->output_offset
12590 + ent->plt.offset);
12591 rela.r_info = ELF64_R_INFO (h->dynindx, R_PPC64_JMP_SLOT);
12592 rela.r_addend = ent->addend;
12593 loc = (htab->elf.srelplt->contents
12594 + ((ent->plt.offset - PLT_INITIAL_ENTRY_SIZE (htab))
12595 / PLT_ENTRY_SIZE (htab) * sizeof (Elf64_External_Rela)));
12596 if (h->type == STT_GNU_IFUNC && is_static_defined (h))
12597 htab->maybe_local_ifunc_resolver = 1;
2d7ad24e 12598 bfd_elf64_swap_reloca_out (info->output_bfd, &rela, loc);
49c09209 12599 }
49c09209
AM
12600 }
12601
a345bc8d
AM
12602 if (!h->pointer_equality_needed)
12603 return TRUE;
12604
12605 if (h->def_regular)
12606 return TRUE;
12607
9e390558 12608 s = htab->global_entry;
49c09209
AM
12609 if (s == NULL || s->size == 0)
12610 return TRUE;
12611
12612 for (ent = h->plt.plist; ent != NULL; ent = ent->next)
12613 if (ent->plt.offset != (bfd_vma) -1
12614 && ent->addend == 0)
a345bc8d
AM
12615 {
12616 bfd_byte *p;
12617 asection *plt;
12618 bfd_vma off;
12619
a345bc8d 12620 p = s->contents + h->root.u.def.value;
33e44f2e 12621 plt = htab->elf.splt;
a345bc8d
AM
12622 if (!htab->elf.dynamic_sections_created
12623 || h->dynindx == -1)
2d7ad24e
AM
12624 {
12625 if (h->type == STT_GNU_IFUNC)
12626 plt = htab->elf.iplt;
12627 else
12628 plt = htab->pltlocal;
12629 }
49c09209 12630 off = ent->plt.offset + plt->output_offset + plt->output_section->vma;
a345bc8d
AM
12631 off -= h->root.u.def.value + s->output_offset + s->output_section->vma;
12632
12633 if (off + 0x80008000 > 0xffffffff || (off & 3) != 0)
12634 {
12635 info->callbacks->einfo
c1c8c1ef 12636 (_("%P: linkage table error against `%pT'\n"),
a345bc8d
AM
12637 h->root.root.string);
12638 bfd_set_error (bfd_error_bad_value);
12639 htab->stub_error = TRUE;
12640 }
12641
7341d5e2
AM
12642 htab->stub_count[ppc_stub_global_entry - 1] += 1;
12643 if (htab->params->emit_stub_syms)
12644 {
12645 size_t len = strlen (h->root.root.string);
12646 char *name = bfd_malloc (sizeof "12345678.global_entry." + len);
12647
12648 if (name == NULL)
12649 return FALSE;
12650
12651 sprintf (name, "%08x.global_entry.%s", s->id, h->root.root.string);
12652 h = elf_link_hash_lookup (&htab->elf, name, TRUE, FALSE, FALSE);
12653 if (h == NULL)
12654 return FALSE;
12655 if (h->root.type == bfd_link_hash_new)
12656 {
12657 h->root.type = bfd_link_hash_defined;
12658 h->root.u.def.section = s;
12659 h->root.u.def.value = p - s->contents;
12660 h->ref_regular = 1;
12661 h->def_regular = 1;
12662 h->ref_regular_nonweak = 1;
12663 h->forced_local = 1;
12664 h->non_elf = 0;
2ec55de3 12665 h->root.linker_def = 1;
7341d5e2
AM
12666 }
12667 }
12668
a345bc8d
AM
12669 if (PPC_HA (off) != 0)
12670 {
12671 bfd_put_32 (s->owner, ADDIS_R12_R12 | PPC_HA (off), p);
12672 p += 4;
12673 }
12674 bfd_put_32 (s->owner, LD_R12_0R12 | PPC_LO (off), p);
12675 p += 4;
12676 bfd_put_32 (s->owner, MTCTR_R12, p);
12677 p += 4;
407aa07c 12678 bfd_put_32 (s->owner, BCTR, p);
a345bc8d
AM
12679 break;
12680 }
12681 return TRUE;
12682}
12683
49c09209
AM
12684/* Write PLT relocs for locals. */
12685
12686static bfd_boolean
12687write_plt_relocs_for_local_syms (struct bfd_link_info *info)
12688{
12689 struct ppc_link_hash_table *htab = ppc_hash_table (info);
12690 bfd *ibfd;
12691
12692 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
12693 {
12694 struct got_entry **lgot_ents, **end_lgot_ents;
12695 struct plt_entry **local_plt, **lplt, **end_local_plt;
12696 Elf_Internal_Shdr *symtab_hdr;
12697 bfd_size_type locsymcount;
12698 Elf_Internal_Sym *local_syms = NULL;
12699 struct plt_entry *ent;
12700
12701 if (!is_ppc64_elf (ibfd))
12702 continue;
12703
12704 lgot_ents = elf_local_got_ents (ibfd);
12705 if (!lgot_ents)
12706 continue;
12707
12708 symtab_hdr = &elf_symtab_hdr (ibfd);
12709 locsymcount = symtab_hdr->sh_info;
12710 end_lgot_ents = lgot_ents + locsymcount;
12711 local_plt = (struct plt_entry **) end_lgot_ents;
12712 end_local_plt = local_plt + locsymcount;
12713 for (lplt = local_plt; lplt < end_local_plt; ++lplt)
12714 for (ent = *lplt; ent != NULL; ent = ent->next)
12715 if (ent->plt.offset != (bfd_vma) -1)
12716 {
12717 Elf_Internal_Sym *sym;
12718 asection *sym_sec;
12719 asection *plt, *relplt;
12720 bfd_byte *loc;
12721 bfd_vma val;
49c09209
AM
12722
12723 if (!get_sym_h (NULL, &sym, &sym_sec, NULL, &local_syms,
12724 lplt - local_plt, ibfd))
12725 {
12726 if (local_syms != NULL
12727 && symtab_hdr->contents != (unsigned char *) local_syms)
12728 free (local_syms);
12729 return FALSE;
12730 }
12731
12732 val = sym->st_value + ent->addend;
12733 val += PPC64_LOCAL_ENTRY_OFFSET (sym->st_other);
12734 if (sym_sec != NULL && sym_sec->output_section != NULL)
12735 val += sym_sec->output_offset + sym_sec->output_section->vma;
12736
2d7ad24e
AM
12737 if (ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC)
12738 {
12739 htab->local_ifunc_resolver = 1;
12740 plt = htab->elf.iplt;
12741 relplt = htab->elf.irelplt;
12742 }
12743 else
12744 {
12745 plt = htab->pltlocal;
12746 relplt = bfd_link_pic (info) ? htab->relpltlocal : NULL;
12747 }
49c09209 12748
2d7ad24e
AM
12749 if (relplt == NULL)
12750 {
12751 loc = plt->contents + ent->plt.offset;
12752 bfd_put_64 (info->output_bfd, val, loc);
12753 if (htab->opd_abi)
12754 {
12755 bfd_vma toc = elf_gp (ibfd);
12756 bfd_put_64 (info->output_bfd, toc, loc + 8);
12757 }
12758 }
49c09209 12759 else
2d7ad24e
AM
12760 {
12761 Elf_Internal_Rela rela;
12762 rela.r_offset = (ent->plt.offset
12763 + plt->output_offset
12764 + plt->output_section->vma);
12765 if (ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC)
12766 {
12767 if (htab->opd_abi)
12768 rela.r_info = ELF64_R_INFO (0, R_PPC64_JMP_IREL);
12769 else
12770 rela.r_info = ELF64_R_INFO (0, R_PPC64_IRELATIVE);
12771 }
12772 else
12773 {
12774 if (htab->opd_abi)
12775 rela.r_info = ELF64_R_INFO (0, R_PPC64_JMP_SLOT);
12776 else
12777 rela.r_info = ELF64_R_INFO (0, R_PPC64_RELATIVE);
12778 }
12779 rela.r_addend = val;
12780 loc = relplt->contents + (relplt->reloc_count++
12781 * sizeof (Elf64_External_Rela));
12782 bfd_elf64_swap_reloca_out (info->output_bfd, &rela, loc);
12783 }
49c09209
AM
12784 }
12785
12786 if (local_syms != NULL
12787 && symtab_hdr->contents != (unsigned char *) local_syms)
12788 {
12789 if (!info->keep_memory)
12790 free (local_syms);
12791 else
12792 symtab_hdr->contents = (unsigned char *) local_syms;
12793 }
12794 }
12795 return TRUE;
12796}
12797
721956f4
AM
12798/* Build all the stubs associated with the current output file.
12799 The stubs are kept in a hash table attached to the main linker
12800 hash table. This function is called via gldelf64ppc_finish. */
12801
b34976b6 12802bfd_boolean
e7d1c40c 12803ppc64_elf_build_stubs (struct bfd_link_info *info,
4ce794b7 12804 char **stats)
5d1634d7
AM
12805{
12806 struct ppc_link_hash_table *htab = ppc_hash_table (info);
a4b6fadd 12807 struct map_stub *group;
721956f4 12808 asection *stub_sec;
5d1634d7 12809 bfd_byte *p;
e717da7e 12810 int stub_sec_count = 0;
5d1634d7 12811
4dfe6ac6
NC
12812 if (htab == NULL)
12813 return FALSE;
12814
eea6121a 12815 /* Allocate memory to hold the linker stubs. */
d4aaa2a0 12816 for (group = htab->group; group != NULL; group = group->next)
df136d64
AM
12817 {
12818 group->eh_size = 0;
12819 group->lr_restore = 0;
12820 if ((stub_sec = group->stub_sec) != NULL
12821 && stub_sec->size != 0)
12822 {
12823 stub_sec->contents = bfd_zalloc (htab->params->stub_bfd,
12824 stub_sec->size);
12825 if (stub_sec->contents == NULL)
12826 return FALSE;
12827 stub_sec->size = 0;
12828 }
12829 }
5d1634d7 12830
23eb7e01 12831 if (htab->glink != NULL && htab->glink->size != 0)
5d1634d7 12832 {
9f951329 12833 unsigned int indx;
ad8e1ba5 12834 bfd_vma plt0;
9f951329 12835
721956f4 12836 /* Build the .glink plt call stub. */
e7d1c40c 12837 if (htab->params->emit_stub_syms)
97b639ba
AM
12838 {
12839 struct elf_link_hash_entry *h;
468392fb
AM
12840 h = elf_link_hash_lookup (&htab->elf, "__glink_PLTresolve",
12841 TRUE, FALSE, FALSE);
97b639ba
AM
12842 if (h == NULL)
12843 return FALSE;
12844 if (h->root.type == bfd_link_hash_new)
12845 {
12846 h->root.type = bfd_link_hash_defined;
12847 h->root.u.def.section = htab->glink;
ee4bf8d2 12848 h->root.u.def.value = 8;
f5385ebf
AM
12849 h->ref_regular = 1;
12850 h->def_regular = 1;
12851 h->ref_regular_nonweak = 1;
12852 h->forced_local = 1;
12853 h->non_elf = 0;
2ec55de3 12854 h->root.linker_def = 1;
97b639ba
AM
12855 }
12856 }
33e44f2e
AM
12857 plt0 = (htab->elf.splt->output_section->vma
12858 + htab->elf.splt->output_offset
12859 - 16);
176a0d42
AM
12860 if (info->emitrelocations)
12861 {
12862 Elf_Internal_Rela *r = get_relocs (htab->glink, 1);
12863 if (r == NULL)
12864 return FALSE;
12865 r->r_offset = (htab->glink->output_offset
12866 + htab->glink->output_section->vma);
12867 r->r_info = ELF64_R_INFO (0, R_PPC64_REL64);
12868 r->r_addend = plt0;
12869 }
4ce794b7 12870 p = htab->glink->contents;
176a0d42 12871 plt0 -= htab->glink->output_section->vma + htab->glink->output_offset;
ee4bf8d2
AM
12872 bfd_put_64 (htab->glink->owner, plt0, p);
12873 p += 8;
b9e5796b
AM
12874 if (htab->opd_abi)
12875 {
12876 bfd_put_32 (htab->glink->owner, MFLR_R12, p);
12877 p += 4;
12878 bfd_put_32 (htab->glink->owner, BCL_20_31, p);
12879 p += 4;
12880 bfd_put_32 (htab->glink->owner, MFLR_R11, p);
12881 p += 4;
12882 bfd_put_32 (htab->glink->owner, LD_R2_0R11 | (-16 & 0xfffc), p);
12883 p += 4;
12884 bfd_put_32 (htab->glink->owner, MTLR_R12, p);
12885 p += 4;
12886 bfd_put_32 (htab->glink->owner, ADD_R11_R2_R11, p);
12887 p += 4;
12888 bfd_put_32 (htab->glink->owner, LD_R12_0R11, p);
12889 p += 4;
12890 bfd_put_32 (htab->glink->owner, LD_R2_0R11 | 8, p);
12891 p += 4;
12892 bfd_put_32 (htab->glink->owner, MTCTR_R12, p);
12893 p += 4;
12894 bfd_put_32 (htab->glink->owner, LD_R11_0R11 | 16, p);
12895 p += 4;
12896 }
12897 else
12898 {
12899 bfd_put_32 (htab->glink->owner, MFLR_R0, p);
12900 p += 4;
12901 bfd_put_32 (htab->glink->owner, BCL_20_31, p);
12902 p += 4;
12903 bfd_put_32 (htab->glink->owner, MFLR_R11, p);
12904 p += 4;
f378ab09
AM
12905 bfd_put_32 (htab->glink->owner, STD_R2_0R1 + 24, p);
12906 p += 4;
b9e5796b
AM
12907 bfd_put_32 (htab->glink->owner, LD_R2_0R11 | (-16 & 0xfffc), p);
12908 p += 4;
12909 bfd_put_32 (htab->glink->owner, MTLR_R0, p);
12910 p += 4;
12911 bfd_put_32 (htab->glink->owner, SUB_R12_R12_R11, p);
12912 p += 4;
12913 bfd_put_32 (htab->glink->owner, ADD_R11_R2_R11, p);
12914 p += 4;
12915 bfd_put_32 (htab->glink->owner, ADDI_R0_R12 | (-48 & 0xffff), p);
12916 p += 4;
12917 bfd_put_32 (htab->glink->owner, LD_R12_0R11, p);
12918 p += 4;
12919 bfd_put_32 (htab->glink->owner, SRDI_R0_R0_2, p);
12920 p += 4;
12921 bfd_put_32 (htab->glink->owner, MTCTR_R12, p);
12922 p += 4;
12923 bfd_put_32 (htab->glink->owner, LD_R11_0R11 | 8, p);
12924 p += 4;
12925 }
407aa07c
AM
12926 bfd_put_32 (htab->glink->owner, BCTR, p);
12927 p += 4;
c75bc4f7 12928 BFD_ASSERT (p == htab->glink->contents + GLINK_PLTRESOLVE_SIZE (htab));
ad8e1ba5 12929
9f951329
AM
12930 /* Build the .glink lazy link call stubs. */
12931 indx = 0;
9e390558 12932 while (p < htab->glink->contents + htab->glink->size)
9f951329 12933 {
b9e5796b 12934 if (htab->opd_abi)
9f951329 12935 {
b9e5796b
AM
12936 if (indx < 0x8000)
12937 {
12938 bfd_put_32 (htab->glink->owner, LI_R0_0 | indx, p);
12939 p += 4;
12940 }
12941 else
12942 {
12943 bfd_put_32 (htab->glink->owner, LIS_R0_0 | PPC_HI (indx), p);
12944 p += 4;
12945 bfd_put_32 (htab->glink->owner, ORI_R0_R0_0 | PPC_LO (indx),
12946 p);
12947 p += 4;
12948 }
9f951329 12949 }
4ce794b7 12950 bfd_put_32 (htab->glink->owner,
ee4bf8d2 12951 B_DOT | ((htab->glink->contents - p + 8) & 0x3fffffc), p);
a16d5acb 12952 indx++;
9f951329
AM
12953 p += 4;
12954 }
5d1634d7 12955 }
5d1634d7 12956
49c09209
AM
12957 /* Build .glink global entry stubs, and PLT relocs for globals. */
12958 elf_link_hash_traverse (&htab->elf, build_global_entry_stubs_and_plt, info);
12959
12960 if (!write_plt_relocs_for_local_syms (info))
12961 return FALSE;
9e390558 12962
7341d5e2 12963 if (htab->brlt != NULL && htab->brlt->size != 0)
721956f4 12964 {
4ce794b7 12965 htab->brlt->contents = bfd_zalloc (htab->brlt->owner,
eea6121a 12966 htab->brlt->size);
4ce794b7 12967 if (htab->brlt->contents == NULL)
b34976b6 12968 return FALSE;
721956f4 12969 }
ee75fd95 12970 if (htab->relbrlt != NULL && htab->relbrlt->size != 0)
63bc6f6c
AM
12971 {
12972 htab->relbrlt->contents = bfd_zalloc (htab->relbrlt->owner,
eea6121a 12973 htab->relbrlt->size);
63bc6f6c
AM
12974 if (htab->relbrlt->contents == NULL)
12975 return FALSE;
12976 }
5d1634d7 12977
721956f4
AM
12978 /* Build the stubs as directed by the stub hash table. */
12979 bfd_hash_traverse (&htab->stub_hash_table, ppc_build_one_stub, info);
5d1634d7 12980
a4b6fadd
AM
12981 for (group = htab->group; group != NULL; group = group->next)
12982 if (group->needs_save_res)
7dda8d3c 12983 group->stub_sec->size += htab->sfpr->size;
a4b6fadd 12984
aa8a7074
AM
12985 if (htab->relbrlt != NULL)
12986 htab->relbrlt->reloc_count = 0;
12987
e7d1c40c 12988 if (htab->params->plt_stub_align != 0)
d4aaa2a0
AM
12989 for (group = htab->group; group != NULL; group = group->next)
12990 if ((stub_sec = group->stub_sec) != NULL)
691d2e9a
AM
12991 {
12992 int align = abs (htab->params->plt_stub_align);
12993 stub_sec->size = (stub_sec->size + (1 << align) - 1) & -(1 << align);
12994 }
794e51c0 12995
7dda8d3c
AM
12996 for (group = htab->group; group != NULL; group = group->next)
12997 if (group->needs_save_res)
12998 {
12999 stub_sec = group->stub_sec;
13000 memcpy (stub_sec->contents + stub_sec->size - htab->sfpr->size,
13001 htab->sfpr->contents, htab->sfpr->size);
13002 if (htab->params->emit_stub_syms)
13003 {
13004 unsigned int i;
13005
13006 for (i = 0; i < ARRAY_SIZE (save_res_funcs); i++)
13007 if (!sfpr_define (info, &save_res_funcs[i], stub_sec))
13008 return FALSE;
13009 }
13010 }
13011
df136d64
AM
13012 if (htab->glink_eh_frame != NULL
13013 && htab->glink_eh_frame->size != 0)
13014 {
13015 bfd_vma val;
13016 size_t align = 4;
13017
13018 p = htab->glink_eh_frame->contents;
13019 p += (sizeof (glink_eh_frame_cie) + align - 1) & -align;
13020
13021 for (group = htab->group; group != NULL; group = group->next)
13022 if (group->eh_size != 0)
13023 {
13024 /* Offset to stub section. */
13025 val = (group->stub_sec->output_section->vma
13026 + group->stub_sec->output_offset);
13027 val -= (htab->glink_eh_frame->output_section->vma
13028 + htab->glink_eh_frame->output_offset
13029 + (p + 8 - htab->glink_eh_frame->contents));
13030 if (val + 0x80000000 > 0xffffffff)
13031 {
13032 _bfd_error_handler
13033 (_("%s offset too large for .eh_frame sdata4 encoding"),
13034 group->stub_sec->name);
13035 return FALSE;
13036 }
13037 bfd_put_32 (htab->elf.dynobj, val, p + 8);
13038 p += (group->eh_size + 17 + 3) & -4;
13039 }
13040 if (htab->glink != NULL && htab->glink->size != 0)
13041 {
13042 /* Offset to .glink. */
13043 val = (htab->glink->output_section->vma
13044 + htab->glink->output_offset
13045 + 8);
13046 val -= (htab->glink_eh_frame->output_section->vma
13047 + htab->glink_eh_frame->output_offset
13048 + (p + 8 - htab->glink_eh_frame->contents));
13049 if (val + 0x80000000 > 0xffffffff)
13050 {
13051 _bfd_error_handler
13052 (_("%s offset too large for .eh_frame sdata4 encoding"),
13053 htab->glink->name);
13054 return FALSE;
13055 }
13056 bfd_put_32 (htab->elf.dynobj, val, p + 8);
13057 p += (24 + align - 1) & -align;
13058 }
13059 }
13060
d4aaa2a0
AM
13061 for (group = htab->group; group != NULL; group = group->next)
13062 if ((stub_sec = group->stub_sec) != NULL)
e717da7e
AM
13063 {
13064 stub_sec_count += 1;
c9301e31
AM
13065 if (stub_sec->rawsize != stub_sec->size
13066 && (htab->stub_iteration <= STUB_SHRINK_ITER
13067 || stub_sec->rawsize < stub_sec->size))
e717da7e
AM
13068 break;
13069 }
5d1634d7 13070
25516cc5 13071 if (group != NULL)
5d1634d7 13072 {
b34976b6 13073 htab->stub_error = TRUE;
cf97bcb0 13074 _bfd_error_handler (_("stubs don't match calculated size"));
5d1634d7 13075 }
721956f4 13076
d2a300cf
AM
13077 if (htab->stub_error)
13078 return FALSE;
13079
13080 if (stats != NULL)
13081 {
db84fff3 13082 size_t len;
d2a300cf
AM
13083 *stats = bfd_malloc (500);
13084 if (*stats == NULL)
13085 return FALSE;
13086
db84fff3
AM
13087 len = sprintf (*stats,
13088 ngettext ("linker stubs in %u group\n",
13089 "linker stubs in %u groups\n",
13090 stub_sec_count),
13091 stub_sec_count);
05d0e962
AM
13092 sprintf (*stats + len, _(" branch %lu\n"
13093 " branch toc adj %lu\n"
13094 " branch notoc %lu\n"
13095 " branch both %lu\n"
13096 " long branch %lu\n"
13097 " long toc adj %lu\n"
13098 " long notoc %lu\n"
13099 " long both %lu\n"
13100 " plt call %lu\n"
13101 " plt call save %lu\n"
13102 " plt call notoc %lu\n"
13103 " plt call both %lu\n"
13104 " global entry %lu"),
4ce794b7
AM
13105 htab->stub_count[ppc_stub_long_branch - 1],
13106 htab->stub_count[ppc_stub_long_branch_r2off - 1],
05d0e962
AM
13107 htab->stub_count[ppc_stub_long_branch_notoc - 1],
13108 htab->stub_count[ppc_stub_long_branch_both - 1],
4ce794b7
AM
13109 htab->stub_count[ppc_stub_plt_branch - 1],
13110 htab->stub_count[ppc_stub_plt_branch_r2off - 1],
05d0e962
AM
13111 htab->stub_count[ppc_stub_plt_branch_notoc - 1],
13112 htab->stub_count[ppc_stub_plt_branch_both - 1],
794e51c0 13113 htab->stub_count[ppc_stub_plt_call - 1],
7341d5e2 13114 htab->stub_count[ppc_stub_plt_call_r2save - 1],
05d0e962
AM
13115 htab->stub_count[ppc_stub_plt_call_notoc - 1],
13116 htab->stub_count[ppc_stub_plt_call_both - 1],
7341d5e2 13117 htab->stub_count[ppc_stub_global_entry - 1]);
d2a300cf
AM
13118 }
13119 return TRUE;
5bd4f169
AM
13120}
13121
60124e18
AM
13122/* What to do when ld finds relocations against symbols defined in
13123 discarded sections. */
13124
13125static unsigned int
13126ppc64_elf_action_discarded (asection *sec)
13127{
13128 if (strcmp (".opd", sec->name) == 0)
13129 return 0;
13130
13131 if (strcmp (".toc", sec->name) == 0)
13132 return 0;
13133
bce50a28
JJ
13134 if (strcmp (".toc1", sec->name) == 0)
13135 return 0;
13136
60124e18
AM
13137 return _bfd_elf_default_action_discarded (sec);
13138}
13139
5bd4f169
AM
13140/* The RELOCATE_SECTION function is called by the ELF backend linker
13141 to handle the relocations for a section.
13142
13143 The relocs are always passed as Rela structures; if the section
13144 actually uses Rel structures, the r_addend field will always be
13145 zero.
13146
13147 This function is responsible for adjust the section contents as
13148 necessary, and (if using Rela relocs and generating a
1049f94e 13149 relocatable output file) adjusting the reloc addend as
5bd4f169
AM
13150 necessary.
13151
13152 This function does not have to worry about setting the reloc
13153 address or the reloc symbol index.
13154
13155 LOCAL_SYMS is a pointer to the swapped in local symbols.
13156
13157 LOCAL_SECTIONS is an array giving the section in the input file
13158 corresponding to the st_shndx field of each local symbol.
13159
13160 The global hash table entry for the global symbols can be found
13161 via elf_sym_hashes (input_bfd).
13162
1049f94e 13163 When generating relocatable output, this function must handle
5bd4f169
AM
13164 STB_LOCAL/STT_SECTION symbols specially. The output symbol is
13165 going to be the section symbol corresponding to the output
13166 section, which means that the addend must be adjusted
13167 accordingly. */
13168
b34976b6 13169static bfd_boolean
4ce794b7
AM
13170ppc64_elf_relocate_section (bfd *output_bfd,
13171 struct bfd_link_info *info,
13172 bfd *input_bfd,
13173 asection *input_section,
13174 bfd_byte *contents,
13175 Elf_Internal_Rela *relocs,
13176 Elf_Internal_Sym *local_syms,
13177 asection **local_sections)
5bd4f169 13178{
65f38f15 13179 struct ppc_link_hash_table *htab;
5bd4f169
AM
13180 Elf_Internal_Shdr *symtab_hdr;
13181 struct elf_link_hash_entry **sym_hashes;
5bd4f169 13182 Elf_Internal_Rela *rel;
c316a17c 13183 Elf_Internal_Rela *wrel;
5bd4f169 13184 Elf_Internal_Rela *relend;
411e1bfb
AM
13185 Elf_Internal_Rela outrel;
13186 bfd_byte *loc;
411e1bfb 13187 struct got_entry **local_got_ents;
5bd4f169 13188 bfd_vma TOCstart;
b34976b6
AM
13189 bfd_boolean ret = TRUE;
13190 bfd_boolean is_opd;
794e51c0
AM
13191 /* Assume 'at' branch hints. */
13192 bfd_boolean is_isa_v2 = TRUE;
95f0d0d2 13193 bfd_vma d_offset = (bfd_big_endian (input_bfd) ? 2 : 0);
5bd4f169 13194
65f38f15 13195 /* Initialize howto table if needed. */
5bd4f169 13196 if (!ppc64_elf_howto_table[R_PPC64_ADDR32])
5bd4f169
AM
13197 ppc_howto_init ();
13198
65f38f15 13199 htab = ppc_hash_table (info);
4dfe6ac6
NC
13200 if (htab == NULL)
13201 return FALSE;
ee75fd95
AM
13202
13203 /* Don't relocate stub sections. */
e7d1c40c 13204 if (input_section->owner == htab->params->stub_bfd)
ee75fd95
AM
13205 return TRUE;
13206
0c8d6e5c 13207 BFD_ASSERT (is_ppc64_elf (input_bfd));
0ffa91dd 13208
411e1bfb 13209 local_got_ents = elf_local_got_ents (input_bfd);
5bd4f169 13210 TOCstart = elf_gp (output_bfd);
0ffa91dd 13211 symtab_hdr = &elf_symtab_hdr (input_bfd);
5bd4f169 13212 sym_hashes = elf_sym_hashes (input_bfd);
7c8fe5c4 13213 is_opd = ppc64_elf_section_data (input_section)->sec_type == sec_opd;
65f38f15 13214
c316a17c 13215 rel = wrel = relocs;
5bd4f169 13216 relend = relocs + input_section->reloc_count;
c316a17c 13217 for (; rel < relend; wrel++, rel++)
5bd4f169 13218 {
04c9666a 13219 enum elf_ppc64_reloc_type r_type;
31c76678 13220 bfd_vma addend;
5bd4f169
AM
13221 bfd_reloc_status_type r;
13222 Elf_Internal_Sym *sym;
13223 asection *sec;
039b3fef
AM
13224 struct elf_link_hash_entry *h_elf;
13225 struct ppc_link_hash_entry *h;
13226 struct ppc_link_hash_entry *fdh;
5bd4f169 13227 const char *sym_name;
0d4792f7 13228 unsigned long r_symndx, toc_symndx;
3a71aa26 13229 bfd_vma toc_addend;
f961d9dd
AM
13230 unsigned char tls_mask, tls_gd, tls_type;
13231 unsigned char sym_type;
5bd4f169 13232 bfd_vma relocation;
23cedd1d 13233 bfd_boolean unresolved_reloc, save_unresolved_reloc;
b34976b6 13234 bfd_boolean warned;
bc30df16 13235 enum { DEST_NORMAL, DEST_OPD, DEST_STUB } reloc_dest;
67f0cbdb 13236 unsigned int insn;
e11840f9 13237 unsigned int mask;
721956f4
AM
13238 struct ppc_stub_hash_entry *stub_entry;
13239 bfd_vma max_br_offset;
13240 bfd_vma from;
c316a17c 13241 Elf_Internal_Rela orig_rel;
b80eed39
AM
13242 reloc_howto_type *howto;
13243 struct reloc_howto_struct alt_howto;
5bd4f169 13244
c316a17c
AM
13245 again:
13246 orig_rel = *rel;
13247
4ce794b7 13248 r_type = ELF64_R_TYPE (rel->r_info);
5bd4f169 13249 r_symndx = ELF64_R_SYM (rel->r_info);
ee87f2da
AM
13250
13251 /* For old style R_PPC64_TOC relocs with a zero symbol, use the
13252 symbol of the previous ADDR64 reloc. The symbol gives us the
13253 proper TOC base to use. */
13254 if (rel->r_info == ELF64_R_INFO (0, R_PPC64_TOC)
c316a17c
AM
13255 && wrel != relocs
13256 && ELF64_R_TYPE (wrel[-1].r_info) == R_PPC64_ADDR64
ee87f2da 13257 && is_opd)
c316a17c 13258 r_symndx = ELF64_R_SYM (wrel[-1].r_info);
ee87f2da 13259
4ce794b7
AM
13260 sym = NULL;
13261 sec = NULL;
039b3fef 13262 h_elf = NULL;
4ce794b7 13263 sym_name = NULL;
b34976b6
AM
13264 unresolved_reloc = FALSE;
13265 warned = FALSE;
65f38f15 13266
0b13192e 13267 if (r_symndx < symtab_hdr->sh_info)
5bd4f169
AM
13268 {
13269 /* It's a local symbol. */
74f0fb50 13270 struct _opd_sec_data *opd;
4025353c 13271
5bd4f169
AM
13272 sym = local_syms + r_symndx;
13273 sec = local_sections[r_symndx];
26c61ae5 13274 sym_name = bfd_elf_sym_name (input_bfd, symtab_hdr, sym, sec);
0d4792f7 13275 sym_type = ELF64_ST_TYPE (sym->st_info);
8517fae7 13276 relocation = _bfd_elf_rela_local_sym (output_bfd, sym, &sec, rel);
74f0fb50
AM
13277 opd = get_opd_info (sec);
13278 if (opd != NULL && opd->adjust != NULL)
1e2f5b6e 13279 {
51aecdc5
AM
13280 long adjust = opd->adjust[OPD_NDX (sym->st_value
13281 + rel->r_addend)];
4025353c
AM
13282 if (adjust == -1)
13283 relocation = 0;
13284 else
4cc603a5
AM
13285 {
13286 /* If this is a relocation against the opd section sym
13287 and we have edited .opd, adjust the reloc addend so
13288 that ld -r and ld --emit-relocs output is correct.
13289 If it is a reloc against some other .opd symbol,
13290 then the symbol value will be adjusted later. */
13291 if (ELF_ST_TYPE (sym->st_info) == STT_SECTION)
13292 rel->r_addend += adjust;
13293 else
13294 relocation += adjust;
13295 }
1e2f5b6e 13296 }
5bd4f169
AM
13297 }
13298 else
13299 {
62d887d4
L
13300 bfd_boolean ignored;
13301
b2a8e766
AM
13302 RELOC_FOR_GLOBAL_SYMBOL (info, input_bfd, input_section, rel,
13303 r_symndx, symtab_hdr, sym_hashes,
039b3fef 13304 h_elf, sec, relocation,
62d887d4 13305 unresolved_reloc, warned, ignored);
039b3fef
AM
13306 sym_name = h_elf->root.root.string;
13307 sym_type = h_elf->type;
b69fdb4e
AM
13308 if (sec != NULL
13309 && sec->owner == output_bfd
13310 && strcmp (sec->name, ".opd") == 0)
13311 {
13312 /* This is a symbol defined in a linker script. All
13313 such are defined in output sections, even those
13314 defined by simple assignment from a symbol defined in
13315 an input section. Transfer the symbol to an
13316 appropriate input .opd section, so that a branch to
13317 this symbol will be mapped to the location specified
13318 by the opd entry. */
13319 struct bfd_link_order *lo;
13320 for (lo = sec->map_head.link_order; lo != NULL; lo = lo->next)
13321 if (lo->type == bfd_indirect_link_order)
13322 {
13323 asection *isec = lo->u.indirect.section;
13324 if (h_elf->root.u.def.value >= isec->output_offset
13325 && h_elf->root.u.def.value < (isec->output_offset
13326 + isec->size))
13327 {
13328 h_elf->root.u.def.value -= isec->output_offset;
13329 h_elf->root.u.def.section = isec;
13330 sec = isec;
13331 break;
13332 }
13333 }
13334 }
5bd4f169 13335 }
039b3fef 13336 h = (struct ppc_link_hash_entry *) h_elf;
5bd4f169 13337
dbaa2011 13338 if (sec != NULL && discarded_section (sec))
c316a17c
AM
13339 {
13340 _bfd_clear_contents (ppc64_elf_howto_table[r_type],
13341 input_bfd, input_section,
13342 contents + rel->r_offset);
13343 wrel->r_offset = rel->r_offset;
13344 wrel->r_info = 0;
13345 wrel->r_addend = 0;
13346
13347 /* For ld -r, remove relocations in debug sections against
dcd2b8a0 13348 symbols defined in discarded sections. Not done for
c316a17c
AM
13349 non-debug to preserve relocs in .eh_frame which the
13350 eh_frame editing code expects to be present. */
13351 if (bfd_link_relocatable (info)
13352 && (input_section->flags & SEC_DEBUGGING))
13353 wrel--;
13354
13355 continue;
13356 }
ab96bf03 13357
0e1862bb 13358 if (bfd_link_relocatable (info))
c316a17c 13359 goto copy_reloc;
ab96bf03 13360
f40da81b
AM
13361 if (h != NULL && &h->elf == htab->elf.hgot)
13362 {
6f20ed8a 13363 relocation = TOCstart + htab->sec_info[input_section->id].toc_off;
f40da81b
AM
13364 sec = bfd_abs_section_ptr;
13365 unresolved_reloc = FALSE;
13366 }
13367
951fd09b
AM
13368 /* TLS optimizations. Replace instruction sequences and relocs
13369 based on information we collected in tls_optimize. We edit
13370 RELOCS so that --emit-relocs will output something sensible
13371 for the final instruction stream. */
13372 tls_mask = 0;
13373 tls_gd = 0;
0d4792f7 13374 toc_symndx = 0;
727fc41e
AM
13375 if (h != NULL)
13376 tls_mask = h->tls_mask;
13377 else if (local_got_ents != NULL)
411e1bfb 13378 {
e054468f
AM
13379 struct plt_entry **local_plt = (struct plt_entry **)
13380 (local_got_ents + symtab_hdr->sh_info);
f961d9dd 13381 unsigned char *lgot_masks = (unsigned char *)
e054468f 13382 (local_plt + symtab_hdr->sh_info);
727fc41e
AM
13383 tls_mask = lgot_masks[r_symndx];
13384 }
37da22e5 13385 if (((tls_mask & TLS_TLS) == 0 || tls_mask == (TLS_TLS | TLS_MARK))
727fc41e
AM
13386 && (r_type == R_PPC64_TLS
13387 || r_type == R_PPC64_TLSGD
13388 || r_type == R_PPC64_TLSLD))
13389 {
13390 /* Check for toc tls entries. */
f961d9dd 13391 unsigned char *toc_tls;
0d4792f7 13392
727fc41e
AM
13393 if (!get_tls_mask (&toc_tls, &toc_symndx, &toc_addend,
13394 &local_syms, rel, input_bfd))
13395 return FALSE;
0d4792f7 13396
727fc41e
AM
13397 if (toc_tls)
13398 tls_mask = *toc_tls;
0d4792f7
AM
13399 }
13400
13401 /* Check that tls relocs are used with tls syms, and non-tls
13402 relocs are used with non-tls syms. */
cf35638d 13403 if (r_symndx != STN_UNDEF
0d4792f7
AM
13404 && r_type != R_PPC64_NONE
13405 && (h == NULL
039b3fef
AM
13406 || h->elf.root.type == bfd_link_hash_defined
13407 || h->elf.root.type == bfd_link_hash_defweak)
1d483afe
AM
13408 && (IS_PPC64_TLS_RELOC (r_type)
13409 != (sym_type == STT_TLS
13410 || (sym_type == STT_SECTION
13411 && (sec->flags & SEC_THREAD_LOCAL) != 0))))
0d4792f7 13412 {
37da22e5 13413 if ((tls_mask & TLS_TLS) != 0
727fc41e
AM
13414 && (r_type == R_PPC64_TLS
13415 || r_type == R_PPC64_TLSGD
13416 || r_type == R_PPC64_TLSLD))
0d4792f7
AM
13417 /* R_PPC64_TLS is OK against a symbol in the TOC. */
13418 ;
13419 else
25f53a85 13420 info->callbacks->einfo
1d483afe 13421 (!IS_PPC64_TLS_RELOC (r_type)
695344c0 13422 /* xgettext:c-format */
c1c8c1ef 13423 ? _("%H: %s used with TLS symbol `%pT'\n")
695344c0 13424 /* xgettext:c-format */
c1c8c1ef 13425 : _("%H: %s used with non-TLS symbol `%pT'\n"),
25f53a85 13426 input_bfd, input_section, rel->r_offset,
0d4792f7
AM
13427 ppc64_elf_howto_table[r_type]->name,
13428 sym_name);
411e1bfb
AM
13429 }
13430
13431 /* Ensure reloc mapping code below stays sane. */
13432 if (R_PPC64_TOC16_LO_DS != R_PPC64_TOC16_DS + 1
13433 || R_PPC64_TOC16_LO != R_PPC64_TOC16 + 1
13434 || (R_PPC64_GOT_TLSLD16 & 3) != (R_PPC64_GOT_TLSGD16 & 3)
13435 || (R_PPC64_GOT_TLSLD16_LO & 3) != (R_PPC64_GOT_TLSGD16_LO & 3)
13436 || (R_PPC64_GOT_TLSLD16_HI & 3) != (R_PPC64_GOT_TLSGD16_HI & 3)
13437 || (R_PPC64_GOT_TLSLD16_HA & 3) != (R_PPC64_GOT_TLSGD16_HA & 3)
13438 || (R_PPC64_GOT_TLSLD16 & 3) != (R_PPC64_GOT_TPREL16_DS & 3)
13439 || (R_PPC64_GOT_TLSLD16_LO & 3) != (R_PPC64_GOT_TPREL16_LO_DS & 3)
13440 || (R_PPC64_GOT_TLSLD16_HI & 3) != (R_PPC64_GOT_TPREL16_HI & 3)
13441 || (R_PPC64_GOT_TLSLD16_HA & 3) != (R_PPC64_GOT_TPREL16_HA & 3))
13442 abort ();
0d4792f7 13443
411e1bfb
AM
13444 switch (r_type)
13445 {
13446 default:
411e1bfb
AM
13447 break;
13448
ba761f19 13449 case R_PPC64_LO_DS_OPT:
95f0d0d2 13450 insn = bfd_get_32 (input_bfd, contents + rel->r_offset - d_offset);
ba761f19
AM
13451 if ((insn & (0x3f << 26)) != 58u << 26)
13452 abort ();
13453 insn += (14u << 26) - (58u << 26);
95f0d0d2 13454 bfd_put_32 (input_bfd, insn, contents + rel->r_offset - d_offset);
ba761f19
AM
13455 r_type = R_PPC64_TOC16_LO;
13456 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
13457 break;
13458
411e1bfb
AM
13459 case R_PPC64_TOC16:
13460 case R_PPC64_TOC16_LO:
13461 case R_PPC64_TOC16_DS:
13462 case R_PPC64_TOC16_LO_DS:
411e1bfb
AM
13463 {
13464 /* Check for toc tls entries. */
f961d9dd 13465 unsigned char *toc_tls;
951fd09b 13466 int retval;
411e1bfb 13467
3a71aa26
AM
13468 retval = get_tls_mask (&toc_tls, &toc_symndx, &toc_addend,
13469 &local_syms, rel, input_bfd);
951fd09b 13470 if (retval == 0)
411e1bfb
AM
13471 return FALSE;
13472
13473 if (toc_tls)
13474 {
951fd09b 13475 tls_mask = *toc_tls;
411e1bfb
AM
13476 if (r_type == R_PPC64_TOC16_DS
13477 || r_type == R_PPC64_TOC16_LO_DS)
81407a69 13478 {
37da22e5 13479 if ((tls_mask & TLS_TLS) != 0
81407a69
AM
13480 && (tls_mask & (TLS_DTPREL | TLS_TPREL)) == 0)
13481 goto toctprel;
13482 }
411e1bfb 13483 else
951fd09b
AM
13484 {
13485 /* If we found a GD reloc pair, then we might be
13486 doing a GD->IE transition. */
13487 if (retval == 2)
13488 {
13489 tls_gd = TLS_TPRELGD;
37da22e5
AM
13490 if ((tls_mask & TLS_TLS) != 0
13491 && (tls_mask & TLS_GD) == 0)
102890f0 13492 goto tls_ldgd_opt;
951fd09b
AM
13493 }
13494 else if (retval == 3)
13495 {
37da22e5
AM
13496 if ((tls_mask & TLS_TLS) != 0
13497 && (tls_mask & TLS_LD) == 0)
102890f0 13498 goto tls_ldgd_opt;
951fd09b
AM
13499 }
13500 }
411e1bfb
AM
13501 }
13502 }
13503 break;
13504
9d6ded02
AM
13505 case R_PPC64_GOT_TPREL16_HI:
13506 case R_PPC64_GOT_TPREL16_HA:
37da22e5 13507 if ((tls_mask & TLS_TLS) != 0
9d6ded02
AM
13508 && (tls_mask & TLS_TPREL) == 0)
13509 {
13510 rel->r_offset -= d_offset;
95f0d0d2 13511 bfd_put_32 (input_bfd, NOP, contents + rel->r_offset);
9d6ded02
AM
13512 r_type = R_PPC64_NONE;
13513 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
13514 }
13515 break;
13516
411e1bfb
AM
13517 case R_PPC64_GOT_TPREL16_DS:
13518 case R_PPC64_GOT_TPREL16_LO_DS:
37da22e5 13519 if ((tls_mask & TLS_TLS) != 0
951fd09b 13520 && (tls_mask & TLS_TPREL) == 0)
411e1bfb 13521 {
81407a69 13522 toctprel:
95f0d0d2 13523 insn = bfd_get_32 (input_bfd,
c316a17c 13524 contents + rel->r_offset - d_offset);
411e1bfb
AM
13525 insn &= 31 << 21;
13526 insn |= 0x3c0d0000; /* addis 0,13,0 */
95f0d0d2 13527 bfd_put_32 (input_bfd, insn,
c316a17c 13528 contents + rel->r_offset - d_offset);
411e1bfb 13529 r_type = R_PPC64_TPREL16_HA;
0d4792f7
AM
13530 if (toc_symndx != 0)
13531 {
13532 rel->r_info = ELF64_R_INFO (toc_symndx, r_type);
3a71aa26 13533 rel->r_addend = toc_addend;
0d4792f7
AM
13534 /* We changed the symbol. Start over in order to
13535 get h, sym, sec etc. right. */
c316a17c 13536 goto again;
0d4792f7
AM
13537 }
13538 else
13539 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
411e1bfb
AM
13540 }
13541 break;
13542
13543 case R_PPC64_TLS:
37da22e5 13544 if ((tls_mask & TLS_TLS) != 0
951fd09b 13545 && (tls_mask & TLS_TPREL) == 0)
411e1bfb 13546 {
95f0d0d2 13547 insn = bfd_get_32 (input_bfd, contents + rel->r_offset);
2d0f3896
AM
13548 insn = _bfd_elf_ppc_at_tls_transform (insn, 13);
13549 if (insn == 0)
411e1bfb 13550 abort ();
95f0d0d2 13551 bfd_put_32 (input_bfd, insn, contents + rel->r_offset);
411e1bfb 13552 /* Was PPC64_TLS which sits on insn boundary, now
4fe5ca5b
GM
13553 PPC64_TPREL16_LO which is at low-order half-word. */
13554 rel->r_offset += d_offset;
0d4792f7
AM
13555 r_type = R_PPC64_TPREL16_LO;
13556 if (toc_symndx != 0)
13557 {
13558 rel->r_info = ELF64_R_INFO (toc_symndx, r_type);
3a71aa26 13559 rel->r_addend = toc_addend;
0d4792f7
AM
13560 /* We changed the symbol. Start over in order to
13561 get h, sym, sec etc. right. */
c316a17c 13562 goto again;
0d4792f7
AM
13563 }
13564 else
13565 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
411e1bfb
AM
13566 }
13567 break;
13568
411e1bfb
AM
13569 case R_PPC64_GOT_TLSGD16_HI:
13570 case R_PPC64_GOT_TLSGD16_HA:
951fd09b 13571 tls_gd = TLS_TPRELGD;
37da22e5 13572 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_GD) == 0)
951fd09b
AM
13573 goto tls_gdld_hi;
13574 break;
13575
411e1bfb
AM
13576 case R_PPC64_GOT_TLSLD16_HI:
13577 case R_PPC64_GOT_TLSLD16_HA:
37da22e5 13578 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_LD) == 0)
411e1bfb 13579 {
951fd09b
AM
13580 tls_gdld_hi:
13581 if ((tls_mask & tls_gd) != 0)
13582 r_type = (((r_type - (R_PPC64_GOT_TLSGD16 & 3)) & 3)
13583 + R_PPC64_GOT_TPREL16_DS);
13584 else
411e1bfb 13585 {
4fe5ca5b 13586 rel->r_offset -= d_offset;
95f0d0d2 13587 bfd_put_32 (input_bfd, NOP, contents + rel->r_offset);
951fd09b 13588 r_type = R_PPC64_NONE;
411e1bfb 13589 }
951fd09b 13590 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
411e1bfb
AM
13591 }
13592 break;
13593
951fd09b
AM
13594 case R_PPC64_GOT_TLSGD16:
13595 case R_PPC64_GOT_TLSGD16_LO:
13596 tls_gd = TLS_TPRELGD;
37da22e5 13597 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_GD) == 0)
102890f0 13598 goto tls_ldgd_opt;
951fd09b 13599 break;
411e1bfb 13600
951fd09b
AM
13601 case R_PPC64_GOT_TLSLD16:
13602 case R_PPC64_GOT_TLSLD16_LO:
37da22e5 13603 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_LD) == 0)
951fd09b 13604 {
b9f04fe0 13605 unsigned int insn1, insn2;
102890f0
AM
13606 bfd_vma offset;
13607
13608 tls_ldgd_opt:
727fc41e
AM
13609 offset = (bfd_vma) -1;
13610 /* If not using the newer R_PPC64_TLSGD/LD to mark
13611 __tls_get_addr calls, we must trust that the call
13612 stays with its arg setup insns, ie. that the next
13613 reloc is the __tls_get_addr call associated with
13614 the current reloc. Edit both insns. */
13615 if (input_section->has_tls_get_addr_call
13616 && rel + 1 < relend
13617 && branch_reloc_hash_match (input_bfd, rel + 1,
13618 htab->tls_get_addr,
13619 htab->tls_get_addr_fd))
13620 offset = rel[1].r_offset;
b86ac8e3
AM
13621 /* We read the low GOT_TLS (or TOC16) insn because we
13622 need to keep the destination reg. It may be
13623 something other than the usual r3, and moved to r3
13624 before the call by intervening code. */
95f0d0d2 13625 insn1 = bfd_get_32 (input_bfd,
b86ac8e3 13626 contents + rel->r_offset - d_offset);
102890f0 13627 if ((tls_mask & tls_gd) != 0)
411e1bfb 13628 {
102890f0 13629 /* IE */
b86ac8e3 13630 insn1 &= (0x1f << 21) | (0x1f << 16);
102890f0
AM
13631 insn1 |= 58 << 26; /* ld */
13632 insn2 = 0x7c636a14; /* add 3,3,13 */
727fc41e 13633 if (offset != (bfd_vma) -1)
f58d5a2d 13634 rel[1].r_info = ELF64_R_INFO (STN_UNDEF, R_PPC64_NONE);
102890f0
AM
13635 if ((tls_mask & TLS_EXPLICIT) == 0)
13636 r_type = (((r_type - (R_PPC64_GOT_TLSGD16 & 3)) & 3)
13637 + R_PPC64_GOT_TPREL16_DS);
411e1bfb 13638 else
102890f0
AM
13639 r_type += R_PPC64_TOC16_DS - R_PPC64_TOC16;
13640 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
13641 }
13642 else
13643 {
13644 /* LE */
b86ac8e3
AM
13645 insn1 &= 0x1f << 21;
13646 insn1 |= 0x3c0d0000; /* addis r,13,0 */
102890f0
AM
13647 insn2 = 0x38630000; /* addi 3,3,0 */
13648 if (tls_gd == 0)
951fd09b 13649 {
102890f0 13650 /* Was an LD reloc. */
1d483afe
AM
13651 if (toc_symndx)
13652 sec = local_sections[toc_symndx];
13653 for (r_symndx = 0;
13654 r_symndx < symtab_hdr->sh_info;
13655 r_symndx++)
13656 if (local_sections[r_symndx] == sec)
13657 break;
13658 if (r_symndx >= symtab_hdr->sh_info)
cf35638d 13659 r_symndx = STN_UNDEF;
102890f0 13660 rel->r_addend = htab->elf.tls_sec->vma + DTP_OFFSET;
cf35638d 13661 if (r_symndx != STN_UNDEF)
1d483afe
AM
13662 rel->r_addend -= (local_syms[r_symndx].st_value
13663 + sec->output_offset
13664 + sec->output_section->vma);
951fd09b 13665 }
102890f0 13666 else if (toc_symndx != 0)
3a71aa26
AM
13667 {
13668 r_symndx = toc_symndx;
13669 rel->r_addend = toc_addend;
13670 }
102890f0
AM
13671 r_type = R_PPC64_TPREL16_HA;
13672 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
727fc41e
AM
13673 if (offset != (bfd_vma) -1)
13674 {
13675 rel[1].r_info = ELF64_R_INFO (r_symndx,
13676 R_PPC64_TPREL16_LO);
13677 rel[1].r_offset = offset + d_offset;
13678 rel[1].r_addend = rel->r_addend;
13679 }
102890f0 13680 }
95f0d0d2 13681 bfd_put_32 (input_bfd, insn1,
3a71aa26 13682 contents + rel->r_offset - d_offset);
727fc41e 13683 if (offset != (bfd_vma) -1)
b9f04fe0 13684 bfd_put_32 (input_bfd, insn2, contents + offset);
727fc41e
AM
13685 if ((tls_mask & tls_gd) == 0
13686 && (tls_gd == 0 || toc_symndx != 0))
13687 {
13688 /* We changed the symbol. Start over in order
13689 to get h, sym, sec etc. right. */
c316a17c 13690 goto again;
727fc41e
AM
13691 }
13692 }
13693 break;
13694
13695 case R_PPC64_TLSGD:
37da22e5 13696 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_GD) == 0
675e2809 13697 && rel + 1 < relend)
727fc41e 13698 {
b9f04fe0 13699 unsigned int insn2;
727fc41e
AM
13700 bfd_vma offset = rel->r_offset;
13701
23cedd1d
AM
13702 if (is_plt_seq_reloc (ELF64_R_TYPE (rel[1].r_info)))
13703 {
13704 bfd_put_32 (output_bfd, NOP, contents + offset);
13705 rel[1].r_info = ELF64_R_INFO (STN_UNDEF, R_PPC64_NONE);
13706 break;
13707 }
13708
13709 if (ELF64_R_TYPE (rel[1].r_info) == R_PPC64_PLTCALL)
13710 bfd_put_32 (output_bfd, NOP, contents + offset + 4);
13711
727fc41e
AM
13712 if ((tls_mask & TLS_TPRELGD) != 0)
13713 {
13714 /* IE */
13715 r_type = R_PPC64_NONE;
13716 insn2 = 0x7c636a14; /* add 3,3,13 */
13717 }
13718 else
13719 {
13720 /* LE */
13721 if (toc_symndx != 0)
13722 {
13723 r_symndx = toc_symndx;
13724 rel->r_addend = toc_addend;
13725 }
13726 r_type = R_PPC64_TPREL16_LO;
13727 rel->r_offset = offset + d_offset;
13728 insn2 = 0x38630000; /* addi 3,3,0 */
13729 }
13730 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
13731 /* Zap the reloc on the _tls_get_addr call too. */
13732 BFD_ASSERT (offset == rel[1].r_offset);
f58d5a2d 13733 rel[1].r_info = ELF64_R_INFO (STN_UNDEF, R_PPC64_NONE);
95f0d0d2 13734 bfd_put_32 (input_bfd, insn2, contents + offset);
727fc41e 13735 if ((tls_mask & TLS_TPRELGD) == 0 && toc_symndx != 0)
c316a17c 13736 goto again;
411e1bfb 13737 }
411e1bfb
AM
13738 break;
13739
727fc41e 13740 case R_PPC64_TLSLD:
37da22e5 13741 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_LD) == 0
675e2809 13742 && rel + 1 < relend)
727fc41e 13743 {
b9f04fe0 13744 unsigned int insn2;
727fc41e
AM
13745 bfd_vma offset = rel->r_offset;
13746
23cedd1d
AM
13747 if (is_plt_seq_reloc (ELF64_R_TYPE (rel[1].r_info)))
13748 {
13749 bfd_put_32 (output_bfd, NOP, contents + offset);
13750 rel[1].r_info = ELF64_R_INFO (STN_UNDEF, R_PPC64_NONE);
13751 break;
13752 }
13753
13754 if (ELF64_R_TYPE (rel[1].r_info) == R_PPC64_PLTCALL)
13755 bfd_put_32 (output_bfd, NOP, contents + offset + 4);
13756
727fc41e
AM
13757 if (toc_symndx)
13758 sec = local_sections[toc_symndx];
13759 for (r_symndx = 0;
13760 r_symndx < symtab_hdr->sh_info;
13761 r_symndx++)
13762 if (local_sections[r_symndx] == sec)
13763 break;
13764 if (r_symndx >= symtab_hdr->sh_info)
cf35638d 13765 r_symndx = STN_UNDEF;
727fc41e 13766 rel->r_addend = htab->elf.tls_sec->vma + DTP_OFFSET;
cf35638d 13767 if (r_symndx != STN_UNDEF)
727fc41e
AM
13768 rel->r_addend -= (local_syms[r_symndx].st_value
13769 + sec->output_offset
13770 + sec->output_section->vma);
13771
13772 r_type = R_PPC64_TPREL16_LO;
13773 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
13774 rel->r_offset = offset + d_offset;
13775 /* Zap the reloc on the _tls_get_addr call too. */
13776 BFD_ASSERT (offset == rel[1].r_offset);
f58d5a2d 13777 rel[1].r_info = ELF64_R_INFO (STN_UNDEF, R_PPC64_NONE);
727fc41e 13778 insn2 = 0x38630000; /* addi 3,3,0 */
95f0d0d2 13779 bfd_put_32 (input_bfd, insn2, contents + offset);
c316a17c 13780 goto again;
727fc41e
AM
13781 }
13782 break;
13783
411e1bfb 13784 case R_PPC64_DTPMOD64:
951fd09b
AM
13785 if (rel + 1 < relend
13786 && rel[1].r_info == ELF64_R_INFO (r_symndx, R_PPC64_DTPREL64)
13787 && rel[1].r_offset == rel->r_offset + 8)
411e1bfb 13788 {
951fd09b
AM
13789 if ((tls_mask & TLS_GD) == 0)
13790 {
13791 rel[1].r_info = ELF64_R_INFO (r_symndx, R_PPC64_NONE);
13792 if ((tls_mask & TLS_TPRELGD) != 0)
13793 r_type = R_PPC64_TPREL64;
13794 else
13795 {
4ce794b7 13796 bfd_put_64 (output_bfd, 1, contents + rel->r_offset);
951fd09b
AM
13797 r_type = R_PPC64_NONE;
13798 }
13799 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
13800 }
13801 }
13802 else
13803 {
13804 if ((tls_mask & TLS_LD) == 0)
411e1bfb 13805 {
4ce794b7 13806 bfd_put_64 (output_bfd, 1, contents + rel->r_offset);
411e1bfb 13807 r_type = R_PPC64_NONE;
951fd09b 13808 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
411e1bfb 13809 }
411e1bfb
AM
13810 }
13811 break;
13812
13813 case R_PPC64_TPREL64:
951fd09b 13814 if ((tls_mask & TLS_TPREL) == 0)
411e1bfb
AM
13815 {
13816 r_type = R_PPC64_NONE;
13817 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
13818 }
13819 break;
52a82034 13820
006589cf
AM
13821 case R_PPC64_ENTRY:
13822 relocation = TOCstart + htab->sec_info[input_section->id].toc_off;
13823 if (!bfd_link_pic (info)
13824 && !info->traditional_format
13825 && relocation + 0x80008000 <= 0xffffffff)
13826 {
13827 unsigned int insn1, insn2;
13828
13829 insn1 = bfd_get_32 (input_bfd, contents + rel->r_offset);
13830 insn2 = bfd_get_32 (input_bfd, contents + rel->r_offset + 4);
13831 if ((insn1 & ~0xfffc) == LD_R2_0R12
13832 && insn2 == ADD_R2_R2_R12)
13833 {
95f0d0d2 13834 bfd_put_32 (input_bfd,
006589cf
AM
13835 LIS_R2 + PPC_HA (relocation),
13836 contents + rel->r_offset);
95f0d0d2 13837 bfd_put_32 (input_bfd,
006589cf
AM
13838 ADDI_R2_R2 + PPC_LO (relocation),
13839 contents + rel->r_offset + 4);
13840 }
13841 }
13842 else
13843 {
13844 relocation -= (rel->r_offset
13845 + input_section->output_offset
13846 + input_section->output_section->vma);
13847 if (relocation + 0x80008000 <= 0xffffffff)
13848 {
13849 unsigned int insn1, insn2;
13850
13851 insn1 = bfd_get_32 (input_bfd, contents + rel->r_offset);
13852 insn2 = bfd_get_32 (input_bfd, contents + rel->r_offset + 4);
13853 if ((insn1 & ~0xfffc) == LD_R2_0R12
13854 && insn2 == ADD_R2_R2_R12)
13855 {
95f0d0d2 13856 bfd_put_32 (input_bfd,
006589cf
AM
13857 ADDIS_R2_R12 + PPC_HA (relocation),
13858 contents + rel->r_offset);
95f0d0d2 13859 bfd_put_32 (input_bfd,
006589cf
AM
13860 ADDI_R2_R2 + PPC_LO (relocation),
13861 contents + rel->r_offset + 4);
13862 }
13863 }
13864 }
13865 break;
13866
52a82034
AM
13867 case R_PPC64_REL16_HA:
13868 /* If we are generating a non-PIC executable, edit
13869 . 0: addis 2,12,.TOC.-0b@ha
13870 . addi 2,2,.TOC.-0b@l
13871 used by ELFv2 global entry points to set up r2, to
13872 . lis 2,.TOC.@ha
13873 . addi 2,2,.TOC.@l
13874 if .TOC. is in range. */
0e1862bb 13875 if (!bfd_link_pic (info)
810d4e75 13876 && !info->traditional_format
006589cf 13877 && !htab->opd_abi
4f038ee5 13878 && rel->r_addend == d_offset
52a82034
AM
13879 && h != NULL && &h->elf == htab->elf.hgot
13880 && rel + 1 < relend
13881 && rel[1].r_info == ELF64_R_INFO (r_symndx, R_PPC64_REL16_LO)
13882 && rel[1].r_offset == rel->r_offset + 4
13883 && rel[1].r_addend == rel->r_addend + 4
13884 && relocation + 0x80008000 <= 0xffffffff)
13885 {
13886 unsigned int insn1, insn2;
13887 bfd_vma offset = rel->r_offset - d_offset;
95f0d0d2
AM
13888 insn1 = bfd_get_32 (input_bfd, contents + offset);
13889 insn2 = bfd_get_32 (input_bfd, contents + offset + 4);
006589cf
AM
13890 if ((insn1 & 0xffff0000) == ADDIS_R2_R12
13891 && (insn2 & 0xffff0000) == ADDI_R2_R2)
52a82034
AM
13892 {
13893 r_type = R_PPC64_ADDR16_HA;
13894 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
13895 rel->r_addend -= d_offset;
13896 rel[1].r_info = ELF64_R_INFO (r_symndx, R_PPC64_ADDR16_LO);
13897 rel[1].r_addend -= d_offset + 4;
95f0d0d2 13898 bfd_put_32 (input_bfd, LIS_R2, contents + offset);
52a82034
AM
13899 }
13900 }
13901 break;
411e1bfb
AM
13902 }
13903
13904 /* Handle other relocations that tweak non-addend part of insn. */
86c76c7b 13905 insn = 0;
b25116a9
AM
13906 max_br_offset = 1 << 25;
13907 addend = rel->r_addend;
bc30df16 13908 reloc_dest = DEST_NORMAL;
65f38f15 13909 switch (r_type)
5bd4f169
AM
13910 {
13911 default:
65f38f15 13912 break;
5bd4f169 13913
3b421ab3
AM
13914 case R_PPC64_TOCSAVE:
13915 if (relocation + addend == (rel->r_offset
13916 + input_section->output_offset
13917 + input_section->output_section->vma)
13918 && tocsave_find (htab, NO_INSERT,
13919 &local_syms, rel, input_bfd))
13920 {
13921 insn = bfd_get_32 (input_bfd, contents + rel->r_offset);
13922 if (insn == NOP
13923 || insn == CROR_151515 || insn == CROR_313131)
a078d95a
AM
13924 bfd_put_32 (input_bfd,
13925 STD_R2_0R1 + STK_TOC (htab),
3b421ab3
AM
13926 contents + rel->r_offset);
13927 }
13928 break;
13929
65f38f15
AM
13930 /* Branch taken prediction relocations. */
13931 case R_PPC64_ADDR14_BRTAKEN:
13932 case R_PPC64_REL14_BRTAKEN:
cedb70c5 13933 insn = 0x01 << 21; /* 'y' or 't' bit, lowest bit of BO field. */
1a0670f3 13934 /* Fall through. */
65f38f15 13935
86c76c7b 13936 /* Branch not taken prediction relocations. */
65f38f15
AM
13937 case R_PPC64_ADDR14_BRNTAKEN:
13938 case R_PPC64_REL14_BRNTAKEN:
95f0d0d2 13939 insn |= bfd_get_32 (input_bfd,
411e1bfb 13940 contents + rel->r_offset) & ~(0x01 << 21);
1a0670f3 13941 /* Fall through. */
86c76c7b 13942
b25116a9
AM
13943 case R_PPC64_REL14:
13944 max_br_offset = 1 << 15;
1a0670f3 13945 /* Fall through. */
5bd4f169 13946
65f38f15 13947 case R_PPC64_REL24:
05d0e962 13948 case R_PPC64_REL24_NOTOC:
23cedd1d 13949 case R_PPC64_PLTCALL:
ad8e1ba5
AM
13950 /* Calls to functions with a different TOC, such as calls to
13951 shared objects, need to alter the TOC pointer. This is
13952 done using a linkage stub. A REL24 branching to these
13953 linkage stubs needs to be followed by a nop, as the nop
13954 will be replaced with an instruction to restore the TOC
13955 base pointer. */
8387904d 13956 fdh = h;
b31867b6
AM
13957 if (h != NULL
13958 && h->oh != NULL
13959 && h->oh->is_func_descriptor)
13960 fdh = ppc_follow_link (h->oh);
31c76678
DK
13961 stub_entry = ppc_get_stub_entry (input_section, sec, fdh, &orig_rel,
13962 htab);
23cedd1d
AM
13963 if (r_type == R_PPC64_PLTCALL
13964 && stub_entry != NULL
05d0e962
AM
13965 && stub_entry->stub_type >= ppc_stub_plt_call
13966 && stub_entry->stub_type <= ppc_stub_plt_call_both)
23cedd1d
AM
13967 stub_entry = NULL;
13968
6abec6bc 13969 if (stub_entry != NULL
d0abeec8
AM
13970 && ((stub_entry->stub_type >= ppc_stub_plt_call
13971 && stub_entry->stub_type <= ppc_stub_plt_call_both)
ad8e1ba5 13972 || stub_entry->stub_type == ppc_stub_plt_branch_r2off
05d0e962
AM
13973 || stub_entry->stub_type == ppc_stub_plt_branch_both
13974 || stub_entry->stub_type == ppc_stub_long_branch_r2off
13975 || stub_entry->stub_type == ppc_stub_long_branch_both))
41bd81ab 13976 {
b25116a9 13977 bfd_boolean can_plt_call = FALSE;
721956f4 13978
6e1816be
AM
13979 if (stub_entry->stub_type == ppc_stub_plt_call
13980 && !htab->opd_abi
13981 && htab->params->plt_localentry0 != 0
13982 && is_elfv2_localentry0 (&h->elf))
13983 {
13984 /* The function doesn't use or change r2. */
13985 can_plt_call = TRUE;
13986 }
05d0e962
AM
13987 else if (r_type == R_PPC64_REL24_NOTOC)
13988 {
13989 /* NOTOC calls don't need to restore r2. */
13990 can_plt_call = TRUE;
13991 }
6e1816be 13992
f378ab09 13993 /* All of these stubs may modify r2, so there must be a
ba8ca3e7
AM
13994 branch and link followed by a nop. The nop is
13995 replaced by an insn to restore r2. */
6e1816be 13996 else if (rel->r_offset + 8 <= input_section->size)
41bd81ab 13997 {
ba8ca3e7
AM
13998 unsigned long br;
13999
14000 br = bfd_get_32 (input_bfd,
14001 contents + rel->r_offset);
14002 if ((br & 1) != 0)
41bd81ab 14003 {
ba8ca3e7
AM
14004 unsigned long nop;
14005
14006 nop = bfd_get_32 (input_bfd,
14007 contents + rel->r_offset + 4);
23cedd1d
AM
14008 if (nop == LD_R2_0R1 + STK_TOC (htab))
14009 can_plt_call = TRUE;
14010 else if (nop == NOP
14011 || nop == CROR_151515
14012 || nop == CROR_313131)
a7f2871e 14013 {
ba8ca3e7
AM
14014 if (h != NULL
14015 && (h == htab->tls_get_addr_fd
14016 || h == htab->tls_get_addr)
7c9cf415 14017 && htab->params->tls_get_addr_opt)
ba8ca3e7
AM
14018 {
14019 /* Special stub used, leave nop alone. */
14020 }
14021 else
a078d95a
AM
14022 bfd_put_32 (input_bfd,
14023 LD_R2_0R1 + STK_TOC (htab),
ba8ca3e7
AM
14024 contents + rel->r_offset + 4);
14025 can_plt_call = TRUE;
a7f2871e 14026 }
41bd81ab 14027 }
5bd4f169 14028 }
721956f4 14029
ba8ca3e7 14030 if (!can_plt_call && h != NULL)
721956f4 14031 {
ba8ca3e7
AM
14032 const char *name = h->elf.root.root.string;
14033
14034 if (*name == '.')
14035 ++name;
14036
14037 if (strncmp (name, "__libc_start_main", 17) == 0
14038 && (name[17] == 0 || name[17] == '@'))
6ab189d5 14039 {
ba8ca3e7
AM
14040 /* Allow crt1 branch to go via a toc adjusting
14041 stub. Other calls that never return could do
14042 the same, if we could detect such. */
b25116a9 14043 can_plt_call = TRUE;
6ab189d5 14044 }
ba8ca3e7
AM
14045 }
14046
14047 if (!can_plt_call)
14048 {
14049 /* g++ as of 20130507 emits self-calls without a
14050 following nop. This is arguably wrong since we
14051 have conflicting information. On the one hand a
14052 global symbol and on the other a local call
14053 sequence, but don't error for this special case.
14054 It isn't possible to cheaply verify we have
14055 exactly such a call. Allow all calls to the same
14056 section. */
14057 asection *code_sec = sec;
14058
14059 if (get_opd_info (sec) != NULL)
ad8e1ba5 14060 {
ba8ca3e7
AM
14061 bfd_vma off = (relocation + addend
14062 - sec->output_section->vma
14063 - sec->output_offset);
bc30df16 14064
ba8ca3e7 14065 opd_entry_value (sec, off, &code_sec, NULL, FALSE);
ad8e1ba5 14066 }
ba8ca3e7
AM
14067 if (code_sec == input_section)
14068 can_plt_call = TRUE;
14069 }
14070
14071 if (!can_plt_call)
14072 {
05d0e962
AM
14073 if (stub_entry->stub_type >= ppc_stub_plt_call
14074 && stub_entry->stub_type <= ppc_stub_plt_call_both)
4805fc55 14075 info->callbacks->einfo
695344c0 14076 /* xgettext:c-format */
c1c8c1ef 14077 (_("%H: call to `%pT' lacks nop, can't restore toc; "
f53ad3cf 14078 "(plt call stub)\n"),
4805fc55
AM
14079 input_bfd, input_section, rel->r_offset, sym_name);
14080 else
14081 info->callbacks->einfo
695344c0 14082 /* xgettext:c-format */
c1c8c1ef 14083 (_("%H: call to `%pT' lacks nop, can't restore toc; "
f53ad3cf 14084 "(toc save/adjust stub)\n"),
4805fc55 14085 input_bfd, input_section, rel->r_offset, sym_name);
ba8ca3e7
AM
14086
14087 bfd_set_error (bfd_error_bad_value);
14088 ret = FALSE;
721956f4
AM
14089 }
14090
b25116a9 14091 if (can_plt_call
05d0e962
AM
14092 && stub_entry->stub_type >= ppc_stub_plt_call
14093 && stub_entry->stub_type <= ppc_stub_plt_call_both)
b25116a9
AM
14094 unresolved_reloc = FALSE;
14095 }
14096
6abec6bc
AM
14097 if ((stub_entry == NULL
14098 || stub_entry->stub_type == ppc_stub_long_branch
14099 || stub_entry->stub_type == ppc_stub_plt_branch)
8387904d
AM
14100 && get_opd_info (sec) != NULL)
14101 {
14102 /* The branch destination is the value of the opd entry. */
4cc603a5
AM
14103 bfd_vma off = (relocation + addend
14104 - sec->output_section->vma
14105 - sec->output_offset);
aef36ac1 14106 bfd_vma dest = opd_entry_value (sec, off, NULL, NULL, FALSE);
8387904d
AM
14107 if (dest != (bfd_vma) -1)
14108 {
14109 relocation = dest;
14110 addend = 0;
bc30df16 14111 reloc_dest = DEST_OPD;
8387904d
AM
14112 }
14113 }
14114
b25116a9
AM
14115 /* If the branch is out of reach we ought to have a long
14116 branch stub. */
14117 from = (rel->r_offset
14118 + input_section->output_offset
14119 + input_section->output_section->vma);
14120
6911b7dc
AM
14121 relocation += PPC64_LOCAL_ENTRY_OFFSET (fdh
14122 ? fdh->elf.other
14123 : sym->st_other);
14124
6abec6bc
AM
14125 if (stub_entry != NULL
14126 && (stub_entry->stub_type == ppc_stub_long_branch
14127 || stub_entry->stub_type == ppc_stub_plt_branch)
14128 && (r_type == R_PPC64_ADDR14_BRTAKEN
14129 || r_type == R_PPC64_ADDR14_BRNTAKEN
14130 || (relocation + addend - from + max_br_offset
14131 < 2 * max_br_offset)))
14132 /* Don't use the stub if this branch is in range. */
14133 stub_entry = NULL;
b25116a9 14134
05d0e962
AM
14135 if (stub_entry != NULL
14136 && (stub_entry->stub_type == ppc_stub_long_branch_notoc
14137 || stub_entry->stub_type == ppc_stub_long_branch_both
14138 || stub_entry->stub_type == ppc_stub_plt_branch_notoc
14139 || stub_entry->stub_type == ppc_stub_plt_branch_both)
14140 && (r_type != R_PPC64_REL24_NOTOC
14141 || ((fdh ? fdh->elf.other : sym->st_other)
14142 & STO_PPC64_LOCAL_MASK) == 1 << STO_PPC64_LOCAL_BIT)
14143 && (relocation + addend - from + max_br_offset
14144 < 2 * max_br_offset))
14145 stub_entry = NULL;
14146
14147 if (stub_entry != NULL
14148 && (stub_entry->stub_type == ppc_stub_long_branch_r2off
14149 || stub_entry->stub_type == ppc_stub_long_branch_both
14150 || stub_entry->stub_type == ppc_stub_plt_branch_r2off
14151 || stub_entry->stub_type == ppc_stub_plt_branch_both)
14152 && r_type == R_PPC64_REL24_NOTOC
14153 && (relocation + addend - from + max_br_offset
14154 < 2 * max_br_offset))
14155 stub_entry = NULL;
14156
b25116a9
AM
14157 if (stub_entry != NULL)
14158 {
14159 /* Munge up the value and addend so that we call the stub
14160 rather than the procedure directly. */
a4b6fadd
AM
14161 asection *stub_sec = stub_entry->group->stub_sec;
14162
14163 if (stub_entry->stub_type == ppc_stub_save_res)
14164 relocation += (stub_sec->output_offset
14165 + stub_sec->output_section->vma
14166 + stub_sec->size - htab->sfpr->size
14167 - htab->sfpr->output_offset
14168 - htab->sfpr->output_section->vma);
14169 else
14170 relocation = (stub_entry->stub_offset
14171 + stub_sec->output_offset
14172 + stub_sec->output_section->vma);
b25116a9 14173 addend = 0;
bc30df16 14174 reloc_dest = DEST_STUB;
3b421ab3 14175
05d0e962
AM
14176 if (((stub_entry->stub_type == ppc_stub_plt_call
14177 && ALWAYS_EMIT_R2SAVE)
14178 || stub_entry->stub_type == ppc_stub_plt_call_r2save
14179 || stub_entry->stub_type == ppc_stub_plt_call_both)
e81b4c93
AM
14180 && !(h != NULL
14181 && (h == htab->tls_get_addr_fd
14182 || h == htab->tls_get_addr)
14183 && htab->params->tls_get_addr_opt)
3b421ab3
AM
14184 && rel + 1 < relend
14185 && rel[1].r_offset == rel->r_offset + 4
14186 && ELF64_R_TYPE (rel[1].r_info) == R_PPC64_TOCSAVE)
14187 relocation += 4;
05d0e962
AM
14188 else if ((stub_entry->stub_type == ppc_stub_long_branch_both
14189 || stub_entry->stub_type == ppc_stub_plt_branch_both
14190 || stub_entry->stub_type == ppc_stub_plt_call_both)
14191 && r_type == R_PPC64_REL24_NOTOC)
14192 relocation += 4;
b25116a9
AM
14193 }
14194
14195 if (insn != 0)
14196 {
794e51c0 14197 if (is_isa_v2)
721956f4 14198 {
b25116a9
AM
14199 /* Set 'a' bit. This is 0b00010 in BO field for branch
14200 on CR(BI) insns (BO == 001at or 011at), and 0b01000
14201 for branch on CTR insns (BO == 1a00t or 1a01t). */
14202 if ((insn & (0x14 << 21)) == (0x04 << 21))
14203 insn |= 0x02 << 21;
14204 else if ((insn & (0x14 << 21)) == (0x10 << 21))
14205 insn |= 0x08 << 21;
14206 else
14207 break;
14208 }
14209 else
14210 {
14211 /* Invert 'y' bit if not the default. */
4cc603a5 14212 if ((bfd_signed_vma) (relocation + addend - from) < 0)
b25116a9 14213 insn ^= 0x01 << 21;
721956f4 14214 }
b25116a9 14215
95f0d0d2 14216 bfd_put_32 (input_bfd, insn, contents + rel->r_offset);
5bd4f169 14217 }
e86ce104 14218
06da1e8e
AM
14219 /* NOP out calls to undefined weak functions.
14220 We can thus call a weak function without first
14221 checking whether the function is defined. */
b25116a9 14222 else if (h != NULL
039b3fef 14223 && h->elf.root.type == bfd_link_hash_undefweak
766bc656 14224 && h->elf.dynindx == -1
05d0e962
AM
14225 && (r_type == R_PPC64_REL24
14226 || r_type == R_PPC64_REL24_NOTOC)
b25116a9 14227 && relocation == 0
4cc603a5 14228 && addend == 0)
e86ce104 14229 {
95f0d0d2 14230 bfd_put_32 (input_bfd, NOP, contents + rel->r_offset);
c316a17c 14231 goto copy_reloc;
e86ce104 14232 }
65f38f15
AM
14233 break;
14234 }
5bd4f169 14235
65f38f15 14236 /* Set `addend'. */
411e1bfb 14237 tls_type = 0;
23cedd1d 14238 save_unresolved_reloc = unresolved_reloc;
65f38f15
AM
14239 switch (r_type)
14240 {
14241 default:
cf97bcb0
AM
14242 /* xgettext:c-format */
14243 _bfd_error_handler (_("%pB: %s unsupported"),
14244 input_bfd, ppc64_elf_howto_table[r_type]->name);
5bd4f169 14245
65f38f15 14246 bfd_set_error (bfd_error_bad_value);
b34976b6 14247 ret = FALSE;
c316a17c 14248 goto copy_reloc;
5bd4f169 14249
65f38f15 14250 case R_PPC64_NONE:
411e1bfb 14251 case R_PPC64_TLS:
727fc41e
AM
14252 case R_PPC64_TLSGD:
14253 case R_PPC64_TLSLD:
3b421ab3 14254 case R_PPC64_TOCSAVE:
04c9666a
AM
14255 case R_PPC64_GNU_VTINHERIT:
14256 case R_PPC64_GNU_VTENTRY:
006589cf 14257 case R_PPC64_ENTRY:
c316a17c 14258 goto copy_reloc;
5bd4f169
AM
14259
14260 /* GOT16 relocations. Like an ADDR16 using the symbol's
14261 address in the GOT as relocation value instead of the
411e1bfb 14262 symbol's value itself. Also, create a GOT entry for the
5bd4f169 14263 symbol and put the symbol value there. */
411e1bfb
AM
14264 case R_PPC64_GOT_TLSGD16:
14265 case R_PPC64_GOT_TLSGD16_LO:
14266 case R_PPC64_GOT_TLSGD16_HI:
14267 case R_PPC64_GOT_TLSGD16_HA:
951fd09b 14268 tls_type = TLS_TLS | TLS_GD;
411e1bfb
AM
14269 goto dogot;
14270
14271 case R_PPC64_GOT_TLSLD16:
14272 case R_PPC64_GOT_TLSLD16_LO:
14273 case R_PPC64_GOT_TLSLD16_HI:
14274 case R_PPC64_GOT_TLSLD16_HA:
951fd09b 14275 tls_type = TLS_TLS | TLS_LD;
411e1bfb
AM
14276 goto dogot;
14277
14278 case R_PPC64_GOT_TPREL16_DS:
14279 case R_PPC64_GOT_TPREL16_LO_DS:
14280 case R_PPC64_GOT_TPREL16_HI:
14281 case R_PPC64_GOT_TPREL16_HA:
14282 tls_type = TLS_TLS | TLS_TPREL;
14283 goto dogot;
14284
14285 case R_PPC64_GOT_DTPREL16_DS:
14286 case R_PPC64_GOT_DTPREL16_LO_DS:
14287 case R_PPC64_GOT_DTPREL16_HI:
14288 case R_PPC64_GOT_DTPREL16_HA:
14289 tls_type = TLS_TLS | TLS_DTPREL;
14290 goto dogot;
14291
65f38f15
AM
14292 case R_PPC64_GOT16:
14293 case R_PPC64_GOT16_LO:
14294 case R_PPC64_GOT16_HI:
14295 case R_PPC64_GOT16_HA:
14296 case R_PPC64_GOT16_DS:
14297 case R_PPC64_GOT16_LO_DS:
411e1bfb 14298 dogot:
5bd4f169
AM
14299 {
14300 /* Relocation is to the entry for this symbol in the global
14301 offset table. */
e717da7e 14302 asection *got;
d881513a 14303 bfd_vma *offp;
5bd4f169 14304 bfd_vma off;
d881513a 14305 unsigned long indx = 0;
927be08e 14306 struct got_entry *ent;
65f38f15 14307
d881513a
AM
14308 if (tls_type == (TLS_TLS | TLS_LD)
14309 && (h == NULL
f5385ebf 14310 || !h->elf.def_dynamic))
927be08e 14311 ent = ppc64_tlsld_got (input_bfd);
411e1bfb 14312 else
5bd4f169 14313 {
d881513a
AM
14314 if (h != NULL)
14315 {
f0158f44
AM
14316 if (!htab->elf.dynamic_sections_created
14317 || h->elf.dynindx == -1
14318 || SYMBOL_REFERENCES_LOCAL (info, &h->elf)
21d68fcd 14319 || UNDEFWEAK_NO_DYNAMIC_RELOC (info, &h->elf))
d881513a
AM
14320 /* This is actually a static link, or it is a
14321 -Bsymbolic link and the symbol is defined
14322 locally, or the symbol was forced to be local
14323 because of a version file. */
14324 ;
14325 else
14326 {
039b3fef 14327 indx = h->elf.dynindx;
d881513a
AM
14328 unresolved_reloc = FALSE;
14329 }
039b3fef 14330 ent = h->elf.got.glist;
d881513a 14331 }
411e1bfb 14332 else
5bd4f169 14333 {
d881513a
AM
14334 if (local_got_ents == NULL)
14335 abort ();
14336 ent = local_got_ents[r_symndx];
5bd4f169 14337 }
d881513a
AM
14338
14339 for (; ent != NULL; ent = ent->next)
31c76678 14340 if (ent->addend == orig_rel.r_addend
e717da7e 14341 && ent->owner == input_bfd
d881513a
AM
14342 && ent->tls_type == tls_type)
14343 break;
5bd4f169 14344 }
411e1bfb 14345
927be08e
AM
14346 if (ent == NULL)
14347 abort ();
14348 if (ent->is_indirect)
14349 ent = ent->got.ent;
14350 offp = &ent->got.offset;
14351 got = ppc64_elf_tdata (ent->owner)->got;
e717da7e
AM
14352 if (got == NULL)
14353 abort ();
14354
411e1bfb
AM
14355 /* The offset must always be a multiple of 8. We use the
14356 least significant bit to record whether we have already
14357 processed this entry. */
d881513a 14358 off = *offp;
411e1bfb
AM
14359 if ((off & 1) != 0)
14360 off &= ~1;
5bd4f169
AM
14361 else
14362 {
411e1bfb
AM
14363 /* Generate relocs for the dynamic linker, except in
14364 the case of TLSLD where we'll use one entry per
14365 module. */
25f23106
AM
14366 asection *relgot;
14367 bfd_boolean ifunc;
e717da7e 14368
d881513a 14369 *offp = off | 1;
25f23106
AM
14370 relgot = NULL;
14371 ifunc = (h != NULL
14372 ? h->elf.type == STT_GNU_IFUNC
14373 : ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC);
19e08130 14374 if (ifunc)
82e66161
AM
14375 {
14376 relgot = htab->elf.irelplt;
14377 if (indx == 0)
14378 htab->local_ifunc_resolver = 1;
14379 else if (is_static_defined (&h->elf))
14380 htab->maybe_local_ifunc_resolver = 1;
14381 }
f0158f44
AM
14382 else if (indx != 0
14383 || (bfd_link_pic (info)
14384 && (h == NULL
21d68fcd 14385 || !UNDEFWEAK_NO_DYNAMIC_RELOC (info, &h->elf)
f0158f44 14386 || (tls_type == (TLS_TLS | TLS_LD)
f15d0b54
AM
14387 && !h->elf.def_dynamic))
14388 && !(tls_type == (TLS_TLS | TLS_TPREL)
14389 && bfd_link_executable (info)
14390 && SYMBOL_REFERENCES_LOCAL (info, &h->elf))))
19e08130 14391 relgot = ppc64_elf_tdata (ent->owner)->relgot;
25f23106 14392 if (relgot != NULL)
5bd4f169 14393 {
e717da7e
AM
14394 outrel.r_offset = (got->output_section->vma
14395 + got->output_offset
411e1bfb 14396 + off);
4cc603a5 14397 outrel.r_addend = addend;
d881513a 14398 if (tls_type & (TLS_LD | TLS_GD))
5bd4f169 14399 {
411e1bfb 14400 outrel.r_addend = 0;
e515b051 14401 outrel.r_info = ELF64_R_INFO (indx, R_PPC64_DTPMOD64);
d881513a
AM
14402 if (tls_type == (TLS_TLS | TLS_GD))
14403 {
e717da7e
AM
14404 loc = relgot->contents;
14405 loc += (relgot->reloc_count++
d881513a
AM
14406 * sizeof (Elf64_External_Rela));
14407 bfd_elf64_swap_reloca_out (output_bfd,
14408 &outrel, loc);
e515b051 14409 outrel.r_offset += 8;
4cc603a5 14410 outrel.r_addend = addend;
d881513a
AM
14411 outrel.r_info
14412 = ELF64_R_INFO (indx, R_PPC64_DTPREL64);
d881513a 14413 }
411e1bfb 14414 }
951fd09b 14415 else if (tls_type == (TLS_TLS | TLS_DTPREL))
411e1bfb 14416 outrel.r_info = ELF64_R_INFO (indx, R_PPC64_DTPREL64);
951fd09b 14417 else if (tls_type == (TLS_TLS | TLS_TPREL))
411e1bfb 14418 outrel.r_info = ELF64_R_INFO (indx, R_PPC64_TPREL64);
25f23106
AM
14419 else if (indx != 0)
14420 outrel.r_info = ELF64_R_INFO (indx, R_PPC64_GLOB_DAT);
14421 else
81407a69 14422 {
25f23106
AM
14423 if (ifunc)
14424 outrel.r_info = ELF64_R_INFO (0, R_PPC64_IRELATIVE);
14425 else
14426 outrel.r_info = ELF64_R_INFO (0, R_PPC64_RELATIVE);
81407a69
AM
14427
14428 /* Write the .got section contents for the sake
14429 of prelink. */
e717da7e 14430 loc = got->contents + off;
23fbd6fa
JJ
14431 bfd_put_64 (output_bfd, outrel.r_addend + relocation,
14432 loc);
81407a69 14433 }
81407a69
AM
14434
14435 if (indx == 0 && tls_type != (TLS_TLS | TLS_LD))
e515b051
AM
14436 {
14437 outrel.r_addend += relocation;
14438 if (tls_type & (TLS_GD | TLS_DTPREL | TLS_TPREL))
989f9879
AM
14439 {
14440 if (htab->elf.tls_sec == NULL)
14441 outrel.r_addend = 0;
14442 else
14443 outrel.r_addend -= htab->elf.tls_sec->vma;
14444 }
e515b051 14445 }
e717da7e
AM
14446 loc = relgot->contents;
14447 loc += (relgot->reloc_count++
411e1bfb
AM
14448 * sizeof (Elf64_External_Rela));
14449 bfd_elf64_swap_reloca_out (output_bfd, &outrel, loc);
14450 }
14451
ad8e1ba5 14452 /* Init the .got section contents here if we're not
81407a69 14453 emitting a reloc. */
d881513a 14454 else
411e1bfb 14455 {
4cc603a5 14456 relocation += addend;
f0158f44 14457 if (tls_type != 0)
411e1bfb 14458 {
989f9879
AM
14459 if (htab->elf.tls_sec == NULL)
14460 relocation = 0;
14461 else
14462 {
f0158f44
AM
14463 if (tls_type & TLS_LD)
14464 relocation = 0;
14465 else
14466 relocation -= htab->elf.tls_sec->vma + DTP_OFFSET;
676ee2b5 14467 if (tls_type & TLS_TPREL)
989f9879
AM
14468 relocation += DTP_OFFSET - TP_OFFSET;
14469 }
5bd4f169 14470
f0158f44 14471 if (tls_type & (TLS_GD | TLS_LD))
7b609f53
AM
14472 {
14473 bfd_put_64 (output_bfd, relocation,
e717da7e 14474 got->contents + off + 8);
676ee2b5 14475 relocation = 1;
7b609f53 14476 }
411e1bfb
AM
14477 }
14478 bfd_put_64 (output_bfd, relocation,
e717da7e 14479 got->contents + off);
5bd4f169
AM
14480 }
14481 }
14482
65f38f15
AM
14483 if (off >= (bfd_vma) -2)
14484 abort ();
14485
bf102f86 14486 relocation = got->output_section->vma + got->output_offset + off;
6f20ed8a 14487 addend = -(TOCstart + htab->sec_info[input_section->id].toc_off);
5bd4f169 14488 }
65f38f15
AM
14489 break;
14490
14491 case R_PPC64_PLT16_HA:
14492 case R_PPC64_PLT16_HI:
14493 case R_PPC64_PLT16_LO:
08be3224 14494 case R_PPC64_PLT16_LO_DS:
65f38f15
AM
14495 case R_PPC64_PLT32:
14496 case R_PPC64_PLT64:
23cedd1d
AM
14497 case R_PPC64_PLTSEQ:
14498 case R_PPC64_PLTCALL:
65f38f15
AM
14499 /* Relocation is to the entry for this symbol in the
14500 procedure linkage table. */
23cedd1d 14501 unresolved_reloc = TRUE;
cbf95972
AM
14502 {
14503 struct plt_entry **plt_list = NULL;
14504 if (h != NULL)
14505 plt_list = &h->elf.plt.plist;
14506 else if (local_got_ents != NULL)
14507 {
14508 struct plt_entry **local_plt = (struct plt_entry **)
14509 (local_got_ents + symtab_hdr->sh_info);
2d7ad24e 14510 plt_list = local_plt + r_symndx;
cbf95972
AM
14511 }
14512 if (plt_list)
14513 {
14514 struct plt_entry *ent;
65f38f15 14515
cbf95972
AM
14516 for (ent = *plt_list; ent != NULL; ent = ent->next)
14517 if (ent->plt.offset != (bfd_vma) -1
14518 && ent->addend == orig_rel.r_addend)
14519 {
14520 asection *plt;
08be3224 14521 bfd_vma got;
cbf95972
AM
14522
14523 plt = htab->elf.splt;
14524 if (!htab->elf.dynamic_sections_created
14525 || h == NULL
14526 || h->elf.dynindx == -1)
2d7ad24e
AM
14527 {
14528 if (h != NULL
14529 ? h->elf.type == STT_GNU_IFUNC
14530 : ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC)
14531 plt = htab->elf.iplt;
14532 else
14533 plt = htab->pltlocal;
14534 }
14535 relocation = (plt->output_section->vma
14536 + plt->output_offset
14537 + ent->plt.offset);
08be3224 14538 if (r_type == R_PPC64_PLT16_HA
2cdcc330
AM
14539 || r_type == R_PPC64_PLT16_HI
14540 || r_type == R_PPC64_PLT16_LO
14541 || r_type == R_PPC64_PLT16_LO_DS)
08be3224
AM
14542 {
14543 got = (elf_gp (output_bfd)
14544 + htab->sec_info[input_section->id].toc_off);
14545 relocation -= got;
14546 }
cbf95972
AM
14547 addend = 0;
14548 unresolved_reloc = FALSE;
14549 break;
14550 }
14551 }
14552 }
65f38f15 14553 break;
5bd4f169 14554
0b13192e
AM
14555 case R_PPC64_TOC:
14556 /* Relocation value is TOC base. */
14557 relocation = TOCstart;
cf35638d 14558 if (r_symndx == STN_UNDEF)
6f20ed8a 14559 relocation += htab->sec_info[input_section->id].toc_off;
8517fae7
AM
14560 else if (unresolved_reloc)
14561 ;
6f20ed8a
AM
14562 else if (sec != NULL && sec->id < htab->sec_info_arr_size)
14563 relocation += htab->sec_info[sec->id].toc_off;
0b13192e
AM
14564 else
14565 unresolved_reloc = TRUE;
ab96bf03 14566 goto dodyn;
0b13192e 14567
5bd4f169
AM
14568 /* TOC16 relocs. We want the offset relative to the TOC base,
14569 which is the address of the start of the TOC plus 0x8000.
14570 The TOC consists of sections .got, .toc, .tocbss, and .plt,
14571 in this order. */
65f38f15
AM
14572 case R_PPC64_TOC16:
14573 case R_PPC64_TOC16_LO:
14574 case R_PPC64_TOC16_HI:
14575 case R_PPC64_TOC16_DS:
14576 case R_PPC64_TOC16_LO_DS:
14577 case R_PPC64_TOC16_HA:
6f20ed8a 14578 addend -= TOCstart + htab->sec_info[input_section->id].toc_off;
5bd4f169
AM
14579 break;
14580
14581 /* Relocate against the beginning of the section. */
65f38f15
AM
14582 case R_PPC64_SECTOFF:
14583 case R_PPC64_SECTOFF_LO:
14584 case R_PPC64_SECTOFF_HI:
14585 case R_PPC64_SECTOFF_DS:
14586 case R_PPC64_SECTOFF_LO_DS:
14587 case R_PPC64_SECTOFF_HA:
4ce794b7 14588 if (sec != NULL)
65f38f15 14589 addend -= sec->output_section->vma;
5bd4f169
AM
14590 break;
14591
25f23106
AM
14592 case R_PPC64_REL16:
14593 case R_PPC64_REL16_LO:
14594 case R_PPC64_REL16_HI:
14595 case R_PPC64_REL16_HA:
4a969973
AM
14596 case R_PPC64_REL16_HIGH:
14597 case R_PPC64_REL16_HIGHA:
14598 case R_PPC64_REL16_HIGHER:
14599 case R_PPC64_REL16_HIGHERA:
14600 case R_PPC64_REL16_HIGHEST:
14601 case R_PPC64_REL16_HIGHESTA:
a680de9a 14602 case R_PPC64_REL16DX_HA:
25f23106
AM
14603 break;
14604
721956f4
AM
14605 case R_PPC64_REL14:
14606 case R_PPC64_REL14_BRNTAKEN:
14607 case R_PPC64_REL14_BRTAKEN:
5d1634d7 14608 case R_PPC64_REL24:
05d0e962 14609 case R_PPC64_REL24_NOTOC:
5d1634d7
AM
14610 break;
14611
411e1bfb
AM
14612 case R_PPC64_TPREL16:
14613 case R_PPC64_TPREL16_LO:
14614 case R_PPC64_TPREL16_HI:
14615 case R_PPC64_TPREL16_HA:
14616 case R_PPC64_TPREL16_DS:
14617 case R_PPC64_TPREL16_LO_DS:
f9c6b907
AM
14618 case R_PPC64_TPREL16_HIGH:
14619 case R_PPC64_TPREL16_HIGHA:
411e1bfb
AM
14620 case R_PPC64_TPREL16_HIGHER:
14621 case R_PPC64_TPREL16_HIGHERA:
14622 case R_PPC64_TPREL16_HIGHEST:
14623 case R_PPC64_TPREL16_HIGHESTA:
766bc656
AM
14624 if (h != NULL
14625 && h->elf.root.type == bfd_link_hash_undefweak
14626 && h->elf.dynindx == -1)
14627 {
14628 /* Make this relocation against an undefined weak symbol
14629 resolve to zero. This is really just a tweak, since
14630 code using weak externs ought to check that they are
14631 defined before using them. */
14632 bfd_byte *p = contents + rel->r_offset - d_offset;
14633
95f0d0d2 14634 insn = bfd_get_32 (input_bfd, p);
766bc656
AM
14635 insn = _bfd_elf_ppc_at_tprel_transform (insn, 13);
14636 if (insn != 0)
95f0d0d2 14637 bfd_put_32 (input_bfd, insn, p);
766bc656
AM
14638 break;
14639 }
989f9879
AM
14640 if (htab->elf.tls_sec != NULL)
14641 addend -= htab->elf.tls_sec->vma + TP_OFFSET;
7c8bbca5
AM
14642 /* The TPREL16 relocs shouldn't really be used in shared
14643 libs or with non-local symbols as that will result in
14644 DT_TEXTREL being set, but support them anyway. */
14645 goto dodyn;
411e1bfb
AM
14646
14647 case R_PPC64_DTPREL16:
14648 case R_PPC64_DTPREL16_LO:
14649 case R_PPC64_DTPREL16_HI:
14650 case R_PPC64_DTPREL16_HA:
14651 case R_PPC64_DTPREL16_DS:
14652 case R_PPC64_DTPREL16_LO_DS:
f9c6b907
AM
14653 case R_PPC64_DTPREL16_HIGH:
14654 case R_PPC64_DTPREL16_HIGHA:
411e1bfb
AM
14655 case R_PPC64_DTPREL16_HIGHER:
14656 case R_PPC64_DTPREL16_HIGHERA:
14657 case R_PPC64_DTPREL16_HIGHEST:
14658 case R_PPC64_DTPREL16_HIGHESTA:
989f9879
AM
14659 if (htab->elf.tls_sec != NULL)
14660 addend -= htab->elf.tls_sec->vma + DTP_OFFSET;
411e1bfb
AM
14661 break;
14662
45965137
AM
14663 case R_PPC64_ADDR64_LOCAL:
14664 addend += PPC64_LOCAL_ENTRY_OFFSET (h != NULL
14665 ? h->elf.other
14666 : sym->st_other);
14667 break;
14668
e515b051
AM
14669 case R_PPC64_DTPMOD64:
14670 relocation = 1;
14671 addend = 0;
14672 goto dodyn;
14673
411e1bfb 14674 case R_PPC64_TPREL64:
989f9879
AM
14675 if (htab->elf.tls_sec != NULL)
14676 addend -= htab->elf.tls_sec->vma + TP_OFFSET;
411e1bfb
AM
14677 goto dodyn;
14678
14679 case R_PPC64_DTPREL64:
989f9879
AM
14680 if (htab->elf.tls_sec != NULL)
14681 addend -= htab->elf.tls_sec->vma + DTP_OFFSET;
1a0670f3 14682 /* Fall through. */
411e1bfb 14683
65f38f15
AM
14684 /* Relocations that may need to be propagated if this is a
14685 dynamic object. */
04c9666a 14686 case R_PPC64_REL30:
65f38f15
AM
14687 case R_PPC64_REL32:
14688 case R_PPC64_REL64:
14689 case R_PPC64_ADDR14:
14690 case R_PPC64_ADDR14_BRNTAKEN:
14691 case R_PPC64_ADDR14_BRTAKEN:
14692 case R_PPC64_ADDR16:
14693 case R_PPC64_ADDR16_DS:
14694 case R_PPC64_ADDR16_HA:
14695 case R_PPC64_ADDR16_HI:
f9c6b907
AM
14696 case R_PPC64_ADDR16_HIGH:
14697 case R_PPC64_ADDR16_HIGHA:
65f38f15
AM
14698 case R_PPC64_ADDR16_HIGHER:
14699 case R_PPC64_ADDR16_HIGHERA:
14700 case R_PPC64_ADDR16_HIGHEST:
14701 case R_PPC64_ADDR16_HIGHESTA:
14702 case R_PPC64_ADDR16_LO:
14703 case R_PPC64_ADDR16_LO_DS:
14704 case R_PPC64_ADDR24:
65f38f15
AM
14705 case R_PPC64_ADDR32:
14706 case R_PPC64_ADDR64:
14707 case R_PPC64_UADDR16:
14708 case R_PPC64_UADDR32:
14709 case R_PPC64_UADDR64:
411e1bfb 14710 dodyn:
5d1634d7 14711 if ((input_section->flags & SEC_ALLOC) == 0)
ec338859
AM
14712 break;
14713
41bd81ab
AM
14714 if (NO_OPD_RELOCS && is_opd)
14715 break;
14716
8a9e8e72 14717 if (bfd_link_pic (info)
b1b07054
AM
14718 ? ((h == NULL
14719 || h->dyn_relocs != NULL)
14720 && ((h != NULL && pc_dynrelocs (h))
14721 || must_be_dyn_reloc (info, r_type)))
8a9e8e72
AM
14722 : (h != NULL
14723 ? h->dyn_relocs != NULL
d311bc8b 14724 : ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC))
65f38f15 14725 {
b34976b6 14726 bfd_boolean skip, relocate;
65f38f15 14727 asection *sreloc;
1cf1f670 14728 bfd_vma out_off;
82e66161 14729 long indx = 0;
65f38f15
AM
14730
14731 /* When generating a dynamic object, these relocations
14732 are copied into the output file to be resolved at run
14733 time. */
14734
b34976b6
AM
14735 skip = FALSE;
14736 relocate = FALSE;
65f38f15 14737
1cf1f670
AM
14738 out_off = _bfd_elf_section_offset (output_bfd, info,
14739 input_section, rel->r_offset);
14740 if (out_off == (bfd_vma) -1)
b34976b6 14741 skip = TRUE;
1cf1f670 14742 else if (out_off == (bfd_vma) -2)
b34976b6 14743 skip = TRUE, relocate = TRUE;
1cf1f670
AM
14744 out_off += (input_section->output_section->vma
14745 + input_section->output_offset);
14746 outrel.r_offset = out_off;
411e1bfb 14747 outrel.r_addend = rel->r_addend;
65f38f15 14748
1cf1f670
AM
14749 /* Optimize unaligned reloc use. */
14750 if ((r_type == R_PPC64_ADDR64 && (out_off & 7) != 0)
14751 || (r_type == R_PPC64_UADDR64 && (out_off & 7) == 0))
14752 r_type ^= R_PPC64_ADDR64 ^ R_PPC64_UADDR64;
14753 else if ((r_type == R_PPC64_ADDR32 && (out_off & 3) != 0)
14754 || (r_type == R_PPC64_UADDR32 && (out_off & 3) == 0))
14755 r_type ^= R_PPC64_ADDR32 ^ R_PPC64_UADDR32;
14756 else if ((r_type == R_PPC64_ADDR16 && (out_off & 1) != 0)
14757 || (r_type == R_PPC64_UADDR16 && (out_off & 1) == 0))
14758 r_type ^= R_PPC64_ADDR16 ^ R_PPC64_UADDR16;
14759
65f38f15 14760 if (skip)
0bb2d96a 14761 memset (&outrel, 0, sizeof outrel);
afe397ea 14762 else if (!SYMBOL_REFERENCES_LOCAL (info, &h->elf)
0b13192e
AM
14763 && !is_opd
14764 && r_type != R_PPC64_TOC)
14acf4dc 14765 {
82e66161
AM
14766 indx = h->elf.dynindx;
14767 BFD_ASSERT (indx != -1);
14768 outrel.r_info = ELF64_R_INFO (indx, r_type);
14acf4dc 14769 }
65f38f15
AM
14770 else
14771 {
41bd81ab
AM
14772 /* This symbol is local, or marked to become local,
14773 or this is an opd section reloc which must point
14774 at a local function. */
65f38f15 14775 outrel.r_addend += relocation;
e86ce104 14776 if (r_type == R_PPC64_ADDR64 || r_type == R_PPC64_TOC)
65f38f15 14777 {
3fad3c7c 14778 if (is_opd && h != NULL)
afbe61cf
AM
14779 {
14780 /* Lie about opd entries. This case occurs
14781 when building shared libraries and we
14782 reference a function in another shared
3fad3c7c
AM
14783 lib. The same thing happens for a weak
14784 definition in an application that's
14785 overridden by a strong definition in a
14786 shared lib. (I believe this is a generic
14787 bug in binutils handling of weak syms.)
14788 In these cases we won't use the opd
1e2f5b6e 14789 entry in this lib. */
b34976b6 14790 unresolved_reloc = FALSE;
afbe61cf 14791 }
25f23106
AM
14792 if (!is_opd
14793 && r_type == R_PPC64_ADDR64
14794 && (h != NULL
14795 ? h->elf.type == STT_GNU_IFUNC
14796 : ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC))
14797 outrel.r_info = ELF64_R_INFO (0, R_PPC64_IRELATIVE);
14798 else
14799 {
14800 outrel.r_info = ELF64_R_INFO (0, R_PPC64_RELATIVE);
81407a69 14801
25f23106
AM
14802 /* We need to relocate .opd contents for ld.so.
14803 Prelink also wants simple and consistent rules
14804 for relocs. This make all RELATIVE relocs have
14805 *r_offset equal to r_addend. */
14806 relocate = TRUE;
14807 }
65f38f15
AM
14808 }
14809 else
14810 {
25f23106
AM
14811 if (h != NULL
14812 ? h->elf.type == STT_GNU_IFUNC
14813 : ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC)
14814 {
25f53a85 14815 info->callbacks->einfo
695344c0 14816 /* xgettext:c-format */
174d0a74 14817 (_("%H: %s for indirect "
c1c8c1ef 14818 "function `%pT' unsupported\n"),
25f53a85 14819 input_bfd, input_section, rel->r_offset,
25f23106
AM
14820 ppc64_elf_howto_table[r_type]->name,
14821 sym_name);
14822 ret = FALSE;
14823 }
cf35638d 14824 else if (r_symndx == STN_UNDEF || bfd_is_abs_section (sec))
65f38f15
AM
14825 ;
14826 else if (sec == NULL || sec->owner == NULL)
14827 {
14828 bfd_set_error (bfd_error_bad_value);
b34976b6 14829 return FALSE;
65f38f15
AM
14830 }
14831 else
14832 {
14833 asection *osec;
14834
14835 osec = sec->output_section;
14836 indx = elf_section_data (osec)->dynindx;
14837
74541ad4
AM
14838 if (indx == 0)
14839 {
14840 if ((osec->flags & SEC_READONLY) == 0
14841 && htab->elf.data_index_section != NULL)
14842 osec = htab->elf.data_index_section;
14843 else
14844 osec = htab->elf.text_index_section;
14845 indx = elf_section_data (osec)->dynindx;
14846 }
14847 BFD_ASSERT (indx != 0);
14848
65f38f15
AM
14849 /* We are turning this relocation into one
14850 against a section symbol, so subtract out
14851 the output section's address but not the
14852 offset of the input section in the output
14853 section. */
14854 outrel.r_addend -= osec->vma;
14855 }
14856
14857 outrel.r_info = ELF64_R_INFO (indx, r_type);
14858 }
14859 }
14860
14861 sreloc = elf_section_data (input_section)->sreloc;
19e08130
AM
14862 if (h != NULL
14863 ? h->elf.type == STT_GNU_IFUNC
14864 : ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC)
82e66161
AM
14865 {
14866 sreloc = htab->elf.irelplt;
14867 if (indx == 0)
14868 htab->local_ifunc_resolver = 1;
14869 else if (is_static_defined (&h->elf))
14870 htab->maybe_local_ifunc_resolver = 1;
14871 }
65f38f15
AM
14872 if (sreloc == NULL)
14873 abort ();
14874
dfbb6ac9
AM
14875 if (sreloc->reloc_count * sizeof (Elf64_External_Rela)
14876 >= sreloc->size)
14877 abort ();
947216bf
AM
14878 loc = sreloc->contents;
14879 loc += sreloc->reloc_count++ * sizeof (Elf64_External_Rela);
65f38f15
AM
14880 bfd_elf64_swap_reloca_out (output_bfd, &outrel, loc);
14881
14882 /* If this reloc is against an external symbol, it will
14883 be computed at runtime, so there's no need to do
81407a69
AM
14884 anything now. However, for the sake of prelink ensure
14885 that the section contents are a known value. */
2cdcc330 14886 if (!relocate)
81407a69
AM
14887 {
14888 unresolved_reloc = FALSE;
14889 /* The value chosen here is quite arbitrary as ld.so
14890 ignores section contents except for the special
14891 case of .opd where the contents might be accessed
14892 before relocation. Choose zero, as that won't
14893 cause reloc overflow. */
14894 relocation = 0;
14895 addend = 0;
14896 /* Use *r_offset == r_addend for R_PPC64_ADDR64 relocs
14897 to improve backward compatibility with older
14898 versions of ld. */
14899 if (r_type == R_PPC64_ADDR64)
14900 addend = outrel.r_addend;
14901 /* Adjust pc_relative relocs to have zero in *r_offset. */
4ce794b7 14902 else if (ppc64_elf_howto_table[r_type]->pc_relative)
f0158f44 14903 addend = outrel.r_offset;
81407a69 14904 }
65f38f15 14905 }
5bd4f169
AM
14906 break;
14907
65f38f15
AM
14908 case R_PPC64_COPY:
14909 case R_PPC64_GLOB_DAT:
14910 case R_PPC64_JMP_SLOT:
25f23106 14911 case R_PPC64_JMP_IREL:
65f38f15
AM
14912 case R_PPC64_RELATIVE:
14913 /* We shouldn't ever see these dynamic relocs in relocatable
14914 files. */
ae9a127f 14915 /* Fall through. */
65f38f15
AM
14916
14917 case R_PPC64_PLTGOT16:
14918 case R_PPC64_PLTGOT16_DS:
14919 case R_PPC64_PLTGOT16_HA:
14920 case R_PPC64_PLTGOT16_HI:
14921 case R_PPC64_PLTGOT16_LO:
14922 case R_PPC64_PLTGOT16_LO_DS:
14923 case R_PPC64_PLTREL32:
14924 case R_PPC64_PLTREL64:
14925 /* These ones haven't been implemented yet. */
14926
25f53a85 14927 info->callbacks->einfo
695344c0 14928 /* xgettext:c-format */
c1c8c1ef 14929 (_("%P: %pB: %s is not supported for `%pT'\n"),
d003868e 14930 input_bfd,
4ce794b7 14931 ppc64_elf_howto_table[r_type]->name, sym_name);
5bd4f169
AM
14932
14933 bfd_set_error (bfd_error_invalid_operation);
b34976b6 14934 ret = FALSE;
c316a17c 14935 goto copy_reloc;
65f38f15 14936 }
5bd4f169 14937
67f0cbdb
AM
14938 /* Multi-instruction sequences that access the TOC can be
14939 optimized, eg. addis ra,r2,0; addi rb,ra,x;
07d6d2b8 14940 to nop; addi rb,r2,x; */
67f0cbdb
AM
14941 switch (r_type)
14942 {
14943 default:
14944 break;
14945
14946 case R_PPC64_GOT_TLSLD16_HI:
14947 case R_PPC64_GOT_TLSGD16_HI:
14948 case R_PPC64_GOT_TPREL16_HI:
14949 case R_PPC64_GOT_DTPREL16_HI:
14950 case R_PPC64_GOT16_HI:
14951 case R_PPC64_TOC16_HI:
14952 /* These relocs would only be useful if building up an
14953 offset to later add to r2, perhaps in an indexed
14954 addressing mode instruction. Don't try to optimize.
14955 Unfortunately, the possibility of someone building up an
14956 offset like this or even with the HA relocs, means that
14957 we need to check the high insn when optimizing the low
14958 insn. */
14959 break;
14960
23cedd1d
AM
14961 case R_PPC64_PLTCALL:
14962 if (unresolved_reloc)
14963 {
14964 /* No plt entry. Make this into a direct call. */
14965 bfd_byte *p = contents + rel->r_offset;
14966 insn = bfd_get_32 (input_bfd, p);
14967 insn &= 1;
14968 bfd_put_32 (input_bfd, B_DOT | insn, p);
14969 bfd_put_32 (input_bfd, NOP, p + 4);
14970 unresolved_reloc = save_unresolved_reloc;
14971 r_type = R_PPC64_REL24;
14972 }
14973 break;
14974
14975 case R_PPC64_PLTSEQ:
14976 if (unresolved_reloc)
14977 {
14978 unresolved_reloc = FALSE;
14979 goto nop_it;
14980 }
14981 break;
14982
14983 case R_PPC64_PLT16_HA:
14984 if (unresolved_reloc)
14985 {
14986 unresolved_reloc = FALSE;
14987 goto nop_it;
14988 }
14989 /* Fall through. */
67f0cbdb
AM
14990 case R_PPC64_GOT_TLSLD16_HA:
14991 case R_PPC64_GOT_TLSGD16_HA:
14992 case R_PPC64_GOT_TPREL16_HA:
14993 case R_PPC64_GOT_DTPREL16_HA:
14994 case R_PPC64_GOT16_HA:
14995 case R_PPC64_TOC16_HA:
98528052 14996 if (htab->do_toc_opt && relocation + addend + 0x8000 < 0x10000
560c8763 14997 && !ppc64_elf_tdata (input_bfd)->unexpected_toc_insn)
98528052 14998 {
23cedd1d
AM
14999 bfd_byte *p;
15000 nop_it:
15001 p = contents + (rel->r_offset & ~3);
98528052 15002 bfd_put_32 (input_bfd, NOP, p);
d830549d 15003 goto copy_reloc;
98528052 15004 }
67f0cbdb
AM
15005 break;
15006
23cedd1d
AM
15007 case R_PPC64_PLT16_LO:
15008 case R_PPC64_PLT16_LO_DS:
15009 if (unresolved_reloc)
15010 {
15011 unresolved_reloc = FALSE;
15012 goto nop_it;
15013 }
15014 /* Fall through. */
67f0cbdb
AM
15015 case R_PPC64_GOT_TLSLD16_LO:
15016 case R_PPC64_GOT_TLSGD16_LO:
15017 case R_PPC64_GOT_TPREL16_LO_DS:
15018 case R_PPC64_GOT_DTPREL16_LO_DS:
15019 case R_PPC64_GOT16_LO:
15020 case R_PPC64_GOT16_LO_DS:
15021 case R_PPC64_TOC16_LO:
15022 case R_PPC64_TOC16_LO_DS:
98528052 15023 if (htab->do_toc_opt && relocation + addend + 0x8000 < 0x10000
560c8763 15024 && !ppc64_elf_tdata (input_bfd)->unexpected_toc_insn)
67f0cbdb
AM
15025 {
15026 bfd_byte *p = contents + (rel->r_offset & ~3);
15027 insn = bfd_get_32 (input_bfd, p);
560c8763
AM
15028 if ((insn & (0x3f << 26)) == 12u << 26 /* addic */)
15029 {
15030 /* Transform addic to addi when we change reg. */
15031 insn &= ~((0x3f << 26) | (0x1f << 16));
15032 insn |= (14u << 26) | (2 << 16);
15033 }
15034 else
67f0cbdb 15035 {
98528052
AM
15036 insn &= ~(0x1f << 16);
15037 insn |= 2 << 16;
67f0cbdb 15038 }
560c8763 15039 bfd_put_32 (input_bfd, insn, p);
67f0cbdb
AM
15040 }
15041 break;
9a23f96e
AM
15042
15043 case R_PPC64_TPREL16_HA:
15044 if (htab->do_tls_opt && relocation + addend + 0x8000 < 0x10000)
15045 {
15046 bfd_byte *p = contents + (rel->r_offset & ~3);
15047 insn = bfd_get_32 (input_bfd, p);
15048 if ((insn & ((0x3f << 26) | 0x1f << 16))
15049 != ((15u << 26) | (13 << 16)) /* addis rt,13,imm */)
15050 /* xgettext:c-format */
15051 info->callbacks->minfo
15052 (_("%H: warning: %s unexpected insn %#x.\n"),
d830549d
AM
15053 input_bfd, input_section, rel->r_offset,
15054 ppc64_elf_howto_table[r_type]->name, insn);
9a23f96e 15055 else
d830549d
AM
15056 {
15057 bfd_put_32 (input_bfd, NOP, p);
15058 goto copy_reloc;
15059 }
9a23f96e
AM
15060 }
15061 break;
15062
15063 case R_PPC64_TPREL16_LO:
15064 case R_PPC64_TPREL16_LO_DS:
15065 if (htab->do_tls_opt && relocation + addend + 0x8000 < 0x10000)
15066 {
15067 bfd_byte *p = contents + (rel->r_offset & ~3);
15068 insn = bfd_get_32 (input_bfd, p);
15069 insn &= ~(0x1f << 16);
15070 insn |= 13 << 16;
15071 bfd_put_32 (input_bfd, insn, p);
15072 }
15073 break;
67f0cbdb
AM
15074 }
15075
65f38f15
AM
15076 /* Do any further special processing. */
15077 switch (r_type)
15078 {
15079 default:
15080 break;
15081
25f23106 15082 case R_PPC64_REL16_HA:
4a969973
AM
15083 case R_PPC64_REL16_HIGHA:
15084 case R_PPC64_REL16_HIGHERA:
15085 case R_PPC64_REL16_HIGHESTA:
a680de9a 15086 case R_PPC64_REL16DX_HA:
f9c6b907
AM
15087 case R_PPC64_ADDR16_HA:
15088 case R_PPC64_ADDR16_HIGHA:
65f38f15
AM
15089 case R_PPC64_ADDR16_HIGHERA:
15090 case R_PPC64_ADDR16_HIGHESTA:
65f38f15
AM
15091 case R_PPC64_TOC16_HA:
15092 case R_PPC64_SECTOFF_HA:
411e1bfb 15093 case R_PPC64_TPREL16_HA:
f9c6b907 15094 case R_PPC64_TPREL16_HIGHA:
411e1bfb 15095 case R_PPC64_TPREL16_HIGHERA:
411e1bfb 15096 case R_PPC64_TPREL16_HIGHESTA:
f9c6b907
AM
15097 case R_PPC64_DTPREL16_HA:
15098 case R_PPC64_DTPREL16_HIGHA:
411e1bfb 15099 case R_PPC64_DTPREL16_HIGHERA:
411e1bfb 15100 case R_PPC64_DTPREL16_HIGHESTA:
65f38f15
AM
15101 /* It's just possible that this symbol is a weak symbol
15102 that's not actually defined anywhere. In that case,
15103 'sec' would be NULL, and we should leave the symbol
15104 alone (it will be set to zero elsewhere in the link). */
5c5f6e17
AM
15105 if (sec == NULL)
15106 break;
1a0670f3 15107 /* Fall through. */
5c5f6e17
AM
15108
15109 case R_PPC64_GOT16_HA:
15110 case R_PPC64_PLTGOT16_HA:
15111 case R_PPC64_PLT16_HA:
15112 case R_PPC64_GOT_TLSGD16_HA:
15113 case R_PPC64_GOT_TLSLD16_HA:
15114 case R_PPC64_GOT_TPREL16_HA:
15115 case R_PPC64_GOT_DTPREL16_HA:
15116 /* Add 0x10000 if sign bit in 0:15 is set.
15117 Bits 0:15 are not used. */
15118 addend += 0x8000;
65f38f15
AM
15119 break;
15120
15121 case R_PPC64_ADDR16_DS:
15122 case R_PPC64_ADDR16_LO_DS:
15123 case R_PPC64_GOT16_DS:
15124 case R_PPC64_GOT16_LO_DS:
15125 case R_PPC64_PLT16_LO_DS:
15126 case R_PPC64_SECTOFF_DS:
15127 case R_PPC64_SECTOFF_LO_DS:
15128 case R_PPC64_TOC16_DS:
15129 case R_PPC64_TOC16_LO_DS:
15130 case R_PPC64_PLTGOT16_DS:
15131 case R_PPC64_PLTGOT16_LO_DS:
411e1bfb
AM
15132 case R_PPC64_GOT_TPREL16_DS:
15133 case R_PPC64_GOT_TPREL16_LO_DS:
15134 case R_PPC64_GOT_DTPREL16_DS:
15135 case R_PPC64_GOT_DTPREL16_LO_DS:
15136 case R_PPC64_TPREL16_DS:
15137 case R_PPC64_TPREL16_LO_DS:
15138 case R_PPC64_DTPREL16_DS:
15139 case R_PPC64_DTPREL16_LO_DS:
adadcc0c
AM
15140 insn = bfd_get_32 (input_bfd, contents + (rel->r_offset & ~3));
15141 mask = 3;
a680de9a
PB
15142 /* If this reloc is against an lq, lxv, or stxv insn, then
15143 the value must be a multiple of 16. This is somewhat of
15144 a hack, but the "correct" way to do this by defining _DQ
15145 forms of all the _DS relocs bloats all reloc switches in
15146 this file. It doesn't make much sense to use these
15147 relocs in data, so testing the insn should be safe. */
15148 if ((insn & (0x3f << 26)) == (56u << 26)
15149 || ((insn & (0x3f << 26)) == (61u << 26) && (insn & 3) == 1))
adadcc0c 15150 mask = 15;
a680de9a
PB
15151 relocation += addend;
15152 addend = insn & (mask ^ 3);
15153 if ((relocation & mask) != 0)
65f38f15 15154 {
a680de9a 15155 relocation ^= relocation & mask;
25f53a85 15156 info->callbacks->einfo
695344c0 15157 /* xgettext:c-format */
174d0a74 15158 (_("%H: error: %s not a multiple of %u\n"),
25f53a85 15159 input_bfd, input_section, rel->r_offset,
d830549d 15160 ppc64_elf_howto_table[r_type]->name,
adadcc0c 15161 mask + 1);
65f38f15 15162 bfd_set_error (bfd_error_bad_value);
b34976b6 15163 ret = FALSE;
c316a17c 15164 goto copy_reloc;
65f38f15
AM
15165 }
15166 break;
5bd4f169
AM
15167 }
15168
239e1f3a
AM
15169 /* Dynamic relocs are not propagated for SEC_DEBUGGING sections
15170 because such sections are not SEC_ALLOC and thus ld.so will
15171 not process them. */
d830549d 15172 howto = ppc64_elf_howto_table[(int) r_type];
65f38f15 15173 if (unresolved_reloc
239e1f3a 15174 && !((input_section->flags & SEC_DEBUGGING) != 0
1d5316ab
AM
15175 && h->elf.def_dynamic)
15176 && _bfd_elf_section_offset (output_bfd, info, input_section,
15177 rel->r_offset) != (bfd_vma) -1)
9c07fe7c 15178 {
25f53a85 15179 info->callbacks->einfo
695344c0 15180 /* xgettext:c-format */
c1c8c1ef 15181 (_("%H: unresolvable %s against `%pT'\n"),
25f53a85 15182 input_bfd, input_section, rel->r_offset,
b80eed39 15183 howto->name,
039b3fef 15184 h->elf.root.root.string);
b34976b6 15185 ret = FALSE;
9c07fe7c 15186 }
5bd4f169 15187
b80eed39
AM
15188 /* 16-bit fields in insns mostly have signed values, but a
15189 few insns have 16-bit unsigned values. Really, we should
15190 have different reloc types. */
15191 if (howto->complain_on_overflow != complain_overflow_dont
15192 && howto->dst_mask == 0xffff
15193 && (input_section->flags & SEC_CODE) != 0)
15194 {
15195 enum complain_overflow complain = complain_overflow_signed;
15196
15197 insn = bfd_get_32 (input_bfd, contents + (rel->r_offset & ~3));
a47622ac
AM
15198 if ((insn & (0x3f << 26)) == 10u << 26 /* cmpli */)
15199 complain = complain_overflow_bitfield;
15200 else if (howto->rightshift == 0
15201 ? ((insn & (0x3f << 26)) == 28u << 26 /* andi */
15202 || (insn & (0x3f << 26)) == 24u << 26 /* ori */
15203 || (insn & (0x3f << 26)) == 26u << 26 /* xori */)
15204 : ((insn & (0x3f << 26)) == 29u << 26 /* andis */
15205 || (insn & (0x3f << 26)) == 25u << 26 /* oris */
15206 || (insn & (0x3f << 26)) == 27u << 26 /* xoris */))
b80eed39
AM
15207 complain = complain_overflow_unsigned;
15208 if (howto->complain_on_overflow != complain)
15209 {
15210 alt_howto = *howto;
15211 alt_howto.complain_on_overflow = complain;
15212 howto = &alt_howto;
15213 }
15214 }
15215
a680de9a
PB
15216 if (r_type == R_PPC64_REL16DX_HA)
15217 {
15218 /* Split field reloc isn't handled by _bfd_final_link_relocate. */
15219 if (rel->r_offset + 4 > input_section->size)
15220 r = bfd_reloc_outofrange;
15221 else
15222 {
15223 relocation += addend;
15224 relocation -= (rel->r_offset
15225 + input_section->output_offset
15226 + input_section->output_section->vma);
3de43e7b 15227 relocation = (bfd_signed_vma) relocation >> 16;
a680de9a
PB
15228 insn = bfd_get_32 (input_bfd, contents + rel->r_offset);
15229 insn &= ~0x1fffc1;
3de43e7b 15230 insn |= (relocation & 0xffc1) | ((relocation & 0x3e) << 15);
a680de9a
PB
15231 bfd_put_32 (input_bfd, insn, contents + rel->r_offset);
15232 r = bfd_reloc_ok;
3de43e7b 15233 if (relocation + 0x8000 > 0xffff)
a680de9a
PB
15234 r = bfd_reloc_overflow;
15235 }
15236 }
15237 else
15238 r = _bfd_final_link_relocate (howto, input_bfd, input_section, contents,
15239 rel->r_offset, relocation, addend);
5bd4f169 15240
ef60b7ff 15241 if (r != bfd_reloc_ok)
5bd4f169 15242 {
bc30df16 15243 char *more_info = NULL;
b80eed39 15244 const char *reloc_name = howto->name;
bc30df16
AM
15245
15246 if (reloc_dest != DEST_NORMAL)
15247 {
15248 more_info = bfd_malloc (strlen (reloc_name) + 8);
15249 if (more_info != NULL)
15250 {
15251 strcpy (more_info, reloc_name);
15252 strcat (more_info, (reloc_dest == DEST_OPD
15253 ? " (OPD)" : " (stub)"));
15254 reloc_name = more_info;
15255 }
15256 }
15257
cd27b276 15258 if (r == bfd_reloc_overflow)
5bd4f169 15259 {
8131c122
AM
15260 /* On code like "if (foo) foo();" don't report overflow
15261 on a branch to zero when foo is undefined. */
15262 if (!warned
15263 && (reloc_dest == DEST_STUB
15264 || !(h != NULL
15265 && (h->elf.root.type == bfd_link_hash_undefweak
15266 || h->elf.root.type == bfd_link_hash_undefined)
15267 && is_branch_reloc (r_type))))
1a72702b
AM
15268 info->callbacks->reloc_overflow (info, &h->elf.root,
15269 sym_name, reloc_name,
15270 orig_rel.r_addend,
15271 input_bfd, input_section,
15272 rel->r_offset);
ef60b7ff
AM
15273 }
15274 else
15275 {
25f53a85 15276 info->callbacks->einfo
695344c0 15277 /* xgettext:c-format */
c1c8c1ef 15278 (_("%H: %s against `%pT': error %d\n"),
25f53a85 15279 input_bfd, input_section, rel->r_offset,
bc30df16 15280 reloc_name, sym_name, (int) r);
b34976b6 15281 ret = FALSE;
ef60b7ff 15282 }
bc30df16
AM
15283 if (more_info != NULL)
15284 free (more_info);
5bd4f169 15285 }
c316a17c
AM
15286 copy_reloc:
15287 if (wrel != rel)
15288 *wrel = *rel;
15289 }
15290
15291 if (wrel != rel)
15292 {
15293 Elf_Internal_Shdr *rel_hdr;
15294 size_t deleted = rel - wrel;
15295
15296 rel_hdr = _bfd_elf_single_rel_hdr (input_section->output_section);
15297 rel_hdr->sh_size -= rel_hdr->sh_entsize * deleted;
15298 if (rel_hdr->sh_size == 0)
15299 {
15300 /* It is too late to remove an empty reloc section. Leave
15301 one NONE reloc.
15302 ??? What is wrong with an empty section??? */
15303 rel_hdr->sh_size = rel_hdr->sh_entsize;
15304 deleted -= 1;
15305 }
15306 rel_hdr = _bfd_elf_single_rel_hdr (input_section);
15307 rel_hdr->sh_size -= rel_hdr->sh_entsize * deleted;
15308 input_section->reloc_count -= deleted;
5bd4f169
AM
15309 }
15310
645ea6a9
AM
15311 /* If we're emitting relocations, then shortly after this function
15312 returns, reloc offsets and addends for this section will be
15313 adjusted. Worse, reloc symbol indices will be for the output
8860955f
AM
15314 file rather than the input. Save a copy of the relocs for
15315 opd_entry_value. */
0e1862bb 15316 if (is_opd && (info->emitrelocations || bfd_link_relocatable (info)))
8860955f
AM
15317 {
15318 bfd_size_type amt;
15319 amt = input_section->reloc_count * sizeof (Elf_Internal_Rela);
15320 rel = bfd_alloc (input_bfd, amt);
729eabd5
AM
15321 BFD_ASSERT (ppc64_elf_tdata (input_bfd)->opd.relocs == NULL);
15322 ppc64_elf_tdata (input_bfd)->opd.relocs = rel;
8860955f
AM
15323 if (rel == NULL)
15324 return FALSE;
15325 memcpy (rel, relocs, amt);
15326 }
5bd4f169
AM
15327 return ret;
15328}
15329
754021d0
AM
15330/* Adjust the value of any local symbols in opd sections. */
15331
6e0b88f1 15332static int
754021d0
AM
15333ppc64_elf_output_symbol_hook (struct bfd_link_info *info,
15334 const char *name ATTRIBUTE_UNUSED,
15335 Elf_Internal_Sym *elfsym,
15336 asection *input_sec,
15337 struct elf_link_hash_entry *h)
15338{
74f0fb50
AM
15339 struct _opd_sec_data *opd;
15340 long adjust;
754021d0
AM
15341 bfd_vma value;
15342
4025353c 15343 if (h != NULL)
6e0b88f1 15344 return 1;
4025353c 15345
74f0fb50
AM
15346 opd = get_opd_info (input_sec);
15347 if (opd == NULL || opd->adjust == NULL)
6e0b88f1 15348 return 1;
754021d0
AM
15349
15350 value = elfsym->st_value - input_sec->output_offset;
0e1862bb 15351 if (!bfd_link_relocatable (info))
754021d0
AM
15352 value -= input_sec->output_section->vma;
15353
51aecdc5 15354 adjust = opd->adjust[OPD_NDX (value)];
4025353c 15355 if (adjust == -1)
6e0b88f1
AM
15356 return 2;
15357
15358 elfsym->st_value += adjust;
15359 return 1;
754021d0
AM
15360}
15361
5bd4f169
AM
15362/* Finish up dynamic symbol handling. We set the contents of various
15363 dynamic sections here. */
15364
b34976b6 15365static bfd_boolean
4ce794b7
AM
15366ppc64_elf_finish_dynamic_symbol (bfd *output_bfd,
15367 struct bfd_link_info *info,
15368 struct elf_link_hash_entry *h,
4aef7643 15369 Elf_Internal_Sym *sym)
5bd4f169 15370{
65f38f15 15371 struct ppc_link_hash_table *htab;
8387904d 15372 struct plt_entry *ent;
5bd4f169 15373
65f38f15 15374 htab = ppc_hash_table (info);
4dfe6ac6
NC
15375 if (htab == NULL)
15376 return FALSE;
5bd4f169 15377
49c09209
AM
15378 if (!htab->opd_abi && !h->def_regular)
15379 for (ent = h->plt.plist; ent != NULL; ent = ent->next)
15380 if (ent->plt.offset != (bfd_vma) -1)
15381 {
15382 /* Mark the symbol as undefined, rather than as
15383 defined in glink. Leave the value if there were
15384 any relocations where pointer equality matters
15385 (this is a clue for the dynamic linker, to make
15386 function pointer comparisons work between an
15387 application and shared library), otherwise set it
15388 to zero. */
15389 sym->st_shndx = SHN_UNDEF;
15390 if (!h->pointer_equality_needed)
15391 sym->st_value = 0;
15392 else if (!h->ref_regular_nonweak)
15393 {
15394 /* This breaks function pointer comparisons, but
15395 that is better than breaking tests for a NULL
15396 function pointer. */
15397 sym->st_value = 0;
15398 }
15399 break;
15400 }
5bd4f169 15401
f5385ebf 15402 if (h->needs_copy)
5bd4f169 15403 {
65f38f15 15404 /* This symbol needs a copy reloc. Set it up. */
49c09209 15405 Elf_Internal_Rela rela;
5474d94f 15406 asection *srel;
49c09209 15407 bfd_byte *loc;
5bd4f169 15408
65f38f15
AM
15409 if (h->dynindx == -1
15410 || (h->root.type != bfd_link_hash_defined
15411 && h->root.type != bfd_link_hash_defweak)
5474d94f
AM
15412 || htab->elf.srelbss == NULL
15413 || htab->elf.sreldynrelro == NULL)
65f38f15 15414 abort ();
5bd4f169
AM
15415
15416 rela.r_offset = (h->root.u.def.value
15417 + h->root.u.def.section->output_section->vma
15418 + h->root.u.def.section->output_offset);
15419 rela.r_info = ELF64_R_INFO (h->dynindx, R_PPC64_COPY);
15420 rela.r_addend = 0;
afbf7e8e 15421 if (h->root.u.def.section == htab->elf.sdynrelro)
5474d94f
AM
15422 srel = htab->elf.sreldynrelro;
15423 else
15424 srel = htab->elf.srelbss;
15425 loc = srel->contents;
15426 loc += srel->reloc_count++ * sizeof (Elf64_External_Rela);
65f38f15 15427 bfd_elf64_swap_reloca_out (output_bfd, &rela, loc);
5bd4f169
AM
15428 }
15429
b34976b6 15430 return TRUE;
5bd4f169
AM
15431}
15432
65f38f15
AM
15433/* Used to decide how to sort relocs in an optimal manner for the
15434 dynamic linker, before writing them out. */
15435
15436static enum elf_reloc_type_class
7e612e98
AM
15437ppc64_elf_reloc_type_class (const struct bfd_link_info *info,
15438 const asection *rel_sec,
15439 const Elf_Internal_Rela *rela)
65f38f15 15440{
04c9666a 15441 enum elf_ppc64_reloc_type r_type;
7e612e98
AM
15442 struct ppc_link_hash_table *htab = ppc_hash_table (info);
15443
33e44f2e 15444 if (rel_sec == htab->elf.irelplt)
7e612e98 15445 return reloc_class_ifunc;
a33d1f77 15446
4ce794b7 15447 r_type = ELF64_R_TYPE (rela->r_info);
a33d1f77 15448 switch (r_type)
65f38f15
AM
15449 {
15450 case R_PPC64_RELATIVE:
15451 return reloc_class_relative;
15452 case R_PPC64_JMP_SLOT:
15453 return reloc_class_plt;
15454 case R_PPC64_COPY:
15455 return reloc_class_copy;
15456 default:
15457 return reloc_class_normal;
15458 }
15459}
15460
5bd4f169
AM
15461/* Finish up the dynamic sections. */
15462
b34976b6 15463static bfd_boolean
4ce794b7
AM
15464ppc64_elf_finish_dynamic_sections (bfd *output_bfd,
15465 struct bfd_link_info *info)
5bd4f169 15466{
65f38f15
AM
15467 struct ppc_link_hash_table *htab;
15468 bfd *dynobj;
5bd4f169 15469 asection *sdyn;
5bd4f169 15470
65f38f15 15471 htab = ppc_hash_table (info);
4dfe6ac6
NC
15472 if (htab == NULL)
15473 return FALSE;
15474
65f38f15 15475 dynobj = htab->elf.dynobj;
3d4d4302 15476 sdyn = bfd_get_linker_section (dynobj, ".dynamic");
5bd4f169 15477
65f38f15 15478 if (htab->elf.dynamic_sections_created)
5bd4f169 15479 {
5bd4f169
AM
15480 Elf64_External_Dyn *dyncon, *dynconend;
15481
33e44f2e 15482 if (sdyn == NULL || htab->elf.sgot == NULL)
65f38f15 15483 abort ();
5bd4f169
AM
15484
15485 dyncon = (Elf64_External_Dyn *) sdyn->contents;
eea6121a 15486 dynconend = (Elf64_External_Dyn *) (sdyn->contents + sdyn->size);
5bd4f169
AM
15487 for (; dyncon < dynconend; dyncon++)
15488 {
15489 Elf_Internal_Dyn dyn;
19397422 15490 asection *s;
5bd4f169
AM
15491
15492 bfd_elf64_swap_dyn_in (dynobj, dyncon, &dyn);
15493
15494 switch (dyn.d_tag)
15495 {
65f38f15
AM
15496 default:
15497 continue;
5bd4f169 15498
5d1634d7 15499 case DT_PPC64_GLINK:
4ce794b7 15500 s = htab->glink;
6348e046 15501 dyn.d_un.d_ptr = s->output_section->vma + s->output_offset;
ad8e1ba5
AM
15502 /* We stupidly defined DT_PPC64_GLINK to be the start
15503 of glink rather than the first entry point, which is
15504 what ld.so needs, and now have a bigger stub to
15505 support automatic multiple TOCs. */
9e390558 15506 dyn.d_un.d_ptr += GLINK_PLTRESOLVE_SIZE (htab) - 8 * 4;
5d1634d7
AM
15507 break;
15508
19397422
AM
15509 case DT_PPC64_OPD:
15510 s = bfd_get_section_by_name (output_bfd, ".opd");
6348e046
AM
15511 if (s == NULL)
15512 continue;
15513 dyn.d_un.d_ptr = s->vma;
19397422
AM
15514 break;
15515
e8910a83
AM
15516 case DT_PPC64_OPT:
15517 if (htab->do_multi_toc && htab->multi_toc_needed)
15518 dyn.d_un.d_val |= PPC64_OPT_MULTI_TOC;
f378ab09
AM
15519 if (htab->has_plt_localentry0)
15520 dyn.d_un.d_val |= PPC64_OPT_LOCALENTRY;
e8910a83
AM
15521 break;
15522
19397422
AM
15523 case DT_PPC64_OPDSZ:
15524 s = bfd_get_section_by_name (output_bfd, ".opd");
6348e046
AM
15525 if (s == NULL)
15526 continue;
eea6121a 15527 dyn.d_un.d_val = s->size;
19397422
AM
15528 break;
15529
65f38f15 15530 case DT_PLTGOT:
33e44f2e 15531 s = htab->elf.splt;
6348e046 15532 dyn.d_un.d_ptr = s->output_section->vma + s->output_offset;
65f38f15
AM
15533 break;
15534
15535 case DT_JMPREL:
33e44f2e 15536 s = htab->elf.srelplt;
6348e046 15537 dyn.d_un.d_ptr = s->output_section->vma + s->output_offset;
65f38f15 15538 break;
5bd4f169 15539
65f38f15 15540 case DT_PLTRELSZ:
33e44f2e 15541 dyn.d_un.d_val = htab->elf.srelplt->size;
5d1634d7 15542 break;
82e66161
AM
15543
15544 case DT_TEXTREL:
15545 if (htab->local_ifunc_resolver)
15546 info->callbacks->einfo
15547 (_("%X%P: text relocations and GNU indirect "
15548 "functions will result in a segfault at runtime\n"));
15549 else if (htab->maybe_local_ifunc_resolver)
15550 info->callbacks->einfo
15551 (_("%P: warning: text relocations and GNU indirect "
15552 "functions may result in a segfault at runtime\n"));
15553 continue;
5bd4f169 15554 }
5bd4f169 15555
65f38f15 15556 bfd_elf64_swap_dyn_out (output_bfd, &dyn, dyncon);
5bd4f169 15557 }
5bd4f169
AM
15558 }
15559
6528b6eb
AM
15560 if (htab->elf.sgot != NULL && htab->elf.sgot->size != 0
15561 && htab->elf.sgot->output_section != bfd_abs_section_ptr)
5d1634d7
AM
15562 {
15563 /* Fill in the first entry in the global offset table.
15564 We use it to hold the link-time TOCbase. */
15565 bfd_put_64 (output_bfd,
60ee0d4a 15566 elf_gp (output_bfd) + TOC_BASE_OFF,
33e44f2e 15567 htab->elf.sgot->contents);
5d1634d7
AM
15568
15569 /* Set .got entry size. */
2cdcc330
AM
15570 elf_section_data (htab->elf.sgot->output_section)->this_hdr.sh_entsize
15571 = 8;
5d1634d7
AM
15572 }
15573
6528b6eb
AM
15574 if (htab->elf.splt != NULL && htab->elf.splt->size != 0
15575 && htab->elf.splt->output_section != bfd_abs_section_ptr)
5d1634d7
AM
15576 {
15577 /* Set .plt entry size. */
33e44f2e 15578 elf_section_data (htab->elf.splt->output_section)->this_hdr.sh_entsize
b9e5796b 15579 = PLT_ENTRY_SIZE (htab);
5d1634d7
AM
15580 }
15581
84f5d08e
AM
15582 /* brlt is SEC_LINKER_CREATED, so we need to write out relocs for
15583 brlt ourselves if emitrelocations. */
15584 if (htab->brlt != NULL
15585 && htab->brlt->reloc_count != 0
15586 && !_bfd_elf_link_output_relocs (output_bfd,
15587 htab->brlt,
d4730f92 15588 elf_section_data (htab->brlt)->rela.hdr,
84f5d08e
AM
15589 elf_section_data (htab->brlt)->relocs,
15590 NULL))
15591 return FALSE;
15592
176a0d42
AM
15593 if (htab->glink != NULL
15594 && htab->glink->reloc_count != 0
15595 && !_bfd_elf_link_output_relocs (output_bfd,
15596 htab->glink,
d4730f92 15597 elf_section_data (htab->glink)->rela.hdr,
176a0d42
AM
15598 elf_section_data (htab->glink)->relocs,
15599 NULL))
15600 return FALSE;
15601
da44f4e5 15602
df136d64
AM
15603 if (htab->glink_eh_frame != NULL
15604 && htab->glink_eh_frame->size != 0
15605 && htab->glink_eh_frame->sec_info_type == SEC_INFO_TYPE_EH_FRAME
15606 && !_bfd_elf_write_section_eh_frame (output_bfd, info,
15607 htab->glink_eh_frame,
15608 htab->glink_eh_frame->contents))
15609 return FALSE;
58d180e8 15610
e717da7e 15611 /* We need to handle writing out multiple GOT sections ourselves,
7b53ace3
AM
15612 since we didn't add them to DYNOBJ. We know dynobj is the first
15613 bfd. */
c72f2fb2 15614 while ((dynobj = dynobj->link.next) != NULL)
e717da7e
AM
15615 {
15616 asection *s;
7b53ace3 15617
0c8d6e5c 15618 if (!is_ppc64_elf (dynobj))
7b53ace3
AM
15619 continue;
15620
e717da7e
AM
15621 s = ppc64_elf_tdata (dynobj)->got;
15622 if (s != NULL
eea6121a 15623 && s->size != 0
e717da7e
AM
15624 && s->output_section != bfd_abs_section_ptr
15625 && !bfd_set_section_contents (output_bfd, s->output_section,
15626 s->contents, s->output_offset,
eea6121a 15627 s->size))
e717da7e
AM
15628 return FALSE;
15629 s = ppc64_elf_tdata (dynobj)->relgot;
15630 if (s != NULL
eea6121a 15631 && s->size != 0
e717da7e
AM
15632 && s->output_section != bfd_abs_section_ptr
15633 && !bfd_set_section_contents (output_bfd, s->output_section,
15634 s->contents, s->output_offset,
eea6121a 15635 s->size))
e717da7e
AM
15636 return FALSE;
15637 }
f6c52c13 15638
b34976b6 15639 return TRUE;
5bd4f169
AM
15640}
15641
5bd4f169 15642#include "elf64-target.h"
7b8e7dad
AM
15643
15644/* FreeBSD support */
15645
15646#undef TARGET_LITTLE_SYM
15647#undef TARGET_LITTLE_NAME
15648
15649#undef TARGET_BIG_SYM
6d00b590 15650#define TARGET_BIG_SYM powerpc_elf64_fbsd_vec
7b8e7dad
AM
15651#undef TARGET_BIG_NAME
15652#define TARGET_BIG_NAME "elf64-powerpc-freebsd"
15653
15654#undef ELF_OSABI
15655#define ELF_OSABI ELFOSABI_FREEBSD
15656
15657#undef elf64_bed
15658#define elf64_bed elf64_powerpc_fbsd_bed
15659
15660#include "elf64-target.h"
This page took 3.213524 seconds and 4 git commands to generate.