[gdb/symtab] Make gold index workaround more precise
[deliverable/binutils-gdb.git] / bfd / elf64-ppc.c
CommitLineData
5bd4f169 1/* PowerPC64-specific support for 64-bit ELF.
b3adc24a 2 Copyright (C) 1999-2020 Free Software Foundation, Inc.
5bd4f169
AM
3 Written by Linus Nordberg, Swox AB <info@swox.com>,
4 based on elf32-ppc.c by Ian Lance Taylor.
32ca9640 5 Largely rewritten by Alan Modra.
5bd4f169 6
ae9a127f 7 This file is part of BFD, the Binary File Descriptor library.
5bd4f169 8
ae9a127f
NC
9 This program is free software; you can redistribute it and/or modify
10 it under the terms of the GNU General Public License as published by
cd123cb7 11 the Free Software Foundation; either version 3 of the License, or
ae9a127f 12 (at your option) any later version.
5bd4f169 13
ae9a127f
NC
14 This program is distributed in the hope that it will be useful,
15 but WITHOUT ANY WARRANTY; without even the implied warranty of
16 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
17 GNU General Public License for more details.
5bd4f169 18
4ce794b7
AM
19 You should have received a copy of the GNU General Public License along
20 with this program; if not, write to the Free Software Foundation, Inc.,
3e110533 21 51 Franklin Street - Fifth Floor, Boston, MA 02110-1301, USA. */
5bd4f169 22
cd123cb7 23
4ce794b7
AM
24/* The 64-bit PowerPC ELF ABI may be found at
25 http://www.linuxbase.org/spec/ELF/ppc64/PPC-elf64abi.txt, and
26 http://www.linuxbase.org/spec/ELF/ppc64/spec/book1.html */
5bd4f169 27
3db64b00 28#include "sysdep.h"
183e98be 29#include <stdarg.h>
5bd4f169 30#include "bfd.h"
5bd4f169
AM
31#include "bfdlink.h"
32#include "libbfd.h"
33#include "elf-bfd.h"
04c9666a 34#include "elf/ppc64.h"
5d1634d7 35#include "elf64-ppc.h"
58d180e8 36#include "dwarf2.h"
5bd4f169 37
bb294208
AM
38/* All users of this file have bfd_octets_per_byte (abfd, sec) == 1. */
39#define OCTETS_PER_BYTE(ABFD, SEC) 1
40
805fc799 41static bfd_reloc_status_type ppc64_elf_ha_reloc
4ce794b7 42 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
2441e016
AM
43static bfd_reloc_status_type ppc64_elf_branch_reloc
44 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
805fc799 45static bfd_reloc_status_type ppc64_elf_brtaken_reloc
4ce794b7 46 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
805fc799 47static bfd_reloc_status_type ppc64_elf_sectoff_reloc
4ce794b7 48 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
805fc799 49static bfd_reloc_status_type ppc64_elf_sectoff_ha_reloc
4ce794b7 50 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
805fc799 51static bfd_reloc_status_type ppc64_elf_toc_reloc
4ce794b7 52 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
805fc799 53static bfd_reloc_status_type ppc64_elf_toc_ha_reloc
4ce794b7 54 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
805fc799 55static bfd_reloc_status_type ppc64_elf_toc64_reloc
4ce794b7 56 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
5663e321
AM
57static bfd_reloc_status_type ppc64_elf_prefix_reloc
58 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
805fc799 59static bfd_reloc_status_type ppc64_elf_unhandled_reloc
4ce794b7 60 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
2441e016 61static bfd_vma opd_entry_value
aef36ac1 62 (asection *, bfd_vma, asection **, bfd_vma *, bfd_boolean);
5bd4f169 63
6d00b590 64#define TARGET_LITTLE_SYM powerpc_elf64_le_vec
ad8e1ba5 65#define TARGET_LITTLE_NAME "elf64-powerpcle"
6d00b590 66#define TARGET_BIG_SYM powerpc_elf64_vec
ad8e1ba5
AM
67#define TARGET_BIG_NAME "elf64-powerpc"
68#define ELF_ARCH bfd_arch_powerpc
ae95ffa6 69#define ELF_TARGET_ID PPC64_ELF_DATA
ad8e1ba5
AM
70#define ELF_MACHINE_CODE EM_PPC64
71#define ELF_MAXPAGESIZE 0x10000
702d1671
AM
72#define ELF_COMMONPAGESIZE 0x1000
73#define ELF_RELROPAGESIZE ELF_MAXPAGESIZE
ad8e1ba5
AM
74#define elf_info_to_howto ppc64_elf_info_to_howto
75
76#define elf_backend_want_got_sym 0
77#define elf_backend_want_plt_sym 0
78#define elf_backend_plt_alignment 3
79#define elf_backend_plt_not_loaded 1
ad8e1ba5 80#define elf_backend_got_header_size 8
5474d94f 81#define elf_backend_want_dynrelro 1
ad8e1ba5
AM
82#define elf_backend_can_gc_sections 1
83#define elf_backend_can_refcount 1
84#define elf_backend_rela_normal 1
64f52338 85#define elf_backend_dtrel_excludes_plt 1
6bfdb61b 86#define elf_backend_default_execstack 0
ad8e1ba5 87
e717da7e 88#define bfd_elf64_mkobject ppc64_elf_mkobject
ad8e1ba5 89#define bfd_elf64_bfd_reloc_type_lookup ppc64_elf_reloc_type_lookup
aa374f67 90#define bfd_elf64_bfd_reloc_name_lookup ppc64_elf_reloc_name_lookup
ee67d69a
AM
91#define bfd_elf64_bfd_merge_private_bfd_data ppc64_elf_merge_private_bfd_data
92#define bfd_elf64_bfd_print_private_bfd_data ppc64_elf_print_private_bfd_data
ad8e1ba5
AM
93#define bfd_elf64_new_section_hook ppc64_elf_new_section_hook
94#define bfd_elf64_bfd_link_hash_table_create ppc64_elf_link_hash_table_create
90e3cdf2 95#define bfd_elf64_get_synthetic_symtab ppc64_elf_get_synthetic_symtab
aa374f67 96#define bfd_elf64_bfd_link_just_syms ppc64_elf_link_just_syms
8c5b4e52 97#define bfd_elf64_bfd_gc_sections ppc64_elf_gc_sections
ad8e1ba5
AM
98
99#define elf_backend_object_p ppc64_elf_object_p
d37c89e5
AM
100#define elf_backend_grok_prstatus ppc64_elf_grok_prstatus
101#define elf_backend_grok_psinfo ppc64_elf_grok_psinfo
183e98be 102#define elf_backend_write_core_note ppc64_elf_write_core_note
9d19e4fd 103#define elf_backend_create_dynamic_sections _bfd_elf_create_dynamic_sections
ad8e1ba5 104#define elf_backend_copy_indirect_symbol ppc64_elf_copy_indirect_symbol
555cd476 105#define elf_backend_add_symbol_hook ppc64_elf_add_symbol_hook
f6c7c3e8 106#define elf_backend_check_directives ppc64_elf_before_check_relocs
e5034e59 107#define elf_backend_notice_as_needed ppc64_elf_notice_as_needed
8387904d 108#define elf_backend_archive_symbol_lookup ppc64_elf_archive_symbol_lookup
ad8e1ba5 109#define elf_backend_check_relocs ppc64_elf_check_relocs
c0e331c7 110#define elf_backend_relocs_compatible _bfd_elf_relocs_compatible
74f0fb50 111#define elf_backend_gc_keep ppc64_elf_gc_keep
64d03ab5 112#define elf_backend_gc_mark_dynamic_ref ppc64_elf_gc_mark_dynamic_ref
ad8e1ba5 113#define elf_backend_gc_mark_hook ppc64_elf_gc_mark_hook
ad8e1ba5
AM
114#define elf_backend_adjust_dynamic_symbol ppc64_elf_adjust_dynamic_symbol
115#define elf_backend_hide_symbol ppc64_elf_hide_symbol
9f296da3 116#define elf_backend_maybe_function_sym ppc64_elf_maybe_function_sym
ad8e1ba5
AM
117#define elf_backend_always_size_sections ppc64_elf_func_desc_adjust
118#define elf_backend_size_dynamic_sections ppc64_elf_size_dynamic_sections
a345bc8d 119#define elf_backend_hash_symbol ppc64_elf_hash_symbol
74541ad4 120#define elf_backend_init_index_section _bfd_elf_init_2_index_sections
60124e18 121#define elf_backend_action_discarded ppc64_elf_action_discarded
ad8e1ba5
AM
122#define elf_backend_relocate_section ppc64_elf_relocate_section
123#define elf_backend_finish_dynamic_symbol ppc64_elf_finish_dynamic_symbol
124#define elf_backend_reloc_type_class ppc64_elf_reloc_type_class
125#define elf_backend_finish_dynamic_sections ppc64_elf_finish_dynamic_sections
754021d0 126#define elf_backend_link_output_symbol_hook ppc64_elf_output_symbol_hook
29ef7005 127#define elf_backend_special_sections ppc64_elf_special_sections
bf577467 128#define elf_backend_section_flags ppc64_elf_section_flags
6911b7dc 129#define elf_backend_merge_symbol_attribute ppc64_elf_merge_symbol_attribute
8c5b4e52 130#define elf_backend_merge_symbol ppc64_elf_merge_symbol
bce964aa 131#define elf_backend_get_reloc_section bfd_get_section_by_name
ad8e1ba5 132
5bd4f169
AM
133/* The name of the dynamic interpreter. This is put in the .interp
134 section. */
135#define ELF_DYNAMIC_INTERPRETER "/usr/lib/ld.so.1"
136
137/* The size in bytes of an entry in the procedure linkage table. */
b9e5796b 138#define PLT_ENTRY_SIZE(htab) (htab->opd_abi ? 24 : 8)
2d7ad24e 139#define LOCAL_PLT_ENTRY_SIZE(htab) (htab->opd_abi ? 16 : 8)
5bd4f169
AM
140
141/* The initial size of the plt reserved for the dynamic linker. */
b9e5796b 142#define PLT_INITIAL_ENTRY_SIZE(htab) (htab->opd_abi ? 24 : 16)
5bd4f169 143
a078d95a
AM
144/* Offsets to some stack save slots. */
145#define STK_LR 16
146#define STK_TOC(htab) (htab->opd_abi ? 40 : 24)
eb8d7fda 147/* This one is dodgy. ELFv2 does not have a linker word, so use the
a078d95a
AM
148 CR save slot. Used only by optimised __tls_get_addr call stub,
149 relying on __tls_get_addr_opt not saving CR.. */
150#define STK_LINKER(htab) (htab->opd_abi ? 32 : 8)
151
5bd4f169 152/* TOC base pointers offset from start of TOC. */
411e1bfb 153#define TOC_BASE_OFF 0x8000
a27e685f
AM
154/* TOC base alignment. */
155#define TOC_BASE_ALIGN 256
411e1bfb
AM
156
157/* Offset of tp and dtp pointers from start of TLS block. */
158#define TP_OFFSET 0x7000
159#define DTP_OFFSET 0x8000
5bd4f169 160
ad8e1ba5
AM
161/* .plt call stub instructions. The normal stub is like this, but
162 sometimes the .plt entry crosses a 64k boundary and we need to
71a39c98 163 insert an addi to adjust r11. */
a078d95a 164#define STD_R2_0R1 0xf8410000 /* std %r2,0+40(%r1) */
71a39c98
AM
165#define ADDIS_R11_R2 0x3d620000 /* addis %r11,%r2,xxx@ha */
166#define LD_R12_0R11 0xe98b0000 /* ld %r12,xxx+0@l(%r11) */
167#define MTCTR_R12 0x7d8903a6 /* mtctr %r12 */
168#define LD_R2_0R11 0xe84b0000 /* ld %r2,xxx+8@l(%r11) */
169#define LD_R11_0R11 0xe96b0000 /* ld %r11,xxx+16@l(%r11) */
5d1634d7
AM
170#define BCTR 0x4e800420 /* bctr */
171
07d6d2b8 172#define ADDI_R11_R11 0x396b0000 /* addi %r11,%r11,off@l */
05d0e962
AM
173#define ADDI_R12_R11 0x398b0000 /* addi %r12,%r11,off@l */
174#define ADDI_R12_R12 0x398c0000 /* addi %r12,%r12,off@l */
07d6d2b8
AM
175#define ADDIS_R2_R2 0x3c420000 /* addis %r2,%r2,off@ha */
176#define ADDI_R2_R2 0x38420000 /* addi %r2,%r2,off@l */
177
178#define XOR_R2_R12_R12 0x7d826278 /* xor %r2,%r12,%r12 */
179#define ADD_R11_R11_R2 0x7d6b1214 /* add %r11,%r11,%r2 */
180#define XOR_R11_R12_R12 0x7d8b6278 /* xor %r11,%r12,%r12 */
181#define ADD_R2_R2_R11 0x7c425a14 /* add %r2,%r2,%r11 */
182#define CMPLDI_R2_0 0x28220000 /* cmpldi %r2,0 */
183#define BNECTR 0x4ca20420 /* bnectr+ */
184#define BNECTR_P4 0x4ce20420 /* bnectr+ */
794e51c0 185
71a39c98 186#define LD_R12_0R2 0xe9820000 /* ld %r12,xxx+0(%r2) */
ac2df442 187#define LD_R11_0R2 0xe9620000 /* ld %r11,xxx+0(%r2) */
07d6d2b8 188#define LD_R2_0R2 0xe8420000 /* ld %r2,xxx+0(%r2) */
ac2df442 189
07d6d2b8
AM
190#define LD_R2_0R1 0xe8410000 /* ld %r2,0(%r1) */
191#define LD_R2_0R12 0xe84c0000 /* ld %r2,0(%r12) */
192#define ADD_R2_R2_R12 0x7c426214 /* add %r2,%r2,%r12 */
ad8e1ba5 193
04bdff6a 194#define LI_R11_0 0x39600000 /* li %r11,0 */
07d6d2b8 195#define LIS_R2 0x3c400000 /* lis %r2,xxx@ha */
04bdff6a 196#define LIS_R11 0x3d600000 /* lis %r11,xxx@ha */
05d0e962 197#define LIS_R12 0x3d800000 /* lis %r12,xxx@ha */
006589cf
AM
198#define ADDIS_R2_R12 0x3c4c0000 /* addis %r2,%r12,xxx@ha */
199#define ADDIS_R12_R2 0x3d820000 /* addis %r12,%r2,xxx@ha */
05d0e962 200#define ADDIS_R12_R11 0x3d8b0000 /* addis %r12,%r11,xxx@ha */
a345bc8d 201#define ADDIS_R12_R12 0x3d8c0000 /* addis %r12,%r12,xxx@ha */
05d0e962 202#define ORIS_R12_R12_0 0x658c0000 /* oris %r12,%r12,xxx@hi */
04bdff6a 203#define ORI_R11_R11_0 0x616b0000 /* ori %r11,%r11,xxx@l */
05d0e962 204#define ORI_R12_R12_0 0x618c0000 /* ori %r12,%r12,xxx@l */
07d6d2b8 205#define LD_R12_0R12 0xe98c0000 /* ld %r12,xxx@l(%r12) */
04bdff6a 206#define SLDI_R11_R11_34 0x796b1746 /* sldi %r11,%r11,34 */
05d0e962
AM
207#define SLDI_R12_R12_32 0x799c07c6 /* sldi %r12,%r12,32 */
208#define LDX_R12_R11_R12 0x7d8b602a /* ldx %r12,%r11,%r12 */
209#define ADD_R12_R11_R12 0x7d8b6214 /* add %r12,%r11,%r12 */
04bdff6a
AM
210#define PADDI_R12_PC 0x0610000039800000ULL
211#define PLD_R12_PC 0x04100000e5800000ULL
5663e321 212#define PNOP 0x0700000000000000ULL
a345bc8d 213
9e390558
AM
214/* __glink_PLTresolve stub instructions. We enter with the index in R0. */
215#define GLINK_PLTRESOLVE_SIZE(htab) \
407aa07c 216 (8u + (htab->opd_abi ? 11 * 4 : 14 * 4))
ee4bf8d2
AM
217 /* 0: */
218 /* .quad plt0-1f */
219 /* __glink: */
220#define MFLR_R12 0x7d8802a6 /* mflr %12 */
221#define BCL_20_31 0x429f0005 /* bcl 20,31,1f */
222 /* 1: */
223#define MFLR_R11 0x7d6802a6 /* mflr %11 */
71a39c98 224 /* ld %2,(0b-1b)(%11) */
ee4bf8d2 225#define MTLR_R12 0x7d8803a6 /* mtlr %12 */
71a39c98
AM
226#define ADD_R11_R2_R11 0x7d625a14 /* add %11,%2,%11 */
227 /* ld %12,0(%11) */
228 /* ld %2,8(%11) */
229 /* mtctr %12 */
230 /* ld %11,16(%11) */
ee4bf8d2 231 /* bctr */
b9e5796b
AM
232#define MFLR_R0 0x7c0802a6 /* mflr %r0 */
233#define MTLR_R0 0x7c0803a6 /* mtlr %r0 */
234#define SUB_R12_R12_R11 0x7d8b6050 /* subf %r12,%r11,%r12 */
235#define ADDI_R0_R12 0x380c0000 /* addi %r0,%r12,0 */
236#define SRDI_R0_R0_2 0x7800f082 /* rldicl %r0,%r0,62,2 */
5d1634d7
AM
237
238/* Pad with this. */
239#define NOP 0x60000000
240
721956f4
AM
241/* Some other nops. */
242#define CROR_151515 0x4def7b82
243#define CROR_313131 0x4ffffb82
244
cedb70c5 245/* .glink entries for the first 32k functions are two instructions. */
5d1634d7
AM
246#define LI_R0_0 0x38000000 /* li %r0,0 */
247#define B_DOT 0x48000000 /* b . */
248
249/* After that, we need two instructions to load the index, followed by
250 a branch. */
251#define LIS_R0_0 0x3c000000 /* lis %r0,0 */
10ed1bba 252#define ORI_R0_R0_0 0x60000000 /* ori %r0,%r0,0 */
41bd81ab 253
deb0e272
AM
254/* Instructions used by the save and restore reg functions. */
255#define STD_R0_0R1 0xf8010000 /* std %r0,0(%r1) */
256#define STD_R0_0R12 0xf80c0000 /* std %r0,0(%r12) */
257#define LD_R0_0R1 0xe8010000 /* ld %r0,0(%r1) */
258#define LD_R0_0R12 0xe80c0000 /* ld %r0,0(%r12) */
82bd7b59
AM
259#define STFD_FR0_0R1 0xd8010000 /* stfd %fr0,0(%r1) */
260#define LFD_FR0_0R1 0xc8010000 /* lfd %fr0,0(%r1) */
deb0e272
AM
261#define LI_R12_0 0x39800000 /* li %r12,0 */
262#define STVX_VR0_R12_R0 0x7c0c01ce /* stvx %v0,%r12,%r0 */
263#define LVX_VR0_R12_R0 0x7c0c00ce /* lvx %v0,%r12,%r0 */
264#define MTLR_R0 0x7c0803a6 /* mtlr %r0 */
82bd7b59
AM
265#define BLR 0x4e800020 /* blr */
266
41bd81ab
AM
267/* Since .opd is an array of descriptors and each entry will end up
268 with identical R_PPC64_RELATIVE relocs, there is really no need to
269 propagate .opd relocs; The dynamic linker should be taught to
1e2f5b6e 270 relocate .opd without reloc entries. */
41bd81ab
AM
271#ifndef NO_OPD_RELOCS
272#define NO_OPD_RELOCS 0
273#endif
810d4e75 274
a4b6fadd
AM
275#ifndef ARRAY_SIZE
276#define ARRAY_SIZE(a) (sizeof (a) / sizeof ((a)[0]))
277#endif
278
810d4e75
AM
279static inline int
280abiversion (bfd *abfd)
281{
282 return elf_elfheader (abfd)->e_flags & EF_PPC64_ABI;
283}
284
285static inline void
286set_abiversion (bfd *abfd, int ver)
287{
288 elf_elfheader (abfd)->e_flags &= ~EF_PPC64_ABI;
289 elf_elfheader (abfd)->e_flags |= ver & EF_PPC64_ABI;
290}
5bd4f169
AM
291\f
292/* Relocation HOWTO's. */
46807bf4
AM
293/* Like other ELF RELA targets that don't apply multiple
294 field-altering relocations to the same localation, src_mask is
295 always zero and pcrel_offset is the same as pc_relative.
296 PowerPC can always use a zero bitpos, even when the field is not at
297 the LSB. For example, a REL24 could use rightshift=2, bisize=24
298 and bitpos=2 which matches the ABI description, or as we do here,
299 rightshift=0, bitsize=26 and bitpos=0. */
300#define HOW(type, size, bitsize, mask, rightshift, pc_relative, \
301 complain, special_func) \
302 HOWTO (type, rightshift, size, bitsize, pc_relative, 0, \
303 complain_overflow_ ## complain, special_func, \
304 #type, FALSE, 0, mask, pc_relative)
305
04c9666a 306static reloc_howto_type *ppc64_elf_howto_table[(int) R_PPC64_max];
5bd4f169 307
f3185997
NC
308static reloc_howto_type ppc64_elf_howto_raw[] =
309{
5bd4f169 310 /* This reloc does nothing. */
46807bf4
AM
311 HOW (R_PPC64_NONE, 3, 0, 0, 0, FALSE, dont,
312 bfd_elf_generic_reloc),
5bd4f169
AM
313
314 /* A standard 32 bit relocation. */
46807bf4
AM
315 HOW (R_PPC64_ADDR32, 2, 32, 0xffffffff, 0, FALSE, bitfield,
316 bfd_elf_generic_reloc),
5bd4f169
AM
317
318 /* An absolute 26 bit branch; the lower two bits must be zero.
319 FIXME: we don't check that, we just clear them. */
46807bf4
AM
320 HOW (R_PPC64_ADDR24, 2, 26, 0x03fffffc, 0, FALSE, bitfield,
321 bfd_elf_generic_reloc),
5bd4f169
AM
322
323 /* A standard 16 bit relocation. */
46807bf4
AM
324 HOW (R_PPC64_ADDR16, 1, 16, 0xffff, 0, FALSE, bitfield,
325 bfd_elf_generic_reloc),
5bd4f169
AM
326
327 /* A 16 bit relocation without overflow. */
46807bf4
AM
328 HOW (R_PPC64_ADDR16_LO, 1, 16, 0xffff, 0, FALSE, dont,
329 bfd_elf_generic_reloc),
5bd4f169
AM
330
331 /* Bits 16-31 of an address. */
46807bf4
AM
332 HOW (R_PPC64_ADDR16_HI, 1, 16, 0xffff, 16, FALSE, signed,
333 bfd_elf_generic_reloc),
5bd4f169
AM
334
335 /* Bits 16-31 of an address, plus 1 if the contents of the low 16
336 bits, treated as a signed number, is negative. */
46807bf4
AM
337 HOW (R_PPC64_ADDR16_HA, 1, 16, 0xffff, 16, FALSE, signed,
338 ppc64_elf_ha_reloc),
5bd4f169
AM
339
340 /* An absolute 16 bit branch; the lower two bits must be zero.
341 FIXME: we don't check that, we just clear them. */
46807bf4
AM
342 HOW (R_PPC64_ADDR14, 2, 16, 0x0000fffc, 0, FALSE, signed,
343 ppc64_elf_branch_reloc),
5bd4f169
AM
344
345 /* An absolute 16 bit branch, for which bit 10 should be set to
346 indicate that the branch is expected to be taken. The lower two
347 bits must be zero. */
46807bf4
AM
348 HOW (R_PPC64_ADDR14_BRTAKEN, 2, 16, 0x0000fffc, 0, FALSE, signed,
349 ppc64_elf_brtaken_reloc),
5bd4f169
AM
350
351 /* An absolute 16 bit branch, for which bit 10 should be set to
352 indicate that the branch is not expected to be taken. The lower
353 two bits must be zero. */
46807bf4
AM
354 HOW (R_PPC64_ADDR14_BRNTAKEN, 2, 16, 0x0000fffc, 0, FALSE, signed,
355 ppc64_elf_brtaken_reloc),
5bd4f169
AM
356
357 /* A relative 26 bit branch; the lower two bits must be zero. */
46807bf4
AM
358 HOW (R_PPC64_REL24, 2, 26, 0x03fffffc, 0, TRUE, signed,
359 ppc64_elf_branch_reloc),
5bd4f169 360
05d0e962 361 /* A variant of R_PPC64_REL24, used when r2 is not the toc pointer. */
46807bf4
AM
362 HOW (R_PPC64_REL24_NOTOC, 2, 26, 0x03fffffc, 0, TRUE, signed,
363 ppc64_elf_branch_reloc),
05d0e962 364
5bd4f169 365 /* A relative 16 bit branch; the lower two bits must be zero. */
46807bf4
AM
366 HOW (R_PPC64_REL14, 2, 16, 0x0000fffc, 0, TRUE, signed,
367 ppc64_elf_branch_reloc),
5bd4f169
AM
368
369 /* A relative 16 bit branch. Bit 10 should be set to indicate that
370 the branch is expected to be taken. The lower two bits must be
371 zero. */
46807bf4
AM
372 HOW (R_PPC64_REL14_BRTAKEN, 2, 16, 0x0000fffc, 0, TRUE, signed,
373 ppc64_elf_brtaken_reloc),
5bd4f169
AM
374
375 /* A relative 16 bit branch. Bit 10 should be set to indicate that
376 the branch is not expected to be taken. The lower two bits must
377 be zero. */
46807bf4
AM
378 HOW (R_PPC64_REL14_BRNTAKEN, 2, 16, 0x0000fffc, 0, TRUE, signed,
379 ppc64_elf_brtaken_reloc),
5bd4f169
AM
380
381 /* Like R_PPC64_ADDR16, but referring to the GOT table entry for the
382 symbol. */
46807bf4
AM
383 HOW (R_PPC64_GOT16, 1, 16, 0xffff, 0, FALSE, signed,
384 ppc64_elf_unhandled_reloc),
5bd4f169
AM
385
386 /* Like R_PPC64_ADDR16_LO, but referring to the GOT table entry for
387 the symbol. */
46807bf4
AM
388 HOW (R_PPC64_GOT16_LO, 1, 16, 0xffff, 0, FALSE, dont,
389 ppc64_elf_unhandled_reloc),
5bd4f169
AM
390
391 /* Like R_PPC64_ADDR16_HI, but referring to the GOT table entry for
392 the symbol. */
46807bf4
AM
393 HOW (R_PPC64_GOT16_HI, 1, 16, 0xffff, 16, FALSE, signed,
394 ppc64_elf_unhandled_reloc),
5bd4f169
AM
395
396 /* Like R_PPC64_ADDR16_HA, but referring to the GOT table entry for
397 the symbol. */
46807bf4
AM
398 HOW (R_PPC64_GOT16_HA, 1, 16, 0xffff, 16, FALSE, signed,
399 ppc64_elf_unhandled_reloc),
5bd4f169
AM
400
401 /* This is used only by the dynamic linker. The symbol should exist
402 both in the object being run and in some shared library. The
403 dynamic linker copies the data addressed by the symbol from the
404 shared library into the object, because the object being
405 run has to have the data at some particular address. */
46807bf4
AM
406 HOW (R_PPC64_COPY, 0, 0, 0, 0, FALSE, dont,
407 ppc64_elf_unhandled_reloc),
5bd4f169
AM
408
409 /* Like R_PPC64_ADDR64, but used when setting global offset table
410 entries. */
46807bf4
AM
411 HOW (R_PPC64_GLOB_DAT, 4, 64, 0xffffffffffffffffULL, 0, FALSE, dont,
412 ppc64_elf_unhandled_reloc),
5bd4f169
AM
413
414 /* Created by the link editor. Marks a procedure linkage table
415 entry for a symbol. */
46807bf4
AM
416 HOW (R_PPC64_JMP_SLOT, 0, 0, 0, 0, FALSE, dont,
417 ppc64_elf_unhandled_reloc),
5bd4f169
AM
418
419 /* Used only by the dynamic linker. When the object is run, this
420 doubleword64 is set to the load address of the object, plus the
421 addend. */
46807bf4
AM
422 HOW (R_PPC64_RELATIVE, 4, 64, 0xffffffffffffffffULL, 0, FALSE, dont,
423 bfd_elf_generic_reloc),
5bd4f169
AM
424
425 /* Like R_PPC64_ADDR32, but may be unaligned. */
46807bf4
AM
426 HOW (R_PPC64_UADDR32, 2, 32, 0xffffffff, 0, FALSE, bitfield,
427 bfd_elf_generic_reloc),
5bd4f169
AM
428
429 /* Like R_PPC64_ADDR16, but may be unaligned. */
46807bf4
AM
430 HOW (R_PPC64_UADDR16, 1, 16, 0xffff, 0, FALSE, bitfield,
431 bfd_elf_generic_reloc),
5bd4f169
AM
432
433 /* 32-bit PC relative. */
46807bf4
AM
434 HOW (R_PPC64_REL32, 2, 32, 0xffffffff, 0, TRUE, signed,
435 bfd_elf_generic_reloc),
5bd4f169 436
10ed1bba 437 /* 32-bit relocation to the symbol's procedure linkage table. */
46807bf4
AM
438 HOW (R_PPC64_PLT32, 2, 32, 0xffffffff, 0, FALSE, bitfield,
439 ppc64_elf_unhandled_reloc),
5bd4f169
AM
440
441 /* 32-bit PC relative relocation to the symbol's procedure linkage table.
442 FIXME: R_PPC64_PLTREL32 not supported. */
46807bf4
AM
443 HOW (R_PPC64_PLTREL32, 2, 32, 0xffffffff, 0, TRUE, signed,
444 ppc64_elf_unhandled_reloc),
5bd4f169
AM
445
446 /* Like R_PPC64_ADDR16_LO, but referring to the PLT table entry for
447 the symbol. */
46807bf4
AM
448 HOW (R_PPC64_PLT16_LO, 1, 16, 0xffff, 0, FALSE, dont,
449 ppc64_elf_unhandled_reloc),
5bd4f169
AM
450
451 /* Like R_PPC64_ADDR16_HI, but referring to the PLT table entry for
452 the symbol. */
46807bf4
AM
453 HOW (R_PPC64_PLT16_HI, 1, 16, 0xffff, 16, FALSE, signed,
454 ppc64_elf_unhandled_reloc),
5bd4f169
AM
455
456 /* Like R_PPC64_ADDR16_HA, but referring to the PLT table entry for
457 the symbol. */
46807bf4
AM
458 HOW (R_PPC64_PLT16_HA, 1, 16, 0xffff, 16, FALSE, signed,
459 ppc64_elf_unhandled_reloc),
5bd4f169 460
c061c2d8 461 /* 16-bit section relative relocation. */
46807bf4
AM
462 HOW (R_PPC64_SECTOFF, 1, 16, 0xffff, 0, FALSE, signed,
463 ppc64_elf_sectoff_reloc),
5bd4f169 464
c061c2d8 465 /* Like R_PPC64_SECTOFF, but no overflow warning. */
46807bf4
AM
466 HOW (R_PPC64_SECTOFF_LO, 1, 16, 0xffff, 0, FALSE, dont,
467 ppc64_elf_sectoff_reloc),
5bd4f169
AM
468
469 /* 16-bit upper half section relative relocation. */
46807bf4
AM
470 HOW (R_PPC64_SECTOFF_HI, 1, 16, 0xffff, 16, FALSE, signed,
471 ppc64_elf_sectoff_reloc),
5bd4f169
AM
472
473 /* 16-bit upper half adjusted section relative relocation. */
46807bf4
AM
474 HOW (R_PPC64_SECTOFF_HA, 1, 16, 0xffff, 16, FALSE, signed,
475 ppc64_elf_sectoff_ha_reloc),
5bd4f169 476
04c9666a 477 /* Like R_PPC64_REL24 without touching the two least significant bits. */
46807bf4
AM
478 HOW (R_PPC64_REL30, 2, 30, 0xfffffffc, 2, TRUE, dont,
479 bfd_elf_generic_reloc),
5bd4f169
AM
480
481 /* Relocs in the 64-bit PowerPC ELF ABI, not in the 32-bit ABI. */
482
483 /* A standard 64-bit relocation. */
46807bf4
AM
484 HOW (R_PPC64_ADDR64, 4, 64, 0xffffffffffffffffULL, 0, FALSE, dont,
485 bfd_elf_generic_reloc),
5bd4f169
AM
486
487 /* The bits 32-47 of an address. */
46807bf4
AM
488 HOW (R_PPC64_ADDR16_HIGHER, 1, 16, 0xffff, 32, FALSE, dont,
489 bfd_elf_generic_reloc),
5bd4f169
AM
490
491 /* The bits 32-47 of an address, plus 1 if the contents of the low
492 16 bits, treated as a signed number, is negative. */
46807bf4
AM
493 HOW (R_PPC64_ADDR16_HIGHERA, 1, 16, 0xffff, 32, FALSE, dont,
494 ppc64_elf_ha_reloc),
5bd4f169
AM
495
496 /* The bits 48-63 of an address. */
46807bf4
AM
497 HOW (R_PPC64_ADDR16_HIGHEST, 1, 16, 0xffff, 48, FALSE, dont,
498 bfd_elf_generic_reloc),
5bd4f169
AM
499
500 /* The bits 48-63 of an address, plus 1 if the contents of the low
501 16 bits, treated as a signed number, is negative. */
46807bf4
AM
502 HOW (R_PPC64_ADDR16_HIGHESTA, 1, 16, 0xffff, 48, FALSE, dont,
503 ppc64_elf_ha_reloc),
5bd4f169
AM
504
505 /* Like ADDR64, but may be unaligned. */
46807bf4
AM
506 HOW (R_PPC64_UADDR64, 4, 64, 0xffffffffffffffffULL, 0, FALSE, dont,
507 bfd_elf_generic_reloc),
5bd4f169
AM
508
509 /* 64-bit relative relocation. */
46807bf4
AM
510 HOW (R_PPC64_REL64, 4, 64, 0xffffffffffffffffULL, 0, TRUE, dont,
511 bfd_elf_generic_reloc),
5bd4f169 512
cedb70c5 513 /* 64-bit relocation to the symbol's procedure linkage table. */
46807bf4
AM
514 HOW (R_PPC64_PLT64, 4, 64, 0xffffffffffffffffULL, 0, FALSE, dont,
515 ppc64_elf_unhandled_reloc),
5bd4f169
AM
516
517 /* 64-bit PC relative relocation to the symbol's procedure linkage
518 table. */
519 /* FIXME: R_PPC64_PLTREL64 not supported. */
46807bf4
AM
520 HOW (R_PPC64_PLTREL64, 4, 64, 0xffffffffffffffffULL, 0, TRUE, dont,
521 ppc64_elf_unhandled_reloc),
5bd4f169
AM
522
523 /* 16 bit TOC-relative relocation. */
5bd4f169 524 /* R_PPC64_TOC16 47 half16* S + A - .TOC. */
46807bf4
AM
525 HOW (R_PPC64_TOC16, 1, 16, 0xffff, 0, FALSE, signed,
526 ppc64_elf_toc_reloc),
5bd4f169
AM
527
528 /* 16 bit TOC-relative relocation without overflow. */
5bd4f169 529 /* R_PPC64_TOC16_LO 48 half16 #lo (S + A - .TOC.) */
46807bf4
AM
530 HOW (R_PPC64_TOC16_LO, 1, 16, 0xffff, 0, FALSE, dont,
531 ppc64_elf_toc_reloc),
5bd4f169
AM
532
533 /* 16 bit TOC-relative relocation, high 16 bits. */
5bd4f169 534 /* R_PPC64_TOC16_HI 49 half16 #hi (S + A - .TOC.) */
46807bf4
AM
535 HOW (R_PPC64_TOC16_HI, 1, 16, 0xffff, 16, FALSE, signed,
536 ppc64_elf_toc_reloc),
5bd4f169
AM
537
538 /* 16 bit TOC-relative relocation, high 16 bits, plus 1 if the
539 contents of the low 16 bits, treated as a signed number, is
540 negative. */
5bd4f169 541 /* R_PPC64_TOC16_HA 50 half16 #ha (S + A - .TOC.) */
46807bf4
AM
542 HOW (R_PPC64_TOC16_HA, 1, 16, 0xffff, 16, FALSE, signed,
543 ppc64_elf_toc_ha_reloc),
5bd4f169
AM
544
545 /* 64-bit relocation; insert value of TOC base (.TOC.). */
5bd4f169 546 /* R_PPC64_TOC 51 doubleword64 .TOC. */
46807bf4
AM
547 HOW (R_PPC64_TOC, 4, 64, 0xffffffffffffffffULL, 0, FALSE, dont,
548 ppc64_elf_toc64_reloc),
5bd4f169
AM
549
550 /* Like R_PPC64_GOT16, but also informs the link editor that the
551 value to relocate may (!) refer to a PLT entry which the link
552 editor (a) may replace with the symbol value. If the link editor
553 is unable to fully resolve the symbol, it may (b) create a PLT
554 entry and store the address to the new PLT entry in the GOT.
555 This permits lazy resolution of function symbols at run time.
556 The link editor may also skip all of this and just (c) emit a
557 R_PPC64_GLOB_DAT to tie the symbol to the GOT entry. */
558 /* FIXME: R_PPC64_PLTGOT16 not implemented. */
46807bf4
AM
559 HOW (R_PPC64_PLTGOT16, 1, 16, 0xffff, 0, FALSE,signed,
560 ppc64_elf_unhandled_reloc),
411e1bfb
AM
561
562 /* Like R_PPC64_PLTGOT16, but without overflow. */
563 /* FIXME: R_PPC64_PLTGOT16_LO not implemented. */
46807bf4
AM
564 HOW (R_PPC64_PLTGOT16_LO, 1, 16, 0xffff, 0, FALSE, dont,
565 ppc64_elf_unhandled_reloc),
411e1bfb
AM
566
567 /* Like R_PPC64_PLT_GOT16, but using bits 16-31 of the address. */
568 /* FIXME: R_PPC64_PLTGOT16_HI not implemented. */
46807bf4
AM
569 HOW (R_PPC64_PLTGOT16_HI, 1, 16, 0xffff, 16, FALSE, signed,
570 ppc64_elf_unhandled_reloc),
411e1bfb
AM
571
572 /* Like R_PPC64_PLT_GOT16, but using bits 16-31 of the address, plus
573 1 if the contents of the low 16 bits, treated as a signed number,
574 is negative. */
575 /* FIXME: R_PPC64_PLTGOT16_HA not implemented. */
46807bf4
AM
576 HOW (R_PPC64_PLTGOT16_HA, 1, 16, 0xffff, 16, FALSE, signed,
577 ppc64_elf_unhandled_reloc),
411e1bfb
AM
578
579 /* Like R_PPC64_ADDR16, but for instructions with a DS field. */
46807bf4
AM
580 HOW (R_PPC64_ADDR16_DS, 1, 16, 0xfffc, 0, FALSE, signed,
581 bfd_elf_generic_reloc),
411e1bfb
AM
582
583 /* Like R_PPC64_ADDR16_LO, but for instructions with a DS field. */
46807bf4
AM
584 HOW (R_PPC64_ADDR16_LO_DS, 1, 16, 0xfffc, 0, FALSE, dont,
585 bfd_elf_generic_reloc),
411e1bfb
AM
586
587 /* Like R_PPC64_GOT16, but for instructions with a DS field. */
46807bf4
AM
588 HOW (R_PPC64_GOT16_DS, 1, 16, 0xfffc, 0, FALSE, signed,
589 ppc64_elf_unhandled_reloc),
411e1bfb
AM
590
591 /* Like R_PPC64_GOT16_LO, but for instructions with a DS field. */
46807bf4
AM
592 HOW (R_PPC64_GOT16_LO_DS, 1, 16, 0xfffc, 0, FALSE, dont,
593 ppc64_elf_unhandled_reloc),
411e1bfb
AM
594
595 /* Like R_PPC64_PLT16_LO, but for instructions with a DS field. */
46807bf4
AM
596 HOW (R_PPC64_PLT16_LO_DS, 1, 16, 0xfffc, 0, FALSE, dont,
597 ppc64_elf_unhandled_reloc),
411e1bfb
AM
598
599 /* Like R_PPC64_SECTOFF, but for instructions with a DS field. */
46807bf4
AM
600 HOW (R_PPC64_SECTOFF_DS, 1, 16, 0xfffc, 0, FALSE, signed,
601 ppc64_elf_sectoff_reloc),
411e1bfb
AM
602
603 /* Like R_PPC64_SECTOFF_LO, but for instructions with a DS field. */
46807bf4
AM
604 HOW (R_PPC64_SECTOFF_LO_DS, 1, 16, 0xfffc, 0, FALSE, dont,
605 ppc64_elf_sectoff_reloc),
411e1bfb
AM
606
607 /* Like R_PPC64_TOC16, but for instructions with a DS field. */
46807bf4
AM
608 HOW (R_PPC64_TOC16_DS, 1, 16, 0xfffc, 0, FALSE, signed,
609 ppc64_elf_toc_reloc),
411e1bfb
AM
610
611 /* Like R_PPC64_TOC16_LO, but for instructions with a DS field. */
46807bf4
AM
612 HOW (R_PPC64_TOC16_LO_DS, 1, 16, 0xfffc, 0, FALSE, dont,
613 ppc64_elf_toc_reloc),
411e1bfb
AM
614
615 /* Like R_PPC64_PLTGOT16, but for instructions with a DS field. */
616 /* FIXME: R_PPC64_PLTGOT16_DS not implemented. */
46807bf4
AM
617 HOW (R_PPC64_PLTGOT16_DS, 1, 16, 0xfffc, 0, FALSE, signed,
618 ppc64_elf_unhandled_reloc),
411e1bfb
AM
619
620 /* Like R_PPC64_PLTGOT16_LO, but for instructions with a DS field. */
621 /* FIXME: R_PPC64_PLTGOT16_LO not implemented. */
46807bf4
AM
622 HOW (R_PPC64_PLTGOT16_LO_DS, 1, 16, 0xfffc, 0, FALSE, dont,
623 ppc64_elf_unhandled_reloc),
411e1bfb 624
727fc41e 625 /* Marker relocs for TLS. */
46807bf4
AM
626 HOW (R_PPC64_TLS, 2, 32, 0, 0, FALSE, dont,
627 bfd_elf_generic_reloc),
628
629 HOW (R_PPC64_TLSGD, 2, 32, 0, 0, FALSE, dont,
630 bfd_elf_generic_reloc),
631
632 HOW (R_PPC64_TLSLD, 2, 32, 0, 0, FALSE, dont,
633 bfd_elf_generic_reloc),
727fc41e 634
23cedd1d
AM
635 /* Marker reloc for optimizing r2 save in prologue rather than on
636 each plt call stub. */
46807bf4
AM
637 HOW (R_PPC64_TOCSAVE, 2, 32, 0, 0, FALSE, dont,
638 bfd_elf_generic_reloc),
3b421ab3 639
23cedd1d 640 /* Marker relocs on inline plt call instructions. */
46807bf4
AM
641 HOW (R_PPC64_PLTSEQ, 2, 32, 0, 0, FALSE, dont,
642 bfd_elf_generic_reloc),
643
644 HOW (R_PPC64_PLTCALL, 2, 32, 0, 0, FALSE, dont,
645 bfd_elf_generic_reloc),
23cedd1d 646
411e1bfb
AM
647 /* Computes the load module index of the load module that contains the
648 definition of its TLS sym. */
46807bf4
AM
649 HOW (R_PPC64_DTPMOD64, 4, 64, 0xffffffffffffffffULL, 0, FALSE, dont,
650 ppc64_elf_unhandled_reloc),
411e1bfb
AM
651
652 /* Computes a dtv-relative displacement, the difference between the value
653 of sym+add and the base address of the thread-local storage block that
654 contains the definition of sym, minus 0x8000. */
46807bf4
AM
655 HOW (R_PPC64_DTPREL64, 4, 64, 0xffffffffffffffffULL, 0, FALSE, dont,
656 ppc64_elf_unhandled_reloc),
411e1bfb
AM
657
658 /* A 16 bit dtprel reloc. */
46807bf4
AM
659 HOW (R_PPC64_DTPREL16, 1, 16, 0xffff, 0, FALSE, signed,
660 ppc64_elf_unhandled_reloc),
411e1bfb
AM
661
662 /* Like DTPREL16, but no overflow. */
46807bf4
AM
663 HOW (R_PPC64_DTPREL16_LO, 1, 16, 0xffff, 0, FALSE, dont,
664 ppc64_elf_unhandled_reloc),
411e1bfb
AM
665
666 /* Like DTPREL16_LO, but next higher group of 16 bits. */
46807bf4
AM
667 HOW (R_PPC64_DTPREL16_HI, 1, 16, 0xffff, 16, FALSE, signed,
668 ppc64_elf_unhandled_reloc),
411e1bfb
AM
669
670 /* Like DTPREL16_HI, but adjust for low 16 bits. */
46807bf4
AM
671 HOW (R_PPC64_DTPREL16_HA, 1, 16, 0xffff, 16, FALSE, signed,
672 ppc64_elf_unhandled_reloc),
411e1bfb
AM
673
674 /* Like DTPREL16_HI, but next higher group of 16 bits. */
46807bf4
AM
675 HOW (R_PPC64_DTPREL16_HIGHER, 1, 16, 0xffff, 32, FALSE, dont,
676 ppc64_elf_unhandled_reloc),
411e1bfb
AM
677
678 /* Like DTPREL16_HIGHER, but adjust for low 16 bits. */
46807bf4
AM
679 HOW (R_PPC64_DTPREL16_HIGHERA, 1, 16, 0xffff, 32, FALSE, dont,
680 ppc64_elf_unhandled_reloc),
411e1bfb
AM
681
682 /* Like DTPREL16_HIGHER, but next higher group of 16 bits. */
46807bf4
AM
683 HOW (R_PPC64_DTPREL16_HIGHEST, 1, 16, 0xffff, 48, FALSE, dont,
684 ppc64_elf_unhandled_reloc),
411e1bfb
AM
685
686 /* Like DTPREL16_HIGHEST, but adjust for low 16 bits. */
46807bf4
AM
687 HOW (R_PPC64_DTPREL16_HIGHESTA, 1, 16, 0xffff, 48, FALSE, dont,
688 ppc64_elf_unhandled_reloc),
411e1bfb
AM
689
690 /* Like DTPREL16, but for insns with a DS field. */
46807bf4
AM
691 HOW (R_PPC64_DTPREL16_DS, 1, 16, 0xfffc, 0, FALSE, signed,
692 ppc64_elf_unhandled_reloc),
411e1bfb
AM
693
694 /* Like DTPREL16_DS, but no overflow. */
46807bf4
AM
695 HOW (R_PPC64_DTPREL16_LO_DS, 1, 16, 0xfffc, 0, FALSE, dont,
696 ppc64_elf_unhandled_reloc),
411e1bfb
AM
697
698 /* Computes a tp-relative displacement, the difference between the value of
699 sym+add and the value of the thread pointer (r13). */
46807bf4
AM
700 HOW (R_PPC64_TPREL64, 4, 64, 0xffffffffffffffffULL, 0, FALSE, dont,
701 ppc64_elf_unhandled_reloc),
411e1bfb
AM
702
703 /* A 16 bit tprel reloc. */
46807bf4
AM
704 HOW (R_PPC64_TPREL16, 1, 16, 0xffff, 0, FALSE, signed,
705 ppc64_elf_unhandled_reloc),
411e1bfb
AM
706
707 /* Like TPREL16, but no overflow. */
46807bf4
AM
708 HOW (R_PPC64_TPREL16_LO, 1, 16, 0xffff, 0, FALSE, dont,
709 ppc64_elf_unhandled_reloc),
411e1bfb
AM
710
711 /* Like TPREL16_LO, but next higher group of 16 bits. */
46807bf4
AM
712 HOW (R_PPC64_TPREL16_HI, 1, 16, 0xffff, 16, FALSE, signed,
713 ppc64_elf_unhandled_reloc),
411e1bfb
AM
714
715 /* Like TPREL16_HI, but adjust for low 16 bits. */
46807bf4
AM
716 HOW (R_PPC64_TPREL16_HA, 1, 16, 0xffff, 16, FALSE, signed,
717 ppc64_elf_unhandled_reloc),
411e1bfb
AM
718
719 /* Like TPREL16_HI, but next higher group of 16 bits. */
46807bf4
AM
720 HOW (R_PPC64_TPREL16_HIGHER, 1, 16, 0xffff, 32, FALSE, dont,
721 ppc64_elf_unhandled_reloc),
411e1bfb
AM
722
723 /* Like TPREL16_HIGHER, but adjust for low 16 bits. */
46807bf4
AM
724 HOW (R_PPC64_TPREL16_HIGHERA, 1, 16, 0xffff, 32, FALSE, dont,
725 ppc64_elf_unhandled_reloc),
411e1bfb
AM
726
727 /* Like TPREL16_HIGHER, but next higher group of 16 bits. */
46807bf4
AM
728 HOW (R_PPC64_TPREL16_HIGHEST, 1, 16, 0xffff, 48, FALSE, dont,
729 ppc64_elf_unhandled_reloc),
411e1bfb
AM
730
731 /* Like TPREL16_HIGHEST, but adjust for low 16 bits. */
46807bf4
AM
732 HOW (R_PPC64_TPREL16_HIGHESTA, 1, 16, 0xffff, 48, FALSE, dont,
733 ppc64_elf_unhandled_reloc),
411e1bfb
AM
734
735 /* Like TPREL16, but for insns with a DS field. */
46807bf4
AM
736 HOW (R_PPC64_TPREL16_DS, 1, 16, 0xfffc, 0, FALSE, signed,
737 ppc64_elf_unhandled_reloc),
411e1bfb
AM
738
739 /* Like TPREL16_DS, but no overflow. */
46807bf4
AM
740 HOW (R_PPC64_TPREL16_LO_DS, 1, 16, 0xfffc, 0, FALSE, dont,
741 ppc64_elf_unhandled_reloc),
411e1bfb
AM
742
743 /* Allocates two contiguous entries in the GOT to hold a tls_index structure,
744 with values (sym+add)@dtpmod and (sym+add)@dtprel, and computes the offset
745 to the first entry relative to the TOC base (r2). */
46807bf4
AM
746 HOW (R_PPC64_GOT_TLSGD16, 1, 16, 0xffff, 0, FALSE, signed,
747 ppc64_elf_unhandled_reloc),
5bd4f169 748
411e1bfb 749 /* Like GOT_TLSGD16, but no overflow. */
46807bf4
AM
750 HOW (R_PPC64_GOT_TLSGD16_LO, 1, 16, 0xffff, 0, FALSE, dont,
751 ppc64_elf_unhandled_reloc),
5bd4f169 752
411e1bfb 753 /* Like GOT_TLSGD16_LO, but next higher group of 16 bits. */
46807bf4
AM
754 HOW (R_PPC64_GOT_TLSGD16_HI, 1, 16, 0xffff, 16, FALSE, signed,
755 ppc64_elf_unhandled_reloc),
5bd4f169 756
411e1bfb 757 /* Like GOT_TLSGD16_HI, but adjust for low 16 bits. */
46807bf4
AM
758 HOW (R_PPC64_GOT_TLSGD16_HA, 1, 16, 0xffff, 16, FALSE, signed,
759 ppc64_elf_unhandled_reloc),
5bd4f169 760
411e1bfb
AM
761 /* Allocates two contiguous entries in the GOT to hold a tls_index structure,
762 with values (sym+add)@dtpmod and zero, and computes the offset to the
763 first entry relative to the TOC base (r2). */
46807bf4
AM
764 HOW (R_PPC64_GOT_TLSLD16, 1, 16, 0xffff, 0, FALSE, signed,
765 ppc64_elf_unhandled_reloc),
5bd4f169 766
411e1bfb 767 /* Like GOT_TLSLD16, but no overflow. */
46807bf4
AM
768 HOW (R_PPC64_GOT_TLSLD16_LO, 1, 16, 0xffff, 0, FALSE, dont,
769 ppc64_elf_unhandled_reloc),
5bd4f169 770
411e1bfb 771 /* Like GOT_TLSLD16_LO, but next higher group of 16 bits. */
46807bf4
AM
772 HOW (R_PPC64_GOT_TLSLD16_HI, 1, 16, 0xffff, 16, FALSE, signed,
773 ppc64_elf_unhandled_reloc),
5bd4f169 774
411e1bfb 775 /* Like GOT_TLSLD16_HI, but adjust for low 16 bits. */
46807bf4
AM
776 HOW (R_PPC64_GOT_TLSLD16_HA, 1, 16, 0xffff, 16, FALSE, signed,
777 ppc64_elf_unhandled_reloc),
5bd4f169 778
411e1bfb
AM
779 /* Allocates an entry in the GOT with value (sym+add)@dtprel, and computes
780 the offset to the entry relative to the TOC base (r2). */
46807bf4
AM
781 HOW (R_PPC64_GOT_DTPREL16_DS, 1, 16, 0xfffc, 0, FALSE, signed,
782 ppc64_elf_unhandled_reloc),
5bd4f169 783
411e1bfb 784 /* Like GOT_DTPREL16_DS, but no overflow. */
46807bf4
AM
785 HOW (R_PPC64_GOT_DTPREL16_LO_DS, 1, 16, 0xfffc, 0, FALSE, dont,
786 ppc64_elf_unhandled_reloc),
5bd4f169 787
411e1bfb 788 /* Like GOT_DTPREL16_LO_DS, but next higher group of 16 bits. */
46807bf4
AM
789 HOW (R_PPC64_GOT_DTPREL16_HI, 1, 16, 0xffff, 16, FALSE, signed,
790 ppc64_elf_unhandled_reloc),
5bd4f169 791
411e1bfb 792 /* Like GOT_DTPREL16_HI, but adjust for low 16 bits. */
46807bf4
AM
793 HOW (R_PPC64_GOT_DTPREL16_HA, 1, 16, 0xffff, 16, FALSE, signed,
794 ppc64_elf_unhandled_reloc),
411e1bfb
AM
795
796 /* Allocates an entry in the GOT with value (sym+add)@tprel, and computes the
797 offset to the entry relative to the TOC base (r2). */
46807bf4
AM
798 HOW (R_PPC64_GOT_TPREL16_DS, 1, 16, 0xfffc, 0, FALSE, signed,
799 ppc64_elf_unhandled_reloc),
5bd4f169 800
411e1bfb 801 /* Like GOT_TPREL16_DS, but no overflow. */
46807bf4
AM
802 HOW (R_PPC64_GOT_TPREL16_LO_DS, 1, 16, 0xfffc, 0, FALSE, dont,
803 ppc64_elf_unhandled_reloc),
5bd4f169 804
411e1bfb 805 /* Like GOT_TPREL16_LO_DS, but next higher group of 16 bits. */
46807bf4
AM
806 HOW (R_PPC64_GOT_TPREL16_HI, 1, 16, 0xffff, 16, FALSE, signed,
807 ppc64_elf_unhandled_reloc),
5bd4f169 808
411e1bfb 809 /* Like GOT_TPREL16_HI, but adjust for low 16 bits. */
46807bf4
AM
810 HOW (R_PPC64_GOT_TPREL16_HA, 1, 16, 0xffff, 16, FALSE, signed,
811 ppc64_elf_unhandled_reloc),
812
813 HOW (R_PPC64_JMP_IREL, 0, 0, 0, 0, FALSE, dont,
814 ppc64_elf_unhandled_reloc),
815
816 HOW (R_PPC64_IRELATIVE, 4, 64, 0xffffffffffffffffULL, 0, FALSE, dont,
817 bfd_elf_generic_reloc),
e054468f 818
25f23106 819 /* A 16 bit relative relocation. */
46807bf4
AM
820 HOW (R_PPC64_REL16, 1, 16, 0xffff, 0, TRUE, signed,
821 bfd_elf_generic_reloc),
25f23106
AM
822
823 /* A 16 bit relative relocation without overflow. */
46807bf4
AM
824 HOW (R_PPC64_REL16_LO, 1, 16, 0xffff, 0, TRUE, dont,
825 bfd_elf_generic_reloc),
25f23106
AM
826
827 /* The high order 16 bits of a relative address. */
46807bf4
AM
828 HOW (R_PPC64_REL16_HI, 1, 16, 0xffff, 16, TRUE, signed,
829 bfd_elf_generic_reloc),
25f23106
AM
830
831 /* The high order 16 bits of a relative address, plus 1 if the contents of
832 the low 16 bits, treated as a signed number, is negative. */
46807bf4
AM
833 HOW (R_PPC64_REL16_HA, 1, 16, 0xffff, 16, TRUE, signed,
834 ppc64_elf_ha_reloc),
25f23106 835
4a969973
AM
836 HOW (R_PPC64_REL16_HIGH, 1, 16, 0xffff, 16, TRUE, dont,
837 bfd_elf_generic_reloc),
838
839 HOW (R_PPC64_REL16_HIGHA, 1, 16, 0xffff, 16, TRUE, dont,
840 ppc64_elf_ha_reloc),
841
842 HOW (R_PPC64_REL16_HIGHER, 1, 16, 0xffff, 32, TRUE, dont,
843 bfd_elf_generic_reloc),
844
845 HOW (R_PPC64_REL16_HIGHERA, 1, 16, 0xffff, 32, TRUE, dont,
846 ppc64_elf_ha_reloc),
847
848 HOW (R_PPC64_REL16_HIGHEST, 1, 16, 0xffff, 48, TRUE, dont,
849 bfd_elf_generic_reloc),
850
851 HOW (R_PPC64_REL16_HIGHESTA, 1, 16, 0xffff, 48, TRUE, dont,
852 ppc64_elf_ha_reloc),
853
a680de9a 854 /* Like R_PPC64_REL16_HA but for split field in addpcis. */
46807bf4
AM
855 HOW (R_PPC64_REL16DX_HA, 2, 16, 0x1fffc1, 16, TRUE, signed,
856 ppc64_elf_ha_reloc),
a680de9a 857
7ba71655 858 /* A split-field reloc for addpcis, non-relative (gas internal use only). */
46807bf4
AM
859 HOW (R_PPC64_16DX_HA, 2, 16, 0x1fffc1, 16, FALSE, signed,
860 ppc64_elf_ha_reloc),
7ba71655 861
f9c6b907 862 /* Like R_PPC64_ADDR16_HI, but no overflow. */
46807bf4
AM
863 HOW (R_PPC64_ADDR16_HIGH, 1, 16, 0xffff, 16, FALSE, dont,
864 bfd_elf_generic_reloc),
f9c6b907
AM
865
866 /* Like R_PPC64_ADDR16_HA, but no overflow. */
46807bf4
AM
867 HOW (R_PPC64_ADDR16_HIGHA, 1, 16, 0xffff, 16, FALSE, dont,
868 ppc64_elf_ha_reloc),
f9c6b907
AM
869
870 /* Like R_PPC64_DTPREL16_HI, but no overflow. */
46807bf4
AM
871 HOW (R_PPC64_DTPREL16_HIGH, 1, 16, 0xffff, 16, FALSE, dont,
872 ppc64_elf_unhandled_reloc),
f9c6b907
AM
873
874 /* Like R_PPC64_DTPREL16_HA, but no overflow. */
46807bf4
AM
875 HOW (R_PPC64_DTPREL16_HIGHA, 1, 16, 0xffff, 16, FALSE, dont,
876 ppc64_elf_unhandled_reloc),
f9c6b907
AM
877
878 /* Like R_PPC64_TPREL16_HI, but no overflow. */
46807bf4
AM
879 HOW (R_PPC64_TPREL16_HIGH, 1, 16, 0xffff, 16, FALSE, dont,
880 ppc64_elf_unhandled_reloc),
f9c6b907
AM
881
882 /* Like R_PPC64_TPREL16_HA, but no overflow. */
46807bf4
AM
883 HOW (R_PPC64_TPREL16_HIGHA, 1, 16, 0xffff, 16, FALSE, dont,
884 ppc64_elf_unhandled_reloc),
f9c6b907 885
006589cf 886 /* Marker reloc on ELFv2 large-model function entry. */
46807bf4
AM
887 HOW (R_PPC64_ENTRY, 2, 32, 0, 0, FALSE, dont,
888 bfd_elf_generic_reloc),
006589cf 889
45965137 890 /* Like ADDR64, but use local entry point of function. */
46807bf4
AM
891 HOW (R_PPC64_ADDR64_LOCAL, 4, 64, 0xffffffffffffffffULL, 0, FALSE, dont,
892 bfd_elf_generic_reloc),
45965137 893
5663e321
AM
894 HOW (R_PPC64_PLTSEQ_NOTOC, 2, 32, 0, 0, FALSE, dont,
895 bfd_elf_generic_reloc),
896
897 HOW (R_PPC64_PLTCALL_NOTOC, 2, 32, 0, 0, FALSE, dont,
898 bfd_elf_generic_reloc),
899
900 HOW (R_PPC64_PCREL_OPT, 2, 32, 0, 0, FALSE, dont,
901 bfd_elf_generic_reloc),
902
903 HOW (R_PPC64_D34, 4, 34, 0x3ffff0000ffffULL, 0, FALSE, signed,
904 ppc64_elf_prefix_reloc),
905
906 HOW (R_PPC64_D34_LO, 4, 34, 0x3ffff0000ffffULL, 0, FALSE, dont,
907 ppc64_elf_prefix_reloc),
908
909 HOW (R_PPC64_D34_HI30, 4, 34, 0x3ffff0000ffffULL, 34, FALSE, dont,
910 ppc64_elf_prefix_reloc),
911
912 HOW (R_PPC64_D34_HA30, 4, 34, 0x3ffff0000ffffULL, 34, FALSE, dont,
913 ppc64_elf_prefix_reloc),
914
915 HOW (R_PPC64_PCREL34, 4, 34, 0x3ffff0000ffffULL, 0, TRUE, signed,
916 ppc64_elf_prefix_reloc),
917
918 HOW (R_PPC64_GOT_PCREL34, 4, 34, 0x3ffff0000ffffULL, 0, TRUE, signed,
919 ppc64_elf_unhandled_reloc),
920
921 HOW (R_PPC64_PLT_PCREL34, 4, 34, 0x3ffff0000ffffULL, 0, TRUE, signed,
922 ppc64_elf_unhandled_reloc),
923
924 HOW (R_PPC64_PLT_PCREL34_NOTOC, 4, 34, 0x3ffff0000ffffULL, 0, TRUE, signed,
925 ppc64_elf_unhandled_reloc),
926
c213164a
AM
927 HOW (R_PPC64_TPREL34, 4, 34, 0x3ffff0000ffffULL, 0, FALSE, signed,
928 ppc64_elf_unhandled_reloc),
929
930 HOW (R_PPC64_DTPREL34, 4, 34, 0x3ffff0000ffffULL, 0, FALSE, signed,
931 ppc64_elf_unhandled_reloc),
932
933 HOW (R_PPC64_GOT_TLSGD34, 4, 34, 0x3ffff0000ffffULL, 0, TRUE, signed,
934 ppc64_elf_unhandled_reloc),
935
936 HOW (R_PPC64_GOT_TLSLD34, 4, 34, 0x3ffff0000ffffULL, 0, TRUE, signed,
937 ppc64_elf_unhandled_reloc),
938
939 HOW (R_PPC64_GOT_TPREL34, 4, 34, 0x3ffff0000ffffULL, 0, TRUE, signed,
940 ppc64_elf_unhandled_reloc),
941
942 HOW (R_PPC64_GOT_DTPREL34, 4, 34, 0x3ffff0000ffffULL, 0, TRUE, signed,
943 ppc64_elf_unhandled_reloc),
944
5663e321
AM
945 HOW (R_PPC64_ADDR16_HIGHER34, 1, 16, 0xffff, 34, FALSE, dont,
946 bfd_elf_generic_reloc),
947
948 HOW (R_PPC64_ADDR16_HIGHERA34, 1, 16, 0xffff, 34, FALSE, dont,
949 ppc64_elf_ha_reloc),
950
951 HOW (R_PPC64_ADDR16_HIGHEST34, 1, 16, 0xffff, 50, FALSE, dont,
952 bfd_elf_generic_reloc),
953
954 HOW (R_PPC64_ADDR16_HIGHESTA34, 1, 16, 0xffff, 50, FALSE, dont,
955 ppc64_elf_ha_reloc),
956
957 HOW (R_PPC64_REL16_HIGHER34, 1, 16, 0xffff, 34, TRUE, dont,
958 bfd_elf_generic_reloc),
959
960 HOW (R_PPC64_REL16_HIGHERA34, 1, 16, 0xffff, 34, TRUE, dont,
961 ppc64_elf_ha_reloc),
962
963 HOW (R_PPC64_REL16_HIGHEST34, 1, 16, 0xffff, 50, TRUE, dont,
964 bfd_elf_generic_reloc),
965
966 HOW (R_PPC64_REL16_HIGHESTA34, 1, 16, 0xffff, 50, TRUE, dont,
967 ppc64_elf_ha_reloc),
968
969 HOW (R_PPC64_D28, 4, 28, 0xfff0000ffffULL, 0, FALSE, signed,
970 ppc64_elf_prefix_reloc),
971
972 HOW (R_PPC64_PCREL28, 4, 28, 0xfff0000ffffULL, 0, TRUE, signed,
973 ppc64_elf_prefix_reloc),
974
5bd4f169 975 /* GNU extension to record C++ vtable hierarchy. */
46807bf4
AM
976 HOW (R_PPC64_GNU_VTINHERIT, 0, 0, 0, 0, FALSE, dont,
977 NULL),
5bd4f169
AM
978
979 /* GNU extension to record C++ vtable member usage. */
46807bf4
AM
980 HOW (R_PPC64_GNU_VTENTRY, 0, 0, 0, 0, FALSE, dont,
981 NULL),
5bd4f169
AM
982};
983
984\f
985/* Initialize the ppc64_elf_howto_table, so that linear accesses can
986 be done. */
987
988static void
4ce794b7 989ppc_howto_init (void)
5bd4f169
AM
990{
991 unsigned int i, type;
992
a4b6fadd 993 for (i = 0; i < ARRAY_SIZE (ppc64_elf_howto_raw); i++)
5bd4f169
AM
994 {
995 type = ppc64_elf_howto_raw[i].type;
a4b6fadd 996 BFD_ASSERT (type < ARRAY_SIZE (ppc64_elf_howto_table));
5bd4f169
AM
997 ppc64_elf_howto_table[type] = &ppc64_elf_howto_raw[i];
998 }
999}
1000
1001static reloc_howto_type *
f3185997 1002ppc64_elf_reloc_type_lookup (bfd *abfd,
4ce794b7 1003 bfd_reloc_code_real_type code)
5bd4f169 1004{
411e1bfb 1005 enum elf_ppc64_reloc_type r = R_PPC64_NONE;
5bd4f169
AM
1006
1007 if (!ppc64_elf_howto_table[R_PPC64_ADDR32])
1008 /* Initialize howto table if needed. */
1009 ppc_howto_init ();
1010
4ce794b7 1011 switch (code)
5bd4f169
AM
1012 {
1013 default:
f3185997 1014 /* xgettext:c-format */
2cdcc330
AM
1015 _bfd_error_handler (_("%pB: unsupported relocation type %#x"), abfd,
1016 (int) code);
f3185997 1017 bfd_set_error (bfd_error_bad_value);
4ce794b7 1018 return NULL;
5bd4f169 1019
411e1bfb
AM
1020 case BFD_RELOC_NONE: r = R_PPC64_NONE;
1021 break;
1022 case BFD_RELOC_32: r = R_PPC64_ADDR32;
1023 break;
1024 case BFD_RELOC_PPC_BA26: r = R_PPC64_ADDR24;
1025 break;
1026 case BFD_RELOC_16: r = R_PPC64_ADDR16;
1027 break;
1028 case BFD_RELOC_LO16: r = R_PPC64_ADDR16_LO;
1029 break;
1030 case BFD_RELOC_HI16: r = R_PPC64_ADDR16_HI;
1031 break;
f9c6b907
AM
1032 case BFD_RELOC_PPC64_ADDR16_HIGH: r = R_PPC64_ADDR16_HIGH;
1033 break;
411e1bfb 1034 case BFD_RELOC_HI16_S: r = R_PPC64_ADDR16_HA;
5bd4f169 1035 break;
f9c6b907
AM
1036 case BFD_RELOC_PPC64_ADDR16_HIGHA: r = R_PPC64_ADDR16_HIGHA;
1037 break;
411e1bfb 1038 case BFD_RELOC_PPC_BA16: r = R_PPC64_ADDR14;
5bd4f169 1039 break;
411e1bfb 1040 case BFD_RELOC_PPC_BA16_BRTAKEN: r = R_PPC64_ADDR14_BRTAKEN;
5bd4f169 1041 break;
411e1bfb 1042 case BFD_RELOC_PPC_BA16_BRNTAKEN: r = R_PPC64_ADDR14_BRNTAKEN;
5bd4f169 1043 break;
411e1bfb 1044 case BFD_RELOC_PPC_B26: r = R_PPC64_REL24;
5bd4f169 1045 break;
05d0e962
AM
1046 case BFD_RELOC_PPC64_REL24_NOTOC: r = R_PPC64_REL24_NOTOC;
1047 break;
411e1bfb 1048 case BFD_RELOC_PPC_B16: r = R_PPC64_REL14;
5bd4f169 1049 break;
411e1bfb 1050 case BFD_RELOC_PPC_B16_BRTAKEN: r = R_PPC64_REL14_BRTAKEN;
5bd4f169 1051 break;
411e1bfb 1052 case BFD_RELOC_PPC_B16_BRNTAKEN: r = R_PPC64_REL14_BRNTAKEN;
5bd4f169 1053 break;
411e1bfb 1054 case BFD_RELOC_16_GOTOFF: r = R_PPC64_GOT16;
5bd4f169 1055 break;
411e1bfb 1056 case BFD_RELOC_LO16_GOTOFF: r = R_PPC64_GOT16_LO;
5bd4f169 1057 break;
411e1bfb 1058 case BFD_RELOC_HI16_GOTOFF: r = R_PPC64_GOT16_HI;
5bd4f169 1059 break;
411e1bfb 1060 case BFD_RELOC_HI16_S_GOTOFF: r = R_PPC64_GOT16_HA;
5bd4f169 1061 break;
411e1bfb 1062 case BFD_RELOC_PPC_COPY: r = R_PPC64_COPY;
5bd4f169 1063 break;
411e1bfb 1064 case BFD_RELOC_PPC_GLOB_DAT: r = R_PPC64_GLOB_DAT;
5bd4f169 1065 break;
411e1bfb 1066 case BFD_RELOC_32_PCREL: r = R_PPC64_REL32;
5bd4f169 1067 break;
411e1bfb 1068 case BFD_RELOC_32_PLTOFF: r = R_PPC64_PLT32;
5bd4f169 1069 break;
411e1bfb 1070 case BFD_RELOC_32_PLT_PCREL: r = R_PPC64_PLTREL32;
5bd4f169 1071 break;
411e1bfb 1072 case BFD_RELOC_LO16_PLTOFF: r = R_PPC64_PLT16_LO;
5bd4f169 1073 break;
411e1bfb 1074 case BFD_RELOC_HI16_PLTOFF: r = R_PPC64_PLT16_HI;
5bd4f169 1075 break;
411e1bfb 1076 case BFD_RELOC_HI16_S_PLTOFF: r = R_PPC64_PLT16_HA;
5bd4f169 1077 break;
411e1bfb 1078 case BFD_RELOC_16_BASEREL: r = R_PPC64_SECTOFF;
5bd4f169 1079 break;
411e1bfb 1080 case BFD_RELOC_LO16_BASEREL: r = R_PPC64_SECTOFF_LO;
5bd4f169 1081 break;
411e1bfb 1082 case BFD_RELOC_HI16_BASEREL: r = R_PPC64_SECTOFF_HI;
5bd4f169 1083 break;
411e1bfb 1084 case BFD_RELOC_HI16_S_BASEREL: r = R_PPC64_SECTOFF_HA;
5bd4f169 1085 break;
411e1bfb 1086 case BFD_RELOC_CTOR: r = R_PPC64_ADDR64;
5bd4f169 1087 break;
411e1bfb 1088 case BFD_RELOC_64: r = R_PPC64_ADDR64;
5bd4f169 1089 break;
411e1bfb 1090 case BFD_RELOC_PPC64_HIGHER: r = R_PPC64_ADDR16_HIGHER;
5bd4f169 1091 break;
411e1bfb 1092 case BFD_RELOC_PPC64_HIGHER_S: r = R_PPC64_ADDR16_HIGHERA;
5bd4f169 1093 break;
411e1bfb 1094 case BFD_RELOC_PPC64_HIGHEST: r = R_PPC64_ADDR16_HIGHEST;
5bd4f169 1095 break;
411e1bfb 1096 case BFD_RELOC_PPC64_HIGHEST_S: r = R_PPC64_ADDR16_HIGHESTA;
5bd4f169 1097 break;
411e1bfb 1098 case BFD_RELOC_64_PCREL: r = R_PPC64_REL64;
5bd4f169 1099 break;
411e1bfb 1100 case BFD_RELOC_64_PLTOFF: r = R_PPC64_PLT64;
5bd4f169 1101 break;
411e1bfb 1102 case BFD_RELOC_64_PLT_PCREL: r = R_PPC64_PLTREL64;
5bd4f169 1103 break;
411e1bfb 1104 case BFD_RELOC_PPC_TOC16: r = R_PPC64_TOC16;
5bd4f169 1105 break;
411e1bfb 1106 case BFD_RELOC_PPC64_TOC16_LO: r = R_PPC64_TOC16_LO;
5bd4f169 1107 break;
411e1bfb 1108 case BFD_RELOC_PPC64_TOC16_HI: r = R_PPC64_TOC16_HI;
5bd4f169 1109 break;
411e1bfb 1110 case BFD_RELOC_PPC64_TOC16_HA: r = R_PPC64_TOC16_HA;
5bd4f169 1111 break;
411e1bfb 1112 case BFD_RELOC_PPC64_TOC: r = R_PPC64_TOC;
5bd4f169 1113 break;
411e1bfb 1114 case BFD_RELOC_PPC64_PLTGOT16: r = R_PPC64_PLTGOT16;
5bd4f169 1115 break;
411e1bfb 1116 case BFD_RELOC_PPC64_PLTGOT16_LO: r = R_PPC64_PLTGOT16_LO;
5bd4f169 1117 break;
411e1bfb 1118 case BFD_RELOC_PPC64_PLTGOT16_HI: r = R_PPC64_PLTGOT16_HI;
5bd4f169 1119 break;
411e1bfb 1120 case BFD_RELOC_PPC64_PLTGOT16_HA: r = R_PPC64_PLTGOT16_HA;
5bd4f169 1121 break;
411e1bfb 1122 case BFD_RELOC_PPC64_ADDR16_DS: r = R_PPC64_ADDR16_DS;
5bd4f169 1123 break;
411e1bfb 1124 case BFD_RELOC_PPC64_ADDR16_LO_DS: r = R_PPC64_ADDR16_LO_DS;
5bd4f169 1125 break;
411e1bfb 1126 case BFD_RELOC_PPC64_GOT16_DS: r = R_PPC64_GOT16_DS;
5bd4f169 1127 break;
411e1bfb 1128 case BFD_RELOC_PPC64_GOT16_LO_DS: r = R_PPC64_GOT16_LO_DS;
5bd4f169 1129 break;
411e1bfb 1130 case BFD_RELOC_PPC64_PLT16_LO_DS: r = R_PPC64_PLT16_LO_DS;
5bd4f169 1131 break;
411e1bfb 1132 case BFD_RELOC_PPC64_SECTOFF_DS: r = R_PPC64_SECTOFF_DS;
5bd4f169 1133 break;
411e1bfb 1134 case BFD_RELOC_PPC64_SECTOFF_LO_DS: r = R_PPC64_SECTOFF_LO_DS;
5bd4f169 1135 break;
411e1bfb 1136 case BFD_RELOC_PPC64_TOC16_DS: r = R_PPC64_TOC16_DS;
5bd4f169 1137 break;
411e1bfb 1138 case BFD_RELOC_PPC64_TOC16_LO_DS: r = R_PPC64_TOC16_LO_DS;
5bd4f169 1139 break;
411e1bfb 1140 case BFD_RELOC_PPC64_PLTGOT16_DS: r = R_PPC64_PLTGOT16_DS;
5bd4f169 1141 break;
411e1bfb 1142 case BFD_RELOC_PPC64_PLTGOT16_LO_DS: r = R_PPC64_PLTGOT16_LO_DS;
5bd4f169 1143 break;
c213164a 1144 case BFD_RELOC_PPC64_TLS_PCREL:
411e1bfb 1145 case BFD_RELOC_PPC_TLS: r = R_PPC64_TLS;
5bd4f169 1146 break;
727fc41e
AM
1147 case BFD_RELOC_PPC_TLSGD: r = R_PPC64_TLSGD;
1148 break;
1149 case BFD_RELOC_PPC_TLSLD: r = R_PPC64_TLSLD;
1150 break;
411e1bfb 1151 case BFD_RELOC_PPC_DTPMOD: r = R_PPC64_DTPMOD64;
5bd4f169 1152 break;
411e1bfb 1153 case BFD_RELOC_PPC_TPREL16: r = R_PPC64_TPREL16;
5bd4f169 1154 break;
411e1bfb 1155 case BFD_RELOC_PPC_TPREL16_LO: r = R_PPC64_TPREL16_LO;
5bd4f169 1156 break;
411e1bfb 1157 case BFD_RELOC_PPC_TPREL16_HI: r = R_PPC64_TPREL16_HI;
5bd4f169 1158 break;
f9c6b907
AM
1159 case BFD_RELOC_PPC64_TPREL16_HIGH: r = R_PPC64_TPREL16_HIGH;
1160 break;
411e1bfb 1161 case BFD_RELOC_PPC_TPREL16_HA: r = R_PPC64_TPREL16_HA;
5bd4f169 1162 break;
f9c6b907
AM
1163 case BFD_RELOC_PPC64_TPREL16_HIGHA: r = R_PPC64_TPREL16_HIGHA;
1164 break;
411e1bfb 1165 case BFD_RELOC_PPC_TPREL: r = R_PPC64_TPREL64;
5bd4f169 1166 break;
411e1bfb
AM
1167 case BFD_RELOC_PPC_DTPREL16: r = R_PPC64_DTPREL16;
1168 break;
1169 case BFD_RELOC_PPC_DTPREL16_LO: r = R_PPC64_DTPREL16_LO;
1170 break;
1171 case BFD_RELOC_PPC_DTPREL16_HI: r = R_PPC64_DTPREL16_HI;
1172 break;
f9c6b907
AM
1173 case BFD_RELOC_PPC64_DTPREL16_HIGH: r = R_PPC64_DTPREL16_HIGH;
1174 break;
411e1bfb
AM
1175 case BFD_RELOC_PPC_DTPREL16_HA: r = R_PPC64_DTPREL16_HA;
1176 break;
f9c6b907
AM
1177 case BFD_RELOC_PPC64_DTPREL16_HIGHA: r = R_PPC64_DTPREL16_HIGHA;
1178 break;
411e1bfb
AM
1179 case BFD_RELOC_PPC_DTPREL: r = R_PPC64_DTPREL64;
1180 break;
1181 case BFD_RELOC_PPC_GOT_TLSGD16: r = R_PPC64_GOT_TLSGD16;
1182 break;
1183 case BFD_RELOC_PPC_GOT_TLSGD16_LO: r = R_PPC64_GOT_TLSGD16_LO;
1184 break;
1185 case BFD_RELOC_PPC_GOT_TLSGD16_HI: r = R_PPC64_GOT_TLSGD16_HI;
1186 break;
1187 case BFD_RELOC_PPC_GOT_TLSGD16_HA: r = R_PPC64_GOT_TLSGD16_HA;
1188 break;
1189 case BFD_RELOC_PPC_GOT_TLSLD16: r = R_PPC64_GOT_TLSLD16;
1190 break;
1191 case BFD_RELOC_PPC_GOT_TLSLD16_LO: r = R_PPC64_GOT_TLSLD16_LO;
1192 break;
1193 case BFD_RELOC_PPC_GOT_TLSLD16_HI: r = R_PPC64_GOT_TLSLD16_HI;
1194 break;
1195 case BFD_RELOC_PPC_GOT_TLSLD16_HA: r = R_PPC64_GOT_TLSLD16_HA;
1196 break;
1197 case BFD_RELOC_PPC_GOT_TPREL16: r = R_PPC64_GOT_TPREL16_DS;
1198 break;
1199 case BFD_RELOC_PPC_GOT_TPREL16_LO: r = R_PPC64_GOT_TPREL16_LO_DS;
1200 break;
1201 case BFD_RELOC_PPC_GOT_TPREL16_HI: r = R_PPC64_GOT_TPREL16_HI;
1202 break;
1203 case BFD_RELOC_PPC_GOT_TPREL16_HA: r = R_PPC64_GOT_TPREL16_HA;
1204 break;
1205 case BFD_RELOC_PPC_GOT_DTPREL16: r = R_PPC64_GOT_DTPREL16_DS;
1206 break;
1207 case BFD_RELOC_PPC_GOT_DTPREL16_LO: r = R_PPC64_GOT_DTPREL16_LO_DS;
1208 break;
1209 case BFD_RELOC_PPC_GOT_DTPREL16_HI: r = R_PPC64_GOT_DTPREL16_HI;
1210 break;
1211 case BFD_RELOC_PPC_GOT_DTPREL16_HA: r = R_PPC64_GOT_DTPREL16_HA;
1212 break;
1213 case BFD_RELOC_PPC64_TPREL16_DS: r = R_PPC64_TPREL16_DS;
1214 break;
1215 case BFD_RELOC_PPC64_TPREL16_LO_DS: r = R_PPC64_TPREL16_LO_DS;
1216 break;
1217 case BFD_RELOC_PPC64_TPREL16_HIGHER: r = R_PPC64_TPREL16_HIGHER;
1218 break;
1219 case BFD_RELOC_PPC64_TPREL16_HIGHERA: r = R_PPC64_TPREL16_HIGHERA;
1220 break;
1221 case BFD_RELOC_PPC64_TPREL16_HIGHEST: r = R_PPC64_TPREL16_HIGHEST;
1222 break;
1223 case BFD_RELOC_PPC64_TPREL16_HIGHESTA: r = R_PPC64_TPREL16_HIGHESTA;
1224 break;
1225 case BFD_RELOC_PPC64_DTPREL16_DS: r = R_PPC64_DTPREL16_DS;
1226 break;
1227 case BFD_RELOC_PPC64_DTPREL16_LO_DS: r = R_PPC64_DTPREL16_LO_DS;
1228 break;
1229 case BFD_RELOC_PPC64_DTPREL16_HIGHER: r = R_PPC64_DTPREL16_HIGHER;
1230 break;
1231 case BFD_RELOC_PPC64_DTPREL16_HIGHERA: r = R_PPC64_DTPREL16_HIGHERA;
1232 break;
1233 case BFD_RELOC_PPC64_DTPREL16_HIGHEST: r = R_PPC64_DTPREL16_HIGHEST;
1234 break;
1235 case BFD_RELOC_PPC64_DTPREL16_HIGHESTA: r = R_PPC64_DTPREL16_HIGHESTA;
1236 break;
25f23106
AM
1237 case BFD_RELOC_16_PCREL: r = R_PPC64_REL16;
1238 break;
1239 case BFD_RELOC_LO16_PCREL: r = R_PPC64_REL16_LO;
1240 break;
1241 case BFD_RELOC_HI16_PCREL: r = R_PPC64_REL16_HI;
1242 break;
1243 case BFD_RELOC_HI16_S_PCREL: r = R_PPC64_REL16_HA;
1244 break;
4a969973
AM
1245 case BFD_RELOC_PPC64_REL16_HIGH: r = R_PPC64_REL16_HIGH;
1246 break;
1247 case BFD_RELOC_PPC64_REL16_HIGHA: r = R_PPC64_REL16_HIGHA;
1248 break;
1249 case BFD_RELOC_PPC64_REL16_HIGHER: r = R_PPC64_REL16_HIGHER;
1250 break;
1251 case BFD_RELOC_PPC64_REL16_HIGHERA: r = R_PPC64_REL16_HIGHERA;
1252 break;
1253 case BFD_RELOC_PPC64_REL16_HIGHEST: r = R_PPC64_REL16_HIGHEST;
1254 break;
1255 case BFD_RELOC_PPC64_REL16_HIGHESTA: r = R_PPC64_REL16_HIGHESTA;
1256 break;
7ba71655
AM
1257 case BFD_RELOC_PPC_16DX_HA: r = R_PPC64_16DX_HA;
1258 break;
a680de9a
PB
1259 case BFD_RELOC_PPC_REL16DX_HA: r = R_PPC64_REL16DX_HA;
1260 break;
006589cf
AM
1261 case BFD_RELOC_PPC64_ENTRY: r = R_PPC64_ENTRY;
1262 break;
45965137
AM
1263 case BFD_RELOC_PPC64_ADDR64_LOCAL: r = R_PPC64_ADDR64_LOCAL;
1264 break;
5663e321
AM
1265 case BFD_RELOC_PPC64_D34: r = R_PPC64_D34;
1266 break;
1267 case BFD_RELOC_PPC64_D34_LO: r = R_PPC64_D34_LO;
1268 break;
1269 case BFD_RELOC_PPC64_D34_HI30: r = R_PPC64_D34_HI30;
1270 break;
1271 case BFD_RELOC_PPC64_D34_HA30: r = R_PPC64_D34_HA30;
1272 break;
1273 case BFD_RELOC_PPC64_PCREL34: r = R_PPC64_PCREL34;
1274 break;
1275 case BFD_RELOC_PPC64_GOT_PCREL34: r = R_PPC64_GOT_PCREL34;
1276 break;
1277 case BFD_RELOC_PPC64_PLT_PCREL34: r = R_PPC64_PLT_PCREL34;
1278 break;
c213164a
AM
1279 case BFD_RELOC_PPC64_TPREL34: r = R_PPC64_TPREL34;
1280 break;
1281 case BFD_RELOC_PPC64_DTPREL34: r = R_PPC64_DTPREL34;
1282 break;
1283 case BFD_RELOC_PPC64_GOT_TLSGD34: r = R_PPC64_GOT_TLSGD34;
1284 break;
1285 case BFD_RELOC_PPC64_GOT_TLSLD34: r = R_PPC64_GOT_TLSLD34;
1286 break;
1287 case BFD_RELOC_PPC64_GOT_TPREL34: r = R_PPC64_GOT_TPREL34;
1288 break;
1289 case BFD_RELOC_PPC64_GOT_DTPREL34: r = R_PPC64_GOT_DTPREL34;
1290 break;
5663e321
AM
1291 case BFD_RELOC_PPC64_ADDR16_HIGHER34: r = R_PPC64_ADDR16_HIGHER34;
1292 break;
1293 case BFD_RELOC_PPC64_ADDR16_HIGHERA34: r = R_PPC64_ADDR16_HIGHERA34;
1294 break;
1295 case BFD_RELOC_PPC64_ADDR16_HIGHEST34: r = R_PPC64_ADDR16_HIGHEST34;
1296 break;
1297 case BFD_RELOC_PPC64_ADDR16_HIGHESTA34: r = R_PPC64_ADDR16_HIGHESTA34;
1298 break;
1299 case BFD_RELOC_PPC64_REL16_HIGHER34: r = R_PPC64_REL16_HIGHER34;
1300 break;
1301 case BFD_RELOC_PPC64_REL16_HIGHERA34: r = R_PPC64_REL16_HIGHERA34;
1302 break;
1303 case BFD_RELOC_PPC64_REL16_HIGHEST34: r = R_PPC64_REL16_HIGHEST34;
1304 break;
1305 case BFD_RELOC_PPC64_REL16_HIGHESTA34: r = R_PPC64_REL16_HIGHESTA34;
1306 break;
1307 case BFD_RELOC_PPC64_D28: r = R_PPC64_D28;
1308 break;
1309 case BFD_RELOC_PPC64_PCREL28: r = R_PPC64_PCREL28;
1310 break;
411e1bfb
AM
1311 case BFD_RELOC_VTABLE_INHERIT: r = R_PPC64_GNU_VTINHERIT;
1312 break;
1313 case BFD_RELOC_VTABLE_ENTRY: r = R_PPC64_GNU_VTENTRY;
5bd4f169
AM
1314 break;
1315 }
1316
4ce794b7 1317 return ppc64_elf_howto_table[r];
5bd4f169
AM
1318};
1319
157090f7
AM
1320static reloc_howto_type *
1321ppc64_elf_reloc_name_lookup (bfd *abfd ATTRIBUTE_UNUSED,
1322 const char *r_name)
1323{
1324 unsigned int i;
1325
a4b6fadd 1326 for (i = 0; i < ARRAY_SIZE (ppc64_elf_howto_raw); i++)
157090f7
AM
1327 if (ppc64_elf_howto_raw[i].name != NULL
1328 && strcasecmp (ppc64_elf_howto_raw[i].name, r_name) == 0)
1329 return &ppc64_elf_howto_raw[i];
1330
1331 return NULL;
1332}
1333
5bd4f169
AM
1334/* Set the howto pointer for a PowerPC ELF reloc. */
1335
f3185997 1336static bfd_boolean
4aef7643 1337ppc64_elf_info_to_howto (bfd *abfd, arelent *cache_ptr,
4ce794b7 1338 Elf_Internal_Rela *dst)
5bd4f169 1339{
65f38f15
AM
1340 unsigned int type;
1341
ef60b7ff 1342 /* Initialize howto table if needed. */
5bd4f169 1343 if (!ppc64_elf_howto_table[R_PPC64_ADDR32])
5bd4f169
AM
1344 ppc_howto_init ();
1345
65f38f15 1346 type = ELF64_R_TYPE (dst->r_info);
a4b6fadd 1347 if (type >= ARRAY_SIZE (ppc64_elf_howto_table))
d0fb9a8d 1348 {
695344c0 1349 /* xgettext:c-format */
0aa13fee 1350 _bfd_error_handler (_("%pB: unsupported relocation type %#x"),
cf97bcb0 1351 abfd, type);
f3185997
NC
1352 bfd_set_error (bfd_error_bad_value);
1353 return FALSE;
d0fb9a8d 1354 }
65f38f15 1355 cache_ptr->howto = ppc64_elf_howto_table[type];
f3185997
NC
1356 if (cache_ptr->howto == NULL || cache_ptr->howto->name == NULL)
1357 {
1358 /* xgettext:c-format */
1359 _bfd_error_handler (_("%pB: unsupported relocation type %#x"),
1360 abfd, type);
1361 bfd_set_error (bfd_error_bad_value);
1362 return FALSE;
1363 }
2cdcc330 1364
f3185997 1365 return TRUE;
5bd4f169
AM
1366}
1367
04c9666a 1368/* Handle the R_PPC64_ADDR16_HA and similar relocs. */
5bd4f169
AM
1369
1370static bfd_reloc_status_type
4ce794b7
AM
1371ppc64_elf_ha_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
1372 void *data, asection *input_section,
1373 bfd *output_bfd, char **error_message)
5bd4f169 1374{
a680de9a
PB
1375 enum elf_ppc64_reloc_type r_type;
1376 long insn;
1377 bfd_size_type octets;
3de43e7b 1378 bfd_vma value;
a680de9a 1379
805fc799
AM
1380 /* If this is a relocatable link (output_bfd test tells us), just
1381 call the generic function. Any adjustment will be done at final
1382 link time. */
1383 if (output_bfd != NULL)
cedb70c5 1384 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
805fc799
AM
1385 input_section, output_bfd, error_message);
1386
5663e321
AM
1387 /* Adjust the addend for sign extension of the low 16 (or 34) bits.
1388 We won't actually be using the low bits, so trashing them
805fc799 1389 doesn't matter. */
a680de9a 1390 r_type = reloc_entry->howto->type;
5663e321
AM
1391 if (r_type == R_PPC64_ADDR16_HIGHERA34
1392 || r_type == R_PPC64_ADDR16_HIGHESTA34
1393 || r_type == R_PPC64_REL16_HIGHERA34
1394 || r_type == R_PPC64_REL16_HIGHESTA34)
1395 reloc_entry->addend += 1ULL << 33;
1396 else
1397 reloc_entry->addend += 1U << 15;
a680de9a
PB
1398 if (r_type != R_PPC64_REL16DX_HA)
1399 return bfd_reloc_continue;
1400
1401 value = 0;
1402 if (!bfd_is_com_section (symbol->section))
1403 value = symbol->value;
1404 value += (reloc_entry->addend
1405 + symbol->section->output_offset
1406 + symbol->section->output_section->vma);
1407 value -= (reloc_entry->address
1408 + input_section->output_offset
1409 + input_section->output_section->vma);
3de43e7b 1410 value = (bfd_signed_vma) value >> 16;
a680de9a 1411
bb294208 1412 octets = reloc_entry->address * OCTETS_PER_BYTE (abfd, input_section);
a680de9a
PB
1413 insn = bfd_get_32 (abfd, (bfd_byte *) data + octets);
1414 insn &= ~0x1fffc1;
3de43e7b 1415 insn |= (value & 0xffc1) | ((value & 0x3e) << 15);
a680de9a 1416 bfd_put_32 (abfd, insn, (bfd_byte *) data + octets);
3de43e7b 1417 if (value + 0x8000 > 0xffff)
a680de9a
PB
1418 return bfd_reloc_overflow;
1419 return bfd_reloc_ok;
805fc799 1420}
5bd4f169 1421
2441e016
AM
1422static bfd_reloc_status_type
1423ppc64_elf_branch_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
1424 void *data, asection *input_section,
1425 bfd *output_bfd, char **error_message)
1426{
1427 if (output_bfd != NULL)
1428 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
1429 input_section, output_bfd, error_message);
1430
699733f6
AM
1431 if (strcmp (symbol->section->name, ".opd") == 0
1432 && (symbol->section->owner->flags & DYNAMIC) == 0)
2441e016
AM
1433 {
1434 bfd_vma dest = opd_entry_value (symbol->section,
1435 symbol->value + reloc_entry->addend,
aef36ac1 1436 NULL, NULL, FALSE);
2441e016
AM
1437 if (dest != (bfd_vma) -1)
1438 reloc_entry->addend = dest - (symbol->value
1439 + symbol->section->output_section->vma
1440 + symbol->section->output_offset);
1441 }
810d4e75
AM
1442 else
1443 {
1444 elf_symbol_type *elfsym = (elf_symbol_type *) symbol;
1445
1446 if (symbol->section->owner != abfd
9f284bf9 1447 && symbol->section->owner != NULL
810d4e75
AM
1448 && abiversion (symbol->section->owner) >= 2)
1449 {
1450 unsigned int i;
1451
1452 for (i = 0; i < symbol->section->owner->symcount; ++i)
1453 {
1454 asymbol *symdef = symbol->section->owner->outsymbols[i];
1455
1456 if (strcmp (symdef->name, symbol->name) == 0)
1457 {
1458 elfsym = (elf_symbol_type *) symdef;
1459 break;
1460 }
1461 }
1462 }
1463 reloc_entry->addend
1464 += PPC64_LOCAL_ENTRY_OFFSET (elfsym->internal_elf_sym.st_other);
1465 }
2441e016
AM
1466 return bfd_reloc_continue;
1467}
1468
805fc799 1469static bfd_reloc_status_type
4ce794b7
AM
1470ppc64_elf_brtaken_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
1471 void *data, asection *input_section,
1472 bfd *output_bfd, char **error_message)
805fc799
AM
1473{
1474 long insn;
04c9666a 1475 enum elf_ppc64_reloc_type r_type;
805fc799 1476 bfd_size_type octets;
794e51c0
AM
1477 /* Assume 'at' branch hints. */
1478 bfd_boolean is_isa_v2 = TRUE;
805fc799
AM
1479
1480 /* If this is a relocatable link (output_bfd test tells us), just
1481 call the generic function. Any adjustment will be done at final
1482 link time. */
5bd4f169 1483 if (output_bfd != NULL)
cedb70c5 1484 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
805fc799
AM
1485 input_section, output_bfd, error_message);
1486
bb294208 1487 octets = reloc_entry->address * OCTETS_PER_BYTE (abfd, input_section);
805fc799
AM
1488 insn = bfd_get_32 (abfd, (bfd_byte *) data + octets);
1489 insn &= ~(0x01 << 21);
4ce794b7 1490 r_type = reloc_entry->howto->type;
805fc799
AM
1491 if (r_type == R_PPC64_ADDR14_BRTAKEN
1492 || r_type == R_PPC64_REL14_BRTAKEN)
cedb70c5 1493 insn |= 0x01 << 21; /* 'y' or 't' bit, lowest bit of BO field. */
805fc799 1494
794e51c0 1495 if (is_isa_v2)
5bd4f169 1496 {
805fc799
AM
1497 /* Set 'a' bit. This is 0b00010 in BO field for branch
1498 on CR(BI) insns (BO == 001at or 011at), and 0b01000
1499 for branch on CTR insns (BO == 1a00t or 1a01t). */
1500 if ((insn & (0x14 << 21)) == (0x04 << 21))
1501 insn |= 0x02 << 21;
1502 else if ((insn & (0x14 << 21)) == (0x10 << 21))
1503 insn |= 0x08 << 21;
1504 else
2441e016 1505 goto out;
5bd4f169 1506 }
805fc799
AM
1507 else
1508 {
1509 bfd_vma target = 0;
1510 bfd_vma from;
5bd4f169 1511
805fc799
AM
1512 if (!bfd_is_com_section (symbol->section))
1513 target = symbol->value;
1514 target += symbol->section->output_section->vma;
1515 target += symbol->section->output_offset;
1516 target += reloc_entry->addend;
5bd4f169 1517
805fc799
AM
1518 from = (reloc_entry->address
1519 + input_section->output_offset
1520 + input_section->output_section->vma);
5bd4f169 1521
805fc799
AM
1522 /* Invert 'y' bit if not the default. */
1523 if ((bfd_signed_vma) (target - from) < 0)
1524 insn ^= 0x01 << 21;
1525 }
4ce794b7 1526 bfd_put_32 (abfd, insn, (bfd_byte *) data + octets);
2441e016
AM
1527 out:
1528 return ppc64_elf_branch_reloc (abfd, reloc_entry, symbol, data,
1529 input_section, output_bfd, error_message);
805fc799 1530}
5bd4f169 1531
805fc799 1532static bfd_reloc_status_type
4ce794b7
AM
1533ppc64_elf_sectoff_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
1534 void *data, asection *input_section,
1535 bfd *output_bfd, char **error_message)
805fc799
AM
1536{
1537 /* If this is a relocatable link (output_bfd test tells us), just
1538 call the generic function. Any adjustment will be done at final
1539 link time. */
1540 if (output_bfd != NULL)
cedb70c5 1541 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
805fc799 1542 input_section, output_bfd, error_message);
5bd4f169 1543
805fc799
AM
1544 /* Subtract the symbol section base address. */
1545 reloc_entry->addend -= symbol->section->output_section->vma;
5bd4f169
AM
1546 return bfd_reloc_continue;
1547}
1548
805fc799 1549static bfd_reloc_status_type
4ce794b7
AM
1550ppc64_elf_sectoff_ha_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
1551 void *data, asection *input_section,
1552 bfd *output_bfd, char **error_message)
805fc799
AM
1553{
1554 /* If this is a relocatable link (output_bfd test tells us), just
1555 call the generic function. Any adjustment will be done at final
1556 link time. */
1557 if (output_bfd != NULL)
cedb70c5 1558 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
805fc799
AM
1559 input_section, output_bfd, error_message);
1560
1561 /* Subtract the symbol section base address. */
1562 reloc_entry->addend -= symbol->section->output_section->vma;
1563
1564 /* Adjust the addend for sign extension of the low 16 bits. */
1565 reloc_entry->addend += 0x8000;
1566 return bfd_reloc_continue;
1567}
1568
1569static bfd_reloc_status_type
4ce794b7
AM
1570ppc64_elf_toc_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
1571 void *data, asection *input_section,
1572 bfd *output_bfd, char **error_message)
805fc799
AM
1573{
1574 bfd_vma TOCstart;
1575
1576 /* If this is a relocatable link (output_bfd test tells us), just
1577 call the generic function. Any adjustment will be done at final
1578 link time. */
1579 if (output_bfd != NULL)
cedb70c5 1580 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
805fc799
AM
1581 input_section, output_bfd, error_message);
1582
1583 TOCstart = _bfd_get_gp_value (input_section->output_section->owner);
1584 if (TOCstart == 0)
1c865ab2 1585 TOCstart = ppc64_elf_set_toc (NULL, input_section->output_section->owner);
805fc799
AM
1586
1587 /* Subtract the TOC base address. */
1588 reloc_entry->addend -= TOCstart + TOC_BASE_OFF;
1589 return bfd_reloc_continue;
1590}
1591
1592static bfd_reloc_status_type
4ce794b7
AM
1593ppc64_elf_toc_ha_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
1594 void *data, asection *input_section,
1595 bfd *output_bfd, char **error_message)
805fc799
AM
1596{
1597 bfd_vma TOCstart;
1598
1599 /* If this is a relocatable link (output_bfd test tells us), just
1600 call the generic function. Any adjustment will be done at final
1601 link time. */
1602 if (output_bfd != NULL)
cedb70c5 1603 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
805fc799
AM
1604 input_section, output_bfd, error_message);
1605
1606 TOCstart = _bfd_get_gp_value (input_section->output_section->owner);
1607 if (TOCstart == 0)
1c865ab2 1608 TOCstart = ppc64_elf_set_toc (NULL, input_section->output_section->owner);
805fc799
AM
1609
1610 /* Subtract the TOC base address. */
1611 reloc_entry->addend -= TOCstart + TOC_BASE_OFF;
1612
1613 /* Adjust the addend for sign extension of the low 16 bits. */
1614 reloc_entry->addend += 0x8000;
1615 return bfd_reloc_continue;
1616}
1617
1618static bfd_reloc_status_type
4ce794b7
AM
1619ppc64_elf_toc64_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
1620 void *data, asection *input_section,
1621 bfd *output_bfd, char **error_message)
805fc799
AM
1622{
1623 bfd_vma TOCstart;
1624 bfd_size_type octets;
1625
1626 /* If this is a relocatable link (output_bfd test tells us), just
1627 call the generic function. Any adjustment will be done at final
1628 link time. */
1629 if (output_bfd != NULL)
cedb70c5 1630 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
805fc799
AM
1631 input_section, output_bfd, error_message);
1632
1633 TOCstart = _bfd_get_gp_value (input_section->output_section->owner);
1634 if (TOCstart == 0)
1c865ab2 1635 TOCstart = ppc64_elf_set_toc (NULL, input_section->output_section->owner);
805fc799 1636
bb294208 1637 octets = reloc_entry->address * OCTETS_PER_BYTE (abfd, input_section);
805fc799
AM
1638 bfd_put_64 (abfd, TOCstart + TOC_BASE_OFF, (bfd_byte *) data + octets);
1639 return bfd_reloc_ok;
1640}
1641
5663e321
AM
1642static bfd_reloc_status_type
1643ppc64_elf_prefix_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
1644 void *data, asection *input_section,
1645 bfd *output_bfd, char **error_message)
1646{
1647 uint64_t insn;
1648 bfd_vma targ;
1649
1650 if (output_bfd != NULL)
1651 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
1652 input_section, output_bfd, error_message);
1653
1654 insn = bfd_get_32 (abfd, (bfd_byte *) data + reloc_entry->address);
1655 insn <<= 32;
1656 insn |= bfd_get_32 (abfd, (bfd_byte *) data + reloc_entry->address + 4);
1657
1658 targ = (symbol->section->output_section->vma
1659 + symbol->section->output_offset
1660 + reloc_entry->addend);
1661 if (!bfd_is_com_section (symbol->section))
1662 targ += symbol->value;
1663 if (reloc_entry->howto->type == R_PPC64_D34_HA30)
1664 targ += 1ULL << 33;
1665 if (reloc_entry->howto->pc_relative)
1666 {
1667 bfd_vma from = (reloc_entry->address
1668 + input_section->output_offset
1669 + input_section->output_section->vma);
1670 targ -=from;
1671 }
1672 targ >>= reloc_entry->howto->rightshift;
1673 insn &= ~reloc_entry->howto->dst_mask;
1674 insn |= ((targ << 16) | (targ & 0xffff)) & reloc_entry->howto->dst_mask;
1675 bfd_put_32 (abfd, insn >> 32, (bfd_byte *) data + reloc_entry->address);
1676 bfd_put_32 (abfd, insn, (bfd_byte *) data + reloc_entry->address + 4);
1677 if (reloc_entry->howto->complain_on_overflow == complain_overflow_signed
1678 && (targ + (1ULL << (reloc_entry->howto->bitsize - 1))
1679 >= 1ULL << reloc_entry->howto->bitsize))
1680 return bfd_reloc_overflow;
1681 return bfd_reloc_ok;
1682}
1683
805fc799 1684static bfd_reloc_status_type
4ce794b7
AM
1685ppc64_elf_unhandled_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
1686 void *data, asection *input_section,
1687 bfd *output_bfd, char **error_message)
805fc799
AM
1688{
1689 /* If this is a relocatable link (output_bfd test tells us), just
1690 call the generic function. Any adjustment will be done at final
1691 link time. */
1692 if (output_bfd != NULL)
cedb70c5 1693 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
805fc799
AM
1694 input_section, output_bfd, error_message);
1695
1696 if (error_message != NULL)
1697 {
1698 static char buf[60];
1699 sprintf (buf, "generic linker can't handle %s",
1700 reloc_entry->howto->name);
1701 *error_message = buf;
1702 }
1703 return bfd_reloc_dangerous;
1704}
1705
927be08e
AM
1706/* Track GOT entries needed for a given symbol. We might need more
1707 than one got entry per symbol. */
1708struct got_entry
1709{
1710 struct got_entry *next;
1711
1712 /* The symbol addend that we'll be placing in the GOT. */
1713 bfd_vma addend;
1714
1715 /* Unlike other ELF targets, we use separate GOT entries for the same
1716 symbol referenced from different input files. This is to support
1717 automatic multiple TOC/GOT sections, where the TOC base can vary
1718 from one input file to another. After partitioning into TOC groups
1719 we merge entries within the group.
1720
1721 Point to the BFD owning this GOT entry. */
1722 bfd *owner;
1723
1724 /* Zero for non-tls entries, or TLS_TLS and one of TLS_GD, TLS_LD,
1725 TLS_TPREL or TLS_DTPREL for tls entries. */
f961d9dd 1726 unsigned char tls_type;
927be08e
AM
1727
1728 /* Non-zero if got.ent points to real entry. */
f961d9dd 1729 unsigned char is_indirect;
927be08e
AM
1730
1731 /* Reference count until size_dynamic_sections, GOT offset thereafter. */
1732 union
2cdcc330
AM
1733 {
1734 bfd_signed_vma refcount;
1735 bfd_vma offset;
1736 struct got_entry *ent;
1737 } got;
927be08e
AM
1738};
1739
1740/* The same for PLT. */
1741struct plt_entry
1742{
1743 struct plt_entry *next;
1744
1745 bfd_vma addend;
1746
1747 union
2cdcc330
AM
1748 {
1749 bfd_signed_vma refcount;
1750 bfd_vma offset;
1751 } plt;
927be08e
AM
1752};
1753
e717da7e
AM
1754struct ppc64_elf_obj_tdata
1755{
1756 struct elf_obj_tdata elf;
1757
1758 /* Shortcuts to dynamic linker sections. */
1759 asection *got;
1760 asection *relgot;
1761
b3fac117
AM
1762 /* Used during garbage collection. We attach global symbols defined
1763 on removed .opd entries to this section so that the sym is removed. */
1764 asection *deleted_section;
81688140 1765
927be08e 1766 /* TLS local dynamic got entry handling. Support for multiple GOT
e717da7e 1767 sections means we potentially need one of these for each input bfd. */
927be08e 1768 struct got_entry tlsld_got;
8860955f 1769
2cdcc330
AM
1770 union
1771 {
729eabd5
AM
1772 /* A copy of relocs before they are modified for --emit-relocs. */
1773 Elf_Internal_Rela *relocs;
1774
1775 /* Section contents. */
1776 bfd_byte *contents;
1777 } opd;
d77c8a4b
AM
1778
1779 /* Nonzero if this bfd has small toc/got relocs, ie. that expect
1780 the reloc to be in the range -32768 to 32767. */
98528052
AM
1781 unsigned int has_small_toc_reloc : 1;
1782
560c8763
AM
1783 /* Set if toc/got ha relocs detected not using r2, or lo reloc
1784 instruction not one we handle. */
1785 unsigned int unexpected_toc_insn : 1;
066f4018 1786
903b777d
AM
1787 /* Set if PLT/GOT/TOC relocs that can be optimised are present in
1788 this file. */
1789 unsigned int has_optrel : 1;
e717da7e
AM
1790};
1791
1792#define ppc64_elf_tdata(bfd) \
1793 ((struct ppc64_elf_obj_tdata *) (bfd)->tdata.any)
1794
1795#define ppc64_tlsld_got(bfd) \
1796 (&ppc64_elf_tdata (bfd)->tlsld_got)
1797
0c8d6e5c
AM
1798#define is_ppc64_elf(bfd) \
1799 (bfd_get_flavour (bfd) == bfd_target_elf_flavour \
4dfe6ac6 1800 && elf_object_id (bfd) == PPC64_ELF_DATA)
0c8d6e5c 1801
e717da7e
AM
1802/* Override the generic function because we store some extras. */
1803
1804static bfd_boolean
1805ppc64_elf_mkobject (bfd *abfd)
1806{
0ffa91dd 1807 return bfd_elf_allocate_object (abfd, sizeof (struct ppc64_elf_obj_tdata),
4dfe6ac6 1808 PPC64_ELF_DATA);
e717da7e
AM
1809}
1810
feee612b 1811/* Fix bad default arch selected for a 64 bit input bfd when the
14b57c7c 1812 default is 32 bit. Also select arch based on apuinfo. */
feee612b 1813
b34976b6 1814static bfd_boolean
4ce794b7 1815ppc64_elf_object_p (bfd *abfd)
feee612b 1816{
14b57c7c
AM
1817 if (!abfd->arch_info->the_default)
1818 return TRUE;
1819
1820 if (abfd->arch_info->bits_per_word == 32)
feee612b
AM
1821 {
1822 Elf_Internal_Ehdr *i_ehdr = elf_elfheader (abfd);
1823
1824 if (i_ehdr->e_ident[EI_CLASS] == ELFCLASS64)
1825 {
1826 /* Relies on arch after 32 bit default being 64 bit default. */
1827 abfd->arch_info = abfd->arch_info->next;
1828 BFD_ASSERT (abfd->arch_info->bits_per_word == 64);
1829 }
1830 }
14b57c7c 1831 return _bfd_elf_ppc_set_arch (abfd);
feee612b
AM
1832}
1833
d37c89e5
AM
1834/* Support for core dump NOTE sections. */
1835
1836static bfd_boolean
1837ppc64_elf_grok_prstatus (bfd *abfd, Elf_Internal_Note *note)
1838{
eea6121a 1839 size_t offset, size;
d37c89e5
AM
1840
1841 if (note->descsz != 504)
1842 return FALSE;
1843
1844 /* pr_cursig */
228e534f 1845 elf_tdata (abfd)->core->signal = bfd_get_16 (abfd, note->descdata + 12);
d37c89e5
AM
1846
1847 /* pr_pid */
228e534f 1848 elf_tdata (abfd)->core->lwpid = bfd_get_32 (abfd, note->descdata + 32);
d37c89e5
AM
1849
1850 /* pr_reg */
1851 offset = 112;
eea6121a 1852 size = 384;
d37c89e5
AM
1853
1854 /* Make a ".reg/999" section. */
1855 return _bfd_elfcore_make_pseudosection (abfd, ".reg",
eea6121a 1856 size, note->descpos + offset);
d37c89e5
AM
1857}
1858
1859static bfd_boolean
1860ppc64_elf_grok_psinfo (bfd *abfd, Elf_Internal_Note *note)
1861{
1862 if (note->descsz != 136)
1863 return FALSE;
1864
228e534f 1865 elf_tdata (abfd)->core->pid
bc989cdc 1866 = bfd_get_32 (abfd, note->descdata + 24);
228e534f 1867 elf_tdata (abfd)->core->program
d37c89e5 1868 = _bfd_elfcore_strndup (abfd, note->descdata + 40, 16);
228e534f 1869 elf_tdata (abfd)->core->command
d37c89e5
AM
1870 = _bfd_elfcore_strndup (abfd, note->descdata + 56, 80);
1871
1872 return TRUE;
1873}
1874
183e98be
AM
1875static char *
1876ppc64_elf_write_core_note (bfd *abfd, char *buf, int *bufsiz, int note_type,
1877 ...)
1878{
1879 switch (note_type)
1880 {
1881 default:
1882 return NULL;
1883
1884 case NT_PRPSINFO:
1885 {
9ef6d1e3 1886 char data[136] ATTRIBUTE_NONSTRING;
183e98be
AM
1887 va_list ap;
1888
1889 va_start (ap, note_type);
75cd47ed 1890 memset (data, 0, sizeof (data));
183e98be 1891 strncpy (data + 40, va_arg (ap, const char *), 16);
be3e27bb 1892#if GCC_VERSION == 8000 || GCC_VERSION == 8001
95da9854 1893 DIAGNOSTIC_PUSH;
be3e27bb 1894 /* GCC 8.0 and 8.1 warn about 80 equals destination size with
95da9854
L
1895 -Wstringop-truncation:
1896 https://gcc.gnu.org/bugzilla/show_bug.cgi?id=85643
1897 */
95da9854
L
1898 DIAGNOSTIC_IGNORE_STRINGOP_TRUNCATION;
1899#endif
183e98be 1900 strncpy (data + 56, va_arg (ap, const char *), 80);
be3e27bb 1901#if GCC_VERSION == 8000 || GCC_VERSION == 8001
95da9854 1902 DIAGNOSTIC_POP;
fe75810f 1903#endif
183e98be
AM
1904 va_end (ap);
1905 return elfcore_write_note (abfd, buf, bufsiz,
1906 "CORE", note_type, data, sizeof (data));
1907 }
1908
1909 case NT_PRSTATUS:
1910 {
1911 char data[504];
1912 va_list ap;
1913 long pid;
1914 int cursig;
1915 const void *greg;
1916
1917 va_start (ap, note_type);
1918 memset (data, 0, 112);
1919 pid = va_arg (ap, long);
1920 bfd_put_32 (abfd, pid, data + 32);
1921 cursig = va_arg (ap, int);
1922 bfd_put_16 (abfd, cursig, data + 12);
1923 greg = va_arg (ap, const void *);
1924 memcpy (data + 112, greg, 384);
1925 memset (data + 496, 0, 8);
1926 va_end (ap);
1927 return elfcore_write_note (abfd, buf, bufsiz,
1928 "CORE", note_type, data, sizeof (data));
1929 }
1930 }
1931}
1932
5d35169e
AM
1933/* Add extra PPC sections. */
1934
2cdcc330 1935static const struct bfd_elf_special_section ppc64_elf_special_sections[] =
7f4d3958 1936{
07d6d2b8
AM
1937 { STRING_COMMA_LEN (".plt"), 0, SHT_NOBITS, 0 },
1938 { STRING_COMMA_LEN (".sbss"), -2, SHT_NOBITS, SHF_ALLOC + SHF_WRITE },
0112cd26 1939 { STRING_COMMA_LEN (".sdata"), -2, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE },
07d6d2b8
AM
1940 { STRING_COMMA_LEN (".toc"), 0, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE },
1941 { STRING_COMMA_LEN (".toc1"), 0, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE },
0112cd26 1942 { STRING_COMMA_LEN (".tocbss"), 0, SHT_NOBITS, SHF_ALLOC + SHF_WRITE },
07d6d2b8 1943 { NULL, 0, 0, 0, 0 }
5d35169e
AM
1944};
1945
7c8fe5c4
AM
1946enum _ppc64_sec_type {
1947 sec_normal = 0,
1948 sec_opd = 1,
1949 sec_toc = 2
1950};
1951
f0abc2a1
AM
1952struct _ppc64_elf_section_data
1953{
1954 struct bfd_elf_section_data elf;
411e1bfb 1955
f0abc2a1
AM
1956 union
1957 {
51aecdc5
AM
1958 /* An array with one entry for each opd function descriptor,
1959 and some spares since opd entries may be either 16 or 24 bytes. */
1960#define OPD_NDX(OFF) ((OFF) >> 4)
74f0fb50
AM
1961 struct _opd_sec_data
1962 {
1963 /* Points to the function code section for local opd entries. */
1964 asection **func_sec;
1965
1966 /* After editing .opd, adjust references to opd local syms. */
1967 long *adjust;
1968 } opd;
7c8fe5c4 1969
3a71aa26
AM
1970 /* An array for toc sections, indexed by offset/8. */
1971 struct _toc_sec_data
1972 {
1973 /* Specifies the relocation symbol index used at a given toc offset. */
1974 unsigned *symndx;
1975
1976 /* And the relocation addend. */
1977 bfd_vma *add;
1978 } toc;
7c8fe5c4
AM
1979 } u;
1980
1981 enum _ppc64_sec_type sec_type:2;
411e1bfb 1982
7c8fe5c4
AM
1983 /* Flag set when small branches are detected. Used to
1984 select suitable defaults for the stub group size. */
1985 unsigned int has_14bit_branch:1;
3e04d765
AM
1986
1987 /* Flag set when PLTCALL relocs are detected. */
1988 unsigned int has_pltcall:1;
066f4018 1989
903b777d
AM
1990 /* Flag set when section has PLT/GOT/TOC relocations that can be
1991 optimised. */
1992 unsigned int has_optrel:1;
f0abc2a1
AM
1993};
1994
1995#define ppc64_elf_section_data(sec) \
411e1bfb 1996 ((struct _ppc64_elf_section_data *) elf_section_data (sec))
f0abc2a1
AM
1997
1998static bfd_boolean
4ce794b7 1999ppc64_elf_new_section_hook (bfd *abfd, asection *sec)
f0abc2a1 2000{
f592407e
AM
2001 if (!sec->used_by_bfd)
2002 {
2003 struct _ppc64_elf_section_data *sdata;
986f0783 2004 size_t amt = sizeof (*sdata);
f0abc2a1 2005
f592407e
AM
2006 sdata = bfd_zalloc (abfd, amt);
2007 if (sdata == NULL)
2008 return FALSE;
2009 sec->used_by_bfd = sdata;
2010 }
f0abc2a1
AM
2011
2012 return _bfd_elf_new_section_hook (abfd, sec);
2013}
4025353c 2014
bf577467
AM
2015static bfd_boolean
2016ppc64_elf_section_flags (const Elf_Internal_Shdr *hdr)
2017{
2018 const char *name = hdr->bfd_section->name;
2019
2020 if (strncmp (name, ".sbss", 5) == 0
2021 || strncmp (name, ".sdata", 6) == 0)
2022 hdr->bfd_section->flags |= SEC_SMALL_DATA;
2023
2024 return TRUE;
2025}
2026
74f0fb50 2027static struct _opd_sec_data *
4025353c
AM
2028get_opd_info (asection * sec)
2029{
2030 if (sec != NULL
2031 && ppc64_elf_section_data (sec) != NULL
7c8fe5c4 2032 && ppc64_elf_section_data (sec)->sec_type == sec_opd)
74f0fb50 2033 return &ppc64_elf_section_data (sec)->u.opd;
4025353c
AM
2034 return NULL;
2035}
90e3cdf2
JJ
2036\f
2037/* Parameters for the qsort hook. */
90e3cdf2 2038static bfd_boolean synthetic_relocatable;
cd285db5 2039static asection *synthetic_opd;
90e3cdf2 2040
699733f6 2041/* qsort comparison function for ppc64_elf_get_synthetic_symtab. */
90e3cdf2
JJ
2042
2043static int
2044compare_symbols (const void *ap, const void *bp)
2045{
2cdcc330
AM
2046 const asymbol *a = *(const asymbol **) ap;
2047 const asymbol *b = *(const asymbol **) bp;
90e3cdf2 2048
699733f6
AM
2049 /* Section symbols first. */
2050 if ((a->flags & BSF_SECTION_SYM) && !(b->flags & BSF_SECTION_SYM))
90e3cdf2 2051 return -1;
699733f6 2052 if (!(a->flags & BSF_SECTION_SYM) && (b->flags & BSF_SECTION_SYM))
90e3cdf2
JJ
2053 return 1;
2054
699733f6 2055 /* then .opd symbols. */
cd285db5
AM
2056 if (synthetic_opd != NULL)
2057 {
2058 if (strcmp (a->section->name, ".opd") == 0
2059 && strcmp (b->section->name, ".opd") != 0)
2060 return -1;
2061 if (strcmp (a->section->name, ".opd") != 0
2062 && strcmp (b->section->name, ".opd") == 0)
2063 return 1;
2064 }
90e3cdf2 2065
699733f6 2066 /* then other code symbols. */
2cdcc330
AM
2067 if (((a->section->flags & (SEC_CODE | SEC_ALLOC | SEC_THREAD_LOCAL))
2068 == (SEC_CODE | SEC_ALLOC))
2069 && ((b->section->flags & (SEC_CODE | SEC_ALLOC | SEC_THREAD_LOCAL))
2070 != (SEC_CODE | SEC_ALLOC)))
90e3cdf2
JJ
2071 return -1;
2072
2cdcc330
AM
2073 if (((a->section->flags & (SEC_CODE | SEC_ALLOC | SEC_THREAD_LOCAL))
2074 != (SEC_CODE | SEC_ALLOC))
2075 && ((b->section->flags & (SEC_CODE | SEC_ALLOC | SEC_THREAD_LOCAL))
2076 == (SEC_CODE | SEC_ALLOC)))
90e3cdf2
JJ
2077 return 1;
2078
2079 if (synthetic_relocatable)
2080 {
2081 if (a->section->id < b->section->id)
2082 return -1;
2083
2084 if (a->section->id > b->section->id)
2085 return 1;
2086 }
2087
2088 if (a->value + a->section->vma < b->value + b->section->vma)
2089 return -1;
2090
2091 if (a->value + a->section->vma > b->value + b->section->vma)
2092 return 1;
2093
4d35a0aa
AM
2094 /* For syms with the same value, prefer strong dynamic global function
2095 syms over other syms. */
2096 if ((a->flags & BSF_GLOBAL) != 0 && (b->flags & BSF_GLOBAL) == 0)
2097 return -1;
2098
2099 if ((a->flags & BSF_GLOBAL) == 0 && (b->flags & BSF_GLOBAL) != 0)
2100 return 1;
2101
2102 if ((a->flags & BSF_FUNCTION) != 0 && (b->flags & BSF_FUNCTION) == 0)
2103 return -1;
2104
2105 if ((a->flags & BSF_FUNCTION) == 0 && (b->flags & BSF_FUNCTION) != 0)
2106 return 1;
2107
2108 if ((a->flags & BSF_WEAK) == 0 && (b->flags & BSF_WEAK) != 0)
2109 return -1;
2110
2111 if ((a->flags & BSF_WEAK) != 0 && (b->flags & BSF_WEAK) == 0)
2112 return 1;
2113
2114 if ((a->flags & BSF_DYNAMIC) != 0 && (b->flags & BSF_DYNAMIC) == 0)
2115 return -1;
2116
2117 if ((a->flags & BSF_DYNAMIC) == 0 && (b->flags & BSF_DYNAMIC) != 0)
2118 return 1;
2119
dcea6a95
AM
2120 /* Finally, sort on where the symbol is in memory. The symbols will
2121 be in at most two malloc'd blocks, one for static syms, one for
2122 dynamic syms, and we distinguish the two blocks above by testing
2123 BSF_DYNAMIC. Since we are sorting the symbol pointers which were
2124 originally in the same order as the symbols (and we're not
2125 sorting the symbols themselves), this ensures a stable sort. */
2126 if (a < b)
2127 return -1;
2128 if (a > b)
2129 return 1;
2130 return 0;
90e3cdf2
JJ
2131}
2132
699733f6 2133/* Search SYMS for a symbol of the given VALUE. */
90e3cdf2 2134
699733f6 2135static asymbol *
9ad9b810
AM
2136sym_exists_at (asymbol **syms, size_t lo, size_t hi, unsigned int id,
2137 bfd_vma value)
90e3cdf2 2138{
9ad9b810 2139 size_t mid;
90e3cdf2 2140
7292b3ac 2141 if (id == (unsigned) -1)
699733f6
AM
2142 {
2143 while (lo < hi)
2144 {
2145 mid = (lo + hi) >> 1;
2146 if (syms[mid]->value + syms[mid]->section->vma < value)
2147 lo = mid + 1;
2148 else if (syms[mid]->value + syms[mid]->section->vma > value)
2149 hi = mid;
2150 else
2151 return syms[mid];
2152 }
2153 }
2154 else
2155 {
2156 while (lo < hi)
2157 {
2158 mid = (lo + hi) >> 1;
2159 if (syms[mid]->section->id < id)
2160 lo = mid + 1;
2161 else if (syms[mid]->section->id > id)
2162 hi = mid;
2163 else if (syms[mid]->value < value)
2164 lo = mid + 1;
2165 else if (syms[mid]->value > value)
2166 hi = mid;
2167 else
2168 return syms[mid];
2169 }
2170 }
2171 return NULL;
90e3cdf2
JJ
2172}
2173
468392fb
AM
2174static bfd_boolean
2175section_covers_vma (bfd *abfd ATTRIBUTE_UNUSED, asection *section, void *ptr)
2176{
2177 bfd_vma vma = *(bfd_vma *) ptr;
2178 return ((section->flags & SEC_ALLOC) != 0
2179 && section->vma <= vma
2180 && vma < section->vma + section->size);
2181}
2182
699733f6 2183/* Create synthetic symbols, effectively restoring "dot-symbol" function
c4b0b099
AM
2184 entry syms. Also generate @plt symbols for the glink branch table.
2185 Returns count of synthetic symbols in RET or -1 on error. */
90e3cdf2
JJ
2186
2187static long
a7535cf3
AM
2188ppc64_elf_get_synthetic_symtab (bfd *abfd,
2189 long static_count, asymbol **static_syms,
2190 long dyn_count, asymbol **dyn_syms,
c9727e01 2191 asymbol **ret)
90e3cdf2
JJ
2192{
2193 asymbol *s;
0ccf57bd 2194 size_t i, j, count;
90e3cdf2 2195 char *names;
0ccf57bd 2196 size_t symcount, codesecsym, codesecsymend, secsymend, opdsymend;
ee67d69a 2197 asection *opd = NULL;
90e3cdf2 2198 bfd_boolean relocatable = (abfd->flags & (EXEC_P | DYNAMIC)) == 0;
a7535cf3 2199 asymbol **syms;
ee67d69a 2200 int abi = abiversion (abfd);
90e3cdf2
JJ
2201
2202 *ret = NULL;
2203
ee67d69a
AM
2204 if (abi < 2)
2205 {
2206 opd = bfd_get_section_by_name (abfd, ".opd");
2207 if (opd == NULL && abi == 1)
2208 return 0;
2209 }
90e3cdf2 2210
a5259595
AM
2211 syms = NULL;
2212 codesecsym = 0;
2213 codesecsymend = 0;
2214 secsymend = 0;
2215 opdsymend = 0;
2216 symcount = 0;
2217 if (opd != NULL)
c9727e01 2218 {
a5259595
AM
2219 symcount = static_count;
2220 if (!relocatable)
2221 symcount += dyn_count;
2222 if (symcount == 0)
2223 return 0;
c9727e01 2224
a5259595
AM
2225 syms = bfd_malloc ((symcount + 1) * sizeof (*syms));
2226 if (syms == NULL)
2227 return -1;
90e3cdf2 2228
a5259595
AM
2229 if (!relocatable && static_count != 0 && dyn_count != 0)
2230 {
2231 /* Use both symbol tables. */
2232 memcpy (syms, static_syms, static_count * sizeof (*syms));
2233 memcpy (syms + static_count, dyn_syms,
2234 (dyn_count + 1) * sizeof (*syms));
2235 }
2236 else if (!relocatable && static_count == 0)
2237 memcpy (syms, dyn_syms, (symcount + 1) * sizeof (*syms));
2238 else
2239 memcpy (syms, static_syms, (symcount + 1) * sizeof (*syms));
90e3cdf2 2240
0ccf57bd
AM
2241 /* Trim uninteresting symbols. Interesting symbols are section,
2242 function, and notype symbols. */
2243 for (i = 0, j = 0; i < symcount; ++i)
2244 if ((syms[i]->flags & (BSF_FILE | BSF_OBJECT | BSF_THREAD_LOCAL
2245 | BSF_RELC | BSF_SRELC)) == 0)
2246 syms[j++] = syms[i];
2247 symcount = j;
2248
a5259595
AM
2249 synthetic_relocatable = relocatable;
2250 synthetic_opd = opd;
2251 qsort (syms, symcount, sizeof (*syms), compare_symbols);
90e3cdf2 2252
a5259595
AM
2253 if (!relocatable && symcount > 1)
2254 {
bfa5bd2a
PA
2255 /* Trim duplicate syms, since we may have merged the normal
2256 and dynamic symbols. Actually, we only care about syms
2257 that have different values, so trim any with the same
2258 value. Don't consider ifunc and ifunc resolver symbols
2259 duplicates however, because GDB wants to know whether a
2260 text symbol is an ifunc resolver. */
a5259595 2261 for (i = 1, j = 1; i < symcount; ++i)
bfa5bd2a
PA
2262 {
2263 const asymbol *s0 = syms[i - 1];
2264 const asymbol *s1 = syms[i];
2265
2266 if ((s0->value + s0->section->vma
2267 != s1->value + s1->section->vma)
2268 || ((s0->flags & BSF_GNU_INDIRECT_FUNCTION)
2269 != (s1->flags & BSF_GNU_INDIRECT_FUNCTION)))
2270 syms[j++] = syms[i];
2271 }
a5259595
AM
2272 symcount = j;
2273 }
699733f6 2274
a5259595
AM
2275 i = 0;
2276 /* Note that here and in compare_symbols we can't compare opd and
2277 sym->section directly. With separate debug info files, the
2278 symbols will be extracted from the debug file while abfd passed
2279 to this function is the real binary. */
0ccf57bd 2280 if (strcmp (syms[i]->section->name, ".opd") == 0)
a5259595
AM
2281 ++i;
2282 codesecsym = i;
2283
2284 for (; i < symcount; ++i)
2285 if (((syms[i]->section->flags & (SEC_CODE | SEC_ALLOC
2286 | SEC_THREAD_LOCAL))
2287 != (SEC_CODE | SEC_ALLOC))
2288 || (syms[i]->flags & BSF_SECTION_SYM) == 0)
2289 break;
2290 codesecsymend = i;
2291
2292 for (; i < symcount; ++i)
2293 if ((syms[i]->flags & BSF_SECTION_SYM) == 0)
2294 break;
2295 secsymend = i;
2296
2297 for (; i < symcount; ++i)
2298 if (strcmp (syms[i]->section->name, ".opd") != 0)
2299 break;
2300 opdsymend = i;
2301
2302 for (; i < symcount; ++i)
2cdcc330
AM
2303 if (((syms[i]->section->flags
2304 & (SEC_CODE | SEC_ALLOC | SEC_THREAD_LOCAL)))
a5259595
AM
2305 != (SEC_CODE | SEC_ALLOC))
2306 break;
2307 symcount = i;
2308 }
c9727e01 2309 count = 0;
90e3cdf2 2310
699733f6 2311 if (relocatable)
90e3cdf2 2312 {
699733f6
AM
2313 bfd_boolean (*slurp_relocs) (bfd *, asection *, asymbol **, bfd_boolean);
2314 arelent *r;
2315 size_t size;
0ccf57bd 2316 size_t relcount;
90e3cdf2 2317
468392fb
AM
2318 if (opdsymend == secsymend)
2319 goto done;
2320
699733f6 2321 slurp_relocs = get_elf_backend_data (abfd)->s->slurp_reloc_table;
90e3cdf2 2322 relcount = (opd->flags & SEC_RELOC) ? opd->reloc_count : 0;
7356fed5 2323 if (relcount == 0)
c9727e01 2324 goto done;
90e3cdf2 2325
7356fed5
AM
2326 if (!(*slurp_relocs) (abfd, opd, static_syms, FALSE))
2327 {
2328 count = -1;
2329 goto done;
2330 }
2331
699733f6 2332 size = 0;
595da8c5 2333 for (i = secsymend, r = opd->relocation; i < opdsymend; ++i)
699733f6
AM
2334 {
2335 asymbol *sym;
90e3cdf2 2336
595da8c5 2337 while (r < opd->relocation + relcount
699733f6
AM
2338 && r->address < syms[i]->value + opd->vma)
2339 ++r;
90e3cdf2 2340
595da8c5 2341 if (r == opd->relocation + relcount)
699733f6 2342 break;
90e3cdf2 2343
699733f6
AM
2344 if (r->address != syms[i]->value + opd->vma)
2345 continue;
90e3cdf2 2346
699733f6
AM
2347 if (r->howto->type != R_PPC64_ADDR64)
2348 continue;
90e3cdf2 2349
699733f6
AM
2350 sym = *r->sym_ptr_ptr;
2351 if (!sym_exists_at (syms, opdsymend, symcount,
2352 sym->section->id, sym->value + r->addend))
2353 {
2354 ++count;
2355 size += sizeof (asymbol);
2356 size += strlen (syms[i]->name) + 2;
2357 }
2358 }
90e3cdf2 2359
c4b0b099
AM
2360 if (size == 0)
2361 goto done;
699733f6
AM
2362 s = *ret = bfd_malloc (size);
2363 if (s == NULL)
2364 {
7356fed5 2365 count = -1;
c9727e01 2366 goto done;
699733f6 2367 }
90e3cdf2 2368
699733f6 2369 names = (char *) (s + count);
90e3cdf2 2370
595da8c5 2371 for (i = secsymend, r = opd->relocation; i < opdsymend; ++i)
90e3cdf2 2372 {
699733f6 2373 asymbol *sym;
90e3cdf2 2374
595da8c5 2375 while (r < opd->relocation + relcount
699733f6
AM
2376 && r->address < syms[i]->value + opd->vma)
2377 ++r;
90e3cdf2 2378
595da8c5 2379 if (r == opd->relocation + relcount)
699733f6
AM
2380 break;
2381
2382 if (r->address != syms[i]->value + opd->vma)
2383 continue;
2384
2385 if (r->howto->type != R_PPC64_ADDR64)
2386 continue;
90e3cdf2 2387
699733f6
AM
2388 sym = *r->sym_ptr_ptr;
2389 if (!sym_exists_at (syms, opdsymend, symcount,
2390 sym->section->id, sym->value + r->addend))
2391 {
2392 size_t len;
2393
2394 *s = *syms[i];
6ba2a415 2395 s->flags |= BSF_SYNTHETIC;
699733f6
AM
2396 s->section = sym->section;
2397 s->value = sym->value + r->addend;
2398 s->name = names;
2399 *names++ = '.';
2400 len = strlen (syms[i]->name);
2401 memcpy (names, syms[i]->name, len + 1);
2402 names += len + 1;
6f610d07
UW
2403 /* Have udata.p point back to the original symbol this
2404 synthetic symbol was derived from. */
2405 s->udata.p = syms[i];
699733f6
AM
2406 s++;
2407 }
2408 }
2409 }
2410 else
90e3cdf2 2411 {
468392fb 2412 bfd_boolean (*slurp_relocs) (bfd *, asection *, asymbol **, bfd_boolean);
ee67d69a 2413 bfd_byte *contents = NULL;
699733f6 2414 size_t size;
0ccf57bd 2415 size_t plt_count = 0;
468392fb
AM
2416 bfd_vma glink_vma = 0, resolv_vma = 0;
2417 asection *dynamic, *glink = NULL, *relplt = NULL;
2418 arelent *p;
90e3cdf2 2419
ee67d69a 2420 if (opd != NULL && !bfd_malloc_and_get_section (abfd, opd, &contents))
699733f6 2421 {
c4b0b099
AM
2422 free_contents_and_exit_err:
2423 count = -1;
ee67d69a 2424 free_contents_and_exit:
c9594989 2425 free (contents);
c9727e01 2426 goto done;
699733f6 2427 }
90e3cdf2 2428
699733f6
AM
2429 size = 0;
2430 for (i = secsymend; i < opdsymend; ++i)
2431 {
2432 bfd_vma ent;
90e3cdf2 2433
5ef11c02
AM
2434 /* Ignore bogus symbols. */
2435 if (syms[i]->value > opd->size - 8)
2436 continue;
2437
699733f6
AM
2438 ent = bfd_get_64 (abfd, contents + syms[i]->value);
2439 if (!sym_exists_at (syms, opdsymend, symcount, -1, ent))
2440 {
2441 ++count;
2442 size += sizeof (asymbol);
2443 size += strlen (syms[i]->name) + 2;
2444 }
2445 }
90e3cdf2 2446
468392fb 2447 /* Get start of .glink stubs from DT_PPC64_GLINK. */
066ee829
AM
2448 if (dyn_count != 0
2449 && (dynamic = bfd_get_section_by_name (abfd, ".dynamic")) != NULL)
468392fb
AM
2450 {
2451 bfd_byte *dynbuf, *extdyn, *extdynend;
2452 size_t extdynsize;
2453 void (*swap_dyn_in) (bfd *, const void *, Elf_Internal_Dyn *);
2454
2455 if (!bfd_malloc_and_get_section (abfd, dynamic, &dynbuf))
c4b0b099 2456 goto free_contents_and_exit_err;
468392fb
AM
2457
2458 extdynsize = get_elf_backend_data (abfd)->s->sizeof_dyn;
2459 swap_dyn_in = get_elf_backend_data (abfd)->s->swap_dyn_in;
2460
2461 extdyn = dynbuf;
2462 extdynend = extdyn + dynamic->size;
2463 for (; extdyn < extdynend; extdyn += extdynsize)
2464 {
2465 Elf_Internal_Dyn dyn;
2466 (*swap_dyn_in) (abfd, extdyn, &dyn);
2467
2468 if (dyn.d_tag == DT_NULL)
2469 break;
2470
2471 if (dyn.d_tag == DT_PPC64_GLINK)
2472 {
9e390558
AM
2473 /* The first glink stub starts at DT_PPC64_GLINK plus 32.
2474 See comment in ppc64_elf_finish_dynamic_sections. */
2475 glink_vma = dyn.d_un.d_val + 8 * 4;
468392fb
AM
2476 /* The .glink section usually does not survive the final
2477 link; search for the section (usually .text) where the
2478 glink stubs now reside. */
2479 glink = bfd_sections_find_if (abfd, section_covers_vma,
2480 &glink_vma);
2481 break;
2482 }
2483 }
2484
2485 free (dynbuf);
2486 }
2487
2488 if (glink != NULL)
2489 {
2490 /* Determine __glink trampoline by reading the relative branch
2491 from the first glink stub. */
2492 bfd_byte buf[4];
b9e5796b
AM
2493 unsigned int off = 0;
2494
2495 while (bfd_get_section_contents (abfd, glink, buf,
2496 glink_vma + off - glink->vma, 4))
468392fb
AM
2497 {
2498 unsigned int insn = bfd_get_32 (abfd, buf);
2499 insn ^= B_DOT;
2500 if ((insn & ~0x3fffffc) == 0)
b9e5796b 2501 {
2cdcc330
AM
2502 resolv_vma
2503 = glink_vma + off + (insn ^ 0x2000000) - 0x2000000;
b9e5796b
AM
2504 break;
2505 }
2506 off += 4;
2507 if (off > 4)
2508 break;
468392fb
AM
2509 }
2510
2511 if (resolv_vma)
2512 size += sizeof (asymbol) + sizeof ("__glink_PLTresolve");
468392fb 2513
066ee829
AM
2514 relplt = bfd_get_section_by_name (abfd, ".rela.plt");
2515 if (relplt != NULL)
2516 {
2517 slurp_relocs = get_elf_backend_data (abfd)->s->slurp_reloc_table;
2cdcc330 2518 if (!(*slurp_relocs) (abfd, relplt, dyn_syms, TRUE))
c4b0b099 2519 goto free_contents_and_exit_err;
68ffbac6 2520
066ee829
AM
2521 plt_count = relplt->size / sizeof (Elf64_External_Rela);
2522 size += plt_count * sizeof (asymbol);
468392fb 2523
066ee829
AM
2524 p = relplt->relocation;
2525 for (i = 0; i < plt_count; i++, p++)
e054468f
AM
2526 {
2527 size += strlen ((*p->sym_ptr_ptr)->name) + sizeof ("@plt");
2528 if (p->addend != 0)
2529 size += sizeof ("+0x") - 1 + 16;
2530 }
066ee829 2531 }
468392fb
AM
2532 }
2533
c4b0b099
AM
2534 if (size == 0)
2535 goto free_contents_and_exit;
699733f6
AM
2536 s = *ret = bfd_malloc (size);
2537 if (s == NULL)
c4b0b099 2538 goto free_contents_and_exit_err;
90e3cdf2 2539
468392fb 2540 names = (char *) (s + count + plt_count + (resolv_vma != 0));
90e3cdf2 2541
699733f6 2542 for (i = secsymend; i < opdsymend; ++i)
90e3cdf2 2543 {
699733f6 2544 bfd_vma ent;
90e3cdf2 2545
5ef11c02
AM
2546 if (syms[i]->value > opd->size - 8)
2547 continue;
2548
699733f6
AM
2549 ent = bfd_get_64 (abfd, contents + syms[i]->value);
2550 if (!sym_exists_at (syms, opdsymend, symcount, -1, ent))
90e3cdf2 2551 {
0ccf57bd 2552 size_t lo, hi;
699733f6 2553 size_t len;
c9727e01 2554 asection *sec = abfd->sections;
90e3cdf2 2555
699733f6
AM
2556 *s = *syms[i];
2557 lo = codesecsym;
2558 hi = codesecsymend;
2559 while (lo < hi)
2560 {
0ccf57bd 2561 size_t mid = (lo + hi) >> 1;
699733f6
AM
2562 if (syms[mid]->section->vma < ent)
2563 lo = mid + 1;
2564 else if (syms[mid]->section->vma > ent)
2565 hi = mid;
2566 else
c9727e01
AM
2567 {
2568 sec = syms[mid]->section;
2569 break;
2570 }
699733f6
AM
2571 }
2572
c9727e01 2573 if (lo >= hi && lo > codesecsym)
699733f6 2574 sec = syms[lo - 1]->section;
699733f6
AM
2575
2576 for (; sec != NULL; sec = sec->next)
2577 {
2578 if (sec->vma > ent)
2579 break;
63524580
JK
2580 /* SEC_LOAD may not be set if SEC is from a separate debug
2581 info file. */
2582 if ((sec->flags & SEC_ALLOC) == 0)
699733f6
AM
2583 break;
2584 if ((sec->flags & SEC_CODE) != 0)
2585 s->section = sec;
2586 }
6ba2a415 2587 s->flags |= BSF_SYNTHETIC;
699733f6
AM
2588 s->value = ent - s->section->vma;
2589 s->name = names;
2590 *names++ = '.';
2591 len = strlen (syms[i]->name);
2592 memcpy (names, syms[i]->name, len + 1);
2593 names += len + 1;
6f610d07
UW
2594 /* Have udata.p point back to the original symbol this
2595 synthetic symbol was derived from. */
2596 s->udata.p = syms[i];
699733f6 2597 s++;
90e3cdf2 2598 }
90e3cdf2 2599 }
699733f6 2600 free (contents);
468392fb
AM
2601
2602 if (glink != NULL && relplt != NULL)
2603 {
2604 if (resolv_vma)
2605 {
2606 /* Add a symbol for the main glink trampoline. */
86a4952b 2607 memset (s, 0, sizeof *s);
468392fb 2608 s->the_bfd = abfd;
6ba2a415 2609 s->flags = BSF_GLOBAL | BSF_SYNTHETIC;
468392fb
AM
2610 s->section = glink;
2611 s->value = resolv_vma - glink->vma;
2612 s->name = names;
2cdcc330
AM
2613 memcpy (names, "__glink_PLTresolve",
2614 sizeof ("__glink_PLTresolve"));
468392fb
AM
2615 names += sizeof ("__glink_PLTresolve");
2616 s++;
2617 count++;
2618 }
2619
2620 /* FIXME: It would be very much nicer to put sym@plt on the
2621 stub rather than on the glink branch table entry. The
2622 objdump disassembler would then use a sensible symbol
2623 name on plt calls. The difficulty in doing so is
2624 a) finding the stubs, and,
2625 b) matching stubs against plt entries, and,
2626 c) there can be multiple stubs for a given plt entry.
2627
2628 Solving (a) could be done by code scanning, but older
2629 ppc64 binaries used different stubs to current code.
2630 (b) is the tricky one since you need to known the toc
2631 pointer for at least one function that uses a pic stub to
2632 be able to calculate the plt address referenced.
2633 (c) means gdb would need to set multiple breakpoints (or
2634 find the glink branch itself) when setting breakpoints
2635 for pending shared library loads. */
2636 p = relplt->relocation;
2637 for (i = 0; i < plt_count; i++, p++)
2638 {
2639 size_t len;
2640
2641 *s = **p->sym_ptr_ptr;
2642 /* Undefined syms won't have BSF_LOCAL or BSF_GLOBAL set. Since
2643 we are defining a symbol, ensure one of them is set. */
2644 if ((s->flags & BSF_LOCAL) == 0)
2645 s->flags |= BSF_GLOBAL;
6ba2a415 2646 s->flags |= BSF_SYNTHETIC;
468392fb
AM
2647 s->section = glink;
2648 s->value = glink_vma - glink->vma;
2649 s->name = names;
2650 s->udata.p = NULL;
2651 len = strlen ((*p->sym_ptr_ptr)->name);
2652 memcpy (names, (*p->sym_ptr_ptr)->name, len);
2653 names += len;
e054468f
AM
2654 if (p->addend != 0)
2655 {
2656 memcpy (names, "+0x", sizeof ("+0x") - 1);
2657 names += sizeof ("+0x") - 1;
2658 bfd_sprintf_vma (abfd, names, p->addend);
2659 names += strlen (names);
2660 }
468392fb
AM
2661 memcpy (names, "@plt", sizeof ("@plt"));
2662 names += sizeof ("@plt");
2663 s++;
b9e5796b
AM
2664 if (abi < 2)
2665 {
2666 glink_vma += 8;
2667 if (i >= 0x8000)
2668 glink_vma += 4;
2669 }
2670 else
468392fb
AM
2671 glink_vma += 4;
2672 }
2673 count += plt_count;
2674 }
90e3cdf2
JJ
2675 }
2676
c9727e01 2677 done:
a7535cf3 2678 free (syms);
90e3cdf2
JJ
2679 return count;
2680}
5bd4f169 2681\f
65f38f15
AM
2682/* The following functions are specific to the ELF linker, while
2683 functions above are used generally. Those named ppc64_elf_* are
2684 called by the main ELF linker code. They appear in this file more
2685 or less in the order in which they are called. eg.
2686 ppc64_elf_check_relocs is called early in the link process,
2687 ppc64_elf_finish_dynamic_sections is one of the last functions
e86ce104
AM
2688 called.
2689
2690 PowerPC64-ELF uses a similar scheme to PowerPC64-XCOFF in that
2691 functions have both a function code symbol and a function descriptor
2692 symbol. A call to foo in a relocatable object file looks like:
2693
2694 . .text
2695 . x:
2696 . bl .foo
2697 . nop
2698
2699 The function definition in another object file might be:
2700
2701 . .section .opd
2702 . foo: .quad .foo
2703 . .quad .TOC.@tocbase
2704 . .quad 0
2705 .
2706 . .text
2707 . .foo: blr
2708
2709 When the linker resolves the call during a static link, the branch
2710 unsurprisingly just goes to .foo and the .opd information is unused.
2711 If the function definition is in a shared library, things are a little
2712 different: The call goes via a plt call stub, the opd information gets
2713 copied to the plt, and the linker patches the nop.
2714
2715 . x:
2716 . bl .foo_stub
2717 . ld 2,40(1)
2718 .
2719 .
2720 . .foo_stub:
71a39c98
AM
2721 . std 2,40(1) # in practice, the call stub
2722 . addis 11,2,Lfoo@toc@ha # is slightly optimized, but
2723 . addi 11,11,Lfoo@toc@l # this is the general idea
2724 . ld 12,0(11)
2725 . ld 2,8(11)
2726 . mtctr 12
2727 . ld 11,16(11)
e86ce104
AM
2728 . bctr
2729 .
2730 . .section .plt
2731 . Lfoo: reloc (R_PPC64_JMP_SLOT, foo)
2732
2733 The "reloc ()" notation is supposed to indicate that the linker emits
2734 an R_PPC64_JMP_SLOT reloc against foo. The dynamic linker does the opd
2735 copying.
2736
2737 What are the difficulties here? Well, firstly, the relocations
2738 examined by the linker in check_relocs are against the function code
2739 sym .foo, while the dynamic relocation in the plt is emitted against
2740 the function descriptor symbol, foo. Somewhere along the line, we need
2741 to carefully copy dynamic link information from one symbol to the other.
2742 Secondly, the generic part of the elf linker will make .foo a dynamic
2743 symbol as is normal for most other backends. We need foo dynamic
2744 instead, at least for an application final link. However, when
2745 creating a shared library containing foo, we need to have both symbols
2746 dynamic so that references to .foo are satisfied during the early
2747 stages of linking. Otherwise the linker might decide to pull in a
8387904d
AM
2748 definition from some other object, eg. a static library.
2749
2750 Update: As of August 2004, we support a new convention. Function
2751 calls may use the function descriptor symbol, ie. "bl foo". This
2752 behaves exactly as "bl .foo". */
65f38f15 2753
7c8bbca5
AM
2754/* Of those relocs that might be copied as dynamic relocs, this
2755 function selects those that must be copied when linking a shared
2756 library or PIE, even when the symbol is local. */
65f38f15 2757
1d483afe
AM
2758static int
2759must_be_dyn_reloc (struct bfd_link_info *info,
2760 enum elf_ppc64_reloc_type r_type)
2761{
2762 switch (r_type)
2763 {
2764 default:
7c8bbca5
AM
2765 /* Only relative relocs can be resolved when the object load
2766 address isn't fixed. DTPREL64 is excluded because the
2767 dynamic linker needs to differentiate global dynamic from
2768 local dynamic __tls_index pairs when PPC64_OPT_TLS is set. */
1d483afe
AM
2769 return 1;
2770
2771 case R_PPC64_REL32:
2772 case R_PPC64_REL64:
2773 case R_PPC64_REL30:
1bdd8fac
AM
2774 case R_PPC64_TOC16:
2775 case R_PPC64_TOC16_DS:
2776 case R_PPC64_TOC16_LO:
2777 case R_PPC64_TOC16_HI:
2778 case R_PPC64_TOC16_HA:
2779 case R_PPC64_TOC16_LO_DS:
1d483afe
AM
2780 return 0;
2781
2782 case R_PPC64_TPREL16:
2783 case R_PPC64_TPREL16_LO:
2784 case R_PPC64_TPREL16_HI:
2785 case R_PPC64_TPREL16_HA:
2786 case R_PPC64_TPREL16_DS:
2787 case R_PPC64_TPREL16_LO_DS:
f9c6b907
AM
2788 case R_PPC64_TPREL16_HIGH:
2789 case R_PPC64_TPREL16_HIGHA:
1d483afe
AM
2790 case R_PPC64_TPREL16_HIGHER:
2791 case R_PPC64_TPREL16_HIGHERA:
2792 case R_PPC64_TPREL16_HIGHEST:
2793 case R_PPC64_TPREL16_HIGHESTA:
2794 case R_PPC64_TPREL64:
c213164a 2795 case R_PPC64_TPREL34:
7c8bbca5
AM
2796 /* These relocations are relative but in a shared library the
2797 linker doesn't know the thread pointer base. */
2798 return bfd_link_dll (info);
1d483afe
AM
2799 }
2800}
65f38f15 2801
f4656909 2802/* If ELIMINATE_COPY_RELOCS is non-zero, the linker will try to avoid
e1c6cf61 2803 copying dynamic variables from a shared lib into an app's .dynbss
f4656909 2804 section, and instead use a dynamic relocation to point into the
e1c6cf61
AM
2805 shared lib. With code that gcc generates it is vital that this be
2806 enabled; In the PowerPC64 ELFv1 ABI the address of a function is
2807 actually the address of a function descriptor which resides in the
2808 .opd section. gcc uses the descriptor directly rather than going
2809 via the GOT as some other ABIs do, which means that initialized
2810 function pointers reference the descriptor. Thus, a function
2811 pointer initialized to the address of a function in a shared
2812 library will either require a .dynbss copy and a copy reloc, or a
2813 dynamic reloc. Using a .dynbss copy redefines the function
2814 descriptor symbol to point to the copy. This presents a problem as
2815 a PLT entry for that function is also initialized from the function
2816 descriptor symbol and the copy may not be initialized first. */
a23b6845 2817#define ELIMINATE_COPY_RELOCS 1
f4656909 2818
721956f4 2819/* Section name for stubs is the associated section name plus this
29942be8
NC
2820 string. */
2821#define STUB_SUFFIX ".stub"
721956f4
AM
2822
2823/* Linker stubs.
2824 ppc_stub_long_branch:
2825 Used when a 14 bit branch (or even a 24 bit branch) can't reach its
2826 destination, but a 24 bit branch in a stub section will reach.
2827 . b dest
2828
2829 ppc_stub_plt_branch:
2830 Similar to the above, but a 24 bit branch in the stub section won't
2831 reach its destination.
6df4c9c2
AM
2832 . addis %r12,%r2,xxx@toc@ha
2833 . ld %r12,xxx@toc@l(%r12)
71a39c98 2834 . mtctr %r12
721956f4
AM
2835 . bctr
2836
2837 ppc_stub_plt_call:
2c66dc6c
AM
2838 Used to call a function in a shared library. If it so happens that
2839 the plt entry referenced crosses a 64k boundary, then an extra
71a39c98 2840 "addi %r11,%r11,xxx@toc@l" will be inserted before the "mtctr".
05d0e962 2841 ppc_stub_plt_call_r2save starts with "std %r2,40(%r1)".
71a39c98
AM
2842 . addis %r11,%r2,xxx@toc@ha
2843 . ld %r12,xxx+0@toc@l(%r11)
2844 . mtctr %r12
2845 . ld %r2,xxx+8@toc@l(%r11)
2846 . ld %r11,xxx+16@toc@l(%r11)
721956f4 2847 . bctr
ad8e1ba5
AM
2848
2849 ppc_stub_long_branch and ppc_stub_plt_branch may also have additional
2850 code to adjust the value and save r2 to support multiple toc sections.
2851 A ppc_stub_long_branch with an r2 offset looks like:
2852 . std %r2,40(%r1)
2853 . addis %r2,%r2,off@ha
2854 . addi %r2,%r2,off@l
2855 . b dest
2856
2857 A ppc_stub_plt_branch with an r2 offset looks like:
2858 . std %r2,40(%r1)
6df4c9c2
AM
2859 . addis %r12,%r2,xxx@toc@ha
2860 . ld %r12,xxx@toc@l(%r12)
ad8e1ba5
AM
2861 . addis %r2,%r2,off@ha
2862 . addi %r2,%r2,off@l
71a39c98 2863 . mtctr %r12
ad8e1ba5 2864 . bctr
ac2df442 2865
05d0e962
AM
2866 All of the above stubs are shown as their ELFv1 variants. ELFv2
2867 variants exist too, simpler for plt calls since a new toc pointer
2868 and static chain are not loaded by the stub. In addition, ELFv2
2869 has some more complex stubs to handle calls marked with NOTOC
2870 relocs from functions where r2 is not a valid toc pointer. These
2871 come in two flavours, the ones shown below, and _both variants that
2872 start with "std %r2,24(%r1)" to save r2 in the unlikely event that
2873 one call is from a function where r2 is used as the toc pointer but
2874 needs a toc adjusting stub for small-model multi-toc, and another
2875 call is from a function where r2 is not valid.
2876 ppc_stub_long_branch_notoc:
2877 . mflr %r12
2878 . bcl 20,31,1f
2879 . 1:
2880 . mflr %r11
2881 . mtlr %r12
2cdcc330
AM
2882 . addis %r12,%r11,dest-1b@ha
2883 . addi %r12,%r12,dest-1b@l
05d0e962
AM
2884 . b dest
2885
2886 ppc_stub_plt_branch_notoc:
2887 . mflr %r12
2888 . bcl 20,31,1f
2889 . 1:
2890 . mflr %r11
2891 . mtlr %r12
2892 . lis %r12,xxx-1b@highest
f891966f 2893 . ori %r12,%r12,xxx-1b@higher
05d0e962 2894 . sldi %r12,%r12,32
f891966f 2895 . oris %r12,%r12,xxx-1b@high
05d0e962
AM
2896 . ori %r12,%r12,xxx-1b@l
2897 . add %r12,%r11,%r12
2898 . mtctr %r12
2899 . bctr
2900
2901 ppc_stub_plt_call_notoc:
2902 . mflr %r12
2903 . bcl 20,31,1f
2904 . 1:
2905 . mflr %r11
2906 . mtlr %r12
2907 . lis %r12,xxx-1b@highest
f891966f 2908 . ori %r12,%r12,xxx-1b@higher
05d0e962 2909 . sldi %r12,%r12,32
f891966f 2910 . oris %r12,%r12,xxx-1b@high
05d0e962
AM
2911 . ori %r12,%r12,xxx-1b@l
2912 . ldx %r12,%r11,%r12
2913 . mtctr %r12
2914 . bctr
2915
7c1f4227 2916 There are also ELFv1 power10 variants of these stubs.
04bdff6a 2917 ppc_stub_long_branch_notoc:
d4b87b1e 2918 . pla %r12,dest@pcrel
04bdff6a
AM
2919 . b dest
2920 ppc_stub_plt_branch_notoc:
2921 . lis %r11,(dest-1f)@highesta34
2922 . ori %r11,%r11,(dest-1f)@highera34
2923 . sldi %r11,%r11,34
d4b87b1e 2924 . 1: pla %r12,dest@pcrel
04bdff6a
AM
2925 . add %r12,%r11,%r12
2926 . mtctr %r12
2927 . bctr
2928 ppc_stub_plt_call_notoc:
2929 . lis %r11,(xxx-1f)@highesta34
2930 . ori %r11,%r11,(xxx-1f)@highera34
2931 . sldi %r11,%r11,34
d4b87b1e 2932 . 1: pla %r12,xxx@pcrel
04bdff6a
AM
2933 . ldx %r12,%r11,%r12
2934 . mtctr %r12
2935 . bctr
2936
05d0e962
AM
2937 In cases where the high instructions would add zero, they are
2938 omitted and following instructions modified in some cases.
7c1f4227 2939 For example, a power10 ppc_stub_plt_call_notoc might simplify down
04bdff6a
AM
2940 to
2941 . pld %r12,xxx@pcrel
2942 . mtctr %r12
2943 . bctr
05d0e962
AM
2944
2945 For a given stub group (a set of sections all using the same toc
2946 pointer value) there will be just one stub type used for any
2947 particular function symbol. For example, if printf is called from
2948 code with the tocsave optimization (ie. r2 saved in function
2949 prologue) and therefore calls use a ppc_stub_plt_call linkage stub,
2950 and from other code without the tocsave optimization requiring a
2951 ppc_stub_plt_call_r2save linkage stub, a single stub of the latter
2952 type will be created. Calls with the tocsave optimization will
2953 enter this stub after the instruction saving r2. A similar
2954 situation exists when calls are marked with R_PPC64_REL24_NOTOC
2955 relocations. These require a ppc_stub_plt_call_notoc linkage stub
2956 to call an external function like printf. If other calls to printf
2957 require a ppc_stub_plt_call linkage stub then a single
2958 ppc_stub_plt_call_notoc linkage stub will be used for both types of
2959 call. If other calls to printf require a ppc_stub_plt_call_r2save
2960 linkage stub then a single ppc_stub_plt_call_both linkage stub will
2961 be created and calls not requiring r2 to be saved will enter the
2962 stub after the r2 save instruction. There is an analogous
2963 hierarchy of long branch and plt branch stubs for local call
2964 linkage. */
721956f4 2965
2cdcc330
AM
2966enum ppc_stub_type
2967{
721956f4
AM
2968 ppc_stub_none,
2969 ppc_stub_long_branch,
ad8e1ba5 2970 ppc_stub_long_branch_r2off,
05d0e962
AM
2971 ppc_stub_long_branch_notoc,
2972 ppc_stub_long_branch_both, /* r2off and notoc variants both needed. */
721956f4 2973 ppc_stub_plt_branch,
ad8e1ba5 2974 ppc_stub_plt_branch_r2off,
05d0e962
AM
2975 ppc_stub_plt_branch_notoc,
2976 ppc_stub_plt_branch_both,
794e51c0 2977 ppc_stub_plt_call,
7341d5e2 2978 ppc_stub_plt_call_r2save,
05d0e962
AM
2979 ppc_stub_plt_call_notoc,
2980 ppc_stub_plt_call_both,
a4b6fadd
AM
2981 ppc_stub_global_entry,
2982 ppc_stub_save_res
721956f4
AM
2983};
2984
6f20ed8a
AM
2985/* Information on stub grouping. */
2986struct map_stub
2987{
2988 /* The stub section. */
2989 asection *stub_sec;
2990 /* This is the section to which stubs in the group will be attached. */
2991 asection *link_sec;
a4b6fadd
AM
2992 /* Next group. */
2993 struct map_stub *next;
2994 /* Whether to emit a copy of register save/restore functions in this
2995 group. */
2996 int needs_save_res;
df136d64
AM
2997 /* Current offset within stubs after the insn restoring lr in a
2998 _notoc or _both stub using bcl for pc-relative addressing, or
2999 after the insn restoring lr in a __tls_get_addr_opt plt stub. */
3000 unsigned int lr_restore;
3001 /* Accumulated size of EH info emitted to describe return address
3002 if stubs modify lr. Does not include 17 byte FDE header. */
3003 unsigned int eh_size;
3004 /* Offset in glink_eh_frame to the start of EH info for this group. */
3005 unsigned int eh_base;
6f20ed8a
AM
3006};
3007
2cdcc330
AM
3008struct ppc_stub_hash_entry
3009{
721956f4
AM
3010 /* Base hash table entry structure. */
3011 struct bfd_hash_entry root;
3012
ad8e1ba5
AM
3013 enum ppc_stub_type stub_type;
3014
6f20ed8a
AM
3015 /* Group information. */
3016 struct map_stub *group;
721956f4
AM
3017
3018 /* Offset within stub_sec of the beginning of this stub. */
3019 bfd_vma stub_offset;
3020
3021 /* Given the symbol's value and its section we can determine its final
3022 value when building the stubs (so the stub knows where to jump. */
3023 bfd_vma target_value;
3024 asection *target_section;
3025
721956f4
AM
3026 /* The symbol table entry, if any, that this was derived from. */
3027 struct ppc_link_hash_entry *h;
e054468f 3028 struct plt_entry *plt_ent;
721956f4 3029
2d7ad24e
AM
3030 /* Symbol type. */
3031 unsigned char symtype;
3032
6911b7dc
AM
3033 /* Symbol st_other. */
3034 unsigned char other;
721956f4
AM
3035};
3036
2cdcc330
AM
3037struct ppc_branch_hash_entry
3038{
721956f4
AM
3039 /* Base hash table entry structure. */
3040 struct bfd_hash_entry root;
3041
c456f082 3042 /* Offset within branch lookup table. */
721956f4
AM
3043 unsigned int offset;
3044
3045 /* Generation marker. */
3046 unsigned int iter;
3047};
65f38f15 3048
19e08130
AM
3049/* Used to track dynamic relocations for local symbols. */
3050struct ppc_dyn_relocs
3051{
3052 struct ppc_dyn_relocs *next;
3053
3054 /* The input section of the reloc. */
3055 asection *sec;
3056
3057 /* Total number of relocs copied for the input section. */
3058 unsigned int count : 31;
3059
3060 /* Whether this entry is for STT_GNU_IFUNC symbols. */
3061 unsigned int ifunc : 1;
3062};
3063
65f38f15
AM
3064struct ppc_link_hash_entry
3065{
3066 struct elf_link_hash_entry elf;
3067
2cdcc330
AM
3068 union
3069 {
b3fac117
AM
3070 /* A pointer to the most recently used stub hash entry against this
3071 symbol. */
3072 struct ppc_stub_hash_entry *stub_cache;
3073
3074 /* A pointer to the next symbol starting with a '.' */
3075 struct ppc_link_hash_entry *next_dot_sym;
3076 } u;
721956f4 3077
65f38f15 3078 /* Track dynamic relocs copied for this symbol. */
6061a67d 3079 struct elf_dyn_relocs *dyn_relocs;
e86ce104 3080
721956f4 3081 /* Link between function code and descriptor symbols. */
34814b9f 3082 struct ppc_link_hash_entry *oh;
721956f4 3083
e86ce104
AM
3084 /* Flag function code and descriptor symbols. */
3085 unsigned int is_func:1;
3086 unsigned int is_func_descriptor:1;
908b32fc 3087 unsigned int fake:1;
411e1bfb 3088
c5614fa4
AM
3089 /* Whether global opd/toc sym has been adjusted or not.
3090 After ppc64_elf_edit_opd/ppc64_elf_edit_toc has run, this flag
3091 should be set for all globals defined in any opd/toc section. */
754021d0
AM
3092 unsigned int adjust_done:1;
3093
a4b6fadd
AM
3094 /* Set if this is an out-of-line register save/restore function,
3095 with non-standard calling convention. */
3096 unsigned int save_res:1;
3097
8b5f1ed8
AM
3098 /* Set if a duplicate symbol with non-zero localentry is detected,
3099 even when the duplicate symbol does not provide a definition. */
3100 unsigned int non_zero_localentry:1;
3101
411e1bfb 3102 /* Contexts in which symbol is used in the GOT (or TOC).
37da22e5
AM
3103 Bits are or'd into the mask as the corresponding relocs are
3104 encountered during check_relocs, with TLS_TLS being set when any
3105 of the other TLS bits are set. tls_optimize clears bits when
3106 optimizing to indicate the corresponding GOT entry type is not
3107 needed. If set, TLS_TLS is never cleared. tls_optimize may also
b00a0a86 3108 set TLS_GDIE when a GD reloc turns into an IE one.
37da22e5
AM
3109 These flags are also kept for local symbols. */
3110#define TLS_TLS 1 /* Any TLS reloc. */
3111#define TLS_GD 2 /* GD reloc. */
3112#define TLS_LD 4 /* LD reloc. */
3113#define TLS_TPREL 8 /* TPREL reloc, => IE. */
3114#define TLS_DTPREL 16 /* DTPREL reloc, => LD. */
3115#define TLS_MARK 32 /* __tls_get_addr call marked. */
b00a0a86 3116#define TLS_GDIE 64 /* GOT TPREL reloc resulting from GD->IE. */
46e9995a 3117#define TLS_EXPLICIT 256 /* TOC section TLS reloc, not stored. */
f961d9dd 3118 unsigned char tls_mask;
37da22e5
AM
3119
3120 /* The above field is also used to mark function symbols. In which
3121 case TLS_TLS will be 0. */
3122#define PLT_IFUNC 2 /* STT_GNU_IFUNC. */
2d7ad24e 3123#define PLT_KEEP 4 /* inline plt call requires plt entry. */
37da22e5 3124#define NON_GOT 256 /* local symbol plt, not stored. */
65f38f15
AM
3125};
3126
ed7007c1
AM
3127static inline struct ppc_link_hash_entry *
3128ppc_elf_hash_entry (struct elf_link_hash_entry *ent)
3129{
3130 return (struct ppc_link_hash_entry *) ent;
3131}
3132
65f38f15
AM
3133/* ppc64 ELF linker hash table. */
3134
3135struct ppc_link_hash_table
3136{
3137 struct elf_link_hash_table elf;
3138
721956f4
AM
3139 /* The stub hash table. */
3140 struct bfd_hash_table stub_hash_table;
3141
3142 /* Another hash table for plt_branch stubs. */
3143 struct bfd_hash_table branch_hash_table;
3144
3b421ab3
AM
3145 /* Hash table for function prologue tocsave. */
3146 htab_t tocsave_htab;
3147
e7d1c40c
AM
3148 /* Various options and other info passed from the linker. */
3149 struct ppc64_elf_params *params;
721956f4 3150
6f20ed8a
AM
3151 /* The size of sec_info below. */
3152 unsigned int sec_info_arr_size;
3153
3154 /* Per-section array of extra section info. Done this way rather
3155 than as part of ppc64_elf_section_data so we have the info for
3156 non-ppc64 sections. */
3157 struct
3158 {
3159 /* Along with elf_gp, specifies the TOC pointer used by this section. */
ad8e1ba5 3160 bfd_vma toc_off;
6f20ed8a
AM
3161
3162 union
3163 {
3164 /* The section group that this section belongs to. */
3165 struct map_stub *group;
3166 /* A temp section list pointer. */
3167 asection *list;
3168 } u;
3169 } *sec_info;
721956f4 3170
a4b6fadd
AM
3171 /* Linked list of groups. */
3172 struct map_stub *group;
3173
ad8e1ba5
AM
3174 /* Temp used when calculating TOC pointers. */
3175 bfd_vma toc_curr;
bf102f86
AM
3176 bfd *toc_bfd;
3177 asection *toc_first_sec;
ad8e1ba5 3178
b3fac117
AM
3179 /* Used when adding symbols. */
3180 struct ppc_link_hash_entry *dot_syms;
3181
33e44f2e 3182 /* Shortcuts to get to dynamic linker sections. */
4ce794b7 3183 asection *glink;
9e390558 3184 asection *global_entry;
82bd7b59 3185 asection *sfpr;
2d7ad24e
AM
3186 asection *pltlocal;
3187 asection *relpltlocal;
4ce794b7
AM
3188 asection *brlt;
3189 asection *relbrlt;
58d180e8 3190 asection *glink_eh_frame;
ec338859 3191
8387904d
AM
3192 /* Shortcut to .__tls_get_addr and __tls_get_addr. */
3193 struct ppc_link_hash_entry *tls_get_addr;
3194 struct ppc_link_hash_entry *tls_get_addr_fd;
9e7028aa
AM
3195 struct ppc_link_hash_entry *tga_desc;
3196 struct ppc_link_hash_entry *tga_desc_fd;
a804e476 3197 struct map_stub *tga_group;
411e1bfb 3198
927be08e
AM
3199 /* The size of reliplt used by got entry relocs. */
3200 bfd_size_type got_reli_size;
3201
9b5ecbd0 3202 /* Statistics. */
7341d5e2 3203 unsigned long stub_count[ppc_stub_global_entry];
9b5ecbd0 3204
ee75fd95
AM
3205 /* Number of stubs against global syms. */
3206 unsigned long stub_globals;
3207
ee67d69a
AM
3208 /* Set if we're linking code with function descriptors. */
3209 unsigned int opd_abi:1;
3210
4c52953f 3211 /* Support for multiple toc sections. */
33c0ec9d 3212 unsigned int do_multi_toc:1;
4c52953f 3213 unsigned int multi_toc_needed:1;
927be08e 3214 unsigned int second_toc_pass:1;
67f0cbdb 3215 unsigned int do_toc_opt:1;
4c52953f 3216
9a23f96e
AM
3217 /* Set if tls optimization is enabled. */
3218 unsigned int do_tls_opt:1;
3219
3e04d765
AM
3220 /* Set if inline plt calls should be converted to direct calls. */
3221 unsigned int can_convert_all_inline_plt:1;
3222
5d1634d7 3223 /* Set on error. */
99877b66 3224 unsigned int stub_error:1;
721956f4 3225
8c5b4e52
AM
3226 /* Whether func_desc_adjust needs to be run over symbols. */
3227 unsigned int need_func_desc_adj:1;
721956f4 3228
82e66161
AM
3229 /* Whether there exist local gnu indirect function resolvers,
3230 referenced by dynamic relocations. */
3231 unsigned int local_ifunc_resolver:1;
3232 unsigned int maybe_local_ifunc_resolver:1;
3233
f378ab09
AM
3234 /* Whether plt calls for ELFv2 localentry:0 funcs have been optimized. */
3235 unsigned int has_plt_localentry0:1;
3236
5663e321
AM
3237 /* Whether calls are made via the PLT from NOTOC functions. */
3238 unsigned int notoc_plt:1;
3239
7c1f4227
AM
3240 /* Whether to use power10 instructions in linkage stubs. */
3241 unsigned int power10_stubs:1;
04bdff6a 3242
721956f4
AM
3243 /* Incremented every time we size stubs. */
3244 unsigned int stub_iteration;
5d1634d7 3245
87d72d41
AM
3246 /* Small local sym cache. */
3247 struct sym_cache sym_cache;
65f38f15
AM
3248};
3249
4c52953f
AM
3250/* Rename some of the generic section flags to better document how they
3251 are used here. */
b0dddeec
AM
3252
3253/* Nonzero if this section has TLS related relocations. */
3254#define has_tls_reloc sec_flg0
3255
9737e8af
AM
3256/* Nonzero if this section has a call to __tls_get_addr lacking marker
3257 relocations. */
3258#define nomark_tls_get_addr sec_flg1
b0dddeec
AM
3259
3260/* Nonzero if this section has any toc or got relocs. */
3261#define has_toc_reloc sec_flg2
3262
3263/* Nonzero if this section has a call to another section that uses
3264 the toc or got. */
d77c8a4b 3265#define makes_toc_func_call sec_flg3
b0dddeec
AM
3266
3267/* Recursion protection when determining above flag. */
d77c8a4b 3268#define call_check_in_progress sec_flg4
70cc837d 3269#define call_check_done sec_flg5
4c52953f 3270
65f38f15
AM
3271/* Get the ppc64 ELF linker hash table from a link_info structure. */
3272
3273#define ppc_hash_table(p) \
4dfe6ac6
NC
3274 (elf_hash_table_id ((struct elf_link_hash_table *) ((p)->hash)) \
3275 == PPC64_ELF_DATA ? ((struct ppc_link_hash_table *) ((p)->hash)) : NULL)
65f38f15 3276
721956f4
AM
3277#define ppc_stub_hash_lookup(table, string, create, copy) \
3278 ((struct ppc_stub_hash_entry *) \
3279 bfd_hash_lookup ((table), (string), (create), (copy)))
3280
3281#define ppc_branch_hash_lookup(table, string, create, copy) \
3282 ((struct ppc_branch_hash_entry *) \
3283 bfd_hash_lookup ((table), (string), (create), (copy)))
3284
3285/* Create an entry in the stub hash table. */
3286
3287static struct bfd_hash_entry *
4ce794b7
AM
3288stub_hash_newfunc (struct bfd_hash_entry *entry,
3289 struct bfd_hash_table *table,
3290 const char *string)
721956f4
AM
3291{
3292 /* Allocate the structure if it has not already been allocated by a
3293 subclass. */
3294 if (entry == NULL)
3295 {
3296 entry = bfd_hash_allocate (table, sizeof (struct ppc_stub_hash_entry));
3297 if (entry == NULL)
3298 return entry;
3299 }
3300
3301 /* Call the allocation method of the superclass. */
3302 entry = bfd_hash_newfunc (entry, table, string);
3303 if (entry != NULL)
3304 {
3305 struct ppc_stub_hash_entry *eh;
3306
3307 /* Initialize the local fields. */
3308 eh = (struct ppc_stub_hash_entry *) entry;
ad8e1ba5 3309 eh->stub_type = ppc_stub_none;
6f20ed8a 3310 eh->group = NULL;
721956f4
AM
3311 eh->stub_offset = 0;
3312 eh->target_value = 0;
3313 eh->target_section = NULL;
721956f4 3314 eh->h = NULL;
6911b7dc 3315 eh->plt_ent = NULL;
6911b7dc 3316 eh->other = 0;
721956f4
AM
3317 }
3318
3319 return entry;
3320}
3321
3322/* Create an entry in the branch hash table. */
3323
3324static struct bfd_hash_entry *
4ce794b7
AM
3325branch_hash_newfunc (struct bfd_hash_entry *entry,
3326 struct bfd_hash_table *table,
3327 const char *string)
721956f4
AM
3328{
3329 /* Allocate the structure if it has not already been allocated by a
3330 subclass. */
3331 if (entry == NULL)
3332 {
3333 entry = bfd_hash_allocate (table, sizeof (struct ppc_branch_hash_entry));
3334 if (entry == NULL)
3335 return entry;
3336 }
3337
3338 /* Call the allocation method of the superclass. */
3339 entry = bfd_hash_newfunc (entry, table, string);
3340 if (entry != NULL)
3341 {
3342 struct ppc_branch_hash_entry *eh;
3343
3344 /* Initialize the local fields. */
3345 eh = (struct ppc_branch_hash_entry *) entry;
3346 eh->offset = 0;
3347 eh->iter = 0;
3348 }
3349
3350 return entry;
3351}
3352
65f38f15
AM
3353/* Create an entry in a ppc64 ELF linker hash table. */
3354
3355static struct bfd_hash_entry *
4ce794b7
AM
3356link_hash_newfunc (struct bfd_hash_entry *entry,
3357 struct bfd_hash_table *table,
3358 const char *string)
65f38f15
AM
3359{
3360 /* Allocate the structure if it has not already been allocated by a
3361 subclass. */
3362 if (entry == NULL)
3363 {
3364 entry = bfd_hash_allocate (table, sizeof (struct ppc_link_hash_entry));
3365 if (entry == NULL)
3366 return entry;
3367 }
3368
3369 /* Call the allocation method of the superclass. */
3370 entry = _bfd_elf_link_hash_newfunc (entry, table, string);
3371 if (entry != NULL)
3372 {
3373 struct ppc_link_hash_entry *eh = (struct ppc_link_hash_entry *) entry;
3374
b3fac117 3375 memset (&eh->u.stub_cache, 0,
908b32fc 3376 (sizeof (struct ppc_link_hash_entry)
b3fac117
AM
3377 - offsetof (struct ppc_link_hash_entry, u.stub_cache)));
3378
3379 /* When making function calls, old ABI code references function entry
3380 points (dot symbols), while new ABI code references the function
3381 descriptor symbol. We need to make any combination of reference and
3382 definition work together, without breaking archive linking.
3383
3384 For a defined function "foo" and an undefined call to "bar":
3385 An old object defines "foo" and ".foo", references ".bar" (possibly
3386 "bar" too).
3387 A new object defines "foo" and references "bar".
3388
3389 A new object thus has no problem with its undefined symbols being
3390 satisfied by definitions in an old object. On the other hand, the
3391 old object won't have ".bar" satisfied by a new object.
3392
3393 Keep a list of newly added dot-symbols. */
3394
3395 if (string[0] == '.')
3396 {
3397 struct ppc_link_hash_table *htab;
3398
3399 htab = (struct ppc_link_hash_table *) table;
3400 eh->u.next_dot_sym = htab->dot_syms;
3401 htab->dot_syms = eh;
3402 }
65f38f15
AM
3403 }
3404
3405 return entry;
3406}
3407
2cdcc330
AM
3408struct tocsave_entry
3409{
3b421ab3
AM
3410 asection *sec;
3411 bfd_vma offset;
3412};
3413
3414static hashval_t
3415tocsave_htab_hash (const void *p)
3416{
3417 const struct tocsave_entry *e = (const struct tocsave_entry *) p;
4aef7643 3418 return ((bfd_vma) (intptr_t) e->sec ^ e->offset) >> 3;
3b421ab3
AM
3419}
3420
3421static int
3422tocsave_htab_eq (const void *p1, const void *p2)
3423{
3424 const struct tocsave_entry *e1 = (const struct tocsave_entry *) p1;
3425 const struct tocsave_entry *e2 = (const struct tocsave_entry *) p2;
3426 return e1->sec == e2->sec && e1->offset == e2->offset;
3427}
3428
68faa637
AM
3429/* Destroy a ppc64 ELF linker hash table. */
3430
3431static void
d495ab0d 3432ppc64_elf_link_hash_table_free (bfd *obfd)
68faa637 3433{
d495ab0d 3434 struct ppc_link_hash_table *htab;
68faa637 3435
d495ab0d 3436 htab = (struct ppc_link_hash_table *) obfd->link.hash;
68faa637
AM
3437 if (htab->tocsave_htab)
3438 htab_delete (htab->tocsave_htab);
d495ab0d
AM
3439 bfd_hash_table_free (&htab->branch_hash_table);
3440 bfd_hash_table_free (&htab->stub_hash_table);
3441 _bfd_elf_link_hash_table_free (obfd);
68faa637
AM
3442}
3443
65f38f15
AM
3444/* Create a ppc64 ELF linker hash table. */
3445
3446static struct bfd_link_hash_table *
4ce794b7 3447ppc64_elf_link_hash_table_create (bfd *abfd)
65f38f15
AM
3448{
3449 struct ppc_link_hash_table *htab;
986f0783 3450 size_t amt = sizeof (struct ppc_link_hash_table);
65f38f15 3451
4ce794b7 3452 htab = bfd_zmalloc (amt);
65f38f15
AM
3453 if (htab == NULL)
3454 return NULL;
3455
66eb6687 3456 if (!_bfd_elf_link_hash_table_init (&htab->elf, abfd, link_hash_newfunc,
4dfe6ac6
NC
3457 sizeof (struct ppc_link_hash_entry),
3458 PPC64_ELF_DATA))
65f38f15 3459 {
e2d34d7d 3460 free (htab);
65f38f15
AM
3461 return NULL;
3462 }
3463
721956f4 3464 /* Init the stub hash table too. */
66eb6687
AM
3465 if (!bfd_hash_table_init (&htab->stub_hash_table, stub_hash_newfunc,
3466 sizeof (struct ppc_stub_hash_entry)))
2915c55b 3467 {
d495ab0d 3468 _bfd_elf_link_hash_table_free (abfd);
2915c55b
JK
3469 return NULL;
3470 }
721956f4
AM
3471
3472 /* And the branch hash table. */
66eb6687
AM
3473 if (!bfd_hash_table_init (&htab->branch_hash_table, branch_hash_newfunc,
3474 sizeof (struct ppc_branch_hash_entry)))
2915c55b
JK
3475 {
3476 bfd_hash_table_free (&htab->stub_hash_table);
d495ab0d 3477 _bfd_elf_link_hash_table_free (abfd);
2915c55b
JK
3478 return NULL;
3479 }
721956f4 3480
3b421ab3
AM
3481 htab->tocsave_htab = htab_try_create (1024,
3482 tocsave_htab_hash,
3483 tocsave_htab_eq,
3484 NULL);
3485 if (htab->tocsave_htab == NULL)
2915c55b 3486 {
d495ab0d 3487 ppc64_elf_link_hash_table_free (abfd);
2915c55b
JK
3488 return NULL;
3489 }
d495ab0d 3490 htab->elf.root.hash_table_free = ppc64_elf_link_hash_table_free;
3b421ab3 3491
3254fd24
AM
3492 /* Initializing two fields of the union is just cosmetic. We really
3493 only care about glist, but when compiled on a 32-bit host the
3494 bfd_vma fields are larger. Setting the bfd_vma to zero makes
3495 debugger inspection of these fields look nicer. */
a6aa5195
AM
3496 htab->elf.init_got_refcount.refcount = 0;
3497 htab->elf.init_got_refcount.glist = NULL;
3498 htab->elf.init_plt_refcount.refcount = 0;
3499 htab->elf.init_plt_refcount.glist = NULL;
3500 htab->elf.init_got_offset.offset = 0;
3501 htab->elf.init_got_offset.glist = NULL;
3502 htab->elf.init_plt_offset.offset = 0;
3503 htab->elf.init_plt_offset.glist = NULL;
3254fd24 3504
65f38f15
AM
3505 return &htab->elf.root;
3506}
3507
bfeb4a28
AM
3508/* Create sections for linker generated code. */
3509
3510static bfd_boolean
3511create_linkage_sections (bfd *dynobj, struct bfd_link_info *info)
3512{
3513 struct ppc_link_hash_table *htab;
3514 flagword flags;
3515
3516 htab = ppc_hash_table (info);
3517
bfeb4a28
AM
3518 flags = (SEC_ALLOC | SEC_LOAD | SEC_CODE | SEC_READONLY
3519 | SEC_HAS_CONTENTS | SEC_IN_MEMORY | SEC_LINKER_CREATED);
b32547cd
AM
3520 if (htab->params->save_restore_funcs)
3521 {
3522 /* Create .sfpr for code to save and restore fp regs. */
3523 htab->sfpr = bfd_make_section_anyway_with_flags (dynobj, ".sfpr",
3524 flags);
3525 if (htab->sfpr == NULL
fd361982 3526 || !bfd_set_section_alignment (htab->sfpr, 2))
b32547cd
AM
3527 return FALSE;
3528 }
3529
3530 if (bfd_link_relocatable (info))
3531 return TRUE;
bfeb4a28
AM
3532
3533 /* Create .glink for lazy dynamic linking support. */
3534 htab->glink = bfd_make_section_anyway_with_flags (dynobj, ".glink",
3535 flags);
3536 if (htab->glink == NULL
fd361982 3537 || !bfd_set_section_alignment (htab->glink, 3))
bfeb4a28
AM
3538 return FALSE;
3539
9e390558
AM
3540 /* The part of .glink used by global entry stubs, separate so that
3541 it can be aligned appropriately without affecting htab->glink. */
3542 htab->global_entry = bfd_make_section_anyway_with_flags (dynobj, ".glink",
3543 flags);
3544 if (htab->global_entry == NULL
fd361982 3545 || !bfd_set_section_alignment (htab->global_entry, 2))
9e390558
AM
3546 return FALSE;
3547
bfeb4a28
AM
3548 if (!info->no_ld_generated_unwind_info)
3549 {
3550 flags = (SEC_ALLOC | SEC_LOAD | SEC_READONLY | SEC_HAS_CONTENTS
3551 | SEC_IN_MEMORY | SEC_LINKER_CREATED);
3552 htab->glink_eh_frame = bfd_make_section_anyway_with_flags (dynobj,
3553 ".eh_frame",
3554 flags);
3555 if (htab->glink_eh_frame == NULL
fd361982 3556 || !bfd_set_section_alignment (htab->glink_eh_frame, 2))
bfeb4a28
AM
3557 return FALSE;
3558 }
3559
3560 flags = SEC_ALLOC | SEC_LINKER_CREATED;
33e44f2e
AM
3561 htab->elf.iplt = bfd_make_section_anyway_with_flags (dynobj, ".iplt", flags);
3562 if (htab->elf.iplt == NULL
fd361982 3563 || !bfd_set_section_alignment (htab->elf.iplt, 3))
bfeb4a28
AM
3564 return FALSE;
3565
3566 flags = (SEC_ALLOC | SEC_LOAD | SEC_READONLY
3567 | SEC_HAS_CONTENTS | SEC_IN_MEMORY | SEC_LINKER_CREATED);
33e44f2e
AM
3568 htab->elf.irelplt
3569 = bfd_make_section_anyway_with_flags (dynobj, ".rela.iplt", flags);
3570 if (htab->elf.irelplt == NULL
fd361982 3571 || !bfd_set_section_alignment (htab->elf.irelplt, 3))
bfeb4a28
AM
3572 return FALSE;
3573
3574 /* Create branch lookup table for plt_branch stubs. */
3575 flags = (SEC_ALLOC | SEC_LOAD
3576 | SEC_HAS_CONTENTS | SEC_IN_MEMORY | SEC_LINKER_CREATED);
3577 htab->brlt = bfd_make_section_anyway_with_flags (dynobj, ".branch_lt",
3578 flags);
3579 if (htab->brlt == NULL
fd361982 3580 || !bfd_set_section_alignment (htab->brlt, 3))
bfeb4a28
AM
3581 return FALSE;
3582
2d7ad24e
AM
3583 /* Local plt entries, put in .branch_lt but a separate section for
3584 convenience. */
3585 htab->pltlocal = bfd_make_section_anyway_with_flags (dynobj, ".branch_lt",
3586 flags);
3587 if (htab->pltlocal == NULL
fd361982 3588 || !bfd_set_section_alignment (htab->pltlocal, 3))
2d7ad24e
AM
3589 return FALSE;
3590
0e1862bb 3591 if (!bfd_link_pic (info))
bfeb4a28
AM
3592 return TRUE;
3593
3594 flags = (SEC_ALLOC | SEC_LOAD | SEC_READONLY
3595 | SEC_HAS_CONTENTS | SEC_IN_MEMORY | SEC_LINKER_CREATED);
2d7ad24e
AM
3596 htab->relbrlt
3597 = bfd_make_section_anyway_with_flags (dynobj, ".rela.branch_lt", flags);
bfeb4a28 3598 if (htab->relbrlt == NULL
fd361982 3599 || !bfd_set_section_alignment (htab->relbrlt, 3))
bfeb4a28
AM
3600 return FALSE;
3601
2d7ad24e
AM
3602 htab->relpltlocal
3603 = bfd_make_section_anyway_with_flags (dynobj, ".rela.branch_lt", flags);
3604 if (htab->relpltlocal == NULL
fd361982 3605 || !bfd_set_section_alignment (htab->relpltlocal, 3))
2d7ad24e
AM
3606 return FALSE;
3607
bfeb4a28
AM
3608 return TRUE;
3609}
3610
e717da7e
AM
3611/* Satisfy the ELF linker by filling in some fields in our fake bfd. */
3612
bfeb4a28 3613bfd_boolean
e7d1c40c
AM
3614ppc64_elf_init_stub_bfd (struct bfd_link_info *info,
3615 struct ppc64_elf_params *params)
e717da7e
AM
3616{
3617 struct ppc_link_hash_table *htab;
3618
e7d1c40c 3619 elf_elfheader (params->stub_bfd)->e_ident[EI_CLASS] = ELFCLASS64;
e717da7e
AM
3620
3621/* Always hook our dynamic sections into the first bfd, which is the
3622 linker created stub bfd. This ensures that the GOT header is at
3623 the start of the output TOC section. */
3624 htab = ppc_hash_table (info);
e7d1c40c
AM
3625 htab->elf.dynobj = params->stub_bfd;
3626 htab->params = params;
bfeb4a28 3627
bfeb4a28 3628 return create_linkage_sections (htab->elf.dynobj, info);
e717da7e
AM
3629}
3630
721956f4
AM
3631/* Build a name for an entry in the stub hash table. */
3632
3633static char *
4ce794b7
AM
3634ppc_stub_name (const asection *input_section,
3635 const asection *sym_sec,
3636 const struct ppc_link_hash_entry *h,
3637 const Elf_Internal_Rela *rel)
721956f4
AM
3638{
3639 char *stub_name;
bcaa2f82 3640 ssize_t len;
721956f4
AM
3641
3642 /* rel->r_addend is actually 64 bit, but who uses more than +/- 2^31
3643 offsets from a sym as a branch target? In fact, we could
3644 probably assume the addend is always zero. */
3645 BFD_ASSERT (((int) rel->r_addend & 0xffffffff) == rel->r_addend);
3646
3647 if (h)
3648 {
3649 len = 8 + 1 + strlen (h->elf.root.root.string) + 1 + 8 + 1;
3650 stub_name = bfd_malloc (len);
46de2a7c
AM
3651 if (stub_name == NULL)
3652 return stub_name;
3653
bcaa2f82
AM
3654 len = sprintf (stub_name, "%08x.%s+%x",
3655 input_section->id & 0xffffffff,
3656 h->elf.root.root.string,
3657 (int) rel->r_addend & 0xffffffff);
721956f4
AM
3658 }
3659 else
3660 {
ad8e1ba5 3661 len = 8 + 1 + 8 + 1 + 8 + 1 + 8 + 1;
721956f4 3662 stub_name = bfd_malloc (len);
46de2a7c
AM
3663 if (stub_name == NULL)
3664 return stub_name;
3665
bcaa2f82
AM
3666 len = sprintf (stub_name, "%08x.%x:%x+%x",
3667 input_section->id & 0xffffffff,
3668 sym_sec->id & 0xffffffff,
3669 (int) ELF64_R_SYM (rel->r_info) & 0xffffffff,
3670 (int) rel->r_addend & 0xffffffff);
721956f4 3671 }
bcaa2f82 3672 if (len > 2 && stub_name[len - 2] == '+' && stub_name[len - 1] == '0')
ee75fd95 3673 stub_name[len - 2] = 0;
721956f4
AM
3674 return stub_name;
3675}
3676
3677/* Look up an entry in the stub hash. Stub entries are cached because
3678 creating the stub name takes a bit of time. */
3679
3680static struct ppc_stub_hash_entry *
4ce794b7
AM
3681ppc_get_stub_entry (const asection *input_section,
3682 const asection *sym_sec,
039b3fef 3683 struct ppc_link_hash_entry *h,
4ce794b7
AM
3684 const Elf_Internal_Rela *rel,
3685 struct ppc_link_hash_table *htab)
721956f4
AM
3686{
3687 struct ppc_stub_hash_entry *stub_entry;
6f20ed8a 3688 struct map_stub *group;
721956f4
AM
3689
3690 /* If this input section is part of a group of sections sharing one
3691 stub section, then use the id of the first section in the group.
3692 Stub names need to include a section id, as there may well be
3693 more than one stub used to reach say, printf, and we need to
3694 distinguish between them. */
6f20ed8a 3695 group = htab->sec_info[input_section->id].u.group;
89d77b8a
AM
3696 if (group == NULL)
3697 return NULL;
721956f4 3698
b3fac117
AM
3699 if (h != NULL && h->u.stub_cache != NULL
3700 && h->u.stub_cache->h == h
6f20ed8a 3701 && h->u.stub_cache->group == group)
721956f4 3702 {
b3fac117 3703 stub_entry = h->u.stub_cache;
721956f4
AM
3704 }
3705 else
3706 {
3707 char *stub_name;
3708
6f20ed8a 3709 stub_name = ppc_stub_name (group->link_sec, sym_sec, h, rel);
721956f4
AM
3710 if (stub_name == NULL)
3711 return NULL;
3712
3713 stub_entry = ppc_stub_hash_lookup (&htab->stub_hash_table,
b34976b6 3714 stub_name, FALSE, FALSE);
721956f4 3715 if (h != NULL)
b3fac117 3716 h->u.stub_cache = stub_entry;
721956f4
AM
3717
3718 free (stub_name);
3719 }
3720
3721 return stub_entry;
3722}
3723
3724/* Add a new stub entry to the stub hash. Not all fields of the new
3725 stub entry are initialised. */
3726
3727static struct ppc_stub_hash_entry *
4ce794b7
AM
3728ppc_add_stub (const char *stub_name,
3729 asection *section,
25f53a85 3730 struct bfd_link_info *info)
721956f4 3731{
25f53a85 3732 struct ppc_link_hash_table *htab = ppc_hash_table (info);
6f20ed8a 3733 struct map_stub *group;
721956f4
AM
3734 asection *link_sec;
3735 asection *stub_sec;
3736 struct ppc_stub_hash_entry *stub_entry;
3737
6f20ed8a
AM
3738 group = htab->sec_info[section->id].u.group;
3739 link_sec = group->link_sec;
3740 stub_sec = group->stub_sec;
721956f4
AM
3741 if (stub_sec == NULL)
3742 {
6f20ed8a
AM
3743 size_t namelen;
3744 bfd_size_type len;
3745 char *s_name;
721956f4 3746
6f20ed8a
AM
3747 namelen = strlen (link_sec->name);
3748 len = namelen + sizeof (STUB_SUFFIX);
3749 s_name = bfd_alloc (htab->params->stub_bfd, len);
3750 if (s_name == NULL)
3751 return NULL;
721956f4 3752
6f20ed8a
AM
3753 memcpy (s_name, link_sec->name, namelen);
3754 memcpy (s_name + namelen, STUB_SUFFIX, sizeof (STUB_SUFFIX));
3755 stub_sec = (*htab->params->add_stub_section) (s_name, link_sec);
3756 if (stub_sec == NULL)
3757 return NULL;
3758 group->stub_sec = stub_sec;
721956f4
AM
3759 }
3760
3761 /* Enter this entry into the linker stub hash table. */
3762 stub_entry = ppc_stub_hash_lookup (&htab->stub_hash_table, stub_name,
b34976b6 3763 TRUE, FALSE);
721956f4
AM
3764 if (stub_entry == NULL)
3765 {
695344c0 3766 /* xgettext:c-format */
cf97bcb0
AM
3767 _bfd_error_handler (_("%pB: cannot create stub entry %s"),
3768 section->owner, stub_name);
721956f4
AM
3769 return NULL;
3770 }
3771
6f20ed8a 3772 stub_entry->group = group;
721956f4 3773 stub_entry->stub_offset = 0;
721956f4
AM
3774 return stub_entry;
3775}
3776
e717da7e
AM
3777/* Create .got and .rela.got sections in ABFD, and .got in dynobj if
3778 not already done. */
65f38f15 3779
b34976b6 3780static bfd_boolean
e717da7e 3781create_got_section (bfd *abfd, struct bfd_link_info *info)
65f38f15 3782{
e717da7e
AM
3783 asection *got, *relgot;
3784 flagword flags;
3785 struct ppc_link_hash_table *htab = ppc_hash_table (info);
65f38f15 3786
0c8d6e5c 3787 if (!is_ppc64_elf (abfd))
0ffa91dd 3788 return FALSE;
4dfe6ac6
NC
3789 if (htab == NULL)
3790 return FALSE;
0ffa91dd 3791
33e44f2e
AM
3792 if (!htab->elf.sgot
3793 && !_bfd_elf_create_got_section (htab->elf.dynobj, info))
3794 return FALSE;
e717da7e
AM
3795
3796 flags = (SEC_ALLOC | SEC_LOAD | SEC_HAS_CONTENTS | SEC_IN_MEMORY
3797 | SEC_LINKER_CREATED);
3798
c456f082 3799 got = bfd_make_section_anyway_with_flags (abfd, ".got", flags);
e717da7e 3800 if (!got
fd361982 3801 || !bfd_set_section_alignment (got, 3))
e717da7e 3802 return FALSE;
65f38f15 3803
c456f082
AM
3804 relgot = bfd_make_section_anyway_with_flags (abfd, ".rela.got",
3805 flags | SEC_READONLY);
e717da7e 3806 if (!relgot
fd361982 3807 || !bfd_set_section_alignment (relgot, 3))
b34976b6 3808 return FALSE;
e717da7e
AM
3809
3810 ppc64_elf_tdata (abfd)->got = got;
3811 ppc64_elf_tdata (abfd)->relgot = relgot;
b34976b6 3812 return TRUE;
65f38f15 3813}
5bd4f169 3814
b31867b6
AM
3815/* Follow indirect and warning symbol links. */
3816
3817static inline struct bfd_link_hash_entry *
3818follow_link (struct bfd_link_hash_entry *h)
3819{
3820 while (h->type == bfd_link_hash_indirect
3821 || h->type == bfd_link_hash_warning)
3822 h = h->u.i.link;
3823 return h;
3824}
3825
3826static inline struct elf_link_hash_entry *
3827elf_follow_link (struct elf_link_hash_entry *h)
3828{
3829 return (struct elf_link_hash_entry *) follow_link (&h->root);
3830}
3831
3832static inline struct ppc_link_hash_entry *
3833ppc_follow_link (struct ppc_link_hash_entry *h)
3834{
ed7007c1 3835 return ppc_elf_hash_entry (elf_follow_link (&h->elf));
b31867b6
AM
3836}
3837
40d16e0b
AM
3838/* Merge PLT info on FROM with that on TO. */
3839
3840static void
3841move_plt_plist (struct ppc_link_hash_entry *from,
3842 struct ppc_link_hash_entry *to)
3843{
3844 if (from->elf.plt.plist != NULL)
3845 {
3846 if (to->elf.plt.plist != NULL)
3847 {
3848 struct plt_entry **entp;
3849 struct plt_entry *ent;
3850
3851 for (entp = &from->elf.plt.plist; (ent = *entp) != NULL; )
3852 {
3853 struct plt_entry *dent;
3854
3855 for (dent = to->elf.plt.plist; dent != NULL; dent = dent->next)
3856 if (dent->addend == ent->addend)
3857 {
3858 dent->plt.refcount += ent->plt.refcount;
3859 *entp = ent->next;
3860 break;
3861 }
3862 if (dent == NULL)
3863 entp = &ent->next;
3864 }
3865 *entp = to->elf.plt.plist;
3866 }
3867
3868 to->elf.plt.plist = from->elf.plt.plist;
3869 from->elf.plt.plist = NULL;
3870 }
3871}
3872
65f38f15
AM
3873/* Copy the extra info we tack onto an elf_link_hash_entry. */
3874
3875static void
fcfa13d2
AM
3876ppc64_elf_copy_indirect_symbol (struct bfd_link_info *info,
3877 struct elf_link_hash_entry *dir,
3878 struct elf_link_hash_entry *ind)
65f38f15
AM
3879{
3880 struct ppc_link_hash_entry *edir, *eind;
3881
ed7007c1
AM
3882 edir = ppc_elf_hash_entry (dir);
3883 eind = ppc_elf_hash_entry (ind);
65f38f15 3884
c79d6685
AM
3885 edir->is_func |= eind->is_func;
3886 edir->is_func_descriptor |= eind->is_func_descriptor;
3887 edir->tls_mask |= eind->tls_mask;
3888 if (eind->oh != NULL)
3889 edir->oh = ppc_follow_link (eind->oh);
3890
474436e6 3891 if (edir->elf.versioned != versioned_hidden)
e81830c5
AM
3892 edir->elf.ref_dynamic |= eind->elf.ref_dynamic;
3893 edir->elf.ref_regular |= eind->elf.ref_regular;
3894 edir->elf.ref_regular_nonweak |= eind->elf.ref_regular_nonweak;
4a7e5234 3895 edir->elf.non_got_ref |= eind->elf.non_got_ref;
e81830c5
AM
3896 edir->elf.needs_plt |= eind->elf.needs_plt;
3897 edir->elf.pointer_equality_needed |= eind->elf.pointer_equality_needed;
c79d6685 3898
d311bc8b
AM
3899 /* If we were called to copy over info for a weak sym, don't copy
3900 dyn_relocs, plt/got info, or dynindx. We used to copy dyn_relocs
3901 in order to simplify readonly_dynrelocs and save a field in the
3902 symbol hash entry, but that means dyn_relocs can't be used in any
3903 tests about a specific symbol, or affect other symbol flags which
ab2477e1 3904 are then tested. */
d311bc8b 3905 if (eind->elf.root.type != bfd_link_hash_indirect)
ab2477e1 3906 return;
d311bc8b 3907
411e1bfb 3908 /* Copy over any dynamic relocs we may have on the indirect sym. */
bbd7ec4a 3909 if (eind->dyn_relocs != NULL)
65f38f15 3910 {
bbd7ec4a
AM
3911 if (edir->dyn_relocs != NULL)
3912 {
6061a67d
AM
3913 struct elf_dyn_relocs **pp;
3914 struct elf_dyn_relocs *p;
bbd7ec4a 3915
fcfa13d2 3916 /* Add reloc counts against the indirect sym to the direct sym
bbd7ec4a
AM
3917 list. Merge any entries against the same section. */
3918 for (pp = &eind->dyn_relocs; (p = *pp) != NULL; )
3919 {
6061a67d 3920 struct elf_dyn_relocs *q;
bbd7ec4a
AM
3921
3922 for (q = edir->dyn_relocs; q != NULL; q = q->next)
3923 if (q->sec == p->sec)
3924 {
3925 q->pc_count += p->pc_count;
3926 q->count += p->count;
3927 *pp = p->next;
3928 break;
3929 }
3930 if (q == NULL)
3931 pp = &p->next;
3932 }
3933 *pp = edir->dyn_relocs;
3934 }
3935
65f38f15
AM
3936 edir->dyn_relocs = eind->dyn_relocs;
3937 eind->dyn_relocs = NULL;
3938 }
65f38f15 3939
81848ca0
AM
3940 /* Copy over got entries that we may have already seen to the
3941 symbol which just became indirect. */
411e1bfb
AM
3942 if (eind->elf.got.glist != NULL)
3943 {
3944 if (edir->elf.got.glist != NULL)
3945 {
3946 struct got_entry **entp;
3947 struct got_entry *ent;
3948
3949 for (entp = &eind->elf.got.glist; (ent = *entp) != NULL; )
3950 {
3951 struct got_entry *dent;
3952
3953 for (dent = edir->elf.got.glist; dent != NULL; dent = dent->next)
3954 if (dent->addend == ent->addend
e717da7e 3955 && dent->owner == ent->owner
411e1bfb
AM
3956 && dent->tls_type == ent->tls_type)
3957 {
3958 dent->got.refcount += ent->got.refcount;
3959 *entp = ent->next;
3960 break;
3961 }
3962 if (dent == NULL)
3963 entp = &ent->next;
3964 }
3965 *entp = edir->elf.got.glist;
3966 }
3967
3968 edir->elf.got.glist = eind->elf.got.glist;
3969 eind->elf.got.glist = NULL;
3970 }
3971
3972 /* And plt entries. */
40d16e0b 3973 move_plt_plist (eind, edir);
411e1bfb 3974
fcfa13d2 3975 if (eind->elf.dynindx != -1)
411e1bfb 3976 {
fcfa13d2
AM
3977 if (edir->elf.dynindx != -1)
3978 _bfd_elf_strtab_delref (elf_hash_table (info)->dynstr,
3979 edir->elf.dynstr_index);
411e1bfb
AM
3980 edir->elf.dynindx = eind->elf.dynindx;
3981 edir->elf.dynstr_index = eind->elf.dynstr_index;
3982 eind->elf.dynindx = -1;
3983 eind->elf.dynstr_index = 0;
3984 }
411e1bfb
AM
3985}
3986
8387904d
AM
3987/* Find the function descriptor hash entry from the given function code
3988 hash entry FH. Link the entries via their OH fields. */
3989
3990static struct ppc_link_hash_entry *
b31867b6 3991lookup_fdh (struct ppc_link_hash_entry *fh, struct ppc_link_hash_table *htab)
8387904d
AM
3992{
3993 struct ppc_link_hash_entry *fdh = fh->oh;
3994
3995 if (fdh == NULL)
3996 {
3997 const char *fd_name = fh->elf.root.root.string + 1;
3998
ed7007c1
AM
3999 fdh = ppc_elf_hash_entry (elf_link_hash_lookup (&htab->elf, fd_name,
4000 FALSE, FALSE, FALSE));
b31867b6
AM
4001 if (fdh == NULL)
4002 return fdh;
4003
4004 fdh->is_func_descriptor = 1;
4005 fdh->oh = fh;
4006 fh->is_func = 1;
4007 fh->oh = fdh;
8387904d
AM
4008 }
4009
8c5b4e52
AM
4010 fdh = ppc_follow_link (fdh);
4011 fdh->is_func_descriptor = 1;
4012 fdh->oh = fh;
4013 return fdh;
8387904d
AM
4014}
4015
8c5b4e52 4016/* Make a fake function descriptor sym for the undefined code sym FH. */
bb700d78
AM
4017
4018static struct ppc_link_hash_entry *
4019make_fdh (struct bfd_link_info *info,
908b32fc 4020 struct ppc_link_hash_entry *fh)
bb700d78 4021{
8c5b4e52
AM
4022 bfd *abfd = fh->elf.root.u.undef.abfd;
4023 struct bfd_link_hash_entry *bh = NULL;
bb700d78 4024 struct ppc_link_hash_entry *fdh;
8c5b4e52
AM
4025 flagword flags = (fh->elf.root.type == bfd_link_hash_undefweak
4026 ? BSF_WEAK
4027 : BSF_GLOBAL);
4028
4029 if (!_bfd_generic_link_add_one_symbol (info, abfd,
4030 fh->elf.root.root.string + 1,
4031 flags, bfd_und_section_ptr, 0,
4032 NULL, FALSE, FALSE, &bh))
bb700d78
AM
4033 return NULL;
4034
4035 fdh = (struct ppc_link_hash_entry *) bh;
4036 fdh->elf.non_elf = 0;
908b32fc
AM
4037 fdh->fake = 1;
4038 fdh->is_func_descriptor = 1;
4039 fdh->oh = fh;
4040 fh->is_func = 1;
4041 fh->oh = fdh;
bb700d78
AM
4042 return fdh;
4043}
4044
8387904d
AM
4045/* Fix function descriptor symbols defined in .opd sections to be
4046 function type. */
555cd476
AM
4047
4048static bfd_boolean
c16153ae 4049ppc64_elf_add_symbol_hook (bfd *ibfd,
e054468f 4050 struct bfd_link_info *info,
555cd476 4051 Elf_Internal_Sym *isym,
6911b7dc 4052 const char **name,
555cd476
AM
4053 flagword *flags ATTRIBUTE_UNUSED,
4054 asection **sec,
b53dfeb2 4055 bfd_vma *value)
555cd476 4056{
b53dfeb2 4057 if (*sec != NULL
f1885d1e 4058 && strcmp ((*sec)->name, ".opd") == 0)
b53dfeb2
AM
4059 {
4060 asection *code_sec;
4061
4062 if (!(ELF_ST_TYPE (isym->st_info) == STT_GNU_IFUNC
4063 || ELF_ST_TYPE (isym->st_info) == STT_FUNC))
4064 isym->st_info = ELF_ST_INFO (ELF_ST_BIND (isym->st_info), STT_FUNC);
4065
4066 /* If the symbol is a function defined in .opd, and the function
4067 code is in a discarded group, let it appear to be undefined. */
0e1862bb 4068 if (!bfd_link_relocatable (info)
b53dfeb2
AM
4069 && (*sec)->reloc_count != 0
4070 && opd_entry_value (*sec, *value, &code_sec, NULL,
4071 FALSE) != (bfd_vma) -1
4072 && discarded_section (code_sec))
4073 {
4074 *sec = bfd_und_section_ptr;
4075 isym->st_shndx = SHN_UNDEF;
4076 }
4077 }
dbd1e97e
AM
4078 else if (*sec != NULL
4079 && strcmp ((*sec)->name, ".toc") == 0
4080 && ELF_ST_TYPE (isym->st_info) == STT_OBJECT)
4081 {
4082 struct ppc_link_hash_table *htab = ppc_hash_table (info);
4083 if (htab != NULL)
4084 htab->params->object_in_toc = 1;
4085 }
433817dd 4086
6911b7dc
AM
4087 if ((STO_PPC64_LOCAL_MASK & isym->st_other) != 0)
4088 {
4089 if (abiversion (ibfd) == 0)
4090 set_abiversion (ibfd, 2);
4091 else if (abiversion (ibfd) == 1)
4092 {
cf97bcb0
AM
4093 _bfd_error_handler (_("symbol '%s' has invalid st_other"
4094 " for ABI version 1"), *name);
6911b7dc
AM
4095 bfd_set_error (bfd_error_bad_value);
4096 return FALSE;
4097 }
4098 }
4099
555cd476
AM
4100 return TRUE;
4101}
4102
6911b7dc
AM
4103/* Merge non-visibility st_other attributes: local entry point. */
4104
4105static void
4106ppc64_elf_merge_symbol_attribute (struct elf_link_hash_entry *h,
4107 const Elf_Internal_Sym *isym,
4108 bfd_boolean definition,
4109 bfd_boolean dynamic)
4110{
f378ab09 4111 if (definition && (!dynamic || !h->def_regular))
6911b7dc
AM
4112 h->other = ((isym->st_other & ~ELF_ST_VISIBILITY (-1))
4113 | ELF_ST_VISIBILITY (h->other));
4114}
4115
8c5b4e52
AM
4116/* Hook called on merging a symbol. We use this to clear "fake" since
4117 we now have a real symbol. */
4118
4119static bfd_boolean
4120ppc64_elf_merge_symbol (struct elf_link_hash_entry *h,
8b5f1ed8 4121 const Elf_Internal_Sym *isym,
8c5b4e52
AM
4122 asection **psec ATTRIBUTE_UNUSED,
4123 bfd_boolean newdef ATTRIBUTE_UNUSED,
4124 bfd_boolean olddef ATTRIBUTE_UNUSED,
4125 bfd *oldbfd ATTRIBUTE_UNUSED,
4126 const asection *oldsec ATTRIBUTE_UNUSED)
4127{
ed7007c1 4128 ppc_elf_hash_entry (h)->fake = 0;
8b5f1ed8 4129 if ((STO_PPC64_LOCAL_MASK & isym->st_other) != 0)
ed7007c1 4130 ppc_elf_hash_entry (h)->non_zero_localentry = 1;
8c5b4e52
AM
4131 return TRUE;
4132}
4133
8387904d 4134/* This function makes an old ABI object reference to ".bar" cause the
908b32fc
AM
4135 inclusion of a new ABI object archive that defines "bar".
4136 NAME is a symbol defined in an archive. Return a symbol in the hash
4137 table that might be satisfied by the archive symbols. */
8387904d
AM
4138
4139static struct elf_link_hash_entry *
4140ppc64_elf_archive_symbol_lookup (bfd *abfd,
4141 struct bfd_link_info *info,
4142 const char *name)
4143{
4144 struct elf_link_hash_entry *h;
4145 char *dot_name;
4146 size_t len;
4147
4148 h = _bfd_elf_archive_symbol_lookup (abfd, info, name);
908b32fc
AM
4149 if (h != NULL
4150 /* Don't return this sym if it is a fake function descriptor
4151 created by add_symbol_adjust. */
ed7007c1 4152 && !ppc_elf_hash_entry (h)->fake)
8387904d
AM
4153 return h;
4154
4155 if (name[0] == '.')
4156 return h;
4157
4158 len = strlen (name);
4159 dot_name = bfd_alloc (abfd, len + 2);
4160 if (dot_name == NULL)
e99955cd 4161 return (struct elf_link_hash_entry *) -1;
8387904d
AM
4162 dot_name[0] = '.';
4163 memcpy (dot_name + 1, name, len + 1);
4164 h = _bfd_elf_archive_symbol_lookup (abfd, info, dot_name);
4165 bfd_release (abfd, dot_name);
a804e476
AM
4166 if (h != NULL)
4167 return h;
4168
4169 if (strcmp (name, "__tls_get_addr_opt") == 0)
4170 h = _bfd_elf_archive_symbol_lookup (abfd, info, "__tls_get_addr_desc");
8387904d
AM
4171 return h;
4172}
4173
4174/* This function satisfies all old ABI object references to ".bar" if a
99877b66
AM
4175 new ABI object defines "bar". Well, at least, undefined dot symbols
4176 are made weak. This stops later archive searches from including an
4177 object if we already have a function descriptor definition. It also
35b0ce59
AM
4178 prevents the linker complaining about undefined symbols.
4179 We also check and correct mismatched symbol visibility here. The
4180 most restrictive visibility of the function descriptor and the
4181 function entry symbol is used. */
8387904d
AM
4182
4183static bfd_boolean
b3fac117 4184add_symbol_adjust (struct ppc_link_hash_entry *eh, struct bfd_link_info *info)
8387904d 4185{
8387904d
AM
4186 struct ppc_link_hash_table *htab;
4187 struct ppc_link_hash_entry *fdh;
4188
b3fac117
AM
4189 if (eh->elf.root.type == bfd_link_hash_warning)
4190 eh = (struct ppc_link_hash_entry *) eh->elf.root.u.i.link;
8387904d 4191
8400d40d
AM
4192 if (eh->elf.root.type == bfd_link_hash_indirect)
4193 return TRUE;
4194
b3fac117
AM
4195 if (eh->elf.root.root.string[0] != '.')
4196 abort ();
8387904d 4197
b3fac117 4198 htab = ppc_hash_table (info);
4dfe6ac6
NC
4199 if (htab == NULL)
4200 return FALSE;
4201
b31867b6 4202 fdh = lookup_fdh (eh, htab);
8c5b4e52
AM
4203 if (fdh == NULL
4204 && !bfd_link_relocatable (info)
4205 && (eh->elf.root.type == bfd_link_hash_undefined
4206 || eh->elf.root.type == bfd_link_hash_undefweak)
4207 && eh->elf.ref_regular)
4208 {
4209 /* Make an undefined function descriptor sym, in order to
4210 pull in an --as-needed shared lib. Archives are handled
4211 elsewhere. */
4212 fdh = make_fdh (info, eh);
4213 if (fdh == NULL)
4214 return FALSE;
bb700d78 4215 }
8c5b4e52
AM
4216
4217 if (fdh != NULL)
8387904d 4218 {
35b0ce59
AM
4219 unsigned entry_vis = ELF_ST_VISIBILITY (eh->elf.other) - 1;
4220 unsigned descr_vis = ELF_ST_VISIBILITY (fdh->elf.other) - 1;
8c5b4e52
AM
4221
4222 /* Make both descriptor and entry symbol have the most
4223 constraining visibility of either symbol. */
35b0ce59
AM
4224 if (entry_vis < descr_vis)
4225 fdh->elf.other += entry_vis - descr_vis;
4226 else if (entry_vis > descr_vis)
4227 eh->elf.other += descr_vis - entry_vis;
4228
8c5b4e52
AM
4229 /* Propagate reference flags from entry symbol to function
4230 descriptor symbol. */
bc4e12de 4231 fdh->elf.root.non_ir_ref_regular |= eh->elf.root.non_ir_ref_regular;
4070765b 4232 fdh->elf.root.non_ir_ref_dynamic |= eh->elf.root.non_ir_ref_dynamic;
8c5b4e52
AM
4233 fdh->elf.ref_regular |= eh->elf.ref_regular;
4234 fdh->elf.ref_regular_nonweak |= eh->elf.ref_regular_nonweak;
4235
4236 if (!fdh->elf.forced_local
4237 && fdh->elf.dynindx == -1
4238 && fdh->elf.versioned != versioned_hidden
4239 && (bfd_link_dll (info)
4240 || fdh->elf.def_dynamic
4241 || fdh->elf.ref_dynamic)
4242 && (eh->elf.ref_regular
4243 || eh->elf.def_regular))
4244 {
2cdcc330 4245 if (!bfd_elf_link_record_dynamic_symbol (info, &fdh->elf))
8c5b4e52 4246 return FALSE;
35b0ce59 4247 }
8387904d 4248 }
99877b66 4249
8387904d
AM
4250 return TRUE;
4251}
4252
f6c7c3e8
AM
4253/* Set up opd section info and abiversion for IBFD, and process list
4254 of dot-symbols we made in link_hash_newfunc. */
b3fac117 4255
8387904d 4256static bfd_boolean
f6c7c3e8 4257ppc64_elf_before_check_relocs (bfd *ibfd, struct bfd_link_info *info)
8387904d 4258{
99877b66 4259 struct ppc_link_hash_table *htab;
b3fac117 4260 struct ppc_link_hash_entry **p, *eh;
459609d6 4261 asection *opd = bfd_get_section_by_name (ibfd, ".opd");
433817dd 4262
459609d6 4263 if (opd != NULL && opd->size != 0)
b3fac117 4264 {
b9399fcf
AM
4265 BFD_ASSERT (ppc64_elf_section_data (opd)->sec_type == sec_normal);
4266 ppc64_elf_section_data (opd)->sec_type = sec_opd;
4267
459609d6
AM
4268 if (abiversion (ibfd) == 0)
4269 set_abiversion (ibfd, 1);
8a2058b5 4270 else if (abiversion (ibfd) >= 2)
f6c7c3e8 4271 {
695344c0 4272 /* xgettext:c-format */
cf97bcb0
AM
4273 _bfd_error_handler (_("%pB .opd not allowed in ABI version %d"),
4274 ibfd, abiversion (ibfd));
459609d6
AM
4275 bfd_set_error (bfd_error_bad_value);
4276 return FALSE;
f6c7c3e8 4277 }
b9399fcf 4278 }
f6c7c3e8 4279
b9399fcf
AM
4280 if (is_ppc64_elf (info->output_bfd))
4281 {
4282 /* For input files without an explicit abiversion in e_flags
4283 we should have flagged any with symbol st_other bits set
4284 as ELFv1 and above flagged those with .opd as ELFv2.
4285 Set the output abiversion if not yet set, and for any input
4286 still ambiguous, take its abiversion from the output.
4287 Differences in ABI are reported later. */
4288 if (abiversion (info->output_bfd) == 0)
4289 set_abiversion (info->output_bfd, abiversion (ibfd));
4290 else if (abiversion (ibfd) == 0)
4291 set_abiversion (ibfd, abiversion (info->output_bfd));
b3fac117
AM
4292 }
4293
459609d6
AM
4294 htab = ppc_hash_table (info);
4295 if (htab == NULL)
b9399fcf 4296 return TRUE;
459609d6 4297
b9399fcf
AM
4298 if (opd != NULL && opd->size != 0
4299 && (ibfd->flags & DYNAMIC) == 0
4300 && (opd->flags & SEC_RELOC) != 0
4301 && opd->reloc_count != 0
4302 && !bfd_is_abs_section (opd->output_section)
4303 && info->gc_sections)
4304 {
4305 /* Garbage collection needs some extra help with .opd sections.
4306 We don't want to necessarily keep everything referenced by
4307 relocs in .opd, as that would keep all functions. Instead,
4308 if we reference an .opd symbol (a function descriptor), we
4309 want to keep the function code symbol's section. This is
4310 easy for global symbols, but for local syms we need to keep
4311 information about the associated function section. */
4312 bfd_size_type amt;
4313 asection **opd_sym_map;
4314 Elf_Internal_Shdr *symtab_hdr;
4315 Elf_Internal_Rela *relocs, *rel_end, *rel;
4316
4317 amt = OPD_NDX (opd->size) * sizeof (*opd_sym_map);
4318 opd_sym_map = bfd_zalloc (ibfd, amt);
4319 if (opd_sym_map == NULL)
4320 return FALSE;
4321 ppc64_elf_section_data (opd)->u.opd.func_sec = opd_sym_map;
4322 relocs = _bfd_elf_link_read_relocs (ibfd, opd, NULL, NULL,
4323 info->keep_memory);
4324 if (relocs == NULL)
4325 return FALSE;
4326 symtab_hdr = &elf_symtab_hdr (ibfd);
4327 rel_end = relocs + opd->reloc_count - 1;
4328 for (rel = relocs; rel < rel_end; rel++)
4329 {
4330 enum elf_ppc64_reloc_type r_type = ELF64_R_TYPE (rel->r_info);
4331 unsigned long r_symndx = ELF64_R_SYM (rel->r_info);
4332
4333 if (r_type == R_PPC64_ADDR64
4334 && ELF64_R_TYPE ((rel + 1)->r_info) == R_PPC64_TOC
4335 && r_symndx < symtab_hdr->sh_info)
4336 {
4337 Elf_Internal_Sym *isym;
4338 asection *s;
4339
4340 isym = bfd_sym_from_r_symndx (&htab->sym_cache, ibfd, r_symndx);
4341 if (isym == NULL)
4342 {
4343 if (elf_section_data (opd)->relocs != relocs)
4344 free (relocs);
4345 return FALSE;
4346 }
4347
4348 s = bfd_section_from_elf_index (ibfd, isym->st_shndx);
4349 if (s != NULL && s != opd)
4350 opd_sym_map[OPD_NDX (rel->r_offset)] = s;
4351 }
4352 }
4353 if (elf_section_data (opd)->relocs != relocs)
4354 free (relocs);
4355 }
459609d6
AM
4356
4357 p = &htab->dot_syms;
4358 while ((eh = *p) != NULL)
4359 {
4360 *p = NULL;
4361 if (&eh->elf == htab->elf.hgot)
4362 ;
4363 else if (htab->elf.hgot == NULL
4364 && strcmp (eh->elf.root.root.string, ".TOC.") == 0)
4365 htab->elf.hgot = &eh->elf;
8c5b4e52
AM
4366 else if (abiversion (ibfd) <= 1)
4367 {
4368 htab->need_func_desc_adj = 1;
4369 if (!add_symbol_adjust (eh, info))
4370 return FALSE;
4371 }
459609d6
AM
4372 p = &eh->u.next_dot_sym;
4373 }
b3fac117 4374 return TRUE;
8387904d
AM
4375}
4376
97fed1c9
JJ
4377/* Undo hash table changes when an --as-needed input file is determined
4378 not to be needed. */
4379
4380static bfd_boolean
e5034e59
AM
4381ppc64_elf_notice_as_needed (bfd *ibfd,
4382 struct bfd_link_info *info,
4383 enum notice_asneeded_action act)
97fed1c9 4384{
e5034e59
AM
4385 if (act == notice_not_needed)
4386 {
4387 struct ppc_link_hash_table *htab = ppc_hash_table (info);
4dfe6ac6 4388
e5034e59
AM
4389 if (htab == NULL)
4390 return FALSE;
4dfe6ac6 4391
e5034e59
AM
4392 htab->dot_syms = NULL;
4393 }
4394 return _bfd_elf_notice_as_needed (ibfd, info, act);
97fed1c9
JJ
4395}
4396
aa374f67
AM
4397/* If --just-symbols against a final linked binary, then assume we need
4398 toc adjusting stubs when calling functions defined there. */
4399
4400static void
4401ppc64_elf_link_just_syms (asection *sec, struct bfd_link_info *info)
4402{
4403 if ((sec->flags & SEC_CODE) != 0
4404 && (sec->owner->flags & (EXEC_P | DYNAMIC)) != 0
4405 && is_ppc64_elf (sec->owner))
4406 {
2c3f079f
AM
4407 if (abiversion (sec->owner) >= 2
4408 || bfd_get_section_by_name (sec->owner, ".opd") != NULL)
aa374f67
AM
4409 sec->has_toc_reloc = 1;
4410 }
4411 _bfd_elf_link_just_syms (sec, info);
4412}
4413
e054468f 4414static struct plt_entry **
4ce794b7
AM
4415update_local_sym_info (bfd *abfd, Elf_Internal_Shdr *symtab_hdr,
4416 unsigned long r_symndx, bfd_vma r_addend, int tls_type)
411e1bfb
AM
4417{
4418 struct got_entry **local_got_ents = elf_local_got_ents (abfd);
e054468f 4419 struct plt_entry **local_plt;
f961d9dd 4420 unsigned char *local_got_tls_masks;
411e1bfb
AM
4421
4422 if (local_got_ents == NULL)
4423 {
4424 bfd_size_type size = symtab_hdr->sh_info;
4425
e054468f
AM
4426 size *= (sizeof (*local_got_ents)
4427 + sizeof (*local_plt)
4428 + sizeof (*local_got_tls_masks));
4ce794b7 4429 local_got_ents = bfd_zalloc (abfd, size);
411e1bfb 4430 if (local_got_ents == NULL)
e054468f 4431 return NULL;
411e1bfb
AM
4432 elf_local_got_ents (abfd) = local_got_ents;
4433 }
4434
37da22e5 4435 if ((tls_type & (NON_GOT | TLS_EXPLICIT)) == 0)
411e1bfb
AM
4436 {
4437 struct got_entry *ent;
4438
4439 for (ent = local_got_ents[r_symndx]; ent != NULL; ent = ent->next)
e717da7e
AM
4440 if (ent->addend == r_addend
4441 && ent->owner == abfd
4442 && ent->tls_type == tls_type)
411e1bfb
AM
4443 break;
4444 if (ent == NULL)
4445 {
986f0783 4446 size_t amt = sizeof (*ent);
4ce794b7 4447 ent = bfd_alloc (abfd, amt);
411e1bfb
AM
4448 if (ent == NULL)
4449 return FALSE;
4450 ent->next = local_got_ents[r_symndx];
4451 ent->addend = r_addend;
e717da7e 4452 ent->owner = abfd;
411e1bfb 4453 ent->tls_type = tls_type;
927be08e 4454 ent->is_indirect = FALSE;
411e1bfb
AM
4455 ent->got.refcount = 0;
4456 local_got_ents[r_symndx] = ent;
4457 }
4458 ent->got.refcount += 1;
4459 }
4460
e054468f 4461 local_plt = (struct plt_entry **) (local_got_ents + symtab_hdr->sh_info);
f961d9dd 4462 local_got_tls_masks = (unsigned char *) (local_plt + symtab_hdr->sh_info);
37da22e5 4463 local_got_tls_masks[r_symndx] |= tls_type & 0xff;
e054468f
AM
4464
4465 return local_plt + r_symndx;
65f38f15
AM
4466}
4467
411e1bfb 4468static bfd_boolean
e054468f 4469update_plt_info (bfd *abfd, struct plt_entry **plist, bfd_vma addend)
1e2f5b6e 4470{
411e1bfb 4471 struct plt_entry *ent;
1e2f5b6e 4472
e054468f 4473 for (ent = *plist; ent != NULL; ent = ent->next)
411e1bfb
AM
4474 if (ent->addend == addend)
4475 break;
4476 if (ent == NULL)
1e2f5b6e 4477 {
986f0783 4478 size_t amt = sizeof (*ent);
4ce794b7 4479 ent = bfd_alloc (abfd, amt);
411e1bfb
AM
4480 if (ent == NULL)
4481 return FALSE;
e054468f 4482 ent->next = *plist;
411e1bfb
AM
4483 ent->addend = addend;
4484 ent->plt.refcount = 0;
e054468f 4485 *plist = ent;
1e2f5b6e 4486 }
411e1bfb 4487 ent->plt.refcount += 1;
b34976b6 4488 return TRUE;
1e2f5b6e
AM
4489}
4490
e054468f
AM
4491static bfd_boolean
4492is_branch_reloc (enum elf_ppc64_reloc_type r_type)
4493{
4494 return (r_type == R_PPC64_REL24
05d0e962 4495 || r_type == R_PPC64_REL24_NOTOC
e054468f
AM
4496 || r_type == R_PPC64_REL14
4497 || r_type == R_PPC64_REL14_BRTAKEN
4498 || r_type == R_PPC64_REL14_BRNTAKEN
4499 || r_type == R_PPC64_ADDR24
4500 || r_type == R_PPC64_ADDR14
4501 || r_type == R_PPC64_ADDR14_BRTAKEN
23cedd1d 4502 || r_type == R_PPC64_ADDR14_BRNTAKEN
5663e321
AM
4503 || r_type == R_PPC64_PLTCALL
4504 || r_type == R_PPC64_PLTCALL_NOTOC);
23cedd1d
AM
4505}
4506
4507/* Relocs on inline plt call sequence insns prior to the call. */
4508
4509static bfd_boolean
4510is_plt_seq_reloc (enum elf_ppc64_reloc_type r_type)
4511{
4512 return (r_type == R_PPC64_PLT16_HA
4513 || r_type == R_PPC64_PLT16_HI
4514 || r_type == R_PPC64_PLT16_LO
4515 || r_type == R_PPC64_PLT16_LO_DS
5663e321
AM
4516 || r_type == R_PPC64_PLT_PCREL34
4517 || r_type == R_PPC64_PLT_PCREL34_NOTOC
4518 || r_type == R_PPC64_PLTSEQ
4519 || r_type == R_PPC64_PLTSEQ_NOTOC);
e054468f
AM
4520}
4521
5bd4f169 4522/* Look through the relocs for a section during the first phase, and
65f38f15 4523 calculate needed space in the global offset table, procedure
5d1634d7 4524 linkage table, and dynamic reloc sections. */
5bd4f169 4525
b34976b6 4526static bfd_boolean
4ce794b7
AM
4527ppc64_elf_check_relocs (bfd *abfd, struct bfd_link_info *info,
4528 asection *sec, const Elf_Internal_Rela *relocs)
5bd4f169 4529{
65f38f15 4530 struct ppc_link_hash_table *htab;
5bd4f169 4531 Elf_Internal_Shdr *symtab_hdr;
c7e2358a 4532 struct elf_link_hash_entry **sym_hashes;
5bd4f169
AM
4533 const Elf_Internal_Rela *rel;
4534 const Elf_Internal_Rela *rel_end;
5bd4f169 4535 asection *sreloc;
3a71aa26 4536 struct elf_link_hash_entry *tga, *dottga;
b9399fcf 4537 bfd_boolean is_opd;
5bd4f169 4538
0e1862bb 4539 if (bfd_link_relocatable (info))
b34976b6 4540 return TRUE;
5bd4f169 4541
680a3378
AM
4542 /* Don't do anything special with non-loaded, non-alloced sections.
4543 In particular, any relocs in such sections should not affect GOT
4544 and PLT reference counting (ie. we don't allow them to create GOT
4545 or PLT entries), there's no possibility or desire to optimize TLS
4546 relocs, and there's not much point in propagating relocs to shared
4547 libs that the dynamic linker won't relocate. */
4548 if ((sec->flags & SEC_ALLOC) == 0)
4549 return TRUE;
4550
0c8d6e5c 4551 BFD_ASSERT (is_ppc64_elf (abfd));
0ffa91dd 4552
65f38f15 4553 htab = ppc_hash_table (info);
4dfe6ac6
NC
4554 if (htab == NULL)
4555 return FALSE;
4556
3a71aa26
AM
4557 tga = elf_link_hash_lookup (&htab->elf, "__tls_get_addr",
4558 FALSE, FALSE, TRUE);
4559 dottga = elf_link_hash_lookup (&htab->elf, ".__tls_get_addr",
4560 FALSE, FALSE, TRUE);
0ffa91dd 4561 symtab_hdr = &elf_symtab_hdr (abfd);
5bd4f169 4562 sym_hashes = elf_sym_hashes (abfd);
5bd4f169 4563 sreloc = NULL;
b9399fcf 4564 is_opd = ppc64_elf_section_data (sec)->sec_type == sec_opd;
5bd4f169
AM
4565 rel_end = relocs + sec->reloc_count;
4566 for (rel = relocs; rel < rel_end; rel++)
4567 {
4568 unsigned long r_symndx;
4569 struct elf_link_hash_entry *h;
04c9666a 4570 enum elf_ppc64_reloc_type r_type;
727fc41e 4571 int tls_type;
7c8fe5c4 4572 struct _ppc64_elf_section_data *ppc64_sec;
cbf95972 4573 struct plt_entry **ifunc, **plt_list;
5bd4f169
AM
4574
4575 r_symndx = ELF64_R_SYM (rel->r_info);
4576 if (r_symndx < symtab_hdr->sh_info)
4577 h = NULL;
4578 else
973a3492
L
4579 {
4580 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
b31867b6 4581 h = elf_follow_link (h);
1c865ab2
AM
4582
4583 if (h == htab->elf.hgot)
4584 sec->has_toc_reloc = 1;
973a3492 4585 }
5bd4f169 4586
5663e321
AM
4587 r_type = ELF64_R_TYPE (rel->r_info);
4588 switch (r_type)
4589 {
04bdff6a
AM
4590 case R_PPC64_D34:
4591 case R_PPC64_D34_LO:
4592 case R_PPC64_D34_HI30:
4593 case R_PPC64_D34_HA30:
4594 case R_PPC64_D28:
c213164a
AM
4595 case R_PPC64_TPREL34:
4596 case R_PPC64_DTPREL34:
04bdff6a 4597 case R_PPC64_PCREL34:
5663e321 4598 case R_PPC64_GOT_PCREL34:
c213164a
AM
4599 case R_PPC64_GOT_TLSGD34:
4600 case R_PPC64_GOT_TLSLD34:
4601 case R_PPC64_GOT_TPREL34:
4602 case R_PPC64_GOT_DTPREL34:
5663e321
AM
4603 case R_PPC64_PLT_PCREL34:
4604 case R_PPC64_PLT_PCREL34_NOTOC:
04bdff6a 4605 case R_PPC64_PCREL28:
7c1f4227 4606 htab->power10_stubs = 1;
133a1f60
AM
4607 break;
4608 default:
5663e321
AM
4609 break;
4610 }
903b777d
AM
4611
4612 switch (r_type)
4613 {
4614 case R_PPC64_PLT16_HA:
4615 case R_PPC64_GOT_TLSLD16_HA:
4616 case R_PPC64_GOT_TLSGD16_HA:
4617 case R_PPC64_GOT_TPREL16_HA:
4618 case R_PPC64_GOT_DTPREL16_HA:
4619 case R_PPC64_GOT16_HA:
4620 case R_PPC64_TOC16_HA:
4621 case R_PPC64_PLT16_LO:
4622 case R_PPC64_PLT16_LO_DS:
4623 case R_PPC64_GOT_TLSLD16_LO:
4624 case R_PPC64_GOT_TLSGD16_LO:
4625 case R_PPC64_GOT_TPREL16_LO_DS:
4626 case R_PPC64_GOT_DTPREL16_LO_DS:
4627 case R_PPC64_GOT16_LO:
4628 case R_PPC64_GOT16_LO_DS:
4629 case R_PPC64_TOC16_LO:
4630 case R_PPC64_TOC16_LO_DS:
4631 case R_PPC64_GOT_PCREL34:
4632 ppc64_elf_tdata (abfd)->has_optrel = 1;
4633 ppc64_elf_section_data (sec)->has_optrel = 1;
4634 break;
4635 default:
4636 break;
4637 }
4638
f749f26e 4639 ifunc = NULL;
25f23106
AM
4640 if (h != NULL)
4641 {
4642 if (h->type == STT_GNU_IFUNC)
4643 {
4644 h->needs_plt = 1;
4645 ifunc = &h->plt.plist;
4646 }
4647 }
4648 else
4649 {
4650 Elf_Internal_Sym *isym = bfd_sym_from_r_symndx (&htab->sym_cache,
4651 abfd, r_symndx);
4652 if (isym == NULL)
4653 return FALSE;
4654
4655 if (ELF_ST_TYPE (isym->st_info) == STT_GNU_IFUNC)
4656 {
4657 ifunc = update_local_sym_info (abfd, symtab_hdr, r_symndx,
133a1f60 4658 rel->r_addend,
37da22e5 4659 NON_GOT | PLT_IFUNC);
25f23106
AM
4660 if (ifunc == NULL)
4661 return FALSE;
4662 }
4663 }
727fc41e 4664
f749f26e 4665 tls_type = 0;
a33d1f77 4666 switch (r_type)
5bd4f169 4667 {
727fc41e
AM
4668 case R_PPC64_TLSGD:
4669 case R_PPC64_TLSLD:
4670 /* These special tls relocs tie a call to __tls_get_addr with
4671 its parameter symbol. */
37da22e5 4672 if (h != NULL)
ed7007c1 4673 ppc_elf_hash_entry (h)->tls_mask |= TLS_TLS | TLS_MARK;
37da22e5
AM
4674 else
4675 if (!update_local_sym_info (abfd, symtab_hdr, r_symndx,
133a1f60 4676 rel->r_addend,
37da22e5
AM
4677 NON_GOT | TLS_TLS | TLS_MARK))
4678 return FALSE;
4679 sec->has_tls_reloc = 1;
727fc41e
AM
4680 break;
4681
411e1bfb
AM
4682 case R_PPC64_GOT_TLSLD16:
4683 case R_PPC64_GOT_TLSLD16_LO:
4684 case R_PPC64_GOT_TLSLD16_HI:
4685 case R_PPC64_GOT_TLSLD16_HA:
c213164a 4686 case R_PPC64_GOT_TLSLD34:
951fd09b 4687 tls_type = TLS_TLS | TLS_LD;
411e1bfb
AM
4688 goto dogottls;
4689
4690 case R_PPC64_GOT_TLSGD16:
4691 case R_PPC64_GOT_TLSGD16_LO:
4692 case R_PPC64_GOT_TLSGD16_HI:
4693 case R_PPC64_GOT_TLSGD16_HA:
c213164a 4694 case R_PPC64_GOT_TLSGD34:
951fd09b 4695 tls_type = TLS_TLS | TLS_GD;
411e1bfb
AM
4696 goto dogottls;
4697
4698 case R_PPC64_GOT_TPREL16_DS:
4699 case R_PPC64_GOT_TPREL16_LO_DS:
4700 case R_PPC64_GOT_TPREL16_HI:
4701 case R_PPC64_GOT_TPREL16_HA:
c213164a 4702 case R_PPC64_GOT_TPREL34:
7c8bbca5 4703 if (bfd_link_dll (info))
411e1bfb
AM
4704 info->flags |= DF_STATIC_TLS;
4705 tls_type = TLS_TLS | TLS_TPREL;
4706 goto dogottls;
4707
4708 case R_PPC64_GOT_DTPREL16_DS:
4709 case R_PPC64_GOT_DTPREL16_LO_DS:
4710 case R_PPC64_GOT_DTPREL16_HI:
4711 case R_PPC64_GOT_DTPREL16_HA:
c213164a 4712 case R_PPC64_GOT_DTPREL34:
411e1bfb
AM
4713 tls_type = TLS_TLS | TLS_DTPREL;
4714 dogottls:
4715 sec->has_tls_reloc = 1;
066f4018 4716 goto dogot;
411e1bfb 4717
903b777d
AM
4718 case R_PPC64_GOT16:
4719 case R_PPC64_GOT16_LO:
4720 case R_PPC64_GOT16_HI:
65f38f15 4721 case R_PPC64_GOT16_HA:
903b777d 4722 case R_PPC64_GOT16_DS:
066f4018 4723 case R_PPC64_GOT16_LO_DS:
4a421c53 4724 case R_PPC64_GOT_PCREL34:
066f4018 4725 dogot:
65f38f15 4726 /* This symbol requires a global offset table entry. */
4c52953f 4727 sec->has_toc_reloc = 1;
33c0ec9d
AM
4728 if (r_type == R_PPC64_GOT_TLSLD16
4729 || r_type == R_PPC64_GOT_TLSGD16
4730 || r_type == R_PPC64_GOT_TPREL16_DS
4731 || r_type == R_PPC64_GOT_DTPREL16_DS
4732 || r_type == R_PPC64_GOT16
4733 || r_type == R_PPC64_GOT16_DS)
4734 {
4735 htab->do_multi_toc = 1;
d77c8a4b 4736 ppc64_elf_tdata (abfd)->has_small_toc_reloc = 1;
33c0ec9d
AM
4737 }
4738
e717da7e
AM
4739 if (ppc64_elf_tdata (abfd)->got == NULL
4740 && !create_got_section (abfd, info))
b34976b6 4741 return FALSE;
5bd4f169
AM
4742
4743 if (h != NULL)
4744 {
411e1bfb
AM
4745 struct ppc_link_hash_entry *eh;
4746 struct got_entry *ent;
65f38f15 4747
ed7007c1 4748 eh = ppc_elf_hash_entry (h);
411e1bfb 4749 for (ent = eh->elf.got.glist; ent != NULL; ent = ent->next)
133a1f60 4750 if (ent->addend == rel->r_addend
e717da7e 4751 && ent->owner == abfd
411e1bfb
AM
4752 && ent->tls_type == tls_type)
4753 break;
4754 if (ent == NULL)
5bd4f169 4755 {
986f0783 4756 size_t amt = sizeof (*ent);
4ce794b7 4757 ent = bfd_alloc (abfd, amt);
411e1bfb 4758 if (ent == NULL)
b34976b6 4759 return FALSE;
411e1bfb 4760 ent->next = eh->elf.got.glist;
133a1f60 4761 ent->addend = rel->r_addend;
e717da7e 4762 ent->owner = abfd;
411e1bfb 4763 ent->tls_type = tls_type;
927be08e 4764 ent->is_indirect = FALSE;
411e1bfb
AM
4765 ent->got.refcount = 0;
4766 eh->elf.got.glist = ent;
5bd4f169 4767 }
411e1bfb 4768 ent->got.refcount += 1;
e7b938ca 4769 eh->tls_mask |= tls_type;
5bd4f169 4770 }
411e1bfb
AM
4771 else
4772 /* This is a global offset table entry for a local symbol. */
4773 if (!update_local_sym_info (abfd, symtab_hdr, r_symndx,
133a1f60 4774 rel->r_addend, tls_type))
411e1bfb 4775 return FALSE;
5bd4f169
AM
4776 break;
4777
5bd4f169 4778 case R_PPC64_PLT16_HA:
65f38f15
AM
4779 case R_PPC64_PLT16_HI:
4780 case R_PPC64_PLT16_LO:
08be3224 4781 case R_PPC64_PLT16_LO_DS:
5663e321
AM
4782 case R_PPC64_PLT_PCREL34:
4783 case R_PPC64_PLT_PCREL34_NOTOC:
65f38f15
AM
4784 case R_PPC64_PLT32:
4785 case R_PPC64_PLT64:
cbf95972
AM
4786 /* This symbol requires a procedure linkage table entry. */
4787 plt_list = ifunc;
4788 if (h != NULL)
e054468f 4789 {
e054468f
AM
4790 h->needs_plt = 1;
4791 if (h->root.root.string[0] == '.'
4792 && h->root.root.string[1] != '\0')
ed7007c1
AM
4793 ppc_elf_hash_entry (h)->is_func = 1;
4794 ppc_elf_hash_entry (h)->tls_mask |= PLT_KEEP;
cbf95972
AM
4795 plt_list = &h->plt.plist;
4796 }
4797 if (plt_list == NULL)
2d7ad24e 4798 plt_list = update_local_sym_info (abfd, symtab_hdr, r_symndx,
133a1f60 4799 rel->r_addend,
2d7ad24e 4800 NON_GOT | PLT_KEEP);
133a1f60 4801 if (!update_plt_info (abfd, plt_list, rel->r_addend))
cbf95972 4802 return FALSE;
5bd4f169
AM
4803 break;
4804
4805 /* The following relocations don't need to propagate the
4806 relocation if linking a shared object since they are
4807 section relative. */
4808 case R_PPC64_SECTOFF:
4809 case R_PPC64_SECTOFF_LO:
4810 case R_PPC64_SECTOFF_HI:
4811 case R_PPC64_SECTOFF_HA:
4812 case R_PPC64_SECTOFF_DS:
4813 case R_PPC64_SECTOFF_LO_DS:
411e1bfb
AM
4814 case R_PPC64_DTPREL16:
4815 case R_PPC64_DTPREL16_LO:
4816 case R_PPC64_DTPREL16_HI:
4817 case R_PPC64_DTPREL16_HA:
4818 case R_PPC64_DTPREL16_DS:
4819 case R_PPC64_DTPREL16_LO_DS:
f9c6b907
AM
4820 case R_PPC64_DTPREL16_HIGH:
4821 case R_PPC64_DTPREL16_HIGHA:
411e1bfb
AM
4822 case R_PPC64_DTPREL16_HIGHER:
4823 case R_PPC64_DTPREL16_HIGHERA:
4824 case R_PPC64_DTPREL16_HIGHEST:
4825 case R_PPC64_DTPREL16_HIGHESTA:
5bd4f169
AM
4826 break;
4827
ad8e1ba5 4828 /* Nor do these. */
25f23106
AM
4829 case R_PPC64_REL16:
4830 case R_PPC64_REL16_LO:
4831 case R_PPC64_REL16_HI:
4832 case R_PPC64_REL16_HA:
4a969973
AM
4833 case R_PPC64_REL16_HIGH:
4834 case R_PPC64_REL16_HIGHA:
4835 case R_PPC64_REL16_HIGHER:
4836 case R_PPC64_REL16_HIGHERA:
4837 case R_PPC64_REL16_HIGHEST:
4838 case R_PPC64_REL16_HIGHESTA:
5663e321
AM
4839 case R_PPC64_REL16_HIGHER34:
4840 case R_PPC64_REL16_HIGHERA34:
4841 case R_PPC64_REL16_HIGHEST34:
4842 case R_PPC64_REL16_HIGHESTA34:
a680de9a 4843 case R_PPC64_REL16DX_HA:
25f23106
AM
4844 break;
4845
45965137
AM
4846 /* Not supported as a dynamic relocation. */
4847 case R_PPC64_ADDR64_LOCAL:
0e1862bb 4848 if (bfd_link_pic (info))
45965137
AM
4849 {
4850 if (!ppc64_elf_howto_table[R_PPC64_ADDR32])
4851 ppc_howto_init ();
695344c0 4852 /* xgettext:c-format */
174d0a74 4853 info->callbacks->einfo (_("%H: %s reloc unsupported "
cf97bcb0 4854 "in shared libraries and PIEs\n"),
45965137
AM
4855 abfd, sec, rel->r_offset,
4856 ppc64_elf_howto_table[r_type]->name);
4857 bfd_set_error (bfd_error_bad_value);
4858 return FALSE;
4859 }
4860 break;
4861
ad8e1ba5 4862 case R_PPC64_TOC16:
33c0ec9d
AM
4863 case R_PPC64_TOC16_DS:
4864 htab->do_multi_toc = 1;
d77c8a4b 4865 ppc64_elf_tdata (abfd)->has_small_toc_reloc = 1;
1a0670f3 4866 /* Fall through. */
ad8e1ba5
AM
4867 case R_PPC64_TOC16_LO:
4868 case R_PPC64_TOC16_HI:
4869 case R_PPC64_TOC16_HA:
ad8e1ba5 4870 case R_PPC64_TOC16_LO_DS:
4c52953f 4871 sec->has_toc_reloc = 1;
ec73ddcd 4872 if (h != NULL && bfd_link_executable (info))
1bdd8fac
AM
4873 {
4874 /* We may need a copy reloc. */
4875 h->non_got_ref = 1;
4876 /* Strongly prefer a copy reloc over a dynamic reloc.
4877 glibc ld.so as of 2019-08 will error out if one of
4878 these relocations is emitted. */
4879 h->needs_copy = 1;
4880 goto dodyn;
4881 }
ad8e1ba5
AM
4882 break;
4883
006589cf
AM
4884 /* Marker reloc. */
4885 case R_PPC64_ENTRY:
4886 break;
4887
5bd4f169
AM
4888 /* This relocation describes the C++ object vtable hierarchy.
4889 Reconstruct it for later use during GC. */
4890 case R_PPC64_GNU_VTINHERIT:
c152c796 4891 if (!bfd_elf_gc_record_vtinherit (abfd, sec, h, rel->r_offset))
b34976b6 4892 return FALSE;
5bd4f169
AM
4893 break;
4894
4895 /* This relocation describes which C++ vtable entries are actually
4896 used. Record for later use during GC. */
4897 case R_PPC64_GNU_VTENTRY:
a0ea3a14 4898 if (!bfd_elf_gc_record_vtentry (abfd, sec, h, rel->r_addend))
b34976b6 4899 return FALSE;
5bd4f169
AM
4900 break;
4901
721956f4
AM
4902 case R_PPC64_REL14:
4903 case R_PPC64_REL14_BRTAKEN:
4904 case R_PPC64_REL14_BRNTAKEN:
220c76dd
AM
4905 {
4906 asection *dest = NULL;
4907
4908 /* Heuristic: If jumping outside our section, chances are
4909 we are going to need a stub. */
4910 if (h != NULL)
4911 {
4912 /* If the sym is weak it may be overridden later, so
4913 don't assume we know where a weak sym lives. */
4914 if (h->root.type == bfd_link_hash_defined)
4915 dest = h->root.u.def.section;
4916 }
4917 else
87d72d41
AM
4918 {
4919 Elf_Internal_Sym *isym;
4920
4921 isym = bfd_sym_from_r_symndx (&htab->sym_cache,
4922 abfd, r_symndx);
4923 if (isym == NULL)
4924 return FALSE;
4925
4926 dest = bfd_section_from_elf_index (abfd, isym->st_shndx);
4927 }
4928
220c76dd 4929 if (dest != sec)
7c8fe5c4 4930 ppc64_elf_section_data (sec)->has_14bit_branch = 1;
220c76dd 4931 }
3e04d765
AM
4932 goto rel24;
4933
4934 case R_PPC64_PLTCALL:
5663e321 4935 case R_PPC64_PLTCALL_NOTOC:
3e04d765 4936 ppc64_elf_section_data (sec)->has_pltcall = 1;
721956f4
AM
4937 /* Fall through. */
4938
5d1634d7 4939 case R_PPC64_REL24:
05d0e962 4940 case R_PPC64_REL24_NOTOC:
3e04d765 4941 rel24:
cbf95972
AM
4942 plt_list = ifunc;
4943 if (h != NULL)
5d1634d7 4944 {
e054468f
AM
4945 h->needs_plt = 1;
4946 if (h->root.root.string[0] == '.'
4947 && h->root.root.string[1] != '\0')
ed7007c1 4948 ppc_elf_hash_entry (h)->is_func = 1;
cbf95972 4949
3a71aa26 4950 if (h == tga || h == dottga)
cbf95972
AM
4951 {
4952 sec->has_tls_reloc = 1;
4953 if (rel != relocs
4954 && (ELF64_R_TYPE (rel[-1].r_info) == R_PPC64_TLSGD
4955 || ELF64_R_TYPE (rel[-1].r_info) == R_PPC64_TLSLD))
4956 /* We have a new-style __tls_get_addr call with
4957 a marker reloc. */
4958 ;
4959 else
4960 /* Mark this section as having an old-style call. */
9737e8af 4961 sec->nomark_tls_get_addr = 1;
cbf95972
AM
4962 }
4963 plt_list = &h->plt.plist;
411e1bfb 4964 }
cbf95972
AM
4965
4966 /* We may need a .plt entry if the function this reloc
4967 refers to is in a shared lib. */
4968 if (plt_list
133a1f60 4969 && !update_plt_info (abfd, plt_list, rel->r_addend))
cbf95972 4970 return FALSE;
411e1bfb
AM
4971 break;
4972
cbf95972
AM
4973 case R_PPC64_ADDR14:
4974 case R_PPC64_ADDR14_BRNTAKEN:
4975 case R_PPC64_ADDR14_BRTAKEN:
4976 case R_PPC64_ADDR24:
4977 goto dodyn;
4978
411e1bfb
AM
4979 case R_PPC64_TPREL64:
4980 tls_type = TLS_EXPLICIT | TLS_TLS | TLS_TPREL;
7c8bbca5 4981 if (bfd_link_dll (info))
411e1bfb
AM
4982 info->flags |= DF_STATIC_TLS;
4983 goto dotlstoc;
4984
4985 case R_PPC64_DTPMOD64:
4986 if (rel + 1 < rel_end
4987 && rel[1].r_info == ELF64_R_INFO (r_symndx, R_PPC64_DTPREL64)
4988 && rel[1].r_offset == rel->r_offset + 8)
951fd09b 4989 tls_type = TLS_EXPLICIT | TLS_TLS | TLS_GD;
411e1bfb 4990 else
951fd09b 4991 tls_type = TLS_EXPLICIT | TLS_TLS | TLS_LD;
411e1bfb
AM
4992 goto dotlstoc;
4993
4994 case R_PPC64_DTPREL64:
4995 tls_type = TLS_EXPLICIT | TLS_TLS | TLS_DTPREL;
4996 if (rel != relocs
4997 && rel[-1].r_info == ELF64_R_INFO (r_symndx, R_PPC64_DTPMOD64)
4998 && rel[-1].r_offset == rel->r_offset - 8)
4999 /* This is the second reloc of a dtpmod, dtprel pair.
5000 Don't mark with TLS_DTPREL. */
5001 goto dodyn;
5002
5003 dotlstoc:
5004 sec->has_tls_reloc = 1;
5005 if (h != NULL)
ed7007c1 5006 ppc_elf_hash_entry (h)->tls_mask |= tls_type & 0xff;
411e1bfb
AM
5007 else
5008 if (!update_local_sym_info (abfd, symtab_hdr, r_symndx,
133a1f60 5009 rel->r_addend, tls_type))
411e1bfb
AM
5010 return FALSE;
5011
7c8fe5c4
AM
5012 ppc64_sec = ppc64_elf_section_data (sec);
5013 if (ppc64_sec->sec_type != sec_toc)
411e1bfb 5014 {
3a71aa26
AM
5015 bfd_size_type amt;
5016
e7b938ca 5017 /* One extra to simplify get_tls_mask. */
3a71aa26
AM
5018 amt = sec->size * sizeof (unsigned) / 8 + sizeof (unsigned);
5019 ppc64_sec->u.toc.symndx = bfd_zalloc (abfd, amt);
5020 if (ppc64_sec->u.toc.symndx == NULL)
5021 return FALSE;
5022 amt = sec->size * sizeof (bfd_vma) / 8;
5023 ppc64_sec->u.toc.add = bfd_zalloc (abfd, amt);
5024 if (ppc64_sec->u.toc.add == NULL)
411e1bfb 5025 return FALSE;
7c8fe5c4
AM
5026 BFD_ASSERT (ppc64_sec->sec_type == sec_normal);
5027 ppc64_sec->sec_type = sec_toc;
411e1bfb
AM
5028 }
5029 BFD_ASSERT (rel->r_offset % 8 == 0);
3a71aa26 5030 ppc64_sec->u.toc.symndx[rel->r_offset / 8] = r_symndx;
133a1f60 5031 ppc64_sec->u.toc.add[rel->r_offset / 8] = rel->r_addend;
951fd09b
AM
5032
5033 /* Mark the second slot of a GD or LD entry.
5034 -1 to indicate GD and -2 to indicate LD. */
5035 if (tls_type == (TLS_EXPLICIT | TLS_TLS | TLS_GD))
3a71aa26 5036 ppc64_sec->u.toc.symndx[rel->r_offset / 8 + 1] = -1;
951fd09b 5037 else if (tls_type == (TLS_EXPLICIT | TLS_TLS | TLS_LD))
3a71aa26 5038 ppc64_sec->u.toc.symndx[rel->r_offset / 8 + 1] = -2;
411e1bfb
AM
5039 goto dodyn;
5040
5041 case R_PPC64_TPREL16:
5042 case R_PPC64_TPREL16_LO:
5043 case R_PPC64_TPREL16_HI:
5044 case R_PPC64_TPREL16_HA:
5045 case R_PPC64_TPREL16_DS:
5046 case R_PPC64_TPREL16_LO_DS:
f9c6b907
AM
5047 case R_PPC64_TPREL16_HIGH:
5048 case R_PPC64_TPREL16_HIGHA:
411e1bfb
AM
5049 case R_PPC64_TPREL16_HIGHER:
5050 case R_PPC64_TPREL16_HIGHERA:
5051 case R_PPC64_TPREL16_HIGHEST:
5052 case R_PPC64_TPREL16_HIGHESTA:
c213164a 5053 case R_PPC64_TPREL34:
7c8bbca5
AM
5054 if (bfd_link_dll (info))
5055 info->flags |= DF_STATIC_TLS;
5056 goto dodyn;
5d1634d7 5057
e86ce104 5058 case R_PPC64_ADDR64:
b9399fcf 5059 if (is_opd
1e2f5b6e 5060 && rel + 1 < rel_end
4ce794b7 5061 && ELF64_R_TYPE ((rel + 1)->r_info) == R_PPC64_TOC)
1e2f5b6e 5062 {
8387904d 5063 if (h != NULL)
ed7007c1 5064 ppc_elf_hash_entry (h)->is_func = 1;
1e2f5b6e 5065 }
e86ce104
AM
5066 /* Fall through. */
5067
65f38f15
AM
5068 case R_PPC64_ADDR16:
5069 case R_PPC64_ADDR16_DS:
5070 case R_PPC64_ADDR16_HA:
5071 case R_PPC64_ADDR16_HI:
f9c6b907
AM
5072 case R_PPC64_ADDR16_HIGH:
5073 case R_PPC64_ADDR16_HIGHA:
65f38f15
AM
5074 case R_PPC64_ADDR16_HIGHER:
5075 case R_PPC64_ADDR16_HIGHERA:
5076 case R_PPC64_ADDR16_HIGHEST:
5077 case R_PPC64_ADDR16_HIGHESTA:
5078 case R_PPC64_ADDR16_LO:
5079 case R_PPC64_ADDR16_LO_DS:
5663e321
AM
5080 case R_PPC64_D34:
5081 case R_PPC64_D34_LO:
5082 case R_PPC64_D34_HI30:
5083 case R_PPC64_D34_HA30:
5084 case R_PPC64_ADDR16_HIGHER34:
5085 case R_PPC64_ADDR16_HIGHERA34:
5086 case R_PPC64_ADDR16_HIGHEST34:
5087 case R_PPC64_ADDR16_HIGHESTA34:
5088 case R_PPC64_D28:
0e1862bb 5089 if (h != NULL && !bfd_link_pic (info) && abiversion (abfd) != 1
a345bc8d
AM
5090 && rel->r_addend == 0)
5091 {
5092 /* We may need a .plt entry if this reloc refers to a
5093 function in a shared lib. */
5663e321 5094 if (!update_plt_info (abfd, &h->plt.plist, 0))
a345bc8d
AM
5095 return FALSE;
5096 h->pointer_equality_needed = 1;
5097 }
5098 /* Fall through. */
5099
5100 case R_PPC64_REL30:
5101 case R_PPC64_REL32:
5102 case R_PPC64_REL64:
65f38f15 5103 case R_PPC64_ADDR32:
65f38f15
AM
5104 case R_PPC64_UADDR16:
5105 case R_PPC64_UADDR32:
5106 case R_PPC64_UADDR64:
5bd4f169 5107 case R_PPC64_TOC:
ec73ddcd 5108 if (h != NULL && bfd_link_executable (info))
81848ca0 5109 /* We may need a copy reloc. */
f5385ebf 5110 h->non_got_ref = 1;
81848ca0 5111
41bd81ab 5112 /* Don't propagate .opd relocs. */
b9399fcf 5113 if (NO_OPD_RELOCS && is_opd)
e86ce104 5114 break;
e86ce104 5115
65f38f15
AM
5116 /* If we are creating a shared library, and this is a reloc
5117 against a global symbol, or a non PC relative reloc
5118 against a local symbol, then we need to copy the reloc
5119 into the shared library. However, if we are linking with
5120 -Bsymbolic, we do not need to copy a reloc against a
5121 global symbol which is defined in an object we are
5122 including in the link (i.e., DEF_REGULAR is set). At
5123 this point we have not seen all the input files, so it is
5124 possible that DEF_REGULAR is not set now but will be set
5125 later (it is never cleared). In case of a weak definition,
5126 DEF_REGULAR may be cleared later by a strong definition in
5127 a shared library. We account for that possibility below by
f4656909 5128 storing information in the dyn_relocs field of the hash
65f38f15
AM
5129 table entry. A similar situation occurs when creating
5130 shared libraries and symbol visibility changes render the
5131 symbol local.
5132
5133 If on the other hand, we are creating an executable, we
5134 may need to keep relocations for symbols satisfied by a
5135 dynamic library if we manage to avoid copy relocs for the
5136 symbol. */
411e1bfb 5137 dodyn:
ec73ddcd
AM
5138 if ((h != NULL
5139 && (h->root.type == bfd_link_hash_defweak
5140 || !h->def_regular))
5141 || (h != NULL
5142 && !bfd_link_executable (info)
5143 && !SYMBOLIC_BIND (info, h))
5144 || (bfd_link_pic (info)
5145 && must_be_dyn_reloc (info, r_type))
0e1862bb 5146 || (!bfd_link_pic (info)
25f23106 5147 && ifunc != NULL))
5bd4f169 5148 {
65f38f15
AM
5149 /* We must copy these reloc types into the output file.
5150 Create a reloc section in dynobj and make room for
5151 this reloc. */
5bd4f169
AM
5152 if (sreloc == NULL)
5153 {
83bac4b0
NC
5154 sreloc = _bfd_elf_make_dynamic_reloc_section
5155 (sec, htab->elf.dynobj, 3, abfd, /*rela?*/ TRUE);
65f38f15 5156
5bd4f169 5157 if (sreloc == NULL)
83bac4b0 5158 return FALSE;
5bd4f169
AM
5159 }
5160
65f38f15
AM
5161 /* If this is a global symbol, we count the number of
5162 relocations we need for this symbol. */
5163 if (h != NULL)
5164 {
19e08130
AM
5165 struct elf_dyn_relocs *p;
5166 struct elf_dyn_relocs **head;
5167
ed7007c1 5168 head = &ppc_elf_hash_entry (h)->dyn_relocs;
19e08130
AM
5169 p = *head;
5170 if (p == NULL || p->sec != sec)
5171 {
5172 p = bfd_alloc (htab->elf.dynobj, sizeof *p);
5173 if (p == NULL)
5174 return FALSE;
5175 p->next = *head;
5176 *head = p;
5177 p->sec = sec;
5178 p->count = 0;
5179 p->pc_count = 0;
5180 }
5181 p->count += 1;
5182 if (!must_be_dyn_reloc (info, r_type))
5183 p->pc_count += 1;
65f38f15
AM
5184 }
5185 else
5186 {
ec338859
AM
5187 /* Track dynamic relocs needed for local syms too.
5188 We really need local syms available to do this
5189 easily. Oh well. */
19e08130
AM
5190 struct ppc_dyn_relocs *p;
5191 struct ppc_dyn_relocs **head;
5192 bfd_boolean is_ifunc;
ec338859 5193 asection *s;
6edfbbad 5194 void *vpp;
87d72d41 5195 Elf_Internal_Sym *isym;
6edfbbad 5196
87d72d41
AM
5197 isym = bfd_sym_from_r_symndx (&htab->sym_cache,
5198 abfd, r_symndx);
5199 if (isym == NULL)
b34976b6 5200 return FALSE;
ec338859 5201
87d72d41
AM
5202 s = bfd_section_from_elf_index (abfd, isym->st_shndx);
5203 if (s == NULL)
5204 s = sec;
5205
6edfbbad 5206 vpp = &elf_section_data (s)->local_dynrel;
19e08130
AM
5207 head = (struct ppc_dyn_relocs **) vpp;
5208 is_ifunc = ELF_ST_TYPE (isym->st_info) == STT_GNU_IFUNC;
5209 p = *head;
5210 if (p != NULL && p->sec == sec && p->ifunc != is_ifunc)
5211 p = p->next;
5212 if (p == NULL || p->sec != sec || p->ifunc != is_ifunc)
5213 {
5214 p = bfd_alloc (htab->elf.dynobj, sizeof *p);
5215 if (p == NULL)
5216 return FALSE;
5217 p->next = *head;
5218 *head = p;
5219 p->sec = sec;
5220 p->ifunc = is_ifunc;
5221 p->count = 0;
5222 }
5223 p->count += 1;
ec338859 5224 }
65f38f15 5225 }
5bd4f169 5226 break;
65f38f15
AM
5227
5228 default:
96e0dda4 5229 break;
5bd4f169
AM
5230 }
5231 }
5232
b34976b6 5233 return TRUE;
5bd4f169
AM
5234}
5235
ee67d69a
AM
5236/* Merge backend specific data from an object file to the output
5237 object file when linking. */
5238
5239static bfd_boolean
50e03d47 5240ppc64_elf_merge_private_bfd_data (bfd *ibfd, struct bfd_link_info *info)
ee67d69a 5241{
50e03d47 5242 bfd *obfd = info->output_bfd;
ee67d69a
AM
5243 unsigned long iflags, oflags;
5244
5245 if ((ibfd->flags & BFD_LINKER_CREATED) != 0)
5246 return TRUE;
5247
5248 if (!is_ppc64_elf (ibfd) || !is_ppc64_elf (obfd))
5249 return TRUE;
5250
50e03d47 5251 if (!_bfd_generic_verify_endian_match (ibfd, info))
ee67d69a
AM
5252 return FALSE;
5253
5254 iflags = elf_elfheader (ibfd)->e_flags;
5255 oflags = elf_elfheader (obfd)->e_flags;
5256
f6c7c3e8 5257 if (iflags & ~EF_PPC64_ABI)
ee67d69a 5258 {
4eca0228 5259 _bfd_error_handler
695344c0 5260 /* xgettext:c-format */
871b3ab2 5261 (_("%pB uses unknown e_flags 0x%lx"), ibfd, iflags);
ee67d69a
AM
5262 bfd_set_error (bfd_error_bad_value);
5263 return FALSE;
5264 }
f6c7c3e8 5265 else if (iflags != oflags && iflags != 0)
ee67d69a 5266 {
4eca0228 5267 _bfd_error_handler
695344c0 5268 /* xgettext:c-format */
871b3ab2 5269 (_("%pB: ABI version %ld is not compatible with ABI version %ld output"),
ee67d69a
AM
5270 ibfd, iflags, oflags);
5271 bfd_set_error (bfd_error_bad_value);
5272 return FALSE;
5273 }
5274
4a91d0ba
AM
5275 if (!_bfd_elf_ppc_merge_fp_attributes (ibfd, info))
5276 return FALSE;
005d79fd 5277
ee67d69a 5278 /* Merge Tag_compatibility attributes and any common GNU ones. */
8d2c8c3d 5279 return _bfd_elf_merge_object_attributes (ibfd, info);
ee67d69a
AM
5280}
5281
5282static bfd_boolean
5283ppc64_elf_print_private_bfd_data (bfd *abfd, void *ptr)
5284{
5285 /* Print normal ELF private data. */
5286 _bfd_elf_print_private_bfd_data (abfd, ptr);
5287
5288 if (elf_elfheader (abfd)->e_flags != 0)
5289 {
5290 FILE *file = ptr;
5291
ee67d69a
AM
5292 fprintf (file, _("private flags = 0x%lx:"),
5293 elf_elfheader (abfd)->e_flags);
5294
5295 if ((elf_elfheader (abfd)->e_flags & EF_PPC64_ABI) != 0)
5296 fprintf (file, _(" [abiv%ld]"),
5297 elf_elfheader (abfd)->e_flags & EF_PPC64_ABI);
5298 fputc ('\n', file);
5299 }
5300
5301 return TRUE;
5302}
5303
8387904d 5304/* OFFSET in OPD_SEC specifies a function descriptor. Return the address
b53dfeb2
AM
5305 of the code entry point, and its section, which must be in the same
5306 object as OPD_SEC. Returns (bfd_vma) -1 on error. */
8387904d
AM
5307
5308static bfd_vma
5309opd_entry_value (asection *opd_sec,
5310 bfd_vma offset,
5311 asection **code_sec,
aef36ac1
AM
5312 bfd_vma *code_off,
5313 bfd_boolean in_code_sec)
8387904d
AM
5314{
5315 bfd *opd_bfd = opd_sec->owner;
8860955f 5316 Elf_Internal_Rela *relocs;
8387904d 5317 Elf_Internal_Rela *lo, *hi, *look;
645ea6a9 5318 bfd_vma val;
8387904d 5319
9f296da3
AM
5320 /* No relocs implies we are linking a --just-symbols object, or looking
5321 at a final linked executable with addr2line or somesuch. */
4b85d634
AM
5322 if (opd_sec->reloc_count == 0)
5323 {
729eabd5 5324 bfd_byte *contents = ppc64_elf_tdata (opd_bfd)->opd.contents;
3b36f7e6 5325
729eabd5
AM
5326 if (contents == NULL)
5327 {
5328 if (!bfd_malloc_and_get_section (opd_bfd, opd_sec, &contents))
5329 return (bfd_vma) -1;
5330 ppc64_elf_tdata (opd_bfd)->opd.contents = contents;
5331 }
ee1e4ede 5332
dbb3fbbb 5333 /* PR 17512: file: 64b9dfbb. */
451dfd38 5334 if (offset + 7 >= opd_sec->size || offset + 7 < offset)
dbb3fbbb
NC
5335 return (bfd_vma) -1;
5336
729eabd5 5337 val = bfd_get_64 (opd_bfd, contents + offset);
aef36ac1
AM
5338 if (code_sec != NULL)
5339 {
5340 asection *sec, *likely = NULL;
ee1e4ede 5341
aef36ac1 5342 if (in_code_sec)
4b85d634 5343 {
aef36ac1
AM
5344 sec = *code_sec;
5345 if (sec->vma <= val
5346 && val < sec->vma + sec->size)
5347 likely = sec;
5348 else
5349 val = -1;
5350 }
5351 else
5352 for (sec = opd_bfd->sections; sec != NULL; sec = sec->next)
5353 if (sec->vma <= val
5354 && (sec->flags & SEC_LOAD) != 0
5355 && (sec->flags & SEC_ALLOC) != 0)
5356 likely = sec;
5357 if (likely != NULL)
5358 {
5359 *code_sec = likely;
5360 if (code_off != NULL)
5361 *code_off = val - likely->vma;
4b85d634
AM
5362 }
5363 }
aef36ac1 5364 return val;
4b85d634
AM
5365 }
5366
0c8d6e5c 5367 BFD_ASSERT (is_ppc64_elf (opd_bfd));
0ffa91dd 5368
729eabd5 5369 relocs = ppc64_elf_tdata (opd_bfd)->opd.relocs;
8860955f
AM
5370 if (relocs == NULL)
5371 relocs = _bfd_elf_link_read_relocs (opd_bfd, opd_sec, NULL, NULL, TRUE);
877a8638
NC
5372 /* PR 17512: file: df8e1fd6. */
5373 if (relocs == NULL)
5374 return (bfd_vma) -1;
645ea6a9 5375
8387904d 5376 /* Go find the opd reloc at the sym address. */
8860955f 5377 lo = relocs;
8387904d 5378 hi = lo + opd_sec->reloc_count - 1; /* ignore last reloc */
645ea6a9 5379 val = (bfd_vma) -1;
8387904d
AM
5380 while (lo < hi)
5381 {
5382 look = lo + (hi - lo) / 2;
5383 if (look->r_offset < offset)
5384 lo = look + 1;
5385 else if (look->r_offset > offset)
5386 hi = look;
5387 else
5388 {
0ffa91dd
NC
5389 Elf_Internal_Shdr *symtab_hdr = &elf_symtab_hdr (opd_bfd);
5390
8387904d
AM
5391 if (ELF64_R_TYPE (look->r_info) == R_PPC64_ADDR64
5392 && ELF64_R_TYPE ((look + 1)->r_info) == R_PPC64_TOC)
5393 {
5394 unsigned long symndx = ELF64_R_SYM (look->r_info);
b53dfeb2 5395 asection *sec = NULL;
8387904d 5396
b53dfeb2
AM
5397 if (symndx >= symtab_hdr->sh_info
5398 && elf_sym_hashes (opd_bfd) != NULL)
8387904d
AM
5399 {
5400 struct elf_link_hash_entry **sym_hashes;
5401 struct elf_link_hash_entry *rh;
5402
5403 sym_hashes = elf_sym_hashes (opd_bfd);
5404 rh = sym_hashes[symndx - symtab_hdr->sh_info];
128205bb
AM
5405 if (rh != NULL)
5406 {
5407 rh = elf_follow_link (rh);
bb854a36
AM
5408 if (rh->root.type != bfd_link_hash_defined
5409 && rh->root.type != bfd_link_hash_defweak)
5410 break;
5411 if (rh->root.u.def.section->owner == opd_bfd)
b53dfeb2 5412 {
bb854a36
AM
5413 val = rh->root.u.def.value;
5414 sec = rh->root.u.def.section;
b53dfeb2
AM
5415 }
5416 }
5417 }
5418
5419 if (sec == NULL)
5420 {
5421 Elf_Internal_Sym *sym;
5422
5423 if (symndx < symtab_hdr->sh_info)
5424 {
5425 sym = (Elf_Internal_Sym *) symtab_hdr->contents;
5426 if (sym == NULL)
5427 {
5428 size_t symcnt = symtab_hdr->sh_info;
5429 sym = bfd_elf_get_elf_syms (opd_bfd, symtab_hdr,
5430 symcnt, 0,
5431 NULL, NULL, NULL);
5432 if (sym == NULL)
5433 break;
5434 symtab_hdr->contents = (bfd_byte *) sym;
5435 }
5436 sym += symndx;
128205bb
AM
5437 }
5438 else
5439 {
b53dfeb2
AM
5440 sym = bfd_elf_get_elf_syms (opd_bfd, symtab_hdr,
5441 1, symndx,
5442 NULL, NULL, NULL);
128205bb
AM
5443 if (sym == NULL)
5444 break;
128205bb 5445 }
b53dfeb2
AM
5446 sec = bfd_section_from_elf_index (opd_bfd, sym->st_shndx);
5447 if (sec == NULL)
5448 break;
5449 BFD_ASSERT ((sec->flags & SEC_MERGE) == 0);
5450 val = sym->st_value;
8387904d 5451 }
b53dfeb2 5452
8387904d
AM
5453 val += look->r_addend;
5454 if (code_off != NULL)
5455 *code_off = val;
5456 if (code_sec != NULL)
aef36ac1
AM
5457 {
5458 if (in_code_sec && *code_sec != sec)
5459 return -1;
5460 else
5461 *code_sec = sec;
5462 }
b53dfeb2 5463 if (sec->output_section != NULL)
8387904d 5464 val += sec->output_section->vma + sec->output_offset;
8387904d
AM
5465 }
5466 break;
5467 }
5468 }
645ea6a9 5469
645ea6a9 5470 return val;
8387904d
AM
5471}
5472
aef36ac1
AM
5473/* If the ELF symbol SYM might be a function in SEC, return the
5474 function size and set *CODE_OFF to the function's entry point,
5475 otherwise return zero. */
9f296da3 5476
aef36ac1
AM
5477static bfd_size_type
5478ppc64_elf_maybe_function_sym (const asymbol *sym, asection *sec,
5479 bfd_vma *code_off)
9f296da3 5480{
aef36ac1
AM
5481 bfd_size_type size;
5482
5483 if ((sym->flags & (BSF_SECTION_SYM | BSF_FILE | BSF_OBJECT
5484 | BSF_THREAD_LOCAL | BSF_RELC | BSF_SRELC)) != 0)
5485 return 0;
5486
5487 size = 0;
5488 if (!(sym->flags & BSF_SYNTHETIC))
5489 size = ((elf_symbol_type *) sym)->internal_elf_sym.st_size;
5490
5491 if (strcmp (sym->section->name, ".opd") == 0)
9f296da3 5492 {
b07bca4e
AM
5493 struct _opd_sec_data *opd = get_opd_info (sym->section);
5494 bfd_vma symval = sym->value;
5495
5496 if (opd != NULL
5497 && opd->adjust != NULL
5498 && elf_section_data (sym->section)->relocs != NULL)
5499 {
5500 /* opd_entry_value will use cached relocs that have been
5501 adjusted, but with raw symbols. That means both local
5502 and global symbols need adjusting. */
5503 long adjust = opd->adjust[OPD_NDX (symval)];
5504 if (adjust == -1)
5505 return 0;
5506 symval += adjust;
5507 }
5508
5509 if (opd_entry_value (sym->section, symval,
aef36ac1
AM
5510 &sec, code_off, TRUE) == (bfd_vma) -1)
5511 return 0;
5512 /* An old ABI binary with dot-syms has a size of 24 on the .opd
5513 symbol. This size has nothing to do with the code size of the
5514 function, which is what we're supposed to return, but the
5515 code size isn't available without looking up the dot-sym.
5516 However, doing that would be a waste of time particularly
5517 since elf_find_function will look at the dot-sym anyway.
5518 Now, elf_find_function will keep the largest size of any
5519 function sym found at the code address of interest, so return
5520 1 here to avoid it incorrectly caching a larger function size
5521 for a small function. This does mean we return the wrong
5522 size for a new-ABI function of size 24, but all that does is
5523 disable caching for such functions. */
5524 if (size == 24)
5525 size = 1;
9f296da3 5526 }
aef36ac1
AM
5527 else
5528 {
5529 if (sym->section != sec)
5530 return 0;
5531 *code_off = sym->value;
5532 }
5533 if (size == 0)
5534 size = 1;
5535 return size;
9f296da3
AM
5536}
5537
f378ab09
AM
5538/* Return true if symbol is a strong function defined in an ELFv2
5539 object with st_other localentry bits of zero, ie. its local entry
5540 point coincides with its global entry point. */
5541
5542static bfd_boolean
5543is_elfv2_localentry0 (struct elf_link_hash_entry *h)
5544{
5545 return (h != NULL
5546 && h->type == STT_FUNC
5547 && h->root.type == bfd_link_hash_defined
5548 && (STO_PPC64_LOCAL_MASK & h->other) == 0
ed7007c1 5549 && !ppc_elf_hash_entry (h)->non_zero_localentry
f378ab09
AM
5550 && is_ppc64_elf (h->root.u.def.section->owner)
5551 && abiversion (h->root.u.def.section->owner) >= 2);
5552}
5553
854b41e7
AM
5554/* Return true if symbol is defined in a regular object file. */
5555
5556static bfd_boolean
5557is_static_defined (struct elf_link_hash_entry *h)
5558{
5559 return ((h->root.type == bfd_link_hash_defined
5560 || h->root.type == bfd_link_hash_defweak)
5561 && h->root.u.def.section != NULL
5562 && h->root.u.def.section->output_section != NULL);
5563}
5564
b31867b6
AM
5565/* If FDH is a function descriptor symbol, return the associated code
5566 entry symbol if it is defined. Return NULL otherwise. */
5567
5568static struct ppc_link_hash_entry *
5569defined_code_entry (struct ppc_link_hash_entry *fdh)
5570{
5571 if (fdh->is_func_descriptor)
5572 {
5573 struct ppc_link_hash_entry *fh = ppc_follow_link (fdh->oh);
5574 if (fh->elf.root.type == bfd_link_hash_defined
5575 || fh->elf.root.type == bfd_link_hash_defweak)
5576 return fh;
5577 }
5578 return NULL;
5579}
5580
5581/* If FH is a function code entry symbol, return the associated
5582 function descriptor symbol if it is defined. Return NULL otherwise. */
5583
5584static struct ppc_link_hash_entry *
5585defined_func_desc (struct ppc_link_hash_entry *fh)
5586{
5587 if (fh->oh != NULL
5588 && fh->oh->is_func_descriptor)
5589 {
5590 struct ppc_link_hash_entry *fdh = ppc_follow_link (fh->oh);
5591 if (fdh->elf.root.type == bfd_link_hash_defined
5592 || fdh->elf.root.type == bfd_link_hash_defweak)
5593 return fdh;
5594 }
5595 return NULL;
5596}
5597
ed7007c1
AM
5598/* Given H is a symbol that satisfies is_static_defined, return the
5599 value in the output file. */
5600
5601static bfd_vma
5602defined_sym_val (struct elf_link_hash_entry *h)
5603{
5604 return (h->root.u.def.section->output_section->vma
5605 + h->root.u.def.section->output_offset
5606 + h->root.u.def.value);
5607}
5608
5609/* Return true if H matches __tls_get_addr or one of its variants. */
5610
5611static bfd_boolean
5612is_tls_get_addr (struct elf_link_hash_entry *h,
5613 struct ppc_link_hash_table *htab)
5614{
9e7028aa
AM
5615 return (h == &htab->tls_get_addr_fd->elf || h == &htab->tga_desc_fd->elf
5616 || h == &htab->tls_get_addr->elf || h == &htab->tga_desc->elf);
ed7007c1
AM
5617}
5618
8c5b4e52
AM
5619static bfd_boolean func_desc_adjust (struct elf_link_hash_entry *, void *);
5620
5621/* Garbage collect sections, after first dealing with dot-symbols. */
5622
5623static bfd_boolean
5624ppc64_elf_gc_sections (bfd *abfd, struct bfd_link_info *info)
5625{
5626 struct ppc_link_hash_table *htab = ppc_hash_table (info);
5627
5628 if (htab != NULL && htab->need_func_desc_adj)
5629 {
5630 elf_link_hash_traverse (&htab->elf, func_desc_adjust, info);
5631 htab->need_func_desc_adj = 0;
5632 }
5633 return bfd_elf_gc_sections (abfd, info);
5634}
5635
74f0fb50
AM
5636/* Mark all our entry sym sections, both opd and code section. */
5637
5638static void
5639ppc64_elf_gc_keep (struct bfd_link_info *info)
5640{
5641 struct ppc_link_hash_table *htab = ppc_hash_table (info);
5642 struct bfd_sym_chain *sym;
5643
4dfe6ac6
NC
5644 if (htab == NULL)
5645 return;
5646
74f0fb50
AM
5647 for (sym = info->gc_sym_list; sym != NULL; sym = sym->next)
5648 {
b31867b6 5649 struct ppc_link_hash_entry *eh, *fh;
74f0fb50
AM
5650 asection *sec;
5651
ed7007c1
AM
5652 eh = ppc_elf_hash_entry (elf_link_hash_lookup (&htab->elf, sym->name,
5653 FALSE, FALSE, TRUE));
74f0fb50
AM
5654 if (eh == NULL)
5655 continue;
5656 if (eh->elf.root.type != bfd_link_hash_defined
5657 && eh->elf.root.type != bfd_link_hash_defweak)
5658 continue;
5659
b31867b6
AM
5660 fh = defined_code_entry (eh);
5661 if (fh != NULL)
74f0fb50 5662 {
b31867b6 5663 sec = fh->elf.root.u.def.section;
74f0fb50
AM
5664 sec->flags |= SEC_KEEP;
5665 }
5666 else if (get_opd_info (eh->elf.root.u.def.section) != NULL
5667 && opd_entry_value (eh->elf.root.u.def.section,
5668 eh->elf.root.u.def.value,
aef36ac1 5669 &sec, NULL, FALSE) != (bfd_vma) -1)
74f0fb50
AM
5670 sec->flags |= SEC_KEEP;
5671
5672 sec = eh->elf.root.u.def.section;
5673 sec->flags |= SEC_KEEP;
5674 }
5675}
5676
64d03ab5
AM
5677/* Mark sections containing dynamically referenced symbols. When
5678 building shared libraries, we must assume that any visible symbol is
5679 referenced. */
5680
5681static bfd_boolean
5682ppc64_elf_gc_mark_dynamic_ref (struct elf_link_hash_entry *h, void *inf)
5683{
5684 struct bfd_link_info *info = (struct bfd_link_info *) inf;
ed7007c1 5685 struct ppc_link_hash_entry *eh = ppc_elf_hash_entry (h);
b31867b6 5686 struct ppc_link_hash_entry *fdh;
b407645f 5687 struct bfd_elf_dynamic_list *d = info->dynamic_list;
64d03ab5 5688
64d03ab5 5689 /* Dynamic linking info is on the func descriptor sym. */
b31867b6
AM
5690 fdh = defined_func_desc (eh);
5691 if (fdh != NULL)
5692 eh = fdh;
64d03ab5
AM
5693
5694 if ((eh->elf.root.type == bfd_link_hash_defined
5695 || eh->elf.root.type == bfd_link_hash_defweak)
87e79a65 5696 && ((eh->elf.ref_dynamic && !eh->elf.forced_local)
1c9177d9 5697 || ((eh->elf.def_regular || ELF_COMMON_DEF_P (&eh->elf))
64d03ab5 5698 && ELF_ST_VISIBILITY (eh->elf.other) != STV_INTERNAL
4c58e0d8 5699 && ELF_ST_VISIBILITY (eh->elf.other) != STV_HIDDEN
0e1862bb 5700 && (!bfd_link_executable (info)
e278ae05 5701 || info->gc_keep_exported
b407645f
AM
5702 || info->export_dynamic
5703 || (eh->elf.dynamic
5704 && d != NULL
2cdcc330
AM
5705 && (*d->match) (&d->head, NULL,
5706 eh->elf.root.root.string)))
e278ae05 5707 && (eh->elf.versioned >= versioned
4c58e0d8
AM
5708 || !bfd_hide_sym_by_version (info->version_info,
5709 eh->elf.root.root.string)))))
64d03ab5
AM
5710 {
5711 asection *code_sec;
b31867b6 5712 struct ppc_link_hash_entry *fh;
64d03ab5
AM
5713
5714 eh->elf.root.u.def.section->flags |= SEC_KEEP;
5715
5716 /* Function descriptor syms cause the associated
5717 function code sym section to be marked. */
b31867b6
AM
5718 fh = defined_code_entry (eh);
5719 if (fh != NULL)
5720 {
5721 code_sec = fh->elf.root.u.def.section;
5722 code_sec->flags |= SEC_KEEP;
5723 }
64d03ab5
AM
5724 else if (get_opd_info (eh->elf.root.u.def.section) != NULL
5725 && opd_entry_value (eh->elf.root.u.def.section,
5726 eh->elf.root.u.def.value,
aef36ac1 5727 &code_sec, NULL, FALSE) != (bfd_vma) -1)
64d03ab5
AM
5728 code_sec->flags |= SEC_KEEP;
5729 }
5730
5731 return TRUE;
5732}
5733
5bd4f169
AM
5734/* Return the section that should be marked against GC for a given
5735 relocation. */
5736
5737static asection *
4ce794b7 5738ppc64_elf_gc_mark_hook (asection *sec,
fb34365b 5739 struct bfd_link_info *info,
4ce794b7
AM
5740 Elf_Internal_Rela *rel,
5741 struct elf_link_hash_entry *h,
5742 Elf_Internal_Sym *sym)
5bd4f169 5743{
ccfa59ea
AM
5744 asection *rsec;
5745
ccfa59ea
AM
5746 /* Syms return NULL if we're marking .opd, so we avoid marking all
5747 function sections, as all functions are referenced in .opd. */
5748 rsec = NULL;
5749 if (get_opd_info (sec) != NULL)
5750 return rsec;
1e2f5b6e 5751
5bd4f169
AM
5752 if (h != NULL)
5753 {
04c9666a 5754 enum elf_ppc64_reloc_type r_type;
b31867b6 5755 struct ppc_link_hash_entry *eh, *fh, *fdh;
a33d1f77 5756
4ce794b7 5757 r_type = ELF64_R_TYPE (rel->r_info);
a33d1f77 5758 switch (r_type)
5bd4f169
AM
5759 {
5760 case R_PPC64_GNU_VTINHERIT:
5761 case R_PPC64_GNU_VTENTRY:
5762 break;
5763
5764 default:
5765 switch (h->root.type)
5766 {
5767 case bfd_link_hash_defined:
5768 case bfd_link_hash_defweak:
ed7007c1 5769 eh = ppc_elf_hash_entry (h);
b31867b6
AM
5770 fdh = defined_func_desc (eh);
5771 if (fdh != NULL)
8c5b4e52
AM
5772 {
5773 /* -mcall-aixdesc code references the dot-symbol on
5774 a call reloc. Mark the function descriptor too
5775 against garbage collection. */
5776 fdh->elf.mark = 1;
60d67dc8
AM
5777 if (fdh->elf.is_weakalias)
5778 weakdef (&fdh->elf)->mark = 1;
8c5b4e52
AM
5779 eh = fdh;
5780 }
1e2f5b6e
AM
5781
5782 /* Function descriptor syms cause the associated
5783 function code sym section to be marked. */
b31867b6
AM
5784 fh = defined_code_entry (eh);
5785 if (fh != NULL)
ccfa59ea
AM
5786 {
5787 /* They also mark their opd section. */
74f0fb50 5788 eh->elf.root.u.def.section->gc_mark = 1;
ccfa59ea 5789
b31867b6 5790 rsec = fh->elf.root.u.def.section;
ccfa59ea 5791 }
8387904d
AM
5792 else if (get_opd_info (eh->elf.root.u.def.section) != NULL
5793 && opd_entry_value (eh->elf.root.u.def.section,
5794 eh->elf.root.u.def.value,
aef36ac1 5795 &rsec, NULL, FALSE) != (bfd_vma) -1)
74f0fb50 5796 eh->elf.root.u.def.section->gc_mark = 1;
ccfa59ea 5797 else
1e2f5b6e
AM
5798 rsec = h->root.u.def.section;
5799 break;
5bd4f169
AM
5800
5801 case bfd_link_hash_common:
1e2f5b6e
AM
5802 rsec = h->root.u.c.p->section;
5803 break;
5bd4f169
AM
5804
5805 default:
fb34365b 5806 return _bfd_elf_gc_mark_hook (sec, info, rel, h, sym);
5bd4f169
AM
5807 }
5808 }
5809 }
5810 else
5811 {
74f0fb50 5812 struct _opd_sec_data *opd;
1e2f5b6e
AM
5813
5814 rsec = bfd_section_from_elf_index (sec->owner, sym->st_shndx);
74f0fb50
AM
5815 opd = get_opd_info (rsec);
5816 if (opd != NULL && opd->func_sec != NULL)
ccfa59ea 5817 {
74f0fb50 5818 rsec->gc_mark = 1;
ccfa59ea 5819
51aecdc5 5820 rsec = opd->func_sec[OPD_NDX (sym->st_value + rel->r_addend)];
ccfa59ea 5821 }
5bd4f169
AM
5822 }
5823
1e2f5b6e 5824 return rsec;
5bd4f169
AM
5825}
5826
deb0e272
AM
5827/* The maximum size of .sfpr. */
5828#define SFPR_MAX (218*4)
5829
5830struct sfpr_def_parms
5831{
699733f6
AM
5832 const char name[12];
5833 unsigned char lo, hi;
2cdcc330
AM
5834 bfd_byte *(*write_ent) (bfd *, bfd_byte *, int);
5835 bfd_byte *(*write_tail) (bfd *, bfd_byte *, int);
deb0e272
AM
5836};
5837
a4b6fadd
AM
5838/* Auto-generate _save*, _rest* functions in .sfpr.
5839 If STUB_SEC is non-null, define alias symbols in STUB_SEC
5840 instead. */
deb0e272 5841
4dfe6ac6 5842static bfd_boolean
a4b6fadd
AM
5843sfpr_define (struct bfd_link_info *info,
5844 const struct sfpr_def_parms *parm,
5845 asection *stub_sec)
deb0e272
AM
5846{
5847 struct ppc_link_hash_table *htab = ppc_hash_table (info);
5848 unsigned int i;
5849 size_t len = strlen (parm->name);
5850 bfd_boolean writing = FALSE;
699733f6 5851 char sym[16];
deb0e272 5852
4dfe6ac6
NC
5853 if (htab == NULL)
5854 return FALSE;
5855
deb0e272
AM
5856 memcpy (sym, parm->name, len);
5857 sym[len + 2] = 0;
5858
5859 for (i = parm->lo; i <= parm->hi; i++)
5860 {
a4b6fadd 5861 struct ppc_link_hash_entry *h;
deb0e272
AM
5862
5863 sym[len + 0] = i / 10 + '0';
5864 sym[len + 1] = i % 10 + '0';
ed7007c1
AM
5865 h = ppc_elf_hash_entry (elf_link_hash_lookup (&htab->elf, sym,
5866 writing, TRUE, TRUE));
a4b6fadd 5867 if (stub_sec != NULL)
deb0e272 5868 {
a4b6fadd
AM
5869 if (h != NULL
5870 && h->elf.root.type == bfd_link_hash_defined
5871 && h->elf.root.u.def.section == htab->sfpr)
5872 {
5873 struct elf_link_hash_entry *s;
5874 char buf[32];
5875 sprintf (buf, "%08x.%s", stub_sec->id & 0xffffffff, sym);
5876 s = elf_link_hash_lookup (&htab->elf, buf, TRUE, TRUE, FALSE);
5877 if (s == NULL)
5878 return FALSE;
779f2ae7 5879 if (s->root.type == bfd_link_hash_new)
a4b6fadd
AM
5880 {
5881 s->root.type = bfd_link_hash_defined;
5882 s->root.u.def.section = stub_sec;
7dda8d3c 5883 s->root.u.def.value = (stub_sec->size - htab->sfpr->size
a4b6fadd
AM
5884 + h->elf.root.u.def.value);
5885 s->ref_regular = 1;
5886 s->def_regular = 1;
5887 s->ref_regular_nonweak = 1;
5888 s->forced_local = 1;
5889 s->non_elf = 0;
5890 s->root.linker_def = 1;
5891 }
5892 }
5893 continue;
5894 }
5895 if (h != NULL)
5896 {
5897 h->save_res = 1;
5898 if (!h->elf.def_regular)
deb0e272 5899 {
a4b6fadd
AM
5900 h->elf.root.type = bfd_link_hash_defined;
5901 h->elf.root.u.def.section = htab->sfpr;
5902 h->elf.root.u.def.value = htab->sfpr->size;
5903 h->elf.type = STT_FUNC;
5904 h->elf.def_regular = 1;
b32547cd 5905 h->elf.non_elf = 0;
a4b6fadd
AM
5906 _bfd_elf_link_hash_hide_symbol (info, &h->elf, TRUE);
5907 writing = TRUE;
deb0e272 5908 if (htab->sfpr->contents == NULL)
a4b6fadd 5909 {
2cdcc330
AM
5910 htab->sfpr->contents
5911 = bfd_alloc (htab->elf.dynobj, SFPR_MAX);
a4b6fadd
AM
5912 if (htab->sfpr->contents == NULL)
5913 return FALSE;
5914 }
deb0e272
AM
5915 }
5916 }
5917 if (writing)
5918 {
5919 bfd_byte *p = htab->sfpr->contents + htab->sfpr->size;
5920 if (i != parm->hi)
5921 p = (*parm->write_ent) (htab->elf.dynobj, p, i);
5922 else
5923 p = (*parm->write_tail) (htab->elf.dynobj, p, i);
5924 htab->sfpr->size = p - htab->sfpr->contents;
5925 }
5926 }
5927
5928 return TRUE;
5929}
5930
5931static bfd_byte *
5932savegpr0 (bfd *abfd, bfd_byte *p, int r)
5933{
5934 bfd_put_32 (abfd, STD_R0_0R1 + (r << 21) + (1 << 16) - (32 - r) * 8, p);
5935 return p + 4;
5936}
5937
5938static bfd_byte *
5939savegpr0_tail (bfd *abfd, bfd_byte *p, int r)
5940{
5941 p = savegpr0 (abfd, p, r);
a078d95a 5942 bfd_put_32 (abfd, STD_R0_0R1 + STK_LR, p);
deb0e272
AM
5943 p = p + 4;
5944 bfd_put_32 (abfd, BLR, p);
5945 return p + 4;
5946}
5947
5948static bfd_byte *
5949restgpr0 (bfd *abfd, bfd_byte *p, int r)
5950{
5951 bfd_put_32 (abfd, LD_R0_0R1 + (r << 21) + (1 << 16) - (32 - r) * 8, p);
5952 return p + 4;
5953}
5954
5955static bfd_byte *
5956restgpr0_tail (bfd *abfd, bfd_byte *p, int r)
5957{
a078d95a 5958 bfd_put_32 (abfd, LD_R0_0R1 + STK_LR, p);
deb0e272
AM
5959 p = p + 4;
5960 p = restgpr0 (abfd, p, r);
5961 bfd_put_32 (abfd, MTLR_R0, p);
5962 p = p + 4;
5963 if (r == 29)
5964 {
5965 p = restgpr0 (abfd, p, 30);
5966 p = restgpr0 (abfd, p, 31);
5967 }
5968 bfd_put_32 (abfd, BLR, p);
5969 return p + 4;
5970}
5971
5972static bfd_byte *
5973savegpr1 (bfd *abfd, bfd_byte *p, int r)
5974{
5975 bfd_put_32 (abfd, STD_R0_0R12 + (r << 21) + (1 << 16) - (32 - r) * 8, p);
5976 return p + 4;
5977}
5978
5979static bfd_byte *
5980savegpr1_tail (bfd *abfd, bfd_byte *p, int r)
5981{
5982 p = savegpr1 (abfd, p, r);
5983 bfd_put_32 (abfd, BLR, p);
5984 return p + 4;
5985}
5986
5987static bfd_byte *
5988restgpr1 (bfd *abfd, bfd_byte *p, int r)
5989{
5990 bfd_put_32 (abfd, LD_R0_0R12 + (r << 21) + (1 << 16) - (32 - r) * 8, p);
5991 return p + 4;
5992}
5993
5994static bfd_byte *
5995restgpr1_tail (bfd *abfd, bfd_byte *p, int r)
5996{
5997 p = restgpr1 (abfd, p, r);
5998 bfd_put_32 (abfd, BLR, p);
5999 return p + 4;
6000}
6001
6002static bfd_byte *
6003savefpr (bfd *abfd, bfd_byte *p, int r)
6004{
6005 bfd_put_32 (abfd, STFD_FR0_0R1 + (r << 21) + (1 << 16) - (32 - r) * 8, p);
6006 return p + 4;
6007}
6008
6009static bfd_byte *
6010savefpr0_tail (bfd *abfd, bfd_byte *p, int r)
6011{
6012 p = savefpr (abfd, p, r);
a078d95a 6013 bfd_put_32 (abfd, STD_R0_0R1 + STK_LR, p);
deb0e272
AM
6014 p = p + 4;
6015 bfd_put_32 (abfd, BLR, p);
6016 return p + 4;
6017}
6018
6019static bfd_byte *
6020restfpr (bfd *abfd, bfd_byte *p, int r)
6021{
6022 bfd_put_32 (abfd, LFD_FR0_0R1 + (r << 21) + (1 << 16) - (32 - r) * 8, p);
6023 return p + 4;
6024}
6025
6026static bfd_byte *
6027restfpr0_tail (bfd *abfd, bfd_byte *p, int r)
6028{
a078d95a 6029 bfd_put_32 (abfd, LD_R0_0R1 + STK_LR, p);
deb0e272
AM
6030 p = p + 4;
6031 p = restfpr (abfd, p, r);
6032 bfd_put_32 (abfd, MTLR_R0, p);
6033 p = p + 4;
6034 if (r == 29)
6035 {
6036 p = restfpr (abfd, p, 30);
6037 p = restfpr (abfd, p, 31);
6038 }
6039 bfd_put_32 (abfd, BLR, p);
6040 return p + 4;
6041}
6042
6043static bfd_byte *
6044savefpr1_tail (bfd *abfd, bfd_byte *p, int r)
6045{
6046 p = savefpr (abfd, p, r);
6047 bfd_put_32 (abfd, BLR, p);
6048 return p + 4;
6049}
6050
6051static bfd_byte *
6052restfpr1_tail (bfd *abfd, bfd_byte *p, int r)
6053{
6054 p = restfpr (abfd, p, r);
6055 bfd_put_32 (abfd, BLR, p);
6056 return p + 4;
6057}
6058
6059static bfd_byte *
6060savevr (bfd *abfd, bfd_byte *p, int r)
6061{
6062 bfd_put_32 (abfd, LI_R12_0 + (1 << 16) - (32 - r) * 16, p);
6063 p = p + 4;
6064 bfd_put_32 (abfd, STVX_VR0_R12_R0 + (r << 21), p);
6065 return p + 4;
6066}
6067
6068static bfd_byte *
6069savevr_tail (bfd *abfd, bfd_byte *p, int r)
6070{
6071 p = savevr (abfd, p, r);
6072 bfd_put_32 (abfd, BLR, p);
6073 return p + 4;
6074}
6075
6076static bfd_byte *
6077restvr (bfd *abfd, bfd_byte *p, int r)
6078{
6079 bfd_put_32 (abfd, LI_R12_0 + (1 << 16) - (32 - r) * 16, p);
6080 p = p + 4;
6081 bfd_put_32 (abfd, LVX_VR0_R12_R0 + (r << 21), p);
6082 return p + 4;
6083}
6084
6085static bfd_byte *
6086restvr_tail (bfd *abfd, bfd_byte *p, int r)
6087{
6088 p = restvr (abfd, p, r);
6089 bfd_put_32 (abfd, BLR, p);
6090 return p + 4;
6091}
6092
9e7028aa
AM
6093#define STDU_R1_0R1 0xf8210001
6094#define ADDI_R1_R1 0x38210000
6095
6096/* Emit prologue of wrapper preserving regs around a call to
6097 __tls_get_addr_opt. */
6098
6099static bfd_byte *
6100tls_get_addr_prologue (bfd *obfd, bfd_byte *p, struct ppc_link_hash_table *htab)
6101{
6102 unsigned int i;
6103
6104 bfd_put_32 (obfd, MFLR_R0, p);
6105 p += 4;
6106 bfd_put_32 (obfd, STD_R0_0R1 + 16, p);
6107 p += 4;
6108
6109 if (htab->opd_abi)
6110 {
6111 for (i = 4; i < 12; i++)
6112 {
6113 bfd_put_32 (obfd,
6114 STD_R0_0R1 | i << 21 | (-(13 - i) * 8 & 0xffff), p);
6115 p += 4;
6116 }
6117 bfd_put_32 (obfd, STDU_R1_0R1 | (-128 & 0xffff), p);
6118 p += 4;
6119 }
6120 else
6121 {
6122 for (i = 4; i < 12; i++)
6123 {
6124 bfd_put_32 (obfd,
6125 STD_R0_0R1 | i << 21 | (-(12 - i) * 8 & 0xffff), p);
6126 p += 4;
6127 }
6128 bfd_put_32 (obfd, STDU_R1_0R1 | (-96 & 0xffff), p);
6129 p += 4;
6130 }
6131 return p;
6132}
6133
6134/* Emit epilogue of wrapper preserving regs around a call to
6135 __tls_get_addr_opt. */
6136
6137static bfd_byte *
6138tls_get_addr_epilogue (bfd *obfd, bfd_byte *p, struct ppc_link_hash_table *htab)
6139{
6140 unsigned int i;
6141
6142 if (htab->opd_abi)
6143 {
6144 for (i = 4; i < 12; i++)
6145 {
6146 bfd_put_32 (obfd, LD_R0_0R1 | i << 21 | (128 - (13 - i) * 8), p);
6147 p += 4;
6148 }
6149 bfd_put_32 (obfd, ADDI_R1_R1 | 128, p);
6150 p += 4;
6151 }
6152 else
6153 {
6154 for (i = 4; i < 12; i++)
6155 {
6156 bfd_put_32 (obfd, LD_R0_0R1 | i << 21 | (96 - (12 - i) * 8), p);
6157 p += 4;
6158 }
6159 bfd_put_32 (obfd, ADDI_R1_R1 | 96, p);
6160 p += 4;
6161 }
6162 bfd_put_32 (obfd, LD_R0_0R1 | 16, p);
6163 p += 4;
6164 bfd_put_32 (obfd, MTLR_R0, p);
6165 p += 4;
6166 bfd_put_32 (obfd, BLR, p);
6167 p += 4;
6168 return p;
6169}
6170
e86ce104
AM
6171/* Called via elf_link_hash_traverse to transfer dynamic linking
6172 information on function code symbol entries to their corresponding
6173 function descriptor symbol entries. */
deb0e272 6174
b34976b6 6175static bfd_boolean
4ce794b7 6176func_desc_adjust (struct elf_link_hash_entry *h, void *inf)
5bd4f169 6177{
e86ce104 6178 struct bfd_link_info *info;
65f38f15 6179 struct ppc_link_hash_table *htab;
50bc7936
AM
6180 struct ppc_link_hash_entry *fh;
6181 struct ppc_link_hash_entry *fdh;
6182 bfd_boolean force_local;
5bd4f169 6183
ed7007c1 6184 fh = ppc_elf_hash_entry (h);
50bc7936 6185 if (fh->elf.root.type == bfd_link_hash_indirect)
b34976b6 6186 return TRUE;
e86ce104 6187
8c5b4e52
AM
6188 if (!fh->is_func)
6189 return TRUE;
6190
6191 if (fh->elf.root.root.string[0] != '.'
6192 || fh->elf.root.root.string[1] == '\0')
6193 return TRUE;
6194
4ce794b7 6195 info = inf;
65f38f15 6196 htab = ppc_hash_table (info);
4dfe6ac6
NC
6197 if (htab == NULL)
6198 return FALSE;
5bd4f169 6199
8c5b4e52
AM
6200 /* Find the corresponding function descriptor symbol. */
6201 fdh = lookup_fdh (fh, htab);
6202
c09bdfe5
AM
6203 /* Resolve undefined references to dot-symbols as the value
6204 in the function descriptor, if we have one in a regular object.
6205 This is to satisfy cases like ".quad .foo". Calls to functions
6206 in dynamic objects are handled elsewhere. */
8c5b4e52
AM
6207 if ((fh->elf.root.type == bfd_link_hash_undefined
6208 || fh->elf.root.type == bfd_link_hash_undefweak)
6209 && (fdh->elf.root.type == bfd_link_hash_defined
6210 || fdh->elf.root.type == bfd_link_hash_defweak)
b31867b6
AM
6211 && get_opd_info (fdh->elf.root.u.def.section) != NULL
6212 && opd_entry_value (fdh->elf.root.u.def.section,
6213 fdh->elf.root.u.def.value,
c09bdfe5 6214 &fh->elf.root.u.def.section,
aef36ac1 6215 &fh->elf.root.u.def.value, FALSE) != (bfd_vma) -1)
c09bdfe5 6216 {
b31867b6 6217 fh->elf.root.type = fdh->elf.root.type;
f5385ebf 6218 fh->elf.forced_local = 1;
b31867b6
AM
6219 fh->elf.def_regular = fdh->elf.def_regular;
6220 fh->elf.def_dynamic = fdh->elf.def_dynamic;
c09bdfe5
AM
6221 }
6222
8c5b4e52
AM
6223 if (!fh->elf.dynamic)
6224 {
6225 struct plt_entry *ent;
5bd4f169 6226
8c5b4e52
AM
6227 for (ent = fh->elf.plt.plist; ent != NULL; ent = ent->next)
6228 if (ent->plt.refcount > 0)
6229 break;
6230 if (ent == NULL)
6231 return TRUE;
6232 }
5bd4f169 6233
8c5b4e52 6234 /* Create a descriptor as undefined if necessary. */
50bc7936 6235 if (fdh == NULL
0e1862bb 6236 && !bfd_link_executable (info)
50bc7936
AM
6237 && (fh->elf.root.type == bfd_link_hash_undefined
6238 || fh->elf.root.type == bfd_link_hash_undefweak))
6239 {
908b32fc 6240 fdh = make_fdh (info, fh);
bb700d78
AM
6241 if (fdh == NULL)
6242 return FALSE;
50bc7936 6243 }
648cca2c 6244
8c5b4e52 6245 /* We can't support overriding of symbols on a fake descriptor. */
908b32fc
AM
6246 if (fdh != NULL
6247 && fdh->fake
8c5b4e52
AM
6248 && (fh->elf.root.type == bfd_link_hash_defined
6249 || fh->elf.root.type == bfd_link_hash_defweak))
6250 _bfd_elf_link_hash_hide_symbol (info, &fdh->elf, TRUE);
908b32fc 6251
8c5b4e52
AM
6252 /* Transfer dynamic linking information to the function descriptor. */
6253 if (fdh != NULL)
6254 {
f5385ebf
AM
6255 fdh->elf.ref_regular |= fh->elf.ref_regular;
6256 fdh->elf.ref_dynamic |= fh->elf.ref_dynamic;
6257 fdh->elf.ref_regular_nonweak |= fh->elf.ref_regular_nonweak;
6258 fdh->elf.non_got_ref |= fh->elf.non_got_ref;
8c5b4e52
AM
6259 fdh->elf.dynamic |= fh->elf.dynamic;
6260 fdh->elf.needs_plt |= (fh->elf.needs_plt
6261 || fh->elf.type == STT_FUNC
6262 || fh->elf.type == STT_GNU_IFUNC);
6263 move_plt_plist (fh, fdh);
6264
6265 if (!fdh->elf.forced_local
6266 && fh->elf.dynindx != -1)
6267 if (!bfd_elf_link_record_dynamic_symbol (info, &fdh->elf))
6268 return FALSE;
e86ce104
AM
6269 }
6270
50bc7936
AM
6271 /* Now that the info is on the function descriptor, clear the
6272 function code sym info. Any function code syms for which we
6273 don't have a definition in a regular file, we force local.
6274 This prevents a shared library from exporting syms that have
6275 been imported from another library. Function code syms that
6276 are really in the library we must leave global to prevent the
6277 linker dragging in a definition from a static library. */
93f3fa99
AM
6278 force_local = (!fh->elf.def_regular
6279 || fdh == NULL
6280 || !fdh->elf.def_regular
6281 || fdh->elf.forced_local);
50bc7936
AM
6282 _bfd_elf_link_hash_hide_symbol (info, &fh->elf, force_local);
6283
b34976b6 6284 return TRUE;
e86ce104 6285}
40b8271b 6286
a4b6fadd
AM
6287static const struct sfpr_def_parms save_res_funcs[] =
6288 {
6289 { "_savegpr0_", 14, 31, savegpr0, savegpr0_tail },
6290 { "_restgpr0_", 14, 29, restgpr0, restgpr0_tail },
6291 { "_restgpr0_", 30, 31, restgpr0, restgpr0_tail },
6292 { "_savegpr1_", 14, 31, savegpr1, savegpr1_tail },
6293 { "_restgpr1_", 14, 31, restgpr1, restgpr1_tail },
6294 { "_savefpr_", 14, 31, savefpr, savefpr0_tail },
6295 { "_restfpr_", 14, 29, restfpr, restfpr0_tail },
6296 { "_restfpr_", 30, 31, restfpr, restfpr0_tail },
6297 { "._savef", 14, 31, savefpr, savefpr1_tail },
6298 { "._restf", 14, 31, restfpr, restfpr1_tail },
6299 { "_savevr_", 20, 31, savevr, savevr_tail },
6300 { "_restvr_", 20, 31, restvr, restvr_tail }
6301 };
6302
e86ce104 6303/* Called near the start of bfd_elf_size_dynamic_sections. We use
82bd7b59
AM
6304 this hook to a) provide some gcc support functions, and b) transfer
6305 dynamic linking information gathered so far on function code symbol
6306 entries, to their corresponding function descriptor symbol entries. */
deb0e272 6307
b34976b6 6308static bfd_boolean
4ce794b7
AM
6309ppc64_elf_func_desc_adjust (bfd *obfd ATTRIBUTE_UNUSED,
6310 struct bfd_link_info *info)
e86ce104
AM
6311{
6312 struct ppc_link_hash_table *htab;
6313
6314 htab = ppc_hash_table (info);
4dfe6ac6
NC
6315 if (htab == NULL)
6316 return FALSE;
6317
b32547cd
AM
6318 /* Provide any missing _save* and _rest* functions. */
6319 if (htab->sfpr != NULL)
6320 {
6321 unsigned int i;
6322
6323 htab->sfpr->size = 0;
6324 for (i = 0; i < ARRAY_SIZE (save_res_funcs); i++)
6325 if (!sfpr_define (info, &save_res_funcs[i], NULL))
6326 return FALSE;
6327 if (htab->sfpr->size == 0)
6328 htab->sfpr->flags |= SEC_EXCLUDE;
6329 }
6330
6331 if (bfd_link_relocatable (info))
6332 return TRUE;
6333
6334 if (htab->elf.hgot != NULL)
dba6fa9b
AM
6335 {
6336 _bfd_elf_link_hash_hide_symbol (info, htab->elf.hgot, TRUE);
6337 /* Make .TOC. defined so as to prevent it being made dynamic.
6338 The wrong value here is fixed later in ppc64_elf_set_toc. */
43417696
AM
6339 if (!htab->elf.hgot->def_regular
6340 || htab->elf.hgot->root.type != bfd_link_hash_defined)
6341 {
6342 htab->elf.hgot->root.type = bfd_link_hash_defined;
6343 htab->elf.hgot->root.u.def.value = 0;
6344 htab->elf.hgot->root.u.def.section = bfd_abs_section_ptr;
6345 htab->elf.hgot->def_regular = 1;
6346 htab->elf.hgot->root.linker_def = 1;
6347 }
dba6fa9b 6348 htab->elf.hgot->type = STT_OBJECT;
2cdcc330
AM
6349 htab->elf.hgot->other
6350 = (htab->elf.hgot->other & ~ELF_ST_VISIBILITY (-1)) | STV_HIDDEN;
dba6fa9b 6351 }
c66bb0ee 6352
8c5b4e52
AM
6353 if (htab->need_func_desc_adj)
6354 {
6355 elf_link_hash_traverse (&htab->elf, func_desc_adjust, info);
6356 htab->need_func_desc_adj = 0;
6357 }
805fc799 6358
b34976b6 6359 return TRUE;
e86ce104
AM
6360}
6361
98bbb1b8 6362/* Find dynamic relocs for H that apply to read-only sections. */
a345bc8d 6363
98bbb1b8 6364static asection *
a345bc8d
AM
6365readonly_dynrelocs (struct elf_link_hash_entry *h)
6366{
ed7007c1 6367 struct ppc_link_hash_entry *eh = ppc_elf_hash_entry (h);
a345bc8d
AM
6368 struct elf_dyn_relocs *p;
6369
a345bc8d
AM
6370 for (p = eh->dyn_relocs; p != NULL; p = p->next)
6371 {
6372 asection *s = p->sec->output_section;
6373
6374 if (s != NULL && (s->flags & SEC_READONLY) != 0)
98bbb1b8 6375 return p->sec;
a345bc8d 6376 }
98bbb1b8 6377 return NULL;
a345bc8d
AM
6378}
6379
d311bc8b 6380/* Return true if we have dynamic relocs against H or any of its weak
ab2477e1
AM
6381 aliases, that apply to read-only sections. Cannot be used after
6382 size_dynamic_sections. */
d311bc8b
AM
6383
6384static bfd_boolean
6385alias_readonly_dynrelocs (struct elf_link_hash_entry *h)
6386{
ed7007c1 6387 struct ppc_link_hash_entry *eh = ppc_elf_hash_entry (h);
d311bc8b
AM
6388 do
6389 {
6390 if (readonly_dynrelocs (&eh->elf))
6391 return TRUE;
ed7007c1 6392 eh = ppc_elf_hash_entry (eh->elf.u.alias);
2cdcc330
AM
6393 }
6394 while (eh != NULL && &eh->elf != h);
d311bc8b
AM
6395
6396 return FALSE;
6397}
8a2058b5 6398
8a9e8e72
AM
6399/* Return whether EH has pc-relative dynamic relocs. */
6400
6401static bfd_boolean
6402pc_dynrelocs (struct ppc_link_hash_entry *eh)
6403{
6404 struct elf_dyn_relocs *p;
6405
6406 for (p = eh->dyn_relocs; p != NULL; p = p->next)
6407 if (p->pc_count != 0)
6408 return TRUE;
6409 return FALSE;
6410}
6411
8a2058b5
AM
6412/* Return true if a global entry stub will be created for H. Valid
6413 for ELFv2 before plt entries have been allocated. */
6414
6415static bfd_boolean
6416global_entry_stub (struct elf_link_hash_entry *h)
6417{
6418 struct plt_entry *pent;
6419
6420 if (!h->pointer_equality_needed
6421 || h->def_regular)
6422 return FALSE;
6423
6424 for (pent = h->plt.plist; pent != NULL; pent = pent->next)
6425 if (pent->plt.refcount > 0
6426 && pent->addend == 0)
6427 return TRUE;
6428
6429 return FALSE;
6430}
6431
e86ce104
AM
6432/* Adjust a symbol defined by a dynamic object and referenced by a
6433 regular object. The current definition is in some section of the
6434 dynamic object, but we're not including those sections. We have to
6435 change the definition to something the rest of the link can
6436 understand. */
6437
b34976b6 6438static bfd_boolean
4ce794b7
AM
6439ppc64_elf_adjust_dynamic_symbol (struct bfd_link_info *info,
6440 struct elf_link_hash_entry *h)
e86ce104
AM
6441{
6442 struct ppc_link_hash_table *htab;
5474d94f 6443 asection *s, *srel;
e86ce104
AM
6444
6445 htab = ppc_hash_table (info);
4dfe6ac6
NC
6446 if (htab == NULL)
6447 return FALSE;
e86ce104
AM
6448
6449 /* Deal with function syms. */
6450 if (h->type == STT_FUNC
e054468f 6451 || h->type == STT_GNU_IFUNC
f5385ebf 6452 || h->needs_plt)
e86ce104 6453 {
ed7007c1 6454 bfd_boolean local = (ppc_elf_hash_entry (h)->save_res
529fe20e
AM
6455 || SYMBOL_CALLS_LOCAL (info, h)
6456 || UNDEFWEAK_NO_DYNAMIC_RELOC (info, h));
6457 /* Discard dyn_relocs when non-pic if we've decided that a
6458 function symbol is local and not an ifunc. We keep dynamic
6459 relocs for ifuncs when local rather than always emitting a
6460 plt call stub for them and defining the symbol on the call
6461 stub. We can't do that for ELFv1 anyway (a function symbol
6462 is defined on a descriptor, not code) and it can be faster at
6463 run-time due to not needing to bounce through a stub. The
6464 dyn_relocs for ifuncs will be applied even in a static
6465 executable. */
6466 if (!bfd_link_pic (info)
6467 && h->type != STT_GNU_IFUNC
6468 && local)
ed7007c1 6469 ppc_elf_hash_entry (h)->dyn_relocs = NULL;
529fe20e 6470
e86ce104
AM
6471 /* Clear procedure linkage table information for any symbol that
6472 won't need a .plt entry. */
411e1bfb
AM
6473 struct plt_entry *ent;
6474 for (ent = h->plt.plist; ent != NULL; ent = ent->next)
6475 if (ent->plt.refcount > 0)
6476 break;
8387904d 6477 if (ent == NULL
2d7ad24e
AM
6478 || (h->type != STT_GNU_IFUNC
6479 && local
3e04d765 6480 && (htab->can_convert_all_inline_plt
ed7007c1 6481 || (ppc_elf_hash_entry (h)->tls_mask
3e04d765 6482 & (TLS_TLS | PLT_KEEP)) != PLT_KEEP)))
40b8271b 6483 {
411e1bfb 6484 h->plt.plist = NULL;
f5385ebf 6485 h->needs_plt = 0;
d1eca1e4 6486 h->pointer_equality_needed = 0;
40b8271b 6487 }
8a2058b5 6488 else if (abiversion (info->output_bfd) >= 2)
a345bc8d 6489 {
d1eca1e4
AM
6490 /* Taking a function's address in a read/write section
6491 doesn't require us to define the function symbol in the
6492 executable on a global entry stub. A dynamic reloc can
8a2058b5
AM
6493 be used instead. The reason we prefer a few more dynamic
6494 relocs is that calling via a global entry stub costs a
6495 few more instructions, and pointer_equality_needed causes
6496 extra work in ld.so when resolving these symbols. */
529fe20e 6497 if (global_entry_stub (h))
d1eca1e4 6498 {
ab2477e1 6499 if (!readonly_dynrelocs (h))
529fe20e
AM
6500 {
6501 h->pointer_equality_needed = 0;
04383fd1
AM
6502 /* If we haven't seen a branch reloc and the symbol
6503 isn't an ifunc then we don't need a plt entry. */
529fe20e
AM
6504 if (!h->needs_plt)
6505 h->plt.plist = NULL;
6506 }
6507 else if (!bfd_link_pic (info))
6508 /* We are going to be defining the function symbol on the
6509 plt stub, so no dyn_relocs needed when non-pic. */
ed7007c1 6510 ppc_elf_hash_entry (h)->dyn_relocs = NULL;
d1eca1e4
AM
6511 }
6512
3988aed5
AM
6513 /* ELFv2 function symbols can't have copy relocs. */
6514 return TRUE;
6515 }
6516 else if (!h->needs_plt
ab2477e1 6517 && !readonly_dynrelocs (h))
3988aed5 6518 {
04383fd1
AM
6519 /* If we haven't seen a branch reloc and the symbol isn't an
6520 ifunc then we don't need a plt entry. */
3988aed5
AM
6521 h->plt.plist = NULL;
6522 h->pointer_equality_needed = 0;
a345bc8d
AM
6523 return TRUE;
6524 }
5bd4f169 6525 }
bbd7ec4a 6526 else
411e1bfb 6527 h->plt.plist = NULL;
5bd4f169
AM
6528
6529 /* If this is a weak symbol, and there is a real definition, the
6530 processor independent code will have arranged for us to see the
6531 real definition first, and we can just use the same value. */
60d67dc8 6532 if (h->is_weakalias)
5bd4f169 6533 {
60d67dc8
AM
6534 struct elf_link_hash_entry *def = weakdef (h);
6535 BFD_ASSERT (def->root.type == bfd_link_hash_defined);
6536 h->root.u.def.section = def->root.u.def.section;
6537 h->root.u.def.value = def->root.u.def.value;
4a7e5234
AM
6538 if (def->root.u.def.section == htab->elf.sdynbss
6539 || def->root.u.def.section == htab->elf.sdynrelro)
ed7007c1 6540 ppc_elf_hash_entry (h)->dyn_relocs = NULL;
b34976b6 6541 return TRUE;
5bd4f169
AM
6542 }
6543
5bd4f169
AM
6544 /* If we are creating a shared library, we must presume that the
6545 only references to the symbol are via the global offset table.
6546 For such cases we need not do anything here; the relocations will
6547 be handled correctly by relocate_section. */
ec73ddcd 6548 if (!bfd_link_executable (info))
b34976b6 6549 return TRUE;
5bd4f169 6550
65f38f15
AM
6551 /* If there are no references to this symbol that do not use the
6552 GOT, we don't need to generate a copy reloc. */
f5385ebf 6553 if (!h->non_got_ref)
b34976b6 6554 return TRUE;
65f38f15 6555
b186458a 6556 /* Don't generate a copy reloc for symbols defined in the executable. */
d93d1c80 6557 if (!h->def_dynamic || !h->ref_regular || h->def_regular
b186458a 6558
d93d1c80
AM
6559 /* If -z nocopyreloc was given, don't generate them either. */
6560 || info->nocopyreloc
a127494f 6561
dce2246a 6562 /* If we don't find any dynamic relocs in read-only sections, then
d93d1c80 6563 we'll be keeping the dynamic relocs and avoiding the copy reloc. */
1bdd8fac
AM
6564 || (ELIMINATE_COPY_RELOCS
6565 && !h->needs_copy
6566 && !alias_readonly_dynrelocs (h))
65f38f15 6567
d93d1c80
AM
6568 /* Protected variables do not work with .dynbss. The copy in
6569 .dynbss won't be used by the shared library with the protected
6570 definition for the variable. Text relocations are preferable
6571 to an incorrect program. */
6572 || h->protected_def)
529fe20e 6573 return TRUE;
a127494f 6574
e1c6cf61
AM
6575 if (h->type == STT_FUNC
6576 || h->type == STT_GNU_IFUNC)
97b639ba 6577 {
e1c6cf61
AM
6578 /* .dynbss copies of function symbols only work if we have
6579 ELFv1 dot-symbols. ELFv1 compilers since 2004 default to not
6580 use dot-symbols and set the function symbol size to the text
6581 size of the function rather than the size of the descriptor.
6582 That's wrong for copying a descriptor. */
ed7007c1 6583 if (ppc_elf_hash_entry (h)->oh == NULL
e1c6cf61
AM
6584 || !(h->size == 24 || h->size == 16))
6585 return TRUE;
6586
6587 /* We should never get here, but unfortunately there are old
6588 versions of gcc (circa gcc-3.2) that improperly for the
6589 ELFv1 ABI put initialized function pointers, vtable refs and
6590 suchlike in read-only sections. Allow them to proceed, but
6591 warn that this might break at runtime. */
25f53a85 6592 info->callbacks->einfo
c1c8c1ef 6593 (_("%P: copy reloc against `%pT' requires lazy plt linking; "
25f53a85 6594 "avoid setting LD_BIND_NOW=1 or upgrade gcc\n"),
97b639ba
AM
6595 h->root.root.string);
6596 }
5d35169e
AM
6597
6598 /* This is a reference to a symbol defined by a dynamic object which
6599 is not a function. */
6600
5bd4f169
AM
6601 /* We must allocate the symbol in our .dynbss section, which will
6602 become part of the .bss section of the executable. There will be
6603 an entry for this symbol in the .dynsym section. The dynamic
6604 object will contain position independent code, so all references
6605 from the dynamic object to this symbol will go through the global
6606 offset table. The dynamic linker will use the .dynsym entry to
6607 determine the address it must put in the global offset table, so
6608 both the dynamic object and the regular object will refer to the
6609 same memory location for the variable. */
5474d94f
AM
6610 if ((h->root.u.def.section->flags & SEC_READONLY) != 0)
6611 {
6612 s = htab->elf.sdynrelro;
6613 srel = htab->elf.sreldynrelro;
6614 }
6615 else
6616 {
6617 s = htab->elf.sdynbss;
6618 srel = htab->elf.srelbss;
6619 }
1d7e9d18 6620 if ((h->root.u.def.section->flags & SEC_ALLOC) != 0 && h->size != 0)
5bd4f169 6621 {
4a7e5234
AM
6622 /* We must generate a R_PPC64_COPY reloc to tell the dynamic
6623 linker to copy the initial value out of the dynamic object
6624 and into the runtime process image. */
5474d94f 6625 srel->size += sizeof (Elf64_External_Rela);
f5385ebf 6626 h->needs_copy = 1;
5bd4f169
AM
6627 }
6628
529fe20e 6629 /* We no longer want dyn_relocs. */
ed7007c1 6630 ppc_elf_hash_entry (h)->dyn_relocs = NULL;
6cabe1ea 6631 return _bfd_elf_adjust_dynamic_copy (info, h, s);
5bd4f169
AM
6632}
6633
e86ce104
AM
6634/* If given a function descriptor symbol, hide both the function code
6635 sym and the descriptor. */
6636static void
4ce794b7
AM
6637ppc64_elf_hide_symbol (struct bfd_link_info *info,
6638 struct elf_link_hash_entry *h,
6639 bfd_boolean force_local)
e86ce104 6640{
34814b9f 6641 struct ppc_link_hash_entry *eh;
e86ce104
AM
6642 _bfd_elf_link_hash_hide_symbol (info, h, force_local);
6643
87469ba2
AM
6644 if (ppc_hash_table (info) == NULL)
6645 return;
6646
ed7007c1 6647 eh = ppc_elf_hash_entry (h);
34814b9f 6648 if (eh->is_func_descriptor)
e86ce104 6649 {
34814b9f 6650 struct ppc_link_hash_entry *fh = eh->oh;
e86ce104 6651
721956f4 6652 if (fh == NULL)
d1329ca3
AM
6653 {
6654 const char *p, *q;
b8ac2841 6655 struct elf_link_hash_table *htab = elf_hash_table (info);
d1329ca3
AM
6656 char save;
6657
6658 /* We aren't supposed to use alloca in BFD because on
6659 systems which do not have alloca the version in libiberty
6660 calls xmalloc, which might cause the program to crash
6661 when it runs out of memory. This function doesn't have a
6662 return status, so there's no way to gracefully return an
6663 error. So cheat. We know that string[-1] can be safely
34814b9f
AM
6664 accessed; It's either a string in an ELF string table,
6665 or allocated in an objalloc structure. */
d1329ca3 6666
34814b9f 6667 p = eh->elf.root.root.string - 1;
d1329ca3
AM
6668 save = *p;
6669 *(char *) p = '.';
ed7007c1
AM
6670 fh = ppc_elf_hash_entry (elf_link_hash_lookup (htab, p, FALSE,
6671 FALSE, FALSE));
d1329ca3
AM
6672 *(char *) p = save;
6673
6674 /* Unfortunately, if it so happens that the string we were
6675 looking for was allocated immediately before this string,
6676 then we overwrote the string terminator. That's the only
6677 reason the lookup should fail. */
6678 if (fh == NULL)
6679 {
34814b9f
AM
6680 q = eh->elf.root.root.string + strlen (eh->elf.root.root.string);
6681 while (q >= eh->elf.root.root.string && *q == *p)
d1329ca3 6682 --q, --p;
34814b9f 6683 if (q < eh->elf.root.root.string && *p == '.')
ed7007c1
AM
6684 fh = ppc_elf_hash_entry (elf_link_hash_lookup (htab, p, FALSE,
6685 FALSE, FALSE));
d1329ca3
AM
6686 }
6687 if (fh != NULL)
6688 {
34814b9f
AM
6689 eh->oh = fh;
6690 fh->oh = eh;
d1329ca3
AM
6691 }
6692 }
e86ce104 6693 if (fh != NULL)
34814b9f 6694 _bfd_elf_link_hash_hide_symbol (info, &fh->elf, force_local);
e86ce104
AM
6695 }
6696}
6697
411e1bfb 6698static bfd_boolean
8843416a
AM
6699get_sym_h (struct elf_link_hash_entry **hp,
6700 Elf_Internal_Sym **symp,
6701 asection **symsecp,
f961d9dd 6702 unsigned char **tls_maskp,
8843416a
AM
6703 Elf_Internal_Sym **locsymsp,
6704 unsigned long r_symndx,
6705 bfd *ibfd)
411e1bfb 6706{
0ffa91dd 6707 Elf_Internal_Shdr *symtab_hdr = &elf_symtab_hdr (ibfd);
411e1bfb
AM
6708
6709 if (r_symndx >= symtab_hdr->sh_info)
6710 {
6711 struct elf_link_hash_entry **sym_hashes = elf_sym_hashes (ibfd);
6712 struct elf_link_hash_entry *h;
6713
6714 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
b31867b6 6715 h = elf_follow_link (h);
411e1bfb
AM
6716
6717 if (hp != NULL)
6718 *hp = h;
6719
6720 if (symp != NULL)
6721 *symp = NULL;
6722
6723 if (symsecp != NULL)
6724 {
6725 asection *symsec = NULL;
6726 if (h->root.type == bfd_link_hash_defined
6727 || h->root.type == bfd_link_hash_defweak)
6728 symsec = h->root.u.def.section;
6729 *symsecp = symsec;
6730 }
6731
e7b938ca 6732 if (tls_maskp != NULL)
ed7007c1 6733 *tls_maskp = &ppc_elf_hash_entry (h)->tls_mask;
411e1bfb
AM
6734 }
6735 else
6736 {
6737 Elf_Internal_Sym *sym;
6738 Elf_Internal_Sym *locsyms = *locsymsp;
6739
6740 if (locsyms == NULL)
6741 {
6742 locsyms = (Elf_Internal_Sym *) symtab_hdr->contents;
6743 if (locsyms == NULL)
6744 locsyms = bfd_elf_get_elf_syms (ibfd, symtab_hdr,
6745 symtab_hdr->sh_info,
6746 0, NULL, NULL, NULL);
6747 if (locsyms == NULL)
6748 return FALSE;
6749 *locsymsp = locsyms;
6750 }
6751 sym = locsyms + r_symndx;
6752
6753 if (hp != NULL)
6754 *hp = NULL;
6755
6756 if (symp != NULL)
6757 *symp = sym;
6758
6759 if (symsecp != NULL)
cb33740c 6760 *symsecp = bfd_section_from_elf_index (ibfd, sym->st_shndx);
411e1bfb 6761
e7b938ca 6762 if (tls_maskp != NULL)
411e1bfb
AM
6763 {
6764 struct got_entry **lgot_ents;
f961d9dd 6765 unsigned char *tls_mask;
411e1bfb 6766
e7b938ca 6767 tls_mask = NULL;
411e1bfb
AM
6768 lgot_ents = elf_local_got_ents (ibfd);
6769 if (lgot_ents != NULL)
6770 {
e054468f
AM
6771 struct plt_entry **local_plt = (struct plt_entry **)
6772 (lgot_ents + symtab_hdr->sh_info);
f961d9dd 6773 unsigned char *lgot_masks = (unsigned char *)
e054468f 6774 (local_plt + symtab_hdr->sh_info);
e7b938ca 6775 tls_mask = &lgot_masks[r_symndx];
411e1bfb 6776 }
e7b938ca 6777 *tls_maskp = tls_mask;
411e1bfb
AM
6778 }
6779 }
6780 return TRUE;
6781}
6782
e7b938ca 6783/* Returns TLS_MASKP for the given REL symbol. Function return is 0 on
951fd09b 6784 error, 2 on a toc GD type suitable for optimization, 3 on a toc LD
ad8e1ba5 6785 type suitable for optimization, and 1 otherwise. */
951fd09b
AM
6786
6787static int
f961d9dd 6788get_tls_mask (unsigned char **tls_maskp,
3a71aa26
AM
6789 unsigned long *toc_symndx,
6790 bfd_vma *toc_addend,
0d4792f7 6791 Elf_Internal_Sym **locsymsp,
3a71aa26
AM
6792 const Elf_Internal_Rela *rel,
6793 bfd *ibfd)
411e1bfb
AM
6794{
6795 unsigned long r_symndx;
0d4792f7 6796 int next_r;
411e1bfb
AM
6797 struct elf_link_hash_entry *h;
6798 Elf_Internal_Sym *sym;
6799 asection *sec;
6800 bfd_vma off;
6801
6802 r_symndx = ELF64_R_SYM (rel->r_info);
e7b938ca 6803 if (!get_sym_h (&h, &sym, &sec, tls_maskp, locsymsp, r_symndx, ibfd))
951fd09b 6804 return 0;
411e1bfb 6805
37da22e5
AM
6806 if ((*tls_maskp != NULL
6807 && (**tls_maskp & TLS_TLS) != 0
6808 && **tls_maskp != (TLS_TLS | TLS_MARK))
411e1bfb 6809 || sec == NULL
6bee8834 6810 || ppc64_elf_section_data (sec) == NULL
7c8fe5c4 6811 || ppc64_elf_section_data (sec)->sec_type != sec_toc)
951fd09b 6812 return 1;
411e1bfb
AM
6813
6814 /* Look inside a TOC section too. */
6815 if (h != NULL)
6816 {
6817 BFD_ASSERT (h->root.type == bfd_link_hash_defined);
6818 off = h->root.u.def.value;
6819 }
6820 else
6821 off = sym->st_value;
6822 off += rel->r_addend;
6823 BFD_ASSERT (off % 8 == 0);
3a71aa26
AM
6824 r_symndx = ppc64_elf_section_data (sec)->u.toc.symndx[off / 8];
6825 next_r = ppc64_elf_section_data (sec)->u.toc.symndx[off / 8 + 1];
0d4792f7
AM
6826 if (toc_symndx != NULL)
6827 *toc_symndx = r_symndx;
3a71aa26
AM
6828 if (toc_addend != NULL)
6829 *toc_addend = ppc64_elf_section_data (sec)->u.toc.add[off / 8];
6830 if (!get_sym_h (&h, &sym, &sec, tls_maskp, locsymsp, r_symndx, ibfd))
6831 return 0;
854b41e7 6832 if ((h == NULL || is_static_defined (h))
0d4792f7
AM
6833 && (next_r == -1 || next_r == -2))
6834 return 1 - next_r;
951fd09b 6835 return 1;
411e1bfb
AM
6836}
6837
3b421ab3
AM
6838/* Find (or create) an entry in the tocsave hash table. */
6839
6840static struct tocsave_entry *
6841tocsave_find (struct ppc_link_hash_table *htab,
6842 enum insert_option insert,
6843 Elf_Internal_Sym **local_syms,
6844 const Elf_Internal_Rela *irela,
6845 bfd *ibfd)
6846{
6847 unsigned long r_indx;
6848 struct elf_link_hash_entry *h;
6849 Elf_Internal_Sym *sym;
6850 struct tocsave_entry ent, *p;
6851 hashval_t hash;
6852 struct tocsave_entry **slot;
6853
6854 r_indx = ELF64_R_SYM (irela->r_info);
6855 if (!get_sym_h (&h, &sym, &ent.sec, NULL, local_syms, r_indx, ibfd))
6856 return NULL;
6857 if (ent.sec == NULL || ent.sec->output_section == NULL)
6858 {
4eca0228 6859 _bfd_error_handler
871b3ab2 6860 (_("%pB: undefined symbol on R_PPC64_TOCSAVE relocation"), ibfd);
3b421ab3
AM
6861 return NULL;
6862 }
6863
6864 if (h != NULL)
6865 ent.offset = h->root.u.def.value;
6866 else
6867 ent.offset = sym->st_value;
6868 ent.offset += irela->r_addend;
6869
6870 hash = tocsave_htab_hash (&ent);
6871 slot = ((struct tocsave_entry **)
6872 htab_find_slot_with_hash (htab->tocsave_htab, &ent, hash, insert));
6873 if (slot == NULL)
6874 return NULL;
6875
6876 if (*slot == NULL)
6877 {
6878 p = (struct tocsave_entry *) bfd_alloc (ibfd, sizeof (*p));
6879 if (p == NULL)
6880 return NULL;
6881 *p = ent;
6882 *slot = p;
6883 }
6884 return *slot;
6885}
6886
754021d0 6887/* Adjust all global syms defined in opd sections. In gcc generated
8387904d 6888 code for the old ABI, these will already have been done. */
754021d0
AM
6889
6890static bfd_boolean
6891adjust_opd_syms (struct elf_link_hash_entry *h, void *inf ATTRIBUTE_UNUSED)
6892{
6893 struct ppc_link_hash_entry *eh;
6894 asection *sym_sec;
74f0fb50 6895 struct _opd_sec_data *opd;
754021d0
AM
6896
6897 if (h->root.type == bfd_link_hash_indirect)
6898 return TRUE;
6899
754021d0
AM
6900 if (h->root.type != bfd_link_hash_defined
6901 && h->root.type != bfd_link_hash_defweak)
6902 return TRUE;
6903
ed7007c1 6904 eh = ppc_elf_hash_entry (h);
754021d0
AM
6905 if (eh->adjust_done)
6906 return TRUE;
6907
6908 sym_sec = eh->elf.root.u.def.section;
74f0fb50
AM
6909 opd = get_opd_info (sym_sec);
6910 if (opd != NULL && opd->adjust != NULL)
754021d0 6911 {
51aecdc5 6912 long adjust = opd->adjust[OPD_NDX (eh->elf.root.u.def.value)];
4025353c
AM
6913 if (adjust == -1)
6914 {
6915 /* This entry has been deleted. */
b3fac117 6916 asection *dsec = ppc64_elf_tdata (sym_sec->owner)->deleted_section;
81688140
AM
6917 if (dsec == NULL)
6918 {
6919 for (dsec = sym_sec->owner->sections; dsec; dsec = dsec->next)
dbaa2011 6920 if (discarded_section (dsec))
81688140 6921 {
b3fac117 6922 ppc64_elf_tdata (sym_sec->owner)->deleted_section = dsec;
81688140
AM
6923 break;
6924 }
6925 }
4025353c 6926 eh->elf.root.u.def.value = 0;
81688140 6927 eh->elf.root.u.def.section = dsec;
4025353c
AM
6928 }
6929 else
6930 eh->elf.root.u.def.value += adjust;
754021d0
AM
6931 eh->adjust_done = 1;
6932 }
6933 return TRUE;
6934}
6935
8c1d1bb8 6936/* Handles decrementing dynamic reloc counts for the reloc specified by
19e08130 6937 R_INFO in section SEC. If LOCAL_SYMS is NULL, then H and SYM
8c1d1bb8
AM
6938 have already been determined. */
6939
6940static bfd_boolean
6941dec_dynrel_count (bfd_vma r_info,
6942 asection *sec,
6943 struct bfd_link_info *info,
6944 Elf_Internal_Sym **local_syms,
6945 struct elf_link_hash_entry *h,
19e08130 6946 Elf_Internal_Sym *sym)
8c1d1bb8
AM
6947{
6948 enum elf_ppc64_reloc_type r_type;
19e08130 6949 asection *sym_sec = NULL;
8c1d1bb8
AM
6950
6951 /* Can this reloc be dynamic? This switch, and later tests here
6952 should be kept in sync with the code in check_relocs. */
6953 r_type = ELF64_R_TYPE (r_info);
6954 switch (r_type)
6955 {
6956 default:
6957 return TRUE;
6958
1bdd8fac
AM
6959 case R_PPC64_TOC16:
6960 case R_PPC64_TOC16_DS:
6961 case R_PPC64_TOC16_LO:
6962 case R_PPC64_TOC16_HI:
6963 case R_PPC64_TOC16_HA:
6964 case R_PPC64_TOC16_LO_DS:
6965 if (h == NULL)
6966 return TRUE;
6967 break;
6968
8c1d1bb8
AM
6969 case R_PPC64_TPREL16:
6970 case R_PPC64_TPREL16_LO:
6971 case R_PPC64_TPREL16_HI:
6972 case R_PPC64_TPREL16_HA:
6973 case R_PPC64_TPREL16_DS:
6974 case R_PPC64_TPREL16_LO_DS:
f9c6b907
AM
6975 case R_PPC64_TPREL16_HIGH:
6976 case R_PPC64_TPREL16_HIGHA:
8c1d1bb8
AM
6977 case R_PPC64_TPREL16_HIGHER:
6978 case R_PPC64_TPREL16_HIGHERA:
6979 case R_PPC64_TPREL16_HIGHEST:
6980 case R_PPC64_TPREL16_HIGHESTA:
8c1d1bb8 6981 case R_PPC64_TPREL64:
c213164a 6982 case R_PPC64_TPREL34:
8c1d1bb8
AM
6983 case R_PPC64_DTPMOD64:
6984 case R_PPC64_DTPREL64:
6985 case R_PPC64_ADDR64:
6986 case R_PPC64_REL30:
6987 case R_PPC64_REL32:
6988 case R_PPC64_REL64:
6989 case R_PPC64_ADDR14:
6990 case R_PPC64_ADDR14_BRNTAKEN:
6991 case R_PPC64_ADDR14_BRTAKEN:
6992 case R_PPC64_ADDR16:
6993 case R_PPC64_ADDR16_DS:
6994 case R_PPC64_ADDR16_HA:
6995 case R_PPC64_ADDR16_HI:
f9c6b907
AM
6996 case R_PPC64_ADDR16_HIGH:
6997 case R_PPC64_ADDR16_HIGHA:
8c1d1bb8
AM
6998 case R_PPC64_ADDR16_HIGHER:
6999 case R_PPC64_ADDR16_HIGHERA:
7000 case R_PPC64_ADDR16_HIGHEST:
7001 case R_PPC64_ADDR16_HIGHESTA:
7002 case R_PPC64_ADDR16_LO:
7003 case R_PPC64_ADDR16_LO_DS:
7004 case R_PPC64_ADDR24:
7005 case R_PPC64_ADDR32:
7006 case R_PPC64_UADDR16:
7007 case R_PPC64_UADDR32:
7008 case R_PPC64_UADDR64:
7009 case R_PPC64_TOC:
5663e321
AM
7010 case R_PPC64_D34:
7011 case R_PPC64_D34_LO:
7012 case R_PPC64_D34_HI30:
7013 case R_PPC64_D34_HA30:
7014 case R_PPC64_ADDR16_HIGHER34:
7015 case R_PPC64_ADDR16_HIGHERA34:
7016 case R_PPC64_ADDR16_HIGHEST34:
7017 case R_PPC64_ADDR16_HIGHESTA34:
7018 case R_PPC64_D28:
8c1d1bb8
AM
7019 break;
7020 }
7021
7022 if (local_syms != NULL)
7023 {
7024 unsigned long r_symndx;
8c1d1bb8
AM
7025 bfd *ibfd = sec->owner;
7026
7027 r_symndx = ELF64_R_SYM (r_info);
7028 if (!get_sym_h (&h, &sym, &sym_sec, NULL, local_syms, r_symndx, ibfd))
7029 return FALSE;
7030 }
7031
ec73ddcd
AM
7032 if ((h != NULL
7033 && (h->root.type == bfd_link_hash_defweak
7034 || !h->def_regular))
7035 || (h != NULL
7036 && !bfd_link_executable (info)
7037 && !SYMBOLIC_BIND (info, h))
7038 || (bfd_link_pic (info)
7039 && must_be_dyn_reloc (info, r_type))
7040 || (!bfd_link_pic (info)
7041 && (h != NULL
7042 ? h->type == STT_GNU_IFUNC
7043 : ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC)))
8c1d1bb8
AM
7044 ;
7045 else
7046 return TRUE;
7047
7048 if (h != NULL)
6edfbbad 7049 {
19e08130
AM
7050 struct elf_dyn_relocs *p;
7051 struct elf_dyn_relocs **pp;
ed7007c1 7052 pp = &ppc_elf_hash_entry (h)->dyn_relocs;
19e08130
AM
7053
7054 /* elf_gc_sweep may have already removed all dyn relocs associated
7055 with local syms for a given section. Also, symbol flags are
7056 changed by elf_gc_sweep_symbol, confusing the test above. Don't
7057 report a dynreloc miscount. */
7058 if (*pp == NULL && info->gc_sections)
7059 return TRUE;
7060
7061 while ((p = *pp) != NULL)
60124e18 7062 {
19e08130
AM
7063 if (p->sec == sec)
7064 {
7065 if (!must_be_dyn_reloc (info, r_type))
7066 p->pc_count -= 1;
7067 p->count -= 1;
7068 if (p->count == 0)
7069 *pp = p->next;
7070 return TRUE;
7071 }
7072 pp = &p->next;
60124e18 7073 }
6edfbbad 7074 }
19e08130
AM
7075 else
7076 {
7077 struct ppc_dyn_relocs *p;
7078 struct ppc_dyn_relocs **pp;
7079 void *vpp;
7080 bfd_boolean is_ifunc;
8c1d1bb8 7081
19e08130
AM
7082 if (local_syms == NULL)
7083 sym_sec = bfd_section_from_elf_index (sec->owner, sym->st_shndx);
7084 if (sym_sec == NULL)
7085 sym_sec = sec;
c57da1a7 7086
19e08130
AM
7087 vpp = &elf_section_data (sym_sec)->local_dynrel;
7088 pp = (struct ppc_dyn_relocs **) vpp;
7089
7090 if (*pp == NULL && info->gc_sections)
7091 return TRUE;
7092
7093 is_ifunc = ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC;
7094 while ((p = *pp) != NULL)
8c1d1bb8 7095 {
19e08130
AM
7096 if (p->sec == sec && p->ifunc == is_ifunc)
7097 {
7098 p->count -= 1;
7099 if (p->count == 0)
7100 *pp = p->next;
7101 return TRUE;
7102 }
7103 pp = &p->next;
8c1d1bb8 7104 }
8c1d1bb8
AM
7105 }
7106
695344c0 7107 /* xgettext:c-format */
cf97bcb0
AM
7108 _bfd_error_handler (_("dynreloc miscount for %pB, section %pA"),
7109 sec->owner, sec);
8c1d1bb8
AM
7110 bfd_set_error (bfd_error_bad_value);
7111 return FALSE;
7112}
7113
754021d0
AM
7114/* Remove unused Official Procedure Descriptor entries. Currently we
7115 only remove those associated with functions in discarded link-once
7116 sections, or weakly defined functions that have been overridden. It
7117 would be possible to remove many more entries for statically linked
7118 applications. */
7119
b34976b6 7120bfd_boolean
e7d1c40c 7121ppc64_elf_edit_opd (struct bfd_link_info *info)
1e2f5b6e
AM
7122{
7123 bfd *ibfd;
754021d0 7124 bfd_boolean some_edited = FALSE;
3f764659 7125 asection *need_pad = NULL;
e7d1c40c
AM
7126 struct ppc_link_hash_table *htab;
7127
7128 htab = ppc_hash_table (info);
7129 if (htab == NULL)
7130 return FALSE;
1e2f5b6e 7131
c72f2fb2 7132 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
1e2f5b6e
AM
7133 {
7134 asection *sec;
7135 Elf_Internal_Rela *relstart, *rel, *relend;
7136 Elf_Internal_Shdr *symtab_hdr;
6cdc0ccc 7137 Elf_Internal_Sym *local_syms;
74f0fb50 7138 struct _opd_sec_data *opd;
51aecdc5 7139 bfd_boolean need_edit, add_aux_fields, broken;
3f764659 7140 bfd_size_type cnt_16b = 0;
1e2f5b6e 7141
854b41e7
AM
7142 if (!is_ppc64_elf (ibfd))
7143 continue;
7144
1e2f5b6e 7145 sec = bfd_get_section_by_name (ibfd, ".opd");
46de2a7c 7146 if (sec == NULL || sec->size == 0)
1e2f5b6e
AM
7147 continue;
7148
dbaa2011 7149 if (sec->sec_info_type == SEC_INFO_TYPE_JUST_SYMS)
4b85d634
AM
7150 continue;
7151
1e2f5b6e
AM
7152 if (sec->output_section == bfd_abs_section_ptr)
7153 continue;
7154
7155 /* Look through the section relocs. */
7156 if ((sec->flags & SEC_RELOC) == 0 || sec->reloc_count == 0)
7157 continue;
7158
6cdc0ccc 7159 local_syms = NULL;
0ffa91dd 7160 symtab_hdr = &elf_symtab_hdr (ibfd);
1e2f5b6e
AM
7161
7162 /* Read the relocations. */
4ce794b7 7163 relstart = _bfd_elf_link_read_relocs (ibfd, sec, NULL, NULL,
45d6a902 7164 info->keep_memory);
1e2f5b6e 7165 if (relstart == NULL)
b34976b6 7166 return FALSE;
1e2f5b6e
AM
7167
7168 /* First run through the relocs to check they are sane, and to
7169 determine whether we need to edit this opd section. */
b34976b6 7170 need_edit = FALSE;
51aecdc5 7171 broken = FALSE;
3f764659 7172 need_pad = sec;
1e2f5b6e 7173 relend = relstart + sec->reloc_count;
50bc7936 7174 for (rel = relstart; rel < relend; )
1e2f5b6e 7175 {
04c9666a 7176 enum elf_ppc64_reloc_type r_type;
1e2f5b6e
AM
7177 unsigned long r_symndx;
7178 asection *sym_sec;
7179 struct elf_link_hash_entry *h;
7180 Elf_Internal_Sym *sym;
51aecdc5 7181 bfd_vma offset;
1e2f5b6e 7182
51aecdc5 7183 /* .opd contains an array of 16 or 24 byte entries. We're
1e2f5b6e
AM
7184 only interested in the reloc pointing to a function entry
7185 point. */
51aecdc5
AM
7186 offset = rel->r_offset;
7187 if (rel + 1 == relend
7188 || rel[1].r_offset != offset + 8)
1e2f5b6e
AM
7189 {
7190 /* If someone messes with .opd alignment then after a
7191 "ld -r" we might have padding in the middle of .opd.
7192 Also, there's nothing to prevent someone putting
7193 something silly in .opd with the assembler. No .opd
b34976b6 7194 optimization for them! */
3f764659 7195 broken_opd:
4eca0228 7196 _bfd_error_handler
871b3ab2 7197 (_("%pB: .opd is not a regular array of opd entries"), ibfd);
51aecdc5 7198 broken = TRUE;
1e2f5b6e
AM
7199 break;
7200 }
7201
50bc7936
AM
7202 if ((r_type = ELF64_R_TYPE (rel->r_info)) != R_PPC64_ADDR64
7203 || (r_type = ELF64_R_TYPE ((rel + 1)->r_info)) != R_PPC64_TOC)
7204 {
4eca0228 7205 _bfd_error_handler
695344c0 7206 /* xgettext:c-format */
871b3ab2 7207 (_("%pB: unexpected reloc type %u in .opd section"),
d003868e 7208 ibfd, r_type);
51aecdc5 7209 broken = TRUE;
50bc7936
AM
7210 break;
7211 }
7212
1e2f5b6e 7213 r_symndx = ELF64_R_SYM (rel->r_info);
411e1bfb
AM
7214 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms,
7215 r_symndx, ibfd))
50bc7936 7216 goto error_ret;
1e2f5b6e
AM
7217
7218 if (sym_sec == NULL || sym_sec->owner == NULL)
7219 {
411e1bfb
AM
7220 const char *sym_name;
7221 if (h != NULL)
7222 sym_name = h->root.root.string;
7223 else
26c61ae5
L
7224 sym_name = bfd_elf_sym_name (ibfd, symtab_hdr, sym,
7225 sym_sec);
411e1bfb 7226
4eca0228 7227 _bfd_error_handler
695344c0 7228 /* xgettext:c-format */
871b3ab2 7229 (_("%pB: undefined sym `%s' in .opd section"),
d003868e 7230 ibfd, sym_name);
51aecdc5 7231 broken = TRUE;
1e2f5b6e
AM
7232 break;
7233 }
7234
51020317
AM
7235 /* opd entries are always for functions defined in the
7236 current input bfd. If the symbol isn't defined in the
7237 input bfd, then we won't be using the function in this
7238 bfd; It must be defined in a linkonce section in another
7239 bfd, or is weak. It's also possible that we are
7240 discarding the function due to a linker script /DISCARD/,
7241 which we test for via the output_section. */
7242 if (sym_sec->owner != ibfd
7243 || sym_sec->output_section == bfd_abs_section_ptr)
b34976b6 7244 need_edit = TRUE;
1e2f5b6e 7245
50bc7936 7246 rel += 2;
51aecdc5
AM
7247 if (rel + 1 == relend
7248 || (rel + 2 < relend
7249 && ELF64_R_TYPE (rel[2].r_info) == R_PPC64_TOC))
7250 ++rel;
7251
7252 if (rel == relend)
3f764659
JJ
7253 {
7254 if (sec->size == offset + 24)
7255 {
7256 need_pad = NULL;
7257 break;
7258 }
51aecdc5 7259 if (sec->size == offset + 16)
3f764659
JJ
7260 {
7261 cnt_16b++;
7262 break;
7263 }
7264 goto broken_opd;
7265 }
3f764659
JJ
7266 else if (rel + 1 < relend
7267 && ELF64_R_TYPE (rel[0].r_info) == R_PPC64_ADDR64
7268 && ELF64_R_TYPE (rel[1].r_info) == R_PPC64_TOC)
7269 {
51aecdc5
AM
7270 if (rel[0].r_offset == offset + 16)
7271 cnt_16b++;
7272 else if (rel[0].r_offset != offset + 24)
7273 goto broken_opd;
3f764659
JJ
7274 }
7275 else
7276 goto broken_opd;
1e2f5b6e
AM
7277 }
7278
e7d1c40c 7279 add_aux_fields = htab->params->non_overlapping_opd && cnt_16b > 0;
3f764659 7280
51aecdc5 7281 if (!broken && (need_edit || add_aux_fields))
1e2f5b6e
AM
7282 {
7283 Elf_Internal_Rela *write_rel;
d4730f92 7284 Elf_Internal_Shdr *rel_hdr;
1e2f5b6e 7285 bfd_byte *rptr, *wptr;
983bddc8 7286 bfd_byte *new_contents;
74f0fb50
AM
7287 bfd_size_type amt;
7288
983bddc8 7289 new_contents = NULL;
51aecdc5 7290 amt = OPD_NDX (sec->size) * sizeof (long);
74f0fb50 7291 opd = &ppc64_elf_section_data (sec)->u.opd;
33c0ec9d 7292 opd->adjust = bfd_zalloc (sec->owner, amt);
74f0fb50
AM
7293 if (opd->adjust == NULL)
7294 return FALSE;
1e2f5b6e
AM
7295
7296 /* This seems a waste of time as input .opd sections are all
7297 zeros as generated by gcc, but I suppose there's no reason
7298 this will always be so. We might start putting something in
7299 the third word of .opd entries. */
7300 if ((sec->flags & SEC_IN_MEMORY) == 0)
7301 {
eea6121a
AM
7302 bfd_byte *loc;
7303 if (!bfd_malloc_and_get_section (ibfd, sec, &loc))
6cdc0ccc 7304 {
c9594989 7305 free (loc);
50bc7936 7306 error_ret:
c9594989 7307 if (symtab_hdr->contents != (unsigned char *) local_syms)
6cdc0ccc 7308 free (local_syms);
6cdc0ccc
AM
7309 if (elf_section_data (sec)->relocs != relstart)
7310 free (relstart);
b34976b6 7311 return FALSE;
6cdc0ccc 7312 }
1e2f5b6e
AM
7313 sec->contents = loc;
7314 sec->flags |= (SEC_IN_MEMORY | SEC_HAS_CONTENTS);
7315 }
7316
7317 elf_section_data (sec)->relocs = relstart;
7318
3f764659 7319 new_contents = sec->contents;
3f764659
JJ
7320 if (add_aux_fields)
7321 {
7322 new_contents = bfd_malloc (sec->size + cnt_16b * 8);
7323 if (new_contents == NULL)
7324 return FALSE;
51aecdc5 7325 need_pad = NULL;
3f764659 7326 }
b4f4e59f
AM
7327 wptr = new_contents;
7328 rptr = sec->contents;
1e2f5b6e 7329 write_rel = relstart;
51aecdc5 7330 for (rel = relstart; rel < relend; )
1e2f5b6e 7331 {
50bc7936
AM
7332 unsigned long r_symndx;
7333 asection *sym_sec;
7334 struct elf_link_hash_entry *h;
51aecdc5 7335 struct ppc_link_hash_entry *fdh = NULL;
50bc7936 7336 Elf_Internal_Sym *sym;
51aecdc5
AM
7337 long opd_ent_size;
7338 Elf_Internal_Rela *next_rel;
7339 bfd_boolean skip;
50bc7936
AM
7340
7341 r_symndx = ELF64_R_SYM (rel->r_info);
7342 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms,
d37c89e5 7343 r_symndx, ibfd))
50bc7936
AM
7344 goto error_ret;
7345
51aecdc5
AM
7346 next_rel = rel + 2;
7347 if (next_rel + 1 == relend
7348 || (next_rel + 2 < relend
7349 && ELF64_R_TYPE (next_rel[2].r_info) == R_PPC64_TOC))
7350 ++next_rel;
7351
7352 /* See if the .opd entry is full 24 byte or
7353 16 byte (with fd_aux entry overlapped with next
7354 fd_func). */
7355 opd_ent_size = 24;
7356 if (next_rel == relend)
1e2f5b6e 7357 {
51aecdc5 7358 if (sec->size == rel->r_offset + 16)
3f764659 7359 opd_ent_size = 16;
51aecdc5
AM
7360 }
7361 else if (next_rel->r_offset == rel->r_offset + 16)
7362 opd_ent_size = 16;
3f764659 7363
51aecdc5
AM
7364 if (h != NULL
7365 && h->root.root.string[0] == '.')
7366 {
ed7007c1 7367 fdh = ppc_elf_hash_entry (h)->oh;
8c5b4e52
AM
7368 if (fdh != NULL)
7369 {
7370 fdh = ppc_follow_link (fdh);
7371 if (fdh->elf.root.type != bfd_link_hash_defined
7372 && fdh->elf.root.type != bfd_link_hash_defweak)
7373 fdh = NULL;
7374 }
51aecdc5 7375 }
1e2f5b6e 7376
51aecdc5
AM
7377 skip = (sym_sec->owner != ibfd
7378 || sym_sec->output_section == bfd_abs_section_ptr);
7379 if (skip)
7380 {
7381 if (fdh != NULL && sym_sec->owner == ibfd)
a4aa0fb7 7382 {
51aecdc5
AM
7383 /* Arrange for the function descriptor sym
7384 to be dropped. */
7385 fdh->elf.root.u.def.value = 0;
7386 fdh->elf.root.u.def.section = sym_sec;
a4aa0fb7 7387 }
51aecdc5 7388 opd->adjust[OPD_NDX (rel->r_offset)] = -1;
1e2f5b6e 7389
0e1862bb 7390 if (NO_OPD_RELOCS || bfd_link_relocatable (info))
51aecdc5
AM
7391 rel = next_rel;
7392 else
7393 while (1)
7394 {
7395 if (!dec_dynrel_count (rel->r_info, sec, info,
7396 NULL, h, sym))
7397 goto error_ret;
754021d0 7398
51aecdc5
AM
7399 if (++rel == next_rel)
7400 break;
1e2f5b6e 7401
51aecdc5
AM
7402 r_symndx = ELF64_R_SYM (rel->r_info);
7403 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms,
7404 r_symndx, ibfd))
7405 goto error_ret;
7406 }
50bc7936
AM
7407 }
7408 else
1e2f5b6e 7409 {
51aecdc5
AM
7410 /* We'll be keeping this opd entry. */
7411 long adjust;
7412
7413 if (fdh != NULL)
7414 {
7415 /* Redefine the function descriptor symbol to
7416 this location in the opd section. It is
7417 necessary to update the value here rather
7418 than using an array of adjustments as we do
7419 for local symbols, because various places
7420 in the generic ELF code use the value
7421 stored in u.def.value. */
7422 fdh->elf.root.u.def.value = wptr - new_contents;
7423 fdh->adjust_done = 1;
7424 }
7425
7426 /* Local syms are a bit tricky. We could
7427 tweak them as they can be cached, but
7428 we'd need to look through the local syms
7429 for the function descriptor sym which we
7430 don't have at the moment. So keep an
7431 array of adjustments. */
7432 adjust = (wptr - new_contents) - (rptr - sec->contents);
7433 opd->adjust[OPD_NDX (rel->r_offset)] = adjust;
7434
7435 if (wptr != rptr)
7436 memcpy (wptr, rptr, opd_ent_size);
7437 wptr += opd_ent_size;
7438 if (add_aux_fields && opd_ent_size == 16)
7439 {
7440 memset (wptr, '\0', 8);
7441 wptr += 8;
7442 }
7443
50bc7936 7444 /* We need to adjust any reloc offsets to point to the
51aecdc5
AM
7445 new opd entries. */
7446 for ( ; rel != next_rel; ++rel)
7447 {
7448 rel->r_offset += adjust;
7449 if (write_rel != rel)
7450 memcpy (write_rel, rel, sizeof (*rel));
7451 ++write_rel;
7452 }
1e2f5b6e 7453 }
51aecdc5
AM
7454
7455 rptr += opd_ent_size;
1e2f5b6e
AM
7456 }
7457
3f764659 7458 sec->size = wptr - new_contents;
1e2f5b6e 7459 sec->reloc_count = write_rel - relstart;
3f764659
JJ
7460 if (add_aux_fields)
7461 {
7462 free (sec->contents);
7463 sec->contents = new_contents;
7464 }
7465
05bf9422 7466 /* Fudge the header size too, as this is used later in
cdcf6e38 7467 elf_bfd_final_link if we are emitting relocs. */
d4730f92
BS
7468 rel_hdr = _bfd_elf_single_rel_hdr (sec);
7469 rel_hdr->sh_size = sec->reloc_count * rel_hdr->sh_entsize;
754021d0 7470 some_edited = TRUE;
1e2f5b6e 7471 }
6cdc0ccc 7472 else if (elf_section_data (sec)->relocs != relstart)
1e2f5b6e 7473 free (relstart);
6cdc0ccc 7474
411e1bfb
AM
7475 if (local_syms != NULL
7476 && symtab_hdr->contents != (unsigned char *) local_syms)
7477 {
7478 if (!info->keep_memory)
7479 free (local_syms);
7480 else
7481 symtab_hdr->contents = (unsigned char *) local_syms;
7482 }
7483 }
7484
754021d0
AM
7485 if (some_edited)
7486 elf_link_hash_traverse (elf_hash_table (info), adjust_opd_syms, NULL);
7487
3f764659
JJ
7488 /* If we are doing a final link and the last .opd entry is just 16 byte
7489 long, add a 8 byte padding after it. */
0e1862bb 7490 if (need_pad != NULL && !bfd_link_relocatable (info))
3f764659
JJ
7491 {
7492 bfd_byte *p;
7493
7494 if ((need_pad->flags & SEC_IN_MEMORY) == 0)
7495 {
7496 BFD_ASSERT (need_pad->size > 0);
7497
7498 p = bfd_malloc (need_pad->size + 8);
7499 if (p == NULL)
7500 return FALSE;
699733f6 7501
2cdcc330
AM
7502 if (!bfd_get_section_contents (need_pad->owner, need_pad,
7503 p, 0, need_pad->size))
3f764659
JJ
7504 return FALSE;
7505
7506 need_pad->contents = p;
7507 need_pad->flags |= (SEC_IN_MEMORY | SEC_HAS_CONTENTS);
7508 }
7509 else
7510 {
7511 p = bfd_realloc (need_pad->contents, need_pad->size + 8);
7512 if (p == NULL)
7513 return FALSE;
7514
7515 need_pad->contents = p;
7516 }
7517
7518 memset (need_pad->contents + need_pad->size, 0, 8);
7519 need_pad->size += 8;
7520 }
7521
411e1bfb
AM
7522 return TRUE;
7523}
7524
3e04d765
AM
7525/* Analyze inline PLT call relocations to see whether calls to locally
7526 defined functions can be converted to direct calls. */
7527
7528bfd_boolean
7529ppc64_elf_inline_plt (struct bfd_link_info *info)
7530{
7531 struct ppc_link_hash_table *htab;
7532 bfd *ibfd;
7533 asection *sec;
7534 bfd_vma low_vma, high_vma, limit;
7535
7536 htab = ppc_hash_table (info);
7537 if (htab == NULL)
7538 return FALSE;
7539
7540 /* A bl insn can reach -0x2000000 to 0x1fffffc. The limit is
7541 reduced somewhat to cater for possible stubs that might be added
7542 between the call and its destination. */
7543 if (htab->params->group_size < 0)
7544 {
7545 limit = -htab->params->group_size;
7546 if (limit == 1)
7547 limit = 0x1e00000;
7548 }
7549 else
7550 {
7551 limit = htab->params->group_size;
7552 if (limit == 1)
7553 limit = 0x1c00000;
7554 }
7555
7556 low_vma = -1;
7557 high_vma = 0;
7558 for (sec = info->output_bfd->sections; sec != NULL; sec = sec->next)
7559 if ((sec->flags & (SEC_ALLOC | SEC_CODE)) == (SEC_ALLOC | SEC_CODE))
7560 {
7561 if (low_vma > sec->vma)
7562 low_vma = sec->vma;
7563 if (high_vma < sec->vma + sec->size)
7564 high_vma = sec->vma + sec->size;
7565 }
7566
7567 /* If a "bl" can reach anywhere in local code sections, then we can
7568 convert all inline PLT sequences to direct calls when the symbol
7569 is local. */
7570 if (high_vma - low_vma < limit)
7571 {
7572 htab->can_convert_all_inline_plt = 1;
7573 return TRUE;
7574 }
7575
7576 /* Otherwise, go looking through relocs for cases where a direct
7577 call won't reach. Mark the symbol on any such reloc to disable
7578 the optimization and keep the PLT entry as it seems likely that
7579 this will be better than creating trampolines. Note that this
7580 will disable the optimization for all inline PLT calls to a
7581 particular symbol, not just those that won't reach. The
7582 difficulty in doing a more precise optimization is that the
7583 linker needs to make a decision depending on whether a
7584 particular R_PPC64_PLTCALL insn can be turned into a direct
7585 call, for each of the R_PPC64_PLTSEQ and R_PPC64_PLT16* insns in
7586 the sequence, and there is nothing that ties those relocs
7587 together except their symbol. */
7588
7589 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
7590 {
7591 Elf_Internal_Shdr *symtab_hdr;
7592 Elf_Internal_Sym *local_syms;
7593
7594 if (!is_ppc64_elf (ibfd))
7595 continue;
7596
7597 local_syms = NULL;
7598 symtab_hdr = &elf_symtab_hdr (ibfd);
7599
7600 for (sec = ibfd->sections; sec != NULL; sec = sec->next)
7601 if (ppc64_elf_section_data (sec)->has_pltcall
7602 && !bfd_is_abs_section (sec->output_section))
7603 {
7604 Elf_Internal_Rela *relstart, *rel, *relend;
7605
7606 /* Read the relocations. */
7607 relstart = _bfd_elf_link_read_relocs (ibfd, sec, NULL, NULL,
7608 info->keep_memory);
7609 if (relstart == NULL)
7610 return FALSE;
7611
7612 relend = relstart + sec->reloc_count;
435edf0b 7613 for (rel = relstart; rel < relend; rel++)
3e04d765
AM
7614 {
7615 enum elf_ppc64_reloc_type r_type;
7616 unsigned long r_symndx;
7617 asection *sym_sec;
7618 struct elf_link_hash_entry *h;
7619 Elf_Internal_Sym *sym;
7620 unsigned char *tls_maskp;
7621
7622 r_type = ELF64_R_TYPE (rel->r_info);
5663e321
AM
7623 if (r_type != R_PPC64_PLTCALL
7624 && r_type != R_PPC64_PLTCALL_NOTOC)
3e04d765
AM
7625 continue;
7626
7627 r_symndx = ELF64_R_SYM (rel->r_info);
7628 if (!get_sym_h (&h, &sym, &sym_sec, &tls_maskp, &local_syms,
7629 r_symndx, ibfd))
7630 {
7631 if (elf_section_data (sec)->relocs != relstart)
7632 free (relstart);
c9594989 7633 if (symtab_hdr->contents != (bfd_byte *) local_syms)
3e04d765
AM
7634 free (local_syms);
7635 return FALSE;
7636 }
7637
7638 if (sym_sec != NULL && sym_sec->output_section != NULL)
7639 {
7640 bfd_vma from, to;
7641 if (h != NULL)
7642 to = h->root.u.def.value;
7643 else
7644 to = sym->st_value;
7645 to += (rel->r_addend
7646 + sym_sec->output_offset
7647 + sym_sec->output_section->vma);
7648 from = (rel->r_offset
7649 + sec->output_offset
7650 + sec->output_section->vma);
5663e321
AM
7651 if (to - from + limit < 2 * limit
7652 && !(r_type == R_PPC64_PLTCALL_NOTOC
7653 && (((h ? h->other : sym->st_other)
7654 & STO_PPC64_LOCAL_MASK)
4a4e7361 7655 > 1 << STO_PPC64_LOCAL_BIT)))
3e04d765
AM
7656 *tls_maskp &= ~PLT_KEEP;
7657 }
7658 }
7659 if (elf_section_data (sec)->relocs != relstart)
7660 free (relstart);
7661 }
7662
7663 if (local_syms != NULL
7664 && symtab_hdr->contents != (unsigned char *) local_syms)
7665 {
7666 if (!info->keep_memory)
7667 free (local_syms);
7668 else
7669 symtab_hdr->contents = (unsigned char *) local_syms;
7670 }
7671 }
7672
7673 return TRUE;
7674}
7675
e1918d23 7676/* Set htab->tls_get_addr and call the generic ELF tls_setup function. */
411e1bfb 7677
e1918d23 7678asection *
e7d1c40c 7679ppc64_elf_tls_setup (struct bfd_link_info *info)
411e1bfb 7680{
411e1bfb 7681 struct ppc_link_hash_table *htab;
9e7028aa 7682 struct elf_link_hash_entry *tga, *tga_fd, *desc, *desc_fd;
411e1bfb 7683
411e1bfb 7684 htab = ppc_hash_table (info);
4dfe6ac6
NC
7685 if (htab == NULL)
7686 return NULL;
7687
ee67d69a
AM
7688 if (abiversion (info->output_bfd) == 1)
7689 htab->opd_abi = 1;
7690
e7d1c40c 7691 if (htab->params->no_multi_toc)
33c0ec9d
AM
7692 htab->do_multi_toc = 0;
7693 else if (!htab->do_multi_toc)
e7d1c40c 7694 htab->params->no_multi_toc = 1;
33c0ec9d 7695
8b5f1ed8
AM
7696 /* Default to --no-plt-localentry, as this option can cause problems
7697 with symbol interposition. For example, glibc libpthread.so and
7698 libc.so duplicate many pthread symbols, with a fallback
7699 implementation in libc.so. In some cases the fallback does more
7700 work than the pthread implementation. __pthread_condattr_destroy
7701 is one such symbol: the libpthread.so implementation is
7702 localentry:0 while the libc.so implementation is localentry:8.
7703 An app that "cleverly" uses dlopen to only load necessary
7704 libraries at runtime may omit loading libpthread.so when not
7705 running multi-threaded, which then results in the libc.so
7706 fallback symbols being used and ld.so complaining. Now there
7707 are workarounds in ld (see non_zero_localentry) to detect the
7708 pthread situation, but that may not be the only case where
7709 --plt-localentry can cause trouble. */
f378ab09 7710 if (htab->params->plt_localentry0 < 0)
8b5f1ed8 7711 htab->params->plt_localentry0 = 0;
d44c746a
AM
7712 if (htab->params->plt_localentry0
7713 && elf_link_hash_lookup (&htab->elf, "GLIBC_2.26",
7714 FALSE, FALSE, FALSE) == NULL)
cf97bcb0
AM
7715 _bfd_error_handler
7716 (_("warning: --plt-localentry is especially dangerous without "
7717 "ld.so support to detect ABI violations"));
f378ab09 7718
9e7028aa
AM
7719 tga = elf_link_hash_lookup (&htab->elf, ".__tls_get_addr",
7720 FALSE, FALSE, TRUE);
7721 htab->tls_get_addr = ppc_elf_hash_entry (tga);
7722
a7f2871e 7723 /* Move dynamic linking info to the function descriptor sym. */
9e7028aa
AM
7724 if (tga != NULL)
7725 func_desc_adjust (tga, info);
7726 tga_fd = elf_link_hash_lookup (&htab->elf, "__tls_get_addr",
7727 FALSE, FALSE, TRUE);
7728 htab->tls_get_addr_fd = ppc_elf_hash_entry (tga_fd);
7729
7730 desc = elf_link_hash_lookup (&htab->elf, ".__tls_get_addr_desc",
7731 FALSE, FALSE, TRUE);
7732 htab->tga_desc = ppc_elf_hash_entry (desc);
7733 if (desc != NULL)
7734 func_desc_adjust (desc, info);
7735 desc_fd = elf_link_hash_lookup (&htab->elf, "__tls_get_addr_desc",
7736 FALSE, FALSE, TRUE);
7737 htab->tga_desc_fd = ppc_elf_hash_entry (desc_fd);
7738
7c9cf415 7739 if (htab->params->tls_get_addr_opt)
a7f2871e 7740 {
9e7028aa 7741 struct elf_link_hash_entry *opt, *opt_fd;
a7f2871e
AM
7742
7743 opt = elf_link_hash_lookup (&htab->elf, ".__tls_get_addr_opt",
7744 FALSE, FALSE, TRUE);
7745 if (opt != NULL)
7746 func_desc_adjust (opt, info);
7747 opt_fd = elf_link_hash_lookup (&htab->elf, "__tls_get_addr_opt",
7748 FALSE, FALSE, TRUE);
7749 if (opt_fd != NULL
7750 && (opt_fd->root.type == bfd_link_hash_defined
7751 || opt_fd->root.type == bfd_link_hash_defweak))
7752 {
7753 /* If glibc supports an optimized __tls_get_addr call stub,
7754 signalled by the presence of __tls_get_addr_opt, and we'll
7755 be calling __tls_get_addr via a plt call stub, then
7756 make __tls_get_addr point to __tls_get_addr_opt. */
9e7028aa
AM
7757 if (!(htab->elf.dynamic_sections_created
7758 && tga_fd != NULL
7759 && (tga_fd->type == STT_FUNC
7760 || tga_fd->needs_plt)
7761 && !(SYMBOL_CALLS_LOCAL (info, tga_fd)
7762 || UNDEFWEAK_NO_DYNAMIC_RELOC (info, tga_fd))))
7763 tga_fd = NULL;
7764 if (!(htab->elf.dynamic_sections_created
7765 && desc_fd != NULL
7766 && (desc_fd->type == STT_FUNC
7767 || desc_fd->needs_plt)
7768 && !(SYMBOL_CALLS_LOCAL (info, desc_fd)
7769 || UNDEFWEAK_NO_DYNAMIC_RELOC (info, desc_fd))))
7770 desc_fd = NULL;
7771
7772 if (tga_fd != NULL || desc_fd != NULL)
7773 {
7774 struct plt_entry *ent = NULL;
7775
7776 if (tga_fd != NULL)
7777 for (ent = tga_fd->plt.plist; ent != NULL; ent = ent->next)
7778 if (ent->plt.refcount > 0)
7779 break;
7780 if (ent == NULL && desc_fd != NULL)
7781 for (ent = desc_fd->plt.plist; ent != NULL; ent = ent->next)
7782 if (ent->plt.refcount > 0)
7783 break;
a7f2871e
AM
7784 if (ent != NULL)
7785 {
9e7028aa
AM
7786 if (tga_fd != NULL)
7787 {
7788 tga_fd->root.type = bfd_link_hash_indirect;
7789 tga_fd->root.u.i.link = &opt_fd->root;
7790 tga_fd->root.u.i.warning = NULL;
7791 ppc64_elf_copy_indirect_symbol (info, opt_fd, tga_fd);
7792 }
7793 if (desc_fd != NULL)
7794 {
7795 desc_fd->root.type = bfd_link_hash_indirect;
7796 desc_fd->root.u.i.link = &opt_fd->root;
7797 desc_fd->root.u.i.warning = NULL;
7798 ppc64_elf_copy_indirect_symbol (info, opt_fd, desc_fd);
7799 }
b531344c 7800 opt_fd->mark = 1;
a7f2871e
AM
7801 if (opt_fd->dynindx != -1)
7802 {
7803 /* Use __tls_get_addr_opt in dynamic relocations. */
7804 opt_fd->dynindx = -1;
7805 _bfd_elf_strtab_delref (elf_hash_table (info)->dynstr,
7806 opt_fd->dynstr_index);
7807 if (!bfd_elf_link_record_dynamic_symbol (info, opt_fd))
854b41e7 7808 return NULL;
a7f2871e 7809 }
9e7028aa 7810 if (tga_fd != NULL)
a7f2871e 7811 {
9e7028aa
AM
7812 htab->tls_get_addr_fd = ppc_elf_hash_entry (opt_fd);
7813 tga = &htab->tls_get_addr->elf;
7814 if (opt != NULL && tga != NULL)
7815 {
7816 tga->root.type = bfd_link_hash_indirect;
7817 tga->root.u.i.link = &opt->root;
7818 tga->root.u.i.warning = NULL;
7819 ppc64_elf_copy_indirect_symbol (info, opt, tga);
7820 opt->mark = 1;
7821 _bfd_elf_link_hash_hide_symbol (info, opt,
7822 tga->forced_local);
7823 htab->tls_get_addr = ppc_elf_hash_entry (opt);
7824 }
7825 htab->tls_get_addr_fd->oh = htab->tls_get_addr;
7826 htab->tls_get_addr_fd->is_func_descriptor = 1;
7827 if (htab->tls_get_addr != NULL)
7828 {
7829 htab->tls_get_addr->oh = htab->tls_get_addr_fd;
7830 htab->tls_get_addr->is_func = 1;
7831 }
a7f2871e 7832 }
9e7028aa 7833 if (desc_fd != NULL)
a7f2871e 7834 {
9e7028aa
AM
7835 htab->tga_desc_fd = ppc_elf_hash_entry (opt_fd);
7836 if (opt != NULL && desc != NULL)
7837 {
7838 desc->root.type = bfd_link_hash_indirect;
7839 desc->root.u.i.link = &opt->root;
7840 desc->root.u.i.warning = NULL;
7841 ppc64_elf_copy_indirect_symbol (info, opt, desc);
7842 opt->mark = 1;
7843 _bfd_elf_link_hash_hide_symbol (info, opt,
7844 desc->forced_local);
7845 htab->tga_desc = ppc_elf_hash_entry (opt);
7846 }
7847 htab->tga_desc_fd->oh = htab->tga_desc;
7848 htab->tga_desc_fd->is_func_descriptor = 1;
7849 if (htab->tga_desc != NULL)
7850 {
7851 htab->tga_desc->oh = htab->tga_desc_fd;
7852 htab->tga_desc->is_func = 1;
7853 }
a7f2871e
AM
7854 }
7855 }
7856 }
7857 }
7c9cf415
AM
7858 else if (htab->params->tls_get_addr_opt < 0)
7859 htab->params->tls_get_addr_opt = 0;
a7f2871e 7860 }
9e7028aa
AM
7861
7862 if (htab->tga_desc_fd != NULL
7863 && htab->params->tls_get_addr_opt
7864 && htab->params->no_tls_get_addr_regsave == -1)
7865 htab->params->no_tls_get_addr_regsave = 0;
7866
33c0ec9d 7867 return _bfd_elf_tls_setup (info->output_bfd, info);
3a71aa26 7868}
8387904d 7869
3a71aa26 7870/* Return TRUE iff REL is a branch reloc with a global symbol matching
9e7028aa 7871 any of HASH1, HASH2, HASH3, or HASH4. */
8387904d 7872
3a71aa26
AM
7873static bfd_boolean
7874branch_reloc_hash_match (const bfd *ibfd,
7875 const Elf_Internal_Rela *rel,
7876 const struct ppc_link_hash_entry *hash1,
9e7028aa
AM
7877 const struct ppc_link_hash_entry *hash2,
7878 const struct ppc_link_hash_entry *hash3,
7879 const struct ppc_link_hash_entry *hash4)
3a71aa26
AM
7880{
7881 Elf_Internal_Shdr *symtab_hdr = &elf_symtab_hdr (ibfd);
7882 enum elf_ppc64_reloc_type r_type = ELF64_R_TYPE (rel->r_info);
7883 unsigned int r_symndx = ELF64_R_SYM (rel->r_info);
7884
e054468f 7885 if (r_symndx >= symtab_hdr->sh_info && is_branch_reloc (r_type))
8387904d 7886 {
3a71aa26
AM
7887 struct elf_link_hash_entry **sym_hashes = elf_sym_hashes (ibfd);
7888 struct elf_link_hash_entry *h;
8387904d 7889
3a71aa26 7890 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
b31867b6 7891 h = elf_follow_link (h);
9e7028aa
AM
7892 if (h == &hash1->elf || h == &hash2->elf
7893 || h == &hash3->elf || h == &hash4->elf)
3a71aa26 7894 return TRUE;
a48ebf4d 7895 }
3a71aa26 7896 return FALSE;
951fd09b 7897}
411e1bfb 7898
951fd09b
AM
7899/* Run through all the TLS relocs looking for optimization
7900 opportunities. The linker has been hacked (see ppc64elf.em) to do
7901 a preliminary section layout so that we know the TLS segment
7902 offsets. We can't optimize earlier because some optimizations need
7903 to know the tp offset, and we need to optimize before allocating
7904 dynamic relocations. */
7905
7906bfd_boolean
33c0ec9d 7907ppc64_elf_tls_optimize (struct bfd_link_info *info)
951fd09b
AM
7908{
7909 bfd *ibfd;
7910 asection *sec;
7911 struct ppc_link_hash_table *htab;
663a1470 7912 unsigned char *toc_ref;
102890f0 7913 int pass;
951fd09b 7914
3cbc1e5e 7915 if (!bfd_link_executable (info))
411e1bfb
AM
7916 return TRUE;
7917
951fd09b 7918 htab = ppc_hash_table (info);
4dfe6ac6
NC
7919 if (htab == NULL)
7920 return FALSE;
7921
663a1470
AM
7922 /* Make two passes over the relocs. On the first pass, mark toc
7923 entries involved with tls relocs, and check that tls relocs
7924 involved in setting up a tls_get_addr call are indeed followed by
7925 such a call. If they are not, we can't do any tls optimization.
7926 On the second pass twiddle tls_mask flags to notify
7927 relocate_section that optimization can be done, and adjust got
7928 and plt refcounts. */
7929 toc_ref = NULL;
7930 for (pass = 0; pass < 2; ++pass)
c72f2fb2 7931 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
663a1470
AM
7932 {
7933 Elf_Internal_Sym *locsyms = NULL;
7934 asection *toc = bfd_get_section_by_name (ibfd, ".toc");
7935
102890f0
AM
7936 for (sec = ibfd->sections; sec != NULL; sec = sec->next)
7937 if (sec->has_tls_reloc && !bfd_is_abs_section (sec->output_section))
7938 {
7939 Elf_Internal_Rela *relstart, *rel, *relend;
663a1470 7940 bfd_boolean found_tls_get_addr_arg = 0;
411e1bfb 7941
102890f0
AM
7942 /* Read the relocations. */
7943 relstart = _bfd_elf_link_read_relocs (ibfd, sec, NULL, NULL,
7944 info->keep_memory);
7945 if (relstart == NULL)
2915c55b
JK
7946 {
7947 free (toc_ref);
7948 return FALSE;
7949 }
411e1bfb 7950
102890f0
AM
7951 relend = relstart + sec->reloc_count;
7952 for (rel = relstart; rel < relend; rel++)
7953 {
7954 enum elf_ppc64_reloc_type r_type;
7955 unsigned long r_symndx;
7956 struct elf_link_hash_entry *h;
7957 Elf_Internal_Sym *sym;
7958 asection *sym_sec;
f961d9dd 7959 unsigned char *tls_mask;
46e9995a 7960 unsigned int tls_set, tls_clear, tls_type = 0;
102890f0
AM
7961 bfd_vma value;
7962 bfd_boolean ok_tprel, is_local;
7963 long toc_ref_index = 0;
7964 int expecting_tls_get_addr = 0;
663a1470 7965 bfd_boolean ret = FALSE;
411e1bfb 7966
102890f0
AM
7967 r_symndx = ELF64_R_SYM (rel->r_info);
7968 if (!get_sym_h (&h, &sym, &sym_sec, &tls_mask, &locsyms,
7969 r_symndx, ibfd))
7970 {
7971 err_free_rel:
7972 if (elf_section_data (sec)->relocs != relstart)
7973 free (relstart);
c9594989
AM
7974 free (toc_ref);
7975 if (elf_symtab_hdr (ibfd).contents
7976 != (unsigned char *) locsyms)
102890f0 7977 free (locsyms);
663a1470 7978 return ret;
102890f0 7979 }
411e1bfb 7980
102890f0
AM
7981 if (h != NULL)
7982 {
766bc656
AM
7983 if (h->root.type == bfd_link_hash_defined
7984 || h->root.type == bfd_link_hash_defweak)
7985 value = h->root.u.def.value;
7986 else if (h->root.type == bfd_link_hash_undefweak)
7987 value = 0;
7988 else
663a1470
AM
7989 {
7990 found_tls_get_addr_arg = 0;
7991 continue;
7992 }
102890f0
AM
7993 }
7994 else
7995 /* Symbols referenced by TLS relocs must be of type
7996 STT_TLS. So no need for .opd local sym adjust. */
7997 value = sym->st_value;
7998
7999 ok_tprel = FALSE;
f749f26e
AM
8000 is_local = SYMBOL_REFERENCES_LOCAL (info, h);
8001 if (is_local)
102890f0 8002 {
766bc656
AM
8003 if (h != NULL
8004 && h->root.type == bfd_link_hash_undefweak)
8005 ok_tprel = TRUE;
c27b8c2a
AM
8006 else if (sym_sec != NULL
8007 && sym_sec->output_section != NULL)
766bc656
AM
8008 {
8009 value += sym_sec->output_offset;
8010 value += sym_sec->output_section->vma;
0b147428 8011 value -= htab->elf.tls_sec->vma + TP_OFFSET;
c213164a
AM
8012 /* Note that even though the prefix insns
8013 allow a 1<<33 offset we use the same test
8014 as for addis;addi. There may be a mix of
8015 pcrel and non-pcrel code and the decision
8016 to optimise is per symbol, not per TLS
8017 sequence. */
0b147428 8018 ok_tprel = value + 0x80008000ULL < 1ULL << 32;
766bc656 8019 }
102890f0 8020 }
951fd09b 8021
102890f0 8022 r_type = ELF64_R_TYPE (rel->r_info);
663a1470
AM
8023 /* If this section has old-style __tls_get_addr calls
8024 without marker relocs, then check that each
8025 __tls_get_addr call reloc is preceded by a reloc
8026 that conceivably belongs to the __tls_get_addr arg
8027 setup insn. If we don't find matching arg setup
8028 relocs, don't do any tls optimization. */
8029 if (pass == 0
9737e8af 8030 && sec->nomark_tls_get_addr
663a1470 8031 && h != NULL
ed7007c1 8032 && is_tls_get_addr (h, htab)
663a1470
AM
8033 && !found_tls_get_addr_arg
8034 && is_branch_reloc (r_type))
8035 {
25f53a85 8036 info->callbacks->minfo (_("%H __tls_get_addr lost arg, "
663a1470
AM
8037 "TLS optimization disabled\n"),
8038 ibfd, sec, rel->r_offset);
8039 ret = TRUE;
8040 goto err_free_rel;
8041 }
8042
8043 found_tls_get_addr_arg = 0;
102890f0
AM
8044 switch (r_type)
8045 {
8046 case R_PPC64_GOT_TLSLD16:
8047 case R_PPC64_GOT_TLSLD16_LO:
c213164a 8048 case R_PPC64_GOT_TLSLD34:
102890f0 8049 expecting_tls_get_addr = 1;
663a1470 8050 found_tls_get_addr_arg = 1;
1a0670f3 8051 /* Fall through. */
102890f0
AM
8052
8053 case R_PPC64_GOT_TLSLD16_HI:
8054 case R_PPC64_GOT_TLSLD16_HA:
8055 /* These relocs should never be against a symbol
8056 defined in a shared lib. Leave them alone if
8057 that turns out to be the case. */
8058 if (!is_local)
8059 continue;
411e1bfb 8060
102890f0 8061 /* LD -> LE */
411e1bfb 8062 tls_set = 0;
102890f0
AM
8063 tls_clear = TLS_LD;
8064 tls_type = TLS_TLS | TLS_LD;
8065 break;
411e1bfb 8066
102890f0
AM
8067 case R_PPC64_GOT_TLSGD16:
8068 case R_PPC64_GOT_TLSGD16_LO:
c213164a 8069 case R_PPC64_GOT_TLSGD34:
102890f0 8070 expecting_tls_get_addr = 1;
663a1470 8071 found_tls_get_addr_arg = 1;
1a0670f3 8072 /* Fall through. */
102890f0
AM
8073
8074 case R_PPC64_GOT_TLSGD16_HI:
8075 case R_PPC64_GOT_TLSGD16_HA:
8076 if (ok_tprel)
8077 /* GD -> LE */
411e1bfb 8078 tls_set = 0;
102890f0
AM
8079 else
8080 /* GD -> IE */
b00a0a86 8081 tls_set = TLS_TLS | TLS_GDIE;
102890f0
AM
8082 tls_clear = TLS_GD;
8083 tls_type = TLS_TLS | TLS_GD;
8084 break;
8085
c213164a 8086 case R_PPC64_GOT_TPREL34:
102890f0
AM
8087 case R_PPC64_GOT_TPREL16_DS:
8088 case R_PPC64_GOT_TPREL16_LO_DS:
8089 case R_PPC64_GOT_TPREL16_HI:
8090 case R_PPC64_GOT_TPREL16_HA:
8091 if (ok_tprel)
8092 {
8093 /* IE -> LE */
8094 tls_set = 0;
8095 tls_clear = TLS_TPREL;
8096 tls_type = TLS_TLS | TLS_TPREL;
8097 break;
8098 }
411e1bfb
AM
8099 continue;
8100
727fc41e 8101 case R_PPC64_TLSLD:
7d04a20a
AM
8102 if (!is_local)
8103 continue;
8104 /* Fall through. */
8105 case R_PPC64_TLSGD:
23cedd1d
AM
8106 if (rel + 1 < relend
8107 && is_plt_seq_reloc (ELF64_R_TYPE (rel[1].r_info)))
8108 {
8109 if (pass != 0
2cdcc330 8110 && (ELF64_R_TYPE (rel[1].r_info)
5663e321
AM
8111 != R_PPC64_PLTSEQ)
8112 && (ELF64_R_TYPE (rel[1].r_info)
8113 != R_PPC64_PLTSEQ_NOTOC))
23cedd1d
AM
8114 {
8115 r_symndx = ELF64_R_SYM (rel[1].r_info);
8116 if (!get_sym_h (&h, NULL, NULL, NULL, &locsyms,
2cdcc330 8117 r_symndx, ibfd))
23cedd1d
AM
8118 goto err_free_rel;
8119 if (h != NULL)
8120 {
8121 struct plt_entry *ent = NULL;
8122
8123 for (ent = h->plt.plist;
8124 ent != NULL;
8125 ent = ent->next)
8126 if (ent->addend == rel[1].r_addend)
8127 break;
8128
8129 if (ent != NULL
8130 && ent->plt.refcount > 0)
8131 ent->plt.refcount -= 1;
8132 }
8133 }
8134 continue;
8135 }
663a1470 8136 found_tls_get_addr_arg = 1;
1a0670f3 8137 /* Fall through. */
663a1470
AM
8138
8139 case R_PPC64_TLS:
8140 case R_PPC64_TOC16:
8141 case R_PPC64_TOC16_LO:
102890f0
AM
8142 if (sym_sec == NULL || sym_sec != toc)
8143 continue;
8144
8145 /* Mark this toc entry as referenced by a TLS
8146 code sequence. We can do that now in the
8147 case of R_PPC64_TLS, and after checking for
8148 tls_get_addr for the TOC16 relocs. */
8149 if (toc_ref == NULL)
2cdcc330
AM
8150 toc_ref
8151 = bfd_zmalloc (toc->output_section->rawsize / 8);
663a1470
AM
8152 if (toc_ref == NULL)
8153 goto err_free_rel;
8154
102890f0
AM
8155 if (h != NULL)
8156 value = h->root.u.def.value;
8157 else
8158 value = sym->st_value;
8159 value += rel->r_addend;
73242275
AM
8160 if (value % 8 != 0)
8161 continue;
8162 BFD_ASSERT (value < toc->size
8163 && toc->output_offset % 8 == 0);
663a1470 8164 toc_ref_index = (value + toc->output_offset) / 8;
727fc41e
AM
8165 if (r_type == R_PPC64_TLS
8166 || r_type == R_PPC64_TLSGD
8167 || r_type == R_PPC64_TLSLD)
102890f0
AM
8168 {
8169 toc_ref[toc_ref_index] = 1;
8170 continue;
8171 }
8172
8173 if (pass != 0 && toc_ref[toc_ref_index] == 0)
8174 continue;
8175
8176 tls_set = 0;
8177 tls_clear = 0;
8178 expecting_tls_get_addr = 2;
8179 break;
8180
8181 case R_PPC64_TPREL64:
8182 if (pass == 0
8183 || sec != toc
8184 || toc_ref == NULL
663a1470 8185 || !toc_ref[(rel->r_offset + toc->output_offset) / 8])
102890f0
AM
8186 continue;
8187 if (ok_tprel)
8188 {
8189 /* IE -> LE */
8190 tls_set = TLS_EXPLICIT;
8191 tls_clear = TLS_TPREL;
8192 break;
8193 }
8194 continue;
8195
8196 case R_PPC64_DTPMOD64:
8197 if (pass == 0
8198 || sec != toc
8199 || toc_ref == NULL
663a1470 8200 || !toc_ref[(rel->r_offset + toc->output_offset) / 8])
102890f0
AM
8201 continue;
8202 if (rel + 1 < relend
8203 && (rel[1].r_info
8204 == ELF64_R_INFO (r_symndx, R_PPC64_DTPREL64))
8205 && rel[1].r_offset == rel->r_offset + 8)
8206 {
8207 if (ok_tprel)
8208 /* GD -> LE */
8209 tls_set = TLS_EXPLICIT | TLS_GD;
8210 else
8211 /* GD -> IE */
b00a0a86 8212 tls_set = TLS_EXPLICIT | TLS_GD | TLS_GDIE;
102890f0
AM
8213 tls_clear = TLS_GD;
8214 }
8215 else
8216 {
8217 if (!is_local)
8218 continue;
8219
8220 /* LD -> LE */
8221 tls_set = TLS_EXPLICIT;
8222 tls_clear = TLS_LD;
8223 }
8224 break;
8225
8226 default:
8227 continue;
8228 }
8229
8230 if (pass == 0)
8231 {
727fc41e 8232 if (!expecting_tls_get_addr
9737e8af 8233 || !sec->nomark_tls_get_addr)
102890f0
AM
8234 continue;
8235
3a71aa26
AM
8236 if (rel + 1 < relend
8237 && branch_reloc_hash_match (ibfd, rel + 1,
9e7028aa
AM
8238 htab->tls_get_addr_fd,
8239 htab->tga_desc_fd,
3a71aa26 8240 htab->tls_get_addr,
9e7028aa 8241 htab->tga_desc))
102890f0 8242 {
3a71aa26 8243 if (expecting_tls_get_addr == 2)
102890f0 8244 {
3a71aa26 8245 /* Check for toc tls entries. */
f961d9dd 8246 unsigned char *toc_tls;
3a71aa26
AM
8247 int retval;
8248
8249 retval = get_tls_mask (&toc_tls, NULL, NULL,
8250 &locsyms,
8251 rel, ibfd);
8252 if (retval == 0)
8253 goto err_free_rel;
663a1470
AM
8254 if (toc_tls != NULL)
8255 {
37da22e5
AM
8256 if ((*toc_tls & TLS_TLS) != 0
8257 && ((*toc_tls & (TLS_GD | TLS_LD)) != 0))
663a1470
AM
8258 found_tls_get_addr_arg = 1;
8259 if (retval > 1)
8260 toc_ref[toc_ref_index] = 1;
8261 }
102890f0 8262 }
3a71aa26 8263 continue;
102890f0
AM
8264 }
8265
102890f0
AM
8266 /* Uh oh, we didn't find the expected call. We
8267 could just mark this symbol to exclude it
8268 from tls optimization but it's safer to skip
663a1470 8269 the entire optimization. */
695344c0 8270 /* xgettext:c-format */
25f53a85 8271 info->callbacks->minfo (_("%H arg lost __tls_get_addr, "
663a1470
AM
8272 "TLS optimization disabled\n"),
8273 ibfd, sec, rel->r_offset);
8274 ret = TRUE;
8275 goto err_free_rel;
102890f0
AM
8276 }
8277
37da22e5
AM
8278 /* If we don't have old-style __tls_get_addr calls
8279 without TLSGD/TLSLD marker relocs, and we haven't
8280 found a new-style __tls_get_addr call with a
8281 marker for this symbol, then we either have a
8282 broken object file or an -mlongcall style
8283 indirect call to __tls_get_addr without a marker.
8284 Disable optimization in this case. */
8285 if ((tls_clear & (TLS_GD | TLS_LD)) != 0
8286 && (tls_set & TLS_EXPLICIT) == 0
9737e8af 8287 && !sec->nomark_tls_get_addr
37da22e5
AM
8288 && ((*tls_mask & (TLS_TLS | TLS_MARK))
8289 != (TLS_TLS | TLS_MARK)))
8290 continue;
8291
7d04a20a 8292 if (expecting_tls_get_addr == 1 + !sec->nomark_tls_get_addr)
102890f0 8293 {
23cedd1d
AM
8294 struct plt_entry *ent = NULL;
8295
9e7028aa
AM
8296 if (htab->tls_get_addr_fd != NULL)
8297 for (ent = htab->tls_get_addr_fd->elf.plt.plist;
8298 ent != NULL;
8299 ent = ent->next)
8300 if (ent->addend == 0)
8301 break;
8302
8303 if (ent == NULL && htab->tga_desc_fd != NULL)
8304 for (ent = htab->tga_desc_fd->elf.plt.plist;
8305 ent != NULL;
8306 ent = ent->next)
8307 if (ent->addend == 0)
8308 break;
8309
8310 if (ent == NULL && htab->tls_get_addr != NULL)
23cedd1d
AM
8311 for (ent = htab->tls_get_addr->elf.plt.plist;
8312 ent != NULL;
8313 ent = ent->next)
8314 if (ent->addend == 0)
102890f0 8315 break;
411e1bfb 8316
9e7028aa
AM
8317 if (ent == NULL && htab->tga_desc != NULL)
8318 for (ent = htab->tga_desc->elf.plt.plist;
23cedd1d
AM
8319 ent != NULL;
8320 ent = ent->next)
8321 if (ent->addend == 0)
102890f0 8322 break;
23cedd1d
AM
8323
8324 if (ent != NULL
8325 && ent->plt.refcount > 0)
8326 ent->plt.refcount -= 1;
102890f0 8327 }
411e1bfb 8328
102890f0 8329 if (tls_clear == 0)
30038c59
AM
8330 continue;
8331
102890f0
AM
8332 if ((tls_set & TLS_EXPLICIT) == 0)
8333 {
8334 struct got_entry *ent;
411e1bfb 8335
102890f0
AM
8336 /* Adjust got entry for this reloc. */
8337 if (h != NULL)
8338 ent = h->got.glist;
8339 else
8340 ent = elf_local_got_ents (ibfd)[r_symndx];
411e1bfb 8341
102890f0
AM
8342 for (; ent != NULL; ent = ent->next)
8343 if (ent->addend == rel->r_addend
8344 && ent->owner == ibfd
8345 && ent->tls_type == tls_type)
8346 break;
8347 if (ent == NULL)
8348 abort ();
411e1bfb 8349
102890f0
AM
8350 if (tls_set == 0)
8351 {
8352 /* We managed to get rid of a got entry. */
8353 if (ent->got.refcount > 0)
8354 ent->got.refcount -= 1;
8355 }
8356 }
8357 else
8358 {
8359 /* If we got rid of a DTPMOD/DTPREL reloc pair then
8360 we'll lose one or two dyn relocs. */
8361 if (!dec_dynrel_count (rel->r_info, sec, info,
19e08130 8362 NULL, h, sym))
102890f0 8363 return FALSE;
411e1bfb 8364
102890f0
AM
8365 if (tls_set == (TLS_EXPLICIT | TLS_GD))
8366 {
8367 if (!dec_dynrel_count ((rel + 1)->r_info, sec, info,
19e08130 8368 NULL, h, sym))
102890f0
AM
8369 return FALSE;
8370 }
8371 }
411e1bfb 8372
46e9995a 8373 *tls_mask |= tls_set & 0xff;
102890f0
AM
8374 *tls_mask &= ~tls_clear;
8375 }
8c1d1bb8 8376
102890f0
AM
8377 if (elf_section_data (sec)->relocs != relstart)
8378 free (relstart);
8379 }
411e1bfb 8380
663a1470
AM
8381 if (locsyms != NULL
8382 && (elf_symtab_hdr (ibfd).contents != (unsigned char *) locsyms))
8383 {
8384 if (!info->keep_memory)
8385 free (locsyms);
8386 else
8387 elf_symtab_hdr (ibfd).contents = (unsigned char *) locsyms;
8388 }
8389 }
411e1bfb 8390
c9594989 8391 free (toc_ref);
9a23f96e 8392 htab->do_tls_opt = 1;
b34976b6 8393 return TRUE;
1e2f5b6e 8394}
b34976b6 8395
c5614fa4
AM
8396/* Called via elf_link_hash_traverse from ppc64_elf_edit_toc to adjust
8397 the values of any global symbols in a toc section that has been
8398 edited. Globals in toc sections should be a rarity, so this function
8399 sets a flag if any are found in toc sections other than the one just
de194d85 8400 edited, so that further hash table traversals can be avoided. */
c5614fa4
AM
8401
8402struct adjust_toc_info
8403{
8404 asection *toc;
8405 unsigned long *skip;
8406 bfd_boolean global_toc_syms;
8407};
8408
ba761f19
AM
8409enum toc_skip_enum { ref_from_discarded = 1, can_optimize = 2 };
8410
c5614fa4
AM
8411static bfd_boolean
8412adjust_toc_syms (struct elf_link_hash_entry *h, void *inf)
8413{
8414 struct ppc_link_hash_entry *eh;
8415 struct adjust_toc_info *toc_inf = (struct adjust_toc_info *) inf;
854b41e7 8416 unsigned long i;
c5614fa4 8417
c5614fa4
AM
8418 if (h->root.type != bfd_link_hash_defined
8419 && h->root.type != bfd_link_hash_defweak)
8420 return TRUE;
8421
ed7007c1 8422 eh = ppc_elf_hash_entry (h);
c5614fa4
AM
8423 if (eh->adjust_done)
8424 return TRUE;
8425
8426 if (eh->elf.root.u.def.section == toc_inf->toc)
8427 {
854b41e7
AM
8428 if (eh->elf.root.u.def.value > toc_inf->toc->rawsize)
8429 i = toc_inf->toc->rawsize >> 3;
c5614fa4 8430 else
854b41e7
AM
8431 i = eh->elf.root.u.def.value >> 3;
8432
ba761f19 8433 if ((toc_inf->skip[i] & (ref_from_discarded | can_optimize)) != 0)
c5614fa4 8434 {
4eca0228 8435 _bfd_error_handler
854b41e7
AM
8436 (_("%s defined on removed toc entry"), eh->elf.root.root.string);
8437 do
8438 ++i;
ba761f19 8439 while ((toc_inf->skip[i] & (ref_from_discarded | can_optimize)) != 0);
854b41e7 8440 eh->elf.root.u.def.value = (bfd_vma) i << 3;
c5614fa4 8441 }
854b41e7
AM
8442
8443 eh->elf.root.u.def.value -= toc_inf->skip[i];
c5614fa4
AM
8444 eh->adjust_done = 1;
8445 }
8446 else if (strcmp (eh->elf.root.u.def.section->name, ".toc") == 0)
8447 toc_inf->global_toc_syms = TRUE;
8448
8449 return TRUE;
8450}
8451
39eeab25
AM
8452/* Return TRUE iff INSN with a relocation of R_TYPE is one we expect
8453 on a _LO variety toc/got reloc. */
560c8763
AM
8454
8455static bfd_boolean
39eeab25 8456ok_lo_toc_insn (unsigned int insn, enum elf_ppc64_reloc_type r_type)
560c8763 8457{
2365f8d7
AM
8458 return ((insn & (0x3fu << 26)) == 12u << 26 /* addic */
8459 || (insn & (0x3fu << 26)) == 14u << 26 /* addi */
8460 || (insn & (0x3fu << 26)) == 32u << 26 /* lwz */
8461 || (insn & (0x3fu << 26)) == 34u << 26 /* lbz */
8462 || (insn & (0x3fu << 26)) == 36u << 26 /* stw */
8463 || (insn & (0x3fu << 26)) == 38u << 26 /* stb */
8464 || (insn & (0x3fu << 26)) == 40u << 26 /* lhz */
8465 || (insn & (0x3fu << 26)) == 42u << 26 /* lha */
8466 || (insn & (0x3fu << 26)) == 44u << 26 /* sth */
8467 || (insn & (0x3fu << 26)) == 46u << 26 /* lmw */
8468 || (insn & (0x3fu << 26)) == 47u << 26 /* stmw */
8469 || (insn & (0x3fu << 26)) == 48u << 26 /* lfs */
8470 || (insn & (0x3fu << 26)) == 50u << 26 /* lfd */
8471 || (insn & (0x3fu << 26)) == 52u << 26 /* stfs */
8472 || (insn & (0x3fu << 26)) == 54u << 26 /* stfd */
8473 || (insn & (0x3fu << 26)) == 56u << 26 /* lq,lfq */
8474 || ((insn & (0x3fu << 26)) == 57u << 26 /* lxsd,lxssp,lfdp */
39eeab25
AM
8475 /* Exclude lfqu by testing reloc. If relocs are ever
8476 defined for the reduced D field in psq_lu then those
8477 will need testing too. */
8478 && r_type != R_PPC64_TOC16_LO && r_type != R_PPC64_GOT16_LO)
2365f8d7 8479 || ((insn & (0x3fu << 26)) == 58u << 26 /* ld,lwa */
39eeab25 8480 && (insn & 1) == 0)
2365f8d7
AM
8481 || (insn & (0x3fu << 26)) == 60u << 26 /* stfq */
8482 || ((insn & (0x3fu << 26)) == 61u << 26 /* lxv,stx{v,sd,ssp},stfdp */
39eeab25
AM
8483 /* Exclude stfqu. psq_stu as above for psq_lu. */
8484 && r_type != R_PPC64_TOC16_LO && r_type != R_PPC64_GOT16_LO)
2365f8d7 8485 || ((insn & (0x3fu << 26)) == 62u << 26 /* std,stq */
39eeab25 8486 && (insn & 1) == 0));
560c8763
AM
8487}
8488
4a421c53
AM
8489/* PCREL_OPT in one instance flags to the linker that a pair of insns:
8490 pld ra,symbol@got@pcrel
dd9b12c2 8491 load/store rt,off(ra)
4a421c53 8492 or
d4b87b1e 8493 pla ra,symbol@pcrel
dd9b12c2 8494 load/store rt,off(ra)
4a421c53 8495 may be translated to
dd9b12c2 8496 pload/pstore rt,symbol+off@pcrel
4a421c53
AM
8497 nop.
8498 This function returns true if the optimization is possible, placing
dd9b12c2 8499 the prefix insn in *PINSN1, a NOP in *PINSN2 and the offset in *POFF.
4a421c53
AM
8500
8501 On entry to this function, the linker has already determined that
d4b87b1e 8502 the pld can be replaced with pla: *PINSN1 is that pla insn,
4a421c53
AM
8503 while *PINSN2 is the second instruction. */
8504
8505static bfd_boolean
dd9b12c2 8506xlate_pcrel_opt (uint64_t *pinsn1, uint64_t *pinsn2, bfd_signed_vma *poff)
4a421c53 8507{
77486630
AM
8508 uint64_t insn1 = *pinsn1;
8509 uint64_t insn2 = *pinsn2;
dd9b12c2 8510 bfd_signed_vma off;
4a421c53 8511
77486630
AM
8512 if ((insn2 & (63ULL << 58)) == 1ULL << 58)
8513 {
8514 /* Check that regs match. */
8515 if (((insn2 >> 16) & 31) != ((insn1 >> 21) & 31))
8516 return FALSE;
8517
8518 /* P8LS or PMLS form, non-pcrel. */
8519 if ((insn2 & (-1ULL << 50) & ~(1ULL << 56)) != (1ULL << 58))
8520 return FALSE;
8521
8522 *pinsn1 = (insn2 & ~(31 << 16) & ~0x3ffff0000ffffULL) | (1ULL << 52);
8523 *pinsn2 = PNOP;
8524 off = ((insn2 >> 16) & 0x3ffff0000ULL) | (insn2 & 0xffff);
8525 *poff = (off ^ 0x200000000ULL) - 0x200000000ULL;
8526 return TRUE;
8527 }
8528
8529 insn2 >>= 32;
8530
4a421c53 8531 /* Check that regs match. */
77486630 8532 if (((insn2 >> 16) & 31) != ((insn1 >> 21) & 31))
4a421c53
AM
8533 return FALSE;
8534
8535 switch ((insn2 >> 26) & 63)
8536 {
8537 default:
8538 return FALSE;
8539
8540 case 32: /* lwz */
8541 case 34: /* lbz */
8542 case 36: /* stw */
8543 case 38: /* stb */
8544 case 40: /* lhz */
8545 case 42: /* lha */
8546 case 44: /* sth */
8547 case 48: /* lfs */
8548 case 50: /* lfd */
8549 case 52: /* stfs */
8550 case 54: /* stfd */
8551 /* These are the PMLS cases, where we just need to tack a prefix
dd9b12c2 8552 on the insn. */
77486630 8553 insn1 = ((1ULL << 58) | (2ULL << 56) | (1ULL << 52)
4a421c53 8554 | (insn2 & ((63ULL << 26) | (31ULL << 21))));
dd9b12c2 8555 off = insn2 & 0xffff;
4a421c53
AM
8556 break;
8557
8558 case 58: /* lwa, ld */
dd9b12c2 8559 if ((insn2 & 1) != 0)
4a421c53 8560 return FALSE;
77486630 8561 insn1 = ((1ULL << 58) | (1ULL << 52)
4a421c53
AM
8562 | (insn2 & 2 ? 41ULL << 26 : 57ULL << 26)
8563 | (insn2 & (31ULL << 21)));
dd9b12c2 8564 off = insn2 & 0xfffc;
4a421c53
AM
8565 break;
8566
8567 case 57: /* lxsd, lxssp */
dd9b12c2 8568 if ((insn2 & 3) < 2)
4a421c53 8569 return FALSE;
77486630 8570 insn1 = ((1ULL << 58) | (1ULL << 52)
4a421c53
AM
8571 | ((40ULL | (insn2 & 3)) << 26)
8572 | (insn2 & (31ULL << 21)));
dd9b12c2 8573 off = insn2 & 0xfffc;
4a421c53
AM
8574 break;
8575
8576 case 61: /* stxsd, stxssp, lxv, stxv */
8577 if ((insn2 & 3) == 0)
8578 return FALSE;
8579 else if ((insn2 & 3) >= 2)
8580 {
77486630 8581 insn1 = ((1ULL << 58) | (1ULL << 52)
4a421c53
AM
8582 | ((44ULL | (insn2 & 3)) << 26)
8583 | (insn2 & (31ULL << 21)));
dd9b12c2 8584 off = insn2 & 0xfffc;
4a421c53
AM
8585 }
8586 else
8587 {
77486630 8588 insn1 = ((1ULL << 58) | (1ULL << 52)
4a421c53
AM
8589 | ((50ULL | (insn2 & 4) | ((insn2 & 8) >> 3)) << 26)
8590 | (insn2 & (31ULL << 21)));
dd9b12c2 8591 off = insn2 & 0xfff0;
4a421c53
AM
8592 }
8593 break;
8594
8595 case 56: /* lq */
77486630 8596 insn1 = ((1ULL << 58) | (1ULL << 52)
4a421c53 8597 | (insn2 & ((63ULL << 26) | (31ULL << 21))));
dd9b12c2 8598 off = insn2 & 0xffff;
4a421c53
AM
8599 break;
8600
94ba9882
AM
8601 case 6: /* lxvp, stxvp */
8602 if ((insn2 & 0xe) != 0)
8603 return FALSE;
8604 insn1 = ((1ULL << 58) | (1ULL << 52)
8605 | ((insn2 & 1) == 0 ? 58ULL << 26 : 62ULL << 26)
8606 | (insn2 & (31ULL << 21)));
8607 off = insn2 & 0xfff0;
8608 break;
8609
4a421c53 8610 case 62: /* std, stq */
dd9b12c2 8611 if ((insn2 & 1) != 0)
4a421c53 8612 return FALSE;
77486630 8613 insn1 = ((1ULL << 58) | (1ULL << 52)
4a421c53
AM
8614 | ((insn2 & 2) == 0 ? 61ULL << 26 : 60ULL << 26)
8615 | (insn2 & (31ULL << 21)));
dd9b12c2 8616 off = insn2 & 0xfffc;
4a421c53
AM
8617 break;
8618 }
8619
77486630 8620 *pinsn1 = insn1;
4a421c53 8621 *pinsn2 = (uint64_t) NOP << 32;
dd9b12c2 8622 *poff = (off ^ 0x8000) - 0x8000;
4a421c53
AM
8623 return TRUE;
8624}
8625
c5614fa4
AM
8626/* Examine all relocs referencing .toc sections in order to remove
8627 unused .toc entries. */
8628
8629bfd_boolean
33c0ec9d 8630ppc64_elf_edit_toc (struct bfd_link_info *info)
c5614fa4
AM
8631{
8632 bfd *ibfd;
8633 struct adjust_toc_info toc_inf;
67f0cbdb 8634 struct ppc_link_hash_table *htab = ppc_hash_table (info);
c5614fa4 8635
67f0cbdb 8636 htab->do_toc_opt = 1;
c5614fa4 8637 toc_inf.global_toc_syms = TRUE;
c72f2fb2 8638 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
c5614fa4
AM
8639 {
8640 asection *toc, *sec;
8641 Elf_Internal_Shdr *symtab_hdr;
8642 Elf_Internal_Sym *local_syms;
425b145b 8643 Elf_Internal_Rela *relstart, *rel, *toc_relocs;
c5614fa4
AM
8644 unsigned long *skip, *drop;
8645 unsigned char *used;
8646 unsigned char *keep, last, some_unused;
8647
854b41e7
AM
8648 if (!is_ppc64_elf (ibfd))
8649 continue;
8650
c5614fa4
AM
8651 toc = bfd_get_section_by_name (ibfd, ".toc");
8652 if (toc == NULL
92b7a70f 8653 || toc->size == 0
dbaa2011
AM
8654 || toc->sec_info_type == SEC_INFO_TYPE_JUST_SYMS
8655 || discarded_section (toc))
c5614fa4
AM
8656 continue;
8657
425b145b 8658 toc_relocs = NULL;
c5614fa4 8659 local_syms = NULL;
0ffa91dd 8660 symtab_hdr = &elf_symtab_hdr (ibfd);
c5614fa4
AM
8661
8662 /* Look at sections dropped from the final link. */
8663 skip = NULL;
8664 relstart = NULL;
8665 for (sec = ibfd->sections; sec != NULL; sec = sec->next)
8666 {
8667 if (sec->reloc_count == 0
dbaa2011 8668 || !discarded_section (sec)
c5614fa4
AM
8669 || get_opd_info (sec)
8670 || (sec->flags & SEC_ALLOC) == 0
8671 || (sec->flags & SEC_DEBUGGING) != 0)
8672 continue;
8673
8674 relstart = _bfd_elf_link_read_relocs (ibfd, sec, NULL, NULL, FALSE);
8675 if (relstart == NULL)
8676 goto error_ret;
8677
8678 /* Run through the relocs to see which toc entries might be
8679 unused. */
8680 for (rel = relstart; rel < relstart + sec->reloc_count; ++rel)
8681 {
8682 enum elf_ppc64_reloc_type r_type;
8683 unsigned long r_symndx;
8684 asection *sym_sec;
8685 struct elf_link_hash_entry *h;
8686 Elf_Internal_Sym *sym;
8687 bfd_vma val;
8688
8689 r_type = ELF64_R_TYPE (rel->r_info);
8690 switch (r_type)
8691 {
8692 default:
8693 continue;
8694
8695 case R_PPC64_TOC16:
8696 case R_PPC64_TOC16_LO:
8697 case R_PPC64_TOC16_HI:
8698 case R_PPC64_TOC16_HA:
8699 case R_PPC64_TOC16_DS:
8700 case R_PPC64_TOC16_LO_DS:
8701 break;
8702 }
8703
8704 r_symndx = ELF64_R_SYM (rel->r_info);
8705 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms,
8706 r_symndx, ibfd))
8707 goto error_ret;
8708
8709 if (sym_sec != toc)
8710 continue;
8711
8712 if (h != NULL)
8713 val = h->root.u.def.value;
8714 else
8715 val = sym->st_value;
8716 val += rel->r_addend;
8717
8718 if (val >= toc->size)
8719 continue;
8720
8721 /* Anything in the toc ought to be aligned to 8 bytes.
8722 If not, don't mark as unused. */
8723 if (val & 7)
8724 continue;
8725
8726 if (skip == NULL)
8727 {
854b41e7 8728 skip = bfd_zmalloc (sizeof (*skip) * (toc->size + 15) / 8);
c5614fa4
AM
8729 if (skip == NULL)
8730 goto error_ret;
8731 }
8732
ba761f19 8733 skip[val >> 3] = ref_from_discarded;
c5614fa4
AM
8734 }
8735
8736 if (elf_section_data (sec)->relocs != relstart)
8737 free (relstart);
8738 }
8739
ba761f19
AM
8740 /* For largetoc loads of address constants, we can convert
8741 . addis rx,2,addr@got@ha
8742 . ld ry,addr@got@l(rx)
8743 to
8744 . addis rx,2,addr@toc@ha
8745 . addi ry,rx,addr@toc@l
8746 when addr is within 2G of the toc pointer. This then means
8747 that the word storing "addr" in the toc is no longer needed. */
68ffbac6 8748
ba761f19
AM
8749 if (!ppc64_elf_tdata (ibfd)->has_small_toc_reloc
8750 && toc->output_section->rawsize < (bfd_vma) 1 << 31
8751 && toc->reloc_count != 0)
8752 {
8753 /* Read toc relocs. */
425b145b
AM
8754 toc_relocs = _bfd_elf_link_read_relocs (ibfd, toc, NULL, NULL,
8755 info->keep_memory);
8756 if (toc_relocs == NULL)
ba761f19
AM
8757 goto error_ret;
8758
425b145b 8759 for (rel = toc_relocs; rel < toc_relocs + toc->reloc_count; ++rel)
ba761f19
AM
8760 {
8761 enum elf_ppc64_reloc_type r_type;
8762 unsigned long r_symndx;
8763 asection *sym_sec;
8764 struct elf_link_hash_entry *h;
8765 Elf_Internal_Sym *sym;
8766 bfd_vma val, addr;
8767
8768 r_type = ELF64_R_TYPE (rel->r_info);
8769 if (r_type != R_PPC64_ADDR64)
8770 continue;
8771
8772 r_symndx = ELF64_R_SYM (rel->r_info);
8773 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms,
8774 r_symndx, ibfd))
8775 goto error_ret;
8776
425b145b 8777 if (sym_sec == NULL
c27b8c2a 8778 || sym_sec->output_section == NULL
dbaa2011 8779 || discarded_section (sym_sec))
425b145b
AM
8780 continue;
8781
afe397ea 8782 if (!SYMBOL_REFERENCES_LOCAL (info, h))
ba761f19
AM
8783 continue;
8784
8785 if (h != NULL)
bddc25c9
AM
8786 {
8787 if (h->type == STT_GNU_IFUNC)
8788 continue;
8789 val = h->root.u.def.value;
8790 }
ba761f19 8791 else
bddc25c9
AM
8792 {
8793 if (ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC)
8794 continue;
8795 val = sym->st_value;
8796 }
ba761f19
AM
8797 val += rel->r_addend;
8798 val += sym_sec->output_section->vma + sym_sec->output_offset;
8799
8800 /* We don't yet know the exact toc pointer value, but we
8801 know it will be somewhere in the toc section. Don't
8802 optimize if the difference from any possible toc
8803 pointer is outside [ff..f80008000, 7fff7fff]. */
8804 addr = toc->output_section->vma + TOC_BASE_OFF;
8805 if (val - addr + (bfd_vma) 0x80008000 >= (bfd_vma) 1 << 32)
8806 continue;
8807
8808 addr = toc->output_section->vma + toc->output_section->rawsize;
8809 if (val - addr + (bfd_vma) 0x80008000 >= (bfd_vma) 1 << 32)
8810 continue;
8811
8812 if (skip == NULL)
8813 {
8814 skip = bfd_zmalloc (sizeof (*skip) * (toc->size + 15) / 8);
8815 if (skip == NULL)
8816 goto error_ret;
8817 }
8818
8819 skip[rel->r_offset >> 3]
425b145b 8820 |= can_optimize | ((rel - toc_relocs) << 2);
ba761f19 8821 }
ba761f19
AM
8822 }
8823
c5614fa4
AM
8824 if (skip == NULL)
8825 continue;
8826
8827 used = bfd_zmalloc (sizeof (*used) * (toc->size + 7) / 8);
8828 if (used == NULL)
8829 {
8830 error_ret:
c9594989 8831 if (symtab_hdr->contents != (unsigned char *) local_syms)
c5614fa4
AM
8832 free (local_syms);
8833 if (sec != NULL
c5614fa4
AM
8834 && elf_section_data (sec)->relocs != relstart)
8835 free (relstart);
c9594989 8836 if (elf_section_data (toc)->relocs != toc_relocs)
425b145b 8837 free (toc_relocs);
c9594989 8838 free (skip);
c5614fa4
AM
8839 return FALSE;
8840 }
8841
30038c59
AM
8842 /* Now check all kept sections that might reference the toc.
8843 Check the toc itself last. */
8844 for (sec = (ibfd->sections == toc && toc->next ? toc->next
8845 : ibfd->sections);
c5614fa4 8846 sec != NULL;
c5614fa4 8847 sec = (sec == toc ? NULL
c5614fa4 8848 : sec->next == NULL ? toc
30038c59 8849 : sec->next == toc && toc->next ? toc->next
c5614fa4
AM
8850 : sec->next))
8851 {
8852 int repeat;
8853
8854 if (sec->reloc_count == 0
dbaa2011 8855 || discarded_section (sec)
c5614fa4
AM
8856 || get_opd_info (sec)
8857 || (sec->flags & SEC_ALLOC) == 0
8858 || (sec->flags & SEC_DEBUGGING) != 0)
8859 continue;
8860
854b41e7
AM
8861 relstart = _bfd_elf_link_read_relocs (ibfd, sec, NULL, NULL,
8862 info->keep_memory);
c5614fa4 8863 if (relstart == NULL)
2915c55b
JK
8864 {
8865 free (used);
8866 goto error_ret;
8867 }
c5614fa4
AM
8868
8869 /* Mark toc entries referenced as used. */
c5614fa4 8870 do
d4f1ee75
AM
8871 {
8872 repeat = 0;
8873 for (rel = relstart; rel < relstart + sec->reloc_count; ++rel)
8874 {
8875 enum elf_ppc64_reloc_type r_type;
8876 unsigned long r_symndx;
8877 asection *sym_sec;
8878 struct elf_link_hash_entry *h;
8879 Elf_Internal_Sym *sym;
8880 bfd_vma val;
98528052 8881
d4f1ee75 8882 r_type = ELF64_R_TYPE (rel->r_info);
d4f1ee75
AM
8883 switch (r_type)
8884 {
8885 case R_PPC64_TOC16:
8886 case R_PPC64_TOC16_LO:
8887 case R_PPC64_TOC16_HI:
8888 case R_PPC64_TOC16_HA:
8889 case R_PPC64_TOC16_DS:
8890 case R_PPC64_TOC16_LO_DS:
8891 /* In case we're taking addresses of toc entries. */
8892 case R_PPC64_ADDR64:
8893 break;
c5614fa4 8894
d4f1ee75
AM
8895 default:
8896 continue;
8897 }
c5614fa4 8898
d4f1ee75
AM
8899 r_symndx = ELF64_R_SYM (rel->r_info);
8900 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms,
8901 r_symndx, ibfd))
8902 {
8903 free (used);
8904 goto error_ret;
8905 }
c5614fa4 8906
d4f1ee75
AM
8907 if (sym_sec != toc)
8908 continue;
c5614fa4 8909
d4f1ee75
AM
8910 if (h != NULL)
8911 val = h->root.u.def.value;
8912 else
8913 val = sym->st_value;
8914 val += rel->r_addend;
ba761f19 8915
d4f1ee75
AM
8916 if (val >= toc->size)
8917 continue;
ba761f19 8918
d4f1ee75
AM
8919 if ((skip[val >> 3] & can_optimize) != 0)
8920 {
8921 bfd_vma off;
8922 unsigned char opc;
8923
8924 switch (r_type)
8925 {
8926 case R_PPC64_TOC16_HA:
ba761f19 8927 break;
ba761f19 8928
d4f1ee75
AM
8929 case R_PPC64_TOC16_LO_DS:
8930 off = rel->r_offset;
8931 off += (bfd_big_endian (ibfd) ? -2 : 3);
8932 if (!bfd_get_section_contents (ibfd, sec, &opc,
8933 off, 1))
8934 {
8935 free (used);
8936 goto error_ret;
8937 }
8938 if ((opc & (0x3f << 2)) == (58u << 2))
8939 break;
1a0670f3 8940 /* Fall through. */
ba761f19 8941
d4f1ee75
AM
8942 default:
8943 /* Wrong sort of reloc, or not a ld. We may
8944 as well clear ref_from_discarded too. */
8945 skip[val >> 3] = 0;
8946 }
8947 }
8948
8949 if (sec != toc)
8950 used[val >> 3] = 1;
8951 /* For the toc section, we only mark as used if this
8952 entry itself isn't unused. */
8953 else if ((used[rel->r_offset >> 3]
8954 || !(skip[rel->r_offset >> 3] & ref_from_discarded))
8955 && !used[val >> 3])
8956 {
8957 /* Do all the relocs again, to catch reference
8958 chains. */
8959 repeat = 1;
8960 used[val >> 3] = 1;
8961 }
8962 }
8963 }
c5614fa4 8964 while (repeat);
854b41e7
AM
8965
8966 if (elf_section_data (sec)->relocs != relstart)
8967 free (relstart);
c5614fa4
AM
8968 }
8969
8970 /* Merge the used and skip arrays. Assume that TOC
8971 doublewords not appearing as either used or unused belong
de194d85 8972 to an entry more than one doubleword in size. */
c5614fa4
AM
8973 for (drop = skip, keep = used, last = 0, some_unused = 0;
8974 drop < skip + (toc->size + 7) / 8;
8975 ++drop, ++keep)
8976 {
8977 if (*keep)
8978 {
ba761f19
AM
8979 *drop &= ~ref_from_discarded;
8980 if ((*drop & can_optimize) != 0)
8981 some_unused = 1;
c5614fa4
AM
8982 last = 0;
8983 }
b140b010 8984 else if ((*drop & ref_from_discarded) != 0)
c5614fa4
AM
8985 {
8986 some_unused = 1;
ba761f19 8987 last = ref_from_discarded;
c5614fa4
AM
8988 }
8989 else
8990 *drop = last;
8991 }
8992
8993 free (used);
8994
8995 if (some_unused)
8996 {
8997 bfd_byte *contents, *src;
8998 unsigned long off;
d62b3684 8999 Elf_Internal_Sym *sym;
ba761f19 9000 bfd_boolean local_toc_syms = FALSE;
c5614fa4
AM
9001
9002 /* Shuffle the toc contents, and at the same time convert the
9003 skip array from booleans into offsets. */
9004 if (!bfd_malloc_and_get_section (ibfd, toc, &contents))
9005 goto error_ret;
9006
9007 elf_section_data (toc)->this_hdr.contents = contents;
9008
9009 for (src = contents, off = 0, drop = skip;
9010 src < contents + toc->size;
9011 src += 8, ++drop)
9012 {
ba761f19
AM
9013 if ((*drop & (can_optimize | ref_from_discarded)) != 0)
9014 off += 8;
c5614fa4
AM
9015 else if (off != 0)
9016 {
9017 *drop = off;
9018 memcpy (src - off, src, 8);
9019 }
9020 }
854b41e7 9021 *drop = off;
c5614fa4
AM
9022 toc->rawsize = toc->size;
9023 toc->size = src - contents - off;
9024
ba761f19
AM
9025 /* Adjust addends for relocs against the toc section sym,
9026 and optimize any accesses we can. */
c5614fa4
AM
9027 for (sec = ibfd->sections; sec != NULL; sec = sec->next)
9028 {
9029 if (sec->reloc_count == 0
dbaa2011 9030 || discarded_section (sec))
c5614fa4
AM
9031 continue;
9032
9033 relstart = _bfd_elf_link_read_relocs (ibfd, sec, NULL, NULL,
854b41e7 9034 info->keep_memory);
c5614fa4
AM
9035 if (relstart == NULL)
9036 goto error_ret;
9037
9038 for (rel = relstart; rel < relstart + sec->reloc_count; ++rel)
9039 {
9040 enum elf_ppc64_reloc_type r_type;
9041 unsigned long r_symndx;
9042 asection *sym_sec;
9043 struct elf_link_hash_entry *h;
854b41e7 9044 bfd_vma val;
c5614fa4
AM
9045
9046 r_type = ELF64_R_TYPE (rel->r_info);
9047 switch (r_type)
9048 {
9049 default:
9050 continue;
9051
9052 case R_PPC64_TOC16:
9053 case R_PPC64_TOC16_LO:
9054 case R_PPC64_TOC16_HI:
9055 case R_PPC64_TOC16_HA:
9056 case R_PPC64_TOC16_DS:
9057 case R_PPC64_TOC16_LO_DS:
9058 case R_PPC64_ADDR64:
9059 break;
9060 }
9061
9062 r_symndx = ELF64_R_SYM (rel->r_info);
9063 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms,
9064 r_symndx, ibfd))
9065 goto error_ret;
9066
ba761f19 9067 if (sym_sec != toc)
c5614fa4
AM
9068 continue;
9069
ba761f19
AM
9070 if (h != NULL)
9071 val = h->root.u.def.value;
9072 else
9073 {
9074 val = sym->st_value;
9075 if (val != 0)
9076 local_toc_syms = TRUE;
9077 }
9078
9079 val += rel->r_addend;
854b41e7
AM
9080
9081 if (val > toc->rawsize)
9082 val = toc->rawsize;
ba761f19
AM
9083 else if ((skip[val >> 3] & ref_from_discarded) != 0)
9084 continue;
9085 else if ((skip[val >> 3] & can_optimize) != 0)
9086 {
9087 Elf_Internal_Rela *tocrel
425b145b 9088 = toc_relocs + (skip[val >> 3] >> 2);
ba761f19
AM
9089 unsigned long tsym = ELF64_R_SYM (tocrel->r_info);
9090
9091 switch (r_type)
9092 {
9093 case R_PPC64_TOC16_HA:
9094 rel->r_info = ELF64_R_INFO (tsym, R_PPC64_TOC16_HA);
9095 break;
9096
9097 case R_PPC64_TOC16_LO_DS:
9098 rel->r_info = ELF64_R_INFO (tsym, R_PPC64_LO_DS_OPT);
9099 break;
9100
9101 default:
28942f62
AM
9102 if (!ppc64_elf_howto_table[R_PPC64_ADDR32])
9103 ppc_howto_init ();
b140b010 9104 info->callbacks->einfo
695344c0 9105 /* xgettext:c-format */
174d0a74 9106 (_("%H: %s references "
b140b010
AM
9107 "optimized away TOC entry\n"),
9108 ibfd, sec, rel->r_offset,
9109 ppc64_elf_howto_table[r_type]->name);
9110 bfd_set_error (bfd_error_bad_value);
9111 goto error_ret;
ba761f19
AM
9112 }
9113 rel->r_addend = tocrel->r_addend;
9114 elf_section_data (sec)->relocs = relstart;
9115 continue;
9116 }
9117
9118 if (h != NULL || sym->st_value != 0)
9119 continue;
854b41e7
AM
9120
9121 rel->r_addend -= skip[val >> 3];
9122 elf_section_data (sec)->relocs = relstart;
c5614fa4 9123 }
854b41e7
AM
9124
9125 if (elf_section_data (sec)->relocs != relstart)
9126 free (relstart);
c5614fa4
AM
9127 }
9128
9129 /* We shouldn't have local or global symbols defined in the TOC,
9130 but handle them anyway. */
df22d223
AM
9131 if (local_syms != NULL)
9132 for (sym = local_syms;
9133 sym < local_syms + symtab_hdr->sh_info;
9134 ++sym)
9135 if (sym->st_value != 0
9136 && bfd_section_from_elf_index (ibfd, sym->st_shndx) == toc)
9137 {
9138 unsigned long i;
854b41e7 9139
df22d223
AM
9140 if (sym->st_value > toc->rawsize)
9141 i = toc->rawsize >> 3;
9142 else
9143 i = sym->st_value >> 3;
854b41e7 9144
df22d223
AM
9145 if ((skip[i] & (ref_from_discarded | can_optimize)) != 0)
9146 {
9147 if (local_toc_syms)
4eca0228 9148 _bfd_error_handler
df22d223
AM
9149 (_("%s defined on removed toc entry"),
9150 bfd_elf_sym_name (ibfd, symtab_hdr, sym, NULL));
9151 do
9152 ++i;
9153 while ((skip[i] & (ref_from_discarded | can_optimize)));
9154 sym->st_value = (bfd_vma) i << 3;
9155 }
d62b3684 9156
df22d223
AM
9157 sym->st_value -= skip[i];
9158 symtab_hdr->contents = (unsigned char *) local_syms;
9159 }
c5614fa4 9160
854b41e7 9161 /* Adjust any global syms defined in this toc input section. */
c5614fa4
AM
9162 if (toc_inf.global_toc_syms)
9163 {
9164 toc_inf.toc = toc;
9165 toc_inf.skip = skip;
9166 toc_inf.global_toc_syms = FALSE;
9167 elf_link_hash_traverse (elf_hash_table (info), adjust_toc_syms,
9168 &toc_inf);
9169 }
854b41e7
AM
9170
9171 if (toc->reloc_count != 0)
9172 {
d4730f92 9173 Elf_Internal_Shdr *rel_hdr;
854b41e7
AM
9174 Elf_Internal_Rela *wrel;
9175 bfd_size_type sz;
9176
854b41e7 9177 /* Remove unused toc relocs, and adjust those we keep. */
28be611c
AM
9178 if (toc_relocs == NULL)
9179 toc_relocs = _bfd_elf_link_read_relocs (ibfd, toc, NULL, NULL,
9180 info->keep_memory);
9181 if (toc_relocs == NULL)
9182 goto error_ret;
9183
425b145b
AM
9184 wrel = toc_relocs;
9185 for (rel = toc_relocs; rel < toc_relocs + toc->reloc_count; ++rel)
ba761f19
AM
9186 if ((skip[rel->r_offset >> 3]
9187 & (ref_from_discarded | can_optimize)) == 0)
854b41e7
AM
9188 {
9189 wrel->r_offset = rel->r_offset - skip[rel->r_offset >> 3];
9190 wrel->r_info = rel->r_info;
9191 wrel->r_addend = rel->r_addend;
9192 ++wrel;
9193 }
9194 else if (!dec_dynrel_count (rel->r_info, toc, info,
9195 &local_syms, NULL, NULL))
9196 goto error_ret;
9197
425b145b
AM
9198 elf_section_data (toc)->relocs = toc_relocs;
9199 toc->reloc_count = wrel - toc_relocs;
d4730f92
BS
9200 rel_hdr = _bfd_elf_single_rel_hdr (toc);
9201 sz = rel_hdr->sh_entsize;
9202 rel_hdr->sh_size = toc->reloc_count * sz;
854b41e7 9203 }
c5614fa4 9204 }
c9594989 9205 else if (elf_section_data (toc)->relocs != toc_relocs)
425b145b 9206 free (toc_relocs);
c5614fa4
AM
9207
9208 if (local_syms != NULL
9209 && symtab_hdr->contents != (unsigned char *) local_syms)
9210 {
9211 if (!info->keep_memory)
9212 free (local_syms);
9213 else
9214 symtab_hdr->contents = (unsigned char *) local_syms;
9215 }
9216 free (skip);
9217 }
9218
066f4018 9219 /* Look for cases where we can change an indirect GOT access to
4a421c53
AM
9220 a GOT relative or PC relative access, possibly reducing the
9221 number of GOT entries. */
066f4018
AM
9222 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
9223 {
9224 asection *sec;
9225 Elf_Internal_Shdr *symtab_hdr;
9226 Elf_Internal_Sym *local_syms;
9227 Elf_Internal_Rela *relstart, *rel;
9228 bfd_vma got;
9229
9230 if (!is_ppc64_elf (ibfd))
9231 continue;
9232
903b777d 9233 if (!ppc64_elf_tdata (ibfd)->has_optrel)
066f4018
AM
9234 continue;
9235
9236 sec = ppc64_elf_tdata (ibfd)->got;
903b777d
AM
9237 got = 0;
9238 if (sec != NULL)
9239 got = sec->output_section->vma + sec->output_offset + 0x8000;
066f4018
AM
9240
9241 local_syms = NULL;
9242 symtab_hdr = &elf_symtab_hdr (ibfd);
9243
9244 for (sec = ibfd->sections; sec != NULL; sec = sec->next)
9245 {
9246 if (sec->reloc_count == 0
903b777d 9247 || !ppc64_elf_section_data (sec)->has_optrel
066f4018
AM
9248 || discarded_section (sec))
9249 continue;
9250
9251 relstart = _bfd_elf_link_read_relocs (ibfd, sec, NULL, NULL,
9252 info->keep_memory);
9253 if (relstart == NULL)
9254 {
9255 got_error_ret:
c9594989 9256 if (symtab_hdr->contents != (unsigned char *) local_syms)
066f4018
AM
9257 free (local_syms);
9258 if (sec != NULL
066f4018
AM
9259 && elf_section_data (sec)->relocs != relstart)
9260 free (relstart);
9261 return FALSE;
9262 }
9263
9264 for (rel = relstart; rel < relstart + sec->reloc_count; ++rel)
9265 {
9266 enum elf_ppc64_reloc_type r_type;
9267 unsigned long r_symndx;
9268 Elf_Internal_Sym *sym;
9269 asection *sym_sec;
9270 struct elf_link_hash_entry *h;
9271 struct got_entry *ent;
133a1f60 9272 bfd_vma val, pc;
4a421c53 9273 unsigned char buf[8];
066f4018 9274 unsigned int insn;
903b777d 9275 enum {no_check, check_lo, check_ha} insn_check;
066f4018
AM
9276
9277 r_type = ELF64_R_TYPE (rel->r_info);
903b777d
AM
9278 switch (r_type)
9279 {
9280 default:
9281 insn_check = no_check;
9282 break;
9283
9284 case R_PPC64_PLT16_HA:
9285 case R_PPC64_GOT_TLSLD16_HA:
9286 case R_PPC64_GOT_TLSGD16_HA:
9287 case R_PPC64_GOT_TPREL16_HA:
9288 case R_PPC64_GOT_DTPREL16_HA:
9289 case R_PPC64_GOT16_HA:
9290 case R_PPC64_TOC16_HA:
9291 insn_check = check_ha;
9292 break;
9293
9294 case R_PPC64_PLT16_LO:
9295 case R_PPC64_PLT16_LO_DS:
9296 case R_PPC64_GOT_TLSLD16_LO:
9297 case R_PPC64_GOT_TLSGD16_LO:
9298 case R_PPC64_GOT_TPREL16_LO_DS:
9299 case R_PPC64_GOT_DTPREL16_LO_DS:
9300 case R_PPC64_GOT16_LO:
9301 case R_PPC64_GOT16_LO_DS:
9302 case R_PPC64_TOC16_LO:
9303 case R_PPC64_TOC16_LO_DS:
9304 insn_check = check_lo;
9305 break;
9306 }
9307
9308 if (insn_check != no_check)
9309 {
9310 bfd_vma off = rel->r_offset & ~3;
9311
9312 if (!bfd_get_section_contents (ibfd, sec, buf, off, 4))
9313 goto got_error_ret;
9314
9315 insn = bfd_get_32 (ibfd, buf);
9316 if (insn_check == check_lo
9317 ? !ok_lo_toc_insn (insn, r_type)
2365f8d7 9318 : ((insn & ((0x3fu << 26) | 0x1f << 16))
903b777d
AM
9319 != ((15u << 26) | (2 << 16)) /* addis rt,2,imm */))
9320 {
9321 char str[12];
9322
9323 ppc64_elf_tdata (ibfd)->unexpected_toc_insn = 1;
9324 sprintf (str, "%#08x", insn);
9325 info->callbacks->einfo
9326 /* xgettext:c-format */
9327 (_("%H: got/toc optimization is not supported for"
9328 " %s instruction\n"),
9329 ibfd, sec, rel->r_offset & ~3, str);
9330 continue;
9331 }
9332 }
9333
066f4018
AM
9334 switch (r_type)
9335 {
bb22a418
AM
9336 /* Note that we don't delete GOT entries for
9337 R_PPC64_GOT16_DS since we'd need a lot more
9338 analysis. For starters, the preliminary layout is
9339 before the GOT, PLT, dynamic sections and stubs are
9340 laid out. Then we'd need to allow for changes in
9341 distance between sections caused by alignment. */
066f4018
AM
9342 default:
9343 continue;
9344
066f4018
AM
9345 case R_PPC64_GOT16_HA:
9346 case R_PPC64_GOT16_LO_DS:
4a421c53 9347 case R_PPC64_GOT_PCREL34:
066f4018
AM
9348 break;
9349 }
9350
9351 r_symndx = ELF64_R_SYM (rel->r_info);
9352 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms,
9353 r_symndx, ibfd))
9354 goto got_error_ret;
9355
6d5554a6
AM
9356 if (sym_sec == NULL
9357 || sym_sec->output_section == NULL
9358 || discarded_section (sym_sec))
9359 continue;
9360
06507dab
AM
9361 if ((h ? h->type : ELF_ST_TYPE (sym->st_info)) == STT_GNU_IFUNC)
9362 continue;
9363
066f4018
AM
9364 if (!SYMBOL_REFERENCES_LOCAL (info, h))
9365 continue;
9366
9367 if (h != NULL)
9368 val = h->root.u.def.value;
9369 else
9370 val = sym->st_value;
133a1f60 9371 val += rel->r_addend;
066f4018
AM
9372 val += sym_sec->output_section->vma + sym_sec->output_offset;
9373
bb22a418
AM
9374/* Fudge factor to allow for the fact that the preliminary layout
9375 isn't exact. Reduce limits by this factor. */
9376#define LIMIT_ADJUST(LIMIT) ((LIMIT) - (LIMIT) / 16)
9377
066f4018
AM
9378 switch (r_type)
9379 {
9380 default:
9381 continue;
9382
066f4018 9383 case R_PPC64_GOT16_HA:
bb22a418
AM
9384 if (val - got + LIMIT_ADJUST (0x80008000ULL)
9385 >= LIMIT_ADJUST (0x100000000ULL))
066f4018
AM
9386 continue;
9387
9388 if (!bfd_get_section_contents (ibfd, sec, buf,
9389 rel->r_offset & ~3, 4))
9390 goto got_error_ret;
9391 insn = bfd_get_32 (ibfd, buf);
2365f8d7 9392 if (((insn & ((0x3fu << 26) | 0x1f << 16))
066f4018
AM
9393 != ((15u << 26) | (2 << 16)) /* addis rt,2,imm */))
9394 continue;
9395 break;
9396
9397 case R_PPC64_GOT16_LO_DS:
bb22a418
AM
9398 if (val - got + LIMIT_ADJUST (0x80008000ULL)
9399 >= LIMIT_ADJUST (0x100000000ULL))
066f4018
AM
9400 continue;
9401 if (!bfd_get_section_contents (ibfd, sec, buf,
9402 rel->r_offset & ~3, 4))
9403 goto got_error_ret;
9404 insn = bfd_get_32 (ibfd, buf);
2365f8d7 9405 if ((insn & (0x3fu << 26 | 0x3)) != 58u << 26 /* ld */)
066f4018
AM
9406 continue;
9407 break;
4a421c53
AM
9408
9409 case R_PPC64_GOT_PCREL34:
9410 pc = rel->r_offset;
9411 pc += sec->output_section->vma + sec->output_offset;
bb22a418
AM
9412 if (val - pc + LIMIT_ADJUST (1ULL << 33)
9413 >= LIMIT_ADJUST (1ULL << 34))
4a421c53
AM
9414 continue;
9415 if (!bfd_get_section_contents (ibfd, sec, buf,
9416 rel->r_offset & ~3, 8))
9417 goto got_error_ret;
9418 insn = bfd_get_32 (ibfd, buf);
9419 if ((insn & (-1u << 18)) != ((1u << 26) | (1u << 20)))
9420 continue;
9421 insn = bfd_get_32 (ibfd, buf + 4);
2365f8d7 9422 if ((insn & (0x3fu << 26)) != 57u << 26)
4a421c53
AM
9423 continue;
9424 break;
066f4018 9425 }
bb22a418 9426#undef LIMIT_ADJUST
066f4018
AM
9427
9428 if (h != NULL)
9429 ent = h->got.glist;
9430 else
9431 {
9432 struct got_entry **local_got_ents = elf_local_got_ents (ibfd);
9433 ent = local_got_ents[r_symndx];
9434 }
9435 for (; ent != NULL; ent = ent->next)
133a1f60 9436 if (ent->addend == rel->r_addend
066f4018
AM
9437 && ent->owner == ibfd
9438 && ent->tls_type == 0)
9439 break;
9440 BFD_ASSERT (ent && ent->got.refcount > 0);
9441 ent->got.refcount -= 1;
9442 }
9443
9444 if (elf_section_data (sec)->relocs != relstart)
9445 free (relstart);
9446 }
9447
9448 if (local_syms != NULL
9449 && symtab_hdr->contents != (unsigned char *) local_syms)
9450 {
9451 if (!info->keep_memory)
9452 free (local_syms);
9453 else
9454 symtab_hdr->contents = (unsigned char *) local_syms;
9455 }
9456 }
9457
c5614fa4
AM
9458 return TRUE;
9459}
9460
1bbe0902
AM
9461/* Return true iff input section I references the TOC using
9462 instructions limited to +/-32k offsets. */
9463
9464bfd_boolean
9465ppc64_elf_has_small_toc_reloc (asection *i)
9466{
9467 return (is_ppc64_elf (i->owner)
9468 && ppc64_elf_tdata (i->owner)->has_small_toc_reloc);
9469}
9470
927be08e
AM
9471/* Allocate space for one GOT entry. */
9472
9473static void
9474allocate_got (struct elf_link_hash_entry *h,
9475 struct bfd_link_info *info,
9476 struct got_entry *gent)
9477{
9478 struct ppc_link_hash_table *htab = ppc_hash_table (info);
ed7007c1 9479 struct ppc_link_hash_entry *eh = ppc_elf_hash_entry (h);
927be08e
AM
9480 int entsize = (gent->tls_type & eh->tls_mask & (TLS_GD | TLS_LD)
9481 ? 16 : 8);
9482 int rentsize = (gent->tls_type & eh->tls_mask & TLS_GD
9483 ? 2 : 1) * sizeof (Elf64_External_Rela);
9484 asection *got = ppc64_elf_tdata (gent->owner)->got;
9485
9486 gent->got.offset = got->size;
9487 got->size += entsize;
9488
19e08130 9489 if (h->type == STT_GNU_IFUNC)
927be08e 9490 {
33e44f2e 9491 htab->elf.irelplt->size += rentsize;
19e08130 9492 htab->got_reli_size += rentsize;
927be08e 9493 }
f15d0b54 9494 else if (((bfd_link_pic (info)
f749f26e 9495 && !(gent->tls_type != 0
f15d0b54
AM
9496 && bfd_link_executable (info)
9497 && SYMBOL_REFERENCES_LOCAL (info, h)))
f0158f44
AM
9498 || (htab->elf.dynamic_sections_created
9499 && h->dynindx != -1
9500 && !SYMBOL_REFERENCES_LOCAL (info, h)))
21d68fcd 9501 && !UNDEFWEAK_NO_DYNAMIC_RELOC (info, h))
927be08e 9502 {
19e08130 9503 asection *relgot = ppc64_elf_tdata (gent->owner)->relgot;
927be08e 9504 relgot->size += rentsize;
927be08e
AM
9505 }
9506}
9507
7865406b
AM
9508/* This function merges got entries in the same toc group. */
9509
9510static void
9511merge_got_entries (struct got_entry **pent)
9512{
9513 struct got_entry *ent, *ent2;
9514
9515 for (ent = *pent; ent != NULL; ent = ent->next)
9516 if (!ent->is_indirect)
9517 for (ent2 = ent->next; ent2 != NULL; ent2 = ent2->next)
9518 if (!ent2->is_indirect
9519 && ent2->addend == ent->addend
9520 && ent2->tls_type == ent->tls_type
9521 && elf_gp (ent2->owner) == elf_gp (ent->owner))
9522 {
9523 ent2->is_indirect = TRUE;
9524 ent2->got.ent = ent;
9525 }
9526}
9527
46434633 9528/* If H is undefined, make it dynamic if that makes sense. */
f0158f44
AM
9529
9530static bfd_boolean
46434633
AM
9531ensure_undef_dynamic (struct bfd_link_info *info,
9532 struct elf_link_hash_entry *h)
f0158f44
AM
9533{
9534 struct elf_link_hash_table *htab = elf_hash_table (info);
9535
9536 if (htab->dynamic_sections_created
46434633
AM
9537 && ((info->dynamic_undefined_weak != 0
9538 && h->root.type == bfd_link_hash_undefweak)
9539 || h->root.type == bfd_link_hash_undefined)
f0158f44
AM
9540 && h->dynindx == -1
9541 && !h->forced_local
9542 && ELF_ST_VISIBILITY (h->other) == STV_DEFAULT)
9543 return bfd_elf_link_record_dynamic_symbol (info, h);
9544 return TRUE;
9545}
9546
65f38f15
AM
9547/* Allocate space in .plt, .got and associated reloc sections for
9548 dynamic relocs. */
5bd4f169 9549
b34976b6 9550static bfd_boolean
4ce794b7 9551allocate_dynrelocs (struct elf_link_hash_entry *h, void *inf)
5bd4f169 9552{
65f38f15
AM
9553 struct bfd_link_info *info;
9554 struct ppc_link_hash_table *htab;
5bd4f169 9555 asection *s;
65f38f15 9556 struct ppc_link_hash_entry *eh;
0b8bcf0d 9557 struct got_entry **pgent, *gent;
5bd4f169 9558
e92d460e 9559 if (h->root.type == bfd_link_hash_indirect)
b34976b6 9560 return TRUE;
5bd4f169 9561
65f38f15
AM
9562 info = (struct bfd_link_info *) inf;
9563 htab = ppc_hash_table (info);
4dfe6ac6
NC
9564 if (htab == NULL)
9565 return FALSE;
5bd4f169 9566
ed7007c1 9567 eh = ppc_elf_hash_entry (h);
951fd09b
AM
9568 /* Run through the TLS GD got entries first if we're changing them
9569 to TPREL. */
b00a0a86 9570 if ((eh->tls_mask & (TLS_TLS | TLS_GDIE)) == (TLS_TLS | TLS_GDIE))
951fd09b
AM
9571 for (gent = h->got.glist; gent != NULL; gent = gent->next)
9572 if (gent->got.refcount > 0
9573 && (gent->tls_type & TLS_GD) != 0)
9574 {
9575 /* This was a GD entry that has been converted to TPREL. If
9576 there happens to be a TPREL entry we can use that one. */
9577 struct got_entry *ent;
9578 for (ent = h->got.glist; ent != NULL; ent = ent->next)
9579 if (ent->got.refcount > 0
9580 && (ent->tls_type & TLS_TPREL) != 0
e717da7e
AM
9581 && ent->addend == gent->addend
9582 && ent->owner == gent->owner)
951fd09b
AM
9583 {
9584 gent->got.refcount = 0;
9585 break;
9586 }
9587
9588 /* If not, then we'll be using our own TPREL entry. */
9589 if (gent->got.refcount != 0)
9590 gent->tls_type = TLS_TLS | TLS_TPREL;
9591 }
9592
7865406b
AM
9593 /* Remove any list entry that won't generate a word in the GOT before
9594 we call merge_got_entries. Otherwise we risk merging to empty
9595 entries. */
0b8bcf0d
AM
9596 pgent = &h->got.glist;
9597 while ((gent = *pgent) != NULL)
411e1bfb 9598 if (gent->got.refcount > 0)
7865406b
AM
9599 {
9600 if ((gent->tls_type & TLS_LD) != 0
f749f26e 9601 && SYMBOL_REFERENCES_LOCAL (info, h))
7865406b
AM
9602 {
9603 ppc64_tlsld_got (gent->owner)->got.refcount += 1;
9604 *pgent = gent->next;
9605 }
9606 else
9607 pgent = &gent->next;
9608 }
9609 else
9610 *pgent = gent->next;
9611
9612 if (!htab->do_multi_toc)
9613 merge_got_entries (&h->got.glist);
9614
9615 for (gent = h->got.glist; gent != NULL; gent = gent->next)
9616 if (!gent->is_indirect)
411e1bfb 9617 {
ec73ddcd
AM
9618 /* Ensure we catch all the cases where this symbol should
9619 be made dynamic. */
46434633 9620 if (!ensure_undef_dynamic (info, h))
f0158f44 9621 return FALSE;
65f38f15 9622
0c8d6e5c 9623 if (!is_ppc64_elf (gent->owner))
927be08e 9624 abort ();
0ffa91dd 9625
927be08e 9626 allocate_got (h, info, gent);
411e1bfb 9627 }
65f38f15 9628
954b63d4
AM
9629 /* If no dynamic sections we can't have dynamic relocs, except for
9630 IFUNCs which are handled even in static executables. */
8a2058b5
AM
9631 if (!htab->elf.dynamic_sections_created
9632 && h->type != STT_GNU_IFUNC)
9633 eh->dyn_relocs = NULL;
9634
529fe20e
AM
9635 /* Discard relocs on undefined symbols that must be local. */
9636 else if (h->root.type == bfd_link_hash_undefined
9637 && ELF_ST_VISIBILITY (h->other) != STV_DEFAULT)
9638 eh->dyn_relocs = NULL;
9639
954b63d4
AM
9640 /* Also discard relocs on undefined weak syms with non-default
9641 visibility, or when dynamic_undefined_weak says so. */
21d68fcd 9642 else if (UNDEFWEAK_NO_DYNAMIC_RELOC (info, h))
954b63d4
AM
9643 eh->dyn_relocs = NULL;
9644
8a2058b5 9645 if (eh->dyn_relocs != NULL)
65f38f15 9646 {
8a2058b5
AM
9647 struct elf_dyn_relocs *p, **pp;
9648
57e7d118
AM
9649 /* In the shared -Bsymbolic case, discard space allocated for
9650 dynamic pc-relative relocs against symbols which turn out to
9651 be defined in regular objects. For the normal shared case,
9652 discard space for relocs that have become local due to symbol
9653 visibility changes. */
57e7d118 9654 if (bfd_link_pic (info))
65f38f15 9655 {
57e7d118
AM
9656 /* Relocs that use pc_count are those that appear on a call
9657 insn, or certain REL relocs (see must_be_dyn_reloc) that
9658 can be generated via assembly. We want calls to
9659 protected symbols to resolve directly to the function
9660 rather than going via the plt. If people want function
9661 pointer comparisons to work as expected then they should
9662 avoid writing weird assembly. */
9663 if (SYMBOL_CALLS_LOCAL (info, h))
9664 {
57e7d118
AM
9665 for (pp = &eh->dyn_relocs; (p = *pp) != NULL; )
9666 {
9667 p->count -= p->pc_count;
9668 p->pc_count = 0;
9669 if (p->count == 0)
9670 *pp = p->next;
9671 else
9672 pp = &p->next;
9673 }
9674 }
65f38f15 9675
954b63d4 9676 if (eh->dyn_relocs != NULL)
5bd4f169 9677 {
ec73ddcd
AM
9678 /* Ensure we catch all the cases where this symbol
9679 should be made dynamic. */
46434633 9680 if (!ensure_undef_dynamic (info, h))
f0158f44 9681 return FALSE;
5bd4f169 9682 }
65f38f15 9683 }
ec73ddcd
AM
9684
9685 /* For a fixed position executable, discard space for
9686 relocs against symbols which are not dynamic. */
9687 else if (h->type != STT_GNU_IFUNC)
57e7d118 9688 {
529fe20e
AM
9689 if (h->dynamic_adjusted
9690 && !h->def_regular
9691 && !ELF_COMMON_DEF_P (h))
f0158f44 9692 {
ec73ddcd
AM
9693 /* Ensure we catch all the cases where this symbol
9694 should be made dynamic. */
46434633 9695 if (!ensure_undef_dynamic (info, h))
f0158f44 9696 return FALSE;
dfbb6ac9 9697
ec73ddcd 9698 /* But if that didn't work out, discard dynamic relocs. */
f0158f44
AM
9699 if (h->dynindx == -1)
9700 eh->dyn_relocs = NULL;
9701 }
9702 else
8a2058b5 9703 eh->dyn_relocs = NULL;
57e7d118
AM
9704 }
9705
9706 /* Finally, allocate space. */
9707 for (p = eh->dyn_relocs; p != NULL; p = p->next)
9708 {
9709 asection *sreloc = elf_section_data (p->sec)->sreloc;
9710 if (eh->elf.type == STT_GNU_IFUNC)
9711 sreloc = htab->elf.irelplt;
9712 sreloc->size += p->count * sizeof (Elf64_External_Rela);
dfbb6ac9 9713 }
65f38f15 9714 }
57e7d118 9715
2d7ad24e
AM
9716 /* We might need a PLT entry when the symbol
9717 a) is dynamic, or
9718 b) is an ifunc, or
9719 c) has plt16 relocs and has been processed by adjust_dynamic_symbol, or
9720 d) has plt16 relocs and we are linking statically. */
9721 if ((htab->elf.dynamic_sections_created && h->dynindx != -1)
9722 || h->type == STT_GNU_IFUNC
9723 || (h->needs_plt && h->dynamic_adjusted)
9724 || (h->needs_plt
9725 && h->def_regular
9726 && !htab->elf.dynamic_sections_created
3e04d765 9727 && !htab->can_convert_all_inline_plt
ed7007c1 9728 && (ppc_elf_hash_entry (h)->tls_mask
2d7ad24e 9729 & (TLS_TLS | PLT_KEEP)) == PLT_KEEP))
65f38f15 9730 {
57e7d118
AM
9731 struct plt_entry *pent;
9732 bfd_boolean doneone = FALSE;
9733 for (pent = h->plt.plist; pent != NULL; pent = pent->next)
9734 if (pent->plt.refcount > 0)
9735 {
9736 if (!htab->elf.dynamic_sections_created
9737 || h->dynindx == -1)
9738 {
2d7ad24e
AM
9739 if (h->type == STT_GNU_IFUNC)
9740 {
9741 s = htab->elf.iplt;
9742 pent->plt.offset = s->size;
9743 s->size += PLT_ENTRY_SIZE (htab);
9744 s = htab->elf.irelplt;
9745 }
9746 else
9747 {
9748 s = htab->pltlocal;
9749 pent->plt.offset = s->size;
9750 s->size += LOCAL_PLT_ENTRY_SIZE (htab);
9751 s = bfd_link_pic (info) ? htab->relpltlocal : NULL;
9752 }
57e7d118
AM
9753 }
9754 else
9755 {
9756 /* If this is the first .plt entry, make room for the special
9757 first entry. */
9758 s = htab->elf.splt;
9759 if (s->size == 0)
9760 s->size += PLT_INITIAL_ENTRY_SIZE (htab);
65f38f15 9761
57e7d118 9762 pent->plt.offset = s->size;
65f38f15 9763
57e7d118
AM
9764 /* Make room for this entry. */
9765 s->size += PLT_ENTRY_SIZE (htab);
65f38f15 9766
57e7d118
AM
9767 /* Make room for the .glink code. */
9768 s = htab->glink;
9769 if (s->size == 0)
9e390558 9770 s->size += GLINK_PLTRESOLVE_SIZE (htab);
57e7d118
AM
9771 if (htab->opd_abi)
9772 {
9773 /* We need bigger stubs past index 32767. */
9e390558 9774 if (s->size >= GLINK_PLTRESOLVE_SIZE (htab) + 32768*2*4)
57e7d118
AM
9775 s->size += 4;
9776 s->size += 2*4;
9777 }
9778 else
9779 s->size += 4;
65f38f15 9780
57e7d118
AM
9781 /* We also need to make an entry in the .rela.plt section. */
9782 s = htab->elf.srelplt;
9783 }
2d7ad24e
AM
9784 if (s != NULL)
9785 s->size += sizeof (Elf64_External_Rela);
57e7d118
AM
9786 doneone = TRUE;
9787 }
9788 else
9789 pent->plt.offset = (bfd_vma) -1;
9790 if (!doneone)
9791 {
9792 h->plt.plist = NULL;
9793 h->needs_plt = 0;
9794 }
65f38f15 9795 }
57e7d118 9796 else
65f38f15 9797 {
57e7d118
AM
9798 h->plt.plist = NULL;
9799 h->needs_plt = 0;
65f38f15
AM
9800 }
9801
b34976b6 9802 return TRUE;
65f38f15
AM
9803}
9804
9e390558
AM
9805#define PPC_LO(v) ((v) & 0xffff)
9806#define PPC_HI(v) (((v) >> 16) & 0xffff)
9807#define PPC_HA(v) PPC_HI ((v) + 0x8000)
04bdff6a
AM
9808#define D34(v) \
9809 ((((v) & 0x3ffff0000ULL) << 16) | (v & 0xffff))
9810#define HA34(v) ((v + (1ULL << 33)) >> 34)
9e390558 9811
a345bc8d
AM
9812/* Called via elf_link_hash_traverse from ppc64_elf_size_dynamic_sections
9813 to set up space for global entry stubs. These are put in glink,
9814 after the branch table. */
65f38f15 9815
b34976b6 9816static bfd_boolean
a345bc8d 9817size_global_entry_stubs (struct elf_link_hash_entry *h, void *inf)
65f38f15 9818{
a345bc8d
AM
9819 struct bfd_link_info *info;
9820 struct ppc_link_hash_table *htab;
9821 struct plt_entry *pent;
9e390558 9822 asection *s, *plt;
65f38f15 9823
a345bc8d
AM
9824 if (h->root.type == bfd_link_hash_indirect)
9825 return TRUE;
65f38f15 9826
a345bc8d
AM
9827 if (!h->pointer_equality_needed)
9828 return TRUE;
65f38f15 9829
a345bc8d
AM
9830 if (h->def_regular)
9831 return TRUE;
65f38f15 9832
a345bc8d
AM
9833 info = inf;
9834 htab = ppc_hash_table (info);
9835 if (htab == NULL)
9836 return FALSE;
9837
9e390558
AM
9838 s = htab->global_entry;
9839 plt = htab->elf.splt;
a345bc8d
AM
9840 for (pent = h->plt.plist; pent != NULL; pent = pent->next)
9841 if (pent->plt.offset != (bfd_vma) -1
9842 && pent->addend == 0)
9843 {
afe397ea
AM
9844 /* For ELFv2, if this symbol is not defined in a regular file
9845 and we are not generating a shared library or pie, then we
9846 need to define the symbol in the executable on a call stub.
9847 This is to avoid text relocations. */
9e390558
AM
9848 bfd_vma off, stub_align, stub_off, stub_size;
9849 unsigned int align_power;
9850
9851 stub_size = 16;
9852 stub_off = s->size;
9853 if (htab->params->plt_stub_align >= 0)
9854 align_power = htab->params->plt_stub_align;
9855 else
9856 align_power = -htab->params->plt_stub_align;
9857 /* Setting section alignment is delayed until we know it is
9858 non-empty. Otherwise the .text output section will be
9859 aligned at least to plt_stub_align even when no global
9860 entry stubs are needed. */
9861 if (s->alignment_power < align_power)
9862 s->alignment_power = align_power;
9863 stub_align = (bfd_vma) 1 << align_power;
9864 if (htab->params->plt_stub_align >= 0
9865 || ((((stub_off + stub_size - 1) & -stub_align)
9866 - (stub_off & -stub_align))
9867 > ((stub_size - 1) & -stub_align)))
9868 stub_off = (stub_off + stub_align - 1) & -stub_align;
9869 off = pent->plt.offset + plt->output_offset + plt->output_section->vma;
9870 off -= stub_off + s->output_offset + s->output_section->vma;
9871 /* Note that for --plt-stub-align negative we have a possible
9872 dependency between stub offset and size. Break that
9873 dependency by assuming the max stub size when calculating
9874 the stub offset. */
9875 if (PPC_HA (off) == 0)
9876 stub_size -= 4;
8a2058b5 9877 h->root.type = bfd_link_hash_defined;
afe397ea 9878 h->root.u.def.section = s;
9e390558
AM
9879 h->root.u.def.value = stub_off;
9880 s->size = stub_off + stub_size;
a345bc8d
AM
9881 break;
9882 }
9883 return TRUE;
9884}
9885
9886/* Set DF_TEXTREL if we find any dynamic relocs that apply to
9887 read-only sections. */
9888
9889static bfd_boolean
98bbb1b8 9890maybe_set_textrel (struct elf_link_hash_entry *h, void *inf)
a345bc8d 9891{
98bbb1b8
AM
9892 asection *sec;
9893
a345bc8d
AM
9894 if (h->root.type == bfd_link_hash_indirect)
9895 return TRUE;
9896
98bbb1b8
AM
9897 sec = readonly_dynrelocs (h);
9898 if (sec != NULL)
a345bc8d 9899 {
98bbb1b8
AM
9900 struct bfd_link_info *info = (struct bfd_link_info *) inf;
9901
9902 info->flags |= DF_TEXTREL;
2cdcc330
AM
9903 info->callbacks->minfo (_("%pB: dynamic relocation against `%pT'"
9904 " in read-only section `%pA'\n"),
9905 sec->owner, h->root.root.string, sec);
a345bc8d
AM
9906
9907 /* Not an error, just cut short the traversal. */
9908 return FALSE;
65f38f15 9909 }
b34976b6 9910 return TRUE;
65f38f15
AM
9911}
9912
9913/* Set the sizes of the dynamic sections. */
9914
b34976b6 9915static bfd_boolean
ee67d69a 9916ppc64_elf_size_dynamic_sections (bfd *output_bfd,
4ce794b7 9917 struct bfd_link_info *info)
65f38f15
AM
9918{
9919 struct ppc_link_hash_table *htab;
9920 bfd *dynobj;
9921 asection *s;
b34976b6 9922 bfd_boolean relocs;
65f38f15 9923 bfd *ibfd;
7865406b 9924 struct got_entry *first_tlsld;
65f38f15
AM
9925
9926 htab = ppc_hash_table (info);
4dfe6ac6
NC
9927 if (htab == NULL)
9928 return FALSE;
9929
65f38f15
AM
9930 dynobj = htab->elf.dynobj;
9931 if (dynobj == NULL)
9932 abort ();
9933
9934 if (htab->elf.dynamic_sections_created)
9935 {
9936 /* Set the contents of the .interp section to the interpreter. */
9b8b325a 9937 if (bfd_link_executable (info) && !info->nointerp)
65f38f15 9938 {
3d4d4302 9939 s = bfd_get_linker_section (dynobj, ".interp");
65f38f15
AM
9940 if (s == NULL)
9941 abort ();
eea6121a 9942 s->size = sizeof ELF_DYNAMIC_INTERPRETER;
65f38f15
AM
9943 s->contents = (unsigned char *) ELF_DYNAMIC_INTERPRETER;
9944 }
9945 }
9946
9947 /* Set up .got offsets for local syms, and space for local dynamic
9948 relocs. */
c72f2fb2 9949 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
65f38f15 9950 {
411e1bfb
AM
9951 struct got_entry **lgot_ents;
9952 struct got_entry **end_lgot_ents;
e054468f
AM
9953 struct plt_entry **local_plt;
9954 struct plt_entry **end_local_plt;
f961d9dd 9955 unsigned char *lgot_masks;
65f38f15
AM
9956 bfd_size_type locsymcount;
9957 Elf_Internal_Shdr *symtab_hdr;
65f38f15 9958
0c8d6e5c 9959 if (!is_ppc64_elf (ibfd))
65f38f15
AM
9960 continue;
9961
9962 for (s = ibfd->sections; s != NULL; s = s->next)
9963 {
19e08130 9964 struct ppc_dyn_relocs *p;
65f38f15 9965
6edfbbad 9966 for (p = elf_section_data (s)->local_dynrel; p != NULL; p = p->next)
65f38f15 9967 {
ec338859
AM
9968 if (!bfd_is_abs_section (p->sec)
9969 && bfd_is_abs_section (p->sec->output_section))
9970 {
9971 /* Input section has been discarded, either because
9972 it is a copy of a linkonce section or due to
9973 linker script /DISCARD/, so we'll be discarding
9974 the relocs too. */
9975 }
248866a8 9976 else if (p->count != 0)
ec338859 9977 {
19e08130
AM
9978 asection *srel = elf_section_data (p->sec)->sreloc;
9979 if (p->ifunc)
33e44f2e 9980 srel = htab->elf.irelplt;
eea6121a 9981 srel->size += p->count * sizeof (Elf64_External_Rela);
248866a8
AM
9982 if ((p->sec->output_section->flags & SEC_READONLY) != 0)
9983 info->flags |= DF_TEXTREL;
ec338859 9984 }
65f38f15
AM
9985 }
9986 }
9987
411e1bfb
AM
9988 lgot_ents = elf_local_got_ents (ibfd);
9989 if (!lgot_ents)
65f38f15
AM
9990 continue;
9991
0ffa91dd 9992 symtab_hdr = &elf_symtab_hdr (ibfd);
65f38f15 9993 locsymcount = symtab_hdr->sh_info;
411e1bfb 9994 end_lgot_ents = lgot_ents + locsymcount;
e054468f
AM
9995 local_plt = (struct plt_entry **) end_lgot_ents;
9996 end_local_plt = local_plt + locsymcount;
f961d9dd 9997 lgot_masks = (unsigned char *) end_local_plt;
e717da7e 9998 s = ppc64_elf_tdata (ibfd)->got;
e7b938ca 9999 for (; lgot_ents < end_lgot_ents; ++lgot_ents, ++lgot_masks)
65f38f15 10000 {
0b8bcf0d 10001 struct got_entry **pent, *ent;
411e1bfb 10002
0b8bcf0d
AM
10003 pent = lgot_ents;
10004 while ((ent = *pent) != NULL)
411e1bfb
AM
10005 if (ent->got.refcount > 0)
10006 {
e7b938ca 10007 if ((ent->tls_type & *lgot_masks & TLS_LD) != 0)
411e1bfb 10008 {
927be08e 10009 ppc64_tlsld_got (ibfd)->got.refcount += 1;
0b8bcf0d 10010 *pent = ent->next;
411e1bfb
AM
10011 }
10012 else
10013 {
19e08130
AM
10014 unsigned int ent_size = 8;
10015 unsigned int rel_size = sizeof (Elf64_External_Rela);
10016
eea6121a 10017 ent->got.offset = s->size;
e7b938ca 10018 if ((ent->tls_type & *lgot_masks & TLS_GD) != 0)
927be08e 10019 {
19e08130
AM
10020 ent_size *= 2;
10021 rel_size *= 2;
10022 }
10023 s->size += ent_size;
37da22e5 10024 if ((*lgot_masks & (TLS_TLS | PLT_IFUNC)) == PLT_IFUNC)
19e08130 10025 {
33e44f2e 10026 htab->elf.irelplt->size += rel_size;
19e08130
AM
10027 htab->got_reli_size += rel_size;
10028 }
93370e8e
AM
10029 else if (bfd_link_pic (info)
10030 && !(ent->tls_type != 0
10031 && bfd_link_executable (info)))
19e08130
AM
10032 {
10033 asection *srel = ppc64_elf_tdata (ibfd)->relgot;
10034 srel->size += rel_size;
927be08e 10035 }
0b8bcf0d 10036 pent = &ent->next;
411e1bfb
AM
10037 }
10038 }
10039 else
0b8bcf0d 10040 *pent = ent->next;
65f38f15 10041 }
e054468f 10042
2d7ad24e
AM
10043 /* Allocate space for plt calls to local syms. */
10044 lgot_masks = (unsigned char *) end_local_plt;
10045 for (; local_plt < end_local_plt; ++local_plt, ++lgot_masks)
e054468f
AM
10046 {
10047 struct plt_entry *ent;
10048
10049 for (ent = *local_plt; ent != NULL; ent = ent->next)
10050 if (ent->plt.refcount > 0)
10051 {
2d7ad24e
AM
10052 if ((*lgot_masks & (TLS_TLS | PLT_IFUNC)) == PLT_IFUNC)
10053 {
10054 s = htab->elf.iplt;
10055 ent->plt.offset = s->size;
10056 s->size += PLT_ENTRY_SIZE (htab);
10057 htab->elf.irelplt->size += sizeof (Elf64_External_Rela);
10058 }
3e04d765
AM
10059 else if (htab->can_convert_all_inline_plt
10060 || (*lgot_masks & (TLS_TLS | PLT_KEEP)) != PLT_KEEP)
2d7ad24e
AM
10061 ent->plt.offset = (bfd_vma) -1;
10062 else
10063 {
10064 s = htab->pltlocal;
10065 ent->plt.offset = s->size;
10066 s->size += LOCAL_PLT_ENTRY_SIZE (htab);
10067 if (bfd_link_pic (info))
10068 htab->relpltlocal->size += sizeof (Elf64_External_Rela);
10069 }
e054468f
AM
10070 }
10071 else
10072 ent->plt.offset = (bfd_vma) -1;
10073 }
65f38f15
AM
10074 }
10075
10076 /* Allocate global sym .plt and .got entries, and space for global
10077 sym dynamic relocs. */
4ce794b7 10078 elf_link_hash_traverse (&htab->elf, allocate_dynrelocs, info);
a345bc8d 10079
0e1862bb 10080 if (!htab->opd_abi && !bfd_link_pic (info))
a345bc8d 10081 elf_link_hash_traverse (&htab->elf, size_global_entry_stubs, info);
65f38f15 10082
7865406b 10083 first_tlsld = NULL;
c72f2fb2 10084 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
102890f0 10085 {
7865406b
AM
10086 struct got_entry *ent;
10087
0c8d6e5c 10088 if (!is_ppc64_elf (ibfd))
102890f0
AM
10089 continue;
10090
7865406b
AM
10091 ent = ppc64_tlsld_got (ibfd);
10092 if (ent->got.refcount > 0)
102890f0 10093 {
7865406b 10094 if (!htab->do_multi_toc && first_tlsld != NULL)
102890f0 10095 {
7865406b
AM
10096 ent->is_indirect = TRUE;
10097 ent->got.ent = first_tlsld;
10098 }
10099 else
10100 {
10101 if (first_tlsld == NULL)
10102 first_tlsld = ent;
10103 s = ppc64_elf_tdata (ibfd)->got;
10104 ent->got.offset = s->size;
10105 ent->owner = ibfd;
10106 s->size += 16;
f749f26e 10107 if (bfd_link_dll (info))
7865406b
AM
10108 {
10109 asection *srel = ppc64_elf_tdata (ibfd)->relgot;
10110 srel->size += sizeof (Elf64_External_Rela);
10111 }
102890f0
AM
10112 }
10113 }
10114 else
7865406b 10115 ent->got.offset = (bfd_vma) -1;
102890f0
AM
10116 }
10117
65f38f15
AM
10118 /* We now have determined the sizes of the various dynamic sections.
10119 Allocate memory for them. */
b34976b6 10120 relocs = FALSE;
65f38f15
AM
10121 for (s = dynobj->sections; s != NULL; s = s->next)
10122 {
10123 if ((s->flags & SEC_LINKER_CREATED) == 0)
10124 continue;
10125
4ce794b7 10126 if (s == htab->brlt || s == htab->relbrlt)
721956f4
AM
10127 /* These haven't been allocated yet; don't strip. */
10128 continue;
33e44f2e
AM
10129 else if (s == htab->elf.sgot
10130 || s == htab->elf.splt
10131 || s == htab->elf.iplt
2d7ad24e 10132 || s == htab->pltlocal
c456f082 10133 || s == htab->glink
9e390558 10134 || s == htab->global_entry
5474d94f
AM
10135 || s == htab->elf.sdynbss
10136 || s == htab->elf.sdynrelro)
65f38f15
AM
10137 {
10138 /* Strip this section if we don't need it; see the
10139 comment below. */
5bd4f169 10140 }
58d180e8
AM
10141 else if (s == htab->glink_eh_frame)
10142 {
10143 if (!bfd_is_abs_section (s->output_section))
10144 /* Not sized yet. */
10145 continue;
10146 }
70cc837d 10147 else if (CONST_STRNEQ (s->name, ".rela"))
5bd4f169 10148 {
c456f082 10149 if (s->size != 0)
5bd4f169 10150 {
33e44f2e 10151 if (s != htab->elf.srelplt)
b34976b6 10152 relocs = TRUE;
5bd4f169
AM
10153
10154 /* We use the reloc_count field as a counter if we need
10155 to copy relocs into the output file. */
10156 s->reloc_count = 0;
10157 }
10158 }
65f38f15 10159 else
5bd4f169
AM
10160 {
10161 /* It's not one of our sections, so don't allocate space. */
10162 continue;
10163 }
10164
eea6121a 10165 if (s->size == 0)
5bd4f169 10166 {
c456f082
AM
10167 /* If we don't need this section, strip it from the
10168 output file. This is mostly to handle .rela.bss and
10169 .rela.plt. We must create both sections in
10170 create_dynamic_sections, because they must be created
10171 before the linker maps input sections to output
10172 sections. The linker does that before
10173 adjust_dynamic_symbol is called, and it is that
10174 function which decides whether anything needs to go
10175 into these sections. */
8423293d 10176 s->flags |= SEC_EXCLUDE;
5bd4f169
AM
10177 continue;
10178 }
10179
06bcf541
AM
10180 if (bfd_is_abs_section (s->output_section))
10181 _bfd_error_handler (_("warning: discarding dynamic section %s"),
10182 s->name);
10183
c456f082 10184 if ((s->flags & SEC_HAS_CONTENTS) == 0)
5f333394
AM
10185 continue;
10186
65f38f15
AM
10187 /* Allocate memory for the section contents. We use bfd_zalloc
10188 here in case unused entries are not reclaimed before the
10189 section's contents are written out. This should not happen,
411e1bfb
AM
10190 but this way if it does we get a R_PPC64_NONE reloc in .rela
10191 sections instead of garbage.
10192 We also rely on the section contents being zero when writing
5474d94f 10193 the GOT and .dynrelro. */
eea6121a 10194 s->contents = bfd_zalloc (dynobj, s->size);
65f38f15 10195 if (s->contents == NULL)
b34976b6 10196 return FALSE;
5bd4f169
AM
10197 }
10198
c72f2fb2 10199 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
e717da7e 10200 {
0c8d6e5c 10201 if (!is_ppc64_elf (ibfd))
7b53ace3
AM
10202 continue;
10203
e717da7e 10204 s = ppc64_elf_tdata (ibfd)->got;
33e44f2e 10205 if (s != NULL && s != htab->elf.sgot)
e717da7e 10206 {
eea6121a 10207 if (s->size == 0)
8423293d 10208 s->flags |= SEC_EXCLUDE;
e717da7e
AM
10209 else
10210 {
eea6121a 10211 s->contents = bfd_zalloc (ibfd, s->size);
e717da7e
AM
10212 if (s->contents == NULL)
10213 return FALSE;
10214 }
10215 }
10216 s = ppc64_elf_tdata (ibfd)->relgot;
10217 if (s != NULL)
10218 {
eea6121a 10219 if (s->size == 0)
8423293d 10220 s->flags |= SEC_EXCLUDE;
e717da7e
AM
10221 else
10222 {
eea6121a 10223 s->contents = bfd_zalloc (ibfd, s->size);
e717da7e
AM
10224 if (s->contents == NULL)
10225 return FALSE;
10226 relocs = TRUE;
10227 s->reloc_count = 0;
10228 }
10229 }
10230 }
10231
e86ce104 10232 if (htab->elf.dynamic_sections_created)
5bd4f169 10233 {
e8910a83
AM
10234 bfd_boolean tls_opt;
10235
5bd4f169
AM
10236 /* Add some entries to the .dynamic section. We fill in the
10237 values later, in ppc64_elf_finish_dynamic_sections, but we
10238 must add the entries now so that we get the correct size for
10239 the .dynamic section. The DT_DEBUG entry is filled in by the
10240 dynamic linker and used by the debugger. */
dc810e39 10241#define add_dynamic_entry(TAG, VAL) \
5a580b3a 10242 _bfd_elf_add_dynamic_entry (info, TAG, VAL)
dc810e39 10243
0e1862bb 10244 if (bfd_link_executable (info))
5bd4f169 10245 {
dc810e39 10246 if (!add_dynamic_entry (DT_DEBUG, 0))
b34976b6 10247 return FALSE;
5bd4f169
AM
10248 }
10249
33e44f2e 10250 if (htab->elf.splt != NULL && htab->elf.splt->size != 0)
5bd4f169 10251 {
dc810e39
AM
10252 if (!add_dynamic_entry (DT_PLTGOT, 0)
10253 || !add_dynamic_entry (DT_PLTRELSZ, 0)
10254 || !add_dynamic_entry (DT_PLTREL, DT_RELA)
5d1634d7
AM
10255 || !add_dynamic_entry (DT_JMPREL, 0)
10256 || !add_dynamic_entry (DT_PPC64_GLINK, 0))
b34976b6 10257 return FALSE;
5bd4f169
AM
10258 }
10259
ee67d69a 10260 if (NO_OPD_RELOCS && abiversion (output_bfd) <= 1)
19397422
AM
10261 {
10262 if (!add_dynamic_entry (DT_PPC64_OPD, 0)
10263 || !add_dynamic_entry (DT_PPC64_OPDSZ, 0))
b34976b6 10264 return FALSE;
19397422
AM
10265 }
10266
7c9cf415 10267 tls_opt = (htab->params->tls_get_addr_opt
9e7028aa
AM
10268 && ((htab->tls_get_addr_fd != NULL
10269 && htab->tls_get_addr_fd->elf.plt.plist != NULL)
10270 || (htab->tga_desc_fd != NULL
10271 && htab->tga_desc_fd->elf.plt.plist != NULL)));
e8910a83
AM
10272 if (tls_opt || !htab->opd_abi)
10273 {
10274 if (!add_dynamic_entry (DT_PPC64_OPT, tls_opt ? PPC64_OPT_TLS : 0))
10275 return FALSE;
10276 }
a7f2871e 10277
5bd4f169
AM
10278 if (relocs)
10279 {
dc810e39
AM
10280 if (!add_dynamic_entry (DT_RELA, 0)
10281 || !add_dynamic_entry (DT_RELASZ, 0)
10282 || !add_dynamic_entry (DT_RELAENT, sizeof (Elf64_External_Rela)))
b34976b6 10283 return FALSE;
5bd4f169 10284
65f38f15
AM
10285 /* If any dynamic relocs apply to a read-only section,
10286 then we need a DT_TEXTREL entry. */
248866a8 10287 if ((info->flags & DF_TEXTREL) == 0)
a345bc8d 10288 elf_link_hash_traverse (&htab->elf, maybe_set_textrel, info);
5bd4f169 10289
65f38f15 10290 if ((info->flags & DF_TEXTREL) != 0)
5bd4f169 10291 {
65f38f15 10292 if (!add_dynamic_entry (DT_TEXTREL, 0))
b34976b6 10293 return FALSE;
5bd4f169 10294 }
5bd4f169 10295 }
5bd4f169 10296 }
65f38f15 10297#undef add_dynamic_entry
5bd4f169 10298
b34976b6 10299 return TRUE;
5bd4f169
AM
10300}
10301
a345bc8d
AM
10302/* Return TRUE if symbol should be hashed in the `.gnu.hash' section. */
10303
10304static bfd_boolean
10305ppc64_elf_hash_symbol (struct elf_link_hash_entry *h)
10306{
10307 if (h->plt.plist != NULL
10308 && !h->def_regular
10309 && !h->pointer_equality_needed)
10310 return FALSE;
10311
10312 return _bfd_elf_hash_symbol (h);
10313}
10314
721956f4 10315/* Determine the type of stub needed, if any, for a call. */
5bd4f169 10316
4ce794b7
AM
10317static inline enum ppc_stub_type
10318ppc_type_of_stub (asection *input_sec,
10319 const Elf_Internal_Rela *rel,
10320 struct ppc_link_hash_entry **hash,
e054468f 10321 struct plt_entry **plt_ent,
6911b7dc
AM
10322 bfd_vma destination,
10323 unsigned long local_off)
5bd4f169 10324{
721956f4
AM
10325 struct ppc_link_hash_entry *h = *hash;
10326 bfd_vma location;
10327 bfd_vma branch_offset;
10328 bfd_vma max_branch_offset;
4ce794b7 10329 enum elf_ppc64_reloc_type r_type;
5bd4f169 10330
721956f4
AM
10331 if (h != NULL)
10332 {
e054468f 10333 struct plt_entry *ent;
7fe2b9a6 10334 struct ppc_link_hash_entry *fdh = h;
b31867b6
AM
10335 if (h->oh != NULL
10336 && h->oh->is_func_descriptor)
7b8f6675
AM
10337 {
10338 fdh = ppc_follow_link (h->oh);
10339 *hash = fdh;
10340 }
8387904d 10341
e054468f
AM
10342 for (ent = fdh->elf.plt.plist; ent != NULL; ent = ent->next)
10343 if (ent->addend == rel->r_addend
10344 && ent->plt.offset != (bfd_vma) -1)
10345 {
e054468f
AM
10346 *plt_ent = ent;
10347 return ppc_stub_plt_call;
10348 }
5bd4f169 10349
7fe2b9a6
AM
10350 /* Here, we know we don't have a plt entry. If we don't have a
10351 either a defined function descriptor or a defined entry symbol
10352 in a regular object file, then it is pointless trying to make
10353 any other type of stub. */
854b41e7
AM
10354 if (!is_static_defined (&fdh->elf)
10355 && !is_static_defined (&h->elf))
721956f4 10356 return ppc_stub_none;
5d1634d7 10357 }
e054468f
AM
10358 else if (elf_local_got_ents (input_sec->owner) != NULL)
10359 {
10360 Elf_Internal_Shdr *symtab_hdr = &elf_symtab_hdr (input_sec->owner);
10361 struct plt_entry **local_plt = (struct plt_entry **)
10362 elf_local_got_ents (input_sec->owner) + symtab_hdr->sh_info;
10363 unsigned long r_symndx = ELF64_R_SYM (rel->r_info);
10364
10365 if (local_plt[r_symndx] != NULL)
10366 {
10367 struct plt_entry *ent;
10368
10369 for (ent = local_plt[r_symndx]; ent != NULL; ent = ent->next)
10370 if (ent->addend == rel->r_addend
10371 && ent->plt.offset != (bfd_vma) -1)
10372 {
10373 *plt_ent = ent;
10374 return ppc_stub_plt_call;
10375 }
10376 }
10377 }
5d1634d7 10378
721956f4
AM
10379 /* Determine where the call point is. */
10380 location = (input_sec->output_offset
10381 + input_sec->output_section->vma
10382 + rel->r_offset);
5d1634d7 10383
721956f4
AM
10384 branch_offset = destination - location;
10385 r_type = ELF64_R_TYPE (rel->r_info);
5d1634d7 10386
721956f4
AM
10387 /* Determine if a long branch stub is needed. */
10388 max_branch_offset = 1 << 25;
23cedd1d
AM
10389 if (r_type == R_PPC64_REL14
10390 || r_type == R_PPC64_REL14_BRTAKEN
10391 || r_type == R_PPC64_REL14_BRNTAKEN)
721956f4 10392 max_branch_offset = 1 << 15;
5d1634d7 10393
6911b7dc 10394 if (branch_offset + max_branch_offset >= 2 * max_branch_offset - local_off)
721956f4
AM
10395 /* We need a stub. Figure out whether a long_branch or plt_branch
10396 is needed later. */
10397 return ppc_stub_long_branch;
5d1634d7 10398
721956f4 10399 return ppc_stub_none;
5d1634d7
AM
10400}
10401
f891966f
AM
10402/* Gets the address of a label (1:) in r11 and builds an offset in r12,
10403 then adds it to r11 (LOAD false) or loads r12 from r11+r12 (LOAD true).
10404 . mflr %r12
10405 . bcl 20,31,1f
10406 .1: mflr %r11
10407 . mtlr %r12
05d0e962 10408 . lis %r12,xxx-1b@highest
f891966f 10409 . ori %r12,%r12,xxx-1b@higher
05d0e962 10410 . sldi %r12,%r12,32
f891966f 10411 . oris %r12,%r12,xxx-1b@high
05d0e962 10412 . ori %r12,%r12,xxx-1b@l
f891966f 10413 . add/ldx %r12,%r11,%r12 */
05d0e962
AM
10414
10415static bfd_byte *
10416build_offset (bfd *abfd, bfd_byte *p, bfd_vma off, bfd_boolean load)
10417{
f891966f
AM
10418 bfd_put_32 (abfd, MFLR_R12, p);
10419 p += 4;
10420 bfd_put_32 (abfd, BCL_20_31, p);
10421 p += 4;
10422 bfd_put_32 (abfd, MFLR_R11, p);
10423 p += 4;
10424 bfd_put_32 (abfd, MTLR_R12, p);
10425 p += 4;
05d0e962
AM
10426 if (off + 0x8000 < 0x10000)
10427 {
10428 if (load)
10429 bfd_put_32 (abfd, LD_R12_0R11 + PPC_LO (off), p);
10430 else
10431 bfd_put_32 (abfd, ADDI_R12_R11 + PPC_LO (off), p);
10432 p += 4;
10433 }
10434 else if (off + 0x80008000ULL < 0x100000000ULL)
10435 {
10436 bfd_put_32 (abfd, ADDIS_R12_R11 + PPC_HA (off), p);
10437 p += 4;
10438 if (load)
10439 bfd_put_32 (abfd, LD_R12_0R12 + PPC_LO (off), p);
10440 else
10441 bfd_put_32 (abfd, ADDI_R12_R12 + PPC_LO (off), p);
10442 p += 4;
10443 }
10444 else
10445 {
10446 if (off + 0x800000000000ULL < 0x1000000000000ULL)
10447 {
10448 bfd_put_32 (abfd, LI_R12_0 + ((off >> 32) & 0xffff), p);
10449 p += 4;
10450 }
10451 else
10452 {
10453 bfd_put_32 (abfd, LIS_R12 + ((off >> 48) & 0xffff), p);
10454 p += 4;
10455 if (((off >> 32) & 0xffff) != 0)
10456 {
10457 bfd_put_32 (abfd, ORI_R12_R12_0 + ((off >> 32) & 0xffff), p);
10458 p += 4;
10459 }
10460 }
10461 if (((off >> 32) & 0xffffffffULL) != 0)
10462 {
10463 bfd_put_32 (abfd, SLDI_R12_R12_32, p);
10464 p += 4;
10465 }
10466 if (PPC_HI (off) != 0)
10467 {
10468 bfd_put_32 (abfd, ORIS_R12_R12_0 + PPC_HI (off), p);
10469 p += 4;
10470 }
10471 if (PPC_LO (off) != 0)
10472 {
10473 bfd_put_32 (abfd, ORI_R12_R12_0 + PPC_LO (off), p);
10474 p += 4;
10475 }
10476 if (load)
10477 bfd_put_32 (abfd, LDX_R12_R11_R12, p);
10478 else
10479 bfd_put_32 (abfd, ADD_R12_R11_R12, p);
10480 p += 4;
10481 }
10482 return p;
10483}
10484
10485static unsigned int
10486size_offset (bfd_vma off)
10487{
10488 unsigned int size;
10489 if (off + 0x8000 < 0x10000)
10490 size = 4;
10491 else if (off + 0x80008000ULL < 0x100000000ULL)
10492 size = 8;
10493 else
10494 {
10495 if (off + 0x800000000000ULL < 0x1000000000000ULL)
10496 size = 4;
10497 else
10498 {
10499 size = 4;
10500 if (((off >> 32) & 0xffff) != 0)
10501 size += 4;
10502 }
10503 if (((off >> 32) & 0xffffffffULL) != 0)
10504 size += 4;
10505 if (PPC_HI (off) != 0)
10506 size += 4;
10507 if (PPC_LO (off) != 0)
10508 size += 4;
10509 size += 4;
10510 }
f891966f 10511 return size + 16;
05d0e962
AM
10512}
10513
3d58e1fc
AM
10514static unsigned int
10515num_relocs_for_offset (bfd_vma off)
10516{
10517 unsigned int num_rel;
10518 if (off + 0x8000 < 0x10000)
10519 num_rel = 1;
10520 else if (off + 0x80008000ULL < 0x100000000ULL)
10521 num_rel = 2;
10522 else
10523 {
10524 num_rel = 1;
10525 if (off + 0x800000000000ULL >= 0x1000000000000ULL
10526 && ((off >> 32) & 0xffff) != 0)
10527 num_rel += 1;
10528 if (PPC_HI (off) != 0)
10529 num_rel += 1;
10530 if (PPC_LO (off) != 0)
10531 num_rel += 1;
10532 }
10533 return num_rel;
10534}
10535
10536static Elf_Internal_Rela *
10537emit_relocs_for_offset (struct bfd_link_info *info, Elf_Internal_Rela *r,
10538 bfd_vma roff, bfd_vma targ, bfd_vma off)
10539{
10540 bfd_vma relative_targ = targ - (roff - 8);
10541 if (bfd_big_endian (info->output_bfd))
10542 roff += 2;
10543 r->r_offset = roff;
10544 r->r_addend = relative_targ + roff;
10545 if (off + 0x8000 < 0x10000)
10546 r->r_info = ELF64_R_INFO (0, R_PPC64_REL16);
10547 else if (off + 0x80008000ULL < 0x100000000ULL)
10548 {
10549 r->r_info = ELF64_R_INFO (0, R_PPC64_REL16_HA);
10550 ++r;
10551 roff += 4;
10552 r->r_offset = roff;
10553 r->r_info = ELF64_R_INFO (0, R_PPC64_REL16_LO);
10554 r->r_addend = relative_targ + roff;
10555 }
10556 else
10557 {
10558 if (off + 0x800000000000ULL < 0x1000000000000ULL)
10559 r->r_info = ELF64_R_INFO (0, R_PPC64_REL16_HIGHER);
10560 else
10561 {
10562 r->r_info = ELF64_R_INFO (0, R_PPC64_REL16_HIGHEST);
10563 if (((off >> 32) & 0xffff) != 0)
10564 {
10565 ++r;
10566 roff += 4;
10567 r->r_offset = roff;
10568 r->r_info = ELF64_R_INFO (0, R_PPC64_REL16_HIGHER);
10569 r->r_addend = relative_targ + roff;
10570 }
10571 }
10572 if (((off >> 32) & 0xffffffffULL) != 0)
10573 roff += 4;
10574 if (PPC_HI (off) != 0)
10575 {
10576 ++r;
10577 roff += 4;
10578 r->r_offset = roff;
10579 r->r_info = ELF64_R_INFO (0, R_PPC64_REL16_HIGH);
10580 r->r_addend = relative_targ + roff;
10581 }
10582 if (PPC_LO (off) != 0)
10583 {
10584 ++r;
10585 roff += 4;
10586 r->r_offset = roff;
10587 r->r_info = ELF64_R_INFO (0, R_PPC64_REL16_LO);
10588 r->r_addend = relative_targ + roff;
10589 }
10590 }
10591 return r;
10592}
10593
04bdff6a 10594static bfd_byte *
7c1f4227 10595build_power10_offset (bfd *abfd, bfd_byte *p, bfd_vma off, int odd,
04bdff6a
AM
10596 bfd_boolean load)
10597{
10598 uint64_t insn;
10599 if (off - odd + (1ULL << 33) < 1ULL << 34)
10600 {
10601 off -= odd;
10602 if (odd)
10603 {
10604 bfd_put_32 (abfd, NOP, p);
10605 p += 4;
10606 }
10607 if (load)
10608 insn = PLD_R12_PC;
10609 else
10610 insn = PADDI_R12_PC;
10611 insn |= D34 (off);
10612 bfd_put_32 (abfd, insn >> 32, p);
10613 p += 4;
10614 bfd_put_32 (abfd, insn, p);
10615 }
10616 /* The minimum value for paddi is -0x200000000. The minimum value
10617 for li is -0x8000, which when shifted by 34 and added gives a
10618 minimum value of -0x2000200000000. The maximum value is
10619 0x1ffffffff+0x7fff<<34 which is 0x2000200000000-1. */
10620 else if (off - (8 - odd) + (0x20002ULL << 32) < 0x40004ULL << 32)
10621 {
10622 off -= 8 - odd;
10623 bfd_put_32 (abfd, LI_R11_0 | (HA34 (off) & 0xffff), p);
10624 p += 4;
10625 if (!odd)
10626 {
10627 bfd_put_32 (abfd, SLDI_R11_R11_34, p);
10628 p += 4;
10629 }
10630 insn = PADDI_R12_PC | D34 (off);
10631 bfd_put_32 (abfd, insn >> 32, p);
10632 p += 4;
10633 bfd_put_32 (abfd, insn, p);
10634 p += 4;
10635 if (odd)
10636 {
10637 bfd_put_32 (abfd, SLDI_R11_R11_34, p);
10638 p += 4;
10639 }
10640 if (load)
10641 bfd_put_32 (abfd, LDX_R12_R11_R12, p);
10642 else
10643 bfd_put_32 (abfd, ADD_R12_R11_R12, p);
10644 }
10645 else
10646 {
10647 off -= odd + 8;
10648 bfd_put_32 (abfd, LIS_R11 | ((HA34 (off) >> 16) & 0x3fff), p);
10649 p += 4;
10650 bfd_put_32 (abfd, ORI_R11_R11_0 | (HA34 (off) & 0xffff), p);
10651 p += 4;
10652 if (odd)
10653 {
10654 bfd_put_32 (abfd, SLDI_R11_R11_34, p);
10655 p += 4;
10656 }
10657 insn = PADDI_R12_PC | D34 (off);
10658 bfd_put_32 (abfd, insn >> 32, p);
10659 p += 4;
10660 bfd_put_32 (abfd, insn, p);
10661 p += 4;
10662 if (!odd)
10663 {
10664 bfd_put_32 (abfd, SLDI_R11_R11_34, p);
10665 p += 4;
10666 }
10667 if (load)
10668 bfd_put_32 (abfd, LDX_R12_R11_R12, p);
10669 else
10670 bfd_put_32 (abfd, ADD_R12_R11_R12, p);
10671 }
10672 p += 4;
10673 return p;
10674}
10675
10676static unsigned int
7c1f4227 10677size_power10_offset (bfd_vma off, int odd)
04bdff6a
AM
10678{
10679 if (off - odd + (1ULL << 33) < 1ULL << 34)
10680 return odd + 8;
10681 else if (off - (8 - odd) + (0x20002ULL << 32) < 0x40004ULL << 32)
10682 return 20;
10683 else
10684 return 24;
10685}
10686
10687static unsigned int
7c1f4227 10688num_relocs_for_power10_offset (bfd_vma off, int odd)
04bdff6a
AM
10689{
10690 if (off - odd + (1ULL << 33) < 1ULL << 34)
10691 return 1;
10692 else if (off - (8 - odd) + (0x20002ULL << 32) < 0x40004ULL << 32)
10693 return 2;
10694 else
10695 return 3;
10696}
10697
10698static Elf_Internal_Rela *
7c1f4227 10699emit_relocs_for_power10_offset (struct bfd_link_info *info,
04bdff6a
AM
10700 Elf_Internal_Rela *r, bfd_vma roff,
10701 bfd_vma targ, bfd_vma off, int odd)
10702{
10703 if (off - odd + (1ULL << 33) < 1ULL << 34)
10704 roff += odd;
10705 else if (off - (8 - odd) + (0x20002ULL << 32) < 0x40004ULL << 32)
10706 {
10707 int d_offset = bfd_big_endian (info->output_bfd) ? 2 : 0;
10708 r->r_offset = roff + d_offset;
10709 r->r_addend = targ + 8 - odd - d_offset;
10710 r->r_info = ELF64_R_INFO (0, R_PPC64_REL16_HIGHERA34);
10711 ++r;
10712 roff += 8 - odd;
10713 }
10714 else
10715 {
10716 int d_offset = bfd_big_endian (info->output_bfd) ? 2 : 0;
10717 r->r_offset = roff + d_offset;
10718 r->r_addend = targ + 8 + odd - d_offset;
10719 r->r_info = ELF64_R_INFO (0, R_PPC64_REL16_HIGHESTA34);
10720 ++r;
10721 roff += 4;
10722 r->r_offset = roff + d_offset;
10723 r->r_addend = targ + 4 + odd - d_offset;
10724 r->r_info = ELF64_R_INFO (0, R_PPC64_REL16_HIGHERA34);
10725 ++r;
10726 roff += 4 + odd;
10727 }
10728 r->r_offset = roff;
10729 r->r_addend = targ;
10730 r->r_info = ELF64_R_INFO (0, R_PPC64_PCREL34);
10731 return r;
10732}
10733
df136d64
AM
10734/* Emit .eh_frame opcode to advance pc by DELTA. */
10735
10736static bfd_byte *
10737eh_advance (bfd *abfd, bfd_byte *eh, unsigned int delta)
10738{
10739 delta /= 4;
10740 if (delta < 64)
10741 *eh++ = DW_CFA_advance_loc + delta;
10742 else if (delta < 256)
10743 {
10744 *eh++ = DW_CFA_advance_loc1;
10745 *eh++ = delta;
10746 }
10747 else if (delta < 65536)
10748 {
10749 *eh++ = DW_CFA_advance_loc2;
10750 bfd_put_16 (abfd, delta, eh);
10751 eh += 2;
10752 }
10753 else
10754 {
10755 *eh++ = DW_CFA_advance_loc4;
10756 bfd_put_32 (abfd, delta, eh);
10757 eh += 4;
10758 }
10759 return eh;
10760}
10761
10762/* Size of required .eh_frame opcode to advance pc by DELTA. */
10763
10764static unsigned int
10765eh_advance_size (unsigned int delta)
10766{
10767 if (delta < 64 * 4)
10768 /* DW_CFA_advance_loc+[1..63]. */
10769 return 1;
10770 if (delta < 256 * 4)
10771 /* DW_CFA_advance_loc1, byte. */
10772 return 2;
10773 if (delta < 65536 * 4)
10774 /* DW_CFA_advance_loc2, 2 bytes. */
10775 return 3;
10776 /* DW_CFA_advance_loc4, 4 bytes. */
10777 return 5;
10778}
10779
794e51c0
AM
10780/* With power7 weakly ordered memory model, it is possible for ld.so
10781 to update a plt entry in one thread and have another thread see a
10782 stale zero toc entry. To avoid this we need some sort of acquire
10783 barrier in the call stub. One solution is to make the load of the
10784 toc word seem to appear to depend on the load of the function entry
10785 word. Another solution is to test for r2 being zero, and branch to
10786 the appropriate glink entry if so.
10787
10788 . fake dep barrier compare
71a39c98
AM
10789 . ld 12,xxx(2) ld 12,xxx(2)
10790 . mtctr 12 mtctr 12
10791 . xor 11,12,12 ld 2,xxx+8(2)
794e51c0
AM
10792 . add 2,2,11 cmpldi 2,0
10793 . ld 2,xxx+8(2) bnectr+
10794 . bctr b <glink_entry>
10795
10796 The solution involving the compare turns out to be faster, so
10797 that's what we use unless the branch won't reach. */
10798
10799#define ALWAYS_USE_FAKE_DEP 0
10800#define ALWAYS_EMIT_R2SAVE 0
5d1634d7 10801
794e51c0
AM
10802static inline unsigned int
10803plt_stub_size (struct ppc_link_hash_table *htab,
10804 struct ppc_stub_hash_entry *stub_entry,
10805 bfd_vma off)
10806{
05d0e962 10807 unsigned size;
b9e5796b 10808
05d0e962
AM
10809 if (stub_entry->stub_type >= ppc_stub_plt_call_notoc)
10810 {
7c1f4227 10811 if (htab->power10_stubs)
04bdff6a
AM
10812 {
10813 bfd_vma start = (stub_entry->stub_offset
10814 + stub_entry->group->stub_sec->output_offset
10815 + stub_entry->group->stub_sec->output_section->vma);
10816 if (stub_entry->stub_type > ppc_stub_plt_call_notoc)
10817 start += 4;
7c1f4227 10818 size = 8 + size_power10_offset (off, start & 4);
04bdff6a
AM
10819 }
10820 else
10821 size = 8 + size_offset (off - 8);
05d0e962
AM
10822 if (stub_entry->stub_type > ppc_stub_plt_call_notoc)
10823 size += 4;
10824 return size;
10825 }
10826
10827 size = 12;
b9e5796b
AM
10828 if (ALWAYS_EMIT_R2SAVE
10829 || stub_entry->stub_type == ppc_stub_plt_call_r2save)
10830 size += 4;
10831 if (PPC_HA (off) != 0)
794e51c0 10832 size += 4;
b9e5796b
AM
10833 if (htab->opd_abi)
10834 {
10835 size += 4;
e7d1c40c 10836 if (htab->params->plt_static_chain)
b9e5796b 10837 size += 4;
bd4d2eaa
AM
10838 if (htab->params->plt_thread_safe
10839 && htab->elf.dynamic_sections_created
10840 && stub_entry->h != NULL
10841 && stub_entry->h->elf.dynindx != -1)
b9e5796b 10842 size += 8;
e7d1c40c 10843 if (PPC_HA (off + 8 + 8 * htab->params->plt_static_chain) != PPC_HA (off))
b9e5796b
AM
10844 size += 4;
10845 }
794e51c0 10846 if (stub_entry->h != NULL
ed7007c1 10847 && is_tls_get_addr (&stub_entry->h->elf, htab)
7c9cf415 10848 && htab->params->tls_get_addr_opt)
f378ab09 10849 {
9e7028aa
AM
10850 if (htab->params->no_tls_get_addr_regsave)
10851 {
10852 size += 7 * 4;
10853 if (stub_entry->stub_type == ppc_stub_plt_call_r2save)
10854 size += 6 * 4;
10855 }
10856 else
10857 {
10858 size += 30 * 4;
10859 if (stub_entry->stub_type == ppc_stub_plt_call_r2save)
10860 size += 4;
10861 }
f378ab09 10862 }
794e51c0
AM
10863 return size;
10864}
10865
2420fff6
AM
10866/* Depending on the sign of plt_stub_align:
10867 If positive, return the padding to align to a 2**plt_stub_align
10868 boundary.
10869 If negative, if this stub would cross fewer 2**plt_stub_align
10870 boundaries if we align, then return the padding needed to do so. */
10871
794e51c0
AM
10872static inline unsigned int
10873plt_stub_pad (struct ppc_link_hash_table *htab,
10874 struct ppc_stub_hash_entry *stub_entry,
10875 bfd_vma plt_off)
10876{
2420fff6 10877 int stub_align;
1aa42141 10878 unsigned stub_size;
6f20ed8a 10879 bfd_vma stub_off = stub_entry->group->stub_sec->size;
794e51c0 10880
2420fff6
AM
10881 if (htab->params->plt_stub_align >= 0)
10882 {
10883 stub_align = 1 << htab->params->plt_stub_align;
10884 if ((stub_off & (stub_align - 1)) != 0)
10885 return stub_align - (stub_off & (stub_align - 1));
10886 return 0;
10887 }
10888
10889 stub_align = 1 << -htab->params->plt_stub_align;
1aa42141 10890 stub_size = plt_stub_size (htab, stub_entry, plt_off);
794e51c0 10891 if (((stub_off + stub_size - 1) & -stub_align) - (stub_off & -stub_align)
e05fa0ba 10892 > ((stub_size - 1) & -stub_align))
794e51c0
AM
10893 return stub_align - (stub_off & (stub_align - 1));
10894 return 0;
10895}
10896
10897/* Build a .plt call stub. */
10898
10899static inline bfd_byte *
10900build_plt_stub (struct ppc_link_hash_table *htab,
10901 struct ppc_stub_hash_entry *stub_entry,
10902 bfd_byte *p, bfd_vma offset, Elf_Internal_Rela *r)
10903{
e7d1c40c 10904 bfd *obfd = htab->params->stub_bfd;
b9e5796b 10905 bfd_boolean plt_load_toc = htab->opd_abi;
e7d1c40c 10906 bfd_boolean plt_static_chain = htab->params->plt_static_chain;
bd4d2eaa
AM
10907 bfd_boolean plt_thread_safe = (htab->params->plt_thread_safe
10908 && htab->elf.dynamic_sections_created
10909 && stub_entry->h != NULL
10910 && stub_entry->h->elf.dynindx != -1);
794e51c0
AM
10911 bfd_boolean use_fake_dep = plt_thread_safe;
10912 bfd_vma cmp_branch_off = 0;
10913
10914 if (!ALWAYS_USE_FAKE_DEP
b9e5796b 10915 && plt_load_toc
794e51c0 10916 && plt_thread_safe
ed7007c1 10917 && !(is_tls_get_addr (&stub_entry->h->elf, htab)
7c9cf415 10918 && htab->params->tls_get_addr_opt))
794e51c0
AM
10919 {
10920 bfd_vma pltoff = stub_entry->plt_ent->plt.offset & ~1;
b9e5796b
AM
10921 bfd_vma pltindex = ((pltoff - PLT_INITIAL_ENTRY_SIZE (htab))
10922 / PLT_ENTRY_SIZE (htab));
9e390558 10923 bfd_vma glinkoff = GLINK_PLTRESOLVE_SIZE (htab) + pltindex * 8;
794e51c0
AM
10924 bfd_vma to, from;
10925
68d62958
AM
10926 if (pltindex > 32768)
10927 glinkoff += (pltindex - 32768) * 4;
794e51c0
AM
10928 to = (glinkoff
10929 + htab->glink->output_offset
10930 + htab->glink->output_section->vma);
6f20ed8a 10931 from = (p - stub_entry->group->stub_sec->contents
794e51c0
AM
10932 + 4 * (ALWAYS_EMIT_R2SAVE
10933 || stub_entry->stub_type == ppc_stub_plt_call_r2save)
10934 + 4 * (PPC_HA (offset) != 0)
10935 + 4 * (PPC_HA (offset + 8 + 8 * plt_static_chain)
10936 != PPC_HA (offset))
10937 + 4 * (plt_static_chain != 0)
10938 + 20
6f20ed8a
AM
10939 + stub_entry->group->stub_sec->output_offset
10940 + stub_entry->group->stub_sec->output_section->vma);
794e51c0
AM
10941 cmp_branch_off = to - from;
10942 use_fake_dep = cmp_branch_off + (1 << 25) >= (1 << 26);
10943 }
10944
ac2df442
AM
10945 if (PPC_HA (offset) != 0)
10946 {
176a0d42
AM
10947 if (r != NULL)
10948 {
794e51c0
AM
10949 if (ALWAYS_EMIT_R2SAVE
10950 || stub_entry->stub_type == ppc_stub_plt_call_r2save)
10951 r[0].r_offset += 4;
176a0d42 10952 r[0].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_HA);
3b421ab3 10953 r[1].r_offset = r[0].r_offset + 4;
176a0d42
AM
10954 r[1].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_LO_DS);
10955 r[1].r_addend = r[0].r_addend;
b9e5796b 10956 if (plt_load_toc)
176a0d42 10957 {
b9e5796b 10958 if (PPC_HA (offset + 8 + 8 * plt_static_chain) != PPC_HA (offset))
c7131b65 10959 {
b9e5796b
AM
10960 r[2].r_offset = r[1].r_offset + 4;
10961 r[2].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_LO);
10962 r[2].r_addend = r[0].r_addend;
10963 }
10964 else
10965 {
10966 r[2].r_offset = r[1].r_offset + 8 + 8 * use_fake_dep;
10967 r[2].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_LO_DS);
10968 r[2].r_addend = r[0].r_addend + 8;
10969 if (plt_static_chain)
10970 {
10971 r[3].r_offset = r[2].r_offset + 4;
10972 r[3].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_LO_DS);
10973 r[3].r_addend = r[0].r_addend + 16;
10974 }
c7131b65 10975 }
176a0d42
AM
10976 }
10977 }
794e51c0
AM
10978 if (ALWAYS_EMIT_R2SAVE
10979 || stub_entry->stub_type == ppc_stub_plt_call_r2save)
a078d95a 10980 bfd_put_32 (obfd, STD_R2_0R1 + STK_TOC (htab), p), p += 4;
397998fc
AM
10981 if (plt_load_toc)
10982 {
10983 bfd_put_32 (obfd, ADDIS_R11_R2 | PPC_HA (offset), p), p += 4;
10984 bfd_put_32 (obfd, LD_R12_0R11 | PPC_LO (offset), p), p += 4;
10985 }
10986 else
10987 {
10988 bfd_put_32 (obfd, ADDIS_R12_R2 | PPC_HA (offset), p), p += 4;
10989 bfd_put_32 (obfd, LD_R12_0R12 | PPC_LO (offset), p), p += 4;
10990 }
b9e5796b
AM
10991 if (plt_load_toc
10992 && PPC_HA (offset + 8 + 8 * plt_static_chain) != PPC_HA (offset))
ac2df442 10993 {
71a39c98 10994 bfd_put_32 (obfd, ADDI_R11_R11 | PPC_LO (offset), p), p += 4;
ac2df442
AM
10995 offset = 0;
10996 }
71a39c98 10997 bfd_put_32 (obfd, MTCTR_R12, p), p += 4;
b9e5796b 10998 if (plt_load_toc)
794e51c0 10999 {
b9e5796b
AM
11000 if (use_fake_dep)
11001 {
11002 bfd_put_32 (obfd, XOR_R2_R12_R12, p), p += 4;
11003 bfd_put_32 (obfd, ADD_R11_R11_R2, p), p += 4;
11004 }
11005 bfd_put_32 (obfd, LD_R2_0R11 | PPC_LO (offset + 8), p), p += 4;
11006 if (plt_static_chain)
11007 bfd_put_32 (obfd, LD_R11_0R11 | PPC_LO (offset + 16), p), p += 4;
794e51c0 11008 }
ac2df442
AM
11009 }
11010 else
11011 {
176a0d42
AM
11012 if (r != NULL)
11013 {
794e51c0
AM
11014 if (ALWAYS_EMIT_R2SAVE
11015 || stub_entry->stub_type == ppc_stub_plt_call_r2save)
11016 r[0].r_offset += 4;
176a0d42 11017 r[0].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_DS);
b9e5796b 11018 if (plt_load_toc)
176a0d42 11019 {
b9e5796b 11020 if (PPC_HA (offset + 8 + 8 * plt_static_chain) != PPC_HA (offset))
c7131b65 11021 {
b9e5796b
AM
11022 r[1].r_offset = r[0].r_offset + 4;
11023 r[1].r_info = ELF64_R_INFO (0, R_PPC64_TOC16);
11024 r[1].r_addend = r[0].r_addend;
11025 }
11026 else
11027 {
11028 r[1].r_offset = r[0].r_offset + 8 + 8 * use_fake_dep;
11029 r[1].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_DS);
11030 r[1].r_addend = r[0].r_addend + 8 + 8 * plt_static_chain;
11031 if (plt_static_chain)
11032 {
11033 r[2].r_offset = r[1].r_offset + 4;
11034 r[2].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_DS);
11035 r[2].r_addend = r[0].r_addend + 8;
11036 }
c7131b65 11037 }
176a0d42
AM
11038 }
11039 }
794e51c0
AM
11040 if (ALWAYS_EMIT_R2SAVE
11041 || stub_entry->stub_type == ppc_stub_plt_call_r2save)
a078d95a 11042 bfd_put_32 (obfd, STD_R2_0R1 + STK_TOC (htab), p), p += 4;
71a39c98 11043 bfd_put_32 (obfd, LD_R12_0R2 | PPC_LO (offset), p), p += 4;
b9e5796b
AM
11044 if (plt_load_toc
11045 && PPC_HA (offset + 8 + 8 * plt_static_chain) != PPC_HA (offset))
ac2df442
AM
11046 {
11047 bfd_put_32 (obfd, ADDI_R2_R2 | PPC_LO (offset), p), p += 4;
11048 offset = 0;
11049 }
71a39c98 11050 bfd_put_32 (obfd, MTCTR_R12, p), p += 4;
b9e5796b 11051 if (plt_load_toc)
794e51c0 11052 {
b9e5796b
AM
11053 if (use_fake_dep)
11054 {
11055 bfd_put_32 (obfd, XOR_R11_R12_R12, p), p += 4;
11056 bfd_put_32 (obfd, ADD_R2_R2_R11, p), p += 4;
11057 }
11058 if (plt_static_chain)
11059 bfd_put_32 (obfd, LD_R11_0R2 | PPC_LO (offset + 16), p), p += 4;
11060 bfd_put_32 (obfd, LD_R2_0R2 | PPC_LO (offset + 8), p), p += 4;
794e51c0 11061 }
ac2df442 11062 }
b9e5796b 11063 if (plt_load_toc && plt_thread_safe && !use_fake_dep)
794e51c0
AM
11064 {
11065 bfd_put_32 (obfd, CMPLDI_R2_0, p), p += 4;
11066 bfd_put_32 (obfd, BNECTR_P4, p), p += 4;
22aa0c7e 11067 bfd_put_32 (obfd, B_DOT | (cmp_branch_off & 0x3fffffc), p), p += 4;
794e51c0
AM
11068 }
11069 else
407aa07c 11070 bfd_put_32 (obfd, BCTR, p), p += 4;
5d1634d7
AM
11071 return p;
11072}
11073
a7f2871e
AM
11074/* Build a special .plt call stub for __tls_get_addr. */
11075
b9ca1af6 11076#define LD_R0_0R3 0xe8030000
a7f2871e
AM
11077#define LD_R12_0R3 0xe9830000
11078#define MR_R0_R3 0x7c601b78
b9ca1af6 11079#define CMPDI_R0_0 0x2c200000
a7f2871e
AM
11080#define ADD_R3_R12_R13 0x7c6c6a14
11081#define BEQLR 0x4d820020
11082#define MR_R3_R0 0x7c030378
a7f2871e 11083#define BCTRL 0x4e800421
a7f2871e
AM
11084
11085static inline bfd_byte *
794e51c0
AM
11086build_tls_get_addr_stub (struct ppc_link_hash_table *htab,
11087 struct ppc_stub_hash_entry *stub_entry,
11088 bfd_byte *p, bfd_vma offset, Elf_Internal_Rela *r)
a7f2871e 11089{
e7d1c40c 11090 bfd *obfd = htab->params->stub_bfd;
df136d64 11091 bfd_byte *loc = p;
9e7028aa 11092 unsigned int i;
794e51c0 11093
b9ca1af6 11094 bfd_put_32 (obfd, LD_R0_0R3 + 0, p), p += 4;
a7f2871e 11095 bfd_put_32 (obfd, LD_R12_0R3 + 8, p), p += 4;
b9ca1af6 11096 bfd_put_32 (obfd, CMPDI_R0_0, p), p += 4;
a7f2871e 11097 bfd_put_32 (obfd, MR_R0_R3, p), p += 4;
a7f2871e
AM
11098 bfd_put_32 (obfd, ADD_R3_R12_R13, p), p += 4;
11099 bfd_put_32 (obfd, BEQLR, p), p += 4;
11100 bfd_put_32 (obfd, MR_R3_R0, p), p += 4;
9e7028aa
AM
11101 if (htab->params->no_tls_get_addr_regsave)
11102 {
11103 if (r != NULL)
11104 r[0].r_offset += 7 * 4;
11105 if (stub_entry->stub_type != ppc_stub_plt_call_r2save)
11106 return build_plt_stub (htab, stub_entry, p, offset, r);
11107
11108 bfd_put_32 (obfd, MFLR_R0, p);
11109 p += 4;
11110 bfd_put_32 (obfd, STD_R0_0R1 + STK_LINKER (htab), p);
11111 p += 4;
11112
11113 if (r != NULL)
11114 r[0].r_offset += 2 * 4;
11115 p = build_plt_stub (htab, stub_entry, p, offset, r);
11116 bfd_put_32 (obfd, BCTRL, p - 4);
11117
11118 bfd_put_32 (obfd, LD_R2_0R1 + STK_TOC (htab), p);
11119 p += 4;
11120 bfd_put_32 (obfd, LD_R0_0R1 + STK_LINKER (htab), p);
11121 p += 4;
11122 bfd_put_32 (obfd, MTLR_R0, p);
11123 p += 4;
11124 bfd_put_32 (obfd, BLR, p);
11125 p += 4;
11126 }
11127 else
11128 {
11129 p = tls_get_addr_prologue (obfd, p, htab);
f378ab09 11130
9e7028aa
AM
11131 if (r != NULL)
11132 r[0].r_offset += 18 * 4;
a7f2871e 11133
9e7028aa
AM
11134 p = build_plt_stub (htab, stub_entry, p, offset, r);
11135 bfd_put_32 (obfd, BCTRL, p - 4);
11136
11137 if (stub_entry->stub_type == ppc_stub_plt_call_r2save)
11138 {
11139 bfd_put_32 (obfd, LD_R2_0R1 + STK_TOC (htab), p);
11140 p += 4;
11141 }
a7f2871e 11142
9e7028aa
AM
11143 p = tls_get_addr_epilogue (obfd, p, htab);
11144 }
a7f2871e 11145
df136d64
AM
11146 if (htab->glink_eh_frame != NULL
11147 && htab->glink_eh_frame->size != 0)
11148 {
11149 bfd_byte *base, *eh;
df136d64
AM
11150
11151 base = htab->glink_eh_frame->contents + stub_entry->group->eh_base + 17;
11152 eh = base + stub_entry->group->eh_size;
9e7028aa
AM
11153 if (htab->params->no_tls_get_addr_regsave)
11154 {
11155 unsigned int lr_used, delta;
11156 lr_used = stub_entry->stub_offset + (p - 20 - loc);
11157 delta = lr_used - stub_entry->group->lr_restore;
11158 stub_entry->group->lr_restore = lr_used + 16;
11159 eh = eh_advance (htab->elf.dynobj, eh, delta);
11160 *eh++ = DW_CFA_offset_extended_sf;
11161 *eh++ = 65;
11162 *eh++ = -(STK_LINKER (htab) / 8) & 0x7f;
11163 *eh++ = DW_CFA_advance_loc + 4;
11164 }
11165 else
11166 {
11167 unsigned int cfa_updt, delta;
11168 /* After the bctrl, lr has been modified so we need to emit
11169 .eh_frame info saying the return address is on the stack. In
11170 fact we must put the EH info at or before the call rather
11171 than after it, because the EH info for a call needs to be
11172 specified by that point.
11173 See libgcc/unwind-dw2.c execute_cfa_program.
11174 Any stack pointer update must be described immediately after
11175 the instruction making the change, and since the stdu occurs
11176 after saving regs we put all the reg saves and the cfa
11177 change there. */
11178 cfa_updt = stub_entry->stub_offset + 18 * 4;
11179 delta = cfa_updt - stub_entry->group->lr_restore;
11180 stub_entry->group->lr_restore
11181 = stub_entry->stub_offset + (p - loc) - 4;
11182 eh = eh_advance (htab->elf.dynobj, eh, delta);
11183 *eh++ = DW_CFA_def_cfa_offset;
11184 if (htab->opd_abi)
11185 {
11186 *eh++ = 128;
11187 *eh++ = 1;
11188 }
11189 else
11190 *eh++ = 96;
11191 *eh++ = DW_CFA_offset_extended_sf;
11192 *eh++ = 65;
11193 *eh++ = (-16 / 8) & 0x7f;
11194 for (i = 4; i < 12; i++)
11195 {
11196 *eh++ = DW_CFA_offset + i;
11197 *eh++ = (htab->opd_abi ? 13 : 12) - i;
11198 }
11199 *eh++ = (DW_CFA_advance_loc
11200 + (stub_entry->group->lr_restore - 8 - cfa_updt) / 4);
11201 *eh++ = DW_CFA_def_cfa_offset;
11202 *eh++ = 0;
11203 for (i = 4; i < 12; i++)
11204 *eh++ = DW_CFA_restore + i;
11205 *eh++ = DW_CFA_advance_loc + 2;
11206 }
df136d64
AM
11207 *eh++ = DW_CFA_restore_extended;
11208 *eh++ = 65;
11209 stub_entry->group->eh_size = eh - base;
11210 }
a7f2871e
AM
11211 return p;
11212}
11213
176a0d42
AM
11214static Elf_Internal_Rela *
11215get_relocs (asection *sec, int count)
11216{
11217 Elf_Internal_Rela *relocs;
11218 struct bfd_elf_section_data *elfsec_data;
11219
11220 elfsec_data = elf_section_data (sec);
11221 relocs = elfsec_data->relocs;
11222 if (relocs == NULL)
11223 {
11224 bfd_size_type relsize;
11225 relsize = sec->reloc_count * sizeof (*relocs);
11226 relocs = bfd_alloc (sec->owner, relsize);
11227 if (relocs == NULL)
11228 return NULL;
11229 elfsec_data->relocs = relocs;
d4730f92
BS
11230 elfsec_data->rela.hdr = bfd_zalloc (sec->owner,
11231 sizeof (Elf_Internal_Shdr));
11232 if (elfsec_data->rela.hdr == NULL)
11233 return NULL;
11234 elfsec_data->rela.hdr->sh_size = (sec->reloc_count
11235 * sizeof (Elf64_External_Rela));
11236 elfsec_data->rela.hdr->sh_entsize = sizeof (Elf64_External_Rela);
176a0d42
AM
11237 sec->reloc_count = 0;
11238 }
11239 relocs += sec->reloc_count;
11240 sec->reloc_count += count;
11241 return relocs;
11242}
11243
3d58e1fc
AM
11244/* Convert the relocs R[0] thru R[-NUM_REL+1], which are all no-symbol
11245 forms, to the equivalent relocs against the global symbol given by
11246 STUB_ENTRY->H. */
11247
11248static bfd_boolean
11249use_global_in_relocs (struct ppc_link_hash_table *htab,
11250 struct ppc_stub_hash_entry *stub_entry,
11251 Elf_Internal_Rela *r, unsigned int num_rel)
11252{
11253 struct elf_link_hash_entry **hashes;
11254 unsigned long symndx;
11255 struct ppc_link_hash_entry *h;
11256 bfd_vma symval;
11257
11258 /* Relocs are always against symbols in their own object file. Fake
11259 up global sym hashes for the stub bfd (which has no symbols). */
11260 hashes = elf_sym_hashes (htab->params->stub_bfd);
11261 if (hashes == NULL)
11262 {
11263 bfd_size_type hsize;
11264
11265 /* When called the first time, stub_globals will contain the
11266 total number of symbols seen during stub sizing. After
11267 allocating, stub_globals is used as an index to fill the
11268 hashes array. */
11269 hsize = (htab->stub_globals + 1) * sizeof (*hashes);
11270 hashes = bfd_zalloc (htab->params->stub_bfd, hsize);
11271 if (hashes == NULL)
11272 return FALSE;
11273 elf_sym_hashes (htab->params->stub_bfd) = hashes;
11274 htab->stub_globals = 1;
11275 }
11276 symndx = htab->stub_globals++;
11277 h = stub_entry->h;
11278 hashes[symndx] = &h->elf;
11279 if (h->oh != NULL && h->oh->is_func)
11280 h = ppc_follow_link (h->oh);
11281 BFD_ASSERT (h->elf.root.type == bfd_link_hash_defined
11282 || h->elf.root.type == bfd_link_hash_defweak);
ed7007c1 11283 symval = defined_sym_val (&h->elf);
3d58e1fc
AM
11284 while (num_rel-- != 0)
11285 {
11286 r->r_info = ELF64_R_INFO (symndx, ELF64_R_TYPE (r->r_info));
11287 if (h->elf.root.u.def.section != stub_entry->target_section)
11288 {
11289 /* H is an opd symbol. The addend must be zero, and the
11290 branch reloc is the only one we can convert. */
11291 r->r_addend = 0;
11292 break;
11293 }
11294 else
11295 r->r_addend -= symval;
11296 --r;
11297 }
11298 return TRUE;
11299}
11300
aa374f67 11301static bfd_vma
25f53a85 11302get_r2off (struct bfd_link_info *info,
aa374f67
AM
11303 struct ppc_stub_hash_entry *stub_entry)
11304{
25f53a85 11305 struct ppc_link_hash_table *htab = ppc_hash_table (info);
6f20ed8a 11306 bfd_vma r2off = htab->sec_info[stub_entry->target_section->id].toc_off;
aa374f67
AM
11307
11308 if (r2off == 0)
11309 {
11310 /* Support linking -R objects. Get the toc pointer from the
11311 opd entry. */
11312 char buf[8];
b9e5796b
AM
11313 if (!htab->opd_abi)
11314 return r2off;
aa374f67
AM
11315 asection *opd = stub_entry->h->elf.root.u.def.section;
11316 bfd_vma opd_off = stub_entry->h->elf.root.u.def.value;
11317
11318 if (strcmp (opd->name, ".opd") != 0
11319 || opd->reloc_count != 0)
11320 {
2cdcc330
AM
11321 info->callbacks->einfo
11322 (_("%P: cannot find opd entry toc for `%pT'\n"),
11323 stub_entry->h->elf.root.root.string);
aa374f67 11324 bfd_set_error (bfd_error_bad_value);
a7c49797 11325 return (bfd_vma) -1;
aa374f67
AM
11326 }
11327 if (!bfd_get_section_contents (opd->owner, opd, buf, opd_off + 8, 8))
a7c49797 11328 return (bfd_vma) -1;
aa374f67 11329 r2off = bfd_get_64 (opd->owner, buf);
25f53a85 11330 r2off -= elf_gp (info->output_bfd);
aa374f67 11331 }
6f20ed8a 11332 r2off -= htab->sec_info[stub_entry->group->link_sec->id].toc_off;
aa374f67
AM
11333 return r2off;
11334}
11335
b34976b6 11336static bfd_boolean
4ce794b7 11337ppc_build_one_stub (struct bfd_hash_entry *gen_entry, void *in_arg)
5d1634d7 11338{
721956f4
AM
11339 struct ppc_stub_hash_entry *stub_entry;
11340 struct ppc_branch_hash_entry *br_entry;
5d1634d7
AM
11341 struct bfd_link_info *info;
11342 struct ppc_link_hash_table *htab;
721956f4 11343 bfd_byte *loc;
3d58e1fc 11344 bfd_byte *p, *relp;
1aa42141 11345 bfd_vma targ, off;
176a0d42 11346 Elf_Internal_Rela *r;
e054468f 11347 asection *plt;
3d58e1fc 11348 int num_rel;
04bdff6a 11349 int odd;
5d1634d7 11350
721956f4
AM
11351 /* Massage our args to the form they really have. */
11352 stub_entry = (struct ppc_stub_hash_entry *) gen_entry;
4ce794b7 11353 info = in_arg;
5d1634d7 11354
abf874aa
CL
11355 /* Fail if the target section could not be assigned to an output
11356 section. The user should fix his linker script. */
11357 if (stub_entry->target_section != NULL
11358 && stub_entry->target_section->output_section == NULL
11359 && info->non_contiguous_regions)
53215f21
CL
11360 info->callbacks->einfo (_("%F%P: Could not assign '%pA' to an output section. "
11361 "Retry without --enable-non-contiguous-regions.\n"),
11362 stub_entry->target_section);
abf874aa
CL
11363
11364 /* Same for the group. */
11365 if (stub_entry->group->stub_sec != NULL
11366 && stub_entry->group->stub_sec->output_section == NULL
11367 && info->non_contiguous_regions)
53215f21
CL
11368 info->callbacks->einfo (_("%F%P: Could not assign group %pA target %pA to an "
11369 "output section. Retry without "
11370 "--enable-non-contiguous-regions.\n"),
11371 stub_entry->group->stub_sec,
11372 stub_entry->target_section);
abf874aa 11373
5d1634d7 11374 htab = ppc_hash_table (info);
4dfe6ac6
NC
11375 if (htab == NULL)
11376 return FALSE;
5d1634d7 11377
1aa42141 11378 BFD_ASSERT (stub_entry->stub_offset >= stub_entry->group->stub_sec->size);
6f20ed8a 11379 loc = stub_entry->group->stub_sec->contents + stub_entry->stub_offset;
721956f4 11380
4ce794b7 11381 htab->stub_count[stub_entry->stub_type - 1] += 1;
721956f4 11382 switch (stub_entry->stub_type)
5d1634d7 11383 {
721956f4 11384 case ppc_stub_long_branch:
ad8e1ba5 11385 case ppc_stub_long_branch_r2off:
721956f4 11386 /* Branches are relative. This is where we are going to. */
1aa42141 11387 targ = (stub_entry->target_value
6911b7dc
AM
11388 + stub_entry->target_section->output_offset
11389 + stub_entry->target_section->output_section->vma);
1aa42141 11390 targ += PPC64_LOCAL_ENTRY_OFFSET (stub_entry->other);
5d1634d7 11391
721956f4 11392 /* And this is where we are coming from. */
1aa42141
AM
11393 off = (stub_entry->stub_offset
11394 + stub_entry->group->stub_sec->output_offset
11395 + stub_entry->group->stub_sec->output_section->vma);
11396 off = targ - off;
e86ce104 11397
9e390558 11398 p = loc;
ac2df442 11399 if (stub_entry->stub_type == ppc_stub_long_branch_r2off)
ad8e1ba5 11400 {
25f53a85 11401 bfd_vma r2off = get_r2off (info, stub_entry);
ad8e1ba5 11402
a7c49797 11403 if (r2off == (bfd_vma) -1)
aa374f67
AM
11404 {
11405 htab->stub_error = TRUE;
11406 return FALSE;
11407 }
9e390558
AM
11408 bfd_put_32 (htab->params->stub_bfd, STD_R2_0R1 + STK_TOC (htab), p);
11409 p += 4;
ac2df442
AM
11410 if (PPC_HA (r2off) != 0)
11411 {
e7d1c40c 11412 bfd_put_32 (htab->params->stub_bfd,
9e390558
AM
11413 ADDIS_R2_R2 | PPC_HA (r2off), p);
11414 p += 4;
a7c49797
AM
11415 }
11416 if (PPC_LO (r2off) != 0)
11417 {
11418 bfd_put_32 (htab->params->stub_bfd,
9e390558
AM
11419 ADDI_R2_R2 | PPC_LO (r2off), p);
11420 p += 4;
ac2df442 11421 }
9e390558 11422 off -= p - loc;
ad8e1ba5 11423 }
9e390558
AM
11424 bfd_put_32 (htab->params->stub_bfd, B_DOT | (off & 0x3fffffc), p);
11425 p += 4;
ad8e1ba5 11426
5c3dead3
AM
11427 if (off + (1 << 25) >= (bfd_vma) (1 << 26))
11428 {
cf97bcb0
AM
11429 _bfd_error_handler
11430 (_("long branch stub `%s' offset overflow"),
bc30df16 11431 stub_entry->root.string);
5c3dead3
AM
11432 htab->stub_error = TRUE;
11433 return FALSE;
11434 }
ee75fd95
AM
11435
11436 if (info->emitrelocations)
11437 {
6f20ed8a 11438 r = get_relocs (stub_entry->group->stub_sec, 1);
176a0d42
AM
11439 if (r == NULL)
11440 return FALSE;
9e390558 11441 r->r_offset = p - 4 - stub_entry->group->stub_sec->contents;
ee75fd95 11442 r->r_info = ELF64_R_INFO (0, R_PPC64_REL24);
1aa42141 11443 r->r_addend = targ;
3d58e1fc
AM
11444 if (stub_entry->h != NULL
11445 && !use_global_in_relocs (htab, stub_entry, r, 1))
11446 return FALSE;
ee75fd95 11447 }
721956f4 11448 break;
e86ce104 11449
721956f4 11450 case ppc_stub_plt_branch:
ad8e1ba5 11451 case ppc_stub_plt_branch_r2off:
721956f4
AM
11452 br_entry = ppc_branch_hash_lookup (&htab->branch_hash_table,
11453 stub_entry->root.string + 9,
b34976b6 11454 FALSE, FALSE);
721956f4
AM
11455 if (br_entry == NULL)
11456 {
cf97bcb0
AM
11457 _bfd_error_handler (_("can't find branch stub `%s'"),
11458 stub_entry->root.string);
b34976b6
AM
11459 htab->stub_error = TRUE;
11460 return FALSE;
721956f4
AM
11461 }
11462
1aa42141 11463 targ = (stub_entry->target_value
176a0d42
AM
11464 + stub_entry->target_section->output_offset
11465 + stub_entry->target_section->output_section->vma);
6911b7dc 11466 if (stub_entry->stub_type != ppc_stub_plt_branch_r2off)
1aa42141 11467 targ += PPC64_LOCAL_ENTRY_OFFSET (stub_entry->other);
721956f4 11468
1aa42141 11469 bfd_put_64 (htab->brlt->owner, targ,
4ce794b7 11470 htab->brlt->contents + br_entry->offset);
721956f4 11471
f94498ff 11472 if (br_entry->iter == htab->stub_iteration)
721956f4 11473 {
f94498ff 11474 br_entry->iter = 0;
84f5d08e 11475
f94498ff 11476 if (htab->relbrlt != NULL)
84f5d08e 11477 {
f94498ff
AM
11478 /* Create a reloc for the branch lookup table entry. */
11479 Elf_Internal_Rela rela;
11480 bfd_byte *rl;
11481
11482 rela.r_offset = (br_entry->offset
11483 + htab->brlt->output_offset
11484 + htab->brlt->output_section->vma);
11485 rela.r_info = ELF64_R_INFO (0, R_PPC64_RELATIVE);
1aa42141 11486 rela.r_addend = targ;
f94498ff
AM
11487
11488 rl = htab->relbrlt->contents;
11489 rl += (htab->relbrlt->reloc_count++
11490 * sizeof (Elf64_External_Rela));
11491 bfd_elf64_swap_reloca_out (htab->relbrlt->owner, &rela, rl);
11492 }
11493 else if (info->emitrelocations)
11494 {
176a0d42
AM
11495 r = get_relocs (htab->brlt, 1);
11496 if (r == NULL)
11497 return FALSE;
11498 /* brlt, being SEC_LINKER_CREATED does not go through the
11499 normal reloc processing. Symbols and offsets are not
11500 translated from input file to output file form, so
11501 set up the offset per the output file. */
f94498ff
AM
11502 r->r_offset = (br_entry->offset
11503 + htab->brlt->output_offset
11504 + htab->brlt->output_section->vma);
11505 r->r_info = ELF64_R_INFO (0, R_PPC64_RELATIVE);
1aa42141 11506 r->r_addend = targ;
84f5d08e 11507 }
84f5d08e 11508 }
721956f4 11509
1aa42141 11510 targ = (br_entry->offset
176a0d42
AM
11511 + htab->brlt->output_offset
11512 + htab->brlt->output_section->vma);
11513
1aa42141
AM
11514 off = (elf_gp (info->output_bfd)
11515 + htab->sec_info[stub_entry->group->link_sec->id].toc_off);
11516 off = targ - off;
721956f4 11517
ad8e1ba5 11518 if (off + 0x80008000 > 0xffffffff || (off & 7) != 0)
5d1634d7 11519 {
25f53a85 11520 info->callbacks->einfo
c1c8c1ef 11521 (_("%P: linkage table error against `%pT'\n"),
721956f4 11522 stub_entry->root.string);
5d1634d7 11523 bfd_set_error (bfd_error_bad_value);
b34976b6
AM
11524 htab->stub_error = TRUE;
11525 return FALSE;
5d1634d7 11526 }
41bd81ab 11527
176a0d42
AM
11528 if (info->emitrelocations)
11529 {
6f20ed8a 11530 r = get_relocs (stub_entry->group->stub_sec, 1 + (PPC_HA (off) != 0));
176a0d42
AM
11531 if (r == NULL)
11532 return FALSE;
6f20ed8a 11533 r[0].r_offset = loc - stub_entry->group->stub_sec->contents;
7cfbafbc
AM
11534 if (bfd_big_endian (info->output_bfd))
11535 r[0].r_offset += 2;
00f412ee 11536 if (stub_entry->stub_type == ppc_stub_plt_branch_r2off)
176a0d42
AM
11537 r[0].r_offset += 4;
11538 r[0].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_DS);
1aa42141 11539 r[0].r_addend = targ;
176a0d42
AM
11540 if (PPC_HA (off) != 0)
11541 {
11542 r[0].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_HA);
11543 r[1].r_offset = r[0].r_offset + 4;
11544 r[1].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_LO_DS);
11545 r[1].r_addend = r[0].r_addend;
11546 }
11547 }
11548
9e390558 11549 p = loc;
00f412ee 11550 if (stub_entry->stub_type != ppc_stub_plt_branch_r2off)
ad8e1ba5 11551 {
176a0d42 11552 if (PPC_HA (off) != 0)
ac2df442 11553 {
e7d1c40c 11554 bfd_put_32 (htab->params->stub_bfd,
9e390558
AM
11555 ADDIS_R12_R2 | PPC_HA (off), p);
11556 p += 4;
e7d1c40c 11557 bfd_put_32 (htab->params->stub_bfd,
9e390558 11558 LD_R12_0R12 | PPC_LO (off), p);
ac2df442
AM
11559 }
11560 else
9e390558
AM
11561 bfd_put_32 (htab->params->stub_bfd,
11562 LD_R12_0R2 | PPC_LO (off), p);
ad8e1ba5
AM
11563 }
11564 else
11565 {
25f53a85 11566 bfd_vma r2off = get_r2off (info, stub_entry);
aa374f67 11567
a7c49797 11568 if (r2off == (bfd_vma) -1)
aa374f67
AM
11569 {
11570 htab->stub_error = TRUE;
11571 return FALSE;
11572 }
ad8e1ba5 11573
9e390558
AM
11574 bfd_put_32 (htab->params->stub_bfd, STD_R2_0R1 + STK_TOC (htab), p);
11575 p += 4;
176a0d42 11576 if (PPC_HA (off) != 0)
ac2df442 11577 {
e7d1c40c 11578 bfd_put_32 (htab->params->stub_bfd,
9e390558
AM
11579 ADDIS_R12_R2 | PPC_HA (off), p);
11580 p += 4;
e7d1c40c 11581 bfd_put_32 (htab->params->stub_bfd,
9e390558 11582 LD_R12_0R12 | PPC_LO (off), p);
ac2df442
AM
11583 }
11584 else
9e390558 11585 bfd_put_32 (htab->params->stub_bfd, LD_R12_0R2 | PPC_LO (off), p);
ac2df442
AM
11586
11587 if (PPC_HA (r2off) != 0)
11588 {
9e390558 11589 p += 4;
e7d1c40c 11590 bfd_put_32 (htab->params->stub_bfd,
9e390558 11591 ADDIS_R2_R2 | PPC_HA (r2off), p);
00f412ee
AM
11592 }
11593 if (PPC_LO (r2off) != 0)
11594 {
9e390558 11595 p += 4;
e7d1c40c 11596 bfd_put_32 (htab->params->stub_bfd,
9e390558 11597 ADDI_R2_R2 | PPC_LO (r2off), p);
ac2df442 11598 }
ad8e1ba5 11599 }
9e390558
AM
11600 p += 4;
11601 bfd_put_32 (htab->params->stub_bfd, MTCTR_R12, p);
11602 p += 4;
407aa07c
AM
11603 bfd_put_32 (htab->params->stub_bfd, BCTR, p);
11604 p += 4;
721956f4 11605 break;
5d1634d7 11606
05d0e962
AM
11607 case ppc_stub_long_branch_notoc:
11608 case ppc_stub_long_branch_both:
11609 case ppc_stub_plt_branch_notoc:
11610 case ppc_stub_plt_branch_both:
11611 case ppc_stub_plt_call_notoc:
11612 case ppc_stub_plt_call_both:
11613 p = loc;
f891966f 11614 off = (stub_entry->stub_offset
05d0e962
AM
11615 + stub_entry->group->stub_sec->output_offset
11616 + stub_entry->group->stub_sec->output_section->vma);
11617 if (stub_entry->stub_type == ppc_stub_long_branch_both
11618 || stub_entry->stub_type == ppc_stub_plt_branch_both
11619 || stub_entry->stub_type == ppc_stub_plt_call_both)
11620 {
11621 off += 4;
11622 bfd_put_32 (htab->params->stub_bfd, STD_R2_0R1 + STK_TOC (htab), p);
11623 p += 4;
11624 }
11625 if (stub_entry->stub_type >= ppc_stub_plt_call_notoc)
11626 {
11627 targ = stub_entry->plt_ent->plt.offset & ~1;
11628 if (targ >= (bfd_vma) -2)
11629 abort ();
11630
11631 plt = htab->elf.splt;
11632 if (!htab->elf.dynamic_sections_created
11633 || stub_entry->h == NULL
11634 || stub_entry->h->elf.dynindx == -1)
11635 {
11636 if (stub_entry->symtype == STT_GNU_IFUNC)
11637 plt = htab->elf.iplt;
11638 else
11639 plt = htab->pltlocal;
11640 }
11641 targ += plt->output_offset + plt->output_section->vma;
11642 }
11643 else
11644 targ = (stub_entry->target_value
11645 + stub_entry->target_section->output_offset
11646 + stub_entry->target_section->output_section->vma);
04bdff6a 11647 odd = off & 4;
05d0e962 11648 off = targ - off;
f891966f 11649
3d58e1fc
AM
11650 relp = p;
11651 num_rel = 0;
7c1f4227 11652 if (htab->power10_stubs)
04bdff6a
AM
11653 {
11654 bfd_boolean load = stub_entry->stub_type >= ppc_stub_plt_call_notoc;
7c1f4227 11655 p = build_power10_offset (htab->params->stub_bfd, p, off, odd, load);
04bdff6a
AM
11656 }
11657 else
11658 {
11659 /* The notoc stubs calculate their target (either a PLT entry or
11660 the global entry point of a function) relative to the PC
11661 returned by the "bcl" two instructions past the start of the
11662 sequence emitted by build_offset. The offset is therefore 8
11663 less than calculated from the start of the sequence. */
11664 off -= 8;
11665 p = build_offset (htab->params->stub_bfd, p, off,
11666 stub_entry->stub_type >= ppc_stub_plt_call_notoc);
11667 }
11668
f891966f 11669 if (stub_entry->stub_type <= ppc_stub_long_branch_both)
05d0e962 11670 {
f891966f 11671 bfd_vma from;
3d58e1fc 11672 num_rel = 1;
f891966f
AM
11673 from = (stub_entry->stub_offset
11674 + stub_entry->group->stub_sec->output_offset
11675 + stub_entry->group->stub_sec->output_section->vma
11676 + (p - loc));
05d0e962 11677 bfd_put_32 (htab->params->stub_bfd,
f891966f 11678 B_DOT | ((targ - from) & 0x3fffffc), p);
05d0e962
AM
11679 }
11680 else
11681 {
11682 bfd_put_32 (htab->params->stub_bfd, MTCTR_R12, p);
11683 p += 4;
11684 bfd_put_32 (htab->params->stub_bfd, BCTR, p);
11685 }
11686 p += 4;
df136d64 11687
3d58e1fc
AM
11688 if (info->emitrelocations)
11689 {
04bdff6a 11690 bfd_vma roff = relp - stub_entry->group->stub_sec->contents;
7c1f4227
AM
11691 if (htab->power10_stubs)
11692 num_rel += num_relocs_for_power10_offset (off, odd);
04bdff6a
AM
11693 else
11694 {
11695 num_rel += num_relocs_for_offset (off);
11696 roff += 16;
11697 }
3d58e1fc
AM
11698 r = get_relocs (stub_entry->group->stub_sec, num_rel);
11699 if (r == NULL)
11700 return FALSE;
7c1f4227
AM
11701 if (htab->power10_stubs)
11702 r = emit_relocs_for_power10_offset (info, r, roff, targ, off, odd);
04bdff6a
AM
11703 else
11704 r = emit_relocs_for_offset (info, r, roff, targ, off);
3d58e1fc
AM
11705 if (stub_entry->stub_type == ppc_stub_long_branch_notoc
11706 || stub_entry->stub_type == ppc_stub_long_branch_both)
11707 {
11708 ++r;
11709 roff = p - 4 - stub_entry->group->stub_sec->contents;
11710 r->r_offset = roff;
11711 r->r_info = ELF64_R_INFO (0, R_PPC64_REL24);
11712 r->r_addend = targ;
11713 if (stub_entry->h != NULL
11714 && !use_global_in_relocs (htab, stub_entry, r, num_rel))
11715 return FALSE;
11716 }
11717 }
11718
7c1f4227 11719 if (!htab->power10_stubs
04bdff6a
AM
11720 && htab->glink_eh_frame != NULL
11721 && htab->glink_eh_frame->size != 0)
df136d64
AM
11722 {
11723 bfd_byte *base, *eh;
11724 unsigned int lr_used, delta;
11725
11726 base = (htab->glink_eh_frame->contents
11727 + stub_entry->group->eh_base + 17);
11728 eh = base + stub_entry->group->eh_size;
11729 lr_used = stub_entry->stub_offset + 8;
11730 if (stub_entry->stub_type == ppc_stub_long_branch_both
11731 || stub_entry->stub_type == ppc_stub_plt_branch_both
11732 || stub_entry->stub_type == ppc_stub_plt_call_both)
11733 lr_used += 4;
11734 delta = lr_used - stub_entry->group->lr_restore;
11735 stub_entry->group->lr_restore = lr_used + 8;
11736 eh = eh_advance (htab->elf.dynobj, eh, delta);
11737 *eh++ = DW_CFA_register;
11738 *eh++ = 65;
11739 *eh++ = 12;
11740 *eh++ = DW_CFA_advance_loc + 2;
11741 *eh++ = DW_CFA_restore_extended;
11742 *eh++ = 65;
11743 stub_entry->group->eh_size = eh - base;
11744 }
05d0e962
AM
11745 break;
11746
721956f4 11747 case ppc_stub_plt_call:
794e51c0 11748 case ppc_stub_plt_call_r2save:
e054468f 11749 if (stub_entry->h != NULL
b31867b6
AM
11750 && stub_entry->h->is_func_descriptor
11751 && stub_entry->h->oh != NULL)
c862ae31 11752 {
b31867b6
AM
11753 struct ppc_link_hash_entry *fh = ppc_follow_link (stub_entry->h->oh);
11754
11755 /* If the old-ABI "dot-symbol" is undefined make it weak so
6f20ed8a 11756 we don't get a link error from RELOC_FOR_GLOBAL_SYMBOL. */
8c5b4e52
AM
11757 if (fh->elf.root.type == bfd_link_hash_undefined
11758 && (stub_entry->h->elf.root.type == bfd_link_hash_defined
11759 || stub_entry->h->elf.root.type == bfd_link_hash_defweak))
b31867b6 11760 fh->elf.root.type = bfd_link_hash_undefweak;
c862ae31
AM
11761 }
11762
721956f4 11763 /* Now build the stub. */
1aa42141
AM
11764 targ = stub_entry->plt_ent->plt.offset & ~1;
11765 if (targ >= (bfd_vma) -2)
721956f4
AM
11766 abort ();
11767
33e44f2e 11768 plt = htab->elf.splt;
25f23106
AM
11769 if (!htab->elf.dynamic_sections_created
11770 || stub_entry->h == NULL
11771 || stub_entry->h->elf.dynindx == -1)
2d7ad24e
AM
11772 {
11773 if (stub_entry->symtype == STT_GNU_IFUNC)
11774 plt = htab->elf.iplt;
11775 else
11776 plt = htab->pltlocal;
11777 }
1aa42141 11778 targ += plt->output_offset + plt->output_section->vma;
e054468f 11779
1aa42141
AM
11780 off = (elf_gp (info->output_bfd)
11781 + htab->sec_info[stub_entry->group->link_sec->id].toc_off);
11782 off = targ - off;
721956f4 11783
ad8e1ba5 11784 if (off + 0x80008000 > 0xffffffff || (off & 7) != 0)
721956f4 11785 {
25f53a85 11786 info->callbacks->einfo
695344c0 11787 /* xgettext:c-format */
c1c8c1ef 11788 (_("%P: linkage table error against `%pT'\n"),
e054468f
AM
11789 stub_entry->h != NULL
11790 ? stub_entry->h->elf.root.root.string
11791 : "<local sym>");
721956f4 11792 bfd_set_error (bfd_error_bad_value);
b34976b6
AM
11793 htab->stub_error = TRUE;
11794 return FALSE;
721956f4
AM
11795 }
11796
176a0d42
AM
11797 r = NULL;
11798 if (info->emitrelocations)
11799 {
6f20ed8a 11800 r = get_relocs (stub_entry->group->stub_sec,
3ba720c7
AM
11801 ((PPC_HA (off) != 0)
11802 + (htab->opd_abi
e7d1c40c 11803 ? 2 + (htab->params->plt_static_chain
3ba720c7
AM
11804 && PPC_HA (off + 16) == PPC_HA (off))
11805 : 1)));
176a0d42
AM
11806 if (r == NULL)
11807 return FALSE;
6f20ed8a 11808 r[0].r_offset = loc - stub_entry->group->stub_sec->contents;
7cfbafbc
AM
11809 if (bfd_big_endian (info->output_bfd))
11810 r[0].r_offset += 2;
1aa42141 11811 r[0].r_addend = targ;
176a0d42 11812 }
a7f2871e 11813 if (stub_entry->h != NULL
ed7007c1 11814 && is_tls_get_addr (&stub_entry->h->elf, htab)
7c9cf415 11815 && htab->params->tls_get_addr_opt)
794e51c0 11816 p = build_tls_get_addr_stub (htab, stub_entry, loc, off, r);
a7f2871e 11817 else
794e51c0 11818 p = build_plt_stub (htab, stub_entry, loc, off, r);
721956f4
AM
11819 break;
11820
a4b6fadd
AM
11821 case ppc_stub_save_res:
11822 return TRUE;
11823
721956f4
AM
11824 default:
11825 BFD_FAIL ();
b34976b6 11826 return FALSE;
721956f4
AM
11827 }
11828
1aa42141 11829 stub_entry->group->stub_sec->size = stub_entry->stub_offset + (p - loc);
97b639ba 11830
e7d1c40c 11831 if (htab->params->emit_stub_syms)
97b639ba
AM
11832 {
11833 struct elf_link_hash_entry *h;
ee75fd95
AM
11834 size_t len1, len2;
11835 char *name;
11836 const char *const stub_str[] = { "long_branch",
05d0e962
AM
11837 "long_branch",
11838 "long_branch",
3f6ff479
AM
11839 "long_branch",
11840 "plt_branch",
ee75fd95 11841 "plt_branch",
05d0e962
AM
11842 "plt_branch",
11843 "plt_branch",
11844 "plt_call",
11845 "plt_call",
794e51c0 11846 "plt_call",
ee75fd95
AM
11847 "plt_call" };
11848
11849 len1 = strlen (stub_str[stub_entry->stub_type - 1]);
11850 len2 = strlen (stub_entry->root.string);
11851 name = bfd_malloc (len1 + len2 + 2);
11852 if (name == NULL)
11853 return FALSE;
11854 memcpy (name, stub_entry->root.string, 9);
11855 memcpy (name + 9, stub_str[stub_entry->stub_type - 1], len1);
11856 memcpy (name + len1 + 9, stub_entry->root.string + 8, len2 - 8 + 1);
11857 h = elf_link_hash_lookup (&htab->elf, name, TRUE, FALSE, FALSE);
97b639ba
AM
11858 if (h == NULL)
11859 return FALSE;
11860 if (h->root.type == bfd_link_hash_new)
11861 {
11862 h->root.type = bfd_link_hash_defined;
6f20ed8a 11863 h->root.u.def.section = stub_entry->group->stub_sec;
97b639ba 11864 h->root.u.def.value = stub_entry->stub_offset;
f5385ebf
AM
11865 h->ref_regular = 1;
11866 h->def_regular = 1;
11867 h->ref_regular_nonweak = 1;
11868 h->forced_local = 1;
11869 h->non_elf = 0;
2ec55de3 11870 h->root.linker_def = 1;
97b639ba
AM
11871 }
11872 }
11873
b34976b6 11874 return TRUE;
721956f4
AM
11875}
11876
11877/* As above, but don't actually build the stub. Just bump offset so
11878 we know stub section sizes, and select plt_branch stubs where
11879 long_branch stubs won't do. */
11880
b34976b6 11881static bfd_boolean
4ce794b7 11882ppc_size_one_stub (struct bfd_hash_entry *gen_entry, void *in_arg)
721956f4
AM
11883{
11884 struct ppc_stub_hash_entry *stub_entry;
63bc6f6c 11885 struct bfd_link_info *info;
721956f4 11886 struct ppc_link_hash_table *htab;
f891966f
AM
11887 asection *plt;
11888 bfd_vma targ, off, r2off;
04bdff6a 11889 unsigned int size, extra, lr_used, delta, odd;
721956f4
AM
11890
11891 /* Massage our args to the form they really have. */
11892 stub_entry = (struct ppc_stub_hash_entry *) gen_entry;
63bc6f6c
AM
11893 info = in_arg;
11894
11895 htab = ppc_hash_table (info);
4dfe6ac6
NC
11896 if (htab == NULL)
11897 return FALSE;
721956f4 11898
abf874aa
CL
11899 /* Fail if the target section could not be assigned to an output
11900 section. The user should fix his linker script. */
11901 if (stub_entry->target_section != NULL
11902 && stub_entry->target_section->output_section == NULL
11903 && info->non_contiguous_regions)
53215f21
CL
11904 info->callbacks->einfo (_("%F%P: Could not assign %pA to an output section. "
11905 "Retry without --enable-non-contiguous-regions.\n"),
11906 stub_entry->target_section);
abf874aa
CL
11907
11908 /* Same for the group. */
11909 if (stub_entry->group->stub_sec != NULL
11910 && stub_entry->group->stub_sec->output_section == NULL
11911 && info->non_contiguous_regions)
53215f21
CL
11912 info->callbacks->einfo (_("%F%P: Could not assign group %pA target %pA to an "
11913 "output section. Retry without "
11914 "--enable-non-contiguous-regions.\n"),
11915 stub_entry->group->stub_sec,
11916 stub_entry->target_section);
abf874aa 11917
1aa42141
AM
11918 /* Make a note of the offset within the stubs for this entry. */
11919 stub_entry->stub_offset = stub_entry->group->stub_sec->size;
11920
a4b6fadd
AM
11921 if (stub_entry->h != NULL
11922 && stub_entry->h->save_res
11923 && stub_entry->h->elf.root.type == bfd_link_hash_defined
11924 && stub_entry->h->elf.root.u.def.section == htab->sfpr)
11925 {
11926 /* Don't make stubs to out-of-line register save/restore
11927 functions. Instead, emit copies of the functions. */
11928 stub_entry->group->needs_save_res = 1;
11929 stub_entry->stub_type = ppc_stub_save_res;
11930 return TRUE;
11931 }
11932
f891966f 11933 switch (stub_entry->stub_type)
721956f4 11934 {
f891966f
AM
11935 case ppc_stub_plt_branch:
11936 case ppc_stub_plt_branch_r2off:
11937 /* Reset the stub type from the plt branch variant in case we now
11938 can reach with a shorter stub. */
11939 stub_entry->stub_type += ppc_stub_long_branch - ppc_stub_plt_branch;
11940 /* Fall through. */
11941 case ppc_stub_long_branch:
11942 case ppc_stub_long_branch_r2off:
1aa42141
AM
11943 targ = (stub_entry->target_value
11944 + stub_entry->target_section->output_offset
11945 + stub_entry->target_section->output_section->vma);
f891966f 11946 targ += PPC64_LOCAL_ENTRY_OFFSET (stub_entry->other);
1aa42141
AM
11947 off = (stub_entry->stub_offset
11948 + stub_entry->group->stub_sec->output_offset
11949 + stub_entry->group->stub_sec->output_section->vma);
721956f4 11950
ad8e1ba5 11951 size = 4;
f891966f 11952 r2off = 0;
ad8e1ba5
AM
11953 if (stub_entry->stub_type == ppc_stub_long_branch_r2off)
11954 {
25f53a85 11955 r2off = get_r2off (info, stub_entry);
a7c49797 11956 if (r2off == (bfd_vma) -1)
aa374f67
AM
11957 {
11958 htab->stub_error = TRUE;
11959 return FALSE;
11960 }
a7c49797 11961 size = 8;
ac2df442 11962 if (PPC_HA (r2off) != 0)
a7c49797
AM
11963 size += 4;
11964 if (PPC_LO (r2off) != 0)
11965 size += 4;
1aa42141 11966 off += size - 4;
ad8e1ba5 11967 }
1aa42141 11968 off = targ - off;
ad8e1ba5 11969
f891966f
AM
11970 /* If the branch offset is too big, use a ppc_stub_plt_branch.
11971 Do the same for -R objects without function descriptors. */
11972 if ((stub_entry->stub_type == ppc_stub_long_branch_r2off
11973 && r2off == 0
11974 && htab->sec_info[stub_entry->target_section->id].toc_off == 0)
11975 || off + (1 << 25) >= (bfd_vma) (1 << 26))
721956f4 11976 {
f891966f 11977 struct ppc_branch_hash_entry *br_entry;
df136d64 11978
f891966f
AM
11979 br_entry = ppc_branch_hash_lookup (&htab->branch_hash_table,
11980 stub_entry->root.string + 9,
11981 TRUE, FALSE);
11982 if (br_entry == NULL)
721956f4 11983 {
f891966f
AM
11984 _bfd_error_handler (_("can't build branch stub `%s'"),
11985 stub_entry->root.string);
11986 htab->stub_error = TRUE;
11987 return FALSE;
721956f4
AM
11988 }
11989
f891966f 11990 if (br_entry->iter != htab->stub_iteration)
721956f4 11991 {
f891966f
AM
11992 br_entry->iter = htab->stub_iteration;
11993 br_entry->offset = htab->brlt->size;
11994 htab->brlt->size += 8;
63bc6f6c 11995
f891966f
AM
11996 if (htab->relbrlt != NULL)
11997 htab->relbrlt->size += sizeof (Elf64_External_Rela);
11998 else if (info->emitrelocations)
84f5d08e 11999 {
f891966f
AM
12000 htab->brlt->reloc_count += 1;
12001 htab->brlt->flags |= SEC_RELOC;
05d0e962 12002 }
f891966f 12003 }
ac2df442 12004
f891966f
AM
12005 targ = (br_entry->offset
12006 + htab->brlt->output_offset
12007 + htab->brlt->output_section->vma);
12008 off = (elf_gp (info->output_bfd)
12009 + htab->sec_info[stub_entry->group->link_sec->id].toc_off);
12010 off = targ - off;
176a0d42 12011
f891966f
AM
12012 if (info->emitrelocations)
12013 {
12014 stub_entry->group->stub_sec->reloc_count
12015 += 1 + (PPC_HA (off) != 0);
12016 stub_entry->group->stub_sec->flags |= SEC_RELOC;
12017 }
05d0e962 12018
f891966f
AM
12019 stub_entry->stub_type += ppc_stub_plt_branch - ppc_stub_long_branch;
12020 if (stub_entry->stub_type != ppc_stub_plt_branch_r2off)
12021 {
12022 size = 12;
12023 if (PPC_HA (off) != 0)
12024 size = 16;
ac2df442 12025 }
f891966f 12026 else
ac2df442 12027 {
f891966f
AM
12028 size = 16;
12029 if (PPC_HA (off) != 0)
12030 size += 4;
12031
12032 if (PPC_HA (r2off) != 0)
12033 size += 4;
12034 if (PPC_LO (r2off) != 0)
12035 size += 4;
ac2df442 12036 }
721956f4 12037 }
f891966f
AM
12038 else if (info->emitrelocations)
12039 {
12040 stub_entry->group->stub_sec->reloc_count += 1;
12041 stub_entry->group->stub_sec->flags |= SEC_RELOC;
12042 }
12043 break;
12044
12045 case ppc_stub_plt_branch_notoc:
12046 case ppc_stub_plt_branch_both:
12047 stub_entry->stub_type += ppc_stub_long_branch - ppc_stub_plt_branch;
12048 /* Fall through. */
12049 case ppc_stub_long_branch_notoc:
12050 case ppc_stub_long_branch_both:
12051 off = (stub_entry->stub_offset
12052 + stub_entry->group->stub_sec->output_offset
12053 + stub_entry->group->stub_sec->output_section->vma);
12054 size = 0;
12055 if (stub_entry->stub_type == ppc_stub_long_branch_both)
12056 size = 4;
12057 off += size;
12058 targ = (stub_entry->target_value
12059 + stub_entry->target_section->output_offset
12060 + stub_entry->target_section->output_section->vma);
04bdff6a 12061 odd = off & 4;
f891966f
AM
12062 off = targ - off;
12063
3d58e1fc
AM
12064 if (info->emitrelocations)
12065 {
04bdff6a 12066 unsigned int num_rel;
7c1f4227
AM
12067 if (htab->power10_stubs)
12068 num_rel = num_relocs_for_power10_offset (off, odd);
04bdff6a
AM
12069 else
12070 num_rel = num_relocs_for_offset (off - 8);
12071 stub_entry->group->stub_sec->reloc_count += num_rel;
3d58e1fc
AM
12072 stub_entry->group->stub_sec->flags |= SEC_RELOC;
12073 }
12074
7c1f4227
AM
12075 if (htab->power10_stubs)
12076 extra = size_power10_offset (off, odd);
04bdff6a
AM
12077 else
12078 extra = size_offset (off - 8);
f891966f
AM
12079 /* Include branch insn plus those in the offset sequence. */
12080 size += 4 + extra;
12081 /* The branch insn is at the end, or "extra" bytes along. So
12082 its offset will be "extra" bytes less that that already
12083 calculated. */
12084 off -= extra;
12085
7c1f4227 12086 if (!htab->power10_stubs)
04bdff6a
AM
12087 {
12088 /* After the bcl, lr has been modified so we need to emit
12089 .eh_frame info saying the return address is in r12. */
12090 lr_used = stub_entry->stub_offset + 8;
12091 if (stub_entry->stub_type == ppc_stub_long_branch_both)
12092 lr_used += 4;
12093 /* The eh_frame info will consist of a DW_CFA_advance_loc or
12094 variant, DW_CFA_register, 65, 12, DW_CFA_advance_loc+2,
12095 DW_CFA_restore_extended 65. */
12096 delta = lr_used - stub_entry->group->lr_restore;
12097 stub_entry->group->eh_size += eh_advance_size (delta) + 6;
12098 stub_entry->group->lr_restore = lr_used + 8;
12099 }
f891966f
AM
12100
12101 /* If the branch can't reach, use a plt_branch. */
12102 if (off + (1 << 25) >= (bfd_vma) (1 << 26))
12103 {
12104 stub_entry->stub_type += (ppc_stub_plt_branch_notoc
12105 - ppc_stub_long_branch_notoc);
12106 size += 4;
12107 }
3d58e1fc
AM
12108 else if (info->emitrelocations)
12109 stub_entry->group->stub_sec->reloc_count +=1;
f891966f
AM
12110 break;
12111
12112 case ppc_stub_plt_call_notoc:
12113 case ppc_stub_plt_call_both:
12114 off = (stub_entry->stub_offset
12115 + stub_entry->group->stub_sec->output_offset
12116 + stub_entry->group->stub_sec->output_section->vma);
12117 if (stub_entry->stub_type == ppc_stub_plt_call_both)
12118 off += 4;
12119 targ = stub_entry->plt_ent->plt.offset & ~1;
12120 if (targ >= (bfd_vma) -2)
12121 abort ();
12122
12123 plt = htab->elf.splt;
12124 if (!htab->elf.dynamic_sections_created
12125 || stub_entry->h == NULL
12126 || stub_entry->h->elf.dynindx == -1)
12127 {
12128 if (stub_entry->symtype == STT_GNU_IFUNC)
12129 plt = htab->elf.iplt;
12130 else
12131 plt = htab->pltlocal;
12132 }
12133 targ += plt->output_offset + plt->output_section->vma;
04bdff6a 12134 odd = off & 4;
f891966f
AM
12135 off = targ - off;
12136
12137 if (htab->params->plt_stub_align != 0)
12138 {
12139 unsigned pad = plt_stub_pad (htab, stub_entry, off);
12140
12141 stub_entry->group->stub_sec->size += pad;
12142 stub_entry->stub_offset = stub_entry->group->stub_sec->size;
12143 off -= pad;
12144 }
12145
3d58e1fc
AM
12146 if (info->emitrelocations)
12147 {
04bdff6a 12148 unsigned int num_rel;
7c1f4227
AM
12149 if (htab->power10_stubs)
12150 num_rel = num_relocs_for_power10_offset (off, odd);
04bdff6a
AM
12151 else
12152 num_rel = num_relocs_for_offset (off - 8);
12153 stub_entry->group->stub_sec->reloc_count += num_rel;
3d58e1fc
AM
12154 stub_entry->group->stub_sec->flags |= SEC_RELOC;
12155 }
12156
f891966f
AM
12157 size = plt_stub_size (htab, stub_entry, off);
12158
7c1f4227 12159 if (!htab->power10_stubs)
04bdff6a
AM
12160 {
12161 /* After the bcl, lr has been modified so we need to emit
12162 .eh_frame info saying the return address is in r12. */
12163 lr_used = stub_entry->stub_offset + 8;
12164 if (stub_entry->stub_type == ppc_stub_plt_call_both)
12165 lr_used += 4;
12166 /* The eh_frame info will consist of a DW_CFA_advance_loc or
12167 variant, DW_CFA_register, 65, 12, DW_CFA_advance_loc+2,
12168 DW_CFA_restore_extended 65. */
12169 delta = lr_used - stub_entry->group->lr_restore;
12170 stub_entry->group->eh_size += eh_advance_size (delta) + 6;
12171 stub_entry->group->lr_restore = lr_used + 8;
12172 }
f891966f
AM
12173 break;
12174
12175 case ppc_stub_plt_call:
12176 case ppc_stub_plt_call_r2save:
12177 targ = stub_entry->plt_ent->plt.offset & ~(bfd_vma) 1;
12178 if (targ >= (bfd_vma) -2)
12179 abort ();
12180 plt = htab->elf.splt;
12181 if (!htab->elf.dynamic_sections_created
12182 || stub_entry->h == NULL
12183 || stub_entry->h->elf.dynindx == -1)
12184 {
12185 if (stub_entry->symtype == STT_GNU_IFUNC)
12186 plt = htab->elf.iplt;
12187 else
12188 plt = htab->pltlocal;
12189 }
12190 targ += plt->output_offset + plt->output_section->vma;
12191
12192 off = (elf_gp (info->output_bfd)
12193 + htab->sec_info[stub_entry->group->link_sec->id].toc_off);
12194 off = targ - off;
12195
12196 if (htab->params->plt_stub_align != 0)
12197 {
12198 unsigned pad = plt_stub_pad (htab, stub_entry, off);
12199
12200 stub_entry->group->stub_sec->size += pad;
12201 stub_entry->stub_offset = stub_entry->group->stub_sec->size;
12202 }
12203
12204 if (info->emitrelocations)
12205 {
12206 stub_entry->group->stub_sec->reloc_count
12207 += ((PPC_HA (off) != 0)
12208 + (htab->opd_abi
12209 ? 2 + (htab->params->plt_static_chain
12210 && PPC_HA (off + 16) == PPC_HA (off))
12211 : 1));
12212 stub_entry->group->stub_sec->flags |= SEC_RELOC;
12213 }
12214
12215 size = plt_stub_size (htab, stub_entry, off);
12216
12217 if (stub_entry->h != NULL
ed7007c1 12218 && is_tls_get_addr (&stub_entry->h->elf, htab)
f891966f
AM
12219 && htab->params->tls_get_addr_opt
12220 && stub_entry->stub_type == ppc_stub_plt_call_r2save)
12221 {
9e7028aa
AM
12222 if (htab->params->no_tls_get_addr_regsave)
12223 {
12224 lr_used = stub_entry->stub_offset + size - 20;
12225 /* The eh_frame info will consist of a DW_CFA_advance_loc
12226 or variant, DW_CFA_offset_externed_sf, 65, -stackoff,
12227 DW_CFA_advance_loc+4, DW_CFA_restore_extended, 65. */
12228 delta = lr_used - stub_entry->group->lr_restore;
12229 stub_entry->group->eh_size += eh_advance_size (delta) + 6;
12230 }
12231 else
12232 {
12233 /* Adjustments to r1 need to be described. */
12234 unsigned int cfa_updt = stub_entry->stub_offset + 18 * 4;
12235 delta = cfa_updt - stub_entry->group->lr_restore;
12236 stub_entry->group->eh_size += eh_advance_size (delta);
12237 stub_entry->group->eh_size += htab->opd_abi ? 36 : 35;
12238 }
f891966f
AM
12239 stub_entry->group->lr_restore = size - 4;
12240 }
12241 break;
12242
12243 default:
12244 BFD_FAIL ();
12245 return FALSE;
721956f4
AM
12246 }
12247
6f20ed8a 12248 stub_entry->group->stub_sec->size += size;
b34976b6 12249 return TRUE;
721956f4
AM
12250}
12251
12252/* Set up various things so that we can make a list of input sections
12253 for each output section included in the link. Returns -1 on error,
cedb70c5 12254 0 when no stubs will be needed, and 1 on success. */
721956f4
AM
12255
12256int
e7d1c40c 12257ppc64_elf_setup_section_lists (struct bfd_link_info *info)
721956f4 12258{
6f20ed8a 12259 unsigned int id;
986f0783 12260 size_t amt;
721956f4
AM
12261 struct ppc_link_hash_table *htab = ppc_hash_table (info);
12262
4dfe6ac6
NC
12263 if (htab == NULL)
12264 return -1;
4c52953f 12265
7cf7fcc8 12266 htab->sec_info_arr_size = _bfd_section_id;
6f20ed8a
AM
12267 amt = sizeof (*htab->sec_info) * (htab->sec_info_arr_size);
12268 htab->sec_info = bfd_zmalloc (amt);
12269 if (htab->sec_info == NULL)
721956f4
AM
12270 return -1;
12271
3d6f9012
AM
12272 /* Set toc_off for com, und, abs and ind sections. */
12273 for (id = 0; id < 3; id++)
6f20ed8a 12274 htab->sec_info[id].toc_off = TOC_BASE_OFF;
734b6cf9 12275
721956f4
AM
12276 return 1;
12277}
12278
927be08e
AM
12279/* Set up for first pass at multitoc partitioning. */
12280
12281void
12282ppc64_elf_start_multitoc_partition (struct bfd_link_info *info)
12283{
12284 struct ppc_link_hash_table *htab = ppc_hash_table (info);
12285
1c865ab2 12286 htab->toc_curr = ppc64_elf_set_toc (info, info->output_bfd);
927be08e
AM
12287 htab->toc_bfd = NULL;
12288 htab->toc_first_sec = NULL;
12289}
12290
e717da7e
AM
12291/* The linker repeatedly calls this function for each TOC input section
12292 and linker generated GOT section. Group input bfds such that the toc
927be08e 12293 within a group is less than 64k in size. */
ad8e1ba5 12294
927be08e 12295bfd_boolean
4ce794b7 12296ppc64_elf_next_toc_section (struct bfd_link_info *info, asection *isec)
ad8e1ba5
AM
12297{
12298 struct ppc_link_hash_table *htab = ppc_hash_table (info);
d77c8a4b 12299 bfd_vma addr, off, limit;
ad8e1ba5 12300
4dfe6ac6
NC
12301 if (htab == NULL)
12302 return FALSE;
12303
927be08e 12304 if (!htab->second_toc_pass)
4c52953f 12305 {
927be08e 12306 /* Keep track of the first .toc or .got section for this input bfd. */
a4fd3de5
AM
12307 bfd_boolean new_bfd = htab->toc_bfd != isec->owner;
12308
12309 if (new_bfd)
bf102f86
AM
12310 {
12311 htab->toc_bfd = isec->owner;
12312 htab->toc_first_sec = isec;
12313 }
927be08e 12314
bf102f86
AM
12315 addr = isec->output_offset + isec->output_section->vma;
12316 off = addr - htab->toc_curr;
d77c8a4b
AM
12317 limit = 0x80008000;
12318 if (ppc64_elf_tdata (isec->owner)->has_small_toc_reloc)
12319 limit = 0x10000;
12320 if (off + isec->size > limit)
bf102f86
AM
12321 {
12322 addr = (htab->toc_first_sec->output_offset
12323 + htab->toc_first_sec->output_section->vma);
12324 htab->toc_curr = addr;
a27e685f 12325 htab->toc_curr &= -TOC_BASE_ALIGN;
bf102f86 12326 }
99877b66 12327
927be08e
AM
12328 /* toc_curr is the base address of this toc group. Set elf_gp
12329 for the input section to be the offset relative to the
12330 output toc base plus 0x8000. Making the input elf_gp an
12331 offset allows us to move the toc as a whole without
12332 recalculating input elf_gp. */
06bcf541 12333 off = htab->toc_curr - elf_gp (info->output_bfd);
927be08e
AM
12334 off += TOC_BASE_OFF;
12335
12336 /* Die if someone uses a linker script that doesn't keep input
12337 file .toc and .got together. */
a4fd3de5
AM
12338 if (new_bfd
12339 && elf_gp (isec->owner) != 0
927be08e
AM
12340 && elf_gp (isec->owner) != off)
12341 return FALSE;
12342
12343 elf_gp (isec->owner) = off;
12344 return TRUE;
4c52953f 12345 }
927be08e
AM
12346
12347 /* During the second pass toc_first_sec points to the start of
12348 a toc group, and toc_curr is used to track the old elf_gp.
12349 We use toc_bfd to ensure we only look at each bfd once. */
12350 if (htab->toc_bfd == isec->owner)
12351 return TRUE;
12352 htab->toc_bfd = isec->owner;
12353
12354 if (htab->toc_first_sec == NULL
12355 || htab->toc_curr != elf_gp (isec->owner))
12356 {
12357 htab->toc_curr = elf_gp (isec->owner);
12358 htab->toc_first_sec = isec;
12359 }
12360 addr = (htab->toc_first_sec->output_offset
12361 + htab->toc_first_sec->output_section->vma);
06bcf541 12362 off = addr - elf_gp (info->output_bfd) + TOC_BASE_OFF;
927be08e
AM
12363 elf_gp (isec->owner) = off;
12364
12365 return TRUE;
ad8e1ba5
AM
12366}
12367
927be08e
AM
12368/* Called via elf_link_hash_traverse to merge GOT entries for global
12369 symbol H. */
12370
12371static bfd_boolean
12372merge_global_got (struct elf_link_hash_entry *h, void *inf ATTRIBUTE_UNUSED)
12373{
12374 if (h->root.type == bfd_link_hash_indirect)
12375 return TRUE;
12376
927be08e
AM
12377 merge_got_entries (&h->got.glist);
12378
12379 return TRUE;
12380}
12381
12382/* Called via elf_link_hash_traverse to allocate GOT entries for global
12383 symbol H. */
12384
12385static bfd_boolean
12386reallocate_got (struct elf_link_hash_entry *h, void *inf)
12387{
12388 struct got_entry *gent;
12389
12390 if (h->root.type == bfd_link_hash_indirect)
12391 return TRUE;
12392
927be08e
AM
12393 for (gent = h->got.glist; gent != NULL; gent = gent->next)
12394 if (!gent->is_indirect)
12395 allocate_got (h, (struct bfd_link_info *) inf, gent);
12396 return TRUE;
12397}
12398
12399/* Called on the first multitoc pass after the last call to
12400 ppc64_elf_next_toc_section. This function removes duplicate GOT
12401 entries. */
12402
12403bfd_boolean
12404ppc64_elf_layout_multitoc (struct bfd_link_info *info)
ad8e1ba5
AM
12405{
12406 struct ppc_link_hash_table *htab = ppc_hash_table (info);
927be08e
AM
12407 struct bfd *ibfd, *ibfd2;
12408 bfd_boolean done_something;
12409
12410 htab->multi_toc_needed = htab->toc_curr != elf_gp (info->output_bfd);
ad8e1ba5 12411
7865406b
AM
12412 if (!htab->do_multi_toc)
12413 return FALSE;
12414
d0fae19d 12415 /* Merge global sym got entries within a toc group. */
927be08e
AM
12416 elf_link_hash_traverse (&htab->elf, merge_global_got, info);
12417
12418 /* And tlsld_got. */
c72f2fb2 12419 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
927be08e
AM
12420 {
12421 struct got_entry *ent, *ent2;
12422
12423 if (!is_ppc64_elf (ibfd))
12424 continue;
12425
12426 ent = ppc64_tlsld_got (ibfd);
12427 if (!ent->is_indirect
12428 && ent->got.offset != (bfd_vma) -1)
12429 {
c72f2fb2 12430 for (ibfd2 = ibfd->link.next; ibfd2 != NULL; ibfd2 = ibfd2->link.next)
927be08e
AM
12431 {
12432 if (!is_ppc64_elf (ibfd2))
12433 continue;
12434
12435 ent2 = ppc64_tlsld_got (ibfd2);
12436 if (!ent2->is_indirect
12437 && ent2->got.offset != (bfd_vma) -1
12438 && elf_gp (ibfd2) == elf_gp (ibfd))
12439 {
12440 ent2->is_indirect = TRUE;
12441 ent2->got.ent = ent;
12442 }
12443 }
12444 }
12445 }
12446
12447 /* Zap sizes of got sections. */
33e44f2e
AM
12448 htab->elf.irelplt->rawsize = htab->elf.irelplt->size;
12449 htab->elf.irelplt->size -= htab->got_reli_size;
927be08e
AM
12450 htab->got_reli_size = 0;
12451
c72f2fb2 12452 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
927be08e
AM
12453 {
12454 asection *got, *relgot;
12455
12456 if (!is_ppc64_elf (ibfd))
12457 continue;
12458
12459 got = ppc64_elf_tdata (ibfd)->got;
12460 if (got != NULL)
12461 {
12462 got->rawsize = got->size;
12463 got->size = 0;
12464 relgot = ppc64_elf_tdata (ibfd)->relgot;
12465 relgot->rawsize = relgot->size;
12466 relgot->size = 0;
12467 }
12468 }
12469
12470 /* Now reallocate the got, local syms first. We don't need to
12471 allocate section contents again since we never increase size. */
c72f2fb2 12472 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
927be08e
AM
12473 {
12474 struct got_entry **lgot_ents;
12475 struct got_entry **end_lgot_ents;
12476 struct plt_entry **local_plt;
12477 struct plt_entry **end_local_plt;
f961d9dd 12478 unsigned char *lgot_masks;
927be08e
AM
12479 bfd_size_type locsymcount;
12480 Elf_Internal_Shdr *symtab_hdr;
19e08130 12481 asection *s;
927be08e
AM
12482
12483 if (!is_ppc64_elf (ibfd))
12484 continue;
12485
12486 lgot_ents = elf_local_got_ents (ibfd);
12487 if (!lgot_ents)
12488 continue;
12489
12490 symtab_hdr = &elf_symtab_hdr (ibfd);
12491 locsymcount = symtab_hdr->sh_info;
12492 end_lgot_ents = lgot_ents + locsymcount;
12493 local_plt = (struct plt_entry **) end_lgot_ents;
12494 end_local_plt = local_plt + locsymcount;
f961d9dd 12495 lgot_masks = (unsigned char *) end_local_plt;
927be08e 12496 s = ppc64_elf_tdata (ibfd)->got;
927be08e
AM
12497 for (; lgot_ents < end_lgot_ents; ++lgot_ents, ++lgot_masks)
12498 {
12499 struct got_entry *ent;
12500
12501 for (ent = *lgot_ents; ent != NULL; ent = ent->next)
d0fae19d 12502 {
19e08130
AM
12503 unsigned int ent_size = 8;
12504 unsigned int rel_size = sizeof (Elf64_External_Rela);
12505
d0fae19d
AM
12506 ent->got.offset = s->size;
12507 if ((ent->tls_type & *lgot_masks & TLS_GD) != 0)
d0fae19d 12508 {
19e08130
AM
12509 ent_size *= 2;
12510 rel_size *= 2;
12511 }
12512 s->size += ent_size;
37da22e5 12513 if ((*lgot_masks & (TLS_TLS | PLT_IFUNC)) == PLT_IFUNC)
19e08130 12514 {
33e44f2e 12515 htab->elf.irelplt->size += rel_size;
19e08130
AM
12516 htab->got_reli_size += rel_size;
12517 }
6a3858a6 12518 else if (bfd_link_pic (info)
f749f26e 12519 && !(ent->tls_type != 0
6a3858a6 12520 && bfd_link_executable (info)))
19e08130
AM
12521 {
12522 asection *srel = ppc64_elf_tdata (ibfd)->relgot;
12523 srel->size += rel_size;
d0fae19d
AM
12524 }
12525 }
927be08e
AM
12526 }
12527 }
12528
12529 elf_link_hash_traverse (&htab->elf, reallocate_got, info);
12530
c72f2fb2 12531 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
927be08e
AM
12532 {
12533 struct got_entry *ent;
12534
12535 if (!is_ppc64_elf (ibfd))
12536 continue;
12537
12538 ent = ppc64_tlsld_got (ibfd);
12539 if (!ent->is_indirect
12540 && ent->got.offset != (bfd_vma) -1)
12541 {
12542 asection *s = ppc64_elf_tdata (ibfd)->got;
12543 ent->got.offset = s->size;
12544 s->size += 16;
f749f26e 12545 if (bfd_link_dll (info))
927be08e
AM
12546 {
12547 asection *srel = ppc64_elf_tdata (ibfd)->relgot;
12548 srel->size += sizeof (Elf64_External_Rela);
12549 }
12550 }
12551 }
12552
33e44f2e 12553 done_something = htab->elf.irelplt->rawsize != htab->elf.irelplt->size;
927be08e 12554 if (!done_something)
c72f2fb2 12555 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
927be08e
AM
12556 {
12557 asection *got;
12558
12559 if (!is_ppc64_elf (ibfd))
12560 continue;
12561
12562 got = ppc64_elf_tdata (ibfd)->got;
12563 if (got != NULL)
12564 {
12565 done_something = got->rawsize != got->size;
12566 if (done_something)
12567 break;
12568 }
12569 }
12570
12571 if (done_something)
e7d1c40c 12572 (*htab->params->layout_sections_again) ();
927be08e
AM
12573
12574 /* Set up for second pass over toc sections to recalculate elf_gp
12575 on input sections. */
12576 htab->toc_bfd = NULL;
12577 htab->toc_first_sec = NULL;
12578 htab->second_toc_pass = TRUE;
12579 return done_something;
12580}
12581
12582/* Called after second pass of multitoc partitioning. */
12583
12584void
12585ppc64_elf_finish_multitoc_partition (struct bfd_link_info *info)
12586{
12587 struct ppc_link_hash_table *htab = ppc_hash_table (info);
12588
12589 /* After the second pass, toc_curr tracks the TOC offset used
12590 for code sections below in ppc64_elf_next_input_section. */
3d6f9012 12591 htab->toc_curr = TOC_BASE_OFF;
ad8e1ba5
AM
12592}
12593
9b5ecbd0
AM
12594/* No toc references were found in ISEC. If the code in ISEC makes no
12595 calls, then there's no need to use toc adjusting stubs when branching
12596 into ISEC. Actually, indirect calls from ISEC are OK as they will
4c52953f
AM
12597 load r2. Returns -1 on error, 0 for no stub needed, 1 for stub
12598 needed, and 2 if a cyclical call-graph was found but no other reason
12599 for a stub was detected. If called from the top level, a return of
12600 2 means the same as a return of 0. */
9b5ecbd0
AM
12601
12602static int
4ce794b7 12603toc_adjusting_stub_needed (struct bfd_link_info *info, asection *isec)
9b5ecbd0 12604{
9b5ecbd0 12605 int ret;
70cc837d
AM
12606
12607 /* Mark this section as checked. */
12608 isec->call_check_done = 1;
9b5ecbd0 12609
772119ce
AM
12610 /* We know none of our code bearing sections will need toc stubs. */
12611 if ((isec->flags & SEC_LINKER_CREATED) != 0)
12612 return 0;
12613
eea6121a 12614 if (isec->size == 0)
082c50f8
AM
12615 return 0;
12616
4c52953f
AM
12617 if (isec->output_section == NULL)
12618 return 0;
12619
4c52953f 12620 ret = 0;
70cc837d 12621 if (isec->reloc_count != 0)
9b5ecbd0 12622 {
70cc837d
AM
12623 Elf_Internal_Rela *relstart, *rel;
12624 Elf_Internal_Sym *local_syms;
12625 struct ppc_link_hash_table *htab;
2917689a 12626
70cc837d
AM
12627 relstart = _bfd_elf_link_read_relocs (isec->owner, isec, NULL, NULL,
12628 info->keep_memory);
12629 if (relstart == NULL)
12630 return -1;
90aecf7a 12631
70cc837d
AM
12632 /* Look for branches to outside of this section. */
12633 local_syms = NULL;
12634 htab = ppc_hash_table (info);
12635 if (htab == NULL)
12636 return -1;
4c52953f 12637
70cc837d 12638 for (rel = relstart; rel < relstart + isec->reloc_count; ++rel)
4c52953f 12639 {
70cc837d
AM
12640 enum elf_ppc64_reloc_type r_type;
12641 unsigned long r_symndx;
12642 struct elf_link_hash_entry *h;
12643 struct ppc_link_hash_entry *eh;
12644 Elf_Internal_Sym *sym;
12645 asection *sym_sec;
12646 struct _opd_sec_data *opd;
12647 bfd_vma sym_value;
12648 bfd_vma dest;
12649
12650 r_type = ELF64_R_TYPE (rel->r_info);
12651 if (r_type != R_PPC64_REL24
05d0e962 12652 && r_type != R_PPC64_REL24_NOTOC
70cc837d
AM
12653 && r_type != R_PPC64_REL14
12654 && r_type != R_PPC64_REL14_BRTAKEN
23cedd1d 12655 && r_type != R_PPC64_REL14_BRNTAKEN
5663e321
AM
12656 && r_type != R_PPC64_PLTCALL
12657 && r_type != R_PPC64_PLTCALL_NOTOC)
70cc837d 12658 continue;
4c52953f 12659
70cc837d
AM
12660 r_symndx = ELF64_R_SYM (rel->r_info);
12661 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms, r_symndx,
12662 isec->owner))
4c52953f 12663 {
70cc837d
AM
12664 ret = -1;
12665 break;
12666 }
4c52953f 12667
70cc837d
AM
12668 /* Calls to dynamic lib functions go through a plt call stub
12669 that uses r2. */
ed7007c1 12670 eh = ppc_elf_hash_entry (h);
70cc837d
AM
12671 if (eh != NULL
12672 && (eh->elf.plt.plist != NULL
12673 || (eh->oh != NULL
12674 && ppc_follow_link (eh->oh)->elf.plt.plist != NULL)))
12675 {
12676 ret = 1;
12677 break;
4c52953f
AM
12678 }
12679
70cc837d
AM
12680 if (sym_sec == NULL)
12681 /* Ignore other undefined symbols. */
4c52953f 12682 continue;
4c52953f 12683
70cc837d
AM
12684 /* Assume branches to other sections not included in the
12685 link need stubs too, to cover -R and absolute syms. */
12686 if (sym_sec->output_section == NULL)
12687 {
12688 ret = 1;
12689 break;
12690 }
4c52953f 12691
70cc837d
AM
12692 if (h == NULL)
12693 sym_value = sym->st_value;
12694 else
12695 {
12696 if (h->root.type != bfd_link_hash_defined
12697 && h->root.type != bfd_link_hash_defweak)
12698 abort ();
12699 sym_value = h->root.u.def.value;
12700 }
12701 sym_value += rel->r_addend;
4c52953f 12702
70cc837d
AM
12703 /* If this branch reloc uses an opd sym, find the code section. */
12704 opd = get_opd_info (sym_sec);
12705 if (opd != NULL)
12706 {
12707 if (h == NULL && opd->adjust != NULL)
12708 {
12709 long adjust;
4c52953f 12710
92a9c616 12711 adjust = opd->adjust[OPD_NDX (sym_value)];
70cc837d
AM
12712 if (adjust == -1)
12713 /* Assume deleted functions won't ever be called. */
12714 continue;
12715 sym_value += adjust;
12716 }
4c52953f 12717
aef36ac1
AM
12718 dest = opd_entry_value (sym_sec, sym_value,
12719 &sym_sec, NULL, FALSE);
70cc837d
AM
12720 if (dest == (bfd_vma) -1)
12721 continue;
12722 }
12723 else
12724 dest = (sym_value
12725 + sym_sec->output_offset
12726 + sym_sec->output_section->vma);
4c52953f 12727
70cc837d
AM
12728 /* Ignore branch to self. */
12729 if (sym_sec == isec)
12730 continue;
4c52953f 12731
70cc837d
AM
12732 /* If the called function uses the toc, we need a stub. */
12733 if (sym_sec->has_toc_reloc
12734 || sym_sec->makes_toc_func_call)
4c52953f 12735 {
70cc837d 12736 ret = 1;
4c52953f
AM
12737 break;
12738 }
70cc837d
AM
12739
12740 /* Assume any branch that needs a long branch stub might in fact
12741 need a plt_branch stub. A plt_branch stub uses r2. */
12742 else if (dest - (isec->output_offset
12743 + isec->output_section->vma
6911b7dc
AM
12744 + rel->r_offset) + (1 << 25)
12745 >= (2u << 25) - PPC64_LOCAL_ENTRY_OFFSET (h
12746 ? h->other
12747 : sym->st_other))
4c52953f 12748 {
70cc837d
AM
12749 ret = 1;
12750 break;
12751 }
12752
12753 /* If calling back to a section in the process of being
12754 tested, we can't say for sure that no toc adjusting stubs
12755 are needed, so don't return zero. */
12756 else if (sym_sec->call_check_in_progress)
12757 ret = 2;
12758
12759 /* Branches to another section that itself doesn't have any TOC
12760 references are OK. Recursively call ourselves to check. */
12761 else if (!sym_sec->call_check_done)
12762 {
12763 int recur;
12764
12765 /* Mark current section as indeterminate, so that other
12766 sections that call back to current won't be marked as
12767 known. */
12768 isec->call_check_in_progress = 1;
12769 recur = toc_adjusting_stub_needed (info, sym_sec);
12770 isec->call_check_in_progress = 0;
12771
4c52953f
AM
12772 if (recur != 0)
12773 {
70cc837d
AM
12774 ret = recur;
12775 if (recur != 2)
12776 break;
4c52953f
AM
12777 }
12778 }
4c52953f 12779 }
70cc837d 12780
c9594989
AM
12781 if (elf_symtab_hdr (isec->owner).contents
12782 != (unsigned char *) local_syms)
70cc837d
AM
12783 free (local_syms);
12784 if (elf_section_data (isec)->relocs != relstart)
12785 free (relstart);
9b5ecbd0
AM
12786 }
12787
70cc837d
AM
12788 if ((ret & 1) == 0
12789 && isec->map_head.s != NULL
12790 && (strcmp (isec->output_section->name, ".init") == 0
12791 || strcmp (isec->output_section->name, ".fini") == 0))
12792 {
12793 if (isec->map_head.s->has_toc_reloc
12794 || isec->map_head.s->makes_toc_func_call)
12795 ret = 1;
12796 else if (!isec->map_head.s->call_check_done)
12797 {
12798 int recur;
12799 isec->call_check_in_progress = 1;
12800 recur = toc_adjusting_stub_needed (info, isec->map_head.s);
12801 isec->call_check_in_progress = 0;
12802 if (recur != 0)
12803 ret = recur;
12804 }
12805 }
12806
12807 if (ret == 1)
12808 isec->makes_toc_func_call = 1;
4c52953f 12809
9b5ecbd0
AM
12810 return ret;
12811}
12812
721956f4
AM
12813/* The linker repeatedly calls this function for each input section,
12814 in the order that input sections are linked into output sections.
12815 Build lists of input sections to determine groupings between which
12816 we may insert linker stubs. */
12817
9b5ecbd0 12818bfd_boolean
4ce794b7 12819ppc64_elf_next_input_section (struct bfd_link_info *info, asection *isec)
721956f4
AM
12820{
12821 struct ppc_link_hash_table *htab = ppc_hash_table (info);
12822
4dfe6ac6
NC
12823 if (htab == NULL)
12824 return FALSE;
12825
734b6cf9 12826 if ((isec->output_section->flags & SEC_CODE) != 0
6f20ed8a 12827 && isec->output_section->id < htab->sec_info_arr_size)
721956f4 12828 {
3d6f9012
AM
12829 /* This happens to make the list in reverse order,
12830 which is what we want. */
6f20ed8a
AM
12831 htab->sec_info[isec->id].u.list
12832 = htab->sec_info[isec->output_section->id].u.list;
12833 htab->sec_info[isec->output_section->id].u.list = isec;
721956f4 12834 }
ad8e1ba5 12835
4c52953f 12836 if (htab->multi_toc_needed)
9b5ecbd0 12837 {
8b974ba3
AM
12838 /* Analyse sections that aren't already flagged as needing a
12839 valid toc pointer. Exclude .fixup for the linux kernel.
12840 .fixup contains branches, but only back to the function that
12841 hit an exception. */
12842 if (!(isec->has_toc_reloc
12843 || (isec->flags & SEC_CODE) == 0
12844 || strcmp (isec->name, ".fixup") == 0
12845 || isec->call_check_done))
12846 {
12847 if (toc_adjusting_stub_needed (info, isec) < 0)
6683a28d 12848 return FALSE;
8b974ba3
AM
12849 }
12850 /* Make all sections use the TOC assigned for this object file.
12851 This will be wrong for pasted sections; We fix that in
12852 check_pasted_section(). */
12853 if (elf_gp (isec->owner) != 0)
12854 htab->toc_curr = elf_gp (isec->owner);
12855 }
12856
6f20ed8a 12857 htab->sec_info[isec->id].toc_off = htab->toc_curr;
9b5ecbd0 12858 return TRUE;
721956f4
AM
12859}
12860
70cc837d
AM
12861/* Check that all .init and .fini sections use the same toc, if they
12862 have toc relocs. */
12863
12864static bfd_boolean
12865check_pasted_section (struct bfd_link_info *info, const char *name)
12866{
12867 asection *o = bfd_get_section_by_name (info->output_bfd, name);
12868
12869 if (o != NULL)
12870 {
12871 struct ppc_link_hash_table *htab = ppc_hash_table (info);
12872 bfd_vma toc_off = 0;
12873 asection *i;
12874
12875 for (i = o->map_head.s; i != NULL; i = i->map_head.s)
12876 if (i->has_toc_reloc)
12877 {
12878 if (toc_off == 0)
6f20ed8a
AM
12879 toc_off = htab->sec_info[i->id].toc_off;
12880 else if (toc_off != htab->sec_info[i->id].toc_off)
70cc837d
AM
12881 return FALSE;
12882 }
6683a28d
AM
12883
12884 if (toc_off == 0)
12885 for (i = o->map_head.s; i != NULL; i = i->map_head.s)
12886 if (i->makes_toc_func_call)
12887 {
6f20ed8a 12888 toc_off = htab->sec_info[i->id].toc_off;
6683a28d
AM
12889 break;
12890 }
12891
70cc837d
AM
12892 /* Make sure the whole pasted function uses the same toc offset. */
12893 if (toc_off != 0)
12894 for (i = o->map_head.s; i != NULL; i = i->map_head.s)
6f20ed8a 12895 htab->sec_info[i->id].toc_off = toc_off;
70cc837d
AM
12896 }
12897 return TRUE;
12898}
12899
12900bfd_boolean
12901ppc64_elf_check_init_fini (struct bfd_link_info *info)
12902{
12903 return (check_pasted_section (info, ".init")
12904 & check_pasted_section (info, ".fini"));
12905}
12906
721956f4
AM
12907/* See whether we can group stub sections together. Grouping stub
12908 sections may result in fewer stubs. More importantly, we need to
12909 put all .init* and .fini* stubs at the beginning of the .init or
12910 .fini output sections respectively, because glibc splits the
12911 _init and _fini functions into multiple parts. Putting a stub in
12912 the middle of a function is not a good idea. */
12913
6f20ed8a
AM
12914static bfd_boolean
12915group_sections (struct bfd_link_info *info,
4ce794b7
AM
12916 bfd_size_type stub_group_size,
12917 bfd_boolean stubs_always_before_branch)
721956f4 12918{
6f20ed8a
AM
12919 struct ppc_link_hash_table *htab;
12920 asection *osec;
7c8fe5c4
AM
12921 bfd_boolean suppress_size_errors;
12922
6f20ed8a
AM
12923 htab = ppc_hash_table (info);
12924 if (htab == NULL)
12925 return FALSE;
12926
7c8fe5c4 12927 suppress_size_errors = FALSE;
7c8fe5c4
AM
12928 if (stub_group_size == 1)
12929 {
12930 /* Default values. */
12931 if (stubs_always_before_branch)
09f92717 12932 stub_group_size = 0x1e00000;
7c8fe5c4 12933 else
09f92717 12934 stub_group_size = 0x1c00000;
7c8fe5c4
AM
12935 suppress_size_errors = TRUE;
12936 }
12937
6f20ed8a 12938 for (osec = info->output_bfd->sections; osec != NULL; osec = osec->next)
721956f4 12939 {
6f20ed8a
AM
12940 asection *tail;
12941
12942 if (osec->id >= htab->sec_info_arr_size)
12943 continue;
12944
12945 tail = htab->sec_info[osec->id].u.list;
734b6cf9 12946 while (tail != NULL)
721956f4 12947 {
734b6cf9
AM
12948 asection *curr;
12949 asection *prev;
12950 bfd_size_type total;
12951 bfd_boolean big_sec;
12952 bfd_vma curr_toc;
6f20ed8a 12953 struct map_stub *group;
09f92717 12954 bfd_size_type group_size;
734b6cf9
AM
12955
12956 curr = tail;
eea6121a 12957 total = tail->size;
09f92717
AM
12958 group_size = (ppc64_elf_section_data (tail) != NULL
12959 && ppc64_elf_section_data (tail)->has_14bit_branch
12960 ? stub_group_size >> 10 : stub_group_size);
12961
12962 big_sec = total > group_size;
7c8fe5c4 12963 if (big_sec && !suppress_size_errors)
695344c0 12964 /* xgettext:c-format */
871b3ab2 12965 _bfd_error_handler (_("%pB section %pA exceeds stub group size"),
4eca0228 12966 tail->owner, tail);
6f20ed8a 12967 curr_toc = htab->sec_info[tail->id].toc_off;
734b6cf9 12968
6f20ed8a 12969 while ((prev = htab->sec_info[curr->id].u.list) != NULL
734b6cf9 12970 && ((total += curr->output_offset - prev->output_offset)
6bee8834
AM
12971 < (ppc64_elf_section_data (prev) != NULL
12972 && ppc64_elf_section_data (prev)->has_14bit_branch
09f92717 12973 ? (group_size = stub_group_size >> 10) : group_size))
6f20ed8a 12974 && htab->sec_info[prev->id].toc_off == curr_toc)
734b6cf9
AM
12975 curr = prev;
12976
12977 /* OK, the size from the start of CURR to the end is less
09f92717 12978 than group_size and thus can be handled by one stub
734b6cf9 12979 section. (or the tail section is itself larger than
09f92717
AM
12980 group_size, in which case we may be toast.) We should
12981 really be keeping track of the total size of stubs added
12982 here, as stubs contribute to the final output section
12983 size. That's a little tricky, and this way will only
12984 break if stubs added make the total size more than 2^25,
12985 ie. for the default stub_group_size, if stubs total more
12986 than 2097152 bytes, or nearly 75000 plt call stubs. */
6f20ed8a
AM
12987 group = bfd_alloc (curr->owner, sizeof (*group));
12988 if (group == NULL)
12989 return FALSE;
12990 group->link_sec = curr;
12991 group->stub_sec = NULL;
a4b6fadd 12992 group->needs_save_res = 0;
df136d64
AM
12993 group->lr_restore = 0;
12994 group->eh_size = 0;
12995 group->eh_base = 0;
a4b6fadd
AM
12996 group->next = htab->group;
12997 htab->group = group;
734b6cf9 12998 do
721956f4 12999 {
6f20ed8a 13000 prev = htab->sec_info[tail->id].u.list;
734b6cf9 13001 /* Set up this stub group. */
6f20ed8a 13002 htab->sec_info[tail->id].u.group = group;
721956f4 13003 }
734b6cf9
AM
13004 while (tail != curr && (tail = prev) != NULL);
13005
09f92717 13006 /* But wait, there's more! Input sections up to group_size
734b6cf9
AM
13007 bytes before the stub section can be handled by it too.
13008 Don't do this if we have a really large section after the
13009 stubs, as adding more stubs increases the chance that
13010 branches may not reach into the stub section. */
13011 if (!stubs_always_before_branch && !big_sec)
13012 {
13013 total = 0;
13014 while (prev != NULL
13015 && ((total += tail->output_offset - prev->output_offset)
6bee8834
AM
13016 < (ppc64_elf_section_data (prev) != NULL
13017 && ppc64_elf_section_data (prev)->has_14bit_branch
2cdcc330
AM
13018 ? (group_size = stub_group_size >> 10)
13019 : group_size))
6f20ed8a 13020 && htab->sec_info[prev->id].toc_off == curr_toc)
734b6cf9
AM
13021 {
13022 tail = prev;
6f20ed8a
AM
13023 prev = htab->sec_info[tail->id].u.list;
13024 htab->sec_info[tail->id].u.group = group;
734b6cf9
AM
13025 }
13026 }
13027 tail = prev;
721956f4
AM
13028 }
13029 }
6f20ed8a 13030 return TRUE;
721956f4
AM
13031}
13032
58d180e8
AM
13033static const unsigned char glink_eh_frame_cie[] =
13034{
13035 0, 0, 0, 16, /* length. */
13036 0, 0, 0, 0, /* id. */
13037 1, /* CIE version. */
13038 'z', 'R', 0, /* Augmentation string. */
13039 4, /* Code alignment. */
13040 0x78, /* Data alignment. */
13041 65, /* RA reg. */
13042 1, /* Augmentation size. */
13043 DW_EH_PE_pcrel | DW_EH_PE_sdata4, /* FDE encoding. */
2e0ce1c8 13044 DW_CFA_def_cfa, 1, 0 /* def_cfa: r1 offset 0. */
58d180e8
AM
13045};
13046
d969d15f
AM
13047/* Stripping output sections is normally done before dynamic section
13048 symbols have been allocated. This function is called later, and
13049 handles cases like htab->brlt which is mapped to its own output
13050 section. */
13051
13052static void
13053maybe_strip_output (struct bfd_link_info *info, asection *isec)
13054{
13055 if (isec->size == 0
13056 && isec->output_section->size == 0
53d8967a 13057 && !(isec->output_section->flags & SEC_KEEP)
d969d15f
AM
13058 && !bfd_section_removed_from_list (info->output_bfd,
13059 isec->output_section)
13060 && elf_section_data (isec->output_section)->dynindx == 0)
13061 {
13062 isec->output_section->flags |= SEC_EXCLUDE;
13063 bfd_section_list_remove (info->output_bfd, isec->output_section);
13064 info->output_bfd->section_count--;
13065 }
13066}
13067
721956f4
AM
13068/* Determine and set the size of the stub section for a final link.
13069
13070 The basic idea here is to examine all the relocations looking for
13071 PC-relative calls to a target that is unreachable with a "bl"
13072 instruction. */
13073
b34976b6 13074bfd_boolean
e7d1c40c 13075ppc64_elf_size_stubs (struct bfd_link_info *info)
721956f4
AM
13076{
13077 bfd_size_type stub_group_size;
b34976b6 13078 bfd_boolean stubs_always_before_branch;
721956f4
AM
13079 struct ppc_link_hash_table *htab = ppc_hash_table (info);
13080
4dfe6ac6
NC
13081 if (htab == NULL)
13082 return FALSE;
13083
0e1862bb 13084 if (htab->params->plt_thread_safe == -1 && !bfd_link_executable (info))
e7d1c40c 13085 htab->params->plt_thread_safe = 1;
b9e5796b 13086 if (!htab->opd_abi)
e7d1c40c
AM
13087 htab->params->plt_thread_safe = 0;
13088 else if (htab->params->plt_thread_safe == -1)
794e51c0 13089 {
e2458743 13090 static const char *const thread_starter[] =
794e51c0
AM
13091 {
13092 "pthread_create",
13093 /* libstdc++ */
13094 "_ZNSt6thread15_M_start_threadESt10shared_ptrINS_10_Impl_baseEE",
13095 /* librt */
13096 "aio_init", "aio_read", "aio_write", "aio_fsync", "lio_listio",
13097 "mq_notify", "create_timer",
13098 /* libanl */
13099 "getaddrinfo_a",
13100 /* libgomp */
2300b5a1 13101 "GOMP_parallel",
794e51c0 13102 "GOMP_parallel_start",
2300b5a1 13103 "GOMP_parallel_loop_static",
794e51c0 13104 "GOMP_parallel_loop_static_start",
2300b5a1 13105 "GOMP_parallel_loop_dynamic",
794e51c0 13106 "GOMP_parallel_loop_dynamic_start",
2300b5a1 13107 "GOMP_parallel_loop_guided",
794e51c0 13108 "GOMP_parallel_loop_guided_start",
2300b5a1 13109 "GOMP_parallel_loop_runtime",
794e51c0 13110 "GOMP_parallel_loop_runtime_start",
2300b5a1 13111 "GOMP_parallel_sections",
68ffbac6 13112 "GOMP_parallel_sections_start",
f9dffbf0
AM
13113 /* libgo */
13114 "__go_go",
794e51c0
AM
13115 };
13116 unsigned i;
13117
a4b6fadd 13118 for (i = 0; i < ARRAY_SIZE (thread_starter); i++)
794e51c0
AM
13119 {
13120 struct elf_link_hash_entry *h;
13121 h = elf_link_hash_lookup (&htab->elf, thread_starter[i],
13122 FALSE, FALSE, TRUE);
e7d1c40c
AM
13123 htab->params->plt_thread_safe = h != NULL && h->ref_regular;
13124 if (htab->params->plt_thread_safe)
794e51c0
AM
13125 break;
13126 }
13127 }
e7d1c40c
AM
13128 stubs_always_before_branch = htab->params->group_size < 0;
13129 if (htab->params->group_size < 0)
13130 stub_group_size = -htab->params->group_size;
721956f4 13131 else
e7d1c40c 13132 stub_group_size = htab->params->group_size;
721956f4 13133
6f20ed8a
AM
13134 if (!group_sections (info, stub_group_size, stubs_always_before_branch))
13135 return FALSE;
721956f4 13136
a804e476
AM
13137 htab->tga_group = NULL;
13138 if (!htab->params->no_tls_get_addr_regsave
13139 && htab->tga_desc_fd != NULL
13140 && (htab->tga_desc_fd->elf.root.type == bfd_link_hash_undefined
13141 || htab->tga_desc_fd->elf.root.type == bfd_link_hash_undefweak)
13142 && htab->tls_get_addr_fd != NULL
13143 && is_static_defined (&htab->tls_get_addr_fd->elf))
13144 {
13145 asection *sym_sec, *code_sec, *stub_sec;
13146 bfd_vma sym_value;
13147 struct _opd_sec_data *opd;
13148
13149 sym_sec = htab->tls_get_addr_fd->elf.root.u.def.section;
13150 sym_value = defined_sym_val (&htab->tls_get_addr_fd->elf);
13151 code_sec = sym_sec;
13152 opd = get_opd_info (sym_sec);
13153 if (opd != NULL)
13154 opd_entry_value (sym_sec, sym_value, &code_sec, NULL, FALSE);
13155 htab->tga_group = htab->sec_info[code_sec->id].u.group;
13156 stub_sec = (*htab->params->add_stub_section) (".tga_desc.stub",
13157 htab->tga_group->link_sec);
13158 if (stub_sec == NULL)
13159 return FALSE;
13160 htab->tga_group->stub_sec = stub_sec;
13161
13162 htab->tga_desc_fd->elf.root.type = bfd_link_hash_defined;
13163 htab->tga_desc_fd->elf.root.u.def.section = stub_sec;
13164 htab->tga_desc_fd->elf.root.u.def.value = 0;
13165 htab->tga_desc_fd->elf.type = STT_FUNC;
13166 htab->tga_desc_fd->elf.def_regular = 1;
13167 htab->tga_desc_fd->elf.non_elf = 0;
13168 _bfd_elf_link_hash_hide_symbol (info, &htab->tga_desc_fd->elf, TRUE);
13169 }
13170
c9301e31
AM
13171#define STUB_SHRINK_ITER 20
13172 /* Loop until no stubs added. After iteration 20 of this loop we may
13173 exit on a stub section shrinking. This is to break out of a
13174 pathological case where adding stubs on one iteration decreases
13175 section gaps (perhaps due to alignment), which then requires
13176 fewer or smaller stubs on the next iteration. */
13177
721956f4
AM
13178 while (1)
13179 {
13180 bfd *input_bfd;
13181 unsigned int bfd_indx;
a4b6fadd 13182 struct map_stub *group;
721956f4
AM
13183
13184 htab->stub_iteration += 1;
721956f4
AM
13185
13186 for (input_bfd = info->input_bfds, bfd_indx = 0;
13187 input_bfd != NULL;
c72f2fb2 13188 input_bfd = input_bfd->link.next, bfd_indx++)
721956f4
AM
13189 {
13190 Elf_Internal_Shdr *symtab_hdr;
13191 asection *section;
6cdc0ccc 13192 Elf_Internal_Sym *local_syms = NULL;
721956f4 13193
0c8d6e5c 13194 if (!is_ppc64_elf (input_bfd))
67f93c31
AM
13195 continue;
13196
721956f4 13197 /* We'll need the symbol table in a second. */
0ffa91dd 13198 symtab_hdr = &elf_symtab_hdr (input_bfd);
721956f4
AM
13199 if (symtab_hdr->sh_info == 0)
13200 continue;
13201
721956f4
AM
13202 /* Walk over each section attached to the input bfd. */
13203 for (section = input_bfd->sections;
13204 section != NULL;
13205 section = section->next)
13206 {
721956f4 13207 Elf_Internal_Rela *internal_relocs, *irelaend, *irela;
721956f4
AM
13208
13209 /* If there aren't any relocs, then there's nothing more
13210 to do. */
13211 if ((section->flags & SEC_RELOC) == 0
12c0f757
AM
13212 || (section->flags & SEC_ALLOC) == 0
13213 || (section->flags & SEC_LOAD) == 0
13214 || (section->flags & SEC_CODE) == 0
721956f4
AM
13215 || section->reloc_count == 0)
13216 continue;
13217
13218 /* If this section is a link-once section that will be
13219 discarded, then don't create any stubs. */
13220 if (section->output_section == NULL
927be08e 13221 || section->output_section->owner != info->output_bfd)
721956f4
AM
13222 continue;
13223
1e2f5b6e
AM
13224 /* Get the relocs. */
13225 internal_relocs
4ce794b7 13226 = _bfd_elf_link_read_relocs (input_bfd, section, NULL, NULL,
45d6a902 13227 info->keep_memory);
721956f4 13228 if (internal_relocs == NULL)
1e2f5b6e 13229 goto error_ret_free_local;
721956f4
AM
13230
13231 /* Now examine each relocation. */
13232 irela = internal_relocs;
13233 irelaend = irela + section->reloc_count;
13234 for (; irela < irelaend; irela++)
13235 {
4ce794b7
AM
13236 enum elf_ppc64_reloc_type r_type;
13237 unsigned int r_indx;
721956f4
AM
13238 enum ppc_stub_type stub_type;
13239 struct ppc_stub_hash_entry *stub_entry;
8387904d 13240 asection *sym_sec, *code_sec;
e054468f 13241 bfd_vma sym_value, code_value;
721956f4 13242 bfd_vma destination;
6911b7dc 13243 unsigned long local_off;
8843416a 13244 bfd_boolean ok_dest;
721956f4 13245 struct ppc_link_hash_entry *hash;
8387904d 13246 struct ppc_link_hash_entry *fdh;
411e1bfb
AM
13247 struct elf_link_hash_entry *h;
13248 Elf_Internal_Sym *sym;
721956f4
AM
13249 char *stub_name;
13250 const asection *id_sec;
74f0fb50 13251 struct _opd_sec_data *opd;
e054468f 13252 struct plt_entry *plt_ent;
721956f4
AM
13253
13254 r_type = ELF64_R_TYPE (irela->r_info);
13255 r_indx = ELF64_R_SYM (irela->r_info);
13256
4ce794b7 13257 if (r_type >= R_PPC64_max)
721956f4
AM
13258 {
13259 bfd_set_error (bfd_error_bad_value);
6cdc0ccc 13260 goto error_ret_free_internal;
721956f4
AM
13261 }
13262
13263 /* Only look for stubs on branch instructions. */
4ce794b7 13264 if (r_type != R_PPC64_REL24
05d0e962 13265 && r_type != R_PPC64_REL24_NOTOC
4ce794b7
AM
13266 && r_type != R_PPC64_REL14
13267 && r_type != R_PPC64_REL14_BRTAKEN
13268 && r_type != R_PPC64_REL14_BRNTAKEN)
721956f4
AM
13269 continue;
13270
13271 /* Now determine the call target, its name, value,
13272 section. */
411e1bfb
AM
13273 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms,
13274 r_indx, input_bfd))
13275 goto error_ret_free_internal;
ed7007c1 13276 hash = ppc_elf_hash_entry (h);
411e1bfb 13277
8843416a 13278 ok_dest = FALSE;
8387904d 13279 fdh = NULL;
7fe2b9a6 13280 sym_value = 0;
411e1bfb 13281 if (hash == NULL)
721956f4 13282 {
411e1bfb 13283 sym_value = sym->st_value;
c27b8c2a
AM
13284 if (sym_sec != NULL
13285 && sym_sec->output_section != NULL)
13286 ok_dest = TRUE;
721956f4 13287 }
7fe2b9a6
AM
13288 else if (hash->elf.root.type == bfd_link_hash_defined
13289 || hash->elf.root.type == bfd_link_hash_defweak)
13290 {
13291 sym_value = hash->elf.root.u.def.value;
13292 if (sym_sec->output_section != NULL)
13293 ok_dest = TRUE;
13294 }
13295 else if (hash->elf.root.type == bfd_link_hash_undefweak
13296 || hash->elf.root.type == bfd_link_hash_undefined)
721956f4 13297 {
99877b66 13298 /* Recognise an old ABI func code entry sym, and
7fe2b9a6
AM
13299 use the func descriptor sym instead if it is
13300 defined. */
ceb1f1ef 13301 if (hash->elf.root.root.string[0] == '.'
8c5b4e52 13302 && hash->oh != NULL)
8387904d 13303 {
8c5b4e52 13304 fdh = ppc_follow_link (hash->oh);
8387904d
AM
13305 if (fdh->elf.root.type == bfd_link_hash_defined
13306 || fdh->elf.root.type == bfd_link_hash_defweak)
13307 {
13308 sym_sec = fdh->elf.root.u.def.section;
13309 sym_value = fdh->elf.root.u.def.value;
13310 if (sym_sec->output_section != NULL)
13311 ok_dest = TRUE;
13312 }
99877b66
AM
13313 else
13314 fdh = NULL;
8387904d 13315 }
7fe2b9a6
AM
13316 }
13317 else
13318 {
13319 bfd_set_error (bfd_error_bad_value);
13320 goto error_ret_free_internal;
721956f4
AM
13321 }
13322
8843416a 13323 destination = 0;
6911b7dc 13324 local_off = 0;
8843416a
AM
13325 if (ok_dest)
13326 {
13327 sym_value += irela->r_addend;
13328 destination = (sym_value
13329 + sym_sec->output_offset
13330 + sym_sec->output_section->vma);
6911b7dc
AM
13331 local_off = PPC64_LOCAL_ENTRY_OFFSET (hash
13332 ? hash->elf.other
13333 : sym->st_other);
8843416a
AM
13334 }
13335
8387904d 13336 code_sec = sym_sec;
e054468f 13337 code_value = sym_value;
74f0fb50
AM
13338 opd = get_opd_info (sym_sec);
13339 if (opd != NULL)
8387904d
AM
13340 {
13341 bfd_vma dest;
13342
74f0fb50 13343 if (hash == NULL && opd->adjust != NULL)
8387904d 13344 {
51aecdc5 13345 long adjust = opd->adjust[OPD_NDX (sym_value)];
8387904d
AM
13346 if (adjust == -1)
13347 continue;
e054468f 13348 code_value += adjust;
8387904d
AM
13349 sym_value += adjust;
13350 }
13351 dest = opd_entry_value (sym_sec, sym_value,
aef36ac1 13352 &code_sec, &code_value, FALSE);
8387904d
AM
13353 if (dest != (bfd_vma) -1)
13354 {
13355 destination = dest;
13356 if (fdh != NULL)
13357 {
13358 /* Fixup old ABI sym to point at code
13359 entry. */
99877b66 13360 hash->elf.root.type = bfd_link_hash_defweak;
8387904d 13361 hash->elf.root.u.def.section = code_sec;
e054468f 13362 hash->elf.root.u.def.value = code_value;
8387904d
AM
13363 }
13364 }
13365 }
13366
721956f4 13367 /* Determine what (if any) linker stub is needed. */
e054468f 13368 plt_ent = NULL;
721956f4 13369 stub_type = ppc_type_of_stub (section, irela, &hash,
6911b7dc
AM
13370 &plt_ent, destination,
13371 local_off);
ad8e1ba5 13372
05d0e962
AM
13373 if (r_type == R_PPC64_REL24_NOTOC)
13374 {
13375 if (stub_type == ppc_stub_plt_call)
13376 stub_type = ppc_stub_plt_call_notoc;
13377 else if (stub_type == ppc_stub_long_branch
13378 || (code_sec != NULL
13379 && code_sec->output_section != NULL
13380 && (((hash ? hash->elf.other : sym->st_other)
13381 & STO_PPC64_LOCAL_MASK)
4a4e7361 13382 > 1 << STO_PPC64_LOCAL_BIT)))
05d0e962
AM
13383 stub_type = ppc_stub_long_branch_notoc;
13384 }
13385 else if (stub_type != ppc_stub_plt_call)
ad8e1ba5
AM
13386 {
13387 /* Check whether we need a TOC adjusting stub.
13388 Since the linker pastes together pieces from
13389 different object files when creating the
13390 _init and _fini functions, it may be that a
13391 call to what looks like a local sym is in
13392 fact a call needing a TOC adjustment. */
33cb30a1
AM
13393 if ((code_sec != NULL
13394 && code_sec->output_section != NULL
13395 && (htab->sec_info[code_sec->id].toc_off
13396 != htab->sec_info[section->id].toc_off)
13397 && (code_sec->has_toc_reloc
13398 || code_sec->makes_toc_func_call))
13399 || (((hash ? hash->elf.other : sym->st_other)
13400 & STO_PPC64_LOCAL_MASK)
13401 == 1 << STO_PPC64_LOCAL_BIT))
ad8e1ba5
AM
13402 stub_type = ppc_stub_long_branch_r2off;
13403 }
13404
721956f4
AM
13405 if (stub_type == ppc_stub_none)
13406 continue;
13407
411e1bfb
AM
13408 /* __tls_get_addr calls might be eliminated. */
13409 if (stub_type != ppc_stub_plt_call
05d0e962 13410 && stub_type != ppc_stub_plt_call_notoc
411e1bfb 13411 && hash != NULL
ed7007c1 13412 && is_tls_get_addr (&hash->elf, htab)
411e1bfb
AM
13413 && section->has_tls_reloc
13414 && irela != internal_relocs)
13415 {
13416 /* Get tls info. */
f961d9dd 13417 unsigned char *tls_mask;
411e1bfb 13418
3a71aa26 13419 if (!get_tls_mask (&tls_mask, NULL, NULL, &local_syms,
411e1bfb
AM
13420 irela - 1, input_bfd))
13421 goto error_ret_free_internal;
abc489c6
AM
13422 if ((*tls_mask & TLS_TLS) != 0
13423 && (*tls_mask & (TLS_GD | TLS_LD)) == 0)
411e1bfb
AM
13424 continue;
13425 }
13426
f378ab09 13427 if (stub_type == ppc_stub_plt_call)
794e51c0 13428 {
6e1816be
AM
13429 if (!htab->opd_abi
13430 && htab->params->plt_localentry0 != 0
13431 && is_elfv2_localentry0 (&hash->elf))
13432 htab->has_plt_localentry0 = 1;
13433 else if (irela + 1 < irelaend
13434 && irela[1].r_offset == irela->r_offset + 4
13435 && (ELF64_R_TYPE (irela[1].r_info)
13436 == R_PPC64_TOCSAVE))
f378ab09
AM
13437 {
13438 if (!tocsave_find (htab, INSERT,
13439 &local_syms, irela + 1, input_bfd))
13440 goto error_ret_free_internal;
13441 }
f378ab09
AM
13442 else
13443 stub_type = ppc_stub_plt_call_r2save;
794e51c0 13444 }
3b421ab3 13445
721956f4 13446 /* Support for grouping stub sections. */
6f20ed8a 13447 id_sec = htab->sec_info[section->id].u.group->link_sec;
721956f4
AM
13448
13449 /* Get the name of this stub. */
13450 stub_name = ppc_stub_name (id_sec, sym_sec, hash, irela);
13451 if (!stub_name)
13452 goto error_ret_free_internal;
13453
13454 stub_entry = ppc_stub_hash_lookup (&htab->stub_hash_table,
b34976b6 13455 stub_name, FALSE, FALSE);
721956f4
AM
13456 if (stub_entry != NULL)
13457 {
05d0e962
AM
13458 enum ppc_stub_type old_type;
13459 /* A stub has already been created, but it may
13460 not be the required type. We shouldn't be
13461 transitioning from plt_call to long_branch
13462 stubs or vice versa, but we might be
13463 upgrading from plt_call to plt_call_r2save or
13464 from long_branch to long_branch_r2off. */
721956f4 13465 free (stub_name);
05d0e962
AM
13466 old_type = stub_entry->stub_type;
13467 switch (old_type)
13468 {
13469 default:
13470 abort ();
13471
13472 case ppc_stub_save_res:
13473 continue;
13474
13475 case ppc_stub_plt_call:
13476 case ppc_stub_plt_call_r2save:
13477 case ppc_stub_plt_call_notoc:
13478 case ppc_stub_plt_call_both:
13479 if (stub_type == ppc_stub_plt_call)
13480 continue;
13481 else if (stub_type == ppc_stub_plt_call_r2save)
13482 {
13483 if (old_type == ppc_stub_plt_call_notoc)
13484 stub_type = ppc_stub_plt_call_both;
13485 }
13486 else if (stub_type == ppc_stub_plt_call_notoc)
13487 {
13488 if (old_type == ppc_stub_plt_call_r2save)
13489 stub_type = ppc_stub_plt_call_both;
13490 }
13491 else
13492 abort ();
13493 break;
13494
13495 case ppc_stub_plt_branch:
13496 case ppc_stub_plt_branch_r2off:
13497 case ppc_stub_plt_branch_notoc:
13498 case ppc_stub_plt_branch_both:
13499 old_type += (ppc_stub_long_branch
13500 - ppc_stub_plt_branch);
13501 /* Fall through. */
13502 case ppc_stub_long_branch:
13503 case ppc_stub_long_branch_r2off:
13504 case ppc_stub_long_branch_notoc:
13505 case ppc_stub_long_branch_both:
13506 if (stub_type == ppc_stub_long_branch)
13507 continue;
13508 else if (stub_type == ppc_stub_long_branch_r2off)
13509 {
13510 if (old_type == ppc_stub_long_branch_notoc)
13511 stub_type = ppc_stub_long_branch_both;
13512 }
13513 else if (stub_type == ppc_stub_long_branch_notoc)
13514 {
13515 if (old_type == ppc_stub_long_branch_r2off)
13516 stub_type = ppc_stub_long_branch_both;
13517 }
13518 else
13519 abort ();
13520 break;
13521 }
13522 if (old_type < stub_type)
794e51c0 13523 stub_entry->stub_type = stub_type;
721956f4
AM
13524 continue;
13525 }
13526
25f53a85 13527 stub_entry = ppc_add_stub (stub_name, section, info);
721956f4
AM
13528 if (stub_entry == NULL)
13529 {
13530 free (stub_name);
6cdc0ccc
AM
13531 error_ret_free_internal:
13532 if (elf_section_data (section)->relocs == NULL)
13533 free (internal_relocs);
13534 error_ret_free_local:
c9594989
AM
13535 if (symtab_hdr->contents
13536 != (unsigned char *) local_syms)
6cdc0ccc 13537 free (local_syms);
b34976b6 13538 return FALSE;
721956f4
AM
13539 }
13540
ad8e1ba5 13541 stub_entry->stub_type = stub_type;
05d0e962
AM
13542 if (stub_type >= ppc_stub_plt_call
13543 && stub_type <= ppc_stub_plt_call_both)
e054468f 13544 {
05d0e962
AM
13545 stub_entry->target_value = sym_value;
13546 stub_entry->target_section = sym_sec;
e054468f
AM
13547 }
13548 else
13549 {
05d0e962
AM
13550 stub_entry->target_value = code_value;
13551 stub_entry->target_section = code_sec;
e054468f 13552 }
721956f4 13553 stub_entry->h = hash;
e054468f 13554 stub_entry->plt_ent = plt_ent;
2d7ad24e
AM
13555 stub_entry->symtype
13556 = hash ? hash->elf.type : ELF_ST_TYPE (sym->st_info);
6911b7dc 13557 stub_entry->other = hash ? hash->elf.other : sym->st_other;
ee75fd95 13558
3d58e1fc
AM
13559 if (hash != NULL
13560 && (hash->elf.root.type == bfd_link_hash_defined
13561 || hash->elf.root.type == bfd_link_hash_defweak))
ee75fd95 13562 htab->stub_globals += 1;
721956f4
AM
13563 }
13564
13565 /* We're done with the internal relocs, free them. */
6cdc0ccc 13566 if (elf_section_data (section)->relocs != internal_relocs)
1e2f5b6e 13567 free (internal_relocs);
721956f4 13568 }
6cdc0ccc
AM
13569
13570 if (local_syms != NULL
13571 && symtab_hdr->contents != (unsigned char *) local_syms)
13572 {
13573 if (!info->keep_memory)
13574 free (local_syms);
13575 else
13576 symtab_hdr->contents = (unsigned char *) local_syms;
13577 }
721956f4
AM
13578 }
13579
5c3dead3 13580 /* We may have added some stubs. Find out the new size of the
721956f4 13581 stub sections. */
d4aaa2a0 13582 for (group = htab->group; group != NULL; group = group->next)
df136d64
AM
13583 {
13584 group->lr_restore = 0;
13585 group->eh_size = 0;
13586 if (group->stub_sec != NULL)
13587 {
13588 asection *stub_sec = group->stub_sec;
13589
13590 if (htab->stub_iteration <= STUB_SHRINK_ITER
13591 || stub_sec->rawsize < stub_sec->size)
13592 /* Past STUB_SHRINK_ITER, rawsize is the max size seen. */
13593 stub_sec->rawsize = stub_sec->size;
13594 stub_sec->size = 0;
13595 stub_sec->reloc_count = 0;
13596 stub_sec->flags &= ~SEC_RELOC;
13597 }
13598 }
a804e476
AM
13599 if (htab->tga_group != NULL)
13600 {
13601 /* See emit_tga_desc and emit_tga_desc_eh_frame. */
13602 htab->tga_group->eh_size
13603 = 1 + 2 + (htab->opd_abi != 0) + 3 + 8 * 2 + 3 + 8 + 3;
13604 htab->tga_group->lr_restore = 23 * 4;
13605 htab->tga_group->stub_sec->size = 24 * 4;
13606 }
eea6121a 13607
ba21f564
AM
13608 if (htab->stub_iteration <= STUB_SHRINK_ITER
13609 || htab->brlt->rawsize < htab->brlt->size)
13610 htab->brlt->rawsize = htab->brlt->size;
eea6121a 13611 htab->brlt->size = 0;
84f5d08e
AM
13612 htab->brlt->reloc_count = 0;
13613 htab->brlt->flags &= ~SEC_RELOC;
ee75fd95 13614 if (htab->relbrlt != NULL)
eea6121a 13615 htab->relbrlt->size = 0;
721956f4 13616
63bc6f6c 13617 bfd_hash_traverse (&htab->stub_hash_table, ppc_size_one_stub, info);
721956f4 13618
a4b6fadd
AM
13619 for (group = htab->group; group != NULL; group = group->next)
13620 if (group->needs_save_res)
13621 group->stub_sec->size += htab->sfpr->size;
13622
176a0d42
AM
13623 if (info->emitrelocations
13624 && htab->glink != NULL && htab->glink->size != 0)
13625 {
13626 htab->glink->reloc_count = 1;
13627 htab->glink->flags |= SEC_RELOC;
13628 }
13629
58d180e8
AM
13630 if (htab->glink_eh_frame != NULL
13631 && !bfd_is_abs_section (htab->glink_eh_frame->output_section)
2d0d44d5 13632 && htab->glink_eh_frame->output_section->size > 8)
58d180e8 13633 {
2e0ce1c8 13634 size_t size = 0, align = 4;
58d180e8 13635
d4aaa2a0 13636 for (group = htab->group; group != NULL; group = group->next)
df136d64
AM
13637 if (group->eh_size != 0)
13638 size += (group->eh_size + 17 + align - 1) & -align;
58d180e8 13639 if (htab->glink != NULL && htab->glink->size != 0)
2e0ce1c8 13640 size += (24 + align - 1) & -align;
58d180e8 13641 if (size != 0)
2e0ce1c8
AM
13642 size += (sizeof (glink_eh_frame_cie) + align - 1) & -align;
13643 align = 1ul << htab->glink_eh_frame->output_section->alignment_power;
13644 size = (size + align - 1) & -align;
58d180e8
AM
13645 htab->glink_eh_frame->rawsize = htab->glink_eh_frame->size;
13646 htab->glink_eh_frame->size = size;
13647 }
13648
e7d1c40c 13649 if (htab->params->plt_stub_align != 0)
d4aaa2a0
AM
13650 for (group = htab->group; group != NULL; group = group->next)
13651 if (group->stub_sec != NULL)
691d2e9a
AM
13652 {
13653 int align = abs (htab->params->plt_stub_align);
13654 group->stub_sec->size
13655 = (group->stub_sec->size + (1 << align) - 1) & -(1 << align);
13656 }
d4aaa2a0
AM
13657
13658 for (group = htab->group; group != NULL; group = group->next)
13659 if (group->stub_sec != NULL
13660 && group->stub_sec->rawsize != group->stub_sec->size
c9301e31 13661 && (htab->stub_iteration <= STUB_SHRINK_ITER
d4aaa2a0 13662 || group->stub_sec->rawsize < group->stub_sec->size))
5c3dead3
AM
13663 break;
13664
d4aaa2a0 13665 if (group == NULL
ba21f564
AM
13666 && (htab->brlt->rawsize == htab->brlt->size
13667 || (htab->stub_iteration > STUB_SHRINK_ITER
13668 && htab->brlt->rawsize > htab->brlt->size))
58d180e8 13669 && (htab->glink_eh_frame == NULL
a804e476
AM
13670 || htab->glink_eh_frame->rawsize == htab->glink_eh_frame->size)
13671 && (htab->tga_group == NULL
13672 || htab->stub_iteration > 1))
5c3dead3
AM
13673 break;
13674
721956f4 13675 /* Ask the linker to do its stuff. */
e7d1c40c 13676 (*htab->params->layout_sections_again) ();
721956f4
AM
13677 }
13678
da44f4e5
AM
13679 if (htab->glink_eh_frame != NULL
13680 && htab->glink_eh_frame->size != 0)
13681 {
13682 bfd_vma val;
13683 bfd_byte *p, *last_fde;
13684 size_t last_fde_len, size, align, pad;
d4aaa2a0 13685 struct map_stub *group;
da44f4e5 13686
df136d64
AM
13687 /* It is necessary to at least have a rough outline of the
13688 linker generated CIEs and FDEs written before
13689 bfd_elf_discard_info is run, in order for these FDEs to be
13690 indexed in .eh_frame_hdr. */
da44f4e5
AM
13691 p = bfd_zalloc (htab->glink_eh_frame->owner, htab->glink_eh_frame->size);
13692 if (p == NULL)
13693 return FALSE;
13694 htab->glink_eh_frame->contents = p;
13695 last_fde = p;
2e0ce1c8 13696 align = 4;
da44f4e5
AM
13697
13698 memcpy (p, glink_eh_frame_cie, sizeof (glink_eh_frame_cie));
13699 /* CIE length (rewrite in case little-endian). */
2e0ce1c8 13700 last_fde_len = ((sizeof (glink_eh_frame_cie) + align - 1) & -align) - 4;
da44f4e5 13701 bfd_put_32 (htab->elf.dynobj, last_fde_len, p);
2e0ce1c8 13702 p += last_fde_len + 4;
da44f4e5 13703
d4aaa2a0 13704 for (group = htab->group; group != NULL; group = group->next)
df136d64 13705 if (group->eh_size != 0)
da44f4e5 13706 {
df136d64 13707 group->eh_base = p - htab->glink_eh_frame->contents;
da44f4e5 13708 last_fde = p;
df136d64 13709 last_fde_len = ((group->eh_size + 17 + align - 1) & -align) - 4;
da44f4e5 13710 /* FDE length. */
2e0ce1c8 13711 bfd_put_32 (htab->elf.dynobj, last_fde_len, p);
da44f4e5
AM
13712 p += 4;
13713 /* CIE pointer. */
13714 val = p - htab->glink_eh_frame->contents;
13715 bfd_put_32 (htab->elf.dynobj, val, p);
13716 p += 4;
13717 /* Offset to stub section, written later. */
13718 p += 4;
13719 /* stub section size. */
d4aaa2a0 13720 bfd_put_32 (htab->elf.dynobj, group->stub_sec->size, p);
da44f4e5
AM
13721 p += 4;
13722 /* Augmentation. */
13723 p += 1;
df136d64
AM
13724 /* Make sure we don't have all nops. This is enough for
13725 elf-eh-frame.c to detect the last non-nop opcode. */
13726 p[group->eh_size - 1] = DW_CFA_advance_loc + 1;
d4aaa2a0 13727 p = last_fde + last_fde_len + 4;
da44f4e5
AM
13728 }
13729 if (htab->glink != NULL && htab->glink->size != 0)
13730 {
13731 last_fde = p;
2e0ce1c8 13732 last_fde_len = ((24 + align - 1) & -align) - 4;
da44f4e5 13733 /* FDE length. */
2e0ce1c8 13734 bfd_put_32 (htab->elf.dynobj, last_fde_len, p);
da44f4e5
AM
13735 p += 4;
13736 /* CIE pointer. */
13737 val = p - htab->glink_eh_frame->contents;
13738 bfd_put_32 (htab->elf.dynobj, val, p);
13739 p += 4;
13740 /* Offset to .glink, written later. */
13741 p += 4;
13742 /* .glink size. */
13743 bfd_put_32 (htab->elf.dynobj, htab->glink->size - 8, p);
13744 p += 4;
13745 /* Augmentation. */
13746 p += 1;
13747
13748 *p++ = DW_CFA_advance_loc + 1;
13749 *p++ = DW_CFA_register;
13750 *p++ = 65;
9f08fa5c 13751 *p++ = htab->opd_abi ? 12 : 0;
15a3a14f 13752 *p++ = DW_CFA_advance_loc + (htab->opd_abi ? 5 : 7);
da44f4e5
AM
13753 *p++ = DW_CFA_restore_extended;
13754 *p++ = 65;
2e0ce1c8 13755 p += ((24 + align - 1) & -align) - 24;
da44f4e5
AM
13756 }
13757 /* Subsume any padding into the last FDE if user .eh_frame
13758 sections are aligned more than glink_eh_frame. Otherwise any
13759 zero padding will be seen as a terminator. */
2e0ce1c8 13760 align = 1ul << htab->glink_eh_frame->output_section->alignment_power;
da44f4e5 13761 size = p - htab->glink_eh_frame->contents;
2e0ce1c8 13762 pad = ((size + align - 1) & -align) - size;
da44f4e5
AM
13763 htab->glink_eh_frame->size = size + pad;
13764 bfd_put_32 (htab->elf.dynobj, last_fde_len + pad, last_fde);
13765 }
13766
d969d15f 13767 maybe_strip_output (info, htab->brlt);
2efec98b
AM
13768 if (htab->relbrlt != NULL)
13769 maybe_strip_output (info, htab->relbrlt);
d969d15f
AM
13770 if (htab->glink_eh_frame != NULL)
13771 maybe_strip_output (info, htab->glink_eh_frame);
721956f4 13772
b34976b6 13773 return TRUE;
721956f4
AM
13774}
13775
13776/* Called after we have determined section placement. If sections
805fc799 13777 move, we'll be called again. Provide a value for TOCstart. */
721956f4 13778
805fc799 13779bfd_vma
1c865ab2 13780ppc64_elf_set_toc (struct bfd_link_info *info, bfd *obfd)
721956f4 13781{
805fc799 13782 asection *s;
a27e685f 13783 bfd_vma TOCstart, adjust;
721956f4 13784
43417696
AM
13785 if (info != NULL)
13786 {
13787 struct elf_link_hash_entry *h;
13788 struct elf_link_hash_table *htab = elf_hash_table (info);
13789
13790 if (is_elf_hash_table (htab)
13791 && htab->hgot != NULL)
13792 h = htab->hgot;
13793 else
13794 {
13795 h = elf_link_hash_lookup (htab, ".TOC.", FALSE, FALSE, TRUE);
13796 if (is_elf_hash_table (htab))
13797 htab->hgot = h;
13798 }
13799 if (h != NULL
13800 && h->root.type == bfd_link_hash_defined
13801 && !h->root.linker_def
13802 && (!is_elf_hash_table (htab)
13803 || h->def_regular))
13804 {
ed7007c1 13805 TOCstart = defined_sym_val (h) - TOC_BASE_OFF;
43417696
AM
13806 _bfd_set_gp_value (obfd, TOCstart);
13807 return TOCstart;
13808 }
13809 }
13810
805fc799
AM
13811 /* The TOC consists of sections .got, .toc, .tocbss, .plt in that
13812 order. The TOC starts where the first of these sections starts. */
13813 s = bfd_get_section_by_name (obfd, ".got");
e054468f 13814 if (s == NULL || (s->flags & SEC_EXCLUDE) != 0)
805fc799 13815 s = bfd_get_section_by_name (obfd, ".toc");
e054468f 13816 if (s == NULL || (s->flags & SEC_EXCLUDE) != 0)
805fc799 13817 s = bfd_get_section_by_name (obfd, ".tocbss");
e054468f 13818 if (s == NULL || (s->flags & SEC_EXCLUDE) != 0)
805fc799 13819 s = bfd_get_section_by_name (obfd, ".plt");
e054468f 13820 if (s == NULL || (s->flags & SEC_EXCLUDE) != 0)
805fc799
AM
13821 {
13822 /* This may happen for
13823 o references to TOC base (SYM@toc / TOC[tc0]) without a
13824 .toc directive
13825 o bad linker script
13826 o --gc-sections and empty TOC sections
13827
13828 FIXME: Warn user? */
13829
13830 /* Look for a likely section. We probably won't even be
13831 using TOCstart. */
13832 for (s = obfd->sections; s != NULL; s = s->next)
e054468f
AM
13833 if ((s->flags & (SEC_ALLOC | SEC_SMALL_DATA | SEC_READONLY
13834 | SEC_EXCLUDE))
805fc799
AM
13835 == (SEC_ALLOC | SEC_SMALL_DATA))
13836 break;
721956f4 13837 if (s == NULL)
805fc799 13838 for (s = obfd->sections; s != NULL; s = s->next)
e054468f 13839 if ((s->flags & (SEC_ALLOC | SEC_SMALL_DATA | SEC_EXCLUDE))
805fc799
AM
13840 == (SEC_ALLOC | SEC_SMALL_DATA))
13841 break;
721956f4 13842 if (s == NULL)
805fc799 13843 for (s = obfd->sections; s != NULL; s = s->next)
e054468f
AM
13844 if ((s->flags & (SEC_ALLOC | SEC_READONLY | SEC_EXCLUDE))
13845 == SEC_ALLOC)
805fc799 13846 break;
721956f4 13847 if (s == NULL)
805fc799 13848 for (s = obfd->sections; s != NULL; s = s->next)
e054468f 13849 if ((s->flags & (SEC_ALLOC | SEC_EXCLUDE)) == SEC_ALLOC)
805fc799
AM
13850 break;
13851 }
721956f4 13852
805fc799
AM
13853 TOCstart = 0;
13854 if (s != NULL)
13855 TOCstart = s->output_section->vma + s->output_offset;
721956f4 13856
a27e685f
AM
13857 /* Force alignment. */
13858 adjust = TOCstart & (TOC_BASE_ALIGN - 1);
13859 TOCstart -= adjust;
1c865ab2
AM
13860 _bfd_set_gp_value (obfd, TOCstart);
13861
810d4e75 13862 if (info != NULL && s != NULL)
1c865ab2
AM
13863 {
13864 struct ppc_link_hash_table *htab = ppc_hash_table (info);
13865
810d4e75
AM
13866 if (htab != NULL)
13867 {
13868 if (htab->elf.hgot != NULL)
13869 {
a27e685f 13870 htab->elf.hgot->root.u.def.value = TOC_BASE_OFF - adjust;
810d4e75
AM
13871 htab->elf.hgot->root.u.def.section = s;
13872 }
13873 }
13874 else
1c865ab2 13875 {
810d4e75
AM
13876 struct bfd_link_hash_entry *bh = NULL;
13877 _bfd_generic_link_add_one_symbol (info, obfd, ".TOC.", BSF_GLOBAL,
a27e685f
AM
13878 s, TOC_BASE_OFF - adjust,
13879 NULL, FALSE, FALSE, &bh);
1c865ab2
AM
13880 }
13881 }
805fc799 13882 return TOCstart;
721956f4
AM
13883}
13884
a345bc8d 13885/* Called via elf_link_hash_traverse from ppc64_elf_build_stubs to
49c09209 13886 write out any global entry stubs, and PLT relocations. */
a345bc8d
AM
13887
13888static bfd_boolean
49c09209 13889build_global_entry_stubs_and_plt (struct elf_link_hash_entry *h, void *inf)
a345bc8d
AM
13890{
13891 struct bfd_link_info *info;
13892 struct ppc_link_hash_table *htab;
49c09209 13893 struct plt_entry *ent;
a345bc8d
AM
13894 asection *s;
13895
13896 if (h->root.type == bfd_link_hash_indirect)
13897 return TRUE;
13898
49c09209
AM
13899 info = inf;
13900 htab = ppc_hash_table (info);
13901 if (htab == NULL)
13902 return FALSE;
13903
13904 for (ent = h->plt.plist; ent != NULL; ent = ent->next)
13905 if (ent->plt.offset != (bfd_vma) -1)
13906 {
13907 /* This symbol has an entry in the procedure linkage
13908 table. Set it up. */
13909 Elf_Internal_Rela rela;
2d7ad24e 13910 asection *plt, *relplt;
49c09209
AM
13911 bfd_byte *loc;
13912
13913 if (!htab->elf.dynamic_sections_created
13914 || h->dynindx == -1)
13915 {
13916 if (!(h->def_regular
13917 && (h->root.type == bfd_link_hash_defined
13918 || h->root.type == bfd_link_hash_defweak)))
13919 continue;
2d7ad24e
AM
13920 if (h->type == STT_GNU_IFUNC)
13921 {
13922 plt = htab->elf.iplt;
13923 relplt = htab->elf.irelplt;
13924 htab->local_ifunc_resolver = 1;
13925 if (htab->opd_abi)
13926 rela.r_info = ELF64_R_INFO (0, R_PPC64_JMP_IREL);
13927 else
13928 rela.r_info = ELF64_R_INFO (0, R_PPC64_IRELATIVE);
13929 }
49c09209 13930 else
2d7ad24e
AM
13931 {
13932 plt = htab->pltlocal;
13933 if (bfd_link_pic (info))
13934 {
13935 relplt = htab->relpltlocal;
13936 if (htab->opd_abi)
13937 rela.r_info = ELF64_R_INFO (0, R_PPC64_JMP_SLOT);
13938 else
13939 rela.r_info = ELF64_R_INFO (0, R_PPC64_RELATIVE);
13940 }
13941 else
13942 relplt = NULL;
13943 }
ed7007c1 13944 rela.r_addend = defined_sym_val (h) + ent->addend;
2d7ad24e
AM
13945
13946 if (relplt == NULL)
13947 {
13948 loc = plt->contents + ent->plt.offset;
13949 bfd_put_64 (info->output_bfd, rela.r_addend, loc);
13950 if (htab->opd_abi)
13951 {
13952 bfd_vma toc = elf_gp (info->output_bfd);
13953 toc += htab->sec_info[h->root.u.def.section->id].toc_off;
13954 bfd_put_64 (info->output_bfd, toc, loc + 8);
13955 }
13956 }
13957 else
13958 {
13959 rela.r_offset = (plt->output_section->vma
13960 + plt->output_offset
13961 + ent->plt.offset);
13962 loc = relplt->contents + (relplt->reloc_count++
13963 * sizeof (Elf64_External_Rela));
13964 bfd_elf64_swap_reloca_out (info->output_bfd, &rela, loc);
13965 }
49c09209
AM
13966 }
13967 else
13968 {
13969 rela.r_offset = (htab->elf.splt->output_section->vma
13970 + htab->elf.splt->output_offset
13971 + ent->plt.offset);
13972 rela.r_info = ELF64_R_INFO (h->dynindx, R_PPC64_JMP_SLOT);
13973 rela.r_addend = ent->addend;
13974 loc = (htab->elf.srelplt->contents
13975 + ((ent->plt.offset - PLT_INITIAL_ENTRY_SIZE (htab))
13976 / PLT_ENTRY_SIZE (htab) * sizeof (Elf64_External_Rela)));
13977 if (h->type == STT_GNU_IFUNC && is_static_defined (h))
13978 htab->maybe_local_ifunc_resolver = 1;
2d7ad24e 13979 bfd_elf64_swap_reloca_out (info->output_bfd, &rela, loc);
49c09209 13980 }
49c09209
AM
13981 }
13982
a345bc8d
AM
13983 if (!h->pointer_equality_needed)
13984 return TRUE;
13985
13986 if (h->def_regular)
13987 return TRUE;
13988
9e390558 13989 s = htab->global_entry;
49c09209
AM
13990 if (s == NULL || s->size == 0)
13991 return TRUE;
13992
13993 for (ent = h->plt.plist; ent != NULL; ent = ent->next)
13994 if (ent->plt.offset != (bfd_vma) -1
13995 && ent->addend == 0)
a345bc8d
AM
13996 {
13997 bfd_byte *p;
13998 asection *plt;
13999 bfd_vma off;
14000
a345bc8d 14001 p = s->contents + h->root.u.def.value;
33e44f2e 14002 plt = htab->elf.splt;
a345bc8d
AM
14003 if (!htab->elf.dynamic_sections_created
14004 || h->dynindx == -1)
2d7ad24e
AM
14005 {
14006 if (h->type == STT_GNU_IFUNC)
14007 plt = htab->elf.iplt;
14008 else
14009 plt = htab->pltlocal;
14010 }
49c09209 14011 off = ent->plt.offset + plt->output_offset + plt->output_section->vma;
a345bc8d
AM
14012 off -= h->root.u.def.value + s->output_offset + s->output_section->vma;
14013
14014 if (off + 0x80008000 > 0xffffffff || (off & 3) != 0)
14015 {
14016 info->callbacks->einfo
c1c8c1ef 14017 (_("%P: linkage table error against `%pT'\n"),
a345bc8d
AM
14018 h->root.root.string);
14019 bfd_set_error (bfd_error_bad_value);
14020 htab->stub_error = TRUE;
14021 }
14022
7341d5e2
AM
14023 htab->stub_count[ppc_stub_global_entry - 1] += 1;
14024 if (htab->params->emit_stub_syms)
14025 {
14026 size_t len = strlen (h->root.root.string);
14027 char *name = bfd_malloc (sizeof "12345678.global_entry." + len);
14028
14029 if (name == NULL)
14030 return FALSE;
14031
14032 sprintf (name, "%08x.global_entry.%s", s->id, h->root.root.string);
14033 h = elf_link_hash_lookup (&htab->elf, name, TRUE, FALSE, FALSE);
14034 if (h == NULL)
14035 return FALSE;
14036 if (h->root.type == bfd_link_hash_new)
14037 {
14038 h->root.type = bfd_link_hash_defined;
14039 h->root.u.def.section = s;
14040 h->root.u.def.value = p - s->contents;
14041 h->ref_regular = 1;
14042 h->def_regular = 1;
14043 h->ref_regular_nonweak = 1;
14044 h->forced_local = 1;
14045 h->non_elf = 0;
2ec55de3 14046 h->root.linker_def = 1;
7341d5e2
AM
14047 }
14048 }
14049
a345bc8d
AM
14050 if (PPC_HA (off) != 0)
14051 {
14052 bfd_put_32 (s->owner, ADDIS_R12_R12 | PPC_HA (off), p);
14053 p += 4;
14054 }
14055 bfd_put_32 (s->owner, LD_R12_0R12 | PPC_LO (off), p);
14056 p += 4;
14057 bfd_put_32 (s->owner, MTCTR_R12, p);
14058 p += 4;
407aa07c 14059 bfd_put_32 (s->owner, BCTR, p);
a345bc8d
AM
14060 break;
14061 }
14062 return TRUE;
14063}
14064
49c09209
AM
14065/* Write PLT relocs for locals. */
14066
14067static bfd_boolean
14068write_plt_relocs_for_local_syms (struct bfd_link_info *info)
14069{
14070 struct ppc_link_hash_table *htab = ppc_hash_table (info);
14071 bfd *ibfd;
14072
14073 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
14074 {
14075 struct got_entry **lgot_ents, **end_lgot_ents;
14076 struct plt_entry **local_plt, **lplt, **end_local_plt;
14077 Elf_Internal_Shdr *symtab_hdr;
14078 bfd_size_type locsymcount;
14079 Elf_Internal_Sym *local_syms = NULL;
14080 struct plt_entry *ent;
14081
14082 if (!is_ppc64_elf (ibfd))
14083 continue;
14084
14085 lgot_ents = elf_local_got_ents (ibfd);
14086 if (!lgot_ents)
14087 continue;
14088
14089 symtab_hdr = &elf_symtab_hdr (ibfd);
14090 locsymcount = symtab_hdr->sh_info;
14091 end_lgot_ents = lgot_ents + locsymcount;
14092 local_plt = (struct plt_entry **) end_lgot_ents;
14093 end_local_plt = local_plt + locsymcount;
14094 for (lplt = local_plt; lplt < end_local_plt; ++lplt)
14095 for (ent = *lplt; ent != NULL; ent = ent->next)
14096 if (ent->plt.offset != (bfd_vma) -1)
14097 {
14098 Elf_Internal_Sym *sym;
14099 asection *sym_sec;
14100 asection *plt, *relplt;
14101 bfd_byte *loc;
14102 bfd_vma val;
49c09209
AM
14103
14104 if (!get_sym_h (NULL, &sym, &sym_sec, NULL, &local_syms,
14105 lplt - local_plt, ibfd))
14106 {
c9594989 14107 if (symtab_hdr->contents != (unsigned char *) local_syms)
49c09209
AM
14108 free (local_syms);
14109 return FALSE;
14110 }
14111
14112 val = sym->st_value + ent->addend;
ba85c15d
AM
14113 if (ELF_ST_TYPE (sym->st_info) != STT_GNU_IFUNC)
14114 val += PPC64_LOCAL_ENTRY_OFFSET (sym->st_other);
49c09209
AM
14115 if (sym_sec != NULL && sym_sec->output_section != NULL)
14116 val += sym_sec->output_offset + sym_sec->output_section->vma;
14117
2d7ad24e
AM
14118 if (ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC)
14119 {
14120 htab->local_ifunc_resolver = 1;
14121 plt = htab->elf.iplt;
14122 relplt = htab->elf.irelplt;
14123 }
14124 else
14125 {
14126 plt = htab->pltlocal;
14127 relplt = bfd_link_pic (info) ? htab->relpltlocal : NULL;
14128 }
49c09209 14129
2d7ad24e
AM
14130 if (relplt == NULL)
14131 {
14132 loc = plt->contents + ent->plt.offset;
14133 bfd_put_64 (info->output_bfd, val, loc);
14134 if (htab->opd_abi)
14135 {
14136 bfd_vma toc = elf_gp (ibfd);
14137 bfd_put_64 (info->output_bfd, toc, loc + 8);
14138 }
14139 }
49c09209 14140 else
2d7ad24e
AM
14141 {
14142 Elf_Internal_Rela rela;
14143 rela.r_offset = (ent->plt.offset
14144 + plt->output_offset
14145 + plt->output_section->vma);
14146 if (ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC)
14147 {
14148 if (htab->opd_abi)
14149 rela.r_info = ELF64_R_INFO (0, R_PPC64_JMP_IREL);
14150 else
14151 rela.r_info = ELF64_R_INFO (0, R_PPC64_IRELATIVE);
14152 }
14153 else
14154 {
14155 if (htab->opd_abi)
14156 rela.r_info = ELF64_R_INFO (0, R_PPC64_JMP_SLOT);
14157 else
14158 rela.r_info = ELF64_R_INFO (0, R_PPC64_RELATIVE);
14159 }
14160 rela.r_addend = val;
14161 loc = relplt->contents + (relplt->reloc_count++
14162 * sizeof (Elf64_External_Rela));
14163 bfd_elf64_swap_reloca_out (info->output_bfd, &rela, loc);
14164 }
49c09209
AM
14165 }
14166
14167 if (local_syms != NULL
14168 && symtab_hdr->contents != (unsigned char *) local_syms)
14169 {
14170 if (!info->keep_memory)
14171 free (local_syms);
14172 else
14173 symtab_hdr->contents = (unsigned char *) local_syms;
14174 }
14175 }
14176 return TRUE;
14177}
14178
a804e476
AM
14179/* Emit the static wrapper function preserving registers around a
14180 __tls_get_addr_opt call. */
14181
14182static bfd_boolean
14183emit_tga_desc (struct ppc_link_hash_table *htab)
14184{
14185 asection *stub_sec = htab->tga_group->stub_sec;
14186 unsigned int cfa_updt = 11 * 4;
14187 bfd_byte *p;
14188 bfd_vma to, from, delta;
14189
14190 BFD_ASSERT (htab->tga_desc_fd->elf.root.type == bfd_link_hash_defined
14191 && htab->tga_desc_fd->elf.root.u.def.section == stub_sec
14192 && htab->tga_desc_fd->elf.root.u.def.value == 0);
14193 to = defined_sym_val (&htab->tls_get_addr_fd->elf);
14194 from = defined_sym_val (&htab->tga_desc_fd->elf) + cfa_updt;
14195 delta = to - from;
14196 if (delta + (1 << 25) >= 1 << 26)
14197 {
14198 _bfd_error_handler (_("__tls_get_addr call offset overflow"));
14199 htab->stub_error = TRUE;
14200 return FALSE;
14201 }
14202
14203 p = stub_sec->contents;
14204 p = tls_get_addr_prologue (htab->elf.dynobj, p, htab);
14205 bfd_put_32 (stub_sec->owner, B_DOT | 1 | (delta & 0x3fffffc), p);
14206 p += 4;
14207 p = tls_get_addr_epilogue (htab->elf.dynobj, p, htab);
14208 return stub_sec->size == (bfd_size_type) (p - stub_sec->contents);
14209}
14210
14211/* Emit eh_frame describing the static wrapper function. */
14212
14213static bfd_byte *
14214emit_tga_desc_eh_frame (struct ppc_link_hash_table *htab, bfd_byte *p)
14215{
14216 unsigned int cfa_updt = 11 * 4;
14217 unsigned int i;
14218
14219 *p++ = DW_CFA_advance_loc + cfa_updt / 4;
14220 *p++ = DW_CFA_def_cfa_offset;
14221 if (htab->opd_abi)
14222 {
14223 *p++ = 128;
14224 *p++ = 1;
14225 }
14226 else
14227 *p++ = 96;
14228 *p++ = DW_CFA_offset_extended_sf;
14229 *p++ = 65;
14230 *p++ = (-16 / 8) & 0x7f;
14231 for (i = 4; i < 12; i++)
14232 {
14233 *p++ = DW_CFA_offset + i;
14234 *p++ = (htab->opd_abi ? 13 : 12) - i;
14235 }
14236 *p++ = DW_CFA_advance_loc + 10;
14237 *p++ = DW_CFA_def_cfa_offset;
14238 *p++ = 0;
14239 for (i = 4; i < 12; i++)
14240 *p++ = DW_CFA_restore + i;
14241 *p++ = DW_CFA_advance_loc + 2;
14242 *p++ = DW_CFA_restore_extended;
14243 *p++ = 65;
14244 return p;
14245}
14246
721956f4
AM
14247/* Build all the stubs associated with the current output file.
14248 The stubs are kept in a hash table attached to the main linker
14249 hash table. This function is called via gldelf64ppc_finish. */
14250
b34976b6 14251bfd_boolean
e7d1c40c 14252ppc64_elf_build_stubs (struct bfd_link_info *info,
4ce794b7 14253 char **stats)
5d1634d7
AM
14254{
14255 struct ppc_link_hash_table *htab = ppc_hash_table (info);
a4b6fadd 14256 struct map_stub *group;
721956f4 14257 asection *stub_sec;
5d1634d7 14258 bfd_byte *p;
e717da7e 14259 int stub_sec_count = 0;
5d1634d7 14260
4dfe6ac6
NC
14261 if (htab == NULL)
14262 return FALSE;
14263
eea6121a 14264 /* Allocate memory to hold the linker stubs. */
d4aaa2a0 14265 for (group = htab->group; group != NULL; group = group->next)
df136d64
AM
14266 {
14267 group->eh_size = 0;
14268 group->lr_restore = 0;
14269 if ((stub_sec = group->stub_sec) != NULL
14270 && stub_sec->size != 0)
14271 {
14272 stub_sec->contents = bfd_zalloc (htab->params->stub_bfd,
14273 stub_sec->size);
14274 if (stub_sec->contents == NULL)
14275 return FALSE;
14276 stub_sec->size = 0;
14277 }
14278 }
5d1634d7 14279
23eb7e01 14280 if (htab->glink != NULL && htab->glink->size != 0)
5d1634d7 14281 {
9f951329 14282 unsigned int indx;
ad8e1ba5 14283 bfd_vma plt0;
9f951329 14284
721956f4 14285 /* Build the .glink plt call stub. */
e7d1c40c 14286 if (htab->params->emit_stub_syms)
97b639ba
AM
14287 {
14288 struct elf_link_hash_entry *h;
468392fb
AM
14289 h = elf_link_hash_lookup (&htab->elf, "__glink_PLTresolve",
14290 TRUE, FALSE, FALSE);
97b639ba
AM
14291 if (h == NULL)
14292 return FALSE;
14293 if (h->root.type == bfd_link_hash_new)
14294 {
14295 h->root.type = bfd_link_hash_defined;
14296 h->root.u.def.section = htab->glink;
ee4bf8d2 14297 h->root.u.def.value = 8;
f5385ebf
AM
14298 h->ref_regular = 1;
14299 h->def_regular = 1;
14300 h->ref_regular_nonweak = 1;
14301 h->forced_local = 1;
14302 h->non_elf = 0;
2ec55de3 14303 h->root.linker_def = 1;
97b639ba
AM
14304 }
14305 }
33e44f2e
AM
14306 plt0 = (htab->elf.splt->output_section->vma
14307 + htab->elf.splt->output_offset
14308 - 16);
176a0d42
AM
14309 if (info->emitrelocations)
14310 {
14311 Elf_Internal_Rela *r = get_relocs (htab->glink, 1);
14312 if (r == NULL)
14313 return FALSE;
14314 r->r_offset = (htab->glink->output_offset
14315 + htab->glink->output_section->vma);
14316 r->r_info = ELF64_R_INFO (0, R_PPC64_REL64);
14317 r->r_addend = plt0;
14318 }
4ce794b7 14319 p = htab->glink->contents;
176a0d42 14320 plt0 -= htab->glink->output_section->vma + htab->glink->output_offset;
ee4bf8d2
AM
14321 bfd_put_64 (htab->glink->owner, plt0, p);
14322 p += 8;
b9e5796b
AM
14323 if (htab->opd_abi)
14324 {
14325 bfd_put_32 (htab->glink->owner, MFLR_R12, p);
14326 p += 4;
14327 bfd_put_32 (htab->glink->owner, BCL_20_31, p);
14328 p += 4;
14329 bfd_put_32 (htab->glink->owner, MFLR_R11, p);
14330 p += 4;
14331 bfd_put_32 (htab->glink->owner, LD_R2_0R11 | (-16 & 0xfffc), p);
14332 p += 4;
14333 bfd_put_32 (htab->glink->owner, MTLR_R12, p);
14334 p += 4;
14335 bfd_put_32 (htab->glink->owner, ADD_R11_R2_R11, p);
14336 p += 4;
14337 bfd_put_32 (htab->glink->owner, LD_R12_0R11, p);
14338 p += 4;
14339 bfd_put_32 (htab->glink->owner, LD_R2_0R11 | 8, p);
14340 p += 4;
14341 bfd_put_32 (htab->glink->owner, MTCTR_R12, p);
14342 p += 4;
14343 bfd_put_32 (htab->glink->owner, LD_R11_0R11 | 16, p);
14344 p += 4;
14345 }
14346 else
14347 {
14348 bfd_put_32 (htab->glink->owner, MFLR_R0, p);
14349 p += 4;
14350 bfd_put_32 (htab->glink->owner, BCL_20_31, p);
14351 p += 4;
14352 bfd_put_32 (htab->glink->owner, MFLR_R11, p);
14353 p += 4;
f378ab09
AM
14354 bfd_put_32 (htab->glink->owner, STD_R2_0R1 + 24, p);
14355 p += 4;
b9e5796b
AM
14356 bfd_put_32 (htab->glink->owner, LD_R2_0R11 | (-16 & 0xfffc), p);
14357 p += 4;
14358 bfd_put_32 (htab->glink->owner, MTLR_R0, p);
14359 p += 4;
14360 bfd_put_32 (htab->glink->owner, SUB_R12_R12_R11, p);
14361 p += 4;
14362 bfd_put_32 (htab->glink->owner, ADD_R11_R2_R11, p);
14363 p += 4;
14364 bfd_put_32 (htab->glink->owner, ADDI_R0_R12 | (-48 & 0xffff), p);
14365 p += 4;
14366 bfd_put_32 (htab->glink->owner, LD_R12_0R11, p);
14367 p += 4;
14368 bfd_put_32 (htab->glink->owner, SRDI_R0_R0_2, p);
14369 p += 4;
14370 bfd_put_32 (htab->glink->owner, MTCTR_R12, p);
14371 p += 4;
14372 bfd_put_32 (htab->glink->owner, LD_R11_0R11 | 8, p);
14373 p += 4;
14374 }
407aa07c
AM
14375 bfd_put_32 (htab->glink->owner, BCTR, p);
14376 p += 4;
c75bc4f7 14377 BFD_ASSERT (p == htab->glink->contents + GLINK_PLTRESOLVE_SIZE (htab));
ad8e1ba5 14378
9f951329
AM
14379 /* Build the .glink lazy link call stubs. */
14380 indx = 0;
9e390558 14381 while (p < htab->glink->contents + htab->glink->size)
9f951329 14382 {
b9e5796b 14383 if (htab->opd_abi)
9f951329 14384 {
b9e5796b
AM
14385 if (indx < 0x8000)
14386 {
14387 bfd_put_32 (htab->glink->owner, LI_R0_0 | indx, p);
14388 p += 4;
14389 }
14390 else
14391 {
14392 bfd_put_32 (htab->glink->owner, LIS_R0_0 | PPC_HI (indx), p);
14393 p += 4;
14394 bfd_put_32 (htab->glink->owner, ORI_R0_R0_0 | PPC_LO (indx),
14395 p);
14396 p += 4;
14397 }
9f951329 14398 }
4ce794b7 14399 bfd_put_32 (htab->glink->owner,
ee4bf8d2 14400 B_DOT | ((htab->glink->contents - p + 8) & 0x3fffffc), p);
a16d5acb 14401 indx++;
9f951329
AM
14402 p += 4;
14403 }
5d1634d7 14404 }
5d1634d7 14405
a804e476
AM
14406 if (htab->tga_group != NULL)
14407 {
14408 htab->tga_group->lr_restore = 23 * 4;
14409 htab->tga_group->stub_sec->size = 24 * 4;
14410 if (!emit_tga_desc (htab))
14411 return FALSE;
14412 if (htab->glink_eh_frame != NULL
14413 && htab->glink_eh_frame->size != 0)
14414 {
14415 size_t align = 4;
14416
14417 p = htab->glink_eh_frame->contents;
14418 p += (sizeof (glink_eh_frame_cie) + align - 1) & -align;
14419 p += 17;
14420 htab->tga_group->eh_size = emit_tga_desc_eh_frame (htab, p) - p;
14421 }
14422 }
14423
49c09209
AM
14424 /* Build .glink global entry stubs, and PLT relocs for globals. */
14425 elf_link_hash_traverse (&htab->elf, build_global_entry_stubs_and_plt, info);
14426
14427 if (!write_plt_relocs_for_local_syms (info))
14428 return FALSE;
9e390558 14429
7341d5e2 14430 if (htab->brlt != NULL && htab->brlt->size != 0)
721956f4 14431 {
4ce794b7 14432 htab->brlt->contents = bfd_zalloc (htab->brlt->owner,
eea6121a 14433 htab->brlt->size);
4ce794b7 14434 if (htab->brlt->contents == NULL)
b34976b6 14435 return FALSE;
721956f4 14436 }
ee75fd95 14437 if (htab->relbrlt != NULL && htab->relbrlt->size != 0)
63bc6f6c
AM
14438 {
14439 htab->relbrlt->contents = bfd_zalloc (htab->relbrlt->owner,
eea6121a 14440 htab->relbrlt->size);
63bc6f6c
AM
14441 if (htab->relbrlt->contents == NULL)
14442 return FALSE;
14443 }
5d1634d7 14444
721956f4
AM
14445 /* Build the stubs as directed by the stub hash table. */
14446 bfd_hash_traverse (&htab->stub_hash_table, ppc_build_one_stub, info);
5d1634d7 14447
a4b6fadd
AM
14448 for (group = htab->group; group != NULL; group = group->next)
14449 if (group->needs_save_res)
7dda8d3c 14450 group->stub_sec->size += htab->sfpr->size;
a4b6fadd 14451
aa8a7074
AM
14452 if (htab->relbrlt != NULL)
14453 htab->relbrlt->reloc_count = 0;
14454
e7d1c40c 14455 if (htab->params->plt_stub_align != 0)
d4aaa2a0
AM
14456 for (group = htab->group; group != NULL; group = group->next)
14457 if ((stub_sec = group->stub_sec) != NULL)
691d2e9a
AM
14458 {
14459 int align = abs (htab->params->plt_stub_align);
14460 stub_sec->size = (stub_sec->size + (1 << align) - 1) & -(1 << align);
14461 }
794e51c0 14462
7dda8d3c
AM
14463 for (group = htab->group; group != NULL; group = group->next)
14464 if (group->needs_save_res)
14465 {
14466 stub_sec = group->stub_sec;
14467 memcpy (stub_sec->contents + stub_sec->size - htab->sfpr->size,
14468 htab->sfpr->contents, htab->sfpr->size);
14469 if (htab->params->emit_stub_syms)
14470 {
14471 unsigned int i;
14472
14473 for (i = 0; i < ARRAY_SIZE (save_res_funcs); i++)
14474 if (!sfpr_define (info, &save_res_funcs[i], stub_sec))
14475 return FALSE;
14476 }
14477 }
14478
df136d64
AM
14479 if (htab->glink_eh_frame != NULL
14480 && htab->glink_eh_frame->size != 0)
14481 {
14482 bfd_vma val;
14483 size_t align = 4;
14484
14485 p = htab->glink_eh_frame->contents;
14486 p += (sizeof (glink_eh_frame_cie) + align - 1) & -align;
14487
14488 for (group = htab->group; group != NULL; group = group->next)
14489 if (group->eh_size != 0)
14490 {
14491 /* Offset to stub section. */
14492 val = (group->stub_sec->output_section->vma
14493 + group->stub_sec->output_offset);
14494 val -= (htab->glink_eh_frame->output_section->vma
14495 + htab->glink_eh_frame->output_offset
14496 + (p + 8 - htab->glink_eh_frame->contents));
14497 if (val + 0x80000000 > 0xffffffff)
14498 {
14499 _bfd_error_handler
14500 (_("%s offset too large for .eh_frame sdata4 encoding"),
14501 group->stub_sec->name);
14502 return FALSE;
14503 }
14504 bfd_put_32 (htab->elf.dynobj, val, p + 8);
14505 p += (group->eh_size + 17 + 3) & -4;
14506 }
14507 if (htab->glink != NULL && htab->glink->size != 0)
14508 {
14509 /* Offset to .glink. */
14510 val = (htab->glink->output_section->vma
14511 + htab->glink->output_offset
14512 + 8);
14513 val -= (htab->glink_eh_frame->output_section->vma
14514 + htab->glink_eh_frame->output_offset
14515 + (p + 8 - htab->glink_eh_frame->contents));
14516 if (val + 0x80000000 > 0xffffffff)
14517 {
14518 _bfd_error_handler
14519 (_("%s offset too large for .eh_frame sdata4 encoding"),
14520 htab->glink->name);
14521 return FALSE;
14522 }
14523 bfd_put_32 (htab->elf.dynobj, val, p + 8);
14524 p += (24 + align - 1) & -align;
14525 }
14526 }
14527
d4aaa2a0
AM
14528 for (group = htab->group; group != NULL; group = group->next)
14529 if ((stub_sec = group->stub_sec) != NULL)
e717da7e
AM
14530 {
14531 stub_sec_count += 1;
c9301e31
AM
14532 if (stub_sec->rawsize != stub_sec->size
14533 && (htab->stub_iteration <= STUB_SHRINK_ITER
14534 || stub_sec->rawsize < stub_sec->size))
e717da7e
AM
14535 break;
14536 }
5d1634d7 14537
25516cc5 14538 if (group != NULL)
5d1634d7 14539 {
b34976b6 14540 htab->stub_error = TRUE;
cf97bcb0 14541 _bfd_error_handler (_("stubs don't match calculated size"));
5d1634d7 14542 }
721956f4 14543
d2a300cf
AM
14544 if (htab->stub_error)
14545 return FALSE;
14546
14547 if (stats != NULL)
14548 {
988b7300
AM
14549 char *groupmsg;
14550 if (asprintf (&groupmsg,
14551 ngettext ("linker stubs in %u group\n",
14552 "linker stubs in %u groups\n",
14553 stub_sec_count),
14554 stub_sec_count) < 0)
14555 *stats = NULL;
14556 else
14557 {
14558 if (asprintf (stats, _("%s"
14559 " branch %lu\n"
14560 " branch toc adj %lu\n"
14561 " branch notoc %lu\n"
14562 " branch both %lu\n"
14563 " long branch %lu\n"
14564 " long toc adj %lu\n"
14565 " long notoc %lu\n"
14566 " long both %lu\n"
14567 " plt call %lu\n"
14568 " plt call save %lu\n"
14569 " plt call notoc %lu\n"
14570 " plt call both %lu\n"
14571 " global entry %lu"),
14572 groupmsg,
14573 htab->stub_count[ppc_stub_long_branch - 1],
14574 htab->stub_count[ppc_stub_long_branch_r2off - 1],
14575 htab->stub_count[ppc_stub_long_branch_notoc - 1],
14576 htab->stub_count[ppc_stub_long_branch_both - 1],
14577 htab->stub_count[ppc_stub_plt_branch - 1],
14578 htab->stub_count[ppc_stub_plt_branch_r2off - 1],
14579 htab->stub_count[ppc_stub_plt_branch_notoc - 1],
14580 htab->stub_count[ppc_stub_plt_branch_both - 1],
14581 htab->stub_count[ppc_stub_plt_call - 1],
14582 htab->stub_count[ppc_stub_plt_call_r2save - 1],
14583 htab->stub_count[ppc_stub_plt_call_notoc - 1],
14584 htab->stub_count[ppc_stub_plt_call_both - 1],
14585 htab->stub_count[ppc_stub_global_entry - 1]) < 0)
14586 *stats = NULL;
14587 free (groupmsg);
14588 }
d2a300cf
AM
14589 }
14590 return TRUE;
5bd4f169
AM
14591}
14592
60124e18
AM
14593/* What to do when ld finds relocations against symbols defined in
14594 discarded sections. */
14595
14596static unsigned int
14597ppc64_elf_action_discarded (asection *sec)
14598{
14599 if (strcmp (".opd", sec->name) == 0)
14600 return 0;
14601
14602 if (strcmp (".toc", sec->name) == 0)
14603 return 0;
14604
bce50a28
JJ
14605 if (strcmp (".toc1", sec->name) == 0)
14606 return 0;
14607
60124e18
AM
14608 return _bfd_elf_default_action_discarded (sec);
14609}
14610
e59a1001
AM
14611/* These are the dynamic relocations supported by glibc. */
14612
14613static bfd_boolean
14614ppc64_glibc_dynamic_reloc (enum elf_ppc64_reloc_type r_type)
14615{
14616 switch (r_type)
14617 {
14618 case R_PPC64_RELATIVE:
14619 case R_PPC64_NONE:
14620 case R_PPC64_ADDR64:
14621 case R_PPC64_GLOB_DAT:
14622 case R_PPC64_IRELATIVE:
14623 case R_PPC64_JMP_IREL:
14624 case R_PPC64_JMP_SLOT:
14625 case R_PPC64_DTPMOD64:
14626 case R_PPC64_DTPREL64:
14627 case R_PPC64_TPREL64:
14628 case R_PPC64_TPREL16_LO_DS:
14629 case R_PPC64_TPREL16_DS:
14630 case R_PPC64_TPREL16:
14631 case R_PPC64_TPREL16_LO:
14632 case R_PPC64_TPREL16_HI:
14633 case R_PPC64_TPREL16_HIGH:
14634 case R_PPC64_TPREL16_HA:
14635 case R_PPC64_TPREL16_HIGHA:
14636 case R_PPC64_TPREL16_HIGHER:
14637 case R_PPC64_TPREL16_HIGHEST:
14638 case R_PPC64_TPREL16_HIGHERA:
14639 case R_PPC64_TPREL16_HIGHESTA:
14640 case R_PPC64_ADDR16_LO_DS:
14641 case R_PPC64_ADDR16_LO:
14642 case R_PPC64_ADDR16_HI:
14643 case R_PPC64_ADDR16_HIGH:
14644 case R_PPC64_ADDR16_HA:
14645 case R_PPC64_ADDR16_HIGHA:
14646 case R_PPC64_REL30:
14647 case R_PPC64_COPY:
14648 case R_PPC64_UADDR64:
14649 case R_PPC64_UADDR32:
14650 case R_PPC64_ADDR32:
14651 case R_PPC64_ADDR24:
14652 case R_PPC64_ADDR16:
14653 case R_PPC64_UADDR16:
14654 case R_PPC64_ADDR16_DS:
14655 case R_PPC64_ADDR16_HIGHER:
14656 case R_PPC64_ADDR16_HIGHEST:
14657 case R_PPC64_ADDR16_HIGHERA:
14658 case R_PPC64_ADDR16_HIGHESTA:
14659 case R_PPC64_ADDR14:
14660 case R_PPC64_ADDR14_BRTAKEN:
14661 case R_PPC64_ADDR14_BRNTAKEN:
14662 case R_PPC64_REL32:
14663 case R_PPC64_REL64:
14664 return TRUE;
14665
14666 default:
14667 return FALSE;
14668 }
14669}
14670
5bd4f169
AM
14671/* The RELOCATE_SECTION function is called by the ELF backend linker
14672 to handle the relocations for a section.
14673
14674 The relocs are always passed as Rela structures; if the section
14675 actually uses Rel structures, the r_addend field will always be
14676 zero.
14677
14678 This function is responsible for adjust the section contents as
14679 necessary, and (if using Rela relocs and generating a
1049f94e 14680 relocatable output file) adjusting the reloc addend as
5bd4f169
AM
14681 necessary.
14682
14683 This function does not have to worry about setting the reloc
14684 address or the reloc symbol index.
14685
14686 LOCAL_SYMS is a pointer to the swapped in local symbols.
14687
14688 LOCAL_SECTIONS is an array giving the section in the input file
14689 corresponding to the st_shndx field of each local symbol.
14690
14691 The global hash table entry for the global symbols can be found
14692 via elf_sym_hashes (input_bfd).
14693
1049f94e 14694 When generating relocatable output, this function must handle
5bd4f169
AM
14695 STB_LOCAL/STT_SECTION symbols specially. The output symbol is
14696 going to be the section symbol corresponding to the output
14697 section, which means that the addend must be adjusted
14698 accordingly. */
14699
b34976b6 14700static bfd_boolean
4ce794b7
AM
14701ppc64_elf_relocate_section (bfd *output_bfd,
14702 struct bfd_link_info *info,
14703 bfd *input_bfd,
14704 asection *input_section,
14705 bfd_byte *contents,
14706 Elf_Internal_Rela *relocs,
14707 Elf_Internal_Sym *local_syms,
14708 asection **local_sections)
5bd4f169 14709{
65f38f15 14710 struct ppc_link_hash_table *htab;
5bd4f169
AM
14711 Elf_Internal_Shdr *symtab_hdr;
14712 struct elf_link_hash_entry **sym_hashes;
5bd4f169 14713 Elf_Internal_Rela *rel;
c316a17c 14714 Elf_Internal_Rela *wrel;
5bd4f169 14715 Elf_Internal_Rela *relend;
411e1bfb
AM
14716 Elf_Internal_Rela outrel;
14717 bfd_byte *loc;
411e1bfb 14718 struct got_entry **local_got_ents;
5bd4f169 14719 bfd_vma TOCstart;
b34976b6
AM
14720 bfd_boolean ret = TRUE;
14721 bfd_boolean is_opd;
794e51c0
AM
14722 /* Assume 'at' branch hints. */
14723 bfd_boolean is_isa_v2 = TRUE;
e59a1001 14724 bfd_boolean warned_dynamic = FALSE;
95f0d0d2 14725 bfd_vma d_offset = (bfd_big_endian (input_bfd) ? 2 : 0);
5bd4f169 14726
65f38f15 14727 /* Initialize howto table if needed. */
5bd4f169 14728 if (!ppc64_elf_howto_table[R_PPC64_ADDR32])
5bd4f169
AM
14729 ppc_howto_init ();
14730
65f38f15 14731 htab = ppc_hash_table (info);
4dfe6ac6
NC
14732 if (htab == NULL)
14733 return FALSE;
ee75fd95
AM
14734
14735 /* Don't relocate stub sections. */
e7d1c40c 14736 if (input_section->owner == htab->params->stub_bfd)
ee75fd95
AM
14737 return TRUE;
14738
7af5d5c4
AM
14739 if (!is_ppc64_elf (input_bfd))
14740 {
14741 bfd_set_error (bfd_error_wrong_format);
14742 return FALSE;
14743 }
0ffa91dd 14744
411e1bfb 14745 local_got_ents = elf_local_got_ents (input_bfd);
5bd4f169 14746 TOCstart = elf_gp (output_bfd);
0ffa91dd 14747 symtab_hdr = &elf_symtab_hdr (input_bfd);
5bd4f169 14748 sym_hashes = elf_sym_hashes (input_bfd);
7c8fe5c4 14749 is_opd = ppc64_elf_section_data (input_section)->sec_type == sec_opd;
65f38f15 14750
c316a17c 14751 rel = wrel = relocs;
5bd4f169 14752 relend = relocs + input_section->reloc_count;
c316a17c 14753 for (; rel < relend; wrel++, rel++)
5bd4f169 14754 {
04c9666a 14755 enum elf_ppc64_reloc_type r_type;
31c76678 14756 bfd_vma addend;
5bd4f169
AM
14757 bfd_reloc_status_type r;
14758 Elf_Internal_Sym *sym;
14759 asection *sec;
039b3fef
AM
14760 struct elf_link_hash_entry *h_elf;
14761 struct ppc_link_hash_entry *h;
14762 struct ppc_link_hash_entry *fdh;
5bd4f169 14763 const char *sym_name;
0d4792f7 14764 unsigned long r_symndx, toc_symndx;
3a71aa26 14765 bfd_vma toc_addend;
f961d9dd
AM
14766 unsigned char tls_mask, tls_gd, tls_type;
14767 unsigned char sym_type;
5bd4f169 14768 bfd_vma relocation;
23cedd1d 14769 bfd_boolean unresolved_reloc, save_unresolved_reloc;
b34976b6 14770 bfd_boolean warned;
bc30df16 14771 enum { DEST_NORMAL, DEST_OPD, DEST_STUB } reloc_dest;
67f0cbdb 14772 unsigned int insn;
e11840f9 14773 unsigned int mask;
721956f4
AM
14774 struct ppc_stub_hash_entry *stub_entry;
14775 bfd_vma max_br_offset;
14776 bfd_vma from;
c316a17c 14777 Elf_Internal_Rela orig_rel;
b80eed39
AM
14778 reloc_howto_type *howto;
14779 struct reloc_howto_struct alt_howto;
4a421c53
AM
14780 uint64_t pinsn;
14781 bfd_vma offset;
5bd4f169 14782
c316a17c
AM
14783 again:
14784 orig_rel = *rel;
14785
4ce794b7 14786 r_type = ELF64_R_TYPE (rel->r_info);
5bd4f169 14787 r_symndx = ELF64_R_SYM (rel->r_info);
ee87f2da
AM
14788
14789 /* For old style R_PPC64_TOC relocs with a zero symbol, use the
14790 symbol of the previous ADDR64 reloc. The symbol gives us the
14791 proper TOC base to use. */
14792 if (rel->r_info == ELF64_R_INFO (0, R_PPC64_TOC)
c316a17c
AM
14793 && wrel != relocs
14794 && ELF64_R_TYPE (wrel[-1].r_info) == R_PPC64_ADDR64
ee87f2da 14795 && is_opd)
c316a17c 14796 r_symndx = ELF64_R_SYM (wrel[-1].r_info);
ee87f2da 14797
4ce794b7
AM
14798 sym = NULL;
14799 sec = NULL;
039b3fef 14800 h_elf = NULL;
4ce794b7 14801 sym_name = NULL;
b34976b6
AM
14802 unresolved_reloc = FALSE;
14803 warned = FALSE;
65f38f15 14804
0b13192e 14805 if (r_symndx < symtab_hdr->sh_info)
5bd4f169
AM
14806 {
14807 /* It's a local symbol. */
74f0fb50 14808 struct _opd_sec_data *opd;
4025353c 14809
5bd4f169
AM
14810 sym = local_syms + r_symndx;
14811 sec = local_sections[r_symndx];
26c61ae5 14812 sym_name = bfd_elf_sym_name (input_bfd, symtab_hdr, sym, sec);
0d4792f7 14813 sym_type = ELF64_ST_TYPE (sym->st_info);
8517fae7 14814 relocation = _bfd_elf_rela_local_sym (output_bfd, sym, &sec, rel);
74f0fb50
AM
14815 opd = get_opd_info (sec);
14816 if (opd != NULL && opd->adjust != NULL)
1e2f5b6e 14817 {
51aecdc5
AM
14818 long adjust = opd->adjust[OPD_NDX (sym->st_value
14819 + rel->r_addend)];
4025353c
AM
14820 if (adjust == -1)
14821 relocation = 0;
14822 else
4cc603a5
AM
14823 {
14824 /* If this is a relocation against the opd section sym
14825 and we have edited .opd, adjust the reloc addend so
14826 that ld -r and ld --emit-relocs output is correct.
14827 If it is a reloc against some other .opd symbol,
14828 then the symbol value will be adjusted later. */
14829 if (ELF_ST_TYPE (sym->st_info) == STT_SECTION)
14830 rel->r_addend += adjust;
14831 else
14832 relocation += adjust;
14833 }
1e2f5b6e 14834 }
5bd4f169
AM
14835 }
14836 else
14837 {
62d887d4
L
14838 bfd_boolean ignored;
14839
b2a8e766
AM
14840 RELOC_FOR_GLOBAL_SYMBOL (info, input_bfd, input_section, rel,
14841 r_symndx, symtab_hdr, sym_hashes,
039b3fef 14842 h_elf, sec, relocation,
62d887d4 14843 unresolved_reloc, warned, ignored);
039b3fef
AM
14844 sym_name = h_elf->root.root.string;
14845 sym_type = h_elf->type;
b69fdb4e
AM
14846 if (sec != NULL
14847 && sec->owner == output_bfd
14848 && strcmp (sec->name, ".opd") == 0)
14849 {
14850 /* This is a symbol defined in a linker script. All
14851 such are defined in output sections, even those
14852 defined by simple assignment from a symbol defined in
14853 an input section. Transfer the symbol to an
14854 appropriate input .opd section, so that a branch to
14855 this symbol will be mapped to the location specified
14856 by the opd entry. */
14857 struct bfd_link_order *lo;
14858 for (lo = sec->map_head.link_order; lo != NULL; lo = lo->next)
14859 if (lo->type == bfd_indirect_link_order)
14860 {
14861 asection *isec = lo->u.indirect.section;
14862 if (h_elf->root.u.def.value >= isec->output_offset
14863 && h_elf->root.u.def.value < (isec->output_offset
14864 + isec->size))
14865 {
14866 h_elf->root.u.def.value -= isec->output_offset;
14867 h_elf->root.u.def.section = isec;
14868 sec = isec;
14869 break;
14870 }
14871 }
14872 }
5bd4f169 14873 }
ed7007c1 14874 h = ppc_elf_hash_entry (h_elf);
5bd4f169 14875
dbaa2011 14876 if (sec != NULL && discarded_section (sec))
c316a17c
AM
14877 {
14878 _bfd_clear_contents (ppc64_elf_howto_table[r_type],
14879 input_bfd, input_section,
0930cb30 14880 contents, rel->r_offset);
c316a17c
AM
14881 wrel->r_offset = rel->r_offset;
14882 wrel->r_info = 0;
14883 wrel->r_addend = 0;
14884
14885 /* For ld -r, remove relocations in debug sections against
dcd2b8a0 14886 symbols defined in discarded sections. Not done for
c316a17c
AM
14887 non-debug to preserve relocs in .eh_frame which the
14888 eh_frame editing code expects to be present. */
14889 if (bfd_link_relocatable (info)
14890 && (input_section->flags & SEC_DEBUGGING))
14891 wrel--;
14892
14893 continue;
14894 }
ab96bf03 14895
0e1862bb 14896 if (bfd_link_relocatable (info))
c316a17c 14897 goto copy_reloc;
ab96bf03 14898
f40da81b
AM
14899 if (h != NULL && &h->elf == htab->elf.hgot)
14900 {
6f20ed8a 14901 relocation = TOCstart + htab->sec_info[input_section->id].toc_off;
f40da81b
AM
14902 sec = bfd_abs_section_ptr;
14903 unresolved_reloc = FALSE;
14904 }
14905
951fd09b
AM
14906 /* TLS optimizations. Replace instruction sequences and relocs
14907 based on information we collected in tls_optimize. We edit
14908 RELOCS so that --emit-relocs will output something sensible
14909 for the final instruction stream. */
14910 tls_mask = 0;
14911 tls_gd = 0;
0d4792f7 14912 toc_symndx = 0;
727fc41e
AM
14913 if (h != NULL)
14914 tls_mask = h->tls_mask;
14915 else if (local_got_ents != NULL)
411e1bfb 14916 {
e054468f
AM
14917 struct plt_entry **local_plt = (struct plt_entry **)
14918 (local_got_ents + symtab_hdr->sh_info);
f961d9dd 14919 unsigned char *lgot_masks = (unsigned char *)
e054468f 14920 (local_plt + symtab_hdr->sh_info);
727fc41e
AM
14921 tls_mask = lgot_masks[r_symndx];
14922 }
37da22e5 14923 if (((tls_mask & TLS_TLS) == 0 || tls_mask == (TLS_TLS | TLS_MARK))
727fc41e
AM
14924 && (r_type == R_PPC64_TLS
14925 || r_type == R_PPC64_TLSGD
14926 || r_type == R_PPC64_TLSLD))
14927 {
14928 /* Check for toc tls entries. */
f961d9dd 14929 unsigned char *toc_tls;
0d4792f7 14930
727fc41e
AM
14931 if (!get_tls_mask (&toc_tls, &toc_symndx, &toc_addend,
14932 &local_syms, rel, input_bfd))
14933 return FALSE;
0d4792f7 14934
727fc41e
AM
14935 if (toc_tls)
14936 tls_mask = *toc_tls;
0d4792f7
AM
14937 }
14938
14939 /* Check that tls relocs are used with tls syms, and non-tls
14940 relocs are used with non-tls syms. */
cf35638d 14941 if (r_symndx != STN_UNDEF
0d4792f7
AM
14942 && r_type != R_PPC64_NONE
14943 && (h == NULL
039b3fef
AM
14944 || h->elf.root.type == bfd_link_hash_defined
14945 || h->elf.root.type == bfd_link_hash_defweak)
71c4e95a 14946 && IS_PPC64_TLS_RELOC (r_type) != (sym_type == STT_TLS))
0d4792f7 14947 {
37da22e5 14948 if ((tls_mask & TLS_TLS) != 0
727fc41e
AM
14949 && (r_type == R_PPC64_TLS
14950 || r_type == R_PPC64_TLSGD
14951 || r_type == R_PPC64_TLSLD))
0d4792f7
AM
14952 /* R_PPC64_TLS is OK against a symbol in the TOC. */
14953 ;
14954 else
25f53a85 14955 info->callbacks->einfo
1d483afe 14956 (!IS_PPC64_TLS_RELOC (r_type)
695344c0 14957 /* xgettext:c-format */
c1c8c1ef 14958 ? _("%H: %s used with TLS symbol `%pT'\n")
695344c0 14959 /* xgettext:c-format */
c1c8c1ef 14960 : _("%H: %s used with non-TLS symbol `%pT'\n"),
25f53a85 14961 input_bfd, input_section, rel->r_offset,
0d4792f7
AM
14962 ppc64_elf_howto_table[r_type]->name,
14963 sym_name);
411e1bfb
AM
14964 }
14965
14966 /* Ensure reloc mapping code below stays sane. */
14967 if (R_PPC64_TOC16_LO_DS != R_PPC64_TOC16_DS + 1
14968 || R_PPC64_TOC16_LO != R_PPC64_TOC16 + 1
14969 || (R_PPC64_GOT_TLSLD16 & 3) != (R_PPC64_GOT_TLSGD16 & 3)
14970 || (R_PPC64_GOT_TLSLD16_LO & 3) != (R_PPC64_GOT_TLSGD16_LO & 3)
14971 || (R_PPC64_GOT_TLSLD16_HI & 3) != (R_PPC64_GOT_TLSGD16_HI & 3)
14972 || (R_PPC64_GOT_TLSLD16_HA & 3) != (R_PPC64_GOT_TLSGD16_HA & 3)
14973 || (R_PPC64_GOT_TLSLD16 & 3) != (R_PPC64_GOT_TPREL16_DS & 3)
14974 || (R_PPC64_GOT_TLSLD16_LO & 3) != (R_PPC64_GOT_TPREL16_LO_DS & 3)
14975 || (R_PPC64_GOT_TLSLD16_HI & 3) != (R_PPC64_GOT_TPREL16_HI & 3)
14976 || (R_PPC64_GOT_TLSLD16_HA & 3) != (R_PPC64_GOT_TPREL16_HA & 3))
14977 abort ();
0d4792f7 14978
411e1bfb
AM
14979 switch (r_type)
14980 {
14981 default:
411e1bfb
AM
14982 break;
14983
ba761f19 14984 case R_PPC64_LO_DS_OPT:
95f0d0d2 14985 insn = bfd_get_32 (input_bfd, contents + rel->r_offset - d_offset);
2365f8d7 14986 if ((insn & (0x3fu << 26)) != 58u << 26)
ba761f19
AM
14987 abort ();
14988 insn += (14u << 26) - (58u << 26);
95f0d0d2 14989 bfd_put_32 (input_bfd, insn, contents + rel->r_offset - d_offset);
ba761f19
AM
14990 r_type = R_PPC64_TOC16_LO;
14991 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
14992 break;
14993
411e1bfb
AM
14994 case R_PPC64_TOC16:
14995 case R_PPC64_TOC16_LO:
14996 case R_PPC64_TOC16_DS:
14997 case R_PPC64_TOC16_LO_DS:
411e1bfb
AM
14998 {
14999 /* Check for toc tls entries. */
f961d9dd 15000 unsigned char *toc_tls;
951fd09b 15001 int retval;
411e1bfb 15002
3a71aa26
AM
15003 retval = get_tls_mask (&toc_tls, &toc_symndx, &toc_addend,
15004 &local_syms, rel, input_bfd);
951fd09b 15005 if (retval == 0)
411e1bfb
AM
15006 return FALSE;
15007
15008 if (toc_tls)
15009 {
951fd09b 15010 tls_mask = *toc_tls;
411e1bfb
AM
15011 if (r_type == R_PPC64_TOC16_DS
15012 || r_type == R_PPC64_TOC16_LO_DS)
81407a69 15013 {
37da22e5 15014 if ((tls_mask & TLS_TLS) != 0
81407a69
AM
15015 && (tls_mask & (TLS_DTPREL | TLS_TPREL)) == 0)
15016 goto toctprel;
15017 }
411e1bfb 15018 else
951fd09b
AM
15019 {
15020 /* If we found a GD reloc pair, then we might be
15021 doing a GD->IE transition. */
15022 if (retval == 2)
15023 {
b00a0a86 15024 tls_gd = TLS_GDIE;
37da22e5
AM
15025 if ((tls_mask & TLS_TLS) != 0
15026 && (tls_mask & TLS_GD) == 0)
102890f0 15027 goto tls_ldgd_opt;
951fd09b
AM
15028 }
15029 else if (retval == 3)
15030 {
37da22e5
AM
15031 if ((tls_mask & TLS_TLS) != 0
15032 && (tls_mask & TLS_LD) == 0)
102890f0 15033 goto tls_ldgd_opt;
951fd09b
AM
15034 }
15035 }
411e1bfb
AM
15036 }
15037 }
15038 break;
15039
9d6ded02
AM
15040 case R_PPC64_GOT_TPREL16_HI:
15041 case R_PPC64_GOT_TPREL16_HA:
37da22e5 15042 if ((tls_mask & TLS_TLS) != 0
9d6ded02
AM
15043 && (tls_mask & TLS_TPREL) == 0)
15044 {
15045 rel->r_offset -= d_offset;
95f0d0d2 15046 bfd_put_32 (input_bfd, NOP, contents + rel->r_offset);
9d6ded02
AM
15047 r_type = R_PPC64_NONE;
15048 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
15049 }
15050 break;
15051
411e1bfb
AM
15052 case R_PPC64_GOT_TPREL16_DS:
15053 case R_PPC64_GOT_TPREL16_LO_DS:
37da22e5 15054 if ((tls_mask & TLS_TLS) != 0
951fd09b 15055 && (tls_mask & TLS_TPREL) == 0)
411e1bfb 15056 {
81407a69 15057 toctprel:
95f0d0d2 15058 insn = bfd_get_32 (input_bfd,
c316a17c 15059 contents + rel->r_offset - d_offset);
411e1bfb
AM
15060 insn &= 31 << 21;
15061 insn |= 0x3c0d0000; /* addis 0,13,0 */
95f0d0d2 15062 bfd_put_32 (input_bfd, insn,
c316a17c 15063 contents + rel->r_offset - d_offset);
411e1bfb 15064 r_type = R_PPC64_TPREL16_HA;
0d4792f7
AM
15065 if (toc_symndx != 0)
15066 {
15067 rel->r_info = ELF64_R_INFO (toc_symndx, r_type);
3a71aa26 15068 rel->r_addend = toc_addend;
0d4792f7
AM
15069 /* We changed the symbol. Start over in order to
15070 get h, sym, sec etc. right. */
c316a17c 15071 goto again;
0d4792f7
AM
15072 }
15073 else
15074 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
411e1bfb
AM
15075 }
15076 break;
15077
c213164a
AM
15078 case R_PPC64_GOT_TPREL34:
15079 if ((tls_mask & TLS_TLS) != 0
15080 && (tls_mask & TLS_TPREL) == 0)
15081 {
15082 /* pld ra,sym@got@tprel@pcrel -> paddi ra,r13,sym@tprel */
15083 pinsn = bfd_get_32 (input_bfd, contents + rel->r_offset);
15084 pinsn <<= 32;
15085 pinsn |= bfd_get_32 (input_bfd, contents + rel->r_offset + 4);
15086 pinsn += ((2ULL << 56) + (-1ULL << 52)
15087 + (14ULL << 26) - (57ULL << 26) + (13ULL << 16));
15088 bfd_put_32 (input_bfd, pinsn >> 32,
15089 contents + rel->r_offset);
15090 bfd_put_32 (input_bfd, pinsn & 0xffffffff,
15091 contents + rel->r_offset + 4);
15092 r_type = R_PPC64_TPREL34;
15093 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
15094 }
15095 break;
15096
411e1bfb 15097 case R_PPC64_TLS:
37da22e5 15098 if ((tls_mask & TLS_TLS) != 0
951fd09b 15099 && (tls_mask & TLS_TPREL) == 0)
411e1bfb 15100 {
c213164a 15101 insn = bfd_get_32 (input_bfd, contents + (rel->r_offset & ~3));
2d0f3896
AM
15102 insn = _bfd_elf_ppc_at_tls_transform (insn, 13);
15103 if (insn == 0)
c213164a
AM
15104 break;
15105 if ((rel->r_offset & 3) == 0)
0d4792f7 15106 {
c213164a
AM
15107 bfd_put_32 (input_bfd, insn, contents + rel->r_offset);
15108 /* Was PPC64_TLS which sits on insn boundary, now
15109 PPC64_TPREL16_LO which is at low-order half-word. */
15110 rel->r_offset += d_offset;
15111 r_type = R_PPC64_TPREL16_LO;
15112 if (toc_symndx != 0)
15113 {
15114 rel->r_info = ELF64_R_INFO (toc_symndx, r_type);
15115 rel->r_addend = toc_addend;
15116 /* We changed the symbol. Start over in order to
15117 get h, sym, sec etc. right. */
15118 goto again;
15119 }
15120 else
15121 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
15122 }
15123 else if ((rel->r_offset & 3) == 1)
15124 {
15125 /* For pcrel IE to LE we already have the full
15126 offset and thus don't need an addi here. A nop
15127 or mr will do. */
2365f8d7 15128 if ((insn & (0x3fu << 26)) == 14 << 26)
c213164a
AM
15129 {
15130 /* Extract regs from addi rt,ra,si. */
15131 unsigned int rt = (insn >> 21) & 0x1f;
15132 unsigned int ra = (insn >> 16) & 0x1f;
15133 if (rt == ra)
15134 insn = NOP;
15135 else
15136 {
15137 /* Build or ra,rs,rb with rb==rs, ie. mr ra,rs. */
15138 insn = (rt << 16) | (ra << 21) | (ra << 11);
15139 insn |= (31u << 26) | (444u << 1);
15140 }
15141 }
15142 bfd_put_32 (input_bfd, insn, contents + rel->r_offset - 1);
0d4792f7 15143 }
411e1bfb
AM
15144 }
15145 break;
15146
411e1bfb
AM
15147 case R_PPC64_GOT_TLSGD16_HI:
15148 case R_PPC64_GOT_TLSGD16_HA:
b00a0a86 15149 tls_gd = TLS_GDIE;
37da22e5 15150 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_GD) == 0)
951fd09b
AM
15151 goto tls_gdld_hi;
15152 break;
15153
411e1bfb
AM
15154 case R_PPC64_GOT_TLSLD16_HI:
15155 case R_PPC64_GOT_TLSLD16_HA:
37da22e5 15156 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_LD) == 0)
411e1bfb 15157 {
951fd09b
AM
15158 tls_gdld_hi:
15159 if ((tls_mask & tls_gd) != 0)
15160 r_type = (((r_type - (R_PPC64_GOT_TLSGD16 & 3)) & 3)
15161 + R_PPC64_GOT_TPREL16_DS);
15162 else
411e1bfb 15163 {
4fe5ca5b 15164 rel->r_offset -= d_offset;
95f0d0d2 15165 bfd_put_32 (input_bfd, NOP, contents + rel->r_offset);
951fd09b 15166 r_type = R_PPC64_NONE;
411e1bfb 15167 }
951fd09b 15168 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
411e1bfb
AM
15169 }
15170 break;
15171
951fd09b
AM
15172 case R_PPC64_GOT_TLSGD16:
15173 case R_PPC64_GOT_TLSGD16_LO:
b00a0a86 15174 tls_gd = TLS_GDIE;
37da22e5 15175 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_GD) == 0)
102890f0 15176 goto tls_ldgd_opt;
951fd09b 15177 break;
411e1bfb 15178
951fd09b
AM
15179 case R_PPC64_GOT_TLSLD16:
15180 case R_PPC64_GOT_TLSLD16_LO:
37da22e5 15181 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_LD) == 0)
951fd09b 15182 {
b9f04fe0 15183 unsigned int insn1, insn2;
102890f0
AM
15184
15185 tls_ldgd_opt:
727fc41e
AM
15186 offset = (bfd_vma) -1;
15187 /* If not using the newer R_PPC64_TLSGD/LD to mark
15188 __tls_get_addr calls, we must trust that the call
15189 stays with its arg setup insns, ie. that the next
15190 reloc is the __tls_get_addr call associated with
15191 the current reloc. Edit both insns. */
9737e8af 15192 if (input_section->nomark_tls_get_addr
727fc41e
AM
15193 && rel + 1 < relend
15194 && branch_reloc_hash_match (input_bfd, rel + 1,
9e7028aa
AM
15195 htab->tls_get_addr_fd,
15196 htab->tga_desc_fd,
727fc41e 15197 htab->tls_get_addr,
9e7028aa 15198 htab->tga_desc))
727fc41e 15199 offset = rel[1].r_offset;
b86ac8e3
AM
15200 /* We read the low GOT_TLS (or TOC16) insn because we
15201 need to keep the destination reg. It may be
15202 something other than the usual r3, and moved to r3
15203 before the call by intervening code. */
95f0d0d2 15204 insn1 = bfd_get_32 (input_bfd,
b86ac8e3 15205 contents + rel->r_offset - d_offset);
102890f0 15206 if ((tls_mask & tls_gd) != 0)
411e1bfb 15207 {
102890f0 15208 /* IE */
b86ac8e3 15209 insn1 &= (0x1f << 21) | (0x1f << 16);
2365f8d7 15210 insn1 |= 58u << 26; /* ld */
102890f0 15211 insn2 = 0x7c636a14; /* add 3,3,13 */
727fc41e 15212 if (offset != (bfd_vma) -1)
f58d5a2d 15213 rel[1].r_info = ELF64_R_INFO (STN_UNDEF, R_PPC64_NONE);
46e9995a
AM
15214 if (r_type == R_PPC64_TOC16
15215 || r_type == R_PPC64_TOC16_LO)
102890f0 15216 r_type += R_PPC64_TOC16_DS - R_PPC64_TOC16;
46e9995a
AM
15217 else
15218 r_type = (((r_type - (R_PPC64_GOT_TLSGD16 & 1)) & 1)
15219 + R_PPC64_GOT_TPREL16_DS);
102890f0
AM
15220 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
15221 }
15222 else
15223 {
15224 /* LE */
b86ac8e3
AM
15225 insn1 &= 0x1f << 21;
15226 insn1 |= 0x3c0d0000; /* addis r,13,0 */
102890f0
AM
15227 insn2 = 0x38630000; /* addi 3,3,0 */
15228 if (tls_gd == 0)
951fd09b 15229 {
102890f0 15230 /* Was an LD reloc. */
71c4e95a 15231 r_symndx = STN_UNDEF;
102890f0 15232 rel->r_addend = htab->elf.tls_sec->vma + DTP_OFFSET;
951fd09b 15233 }
102890f0 15234 else if (toc_symndx != 0)
3a71aa26
AM
15235 {
15236 r_symndx = toc_symndx;
15237 rel->r_addend = toc_addend;
15238 }
102890f0
AM
15239 r_type = R_PPC64_TPREL16_HA;
15240 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
727fc41e
AM
15241 if (offset != (bfd_vma) -1)
15242 {
15243 rel[1].r_info = ELF64_R_INFO (r_symndx,
15244 R_PPC64_TPREL16_LO);
15245 rel[1].r_offset = offset + d_offset;
15246 rel[1].r_addend = rel->r_addend;
15247 }
102890f0 15248 }
95f0d0d2 15249 bfd_put_32 (input_bfd, insn1,
3a71aa26 15250 contents + rel->r_offset - d_offset);
727fc41e 15251 if (offset != (bfd_vma) -1)
c96e0573
AM
15252 {
15253 bfd_put_32 (input_bfd, insn2, contents + offset);
15254 if (offset + 8 <= input_section->size)
15255 {
15256 insn2 = bfd_get_32 (input_bfd, contents + offset + 4);
15257 if (insn2 == LD_R2_0R1 + STK_TOC (htab))
15258 bfd_put_32 (input_bfd, NOP, contents + offset + 4);
15259 }
15260 }
727fc41e
AM
15261 if ((tls_mask & tls_gd) == 0
15262 && (tls_gd == 0 || toc_symndx != 0))
15263 {
15264 /* We changed the symbol. Start over in order
15265 to get h, sym, sec etc. right. */
c316a17c 15266 goto again;
727fc41e
AM
15267 }
15268 }
15269 break;
15270
c213164a
AM
15271 case R_PPC64_GOT_TLSGD34:
15272 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_GD) == 0)
15273 {
15274 pinsn = bfd_get_32 (input_bfd, contents + rel->r_offset);
15275 pinsn <<= 32;
15276 pinsn |= bfd_get_32 (input_bfd, contents + rel->r_offset + 4);
15277 if ((tls_mask & TLS_GDIE) != 0)
15278 {
15279 /* IE, pla -> pld */
15280 pinsn += (-2ULL << 56) + (57ULL << 26) - (14ULL << 26);
15281 r_type = R_PPC64_GOT_TPREL34;
15282 }
15283 else
15284 {
15285 /* LE, pla pcrel -> paddi r13 */
15286 pinsn += (-1ULL << 52) + (13ULL << 16);
15287 r_type = R_PPC64_TPREL34;
15288 }
15289 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
15290 bfd_put_32 (input_bfd, pinsn >> 32,
15291 contents + rel->r_offset);
15292 bfd_put_32 (input_bfd, pinsn & 0xffffffff,
15293 contents + rel->r_offset + 4);
15294 }
15295 break;
15296
15297 case R_PPC64_GOT_TLSLD34:
15298 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_LD) == 0)
15299 {
15300 pinsn = bfd_get_32 (input_bfd, contents + rel->r_offset);
15301 pinsn <<= 32;
15302 pinsn |= bfd_get_32 (input_bfd, contents + rel->r_offset + 4);
15303 pinsn += (-1ULL << 52) + (13ULL << 16);
15304 bfd_put_32 (input_bfd, pinsn >> 32,
15305 contents + rel->r_offset);
15306 bfd_put_32 (input_bfd, pinsn & 0xffffffff,
15307 contents + rel->r_offset + 4);
15308 rel->r_addend = htab->elf.tls_sec->vma + DTP_OFFSET;
15309 r_symndx = STN_UNDEF;
15310 r_type = R_PPC64_TPREL34;
15311 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
15312 goto again;
15313 }
15314 break;
15315
727fc41e 15316 case R_PPC64_TLSGD:
37da22e5 15317 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_GD) == 0
675e2809 15318 && rel + 1 < relend)
727fc41e 15319 {
b9f04fe0 15320 unsigned int insn2;
5663e321 15321 enum elf_ppc64_reloc_type r_type1 = ELF64_R_TYPE (rel[1].r_info);
727fc41e 15322
4a421c53 15323 offset = rel->r_offset;
5663e321 15324 if (is_plt_seq_reloc (r_type1))
23cedd1d
AM
15325 {
15326 bfd_put_32 (output_bfd, NOP, contents + offset);
5663e321
AM
15327 if (r_type1 == R_PPC64_PLT_PCREL34
15328 || r_type1 == R_PPC64_PLT_PCREL34_NOTOC)
15329 bfd_put_32 (output_bfd, NOP, contents + offset + 4);
23cedd1d
AM
15330 rel[1].r_info = ELF64_R_INFO (STN_UNDEF, R_PPC64_NONE);
15331 break;
15332 }
15333
15334 if (ELF64_R_TYPE (rel[1].r_info) == R_PPC64_PLTCALL)
15335 bfd_put_32 (output_bfd, NOP, contents + offset + 4);
15336
b00a0a86 15337 if ((tls_mask & TLS_GDIE) != 0)
727fc41e
AM
15338 {
15339 /* IE */
15340 r_type = R_PPC64_NONE;
15341 insn2 = 0x7c636a14; /* add 3,3,13 */
15342 }
15343 else
15344 {
15345 /* LE */
15346 if (toc_symndx != 0)
15347 {
15348 r_symndx = toc_symndx;
15349 rel->r_addend = toc_addend;
15350 }
c213164a
AM
15351 if (r_type1 == R_PPC64_REL24_NOTOC
15352 || r_type1 == R_PPC64_PLTCALL_NOTOC)
15353 {
15354 r_type = R_PPC64_NONE;
15355 insn2 = NOP;
15356 }
15357 else
15358 {
15359 rel->r_offset = offset + d_offset;
15360 r_type = R_PPC64_TPREL16_LO;
15361 insn2 = 0x38630000; /* addi 3,3,0 */
15362 }
727fc41e
AM
15363 }
15364 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
15365 /* Zap the reloc on the _tls_get_addr call too. */
15366 BFD_ASSERT (offset == rel[1].r_offset);
f58d5a2d 15367 rel[1].r_info = ELF64_R_INFO (STN_UNDEF, R_PPC64_NONE);
95f0d0d2 15368 bfd_put_32 (input_bfd, insn2, contents + offset);
c213164a
AM
15369 if ((tls_mask & TLS_GDIE) == 0
15370 && toc_symndx != 0
15371 && r_type != R_PPC64_NONE)
c316a17c 15372 goto again;
411e1bfb 15373 }
411e1bfb
AM
15374 break;
15375
727fc41e 15376 case R_PPC64_TLSLD:
37da22e5 15377 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_LD) == 0
675e2809 15378 && rel + 1 < relend)
727fc41e 15379 {
b9f04fe0 15380 unsigned int insn2;
5663e321 15381 enum elf_ppc64_reloc_type r_type1 = ELF64_R_TYPE (rel[1].r_info);
727fc41e 15382
4a421c53 15383 offset = rel->r_offset;
5663e321 15384 if (is_plt_seq_reloc (r_type1))
23cedd1d
AM
15385 {
15386 bfd_put_32 (output_bfd, NOP, contents + offset);
5663e321
AM
15387 if (r_type1 == R_PPC64_PLT_PCREL34
15388 || r_type1 == R_PPC64_PLT_PCREL34_NOTOC)
15389 bfd_put_32 (output_bfd, NOP, contents + offset + 4);
23cedd1d
AM
15390 rel[1].r_info = ELF64_R_INFO (STN_UNDEF, R_PPC64_NONE);
15391 break;
15392 }
15393
15394 if (ELF64_R_TYPE (rel[1].r_info) == R_PPC64_PLTCALL)
15395 bfd_put_32 (output_bfd, NOP, contents + offset + 4);
15396
c213164a
AM
15397 if (r_type1 == R_PPC64_REL24_NOTOC
15398 || r_type1 == R_PPC64_PLTCALL_NOTOC)
15399 {
15400 r_type = R_PPC64_NONE;
15401 insn2 = NOP;
15402 }
15403 else
15404 {
15405 rel->r_offset = offset + d_offset;
15406 r_symndx = STN_UNDEF;
15407 r_type = R_PPC64_TPREL16_LO;
15408 rel->r_addend = htab->elf.tls_sec->vma + DTP_OFFSET;
15409 insn2 = 0x38630000; /* addi 3,3,0 */
15410 }
727fc41e 15411 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
727fc41e
AM
15412 /* Zap the reloc on the _tls_get_addr call too. */
15413 BFD_ASSERT (offset == rel[1].r_offset);
f58d5a2d 15414 rel[1].r_info = ELF64_R_INFO (STN_UNDEF, R_PPC64_NONE);
95f0d0d2 15415 bfd_put_32 (input_bfd, insn2, contents + offset);
c213164a
AM
15416 if (r_type != R_PPC64_NONE)
15417 goto again;
727fc41e
AM
15418 }
15419 break;
15420
411e1bfb 15421 case R_PPC64_DTPMOD64:
951fd09b
AM
15422 if (rel + 1 < relend
15423 && rel[1].r_info == ELF64_R_INFO (r_symndx, R_PPC64_DTPREL64)
15424 && rel[1].r_offset == rel->r_offset + 8)
411e1bfb 15425 {
951fd09b
AM
15426 if ((tls_mask & TLS_GD) == 0)
15427 {
15428 rel[1].r_info = ELF64_R_INFO (r_symndx, R_PPC64_NONE);
b00a0a86 15429 if ((tls_mask & TLS_GDIE) != 0)
951fd09b
AM
15430 r_type = R_PPC64_TPREL64;
15431 else
15432 {
4ce794b7 15433 bfd_put_64 (output_bfd, 1, contents + rel->r_offset);
951fd09b
AM
15434 r_type = R_PPC64_NONE;
15435 }
15436 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
15437 }
15438 }
15439 else
15440 {
15441 if ((tls_mask & TLS_LD) == 0)
411e1bfb 15442 {
4ce794b7 15443 bfd_put_64 (output_bfd, 1, contents + rel->r_offset);
411e1bfb 15444 r_type = R_PPC64_NONE;
951fd09b 15445 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
411e1bfb 15446 }
411e1bfb
AM
15447 }
15448 break;
15449
15450 case R_PPC64_TPREL64:
951fd09b 15451 if ((tls_mask & TLS_TPREL) == 0)
411e1bfb
AM
15452 {
15453 r_type = R_PPC64_NONE;
15454 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
15455 }
15456 break;
52a82034 15457
006589cf
AM
15458 case R_PPC64_ENTRY:
15459 relocation = TOCstart + htab->sec_info[input_section->id].toc_off;
15460 if (!bfd_link_pic (info)
15461 && !info->traditional_format
15462 && relocation + 0x80008000 <= 0xffffffff)
15463 {
15464 unsigned int insn1, insn2;
15465
15466 insn1 = bfd_get_32 (input_bfd, contents + rel->r_offset);
15467 insn2 = bfd_get_32 (input_bfd, contents + rel->r_offset + 4);
15468 if ((insn1 & ~0xfffc) == LD_R2_0R12
15469 && insn2 == ADD_R2_R2_R12)
15470 {
95f0d0d2 15471 bfd_put_32 (input_bfd,
006589cf
AM
15472 LIS_R2 + PPC_HA (relocation),
15473 contents + rel->r_offset);
95f0d0d2 15474 bfd_put_32 (input_bfd,
006589cf
AM
15475 ADDI_R2_R2 + PPC_LO (relocation),
15476 contents + rel->r_offset + 4);
15477 }
15478 }
15479 else
15480 {
15481 relocation -= (rel->r_offset
15482 + input_section->output_offset
15483 + input_section->output_section->vma);
15484 if (relocation + 0x80008000 <= 0xffffffff)
15485 {
15486 unsigned int insn1, insn2;
15487
15488 insn1 = bfd_get_32 (input_bfd, contents + rel->r_offset);
15489 insn2 = bfd_get_32 (input_bfd, contents + rel->r_offset + 4);
15490 if ((insn1 & ~0xfffc) == LD_R2_0R12
15491 && insn2 == ADD_R2_R2_R12)
15492 {
95f0d0d2 15493 bfd_put_32 (input_bfd,
006589cf
AM
15494 ADDIS_R2_R12 + PPC_HA (relocation),
15495 contents + rel->r_offset);
95f0d0d2 15496 bfd_put_32 (input_bfd,
006589cf
AM
15497 ADDI_R2_R2 + PPC_LO (relocation),
15498 contents + rel->r_offset + 4);
15499 }
15500 }
15501 }
15502 break;
15503
52a82034
AM
15504 case R_PPC64_REL16_HA:
15505 /* If we are generating a non-PIC executable, edit
15506 . 0: addis 2,12,.TOC.-0b@ha
15507 . addi 2,2,.TOC.-0b@l
15508 used by ELFv2 global entry points to set up r2, to
15509 . lis 2,.TOC.@ha
15510 . addi 2,2,.TOC.@l
15511 if .TOC. is in range. */
0e1862bb 15512 if (!bfd_link_pic (info)
810d4e75 15513 && !info->traditional_format
006589cf 15514 && !htab->opd_abi
4f038ee5 15515 && rel->r_addend == d_offset
52a82034
AM
15516 && h != NULL && &h->elf == htab->elf.hgot
15517 && rel + 1 < relend
15518 && rel[1].r_info == ELF64_R_INFO (r_symndx, R_PPC64_REL16_LO)
15519 && rel[1].r_offset == rel->r_offset + 4
15520 && rel[1].r_addend == rel->r_addend + 4
15521 && relocation + 0x80008000 <= 0xffffffff)
15522 {
15523 unsigned int insn1, insn2;
4a421c53 15524 offset = rel->r_offset - d_offset;
95f0d0d2
AM
15525 insn1 = bfd_get_32 (input_bfd, contents + offset);
15526 insn2 = bfd_get_32 (input_bfd, contents + offset + 4);
006589cf
AM
15527 if ((insn1 & 0xffff0000) == ADDIS_R2_R12
15528 && (insn2 & 0xffff0000) == ADDI_R2_R2)
52a82034
AM
15529 {
15530 r_type = R_PPC64_ADDR16_HA;
15531 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
15532 rel->r_addend -= d_offset;
15533 rel[1].r_info = ELF64_R_INFO (r_symndx, R_PPC64_ADDR16_LO);
15534 rel[1].r_addend -= d_offset + 4;
95f0d0d2 15535 bfd_put_32 (input_bfd, LIS_R2, contents + offset);
52a82034
AM
15536 }
15537 }
15538 break;
411e1bfb
AM
15539 }
15540
15541 /* Handle other relocations that tweak non-addend part of insn. */
86c76c7b 15542 insn = 0;
b25116a9
AM
15543 max_br_offset = 1 << 25;
15544 addend = rel->r_addend;
bc30df16 15545 reloc_dest = DEST_NORMAL;
65f38f15 15546 switch (r_type)
5bd4f169
AM
15547 {
15548 default:
65f38f15 15549 break;
5bd4f169 15550
3b421ab3
AM
15551 case R_PPC64_TOCSAVE:
15552 if (relocation + addend == (rel->r_offset
15553 + input_section->output_offset
15554 + input_section->output_section->vma)
15555 && tocsave_find (htab, NO_INSERT,
15556 &local_syms, rel, input_bfd))
15557 {
15558 insn = bfd_get_32 (input_bfd, contents + rel->r_offset);
15559 if (insn == NOP
15560 || insn == CROR_151515 || insn == CROR_313131)
a078d95a
AM
15561 bfd_put_32 (input_bfd,
15562 STD_R2_0R1 + STK_TOC (htab),
3b421ab3
AM
15563 contents + rel->r_offset);
15564 }
15565 break;
15566
65f38f15
AM
15567 /* Branch taken prediction relocations. */
15568 case R_PPC64_ADDR14_BRTAKEN:
15569 case R_PPC64_REL14_BRTAKEN:
cedb70c5 15570 insn = 0x01 << 21; /* 'y' or 't' bit, lowest bit of BO field. */
1a0670f3 15571 /* Fall through. */
65f38f15 15572
86c76c7b 15573 /* Branch not taken prediction relocations. */
65f38f15
AM
15574 case R_PPC64_ADDR14_BRNTAKEN:
15575 case R_PPC64_REL14_BRNTAKEN:
95f0d0d2 15576 insn |= bfd_get_32 (input_bfd,
411e1bfb 15577 contents + rel->r_offset) & ~(0x01 << 21);
1a0670f3 15578 /* Fall through. */
86c76c7b 15579
b25116a9
AM
15580 case R_PPC64_REL14:
15581 max_br_offset = 1 << 15;
1a0670f3 15582 /* Fall through. */
5bd4f169 15583
65f38f15 15584 case R_PPC64_REL24:
05d0e962 15585 case R_PPC64_REL24_NOTOC:
23cedd1d 15586 case R_PPC64_PLTCALL:
5663e321 15587 case R_PPC64_PLTCALL_NOTOC:
ad8e1ba5
AM
15588 /* Calls to functions with a different TOC, such as calls to
15589 shared objects, need to alter the TOC pointer. This is
15590 done using a linkage stub. A REL24 branching to these
15591 linkage stubs needs to be followed by a nop, as the nop
15592 will be replaced with an instruction to restore the TOC
15593 base pointer. */
8387904d 15594 fdh = h;
b31867b6
AM
15595 if (h != NULL
15596 && h->oh != NULL
15597 && h->oh->is_func_descriptor)
15598 fdh = ppc_follow_link (h->oh);
31c76678
DK
15599 stub_entry = ppc_get_stub_entry (input_section, sec, fdh, &orig_rel,
15600 htab);
5663e321
AM
15601 if ((r_type == R_PPC64_PLTCALL
15602 || r_type == R_PPC64_PLTCALL_NOTOC)
23cedd1d 15603 && stub_entry != NULL
05d0e962
AM
15604 && stub_entry->stub_type >= ppc_stub_plt_call
15605 && stub_entry->stub_type <= ppc_stub_plt_call_both)
23cedd1d
AM
15606 stub_entry = NULL;
15607
6abec6bc 15608 if (stub_entry != NULL
d0abeec8
AM
15609 && ((stub_entry->stub_type >= ppc_stub_plt_call
15610 && stub_entry->stub_type <= ppc_stub_plt_call_both)
ad8e1ba5 15611 || stub_entry->stub_type == ppc_stub_plt_branch_r2off
05d0e962
AM
15612 || stub_entry->stub_type == ppc_stub_plt_branch_both
15613 || stub_entry->stub_type == ppc_stub_long_branch_r2off
15614 || stub_entry->stub_type == ppc_stub_long_branch_both))
41bd81ab 15615 {
b25116a9 15616 bfd_boolean can_plt_call = FALSE;
721956f4 15617
6e1816be
AM
15618 if (stub_entry->stub_type == ppc_stub_plt_call
15619 && !htab->opd_abi
15620 && htab->params->plt_localentry0 != 0
15621 && is_elfv2_localentry0 (&h->elf))
15622 {
15623 /* The function doesn't use or change r2. */
15624 can_plt_call = TRUE;
15625 }
05d0e962
AM
15626 else if (r_type == R_PPC64_REL24_NOTOC)
15627 {
15628 /* NOTOC calls don't need to restore r2. */
15629 can_plt_call = TRUE;
15630 }
6e1816be 15631
f378ab09 15632 /* All of these stubs may modify r2, so there must be a
ba8ca3e7
AM
15633 branch and link followed by a nop. The nop is
15634 replaced by an insn to restore r2. */
6e1816be 15635 else if (rel->r_offset + 8 <= input_section->size)
41bd81ab 15636 {
ba8ca3e7
AM
15637 unsigned long br;
15638
15639 br = bfd_get_32 (input_bfd,
15640 contents + rel->r_offset);
15641 if ((br & 1) != 0)
41bd81ab 15642 {
ba8ca3e7
AM
15643 unsigned long nop;
15644
15645 nop = bfd_get_32 (input_bfd,
15646 contents + rel->r_offset + 4);
23cedd1d
AM
15647 if (nop == LD_R2_0R1 + STK_TOC (htab))
15648 can_plt_call = TRUE;
15649 else if (nop == NOP
15650 || nop == CROR_151515
15651 || nop == CROR_313131)
a7f2871e 15652 {
ba8ca3e7 15653 if (h != NULL
ed7007c1 15654 && is_tls_get_addr (&h->elf, htab)
7c9cf415 15655 && htab->params->tls_get_addr_opt)
ba8ca3e7
AM
15656 {
15657 /* Special stub used, leave nop alone. */
15658 }
15659 else
a078d95a
AM
15660 bfd_put_32 (input_bfd,
15661 LD_R2_0R1 + STK_TOC (htab),
ba8ca3e7
AM
15662 contents + rel->r_offset + 4);
15663 can_plt_call = TRUE;
a7f2871e 15664 }
41bd81ab 15665 }
5bd4f169 15666 }
721956f4 15667
ba8ca3e7 15668 if (!can_plt_call && h != NULL)
721956f4 15669 {
ba8ca3e7
AM
15670 const char *name = h->elf.root.root.string;
15671
15672 if (*name == '.')
15673 ++name;
15674
15675 if (strncmp (name, "__libc_start_main", 17) == 0
15676 && (name[17] == 0 || name[17] == '@'))
6ab189d5 15677 {
ba8ca3e7
AM
15678 /* Allow crt1 branch to go via a toc adjusting
15679 stub. Other calls that never return could do
15680 the same, if we could detect such. */
b25116a9 15681 can_plt_call = TRUE;
6ab189d5 15682 }
ba8ca3e7
AM
15683 }
15684
15685 if (!can_plt_call)
15686 {
15687 /* g++ as of 20130507 emits self-calls without a
15688 following nop. This is arguably wrong since we
15689 have conflicting information. On the one hand a
15690 global symbol and on the other a local call
15691 sequence, but don't error for this special case.
15692 It isn't possible to cheaply verify we have
15693 exactly such a call. Allow all calls to the same
15694 section. */
15695 asection *code_sec = sec;
15696
15697 if (get_opd_info (sec) != NULL)
ad8e1ba5 15698 {
ba8ca3e7
AM
15699 bfd_vma off = (relocation + addend
15700 - sec->output_section->vma
15701 - sec->output_offset);
bc30df16 15702
ba8ca3e7 15703 opd_entry_value (sec, off, &code_sec, NULL, FALSE);
ad8e1ba5 15704 }
ba8ca3e7
AM
15705 if (code_sec == input_section)
15706 can_plt_call = TRUE;
15707 }
15708
15709 if (!can_plt_call)
15710 {
05d0e962
AM
15711 if (stub_entry->stub_type >= ppc_stub_plt_call
15712 && stub_entry->stub_type <= ppc_stub_plt_call_both)
4805fc55 15713 info->callbacks->einfo
695344c0 15714 /* xgettext:c-format */
c1c8c1ef 15715 (_("%H: call to `%pT' lacks nop, can't restore toc; "
f53ad3cf 15716 "(plt call stub)\n"),
4805fc55
AM
15717 input_bfd, input_section, rel->r_offset, sym_name);
15718 else
15719 info->callbacks->einfo
695344c0 15720 /* xgettext:c-format */
c1c8c1ef 15721 (_("%H: call to `%pT' lacks nop, can't restore toc; "
f53ad3cf 15722 "(toc save/adjust stub)\n"),
4805fc55 15723 input_bfd, input_section, rel->r_offset, sym_name);
ba8ca3e7
AM
15724
15725 bfd_set_error (bfd_error_bad_value);
15726 ret = FALSE;
721956f4
AM
15727 }
15728
b25116a9 15729 if (can_plt_call
05d0e962
AM
15730 && stub_entry->stub_type >= ppc_stub_plt_call
15731 && stub_entry->stub_type <= ppc_stub_plt_call_both)
b25116a9
AM
15732 unresolved_reloc = FALSE;
15733 }
15734
6abec6bc
AM
15735 if ((stub_entry == NULL
15736 || stub_entry->stub_type == ppc_stub_long_branch
15737 || stub_entry->stub_type == ppc_stub_plt_branch)
8387904d
AM
15738 && get_opd_info (sec) != NULL)
15739 {
15740 /* The branch destination is the value of the opd entry. */
4cc603a5
AM
15741 bfd_vma off = (relocation + addend
15742 - sec->output_section->vma
15743 - sec->output_offset);
aef36ac1 15744 bfd_vma dest = opd_entry_value (sec, off, NULL, NULL, FALSE);
8387904d
AM
15745 if (dest != (bfd_vma) -1)
15746 {
15747 relocation = dest;
15748 addend = 0;
bc30df16 15749 reloc_dest = DEST_OPD;
8387904d
AM
15750 }
15751 }
15752
b25116a9
AM
15753 /* If the branch is out of reach we ought to have a long
15754 branch stub. */
15755 from = (rel->r_offset
15756 + input_section->output_offset
15757 + input_section->output_section->vma);
15758
6911b7dc
AM
15759 relocation += PPC64_LOCAL_ENTRY_OFFSET (fdh
15760 ? fdh->elf.other
15761 : sym->st_other);
15762
6abec6bc
AM
15763 if (stub_entry != NULL
15764 && (stub_entry->stub_type == ppc_stub_long_branch
15765 || stub_entry->stub_type == ppc_stub_plt_branch)
15766 && (r_type == R_PPC64_ADDR14_BRTAKEN
15767 || r_type == R_PPC64_ADDR14_BRNTAKEN
15768 || (relocation + addend - from + max_br_offset
15769 < 2 * max_br_offset)))
15770 /* Don't use the stub if this branch is in range. */
15771 stub_entry = NULL;
b25116a9 15772
05d0e962
AM
15773 if (stub_entry != NULL
15774 && (stub_entry->stub_type == ppc_stub_long_branch_notoc
15775 || stub_entry->stub_type == ppc_stub_long_branch_both
15776 || stub_entry->stub_type == ppc_stub_plt_branch_notoc
15777 || stub_entry->stub_type == ppc_stub_plt_branch_both)
15778 && (r_type != R_PPC64_REL24_NOTOC
15779 || ((fdh ? fdh->elf.other : sym->st_other)
4a4e7361 15780 & STO_PPC64_LOCAL_MASK) <= 1 << STO_PPC64_LOCAL_BIT)
05d0e962
AM
15781 && (relocation + addend - from + max_br_offset
15782 < 2 * max_br_offset))
15783 stub_entry = NULL;
15784
15785 if (stub_entry != NULL
15786 && (stub_entry->stub_type == ppc_stub_long_branch_r2off
15787 || stub_entry->stub_type == ppc_stub_long_branch_both
15788 || stub_entry->stub_type == ppc_stub_plt_branch_r2off
15789 || stub_entry->stub_type == ppc_stub_plt_branch_both)
15790 && r_type == R_PPC64_REL24_NOTOC
15791 && (relocation + addend - from + max_br_offset
15792 < 2 * max_br_offset))
15793 stub_entry = NULL;
15794
b25116a9
AM
15795 if (stub_entry != NULL)
15796 {
15797 /* Munge up the value and addend so that we call the stub
15798 rather than the procedure directly. */
a4b6fadd
AM
15799 asection *stub_sec = stub_entry->group->stub_sec;
15800
15801 if (stub_entry->stub_type == ppc_stub_save_res)
15802 relocation += (stub_sec->output_offset
15803 + stub_sec->output_section->vma
15804 + stub_sec->size - htab->sfpr->size
15805 - htab->sfpr->output_offset
15806 - htab->sfpr->output_section->vma);
15807 else
15808 relocation = (stub_entry->stub_offset
15809 + stub_sec->output_offset
15810 + stub_sec->output_section->vma);
b25116a9 15811 addend = 0;
bc30df16 15812 reloc_dest = DEST_STUB;
3b421ab3 15813
05d0e962
AM
15814 if (((stub_entry->stub_type == ppc_stub_plt_call
15815 && ALWAYS_EMIT_R2SAVE)
15816 || stub_entry->stub_type == ppc_stub_plt_call_r2save
15817 || stub_entry->stub_type == ppc_stub_plt_call_both)
e81b4c93 15818 && !(h != NULL
ed7007c1 15819 && is_tls_get_addr (&h->elf, htab)
e81b4c93 15820 && htab->params->tls_get_addr_opt)
3b421ab3
AM
15821 && rel + 1 < relend
15822 && rel[1].r_offset == rel->r_offset + 4
15823 && ELF64_R_TYPE (rel[1].r_info) == R_PPC64_TOCSAVE)
15824 relocation += 4;
05d0e962
AM
15825 else if ((stub_entry->stub_type == ppc_stub_long_branch_both
15826 || stub_entry->stub_type == ppc_stub_plt_branch_both
15827 || stub_entry->stub_type == ppc_stub_plt_call_both)
15828 && r_type == R_PPC64_REL24_NOTOC)
15829 relocation += 4;
5663e321
AM
15830
15831 if (r_type == R_PPC64_REL24_NOTOC
15832 && (stub_entry->stub_type == ppc_stub_plt_call_notoc
15833 || stub_entry->stub_type == ppc_stub_plt_call_both))
15834 htab->notoc_plt = 1;
b25116a9
AM
15835 }
15836
15837 if (insn != 0)
15838 {
794e51c0 15839 if (is_isa_v2)
721956f4 15840 {
b25116a9
AM
15841 /* Set 'a' bit. This is 0b00010 in BO field for branch
15842 on CR(BI) insns (BO == 001at or 011at), and 0b01000
15843 for branch on CTR insns (BO == 1a00t or 1a01t). */
15844 if ((insn & (0x14 << 21)) == (0x04 << 21))
15845 insn |= 0x02 << 21;
15846 else if ((insn & (0x14 << 21)) == (0x10 << 21))
15847 insn |= 0x08 << 21;
15848 else
15849 break;
15850 }
15851 else
15852 {
15853 /* Invert 'y' bit if not the default. */
4cc603a5 15854 if ((bfd_signed_vma) (relocation + addend - from) < 0)
b25116a9 15855 insn ^= 0x01 << 21;
721956f4 15856 }
b25116a9 15857
95f0d0d2 15858 bfd_put_32 (input_bfd, insn, contents + rel->r_offset);
5bd4f169 15859 }
e86ce104 15860
06da1e8e
AM
15861 /* NOP out calls to undefined weak functions.
15862 We can thus call a weak function without first
15863 checking whether the function is defined. */
b25116a9 15864 else if (h != NULL
039b3fef 15865 && h->elf.root.type == bfd_link_hash_undefweak
766bc656 15866 && h->elf.dynindx == -1
05d0e962
AM
15867 && (r_type == R_PPC64_REL24
15868 || r_type == R_PPC64_REL24_NOTOC)
b25116a9 15869 && relocation == 0
4cc603a5 15870 && addend == 0)
e86ce104 15871 {
95f0d0d2 15872 bfd_put_32 (input_bfd, NOP, contents + rel->r_offset);
c316a17c 15873 goto copy_reloc;
e86ce104 15874 }
65f38f15 15875 break;
066f4018
AM
15876
15877 case R_PPC64_GOT16_DS:
06507dab
AM
15878 if ((h ? h->elf.type : ELF_ST_TYPE (sym->st_info)) == STT_GNU_IFUNC)
15879 break;
066f4018
AM
15880 from = TOCstart + htab->sec_info[input_section->id].toc_off;
15881 if (relocation + addend - from + 0x8000 < 0x10000
15882 && SYMBOL_REFERENCES_LOCAL (info, &h->elf))
15883 {
15884 insn = bfd_get_32 (input_bfd, contents + (rel->r_offset & ~3));
2365f8d7 15885 if ((insn & (0x3fu << 26 | 0x3)) == 58u << 26 /* ld */)
066f4018
AM
15886 {
15887 insn += (14u << 26) - (58u << 26);
15888 bfd_put_32 (input_bfd, insn, contents + (rel->r_offset & ~3));
15889 r_type = R_PPC64_TOC16;
15890 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
15891 }
15892 }
15893 break;
15894
15895 case R_PPC64_GOT16_LO_DS:
15896 case R_PPC64_GOT16_HA:
06507dab
AM
15897 if ((h ? h->elf.type : ELF_ST_TYPE (sym->st_info)) == STT_GNU_IFUNC)
15898 break;
066f4018
AM
15899 from = TOCstart + htab->sec_info[input_section->id].toc_off;
15900 if (relocation + addend - from + 0x80008000ULL < 0x100000000ULL
15901 && SYMBOL_REFERENCES_LOCAL (info, &h->elf))
15902 {
15903 insn = bfd_get_32 (input_bfd, contents + (rel->r_offset & ~3));
2365f8d7 15904 if ((insn & (0x3fu << 26 | 0x3)) == 58u << 26 /* ld */)
066f4018
AM
15905 {
15906 insn += (14u << 26) - (58u << 26);
15907 bfd_put_32 (input_bfd, insn, contents + (rel->r_offset & ~3));
15908 r_type = R_PPC64_TOC16_LO;
15909 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
15910 }
2365f8d7 15911 else if ((insn & (0x3fu << 26)) == 15u << 26 /* addis */)
066f4018
AM
15912 {
15913 r_type = R_PPC64_TOC16_HA;
15914 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
15915 }
15916 }
15917 break;
4a421c53
AM
15918
15919 case R_PPC64_GOT_PCREL34:
06507dab
AM
15920 if ((h ? h->elf.type : ELF_ST_TYPE (sym->st_info)) == STT_GNU_IFUNC)
15921 break;
4a421c53
AM
15922 from = (rel->r_offset
15923 + input_section->output_section->vma
15924 + input_section->output_offset);
15925 if (relocation - from + (1ULL << 33) < 1ULL << 34
15926 && SYMBOL_REFERENCES_LOCAL (info, &h->elf))
15927 {
15928 offset = rel->r_offset;
15929 pinsn = bfd_get_32 (input_bfd, contents + offset);
15930 pinsn <<= 32;
15931 pinsn |= bfd_get_32 (input_bfd, contents + offset + 4);
15932 if ((pinsn & ((-1ULL << 50) | (63ULL << 26)))
15933 == ((1ULL << 58) | (1ULL << 52) | (57ULL << 26) /* pld */))
15934 {
15935 /* Replace with paddi. */
15936 pinsn += (2ULL << 56) + (14ULL << 26) - (57ULL << 26);
15937 r_type = R_PPC64_PCREL34;
15938 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
15939 bfd_put_32 (input_bfd, pinsn >> 32, contents + offset);
15940 bfd_put_32 (input_bfd, pinsn, contents + offset + 4);
15941 goto pcrelopt;
15942 }
15943 }
15944 break;
15945
15946 case R_PPC64_PCREL34:
15947 if (SYMBOL_REFERENCES_LOCAL (info, &h->elf))
15948 {
15949 offset = rel->r_offset;
15950 pinsn = bfd_get_32 (input_bfd, contents + offset);
15951 pinsn <<= 32;
15952 pinsn |= bfd_get_32 (input_bfd, contents + offset + 4);
15953 if ((pinsn & ((-1ULL << 50) | (63ULL << 26)))
15954 == ((1ULL << 58) | (2ULL << 56) | (1ULL << 52)
15955 | (14ULL << 26) /* paddi */))
15956 {
15957 pcrelopt:
15958 if (rel + 1 < relend
15959 && rel[1].r_offset == offset
15960 && rel[1].r_info == ELF64_R_INFO (0, R_PPC64_PCREL_OPT))
15961 {
15962 bfd_vma off2 = rel[1].r_addend;
15963 if (off2 == 0)
15964 /* zero means next insn. */
15965 off2 = 8;
15966 off2 += offset;
15967 if (off2 + 4 <= input_section->size)
15968 {
15969 uint64_t pinsn2;
dd9b12c2 15970 bfd_signed_vma addend_off;
4a421c53
AM
15971 pinsn2 = bfd_get_32 (input_bfd, contents + off2);
15972 pinsn2 <<= 32;
15973 if ((pinsn2 & (63ULL << 58)) == 1ULL << 58)
77486630
AM
15974 {
15975 if (off2 + 8 > input_section->size)
15976 break;
15977 pinsn2 |= bfd_get_32 (input_bfd,
15978 contents + off2 + 4);
15979 }
dd9b12c2 15980 if (xlate_pcrel_opt (&pinsn, &pinsn2, &addend_off))
4a421c53 15981 {
dd9b12c2
AM
15982 addend += addend_off;
15983 rel->r_addend = addend;
4a421c53
AM
15984 bfd_put_32 (input_bfd, pinsn >> 32,
15985 contents + offset);
15986 bfd_put_32 (input_bfd, pinsn,
15987 contents + offset + 4);
15988 bfd_put_32 (input_bfd, pinsn2 >> 32,
15989 contents + off2);
77486630
AM
15990 if ((pinsn2 & (63ULL << 58)) == 1ULL << 58)
15991 bfd_put_32 (input_bfd, pinsn2,
15992 contents + off2 + 4);
4a421c53
AM
15993 }
15994 }
15995 }
15996 }
15997 }
15998 break;
65f38f15 15999 }
5bd4f169 16000
411e1bfb 16001 tls_type = 0;
23cedd1d 16002 save_unresolved_reloc = unresolved_reloc;
65f38f15
AM
16003 switch (r_type)
16004 {
16005 default:
cf97bcb0
AM
16006 /* xgettext:c-format */
16007 _bfd_error_handler (_("%pB: %s unsupported"),
16008 input_bfd, ppc64_elf_howto_table[r_type]->name);
5bd4f169 16009
65f38f15 16010 bfd_set_error (bfd_error_bad_value);
b34976b6 16011 ret = FALSE;
c316a17c 16012 goto copy_reloc;
5bd4f169 16013
65f38f15 16014 case R_PPC64_NONE:
411e1bfb 16015 case R_PPC64_TLS:
727fc41e
AM
16016 case R_PPC64_TLSGD:
16017 case R_PPC64_TLSLD:
3b421ab3 16018 case R_PPC64_TOCSAVE:
04c9666a
AM
16019 case R_PPC64_GNU_VTINHERIT:
16020 case R_PPC64_GNU_VTENTRY:
006589cf 16021 case R_PPC64_ENTRY:
4a421c53 16022 case R_PPC64_PCREL_OPT:
c316a17c 16023 goto copy_reloc;
5bd4f169
AM
16024
16025 /* GOT16 relocations. Like an ADDR16 using the symbol's
16026 address in the GOT as relocation value instead of the
411e1bfb 16027 symbol's value itself. Also, create a GOT entry for the
5bd4f169 16028 symbol and put the symbol value there. */
411e1bfb
AM
16029 case R_PPC64_GOT_TLSGD16:
16030 case R_PPC64_GOT_TLSGD16_LO:
16031 case R_PPC64_GOT_TLSGD16_HI:
16032 case R_PPC64_GOT_TLSGD16_HA:
c213164a 16033 case R_PPC64_GOT_TLSGD34:
951fd09b 16034 tls_type = TLS_TLS | TLS_GD;
411e1bfb
AM
16035 goto dogot;
16036
16037 case R_PPC64_GOT_TLSLD16:
16038 case R_PPC64_GOT_TLSLD16_LO:
16039 case R_PPC64_GOT_TLSLD16_HI:
16040 case R_PPC64_GOT_TLSLD16_HA:
c213164a 16041 case R_PPC64_GOT_TLSLD34:
951fd09b 16042 tls_type = TLS_TLS | TLS_LD;
411e1bfb
AM
16043 goto dogot;
16044
16045 case R_PPC64_GOT_TPREL16_DS:
16046 case R_PPC64_GOT_TPREL16_LO_DS:
16047 case R_PPC64_GOT_TPREL16_HI:
16048 case R_PPC64_GOT_TPREL16_HA:
c213164a 16049 case R_PPC64_GOT_TPREL34:
411e1bfb
AM
16050 tls_type = TLS_TLS | TLS_TPREL;
16051 goto dogot;
16052
16053 case R_PPC64_GOT_DTPREL16_DS:
16054 case R_PPC64_GOT_DTPREL16_LO_DS:
16055 case R_PPC64_GOT_DTPREL16_HI:
16056 case R_PPC64_GOT_DTPREL16_HA:
c213164a 16057 case R_PPC64_GOT_DTPREL34:
411e1bfb
AM
16058 tls_type = TLS_TLS | TLS_DTPREL;
16059 goto dogot;
16060
65f38f15
AM
16061 case R_PPC64_GOT16:
16062 case R_PPC64_GOT16_LO:
16063 case R_PPC64_GOT16_HI:
16064 case R_PPC64_GOT16_HA:
16065 case R_PPC64_GOT16_DS:
16066 case R_PPC64_GOT16_LO_DS:
5663e321 16067 case R_PPC64_GOT_PCREL34:
411e1bfb 16068 dogot:
5bd4f169
AM
16069 {
16070 /* Relocation is to the entry for this symbol in the global
16071 offset table. */
e717da7e 16072 asection *got;
d881513a 16073 bfd_vma *offp;
5bd4f169 16074 bfd_vma off;
d881513a 16075 unsigned long indx = 0;
927be08e 16076 struct got_entry *ent;
65f38f15 16077
d881513a 16078 if (tls_type == (TLS_TLS | TLS_LD)
f749f26e 16079 && SYMBOL_REFERENCES_LOCAL (info, &h->elf))
927be08e 16080 ent = ppc64_tlsld_got (input_bfd);
411e1bfb 16081 else
5bd4f169 16082 {
d881513a
AM
16083 if (h != NULL)
16084 {
f0158f44
AM
16085 if (!htab->elf.dynamic_sections_created
16086 || h->elf.dynindx == -1
16087 || SYMBOL_REFERENCES_LOCAL (info, &h->elf)
21d68fcd 16088 || UNDEFWEAK_NO_DYNAMIC_RELOC (info, &h->elf))
d881513a
AM
16089 /* This is actually a static link, or it is a
16090 -Bsymbolic link and the symbol is defined
16091 locally, or the symbol was forced to be local
16092 because of a version file. */
16093 ;
16094 else
16095 {
039b3fef 16096 indx = h->elf.dynindx;
d881513a
AM
16097 unresolved_reloc = FALSE;
16098 }
039b3fef 16099 ent = h->elf.got.glist;
d881513a 16100 }
411e1bfb 16101 else
5bd4f169 16102 {
d881513a
AM
16103 if (local_got_ents == NULL)
16104 abort ();
16105 ent = local_got_ents[r_symndx];
5bd4f169 16106 }
d881513a
AM
16107
16108 for (; ent != NULL; ent = ent->next)
133a1f60 16109 if (ent->addend == orig_rel.r_addend
e717da7e 16110 && ent->owner == input_bfd
d881513a
AM
16111 && ent->tls_type == tls_type)
16112 break;
5bd4f169 16113 }
411e1bfb 16114
927be08e
AM
16115 if (ent == NULL)
16116 abort ();
16117 if (ent->is_indirect)
16118 ent = ent->got.ent;
16119 offp = &ent->got.offset;
16120 got = ppc64_elf_tdata (ent->owner)->got;
e717da7e
AM
16121 if (got == NULL)
16122 abort ();
16123
411e1bfb
AM
16124 /* The offset must always be a multiple of 8. We use the
16125 least significant bit to record whether we have already
16126 processed this entry. */
d881513a 16127 off = *offp;
411e1bfb
AM
16128 if ((off & 1) != 0)
16129 off &= ~1;
5bd4f169
AM
16130 else
16131 {
411e1bfb
AM
16132 /* Generate relocs for the dynamic linker, except in
16133 the case of TLSLD where we'll use one entry per
16134 module. */
25f23106
AM
16135 asection *relgot;
16136 bfd_boolean ifunc;
e717da7e 16137
d881513a 16138 *offp = off | 1;
25f23106
AM
16139 relgot = NULL;
16140 ifunc = (h != NULL
16141 ? h->elf.type == STT_GNU_IFUNC
16142 : ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC);
19e08130 16143 if (ifunc)
82e66161
AM
16144 {
16145 relgot = htab->elf.irelplt;
16146 if (indx == 0)
16147 htab->local_ifunc_resolver = 1;
16148 else if (is_static_defined (&h->elf))
16149 htab->maybe_local_ifunc_resolver = 1;
16150 }
f0158f44
AM
16151 else if (indx != 0
16152 || (bfd_link_pic (info)
16153 && (h == NULL
f749f26e
AM
16154 || !UNDEFWEAK_NO_DYNAMIC_RELOC (info, &h->elf))
16155 && !(tls_type != 0
f15d0b54
AM
16156 && bfd_link_executable (info)
16157 && SYMBOL_REFERENCES_LOCAL (info, &h->elf))))
19e08130 16158 relgot = ppc64_elf_tdata (ent->owner)->relgot;
25f23106 16159 if (relgot != NULL)
5bd4f169 16160 {
e717da7e
AM
16161 outrel.r_offset = (got->output_section->vma
16162 + got->output_offset
411e1bfb 16163 + off);
133a1f60 16164 outrel.r_addend = orig_rel.r_addend;
d881513a 16165 if (tls_type & (TLS_LD | TLS_GD))
5bd4f169 16166 {
411e1bfb 16167 outrel.r_addend = 0;
e515b051 16168 outrel.r_info = ELF64_R_INFO (indx, R_PPC64_DTPMOD64);
d881513a
AM
16169 if (tls_type == (TLS_TLS | TLS_GD))
16170 {
e717da7e
AM
16171 loc = relgot->contents;
16172 loc += (relgot->reloc_count++
d881513a
AM
16173 * sizeof (Elf64_External_Rela));
16174 bfd_elf64_swap_reloca_out (output_bfd,
16175 &outrel, loc);
e515b051 16176 outrel.r_offset += 8;
133a1f60 16177 outrel.r_addend = orig_rel.r_addend;
d881513a
AM
16178 outrel.r_info
16179 = ELF64_R_INFO (indx, R_PPC64_DTPREL64);
d881513a 16180 }
411e1bfb 16181 }
951fd09b 16182 else if (tls_type == (TLS_TLS | TLS_DTPREL))
411e1bfb 16183 outrel.r_info = ELF64_R_INFO (indx, R_PPC64_DTPREL64);
951fd09b 16184 else if (tls_type == (TLS_TLS | TLS_TPREL))
411e1bfb 16185 outrel.r_info = ELF64_R_INFO (indx, R_PPC64_TPREL64);
25f23106
AM
16186 else if (indx != 0)
16187 outrel.r_info = ELF64_R_INFO (indx, R_PPC64_GLOB_DAT);
16188 else
81407a69 16189 {
25f23106
AM
16190 if (ifunc)
16191 outrel.r_info = ELF64_R_INFO (0, R_PPC64_IRELATIVE);
16192 else
16193 outrel.r_info = ELF64_R_INFO (0, R_PPC64_RELATIVE);
81407a69
AM
16194
16195 /* Write the .got section contents for the sake
16196 of prelink. */
e717da7e 16197 loc = got->contents + off;
23fbd6fa
JJ
16198 bfd_put_64 (output_bfd, outrel.r_addend + relocation,
16199 loc);
81407a69 16200 }
81407a69
AM
16201
16202 if (indx == 0 && tls_type != (TLS_TLS | TLS_LD))
e515b051
AM
16203 {
16204 outrel.r_addend += relocation;
16205 if (tls_type & (TLS_GD | TLS_DTPREL | TLS_TPREL))
989f9879
AM
16206 {
16207 if (htab->elf.tls_sec == NULL)
16208 outrel.r_addend = 0;
16209 else
16210 outrel.r_addend -= htab->elf.tls_sec->vma;
16211 }
e515b051 16212 }
e717da7e
AM
16213 loc = relgot->contents;
16214 loc += (relgot->reloc_count++
411e1bfb
AM
16215 * sizeof (Elf64_External_Rela));
16216 bfd_elf64_swap_reloca_out (output_bfd, &outrel, loc);
16217 }
16218
ad8e1ba5 16219 /* Init the .got section contents here if we're not
81407a69 16220 emitting a reloc. */
d881513a 16221 else
411e1bfb 16222 {
133a1f60 16223 relocation += orig_rel.r_addend;
f0158f44 16224 if (tls_type != 0)
411e1bfb 16225 {
989f9879
AM
16226 if (htab->elf.tls_sec == NULL)
16227 relocation = 0;
16228 else
16229 {
f0158f44
AM
16230 if (tls_type & TLS_LD)
16231 relocation = 0;
16232 else
16233 relocation -= htab->elf.tls_sec->vma + DTP_OFFSET;
676ee2b5 16234 if (tls_type & TLS_TPREL)
989f9879
AM
16235 relocation += DTP_OFFSET - TP_OFFSET;
16236 }
5bd4f169 16237
f0158f44 16238 if (tls_type & (TLS_GD | TLS_LD))
7b609f53
AM
16239 {
16240 bfd_put_64 (output_bfd, relocation,
e717da7e 16241 got->contents + off + 8);
676ee2b5 16242 relocation = 1;
7b609f53 16243 }
411e1bfb
AM
16244 }
16245 bfd_put_64 (output_bfd, relocation,
e717da7e 16246 got->contents + off);
5bd4f169
AM
16247 }
16248 }
16249
65f38f15
AM
16250 if (off >= (bfd_vma) -2)
16251 abort ();
16252
bf102f86 16253 relocation = got->output_section->vma + got->output_offset + off;
133a1f60 16254 addend = 0;
c213164a
AM
16255 if (!(r_type == R_PPC64_GOT_PCREL34
16256 || r_type == R_PPC64_GOT_TLSGD34
16257 || r_type == R_PPC64_GOT_TLSLD34
16258 || r_type == R_PPC64_GOT_TPREL34
16259 || r_type == R_PPC64_GOT_DTPREL34))
5663e321 16260 addend = -(TOCstart + htab->sec_info[input_section->id].toc_off);
5bd4f169 16261 }
65f38f15
AM
16262 break;
16263
16264 case R_PPC64_PLT16_HA:
16265 case R_PPC64_PLT16_HI:
16266 case R_PPC64_PLT16_LO:
08be3224 16267 case R_PPC64_PLT16_LO_DS:
5663e321
AM
16268 case R_PPC64_PLT_PCREL34:
16269 case R_PPC64_PLT_PCREL34_NOTOC:
65f38f15
AM
16270 case R_PPC64_PLT32:
16271 case R_PPC64_PLT64:
23cedd1d 16272 case R_PPC64_PLTSEQ:
5663e321 16273 case R_PPC64_PLTSEQ_NOTOC:
23cedd1d 16274 case R_PPC64_PLTCALL:
5663e321 16275 case R_PPC64_PLTCALL_NOTOC:
65f38f15
AM
16276 /* Relocation is to the entry for this symbol in the
16277 procedure linkage table. */
23cedd1d 16278 unresolved_reloc = TRUE;
cbf95972
AM
16279 {
16280 struct plt_entry **plt_list = NULL;
16281 if (h != NULL)
16282 plt_list = &h->elf.plt.plist;
16283 else if (local_got_ents != NULL)
16284 {
16285 struct plt_entry **local_plt = (struct plt_entry **)
16286 (local_got_ents + symtab_hdr->sh_info);
2d7ad24e 16287 plt_list = local_plt + r_symndx;
cbf95972
AM
16288 }
16289 if (plt_list)
16290 {
16291 struct plt_entry *ent;
65f38f15 16292
cbf95972
AM
16293 for (ent = *plt_list; ent != NULL; ent = ent->next)
16294 if (ent->plt.offset != (bfd_vma) -1
133a1f60 16295 && ent->addend == orig_rel.r_addend)
cbf95972
AM
16296 {
16297 asection *plt;
08be3224 16298 bfd_vma got;
cbf95972
AM
16299
16300 plt = htab->elf.splt;
16301 if (!htab->elf.dynamic_sections_created
16302 || h == NULL
16303 || h->elf.dynindx == -1)
2d7ad24e
AM
16304 {
16305 if (h != NULL
16306 ? h->elf.type == STT_GNU_IFUNC
16307 : ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC)
16308 plt = htab->elf.iplt;
16309 else
16310 plt = htab->pltlocal;
16311 }
16312 relocation = (plt->output_section->vma
16313 + plt->output_offset
16314 + ent->plt.offset);
08be3224 16315 if (r_type == R_PPC64_PLT16_HA
2cdcc330
AM
16316 || r_type == R_PPC64_PLT16_HI
16317 || r_type == R_PPC64_PLT16_LO
16318 || r_type == R_PPC64_PLT16_LO_DS)
08be3224
AM
16319 {
16320 got = (elf_gp (output_bfd)
16321 + htab->sec_info[input_section->id].toc_off);
16322 relocation -= got;
16323 }
133a1f60 16324 addend = 0;
cbf95972
AM
16325 unresolved_reloc = FALSE;
16326 break;
16327 }
16328 }
16329 }
65f38f15 16330 break;
5bd4f169 16331
0b13192e
AM
16332 case R_PPC64_TOC:
16333 /* Relocation value is TOC base. */
16334 relocation = TOCstart;
cf35638d 16335 if (r_symndx == STN_UNDEF)
6f20ed8a 16336 relocation += htab->sec_info[input_section->id].toc_off;
8517fae7
AM
16337 else if (unresolved_reloc)
16338 ;
6f20ed8a
AM
16339 else if (sec != NULL && sec->id < htab->sec_info_arr_size)
16340 relocation += htab->sec_info[sec->id].toc_off;
0b13192e
AM
16341 else
16342 unresolved_reloc = TRUE;
ab96bf03 16343 goto dodyn;
0b13192e 16344
5bd4f169
AM
16345 /* TOC16 relocs. We want the offset relative to the TOC base,
16346 which is the address of the start of the TOC plus 0x8000.
16347 The TOC consists of sections .got, .toc, .tocbss, and .plt,
16348 in this order. */
65f38f15
AM
16349 case R_PPC64_TOC16:
16350 case R_PPC64_TOC16_LO:
16351 case R_PPC64_TOC16_HI:
16352 case R_PPC64_TOC16_DS:
16353 case R_PPC64_TOC16_LO_DS:
16354 case R_PPC64_TOC16_HA:
6f20ed8a 16355 addend -= TOCstart + htab->sec_info[input_section->id].toc_off;
1bdd8fac
AM
16356 if (h != NULL)
16357 goto dodyn;
5bd4f169
AM
16358 break;
16359
16360 /* Relocate against the beginning of the section. */
65f38f15
AM
16361 case R_PPC64_SECTOFF:
16362 case R_PPC64_SECTOFF_LO:
16363 case R_PPC64_SECTOFF_HI:
16364 case R_PPC64_SECTOFF_DS:
16365 case R_PPC64_SECTOFF_LO_DS:
16366 case R_PPC64_SECTOFF_HA:
4ce794b7 16367 if (sec != NULL)
65f38f15 16368 addend -= sec->output_section->vma;
5bd4f169
AM
16369 break;
16370
25f23106
AM
16371 case R_PPC64_REL16:
16372 case R_PPC64_REL16_LO:
16373 case R_PPC64_REL16_HI:
16374 case R_PPC64_REL16_HA:
4a969973
AM
16375 case R_PPC64_REL16_HIGH:
16376 case R_PPC64_REL16_HIGHA:
16377 case R_PPC64_REL16_HIGHER:
16378 case R_PPC64_REL16_HIGHERA:
16379 case R_PPC64_REL16_HIGHEST:
16380 case R_PPC64_REL16_HIGHESTA:
5663e321
AM
16381 case R_PPC64_REL16_HIGHER34:
16382 case R_PPC64_REL16_HIGHERA34:
16383 case R_PPC64_REL16_HIGHEST34:
16384 case R_PPC64_REL16_HIGHESTA34:
a680de9a 16385 case R_PPC64_REL16DX_HA:
721956f4
AM
16386 case R_PPC64_REL14:
16387 case R_PPC64_REL14_BRNTAKEN:
16388 case R_PPC64_REL14_BRTAKEN:
5d1634d7 16389 case R_PPC64_REL24:
05d0e962 16390 case R_PPC64_REL24_NOTOC:
5663e321
AM
16391 case R_PPC64_PCREL34:
16392 case R_PPC64_PCREL28:
5d1634d7
AM
16393 break;
16394
411e1bfb
AM
16395 case R_PPC64_TPREL16:
16396 case R_PPC64_TPREL16_LO:
16397 case R_PPC64_TPREL16_HI:
16398 case R_PPC64_TPREL16_HA:
16399 case R_PPC64_TPREL16_DS:
16400 case R_PPC64_TPREL16_LO_DS:
f9c6b907
AM
16401 case R_PPC64_TPREL16_HIGH:
16402 case R_PPC64_TPREL16_HIGHA:
411e1bfb
AM
16403 case R_PPC64_TPREL16_HIGHER:
16404 case R_PPC64_TPREL16_HIGHERA:
16405 case R_PPC64_TPREL16_HIGHEST:
16406 case R_PPC64_TPREL16_HIGHESTA:
c213164a 16407 case R_PPC64_TPREL34:
766bc656
AM
16408 if (h != NULL
16409 && h->elf.root.type == bfd_link_hash_undefweak
16410 && h->elf.dynindx == -1)
16411 {
16412 /* Make this relocation against an undefined weak symbol
16413 resolve to zero. This is really just a tweak, since
16414 code using weak externs ought to check that they are
16415 defined before using them. */
16416 bfd_byte *p = contents + rel->r_offset - d_offset;
16417
95f0d0d2 16418 insn = bfd_get_32 (input_bfd, p);
766bc656
AM
16419 insn = _bfd_elf_ppc_at_tprel_transform (insn, 13);
16420 if (insn != 0)
95f0d0d2 16421 bfd_put_32 (input_bfd, insn, p);
766bc656
AM
16422 break;
16423 }
989f9879
AM
16424 if (htab->elf.tls_sec != NULL)
16425 addend -= htab->elf.tls_sec->vma + TP_OFFSET;
7c8bbca5
AM
16426 /* The TPREL16 relocs shouldn't really be used in shared
16427 libs or with non-local symbols as that will result in
16428 DT_TEXTREL being set, but support them anyway. */
16429 goto dodyn;
411e1bfb
AM
16430
16431 case R_PPC64_DTPREL16:
16432 case R_PPC64_DTPREL16_LO:
16433 case R_PPC64_DTPREL16_HI:
16434 case R_PPC64_DTPREL16_HA:
16435 case R_PPC64_DTPREL16_DS:
16436 case R_PPC64_DTPREL16_LO_DS:
f9c6b907
AM
16437 case R_PPC64_DTPREL16_HIGH:
16438 case R_PPC64_DTPREL16_HIGHA:
411e1bfb
AM
16439 case R_PPC64_DTPREL16_HIGHER:
16440 case R_PPC64_DTPREL16_HIGHERA:
16441 case R_PPC64_DTPREL16_HIGHEST:
16442 case R_PPC64_DTPREL16_HIGHESTA:
c213164a 16443 case R_PPC64_DTPREL34:
989f9879
AM
16444 if (htab->elf.tls_sec != NULL)
16445 addend -= htab->elf.tls_sec->vma + DTP_OFFSET;
411e1bfb
AM
16446 break;
16447
45965137
AM
16448 case R_PPC64_ADDR64_LOCAL:
16449 addend += PPC64_LOCAL_ENTRY_OFFSET (h != NULL
16450 ? h->elf.other
16451 : sym->st_other);
16452 break;
16453
e515b051
AM
16454 case R_PPC64_DTPMOD64:
16455 relocation = 1;
16456 addend = 0;
16457 goto dodyn;
16458
411e1bfb 16459 case R_PPC64_TPREL64:
989f9879
AM
16460 if (htab->elf.tls_sec != NULL)
16461 addend -= htab->elf.tls_sec->vma + TP_OFFSET;
411e1bfb
AM
16462 goto dodyn;
16463
16464 case R_PPC64_DTPREL64:
989f9879
AM
16465 if (htab->elf.tls_sec != NULL)
16466 addend -= htab->elf.tls_sec->vma + DTP_OFFSET;
1a0670f3 16467 /* Fall through. */
411e1bfb 16468
65f38f15
AM
16469 /* Relocations that may need to be propagated if this is a
16470 dynamic object. */
04c9666a 16471 case R_PPC64_REL30:
65f38f15
AM
16472 case R_PPC64_REL32:
16473 case R_PPC64_REL64:
16474 case R_PPC64_ADDR14:
16475 case R_PPC64_ADDR14_BRNTAKEN:
16476 case R_PPC64_ADDR14_BRTAKEN:
16477 case R_PPC64_ADDR16:
16478 case R_PPC64_ADDR16_DS:
16479 case R_PPC64_ADDR16_HA:
16480 case R_PPC64_ADDR16_HI:
f9c6b907
AM
16481 case R_PPC64_ADDR16_HIGH:
16482 case R_PPC64_ADDR16_HIGHA:
65f38f15
AM
16483 case R_PPC64_ADDR16_HIGHER:
16484 case R_PPC64_ADDR16_HIGHERA:
16485 case R_PPC64_ADDR16_HIGHEST:
16486 case R_PPC64_ADDR16_HIGHESTA:
16487 case R_PPC64_ADDR16_LO:
16488 case R_PPC64_ADDR16_LO_DS:
5663e321
AM
16489 case R_PPC64_ADDR16_HIGHER34:
16490 case R_PPC64_ADDR16_HIGHERA34:
16491 case R_PPC64_ADDR16_HIGHEST34:
16492 case R_PPC64_ADDR16_HIGHESTA34:
65f38f15 16493 case R_PPC64_ADDR24:
65f38f15
AM
16494 case R_PPC64_ADDR32:
16495 case R_PPC64_ADDR64:
16496 case R_PPC64_UADDR16:
16497 case R_PPC64_UADDR32:
16498 case R_PPC64_UADDR64:
5663e321
AM
16499 case R_PPC64_D34:
16500 case R_PPC64_D34_LO:
16501 case R_PPC64_D34_HI30:
16502 case R_PPC64_D34_HA30:
16503 case R_PPC64_D28:
411e1bfb 16504 dodyn:
5d1634d7 16505 if ((input_section->flags & SEC_ALLOC) == 0)
ec338859
AM
16506 break;
16507
41bd81ab
AM
16508 if (NO_OPD_RELOCS && is_opd)
16509 break;
16510
8a9e8e72 16511 if (bfd_link_pic (info)
b1b07054
AM
16512 ? ((h == NULL
16513 || h->dyn_relocs != NULL)
16514 && ((h != NULL && pc_dynrelocs (h))
16515 || must_be_dyn_reloc (info, r_type)))
8a9e8e72
AM
16516 : (h != NULL
16517 ? h->dyn_relocs != NULL
d311bc8b 16518 : ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC))
65f38f15 16519 {
b34976b6 16520 bfd_boolean skip, relocate;
65f38f15 16521 asection *sreloc;
1cf1f670 16522 bfd_vma out_off;
82e66161 16523 long indx = 0;
65f38f15
AM
16524
16525 /* When generating a dynamic object, these relocations
16526 are copied into the output file to be resolved at run
16527 time. */
16528
b34976b6
AM
16529 skip = FALSE;
16530 relocate = FALSE;
65f38f15 16531
1cf1f670
AM
16532 out_off = _bfd_elf_section_offset (output_bfd, info,
16533 input_section, rel->r_offset);
16534 if (out_off == (bfd_vma) -1)
b34976b6 16535 skip = TRUE;
1cf1f670 16536 else if (out_off == (bfd_vma) -2)
b34976b6 16537 skip = TRUE, relocate = TRUE;
1cf1f670
AM
16538 out_off += (input_section->output_section->vma
16539 + input_section->output_offset);
16540 outrel.r_offset = out_off;
411e1bfb 16541 outrel.r_addend = rel->r_addend;
65f38f15 16542
1cf1f670
AM
16543 /* Optimize unaligned reloc use. */
16544 if ((r_type == R_PPC64_ADDR64 && (out_off & 7) != 0)
16545 || (r_type == R_PPC64_UADDR64 && (out_off & 7) == 0))
16546 r_type ^= R_PPC64_ADDR64 ^ R_PPC64_UADDR64;
16547 else if ((r_type == R_PPC64_ADDR32 && (out_off & 3) != 0)
16548 || (r_type == R_PPC64_UADDR32 && (out_off & 3) == 0))
16549 r_type ^= R_PPC64_ADDR32 ^ R_PPC64_UADDR32;
16550 else if ((r_type == R_PPC64_ADDR16 && (out_off & 1) != 0)
16551 || (r_type == R_PPC64_UADDR16 && (out_off & 1) == 0))
16552 r_type ^= R_PPC64_ADDR16 ^ R_PPC64_UADDR16;
16553
65f38f15 16554 if (skip)
0bb2d96a 16555 memset (&outrel, 0, sizeof outrel);
afe397ea 16556 else if (!SYMBOL_REFERENCES_LOCAL (info, &h->elf)
0b13192e
AM
16557 && !is_opd
16558 && r_type != R_PPC64_TOC)
14acf4dc 16559 {
82e66161
AM
16560 indx = h->elf.dynindx;
16561 BFD_ASSERT (indx != -1);
16562 outrel.r_info = ELF64_R_INFO (indx, r_type);
14acf4dc 16563 }
65f38f15
AM
16564 else
16565 {
41bd81ab
AM
16566 /* This symbol is local, or marked to become local,
16567 or this is an opd section reloc which must point
16568 at a local function. */
65f38f15 16569 outrel.r_addend += relocation;
e86ce104 16570 if (r_type == R_PPC64_ADDR64 || r_type == R_PPC64_TOC)
65f38f15 16571 {
3fad3c7c 16572 if (is_opd && h != NULL)
afbe61cf
AM
16573 {
16574 /* Lie about opd entries. This case occurs
16575 when building shared libraries and we
16576 reference a function in another shared
3fad3c7c
AM
16577 lib. The same thing happens for a weak
16578 definition in an application that's
16579 overridden by a strong definition in a
16580 shared lib. (I believe this is a generic
16581 bug in binutils handling of weak syms.)
16582 In these cases we won't use the opd
1e2f5b6e 16583 entry in this lib. */
b34976b6 16584 unresolved_reloc = FALSE;
afbe61cf 16585 }
25f23106
AM
16586 if (!is_opd
16587 && r_type == R_PPC64_ADDR64
16588 && (h != NULL
16589 ? h->elf.type == STT_GNU_IFUNC
16590 : ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC))
16591 outrel.r_info = ELF64_R_INFO (0, R_PPC64_IRELATIVE);
16592 else
16593 {
16594 outrel.r_info = ELF64_R_INFO (0, R_PPC64_RELATIVE);
81407a69 16595
25f23106
AM
16596 /* We need to relocate .opd contents for ld.so.
16597 Prelink also wants simple and consistent rules
16598 for relocs. This make all RELATIVE relocs have
16599 *r_offset equal to r_addend. */
16600 relocate = TRUE;
16601 }
65f38f15
AM
16602 }
16603 else
16604 {
25f23106
AM
16605 if (h != NULL
16606 ? h->elf.type == STT_GNU_IFUNC
16607 : ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC)
16608 {
25f53a85 16609 info->callbacks->einfo
695344c0 16610 /* xgettext:c-format */
174d0a74 16611 (_("%H: %s for indirect "
c1c8c1ef 16612 "function `%pT' unsupported\n"),
25f53a85 16613 input_bfd, input_section, rel->r_offset,
25f23106
AM
16614 ppc64_elf_howto_table[r_type]->name,
16615 sym_name);
16616 ret = FALSE;
16617 }
cf35638d 16618 else if (r_symndx == STN_UNDEF || bfd_is_abs_section (sec))
65f38f15
AM
16619 ;
16620 else if (sec == NULL || sec->owner == NULL)
16621 {
16622 bfd_set_error (bfd_error_bad_value);
b34976b6 16623 return FALSE;
65f38f15
AM
16624 }
16625 else
16626 {
f26a3287 16627 asection *osec = sec->output_section;
65f38f15 16628
f26a3287
AM
16629 if ((osec->flags & SEC_THREAD_LOCAL) != 0)
16630 {
16631 /* TLS symbol values are relative to the
16632 TLS segment. Dynamic relocations for
16633 local TLS symbols therefore can't be
16634 reduced to a relocation against their
16635 section symbol because it holds the
16636 address of the section, not a value
16637 relative to the TLS segment. We could
16638 change the .tdata dynamic section symbol
16639 to be zero value but STN_UNDEF works
16640 and is used elsewhere, eg. for TPREL64
16641 GOT relocs against local TLS symbols. */
16642 osec = htab->elf.tls_sec;
16643 indx = 0;
16644 }
16645 else
74541ad4 16646 {
74541ad4 16647 indx = elf_section_data (osec)->dynindx;
f26a3287
AM
16648 if (indx == 0)
16649 {
16650 if ((osec->flags & SEC_READONLY) == 0
16651 && htab->elf.data_index_section != NULL)
16652 osec = htab->elf.data_index_section;
16653 else
16654 osec = htab->elf.text_index_section;
16655 indx = elf_section_data (osec)->dynindx;
16656 }
16657 BFD_ASSERT (indx != 0);
74541ad4 16658 }
74541ad4 16659
65f38f15
AM
16660 /* We are turning this relocation into one
16661 against a section symbol, so subtract out
16662 the output section's address but not the
16663 offset of the input section in the output
16664 section. */
16665 outrel.r_addend -= osec->vma;
16666 }
16667
16668 outrel.r_info = ELF64_R_INFO (indx, r_type);
16669 }
16670 }
16671
16672 sreloc = elf_section_data (input_section)->sreloc;
19e08130
AM
16673 if (h != NULL
16674 ? h->elf.type == STT_GNU_IFUNC
16675 : ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC)
82e66161
AM
16676 {
16677 sreloc = htab->elf.irelplt;
16678 if (indx == 0)
16679 htab->local_ifunc_resolver = 1;
16680 else if (is_static_defined (&h->elf))
16681 htab->maybe_local_ifunc_resolver = 1;
16682 }
65f38f15
AM
16683 if (sreloc == NULL)
16684 abort ();
16685
dfbb6ac9
AM
16686 if (sreloc->reloc_count * sizeof (Elf64_External_Rela)
16687 >= sreloc->size)
16688 abort ();
947216bf
AM
16689 loc = sreloc->contents;
16690 loc += sreloc->reloc_count++ * sizeof (Elf64_External_Rela);
65f38f15
AM
16691 bfd_elf64_swap_reloca_out (output_bfd, &outrel, loc);
16692
e59a1001
AM
16693 if (!warned_dynamic
16694 && !ppc64_glibc_dynamic_reloc (ELF64_R_TYPE (outrel.r_info)))
16695 {
16696 info->callbacks->einfo
16697 /* xgettext:c-format */
16698 (_("%X%P: %pB: %s against %pT "
16699 "is not supported by glibc as a dynamic relocation\n"),
16700 input_bfd,
16701 ppc64_elf_howto_table[ELF64_R_TYPE (outrel.r_info)]->name,
16702 sym_name);
16703 warned_dynamic = TRUE;
16704 }
16705
65f38f15
AM
16706 /* If this reloc is against an external symbol, it will
16707 be computed at runtime, so there's no need to do
81407a69
AM
16708 anything now. However, for the sake of prelink ensure
16709 that the section contents are a known value. */
2cdcc330 16710 if (!relocate)
81407a69
AM
16711 {
16712 unresolved_reloc = FALSE;
16713 /* The value chosen here is quite arbitrary as ld.so
16714 ignores section contents except for the special
16715 case of .opd where the contents might be accessed
16716 before relocation. Choose zero, as that won't
16717 cause reloc overflow. */
16718 relocation = 0;
16719 addend = 0;
16720 /* Use *r_offset == r_addend for R_PPC64_ADDR64 relocs
16721 to improve backward compatibility with older
16722 versions of ld. */
16723 if (r_type == R_PPC64_ADDR64)
16724 addend = outrel.r_addend;
16725 /* Adjust pc_relative relocs to have zero in *r_offset. */
4ce794b7 16726 else if (ppc64_elf_howto_table[r_type]->pc_relative)
f0158f44 16727 addend = outrel.r_offset;
81407a69 16728 }
65f38f15 16729 }
5bd4f169
AM
16730 break;
16731
65f38f15
AM
16732 case R_PPC64_COPY:
16733 case R_PPC64_GLOB_DAT:
16734 case R_PPC64_JMP_SLOT:
25f23106 16735 case R_PPC64_JMP_IREL:
65f38f15
AM
16736 case R_PPC64_RELATIVE:
16737 /* We shouldn't ever see these dynamic relocs in relocatable
16738 files. */
ae9a127f 16739 /* Fall through. */
65f38f15
AM
16740
16741 case R_PPC64_PLTGOT16:
16742 case R_PPC64_PLTGOT16_DS:
16743 case R_PPC64_PLTGOT16_HA:
16744 case R_PPC64_PLTGOT16_HI:
16745 case R_PPC64_PLTGOT16_LO:
16746 case R_PPC64_PLTGOT16_LO_DS:
16747 case R_PPC64_PLTREL32:
16748 case R_PPC64_PLTREL64:
16749 /* These ones haven't been implemented yet. */
16750
25f53a85 16751 info->callbacks->einfo
695344c0 16752 /* xgettext:c-format */
c1c8c1ef 16753 (_("%P: %pB: %s is not supported for `%pT'\n"),
d003868e 16754 input_bfd,
4ce794b7 16755 ppc64_elf_howto_table[r_type]->name, sym_name);
5bd4f169
AM
16756
16757 bfd_set_error (bfd_error_invalid_operation);
b34976b6 16758 ret = FALSE;
c316a17c 16759 goto copy_reloc;
65f38f15 16760 }
5bd4f169 16761
67f0cbdb
AM
16762 /* Multi-instruction sequences that access the TOC can be
16763 optimized, eg. addis ra,r2,0; addi rb,ra,x;
07d6d2b8 16764 to nop; addi rb,r2,x; */
67f0cbdb
AM
16765 switch (r_type)
16766 {
16767 default:
16768 break;
16769
16770 case R_PPC64_GOT_TLSLD16_HI:
16771 case R_PPC64_GOT_TLSGD16_HI:
16772 case R_PPC64_GOT_TPREL16_HI:
16773 case R_PPC64_GOT_DTPREL16_HI:
16774 case R_PPC64_GOT16_HI:
16775 case R_PPC64_TOC16_HI:
16776 /* These relocs would only be useful if building up an
16777 offset to later add to r2, perhaps in an indexed
16778 addressing mode instruction. Don't try to optimize.
16779 Unfortunately, the possibility of someone building up an
16780 offset like this or even with the HA relocs, means that
16781 we need to check the high insn when optimizing the low
16782 insn. */
16783 break;
16784
5663e321
AM
16785 case R_PPC64_PLTCALL_NOTOC:
16786 if (!unresolved_reloc)
16787 htab->notoc_plt = 1;
16788 /* Fall through. */
23cedd1d
AM
16789 case R_PPC64_PLTCALL:
16790 if (unresolved_reloc)
16791 {
16792 /* No plt entry. Make this into a direct call. */
16793 bfd_byte *p = contents + rel->r_offset;
16794 insn = bfd_get_32 (input_bfd, p);
16795 insn &= 1;
16796 bfd_put_32 (input_bfd, B_DOT | insn, p);
5663e321
AM
16797 if (r_type == R_PPC64_PLTCALL)
16798 bfd_put_32 (input_bfd, NOP, p + 4);
23cedd1d
AM
16799 unresolved_reloc = save_unresolved_reloc;
16800 r_type = R_PPC64_REL24;
16801 }
16802 break;
16803
5663e321 16804 case R_PPC64_PLTSEQ_NOTOC:
23cedd1d
AM
16805 case R_PPC64_PLTSEQ:
16806 if (unresolved_reloc)
16807 {
16808 unresolved_reloc = FALSE;
16809 goto nop_it;
16810 }
16811 break;
16812
5663e321
AM
16813 case R_PPC64_PLT_PCREL34_NOTOC:
16814 if (!unresolved_reloc)
16815 htab->notoc_plt = 1;
16816 /* Fall through. */
16817 case R_PPC64_PLT_PCREL34:
16818 if (unresolved_reloc)
16819 {
16820 bfd_byte *p = contents + rel->r_offset;
16821 bfd_put_32 (input_bfd, PNOP >> 32, p);
16822 bfd_put_32 (input_bfd, PNOP, p + 4);
16823 unresolved_reloc = FALSE;
16824 goto copy_reloc;
16825 }
16826 break;
16827
23cedd1d
AM
16828 case R_PPC64_PLT16_HA:
16829 if (unresolved_reloc)
16830 {
16831 unresolved_reloc = FALSE;
16832 goto nop_it;
16833 }
16834 /* Fall through. */
67f0cbdb
AM
16835 case R_PPC64_GOT_TLSLD16_HA:
16836 case R_PPC64_GOT_TLSGD16_HA:
16837 case R_PPC64_GOT_TPREL16_HA:
16838 case R_PPC64_GOT_DTPREL16_HA:
16839 case R_PPC64_GOT16_HA:
16840 case R_PPC64_TOC16_HA:
98528052 16841 if (htab->do_toc_opt && relocation + addend + 0x8000 < 0x10000
560c8763 16842 && !ppc64_elf_tdata (input_bfd)->unexpected_toc_insn)
98528052 16843 {
23cedd1d
AM
16844 bfd_byte *p;
16845 nop_it:
16846 p = contents + (rel->r_offset & ~3);
98528052 16847 bfd_put_32 (input_bfd, NOP, p);
d830549d 16848 goto copy_reloc;
98528052 16849 }
67f0cbdb
AM
16850 break;
16851
23cedd1d
AM
16852 case R_PPC64_PLT16_LO:
16853 case R_PPC64_PLT16_LO_DS:
16854 if (unresolved_reloc)
16855 {
16856 unresolved_reloc = FALSE;
16857 goto nop_it;
16858 }
16859 /* Fall through. */
67f0cbdb
AM
16860 case R_PPC64_GOT_TLSLD16_LO:
16861 case R_PPC64_GOT_TLSGD16_LO:
16862 case R_PPC64_GOT_TPREL16_LO_DS:
16863 case R_PPC64_GOT_DTPREL16_LO_DS:
16864 case R_PPC64_GOT16_LO:
16865 case R_PPC64_GOT16_LO_DS:
16866 case R_PPC64_TOC16_LO:
16867 case R_PPC64_TOC16_LO_DS:
98528052 16868 if (htab->do_toc_opt && relocation + addend + 0x8000 < 0x10000
560c8763 16869 && !ppc64_elf_tdata (input_bfd)->unexpected_toc_insn)
67f0cbdb
AM
16870 {
16871 bfd_byte *p = contents + (rel->r_offset & ~3);
16872 insn = bfd_get_32 (input_bfd, p);
2365f8d7 16873 if ((insn & (0x3fu << 26)) == 12u << 26 /* addic */)
560c8763
AM
16874 {
16875 /* Transform addic to addi when we change reg. */
2365f8d7 16876 insn &= ~((0x3fu << 26) | (0x1f << 16));
560c8763
AM
16877 insn |= (14u << 26) | (2 << 16);
16878 }
16879 else
67f0cbdb 16880 {
98528052
AM
16881 insn &= ~(0x1f << 16);
16882 insn |= 2 << 16;
67f0cbdb 16883 }
560c8763 16884 bfd_put_32 (input_bfd, insn, p);
67f0cbdb
AM
16885 }
16886 break;
9a23f96e
AM
16887
16888 case R_PPC64_TPREL16_HA:
16889 if (htab->do_tls_opt && relocation + addend + 0x8000 < 0x10000)
16890 {
16891 bfd_byte *p = contents + (rel->r_offset & ~3);
16892 insn = bfd_get_32 (input_bfd, p);
2365f8d7 16893 if ((insn & ((0x3fu << 26) | 0x1f << 16))
9a23f96e
AM
16894 != ((15u << 26) | (13 << 16)) /* addis rt,13,imm */)
16895 /* xgettext:c-format */
16896 info->callbacks->minfo
16897 (_("%H: warning: %s unexpected insn %#x.\n"),
d830549d
AM
16898 input_bfd, input_section, rel->r_offset,
16899 ppc64_elf_howto_table[r_type]->name, insn);
9a23f96e 16900 else
d830549d
AM
16901 {
16902 bfd_put_32 (input_bfd, NOP, p);
16903 goto copy_reloc;
16904 }
9a23f96e
AM
16905 }
16906 break;
16907
16908 case R_PPC64_TPREL16_LO:
16909 case R_PPC64_TPREL16_LO_DS:
16910 if (htab->do_tls_opt && relocation + addend + 0x8000 < 0x10000)
16911 {
16912 bfd_byte *p = contents + (rel->r_offset & ~3);
16913 insn = bfd_get_32 (input_bfd, p);
16914 insn &= ~(0x1f << 16);
16915 insn |= 13 << 16;
16916 bfd_put_32 (input_bfd, insn, p);
16917 }
16918 break;
67f0cbdb
AM
16919 }
16920
65f38f15
AM
16921 /* Do any further special processing. */
16922 switch (r_type)
16923 {
16924 default:
16925 break;
16926
25f23106 16927 case R_PPC64_REL16_HA:
4a969973
AM
16928 case R_PPC64_REL16_HIGHA:
16929 case R_PPC64_REL16_HIGHERA:
16930 case R_PPC64_REL16_HIGHESTA:
a680de9a 16931 case R_PPC64_REL16DX_HA:
f9c6b907
AM
16932 case R_PPC64_ADDR16_HA:
16933 case R_PPC64_ADDR16_HIGHA:
65f38f15
AM
16934 case R_PPC64_ADDR16_HIGHERA:
16935 case R_PPC64_ADDR16_HIGHESTA:
65f38f15
AM
16936 case R_PPC64_TOC16_HA:
16937 case R_PPC64_SECTOFF_HA:
411e1bfb 16938 case R_PPC64_TPREL16_HA:
f9c6b907 16939 case R_PPC64_TPREL16_HIGHA:
411e1bfb 16940 case R_PPC64_TPREL16_HIGHERA:
411e1bfb 16941 case R_PPC64_TPREL16_HIGHESTA:
f9c6b907
AM
16942 case R_PPC64_DTPREL16_HA:
16943 case R_PPC64_DTPREL16_HIGHA:
411e1bfb 16944 case R_PPC64_DTPREL16_HIGHERA:
411e1bfb 16945 case R_PPC64_DTPREL16_HIGHESTA:
65f38f15
AM
16946 /* It's just possible that this symbol is a weak symbol
16947 that's not actually defined anywhere. In that case,
16948 'sec' would be NULL, and we should leave the symbol
16949 alone (it will be set to zero elsewhere in the link). */
5c5f6e17
AM
16950 if (sec == NULL)
16951 break;
1a0670f3 16952 /* Fall through. */
5c5f6e17
AM
16953
16954 case R_PPC64_GOT16_HA:
16955 case R_PPC64_PLTGOT16_HA:
16956 case R_PPC64_PLT16_HA:
16957 case R_PPC64_GOT_TLSGD16_HA:
16958 case R_PPC64_GOT_TLSLD16_HA:
16959 case R_PPC64_GOT_TPREL16_HA:
16960 case R_PPC64_GOT_DTPREL16_HA:
16961 /* Add 0x10000 if sign bit in 0:15 is set.
16962 Bits 0:15 are not used. */
16963 addend += 0x8000;
65f38f15
AM
16964 break;
16965
5663e321
AM
16966 case R_PPC64_D34_HA30:
16967 case R_PPC64_ADDR16_HIGHERA34:
16968 case R_PPC64_ADDR16_HIGHESTA34:
16969 case R_PPC64_REL16_HIGHERA34:
16970 case R_PPC64_REL16_HIGHESTA34:
16971 if (sec != NULL)
16972 addend += 1ULL << 33;
16973 break;
16974
65f38f15
AM
16975 case R_PPC64_ADDR16_DS:
16976 case R_PPC64_ADDR16_LO_DS:
16977 case R_PPC64_GOT16_DS:
16978 case R_PPC64_GOT16_LO_DS:
16979 case R_PPC64_PLT16_LO_DS:
16980 case R_PPC64_SECTOFF_DS:
16981 case R_PPC64_SECTOFF_LO_DS:
16982 case R_PPC64_TOC16_DS:
16983 case R_PPC64_TOC16_LO_DS:
16984 case R_PPC64_PLTGOT16_DS:
16985 case R_PPC64_PLTGOT16_LO_DS:
411e1bfb
AM
16986 case R_PPC64_GOT_TPREL16_DS:
16987 case R_PPC64_GOT_TPREL16_LO_DS:
16988 case R_PPC64_GOT_DTPREL16_DS:
16989 case R_PPC64_GOT_DTPREL16_LO_DS:
16990 case R_PPC64_TPREL16_DS:
16991 case R_PPC64_TPREL16_LO_DS:
16992 case R_PPC64_DTPREL16_DS:
16993 case R_PPC64_DTPREL16_LO_DS:
adadcc0c
AM
16994 insn = bfd_get_32 (input_bfd, contents + (rel->r_offset & ~3));
16995 mask = 3;
a680de9a
PB
16996 /* If this reloc is against an lq, lxv, or stxv insn, then
16997 the value must be a multiple of 16. This is somewhat of
16998 a hack, but the "correct" way to do this by defining _DQ
16999 forms of all the _DS relocs bloats all reloc switches in
17000 this file. It doesn't make much sense to use these
17001 relocs in data, so testing the insn should be safe. */
2365f8d7
AM
17002 if ((insn & (0x3fu << 26)) == (56u << 26)
17003 || ((insn & (0x3fu << 26)) == (61u << 26) && (insn & 3) == 1))
adadcc0c 17004 mask = 15;
a680de9a
PB
17005 relocation += addend;
17006 addend = insn & (mask ^ 3);
17007 if ((relocation & mask) != 0)
65f38f15 17008 {
a680de9a 17009 relocation ^= relocation & mask;
25f53a85 17010 info->callbacks->einfo
695344c0 17011 /* xgettext:c-format */
174d0a74 17012 (_("%H: error: %s not a multiple of %u\n"),
25f53a85 17013 input_bfd, input_section, rel->r_offset,
d830549d 17014 ppc64_elf_howto_table[r_type]->name,
adadcc0c 17015 mask + 1);
65f38f15 17016 bfd_set_error (bfd_error_bad_value);
b34976b6 17017 ret = FALSE;
c316a17c 17018 goto copy_reloc;
65f38f15
AM
17019 }
17020 break;
5bd4f169
AM
17021 }
17022
239e1f3a
AM
17023 /* Dynamic relocs are not propagated for SEC_DEBUGGING sections
17024 because such sections are not SEC_ALLOC and thus ld.so will
17025 not process them. */
d830549d 17026 howto = ppc64_elf_howto_table[(int) r_type];
65f38f15 17027 if (unresolved_reloc
239e1f3a 17028 && !((input_section->flags & SEC_DEBUGGING) != 0
1d5316ab
AM
17029 && h->elf.def_dynamic)
17030 && _bfd_elf_section_offset (output_bfd, info, input_section,
17031 rel->r_offset) != (bfd_vma) -1)
9c07fe7c 17032 {
25f53a85 17033 info->callbacks->einfo
695344c0 17034 /* xgettext:c-format */
c1c8c1ef 17035 (_("%H: unresolvable %s against `%pT'\n"),
25f53a85 17036 input_bfd, input_section, rel->r_offset,
b80eed39 17037 howto->name,
039b3fef 17038 h->elf.root.root.string);
b34976b6 17039 ret = FALSE;
9c07fe7c 17040 }
5bd4f169 17041
b80eed39
AM
17042 /* 16-bit fields in insns mostly have signed values, but a
17043 few insns have 16-bit unsigned values. Really, we should
17044 have different reloc types. */
17045 if (howto->complain_on_overflow != complain_overflow_dont
17046 && howto->dst_mask == 0xffff
17047 && (input_section->flags & SEC_CODE) != 0)
17048 {
17049 enum complain_overflow complain = complain_overflow_signed;
17050
17051 insn = bfd_get_32 (input_bfd, contents + (rel->r_offset & ~3));
2365f8d7 17052 if ((insn & (0x3fu << 26)) == 10u << 26 /* cmpli */)
a47622ac
AM
17053 complain = complain_overflow_bitfield;
17054 else if (howto->rightshift == 0
2365f8d7
AM
17055 ? ((insn & (0x3fu << 26)) == 28u << 26 /* andi */
17056 || (insn & (0x3fu << 26)) == 24u << 26 /* ori */
17057 || (insn & (0x3fu << 26)) == 26u << 26 /* xori */)
17058 : ((insn & (0x3fu << 26)) == 29u << 26 /* andis */
17059 || (insn & (0x3fu << 26)) == 25u << 26 /* oris */
17060 || (insn & (0x3fu << 26)) == 27u << 26 /* xoris */))
b80eed39
AM
17061 complain = complain_overflow_unsigned;
17062 if (howto->complain_on_overflow != complain)
17063 {
17064 alt_howto = *howto;
17065 alt_howto.complain_on_overflow = complain;
17066 howto = &alt_howto;
17067 }
17068 }
17069
5663e321 17070 switch (r_type)
a680de9a 17071 {
5663e321
AM
17072 /* Split field relocs aren't handled by _bfd_final_link_relocate. */
17073 case R_PPC64_D34:
17074 case R_PPC64_D34_LO:
17075 case R_PPC64_D34_HI30:
17076 case R_PPC64_D34_HA30:
17077 case R_PPC64_PCREL34:
17078 case R_PPC64_GOT_PCREL34:
c213164a
AM
17079 case R_PPC64_TPREL34:
17080 case R_PPC64_DTPREL34:
17081 case R_PPC64_GOT_TLSGD34:
17082 case R_PPC64_GOT_TLSLD34:
17083 case R_PPC64_GOT_TPREL34:
17084 case R_PPC64_GOT_DTPREL34:
5663e321
AM
17085 case R_PPC64_PLT_PCREL34:
17086 case R_PPC64_PLT_PCREL34_NOTOC:
17087 case R_PPC64_D28:
17088 case R_PPC64_PCREL28:
17089 if (rel->r_offset + 8 > input_section->size)
17090 r = bfd_reloc_outofrange;
17091 else
17092 {
5663e321
AM
17093 relocation += addend;
17094 if (howto->pc_relative)
17095 relocation -= (rel->r_offset
17096 + input_section->output_offset
17097 + input_section->output_section->vma);
17098 relocation >>= howto->rightshift;
17099
17100 pinsn = bfd_get_32 (input_bfd, contents + rel->r_offset);
17101 pinsn <<= 32;
17102 pinsn |= bfd_get_32 (input_bfd, contents + rel->r_offset + 4);
17103
17104 pinsn &= ~howto->dst_mask;
17105 pinsn |= (((relocation << 16) | (relocation & 0xffff))
17106 & howto->dst_mask);
17107 bfd_put_32 (input_bfd, pinsn >> 32, contents + rel->r_offset);
17108 bfd_put_32 (input_bfd, pinsn, contents + rel->r_offset + 4);
17109 r = bfd_reloc_ok;
17110 if (howto->complain_on_overflow == complain_overflow_signed
17111 && (relocation + (1ULL << (howto->bitsize - 1))
17112 >= 1ULL << howto->bitsize))
17113 r = bfd_reloc_overflow;
17114 }
17115 break;
17116
17117 case R_PPC64_REL16DX_HA:
a680de9a
PB
17118 if (rel->r_offset + 4 > input_section->size)
17119 r = bfd_reloc_outofrange;
17120 else
17121 {
17122 relocation += addend;
17123 relocation -= (rel->r_offset
17124 + input_section->output_offset
17125 + input_section->output_section->vma);
3de43e7b 17126 relocation = (bfd_signed_vma) relocation >> 16;
a680de9a
PB
17127 insn = bfd_get_32 (input_bfd, contents + rel->r_offset);
17128 insn &= ~0x1fffc1;
3de43e7b 17129 insn |= (relocation & 0xffc1) | ((relocation & 0x3e) << 15);
a680de9a
PB
17130 bfd_put_32 (input_bfd, insn, contents + rel->r_offset);
17131 r = bfd_reloc_ok;
3de43e7b 17132 if (relocation + 0x8000 > 0xffff)
a680de9a
PB
17133 r = bfd_reloc_overflow;
17134 }
5663e321
AM
17135 break;
17136
17137 default:
17138 r = _bfd_final_link_relocate (howto, input_bfd, input_section,
17139 contents, rel->r_offset,
17140 relocation, addend);
a680de9a 17141 }
5bd4f169 17142
ef60b7ff 17143 if (r != bfd_reloc_ok)
5bd4f169 17144 {
bc30df16 17145 char *more_info = NULL;
b80eed39 17146 const char *reloc_name = howto->name;
bc30df16
AM
17147
17148 if (reloc_dest != DEST_NORMAL)
17149 {
17150 more_info = bfd_malloc (strlen (reloc_name) + 8);
17151 if (more_info != NULL)
17152 {
17153 strcpy (more_info, reloc_name);
17154 strcat (more_info, (reloc_dest == DEST_OPD
17155 ? " (OPD)" : " (stub)"));
17156 reloc_name = more_info;
17157 }
17158 }
17159
cd27b276 17160 if (r == bfd_reloc_overflow)
5bd4f169 17161 {
8131c122
AM
17162 /* On code like "if (foo) foo();" don't report overflow
17163 on a branch to zero when foo is undefined. */
17164 if (!warned
17165 && (reloc_dest == DEST_STUB
17166 || !(h != NULL
17167 && (h->elf.root.type == bfd_link_hash_undefweak
17168 || h->elf.root.type == bfd_link_hash_undefined)
17169 && is_branch_reloc (r_type))))
1a72702b
AM
17170 info->callbacks->reloc_overflow (info, &h->elf.root,
17171 sym_name, reloc_name,
17172 orig_rel.r_addend,
17173 input_bfd, input_section,
17174 rel->r_offset);
ef60b7ff
AM
17175 }
17176 else
17177 {
25f53a85 17178 info->callbacks->einfo
695344c0 17179 /* xgettext:c-format */
c1c8c1ef 17180 (_("%H: %s against `%pT': error %d\n"),
25f53a85 17181 input_bfd, input_section, rel->r_offset,
bc30df16 17182 reloc_name, sym_name, (int) r);
b34976b6 17183 ret = FALSE;
ef60b7ff 17184 }
c9594989 17185 free (more_info);
5bd4f169 17186 }
c316a17c
AM
17187 copy_reloc:
17188 if (wrel != rel)
17189 *wrel = *rel;
17190 }
17191
17192 if (wrel != rel)
17193 {
17194 Elf_Internal_Shdr *rel_hdr;
17195 size_t deleted = rel - wrel;
17196
17197 rel_hdr = _bfd_elf_single_rel_hdr (input_section->output_section);
17198 rel_hdr->sh_size -= rel_hdr->sh_entsize * deleted;
17199 if (rel_hdr->sh_size == 0)
17200 {
17201 /* It is too late to remove an empty reloc section. Leave
17202 one NONE reloc.
17203 ??? What is wrong with an empty section??? */
17204 rel_hdr->sh_size = rel_hdr->sh_entsize;
17205 deleted -= 1;
17206 }
17207 rel_hdr = _bfd_elf_single_rel_hdr (input_section);
17208 rel_hdr->sh_size -= rel_hdr->sh_entsize * deleted;
17209 input_section->reloc_count -= deleted;
5bd4f169
AM
17210 }
17211
645ea6a9
AM
17212 /* If we're emitting relocations, then shortly after this function
17213 returns, reloc offsets and addends for this section will be
17214 adjusted. Worse, reloc symbol indices will be for the output
8860955f
AM
17215 file rather than the input. Save a copy of the relocs for
17216 opd_entry_value. */
0e1862bb 17217 if (is_opd && (info->emitrelocations || bfd_link_relocatable (info)))
8860955f
AM
17218 {
17219 bfd_size_type amt;
17220 amt = input_section->reloc_count * sizeof (Elf_Internal_Rela);
17221 rel = bfd_alloc (input_bfd, amt);
729eabd5
AM
17222 BFD_ASSERT (ppc64_elf_tdata (input_bfd)->opd.relocs == NULL);
17223 ppc64_elf_tdata (input_bfd)->opd.relocs = rel;
8860955f
AM
17224 if (rel == NULL)
17225 return FALSE;
17226 memcpy (rel, relocs, amt);
17227 }
5bd4f169
AM
17228 return ret;
17229}
17230
754021d0
AM
17231/* Adjust the value of any local symbols in opd sections. */
17232
6e0b88f1 17233static int
754021d0
AM
17234ppc64_elf_output_symbol_hook (struct bfd_link_info *info,
17235 const char *name ATTRIBUTE_UNUSED,
17236 Elf_Internal_Sym *elfsym,
17237 asection *input_sec,
17238 struct elf_link_hash_entry *h)
17239{
74f0fb50
AM
17240 struct _opd_sec_data *opd;
17241 long adjust;
754021d0
AM
17242 bfd_vma value;
17243
4025353c 17244 if (h != NULL)
6e0b88f1 17245 return 1;
4025353c 17246
74f0fb50
AM
17247 opd = get_opd_info (input_sec);
17248 if (opd == NULL || opd->adjust == NULL)
6e0b88f1 17249 return 1;
754021d0
AM
17250
17251 value = elfsym->st_value - input_sec->output_offset;
0e1862bb 17252 if (!bfd_link_relocatable (info))
754021d0
AM
17253 value -= input_sec->output_section->vma;
17254
51aecdc5 17255 adjust = opd->adjust[OPD_NDX (value)];
4025353c 17256 if (adjust == -1)
6e0b88f1
AM
17257 return 2;
17258
17259 elfsym->st_value += adjust;
17260 return 1;
754021d0
AM
17261}
17262
5bd4f169
AM
17263/* Finish up dynamic symbol handling. We set the contents of various
17264 dynamic sections here. */
17265
b34976b6 17266static bfd_boolean
4ce794b7
AM
17267ppc64_elf_finish_dynamic_symbol (bfd *output_bfd,
17268 struct bfd_link_info *info,
17269 struct elf_link_hash_entry *h,
4aef7643 17270 Elf_Internal_Sym *sym)
5bd4f169 17271{
65f38f15 17272 struct ppc_link_hash_table *htab;
8387904d 17273 struct plt_entry *ent;
5bd4f169 17274
65f38f15 17275 htab = ppc_hash_table (info);
4dfe6ac6
NC
17276 if (htab == NULL)
17277 return FALSE;
5bd4f169 17278
49c09209
AM
17279 if (!htab->opd_abi && !h->def_regular)
17280 for (ent = h->plt.plist; ent != NULL; ent = ent->next)
17281 if (ent->plt.offset != (bfd_vma) -1)
17282 {
17283 /* Mark the symbol as undefined, rather than as
17284 defined in glink. Leave the value if there were
17285 any relocations where pointer equality matters
17286 (this is a clue for the dynamic linker, to make
17287 function pointer comparisons work between an
17288 application and shared library), otherwise set it
17289 to zero. */
17290 sym->st_shndx = SHN_UNDEF;
17291 if (!h->pointer_equality_needed)
17292 sym->st_value = 0;
17293 else if (!h->ref_regular_nonweak)
17294 {
17295 /* This breaks function pointer comparisons, but
17296 that is better than breaking tests for a NULL
17297 function pointer. */
17298 sym->st_value = 0;
17299 }
17300 break;
17301 }
5bd4f169 17302
1bdd8fac
AM
17303 if (h->needs_copy
17304 && (h->root.type == bfd_link_hash_defined
17305 || h->root.type == bfd_link_hash_defweak)
17306 && (h->root.u.def.section == htab->elf.sdynbss
17307 || h->root.u.def.section == htab->elf.sdynrelro))
5bd4f169 17308 {
65f38f15 17309 /* This symbol needs a copy reloc. Set it up. */
49c09209 17310 Elf_Internal_Rela rela;
5474d94f 17311 asection *srel;
49c09209 17312 bfd_byte *loc;
5bd4f169 17313
1bdd8fac 17314 if (h->dynindx == -1)
65f38f15 17315 abort ();
5bd4f169 17316
ed7007c1 17317 rela.r_offset = defined_sym_val (h);
5bd4f169
AM
17318 rela.r_info = ELF64_R_INFO (h->dynindx, R_PPC64_COPY);
17319 rela.r_addend = 0;
afbf7e8e 17320 if (h->root.u.def.section == htab->elf.sdynrelro)
5474d94f
AM
17321 srel = htab->elf.sreldynrelro;
17322 else
17323 srel = htab->elf.srelbss;
17324 loc = srel->contents;
17325 loc += srel->reloc_count++ * sizeof (Elf64_External_Rela);
65f38f15 17326 bfd_elf64_swap_reloca_out (output_bfd, &rela, loc);
5bd4f169
AM
17327 }
17328
b34976b6 17329 return TRUE;
5bd4f169
AM
17330}
17331
65f38f15
AM
17332/* Used to decide how to sort relocs in an optimal manner for the
17333 dynamic linker, before writing them out. */
17334
17335static enum elf_reloc_type_class
7e612e98
AM
17336ppc64_elf_reloc_type_class (const struct bfd_link_info *info,
17337 const asection *rel_sec,
17338 const Elf_Internal_Rela *rela)
65f38f15 17339{
04c9666a 17340 enum elf_ppc64_reloc_type r_type;
7e612e98
AM
17341 struct ppc_link_hash_table *htab = ppc_hash_table (info);
17342
33e44f2e 17343 if (rel_sec == htab->elf.irelplt)
7e612e98 17344 return reloc_class_ifunc;
a33d1f77 17345
4ce794b7 17346 r_type = ELF64_R_TYPE (rela->r_info);
a33d1f77 17347 switch (r_type)
65f38f15
AM
17348 {
17349 case R_PPC64_RELATIVE:
17350 return reloc_class_relative;
17351 case R_PPC64_JMP_SLOT:
17352 return reloc_class_plt;
17353 case R_PPC64_COPY:
17354 return reloc_class_copy;
17355 default:
17356 return reloc_class_normal;
17357 }
17358}
17359
5bd4f169
AM
17360/* Finish up the dynamic sections. */
17361
b34976b6 17362static bfd_boolean
4ce794b7
AM
17363ppc64_elf_finish_dynamic_sections (bfd *output_bfd,
17364 struct bfd_link_info *info)
5bd4f169 17365{
65f38f15
AM
17366 struct ppc_link_hash_table *htab;
17367 bfd *dynobj;
5bd4f169 17368 asection *sdyn;
5bd4f169 17369
65f38f15 17370 htab = ppc_hash_table (info);
4dfe6ac6
NC
17371 if (htab == NULL)
17372 return FALSE;
17373
65f38f15 17374 dynobj = htab->elf.dynobj;
3d4d4302 17375 sdyn = bfd_get_linker_section (dynobj, ".dynamic");
5bd4f169 17376
65f38f15 17377 if (htab->elf.dynamic_sections_created)
5bd4f169 17378 {
5bd4f169
AM
17379 Elf64_External_Dyn *dyncon, *dynconend;
17380
33e44f2e 17381 if (sdyn == NULL || htab->elf.sgot == NULL)
65f38f15 17382 abort ();
5bd4f169
AM
17383
17384 dyncon = (Elf64_External_Dyn *) sdyn->contents;
eea6121a 17385 dynconend = (Elf64_External_Dyn *) (sdyn->contents + sdyn->size);
5bd4f169
AM
17386 for (; dyncon < dynconend; dyncon++)
17387 {
17388 Elf_Internal_Dyn dyn;
19397422 17389 asection *s;
5bd4f169
AM
17390
17391 bfd_elf64_swap_dyn_in (dynobj, dyncon, &dyn);
17392
17393 switch (dyn.d_tag)
17394 {
65f38f15
AM
17395 default:
17396 continue;
5bd4f169 17397
5d1634d7 17398 case DT_PPC64_GLINK:
4ce794b7 17399 s = htab->glink;
6348e046 17400 dyn.d_un.d_ptr = s->output_section->vma + s->output_offset;
ad8e1ba5
AM
17401 /* We stupidly defined DT_PPC64_GLINK to be the start
17402 of glink rather than the first entry point, which is
17403 what ld.so needs, and now have a bigger stub to
17404 support automatic multiple TOCs. */
9e390558 17405 dyn.d_un.d_ptr += GLINK_PLTRESOLVE_SIZE (htab) - 8 * 4;
5d1634d7
AM
17406 break;
17407
19397422
AM
17408 case DT_PPC64_OPD:
17409 s = bfd_get_section_by_name (output_bfd, ".opd");
6348e046
AM
17410 if (s == NULL)
17411 continue;
17412 dyn.d_un.d_ptr = s->vma;
19397422
AM
17413 break;
17414
e8910a83 17415 case DT_PPC64_OPT:
5663e321
AM
17416 if ((htab->do_multi_toc && htab->multi_toc_needed)
17417 || htab->notoc_plt)
e8910a83 17418 dyn.d_un.d_val |= PPC64_OPT_MULTI_TOC;
f378ab09
AM
17419 if (htab->has_plt_localentry0)
17420 dyn.d_un.d_val |= PPC64_OPT_LOCALENTRY;
e8910a83
AM
17421 break;
17422
19397422
AM
17423 case DT_PPC64_OPDSZ:
17424 s = bfd_get_section_by_name (output_bfd, ".opd");
6348e046
AM
17425 if (s == NULL)
17426 continue;
eea6121a 17427 dyn.d_un.d_val = s->size;
19397422
AM
17428 break;
17429
65f38f15 17430 case DT_PLTGOT:
33e44f2e 17431 s = htab->elf.splt;
6348e046 17432 dyn.d_un.d_ptr = s->output_section->vma + s->output_offset;
65f38f15
AM
17433 break;
17434
17435 case DT_JMPREL:
33e44f2e 17436 s = htab->elf.srelplt;
6348e046 17437 dyn.d_un.d_ptr = s->output_section->vma + s->output_offset;
65f38f15 17438 break;
5bd4f169 17439
65f38f15 17440 case DT_PLTRELSZ:
33e44f2e 17441 dyn.d_un.d_val = htab->elf.srelplt->size;
5d1634d7 17442 break;
82e66161
AM
17443
17444 case DT_TEXTREL:
17445 if (htab->local_ifunc_resolver)
17446 info->callbacks->einfo
17447 (_("%X%P: text relocations and GNU indirect "
17448 "functions will result in a segfault at runtime\n"));
17449 else if (htab->maybe_local_ifunc_resolver)
17450 info->callbacks->einfo
17451 (_("%P: warning: text relocations and GNU indirect "
17452 "functions may result in a segfault at runtime\n"));
17453 continue;
5bd4f169 17454 }
5bd4f169 17455
65f38f15 17456 bfd_elf64_swap_dyn_out (output_bfd, &dyn, dyncon);
5bd4f169 17457 }
5bd4f169
AM
17458 }
17459
6528b6eb
AM
17460 if (htab->elf.sgot != NULL && htab->elf.sgot->size != 0
17461 && htab->elf.sgot->output_section != bfd_abs_section_ptr)
5d1634d7
AM
17462 {
17463 /* Fill in the first entry in the global offset table.
17464 We use it to hold the link-time TOCbase. */
17465 bfd_put_64 (output_bfd,
60ee0d4a 17466 elf_gp (output_bfd) + TOC_BASE_OFF,
33e44f2e 17467 htab->elf.sgot->contents);
5d1634d7
AM
17468
17469 /* Set .got entry size. */
2cdcc330
AM
17470 elf_section_data (htab->elf.sgot->output_section)->this_hdr.sh_entsize
17471 = 8;
5d1634d7
AM
17472 }
17473
6528b6eb
AM
17474 if (htab->elf.splt != NULL && htab->elf.splt->size != 0
17475 && htab->elf.splt->output_section != bfd_abs_section_ptr)
5d1634d7
AM
17476 {
17477 /* Set .plt entry size. */
33e44f2e 17478 elf_section_data (htab->elf.splt->output_section)->this_hdr.sh_entsize
b9e5796b 17479 = PLT_ENTRY_SIZE (htab);
5d1634d7
AM
17480 }
17481
84f5d08e
AM
17482 /* brlt is SEC_LINKER_CREATED, so we need to write out relocs for
17483 brlt ourselves if emitrelocations. */
17484 if (htab->brlt != NULL
17485 && htab->brlt->reloc_count != 0
17486 && !_bfd_elf_link_output_relocs (output_bfd,
17487 htab->brlt,
d4730f92 17488 elf_section_data (htab->brlt)->rela.hdr,
84f5d08e
AM
17489 elf_section_data (htab->brlt)->relocs,
17490 NULL))
17491 return FALSE;
17492
176a0d42
AM
17493 if (htab->glink != NULL
17494 && htab->glink->reloc_count != 0
17495 && !_bfd_elf_link_output_relocs (output_bfd,
17496 htab->glink,
d4730f92 17497 elf_section_data (htab->glink)->rela.hdr,
176a0d42
AM
17498 elf_section_data (htab->glink)->relocs,
17499 NULL))
17500 return FALSE;
17501
da44f4e5 17502
df136d64
AM
17503 if (htab->glink_eh_frame != NULL
17504 && htab->glink_eh_frame->size != 0
17505 && htab->glink_eh_frame->sec_info_type == SEC_INFO_TYPE_EH_FRAME
17506 && !_bfd_elf_write_section_eh_frame (output_bfd, info,
17507 htab->glink_eh_frame,
17508 htab->glink_eh_frame->contents))
17509 return FALSE;
58d180e8 17510
e717da7e 17511 /* We need to handle writing out multiple GOT sections ourselves,
7b53ace3
AM
17512 since we didn't add them to DYNOBJ. We know dynobj is the first
17513 bfd. */
c72f2fb2 17514 while ((dynobj = dynobj->link.next) != NULL)
e717da7e
AM
17515 {
17516 asection *s;
7b53ace3 17517
0c8d6e5c 17518 if (!is_ppc64_elf (dynobj))
7b53ace3
AM
17519 continue;
17520
e717da7e
AM
17521 s = ppc64_elf_tdata (dynobj)->got;
17522 if (s != NULL
eea6121a 17523 && s->size != 0
e717da7e
AM
17524 && s->output_section != bfd_abs_section_ptr
17525 && !bfd_set_section_contents (output_bfd, s->output_section,
17526 s->contents, s->output_offset,
eea6121a 17527 s->size))
e717da7e
AM
17528 return FALSE;
17529 s = ppc64_elf_tdata (dynobj)->relgot;
17530 if (s != NULL
eea6121a 17531 && s->size != 0
e717da7e
AM
17532 && s->output_section != bfd_abs_section_ptr
17533 && !bfd_set_section_contents (output_bfd, s->output_section,
17534 s->contents, s->output_offset,
eea6121a 17535 s->size))
e717da7e
AM
17536 return FALSE;
17537 }
f6c52c13 17538
b34976b6 17539 return TRUE;
5bd4f169
AM
17540}
17541
5bd4f169 17542#include "elf64-target.h"
7b8e7dad
AM
17543
17544/* FreeBSD support */
17545
17546#undef TARGET_LITTLE_SYM
17547#undef TARGET_LITTLE_NAME
17548
17549#undef TARGET_BIG_SYM
6d00b590 17550#define TARGET_BIG_SYM powerpc_elf64_fbsd_vec
7b8e7dad
AM
17551#undef TARGET_BIG_NAME
17552#define TARGET_BIG_NAME "elf64-powerpc-freebsd"
17553
17554#undef ELF_OSABI
17555#define ELF_OSABI ELFOSABI_FREEBSD
17556
17557#undef elf64_bed
17558#define elf64_bed elf64_powerpc_fbsd_bed
17559
17560#include "elf64-target.h"
This page took 2.953757 seconds and 4 git commands to generate.